Language:
https://access.redhat.com/security/updates/classification/#important
http://www.nessus.org/u?c7aafbf8
http://www.nessus.org/u?31eae5d2
https://bugzilla.redhat.com/show_bug.cgi?id=2108554
https://bugzilla.redhat.com/show_bug.cgi?id=2127078
https://bugzilla.redhat.com/show_bug.cgi?id=2266921
https://bugzilla.redhat.com/show_bug.cgi?id=2278615
https://bugzilla.redhat.com/show_bug.cgi?id=2280600
https://issues.redhat.com/browse/JBEAP-27049
https://issues.redhat.com/browse/JBEAP-27357
https://issues.redhat.com/browse/JBEAP-27548
https://issues.redhat.com/browse/JBEAP-27613
https://issues.redhat.com/browse/JBEAP-27658
https://issues.redhat.com/browse/JBEAP-27700
https://issues.redhat.com/browse/JBEAP-27701
https://issues.redhat.com/browse/JBEAP-27713
https://issues.redhat.com/browse/JBEAP-27714
https://issues.redhat.com/browse/JBEAP-27715
https://issues.redhat.com/browse/JBEAP-27746
https://issues.redhat.com/browse/JBEAP-27747
Severity: High
ID: 209009
File Name: redhat-RHSA-2024-8075.nasl
Version: 1.1
Type: local
Agent: unix
Family: Red Hat Local Security Checks
Published: 10/14/2024
Updated: 10/14/2024
Supported Sensors: Frictionless Assessment AWS, Frictionless Assessment Azure, Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Nessus
Risk Factor: Medium
Score: 4.4
Vendor Severity: Important
Risk Factor: High
Base Score: 7.8
Temporal Score: 6.1
Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:C/A:N
CVSS Score Source: CVE-2022-34169
Risk Factor: High
Base Score: 7.5
Temporal Score: 6.7
Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C
CPE: p-cpe:/a:redhat:enterprise_linux:eap7-ironjacamar-common-impl, p-cpe:/a:redhat:enterprise_linux:eap7-jboss-ejb-client, p-cpe:/a:redhat:enterprise_linux:eap7-wildfly-modules, p-cpe:/a:redhat:enterprise_linux:eap7-ironjacamar-validator, p-cpe:/a:redhat:enterprise_linux:eap7-wildfly, p-cpe:/a:redhat:enterprise_linux:eap7-hibernate-validator, p-cpe:/a:redhat:enterprise_linux:eap7-wildfly-java-jdk8, p-cpe:/a:redhat:enterprise_linux:eap7-jboss-cert-helper, p-cpe:/a:redhat:enterprise_linux:eap7-ironjacamar, p-cpe:/a:redhat:enterprise_linux:eap7-jboss-server-migration, p-cpe:/a:redhat:enterprise_linux:eap7-xalan-j2, p-cpe:/a:redhat:enterprise_linux:eap7-wildfly-java-jdk11, p-cpe:/a:redhat:enterprise_linux:eap7-jboss-server-migration-core, p-cpe:/a:redhat:enterprise_linux:eap7-ironjacamar-common-api, p-cpe:/a:redhat:enterprise_linux:eap7-ironjacamar-core-api, p-cpe:/a:redhat:enterprise_linux:eap7-jsoup, p-cpe:/a:redhat:enterprise_linux:eap7-ironjacamar-core-impl, p-cpe:/a:redhat:enterprise_linux:eap7-hibernate-validator-cdi, cpe:/o:redhat:enterprise_linux:7, p-cpe:/a:redhat:enterprise_linux:eap7-ironjacamar-deployers-common, p-cpe:/a:redhat:enterprise_linux:eap7-jbossws-cxf, p-cpe:/a:redhat:enterprise_linux:eap7-undertow-jastow, p-cpe:/a:redhat:enterprise_linux:eap7-wildfly-javadocs, p-cpe:/a:redhat:enterprise_linux:eap7-jboss-server-migration-cli, p-cpe:/a:redhat:enterprise_linux:eap7-ironjacamar-jdbc, p-cpe:/a:redhat:enterprise_linux:eap7-ironjacamar-common-spi, p-cpe:/a:redhat:enterprise_linux:eap7-hal-console, p-cpe:/a:redhat:enterprise_linux:eap7-insights-java-client
Required KB Items: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list, Host/cpu
Exploit Available: true
Exploit Ease: Exploits are available
Patch Publication Date: 10/14/2024
Vulnerability Publication Date: 7/19/2022
CVE: CVE-2022-34169, CVE-2022-36033, CVE-2023-51775, CVE-2024-4029, CVE-2024-4068