Filtered by vendor Redhat Subscriptions
Filtered by product Apache-camel-spring-boot Subscriptions
Total 5 CVE
CVE Vendors Products Updated CVSS v3.1
CVE-2023-5685 1 Redhat 11 Apache-camel-spring-boot, Build Keycloak, Camel Spring Boot and 8 more 2024-09-18 7.5 High
A flaw was found in XNIO. The XNIO NotifierState that can cause a Stack Overflow Exception when the chain of notifier states becomes problematically large can lead to uncontrolled resource management and a possible denial of service (DoS).
CVE-2023-51074 2 Json-path, Redhat 5 Jayway Jsonpath, Amq Streams, Apache-camel-spring-boot and 2 more 2024-08-02 5.3 Medium
json-path v2.8.0 was discovered to contain a stack overflow via the Criteria.parse() method.
CVE-2023-35116 2 Fasterxml, Redhat 7 Jackson-databind, Amq Broker, Apache-camel-spring-boot and 4 more 2024-08-02 4.7 Medium
jackson-databind through 2.15.2 allows attackers to cause a denial of service or other unspecified impact via a crafted object that uses cyclic dependencies. NOTE: the vendor's perspective is that this is not a valid vulnerability report, because the steps of constructing a cyclic data structure and trying to serialize it cannot be achieved by an external attacker.
CVE-2023-2976 2 Google, Redhat 10 Guava, Amq Broker, Amq Streams and 7 more 2024-08-02 5.5 Medium
Use of Java's default temporary directory for file creation in `FileBackedOutputStream` in Google Guava versions 1.0 to 31.1 on Unix systems and Android Ice Cream Sandwich allows other users and apps on the machine with access to the default Java temporary directory to be able to access the files created by the class. Even though the security vulnerability is fixed in version 32.0.0, we recommend using version 32.0.1 as version 32.0.0 breaks some functionality under Windows.
CVE-2024-21733 2 Apache, Redhat 3 Tomcat, Apache-camel-spring-boot, Jboss Fuse 2024-08-01 5.3 Medium
Generation of Error Message Containing Sensitive Information vulnerability in Apache Tomcat.This issue affects Apache Tomcat: from 8.5.7 through 8.5.63, from 9.0.0-M11 through 9.0.43. Users are recommended to upgrade to version 8.5.64 onwards or 9.0.44 onwards, which contain a fix for the issue.