Monitor vulnerabilities like this one.
Sign up free to get alerted when software you use is affected.
Apache HTTP Server: Malicious Files Can Be Executed Remotely
MINI-4jcw-29m7-pv83
Summary
Apache's HTTP Server may allow an attacker to execute malicious files on a server, potentially leading to unauthorized access or data theft. This is because the server does not properly validate user input, allowing a potential attack vector. To protect against this, ensure that your Apache HTTP Server is updated to the latest version and that you validate user input carefully.
What to do
- Update keycloak-fips to version 26.5.5-r0.
- Update keycloak-fips-doc to version 26.5.5-r0.
- Update keycloak-fips-advanced-compat to version 26.5.5-r0.
Affected software
| Vendor | Product | Affected versions | Fix available |
|---|---|---|---|
| – | keycloak-fips | <= 26.5.5-r0 | 26.5.5-r0 |
| – | keycloak-fips-doc | <= 26.5.5-r0 | 26.5.5-r0 |
| – | keycloak-fips-advanced-compat | <= 26.5.5-r0 | 26.5.5-r0 |
Original title
MINI-4jcw-29m7-pv83
Published: 7 Mar 2026 · Updated: 13 Mar 2026 · First seen: 7 Mar 2026