Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2011-4085 (GCVE-0-2011-4085)
Vulnerability from cvelistv5 – Published: 2012-11-23 20:00 – Updated: 2024-08-06 23:53- n/a
| URL | Tags |
|---|---|
| http://rhn.redhat.com/errata/RHSA-2012-1028.html | vendor-advisoryx_refsource_REDHAT |
| http://secunia.com/advisories/47866 | third-party-advisoryx_refsource_SECUNIA |
| http://rhn.redhat.com/errata/RHSA-2011-1805.html | vendor-advisoryx_refsource_REDHAT |
| http://rhn.redhat.com/errata/RHSA-2011-1456.html | vendor-advisoryx_refsource_REDHAT |
| http://rhn.redhat.com/errata/RHSA-2012-0091.html | vendor-advisoryx_refsource_REDHAT |
| http://rhn.redhat.com/errata/RHSA-2011-1822.html | vendor-advisoryx_refsource_REDHAT |
| http://rhn.redhat.com/errata/RHSA-2011-1799.html | vendor-advisoryx_refsource_REDHAT |
| https://bugzilla.redhat.com/show_bug.cgi?id=750422 | x_refsource_MISC |
| http://rhn.redhat.com/errata/RHSA-2011-1798.html | vendor-advisoryx_refsource_REDHAT |
| http://rhn.redhat.com/errata/RHSA-2011-1800.html | vendor-advisoryx_refsource_REDHAT |
| http://secunia.com/advisories/47169 | third-party-advisoryx_refsource_SECUNIA |
EUVD KEV
Known Exploited Vulnerability - GCVE BCP-07 Compliant
Exploited: Yes
Timestamps
Scope
Evidence
Type: Csirt Report
Signal: Successful Exploitation
Confidence: 75%
Source: enisa-cnw-kev
Details
| Cwes | - |
|---|---|
| Euvd | EUVD-2011-4036 |
| Notes | https://www.acn.gov.it/portale/w/distribuzione-di-payload-malevoli-tramite-vulnerabilita-note |
| Catalog | ENISA / EU CSIRTs Network (CNW) KEV CSV |
| Product | JBoss Application Server |
| Datereported | 14/07/25 |
| Originsource | CERT Italia |
| Vendorproject | Red Hat |
| Exploitationtype | - |
| Vulnerabilityname | - |
| Threatactorsexploiting | - |
References
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T23:53:32.785Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "RHSA-2012:1028",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "http://rhn.redhat.com/errata/RHSA-2012-1028.html"
},
{
"name": "47866",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/47866"
},
{
"name": "RHSA-2011:1805",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "http://rhn.redhat.com/errata/RHSA-2011-1805.html"
},
{
"name": "RHSA-2011:1456",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "http://rhn.redhat.com/errata/RHSA-2011-1456.html"
},
{
"name": "RHSA-2012:0091",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "http://rhn.redhat.com/errata/RHSA-2012-0091.html"
},
{
"name": "RHSA-2011:1822",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "http://rhn.redhat.com/errata/RHSA-2011-1822.html"
},
{
"name": "RHSA-2011:1799",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "http://rhn.redhat.com/errata/RHSA-2011-1799.html"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=750422"
},
{
"name": "RHSA-2011:1798",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "http://rhn.redhat.com/errata/RHSA-2011-1798.html"
},
{
"name": "RHSA-2011:1800",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "http://rhn.redhat.com/errata/RHSA-2011-1800.html"
},
{
"name": "47169",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/47169"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2011-11-16T00:00:00.000Z",
"descriptions": [
{
"lang": "en",
"value": "The servlets invoked by httpha-invoker in JBoss Enterprise Application Platform before 5.1.2, SOA Platform before 5.2.0, BRMS Platform before 5.3.0, and Portal Platform before 4.3 CP07 perform access control only for the GET and POST methods, which allow remote attackers to bypass authentication by sending a request with a different method. NOTE: this vulnerability exists because of a CVE-2010-0738 regression."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2014-02-27T14:57:00.000Z",
"orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
"shortName": "redhat"
},
"references": [
{
"name": "RHSA-2012:1028",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "http://rhn.redhat.com/errata/RHSA-2012-1028.html"
},
{
"name": "47866",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/47866"
},
{
"name": "RHSA-2011:1805",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "http://rhn.redhat.com/errata/RHSA-2011-1805.html"
},
{
"name": "RHSA-2011:1456",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "http://rhn.redhat.com/errata/RHSA-2011-1456.html"
},
{
"name": "RHSA-2012:0091",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "http://rhn.redhat.com/errata/RHSA-2012-0091.html"
},
{
"name": "RHSA-2011:1822",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "http://rhn.redhat.com/errata/RHSA-2011-1822.html"
},
{
"name": "RHSA-2011:1799",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "http://rhn.redhat.com/errata/RHSA-2011-1799.html"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=750422"
},
{
"name": "RHSA-2011:1798",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "http://rhn.redhat.com/errata/RHSA-2011-1798.html"
},
{
"name": "RHSA-2011:1800",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "http://rhn.redhat.com/errata/RHSA-2011-1800.html"
},
{
"name": "47169",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/47169"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
"assignerShortName": "redhat",
"cveId": "CVE-2011-4085",
"datePublished": "2012-11-23T20:00:00.000Z",
"dateReserved": "2011-10-18T00:00:00.000Z",
"dateUpdated": "2024-08-06T23:53:32.785Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"cnw_known_exploited": {
"CVE": "CVE-2011-4085",
"EUVD": "EUVD-2011-4036",
"cwes": "-",
"dateReported": "14/07/25",
"exploitationType": "-",
"notes": "https://www.acn.gov.it/portale/w/distribuzione-di-payload-malevoli-tramite-vulnerabilita-note",
"originSource": "CERT Italia",
"product": "JBoss Application Server",
"shortDescription": "some management interfaces remain accessible and lack effective access control mechanisms",
"threatActorsExploiting": "-",
"vendorProject": "Red Hat",
"vulnerabilityName": "-"
},
"epss": {
"cve": "CVE-2011-4085",
"date": "2026-05-20",
"epss": "0.00719",
"percentile": "0.72669"
},
"fkie_nvd": {
"configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:redhat:jboss_enterprise_application_platform:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"5.1.1\", \"matchCriteriaId\": \"60667D6C-1F8D-4C09-8033-CA168AFE5C77\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:redhat:jboss_enterprise_application_platform:4.2.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9164BEAF-B1D5-4E65-A6CE-F985799467CB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:redhat:jboss_enterprise_application_platform:4.3.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E82B2AD8-967D-4ABE-982B-87B9DE73F8D6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:redhat:jboss_enterprise_application_platform:5.0.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F5D7F1AD-4BD3-4C37-B6B5-B287464B2EEB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:redhat:jboss_enterprise_application_platform:5.0.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"76D8FCD1-55D5-4187-87DD-39904EDE2EF8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:redhat:jboss_enterprise_application_platform:5.1.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"972C5C87-E982-44A5-866D-FDEACB5203B8\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:redhat:jboss_enterprise_soa_platform:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"5.1.1\", \"matchCriteriaId\": \"B3AD4BE1-9D62-460A-A1F2-A86B4E0F8B5F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:redhat:jboss_enterprise_soa_platform:4.2.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CDEABE3E-DC3E-4B98-8433-4308BBEE6F26\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:redhat:jboss_enterprise_soa_platform:4.2.0:cp01:*:*:*:*:*:*\", \"matchCriteriaId\": \"70942A41-9089-4313-8B00-5CB92518A349\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:redhat:jboss_enterprise_soa_platform:4.2.0:cp02:*:*:*:*:*:*\", \"matchCriteriaId\": \"093F7EA4-B190-49A5-AF55-42D4F960EEFE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:redhat:jboss_enterprise_soa_platform:4.2.0:cp03:*:*:*:*:*:*\", \"matchCriteriaId\": \"75CBF063-6986-4217-BC8E-661B5167AB2A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:redhat:jboss_enterprise_soa_platform:4.2.0:cp04:*:*:*:*:*:*\", \"matchCriteriaId\": \"3F6528B6-1147-4366-8F81-8B380903EAA6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:redhat:jboss_enterprise_soa_platform:4.2.0:cp05:*:*:*:*:*:*\", \"matchCriteriaId\": \"4EF1898E-1A25-442B-865F-1C27B9E5F0D1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:redhat:jboss_enterprise_soa_platform:4.2.0:tp02:*:*:*:*:*:*\", \"matchCriteriaId\": \"92953D9C-8FF0-4499-A4A4-3B05696D326E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:redhat:jboss_enterprise_soa_platform:4.3.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C57B8004-AF15-4F0F-B9FA-A3CFF7BD42DE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:redhat:jboss_enterprise_soa_platform:4.3.0:cp01:*:*:*:*:*:*\", \"matchCriteriaId\": \"66F4FC45-CF67-44E4-96CA-31B537151C7E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:redhat:jboss_enterprise_soa_platform:4.3.0:cp02:*:*:*:*:*:*\", \"matchCriteriaId\": \"E7CF5F63-C7A8-4787-9620-F5B76A9F0F3E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:redhat:jboss_enterprise_soa_platform:4.3.0:cp03:*:*:*:*:*:*\", \"matchCriteriaId\": \"9BCA6581-3C94-4B1B-B30F-E0B854A68968\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:redhat:jboss_enterprise_soa_platform:4.3.0:cp04:*:*:*:*:*:*\", \"matchCriteriaId\": \"23F0650B-C39D-4C7D-8BB9-BBA951BA8AAE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:redhat:jboss_enterprise_soa_platform:4.3.0:cp05:*:*:*:*:*:*\", \"matchCriteriaId\": \"67BD448A-745D-4387-ABC8-A18DF142574D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:redhat:jboss_enterprise_soa_platform:5.0.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DFB8FED0-E0C6-409C-A2D8-B3999265D545\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:redhat:jboss_enterprise_soa_platform:5.0.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DFC497FD-503A-463B-A75E-9C4B9B716521\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:redhat:jboss_enterprise_soa_platform:5.0.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A8F224EE-A5A1-490B-91A5-0196B4168F32\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:redhat:jboss_enterprise_soa_platform:5.1.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2B72D56E-DE3C-4383-906D-F3DCD9D09CC9\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:redhat:jboss_enterprise_brms_platform:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"5.2.0\", \"matchCriteriaId\": \"E867ECA4-43A5-4424-B703-437991A1C58A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:redhat:jboss_enterprise_portal_platform:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"4.3.0\", \"matchCriteriaId\": \"595BFB46-AD92-4592-A1BC-EFC80C9136C3\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"The servlets invoked by httpha-invoker in JBoss Enterprise Application Platform before 5.1.2, SOA Platform before 5.2.0, BRMS Platform before 5.3.0, and Portal Platform before 4.3 CP07 perform access control only for the GET and POST methods, which allow remote attackers to bypass authentication by sending a request with a different method. NOTE: this vulnerability exists because of a CVE-2010-0738 regression.\"}, {\"lang\": \"es\", \"value\": \"Los servlets invocados por httpha-invoker en JBoss Enterprise Application Platform anterior a v5.1.2, SOA Platform anterior a v5.2.0, BRMS Platform anterior a v5.3.0, y Portal Platform anterior a v4.3 CP07 lleva a cabo el control de acceso s\\u00f3lo para los m\\u00e9todos GET y POST, lo que permite a atacantes remotos evitar la autenticaci\\u00f3n mediante el env\\u00edo de una solicitud con un m\\u00e9todo diferente. NOTA: esta vulnerabilidad se debe a CVE-2010-0738\"}]",
"id": "CVE-2011-4085",
"lastModified": "2024-11-21T01:31:48.957",
"metrics": "{\"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:M/Au:N/C:P/I:P/A:P\", \"baseScore\": 6.8, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"MEDIUM\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"PARTIAL\", \"integrityImpact\": \"PARTIAL\", \"availabilityImpact\": \"PARTIAL\"}, \"baseSeverity\": \"MEDIUM\", \"exploitabilityScore\": 8.6, \"impactScore\": 6.4, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}",
"published": "2012-11-23T20:55:01.867",
"references": "[{\"url\": \"http://rhn.redhat.com/errata/RHSA-2011-1456.html\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://rhn.redhat.com/errata/RHSA-2011-1798.html\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://rhn.redhat.com/errata/RHSA-2011-1799.html\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://rhn.redhat.com/errata/RHSA-2011-1800.html\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://rhn.redhat.com/errata/RHSA-2011-1805.html\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://rhn.redhat.com/errata/RHSA-2011-1822.html\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://rhn.redhat.com/errata/RHSA-2012-0091.html\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://rhn.redhat.com/errata/RHSA-2012-1028.html\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://secunia.com/advisories/47169\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://secunia.com/advisories/47866\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://bugzilla.redhat.com/show_bug.cgi?id=750422\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://rhn.redhat.com/errata/RHSA-2011-1456.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://rhn.redhat.com/errata/RHSA-2011-1798.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://rhn.redhat.com/errata/RHSA-2011-1799.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://rhn.redhat.com/errata/RHSA-2011-1800.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://rhn.redhat.com/errata/RHSA-2011-1805.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://rhn.redhat.com/errata/RHSA-2011-1822.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://rhn.redhat.com/errata/RHSA-2012-0091.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://rhn.redhat.com/errata/RHSA-2012-1028.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://secunia.com/advisories/47169\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://secunia.com/advisories/47866\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://bugzilla.redhat.com/show_bug.cgi?id=750422\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}]",
"sourceIdentifier": "secalert@redhat.com",
"vulnStatus": "Modified",
"weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-287\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2011-4085\",\"sourceIdentifier\":\"secalert@redhat.com\",\"published\":\"2012-11-23T20:55:01.867\",\"lastModified\":\"2026-04-29T01:13:23.040\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"The servlets invoked by httpha-invoker in JBoss Enterprise Application Platform before 5.1.2, SOA Platform before 5.2.0, BRMS Platform before 5.3.0, and Portal Platform before 4.3 CP07 perform access control only for the GET and POST methods, which allow remote attackers to bypass authentication by sending a request with a different method. NOTE: this vulnerability exists because of a CVE-2010-0738 regression.\"},{\"lang\":\"es\",\"value\":\"Los servlets invocados por httpha-invoker en JBoss Enterprise Application Platform anterior a v5.1.2, SOA Platform anterior a v5.2.0, BRMS Platform anterior a v5.3.0, y Portal Platform anterior a v4.3 CP07 lleva a cabo el control de acceso s\u00f3lo para los m\u00e9todos GET y POST, lo que permite a atacantes remotos evitar la autenticaci\u00f3n mediante el env\u00edo de una solicitud con un m\u00e9todo diferente. NOTA: esta vulnerabilidad se debe a CVE-2010-0738\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:P/I:P/A:P\",\"baseScore\":6.8,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.6,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-287\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:jboss_enterprise_application_platform:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"5.1.1\",\"matchCriteriaId\":\"60667D6C-1F8D-4C09-8033-CA168AFE5C77\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:jboss_enterprise_application_platform:4.2.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9164BEAF-B1D5-4E65-A6CE-F985799467CB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:jboss_enterprise_application_platform:4.3.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E82B2AD8-967D-4ABE-982B-87B9DE73F8D6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:jboss_enterprise_application_platform:5.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F5D7F1AD-4BD3-4C37-B6B5-B287464B2EEB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:jboss_enterprise_application_platform:5.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"76D8FCD1-55D5-4187-87DD-39904EDE2EF8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:jboss_enterprise_application_platform:5.1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"972C5C87-E982-44A5-866D-FDEACB5203B8\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:jboss_enterprise_soa_platform:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"5.1.1\",\"matchCriteriaId\":\"B3AD4BE1-9D62-460A-A1F2-A86B4E0F8B5F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:jboss_enterprise_soa_platform:4.2.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CDEABE3E-DC3E-4B98-8433-4308BBEE6F26\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:jboss_enterprise_soa_platform:4.2.0:cp01:*:*:*:*:*:*\",\"matchCriteriaId\":\"70942A41-9089-4313-8B00-5CB92518A349\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:jboss_enterprise_soa_platform:4.2.0:cp02:*:*:*:*:*:*\",\"matchCriteriaId\":\"093F7EA4-B190-49A5-AF55-42D4F960EEFE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:jboss_enterprise_soa_platform:4.2.0:cp03:*:*:*:*:*:*\",\"matchCriteriaId\":\"75CBF063-6986-4217-BC8E-661B5167AB2A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:jboss_enterprise_soa_platform:4.2.0:cp04:*:*:*:*:*:*\",\"matchCriteriaId\":\"3F6528B6-1147-4366-8F81-8B380903EAA6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:jboss_enterprise_soa_platform:4.2.0:cp05:*:*:*:*:*:*\",\"matchCriteriaId\":\"4EF1898E-1A25-442B-865F-1C27B9E5F0D1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:jboss_enterprise_soa_platform:4.2.0:tp02:*:*:*:*:*:*\",\"matchCriteriaId\":\"92953D9C-8FF0-4499-A4A4-3B05696D326E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:jboss_enterprise_soa_platform:4.3.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C57B8004-AF15-4F0F-B9FA-A3CFF7BD42DE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:jboss_enterprise_soa_platform:4.3.0:cp01:*:*:*:*:*:*\",\"matchCriteriaId\":\"66F4FC45-CF67-44E4-96CA-31B537151C7E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:jboss_enterprise_soa_platform:4.3.0:cp02:*:*:*:*:*:*\",\"matchCriteriaId\":\"E7CF5F63-C7A8-4787-9620-F5B76A9F0F3E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:jboss_enterprise_soa_platform:4.3.0:cp03:*:*:*:*:*:*\",\"matchCriteriaId\":\"9BCA6581-3C94-4B1B-B30F-E0B854A68968\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:jboss_enterprise_soa_platform:4.3.0:cp04:*:*:*:*:*:*\",\"matchCriteriaId\":\"23F0650B-C39D-4C7D-8BB9-BBA951BA8AAE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:jboss_enterprise_soa_platform:4.3.0:cp05:*:*:*:*:*:*\",\"matchCriteriaId\":\"67BD448A-745D-4387-ABC8-A18DF142574D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:jboss_enterprise_soa_platform:5.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DFB8FED0-E0C6-409C-A2D8-B3999265D545\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:jboss_enterprise_soa_platform:5.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DFC497FD-503A-463B-A75E-9C4B9B716521\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:jboss_enterprise_soa_platform:5.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A8F224EE-A5A1-490B-91A5-0196B4168F32\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:jboss_enterprise_soa_platform:5.1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2B72D56E-DE3C-4383-906D-F3DCD9D09CC9\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:jboss_enterprise_brms_platform:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"5.2.0\",\"matchCriteriaId\":\"E867ECA4-43A5-4424-B703-437991A1C58A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:jboss_enterprise_portal_platform:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"4.3.0\",\"matchCriteriaId\":\"595BFB46-AD92-4592-A1BC-EFC80C9136C3\"}]}]}],\"references\":[{\"url\":\"http://rhn.redhat.com/errata/RHSA-2011-1456.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2011-1798.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2011-1799.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2011-1800.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2011-1805.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2011-1822.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2012-0091.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2012-1028.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/47169\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/47866\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=750422\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2011-1456.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2011-1798.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2011-1799.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2011-1800.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2011-1805.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2011-1822.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2012-0091.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2012-1028.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/47169\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/47866\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=750422\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}"
}
}
CERTA-2011-AVI-703
Vulnerability from certfr_avis - Published: - Updated:
Plusieurs vulnérabilités affectent JBoss. Elles permettent de contourner la politique de sécurité du serveur ou de réaliser de l'injection de code indirecte (XSS).
Description
Plusieurs vulnérabilités affectent JBoss :
- la page de connexion au serveur permet de rediriger l'utilisateur vers un site web quelconque ;
- dans certaines configurations, l'authentification de l'utilisateur peut être contournée ;
- de l'injection de code indirecte est possible dans plusieurs programmes de JBoss.
Solution
La version 5.2.0 de JBoss corrige ces vulnérabilités.
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
JBoss Enterprise Portal Platform, versions antérieures à la version 5.2.0.
| Vendor | Product | Description |
|---|
| Title | Publication Time | Tags | |
|---|---|---|---|
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [],
"affected_systems_content": "\u003cp\u003eJBoss Enterprise Portal Platform, versions ant\u00e9rieures \u00e0 la version 5.2.0.\u003c/p\u003e",
"content": "## Description\n\nPlusieurs vuln\u00e9rabilit\u00e9s affectent JBoss\u00a0:\n\n- la page de connexion au serveur permet de rediriger l\u0027utilisateur\n vers un site web quelconque\u00a0;\n- dans certaines configurations, l\u0027authentification de l\u0027utilisateur\n peut \u00eatre contourn\u00e9e\u00a0;\n- de l\u0027injection de code indirecte est possible dans plusieurs\n programmes de JBoss.\n\n## Solution\n\nLa version 5.2.0 de JBoss corrige ces vuln\u00e9rabilit\u00e9s.\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2011-4085",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-4085"
},
{
"name": "CVE-2011-4580",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-4580"
},
{
"name": "CVE-2011-2941",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2941"
}
],
"links": [
{
"title": "Bulletin de s\u00e9curit\u00e9 RedHat RHSA-2011:1822 du 14 d\u00e9cembre 2011 :",
"url": "http://rhn.redhat.com/errata/RHSA-2011-1822.html"
}
],
"reference": "CERTA-2011-AVI-703",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2011-12-16T00:00:00.000000"
}
],
"risks": [
{
"description": "Injection de code indirecte \u00e0 distance"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
}
],
"summary": "Plusieurs vuln\u00e9rabilit\u00e9s affectent JBoss. Elles permettent de contourner\nla politique de s\u00e9curit\u00e9 du serveur ou de r\u00e9aliser de l\u0027injection de\ncode indirecte (XSS).\n",
"title": "Vuln\u00e9rabilit\u00e9s dans JBoss",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 RedHat RHSA-2011:1822 du 14 d\u00e9cembre 2011",
"url": null
}
]
}
CERTA-2012-AVI-066
Vulnerability from certfr_avis - Published: - Updated:
Plusieurs vulnérabilités permettant de contourner la politique de sécurité, d'exécuter du code arbitraire ou de réaliser un déni de service à distance ont été corrigées dans JBoss Enterprise Portal Platform.
Description
De multiples vulnérabilités ont été corrigées dans JBoss Enterprise Portal Platform. Ces vulnérabilités peuvent être exploitées pour :
- exécuter du code Java arbitraire à distance (CVE-2011-1484) ;
- provoquer un déni de service à distance (CVE-2011-4858) ;
- effectuer des rejeux de session (CVE-2011-1184, CVE-2011-5062, CVE-2011-5063, CVE-2011-5064) ;
- effectuer des requêtes non authentifiées (CVE-2011-4085) ;
- contourner les restrictions d'accès à certains fichiers (CVE-2011-2526).
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
JBoss Enterprise Portal Platform 4.x.
| Vendor | Product | Description |
|---|
| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [],
"affected_systems_content": "\u003cp\u003eJBoss Enterprise Portal Platform 4.x.\u003c/p\u003e",
"content": "## Description\n\nDe multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans JBoss Enterprise\nPortal Platform. Ces vuln\u00e9rabilit\u00e9s peuvent \u00eatre exploit\u00e9es pour :\n\n- ex\u00e9cuter du code Java arbitraire \u00e0 distance (CVE-2011-1484) ;\n- provoquer un d\u00e9ni de service \u00e0 distance (CVE-2011-4858) ;\n- effectuer des rejeux de session (CVE-2011-1184, CVE-2011-5062,\n CVE-2011-5063, CVE-2011-5064) ;\n- effectuer des requ\u00eates non authentifi\u00e9es (CVE-2011-4085) ;\n- contourner les restrictions d\u0027acc\u00e8s \u00e0 certains fichiers\n (CVE-2011-2526).\n\n## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2011-5062",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-5062"
},
{
"name": "CVE-2011-1484",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1484"
},
{
"name": "CVE-2011-4858",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-4858"
},
{
"name": "CVE-2011-4085",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-4085"
},
{
"name": "CVE-2011-5063",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-5063"
},
{
"name": "CVE-2011-1184",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1184"
},
{
"name": "CVE-2011-2526",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2526"
},
{
"name": "CVE-2011-5064",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-5064"
}
],
"links": [
{
"title": "Bulletin de s\u00e9curit\u00e9 RedHat RHSA-2012:0091 du 02 f\u00e9vrier 2012 :",
"url": "http://rhn.redhat.com/errata/RHSA-2012-0091.html"
}
],
"reference": "CERTA-2012-AVI-066",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2012-02-08T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
}
],
"summary": "Plusieurs vuln\u00e9rabilit\u00e9s permettant de contourner la politique de\ns\u00e9curit\u00e9, d\u0027ex\u00e9cuter du code arbitraire ou de r\u00e9aliser un d\u00e9ni de\nservice \u00e0 distance ont \u00e9t\u00e9 corrig\u00e9es dans JBoss Enterprise Portal\nPlatform.\n",
"title": "Vuln\u00e9rabilit\u00e9 dans JBoss Enterprise Platform",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Red Hat RHSA-2012-0091",
"url": null
}
]
}
CERTA-2011-AVI-703
Vulnerability from certfr_avis - Published: - Updated:
Plusieurs vulnérabilités affectent JBoss. Elles permettent de contourner la politique de sécurité du serveur ou de réaliser de l'injection de code indirecte (XSS).
Description
Plusieurs vulnérabilités affectent JBoss :
- la page de connexion au serveur permet de rediriger l'utilisateur vers un site web quelconque ;
- dans certaines configurations, l'authentification de l'utilisateur peut être contournée ;
- de l'injection de code indirecte est possible dans plusieurs programmes de JBoss.
Solution
La version 5.2.0 de JBoss corrige ces vulnérabilités.
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
JBoss Enterprise Portal Platform, versions antérieures à la version 5.2.0.
| Vendor | Product | Description |
|---|
| Title | Publication Time | Tags | |
|---|---|---|---|
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [],
"affected_systems_content": "\u003cp\u003eJBoss Enterprise Portal Platform, versions ant\u00e9rieures \u00e0 la version 5.2.0.\u003c/p\u003e",
"content": "## Description\n\nPlusieurs vuln\u00e9rabilit\u00e9s affectent JBoss\u00a0:\n\n- la page de connexion au serveur permet de rediriger l\u0027utilisateur\n vers un site web quelconque\u00a0;\n- dans certaines configurations, l\u0027authentification de l\u0027utilisateur\n peut \u00eatre contourn\u00e9e\u00a0;\n- de l\u0027injection de code indirecte est possible dans plusieurs\n programmes de JBoss.\n\n## Solution\n\nLa version 5.2.0 de JBoss corrige ces vuln\u00e9rabilit\u00e9s.\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2011-4085",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-4085"
},
{
"name": "CVE-2011-4580",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-4580"
},
{
"name": "CVE-2011-2941",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2941"
}
],
"links": [
{
"title": "Bulletin de s\u00e9curit\u00e9 RedHat RHSA-2011:1822 du 14 d\u00e9cembre 2011 :",
"url": "http://rhn.redhat.com/errata/RHSA-2011-1822.html"
}
],
"reference": "CERTA-2011-AVI-703",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2011-12-16T00:00:00.000000"
}
],
"risks": [
{
"description": "Injection de code indirecte \u00e0 distance"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
}
],
"summary": "Plusieurs vuln\u00e9rabilit\u00e9s affectent JBoss. Elles permettent de contourner\nla politique de s\u00e9curit\u00e9 du serveur ou de r\u00e9aliser de l\u0027injection de\ncode indirecte (XSS).\n",
"title": "Vuln\u00e9rabilit\u00e9s dans JBoss",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 RedHat RHSA-2011:1822 du 14 d\u00e9cembre 2011",
"url": null
}
]
}
CERTA-2012-AVI-066
Vulnerability from certfr_avis - Published: - Updated:
Plusieurs vulnérabilités permettant de contourner la politique de sécurité, d'exécuter du code arbitraire ou de réaliser un déni de service à distance ont été corrigées dans JBoss Enterprise Portal Platform.
Description
De multiples vulnérabilités ont été corrigées dans JBoss Enterprise Portal Platform. Ces vulnérabilités peuvent être exploitées pour :
- exécuter du code Java arbitraire à distance (CVE-2011-1484) ;
- provoquer un déni de service à distance (CVE-2011-4858) ;
- effectuer des rejeux de session (CVE-2011-1184, CVE-2011-5062, CVE-2011-5063, CVE-2011-5064) ;
- effectuer des requêtes non authentifiées (CVE-2011-4085) ;
- contourner les restrictions d'accès à certains fichiers (CVE-2011-2526).
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
JBoss Enterprise Portal Platform 4.x.
| Vendor | Product | Description |
|---|
| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [],
"affected_systems_content": "\u003cp\u003eJBoss Enterprise Portal Platform 4.x.\u003c/p\u003e",
"content": "## Description\n\nDe multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans JBoss Enterprise\nPortal Platform. Ces vuln\u00e9rabilit\u00e9s peuvent \u00eatre exploit\u00e9es pour :\n\n- ex\u00e9cuter du code Java arbitraire \u00e0 distance (CVE-2011-1484) ;\n- provoquer un d\u00e9ni de service \u00e0 distance (CVE-2011-4858) ;\n- effectuer des rejeux de session (CVE-2011-1184, CVE-2011-5062,\n CVE-2011-5063, CVE-2011-5064) ;\n- effectuer des requ\u00eates non authentifi\u00e9es (CVE-2011-4085) ;\n- contourner les restrictions d\u0027acc\u00e8s \u00e0 certains fichiers\n (CVE-2011-2526).\n\n## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2011-5062",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-5062"
},
{
"name": "CVE-2011-1484",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1484"
},
{
"name": "CVE-2011-4858",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-4858"
},
{
"name": "CVE-2011-4085",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-4085"
},
{
"name": "CVE-2011-5063",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-5063"
},
{
"name": "CVE-2011-1184",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1184"
},
{
"name": "CVE-2011-2526",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2526"
},
{
"name": "CVE-2011-5064",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-5064"
}
],
"links": [
{
"title": "Bulletin de s\u00e9curit\u00e9 RedHat RHSA-2012:0091 du 02 f\u00e9vrier 2012 :",
"url": "http://rhn.redhat.com/errata/RHSA-2012-0091.html"
}
],
"reference": "CERTA-2012-AVI-066",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2012-02-08T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
}
],
"summary": "Plusieurs vuln\u00e9rabilit\u00e9s permettant de contourner la politique de\ns\u00e9curit\u00e9, d\u0027ex\u00e9cuter du code arbitraire ou de r\u00e9aliser un d\u00e9ni de\nservice \u00e0 distance ont \u00e9t\u00e9 corrig\u00e9es dans JBoss Enterprise Portal\nPlatform.\n",
"title": "Vuln\u00e9rabilit\u00e9 dans JBoss Enterprise Platform",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Red Hat RHSA-2012-0091",
"url": null
}
]
}
FKIE_CVE-2011-4085
Vulnerability from fkie_nvd - Published: 2012-11-23 20:55 - Updated: 2026-04-29 01:13{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:*:*:*:*:*:*:*:*",
"matchCriteriaId": "60667D6C-1F8D-4C09-8033-CA168AFE5C77",
"versionEndIncluding": "5.1.1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:4.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "9164BEAF-B1D5-4E65-A6CE-F985799467CB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:4.3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E82B2AD8-967D-4ABE-982B-87B9DE73F8D6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:5.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "F5D7F1AD-4BD3-4C37-B6B5-B287464B2EEB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:5.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "76D8FCD1-55D5-4187-87DD-39904EDE2EF8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:5.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "972C5C87-E982-44A5-866D-FDEACB5203B8",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:redhat:jboss_enterprise_soa_platform:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B3AD4BE1-9D62-460A-A1F2-A86B4E0F8B5F",
"versionEndIncluding": "5.1.1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:redhat:jboss_enterprise_soa_platform:4.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "CDEABE3E-DC3E-4B98-8433-4308BBEE6F26",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:redhat:jboss_enterprise_soa_platform:4.2.0:cp01:*:*:*:*:*:*",
"matchCriteriaId": "70942A41-9089-4313-8B00-5CB92518A349",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:redhat:jboss_enterprise_soa_platform:4.2.0:cp02:*:*:*:*:*:*",
"matchCriteriaId": "093F7EA4-B190-49A5-AF55-42D4F960EEFE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:redhat:jboss_enterprise_soa_platform:4.2.0:cp03:*:*:*:*:*:*",
"matchCriteriaId": "75CBF063-6986-4217-BC8E-661B5167AB2A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:redhat:jboss_enterprise_soa_platform:4.2.0:cp04:*:*:*:*:*:*",
"matchCriteriaId": "3F6528B6-1147-4366-8F81-8B380903EAA6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:redhat:jboss_enterprise_soa_platform:4.2.0:cp05:*:*:*:*:*:*",
"matchCriteriaId": "4EF1898E-1A25-442B-865F-1C27B9E5F0D1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:redhat:jboss_enterprise_soa_platform:4.2.0:tp02:*:*:*:*:*:*",
"matchCriteriaId": "92953D9C-8FF0-4499-A4A4-3B05696D326E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:redhat:jboss_enterprise_soa_platform:4.3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "C57B8004-AF15-4F0F-B9FA-A3CFF7BD42DE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:redhat:jboss_enterprise_soa_platform:4.3.0:cp01:*:*:*:*:*:*",
"matchCriteriaId": "66F4FC45-CF67-44E4-96CA-31B537151C7E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:redhat:jboss_enterprise_soa_platform:4.3.0:cp02:*:*:*:*:*:*",
"matchCriteriaId": "E7CF5F63-C7A8-4787-9620-F5B76A9F0F3E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:redhat:jboss_enterprise_soa_platform:4.3.0:cp03:*:*:*:*:*:*",
"matchCriteriaId": "9BCA6581-3C94-4B1B-B30F-E0B854A68968",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:redhat:jboss_enterprise_soa_platform:4.3.0:cp04:*:*:*:*:*:*",
"matchCriteriaId": "23F0650B-C39D-4C7D-8BB9-BBA951BA8AAE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:redhat:jboss_enterprise_soa_platform:4.3.0:cp05:*:*:*:*:*:*",
"matchCriteriaId": "67BD448A-745D-4387-ABC8-A18DF142574D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:redhat:jboss_enterprise_soa_platform:5.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "DFB8FED0-E0C6-409C-A2D8-B3999265D545",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:redhat:jboss_enterprise_soa_platform:5.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "DFC497FD-503A-463B-A75E-9C4B9B716521",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:redhat:jboss_enterprise_soa_platform:5.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "A8F224EE-A5A1-490B-91A5-0196B4168F32",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:redhat:jboss_enterprise_soa_platform:5.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "2B72D56E-DE3C-4383-906D-F3DCD9D09CC9",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:redhat:jboss_enterprise_brms_platform:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E867ECA4-43A5-4424-B703-437991A1C58A",
"versionEndIncluding": "5.2.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:redhat:jboss_enterprise_portal_platform:*:*:*:*:*:*:*:*",
"matchCriteriaId": "595BFB46-AD92-4592-A1BC-EFC80C9136C3",
"versionEndIncluding": "4.3.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The servlets invoked by httpha-invoker in JBoss Enterprise Application Platform before 5.1.2, SOA Platform before 5.2.0, BRMS Platform before 5.3.0, and Portal Platform before 4.3 CP07 perform access control only for the GET and POST methods, which allow remote attackers to bypass authentication by sending a request with a different method. NOTE: this vulnerability exists because of a CVE-2010-0738 regression."
},
{
"lang": "es",
"value": "Los servlets invocados por httpha-invoker en JBoss Enterprise Application Platform anterior a v5.1.2, SOA Platform anterior a v5.2.0, BRMS Platform anterior a v5.3.0, y Portal Platform anterior a v4.3 CP07 lleva a cabo el control de acceso s\u00f3lo para los m\u00e9todos GET y POST, lo que permite a atacantes remotos evitar la autenticaci\u00f3n mediante el env\u00edo de una solicitud con un m\u00e9todo diferente. NOTA: esta vulnerabilidad se debe a CVE-2010-0738"
}
],
"id": "CVE-2011-4085",
"lastModified": "2026-04-29T01:13:23.040",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2012-11-23T20:55:01.867",
"references": [
{
"source": "secalert@redhat.com",
"tags": [
"Vendor Advisory"
],
"url": "http://rhn.redhat.com/errata/RHSA-2011-1456.html"
},
{
"source": "secalert@redhat.com",
"tags": [
"Vendor Advisory"
],
"url": "http://rhn.redhat.com/errata/RHSA-2011-1798.html"
},
{
"source": "secalert@redhat.com",
"tags": [
"Vendor Advisory"
],
"url": "http://rhn.redhat.com/errata/RHSA-2011-1799.html"
},
{
"source": "secalert@redhat.com",
"tags": [
"Vendor Advisory"
],
"url": "http://rhn.redhat.com/errata/RHSA-2011-1800.html"
},
{
"source": "secalert@redhat.com",
"tags": [
"Vendor Advisory"
],
"url": "http://rhn.redhat.com/errata/RHSA-2011-1805.html"
},
{
"source": "secalert@redhat.com",
"url": "http://rhn.redhat.com/errata/RHSA-2011-1822.html"
},
{
"source": "secalert@redhat.com",
"tags": [
"Vendor Advisory"
],
"url": "http://rhn.redhat.com/errata/RHSA-2012-0091.html"
},
{
"source": "secalert@redhat.com",
"tags": [
"Vendor Advisory"
],
"url": "http://rhn.redhat.com/errata/RHSA-2012-1028.html"
},
{
"source": "secalert@redhat.com",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/47169"
},
{
"source": "secalert@redhat.com",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/47866"
},
{
"source": "secalert@redhat.com",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=750422"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://rhn.redhat.com/errata/RHSA-2011-1456.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://rhn.redhat.com/errata/RHSA-2011-1798.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://rhn.redhat.com/errata/RHSA-2011-1799.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://rhn.redhat.com/errata/RHSA-2011-1800.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://rhn.redhat.com/errata/RHSA-2011-1805.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://rhn.redhat.com/errata/RHSA-2011-1822.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://rhn.redhat.com/errata/RHSA-2012-0091.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://rhn.redhat.com/errata/RHSA-2012-1028.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/47169"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/47866"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=750422"
}
],
"sourceIdentifier": "secalert@redhat.com",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-287"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
GHSA-24WP-35X7-5HX9
Vulnerability from github – Published: 2022-05-17 04:51 – Updated: 2022-05-17 04:51The servlets invoked by httpha-invoker in JBoss Enterprise Application Platform before 5.1.2, SOA Platform before 5.2.0, BRMS Platform before 5.3.0, and Portal Platform before 4.3 CP07 perform access control only for the GET and POST methods, which allow remote attackers to bypass authentication by sending a request with a different method. NOTE: this vulnerability exists because of a CVE-2010-0738 regression.
