Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2024-10234

Summary
Assigner-redhat
Assigner Org ID-53f830b8-0a3f-465b-8143-3b8a9948e749
Published At-22 Oct, 2024 | 13:17
Updated At-23 Jul, 2025 | 18:24
Rejected At-
Credits

Wildfly: wildfly vulnerable to cross-site scripting (xss)

A vulnerability was found in Wildfly, where a user may perform Cross-site scripting in the Wildfly deployment system. This flaw allows an attacker or insider to execute a deployment with a malicious payload, which could trigger undesired behavior against the server.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:redhat
Assigner Org ID:53f830b8-0a3f-465b-8143-3b8a9948e749
Published At:22 Oct, 2024 | 13:17
Updated At:23 Jul, 2025 | 18:24
Rejected At:
▼CVE Numbering Authority (CNA)
Wildfly: wildfly vulnerable to cross-site scripting (xss)

A vulnerability was found in Wildfly, where a user may perform Cross-site scripting in the Wildfly deployment system. This flaw allows an attacker or insider to execute a deployment with a malicious payload, which could trigger undesired behavior against the server.

Affected Products
Collection URL
https://github.com/wildfly/wildfly
Package Name
wildfly
Default Status
unaffected
Versions
Affected
  • From 35.0.0 before 35.0.0 (semver)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 7.4.23
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
org.wildfly.core/wildfly-core-management-subsystem
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:7.4::el7
Default Status
unaffected
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 7.4 for RHEL 8
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap7-activemq-artemis
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:7.4::el8
Default Status
affected
Versions
Unaffected
  • From 0:2.16.0-21.redhat_00055.1.el8eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 7.4 for RHEL 8
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap7-apache-cxf
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:7.4::el8
Default Status
affected
Versions
Unaffected
  • From 0:3.5.10-1.redhat_00001.1.el8eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 7.4 for RHEL 8
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap7-artemis-native
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:7.4::el8
Default Status
affected
Versions
Unaffected
  • From 1:1.0.2-5.redhat_00004.1.el8eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 7.4 for RHEL 8
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap7-elytron-web
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:7.4::el8
Default Status
affected
Versions
Unaffected
  • From 0:1.9.6-1.Final_redhat_00001.1.el8eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 7.4 for RHEL 8
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap7-glassfish-jsf
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:7.4::el8
Default Status
affected
Versions
Unaffected
  • From 0:2.3.14-9.SP10_redhat_00001.1.el8eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 7.4 for RHEL 8
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap7-hal-console
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:7.4::el8
Default Status
affected
Versions
Unaffected
  • From 0:3.3.27-1.Final_redhat_00001.1.el8eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 7.4 for RHEL 8
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap7-hibernate-validator
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:7.4::el8
Default Status
affected
Versions
Unaffected
  • From 0:6.0.23-3.SP2_redhat_00001.1.el8eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 7.4 for RHEL 8
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap7-ironjacamar
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:7.4::el8
Default Status
affected
Versions
Unaffected
  • From 0:1.5.21-1.Final_redhat_00001.1.el8eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 7.4 for RHEL 8
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap7-jboss-server-migration
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:7.4::el8
Default Status
affected
Versions
Unaffected
  • From 0:1.10.0-42.Final_redhat_00042.1.el8eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 7.4 for RHEL 8
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap7-jbossws-cxf
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:7.4::el8
Default Status
affected
Versions
Unaffected
  • From 0:5.4.15-1.Final_redhat_00001.1.el8eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 7.4 for RHEL 8
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap7-wildfly
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:7.4::el8
Default Status
affected
Versions
Unaffected
  • From 0:7.4.23-3.GA_redhat_00002.1.el8eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 7.4 for RHEL 8
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap7-wildfly-elytron
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:7.4::el8
Default Status
affected
Versions
Unaffected
  • From 0:1.15.26-1.Final_redhat_00001.1.el8eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 7.4 for RHEL 9
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap7-activemq-artemis
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:7.4::el9
Default Status
affected
Versions
Unaffected
  • From 0:2.16.0-21.redhat_00055.1.el9eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 7.4 for RHEL 9
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap7-apache-cxf
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:7.4::el9
Default Status
affected
Versions
Unaffected
  • From 0:3.5.10-1.redhat_00001.1.el9eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 7.4 for RHEL 9
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap7-artemis-native
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:7.4::el9
Default Status
affected
Versions
Unaffected
  • From 1:1.0.2-5.redhat_00004.1.el9eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 7.4 for RHEL 9
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap7-elytron-web
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:7.4::el9
Default Status
affected
Versions
Unaffected
  • From 0:1.9.6-1.Final_redhat_00001.1.el9eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 7.4 for RHEL 9
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap7-glassfish-jsf
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:7.4::el9
Default Status
affected
Versions
Unaffected
  • From 0:2.3.14-9.SP10_redhat_00001.1.el9eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 7.4 for RHEL 9
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap7-hal-console
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:7.4::el9
Default Status
affected
Versions
Unaffected
  • From 0:3.3.27-1.Final_redhat_00001.1.el9eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 7.4 for RHEL 9
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap7-hibernate-validator
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:7.4::el9
Default Status
affected
Versions
Unaffected
  • From 0:6.0.23-3.SP2_redhat_00001.1.el9eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 7.4 for RHEL 9
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap7-ironjacamar
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:7.4::el9
Default Status
affected
Versions
Unaffected
  • From 0:1.5.21-1.Final_redhat_00001.1.el9eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 7.4 for RHEL 9
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap7-jboss-server-migration
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:7.4::el9
Default Status
affected
Versions
Unaffected
  • From 0:1.10.0-42.Final_redhat_00042.1.el9eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 7.4 for RHEL 9
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap7-jbossws-cxf
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:7.4::el9
Default Status
affected
Versions
Unaffected
  • From 0:5.4.15-1.Final_redhat_00001.1.el9eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 7.4 for RHEL 9
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap7-wildfly
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:7.4::el9
Default Status
affected
Versions
Unaffected
  • From 0:7.4.23-3.GA_redhat_00002.1.el9eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 7.4 for RHEL 9
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap7-wildfly-elytron
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:7.4::el9
Default Status
affected
Versions
Unaffected
  • From 0:1.15.26-1.Final_redhat_00001.1.el9eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 7.4 on RHEL 7
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap7-activemq-artemis
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:7.4::el7
Default Status
affected
Versions
Unaffected
  • From 0:2.16.0-21.redhat_00055.1.el7eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 7.4 on RHEL 7
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap7-apache-cxf
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:7.4::el7
Default Status
affected
Versions
Unaffected
  • From 0:3.5.10-1.redhat_00001.1.el7eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 7.4 on RHEL 7
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap7-artemis-native
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:7.4::el7
Default Status
affected
Versions
Unaffected
  • From 1:1.0.2-5.redhat_00004.1.el7eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 7.4 on RHEL 7
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap7-elytron-web
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:7.4::el7
Default Status
affected
Versions
Unaffected
  • From 0:1.9.6-1.Final_redhat_00001.1.el7eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 7.4 on RHEL 7
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap7-glassfish-jsf
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:7.4::el7
Default Status
affected
Versions
Unaffected
  • From 0:2.3.14-9.SP10_redhat_00001.1.el7eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 7.4 on RHEL 7
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap7-hal-console
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:7.4::el7
Default Status
affected
Versions
Unaffected
  • From 0:3.3.27-1.Final_redhat_00001.1.el7eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 7.4 on RHEL 7
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap7-hibernate-validator
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:7.4::el7
Default Status
affected
Versions
Unaffected
  • From 0:6.0.23-3.SP2_redhat_00001.1.el7eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 7.4 on RHEL 7
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap7-ironjacamar
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:7.4::el7
Default Status
affected
Versions
Unaffected
  • From 0:1.5.21-1.Final_redhat_00001.1.el7eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 7.4 on RHEL 7
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap7-jboss-server-migration
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:7.4::el7
Default Status
affected
Versions
Unaffected
  • From 0:1.10.0-42.Final_redhat_00042.1.el7eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 7.4 on RHEL 7
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap7-jbossws-cxf
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:7.4::el7
Default Status
affected
Versions
Unaffected
  • From 0:5.4.15-1.Final_redhat_00001.1.el7eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 7.4 on RHEL 7
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap7-wildfly
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:7.4::el7
Default Status
affected
Versions
Unaffected
  • From 0:7.4.23-3.GA_redhat_00002.1.el7eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 7.4 on RHEL 7
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap7-wildfly-elytron
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:7.4::el7
Default Status
affected
Versions
Unaffected
  • From 0:1.15.26-1.Final_redhat_00001.1.el7eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
org.wildfly.core/wildfly-core-management-subsystem
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0
Default Status
unaffected
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 8
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-artemis-wildfly-integration
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el8
Default Status
affected
Versions
Unaffected
  • From 0:2.0.3-1.Final_redhat_00001.1.el8eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 8
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-azure-storage
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el8
Default Status
affected
Versions
Unaffected
  • From 0:8.6.6-5.redhat_00001.1.el8eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 8
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-eap-product-conf-parent
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el8
Default Status
affected
Versions
Unaffected
  • From 0:800.6.0-2.GA_redhat_00002.1.el8eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 8
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-gnu-getopt
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el8
Default Status
affected
Versions
Unaffected
