<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <title>CVE security reports on </title>
    <link>/sicsdocs/releases/21.4/cve_security_reports/</link>
    <description>Recent content in CVE security reports on </description>
    <generator>Hugo -- gohugo.io</generator><atom:link href="/sicsdocs/releases/21.4/cve_security_reports/index.xml" rel="self" type="application/rss+xml" />
    <item>
      <title>CVE Security Report - SICS ADH Server</title>
      <link>/sicsdocs/releases/21.4/cve_security_reports/sics_adh_server/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      
      <guid>/sicsdocs/releases/21.4/cve_security_reports/sics_adh_server/</guid>
      <description>The report contains data retrieved from the National Vulnerability Database: https://nvd.nist.gov, NPM Public Advisories: https://www.npmjs.com/advisories, and the RetireJS community.NameDescriptionCWECVSS v2.0 SeverityCVSS v3.0 SeverityDependencyCVE-2021-35515When reading a specially crafted 7Z archive, the construction of the list of codecs that decompress an entry can result in an infinite loop. This could be used to mount a denial of service attack against services that use Compress&amp;#39; sevenz package.</description>
    </item>
    
    <item>
      <title>CVE Security Report - SICS API Server</title>
      <link>/sicsdocs/releases/21.4/cve_security_reports/sics_api_server/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      
      <guid>/sicsdocs/releases/21.4/cve_security_reports/sics_api_server/</guid>
      <description>The report contains data retrieved from the National Vulnerability Database: https://nvd.nist.gov, NPM Public Advisories: https://www.npmjs.com/advisories, and the RetireJS community.NameDescriptionCWECVSS v2.0 SeverityCVSS v3.0 SeverityDependencyCVE-2021-35515When reading a specially crafted 7Z archive, the construction of the list of codecs that decompress an entry can result in an infinite loop. This could be used to mount a denial of service attack against services that use Compress&amp;#39; sevenz package.</description>
    </item>
    
    <item>
      <title>CVE Security Report - SICS Batch Server</title>
      <link>/sicsdocs/releases/21.4/cve_security_reports/sics_batch_server/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      
      <guid>/sicsdocs/releases/21.4/cve_security_reports/sics_batch_server/</guid>
      <description>The report contains data retrieved from the National Vulnerability Database: https://nvd.nist.gov, NPM Public Advisories: https://www.npmjs.com/advisories, and the RetireJS community.NameDescriptionCWECVSS v2.0 SeverityCVSS v3.0 SeverityDependencyCVE-2021-35515When reading a specially crafted 7Z archive, the construction of the list of codecs that decompress an entry can result in an infinite loop. This could be used to mount a denial of service attack against services that use Compress&amp;#39; sevenz package.</description>
    </item>
    
    <item>
      <title>CVE Security Report - SICS Desktop App</title>
      <link>/sicsdocs/releases/21.4/cve_security_reports/sics_desktop_app/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      
      <guid>/sicsdocs/releases/21.4/cve_security_reports/sics_desktop_app/</guid>
      <description>The report contains data retrieved from the National Vulnerability Database: https://nvd.nist.gov, NPM Public Advisories: https://www.npmjs.com/advisories, and the RetireJS community.NameDescriptionCWECVSS v2.0 SeverityCVSS v3.0 SeverityDependencyCVE-2021-35515When reading a specially crafted 7Z archive, the construction of the list of codecs that decompress an entry can result in an infinite loop. This could be used to mount a denial of service attack against services that use Compress&amp;#39; sevenz package.</description>
    </item>
    
    <item>
      <title>CVE Security Report - SICS eMessaging Server</title>
      <link>/sicsdocs/releases/21.4/cve_security_reports/sics_emessaging_server/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      
      <guid>/sicsdocs/releases/21.4/cve_security_reports/sics_emessaging_server/</guid>
      <description>The report contains data retrieved from the National Vulnerability Database: https://nvd.nist.gov, NPM Public Advisories: https://www.npmjs.com/advisories, and the RetireJS community.NameDescriptionCWECVSS v2.0 SeverityCVSS v3.0 SeverityDependencyCVE-2021-35515When reading a specially crafted 7Z archive, the construction of the list of codecs that decompress an entry can result in an infinite loop. This could be used to mount a denial of service attack against services that use Compress&amp;#39; sevenz package.</description>
    </item>
    
    <item>
      <title>CVE Security Report - SICS Java Launcher</title>
      <link>/sicsdocs/releases/21.4/cve_security_reports/sics_java_launcher/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      
      <guid>/sicsdocs/releases/21.4/cve_security_reports/sics_java_launcher/</guid>
      <description>The report contains data retrieved from the National Vulnerability Database: https://nvd.nist.gov, NPM Public Advisories: https://www.npmjs.com/advisories, and the RetireJS community.No vulnerable dependencies found.This report was generated 16.12.2021, 20:59:17 UTC, using dependency-check version: 6.5.0.</description>
    </item>
    
