Show filters
563 Total Results
Displaying 361-370 of 563
Sort by:
Attacker Value
Unknown

CVE-2019-17091

Disclosure Date: October 02, 2019 (last updated November 27, 2024)
faces/context/PartialViewContextImpl.java in Eclipse Mojarra, as used in Mojarra for Eclipse EE4J before 2.3.10 and Mojarra JavaServer Faces before 2.2.20, allows Reflected XSS because a client window field is mishandled.
Attacker Value
Unknown

CVE-2019-11779

Disclosure Date: September 19, 2019 (last updated November 08, 2023)
In Eclipse Mosquitto 1.5.0 to 1.6.5 inclusive, if a malicious MQTT client sends a SUBSCRIBE packet containing a topic that consists of approximately 65400 or more '/' characters, i.e. the topic hierarchy separator, then a stack overflow will occur.
Attacker Value
Unknown

CVE-2019-11778

Disclosure Date: September 18, 2019 (last updated November 27, 2024)
If an MQTT v5 client connects to Eclipse Mosquitto versions 1.6.0 to 1.6.4 inclusive, sets a last will and testament, sets a will delay interval, sets a session expiry interval, and the will delay interval is set longer than the session expiry interval, then a use after free error occurs, which has the potential to cause a crash in some situations.
Attacker Value
Unknown

CVE-2019-11774

Disclosure Date: September 12, 2019 (last updated November 27, 2024)
Prior to 0.1, all builds of Eclipse OMR contain a bug where the loop versioner may fail to privatize a value that is pulled out of the loop by versioning - for example if there is a condition that is moved out of the loop that reads a field we may not privatize the value of that field in the modified copy of the loop allowing the test to see one value of the field and subsequently the loop to see a modified field value without retesting the condition moved out of the loop. This can lead to a variety of different issues but read out of array bounds is one major consequence of these problems.
Attacker Value
Unknown

CVE-2019-11777

Disclosure Date: September 11, 2019 (last updated November 27, 2024)
In the Eclipse Paho Java client library version 1.2.0, when connecting to an MQTT server using TLS and setting a host name verifier, the result of that verification is not checked. This could allow one MQTT server to impersonate another and provide the client library with incorrect information.
Attacker Value
Unknown

CVE-2019-15224

Disclosure Date: August 19, 2019 (last updated November 27, 2024)
The rest-client gem 1.6.10 through 1.6.13 for Ruby, as distributed on RubyGems.org, included a code-execution backdoor inserted by a third party. Versions <=1.6.9 and >=1.6.14 are unaffected.
0
Attacker Value
Unknown

CVE-2018-12101

Disclosure Date: August 15, 2019 (last updated November 27, 2024)
CMS Clipper 1.3.3 has XSS in the Security tab search, User Groups, Resource Groups, and User/Resource Group Links fields.
0
Attacker Value
Unknown

CVE-2019-11776

Disclosure Date: August 09, 2019 (last updated November 27, 2024)
In Eclipse BIRT versions 1.0 to 4.7, the Report Viewer allows Reflected XSS in URL parameter. Attacker can execute the payload in victim's browser context.
Attacker Value
Unknown

CVE-2019-11775

Disclosure Date: July 30, 2019 (last updated November 27, 2024)
All builds of Eclipse OpenJ9 prior to 0.15 contain a bug where the loop versioner may fail to privatize a value that is pulled out of the loop by versioning - for example if there is a condition that is moved out of the loop that reads a field we may not privatize the value of that field in the modified copy of the loop allowing the test to see one value of the field and subsequently the loop to see a modified field value without retesting the condition moved out of the loop. This can lead to a variety of different issues but read out of array bounds is one major consequence of these problems.
Attacker Value
Unknown

CVE-2019-11772

Disclosure Date: July 17, 2019 (last updated November 27, 2024)
In Eclipse OpenJ9 prior to 0.15, the String.getBytes(int, int, byte[], int) method does not verify that the provided byte array is non-null nor that the provided index is in bounds when compiled by the JIT. This allows arbitrary writes to any 32-bit address or beyond the end of a byte array within Java code run under a SecurityManager.
0