
CVE-2024-31864 – Apache Zeppelin: Remote code execution by adding malicious JDBC connection string
https://notcve.org/view.php?id=CVE-2024-31864
09 Apr 2024 — Improper Control of Generation of Code ('Code Injection') vulnerability in Apache Zeppelin. The attacker can inject sensitive configuration or malicious code when connecting MySQL database via JDBC driver. This issue affects Apache Zeppelin: before 0.11.1. Users are recommended to upgrade to version 0.11.1, which fixes the issue. Vulnerabilidad de control inadecuado de generación de código ("inyección de código") en Apache Zeppelin. El atacante puede inyectar configuración confidencial o código malicioso al... • http://www.openwall.com/lists/oss-security/2024/04/09/8 • CWE-94: Improper Control of Generation of Code ('Code Injection') •

CVE-2024-31863 – Apache Zeppelin: Replacing other users notebook, bypassing any permissions
https://notcve.org/view.php?id=CVE-2024-31863
09 Apr 2024 — Authentication Bypass by Spoofing vulnerability by replacing to exsiting notes in Apache Zeppelin.This issue affects Apache Zeppelin: from 0.10.1 before 0.11.0. Users are recommended to upgrade to version 0.11.0, which fixes the issue. Vulnerabilidad de omisión de autenticación mediante suplantación de identidad al reemplazar notas existentes en Apache Zeppelin. Este problema afecta a Apache Zeppelin: desde 0.10.1 antes de 0.11.0. Se recomienda a los usuarios actualizar a la versión 0.11.0, que soluciona el... • http://www.openwall.com/lists/oss-security/2024/04/09/6 • CWE-290: Authentication Bypass by Spoofing •

CVE-2024-31862 – Apache Zeppelin: Denial of service with invalid notebook name
https://notcve.org/view.php?id=CVE-2024-31862
09 Apr 2024 — Improper Input Validation vulnerability in Apache Zeppelin when creating a new note from Zeppelin's UI.This issue affects Apache Zeppelin: from 0.10.1 before 0.11.0. Users are recommended to upgrade to version 0.11.0, which fixes the issue. Vulnerabilidad de validación de entrada incorrecta en Apache Zeppelin al crear una nueva nota desde la interfaz de usuario de Zeppelin. Este problema afecta a Apache Zeppelin: desde 0.10.1 antes de 0.11.0. Se recomienda a los usuarios actualizar a la versión 0.11.0, que ... • http://www.openwall.com/lists/oss-security/2024/04/09/5 • CWE-20: Improper Input Validation •

CVE-2022-47894 – Apache Zeppelin SAP: connecting to a malicious SAP server allowed it to perform XXE
https://notcve.org/view.php?id=CVE-2022-47894
09 Apr 2024 — Improper Input Validation vulnerability in Apache Zeppelin SAP.This issue affects Apache Zeppelin SAP: from 0.8.0 before 0.11.0. As this project is retired, we do not plan to release a version that fixes this issue. Users are recommended to find an alternative or restrict access to the instance to trusted users. For more information, the fix already was merged in the source code but Zeppelin decided to retire the SAP component NOTE: This vulnerability only affects products that are no longer supported by th... • http://www.openwall.com/lists/oss-security/2024/04/09/4 • CWE-20: Improper Input Validation •

CVE-2021-28656 – Apache Zeppelin: CSRF vulnerability in the Credentials page
https://notcve.org/view.php?id=CVE-2021-28656
09 Apr 2024 — Cross-Site Request Forgery (CSRF) vulnerability in Credential page of Apache Zeppelin allows an attacker to submit malicious request. This issue affects Apache Zeppelin Apache Zeppelin version 0.9.0 and prior versions. La vulnerabilidad de Cross-Site Request Forgery (CSRF) en la página de credenciales de Apache Zeppelin permite a un atacante enviar solicitudes maliciosas. Este problema afecta a Apache Zeppelin Apache Zeppelin versión 0.9.0 y versiones anteriores. • http://www.openwall.com/lists/oss-security/2024/04/09/3 • CWE-352: Cross-Site Request Forgery (CSRF) •

