Lucene search

K
RedhatJboss Enterprise Application Platform

231 matches found

CVE
CVE
added 2015/04/21 5:59 p.m.52 views

CVE-2014-3586

The default configuration for the Command Line Interface in Red Hat Enterprise Application Platform before 6.4.0 and WildFly (formerly JBoss Application Server) uses weak permissions for .jboss-cli-history, which allows local users to obtain sensitive information via unspecified vectors.

2.1CVSS6.1AI score0.00049EPSS
CVE
CVE
added 2013/02/05 11:55 p.m.51 views

CVE-2011-4575

Cross-site scripting (XSS) vulnerability in the JMX console in JBoss Enterprise Application Platform (EAP) before 5.2.0, Web Platform (EWP) before 5.2.0, BRMS Platform before 5.3.1, and SOA Platform before 5.3.1 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.

4.3CVSS5.4AI score0.01272EPSS
CVE
CVE
added 2013/02/05 11:55 p.m.51 views

CVE-2012-3370

The SecurityAssociation.getCredential method in JBoss Enterprise Application Platform (EAP) before 5.2.0, Web Platform (EWP) before 5.2.0, BRMS Platform before 5.3.1, and SOA Platform before 5.3.1 returns the credentials of the previous user when a security context is not provided, which allows rem...

5.8CVSS5.7AI score0.01673EPSS
CVE
CVE
added 2014/07/07 2:55 p.m.51 views

CVE-2014-0248

org.jboss.seam.web.AuthenticationFilter in Red Hat JBoss Web Framework Kit 2.5.0, JBoss Enterprise Application Platform (JBEAP) 5.2.0, and JBoss Enterprise Web Platform (JBEWP) 5.2.0 allows remote attackers to execute arbitrary code via a crafted authentication header, related to Seam logging.

6.8CVSS9.6AI score0.02348EPSS
CVE
CVE
added 2017/06/08 6:29 p.m.51 views

CVE-2016-3690

The PooledInvokerServlet in JBoss EAP 4.x and 5.x allows remote attackers to execute arbitrary code via a crafted serialized payload.

9.8CVSS9.6AI score0.01894EPSS
CVE
CVE
added 2021/06/02 12:15 p.m.51 views

CVE-2020-14317

It was found that the issue for security flaw CVE-2019-3805 appeared again in a further version of JBoss Enterprise Application Platform - Continuous Delivery (EAP-CD) introducing regression. An attacker could exploit this by modifying the PID file in /var/run/jboss-eap/ allowing the init.d script ...

5.5CVSS4.5AI score0.00042EPSS
CVE
CVE
added 2013/01/05 12:55 a.m.50 views

CVE-2012-4549

The processInvocation function in org.jboss.as.ejb3.security.AuthorizationInterceptor in JBoss Enterprise Application Platform (aka JBoss EAP or JBEAP) before 6.0.1, authorizes all requests when no roles are allowed for an Enterprise Java Beans (EJB) method invocation, which allows attackers to byp...

5.8CVSS6.4AI score0.00263EPSS
CVE
CVE
added 2009/12/15 6:30 p.m.49 views

CVE-2009-3554

Twiddle in Red Hat JBoss Enterprise Application Platform (aka JBoss EAP or JBEAP) 4.2 before 4.2.0.CP08 and 4.3 before 4.3.0.CP07 writes the JMX password, and other command-line arguments, to the twiddle.log file, which allows local users to obtain sensitive information by reading this file.

2.1CVSS5.5AI score0.00065EPSS
CVE
CVE
added 2013/10/28 9:55 p.m.49 views

CVE-2012-4572

Red Hat JBoss Enterprise Application Platform (EAP) before 6.1.0 and JBoss Portal before 6.1.0 does not load the implementation of a custom authorization module for a new application when an implementation is already loaded and the modules share class names, which allows local users to control cert...

3.7CVSS5.4AI score0.00153EPSS
CVE
CVE
added 2013/08/16 4:55 p.m.49 views

CVE-2013-4213

Red Hat JBoss Enterprise Application Platform (EAP) 6.1.0 does not properly cache EJB invocations by the EJB client API, which allows remote attackers to hijack sessions by using an EJB client.

6.4CVSS6.6AI score0.00587EPSS
CVE
CVE
added 2012/01/27 3:55 p.m.47 views

CVE-2011-4608

mod_cluster in JBoss Enterprise Application Platform 5.1.2 for Red Hat Linux allows worker nodes to register with arbitrary virtual hosts, which allows remote attackers to bypass intended access restrictions and provide malicious content, hijack sessions, and steal credentials by registering from a...

