Vulnerability Name |
CVE
CWE
|
CWE |
Severity |
Jboss EAP Permissions, Privileges, and Access Controls Vulnerability (CVE-2012-4572)
|
CVE-2012-4572
CWE-264
|
CWE-264
|
Low
|
Jboss EAP Permissions, Privileges, and Access Controls Vulnerability (CVE-2012-5478)
|
CVE-2012-5478
CWE-264
|
CWE-264
|
Medium
|
Jboss EAP Permissions, Privileges, and Access Controls Vulnerability (CVE-2012-5629)
|
CVE-2012-5629
CWE-264
|
CWE-264
|
High
|
Jboss EAP Permissions, Privileges, and Access Controls Vulnerability (CVE-2013-2133)
|
CVE-2013-2133
CWE-264
|
CWE-264
|
Medium
|
Jboss EAP Permissions, Privileges, and Access Controls Vulnerability (CVE-2013-2165)
|
CVE-2013-2165
CWE-264
|
CWE-264
|
High
|
Jboss EAP Permissions, Privileges, and Access Controls Vulnerability (CVE-2014-0005)
|
CVE-2014-0005
CWE-264
|
CWE-264
|
Low
|
Jboss EAP Permissions, Privileges, and Access Controls Vulnerability (CVE-2014-0018)
|
CVE-2014-0018
CWE-264
|
CWE-264
|
Low
|
Jboss EAP Permissions, Privileges, and Access Controls Vulnerability (CVE-2014-0093)
|
CVE-2014-0093
CWE-264
|
CWE-264
|
Medium
|
Jboss EAP Permissions, Privileges, and Access Controls Vulnerability (CVE-2014-3464)
|
CVE-2014-3464
CWE-264
|
CWE-264
|
Medium
|
Jboss EAP Permissions, Privileges, and Access Controls Vulnerability (CVE-2014-3472)
|
CVE-2014-3472
CWE-264
|
CWE-264
|
Medium
|
Jboss EAP Permissions, Privileges, and Access Controls Vulnerability (CVE-2014-3586)
|
CVE-2014-3586
CWE-264
|
CWE-264
|
Low
|
Jboss EAP Permissions, Privileges, and Access Controls Vulnerability (CVE-2014-7827)
|
CVE-2014-7827
CWE-264
|
CWE-264
|
Low
|
Jboss EAP Permissions, Privileges, and Access Controls Vulnerability (CVE-2014-7849)
|
CVE-2014-7849
CWE-264
|
CWE-264
|
Medium
|
Jboss EAP Permissions, Privileges, and Access Controls Vulnerability (CVE-2015-5304)
|
CVE-2015-5304
CWE-264
|
CWE-264
|
Low
|
Jboss EAP Permissions, Privileges, and Access Controls Vulnerability (CVE-2016-2141)
|
CVE-2016-2141
CWE-264
|
CWE-264
|
Critical
|
Jboss EAP Permissions, Privileges, and Access Controls Vulnerability (CVE-2016-5406)
|
CVE-2016-5406
CWE-264
|
CWE-264
|
High
|
Jboss EAP Permissions, Privileges, and Access Controls Vulnerability (CVE-2016-8656)
|
CVE-2016-8656
CWE-264
|
CWE-264
|
High
|
Jboss EAP Permissions, Privileges, and Access Controls Vulnerability (CVE-2016-8657)
|
CVE-2016-8657
CWE-264
|
CWE-264
|
High
|
Jboss EAP Permissions, Privileges, and Access Controls Vulnerability (CVE-2019-3894)
|
CVE-2019-3894
CWE-264
|
CWE-264
|
High
|
Jboss EAP Reachable Assertion Vulnerability (CVE-2020-25710)
|
CVE-2020-25710
CWE-617
|
CWE-617
|
High
|
Jboss EAP Resource Management Errors Vulnerability (CVE-2016-7046)
|
CVE-2016-7046
|
|
Medium
|
Jboss EAP Server-Side Request Forgery (SSRF) Vulnerability (CVE-2018-14721)
|
CVE-2018-14721
CWE-918
|
CWE-918
|
Critical
|
Jboss EAP Session Fixation Vulnerability (CVE-2021-20324)
