VYPR
Unrated severityNVD Advisory· Published Dec 30, 2011· Updated Apr 29, 2026

CVE-2011-5035

CVE-2011-5035

Description

Oracle Glassfish 2.1.1, 3.0.1, and 3.1.1, as used in Communications Server 2.0, Sun Java System Application Server 8.1 and 8.2, and possibly other products, computes hash values for form parameters without restricting the ability to trigger hash collisions predictably, which allows remote attackers to cause a denial of service (CPU consumption) by sending many crafted parameters, aka Oracle security ticket S0104869.

Affected products

3
  • cpe:2.3:a:oracle:glassfish_server:*:*:*:*:*:*:*:*+ 2 more
    • cpe:2.3:a:oracle:glassfish_server:*:*:*:*:*:*:*:*range: <=3.1.1
    • cpe:2.3:a:oracle:glassfish_server:2.1.1:*:*:*:*:*:*:*
    • cpe:2.3:a:oracle:glassfish_server:3.0.1:*:*:*:*:*:*:*

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

25

News mentions

0

No linked articles in our index yet.