Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools

Red Hat JBoss Enterprise Application Platform 8

Source -

CNA

CNA CVEs -

42

ADP CVEs -

0

CISA CVEs -

0

NVD CVEs -

0
Related CVEsRelated VendorsRelated AssignersReports
42Vulnerabilities found

CVE-2025-7784
Assigner-Red Hat, Inc.
ShareView Details
Assigner-Red Hat, Inc.
CVSS Score-6.5||MEDIUM
EPSS-0.01% / 1.00%
||
7 Day CHG~0.00%
Published-18 Jul, 2025 | 13:48
Updated-11 Aug, 2025 | 19:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Org.keycloak/keycloak-services: privilege escalation in keycloak admin console (fgapv2 enabled)

A flaw was found in the Keycloak identity and access management system when Fine-Grained Admin Permissions(FGAPv2) are enabled. An administrative user with the manage-users role can escalate their privileges to realm-admin due to improper privilege enforcement. This vulnerability allows unauthorized elevation of access rights, compromising the intended separation of administrative duties and posing a security risk to the realm.

Action-Not Available
Vendor-Red Hat, Inc.
Product-build_of_keycloakRed Hat JBoss Enterprise Application Platform 8Red Hat JBoss Enterprise Application Platform Expansion PackRed Hat Single Sign-On 7Red Hat build of Keycloak 26Red Hat build of Keycloak 26.2
CWE ID-CWE-269
Improper Privilege Management
CVE-2025-5731
Assigner-Red Hat, Inc.
ShareView Details
Assigner-Red Hat, Inc.
CVSS Score-6.2||MEDIUM
EPSS-0.02% / 2.33%
||
7 Day CHG~0.00%
Published-26 Jun, 2025 | 21:28
Updated-22 Jul, 2025 | 16:06
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Infinispan: credential leakage in infinispan cli

A flaw was found in Infinispan CLI. A sensitive password, decoded from a Base64-encoded Kubernetes secret, is processed in plaintext and included in a command string that may expose the data in an error message when a command is not found.

Action-Not Available
Vendor-Red Hat, Inc.
Product-Red Hat Data Grid 8.5.4Red Hat JBoss Enterprise Application Platform 7Red Hat JBoss Enterprise Application Platform 8Red Hat JBoss Enterprise Application Platform Expansion Pack
CWE ID-CWE-209
Generation of Error Message Containing Sensitive Information
CVE-2025-2240
Assigner-Red Hat, Inc.
ShareView Details
Assigner-Red Hat, Inc.
CVSS Score-7.5||HIGH
EPSS-0.54% / 66.63%
||
7 Day CHG~0.00%
Published-12 Mar, 2025 | 14:55
Updated-04 Aug, 2025 | 14:00
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Smallrye-fault-tolerance: smallrye fault tolerance

A flaw was found in Smallrye, where smallrye-fault-tolerance is vulnerable to an out-of-memory (OOM) issue. This vulnerability is externally triggered when calling the metrics URI. Every call creates a new object within meterMap and may lead to a denial of service (DoS) issue.

Action-Not Available
Vendor-Red Hat, Inc.
Product-Red Hat JBoss Enterprise Application Platform Expansion PackRed Hat build of QuarkusRed Hat build of Apache Camel 4.8.5 for Spring BootRed Hat JBoss Enterprise Application Platform 8Red Hat build of Quarkus 3.15.4Red Hat build of Apicurio Registry 2Red Hat JBoss Enterprise Application Platform 7Red Hat Fuse 7Red Hat Integration Camel K 1Red Hat Build of Apache Camel 4.8 for Quarkus 3.15Red Hat build of Apicurio Registry 3
CWE ID-CWE-1325
Improperly Controlled Sequential Memory Allocation
CVE-2025-23368
Assigner-Red Hat, Inc.
ShareView Details
Assigner-Red Hat, Inc.
CVSS Score-8.1||HIGH
EPSS-0.11% / 29.69%
||
7 Day CHG~0.00%
Published-04 Mar, 2025 | 15:14
Updated-12 Aug, 2025 | 12:58
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Org.wildfly.core:wildfly-elytron-integration: wildfly elytron brute force attack via cli

A flaw was found in Wildfly Elytron integration. The component does not implement sufficient measures to prevent multiple failed authentication attempts within a short time frame, making it more susceptible to brute force attacks via CLI.

Action-Not Available
Vendor-Red Hat, Inc.
Product-Red Hat Integration Camel K 1Red Hat Fuse 7Red Hat JBoss Enterprise Application Platform 8Red Hat Single Sign-On 7Red Hat Process Automation 7Red Hat JBoss Enterprise Application Platform 7Red Hat JBoss Data Grid 7Red Hat Build of KeycloakRed Hat JBoss Enterprise Application Platform Expansion PackRed Hat Data Grid 8
CWE ID-CWE-307
Improper Restriction of Excessive Authentication Attempts
CVE-2024-11831
Assigner-Red Hat, Inc.
ShareView Details
Assigner-Red Hat, Inc.
CVSS Score-5.4||MEDIUM
EPSS-0.52% / 65.89%
||
7 Day CHG~0.00%
Published-10 Feb, 2025 | 15:27
Updated-20 Aug, 2025 | 22:34
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Npm-serialize-javascript: cross-site scripting (xss) in serialize-javascript

A flaw was found in npm-serialize-javascript. The vulnerability occurs because the serialize-javascript module does not properly sanitize certain inputs, such as regex or other JavaScript object types, allowing an attacker to inject malicious code. This code could be executed when deserialized by a web browser, causing Cross-site scripting (XSS) attacks. This issue is critical in environments where serialized data is sent to web clients, potentially compromising the security of the website or web application using this package.

Action-Not Available
Vendor-Red Hat, Inc.
Product-Red Hat OpenShift Container Platform 3.11Red Hat Advanced Cluster Security 4.4RHODF-4.18-RHEL-9Logging Subsystem for Red Hat OpenShiftRed Hat Ceph Storage 8Red Hat Process Automation 7RHODF-4.16-RHEL-9Red Hat JBoss Enterprise Application Platform 7OpenShift Service Mesh 2Migration Toolkit for VirtualizationRed Hat Fuse 7OpenShift LightspeedRed Hat Enterprise Linux 10Red Hat Trusted Profile AnalyzerRed Hat Discovery 1Red Hat Quay 3Red Hat Satellite 6Cryostat 3Red Hat OpenShift Dev SpacesRed Hat JBoss Enterprise Application Platform 8RHODF-4.14-RHEL-9Red Hat Ansible Automation Platform 2Red Hat JBoss Enterprise Application Platform Expansion PackRed Hat Data Grid 8Red Hat Enterprise Linux 8RHODF-4.15-RHEL-9Red Hat Enterprise Linux 9Red Hat 3scale API Management Platform 2RHODF-4.17-RHEL-9Red Hat Advanced Cluster Security 4.5Red Hat build of OptaPlanner 8Red Hat Developer Hub.NET 6.0 on Red Hat Enterprise LinuxRed Hat OpenShift distributed tracing 3Red Hat Single Sign-On 7Red Hat OpenShift AI (RHOAI)Red Hat Advanced Cluster Management for Kubernetes 2Red Hat OpenShift Container Platform 4Red Hat Ceph Storage 7OpenShift ServerlessRed Hat build of Apicurio Registry 2Red Hat build of Apache Camel - HawtIO 4Red Hat Advanced Cluster Security 4OpenShift PipelinesRed Hat Integration Camel K 1
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2025-23366
Assigner-Red Hat, Inc.
ShareView Details
Assigner-Red Hat, Inc.
CVSS Score-6.5||MEDIUM
EPSS-0.03% / 7.98%
||
7 Day CHG~0.00%
Published-14 Jan, 2025 | 17:41
Updated-19 Mar, 2025 | 13:49
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Org.jboss.hal:hal-console: wildfly hal console cross-site scripting

A flaw was found in the HAL Console in the Wildfly component, which does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output used as a web page that is served to other users. The attacker must be authenticated as a user that belongs to management groups “SuperUser”, “Admin”, or “Maintainer”.

