Quarkus

Quarkus

49 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.04%
  • Veröffentlicht 05.05.2026 21:16:22
  • Zuletzt bearbeitet 08.05.2026 17:18:38

Quarkus is a Java framework for building cloud-native applications. In versions prior to 3.20.6.1, 3.27.3.1, 3.33.1.1, 3.35.1.1, 3.34.7, and 3.35.2, a path normalization inconsistency between the security layer and the routing layer allows unauthenti...

  • EPSS 0.02%
  • Veröffentlicht 07.01.2026 17:33:22
  • Zuletzt bearbeitet 03.02.2026 16:40:28

Quarkus is a Cloud Native, (Linux) Container First framework for writing Java applications. Prior to versions 3.31.0, 3.27.2, and 3.20.5, a vulnerability exists in the HTTP layer of Quarkus REST related to response handling. When a response is being ...

  • EPSS 0.52%
  • Veröffentlicht 06.05.2025 19:49:16
  • Zuletzt bearbeitet 31.07.2025 18:10:06

A vulnerability was found in Quarkus in the quarkus-security-webauthn module. The Quarkus WebAuthn module publishes default REST endpoints for registering and logging users in while allowing developers to provide custom REST endpoints. When developer...

  • EPSS 0.12%
  • Veröffentlicht 13.03.2024 10:15:08
  • Zuletzt bearbeitet 15.04.2026 00:35:42

A vulnerability was found in Quarkus. In certain conditions related to the CI process, git credentials could be inadvertently published, which could put the git repository at risk.

  • EPSS 0.67%
  • Veröffentlicht 25.01.2024 19:15:08
  • Zuletzt bearbeitet 04.12.2024 08:15:05

A flaw was found in the json payload. If annotation based security is used to secure a REST resource, the JSON body that the resource may consume is being processed (deserialized) prior to the security constraints being evaluated and applied. This do...

  • EPSS 0.54%
  • Veröffentlicht 09.12.2023 02:15:06
  • Zuletzt bearbeitet 24.03.2026 12:16:10

A flaw was found in Quarkus. This issue occurs when receiving a request over websocket with no role-based permission specified on the GraphQL operation, Quarkus processes the request without authentication despite the endpoint being secured. This can...

  • EPSS 2.71%
  • Veröffentlicht 15.11.2023 14:15:07
  • Zuletzt bearbeitet 21.11.2024 08:42:21

A flaw was found in Quarkus, where it does not properly sanitize artifacts created using the Gradle plugin, allowing certain build system information to remain. This flaw allows an attacker to access potentially sensitive information from the build s...

  • EPSS 0.29%
  • Veröffentlicht 04.10.2023 11:15:09
  • Zuletzt bearbeitet 21.11.2024 07:39:29

A flaw was found in Quarkus. Quarkus OIDC can leak both ID and access tokens in the authorization code flow when an insecure HTTP protocol is used, which can allow attackers to access sensitive user data directly from the ID token or by using the acc...

Exploit
  • EPSS 0.46%
  • Veröffentlicht 20.09.2023 10:15:14
  • Zuletzt bearbeitet 21.11.2024 08:36:06

A flaw was found in Quarkus where HTTP security policies are not sanitizing certain character permutations correctly when accepting requests, resulting in incorrect evaluation of permissions. This issue could allow an attacker to bypass the security ...

  • EPSS 0.06%
  • Veröffentlicht 24.02.2023 18:15:14
  • Zuletzt bearbeitet 12.03.2025 16:15:18

In RestEasy Reactive implementation of Quarkus the insecure File.createTempFile() is used in the FileBodyHandler class which creates temp files with insecure permissions that could be read by a local user.