Skip to content

GitLab

  • Menu
Projects Groups Snippets
    • Loading...
  • Help
    • Help
    • Support
    • Community forum
    • Submit feedback
    • Contribute to GitLab
  • Sign in / Register
  • T ticket
  • Project information
    • Project information
    • Activity
    • Labels
    • Members
  • Repository
    • Repository
    • Files
    • Commits
    • Branches
    • Tags
    • Contributors
    • Graph
    • Compare
  • Issues 1,809
    • Issues 1,809
    • List
    • Boards
    • Service Desk
    • Milestones
  • Merge requests 0
    • Merge requests 0
  • CI/CD
    • CI/CD
    • Pipelines
    • Jobs
    • Schedules
  • Deployments
    • Deployments
    • Environments
    • Releases
  • Monitor
    • Monitor
    • Incidents
  • Packages & Registries
    • Packages & Registries
    • Package Registry
    • Infrastructure Registry
  • Analytics
    • Analytics
    • CI/CD
    • Repository
    • Value stream
  • Wiki
    • Wiki
  • Snippets
    • Snippets
  • Activity
  • Graph
  • Create a new issue
  • Jobs
  • Commits
  • Issue Boards
Collapse sidebar
  • Administrator
  • ticket
  • Issues
  • #1709

Closed
Open
Created Mar 14, 2024 by Administrator@rootMaintainer

Findings for Container Security, Low, [TheRedHatter/javagoof:exploits/tomcat-rce/Dockerfile]:Improper Input Validation

Created by: armorcodegithubpreprod[bot]

Findings for Container Security, Low, [TheRedHatter/javagoof:exploits/tomcat-rce/Dockerfile]:Improper Input Validation

Component Details

  • Exploit Maturity: no-known-exploit
  • Vulnerable Package: -
  • Current Version: -
  • Vulnerable Version(s): >*
  • Vulnerable Path: >null

NVD Description

Note: Versions mentioned in the description apply to the upstream coreutils package.

chroot in GNU coreutils, when used with --userspec, allows local users to escape to the parent session via a crafted TIOCSTI ioctl call, which pushes characters to the terminal's input buffer.

References

  • Debian Security Tracker
  • MLIST
  • OSS security Advisory
  • OSS security Advisory
  • Ubuntu CVE Tracker

Origin : null Type : null Image Id : null

Snyk Project Status: Active



Component Details

  • Exploit Maturity: no-known-exploit
  • Vulnerable Package: -
  • Current Version: -
  • Vulnerable Version(s): >*
  • Vulnerable Path: >null

NVD Description

Note: Versions mentioned in the description apply to the upstream gnutls28 package.

The SSL protocol, as used in certain configurations in Microsoft Windows and Microsoft Internet Explorer, Mozilla Firefox, Google Chrome, Opera, and other products, encrypts data by using CBC mode with chained initialization vectors, which allows man-in-the-middle attackers to obtain plaintext HTTP headers via a blockwise chosen-boundary attack (BCBA) on an HTTPS session, in conjunction with JavaScript code that uses (1) the HTML5 WebSocket API, (2) the Java URLConnection API, or (3) the Silverlight WebClient API, aka a "BEAST" attack.