Action-Not Available
Vendor-Red Hat, Inc.
Product-Red Hat JBoss Data Grid 7Red Hat JBoss Enterprise Application Platform Expansion PackRed Hat JBoss Enterprise Application Platform 7Red Hat JBoss Enterprise Application Platform 8
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2024-11736
Assigner-Red Hat, Inc.
ShareView Details
Assigner-Red Hat, Inc.
CVSS Score-4.9||MEDIUM
EPSS-0.01% / 1.73%
||
7 Day CHG~0.00%
Published-14 Jan, 2025 | 08:36
Updated-19 Mar, 2025 | 14:52
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Org.keycloak:keycloak-quarkus-server: unrestricted admin use of system and environment variables

A vulnerability was found in Keycloak. Admin users may have to access sensitive server environment variables and system properties through user-configurable URLs. When configuring backchannel logout URLs or admin URLs, admin users can include placeholders like ${env.VARNAME} or ${PROPNAME}. The server replaces these placeholders with the actual values of environment variables or system properties during URL processing.

Action-Not Available
Vendor-Red Hat, Inc.
Product-Red Hat JBoss Enterprise Application Platform Expansion PackRHBK 26.0.8Red Hat build of Keycloak 26.0Red Hat JBoss Enterprise Application Platform 8
CWE ID-CWE-526
Cleartext Storage of Sensitive Information in an Environment Variable
CVE-2024-11734
Assigner-Red Hat, Inc.
ShareView Details
Assigner-Red Hat, Inc.
CVSS Score-6.5||MEDIUM
EPSS-0.07% / 21.15%
||
7 Day CHG~0.00%
Published-14 Jan, 2025 | 08:35
Updated-19 Mar, 2025 | 14:52
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Org.keycloak:keycloak-quarkus-server: denial of service in keycloak server via security headers

A denial of service vulnerability was found in Keycloak that could allow an administrative user with the right to change realm settings to disrupt the service. This action is done by modifying any of the security headers and inserting newlines, which causes the Keycloak server to write to a request that has already been terminated, leading to the failure of said request.

Action-Not Available
Vendor-Red Hat, Inc.
Product-Red Hat JBoss Enterprise Application Platform Expansion PackRHBK 26.0.8Red Hat build of Keycloak 26.0Red Hat JBoss Enterprise Application Platform 8
CWE ID-CWE-693
Protection Mechanism Failure
CVE-2024-8447
Assigner-Red Hat, Inc.
ShareView Details
Assigner-Red Hat, Inc.
CVSS Score-5.9||MEDIUM
EPSS-0.23% / 45.82%
||
7 Day CHG~0.00%
Published-02 Jan, 2025 | 20:19
Updated-14 May, 2025 | 23:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Narayana: deadlock via multiple join requests sent to lra coordinator

A security issue was discovered in the LRA Coordinator component of Narayana. When Cancel is called in LRA, an execution time of approximately 2 seconds occurs. If Join is called with the same LRA ID within that timeframe, the application may crash or hang indefinitely, leading to a denial of service.

Action-Not Available
Vendor-Red Hat, Inc.
Product-Red Hat JBoss EAP XP 5.0 Update 2.0Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 9Red Hat JBoss Data Grid 7Red Hat JBoss Enterprise Application Platform Expansion PackRed Hat JBoss Enterprise Application Platform 8Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 8Red Hat JBoss Enterprise Application Platform 7
CWE ID-CWE-833
Deadlock
CVE-2024-10973
Assigner-Red Hat, Inc.
ShareView Details
Assigner-Red Hat, Inc.
CVSS Score-5.7||MEDIUM
EPSS-0.01% / 1.28%
||
7 Day CHG~0.00%
Published-17 Dec, 2024 | 22:59
Updated-27 Feb, 2025 | 03:22
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Keycloak: cli option for encrypted jgroups ignored

A vulnerability was found in Keycloak. The environment option `KC_CACHE_EMBEDDED_MTLS_ENABLED` does not work and the JGroups replication configuration is always used in plain text which can allow an attacker that has access to adjacent networks related to JGroups to read sensitive information.

Action-Not Available
Vendor-Red Hat, Inc.
Product-Red Hat JBoss Enterprise Application Platform 8Red Hat Build of KeycloakRed Hat JBoss Enterprise Application Platform Expansion Pack
CWE ID-CWE-319
Cleartext Transmission of Sensitive Information
CVE-2024-12397
Assigner-Red Hat, Inc.
ShareView Details
Assigner-Red Hat, Inc.
CVSS Score-7.4||HIGH
EPSS-0.35% / 56.53%
||
7 Day CHG+0.02%
Published-12 Dec, 2024 | 09:05
Updated-04 Aug, 2025 | 14:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Io.quarkus.http/quarkus-http-core: quarkus http cookie smuggling

A flaw was found in Quarkus-HTTP, which incorrectly parses cookies with certain value-delimiting characters in incoming requests. This issue could allow an attacker to construct a cookie value to exfiltrate HttpOnly cookie values or spoof arbitrary additional cookie values, leading to unauthorized data access or modification. The main threat from this flaw impacts data confidentiality and integrity.

Action-Not Available
Vendor-Red Hat, Inc.
Product-Red Hat JBoss Enterprise Application Platform Expansion PackHawtIO HawtIO 4.2.0Red Hat build of OptaPlanner 8Red Hat Process Automation 7Red Hat build of Quarkus 3.15.3streams for Apache KafkaRed Hat build of Apache Camel 4 for Quarkus 3Red Hat JBoss Enterprise Application Platform 8Red Hat Build of KeycloakCryostat 4 on RHEL 9Red Hat build of Apicurio Registry 2Cryostat 3Red Hat Fuse 7Red Hat Integration Camel K 1
CWE ID-CWE-444
Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling')
CVE-2024-10492
Assigner-Red Hat, Inc.
ShareView Details
Assigner-Red Hat, Inc.
CVSS Score-2.7||LOW
EPSS-0.04% / 8.71%
||
7 Day CHG~0.00%
Published-25 Nov, 2024 | 07:37
Updated-27 Feb, 2025 | 04:09
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Keycloak-quarkus-server: keycloak path trasversal

A vulnerability was found in Keycloak. A user with high privileges could read sensitive information from a Vault file that is not within the expected context. This attacker must have previous high access to the Keycloak server in order to perform resource creation, for example, an LDAP provider configuration and set up a Vault read file, which will only inform whether that file exists or not.

Action-Not Available
Vendor-Red Hat, Inc.
Product-Red Hat JBoss Enterprise Application Platform Expansion PackRed Hat build of Keycloak 24Red Hat JBoss Enterprise Application Platform 8Red Hat Single Sign-On 7Red Hat build of Keycloak 26.0.6Red Hat build of Keycloak 24.0.9Red Hat build of Keycloak 26.0
CWE ID-CWE-73
External Control of File Name or Path
CVE-2024-10451
Assigner-Red Hat, Inc.
ShareView Details
Assigner-Red Hat, Inc.
CVSS Score-5.9||MEDIUM
EPSS-0.07% / 22.97%
||
7 Day CHG~0.00%
Published-25 Nov, 2024 | 07:37
Updated-27 Nov, 2024 | 20:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Org.keycloak:keycloak-quarkus-server: sensitive data exposure in keycloak build process

A flaw was found in Keycloak. This issue occurs because sensitive runtime values, such as passwords, may be captured during the Keycloak build process and embedded as default values in bytecode, leading to unintended information disclosure. In Keycloak 26, sensitive data specified directly in environment variables during the build process is also stored as a default values, making it accessible during runtime. Indirect usage of environment variables for SPI options and Quarkus properties is also vulnerable due to unconditional expansion by PropertyMapper logic, capturing sensitive data as default values in all Keycloak versions up to 26.0.2.

