Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2024-10234

Summary
Assigner-redhat
Assigner Org ID-53f830b8-0a3f-465b-8143-3b8a9948e749
Published At-22 Oct, 2024 | 13:17
Updated At-23 Jul, 2025 | 18:24
Rejected At-
Credits

Wildfly: wildfly vulnerable to cross-site scripting (xss)

A vulnerability was found in Wildfly, where a user may perform Cross-site scripting in the Wildfly deployment system. This flaw allows an attacker or insider to execute a deployment with a malicious payload, which could trigger undesired behavior against the server.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:redhat
Assigner Org ID:53f830b8-0a3f-465b-8143-3b8a9948e749
Published At:22 Oct, 2024 | 13:17
Updated At:23 Jul, 2025 | 18:24
Rejected At:
▼CVE Numbering Authority (CNA)
Wildfly: wildfly vulnerable to cross-site scripting (xss)

A vulnerability was found in Wildfly, where a user may perform Cross-site scripting in the Wildfly deployment system. This flaw allows an attacker or insider to execute a deployment with a malicious payload, which could trigger undesired behavior against the server.

Affected Products
Collection URL
https://github.com/wildfly/wildfly
Package Name
wildfly
Default Status
unaffected
Versions
Affected
  • From 35.0.0 before 35.0.0 (semver)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 7.4.23
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
org.wildfly.core/wildfly-core-management-subsystem
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:7.4::el7
Default Status
unaffected
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 7.4 for RHEL 8
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap7-activemq-artemis
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:7.4::el8
Default Status
affected
Versions
Unaffected
  • From 0:2.16.0-21.redhat_00055.1.el8eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 7.4 for RHEL 8
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap7-apache-cxf
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:7.4::el8
Default Status
affected
Versions
Unaffected
  • From 0:3.5.10-1.redhat_00001.1.el8eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 7.4 for RHEL 8
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap7-artemis-native
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:7.4::el8
Default Status
affected
Versions
Unaffected
  • From 1:1.0.2-5.redhat_00004.1.el8eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 7.4 for RHEL 8
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap7-elytron-web
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:7.4::el8
Default Status
affected
Versions
Unaffected
  • From 0:1.9.6-1.Final_redhat_00001.1.el8eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 7.4 for RHEL 8
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap7-glassfish-jsf
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:7.4::el8
Default Status
affected
Versions
Unaffected
  • From 0:2.3.14-9.SP10_redhat_00001.1.el8eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 7.4 for RHEL 8
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap7-hal-console
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:7.4::el8
Default Status
affected
Versions
Unaffected
  • From 0:3.3.27-1.Final_redhat_00001.1.el8eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 7.4 for RHEL 8
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap7-hibernate-validator
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:7.4::el8
Default Status
affected
Versions
Unaffected
  • From 0:6.0.23-3.SP2_redhat_00001.1.el8eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 7.4 for RHEL 8
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap7-ironjacamar
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:7.4::el8
Default Status
affected
Versions
Unaffected
  • From 0:1.5.21-1.Final_redhat_00001.1.el8eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 7.4 for RHEL 8
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap7-jboss-server-migration
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:7.4::el8
Default Status
affected
Versions
Unaffected
  • From 0:1.10.0-42.Final_redhat_00042.1.el8eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 7.4 for RHEL 8
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap7-jbossws-cxf
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:7.4::el8
Default Status
affected
Versions
Unaffected
  • From 0:5.4.15-1.Final_redhat_00001.1.el8eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 7.4 for RHEL 8
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap7-wildfly
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:7.4::el8
Default Status
affected
Versions
Unaffected
  • From 0:7.4.23-3.GA_redhat_00002.1.el8eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 7.4 for RHEL 8
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap7-wildfly-elytron
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:7.4::el8
Default Status
affected
Versions
Unaffected
  • From 0:1.15.26-1.Final_redhat_00001.1.el8eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 7.4 for RHEL 9
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap7-activemq-artemis
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:7.4::el9
Default Status
affected
Versions
Unaffected
  • From 0:2.16.0-21.redhat_00055.1.el9eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 7.4 for RHEL 9
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap7-apache-cxf
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:7.4::el9
Default Status
affected
Versions
Unaffected
  • From 0:3.5.10-1.redhat_00001.1.el9eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 7.4 for RHEL 9
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap7-artemis-native
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:7.4::el9
Default Status
affected
Versions
Unaffected
  • From 1:1.0.2-5.redhat_00004.1.el9eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 7.4 for RHEL 9
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap7-elytron-web
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:7.4::el9
Default Status
affected
Versions
Unaffected
  • From 0:1.9.6-1.Final_redhat_00001.1.el9eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 7.4 for RHEL 9
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap7-glassfish-jsf
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:7.4::el9
Default Status
affected
Versions
Unaffected
  • From 0:2.3.14-9.SP10_redhat_00001.1.el9eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 7.4 for RHEL 9
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap7-hal-console
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:7.4::el9
Default Status
affected
Versions
Unaffected
  • From 0:3.3.27-1.Final_redhat_00001.1.el9eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 7.4 for RHEL 9
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap7-hibernate-validator
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:7.4::el9
Default Status
affected
Versions
Unaffected
  • From 0:6.0.23-3.SP2_redhat_00001.1.el9eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 7.4 for RHEL 9
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap7-ironjacamar
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:7.4::el9
Default Status
affected
Versions
Unaffected
  • From 0:1.5.21-1.Final_redhat_00001.1.el9eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 7.4 for RHEL 9
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap7-jboss-server-migration
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:7.4::el9
Default Status
affected
Versions
Unaffected
  • From 0:1.10.0-42.Final_redhat_00042.1.el9eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 7.4 for RHEL 9
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap7-jbossws-cxf
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:7.4::el9
Default Status
affected
Versions
Unaffected
  • From 0:5.4.15-1.Final_redhat_00001.1.el9eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 7.4 for RHEL 9
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap7-wildfly
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:7.4::el9
Default Status
affected
Versions
Unaffected
  • From 0:7.4.23-3.GA_redhat_00002.1.el9eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 7.4 for RHEL 9
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap7-wildfly-elytron
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:7.4::el9
Default Status
affected
Versions
Unaffected
  • From 0:1.15.26-1.Final_redhat_00001.1.el9eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 7.4 on RHEL 7
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap7-activemq-artemis
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:7.4::el7
Default Status
affected
Versions
Unaffected
  • From 0:2.16.0-21.redhat_00055.1.el7eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 7.4 on RHEL 7
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap7-apache-cxf
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:7.4::el7
Default Status
affected
Versions
Unaffected
  • From 0:3.5.10-1.redhat_00001.1.el7eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 7.4 on RHEL 7
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap7-artemis-native
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:7.4::el7
Default Status
affected
Versions
Unaffected
  • From 1:1.0.2-5.redhat_00004.1.el7eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 7.4 on RHEL 7
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap7-elytron-web
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:7.4::el7
Default Status
affected
Versions
Unaffected
  • From 0:1.9.6-1.Final_redhat_00001.1.el7eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 7.4 on RHEL 7
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap7-glassfish-jsf
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:7.4::el7
Default Status
affected
Versions
Unaffected
  • From 0:2.3.14-9.SP10_redhat_00001.1.el7eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 7.4 on RHEL 7
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap7-hal-console
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:7.4::el7
Default Status
affected
Versions
Unaffected
  • From 0:3.3.27-1.Final_redhat_00001.1.el7eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 7.4 on RHEL 7
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap7-hibernate-validator
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:7.4::el7
Default Status
affected
Versions
Unaffected
  • From 0:6.0.23-3.SP2_redhat_00001.1.el7eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 7.4 on RHEL 7
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap7-ironjacamar
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:7.4::el7
Default Status
affected
Versions
Unaffected
  • From 0:1.5.21-1.Final_redhat_00001.1.el7eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 7.4 on RHEL 7
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap7-jboss-server-migration
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:7.4::el7
Default Status
affected
Versions
Unaffected
  • From 0:1.10.0-42.Final_redhat_00042.1.el7eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 7.4 on RHEL 7
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap7-jbossws-cxf
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:7.4::el7
Default Status
affected
Versions
Unaffected
  • From 0:5.4.15-1.Final_redhat_00001.1.el7eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 7.4 on RHEL 7
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap7-wildfly
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:7.4::el7
Default Status
affected
Versions
Unaffected
  • From 0:7.4.23-3.GA_redhat_00002.1.el7eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 7.4 on RHEL 7
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap7-wildfly-elytron
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:7.4::el7
Default Status
affected
Versions
Unaffected
  • From 0:1.15.26-1.Final_redhat_00001.1.el7eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
org.wildfly.core/wildfly-core-management-subsystem
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0
Default Status
unaffected
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 8
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-artemis-wildfly-integration
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el8
Default Status
affected
Versions
Unaffected
  • From 0:2.0.3-1.Final_redhat_00001.1.el8eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 8
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-azure-storage
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el8
Default Status
affected
Versions
Unaffected
  • From 0:8.6.6-5.redhat_00001.1.el8eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 8
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-eap-product-conf-parent
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el8
Default Status
affected
Versions
Unaffected
  • From 0:800.6.0-2.GA_redhat_00002.1.el8eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 8
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-gnu-getopt
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el8
Default Status
affected
Versions
Unaffected
  • From 0:1.0.13-2.redhat_5.1.el8eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 8