CVE-2024-31860 – Apache Zeppelin: Path traversal vulnerability
https://notcve.org/view.php?id=CVE-2024-31860
09 Apr 2024 — Improper Input Validation vulnerability in Apache Zeppelin. By adding relative path indicators(E.g ..), attackers can see the contents for any files in the filesystem that the server account can access. This issue affects Apache Zeppelin: from 0.9.0 before 0.11.0. Users are recommended to upgrade to version 0.11.0, which fixes the issue. Vulnerabilidad de validación de entrada incorrecta en Apache Zeppelin. • http://www.openwall.com/lists/oss-security/2024/04/09/2 • CWE-20: Improper Input Validation •

CVE-2024-24746 – Apache NimBLE: Denial of service in NimBLE Bluetooth stack
https://notcve.org/view.php?id=CVE-2024-24746
06 Apr 2024 — Loop with Unreachable Exit Condition ('Infinite Loop') vulnerability in Apache NimBLE. Specially crafted GATT operation can cause infinite loop in GATT server leading to denial of service in Bluetooth stack or device. This issue affects Apache NimBLE: through 1.6.0. Users are recommended to upgrade to version 1.7.0, which fixes the issue. Bucle con vulnerabilidad de condición de salida inalcanzable ("bucle infinito") en Apache NimBLE. La operación GATT especialmente manipulada puede causar un bucle infinito... • http://www.openwall.com/lists/oss-security/2024/04/05/2 • CWE-835: Loop with Unreachable Exit Condition ('Infinite Loop') •

CVE-2024-24795 – Apache HTTP Server: HTTP Response Splitting in multiple modules
https://notcve.org/view.php?id=CVE-2024-24795
04 Apr 2024 — HTTP Response splitting in multiple modules in Apache HTTP Server allows an attacker that can inject malicious response headers into backend applications to cause an HTTP desynchronization attack. Users are recommended to upgrade to version 2.4.59, which fixes this issue. La división de la respuesta HTTP en varios módulos en el servidor HTTP Apache permite que un atacante pueda inyectar encabezados de respuesta maliciosos en aplicaciones backend para provocar un ataque de desincronización HTTP. Se recomiend... • http://www.openwall.com/lists/oss-security/2024/04/04/5 • CWE-113: Improper Neutralization of CRLF Sequences in HTTP Headers ('HTTP Request/Response Splitting') CWE-444: Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling') •

CVE-2023-38709 – Apache HTTP Server: HTTP response splitting
https://notcve.org/view.php?id=CVE-2023-38709
04 Apr 2024 — Faulty input validation in the core of Apache allows malicious or exploitable backend/content generators to split HTTP responses. This issue affects Apache HTTP Server: through 2.4.58. La validación de entrada defectuosa en el núcleo de Apache permite que generadores de contenido/backend maliciosos o explotables dividan las respuestas HTTP. Este problema afecta al servidor HTTP Apache: hasta 2.4.58. A flaw was found in httpd. • https://github.com/mrmtwoj/apache-vulnerability-testing • CWE-113: Improper Neutralization of CRLF Sequences in HTTP Headers ('HTTP Request/Response Splitting') CWE-1284: Improper Validation of Specified Quantity in Input •

CVE-2024-29008 – Apache CloudStack: The extraconfig feature can be abused to load hypervisor resources on a VM instance
https://notcve.org/view.php?id=CVE-2024-29008
04 Apr 2024 — A problem has been identified in the CloudStack additional VM configuration (extraconfig) feature which can be misused by anyone who has privilege to deploy a VM instance or configure settings of an already deployed VM instance, to configure additional VM configuration even when the feature is not explicitly enabled by the administrator. In a KVM based CloudStack environment, an attacker can exploit this issue to attach host devices such as storage disks, and PCI and USB devices such as network adapters and... • https://lists.apache.org/thread/82f46pv7mvh95ybto5hn8wlo6g8jhjvp • CWE-20: Improper Input Validation •