<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <title>CVE security reports on </title>
    <link>/sicsdocs/releases/21.2/cve_security_reports/</link>
    <description>Recent content in CVE security reports on </description>
    <generator>Hugo -- gohugo.io</generator><atom:link href="/sicsdocs/releases/21.2/cve_security_reports/index.xml" rel="self" type="application/rss+xml" />
    <item>
      <title>CVE Security Report - SICS ADH Server</title>
      <link>/sicsdocs/releases/21.2/cve_security_reports/sics_adh_server/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      
      <guid>/sicsdocs/releases/21.2/cve_security_reports/sics_adh_server/</guid>
      <description>The report contains data retrieved from the National Vulnerability Database: https://nvd.nist.gov, NPM Public Advisories: https://www.npmjs.com/advisories, and the RetireJS community.NameDescriptionCWECVSS v2.0 SeverityCVSS v3.0 SeverityDependencyCVE-2012-5783Apache Commons HttpClient 3.x, as used in Amazon Flexible Payments Service (FPS) merchant Java SDK and other products, does not verify that the server hostname matches a domain name in the subject&amp;#39;s Common Name (CN) or subjectAltName field of the X.</description>
    </item>
    
    <item>
      <title>CVE Security Report - SICS API Server</title>
      <link>/sicsdocs/releases/21.2/cve_security_reports/sics_api_server/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      
      <guid>/sicsdocs/releases/21.2/cve_security_reports/sics_api_server/</guid>
      <description>The report contains data retrieved from the National Vulnerability Database: https://nvd.nist.gov, NPM Public Advisories: https://www.npmjs.com/advisories, and the RetireJS community.NameDescriptionCWECVSS v2.0 SeverityCVSS v3.0 SeverityDependencyCVE-2012-5783Apache Commons HttpClient 3.x, as used in Amazon Flexible Payments Service (FPS) merchant Java SDK and other products, does not verify that the server hostname matches a domain name in the subject&amp;#39;s Common Name (CN) or subjectAltName field of the X.</description>
    </item>
    
    <item>
      <title>CVE Security Report - SICS Batch Server</title>
      <link>/sicsdocs/releases/21.2/cve_security_reports/sics_batch_server/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      
      <guid>/sicsdocs/releases/21.2/cve_security_reports/sics_batch_server/</guid>
      <description>The report contains data retrieved from the National Vulnerability Database: https://nvd.nist.gov, NPM Public Advisories: https://www.npmjs.com/advisories, and the RetireJS community.NameDescriptionCWECVSS v2.0 SeverityCVSS v3.0 SeverityDependencyCVE-2012-5783Apache Commons HttpClient 3.x, as used in Amazon Flexible Payments Service (FPS) merchant Java SDK and other products, does not verify that the server hostname matches a domain name in the subject&amp;#39;s Common Name (CN) or subjectAltName field of the X.</description>
    </item>
    
    <item>
      <title>CVE Security Report - SICS Desktop App</title>
      <link>/sicsdocs/releases/21.2/cve_security_reports/sics_desktop_app/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      
      <guid>/sicsdocs/releases/21.2/cve_security_reports/sics_desktop_app/</guid>
      <description>The report contains data retrieved from the National Vulnerability Database: https://nvd.nist.gov, NPM Public Advisories: https://www.npmjs.com/advisories, and the RetireJS community.NameDescriptionCWECVSS v2.0 SeverityCVSS v3.0 SeverityDependencyCVE-2012-5783Apache Commons HttpClient 3.x, as used in Amazon Flexible Payments Service (FPS) merchant Java SDK and other products, does not verify that the server hostname matches a domain name in the subject&amp;#39;s Common Name (CN) or subjectAltName field of the X.</description>
    </item>
    
    <item>
      <title>CVE Security Report - SICS eMessaging Server</title>
      <link>/sicsdocs/releases/21.2/cve_security_reports/sics_emessaging_server/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      
      <guid>/sicsdocs/releases/21.2/cve_security_reports/sics_emessaging_server/</guid>
      <description>The report contains data retrieved from the National Vulnerability Database: https://nvd.nist.gov, NPM Public Advisories: https://www.npmjs.com/advisories, and the RetireJS community.NameDescriptionCWECVSS v2.0 SeverityCVSS v3.0 SeverityDependencyCVE-2012-5783Apache Commons HttpClient 3.x, as used in Amazon Flexible Payments Service (FPS) merchant Java SDK and other products, does not verify that the server hostname matches a domain name in the subject&amp;#39;s Common Name (CN) or subjectAltName field of the X.</description>
    </item>
    
    <item>
      <title>CVE Security Report - SICS Java Launcher</title>
      <link>/sicsdocs/releases/21.2/cve_security_reports/sics_java_launcher/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      
      <guid>/sicsdocs/releases/21.2/cve_security_reports/sics_java_launcher/</guid>
      <description>The report contains data retrieved from the National Vulnerability Database: https://nvd.nist.gov, NPM Public Advisories: https://www.npmjs.com/advisories, and the RetireJS community.No vulnerable dependencies found.This report was generated 22.06.2021, 14:04:35 UTC, using dependency-check version: 6.0.3.</description>
    </item>
    