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-h2database
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el8
Default Status
affected
Versions
Unaffected
  • From 0:2.1.214-2.redhat_00001.1.el8eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 8
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-hal-console
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el8
Default Status
affected
Versions
Unaffected
  • From 0:3.6.23-1.Final_redhat_00001.1.el8eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 8
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-hibernate-commons-annotations
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el8
Default Status
affected
Versions
Unaffected
  • From 0:6.0.6-2.Final_redhat_00001.1.el8eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 8
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-jackson-coreutils
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el8
Default Status
affected
Versions
Unaffected
  • From 0:1.8.0-2.redhat_00002.1.el8eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 8
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-jakarta-authentication-api
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el8
Default Status
affected
Versions
Unaffected
  • From 0:3.0.0-3.redhat_00001.1.el8eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 8
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-jakarta-authorization-api
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el8
Default Status
affected
Versions
Unaffected
  • From 0:2.1.0-3.redhat_00001.1.el8eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 8
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-jakarta-enterprise-concurrent
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el8
Default Status
affected
Versions
Unaffected
  • From 0:3.0.0-4.redhat_00001.1.el8eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 8
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-jakarta-enterprise-concurrent-api
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el8
Default Status
affected
Versions
Unaffected
  • From 0:3.0.2-2.redhat_00001.1.el8eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 8
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-jakarta-enterprise-lang-model
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el8
Default Status
affected
Versions
Unaffected
  • From 0:4.0.1-2.redhat_00001.1.el8eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 8
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-jakarta-security-enterprise-api
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el8
Default Status
affected
Versions
Unaffected
  • From 0:3.0.0-2.redhat_00001.1.el8eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 8
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-jakarta-servlet-jsp-api
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el8
Default Status
affected
Versions
Unaffected
  • From 0:3.1.0-3.redhat_00001.1.el8eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 8
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-javaewah
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el8
Default Status
affected
Versions
Unaffected
  • From 0:1.1.13-2.redhat_00001.1.el8eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 8
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-jboss-aesh
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el8
Default Status
affected
Versions
Unaffected
  • From 0:2.4.0-2.redhat_00001.1.el8eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 8
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-jboss-common-beans
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el8
Default Status
affected
Versions
Unaffected
  • From 0:2.0.1-2.Final_redhat_00001.1.el8eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 8
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-jboss-dmr
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el8
Default Status
affected
Versions
Unaffected
  • From 0:1.6.1-2.Final_redhat_00001.1.el8eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 8
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-jboss-ejb3-ext-api
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el8
Default Status
affected
Versions
Unaffected
  • From 0:2.3.0-2.Final_redhat_00001.1.el8eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 8
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-jboss-el-api_5.0_spec
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el8
Default Status
affected
Versions
Unaffected
  • From 0:4.0.1-2.Final_redhat_00001.1.el8eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 8
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-jboss-genericjms
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el8
Default Status
affected
Versions
Unaffected
  • From 0:3.0.0-3.Final_redhat_00001.1.el8eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 8
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-jboss-iiop-client
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el8
Default Status
affected
Versions
Unaffected
  • From 0:2.0.1-2.Final_redhat_00001.1.el8eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 8
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-jboss-invocation
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el8
Default Status
affected
Versions
Unaffected
  • From 0:2.0.0-2.Final_redhat_00001.1.el8eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 8
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-jboss-logmanager
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el8
Default Status
affected
Versions
Unaffected
  • From 0:2.1.19-2.Final_redhat_00001.1.el8eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 8
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-jboss-msc
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el8
Default Status
affected
Versions
Unaffected
  • From 0:1.5.1-2.Final_redhat_00001.1.el8eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 8
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-jboss-remoting-jmx
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el8
Default Status
affected
Versions
Unaffected
  • From 0:3.0.4-2.Final_redhat_00001.1.el8eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 8
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-jboss-stdio
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el8
Default Status
affected
Versions
Unaffected
  • From 0:1.1.0-2.Final_redhat_00001.1.el8eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 8
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-jboss-threads
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el8
Default Status
affected
Versions
Unaffected
  • From 0:2.4.0-3.Final_redhat_00001.1.el8eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 8
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-jboss-transaction-spi
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el8
Default Status
affected
Versions
Unaffected
  • From 0:8.0.0-3.Final_redhat_00001.1.el8eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 8
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-jboss-vfs
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el8
Default Status
affected
Versions
Unaffected
  • From 0:3.3.0-2.Final_redhat_00001.1.el8eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 8
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-jbossws-api
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el8
Default Status
affected
Versions
Unaffected
  • From 0:3.0.0-2.Final_redhat_00001.1.el8eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 8
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-jbossws-common
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el8
Default Status
affected
Versions
Unaffected
  • From 0:5.1.0-1.Final_redhat_00001.1.el8eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 8
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-jbossws-cxf
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el8
Default Status
affected
Versions
Unaffected
  • From 0:7.3.1-1.Final_redhat_00001.1.el8eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 8
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-jbossws-spi
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el8
Default Status
affected
Versions
Unaffected
  • From 0:5.0.0-2.Final_redhat_00001.1.el8eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 8
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-jcip-annotations
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el8
Default Status
affected
Versions
Unaffected
  • From 0:1.0.0-2.redhat_8.1.el8eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 8
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-json-patch
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el8
Default Status
affected
Versions
Unaffected
  • From 0:1.9.0-2.redhat_00002.1.el8eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 8
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-jul-to-slf4j-stub
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el8
Default Status
affected
Versions
Unaffected
  • From 0:1.0.1-2.Final_redhat_3.1.el8eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 8
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-reactivex-rxjava2
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el8
Default Status
affected
Versions
Unaffected
  • From 0:2.2.21-2.redhat_00001.2.el8eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 8
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-slf4j-jboss-logmanager
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el8
Default Status
affected
Versions
Unaffected
  • From 0:2.0.1-2.Final_redhat_00001.1.el8eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 8
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-staxmapper
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el8
Default Status
affected
Versions
Unaffected
  • From 0:1.4.0-2.Final_redhat_00001.1.el8eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 8
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-wildfly
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el8
Default Status
affected
Versions
Unaffected
  • From 0:8.0.6-5.GA_redhat_00004.1.el8eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 8
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-wildfly-common
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el8
Default Status
affected
Versions
Unaffected
  • From 0:1.6.0-4.Final_redhat_00001.1.el8eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 8
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-woodstox-core
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el8
Default Status
affected
Versions
Unaffected
  • From 0:6.4.0-3.redhat_00003.1.el8eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 8
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-xml-commons-resolver
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el8
Default Status
affected
Versions
Unaffected
  • From 0:1.2.0-3.redhat_12.1.el8eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 9
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-artemis-wildfly-integration
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el9
Default Status
affected
Versions
Unaffected
  • From 0:2.0.3-1.Final_redhat_00001.1.el9eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 9
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-azure-storage
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el9
Default Status
affected
Versions
Unaffected
  • From 0:8.6.6-5.redhat_00001.1.el9eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 9
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-eap-product-conf-parent
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el9
Default Status
affected
Versions
Unaffected
  • From 0:800.6.0-2.GA_redhat_00002.1.el9eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 9
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-gnu-getopt
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el9
Default Status
affected
Versions
Unaffected
  • From 0:1.0.13-2.redhat_5.1.el9eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 9
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-h2database
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el9
Default Status
affected
Versions
Unaffected
  • From 0:2.1.214-2.redhat_00001.1.el9eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 9
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-hal-console
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el9
Default Status
affected
Versions
Unaffected
  • From 0:3.6.23-1.Final_redhat_00001.1.el9eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 9
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-hibernate-commons-annotations
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el9
Default Status
affected
Versions
Unaffected
  • From 0:6.0.6-2.Final_redhat_00001.1.el9eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 9
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-jackson-coreutils
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el9
Default Status
affected
Versions
Unaffected
  • From 0:1.8.0-2.redhat_00002.1.el9eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 9
