CVE-2010-0738
- Reference to the description:
- Description:
- The JMX-Console web application in JBossAs in Red Hat JBoss Enterprise Application Platform (aka JBoss EAP or JBEAP) 4.2 before 4.2.0.CP09 and 4.3 before 4.3.0.CP08 performs access control only for the GET and POST methods, which allows remote attackers to send requests to this application's GET handler by using a different method.
- Last updated date:
- 06/28/2024
Reports
ACTIVELY EXPLOITED
- Type:
- exploitation
- Confidence:
- HIGH
- Date of publishing:
- 04/18/2016
- Reference url to background
https://threatpost.com/3-2-million-servers-vulnerable-to-jboss-attack/117465/
- Type:
- exploitation
- Confidence:
- HIGH
- Date of publishing:
- 05/25/2022
- Reference url to background
https://www.cisa.gov/known-exploited-vulnerabilities-catalog
- Type:
- exploit
- Confidence:
- HIGH
- Date of publishing:
- 01/27/2015
- Reference url to background
- Type:
- exploit
- Confidence:
- HIGH
- Date of publishing:
- 07/24/2017
- Reference url to background
- Type:
- exploit
- Confidence:
- HIGH
- Date of publishing:
- 05/12/2020
- Reference url to background
- Type:
- exploit
- Confidence:
- HIGH
- Date of publishing:
- 05/12/2020
- Type:
- exploit
- Confidence:
- HIGH
- Date of publishing:
- 10/02/2020
- Reference url to background
- Type:
- exploit
- Confidence:
- HIGH
- Date of publishing:
- 10/02/2020
- Type:
- exploit
- Confidence:
- HIGH
- Date of publishing:
- 10/02/2020
- Reference url to background
- Type:
- exploit
- Confidence:
- HIGH
- Date of publishing:
- 01/28/2021
- Reference url to background
- Type:
- exploit
- Confidence:
- HIGH
- Date of publishing:
- 06/28/2024
- Reference url to background