Total vulnerabilities in the database
Red Hat JBoss Operations Network (JON) before 2.4.2 and 3.0.x before 3.0.1 does not check the JON agent key, which allows remote attackers to spoof the identity of arbitrary agents via the registered agent name.
Software | From | Fixed in |
---|---|---|
redhat / jboss_operations_network | 3.0 | 3.0.x |
redhat / jboss_operations_network | - | 2.4.1.x |
redhat / jboss_operations_network | 2.3.1 | 2.3.1.x |
redhat / jboss_operations_network | 2.4 | 2.4.x |
redhat / jboss_operations_network | 2.0.1 | 2.0.1.x |
redhat / jboss_operations_network | 2.1.0 | 2.1.0.x |
redhat / jboss_operations_network | 2.3 | 2.3.x |
redhat / jboss_operations_network | 2.0.0 | 2.0.0.x |
redhat / jboss_operations_network | 2.2 | 2.2.x |