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-jakarta-authentication-api
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el9
Default Status
affected
Versions
Unaffected
  • From 0:3.0.0-3.redhat_00001.1.el9eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 9
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-jakarta-authorization-api
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el9
Default Status
affected
Versions
Unaffected
  • From 0:2.1.0-3.redhat_00001.1.el9eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 9
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-jakarta-enterprise-concurrent
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el9
Default Status
affected
Versions
Unaffected
  • From 0:3.0.0-4.redhat_00001.1.el9eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 9
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-jakarta-enterprise-concurrent-api
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el9
Default Status
affected
Versions
Unaffected
  • From 0:3.0.2-2.redhat_00001.1.el9eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 9
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-jakarta-enterprise-lang-model
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el9
Default Status
affected
Versions
Unaffected
  • From 0:4.0.1-2.redhat_00001.1.el9eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 9
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-jakarta-security-enterprise-api
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el9
Default Status
affected
Versions
Unaffected
  • From 0:3.0.0-2.redhat_00001.1.el9eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 9
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-jakarta-servlet-jsp-api
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el9
Default Status
affected
Versions
Unaffected
  • From 0:3.1.0-3.redhat_00001.1.el9eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 9
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-javaewah
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el9
Default Status
affected
Versions
Unaffected
  • From 0:1.1.13-2.redhat_00001.1.el9eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 9
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-jboss-aesh
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el9
Default Status
affected
Versions
Unaffected
  • From 0:2.4.0-2.redhat_00001.1.el9eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 9
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-jboss-common-beans
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el9
Default Status
affected
Versions
Unaffected
  • From 0:2.0.1-2.Final_redhat_00001.1.el9eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 9
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-jboss-dmr
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el9
Default Status
affected
Versions
Unaffected
  • From 0:1.6.1-2.Final_redhat_00001.1.el9eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 9
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-jboss-ejb3-ext-api
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el9
Default Status
affected
Versions
Unaffected
  • From 0:2.3.0-2.Final_redhat_00001.1.el9eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 9
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-jboss-el-api_5.0_spec
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el9
Default Status
affected
Versions
Unaffected
  • From 0:4.0.1-2.Final_redhat_00001.1.el9eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 9
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-jboss-genericjms
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el9
Default Status
affected
Versions
Unaffected
  • From 0:3.0.0-3.Final_redhat_00001.1.el9eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 9
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-jboss-iiop-client
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el9
Default Status
affected
Versions
Unaffected
  • From 0:2.0.1-2.Final_redhat_00001.1.el9eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 9
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-jboss-invocation
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el9
Default Status
affected
Versions
Unaffected
  • From 0:2.0.0-2.Final_redhat_00001.1.el9eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 9
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-jboss-logmanager
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el9
Default Status
affected
Versions
Unaffected
  • From 0:2.1.19-2.Final_redhat_00001.1.el9eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 9
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-jboss-msc
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el9
Default Status
affected
Versions
Unaffected
  • From 0:1.5.1-2.Final_redhat_00001.1.el9eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 9
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-jboss-remoting-jmx
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el9
Default Status
affected
Versions
Unaffected
  • From 0:3.0.4-2.Final_redhat_00001.1.el9eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 9
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-jboss-stdio
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el9
Default Status
affected
Versions
Unaffected
  • From 0:1.1.0-2.Final_redhat_00001.1.el9eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 9
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-jboss-threads
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el9
Default Status
affected
Versions
Unaffected
  • From 0:2.4.0-3.Final_redhat_00001.1.el9eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 9
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-jboss-transaction-spi
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el9
Default Status
affected
Versions
Unaffected
  • From 0:8.0.0-3.Final_redhat_00001.1.el9eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 9
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-jboss-vfs
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el9
Default Status
affected
Versions
Unaffected
  • From 0:3.3.0-2.Final_redhat_00001.1.el9eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 9
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-jbossws-api
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el9
Default Status
affected
Versions
Unaffected
  • From 0:3.0.0-2.Final_redhat_00001.1.el9eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 9
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-jbossws-common
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el9
Default Status
affected
Versions
Unaffected
  • From 0:5.1.0-1.Final_redhat_00001.1.el9eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 9
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-jbossws-cxf
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el9
Default Status
affected
Versions
Unaffected
  • From 0:7.3.1-1.Final_redhat_00001.1.el9eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 9
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-jbossws-spi
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el9
Default Status
affected
Versions
Unaffected
  • From 0:5.0.0-2.Final_redhat_00001.1.el9eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 9
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-jcip-annotations
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el9
Default Status
affected
Versions
Unaffected
  • From 0:1.0.0-2.redhat_8.1.el9eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 9
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-json-patch
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el9
Default Status
affected
Versions
Unaffected
  • From 0:1.9.0-2.redhat_00002.1.el9eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 9
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-jul-to-slf4j-stub
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el9
Default Status
affected
Versions
Unaffected
  • From 0:1.0.1-2.Final_redhat_3.1.el9eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 9
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-reactivex-rxjava2
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el9
Default Status
affected
Versions
Unaffected
  • From 0:2.2.21-2.redhat_00001.2.el9eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 9
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-slf4j-jboss-logmanager
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el9
Default Status
affected
Versions
Unaffected
  • From 0:2.0.1-2.Final_redhat_00001.1.el9eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 9
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-staxmapper
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el9
Default Status
affected
Versions
Unaffected
  • From 0:1.4.0-2.Final_redhat_00001.1.el9eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 9
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-wildfly
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el9
Default Status
affected
Versions
Unaffected
  • From 0:8.0.6-5.GA_redhat_00004.1.el9eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 9
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-wildfly-common
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el9
Default Status
affected
Versions
Unaffected
  • From 0:1.6.0-4.Final_redhat_00001.1.el9eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 9
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-woodstox-core
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el9
Default Status
affected
Versions
Unaffected
  • From 0:6.4.0-3.redhat_00003.1.el9eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 9
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
eap8-xml-commons-resolver
CPEs
  • cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el9
Default Status
affected
Versions
Unaffected
  • From 0:1.2.0-3.redhat_12.1.el9eap before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat Single Sign-On 7
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
org.wildfly.core/wildfly-core-management-client
CPEs
  • cpe:/a:redhat:red_hat_single_sign_on:7.6
Default Status
unaffected
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat Single Sign-On 7.6 for RHEL 7
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
rh-sso7-keycloak
CPEs
  • cpe:/a:redhat:red_hat_single_sign_on:7.6::el7
Default Status
affected
Versions
Unaffected
  • From 0:18.0.19-1.redhat_00002.1.el7sso before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat Single Sign-On 7.6 for RHEL 8
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
rh-sso7-keycloak
CPEs
  • cpe:/a:redhat:red_hat_single_sign_on:7.6::el8
Default Status
affected
Versions
Unaffected
  • From 0:18.0.19-1.redhat_00002.1.el8sso before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat Single Sign-On 7.6 for RHEL 9
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
rh-sso7-keycloak
CPEs
  • cpe:/a:redhat:red_hat_single_sign_on:7.6::el9
Default Status
affected
Versions
Unaffected
  • From 0:18.0.19-1.redhat_00002.1.el9sso before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
RHEL-8 based Middleware Containers
Collection URL
https://catalog.redhat.com/software/containers/
Package Name
rh-sso-7/sso76-openshift-rhel8
CPEs
  • cpe:/a:redhat:rhosemc:1.0::el8
Default Status
affected
Versions
Unaffected
  • From 7.6-67 before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat Build of Keycloak
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
org.wildfly.core/wildfly-core-management-subsystem
CPEs
  • cpe:/a:redhat:build_keycloak:
Default Status
affected
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat Fuse 7
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
org.wildfly.core/wildfly-core-management-subsystem
CPEs
  • cpe:/a:redhat:jboss_fuse:7
Default Status
unknown
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Data Grid 7
Collection URL
https://access.redhat.com/jbossnetwork/restricted/listSoftware.html
Package Name
org.wildfly.core/wildfly-core-management-subsystem
CPEs
  • cpe:/a:redhat:jboss_data_grid:7
Default Status
unknown
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat JBoss Enterprise Application Platform Expansion Pack
Collection URL
https://access.redhat.com/jbossnetwork/restricted/listSoftware.html
Package Name
org.wildfly.core/wildfly-core-management-subsystem
CPEs
  • cpe:/a:redhat:jbosseapxp
Default Status
unaffected
Problem Types
TypeCWE IDDescription
CWECWE-79Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Type: CWE
CWE ID: CWE-79
Description: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Metrics
VersionBase scoreBase severityVector
3.16.1MEDIUM
CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:N
Version: 3.1
Base score: 6.1
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:N
Metrics Other Info
Red Hat severity rating
value:
Moderate
namespace:
https://access.redhat.com/security/updates/classification/
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Reported to Red Hat.2024-10-22 01:46:48
Made public.2024-10-22 00:00:00
Event: Reported to Red Hat.
Date: 2024-10-22 01:46:48
Event: Made public.
Date: 2024-10-22 00:00:00
Replaced By

