Staging Environment: Content and features may be unstable or change without notice.
Search for packages
Package details: pkg:rpm/redhat/eap7-jboss-server-migration@1.7.2-7.Final_redhat_00008.1?arch=el7eap
purl pkg:rpm/redhat/eap7-jboss-server-migration@1.7.2-7.Final_redhat_00008.1?arch=el7eap
Next non-vulnerable version None.
Latest non-vulnerable version None.
Risk 3.1
Vulnerabilities affecting this package (2)
Vulnerability Summary Fixed by
VCID-ft9p-n5ew-abbf
Aliases:
CVE-2021-3536
GHSA-v2wx-jj66-2hp7
Cross-site Scripting in Wildfly A flaw was found in Wildfly in versions before 23.0.2.Final while creating a new role in domain mode via the admin console, it is possible to add a payload in the name field, leading to XSS. This affects Confidentiality and Integrity. There are no reported fixed by versions.
VCID-hzxz-sqmu-s7e1
Aliases:
CVE-2021-21409
GHSA-f256-j965-7f32
Possible request smuggling in HTTP/2 due missing validation of content-length ### Impact The content-length header is not correctly validated if the request only use a single Http2HeaderFrame with the endStream set to to true. This could lead to request smuggling if the request is proxied to a remote peer and translated to HTTP/1.1 This is a followup of https://github.com/netty/netty/security/advisories/GHSA-wm47-8v5p-wjpj which did miss to fix this one case. ### Patches This was fixed as part of 4.1.61.Final ### Workarounds Validation can be done by the user before proxy the request by validating the header. There are no reported fixed by versions.
Vulnerabilities fixed by this package (0)
Vulnerability Summary Aliases
This package is not known to fix vulnerabilities.

Date Actor Action Vulnerability Source VulnerableCode Version
2026-04-01T14:02:40.323061+00:00 RedHat Importer Affected by VCID-hzxz-sqmu-s7e1 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-21409.json 38.0.0
2026-04-01T14:02:32.795059+00:00 RedHat Importer Affected by VCID-ft9p-n5ew-abbf https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3536.json 38.0.0