{
"affected": [],
"aliases": [
"CVE-2011-4085"
],
"database_specific": {
"cwe_ids": [
"CWE-287"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2012-11-23T20:55:00Z",
"severity": "MODERATE"
},
"details": "The servlets invoked by httpha-invoker in JBoss Enterprise Application Platform before 5.1.2, SOA Platform before 5.2.0, BRMS Platform before 5.3.0, and Portal Platform before 4.3 CP07 perform access control only for the GET and POST methods, which allow remote attackers to bypass authentication by sending a request with a different method. NOTE: this vulnerability exists because of a CVE-2010-0738 regression.",
"id": "GHSA-24wp-35x7-5hx9",
"modified": "2022-05-17T04:51:12Z",
"published": "2022-05-17T04:51:12Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-4085"
},
{
"type": "WEB",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=750422"
},
{
"type": "WEB",
"url": "http://rhn.redhat.com/errata/RHSA-2011-1456.html"
},
{
"type": "WEB",
"url": "http://rhn.redhat.com/errata/RHSA-2011-1798.html"
},
{
"type": "WEB",
"url": "http://rhn.redhat.com/errata/RHSA-2011-1799.html"
},
{
"type": "WEB",
"url": "http://rhn.redhat.com/errata/RHSA-2011-1800.html"
},
{
"type": "WEB",
"url": "http://rhn.redhat.com/errata/RHSA-2011-1805.html"
},
{
"type": "WEB",
"url": "http://rhn.redhat.com/errata/RHSA-2011-1822.html"
},
{
"type": "WEB",
"url": "http://rhn.redhat.com/errata/RHSA-2012-0091.html"
},
{
"type": "WEB",
"url": "http://rhn.redhat.com/errata/RHSA-2012-1028.html"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/47169"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/47866"
}
],
"schema_version": "1.4.0",
"severity": []
}
GSD-2011-4085
Vulnerability from gsd - Updated: 2023-12-13 01:19{
"GSD": {
"alias": "CVE-2011-4085",
"description": "The servlets invoked by httpha-invoker in JBoss Enterprise Application Platform before 5.1.2, SOA Platform before 5.2.0, BRMS Platform before 5.3.0, and Portal Platform before 4.3 CP07 perform access control only for the GET and POST methods, which allow remote attackers to bypass authentication by sending a request with a different method. NOTE: this vulnerability exists because of a CVE-2010-0738 regression.",
"id": "GSD-2011-4085",
"references": [
"https://www.suse.com/security/cve/CVE-2011-4085.html",
"https://access.redhat.com/errata/RHSA-2012:1028",
"https://access.redhat.com/errata/RHSA-2012:0091",
"https://access.redhat.com/errata/RHSA-2011:1822",
"https://access.redhat.com/errata/RHSA-2011:1805",
"https://access.redhat.com/errata/RHSA-2011:1800",
"https://access.redhat.com/errata/RHSA-2011:1799",
"https://access.redhat.com/errata/RHSA-2011:1798",
"https://access.redhat.com/errata/RHSA-2011:1456",
"https://packetstormsecurity.com/files/cve/CVE-2011-4085"
]
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2011-4085"
],
"details": "The servlets invoked by httpha-invoker in JBoss Enterprise Application Platform before 5.1.2, SOA Platform before 5.2.0, BRMS Platform before 5.3.0, and Portal Platform before 4.3 CP07 perform access control only for the GET and POST methods, which allow remote attackers to bypass authentication by sending a request with a different method. NOTE: this vulnerability exists because of a CVE-2010-0738 regression.",
"id": "GSD-2011-4085",
"modified": "2023-12-13T01:19:05.737492Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2011-4085",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The servlets invoked by httpha-invoker in JBoss Enterprise Application Platform before 5.1.2, SOA Platform before 5.2.0, BRMS Platform before 5.3.0, and Portal Platform before 4.3 CP07 perform access control only for the GET and POST methods, which allow remote attackers to bypass authentication by sending a request with a different method. NOTE: this vulnerability exists because of a CVE-2010-0738 regression."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://rhn.redhat.com/errata/RHSA-2011-1456.html",
"refsource": "MISC",
"url": "http://rhn.redhat.com/errata/RHSA-2011-1456.html"
},
{
"name": "http://rhn.redhat.com/errata/RHSA-2011-1798.html",
"refsource": "MISC",
"url": "http://rhn.redhat.com/errata/RHSA-2011-1798.html"
},
{
"name": "http://rhn.redhat.com/errata/RHSA-2011-1799.html",
"refsource": "MISC",
"url": "http://rhn.redhat.com/errata/RHSA-2011-1799.html"
},
{
"name": "http://rhn.redhat.com/errata/RHSA-2011-1800.html",
"refsource": "MISC",
"url": "http://rhn.redhat.com/errata/RHSA-2011-1800.html"
},
{
"name": "http://rhn.redhat.com/errata/RHSA-2011-1805.html",
"refsource": "MISC",
"url": "http://rhn.redhat.com/errata/RHSA-2011-1805.html"
},
{
"name": "http://rhn.redhat.com/errata/RHSA-2011-1822.html",
"refsource": "MISC",
"url": "http://rhn.redhat.com/errata/RHSA-2011-1822.html"
},
{
"name": "http://rhn.redhat.com/errata/RHSA-2012-0091.html",
"refsource": "MISC",
"url": "http://rhn.redhat.com/errata/RHSA-2012-0091.html"
},
{
"name": "http://rhn.redhat.com/errata/RHSA-2012-1028.html",
"refsource": "MISC",
"url": "http://rhn.redhat.com/errata/RHSA-2012-1028.html"
},
{
"name": "http://secunia.com/advisories/47169",
"refsource": "MISC",
"url": "http://secunia.com/advisories/47169"
},
{
"name": "http://secunia.com/advisories/47866",
"refsource": "MISC",
"url": "http://secunia.com/advisories/47866"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=750422",
"refsource": "MISC",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=750422"
}
]
}
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:4.3.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:5.0.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:5.1.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:4.2.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "5.1.1",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:5.0.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:redhat:jboss_enterprise_soa_platform:4.3.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:redhat:jboss_enterprise_soa_platform:4.2.0:tp02:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:redhat:jboss_enterprise_soa_platform:5.0.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:redhat:jboss_enterprise_soa_platform:5.0.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:redhat:jboss_enterprise_soa_platform:4.3.0:cp02:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:redhat:jboss_enterprise_soa_platform:4.3.0:cp01:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:redhat:jboss_enterprise_soa_platform:5.1.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:redhat:jboss_enterprise_soa_platform:4.2.0:cp05:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:redhat:jboss_enterprise_soa_platform:4.2.0:cp04:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:redhat:jboss_enterprise_soa_platform:4.3.0:cp04:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:redhat:jboss_enterprise_soa_platform:4.2.0:cp01:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:redhat:jboss_enterprise_soa_platform:4.2.0:cp03:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:redhat:jboss_enterprise_soa_platform:4.2.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:redhat:jboss_enterprise_soa_platform:4.3.0:cp05:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:redhat:jboss_enterprise_soa_platform:4.3.0:cp03:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:redhat:jboss_enterprise_soa_platform:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "5.1.1",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:redhat:jboss_enterprise_soa_platform:5.0.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:redhat:jboss_enterprise_soa_platform:4.2.0:cp02:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:redhat:jboss_enterprise_brms_platform:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "5.2.0",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:redhat:jboss_enterprise_portal_platform:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "4.3.0",
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2011-4085"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "The servlets invoked by httpha-invoker in JBoss Enterprise Application Platform before 5.1.2, SOA Platform before 5.2.0, BRMS Platform before 5.3.0, and Portal Platform before 4.3 CP07 perform access control only for the GET and POST methods, which allow remote attackers to bypass authentication by sending a request with a different method. NOTE: this vulnerability exists because of a CVE-2010-0738 regression."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "CWE-287"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "RHSA-2011:1800",
"refsource": "REDHAT",
"tags": [
"Vendor Advisory"
],
"url": "http://rhn.redhat.com/errata/RHSA-2011-1800.html"
},
{
"name": "RHSA-2012:1028",
"refsource": "REDHAT",
"tags": [
"Vendor Advisory"
],
"url": "http://rhn.redhat.com/errata/RHSA-2012-1028.html"
},
{
"name": "47866",
"refsource": "SECUNIA",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/47866"
},
{
"name": "RHSA-2011:1799",
"refsource": "REDHAT",
"tags": [
"Vendor Advisory"
],
"url": "http://rhn.redhat.com/errata/RHSA-2011-1799.html"
},
{
"name": "RHSA-2012:0091",
"refsource": "REDHAT",
"tags": [
"Vendor Advisory"
],
"url": "http://rhn.redhat.com/errata/RHSA-2012-0091.html"
},
{
"name": "RHSA-2011:1805",
"refsource": "REDHAT",
"tags": [
"Vendor Advisory"
],
"url": "http://rhn.redhat.com/errata/RHSA-2011-1805.html"
},
{
"name": "RHSA-2011:1798",
"refsource": "REDHAT",
"tags": [
"Vendor Advisory"
],
"url": "http://rhn.redhat.com/errata/RHSA-2011-1798.html"
},
{
"name": "47169",
"refsource": "SECUNIA",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/47169"
},
{
"name": "RHSA-2011:1456",
"refsource": "REDHAT",
"tags": [
"Vendor Advisory"
],
"url": "http://rhn.redhat.com/errata/RHSA-2011-1456.html"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=750422",
"refsource": "MISC",
"tags": [],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=750422"
},
{
"name": "RHSA-2011:1822",
"refsource": "REDHAT",
"tags": [],
"url": "http://rhn.redhat.com/errata/RHSA-2011-1822.html"
}
]
}
},
"impact": {
"baseMetricV2": {
"cvssV2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"userInteractionRequired": false
}
},
"lastModifiedDate": "2023-02-13T00:20Z",
"publishedDate": "2012-11-23T20:55Z"
}
}
}
RHSA-2011:1456
Vulnerability from csaf_redhat - Published: 2011-11-16 23:49 - Updated: 2025-11-21 17:39The regular expression engine in JRuby before 1.4.1, when $KCODE is set to 'u', does not properly handle characters immediately after a UTF-8 character, which allows remote attackers to conduct cross-site scripting (XSS) attacks via a crafted string.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat JBoss SOA Platform 5.1
Red Hat / Red Hat JBoss Middleware
|
cpe:/a:redhat:jboss_soa_platform:5.1
|
— |
Vendor Fix
fix
|
The servlets invoked by httpha-invoker in JBoss Enterprise Application Platform before 5.1.2, SOA Platform before 5.2.0, BRMS Platform before 5.3.0, and Portal Platform before 4.3 CP07 perform access control only for the GET and POST methods, which allow remote attackers to bypass authentication by sending a request with a different method. NOTE: this vulnerability exists because of a CVE-2010-0738 regression.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat JBoss SOA Platform 5.1
Red Hat / Red Hat JBoss Middleware
|
cpe:/a:redhat:jboss_soa_platform:5.1
|
— |
Vendor Fix
fix
|
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "JBoss Enterprise SOA Platform 5.2.0, which fixes two security issues,\nvarious bugs, and adds enhancements is now available from the Red Hat\nCustomer Portal.\n\nThe Red Hat Security Response Team has rated this update as having moderate\nsecurity impact. Common Vulnerability Scoring System (CVSS) base scores,\nwhich give detailed severity ratings, are available for each vulnerability\nfrom the CVE links in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "JBoss Enterprise SOA Platform is the next-generation ESB and business\nprocess automation infrastructure. JBoss Enterprise SOA Platform allows IT\nto leverage existing (MoM and EAI), modern (SOA and BPM-Rules), and future\n(EDA and CEP) integration methodologies to dramatically improve business\nprocess execution speed and quality.\n\nThis release of JBoss Enterprise SOA Platform 5.2.0 serves as a replacement\nfor JBoss Enterprise SOA Platform 5.1.0. It includes various bug fixes and\nenhancements which are detailed in the JBoss Enterprise SOA Platform 5.2.0\nRelease Notes. The Release Notes will be available shortly from\nhttps://docs.redhat.com/docs/en-US/index.html\n\nThe following security issues are also fixed with this release:\n\nA cross-site scripting (XSS) flaw was found in JRuby (a Java implementation\nof Ruby), which is included in the scripting_chain sample application. The\nsample application does not expose this flaw. If the version of JRuby\nshipped with the scripting_chain sample application was used to build a\ncustom application, a remote attacker could use this flaw to supply\nspecially-crafted input to that application, leading to the execution of\narbitrary HTML or web script. (CVE-2010-1330)\n\nNote: JBoss Enterprise SOA Platform only provides JRuby as a dependency of\nthe scripting_chain quickstart. The CVE-2010-1330 flaw is not exposed\nunless the version of JRuby shipped with that quickstart is used by a\ndeployed, custom application.\n\nIt was found that the invoker servlets, deployed by default via\nhttpha-invoker, only performed access control on the HTTP GET and POST\nmethods, allowing remote attackers to make unauthenticated requests by\nusing different HTTP methods. Due to the second layer of authentication\nprovided by a security interceptor, this issue is not exploitable on\ndefault installations unless an administrator has misconfigured the\nsecurity interceptor or disabled it. (CVE-2011-4085)\n\nWarning: Before applying the update, back up your existing JBoss Enterprise\nSOA Platform installation (including its databases, applications,\nconfiguration files, and so on).\n\nAll users of JBoss Enterprise SOA Platform 5.1.0 as provided from the Red\nHat Customer Portal are advised to upgrade to JBoss Enterprise SOA Platform\n5.2.0.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2011:1456",
"url": "https://access.redhat.com/errata/RHSA-2011:1456"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "https://docs.redhat.com/docs/en-US/index.html",
"url": "https://docs.redhat.com/docs/en-US/index.html"
},
{
"category": "external",
"summary": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=soaplatform\u0026downloadType=distributions",
"url": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=soaplatform\u0026downloadType=distributions"
},
{
"category": "external",
"summary": "750306",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=750306"
},
{
"category": "external",
"summary": "750422",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=750422"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2011/rhsa-2011_1456.json"
}
],
"title": "Red Hat Security Advisory: JBoss Enterprise SOA Platform 5.2.0 update",
"tracking": {
"current_release_date": "2025-11-21T17:39:13+00:00",
"generator": {
"date": "2025-11-21T17:39:13+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2011:1456",
"initial_release_date": "2011-11-16T23:49:00+00:00",
"revision_history": [
{
"date": "2011-11-16T23:49:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2011-11-16T23:54:04+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T17:39:13+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat JBoss SOA Platform 5.1",
"product": {
"name": "Red Hat JBoss SOA Platform 5.1",
"product_id": "Red Hat JBoss SOA Platform 5.1",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:jboss_soa_platform:5.1"
}
}
}
],
"category": "product_family",
"name": "Red Hat JBoss Middleware"
}
],
"category": "vendor",
"name": "Red Hat"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2010-1330",
"cwe": {
"id": "CWE-79",
"name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
},
"discovery_date": "2011-10-30T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "750306"
}
],
"notes": [
{
"category": "description",
"text": "The regular expression engine in JRuby before 1.4.1, when $KCODE is set to \u0027u\u0027, does not properly handle characters immediately after a UTF-8 character, which allows remote attackers to conduct cross-site scripting (XSS) attacks via a crafted string.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "jruby: XSS in the regular expression engine when processing invalid UTF-8 byte sequences",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat JBoss SOA Platform 5.1"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2010-1330"
},
{
"category": "external",
"summary": "RHBZ#750306",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=750306"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2010-1330",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-1330"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-1330",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2010-1330"
}
],
"release_date": "2010-04-26T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-11-16T23:49:00+00:00",
"details": "The References section of this erratum contains a download link (you must\nlog in to download the update).",
"product_ids": [
"Red Hat JBoss SOA Platform 5.1"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:1456"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"products": [
"Red Hat JBoss SOA Platform 5.1"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "jruby: XSS in the regular expression engine when processing invalid UTF-8 byte sequences"
},
{
"cve": "CVE-2011-4085",
"discovery_date": "2011-10-26T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "750422"
}
],
"notes": [
{
"category": "description",
"text": "The servlets invoked by httpha-invoker in JBoss Enterprise Application Platform before 5.1.2, SOA Platform before 5.2.0, BRMS Platform before 5.3.0, and Portal Platform before 4.3 CP07 perform access control only for the GET and POST methods, which allow remote attackers to bypass authentication by sending a request with a different method. NOTE: this vulnerability exists because of a CVE-2010-0738 regression.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Invoker servlets authentication bypass (HTTP verb tampering)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat JBoss SOA Platform 5.1"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-4085"
},
{
"category": "external",
"summary": "RHBZ#750422",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=750422"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-4085",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-4085"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-4085",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-4085"
}
],
"release_date": "2011-11-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-11-16T23:49:00+00:00",
"details": "The References section of this erratum contains a download link (you must\nlog in to download the update).",
"product_ids": [
"Red Hat JBoss SOA Platform 5.1"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:1456"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 2.6,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:H/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"Red Hat JBoss SOA Platform 5.1"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "Invoker servlets authentication bypass (HTTP verb tampering)"
}
]
}
RHSA-2011:1798
Vulnerability from csaf_redhat - Published: 2011-12-08 19:13 - Updated: 2025-11-21 17:39The servlets invoked by httpha-invoker in JBoss Enterprise Application Platform before 5.1.2, SOA Platform before 5.2.0, BRMS Platform before 5.3.0, and Portal Platform before 4.3 CP07 perform access control only for the GET and POST methods, which allow remote attackers to bypass authentication by sending a request with a different method. NOTE: this vulnerability exists because of a CVE-2010-0738 regression.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 6Server-JBEAP-5:apache-cxf-0:2.2.12-4.patch_02.1.ep5.el6.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-JBEAP-5:apache-cxf-0:2.2.12-4.patch_02.1.ep5.el6.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-JBEAP-5:cglib-0:2.2-5.5.ep5.el6.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-JBEAP-5:cglib-0:2.2-5.5.ep5.el6.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-JBEAP-5:facelets-0:1.1.15-3.B1_patch_01.2.ep5.el6.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-JBEAP-5:facelets-0:1.1.15-3.B1_patch_01.2.ep5.el6.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-JBEAP-5:glassfish-jaxb-0:2.1.12-10_patch_02.ep5.el6.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-JBEAP-5:glassfish-jaxb-0:2.1.12-10_patch_02.ep5.el6.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-JBEAP-5:glassfish-jsf-0:1.2_13-5_patch_01.3.ep5.el6.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-JBEAP-5:glassfish-jsf-0:1.2_13-5_patch_01.3.ep5.el6.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-JBEAP-5:jacorb-jboss-0:2.3.1-10.patch_03.4.ep5.el6.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-JBEAP-5:jacorb-jboss-0:2.3.1-10.patch_03.4.ep5.el6.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-JBEAP-5:jakarta-commons-logging-jboss-0:1.1-10.3_patch_02.1.ep5.el6.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-JBEAP-5:jakarta-commons-logging-jboss-0:1.1-10.3_patch_02.1.ep5.el6.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-JBEAP-5:jboss-aop2-0:2.1.6-2.CP03.1.1.ep5.el6.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-JBEAP-5:jboss-aop2-0:2.1.6-2.CP03.1.1.ep5.el6.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-JBEAP-5:jboss-cache-core-0:3.2.8-1.ep5.el6.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-JBEAP-5:jboss-cache-core-0:3.2.8-1.ep5.el6.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-JBEAP-5:jboss-cl-0:2.0.10-1.2.ep5.el6.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-JBEAP-5:jboss-cl-0:2.0.10-1.2.ep5.el6.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-JBEAP-5:jboss-cluster-ha-client-0:1.1.4-1.1.ep5.el6.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-JBEAP-5:jboss-cluster-ha-client-0:1.1.4-1.1.ep5.el6.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-JBEAP-5:jboss-common-core-0:2.2.18-1.1.ep5.el6.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-JBEAP-5:jboss-common-core-0:2.2.18-1.1.ep5.el6.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-JBEAP-5:jboss-eap5-native-0:5.1.2-1.4.ep5.el6.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-JBEAP-5:jboss-eap5-native-0:5.1.2-1.4.ep5.el6.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-JBEAP-5:jboss-eap5-native-0:5.1.2-1.4.ep5.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-JBEAP-5:jboss-ejb3-core-0:1.3.8-0.1.ep5.el6.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-JBEAP-5:jboss-ejb3-core-0:1.3.8-0.1.ep5.el6.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-JBEAP-5:jboss-ejb3-proxy-clustered-0:1.0.3-2.SP1.1.ep5.el6.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-JBEAP-5:jboss-ejb3-proxy-clustered-0:1.0.3-2.SP1.1.ep5.el6.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-JBEAP-5:jboss-ejb3-proxy-impl-0:1.0.6-2.SP2.1.ep5.el6.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-JBEAP-5:jboss-ejb3-proxy-impl-0:1.0.6-2.SP2.1.ep5.el6.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-JBEAP-5:jboss-el-0:1.0_02-0.CR6.2.ep5.el6.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-JBEAP-5:jboss-el-0:1.0_02-0.CR6.2.ep5.el6.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-JBEAP-5:jboss-messaging-0:1.4.8-9.SP5.1.ep5.el6.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-JBEAP-5:jboss-messaging-0:1.4.8-9.SP5.1.ep5.el6.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-JBEAP-5:jboss-naming-0:5.0.3-3.CP01.3.ep5.el6.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-JBEAP-5:jboss-naming-0:5.0.3-3.CP01.3.ep5.el6.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-JBEAP-5:jboss-remoting-0:2.5.4-9.SP3.1.ep5.el6.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-JBEAP-5:jboss-remoting-0:2.5.4-9.SP3.1.ep5.el6.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-JBEAP-5:jboss-seam2-0:2.2.5.EAP5-7.ep5.el6.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-JBEAP-5:jboss-seam2-0:2.2.5.EAP5-7.ep5.el6.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-JBEAP-5:jboss-seam2-docs-0:2.2.5.EAP5-7.ep5.el6.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-JBEAP-5:jboss-seam2-examples-0:2.2.5.EAP5-7.ep5.el6.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-JBEAP-5:jboss-seam2-runtime-0:2.2.5.EAP5-7.ep5.el6.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-JBEAP-5:jboss-security-spi-1:2.0.4-6.SP8.1.ep5.el6.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-JBEAP-5:jboss-security-spi-1:2.0.4-6.SP8.1.ep5.el6.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-JBEAP-5:jbossas-0:5.1.2-8.ep5.el6.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-JBEAP-5:jbossas-0:5.1.2-8.ep5.el6.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-JBEAP-5:jbossas-client-0:5.1.2-8.ep5.el6.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-JBEAP-5:jbossas-messaging-0:5.1.2-8.ep5.el6.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-JBEAP-5:jbossas-tp-licenses-0:5.1.2-7.ep5.el6.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-JBEAP-5:jbossas-tp-licenses-0:5.1.2-7.ep5.el6.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-JBEAP-5:jbossas-ws-cxf-0:5.1.2-8.ep5.el6.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-JBEAP-5:jbossas-ws-cxf-0:5.1.2-8.ep5.el6.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-JBEAP-5:jbossas-ws-native-0:5.1.2-8.ep5.el6.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-JBEAP-5:jbosssx2-0:2.0.4-6.SP8.2.ep5.el6.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-JBEAP-5:jbosssx2-0:2.0.4-6.SP8.2.ep5.el6.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-JBEAP-5:jbossts-1:4.6.1-11.CP12.4.ep5.el6.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-JBEAP-5:jbossts-1:4.6.1-11.CP12.4.ep5.el6.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-JBEAP-5:jbossts-javadoc-1:4.6.1-11.CP12.4.ep5.el6.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-JBEAP-5:jbossweb-0:2.1.12-1.4_patch_01.ep5.el6.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-JBEAP-5:jbossweb-0:2.1.12-1.4_patch_01.ep5.el6.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-JBEAP-5:jbossweb-el-1.0-api-0:2.1.12-1.4_patch_01.ep5.el6.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-JBEAP-5:jbossweb-jsp-2.1-api-0:2.1.12-1.4_patch_01.ep5.el6.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-JBEAP-5:jbossweb-lib-0:2.1.12-1.4_patch_01.ep5.el6.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-JBEAP-5:jbossweb-servlet-2.5-api-0:2.1.12-1.4_patch_01.ep5.el6.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-JBEAP-5:jbossws-0:3.1.2-7.SP11.4.ep5.el6.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-JBEAP-5:jbossws-0:3.1.2-7.SP11.4.ep5.el6.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-JBEAP-5:jbossws-common-0:1.1.0-6.SP8_patch_01.1.ep5.el6.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-JBEAP-5:jbossws-common-0:1.1.0-6.SP8_patch_01.1.ep5.el6.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-JBEAP-5:jbossws-framework-0:3.1.2-6.SP10.1.ep5.el6.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-JBEAP-5:jbossws-framework-0:3.1.2-6.SP10.1.ep5.el6.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-JBEAP-5:jbossws-spi-0:1.1.2-5.SP7.1.ep5.el6.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-JBEAP-5:jbossws-spi-0:1.1.2-5.SP7.1.ep5.el6.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-JBEAP-5:jgroups-1:2.6.20-1.1.ep5.el6.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-JBEAP-5:jgroups-1:2.6.20-1.1.ep5.el6.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-JBEAP-5:jopr-embedded-0:1.3.4-18.SP5.8.ep5.el6.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-JBEAP-5:jopr-embedded-0:1.3.4-18.SP5.8.ep5.el6.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-JBEAP-5:jopr-hibernate-plugin-0:3.0.0-13.EmbJopr4.ep5.el6.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-JBEAP-5:jopr-hibernate-plugin-0:3.0.0-13.EmbJopr4.ep5.el6.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-JBEAP-5:jopr-jboss-as-5-plugin-0:3.0.0-12.EmbJopr4.ep5.el6.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-JBEAP-5:jopr-jboss-as-5-plugin-0:3.0.0-12.EmbJopr4.ep5.el6.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-JBEAP-5:jopr-jboss-cache-v3-plugin-0:3.0.0-14.EmbJopr4.ep5.el6.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-JBEAP-5:jopr-jboss-cache-v3-plugin-0:3.0.0-14.EmbJopr4.ep5.el6.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-JBEAP-5:mod_cluster-0:1.0.10-3.2.GA_CP02.ep5.el6.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-JBEAP-5:mod_cluster-demo-0:1.0.10-3.2.GA_CP02.ep5.el6.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-JBEAP-5:mod_cluster-jbossas-0:1.0.10-3.2.GA_CP02.ep5.el6.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-JBEAP-5:mod_cluster-jbossweb2-0:1.0.10-3.2.GA_CP02.ep5.el6.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-JBEAP-5:mod_cluster-native-0:1.0.10-3.1.1.GA_CP02.ep5.el6.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-JBEAP-5:mod_cluster-native-0:1.0.10-3.1.1.GA_CP02.ep5.el6.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-JBEAP-5:mod_cluster-native-0:1.0.10-3.1.1.GA_CP02.ep5.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-JBEAP-5:mod_cluster-tomcat6-0:1.0.10-3.2.GA_CP02.ep5.el6.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-JBEAP-5:org-mc4j-ems-0:1.2.15.1-7.ep5.el6.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-JBEAP-5:org-mc4j-ems-0:1.2.15.1-7.ep5.el6.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-JBEAP-5:picketlink-federation-0:2.0.2-1.ep5.el6.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-JBEAP-5:picketlink-federation-0:2.0.2-1.ep5.el6.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-JBEAP-5:picketlink-federation-webapp-idp-0:2.0.2-1.ep5.el6.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-JBEAP-5:picketlink-federation-webapp-pdp-0:2.0.2-1.ep5.el6.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-JBEAP-5:picketlink-federation-webapp-sts-0:2.0.2-1.ep5.el6.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-JBEAP-5:resteasy-0:1.2.1-9.CP02.5.ep5.el6.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-JBEAP-5:resteasy-0:1.2.1-9.CP02.5.ep5.el6.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-JBEAP-5:resteasy-examples-0:1.2.1-9.CP02.5.ep5.el6.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-JBEAP-5:resteasy-javadoc-0:1.2.1-9.CP02.5.ep5.el6.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-JBEAP-5:resteasy-manual-0:1.2.1-9.CP02.5.ep5.el6.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-JBEAP-5:rh-eap-docs-0:5.1.2-6.ep5.el6.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-JBEAP-5:rh-eap-docs-0:5.1.2-6.ep5.el6.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-JBEAP-5:rh-eap-docs-examples-0:5.1.2-6.ep5.el6.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-JBEAP-5:rhq-0:3.0.0-20.EmbJopr4.ep5.el6.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-JBEAP-5:rhq-0:3.0.0-20.EmbJopr4.ep5.el6.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-JBEAP-5:rhq-ant-bundle-common-0:3.0.0-20.EmbJopr4.ep5.el6.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-JBEAP-5:rhq-common-parent-0:3.0.0-20.EmbJopr4.ep5.el6.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-JBEAP-5:rhq-core-client-api-0:3.0.0-20.EmbJopr4.ep5.el6.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-JBEAP-5:rhq-core-comm-api-0:3.0.0-20.EmbJopr4.ep5.el6.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-JBEAP-5:rhq-core-dbutils-0:3.0.0-20.EmbJopr4.ep5.el6.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-JBEAP-5:rhq-core-domain-0:3.0.0-20.EmbJopr4.ep5.el6.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-JBEAP-5:rhq-core-gui-0:3.0.0-20.EmbJopr4.ep5.el6.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-JBEAP-5:rhq-core-native-system-0:3.0.0-20.EmbJopr4.ep5.el6.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-JBEAP-5:rhq-core-parent-0:3.0.0-20.EmbJopr4.ep5.el6.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-JBEAP-5:rhq-core-plugin-api-0:3.0.0-20.EmbJopr4.ep5.el6.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-JBEAP-5:rhq-core-plugin-container-0:3.0.0-20.EmbJopr4.ep5.el6.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-JBEAP-5:rhq-core-plugindoc-0:3.0.0-20.EmbJopr4.ep5.el6.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-JBEAP-5:rhq-core-util-0:3.0.0-20.EmbJopr4.ep5.el6.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-JBEAP-5:rhq-filetemplate-bundle-common-0:3.0.0-20.EmbJopr4.ep5.el6.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-JBEAP-5:rhq-helpers-0:3.0.0-20.EmbJopr4.ep5.el6.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-JBEAP-5:rhq-jboss-as-common-0:3.0.0-20.EmbJopr4.ep5.el6.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-JBEAP-5:rhq-jmx-plugin-0:3.0.0-20.EmbJopr4.ep5.el6.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-JBEAP-5:rhq-jmx-plugin-0:3.0.0-20.EmbJopr4.ep5.el6.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-JBEAP-5:rhq-modules-parent-0:3.0.0-20.EmbJopr4.ep5.el6.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-JBEAP-5:rhq-parent-0:3.0.0-20.EmbJopr4.ep5.el6.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-JBEAP-5:rhq-platform-plugin-0:3.0.0-13.EmbJopr4.ep5.el6.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-JBEAP-5:rhq-platform-plugin-0:3.0.0-13.EmbJopr4.ep5.el6.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-JBEAP-5:rhq-plugin-validator-0:3.0.0-20.EmbJopr4.ep5.el6.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-JBEAP-5:rhq-pluginAnnotations-0:3.0.0-20.EmbJopr4.ep5.el6.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-JBEAP-5:rhq-pluginGen-0:3.0.0-20.EmbJopr4.ep5.el6.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-JBEAP-5:rhq-plugins-parent-0:3.0.0-20.EmbJopr4.ep5.el6.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-JBEAP-5:rhq-rtfilter-0:3.0.0-20.EmbJopr4.ep5.el6.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-JBEAP-5:slf4j-0:1.5.8-10_patch_01.2.ep5.el6.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-JBEAP-5:slf4j-0:1.5.8-10_patch_01.2.ep5.el6.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-JBEAP-5:xalan-j2-0:2.7.1-6_patch_05.1.ep5.el6.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-JBEAP-5:xalan-j2-0:2.7.1-6_patch_05.1.ep5.el6.src | — |
Vendor Fix
fix
|
