Vulnerabilities > Redhat > Jboss Enterprise Brms Platform > 5.2.0

DATE CVE VULNERABILITY TITLE RISK
2015-03-24 CVE-2015-0250 XML external entity (XXE) vulnerability in the SVG to (1) PNG and (2) JPG conversion classes in Apache Batik 1.x before 1.8 allows remote attackers to read arbitrary files or cause a denial of service via a crafted SVG file.
network
low complexity
canonical apache redhat
6.4
2015-02-20 CVE-2014-0005 Permissions, Privileges, and Access Controls vulnerability in Redhat products
PicketBox and JBossSX, as used in Red Hat JBoss Enterprise Application Platform (JBEAP) 6.2.2 and JBoss BRMS before 6.0.3 roll up patch 2, allows remote authenticated users to read and modify the application sever configuration and state by deploying a crafted application.
local
low complexity
redhat CWE-264
3.6
2013-10-01 CVE-2013-4210 Remote Denial of Service vulnerability in Red Hat JBoss Remoting
The org.jboss.remoting.transport.socket.ServerThread class in Red Hat JBoss Remoting for Red Hat JBoss SOA Platform 5.3.1 GA, Web Platform 5.2.0, Enterprise Application Platform 5.2.0, and other products allows remote attackers to cause a denial of service (file descriptor consumption) via unspecified vectors.
network
low complexity
redhat
5.0
2013-02-05 CVE-2012-5478 Permissions, Privileges, and Access Controls vulnerability in Redhat products
The AuthorizationInterceptor in JBoss Enterprise Application Platform (EAP) before 5.2.0, Web Platform (EWP) before 5.2.0, BRMS Platform before 5.3.1, and SOA Platform before 5.3.1 does not properly restrict access, which allows remote authenticated users to bypass intended role restrictions and perform arbitrary JMX operations via unspecified vectors.
network
redhat CWE-264
4.9
2013-02-05 CVE-2012-3370 Permissions, Privileges, and Access Controls vulnerability in Redhat products
The SecurityAssociation.getCredential method in JBoss Enterprise Application Platform (EAP) before 5.2.0, Web Platform (EWP) before 5.2.0, BRMS Platform before 5.3.1, and SOA Platform before 5.3.1 returns the credentials of the previous user when a security context is not provided, which allows remote attackers to gain privileges as other users.
network
redhat CWE-264
5.8
2013-02-05 CVE-2012-3369 Permissions, Privileges, and Access Controls vulnerability in Redhat products
The CallerIdentityLoginModule in JBoss Enterprise Application Platform (EAP) before 5.2.0, Web Platform (EWP) before 5.2.0, BRMS Platform before 5.3.1, and SOA Platform before 5.3.1 allows remote attackers to gain privileges of the previous user via a null password, which causes the previous user's password to be used.
network
high complexity
redhat CWE-264
4.0
2013-02-05 CVE-2012-0034 Credentials Management vulnerability in Redhat products
The NonManagedConnectionFactory in JBoss Enterprise Application Platform (EAP) 5.1.2 and 5.2.0, Web Platform (EWP) 5.1.2 and 5.2.0, and BRMS Platform before 5.3.1 logs the username and password in cleartext when an exception is thrown, which allows local users to obtain sensitive information by reading the log file.
local
low complexity
redhat CWE-255
2.1
2012-11-23 CVE-2012-2377 Improper Authentication vulnerability in Redhat products
JGroups diagnostics service in JBoss Enterprise Portal Platform before 5.2.2, SOA Platform before 5.3.0, and BRMS Platform before 5.3.0, is enabled without authentication when started by the JGroups channel, which allows remote attackers in adjacent networks to read diagnostics information via a crafted IP multicast.
low complexity
redhat CWE-287
3.3
2012-11-23 CVE-2012-1167 Permissions, Privileges, and Access Controls vulnerability in Redhat products
The JBoss Server in JBoss Enterprise Application Platform 5.1.x before 5.1.2 and 5.2.x before 5.2.2, Web Platform before 5.1.2, BRMS Platform before 5.3.0, and SOA Platform before 5.3.0, when the server is configured to use the JaccAuthorizationRealm and the ignoreBaseDecision property is set to true on the JBossWebRealm, does not properly check the permissions created by the WebPermissionMapping class, which allows remote authenticated users to access arbitrary applications.
network
high complexity
redhat CWE-264
4.6