Vulnerabilities > Redhat > Jboss Enterprise Application Platform > 6.2.3

DATE CVE VULNERABILITY TITLE RISK
2015-02-13 CVE-2014-7849 Permissions, Privileges, and Access Controls vulnerability in Redhat Jboss Enterprise Application Platform
The Role Based Access Control (RBAC) implementation in JBoss Enterprise Application Platform (EAP) 6.2.0 through 6.3.2 does not properly verify authorization conditions, which allows remote authenticated users to add, modify, and undefine otherwise restricted attributes by leveraging the Maintainer role.
network
low complexity
redhat CWE-264
4.0
2015-02-13 CVE-2014-7827 Permissions, Privileges, and Access Controls vulnerability in Redhat Jboss Enterprise Application Platform
The org.jboss.security.plugins.mapping.JBossMappingManager implementation in JBoss Security in Red Hat JBoss Enterprise Application Platform (EAP) before 6.3.3 uses the default security domain when a security domain is undefined, which allows remote authenticated users to bypass intended access restrictions by leveraging credentials on the default domain for a role that is also on the application domain.
network
redhat CWE-264
3.5
2014-07-07 CVE-2014-3481 Information Exposure vulnerability in Redhat Jboss Enterprise Application Platform
org.jboss.as.jaxrs.deployment.JaxrsIntegrationProcessor in Red Hat JBoss Enterprise Application Platform (JEAP) before 6.2.4 enables entity expansion, which allows remote attackers to read arbitrary files via unspecified vectors, related to an XML External Entity (XXE) issue.
network
low complexity
redhat CWE-200
5.0
2014-06-05 CVE-2014-0224 Inadequate Encryption Strength vulnerability in multiple products
OpenSSL before 0.9.8za, 1.0.0 before 1.0.0m, and 1.0.1 before 1.0.1h does not properly restrict processing of ChangeCipherSpec messages, which allows man-in-the-middle attackers to trigger use of a zero-length master key in certain OpenSSL-to-OpenSSL communications, and consequently hijack sessions or obtain sensitive information, via a crafted TLS handshake, aka the "CCS Injection" vulnerability.
7.4