Vulnerabilities > Redhat > Jboss Operations Network > 3.1
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2020-01-23 | CVE-2012-5626 | Unspecified vulnerability in Redhat products EJB method in Red Hat JBoss BRMS 5; Red Hat JBoss Enterprise Application Platform 5; Red Hat JBoss Operations Network 3.1; Red Hat JBoss Portal 4 and 5; Red Hat JBoss SOA Platform 4.2, 4.3, and 5; in Red Hat JBoss Enterprise Web Server 1 ignores roles specified using the @RunAs annotation. | 7.5 |
2019-11-04 | CVE-2013-4374 | Exposure of Resource to Wrong Sphere vulnerability in Redhat products An insecurity temporary file vulnerability exists in RHQ Mongo DB Drift Server through 2013-09-25 when unpacking zipped files. | 7.1 |
2016-09-27 | CVE-2016-6330 | Deserialization of Untrusted Data vulnerability in Redhat Jboss Operations Network The server in Red Hat JBoss Operations Network (JON), when SSL authentication is not configured for JON server / agent communication, allows remote attackers to execute arbitrary code via a crafted HTTP request, related to message deserialization. | 9.8 |
2016-09-07 | CVE-2016-5422 | Permissions, Privileges, and Access Controls vulnerability in Redhat Jboss Operations Network The web console in Red Hat JBoss Operations Network (JON) before 3.3.7 does not properly authorize requests to add users with the super user role, which allows remote authenticated users to gain admin privileges via a crafted POST request. | 8.8 |
2016-08-02 | CVE-2016-3737 | Improper Input Validation vulnerability in Redhat Jboss Operations Network The server in Red Hat JBoss Operations Network (JON) before 3.3.6 allows remote attackers to execute arbitrary code via a crafted HTTP request, related to message deserialization. | 9.8 |