  • From 0:1.0.13-2.redhat_5.1.el8eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 8
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-h2database
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el8
Default Status
affected
Versions
Unaffected
  • From 0:2.1.214-2.redhat_00001.1.el8eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 8
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-hal-console
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el8
Default Status
affected
Versions
Unaffected
  • From 0:3.6.23-1.Final_redhat_00001.1.el8eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 8
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-hibernate-commons-annotations
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el8
Default Status
affected
Versions
Unaffected
  • From 0:6.0.6-2.Final_redhat_00001.1.el8eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 8
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-jackson-coreutils
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el8
Default Status
affected
Versions
Unaffected
  • From 0:1.8.0-2.redhat_00002.1.el8eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 8
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-jakarta-authentication-api
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el8
Default Status
affected
Versions
Unaffected
  • From 0:3.0.0-3.redhat_00001.1.el8eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 8
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-jakarta-authorization-api
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el8
Default Status
affected
Versions
Unaffected
  • From 0:2.1.0-3.redhat_00001.1.el8eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 8
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-jakarta-enterprise-concurrent
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el8
Default Status
affected
Versions
Unaffected
  • From 0:3.0.0-4.redhat_00001.1.el8eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 8
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-jakarta-enterprise-concurrent-api
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el8
Default Status
affected
Versions
Unaffected
  • From 0:3.0.2-2.redhat_00001.1.el8eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 8
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-jakarta-enterprise-lang-model
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el8
Default Status
affected
Versions
Unaffected
  • From 0:4.0.1-2.redhat_00001.1.el8eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 8
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-jakarta-security-enterprise-api
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el8
Default Status
affected
Versions
Unaffected
  • From 0:3.0.0-2.redhat_00001.1.el8eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 8
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-jakarta-servlet-jsp-api
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el8
Default Status
affected
Versions
Unaffected
  • From 0:3.1.0-3.redhat_00001.1.el8eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 8
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-javaewah
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el8
Default Status
affected
Versions
Unaffected
  • From 0:1.1.13-2.redhat_00001.1.el8eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 8
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-jboss-aesh
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el8
Default Status
affected
Versions
Unaffected
  • From 0:2.4.0-2.redhat_00001.1.el8eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 8
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-jboss-common-beans
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el8
Default Status
affected
Versions
Unaffected
  • From 0:2.0.1-2.Final_redhat_00001.1.el8eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 8
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-jboss-dmr
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el8
Default Status
affected
Versions
Unaffected
  • From 0:1.6.1-2.Final_redhat_00001.1.el8eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 8
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-jboss-ejb3-ext-api
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el8
Default Status
affected
Versions
Unaffected
  • From 0:2.3.0-2.Final_redhat_00001.1.el8eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 8
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-jboss-el-api_5.0_spec
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el8
Default Status
affected
Versions
Unaffected
  • From 0:4.0.1-2.Final_redhat_00001.1.el8eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 8
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-jboss-genericjms
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el8
Default Status
affected
Versions
Unaffected
  • From 0:3.0.0-3.Final_redhat_00001.1.el8eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 8
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-jboss-iiop-client
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el8
Default Status
affected
Versions
Unaffected
  • From 0:2.0.1-2.Final_redhat_00001.1.el8eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 8
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-jboss-invocation
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el8
Default Status
affected
Versions
Unaffected
  • From 0:2.0.0-2.Final_redhat_00001.1.el8eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 8
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-jboss-logmanager
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el8
Default Status
affected
Versions
Unaffected
  • From 0:2.1.19-2.Final_redhat_00001.1.el8eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 8
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-jboss-msc
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el8
Default Status
affected
Versions
Unaffected
  • From 0:1.5.1-2.Final_redhat_00001.1.el8eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 8
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-jboss-remoting-jmx
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el8
Default Status
affected
Versions
Unaffected
  • From 0:3.0.4-2.Final_redhat_00001.1.el8eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 8
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-jboss-stdio
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el8
Default Status
affected
Versions
Unaffected
  • From 0:1.1.0-2.Final_redhat_00001.1.el8eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 8
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-jboss-threads
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el8
Default Status
affected
Versions
Unaffected
  • From 0:2.4.0-3.Final_redhat_00001.1.el8eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 8
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-jboss-transaction-spi
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el8
Default Status
affected
Versions
Unaffected
  • From 0:8.0.0-3.Final_redhat_00001.1.el8eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 8
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-jboss-vfs
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el8
Default Status
affected
Versions
Unaffected
  • From 0:3.3.0-2.Final_redhat_00001.1.el8eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 8
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-jbossws-api
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el8
Default Status
affected
Versions
Unaffected
  • From 0:3.0.0-2.Final_redhat_00001.1.el8eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 8
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-jbossws-common
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el8
Default Status
affected
Versions
Unaffected
  • From 0:5.1.0-1.Final_redhat_00001.1.el8eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 8
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-jbossws-cxf
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el8
Default Status
affected
Versions
Unaffected
  • From 0:7.3.1-1.Final_redhat_00001.1.el8eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 8
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-jbossws-spi
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el8
Default Status
affected
Versions
Unaffected
  • From 0:5.0.0-2.Final_redhat_00001.1.el8eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 8
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-jcip-annotations
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el8
Default Status
affected
Versions
Unaffected
  • From 0:1.0.0-2.redhat_8.1.el8eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 8
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-json-patch
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el8
Default Status
affected
Versions
Unaffected
  • From 0:1.9.0-2.redhat_00002.1.el8eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 8
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-jul-to-slf4j-stub
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el8
Default Status
affected
Versions
Unaffected
  • From 0:1.0.1-2.Final_redhat_3.1.el8eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 8
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-reactivex-rxjava2
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el8
Default Status
affected
Versions
Unaffected
  • From 0:2.2.21-2.redhat_00001.2.el8eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 8
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-slf4j-jboss-logmanager
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el8
Default Status
affected
Versions
Unaffected
  • From 0:2.0.1-2.Final_redhat_00001.1.el8eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 8
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-staxmapper
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el8
Default Status
affected
Versions
Unaffected
  • From 0:1.4.0-2.Final_redhat_00001.1.el8eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 8
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-wildfly
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el8
Default Status
affected
Versions
Unaffected
  • From 0:8.0.6-5.GA_redhat_00004.1.el8eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 8
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-wildfly-common
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el8
Default Status
affected
Versions
Unaffected
  • From 0:1.6.0-4.Final_redhat_00001.1.el8eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 8
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-woodstox-core
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el8
Default Status
affected
Versions
Unaffected
  • From 0:6.4.0-3.redhat_00003.1.el8eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 8
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-xml-commons-resolver
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el8
Default Status
affected
Versions
Unaffected
  • From 0:1.2.0-3.redhat_12.1.el8eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 9
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-artemis-wildfly-integration
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el9
Default Status
affected
Versions
Unaffected
  • From 0:2.0.3-1.Final_redhat_00001.1.el9eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 9
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-azure-storage
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el9
Default Status
affected
Versions
Unaffected
  • From 0:8.6.6-5.redhat_00001.1.el9eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 9
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-eap-product-conf-parent
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el9
Default Status
affected
Versions
Unaffected
  • From 0:800.6.0-2.GA_redhat_00002.1.el9eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 9
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-gnu-getopt
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el9
Default Status
affected
Versions
Unaffected
  • From 0:1.0.13-2.redhat_5.1.el9eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 9
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-h2database
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el9
Default Status
affected
Versions
Unaffected
  • From 0:2.1.214-2.redhat_00001.1.el9eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 9
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-hal-console
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el9
Default Status
affected
Versions
Unaffected
  • From 0:3.6.23-1.Final_redhat_00001.1.el9eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 9
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-hibernate-commons-annotations
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el9
Default Status
affected
Versions
Unaffected
  • From 0:6.0.6-2.Final_redhat_00001.1.el9eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 9
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-jackson-coreutils
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el9
Default Status
affected
Versions
Unaffected
