8 results (0.007 seconds)

CVSS: 7.5EPSS: 14%CPEs: 6EXPL: 2

05 Feb 2018 — A vulnerability was found in the way RemoteMessageChannel, introduced in jboss-remoting versions 3.3.10, reads from an empty buffer. An attacker could use this flaw to cause denial of service via high CPU caused by an infinite loop. Se ha encontrado una vulnerabilidad en la forma en la que RemoteMessageChannel, introducido en las versiones 3.3.10 de jboss-remoting, lee desde un búfer vacío. Un atacante podría emplear este error para provocar una denegación de servicio (DoS) mediante un consumo alto de CPU a... • https://packetstorm.news/files/id/146423 • CWE-835: Loop with Unreachable Exit Condition ('Infinite Loop') •

CVSS: 7.5EPSS: 0%CPEs: 3EXPL: 0

24 Sep 2014 — Teiid before 8.4.3 and before 8.7 and Red Hat JBoss Data Virtualization 6.0.0 before patch 3 allows remote attackers to read arbitrary files via a crafted request to a REST endpoint, related to an XML External Entity (XXE) issue. Teiid anterior a 8.4.3 y anterior a 8.7 y Red Hat JBoss Data Virtualization 6.0.0 anterior a patch 3 permiten a atacantes remotos leer ficheros arbitrarios a través de una solicitud manipulada en un endpoint REST, relacionado con un problema de entidad externa XML (XXE). It was fou... • http://rhn.redhat.com/errata/RHSA-2014-1284.html • CWE-611: Improper Restriction of XML External Entity Reference •

CVSS: 6.6EPSS: 0%CPEs: 6EXPL: 0

27 Jul 2007 — The Access Control functionality (JMXOpsAccessControlFilter) in JMX Console in JBoss Application Server 4.0.2 and 4.0.5 before 20070416 uses a member variable to store the roles of the current user, which allows remote authenticated administrators to trigger a race condition and gain privileges by logging in during a session by a more privileged administrator, as demonstrated by privilege escalation from Read Mode to Write Mode. La funcionalidad Control de Acceso (JMXOpsAccessControlFilter) en JMX Console d... • http://jira.jboss.com/jira/browse/ASPATCH-172 •

CVSS: 8.8EPSS: 0%CPEs: 1EXPL: 0

27 Feb 2007 — Cross-site request forgery (CSRF) vulnerability in jmx-console/HtmlAdaptor in JBoss allows remote attackers to perform privileged actions as administrators via certain MBean operations, a different vulnerability than CVE-2006-3733. Vulnerabilidad de falsificación de petición en sitios cruzados (CSRF) en jmx-console/HtmlAdaptor de JBoss permite a atacantes remotos llevar a cabo acciones privilegiadas como administrador mediante ciertas operaciones MBean, una vulnerabilidad diferente que CVE-2006-3733. • http://osvdb.org/33142 • CWE-352: Cross-Site Request Forgery (CSRF) •

CVSS: 9.8EPSS: 89%CPEs: 1EXPL: 2

21 Feb 2007 — The default configuration of JBoss does not restrict access to the (1) console and (2) web management interfaces, which allows remote attackers to bypass authentication and gain administrative access via direct requests. La configuración por defecto de JBoss no restringe el acceso a (1) la consola y (2) interfaces de gestión web, lo cual permite a atacantes remotos evitar la autenticación y obtener acceso administrativo mediante peticiones directas. • https://www.exploit-db.com/exploits/21080 • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 8.8EPSS: 34%CPEs: 12EXPL: 0

27 Nov 2006 — Directory traversal vulnerability in the DeploymentFileRepository class in JBoss Application Server (jbossas) 3.2.4 through 4.0.5 allows remote authenticated users to read or modify arbitrary files, and possibly execute arbitrary code, via unspecified vectors related to the console manager. Vulnerabilidad de salto de directorio en la clase JBoss Application Server (jbossas) 3.2.4 hasta 4.0.5 permite a usuarios remotos validados leer o modificar archivos y posiblemente ejecutar código de su elección, a travé... • http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01390402 •

CVSS: 5.3EPSS: 14%CPEs: 7EXPL: 1

17 Jun 2005 — JBOSS 3.2.2 through 3.2.7 and 4.0.2 allows remote attackers to obtain sensitive information via a GET request (1) with a "%." (percent dot), which reveals the installation path or (2) with a % (percent) before a filename, which reveals the contents of the file. • https://www.exploit-db.com/exploits/25842 •

CVSS: 9.8EPSS: 18%CPEs: 2EXPL: 1

09 Oct 2003 — Unknown vulnerability in the HSQLDB component in JBoss 3.2.1 and 3.0.8 on Java 1.4.x platforms, when running in the default configuration, allows remote attackers to conduct unauthorized activities and possibly execute arbitrary code via certain SQL statements to (1) TCP port 1701 in JBoss 3.2.1, and (2) port 1476 in JBoss 3.0.8. Vulnerabilidad desconocida en el componenete HSQLDB en JBoss 3.2.1 y 3.0.8 en plataformas Java 1.4.x, cuando corre con la configuración por defecto, permite a atacantes remotos lle... • https://www.exploit-db.com/exploits/23221 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •