CVE-2011-5035

Oracle Glassfish Server < 3.1.1 - Improper Input Validation

Title source: rule

Description

Oracle Glassfish 2.1.1, 3.0.1, and 3.1.1, as used in Communications Server 2.0, Sun Java System Application Server 8.1 and 8.2, and possibly other products, computes hash values for form parameters without restricting the ability to trigger hash collisions predictably, which allows remote attackers to cause a denial of service (CPU consumption) by sending many crafted parameters, aka Oracle security ticket S0104869.

Exploits (1)

exploitdb WORKING POC VERIFIED
by rgod · phpwebappsphp
https://www.exploit-db.com/exploits/2012

References (25)

... and 5 more

Scores

EPSS 0.5863
EPSS Percentile 98.2%

Details

CWE
CWE-20
Status published
Products (3)
oracle/glassfish_server 2.1.1
oracle/glassfish_server 3.0.1
oracle/glassfish_server < 3.1.1
Published Dec 30, 2011
Tracked Since Feb 18, 2026