  • From 0:1.8.0-2.redhat_00002.1.el9eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 9
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-jakarta-authentication-api
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el9
Default Status
affected
Versions
Unaffected
  • From 0:3.0.0-3.redhat_00001.1.el9eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 9
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-jakarta-authorization-api
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el9
Default Status
affected
Versions
Unaffected
  • From 0:2.1.0-3.redhat_00001.1.el9eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 9
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-jakarta-enterprise-concurrent
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el9
Default Status
affected
Versions
Unaffected
  • From 0:3.0.0-4.redhat_00001.1.el9eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 9
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-jakarta-enterprise-concurrent-api
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el9
Default Status
affected
Versions
Unaffected
  • From 0:3.0.2-2.redhat_00001.1.el9eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 9
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-jakarta-enterprise-lang-model
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el9
Default Status
affected
Versions
Unaffected
  • From 0:4.0.1-2.redhat_00001.1.el9eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 9
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-jakarta-security-enterprise-api
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el9
Default Status
affected
Versions
Unaffected
  • From 0:3.0.0-2.redhat_00001.1.el9eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 9
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-jakarta-servlet-jsp-api
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el9
Default Status
affected
Versions
Unaffected
  • From 0:3.1.0-3.redhat_00001.1.el9eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 9
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-javaewah
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el9
Default Status
affected
Versions
Unaffected
  • From 0:1.1.13-2.redhat_00001.1.el9eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 9
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-jboss-aesh
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el9
Default Status
affected
Versions
Unaffected
  • From 0:2.4.0-2.redhat_00001.1.el9eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 9
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-jboss-common-beans
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el9
Default Status
affected
Versions
Unaffected
  • From 0:2.0.1-2.Final_redhat_00001.1.el9eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 9
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-jboss-dmr
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el9
Default Status
affected
Versions
Unaffected
  • From 0:1.6.1-2.Final_redhat_00001.1.el9eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 9
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-jboss-ejb3-ext-api
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el9
Default Status
affected
Versions
Unaffected
  • From 0:2.3.0-2.Final_redhat_00001.1.el9eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 9
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-jboss-el-api_5.0_spec
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el9
Default Status
affected
Versions
Unaffected
  • From 0:4.0.1-2.Final_redhat_00001.1.el9eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 9
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-jboss-genericjms
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el9
Default Status
affected
Versions
Unaffected
  • From 0:3.0.0-3.Final_redhat_00001.1.el9eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 9
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-jboss-iiop-client
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el9
Default Status
affected
Versions
Unaffected
  • From 0:2.0.1-2.Final_redhat_00001.1.el9eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 9
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-jboss-invocation
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el9
Default Status
affected
Versions
Unaffected
  • From 0:2.0.0-2.Final_redhat_00001.1.el9eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 9
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-jboss-logmanager
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el9
Default Status
affected
Versions
Unaffected
  • From 0:2.1.19-2.Final_redhat_00001.1.el9eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 9
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-jboss-msc
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el9
Default Status
affected
Versions
Unaffected
  • From 0:1.5.1-2.Final_redhat_00001.1.el9eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 9
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-jboss-remoting-jmx
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el9
Default Status
affected
Versions
Unaffected
  • From 0:3.0.4-2.Final_redhat_00001.1.el9eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 9
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-jboss-stdio
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el9
Default Status
affected
Versions
Unaffected
  • From 0:1.1.0-2.Final_redhat_00001.1.el9eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 9
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-jboss-threads
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el9
Default Status
affected
Versions
Unaffected
  • From 0:2.4.0-3.Final_redhat_00001.1.el9eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 9
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-jboss-transaction-spi
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el9
Default Status
affected
Versions
Unaffected
  • From 0:8.0.0-3.Final_redhat_00001.1.el9eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 9
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-jboss-vfs
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el9
Default Status
affected
Versions
Unaffected
  • From 0:3.3.0-2.Final_redhat_00001.1.el9eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 9
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-jbossws-api
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el9
Default Status
affected
Versions
Unaffected
  • From 0:3.0.0-2.Final_redhat_00001.1.el9eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 9
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-jbossws-common
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el9
Default Status
affected
Versions
Unaffected
  • From 0:5.1.0-1.Final_redhat_00001.1.el9eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 9
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-jbossws-cxf
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el9
Default Status
affected
Versions
Unaffected
  • From 0:7.3.1-1.Final_redhat_00001.1.el9eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 9
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-jbossws-spi
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el9
Default Status
affected
Versions
Unaffected
  • From 0:5.0.0-2.Final_redhat_00001.1.el9eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 9
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-jcip-annotations
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el9
Default Status
affected
Versions
Unaffected
  • From 0:1.0.0-2.redhat_8.1.el9eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 9
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-json-patch
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el9
Default Status
affected
Versions
Unaffected
  • From 0:1.9.0-2.redhat_00002.1.el9eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 9
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-jul-to-slf4j-stub
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el9
Default Status
affected
Versions
Unaffected
  • From 0:1.0.1-2.Final_redhat_3.1.el9eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 9
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-reactivex-rxjava2
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el9
Default Status
affected
Versions
Unaffected
  • From 0:2.2.21-2.redhat_00001.2.el9eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 9
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-slf4j-jboss-logmanager
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el9
Default Status
affected
Versions
Unaffected
  • From 0:2.0.1-2.Final_redhat_00001.1.el9eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 9
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-staxmapper
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el9
Default Status
affected
Versions
Unaffected
  • From 0:1.4.0-2.Final_redhat_00001.1.el9eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 9
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-wildfly
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el9
Default Status
affected
Versions
Unaffected
  • From 0:8.0.6-5.GA_redhat_00004.1.el9eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 9
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-wildfly-common
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el9
Default Status
affected
Versions
Unaffected
  • From 0:1.6.0-4.Final_redhat_00001.1.el9eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 9
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-woodstox-core
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el9
Default Status
affected
Versions
Unaffected
  • From 0:6.4.0-3.redhat_00003.1.el9eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 9
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-xml-commons-resolver
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el9
Default Status
affected
Versions
Unaffected
  • From 0:1.2.0-3.redhat_12.1.el9eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat Single Sign-On 7
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
org.wildfly.core/wildfly-core-management-client
CPEs
  • cpe:/a:redhat:red_hat_single_sign_on:7.6
Default Status
unaffected
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat Single Sign-On 7.6 for RHEL 7
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
rh-sso7-keycloak
CPEs
  • cpe:/a:redhat:red_hat_single_sign_on:7.6::el7
Default Status
affected
Versions
Unaffected
  • From 0:18.0.19-1.redhat_00002.1.el7sso before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat Single Sign-On 7.6 for RHEL 8
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
rh-sso7-keycloak
CPEs
  • cpe:/a:redhat:red_hat_single_sign_on:7.6::el8
Default Status
affected
Versions
Unaffected
  • From 0:18.0.19-1.redhat_00002.1.el8sso before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat Single Sign-On 7.6 for RHEL 9
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
rh-sso7-keycloak
CPEs
  • cpe:/a:redhat:red_hat_single_sign_on:7.6::el9
Default Status
affected
Versions
Unaffected
  • From 0:18.0.19-1.redhat_00002.1.el9sso before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
RHEL-8 based Middleware Containers
Collection URL
https://catalog.redhat.com/software/containers/
Package Name
rh-sso-7/sso76-openshift-rhel8
CPEs
  • cpe:/a:redhat:rhosemc:1.0::el8
Default Status
affected
Versions
Unaffected
  • From 7.6-67 before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat Build of Keycloak
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
org.wildfly.core/wildfly-core-management-subsystem
CPEs
  • cpe:/a:redhat:build_keycloak:
Default Status
affected
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat Fuse 7
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
org.wildfly.core/wildfly-core-management-subsystem
CPEs
  • cpe:/a:redhat:jboss_fuse:7
Default Status
unknown
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Data Grid 7
Collection URL
https://access.redhat.com/jbossnetwork/restricted/listSoftware.html
Package Name
org.wildfly.core/wildfly-core-management-subsystem
CPEs
  • cpe:/a:redhat:jboss_data_grid:7
Default Status
unknown
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform Expansion Pack
Collection URL
https://access.redhat.com/jbossnetwork/restricted/listSoftware.html
Package Name
org.wildfly.core/wildfly-core-management-subsystem
CPEs
  • cpe:/a:redhat:jbosseapxp
Default Status
unaffected
Problem Types
TypeCWE IDDescription
CWECWE-79Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Type: CWE
CWE ID: CWE-79
Description: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Metrics
VersionBase scoreBase severityVector
3.16.1MEDIUM
CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:N
Version: 3.1
Base score: 6.1
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:N
Metrics Other Info
Red Hat severity rating
value:
Moderate
namespace:
https://access.redhat.com/security/updates/classification/
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Reported to Red Hat.2024-10-22 01:46:48
Made public.2024-10-22 00:00:00
Event: Reported to Red Hat.
Date: 2024-10-22 01:46:48
Event: Made public.
Date: 2024-10-22 00:00:00
Replaced By