message/ax/AxMessage.java in OpenID4Java before 0.9.6 final, as used in JBoss Enterprise Application Platform 5.1 before 5.1.2, Step2, Kay Framework before 1.0.2, and possibly other products does not verify that Attribute Exchange (AX) information is signed, which allows remote attackers to modify potentially sensitive AX information without detection via a man-in-the-middle (MITM) attack.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 6Server-JBEAP-5:apache-cxf-0:2.2.12-4.patch_02.1.ep5.el6.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-JBEAP-5:apache-cxf-0:2.2.12-4.patch_02.1.ep5.el6.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-JBEAP-5:cglib-0:2.2-5.5.ep5.el6.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-JBEAP-5:cglib-0:2.2-5.5.ep5.el6.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-JBEAP-5:facelets-0:1.1.15-3.B1_patch_01.2.ep5.el6.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-JBEAP-5:facelets-0:1.1.15-3.B1_patch_01.2.ep5.el6.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-JBEAP-5:glassfish-jaxb-0:2.1.12-10_patch_02.ep5.el6.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-JBEAP-5:glassfish-jaxb-0:2.1.12-10_patch_02.ep5.el6.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-JBEAP-5:glassfish-jsf-0:1.2_13-5_patch_01.3.ep5.el6.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-JBEAP-5:glassfish-jsf-0:1.2_13-5_patch_01.3.ep5.el6.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-JBEAP-5:jacorb-jboss-0:2.3.1-10.patch_03.4.ep5.el6.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-JBEAP-5:jacorb-jboss-0:2.3.1-10.patch_03.4.ep5.el6.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-JBEAP-5:jakarta-commons-logging-jboss-0:1.1-10.3_patch_02.1.ep5.el6.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-JBEAP-5:jakarta-commons-logging-jboss-0:1.1-10.3_patch_02.1.ep5.el6.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-JBEAP-5:jboss-aop2-0:2.1.6-2.CP03.1.1.ep5.el6.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-JBEAP-5:jboss-aop2-0:2.1.6-2.CP03.1.1.ep5.el6.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-JBEAP-5:jboss-cache-core-0:3.2.8-1.ep5.el6.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-JBEAP-5:jboss-cache-core-0:3.2.8-1.ep5.el6.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-JBEAP-5:jboss-cl-0:2.0.10-1.2.ep5.el6.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-JBEAP-5:jboss-cl-0:2.0.10-1.2.ep5.el6.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-JBEAP-5:jboss-cluster-ha-client-0:1.1.4-1.1.ep5.el6.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-JBEAP-5:jboss-cluster-ha-client-0:1.1.4-1.1.ep5.el6.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-JBEAP-5:jboss-common-core-0:2.2.18-1.1.ep5.el6.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-JBEAP-5:jboss-common-core-0:2.2.18-1.1.ep5.el6.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-JBEAP-5:jboss-eap5-native-0:5.1.2-1.4.ep5.el6.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-JBEAP-5:jboss-eap5-native-0:5.1.2-1.4.ep5.el6.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-JBEAP-5:jboss-eap5-native-0:5.1.2-1.4.ep5.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-JBEAP-5:jboss-ejb3-core-0:1.3.8-0.1.ep5.el6.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-JBEAP-5:jboss-ejb3-core-0:1.3.8-0.1.ep5.el6.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-JBEAP-5:jboss-ejb3-proxy-clustered-0:1.0.3-2.SP1.1.ep5.el6.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-JBEAP-5:jboss-ejb3-proxy-clustered-0:1.0.3-2.SP1.1.ep5.el6.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-JBEAP-5:jboss-ejb3-proxy-impl-0:1.0.6-2.SP2.1.ep5.el6.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-JBEAP-5:jboss-ejb3-proxy-impl-0:1.0.6-2.SP2.1.ep5.el6.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-JBEAP-5:jboss-el-0:1.0_02-0.CR6.2.ep5.el6.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-JBEAP-5:jboss-el-0:1.0_02-0.CR6.2.ep5.el6.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-JBEAP-5:jboss-messaging-0:1.4.8-9.SP5.1.ep5.el6.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-JBEAP-5:jboss-messaging-0:1.4.8-9.SP5.1.ep5.el6.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-JBEAP-5:jboss-naming-0:5.0.3-3.CP01.3.ep5.el6.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-JBEAP-5:jboss-naming-0:5.0.3-3.CP01.3.ep5.el6.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-JBEAP-5:jboss-remoting-0:2.5.4-9.SP3.1.ep5.el6.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-JBEAP-5:jboss-remoting-0:2.5.4-9.SP3.1.ep5.el6.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-JBEAP-5:jboss-seam2-0:2.2.5.EAP5-7.ep5.el6.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-JBEAP-5:jboss-seam2-0:2.2.5.EAP5-7.ep5.el6.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-JBEAP-5:jboss-seam2-docs-0:2.2.5.EAP5-7.ep5.el6.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-JBEAP-5:jboss-seam2-examples-0:2.2.5.EAP5-7.ep5.el6.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-JBEAP-5:jboss-seam2-runtime-0:2.2.5.EAP5-7.ep5.el6.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-JBEAP-5:jboss-security-spi-1:2.0.4-6.SP8.1.ep5.el6.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-JBEAP-5:jboss-security-spi-1:2.0.4-6.SP8.1.ep5.el6.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-JBEAP-5:jbossas-0:5.1.2-8.ep5.el6.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-JBEAP-5:jbossas-0:5.1.2-8.ep5.el6.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-JBEAP-5:jbossas-client-0:5.1.2-8.ep5.el6.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-JBEAP-5:jbossas-messaging-0:5.1.2-8.ep5.el6.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-JBEAP-5:jbossas-tp-licenses-0:5.1.2-7.ep5.el6.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-JBEAP-5:jbossas-tp-licenses-0:5.1.2-7.ep5.el6.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-JBEAP-5:jbossas-ws-cxf-0:5.1.2-8.ep5.el6.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-JBEAP-5:jbossas-ws-cxf-0:5.1.2-8.ep5.el6.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-JBEAP-5:jbossas-ws-native-0:5.1.2-8.ep5.el6.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-JBEAP-5:jbosssx2-0:2.0.4-6.SP8.2.ep5.el6.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-JBEAP-5:jbosssx2-0:2.0.4-6.SP8.2.ep5.el6.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-JBEAP-5:jbossts-1:4.6.1-11.CP12.4.ep5.el6.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-JBEAP-5:jbossts-1:4.6.1-11.CP12.4.ep5.el6.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-JBEAP-5:jbossts-javadoc-1:4.6.1-11.CP12.4.ep5.el6.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-JBEAP-5:jbossweb-0:2.1.12-1.4_patch_01.ep5.el6.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-JBEAP-5:jbossweb-0:2.1.12-1.4_patch_01.ep5.el6.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-JBEAP-5:jbossweb-el-1.0-api-0:2.1.12-1.4_patch_01.ep5.el6.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-JBEAP-5:jbossweb-jsp-2.1-api-0:2.1.12-1.4_patch_01.ep5.el6.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-JBEAP-5:jbossweb-lib-0:2.1.12-1.4_patch_01.ep5.el6.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-JBEAP-5:jbossweb-servlet-2.5-api-0:2.1.12-1.4_patch_01.ep5.el6.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-JBEAP-5:jbossws-0:3.1.2-7.SP11.4.ep5.el6.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-JBEAP-5:jbossws-0:3.1.2-7.SP11.4.ep5.el6.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-JBEAP-5:jbossws-common-0:1.1.0-6.SP8_patch_01.1.ep5.el6.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-JBEAP-5:jbossws-common-0:1.1.0-6.SP8_patch_01.1.ep5.el6.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-JBEAP-5:jbossws-framework-0:3.1.2-6.SP10.1.ep5.el6.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-JBEAP-5:jbossws-framework-0:3.1.2-6.SP10.1.ep5.el6.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-JBEAP-5:jbossws-spi-0:1.1.2-5.SP7.1.ep5.el6.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-JBEAP-5:jbossws-spi-0:1.1.2-5.SP7.1.ep5.el6.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-JBEAP-5:jgroups-1:2.6.20-1.1.ep5.el6.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-JBEAP-5:jgroups-1:2.6.20-1.1.ep5.el6.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-JBEAP-5:jopr-embedded-0:1.3.4-18.SP5.8.ep5.el6.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-JBEAP-5:jopr-embedded-0:1.3.4-18.SP5.8.ep5.el6.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-JBEAP-5:jopr-hibernate-plugin-0:3.0.0-13.EmbJopr4.ep5.el6.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-JBEAP-5:jopr-hibernate-plugin-0:3.0.0-13.EmbJopr4.ep5.el6.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-JBEAP-5:jopr-jboss-as-5-plugin-0:3.0.0-12.EmbJopr4.ep5.el6.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-JBEAP-5:jopr-jboss-as-5-plugin-0:3.0.0-12.EmbJopr4.ep5.el6.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-JBEAP-5:jopr-jboss-cache-v3-plugin-0:3.0.0-14.EmbJopr4.ep5.el6.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-JBEAP-5:jopr-jboss-cache-v3-plugin-0:3.0.0-14.EmbJopr4.ep5.el6.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-JBEAP-5:mod_cluster-0:1.0.10-3.2.GA_CP02.ep5.el6.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-JBEAP-5:mod_cluster-demo-0:1.0.10-3.2.GA_CP02.ep5.el6.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-JBEAP-5:mod_cluster-jbossas-0:1.0.10-3.2.GA_CP02.ep5.el6.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-JBEAP-5:mod_cluster-jbossweb2-0:1.0.10-3.2.GA_CP02.ep5.el6.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-JBEAP-5:mod_cluster-native-0:1.0.10-3.1.1.GA_CP02.ep5.el6.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-JBEAP-5:mod_cluster-native-0:1.0.10-3.1.1.GA_CP02.ep5.el6.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-JBEAP-5:mod_cluster-native-0:1.0.10-3.1.1.GA_CP02.ep5.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-JBEAP-5:mod_cluster-tomcat6-0:1.0.10-3.2.GA_CP02.ep5.el6.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-JBEAP-5:org-mc4j-ems-0:1.2.15.1-7.ep5.el6.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-JBEAP-5:org-mc4j-ems-0:1.2.15.1-7.ep5.el6.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-JBEAP-5:picketlink-federation-0:2.0.2-1.ep5.el6.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-JBEAP-5:picketlink-federation-0:2.0.2-1.ep5.el6.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-JBEAP-5:picketlink-federation-webapp-idp-0:2.0.2-1.ep5.el6.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-JBEAP-5:picketlink-federation-webapp-pdp-0:2.0.2-1.ep5.el6.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-JBEAP-5:picketlink-federation-webapp-sts-0:2.0.2-1.ep5.el6.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-JBEAP-5:resteasy-0:1.2.1-9.CP02.5.ep5.el6.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-JBEAP-5:resteasy-0:1.2.1-9.CP02.5.ep5.el6.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-JBEAP-5:resteasy-examples-0:1.2.1-9.CP02.5.ep5.el6.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-JBEAP-5:resteasy-javadoc-0:1.2.1-9.CP02.5.ep5.el6.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-JBEAP-5:resteasy-manual-0:1.2.1-9.CP02.5.ep5.el6.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-JBEAP-5:rh-eap-docs-0:5.1.2-6.ep5.el6.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-JBEAP-5:rh-eap-docs-0:5.1.2-6.ep5.el6.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-JBEAP-5:rh-eap-docs-examples-0:5.1.2-6.ep5.el6.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-JBEAP-5:rhq-0:3.0.0-20.EmbJopr4.ep5.el6.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-JBEAP-5:rhq-0:3.0.0-20.EmbJopr4.ep5.el6.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-JBEAP-5:rhq-ant-bundle-common-0:3.0.0-20.EmbJopr4.ep5.el6.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-JBEAP-5:rhq-common-parent-0:3.0.0-20.EmbJopr4.ep5.el6.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-JBEAP-5:rhq-core-client-api-0:3.0.0-20.EmbJopr4.ep5.el6.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-JBEAP-5:rhq-core-comm-api-0:3.0.0-20.EmbJopr4.ep5.el6.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-JBEAP-5:rhq-core-dbutils-0:3.0.0-20.EmbJopr4.ep5.el6.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-JBEAP-5:rhq-core-domain-0:3.0.0-20.EmbJopr4.ep5.el6.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-JBEAP-5:rhq-core-gui-0:3.0.0-20.EmbJopr4.ep5.el6.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-JBEAP-5:rhq-core-native-system-0:3.0.0-20.EmbJopr4.ep5.el6.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-JBEAP-5:rhq-core-parent-0:3.0.0-20.EmbJopr4.ep5.el6.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-JBEAP-5:rhq-core-plugin-api-0:3.0.0-20.EmbJopr4.ep5.el6.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-JBEAP-5:rhq-core-plugin-container-0:3.0.0-20.EmbJopr4.ep5.el6.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-JBEAP-5:rhq-core-plugindoc-0:3.0.0-20.EmbJopr4.ep5.el6.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-JBEAP-5:rhq-core-util-0:3.0.0-20.EmbJopr4.ep5.el6.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-JBEAP-5:rhq-filetemplate-bundle-common-0:3.0.0-20.EmbJopr4.ep5.el6.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-JBEAP-5:rhq-helpers-0:3.0.0-20.EmbJopr4.ep5.el6.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-JBEAP-5:rhq-jboss-as-common-0:3.0.0-20.EmbJopr4.ep5.el6.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-JBEAP-5:rhq-jmx-plugin-0:3.0.0-20.EmbJopr4.ep5.el6.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-JBEAP-5:rhq-jmx-plugin-0:3.0.0-20.EmbJopr4.ep5.el6.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-JBEAP-5:rhq-modules-parent-0:3.0.0-20.EmbJopr4.ep5.el6.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-JBEAP-5:rhq-parent-0:3.0.0-20.EmbJopr4.ep5.el6.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-JBEAP-5:rhq-platform-plugin-0:3.0.0-13.EmbJopr4.ep5.el6.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-JBEAP-5:rhq-platform-plugin-0:3.0.0-13.EmbJopr4.ep5.el6.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-JBEAP-5:rhq-plugin-validator-0:3.0.0-20.EmbJopr4.ep5.el6.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-JBEAP-5:rhq-pluginAnnotations-0:3.0.0-20.EmbJopr4.ep5.el6.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-JBEAP-5:rhq-pluginGen-0:3.0.0-20.EmbJopr4.ep5.el6.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-JBEAP-5:rhq-plugins-parent-0:3.0.0-20.EmbJopr4.ep5.el6.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-JBEAP-5:rhq-rtfilter-0:3.0.0-20.EmbJopr4.ep5.el6.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-JBEAP-5:slf4j-0:1.5.8-10_patch_01.2.ep5.el6.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-JBEAP-5:slf4j-0:1.5.8-10_patch_01.2.ep5.el6.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-JBEAP-5:xalan-j2-0:2.7.1-6_patch_05.1.ep5.el6.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-JBEAP-5:xalan-j2-0:2.7.1-6_patch_05.1.ep5.el6.src | — |
Vendor Fix
fix
|
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Low"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated JBoss Enterprise Application Platform 5.1.2 packages that fix two\nsecurity issues, various bugs, and add several enhancements are now\navailable for Red Hat Enterprise Linux 6.\n\nThe Red Hat Security Response Team has rated this update as having low\nsecurity impact. Common Vulnerability Scoring System (CVSS) base scores,\nwhich give detailed severity ratings, are available for each vulnerability\nfrom the CVE links in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "JBoss Enterprise Application Platform is a platform for Java applications,\nwhich integrates the JBoss Application Server with JBoss Hibernate and\nJBoss Seam. OpenID4Java allows you to implement OpenID authentication in\nyour Java applications. OpenID4Java is a Technology Preview.\n\nThis JBoss Enterprise Application Platform 5.1.2 release for Red Hat\nEnterprise Linux 6 serves as a replacement for JBoss Enterprise Application\nPlatform 5.1.1.\n\nThese updated packages include bug fixes and enhancements. Refer to\nthe JBoss Enterprise Application Platform 5.1.2 Release Notes for\ninformation on the most significant of these changes. The Release Notes\nwill be available shortly from\nhttps://docs.redhat.com/docs/en-US/index.html\n\nThe following security issues are also fixed with this release:\n\nIt was found that the invoker servlets, deployed by default via\nhttpha-invoker, only performed access control on the HTTP GET and POST\nmethods, allowing remote attackers to make unauthenticated requests by\nusing different HTTP methods. Due to the second layer of authentication\nprovided by a security interceptor, this issue is not exploitable on\ndefault installations unless an administrator has misconfigured the\nsecurity interceptor or disabled it. (CVE-2011-4085)\n\nIt was found that the Attribute Exchange (AX) extension of OpenID4Java was\nnot checking to ensure attributes were signed. If AX was being used to\nreceive information that an application only trusts the identity provider\nto assert, a remote attacker could use this flaw to conduct\nman-in-the-middle attacks and compromise the integrity of the information\nvia a specially-crafted request. By default, only the JBoss Seam openid\nexample application uses OpenID4Java. (CVE-2011-4314)\n\nWarning: Before applying this update, back up the\n\"jboss-as/server/[PROFILE]/deploy/\" directory and any other customized\nconfiguration files of your JBoss Enterprise Application Platform.\n\nAll users of JBoss Enterprise Application Platform 5.1.1 on Red Hat\nEnterprise Linux 6 are advised to upgrade to these updated packages. The\nJBoss server process must be restarted for the update to take effect.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2011:1798",
"url": "https://access.redhat.com/errata/RHSA-2011:1798"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#low",
"url": "https://access.redhat.com/security/updates/classification/#low"
},
{
"category": "external",
"summary": "https://docs.redhat.com/docs/en-US/index.html",
"url": "https://docs.redhat.com/docs/en-US/index.html"
},
{
"category": "external",
"summary": "https://access.redhat.com/support/offerings/techpreview/",
"url": "https://access.redhat.com/support/offerings/techpreview/"
},
{
"category": "external",
"summary": "733727",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=733727"
},
{
"category": "external",
"summary": "750422",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=750422"
},
{
"category": "external",
"summary": "754386",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=754386"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2011/rhsa-2011_1798.json"
}
],
"title": "Red Hat Security Advisory: JBoss Enterprise Application Platform 5.1.2 update",
"tracking": {
"current_release_date": "2025-11-21T17:39:21+00:00",
"generator": {
"date": "2025-11-21T17:39:21+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2011:1798",
"initial_release_date": "2011-12-08T19:13:00+00:00",
"revision_history": [
{
"date": "2011-12-08T19:13:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2011-12-08T19:15:15+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T17:39:21+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat JBoss Enterprise Application Platform 5 for RHEL 6 Server",
"product": {
"name": "Red Hat JBoss Enterprise Application Platform 5 for RHEL 6 Server",
"product_id": "6Server-JBEAP-5",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:jboss_enterprise_application_platform:5::el6"
}
}
}
],
"category": "product_family",
"name": "Red Hat JBoss Enterprise Application Platform"
},
{
"branches": [
{
"category": "product_version",
"name": "jakarta-commons-logging-jboss-0:1.1-10.3_patch_02.1.ep5.el6.src",
"product": {
"name": "jakarta-commons-logging-jboss-0:1.1-10.3_patch_02.1.ep5.el6.src",
"product_id": "jakarta-commons-logging-jboss-0:1.1-10.3_patch_02.1.ep5.el6.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jakarta-commons-logging-jboss@1.1-10.3_patch_02.1.ep5.el6?arch=src"
}
}
},
{
"category": "product_version",
"name": "jboss-remoting-0:2.5.4-9.SP3.1.ep5.el6.src",
"product": {
"name": "jboss-remoting-0:2.5.4-9.SP3.1.ep5.el6.src",
"product_id": "jboss-remoting-0:2.5.4-9.SP3.1.ep5.el6.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jboss-remoting@2.5.4-9.SP3.1.ep5.el6?arch=src"
}
}
},
{
"category": "product_version",
"name": "jgroups-1:2.6.20-1.1.ep5.el6.src",
"product": {
"name": "jgroups-1:2.6.20-1.1.ep5.el6.src",
"product_id": "jgroups-1:2.6.20-1.1.ep5.el6.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jgroups@2.6.20-1.1.ep5.el6?arch=src\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "mod_cluster-0:1.0.10-3.2.GA_CP02.ep5.el6.src",
"product": {
"name": "mod_cluster-0:1.0.10-3.2.GA_CP02.ep5.el6.src",
"product_id": "mod_cluster-0:1.0.10-3.2.GA_CP02.ep5.el6.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_cluster@1.0.10-3.2.GA_CP02.ep5.el6?arch=src"
}
}
},
{
"category": "product_version",
"name": "mod_cluster-native-0:1.0.10-3.1.1.GA_CP02.ep5.el6.src",
"product": {
"name": "mod_cluster-native-0:1.0.10-3.1.1.GA_CP02.ep5.el6.src",
"product_id": "mod_cluster-native-0:1.0.10-3.1.1.GA_CP02.ep5.el6.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_cluster-native@1.0.10-3.1.1.GA_CP02.ep5.el6?arch=src"
}
}
},
{
"category": "product_version",
"name": "jboss-ejb3-core-0:1.3.8-0.1.ep5.el6.src",
"product": {
"name": "jboss-ejb3-core-0:1.3.8-0.1.ep5.el6.src",
"product_id": "jboss-ejb3-core-0:1.3.8-0.1.ep5.el6.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jboss-ejb3-core@1.3.8-0.1.ep5.el6?arch=src"
}
}
},
{
"category": "product_version",
"name": "jboss-ejb3-proxy-impl-0:1.0.6-2.SP2.1.ep5.el6.src",
"product": {
"name": "jboss-ejb3-proxy-impl-0:1.0.6-2.SP2.1.ep5.el6.src",
"product_id": "jboss-ejb3-proxy-impl-0:1.0.6-2.SP2.1.ep5.el6.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jboss-ejb3-proxy-impl@1.0.6-2.SP2.1.ep5.el6?arch=src"
}
}
},
{
"category": "product_version",
"name": "apache-cxf-0:2.2.12-4.patch_02.1.ep5.el6.src",
"product": {
"name": "apache-cxf-0:2.2.12-4.patch_02.1.ep5.el6.src",
"product_id": "apache-cxf-0:2.2.12-4.patch_02.1.ep5.el6.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/apache-cxf@2.2.12-4.patch_02.1.ep5.el6?arch=src"
}
}
},
{
"category": "product_version",
"name": "jboss-security-spi-1:2.0.4-6.SP8.1.ep5.el6.src",
"product": {
"name": "jboss-security-spi-1:2.0.4-6.SP8.1.ep5.el6.src",
"product_id": "jboss-security-spi-1:2.0.4-6.SP8.1.ep5.el6.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jboss-security-spi@2.0.4-6.SP8.1.ep5.el6?arch=src\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "jboss-cache-core-0:3.2.8-1.ep5.el6.src",
"product": {
"name": "jboss-cache-core-0:3.2.8-1.ep5.el6.src",
"product_id": "jboss-cache-core-0:3.2.8-1.ep5.el6.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jboss-cache-core@3.2.8-1.ep5.el6?arch=src"
}
}
},
{
"category": "product_version",
"name": "jboss-cl-0:2.0.10-1.2.ep5.el6.src",
"product": {
"name": "jboss-cl-0:2.0.10-1.2.ep5.el6.src",
"product_id": "jboss-cl-0:2.0.10-1.2.ep5.el6.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jboss-cl@2.0.10-1.2.ep5.el6?arch=src"
}
}
},
{
"category": "product_version",
"name": "glassfish-jaxb-0:2.1.12-10_patch_02.ep5.el6.src",
"product": {
"name": "glassfish-jaxb-0:2.1.12-10_patch_02.ep5.el6.src",
"product_id": "glassfish-jaxb-0:2.1.12-10_patch_02.ep5.el6.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glassfish-jaxb@2.1.12-10_patch_02.ep5.el6?arch=src"
}
}
},
{
"category": "product_version",
"name": "jbossws-spi-0:1.1.2-5.SP7.1.ep5.el6.src",
"product": {
"name": "jbossws-spi-0:1.1.2-5.SP7.1.ep5.el6.src",
"product_id": "jbossws-spi-0:1.1.2-5.SP7.1.ep5.el6.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbossws-spi@1.1.2-5.SP7.1.ep5.el6?arch=src"
}
}
},
{
"category": "product_version",
"name": "slf4j-0:1.5.8-10_patch_01.2.ep5.el6.src",
"product": {
"name": "slf4j-0:1.5.8-10_patch_01.2.ep5.el6.src",
"product_id": "slf4j-0:1.5.8-10_patch_01.2.ep5.el6.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/slf4j@1.5.8-10_patch_01.2.ep5.el6?arch=src"
}
}
},
{
"category": "product_version",
"name": "jbossws-framework-0:3.1.2-6.SP10.1.ep5.el6.src",
"product": {
"name": "jbossws-framework-0:3.1.2-6.SP10.1.ep5.el6.src",
"product_id": "jbossws-framework-0:3.1.2-6.SP10.1.ep5.el6.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbossws-framework@3.1.2-6.SP10.1.ep5.el6?arch=src"
}
}
},
{
"category": "product_version",
"name": "jboss-aop2-0:2.1.6-2.CP03.1.1.ep5.el6.src",
"product": {
"name": "jboss-aop2-0:2.1.6-2.CP03.1.1.ep5.el6.src",
"product_id": "jboss-aop2-0:2.1.6-2.CP03.1.1.ep5.el6.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jboss-aop2@2.1.6-2.CP03.1.1.ep5.el6?arch=src"
}
}
},
{
"category": "product_version",
"name": "xalan-j2-0:2.7.1-6_patch_05.1.ep5.el6.src",
"product": {
"name": "xalan-j2-0:2.7.1-6_patch_05.1.ep5.el6.src",
"product_id": "xalan-j2-0:2.7.1-6_patch_05.1.ep5.el6.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xalan-j2@2.7.1-6_patch_05.1.ep5.el6?arch=src"
}
}
},
{
"category": "product_version",
"name": "jbosssx2-0:2.0.4-6.SP8.2.ep5.el6.src",
"product": {
"name": "jbosssx2-0:2.0.4-6.SP8.2.ep5.el6.src",
"product_id": "jbosssx2-0:2.0.4-6.SP8.2.ep5.el6.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbosssx2@2.0.4-6.SP8.2.ep5.el6?arch=src"
}
}
},
{
"category": "product_version",
"name": "jbossws-common-0:1.1.0-6.SP8_patch_01.1.ep5.el6.src",
"product": {
"name": "jbossws-common-0:1.1.0-6.SP8_patch_01.1.ep5.el6.src",
"product_id": "jbossws-common-0:1.1.0-6.SP8_patch_01.1.ep5.el6.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbossws-common@1.1.0-6.SP8_patch_01.1.ep5.el6?arch=src"
}
}
},
{
"category": "product_version",
"name": "jboss-eap5-native-0:5.1.2-1.4.ep5.el6.src",
"product": {
"name": "jboss-eap5-native-0:5.1.2-1.4.ep5.el6.src",
"product_id": "jboss-eap5-native-0:5.1.2-1.4.ep5.el6.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jboss-eap5-native@5.1.2-1.4.ep5.el6?arch=src"
}
}
},
{
"category": "product_version",
"name": "jboss-common-core-0:2.2.18-1.1.ep5.el6.src",
"product": {
"name": "jboss-common-core-0:2.2.18-1.1.ep5.el6.src",
"product_id": "jboss-common-core-0:2.2.18-1.1.ep5.el6.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jboss-common-core@2.2.18-1.1.ep5.el6?arch=src"
}
}
},
{
"category": "product_version",
"name": "jboss-cluster-ha-client-0:1.1.4-1.1.ep5.el6.src",
"product": {
"name": "jboss-cluster-ha-client-0:1.1.4-1.1.ep5.el6.src",
"product_id": "jboss-cluster-ha-client-0:1.1.4-1.1.ep5.el6.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jboss-cluster-ha-client@1.1.4-1.1.ep5.el6?arch=src"
}
}
},
{
"category": "product_version",
"name": "jbossweb-0:2.1.12-1.4_patch_01.ep5.el6.src",
"product": {
"name": "jbossweb-0:2.1.12-1.4_patch_01.ep5.el6.src",
"product_id": "jbossweb-0:2.1.12-1.4_patch_01.ep5.el6.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbossweb@2.1.12-1.4_patch_01.ep5.el6?arch=src"
}
}
},
{
"category": "product_version",
"name": "jboss-ejb3-proxy-clustered-0:1.0.3-2.SP1.1.ep5.el6.src",
"product": {
"name": "jboss-ejb3-proxy-clustered-0:1.0.3-2.SP1.1.ep5.el6.src",
"product_id": "jboss-ejb3-proxy-clustered-0:1.0.3-2.SP1.1.ep5.el6.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jboss-ejb3-proxy-clustered@1.0.3-2.SP1.1.ep5.el6?arch=src"
}
}
},
{
"category": "product_version",
"name": "facelets-0:1.1.15-3.B1_patch_01.2.ep5.el6.src",
"product": {
"name": "facelets-0:1.1.15-3.B1_patch_01.2.ep5.el6.src",
"product_id": "facelets-0:1.1.15-3.B1_patch_01.2.ep5.el6.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/facelets@1.1.15-3.B1_patch_01.2.ep5.el6?arch=src"
}
}
},
{
"category": "product_version",
"name": "resteasy-0:1.2.1-9.CP02.5.ep5.el6.src",
"product": {
"name": "resteasy-0:1.2.1-9.CP02.5.ep5.el6.src",
"product_id": "resteasy-0:1.2.1-9.CP02.5.ep5.el6.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/resteasy@1.2.1-9.CP02.5.ep5.el6?arch=src"
}
}
},
{
"category": "product_version",
"name": "jboss-naming-0:5.0.3-3.CP01.3.ep5.el6.src",
"product": {
"name": "jboss-naming-0:5.0.3-3.CP01.3.ep5.el6.src",
"product_id": "jboss-naming-0:5.0.3-3.CP01.3.ep5.el6.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jboss-naming@5.0.3-3.CP01.3.ep5.el6?arch=src"
}
}
},
{
"category": "product_version",
"name": "jboss-el-0:1.0_02-0.CR6.2.ep5.el6.src",
"product": {
"name": "jboss-el-0:1.0_02-0.CR6.2.ep5.el6.src",
"product_id": "jboss-el-0:1.0_02-0.CR6.2.ep5.el6.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jboss-el@1.0_02-0.CR6.2.ep5.el6?arch=src"
}
}
},
{
"category": "product_version",
"name": "org-mc4j-ems-0:1.2.15.1-7.ep5.el6.src",
"product": {
"name": "org-mc4j-ems-0:1.2.15.1-7.ep5.el6.src",
"product_id": "org-mc4j-ems-0:1.2.15.1-7.ep5.el6.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/org-mc4j-ems@1.2.15.1-7.ep5.el6?arch=src"
}
}
},
{
"category": "product_version",
"name": "jbossws-0:3.1.2-7.SP11.4.ep5.el6.src",
"product": {
"name": "jbossws-0:3.1.2-7.SP11.4.ep5.el6.src",
"product_id": "jbossws-0:3.1.2-7.SP11.4.ep5.el6.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbossws@3.1.2-7.SP11.4.ep5.el6?arch=src"
}
}
},
{
"category": "product_version",
"name": "jboss-seam2-0:2.2.5.EAP5-7.ep5.el6.src",
"product": {
"name": "jboss-seam2-0:2.2.5.EAP5-7.ep5.el6.src",
"product_id": "jboss-seam2-0:2.2.5.EAP5-7.ep5.el6.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jboss-seam2@2.2.5.EAP5-7.ep5.el6?arch=src"
}
}
},
{
"category": "product_version",
"name": "picketlink-federation-0:2.0.2-1.ep5.el6.src",
"product": {
"name": "picketlink-federation-0:2.0.2-1.ep5.el6.src",
"product_id": "picketlink-federation-0:2.0.2-1.ep5.el6.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/picketlink-federation@2.0.2-1.ep5.el6?arch=src"
}
}
},
{
"category": "product_version",
"name": "cglib-0:2.2-5.5.ep5.el6.src",
"product": {
"name": "cglib-0:2.2-5.5.ep5.el6.src",
"product_id": "cglib-0:2.2-5.5.ep5.el6.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cglib@2.2-5.5.ep5.el6?arch=src"
}
}
},
{
"category": "product_version",
"name": "jboss-messaging-0:1.4.8-9.SP5.1.ep5.el6.src",
"product": {
"name": "jboss-messaging-0:1.4.8-9.SP5.1.ep5.el6.src",
"product_id": "jboss-messaging-0:1.4.8-9.SP5.1.ep5.el6.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jboss-messaging@1.4.8-9.SP5.1.ep5.el6?arch=src"
}
}
},
{
"category": "product_version",
"name": "rhq-0:3.0.0-20.EmbJopr4.ep5.el6.src",
"product": {
"name": "rhq-0:3.0.0-20.EmbJopr4.ep5.el6.src",
"product_id": "rhq-0:3.0.0-20.EmbJopr4.ep5.el6.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rhq@3.0.0-20.EmbJopr4.ep5.el6?arch=src"
}
}
},
{
"category": "product_version",
"name": "rhq-jmx-plugin-0:3.0.0-20.EmbJopr4.ep5.el6.src",
"product": {
"name": "rhq-jmx-plugin-0:3.0.0-20.EmbJopr4.ep5.el6.src",
"product_id": "rhq-jmx-plugin-0:3.0.0-20.EmbJopr4.ep5.el6.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rhq-jmx-plugin@3.0.0-20.EmbJopr4.ep5.el6?arch=src"
}
}
},
{
"category": "product_version",
"name": "jacorb-jboss-0:2.3.1-10.patch_03.4.ep5.el6.src",
"product": {
"name": "jacorb-jboss-0:2.3.1-10.patch_03.4.ep5.el6.src",
"product_id": "jacorb-jboss-0:2.3.1-10.patch_03.4.ep5.el6.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jacorb-jboss@2.3.1-10.patch_03.4.ep5.el6?arch=src"
}
}
},
{
"category": "product_version",
"name": "jbossts-1:4.6.1-11.CP12.4.ep5.el6.src",
"product": {
"name": "jbossts-1:4.6.1-11.CP12.4.ep5.el6.src",
"product_id": "jbossts-1:4.6.1-11.CP12.4.ep5.el6.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbossts@4.6.1-11.CP12.4.ep5.el6?arch=src\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "glassfish-jsf-0:1.2_13-5_patch_01.3.ep5.el6.src",
"product": {
"name": "glassfish-jsf-0:1.2_13-5_patch_01.3.ep5.el6.src",
"product_id": "glassfish-jsf-0:1.2_13-5_patch_01.3.ep5.el6.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glassfish-jsf@1.2_13-5_patch_01.3.ep5.el6?arch=src"
}
}
},
{
"category": "product_version",
"name": "jopr-jboss-cache-v3-plugin-0:3.0.0-14.EmbJopr4.ep5.el6.src",
"product": {
"name": "jopr-jboss-cache-v3-plugin-0:3.0.0-14.EmbJopr4.ep5.el6.src",
"product_id": "jopr-jboss-cache-v3-plugin-0:3.0.0-14.EmbJopr4.ep5.el6.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jopr-jboss-cache-v3-plugin@3.0.0-14.EmbJopr4.ep5.el6?arch=src"
}
}
},
{
"category": "product_version",
"name": "jopr-embedded-0:1.3.4-18.SP5.8.ep5.el6.src",
"product": {
"name": "jopr-embedded-0:1.3.4-18.SP5.8.ep5.el6.src",
"product_id": "jopr-embedded-0:1.3.4-18.SP5.8.ep5.el6.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jopr-embedded@1.3.4-18.SP5.8.ep5.el6?arch=src"
}
}
},
{
"category": "product_version",
"name": "jbossas-ws-cxf-0:5.1.2-8.ep5.el6.src",
"product": {
"name": "jbossas-ws-cxf-0:5.1.2-8.ep5.el6.src",
"product_id": "jbossas-ws-cxf-0:5.1.2-8.ep5.el6.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbossas-ws-cxf@5.1.2-8.ep5.el6?arch=src"
}
}
},
{
"category": "product_version",
"name": "rhq-platform-plugin-0:3.0.0-13.EmbJopr4.ep5.el6.src",
"product": {
"name": "rhq-platform-plugin-0:3.0.0-13.EmbJopr4.ep5.el6.src",
"product_id": "rhq-platform-plugin-0:3.0.0-13.EmbJopr4.ep5.el6.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rhq-platform-plugin@3.0.0-13.EmbJopr4.ep5.el6?arch=src"
}
}
},
{
"category": "product_version",
"name": "jopr-hibernate-plugin-0:3.0.0-13.EmbJopr4.ep5.el6.src",
"product": {
"name": "jopr-hibernate-plugin-0:3.0.0-13.EmbJopr4.ep5.el6.src",
"product_id": "jopr-hibernate-plugin-0:3.0.0-13.EmbJopr4.ep5.el6.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jopr-hibernate-plugin@3.0.0-13.EmbJopr4.ep5.el6?arch=src"
}
}
},
{
"category": "product_version",
"name": "jopr-jboss-as-5-plugin-0:3.0.0-12.EmbJopr4.ep5.el6.src",
"product": {
"name": "jopr-jboss-as-5-plugin-0:3.0.0-12.EmbJopr4.ep5.el6.src",
"product_id": "jopr-jboss-as-5-plugin-0:3.0.0-12.EmbJopr4.ep5.el6.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jopr-jboss-as-5-plugin@3.0.0-12.EmbJopr4.ep5.el6?arch=src"
}
}
},
{
"category": "product_version",
"name": "jbossas-tp-licenses-0:5.1.2-7.ep5.el6.src",
"product": {
"name": "jbossas-tp-licenses-0:5.1.2-7.ep5.el6.src",
"product_id": "jbossas-tp-licenses-0:5.1.2-7.ep5.el6.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbossas-tp-licenses@5.1.2-7.ep5.el6?arch=src"
}
}
},
{
"category": "product_version",
"name": "jbossas-0:5.1.2-8.ep5.el6.src",
"product": {
"name": "jbossas-0:5.1.2-8.ep5.el6.src",
"product_id": "jbossas-0:5.1.2-8.ep5.el6.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbossas@5.1.2-8.ep5.el6?arch=src"
}
}
},
{
"category": "product_version",
"name": "rh-eap-docs-0:5.1.2-6.ep5.el6.src",
"product": {
"name": "rh-eap-docs-0:5.1.2-6.ep5.el6.src",
"product_id": "rh-eap-docs-0:5.1.2-6.ep5.el6.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rh-eap-docs@5.1.2-6.ep5.el6?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "jakarta-commons-logging-jboss-0:1.1-10.3_patch_02.1.ep5.el6.noarch",
"product": {
"name": "jakarta-commons-logging-jboss-0:1.1-10.3_patch_02.1.ep5.el6.noarch",
"product_id": "jakarta-commons-logging-jboss-0:1.1-10.3_patch_02.1.ep5.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jakarta-commons-logging-jboss@1.1-10.3_patch_02.1.ep5.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jboss-remoting-0:2.5.4-9.SP3.1.ep5.el6.noarch",
"product": {
"name": "jboss-remoting-0:2.5.4-9.SP3.1.ep5.el6.noarch",
"product_id": "jboss-remoting-0:2.5.4-9.SP3.1.ep5.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jboss-remoting@2.5.4-9.SP3.1.ep5.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jgroups-1:2.6.20-1.1.ep5.el6.noarch",
"product": {
"name": "jgroups-1:2.6.20-1.1.ep5.el6.noarch",
"product_id": "jgroups-1:2.6.20-1.1.ep5.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jgroups@2.6.20-1.1.ep5.el6?arch=noarch\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "mod_cluster-tomcat6-0:1.0.10-3.2.GA_CP02.ep5.el6.noarch",
"product": {
"name": "mod_cluster-tomcat6-0:1.0.10-3.2.GA_CP02.ep5.el6.noarch",
"product_id": "mod_cluster-tomcat6-0:1.0.10-3.2.GA_CP02.ep5.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_cluster-tomcat6@1.0.10-3.2.GA_CP02.ep5.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "mod_cluster-demo-0:1.0.10-3.2.GA_CP02.ep5.el6.noarch",
"product": {
"name": "mod_cluster-demo-0:1.0.10-3.2.GA_CP02.ep5.el6.noarch",
"product_id": "mod_cluster-demo-0:1.0.10-3.2.GA_CP02.ep5.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_cluster-demo@1.0.10-3.2.GA_CP02.ep5.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "mod_cluster-jbossweb2-0:1.0.10-3.2.GA_CP02.ep5.el6.noarch",
"product": {
"name": "mod_cluster-jbossweb2-0:1.0.10-3.2.GA_CP02.ep5.el6.noarch",
"product_id": "mod_cluster-jbossweb2-0:1.0.10-3.2.GA_CP02.ep5.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_cluster-jbossweb2@1.0.10-3.2.GA_CP02.ep5.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "mod_cluster-jbossas-0:1.0.10-3.2.GA_CP02.ep5.el6.noarch",
"product": {
"name": "mod_cluster-jbossas-0:1.0.10-3.2.GA_CP02.ep5.el6.noarch",
"product_id": "mod_cluster-jbossas-0:1.0.10-3.2.GA_CP02.ep5.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_cluster-jbossas@1.0.10-3.2.GA_CP02.ep5.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jboss-ejb3-core-0:1.3.8-0.1.ep5.el6.noarch",
"product": {
"name": "jboss-ejb3-core-0:1.3.8-0.1.ep5.el6.noarch",
"product_id": "jboss-ejb3-core-0:1.3.8-0.1.ep5.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jboss-ejb3-core@1.3.8-0.1.ep5.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jboss-ejb3-proxy-impl-0:1.0.6-2.SP2.1.ep5.el6.noarch",
"product": {
"name": "jboss-ejb3-proxy-impl-0:1.0.6-2.SP2.1.ep5.el6.noarch",
"product_id": "jboss-ejb3-proxy-impl-0:1.0.6-2.SP2.1.ep5.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jboss-ejb3-proxy-impl@1.0.6-2.SP2.1.ep5.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "apache-cxf-0:2.2.12-4.patch_02.1.ep5.el6.noarch",
"product": {
"name": "apache-cxf-0:2.2.12-4.patch_02.1.ep5.el6.noarch",
"product_id": "apache-cxf-0:2.2.12-4.patch_02.1.ep5.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/apache-cxf@2.2.12-4.patch_02.1.ep5.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jboss-security-spi-1:2.0.4-6.SP8.1.ep5.el6.noarch",
"product": {
"name": "jboss-security-spi-1:2.0.4-6.SP8.1.ep5.el6.noarch",
"product_id": "jboss-security-spi-1:2.0.4-6.SP8.1.ep5.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jboss-security-spi@2.0.4-6.SP8.1.ep5.el6?arch=noarch\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "jboss-cache-core-0:3.2.8-1.ep5.el6.noarch",
"product": {
"name": "jboss-cache-core-0:3.2.8-1.ep5.el6.noarch",
"product_id": "jboss-cache-core-0:3.2.8-1.ep5.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jboss-cache-core@3.2.8-1.ep5.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jboss-cl-0:2.0.10-1.2.ep5.el6.noarch",
"product": {
"name": "jboss-cl-0:2.0.10-1.2.ep5.el6.noarch",
"product_id": "jboss-cl-0:2.0.10-1.2.ep5.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jboss-cl@2.0.10-1.2.ep5.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "glassfish-jaxb-0:2.1.12-10_patch_02.ep5.el6.noarch",
"product": {
"name": "glassfish-jaxb-0:2.1.12-10_patch_02.ep5.el6.noarch",
"product_id": "glassfish-jaxb-0:2.1.12-10_patch_02.ep5.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glassfish-jaxb@2.1.12-10_patch_02.ep5.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jbossws-spi-0:1.1.2-5.SP7.1.ep5.el6.noarch",
"product": {
"name": "jbossws-spi-0:1.1.2-5.SP7.1.ep5.el6.noarch",
"product_id": "jbossws-spi-0:1.1.2-5.SP7.1.ep5.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbossws-spi@1.1.2-5.SP7.1.ep5.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "slf4j-0:1.5.8-10_patch_01.2.ep5.el6.noarch",
"product": {
"name": "slf4j-0:1.5.8-10_patch_01.2.ep5.el6.noarch",
"product_id": "slf4j-0:1.5.8-10_patch_01.2.ep5.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/slf4j@1.5.8-10_patch_01.2.ep5.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jbossws-framework-0:3.1.2-6.SP10.1.ep5.el6.noarch",
"product": {
"name": "jbossws-framework-0:3.1.2-6.SP10.1.ep5.el6.noarch",
"product_id": "jbossws-framework-0:3.1.2-6.SP10.1.ep5.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbossws-framework@3.1.2-6.SP10.1.ep5.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jboss-aop2-0:2.1.6-2.CP03.1.1.ep5.el6.noarch",
"product": {
"name": "jboss-aop2-0:2.1.6-2.CP03.1.1.ep5.el6.noarch",
"product_id": "jboss-aop2-0:2.1.6-2.CP03.1.1.ep5.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jboss-aop2@2.1.6-2.CP03.1.1.ep5.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "xalan-j2-0:2.7.1-6_patch_05.1.ep5.el6.noarch",
"product": {
"name": "xalan-j2-0:2.7.1-6_patch_05.1.ep5.el6.noarch",
"product_id": "xalan-j2-0:2.7.1-6_patch_05.1.ep5.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xalan-j2@2.7.1-6_patch_05.1.ep5.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jbosssx2-0:2.0.4-6.SP8.2.ep5.el6.noarch",
"product": {
"name": "jbosssx2-0:2.0.4-6.SP8.2.ep5.el6.noarch",
"product_id": "jbosssx2-0:2.0.4-6.SP8.2.ep5.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbosssx2@2.0.4-6.SP8.2.ep5.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jbossws-common-0:1.1.0-6.SP8_patch_01.1.ep5.el6.noarch",
"product": {
"name": "jbossws-common-0:1.1.0-6.SP8_patch_01.1.ep5.el6.noarch",
"product_id": "jbossws-common-0:1.1.0-6.SP8_patch_01.1.ep5.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbossws-common@1.1.0-6.SP8_patch_01.1.ep5.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jboss-common-core-0:2.2.18-1.1.ep5.el6.noarch",
"product": {
"name": "jboss-common-core-0:2.2.18-1.1.ep5.el6.noarch",
"product_id": "jboss-common-core-0:2.2.18-1.1.ep5.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jboss-common-core@2.2.18-1.1.ep5.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jboss-cluster-ha-client-0:1.1.4-1.1.ep5.el6.noarch",
"product": {
"name": "jboss-cluster-ha-client-0:1.1.4-1.1.ep5.el6.noarch",
"product_id": "jboss-cluster-ha-client-0:1.1.4-1.1.ep5.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jboss-cluster-ha-client@1.1.4-1.1.ep5.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jbossweb-el-1.0-api-0:2.1.12-1.4_patch_01.ep5.el6.noarch",
"product": {
"name": "jbossweb-el-1.0-api-0:2.1.12-1.4_patch_01.ep5.el6.noarch",
"product_id": "jbossweb-el-1.0-api-0:2.1.12-1.4_patch_01.ep5.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbossweb-el-1.0-api@2.1.12-1.4_patch_01.ep5.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jbossweb-lib-0:2.1.12-1.4_patch_01.ep5.el6.noarch",
"product": {
"name": "jbossweb-lib-0:2.1.12-1.4_patch_01.ep5.el6.noarch",
"product_id": "jbossweb-lib-0:2.1.12-1.4_patch_01.ep5.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbossweb-lib@2.1.12-1.4_patch_01.ep5.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jbossweb-0:2.1.12-1.4_patch_01.ep5.el6.noarch",
"product": {
"name": "jbossweb-0:2.1.12-1.4_patch_01.ep5.el6.noarch",
"product_id": "jbossweb-0:2.1.12-1.4_patch_01.ep5.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbossweb@2.1.12-1.4_patch_01.ep5.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jbossweb-servlet-2.5-api-0:2.1.12-1.4_patch_01.ep5.el6.noarch",
