Lucene search

K
RedhatWildfly

6 matches found

CVE
CVE
•added 2022/05/10 9:15 p.m.•120 views

CVE-2022-0866

This is a concurrency issue that can result in the wrong caller principal being returned from the session context of an EJB that is configured with a RunAs principal. In particular, the org.jboss.as.ejb3.component.EJBComponent class has an incomingRunAsIdentity field. This field is used by the org....

5.3CVSS5.3AI score0.002EPSS
CVE
CVE
•added 2021/06/07 5:15 p.m.•111 views

CVE-2020-1719

A flaw was found in wildfly. The EJBContext principle is not popped back after invoking another EJB using a different Security Domain. The highest threat from this vulnerability is to data confidentiality and integrity. Versions before wildfly 20.0.0.Final are affected.

5.5CVSS5.4AI score0.00122EPSS
CVE
CVE
•added 2019/05/03 8:29 p.m.•97 views

CVE-2019-3805

A flaw was discovered in wildfly versions up to 16.0.0.Final that would allow local users who are able to execute init.d script to terminate arbitrary processes on the system. An attacker could exploit this by modifying the PID file in /var/run/jboss-eap/ allowing the init.d script to terminate any...

5.5CVSS4.7AI score0.00042EPSS
CVE
CVE
•added 2020/11/24 7:15 p.m.•95 views

CVE-2020-25640

A flaw was discovered in WildFly before 21.0.0.Final where, Resource adapter logs plain text JMS password at warning level on connection error, inserting sensitive information in the log file.

5.3CVSS5.2AI score0.00354EPSS
CVE
CVE
•added 2018/09/04 12:29 p.m.•65 views

CVE-2018-14627

The IIOP OpenJDK Subsystem in WildFly before version 14.0.0 does not honour configuration when SSL transport is required. Servers before this version that are configured with the following setting allow clients to create plaintext connections: <transport-config confidentiality="required" trust-i...

5.9CVSS5.3AI score0.00249EPSS
CVE
CVE
•added 2021/06/02 12:15 p.m.•51 views

CVE-2020-14317

It was found that the issue for security flaw CVE-2019-3805 appeared again in a further version of JBoss Enterprise Application Platform - Continuous Delivery (EAP-CD) introducing regression. An attacker could exploit this by modifying the PID file in /var/run/jboss-eap/ allowing the init.d script ...

5.5CVSS4.5AI score0.00042EPSS