Rejected Reason

References
HyperlinkResource
https://access.redhat.com/errata/RHSA-2025:10924
vendor-advisory
x_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2025:10925
vendor-advisory
x_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2025:10926
vendor-advisory
x_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2025:10931
vendor-advisory
x_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2025:11636
vendor-advisory
x_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2025:11638
vendor-advisory
x_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2025:11639
vendor-advisory
x_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2025:11640
vendor-advisory
x_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2025:11645
vendor-advisory
x_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2025:2025
vendor-advisory
x_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2025:2026
vendor-advisory
x_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2025:2029
vendor-advisory
x_refsource_REDHAT
https://access.redhat.com/security/cve/CVE-2024-10234
vdb-entry
x_refsource_REDHAT
https://bugzilla.redhat.com/show_bug.cgi?id=2320848
issue-tracking
x_refsource_REDHAT
Hyperlink: https://access.redhat.com/errata/RHSA-2025:10924
Resource:
vendor-advisory
x_refsource_REDHAT
Hyperlink: https://access.redhat.com/errata/RHSA-2025:10925
Resource:
vendor-advisory
x_refsource_REDHAT
Hyperlink: https://access.redhat.com/errata/RHSA-2025:10926
Resource:
vendor-advisory
x_refsource_REDHAT
Hyperlink: https://access.redhat.com/errata/RHSA-2025:10931
Resource:
vendor-advisory
x_refsource_REDHAT
Hyperlink: https://access.redhat.com/errata/RHSA-2025:11636
Resource:
vendor-advisory
x_refsource_REDHAT
Hyperlink: https://access.redhat.com/errata/RHSA-2025:11638
Resource:
vendor-advisory
x_refsource_REDHAT
Hyperlink: https://access.redhat.com/errata/RHSA-2025:11639
Resource:
vendor-advisory
x_refsource_REDHAT
Hyperlink: https://access.redhat.com/errata/RHSA-2025:11640
Resource:
vendor-advisory
x_refsource_REDHAT
Hyperlink: https://access.redhat.com/errata/RHSA-2025:11645
Resource:
vendor-advisory
x_refsource_REDHAT
Hyperlink: https://access.redhat.com/errata/RHSA-2025:2025
Resource:
vendor-advisory
x_refsource_REDHAT
Hyperlink: https://access.redhat.com/errata/RHSA-2025:2026
Resource:
vendor-advisory
x_refsource_REDHAT
Hyperlink: https://access.redhat.com/errata/RHSA-2025:2029
Resource:
vendor-advisory
x_refsource_REDHAT
Hyperlink: https://access.redhat.com/security/cve/CVE-2024-10234
Resource:
vdb-entry
x_refsource_REDHAT
Hyperlink: https://bugzilla.redhat.com/show_bug.cgi?id=2320848
Resource:
issue-tracking
x_refsource_REDHAT
▼Authorized Data Publishers (ADP)
CISA ADP Vulnrichment
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:secalert@redhat.com
Published At:22 Oct, 2024 | 14:15
Updated At:23 Jul, 2025 | 19:15

A vulnerability was found in Wildfly, where a user may perform Cross-site scripting in the Wildfly deployment system. This flaw allows an attacker or insider to execute a deployment with a malicious payload, which could trigger undesired behavior against the server.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Secondary3.16.1MEDIUM
CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:N
Primary3.17.3HIGH
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N
Type: Secondary
Version: 3.1
Base score: 6.1
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:N
Type: Primary
Version: 3.1
Base score: 7.3
Base severity: HIGH
Vector:
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N
CPE Matches

Red Hat, Inc.
redhat
>>build_of_keycloak>>-
cpe:2.3:a:redhat:build_of_keycloak:-:*:*:*:*:*:*:*
Red Hat, Inc.
redhat
>>jboss_enterprise_application_platform>>8.0
cpe:2.3:a:redhat:jboss_enterprise_application_platform:8.0:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-79Secondarysecalert@redhat.com
CWE ID: CWE-79
Type: Secondary
Source: secalert@redhat.com
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://access.redhat.com/errata/RHSA-2025:10924secalert@redhat.com
N/A
https://access.redhat.com/errata/RHSA-2025:10925secalert@redhat.com
N/A
https://access.redhat.com/errata/RHSA-2025:10926secalert@redhat.com
N/A
https://access.redhat.com/errata/RHSA-2025:10931secalert@redhat.com
N/A
https://access.redhat.com/errata/RHSA-2025:11636secalert@redhat.com
N/A
https://access.redhat.com/errata/RHSA-2025:11638secalert@redhat.com
N/A
https://access.redhat.com/errata/RHSA-2025:11639secalert@redhat.com
N/A
https://access.redhat.com/errata/RHSA-2025:11640secalert@redhat.com
N/A
https://access.redhat.com/errata/RHSA-2025:11645secalert@redhat.com
N/A
https://access.redhat.com/errata/RHSA-2025:2025secalert@redhat.com
N/A
https://access.redhat.com/errata/RHSA-2025:2026secalert@redhat.com
N/A
https://access.redhat.com/errata/RHSA-2025:2029secalert@redhat.com
N/A
https://access.redhat.com/security/cve/CVE-2024-10234secalert@redhat.com
Vendor Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=2320848secalert@redhat.com
Issue Tracking
Hyperlink: https://access.redhat.com/errata/RHSA-2025:10924
Source: secalert@redhat.com
Resource: N/A
Hyperlink: https://access.redhat.com/errata/RHSA-2025:10925
Source: secalert@redhat.com
Resource: N/A
Hyperlink: https://access.redhat.com/errata/RHSA-2025:10926
Source: secalert@redhat.com
Resource: N/A
Hyperlink: https://access.redhat.com/errata/RHSA-2025:10931
Source: secalert@redhat.com
Resource: N/A
Hyperlink: https://access.redhat.com/errata/RHSA-2025:11636
Source: secalert@redhat.com
Resource: N/A
Hyperlink: https://access.redhat.com/errata/RHSA-2025:11638
Source: secalert@redhat.com
Resource: N/A
Hyperlink: https://access.redhat.com/errata/RHSA-2025:11639
Source: secalert@redhat.com
Resource: N/A
Hyperlink: https://access.redhat.com/errata/RHSA-2025:11640
Source: secalert@redhat.com
Resource: N/A
Hyperlink: https://access.redhat.com/errata/RHSA-2025:11645
Source: secalert@redhat.com
Resource: N/A
Hyperlink: https://access.redhat.com/errata/RHSA-2025:2025
Source: secalert@redhat.com
Resource: N/A
Hyperlink: https://access.redhat.com/errata/RHSA-2025:2026
Source: secalert@redhat.com
Resource: N/A
Hyperlink: https://access.redhat.com/errata/RHSA-2025:2029
Source: secalert@redhat.com
Resource: N/A
Hyperlink: https://access.redhat.com/security/cve/CVE-2024-10234
Source: secalert@redhat.com
Resource:
Vendor Advisory
Hyperlink: https://bugzilla.redhat.com/show_bug.cgi?id=2320848
Source: secalert@redhat.com
Resource:
Issue Tracking

Change History

0
Information is not available yet

Similar CVEs

291Records found

CVE-2013-6495
Matching Score-6
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-6
Assigner-Red Hat, Inc.
CVSS Score-6.1||MEDIUM
EPSS-0.34% / 56.05%
||
7 Day CHG~0.00%
Published-11 Dec, 2019 | 13:48
Updated-06 Aug, 2024 | 17:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

JBossWeb Bayeux has reflected XSS

Action-Not Available
Vendor-JBossWeb BayeuxRed Hat, Inc.
Product-jboss_enterprise_application_platformjboss_portalJBossWeb Bayeux
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2014-0149
Matching Score-6
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-6
Assigner-Red Hat, Inc.
CVSS Score-4.3||MEDIUM
EPSS-0.26% / 49.42%
||
7 Day CHG~0.00%
Published-05 May, 2014 | 17:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Multiple cross-site scripting (XSS) vulnerabilities in Red Hat JBoss Web Framework Kit 2.5.0 allow remote attackers to inject arbitrary web script or HTML via a (1) parameter or (2) id name.

Action-Not Available
Vendor-n/aRed Hat, Inc.
Product-jboss_web_framework_kitn/a
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2014-0141
Matching Score-6
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-6
Assigner-Red Hat, Inc.
CVSS Score-6.1||MEDIUM
EPSS-0.28% / 50.97%
||
7 Day CHG~0.00%
Published-28 Aug, 2017 | 15:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Cross-site scripting (XSS) vulnerability in Red Hat Satellite 6.0.3.

Action-Not Available
Vendor-n/aRed Hat, Inc.
Product-satelliten/a
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2013-5612
Matching Score-6
Assigner-Mozilla Corporation
ShareView Details
Matching Score-6
Assigner-Mozilla Corporation
CVSS Score-4.3||MEDIUM
EPSS-0.74% / 71.96%
||
7 Day CHG~0.00%
Published-11 Dec, 2013 | 15:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Cross-site scripting (XSS) vulnerability in Mozilla Firefox before 26.0 and SeaMonkey before 2.23 makes it easier for remote attackers to inject arbitrary web script or HTML by leveraging a Same Origin Policy violation triggered by lack of a charset parameter in a Content-Type HTTP header.

Action-Not Available
Vendor-n/aMozilla CorporationopenSUSESUSERed Hat, Inc.Fedora ProjectOracle CorporationCanonical Ltd.
Product-enterprise_linux_serversolarisenterprise_linux_eusfirefoxenterprise_linux_server_euslinux_enterprise_desktoplinux_enterprise_software_development_kitenterprise_linux_server_ausfedoraseamonkeyopensuseubuntu_linuxenterprise_linux_desktopenterprise_linux_server_tusenterprise_linux_workstationlinux_enterprise_servern/a
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2013-4424
Matching Score-6
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-6
Assigner-Red Hat, Inc.
CVSS Score-4.3||MEDIUM
EPSS-0.26% / 49.42%
||
7 Day CHG~0.00%
Published-23 Dec, 2013 | 23:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Multiple cross-site scripting (XSS) vulnerabilities in the GateIn Portal component in Red Hat JBoss Portal 6.1.0 allow remote attackers to inject arbitrary web script or HTML via unspecified vectors.

