Vulnerability Name |
CVE
CWE
|
CWE |
Severity |
Jboss EAP Inconsistent Interpretation of HTTP Requests ('HTTP Request Smuggling') Vulnerability (CVE-2017-2666)
|
CVE-2017-2666
CWE-444
|
CWE-444
|
Medium
|
Jboss EAP Inconsistent Interpretation of HTTP Requests ('HTTP Request Smuggling') Vulnerability (CVE-2017-7561)
|
CVE-2017-7561
CWE-444
|
CWE-444
|
High
|
Jboss EAP Inconsistent Interpretation of HTTP Requests ('HTTP Request Smuggling') Vulnerability (CVE-2017-12165)
|
CVE-2017-12165
CWE-444
|
CWE-444
|
High
|
Jboss EAP Inconsistent Interpretation of HTTP Requests ('HTTP Request Smuggling') Vulnerability (CVE-2019-16869)
|
CVE-2019-16869
CWE-444
|
CWE-444
|
High
|
Jboss EAP Inconsistent Interpretation of HTTP Requests ('HTTP Request Smuggling') Vulnerability (CVE-2019-20444)
|
CVE-2019-20444
CWE-444
|
CWE-444
|
Critical
|
Jboss EAP Inconsistent Interpretation of HTTP Requests ('HTTP Request Smuggling') Vulnerability (CVE-2019-20445)
|
CVE-2019-20445
CWE-444
|
CWE-444
|
Critical
|
Jboss EAP Inconsistent Interpretation of HTTP Requests ('HTTP Request Smuggling') Vulnerability (CVE-2020-7238)
|
CVE-2020-7238
CWE-444
|
CWE-444
|
High
|
Jboss EAP Inconsistent Interpretation of HTTP Requests ('HTTP Request Smuggling') Vulnerability (CVE-2020-10687)
|
CVE-2020-10687
CWE-444
|
CWE-444
|
Medium
|
Jboss EAP Inconsistent Interpretation of HTTP Requests ('HTTP Request Smuggling') Vulnerability (CVE-2020-10719)
|
CVE-2020-10719
CWE-444
|
CWE-444
|
Medium
|
Jboss EAP Incorrect Authorization Vulnerability (CVE-2014-0169)
|
CVE-2014-0169
CWE-863
|
CWE-863
|
Medium
|
Jboss EAP Incorrect Authorization Vulnerability (CVE-2017-12196)
|
CVE-2017-12196
CWE-863
|
CWE-863
|
Medium
|
Jboss EAP Incorrect Authorization Vulnerability (CVE-2019-14843)
|
CVE-2019-14843
CWE-863
|
CWE-863
|
High
|
Jboss EAP Incorrect Authorization Vulnerability (CVE-2022-0866)
|
CVE-2022-0866
CWE-863
|
CWE-863
|
Medium
|
Jboss EAP Insertion of Sensitive Information into Log File Vulnerability (CVE-2019-10212)
|
CVE-2019-10212
CWE-532
|
CWE-532
|
Critical
|
Jboss EAP Loop with Unreachable Exit Condition ('Infinite Loop') Vulnerability (CVE-2017-2670)
|
CVE-2017-2670
CWE-835
|
CWE-835
|
High
|
Jboss EAP Loop with Unreachable Exit Condition ('Infinite Loop') Vulnerability (CVE-2018-1041)
|
CVE-2018-1041
CWE-835
|
CWE-835
|
High
|
Jboss EAP Loop with Unreachable Exit Condition ('Infinite Loop') Vulnerability (CVE-2018-1336)
|
CVE-2018-1336
CWE-835
|
CWE-835
|
High
|
Jboss EAP Loop with Unreachable Exit Condition ('Infinite Loop') Vulnerability (CVE-2019-0205)
|
CVE-2019-0205
CWE-835
|
CWE-835
|
High
|
Jboss EAP Loop with Unreachable Exit Condition ('Infinite Loop') Vulnerability (CVE-2023-1108)
|
CVE-2023-1108
CWE-835
|
CWE-835
|
High
|
Jboss EAP Missing Authorization Vulnerability (CVE-2019-10184)
|
CVE-2019-10184
CWE-862
|
CWE-862
|
High
|
Jboss EAP Missing Release of Memory after Effective Lifetime Vulnerability (CVE-2022-0853)
|
CVE-2022-0853
CWE-401
|
CWE-401
|
High
|
Jboss EAP Observable Differences in Behavior to Error Inputs Vulnerability (CVE-2021-3642)
|
CVE-2021-3642
|
|
Medium
|
