Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

Apache Software Foundation — Vulnerabilities & Security Advisories 1725

Browse all 1725 CVE security advisories affecting Apache Software Foundation. AI-powered Chinese analysis, POCs, and references for each vulnerability.

The Apache Software Foundation develops and maintains open-source software, primarily known for the widely deployed Apache HTTP Server and foundational Java frameworks. Its extensive portfolio exposes a significant attack surface, evidenced by the 1717 recorded CVEs. Historically, vulnerabilities frequently involve remote code execution, cross-site scripting, and privilege escalation, often stemming from complex configuration errors or input validation failures in legacy components. While the foundation enforces rigorous security review processes, the sheer volume of projects increases the likelihood of undiscovered flaws. Notable incidents include critical flaws in Log4j, which allowed remote code execution via crafted log messages, highlighting risks in dependency management. The organization relies on community-driven patching, requiring administrators to promptly apply updates to mitigate exploitation. This model ensures transparency but demands active vigilance from users to maintain system integrity against evolving threat vectors.

CVE IDTitleCVSSSeverityPublished
CVE-2024-27309 Apache Kafka: Potential incorrect access control during migration from ZK mode to KRaft mode — Apache KafkaCWE-863 4.4 -2024-04-12
CVE-2024-31309 Apache Traffic Server: HTTP/2 CONTINUATION frames can be utilized for DoS attack — Apache Traffic ServerCWE-20 7.5 -2024-04-10
CVE-2024-31867 Apache Zeppelin: LDAP search filter query Injection Vulnerability — Apache ZeppelinCWE-20 9.8AICriticalAI2024-04-09
CVE-2024-31868 Apache Zeppelin: XSS vulnerability in the helium module — Apache ZeppelinCWE-79 5.4AIMediumAI2024-04-09
CVE-2024-31866 Apache Zeppelin: Interpreter download command does not escape malicious code injection — Apache ZeppelinCWE-116 9.8AICriticalAI2024-04-09
CVE-2024-31865 Apache Zeppelin: Cron arbitrary user impersonation with improper privileges — Apache ZeppelinCWE-20 9.8AICriticalAI2024-04-09
CVE-2024-31864 Apache Zeppelin: Remote code execution by adding malicious JDBC connection string — Apache ZeppelinCWE-94 9.8AICriticalAI2024-04-09
CVE-2024-31863 Apache Zeppelin: Replacing other users notebook, bypassing any permissions — Apache ZeppelinCWE-290 9.1AICriticalAI2024-04-09
CVE-2024-31862 Apache Zeppelin: Denial of service with invalid notebook name — Apache ZeppelinCWE-20 9.1AICriticalAI2024-04-09
CVE-2022-47894 Apache Zeppelin SAP: connecting to a malicious SAP server allowed it to perform XXE — Apache Zeppelin SAPCWE-20 7.5AIHighAI2024-04-09
CVE-2021-28656 Apache Zeppelin: CSRF vulnerability in the Credentials page — Apache ZeppelinCWE-352 8.8AIHighAI2024-04-09
CVE-2024-31860 Apache Zeppelin: Path traversal vulnerability — Apache ZeppelinCWE-22 6.5AIMediumAI2024-04-09
CVE-2024-24746 Apache NimBLE: Denial of service in NimBLE Bluetooth stack — Apache NimBLECWE-835 6.5 -2024-04-06
CVE-2024-27316 Apache HTTP Server: HTTP/2 DoS by memory exhaustion on endless continuation frames — Apache HTTP ServerCWE-770 7.5 -2024-04-04
CVE-2024-24795 Apache HTTP Server: HTTP Response Splitting in multiple modules — Apache HTTP ServerCWE-113 9.1 -2024-04-04
CVE-2023-38709 Apache HTTP Server: HTTP response splitting — Apache HTTP Server 7.5 -2024-04-04
CVE-2024-29008 Apache CloudStack: The extraconfig feature can be abused to load hypervisor resources on a VM instance — Apache CloudStackCWE-20 9.6 -2024-04-04
CVE-2024-29007 Apache CloudStack: When downloading templates or ISOs, the management server and SSVM follow HTTP redirects with potentially dangerous consequences — Apache CloudStackCWE-918 8.1 -2024-04-04
CVE-2024-29006 Apache CloudStack: x-forwarded-for HTTP header parsed by default — Apache CloudStackCWE-290 8.1 -2024-04-04
CVE-2024-29834 Apache Pulsar: Improper Authorization For Namespace and Topic Management Endpoints — Apache PulsarCWE-863 6.4 Medium2024-04-02
CVE-2024-23537 Apache Fineract: Under certain circumstances, this vulnerability allowed users, without specific permissions, to escalate their privileges to any role. — Apache FineractCWE-269 8.4 High2024-03-29
CVE-2024-23538 Apache Fineract: Under certain system configurations, the sqlSearch parameter was vulnerable to SQL injection attacks, potentially allowing attackers to manipulate database queries. — Apache FineractCWE-89 9.9 Critical2024-03-29
CVE-2024-23539 Apache Fineract: Under certain system configurations, the sqlSearch parameter for specific endpoints was vulnerable to SQL injection attacks, potentially allowing attackers to manipulate database queries. — Apache FineractCWE-89 8.3 High2024-03-29
CVE-2024-29735 Apache Airflow: Potentially harmful permission changing by log task handler — Apache AirflowCWE-281 8.1AIHighAI2024-03-26
CVE-2024-27438 Apache Doris: Downloading arbitrary remote jar files resulting in remote command execution — Apache DorisCWE-494 8.8AIHighAI2024-03-21
CVE-2024-26307 Apache Doris: Possible race condition — Apache DorisCWE-362 6.5AIMediumAI2024-03-21
CVE-2024-29131 Apache Commons Configuration: StackOverflowError adding property in AbstractListDelimiterHandler.flattenIterator() — Apache Commons ConfigurationCWE-787 9.8AICriticalAI2024-03-21
CVE-2024-29133 Apache Commons Configuration: StackOverflowError calling ListDelimiterHandler.flatten(Object, int) with a cyclical object tree — Apache Commons ConfigurationCWE-787 9.8AICriticalAI2024-03-21
CVE-2024-27439 Apache Wicket: Possible bypass of CSRF protection — Apache WicketCWE-352 8.8 -2024-03-19
CVE-2024-24683 Apache Hop Engine: ID isn't escaped when generating HTML — Apache Hop EngineCWE-20 8.2AIHighAI2024-03-19

This page lists every published CVE security advisory associated with Apache Software Foundation. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.