Action-Not Available
Vendor-n/aRed Hat, Inc.
Product-jboss_enterprise_portal_platformn/a
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2019-17022
Matching Score-6
Assigner-Mozilla Corporation
ShareView Details
Matching Score-6
Assigner-Mozilla Corporation
CVSS Score-6.1||MEDIUM
EPSS-2.47% / 84.65%
||
7 Day CHG~0.00%
Published-08 Jan, 2020 | 21:30
Updated-05 Aug, 2024 | 01:24
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

When pasting a &lt;style&gt; tag from the clipboard into a rich text editor, the CSS sanitizer does not escape &lt; and &gt; characters. Because the resulting string is pasted directly into the text node of the element this does not result in a direct injection into the webpage; however, if a webpage subsequently copies the node's innerHTML, assigning it to another innerHTML, this would result in an XSS vulnerability. Two WYSIWYG editors were identified with this behavior, more may exist. This vulnerability affects Firefox ESR < 68.4 and Firefox < 72.

Action-Not Available
Vendor-Canonical Ltd.Red Hat, Inc.Mozilla CorporationDebian GNU/Linux
Product-enterprise_linux_serverubuntu_linuxdebian_linuxfirefoxfirefox_esrenterprise_linux_server_ausenterprise_linux_workstationenterprise_linux_server_tusenterprise_linux_desktopFirefoxFirefox ESR
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2013-4372
Matching Score-6
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-6
Assigner-Red Hat, Inc.
CVSS Score-4.3||MEDIUM
EPSS-0.42% / 61.18%
||
7 Day CHG~0.00%
Published-30 Sep, 2013 | 19:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Multiple cross-site scripting (XSS) vulnerabilities in Fuse Management Console in Red Hat JBoss Fuse 6.0.0 before patch 3 and JBoss A-MQ 6.0.0 before patch 3 allow remote attackers to inject arbitrary web script or HTML via the (1) user field in the create user page or (2) profile version to the create profile page.

Action-Not Available
Vendor-n/aRed Hat, Inc.
Product-jboss_a-mqjboss_fusen/a
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2013-4414
Matching Score-6
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-6
Assigner-Red Hat, Inc.
CVSS Score-4.3||MEDIUM
EPSS-0.30% / 52.54%
||
7 Day CHG~0.00%
Published-23 Dec, 2013 | 22:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Cross-site scripting (XSS) vulnerability in the web interface for cumin in Red Hat Enterprise MRG Grid 2.4 allows remote attackers to inject arbitrary web script or HTML via the "Max allowance" field in the "Set limit" form.

Action-Not Available
Vendor-n/aRed Hat, Inc.
Product-enterprise_mrgn/a
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2013-4181
Matching Score-6
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-6
Assigner-Red Hat, Inc.
CVSS Score-4.3||MEDIUM
EPSS-0.26% / 49.42%
||
7 Day CHG~0.00%
Published-16 Sep, 2013 | 19:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Cross-site scripting (XSS) vulnerability in the addAlert function in the RedirectServlet servlet in oVirt Engine and Red Hat Enterprise Virtualization Manager (RHEV-M), as used in Red Hat Enterprise Virtualization 3 and 3.2, allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.

Action-Not Available
Vendor-n/aRed Hat, Inc.
Product-enterprise_virtualizationn/a
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2013-1855
Matching Score-6
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-6
Assigner-Red Hat, Inc.
CVSS Score-4.3||MEDIUM
EPSS-0.54% / 66.47%
||
7 Day CHG~0.00%
Published-19 Mar, 2013 | 22:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The sanitize_css method in lib/action_controller/vendor/html-scanner/html/sanitizer.rb in the Action Pack component in Ruby on Rails before 2.3.18, 3.0.x and 3.1.x before 3.1.12, and 3.2.x before 3.2.13 does not properly handle \n (newline) characters, which makes it easier for remote attackers to conduct cross-site scripting (XSS) attacks via crafted Cascading Style Sheets (CSS) token sequences.

Action-Not Available
Vendor-n/aRuby on RailsRed Hat, Inc.
Product-enterprise_linuxruby_on_railsrailsn/a
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2013-1857
Matching Score-6
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-6
Assigner-Red Hat, Inc.
CVSS Score-4.3||MEDIUM
EPSS-0.62% / 69.26%
||
7 Day CHG~0.00%
Published-19 Mar, 2013 | 22:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The sanitize helper in lib/action_controller/vendor/html-scanner/html/sanitizer.rb in the Action Pack component in Ruby on Rails before 2.3.18, 3.0.x and 3.1.x before 3.1.12, and 3.2.x before 3.2.13 does not properly handle encoded : (colon) characters in URLs, which makes it easier for remote attackers to conduct cross-site scripting (XSS) attacks via a crafted scheme name, as demonstrated by including a &#x3a; sequence.

Action-Not Available
Vendor-n/aRuby on RailsRed Hat, Inc.
Product-enterprise_linuxruby_on_railsrailsn/a
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2013-1885
Matching Score-6
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-6
Assigner-Red Hat, Inc.
CVSS Score-4.3||MEDIUM
EPSS-0.24% / 46.74%
||
7 Day CHG~0.00%
Published-24 Jan, 2014 | 16:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Multiple cross-site scripting (XSS) vulnerabilities in the token processing system (pki-tps) in Red Hat Certificate System (RHCS) 8.1 and possibly Dogtag Certificate System 9 and 10 allow remote attackers to inject arbitrary web script or HTML via the PATH_INFO to (1) tus/ or (2) tus/tus/.

Action-Not Available
Vendor-n/aRed Hat, Inc.
Product-certificate_systemdogtag_certificate_systemn/a
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2013-1871
Matching Score-6
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-6
Assigner-Red Hat, Inc.
CVSS Score-3.5||LOW
EPSS-0.29% / 51.74%
||
7 Day CHG~0.00%
Published-14 Feb, 2014 | 15:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Cross-site scripting (XSS) vulnerability in account/EditAddress.do in Spacewalk and Red Hat Network (RHN) Satellite 5.6 allows remote attackers to inject arbitrary web script or HTML via the type parameter.

Action-Not Available
Vendor-n/aRed Hat, Inc.
Product-satelliten/a
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2013-1823
Matching Score-6
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-6
Assigner-Red Hat, Inc.
CVSS Score-4.3||MEDIUM
EPSS-0.28% / 50.75%
||
7 Day CHG~0.00%
Published-02 Apr, 2013 | 22:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Cross-site scripting (XSS) vulnerability in the Notifications form in Red Hat Subscription Asset Manager before 1.2.1 allows remote attackers to inject arbitrary web script or HTML via the username field.

Action-Not Available
Vendor-n/aRed Hat, Inc.
Product-subscription_asset_managern/a
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2017-15429
Matching Score-6
Assigner-Chrome
ShareView Details
Matching Score-6
Assigner-Chrome
CVSS Score-6.1||MEDIUM
EPSS-0.73% / 71.72%
||
7 Day CHG~0.00%
Published-28 Aug, 2018 | 20:00
Updated-05 Aug, 2024 | 19:57
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Inappropriate implementation in V8 WebAssembly JS bindings in Google Chrome prior to 63.0.3239.108 allowed a remote attacker to inject arbitrary scripts or HTML (UXSS) via a crafted HTML page.

Action-Not Available
Vendor-n/aRed Hat, Inc.Google LLCDebian GNU/Linux
Product-enterprise_linux_serverdebian_linuxchromeenterprise_linux_workstationenterprise_linux_desktopGoogle Chrome prior to 63.0.3239.108 unknown
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2017-15427
Matching Score-6
Assigner-Chrome
ShareView Details
Matching Score-6
Assigner-Chrome
CVSS Score-6.1||MEDIUM
EPSS-0.37% / 58.22%
||
7 Day CHG~0.00%
Published-28 Aug, 2018 | 19:00
Updated-05 Aug, 2024 | 19:57
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Insufficient policy enforcement in Omnibox in Google Chrome prior to 63.0.3239.84 allowed a socially engineered user to XSS themselves by dragging and dropping a javascript: URL into the URL bar.

Action-Not Available
Vendor-n/aRed Hat, Inc.Google LLCDebian GNU/Linux
Product-enterprise_linux_serverdebian_linuxchromeenterprise_linux_workstationenterprise_linux_desktopGoogle Chrome prior to 63.0.3239.84 unknown
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2004-2765
Matching Score-6
Assigner-MITRE Corporation
ShareView Details
Matching Score-6
Assigner-MITRE Corporation
CVSS Score-4.3||MEDIUM
EPSS-0.26% / 49.42%
||
7 Day CHG~0.00%
Published-28 Jan, 2010 | 20:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Cross-site scripting (XSS) vulnerability in Webmail in Sun ONE Messaging Server 6.1 and iPlanet Messaging Server 5.2 before 5.2hf2.02, when Internet Explorer is used, allows remote attackers to inject arbitrary web script or HTML via a crafted e-mail message, a different vulnerability than CVE-2005-2022 and CVE-2006-5486.

Action-Not Available
Vendor-n/aRed Hat, Inc.Sun Microsystems (Oracle Corporation)
Product-iplanet_messaging_serverenterprise_linuxsolarisone_messaging_servern/a
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2012-6662
Matching Score-6
Assigner-MITRE Corporation
ShareView Details
Matching Score-6
Assigner-MITRE Corporation
CVSS Score-4.3||MEDIUM
EPSS-7.54% / 91.44%
||
7 Day CHG+1.27%
Published-24 Nov, 2014 | 16:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Cross-site scripting (XSS) vulnerability in the default content option in jquery.ui.tooltip.js in the Tooltip widget in jQuery UI before 1.10.0 allows remote attackers to inject arbitrary web script or HTML via the title attribute, which is not properly handled in the autocomplete combo box demo.

