Search for packages
| purl | pkg:rpm/redhat/jbossweb@7.3.2-4.Final_redhat_3.1.ep6?arch=el5 |
| Next non-vulnerable version | None. |
| Latest non-vulnerable version | None. |
| Risk | 4.0 |
| Vulnerability | Summary | Fixed by |
|---|---|---|
|
VCID-jf7u-dvpd-b7f4
Aliases: CVE-2014-0119 GHSA-prc3-7f44-w48j |
Apache Tomcat before 6.0.40, 7.x before 7.0.54, and 8.x before 8.0.6 does not properly constrain the class loader that accesses the XML parser used with an XSLT stylesheet, which allows remote attackers to (1) read arbitrary files via a crafted web application that provides an XML external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue, or (2) read files associated with different web applications on a single Tomcat instance via a crafted web application. | There are no reported fixed by versions. |
|
VCID-kgd1-bzst-muh7
Aliases: CVE-2014-0096 GHSA-qprx-q2r7-3rx6 |
java/org/apache/catalina/servlets/DefaultServlet.java in the default servlet in Apache Tomcat before 6.0.40, 7.x before 7.0.53, and 8.x before 8.0.4 does not properly restrict XSLT stylesheets, which allows remote attackers to bypass security-manager restrictions and read arbitrary files via a crafted web application that provides an XML external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue. | There are no reported fixed by versions. |
|
VCID-kzzv-rhya-j7dd
Aliases: CVE-2014-0075 GHSA-475f-74wp-pqv5 |
Integer overflow in the parseChunkHeader function in java/org/apache/coyote/http11/filters/ChunkedInputFilter.java in Apache Tomcat before 6.0.40, 7.x before 7.0.53, and 8.x before 8.0.4 allows remote attackers to cause a denial of service (resource consumption) via a malformed chunk size in chunked transfer coding of a request during the streaming of data. | There are no reported fixed by versions. |
|
VCID-ygvw-69am-s7ae
Aliases: CVE-2014-0099 GHSA-xh5x-j8jf-pcpx |
Integer overflow in java/org/apache/tomcat/util/buf/Ascii.java in Apache Tomcat before 6.0.40, 7.x before 7.0.53, and 8.x before 8.0.4, when operated behind a reverse proxy, allows remote attackers to conduct HTTP request smuggling attacks via a crafted Content-Length HTTP header. | There are no reported fixed by versions. |
| Vulnerability | Summary | Aliases |
|---|---|---|
| This package is not known to fix vulnerabilities. | ||
| Date | Actor | Action | Vulnerability | Source | VulnerableCode Version |
|---|---|---|---|---|---|
| 2026-04-01T14:47:48.904520+00:00 | RedHat Importer | Affected by | VCID-jf7u-dvpd-b7f4 | https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-0119.json | 38.0.0 |
| 2026-04-01T14:47:48.534236+00:00 | RedHat Importer | Affected by | VCID-ygvw-69am-s7ae | https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-0099.json | 38.0.0 |
| 2026-04-01T14:47:48.181483+00:00 | RedHat Importer | Affected by | VCID-kgd1-bzst-muh7 | https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-0096.json | 38.0.0 |
| 2026-04-01T14:47:47.878489+00:00 | RedHat Importer | Affected by | VCID-kzzv-rhya-j7dd | https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-0075.json | 38.0.0 |