Action-Not Available
Vendor-Red Hat, Inc.
Product-Red Hat build of Keycloak 26.0Red Hat build of Keycloak 24.0.9Red Hat JBoss Enterprise Application Platform 8Red Hat Single Sign-On 7Red Hat build of Keycloak 26.0.6Red Hat build of Keycloak 24
CWE ID-CWE-798
Use of Hard-coded Credentials
CVE-2024-10270
Assigner-Red Hat, Inc.
ShareView Details
Assigner-Red Hat, Inc.
CVSS Score-6.5||MEDIUM
EPSS-0.09% / 27.17%
||
7 Day CHG~0.00%
Published-25 Nov, 2024 | 07:37
Updated-27 Feb, 2025 | 03:22
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Org.keycloak:keycloak-services: keycloak denial of service

A vulnerability was found in the Keycloak-services package. If untrusted data is passed to the SearchQueryUtils method, it could lead to a denial of service (DoS) scenario by exhausting system resources due to a Regex complexity.

Action-Not Available
Vendor-Red Hat, Inc.
Product-Red Hat JBoss Enterprise Application Platform Expansion PackRed Hat build of Keycloak 24Red Hat JBoss Enterprise Application Platform 8Red Hat Single Sign-On 7Red Hat build of Keycloak 26.0.6Red Hat build of Keycloak 24.0.9Red Hat build of Keycloak 26.0
CWE ID-CWE-1333
Inefficient Regular Expression Complexity
CVE-2024-9666
Assigner-Red Hat, Inc.
ShareView Details
Assigner-Red Hat, Inc.
CVSS Score-4.7||MEDIUM
EPSS-0.02% / 3.04%
||
7 Day CHG~0.00%
Published-25 Nov, 2024 | 07:29
Updated-28 Jan, 2025 | 09:33
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Org.keycloak/keycloak-quarkus-server: keycloak proxy header handling denial-of-service (dos) vulnerability

A vulnerability was found in the Keycloak Server. The Keycloak Server is vulnerable to a denial of service (DoS) attack due to improper handling of proxy headers. When Keycloak is configured to accept incoming proxy headers, it may accept non-IP values, such as obfuscated identifiers, without proper validation. This issue can lead to costly DNS resolution operations, which an attacker could exploit to tie up IO threads and potentially cause a denial of service. The attacker must have access to send requests to a Keycloak instance that is configured to accept proxy headers, specifically when reverse proxies do not overwrite incoming headers, and Keycloak is configured to trust these headers.

Action-Not Available
Vendor-Red Hat, Inc.
Product-Red Hat build of Keycloak 24Red Hat build of Keycloak 24.0.9Red Hat build of Keycloak 26.0Red Hat build of Keycloak 26.0.6Red Hat JBoss Enterprise Application Platform 8
CWE ID-CWE-444
Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling')
CVE-2023-4639
Assigner-Red Hat, Inc.
ShareView Details
Assigner-Red Hat, Inc.
CVSS Score-7.4||HIGH
EPSS-3.13% / 86.35%
||
7 Day CHG~0.00%
Published-17 Nov, 2024 | 10:21
Updated-07 Feb, 2025 | 17:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Undertow: cookie smuggling/spoofing

A flaw was found in Undertow, which incorrectly parses cookies with certain value-delimiting characters in incoming requests. This issue could allow an attacker to construct a cookie value to exfiltrate HttpOnly cookie values or spoof arbitrary additional cookie values, leading to unauthorized data access or modification. The main threat from this flaw impacts data confidentiality and integrity.

Action-Not Available
Vendor-Red Hat, Inc.
Product-Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 8Red Hat build of QuarkusRed Hat JBoss Enterprise Application Platform 7.4 on RHEL 7Red Hat JBoss Fuse 6Red Hat Integration Camel QuarkusRed Hat Integration Change Data CaptureRed Hat Integration Camel KRed Hat JBoss Fuse Service Works 6Red Hat build of Apache Camel for Spring Boot 3Red Hat JBoss Enterprise Application Platform 8Red Hat JBoss Enterprise Application Platform 7.4 for RHEL 9Red Hat Single Sign-On 7Migration Toolkit for Runtimes 1 on RHEL 8Red Hat Fuse 7Red Hat Process Automation 7Red Hat JBoss Data Grid 7Migration Toolkit for Applications 6Red Hat JBoss Enterprise Application Platform 7.4 for RHEL 8Red Hat JBoss Enterprise Application Platform 6Red Hat Data Grid 8Red Hat Decision Manager 7Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 9Red Hat build of Apicurio RegistryRed Hat JBoss Enterprise Application Platform 7
CWE ID-CWE-444
Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling')
CVE-2023-1973
Assigner-Red Hat, Inc.
ShareView Details
Assigner-Red Hat, Inc.
CVSS Score-7.5||HIGH
EPSS-0.55% / 66.92%
||
7 Day CHG-0.10%
Published-07 Nov, 2024 | 10:01
Updated-08 Nov, 2024 | 19:01
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Undertow: unrestricted request storage leads to memory exhaustion

A flaw was found in Undertow package. Using the FormAuthenticationMechanism, a malicious user could trigger a Denial of Service by sending crafted requests, leading the server to an OutofMemory error, exhausting the server's memory.

Action-Not Available
Vendor-Red Hat, Inc.
Product-Red Hat JBoss Enterprise Application Platform 7.4 on RHEL 7Red Hat JBoss Enterprise Application Platform 7Red Hat JBoss Enterprise Application Platform 7.4 for RHEL 8Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 9Red Hat JBoss Enterprise Application Platform 7.4 for RHEL 9Red Hat JBoss Enterprise Application Platform 8Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 8
CWE ID-CWE-20
Improper Input Validation
CVE-2024-10234
Assigner-Red Hat, Inc.
ShareView Details
Assigner-Red Hat, Inc.
CVSS Score-6.1||MEDIUM
EPSS-0.41% / 60.83%
||
7 Day CHG~0.00%
Published-22 Oct, 2024 | 13:17
Updated-23 Jul, 2025 | 19:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Wildfly: wildfly vulnerable to cross-site scripting (xss)

A vulnerability was found in Wildfly, where a user may perform Cross-site scripting in the Wildfly deployment system. This flaw allows an attacker or insider to execute a deployment with a malicious payload, which could trigger undesired behavior against the server.

