The JBoss Enterprise Application Platform is a subscription-based/open-source Java EE-based application server runtime platform used for building deploying and hosting highly-transactional Java applications and services developed and maintained by Red Hat
Jboss EAP Improper Restriction of Excessive Authentication Attempts Vulnerability
Critical
Jboss EAP Deserialization of Untrusted Data Vulnerability
Critical
Jboss EAP Server-Side Request Forgery (SSRF) Vulnerability
Critical
Jboss EAP Deserialization of Untrusted Data Vulnerability
Critical
Jboss EAP Deserialization of Untrusted Data Vulnerability
Critical
Jboss EAP Improper Restriction of XML External Entity Reference Vulnerability
Critical
Jboss EAP Missing Release of Memory after Effective Lifetime Vulnerability
High
Jboss EAP Inadequate Encryption Strength Vulnerability
High
Jboss EAP Deserialization of Untrusted Data Vulnerability
High
Jboss EAP Use of Externally-Controlled Input to Select Classes or Code (Unsafe Reflection) Vulnerability
High
Jboss EAP Exposure of Sensitive Information to an Unauthorized Actor Vulnerability
High
Jboss EAP Allocation of Resources Without Limits or Throttling Vulnerability
High
Jboss EAP Other Vulnerability
High
Jboss EAP Allocation of Resources Without Limits or Throttling Vulnerability
High
Jboss EAP Use of Externally-Controlled Input to Select Classes or Code (Unsafe Reflection) Vulnerability
High
Jboss EAP Improper Input Validation Vulnerability
High
Jboss EAP Improper Input Validation Vulnerability
High
Jboss EAP Permissions Privileges and Access Controls Vulnerability
High
Jboss EAP Deserialization of Untrusted Data Vulnerability
High
Jboss EAP Inconsistent Interpretation of HTTP Requests (HTTP Request Smuggling) Vulnerability
High
Jboss EAP Uncontrolled Resource Consumption Vulnerability
High
Jboss EAP Improper Resource Shutdown or Release Vulnerability
High
Jboss EAP Permissions Privileges and Access Controls Vulnerability
High
Jboss EAP Loop with Unreachable Exit Condition (Infinite Loop) Vulnerability
High
Jboss EAP Uncontrolled Resource Consumption Vulnerability
High
Jboss EAP Incorrect Authorization Vulnerability
High
Jboss EAP Improper Restriction of Operations within the Bounds of a Memory Buffer Vulnerability
High
Jboss EAP Inconsistent Interpretation of HTTP Requests (HTTP Request Smuggling) Vulnerability
High
Jboss EAP Improper Input Validation Vulnerability
High
Jboss EAP Other Vulnerability
High