Jboss Middleware Text-Only Advisories
by Redhat
Standard maintenance is sufficient
Jboss Middleware Text-Only Advisories has low exploitation rates. Attackers rarely target this software's known vulnerabilities.
What to do
- Keep automatic updates enabled
- No urgent action needed
- Review periodically as part of normal maintenance
What Attackers Target
Vulnerabilities with high exploit probability
22.2%
Confirmed actively exploited (CISA)
11.1%
Public exploit code available
11.1%
Based on 9 known vulnerabilities. Percentages show the proportion that are actively dangerous — a low percentage means most vulnerabilities in this product are not being exploited.
Most Dangerous Vulnerabilities
| CVE | CVSS | Exploit Probability | Confirmed |
|---|---|---|---|
| CVE-2016-4437 | 9.8 | 94.3% | Yes |
| CVE-2019-14439 | 7.5 | 10.3% | — |
| CVE-2016-4970 | 7.5 | 8.2% | — |
| CVE-2019-14900 | 6.5 | 1.8% | — |
| CVE-2022-1415 | 8.1 | 0.8% | — |
| CVE-2018-1288 | 5.4 | 0.7% | — |
| CVE-2011-2487 | 5.9 | 0.5% | — |
| CVE-2023-4853 | 8.1 | 0.5% | — |
| CVE-2024-1132 | 8.1 | 0.3% | — |
19
/ 100
low-risk
Active Threat
13/50 · Low
Exploit Availability
6/50 · Minimal
Score uses Wilson score intervals to account for sample size. Products with few CVEs are scored conservatively.