Rejected Reason

References
HyperlinkResource
https://access.redhat.com/errata/RHSA-2025:10924
vendor-advisory
x_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2025:10925
vendor-advisory
x_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2025:10926
vendor-advisory
x_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2025:10931
vendor-advisory
x_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2025:11636
vendor-advisory
x_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2025:11638
vendor-advisory
x_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2025:11639
vendor-advisory
x_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2025:11640
vendor-advisory
x_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2025:11645
vendor-advisory
x_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2025:2025
vendor-advisory
x_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2025:2026
vendor-advisory
x_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2025:2029
vendor-advisory
x_refsource_REDHAT
https://access.redhat.com/security/cve/CVE-2024-10234
vdb-entry
x_refsource_REDHAT
https://bugzilla.redhat.com/show_bug.cgi?id=2320848
issue-tracking
x_refsource_REDHAT
Hyperlink: https://access.redhat.com/errata/RHSA-2025:10924
Resource:
vendor-advisory
x_refsource_REDHAT
Hyperlink: https://access.redhat.com/errata/RHSA-2025:10925
Resource:
vendor-advisory
x_refsource_REDHAT
Hyperlink: https://access.redhat.com/errata/RHSA-2025:10926
Resource:
vendor-advisory
x_refsource_REDHAT
Hyperlink: https://access.redhat.com/errata/RHSA-2025:10931
Resource:
vendor-advisory
x_refsource_REDHAT
Hyperlink: https://access.redhat.com/errata/RHSA-2025:11636
Resource:
vendor-advisory
x_refsource_REDHAT
Hyperlink: https://access.redhat.com/errata/RHSA-2025:11638
Resource:
vendor-advisory
x_refsource_REDHAT
Hyperlink: https://access.redhat.com/errata/RHSA-2025:11639
Resource:
vendor-advisory
x_refsource_REDHAT
Hyperlink: https://access.redhat.com/errata/RHSA-2025:11640
Resource:
vendor-advisory
x_refsource_REDHAT
Hyperlink: https://access.redhat.com/errata/RHSA-2025:11645
Resource:
vendor-advisory
x_refsource_REDHAT
Hyperlink: https://access.redhat.com/errata/RHSA-2025:2025
Resource:
vendor-advisory
x_refsource_REDHAT
Hyperlink: https://access.redhat.com/errata/RHSA-2025:2026
Resource:
vendor-advisory
x_refsource_REDHAT
Hyperlink: https://access.redhat.com/errata/RHSA-2025:2029
Resource:
vendor-advisory
x_refsource_REDHAT
Hyperlink: https://access.redhat.com/security/cve/CVE-2024-10234
Resource:
vdb-entry
x_refsource_REDHAT
Hyperlink: https://bugzilla.redhat.com/show_bug.cgi?id=2320848
Resource:
issue-tracking
x_refsource_REDHAT
▼Authorized Data Publishers (ADP)
CISA ADP Vulnrichment
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:secalert@redhat.com
Published At:22 Oct, 2024 | 14:15
Updated At:23 Jul, 2025 | 19:15

A vulnerability was found in Wildfly, where a user may perform Cross-site scripting in the Wildfly deployment system. This flaw allows an attacker or insider to execute a deployment with a malicious payload, which could trigger undesired behavior against the server.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Secondary3.16.1MEDIUM
CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:N
Primary3.17.3HIGH
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N
Type: Secondary
Version: 3.1
Base score: 6.1
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:N
Type: Primary
Version: 3.1
Base score: 7.3
Base severity: HIGH
Vector:
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N
CPE Matches

Red Hat, Inc.
redhat
>>build_of_keycloak>>-
cpe:2.3:a:redhat:build_of_keycloak:-:*:*:*:*:*:*:*
Red Hat, Inc.
redhat
>>jboss_enterprise_application_platform>>8.0
cpe:2.3:a:redhat:jboss_enterprise_application_platform:8.0:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-79Secondarysecalert@redhat.com
CWE ID: CWE-79
Type: Secondary
Source: secalert@redhat.com
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://access.redhat.com/errata/RHSA-2025:10924secalert@redhat.com
N/A
https://access.redhat.com/errata/RHSA-2025:10925secalert@redhat.com
N/A
https://access.redhat.com/errata/RHSA-2025:10926secalert@redhat.com
N/A
https://access.redhat.com/errata/RHSA-2025:10931secalert@redhat.com
N/A
https://access.redhat.com/errata/RHSA-2025:11636secalert@redhat.com
N/A
https://access.redhat.com/errata/RHSA-2025:11638secalert@redhat.com
N/A
https://access.redhat.com/errata/RHSA-2025:11639secalert@redhat.com
N/A
https://access.redhat.com/errata/RHSA-2025:11640secalert@redhat.com
N/A
https://access.redhat.com/errata/RHSA-2025:11645secalert@redhat.com
N/A
https://access.redhat.com/errata/RHSA-2025:2025secalert@redhat.com
N/A
https://access.redhat.com/errata/RHSA-2025:2026secalert@redhat.com
N/A
https://access.redhat.com/errata/RHSA-2025:2029secalert@redhat.com
N/A
https://access.redhat.com/security/cve/CVE-2024-10234secalert@redhat.com
Vendor Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=2320848secalert@redhat.com
Issue Tracking
Hyperlink: https://access.redhat.com/errata/RHSA-2025:10924
Source: secalert@redhat.com
Resource: N/A
Hyperlink: https://access.redhat.com/errata/RHSA-2025:10925
Source: secalert@redhat.com
Resource: N/A
Hyperlink: https://access.redhat.com/errata/RHSA-2025:10926
Source: secalert@redhat.com
Resource: N/A
Hyperlink: https://access.redhat.com/errata/RHSA-2025:10931
Source: secalert@redhat.com
Resource: N/A
Hyperlink: https://access.redhat.com/errata/RHSA-2025:11636
Source: secalert@redhat.com
Resource: N/A
Hyperlink: https://access.redhat.com/errata/RHSA-2025:11638
Source: secalert@redhat.com
Resource: N/A
Hyperlink: https://access.redhat.com/errata/RHSA-2025:11639
Source: secalert@redhat.com
Resource: N/A
Hyperlink: https://access.redhat.com/errata/RHSA-2025:11640
Source: secalert@redhat.com
Resource: N/A
Hyperlink: https://access.redhat.com/errata/RHSA-2025:11645
Source: secalert@redhat.com
Resource: N/A
Hyperlink: https://access.redhat.com/errata/RHSA-2025:2025
Source: secalert@redhat.com
Resource: N/A
Hyperlink: https://access.redhat.com/errata/RHSA-2025:2026
Source: secalert@redhat.com
Resource: N/A
Hyperlink: https://access.redhat.com/errata/RHSA-2025:2029
Source: secalert@redhat.com
Resource: N/A
Hyperlink: https://access.redhat.com/security/cve/CVE-2024-10234
Source: secalert@redhat.com
Resource:
Vendor Advisory
Hyperlink: https://bugzilla.redhat.com/show_bug.cgi?id=2320848
Source: secalert@redhat.com
Resource:
Issue Tracking

Change History

0
Information is not available yet

Similar CVEs

291Records found

CVE-2017-12158
Matching Score-6
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-6
Assigner-Red Hat, Inc.
CVSS Score-5.4||MEDIUM
EPSS-0.67% / 70.37%
||
7 Day CHG~0.00%
Published-26 Oct, 2017 | 17:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

It was found that Keycloak would accept a HOST header URL in the admin console and use it to determine web resource locations. An attacker could use this flaw against an authenticated user to attain reflected XSS via a malicious server.

Action-Not Available
Vendor-keycloakRed Hat, Inc.
Product-single_sign_onenterprise_linux_serverkeycloakkeycloak
CWE ID-CWE-444
Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling')
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2017-1002152
Matching Score-6
Assigner-Fedora Project
ShareView Details
Matching Score-6
Assigner-Fedora Project
CVSS Score-6.1||MEDIUM
EPSS-0.30% / 53.22%
||
7 Day CHG~0.00%
Published-10 Jan, 2019 | 21:00
Updated-16 Sep, 2024 | 20:27
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Bodhi 2.9.0 and lower is vulnerable to cross-site scripting resulting in code injection caused by incorrect validation of bug titles.

Action-Not Available
Vendor-Fedora Project InfrastructureRed Hat, Inc.
Product-bodhiBodhi
CWE ID-CWE-94
Improper Control of Generation of Code ('Code Injection')
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2021-3914
Matching Score-6
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-6
Assigner-Red Hat, Inc.
CVSS Score-6.1||MEDIUM
EPSS-0.59% / 68.29%
||
7 Day CHG+0.33%
Published-25 Aug, 2022 | 19:36
Updated-03 Aug, 2024 | 17:09
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

It was found that the smallrye health metrics UI component did not properly sanitize some user inputs. An attacker could use this flaw to conduct cross-site scripting attacks.

Action-Not Available
Vendor-n/aRed Hat, Inc.
Product-smallrye_healthopenshift_application_runtimesbuild_of_quarkussmallrye-health
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2021-3672
Matching Score-6
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-6
Assigner-Red Hat, Inc.
CVSS Score-5.6||MEDIUM
EPSS-0.11% / 30.47%
||
7 Day CHG~0.00%
Published-23 Nov, 2021 | 00:00
Updated-15 Oct, 2024 | 17:14
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A flaw was found in c-ares library, where a missing input validation check of host names returned by DNS (Domain Name Servers) can lead to output of wrong hostnames which might potentially lead to Domain Hijacking. The highest threat from this vulnerability is to confidentiality and integrity as well as system availability.

