Total vulnerabilities in the database
In JON 2.1.x before 2.1.2 SP1, users can obtain unauthorized security information about private resources managed by JBoss ON.
Software | From | Fixed in |
---|---|---|
redhat / jboss_operations_network | 2.1.0 | 2.1.2 |
redhat / jboss_operations_network | 2.1.2 | 2.1.2.x |