Action-Not Available
Vendor-jqueryuin/aRed Hat, Inc.
Product-enterprise_linux_serverjquery_uienterprise_linux_hpc_nodeenterprise_linux_desktopenterprise_linux_workstationn/a
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2012-5841
Matching Score-6
Assigner-MITRE Corporation
ShareView Details
Matching Score-6
Assigner-MITRE Corporation
CVSS Score-4.3||MEDIUM
EPSS-1.54% / 80.65%
||
7 Day CHG~0.00%
Published-21 Nov, 2012 | 11:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Mozilla Firefox before 17.0, Firefox ESR 10.x before 10.0.11, Thunderbird before 17.0, Thunderbird ESR 10.x before 10.0.11, and SeaMonkey before 2.14 implement cross-origin wrappers with a filtering behavior that does not properly restrict write actions, which allows remote attackers to conduct cross-site scripting (XSS) attacks via a crafted web site.

Action-Not Available
Vendor-n/aSUSECanonical Ltd.Mozilla CorporationRed Hat, Inc.openSUSE
Product-enterprise_linux_desktoplinux_enterprise_serverlinux_enterprise_software_development_kitubuntu_linuxthunderbird_esrenterprise_linux_eusseamonkeyenterprise_linux_workstationthunderbirdlinux_enterprise_desktopfirefoxopensuseenterprise_linux_servern/a
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2012-6149
Matching Score-6
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-6
Assigner-Red Hat, Inc.
CVSS Score-3.5||LOW
EPSS-0.25% / 48.33%
||
7 Day CHG~0.00%
Published-14 Feb, 2014 | 15:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Multiple cross-site scripting (XSS) vulnerabilities in systems/sdc/notes.jsp in Spacewalk and Red Hat Network (RHN) Satellite 5.6 allow remote attackers to inject arbitrary web script or HTML via the (1) subject or (2) content values of a note in a system.addNote XML-RPC call.

Action-Not Available
Vendor-n/aRed Hat, Inc.
Product-satellitesatellite_5_managed_dbspacewalk-javan/a
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2011-4735
Matching Score-6
Assigner-MITRE Corporation
ShareView Details
Matching Score-6
Assigner-MITRE Corporation
CVSS Score-4.3||MEDIUM
EPSS-0.51% / 65.24%
||
7 Day CHG~0.00%
Published-16 Dec, 2011 | 11:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Multiple cross-site scripting (XSS) vulnerabilities in the Control Panel in Parallels Plesk Panel 10.2.0 build 20110407.20 allow remote attackers to inject arbitrary web script or HTML via crafted input to a PHP script, as demonstrated by smb/user/create and certain other files.

Action-Not Available
Vendor-n/aParallels International GmbhRed Hat, Inc.Microsoft Corporation
Product-enterprise_linuxwindowsparallels_plesk_paneln/a
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2012-4201
Matching Score-6
Assigner-MITRE Corporation
ShareView Details
Matching Score-6
Assigner-MITRE Corporation
CVSS Score-4.3||MEDIUM
EPSS-2.61% / 85.06%
||
7 Day CHG~0.00%
Published-21 Nov, 2012 | 11:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The evalInSandbox implementation in Mozilla Firefox before 17.0, Firefox ESR 10.x before 10.0.11, Thunderbird before 17.0, Thunderbird ESR 10.x before 10.0.11, and SeaMonkey before 2.14 uses an incorrect context during the handling of JavaScript code that sets the location.href property, which allows remote attackers to conduct cross-site scripting (XSS) attacks or read arbitrary files by leveraging a sandboxed add-on.

Action-Not Available
Vendor-n/aSUSECanonical Ltd.Mozilla CorporationRed Hat, Inc.openSUSEDebian GNU/Linux
Product-enterprise_linux_desktoplinux_enterprise_serverlinux_enterprise_software_development_kitubuntu_linuxthunderbird_esrenterprise_linux_eusseamonkeyenterprise_linux_workstationthunderbirddebian_linuxlinux_enterprise_desktopfirefoxopensuseenterprise_linux_servern/a
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2018-6070
Matching Score-6
Assigner-Chrome
ShareView Details
Matching Score-6
Assigner-Chrome
CVSS Score-6.1||MEDIUM
EPSS-0.40% / 59.58%
||
7 Day CHG~0.00%
Published-14 Nov, 2018 | 15:00
Updated-05 Aug, 2024 | 05:54
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Lack of CSP enforcement on WebUI pages in Bink in Google Chrome prior to 65.0.3325.146 allowed an attacker who convinced a user to install a malicious extension to bypass content security policy via a crafted Chrome Extension.

Action-Not Available
Vendor-Red Hat, Inc.Google LLCDebian GNU/Linux
Product-enterprise_linux_serverdebian_linuxchromeenterprise_linux_workstationenterprise_linux_desktopChrome
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2011-2920
Matching Score-6
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-6
Assigner-Red Hat, Inc.
CVSS Score-4.3||MEDIUM
EPSS-0.39% / 59.20%
||
7 Day CHG~0.00%
Published-05 Feb, 2014 | 18:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Multiple cross-site scripting (XSS) vulnerabilities in Spacewalk 1.6, as used in Red Hat Network (RHN) Satellite, allow remote attackers to inject arbitrary web script or HTML via the "Filter by Synopsis" field and other unspecified filter forms.

Action-Not Available
Vendor-n/aRed Hat, Inc.
Product-network_satellitespacewalkn/a
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2011-2927
Matching Score-6
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-6
Assigner-Red Hat, Inc.
CVSS Score-4.3||MEDIUM
EPSS-0.34% / 56.27%
||
7 Day CHG~0.00%
Published-05 Feb, 2014 | 18:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Multiple cross-site scripting (XSS) vulnerabilities in Spacewalk 1.6, as used in Red Hat Network (RHN) Satellite, allow remote attackers to inject arbitrary web script or HTML via vectors related to Search forms.

Action-Not Available
Vendor-n/aRed Hat, Inc.
Product-network_satellitespacewalkn/a
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2011-3606
Matching Score-6
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-6
Assigner-Red Hat, Inc.
CVSS Score-5.4||MEDIUM
EPSS-0.40% / 59.99%
||
7 Day CHG~0.00%
Published-26 Nov, 2019 | 01:43
Updated-06 Aug, 2024 | 23:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A DOM based cross-site scripting flaw was found in the JBoss Application Server 7 before 7.1.0 Beta 1 administration console. A remote attacker could provide a specially-crafted web page and trick the valid JBoss AS user, with the administrator privilege, to visit it, which would lead into the DOM environment modification and arbitrary HTML or web script execution.

Action-Not Available
Vendor-JBoss Application ServerRed Hat, Inc.
Product-jboss_application_serverJBoss Application Server
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2013-0186
Matching Score-6
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-6
Assigner-Red Hat, Inc.
CVSS Score-6.1||MEDIUM
EPSS-0.40% / 59.96%
||
7 Day CHG~0.00%
Published-01 Nov, 2019 | 18:38
Updated-06 Aug, 2024 | 14:18
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Multiple cross-site scripting (XSS) vulnerabilities in ManageIQ EVM allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.

Action-Not Available
Vendor-ManageIQ EVMRed Hat, Inc.
Product-cloudformsmanageiq_enterprise_virtualization_managerManageIQ EVMRed Hat CloudForms 3.0
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2012-4194
Matching Score-6
Assigner-MITRE Corporation
ShareView Details
Matching Score-6
Assigner-MITRE Corporation
CVSS Score-4.3||MEDIUM
EPSS-1.36% / 79.37%
||
7 Day CHG~0.00%
Published-29 Oct, 2012 | 18:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Mozilla Firefox before 16.0.2, Firefox ESR 10.x before 10.0.10, Thunderbird before 16.0.2, Thunderbird ESR 10.x before 10.0.10, and SeaMonkey before 2.13.2 do not prevent use of the valueOf method to shadow the location object (aka window.location), which makes it easier for remote attackers to conduct cross-site scripting (XSS) attacks via vectors involving a plugin.

Action-Not Available
Vendor-n/aSUSECanonical Ltd.Mozilla CorporationRed Hat, Inc.openSUSE
Product-enterprise_linux_desktoplinux_enterprise_serverlinux_enterprise_software_development_kitubuntu_linuxthunderbird_esrenterprise_linux_eusseamonkeyenterprise_linux_workstationthunderbirdlinux_enterprise_desktopfirefoxopensuseenterprise_linux_servern/a
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2012-5531
Matching Score-6
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-6
Assigner-Red Hat, Inc.
CVSS Score-4.3||MEDIUM
EPSS-0.25% / 47.89%
||
7 Day CHG~0.00%
Published-18 Jan, 2013 | 11:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Multiple cross-site scripting (XSS) vulnerabilities in the GateIn Portal in JBoss Enterprise Portal Platform 5.2.2 allow remote attackers to inject arbitrary web script or HTML via unspecified vectors.