Jboss EAP Observable Discrepancy Vulnerability (CVE-2022-3143)
|
CVE-2022-3143
CWE-203
|
CWE-203
|
High
|
Jboss EAP Other Vulnerability (CVE-2010-4265)
|
CVE-2010-4265
|
|
Low
|
Jboss EAP Other Vulnerability (CVE-2014-3490)
|
CVE-2014-3490
|
|
High
|
Jboss EAP Other Vulnerability (CVE-2019-9513)
|
CVE-2019-9513
|
|
High
|
Jboss EAP Other Vulnerability (CVE-2020-1710)
|
CVE-2020-1710
|
|
Medium
|
Jboss EAP Other Vulnerability (CVE-2023-3628)
|
CVE-2023-3628
|
|
Medium
|
Jboss EAP Other Vulnerability (CVE-2023-3629)
|
CVE-2023-3629
|
|
Medium
|
Jboss EAP Out-of-bounds Read Vulnerability (CVE-2019-0210)
|
CVE-2019-0210
CWE-125
|
CWE-125
|
High
|
Jboss EAP Permission Issues Vulnerability (CVE-2016-7066)
|
CVE-2016-7066
|
|
High
|
Jboss EAP Permissions, Privileges, and Access Controls Vulnerability (CVE-2010-0738)
|
CVE-2010-0738
CWE-264
|
CWE-264
|
Medium
|
Jboss EAP Permissions, Privileges, and Access Controls Vulnerability (CVE-2010-1428)
|
CVE-2010-1428
CWE-264
|
CWE-264
|
Medium
|
Jboss EAP Permissions, Privileges, and Access Controls Vulnerability (CVE-2010-1429)
|
CVE-2010-1429
CWE-264
|
CWE-264
|
Medium
|
Jboss EAP Permissions, Privileges, and Access Controls Vulnerability (CVE-2011-1484)
|
CVE-2011-1484
CWE-264
|
CWE-264
|
Medium
|
Jboss EAP Permissions, Privileges, and Access Controls Vulnerability (CVE-2011-2196)
|
CVE-2011-2196
CWE-264
|
CWE-264
|
Medium
|
Jboss EAP Permissions, Privileges, and Access Controls Vulnerability (CVE-2011-4605)
|
CVE-2011-4605
CWE-264
|
CWE-264
|
High
|
Jboss EAP Permissions, Privileges, and Access Controls Vulnerability (CVE-2011-4608)
|
CVE-2011-4608
CWE-264
|
CWE-264
|
High
|
Jboss EAP Permissions, Privileges, and Access Controls Vulnerability (CVE-2012-1154)
|
CVE-2012-1154
CWE-264
|
CWE-264
|
Medium
|
Jboss EAP Permissions, Privileges, and Access Controls Vulnerability (CVE-2012-1167)
|
CVE-2012-1167
CWE-264
|
CWE-264
|
Medium
|
Jboss EAP Permissions, Privileges, and Access Controls Vulnerability (CVE-2012-3369)
|
CVE-2012-3369
CWE-264
|
CWE-264
|
Medium
|
Jboss EAP Permissions, Privileges, and Access Controls Vulnerability (CVE-2012-3370)
|
CVE-2012-3370
CWE-264
|
CWE-264
|
Medium
|
Jboss EAP Permissions, Privileges, and Access Controls Vulnerability (CVE-2012-3427)
|
CVE-2012-3427
CWE-264
|
CWE-264
|
Low
|
Jboss EAP Permissions, Privileges, and Access Controls Vulnerability (CVE-2012-4549)
|
CVE-2012-4549
CWE-264
|
CWE-264
|
Medium
|
Jboss EAP Permissions, Privileges, and Access Controls Vulnerability (CVE-2012-4550)
|
CVE-2012-4550
CWE-264
|
CWE-264
|
Medium
|
Jboss EAP Permissions, Privileges, and Access Controls Vulnerability (CVE-2012-4572)
|
CVE-2012-4572
CWE-264
|
CWE-264
|
Low
|
Jboss EAP Permissions, Privileges, and Access Controls Vulnerability (CVE-2012-5478)
|
CVE-2012-5478
CWE-264
|
CWE-264
|
Medium
|
Jboss EAP Permissions, Privileges, and Access Controls Vulnerability (CVE-2012-5629)
|
CVE-2012-5629
CWE-264
|
CWE-264
|
High
|
Jboss EAP Permissions, Privileges, and Access Controls Vulnerability (CVE-2013-2133)
|
CVE-2013-2133
CWE-264
|
CWE-264
|
Medium
|
Jboss EAP Permissions, Privileges, and Access Controls Vulnerability (CVE-2013-2165)
