Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

Apache Software Foundation — Vulnerabilities & Security Advisories 1725

Browse all 1725 CVE security advisories affecting Apache Software Foundation. AI-powered Chinese analysis, POCs, and references for each vulnerability.

The Apache Software Foundation develops and maintains open-source software, primarily known for the widely deployed Apache HTTP Server and foundational Java frameworks. Its extensive portfolio exposes a significant attack surface, evidenced by the 1717 recorded CVEs. Historically, vulnerabilities frequently involve remote code execution, cross-site scripting, and privilege escalation, often stemming from complex configuration errors or input validation failures in legacy components. While the foundation enforces rigorous security review processes, the sheer volume of projects increases the likelihood of undiscovered flaws. Notable incidents include critical flaws in Log4j, which allowed remote code execution via crafted log messages, highlighting risks in dependency management. The organization relies on community-driven patching, requiring administrators to promptly apply updates to mitigate exploitation. This model ensures transparency but demands active vigilance from users to maintain system integrity against evolving threat vectors.

CVE IDTitleCVSSSeverityPublished
CVE-2024-23321 Apache RocketMQ: Unauthorized Exposure of Sensitive Data — Apache RocketMQCWE-200 8.8AIHighAI2024-07-22
CVE-2024-41107 Apache CloudStack: SAML Signature Exclusion — Apache CloudStackCWE-290 9.8 -2024-07-19
CVE-2024-41172 Apache CXF: Unrestricted memory consumption in CXF HTTP clients — Apache CXFCWE-401 7.5 -2024-07-19
CVE-2024-32007 Apache CXF Denial of Service vulnerability in JOSE — Apache CXFCWE-400 7.5 -2024-07-19
CVE-2024-29736 Apache CXF: SSRF vulnerability via WADL stylesheet parameter — Apache CXFCWE-918 9.1 -2024-07-19
CVE-2024-29178 Apache StreamPark: FreeMarker SSTI RCE Vulnerability — Apache StreamParkCWE-94 8.8AIHighAI2024-07-18
CVE-2024-40725 Apache HTTP Server: source code disclosure with handlers configured via AddType — Apache HTTP ServerCWE-668 7.5 -2024-07-18
CVE-2024-40898 Apache HTTP Server: SSRF with mod_rewrite in server/vhost context on Windows — Apache HTTP ServerCWE-918 7.5AIHighAI2024-07-18
CVE-2024-29120 Apache StreamPark: Information leakage vulnerability — Apache StreamParkCWE-212 8.8AIHighAI2024-07-17
CVE-2024-31411 Apache StreamPipes: Potential remote code execution (RCE) via file upload — Apache StreamPipesCWE-434 8.8AIHighAI2024-07-17
CVE-2024-31979 Apache StreamPipes: Possibility of SSRF in pipeline element installation process — Apache StreamPipesCWE-918 8.1AIHighAI2024-07-17
CVE-2024-30471 Apache StreamPipes: Potential creation of multiple identical accounts — Apache StreamPipesCWE-367 7.4AIHighAI2024-07-17
CVE-2024-29737 Apache StreamPark (incubating): maven build params could trigger remote command execution — Apache StreamPark (incubating)CWE-77 8.8AIHighAI2024-07-17
CVE-2023-52291 Apache StreamPark (incubating): Unchecked maven build params could trigger remote command execution — Apache StreamPark (incubating)CWE-77 8.8AIHighAI2024-07-17
CVE-2024-39877 Apache Airflow: DAG Author Code Execution possibility in airflow-scheduler — Apache AirflowCWE-94 8.8AIHighAI2024-07-17
CVE-2024-39863 Apache Airflow: Potential XSS Vulnerability — Apache AirflowCWE-79 5.4AIMediumAI2024-07-17
CVE-2024-39887 Apache Superset: Improper SQL authorisation, parse not checking for specific engine functions — Apache SupersetCWE-89 4.3 Medium2024-07-16
CVE-2023-52290 Apache StreamPark (incubating): Unchecked SQL query fields trigger SQL injection vulnerability — Apache StreamPark (incubating)CWE-89 6.5AIMediumAI2024-07-16
CVE-2023-49566 Apache Linkis DataSource: JDBC Datasource Module with DB2 has JNDI Injection vulnerability — Apache Linkis DataSourceCWE-502 8.1 -2024-07-15
CVE-2023-46801 Apache Linkis DataSource: DataSource Remote code execution vulnerability — Apache Linkis DataSourceCWE-502 8.1 -2024-07-15
CVE-2023-41916 Apache Linkis DataSource: DatasourceManager module has a JDBC parameter judgment logic vulnerability that allows for arbitrary file reading — Apache Linkis DataSourceCWE-552 6.5 -2024-07-15
CVE-2024-36522 Apache Wicket: Remote code execution via XSLT injection — Apache WicketCWE-74 9.8AICriticalAI2024-07-12
CVE-2024-37389 Apache NiFi: Improper Neutralization of Input in Parameter Context Description — Apache NiFiCWE-79 4.6 Medium2024-07-08
CVE-2024-38346 Apache CloudStack: Unauthenticated cluster service port leads to remote execution — Apache CloudStackCWE-94 10.0 -2024-07-05
CVE-2024-39864 Apache CloudStack: Integration API service uses dynamic port when disabled — Apache CloudStackCWE-665 9.1 -2024-07-05
CVE-2024-39884 Apache HTTP Server: source code disclosure with handlers configured via AddType — Apache HTTP Server 7.5 -2024-07-04
CVE-2024-34750 Apache Tomcat: HTTP/2 excess header handling DoS — Apache TomcatCWE-755 5.3AIMediumAI2024-07-03
CVE-2024-39573 Apache HTTP Server: mod_rewrite proxy handler substitution — Apache HTTP ServerCWE-20 9.3AICriticalAI2024-07-01
CVE-2024-38477 Apache HTTP Server: Crash resulting in Denial of Service in mod_proxy via a malicious request — Apache HTTP ServerCWE-476 7.5 -2024-07-01
CVE-2024-38476 Apache HTTP Server may use exploitable/malicious backend application output to run local handlers via internal redirect — Apache HTTP ServerCWE-829 9.1AICriticalAI2024-07-01

This page lists every published CVE security advisory associated with Apache Software Foundation. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.