Skip to content

GitLab

  • Menu
Projects Groups Snippets
    • Loading...
  • Help
    • Help
    • Support
    • Community forum
    • Submit feedback
    • Contribute to GitLab
  • Sign in / Register
  • T ticket
  • Project information
    • Project information
    • Activity
    • Labels
    • Members
  • Repository
    • Repository
    • Files
    • Commits
    • Branches
    • Tags
    • Contributors
    • Graph
    • Compare
  • Issues 1,809
    • Issues 1,809
    • List
    • Boards
    • Service Desk
    • Milestones
  • Merge requests 0
    • Merge requests 0
  • CI/CD
    • CI/CD
    • Pipelines
    • Jobs
    • Schedules
  • Deployments
    • Deployments
    • Environments
    • Releases
  • Monitor
    • Monitor
    • Incidents
  • Packages & Registries
    • Packages & Registries
    • Package Registry
    • Infrastructure Registry
  • Analytics
    • Analytics
    • CI/CD
    • Repository
    • Value stream
  • Wiki
    • Wiki
  • Snippets
    • Snippets
  • Activity
  • Graph
  • Create a new issue
  • Jobs
  • Commits
  • Issue Boards
Collapse sidebar
  • Administrator
  • ticket
  • Issues
  • #1819

Closed
Open
Created Mar 14, 2024 by Administrator@rootMaintainer

Findings for Container Security, Low, [TheRedHatter/javagoof:exploits/tomcat-rce/Dockerfile]:Resource Management Errors

Created by: armorcodegithubpreprod[bot]

Findings for Container Security, Low, [TheRedHatter/javagoof:exploits/tomcat-rce/Dockerfile]:Resource Management Errors

Component Details

  • Exploit Maturity: no-known-exploit
  • Vulnerable Package: -
  • Current Version: -
  • Vulnerable Version(s): >*
  • Vulnerable Path: >null

NVD Description

Note: Versions mentioned in the description apply to the upstream glibc package.

The glob implementation in the GNU C Library (aka glibc or libc6) allows remote authenticated users to cause a denial of service (CPU and memory consumption) via crafted glob expressions that do not match any pathnames, as demonstrated by glob expressions in STAT commands to an FTP daemon, a different vulnerability than CVE-2010-2632.

References

  • Debian Security Tracker
  • http://cxib.net/stuff/glob-0day.c
  • http://securityreason.com/achievement_securityalert/89
  • http://securityreason.com/exploitalert/9223
  • MISC
  • MISC

Origin : null Type : null Image Id : null

Snyk Project Status: Active



Component Details

  • Exploit Maturity: no-known-exploit
  • Vulnerable Package: -
  • Current Version: -
  • Vulnerable Version(s): >*
  • Vulnerable Path: >null

NVD Description

Note: Versions mentioned in the description apply to the upstream imagemagick package.

Multiple unspecified vulnerabilities in GraphicsMagick before 1.2.4 allow remote attackers to cause a denial of service (crash, infinite loop, or memory consumption) via (a) unspecified vectors in the (1) AVI, (2) AVS, (3) DCM, (4) EPT, (5) FITS, (6) MTV, (7) PALM, (8) RLA, and (9) TGA decoder readers; and (b) the GetImageCharacteristics function in magick/image.c, as reachable from a crafted (10) PNG, (11) JPEG, (12) BMP, or (13) TIFF file.

References

  • Debian Security Tracker
  • http://sourceforge.net/forum/forum.php?forum_id=841176
  • http://sourceforge.net/project/shownotes.php?release_id=610253
  • http://www.vupen.com/english/advisories/2008/1984/references
  • http://xforce.iss.net/xforce/xfdb/43511
  • http://xforce.iss.net/xforce/xfdb/43513
  • OpenSuse Security Announcement
  • Secunia Advisory
  • Secunia Advisory
  • Security Focus
  • Security Tracker
  • X-force Vulnerability Report
  • X-force Vulnerability Report

Origin : null Type : null Image Id : null

Snyk Project Status: Active



Component Details

  • Exploit Maturity: no-known-exploit
  • Vulnerable Package: -
  • Current Version: -
  • Vulnerable Version(s): >*
  • Vulnerable Path: >null

NVD Description

Note: Versions mentioned in the description apply to the upstream libwmf package.

The (a) imagearc and (b) imagefilledarc functions in GD Graphics Library (libgd) before 2.0.35 allow attackers to cause a denial of service (CPU consumption) via a large (1) start or (2) end angle degree value.

References

  • BUGTRAQ
  • CONFIRM
  • CONFIRM
  • CONFIRM
  • CONFIRM
  • Debian Security Advisory
  • Debian Security Tracker
  • FEDORA
  • FEDORA
  • Fedora Security Announcement
  • Fedora Security Announcement
  • Gentoo Security Advisory
  • Gentoo Security Advisory
  • Gentoo Security Advisory
  • MISC
  • OSVDB
  • RedHat Bugzilla Bug
  • Secunia Advisory
  • Secunia Advisory
  • Secunia Advisory
  • Secunia Advisory
  • Secunia Advisory
  • Secunia Advisory
  • Secunia Advisory
  • Secunia Advisory
  • Secunia Advisory
  • Secunia Advisory
  • Secunia Advisory
  • Security Focus
  • SUSE
  • TRUSTIX
  • VUPEN

Origin : null Type : null Image Id : null

Snyk Project Status: Active



Assignee
Assign to
Time tracking