Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2024-10234

Summary
Assigner-redhat
Assigner Org ID-53f830b8-0a3f-465b-8143-3b8a9948e749
Published At-22 Oct, 2024 | 13:17
Updated At-23 Jul, 2025 | 18:24
Rejected At-
Credits

Wildfly: wildfly vulnerable to cross-site scripting (xss)

A vulnerability was found in Wildfly, where a user may perform Cross-site scripting in the Wildfly deployment system. This flaw allows an attacker or insider to execute a deployment with a malicious payload, which could trigger undesired behavior against the server.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:redhat
Assigner Org ID:53f830b8-0a3f-465b-8143-3b8a9948e749
Published At:22 Oct, 2024 | 13:17
Updated At:23 Jul, 2025 | 18:24
Rejected At:
▼CVE Numbering Authority (CNA)
Wildfly: wildfly vulnerable to cross-site scripting (xss)

A vulnerability was found in Wildfly, where a user may perform Cross-site scripting in the Wildfly deployment system. This flaw allows an attacker or insider to execute a deployment with a malicious payload, which could trigger undesired behavior against the server.

Affected Products
Collection URL
https://github.com/wildfly/wildfly
Package Name
wildfly
Default Status
unaffected
Versions
Affected
  • From 35.0.0 before 35.0.0 (semver)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 7.4.23
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
org.wildfly.core/wildfly-core-management-subsystem
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:7.4::el7
Default Status
unaffected
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 7.4 for RHEL 8
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap7-activemq-artemis
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:7.4::el8
Default Status
affected
Versions
Unaffected
  • From 0:2.16.0-21.redhat_00055.1.el8eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 7.4 for RHEL 8
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap7-apache-cxf
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:7.4::el8
Default Status
affected
Versions
Unaffected
  • From 0:3.5.10-1.redhat_00001.1.el8eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 7.4 for RHEL 8
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap7-artemis-native
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:7.4::el8
Default Status
affected
Versions
Unaffected
  • From 1:1.0.2-5.redhat_00004.1.el8eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 7.4 for RHEL 8
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap7-elytron-web
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:7.4::el8
Default Status
affected
Versions
Unaffected
  • From 0:1.9.6-1.Final_redhat_00001.1.el8eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 7.4 for RHEL 8
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap7-glassfish-jsf
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:7.4::el8
Default Status
affected
Versions
Unaffected
  • From 0:2.3.14-9.SP10_redhat_00001.1.el8eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 7.4 for RHEL 8
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap7-hal-console
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:7.4::el8
Default Status
affected
Versions
Unaffected
  • From 0:3.3.27-1.Final_redhat_00001.1.el8eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 7.4 for RHEL 8
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap7-hibernate-validator
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:7.4::el8
Default Status
affected
Versions
Unaffected
  • From 0:6.0.23-3.SP2_redhat_00001.1.el8eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 7.4 for RHEL 8
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap7-ironjacamar
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:7.4::el8
Default Status
affected
Versions
Unaffected
  • From 0:1.5.21-1.Final_redhat_00001.1.el8eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 7.4 for RHEL 8
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap7-jboss-server-migration
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:7.4::el8
Default Status
affected
Versions
Unaffected
  • From 0:1.10.0-42.Final_redhat_00042.1.el8eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 7.4 for RHEL 8
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap7-jbossws-cxf
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:7.4::el8
Default Status
affected
Versions
Unaffected
  • From 0:5.4.15-1.Final_redhat_00001.1.el8eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 7.4 for RHEL 8
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap7-wildfly
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:7.4::el8
Default Status
affected
Versions
Unaffected
  • From 0:7.4.23-3.GA_redhat_00002.1.el8eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 7.4 for RHEL 8
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap7-wildfly-elytron
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:7.4::el8
Default Status
affected
Versions
Unaffected
  • From 0:1.15.26-1.Final_redhat_00001.1.el8eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 7.4 for RHEL 9
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap7-activemq-artemis
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:7.4::el9
Default Status
affected
Versions
Unaffected
  • From 0:2.16.0-21.redhat_00055.1.el9eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 7.4 for RHEL 9
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap7-apache-cxf
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:7.4::el9
Default Status
affected
Versions
Unaffected
  • From 0:3.5.10-1.redhat_00001.1.el9eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 7.4 for RHEL 9
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap7-artemis-native
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:7.4::el9
Default Status
affected
Versions
Unaffected
  • From 1:1.0.2-5.redhat_00004.1.el9eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 7.4 for RHEL 9
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap7-elytron-web
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:7.4::el9
Default Status
affected
Versions
Unaffected
  • From 0:1.9.6-1.Final_redhat_00001.1.el9eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 7.4 for RHEL 9
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap7-glassfish-jsf
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:7.4::el9
Default Status
affected
Versions
Unaffected
  • From 0:2.3.14-9.SP10_redhat_00001.1.el9eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 7.4 for RHEL 9
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap7-hal-console
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:7.4::el9
Default Status
affected
Versions
Unaffected
  • From 0:3.3.27-1.Final_redhat_00001.1.el9eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 7.4 for RHEL 9
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap7-hibernate-validator
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:7.4::el9
Default Status
affected
Versions
Unaffected
  • From 0:6.0.23-3.SP2_redhat_00001.1.el9eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 7.4 for RHEL 9
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap7-ironjacamar
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:7.4::el9
Default Status
affected
Versions
Unaffected
  • From 0:1.5.21-1.Final_redhat_00001.1.el9eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 7.4 for RHEL 9
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap7-jboss-server-migration
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:7.4::el9
Default Status
affected
Versions
Unaffected
  • From 0:1.10.0-42.Final_redhat_00042.1.el9eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 7.4 for RHEL 9
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap7-jbossws-cxf
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:7.4::el9
Default Status
affected
Versions
Unaffected
  • From 0:5.4.15-1.Final_redhat_00001.1.el9eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 7.4 for RHEL 9
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap7-wildfly
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:7.4::el9
Default Status
affected
Versions
Unaffected
  • From 0:7.4.23-3.GA_redhat_00002.1.el9eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 7.4 for RHEL 9
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap7-wildfly-elytron
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:7.4::el9
Default Status
affected
Versions
Unaffected
  • From 0:1.15.26-1.Final_redhat_00001.1.el9eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 7.4 on RHEL 7
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap7-activemq-artemis
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:7.4::el7
Default Status
affected
Versions
Unaffected
  • From 0:2.16.0-21.redhat_00055.1.el7eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 7.4 on RHEL 7
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap7-apache-cxf
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:7.4::el7
Default Status
affected
Versions
Unaffected
  • From 0:3.5.10-1.redhat_00001.1.el7eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 7.4 on RHEL 7
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap7-artemis-native
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:7.4::el7
Default Status
affected
Versions
Unaffected
  • From 1:1.0.2-5.redhat_00004.1.el7eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 7.4 on RHEL 7
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap7-elytron-web
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:7.4::el7
Default Status
affected
Versions
Unaffected
  • From 0:1.9.6-1.Final_redhat_00001.1.el7eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 7.4 on RHEL 7
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap7-glassfish-jsf
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:7.4::el7
Default Status
affected
Versions
Unaffected
  • From 0:2.3.14-9.SP10_redhat_00001.1.el7eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 7.4 on RHEL 7
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap7-hal-console
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:7.4::el7
Default Status
affected
Versions
Unaffected
  • From 0:3.3.27-1.Final_redhat_00001.1.el7eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 7.4 on RHEL 7
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap7-hibernate-validator
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:7.4::el7
Default Status
affected
Versions
Unaffected
  • From 0:6.0.23-3.SP2_redhat_00001.1.el7eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 7.4 on RHEL 7
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap7-ironjacamar
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:7.4::el7
Default Status
affected
Versions
Unaffected
  • From 0:1.5.21-1.Final_redhat_00001.1.el7eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 7.4 on RHEL 7
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap7-jboss-server-migration
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:7.4::el7
Default Status
affected
Versions
Unaffected
  • From 0:1.10.0-42.Final_redhat_00042.1.el7eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 7.4 on RHEL 7
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap7-jbossws-cxf
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:7.4::el7
Default Status
affected
Versions
Unaffected
  • From 0:5.4.15-1.Final_redhat_00001.1.el7eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 7.4 on RHEL 7
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap7-wildfly
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:7.4::el7
Default Status
affected
Versions
Unaffected
  • From 0:7.4.23-3.GA_redhat_00002.1.el7eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 7.4 on RHEL 7
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap7-wildfly-elytron
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:7.4::el7
Default Status
affected
Versions
Unaffected
  • From 0:1.15.26-1.Final_redhat_00001.1.el7eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
org.wildfly.core/wildfly-core-management-subsystem
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0
Default Status
unaffected
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 8
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-artemis-wildfly-integration
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el8
Default Status
affected
Versions
Unaffected
  • From 0:2.0.3-1.Final_redhat_00001.1.el8eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 8
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-azure-storage
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el8
Default Status
affected
Versions
Unaffected
  • From 0:8.6.6-5.redhat_00001.1.el8eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 8
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-eap-product-conf-parent
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el8
Default Status
affected
Versions
Unaffected
  • From 0:800.6.0-2.GA_redhat_00002.1.el8eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 8
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-gnu-getopt
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el8
Default Status
affected
Versions
Unaffected
  • From 0:1.0.13-2.redhat_5.1.el8eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 8
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-h2database
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el8
Default Status
affected
Versions
Unaffected
  • From 0:2.1.214-2.redhat_00001.1.el8eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 8
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-hal-console
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el8
Default Status
affected
Versions
Unaffected
  • From 0:3.6.23-1.Final_redhat_00001.1.el8eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 8
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-hibernate-commons-annotations
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el8
Default Status
affected
Versions
Unaffected
  • From 0:6.0.6-2.Final_redhat_00001.1.el8eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 8
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-jackson-coreutils
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el8
Default Status
affected
Versions
Unaffected
  • From 0:1.8.0-2.redhat_00002.1.el8eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 8
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-jakarta-authentication-api
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el8
Default Status
affected
Versions
Unaffected
  • From 0:3.0.0-3.redhat_00001.1.el8eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 8
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-jakarta-authorization-api
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el8
Default Status
affected
Versions
Unaffected
  • From 0:2.1.0-3.redhat_00001.1.el8eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 8
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-jakarta-enterprise-concurrent
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el8
Default Status
affected
Versions
Unaffected
  • From 0:3.0.0-4.redhat_00001.1.el8eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 8
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-jakarta-enterprise-concurrent-api
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el8
Default Status
affected
Versions
Unaffected
  • From 0:3.0.2-2.redhat_00001.1.el8eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 8
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-jakarta-enterprise-lang-model
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el8
Default Status
affected
Versions
Unaffected
  • From 0:4.0.1-2.redhat_00001.1.el8eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 8
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-jakarta-security-enterprise-api
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el8
Default Status
affected
Versions
Unaffected
  • From 0:3.0.0-2.redhat_00001.1.el8eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 8
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-jakarta-servlet-jsp-api
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el8
Default Status
affected
Versions
Unaffected
  • From 0:3.1.0-3.redhat_00001.1.el8eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 8
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-javaewah
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el8
Default Status
affected
Versions
Unaffected
  • From 0:1.1.13-2.redhat_00001.1.el8eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 8
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-jboss-aesh
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el8
Default Status
affected
Versions
Unaffected
  • From 0:2.4.0-2.redhat_00001.1.el8eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 8
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-jboss-common-beans
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el8
Default Status
affected
Versions
Unaffected
  • From 0:2.0.1-2.Final_redhat_00001.1.el8eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 8
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-jboss-dmr
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el8
Default Status
affected
Versions
Unaffected
  • From 0:1.6.1-2.Final_redhat_00001.1.el8eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 8
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-jboss-ejb3-ext-api
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el8
Default Status
affected
Versions
Unaffected
  • From 0:2.3.0-2.Final_redhat_00001.1.el8eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 8
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-jboss-el-api_5.0_spec
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el8
Default Status
affected
Versions
Unaffected
  • From 0:4.0.1-2.Final_redhat_00001.1.el8eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 8
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-jboss-genericjms
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el8
Default Status
affected
Versions
Unaffected
  • From 0:3.0.0-3.Final_redhat_00001.1.el8eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 8
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-jboss-iiop-client
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el8
Default Status
affected
Versions
Unaffected
  • From 0:2.0.1-2.Final_redhat_00001.1.el8eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 8
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-jboss-invocation
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el8
Default Status
affected
Versions
Unaffected
  • From 0:2.0.0-2.Final_redhat_00001.1.el8eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 8
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-jboss-logmanager
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el8
Default Status
affected
Versions
Unaffected
  • From 0:2.1.19-2.Final_redhat_00001.1.el8eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 8
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-jboss-msc
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el8
Default Status
affected
Versions
Unaffected
  • From 0:1.5.1-2.Final_redhat_00001.1.el8eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 8
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-jboss-remoting-jmx
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el8
Default Status
affected
Versions
Unaffected
  • From 0:3.0.4-2.Final_redhat_00001.1.el8eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 8
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-jboss-stdio
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el8
Default Status
affected
Versions
Unaffected
  • From 0:1.1.0-2.Final_redhat_00001.1.el8eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 8