7.5CVSS6.9AI score0.00742EPSS
CVE
CVE
added 2013/01/05 12:55 a.m.47 views

CVE-2012-4550

JBoss Enterprise Application Platform (aka JBoss EAP or JBEAP) before 6.0.1, when using role-based authorization for Enterprise Java Beans (EJB) access, does not call the intended authorization modules, which prevents JACC permissions from being applied and allows remote attackers to obtain access ...

6.4CVSS6.5AI score0.00273EPSS
CVE
CVE
added 2015/02/20 4:59 p.m.47 views

CVE-2014-0005

PicketBox and JBossSX, as used in Red Hat JBoss Enterprise Application Platform (JBEAP) 6.2.2 and JBoss BRMS before 6.0.3 roll up patch 2, allows remote authenticated users to read and modify the application sever configuration and state by deploying a crafted application.

3.6CVSS8.6AI score0.00207EPSS
CVE
CVE
added 2012/10/22 11:55 p.m.46 views

CVE-2012-1154

mod_cluster 1.0.10 before 1.0.10 CP03 and 1.1.x before 1.1.4, as used in JBoss Enterprise Application Platform 5.1.2, when "ROOT" is set to excludedContexts, exposes the root context of the server, which allows remote attackers to bypass access restrictions and gain access to applications deployed ...

4.3CVSS6.7AI score0.00335EPSS
CVE
CVE
added 2019/12/18 6:15 p.m.46 views

CVE-2012-2312

An Elevated Privileges issue exists in JBoss AS 7 Community Release due to the improper implementation in the security context propagation, A threat gets reused from the thread pool that still retains the security context from the process last used, which lets a local user obtain elevated privilege...

7.8CVSS7.4AI score0.00042EPSS
CVE
CVE
added 2014/11/17 10:59 p.m.46 views

CVE-2014-0059

JBoss SX and PicketBox, as used in Red Hat JBoss Enterprise Application Platform (EAP) before 6.2.3, use world-readable permissions on audit.log, which allows local users to obtain sensitive information by reading this file.

2.1CVSS8.2AI score0.00053EPSS
CVE
CVE
added 2009/03/09 9:30 p.m.45 views

CVE-2009-0027

The request handler in JBossWS in JBoss Enterprise Application Platform (aka JBoss EAP or JBEAP) 4.2 before 4.2.0.CP06 and 4.3 before 4.3.0.CP04 does not properly validate the resource path during a request for a WSDL file with a custom web-service endpoint, which allows remote attackers to read ar...

5CVSS6.5AI score0.00705EPSS
CVE
CVE
added 2013/03/12 11:55 p.m.45 views

CVE-2012-5629

The default configuration of the (1) LdapLoginModule and (2) LdapExtLoginModule modules in JBoss Enterprise Application Platform (EAP) 4.3.0 CP10, 5.2.0, and 6.0.1, and Enterprise Web Platform (EWP) 5.2.0 allow remote attackers to bypass authentication via an empty password.

7.5CVSS5.7AI score0.00788EPSS
CVE
CVE
added 2014/04/03 4:15 p.m.45 views

CVE-2014-0093

Red Hat JBoss Enterprise Application Platform (JBEAP) 6.2.2, when using a Java Security Manager (JSM), does not properly apply permissions defined by a policy file, which causes applications to be granted the java.security.AllPermission permission and allows remote attackers to bypass intended acce...

5.8CVSS9.2AI score0.0028EPSS
CVE
CVE
added 2015/02/13 3:59 p.m.45 views

CVE-2014-7827

The org.jboss.security.plugins.mapping.JBossMappingManager implementation in JBoss Security in Red Hat JBoss Enterprise Application Platform (EAP) before 6.3.3 uses the default security domain when a security domain is undefined, which allows remote authenticated users to bypass intended access res...

3.5CVSS6.3AI score0.00316EPSS
CVE
CVE
added 2015/02/13 3:59 p.m.45 views

CVE-2014-7849

The Role Based Access Control (RBAC) implementation in JBoss Enterprise Application Platform (EAP) 6.2.0 through 6.3.2 does not properly verify authorization conditions, which allows remote authenticated users to add, modify, and undefine otherwise restricted attributes by leveraging the Maintainer...

