Lucene search

K
RedhatJboss Enterprise Application Platform6.0.1

5 matches found

cve
cve
added 2014/02/26 3:55 p.m.66 views

CVE-2014-0058

The security audit functionality in Red Hat JBoss Enterprise Application Platform (EAP) 6.x before 6.2.1 logs request parameters in plaintext, which might allow local users to obtain passwords by reading the log files.

1.9CVSS8.6AI score0.00061EPSS
cve
cve
added 2013/12/06 5:55 p.m.58 views

CVE-2013-2133

The EJB invocation handler implementation in Red Hat JBossWS, as used in JBoss Enterprise Application Platform (EAP) before 6.2.0, does not properly enforce the method level restrictions for JAX-WS Service endpoints, which allows remote authenticated users to access otherwise restricted JAX-WS hand...

5.5CVSS8.8AI score0.0032EPSS
cve
cve
added 2014/07/07 2:55 p.m.57 views

CVE-2014-3481

org.jboss.as.jaxrs.deployment.JaxrsIntegrationProcessor in Red Hat JBoss Enterprise Application Platform (JEAP) before 6.2.4 enables entity expansion, which allows remote attackers to read arbitrary files via unspecified vectors, related to an XML External Entity (XXE) issue.

5CVSS9.1AI score0.01093EPSS
cve
cve
added 2013/09/28 7:55 p.m.52 views

CVE-2013-1921

PicketBox, as used in Red Hat JBoss Enterprise Application Platform before 6.1.1, allows local users to obtain the admin encryption key by reading the Vault data file.

1.9CVSS5.8AI score0.00039EPSS
cve
cve
added 2013/03/12 11:55 p.m.45 views

CVE-2012-5629

The default configuration of the (1) LdapLoginModule and (2) LdapExtLoginModule modules in JBoss Enterprise Application Platform (EAP) 4.3.0 CP10, 5.2.0, and 6.0.1, and Enterprise Web Platform (EWP) 5.2.0 allow remote attackers to bypass authentication via an empty password.

7.5CVSS5.7AI score0.00788EPSS