Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

Apache Software Foundation — Vulnerabilities & Security Advisories 1725

Browse all 1725 CVE security advisories affecting Apache Software Foundation. AI-powered Chinese analysis, POCs, and references for each vulnerability.

The Apache Software Foundation develops and maintains open-source software, primarily known for the widely deployed Apache HTTP Server and foundational Java frameworks. Its extensive portfolio exposes a significant attack surface, evidenced by the 1717 recorded CVEs. Historically, vulnerabilities frequently involve remote code execution, cross-site scripting, and privilege escalation, often stemming from complex configuration errors or input validation failures in legacy components. While the foundation enforces rigorous security review processes, the sheer volume of projects increases the likelihood of undiscovered flaws. Notable incidents include critical flaws in Log4j, which allowed remote code execution via crafted log messages, highlighting risks in dependency management. The organization relies on community-driven patching, requiring administrators to promptly apply updates to mitigate exploitation. This model ensures transparency but demands active vigilance from users to maintain system integrity against evolving threat vectors.

CVE IDTitleCVSSSeverityPublished
CVE-2023-34981 Apache Tomcat: AJP response header mix-up — Apache Tomcat 7.5 -2023-06-21
CVE-2023-34340 Apache Accumulo: Accumulo 2.1.0 may incorrectly validate cached credentials — Apache AccumuloCWE-287 9.1 -2023-06-21
CVE-2023-35005 Apache Airflow: Information disclosure on configuration view — Apache AirflowCWE-200 7.5 -2023-06-19
CVE-2023-34396 Apache Struts: DoS via OOM owing to no sanity limit on normal form fields in multipart forms — Apache StrutsCWE-770 4.3 Medium2023-06-14
CVE-2023-34149 Apache Struts: DoS via OOM owing to not properly checking of list bounds — Apache StrutsCWE-770 4.3 Medium2023-06-14
CVE-2023-30631 Apache Traffic Server: Configuration option to block the PUSH method in ATS didn't work — Apache Traffic ServerCWE-20 7.5 -2023-06-14
CVE-2023-33933 Apache Traffic Server: s3_auth plugin problem with hash calculation — Apache Traffic ServerCWE-200 7.5 -2023-06-14
CVE-2022-47184 Apache Traffic Server: The TRACE method can be use to disclose network information — Apache Traffic ServerCWE-200 7.5 -2023-06-14
CVE-2023-34212 Apache NiFi: Potential Deserialization of Untrusted Data with JNDI in JMS Components — Apache NiFiCWE-502 8.8 -2023-06-12
CVE-2023-34468 Apache NiFi: Potential Code Injection with Database Services using H2 — Apache NiFiCWE-94 8.8 -2023-06-12
CVE-2023-30576 Apache Guacamole: Use-after-free in handling of RDP audio input buffer — Apache GuacamoleCWE-416 6.8 Medium2023-06-07
CVE-2023-30575 Apache Guacamole: Incorrect calculation of Guacamole protocol element lengths — Apache GuacamoleCWE-131 6.5 Medium2023-06-07
CVE-2023-33234 Apache Airflow CNCF Kubernetes Provider: KubernetesPodOperator RCE via connection configuration — Apache Airflow CNCF Kubernetes ProviderCWE-74 4.9 -2023-05-30
CVE-2023-30601 Apache Cassandra: Privilege escalation when enabling FQL/Audit logs — Apache CassandraCWE-269 7.8 High2023-05-30
CVE-2022-46907 Apache JSPWiki: XSS Injection points in several plugins — Apache JSPWikiCWE-79 6.1 -2023-05-25
CVE-2023-33246 Apache RocketMQ: Possible remote code execution vulnerability when using the update configuration function — Apache RocketMQCWE-94 9.8 -2023-05-24
CVE-2023-31062 Apache InLong: Privilege escalation vulnerability for InLong — Apache InLongCWE-269 8.8 -2023-05-22
CVE-2023-31064 Apache InLong: Insecurity direct object references cancelling applications — Apache InLongCWE-552 6.5 -2023-05-22
CVE-2023-31065 Apache InLong: Insufficient Session Expiration in InLong — Apache InLongCWE-613 9.8 -2023-05-22
CVE-2023-31066 Apache InLong: Insecure direct object references for inlong sources — Apache InLongCWE-552 8.1 -2023-05-22
CVE-2023-31098 Apache InLong: Weak Password Implementation in InLong — Apache InLongCWE-521 7.4 -2023-05-22
CVE-2023-31101 Apache InLong: Users who joined later can see the data of deleted users — Apache InLongCWE-1188 5.3 -2023-05-22
CVE-2023-31103 Apache InLong: Attackers can change the immutable name and type of cluster — Apache InLongCWE-668 8.2 -2023-05-22
CVE-2023-31206 Apache InLong: Attackers can change the immutable name and type of nodes — Apache InLongCWE-668 8.2 -2023-05-22
CVE-2023-31453 Apache InLong: IDOR make users can delete others' subscription — Apache InLongCWE-732 7.5 -2023-05-22
CVE-2023-31454 Apache InLong: IDOR make users can bind any cluster — Apache InLongCWE-732 9.8 -2023-05-22
CVE-2023-31058 Apache InLong: JDBC URL bypassing by adding blanks — Apache InLongCWE-502 9.8 -2023-05-22
CVE-2023-28709 Apache Tomcat: Fix for CVE-2023-24998 is incomplete — Apache TomcatCWE-193 7.5 -2023-05-22
CVE-2022-47937 Multiple parsing problems in the Apache Sling Commons JSON module — org.apache.sling.commons.jsonCWE-20 9.1 -2023-05-15
CVE-2023-28936 Apache OpenMeetings: insufficient check of invitation hash — Apache OpenMeetingsCWE-697 7.5 -2023-05-12

This page lists every published CVE security advisory associated with Apache Software Foundation. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.