Redhat

Jboss Enterprise Application Platform

239 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.07%
  • Veröffentlicht 13.08.2012 20:55:01
  • Zuletzt bearbeitet 11.04.2025 00:51:21

twiddle.sh in JBoss AS 5.0 and EAP 5.0 and earlier accepts credentials as command-line arguments, which allows local users to read the credentials by listing the process and its arguments.

  • EPSS 1.14%
  • Veröffentlicht 27.01.2012 15:55:04
  • Zuletzt bearbeitet 11.04.2025 00:51:21

message/ax/AxMessage.java in OpenID4Java before 0.9.6 final, as used in JBoss Enterprise Application Platform 5.1 before 5.1.2, Step2, Kay Framework before 1.0.2, and possibly other products does not verify that Attribute Exchange (AX) information is...

  • EPSS 0.74%
  • Veröffentlicht 27.01.2012 15:55:04
  • Zuletzt bearbeitet 11.04.2025 00:51:21

mod_cluster in JBoss Enterprise Application Platform 5.1.2 for Red Hat Linux allows worker nodes to register with arbitrary virtual hosts, which allows remote attackers to bypass intended access restrictions and provide malicious content, hijack sess...

  • EPSS 1.22%
  • Veröffentlicht 27.07.2011 02:55:01
  • Zuletzt bearbeitet 11.04.2025 00:51:21

jboss-seam.jar in the JBoss Seam 2 framework 2.2.x and earlier, as distributed in Red Hat JBoss Enterprise SOA Platform 4.3.0.CP05 and 5.1.0; JBoss Enterprise Application Platform (aka JBoss EAP or JBEAP) 4.3.0, 4.3.0.CP09, and 5.1.1; and JBoss Enter...

  • EPSS 1.2%
  • Veröffentlicht 27.07.2011 02:42:27
  • Zuletzt bearbeitet 11.04.2025 00:51:21

jboss-seam.jar in the JBoss Seam 2 framework 2.2.x and earlier, as distributed in Red Hat JBoss Enterprise SOA Platform 4.3.0.CP04 and 5.1.0 and JBoss Enterprise Application Platform (aka JBoss EAP or JBEAP) 4.3.0.CP09 and 5.1.0, does not properly re...

  • EPSS 1.03%
  • Veröffentlicht 30.12.2010 21:00:02
  • Zuletzt bearbeitet 11.04.2025 00:51:21

The org.jboss.remoting.transport.bisocket.BisocketServerInvoker$SecondaryServerSocketThread.run method in JBoss Remoting 2.2.x before 2.2.3.SP4 and 2.5.x before 2.5.3.SP2 in Red Hat JBoss Enterprise Application Platform (aka JBoss EAP or JBEAP) 4.3 t...

  • EPSS 2.42%
  • Veröffentlicht 30.12.2010 21:00:01
  • Zuletzt bearbeitet 11.04.2025 00:51:21

The serialization implementation in JBoss Drools in Red Hat JBoss Enterprise Application Platform (aka JBoss EAP or JBEAP) 4.3 before 4.3.0.CP09 and JBoss Enterprise SOA Platform 4.2 and 4.3 supports the embedding of class files, which allows remote ...

  • EPSS 1.68%
  • Veröffentlicht 30.12.2010 21:00:01
  • Zuletzt bearbeitet 11.04.2025 00:51:21

The org.jboss.remoting.transport.bisocket.BisocketServerInvoker$SecondaryServerSocketThread.run method in JBoss Remoting 2.2.x before 2.2.3.SP4 and 2.5.x before 2.5.3.SP2 in Red Hat JBoss Enterprise Application Platform (aka JBoss EAP or JBEAP) 4.3 t...

  • EPSS 0.14%
  • Veröffentlicht 30.12.2010 21:00:01
  • Zuletzt bearbeitet 11.04.2025 00:51:21

Cross-site request forgery (CSRF) vulnerability in the JMX Console in Red Hat JBoss Enterprise Application Platform (aka JBoss EAP or JBEAP) 4.3 before 4.3.0.CP09 allows remote attackers to hijack the authentication of administrators for requests tha...

Warnung
  • EPSS 93.79%
  • Veröffentlicht 05.08.2010 13:23:09
  • Zuletzt bearbeitet 22.10.2025 01:15:36

JBoss Seam 2 (jboss-seam2), as used in JBoss Enterprise Application Platform 4.3.0 for Red Hat Linux, does not properly sanitize inputs for JBoss Expression Language (EL) expressions, which allows remote attackers to execute arbitrary code via a craf...