
This issue affects Apache XML Graphics prior to 1.16.

Update to Apache Commons BCEL 6.6.0.Ī vulnerability in Batik of Apache XML Graphics allows an attacker to run Java code from untrusted SVG via JavaScript. This could be abused in applications that pass attacker-controllable data to those APIs, giving the attacker more control over the resulting bytecode than otherwise expected. However, due to an out-of-bounds writing issue, these APIs can be used to produce arbitrary bytecode. Users should upgrade to 0.13.3 which addresses this issue or use a later version of Java to avoid it.Īn improper neutralization of input during web page generation ('Cross-site Scripting') vulnerability in Sling App CMS version 1.1.0 and prior may allow an authenticated remote attacker to perform a reflected cross site scripting (XSS) attack in the taxonomy management feature.Īpache Commons BCEL has a number of APIs that would normally only allow changing specific class characteristics.

In Apache Airflow versions prior to 2.4.2, the "Trigger DAG with config" screen was susceptible to XSS attacks via the `origin` query argument.Īpache IoTDB version 0.12.2 to 0.12.6, 0.13.0 to 0.13.2 are vulnerable to a Denial of Service attack when accepting untrusted patterns for REGEXP queries with Java 8. In Apache Airflow versions prior to 2.4.2, there was an open redirect in the webserver's `/confirm` endpoint.