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-jboss-threads
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el8
Default Status
affected
Versions
Unaffected
  • From 0:2.4.0-3.Final_redhat_00001.1.el8eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 8
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-jboss-transaction-spi
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el8
Default Status
affected
Versions
Unaffected
  • From 0:8.0.0-3.Final_redhat_00001.1.el8eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 8
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-jboss-vfs
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el8
Default Status
affected
Versions
Unaffected
  • From 0:3.3.0-2.Final_redhat_00001.1.el8eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 8
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-jbossws-api
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el8
Default Status
affected
Versions
Unaffected
  • From 0:3.0.0-2.Final_redhat_00001.1.el8eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 8
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-jbossws-common
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el8
Default Status
affected
Versions
Unaffected
  • From 0:5.1.0-1.Final_redhat_00001.1.el8eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 8
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-jbossws-cxf
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el8
Default Status
affected
Versions
Unaffected
  • From 0:7.3.1-1.Final_redhat_00001.1.el8eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 8
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-jbossws-spi
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el8
Default Status
affected
Versions
Unaffected
  • From 0:5.0.0-2.Final_redhat_00001.1.el8eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 8
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-jcip-annotations
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el8
Default Status
affected
Versions
Unaffected
  • From 0:1.0.0-2.redhat_8.1.el8eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 8
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-json-patch
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el8
Default Status
affected
Versions
Unaffected
  • From 0:1.9.0-2.redhat_00002.1.el8eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 8
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-jul-to-slf4j-stub
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el8
Default Status
affected
Versions
Unaffected
  • From 0:1.0.1-2.Final_redhat_3.1.el8eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 8
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-reactivex-rxjava2
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el8
Default Status
affected
Versions
Unaffected
  • From 0:2.2.21-2.redhat_00001.2.el8eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 8
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-slf4j-jboss-logmanager
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el8
Default Status
affected
Versions
Unaffected
  • From 0:2.0.1-2.Final_redhat_00001.1.el8eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 8
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-staxmapper
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el8
Default Status
affected
Versions
Unaffected
  • From 0:1.4.0-2.Final_redhat_00001.1.el8eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 8
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-wildfly
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el8
Default Status
affected
Versions
Unaffected
  • From 0:8.0.6-5.GA_redhat_00004.1.el8eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 8
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-wildfly-common
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el8
Default Status
affected
Versions
Unaffected
  • From 0:1.6.0-4.Final_redhat_00001.1.el8eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 8
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-woodstox-core
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el8
Default Status
affected
Versions
Unaffected
  • From 0:6.4.0-3.redhat_00003.1.el8eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 8
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-xml-commons-resolver
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el8
Default Status
affected
Versions
Unaffected
  • From 0:1.2.0-3.redhat_12.1.el8eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 9
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-artemis-wildfly-integration
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el9
Default Status
affected
Versions
Unaffected
  • From 0:2.0.3-1.Final_redhat_00001.1.el9eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 9
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-azure-storage
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el9
Default Status
affected
Versions
Unaffected
  • From 0:8.6.6-5.redhat_00001.1.el9eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 9
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-eap-product-conf-parent
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el9
Default Status
affected
Versions
Unaffected
  • From 0:800.6.0-2.GA_redhat_00002.1.el9eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 9
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-gnu-getopt
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el9
Default Status
affected
Versions
Unaffected
  • From 0:1.0.13-2.redhat_5.1.el9eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 9
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-h2database
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el9
Default Status
affected
Versions
Unaffected
  • From 0:2.1.214-2.redhat_00001.1.el9eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 9
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-hal-console
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el9
Default Status
affected
Versions
Unaffected
  • From 0:3.6.23-1.Final_redhat_00001.1.el9eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 9
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-hibernate-commons-annotations
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el9
Default Status
affected
Versions
Unaffected
  • From 0:6.0.6-2.Final_redhat_00001.1.el9eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 9
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-jackson-coreutils
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el9
Default Status
affected
Versions
Unaffected
  • From 0:1.8.0-2.redhat_00002.1.el9eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 9
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-jakarta-authentication-api
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el9
Default Status
affected
Versions
Unaffected
  • From 0:3.0.0-3.redhat_00001.1.el9eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 9
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-jakarta-authorization-api
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el9
Default Status
affected
Versions
Unaffected
  • From 0:2.1.0-3.redhat_00001.1.el9eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 9
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-jakarta-enterprise-concurrent
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el9
Default Status
affected
Versions
Unaffected
  • From 0:3.0.0-4.redhat_00001.1.el9eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 9
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-jakarta-enterprise-concurrent-api
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el9
Default Status
affected
Versions
Unaffected
  • From 0:3.0.2-2.redhat_00001.1.el9eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 9
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-jakarta-enterprise-lang-model
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el9
Default Status
affected
Versions
Unaffected
  • From 0:4.0.1-2.redhat_00001.1.el9eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 9
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-jakarta-security-enterprise-api
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el9
Default Status
affected
Versions
Unaffected
  • From 0:3.0.0-2.redhat_00001.1.el9eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 9
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-jakarta-servlet-jsp-api
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el9
Default Status
affected
Versions
Unaffected
  • From 0:3.1.0-3.redhat_00001.1.el9eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 9
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-javaewah
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el9
Default Status
affected
Versions
Unaffected
  • From 0:1.1.13-2.redhat_00001.1.el9eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 9
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-jboss-aesh
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el9
Default Status
affected
Versions
Unaffected
  • From 0:2.4.0-2.redhat_00001.1.el9eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 9
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-jboss-common-beans
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el9
Default Status
affected
Versions
Unaffected
  • From 0:2.0.1-2.Final_redhat_00001.1.el9eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 9
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-jboss-dmr
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el9
Default Status
affected
Versions
Unaffected
  • From 0:1.6.1-2.Final_redhat_00001.1.el9eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 9
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-jboss-ejb3-ext-api
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el9
Default Status
affected
Versions
Unaffected
  • From 0:2.3.0-2.Final_redhat_00001.1.el9eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 9
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-jboss-el-api_5.0_spec
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el9
Default Status
affected
Versions
Unaffected
  • From 0:4.0.1-2.Final_redhat_00001.1.el9eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 9
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-jboss-genericjms
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el9
Default Status
affected
Versions
Unaffected
  • From 0:3.0.0-3.Final_redhat_00001.1.el9eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 9
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-jboss-iiop-client
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el9
Default Status
affected
Versions
Unaffected
  • From 0:2.0.1-2.Final_redhat_00001.1.el9eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 9
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-jboss-invocation
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el9
Default Status
affected
Versions
Unaffected
  • From 0:2.0.0-2.Final_redhat_00001.1.el9eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 9
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-jboss-logmanager
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el9
Default Status
affected
Versions
Unaffected
  • From 0:2.1.19-2.Final_redhat_00001.1.el9eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 9
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-jboss-msc
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el9
Default Status
affected
Versions
Unaffected
  • From 0:1.5.1-2.Final_redhat_00001.1.el9eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 9
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-jboss-remoting-jmx
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el9
Default Status
affected
Versions
Unaffected
  • From 0:3.0.4-2.Final_redhat_00001.1.el9eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 9
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-jboss-stdio
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el9
Default Status
affected
Versions
Unaffected
  • From 0:1.1.0-2.Final_redhat_00001.1.el9eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 9
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-jboss-threads
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el9
Default Status
affected
Versions
Unaffected
  • From 0:2.4.0-3.Final_redhat_00001.1.el9eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 9
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-jboss-transaction-spi
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el9
Default Status
affected
Versions
Unaffected
  • From 0:8.0.0-3.Final_redhat_00001.1.el9eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 9
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-jboss-vfs
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el9
Default Status
affected
Versions
Unaffected
  • From 0:3.3.0-2.Final_redhat_00001.1.el9eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 9
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-jbossws-api
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el9
Default Status
affected
Versions
Unaffected
  • From 0:3.0.0-2.Final_redhat_00001.1.el9eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 9
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-jbossws-common
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el9
Default Status
affected
Versions
Unaffected
  • From 0:5.1.0-1.Final_redhat_00001.1.el9eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 9
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-jbossws-cxf
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el9
Default Status
affected
Versions
Unaffected
  • From 0:7.3.1-1.Final_redhat_00001.1.el9eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 9
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-jbossws-spi
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el9
Default Status
affected
Versions
Unaffected
  • From 0:5.0.0-2.Final_redhat_00001.1.el9eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 9
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-jcip-annotations
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el9
Default Status
affected
Versions
Unaffected
  • From 0:1.0.0-2.redhat_8.1.el9eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 9
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-json-patch
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el9
Default Status
affected
Versions
Unaffected
  • From 0:1.9.0-2.redhat_00002.1.el9eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 9
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-jul-to-slf4j-stub
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el9
Default Status
affected
Versions
Unaffected
  • From 0:1.0.1-2.Final_redhat_3.1.el9eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 9
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-reactivex-rxjava2
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el9
Default Status
affected
Versions
Unaffected
  • From 0:2.2.21-2.redhat_00001.2.el9eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 9
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-slf4j-jboss-logmanager
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el9
Default Status
affected
Versions
Unaffected
  • From 0:2.0.1-2.Final_redhat_00001.1.el9eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 9
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-staxmapper
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el9
Default Status
affected
Versions
Unaffected
  • From 0:1.4.0-2.Final_redhat_00001.1.el9eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 9
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-wildfly
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el9
Default Status
affected
Versions
Unaffected
  • From 0:8.0.6-5.GA_redhat_00004.1.el9eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 9
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-wildfly-common
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el9
Default Status
affected
Versions
Unaffected
  • From 0:1.6.0-4.Final_redhat_00001.1.el9eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 9
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-woodstox-core
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el9
Default Status
affected
Versions
Unaffected
  • From 0:6.4.0-3.redhat_00003.1.el9eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 9
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-xml-commons-resolver
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el9
Default Status
affected
Versions
Unaffected
  • From 0:1.2.0-3.redhat_12.1.el9eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat Single Sign-On 7
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
org.wildfly.core/wildfly-core-management-client
CPEs
  • cpe:/a:redhat:red_hat_single_sign_on:7.6
Default Status
unaffected
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat Single Sign-On 7.6 for RHEL 7
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
rh-sso7-keycloak
CPEs
  • cpe:/a:redhat:red_hat_single_sign_on:7.6::el7
Default Status
affected
Versions
Unaffected
  • From 0:18.0.19-1.redhat_00002.1.el7sso before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat Single Sign-On 7.6 for RHEL 8
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
rh-sso7-keycloak
CPEs
  • cpe:/a:redhat:red_hat_single_sign_on:7.6::el8
Default Status
affected
Versions
Unaffected
  • From 0:18.0.19-1.redhat_00002.1.el8sso before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat Single Sign-On 7.6 for RHEL 9
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
rh-sso7-keycloak
CPEs
  • cpe:/a:redhat:red_hat_single_sign_on:7.6::el9
Default Status
affected
Versions
Unaffected
  • From 0:18.0.19-1.redhat_00002.1.el9sso before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
RHEL-8 based Middleware Containers
Collection URL
https://catalog.redhat.com/software/containers/
Package Name
rh-sso-7/sso76-openshift-rhel8
CPEs
  • cpe:/a:redhat:rhosemc:1.0::el8
Default Status
affected
Versions
Unaffected
  • From 7.6-67 before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat Build of Keycloak
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
org.wildfly.core/wildfly-core-management-subsystem
CPEs
  • cpe:/a:redhat:build_keycloak:
Default Status
affected
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat Fuse 7
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
org.wildfly.core/wildfly-core-management-subsystem
CPEs
  • cpe:/a:redhat:jboss_fuse:7
Default Status
unknown
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Data Grid 7
Collection URL
https://access.redhat.com/jbossnetwork/restricted/listSoftware.html
Package Name
org.wildfly.core/wildfly-core-management-subsystem
CPEs
  • cpe:/a:redhat:jboss_data_grid:7
Default Status
unknown
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform Expansion Pack
Collection URL
https://access.redhat.com/jbossnetwork/restricted/listSoftware.html
Package Name
org.wildfly.core/wildfly-core-management-subsystem
CPEs
  • cpe:/a:redhat:jbosseapxp
Default Status
unaffected
Problem Types
TypeCWE IDDescription
CWECWE-79Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Type: CWE
CWE ID: CWE-79
Description: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Metrics
VersionBase scoreBase severityVector
3.16.1MEDIUM
CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:N
Version: 3.1
Base score: 6.1
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:N
Metrics Other Info
Red Hat severity rating
value:
Moderate
namespace:
https://access.redhat.com/security/updates/classification/
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Reported to Red Hat.2024-10-22 01:46:48
Made public.2024-10-22 00:00:00
Event: Reported to Red Hat.
Date: 2024-10-22 01:46:48
Event: Made public.
Date: 2024-10-22 00:00:00
Replaced By

