Show filters
59 Total Results
Displaying 51-59 of 59
Sort by:
Attacker Value
Unknown
CVE-2019-10212
Disclosure Date: October 02, 2019 (last updated November 27, 2024)
A flaw was found in, all under 2.0.20, in the Undertow DEBUG log for io.undertow.request.security. If enabled, an attacker could abuse this flaw to obtain the user's credentials from the log files.
0
Attacker Value
Unknown
CVE-2019-14814
Disclosure Date: September 20, 2019 (last updated November 27, 2024)
There is heap-based buffer overflow in Linux kernel, all versions up to, excluding 5.3, in the marvell wifi chip driver in Linux kernel, that allows local users to cause a denial of service(system crash) or possibly execute arbitrary code.
0
Attacker Value
Unknown
CVE-2019-14816
Disclosure Date: September 20, 2019 (last updated November 27, 2024)
There is heap-based buffer overflow in kernel, all versions up to, excluding 5.3, in the marvell wifi chip driver in Linux kernel, that allows local users to cause a denial of service(system crash) or possibly execute arbitrary code.
0
Attacker Value
Unknown
CVE-2019-10184
Disclosure Date: July 25, 2019 (last updated November 27, 2024)
undertow before version 2.0.23.Final is vulnerable to an information leak issue. Web apps may have their directory structures predicted through requests without trailing slashes via the api.
0
Attacker Value
Unknown
CVE-2019-3888
Disclosure Date: June 12, 2019 (last updated November 27, 2024)
A vulnerability was found in Undertow web server before 2.0.21. An information exposure of plain text credentials through log files because Connectors.executeRootHandler:402 logs the HttpServerExchange object at ERROR level using UndertowLogger.REQUEST_LOGGER.undertowRequestFailed(t, exchange)
0
Attacker Value
Unknown
CVE-2018-5390
Disclosure Date: August 06, 2018 (last updated November 08, 2023)
Linux kernel versions 4.9+ can be forced to make very expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() for every incoming packet which can lead to a denial of service.
0
Attacker Value
Unknown
CVE-2017-2638
Disclosure Date: July 16, 2018 (last updated November 27, 2024)
It was found that the REST API in Infinispan before version 9.0.0 did not properly enforce auth constraints. An attacker could use this vulnerability to read or modify data in the default cache or a known cache name.
0
Attacker Value
Unknown
CVE-2018-1131
Disclosure Date: May 15, 2018 (last updated November 26, 2024)
Infinispan permits improper deserialization of trusted data via XML and JSON transcoders under certain server configurations. A user with authenticated access to the server could send a malicious object to a cache configured to accept certain types of objects, achieving code execution and possible further attacks. Versions 9.0.3.Final, 9.1.7.Final, 8.2.10.Final, 9.2.2.Final, 9.3.0.Alpha1 are believed to be affected.
0
Attacker Value
Unknown
CVE-2016-4970
Disclosure Date: April 13, 2017 (last updated November 08, 2023)
handler/ssl/OpenSslEngine.java in Netty 4.0.x before 4.0.37.Final and 4.1.x before 4.1.1.Final allows remote attackers to cause a denial of service (infinite loop).
0