Action-Not Available
Vendor-Red Hat, Inc.
Product-build_of_keycloakjboss_enterprise_application_platformRed Hat JBoss Enterprise Application Platform 7.4 for RHEL 8Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 8Red Hat JBoss Enterprise Application Platform Expansion PackRed Hat JBoss Enterprise Application Platform 7.4 for RHEL 9Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 9RHEL-8 based Middleware ContainersRed Hat Single Sign-On 7.6 for RHEL 8Red Hat JBoss Enterprise Application Platform 8Red Hat Build of KeycloakRed Hat Fuse 7Red Hat Single Sign-On 7.6 for RHEL 9Red Hat Single Sign-On 7Red Hat JBoss Enterprise Application Platform 7.4 on RHEL 7Red Hat JBoss Enterprise Application Platform 7.4.23Red Hat Single Sign-On 7.6 for RHEL 7Red Hat JBoss Data Grid 7
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2024-3656
Assigner-Red Hat, Inc.
ShareView Details
Assigner-Red Hat, Inc.
CVSS Score-8.1||HIGH
EPSS-88.29% / 99.46%
||
7 Day CHG~0.00%
Published-09 Oct, 2024 | 18:59
Updated-27 Aug, 2025 | 12:23
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Keycloak: unguarded admin rest api endpoints allows low privilege users to use administrative functionalities

A flaw was found in Keycloak. Certain endpoints in Keycloak's admin REST API allow low-privilege users to access administrative functionalities. This flaw allows users to perform actions reserved for administrators, potentially leading to data breaches or system compromise.

Action-Not Available
Vendor-Red Hat, Inc.
Product-Red Hat Single Sign-On 7Red Hat Build of KeycloakRed Hat JBoss Enterprise Application Platform 8
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2024-9622
Assigner-Red Hat, Inc.
ShareView Details
Assigner-Red Hat, Inc.
CVSS Score-5.3||MEDIUM
EPSS-0.09% / 27.18%
||
7 Day CHG~0.00%
Published-08 Oct, 2024 | 16:26
Updated-27 Feb, 2025 | 04:00
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Resteasy-netty4-cdi: resteasy-netty4: resteasy-reactor-netty: http request smuggling leading to client timeouts in resteasy-netty4

A vulnerability was found in the resteasy-netty4 library arising from improper handling of HTTP requests using smuggling techniques. When an HTTP smuggling request with an ASCII control character is sent, it causes the Netty HttpObjectDecoder to transition into a BAD_MESSAGE state. As a result, any subsequent legitimate requests on the same connection are ignored, leading to client timeouts, which may impact systems using load balancers and expose them to risk.

Action-Not Available
Vendor-Red Hat, Inc.
Product-Red Hat JBoss Data Grid 7Red Hat JBoss Enterprise Application Platform Expansion PackRed Hat JBoss Enterprise Application Platform 8Red Hat JBoss Enterprise Application Platform 7
CWE ID-CWE-444
Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling')
CVE-2024-8883
Assigner-Red Hat, Inc.
ShareView Details
Assigner-Red Hat, Inc.
CVSS Score-6.1||MEDIUM
EPSS-4.89% / 89.17%
||
7 Day CHG~0.00%
Published-19 Sep, 2024 | 15:48
Updated-02 May, 2025 | 17:07
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Keycloak: vulnerable redirect uri validation results in open redirec

A misconfiguration flaw was found in Keycloak. This issue can allow an attacker to redirect users to an arbitrary URL if a 'Valid Redirect URI' is set to http://localhost or http://127.0.0.1, enabling sensitive information such as authorization codes to be exposed to the attacker, potentially leading to session hijacking.

Action-Not Available
Vendor-Red Hat, Inc.
Product-single_sign-onopenshift_container_platform_for_ibm_zbuild_of_keycloakopenshift_container_platformopenshift_container_platform_for_poweropenshift_container_platform_for_linuxoneRed Hat build of Keycloak 22Red Hat Single Sign-On 7Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 9Red Hat Single Sign-On 7.6 for RHEL 9Red Hat build of Keycloak 24Red Hat JBoss Enterprise Application Platform 8Red Hat Single Sign-On 7.6 for RHEL 7Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 8Red Hat Single Sign-On 7.6 for RHEL 8RHEL-8 based Middleware ContainersRed Hat Build of Keycloak
CWE ID-CWE-601
URL Redirection to Untrusted Site ('Open Redirect')
CVE-2024-8698
Assigner-Red Hat, Inc.
ShareView Details
Assigner-Red Hat, Inc.
CVSS Score-7.7||HIGH
EPSS-79.58% / 99.05%
||
7 Day CHG~0.00%
Published-19 Sep, 2024 | 15:48
Updated-27 Aug, 2025 | 14:04
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Keycloak-saml-core: improper verification of saml responses leading to privilege escalation in keycloak

A flaw exists in the SAML signature validation method within the Keycloak XMLSignatureUtil class. The method incorrectly determines whether a SAML signature is for the full document or only for specific assertions based on the position of the signature in the XML document, rather than the Reference element used to specify the signed element. This flaw allows attackers to create crafted responses that can bypass the validation, potentially leading to privilege escalation or impersonation attacks.

Action-Not Available
Vendor-Red Hat, Inc.
Product-Red Hat build of Keycloak 22Red Hat JBoss Enterprise Application Platform 8Red Hat Single Sign-On 7.6 for RHEL 7Red Hat Build of KeycloakRed Hat Single Sign-On 7Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 8Red Hat Single Sign-On 7.6 for RHEL 9Red Hat build of Keycloak 24RHEL-8 based Middleware ContainersRed Hat JBoss Enterprise Application Platform 8.0 for RHEL 9Red Hat Single Sign-On 7.6 for RHEL 8
CWE ID-CWE-347
Improper Verification of Cryptographic Signature
CVE-2024-7341
Assigner-Red Hat, Inc.
ShareView Details
Assigner-Red Hat, Inc.
CVSS Score-7.1||HIGH
EPSS-1.15% / 77.62%
||
7 Day CHG~0.00%
Published-09 Sep, 2024 | 18:51
Updated-31 Dec, 2024 | 14:24
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Wildfly-elytron: org.keycloak/keycloak-services: session fixation in elytron saml adapters

A session fixation issue was discovered in the SAML adapters provided by Keycloak. The session ID and JSESSIONID cookie are not changed at login time, even when the turnOffChangeSessionIdOnLogin option is configured. This flaw allows an attacker who hijacks the current session before authentication to trigger session fixation.

Action-Not Available
Vendor-Red Hat, Inc.
Product-single_sign-onbuild_of_keycloakkeycloakenterprise_linuxRed Hat Single Sign-On 7.6 for RHEL 7Red Hat build of Keycloak 22Red Hat Single Sign-On 7.6 for RHEL 9Red Hat JBoss Enterprise Application Platform 8Red Hat Single Sign-On 7.6 for RHEL 8RHEL-8 based Middleware ContainersRed Hat Single Sign-On 7Red Hat Build of KeycloakRed Hat build of Keycloak 24
CWE ID-CWE-384
Session Fixation
CVE-2024-4629
Assigner-Red Hat, Inc.
ShareView Details
Assigner-Red Hat, Inc.
CVSS Score-6.5||MEDIUM
EPSS-0.17% / 38.20%
||
7 Day CHG~0.00%
Published-03 Sep, 2024 | 19:42
Updated-28 Jan, 2025 | 09:33
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Keycloak: potential bypass of brute force protection

A vulnerability was found in Keycloak. This flaw allows attackers to bypass brute force protection by exploiting the timing of login attempts. By initiating multiple login requests simultaneously, attackers can exceed the configured limits for failed attempts before the system locks them out. This timing loophole enables attackers to make more guesses at passwords than intended, potentially compromising account security on affected systems.