Rejected Reason

References
HyperlinkResource
https://access.redhat.com/errata/RHSA-2025:10924
vendor-advisory
x_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2025:10925
vendor-advisory
x_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2025:10926
vendor-advisory
x_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2025:10931
vendor-advisory
x_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2025:11636
vendor-advisory
x_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2025:11638
vendor-advisory
x_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2025:11639
vendor-advisory
x_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2025:11640
vendor-advisory
x_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2025:11645
vendor-advisory
x_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2025:2025
vendor-advisory
x_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2025:2026
vendor-advisory
x_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2025:2029
vendor-advisory
x_refsource_REDHAT
https://access.redhat.com/security/cve/CVE-2024-10234
vdb-entry
x_refsource_REDHAT
https://bugzilla.redhat.com/show_bug.cgi?id=2320848
issue-tracking
x_refsource_REDHAT
Hyperlink: https://access.redhat.com/errata/RHSA-2025:10924
Resource:
vendor-advisory
x_refsource_REDHAT
Hyperlink: https://access.redhat.com/errata/RHSA-2025:10925
Resource:
vendor-advisory
x_refsource_REDHAT
Hyperlink: https://access.redhat.com/errata/RHSA-2025:10926
Resource:
vendor-advisory
x_refsource_REDHAT
Hyperlink: https://access.redhat.com/errata/RHSA-2025:10931
Resource:
vendor-advisory
x_refsource_REDHAT
Hyperlink: https://access.redhat.com/errata/RHSA-2025:11636
Resource:
vendor-advisory
x_refsource_REDHAT
Hyperlink: https://access.redhat.com/errata/RHSA-2025:11638
Resource:
vendor-advisory
x_refsource_REDHAT
Hyperlink: https://access.redhat.com/errata/RHSA-2025:11639
Resource:
vendor-advisory
x_refsource_REDHAT
Hyperlink: https://access.redhat.com/errata/RHSA-2025:11640
Resource:
vendor-advisory
x_refsource_REDHAT
Hyperlink: https://access.redhat.com/errata/RHSA-2025:11645
Resource:
vendor-advisory
x_refsource_REDHAT
Hyperlink: https://access.redhat.com/errata/RHSA-2025:2025
Resource:
vendor-advisory
x_refsource_REDHAT
Hyperlink: https://access.redhat.com/errata/RHSA-2025:2026
Resource:
vendor-advisory
x_refsource_REDHAT
Hyperlink: https://access.redhat.com/errata/RHSA-2025:2029
Resource:
vendor-advisory
x_refsource_REDHAT
Hyperlink: https://access.redhat.com/security/cve/CVE-2024-10234
Resource:
vdb-entry
x_refsource_REDHAT
Hyperlink: https://bugzilla.redhat.com/show_bug.cgi?id=2320848
Resource:
issue-tracking
x_refsource_REDHAT
▼Authorized Data Publishers (ADP)
CISA ADP Vulnrichment
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:secalert@redhat.com
Published At:22 Oct, 2024 | 14:15
Updated At:23 Jul, 2025 | 19:15

A vulnerability was found in Wildfly, where a user may perform Cross-site scripting in the Wildfly deployment system. This flaw allows an attacker or insider to execute a deployment with a malicious payload, which could trigger undesired behavior against the server.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Secondary3.16.1MEDIUM
CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:N
Primary3.17.3HIGH
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N
Type: Secondary
Version: 3.1
Base score: 6.1
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:N
Type: Primary
Version: 3.1
Base score: 7.3
Base severity: HIGH
Vector:
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N
CPE Matches