|
CVE-2021-20324
CWE-384
|
CWE-384
|
Medium
|
Jboss EAP Uncontrolled Resource Consumption Vulnerability (CVE-2014-0118)
|
CVE-2014-0118
CWE-400
|
CWE-400
|
Medium
|
Jboss EAP Uncontrolled Resource Consumption Vulnerability (CVE-2016-8610)
|
CVE-2016-8610
CWE-400
|
CWE-400
|
High
|
Jboss EAP Uncontrolled Resource Consumption Vulnerability (CVE-2016-8627)
|
CVE-2016-8627
CWE-400
|
CWE-400
|
Medium
|
Jboss EAP Uncontrolled Resource Consumption Vulnerability (CVE-2017-12174)
|
CVE-2017-12174
CWE-400
|
CWE-400
|
High
|
Jboss EAP Uncontrolled Resource Consumption Vulnerability (CVE-2019-14888)
|
CVE-2019-14888
CWE-400
|
CWE-400
|
High
|
Jboss EAP Uncontrolled Resource Consumption Vulnerability (CVE-2019-19343)
|
CVE-2019-19343
CWE-400
|
CWE-400
|
High
|
Jboss EAP Uncontrolled Resource Consumption Vulnerability (CVE-2020-14340)
|
CVE-2020-14340
CWE-400
|
CWE-400
|
Medium
|
Jboss EAP Uncontrolled Resource Consumption Vulnerability (CVE-2020-14384)
|
CVE-2020-14384
CWE-400
|
CWE-400
|
High
|
Jboss EAP Uncontrolled Resource Consumption Vulnerability (CVE-2020-25644)
|
CVE-2020-25644
CWE-400
|
CWE-400
|
High
|
Jboss EAP Uncontrolled Resource Consumption Vulnerability (CVE-2020-25689)
|
CVE-2020-25689
CWE-400
|
CWE-400
|
Medium
|
Jboss EAP Uncontrolled Resource Consumption Vulnerability (CVE-2021-3629)
|
CVE-2021-3629
CWE-400
|
CWE-400
|
High
|
Jboss EAP Uncontrolled Resource Consumption Vulnerability (CVE-2021-3690)
|
CVE-2021-3690
CWE-400
|
CWE-400
|
High
|
Jboss EAP Uncontrolled Resource Consumption Vulnerability (CVE-2023-44487)
|
CVE-2023-44487
CWE-400
|
CWE-400
|
High
|
Jboss EAP Unrestricted Upload of File with Dangerous Type Vulnerability (CVE-2017-12617)
|
CVE-2017-12617
CWE-434
|
CWE-434
|
High
|
Jboss EAP Use of a Broken or Risky Cryptographic Algorithm Vulnerability (CVE-2011-2487)
|
CVE-2011-2487
CWE-327
|
CWE-327
|
Medium
|
Jboss EAP Use of a Broken or Risky Cryptographic Algorithm Vulnerability (CVE-2018-1000180)
|
CVE-2018-1000180
CWE-327
|
CWE-327
|
High
|
Jboss EAP Use of Externally-Controlled Input to Select Classes or Code ('Unsafe Reflection') Vulnerability (CVE-2017-7536)
|
CVE-2017-7536
CWE-470
|
CWE-470
|
High
|
Jboss EAP Use of Externally-Controlled Input to Select Classes or Code ('Unsafe Reflection') Vulnerability (CVE-2019-10174)
|
CVE-2019-10174
CWE-470
|
CWE-470
|
High
|
Jboss EAP XML Injection (aka Blind XPath Injection) Vulnerability (CVE-2018-1000632)
|
CVE-2018-1000632
CWE-91
|
CWE-91
|
High
|
JBoss HttpAdaptor JMXInvokerServlet
|
CWE-94
|
CWE-94
|
High
|
JBoss InvokerTransformer Remote Code Execution
|
CVE-2015-7501
CWE-502
|
CWE-502
|
High
|
JBoss JMX Console Unrestricted Access
|
CWE-200
|
CWE-200
|
High
|
JBoss JMX management console
|
CWE-200
|
CWE-200
|
High
|
JBoss Seam framework remote code execution
|
CVE-2010-1871
CWE-94
|
CWE-94
|
High
|
JBoss Seam remoting vulnerabilities
|
