Search Results (Refine Search)
- Results Type: Overview
- Keyword (text search): cpe:2.3:a:redhat:jboss_operations_network:3.1.2:*:*:*:*:*:*:*
- CPE Name Search: true
Vuln ID | Summary | CVSS Severity |
---|---|---|
CVE-2016-6330 |
The server in Red Hat JBoss Operations Network (JON), when SSL authentication is not configured for JON server / agent communication, allows remote attackers to execute arbitrary code via a crafted HTTP request, related to message deserialization. NOTE: this vulnerability exists because of an incomplete fix for CVE-2016-3737. Published: September 27, 2016; 11:59:06 AM -0400 |
V3.0: 9.8 CRITICAL V2.0: 9.0 HIGH |
CVE-2016-5422 |
The web console in Red Hat JBoss Operations Network (JON) before 3.3.7 does not properly authorize requests to add users with the super user role, which allows remote authenticated users to gain admin privileges via a crafted POST request. Published: September 07, 2016; 3:28:03 PM -0400 |
V3.0: 8.8 HIGH V2.0: 6.5 MEDIUM |
CVE-2016-3737 |
The server in Red Hat JBoss Operations Network (JON) before 3.3.6 allows remote attackers to execute arbitrary code via a crafted HTTP request, related to message deserialization. Published: August 02, 2016; 10:59:01 AM -0400 |
V3.0: 9.8 CRITICAL V2.0: 9.0 HIGH |
CVE-2015-3267 |
Cross-site scripting (XSS) vulnerability in the 404 error page in Red Hat JBoss Operations Network before 3.3.3 allows remote attackers to inject arbitrary web script or HTML via a crafted URL. Published: August 11, 2015; 10:59:08 AM -0400 |
V3.x:(not available) V2.0: 4.3 MEDIUM |
CVE-2013-4452 |
Red Hat JBoss Operations Network 3.1.2 uses world-readable permissions for the (1) server and (2) agent configuration files, which allows local users to obtain authentication credentials and other unspecified sensitive information by reading these files. Published: December 24, 2013; 2:55:07 PM -0500 |
V3.x:(not available) V2.0: 2.1 LOW |
CVE-2013-4373 |
The storeFiles method in JPADriftServerBean in Red Hat JBoss Operations Network (JON) 3.1.2 allows local users to load arbitrary drift files into a server by writing the files to the temporary directory that is used to unpack zip files. Published: October 23, 2013; 11:48:48 PM -0400 |
V3.x:(not available) V2.0: 3.2 LOW |
CVE-2013-4293 |
The server in Red Hat JBoss Operations Network (JON) 3.1.2 logs passwords in plaintext, which allows local users to obtain sensitive information by reading the log files. Published: October 23, 2013; 11:48:46 PM -0400 |
V3.x:(not available) V2.0: 2.1 LOW |
CVE-2013-2165 |
ResourceBuilderImpl.java in the RichFaces 3.x through 5.x implementation in Red Hat JBoss Web Framework Kit before 2.3.0, Red Hat JBoss Web Platform through 5.2.0, Red Hat JBoss Enterprise Application Platform through 4.3.0 CP10 and 5.x through 5.2.0, Red Hat JBoss BRMS through 5.3.1, Red Hat JBoss SOA Platform through 4.3.0 CP05 and 5.x through 5.3.1, Red Hat JBoss Portal through 4.3 CP07 and 5.x through 5.2.2, and Red Hat JBoss Operations Network through 2.4.2 and 3.x through 3.1.2 does not restrict the classes for which deserialization methods can be called, which allows remote attackers to execute arbitrary code via crafted serialized data. Published: July 23, 2013; 7:03:11 AM -0400 |
V3.x:(not available) V2.0: 7.5 HIGH |