Redhat

Jboss Enterprise Application Platform

239 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.21%
  • Veröffentlicht 20.02.2015 16:59:00
  • Zuletzt bearbeitet 12.04.2025 10:46:40

PicketBox and JBossSX, as used in Red Hat JBoss Enterprise Application Platform (JBEAP) 6.2.2 and JBoss BRMS before 6.0.3 roll up patch 2, allows remote authenticated users to read and modify the application sever configuration and state by deploying...

  • EPSS 0.43%
  • Veröffentlicht 13.02.2015 15:59:06
  • Zuletzt bearbeitet 12.04.2025 10:46:40

The JBoss Application Server (WildFly) JacORB subsystem in Red Hat JBoss Enterprise Application Platform (EAP) before 6.3.3 does not properly assign socket-binding-ref sensitivity classification to the security-domain attribute, which allows remote a...

  • EPSS 0.4%
  • Veröffentlicht 13.02.2015 15:59:05
  • Zuletzt bearbeitet 12.04.2025 10:46:40

The Role Based Access Control (RBAC) implementation in JBoss Enterprise Application Platform (EAP) 6.2.0 through 6.3.2 does not properly verify authorization conditions, which allows remote authenticated users to add, modify, and undefine otherwise r...

  • EPSS 0.32%
  • Veröffentlicht 13.02.2015 15:59:04
  • Zuletzt bearbeitet 12.04.2025 10:46:40

The org.jboss.security.plugins.mapping.JBossMappingManager implementation in JBoss Security in Red Hat JBoss Enterprise Application Platform (EAP) before 6.3.3 uses the default security domain when a security domain is undefined, which allows remote ...

  • EPSS 0.05%
  • Veröffentlicht 17.11.2014 22:59:02
  • Zuletzt bearbeitet 12.04.2025 10:46:40

JBoss SX and PicketBox, as used in Red Hat JBoss Enterprise Application Platform (EAP) before 6.2.3, use world-readable permissions on audit.log, which allows local users to obtain sensitive information by reading this file.

  • EPSS 4.65%
  • Veröffentlicht 19.08.2014 18:55:02
  • Zuletzt bearbeitet 12.04.2025 10:46:40

RESTEasy 2.3.1 before 2.3.8.SP2 and 3.x before 3.0.9, as used in Red Hat JBoss Enterprise Application Platform (EAP) 6.3.0, does not disable external entities when the resteasy.document.expand.entity.references parameter is set to false, which allows...

  • EPSS 0.19%
  • Veröffentlicht 19.08.2014 18:55:01
  • Zuletzt bearbeitet 12.04.2025 10:46:40

The EJB invocation handler implementation in Red Hat JBossWS, as used in JBoss Enterprise Application Platform (EAP) 6.2.0 and 6.3.0, does not properly enforce the method level restrictions for outbound messages, which allows remote authenticated use...

  • EPSS 0.24%
  • Veröffentlicht 19.08.2014 18:55:01
  • Zuletzt bearbeitet 12.04.2025 10:46:40

The isCallerInRole function in SimpleSecurityManager in JBoss Application Server (AS) 7, as used in Red Hat JBoss Enterprise Application Platform (JBEAP) 6.3.0, does not properly check caller roles, which allows remote authenticated users to bypass a...

  • EPSS 1.66%
  • Veröffentlicht 22.07.2014 20:55:01
  • Zuletzt bearbeitet 12.04.2025 10:46:40

jmx-remoting.sar in JBoss Remoting, as used in Red Hat JBoss Enterprise Application Platform (JEAP) 5.2.0, Red Hat JBoss BRMS 5.3.1, Red Hat JBoss Portal Platform 5.2.2, and Red Hat JBoss SOA Platform 5.3.1, does not properly implement the JSR 160 sp...

  • EPSS 2.55%
  • Veröffentlicht 22.07.2014 20:55:01
  • Zuletzt bearbeitet 12.04.2025 10:46:40

The org.picketlink.common.util.DocumentUtil.getDocumentBuilderFactory method in PicketLink, as used in Red Hat JBoss Enterprise Application Platform (JBEAP) 5.2.0 and 6.2.4, expands entity references, which allows remote attackers to read arbitrary c...