Latest redhat process automation manager Vulnerabilities

Quarkus: http security policy bypass
redhat/openshift-serverless-clients<0:1.9.2-3.el8
Quarkus Quarkus<2.16.11
Quarkus Quarkus>=3.2.0<3.2.6
Quarkus Quarkus>=3.3.0<3.3.3
Redhat Build Of Optaplanner=8.0
Redhat Build Of Quarkus>=2.13.0<2.13.8
and 28 more
IBM pentesting results : <a href="https://docs.google.com/spreadsheets/d/1Iwbhk0lwGoNskLidsY5CXmc5MwKt5VfmJCaX21xyruo">https://docs.google.com/spreadsheets/d/1Iwbhk0lwGoNskLidsY5CXmc5MwKt5VfmJCaX21xyr...
Redhat Process Automation Manager<7.13.2
XML external entity injection(XXE) is a vulnerability that allows an attacker to interfere with an application's processing of XML data. This attack occurs when XML input containing a reference to an ...
Redhat Process Automation Manager<7.13.1
A vulnerability was found in business-central, as shipped in rhdm-7.5.1 and rhpam-7.5.1, where encoded passwords are stored in errai_security_context. The encoding used for storing the passwords is Ba...
Redhat Decision Manager=7.5.1
Redhat Process Automation Manager=7.5.1

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2024 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203