Action-Not Available
Vendor-Red Hat, Inc.
Product-single_sign-onopenshift_container_platform_ibm_z_systemsbuild_of_keycloakopenshift_container_platformkeycloakenterprise_linuxopenshift_container_platform_for_poweropenshift_container_platform_for_linuxoneRed Hat JBoss Enterprise Application Platform 8Red Hat Single Sign-On 7.6 for RHEL 9RHEL-8 based Middleware ContainersRed Hat Build of KeycloakRed Hat build of Keycloak 22Red Hat Single Sign-On 7.6 for RHEL 7Red Hat Single Sign-On 7Red Hat Single Sign-On 7.6 for RHEL 8
CWE ID-CWE-837
Improper Enforcement of a Single, Unique Action
CVE-2024-7885
Assigner-Red Hat, Inc.
ShareView Details
Assigner-Red Hat, Inc.
CVSS Score-7.5||HIGH
EPSS-28.04% / 96.29%
||
7 Day CHG~0.00%
Published-21 Aug, 2024 | 14:13
Updated-14 Aug, 2025 | 14:48
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Undertow: improper state management in proxy protocol parsing causes information leakage

A vulnerability was found in Undertow where the ProxyProtocolReadListener reuses the same StringBuilder instance across multiple requests. This issue occurs when the parseProxyProtocolV1 method processes multiple requests on the same HTTP connection. As a result, different requests may share the same StringBuilder instance, potentially leading to information leakage between requests or responses. In some cases, a value from a previous request or response may be erroneously reused, which could lead to unintended data exposure. This issue primarily results in errors and connection termination but creates a risk of data leakage in multi-request environments.

Action-Not Available
Vendor-Red Hat, Inc.
Product-build_of_apache_camel_-_hawtiobuild_of_apache_camel_for_spring_bootsingle_sign-onintegration_camel_kjboss_fusebuild_of_keycloakprocess_automationdata_gridjboss_enterprise_application_platformRed Hat JBoss Enterprise Application Platform 8Red Hat build of Apache Camel for Spring Boot 3Red Hat build of Apache Camel 4.4.2 for Spring BootHawtIO 4.0.0 for Red Hat build of Apache Camel 4Red Hat JBoss Enterprise Application Platform Expansion PackRed Hat Build of KeycloakRed Hat Data Grid 8Red Hat JBoss Enterprise Application Platform 7.4 for RHEL 9Red Hat Single Sign-On 7Red Hat Fuse 7Red Hat build of Apache Camel 3.20.7 for Spring BootRed Hat JBoss Enterprise Application Platform 7.4 for RHEL 8Red Hat Process Automation 7Red Hat JBoss Enterprise Application Platform 7Red Hat JBoss Enterprise Application Platform 7.4 on RHEL 7Red Hat JBoss Data Grid 7Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 9Red Hat Integration Camel K 1Red Hat build of Apache Camel - HawtIO 4Red Hat build of QuarkusRed Hat JBoss Enterprise Application Platform 8.0 for RHEL 8
CWE ID-CWE-362
Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
CVE-2024-3653
Assigner-Red Hat, Inc.
ShareView Details
Assigner-Red Hat, Inc.
CVSS Score-5.3||MEDIUM
EPSS-4.43% / 88.61%
||
7 Day CHG~0.00%
Published-08 Jul, 2024 | 21:21
Updated-06 Aug, 2025 | 08:47
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Undertow: learningpushhandler can lead to remote memory dos attacks

A vulnerability was found in Undertow. This issue requires enabling the learning-push handler in the server's config, which is disabled by default, leaving the maxAge config in the handler unconfigured. The default is -1, which makes the handler vulnerable. If someone overwrites that config, the server is not subject to the attack. The attacker needs to be able to reach the server with a normal HTTP request.

Action-Not Available
Vendor-Red Hat, Inc.
Product-Red Hat Build of KeycloakRed Hat Integration Camel Quarkus 2Red Hat JBoss Fuse Service Works 6Red Hat Fuse 7Red Hat JBoss Data Grid 7streams for Apache KafkaOpenShift ServerlessRed Hat build of OptaPlanner 8Red Hat Process Automation 7Red Hat build of QuarkusRed Hat JBoss Enterprise Application Platform 7.4 for RHEL 9Red Hat Single Sign-On 7Red Hat JBoss Enterprise Application Platform Expansion PackRed Hat build of Quarkus 3.8.6.redhatRed Hat build of Apache Camel 4 for Quarkus 3Red Hat Integration Camel K 1Red Hat build of Apache Camel - HawtIO 4Red Hat build of Apache Camel for Spring Boot 4Red Hat JBoss Enterprise Application Platform 7.4 for RHEL 8Red Hat build of Apicurio Registry 2Red Hat JBoss Enterprise Application Platform 7.4 on RHEL 7Red Hat JBoss Enterprise Application Platform 8Red Hat Data Grid 8Red Hat JBoss Enterprise Application Platform 7
CWE ID-CWE-401
Missing Release of Memory after Effective Lifetime
CVE-2024-5971
Assigner-Red Hat, Inc.
ShareView Details
Assigner-Red Hat, Inc.
CVSS Score-7.5||HIGH
EPSS-3.82% / 87.67%
||
7 Day CHG~0.00%
Published-08 Jul, 2024 | 20:51
Updated-14 Aug, 2025 | 14:48
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Undertow: response write hangs in case of java 17 tlsv1.3 newsessionticket

A vulnerability was found in Undertow, where the chunked response hangs after the body was flushed. The response headers and body were sent but the client would continue waiting as Undertow does not send the expected 0\r\n termination of the chunked response. This results in uncontrolled resource consumption, leaving the server side to a denial of service attack. This happens only with Java 17 TLSv1.3 scenarios.

Action-Not Available
Vendor-Red Hat, Inc.
Product-Red Hat JBoss Enterprise Application Platform 8Red Hat build of Apache Camel for Spring Boot 3Red Hat build of Apache Camel 4.4.2 for Spring BootRed Hat JBoss Enterprise Application Platform Expansion PackRed Hat Build of KeycloakRed Hat JBoss Enterprise Application Platform 7.4 for RHEL 9Red Hat Single Sign-On 7Red Hat Fuse 7Red Hat build of Apache Camel 3.20.7 for Spring BootRed Hat JBoss Enterprise Application Platform 7.4 for RHEL 8Red Hat Process Automation 7Red Hat JBoss Enterprise Application Platform 7Red Hat JBoss Enterprise Application Platform 7.4 on RHEL 7Red Hat build of Apache Camel 4.4.1 for Spring Boot 3.2Red Hat JBoss Data Grid 7Red Hat Integration Camel K 1Red Hat build of Apache Camel - HawtIO 4Red Hat build of QuarkusRed Hat Data Grid 8
CWE ID-CWE-674
Uncontrolled Recursion
CVE-2024-6162
Assigner-Red Hat, Inc.
ShareView Details
Assigner-Red Hat, Inc.
CVSS Score-7.5||HIGH
EPSS-1.55% / 80.69%
||
7 Day CHG~0.00%
Published-20 Jun, 2024 | 14:33
Updated-14 Aug, 2025 | 15:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Undertow: url-encoded request path information can be broken on ajp-listener

A vulnerability was found in Undertow, where URL-encoded request paths can be mishandled during concurrent requests on the AJP listener. This issue arises because the same buffer is used to decode the paths for multiple requests simultaneously, leading to incorrect path information being processed. As a result, the server may attempt to access the wrong path, causing errors such as "404 Not Found" or other application failures. This flaw can potentially lead to a denial of service, as legitimate resources become inaccessible due to the path mix-up.

