14 results (0.016 seconds)

CVSS: 7.5EPSS: 14%CPEs: 6EXPL: 2

05 Feb 2018 — A vulnerability was found in the way RemoteMessageChannel, introduced in jboss-remoting versions 3.3.10, reads from an empty buffer. An attacker could use this flaw to cause denial of service via high CPU caused by an infinite loop. Se ha encontrado una vulnerabilidad en la forma en la que RemoteMessageChannel, introducido en las versiones 3.3.10 de jboss-remoting, lee desde un búfer vacío. Un atacante podría emplear este error para provocar una denegación de servicio (DoS) mediante un consumo alto de CPU a... • https://packetstorm.news/files/id/146423 • CWE-835: Loop with Unreachable Exit Condition ('Infinite Loop') •

CVSS: 7.5EPSS: 2%CPEs: 1EXPL: 0

06 Apr 2016 — The HTTPS NIO Connector allows remote attackers to cause a denial of service (thread consumption) by opening a socket and not sending an SSL handshake, aka a read-timeout vulnerability. El HTTPS NIO Connector permite a atacantes remotos provocar una denegación de servicio (consumo de hilos) abriendo un socket y no enviando un apretón de manos SSL, también conocido como una vulnerabilidad de finalización de tiempo de espera de lectura. A read-timeout flaw was found in the HTTPS NIO Connector handling of SSL ... • http://rhn.redhat.com/errata/RHSA-2016-0595.html • CWE-358: Improperly Implemented Security Check for Standard CWE-399: Resource Management Errors •

CVSS: 7.5EPSS: 0%CPEs: 3EXPL: 0

24 Sep 2014 — Teiid before 8.4.3 and before 8.7 and Red Hat JBoss Data Virtualization 6.0.0 before patch 3 allows remote attackers to read arbitrary files via a crafted request to a REST endpoint, related to an XML External Entity (XXE) issue. Teiid anterior a 8.4.3 y anterior a 8.7 y Red Hat JBoss Data Virtualization 6.0.0 anterior a patch 3 permiten a atacantes remotos leer ficheros arbitrarios a través de una solicitud manipulada en un endpoint REST, relacionado con un problema de entidad externa XML (XXE). It was fou... • http://rhn.redhat.com/errata/RHSA-2014-1284.html • CWE-611: Improper Restriction of XML External Entity Reference •

CVSS: 9.1EPSS: 0%CPEs: 1EXPL: 0

20 Dec 2012 — The IronJacamar container before 1.0.12.Final for JBoss Application Server, when allow-multiple-users is enabled in conjunction with a security domain, does not use the credentials supplied in a getConnection function call, which allows remote attackers to obtain access to an arbitrary datasource connection in opportunistic circumstances via an invalid connection attempt. El contenedor IronJacamar antes de v1.0.12.Final para el servidor de aplicaciones JBoss, cuando allow-multiple-users se activa en combina... • http://rhn.redhat.com/errata/RHSA-2012-1591.html • CWE-255: Credentials Management Errors •

CVSS: 5.3EPSS: 29%CPEs: 4EXPL: 2

10 Aug 2008 — JBoss Enterprise Application Platform (aka JBossEAP or EAP) before 4.2.0.CP03, and 4.3.0 before 4.3.0.CP01, allows remote attackers to obtain sensitive information about "deployed web contexts" via a request to the status servlet, as demonstrated by a full=true query string. JBoss Enterprise Application Platform (también conocido como JBossEAP o EAP) anterior a 4.2.0.CP03 y 4.3.0 anterior a 4.3.0.CP01, permite a atacantes remotos obtener información sensible relacionada con "deployed web contexts" (Contexto... • https://packetstorm.news/files/id/181026 • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 7.5EPSS: 2%CPEs: 1EXPL: 1

18 Dec 2007 — The getRenderedEjbql method in the org.jboss.seam.framework.Query class in JBoss Seam 2.x before 2.0.0.CR3 allows remote attackers to inject and execute arbitrary EJBQL commands via the order parameter. El método getRenderedEjbql en la clase org.jboss.seam.framework.Query en JBoss Seam 2.x anterior a 2.0.0.CR3 permite a atacantes remotos inyectar y ejecutar comandos EJBQL de su elección a través del parámetro order. • http://jira.jboss.com/jira/browse/JBSEAM-2084 • CWE-20: Improper Input Validation •

CVSS: 6.6EPSS: 0%CPEs: 6EXPL: 0

27 Jul 2007 — The Access Control functionality (JMXOpsAccessControlFilter) in JMX Console in JBoss Application Server 4.0.2 and 4.0.5 before 20070416 uses a member variable to store the roles of the current user, which allows remote authenticated administrators to trigger a race condition and gain privileges by logging in during a session by a more privileged administrator, as demonstrated by privilege escalation from Read Mode to Write Mode. La funcionalidad Control de Acceso (JMXOpsAccessControlFilter) en JMX Console d... • http://jira.jboss.com/jira/browse/ASPATCH-172 •

CVSS: 8.8EPSS: 0%CPEs: 1EXPL: 0

27 Feb 2007 — Cross-site request forgery (CSRF) vulnerability in jmx-console/HtmlAdaptor in JBoss allows remote attackers to perform privileged actions as administrators via certain MBean operations, a different vulnerability than CVE-2006-3733. Vulnerabilidad de falsificación de petición en sitios cruzados (CSRF) en jmx-console/HtmlAdaptor de JBoss permite a atacantes remotos llevar a cabo acciones privilegiadas como administrador mediante ciertas operaciones MBean, una vulnerabilidad diferente que CVE-2006-3733. • http://osvdb.org/33142 • CWE-352: Cross-Site Request Forgery (CSRF) •

CVSS: 9.8EPSS: 89%CPEs: 1EXPL: 2

21 Feb 2007 — The default configuration of JBoss does not restrict access to the (1) console and (2) web management interfaces, which allows remote attackers to bypass authentication and gain administrative access via direct requests. La configuración por defecto de JBoss no restringe el acceso a (1) la consola y (2) interfaces de gestión web, lo cual permite a atacantes remotos evitar la autenticación y obtener acceso administrativo mediante peticiones directas. • https://www.exploit-db.com/exploits/21080 • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 8.8EPSS: 34%CPEs: 12EXPL: 0

27 Nov 2006 — Directory traversal vulnerability in the DeploymentFileRepository class in JBoss Application Server (jbossas) 3.2.4 through 4.0.5 allows remote authenticated users to read or modify arbitrary files, and possibly execute arbitrary code, via unspecified vectors related to the console manager. Vulnerabilidad de salto de directorio en la clase JBoss Application Server (jbossas) 3.2.4 hasta 4.0.5 permite a usuarios remotos validados leer o modificar archivos y posiblemente ejecutar código de su elección, a travé... • http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01390402 •