References

  • APPLE
  • APPLE
  • Apple Security Advisory
  • Apple Security Advisory
  • Apple Security Advisory
  • Apple Security Advisory
  • Apple Security Advisory
  • Apple Security Advisory
  • Apple Security Announcement
  • Apple Security Announcement
  • Apple Security Announcement
  • Apple Security Announcement
  • Apple Security Announcement
  • CERT
  • Cert Vulnerability Note
  • Chrome Release
  • CONFIRM
  • CONFIRM
  • CONFIRM
  • CONFIRM
  • CONFIRM
  • CONFIRM
  • CONFIRM
  • CONFIRM
  • CONFIRM
  • CONFIRM
  • CONFIRM
  • CONFIRM
  • CONFIRM
  • CONFIRM
  • CONFIRM
  • CONFIRM
  • CONFIRM
  • CONFIRM
  • CONFIRM
  • CONFIRM
  • Debian Security Advisory
  • Debian Security Tracker
  • Gentoo Security Advisory
  • Gentoo Security Advisory
  • HP
  • HP Security Bulletin
  • HP Security Bulletin
  • HP Security Bulletin
  • HP Security Bulletin
  • HP Security Bulletin
  • HP Security Bulletin
  • MISC
  • MISC
  • MISC
  • MISC
  • MISC
  • MISC
  • MISC
  • MISC
  • MS
  • MS
  • OpenSuse Security Announcement
  • OpenSuse Security Announcement
  • OpenSuse Security Announcement
  • Oracle Security Bulletin
  • Oracle Security Bulletin
  • Oracle Security Bulletin
  • OSVDB
  • Oval Security
  • RedHat Bugzilla Bug
  • RedHat Security Advisory
  • RedHat Security Advisory
  • Secunia Advisory
  • Secunia Advisory
  • Secunia Advisory
  • Secunia Advisory
  • Secunia Advisory
  • Secunia Advisory
  • Secunia Advisory
  • Secunia Advisory
  • Secunia Advisory
  • Secunia Advisory
  • Security Focus
  • Security Focus
  • Security Tracker
  • Security Tracker
  • Security Tracker
  • Security Tracker
  • SUSE
  • SUSE
  • SUSE
  • Ubuntu CVE Tracker
  • Ubuntu Security Advisory

Origin : null Type : null Image Id : null

Snyk Project Status: Active



Component Details

  • Exploit Maturity: no-known-exploit
  • Vulnerable Package: -
  • Current Version: -
  • Vulnerable Version(s): >*
  • Vulnerable Path: >null

NVD Description

Note: Versions mentioned in the description apply to the upstream openjpeg2 package.

Out-of-bounds accesses in the functions pi_next_lrcp, pi_next_rlcp, pi_next_rpcl, pi_next_pcrl, pi_next_rpcl, and pi_next_cprl in openmj2/pi.c in OpenJPEG through 2.3.0 allow remote attackers to cause a denial of service (application crash).

References

  • Debian Security Tracker
  • GitHub Commit
  • Security Focus
  • Ubuntu CVE Tracker

Origin : null Type : null Image Id : null

Snyk Project Status: Active



Component Details

  • Exploit Maturity: no-known-exploit
  • Vulnerable Package: -
  • Current Version: -
  • Vulnerable Version(s): >*
  • Vulnerable Path: >null

NVD Description

Note: Versions mentioned in the description apply to the upstream binutils package.

There's a flaw in the BFD library of binutils in versions before 2.36. An attacker who supplies a crafted file to an application linked with BFD, and using the DWARF functionality, could cause an impact to system availability by way of excessive memory consumption.

References

  • ADVISORY
  • FEDORA
  • FEDORA
  • FEDORA
  • MISC

Origin : null Type : null Image Id : null

Snyk Project Status: Active



Component Details

  • Exploit Maturity: no-known-exploit
  • Vulnerable Package: -
  • Current Version: -
  • Vulnerable Version(s): >*
  • Vulnerable Path: >null

NVD Description

Note: Versions mentioned in the description apply to the upstream git package.

GIT version 2.15.1 and earlier contains a Input Validation Error vulnerability in Client that can result in problems including messing up terminal configuration to RCE. This attack appear to be exploitable via The user must interact with a malicious git server, (or have their traffic modified in a MITM attack).

References

  • Debian Security Tracker
  • http://www.batterystapl.es/2018/01/security-implications-of-ansi-escape.html
  • Ubuntu CVE Tracker

Origin : null Type : null Image Id : null

Snyk Project Status: Active



Component Details

  • Exploit Maturity: no-known-exploit
  • Vulnerable Package: -
  • Current Version: -
  • Vulnerable Version(s): >*
  • Vulnerable Path: >null

NVD Description

Note: Versions mentioned in the description apply to the upstream binutils package.

GNU binutils gold gold v1.11-v1.16 (GNU binutils v2.21-v2.31.1) is affected by: Improper Input Validation, Signed/Unsigned Comparison, Out-of-bounds Read. The impact is: Denial of service. The component is: gold/fileread.cc:497, elfcpp/elfcpp_file.h:644. The attack vector is: An ELF file with an invalid e_shoff header field must be opened.

References

  • CONFIRM
  • Debian Security Tracker
  • MISC
  • Netapp Security Advisory
  • Ubuntu CVE Tracker

Origin : null Type : null Image Id : null

Snyk Project Status: Active



Assignee
Assign to
Time tracking