    <item>
      <title>CVE Security Report - SICS Naming Service</title>
      <link>/sicsdocs/releases/21.4/cve_security_reports/sics_naming_service/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      
      <guid>/sicsdocs/releases/21.4/cve_security_reports/sics_naming_service/</guid>
      <description>The report contains data retrieved from the National Vulnerability Database: https://nvd.nist.gov, NPM Public Advisories: https://www.npmjs.com/advisories, and the RetireJS community.NameDescriptionCWECVSS v2.0 SeverityCVSS v3.0 SeverityDependencyCVE-2021-28170In the Jakarta Expression Language implementation 3.0.3 and earlier, a bug in the ELParserTokenManager enables invalid EL expressions to be evaluated as if they were valid.CWE-20MEDIUMMEDIUMjakarta.el-api-3.0.2.jarThis report was generated 16.12.2021, 20:59:33 UTC, using dependency-check version: 6.</description>
    </item>
    
    <item>
      <title>CVE Security Report - SICS Operational Reporting Server</title>
      <link>/sicsdocs/releases/21.4/cve_security_reports/sics_operational_reporting_server/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      
      <guid>/sicsdocs/releases/21.4/cve_security_reports/sics_operational_reporting_server/</guid>
      <description>The report contains data retrieved from the National Vulnerability Database: https://nvd.nist.gov, NPM Public Advisories: https://www.npmjs.com/advisories, and the RetireJS community.NameDescriptionCWECVSS v2.0 SeverityCVSS v3.0 SeverityDependency1005299This affects the package chart.js before 2.9.4. The options parameter is not properly sanitized when it is processed. When the options are processed, the existing options (or the defaults options) are deeply merged with provided options. However, during this operation, the keys of the object being set are not checked, leading to a prototype pollution.</description>
    </item>
    
    <item>
      <title>CVE Security Report - SICS Operational Reporting SolrNode</title>
      <link>/sicsdocs/releases/21.4/cve_security_reports/sics_operational_reporting_solr_node/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      
      <guid>/sicsdocs/releases/21.4/cve_security_reports/sics_operational_reporting_solr_node/</guid>
      <description>The report contains data retrieved from the National Vulnerability Database: https://nvd.nist.gov, NPM Public Advisories: https://www.npmjs.com/advisories, and the RetireJS community.NameDescriptionCWECVSS v2.0 SeverityCVSS v3.0 SeverityDependencyCVE-2020-13955HttpUtils#getURLConnection method disables explicitly hostname verification for HTTPS connections making clients vulnerable to man-in-the-middle attacks. Calcite uses internally this method to connect with Druid and Splunk so information leakage may happen when using the respective Calcite adapters. The method itself is in a utility class so people may use it to create vulnerable HTTPS connections for other applications.</description>
    </item>
    
    <item>
      <title>CVE Security Report - SICS Search Server</title>
      <link>/sicsdocs/releases/21.4/cve_security_reports/sics_search_server/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      
      <guid>/sicsdocs/releases/21.4/cve_security_reports/sics_search_server/</guid>
      <description>The report contains data retrieved from the National Vulnerability Database: https://nvd.nist.gov, NPM Public Advisories: https://www.npmjs.com/advisories, and the RetireJS community.NameDescriptionCWECVSS v2.0 SeverityCVSS v3.0 SeverityDependencyCVE-2020-13956Apache HttpClient versions prior to version 4.5.13 and 5.0.3 can misinterpret malformed authority component in request URIs passed to the library as java.net.URI object and pick the wrong target host for request execution.NVD-CWE-noinfoMEDIUMMEDIUMhttpclient-4.5.12.jarCVE-2021-21290Netty is an open-source, asynchronous event-driven network application framework for rapid development of maintainable high performance protocol servers &amp;amp; clients.</description>
    </item>
    
    <item>
      <title>CVE Security Report - SICS Search Solr-node</title>
      <link>/sicsdocs/releases/21.4/cve_security_reports/sics_search_solr_node/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      
      <guid>/sicsdocs/releases/21.4/cve_security_reports/sics_search_solr_node/</guid>
      <description>The report contains data retrieved from the National Vulnerability Database: https://nvd.nist.gov, NPM Public Advisories: https://www.npmjs.com/advisories, and the RetireJS community.NameDescriptionCWECVSS v2.0 SeverityCVSS v3.0 SeverityDependencyCVE-2020-13955HttpUtils#getURLConnection method disables explicitly hostname verification for HTTPS connections making clients vulnerable to man-in-the-middle attacks. Calcite uses internally this method to connect with Druid and Splunk so information leakage may happen when using the respective Calcite adapters. The method itself is in a utility class so people may use it to create vulnerable HTTPS connections for other applications.</description>
    </item>
    
    <item>
      <title>CVE Security Report - SICS Docs</title>
      <link>/sicsdocs/releases/21.4/cve_security_reports/sics_docs/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      
      <guid>/sicsdocs/releases/21.4/cve_security_reports/sics_docs/</guid>
      <description>The report contains data retrieved from the National Vulnerability Database: https://nvd.nist.gov, NPM Public Advisories: https://www.npmjs.com/advisories, and the RetireJS community.No vulnerable dependencies found.This report was generated 16.12.2021, 21:02:01 UTC, using dependency-check version: 6.5.0.</description>
    </item>
    
  </channel>
</rss>
