
From Apache Calcite Avatica 1.22.0 onwards, it will be verified that the class implements the expected interface before invoking its constructor. To exploit the vulnerability: 1) the attacker needs to have privileges to control JDBC connection parameters 2) and there should be a vulnerable class (constructor with URL parameter and ability to execute code) in the classpath. A remote code execution vulnerability may allow an unauthenticated attacker (with network access to the admin interface) to disrupt system availability or potentially compromise the confidentiality and integrity of the system.Īpache Calcite Avatica JDBC driver creates HTTP client instances based on class names provided via `httpclient_impl` connection property however, the driver does not verify if the class implements the expected interface before instantiating it, which can lead to code execution loaded via arbitrary classes and in rare cases remote code execution. Obsidian 0.14.x and 0.15.x before 0.15.5 allows obsidian://hook-get-address remote code execution because window.open is used without checking the URL.Īn issue was discovered in Atos Unify OpenScape SBC 9 and 10 before 10R2.2.1, Atos Unify OpenScape Branch 9 and 10 before version 10R2.1.1, and Atos Unify OpenScape BCF 10 before 10R9.12.1. The affected versions are before version 8.13.19, from version 8.14.0 before 8.20.7, and from version 8.21.0 before 8.22.1.

In this case the security improvement was to protect against using the XStream library to be able to execute arbitrary code in velocity templates. Affected versions of Atlassian Jira Server and Data Center allowed remote attackers with system administrator permissions to execute arbitrary code via Template Injection leading to Remote Code Execution (RCE) in the Email Templates feature. This issue exists to document that a security improvement in the way that Jira Server and Data Center use templates has been implemented.

This would allow the attacker to execute code within the context of the victim's browser. It is possible for a remote attacker to inject arbitrary JavaScript into a WS_FTP administrator's web session. In Progress WS_FTP Server prior to version 8.7.3, multiple reflected cross-site scripting (XSS) vulnerabilities exist in the administrative web interface.

User interaction is not needed for exploitation. This could lead to Remote Code Execution or Information Disclosure by sending crafted BGP packets.

In bgp_notify_send_with_data() and bgp_process_packet() in bgp_packet.c, there is a possible use-after-free due to a race condition. An issue was discovered in bgpd in FRRouting (FRR) 8.3.
