Redhat Jboss Enterprise Application Platform vulnerabilities
241 known vulnerabilities affecting redhat/jboss_enterprise_application_platform.
Total CVEs
241
CISA KEV
6
actively exploited
Public exploits
18
Exploited in wild
8
Severity breakdown
CRITICAL36HIGH86MEDIUM102LOW17
Vulnerabilities
Page 10 of 13
CVE-2014-3530HIGHCVSS 7.5v5.2.0v6.2.42014-07-22
CVE-2014-3530 [HIGH] CWE-200 CVE-2014-3530: The org.picketlink.common.util.DocumentUtil.getDocumentBuilderFactory method in PicketLink, as used
The org.picketlink.common.util.DocumentUtil.getDocumentBuilderFactory method in PicketLink, as used in Red Hat JBoss Enterprise Application Platform (JBEAP) 5.2.0 and 6.2.4, expands entity references, which allows remote attackers to read arbitrary code and possibly have other unspecified impact via unspecified vectors, related to an XML External Entity
nvd
CVE-2014-3518MEDIUMCVSS 6.8v5.2.02014-07-22
CVE-2014-3518 [MEDIUM] CWE-94 CVE-2014-3518: jmx-remoting.sar in JBoss Remoting, as used in Red Hat JBoss Enterprise Application Platform (JEAP)
jmx-remoting.sar in JBoss Remoting, as used in Red Hat JBoss Enterprise Application Platform (JEAP) 5.2.0, Red Hat JBoss BRMS 5.3.1, Red Hat JBoss Portal Platform 5.2.2, and Red Hat JBoss SOA Platform 5.3.1, does not properly implement the JSR 160 specification, which allows remote attackers to execute arbitrary code via unspecified vectors.
nvd
CVE-2014-0226MEDIUMCVSS 6.8PoCv6.0.0v6.4.02014-07-20
CVE-2014-0226 [MEDIUM] CWE-362 CVE-2014-0226: Race condition in the mod_status module in the Apache HTTP Server before 2.4.10 allows remote attack
Race condition in the mod_status module in the Apache HTTP Server before 2.4.10 allows remote attackers to cause a denial of service (heap-based buffer overflow), or possibly obtain sensitive credential information or execute arbitrary code, via a crafted request that triggers improper scoreboard handling within the status_handler function in modules/
nvd
CVE-2014-0118MEDIUMCVSS 4.3v6.0.0v6.4.02014-07-20
CVE-2014-0118 [MEDIUM] CWE-400 CVE-2014-0118: The deflate_in_filter function in mod_deflate.c in the mod_deflate module in the Apache HTTP Server
The deflate_in_filter function in mod_deflate.c in the mod_deflate module in the Apache HTTP Server before 2.4.10, when request body decompression is enabled, allows remote attackers to cause a denial of service (resource consumption) via crafted request data that decompresses to a much larger size.
nvd
CVE-2014-3481MEDIUMCVSS 5.0≤ 6.2.3v6.0.0+5 more2014-07-07
CVE-2014-3481 [MEDIUM] CWE-200 CVE-2014-3481: org.jboss.as.jaxrs.deployment.JaxrsIntegrationProcessor in Red Hat JBoss Enterprise Application Plat
org.jboss.as.jaxrs.deployment.JaxrsIntegrationProcessor in Red Hat JBoss Enterprise Application Platform (JEAP) before 6.2.4 enables entity expansion, which allows remote attackers to read arbitrary files via unspecified vectors, related to an XML External Entity (XXE) issue.
nvd
CVE-2014-0248MEDIUMCVSS 6.8v5.2.02014-07-07
CVE-2014-0248 [MEDIUM] CWE-94 CVE-2014-0248: org.jboss.seam.web.AuthenticationFilter in Red Hat JBoss Web Framework Kit 2.5.0, JBoss Enterprise A
org.jboss.seam.web.AuthenticationFilter in Red Hat JBoss Web Framework Kit 2.5.0, JBoss Enterprise Application Platform (JBEAP) 5.2.0, and JBoss Enterprise Web Platform (JBEWP) 5.2.0 allows remote attackers to execute arbitrary code via a crafted authentication header, related to Seam logging.
