Page 11 of 184 results (0.004 seconds)

CVSS: 5.3EPSS: 0%CPEs: 1EXPL: 0

In Eclipse Sphinxâ„¢ before version 0.13.1, Apache Xerces XML Parser was used without disabling processing of referenced external entities allowing the injection of arbitrary definitions which is able to access local files and expose their contents via HTTP requests. En Eclipse Sphinx versiones anteriores a 0.13.1, era usado Apache Xerces XML Parser sin deshabilitar el procesamiento de entidades externas referenciadas permitiendo una inyección de definiciones arbitrarias que es capaz de acceder a archivos locales y exponer su contenido por medio de peticiones HTTP. • https://bugs.eclipse.org/580542 • CWE-611: Improper Restriction of XML External Entity Reference •

CVSS: 7.5EPSS: 0%CPEs: 2EXPL: 1

In Eclipse Californium version 2.0.0 to 2.7.2 and 3.0.0-3.5.0 a DTLS resumption handshake falls back to a DTLS full handshake on a parameter mismatch without using a HelloVerifyRequest. Especially, if used with certificate based cipher suites, that results in message amplification (DDoS other peers) and high CPU load (DoS own peer). The misbehavior occurs only with DTLS_VERIFY_PEERS_ON_RESUMPTION_THRESHOLD values larger than 0. En Eclipse Californium versiones 2.0.0 a 2.7.2 y 3.0.0-3.5.0, un handshake de reanudación DTLS retrocede a un handshake completo DTLS en caso de desajuste de parámetros sin usar un HelloVerifyRequest. Especialmente, si es usado con suites de cifrado basadas en certificados, eso resulta en una amplificación de mensajes (DDoS otros pares) y alta carga de CPU (DoS propio par). • https://bugs.eclipse.org/580018 • CWE-408: Incorrect Behavior Order: Early Amplification •

CVSS: 9.8EPSS: 0%CPEs: 1EXPL: 2

Hudson (aka org.jvnet.hudson.main:hudson-core) before 3.3.2 allows XXE attacks. Hudson (también se conoce como org.jvnet.hudson.main:hudson-core) versiones anteriores a 3.3.2, permite ataques de tipo XXE • https://github.com/advisories/GHSA-j3h2-8mf8-j5r2 https://security.snyk.io/vuln/SNYK-JAVA-ORGJVNETHUDSONMAIN-31221 https://wiki.eclipse.org/Hudson-ci/alerts/CVE-2015-8031 • CWE-611: Improper Restriction of XML External Entity Reference •

CVSS: 10.0EPSS: 0%CPEs: 1EXPL: 0

In Eclipse p2, installable units are able to alter the Eclipse Platform installation and the local machine via touchpoints during installation. Those touchpoints can, for example, alter the command-line used to start the application, injecting things like agent or other settings that usually require particular attention in term of security. Although p2 has built-in strategies to ensure artifacts are signed and then to help establish trust, there is no such strategy for the metadata part that does configure such touchpoints. As a result, it's possible to install a unit that will run malicious code during installation without user receiving any warning about this installation step being risky when coming from untrusted source. En Eclipse p2, las unidades instalables son capaces de alterar la instalación de la plataforma Eclipse y la máquina local por medio de puntos de contacto durante la instalación. • https://bugs.eclipse.org/bugs/show_bug.cgi?id=577029 https://github.com/eclipse-equinox/p2/issues/235 • CWE-829: Inclusion of Functionality from Untrusted Control Sphere •

CVSS: 5.3EPSS: 0%CPEs: 1EXPL: 1

In Eclipse Lyo versions 1.0.0 to 4.1.0, a TransformerFactory is initialized with the defaults that do not restrict DTD loading when working with RDF/XML. This allows an attacker to cause an external DTD to be retrieved. En Eclipse Lyo versiones 1.0.0 a 4.1.0, un TransformerFactory es inicializado con los valores predeterminados que no restringen la carga de DTD cuando es trabajado con RDF/XML. Esto permite a un atacante causar la recuperación de un DTD externo • https://gitlab.eclipse.org/eclipsefdn/emo-team/emo/-/issues/287 • CWE-611: Improper Restriction of XML External Entity Reference •