Looking for the vulnerability index of Invicti's legacy products?

Jboss EAP

The JBoss Enterprise Application Platform is a subscription-based/open-source Java EE-based application server runtime platform used for building deploying and hosting highly-transactional Java applications and services developed and maintained by Red Hat

Severity Summary:

Critical: 34 High: 77 Medium: 99 Low: 16
Reference
Title
Severity
Jboss EAP Uncontrolled Resource Consumption Vulnerability
High
Jboss EAP Improper Initialization Vulnerability
High
Jboss EAP Allocation of Resources Without Limits or Throttling Vulnerability
High
Jboss EAP Allocation of Resources Without Limits or Throttling Vulnerability
High
Jboss EAP Vulnerability
High
Jboss EAP Loop with Unreachable Exit Condition (Infinite Loop) Vulnerability
High
Jboss EAP Observable Discrepancy Vulnerability
High
Jboss EAP Exposure of Resource to Wrong Sphere Vulnerability
High
Jboss EAP Vulnerability
High
Jboss EAP Uncontrolled Resource Consumption Vulnerability
High
Jboss EAP Files or Directories Accessible to External Parties Vulnerability
High
Jboss EAP Other Vulnerability
High
Jboss EAP Vulnerability
High
Jboss EAP Missing Release of Memory after Effective Lifetime Vulnerability
High
Jboss EAP Use of Externally-Controlled Input to Select Classes or Code (Unsafe Reflection) Vulnerability
High
Jboss EAP Allocation of Resources Without Limits or Throttling Vulnerability
High
Jboss EAP Use of Externally-Controlled Input to Select Classes or Code (Unsafe Reflection) Vulnerability
High
Jboss EAP Deserialization of Untrusted Data Vulnerability
High
Jboss EAP Improper Restriction of Operations within the Bounds of a Memory Buffer Vulnerability
High
Jboss EAP Inconsistent Interpretation of HTTP Requests (HTTP Request Smuggling) Vulnerability
High
Jboss EAP Incomplete List of Disallowed Inputs Vulnerability
High
Jboss EAP Exposure of Sensitive Information to an Unauthorized Actor Vulnerability
High
Jboss EAP Uncontrolled Resource Consumption Vulnerability
High
Jboss EAP Use of a Broken or Risky Cryptographic Algorithm Vulnerability
High
Jboss EAP Loop with Unreachable Exit Condition (Infinite Loop) Vulnerability
High
Jboss EAP Loop with Unreachable Exit Condition (Infinite Loop) Vulnerability
High
Jboss EAP Reachable Assertion Vulnerability
High
Jboss EAP Improper Input Validation Vulnerability
High
Jboss EAP Loop with Unreachable Exit Condition (Infinite Loop) Vulnerability
High
Jboss EAP Missing Authorization Vulnerability
High