Redhat JBoss Middleware Text-only Advisories 1.0 for Middleware

CPE Details

Redhat JBoss Middleware Text-only Advisories 1.0 for Middleware
1.0
2020-09-08
20h13 +00:00
2020-09-08
20h13 +00:00
Alerte pour un CPE
Stay informed of any changes for a specific CPE.
Notifications manage

CPE Name: cpe:2.3:a:redhat:jboss_middleware_text-only_advisories:1.0:*:*:*:*:middleware:*:*

Informations

Vendor

redhat

Product

jboss_middleware_text-only_advisories

Version

1.0

Target Software

middleware

Related CVE

Open and find in CVE List

CVE ID Published Description Score Severity
CVE-2023-4853 2023-09-20 09h47 +00:00 A flaw was found in Quarkus where HTTP security policies are not sanitizing certain character permutations correctly when accepting requests, resulting in incorrect evaluation of permissions. This issue could allow an attacker to bypass the security policy altogether, resulting in unauthorized endpoint access and possibly a denial of service.
8.1
High
CVE-2019-14439 2019-07-30 08h49 +00:00 A Polymorphic Typing issue was discovered in FasterXML jackson-databind 2.x before 2.9.9.2. This occurs when Default Typing is enabled (either globally or for a specific property) for an externally exposed JSON endpoint and the service has the logback jar in the classpath.
7.5
High
CVE-2018-1288 2018-07-26 14h00 +00:00 In Apache Kafka 0.9.0.0 to 0.9.0.1, 0.10.0.0 to 0.10.2.1, 0.11.0.0 to 0.11.0.2, and 1.0.0, authenticated Kafka users may perform action reserved for the Broker via a manually created fetch request interfering with data replication, resulting in data loss.
5.4
Medium
CVE-2016-4970 2017-04-13 12h00 +00:00 handler/ssl/OpenSslEngine.java in Netty 4.0.x before 4.0.37.Final and 4.1.x before 4.1.1.Final allows remote attackers to cause a denial of service (infinite loop).
7.5
High
CVE-2016-4437 2016-06-07 14h00 +00:00 Apache Shiro before 1.2.5, when a cipher key has not been configured for the "remember me" feature, allows remote attackers to execute arbitrary code or bypass intended access restrictions via an unspecified request parameter.
9.8
Critical