eap8-wildfly-java-jdk11 vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the eap8-wildfly-java-jdk11 package. This does not include vulnerabilities belonging to this package’s dependencies.

Fix vulnerabilities automatically

Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.

Fix for free
VulnerabilityVulnerable Version
  • H
HTTP Request Smuggling

<0:8.0.9-8.GA_redhat_00008.1.el8eap
  • H
Allocation of Resources Without Limits or Throttling

<0:8.0.9-8.GA_redhat_00008.1.el8eap
  • H
Improper Input Validation

<0:8.0.9-8.GA_redhat_00008.1.el8eap
  • H
Improper Access Control

<0:8.0.8-4.GA_redhat_00006.1.el8eap
  • H
Cross-site Scripting (XSS)

<0:8.0.8-4.GA_redhat_00006.1.el8eap
  • H
CVE-2025-27611

<0:8.0.8-4.GA_redhat_00006.1.el8eap
  • H
Resource Exhaustion

<0:8.0.8-4.GA_redhat_00006.1.el8eap
  • H
Deserialization of Untrusted Data

<0:8.0.8-4.GA_redhat_00006.1.el8eap
  • M
Improper Access Control

<0:8.0.7-3.GA_redhat_00004.1.el8eap
  • M
Insufficient Verification of Data Authenticity

<0:8.0.7-3.GA_redhat_00004.1.el8eap
  • H
Resource Exhaustion

<0:8.0.6-15.GA_redhat_00009.1.el8eap
  • H
Improper Input Validation

<0:8.0.6-15.GA_redhat_00009.1.el8eap
  • H
Deadlock

<0:8.0.6-15.GA_redhat_00009.1.el8eap
  • H
Resource Exhaustion

<0:8.0.6-15.GA_redhat_00009.1.el8eap
  • M
Cross-site Scripting (XSS)

<0:8.0.6-5.GA_redhat_00004.1.el8eap
  • H
Information Exposure

<0:8.0.5-3.GA_redhat_00002.1.el8eap
  • H
Directory Traversal

<0:8.0.5-5.GA_redhat_00004.1.el8eap
  • M
Open Redirect

<0:8.0.4-3.GA_redhat_00007.1.el8eap
  • H
Improper Verification of Cryptographic Signature

<0:8.0.4-2.GA_redhat_00005.1.el8eap
  • H
Memory Leak

<0:8.0.4-2.GA_redhat_00005.1.el8eap
  • H
Allocation of Resources Without Limits or Throttling

<0:8.0.4-2.GA_redhat_00005.1.el8eap
  • H
Resource Exhaustion

<0:8.0.4-2.GA_redhat_00005.1.el8eap
  • H
Integer Coercion Error

<0:8.0.4-2.GA_redhat_00005.1.el8eap
  • H
Race Condition

<0:8.0.3-13.GA_redhat_00007.1.el8eap
  • H
Allocation of Resources Without Limits or Throttling

<0:8.0.3-13.GA_redhat_00007.1.el8eap
  • M
Resource Exhaustion

<0:8.0.2-5.GA_redhat_00012.1.el8eap
  • M
Server-Side Request Forgery (SSRF)

<0:8.0.2-2.GA_redhat_00009.1.el8eap
  • M
Unprotected Transport of Credentials

<0:8.0.2-2.GA_redhat_00009.1.el8eap
  • M
Insufficient Verification of Data Authenticity

<0:8.0.2-2.GA_redhat_00009.1.el8eap
  • M
Improper Initialization

<0:8.0.2-2.GA_redhat_00009.1.el8eap
  • M
Truncation of Security-relevant Information

<0:8.0.1-3.GA_redhat_00002.1.el8eap
  • M
Link Following

<0:8.0.1-3.GA_redhat_00002.1.el8eap
  • M
Excessive Iteration

<0:8.0.1-3.GA_redhat_00002.1.el8eap
  • M
Directory Traversal

<0:8.0.1-3.GA_redhat_00002.1.el8eap