Red Hat, Inc.
redhat
>>build_of_keycloak>>-
cpe:2.3:a:redhat:build_of_keycloak:-:*:*:*:*:*:*:*
Red Hat, Inc.
redhat
>>jboss_enterprise_application_platform>>8.0
cpe:2.3:a:redhat:jboss_enterprise_application_platform:8.0:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-79Secondarysecalert@redhat.com
CWE ID: CWE-79
Type: Secondary
Source: secalert@redhat.com
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://access.redhat.com/errata/RHSA-2025:10924secalert@redhat.com
N/A
https://access.redhat.com/errata/RHSA-2025:10925secalert@redhat.com
N/A
https://access.redhat.com/errata/RHSA-2025:10926secalert@redhat.com
N/A
https://access.redhat.com/errata/RHSA-2025:10931secalert@redhat.com
N/A
https://access.redhat.com/errata/RHSA-2025:11636secalert@redhat.com
N/A
https://access.redhat.com/errata/RHSA-2025:11638secalert@redhat.com
N/A
https://access.redhat.com/errata/RHSA-2025:11639secalert@redhat.com
N/A
https://access.redhat.com/errata/RHSA-2025:11640secalert@redhat.com
N/A
https://access.redhat.com/errata/RHSA-2025:11645secalert@redhat.com
N/A
https://access.redhat.com/errata/RHSA-2025:2025secalert@redhat.com
N/A
https://access.redhat.com/errata/RHSA-2025:2026secalert@redhat.com
N/A
https://access.redhat.com/errata/RHSA-2025:2029secalert@redhat.com
N/A
https://access.redhat.com/security/cve/CVE-2024-10234secalert@redhat.com
Vendor Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=2320848secalert@redhat.com
Issue Tracking
Hyperlink: https://access.redhat.com/errata/RHSA-2025:10924
Source: secalert@redhat.com
Resource: N/A
Hyperlink: https://access.redhat.com/errata/RHSA-2025:10925
Source: secalert@redhat.com
Resource: N/A
Hyperlink: https://access.redhat.com/errata/RHSA-2025:10926
Source: secalert@redhat.com
Resource: N/A
Hyperlink: https://access.redhat.com/errata/RHSA-2025:10931
Source: secalert@redhat.com
Resource: N/A
Hyperlink: https://access.redhat.com/errata/RHSA-2025:11636
Source: secalert@redhat.com
Resource: N/A
Hyperlink: https://access.redhat.com/errata/RHSA-2025:11638
Source: secalert@redhat.com
Resource: N/A
Hyperlink: https://access.redhat.com/errata/RHSA-2025:11639
Source: secalert@redhat.com
Resource: N/A
Hyperlink: https://access.redhat.com/errata/RHSA-2025:11640
Source: secalert@redhat.com
Resource: N/A
Hyperlink: https://access.redhat.com/errata/RHSA-2025:11645
Source: secalert@redhat.com
Resource: N/A
Hyperlink: https://access.redhat.com/errata/RHSA-2025:2025
Source: secalert@redhat.com
Resource: N/A
Hyperlink: https://access.redhat.com/errata/RHSA-2025:2026
Source: secalert@redhat.com
Resource: N/A
Hyperlink: https://access.redhat.com/errata/RHSA-2025:2029
Source: secalert@redhat.com
Resource: N/A
Hyperlink: https://access.redhat.com/security/cve/CVE-2024-10234
Source: secalert@redhat.com
Resource:
Vendor Advisory
Hyperlink: https://bugzilla.redhat.com/show_bug.cgi?id=2320848
Source: secalert@redhat.com
Resource:
Issue Tracking

Change History

0
Information is not available yet

Similar CVEs

291Records found

CVE-2010-3857
Matching Score-6
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-6
Assigner-Red Hat, Inc.
CVSS Score-6.1||MEDIUM
EPSS-0.49% / 64.58%
||
7 Day CHG~0.00%
Published-12 Nov, 2019 | 22:03
Updated-07 Aug, 2024 | 03:26
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

JBoss BRMS before 5.1.0 has a XSS vulnerability via asset=UUID parameter.

Action-Not Available
Vendor-JBoss BRMSRed Hat, Inc.
Product-jboss_business_rules_management_systemJBoss BRMS
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2019-19336
Matching Score-6
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-6
Assigner-Red Hat, Inc.
CVSS Score-5.4||MEDIUM
EPSS-0.30% / 53.21%
||
7 Day CHG~0.00%
Published-19 Mar, 2020 | 13:11
Updated-05 Aug, 2024 | 02:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A cross-site scripting vulnerability was reported in the oVirt-engine's OAuth authorization endpoint before version 4.3.8. URL parameters were included in the HTML response without escaping. This flaw would allow an attacker to craft malicious HTML pages that can run scripts in the context of the user's oVirt session.

Action-Not Available
Vendor-ovirtRed Hat, Inc.
Product-ovirt-enginevirtualizationovirt-engine
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2006-3918
Matching Score-6
Assigner-MITRE Corporation
ShareView Details
Matching Score-6
Assigner-MITRE Corporation
CVSS Score-4.3||MEDIUM
EPSS-90.11% / 99.57%
||
7 Day CHG~0.00%
Published-28 Jul, 2006 | 00:00
Updated-03 Apr, 2025 | 01:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

http_protocol.c in (1) IBM HTTP Server 6.0 before 6.0.2.13 and 6.1 before 6.1.0.1, and (2) Apache HTTP Server 1.3 before 1.3.35, 2.0 before 2.0.58, and 2.2 before 2.2.2, does not sanitize the Expect header from an HTTP request when it is reflected back in an error message, which might allow cross-site scripting (XSS) style attacks using web client components that can send arbitrary headers in requests, as demonstrated using a Flash SWF file.

Action-Not Available
Vendor-n/aThe Apache Software FoundationDebian GNU/LinuxRed Hat, Inc.Canonical Ltd.
Product-enterprise_linux_serverubuntu_linuxhttp_serverenterprise_linux_workstationdebian_linuxn/a
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2008-0455
Matching Score-6
Assigner-MITRE Corporation
ShareView Details
Matching Score-6
Assigner-MITRE Corporation
CVSS Score-4.3||MEDIUM
EPSS-35.25% / 96.91%
||
7 Day CHG~0.00%
Published-25 Jan, 2008 | 00:00
Updated-07 Aug, 2024 | 07:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Cross-site scripting (XSS) vulnerability in the mod_negotiation module in the Apache HTTP Server 2.2.6 and earlier in the 2.2.x series, 2.0.61 and earlier in the 2.0.x series, and 1.3.39 and earlier in the 1.3.x series allows remote authenticated users to inject arbitrary web script or HTML by uploading a file with a name containing XSS sequences and a file extension, which leads to injection within a (1) "406 Not Acceptable" or (2) "300 Multiple Choices" HTTP response when the extension is omitted in a request for the file.

Action-Not Available
Vendor-n/aRed Hat, Inc.The Apache Software Foundation
Product-enterprise_linux_serverhttp_serverenterprise_linux_workstationenterprise_linuxjboss_enterprise_application_platformenterprise_linux_desktopn/a
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2017-12175
Matching Score-6
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-6
Assigner-Red Hat, Inc.
CVSS Score-3.5||LOW
EPSS-0.47% / 63.72%
||
7 Day CHG~0.00%
Published-26 Jul, 2018 | 17:00
Updated-05 Aug, 2024 | 18:28
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Red Hat Satellite before 6.5 is vulnerable to a XSS in discovery rule when you are entering filter and you use autocomplete functionality.

Action-Not Available
Vendor-Red Hat, Inc.
Product-satelliteSatellite
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2019-3889
Matching Score-6
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-6
Assigner-Red Hat, Inc.
CVSS Score-4.6||MEDIUM
EPSS-0.35% / 56.93%
||
7 Day CHG~0.00%
Published-11 Jul, 2019 | 18:27
Updated-04 Aug, 2024 | 19:19
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A reflected XSS vulnerability exists in authorization flow of OpenShift Container Platform versions: openshift-online-3, openshift-enterprise-3.4 through 3.7 and openshift-enterprise-3.9 through 3.11. An attacker could use this flaw to steal authorization data by getting them to click on a malicious link.

Action-Not Available
Vendor-Red Hat, Inc.
Product-openshift_container_platformatomic-openshift
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2021-20222
Matching Score-6
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-6
Assigner-Red Hat, Inc.
CVSS Score-7.5||HIGH
EPSS-0.51% / 65.42%
||
7 Day CHG~0.00%
Published-23 Mar, 2021 | 16:36
Updated-03 Aug, 2024 | 17:30
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A flaw was found in keycloak. The new account console in keycloak can allow malicious code to be executed using the referrer URL. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.

Action-Not Available
Vendor-n/aRed Hat, Inc.
Product-keycloakkeycloak
CWE ID-CWE-20
Improper Input Validation
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2009-2696
Matching Score-6
Assigner-MITRE Corporation
ShareView Details
Matching Score-6
Assigner-MITRE Corporation
CVSS Score-4.3||MEDIUM
EPSS-1.01% / 76.14%
||
7 Day CHG~0.00%
Published-05 Aug, 2010 | 18:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Cross-site scripting (XSS) vulnerability in jsp/cal/cal2.jsp in the calendar application in the examples web application in Apache Tomcat on Red Hat Enterprise Linux 5, Desktop Workstation 5, and Linux Desktop 5 allows remote attackers to inject arbitrary web script or HTML via the time parameter, related to "invalid HTML." NOTE: this is due to a missing fix for CVE-2009-0781.

