Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
redhat integration camel k - vulnerabilities and exploits
(subscribe to this query)
7.5
CVSSv3
CVE-2022-0084
A flaw was found in XNIO, specifically in the notifyReadClosed method. The issue revealed this method was logging a message to another expected end. This flaw allows an malicious user to send flawed requests to a server, possibly causing log contention-related performance concern...
Redhat Integration Camel K -
Redhat Integration Camel Quarkus -
Redhat Single Sign-on 7.0
Redhat Xnio
3.7
CVSSv3
CVE-2022-41862
In PostgreSQL, a modified, unauthenticated server can send an unterminated string during the establishment of Kerberos transport encryption. In certain conditions a server can cause a libpq client to over-read and report an error message containing uninitialized bytes.
Postgresql Postgresql
Fedoraproject Fedora 8
Redhat Integration Camel K -
Redhat Integration Camel Quarkus -
Redhat Integration Service Registry -
Redhat Enterprise Linux 8.0
5
CVSSv2
CVE-2020-14326
A vulnerability was found in RESTEasy, where RootNode incorrectly caches routes. This issue results in hash flooding, leading to slower requests with higher CPU time spent searching and adding the entry. This flaw allows an malicious user to cause a denial of service.
Redhat Integration Camel K -
Redhat Resteasy
Netapp Oncommand Insight -
7.5
CVSSv3
CVE-2022-4244
A flaw was found in codeplex-codehaus. A directory traversal attack (also known as path traversal) aims to access files and directories stored outside the intended folder. By manipulating files with "dot-dot-slash (../)" sequences and their variations or by using absolu...
Codehaus-plexus Plexus-utils
Redhat Integration Camel K
4.3
CVSSv3
CVE-2022-4245
A flaw was found in codehaus-plexus. The org.codehaus.plexus.util.xml.XmlWriterUtil#writeComment fails to sanitize comments for a --> sequence. This issue means that text contained in the command string could be interpreted as XML and allow for XML injection.
Codehaus-plexus Plexus-utils
Redhat Integration Camel K
7.5
CVSSv3
CVE-2022-2053
When a POST request comes through AJP and the request exceeds the max-post-size limit (maxEntitySize), Undertow's AjpServerRequestConduit implementation closes a connection without sending any response to the client/proxy. This behavior results in that a front-end proxy mark...
Redhat Integration Camel K -
Redhat Jboss Fuse 7.0.0
Redhat Undertow
Redhat Undertow 2.3.0
3.5
CVSSv2
CVE-2021-3536
A flaw was found in Wildfly in versions prior to 23.0.2.Final while creating a new role in domain mode via the admin console, it is possible to add a payload in the name field, leading to XSS. This affects Confidentiality and Integrity.
Redhat Build Of Quarkus -
Redhat Data Grid 8.0
Redhat Descision Manager 7.0
Redhat Integration Camel K -
Redhat Integration Camel Quarkus -
Redhat Integration Service Registry -
Redhat Jboss A-mq 7
Redhat Jboss Enterprise Application Platform 7.0
Redhat Wildfly
7.5
CVSSv3
CVE-2021-3690
A flaw was found in Undertow. A buffer leak on the incoming WebSocket PONG message may lead to memory exhaustion. This flaw allows an malicious user to cause a denial of service. The highest threat from this vulnerability is availability.
Redhat Fuse 1.0
Redhat Integration Camel K -
Redhat Integration Camel Quarkus -
Redhat Jboss Enterprise Application Platform -
Redhat Openshift Application Runtimes -
Redhat Single Sign-on -
Redhat Undertow
Redhat Jboss Enterprise Application Platform 7.3
Redhat Jboss Enterprise Application Platform 7.4
7.5
CVSSv3
CVE-2022-4492
The undertow client is not checking the server identity presented by the server certificate in https connections. This is a compulsory step (at least it should be performed by default) in https and in http/2. I would add it to any TLS client protocol.
Redhat Build Of Quarkus -
Redhat Integration Camel For Spring Boot -
Redhat Integration Camel K -
Redhat Integration Service Registry -
Redhat Jboss Enterprise Application Platform 7.0.0
Redhat Jboss Fuse 7.0.0
Redhat Migration Toolkit For Applications 6.0
Redhat Migration Toolkit For Runtimes -
Redhat Single Sign-on 7.0
Redhat Undertow 2.7.0
6.7
CVSSv3
CVE-2021-4178
A arbitrary code execution flaw was found in the Fabric 8 Kubernetes client affecting versions 5.0.0-beta-1 and above. Due to an improperly configured YAML parsing, this will allow a local and privileged malicious user to supply malicious YAML.
Redhat Fabric8-kubernetes
Redhat Fabric8-kubernetes 5.0.0
Redhat Fabric8-kubernetes 5.8.0
Redhat A-mq Streams 2.0.1
Redhat Build Of Quarkus 2.2.5
Redhat Descision Manager 7.0
Redhat Fuse 7.11
Redhat Integration Camel K -
Redhat Integration Camel Quarkus 2.2.1
Redhat Openshift Application Runtimes -
Redhat Process Automation 7.0
Preferred Score:
CVSSv2
CVSSv2
CVSSv3
CVSSv4
EPSS
VMScore
Recommendations:
apache atlas
wp html page sitemap
inject
everest forms
CVE-2025-25356
CVE-2024-47264
cross-site scripting
CVE-2025-0837
CVE-2025-25286
*
CVE-2024-12754
arbitrary code
CVE-2025-24472
Home
/
Search Results
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
NEXT »