Redhat

Jboss Enterprise Application Platform Expansion Pack

28 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.41%
  • Veröffentlicht 22.04.2026 12:55:00
  • Zuletzt bearbeitet 22.04.2026 21:23:52

A flaw was found in camel-infinispan. This vulnerability involves unsafe deserialization in the ProtoStream remote aggregation repository. A remote attacker with low privileges could exploit this by sending specially crafted data, leading to arbitrar...

  • EPSS 0.05%
  • Veröffentlicht 27.03.2026 16:13:05
  • Zuletzt bearbeitet 31.03.2026 18:08:21

A flaw was found in Undertow. When Undertow receives an HTTP request where the first header line starts with one or more spaces, it incorrectly processes the request by stripping these leading spaces. This behavior, which violates HTTP standards, can...

  • EPSS 0.05%
  • Veröffentlicht 27.03.2026 16:13:05
  • Zuletzt bearbeitet 10.04.2026 14:22:53

A flaw was found in Undertow. A remote attacker can exploit this vulnerability by sending `\r\r\r` as a header block terminator. This can be used for request smuggling with certain proxy servers, such as older versions of Apache Traffic Server and Go...

  • EPSS 0.03%
  • Veröffentlicht 27.03.2026 16:13:03
  • Zuletzt bearbeitet 31.03.2026 18:20:30

A flaw was found in Undertow. This vulnerability allows a remote attacker to construct specially crafted requests where header names are parsed differently by Undertow compared to upstream proxies. This discrepancy in header interpretation can be exp...

  • EPSS 0.01%
  • Veröffentlicht 26.03.2026 19:13:26
  • Zuletzt bearbeitet 02.04.2026 14:16:31

A flaw was found in Keycloak. An administrator with `manage-clients` permission can exploit a misconfiguration where this permission is equivalent to `manage-permissions`. This allows the administrator to escalate privileges and gain control over rol...

  • EPSS 0.03%
  • Veröffentlicht 26.03.2026 07:12:37
  • Zuletzt bearbeitet 01.04.2026 14:11:28

A flaw was found in Keycloak. An authenticated attacker can perform Server-Side Request Forgery (SSRF) by manipulating the `client_session_host` parameter during refresh token requests. This occurs when a Keycloak client is configured to use the `bac...

  • EPSS 0.64%
  • Veröffentlicht 24.03.2026 04:11:16
  • Zuletzt bearbeitet 08.04.2026 19:11:02

A flaw was found in Undertow. A remote attacker could exploit this vulnerability by sending an HTTP GET request containing multipart/form-data content. If the underlying application processes parameters using methods like `getParameterMap()`, the ser...

  • EPSS 0.03%
  • Veröffentlicht 23.03.2026 08:09:22
  • Zuletzt bearbeitet 01.04.2026 14:29:05

A flaw was found in Keycloak. An improper Access Control vulnerability in Keycloak’s User-Managed Access (UMA) resource_set endpoint allows attackers with valid credentials to bypass the allowRemoteResourceManagement=false restriction. This occurs du...

  • EPSS 0.03%
  • Veröffentlicht 18.03.2026 04:02:59
  • Zuletzt bearbeitet 01.04.2026 15:10:12

A flaw was identified in Keycloak, an identity and access management solution, where it improperly follows HTTP redirects when processing certain client configuration requests. This behavior allows an attacker to trick the server into making unintend...

  • EPSS 0.04%
  • Veröffentlicht 05.03.2026 18:27:43
  • Zuletzt bearbeitet 24.03.2026 12:16:12

A security flaw in the IdentityBrokerService.performLogin endpoint of Keycloak allows authentication to proceed using an Identity Provider (IdP) even after it has been disabled by an administrator. An attacker who knows the IdP alias can reuse a prev...