|
CVE-2013-2165
CWE-264
|
CWE-264
|
High
|
Jboss EAP Permissions, Privileges, and Access Controls Vulnerability (CVE-2014-0005)
|
CVE-2014-0005
CWE-264
|
CWE-264
|
Low
|
Jboss EAP Permissions, Privileges, and Access Controls Vulnerability (CVE-2014-0018)
|
CVE-2014-0018
CWE-264
|
CWE-264
|
Low
|
Jboss EAP Permissions, Privileges, and Access Controls Vulnerability (CVE-2014-0093)
|
CVE-2014-0093
CWE-264
|
CWE-264
|
Medium
|
Jboss EAP Permissions, Privileges, and Access Controls Vulnerability (CVE-2014-3464)
|
CVE-2014-3464
CWE-264
|
CWE-264
|
Medium
|
Jboss EAP Permissions, Privileges, and Access Controls Vulnerability (CVE-2014-3472)
|
CVE-2014-3472
CWE-264
|
CWE-264
|
Medium
|
Jboss EAP Permissions, Privileges, and Access Controls Vulnerability (CVE-2014-3586)
|
CVE-2014-3586
CWE-264
|
CWE-264
|
Low
|
Jboss EAP Permissions, Privileges, and Access Controls Vulnerability (CVE-2014-7827)
|
CVE-2014-7827
CWE-264
|
CWE-264
|
Low
|
Jboss EAP Permissions, Privileges, and Access Controls Vulnerability (CVE-2014-7849)
|
CVE-2014-7849
CWE-264
|
CWE-264
|
Medium
|
Jboss EAP Permissions, Privileges, and Access Controls Vulnerability (CVE-2015-5304)
|
CVE-2015-5304
CWE-264
|
CWE-264
|
Low
|
Jboss EAP Permissions, Privileges, and Access Controls Vulnerability (CVE-2016-2141)
|
CVE-2016-2141
CWE-264
|
CWE-264
|
Critical
|
Jboss EAP Permissions, Privileges, and Access Controls Vulnerability (CVE-2016-5406)
|
CVE-2016-5406
CWE-264
|
CWE-264
|
High
|
Jboss EAP Permissions, Privileges, and Access Controls Vulnerability (CVE-2016-8656)
|
CVE-2016-8656
CWE-264
|
CWE-264
|
High
|
Jboss EAP Permissions, Privileges, and Access Controls Vulnerability (CVE-2016-8657)
|
CVE-2016-8657
CWE-264
|
CWE-264
|
High
|
Jboss EAP Permissions, Privileges, and Access Controls Vulnerability (CVE-2019-3894)
|
CVE-2019-3894
CWE-264
|
CWE-264
|
High
|
Jboss EAP Reachable Assertion Vulnerability (CVE-2020-25710)
|
CVE-2020-25710
CWE-617
|
CWE-617
|
High
|
Jboss EAP Resource Management Errors Vulnerability (CVE-2016-7046)
|
CVE-2016-7046
|
|
Medium
|
Jboss EAP Server-Side Request Forgery (SSRF) Vulnerability (CVE-2018-14721)
|
CVE-2018-14721
CWE-918
|
CWE-918
|
Critical
|
Jboss EAP Session Fixation Vulnerability (CVE-2021-20324)
|
CVE-2021-20324
CWE-384
|
CWE-384
|
Medium
|
Jboss EAP Uncontrolled Resource Consumption Vulnerability (CVE-2014-0118)
|
CVE-2014-0118
CWE-400
|
CWE-400
|
Medium
|
Jboss EAP Uncontrolled Resource Consumption Vulnerability (CVE-2016-8610)
|
CVE-2016-8610
CWE-400
|
CWE-400
|
High
|
Jboss EAP Uncontrolled Resource Consumption Vulnerability (CVE-2016-8627)
|
CVE-2016-8627
CWE-400
|
CWE-400
|
Medium
|
Jboss EAP Uncontrolled Resource Consumption Vulnerability (CVE-2017-12174)
|
CVE-2017-12174
CWE-400
|
CWE-400
|
High
|
Jboss EAP Uncontrolled Resource Consumption Vulnerability (CVE-2019-14888)
|
CVE-2019-14888
CWE-400
|
CWE-400
|
High
|
Jboss EAP Uncontrolled Resource Consumption Vulnerability (CVE-2019-19343)
|
CVE-2019-19343
CWE-400
|
CWE-400
|
High
|
Jboss EAP Uncontrolled Resource Consumption Vulnerability (CVE-2020-14340)
|
CVE-2020-14340
CWE-400
|
CWE-400
|
Medium
|