Action-Not Available
Vendor-Red Hat, Inc.
Product-Red Hat Single Sign-On 7Red Hat Fuse 7Red Hat JBoss Enterprise Application Platform 8Red Hat Process Automation 7Red Hat JBoss Enterprise Application Platform 7Red Hat Data Grid 8Red Hat build of Apache Camel 4.4.1 for Spring Boot 3.2EAP 8.0.1Red Hat build of Apache Camel for Spring Boot 3Red Hat JBoss Data Grid 7Red Hat Integration Camel K 1Red Hat build of Apache Camel - HawtIO 4Red Hat JBoss Enterprise Application Platform Expansion PackRed Hat Build of Keycloak
CWE ID-CWE-400
Uncontrolled Resource Consumption
CVE-2024-4029
Assigner-Red Hat, Inc.
ShareView Details
Assigner-Red Hat, Inc.
CVSS Score-4.1||MEDIUM
EPSS-0.01% / 0.66%
||
7 Day CHG~0.00%
Published-02 May, 2024 | 14:55
Updated-14 Aug, 2025 | 16:28
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Wildfly: no timeout for eap management interface may lead to denial of service (dos)

A vulnerability was found in Wildfly’s management interface. Due to the lack of limitation of sockets for the management interface, it may be possible to cause a denial of service hitting the nofile limit as there is no possibility to configure or set a maximum number of connections.

Action-Not Available
Vendor-Red Hat, Inc.
Product-Red Hat JBoss Enterprise Application Platform 7.4 for RHEL 9Red Hat Single Sign-On 7Red Hat JBoss Enterprise Application Platform 8Red Hat Fuse 7Red Hat JBoss Enterprise Application Platform 7.4 for RHEL 8Red Hat Process Automation 7Red Hat JBoss Enterprise Application Platform 7Red Hat JBoss Enterprise Application Platform 7.4 on RHEL 7Red Hat Data Grid 8Red Hat JBoss Data Grid 7Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 9Red Hat Build of KeycloakRed Hat JBoss Enterprise Application Platform Expansion PackRed Hat JBoss Enterprise Application Platform 8.0 for RHEL 8
CWE ID-CWE-770
Allocation of Resources Without Limits or Throttling
CVE-2024-1102
Assigner-Red Hat, Inc.
ShareView Details
Assigner-Red Hat, Inc.
CVSS Score-6.5||MEDIUM
EPSS-0.11% / 30.05%
||
7 Day CHG~0.00%
Published-25 Apr, 2024 | 16:24
Updated-14 Aug, 2025 | 15:43
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Jberet: jberet-core logging database credentials

A vulnerability was found in jberet-core logging. An exception in 'dbProperties' might display user credentials such as the username and password for the database-connection.

Action-Not Available
Vendor-jberetRed Hat, Inc.
Product-jberetjboss_enterprise_application_platformRed Hat Single Sign-On 7Red Hat JBoss Enterprise Application Platform 8Red Hat Fuse 7Red Hat JBoss Enterprise Application Platform 7Red Hat Data Grid 8Red Hat JBoss Enterprise Application Platform 6Red Hat JBoss Data Grid 7Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 9Red Hat Build of KeycloakRed Hat JBoss Enterprise Application Platform Expansion PackRed Hat JBoss Enterprise Application Platform 8.0 for RHEL 8
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CWE ID-CWE-523
Unprotected Transport of Credentials
CVE-2023-6717
Assigner-Red Hat, Inc.
ShareView Details
Assigner-Red Hat, Inc.
CVSS Score-6||MEDIUM
EPSS-0.07% / 20.52%
||
7 Day CHG~0.00%
Published-25 Apr, 2024 | 16:02
Updated-26 Aug, 2025 | 06:25
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Keycloak: xss via assertion consumer service url in saml post-binding flow

A flaw was found in the SAML client registration in Keycloak that could allow an administrator to register malicious JavaScript URIs as Assertion Consumer Service POST Binding URLs (ACS), posing a Cross-Site Scripting (XSS) risk. This issue may allow a malicious admin in one realm or a client with registration access to target users in different realms or applications, executing arbitrary JavaScript in their contexts upon form submission. This can enable unauthorized access and harmful actions, compromising the confidentiality, integrity, and availability of the complete KC instance.

Action-Not Available
Vendor-Red Hat, Inc.
Product-Migration Toolkit for Applications 6Red Hat OpenShift GitOpsRHPAM 7.13.5 asyncRed Hat build of Keycloak 22.0.10Red Hat build of QuarkusRed Hat JBoss Enterprise Application Platform 6Red Hat Single Sign-On 7Red Hat JBoss Enterprise Application Platform 7Red Hat Process Automation 7Red Hat Decision Manager 7Red Hat Data Grid 8Red Hat JBoss Enterprise Application Platform Expansion PackRed Hat AMQ Broker 7Red Hat build of Apicurio Registry 2RHOSS-1.33-RHEL-8Red Hat Fuse 7Red Hat Developer HubRed Hat JBoss Enterprise Application Platform 8Red Hat JBoss Data Grid 7Migration Toolkit for Applications 7Red Hat build of Keycloak 22
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2023-5675
Assigner-Red Hat, Inc.
ShareView Details
Assigner-Red Hat, Inc.
CVSS Score-6.5||MEDIUM
EPSS-0.10% / 27.39%
||
7 Day CHG~0.00%
Published-25 Apr, 2024 | 15:44
Updated-03 Mar, 2025 | 16:28
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Quarkus: authorization flaw in quarkus resteasy reactive and classic when "quarkus.security.jaxrs.deny-unannotated-endpoints" or "quarkus.security.jaxrs.default-roles-allowed" properties are used.

A flaw was found in Quarkus. When a Quarkus RestEasy Classic or Reactive JAX-RS endpoint has its methods declared in the abstract Java class or customized by Quarkus extensions using the annotation processor, the authorization of these methods will not be enforced if it is enabled by either 'quarkus.security.jaxrs.deny-unannotated-endpoints' or 'quarkus.security.jaxrs.default-roles-allowed' properties.

Action-Not Available
Vendor-Red Hat, Inc.
Product-Red Hat build of Quarkus 2.13.9.FinalRed Hat build of Quarkus 3.2.9.FinalRed Hat build of Apicurio Registry 2Red Hat Fuse 7Red Hat Integration Camel Quarkus 2Red Hat Integration Camel K 1Cryostat 2Red Hat Process Automation 7OpenShift ServerlessRed Hat JBoss Enterprise Application Platform 8Red Hat build of OptaPlanner 8A-MQ Clients 2
CWE ID-CWE-285
Improper Authorization
CVE-2024-1249
Assigner-Red Hat, Inc.
ShareView Details
Assigner-Red Hat, Inc.
CVSS Score-7.4||HIGH
EPSS-0.13% / 33.34%
||
7 Day CHG~0.00%
Published-17 Apr, 2024 | 13:22
Updated-07 Aug, 2025 | 12:08
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Keycloak: org.keycloak.protocol.oidc: unvalidated cross-origin messages in checkloginiframe leads to ddos

A flaw was found in Keycloak's OIDC component in the "checkLoginIframe," which allows unvalidated cross-origin messages. This flaw allows attackers to coordinate and send millions of requests in seconds using simple code, significantly impacting the application's availability without proper origin validation for incoming messages.

