Redhat

Jboss Enterprise Web Server

35 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 88.53%
  • Veröffentlicht 28.10.2013 21:55:05
  • Zuletzt bearbeitet 11.04.2025 00:51:21

The DiskFileItem class in Apache Commons FileUpload, as used in Red Hat JBoss BRMS 5.3.1; JBoss Portal 4.3 CP07, 5.2.2, and 6.0.0; and Red Hat JBoss Web Server 1.0.2 allows remote attackers to write to arbitrary files via a NULL byte in a file name i...

  • EPSS 0.03%
  • Veröffentlicht 09.07.2013 17:55:00
  • Zuletzt bearbeitet 11.04.2025 00:51:21

The (1) tomcat5, (2) tomcat6, and (3) tomcat7 init scripts, as used in the RPM distribution of Tomcat for JBoss Enterprise Web Server 1.0.2 and 2.0.0, and Red Hat Enterprise Linux 5 and 6, allow local users to change the ownership of arbitrary files ...

  • EPSS 70.5%
  • Veröffentlicht 28.01.2012 04:05:00
  • Zuletzt bearbeitet 11.04.2025 00:51:21

protocol.c in the Apache HTTP Server 2.2.x through 2.2.21 does not properly restrict header information during construction of Bad Request (aka 400) error documents, which allows remote attackers to obtain the values of HTTPOnly cookies via vectors i...

Exploit
  • EPSS 2.18%
  • Veröffentlicht 18.01.2012 20:55:02
  • Zuletzt bearbeitet 11.04.2025 00:51:21

scoreboard.c in the Apache HTTP Server 2.2.21 and earlier might allow local users to cause a denial of service (daemon crash during shutdown) or possibly have unspecified other impact by modifying a certain type field within a scoreboard shared memor...

Exploit
  • EPSS 52.32%
  • Veröffentlicht 20.09.2011 05:55:02
  • Zuletzt bearbeitet 11.04.2025 00:51:21

The mod_proxy_ajp module in the Apache HTTP Server before 2.2.21, when used with mod_proxy_balancer in certain configurations, allows remote attackers to cause a denial of service (temporary "error state" in the backend server) via a malformed HTTP r...