Vulnerability Name |
CVE
CWE
|
CWE |
Severity |
Jboss EAP CVE-2017-12189 Vulnerability (CVE-2017-12189)
|
CVE-2017-12189
|
|
High
|
Jboss EAP CVE-2022-1259 Vulnerability (CVE-2022-1259)
|
CVE-2022-1259
|
|
High
|
Jboss EAP CVE-2023-3223 Vulnerability (CVE-2023-3223)
|
CVE-2023-3223
|
|
High
|
Jboss EAP Deserialization of Untrusted Data Vulnerability (CVE-2016-4978)
|
CVE-2016-4978
CWE-502
|
CWE-502
|
High
|
Jboss EAP Deserialization of Untrusted Data Vulnerability (CVE-2016-7065)
|
CVE-2016-7065
CWE-502
|
CWE-502
|
High
|
Jboss EAP Deserialization of Untrusted Data Vulnerability (CVE-2018-12022)
|
CVE-2018-12022
CWE-502
|
CWE-502
|
High
|
Jboss EAP Deserialization of Untrusted Data Vulnerability (CVE-2018-12023)
|
CVE-2018-12023
CWE-502
|
CWE-502
|
High
|
Jboss EAP Deserialization of Untrusted Data Vulnerability (CVE-2019-10086)
|
CVE-2019-10086
CWE-502
|
CWE-502
|
High
|
Jboss EAP Deserialization of Untrusted Data Vulnerability (CVE-2021-4104)
|
CVE-2021-4104
CWE-502
|
CWE-502
|
High
|
Jboss EAP Exposure of Resource to Wrong Sphere Vulnerability (CVE-2021-3859)
|
CVE-2021-3859
CWE-668
|
CWE-668
|
High
|
Jboss EAP Exposure of Sensitive Information to an Unauthorized Actor Vulnerability (CVE-2014-3530)
|
CVE-2014-3530
CWE-200
|
CWE-200
|
High
|
Jboss EAP Exposure of Sensitive Information to an Unauthorized Actor Vulnerability (CVE-2016-2183)
|
CVE-2016-2183
CWE-200
|
CWE-200
|
High
|
Jboss EAP Files or Directories Accessible to External Parties Vulnerability (CVE-2021-3717)
|
CVE-2021-3717
CWE-552
|
CWE-552
|
High
|
Jboss EAP Improper Handling of Exceptional Conditions Vulnerability (CVE-2018-8039)
|
CVE-2018-8039
CWE-755
|
CWE-755
|
High
|
Jboss EAP Improper Initialization Vulnerability (CVE-2023-4503)
|
CVE-2023-4503
CWE-665
|
CWE-665
|
High
|
Jboss EAP Improper Input Validation Vulnerability (CVE-2010-3708)
|
CVE-2010-3708
CWE-20
|
CWE-20
|
High
|
Jboss EAP Improper Input Validation Vulnerability (CVE-2013-2185)
|
CVE-2013-2185
CWE-20
|
CWE-20
|
High
|
Jboss EAP Improper Input Validation Vulnerability (CVE-2016-3110)
|
CVE-2016-3110
CWE-20
|
CWE-20
|
High
|
Jboss EAP Improper Input Validation Vulnerability (CVE-2020-1757)
|
CVE-2020-1757
CWE-20
|
CWE-20
|
High
|
Jboss EAP Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') Vulnerability (CVE-2018-1048)
|
CVE-2018-1048
CWE-22
|
CWE-22
|
High
|
Jboss EAP Improper Restriction of Operations within the Bounds of a Memory Buffer Vulnerability (CVE-2021-32027)
|
CVE-2021-32027
CWE-119
|
CWE-119
|
High
|
Jboss EAP Improper Restriction of XML External Entity Reference Vulnerability (CVE-2019-10172)
|
CVE-2019-10172
CWE-611
|
CWE-611
|
High
|
Jboss EAP Inadequate Encryption Strength Vulnerability (CVE-2014-0224)
|
CVE-2014-0224
CWE-326
|
CWE-326
|
High
|
Jboss EAP Incomplete List of Disallowed Inputs Vulnerability (CVE-2018-5968)
|
CVE-2018-5968
CWE-184
|
CWE-184
|
High
|
Jboss EAP Inconsistent Interpretation of HTTP Requests ('HTTP Request Smuggling') Vulnerability (CVE-2017-7561)