Action-Not Available
Vendor-Red Hat, Inc.
Product-Red Hat Process Automation 7RHSSO 7.6.8Red Hat JBoss Data Grid 7Red Hat build of Apicurio Registry 2Red Hat JBoss Enterprise Application Platform Expansion PackRed Hat JBoss Enterprise Application Platform 8Migration Toolkit for Applications 6Red Hat Data Grid 8Red Hat AMQ Broker 7Red Hat build of Keycloak 22.0.10Red Hat Fuse 7streams for Apache KafkaRed Hat Single Sign-On 7.6 for RHEL 9RHOSS-1.33-RHEL-8Red Hat Developer HubRed Hat Single Sign-On 7.6 for RHEL 7Red Hat Single Sign-On 7.6 for RHEL 8Red Hat Decision Manager 7Migration Toolkit for Applications 7RHEL-8 based Middleware ContainersRed Hat JBoss Enterprise Application Platform 7Red Hat JBoss Enterprise Application Platform 6Red Hat build of Keycloak 22
CWE ID-CWE-346
Origin Validation Error
CVE-2023-6236
Assigner-Red Hat, Inc.
ShareView Details
Assigner-Red Hat, Inc.
CVSS Score-7.3||HIGH
EPSS-0.04% / 13.13%
||
7 Day CHG~0.00%
Published-10 Apr, 2024 | 01:04
Updated-27 Feb, 2025 | 03:12
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Eap: oidc app attempting to access the second tenant, the user should be prompted to log

A flaw was found in Red Hat Enterprise Application Platform 8. When an OIDC app that serves multiple tenants attempts to access the second tenant, it should prompt the user to log in again since the second tenant is secured with a different OIDC configuration. The underlying issue is in OidcSessionTokenStore when determining if a cached token should be used or not. This logic needs to be updated to take into account the new "provider-url" option in addition to the "realm" option. EAP-7 does not provide the vulnerable provider-url configuration option in its OIDC implementation and is not affected by this flaw.

Action-Not Available
Vendor-Red Hat, Inc.
Product-Red Hat JBoss Enterprise Application Platform Expansion PackRed Hat JBoss Enterprise Application Platform 8.0 for RHEL 9Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 8Red Hat JBoss Enterprise Application Platform 8Red Hat JBoss Enterprise Application Platform 7
CWE ID-CWE-345
Insufficient Verification of Data Authenticity
CVE-2024-1233
Assigner-Red Hat, Inc.
ShareView Details
Assigner-Red Hat, Inc.
CVSS Score-7.3||HIGH
EPSS-0.18% / 39.56%
||
7 Day CHG+0.05%
Published-09 Apr, 2024 | 07:01
Updated-14 Aug, 2025 | 15:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Eap: wildfly-elytron has a ssrf security issue

A flaw was found in` JwtValidator.resolvePublicKey` in JBoss EAP, where the validator checks jku and sends a HTTP request. During this process, no whitelisting or other filtering behavior is performed on the destination URL address, which may result in a server-side request forgery (SSRF) vulnerability.

Action-Not Available
Vendor-Red Hat, Inc.
Product-Red Hat JBoss Enterprise Application Platform 7.4 for RHEL 9Red Hat JBoss Enterprise Application Platform 8Red Hat JBoss Enterprise Application Platform 7.3 EUS for RHEL 7Red Hat JBoss Enterprise Application Platform 7.4 for RHEL 8Red Hat JBoss Enterprise Application Platform 7Red Hat JBoss Enterprise Application Platform 7.4 on RHEL 7Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 9Red Hat JBoss Enterprise Application Platform 7.1 EUS for RHEL 7Red Hat JBoss Enterprise Application Platform Expansion PackRed Hat JBoss Enterprise Application Platform 8.0 for RHEL 8
CWE ID-CWE-918
Server-Side Request Forgery (SSRF)
CVE-2024-1300
Assigner-Red Hat, Inc.
ShareView Details
Assigner-Red Hat, Inc.
CVSS Score-5.4||MEDIUM
EPSS-0.10% / 27.95%
||
7 Day CHG~0.00%
Published-02 Apr, 2024 | 07:33
Updated-12 Aug, 2025 | 17:02
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Io.vertx:vertx-core: memory leak when a tcp server is configured with tls and sni support

A vulnerability in the Eclipse Vert.x toolkit causes a memory leak in TCP servers configured with TLS and SNI support. When processing an unknown SNI server name assigned the default certificate instead of a mapped certificate, the SSL context is erroneously cached in the server name map, leading to memory exhaustion. This flaw allows attackers to send TLS client hello messages with fake server names, triggering a JVM out-of-memory error.

Action-Not Available
Vendor-Red Hat, Inc.
Product-Red Hat JBoss Enterprise Application Platform 8Red Hat Integration Camel Quarkus 2MTA-6.2-RHEL-9OpenShift ServerlessRed Hat build of Apache Camel for Spring Boot 3Red Hat JBoss Enterprise Application Platform Expansion PackRed Hat Build of KeycloakRed Hat build of Quarkus 3.2.11.FinalRed Hat Fuse 7CEQ 3.2Red Hat AMQ Broker 7Red Hat JBoss Enterprise Application Platform 7Red Hat Process Automation 7RHINT Service Registry 2.5.11 GARed Hat build of Apache Camel 4.4.1 for Spring Boot 3.2A-MQ Clients 2Red Hat build of OptaPlanner 8Red Hat JBoss Data Grid 7Migration Toolkit for Runtimes 1 on RHEL 8Red Hat AMQ Streams 2.7.0Cryostat 2 on RHEL 8Red Hat Integration Camel K 1Red Hat build of QuarkusRed Hat Data Grid 8
CWE ID-CWE-401
Missing Release of Memory after Effective Lifetime
CVE-2024-3094
Assigner-Red Hat, Inc.
ShareView Details
Assigner-Red Hat, Inc.
CVSS Score-10||CRITICAL
EPSS-86.57% / 99.38%
||
7 Day CHG~0.00%
Published-29 Mar, 2024 | 16:51
Updated-19 Aug, 2025 | 01:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Xz: malicious code in distributed source

Malicious code was discovered in the upstream tarballs of xz, starting with version 5.6.0. Through a series of complex obfuscations, the liblzma build process extracts a prebuilt object file from a disguised test file existing in the source code, which is then used to modify specific functions in the liblzma code. This results in a modified liblzma library that can be used by any software linked against this library, intercepting and modifying the data interaction with this library.

Action-Not Available
Vendor-tukaaniRed Hat, Inc.
Product-xzRed Hat Enterprise Linux 6Red Hat Enterprise Linux 10Red Hat JBoss Enterprise Application Platform 8Red Hat Enterprise Linux 8Red Hat Enterprise Linux 7Red Hat Enterprise Linux 9
CWE ID-CWE-506
Embedded Malicious Code
CVE-2024-1023
Assigner-Red Hat, Inc.
ShareView Details
Assigner-Red Hat, Inc.
CVSS Score-6.5||MEDIUM
EPSS-0.23% / 45.35%
||
7 Day CHG~0.00%
Published-27 Mar, 2024 | 07:51
Updated-12 Aug, 2025 | 17:02
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Io.vertx/vertx-core: memory leak due to the use of netty fastthreadlocal data structures in vertx

A vulnerability in the Eclipse Vert.x toolkit results in a memory leak due to using Netty FastThreadLocal data structures. Specifically, when the Vert.x HTTP client establishes connections to different hosts, triggering the memory leak. The leak can be accelerated with intimate runtime knowledge, allowing an attacker to exploit this vulnerability. For instance, a server accepting arbitrary internet addresses could serve as an attack vector by connecting to these addresses, thereby accelerating the memory leak.