4CVSS6.2AI score0.004EPSS
CVE
CVE
added 2012/11/23 8:55 p.m.44 views

CVE-2012-1167

The JBoss Server in JBoss Enterprise Application Platform 5.1.x before 5.1.2 and 5.2.x before 5.2.2, Web Platform before 5.1.2, BRMS Platform before 5.3.0, and SOA Platform before 5.3.0, when the server is configured to use the JaccAuthorizationRealm and the ignoreBaseDecision property is set to tr...

4.6CVSS6.3AI score0.00815EPSS
CVE
CVE
added 2013/02/05 11:55 p.m.44 views

CVE-2013-0218

The GUI installer in JBoss Enterprise Application Platform (EAP) and Enterprise Web Platform (EWP) 5.2.0 and possibly 5.1.2 uses world-readable permissions for the auto-install XML file, which allows local users to obtain the administrator password and the sucker password by reading this file.

2.1CVSS5.6AI score0.0007EPSS
CVE
CVE
added 2013/08/16 4:55 p.m.44 views

CVE-2013-4128

Red Hat JBoss Enterprise Application Platform (EAP) 6.1.0 does not properly cache EJB invocations by remote-naming, which allows remote attackers to hijack sessions by using a remoting client.

6.4CVSS6.6AI score0.00688EPSS
CVE
CVE
added 2014/08/19 6:55 p.m.44 views

CVE-2014-3472

The isCallerInRole function in SimpleSecurityManager in JBoss Application Server (AS) 7, as used in Red Hat JBoss Enterprise Application Platform (JBEAP) 6.3.0, does not properly check caller roles, which allows remote authenticated users to bypass access restrictions via unspecified vectors.

4.9CVSS8.6AI score0.00375EPSS
CVE
CVE
added 2014/07/22 8:55 p.m.44 views

CVE-2014-3518

jmx-remoting.sar in JBoss Remoting, as used in Red Hat JBoss Enterprise Application Platform (JEAP) 5.2.0, Red Hat JBoss BRMS 5.3.1, Red Hat JBoss Portal Platform 5.2.2, and Red Hat JBoss SOA Platform 5.3.1, does not properly implement the JSR 160 specification, which allows remote attackers to exe...

6.8CVSS8AI score0.01658EPSS
CVE
CVE
added 2010/12/30 9:0 p.m.43 views

CVE-2010-4265

The org.jboss.remoting.transport.bisocket.BisocketServerInvoker$SecondaryServerSocketThread.run method in JBoss Remoting 2.2.x before 2.2.3.SP4 and 2.5.x before 2.5.3.SP2 in Red Hat JBoss Enterprise Application Platform (aka JBoss EAP or JBEAP) 4.3 through 4.3.0.CP09 allows remote attackers to caus...

2.6CVSS6.4AI score0.0139EPSS
CVE
CVE
added 2014/08/19 6:55 p.m.43 views

CVE-2014-3464

The EJB invocation handler implementation in Red Hat JBossWS, as used in JBoss Enterprise Application Platform (EAP) 6.2.0 and 6.3.0, does not properly enforce the method level restrictions for outbound messages, which allows remote authenticated users to access otherwise restricted JAX-WS handlers...

5.5CVSS8.9AI score0.0032EPSS
CVE
CVE
added 2017/09/19 5:29 p.m.43 views

CVE-2015-1849

AdvancedLdapLodinMogule in Red Hat JBoss Enterprise Application Platform (EAP) before 6.4.1 allows attackers to obtain sensitive information via vectors involving logging the LDAP bind credential password when TRACE logging is enabled.

5.9CVSS5.4AI score0.00303EPSS
CVE
CVE
added 2014/02/02 8:55 p.m.42 views

CVE-2012-3427

EC2 Amazon Machine Image (AMI) in JBoss Enterprise Application Platform (EAP) 5.1.2 uses 755 permissions for /var/cache/jboss-ec2-eap/, which allows local users to read sensitive information such as Amazon Web Services (AWS) credentials by reading files in the directory.

2.1CVSS6AI score0.00053EPSS
CVE
CVE
added 2018/03/09 3:29 p.m.36 views

CVE-2016-9585

Red Hat JBoss EAP version 5 is vulnerable to a deserialization of untrusted data in the JMX endpoint when deserializes the credentials passed to it. An attacker could exploit this vulnerability resulting in a denial of service attack.

5.3CVSS5.3AI score0.00181EPSS
Total number of security vulnerabilities231