Search Results (324417 CVEs found)

CVE Vendors Products Updated CVSS v3.1
CVE-2014-3718 1 Exlibrisgroup 1 Aleph 500 2024-11-21 6.1 Medium
Multiple cross-site scripting (XSS) vulnerabilities in cgi-bin/tag_m.cgi in Ex Libris ALEPH 500 (Integrated library management system) 18.1 and 20 allow remote attackers to inject arbitrary web script or HTML via the (1) find, (2) lib, or (3) sid parameter.
CVE-2014-3701 1 Redhat 2 Edeploy, Jboss Enterprise Web Server 2024-11-21 8.1 High
eDeploy has tmp file race condition flaws
CVE-2014-3700 1 Redhat 2 Edeploy, Jboss Enterprise Web Server 2024-11-21 9.8 Critical
eDeploy through at least 2014-10-14 has remote code execution due to eval() of untrusted data
CVE-2014-3699 1 Redhat 2 Edeploy, Jboss Enterprise Web Server 2024-11-21 9.8 Critical
eDeploy has RCE via cPickle deserialization of untrusted data
CVE-2014-3656 1 Redhat 1 Jboss Keycloak 2024-11-21 6.1 Medium
JBoss KeyCloak: XSS in login-status-iframe.html
CVE-2014-3655 1 Redhat 2 Jboss Enterprise Web Server, Keycloak 2024-11-21 4.3 Medium
JBoss KeyCloak is vulnerable to soft token deletion via CSRF
CVE-2014-3652 1 Redhat 1 Keycloak 2024-11-21 6.1 Medium
JBoss KeyCloak: Open redirect vulnerability via failure to validate the redirect URL.
CVE-2014-3650 1 Redhat 1 Jboss Aerogear 2024-11-21 5.4 Medium
Multiple persistent cross-site scripting (XSS) flaws were found in the way Aerogear handled certain user-supplied content. A remote attacker could use these flaws to compromise the application with specially crafted input.
CVE-2014-3649 1 Redhat 1 Jboss Aerogear 2024-11-21 6.1 Medium
JBoss AeroGear has reflected XSS via the password field
CVE-2014-3648 1 Redhat 1 Jboss Aerogear 2024-11-21 7.5 High
The simplepush server iterates through the application installations and pushes a notification to the server provided by deviceToken. But this is user controlled. If a bogus applications is registered with bad deviceTokens, one can generate endless exceptions when those endpoints can't be reached or can slow the server down by purposefully wasting it's time with slow endpoints. Similarly, one can provide whatever HTTP end point they want. This turns the server into a DDOS vector or an anonymizer for the posting of malware and so on.
CVE-2014-3643 1 Jersey Project 1 Jersey 2024-11-21 7.5 High
jersey: XXE via parameter entities not disabled by the jersey SAX parser
CVE-2014-3626 1 Grails 1 Resources 2024-11-21 N/A
The Grails Resource Plugin often has to exchange URIs for resources with other internal components. Those other components will decode any URI passed to them. To protect against directory traversal the Grails Resource Plugin did the following: normalized the URI, checked the normalized URI did not step outside the appropriate root directory (e.g. the web application root), decoded the URI and checked that this did not introduce additional /../ (and similar) sequences. A bug was introduced where the Grails Resource Plugin before 1.2.13 returned the decoded version of the URI rather than the normalized version of the URI after the directory traversal check. This exposed a double decoding vulnerability. To address this issue, the Grails Resource Plugin now repeatedly decodes the URI up to three times or until decoding no longer changes the URI. If the decode limit of 3 is exceeded the URI is rejected. A side-effect of this is that the Grails Resource Plugin is unable to serve a resource that includes a '%' character in the full path to the resource. Not all environments are vulnerable because of the differences in URL resolving in different servlet containers. Applications deployed to Tomcat 8 and Jetty 9 were found not not be vulnerable, however applications deployed to JBoss EAP 6.3 / JBoss AS 7.4 and JBoss AS 7.1 were found to be vulnerable (other JBoss versions weren't tested). In certain cases JBoss returns JBoss specific vfs protocol urls from URL resolution methods (ClassLoader.getResources). The JBoss vfs URL protocol supports resolving any file on the filesystem. This made the directory traversal possible. There may be other containers, in addition to JBoss, on which this vulnerability is exposed.
CVE-2014-3622 1 Php 1 Php 2024-11-21 9.8 Critical
Use-after-free vulnerability in the add_post_var function in the Posthandler component in PHP 5.6.x before 5.6.1 might allow remote attackers to execute arbitrary code by leveraging a third-party filter extension that accesses a certain ksep value.
CVE-2014-3607 1 Ldaptive 2 Ldaptive, Vt-ldap 2024-11-21 N/A
DefaultHostnameVerifier in Ldaptive (formerly vt-ldap) does not properly verify that the server hostname matches a domain name in the subject's Common Name (CN) field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate.
CVE-2014-3603 1 Shibboleth 2 Identity Provider, Opensaml Java 2024-11-21 N/A
The (1) HttpResource and (2) FileBackedHttpResource implementations in Shibboleth Identity Provider (IdP) before 2.4.1 and OpenSAML Java 2.6.2 do not verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate.
CVE-2014-3599 1 Redhat 1 Hornetq 2024-11-21 6.5 Medium
HornetQ REST is vulnerable to XML External Entity due to insecure configuration of RestEasy
CVE-2014-3592 1 Redhat 1 Openshift Origin 2024-11-21 6.1 Medium
OpenShift Origin: Improperly validated team names could allow stored XSS attacks
CVE-2014-3591 2 Debian, Gnupg 3 Debian Linux, Gnupg, Libgcrypt 2024-11-21 4.2 Medium
Libgcrypt before 1.6.3 and GnuPG before 1.4.19 does not implement ciphertext blinding for Elgamal decryption, which allows physically proximate attackers to obtain the server's private key by determining factors using crafted ciphertext and the fluctuations in the electromagnetic field during multiplication.
CVE-2014-3590 1 Redhat 2 Satellite, Satellite Capsule 2024-11-21 6.5 Medium
Versions of Foreman as shipped with Red Hat Satellite 6 does not check for a correct CSRF token in the logout action. Therefore, an attacker can log out a user by having them view specially crafted content.
CVE-2014-3585 1 Redhat 3 Enterprise Linux, Redhat-upgrade-tool, Rhel Extras Other 2024-11-21 9.8 Critical
redhat-upgrade-tool: Does not check GPG signatures when upgrading versions