2 results (0.009 seconds)

CVSS: 7.5EPSS: 43%CPEs: 12EXPL: 0

Directory traversal vulnerability in the DeploymentFileRepository class in JBoss Application Server (jbossas) 3.2.4 through 4.0.5 allows remote authenticated users to read or modify arbitrary files, and possibly execute arbitrary code, via unspecified vectors related to the console manager. Vulnerabilidad de salto de directorio en la clase JBoss Application Server (jbossas) 3.2.4 hasta 4.0.5 permite a usuarios remotos validados leer o modificar archivos y posiblemente ejecutar código de su elección, a través de vectores no especificados en el administrador de consola. • http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01390402 http://jira.jboss.com/jira/browse/ASPATCH-126 http://jira.jboss.com/jira/browse/JBAS-3861 http://secunia.com/advisories/23095 http://secunia.com/advisories/23984 http://secunia.com/advisories/24104 http://secunia.com/advisories/29726 http://securitytracker.com/id?1017289 http://www.novell.com/linux/security/advisories/2007_02_sr.html http://www.osvdb.org/30767 http://www.redhat.com/support/ •

CVSS: 5.0EPSS: 3%CPEs: 7EXPL: 1

JBOSS 3.2.2 through 3.2.7 and 4.0.2 allows remote attackers to obtain sensitive information via a GET request (1) with a "%." (percent dot), which reveals the installation path or (2) with a % (percent) before a filename, which reveals the contents of the file. • https://www.exploit-db.com/exploits/25842 http://archives.neohapsis.com/archives/fulldisclosure/2006-07/0424.html http://marc.info/?l=bugtraq&m=111911095424496&w=2 http://secunia.com/advisories/15746 http://secunia.com/advisories/17559 http://secunia.com/advisories/18789 http://securityreason.com/securityalert/439 http://securitytracker.com/id?1015605 http://www.securityfocus.com/archive/1/440641/100/100/threaded http://www.securityfocus.com/bid/13985 http://www.vupen.com/ •