Vulnerabilities > Redhat > Jboss Operations Network

DATE CVE VULNERABILITY TITLE RISK
2016-08-02 CVE-2016-3737 Improper Input Validation vulnerability in Redhat Jboss Operations Network
The server in Red Hat JBoss Operations Network (JON) before 3.3.6 allows remote attackers to execute arbitrary code via a crafted HTTP request, related to message deserialization.
network
low complexity
redhat CWE-20
critical
9.0
2015-08-11 CVE-2015-3267 Cross-site Scripting vulnerability in Redhat Jboss Operations Network
Cross-site scripting (XSS) vulnerability in the 404 error page in Red Hat JBoss Operations Network before 3.3.3 allows remote attackers to inject arbitrary web script or HTML via a crafted URL.
network
redhat CWE-79
4.3
2015-04-24 CVE-2015-0297 Improper Access Control vulnerability in Redhat Jboss Operations Network 3.3.1
Red Hat JBoss Operations Network 3.3.1 does not properly restrict access to certain APIs, which allows remote attackers to execute arbitrary Java methods via the (1) ServerInvokerServlet or (2) SchedulerService or (3) cause a denial of service (disk consumption) via the ContentManager.
network
low complexity
redhat CWE-284
critical
9.0
2015-02-13 CVE-2014-7853 Information Exposure vulnerability in Redhat products
The JBoss Application Server (WildFly) JacORB subsystem in Red Hat JBoss Enterprise Application Platform (EAP) before 6.3.3 does not properly assign socket-binding-ref sensitivity classification to the security-domain attribute, which allows remote authenticated users to obtain sensitive information by leveraging access to the security-domain attribute.
network
low complexity
redhat CWE-200
4.0
2014-04-01 CVE-2012-0032 Permissions, Privileges, and Access Controls vulnerability in Redhat Jboss Operations Network
Red Hat JBoss Operations Network (JON) before 3.0.1 uses 0777 permissions for the root directory when installing a remote client, which allows local users to read or modify subdirectories and files within the root directory, as demonstrated by obtaining JON credentials.
local
high complexity
redhat CWE-264
3.7
2014-04-01 CVE-2011-4573 Permissions, Privileges, and Access Controls vulnerability in Redhat Jboss Operations Network
Red Hat JBoss Operations Network (JON) before 2.4.2 does not properly enforce "modify resource" permissions for remote authenticated users when deleting a plug-in configuration update from the group connection properties history, which prevents such activities from being recorded in the audit trail.
network
redhat CWE-264
3.5
2014-02-14 CVE-2012-1100 Improper Authentication vulnerability in Redhat Jboss Operations Network
Red Hat JBoss Operations Network (JON) 3.0.x before 3.0.1, 2.4.2, and earlier, when LDAP authentication is enabled and the LDAP bind account credentials are invalid, allows remote attackers to login to LDAP-based accounts via an arbitrary password in a login request.
network
redhat CWE-287
5.8
2014-02-14 CVE-2012-0062 Improper Authentication vulnerability in Redhat Jboss Operations Network
Red Hat JBoss Operations Network (JON) before 2.4.2 and 3.0.x before 3.0.1 allows remote attackers to hijack agent sessions via an agent registration request without a security token.
network
redhat CWE-287
5.8
2014-02-14 CVE-2012-0052 Improper Input Validation vulnerability in Redhat Jboss Operations Network
Red Hat JBoss Operations Network (JON) before 2.4.2 and 3.0.x before 3.0.1 does not check the JON agent key, which allows remote attackers to spoof the identity of arbitrary agents via the registered agent name.
network
redhat CWE-20
5.8
2013-12-24 CVE-2013-4452 Permissions, Privileges, and Access Controls vulnerability in Redhat Jboss Operations Network 3.1.2
Red Hat JBoss Operations Network 3.1.2 uses world-readable permissions for the (1) server and (2) agent configuration files, which allows local users to obtain authentication credentials and other unspecified sensitive information by reading these files.
local
low complexity
redhat CWE-264
2.1