Tag
Red Hat Undertow Multiple Vulnerabilities Allow Security Bypass
2 rules 3 TTPsAn anonymous remote attacker can exploit multiple vulnerabilities in Red Hat Undertow to bypass security measures, manipulate data, and disclose sensitive information.
Undertow Request Smuggling Vulnerability (CVE-2026-28368)
2 rules 1 TTPCVE-2026-28368 is a vulnerability in Undertow that allows a remote attacker to construct specially crafted requests, leading to request smuggling attacks and potential bypass of security controls, resulting in unauthorized resource access.
Undertow HTTP Request Smuggling Vulnerability (CVE-2026-28367)
2 rules 1 TTPA remote attacker can exploit CVE-2026-28367 in Undertow by sending '\r\r\r' as a header block terminator, leading to request smuggling on vulnerable proxy servers.
Red Hat JBoss Enterprise Application Platform Multiple Vulnerabilities
2 rules 3 TTPsAn anonymous remote attacker can exploit multiple vulnerabilities in Red Hat JBoss Enterprise Application Platform to cause a denial-of-service condition, manipulate data, and conduct further attacks such as cache poisoning and session hijacking.