cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,exploited_date,poc,trended,trended_no_1,trended_no_1_date,published,trended_score CVE-2024-53299,https://securityvulnerability.io/vulnerability/CVE-2024-53299,Denial of Service Vulnerability in Apache Wicket by Apache,"A flaw in the request handling of Apache Wicket 7.0.0 across all platforms enables malicious actors to exploit server resources, potentially leading to service interruptions. Users are strongly advised to upgrade to the patched versions 9.19.0 or 10.3.0 to ensure protection against such exploitation.",Apache,Apache Wicket,6.5,MEDIUM,0.0004299999854993075,false,,false,false,false,,false,false,false,,2025-01-23T08:37:05.687Z,0 CVE-2024-36522,https://securityvulnerability.io/vulnerability/CVE-2024-36522,Apache Wicket: Remote code execution via XSLT injection,"The default configuration of XSLTResourceStream.java is vulnerable to remote code execution via XSLT injection when processing input from an untrusted source without validation. Users are recommended to upgrade to versions 10.1.0, 9.18.0 or 8.16.0, which fix this issue.",Apache,Apache Wicket,,,0.0004299999854993075,false,,false,false,false,,,false,false,,2024-07-12T12:13:51.884Z,0 CVE-2024-27439,https://securityvulnerability.io/vulnerability/CVE-2024-27439,Bypass of CSRF Protection in Apache Wicket Due to Error in Evaluation of Fetch Metadata Headers,"An error in the evaluation of the fetch metadata headers could allow a bypass of the CSRF protection in Apache Wicket. This issue affects Apache Wicket: from 9.1.0 through 9.16.0, and the milestone releases for the 10.0 series. Apache Wicket 8.x does not support CSRF protection via the fetch metadata headers and as such is not affected. Users are recommended to upgrade to version 9.17.0 or 10.0.0, which fixes the issue. ",Apache,Apache Wicket,,,0.0004299999854993075,false,,false,false,false,,,false,false,,2024-03-19T11:07:47.648Z,0 CVE-2021-23937,https://securityvulnerability.io/vulnerability/CVE-2021-23937,DNS proxy and possible amplification attack,A DNS proxy and possible amplification attack vulnerability in WebClientInfo of Apache Wicket allows an attacker to trigger arbitrary DNS lookups from the server when the X-Forwarded-For header is not properly sanitized. This DNS lookup can be engineered to overload an internal DNS server or to slow down request processing of the Apache Wicket application causing a possible denial of service on either the internal infrastructure or the web application itself. This issue affects Apache Wicket Apache Wicket 9.x version 9.2.0 and prior versions; Apache Wicket 8.x version 8.11.0 and prior versions; Apache Wicket 7.x version 7.17.0 and prior versions and Apache Wicket 6.x version 6.2.0 and later versions.,Apache,Apache Wicket,7.5,HIGH,0.0015300000086426735,false,,false,false,false,,,false,false,,2021-05-25T08:05:10.000Z,0 CVE-2020-11976,https://securityvulnerability.io/vulnerability/CVE-2020-11976,,"By crafting a special URL it is possible to make Wicket deliver unprocessed HTML templates. This would allow an attacker to see possibly sensitive information inside a HTML template that is usually removed during rendering. Affected are Apache Wicket versions 7.16.0, 8.8.0 and 9.0.0-M5",Apache,Apache Wicket,7.5,HIGH,0.01083999965339899,false,,false,false,false,,,false,false,,2020-08-11T18:15:51.000Z,0 CVE-2016-6806,https://securityvulnerability.io/vulnerability/CVE-2016-6806,,"Apache Wicket 6.x before 6.25.0, 7.x before 7.5.0, and 8.0.0-M1 provide a CSRF prevention measure that fails to discover some cross origin requests. The mitigation is to not only check the Origin HTTP header, but also take the Referer HTTP header into account when no Origin was provided. Furthermore, not all Wicket server side targets were subjected to the CSRF check. This was also fixed.",Apache,Apache Wicket,8.8,HIGH,0.0007300000288523734,false,,false,false,false,,,false,false,,2017-10-03T01:29:00.000Z,0 CVE-2014-0043,https://securityvulnerability.io/vulnerability/CVE-2014-0043,,"In Apache Wicket 1.5.10 or 6.13.0, by issuing requests to special urls handled by Wicket, it is possible to check for the existence of particular classes in the classpath and thus check whether a third party library with a known security vulnerability is in use.",Apache,Apache Wicket,5.3,MEDIUM,0.0006099999882280827,false,,false,false,true,2022-07-27T14:43:54.000Z,true,false,false,,2017-10-03T01:29:00.000Z,0