Lucene search

K
ApacheMyfaces

5 matches found

CVE
CVE
added 2021/02/19 9:15 a.m.108 views

CVE-2021-26296

In the default configuration, Apache MyFaces Core versions 2.2.0 to 2.2.13, 2.3.0 to 2.3.7, 2.3-next-M1 to 2.3-next-M4, and 3.0.0-RC1 use cryptographically weak implicit and explicit cross-site request forgery (CSRF) tokens. Due to that limitation, it is possible (although difficult) for an attacke...

7.5CVSS7.6AI score0.00801EPSS
CVE
CVE
added 2017/08/08 9:29 p.m.78 views

CVE-2011-4343

Information disclosure vulnerability in Apache MyFaces Core 2.0.1 through 2.0.10 and 2.1.0 through 2.1.4 allows remote attackers to inject EL expressions via crafted parameters.

7.5CVSS7.2AI score0.00408EPSS
CVE
CVE
added 2010/05/27 7:0 p.m.73 views

CVE-2010-2086

Apache MyFaces 1.1.7 and 1.2.8, as used in IBM WebSphere Application Server and other applications, does not properly handle an unencrypted view state, which allows remote attackers to conduct cross-site scripting (XSS) attacks or execute arbitrary Expression Language (EL) statements via vectors th...

4CVSS6AI score0.01299EPSS
CVE
CVE
added 2014/06/19 2:55 p.m.69 views

CVE-2011-4367

Multiple directory traversal vulnerabilities in MyFaces JavaServer Faces (JSF) in Apache MyFaces Core 2.0.x before 2.0.12 and 2.1.x before 2.1.6 allow remote attackers to read arbitrary files via a .. (dot dot) in the (1) ln parameter to faces/javax.faces.resource/web.xml or (2) the PATH_INFO to fa...

5CVSS6.8AI score0.86318EPSS
CVE
CVE
added 2010/10/20 6:0 p.m.66 views

CVE-2010-2057

shared/util/StateUtils.java in Apache MyFaces 1.1.x before 1.1.8, 1.2.x before 1.2.9, and 2.0.x before 2.0.1 uses an encrypted View State without a Message Authentication Code (MAC), which makes it easier for remote attackers to perform successful modifications of the View State via a padding oracl...

5CVSS6.8AI score0.00603EPSS