RSS   Podatności dla 'Richfaces'   RSS

2018-11-06
 
CVE-2018-14667

CWE-94
 

 
The RichFaces Framework 3.X through 3.3.4 is vulnerable to Expression Language (EL) injection via the UserResource resource. A remote, unauthenticated attacker could exploit this to execute arbitrary code using a chain of java serialized objects via org.ajax4jsf.resource.UserResource$UriData.

 
2018-06-18
 
CVE-2018-12533

CWE-94
 

 
JBoss RichFaces 3.1.0 through 3.3.4 allows unauthenticated remote attackers to inject expression language (EL) expressions and execute arbitrary Java code via a /DATA/ substring in a path with an org.richfaces.renderkit.html.Paint2DResource$ImageData object, aka RF-14310.

 
 
CVE-2018-12532

CWE-94
 

 
JBoss RichFaces 4.5.3 through 4.5.17 allows unauthenticated remote attackers to inject an arbitrary expression language (EL) variable mapper and execute arbitrary Java code via a MediaOutputResource's resource request, aka RF-14309.

 
2015-03-26
 
CVE-2015-0279

CWE-94
 

 
JBoss RichFaces before 4.5.4 allows remote attackers to inject expression language (EL) expressions and execute arbitrary Java code via the do parameter.

 
2014-03-31
 
CVE-2014-0086

CWE-20
 

 
The doFilter function in webapp/PushHandlerFilter.java in JBoss RichFaces 4.3.4, 4.3.5, and 5.x allows remote attackers to cause a denial of service (memory consumption and out-of-memory error) via a large number of malformed atmosphere push requests.

 
2013-07-23
 
CVE-2013-2165

 

 
ResourceBuilderImpl.java in the RichFaces 3.x through 5.x implementation in Red Hat JBoss Web Framework Kit before 2.3.0, Red Hat JBoss Web Platform through 5.2.0, Red Hat JBoss Enterprise Application Platform through 4.3.0 CP10 and 5.x through 5.2.0, Red Hat JBoss BRMS through 5.3.1, Red Hat JBoss SOA Platform through 4.3.0 CP05 and 5.x through 5.3.1, Red Hat JBoss Portal through 4.3 CP07 and 5.x through 5.2.2, and Red Hat JBoss Operations Network through 2.4.2 and 3.x through 3.1.2 does not restrict the classes for which deserialization methods can be called, which allows remote attackers to execute arbitrary code via crafted serialized data.

 

 >>> Vendor: Redhat 373 Produkty
Linux
Certificate server
Directory server
Sendmail
Openssl
Rsync
Tcpdump
Enterprise linux
Enterprise linux desktop
Linux powertools
Tmpwatch
Pam smb
Stronghold
Redhat package manager
Docbook stylesheets
Docbook utils
Libpng
Pre-execution environment
Interchange
Linux advanced workstation
Rhmask
LV
Analog real-time synthesizer
Kdebase
Kdelibs
Kdelibs devel
Kdelibs sound
Kdelibs sound devel
Wu ftpd
Daredevil skk
Ddskk-xemacs
Up2date
Kernel
Vsftpd
Bigmem kernel
Kernel doc
Kernel source
Sysstat
Gdk pixbuf
LHA
Fedora core
Linux desktop
Sysreport
JBPM
Desktop
Package manager
Jboss application server
Conga
Open iscsi
Cluster suite
Network satelite server
Fedora
Mcstrans
Cairo
Network satellite server
Cygwin
Enterprise linux desktop workstation
Fedora directory server
Nfs utils
Policykit
Desktop workstation
Fedora 8
Certificate system
KVM
Adminutil
Enterprise ipa
Freeipa
Jboss enterprise application platform
Initscripts
CMAN
dogtag certificate system
Libvirt
Cluster project
Gfs2-utils
Rgmanager
Dogtag certificate system
Enterprise mrg
Spacewalk-java
Enterprise virtualization
Qspice
Network satellite
Yum-rhn-plugin
Enterprise virtualization hypervisor
Enterprise virtualization manager
Jboss enterprise service bus
Jboss enterprise soa platform
LVM2
Evince
Spice-xpi
Spice-activex
LUCI
Icedtea
Jboss enterprise web platform
Jboss remoting
389 directory server
Libuser
Icedtea-web
Policycoreutils
Jboss seam 2 framework
Virtualization manager
Zobacz wszystkie produkty dla producenta Redhat


Copyright 2024, cxsecurity.com

 

Back to Top