Redhat

Jboss Core Services

36 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 7%
  • Published 28.05.2021 11:15:07
  • Last modified 21.11.2024 05:18:32

A flaw was found in OpenLDAP in versions before 2.4.56. This flaw allows an attacker who sends a malicious packet processed by OpenLDAP to force a failed assertion in csnNormalize23(). The highest threat from this vulnerability is to system availabil...

  • EPSS 0.09%
  • Published 19.05.2021 14:15:07
  • Last modified 21.11.2024 06:21:44

There is a flaw in the xml entity encoding functionality of libxml2 in versions before 2.9.11. An attacker who is able to supply a crafted file to be processed by an application linked with the affected functionality of libxml2 could trigger an out-o...

  • EPSS 0.25%
  • Published 18.05.2021 12:15:08
  • Last modified 21.11.2024 06:21:44

There's a flaw in libxml2 in versions before 2.9.11. An attacker who is able to submit a crafted file to be processed by an application linked with libxml2 could trigger a use-after-free. The greatest impact from this flaw is to confidentiality, inte...

  • EPSS 12.34%
  • Published 18.05.2021 12:15:07
  • Last modified 21.11.2024 05:18:32

A flaw was found in OpenLDAP. This flaw allows an attacker who can send a malicious packet to be processed by OpenLDAP’s slapd server, to trigger an assertion failure. The highest threat from this vulnerability is to system availability.

  • EPSS 0.11%
  • Published 14.05.2021 20:15:16
  • Last modified 21.11.2024 06:21:47

A vulnerability found in libxml2 in versions before 2.9.11 shows that it did not propagate errors while parsing XML mixed content, causing a NULL dereference. If an untrusted XML document was parsed in recovery mode and post-validated, the flaw could...

  • EPSS 3.67%
  • Published 13.08.2019 21:15:13
  • Last modified 14.01.2025 19:29:55

Some HTTP/2 implementations are vulnerable to a flood of empty frames, potentially leading to a denial of service. The attacker sends a stream of frames with an empty payload and without the end-of-stream flag. These frames can be DATA, HEADERS, CONT...

  • EPSS 2.29%
  • Published 13.08.2019 21:15:12
  • Last modified 14.01.2025 19:29:55

Some HTTP/2 implementations are vulnerable to a header leak, potentially leading to a denial of service. The attacker sends a stream of headers with a 0-length header name and 0-length header value, optionally Huffman encoded into 1-byte or greater h...

  • EPSS 4.56%
  • Published 13.08.2019 21:15:12
  • Last modified 14.01.2025 19:29:55

Some HTTP/2 implementations are vulnerable to unconstrained interal data buffering, potentially leading to a denial of service. The attacker opens the HTTP/2 window so the peer can send without constraint; however, they leave the TCP window closed so...

  • EPSS 4.51%
  • Published 13.08.2019 21:15:12
  • Last modified 14.01.2025 19:29:55

Some HTTP/2 implementations are vulnerable to a settings flood, potentially leading to a denial of service. The attacker sends a stream of SETTINGS frames to the peer. Since the RFC requires that the peer reply with one acknowledgement per SETTINGS f...

  • EPSS 9.48%
  • Published 13.08.2019 21:15:12
  • Last modified 14.01.2025 19:29:55

Some HTTP/2 implementations are vulnerable to a reset flood, potentially leading to a denial of service. The attacker opens a number of streams and sends an invalid request over each stream that should solicit a stream of RST_STREAM frames from the p...