Action-Not Available
Vendor-n/aThe Apache Software FoundationRed Hat, Inc.
Product-enterprise_linuxenterprise_linux_desktopdesktop_workstationtomcatn/a
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2021-20323
Matching Score-6
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-6
Assigner-Red Hat, Inc.
CVSS Score-6.1||MEDIUM
EPSS-66.05% / 98.45%
||
7 Day CHG~0.00%
Published-25 Mar, 2022 | 18:03
Updated-03 Aug, 2024 | 17:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A POST based reflected Cross Site Scripting vulnerability on has been identified in Keycloak.

Action-Not Available
Vendor-n/aRed Hat, Inc.
Product-keycloakkeycloak-services
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2017-12158
Matching Score-6
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-6
Assigner-Red Hat, Inc.
CVSS Score-5.4||MEDIUM
EPSS-0.67% / 70.36%
||
7 Day CHG~0.00%
Published-26 Oct, 2017 | 17:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

It was found that Keycloak would accept a HOST header URL in the admin console and use it to determine web resource locations. An attacker could use this flaw against an authenticated user to attain reflected XSS via a malicious server.

Action-Not Available
Vendor-keycloakRed Hat, Inc.
Product-single_sign_onenterprise_linux_serverkeycloakkeycloak
CWE ID-CWE-444
Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling')
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2009-2405
Matching Score-6
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-6
Assigner-Red Hat, Inc.
CVSS Score-4.3||MEDIUM
EPSS-0.78% / 72.66%
||
7 Day CHG~0.00%
Published-15 Dec, 2009 | 18:00
Updated-07 Aug, 2024 | 05:52
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Multiple cross-site scripting (XSS) vulnerabilities in the Web Console in the Application Server in Red Hat JBoss Enterprise Application Platform (aka JBoss EAP or JBEAP) 4.2.0 before 4.2.0.CP08, 4.2.2GA, 4.3 before 4.3.0.CP07, and 5.1.0GA allow remote attackers to inject arbitrary web script or HTML via the (1) monitorName, (2) objectName, (3) attribute, or (4) period parameter to createSnapshot.jsp, or the (5) monitorName, (6) objectName, (7) attribute, (8) threshold, (9) period, or (10) enabled parameter to createThresholdMonitor.jsp. NOTE: some of these details are obtained from third party information.

Action-Not Available
Vendor-n/aRed Hat, Inc.
Product-jboss_enterprise_application_platformn/a
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2017-1002152
Matching Score-6
Assigner-Fedora Project
ShareView Details
Matching Score-6
Assigner-Fedora Project
CVSS Score-6.1||MEDIUM
EPSS-0.30% / 53.21%
||
7 Day CHG~0.00%
Published-10 Jan, 2019 | 21:00
Updated-16 Sep, 2024 | 20:27
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Bodhi 2.9.0 and lower is vulnerable to cross-site scripting resulting in code injection caused by incorrect validation of bug titles.

Action-Not Available
Vendor-Fedora Project InfrastructureRed Hat, Inc.
Product-bodhiBodhi
CWE ID-CWE-94
Improper Control of Generation of Code ('Code Injection')
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2009-1380
Matching Score-6
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-6
Assigner-Red Hat, Inc.
CVSS Score-4.3||MEDIUM
EPSS-0.60% / 68.62%
||
7 Day CHG~0.00%
Published-15 Dec, 2009 | 18:00
Updated-07 Aug, 2024 | 05:13
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Cross-site scripting (XSS) vulnerability in JMX-Console in JBossAs in Red Hat JBoss Enterprise Application Platform (aka JBoss EAP or JBEAP) 4.2 before 4.2.0.CP08 and 4.3 before 4.3.0.CP07 allows remote attackers to inject arbitrary web script or HTML via the filter parameter, related to the key property and the position of quote and colon characters.

Action-Not Available
Vendor-n/aRed Hat, Inc.
Product-jboss_enterprise_application_platformn/a
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2009-1349
Matching Score-6
Assigner-MITRE Corporation
ShareView Details
Matching Score-6
Assigner-MITRE Corporation
CVSS Score-4.3||MEDIUM
EPSS-0.14% / 34.38%
||
7 Day CHG~0.00%
Published-21 Apr, 2009 | 15:00
Updated-07 Aug, 2024 | 05:13
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Cross-site scripting (XSS) vulnerability in C2Net Stronghold 2.3 allows remote attackers to inject arbitrary web script or HTML via the URI.

Action-Not Available
Vendor-n/aRed Hat, Inc.
Product-strongholdn/a
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2020-6391
Matching Score-6
Assigner-Chrome
ShareView Details
Matching Score-6
Assigner-Chrome
CVSS Score-4.3||MEDIUM
EPSS-1.74% / 81.71%
||
7 Day CHG~0.00%
Published-11 Feb, 2020 | 14:42
Updated-04 Aug, 2024 | 09:02
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Insufficient validation of untrusted input in Blink in Google Chrome prior to 80.0.3987.87 allowed a local attacker to bypass content security policy via a crafted HTML page.

Action-Not Available
Vendor-Debian GNU/LinuxRed Hat, Inc.Fedora ProjectGoogle LLCopenSUSESUSE
Product-enterprise_linux_serverdebian_linuxchromelinux_enterpriseenterprise_linux_workstationfedorapackage_hubbackports_sleenterprise_linux_desktopChrome
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2024-10033
Matching Score-6
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-6
Assigner-Red Hat, Inc.
CVSS Score-6.1||MEDIUM
EPSS-0.07% / 20.54%
||
7 Day CHG~0.00%
Published-16 Oct, 2024 | 16:59
Updated-26 Mar, 2025 | 05:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Aap-gateway: xss on aap-gateway

A vulnerability was found in aap-gateway. A Cross-site Scripting (XSS) vulnerability exists in the gateway component. This flaw allows a malicious user to perform actions that impact users by using the "?next=" in a URL, which can lead to redirecting, injecting malicious script, stealing sessions and data.

Action-Not Available
Vendor-Red Hat, Inc.
Product-enterprise_linuxansible_developeransible_insideansible_automation_platformRed Hat Ansible Automation Platform 2.5 for RHEL 8Red Hat Ansible Automation Platform 2.5 for RHEL 9
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2023-6717
Matching Score-6
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-6
Assigner-Red Hat, Inc.
CVSS Score-6||MEDIUM
EPSS-0.07% / 20.49%
||
7 Day CHG~0.00%
Published-25 Apr, 2024 | 16:02
Updated-26 Aug, 2025 | 06:25
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Keycloak: xss via assertion consumer service url in saml post-binding flow

A flaw was found in the SAML client registration in Keycloak that could allow an administrator to register malicious JavaScript URIs as Assertion Consumer Service POST Binding URLs (ACS), posing a Cross-Site Scripting (XSS) risk. This issue may allow a malicious admin in one realm or a client with registration access to target users in different realms or applications, executing arbitrary JavaScript in their contexts upon form submission. This can enable unauthorized access and harmful actions, compromising the confidentiality, integrity, and availability of the complete KC instance.

Action-Not Available
Vendor-Red Hat, Inc.
Product-Migration Toolkit for Applications 6Red Hat OpenShift GitOpsRHPAM 7.13.5 asyncRed Hat build of Keycloak 22.0.10Red Hat build of QuarkusRed Hat JBoss Enterprise Application Platform 6Red Hat Single Sign-On 7Red Hat JBoss Enterprise Application Platform 7Red Hat Process Automation 7Red Hat Decision Manager 7Red Hat Data Grid 8Red Hat JBoss Enterprise Application Platform Expansion PackRed Hat AMQ Broker 7Red Hat build of Apicurio Registry 2RHOSS-1.33-RHEL-8Red Hat Fuse 7Red Hat Developer HubRed Hat JBoss Enterprise Application Platform 8Red Hat JBoss Data Grid 7Migration Toolkit for Applications 7Red Hat build of Keycloak 22
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2023-6710
Matching Score-6
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-6
Assigner-Red Hat, Inc.
CVSS Score-5.4||MEDIUM
EPSS-0.45% / 62.51%
||
7 Day CHG-0.18%
Published-12 Dec, 2023 | 22:01
Updated-06 Aug, 2025 | 07:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Mod_cluster/mod_proxy_cluster: stored cross site scripting

A flaw was found in the mod_proxy_cluster in the Apache server. This issue may allow a malicious user to add a script in the 'alias' parameter in the URL to trigger the stored cross-site scripting (XSS) vulnerability. By adding a script on the alias parameter on the URL, it adds a new virtual host and adds the script to the cluster-manager page.

Action-Not Available
Vendor-modclusterRed Hat, Inc.
Product-mod_proxy_clusterenterprise_linuxText-Only JBCSRed Hat Enterprise Linux 9JBoss Core Services for RHEL 8JBoss Core Services on RHEL 7Red Hat JBoss Core Services
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2023-5547
Matching Score-6
Assigner-Fedora Project
ShareView Details
Matching Score-6
Assigner-Fedora Project
CVSS Score-3.3||LOW
EPSS-0.10% / 27.55%
||
7 Day CHG~0.00%
Published-09 Nov, 2023 | 19:35
Updated-04 Sep, 2024 | 13:25
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Moodle: xss risk when previewing data in course upload tool

The course upload preview contained an XSS risk for users uploading unsafe data.

Action-Not Available
Vendor-Moodle Pty LtdRed Hat, Inc.Fedora Project
Product-enterprise_linuxfedoramoodle
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2023-6134
Matching Score-6
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-6
Assigner-Red Hat, Inc.
CVSS Score-4.6||MEDIUM
EPSS-1.41% / 79.73%
||
7 Day CHG~0.00%
Published-14 Dec, 2023 | 21:42
Updated-07 Aug, 2025 | 11:11
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Keycloak: reflected xss via wildcard in oidc redirect_uri

A flaw was found in Keycloak that prevents certain schemes in redirects, but permits them if a wildcard is appended to the token. This issue could allow an attacker to submit a specially crafted request leading to cross-site scripting (XSS) or further attacks. This flaw is the result of an incomplete fix for CVE-2020-10748.

