Note:
This project will be discontinued after December 13, 2021. [more]
Product:
Edeploy
(Redhat)Repositories |
Unknown: This might be proprietary software. |
#Vulnerabilities | 5 |
Date | Id | Summary | Products | Score | Patch | Annotated |
---|---|---|---|---|---|---|
2019-12-15 | CVE-2014-3701 | eDeploy has tmp file race condition flaws | Edeploy, Jboss_enterprise_web_server | N/A | ||
2019-12-15 | CVE-2014-3699 | eDeploy has RCE via cPickle deserialization of untrusted data | Edeploy, Jboss_enterprise_web_server | N/A | ||
2019-11-21 | CVE-2014-3700 | eDeploy through at least 2014-10-14 has remote code execution due to eval() of untrusted data | Edeploy, Jboss_enterprise_web_server | N/A | ||
2017-09-19 | CVE-2014-8174 | eDeploy makes it easier for remote attackers to execute arbitrary code by leveraging use of HTTP to download files. | Edeploy | 9.8 | ||
2017-10-16 | CVE-2014-3702 | Directory traversal vulnerability in eNovance eDeploy allows remote attackers to create arbitrary directories and files and consequently cause a denial of service (resource consumption) via a .. (dot dot) the session parameter. | Edeploy | 9.1 |