Redhat

Wildfly

20 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.34%
  • Published 08.12.2020 01:15:12
  • Last modified 21.11.2024 05:21:52

A flaw was found in Wildfly affecting versions 19.0.0.Final, 19.1.0.Final, 20.0.0.Final, 20.0.1.Final, and 21.0.0.Final. When an application uses the OpenTracing API's java-interceptors, there is a possibility of a memory leak. This flaw allows an at...

  • EPSS 0.35%
  • Published 24.11.2020 19:15:10
  • Last modified 21.11.2024 05:18:18

A flaw was discovered in WildFly before 21.0.0.Final where, Resource adapter logs plain text JMS password at warning level on connection error, inserting sensitive information in the log file.

Exploit
  • EPSS 0.24%
  • Published 02.11.2020 21:15:27
  • Last modified 21.11.2024 05:18:28

A memory leak flaw was found in WildFly in all versions up to 21.0.0.Final, where host-controller tries to reconnect in a loop, generating new connections which are not properly closed while not able to connect to domain-controller. This flaw allows ...

  • EPSS 0.27%
  • Published 16.09.2020 19:15:13
  • Last modified 21.11.2024 04:55:55

A flaw was found in Wildfly before wildfly-embedded-13.0.0.Final, where the embedded managed process API has an exposed setting of the Thread Context Classloader (TCCL). This setting is exposed as a public method, which can bypass the security manage...

  • EPSS 0.64%
  • Published 22.06.2020 18:15:11
  • Last modified 21.11.2024 04:55:58

A vulnerability was found in Wildfly in versions before 20.0.0.Final, where a remote deserialization attack is possible in the Enterprise Application Beans(EJB) due to lack of validation/filtering capabilities in wildfly.

  • EPSS 0.18%
  • Published 16.03.2020 15:15:12
  • Last modified 21.11.2024 04:27:36

A flaw was found when an OpenSSL security provider is used with Wildfly, the 'enabled-protocols' value in the Wildfly configuration isn't honored. An attacker could target the traffic sent from Wildfly and downgrade the connection to a weaker version...

  • EPSS 1.23%
  • Published 03.05.2019 20:29:01
  • Last modified 21.11.2024 04:42:48

It was discovered that the ElytronManagedThread in Wildfly's Elytron subsystem in versions from 11 to 16 stores a SecurityIdentity to run the thread as. These threads do not necessarily terminate if the keep alive time has not expired. This could all...

  • EPSS 0.04%
  • Published 03.05.2019 20:29:01
  • Last modified 21.11.2024 04:42:34

A flaw was discovered in wildfly versions up to 16.0.0.Final that would allow local users who are able to execute init.d script to terminate arbitrary processes on the system. An attacker could exploit this by modifying the PID file in /var/run/jboss...

  • EPSS 0.24%
  • Published 04.09.2018 12:29:00
  • Last modified 21.11.2024 03:49:27

The IIOP OpenJDK Subsystem in WildFly before version 14.0.0 does not honour configuration when SSL transport is required. Servers before this version that are configured with the following setting allow clients to create plaintext connections: <trans...

Exploit
  • EPSS 0.38%
  • Published 09.05.2018 08:29:00
  • Last modified 21.11.2024 03:41:50

An issue was discovered in WildFly 10.1.2.Final. In the case of a default installation without a security realm reference, an attacker can successfully access the server without authentication. NOTE: the Security Realms documentation in the product's...