Red Hat Red Hat Jboss Enterprise Application Platform 7 Vulnerabilities
Red%20hat Red Hat Jboss Enterprise Application Platform 7 vulnerabilities.
Vulnerability Published:
ποΈ Published
- Anytime
Sort By:
ποΈ Published Date
- Descending
Cookies vulnerability could lead to unauthorized data access or modification
CVE-2024-12397Red HatCryostat 37.4HIGHinformation leakage vulnerability
CVE-2024-4109Red Hat7.5HIGHAuthorization Code Injection Vulnerability in RH SSO OIDC Adapter
CVE-2024-12369Red HatRed Hat Build Of Keycloak4.2MEDIUMServer Denial of Service Vulnerability Discovered in Undertow's FormAuthenticationMechanism
CVE-2023-1973Red HatRed Hat Jboss Enterpri...7.5HIGHHTML Injection Vulnerability in Hibernate Validator
CVE-2023-1932Red HatA-MQ Clients 26.1MEDIUMLow-Privilege Users Can Access Administrative Functionalities, Risking Data Breaches or System Compromise
CVE-2024-3656Red HatππΎπ‘8.1HIGHImpact of HTTP Smuggling on Load Balancers and Systems
CVE-2024-9622Red HatRed Hat Jboss Data Grid 75.3MEDIUMAttackers can Redirect Users to Arbitrary URLs, Exposing Sensitive Information
CVE-2024-8883Red HatRed Hat Build Of Keycloak6.1MEDIUMFlaw in SAML Signature Validation Method Allows Privilege Escalation or Impersonation Attacks
CVE-2024-8698Red HatRed Hat Build Of KeycloakπΎπ‘π°7.7HIGHUndertow ProxyProtocolReadListener Vulnerability
CVE-2024-7885Red HatRed Hat Build Of Apach...7.5HIGHUndertow Vulnerability: Enabling Learning-Push Handler Can Prevent Attacks
CVE-2024-3653Red HatRed Hat Jboss Enterpri...5.3MEDIUMUndertow Vulnerability Leads to Denial of Service Attack
CVE-2024-5971Red HatRed Hat Build Of Apach...7.5HIGHUndertow Ajp-Listener Vulnerability: URL-Encoded Request Path Information Can Be Broken
CVE-2024-6162Red HatEap 8.0.17.5HIGHDatabase Logging Vulnerability Exposes User Credentials
CVE-2024-1102Red HatRed Hat Jboss Enterpri...6.5MEDIUMQuarkus: authorization flaw in quarkus resteasy reactive and classic when "quarkus.security.jaxrs.deny-unannotated-endpoints" or "quarkus.security.jaxrs.default-roles-allowed" properties are used.
CVE-2023-5675Red HatRed Hat Build Of Quark...6.5MEDIUMMillions of Requests in Seconds: Keycloak OIDC Flaw Affects Application Availability
CVE-2024-1249Red Hat7.4HIGHKeycloak Flaw Allows Attackers to Bypass Validation and Access Sensitive Information
CVE-2024-1132Red HatMigration Toolkit For ...8.1HIGHFlaw in JBoss EAP OIDC Implementation Allows Access to Multiple Tenants Without Logout
CVE-2023-6236Red HatRed Hat Jboss Enterpri...7.3HIGHJwtValidator ResolvePublicKey Vulnerability Could Lead to SSRF
CVE-2024-1233Red HatRed Hat Jboss Enterpri...7.3HIGHMemory Leak in TLS and SNI Support in Eclipse Vert.x Toolkit Allows Attackers to Trigger JVM Out-of-Memory Error
CVE-2024-1300Red HatCeq 3.25.4MEDIUMMalicious Code Discovered in xz Upstream Tarballs, Affecting liblzma and Other Dependent Packages
CVE-2024-3094Red HatXzπ₯ππΎπ‘EPSS 63%π°10CRITICALMemory Leak Vulnerability in Eclipse Vert.x Toolkit
CVE-2024-1023Red HatCeq 3.26.5MEDIUMStack Overflow Exception in XNIO NotifierState Could Lead to Denial of Service
CVE-2023-5685Red HatEap 7.4.147.5HIGHUndertow Vulnerability Impacts Wildfly-HTTP-Client Server
CVE-2024-1635Red HatRed Hat Jboss Enterpri...7.5HIGHPotential Path Traversal Vulnerability in Undertow Could Allow Access to Privileged Files
CVE-2024-1459Red HatRed Hat Jboss Enterpri...5.3MEDIUM