nvd
CVE-2014-0035MEDIUMCVSS 4.3v6.0.0v6.2.02014-07-07
CVE-2014-0035 [MEDIUM] CWE-310 CVE-2014-0035: The SymmetricBinding in Apache CXF before 2.6.13 and 2.7.x before 2.7.10, when EncryptBeforeSigning
The SymmetricBinding in Apache CXF before 2.6.13 and 2.7.x before 2.7.10, when EncryptBeforeSigning is enabled and the UsernameToken policy is set to an EncryptedSupportingToken, transmits the UsernameToken in cleartext, which allows remote attackers to obtain sensitive information by sniffing the network.
nvd
CVE-2014-0034MEDIUMCVSS 4.3v6.0.0v6.2.02014-07-07
CVE-2014-0034 [MEDIUM] CWE-20 CVE-2014-0034: The SecurityTokenService (STS) in Apache CXF before 2.6.12 and 2.7.x before 2.7.9 does not properly
The SecurityTokenService (STS) in Apache CXF before 2.6.12 and 2.7.x before 2.7.9 does not properly validate SAML tokens when caching is enabled, which allows remote attackers to gain access via an invalid SAML token.
nvd
CVE-2014-0224HIGHCVSS 7.4PoCv5.2.0v6.2.32014-06-05
CVE-2014-0224 [HIGH] CWE-326 CVE-2014-0224: OpenSSL before 0.9.8za, 1.0.0 before 1.0.0m, and 1.0.1 before 1.0.1h does not properly restrict proc
OpenSSL before 0.9.8za, 1.0.0 before 1.0.0m, and 1.0.1 before 1.0.1h does not properly restrict processing of ChangeCipherSpec messages, which allows man-in-the-middle attackers to trigger use of a zero-length master key in certain OpenSSL-to-OpenSSL communications, and consequently hijack sessions or obtain sensitive information, via a crafted TLS hand
nvd
CVE-2014-0093MEDIUMCVSS 5.8v6.2.22014-04-03
CVE-2014-0093 [MEDIUM] CWE-264 CVE-2014-0093: Red Hat JBoss Enterprise Application Platform (JBEAP) 6.2.2, when using a Java Security Manager (JSM
Red Hat JBoss Enterprise Application Platform (JBEAP) 6.2.2, when using a Java Security Manager (JSM), does not properly apply permissions defined by a policy file, which causes applications to be granted the java.security.AllPermission permission and allows remote attackers to bypass intended access restrictions.
nvd
CVE-2014-0058LOWCVSS 1.9v6.0.0v6.0.1+2 more2014-02-26
CVE-2014-0058 [LOW] CWE-310 CVE-2014-0058: The security audit functionality in Red Hat JBoss Enterprise Application Platform (EAP) 6.x before 6
The security audit functionality in Red Hat JBoss Enterprise Application Platform (EAP) 6.x before 6.2.1 logs request parameters in plaintext, which might allow local users to obtain passwords by reading the log files.
nvd
CVE-2014-0018LOWCVSS 1.9v6.2.02014-02-14
CVE-2014-0018 [LOW] CWE-264 CVE-2014-0018: Red Hat JBoss Enterprise Application Platform (JBEAP) 6.2.0 and JBoss WildFly Application Server, wh
Red Hat JBoss Enterprise Application Platform (JBEAP) 6.2.0 and JBoss WildFly Application Server, when run under a security manager, do not properly restrict access to the Modular Service Container (MSC) service registry, which allows local users to modify the server via a crafted deployment.
nvd
CVE-2011-4610MEDIUMCVSS 5.0≤ 5.1.22014-02-10
CVE-2011-4610 [MEDIUM] CWE-119 CVE-2011-4610: JBoss Web, as used in Red Hat JBoss Communications Platform before 5.1.3, Enterprise Web Platform be
JBoss Web, as used in Red Hat JBoss Communications Platform before 5.1.3, Enterprise Web Platform before 5.1.2, Enterprise Application Platform before 5.1.2, and other products, allows remote attackers to cause a denial of service (infinite loop) via vectors related to a crafted UTF-8 and a "surrogate pair character" that is "at the boundary of an int
nvd
CVE-2012-3427LOWCVSS 2.1v5.1.22014-02-02
CVE-2012-3427 [LOW] CWE-264 CVE-2012-3427: EC2 Amazon Machine Image (AMI) in JBoss Enterprise Application Platform (EAP) 5.1.2 uses 755 permiss
EC2 Amazon Machine Image (AMI) in JBoss Enterprise Application Platform (EAP) 5.1.2 uses 755 permissions for /var/cache/jboss-ec2-eap/, which allows local users to read sensitive information such as Amazon Web Services (AWS) credentials by reading files in the directory.