Action-Not Available
Vendor-pgbouncerc-ares_projectn/aSiemens AGRed Hat, Inc.Fedora ProjectNode.js (OpenJS Foundation)
Product-c-aresenterprise_linux_server_update_services_for_sap_solutionsenterprise_linux_server_ausenterprise_linuxenterprise_linux_computer_nodeenterprise_linux_tusnode.jssinec_infrastructure_network_servicespgbouncerenterprise_linux_workstationfedoraenterprise_linux_for_ibm_z_systemsenterprise_linux_eusenterprise_linux_for_power_little_endian_eusenterprise_linux_server_tusenterprise_linux_for_power_little_endianenterprise_linux_for_ibm_z_systems_eusc-ares
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2016-8608
Matching Score-6
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-6
Assigner-Red Hat, Inc.
CVSS Score-5.4||MEDIUM
EPSS-0.18% / 39.75%
||
7 Day CHG~0.00%
Published-01 Aug, 2018 | 14:00
Updated-06 Aug, 2024 | 02:27
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

JBoss BRMS 6 and BPM Suite 6 are vulnerable to a stored XSS via business process editor. The flaw is due to an incomplete fix for CVE-2016-5398. Remote, authenticated attackers that have privileges to create business processes can store scripts in them, which are not properly sanitized before showing to other users, including admins.

Action-Not Available
Vendor-Red Hat, Inc.
Product-jboss_bpm_suitejboss_business_rules_management_systemBRMS
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2016-8639
Matching Score-6
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-6
Assigner-Red Hat, Inc.
CVSS Score-6.1||MEDIUM
EPSS-0.58% / 68.01%
||
7 Day CHG~0.00%
Published-01 Aug, 2018 | 13:00
Updated-06 Aug, 2024 | 02:27
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

It was found that foreman before 1.13.0 is vulnerable to a stored XSS via an organization or location name. This could allow an attacker with privileges to set the organization or location name to display arbitrary HTML including scripting code within the web interface.

Action-Not Available
Vendor-Red Hat, Inc.The Foreman
Product-satelliteforemansatellite_capsuleforeman
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2020-10748
Matching Score-6
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-6
Assigner-Red Hat, Inc.
CVSS Score-6.1||MEDIUM
EPSS-0.39% / 59.33%
||
7 Day CHG~0.00%
Published-16 Sep, 2020 | 17:56
Updated-04 Aug, 2024 | 11:14
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A flaw was found in Keycloak's data filter, in version 10.0.1, where it allowed the processing of data URLs in some circumstances. This flaw allows an attacker to conduct cross-site scripting or further attacks.

Action-Not Available
Vendor-n/aRed Hat, Inc.
Product-single_sign-onkeycloakkeycloak
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2016-7103
Matching Score-6
Assigner-MITRE Corporation
ShareView Details
Matching Score-6
Assigner-MITRE Corporation
CVSS Score-6.1||MEDIUM
EPSS-1.40% / 79.64%
||
7 Day CHG~0.00%
Published-15 Mar, 2017 | 00:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Cross-site scripting (XSS) vulnerability in jQuery UI before 1.12.0 might allow remote attackers to inject arbitrary web script or HTML via the closeText parameter of the dialog function.

Action-Not Available
Vendor-jqueryuin/aDebian GNU/LinuxRed Hat, Inc.Oracle CorporationFedora ProjectJuniper Networks, Inc.NetApp, Inc.
Product-weblogic_serversnapcentersiebel_ui_frameworkfedorajquery_uioss_support_toolsbusiness_intelligencejunosdebian_linuxprimavera_unifierhospitality_cruise_fleet_managementapplication_expressopenstackn/a
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2016-7033
Matching Score-6
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-6
Assigner-Red Hat, Inc.
CVSS Score-6.1||MEDIUM
EPSS-0.35% / 56.56%
||
7 Day CHG~0.00%
Published-07 Sep, 2016 | 18:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Multiple cross-site scripting (XSS) vulnerabilities in the admin pages in dashbuilder in Red Hat JBoss BPM Suite 6.3.2 allow remote attackers to inject arbitrary web script or HTML via unspecified vectors.

Action-Not Available
Vendor-n/aRed Hat, Inc.
Product-jboss_bpm_suiten/a
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2016-6343
Matching Score-6
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-6
Assigner-Red Hat, Inc.
CVSS Score-6.1||MEDIUM
EPSS-0.38% / 58.62%
||
7 Day CHG~0.00%
Published-31 Oct, 2018 | 13:00
Updated-06 Aug, 2024 | 01:29
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

JBoss BPM Suite 6 is vulnerable to a reflected XSS via dashbuilder. Remote attackers can entice authenticated users that have privileges to access dashbuilder (usually admins) to click on links to /dashbuilder/Controller containing malicious scripts. Successful exploitation would allow execution of script code within the context of the affected user.

Action-Not Available
Vendor-[UNKNOWN]Red Hat, Inc.
Product-jboss_bpm_suiteDashbuilder
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2016-6347
Matching Score-6
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-6
Assigner-Red Hat, Inc.
CVSS Score-6.1||MEDIUM
EPSS-0.20% / 42.33%
||
7 Day CHG~0.00%
Published-20 Apr, 2017 | 17:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Cross-site scripting (XSS) vulnerability in the default exception handler in RESTEasy allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.

Action-Not Available
Vendor-n/aRed Hat, Inc.
Product-resteasyn/a
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2016-6519
Matching Score-6
Assigner-OpenText (formerly Micro Focus)
ShareView Details
Matching Score-6
Assigner-OpenText (formerly Micro Focus)
CVSS Score-5.4||MEDIUM
EPSS-0.28% / 50.73%
||
7 Day CHG~0.00%
Published-21 Apr, 2017 | 15:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Cross-site scripting (XSS) vulnerability in the "Shares" overview in Openstack Manila before 2.5.1 allows remote authenticated users to inject arbitrary web script or HTML via the Metadata field in the "Create Share" form.

Action-Not Available
Vendor-n/aRed Hat, Inc.OpenStack
Product-manilaopenstackn/a
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2016-6348
Matching Score-6
Assigner-MITRE Corporation
ShareView Details
Matching Score-6
Assigner-MITRE Corporation
CVSS Score-6.1||MEDIUM
EPSS-0.28% / 51.32%
||
7 Day CHG~0.00%
Published-12 Apr, 2017 | 22:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

JacksonJsonpInterceptor in RESTEasy might allow remote attackers to conduct a cross-site script inclusion (XSSI) attack.

Action-Not Available
Vendor-n/aRed Hat, Inc.
Product-resteasyn/a
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2019-8331
Matching Score-6
Assigner-MITRE Corporation
ShareView Details
Matching Score-6
Assigner-MITRE Corporation
CVSS Score-6.1||MEDIUM
EPSS-1.46% / 80.09%
||
7 Day CHG~0.00%
Published-20 Feb, 2019 | 16:00
Updated-04 Aug, 2024 | 21:17
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In Bootstrap before 3.4.1 and 4.3.x before 4.3.1, XSS is possible in the tooltip or popover data-template attribute.

Action-Not Available
Vendor-getbootstrapn/aRed Hat, Inc.Tenable, Inc.F5, Inc.
Product-big-ip_webacceleratorbig-ip_application_acceleration_managerbig-ip_policy_enforcement_managerbig-ip_fraud_protection_servicebig-ip_global_traffic_managerbig-ip_analyticsbig-ip_local_traffic_managerbig-ip_domain_name_systemtenable.scbig-ip_application_security_managerbig-ip_edge_gatewaybig-ip_link_controllervirtualization_managerbootstrapbig-ip_access_policy_managerbig-ip_advanced_firewall_managern/a
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2016-4428
Matching Score-6
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-6
Assigner-Red Hat, Inc.
CVSS Score-5.4||MEDIUM
EPSS-0.55% / 67.05%
||
7 Day CHG~0.00%
Published-12 Jul, 2016 | 19:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Cross-site scripting (XSS) vulnerability in OpenStack Dashboard (Horizon) 8.0.1 and earlier and 9.0.0 through 9.0.1 allows remote authenticated users to inject arbitrary web script or HTML by injecting an AngularJS template in a dashboard form.

Action-Not Available
Vendor-n/aRed Hat, Inc.OpenStackDebian GNU/Linux
Product-enterprise_linuxdebian_linuxopenstackhorizonn/a
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2013-1855
Matching Score-6
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-6
Assigner-Red Hat, Inc.
CVSS Score-4.3||MEDIUM
EPSS-0.54% / 66.47%
||
7 Day CHG~0.00%
Published-19 Mar, 2013 | 22:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The sanitize_css method in lib/action_controller/vendor/html-scanner/html/sanitizer.rb in the Action Pack component in Ruby on Rails before 2.3.18, 3.0.x and 3.1.x before 3.1.12, and 3.2.x before 3.2.13 does not properly handle \n (newline) characters, which makes it easier for remote attackers to conduct cross-site scripting (XSS) attacks via crafted Cascading Style Sheets (CSS) token sequences.

Action-Not Available
Vendor-n/aRuby on RailsRed Hat, Inc.
Product-enterprise_linuxruby_on_railsrailsn/a
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2012-6662
Matching Score-6
Assigner-MITRE Corporation
ShareView Details
Matching Score-6
Assigner-MITRE Corporation
CVSS Score-4.3||MEDIUM
EPSS-7.54% / 91.45%
||
7 Day CHG+1.27%
Published-24 Nov, 2014 | 16:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Cross-site scripting (XSS) vulnerability in the default content option in jquery.ui.tooltip.js in the Tooltip widget in jQuery UI before 1.10.0 allows remote attackers to inject arbitrary web script or HTML via the title attribute, which is not properly handled in the autocomplete combo box demo.

