Severity
1.9LOWNVD
EPSS
0.1%
top 80.63%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedFeb 14
Latest updateNov 12

Description

Red Hat JBoss Enterprise Application Platform (JBEAP) 6.2.0 and JBoss WildFly Application Server, when run under a security manager, do not properly restrict access to the Modular Service Container (MSC) service registry, which allows local users to modify the server via a crafted deployment.

CVSS vector

AV:L/AC:M/C:N/I:P/A:NExploitability: 3.4 | Impact: 2.9

Affected Packages1 packages

🔴Vulnerability Details

2
GHSA
GHSA-mxv4-hqqr-c5rm: Red Hat JBoss Enterprise Application Platform (JBEAP) 62022-05-17
CVEList
CVE-2014-0018: Red Hat JBoss Enterprise Application Platform (JBEAP) 62014-02-14

📋Vendor Advisories

6
Red Hat
kernel: iommu/vt-d: debugfs: Fix legacy mode page table dump logic2025-11-12
Red Hat
kernel: f2fs: prevent kernel warning due to negative i_nlink from corrupted image2025-07-04
Red Hat
kernel: net: relax socket state check at accept time.2024-06-21
Red Hat
kernel: ipvlan: Dont Use skb->sk in ipvlan_process_v{4,6}_outbound2024-06-21
Red Hat
kernel: btrfs: do not BUG_ON in link_to_fixup_dir2024-03-25

💬Community

1
Bugzilla
CVE-2014-0018 jboss-as-server: Unchecked access to MSC Service Registry under JSM2014-01-14
CVE-2014-0018 — Incorrect Type Conversion or Cast | cvebase