Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
redhat wildfly elytron vulnerabilities and exploits
(subscribe to this query)
8.8
CVSSv3
CVE-2019-3894
It exists that the ElytronManagedThread in Wildfly's Elytron subsystem in versions from 11 to 16 stores a SecurityIdentity to run the thread as. These threads do not necessarily terminate if the keep alive time has not expired. This could allow a shared thread to use the wro...
Redhat Wildfly
Redhat Jboss Enterprise Application Platform 7.0.0
7.8
CVSSv3
CVE-2021-3717
A flaw was found in Wildfly. An incorrect JBOSS_LOCAL_USER challenge location when using the elytron configuration may lead to JBOSS_LOCAL_USER access to all users on the machine. The highest threat from this vulnerability is to confidentiality, integrity, and availability. This ...
Redhat Single Sign-on -
Redhat Jboss Enterprise Application Platform -
Redhat Wildfly Core
Redhat Jboss Enterprise Application Platform 7.4
Redhat Jboss Enterprise Application Platform 7.3
7.5
CVSSv3
CVE-2020-10714
A flaw was found in WildFly Elytron version 1.11.3.Final and before. When using WildFly Elytron FORM authentication with a session ID in the URL, an attacker could perform a session fixation attack. The highest threat from this vulnerability is to data confidentiality and integri...
Redhat Wildfly Elytron
Redhat Jboss Fuse 7.0.0
Redhat Process Automation 7.0
Redhat Descision Manager 7.0
Redhat Codeready Studio 12.0
Netapp Oncommand Insight -
7.5
CVSSv3
CVE-2020-1748
A flaw was found in all supported versions before wildfly-elytron-1.6.8.Final-redhat-00001, where the WildFlySecurityManager checks were bypassed when using custom security managers, resulting in an improper authorization. This flaw leads to information exposure by unauthenticate...
Redhat Wildfly Elytron
Redhat Decision Manager 7.0
Redhat Process Automation 7.0
7.4
CVSSv3
CVE-2022-3143
wildfly-elytron: possible timing attacks via use of unsafe comparator. A flaw was found in Wildfly-elytron. Wildfly-elytron uses java.util.Arrays.equals in several places, which is unsafe and vulnerable to timing attacks. To compare values securely, use java.security.MessageDiges...
Redhat Wildfly Elytron 1.15.15
Redhat Jboss Enterprise Application Platform 7.0.0
5.3
CVSSv3
CVE-2022-0866
This is a concurrency issue that can result in the wrong caller principal being returned from the session context of an EJB that is configured with a RunAs principal. In particular, the org.jboss.as.ejb3.component.EJBComponent class has an incomingRunAsIdentity field. This field ...
Redhat Openstack Platform 13.0
Redhat Wildfly
Redhat Jboss Enterprise Application Platform
5.3
CVSSv3
CVE-2021-3642
A flaw was found in Wildfly Elytron in versions before 1.10.14.Final, before 1.15.5.Final and before 1.16.1.Final where ScramServer may be susceptible to Timing Attack if enabled. The highest threat of this vulnerability is confidentiality.
Redhat Wildfly Elytron
Redhat Jboss Enterprise Application Platform 7.0.0
Redhat Jboss Fuse 7.0.0
Redhat Process Automation 7.0
Redhat Openshift Application Runtimes -
Redhat Descision Manager 7.0
Redhat Codeready Studio 12.0
Redhat Data Grid 8.0
Redhat Build Of Quarkus -
Redhat Integration Camel K -
Redhat Jboss Enterprise Application Platform Expansion Pack -
Redhat Integration Camel Quarkus
Quarkus Quarkus
4.2
CVSSv3
CVE-2020-1732
A flaw was found in Soteria prior to 1.0.1, in a way that multiple requests occurring concurrently causing security identity corruption across concurrent threads when using EE Security with WildFly Elytron which can lead to the possibility of being handled using the identity from...
Redhat Soteria
Redhat Jboss Enterprise Application Platform 7.0.0
Redhat Openshift Application Runtimes -
Redhat Jboss Enterprise Application Platform Continuous Delivery -
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
type confusion
IMAP
CVE-2024-36103
CVE-2024-28995
CVE-2024-37325
CVE-2024-30078
CVE-2024-30082
SQL injection
CVE-2024-30052
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started