Total vulnerabilities in the database
A flaw was found in WildFly, where an attacker can see deployment names, endpoints, and any other data the trace payload may contain.
Software | From | Fixed in |
---|---|---|
redhat / wildfly | - | 27.0.0 |
redhat / single_sign-on | 7.0 | 7.0.x |
redhat / amq | 2.0 | 2.0.x |
redhat / jboss_a-mq | 7 | 7.x |
![]() |
- | 27.0.0.Beta1 |