jboss is vulnerable to information disclosure attacks. The vulnerability exists as twiddle.sh in JBoss AS 5.0 and EAP 5.0 and earlier accepts credentials as command-line arguments, which allows local users to read the credentials by listing the process and its arguments.
objectopia.com/2009/10/01/securing-jmx-invoker-layer-in-jboss/
rhn.redhat.com/errata/RHSA-2013-0191.html
rhn.redhat.com/errata/RHSA-2013-0192.html
rhn.redhat.com/errata/RHSA-2013-0193.html
rhn.redhat.com/errata/RHSA-2013-0194.html
rhn.redhat.com/errata/RHSA-2013-0195.html
rhn.redhat.com/errata/RHSA-2013-0196.html
rhn.redhat.com/errata/RHSA-2013-0197.html
rhn.redhat.com/errata/RHSA-2013-0198.html
rhn.redhat.com/errata/RHSA-2013-0221.html
rhn.redhat.com/errata/RHSA-2013-0533.html
secunia.com/advisories/51984
secunia.com/advisories/52054
www.openwall.com/lists/oss-security/2012/07/20/1
www.openwall.com/lists/oss-security/2012/07/23/2
access.redhat.com/knowledge/docs/
access.redhat.com/security/updates/classification/#important
bugzilla.redhat.com/show_bug.cgi?id=848486
issues.jboss.org/browse/JBPAPP-3391?_sscc=t
rhn.redhat.com/errata/RHSA-2013-0191.html