Redhat JBoss Middleware Text-only Advisories 1.0 for Middleware

CPE Details

Redhat JBoss Middleware Text-only Advisories 1.0 for Middleware
1.0
2020-09-08
20h13 +00:00
2020-09-08
20h13 +00:00
Alerte pour un CPE
Restez informé de toutes modifications pour un CPE spécifique.
Gestion des notifications

CPE Name: cpe:2.3:a:redhat:jboss_middleware_text-only_advisories:1.0:*:*:*:*:middleware:*:*

Informations

Vendor

redhat

Product

jboss_middleware_text-only_advisories

Version

1.0

Target Software

middleware

Related CVE

Open and find in CVE List

CVE ID Publié Description Score Gravité
CVE-2023-4853 2023-09-20 09h47 +00:00 A flaw was found in Quarkus where HTTP security policies are not sanitizing certain character permutations correctly when accepting requests, resulting in incorrect evaluation of permissions. This issue could allow an attacker to bypass the security policy altogether, resulting in unauthorized endpoint access and possibly a denial of service.
8.1
Haute
CVE-2019-14439 2019-07-30 08h49 +00:00 A Polymorphic Typing issue was discovered in FasterXML jackson-databind 2.x before 2.9.9.2. This occurs when Default Typing is enabled (either globally or for a specific property) for an externally exposed JSON endpoint and the service has the logback jar in the classpath.
7.5
Haute
CVE-2018-1288 2018-07-26 14h00 +00:00 In Apache Kafka 0.9.0.0 to 0.9.0.1, 0.10.0.0 to 0.10.2.1, 0.11.0.0 to 0.11.0.2, and 1.0.0, authenticated Kafka users may perform action reserved for the Broker via a manually created fetch request interfering with data replication, resulting in data loss.
5.4
Moyen
CVE-2016-4970 2017-04-13 12h00 +00:00 handler/ssl/OpenSslEngine.java in Netty 4.0.x before 4.0.37.Final and 4.1.x before 4.1.1.Final allows remote attackers to cause a denial of service (infinite loop).
7.5
Haute
CVE-2016-4437 2016-06-07 14h00 +00:00 Apache Shiro before 1.2.5, when a cipher key has not been configured for the "remember me" feature, allows remote attackers to execute arbitrary code or bypass intended access restrictions via an unspecified request parameter.
9.8
Critique