CVE-2013-6447
CVE-2013-6448
CWE-611
|
CWE-611
|
High
|
JBoss ServerInfo MBean
|
CVE-2010-0738
CWE-200
|
CWE-200
|
High
|
JBoss Server MBean
|
CWE-200
|
CWE-200
|
High
|
JBoss status servlet information leak
|
CVE-2010-1429
CWE-200
|
CWE-200
|
Medium
|
JBoss Web Console JMX Invoker
|
CWE-200
|
CWE-200
|
High
|
JBoss web service console
|
CWE-200
|
CWE-200
|
Low
|
Jenkins 7PK - Security Features Vulnerability (CVE-2014-9634)
|
CVE-2014-9634
|
|
Medium
|
Jenkins 7PK - Security Features Vulnerability (CVE-2014-9635)
|
CVE-2014-9635
|
|
Medium
|
Jenkins Allocation of Resources Without Limits or Throttling Vulnerability (CVE-2021-21607)
|
CVE-2021-21607
CWE-770
|
CWE-770
|
Medium
|
Jenkins Allocation of Resources Without Limits or Throttling Vulnerability (CVE-2023-27900)
|
CVE-2023-27900
CWE-770
|
CWE-770
|
High
|
Jenkins Allocation of Resources Without Limits or Throttling Vulnerability (CVE-2023-27901)
|
CVE-2023-27901
CWE-770
|
CWE-770
|
High
|
Jenkins Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') Vulnerability (CVE-2017-1000503)
|
CVE-2017-1000503
CWE-362
|
CWE-362
|
High
|
Jenkins Cross-Site Request Forgery (CSRF) Vulnerability (CVE-2013-0327)
|
CVE-2013-0327
CWE-352
|
CWE-352
|
Medium
|
Jenkins Cross-Site Request Forgery (CSRF) Vulnerability (CVE-2013-0328)
|
CVE-2013-0328
CWE-352
|
CWE-352
|
Medium
|
Jenkins Cross-Site Request Forgery (CSRF) Vulnerability (CVE-2015-5318)
|
CVE-2015-5318
CWE-352
|
CWE-352
|
Medium
|
Jenkins Cross-Site Request Forgery (CSRF) Vulnerability (CVE-2015-7537)
|
CVE-2015-7537
CWE-352
|
CWE-352
|
High
|
Jenkins Cross-Site Request Forgery (CSRF) Vulnerability (CVE-2017-2613)
|
CVE-2017-2613
CWE-352
|
CWE-352
|
Medium
|
Jenkins Cross-Site Request Forgery (CSRF) Vulnerability (CVE-2017-1000356)
|
CVE-2017-1000356
CWE-352
|
CWE-352
|
High
|
Jenkins Cross-Site Request Forgery (CSRF) Vulnerability (CVE-2017-1000504)
|
CVE-2017-1000504
CWE-352
|
CWE-352
|
High
|
Jenkins Cross-Site Request Forgery (CSRF) Vulnerability (CVE-2018-1000195)
|
CVE-2018-1000195
CWE-352
|
CWE-352
|
Medium
|
Jenkins Cross-Site Request Forgery (CSRF) Vulnerability (CVE-2019-10353)
|
CVE-2019-10353
CWE-352
|
CWE-352
|
High
|
Jenkins Cross-Site Request Forgery (CSRF) Vulnerability (CVE-2019-10384)
|
CVE-2019-10384
CWE-352
|
CWE-352
|
High
|
Jenkins Cross-Site Request Forgery (CSRF) Vulnerability (CVE-2020-2160)
|
CVE-2020-2160
CWE-352
|
CWE-352
|
High
|
Jenkins Cross-Site Request Forgery (CSRF) Vulnerability (CVE-2022-20612)
|
CVE-2022-20612
CWE-352
|
CWE-352
|
Medium
|
Jenkins Cross-Site Request Forgery (CSRF) Vulnerability (CVE-2023-35141)
|
CVE-2023-35141
CWE-352
|
CWE-352
|
High
|
Jenkins Cryptographic Issues Vulnerability (CVE-2014-2061)
|
CVE-2014-2061
|
|
Medium
|
Jenkins CVE-2013-0158 Vulnerability (CVE-2013-0158)
|
CVE-2013-0158
|
|
Low
|
Jenkins CVE-2013-0329 Vulnerability (CVE-2013-0329)
|
CVE-2013-0329
|
|
High
|