"product": {
"name": "jbossweb-servlet-2.5-api-0:2.1.12-1.4_patch_01.ep5.el6.noarch",
"product_id": "jbossweb-servlet-2.5-api-0:2.1.12-1.4_patch_01.ep5.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbossweb-servlet-2.5-api@2.1.12-1.4_patch_01.ep5.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jbossweb-jsp-2.1-api-0:2.1.12-1.4_patch_01.ep5.el6.noarch",
"product": {
"name": "jbossweb-jsp-2.1-api-0:2.1.12-1.4_patch_01.ep5.el6.noarch",
"product_id": "jbossweb-jsp-2.1-api-0:2.1.12-1.4_patch_01.ep5.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbossweb-jsp-2.1-api@2.1.12-1.4_patch_01.ep5.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jboss-ejb3-proxy-clustered-0:1.0.3-2.SP1.1.ep5.el6.noarch",
"product": {
"name": "jboss-ejb3-proxy-clustered-0:1.0.3-2.SP1.1.ep5.el6.noarch",
"product_id": "jboss-ejb3-proxy-clustered-0:1.0.3-2.SP1.1.ep5.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jboss-ejb3-proxy-clustered@1.0.3-2.SP1.1.ep5.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "facelets-0:1.1.15-3.B1_patch_01.2.ep5.el6.noarch",
"product": {
"name": "facelets-0:1.1.15-3.B1_patch_01.2.ep5.el6.noarch",
"product_id": "facelets-0:1.1.15-3.B1_patch_01.2.ep5.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/facelets@1.1.15-3.B1_patch_01.2.ep5.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "resteasy-javadoc-0:1.2.1-9.CP02.5.ep5.el6.noarch",
"product": {
"name": "resteasy-javadoc-0:1.2.1-9.CP02.5.ep5.el6.noarch",
"product_id": "resteasy-javadoc-0:1.2.1-9.CP02.5.ep5.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/resteasy-javadoc@1.2.1-9.CP02.5.ep5.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "resteasy-manual-0:1.2.1-9.CP02.5.ep5.el6.noarch",
"product": {
"name": "resteasy-manual-0:1.2.1-9.CP02.5.ep5.el6.noarch",
"product_id": "resteasy-manual-0:1.2.1-9.CP02.5.ep5.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/resteasy-manual@1.2.1-9.CP02.5.ep5.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "resteasy-0:1.2.1-9.CP02.5.ep5.el6.noarch",
"product": {
"name": "resteasy-0:1.2.1-9.CP02.5.ep5.el6.noarch",
"product_id": "resteasy-0:1.2.1-9.CP02.5.ep5.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/resteasy@1.2.1-9.CP02.5.ep5.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "resteasy-examples-0:1.2.1-9.CP02.5.ep5.el6.noarch",
"product": {
"name": "resteasy-examples-0:1.2.1-9.CP02.5.ep5.el6.noarch",
"product_id": "resteasy-examples-0:1.2.1-9.CP02.5.ep5.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/resteasy-examples@1.2.1-9.CP02.5.ep5.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jboss-naming-0:5.0.3-3.CP01.3.ep5.el6.noarch",
"product": {
"name": "jboss-naming-0:5.0.3-3.CP01.3.ep5.el6.noarch",
"product_id": "jboss-naming-0:5.0.3-3.CP01.3.ep5.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jboss-naming@5.0.3-3.CP01.3.ep5.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jboss-el-0:1.0_02-0.CR6.2.ep5.el6.noarch",
"product": {
"name": "jboss-el-0:1.0_02-0.CR6.2.ep5.el6.noarch",
"product_id": "jboss-el-0:1.0_02-0.CR6.2.ep5.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jboss-el@1.0_02-0.CR6.2.ep5.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "org-mc4j-ems-0:1.2.15.1-7.ep5.el6.noarch",
"product": {
"name": "org-mc4j-ems-0:1.2.15.1-7.ep5.el6.noarch",
"product_id": "org-mc4j-ems-0:1.2.15.1-7.ep5.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/org-mc4j-ems@1.2.15.1-7.ep5.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jbossws-0:3.1.2-7.SP11.4.ep5.el6.noarch",
"product": {
"name": "jbossws-0:3.1.2-7.SP11.4.ep5.el6.noarch",
"product_id": "jbossws-0:3.1.2-7.SP11.4.ep5.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbossws@3.1.2-7.SP11.4.ep5.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jboss-seam2-0:2.2.5.EAP5-7.ep5.el6.noarch",
"product": {
"name": "jboss-seam2-0:2.2.5.EAP5-7.ep5.el6.noarch",
"product_id": "jboss-seam2-0:2.2.5.EAP5-7.ep5.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jboss-seam2@2.2.5.EAP5-7.ep5.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jboss-seam2-examples-0:2.2.5.EAP5-7.ep5.el6.noarch",
"product": {
"name": "jboss-seam2-examples-0:2.2.5.EAP5-7.ep5.el6.noarch",
"product_id": "jboss-seam2-examples-0:2.2.5.EAP5-7.ep5.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jboss-seam2-examples@2.2.5.EAP5-7.ep5.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jboss-seam2-docs-0:2.2.5.EAP5-7.ep5.el6.noarch",
"product": {
"name": "jboss-seam2-docs-0:2.2.5.EAP5-7.ep5.el6.noarch",
"product_id": "jboss-seam2-docs-0:2.2.5.EAP5-7.ep5.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jboss-seam2-docs@2.2.5.EAP5-7.ep5.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jboss-seam2-runtime-0:2.2.5.EAP5-7.ep5.el6.noarch",
"product": {
"name": "jboss-seam2-runtime-0:2.2.5.EAP5-7.ep5.el6.noarch",
"product_id": "jboss-seam2-runtime-0:2.2.5.EAP5-7.ep5.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jboss-seam2-runtime@2.2.5.EAP5-7.ep5.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "picketlink-federation-webapp-sts-0:2.0.2-1.ep5.el6.noarch",
"product": {
"name": "picketlink-federation-webapp-sts-0:2.0.2-1.ep5.el6.noarch",
"product_id": "picketlink-federation-webapp-sts-0:2.0.2-1.ep5.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/picketlink-federation-webapp-sts@2.0.2-1.ep5.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "picketlink-federation-webapp-idp-0:2.0.2-1.ep5.el6.noarch",
"product": {
"name": "picketlink-federation-webapp-idp-0:2.0.2-1.ep5.el6.noarch",
"product_id": "picketlink-federation-webapp-idp-0:2.0.2-1.ep5.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/picketlink-federation-webapp-idp@2.0.2-1.ep5.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "picketlink-federation-0:2.0.2-1.ep5.el6.noarch",
"product": {
"name": "picketlink-federation-0:2.0.2-1.ep5.el6.noarch",
"product_id": "picketlink-federation-0:2.0.2-1.ep5.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/picketlink-federation@2.0.2-1.ep5.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "picketlink-federation-webapp-pdp-0:2.0.2-1.ep5.el6.noarch",
"product": {
"name": "picketlink-federation-webapp-pdp-0:2.0.2-1.ep5.el6.noarch",
"product_id": "picketlink-federation-webapp-pdp-0:2.0.2-1.ep5.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/picketlink-federation-webapp-pdp@2.0.2-1.ep5.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "cglib-0:2.2-5.5.ep5.el6.noarch",
"product": {
"name": "cglib-0:2.2-5.5.ep5.el6.noarch",
"product_id": "cglib-0:2.2-5.5.ep5.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cglib@2.2-5.5.ep5.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jboss-messaging-0:1.4.8-9.SP5.1.ep5.el6.noarch",
"product": {
"name": "jboss-messaging-0:1.4.8-9.SP5.1.ep5.el6.noarch",
"product_id": "jboss-messaging-0:1.4.8-9.SP5.1.ep5.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jboss-messaging@1.4.8-9.SP5.1.ep5.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "rhq-core-domain-0:3.0.0-20.EmbJopr4.ep5.el6.noarch",
"product": {
"name": "rhq-core-domain-0:3.0.0-20.EmbJopr4.ep5.el6.noarch",
"product_id": "rhq-core-domain-0:3.0.0-20.EmbJopr4.ep5.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rhq-core-domain@3.0.0-20.EmbJopr4.ep5.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "rhq-core-plugin-container-0:3.0.0-20.EmbJopr4.ep5.el6.noarch",
"product": {
"name": "rhq-core-plugin-container-0:3.0.0-20.EmbJopr4.ep5.el6.noarch",
"product_id": "rhq-core-plugin-container-0:3.0.0-20.EmbJopr4.ep5.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rhq-core-plugin-container@3.0.0-20.EmbJopr4.ep5.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "rhq-plugin-validator-0:3.0.0-20.EmbJopr4.ep5.el6.noarch",
"product": {
"name": "rhq-plugin-validator-0:3.0.0-20.EmbJopr4.ep5.el6.noarch",
"product_id": "rhq-plugin-validator-0:3.0.0-20.EmbJopr4.ep5.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rhq-plugin-validator@3.0.0-20.EmbJopr4.ep5.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "rhq-core-comm-api-0:3.0.0-20.EmbJopr4.ep5.el6.noarch",
"product": {
"name": "rhq-core-comm-api-0:3.0.0-20.EmbJopr4.ep5.el6.noarch",
"product_id": "rhq-core-comm-api-0:3.0.0-20.EmbJopr4.ep5.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rhq-core-comm-api@3.0.0-20.EmbJopr4.ep5.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "rhq-common-parent-0:3.0.0-20.EmbJopr4.ep5.el6.noarch",
"product": {
"name": "rhq-common-parent-0:3.0.0-20.EmbJopr4.ep5.el6.noarch",
"product_id": "rhq-common-parent-0:3.0.0-20.EmbJopr4.ep5.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rhq-common-parent@3.0.0-20.EmbJopr4.ep5.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "rhq-parent-0:3.0.0-20.EmbJopr4.ep5.el6.noarch",
"product": {
"name": "rhq-parent-0:3.0.0-20.EmbJopr4.ep5.el6.noarch",
"product_id": "rhq-parent-0:3.0.0-20.EmbJopr4.ep5.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rhq-parent@3.0.0-20.EmbJopr4.ep5.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "rhq-jboss-as-common-0:3.0.0-20.EmbJopr4.ep5.el6.noarch",
"product": {
"name": "rhq-jboss-as-common-0:3.0.0-20.EmbJopr4.ep5.el6.noarch",
"product_id": "rhq-jboss-as-common-0:3.0.0-20.EmbJopr4.ep5.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rhq-jboss-as-common@3.0.0-20.EmbJopr4.ep5.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "rhq-helpers-0:3.0.0-20.EmbJopr4.ep5.el6.noarch",
"product": {
"name": "rhq-helpers-0:3.0.0-20.EmbJopr4.ep5.el6.noarch",
"product_id": "rhq-helpers-0:3.0.0-20.EmbJopr4.ep5.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rhq-helpers@3.0.0-20.EmbJopr4.ep5.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "rhq-core-util-0:3.0.0-20.EmbJopr4.ep5.el6.noarch",
"product": {
"name": "rhq-core-util-0:3.0.0-20.EmbJopr4.ep5.el6.noarch",
"product_id": "rhq-core-util-0:3.0.0-20.EmbJopr4.ep5.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rhq-core-util@3.0.0-20.EmbJopr4.ep5.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "rhq-ant-bundle-common-0:3.0.0-20.EmbJopr4.ep5.el6.noarch",
"product": {
"name": "rhq-ant-bundle-common-0:3.0.0-20.EmbJopr4.ep5.el6.noarch",
"product_id": "rhq-ant-bundle-common-0:3.0.0-20.EmbJopr4.ep5.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rhq-ant-bundle-common@3.0.0-20.EmbJopr4.ep5.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "rhq-0:3.0.0-20.EmbJopr4.ep5.el6.noarch",
"product": {
"name": "rhq-0:3.0.0-20.EmbJopr4.ep5.el6.noarch",
"product_id": "rhq-0:3.0.0-20.EmbJopr4.ep5.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rhq@3.0.0-20.EmbJopr4.ep5.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "rhq-core-gui-0:3.0.0-20.EmbJopr4.ep5.el6.noarch",
"product": {
"name": "rhq-core-gui-0:3.0.0-20.EmbJopr4.ep5.el6.noarch",
"product_id": "rhq-core-gui-0:3.0.0-20.EmbJopr4.ep5.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rhq-core-gui@3.0.0-20.EmbJopr4.ep5.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "rhq-pluginAnnotations-0:3.0.0-20.EmbJopr4.ep5.el6.noarch",
"product": {
"name": "rhq-pluginAnnotations-0:3.0.0-20.EmbJopr4.ep5.el6.noarch",
"product_id": "rhq-pluginAnnotations-0:3.0.0-20.EmbJopr4.ep5.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rhq-pluginAnnotations@3.0.0-20.EmbJopr4.ep5.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "rhq-core-native-system-0:3.0.0-20.EmbJopr4.ep5.el6.noarch",
"product": {
"name": "rhq-core-native-system-0:3.0.0-20.EmbJopr4.ep5.el6.noarch",
"product_id": "rhq-core-native-system-0:3.0.0-20.EmbJopr4.ep5.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rhq-core-native-system@3.0.0-20.EmbJopr4.ep5.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "rhq-core-plugin-api-0:3.0.0-20.EmbJopr4.ep5.el6.noarch",
"product": {
"name": "rhq-core-plugin-api-0:3.0.0-20.EmbJopr4.ep5.el6.noarch",
"product_id": "rhq-core-plugin-api-0:3.0.0-20.EmbJopr4.ep5.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rhq-core-plugin-api@3.0.0-20.EmbJopr4.ep5.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "rhq-core-parent-0:3.0.0-20.EmbJopr4.ep5.el6.noarch",
"product": {
"name": "rhq-core-parent-0:3.0.0-20.EmbJopr4.ep5.el6.noarch",
"product_id": "rhq-core-parent-0:3.0.0-20.EmbJopr4.ep5.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rhq-core-parent@3.0.0-20.EmbJopr4.ep5.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "rhq-filetemplate-bundle-common-0:3.0.0-20.EmbJopr4.ep5.el6.noarch",
"product": {
"name": "rhq-filetemplate-bundle-common-0:3.0.0-20.EmbJopr4.ep5.el6.noarch",
"product_id": "rhq-filetemplate-bundle-common-0:3.0.0-20.EmbJopr4.ep5.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rhq-filetemplate-bundle-common@3.0.0-20.EmbJopr4.ep5.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "rhq-pluginGen-0:3.0.0-20.EmbJopr4.ep5.el6.noarch",
"product": {
"name": "rhq-pluginGen-0:3.0.0-20.EmbJopr4.ep5.el6.noarch",
"product_id": "rhq-pluginGen-0:3.0.0-20.EmbJopr4.ep5.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rhq-pluginGen@3.0.0-20.EmbJopr4.ep5.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "rhq-rtfilter-0:3.0.0-20.EmbJopr4.ep5.el6.noarch",
"product": {
"name": "rhq-rtfilter-0:3.0.0-20.EmbJopr4.ep5.el6.noarch",
"product_id": "rhq-rtfilter-0:3.0.0-20.EmbJopr4.ep5.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rhq-rtfilter@3.0.0-20.EmbJopr4.ep5.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "rhq-modules-parent-0:3.0.0-20.EmbJopr4.ep5.el6.noarch",
"product": {
"name": "rhq-modules-parent-0:3.0.0-20.EmbJopr4.ep5.el6.noarch",
"product_id": "rhq-modules-parent-0:3.0.0-20.EmbJopr4.ep5.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rhq-modules-parent@3.0.0-20.EmbJopr4.ep5.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "rhq-core-dbutils-0:3.0.0-20.EmbJopr4.ep5.el6.noarch",
"product": {
"name": "rhq-core-dbutils-0:3.0.0-20.EmbJopr4.ep5.el6.noarch",
"product_id": "rhq-core-dbutils-0:3.0.0-20.EmbJopr4.ep5.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rhq-core-dbutils@3.0.0-20.EmbJopr4.ep5.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "rhq-plugins-parent-0:3.0.0-20.EmbJopr4.ep5.el6.noarch",
"product": {
"name": "rhq-plugins-parent-0:3.0.0-20.EmbJopr4.ep5.el6.noarch",
"product_id": "rhq-plugins-parent-0:3.0.0-20.EmbJopr4.ep5.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rhq-plugins-parent@3.0.0-20.EmbJopr4.ep5.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "rhq-core-plugindoc-0:3.0.0-20.EmbJopr4.ep5.el6.noarch",
"product": {
"name": "rhq-core-plugindoc-0:3.0.0-20.EmbJopr4.ep5.el6.noarch",
"product_id": "rhq-core-plugindoc-0:3.0.0-20.EmbJopr4.ep5.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rhq-core-plugindoc@3.0.0-20.EmbJopr4.ep5.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "rhq-core-client-api-0:3.0.0-20.EmbJopr4.ep5.el6.noarch",
"product": {
"name": "rhq-core-client-api-0:3.0.0-20.EmbJopr4.ep5.el6.noarch",
"product_id": "rhq-core-client-api-0:3.0.0-20.EmbJopr4.ep5.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rhq-core-client-api@3.0.0-20.EmbJopr4.ep5.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "rhq-jmx-plugin-0:3.0.0-20.EmbJopr4.ep5.el6.noarch",
"product": {
"name": "rhq-jmx-plugin-0:3.0.0-20.EmbJopr4.ep5.el6.noarch",
"product_id": "rhq-jmx-plugin-0:3.0.0-20.EmbJopr4.ep5.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rhq-jmx-plugin@3.0.0-20.EmbJopr4.ep5.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jacorb-jboss-0:2.3.1-10.patch_03.4.ep5.el6.noarch",
"product": {
"name": "jacorb-jboss-0:2.3.1-10.patch_03.4.ep5.el6.noarch",
"product_id": "jacorb-jboss-0:2.3.1-10.patch_03.4.ep5.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jacorb-jboss@2.3.1-10.patch_03.4.ep5.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jbossts-javadoc-1:4.6.1-11.CP12.4.ep5.el6.noarch",
"product": {
"name": "jbossts-javadoc-1:4.6.1-11.CP12.4.ep5.el6.noarch",
"product_id": "jbossts-javadoc-1:4.6.1-11.CP12.4.ep5.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbossts-javadoc@4.6.1-11.CP12.4.ep5.el6?arch=noarch\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "jbossts-1:4.6.1-11.CP12.4.ep5.el6.noarch",
"product": {
"name": "jbossts-1:4.6.1-11.CP12.4.ep5.el6.noarch",
"product_id": "jbossts-1:4.6.1-11.CP12.4.ep5.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbossts@4.6.1-11.CP12.4.ep5.el6?arch=noarch\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "glassfish-jsf-0:1.2_13-5_patch_01.3.ep5.el6.noarch",
"product": {
"name": "glassfish-jsf-0:1.2_13-5_patch_01.3.ep5.el6.noarch",
"product_id": "glassfish-jsf-0:1.2_13-5_patch_01.3.ep5.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glassfish-jsf@1.2_13-5_patch_01.3.ep5.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jopr-jboss-cache-v3-plugin-0:3.0.0-14.EmbJopr4.ep5.el6.noarch",
"product": {
"name": "jopr-jboss-cache-v3-plugin-0:3.0.0-14.EmbJopr4.ep5.el6.noarch",
"product_id": "jopr-jboss-cache-v3-plugin-0:3.0.0-14.EmbJopr4.ep5.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jopr-jboss-cache-v3-plugin@3.0.0-14.EmbJopr4.ep5.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jopr-embedded-0:1.3.4-18.SP5.8.ep5.el6.noarch",
"product": {
"name": "jopr-embedded-0:1.3.4-18.SP5.8.ep5.el6.noarch",
"product_id": "jopr-embedded-0:1.3.4-18.SP5.8.ep5.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jopr-embedded@1.3.4-18.SP5.8.ep5.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jbossas-ws-cxf-0:5.1.2-8.ep5.el6.noarch",
"product": {
"name": "jbossas-ws-cxf-0:5.1.2-8.ep5.el6.noarch",
"product_id": "jbossas-ws-cxf-0:5.1.2-8.ep5.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbossas-ws-cxf@5.1.2-8.ep5.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "rhq-platform-plugin-0:3.0.0-13.EmbJopr4.ep5.el6.noarch",
"product": {
"name": "rhq-platform-plugin-0:3.0.0-13.EmbJopr4.ep5.el6.noarch",
"product_id": "rhq-platform-plugin-0:3.0.0-13.EmbJopr4.ep5.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rhq-platform-plugin@3.0.0-13.EmbJopr4.ep5.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jopr-hibernate-plugin-0:3.0.0-13.EmbJopr4.ep5.el6.noarch",
"product": {
"name": "jopr-hibernate-plugin-0:3.0.0-13.EmbJopr4.ep5.el6.noarch",
"product_id": "jopr-hibernate-plugin-0:3.0.0-13.EmbJopr4.ep5.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jopr-hibernate-plugin@3.0.0-13.EmbJopr4.ep5.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jopr-jboss-as-5-plugin-0:3.0.0-12.EmbJopr4.ep5.el6.noarch",
"product": {
"name": "jopr-jboss-as-5-plugin-0:3.0.0-12.EmbJopr4.ep5.el6.noarch",
"product_id": "jopr-jboss-as-5-plugin-0:3.0.0-12.EmbJopr4.ep5.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jopr-jboss-as-5-plugin@3.0.0-12.EmbJopr4.ep5.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jbossas-tp-licenses-0:5.1.2-7.ep5.el6.noarch",
"product": {
"name": "jbossas-tp-licenses-0:5.1.2-7.ep5.el6.noarch",
"product_id": "jbossas-tp-licenses-0:5.1.2-7.ep5.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbossas-tp-licenses@5.1.2-7.ep5.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jbossas-0:5.1.2-8.ep5.el6.noarch",
"product": {
"name": "jbossas-0:5.1.2-8.ep5.el6.noarch",
"product_id": "jbossas-0:5.1.2-8.ep5.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbossas@5.1.2-8.ep5.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jbossas-messaging-0:5.1.2-8.ep5.el6.noarch",
"product": {
"name": "jbossas-messaging-0:5.1.2-8.ep5.el6.noarch",
"product_id": "jbossas-messaging-0:5.1.2-8.ep5.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbossas-messaging@5.1.2-8.ep5.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jbossas-ws-native-0:5.1.2-8.ep5.el6.noarch",
"product": {
"name": "jbossas-ws-native-0:5.1.2-8.ep5.el6.noarch",
"product_id": "jbossas-ws-native-0:5.1.2-8.ep5.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbossas-ws-native@5.1.2-8.ep5.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jbossas-client-0:5.1.2-8.ep5.el6.noarch",
"product": {
"name": "jbossas-client-0:5.1.2-8.ep5.el6.noarch",
"product_id": "jbossas-client-0:5.1.2-8.ep5.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbossas-client@5.1.2-8.ep5.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "rh-eap-docs-0:5.1.2-6.ep5.el6.noarch",
"product": {
"name": "rh-eap-docs-0:5.1.2-6.ep5.el6.noarch",
"product_id": "rh-eap-docs-0:5.1.2-6.ep5.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rh-eap-docs@5.1.2-6.ep5.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "rh-eap-docs-examples-0:5.1.2-6.ep5.el6.noarch",
"product": {
"name": "rh-eap-docs-examples-0:5.1.2-6.ep5.el6.noarch",
"product_id": "rh-eap-docs-examples-0:5.1.2-6.ep5.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rh-eap-docs-examples@5.1.2-6.ep5.el6?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "mod_cluster-native-0:1.0.10-3.1.1.GA_CP02.ep5.el6.i386",
"product": {
"name": "mod_cluster-native-0:1.0.10-3.1.1.GA_CP02.ep5.el6.i386",
"product_id": "mod_cluster-native-0:1.0.10-3.1.1.GA_CP02.ep5.el6.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_cluster-native@1.0.10-3.1.1.GA_CP02.ep5.el6?arch=i386"
}
}
},
{
"category": "product_version",
"name": "jboss-eap5-native-0:5.1.2-1.4.ep5.el6.i386",
"product": {
"name": "jboss-eap5-native-0:5.1.2-1.4.ep5.el6.i386",
"product_id": "jboss-eap5-native-0:5.1.2-1.4.ep5.el6.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jboss-eap5-native@5.1.2-1.4.ep5.el6?arch=i386"
}
}
}
],
"category": "architecture",
"name": "i386"
},
{
"branches": [
{
"category": "product_version",
"name": "mod_cluster-native-0:1.0.10-3.1.1.GA_CP02.ep5.el6.x86_64",
"product": {
"name": "mod_cluster-native-0:1.0.10-3.1.1.GA_CP02.ep5.el6.x86_64",
"product_id": "mod_cluster-native-0:1.0.10-3.1.1.GA_CP02.ep5.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_cluster-native@1.0.10-3.1.1.GA_CP02.ep5.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jboss-eap5-native-0:5.1.2-1.4.ep5.el6.x86_64",
"product": {
"name": "jboss-eap5-native-0:5.1.2-1.4.ep5.el6.x86_64",
"product_id": "jboss-eap5-native-0:5.1.2-1.4.ep5.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jboss-eap5-native@5.1.2-1.4.ep5.el6?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "apache-cxf-0:2.2.12-4.patch_02.1.ep5.el6.noarch as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 6 Server",
"product_id": "6Server-JBEAP-5:apache-cxf-0:2.2.12-4.patch_02.1.ep5.el6.noarch"
},
"product_reference": "apache-cxf-0:2.2.12-4.patch_02.1.ep5.el6.noarch",
"relates_to_product_reference": "6Server-JBEAP-5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache-cxf-0:2.2.12-4.patch_02.1.ep5.el6.src as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 6 Server",
"product_id": "6Server-JBEAP-5:apache-cxf-0:2.2.12-4.patch_02.1.ep5.el6.src"
},
"product_reference": "apache-cxf-0:2.2.12-4.patch_02.1.ep5.el6.src",
"relates_to_product_reference": "6Server-JBEAP-5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cglib-0:2.2-5.5.ep5.el6.noarch as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 6 Server",
"product_id": "6Server-JBEAP-5:cglib-0:2.2-5.5.ep5.el6.noarch"
},
"product_reference": "cglib-0:2.2-5.5.ep5.el6.noarch",
"relates_to_product_reference": "6Server-JBEAP-5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cglib-0:2.2-5.5.ep5.el6.src as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 6 Server",
"product_id": "6Server-JBEAP-5:cglib-0:2.2-5.5.ep5.el6.src"
},
"product_reference": "cglib-0:2.2-5.5.ep5.el6.src",
"relates_to_product_reference": "6Server-JBEAP-5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "facelets-0:1.1.15-3.B1_patch_01.2.ep5.el6.noarch as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 6 Server",
"product_id": "6Server-JBEAP-5:facelets-0:1.1.15-3.B1_patch_01.2.ep5.el6.noarch"
},
"product_reference": "facelets-0:1.1.15-3.B1_patch_01.2.ep5.el6.noarch",
"relates_to_product_reference": "6Server-JBEAP-5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "facelets-0:1.1.15-3.B1_patch_01.2.ep5.el6.src as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 6 Server",
"product_id": "6Server-JBEAP-5:facelets-0:1.1.15-3.B1_patch_01.2.ep5.el6.src"
},
"product_reference": "facelets-0:1.1.15-3.B1_patch_01.2.ep5.el6.src",
"relates_to_product_reference": "6Server-JBEAP-5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-jaxb-0:2.1.12-10_patch_02.ep5.el6.noarch as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 6 Server",
"product_id": "6Server-JBEAP-5:glassfish-jaxb-0:2.1.12-10_patch_02.ep5.el6.noarch"
},
"product_reference": "glassfish-jaxb-0:2.1.12-10_patch_02.ep5.el6.noarch",
"relates_to_product_reference": "6Server-JBEAP-5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-jaxb-0:2.1.12-10_patch_02.ep5.el6.src as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 6 Server",
"product_id": "6Server-JBEAP-5:glassfish-jaxb-0:2.1.12-10_patch_02.ep5.el6.src"
},
"product_reference": "glassfish-jaxb-0:2.1.12-10_patch_02.ep5.el6.src",
"relates_to_product_reference": "6Server-JBEAP-5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-jsf-0:1.2_13-5_patch_01.3.ep5.el6.noarch as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 6 Server",
"product_id": "6Server-JBEAP-5:glassfish-jsf-0:1.2_13-5_patch_01.3.ep5.el6.noarch"
},
"product_reference": "glassfish-jsf-0:1.2_13-5_patch_01.3.ep5.el6.noarch",
"relates_to_product_reference": "6Server-JBEAP-5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-jsf-0:1.2_13-5_patch_01.3.ep5.el6.src as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 6 Server",
"product_id": "6Server-JBEAP-5:glassfish-jsf-0:1.2_13-5_patch_01.3.ep5.el6.src"
},
"product_reference": "glassfish-jsf-0:1.2_13-5_patch_01.3.ep5.el6.src",
"relates_to_product_reference": "6Server-JBEAP-5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jacorb-jboss-0:2.3.1-10.patch_03.4.ep5.el6.noarch as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 6 Server",
"product_id": "6Server-JBEAP-5:jacorb-jboss-0:2.3.1-10.patch_03.4.ep5.el6.noarch"
},
"product_reference": "jacorb-jboss-0:2.3.1-10.patch_03.4.ep5.el6.noarch",
"relates_to_product_reference": "6Server-JBEAP-5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jacorb-jboss-0:2.3.1-10.patch_03.4.ep5.el6.src as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 6 Server",
"product_id": "6Server-JBEAP-5:jacorb-jboss-0:2.3.1-10.patch_03.4.ep5.el6.src"
},
"product_reference": "jacorb-jboss-0:2.3.1-10.patch_03.4.ep5.el6.src",
"relates_to_product_reference": "6Server-JBEAP-5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jakarta-commons-logging-jboss-0:1.1-10.3_patch_02.1.ep5.el6.noarch as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 6 Server",
"product_id": "6Server-JBEAP-5:jakarta-commons-logging-jboss-0:1.1-10.3_patch_02.1.ep5.el6.noarch"
},
"product_reference": "jakarta-commons-logging-jboss-0:1.1-10.3_patch_02.1.ep5.el6.noarch",
"relates_to_product_reference": "6Server-JBEAP-5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jakarta-commons-logging-jboss-0:1.1-10.3_patch_02.1.ep5.el6.src as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 6 Server",
"product_id": "6Server-JBEAP-5:jakarta-commons-logging-jboss-0:1.1-10.3_patch_02.1.ep5.el6.src"
},
"product_reference": "jakarta-commons-logging-jboss-0:1.1-10.3_patch_02.1.ep5.el6.src",
"relates_to_product_reference": "6Server-JBEAP-5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-aop2-0:2.1.6-2.CP03.1.1.ep5.el6.noarch as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 6 Server",
"product_id": "6Server-JBEAP-5:jboss-aop2-0:2.1.6-2.CP03.1.1.ep5.el6.noarch"
},
"product_reference": "jboss-aop2-0:2.1.6-2.CP03.1.1.ep5.el6.noarch",
"relates_to_product_reference": "6Server-JBEAP-5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-aop2-0:2.1.6-2.CP03.1.1.ep5.el6.src as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 6 Server",
"product_id": "6Server-JBEAP-5:jboss-aop2-0:2.1.6-2.CP03.1.1.ep5.el6.src"
},
"product_reference": "jboss-aop2-0:2.1.6-2.CP03.1.1.ep5.el6.src",
"relates_to_product_reference": "6Server-JBEAP-5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-cache-core-0:3.2.8-1.ep5.el6.noarch as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 6 Server",
"product_id": "6Server-JBEAP-5:jboss-cache-core-0:3.2.8-1.ep5.el6.noarch"
},
"product_reference": "jboss-cache-core-0:3.2.8-1.ep5.el6.noarch",
"relates_to_product_reference": "6Server-JBEAP-5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-cache-core-0:3.2.8-1.ep5.el6.src as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 6 Server",
"product_id": "6Server-JBEAP-5:jboss-cache-core-0:3.2.8-1.ep5.el6.src"
},
"product_reference": "jboss-cache-core-0:3.2.8-1.ep5.el6.src",
"relates_to_product_reference": "6Server-JBEAP-5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-cl-0:2.0.10-1.2.ep5.el6.noarch as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 6 Server",
"product_id": "6Server-JBEAP-5:jboss-cl-0:2.0.10-1.2.ep5.el6.noarch"
},
"product_reference": "jboss-cl-0:2.0.10-1.2.ep5.el6.noarch",
"relates_to_product_reference": "6Server-JBEAP-5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-cl-0:2.0.10-1.2.ep5.el6.src as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 6 Server",
"product_id": "6Server-JBEAP-5:jboss-cl-0:2.0.10-1.2.ep5.el6.src"
},
"product_reference": "jboss-cl-0:2.0.10-1.2.ep5.el6.src",
"relates_to_product_reference": "6Server-JBEAP-5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-cluster-ha-client-0:1.1.4-1.1.ep5.el6.noarch as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 6 Server",
"product_id": "6Server-JBEAP-5:jboss-cluster-ha-client-0:1.1.4-1.1.ep5.el6.noarch"
},
"product_reference": "jboss-cluster-ha-client-0:1.1.4-1.1.ep5.el6.noarch",
"relates_to_product_reference": "6Server-JBEAP-5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-cluster-ha-client-0:1.1.4-1.1.ep5.el6.src as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 6 Server",
"product_id": "6Server-JBEAP-5:jboss-cluster-ha-client-0:1.1.4-1.1.ep5.el6.src"
},
"product_reference": "jboss-cluster-ha-client-0:1.1.4-1.1.ep5.el6.src",
"relates_to_product_reference": "6Server-JBEAP-5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-common-core-0:2.2.18-1.1.ep5.el6.noarch as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 6 Server",
"product_id": "6Server-JBEAP-5:jboss-common-core-0:2.2.18-1.1.ep5.el6.noarch"
},
"product_reference": "jboss-common-core-0:2.2.18-1.1.ep5.el6.noarch",
"relates_to_product_reference": "6Server-JBEAP-5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-common-core-0:2.2.18-1.1.ep5.el6.src as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 6 Server",
"product_id": "6Server-JBEAP-5:jboss-common-core-0:2.2.18-1.1.ep5.el6.src"
},
"product_reference": "jboss-common-core-0:2.2.18-1.1.ep5.el6.src",
"relates_to_product_reference": "6Server-JBEAP-5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-eap5-native-0:5.1.2-1.4.ep5.el6.i386 as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 6 Server",
"product_id": "6Server-JBEAP-5:jboss-eap5-native-0:5.1.2-1.4.ep5.el6.i386"
},
"product_reference": "jboss-eap5-native-0:5.1.2-1.4.ep5.el6.i386",
"relates_to_product_reference": "6Server-JBEAP-5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-eap5-native-0:5.1.2-1.4.ep5.el6.src as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 6 Server",
"product_id": "6Server-JBEAP-5:jboss-eap5-native-0:5.1.2-1.4.ep5.el6.src"
},
"product_reference": "jboss-eap5-native-0:5.1.2-1.4.ep5.el6.src",
"relates_to_product_reference": "6Server-JBEAP-5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-eap5-native-0:5.1.2-1.4.ep5.el6.x86_64 as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 6 Server",
"product_id": "6Server-JBEAP-5:jboss-eap5-native-0:5.1.2-1.4.ep5.el6.x86_64"
},
"product_reference": "jboss-eap5-native-0:5.1.2-1.4.ep5.el6.x86_64",
"relates_to_product_reference": "6Server-JBEAP-5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-ejb3-core-0:1.3.8-0.1.ep5.el6.noarch as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 6 Server",
"product_id": "6Server-JBEAP-5:jboss-ejb3-core-0:1.3.8-0.1.ep5.el6.noarch"
},
"product_reference": "jboss-ejb3-core-0:1.3.8-0.1.ep5.el6.noarch",
"relates_to_product_reference": "6Server-JBEAP-5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-ejb3-core-0:1.3.8-0.1.ep5.el6.src as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 6 Server",
"product_id": "6Server-JBEAP-5:jboss-ejb3-core-0:1.3.8-0.1.ep5.el6.src"
},
"product_reference": "jboss-ejb3-core-0:1.3.8-0.1.ep5.el6.src",
"relates_to_product_reference": "6Server-JBEAP-5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-ejb3-proxy-clustered-0:1.0.3-2.SP1.1.ep5.el6.noarch as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 6 Server",
"product_id": "6Server-JBEAP-5:jboss-ejb3-proxy-clustered-0:1.0.3-2.SP1.1.ep5.el6.noarch"
},
"product_reference": "jboss-ejb3-proxy-clustered-0:1.0.3-2.SP1.1.ep5.el6.noarch",
"relates_to_product_reference": "6Server-JBEAP-5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-ejb3-proxy-clustered-0:1.0.3-2.SP1.1.ep5.el6.src as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 6 Server",
"product_id": "6Server-JBEAP-5:jboss-ejb3-proxy-clustered-0:1.0.3-2.SP1.1.ep5.el6.src"
},
"product_reference": "jboss-ejb3-proxy-clustered-0:1.0.3-2.SP1.1.ep5.el6.src",
"relates_to_product_reference": "6Server-JBEAP-5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-ejb3-proxy-impl-0:1.0.6-2.SP2.1.ep5.el6.noarch as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 6 Server",
"product_id": "6Server-JBEAP-5:jboss-ejb3-proxy-impl-0:1.0.6-2.SP2.1.ep5.el6.noarch"
},
"product_reference": "jboss-ejb3-proxy-impl-0:1.0.6-2.SP2.1.ep5.el6.noarch",
"relates_to_product_reference": "6Server-JBEAP-5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-ejb3-proxy-impl-0:1.0.6-2.SP2.1.ep5.el6.src as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 6 Server",
"product_id": "6Server-JBEAP-5:jboss-ejb3-proxy-impl-0:1.0.6-2.SP2.1.ep5.el6.src"
},
"product_reference": "jboss-ejb3-proxy-impl-0:1.0.6-2.SP2.1.ep5.el6.src",
"relates_to_product_reference": "6Server-JBEAP-5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-el-0:1.0_02-0.CR6.2.ep5.el6.noarch as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 6 Server",
"product_id": "6Server-JBEAP-5:jboss-el-0:1.0_02-0.CR6.2.ep5.el6.noarch"
},
"product_reference": "jboss-el-0:1.0_02-0.CR6.2.ep5.el6.noarch",
"relates_to_product_reference": "6Server-JBEAP-5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-el-0:1.0_02-0.CR6.2.ep5.el6.src as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 6 Server",
"product_id": "6Server-JBEAP-5:jboss-el-0:1.0_02-0.CR6.2.ep5.el6.src"
},
"product_reference": "jboss-el-0:1.0_02-0.CR6.2.ep5.el6.src",
"relates_to_product_reference": "6Server-JBEAP-5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-messaging-0:1.4.8-9.SP5.1.ep5.el6.noarch as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 6 Server",
"product_id": "6Server-JBEAP-5:jboss-messaging-0:1.4.8-9.SP5.1.ep5.el6.noarch"
},
"product_reference": "jboss-messaging-0:1.4.8-9.SP5.1.ep5.el6.noarch",
"relates_to_product_reference": "6Server-JBEAP-5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-messaging-0:1.4.8-9.SP5.1.ep5.el6.src as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 6 Server",
"product_id": "6Server-JBEAP-5:jboss-messaging-0:1.4.8-9.SP5.1.ep5.el6.src"
},
"product_reference": "jboss-messaging-0:1.4.8-9.SP5.1.ep5.el6.src",
"relates_to_product_reference": "6Server-JBEAP-5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-naming-0:5.0.3-3.CP01.3.ep5.el6.noarch as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 6 Server",
"product_id": "6Server-JBEAP-5:jboss-naming-0:5.0.3-3.CP01.3.ep5.el6.noarch"
},
"product_reference": "jboss-naming-0:5.0.3-3.CP01.3.ep5.el6.noarch",
"relates_to_product_reference": "6Server-JBEAP-5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-naming-0:5.0.3-3.CP01.3.ep5.el6.src as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 6 Server",
"product_id": "6Server-JBEAP-5:jboss-naming-0:5.0.3-3.CP01.3.ep5.el6.src"
},
"product_reference": "jboss-naming-0:5.0.3-3.CP01.3.ep5.el6.src",
"relates_to_product_reference": "6Server-JBEAP-5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-remoting-0:2.5.4-9.SP3.1.ep5.el6.noarch as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 6 Server",
"product_id": "6Server-JBEAP-5:jboss-remoting-0:2.5.4-9.SP3.1.ep5.el6.noarch"
},
"product_reference": "jboss-remoting-0:2.5.4-9.SP3.1.ep5.el6.noarch",
"relates_to_product_reference": "6Server-JBEAP-5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-remoting-0:2.5.4-9.SP3.1.ep5.el6.src as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 6 Server",
"product_id": "6Server-JBEAP-5:jboss-remoting-0:2.5.4-9.SP3.1.ep5.el6.src"
},
"product_reference": "jboss-remoting-0:2.5.4-9.SP3.1.ep5.el6.src",
"relates_to_product_reference": "6Server-JBEAP-5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-seam2-0:2.2.5.EAP5-7.ep5.el6.noarch as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 6 Server",
"product_id": "6Server-JBEAP-5:jboss-seam2-0:2.2.5.EAP5-7.ep5.el6.noarch"
},
"product_reference": "jboss-seam2-0:2.2.5.EAP5-7.ep5.el6.noarch",
"relates_to_product_reference": "6Server-JBEAP-5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-seam2-0:2.2.5.EAP5-7.ep5.el6.src as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 6 Server",
"product_id": "6Server-JBEAP-5:jboss-seam2-0:2.2.5.EAP5-7.ep5.el6.src"
},
"product_reference": "jboss-seam2-0:2.2.5.EAP5-7.ep5.el6.src",
"relates_to_product_reference": "6Server-JBEAP-5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-seam2-docs-0:2.2.5.EAP5-7.ep5.el6.noarch as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 6 Server",
"product_id": "6Server-JBEAP-5:jboss-seam2-docs-0:2.2.5.EAP5-7.ep5.el6.noarch"
},
"product_reference": "jboss-seam2-docs-0:2.2.5.EAP5-7.ep5.el6.noarch",
"relates_to_product_reference": "6Server-JBEAP-5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-seam2-examples-0:2.2.5.EAP5-7.ep5.el6.noarch as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 6 Server",
"product_id": "6Server-JBEAP-5:jboss-seam2-examples-0:2.2.5.EAP5-7.ep5.el6.noarch"
},
"product_reference": "jboss-seam2-examples-0:2.2.5.EAP5-7.ep5.el6.noarch",
"relates_to_product_reference": "6Server-JBEAP-5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-seam2-runtime-0:2.2.5.EAP5-7.ep5.el6.noarch as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 6 Server",
"product_id": "6Server-JBEAP-5:jboss-seam2-runtime-0:2.2.5.EAP5-7.ep5.el6.noarch"
},
"product_reference": "jboss-seam2-runtime-0:2.2.5.EAP5-7.ep5.el6.noarch",
"relates_to_product_reference": "6Server-JBEAP-5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-security-spi-1:2.0.4-6.SP8.1.ep5.el6.noarch as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 6 Server",
"product_id": "6Server-JBEAP-5:jboss-security-spi-1:2.0.4-6.SP8.1.ep5.el6.noarch"
},
"product_reference": "jboss-security-spi-1:2.0.4-6.SP8.1.ep5.el6.noarch",
"relates_to_product_reference": "6Server-JBEAP-5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-security-spi-1:2.0.4-6.SP8.1.ep5.el6.src as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 6 Server",