Action-Not Available
Vendor-Red Hat, Inc.
Product-single_sign-onopenshift_container_platform_ibm_z_systemsopenshift_container_platformkeycloakenterprise_linuxopenshift_container_platform_for_powerRed Hat Single Sign-On 7Red Hat Single Sign-On 7.6 for RHEL 7Red Hat Single Sign-On 7.6 for RHEL 8Red Hat build of Keycloak 22.0.7Single Sign-On 7.6.6RHEL-8 based Middleware ContainersRed Hat Single Sign-On 7.6 for RHEL 9Red Hat build of Keycloak 22
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2023-5546
Matching Score-6
Assigner-Fedora Project
ShareView Details
Matching Score-6
Assigner-Fedora Project
CVSS Score-4.3||MEDIUM
EPSS-1.04% / 76.57%
||
7 Day CHG~0.00%
Published-09 Nov, 2023 | 19:34
Updated-02 Aug, 2024 | 07:59
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Moodle: stored xss in quiz grading report via user id number

ID numbers displayed in the quiz grading report required additional sanitizing to prevent a stored XSS risk.

Action-Not Available
Vendor-Moodle Pty LtdRed Hat, Inc.Fedora Project
Product-enterprise_linuxfedoramoodlemoodle
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2023-5544
Matching Score-6
Assigner-Fedora Project
ShareView Details
Matching Score-6
Assigner-Fedora Project
CVSS Score-6.5||MEDIUM
EPSS-0.12% / 31.99%
||
7 Day CHG~0.00%
Published-09 Nov, 2023 | 19:32
Updated-02 Aug, 2024 | 07:59
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Moodle: stored xss and potential idor risk in wiki comments

Wiki comments required additional sanitizing and access restrictions to prevent a stored XSS risk and potential IDOR risk.

Action-Not Available
Vendor-Moodle Pty LtdRed Hat, Inc.Fedora Project
Product-enterprise_linuxfedoramoodle
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CWE ID-CWE-639
Authorization Bypass Through User-Controlled Key
CVE-2019-17022
Matching Score-6
Assigner-Mozilla Corporation
ShareView Details
Matching Score-6
Assigner-Mozilla Corporation
CVSS Score-6.1||MEDIUM
EPSS-2.47% / 84.65%
||
7 Day CHG~0.00%
Published-08 Jan, 2020 | 21:30
Updated-05 Aug, 2024 | 01:24
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

When pasting a &lt;style&gt; tag from the clipboard into a rich text editor, the CSS sanitizer does not escape &lt; and &gt; characters. Because the resulting string is pasted directly into the text node of the element this does not result in a direct injection into the webpage; however, if a webpage subsequently copies the node's innerHTML, assigning it to another innerHTML, this would result in an XSS vulnerability. Two WYSIWYG editors were identified with this behavior, more may exist. This vulnerability affects Firefox ESR < 68.4 and Firefox < 72.

Action-Not Available
Vendor-Canonical Ltd.Red Hat, Inc.Mozilla CorporationDebian GNU/Linux
Product-enterprise_linux_serverubuntu_linuxdebian_linuxfirefoxfirefox_esrenterprise_linux_server_ausenterprise_linux_workstationenterprise_linux_server_tusenterprise_linux_desktopFirefoxFirefox ESR
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2019-17016
Matching Score-6
Assigner-Mozilla Corporation
ShareView Details
Matching Score-6
Assigner-Mozilla Corporation
CVSS Score-6.1||MEDIUM
EPSS-1.83% / 82.18%
||
7 Day CHG~0.00%
Published-08 Jan, 2020 | 21:27
Updated-05 Aug, 2024 | 01:24
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

When pasting a &lt;style&gt; tag from the clipboard into a rich text editor, the CSS sanitizer incorrectly rewrites a @namespace rule. This could allow for injection into certain types of websites resulting in data exfiltration. This vulnerability affects Firefox ESR < 68.4 and Firefox < 72.

Action-Not Available
Vendor-Canonical Ltd.Red Hat, Inc.Mozilla CorporationDebian GNU/Linux
Product-enterprise_linux_serverubuntu_linuxdebian_linuxfirefoxfirefox_esrenterprise_linux_server_ausenterprise_linux_workstationenterprise_linux_server_tusenterprise_linux_desktopFirefoxFirefox ESR
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2019-14849
Matching Score-6
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-6
Assigner-Red Hat, Inc.
CVSS Score-4.6||MEDIUM
EPSS-0.37% / 58.23%
||
7 Day CHG~0.00%
Published-12 Dec, 2019 | 13:14
Updated-05 Aug, 2024 | 00:26
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability was found in 3scale before version 2.6, did not set the HTTPOnly attribute on the user session cookie. An attacker could use this to conduct cross site scripting attacks and gain access to unauthorized information.

Action-Not Available
Vendor-n/aRed Hat, Inc.
Product-3scale3scale
CWE ID-CWE-201
Insertion of Sensitive Information Into Sent Data
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2019-14863
Matching Score-6
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-6
Assigner-Red Hat, Inc.
CVSS Score-7.1||HIGH
EPSS-0.22% / 45.02%
||
7 Day CHG~0.00%
Published-02 Jan, 2020 | 14:20
Updated-05 Aug, 2024 | 00:26
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

There is a vulnerability in all angular versions before 1.5.0-beta.0, where after escaping the context of the web application, the web application delivers data to its users along with other trusted dynamic content, without validating it.

Action-Not Available
Vendor-Red Hat, Inc.AngularJS
Product-process_automationdecision_managerangular.jsangular:
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2019-14862
Matching Score-6
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-6
Assigner-Red Hat, Inc.
CVSS Score-6.1||MEDIUM
EPSS-0.55% / 66.93%
||
7 Day CHG~0.00%
Published-02 Jan, 2020 | 14:18
Updated-05 Aug, 2024 | 00:26
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

There is a vulnerability in knockout before version 3.5.0-beta, where after escaping the context of the web application, the web application delivers data to its users along with other trusted dynamic content, without validating it.

Action-Not Available
Vendor-knockoutjsOracle CorporationRed Hat, Inc.
Product-knockoutprocess_automationbusiness_intelligencegoldengatedecision_managerknockout
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2019-11556
Matching Score-6
Assigner-MITRE Corporation
ShareView Details
Matching Score-6
Assigner-MITRE Corporation
CVSS Score-6.1||MEDIUM
EPSS-0.59% / 68.12%
||
7 Day CHG~0.00%
Published-25 Sep, 2020 | 05:56
Updated-04 Aug, 2024 | 22:55
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Pagure before 5.6 allows XSS via the templates/blame.html blame view.

Action-Not Available
Vendor-n/aRed Hat, Inc.openSUSE
Product-pagurebackports_sleleapn/a
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2019-11291
Matching Score-6
Assigner-VMware by Broadcom
ShareView Details
Matching Score-6
Assigner-VMware by Broadcom
CVSS Score-3.1||LOW
EPSS-0.48% / 64.29%
||
7 Day CHG~0.00%
Published-22 Nov, 2019 | 22:56
Updated-02 Apr, 2025 | 14:13
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
RabbitMQ XSS attack via federation and shovel endpoints

Pivotal RabbitMQ, 3.7 versions prior to v3.7.20 and 3.8 version prior to v3.8.1, and RabbitMQ for PCF, 1.16.x versions prior to 1.16.7 and 1.17.x versions prior to 1.17.4, contain two endpoints, federation and shovel, which do not properly sanitize user input. A remote authenticated malicious user with administrative access could craft a cross site scripting attack via the vhost or node name fields that could grant access to virtual hosts and policy management information.

Action-Not Available
Vendor-Broadcom Inc.Red Hat, Inc.VMware (Broadcom Inc.)
Product-rabbitmq_serveropenstackrabbitmqRabbitMQRabbitMQ for Pivotal Platform
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2019-10092
Matching Score-6
Assigner-Apache Software Foundation
ShareView Details
Matching Score-6
Assigner-Apache Software Foundation
CVSS Score-6.1||MEDIUM
EPSS-88.70% / 99.49%
||
7 Day CHG+3.79%
Published-26 Sep, 2019 | 14:07
Updated-04 Aug, 2024 | 22:10
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In Apache HTTP Server 2.4.0-2.4.39, a limited cross-site scripting issue was reported affecting the mod_proxy error page. An attacker could cause the link on the error page to be malformed and instead point to a page of their choice. This would only be exploitable where a server was set up with proxying enabled but was misconfigured in such a way that the Proxy Error page was displayed.

Action-Not Available
Vendor-n/aCanonical Ltd.The Apache Software FoundationRed Hat, Inc.NetApp, Inc.openSUSEFedora ProjectDebian GNU/LinuxOracle Corporation
Product-http_serverubuntu_linuxclustered_data_ontapdebian_linuxfedorasecure_global_desktopenterprise_manager_ops_centercommunications_element_managersoftware_collectionleapApache HTTP Server
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2019-1003013
Matching Score-6
Assigner-Jenkins Project
ShareView Details
Matching Score-6
Assigner-Jenkins Project
CVSS Score-5.4||MEDIUM
EPSS-0.04% / 11.82%
||
7 Day CHG~0.00%
Published-06 Feb, 2019 | 16:00
Updated-05 Aug, 2024 | 03:00
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An cross-site scripting vulnerability exists in Jenkins Blue Ocean Plugins 1.10.1 and earlier in blueocean-commons/src/main/java/io/jenkins/blueocean/commons/stapler/Export.java, blueocean-commons/src/main/java/io/jenkins/blueocean/commons/stapler/export/ExportConfig.java, blueocean-commons/src/main/java/io/jenkins/blueocean/commons/stapler/export/JSONDataWriter.java, blueocean-rest-impl/src/main/java/io/jenkins/blueocean/service/embedded/UserStatePreloader.java, blueocean-web/src/main/resources/io/jenkins/blueocean/PageStatePreloadDecorator/header.jelly that allows attackers with permission to edit a user's description in Jenkins to have Blue Ocean render arbitrary HTML when using it as that user.

