Red Hat Wildfly Core Vulnerabilities