📦 Integration Camel K

by Redhat

🔍 What is Integration Camel K?

Description coming soon...

🛡️ Security Overview

Click on a severity to filter vulnerabilities

⚠️ Known Vulnerabilities

CVE-2023-44487

HIGH CVSS 7.5 Oct 10, 2023

CVE-2023-44487 is an HTTP/2 protocol vulnerability that allows attackers to cause denial of service by rapidly resetting streams, consuming server resources. This affects any system using HTTP/2, incl...

CVE-2023-4853

HIGH CVSS 8.1 Sep 20, 2023

This vulnerability in Quarkus allows attackers to bypass HTTP security policies by using specially crafted character permutations in requests. Affected systems could experience unauthorized access to ...

CVE-2023-1108

HIGH CVSS 7.5 Sep 14, 2023

CVE-2023-1108 is a denial-of-service vulnerability in Undertow's SSL/TLS implementation where an infinite loop in the handshake process can crash the server. This affects any system running vulnerable...

CVE-2022-4492

HIGH CVSS 7.5 Feb 23, 2023

CVE-2022-4492 is a server certificate validation bypass vulnerability in Undertow HTTP client. It allows attackers to perform man-in-the-middle attacks by presenting invalid certificates that should b...

CVE-2021-4104

HIGH CVSS 7.5 Dec 14, 2021

CVE-2021-4104 is a deserialization vulnerability in Log4j 1.2's JMSAppender that allows remote code execution when attackers can modify Log4j configuration files. This affects systems running Log4j 1....

CVE-2020-14326

HIGH CVSS 7.5 Jun 2, 2021

CVE-2020-14326 is a denial-of-service vulnerability in RESTEasy's RootNode caching mechanism that allows attackers to cause hash flooding, resulting in slower request processing and increased CPU usag...

CVE-2021-20218

HIGH CVSS 7.4 Mar 16, 2021

This vulnerability in fabric8 kubernetes-client allows malicious pods/containers to exploit the copy command to extract files outside the intended working directory path. Applications using the vulner...