Action-Not Available
Vendor-jqueryuin/aRed Hat, Inc.
Product-enterprise_linux_serverjquery_uienterprise_linux_hpc_nodeenterprise_linux_desktopenterprise_linux_workstationn/a
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2013-0186
Matching Score-6
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-6
Assigner-Red Hat, Inc.
CVSS Score-6.1||MEDIUM
EPSS-0.40% / 59.96%
||
7 Day CHG~0.00%
Published-01 Nov, 2019 | 18:38
Updated-06 Aug, 2024 | 14:18
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Multiple cross-site scripting (XSS) vulnerabilities in ManageIQ EVM allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.

Action-Not Available
Vendor-ManageIQ EVMRed Hat, Inc.
Product-cloudformsmanageiq_enterprise_virtualization_managerManageIQ EVMRed Hat CloudForms 3.0
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2019-5778
Matching Score-6
Assigner-Chrome
ShareView Details
Matching Score-6
Assigner-Chrome
CVSS Score-6.5||MEDIUM
EPSS-0.49% / 64.66%
||
7 Day CHG~0.00%
Published-19 Feb, 2019 | 17:00
Updated-04 Aug, 2024 | 20:01
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A missing case for handling special schemes in permission request checks in Extensions in Google Chrome prior to 72.0.3626.81 allowed an attacker who convinced a user to install a malicious extension to bypass extension permission checks for privileged pages via a crafted Chrome Extension.

Action-Not Available
Vendor-Google LLCRed Hat, Inc.Fedora ProjectDebian GNU/Linux
Product-enterprise_linux_serverdebian_linuxchromeenterprise_linux_workstationfedoraenterprise_linux_desktopChrome
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2012-6149
Matching Score-6
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-6
Assigner-Red Hat, Inc.
CVSS Score-3.5||LOW
EPSS-0.25% / 48.34%
||
7 Day CHG~0.00%
Published-14 Feb, 2014 | 15:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Multiple cross-site scripting (XSS) vulnerabilities in systems/sdc/notes.jsp in Spacewalk and Red Hat Network (RHN) Satellite 5.6 allow remote attackers to inject arbitrary web script or HTML via the (1) subject or (2) content values of a note in a system.addNote XML-RPC call.

Action-Not Available
Vendor-n/aRed Hat, Inc.
Product-satellitesatellite_5_managed_dbspacewalk-javan/a
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2012-5531
Matching Score-6
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-6
Assigner-Red Hat, Inc.
CVSS Score-4.3||MEDIUM
EPSS-0.25% / 47.92%
||
7 Day CHG~0.00%
Published-18 Jan, 2013 | 11:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Multiple cross-site scripting (XSS) vulnerabilities in the GateIn Portal in JBoss Enterprise Portal Platform 5.2.2 allow remote attackers to inject arbitrary web script or HTML via unspecified vectors.

Action-Not Available
Vendor-n/aRed Hat, Inc.
Product-jboss_enterprise_portal_platformn/a
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2012-5841
Matching Score-6
Assigner-MITRE Corporation
ShareView Details
Matching Score-6
Assigner-MITRE Corporation
CVSS Score-4.3||MEDIUM
EPSS-1.54% / 80.67%
||
7 Day CHG~0.00%
Published-21 Nov, 2012 | 11:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Mozilla Firefox before 17.0, Firefox ESR 10.x before 10.0.11, Thunderbird before 17.0, Thunderbird ESR 10.x before 10.0.11, and SeaMonkey before 2.14 implement cross-origin wrappers with a filtering behavior that does not properly restrict write actions, which allows remote attackers to conduct cross-site scripting (XSS) attacks via a crafted web site.

Action-Not Available
Vendor-n/aSUSECanonical Ltd.Mozilla CorporationRed Hat, Inc.openSUSE
Product-enterprise_linux_desktoplinux_enterprise_serverlinux_enterprise_software_development_kitubuntu_linuxthunderbird_esrenterprise_linux_eusseamonkeyenterprise_linux_workstationthunderbirdlinux_enterprise_desktopfirefoxopensuseenterprise_linux_servern/a
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2012-3992
Matching Score-6
Assigner-MITRE Corporation
ShareView Details
Matching Score-6
Assigner-MITRE Corporation
CVSS Score-4.3||MEDIUM
EPSS-1.14% / 77.53%
||
7 Day CHG~0.00%
Published-10 Oct, 2012 | 17:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Mozilla Firefox before 16.0, Firefox ESR 10.x before 10.0.8, Thunderbird before 16.0, Thunderbird ESR 10.x before 10.0.8, and SeaMonkey before 2.13 do not properly manage history data, which allows remote attackers to conduct cross-site scripting (XSS) attacks or obtain sensitive POST content via vectors involving a location.hash write operation and history navigation that triggers the loading of a URL into the history object.

Action-Not Available
Vendor-n/aSUSECanonical Ltd.Mozilla CorporationRed Hat, Inc.
Product-linux_enterprise_sdkenterprise_linux_desktoplinux_enterprise_serverubuntu_linuxthunderbird_esrenterprise_linux_eusseamonkeyenterprise_linux_workstationthunderbirdlinux_enterprise_desktopfirefoxenterprise_linux_servern/a
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2012-4209
Matching Score-6
Assigner-MITRE Corporation
ShareView Details
Matching Score-6
Assigner-MITRE Corporation
CVSS Score-4.3||MEDIUM
EPSS-2.07% / 83.21%
||
7 Day CHG~0.00%
Published-21 Nov, 2012 | 11:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Mozilla Firefox before 17.0, Firefox ESR 10.x before 10.0.11, Thunderbird before 17.0, Thunderbird ESR 10.x before 10.0.11, and SeaMonkey before 2.14 do not prevent use of a "top" frame name-attribute value to access the location property, which makes it easier for remote attackers to conduct cross-site scripting (XSS) attacks via vectors involving a binary plugin.

Action-Not Available
Vendor-n/aSUSECanonical Ltd.Mozilla CorporationRed Hat, Inc.openSUSE
Product-enterprise_linux_desktoplinux_enterprise_serverlinux_enterprise_software_development_kitubuntu_linuxthunderbird_esrenterprise_linux_eusseamonkeyenterprise_linux_workstationthunderbirdlinux_enterprise_desktopfirefoxopensuseenterprise_linux_servern/a
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2012-4201
Matching Score-6
Assigner-MITRE Corporation
ShareView Details
Matching Score-6
Assigner-MITRE Corporation
CVSS Score-4.3||MEDIUM
EPSS-2.61% / 85.07%
||
7 Day CHG~0.00%
Published-21 Nov, 2012 | 11:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The evalInSandbox implementation in Mozilla Firefox before 17.0, Firefox ESR 10.x before 10.0.11, Thunderbird before 17.0, Thunderbird ESR 10.x before 10.0.11, and SeaMonkey before 2.14 uses an incorrect context during the handling of JavaScript code that sets the location.href property, which allows remote attackers to conduct cross-site scripting (XSS) attacks or read arbitrary files by leveraging a sandboxed add-on.

Action-Not Available
Vendor-n/aSUSECanonical Ltd.Mozilla CorporationRed Hat, Inc.openSUSEDebian GNU/Linux
Product-enterprise_linux_desktoplinux_enterprise_serverlinux_enterprise_software_development_kitubuntu_linuxthunderbird_esrenterprise_linux_eusseamonkeyenterprise_linux_workstationthunderbirddebian_linuxlinux_enterprise_desktopfirefoxopensuseenterprise_linux_servern/a
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2012-4194
Matching Score-6
Assigner-MITRE Corporation
ShareView Details
Matching Score-6
Assigner-MITRE Corporation
CVSS Score-4.3||MEDIUM
EPSS-1.36% / 79.38%
||
7 Day CHG~0.00%
Published-29 Oct, 2012 | 18:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Mozilla Firefox before 16.0.2, Firefox ESR 10.x before 10.0.10, Thunderbird before 16.0.2, Thunderbird ESR 10.x before 10.0.10, and SeaMonkey before 2.13.2 do not prevent use of the valueOf method to shadow the location object (aka window.location), which makes it easier for remote attackers to conduct cross-site scripting (XSS) attacks via vectors involving a plugin.

Action-Not Available
Vendor-n/aSUSECanonical Ltd.Mozilla CorporationRed Hat, Inc.openSUSE
Product-enterprise_linux_desktoplinux_enterprise_serverlinux_enterprise_software_development_kitubuntu_linuxthunderbird_esrenterprise_linux_eusseamonkeyenterprise_linux_workstationthunderbirdlinux_enterprise_desktopfirefoxopensuseenterprise_linux_servern/a
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2012-4451
Matching Score-6
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-6
Assigner-Red Hat, Inc.
CVSS Score-6.1||MEDIUM
EPSS-1.78% / 81.95%
||
7 Day CHG~0.00%
Published-03 Jan, 2020 | 16:03
Updated-06 Aug, 2024 | 20:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Multiple cross-site scripting (XSS) vulnerabilities in Zend Framework 2.0.x before 2.0.1 allow remote attackers to inject arbitrary web script or HTML via unspecified input to (1) Debug, (2) Feed\PubSubHubbub, (3) Log\Formatter\Xml, (4) Tag\Cloud\Decorator, (5) Uri, (6) View\Helper\HeadStyle, (7) View\Helper\Navigation\Sitemap, or (8) View\Helper\Placeholder\Container\AbstractStandalone, related to Escaper.

