Filter

maven/com.fasterxml.jackson.core:jackson-databindInfoleak

First published (updated )

redhat jboss enterprise application platformUndertow DEBUG log for io.undertow.request.security if enabled leaks credentials to log files with l…

First published (updated )

redhat/eap7-apache-commons-codecA vulnerability was found in Undertow web server. An information exposure of plain text credentials …

First published (updated )

redhat/eap7-activemq-artemisIt was found that the OpenSSL security provider does not honor TLS version in 'enabled-protocols' va…

First published (updated )

redhat/eap7-glassfish-jsfA vulnerability was found in Infinispan before version 10.0.0 Final. The invokeAccessibly method fro…

8.8
First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

redhat/gzipTukaani XZ Utils xzgrep Argument Injection Remote Code Execution Vulnerability

8.8
First published (updated )

redhat/eap7-apache-cxfInput Validation, Infoleak

8.1
First published (updated )

redhat/log4jDeserialization of untrusted data in JMSAppender in Apache Log4j 1.2

8.1
First published (updated )

maven/io.netty:netty-handlerhandler/ssl/OpenSslEngine.java in Netty 4.0.x before 4.0.37.Final and 4.1.x before 4.1.1.Final allow…

7.8
First published (updated )

redhat/eap7-activemq-artemisA memory leak flaw was found in WildFly OpenSSL in versions prior to 1.1.3.Final, where it removes a…

7.5
First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

redhat/eap7-apache-cxfA vulnerability was found in the Undertow HTTP server listening on HTTPS. An attacker can target the…

7.5
First published (updated )

Apache Tomcat- Rapid Reset HTTP/2 vulnerability

First published (updated )

redhat jboss enterprise application platformAn information leak issue was found in undertow where web apps may have their directory structures p…

7.5
First published (updated )

maven/org.infinispan:infinispan-cachestore-jdbcInfinispan: credentials returned from configuration as clear text

7.2
First published (updated )

redhat/eap7-activemq-artemisA memory leak flaw was found in WildFly in all versions up to 21.0.0.Final, where host-controller tr…

First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

maven/org.infinispan:infinispan-server-restInfinispan: non-admins should not be able to get cache config via rest api

First published (updated )

maven/org.infinispan.protostream:protostreamInfinispan: circular reference on marshalling leads to dos

First published (updated )

maven/org.infinispan:infinispan-server-restInfispan: rest bulk ops don't check permissions

First published (updated )

Oracle Primavera P6 Enterprise Project Portfolio ManagementXSS

First published (updated )

redhat jboss enterprise application platformSQL Injection

First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

redhat XNIOA flaw was found in xnio. A file descriptor leak caused by growing amounts of NIO Selector file, han…

First published (updated )

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203