    <item>
      <title>CVE Security Report - SICS Naming Service</title>
      <link>/sicsdocs/releases/21.2/cve_security_reports/sics_naming_service/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      
      <guid>/sicsdocs/releases/21.2/cve_security_reports/sics_naming_service/</guid>
      <description>The report contains data retrieved from the National Vulnerability Database: https://nvd.nist.gov, NPM Public Advisories: https://www.npmjs.com/advisories, and the RetireJS community.NameDescriptionCWECVSS v2.0 SeverityCVSS v3.0 SeverityDependencyCVE-2020-29242dhowden tag before 2020-11-19 allows &amp;#39;panic: runtime error: index out of range&amp;#39; via readPICFrame.CWE-129MEDIUMMEDIUMjakarta.servlet.jsp.jstl-1.2.6.jarCVE-2020-29243dhowden tag before 2020-11-19 allows &amp;#39;panic: runtime error: index out of range&amp;#39; via readAPICFrame.CWE-129MEDIUMMEDIUMjakarta.servlet.jsp.jstl-1.2.6.jarCVE-2020-29244dhowden tag before 2020-11-19 allows &amp;#39;panic: runtime error: slice bounds out of range&amp;#39; via readTextWithDescrFrame.</description>
    </item>
    
    <item>
      <title>CVE Security Report - SICS Operational Reporting Server</title>
      <link>/sicsdocs/releases/21.2/cve_security_reports/sics_operational_reporting_server/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      
      <guid>/sicsdocs/releases/21.2/cve_security_reports/sics_operational_reporting_server/</guid>
      <description>The report contains data retrieved from the National Vulnerability Database: https://nvd.nist.gov, NPM Public Advisories: https://www.npmjs.com/advisories, and the RetireJS community.NameDescriptionCWECVSS v2.0 SeverityCVSS v3.0 SeverityDependency1704In `chart.js` before version 2.9.4 the options parameter is not properly sanitized when it is processed. When the options are processed, the existing options (or the defaults options) are deeply merged with provided options. However, during this operation, the keys of the object being set are not checked, leading to a prototype pollution.</description>
    </item>
    
    <item>
      <title>CVE Security Report - SICS Operational Reporting SolrNode</title>
      <link>/sicsdocs/releases/21.2/cve_security_reports/sics_operational_reporting_solr_node/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      
      <guid>/sicsdocs/releases/21.2/cve_security_reports/sics_operational_reporting_solr_node/</guid>
      <description>The report contains data retrieved from the National Vulnerability Database: https://nvd.nist.gov, NPM Public Advisories: https://www.npmjs.com/advisories, and the RetireJS community.NameDescriptionCWECVSS v2.0 SeverityCVSS v3.0 SeverityDependencyCVE-2020-7676angular.js prior to 1.8.0 allows cross site scripting. The regex-based input HTML replacement may turn sanitized code into unsanitized one. Wrapping &amp;#39;&amp;lt;option&amp;gt;&amp;#39; elements in &amp;#39;&amp;lt;select&amp;gt;&amp;#39; ones changes parsing behavior, leading to possibly unsanitizing code.CWE-79LOWMEDIUMangular-cookies.min.jsCVE-2020-7676angular.</description>
    </item>
    
    <item>
      <title>CVE Security Report - SICS Search Server</title>
      <link>/sicsdocs/releases/21.2/cve_security_reports/sics_search_server/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      
      <guid>/sicsdocs/releases/21.2/cve_security_reports/sics_search_server/</guid>
      <description>The report contains data retrieved from the National Vulnerability Database: https://nvd.nist.gov, NPM Public Advisories: https://www.npmjs.com/advisories, and the RetireJS community.NameDescriptionCWECVSS v2.0 SeverityCVSS v3.0 SeverityDependencyCVE-2020-27223In Eclipse Jetty 9.4.6.v20170531 to 9.4.36.v20210114 (inclusive), 10.0.0, and 11.0.0 when Jetty handles a request containing multiple Accept headers with a large number of “quality” (i.e. q) parameters, the server may enter a denial of service (DoS) state due to high CPU usage processing those quality values, resulting in minutes of CPU time exhausted processing those quality values.</description>
    </item>
    
    <item>
      <title>CVE Security Report - SICS Search Solr-node</title>
      <link>/sicsdocs/releases/21.2/cve_security_reports/sics_search_solr_node/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      
      <guid>/sicsdocs/releases/21.2/cve_security_reports/sics_search_solr_node/</guid>
      <description>The report contains data retrieved from the National Vulnerability Database: https://nvd.nist.gov, NPM Public Advisories: https://www.npmjs.com/advisories, and the RetireJS community.NameDescriptionCWECVSS v2.0 SeverityCVSS v3.0 SeverityDependencyCVE-2020-7676angular.js prior to 1.8.0 allows cross site scripting. The regex-based input HTML replacement may turn sanitized code into unsanitized one. Wrapping &amp;#39;&amp;lt;option&amp;gt;&amp;#39; elements in &amp;#39;&amp;lt;select&amp;gt;&amp;#39; ones changes parsing behavior, leading to possibly unsanitizing code.CWE-79LOWMEDIUMangular-cookies.min.jsCVE-2020-7676angular.</description>
    </item>
    
    <item>
      <title>CVE Security Report - SICS Docs</title>
      <link>/sicsdocs/releases/21.2/cve_security_reports/sics_docs/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      
      <guid>/sicsdocs/releases/21.2/cve_security_reports/sics_docs/</guid>
      <description>The report contains data retrieved from the National Vulnerability Database: https://nvd.nist.gov, NPM Public Advisories: https://www.npmjs.com/advisories, and the RetireJS community.No vulnerable dependencies found.This report was generated 22.06.2021, 14:07:19 UTC, using dependency-check version: 6.0.3.</description>
    </item>
    
  </channel>
</rss>
