Show filters
129 Total Results
Displaying 51-60 of 129
Sort by:
Attacker Value
Unknown

CVE-2020-10718

Disclosure Date: September 16, 2020 (last updated February 22, 2025)
A flaw was found in Wildfly before wildfly-embedded-13.0.0.Final, where the embedded managed process API has an exposed setting of the Thread Context Classloader (TCCL). This setting is exposed as a public method, which can bypass the security manager. The highest threat from this vulnerability is to confidentiality.
Attacker Value
Unknown

CVE-2020-14307

Disclosure Date: July 24, 2020 (last updated February 21, 2025)
A vulnerability was found in Wildfly's Enterprise Java Beans (EJB) versions shipped with Red Hat JBoss EAP 7, where SessionOpenInvocations are never removed from the remote InvocationTracker after a response is received in the EJB Client, as well as the server. This flaw allows an attacker to craft a denial of service attack to make the service unavailable.
Attacker Value
Unknown

CVE-2020-14297

Disclosure Date: July 24, 2020 (last updated February 21, 2025)
A flaw was discovered in Wildfly's EJB Client as shipped with Red Hat JBoss EAP 7, where some specific EJB transaction objects may get accumulated over the time and can cause services to slow down and eventaully unavailable. An attacker can take advantage and cause denial of service attack and make services unavailable.
Attacker Value
Unknown

CVE-2019-14900

Disclosure Date: July 06, 2020 (last updated February 21, 2025)
A flaw was found in Hibernate ORM in versions before 5.3.18, 5.4.18 and 5.5.0.Beta1. A SQL injection in the implementation of the JPA Criteria API can permit unsanitized literals when a literal is used in the SELECT or GROUP BY parts of the query. This flaw could allow an attacker to access unauthorized information or possibly conduct further attacks.
Attacker Value
Unknown

CVE-2020-10719

Disclosure Date: May 26, 2020 (last updated February 21, 2025)
A flaw was found in Undertow in versions before 2.1.1.Final, regarding the processing of invalid HTTP requests with large chunk sizes. This flaw allows an attacker to take advantage of HTTP request smuggling.
Attacker Value
Unknown

CVE-2020-1714

Disclosure Date: May 13, 2020 (last updated February 21, 2025)
A flaw was found in Keycloak before version 11.0.0, where the code base contains usages of ObjectInputStream without type checks. This flaw allows an attacker to inject arbitrarily serialized Java Objects, which would then get deserialized in a privileged context and potentially lead to remote code execution.
Attacker Value
Unknown

CVE-2020-1718

Disclosure Date: May 12, 2020 (last updated February 21, 2025)
A flaw was found in the reset credential flow in all Keycloak versions before 8.0.0. This flaw allows an attacker to gain unauthorized access to the application.
Attacker Value
Unknown

CVE-2020-1757

Disclosure Date: April 21, 2020 (last updated February 21, 2025)
A flaw was found in all undertow-2.x.x SP1 versions prior to undertow-2.0.30.SP1, all undertow-1.x.x and undertow-2.x.x versions prior to undertow-2.1.0.Final, where the Servlet container causes servletPath to normalize incorrectly by truncating the path after semicolon which may lead to an application mapping resulting in the security bypass.
Attacker Value
Unknown

CVE-2019-14887

Disclosure Date: March 16, 2020 (last updated February 21, 2025)
A flaw was found when an OpenSSL security provider is used with Wildfly, the 'enabled-protocols' value in the Wildfly configuration isn't honored. An attacker could target the traffic sent from Wildfly and downgrade the connection to a weaker version of TLS, potentially breaking the encryption. This could lead to a leak of the data being passed over the network. Wildfly version 7.2.0.GA, 7.2.3.GA and 7.2.5.CR2 are believed to be vulnerable.
Attacker Value
Unknown

CVE-2019-14892

Disclosure Date: March 02, 2020 (last updated February 21, 2025)
A flaw was discovered in jackson-databind in versions before 2.9.10, 2.8.11.5 and 2.6.7.3, where it would permit polymorphic deserialization of a malicious object using commons-configuration 1 and 2 JNDI classes. An attacker could use this flaw to execute arbitrary code.