Action-Not Available
Vendor-Red Hat, Inc.Fedora ProjectPerforce Software, Inc.
Product-enterprise_linuxfedorazend_frameworkZend Framework
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2012-4195
Matching Score-6
Assigner-MITRE Corporation
ShareView Details
Matching Score-6
Assigner-MITRE Corporation
CVSS Score-4.3||MEDIUM
EPSS-0.96% / 75.58%
||
7 Day CHG~0.00%
Published-29 Oct, 2012 | 18:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The nsLocation::CheckURL function in Mozilla Firefox before 16.0.2, Firefox ESR 10.x before 10.0.10, Thunderbird before 16.0.2, Thunderbird ESR 10.x before 10.0.10, and SeaMonkey before 2.13.2 does not properly determine the calling document and principal in its return value, which makes it easier for remote attackers to conduct cross-site scripting (XSS) attacks via a crafted web site, and makes it easier for remote attackers to execute arbitrary JavaScript code by leveraging certain add-on behavior.

Action-Not Available
Vendor-n/aSUSECanonical Ltd.Mozilla CorporationRed Hat, Inc.openSUSE
Product-enterprise_linux_desktoplinux_enterprise_serverlinux_enterprise_software_development_kitubuntu_linuxthunderbird_esrenterprise_linux_eusseamonkeyenterprise_linux_workstationthunderbirdlinux_enterprise_desktopfirefoxopensuseenterprise_linux_servern/a
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2012-4184
Matching Score-6
Assigner-MITRE Corporation
ShareView Details
Matching Score-6
Assigner-MITRE Corporation
CVSS Score-4.3||MEDIUM
EPSS-1.10% / 77.18%
||
7 Day CHG~0.00%
Published-10 Oct, 2012 | 17:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The Chrome Object Wrapper (COW) implementation in Mozilla Firefox before 16.0, Firefox ESR 10.x before 10.0.8, Thunderbird before 16.0, Thunderbird ESR 10.x before 10.0.8, and SeaMonkey before 2.13 does not prevent access to properties of a prototype for a standard class, which allows remote attackers to execute arbitrary JavaScript code with chrome privileges via a crafted web site.

Action-Not Available
Vendor-n/aSUSECanonical Ltd.Mozilla CorporationRed Hat, Inc.
Product-linux_enterprise_sdkenterprise_linux_desktoplinux_enterprise_serverubuntu_linuxthunderbird_esrenterprise_linux_eusseamonkeyenterprise_linux_workstationthunderbirdlinux_enterprise_desktopfirefoxenterprise_linux_servern/a
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2019-3873
Matching Score-6
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-6
Assigner-Red Hat, Inc.
CVSS Score-6.4||MEDIUM
EPSS-0.51% / 65.25%
||
7 Day CHG~0.00%
Published-12 Jun, 2019 | 13:43
Updated-04 Aug, 2024 | 19:19
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

It was found that Picketlink as shipped with Jboss Enterprise Application Platform 7.2 would accept an xinclude parameter in SAMLresponse XML. An attacker could use this flaw to send a URL to achieve cross-site scripting or possibly conduct further attacks.

Action-Not Available
Vendor-Red Hat, Inc.
Product-jboss_enterprise_application_platformsingle_sign-onenterprise_linuxpicketlink
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2012-4207
Matching Score-6
Assigner-MITRE Corporation
ShareView Details
Matching Score-6
Assigner-MITRE Corporation
CVSS Score-4.3||MEDIUM
EPSS-1.71% / 81.57%
||
7 Day CHG~0.00%
Published-21 Nov, 2012 | 11:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The HZ-GB-2312 character-set implementation in Mozilla Firefox before 17.0, Firefox ESR 10.x before 10.0.11, Thunderbird before 17.0, Thunderbird ESR 10.x before 10.0.11, and SeaMonkey before 2.14 does not properly handle a ~ (tilde) character in proximity to a chunk delimiter, which allows remote attackers to conduct cross-site scripting (XSS) attacks via a crafted document.

Action-Not Available
Vendor-n/aSUSECanonical Ltd.Mozilla CorporationRed Hat, Inc.openSUSEDebian GNU/Linux
Product-enterprise_linux_desktoplinux_enterprise_serverlinux_enterprise_software_development_kitubuntu_linuxthunderbird_esrenterprise_linux_eusseamonkeyenterprise_linux_workstationthunderbirddebian_linuxlinux_enterprise_desktopfirefoxopensuseenterprise_linux_servern/a
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2012-3994
Matching Score-6
Assigner-MITRE Corporation
ShareView Details
Matching Score-6
Assigner-MITRE Corporation
CVSS Score-4.3||MEDIUM
EPSS-0.93% / 75.13%
||
7 Day CHG~0.00%
Published-10 Oct, 2012 | 17:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Mozilla Firefox before 16.0, Firefox ESR 10.x before 10.0.8, Thunderbird before 16.0, Thunderbird ESR 10.x before 10.0.8, and SeaMonkey before 2.13 allow remote attackers to conduct cross-site scripting (XSS) attacks via a binary plugin that uses Object.defineProperty to shadow the top object, and leverages the relationship between top.location and the location property.

Action-Not Available
Vendor-n/aSUSECanonical Ltd.Mozilla CorporationRed Hat, Inc.
Product-linux_enterprise_sdkenterprise_linux_desktoplinux_enterprise_serverubuntu_linuxthunderbird_esrenterprise_linux_eusseamonkeyenterprise_linux_workstationthunderbirdlinux_enterprise_desktopfirefoxenterprise_linux_servern/a
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2019-3872
Matching Score-6
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-6
Assigner-Red Hat, Inc.
CVSS Score-5.4||MEDIUM
EPSS-0.23% / 46.13%
||
7 Day CHG~0.00%
Published-12 Jun, 2019 | 13:45
Updated-04 Aug, 2024 | 19:19
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

It was found that a SAMLRequest containing a script could be processed by Picketlink versions shipped in Jboss Application Platform 7.2.x and 7.1.x. An attacker could use this to send a malicious script to achieve cross-site scripting and obtain unauthorized information or conduct further attacks.

Action-Not Available
Vendor-Red Hat, Inc.
Product-jboss_enterprise_application_platformsingle_sign-onenterprise_linuxpicketlink
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2012-4543
Matching Score-6
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-6
Assigner-Red Hat, Inc.
CVSS Score-4.3||MEDIUM
EPSS-0.24% / 46.76%
||
7 Day CHG~0.00%
Published-04 Jan, 2013 | 22:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Multiple cross-site scripting (XSS) vulnerabilities in Red Hat Certificate System (RHCS) before 8.1.3 allow remote attackers to inject arbitrary web script or HTML via the (1) pageStart or (2) pageSize to the displayCRL script, or (3) nonce variable to the profileProcess script.

Action-Not Available
Vendor-n/aRed Hat, Inc.
Product-certificate_systemn/a
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2019-3889
Matching Score-6
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-6
Assigner-Red Hat, Inc.
CVSS Score-4.6||MEDIUM
EPSS-0.35% / 56.94%
||
7 Day CHG~0.00%
Published-11 Jul, 2019 | 18:27
Updated-04 Aug, 2024 | 19:19
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A reflected XSS vulnerability exists in authorization flow of OpenShift Container Platform versions: openshift-online-3, openshift-enterprise-3.4 through 3.7 and openshift-enterprise-3.9 through 3.11. An attacker could use this flaw to steal authorization data by getting them to click on a malicious link.

Action-Not Available
Vendor-Red Hat, Inc.
Product-openshift_container_platformatomic-openshift
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2012-2662
Matching Score-6
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-6
Assigner-Red Hat, Inc.
CVSS Score-4.3||MEDIUM
EPSS-0.24% / 46.76%
||
7 Day CHG~0.00%
Published-13 Aug, 2012 | 20:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Multiple cross-site scripting (XSS) vulnerabilities in Red Hat Certificate System (RHCS) before 8.1.1 and Dogtag Certificate System allow remote attackers to inject arbitrary web script or HTML via unspecified parameters to the (1) System Agent or (2) End Entity pages.

Action-Not Available
Vendor-n/aRed Hat, Inc.
Product-certificate_systemdogtag_certificate_systemn/a
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2012-2683
Matching Score-6
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-6
Assigner-Red Hat, Inc.
CVSS Score-4.3||MEDIUM
EPSS-0.47% / 63.50%
||
7 Day CHG~0.00%
Published-28 Sep, 2012 | 17:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Multiple cross-site scripting (XSS) vulnerabilities in Cumin before 0.1.5444, as used in Red Hat Enterprise Messaging, Realtime, and Grid (MRG) 2.0, allow remote attackers to inject arbitrary web script or HTML via unspecified vectors related to (1) "error message displays" or (2) "in source HTML on certain pages."

