Show filters
33 Total Results
Displaying 21-30 of 33
Sort by:
Attacker Value
Unknown

CVE-2022-41862

Disclosure Date: March 03, 2023 (last updated October 08, 2023)
In PostgreSQL, a modified, unauthenticated server can send an unterminated string during the establishment of Kerberos transport encryption. In certain conditions a server can cause a libpq client to over-read and report an error message containing uninitialized bytes.
Attacker Value
Unknown

CVE-2022-4492

Disclosure Date: February 23, 2023 (last updated October 08, 2023)
The undertow client is not checking the server identity presented by the server certificate in https connections. This is a compulsory step (at least it should be performed by default) in https and in http/2. I would add it to any TLS client protocol.
Attacker Value
Unknown

CVE-2022-1278

Disclosure Date: September 13, 2022 (last updated October 08, 2023)
A flaw was found in WildFly, where an attacker can see deployment names, endpoints, and any other data the trace payload may contain.
Attacker Value
Unknown

CVE-2022-2764

Disclosure Date: September 01, 2022 (last updated November 29, 2024)
A flaw was found in Undertow. Denial of service can be achieved as Undertow server waits for the LAST_CHUNK forever for EJB invocations.
Attacker Value
Unknown

CVE-2022-1259

Disclosure Date: August 31, 2022 (last updated November 29, 2024)
A flaw was found in Undertow. A potential security issue in flow control handling by the browser over HTTP/2 may cause overhead or a denial of service in the server. This flaw exists because of an incomplete fix for CVE-2021-3629.
Attacker Value
Unknown

CVE-2022-0084

Disclosure Date: August 26, 2022 (last updated October 08, 2023)
A flaw was found in XNIO, specifically in the notifyReadClosed method. The issue revealed this method was logging a message to another expected end. This flaw allows an attacker to send flawed requests to a server, possibly causing log contention-related performance concerns or an unwanted disk fill-up.
Attacker Value
Unknown

CVE-2021-4178

Disclosure Date: August 24, 2022 (last updated October 08, 2023)
A arbitrary code execution flaw was found in the Fabric 8 Kubernetes client affecting versions 5.0.0-beta-1 and above. Due to an improperly configured YAML parsing, this will allow a local and privileged attacker to supply malicious YAML.
Attacker Value
Unknown

CVE-2021-3690

Disclosure Date: August 23, 2022 (last updated October 08, 2023)
A flaw was found in Undertow. A buffer leak on the incoming WebSocket PONG message may lead to memory exhaustion. This flaw allows an attacker to cause a denial of service. The highest threat from this vulnerability is availability.
Attacker Value
Unknown

CVE-2022-2053

Disclosure Date: August 05, 2022 (last updated October 08, 2023)
When a POST request comes through AJP and the request exceeds the max-post-size limit (maxEntitySize), Undertow's AjpServerRequestConduit implementation closes a connection without sending any response to the client/proxy. This behavior results in that a front-end proxy marking the backend worker (application server) as an error state and not forward requests to the worker for a while. In mod_cluster, this continues until the next STATUS request (10 seconds intervals) from the application server updates the server state. So, in the worst case, it can result in "All workers are in error state" and mod_cluster responds "503 Service Unavailable" for a while (up to 10 seconds). In mod_proxy_balancer, it does not forward requests to the worker until the "retry" timeout passes. However, luckily, mod_proxy_balancer has "forcerecovery" setting (On by default; this parameter can force the immediate recovery of all workers without considering the retry parameter of the workers if all workers of…
Attacker Value
Unknown

CVE-2021-3642

Disclosure Date: August 05, 2021 (last updated November 28, 2024)
A flaw was found in Wildfly Elytron in versions prior to 1.10.14.Final, prior to 1.15.5.Final and prior to 1.16.1.Final where ScramServer may be susceptible to Timing Attack if enabled. The highest threat of this vulnerability is confidentiality.