Page 6 of 52 results (0.012 seconds)

CVSS: 5.3EPSS: 87%CPEs: 107EXPL: 0

29 May 2014 — Integer overflow in the parseChunkHeader function in java/org/apache/coyote/http11/filters/ChunkedInputFilter.java in Apache Tomcat before 6.0.40, 7.x before 7.0.53, and 8.x before 8.0.4 allows remote attackers to cause a denial of service (resource consumption) via a malformed chunk size in chunked transfer coding of a request during the streaming of data. Desbordamiento de enteros en la función parseChunkHeader en java/org/apache/coyote/http11/filters/ChunkedInputFilter.java en Apache Tomcat anterior a 6.... • http://advisories.mageia.org/MGASA-2014-0268.html • CWE-189: Numeric Errors CWE-400: Uncontrolled Resource Consumption •

CVSS: 9.8EPSS: 92%CPEs: 74EXPL: 4

07 Feb 2014 — MultipartStream.java in Apache Commons FileUpload before 1.3.1, as used in Apache Tomcat, JBoss Web, and other products, allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a crafted Content-Type header that bypasses a loop's intended exit conditions. MultipartStream.java en Apache Commons FileUpload anterior a 1.3.1, utilizado en Apache Tomcat, JBoss Web y otros productos, permite a atacantes remotos causar una denegación de servicio (bucle infinito y consumo de CPU... • https://packetstorm.news/files/id/180508 • CWE-264: Permissions, Privileges, and Access Controls •