Show filters
106 Total Results
Displaying 21-30 of 106
Sort by:
Attacker Value
Unknown
CVE-2014-3701
Disclosure Date: December 15, 2019 (last updated November 27, 2024)
eDeploy has tmp file race condition flaws
0
Attacker Value
Unknown
CVE-2014-3699
Disclosure Date: December 15, 2019 (last updated November 27, 2024)
eDeploy has RCE via cPickle deserialization of untrusted data
0
Attacker Value
Unknown
CVE-2012-2148
Disclosure Date: December 06, 2019 (last updated November 27, 2024)
An issue exists in the property replacements feature in any descriptor in JBoxx AS 7.1.1 ignores java security policies
0
Attacker Value
Unknown
CVE-2014-3700
Disclosure Date: November 21, 2019 (last updated November 27, 2024)
eDeploy through at least 2014-10-14 has remote code execution due to eval() of untrusted data
0
Attacker Value
Unknown
CVE-2014-3655
Disclosure Date: November 13, 2019 (last updated November 27, 2024)
JBoss KeyCloak is vulnerable to soft token deletion via CSRF
0
Attacker Value
Unknown
CVE-2011-3923
Disclosure Date: November 01, 2019 (last updated November 08, 2023)
Apache Struts before 2.3.1.2 allows remote attackers to bypass security protections in the ParameterInterceptor class and execute arbitrary commands.
0
Attacker Value
Unknown
CVE-2019-9515
Disclosure Date: August 13, 2019 (last updated January 15, 2025)
Some HTTP/2 implementations are vulnerable to a settings flood, potentially leading to a denial of service. The attacker sends a stream of SETTINGS frames to the peer. Since the RFC requires that the peer reply with one acknowledgement per SETTINGS frame, an empty SETTINGS frame is almost equivalent in behavior to a ping. Depending on how efficiently this data is queued, this can consume excess CPU, memory, or both.
0
Attacker Value
Unknown
Some HTTP/2 implementations are vulnerable to a header leak, potentially leadin…
Disclosure Date: August 13, 2019 (last updated January 15, 2025)
Some HTTP/2 implementations are vulnerable to a header leak, potentially leading to a denial of service. The attacker sends a stream of headers with a 0-length header name and 0-length header value, optionally Huffman encoded into 1-byte or greater headers. Some implementations allocate memory for these headers and keep the allocation alive until the session dies. This can consume excess memory.
0
Attacker Value
Unknown
CVE-2019-9514
Disclosure Date: August 13, 2019 (last updated January 15, 2025)
Some HTTP/2 implementations are vulnerable to a reset flood, potentially leading to a denial of service. The attacker opens a number of streams and sends an invalid request over each stream that should solicit a stream of RST_STREAM frames from the peer. Depending on how the peer queues the RST_STREAM frames, this can consume excess memory, CPU, or both.
0
Attacker Value
Unknown
CVE-2019-9513
Disclosure Date: August 13, 2019 (last updated January 15, 2025)
Some HTTP/2 implementations are vulnerable to resource loops, potentially leading to a denial of service. The attacker creates multiple request streams and continually shuffles the priority of the streams in a way that causes substantial churn to the priority tree. This can consume excess CPU.
0