Action-Not Available
Vendor-n/aRed Hat, Inc.
Product-jboss_enterprise_portal_platformn/a
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2012-4543
Matching Score-6
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-6
Assigner-Red Hat, Inc.
CVSS Score-4.3||MEDIUM
EPSS-0.24% / 46.74%
||
7 Day CHG~0.00%
Published-04 Jan, 2013 | 22:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Multiple cross-site scripting (XSS) vulnerabilities in Red Hat Certificate System (RHCS) before 8.1.3 allow remote attackers to inject arbitrary web script or HTML via the (1) pageStart or (2) pageSize to the displayCRL script, or (3) nonce variable to the profileProcess script.

Action-Not Available
Vendor-n/aRed Hat, Inc.
Product-certificate_systemn/a
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2012-4451
Matching Score-6
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-6
Assigner-Red Hat, Inc.
CVSS Score-6.1||MEDIUM
EPSS-1.78% / 81.94%
||
7 Day CHG~0.00%
Published-03 Jan, 2020 | 16:03
Updated-06 Aug, 2024 | 20:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Multiple cross-site scripting (XSS) vulnerabilities in Zend Framework 2.0.x before 2.0.1 allow remote attackers to inject arbitrary web script or HTML via unspecified input to (1) Debug, (2) Feed\PubSubHubbub, (3) Log\Formatter\Xml, (4) Tag\Cloud\Decorator, (5) Uri, (6) View\Helper\HeadStyle, (7) View\Helper\Navigation\Sitemap, or (8) View\Helper\Placeholder\Container\AbstractStandalone, related to Escaper.

Action-Not Available
Vendor-Red Hat, Inc.Fedora ProjectPerforce Software, Inc.
Product-enterprise_linuxfedorazend_frameworkZend Framework
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2012-4195
Matching Score-6
Assigner-MITRE Corporation
ShareView Details
Matching Score-6
Assigner-MITRE Corporation
CVSS Score-4.3||MEDIUM
EPSS-0.96% / 75.56%
||
7 Day CHG~0.00%
Published-29 Oct, 2012 | 18:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The nsLocation::CheckURL function in Mozilla Firefox before 16.0.2, Firefox ESR 10.x before 10.0.10, Thunderbird before 16.0.2, Thunderbird ESR 10.x before 10.0.10, and SeaMonkey before 2.13.2 does not properly determine the calling document and principal in its return value, which makes it easier for remote attackers to conduct cross-site scripting (XSS) attacks via a crafted web site, and makes it easier for remote attackers to execute arbitrary JavaScript code by leveraging certain add-on behavior.

Action-Not Available
Vendor-n/aSUSECanonical Ltd.Mozilla CorporationRed Hat, Inc.openSUSE
Product-enterprise_linux_desktoplinux_enterprise_serverlinux_enterprise_software_development_kitubuntu_linuxthunderbird_esrenterprise_linux_eusseamonkeyenterprise_linux_workstationthunderbirdlinux_enterprise_desktopfirefoxopensuseenterprise_linux_servern/a
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2018-16084
Matching Score-6
Assigner-Chrome
ShareView Details
Matching Score-6
Assigner-Chrome
CVSS Score-6.1||MEDIUM
EPSS-0.34% / 56.02%
||
7 Day CHG~0.00%
Published-09 Jan, 2019 | 19:00
Updated-05 Aug, 2024 | 10:17
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The default selected dialog button in CustomHandlers in Google Chrome prior to 69.0.3497.81 allowed a remote attacker who convinced the user to perform certain operations to open external programs via a crafted HTML page.

Action-Not Available
Vendor-Red Hat, Inc.Google LLC
Product-chromeenterprise_linux_desktopenterprise_linux_workstationenterprise_linux_serverChrome
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2012-3992
Matching Score-6
Assigner-MITRE Corporation
ShareView Details
Matching Score-6
Assigner-MITRE Corporation
CVSS Score-4.3||MEDIUM
EPSS-1.14% / 77.51%
||
7 Day CHG~0.00%
Published-10 Oct, 2012 | 17:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Mozilla Firefox before 16.0, Firefox ESR 10.x before 10.0.8, Thunderbird before 16.0, Thunderbird ESR 10.x before 10.0.8, and SeaMonkey before 2.13 do not properly manage history data, which allows remote attackers to conduct cross-site scripting (XSS) attacks or obtain sensitive POST content via vectors involving a location.hash write operation and history navigation that triggers the loading of a URL into the history object.

Action-Not Available
Vendor-n/aSUSECanonical Ltd.Mozilla CorporationRed Hat, Inc.
Product-linux_enterprise_sdkenterprise_linux_desktoplinux_enterprise_serverubuntu_linuxthunderbird_esrenterprise_linux_eusseamonkeyenterprise_linux_workstationthunderbirdlinux_enterprise_desktopfirefoxenterprise_linux_servern/a
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2012-4209
Matching Score-6
Assigner-MITRE Corporation
ShareView Details
Matching Score-6
Assigner-MITRE Corporation
CVSS Score-4.3||MEDIUM
EPSS-2.07% / 83.20%
||
7 Day CHG~0.00%
Published-21 Nov, 2012 | 11:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Mozilla Firefox before 17.0, Firefox ESR 10.x before 10.0.11, Thunderbird before 17.0, Thunderbird ESR 10.x before 10.0.11, and SeaMonkey before 2.14 do not prevent use of a "top" frame name-attribute value to access the location property, which makes it easier for remote attackers to conduct cross-site scripting (XSS) attacks via vectors involving a binary plugin.

Action-Not Available
Vendor-n/aSUSECanonical Ltd.Mozilla CorporationRed Hat, Inc.openSUSE
Product-enterprise_linux_desktoplinux_enterprise_serverlinux_enterprise_software_development_kitubuntu_linuxthunderbird_esrenterprise_linux_eusseamonkeyenterprise_linux_workstationthunderbirdlinux_enterprise_desktopfirefoxopensuseenterprise_linux_servern/a
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2012-4184
Matching Score-6
Assigner-MITRE Corporation
ShareView Details
Matching Score-6
Assigner-MITRE Corporation
CVSS Score-4.3||MEDIUM
EPSS-1.10% / 77.16%
||
7 Day CHG~0.00%
Published-10 Oct, 2012 | 17:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The Chrome Object Wrapper (COW) implementation in Mozilla Firefox before 16.0, Firefox ESR 10.x before 10.0.8, Thunderbird before 16.0, Thunderbird ESR 10.x before 10.0.8, and SeaMonkey before 2.13 does not prevent access to properties of a prototype for a standard class, which allows remote attackers to execute arbitrary JavaScript code with chrome privileges via a crafted web site.

Action-Not Available
Vendor-n/aSUSECanonical Ltd.Mozilla CorporationRed Hat, Inc.
Product-linux_enterprise_sdkenterprise_linux_desktoplinux_enterprise_serverubuntu_linuxthunderbird_esrenterprise_linux_eusseamonkeyenterprise_linux_workstationthunderbirdlinux_enterprise_desktopfirefoxenterprise_linux_servern/a
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2020-7140
Matching Score-6
Assigner-Hewlett Packard Enterprise (HPE)
ShareView Details
Matching Score-6
Assigner-Hewlett Packard Enterprise (HPE)
CVSS Score-6.1||MEDIUM
EPSS-0.40% / 59.78%
||
7 Day CHG~0.00%
Published-08 Jul, 2020 | 13:39
Updated-04 Aug, 2024 | 09:18
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A security vulnerability in HPE IceWall SSO Dfw and Dgfw (Domain Gateway Option) could be exploited remotely to cause a remote cross-site scripting (XSS). HPE has provided the following information to resolve this vulnerability in HPE IceWall SSO DFW and Dgfw: https://www.hpe.com/jp/icewall_patchaccess

Action-Not Available
Vendor-n/aMicrosoft CorporationHP Inc.Red Hat, Inc.
Product-icewall_sso_dgfwwindowsicewall_sso_dfwenterprise_linuxIceWall SSO Dfw; IceWall SSO Dgfw
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2012-3994
Matching Score-6
Assigner-MITRE Corporation
ShareView Details
Matching Score-6
Assigner-MITRE Corporation
CVSS Score-4.3||MEDIUM
EPSS-0.93% / 75.11%
||
7 Day CHG~0.00%
Published-10 Oct, 2012 | 17:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Mozilla Firefox before 16.0, Firefox ESR 10.x before 10.0.8, Thunderbird before 16.0, Thunderbird ESR 10.x before 10.0.8, and SeaMonkey before 2.13 allow remote attackers to conduct cross-site scripting (XSS) attacks via a binary plugin that uses Object.defineProperty to shadow the top object, and leverages the relationship between top.location and the location property.

Action-Not Available
Vendor-n/aSUSECanonical Ltd.Mozilla CorporationRed Hat, Inc.
Product-linux_enterprise_sdkenterprise_linux_desktoplinux_enterprise_serverubuntu_linuxthunderbird_esrenterprise_linux_eusseamonkeyenterprise_linux_workstationthunderbirdlinux_enterprise_desktopfirefoxenterprise_linux_servern/a
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2012-4207
Matching Score-6
Assigner-MITRE Corporation
ShareView Details
Matching Score-6
Assigner-MITRE Corporation
CVSS Score-4.3||MEDIUM
EPSS-1.71% / 81.57%
||
7 Day CHG~0.00%
Published-21 Nov, 2012 | 11:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The HZ-GB-2312 character-set implementation in Mozilla Firefox before 17.0, Firefox ESR 10.x before 10.0.11, Thunderbird before 17.0, Thunderbird ESR 10.x before 10.0.11, and SeaMonkey before 2.14 does not properly handle a ~ (tilde) character in proximity to a chunk delimiter, which allows remote attackers to conduct cross-site scripting (XSS) attacks via a crafted document.