nvd
CVE-2013-2185HIGHCVSS 7.5v6.1.02014-01-19
CVE-2013-2185 [HIGH] CWE-20 CVE-2013-2185: The readObject method in the DiskFileItem class in Apache Tomcat and JBoss Web, as used in Red Hat J
The readObject method in the DiskFileItem class in Apache Tomcat and JBoss Web, as used in Red Hat JBoss Enterprise Application Platform 6.1.0 and Red Hat JBoss Portal 6.0.0, allows remote attackers to write to arbitrary files via a NULL byte in a file name in a serialized instance, a similar issue to CVE-2013-2186. NOTE: this issue is reportedly dispute
nvd
CVE-2013-2133MEDIUMCVSS 5.5≤ 6.1.0v4.2.0+11 more2013-12-06
CVE-2013-2133 [MEDIUM] CWE-264 CVE-2013-2133: The EJB invocation handler implementation in Red Hat JBossWS, as used in JBoss Enterprise Applicatio
The EJB invocation handler implementation in Red Hat JBossWS, as used in JBoss Enterprise Application Platform (EAP) before 6.2.0, does not properly enforce the method level restrictions for JAX-WS Service endpoints, which allows remote authenticated users to access otherwise restricted JAX-WS handlers by leveraging permissions to the EJB class.
nvd
CVE-2012-4529MEDIUMCVSS 4.3v6.0.02013-10-28
CVE-2012-4529 [MEDIUM] CVE-2012-4529: The org.apache.catalina.connector.Response.encodeURL method in Red Hat JBoss Web 7.1.x and earlier,
The org.apache.catalina.connector.Response.encodeURL method in Red Hat JBoss Web 7.1.x and earlier, when the tracking mode is set to COOKIE, sends the jsessionid in the URL of the first response of a session, which allows remote attackers to obtain the session id (1) via a man-in-the-middle attack or (2) by reading a log.
nvd
CVE-2012-4572LOWCVSS 3.7≤ 6.0.1v4.2.0+10 more2013-10-28
CVE-2012-4572 [LOW] CWE-264 CVE-2012-4572: Red Hat JBoss Enterprise Application Platform (EAP) before 6.1.0 and JBoss Portal before 6.1.0 does
Red Hat JBoss Enterprise Application Platform (EAP) before 6.1.0 and JBoss Portal before 6.1.0 does not load the implementation of a custom authorization module for a new application when an implementation is already loaded and the modules share class names, which allows local users to control certain applications' authorization decisions via a crafted ap
nvd
CVE-2013-4210MEDIUMCVSS 5.0v5.0.02013-10-01
CVE-2013-4210 [MEDIUM] CVE-2013-4210: The org.jboss.remoting.transport.socket.ServerThread class in Red Hat JBoss Remoting for Red Hat JBo
The org.jboss.remoting.transport.socket.ServerThread class in Red Hat JBoss Remoting for Red Hat JBoss SOA Platform 5.3.1 GA, Web Platform 5.2.0, Enterprise Application Platform 5.2.0, and other products allows remote attackers to cause a denial of service (file descriptor consumption) via unspecified vectors.
nvd
CVE-2013-4112MEDIUMCVSS 5.4v6.1.02013-09-28
CVE-2013-4112 [MEDIUM] CWE-200 CVE-2013-4112: The DiagnosticsHandler in JGroup 3.0.x, 3.1.x, 3.2.x before 3.2.9, and 3.3.x before 3.3.3 allows rem
The DiagnosticsHandler in JGroup 3.0.x, 3.1.x, 3.2.x before 3.2.9, and 3.3.x before 3.3.3 allows remote attackers to obtain sensitive information (diagnostic information) and execute arbitrary code by reusing valid credentials.
nvd