Action-Not Available
Vendor-trevor_mckayn/aRed Hat, Inc.
Product-cuminenterprise_mrgn/a
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2019-19336
Matching Score-6
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-6
Assigner-Red Hat, Inc.
CVSS Score-5.4||MEDIUM
EPSS-0.30% / 53.22%
||
7 Day CHG~0.00%
Published-19 Mar, 2020 | 13:11
Updated-05 Aug, 2024 | 02:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A cross-site scripting vulnerability was reported in the oVirt-engine's OAuth authorization endpoint before version 4.3.8. URL parameters were included in the HTML response without escaping. This flaw would allow an attacker to craft malicious HTML pages that can run scripts in the context of the user's oVirt session.

Action-Not Available
Vendor-ovirtRed Hat, Inc.
Product-ovirt-enginevirtualizationovirt-engine
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2011-4735
Matching Score-6
Assigner-MITRE Corporation
ShareView Details
Matching Score-6
Assigner-MITRE Corporation
CVSS Score-4.3||MEDIUM
EPSS-0.51% / 65.24%
||
7 Day CHG~0.00%
Published-16 Dec, 2011 | 11:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Multiple cross-site scripting (XSS) vulnerabilities in the Control Panel in Parallels Plesk Panel 10.2.0 build 20110407.20 allow remote attackers to inject arbitrary web script or HTML via crafted input to a PHP script, as demonstrated by smb/user/create and certain other files.

Action-Not Available
Vendor-n/aParallels International GmbhRed Hat, Inc.Microsoft Corporation
Product-enterprise_linuxwindowsparallels_plesk_paneln/a
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2011-4745
Matching Score-6
Assigner-MITRE Corporation
ShareView Details
Matching Score-6
Assigner-MITRE Corporation
CVSS Score-4.3||MEDIUM
EPSS-0.22% / 45.22%
||
7 Day CHG~0.00%
Published-16 Dec, 2011 | 11:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Multiple cross-site scripting (XSS) vulnerabilities in the billing system for Parallels Plesk Panel 10.3.1_build1013110726.09 allow remote attackers to inject arbitrary web script or HTML via crafted input to a PHP script, as demonstrated by admin/index.php/default and certain other files.

Action-Not Available
Vendor-n/aParallels International GmbhRed Hat, Inc.
Product-enterprise_linuxparallels_plesk_paneln/a
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2011-4580
Matching Score-6
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-6
Assigner-Red Hat, Inc.
CVSS Score-4.3||MEDIUM
EPSS-0.26% / 49.44%
||
7 Day CHG~0.00%
Published-26 Feb, 2014 | 15:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Multiple cross-site scripting (XSS) vulnerabilities in Red Hat JBoss Enterprise Portal Platform before 5.2.0 allow remote attackers to inject arbitrary web script or HTML via unspecified vectors.

Action-Not Available
Vendor-n/aRed Hat, Inc.
Product-jboss_enterprise_portal_platformn/a
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2011-3606
Matching Score-6
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-6
Assigner-Red Hat, Inc.
CVSS Score-5.4||MEDIUM
EPSS-0.40% / 59.99%
||
7 Day CHG~0.00%
Published-26 Nov, 2019 | 01:43
Updated-06 Aug, 2024 | 23:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A DOM based cross-site scripting flaw was found in the JBoss Application Server 7 before 7.1.0 Beta 1 administration console. A remote attacker could provide a specially-crafted web page and trick the valid JBoss AS user, with the administrator privilege, to visit it, which would lead into the DOM environment modification and arbitrary HTML or web script execution.

Action-Not Available
Vendor-JBoss Application ServerRed Hat, Inc.
Product-jboss_application_serverJBoss Application Server
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2011-4346
Matching Score-6
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-6
Assigner-Red Hat, Inc.
CVSS Score-3.5||LOW
EPSS-0.28% / 50.83%
||
7 Day CHG~0.00%
Published-10 Dec, 2011 | 17:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Cross-site scripting (XSS) vulnerability in the web interface in Red Hat Network (RHN) Satellite 5.4.1 allows remote authenticated users to inject arbitrary web script or HTML via the Description field of the asset tag in a Custom Info page.

Action-Not Available
Vendor-n/aRed Hat, Inc.
Product-enterprise_linuxsatelliten/a
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2011-3344
Matching Score-6
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-6
Assigner-Red Hat, Inc.
CVSS Score-4.3||MEDIUM
EPSS-0.39% / 59.21%
||
7 Day CHG~0.00%
Published-05 Feb, 2014 | 18:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Cross-site scripting (XSS) vulnerability in the Lookup Login/Password form in Spacewalk 1.6, as used in Red Hat Network (RHN) Satellite, allows remote attackers to inject arbitrary web script or HTML via the URI.

Action-Not Available
Vendor-n/aRed Hat, Inc.
Product-network_satellitespacewalkn/a
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2011-2927
Matching Score-6
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-6
Assigner-Red Hat, Inc.
CVSS Score-4.3||MEDIUM
EPSS-0.34% / 56.28%
||
7 Day CHG~0.00%
Published-05 Feb, 2014 | 18:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Multiple cross-site scripting (XSS) vulnerabilities in Spacewalk 1.6, as used in Red Hat Network (RHN) Satellite, allow remote attackers to inject arbitrary web script or HTML via vectors related to Search forms.

Action-Not Available
Vendor-n/aRed Hat, Inc.
Product-network_satellitespacewalkn/a
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2009-1349
Matching Score-6
Assigner-MITRE Corporation
ShareView Details
Matching Score-6
Assigner-MITRE Corporation
CVSS Score-4.3||MEDIUM
EPSS-0.14% / 34.40%
||
7 Day CHG~0.00%
Published-21 Apr, 2009 | 15:00
Updated-07 Aug, 2024 | 05:13
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Cross-site scripting (XSS) vulnerability in C2Net Stronghold 2.3 allows remote attackers to inject arbitrary web script or HTML via the URI.

Action-Not Available
Vendor-n/aRed Hat, Inc.
Product-strongholdn/a
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2011-3206
Matching Score-6
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-6
Assigner-Red Hat, Inc.
CVSS Score-4.3||MEDIUM
EPSS-0.36% / 57.19%
||
7 Day CHG~0.00%
Published-08 Jan, 2012 | 00:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Multiple cross-site scripting (XSS) vulnerabilities in the administration interface in RHQ 4.2.0, as used in JBoss Operations Network (aka JON or JBoss ON) before 3.0, allow remote attackers to inject arbitrary web script or HTML via unspecified vectors.

Action-Not Available
Vendor-rhq-projectn/aRed Hat, Inc.
Product-jboss_operations_networkrhqn/a
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2019-17022
Matching Score-6
Assigner-Mozilla Corporation
ShareView Details
Matching Score-6
Assigner-Mozilla Corporation
CVSS Score-6.1||MEDIUM
EPSS-2.47% / 84.67%
||
7 Day CHG~0.00%
Published-08 Jan, 2020 | 21:30
Updated-05 Aug, 2024 | 01:24
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

When pasting a &lt;style&gt; tag from the clipboard into a rich text editor, the CSS sanitizer does not escape &lt; and &gt; characters. Because the resulting string is pasted directly into the text node of the element this does not result in a direct injection into the webpage; however, if a webpage subsequently copies the node's innerHTML, assigning it to another innerHTML, this would result in an XSS vulnerability. Two WYSIWYG editors were identified with this behavior, more may exist. This vulnerability affects Firefox ESR < 68.4 and Firefox < 72.

Action-Not Available
Vendor-Canonical Ltd.Red Hat, Inc.Mozilla CorporationDebian GNU/Linux
Product-enterprise_linux_serverubuntu_linuxdebian_linuxfirefoxfirefox_esrenterprise_linux_server_ausenterprise_linux_workstationenterprise_linux_server_tusenterprise_linux_desktopFirefoxFirefox ESR
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2011-2919
Matching Score-6
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-6
Assigner-Red Hat, Inc.
CVSS Score-4.3||MEDIUM
EPSS-0.32% / 54.60%
||
7 Day CHG~0.00%
Published-05 Feb, 2014 | 18:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Cross-site scripting (XSS) vulnerability in Spacewalk 1.6, as used in Red Hat Network (RHN) Satellite, allows remote attackers to inject arbitrary web script or HTML via the QueryString to the SystemGroupList.do page.

Action-Not Available
Vendor-n/aRed Hat, Inc.
Product-network_satellitespacewalkn/a
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2011-2920
Matching Score-6
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-6
Assigner-Red Hat, Inc.
CVSS Score-4.3||MEDIUM
EPSS-0.39% / 59.21%
||
7 Day CHG~0.00%
Published-05 Feb, 2014 | 18:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Multiple cross-site scripting (XSS) vulnerabilities in Spacewalk 1.6, as used in Red Hat Network (RHN) Satellite, allow remote attackers to inject arbitrary web script or HTML via the "Filter by Synopsis" field and other unspecified filter forms.

Action-Not Available
Vendor-n/aRed Hat, Inc.
Product-network_satellitespacewalkn/a
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
  • Previous
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • Next
Details not found