JBoss DeploymentFileRepository WAR Deployment (via JMXInvokerServlet)
14 September 2012
The default configuration of JBoss does not restrict access to the (1) console and (2) web management interfaces, which allows remote attackers to bypass authentication and gain administrative access via direct requests.
CVSS v2 Base Score: 7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)
Posted on 21 January 2015. | Brandon Hoffman, Lumeta's CTO, talks about the management strategies that are essential in the information security industry. He also offers advice to those stepping into the CTO role for the first time, and talks about the evolution of network situational awareness.
Posted on 19 January 2015. | Security researcher Corey Thuen has made a surprising discovery when he reverse-engineered the firmware of the Snapshot tracking dongles that US-based Progressive Insurance gives out to its customers.
Posted on 19 January 2015. | Rather than spend resources on measures such as pen testing, itís now perhaps more relevant to find ways of monitoring for, rooting out, identifying and taking remedial action against malware and threats already inside a network.
Posted on 16 January 2015. | Since the three day terror attack that started in France with the attack on satirical newspaper Charlie Hebdo, 19,000 websites of French-based companies have been targeted by cyber attackers.