CVE ID | Published | Description | Score | Severity |
---|---|---|---|---|
EJB method in Red Hat JBoss BRMS 5; Red Hat JBoss Enterprise Application Platform 5; Red Hat JBoss Operations Network 3.1; Red Hat JBoss Portal 4 and 5; Red Hat JBoss SOA Platform 4.2, 4.3, and 5; in Red Hat JBoss Enterprise Web Server 1 ignores roles specified using the @RunAs annotation. | 7.5 |
High |
||
eDeploy has tmp file race condition flaws | 8.1 |
High |
||
eDeploy has RCE via cPickle deserialization of untrusted data | 9.8 |
Critical |
||
An issue exists in the property replacements feature in any descriptor in JBoxx AS 7.1.1 ignores java security policies | 3.3 |
Low |
||
eDeploy through at least 2014-10-14 has remote code execution due to eval() of untrusted data | 9.8 |
Critical |
||
JBoss KeyCloak is vulnerable to soft token deletion via CSRF | 4.3 |
Medium |
||
Apache Struts before 2.3.1.2 allows remote attackers to bypass security protections in the ParameterInterceptor class and execute arbitrary commands. | 9.8 |
Critical |
||
Console: HTTPOnly and Secure attributes not set on cookies in Red Hat AMQ. | 7.5 |
High |
||
Console: CORS headers set to allow all in Red Hat AMQ. | 7.5 |
High |
||
The DES and Triple DES ciphers, as used in the TLS, SSH, and IPSec protocols and other protocols and products, have a birthday bound of approximately four billion blocks, which makes it easier for remote attackers to obtain cleartext data via a birthday attack against a long-duration encrypted session, as demonstrated by an HTTPS session using Triple DES in CBC mode, aka a "Sweet32" attack. | 7.5 |
High |
||
protocol.c in the Apache HTTP Server 2.2.x through 2.2.21 does not properly restrict header information during construction of Bad Request (aka 400) error documents, which allows remote attackers to obtain the values of HTTPOnly cookies via vectors involving a (1) long or (2) malformed header in conjunction with crafted web script. | 4.3 |
|||
scoreboard.c in the Apache HTTP Server 2.2.21 and earlier might allow local users to cause a denial of service (daemon crash during shutdown) or possibly have unspecified other impact by modifying a certain type field within a scoreboard shared memory segment, leading to an invalid call to the free function. | 4.6 |
|||
The mod_proxy_ajp module in the Apache HTTP Server before 2.2.21, when used with mod_proxy_balancer in certain configurations, allows remote attackers to cause a denial of service (temporary "error state" in the backend server) via a malformed HTTP request. | 4.3 |