Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
enterprise application platform vulnerabilities and exploits
(subscribe to this query)
6.5
CVSSv2
CVE-2019-14843
A flaw was found in Wildfly Security Manager, running under JDK 11 or 8, that authorized requests for any requester. This flaw could be used by a malicious app deployed on the app server to access unauthorized information and possibly conduct further attacks. Versions shipped wit...
Redhat Single Sign-on 7.3
Redhat Jboss Enterprise Application Platform 7.2.0
Redhat Single Sign-on -
1 Github repository
5
CVSSv2
CVE-2010-2493
The default configuration of the deployment descriptor (aka web.xml) in picketlink-sts.war in (1) the security_saml quickstart, (2) the webservice_proxy_security quickstart, (3) the web-console application, (4) the http-invoker application, (5) the gpd-deployer application, (6) t...
Redhat Jboss Enterprise Soa Platform 4.3.0
Redhat Jboss Enterprise Soa Platform 5.0.0
Redhat Jboss Enterprise Soa Platform 4.2.0
Redhat Jboss Enterprise Soa Platform
5.8
CVSSv2
CVE-2011-4314
message/ax/AxMessage.java in OpenID4Java prior to 0.9.6 final, as used in JBoss Enterprise Application Platform 5.1 prior to 5.1.2, Step2, Kay Framework prior to 1.0.2, and possibly other products does not verify that Attribute Exchange (AX) information is signed, which allows re...
Redhat Jboss Enterprise Application Platform 5.1.0
Redhat Jboss Enterprise Application Platform 5.1.1
Kay Framework Project Kay Framework 0.1.0
Kay Framework Project Kay Framework 0.0.0
Openid Openid4java 0.9.3
Openid Openid4java 0.9.2
Kay Framework Project Kay Framework 0.3.0
Kay Framework Project Kay Framework 0.2.0
Redhat Jboss Enterprise Application Platform 5.1.2
Kay Framework Project Kay Framework
Openid Openid4java
Openid Openid4java 0.9.4.339
Kay Framework Project Kay Framework 1.0.0
Kay Framework Project Kay Framework 0.8.0
4
CVSSv2
CVE-2020-14307
A vulnerability was found in Wildfly's Enterprise Java Beans (EJB) versions shipped with Red Hat JBoss EAP 7, where SessionOpenInvocations are never removed from the remote InvocationTracker after a response is received in the EJB Client, as well as the server. This flaw all...
Redhat Jboss Fuse 6.0.0
Redhat Single Sign-on 7.0
Redhat Openshift Application Runtimes -
Redhat Jboss Enterprise Application Platform Continuous Delivery -
Redhat Amq 2.0
4.4
CVSSv2
CVE-2007-4563
Cosminexus Manager in Cosminexus Application Server 06-50 and later might assign the wrong user's group permissions to logical J2EE server processes, which allows local users to gain privileges.
Hitachi Cosminexus Application Server Enterprise 06 50
Hitachi Cosminexus Application Server Enterprise 06 50 F
Hitachi Cosminexus Application Server Enterprise 06 51
Hitachi Cosminexus Application Server Standard 06 50 B
Hitachi Cosminexus Application Server Standard 06 50 C
Hitachi Cosminexus Application Server Standard 06 51 B 1
Hitachi Cosminexus Application Server Standard 06 51 C
Hitachi Ucosminexus Application Server Enterprise 06 70 A
Hitachi Ucosminexus Application Server Enterprise 06 71
Hitachi Ucosminexus Application Server Enterprise 06 71 B
Hitachi Ucosminexus Application Server Enterprise 07-00-01
Hitachi Ucosminexus Application Server Enterprise 07 00
Hitachi Ucosminexus Application Server Enterprise 07 10
Hitachi Ucosminexus Application Server Standard 06 70 B
Hitachi Ucosminexus Application Server Standard 06 71 B
Hitachi Ucosminexus Application Server Standard 06 72 1
Hitachi Ucosminexus Application Server Standard 07 00
Hitachi Ucosminexus Application Server Standard 07 00 1
Hitachi Ucosminexus Service Platform 07 10
Hitachi Cosminexus Application Server Enterprise 06 50 C 1
Hitachi Cosminexus Application Server Enterprise 06 50 E 1
Hitachi Cosminexus Application Server Standard 06 50
4.6
CVSSv2
CVE-2007-4564
Cosminexus Manager in Cosminexus Application Server 07-00 and later might assign the wrong user's group permissions to logical user server processes, which allows local users to gain privileges.
