
CVE-2013-1777 – Apache Geronimo 3 RMI Classloader Exposure
https://notcve.org/view.php?id=CVE-2013-1777
01 Jul 2013 — The JMX Remoting functionality in Apache Geronimo 3.x before 3.0.1, as used in IBM WebSphere Application Server (WAS) Community Edition 3.0.0.3 and other products, does not properly implement the RMI classloader, which allows remote attackers to execute arbitrary code by using the JMX connector to send a crafted serialized object. La funcionalidad JMX Remoting en Apache Geronimo versiones 3.x anteriores a 3.0.1, tal y como se usa en WebSphere Application Server (WAS) Community Edition de IBM versión 3.0.0.3... • http://archives.neohapsis.com/archives/bugtraq/2013-07/0008.html • CWE-94: Improper Control of Generation of Code ('Code Injection') •

CVE-2011-5034 – MyBulletinBoard (MyBB) 1.1.5 - 'CLIENT-IP' SQL Injection
https://notcve.org/view.php?id=CVE-2011-5034
30 Dec 2011 — Apache Geronimo 2.2.1 and earlier computes hash values for form parameters without restricting the ability to trigger hash collisions predictably, which allows remote attackers to cause a denial of service (CPU consumption) by sending many crafted parameters. NOTE: this might overlap CVE-2011-4461. Apache Geronimo v2.2.1 y anteriores calcula los valores hash de los parámetros de forma, sin restringir la capacidad de desencadenar colisiones hash predecible, lo que permite a atacantes remotos provocar una den... • https://packetstorm.news/files/id/180523 • CWE-20: Improper Input Validation •

CVE-2010-1632 – HP Security Bulletin HPSBHF03655 1
https://notcve.org/view.php?id=CVE-2010-1632
22 Jun 2010 — Apache Axis2 before 1.5.2, as used in IBM WebSphere Application Server (WAS) 7.0 through 7.0.0.12, IBM Feature Pack for Web Services 6.1.0.9 through 6.1.0.32, IBM Feature Pack for Web 2.0 1.0.1.0, Apache Synapse, Apache ODE, Apache Tuscany, Apache Geronimo, and other products, does not properly reject DTDs in SOAP messages, which allows remote attackers to read arbitrary files, send HTTP requests to intranet servers, or cause a denial of service (CPU and memory consumption) via a crafted DTD, as demonstrate... • http://geronimo.apache.org/2010/07/21/apache-geronimo-v216-released.html • CWE-20: Improper Input Validation •

CVE-2009-0038 – Apache Geronimo 2.1.x - '/console/portal/' URI Cross-Site Scripting
https://notcve.org/view.php?id=CVE-2009-0038
17 Apr 2009 — Multiple cross-site scripting (XSS) vulnerabilities in the web administration console in Apache Geronimo Application Server 2.1 through 2.1.3 allow remote attackers to inject arbitrary web script or HTML via the (1) name, (2) ip, (3) username, or (4) description parameter to console/portal/Server/Monitoring; or (5) the PATH_INFO to the default URI under console/portal/. Múltiples vulnerabilidades de secuencias de comandos en sitios cruzados (XSS) en la consola de administración web en Apache Geronimo Applic... • https://www.exploit-db.com/exploits/32921 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVE-2009-0039 – Apache Geronimo 2.1.x - Cross-Site Request Forgery (Multiple Admin Function)
https://notcve.org/view.php?id=CVE-2009-0039
17 Apr 2009 — Multiple cross-site request forgery (CSRF) vulnerabilities in the web administration console in Apache Geronimo Application Server 2.1 through 2.1.3 allow remote attackers to hijack the authentication of administrators for requests that (1) change the web administration password, (2) upload applications, and perform unspecified other administrative actions, as demonstrated by (3) a Shutdown request to console/portal//Server/Shutdown. Múltiples vulnerabilidades de falsificación de petición en sitios cruzados... • https://www.exploit-db.com/exploits/32922 • CWE-352: Cross-Site Request Forgery (CSRF) •

CVE-2008-5518 – Apache Geronimo 2.1.3 - Multiple Directory Traversal Vulnerabilities
https://notcve.org/view.php?id=CVE-2008-5518
17 Apr 2009 — Multiple directory traversal vulnerabilities in the web administration console in Apache Geronimo Application Server 2.1 through 2.1.3 on Windows allow remote attackers to upload files to arbitrary directories via directory traversal sequences in the (1) group, (2) artifact, (3) version, or (4) fileType parameter to console/portal//Services/Repository (aka the Services/Repository portlet); the (5) createDB parameter to console/portal/Embedded DB/DB Manager (aka the Embedded DB/DB Manager portlet); or the (6... • https://www.exploit-db.com/exploits/8458 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVE-2008-0732
https://notcve.org/view.php?id=CVE-2008-0732
12 Feb 2008 — The init script for Apache Geronimo on SUSE Linux follows symlinks when performing a chown operation, which might allow local users to obtain access to unspecified files or directories. La secuencia de comandos init de Apache Geronimo sobre SUSE Linux sigue enlaces simbólicos cuando realiza una operación de cambio en la propiedad de ficheros o directorios, que permite a usuarios locales obtener acceso a ficheros y directorios no especificados. • http://lists.opensuse.org/opensuse-security-announce/2008-02/msg00003.html • CWE-59: Improper Link Resolution Before File Access ('Link Following') •

CVE-2007-5797
https://notcve.org/view.php?id=CVE-2007-5797
03 Nov 2007 — SQLLoginModule in Apache Geronimo 2.0 through 2.1 does not throw an exception for a nonexistent username, which allows remote attackers to bypass authentication via a login attempt with any username not contained in the database. El SQLLoginModule en el Apache Geronimo 2.0 hasta el 2.1 no lanza una excepción para nombre de usuarios no existentes, lo que permite a atacantes remotos evitar la autenticación mediante un intento de registrase con algún usuario que no esté contenido en la Base de Datos. • http://osvdb.org/38662 • CWE-287: Improper Authentication •

CVE-2007-5085
https://notcve.org/view.php?id=CVE-2007-5085
26 Sep 2007 — Unspecified vulnerability in the management EJB (MEJB) in Apache Geronimo before 2.0.2 allows remote attackers to bypass authentication and obtain "access to Geronimo internals" via unspecified vectors. Vulnerabilidad no especificada en el EJB de administración (management EJB o MEJB) de Apache Geronimo anterior a 2.0.2 permite a atacantes remotos evitar la autenticación y obtener "acceso al interior de Geronimo" a través de vectores no especificados. • http://geronimo.apache.org/2007/09/07/mejb-security-alert.html • CWE-287: Improper Authentication •

CVE-2007-4548
https://notcve.org/view.php?id=CVE-2007-4548
27 Aug 2007 — The login method in LoginModule implementations in Apache Geronimo 2.0 does not throw FailedLoginException for failed logins, which allows remote attackers to bypass authentication requirements, deploy arbitrary modules, and gain administrative access by sending a blank username and password with the command line deployer in the deployment module. El método de entrada en las implementaciones LoginModule en Apache Geronimo 2.0 no pasa por FailedLoginException para las entradas fallidas, lo cual permite a ata... • http://geronimo.apache.org/2007/08/13/apache-geronimo-v20-release-delayed-due-to-security-issue.html • CWE-287: Improper Authentication •