Known vulnerabilities in Red Hat Inc. JBoss Application Server

CSH
CYBERSECURITY HELP
Vulnerability Intelligence Vulnerability Management Pricing Vulnerability Database Blog
Sign In REGISTER
Vulnerability Intelligence Vulnerability Management Pricing Vulnerability Database Blog
Sign In REGISTER

Main › Vulnerability Database › Red Hat Inc. › JBoss Application Server

Known vulnerabilities in Red Hat Inc. JBoss Application Server

Vendor: Red Hat Inc.
Website: https://www.redhat.com/en
Total Security Bulletins: 9
7.0.2 7.0.1 7.0.0 7.1.1 7.1.0 4.0.2.ga_cp03 4.0.2.ga_cp02 4.0.2.ga_cp04 4.0.5_cp01 4.0.5_cp02 4.0.5.ga 4.0.4.ga 4.0.3_final 4.0.2_final 4.0.1_sp1 4.0.1_final 4.0.0_final 3.2.8_final 3.2.8.sp1 3.2.7_final 3.2.6_final 3.2.5_final 3.0 6 5 4 EAP 6 6.4 EAP 5.2

Security bulletins (9)

Secuity bulletin Severity Status Published
SB2020031072: Information disclosure in JBoss Application Server Medium
Patched
10.03.2020
SB2019121848: Improper Privilege Management in JBoss Application Server Low
Patched
18.12.2019
SB2019112633: Multiple vulnerabilities in JBoss Application Server Medium
Not patched
26.11.2019
SB2018020822: Remote code execution in Red Hat JBoss High
Not patched
08.02.2018
SB2018020602: Denial of service in Red Hat JBoss Low
Patched Public exploit
06.02.2018
SB2017062606: Multiple vulnerabilities in Red Hat JBoss Low
Patched Public exploit
26.06.2017
SB2017051911: Deserialization of untrusted data in JBoss Application Server High
Not patched
19.05.2017
SB2017031624: Cross-site scripting in Red Hat Jboss Low
Patched
16.03.2017
SB2016090601: Security restrictions bypass in Red Hat Jboss Low
Patched
06.09.2016


Terms of Use|Privacy Policy|Contacts

© 2026 Cybersecurity Help s.r.o.


Cookie Settings

We use cookies to enhance your browsing experience, serve personalized content, and analyze our traffic.

Necessary

Required for basic site functionality

Google Analytics

Helps us understand how visitors use our site

Learn more in our Privacy Policy

Please verify you're human

Complete the CAPTCHA below or accept cookies to continue browsing.

or