Search Results (Refine Search)
- Results Type: Overview
- Keyword (text search): cpe:2.3:a:quarkus:quarkus:2.14.3:*:*:*:*:*:*:*
- CPE Name Search: true
Vuln ID | Summary | CVSS Severity |
---|---|---|
CVE-2023-6394 |
A flaw was found in Quarkus. This issue occurs when receiving a request over websocket with no role-based permission specified on the GraphQL operation, Quarkus processes the request without authentication despite the endpoint being secured. This can allow an attacker to access information and functionality outside of normal granted API permissions. Published: December 08, 2023; 9:15:06 PM -0500 |
V3.1: 9.1 CRITICAL V2.0:(not available) |
CVE-2023-4853 |
A flaw was found in Quarkus where HTTP security policies are not sanitizing certain character permutations correctly when accepting requests, resulting in incorrect evaluation of permissions. This issue could allow an attacker to bypass the security policy altogether, resulting in unauthorized endpoint access and possibly a denial of service. Published: September 20, 2023; 6:15:14 AM -0400 |
V3.1: 8.1 HIGH V2.0:(not available) |
CVE-2023-0481 |
In RestEasy Reactive implementation of Quarkus the insecure File.createTempFile() is used in the FileBodyHandler class which creates temp files with insecure permissions that could be read by a local user. Published: February 24, 2023; 1:15:14 PM -0500 |
V3.1: 3.3 LOW V2.0:(not available) |