Redhat

Jboss Core Services

41 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 94.22%
  • Veröffentlicht 31.10.2018 20:29:00
  • Zuletzt bearbeitet 21.11.2024 03:43:58

The Apache Web Server (httpd) specific code that normalised the requested path before matching it to the URI-worker map in Apache Tomcat JK (mod_jk) Connector 1.2.0 to 1.2.44 did not handle some edge cases correctly. If only a sub-set of the URLs sup...

  • EPSS 0.67%
  • Veröffentlicht 16.08.2018 20:29:00
  • Zuletzt bearbeitet 21.11.2024 03:01:29

libxml2, as used in Red Hat JBoss Core Services, allows context-dependent attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted XML document. NOTE: this vulnerability exists because of a missing fix for CVE-2...

  • EPSS 0.67%
  • Veröffentlicht 16.08.2018 20:29:00
  • Zuletzt bearbeitet 21.11.2024 03:01:28

libxml2, as used in Red Hat JBoss Core Services and when in recovery mode, allows context-dependent attackers to cause a denial of service (stack consumption) via a crafted XML document. NOTE: this vulnerability exists because of an incorrect fix fo...

  • EPSS 8.98%
  • Veröffentlicht 18.06.2018 18:29:00
  • Zuletzt bearbeitet 21.11.2024 03:59:38

By specially crafting HTTP/2 requests, workers would be allocated 60 seconds longer than necessary, leading to worker exhaustion and a denial of service. Fixed in Apache HTTP Server 2.4.34 (Affected 2.4.18-2.4.30,2.4.33).

  • EPSS 1.89%
  • Veröffentlicht 26.03.2018 15:29:00
  • Zuletzt bearbeitet 21.11.2024 03:59:36

In Apache httpd 2.2.0 to 2.4.29, when generating an HTTP Digest authentication challenge, the nonce sent to prevent reply attacks was not correctly generated using a pseudo-random seed. In a cluster of servers using a common Digest authentication con...

  • EPSS 0.05%
  • Veröffentlicht 24.10.2017 01:29:02
  • Zuletzt bearbeitet 20.04.2025 01:37:25

When apr_time_exp*() or apr_os_exp_time*() functions are invoked with an invalid month field value in Apache Portable Runtime APR 1.6.2 and prior, out of bounds memory may be accessed in converting this value to an apr_time_exp_t value, potentially r...

  • EPSS 3.39%
  • Veröffentlicht 27.07.2017 21:29:00
  • Zuletzt bearbeitet 20.04.2025 01:37:25

Apache HTTP Server, in all releases prior to 2.2.32 and 2.4.25, was liberal in the whitespace accepted from requests and sent in response lines and headers. Accepting these different behaviors represented a security concern when httpd participates in...

  • EPSS 28.08%
  • Veröffentlicht 13.07.2017 16:29:00
  • Zuletzt bearbeitet 20.04.2025 01:37:25

In Apache httpd before 2.2.34 and 2.4.x before 2.4.27, the value placeholder in [Proxy-]Authorization headers of type 'Digest' was not initialized or reset before or between successive key=value assignments by mod_auth_digest. Providing an initial ke...

  • EPSS 6.35%
  • Veröffentlicht 20.06.2017 01:29:00
  • Zuletzt bearbeitet 04.11.2025 16:15:38

In Apache httpd 2.2.x before 2.2.33 and 2.4.x before 2.4.26, use of the ap_get_basic_auth_pw() by third-party modules outside of the authentication phase may lead to authentication requirements being bypassed.

  • EPSS 34.36%
  • Veröffentlicht 19.07.2016 02:00:19
  • Zuletzt bearbeitet 12.04.2025 10:46:40

The Apache HTTP Server through 2.4.23 follows RFC 3875 section 4.1.18 and therefore does not protect applications from the presence of untrusted client data in the HTTP_PROXY environment variable, which might allow remote attackers to redirect an app...