Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-fq7g-96mj-hhf9

Опубликовано: 17 мая 2022
Источник: github
Github: Не прошло ревью

Описание

The XML4J parser in IBM WebSphere Message Broker 6.1 before 6.1.0.12, 7.0 before 7.0.0.7, and 8.0 before 8.0.0.4 and IBM Integration Bus 9.0 before 9.0.0.1 allows remote attackers to cause a denial of service (memory consumption) via a crafted XML document that triggers expansion for many entities.

The XML4J parser in IBM WebSphere Message Broker 6.1 before 6.1.0.12, 7.0 before 7.0.0.7, and 8.0 before 8.0.0.4 and IBM Integration Bus 9.0 before 9.0.0.1 allows remote attackers to cause a denial of service (memory consumption) via a crafted XML document that triggers expansion for many entities.

EPSS

Процентиль: 81%
0.01552
Низкий

Связанные уязвимости

redhat
почти 12 лет назад

The XML4J parser in IBM WebSphere Message Broker 6.1 before 6.1.0.12, 7.0 before 7.0.0.7, and 8.0 before 8.0.0.4 and IBM Integration Bus 9.0 before 9.0.0.1 allows remote attackers to cause a denial of service (memory consumption) via a crafted XML document that triggers expansion for many entities.

nvd
почти 12 лет назад

The XML4J parser in IBM WebSphere Message Broker 6.1 before 6.1.0.12, 7.0 before 7.0.0.7, and 8.0 before 8.0.0.4 and IBM Integration Bus 9.0 before 9.0.0.1 allows remote attackers to cause a denial of service (memory consumption) via a crafted XML document that triggers expansion for many entities.

fstec
почти 12 лет назад

Уязвимость программного обеспечения WebSphere Application Server, позволяющая удаленному злоумышленнику нарушить доступность защищаемой информации

suse-cvrf
больше 10 лет назад

Security update for IBM Java

suse-cvrf
больше 10 лет назад

Security update for IBM Java

EPSS

Процентиль: 81%
0.01552
Низкий