Lucene search

K
RedhatJboss Enterprise Application Platform6.3.0

4 matches found

CVE
CVE
added 2014/08/19 6:55 p.m.109 views

CVE-2014-3490

RESTEasy 2.3.1 before 2.3.8.SP2 and 3.x before 3.0.9, as used in Red Hat JBoss Enterprise Application Platform (EAP) 6.3.0, does not disable external entities when the resteasy.document.expand.entity.references parameter is set to false, which allows remote attackers to read arbitrary files and hav...

7.5CVSS9.4AI score0.04646EPSS
CVE
CVE
added 2015/02/13 3:59 p.m.45 views

CVE-2014-7849

The Role Based Access Control (RBAC) implementation in JBoss Enterprise Application Platform (EAP) 6.2.0 through 6.3.2 does not properly verify authorization conditions, which allows remote authenticated users to add, modify, and undefine otherwise restricted attributes by leveraging the Maintainer...

4CVSS6.2AI score0.004EPSS
CVE
CVE
added 2014/08/19 6:55 p.m.44 views

CVE-2014-3472

The isCallerInRole function in SimpleSecurityManager in JBoss Application Server (AS) 7, as used in Red Hat JBoss Enterprise Application Platform (JBEAP) 6.3.0, does not properly check caller roles, which allows remote authenticated users to bypass access restrictions via unspecified vectors.

4.9CVSS8.6AI score0.00375EPSS
CVE
CVE
added 2014/08/19 6:55 p.m.43 views

CVE-2014-3464

The EJB invocation handler implementation in Red Hat JBossWS, as used in JBoss Enterprise Application Platform (EAP) 6.2.0 and 6.3.0, does not properly enforce the method level restrictions for outbound messages, which allows remote authenticated users to access otherwise restricted JAX-WS handlers...

5.5CVSS8.9AI score0.0032EPSS