Looking for the vulnerability index of Invicti's legacy products?

Jboss EAP

The JBoss Enterprise Application Platform is a subscription-based/open-source Java EE-based application server runtime platform used for building deploying and hosting highly-transactional Java applications and services developed and maintained by Red Hat

Severity Summary:

Critical: 34 High: 77 Medium: 99 Low: 16
Reference
Title
Severity
Jboss EAP Improperly Controlled Modification of Dynamically-Determined Object Attributes Vulnerability
Critical
Jboss EAP Improper Neutralization of Input During Web Page Generation (Cross-site Scripting) Vulnerability
Critical
Jboss EAP Deserialization of Untrusted Data Vulnerability
Critical
Jboss EAP Deserialization of Untrusted Data Vulnerability
Critical
Jboss EAP Permissions Privileges and Access Controls Vulnerability
High
Jboss EAP Allocation of Resources Without Limits or Throttling Vulnerability
High
Jboss EAP Allocation of Resources Without Limits or Throttling Vulnerability
High
Jboss EAP Inconsistent Interpretation of HTTP Requests (HTTP Request Smuggling) Vulnerability
High
Jboss EAP Inconsistent Interpretation of HTTP Requests (HTTP Request Smuggling) Vulnerability
High
Jboss EAP Allocation of Resources Without Limits or Throttling Vulnerability
High
Jboss EAP Permissions Privileges and Access Controls Vulnerability
High
Jboss EAP Deserialization of Untrusted Data Vulnerability
High
Jboss EAP Improper Input Validation Vulnerability
High
Jboss EAP Permissions Privileges and Access Controls Vulnerability
High
Jboss EAP Improper Input Validation Vulnerability
High
Jboss EAP Other Vulnerability
High
Jboss EAP Exposure of Sensitive Information to an Unauthorized Actor Vulnerability
High
Jboss EAP Permissions Privileges and Access Controls Vulnerability
High
Jboss EAP Allocation of Resources Without Limits or Throttling Vulnerability
High
Jboss EAP Inadequate Encryption Strength Vulnerability
High
Jboss EAP Uncontrolled Resource Consumption Vulnerability
High
Jboss EAP Permissions Privileges and Access Controls Vulnerability
High
Jboss EAP Uncontrolled Resource Consumption Vulnerability
High
Jboss EAP Uncontrolled Resource Consumption Vulnerability
High
Jboss EAP Allocation of Resources Without Limits or Throttling Vulnerability
High
Jboss EAP Uncontrolled Resource Consumption Vulnerability
High
Jboss EAP Unrestricted Upload of File with Dangerous Type Vulnerability
High
Jboss EAP Deserialization of Untrusted Data Vulnerability
High
Jboss EAP Improper Neutralization of Input During Web Page Generation (Cross-site Scripting) Vulnerability
High
Jboss EAP Vulnerability
High