Логотип exploitDog
bind:CVE-2015-5176
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2015-5176

Количество 3

Количество 3

redhat логотип

CVE-2015-5176

больше 10 лет назад

The PortletRequestDispatcher in PortletBridge, as used in Red Hat JBoss Portal 6.2.0, does not properly enforce the security constraints of servlets, which allows remote attackers to gain access to resources via a request that asks to render a non-JSF resource.

CVSS2: 4.9
EPSS: Низкий
nvd логотип

CVE-2015-5176

больше 10 лет назад

The PortletRequestDispatcher in PortletBridge, as used in Red Hat JBoss Portal 6.2.0, does not properly enforce the security constraints of servlets, which allows remote attackers to gain access to resources via a request that asks to render a non-JSF resource.

CVSS2: 5.8
EPSS: Низкий
github логотип

GHSA-66rg-hrjv-v265

больше 3 лет назад

The PortletRequestDispatcher in PortletBridge, as used in Red Hat JBoss Portal 6.2.0, does not properly enforce the security constraints of servlets, which allows remote attackers to gain access to resources via a request that asks to render a non-JSF resource.

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
redhat логотип
CVE-2015-5176

The PortletRequestDispatcher in PortletBridge, as used in Red Hat JBoss Portal 6.2.0, does not properly enforce the security constraints of servlets, which allows remote attackers to gain access to resources via a request that asks to render a non-JSF resource.

CVSS2: 4.9
0%
Низкий
больше 10 лет назад
nvd логотип
CVE-2015-5176

The PortletRequestDispatcher in PortletBridge, as used in Red Hat JBoss Portal 6.2.0, does not properly enforce the security constraints of servlets, which allows remote attackers to gain access to resources via a request that asks to render a non-JSF resource.

CVSS2: 5.8
0%
Низкий
больше 10 лет назад
github логотип
GHSA-66rg-hrjv-v265

The PortletRequestDispatcher in PortletBridge, as used in Red Hat JBoss Portal 6.2.0, does not properly enforce the security constraints of servlets, which allows remote attackers to gain access to resources via a request that asks to render a non-JSF resource.

0%
Низкий
больше 3 лет назад

Уязвимостей на страницу