Search for packages
| purl | pkg:rpm/redhat/eap7-jgroups@3.6.12-1.Final_redhat_1.1.ep7?arch=el6 |
| Next non-vulnerable version | None. |
| Latest non-vulnerable version | None. |
| Risk | 10.0 |
| Vulnerability | Summary | Fixed by |
|---|---|---|
|
VCID-2e2u-nvuu-kfbs
Aliases: CVE-2017-7559 GHSA-rj76-h87p-r3wf |
Inconsistent Interpretation of HTTP Requests (HTTP Request Smuggling) Invalid characters are allowed in query strings and path parameters. This could be exploited, in conjunction with a proxy that also permitted the invalid characters but with a different interpretation, to inject data into the HTTP response. By manipulating the HTTP response the attacker could poison a web-cache, perform an XSS attack, or obtain sensitive information from requests other than their own. | There are no reported fixed by versions. |
|
VCID-31vu-ktbb-cba3
Aliases: CVE-2017-12189 |
jboss: unsafe chown of server.log in jboss init script allows privilege escalation (Incomplete fix for CVE-2016-8656) | There are no reported fixed by versions. |
|
VCID-6qhb-4jya-hffz
Aliases: CVE-2017-7561 GHSA-57q5-x8jf-g7h8 |
Inconsistent Interpretation of HTTP Requests in Red Hat JBoss EAP Red Hat JBoss EAP version 3.0.7.Final until 3.0.25.Final, 3.5.0.CR1, and 4.0.0.Beta1 is vulnerable to a server-side cache poisoning or CORS requests in the JAX-RS component resulting in a moderate impact. | There are no reported fixed by versions. |
|
VCID-9u3r-n3zy-53f1
Aliases: CVE-2017-12167 |
EAP-7: Wrong privileges on multiple property files | There are no reported fixed by versions. |
|
VCID-rys3-pnnk-a7e4
Aliases: CVE-2017-12629 GHSA-mh7g-99w9-xpjm |
Remote code execution occurs in Apache Solr before 7.1 with Apache Lucene before 7.1 by exploiting XXE in conjunction with use of a Config API add-listener command to reach the RunExecutableListener class. Elasticsearch, although it uses Lucene, is NOT vulnerable to this. Note that the XML external entity expansion vulnerability occurs in the XML Query Parser which is available, by default, for any query request with parameters deftype=xmlparser and can be exploited to upload malicious data to the /upload request handler or as Blind XXE using ftp wrapper in order to read arbitrary local files from the Solr server. Note also that the second vulnerability relates to remote code execution using the RunExecutableListener available on all affected versions of Solr. | There are no reported fixed by versions. |
|
VCID-wbgc-tuj3-47by
Aliases: CVE-2016-6346 GHSA-wxvr-vqfp-9cqw |
Uncontrolled Resource Consumption RESTEasy enables `GZIPInterceptor`, which allows remote attackers to cause a denial of service via unspecified vectors. | There are no reported fixed by versions. |
|
VCID-ygp7-kj2w-syat
Aliases: CVE-2017-12165 GHSA-5gg7-5wv8-4gcj |
Inconsistent Interpretation of HTTP Requests (HTTP Request Smuggling) It was discovered that Undertow processes http request headers with unusual whitespaces which can cause possible http request smuggling. | There are no reported fixed by versions. |
| Vulnerability | Summary | Aliases |
|---|---|---|
| This package is not known to fix vulnerabilities. | ||