13 results (0.012 seconds)

CVSS: 5.3EPSS: 0%CPEs: 6EXPL: 0

14 Oct 2024 — There exists a security vulnerability in Jetty's DosFilter which can be exploited by unauthorized users to cause remote denial-of-service (DoS) attack on the server using DosFilter. By repeatedly sending crafted requests, attackers can trigger OutofMemory errors and exhaust the server's memory finally. A flaw was found in Jetty. The DosFilter can be exploited remotely by unauthorized users to trigger an out-of-memory condition by repeatedly sending specially crafted requests. This issue may cause a crash, l... • https://github.com/jetty/jetty.project/security/advisories/GHSA-7hcf-ppf8-5w5h • CWE-400: Uncontrolled Resource Consumption •

CVSS: 10.0EPSS: 0%CPEs: 4EXPL: 0

26 Feb 2024 — Jetty is a Java based web server and servlet engine. An HTTP/2 SSL connection that is established and TCP congested will be leaked when it times out. An attacker can cause many connections to end up in this state, and the server may run out of file descriptors, eventually causing the server to stop accepting new connections from valid clients. The vulnerability is patched in 9.4.54, 10.0.20, 11.0.20, and 12.0.6. Jetty es un servidor web y motor de servlet basado en Java. • http://www.openwall.com/lists/oss-security/2024/03/20/2 • CWE-400: Uncontrolled Resource Consumption •

CVSS: 9.1EPSS: 0%CPEs: 2EXPL: 0

08 Jan 2008 — Mortbay Jetty 6.1.5 and 6.1.6 allows remote attackers to bypass protection mechanisms and read the source of files via multiple '/' (slash) characters in the URI. Mortbay Jetty versiones 6.1.5 y 6.1.6, permite a atacantes remotos omitir los mecanismos de protección y leer la fuente de archivos por medio de múltiples caracteres "/" (barra diagonal) en el URI. • http://jira.codehaus.org/browse/JETTY-386#action_117699 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVSS: 5.3EPSS: 2%CPEs: 11EXPL: 0

05 Dec 2007 — Cross-site scripting (XSS) vulnerability in Dump Servlet in Mortbay Jetty before 6.1.6rc1 allows remote attackers to inject arbitrary web script or HTML via unspecified parameters and cookies. Vulnerabilidad de secuencias de comandos en sitios cruzados (XSS) en Dump Servlet de Mortbay Jetty anterior a 6.1.6rc1 permite a atacantes remotos inyectar secuencias de comandos web o HTML de su elección mediante parámetro y cookies no especificados. • http://jira.codehaus.org/browse/JETTY-452 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 7.5EPSS: 5%CPEs: 11EXPL: 0

05 Dec 2007 — Mortbay Jetty before 6.1.6rc1 does not properly handle "certain quote sequences" in HTML cookie parameters, which allows remote attackers to hijack browser sessions via unspecified vectors. Mortbay Jetty anterior a 6.1.6rc1 no maneja adecuadamente "ciertas secuencias de comillas" en parámetros de cookie HTML, lo cual permite a atacantes remotos secuestrar sesiones del navegador mediante vectores no especificados. • http://osvdb.org/42496 •

CVSS: 5.0EPSS: 4%CPEs: 1EXPL: 0

05 Dec 2007 — CRLF injection vulnerability in Mortbay Jetty before 6.1.6rc0 allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via unspecified vectors. Vulnerabilidad de inyección de retorno de carro y salto de línea (CRLF) en Mortbay Jetty anterior a 6.1.6rc0 permite a atacantes remotos inyectar cabeceras HTTP de su elección y llevar a cabo ataques de división de respuesta HTTP mediante vectores no especificados. • http://lists.opensuse.org/opensuse-security-announce/2009-02/msg00002.html • CWE-94: Improper Control of Generation of Code ('Code Injection') •

CVSS: 8.8EPSS: 0%CPEs: 13EXPL: 0

07 Feb 2007 — Jetty before 4.2.27, 5.1 before 5.1.12, 6.0 before 6.0.2, and 6.1 before 6.1.0pre3 generates predictable session identifiers using java.util.random, which makes it easier for remote attackers to guess a session identifier through brute force attacks, bypass authentication requirements, and possibly conduct cross-site request forgery attacks. Jetty anterior al 4.2.27, 5.1 anterior al 5.1.12, 6.0 anterior al 6.0.2 y 6.1 anterior al 6.1.0pre3 genera identificadores de sesión predecibles utilizando java.util.ra... • http://archives.neohapsis.com/archives/bugtraq/2007-02/0070.html •

CVSS: 7.5EPSS: 1%CPEs: 1EXPL: 2

02 Jun 2006 — Directory traversal vulnerability in jetty 6.0.x (jetty6) beta16 allows remote attackers to read arbitrary files via a %2e%2e%5c (encoded ../) in the URL. NOTE: this might be the same issue as CVE-2005-3747. • https://www.exploit-db.com/exploits/18571 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVSS: 5.3EPSS: 0%CPEs: 1EXPL: 1

02 Jun 2006 — jetty 6.0.x (jetty6) beta16 allows remote attackers to read arbitrary script source code via a capital P in the .jsp extension, and probably other mixed case manipulations. • http://securitytracker.com/id?1016168 •

CVSS: 7.5EPSS: 1%CPEs: 67EXPL: 0

31 Dec 2004 — HttpRequest.java in Jetty HTTP Server before 4.2.19 allows remote attackers to cause denial of service (memory usage and application crash) via HTTP requests with a large Content-Length. • http://cvs.sourceforge.net/viewcvs.py/jetty/Jetty/src/org/mortbay/http/HttpRequest.java?r1=1.75&r2=1.76 •