|
56 | 56 | <guid>/docs/alerts/90025/</guid> |
57 | 57 | <description><p>The software constructs all or part of an expression language (EL) statement in a Java Server Page (JSP) using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended EL statement before it is executed. In certain versions of Spring 3.0.5 and earlier, there was a vulnerability (CVE-2011-2730) in which Expression Language tags would be evaluated twice, which effectively exposed any application to EL injection. However, even for later versions, this weakness is still possible depending on configuration.</p></description> |
58 | 58 | </item> |
| 59 | + <item> |
| 60 | + <title>LDAP Injection</title> |
| 61 | + <link>/docs/alerts/40015/</link> |
| 62 | + <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate> |
| 63 | + <guid>/docs/alerts/40015/</guid> |
| 64 | + <description><p>LDAP Injection may be possible. It may be possible for an attacker to bypass authentication controls, and to view and modify arbitrary data in the LDAP directory.</p></description> |
| 65 | + </item> |
59 | 66 | <item> |
60 | 67 | <title>Log4Shell (CVE-2021-44228)</title> |
61 | 68 | <link>/docs/alerts/40043-1/</link> |
|
70 | 77 | <guid>/docs/alerts/40043-2/</guid> |
71 | 78 | <description><p>It was found that the fix to address CVE-2021-44228 in Apache Log4j 2.15.0 was incomplete in certain non-default configurations. This could allow attackers to craft malicious input data using a JNDI Lookup pattern resulting in an information leak and remote code execution in some environments.</p></description> |
72 | 79 | </item> |
| 80 | + <item> |
| 81 | + <title>NoSQL Injection - MongoDB</title> |
| 82 | + <link>/docs/alerts/40033/</link> |
| 83 | + <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate> |
| 84 | + <guid>/docs/alerts/40033/</guid> |
| 85 | + <description><p>MongoDB query injection may be possible.</p></description> |
| 86 | + </item> |
| 87 | + <item> |
| 88 | + <title>NoSQL Injection - MongoDB (Time Based)</title> |
| 89 | + <link>/docs/alerts/90039/</link> |
| 90 | + <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate> |
| 91 | + <guid>/docs/alerts/90039/</guid> |
| 92 | + <description><p>MongoDB query injection may be possible.</p></description> |
| 93 | + </item> |
73 | 94 | <item> |
74 | 95 | <title>Out of Band XSS</title> |
75 | 96 | <link>/docs/alerts/40031/</link> |
|
210 | 231 | <guid>/docs/alerts/40047/</guid> |
211 | 232 | <description><p>Apache Commons Text prior to 1.10.0 allows RCE when applied to untrusted input due to insecure interpolation defaults.Apache Commons Text performs variable interpolation, allowing properties to be dynamically evaluated and expanded.The application has been shown to initial contact with remote servers via variable interpolation and may well be vulnerable to Remote Code Execution (RCE).</p></description> |
212 | 233 | </item> |
| 234 | + <item> |
| 235 | + <title>Web Cache Deception</title> |
| 236 | + <link>/docs/alerts/40039/</link> |
| 237 | + <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate> |
| 238 | + <guid>/docs/alerts/40039/</guid> |
| 239 | + <description><p>Web cache deception may be possible. It may be possible for unauthorised user to view sensitive data on this page.</p></description> |
| 240 | + </item> |
213 | 241 | <item> |
214 | 242 | <title>XML External Entity Attack</title> |
215 | 243 | <link>/docs/alerts/90023/</link> |
|
0 commit comments