Redhat

Jboss Enterprise Application Platform

236 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.32%
  • Published 13.02.2015 15:59:04
  • Last modified 12.04.2025 10:46:40

The org.jboss.security.plugins.mapping.JBossMappingManager implementation in JBoss Security in Red Hat JBoss Enterprise Application Platform (EAP) before 6.3.3 uses the default security domain when a security domain is undefined, which allows remote ...

  • EPSS 0.05%
  • Published 17.11.2014 22:59:02
  • Last modified 12.04.2025 10:46:40

JBoss SX and PicketBox, as used in Red Hat JBoss Enterprise Application Platform (EAP) before 6.2.3, use world-readable permissions on audit.log, which allows local users to obtain sensitive information by reading this file.

  • EPSS 4.65%
  • Published 19.08.2014 18:55:02
  • Last modified 12.04.2025 10:46:40

RESTEasy 2.3.1 before 2.3.8.SP2 and 3.x before 3.0.9, as used in Red Hat JBoss Enterprise Application Platform (EAP) 6.3.0, does not disable external entities when the resteasy.document.expand.entity.references parameter is set to false, which allows...

  • EPSS 0.19%
  • Published 19.08.2014 18:55:01
  • Last modified 12.04.2025 10:46:40

The EJB invocation handler implementation in Red Hat JBossWS, as used in JBoss Enterprise Application Platform (EAP) 6.2.0 and 6.3.0, does not properly enforce the method level restrictions for outbound messages, which allows remote authenticated use...

  • EPSS 0.38%
  • Published 19.08.2014 18:55:01
  • Last modified 12.04.2025 10:46:40

The isCallerInRole function in SimpleSecurityManager in JBoss Application Server (AS) 7, as used in Red Hat JBoss Enterprise Application Platform (JBEAP) 6.3.0, does not properly check caller roles, which allows remote authenticated users to bypass a...

  • EPSS 1.66%
  • Published 22.07.2014 20:55:01
  • Last modified 12.04.2025 10:46:40

jmx-remoting.sar in JBoss Remoting, as used in Red Hat JBoss Enterprise Application Platform (JEAP) 5.2.0, Red Hat JBoss BRMS 5.3.1, Red Hat JBoss Portal Platform 5.2.2, and Red Hat JBoss SOA Platform 5.3.1, does not properly implement the JSR 160 sp...

  • EPSS 2.55%
  • Published 22.07.2014 20:55:01
  • Last modified 12.04.2025 10:46:40

The org.picketlink.common.util.DocumentUtil.getDocumentBuilderFactory method in PicketLink, as used in Red Hat JBoss Enterprise Application Platform (JBEAP) 5.2.0 and 6.2.4, expands entity references, which allows remote attackers to read arbitrary c...

  • EPSS 48.88%
  • Published 20.07.2014 11:12:48
  • Last modified 12.04.2025 10:46:40

The deflate_in_filter function in mod_deflate.c in the mod_deflate module in the Apache HTTP Server before 2.4.10, when request body decompression is enabled, allows remote attackers to cause a denial of service (resource consumption) via crafted req...

Exploit
  • EPSS 73.42%
  • Published 20.07.2014 11:12:48
  • Last modified 12.04.2025 10:46:40

Race condition in the mod_status module in the Apache HTTP Server before 2.4.10 allows remote attackers to cause a denial of service (heap-based buffer overflow), or possibly obtain sensitive credential information or execute arbitrary code, via a cr...

  • EPSS 1.86%
  • Published 07.07.2014 14:55:03
  • Last modified 12.04.2025 10:46:40

The SecurityTokenService (STS) in Apache CXF before 2.6.12 and 2.7.x before 2.7.9 does not properly validate SAML tokens when caching is enabled, which allows remote attackers to gain access via an invalid SAML token.