Action-Not Available
Vendor-n/aSUSECanonical Ltd.Mozilla CorporationRed Hat, Inc.openSUSEDebian GNU/Linux
Product-enterprise_linux_desktoplinux_enterprise_serverlinux_enterprise_software_development_kitubuntu_linuxthunderbird_esrenterprise_linux_eusseamonkeyenterprise_linux_workstationthunderbirddebian_linuxlinux_enterprise_desktopfirefoxopensuseenterprise_linux_servern/a
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2025-5198
Matching Score-6
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-6
Assigner-Red Hat, Inc.
CVSS Score-5||MEDIUM
EPSS-0.04% / 8.83%
||
7 Day CHG~0.00%
Published-27 May, 2025 | 20:51
Updated-30 Jul, 2025 | 20:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Stackrox: xss in stackrox

A flaw was found in Stackrox, where it is vulnerable to Cross-site scripting (XSS) if the script code is included in a small subset of table cells. The only known potential exploit is if the script is included in the name of a Kubernetes “Role” object* that is applied to a secured cluster. This object can be used by a user with access to the cluster or through a compromised third-party product.

Action-Not Available
Vendor-stackroxRed Hat, Inc.
Product-advanced_cluster_securitystackroxRed Hat Advanced Cluster Security 4
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2012-2662
Matching Score-6
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-6
Assigner-Red Hat, Inc.
CVSS Score-4.3||MEDIUM
EPSS-0.24% / 46.74%
||
7 Day CHG~0.00%
Published-13 Aug, 2012 | 20:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Multiple cross-site scripting (XSS) vulnerabilities in Red Hat Certificate System (RHCS) before 8.1.1 and Dogtag Certificate System allow remote attackers to inject arbitrary web script or HTML via unspecified parameters to the (1) System Agent or (2) End Entity pages.

Action-Not Available
Vendor-n/aRed Hat, Inc.
Product-certificate_systemdogtag_certificate_systemn/a
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2020-27832
Matching Score-6
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-6
Assigner-Red Hat, Inc.
CVSS Score-9||CRITICAL
EPSS-0.45% / 62.58%
||
7 Day CHG~0.00%
Published-27 May, 2021 | 13:50
Updated-04 Aug, 2024 | 16:25
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A flaw was found in Red Hat Quay, where it has a persistent Cross-site Scripting (XSS) vulnerability when displaying a repository's notification. This flaw allows an attacker to trick a user into performing a malicious action to impersonate the target user. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.

Action-Not Available
Vendor-n/aRed Hat, Inc.
Product-quayquay
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2012-2683
Matching Score-6
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-6
Assigner-Red Hat, Inc.
CVSS Score-4.3||MEDIUM
EPSS-0.47% / 63.49%
||
7 Day CHG~0.00%
Published-28 Sep, 2012 | 17:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Multiple cross-site scripting (XSS) vulnerabilities in Cumin before 0.1.5444, as used in Red Hat Enterprise Messaging, Realtime, and Grid (MRG) 2.0, allow remote attackers to inject arbitrary web script or HTML via unspecified vectors related to (1) "error message displays" or (2) "in source HTML on certain pages."

Action-Not Available
Vendor-trevor_mckayn/aRed Hat, Inc.
Product-cuminenterprise_mrgn/a
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2020-27783
Matching Score-6
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-6
Assigner-Red Hat, Inc.
CVSS Score-6.1||MEDIUM
EPSS-1.03% / 76.36%
||
7 Day CHG~0.00%
Published-03 Dec, 2020 | 16:39
Updated-04 Aug, 2024 | 16:25
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A XSS vulnerability was discovered in python-lxml's clean module. The module's parser didn't properly imitate browsers, which caused different behaviors between the sanitizer and the user's page. A remote attacker could exploit this flaw to run arbitrary HTML/JS code.

Action-Not Available
Vendor-lxmln/aRed Hat, Inc.Oracle CorporationNetApp, Inc.Debian GNU/LinuxFedora Project
Product-debian_linuxsoftware_collectionscommunications_offline_mediation_controllerfedoraenterprise_linuxlxmlzfs_storage_appliance_kitsnapcenterpython-lxml
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2020-25626
Matching Score-6
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-6
Assigner-Red Hat, Inc.
CVSS Score-6.1||MEDIUM
EPSS-0.84% / 73.80%
||
7 Day CHG~0.00%
Published-30 Sep, 2020 | 19:24
Updated-04 Aug, 2024 | 15:40
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A flaw was found in Django REST Framework versions before 3.12.0 and before 3.11.2. When using the browseable API viewer, Django REST Framework fails to properly escape certain strings that can come from user input. This allows a user who can control those strings to inject malicious <script> tags, leading to a cross-site-scripting (XSS) vulnerability.

Action-Not Available
Vendor-encoden/aDebian GNU/LinuxRed Hat, Inc.
Product-django_rest_frameworkdebian_linuxceph_storageDjango REST Framework
CWE ID-CWE-20
Improper Input Validation
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2019-8331
Matching Score-6
Assigner-MITRE Corporation
ShareView Details
Matching Score-6
Assigner-MITRE Corporation
CVSS Score-6.1||MEDIUM
EPSS-1.46% / 80.07%
||
7 Day CHG~0.00%
Published-20 Feb, 2019 | 16:00
Updated-04 Aug, 2024 | 21:17
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In Bootstrap before 3.4.1 and 4.3.x before 4.3.1, XSS is possible in the tooltip or popover data-template attribute.

Action-Not Available
Vendor-getbootstrapn/aRed Hat, Inc.Tenable, Inc.F5, Inc.
Product-big-ip_webacceleratorbig-ip_application_acceleration_managerbig-ip_policy_enforcement_managerbig-ip_fraud_protection_servicebig-ip_global_traffic_managerbig-ip_analyticsbig-ip_local_traffic_managerbig-ip_domain_name_systemtenable.scbig-ip_application_security_managerbig-ip_edge_gatewaybig-ip_link_controllervirtualization_managerbootstrapbig-ip_access_policy_managerbig-ip_advanced_firewall_managern/a
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2019-5778
Matching Score-6
Assigner-Chrome
ShareView Details
Matching Score-6
Assigner-Chrome
CVSS Score-6.5||MEDIUM
EPSS-0.49% / 64.66%
||
7 Day CHG~0.00%
Published-19 Feb, 2019 | 17:00
Updated-04 Aug, 2024 | 20:01
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A missing case for handling special schemes in permission request checks in Extensions in Google Chrome prior to 72.0.3626.81 allowed an attacker who convinced a user to install a malicious extension to bypass extension permission checks for privileged pages via a crafted Chrome Extension.

Action-Not Available
Vendor-Google LLCRed Hat, Inc.Fedora ProjectDebian GNU/Linux
Product-enterprise_linux_serverdebian_linuxchromeenterprise_linux_workstationfedoraenterprise_linux_desktopChrome
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2019-3873
Matching Score-6
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-6
Assigner-Red Hat, Inc.
CVSS Score-6.4||MEDIUM
EPSS-0.51% / 65.25%
||
7 Day CHG~0.00%
Published-12 Jun, 2019 | 13:43
Updated-04 Aug, 2024 | 19:19
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

It was found that Picketlink as shipped with Jboss Enterprise Application Platform 7.2 would accept an xinclude parameter in SAMLresponse XML. An attacker could use this flaw to send a URL to achieve cross-site scripting or possibly conduct further attacks.

Action-Not Available
Vendor-Red Hat, Inc.
Product-jboss_enterprise_application_platformsingle_sign-onenterprise_linuxpicketlink
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2019-3865
Matching Score-6
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-6
Assigner-Red Hat, Inc.
CVSS Score-4.7||MEDIUM
EPSS-0.39% / 59.48%
||
7 Day CHG~0.00%
Published-22 Jun, 2020 | 17:51
Updated-04 Aug, 2024 | 19:19
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability was found in quay-2, where a stored XSS vulnerability has been found in the super user function of quay. Attackers are able to use the name field of service key to inject scripts and make it run when admin users try to change the name.

Action-Not Available
Vendor-[UNKNOWN]Red Hat, Inc.
Product-quayquay
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2019-3889
Matching Score-6
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-6
Assigner-Red Hat, Inc.
CVSS Score-4.6||MEDIUM
EPSS-0.35% / 56.93%
||
7 Day CHG~0.00%
Published-11 Jul, 2019 | 18:27
Updated-04 Aug, 2024 | 19:19
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A reflected XSS vulnerability exists in authorization flow of OpenShift Container Platform versions: openshift-online-3, openshift-enterprise-3.4 through 3.7 and openshift-enterprise-3.9 through 3.11. An attacker could use this flaw to steal authorization data by getting them to click on a malicious link.

Action-Not Available
Vendor-Red Hat, Inc.
Product-openshift_container_platformatomic-openshift
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
  • Previous
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • Next
Details not found