Red Hat JBoss WildFly Application Server 2.0.0 Candidate Release 8

CPE Details

Red Hat JBoss WildFly Application Server 2.0.0 Candidate Release 8
2.0.0
2016-09-12
16h37 +00:00
2016-09-12
16h37 +00:00
Alerte pour un CPE
Stay informed of any changes for a specific CPE.
Notifications manage

CPE Name: cpe:2.3:a:redhat:jboss_wildfly_application_server:2.0.0:cr8:*:*:*:*:*:*

Informations

Vendor

redhat

Product

jboss_wildfly_application_server

Version

2.0.0

Update

cr8

Related CVE

Open and find in CVE List

CVE ID Published Description Score Severity
CVE-2016-9589 2018-03-12 15h00 +00:00 Undertow in Red Hat wildfly before version 11.0.0.Beta1 is vulnerable to a resource exhaustion resulting in a denial of service. Undertow keeps a cache of seen HTTP headers in persistent connections. It was found that this cache can easily exploited to fill memory with garbage, up to "max-headers" (default 200) * "max-header-size" (default 1MB) per active TCP connection.
7.5
High
CVE-2015-5178 2015-10-27 15h00 +00:00 The Management Console in Red Hat Enterprise Application Platform before 6.4.4 and WildFly (formerly JBoss Application Server) does not send an X-Frame-Options HTTP header, which makes it easier for remote attackers to conduct clickjacking attacks via a crafted web page that contains a (1) FRAME or (2) IFRAME element.
4.3
CVE-2015-5188 2015-10-27 15h00 +00:00 Cross-site request forgery (CSRF) vulnerability in the Web Console (web-console) in Red Hat Enterprise Application Platform before 6.4.4 and WildFly (formerly JBoss Application Server) before 2.0.0.CR9 allows remote attackers to hijack the authentication of administrators for requests that make arbitrary changes to an instance via vectors involving a file upload using a multipart/form-data submission.
6.8
CVE-2015-5220 2015-10-27 15h00 +00:00 The Web Console in Red Hat Enterprise Application Platform (EAP) before 6.4.4 and WildFly (formerly JBoss Application Server) allows remote attackers to cause a denial of service (memory consumption) via a large request header.
5