"product_id": "6Server-JBEAP-5:jboss-security-spi-1:2.0.4-6.SP8.1.ep5.el6.src"
},
"product_reference": "jboss-security-spi-1:2.0.4-6.SP8.1.ep5.el6.src",
"relates_to_product_reference": "6Server-JBEAP-5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossas-0:5.1.2-8.ep5.el6.noarch as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 6 Server",
"product_id": "6Server-JBEAP-5:jbossas-0:5.1.2-8.ep5.el6.noarch"
},
"product_reference": "jbossas-0:5.1.2-8.ep5.el6.noarch",
"relates_to_product_reference": "6Server-JBEAP-5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossas-0:5.1.2-8.ep5.el6.src as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 6 Server",
"product_id": "6Server-JBEAP-5:jbossas-0:5.1.2-8.ep5.el6.src"
},
"product_reference": "jbossas-0:5.1.2-8.ep5.el6.src",
"relates_to_product_reference": "6Server-JBEAP-5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossas-client-0:5.1.2-8.ep5.el6.noarch as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 6 Server",
"product_id": "6Server-JBEAP-5:jbossas-client-0:5.1.2-8.ep5.el6.noarch"
},
"product_reference": "jbossas-client-0:5.1.2-8.ep5.el6.noarch",
"relates_to_product_reference": "6Server-JBEAP-5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossas-messaging-0:5.1.2-8.ep5.el6.noarch as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 6 Server",
"product_id": "6Server-JBEAP-5:jbossas-messaging-0:5.1.2-8.ep5.el6.noarch"
},
"product_reference": "jbossas-messaging-0:5.1.2-8.ep5.el6.noarch",
"relates_to_product_reference": "6Server-JBEAP-5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossas-tp-licenses-0:5.1.2-7.ep5.el6.noarch as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 6 Server",
"product_id": "6Server-JBEAP-5:jbossas-tp-licenses-0:5.1.2-7.ep5.el6.noarch"
},
"product_reference": "jbossas-tp-licenses-0:5.1.2-7.ep5.el6.noarch",
"relates_to_product_reference": "6Server-JBEAP-5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossas-tp-licenses-0:5.1.2-7.ep5.el6.src as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 6 Server",
"product_id": "6Server-JBEAP-5:jbossas-tp-licenses-0:5.1.2-7.ep5.el6.src"
},
"product_reference": "jbossas-tp-licenses-0:5.1.2-7.ep5.el6.src",
"relates_to_product_reference": "6Server-JBEAP-5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossas-ws-cxf-0:5.1.2-8.ep5.el6.noarch as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 6 Server",
"product_id": "6Server-JBEAP-5:jbossas-ws-cxf-0:5.1.2-8.ep5.el6.noarch"
},
"product_reference": "jbossas-ws-cxf-0:5.1.2-8.ep5.el6.noarch",
"relates_to_product_reference": "6Server-JBEAP-5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossas-ws-cxf-0:5.1.2-8.ep5.el6.src as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 6 Server",
"product_id": "6Server-JBEAP-5:jbossas-ws-cxf-0:5.1.2-8.ep5.el6.src"
},
"product_reference": "jbossas-ws-cxf-0:5.1.2-8.ep5.el6.src",
"relates_to_product_reference": "6Server-JBEAP-5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossas-ws-native-0:5.1.2-8.ep5.el6.noarch as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 6 Server",
"product_id": "6Server-JBEAP-5:jbossas-ws-native-0:5.1.2-8.ep5.el6.noarch"
},
"product_reference": "jbossas-ws-native-0:5.1.2-8.ep5.el6.noarch",
"relates_to_product_reference": "6Server-JBEAP-5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbosssx2-0:2.0.4-6.SP8.2.ep5.el6.noarch as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 6 Server",
"product_id": "6Server-JBEAP-5:jbosssx2-0:2.0.4-6.SP8.2.ep5.el6.noarch"
},
"product_reference": "jbosssx2-0:2.0.4-6.SP8.2.ep5.el6.noarch",
"relates_to_product_reference": "6Server-JBEAP-5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbosssx2-0:2.0.4-6.SP8.2.ep5.el6.src as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 6 Server",
"product_id": "6Server-JBEAP-5:jbosssx2-0:2.0.4-6.SP8.2.ep5.el6.src"
},
"product_reference": "jbosssx2-0:2.0.4-6.SP8.2.ep5.el6.src",
"relates_to_product_reference": "6Server-JBEAP-5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossts-1:4.6.1-11.CP12.4.ep5.el6.noarch as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 6 Server",
"product_id": "6Server-JBEAP-5:jbossts-1:4.6.1-11.CP12.4.ep5.el6.noarch"
},
"product_reference": "jbossts-1:4.6.1-11.CP12.4.ep5.el6.noarch",
"relates_to_product_reference": "6Server-JBEAP-5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossts-1:4.6.1-11.CP12.4.ep5.el6.src as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 6 Server",
"product_id": "6Server-JBEAP-5:jbossts-1:4.6.1-11.CP12.4.ep5.el6.src"
},
"product_reference": "jbossts-1:4.6.1-11.CP12.4.ep5.el6.src",
"relates_to_product_reference": "6Server-JBEAP-5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossts-javadoc-1:4.6.1-11.CP12.4.ep5.el6.noarch as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 6 Server",
"product_id": "6Server-JBEAP-5:jbossts-javadoc-1:4.6.1-11.CP12.4.ep5.el6.noarch"
},
"product_reference": "jbossts-javadoc-1:4.6.1-11.CP12.4.ep5.el6.noarch",
"relates_to_product_reference": "6Server-JBEAP-5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossweb-0:2.1.12-1.4_patch_01.ep5.el6.noarch as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 6 Server",
"product_id": "6Server-JBEAP-5:jbossweb-0:2.1.12-1.4_patch_01.ep5.el6.noarch"
},
"product_reference": "jbossweb-0:2.1.12-1.4_patch_01.ep5.el6.noarch",
"relates_to_product_reference": "6Server-JBEAP-5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossweb-0:2.1.12-1.4_patch_01.ep5.el6.src as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 6 Server",
"product_id": "6Server-JBEAP-5:jbossweb-0:2.1.12-1.4_patch_01.ep5.el6.src"
},
"product_reference": "jbossweb-0:2.1.12-1.4_patch_01.ep5.el6.src",
"relates_to_product_reference": "6Server-JBEAP-5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossweb-el-1.0-api-0:2.1.12-1.4_patch_01.ep5.el6.noarch as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 6 Server",
"product_id": "6Server-JBEAP-5:jbossweb-el-1.0-api-0:2.1.12-1.4_patch_01.ep5.el6.noarch"
},
"product_reference": "jbossweb-el-1.0-api-0:2.1.12-1.4_patch_01.ep5.el6.noarch",
"relates_to_product_reference": "6Server-JBEAP-5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossweb-jsp-2.1-api-0:2.1.12-1.4_patch_01.ep5.el6.noarch as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 6 Server",
"product_id": "6Server-JBEAP-5:jbossweb-jsp-2.1-api-0:2.1.12-1.4_patch_01.ep5.el6.noarch"
},
"product_reference": "jbossweb-jsp-2.1-api-0:2.1.12-1.4_patch_01.ep5.el6.noarch",
"relates_to_product_reference": "6Server-JBEAP-5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossweb-lib-0:2.1.12-1.4_patch_01.ep5.el6.noarch as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 6 Server",
"product_id": "6Server-JBEAP-5:jbossweb-lib-0:2.1.12-1.4_patch_01.ep5.el6.noarch"
},
"product_reference": "jbossweb-lib-0:2.1.12-1.4_patch_01.ep5.el6.noarch",
"relates_to_product_reference": "6Server-JBEAP-5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossweb-servlet-2.5-api-0:2.1.12-1.4_patch_01.ep5.el6.noarch as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 6 Server",
"product_id": "6Server-JBEAP-5:jbossweb-servlet-2.5-api-0:2.1.12-1.4_patch_01.ep5.el6.noarch"
},
"product_reference": "jbossweb-servlet-2.5-api-0:2.1.12-1.4_patch_01.ep5.el6.noarch",
"relates_to_product_reference": "6Server-JBEAP-5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossws-0:3.1.2-7.SP11.4.ep5.el6.noarch as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 6 Server",
"product_id": "6Server-JBEAP-5:jbossws-0:3.1.2-7.SP11.4.ep5.el6.noarch"
},
"product_reference": "jbossws-0:3.1.2-7.SP11.4.ep5.el6.noarch",
"relates_to_product_reference": "6Server-JBEAP-5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossws-0:3.1.2-7.SP11.4.ep5.el6.src as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 6 Server",
"product_id": "6Server-JBEAP-5:jbossws-0:3.1.2-7.SP11.4.ep5.el6.src"
},
"product_reference": "jbossws-0:3.1.2-7.SP11.4.ep5.el6.src",
"relates_to_product_reference": "6Server-JBEAP-5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossws-common-0:1.1.0-6.SP8_patch_01.1.ep5.el6.noarch as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 6 Server",
"product_id": "6Server-JBEAP-5:jbossws-common-0:1.1.0-6.SP8_patch_01.1.ep5.el6.noarch"
},
"product_reference": "jbossws-common-0:1.1.0-6.SP8_patch_01.1.ep5.el6.noarch",
"relates_to_product_reference": "6Server-JBEAP-5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossws-common-0:1.1.0-6.SP8_patch_01.1.ep5.el6.src as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 6 Server",
"product_id": "6Server-JBEAP-5:jbossws-common-0:1.1.0-6.SP8_patch_01.1.ep5.el6.src"
},
"product_reference": "jbossws-common-0:1.1.0-6.SP8_patch_01.1.ep5.el6.src",
"relates_to_product_reference": "6Server-JBEAP-5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossws-framework-0:3.1.2-6.SP10.1.ep5.el6.noarch as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 6 Server",
"product_id": "6Server-JBEAP-5:jbossws-framework-0:3.1.2-6.SP10.1.ep5.el6.noarch"
},
"product_reference": "jbossws-framework-0:3.1.2-6.SP10.1.ep5.el6.noarch",
"relates_to_product_reference": "6Server-JBEAP-5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossws-framework-0:3.1.2-6.SP10.1.ep5.el6.src as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 6 Server",
"product_id": "6Server-JBEAP-5:jbossws-framework-0:3.1.2-6.SP10.1.ep5.el6.src"
},
"product_reference": "jbossws-framework-0:3.1.2-6.SP10.1.ep5.el6.src",
"relates_to_product_reference": "6Server-JBEAP-5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossws-spi-0:1.1.2-5.SP7.1.ep5.el6.noarch as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 6 Server",
"product_id": "6Server-JBEAP-5:jbossws-spi-0:1.1.2-5.SP7.1.ep5.el6.noarch"
},
"product_reference": "jbossws-spi-0:1.1.2-5.SP7.1.ep5.el6.noarch",
"relates_to_product_reference": "6Server-JBEAP-5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossws-spi-0:1.1.2-5.SP7.1.ep5.el6.src as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 6 Server",
"product_id": "6Server-JBEAP-5:jbossws-spi-0:1.1.2-5.SP7.1.ep5.el6.src"
},
"product_reference": "jbossws-spi-0:1.1.2-5.SP7.1.ep5.el6.src",
"relates_to_product_reference": "6Server-JBEAP-5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jgroups-1:2.6.20-1.1.ep5.el6.noarch as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 6 Server",
"product_id": "6Server-JBEAP-5:jgroups-1:2.6.20-1.1.ep5.el6.noarch"
},
"product_reference": "jgroups-1:2.6.20-1.1.ep5.el6.noarch",
"relates_to_product_reference": "6Server-JBEAP-5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jgroups-1:2.6.20-1.1.ep5.el6.src as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 6 Server",
"product_id": "6Server-JBEAP-5:jgroups-1:2.6.20-1.1.ep5.el6.src"
},
"product_reference": "jgroups-1:2.6.20-1.1.ep5.el6.src",
"relates_to_product_reference": "6Server-JBEAP-5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jopr-embedded-0:1.3.4-18.SP5.8.ep5.el6.noarch as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 6 Server",
"product_id": "6Server-JBEAP-5:jopr-embedded-0:1.3.4-18.SP5.8.ep5.el6.noarch"
},
"product_reference": "jopr-embedded-0:1.3.4-18.SP5.8.ep5.el6.noarch",
"relates_to_product_reference": "6Server-JBEAP-5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jopr-embedded-0:1.3.4-18.SP5.8.ep5.el6.src as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 6 Server",
"product_id": "6Server-JBEAP-5:jopr-embedded-0:1.3.4-18.SP5.8.ep5.el6.src"
},
"product_reference": "jopr-embedded-0:1.3.4-18.SP5.8.ep5.el6.src",
"relates_to_product_reference": "6Server-JBEAP-5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jopr-hibernate-plugin-0:3.0.0-13.EmbJopr4.ep5.el6.noarch as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 6 Server",
"product_id": "6Server-JBEAP-5:jopr-hibernate-plugin-0:3.0.0-13.EmbJopr4.ep5.el6.noarch"
},
"product_reference": "jopr-hibernate-plugin-0:3.0.0-13.EmbJopr4.ep5.el6.noarch",
"relates_to_product_reference": "6Server-JBEAP-5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jopr-hibernate-plugin-0:3.0.0-13.EmbJopr4.ep5.el6.src as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 6 Server",
"product_id": "6Server-JBEAP-5:jopr-hibernate-plugin-0:3.0.0-13.EmbJopr4.ep5.el6.src"
},
"product_reference": "jopr-hibernate-plugin-0:3.0.0-13.EmbJopr4.ep5.el6.src",
"relates_to_product_reference": "6Server-JBEAP-5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jopr-jboss-as-5-plugin-0:3.0.0-12.EmbJopr4.ep5.el6.noarch as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 6 Server",
"product_id": "6Server-JBEAP-5:jopr-jboss-as-5-plugin-0:3.0.0-12.EmbJopr4.ep5.el6.noarch"
},
"product_reference": "jopr-jboss-as-5-plugin-0:3.0.0-12.EmbJopr4.ep5.el6.noarch",
"relates_to_product_reference": "6Server-JBEAP-5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jopr-jboss-as-5-plugin-0:3.0.0-12.EmbJopr4.ep5.el6.src as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 6 Server",
"product_id": "6Server-JBEAP-5:jopr-jboss-as-5-plugin-0:3.0.0-12.EmbJopr4.ep5.el6.src"
},
"product_reference": "jopr-jboss-as-5-plugin-0:3.0.0-12.EmbJopr4.ep5.el6.src",
"relates_to_product_reference": "6Server-JBEAP-5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jopr-jboss-cache-v3-plugin-0:3.0.0-14.EmbJopr4.ep5.el6.noarch as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 6 Server",
"product_id": "6Server-JBEAP-5:jopr-jboss-cache-v3-plugin-0:3.0.0-14.EmbJopr4.ep5.el6.noarch"
},
"product_reference": "jopr-jboss-cache-v3-plugin-0:3.0.0-14.EmbJopr4.ep5.el6.noarch",
"relates_to_product_reference": "6Server-JBEAP-5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jopr-jboss-cache-v3-plugin-0:3.0.0-14.EmbJopr4.ep5.el6.src as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 6 Server",
"product_id": "6Server-JBEAP-5:jopr-jboss-cache-v3-plugin-0:3.0.0-14.EmbJopr4.ep5.el6.src"
},
"product_reference": "jopr-jboss-cache-v3-plugin-0:3.0.0-14.EmbJopr4.ep5.el6.src",
"relates_to_product_reference": "6Server-JBEAP-5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_cluster-0:1.0.10-3.2.GA_CP02.ep5.el6.src as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 6 Server",
"product_id": "6Server-JBEAP-5:mod_cluster-0:1.0.10-3.2.GA_CP02.ep5.el6.src"
},
"product_reference": "mod_cluster-0:1.0.10-3.2.GA_CP02.ep5.el6.src",
"relates_to_product_reference": "6Server-JBEAP-5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_cluster-demo-0:1.0.10-3.2.GA_CP02.ep5.el6.noarch as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 6 Server",
"product_id": "6Server-JBEAP-5:mod_cluster-demo-0:1.0.10-3.2.GA_CP02.ep5.el6.noarch"
},
"product_reference": "mod_cluster-demo-0:1.0.10-3.2.GA_CP02.ep5.el6.noarch",
"relates_to_product_reference": "6Server-JBEAP-5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_cluster-jbossas-0:1.0.10-3.2.GA_CP02.ep5.el6.noarch as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 6 Server",
"product_id": "6Server-JBEAP-5:mod_cluster-jbossas-0:1.0.10-3.2.GA_CP02.ep5.el6.noarch"
},
"product_reference": "mod_cluster-jbossas-0:1.0.10-3.2.GA_CP02.ep5.el6.noarch",
"relates_to_product_reference": "6Server-JBEAP-5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_cluster-jbossweb2-0:1.0.10-3.2.GA_CP02.ep5.el6.noarch as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 6 Server",
"product_id": "6Server-JBEAP-5:mod_cluster-jbossweb2-0:1.0.10-3.2.GA_CP02.ep5.el6.noarch"
},
"product_reference": "mod_cluster-jbossweb2-0:1.0.10-3.2.GA_CP02.ep5.el6.noarch",
"relates_to_product_reference": "6Server-JBEAP-5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_cluster-native-0:1.0.10-3.1.1.GA_CP02.ep5.el6.i386 as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 6 Server",
"product_id": "6Server-JBEAP-5:mod_cluster-native-0:1.0.10-3.1.1.GA_CP02.ep5.el6.i386"
},
"product_reference": "mod_cluster-native-0:1.0.10-3.1.1.GA_CP02.ep5.el6.i386",
"relates_to_product_reference": "6Server-JBEAP-5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_cluster-native-0:1.0.10-3.1.1.GA_CP02.ep5.el6.src as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 6 Server",
"product_id": "6Server-JBEAP-5:mod_cluster-native-0:1.0.10-3.1.1.GA_CP02.ep5.el6.src"
},
"product_reference": "mod_cluster-native-0:1.0.10-3.1.1.GA_CP02.ep5.el6.src",
"relates_to_product_reference": "6Server-JBEAP-5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_cluster-native-0:1.0.10-3.1.1.GA_CP02.ep5.el6.x86_64 as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 6 Server",
"product_id": "6Server-JBEAP-5:mod_cluster-native-0:1.0.10-3.1.1.GA_CP02.ep5.el6.x86_64"
},
"product_reference": "mod_cluster-native-0:1.0.10-3.1.1.GA_CP02.ep5.el6.x86_64",
"relates_to_product_reference": "6Server-JBEAP-5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_cluster-tomcat6-0:1.0.10-3.2.GA_CP02.ep5.el6.noarch as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 6 Server",
"product_id": "6Server-JBEAP-5:mod_cluster-tomcat6-0:1.0.10-3.2.GA_CP02.ep5.el6.noarch"
},
"product_reference": "mod_cluster-tomcat6-0:1.0.10-3.2.GA_CP02.ep5.el6.noarch",
"relates_to_product_reference": "6Server-JBEAP-5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "org-mc4j-ems-0:1.2.15.1-7.ep5.el6.noarch as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 6 Server",
"product_id": "6Server-JBEAP-5:org-mc4j-ems-0:1.2.15.1-7.ep5.el6.noarch"
},
"product_reference": "org-mc4j-ems-0:1.2.15.1-7.ep5.el6.noarch",
"relates_to_product_reference": "6Server-JBEAP-5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "org-mc4j-ems-0:1.2.15.1-7.ep5.el6.src as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 6 Server",
"product_id": "6Server-JBEAP-5:org-mc4j-ems-0:1.2.15.1-7.ep5.el6.src"
},
"product_reference": "org-mc4j-ems-0:1.2.15.1-7.ep5.el6.src",
"relates_to_product_reference": "6Server-JBEAP-5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "picketlink-federation-0:2.0.2-1.ep5.el6.noarch as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 6 Server",
"product_id": "6Server-JBEAP-5:picketlink-federation-0:2.0.2-1.ep5.el6.noarch"
},
"product_reference": "picketlink-federation-0:2.0.2-1.ep5.el6.noarch",
"relates_to_product_reference": "6Server-JBEAP-5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "picketlink-federation-0:2.0.2-1.ep5.el6.src as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 6 Server",
"product_id": "6Server-JBEAP-5:picketlink-federation-0:2.0.2-1.ep5.el6.src"
},
"product_reference": "picketlink-federation-0:2.0.2-1.ep5.el6.src",
"relates_to_product_reference": "6Server-JBEAP-5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "picketlink-federation-webapp-idp-0:2.0.2-1.ep5.el6.noarch as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 6 Server",
"product_id": "6Server-JBEAP-5:picketlink-federation-webapp-idp-0:2.0.2-1.ep5.el6.noarch"
},
"product_reference": "picketlink-federation-webapp-idp-0:2.0.2-1.ep5.el6.noarch",
"relates_to_product_reference": "6Server-JBEAP-5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "picketlink-federation-webapp-pdp-0:2.0.2-1.ep5.el6.noarch as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 6 Server",
"product_id": "6Server-JBEAP-5:picketlink-federation-webapp-pdp-0:2.0.2-1.ep5.el6.noarch"
},
"product_reference": "picketlink-federation-webapp-pdp-0:2.0.2-1.ep5.el6.noarch",
"relates_to_product_reference": "6Server-JBEAP-5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "picketlink-federation-webapp-sts-0:2.0.2-1.ep5.el6.noarch as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 6 Server",
"product_id": "6Server-JBEAP-5:picketlink-federation-webapp-sts-0:2.0.2-1.ep5.el6.noarch"
},
"product_reference": "picketlink-federation-webapp-sts-0:2.0.2-1.ep5.el6.noarch",
"relates_to_product_reference": "6Server-JBEAP-5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "resteasy-0:1.2.1-9.CP02.5.ep5.el6.noarch as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 6 Server",
"product_id": "6Server-JBEAP-5:resteasy-0:1.2.1-9.CP02.5.ep5.el6.noarch"
},
"product_reference": "resteasy-0:1.2.1-9.CP02.5.ep5.el6.noarch",
"relates_to_product_reference": "6Server-JBEAP-5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "resteasy-0:1.2.1-9.CP02.5.ep5.el6.src as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 6 Server",
"product_id": "6Server-JBEAP-5:resteasy-0:1.2.1-9.CP02.5.ep5.el6.src"
},
"product_reference": "resteasy-0:1.2.1-9.CP02.5.ep5.el6.src",
"relates_to_product_reference": "6Server-JBEAP-5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "resteasy-examples-0:1.2.1-9.CP02.5.ep5.el6.noarch as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 6 Server",
"product_id": "6Server-JBEAP-5:resteasy-examples-0:1.2.1-9.CP02.5.ep5.el6.noarch"
},
"product_reference": "resteasy-examples-0:1.2.1-9.CP02.5.ep5.el6.noarch",
"relates_to_product_reference": "6Server-JBEAP-5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "resteasy-javadoc-0:1.2.1-9.CP02.5.ep5.el6.noarch as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 6 Server",
"product_id": "6Server-JBEAP-5:resteasy-javadoc-0:1.2.1-9.CP02.5.ep5.el6.noarch"
},
"product_reference": "resteasy-javadoc-0:1.2.1-9.CP02.5.ep5.el6.noarch",
"relates_to_product_reference": "6Server-JBEAP-5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "resteasy-manual-0:1.2.1-9.CP02.5.ep5.el6.noarch as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 6 Server",
"product_id": "6Server-JBEAP-5:resteasy-manual-0:1.2.1-9.CP02.5.ep5.el6.noarch"
},
"product_reference": "resteasy-manual-0:1.2.1-9.CP02.5.ep5.el6.noarch",
"relates_to_product_reference": "6Server-JBEAP-5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-eap-docs-0:5.1.2-6.ep5.el6.noarch as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 6 Server",
"product_id": "6Server-JBEAP-5:rh-eap-docs-0:5.1.2-6.ep5.el6.noarch"
},
"product_reference": "rh-eap-docs-0:5.1.2-6.ep5.el6.noarch",
"relates_to_product_reference": "6Server-JBEAP-5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-eap-docs-0:5.1.2-6.ep5.el6.src as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 6 Server",
"product_id": "6Server-JBEAP-5:rh-eap-docs-0:5.1.2-6.ep5.el6.src"
},
"product_reference": "rh-eap-docs-0:5.1.2-6.ep5.el6.src",
"relates_to_product_reference": "6Server-JBEAP-5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-eap-docs-examples-0:5.1.2-6.ep5.el6.noarch as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 6 Server",
"product_id": "6Server-JBEAP-5:rh-eap-docs-examples-0:5.1.2-6.ep5.el6.noarch"
},
"product_reference": "rh-eap-docs-examples-0:5.1.2-6.ep5.el6.noarch",
"relates_to_product_reference": "6Server-JBEAP-5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhq-0:3.0.0-20.EmbJopr4.ep5.el6.noarch as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 6 Server",
"product_id": "6Server-JBEAP-5:rhq-0:3.0.0-20.EmbJopr4.ep5.el6.noarch"
},
"product_reference": "rhq-0:3.0.0-20.EmbJopr4.ep5.el6.noarch",
"relates_to_product_reference": "6Server-JBEAP-5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhq-0:3.0.0-20.EmbJopr4.ep5.el6.src as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 6 Server",
"product_id": "6Server-JBEAP-5:rhq-0:3.0.0-20.EmbJopr4.ep5.el6.src"
},
"product_reference": "rhq-0:3.0.0-20.EmbJopr4.ep5.el6.src",
"relates_to_product_reference": "6Server-JBEAP-5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhq-ant-bundle-common-0:3.0.0-20.EmbJopr4.ep5.el6.noarch as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 6 Server",
"product_id": "6Server-JBEAP-5:rhq-ant-bundle-common-0:3.0.0-20.EmbJopr4.ep5.el6.noarch"
},
"product_reference": "rhq-ant-bundle-common-0:3.0.0-20.EmbJopr4.ep5.el6.noarch",
"relates_to_product_reference": "6Server-JBEAP-5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhq-common-parent-0:3.0.0-20.EmbJopr4.ep5.el6.noarch as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 6 Server",
"product_id": "6Server-JBEAP-5:rhq-common-parent-0:3.0.0-20.EmbJopr4.ep5.el6.noarch"
},
"product_reference": "rhq-common-parent-0:3.0.0-20.EmbJopr4.ep5.el6.noarch",
"relates_to_product_reference": "6Server-JBEAP-5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhq-core-client-api-0:3.0.0-20.EmbJopr4.ep5.el6.noarch as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 6 Server",
"product_id": "6Server-JBEAP-5:rhq-core-client-api-0:3.0.0-20.EmbJopr4.ep5.el6.noarch"
},
"product_reference": "rhq-core-client-api-0:3.0.0-20.EmbJopr4.ep5.el6.noarch",
"relates_to_product_reference": "6Server-JBEAP-5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhq-core-comm-api-0:3.0.0-20.EmbJopr4.ep5.el6.noarch as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 6 Server",
"product_id": "6Server-JBEAP-5:rhq-core-comm-api-0:3.0.0-20.EmbJopr4.ep5.el6.noarch"
},
"product_reference": "rhq-core-comm-api-0:3.0.0-20.EmbJopr4.ep5.el6.noarch",
"relates_to_product_reference": "6Server-JBEAP-5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhq-core-dbutils-0:3.0.0-20.EmbJopr4.ep5.el6.noarch as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 6 Server",
"product_id": "6Server-JBEAP-5:rhq-core-dbutils-0:3.0.0-20.EmbJopr4.ep5.el6.noarch"
},
"product_reference": "rhq-core-dbutils-0:3.0.0-20.EmbJopr4.ep5.el6.noarch",
"relates_to_product_reference": "6Server-JBEAP-5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhq-core-domain-0:3.0.0-20.EmbJopr4.ep5.el6.noarch as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 6 Server",
"product_id": "6Server-JBEAP-5:rhq-core-domain-0:3.0.0-20.EmbJopr4.ep5.el6.noarch"
},
"product_reference": "rhq-core-domain-0:3.0.0-20.EmbJopr4.ep5.el6.noarch",
"relates_to_product_reference": "6Server-JBEAP-5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhq-core-gui-0:3.0.0-20.EmbJopr4.ep5.el6.noarch as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 6 Server",
"product_id": "6Server-JBEAP-5:rhq-core-gui-0:3.0.0-20.EmbJopr4.ep5.el6.noarch"
},
"product_reference": "rhq-core-gui-0:3.0.0-20.EmbJopr4.ep5.el6.noarch",
"relates_to_product_reference": "6Server-JBEAP-5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhq-core-native-system-0:3.0.0-20.EmbJopr4.ep5.el6.noarch as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 6 Server",
"product_id": "6Server-JBEAP-5:rhq-core-native-system-0:3.0.0-20.EmbJopr4.ep5.el6.noarch"
},
"product_reference": "rhq-core-native-system-0:3.0.0-20.EmbJopr4.ep5.el6.noarch",
"relates_to_product_reference": "6Server-JBEAP-5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhq-core-parent-0:3.0.0-20.EmbJopr4.ep5.el6.noarch as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 6 Server",
"product_id": "6Server-JBEAP-5:rhq-core-parent-0:3.0.0-20.EmbJopr4.ep5.el6.noarch"
},
"product_reference": "rhq-core-parent-0:3.0.0-20.EmbJopr4.ep5.el6.noarch",
"relates_to_product_reference": "6Server-JBEAP-5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhq-core-plugin-api-0:3.0.0-20.EmbJopr4.ep5.el6.noarch as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 6 Server",
"product_id": "6Server-JBEAP-5:rhq-core-plugin-api-0:3.0.0-20.EmbJopr4.ep5.el6.noarch"
},
"product_reference": "rhq-core-plugin-api-0:3.0.0-20.EmbJopr4.ep5.el6.noarch",
"relates_to_product_reference": "6Server-JBEAP-5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhq-core-plugin-container-0:3.0.0-20.EmbJopr4.ep5.el6.noarch as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 6 Server",
"product_id": "6Server-JBEAP-5:rhq-core-plugin-container-0:3.0.0-20.EmbJopr4.ep5.el6.noarch"
},
"product_reference": "rhq-core-plugin-container-0:3.0.0-20.EmbJopr4.ep5.el6.noarch",
"relates_to_product_reference": "6Server-JBEAP-5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhq-core-plugindoc-0:3.0.0-20.EmbJopr4.ep5.el6.noarch as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 6 Server",
"product_id": "6Server-JBEAP-5:rhq-core-plugindoc-0:3.0.0-20.EmbJopr4.ep5.el6.noarch"
},
"product_reference": "rhq-core-plugindoc-0:3.0.0-20.EmbJopr4.ep5.el6.noarch",
"relates_to_product_reference": "6Server-JBEAP-5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhq-core-util-0:3.0.0-20.EmbJopr4.ep5.el6.noarch as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 6 Server",
"product_id": "6Server-JBEAP-5:rhq-core-util-0:3.0.0-20.EmbJopr4.ep5.el6.noarch"
},
"product_reference": "rhq-core-util-0:3.0.0-20.EmbJopr4.ep5.el6.noarch",
"relates_to_product_reference": "6Server-JBEAP-5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhq-filetemplate-bundle-common-0:3.0.0-20.EmbJopr4.ep5.el6.noarch as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 6 Server",
"product_id": "6Server-JBEAP-5:rhq-filetemplate-bundle-common-0:3.0.0-20.EmbJopr4.ep5.el6.noarch"
},
"product_reference": "rhq-filetemplate-bundle-common-0:3.0.0-20.EmbJopr4.ep5.el6.noarch",
"relates_to_product_reference": "6Server-JBEAP-5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhq-helpers-0:3.0.0-20.EmbJopr4.ep5.el6.noarch as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 6 Server",
"product_id": "6Server-JBEAP-5:rhq-helpers-0:3.0.0-20.EmbJopr4.ep5.el6.noarch"
},
"product_reference": "rhq-helpers-0:3.0.0-20.EmbJopr4.ep5.el6.noarch",
"relates_to_product_reference": "6Server-JBEAP-5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhq-jboss-as-common-0:3.0.0-20.EmbJopr4.ep5.el6.noarch as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 6 Server",
"product_id": "6Server-JBEAP-5:rhq-jboss-as-common-0:3.0.0-20.EmbJopr4.ep5.el6.noarch"
},
"product_reference": "rhq-jboss-as-common-0:3.0.0-20.EmbJopr4.ep5.el6.noarch",
"relates_to_product_reference": "6Server-JBEAP-5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhq-jmx-plugin-0:3.0.0-20.EmbJopr4.ep5.el6.noarch as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 6 Server",
"product_id": "6Server-JBEAP-5:rhq-jmx-plugin-0:3.0.0-20.EmbJopr4.ep5.el6.noarch"
},
"product_reference": "rhq-jmx-plugin-0:3.0.0-20.EmbJopr4.ep5.el6.noarch",
"relates_to_product_reference": "6Server-JBEAP-5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhq-jmx-plugin-0:3.0.0-20.EmbJopr4.ep5.el6.src as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 6 Server",
"product_id": "6Server-JBEAP-5:rhq-jmx-plugin-0:3.0.0-20.EmbJopr4.ep5.el6.src"
},
"product_reference": "rhq-jmx-plugin-0:3.0.0-20.EmbJopr4.ep5.el6.src",
"relates_to_product_reference": "6Server-JBEAP-5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhq-modules-parent-0:3.0.0-20.EmbJopr4.ep5.el6.noarch as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 6 Server",
"product_id": "6Server-JBEAP-5:rhq-modules-parent-0:3.0.0-20.EmbJopr4.ep5.el6.noarch"
},
"product_reference": "rhq-modules-parent-0:3.0.0-20.EmbJopr4.ep5.el6.noarch",
"relates_to_product_reference": "6Server-JBEAP-5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhq-parent-0:3.0.0-20.EmbJopr4.ep5.el6.noarch as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 6 Server",
"product_id": "6Server-JBEAP-5:rhq-parent-0:3.0.0-20.EmbJopr4.ep5.el6.noarch"
},
"product_reference": "rhq-parent-0:3.0.0-20.EmbJopr4.ep5.el6.noarch",
"relates_to_product_reference": "6Server-JBEAP-5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhq-platform-plugin-0:3.0.0-13.EmbJopr4.ep5.el6.noarch as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 6 Server",
"product_id": "6Server-JBEAP-5:rhq-platform-plugin-0:3.0.0-13.EmbJopr4.ep5.el6.noarch"
},
"product_reference": "rhq-platform-plugin-0:3.0.0-13.EmbJopr4.ep5.el6.noarch",
"relates_to_product_reference": "6Server-JBEAP-5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhq-platform-plugin-0:3.0.0-13.EmbJopr4.ep5.el6.src as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 6 Server",
"product_id": "6Server-JBEAP-5:rhq-platform-plugin-0:3.0.0-13.EmbJopr4.ep5.el6.src"
},
"product_reference": "rhq-platform-plugin-0:3.0.0-13.EmbJopr4.ep5.el6.src",
"relates_to_product_reference": "6Server-JBEAP-5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhq-plugin-validator-0:3.0.0-20.EmbJopr4.ep5.el6.noarch as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 6 Server",
"product_id": "6Server-JBEAP-5:rhq-plugin-validator-0:3.0.0-20.EmbJopr4.ep5.el6.noarch"
},
"product_reference": "rhq-plugin-validator-0:3.0.0-20.EmbJopr4.ep5.el6.noarch",
"relates_to_product_reference": "6Server-JBEAP-5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhq-pluginAnnotations-0:3.0.0-20.EmbJopr4.ep5.el6.noarch as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 6 Server",
"product_id": "6Server-JBEAP-5:rhq-pluginAnnotations-0:3.0.0-20.EmbJopr4.ep5.el6.noarch"
},
"product_reference": "rhq-pluginAnnotations-0:3.0.0-20.EmbJopr4.ep5.el6.noarch",
"relates_to_product_reference": "6Server-JBEAP-5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhq-pluginGen-0:3.0.0-20.EmbJopr4.ep5.el6.noarch as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 6 Server",
"product_id": "6Server-JBEAP-5:rhq-pluginGen-0:3.0.0-20.EmbJopr4.ep5.el6.noarch"
},
"product_reference": "rhq-pluginGen-0:3.0.0-20.EmbJopr4.ep5.el6.noarch",
"relates_to_product_reference": "6Server-JBEAP-5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhq-plugins-parent-0:3.0.0-20.EmbJopr4.ep5.el6.noarch as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 6 Server",
"product_id": "6Server-JBEAP-5:rhq-plugins-parent-0:3.0.0-20.EmbJopr4.ep5.el6.noarch"
},
"product_reference": "rhq-plugins-parent-0:3.0.0-20.EmbJopr4.ep5.el6.noarch",
"relates_to_product_reference": "6Server-JBEAP-5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhq-rtfilter-0:3.0.0-20.EmbJopr4.ep5.el6.noarch as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 6 Server",
"product_id": "6Server-JBEAP-5:rhq-rtfilter-0:3.0.0-20.EmbJopr4.ep5.el6.noarch"
},
"product_reference": "rhq-rtfilter-0:3.0.0-20.EmbJopr4.ep5.el6.noarch",
"relates_to_product_reference": "6Server-JBEAP-5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "slf4j-0:1.5.8-10_patch_01.2.ep5.el6.noarch as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 6 Server",
"product_id": "6Server-JBEAP-5:slf4j-0:1.5.8-10_patch_01.2.ep5.el6.noarch"
},
"product_reference": "slf4j-0:1.5.8-10_patch_01.2.ep5.el6.noarch",
"relates_to_product_reference": "6Server-JBEAP-5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "slf4j-0:1.5.8-10_patch_01.2.ep5.el6.src as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 6 Server",
"product_id": "6Server-JBEAP-5:slf4j-0:1.5.8-10_patch_01.2.ep5.el6.src"
},
"product_reference": "slf4j-0:1.5.8-10_patch_01.2.ep5.el6.src",
"relates_to_product_reference": "6Server-JBEAP-5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xalan-j2-0:2.7.1-6_patch_05.1.ep5.el6.noarch as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 6 Server",
"product_id": "6Server-JBEAP-5:xalan-j2-0:2.7.1-6_patch_05.1.ep5.el6.noarch"
},
"product_reference": "xalan-j2-0:2.7.1-6_patch_05.1.ep5.el6.noarch",
"relates_to_product_reference": "6Server-JBEAP-5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xalan-j2-0:2.7.1-6_patch_05.1.ep5.el6.src as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 6 Server",
"product_id": "6Server-JBEAP-5:xalan-j2-0:2.7.1-6_patch_05.1.ep5.el6.src"
},
"product_reference": "xalan-j2-0:2.7.1-6_patch_05.1.ep5.el6.src",
"relates_to_product_reference": "6Server-JBEAP-5"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2011-4085",
"discovery_date": "2011-10-26T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "750422"
}
],
"notes": [
{
"category": "description",
"text": "The servlets invoked by httpha-invoker in JBoss Enterprise Application Platform before 5.1.2, SOA Platform before 5.2.0, BRMS Platform before 5.3.0, and Portal Platform before 4.3 CP07 perform access control only for the GET and POST methods, which allow remote attackers to bypass authentication by sending a request with a different method. NOTE: this vulnerability exists because of a CVE-2010-0738 regression.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Invoker servlets authentication bypass (HTTP verb tampering)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-JBEAP-5:apache-cxf-0:2.2.12-4.patch_02.1.ep5.el6.noarch",
"6Server-JBEAP-5:apache-cxf-0:2.2.12-4.patch_02.1.ep5.el6.src",
"6Server-JBEAP-5:cglib-0:2.2-5.5.ep5.el6.noarch",
"6Server-JBEAP-5:cglib-0:2.2-5.5.ep5.el6.src",
"6Server-JBEAP-5:facelets-0:1.1.15-3.B1_patch_01.2.ep5.el6.noarch",
"6Server-JBEAP-5:facelets-0:1.1.15-3.B1_patch_01.2.ep5.el6.src",
"6Server-JBEAP-5:glassfish-jaxb-0:2.1.12-10_patch_02.ep5.el6.noarch",
"6Server-JBEAP-5:glassfish-jaxb-0:2.1.12-10_patch_02.ep5.el6.src",
"6Server-JBEAP-5:glassfish-jsf-0:1.2_13-5_patch_01.3.ep5.el6.noarch",
"6Server-JBEAP-5:glassfish-jsf-0:1.2_13-5_patch_01.3.ep5.el6.src",
"6Server-JBEAP-5:jacorb-jboss-0:2.3.1-10.patch_03.4.ep5.el6.noarch",
"6Server-JBEAP-5:jacorb-jboss-0:2.3.1-10.patch_03.4.ep5.el6.src",
"6Server-JBEAP-5:jakarta-commons-logging-jboss-0:1.1-10.3_patch_02.1.ep5.el6.noarch",
"6Server-JBEAP-5:jakarta-commons-logging-jboss-0:1.1-10.3_patch_02.1.ep5.el6.src",
"6Server-JBEAP-5:jboss-aop2-0:2.1.6-2.CP03.1.1.ep5.el6.noarch",
"6Server-JBEAP-5:jboss-aop2-0:2.1.6-2.CP03.1.1.ep5.el6.src",
"6Server-JBEAP-5:jboss-cache-core-0:3.2.8-1.ep5.el6.noarch",
"6Server-JBEAP-5:jboss-cache-core-0:3.2.8-1.ep5.el6.src",
"6Server-JBEAP-5:jboss-cl-0:2.0.10-1.2.ep5.el6.noarch",
"6Server-JBEAP-5:jboss-cl-0:2.0.10-1.2.ep5.el6.src",
"6Server-JBEAP-5:jboss-cluster-ha-client-0:1.1.4-1.1.ep5.el6.noarch",
"6Server-JBEAP-5:jboss-cluster-ha-client-0:1.1.4-1.1.ep5.el6.src",
"6Server-JBEAP-5:jboss-common-core-0:2.2.18-1.1.ep5.el6.noarch",
"6Server-JBEAP-5:jboss-common-core-0:2.2.18-1.1.ep5.el6.src",
"6Server-JBEAP-5:jboss-eap5-native-0:5.1.2-1.4.ep5.el6.i386",
"6Server-JBEAP-5:jboss-eap5-native-0:5.1.2-1.4.ep5.el6.src",
"6Server-JBEAP-5:jboss-eap5-native-0:5.1.2-1.4.ep5.el6.x86_64",
"6Server-JBEAP-5:jboss-ejb3-core-0:1.3.8-0.1.ep5.el6.noarch",
"6Server-JBEAP-5:jboss-ejb3-core-0:1.3.8-0.1.ep5.el6.src",
"6Server-JBEAP-5:jboss-ejb3-proxy-clustered-0:1.0.3-2.SP1.1.ep5.el6.noarch",
"6Server-JBEAP-5:jboss-ejb3-proxy-clustered-0:1.0.3-2.SP1.1.ep5.el6.src",
"6Server-JBEAP-5:jboss-ejb3-proxy-impl-0:1.0.6-2.SP2.1.ep5.el6.noarch",
"6Server-JBEAP-5:jboss-ejb3-proxy-impl-0:1.0.6-2.SP2.1.ep5.el6.src",
"6Server-JBEAP-5:jboss-el-0:1.0_02-0.CR6.2.ep5.el6.noarch",
"6Server-JBEAP-5:jboss-el-0:1.0_02-0.CR6.2.ep5.el6.src",
"6Server-JBEAP-5:jboss-messaging-0:1.4.8-9.SP5.1.ep5.el6.noarch",
"6Server-JBEAP-5:jboss-messaging-0:1.4.8-9.SP5.1.ep5.el6.src",
"6Server-JBEAP-5:jboss-naming-0:5.0.3-3.CP01.3.ep5.el6.noarch",
"6Server-JBEAP-5:jboss-naming-0:5.0.3-3.CP01.3.ep5.el6.src",
"6Server-JBEAP-5:jboss-remoting-0:2.5.4-9.SP3.1.ep5.el6.noarch",
"6Server-JBEAP-5:jboss-remoting-0:2.5.4-9.SP3.1.ep5.el6.src",
"6Server-JBEAP-5:jboss-seam2-0:2.2.5.EAP5-7.ep5.el6.noarch",
"6Server-JBEAP-5:jboss-seam2-0:2.2.5.EAP5-7.ep5.el6.src",
"6Server-JBEAP-5:jboss-seam2-docs-0:2.2.5.EAP5-7.ep5.el6.noarch",
"6Server-JBEAP-5:jboss-seam2-examples-0:2.2.5.EAP5-7.ep5.el6.noarch",
"6Server-JBEAP-5:jboss-seam2-runtime-0:2.2.5.EAP5-7.ep5.el6.noarch",
"6Server-JBEAP-5:jboss-security-spi-1:2.0.4-6.SP8.1.ep5.el6.noarch",
"6Server-JBEAP-5:jboss-security-spi-1:2.0.4-6.SP8.1.ep5.el6.src",
"6Server-JBEAP-5:jbossas-0:5.1.2-8.ep5.el6.noarch",