Hitachi Cosminexus Application Server Enterprise 06 50 C
Hitachi Cosminexus Application Server Enterprise 06 50 C 1
Hitachi Cosminexus Application Server Standard 06 50
Hitachi Cosminexus Application Server Standard 06 50 E 1
Hitachi Cosminexus Application Server Standard 06 50 F
Hitachi Electronic Form Workflow -professional Library Set 07 00
Hitachi Electronic Form Workflow -professional Library Set 07 00 B
Hitachi Ucosminexus Application Server Enterprise 06 70 B
Hitachi Ucosminexus Application Server Enterprise 06 70 B 1
Hitachi Ucosminexus Application Server Enterprise 06 72 1
Hitachi Ucosminexus Application Server Enterprise 06 72 B
Hitachi Ucosminexus Application Server Enterprise 07 00
Hitachi Ucosminexus Application Server Enterprise 07 00 12
Hitachi Ucosminexus Application Server Enterprise 07 10 1
Hitachi Ucosminexus Application Server Standard 06 70
Hitachi Ucosminexus Application Server Standard 06 70 B 1
Hitachi Ucosminexus Application Server Standard 06 70 C
Hitachi Ucosminexus Application Server Standard 06 72 D
Hitachi Ucosminexus Application Server Standard 06 72 G
Hitachi Ucosminexus Application Server Standard 07 00
Hitachi Ucosminexus Application Server Standard 07 10
Hitachi Cosminexus Application Server Enterprise 06 50
5
CVSSv2
CVE-2012-5626
EJB method in Red Hat JBoss BRMS 5; Red Hat JBoss Enterprise Application Platform 5; Red Hat JBoss Operations Network 3.1; Red Hat JBoss Portal 4 and 5; Red Hat JBoss SOA Platform 4.2, 4.3, and 5; in Red Hat JBoss Enterprise Web Server 1 ignores roles specified using the @RunAs a...
Redhat Jboss Brms 5
Redhat Jboss Enterprise Application Platform 5.0.0
Redhat Jboss Enterprise Web Server 1.0.0
Redhat Jboss Operations Network 3.1
Redhat Jboss Portal 4.0.0
Redhat Jboss Portal 5.0.0
Redhat Jboss Soa Platform 4.2
Redhat Jboss Soa Platform 4.3
Redhat Jboss Soa Platform 5
6.8
CVSSv2
CVE-2011-2196
jboss-seam.jar in the JBoss Seam 2 framework 2.2.x and previous versions, as distributed in Red Hat JBoss Enterprise SOA Platform 4.3.0.CP05 and 5.1.0; JBoss Enterprise Application Platform (aka JBoss EAP or JBEAP) 4.3.0, 4.3.0.CP09, and 5.1.1; and JBoss Enterprise Web Platform 5...
Redhat Jboss Seam 2 Framework 2.1.2
Redhat Jboss Seam 2 Framework
Redhat Jboss Seam 2 Framework 2.0.0
Redhat Jboss Seam 2 Framework 2.2.0
Redhat Jboss Seam 2 Framework 2.0.2
Redhat Jboss Enterprise Application Platform 4.3.0
Redhat Jboss Seam 2 Framework 2.1.0
Redhat Jboss Enterprise Application Platform 5.1.1
Redhat Jboss Enterprise Soa Platform 5.1.0
Redhat Jboss Seam 2 Framework 2.0.1
Redhat Jboss Seam 2 Framework 2.1.1
Redhat Jboss Seam 2 Framework 2.2.1
Redhat Jboss Seam 2 Framework 2.0.3
Redhat Jboss Enterprise Soa Platform 4.3.0
Redhat Jboss Enterprise Web Platform 5.1.1
4.6
CVSSv2
CVE-2021-3717
A flaw was found in Wildfly. An incorrect JBOSS_LOCAL_USER challenge location when using the elytron configuration may lead to JBOSS_LOCAL_USER access to all users on the machine. The highest threat from this vulnerability is to confidentiality, integrity, and availability. This ...
Redhat Single Sign-on -
Redhat Jboss Enterprise Application Platform -
Redhat Wildfly Core
Redhat Jboss Enterprise Application Platform 7.4
Redhat Jboss Enterprise Application Platform 7.3
3.5
CVSSv2
CVE-2021-3642
A flaw was found in Wildfly Elytron in versions before 1.10.14.Final, before 1.15.5.Final and before 1.16.1.Final where ScramServer may be susceptible to Timing Attack if enabled. The highest threat of this vulnerability is confidentiality.
Redhat Wildfly Elytron
Redhat Build Of Quarkus -
Redhat Codeready Studio 12.0
Redhat Data Grid 8.0
Redhat Descision Manager 7.0
Redhat Integration Camel K -
Redhat Integration Camel Quarkus
Redhat Jboss Enterprise Application Platform 7.0.0
Redhat Jboss Enterprise Application Platform Expansion Pack -
Redhat Jboss Fuse 7.0.0
Redhat Openshift Application Runtimes -
Redhat Process Automation 7.0
Quarkus Quarkus
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
SSTI
CVE-2024-35863
CVE-2024-35910
man-in-the-middle
CVE-2024-35912
CVE-2024-25742
LFI
CVE-2024-32002
CVE-2024-22120
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
4
5
6
7
8
9
10
NEXT »