{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-18T15:50:04.658","vulnerabilities":[{"cve":{"id":"CVE-2012-5626","sourceIdentifier":"secalert@redhat.com","published":"2020-01-23T19:15:11.250","lastModified":"2024-11-21T01:44:59.927","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"EJB method in Red Hat JBoss BRMS 5; Red Hat JBoss Enterprise Application Platform 5; Red Hat JBoss Operations Network 3.1; Red Hat JBoss Portal 4 and 5; Red Hat JBoss SOA Platform 4.2, 4.3, and 5; in Red Hat JBoss Enterprise Web Server 1 ignores roles specified using the @RunAs annotation."},{"lang":"es","value":"El método EJB en Red Hat JBoss BRMS versión 5; Red Hat JBoss Enterprise Application Platform versión 5; Red Hat JBoss Operations Network versión 3.1; Red Hat JBoss Portal versiones 4 y 5; Red Hat JBoss SOA Platform versiones 4.2, 4.3 y 5; en Red Hat JBoss Enterprise Web Server versión 1, ignora los roles especificados usando la anotación @RunAs."}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N","baseScore":7.5,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"HIGH","availabilityImpact":"NONE"},"exploitabilityScore":3.9,"impactScore":3.6}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:P/A:N","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"PARTIAL","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-noinfo"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:redhat:jboss_brms:5:*:*:*:*:*:*:*","matchCriteriaId":"BE5157F3-B74D-4066-AB34-8B42BBEB9C7B"},{"vulnerable":true,"criteria":"cpe:2.3:a:redhat:jboss_enterprise_application_platform:5.0.0:*:*:*:*:*:*:*","matchCriteriaId":"F5D7F1AD-4BD3-4C37-B6B5-B287464B2EEB"},{"vulnerable":true,"criteria":"cpe:2.3:a:redhat:jboss_enterprise_web_server:1.0.0:*:*:*:*:*:*:*","matchCriteriaId":"14259BF1-3601-4BF1-A591-FC4DE1639C57"},{"vulnerable":true,"criteria":"cpe:2.3:a:redhat:jboss_operations_network:3.1:*:*:*:*:*:*:*","matchCriteriaId":"4EFFA4B2-1562-48E0-A598-3C1F8973FDF1"},{"vulnerable":true,"criteria":"cpe:2.3:a:redhat:jboss_portal:4.0.0:*:*:*:*:*:*:*","matchCriteriaId":"F5B50AB8-E325-46FB-B0AF-76667CB2B7D5"},{"vulnerable":true,"criteria":"cpe:2.3:a:redhat:jboss_portal:5.0.0:*:*:*:*:*:*:*","matchCriteriaId":"D84C9125-611F-42AB-88CE-1A09E7FDCD6C"},{"vulnerable":true,"criteria":"cpe:2.3:a:redhat:jboss_soa_platform:4.2:*:*:*:*:*:*:*","matchCriteriaId":"A59BF53C-DD78-4515-9461-4F8ED01811C4"},{"vulnerable":true,"criteria":"cpe:2.3:a:redhat:jboss_soa_platform:4.3:*:*:*:*:*:*:*","matchCriteriaId":"4F556928-E3AD-40FE-9526-BEAB49AA1F0C"},{"vulnerable":true,"criteria":"cpe:2.3:a:redhat:jboss_soa_platform:5:*:*:*:*:*:*:*","matchCriteriaId":"44D5DDAE-5519-4E9D-8DD0-D56E4E034F26"}]}]}],"references":[{"url":"https://access.redhat.com/security/cve/cve-2012-5626","source":"secalert@redhat.com","tags":["Vendor Advisory"]},{"url":"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2012-5626","source":"secalert@redhat.com","tags":["Issue Tracking","Vendor Advisory"]},{"url":"https://access.redhat.com/security/cve/cve-2012-5626","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]},{"url":"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2012-5626","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Issue Tracking","Vendor Advisory"]}]}}]}