|
CVE-2017-7561
CWE-444
|
CWE-444
|
High
|
Jboss EAP Inconsistent Interpretation of HTTP Requests ('HTTP Request Smuggling') Vulnerability (CVE-2017-12165)
|
CVE-2017-12165
CWE-444
|
CWE-444
|
High
|
Jboss EAP Inconsistent Interpretation of HTTP Requests ('HTTP Request Smuggling') Vulnerability (CVE-2019-16869)
|
CVE-2019-16869
CWE-444
|
CWE-444
|
High
|
Jboss EAP Inconsistent Interpretation of HTTP Requests ('HTTP Request Smuggling') Vulnerability (CVE-2020-7238)
|
CVE-2020-7238
CWE-444
|
CWE-444
|
High
|
Jboss EAP Incorrect Authorization Vulnerability (CVE-2019-14843)
|
CVE-2019-14843
CWE-863
|
CWE-863
|
High
|
Jboss EAP Loop with Unreachable Exit Condition ('Infinite Loop') Vulnerability (CVE-2017-2670)
|
CVE-2017-2670
CWE-835
|
CWE-835
|
High
|
Jboss EAP Loop with Unreachable Exit Condition ('Infinite Loop') Vulnerability (CVE-2018-1041)
|
CVE-2018-1041
CWE-835
|
CWE-835
|
High
|
Jboss EAP Loop with Unreachable Exit Condition ('Infinite Loop') Vulnerability (CVE-2018-1336)
|
CVE-2018-1336
CWE-835
|
CWE-835
|
High
|
Jboss EAP Loop with Unreachable Exit Condition ('Infinite Loop') Vulnerability (CVE-2019-0205)
|
CVE-2019-0205
CWE-835
|
CWE-835
|
High
|
Jboss EAP Loop with Unreachable Exit Condition ('Infinite Loop') Vulnerability (CVE-2023-1108)
|
CVE-2023-1108
CWE-835
|
CWE-835
|
High
|
Jboss EAP Missing Authorization Vulnerability (CVE-2019-10184)
|
CVE-2019-10184
CWE-862
|
CWE-862
|
High
|
Jboss EAP Missing Release of Memory after Effective Lifetime Vulnerability (CVE-2022-0853)
|
CVE-2022-0853
CWE-401
|
CWE-401
|
High
|
Jboss EAP Observable Discrepancy Vulnerability (CVE-2022-3143)
|
CVE-2022-3143
CWE-203
|
CWE-203
|
High
|
Jboss EAP Other Vulnerability (CVE-2014-3490)
|
CVE-2014-3490
|
|
High
|
Jboss EAP Other Vulnerability (CVE-2019-9513)
|
CVE-2019-9513
|
|
High
|
Jboss EAP Out-of-bounds Read Vulnerability (CVE-2019-0210)
|
CVE-2019-0210
CWE-125
|
CWE-125
|
High
|
Jboss EAP Permission Issues Vulnerability (CVE-2016-7066)
|
CVE-2016-7066
|
|
High
|
Jboss EAP Permissions, Privileges, and Access Controls Vulnerability (CVE-2011-4605)
|
CVE-2011-4605
CWE-264
|
CWE-264
|
High
|
Jboss EAP Permissions, Privileges, and Access Controls Vulnerability (CVE-2011-4608)
|
CVE-2011-4608
CWE-264
|
CWE-264
|
High
|
Jboss EAP Permissions, Privileges, and Access Controls Vulnerability (CVE-2012-5629)
|
CVE-2012-5629
CWE-264
|
CWE-264
|
High
|
Jboss EAP Permissions, Privileges, and Access Controls Vulnerability (CVE-2013-2165)
|
CVE-2013-2165
CWE-264
|
CWE-264
|
High
|
Jboss EAP Permissions, Privileges, and Access Controls Vulnerability (CVE-2016-5406)
|
CVE-2016-5406
CWE-264
|
CWE-264
|
High
|
Jboss EAP Permissions, Privileges, and Access Controls Vulnerability (CVE-2016-8656)
|
CVE-2016-8656
CWE-264
|
CWE-264
|
High
|
Jboss EAP Permissions, Privileges, and Access Controls Vulnerability (CVE-2016-8657)
|
CVE-2016-8657
CWE-264
|
CWE-264
|
High
