Show filters
84 Total Results
Displaying 51-60 of 84
Sort by:
Attacker Value
Unknown
CVE-2017-2670
Disclosure Date: July 27, 2018 (last updated November 27, 2024)
It was found in Undertow before 1.3.28 that with non-clean TCP close, the Websocket server gets into infinite loop on every IO thread, effectively causing DoS.
0
Attacker Value
Unknown
CVE-2017-2666
Disclosure Date: July 27, 2018 (last updated November 27, 2024)
It was discovered in Undertow that the code that parsed the HTTP request line permitted invalid characters. This could be exploited, in conjunction with a proxy that also permitted the invalid characters but with a different interpretation, to inject data into the HTTP response. By manipulating the HTTP response the attacker could poison a web-cache, perform an XSS attack, or obtain sensitive information from requests other than their own.
0
Attacker Value
Unknown
CVE-2017-7464
Disclosure Date: July 27, 2018 (last updated November 27, 2024)
It was found that the JAXP implementation used in JBoss EAP 7.0 for SAX and DOM parsing is vulnerable to certain XXE flaws. An attacker could use this flaw to cause DoS, SSRF, or information disclosure if they are able to provide XML content for parsing.
0
Attacker Value
Unknown
CVE-2017-2582
Disclosure Date: July 26, 2018 (last updated November 27, 2024)
It was found that while parsing the SAML messages the StaxParserUtil class of keycloak before 2.5.1 replaces special strings for obtaining attribute values with system property. This could allow an attacker to determine values of system properties at the attacked system by formatting the SAML request ID field to be the chosen system property which could be obtained in the "InResponseTo" field in the response.
0
Attacker Value
Unknown
CVE-2017-12167
Disclosure Date: July 26, 2018 (last updated November 27, 2024)
It was found in EAP 7 before 7.0.9 that properties based files of the management and the application realm configuration that contain user to role mapping are world readable allowing access to users and roles information to all the users logged in to the system.
0
Attacker Value
Unknown
CVE-2017-7465
Disclosure Date: June 27, 2018 (last updated November 26, 2024)
It was found that the JAXP implementation used in JBoss EAP 7.0 for XSLT processing is vulnerable to code injection. An attacker could use this flaw to cause remote code execution if they are able to provide XSLT content for parsing. Doing a transform in JAXP requires the use of a 'javax.xml.transform.TransformerFactory'. If the FEATURE_SECURE_PROCESSING feature is set to 'true', it mitigates this vulnerability.
0
Attacker Value
Unknown
CVE-2018-1000180
Disclosure Date: June 05, 2018 (last updated November 08, 2023)
Bouncy Castle BC 1.54 - 1.59, BC-FJA 1.0.0, BC-FJA 1.0.1 and earlier have a flaw in the Low-level interface to RSA key pair generator, specifically RSA Key Pairs generated in low-level API with added certainty may have less M-R tests than expected. This appears to be fixed in versions BC 1.60 beta 4 and later, BC-FJA 1.0.2 and later.
0
Attacker Value
Unknown
CVE-2016-8656
Disclosure Date: May 22, 2018 (last updated November 08, 2023)
Jboss jbossas before versions 5.2.0-23, 6.4.13, 7.0.5 is vulnerable to an unsafe file handling in the jboss init script which could result in local privilege escalation.
0
Attacker Value
Unknown
CVE-2016-8627
Disclosure Date: May 11, 2018 (last updated November 08, 2023)
admin-cli before versions 3.0.0.alpha25, 2.2.1.cr2 is vulnerable to an EAP feature to download server log files that allows logs to be available via GET requests making them vulnerable to cross-origin attacks. An attacker could trigger the user's browser to request the log files consuming enough resources that normal server functioning could be impaired.
0
Attacker Value
Unknown
CVE-2017-12196
Disclosure Date: April 18, 2018 (last updated November 26, 2024)
undertow before versions 1.4.18.SP1, 2.0.2.Final, 1.4.24.Final was found vulnerable when using Digest authentication, the server does not ensure that the value of URI in the Authorization header matches the URI in HTTP request line. This allows the attacker to cause a MITM attack and access the desired content on the server.
0