Action-Not Available
Vendor-Red Hat, Inc.Jenkins
Product-blue_oceanopenshift_container_platformJenkins Blue Ocean Plugins
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2019-10219
Matching Score-6
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-6
Assigner-Red Hat, Inc.
CVSS Score-6.5||MEDIUM
EPSS-1.86% / 82.31%
||
7 Day CHG~0.00%
Published-08 Nov, 2019 | 14:46
Updated-07 Jul, 2025 | 14:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability was found in Hibernate-Validator. The SafeHtml validator annotation fails to properly sanitize payloads consisting of potentially malicious code in HTML comments and instructions. This vulnerability can result in an XSS attack.

Action-Not Available
Vendor-HibernateOracle CorporationNetApp, Inc.Red Hat, Inc.
Product-communications_pricing_design_centeragile_product_lifecycle_management_integration_packcommunications_cloud_native_core_consolemysql_serverdata_integratorbanking_platformcommerce_platformwebcenter_portalfuseretail_order_brokerpolicy_automationpeoplesoft_enterprise_peopletoolsweblogic_servere-business_suitemysql_clustercommunications_data_modelenterprise_manager_ops_centeressbaseretail_back_officecommunications_cloud_native_core_network_repository_functionhospitality_reporting_and_analyticscommunications_metasolv_solutioncommunications_offline_mediation_controllerpeoplesoft_enterprise_cs_sa_integration_packflexcube_private_bankingretail_predictive_application_serverhealthcare_data_repositoryjd_edwards_enterpriseone_orchestratorcommunications_cloud_native_core_unified_data_repositoryclinicalenterprise_session_border_controllerinsurance_rules_palettecommunications_webrtc_session_controllerretail_financial_integrationflexcube_investor_servicinghealthcare_foundationcommunications_network_integritymysql_connectorshospitality_opera_5_property_servicescommunications_diameter_signaling_routenosql_databasetimesten_in-memory_databasebusiness_process_management_suiteretail_allocationfujitsu_m12-2_firmwareretail_assortment_planningsolarisbanking_apisprimavera_p6_professional_project_managementgraph_server_and_clientjboss_enterprise_application_platformretail_customer_management_and_segmentation_foundationapplication_performance_managementdatabase_serverfinancial_services_analytical_applications_infrastructureapplication_testing_suitebanking_deposits_and_lines_of_credit_servicingfujitsu_m10-4elementretail_order_management_systemutilities_frameworkprimavera_unifiercommunications_convergencebig_data_spatial_and_graphfinancial_services_enterprise_case_managementhealth_sciences_clinical_development_analyticsretail_returns_managementargus_analyticshospitality_cruise_shipboard_property_management_systemfusion_middleware_mapviewerutilities_testing_acceleratorsiebel_applicationsfujitsu_m12-2svm_virtualboxcommunications_cloud_native_core_automated_test_suitecommunications_converged_application_server_-_service_controllerretail_point-of-saleretail_service_backboneretail_integration_buscommunications_convergent_charging_controllerinsurance_insbridge_rating_and_underwritingaccess_managerenterprise_manager_base_platformretail_customer_insightsreal-time_decision_serverjboss_data_gridfujitsu_m10-4sessbase_administration_serviceshyperion_infrastructure_technologyfujitsu_m12-1_firmwarebusiness_activity_monitoringprimavera_data_warehousecommunications_session_border_controllergoldengate_application_adaptershealth_sciences_information_managermanagement_services_for_element_software_and_netapp_hcipeoplesoft_enterprise_people_toolsrest_data_servicesairlines_data_modelretail_size_profile_optimizationdocumakergoldengateretail_central_officeapplication_expresssnapcenter_plug-inhealth_sciences_inform_crf_submitcommunications_billing_and_revenue_managementinsurance_data_gatewayfujitsu_m12-1primavera_portfolio_managementspatial_studiohyperion_financial_managementretail_analyticsretail_fiscal_managementfinancial_services_foreign_account_tax_compliance_act_managementbanking_digital_experiencecommunications_services_gatekeeperfinancial_services_behavior_detection_platforminstantis_enterprisetrackenterprise_communications_brokerbanking_loans_servicingcommunications_service_brokercommunications_cloud_native_core_service_communication_proxysecure_backupcommunications_operations_monitorfinancial_services_trade-based_anti_money_launderingcommunications_cloud_native_core_security_edge_protection_proxyenterprise_data_qualityretail_price_managementbanking_enterprise_default_managementinsurance_policy_administration_j2eecommunications_cloud_native_core_network_function_cloud_native_environmentcommunications_unified_inventory_managementretail_eftlinkcommunications_eagle_application_processorcommunications_design_studiobanking_enterprise_default_managmentagile_engineering_data_managementjdkcommunications_contacts_serveropenshift_application_runtimeshibernate_validatorhyperion_ilearningrapid_planninggraalvmcommunications_application_session_controllerenterprise_linuxretail_invoice_matchingargus_insightdemantra_demand_managementfujitsu_m10-1banking_party_managementhttp_serverfinancial_services_model_management_and_governancehospitality_suite8communications_cloud_native_core_binding_support_functioncommunications_cloud_native_core_policycommunications_network_charging_and_controlhealthcare_translational_researchcommerce_guided_searchprimavera_p6_enterprise_project_portfolio_managementretail_extract_transform_and_loadcommunications_calendar_servercommunications_billing_and_revenue_management_elastic_charging_enginebusiness_intelligencefusion_middlewaresd-wan_awareagile_product_lifecycle_analyticscommunications_messaging_serverzfs_storage_appliance_kitfujitsu_m10-4s_firmwareinsurance_policy_administrationcommunications_instant_messaging_serverargus_safetyfujitsu_m12-2agile_plmactive_iq_unified_managerfujitsu_m10-4_firmwareretail_xstore_point_of_servicereal_user_experience_insightzfs_storage_application_integration_engineering_softwareprimavera_analyticscommunications_interactive_session_recordersingle_sign-onbi_publisheross_support_toolsjava_semysql_workbenchprimavera_gatewaymanaged_file_transferthesaurus_management_systemsd-wan_edgeretail_merchandising_systemfujitsu_m12-2s_firmwarefujitsu_m10-1_firmwarehibernate-validator
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2019-10215
Matching Score-6
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-6
Assigner-Red Hat, Inc.
CVSS Score-6.1||MEDIUM
EPSS-0.43% / 61.61%
||
7 Day CHG~0.00%
Published-08 Oct, 2019 | 18:44
Updated-04 Aug, 2024 | 22:17
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Bootstrap-3-Typeahead after version 4.0.2 is vulnerable to a cross-site scripting flaw in the highlighter() function. An attacker could exploit this via user interaction to execute code in the user's browser.

Action-Not Available
Vendor-bootstrap-3-typeahead_projectRed Hat, Inc.
Product-bootstrap-3-typeaheadbootstrap3-typeahead.js
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2019-1003050
Matching Score-6
Assigner-Jenkins Project
ShareView Details
Matching Score-6
Assigner-Jenkins Project
CVSS Score-5.4||MEDIUM
EPSS-1.06% / 76.77%
||
7 Day CHG~0.00%
Published-10 Apr, 2019 | 20:12
Updated-05 Aug, 2024 | 03:07
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The f:validateButton form control for the Jenkins UI did not properly escape job URLs in Jenkins 2.171 and earlier and Jenkins LTS 2.164.1 and earlier, resulting in a cross-site scripting (XSS) vulnerability exploitable by users with the ability to control job names.

Action-Not Available
Vendor-Oracle CorporationRed Hat, Inc.Jenkins
Product-communications_cloud_native_core_automated_test_suitejenkinsopenshift_container_platformJenkins
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2019-10146
Matching Score-6
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-6
Assigner-Red Hat, Inc.
CVSS Score-4.7||MEDIUM
EPSS-0.26% / 49.25%
||
7 Day CHG~0.00%
Published-18 Mar, 2020 | 14:47
Updated-04 Aug, 2024 | 22:10
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A Reflected Cross Site Scripting flaw was found in all pki-core 10.x.x versions module from the pki-core server due to the CA Agent Service not properly sanitizing the certificate request page. An attacker could inject a specially crafted value that will be executed on the victim's browser.

Action-Not Available
Vendor-dogtagpkiRed Hat, Inc.
Product-enterprise_linuxdogtagpkipki-core
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2019-10180
Matching Score-6
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-6
Assigner-Red Hat, Inc.
CVSS Score-2.4||LOW
EPSS-0.48% / 64.33%
||
7 Day CHG+0.03%
Published-31 Mar, 2020 | 16:31
Updated-04 Aug, 2024 | 22:10
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability was found in all pki-core 10.x.x version, where the Token Processing Service (TPS) did not properly sanitize several parameters stored for the tokens, possibly resulting in a Stored Cross Site Scripting (XSS) vulnerability. An attacker able to modify the parameters of any token could use this flaw to trick an authenticated user into executing arbitrary JavaScript code.

Action-Not Available
Vendor-dogtagpki[UNKNOWN]Red Hat, Inc.
Product-certificate_systemdogtagpkipki-core
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2019-10221
Matching Score-6
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-6
Assigner-Red Hat, Inc.
CVSS Score-4.3||MEDIUM
EPSS-0.67% / 70.38%
||
7 Day CHG~0.00%
Published-20 Mar, 2020 | 13:55
Updated-04 Aug, 2024 | 22:17
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A Reflected Cross Site Scripting vulnerability was found in all pki-core 10.x.x versions, where the pki-ca module from the pki-core server. This flaw is caused by missing sanitization of the GET URL parameters. An attacker could abuse this flaw to trick an authenticated user into clicking a specially crafted link which can execute arbitrary code when viewed in a browser.