"6Server-JBEAP-5:jbossas-0:5.1.2-8.ep5.el6.src",
"6Server-JBEAP-5:jbossas-client-0:5.1.2-8.ep5.el6.noarch",
"6Server-JBEAP-5:jbossas-messaging-0:5.1.2-8.ep5.el6.noarch",
"6Server-JBEAP-5:jbossas-tp-licenses-0:5.1.2-7.ep5.el6.noarch",
"6Server-JBEAP-5:jbossas-tp-licenses-0:5.1.2-7.ep5.el6.src",
"6Server-JBEAP-5:jbossas-ws-cxf-0:5.1.2-8.ep5.el6.noarch",
"6Server-JBEAP-5:jbossas-ws-cxf-0:5.1.2-8.ep5.el6.src",
"6Server-JBEAP-5:jbossas-ws-native-0:5.1.2-8.ep5.el6.noarch",
"6Server-JBEAP-5:jbosssx2-0:2.0.4-6.SP8.2.ep5.el6.noarch",
"6Server-JBEAP-5:jbosssx2-0:2.0.4-6.SP8.2.ep5.el6.src",
"6Server-JBEAP-5:jbossts-1:4.6.1-11.CP12.4.ep5.el6.noarch",
"6Server-JBEAP-5:jbossts-1:4.6.1-11.CP12.4.ep5.el6.src",
"6Server-JBEAP-5:jbossts-javadoc-1:4.6.1-11.CP12.4.ep5.el6.noarch",
"6Server-JBEAP-5:jbossweb-0:2.1.12-1.4_patch_01.ep5.el6.noarch",
"6Server-JBEAP-5:jbossweb-0:2.1.12-1.4_patch_01.ep5.el6.src",
"6Server-JBEAP-5:jbossweb-el-1.0-api-0:2.1.12-1.4_patch_01.ep5.el6.noarch",
"6Server-JBEAP-5:jbossweb-jsp-2.1-api-0:2.1.12-1.4_patch_01.ep5.el6.noarch",
"6Server-JBEAP-5:jbossweb-lib-0:2.1.12-1.4_patch_01.ep5.el6.noarch",
"6Server-JBEAP-5:jbossweb-servlet-2.5-api-0:2.1.12-1.4_patch_01.ep5.el6.noarch",
"6Server-JBEAP-5:jbossws-0:3.1.2-7.SP11.4.ep5.el6.noarch",
"6Server-JBEAP-5:jbossws-0:3.1.2-7.SP11.4.ep5.el6.src",
"6Server-JBEAP-5:jbossws-common-0:1.1.0-6.SP8_patch_01.1.ep5.el6.noarch",
"6Server-JBEAP-5:jbossws-common-0:1.1.0-6.SP8_patch_01.1.ep5.el6.src",
"6Server-JBEAP-5:jbossws-framework-0:3.1.2-6.SP10.1.ep5.el6.noarch",
"6Server-JBEAP-5:jbossws-framework-0:3.1.2-6.SP10.1.ep5.el6.src",
"6Server-JBEAP-5:jbossws-spi-0:1.1.2-5.SP7.1.ep5.el6.noarch",
"6Server-JBEAP-5:jbossws-spi-0:1.1.2-5.SP7.1.ep5.el6.src",
"6Server-JBEAP-5:jgroups-1:2.6.20-1.1.ep5.el6.noarch",
"6Server-JBEAP-5:jgroups-1:2.6.20-1.1.ep5.el6.src",
"6Server-JBEAP-5:jopr-embedded-0:1.3.4-18.SP5.8.ep5.el6.noarch",
"6Server-JBEAP-5:jopr-embedded-0:1.3.4-18.SP5.8.ep5.el6.src",
"6Server-JBEAP-5:jopr-hibernate-plugin-0:3.0.0-13.EmbJopr4.ep5.el6.noarch",
"6Server-JBEAP-5:jopr-hibernate-plugin-0:3.0.0-13.EmbJopr4.ep5.el6.src",
"6Server-JBEAP-5:jopr-jboss-as-5-plugin-0:3.0.0-12.EmbJopr4.ep5.el6.noarch",
"6Server-JBEAP-5:jopr-jboss-as-5-plugin-0:3.0.0-12.EmbJopr4.ep5.el6.src",
"6Server-JBEAP-5:jopr-jboss-cache-v3-plugin-0:3.0.0-14.EmbJopr4.ep5.el6.noarch",
"6Server-JBEAP-5:jopr-jboss-cache-v3-plugin-0:3.0.0-14.EmbJopr4.ep5.el6.src",
"6Server-JBEAP-5:mod_cluster-0:1.0.10-3.2.GA_CP02.ep5.el6.src",
"6Server-JBEAP-5:mod_cluster-demo-0:1.0.10-3.2.GA_CP02.ep5.el6.noarch",
"6Server-JBEAP-5:mod_cluster-jbossas-0:1.0.10-3.2.GA_CP02.ep5.el6.noarch",
"6Server-JBEAP-5:mod_cluster-jbossweb2-0:1.0.10-3.2.GA_CP02.ep5.el6.noarch",
"6Server-JBEAP-5:mod_cluster-native-0:1.0.10-3.1.1.GA_CP02.ep5.el6.i386",
"6Server-JBEAP-5:mod_cluster-native-0:1.0.10-3.1.1.GA_CP02.ep5.el6.src",
"6Server-JBEAP-5:mod_cluster-native-0:1.0.10-3.1.1.GA_CP02.ep5.el6.x86_64",
"6Server-JBEAP-5:mod_cluster-tomcat6-0:1.0.10-3.2.GA_CP02.ep5.el6.noarch",
"6Server-JBEAP-5:org-mc4j-ems-0:1.2.15.1-7.ep5.el6.noarch",
"6Server-JBEAP-5:org-mc4j-ems-0:1.2.15.1-7.ep5.el6.src",
"6Server-JBEAP-5:picketlink-federation-0:2.0.2-1.ep5.el6.noarch",
"6Server-JBEAP-5:picketlink-federation-0:2.0.2-1.ep5.el6.src",
"6Server-JBEAP-5:picketlink-federation-webapp-idp-0:2.0.2-1.ep5.el6.noarch",
"6Server-JBEAP-5:picketlink-federation-webapp-pdp-0:2.0.2-1.ep5.el6.noarch",
"6Server-JBEAP-5:picketlink-federation-webapp-sts-0:2.0.2-1.ep5.el6.noarch",
"6Server-JBEAP-5:resteasy-0:1.2.1-9.CP02.5.ep5.el6.noarch",
"6Server-JBEAP-5:resteasy-0:1.2.1-9.CP02.5.ep5.el6.src",
"6Server-JBEAP-5:resteasy-examples-0:1.2.1-9.CP02.5.ep5.el6.noarch",
"6Server-JBEAP-5:resteasy-javadoc-0:1.2.1-9.CP02.5.ep5.el6.noarch",
"6Server-JBEAP-5:resteasy-manual-0:1.2.1-9.CP02.5.ep5.el6.noarch",
"6Server-JBEAP-5:rh-eap-docs-0:5.1.2-6.ep5.el6.noarch",
"6Server-JBEAP-5:rh-eap-docs-0:5.1.2-6.ep5.el6.src",
"6Server-JBEAP-5:rh-eap-docs-examples-0:5.1.2-6.ep5.el6.noarch",
"6Server-JBEAP-5:rhq-0:3.0.0-20.EmbJopr4.ep5.el6.noarch",
"6Server-JBEAP-5:rhq-0:3.0.0-20.EmbJopr4.ep5.el6.src",
"6Server-JBEAP-5:rhq-ant-bundle-common-0:3.0.0-20.EmbJopr4.ep5.el6.noarch",
"6Server-JBEAP-5:rhq-common-parent-0:3.0.0-20.EmbJopr4.ep5.el6.noarch",
"6Server-JBEAP-5:rhq-core-client-api-0:3.0.0-20.EmbJopr4.ep5.el6.noarch",
"6Server-JBEAP-5:rhq-core-comm-api-0:3.0.0-20.EmbJopr4.ep5.el6.noarch",
"6Server-JBEAP-5:rhq-core-dbutils-0:3.0.0-20.EmbJopr4.ep5.el6.noarch",
"6Server-JBEAP-5:rhq-core-domain-0:3.0.0-20.EmbJopr4.ep5.el6.noarch",
"6Server-JBEAP-5:rhq-core-gui-0:3.0.0-20.EmbJopr4.ep5.el6.noarch",
"6Server-JBEAP-5:rhq-core-native-system-0:3.0.0-20.EmbJopr4.ep5.el6.noarch",
"6Server-JBEAP-5:rhq-core-parent-0:3.0.0-20.EmbJopr4.ep5.el6.noarch",
"6Server-JBEAP-5:rhq-core-plugin-api-0:3.0.0-20.EmbJopr4.ep5.el6.noarch",
"6Server-JBEAP-5:rhq-core-plugin-container-0:3.0.0-20.EmbJopr4.ep5.el6.noarch",
"6Server-JBEAP-5:rhq-core-plugindoc-0:3.0.0-20.EmbJopr4.ep5.el6.noarch",
"6Server-JBEAP-5:rhq-core-util-0:3.0.0-20.EmbJopr4.ep5.el6.noarch",
"6Server-JBEAP-5:rhq-filetemplate-bundle-common-0:3.0.0-20.EmbJopr4.ep5.el6.noarch",
"6Server-JBEAP-5:rhq-helpers-0:3.0.0-20.EmbJopr4.ep5.el6.noarch",
"6Server-JBEAP-5:rhq-jboss-as-common-0:3.0.0-20.EmbJopr4.ep5.el6.noarch",
"6Server-JBEAP-5:rhq-jmx-plugin-0:3.0.0-20.EmbJopr4.ep5.el6.noarch",
"6Server-JBEAP-5:rhq-jmx-plugin-0:3.0.0-20.EmbJopr4.ep5.el6.src",
"6Server-JBEAP-5:rhq-modules-parent-0:3.0.0-20.EmbJopr4.ep5.el6.noarch",
"6Server-JBEAP-5:rhq-parent-0:3.0.0-20.EmbJopr4.ep5.el6.noarch",
"6Server-JBEAP-5:rhq-platform-plugin-0:3.0.0-13.EmbJopr4.ep5.el6.noarch",
"6Server-JBEAP-5:rhq-platform-plugin-0:3.0.0-13.EmbJopr4.ep5.el6.src",
"6Server-JBEAP-5:rhq-plugin-validator-0:3.0.0-20.EmbJopr4.ep5.el6.noarch",
"6Server-JBEAP-5:rhq-pluginAnnotations-0:3.0.0-20.EmbJopr4.ep5.el6.noarch",
"6Server-JBEAP-5:rhq-pluginGen-0:3.0.0-20.EmbJopr4.ep5.el6.noarch",
"6Server-JBEAP-5:rhq-plugins-parent-0:3.0.0-20.EmbJopr4.ep5.el6.noarch",
"6Server-JBEAP-5:rhq-rtfilter-0:3.0.0-20.EmbJopr4.ep5.el6.noarch",
"6Server-JBEAP-5:slf4j-0:1.5.8-10_patch_01.2.ep5.el6.noarch",
"6Server-JBEAP-5:slf4j-0:1.5.8-10_patch_01.2.ep5.el6.src",
"6Server-JBEAP-5:xalan-j2-0:2.7.1-6_patch_05.1.ep5.el6.noarch",
"6Server-JBEAP-5:xalan-j2-0:2.7.1-6_patch_05.1.ep5.el6.src"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-4085"
},
{
"category": "external",
"summary": "RHBZ#750422",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=750422"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-4085",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-4085"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-4085",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-4085"
}
],
"release_date": "2011-11-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-12-08T19:13:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"6Server-JBEAP-5:apache-cxf-0:2.2.12-4.patch_02.1.ep5.el6.noarch",
"6Server-JBEAP-5:apache-cxf-0:2.2.12-4.patch_02.1.ep5.el6.src",
"6Server-JBEAP-5:cglib-0:2.2-5.5.ep5.el6.noarch",
"6Server-JBEAP-5:cglib-0:2.2-5.5.ep5.el6.src",
"6Server-JBEAP-5:facelets-0:1.1.15-3.B1_patch_01.2.ep5.el6.noarch",
"6Server-JBEAP-5:facelets-0:1.1.15-3.B1_patch_01.2.ep5.el6.src",
"6Server-JBEAP-5:glassfish-jaxb-0:2.1.12-10_patch_02.ep5.el6.noarch",
"6Server-JBEAP-5:glassfish-jaxb-0:2.1.12-10_patch_02.ep5.el6.src",
"6Server-JBEAP-5:glassfish-jsf-0:1.2_13-5_patch_01.3.ep5.el6.noarch",
"6Server-JBEAP-5:glassfish-jsf-0:1.2_13-5_patch_01.3.ep5.el6.src",
"6Server-JBEAP-5:jacorb-jboss-0:2.3.1-10.patch_03.4.ep5.el6.noarch",
"6Server-JBEAP-5:jacorb-jboss-0:2.3.1-10.patch_03.4.ep5.el6.src",
"6Server-JBEAP-5:jakarta-commons-logging-jboss-0:1.1-10.3_patch_02.1.ep5.el6.noarch",
"6Server-JBEAP-5:jakarta-commons-logging-jboss-0:1.1-10.3_patch_02.1.ep5.el6.src",
"6Server-JBEAP-5:jboss-aop2-0:2.1.6-2.CP03.1.1.ep5.el6.noarch",
"6Server-JBEAP-5:jboss-aop2-0:2.1.6-2.CP03.1.1.ep5.el6.src",
"6Server-JBEAP-5:jboss-cache-core-0:3.2.8-1.ep5.el6.noarch",
"6Server-JBEAP-5:jboss-cache-core-0:3.2.8-1.ep5.el6.src",
"6Server-JBEAP-5:jboss-cl-0:2.0.10-1.2.ep5.el6.noarch",
"6Server-JBEAP-5:jboss-cl-0:2.0.10-1.2.ep5.el6.src",
"6Server-JBEAP-5:jboss-cluster-ha-client-0:1.1.4-1.1.ep5.el6.noarch",
"6Server-JBEAP-5:jboss-cluster-ha-client-0:1.1.4-1.1.ep5.el6.src",
"6Server-JBEAP-5:jboss-common-core-0:2.2.18-1.1.ep5.el6.noarch",
"6Server-JBEAP-5:jboss-common-core-0:2.2.18-1.1.ep5.el6.src",
"6Server-JBEAP-5:jboss-eap5-native-0:5.1.2-1.4.ep5.el6.i386",
"6Server-JBEAP-5:jboss-eap5-native-0:5.1.2-1.4.ep5.el6.src",
"6Server-JBEAP-5:jboss-eap5-native-0:5.1.2-1.4.ep5.el6.x86_64",
"6Server-JBEAP-5:jboss-ejb3-core-0:1.3.8-0.1.ep5.el6.noarch",
"6Server-JBEAP-5:jboss-ejb3-core-0:1.3.8-0.1.ep5.el6.src",
"6Server-JBEAP-5:jboss-ejb3-proxy-clustered-0:1.0.3-2.SP1.1.ep5.el6.noarch",
"6Server-JBEAP-5:jboss-ejb3-proxy-clustered-0:1.0.3-2.SP1.1.ep5.el6.src",
"6Server-JBEAP-5:jboss-ejb3-proxy-impl-0:1.0.6-2.SP2.1.ep5.el6.noarch",
"6Server-JBEAP-5:jboss-ejb3-proxy-impl-0:1.0.6-2.SP2.1.ep5.el6.src",
"6Server-JBEAP-5:jboss-el-0:1.0_02-0.CR6.2.ep5.el6.noarch",
"6Server-JBEAP-5:jboss-el-0:1.0_02-0.CR6.2.ep5.el6.src",
"6Server-JBEAP-5:jboss-messaging-0:1.4.8-9.SP5.1.ep5.el6.noarch",
"6Server-JBEAP-5:jboss-messaging-0:1.4.8-9.SP5.1.ep5.el6.src",
"6Server-JBEAP-5:jboss-naming-0:5.0.3-3.CP01.3.ep5.el6.noarch",
"6Server-JBEAP-5:jboss-naming-0:5.0.3-3.CP01.3.ep5.el6.src",
"6Server-JBEAP-5:jboss-remoting-0:2.5.4-9.SP3.1.ep5.el6.noarch",
"6Server-JBEAP-5:jboss-remoting-0:2.5.4-9.SP3.1.ep5.el6.src",
"6Server-JBEAP-5:jboss-seam2-0:2.2.5.EAP5-7.ep5.el6.noarch",
"6Server-JBEAP-5:jboss-seam2-0:2.2.5.EAP5-7.ep5.el6.src",
"6Server-JBEAP-5:jboss-seam2-docs-0:2.2.5.EAP5-7.ep5.el6.noarch",
"6Server-JBEAP-5:jboss-seam2-examples-0:2.2.5.EAP5-7.ep5.el6.noarch",
"6Server-JBEAP-5:jboss-seam2-runtime-0:2.2.5.EAP5-7.ep5.el6.noarch",
"6Server-JBEAP-5:jboss-security-spi-1:2.0.4-6.SP8.1.ep5.el6.noarch",
"6Server-JBEAP-5:jboss-security-spi-1:2.0.4-6.SP8.1.ep5.el6.src",
"6Server-JBEAP-5:jbossas-0:5.1.2-8.ep5.el6.noarch",
"6Server-JBEAP-5:jbossas-0:5.1.2-8.ep5.el6.src",
"6Server-JBEAP-5:jbossas-client-0:5.1.2-8.ep5.el6.noarch",
"6Server-JBEAP-5:jbossas-messaging-0:5.1.2-8.ep5.el6.noarch",
"6Server-JBEAP-5:jbossas-tp-licenses-0:5.1.2-7.ep5.el6.noarch",
"6Server-JBEAP-5:jbossas-tp-licenses-0:5.1.2-7.ep5.el6.src",
"6Server-JBEAP-5:jbossas-ws-cxf-0:5.1.2-8.ep5.el6.noarch",
"6Server-JBEAP-5:jbossas-ws-cxf-0:5.1.2-8.ep5.el6.src",
"6Server-JBEAP-5:jbossas-ws-native-0:5.1.2-8.ep5.el6.noarch",
"6Server-JBEAP-5:jbosssx2-0:2.0.4-6.SP8.2.ep5.el6.noarch",
"6Server-JBEAP-5:jbosssx2-0:2.0.4-6.SP8.2.ep5.el6.src",
"6Server-JBEAP-5:jbossts-1:4.6.1-11.CP12.4.ep5.el6.noarch",
"6Server-JBEAP-5:jbossts-1:4.6.1-11.CP12.4.ep5.el6.src",
"6Server-JBEAP-5:jbossts-javadoc-1:4.6.1-11.CP12.4.ep5.el6.noarch",
"6Server-JBEAP-5:jbossweb-0:2.1.12-1.4_patch_01.ep5.el6.noarch",
"6Server-JBEAP-5:jbossweb-0:2.1.12-1.4_patch_01.ep5.el6.src",
"6Server-JBEAP-5:jbossweb-el-1.0-api-0:2.1.12-1.4_patch_01.ep5.el6.noarch",
"6Server-JBEAP-5:jbossweb-jsp-2.1-api-0:2.1.12-1.4_patch_01.ep5.el6.noarch",
"6Server-JBEAP-5:jbossweb-lib-0:2.1.12-1.4_patch_01.ep5.el6.noarch",
"6Server-JBEAP-5:jbossweb-servlet-2.5-api-0:2.1.12-1.4_patch_01.ep5.el6.noarch",
"6Server-JBEAP-5:jbossws-0:3.1.2-7.SP11.4.ep5.el6.noarch",
"6Server-JBEAP-5:jbossws-0:3.1.2-7.SP11.4.ep5.el6.src",
"6Server-JBEAP-5:jbossws-common-0:1.1.0-6.SP8_patch_01.1.ep5.el6.noarch",
"6Server-JBEAP-5:jbossws-common-0:1.1.0-6.SP8_patch_01.1.ep5.el6.src",
"6Server-JBEAP-5:jbossws-framework-0:3.1.2-6.SP10.1.ep5.el6.noarch",
"6Server-JBEAP-5:jbossws-framework-0:3.1.2-6.SP10.1.ep5.el6.src",
"6Server-JBEAP-5:jbossws-spi-0:1.1.2-5.SP7.1.ep5.el6.noarch",
"6Server-JBEAP-5:jbossws-spi-0:1.1.2-5.SP7.1.ep5.el6.src",
"6Server-JBEAP-5:jgroups-1:2.6.20-1.1.ep5.el6.noarch",
"6Server-JBEAP-5:jgroups-1:2.6.20-1.1.ep5.el6.src",
"6Server-JBEAP-5:jopr-embedded-0:1.3.4-18.SP5.8.ep5.el6.noarch",
"6Server-JBEAP-5:jopr-embedded-0:1.3.4-18.SP5.8.ep5.el6.src",
"6Server-JBEAP-5:jopr-hibernate-plugin-0:3.0.0-13.EmbJopr4.ep5.el6.noarch",
"6Server-JBEAP-5:jopr-hibernate-plugin-0:3.0.0-13.EmbJopr4.ep5.el6.src",
"6Server-JBEAP-5:jopr-jboss-as-5-plugin-0:3.0.0-12.EmbJopr4.ep5.el6.noarch",
"6Server-JBEAP-5:jopr-jboss-as-5-plugin-0:3.0.0-12.EmbJopr4.ep5.el6.src",
"6Server-JBEAP-5:jopr-jboss-cache-v3-plugin-0:3.0.0-14.EmbJopr4.ep5.el6.noarch",
"6Server-JBEAP-5:jopr-jboss-cache-v3-plugin-0:3.0.0-14.EmbJopr4.ep5.el6.src",
"6Server-JBEAP-5:mod_cluster-0:1.0.10-3.2.GA_CP02.ep5.el6.src",
"6Server-JBEAP-5:mod_cluster-demo-0:1.0.10-3.2.GA_CP02.ep5.el6.noarch",
"6Server-JBEAP-5:mod_cluster-jbossas-0:1.0.10-3.2.GA_CP02.ep5.el6.noarch",
"6Server-JBEAP-5:mod_cluster-jbossweb2-0:1.0.10-3.2.GA_CP02.ep5.el6.noarch",
"6Server-JBEAP-5:mod_cluster-native-0:1.0.10-3.1.1.GA_CP02.ep5.el6.i386",
"6Server-JBEAP-5:mod_cluster-native-0:1.0.10-3.1.1.GA_CP02.ep5.el6.src",
"6Server-JBEAP-5:mod_cluster-native-0:1.0.10-3.1.1.GA_CP02.ep5.el6.x86_64",
"6Server-JBEAP-5:mod_cluster-tomcat6-0:1.0.10-3.2.GA_CP02.ep5.el6.noarch",
"6Server-JBEAP-5:org-mc4j-ems-0:1.2.15.1-7.ep5.el6.noarch",
"6Server-JBEAP-5:org-mc4j-ems-0:1.2.15.1-7.ep5.el6.src",
"6Server-JBEAP-5:picketlink-federation-0:2.0.2-1.ep5.el6.noarch",
"6Server-JBEAP-5:picketlink-federation-0:2.0.2-1.ep5.el6.src",
"6Server-JBEAP-5:picketlink-federation-webapp-idp-0:2.0.2-1.ep5.el6.noarch",
"6Server-JBEAP-5:picketlink-federation-webapp-pdp-0:2.0.2-1.ep5.el6.noarch",
"6Server-JBEAP-5:picketlink-federation-webapp-sts-0:2.0.2-1.ep5.el6.noarch",
"6Server-JBEAP-5:resteasy-0:1.2.1-9.CP02.5.ep5.el6.noarch",
"6Server-JBEAP-5:resteasy-0:1.2.1-9.CP02.5.ep5.el6.src",
"6Server-JBEAP-5:resteasy-examples-0:1.2.1-9.CP02.5.ep5.el6.noarch",
"6Server-JBEAP-5:resteasy-javadoc-0:1.2.1-9.CP02.5.ep5.el6.noarch",
"6Server-JBEAP-5:resteasy-manual-0:1.2.1-9.CP02.5.ep5.el6.noarch",
"6Server-JBEAP-5:rh-eap-docs-0:5.1.2-6.ep5.el6.noarch",
"6Server-JBEAP-5:rh-eap-docs-0:5.1.2-6.ep5.el6.src",
"6Server-JBEAP-5:rh-eap-docs-examples-0:5.1.2-6.ep5.el6.noarch",
"6Server-JBEAP-5:rhq-0:3.0.0-20.EmbJopr4.ep5.el6.noarch",
"6Server-JBEAP-5:rhq-0:3.0.0-20.EmbJopr4.ep5.el6.src",
"6Server-JBEAP-5:rhq-ant-bundle-common-0:3.0.0-20.EmbJopr4.ep5.el6.noarch",
"6Server-JBEAP-5:rhq-common-parent-0:3.0.0-20.EmbJopr4.ep5.el6.noarch",
"6Server-JBEAP-5:rhq-core-client-api-0:3.0.0-20.EmbJopr4.ep5.el6.noarch",
"6Server-JBEAP-5:rhq-core-comm-api-0:3.0.0-20.EmbJopr4.ep5.el6.noarch",
"6Server-JBEAP-5:rhq-core-dbutils-0:3.0.0-20.EmbJopr4.ep5.el6.noarch",
"6Server-JBEAP-5:rhq-core-domain-0:3.0.0-20.EmbJopr4.ep5.el6.noarch",
"6Server-JBEAP-5:rhq-core-gui-0:3.0.0-20.EmbJopr4.ep5.el6.noarch",
"6Server-JBEAP-5:rhq-core-native-system-0:3.0.0-20.EmbJopr4.ep5.el6.noarch",
"6Server-JBEAP-5:rhq-core-parent-0:3.0.0-20.EmbJopr4.ep5.el6.noarch",
"6Server-JBEAP-5:rhq-core-plugin-api-0:3.0.0-20.EmbJopr4.ep5.el6.noarch",
"6Server-JBEAP-5:rhq-core-plugin-container-0:3.0.0-20.EmbJopr4.ep5.el6.noarch",
"6Server-JBEAP-5:rhq-core-plugindoc-0:3.0.0-20.EmbJopr4.ep5.el6.noarch",
"6Server-JBEAP-5:rhq-core-util-0:3.0.0-20.EmbJopr4.ep5.el6.noarch",
"6Server-JBEAP-5:rhq-filetemplate-bundle-common-0:3.0.0-20.EmbJopr4.ep5.el6.noarch",
"6Server-JBEAP-5:rhq-helpers-0:3.0.0-20.EmbJopr4.ep5.el6.noarch",
"6Server-JBEAP-5:rhq-jboss-as-common-0:3.0.0-20.EmbJopr4.ep5.el6.noarch",
"6Server-JBEAP-5:rhq-jmx-plugin-0:3.0.0-20.EmbJopr4.ep5.el6.noarch",
"6Server-JBEAP-5:rhq-jmx-plugin-0:3.0.0-20.EmbJopr4.ep5.el6.src",
"6Server-JBEAP-5:rhq-modules-parent-0:3.0.0-20.EmbJopr4.ep5.el6.noarch",
"6Server-JBEAP-5:rhq-parent-0:3.0.0-20.EmbJopr4.ep5.el6.noarch",
"6Server-JBEAP-5:rhq-platform-plugin-0:3.0.0-13.EmbJopr4.ep5.el6.noarch",
"6Server-JBEAP-5:rhq-platform-plugin-0:3.0.0-13.EmbJopr4.ep5.el6.src",
"6Server-JBEAP-5:rhq-plugin-validator-0:3.0.0-20.EmbJopr4.ep5.el6.noarch",
"6Server-JBEAP-5:rhq-pluginAnnotations-0:3.0.0-20.EmbJopr4.ep5.el6.noarch",
"6Server-JBEAP-5:rhq-pluginGen-0:3.0.0-20.EmbJopr4.ep5.el6.noarch",
"6Server-JBEAP-5:rhq-plugins-parent-0:3.0.0-20.EmbJopr4.ep5.el6.noarch",
"6Server-JBEAP-5:rhq-rtfilter-0:3.0.0-20.EmbJopr4.ep5.el6.noarch",
"6Server-JBEAP-5:slf4j-0:1.5.8-10_patch_01.2.ep5.el6.noarch",
"6Server-JBEAP-5:slf4j-0:1.5.8-10_patch_01.2.ep5.el6.src",
"6Server-JBEAP-5:xalan-j2-0:2.7.1-6_patch_05.1.ep5.el6.noarch",
"6Server-JBEAP-5:xalan-j2-0:2.7.1-6_patch_05.1.ep5.el6.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:1798"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 2.6,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:H/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"6Server-JBEAP-5:apache-cxf-0:2.2.12-4.patch_02.1.ep5.el6.noarch",
"6Server-JBEAP-5:apache-cxf-0:2.2.12-4.patch_02.1.ep5.el6.src",
"6Server-JBEAP-5:cglib-0:2.2-5.5.ep5.el6.noarch",
"6Server-JBEAP-5:cglib-0:2.2-5.5.ep5.el6.src",
"6Server-JBEAP-5:facelets-0:1.1.15-3.B1_patch_01.2.ep5.el6.noarch",
"6Server-JBEAP-5:facelets-0:1.1.15-3.B1_patch_01.2.ep5.el6.src",
"6Server-JBEAP-5:glassfish-jaxb-0:2.1.12-10_patch_02.ep5.el6.noarch",
"6Server-JBEAP-5:glassfish-jaxb-0:2.1.12-10_patch_02.ep5.el6.src",
"6Server-JBEAP-5:glassfish-jsf-0:1.2_13-5_patch_01.3.ep5.el6.noarch",
"6Server-JBEAP-5:glassfish-jsf-0:1.2_13-5_patch_01.3.ep5.el6.src",
"6Server-JBEAP-5:jacorb-jboss-0:2.3.1-10.patch_03.4.ep5.el6.noarch",
"6Server-JBEAP-5:jacorb-jboss-0:2.3.1-10.patch_03.4.ep5.el6.src",
"6Server-JBEAP-5:jakarta-commons-logging-jboss-0:1.1-10.3_patch_02.1.ep5.el6.noarch",
"6Server-JBEAP-5:jakarta-commons-logging-jboss-0:1.1-10.3_patch_02.1.ep5.el6.src",
"6Server-JBEAP-5:jboss-aop2-0:2.1.6-2.CP03.1.1.ep5.el6.noarch",
"6Server-JBEAP-5:jboss-aop2-0:2.1.6-2.CP03.1.1.ep5.el6.src",
"6Server-JBEAP-5:jboss-cache-core-0:3.2.8-1.ep5.el6.noarch",
"6Server-JBEAP-5:jboss-cache-core-0:3.2.8-1.ep5.el6.src",
"6Server-JBEAP-5:jboss-cl-0:2.0.10-1.2.ep5.el6.noarch",
"6Server-JBEAP-5:jboss-cl-0:2.0.10-1.2.ep5.el6.src",
"6Server-JBEAP-5:jboss-cluster-ha-client-0:1.1.4-1.1.ep5.el6.noarch",
"6Server-JBEAP-5:jboss-cluster-ha-client-0:1.1.4-1.1.ep5.el6.src",
"6Server-JBEAP-5:jboss-common-core-0:2.2.18-1.1.ep5.el6.noarch",
"6Server-JBEAP-5:jboss-common-core-0:2.2.18-1.1.ep5.el6.src",
"6Server-JBEAP-5:jboss-eap5-native-0:5.1.2-1.4.ep5.el6.i386",
"6Server-JBEAP-5:jboss-eap5-native-0:5.1.2-1.4.ep5.el6.src",
"6Server-JBEAP-5:jboss-eap5-native-0:5.1.2-1.4.ep5.el6.x86_64",
"6Server-JBEAP-5:jboss-ejb3-core-0:1.3.8-0.1.ep5.el6.noarch",
"6Server-JBEAP-5:jboss-ejb3-core-0:1.3.8-0.1.ep5.el6.src",
"6Server-JBEAP-5:jboss-ejb3-proxy-clustered-0:1.0.3-2.SP1.1.ep5.el6.noarch",
"6Server-JBEAP-5:jboss-ejb3-proxy-clustered-0:1.0.3-2.SP1.1.ep5.el6.src",
"6Server-JBEAP-5:jboss-ejb3-proxy-impl-0:1.0.6-2.SP2.1.ep5.el6.noarch",
"6Server-JBEAP-5:jboss-ejb3-proxy-impl-0:1.0.6-2.SP2.1.ep5.el6.src",
"6Server-JBEAP-5:jboss-el-0:1.0_02-0.CR6.2.ep5.el6.noarch",
"6Server-JBEAP-5:jboss-el-0:1.0_02-0.CR6.2.ep5.el6.src",
"6Server-JBEAP-5:jboss-messaging-0:1.4.8-9.SP5.1.ep5.el6.noarch",
"6Server-JBEAP-5:jboss-messaging-0:1.4.8-9.SP5.1.ep5.el6.src",
"6Server-JBEAP-5:jboss-naming-0:5.0.3-3.CP01.3.ep5.el6.noarch",
"6Server-JBEAP-5:jboss-naming-0:5.0.3-3.CP01.3.ep5.el6.src",
"6Server-JBEAP-5:jboss-remoting-0:2.5.4-9.SP3.1.ep5.el6.noarch",
"6Server-JBEAP-5:jboss-remoting-0:2.5.4-9.SP3.1.ep5.el6.src",
"6Server-JBEAP-5:jboss-seam2-0:2.2.5.EAP5-7.ep5.el6.noarch",
"6Server-JBEAP-5:jboss-seam2-0:2.2.5.EAP5-7.ep5.el6.src",
"6Server-JBEAP-5:jboss-seam2-docs-0:2.2.5.EAP5-7.ep5.el6.noarch",
"6Server-JBEAP-5:jboss-seam2-examples-0:2.2.5.EAP5-7.ep5.el6.noarch",
"6Server-JBEAP-5:jboss-seam2-runtime-0:2.2.5.EAP5-7.ep5.el6.noarch",
"6Server-JBEAP-5:jboss-security-spi-1:2.0.4-6.SP8.1.ep5.el6.noarch",
"6Server-JBEAP-5:jboss-security-spi-1:2.0.4-6.SP8.1.ep5.el6.src",
"6Server-JBEAP-5:jbossas-0:5.1.2-8.ep5.el6.noarch",
"6Server-JBEAP-5:jbossas-0:5.1.2-8.ep5.el6.src",
"6Server-JBEAP-5:jbossas-client-0:5.1.2-8.ep5.el6.noarch",
"6Server-JBEAP-5:jbossas-messaging-0:5.1.2-8.ep5.el6.noarch",
"6Server-JBEAP-5:jbossas-tp-licenses-0:5.1.2-7.ep5.el6.noarch",
"6Server-JBEAP-5:jbossas-tp-licenses-0:5.1.2-7.ep5.el6.src",
"6Server-JBEAP-5:jbossas-ws-cxf-0:5.1.2-8.ep5.el6.noarch",
"6Server-JBEAP-5:jbossas-ws-cxf-0:5.1.2-8.ep5.el6.src",
"6Server-JBEAP-5:jbossas-ws-native-0:5.1.2-8.ep5.el6.noarch",
"6Server-JBEAP-5:jbosssx2-0:2.0.4-6.SP8.2.ep5.el6.noarch",
"6Server-JBEAP-5:jbosssx2-0:2.0.4-6.SP8.2.ep5.el6.src",
"6Server-JBEAP-5:jbossts-1:4.6.1-11.CP12.4.ep5.el6.noarch",
"6Server-JBEAP-5:jbossts-1:4.6.1-11.CP12.4.ep5.el6.src",
"6Server-JBEAP-5:jbossts-javadoc-1:4.6.1-11.CP12.4.ep5.el6.noarch",
"6Server-JBEAP-5:jbossweb-0:2.1.12-1.4_patch_01.ep5.el6.noarch",
"6Server-JBEAP-5:jbossweb-0:2.1.12-1.4_patch_01.ep5.el6.src",
"6Server-JBEAP-5:jbossweb-el-1.0-api-0:2.1.12-1.4_patch_01.ep5.el6.noarch",
"6Server-JBEAP-5:jbossweb-jsp-2.1-api-0:2.1.12-1.4_patch_01.ep5.el6.noarch",
"6Server-JBEAP-5:jbossweb-lib-0:2.1.12-1.4_patch_01.ep5.el6.noarch",
"6Server-JBEAP-5:jbossweb-servlet-2.5-api-0:2.1.12-1.4_patch_01.ep5.el6.noarch",
"6Server-JBEAP-5:jbossws-0:3.1.2-7.SP11.4.ep5.el6.noarch",
"6Server-JBEAP-5:jbossws-0:3.1.2-7.SP11.4.ep5.el6.src",
"6Server-JBEAP-5:jbossws-common-0:1.1.0-6.SP8_patch_01.1.ep5.el6.noarch",
"6Server-JBEAP-5:jbossws-common-0:1.1.0-6.SP8_patch_01.1.ep5.el6.src",
"6Server-JBEAP-5:jbossws-framework-0:3.1.2-6.SP10.1.ep5.el6.noarch",
"6Server-JBEAP-5:jbossws-framework-0:3.1.2-6.SP10.1.ep5.el6.src",
"6Server-JBEAP-5:jbossws-spi-0:1.1.2-5.SP7.1.ep5.el6.noarch",
"6Server-JBEAP-5:jbossws-spi-0:1.1.2-5.SP7.1.ep5.el6.src",
"6Server-JBEAP-5:jgroups-1:2.6.20-1.1.ep5.el6.noarch",
"6Server-JBEAP-5:jgroups-1:2.6.20-1.1.ep5.el6.src",
"6Server-JBEAP-5:jopr-embedded-0:1.3.4-18.SP5.8.ep5.el6.noarch",
"6Server-JBEAP-5:jopr-embedded-0:1.3.4-18.SP5.8.ep5.el6.src",
"6Server-JBEAP-5:jopr-hibernate-plugin-0:3.0.0-13.EmbJopr4.ep5.el6.noarch",
"6Server-JBEAP-5:jopr-hibernate-plugin-0:3.0.0-13.EmbJopr4.ep5.el6.src",
"6Server-JBEAP-5:jopr-jboss-as-5-plugin-0:3.0.0-12.EmbJopr4.ep5.el6.noarch",
"6Server-JBEAP-5:jopr-jboss-as-5-plugin-0:3.0.0-12.EmbJopr4.ep5.el6.src",
"6Server-JBEAP-5:jopr-jboss-cache-v3-plugin-0:3.0.0-14.EmbJopr4.ep5.el6.noarch",
"6Server-JBEAP-5:jopr-jboss-cache-v3-plugin-0:3.0.0-14.EmbJopr4.ep5.el6.src",
"6Server-JBEAP-5:mod_cluster-0:1.0.10-3.2.GA_CP02.ep5.el6.src",
"6Server-JBEAP-5:mod_cluster-demo-0:1.0.10-3.2.GA_CP02.ep5.el6.noarch",
"6Server-JBEAP-5:mod_cluster-jbossas-0:1.0.10-3.2.GA_CP02.ep5.el6.noarch",
"6Server-JBEAP-5:mod_cluster-jbossweb2-0:1.0.10-3.2.GA_CP02.ep5.el6.noarch",
"6Server-JBEAP-5:mod_cluster-native-0:1.0.10-3.1.1.GA_CP02.ep5.el6.i386",
"6Server-JBEAP-5:mod_cluster-native-0:1.0.10-3.1.1.GA_CP02.ep5.el6.src",
"6Server-JBEAP-5:mod_cluster-native-0:1.0.10-3.1.1.GA_CP02.ep5.el6.x86_64",
"6Server-JBEAP-5:mod_cluster-tomcat6-0:1.0.10-3.2.GA_CP02.ep5.el6.noarch",
"6Server-JBEAP-5:org-mc4j-ems-0:1.2.15.1-7.ep5.el6.noarch",
"6Server-JBEAP-5:org-mc4j-ems-0:1.2.15.1-7.ep5.el6.src",
"6Server-JBEAP-5:picketlink-federation-0:2.0.2-1.ep5.el6.noarch",
"6Server-JBEAP-5:picketlink-federation-0:2.0.2-1.ep5.el6.src",
"6Server-JBEAP-5:picketlink-federation-webapp-idp-0:2.0.2-1.ep5.el6.noarch",
"6Server-JBEAP-5:picketlink-federation-webapp-pdp-0:2.0.2-1.ep5.el6.noarch",
"6Server-JBEAP-5:picketlink-federation-webapp-sts-0:2.0.2-1.ep5.el6.noarch",
"6Server-JBEAP-5:resteasy-0:1.2.1-9.CP02.5.ep5.el6.noarch",
"6Server-JBEAP-5:resteasy-0:1.2.1-9.CP02.5.ep5.el6.src",
"6Server-JBEAP-5:resteasy-examples-0:1.2.1-9.CP02.5.ep5.el6.noarch",
"6Server-JBEAP-5:resteasy-javadoc-0:1.2.1-9.CP02.5.ep5.el6.noarch",
"6Server-JBEAP-5:resteasy-manual-0:1.2.1-9.CP02.5.ep5.el6.noarch",
"6Server-JBEAP-5:rh-eap-docs-0:5.1.2-6.ep5.el6.noarch",
"6Server-JBEAP-5:rh-eap-docs-0:5.1.2-6.ep5.el6.src",
"6Server-JBEAP-5:rh-eap-docs-examples-0:5.1.2-6.ep5.el6.noarch",
"6Server-JBEAP-5:rhq-0:3.0.0-20.EmbJopr4.ep5.el6.noarch",
"6Server-JBEAP-5:rhq-0:3.0.0-20.EmbJopr4.ep5.el6.src",
"6Server-JBEAP-5:rhq-ant-bundle-common-0:3.0.0-20.EmbJopr4.ep5.el6.noarch",
"6Server-JBEAP-5:rhq-common-parent-0:3.0.0-20.EmbJopr4.ep5.el6.noarch",
"6Server-JBEAP-5:rhq-core-client-api-0:3.0.0-20.EmbJopr4.ep5.el6.noarch",
"6Server-JBEAP-5:rhq-core-comm-api-0:3.0.0-20.EmbJopr4.ep5.el6.noarch",
"6Server-JBEAP-5:rhq-core-dbutils-0:3.0.0-20.EmbJopr4.ep5.el6.noarch",
"6Server-JBEAP-5:rhq-core-domain-0:3.0.0-20.EmbJopr4.ep5.el6.noarch",
"6Server-JBEAP-5:rhq-core-gui-0:3.0.0-20.EmbJopr4.ep5.el6.noarch",
"6Server-JBEAP-5:rhq-core-native-system-0:3.0.0-20.EmbJopr4.ep5.el6.noarch",
"6Server-JBEAP-5:rhq-core-parent-0:3.0.0-20.EmbJopr4.ep5.el6.noarch",
"6Server-JBEAP-5:rhq-core-plugin-api-0:3.0.0-20.EmbJopr4.ep5.el6.noarch",
"6Server-JBEAP-5:rhq-core-plugin-container-0:3.0.0-20.EmbJopr4.ep5.el6.noarch",
"6Server-JBEAP-5:rhq-core-plugindoc-0:3.0.0-20.EmbJopr4.ep5.el6.noarch",
"6Server-JBEAP-5:rhq-core-util-0:3.0.0-20.EmbJopr4.ep5.el6.noarch",
"6Server-JBEAP-5:rhq-filetemplate-bundle-common-0:3.0.0-20.EmbJopr4.ep5.el6.noarch",
"6Server-JBEAP-5:rhq-helpers-0:3.0.0-20.EmbJopr4.ep5.el6.noarch",
"6Server-JBEAP-5:rhq-jboss-as-common-0:3.0.0-20.EmbJopr4.ep5.el6.noarch",
"6Server-JBEAP-5:rhq-jmx-plugin-0:3.0.0-20.EmbJopr4.ep5.el6.noarch",
"6Server-JBEAP-5:rhq-jmx-plugin-0:3.0.0-20.EmbJopr4.ep5.el6.src",
"6Server-JBEAP-5:rhq-modules-parent-0:3.0.0-20.EmbJopr4.ep5.el6.noarch",
"6Server-JBEAP-5:rhq-parent-0:3.0.0-20.EmbJopr4.ep5.el6.noarch",
"6Server-JBEAP-5:rhq-platform-plugin-0:3.0.0-13.EmbJopr4.ep5.el6.noarch",
"6Server-JBEAP-5:rhq-platform-plugin-0:3.0.0-13.EmbJopr4.ep5.el6.src",
"6Server-JBEAP-5:rhq-plugin-validator-0:3.0.0-20.EmbJopr4.ep5.el6.noarch",
"6Server-JBEAP-5:rhq-pluginAnnotations-0:3.0.0-20.EmbJopr4.ep5.el6.noarch",
"6Server-JBEAP-5:rhq-pluginGen-0:3.0.0-20.EmbJopr4.ep5.el6.noarch",
"6Server-JBEAP-5:rhq-plugins-parent-0:3.0.0-20.EmbJopr4.ep5.el6.noarch",
"6Server-JBEAP-5:rhq-rtfilter-0:3.0.0-20.EmbJopr4.ep5.el6.noarch",
"6Server-JBEAP-5:slf4j-0:1.5.8-10_patch_01.2.ep5.el6.noarch",
"6Server-JBEAP-5:slf4j-0:1.5.8-10_patch_01.2.ep5.el6.src",
"6Server-JBEAP-5:xalan-j2-0:2.7.1-6_patch_05.1.ep5.el6.noarch",
"6Server-JBEAP-5:xalan-j2-0:2.7.1-6_patch_05.1.ep5.el6.src"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "Invoker servlets authentication bypass (HTTP verb tampering)"
},
{
"cve": "CVE-2011-4314",
"discovery_date": "2011-11-16T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "754386"
}
],
"notes": [
{
"category": "description",
"text": "message/ax/AxMessage.java in OpenID4Java before 0.9.6 final, as used in JBoss Enterprise Application Platform 5.1 before 5.1.2, Step2, Kay Framework before 1.0.2, and possibly other products does not verify that Attribute Exchange (AX) information is signed, which allows remote attackers to modify potentially sensitive AX information without detection via a man-in-the-middle (MITM) attack.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "extension): MITM due to improper validation of AX attribute signatures",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-JBEAP-5:apache-cxf-0:2.2.12-4.patch_02.1.ep5.el6.noarch",
"6Server-JBEAP-5:apache-cxf-0:2.2.12-4.patch_02.1.ep5.el6.src",
"6Server-JBEAP-5:cglib-0:2.2-5.5.ep5.el6.noarch",
"6Server-JBEAP-5:cglib-0:2.2-5.5.ep5.el6.src",
"6Server-JBEAP-5:facelets-0:1.1.15-3.B1_patch_01.2.ep5.el6.noarch",
"6Server-JBEAP-5:facelets-0:1.1.15-3.B1_patch_01.2.ep5.el6.src",
"6Server-JBEAP-5:glassfish-jaxb-0:2.1.12-10_patch_02.ep5.el6.noarch",
"6Server-JBEAP-5:glassfish-jaxb-0:2.1.12-10_patch_02.ep5.el6.src",
"6Server-JBEAP-5:glassfish-jsf-0:1.2_13-5_patch_01.3.ep5.el6.noarch",
"6Server-JBEAP-5:glassfish-jsf-0:1.2_13-5_patch_01.3.ep5.el6.src",
"6Server-JBEAP-5:jacorb-jboss-0:2.3.1-10.patch_03.4.ep5.el6.noarch",
"6Server-JBEAP-5:jacorb-jboss-0:2.3.1-10.patch_03.4.ep5.el6.src",
"6Server-JBEAP-5:jakarta-commons-logging-jboss-0:1.1-10.3_patch_02.1.ep5.el6.noarch",
"6Server-JBEAP-5:jakarta-commons-logging-jboss-0:1.1-10.3_patch_02.1.ep5.el6.src",
"6Server-JBEAP-5:jboss-aop2-0:2.1.6-2.CP03.1.1.ep5.el6.noarch",
"6Server-JBEAP-5:jboss-aop2-0:2.1.6-2.CP03.1.1.ep5.el6.src",
"6Server-JBEAP-5:jboss-cache-core-0:3.2.8-1.ep5.el6.noarch",
"6Server-JBEAP-5:jboss-cache-core-0:3.2.8-1.ep5.el6.src",
"6Server-JBEAP-5:jboss-cl-0:2.0.10-1.2.ep5.el6.noarch",
"6Server-JBEAP-5:jboss-cl-0:2.0.10-1.2.ep5.el6.src",
"6Server-JBEAP-5:jboss-cluster-ha-client-0:1.1.4-1.1.ep5.el6.noarch",
"6Server-JBEAP-5:jboss-cluster-ha-client-0:1.1.4-1.1.ep5.el6.src",
"6Server-JBEAP-5:jboss-common-core-0:2.2.18-1.1.ep5.el6.noarch",
"6Server-JBEAP-5:jboss-common-core-0:2.2.18-1.1.ep5.el6.src",
"6Server-JBEAP-5:jboss-eap5-native-0:5.1.2-1.4.ep5.el6.i386",
"6Server-JBEAP-5:jboss-eap5-native-0:5.1.2-1.4.ep5.el6.src",
"6Server-JBEAP-5:jboss-eap5-native-0:5.1.2-1.4.ep5.el6.x86_64",
"6Server-JBEAP-5:jboss-ejb3-core-0:1.3.8-0.1.ep5.el6.noarch",
"6Server-JBEAP-5:jboss-ejb3-core-0:1.3.8-0.1.ep5.el6.src",
"6Server-JBEAP-5:jboss-ejb3-proxy-clustered-0:1.0.3-2.SP1.1.ep5.el6.noarch",
"6Server-JBEAP-5:jboss-ejb3-proxy-clustered-0:1.0.3-2.SP1.1.ep5.el6.src",
"6Server-JBEAP-5:jboss-ejb3-proxy-impl-0:1.0.6-2.SP2.1.ep5.el6.noarch",
"6Server-JBEAP-5:jboss-ejb3-proxy-impl-0:1.0.6-2.SP2.1.ep5.el6.src",
"6Server-JBEAP-5:jboss-el-0:1.0_02-0.CR6.2.ep5.el6.noarch",
"6Server-JBEAP-5:jboss-el-0:1.0_02-0.CR6.2.ep5.el6.src",
"6Server-JBEAP-5:jboss-messaging-0:1.4.8-9.SP5.1.ep5.el6.noarch",
"6Server-JBEAP-5:jboss-messaging-0:1.4.8-9.SP5.1.ep5.el6.src",
"6Server-JBEAP-5:jboss-naming-0:5.0.3-3.CP01.3.ep5.el6.noarch",
"6Server-JBEAP-5:jboss-naming-0:5.0.3-3.CP01.3.ep5.el6.src",
"6Server-JBEAP-5:jboss-remoting-0:2.5.4-9.SP3.1.ep5.el6.noarch",
"6Server-JBEAP-5:jboss-remoting-0:2.5.4-9.SP3.1.ep5.el6.src",
"6Server-JBEAP-5:jboss-seam2-0:2.2.5.EAP5-7.ep5.el6.noarch",
"6Server-JBEAP-5:jboss-seam2-0:2.2.5.EAP5-7.ep5.el6.src",
"6Server-JBEAP-5:jboss-seam2-docs-0:2.2.5.EAP5-7.ep5.el6.noarch",
"6Server-JBEAP-5:jboss-seam2-examples-0:2.2.5.EAP5-7.ep5.el6.noarch",
"6Server-JBEAP-5:jboss-seam2-runtime-0:2.2.5.EAP5-7.ep5.el6.noarch",
"6Server-JBEAP-5:jboss-security-spi-1:2.0.4-6.SP8.1.ep5.el6.noarch",
"6Server-JBEAP-5:jboss-security-spi-1:2.0.4-6.SP8.1.ep5.el6.src",
"6Server-JBEAP-5:jbossas-0:5.1.2-8.ep5.el6.noarch",
"6Server-JBEAP-5:jbossas-0:5.1.2-8.ep5.el6.src",
"6Server-JBEAP-5:jbossas-client-0:5.1.2-8.ep5.el6.noarch",
"6Server-JBEAP-5:jbossas-messaging-0:5.1.2-8.ep5.el6.noarch",
"6Server-JBEAP-5:jbossas-tp-licenses-0:5.1.2-7.ep5.el6.noarch",
"6Server-JBEAP-5:jbossas-tp-licenses-0:5.1.2-7.ep5.el6.src",
"6Server-JBEAP-5:jbossas-ws-cxf-0:5.1.2-8.ep5.el6.noarch",
"6Server-JBEAP-5:jbossas-ws-cxf-0:5.1.2-8.ep5.el6.src",
"6Server-JBEAP-5:jbossas-ws-native-0:5.1.2-8.ep5.el6.noarch",
"6Server-JBEAP-5:jbosssx2-0:2.0.4-6.SP8.2.ep5.el6.noarch",
"6Server-JBEAP-5:jbosssx2-0:2.0.4-6.SP8.2.ep5.el6.src",
"6Server-JBEAP-5:jbossts-1:4.6.1-11.CP12.4.ep5.el6.noarch",
"6Server-JBEAP-5:jbossts-1:4.6.1-11.CP12.4.ep5.el6.src",
"6Server-JBEAP-5:jbossts-javadoc-1:4.6.1-11.CP12.4.ep5.el6.noarch",
"6Server-JBEAP-5:jbossweb-0:2.1.12-1.4_patch_01.ep5.el6.noarch",
"6Server-JBEAP-5:jbossweb-0:2.1.12-1.4_patch_01.ep5.el6.src",
"6Server-JBEAP-5:jbossweb-el-1.0-api-0:2.1.12-1.4_patch_01.ep5.el6.noarch",
"6Server-JBEAP-5:jbossweb-jsp-2.1-api-0:2.1.12-1.4_patch_01.ep5.el6.noarch",
"6Server-JBEAP-5:jbossweb-lib-0:2.1.12-1.4_patch_01.ep5.el6.noarch",
"6Server-JBEAP-5:jbossweb-servlet-2.5-api-0:2.1.12-1.4_patch_01.ep5.el6.noarch",
"6Server-JBEAP-5:jbossws-0:3.1.2-7.SP11.4.ep5.el6.noarch",
"6Server-JBEAP-5:jbossws-0:3.1.2-7.SP11.4.ep5.el6.src",
"6Server-JBEAP-5:jbossws-common-0:1.1.0-6.SP8_patch_01.1.ep5.el6.noarch",
"6Server-JBEAP-5:jbossws-common-0:1.1.0-6.SP8_patch_01.1.ep5.el6.src",
"6Server-JBEAP-5:jbossws-framework-0:3.1.2-6.SP10.1.ep5.el6.noarch",
"6Server-JBEAP-5:jbossws-framework-0:3.1.2-6.SP10.1.ep5.el6.src",
"6Server-JBEAP-5:jbossws-spi-0:1.1.2-5.SP7.1.ep5.el6.noarch",
"6Server-JBEAP-5:jbossws-spi-0:1.1.2-5.SP7.1.ep5.el6.src",
"6Server-JBEAP-5:jgroups-1:2.6.20-1.1.ep5.el6.noarch",
"6Server-JBEAP-5:jgroups-1:2.6.20-1.1.ep5.el6.src",
"6Server-JBEAP-5:jopr-embedded-0:1.3.4-18.SP5.8.ep5.el6.noarch",
"6Server-JBEAP-5:jopr-embedded-0:1.3.4-18.SP5.8.ep5.el6.src",
"6Server-JBEAP-5:jopr-hibernate-plugin-0:3.0.0-13.EmbJopr4.ep5.el6.noarch",
"6Server-JBEAP-5:jopr-hibernate-plugin-0:3.0.0-13.EmbJopr4.ep5.el6.src",
"6Server-JBEAP-5:jopr-jboss-as-5-plugin-0:3.0.0-12.EmbJopr4.ep5.el6.noarch",
"6Server-JBEAP-5:jopr-jboss-as-5-plugin-0:3.0.0-12.EmbJopr4.ep5.el6.src",
"6Server-JBEAP-5:jopr-jboss-cache-v3-plugin-0:3.0.0-14.EmbJopr4.ep5.el6.noarch",
"6Server-JBEAP-5:jopr-jboss-cache-v3-plugin-0:3.0.0-14.EmbJopr4.ep5.el6.src",
"6Server-JBEAP-5:mod_cluster-0:1.0.10-3.2.GA_CP02.ep5.el6.src",
"6Server-JBEAP-5:mod_cluster-demo-0:1.0.10-3.2.GA_CP02.ep5.el6.noarch",
"6Server-JBEAP-5:mod_cluster-jbossas-0:1.0.10-3.2.GA_CP02.ep5.el6.noarch",
"6Server-JBEAP-5:mod_cluster-jbossweb2-0:1.0.10-3.2.GA_CP02.ep5.el6.noarch",
"6Server-JBEAP-5:mod_cluster-native-0:1.0.10-3.1.1.GA_CP02.ep5.el6.i386",
"6Server-JBEAP-5:mod_cluster-native-0:1.0.10-3.1.1.GA_CP02.ep5.el6.src",
"6Server-JBEAP-5:mod_cluster-native-0:1.0.10-3.1.1.GA_CP02.ep5.el6.x86_64",
"6Server-JBEAP-5:mod_cluster-tomcat6-0:1.0.10-3.2.GA_CP02.ep5.el6.noarch",
"6Server-JBEAP-5:org-mc4j-ems-0:1.2.15.1-7.ep5.el6.noarch",
"6Server-JBEAP-5:org-mc4j-ems-0:1.2.15.1-7.ep5.el6.src",
"6Server-JBEAP-5:picketlink-federation-0:2.0.2-1.ep5.el6.noarch",
"6Server-JBEAP-5:picketlink-federation-0:2.0.2-1.ep5.el6.src",
"6Server-JBEAP-5:picketlink-federation-webapp-idp-0:2.0.2-1.ep5.el6.noarch",
"6Server-JBEAP-5:picketlink-federation-webapp-pdp-0:2.0.2-1.ep5.el6.noarch",
"6Server-JBEAP-5:picketlink-federation-webapp-sts-0:2.0.2-1.ep5.el6.noarch",
"6Server-JBEAP-5:resteasy-0:1.2.1-9.CP02.5.ep5.el6.noarch",
"6Server-JBEAP-5:resteasy-0:1.2.1-9.CP02.5.ep5.el6.src",
"6Server-JBEAP-5:resteasy-examples-0:1.2.1-9.CP02.5.ep5.el6.noarch",
"6Server-JBEAP-5:resteasy-javadoc-0:1.2.1-9.CP02.5.ep5.el6.noarch",
"6Server-JBEAP-5:resteasy-manual-0:1.2.1-9.CP02.5.ep5.el6.noarch",
"6Server-JBEAP-5:rh-eap-docs-0:5.1.2-6.ep5.el6.noarch",
"6Server-JBEAP-5:rh-eap-docs-0:5.1.2-6.ep5.el6.src",
"6Server-JBEAP-5:rh-eap-docs-examples-0:5.1.2-6.ep5.el6.noarch",
"6Server-JBEAP-5:rhq-0:3.0.0-20.EmbJopr4.ep5.el6.noarch",
"6Server-JBEAP-5:rhq-0:3.0.0-20.EmbJopr4.ep5.el6.src",
"6Server-JBEAP-5:rhq-ant-bundle-common-0:3.0.0-20.EmbJopr4.ep5.el6.noarch",
"6Server-JBEAP-5:rhq-common-parent-0:3.0.0-20.EmbJopr4.ep5.el6.noarch",
"6Server-JBEAP-5:rhq-core-client-api-0:3.0.0-20.EmbJopr4.ep5.el6.noarch",
"6Server-JBEAP-5:rhq-core-comm-api-0:3.0.0-20.EmbJopr4.ep5.el6.noarch",
"6Server-JBEAP-5:rhq-core-dbutils-0:3.0.0-20.EmbJopr4.ep5.el6.noarch",
"6Server-JBEAP-5:rhq-core-domain-0:3.0.0-20.EmbJopr4.ep5.el6.noarch",
"6Server-JBEAP-5:rhq-core-gui-0:3.0.0-20.EmbJopr4.ep5.el6.noarch",
"6Server-JBEAP-5:rhq-core-native-system-0:3.0.0-20.EmbJopr4.ep5.el6.noarch",
"6Server-JBEAP-5:rhq-core-parent-0:3.0.0-20.EmbJopr4.ep5.el6.noarch",
"6Server-JBEAP-5:rhq-core-plugin-api-0:3.0.0-20.EmbJopr4.ep5.el6.noarch",
"6Server-JBEAP-5:rhq-core-plugin-container-0:3.0.0-20.EmbJopr4.ep5.el6.noarch",
"6Server-JBEAP-5:rhq-core-plugindoc-0:3.0.0-20.EmbJopr4.ep5.el6.noarch",
"6Server-JBEAP-5:rhq-core-util-0:3.0.0-20.EmbJopr4.ep5.el6.noarch",
"6Server-JBEAP-5:rhq-filetemplate-bundle-common-0:3.0.0-20.EmbJopr4.ep5.el6.noarch",
"6Server-JBEAP-5:rhq-helpers-0:3.0.0-20.EmbJopr4.ep5.el6.noarch",
"6Server-JBEAP-5:rhq-jboss-as-common-0:3.0.0-20.EmbJopr4.ep5.el6.noarch",
"6Server-JBEAP-5:rhq-jmx-plugin-0:3.0.0-20.EmbJopr4.ep5.el6.noarch",
"6Server-JBEAP-5:rhq-jmx-plugin-0:3.0.0-20.EmbJopr4.ep5.el6.src",
"6Server-JBEAP-5:rhq-modules-parent-0:3.0.0-20.EmbJopr4.ep5.el6.noarch",
"6Server-JBEAP-5:rhq-parent-0:3.0.0-20.EmbJopr4.ep5.el6.noarch",
"6Server-JBEAP-5:rhq-platform-plugin-0:3.0.0-13.EmbJopr4.ep5.el6.noarch",
"6Server-JBEAP-5:rhq-platform-plugin-0:3.0.0-13.EmbJopr4.ep5.el6.src",
"6Server-JBEAP-5:rhq-plugin-validator-0:3.0.0-20.EmbJopr4.ep5.el6.noarch",
"6Server-JBEAP-5:rhq-pluginAnnotations-0:3.0.0-20.EmbJopr4.ep5.el6.noarch",
"6Server-JBEAP-5:rhq-pluginGen-0:3.0.0-20.EmbJopr4.ep5.el6.noarch",
"6Server-JBEAP-5:rhq-plugins-parent-0:3.0.0-20.EmbJopr4.ep5.el6.noarch",
"6Server-JBEAP-5:rhq-rtfilter-0:3.0.0-20.EmbJopr4.ep5.el6.noarch",
"6Server-JBEAP-5:slf4j-0:1.5.8-10_patch_01.2.ep5.el6.noarch",
"6Server-JBEAP-5:slf4j-0:1.5.8-10_patch_01.2.ep5.el6.src",
"6Server-JBEAP-5:xalan-j2-0:2.7.1-6_patch_05.1.ep5.el6.noarch",
"6Server-JBEAP-5:xalan-j2-0:2.7.1-6_patch_05.1.ep5.el6.src"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-4314"
},
{
"category": "external",
"summary": "RHBZ#754386",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=754386"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-4314",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-4314"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-4314",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-4314"
}
],
"release_date": "2011-05-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-12-08T19:13:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"6Server-JBEAP-5:apache-cxf-0:2.2.12-4.patch_02.1.ep5.el6.noarch",
"6Server-JBEAP-5:apache-cxf-0:2.2.12-4.patch_02.1.ep5.el6.src",
"6Server-JBEAP-5:cglib-0:2.2-5.5.ep5.el6.noarch",
"6Server-JBEAP-5:cglib-0:2.2-5.5.ep5.el6.src",
"6Server-JBEAP-5:facelets-0:1.1.15-3.B1_patch_01.2.ep5.el6.noarch",
"6Server-JBEAP-5:facelets-0:1.1.15-3.B1_patch_01.2.ep5.el6.src",
"6Server-JBEAP-5:glassfish-jaxb-0:2.1.12-10_patch_02.ep5.el6.noarch",
"6Server-JBEAP-5:glassfish-jaxb-0:2.1.12-10_patch_02.ep5.el6.src",
"6Server-JBEAP-5:glassfish-jsf-0:1.2_13-5_patch_01.3.ep5.el6.noarch",
"6Server-JBEAP-5:glassfish-jsf-0:1.2_13-5_patch_01.3.ep5.el6.src",
"6Server-JBEAP-5:jacorb-jboss-0:2.3.1-10.patch_03.4.ep5.el6.noarch",
"6Server-JBEAP-5:jacorb-jboss-0:2.3.1-10.patch_03.4.ep5.el6.src",
"6Server-JBEAP-5:jakarta-commons-logging-jboss-0:1.1-10.3_patch_02.1.ep5.el6.noarch",
"6Server-JBEAP-5:jakarta-commons-logging-jboss-0:1.1-10.3_patch_02.1.ep5.el6.src",
"6Server-JBEAP-5:jboss-aop2-0:2.1.6-2.CP03.1.1.ep5.el6.noarch",
"6Server-JBEAP-5:jboss-aop2-0:2.1.6-2.CP03.1.1.ep5.el6.src",
"6Server-JBEAP-5:jboss-cache-core-0:3.2.8-1.ep5.el6.noarch",
"6Server-JBEAP-5:jboss-cache-core-0:3.2.8-1.ep5.el6.src",
"6Server-JBEAP-5:jboss-cl-0:2.0.10-1.2.ep5.el6.noarch",
"6Server-JBEAP-5:jboss-cl-0:2.0.10-1.2.ep5.el6.src",
"6Server-JBEAP-5:jboss-cluster-ha-client-0:1.1.4-1.1.ep5.el6.noarch",
"6Server-JBEAP-5:jboss-cluster-ha-client-0:1.1.4-1.1.ep5.el6.src",
"6Server-JBEAP-5:jboss-common-core-0:2.2.18-1.1.ep5.el6.noarch",
"6Server-JBEAP-5:jboss-common-core-0:2.2.18-1.1.ep5.el6.src",
"6Server-JBEAP-5:jboss-eap5-native-0:5.1.2-1.4.ep5.el6.i386",
"6Server-JBEAP-5:jboss-eap5-native-0:5.1.2-1.4.ep5.el6.src",
"6Server-JBEAP-5:jboss-eap5-native-0:5.1.2-1.4.ep5.el6.x86_64",
"6Server-JBEAP-5:jboss-ejb3-core-0:1.3.8-0.1.ep5.el6.noarch",
"6Server-JBEAP-5:jboss-ejb3-core-0:1.3.8-0.1.ep5.el6.src",
"6Server-JBEAP-5:jboss-ejb3-proxy-clustered-0:1.0.3-2.SP1.1.ep5.el6.noarch",
"6Server-JBEAP-5:jboss-ejb3-proxy-clustered-0:1.0.3-2.SP1.1.ep5.el6.src",
"6Server-JBEAP-5:jboss-ejb3-proxy-impl-0:1.0.6-2.SP2.1.ep5.el6.noarch",
"6Server-JBEAP-5:jboss-ejb3-proxy-impl-0:1.0.6-2.SP2.1.ep5.el6.src",
"6Server-JBEAP-5:jboss-el-0:1.0_02-0.CR6.2.ep5.el6.noarch",
"6Server-JBEAP-5:jboss-el-0:1.0_02-0.CR6.2.ep5.el6.src",
