Apache Geronimo 2.2.1 and previous versions computes hash values for form parameters without restricting the ability to trigger hash collisions predictably, which allows remote malicious users to cause a denial of service (CPU consumption) by sending many crafted parameters. NOTE: this might overlap CVE-2011-4461.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
apache geronimo 2.1.5 |
||
apache geronimo 2.1.8 |
||
apache geronimo 1.0 |
||
apache geronimo 2.1.2 |
||
apache geronimo 2.1.6 |
||
apache geronimo 1.1 |
||
apache geronimo 2.2 |
||
apache geronimo 2.1.1 |
||
apache geronimo 1.1.1 |
||
apache geronimo 2.1 |
||
apache geronimo 2.1.3 |
||
apache geronimo 1.2 |
||
apache geronimo 2.1.4 |
||
apache geronimo |
||
apache geronimo 2.0.1 |
||
apache geronimo 2.0.2 |
||
apache geronimo 2.1.7 |