CVE-2007-5614
https://notcve.org/view.php?id=CVE-2007-5614
Mortbay Jetty before 6.1.6rc1 does not properly handle "certain quote sequences" in HTML cookie parameters, which allows remote attackers to hijack browser sessions via unspecified vectors. Mortbay Jetty anterior a 6.1.6rc1 no maneja adecuadamente "ciertas secuencias de comillas" en parámetros de cookie HTML, lo cual permite a atacantes remotos secuestrar sesiones del navegador mediante vectores no especificados. • http://osvdb.org/42496 http://secunia.com/advisories/27925 http://secunia.com/advisories/30941 http://secunia.com/advisories/35143 http://svn.codehaus.org/jetty/jetty/trunk/VERSION.txt http://www.kb.cert.org/vuls/id/438616 http://www.securityfocus.com/bid/26695 https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00227.html https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00250.html •
CVE-2007-5615
https://notcve.org/view.php?id=CVE-2007-5615
CRLF injection vulnerability in Mortbay Jetty before 6.1.6rc0 allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via unspecified vectors. Vulnerabilidad de inyección de retorno de carro y salto de línea (CRLF) en Mortbay Jetty anterior a 6.1.6rc0 permite a atacantes remotos inyectar cabeceras HTTP de su elección y llevar a cabo ataques de división de respuesta HTTP mediante vectores no especificados. • http://lists.opensuse.org/opensuse-security-announce/2009-02/msg00002.html http://osvdb.org/42495 http://secunia.com/advisories/27925 http://secunia.com/advisories/30941 http://secunia.com/advisories/35143 http://svn.codehaus.org/jetty/jetty/trunk/VERSION.txt http://www.kb.cert.org/vuls/id/212984 http://www.securityfocus.com/bid/26696 https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00227.html https://www.redhat.com/archives/fedora-package-announce/2008- • CWE-94: Improper Control of Generation of Code ('Code Injection') •
CVE-2005-3747 – promise webpam 2.2.0.13 - Multiple Vulnerabilities
https://notcve.org/view.php?id=CVE-2005-3747
Unspecified vulnerability in Jetty before 5.1.6 allows remote attackers to obtain source code of JSP pages, possibly involving requests for .jsp files with URL-encoded backslash ("%5C") characters. NOTE: this might be the same issue as CVE-2006-2758. Vulnerabilidad no especificada en Jetty anteriores a 5.1.6 permite a atacantes remotos obtener el código fuente de páginas JSP, posiblemente implicando peticiones de ficheros .jsp con caractéres contra barra URL-codificado ("%C"). NOTA: puede tratarse la misma cuestión que en el CVE-2006-2758. • https://www.exploit-db.com/exploits/18571 http://secunia.com/advisories/17659 http://secunia.com/advisories/22669 http://sourceforge.net/project/shownotes.php?release_id=372086&group_id=7322 http://www.securityfocus.com/archive/1/450315/100/0/threaded http://www.securityfocus.com/bid/15515 http://www.vupen.com/english/advisories/2005/2515 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •
CVE-2004-2478
https://notcve.org/view.php?id=CVE-2004-2478
Unspecified vulnerability in Jetty HTTP Server, as used in (1) IBM Trading Partner Interchange before 4.2.4, (2) CA Unicenter Web Services Distributed Management (WSDM) before 3.11, and possibly other products, allows remote attackers to read arbitrary files via a .. (dot dot) in the URL. • http://lists.grok.org.uk/pipermail/full-disclosure/2006-October/049846.html http://secunia.com/advisories/12703 http://secunia.com/advisories/22229 http://securitytracker.com/id?1011545 http://securitytracker.com/id?1016975 http://www-1.ibm.com/support/docview.wss?uid=swg21178665 http://www.osvdb.org/10490 http://www.securityfocus.com/archive/1/447648/100/0/threaded http://www.securityfocus.com/bid/11330 http://www.vupen.com/english/advisories/2006/3873 https://exchange •
CVE-2004-2381
https://notcve.org/view.php?id=CVE-2004-2381
HttpRequest.java in Jetty HTTP Server before 4.2.19 allows remote attackers to cause denial of service (memory usage and application crash) via HTTP requests with a large Content-Length. • http://cvs.sourceforge.net/viewcvs.py/jetty/Jetty/src/org/mortbay/http/HttpRequest.java?r1=1.75&r2=1.76 http://secunia.com/advisories/11166 http://sourceforge.net/project/shownotes.php?release_id=224743 http://www.osvdb.org/4387 http://www.securityfocus.com/bid/9917 https://exchange.xforce.ibmcloud.com/vulnerabilities/15537 •