"6Server-JBEAP-5:jboss-messaging-0:1.4.8-9.SP5.1.ep5.el6.noarch",
"6Server-JBEAP-5:jboss-messaging-0:1.4.8-9.SP5.1.ep5.el6.src",
"6Server-JBEAP-5:jboss-naming-0:5.0.3-3.CP01.3.ep5.el6.noarch",
"6Server-JBEAP-5:jboss-naming-0:5.0.3-3.CP01.3.ep5.el6.src",
"6Server-JBEAP-5:jboss-remoting-0:2.5.4-9.SP3.1.ep5.el6.noarch",
"6Server-JBEAP-5:jboss-remoting-0:2.5.4-9.SP3.1.ep5.el6.src",
"6Server-JBEAP-5:jboss-seam2-0:2.2.5.EAP5-7.ep5.el6.noarch",
"6Server-JBEAP-5:jboss-seam2-0:2.2.5.EAP5-7.ep5.el6.src",
"6Server-JBEAP-5:jboss-seam2-docs-0:2.2.5.EAP5-7.ep5.el6.noarch",
"6Server-JBEAP-5:jboss-seam2-examples-0:2.2.5.EAP5-7.ep5.el6.noarch",
"6Server-JBEAP-5:jboss-seam2-runtime-0:2.2.5.EAP5-7.ep5.el6.noarch",
"6Server-JBEAP-5:jboss-security-spi-1:2.0.4-6.SP8.1.ep5.el6.noarch",
"6Server-JBEAP-5:jboss-security-spi-1:2.0.4-6.SP8.1.ep5.el6.src",
"6Server-JBEAP-5:jbossas-0:5.1.2-8.ep5.el6.noarch",
"6Server-JBEAP-5:jbossas-0:5.1.2-8.ep5.el6.src",
"6Server-JBEAP-5:jbossas-client-0:5.1.2-8.ep5.el6.noarch",
"6Server-JBEAP-5:jbossas-messaging-0:5.1.2-8.ep5.el6.noarch",
"6Server-JBEAP-5:jbossas-tp-licenses-0:5.1.2-7.ep5.el6.noarch",
"6Server-JBEAP-5:jbossas-tp-licenses-0:5.1.2-7.ep5.el6.src",
"6Server-JBEAP-5:jbossas-ws-cxf-0:5.1.2-8.ep5.el6.noarch",
"6Server-JBEAP-5:jbossas-ws-cxf-0:5.1.2-8.ep5.el6.src",
"6Server-JBEAP-5:jbossas-ws-native-0:5.1.2-8.ep5.el6.noarch",
"6Server-JBEAP-5:jbosssx2-0:2.0.4-6.SP8.2.ep5.el6.noarch",
"6Server-JBEAP-5:jbosssx2-0:2.0.4-6.SP8.2.ep5.el6.src",
"6Server-JBEAP-5:jbossts-1:4.6.1-11.CP12.4.ep5.el6.noarch",
"6Server-JBEAP-5:jbossts-1:4.6.1-11.CP12.4.ep5.el6.src",
"6Server-JBEAP-5:jbossts-javadoc-1:4.6.1-11.CP12.4.ep5.el6.noarch",
"6Server-JBEAP-5:jbossweb-0:2.1.12-1.4_patch_01.ep5.el6.noarch",
"6Server-JBEAP-5:jbossweb-0:2.1.12-1.4_patch_01.ep5.el6.src",
"6Server-JBEAP-5:jbossweb-el-1.0-api-0:2.1.12-1.4_patch_01.ep5.el6.noarch",
"6Server-JBEAP-5:jbossweb-jsp-2.1-api-0:2.1.12-1.4_patch_01.ep5.el6.noarch",
"6Server-JBEAP-5:jbossweb-lib-0:2.1.12-1.4_patch_01.ep5.el6.noarch",
"6Server-JBEAP-5:jbossweb-servlet-2.5-api-0:2.1.12-1.4_patch_01.ep5.el6.noarch",
"6Server-JBEAP-5:jbossws-0:3.1.2-7.SP11.4.ep5.el6.noarch",
"6Server-JBEAP-5:jbossws-0:3.1.2-7.SP11.4.ep5.el6.src",
"6Server-JBEAP-5:jbossws-common-0:1.1.0-6.SP8_patch_01.1.ep5.el6.noarch",
"6Server-JBEAP-5:jbossws-common-0:1.1.0-6.SP8_patch_01.1.ep5.el6.src",
"6Server-JBEAP-5:jbossws-framework-0:3.1.2-6.SP10.1.ep5.el6.noarch",
"6Server-JBEAP-5:jbossws-framework-0:3.1.2-6.SP10.1.ep5.el6.src",
"6Server-JBEAP-5:jbossws-spi-0:1.1.2-5.SP7.1.ep5.el6.noarch",
"6Server-JBEAP-5:jbossws-spi-0:1.1.2-5.SP7.1.ep5.el6.src",
"6Server-JBEAP-5:jgroups-1:2.6.20-1.1.ep5.el6.noarch",
"6Server-JBEAP-5:jgroups-1:2.6.20-1.1.ep5.el6.src",
"6Server-JBEAP-5:jopr-embedded-0:1.3.4-18.SP5.8.ep5.el6.noarch",
"6Server-JBEAP-5:jopr-embedded-0:1.3.4-18.SP5.8.ep5.el6.src",
"6Server-JBEAP-5:jopr-hibernate-plugin-0:3.0.0-13.EmbJopr4.ep5.el6.noarch",
"6Server-JBEAP-5:jopr-hibernate-plugin-0:3.0.0-13.EmbJopr4.ep5.el6.src",
"6Server-JBEAP-5:jopr-jboss-as-5-plugin-0:3.0.0-12.EmbJopr4.ep5.el6.noarch",
"6Server-JBEAP-5:jopr-jboss-as-5-plugin-0:3.0.0-12.EmbJopr4.ep5.el6.src",
"6Server-JBEAP-5:jopr-jboss-cache-v3-plugin-0:3.0.0-14.EmbJopr4.ep5.el6.noarch",
"6Server-JBEAP-5:jopr-jboss-cache-v3-plugin-0:3.0.0-14.EmbJopr4.ep5.el6.src",
"6Server-JBEAP-5:mod_cluster-0:1.0.10-3.2.GA_CP02.ep5.el6.src",
"6Server-JBEAP-5:mod_cluster-demo-0:1.0.10-3.2.GA_CP02.ep5.el6.noarch",
"6Server-JBEAP-5:mod_cluster-jbossas-0:1.0.10-3.2.GA_CP02.ep5.el6.noarch",
"6Server-JBEAP-5:mod_cluster-jbossweb2-0:1.0.10-3.2.GA_CP02.ep5.el6.noarch",
"6Server-JBEAP-5:mod_cluster-native-0:1.0.10-3.1.1.GA_CP02.ep5.el6.i386",
"6Server-JBEAP-5:mod_cluster-native-0:1.0.10-3.1.1.GA_CP02.ep5.el6.src",
"6Server-JBEAP-5:mod_cluster-native-0:1.0.10-3.1.1.GA_CP02.ep5.el6.x86_64",
"6Server-JBEAP-5:mod_cluster-tomcat6-0:1.0.10-3.2.GA_CP02.ep5.el6.noarch",
"6Server-JBEAP-5:org-mc4j-ems-0:1.2.15.1-7.ep5.el6.noarch",
"6Server-JBEAP-5:org-mc4j-ems-0:1.2.15.1-7.ep5.el6.src",
"6Server-JBEAP-5:picketlink-federation-0:2.0.2-1.ep5.el6.noarch",
"6Server-JBEAP-5:picketlink-federation-0:2.0.2-1.ep5.el6.src",
"6Server-JBEAP-5:picketlink-federation-webapp-idp-0:2.0.2-1.ep5.el6.noarch",
"6Server-JBEAP-5:picketlink-federation-webapp-pdp-0:2.0.2-1.ep5.el6.noarch",
"6Server-JBEAP-5:picketlink-federation-webapp-sts-0:2.0.2-1.ep5.el6.noarch",
"6Server-JBEAP-5:resteasy-0:1.2.1-9.CP02.5.ep5.el6.noarch",
"6Server-JBEAP-5:resteasy-0:1.2.1-9.CP02.5.ep5.el6.src",
"6Server-JBEAP-5:resteasy-examples-0:1.2.1-9.CP02.5.ep5.el6.noarch",
"6Server-JBEAP-5:resteasy-javadoc-0:1.2.1-9.CP02.5.ep5.el6.noarch",
"6Server-JBEAP-5:resteasy-manual-0:1.2.1-9.CP02.5.ep5.el6.noarch",
"6Server-JBEAP-5:rh-eap-docs-0:5.1.2-6.ep5.el6.noarch",
"6Server-JBEAP-5:rh-eap-docs-0:5.1.2-6.ep5.el6.src",
"6Server-JBEAP-5:rh-eap-docs-examples-0:5.1.2-6.ep5.el6.noarch",
"6Server-JBEAP-5:rhq-0:3.0.0-20.EmbJopr4.ep5.el6.noarch",
"6Server-JBEAP-5:rhq-0:3.0.0-20.EmbJopr4.ep5.el6.src",
"6Server-JBEAP-5:rhq-ant-bundle-common-0:3.0.0-20.EmbJopr4.ep5.el6.noarch",
"6Server-JBEAP-5:rhq-common-parent-0:3.0.0-20.EmbJopr4.ep5.el6.noarch",
"6Server-JBEAP-5:rhq-core-client-api-0:3.0.0-20.EmbJopr4.ep5.el6.noarch",
"6Server-JBEAP-5:rhq-core-comm-api-0:3.0.0-20.EmbJopr4.ep5.el6.noarch",
"6Server-JBEAP-5:rhq-core-dbutils-0:3.0.0-20.EmbJopr4.ep5.el6.noarch",
"6Server-JBEAP-5:rhq-core-domain-0:3.0.0-20.EmbJopr4.ep5.el6.noarch",
"6Server-JBEAP-5:rhq-core-gui-0:3.0.0-20.EmbJopr4.ep5.el6.noarch",
"6Server-JBEAP-5:rhq-core-native-system-0:3.0.0-20.EmbJopr4.ep5.el6.noarch",
"6Server-JBEAP-5:rhq-core-parent-0:3.0.0-20.EmbJopr4.ep5.el6.noarch",
"6Server-JBEAP-5:rhq-core-plugin-api-0:3.0.0-20.EmbJopr4.ep5.el6.noarch",
"6Server-JBEAP-5:rhq-core-plugin-container-0:3.0.0-20.EmbJopr4.ep5.el6.noarch",
"6Server-JBEAP-5:rhq-core-plugindoc-0:3.0.0-20.EmbJopr4.ep5.el6.noarch",
"6Server-JBEAP-5:rhq-core-util-0:3.0.0-20.EmbJopr4.ep5.el6.noarch",
"6Server-JBEAP-5:rhq-filetemplate-bundle-common-0:3.0.0-20.EmbJopr4.ep5.el6.noarch",
"6Server-JBEAP-5:rhq-helpers-0:3.0.0-20.EmbJopr4.ep5.el6.noarch",
"6Server-JBEAP-5:rhq-jboss-as-common-0:3.0.0-20.EmbJopr4.ep5.el6.noarch",
"6Server-JBEAP-5:rhq-jmx-plugin-0:3.0.0-20.EmbJopr4.ep5.el6.noarch",
"6Server-JBEAP-5:rhq-jmx-plugin-0:3.0.0-20.EmbJopr4.ep5.el6.src",
"6Server-JBEAP-5:rhq-modules-parent-0:3.0.0-20.EmbJopr4.ep5.el6.noarch",
"6Server-JBEAP-5:rhq-parent-0:3.0.0-20.EmbJopr4.ep5.el6.noarch",
"6Server-JBEAP-5:rhq-platform-plugin-0:3.0.0-13.EmbJopr4.ep5.el6.noarch",
"6Server-JBEAP-5:rhq-platform-plugin-0:3.0.0-13.EmbJopr4.ep5.el6.src",
"6Server-JBEAP-5:rhq-plugin-validator-0:3.0.0-20.EmbJopr4.ep5.el6.noarch",
"6Server-JBEAP-5:rhq-pluginAnnotations-0:3.0.0-20.EmbJopr4.ep5.el6.noarch",
"6Server-JBEAP-5:rhq-pluginGen-0:3.0.0-20.EmbJopr4.ep5.el6.noarch",
"6Server-JBEAP-5:rhq-plugins-parent-0:3.0.0-20.EmbJopr4.ep5.el6.noarch",
"6Server-JBEAP-5:rhq-rtfilter-0:3.0.0-20.EmbJopr4.ep5.el6.noarch",
"6Server-JBEAP-5:slf4j-0:1.5.8-10_patch_01.2.ep5.el6.noarch",
"6Server-JBEAP-5:slf4j-0:1.5.8-10_patch_01.2.ep5.el6.src",
"6Server-JBEAP-5:xalan-j2-0:2.7.1-6_patch_05.1.ep5.el6.noarch",
"6Server-JBEAP-5:xalan-j2-0:2.7.1-6_patch_05.1.ep5.el6.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:1798"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"products": [
"6Server-JBEAP-5:apache-cxf-0:2.2.12-4.patch_02.1.ep5.el6.noarch",
"6Server-JBEAP-5:apache-cxf-0:2.2.12-4.patch_02.1.ep5.el6.src",
"6Server-JBEAP-5:cglib-0:2.2-5.5.ep5.el6.noarch",
"6Server-JBEAP-5:cglib-0:2.2-5.5.ep5.el6.src",
"6Server-JBEAP-5:facelets-0:1.1.15-3.B1_patch_01.2.ep5.el6.noarch",
"6Server-JBEAP-5:facelets-0:1.1.15-3.B1_patch_01.2.ep5.el6.src",
"6Server-JBEAP-5:glassfish-jaxb-0:2.1.12-10_patch_02.ep5.el6.noarch",
"6Server-JBEAP-5:glassfish-jaxb-0:2.1.12-10_patch_02.ep5.el6.src",
"6Server-JBEAP-5:glassfish-jsf-0:1.2_13-5_patch_01.3.ep5.el6.noarch",
"6Server-JBEAP-5:glassfish-jsf-0:1.2_13-5_patch_01.3.ep5.el6.src",
"6Server-JBEAP-5:jacorb-jboss-0:2.3.1-10.patch_03.4.ep5.el6.noarch",
"6Server-JBEAP-5:jacorb-jboss-0:2.3.1-10.patch_03.4.ep5.el6.src",
"6Server-JBEAP-5:jakarta-commons-logging-jboss-0:1.1-10.3_patch_02.1.ep5.el6.noarch",
"6Server-JBEAP-5:jakarta-commons-logging-jboss-0:1.1-10.3_patch_02.1.ep5.el6.src",
"6Server-JBEAP-5:jboss-aop2-0:2.1.6-2.CP03.1.1.ep5.el6.noarch",
"6Server-JBEAP-5:jboss-aop2-0:2.1.6-2.CP03.1.1.ep5.el6.src",
"6Server-JBEAP-5:jboss-cache-core-0:3.2.8-1.ep5.el6.noarch",
"6Server-JBEAP-5:jboss-cache-core-0:3.2.8-1.ep5.el6.src",
"6Server-JBEAP-5:jboss-cl-0:2.0.10-1.2.ep5.el6.noarch",
"6Server-JBEAP-5:jboss-cl-0:2.0.10-1.2.ep5.el6.src",
"6Server-JBEAP-5:jboss-cluster-ha-client-0:1.1.4-1.1.ep5.el6.noarch",
"6Server-JBEAP-5:jboss-cluster-ha-client-0:1.1.4-1.1.ep5.el6.src",
"6Server-JBEAP-5:jboss-common-core-0:2.2.18-1.1.ep5.el6.noarch",
"6Server-JBEAP-5:jboss-common-core-0:2.2.18-1.1.ep5.el6.src",
"6Server-JBEAP-5:jboss-eap5-native-0:5.1.2-1.4.ep5.el6.i386",
"6Server-JBEAP-5:jboss-eap5-native-0:5.1.2-1.4.ep5.el6.src",
"6Server-JBEAP-5:jboss-eap5-native-0:5.1.2-1.4.ep5.el6.x86_64",
"6Server-JBEAP-5:jboss-ejb3-core-0:1.3.8-0.1.ep5.el6.noarch",
"6Server-JBEAP-5:jboss-ejb3-core-0:1.3.8-0.1.ep5.el6.src",
"6Server-JBEAP-5:jboss-ejb3-proxy-clustered-0:1.0.3-2.SP1.1.ep5.el6.noarch",
"6Server-JBEAP-5:jboss-ejb3-proxy-clustered-0:1.0.3-2.SP1.1.ep5.el6.src",
"6Server-JBEAP-5:jboss-ejb3-proxy-impl-0:1.0.6-2.SP2.1.ep5.el6.noarch",
"6Server-JBEAP-5:jboss-ejb3-proxy-impl-0:1.0.6-2.SP2.1.ep5.el6.src",
"6Server-JBEAP-5:jboss-el-0:1.0_02-0.CR6.2.ep5.el6.noarch",
"6Server-JBEAP-5:jboss-el-0:1.0_02-0.CR6.2.ep5.el6.src",
"6Server-JBEAP-5:jboss-messaging-0:1.4.8-9.SP5.1.ep5.el6.noarch",
"6Server-JBEAP-5:jboss-messaging-0:1.4.8-9.SP5.1.ep5.el6.src",
"6Server-JBEAP-5:jboss-naming-0:5.0.3-3.CP01.3.ep5.el6.noarch",
"6Server-JBEAP-5:jboss-naming-0:5.0.3-3.CP01.3.ep5.el6.src",
"6Server-JBEAP-5:jboss-remoting-0:2.5.4-9.SP3.1.ep5.el6.noarch",
"6Server-JBEAP-5:jboss-remoting-0:2.5.4-9.SP3.1.ep5.el6.src",
"6Server-JBEAP-5:jboss-seam2-0:2.2.5.EAP5-7.ep5.el6.noarch",
"6Server-JBEAP-5:jboss-seam2-0:2.2.5.EAP5-7.ep5.el6.src",
"6Server-JBEAP-5:jboss-seam2-docs-0:2.2.5.EAP5-7.ep5.el6.noarch",
"6Server-JBEAP-5:jboss-seam2-examples-0:2.2.5.EAP5-7.ep5.el6.noarch",
"6Server-JBEAP-5:jboss-seam2-runtime-0:2.2.5.EAP5-7.ep5.el6.noarch",
"6Server-JBEAP-5:jboss-security-spi-1:2.0.4-6.SP8.1.ep5.el6.noarch",
"6Server-JBEAP-5:jboss-security-spi-1:2.0.4-6.SP8.1.ep5.el6.src",
"6Server-JBEAP-5:jbossas-0:5.1.2-8.ep5.el6.noarch",
"6Server-JBEAP-5:jbossas-0:5.1.2-8.ep5.el6.src",
"6Server-JBEAP-5:jbossas-client-0:5.1.2-8.ep5.el6.noarch",
"6Server-JBEAP-5:jbossas-messaging-0:5.1.2-8.ep5.el6.noarch",
"6Server-JBEAP-5:jbossas-tp-licenses-0:5.1.2-7.ep5.el6.noarch",
"6Server-JBEAP-5:jbossas-tp-licenses-0:5.1.2-7.ep5.el6.src",
"6Server-JBEAP-5:jbossas-ws-cxf-0:5.1.2-8.ep5.el6.noarch",
"6Server-JBEAP-5:jbossas-ws-cxf-0:5.1.2-8.ep5.el6.src",
"6Server-JBEAP-5:jbossas-ws-native-0:5.1.2-8.ep5.el6.noarch",
"6Server-JBEAP-5:jbosssx2-0:2.0.4-6.SP8.2.ep5.el6.noarch",
"6Server-JBEAP-5:jbosssx2-0:2.0.4-6.SP8.2.ep5.el6.src",
"6Server-JBEAP-5:jbossts-1:4.6.1-11.CP12.4.ep5.el6.noarch",
"6Server-JBEAP-5:jbossts-1:4.6.1-11.CP12.4.ep5.el6.src",
"6Server-JBEAP-5:jbossts-javadoc-1:4.6.1-11.CP12.4.ep5.el6.noarch",
"6Server-JBEAP-5:jbossweb-0:2.1.12-1.4_patch_01.ep5.el6.noarch",
"6Server-JBEAP-5:jbossweb-0:2.1.12-1.4_patch_01.ep5.el6.src",
"6Server-JBEAP-5:jbossweb-el-1.0-api-0:2.1.12-1.4_patch_01.ep5.el6.noarch",
"6Server-JBEAP-5:jbossweb-jsp-2.1-api-0:2.1.12-1.4_patch_01.ep5.el6.noarch",
"6Server-JBEAP-5:jbossweb-lib-0:2.1.12-1.4_patch_01.ep5.el6.noarch",
"6Server-JBEAP-5:jbossweb-servlet-2.5-api-0:2.1.12-1.4_patch_01.ep5.el6.noarch",
"6Server-JBEAP-5:jbossws-0:3.1.2-7.SP11.4.ep5.el6.noarch",
"6Server-JBEAP-5:jbossws-0:3.1.2-7.SP11.4.ep5.el6.src",
"6Server-JBEAP-5:jbossws-common-0:1.1.0-6.SP8_patch_01.1.ep5.el6.noarch",
"6Server-JBEAP-5:jbossws-common-0:1.1.0-6.SP8_patch_01.1.ep5.el6.src",
"6Server-JBEAP-5:jbossws-framework-0:3.1.2-6.SP10.1.ep5.el6.noarch",
"6Server-JBEAP-5:jbossws-framework-0:3.1.2-6.SP10.1.ep5.el6.src",
"6Server-JBEAP-5:jbossws-spi-0:1.1.2-5.SP7.1.ep5.el6.noarch",
"6Server-JBEAP-5:jbossws-spi-0:1.1.2-5.SP7.1.ep5.el6.src",
"6Server-JBEAP-5:jgroups-1:2.6.20-1.1.ep5.el6.noarch",
"6Server-JBEAP-5:jgroups-1:2.6.20-1.1.ep5.el6.src",
"6Server-JBEAP-5:jopr-embedded-0:1.3.4-18.SP5.8.ep5.el6.noarch",
"6Server-JBEAP-5:jopr-embedded-0:1.3.4-18.SP5.8.ep5.el6.src",
"6Server-JBEAP-5:jopr-hibernate-plugin-0:3.0.0-13.EmbJopr4.ep5.el6.noarch",
"6Server-JBEAP-5:jopr-hibernate-plugin-0:3.0.0-13.EmbJopr4.ep5.el6.src",
"6Server-JBEAP-5:jopr-jboss-as-5-plugin-0:3.0.0-12.EmbJopr4.ep5.el6.noarch",
"6Server-JBEAP-5:jopr-jboss-as-5-plugin-0:3.0.0-12.EmbJopr4.ep5.el6.src",
"6Server-JBEAP-5:jopr-jboss-cache-v3-plugin-0:3.0.0-14.EmbJopr4.ep5.el6.noarch",
"6Server-JBEAP-5:jopr-jboss-cache-v3-plugin-0:3.0.0-14.EmbJopr4.ep5.el6.src",
"6Server-JBEAP-5:mod_cluster-0:1.0.10-3.2.GA_CP02.ep5.el6.src",
"6Server-JBEAP-5:mod_cluster-demo-0:1.0.10-3.2.GA_CP02.ep5.el6.noarch",
"6Server-JBEAP-5:mod_cluster-jbossas-0:1.0.10-3.2.GA_CP02.ep5.el6.noarch",
"6Server-JBEAP-5:mod_cluster-jbossweb2-0:1.0.10-3.2.GA_CP02.ep5.el6.noarch",
"6Server-JBEAP-5:mod_cluster-native-0:1.0.10-3.1.1.GA_CP02.ep5.el6.i386",
"6Server-JBEAP-5:mod_cluster-native-0:1.0.10-3.1.1.GA_CP02.ep5.el6.src",
"6Server-JBEAP-5:mod_cluster-native-0:1.0.10-3.1.1.GA_CP02.ep5.el6.x86_64",
"6Server-JBEAP-5:mod_cluster-tomcat6-0:1.0.10-3.2.GA_CP02.ep5.el6.noarch",
"6Server-JBEAP-5:org-mc4j-ems-0:1.2.15.1-7.ep5.el6.noarch",
"6Server-JBEAP-5:org-mc4j-ems-0:1.2.15.1-7.ep5.el6.src",
"6Server-JBEAP-5:picketlink-federation-0:2.0.2-1.ep5.el6.noarch",
"6Server-JBEAP-5:picketlink-federation-0:2.0.2-1.ep5.el6.src",
"6Server-JBEAP-5:picketlink-federation-webapp-idp-0:2.0.2-1.ep5.el6.noarch",
"6Server-JBEAP-5:picketlink-federation-webapp-pdp-0:2.0.2-1.ep5.el6.noarch",
"6Server-JBEAP-5:picketlink-federation-webapp-sts-0:2.0.2-1.ep5.el6.noarch",
"6Server-JBEAP-5:resteasy-0:1.2.1-9.CP02.5.ep5.el6.noarch",
"6Server-JBEAP-5:resteasy-0:1.2.1-9.CP02.5.ep5.el6.src",
"6Server-JBEAP-5:resteasy-examples-0:1.2.1-9.CP02.5.ep5.el6.noarch",
"6Server-JBEAP-5:resteasy-javadoc-0:1.2.1-9.CP02.5.ep5.el6.noarch",
"6Server-JBEAP-5:resteasy-manual-0:1.2.1-9.CP02.5.ep5.el6.noarch",
"6Server-JBEAP-5:rh-eap-docs-0:5.1.2-6.ep5.el6.noarch",
"6Server-JBEAP-5:rh-eap-docs-0:5.1.2-6.ep5.el6.src",
"6Server-JBEAP-5:rh-eap-docs-examples-0:5.1.2-6.ep5.el6.noarch",
"6Server-JBEAP-5:rhq-0:3.0.0-20.EmbJopr4.ep5.el6.noarch",
"6Server-JBEAP-5:rhq-0:3.0.0-20.EmbJopr4.ep5.el6.src",
"6Server-JBEAP-5:rhq-ant-bundle-common-0:3.0.0-20.EmbJopr4.ep5.el6.noarch",
"6Server-JBEAP-5:rhq-common-parent-0:3.0.0-20.EmbJopr4.ep5.el6.noarch",
"6Server-JBEAP-5:rhq-core-client-api-0:3.0.0-20.EmbJopr4.ep5.el6.noarch",
"6Server-JBEAP-5:rhq-core-comm-api-0:3.0.0-20.EmbJopr4.ep5.el6.noarch",
"6Server-JBEAP-5:rhq-core-dbutils-0:3.0.0-20.EmbJopr4.ep5.el6.noarch",
"6Server-JBEAP-5:rhq-core-domain-0:3.0.0-20.EmbJopr4.ep5.el6.noarch",
"6Server-JBEAP-5:rhq-core-gui-0:3.0.0-20.EmbJopr4.ep5.el6.noarch",
"6Server-JBEAP-5:rhq-core-native-system-0:3.0.0-20.EmbJopr4.ep5.el6.noarch",
"6Server-JBEAP-5:rhq-core-parent-0:3.0.0-20.EmbJopr4.ep5.el6.noarch",
"6Server-JBEAP-5:rhq-core-plugin-api-0:3.0.0-20.EmbJopr4.ep5.el6.noarch",
"6Server-JBEAP-5:rhq-core-plugin-container-0:3.0.0-20.EmbJopr4.ep5.el6.noarch",
"6Server-JBEAP-5:rhq-core-plugindoc-0:3.0.0-20.EmbJopr4.ep5.el6.noarch",
"6Server-JBEAP-5:rhq-core-util-0:3.0.0-20.EmbJopr4.ep5.el6.noarch",
"6Server-JBEAP-5:rhq-filetemplate-bundle-common-0:3.0.0-20.EmbJopr4.ep5.el6.noarch",
"6Server-JBEAP-5:rhq-helpers-0:3.0.0-20.EmbJopr4.ep5.el6.noarch",
"6Server-JBEAP-5:rhq-jboss-as-common-0:3.0.0-20.EmbJopr4.ep5.el6.noarch",
"6Server-JBEAP-5:rhq-jmx-plugin-0:3.0.0-20.EmbJopr4.ep5.el6.noarch",
"6Server-JBEAP-5:rhq-jmx-plugin-0:3.0.0-20.EmbJopr4.ep5.el6.src",
"6Server-JBEAP-5:rhq-modules-parent-0:3.0.0-20.EmbJopr4.ep5.el6.noarch",
"6Server-JBEAP-5:rhq-parent-0:3.0.0-20.EmbJopr4.ep5.el6.noarch",
"6Server-JBEAP-5:rhq-platform-plugin-0:3.0.0-13.EmbJopr4.ep5.el6.noarch",
"6Server-JBEAP-5:rhq-platform-plugin-0:3.0.0-13.EmbJopr4.ep5.el6.src",
"6Server-JBEAP-5:rhq-plugin-validator-0:3.0.0-20.EmbJopr4.ep5.el6.noarch",
"6Server-JBEAP-5:rhq-pluginAnnotations-0:3.0.0-20.EmbJopr4.ep5.el6.noarch",
"6Server-JBEAP-5:rhq-pluginGen-0:3.0.0-20.EmbJopr4.ep5.el6.noarch",
"6Server-JBEAP-5:rhq-plugins-parent-0:3.0.0-20.EmbJopr4.ep5.el6.noarch",
"6Server-JBEAP-5:rhq-rtfilter-0:3.0.0-20.EmbJopr4.ep5.el6.noarch",
"6Server-JBEAP-5:slf4j-0:1.5.8-10_patch_01.2.ep5.el6.noarch",
"6Server-JBEAP-5:slf4j-0:1.5.8-10_patch_01.2.ep5.el6.src",
"6Server-JBEAP-5:xalan-j2-0:2.7.1-6_patch_05.1.ep5.el6.noarch",
"6Server-JBEAP-5:xalan-j2-0:2.7.1-6_patch_05.1.ep5.el6.src"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "extension): MITM due to improper validation of AX attribute signatures"
}
]
}
RHSA-2011:1799
Vulnerability from csaf_redhat - Published: 2011-12-08 19:30 - Updated: 2025-11-21 17:39The servlets invoked by httpha-invoker in JBoss Enterprise Application Platform before 5.1.2, SOA Platform before 5.2.0, BRMS Platform before 5.3.0, and Portal Platform before 4.3 CP07 perform access control only for the GET and POST methods, which allow remote attackers to bypass authentication by sending a request with a different method. NOTE: this vulnerability exists because of a CVE-2010-0738 regression.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 5Server-JBEAP-5:apache-cxf-0:2.2.12-4.patch_02.1.1.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEAP-5:apache-cxf-0:2.2.12-4.patch_02.1.1.ep5.el5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEAP-5:cglib-0:2.2-5.3.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEAP-5:cglib-0:2.2-5.3.ep5.el5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEAP-5:facelets-0:1.1.15-3.B1_patch_01.2.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEAP-5:facelets-0:1.1.15-3.B1_patch_01.2.ep5.el5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEAP-5:glassfish-jaxb-0:2.1.12-10_patch_02.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEAP-5:glassfish-jaxb-0:2.1.12-10_patch_02.ep5.el5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEAP-5:glassfish-jsf-0:1.2_13-5_patch_01.3.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEAP-5:glassfish-jsf-0:1.2_13-5_patch_01.3.ep5.el5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEAP-5:jacorb-jboss-0:2.3.1-10.patch_03.4.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEAP-5:jacorb-jboss-0:2.3.1-10.patch_03.4.ep5.el5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEAP-5:jakarta-commons-logging-jboss-0:1.1-10.3_patch_02.1.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEAP-5:jakarta-commons-logging-jboss-0:1.1-10.3_patch_02.1.ep5.el5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEAP-5:jboss-aop2-0:2.1.6-2.CP03.1.1.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEAP-5:jboss-aop2-0:2.1.6-2.CP03.1.1.ep5.el5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEAP-5:jboss-cache-core-0:3.2.8-1.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEAP-5:jboss-cache-core-0:3.2.8-1.ep5.el5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEAP-5:jboss-cl-0:2.0.10-1.2.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEAP-5:jboss-cl-0:2.0.10-1.2.ep5.el5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEAP-5:jboss-cluster-ha-client-0:1.1.4-1.1.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEAP-5:jboss-cluster-ha-client-0:1.1.4-1.1.ep5.el5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEAP-5:jboss-common-core-0:2.2.18-1.1.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEAP-5:jboss-common-core-0:2.2.18-1.1.ep5.el5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEAP-5:jboss-eap5-native-0:5.1.2-1.4.ep5.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEAP-5:jboss-eap5-native-0:5.1.2-1.4.ep5.el5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEAP-5:jboss-eap5-native-0:5.1.2-1.4.ep5.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEAP-5:jboss-ejb3-core-0:1.3.8-0.1.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEAP-5:jboss-ejb3-core-0:1.3.8-0.1.ep5.el5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEAP-5:jboss-ejb3-proxy-clustered-0:1.0.3-2.SP1.1.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEAP-5:jboss-ejb3-proxy-clustered-0:1.0.3-2.SP1.1.ep5.el5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEAP-5:jboss-ejb3-proxy-impl-0:1.0.6-2.SP2.1.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEAP-5:jboss-ejb3-proxy-impl-0:1.0.6-2.SP2.1.ep5.el5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEAP-5:jboss-el-0:1.0_02-0.CR6.2.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEAP-5:jboss-el-0:1.0_02-0.CR6.2.ep5.el5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEAP-5:jboss-messaging-0:1.4.8-9.SP5.1.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEAP-5:jboss-messaging-0:1.4.8-9.SP5.1.ep5.el5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEAP-5:jboss-naming-0:5.0.3-3.CP01.3.1.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEAP-5:jboss-naming-0:5.0.3-3.CP01.3.1.ep5.el5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEAP-5:jboss-remoting-0:2.5.4-9.SP3.1.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEAP-5:jboss-remoting-0:2.5.4-9.SP3.1.ep5.el5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEAP-5:jboss-seam2-0:2.2.5.EAP5-5.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEAP-5:jboss-seam2-0:2.2.5.EAP5-5.ep5.el5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEAP-5:jboss-seam2-docs-0:2.2.5.EAP5-5.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEAP-5:jboss-seam2-examples-0:2.2.5.EAP5-5.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEAP-5:jboss-seam2-runtime-0:2.2.5.EAP5-5.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEAP-5:jboss-security-spi-1:2.0.4-6.SP8.1.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEAP-5:jboss-security-spi-1:2.0.4-6.SP8.1.ep5.el5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEAP-5:jbossas-0:5.1.2-8.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEAP-5:jbossas-0:5.1.2-8.ep5.el5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEAP-5:jbossas-client-0:5.1.2-8.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEAP-5:jbossas-messaging-0:5.1.2-8.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEAP-5:jbossas-tp-licenses-0:5.1.2-7.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEAP-5:jbossas-tp-licenses-0:5.1.2-7.ep5.el5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEAP-5:jbossas-ws-cxf-0:5.1.2-8.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEAP-5:jbossas-ws-cxf-0:5.1.2-8.ep5.el5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEAP-5:jbossas-ws-native-0:5.1.2-8.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEAP-5:jbosssx2-0:2.0.4-6.SP8.2.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEAP-5:jbosssx2-0:2.0.4-6.SP8.2.ep5.el5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEAP-5:jbossts-1:4.6.1-11.CP12.4.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEAP-5:jbossts-1:4.6.1-11.CP12.4.ep5.el5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEAP-5:jbossts-javadoc-1:4.6.1-11.CP12.4.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEAP-5:jbossweb-0:2.1.12-1.4_patch_01.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEAP-5:jbossweb-0:2.1.12-1.4_patch_01.ep5.el5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEAP-5:jbossweb-el-1.0-api-0:2.1.12-1.4_patch_01.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEAP-5:jbossweb-jsp-2.1-api-0:2.1.12-1.4_patch_01.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEAP-5:jbossweb-lib-0:2.1.12-1.4_patch_01.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEAP-5:jbossweb-servlet-2.5-api-0:2.1.12-1.4_patch_01.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEAP-5:jbossws-0:3.1.2-7.SP11.4.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEAP-5:jbossws-0:3.1.2-7.SP11.4.ep5.el5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEAP-5:jbossws-common-0:1.1.0-6.SP8_patch_01.1.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEAP-5:jbossws-common-0:1.1.0-6.SP8_patch_01.1.ep5.el5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEAP-5:jbossws-framework-0:3.1.2-6.SP10.2.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEAP-5:jbossws-framework-0:3.1.2-6.SP10.2.ep5.el5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEAP-5:jbossws-spi-0:1.1.2-5.SP7.1.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEAP-5:jbossws-spi-0:1.1.2-5.SP7.1.ep5.el5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEAP-5:jgroups-1:2.6.20-1.1.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEAP-5:jgroups-1:2.6.20-1.1.ep5.el5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEAP-5:jopr-embedded-0:1.3.4-18.SP5.8.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEAP-5:jopr-embedded-0:1.3.4-18.SP5.8.ep5.el5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEAP-5:jopr-hibernate-plugin-0:3.0.0-13.EmbJopr4.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEAP-5:jopr-hibernate-plugin-0:3.0.0-13.EmbJopr4.ep5.el5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEAP-5:jopr-jboss-as-5-plugin-0:3.0.0-12.EmbJopr4.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEAP-5:jopr-jboss-as-5-plugin-0:3.0.0-12.EmbJopr4.ep5.el5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEAP-5:jopr-jboss-cache-v3-plugin-0:3.0.0-14.EmbJopr4.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEAP-5:jopr-jboss-cache-v3-plugin-0:3.0.0-14.EmbJopr4.ep5.el5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEAP-5:mod_cluster-0:1.0.10-3.1.GA_CP02.ep5.el5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEAP-5:mod_cluster-demo-0:1.0.10-3.1.GA_CP02.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEAP-5:mod_cluster-jbossas-0:1.0.10-3.1.GA_CP02.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEAP-5:mod_cluster-jbossweb2-0:1.0.10-3.1.GA_CP02.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEAP-5:mod_cluster-native-0:1.0.10-3.1.GA_CP02.ep5.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEAP-5:mod_cluster-native-0:1.0.10-3.1.GA_CP02.ep5.el5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEAP-5:mod_cluster-native-0:1.0.10-3.1.GA_CP02.ep5.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEAP-5:mod_cluster-tomcat6-0:1.0.10-3.1.GA_CP02.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEAP-5:org-mc4j-ems-0:1.2.15.1-4.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEAP-5:org-mc4j-ems-0:1.2.15.1-4.ep5.el5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEAP-5:picketlink-federation-0:2.0.2-1.1.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEAP-5:picketlink-federation-0:2.0.2-1.1.ep5.el5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEAP-5:picketlink-federation-webapp-idp-0:2.0.2-1.1.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEAP-5:picketlink-federation-webapp-pdp-0:2.0.2-1.1.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEAP-5:picketlink-federation-webapp-sts-0:2.0.2-1.1.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEAP-5:resteasy-0:1.2.1-9.CP02.4.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEAP-5:resteasy-0:1.2.1-9.CP02.4.ep5.el5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEAP-5:resteasy-examples-0:1.2.1-9.CP02.4.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEAP-5:resteasy-javadoc-0:1.2.1-9.CP02.4.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEAP-5:resteasy-manual-0:1.2.1-9.CP02.4.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEAP-5:rh-eap-docs-0:5.1.2-6.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEAP-5:rh-eap-docs-0:5.1.2-6.ep5.el5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEAP-5:rh-eap-docs-examples-0:5.1.2-6.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEAP-5:rhq-0:3.0.0-20.EmbJopr4.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEAP-5:rhq-0:3.0.0-20.EmbJopr4.ep5.el5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEAP-5:rhq-ant-bundle-common-0:3.0.0-20.EmbJopr4.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEAP-5:rhq-common-parent-0:3.0.0-20.EmbJopr4.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEAP-5:rhq-core-client-api-0:3.0.0-20.EmbJopr4.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEAP-5:rhq-core-comm-api-0:3.0.0-20.EmbJopr4.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEAP-5:rhq-core-dbutils-0:3.0.0-20.EmbJopr4.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEAP-5:rhq-core-domain-0:3.0.0-20.EmbJopr4.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEAP-5:rhq-core-gui-0:3.0.0-20.EmbJopr4.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEAP-5:rhq-core-native-system-0:3.0.0-20.EmbJopr4.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEAP-5:rhq-core-parent-0:3.0.0-20.EmbJopr4.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEAP-5:rhq-core-plugin-api-0:3.0.0-20.EmbJopr4.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEAP-5:rhq-core-plugin-container-0:3.0.0-20.EmbJopr4.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEAP-5:rhq-core-plugindoc-0:3.0.0-20.EmbJopr4.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEAP-5:rhq-core-util-0:3.0.0-20.EmbJopr4.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEAP-5:rhq-filetemplate-bundle-common-0:3.0.0-20.EmbJopr4.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEAP-5:rhq-helpers-0:3.0.0-20.EmbJopr4.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEAP-5:rhq-jboss-as-common-0:3.0.0-20.EmbJopr4.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEAP-5:rhq-jmx-plugin-0:3.0.0-20.EmbJopr4.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEAP-5:rhq-jmx-plugin-0:3.0.0-20.EmbJopr4.ep5.el5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEAP-5:rhq-modules-parent-0:3.0.0-20.EmbJopr4.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEAP-5:rhq-parent-0:3.0.0-20.EmbJopr4.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEAP-5:rhq-platform-plugin-0:3.0.0-13.EmbJopr4.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEAP-5:rhq-platform-plugin-0:3.0.0-13.EmbJopr4.ep5.el5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEAP-5:rhq-plugin-validator-0:3.0.0-20.EmbJopr4.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEAP-5:rhq-pluginAnnotations-0:3.0.0-20.EmbJopr4.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEAP-5:rhq-pluginGen-0:3.0.0-20.EmbJopr4.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEAP-5:rhq-plugins-parent-0:3.0.0-20.EmbJopr4.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEAP-5:rhq-rtfilter-0:3.0.0-20.EmbJopr4.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEAP-5:slf4j-0:1.5.8-10_patch_01.2.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEAP-5:slf4j-0:1.5.8-10_patch_01.2.ep5.el5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEAP-5:xalan-j2-0:2.7.1-6_patch_05.1.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEAP-5:xalan-j2-0:2.7.1-6_patch_05.1.ep5.el5.src | — |
Vendor Fix
fix
|
message/ax/AxMessage.java in OpenID4Java before 0.9.6 final, as used in JBoss Enterprise Application Platform 5.1 before 5.1.2, Step2, Kay Framework before 1.0.2, and possibly other products does not verify that Attribute Exchange (AX) information is signed, which allows remote attackers to modify potentially sensitive AX information without detection via a man-in-the-middle (MITM) attack.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 5Server-JBEAP-5:apache-cxf-0:2.2.12-4.patch_02.1.1.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEAP-5:apache-cxf-0:2.2.12-4.patch_02.1.1.ep5.el5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEAP-5:cglib-0:2.2-5.3.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEAP-5:cglib-0:2.2-5.3.ep5.el5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEAP-5:facelets-0:1.1.15-3.B1_patch_01.2.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEAP-5:facelets-0:1.1.15-3.B1_patch_01.2.ep5.el5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEAP-5:glassfish-jaxb-0:2.1.12-10_patch_02.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEAP-5:glassfish-jaxb-0:2.1.12-10_patch_02.ep5.el5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEAP-5:glassfish-jsf-0:1.2_13-5_patch_01.3.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEAP-5:glassfish-jsf-0:1.2_13-5_patch_01.3.ep5.el5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEAP-5:jacorb-jboss-0:2.3.1-10.patch_03.4.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEAP-5:jacorb-jboss-0:2.3.1-10.patch_03.4.ep5.el5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEAP-5:jakarta-commons-logging-jboss-0:1.1-10.3_patch_02.1.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEAP-5:jakarta-commons-logging-jboss-0:1.1-10.3_patch_02.1.ep5.el5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEAP-5:jboss-aop2-0:2.1.6-2.CP03.1.1.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEAP-5:jboss-aop2-0:2.1.6-2.CP03.1.1.ep5.el5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEAP-5:jboss-cache-core-0:3.2.8-1.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEAP-5:jboss-cache-core-0:3.2.8-1.ep5.el5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEAP-5:jboss-cl-0:2.0.10-1.2.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEAP-5:jboss-cl-0:2.0.10-1.2.ep5.el5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEAP-5:jboss-cluster-ha-client-0:1.1.4-1.1.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEAP-5:jboss-cluster-ha-client-0:1.1.4-1.1.ep5.el5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEAP-5:jboss-common-core-0:2.2.18-1.1.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEAP-5:jboss-common-core-0:2.2.18-1.1.ep5.el5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEAP-5:jboss-eap5-native-0:5.1.2-1.4.ep5.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEAP-5:jboss-eap5-native-0:5.1.2-1.4.ep5.el5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEAP-5:jboss-eap5-native-0:5.1.2-1.4.ep5.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEAP-5:jboss-ejb3-core-0:1.3.8-0.1.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEAP-5:jboss-ejb3-core-0:1.3.8-0.1.ep5.el5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEAP-5:jboss-ejb3-proxy-clustered-0:1.0.3-2.SP1.1.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEAP-5:jboss-ejb3-proxy-clustered-0:1.0.3-2.SP1.1.ep5.el5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEAP-5:jboss-ejb3-proxy-impl-0:1.0.6-2.SP2.1.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEAP-5:jboss-ejb3-proxy-impl-0:1.0.6-2.SP2.1.ep5.el5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEAP-5:jboss-el-0:1.0_02-0.CR6.2.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEAP-5:jboss-el-0:1.0_02-0.CR6.2.ep5.el5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEAP-5:jboss-messaging-0:1.4.8-9.SP5.1.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEAP-5:jboss-messaging-0:1.4.8-9.SP5.1.ep5.el5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEAP-5:jboss-naming-0:5.0.3-3.CP01.3.1.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEAP-5:jboss-naming-0:5.0.3-3.CP01.3.1.ep5.el5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEAP-5:jboss-remoting-0:2.5.4-9.SP3.1.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEAP-5:jboss-remoting-0:2.5.4-9.SP3.1.ep5.el5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEAP-5:jboss-seam2-0:2.2.5.EAP5-5.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEAP-5:jboss-seam2-0:2.2.5.EAP5-5.ep5.el5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEAP-5:jboss-seam2-docs-0:2.2.5.EAP5-5.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEAP-5:jboss-seam2-examples-0:2.2.5.EAP5-5.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEAP-5:jboss-seam2-runtime-0:2.2.5.EAP5-5.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEAP-5:jboss-security-spi-1:2.0.4-6.SP8.1.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEAP-5:jboss-security-spi-1:2.0.4-6.SP8.1.ep5.el5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEAP-5:jbossas-0:5.1.2-8.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEAP-5:jbossas-0:5.1.2-8.ep5.el5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEAP-5:jbossas-client-0:5.1.2-8.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEAP-5:jbossas-messaging-0:5.1.2-8.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEAP-5:jbossas-tp-licenses-0:5.1.2-7.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEAP-5:jbossas-tp-licenses-0:5.1.2-7.ep5.el5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEAP-5:jbossas-ws-cxf-0:5.1.2-8.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEAP-5:jbossas-ws-cxf-0:5.1.2-8.ep5.el5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEAP-5:jbossas-ws-native-0:5.1.2-8.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEAP-5:jbosssx2-0:2.0.4-6.SP8.2.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEAP-5:jbosssx2-0:2.0.4-6.SP8.2.ep5.el5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEAP-5:jbossts-1:4.6.1-11.CP12.4.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEAP-5:jbossts-1:4.6.1-11.CP12.4.ep5.el5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEAP-5:jbossts-javadoc-1:4.6.1-11.CP12.4.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEAP-5:jbossweb-0:2.1.12-1.4_patch_01.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEAP-5:jbossweb-0:2.1.12-1.4_patch_01.ep5.el5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEAP-5:jbossweb-el-1.0-api-0:2.1.12-1.4_patch_01.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEAP-5:jbossweb-jsp-2.1-api-0:2.1.12-1.4_patch_01.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEAP-5:jbossweb-lib-0:2.1.12-1.4_patch_01.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEAP-5:jbossweb-servlet-2.5-api-0:2.1.12-1.4_patch_01.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEAP-5:jbossws-0:3.1.2-7.SP11.4.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEAP-5:jbossws-0:3.1.2-7.SP11.4.ep5.el5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEAP-5:jbossws-common-0:1.1.0-6.SP8_patch_01.1.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEAP-5:jbossws-common-0:1.1.0-6.SP8_patch_01.1.ep5.el5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEAP-5:jbossws-framework-0:3.1.2-6.SP10.2.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEAP-5:jbossws-framework-0:3.1.2-6.SP10.2.ep5.el5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEAP-5:jbossws-spi-0:1.1.2-5.SP7.1.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEAP-5:jbossws-spi-0:1.1.2-5.SP7.1.ep5.el5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEAP-5:jgroups-1:2.6.20-1.1.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEAP-5:jgroups-1:2.6.20-1.1.ep5.el5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEAP-5:jopr-embedded-0:1.3.4-18.SP5.8.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEAP-5:jopr-embedded-0:1.3.4-18.SP5.8.ep5.el5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEAP-5:jopr-hibernate-plugin-0:3.0.0-13.EmbJopr4.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEAP-5:jopr-hibernate-plugin-0:3.0.0-13.EmbJopr4.ep5.el5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEAP-5:jopr-jboss-as-5-plugin-0:3.0.0-12.EmbJopr4.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEAP-5:jopr-jboss-as-5-plugin-0:3.0.0-12.EmbJopr4.ep5.el5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEAP-5:jopr-jboss-cache-v3-plugin-0:3.0.0-14.EmbJopr4.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEAP-5:jopr-jboss-cache-v3-plugin-0:3.0.0-14.EmbJopr4.ep5.el5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEAP-5:mod_cluster-0:1.0.10-3.1.GA_CP02.ep5.el5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEAP-5:mod_cluster-demo-0:1.0.10-3.1.GA_CP02.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEAP-5:mod_cluster-jbossas-0:1.0.10-3.1.GA_CP02.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEAP-5:mod_cluster-jbossweb2-0:1.0.10-3.1.GA_CP02.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEAP-5:mod_cluster-native-0:1.0.10-3.1.GA_CP02.ep5.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEAP-5:mod_cluster-native-0:1.0.10-3.1.GA_CP02.ep5.el5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEAP-5:mod_cluster-native-0:1.0.10-3.1.GA_CP02.ep5.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEAP-5:mod_cluster-tomcat6-0:1.0.10-3.1.GA_CP02.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEAP-5:org-mc4j-ems-0:1.2.15.1-4.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEAP-5:org-mc4j-ems-0:1.2.15.1-4.ep5.el5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEAP-5:picketlink-federation-0:2.0.2-1.1.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEAP-5:picketlink-federation-0:2.0.2-1.1.ep5.el5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEAP-5:picketlink-federation-webapp-idp-0:2.0.2-1.1.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEAP-5:picketlink-federation-webapp-pdp-0:2.0.2-1.1.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEAP-5:picketlink-federation-webapp-sts-0:2.0.2-1.1.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEAP-5:resteasy-0:1.2.1-9.CP02.4.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEAP-5:resteasy-0:1.2.1-9.CP02.4.ep5.el5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEAP-5:resteasy-examples-0:1.2.1-9.CP02.4.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEAP-5:resteasy-javadoc-0:1.2.1-9.CP02.4.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEAP-5:resteasy-manual-0:1.2.1-9.CP02.4.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEAP-5:rh-eap-docs-0:5.1.2-6.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEAP-5:rh-eap-docs-0:5.1.2-6.ep5.el5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEAP-5:rh-eap-docs-examples-0:5.1.2-6.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEAP-5:rhq-0:3.0.0-20.EmbJopr4.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEAP-5:rhq-0:3.0.0-20.EmbJopr4.ep5.el5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEAP-5:rhq-ant-bundle-common-0:3.0.0-20.EmbJopr4.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEAP-5:rhq-common-parent-0:3.0.0-20.EmbJopr4.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEAP-5:rhq-core-client-api-0:3.0.0-20.EmbJopr4.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEAP-5:rhq-core-comm-api-0:3.0.0-20.EmbJopr4.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEAP-5:rhq-core-dbutils-0:3.0.0-20.EmbJopr4.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEAP-5:rhq-core-domain-0:3.0.0-20.EmbJopr4.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEAP-5:rhq-core-gui-0:3.0.0-20.EmbJopr4.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEAP-5:rhq-core-native-system-0:3.0.0-20.EmbJopr4.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEAP-5:rhq-core-parent-0:3.0.0-20.EmbJopr4.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEAP-5:rhq-core-plugin-api-0:3.0.0-20.EmbJopr4.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEAP-5:rhq-core-plugin-container-0:3.0.0-20.EmbJopr4.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEAP-5:rhq-core-plugindoc-0:3.0.0-20.EmbJopr4.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEAP-5:rhq-core-util-0:3.0.0-20.EmbJopr4.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEAP-5:rhq-filetemplate-bundle-common-0:3.0.0-20.EmbJopr4.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEAP-5:rhq-helpers-0:3.0.0-20.EmbJopr4.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEAP-5:rhq-jboss-as-common-0:3.0.0-20.EmbJopr4.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEAP-5:rhq-jmx-plugin-0:3.0.0-20.EmbJopr4.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEAP-5:rhq-jmx-plugin-0:3.0.0-20.EmbJopr4.ep5.el5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEAP-5:rhq-modules-parent-0:3.0.0-20.EmbJopr4.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEAP-5:rhq-parent-0:3.0.0-20.EmbJopr4.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEAP-5:rhq-platform-plugin-0:3.0.0-13.EmbJopr4.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEAP-5:rhq-platform-plugin-0:3.0.0-13.EmbJopr4.ep5.el5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEAP-5:rhq-plugin-validator-0:3.0.0-20.EmbJopr4.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEAP-5:rhq-pluginAnnotations-0:3.0.0-20.EmbJopr4.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEAP-5:rhq-pluginGen-0:3.0.0-20.EmbJopr4.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEAP-5:rhq-plugins-parent-0:3.0.0-20.EmbJopr4.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEAP-5:rhq-rtfilter-0:3.0.0-20.EmbJopr4.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEAP-5:slf4j-0:1.5.8-10_patch_01.2.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEAP-5:slf4j-0:1.5.8-10_patch_01.2.ep5.el5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEAP-5:xalan-j2-0:2.7.1-6_patch_05.1.ep5.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-JBEAP-5:xalan-j2-0:2.7.1-6_patch_05.1.ep5.el5.src | — |
