
CVE-2012-5626
https://notcve.org/view.php?id=CVE-2012-5626
23 Jan 2020 — EJB method in Red Hat JBoss BRMS 5; Red Hat JBoss Enterprise Application Platform 5; Red Hat JBoss Operations Network 3.1; Red Hat JBoss Portal 4 and 5; Red Hat JBoss SOA Platform 4.2, 4.3, and 5; in Red Hat JBoss Enterprise Web Server 1 ignores roles specified using the @RunAs annotation. El método EJB en Red Hat JBoss BRMS versión 5; Red Hat JBoss Enterprise Application Platform versión 5; Red Hat JBoss Operations Network versión 3.1; Red Hat JBoss Portal versiones 4 y 5; Red Hat JBoss SOA Platform versio... • https://access.redhat.com/security/cve/cve-2012-5626 •

CVE-2014-3701
https://notcve.org/view.php?id=CVE-2014-3701
15 Dec 2019 — eDeploy has tmp file race condition flaws eDeploy tiene fallos de condición de carrera de archivos tmp. • https://access.redhat.com/security/cve/cve-2014-3701 • CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') •

CVE-2014-3699
https://notcve.org/view.php?id=CVE-2014-3699
15 Dec 2019 — eDeploy has RCE via cPickle deserialization of untrusted data eDeploy tiene una RCE por medio de la deserialización cPickle de datos no seguros. • https://access.redhat.com/security/cve/cve-2014-3699 • CWE-502: Deserialization of Untrusted Data •

CVE-2012-2148
https://notcve.org/view.php?id=CVE-2012-2148
06 Dec 2019 — An issue exists in the property replacements feature in any descriptor in JBoxx AS 7.1.1 ignores java security policies Se presenta un problema en la funcionalidad property replacements en cualquier descriptor en JBoxx AS versión 7.1.1 ignora las políticas de seguridad de Java. • https://access.redhat.com/security/cve/cve-2012-2148 • CWE-269: Improper Privilege Management •

CVE-2014-3700
https://notcve.org/view.php?id=CVE-2014-3700
21 Nov 2019 — eDeploy through at least 2014-10-14 has remote code execution due to eval() of untrusted data eDeploy hasta al menos el 14-10-2014, presenta una ejecución de código remota debido a la función eval() de datos no confiables. • https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2014-3700 • CWE-74: Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection') •

CVE-2014-3655
https://notcve.org/view.php?id=CVE-2014-3655
13 Nov 2019 — JBoss KeyCloak is vulnerable to soft token deletion via CSRF JBoss KeyCloak es vulnerable a la eliminación del token soft por medio de CSRF • https://access.redhat.com/security/cve/cve-2014-3655 • CWE-352: Cross-Site Request Forgery (CSRF) •

CVE-2011-3923 – Apache Struts - 'ParametersInterceptor' Remote Code Execution
https://notcve.org/view.php?id=CVE-2011-3923
01 Nov 2019 — Apache Struts before 2.3.1.2 allows remote attackers to bypass security protections in the ParameterInterceptor class and execute arbitrary commands. Apache Struts versiones anteriores a 2.3.1.2, permite a atacantes remotos omitir las protecciones de seguridad en la clase ParameterInterceptor y ejecutar comandos arbitrarios. • https://www.exploit-db.com/exploits/24874 • CWE-732: Incorrect Permission Assignment for Critical Resource •

CVE-2015-5183 – Console: HTTPOnly and Secure attributes not set on cookies in Red Hat AMQ
https://notcve.org/view.php?id=CVE-2015-5183
25 Sep 2017 — Console: HTTPOnly and Secure attributes not set on cookies in Red Hat AMQ. Consola: Atributos de HTTPOnly y Secure no establecidos en las cookies de Red Hat AMQ. It was found that Hawtio console does not set HTTPOnly or Secure attributes on cookies. An attacker could use this flaw to rerieve an authenticated user's SessionID, and possibly conduct further attacks with the permissions of the authenticated user. AMQ Broker is a high-performance messaging implementation based on ActiveMQ Artemis. • http://www.securitytracker.com/id/1041750 •

CVE-2015-5184 – Console: CORS headers set to allow all in Red Hat AMQ
https://notcve.org/view.php?id=CVE-2015-5184
25 Sep 2017 — Console: CORS headers set to allow all in Red Hat AMQ. Consola: Las cabeceras de CORS están preparadas para permitir a todos los de Red Hat AMQ. It was found that the Hawtio console setting for the Access-Control-Allow-Origin header permits unrestricted sharing (allow all). An attacker could use this flaw to access sensitive information or perform other attacks. • https://bugzilla.redhat.com/show_bug.cgi?id=1249183 •

CVE-2016-2183 – SSL/TLS: Birthday attack against 64-bit block ciphers (SWEET32)
https://notcve.org/view.php?id=CVE-2016-2183
01 Sep 2016 — The DES and Triple DES ciphers, as used in the TLS, SSH, and IPSec protocols and other protocols and products, have a birthday bound of approximately four billion blocks, which makes it easier for remote attackers to obtain cleartext data via a birthday attack against a long-duration encrypted session, as demonstrated by an HTTPS session using Triple DES in CBC mode, aka a "Sweet32" attack. Los cifrados DES y Triple DES, como se usan en los protocolos TLS, SSH e IPSec y otros protocolos y productos, tienen ... • https://packetstorm.news/files/id/142756 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor CWE-327: Use of a Broken or Risky Cryptographic Algorithm •