Action-Not Available
Vendor-Red Hat, Inc.
Product-Red Hat JBoss Enterprise Application Platform 8Red Hat Integration Camel Quarkus 2Migration Toolkit for RuntimesMTA-6.2-RHEL-9OpenShift ServerlessRed Hat build of Apache Camel for Spring Boot 3Red Hat JBoss Enterprise Application Platform Expansion PackRed Hat Build of KeycloakRed Hat build of Quarkus 3.2.11.FinalRed Hat Fuse 7CEQ 3.2Red Hat AMQ Broker 7Red Hat JBoss Enterprise Application Platform 7Red Hat Process Automation 7RHINT Service Registry 2.5.11 GARed Hat build of Apache Camel 4.4.1 for Spring Boot 3.2A-MQ Clients 2Red Hat build of OptaPlanner 8Red Hat JBoss Data Grid 7Red Hat AMQ Streams 2.7.0Cryostat 2 on RHEL 8Red Hat Integration Camel K 1Red Hat build of QuarkusRed Hat Data Grid 8
CWE ID-CWE-401
Missing Release of Memory after Effective Lifetime
CVE-2023-5685
Assigner-Red Hat, Inc.
ShareView Details
Assigner-Red Hat, Inc.
CVSS Score-7.5||HIGH
EPSS-0.38% / 58.81%
||
7 Day CHG~0.00%
Published-22 Mar, 2024 | 18:24
Updated-14 Aug, 2025 | 14:47
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Xnio: stackoverflowexception when the chain of notifier states becomes problematically big

A flaw was found in XNIO. The XNIO NotifierState that can cause a Stack Overflow Exception when the chain of notifier states becomes problematically large can lead to uncontrolled resource management and a possible denial of service (DoS).

Action-Not Available
Vendor-Red Hat, Inc.
Product-Red Hat JBoss Enterprise Application Platform 8Red Hat JBoss Enterprise Application Platform 7.3 EUS for RHEL 7EAP 7.4.14Red Hat build of Apache Camel for Spring Boot 3Red Hat JBoss Enterprise Application Platform Expansion PackRed Hat Build of KeycloakRed Hat JBoss Enterprise Application Platform 7.4 for RHEL 9Red Hat Single Sign-On 7Red Hat build of Apache Camel 4.4.0 for Spring BootRed Hat JBoss Enterprise Application Platform 7.4 for RHEL 8Red Hat Process Automation 7Red Hat JBoss Enterprise Application Platform 7.4 on RHEL 7Red Hat JBoss Data Grid 7Red Hat JBoss Enterprise Application Platform 7.1 EUS for RHEL 7Red Hat Integration Camel K 1Red Hat build of Apache Camel - HawtIO 4Red Hat JBoss Fuse Service Works 6Red Hat Data Grid 8
CWE ID-CWE-400
Uncontrolled Resource Consumption
CVE-2024-1635
Assigner-Red Hat, Inc.
ShareView Details
Assigner-Red Hat, Inc.
CVSS Score-7.5||HIGH
EPSS-8.33% / 91.94%
||
7 Day CHG~0.00%
Published-19 Feb, 2024 | 21:23
Updated-14 Aug, 2025 | 15:10
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Undertow: out-of-memory error after several closed connections with wildfly-http-client protocol

A vulnerability was found in Undertow. This vulnerability impacts a server that supports the wildfly-http-client protocol. Whenever a malicious user opens and closes a connection with the HTTP port of the server and then closes the connection immediately, the server will end with both memory and open file limits exhausted at some point, depending on the amount of memory available. At HTTP upgrade to remoting, the WriteTimeoutStreamSinkConduit leaks connections if RemotingConnection is closed by Remoting ServerConnectionOpenListener. Because the remoting connection originates in Undertow as part of the HTTP upgrade, there is an external layer to the remoting connection. This connection is unaware of the outermost layer when closing the connection during the connection opening procedure. Hence, the Undertow WriteTimeoutStreamSinkConduit is not notified of the closed connection in this scenario. Because WriteTimeoutStreamSinkConduit creates a timeout task, the whole dependency tree leaks via that task, which is added to XNIO WorkerThread. So, the workerThread points to the Undertow conduit, which contains the connections and causes the leak.

Action-Not Available
Vendor-Red Hat, Inc.NetApp, Inc.
Product-openshift_container_platform_for_powerintegration_camel_for_spring_bootsingle_sign-ononcommand_workflow_automationactive_iq_unified_manageropenshift_container_platformfuseopenshift_container_platform_for_linuxonejboss_enterprise_application_platformRed Hat JBoss Enterprise Application Platform 8Red Hat JBoss Enterprise Application Platform 7.3 EUS for RHEL 7streams for Apache KafkaRed Hat Integration Camel Quarkus 2OpenShift ServerlessRed Hat build of Apicurio Registry 2Red Hat build of Apache Camel for Spring Boot 3Red Hat Single Sign-On 7.6 for RHEL 7Red Hat build of Apache Camel for Spring Boot 4RHEL-8 based Middleware ContainersRed Hat Build of KeycloakRed Hat Single Sign-On 7.6 for RHEL 9Red Hat JBoss Enterprise Application Platform 7.4 for RHEL 9Red Hat Single Sign-On 7.6 for RHEL 8Red Hat build of QuarkusRed Hat JBoss Enterprise Application Platform 7.4 for RHEL 8Red Hat Process Automation 7Red Hat JBoss Enterprise Application Platform 7Red Hat Fuse 7.13.0RHSSO 7.6.8Red Hat JBoss Enterprise Application Platform 7.4 on RHEL 7Red Hat build of Apache Camel 4.4.1 for Spring Boot 3.2Red Hat build of OptaPlanner 8Red Hat JBoss Data Grid 7Red Hat JBoss Enterprise Application Platform 7.1 EUS for RHEL 7Red Hat Integration Camel K 1Red Hat JBoss Fuse Service Works 6Red Hat Data Grid 8Red Hat build of Apache Camel 4 for Quarkus 3
CWE ID-CWE-400
Uncontrolled Resource Consumption
CVE-2024-1459
Assigner-Red Hat, Inc.
ShareView Details
Assigner-Red Hat, Inc.
CVSS Score-5.3||MEDIUM
EPSS-7.72% / 91.57%
||
7 Day CHG~0.00%
Published-12 Feb, 2024 | 20:30
Updated-14 Aug, 2025 | 16:19
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Undertow: directory traversal vulnerability

A path traversal vulnerability was found in Undertow. This issue may allow a remote attacker to append a specially-crafted sequence to an HTTP request for an application deployed to JBoss EAP, which may permit access to privileged or restricted files and directories.

Action-Not Available
Vendor-Red Hat, Inc.
Product-undertowRed Hat JBoss Fuse 6Red Hat JBoss Enterprise Application Platform 8Red Hat JBoss Enterprise Application Platform 7.4 for RHEL 9Red Hat Single Sign-On 7Red Hat Fuse 7Red Hat JBoss Enterprise Application Platform 7.4 for RHEL 8Red Hat Process Automation 7Red Hat JBoss Enterprise Application Platform 7Red Hat Decision Manager 7Red Hat JBoss Enterprise Application Platform 7.4 on RHEL 7Red Hat JBoss Data Grid 7Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 9Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 8Red Hat build of QuarkusRed Hat Data Grid 8
CWE ID-CWE-24
Path Traversal: '../filedir'
CVE-2023-4061
Assigner-Red Hat, Inc.
ShareView Details
Assigner-Red Hat, Inc.
CVSS Score-6.5||MEDIUM
EPSS-0.20% / 42.56%
||
7 Day CHG~0.00%
Published-08 Nov, 2023 | 00:56
Updated-14 Aug, 2025 | 16:08
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Wildfly-core: management user rbac permission allows unexpected reading of system-properties to an unauthorized actor

A flaw was found in wildfly-core. A management user could use the resolve-expression in the HAL Interface to read possible sensitive information from the Wildfly system. This issue could allow a malicious user to access the system and obtain possible sensitive information from the system.

Action-Not Available
Vendor-Red Hat, Inc.
Product-jboss_enterprise_application_platformenterprise_linuxwildfly_coreRed Hat JBoss Enterprise Application Platform 7.4 for RHEL 9Red Hat JBoss Enterprise Application Platform 8Red Hat JBoss Enterprise Application Platform 7.4 for RHEL 8EAP 7.4.13Red Hat JBoss Enterprise Application Platform 7.4 on RHEL 7
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor