Lucene search

K
RedhatJboss Operations Network*

13 matches found

CVE
CVE
added 2019/10/30 11:15 p.m.84 views

CVE-2010-0737

A missing permission check was found in The CLI in JBoss Operations Network before 2.3.1 does not properly check permissions, which allows JBoss ON users to perform management tasks and configuration changes with the privileges of the administrator user.

8CVSS7.7AI score0.00139EPSS
CVE
CVE
added 2019/10/03 2:15 p.m.61 views

CVE-2019-3834

It was found that the fix for CVE-2014-0114 had been reverted in JBoss Operations Network 3 (JON). This flaw allows attackers to manipulate ClassLoader properties on a vulnerable server. Exploits that have been published rely on ClassLoader properties that are exposed such as those in JON 3. Additi...

7.3CVSS7.9AI score0.92739EPSS
CVE
CVE
added 2020/01/23 7:15 p.m.59 views

CVE-2012-5626

EJB method in Red Hat JBoss BRMS 5; Red Hat JBoss Enterprise Application Platform 5; Red Hat JBoss Operations Network 3.1; Red Hat JBoss Portal 4 and 5; Red Hat JBoss SOA Platform 4.2, 4.3, and 5; in Red Hat JBoss Enterprise Web Server 1 ignores roles specified using the @RunAs annotation.

7.5CVSS7.5AI score0.00176EPSS
CVE
CVE
added 2016/08/02 2:59 p.m.59 views

CVE-2016-3737

The server in Red Hat JBoss Operations Network (JON) before 3.3.6 allows remote attackers to execute arbitrary code via a crafted HTTP request, related to message deserialization.

9.8CVSS9.5AI score0.00452EPSS
CVE
CVE
added 2016/09/07 7:28 p.m.43 views

CVE-2016-5422

The web console in Red Hat JBoss Operations Network (JON) before 3.3.7 does not properly authorize requests to add users with the super user role, which allows remote authenticated users to gain admin privileges via a crafted POST request.

8.8CVSS8.4AI score0.00682EPSS
CVE
CVE
added 2014/02/14 3:55 p.m.42 views

CVE-2012-0052

Red Hat JBoss Operations Network (JON) before 2.4.2 and 3.0.x before 3.0.1 does not check the JON agent key, which allows remote attackers to spoof the identity of arbitrary agents via the registered agent name.

5.8CVSS7AI score0.00298EPSS
CVE
CVE
added 2014/02/14 3:55 p.m.41 views

CVE-2012-0062

Red Hat JBoss Operations Network (JON) before 2.4.2 and 3.0.x before 3.0.1 allows remote attackers to hijack agent sessions via an agent registration request without a security token.

5.8CVSS6.9AI score0.00274EPSS
CVE
CVE
added 2015/08/11 2:59 p.m.41 views

CVE-2015-3267

Cross-site scripting (XSS) vulnerability in the 404 error page in Red Hat JBoss Operations Network before 3.3.3 allows remote attackers to inject arbitrary web script or HTML via a crafted URL.

4.3CVSS5.8AI score0.00296EPSS
CVE
CVE
added 2014/04/01 6:35 a.m.40 views

CVE-2011-4573

Red Hat JBoss Operations Network (JON) before 2.4.2 does not properly enforce "modify resource" permissions for remote authenticated users when deleting a plug-in configuration update from the group connection properties history, which prevents such activities from being recorded in the audit trail...

3.5CVSS6.5AI score0.00129EPSS
CVE
CVE
added 2012/01/08 12:55 a.m.39 views

CVE-2011-3206

Multiple cross-site scripting (XSS) vulnerabilities in the administration interface in RHQ 4.2.0, as used in JBoss Operations Network (aka JON or JBoss ON) before 3.0, allow remote attackers to inject arbitrary web script or HTML via unspecified vectors.

4.3CVSS5.8AI score0.00357EPSS
CVE
CVE
added 2019/11/08 12:15 a.m.36 views

CVE-2008-5083

In JON 2.1.x before 2.1.2 SP1, users can obtain unauthorized security information about private resources managed by JBoss ON.

6.5CVSS6.4AI score0.00328EPSS
CVE
CVE
added 2014/04/01 6:35 a.m.36 views

CVE-2012-0032

Red Hat JBoss Operations Network (JON) before 3.0.1 uses 0777 permissions for the root directory when installing a remote client, which allows local users to read or modify subdirectories and files within the root directory, as demonstrated by obtaining JON credentials.

3.7CVSS6.6AI score0.00041EPSS
CVE
CVE
added 2014/02/14 3:55 p.m.36 views

CVE-2012-1100

Red Hat JBoss Operations Network (JON) 3.0.x before 3.0.1, 2.4.2, and earlier, when LDAP authentication is enabled and the LDAP bind account credentials are invalid, allows remote attackers to login to LDAP-based accounts via an arbitrary password in a login request.

5.8CVSS7.4AI score0.00305EPSS