|
Jboss EAP Permissions, Privileges, and Access Controls Vulnerability (CVE-2019-3894)
|
CVE-2019-3894
CWE-264
|
CWE-264
|
High
|
Jboss EAP Reachable Assertion Vulnerability (CVE-2020-25710)
|
CVE-2020-25710
CWE-617
|
CWE-617
|
High
|
Jboss EAP Uncontrolled Resource Consumption Vulnerability (CVE-2016-8610)
|
CVE-2016-8610
CWE-400
|
CWE-400
|
High
|
Jboss EAP Uncontrolled Resource Consumption Vulnerability (CVE-2017-12174)
|
CVE-2017-12174
CWE-400
|
CWE-400
|
High
|
Jboss EAP Uncontrolled Resource Consumption Vulnerability (CVE-2019-14888)
|
CVE-2019-14888
CWE-400
|
CWE-400
|
High
|
Jboss EAP Uncontrolled Resource Consumption Vulnerability (CVE-2019-19343)
|
CVE-2019-19343
CWE-400
|
CWE-400
|
High
|
Jboss EAP Uncontrolled Resource Consumption Vulnerability (CVE-2020-14384)
|
CVE-2020-14384
CWE-400
|
CWE-400
|
High
|
Jboss EAP Uncontrolled Resource Consumption Vulnerability (CVE-2020-25644)
|
CVE-2020-25644
CWE-400
|
CWE-400
|
High
|
Jboss EAP Uncontrolled Resource Consumption Vulnerability (CVE-2021-3629)
|
CVE-2021-3629
CWE-400
|
CWE-400
|
High
|
Jboss EAP Uncontrolled Resource Consumption Vulnerability (CVE-2021-3690)
|
CVE-2021-3690
CWE-400
|
CWE-400
|
High
|
Jboss EAP Uncontrolled Resource Consumption Vulnerability (CVE-2023-44487)
|
CVE-2023-44487
CWE-400
|
CWE-400
|
High
|
Jboss EAP Unrestricted Upload of File with Dangerous Type Vulnerability (CVE-2017-12617)
|
CVE-2017-12617
CWE-434
|
CWE-434
|
High
|
Jboss EAP Use of a Broken or Risky Cryptographic Algorithm Vulnerability (CVE-2018-1000180)
|
CVE-2018-1000180
CWE-327
|
CWE-327
|
High
|
Jboss EAP Use of Externally-Controlled Input to Select Classes or Code ('Unsafe Reflection') Vulnerability (CVE-2017-7536)
|
CVE-2017-7536
CWE-470
|
CWE-470
|
High
|
Jboss EAP Use of Externally-Controlled Input to Select Classes or Code ('Unsafe Reflection') Vulnerability (CVE-2019-10174)
|
CVE-2019-10174
CWE-470
|
CWE-470
|
High
|
Jboss EAP XML Injection (aka Blind XPath Injection) Vulnerability (CVE-2018-1000632)
|
CVE-2018-1000632
CWE-91
|
CWE-91
|
High
|
JBoss HttpAdaptor JMXInvokerServlet
|
CWE-94
|
CWE-94
|
High
|
JBoss InvokerTransformer Remote Code Execution
|
CVE-2015-7501
CWE-502
|
CWE-502
|
High
|
JBoss JMX Console Unrestricted Access
|
CWE-200
|
CWE-200
|
High
|
JBoss JMX management console
|
CWE-200
|
CWE-200
|
High
|
JBoss Seam framework remote code execution
|
CVE-2010-1871
CWE-94
|
CWE-94
|
High
|
JBoss Seam remoting vulnerabilities
|
CVE-2013-6447
CVE-2013-6448
CWE-611
|
CWE-611
|
High
|
JBoss ServerInfo MBean
|
CVE-2010-0738
CWE-200
|
CWE-200
|
High
|
JBoss Server MBean
|
CWE-200
|
CWE-200
|
High
|
JBoss Web Console JMX Invoker
|
CWE-200
|
CWE-200
|
High
|
Jenkins Allocation of Resources Without Limits or Throttling Vulnerability (CVE-2023-27900)
|
CVE-2023-27900
CWE-770
|
CWE-770
|
High
|
Jenkins Allocation of Resources Without Limits or Throttling Vulnerability (CVE-2023-27901)
|
CVE-2023-27901
CWE-770
|
CWE-770
|
High
|