Action-Not Available
Vendor-dogtagpki[UNKNOWN]Red Hat, Inc.
Product-enterprise_linuxdogtagpkipki-core
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2019-1003014
Matching Score-6
Assigner-Jenkins Project
ShareView Details
Matching Score-6
Assigner-Jenkins Project
CVSS Score-4.8||MEDIUM
EPSS-0.07% / 21.11%
||
7 Day CHG~0.00%
Published-06 Feb, 2019 | 16:00
Updated-05 Aug, 2024 | 03:00
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An cross-site scripting vulnerability exists in Jenkins Config File Provider Plugin 3.4.1 and earlier in src/main/resources/lib/configfiles/configfiles.jelly that allows attackers with permission to define shared configuration files to execute arbitrary JavaScript when a user attempts to delete the shared configuration file.

Action-Not Available
Vendor-Red Hat, Inc.Jenkins
Product-openshift_container_platformconfig_file_providerJenkins Config File Provider Plugin
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2019-10179
Matching Score-6
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-6
Assigner-Red Hat, Inc.
CVSS Score-4.3||MEDIUM
EPSS-0.62% / 68.96%
||
7 Day CHG~0.00%
Published-20 Mar, 2020 | 13:57
Updated-04 Aug, 2024 | 22:10
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability was found in all pki-core 10.x.x versions, where the Key Recovery Authority (KRA) Agent Service did not properly sanitize recovery request search page, enabling a Reflected Cross Site Scripting (XSS) vulnerability. An attacker could trick an authenticated victim into executing specially crafted Javascript code.

Action-Not Available
Vendor-dogtagpki[UNKNOWN]Red Hat, Inc.
Product-enterprise_linuxdogtagpkipki-core/pki-kra
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2017-7463
Matching Score-6
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-6
Assigner-Red Hat, Inc.
CVSS Score-6.1||MEDIUM
EPSS-0.66% / 70.01%
||
7 Day CHG~0.00%
Published-27 Jul, 2018 | 18:00
Updated-05 Aug, 2024 | 16:04
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

JBoss BRMS 6 and BPM Suite 6 before 6.4.3 are vulnerable to a reflected XSS via artifact upload. A malformed XML file, if uploaded, causes an error message to appear that includes part of the bad XML code verbatim without filtering out scripts. Successful exploitation would allow execution of script code within the context of the affected user.

Action-Not Available
Vendor-Red Hat, Inc.
Product-jboss_bpm_suitebusiness-central
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2019-11281
Matching Score-6
Assigner-VMware by Broadcom
ShareView Details
Matching Score-6
Assigner-VMware by Broadcom
CVSS Score-2.4||LOW
EPSS-1.02% / 76.30%
||
7 Day CHG~0.00%
Published-16 Oct, 2019 | 15:23
Updated-16 Sep, 2024 | 19:05
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
RabbitMQ XSS attack

Pivotal RabbitMQ, versions prior to v3.7.18, and RabbitMQ for PCF, versions 1.15.x prior to 1.15.13, versions 1.16.x prior to 1.16.6, and versions 1.17.x prior to 1.17.3, contain two components, the virtual host limits page, and the federation management UI, which do not properly sanitize user input. A remote authenticated malicious user with administrative access could craft a cross site scripting attack that would gain access to virtual hosts and policy management information.

Action-Not Available
Vendor-VMware (Broadcom Inc.)Red Hat, Inc.Debian GNU/LinuxFedora Project
Product-debian_linuxopenstackfedoraopenstack_for_ibm_powerrabbitmqRabbitMQ for PCFRabbitMQ
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2016-8608
Matching Score-6
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-6
Assigner-Red Hat, Inc.
CVSS Score-5.4||MEDIUM
EPSS-0.18% / 39.75%
||
7 Day CHG~0.00%
Published-01 Aug, 2018 | 14:00
Updated-06 Aug, 2024 | 02:27
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

JBoss BRMS 6 and BPM Suite 6 are vulnerable to a stored XSS via business process editor. The flaw is due to an incomplete fix for CVE-2016-5398. Remote, authenticated attackers that have privileges to create business processes can store scripts in them, which are not properly sanitized before showing to other users, including admins.

Action-Not Available
Vendor-Red Hat, Inc.
Product-jboss_bpm_suitejboss_business_rules_management_systemBRMS
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2019-13741
Matching Score-6
Assigner-Chrome
ShareView Details
Matching Score-6
Assigner-Chrome
CVSS Score-8.8||HIGH
EPSS-1.70% / 81.54%
||
7 Day CHG~0.00%
Published-10 Dec, 2019 | 21:01
Updated-05 Aug, 2024 | 00:05
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Insufficient validation of untrusted input in Blink in Google Chrome prior to 79.0.3945.79 allowed a local attacker to bypass same origin policy via crafted clipboard content.

Action-Not Available
Vendor-Google LLCRed Hat, Inc.Fedora ProjectDebian GNU/Linux
Product-enterprise_linux_serverenterprise_linux_for_scientific_computingdebian_linuxchromeenterprise_linux_workstationfedoraenterprise_linux_desktopChrome
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2018-6051
Matching Score-6
Assigner-Chrome
ShareView Details
Matching Score-6
Assigner-Chrome
CVSS Score-4.3||MEDIUM
EPSS-0.57% / 67.63%
||
7 Day CHG-0.02%
Published-25 Sep, 2018 | 14:00
Updated-05 Aug, 2024 | 05:54
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

XSS Auditor in Google Chrome prior to 64.0.3282.119, did not ensure the reporting URL was in the same origin as the page it was on, which allowed a remote attacker to obtain referrer details via a crafted HTML page.

Action-Not Available
Vendor-Red Hat, Inc.Google LLCDebian GNU/Linux
Product-enterprise_linux_serverdebian_linuxchromeenterprise_linux_workstationenterprise_linux_desktopChrome
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2018-6076
Matching Score-6
Assigner-Chrome
ShareView Details
Matching Score-6
Assigner-Chrome
CVSS Score-6.1||MEDIUM
EPSS-0.52% / 65.62%
||
7 Day CHG~0.00%
Published-14 Nov, 2018 | 15:00
Updated-05 Aug, 2024 | 05:54
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Insufficient encoding of URL fragment identifiers in Blink in Google Chrome prior to 65.0.3325.146 allowed a remote attacker to perform a DOM based XSS attack via a crafted HTML page.

Action-Not Available
Vendor-Red Hat, Inc.Google LLCDebian GNU/Linux
Product-debian_linuxchromelinux_workstationlinux_serverlinux_desktopChrome
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2018-6081
Matching Score-6
Assigner-Chrome
ShareView Details
Matching Score-6
Assigner-Chrome
CVSS Score-6.1||MEDIUM
EPSS-0.40% / 59.58%
||
7 Day CHG~0.00%
Published-14 Nov, 2018 | 15:00
Updated-05 Aug, 2024 | 05:54
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

XSS vulnerabilities in Interstitials in Google Chrome prior to 65.0.3325.146 allowed an attacker who convinced a user to install a malicious extension or open Developer Console to inject arbitrary scripts or HTML via a crafted HTML page.

Action-Not Available
Vendor-Red Hat, Inc.Google LLCDebian GNU/Linux
Product-debian_linuxchromelinux_workstationlinux_serverlinux_desktopChrome
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2016-6347
Matching Score-6
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-6
Assigner-Red Hat, Inc.
CVSS Score-6.1||MEDIUM
EPSS-0.20% / 42.31%
||
7 Day CHG~0.00%
Published-20 Apr, 2017 | 17:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Cross-site scripting (XSS) vulnerability in the default exception handler in RESTEasy allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.

Action-Not Available
Vendor-n/aRed Hat, Inc.
Product-resteasyn/a
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2016-8639
Matching Score-6
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-6
Assigner-Red Hat, Inc.
CVSS Score-6.1||MEDIUM
EPSS-0.58% / 67.99%
||
7 Day CHG~0.00%
Published-01 Aug, 2018 | 13:00
Updated-06 Aug, 2024 | 02:27
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

It was found that foreman before 1.13.0 is vulnerable to a stored XSS via an organization or location name. This could allow an attacker with privileges to set the organization or location name to display arbitrary HTML including scripting code within the web interface.

Action-Not Available
Vendor-Red Hat, Inc.The Foreman
Product-satelliteforemansatellite_capsuleforeman
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2018-3830
Matching Score-6
Assigner-Elastic
ShareView Details
Matching Score-6
Assigner-Elastic
CVSS Score-6.1||MEDIUM
EPSS-0.43% / 61.40%
||
7 Day CHG~0.00%
Published-19 Sep, 2018 | 19:00
Updated-05 Aug, 2024 | 04:57
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Kibana versions 5.3.0 to 6.4.1 had a cross-site scripting (XSS) vulnerability via the source field formatter that could allow an attacker to obtain sensitive information from or perform destructive actions on behalf of other Kibana users.

Action-Not Available
Vendor-Red Hat, Inc.Elasticsearch BV
Product-kibanaopenshift_container_platformKibana
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2018-9090
Matching Score-6
Assigner-MITRE Corporation
ShareView Details
Matching Score-6
Assigner-MITRE Corporation
CVSS Score-6.1||MEDIUM
EPSS-0.27% / 50.60%
||
7 Day CHG~0.00%
Published-24 Sep, 2019 | 13:38
Updated-05 Aug, 2024 | 07:17
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

CoreOS Tectonic 1.7.x and 1.8.x before 1.8.7-tectonic.2 deploys the Grafana web application using default credentials (admin/admin) for the administrator account located at grafana-credentials secret. This occurs because CoreOS does not randomize the administrative password to later be configured by Tectonic administrators. An attacker can insert an XSS payload into the dashboards.

Action-Not Available
Vendor-n/aRed Hat, Inc.
Product-tectonicn/a
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
  • Previous
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • Next
Details not found