CVEInsight.
TrendingZero-DayExploreBrowseSearchSaved
CVEInsight.

Free vulnerability intelligence for developers, security teams, and researchers. Data sourced from public databases for informational purposes only.

Explore

HomeTrendingZero-Day WatchAttack TypesBrowse CVEsSearch

Legal

Privacy PolicyTerms of ServiceData Disclaimer

© 2026CVEInsight. For informational use only — not a substitute for professional security advice.

CVE data sourced from NVD / NIST & public disclosures.

redhat

jboss_enterprise_web_server

12 known vulnerabilities · sorted by CVSS score

CVE-2014-3699
CRITICAL9.8

eDeploy has RCE via cPickle deserialization of untrusted data

redhat / edeploy+1
Network
Published Dec 15, 2019
CVE-2011-3923
CRITICAL9.8

Apache Struts before 2.3.1.2 allows remote attackers to bypass security protections in the ParameterInterceptor class and execute arbitrary commands.

apache / struts+1
Network
Published Nov 1, 2019
CVE-2014-3700
CRITICAL9.8

eDeploy through at least 2014-10-14 has remote code execution due to eval() of untrusted data

redhat / edeploy+1
Network
Published Nov 21, 2019
CVE-2014-3701
HIGH8.1

eDeploy has tmp file race condition flaws

redhat / edeploy+1
Network
Published Dec 15, 2019
CVE-2019-19906
HIGH7.5

cyrus-sasl (aka Cyrus SASL) 2.1.27 has an out-of-bounds write leading to unauthenticated remote denial-of-service in OpenLDAP via a malformed LDAP packet. The OpenLDAP crash is ultimately caused by an off-by-one error in _sasl_add_string in common.c in cyrus-sasl.

cyrusimap / cyrus-sasl+53
Network
Published Dec 19, 2019
CVE-2020-25710
HIGH7.5

A flaw was found in OpenLDAP in versions before 2.4.56. This flaw allows an attacker who sends a malicious packet processed by OpenLDAP to force a failed assertion in csnNormalize23(). The highest threat from this vulnerability is to system availability.

openldap / openldap+8
Network
Published May 28, 2021
CVE-2012-5626
HIGH7.5

EJB method in Red Hat JBoss BRMS 5; Red Hat JBoss Enterprise Application Platform 5; Red Hat JBoss Operations Network 3.1; Red Hat JBoss Portal 4 and 5; Red Hat JBoss SOA Platform 4.2, 4.3, and 5; in Red Hat JBoss Enterprise Web Server 1 ignores roles specified using the @RunAs annotation.

redhat / jboss_brms+8
Network
Published Jan 23, 2020
CVE-2018-1336
HIGH7.5

An improper handing of overflow in the UTF-8 decoder with supplementary characters can lead to an infinite loop in the decoder causing a Denial of Service. Versions Affected: Apache Tomcat 9.0.0.M9 to 9.0.7, 8.5.0 to 8.5.30, 8.0.0.RC1 to 8.0.51, and 7.0.28 to 7.0.86.

debian / debian_linux+43
Network
Published Aug 2, 2018
CVE-2018-1304
MEDIUM5.9

The URL pattern of "" (the empty string) which exactly maps to the context root was not correctly handled in Apache Tomcat 9.0.0.M1 to 9.0.4, 8.5.0 to 8.5.27, 8.0.0.RC1 to 8.0.49 and 7.0.0 to 7.0.84 when used as part of a security constraint definition. This caused the constraint to be ignored. It was, therefore, possible for unauthorised users to gain access to web application resources that should have been protected. Only security constraints with a URL pattern of the empty string were affected.

apache / tomcat+48
Network
Published Feb 28, 2018
CVE-2019-1559
MEDIUM5.9

If an application encounters a fatal protocol error and then calls SSL_shutdown() twice (once to send a close_notify, and once to receive one) then OpenSSL can respond differently to the calling application if a 0 byte record is received with invalid padding compared to if a 0 byte record is received with an invalid MAC. If the application then behaves differently based on that in a way that is detectable to the remote peer, then this amounts to a padding oracle that could be used to decrypt data. In order for this to be exploitable "non-stitched" ciphersuites must be in use. Stitched ciphersuites are optimised implementations of certain commonly used ciphersuites. Also the application must call SSL_shutdown() twice even if a protocol error has occurred (applications should not do this but some do anyway). Fixed in OpenSSL 1.0.2r (Affected 1.0.2-1.0.2q).

openssl / openssl+168
Network
Published Feb 27, 2019
CVE-2014-3655
MEDIUM4.3

JBoss KeyCloak is vulnerable to soft token deletion via CSRF

redhat / keycloak+1
Network
Published Nov 13, 2019
CVE-2012-2148
LOW3.3

An issue exists in the property replacements feature in any descriptor in JBoxx AS 7.1.1 ignores java security policies

redhat / jboss_community_application_server+1
Local
Published Dec 6, 2019