Vendor Fix
fix
|
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Low"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated JBoss Enterprise Application Platform 5.1.2 packages that fix two\nsecurity issues, various bugs, and add several enhancements are now\navailable for Red Hat Enterprise Linux 5.\n\nThe Red Hat Security Response Team has rated this update as having low\nsecurity impact. Common Vulnerability Scoring System (CVSS) base scores,\nwhich give detailed severity ratings, are available for each vulnerability\nfrom the CVE links in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "JBoss Enterprise Application Platform is a platform for Java applications,\nwhich integrates the JBoss Application Server with JBoss Hibernate and\nJBoss Seam. OpenID4Java allows you to implement OpenID authentication in\nyour Java applications. OpenID4Java is a Technology Preview.\n\nThis JBoss Enterprise Application Platform 5.1.2 release for Red Hat\nEnterprise Linux 5 serves as a replacement for JBoss Enterprise Application\nPlatform 5.1.1.\n\nThese updated packages include bug fixes and enhancements. Refer to\nthe JBoss Enterprise Application Platform 5.1.2 Release Notes for\ninformation on the most significant of these changes. The Release Notes\nwill be available shortly from\nhttps://docs.redhat.com/docs/en-US/index.html\n\nThe following security issues are also fixed with this release:\n\nIt was found that the invoker servlets, deployed by default via\nhttpha-invoker, only performed access control on the HTTP GET and POST\nmethods, allowing remote attackers to make unauthenticated requests by\nusing different HTTP methods. Due to the second layer of authentication\nprovided by a security interceptor, this issue is not exploitable on\ndefault installations unless an administrator has misconfigured the\nsecurity interceptor or disabled it. (CVE-2011-4085)\n\nIt was found that the Attribute Exchange (AX) extension of OpenID4Java was\nnot checking to ensure attributes were signed. If AX was being used to\nreceive information that an application only trusts the identity provider\nto assert, a remote attacker could use this flaw to conduct\nman-in-the-middle attacks and compromise the integrity of the information\nvia a specially-crafted request. By default, only the JBoss Seam openid\nexample application uses OpenID4Java. (CVE-2011-4314)\n\nWarning: Before applying this update, back up the\n\"jboss-as/server/[PROFILE]/deploy/\" directory and any other customized\nconfiguration files of your JBoss Enterprise Application Platform.\n\nAll users of JBoss Enterprise Application Platform 5.1.1 on Red Hat\nEnterprise Linux 5 are advised to upgrade to these updated packages. The\nJBoss server process must be restarted for the update to take effect.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2011:1799",
"url": "https://access.redhat.com/errata/RHSA-2011:1799"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#low",
"url": "https://access.redhat.com/security/updates/classification/#low"
},
{
"category": "external",
"summary": "https://docs.redhat.com/docs/en-US/index.html",
"url": "https://docs.redhat.com/docs/en-US/index.html"
},
{
"category": "external",
"summary": "https://access.redhat.com/support/offerings/techpreview/",
"url": "https://access.redhat.com/support/offerings/techpreview/"
},
{
"category": "external",
"summary": "733731",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=733731"
},
{
"category": "external",
"summary": "750422",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=750422"
},
{
"category": "external",
"summary": "754386",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=754386"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2011/rhsa-2011_1799.json"
}
],
"title": "Red Hat Security Advisory: JBoss Enterprise Application Platform 5.1.2 update",
"tracking": {
"current_release_date": "2025-11-21T17:39:22+00:00",
"generator": {
"date": "2025-11-21T17:39:22+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2011:1799",
"initial_release_date": "2011-12-08T19:30:00+00:00",
"revision_history": [
{
"date": "2011-12-08T19:30:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2011-12-08T19:35:33+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T17:39:22+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat JBoss Enterprise Application Platform 5 for RHEL 5 Server",
"product": {
"name": "Red Hat JBoss Enterprise Application Platform 5 for RHEL 5 Server",
"product_id": "5Server-JBEAP-5",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:jboss_enterprise_application_platform:5::el5"
}
}
}
],
"category": "product_family",
"name": "Red Hat JBoss Enterprise Application Platform"
},
{
"branches": [
{
"category": "product_version",
"name": "jboss-aop2-0:2.1.6-2.CP03.1.1.ep5.el5.src",
"product": {
"name": "jboss-aop2-0:2.1.6-2.CP03.1.1.ep5.el5.src",
"product_id": "jboss-aop2-0:2.1.6-2.CP03.1.1.ep5.el5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jboss-aop2@2.1.6-2.CP03.1.1.ep5.el5?arch=src"
}
}
},
{
"category": "product_version",
"name": "jboss-cache-core-0:3.2.8-1.ep5.el5.src",
"product": {
"name": "jboss-cache-core-0:3.2.8-1.ep5.el5.src",
"product_id": "jboss-cache-core-0:3.2.8-1.ep5.el5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jboss-cache-core@3.2.8-1.ep5.el5?arch=src"
}
}
},
{
"category": "product_version",
"name": "jboss-remoting-0:2.5.4-9.SP3.1.ep5.el5.src",
"product": {
"name": "jboss-remoting-0:2.5.4-9.SP3.1.ep5.el5.src",
"product_id": "jboss-remoting-0:2.5.4-9.SP3.1.ep5.el5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jboss-remoting@2.5.4-9.SP3.1.ep5.el5?arch=src"
}
}
},
{
"category": "product_version",
"name": "jgroups-1:2.6.20-1.1.ep5.el5.src",
"product": {
"name": "jgroups-1:2.6.20-1.1.ep5.el5.src",
"product_id": "jgroups-1:2.6.20-1.1.ep5.el5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jgroups@2.6.20-1.1.ep5.el5?arch=src\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "jboss-cl-0:2.0.10-1.2.ep5.el5.src",
"product": {
"name": "jboss-cl-0:2.0.10-1.2.ep5.el5.src",
"product_id": "jboss-cl-0:2.0.10-1.2.ep5.el5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jboss-cl@2.0.10-1.2.ep5.el5?arch=src"
}
}
},
{
"category": "product_version",
"name": "jbossws-spi-0:1.1.2-5.SP7.1.ep5.el5.src",
"product": {
"name": "jbossws-spi-0:1.1.2-5.SP7.1.ep5.el5.src",
"product_id": "jbossws-spi-0:1.1.2-5.SP7.1.ep5.el5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbossws-spi@1.1.2-5.SP7.1.ep5.el5?arch=src"
}
}
},
{
"category": "product_version",
"name": "jboss-security-spi-1:2.0.4-6.SP8.1.ep5.el5.src",
"product": {
"name": "jboss-security-spi-1:2.0.4-6.SP8.1.ep5.el5.src",
"product_id": "jboss-security-spi-1:2.0.4-6.SP8.1.ep5.el5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jboss-security-spi@2.0.4-6.SP8.1.ep5.el5?arch=src\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "xalan-j2-0:2.7.1-6_patch_05.1.ep5.el5.src",
"product": {
"name": "xalan-j2-0:2.7.1-6_patch_05.1.ep5.el5.src",
"product_id": "xalan-j2-0:2.7.1-6_patch_05.1.ep5.el5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xalan-j2@2.7.1-6_patch_05.1.ep5.el5?arch=src"
}
}
},
{
"category": "product_version",
"name": "glassfish-jaxb-0:2.1.12-10_patch_02.ep5.el5.src",
"product": {
"name": "glassfish-jaxb-0:2.1.12-10_patch_02.ep5.el5.src",
"product_id": "glassfish-jaxb-0:2.1.12-10_patch_02.ep5.el5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glassfish-jaxb@2.1.12-10_patch_02.ep5.el5?arch=src"
}
}
},
{
"category": "product_version",
"name": "slf4j-0:1.5.8-10_patch_01.2.ep5.el5.src",
"product": {
"name": "slf4j-0:1.5.8-10_patch_01.2.ep5.el5.src",
"product_id": "slf4j-0:1.5.8-10_patch_01.2.ep5.el5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/slf4j@1.5.8-10_patch_01.2.ep5.el5?arch=src"
}
}
},
{
"category": "product_version",
"name": "jboss-ejb3-proxy-impl-0:1.0.6-2.SP2.1.ep5.el5.src",
"product": {
"name": "jboss-ejb3-proxy-impl-0:1.0.6-2.SP2.1.ep5.el5.src",
"product_id": "jboss-ejb3-proxy-impl-0:1.0.6-2.SP2.1.ep5.el5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jboss-ejb3-proxy-impl@1.0.6-2.SP2.1.ep5.el5?arch=src"
}
}
},
{
"category": "product_version",
"name": "jboss-ejb3-core-0:1.3.8-0.1.ep5.el5.src",
"product": {
"name": "jboss-ejb3-core-0:1.3.8-0.1.ep5.el5.src",
"product_id": "jboss-ejb3-core-0:1.3.8-0.1.ep5.el5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jboss-ejb3-core@1.3.8-0.1.ep5.el5?arch=src"
}
}
},
{
"category": "product_version",
"name": "jbossws-common-0:1.1.0-6.SP8_patch_01.1.ep5.el5.src",
"product": {
"name": "jbossws-common-0:1.1.0-6.SP8_patch_01.1.ep5.el5.src",
"product_id": "jbossws-common-0:1.1.0-6.SP8_patch_01.1.ep5.el5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbossws-common@1.1.0-6.SP8_patch_01.1.ep5.el5?arch=src"
}
}
},
{
"category": "product_version",
"name": "mod_cluster-0:1.0.10-3.1.GA_CP02.ep5.el5.src",
"product": {
"name": "mod_cluster-0:1.0.10-3.1.GA_CP02.ep5.el5.src",
"product_id": "mod_cluster-0:1.0.10-3.1.GA_CP02.ep5.el5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_cluster@1.0.10-3.1.GA_CP02.ep5.el5?arch=src"
}
}
},
{
"category": "product_version",
"name": "mod_cluster-native-0:1.0.10-3.1.GA_CP02.ep5.el5.src",
"product": {
"name": "mod_cluster-native-0:1.0.10-3.1.GA_CP02.ep5.el5.src",
"product_id": "mod_cluster-native-0:1.0.10-3.1.GA_CP02.ep5.el5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_cluster-native@1.0.10-3.1.GA_CP02.ep5.el5?arch=src"
}
}
},
{
"category": "product_version",
"name": "apache-cxf-0:2.2.12-4.patch_02.1.1.ep5.el5.src",
"product": {
"name": "apache-cxf-0:2.2.12-4.patch_02.1.1.ep5.el5.src",
"product_id": "apache-cxf-0:2.2.12-4.patch_02.1.1.ep5.el5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/apache-cxf@2.2.12-4.patch_02.1.1.ep5.el5?arch=src"
}
}
},
{
"category": "product_version",
"name": "jakarta-commons-logging-jboss-0:1.1-10.3_patch_02.1.ep5.el5.src",
"product": {
"name": "jakarta-commons-logging-jboss-0:1.1-10.3_patch_02.1.ep5.el5.src",
"product_id": "jakarta-commons-logging-jboss-0:1.1-10.3_patch_02.1.ep5.el5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jakarta-commons-logging-jboss@1.1-10.3_patch_02.1.ep5.el5?arch=src"
}
}
},
{
"category": "product_version",
"name": "jboss-eap5-native-0:5.1.2-1.4.ep5.el5.src",
"product": {
"name": "jboss-eap5-native-0:5.1.2-1.4.ep5.el5.src",
"product_id": "jboss-eap5-native-0:5.1.2-1.4.ep5.el5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jboss-eap5-native@5.1.2-1.4.ep5.el5?arch=src"
}
}
},
{
"category": "product_version",
"name": "jboss-common-core-0:2.2.18-1.1.ep5.el5.src",
"product": {
"name": "jboss-common-core-0:2.2.18-1.1.ep5.el5.src",
"product_id": "jboss-common-core-0:2.2.18-1.1.ep5.el5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jboss-common-core@2.2.18-1.1.ep5.el5?arch=src"
}
}
},
{
"category": "product_version",
"name": "cglib-0:2.2-5.3.ep5.el5.src",
"product": {
"name": "cglib-0:2.2-5.3.ep5.el5.src",
"product_id": "cglib-0:2.2-5.3.ep5.el5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cglib@2.2-5.3.ep5.el5?arch=src"
}
}
},
{
"category": "product_version",
"name": "jboss-cluster-ha-client-0:1.1.4-1.1.ep5.el5.src",
"product": {
"name": "jboss-cluster-ha-client-0:1.1.4-1.1.ep5.el5.src",
"product_id": "jboss-cluster-ha-client-0:1.1.4-1.1.ep5.el5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jboss-cluster-ha-client@1.1.4-1.1.ep5.el5?arch=src"
}
}
},
{
"category": "product_version",
"name": "jbossweb-0:2.1.12-1.4_patch_01.ep5.el5.src",
"product": {
"name": "jbossweb-0:2.1.12-1.4_patch_01.ep5.el5.src",
"product_id": "jbossweb-0:2.1.12-1.4_patch_01.ep5.el5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbossweb@2.1.12-1.4_patch_01.ep5.el5?arch=src"
}
}
},
{
"category": "product_version",
"name": "jboss-ejb3-proxy-clustered-0:1.0.3-2.SP1.1.ep5.el5.src",
"product": {
"name": "jboss-ejb3-proxy-clustered-0:1.0.3-2.SP1.1.ep5.el5.src",
"product_id": "jboss-ejb3-proxy-clustered-0:1.0.3-2.SP1.1.ep5.el5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jboss-ejb3-proxy-clustered@1.0.3-2.SP1.1.ep5.el5?arch=src"
}
}
},
{
"category": "product_version",
"name": "facelets-0:1.1.15-3.B1_patch_01.2.ep5.el5.src",
"product": {
"name": "facelets-0:1.1.15-3.B1_patch_01.2.ep5.el5.src",
"product_id": "facelets-0:1.1.15-3.B1_patch_01.2.ep5.el5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/facelets@1.1.15-3.B1_patch_01.2.ep5.el5?arch=src"
}
}
},
{
"category": "product_version",
"name": "jbossws-framework-0:3.1.2-6.SP10.2.ep5.el5.src",
"product": {
"name": "jbossws-framework-0:3.1.2-6.SP10.2.ep5.el5.src",
"product_id": "jbossws-framework-0:3.1.2-6.SP10.2.ep5.el5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbossws-framework@3.1.2-6.SP10.2.ep5.el5?arch=src"
}
}
},
{
"category": "product_version",
"name": "resteasy-0:1.2.1-9.CP02.4.ep5.el5.src",
"product": {
"name": "resteasy-0:1.2.1-9.CP02.4.ep5.el5.src",
"product_id": "resteasy-0:1.2.1-9.CP02.4.ep5.el5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/resteasy@1.2.1-9.CP02.4.ep5.el5?arch=src"
}
}
},
{
"category": "product_version",
"name": "jboss-naming-0:5.0.3-3.CP01.3.1.ep5.el5.src",
"product": {
"name": "jboss-naming-0:5.0.3-3.CP01.3.1.ep5.el5.src",
"product_id": "jboss-naming-0:5.0.3-3.CP01.3.1.ep5.el5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jboss-naming@5.0.3-3.CP01.3.1.ep5.el5?arch=src"
}
}
},
{
"category": "product_version",
"name": "jbosssx2-0:2.0.4-6.SP8.2.ep5.el5.src",
"product": {
"name": "jbosssx2-0:2.0.4-6.SP8.2.ep5.el5.src",
"product_id": "jbosssx2-0:2.0.4-6.SP8.2.ep5.el5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbosssx2@2.0.4-6.SP8.2.ep5.el5?arch=src"
}
}
},
{
"category": "product_version",
"name": "org-mc4j-ems-0:1.2.15.1-4.ep5.el5.src",
"product": {
"name": "org-mc4j-ems-0:1.2.15.1-4.ep5.el5.src",
"product_id": "org-mc4j-ems-0:1.2.15.1-4.ep5.el5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/org-mc4j-ems@1.2.15.1-4.ep5.el5?arch=src"
}
}
},
{
"category": "product_version",
"name": "jboss-el-0:1.0_02-0.CR6.2.ep5.el5.src",
"product": {
"name": "jboss-el-0:1.0_02-0.CR6.2.ep5.el5.src",
"product_id": "jboss-el-0:1.0_02-0.CR6.2.ep5.el5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jboss-el@1.0_02-0.CR6.2.ep5.el5?arch=src"
}
}
},
{
"category": "product_version",
"name": "jbossws-0:3.1.2-7.SP11.4.ep5.el5.src",
"product": {
"name": "jbossws-0:3.1.2-7.SP11.4.ep5.el5.src",
"product_id": "jbossws-0:3.1.2-7.SP11.4.ep5.el5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbossws@3.1.2-7.SP11.4.ep5.el5?arch=src"
}
}
},
{
"category": "product_version",
"name": "jboss-seam2-0:2.2.5.EAP5-5.ep5.el5.src",
"product": {
"name": "jboss-seam2-0:2.2.5.EAP5-5.ep5.el5.src",
"product_id": "jboss-seam2-0:2.2.5.EAP5-5.ep5.el5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jboss-seam2@2.2.5.EAP5-5.ep5.el5?arch=src"
}
}
},
{
"category": "product_version",
"name": "picketlink-federation-0:2.0.2-1.1.ep5.el5.src",
"product": {
"name": "picketlink-federation-0:2.0.2-1.1.ep5.el5.src",
"product_id": "picketlink-federation-0:2.0.2-1.1.ep5.el5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/picketlink-federation@2.0.2-1.1.ep5.el5?arch=src"
}
}
},
{
"category": "product_version",
"name": "jboss-messaging-0:1.4.8-9.SP5.1.ep5.el5.src",
"product": {
"name": "jboss-messaging-0:1.4.8-9.SP5.1.ep5.el5.src",
"product_id": "jboss-messaging-0:1.4.8-9.SP5.1.ep5.el5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jboss-messaging@1.4.8-9.SP5.1.ep5.el5?arch=src"
}
}
},
{
"category": "product_version",
"name": "rhq-0:3.0.0-20.EmbJopr4.ep5.el5.src",
"product": {
"name": "rhq-0:3.0.0-20.EmbJopr4.ep5.el5.src",
"product_id": "rhq-0:3.0.0-20.EmbJopr4.ep5.el5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rhq@3.0.0-20.EmbJopr4.ep5.el5?arch=src"
}
}
},
{
"category": "product_version",
"name": "rhq-jmx-plugin-0:3.0.0-20.EmbJopr4.ep5.el5.src",
"product": {
"name": "rhq-jmx-plugin-0:3.0.0-20.EmbJopr4.ep5.el5.src",
"product_id": "rhq-jmx-plugin-0:3.0.0-20.EmbJopr4.ep5.el5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rhq-jmx-plugin@3.0.0-20.EmbJopr4.ep5.el5?arch=src"
}
}
},
{
"category": "product_version",
"name": "jacorb-jboss-0:2.3.1-10.patch_03.4.ep5.el5.src",
"product": {
"name": "jacorb-jboss-0:2.3.1-10.patch_03.4.ep5.el5.src",
"product_id": "jacorb-jboss-0:2.3.1-10.patch_03.4.ep5.el5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jacorb-jboss@2.3.1-10.patch_03.4.ep5.el5?arch=src"
}
}
},
{
"category": "product_version",
"name": "jbossts-1:4.6.1-11.CP12.4.ep5.el5.src",
"product": {
"name": "jbossts-1:4.6.1-11.CP12.4.ep5.el5.src",
"product_id": "jbossts-1:4.6.1-11.CP12.4.ep5.el5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbossts@4.6.1-11.CP12.4.ep5.el5?arch=src\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "glassfish-jsf-0:1.2_13-5_patch_01.3.ep5.el5.src",
"product": {
"name": "glassfish-jsf-0:1.2_13-5_patch_01.3.ep5.el5.src",
"product_id": "glassfish-jsf-0:1.2_13-5_patch_01.3.ep5.el5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glassfish-jsf@1.2_13-5_patch_01.3.ep5.el5?arch=src"
}
}
},
{
"category": "product_version",
"name": "jopr-jboss-cache-v3-plugin-0:3.0.0-14.EmbJopr4.ep5.el5.src",
"product": {
"name": "jopr-jboss-cache-v3-plugin-0:3.0.0-14.EmbJopr4.ep5.el5.src",
"product_id": "jopr-jboss-cache-v3-plugin-0:3.0.0-14.EmbJopr4.ep5.el5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jopr-jboss-cache-v3-plugin@3.0.0-14.EmbJopr4.ep5.el5?arch=src"
}
}
},
{
"category": "product_version",
"name": "jopr-embedded-0:1.3.4-18.SP5.8.ep5.el5.src",
"product": {
"name": "jopr-embedded-0:1.3.4-18.SP5.8.ep5.el5.src",
"product_id": "jopr-embedded-0:1.3.4-18.SP5.8.ep5.el5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jopr-embedded@1.3.4-18.SP5.8.ep5.el5?arch=src"
}
}
},
{
"category": "product_version",
"name": "jbossas-ws-cxf-0:5.1.2-8.ep5.el5.src",
"product": {
"name": "jbossas-ws-cxf-0:5.1.2-8.ep5.el5.src",
"product_id": "jbossas-ws-cxf-0:5.1.2-8.ep5.el5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbossas-ws-cxf@5.1.2-8.ep5.el5?arch=src"
}
}
},
{
"category": "product_version",
"name": "rhq-platform-plugin-0:3.0.0-13.EmbJopr4.ep5.el5.src",
"product": {
"name": "rhq-platform-plugin-0:3.0.0-13.EmbJopr4.ep5.el5.src",
"product_id": "rhq-platform-plugin-0:3.0.0-13.EmbJopr4.ep5.el5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rhq-platform-plugin@3.0.0-13.EmbJopr4.ep5.el5?arch=src"
}
}
},
{
"category": "product_version",
"name": "jopr-hibernate-plugin-0:3.0.0-13.EmbJopr4.ep5.el5.src",
"product": {
"name": "jopr-hibernate-plugin-0:3.0.0-13.EmbJopr4.ep5.el5.src",
"product_id": "jopr-hibernate-plugin-0:3.0.0-13.EmbJopr4.ep5.el5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jopr-hibernate-plugin@3.0.0-13.EmbJopr4.ep5.el5?arch=src"
}
}
},
{
"category": "product_version",
"name": "jopr-jboss-as-5-plugin-0:3.0.0-12.EmbJopr4.ep5.el5.src",
"product": {
"name": "jopr-jboss-as-5-plugin-0:3.0.0-12.EmbJopr4.ep5.el5.src",
"product_id": "jopr-jboss-as-5-plugin-0:3.0.0-12.EmbJopr4.ep5.el5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jopr-jboss-as-5-plugin@3.0.0-12.EmbJopr4.ep5.el5?arch=src"
}
}
},
{
"category": "product_version",
"name": "jbossas-tp-licenses-0:5.1.2-7.ep5.el5.src",
"product": {
"name": "jbossas-tp-licenses-0:5.1.2-7.ep5.el5.src",
"product_id": "jbossas-tp-licenses-0:5.1.2-7.ep5.el5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbossas-tp-licenses@5.1.2-7.ep5.el5?arch=src"
}
}
},
{
"category": "product_version",
"name": "jbossas-0:5.1.2-8.ep5.el5.src",
"product": {
"name": "jbossas-0:5.1.2-8.ep5.el5.src",
"product_id": "jbossas-0:5.1.2-8.ep5.el5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbossas@5.1.2-8.ep5.el5?arch=src"
}
}
},
{
"category": "product_version",
"name": "rh-eap-docs-0:5.1.2-6.ep5.el5.src",
"product": {
"name": "rh-eap-docs-0:5.1.2-6.ep5.el5.src",
"product_id": "rh-eap-docs-0:5.1.2-6.ep5.el5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rh-eap-docs@5.1.2-6.ep5.el5?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "jboss-aop2-0:2.1.6-2.CP03.1.1.ep5.el5.noarch",
"product": {
"name": "jboss-aop2-0:2.1.6-2.CP03.1.1.ep5.el5.noarch",
"product_id": "jboss-aop2-0:2.1.6-2.CP03.1.1.ep5.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jboss-aop2@2.1.6-2.CP03.1.1.ep5.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jboss-cache-core-0:3.2.8-1.ep5.el5.noarch",
"product": {
"name": "jboss-cache-core-0:3.2.8-1.ep5.el5.noarch",
"product_id": "jboss-cache-core-0:3.2.8-1.ep5.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jboss-cache-core@3.2.8-1.ep5.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jboss-remoting-0:2.5.4-9.SP3.1.ep5.el5.noarch",
"product": {
"name": "jboss-remoting-0:2.5.4-9.SP3.1.ep5.el5.noarch",
"product_id": "jboss-remoting-0:2.5.4-9.SP3.1.ep5.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jboss-remoting@2.5.4-9.SP3.1.ep5.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jgroups-1:2.6.20-1.1.ep5.el5.noarch",
"product": {
"name": "jgroups-1:2.6.20-1.1.ep5.el5.noarch",
"product_id": "jgroups-1:2.6.20-1.1.ep5.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jgroups@2.6.20-1.1.ep5.el5?arch=noarch\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "jboss-cl-0:2.0.10-1.2.ep5.el5.noarch",
"product": {
"name": "jboss-cl-0:2.0.10-1.2.ep5.el5.noarch",
"product_id": "jboss-cl-0:2.0.10-1.2.ep5.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jboss-cl@2.0.10-1.2.ep5.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jbossws-spi-0:1.1.2-5.SP7.1.ep5.el5.noarch",
"product": {
"name": "jbossws-spi-0:1.1.2-5.SP7.1.ep5.el5.noarch",
"product_id": "jbossws-spi-0:1.1.2-5.SP7.1.ep5.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbossws-spi@1.1.2-5.SP7.1.ep5.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jboss-security-spi-1:2.0.4-6.SP8.1.ep5.el5.noarch",
"product": {
"name": "jboss-security-spi-1:2.0.4-6.SP8.1.ep5.el5.noarch",
"product_id": "jboss-security-spi-1:2.0.4-6.SP8.1.ep5.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jboss-security-spi@2.0.4-6.SP8.1.ep5.el5?arch=noarch\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "xalan-j2-0:2.7.1-6_patch_05.1.ep5.el5.noarch",
"product": {
"name": "xalan-j2-0:2.7.1-6_patch_05.1.ep5.el5.noarch",
"product_id": "xalan-j2-0:2.7.1-6_patch_05.1.ep5.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xalan-j2@2.7.1-6_patch_05.1.ep5.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "glassfish-jaxb-0:2.1.12-10_patch_02.ep5.el5.noarch",
"product": {
"name": "glassfish-jaxb-0:2.1.12-10_patch_02.ep5.el5.noarch",
"product_id": "glassfish-jaxb-0:2.1.12-10_patch_02.ep5.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glassfish-jaxb@2.1.12-10_patch_02.ep5.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "slf4j-0:1.5.8-10_patch_01.2.ep5.el5.noarch",
"product": {
"name": "slf4j-0:1.5.8-10_patch_01.2.ep5.el5.noarch",
"product_id": "slf4j-0:1.5.8-10_patch_01.2.ep5.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/slf4j@1.5.8-10_patch_01.2.ep5.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jboss-ejb3-proxy-impl-0:1.0.6-2.SP2.1.ep5.el5.noarch",
"product": {
"name": "jboss-ejb3-proxy-impl-0:1.0.6-2.SP2.1.ep5.el5.noarch",
"product_id": "jboss-ejb3-proxy-impl-0:1.0.6-2.SP2.1.ep5.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jboss-ejb3-proxy-impl@1.0.6-2.SP2.1.ep5.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jboss-ejb3-core-0:1.3.8-0.1.ep5.el5.noarch",
"product": {
"name": "jboss-ejb3-core-0:1.3.8-0.1.ep5.el5.noarch",
"product_id": "jboss-ejb3-core-0:1.3.8-0.1.ep5.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jboss-ejb3-core@1.3.8-0.1.ep5.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jbossws-common-0:1.1.0-6.SP8_patch_01.1.ep5.el5.noarch",
"product": {
"name": "jbossws-common-0:1.1.0-6.SP8_patch_01.1.ep5.el5.noarch",
"product_id": "jbossws-common-0:1.1.0-6.SP8_patch_01.1.ep5.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbossws-common@1.1.0-6.SP8_patch_01.1.ep5.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "mod_cluster-demo-0:1.0.10-3.1.GA_CP02.ep5.el5.noarch",
"product": {
"name": "mod_cluster-demo-0:1.0.10-3.1.GA_CP02.ep5.el5.noarch",
"product_id": "mod_cluster-demo-0:1.0.10-3.1.GA_CP02.ep5.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_cluster-demo@1.0.10-3.1.GA_CP02.ep5.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "mod_cluster-jbossweb2-0:1.0.10-3.1.GA_CP02.ep5.el5.noarch",
"product": {
"name": "mod_cluster-jbossweb2-0:1.0.10-3.1.GA_CP02.ep5.el5.noarch",
"product_id": "mod_cluster-jbossweb2-0:1.0.10-3.1.GA_CP02.ep5.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_cluster-jbossweb2@1.0.10-3.1.GA_CP02.ep5.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "mod_cluster-jbossas-0:1.0.10-3.1.GA_CP02.ep5.el5.noarch",
"product": {
"name": "mod_cluster-jbossas-0:1.0.10-3.1.GA_CP02.ep5.el5.noarch",
"product_id": "mod_cluster-jbossas-0:1.0.10-3.1.GA_CP02.ep5.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_cluster-jbossas@1.0.10-3.1.GA_CP02.ep5.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "mod_cluster-tomcat6-0:1.0.10-3.1.GA_CP02.ep5.el5.noarch",
"product": {
"name": "mod_cluster-tomcat6-0:1.0.10-3.1.GA_CP02.ep5.el5.noarch",
"product_id": "mod_cluster-tomcat6-0:1.0.10-3.1.GA_CP02.ep5.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_cluster-tomcat6@1.0.10-3.1.GA_CP02.ep5.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "apache-cxf-0:2.2.12-4.patch_02.1.1.ep5.el5.noarch",
"product": {
"name": "apache-cxf-0:2.2.12-4.patch_02.1.1.ep5.el5.noarch",
"product_id": "apache-cxf-0:2.2.12-4.patch_02.1.1.ep5.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/apache-cxf@2.2.12-4.patch_02.1.1.ep5.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jakarta-commons-logging-jboss-0:1.1-10.3_patch_02.1.ep5.el5.noarch",
"product": {
"name": "jakarta-commons-logging-jboss-0:1.1-10.3_patch_02.1.ep5.el5.noarch",
"product_id": "jakarta-commons-logging-jboss-0:1.1-10.3_patch_02.1.ep5.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jakarta-commons-logging-jboss@1.1-10.3_patch_02.1.ep5.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jboss-common-core-0:2.2.18-1.1.ep5.el5.noarch",
"product": {
"name": "jboss-common-core-0:2.2.18-1.1.ep5.el5.noarch",
"product_id": "jboss-common-core-0:2.2.18-1.1.ep5.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jboss-common-core@2.2.18-1.1.ep5.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "cglib-0:2.2-5.3.ep5.el5.noarch",
"product": {
"name": "cglib-0:2.2-5.3.ep5.el5.noarch",
"product_id": "cglib-0:2.2-5.3.ep5.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cglib@2.2-5.3.ep5.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jboss-cluster-ha-client-0:1.1.4-1.1.ep5.el5.noarch",
"product": {
"name": "jboss-cluster-ha-client-0:1.1.4-1.1.ep5.el5.noarch",
"product_id": "jboss-cluster-ha-client-0:1.1.4-1.1.ep5.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jboss-cluster-ha-client@1.1.4-1.1.ep5.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jbossweb-el-1.0-api-0:2.1.12-1.4_patch_01.ep5.el5.noarch",
"product": {
"name": "jbossweb-el-1.0-api-0:2.1.12-1.4_patch_01.ep5.el5.noarch",
"product_id": "jbossweb-el-1.0-api-0:2.1.12-1.4_patch_01.ep5.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbossweb-el-1.0-api@2.1.12-1.4_patch_01.ep5.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jbossweb-lib-0:2.1.12-1.4_patch_01.ep5.el5.noarch",
"product": {
"name": "jbossweb-lib-0:2.1.12-1.4_patch_01.ep5.el5.noarch",
"product_id": "jbossweb-lib-0:2.1.12-1.4_patch_01.ep5.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbossweb-lib@2.1.12-1.4_patch_01.ep5.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jbossweb-0:2.1.12-1.4_patch_01.ep5.el5.noarch",
"product": {
"name": "jbossweb-0:2.1.12-1.4_patch_01.ep5.el5.noarch",
"product_id": "jbossweb-0:2.1.12-1.4_patch_01.ep5.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbossweb@2.1.12-1.4_patch_01.ep5.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jbossweb-servlet-2.5-api-0:2.1.12-1.4_patch_01.ep5.el5.noarch",
"product": {
"name": "jbossweb-servlet-2.5-api-0:2.1.12-1.4_patch_01.ep5.el5.noarch",
"product_id": "jbossweb-servlet-2.5-api-0:2.1.12-1.4_patch_01.ep5.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbossweb-servlet-2.5-api@2.1.12-1.4_patch_01.ep5.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jbossweb-jsp-2.1-api-0:2.1.12-1.4_patch_01.ep5.el5.noarch",
"product": {
"name": "jbossweb-jsp-2.1-api-0:2.1.12-1.4_patch_01.ep5.el5.noarch",
"product_id": "jbossweb-jsp-2.1-api-0:2.1.12-1.4_patch_01.ep5.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbossweb-jsp-2.1-api@2.1.12-1.4_patch_01.ep5.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jboss-ejb3-proxy-clustered-0:1.0.3-2.SP1.1.ep5.el5.noarch",
"product": {
"name": "jboss-ejb3-proxy-clustered-0:1.0.3-2.SP1.1.ep5.el5.noarch",
"product_id": "jboss-ejb3-proxy-clustered-0:1.0.3-2.SP1.1.ep5.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jboss-ejb3-proxy-clustered@1.0.3-2.SP1.1.ep5.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "facelets-0:1.1.15-3.B1_patch_01.2.ep5.el5.noarch",
"product": {
"name": "facelets-0:1.1.15-3.B1_patch_01.2.ep5.el5.noarch",
"product_id": "facelets-0:1.1.15-3.B1_patch_01.2.ep5.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/facelets@1.1.15-3.B1_patch_01.2.ep5.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jbossws-framework-0:3.1.2-6.SP10.2.ep5.el5.noarch",
"product": {
"name": "jbossws-framework-0:3.1.2-6.SP10.2.ep5.el5.noarch",
"product_id": "jbossws-framework-0:3.1.2-6.SP10.2.ep5.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbossws-framework@3.1.2-6.SP10.2.ep5.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "resteasy-manual-0:1.2.1-9.CP02.4.ep5.el5.noarch",
"product": {
"name": "resteasy-manual-0:1.2.1-9.CP02.4.ep5.el5.noarch",
"product_id": "resteasy-manual-0:1.2.1-9.CP02.4.ep5.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/resteasy-manual@1.2.1-9.CP02.4.ep5.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "resteasy-0:1.2.1-9.CP02.4.ep5.el5.noarch",
"product": {
"name": "resteasy-0:1.2.1-9.CP02.4.ep5.el5.noarch",
"product_id": "resteasy-0:1.2.1-9.CP02.4.ep5.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/resteasy@1.2.1-9.CP02.4.ep5.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "resteasy-examples-0:1.2.1-9.CP02.4.ep5.el5.noarch",
"product": {
"name": "resteasy-examples-0:1.2.1-9.CP02.4.ep5.el5.noarch",
"product_id": "resteasy-examples-0:1.2.1-9.CP02.4.ep5.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/resteasy-examples@1.2.1-9.CP02.4.ep5.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "resteasy-javadoc-0:1.2.1-9.CP02.4.ep5.el5.noarch",
"product": {
"name": "resteasy-javadoc-0:1.2.1-9.CP02.4.ep5.el5.noarch",
"product_id": "resteasy-javadoc-0:1.2.1-9.CP02.4.ep5.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/resteasy-javadoc@1.2.1-9.CP02.4.ep5.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jboss-naming-0:5.0.3-3.CP01.3.1.ep5.el5.noarch",
"product": {
"name": "jboss-naming-0:5.0.3-3.CP01.3.1.ep5.el5.noarch",
"product_id": "jboss-naming-0:5.0.3-3.CP01.3.1.ep5.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jboss-naming@5.0.3-3.CP01.3.1.ep5.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jbosssx2-0:2.0.4-6.SP8.2.ep5.el5.noarch",
"product": {
"name": "jbosssx2-0:2.0.4-6.SP8.2.ep5.el5.noarch",
"product_id": "jbosssx2-0:2.0.4-6.SP8.2.ep5.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbosssx2@2.0.4-6.SP8.2.ep5.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "org-mc4j-ems-0:1.2.15.1-4.ep5.el5.noarch",
"product": {
"name": "org-mc4j-ems-0:1.2.15.1-4.ep5.el5.noarch",
"product_id": "org-mc4j-ems-0:1.2.15.1-4.ep5.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/org-mc4j-ems@1.2.15.1-4.ep5.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jboss-el-0:1.0_02-0.CR6.2.ep5.el5.noarch",
"product": {
"name": "jboss-el-0:1.0_02-0.CR6.2.ep5.el5.noarch",
"product_id": "jboss-el-0:1.0_02-0.CR6.2.ep5.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jboss-el@1.0_02-0.CR6.2.ep5.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jbossws-0:3.1.2-7.SP11.4.ep5.el5.noarch",
"product": {
"name": "jbossws-0:3.1.2-7.SP11.4.ep5.el5.noarch",
"product_id": "jbossws-0:3.1.2-7.SP11.4.ep5.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbossws@3.1.2-7.SP11.4.ep5.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jboss-seam2-examples-0:2.2.5.EAP5-5.ep5.el5.noarch",
"product": {
"name": "jboss-seam2-examples-0:2.2.5.EAP5-5.ep5.el5.noarch",
"product_id": "jboss-seam2-examples-0:2.2.5.EAP5-5.ep5.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jboss-seam2-examples@2.2.5.EAP5-5.ep5.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jboss-seam2-docs-0:2.2.5.EAP5-5.ep5.el5.noarch",
"product": {
"name": "jboss-seam2-docs-0:2.2.5.EAP5-5.ep5.el5.noarch",
"product_id": "jboss-seam2-docs-0:2.2.5.EAP5-5.ep5.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jboss-seam2-docs@2.2.5.EAP5-5.ep5.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jboss-seam2-runtime-0:2.2.5.EAP5-5.ep5.el5.noarch",
"product": {
"name": "jboss-seam2-runtime-0:2.2.5.EAP5-5.ep5.el5.noarch",
"product_id": "jboss-seam2-runtime-0:2.2.5.EAP5-5.ep5.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jboss-seam2-runtime@2.2.5.EAP5-5.ep5.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jboss-seam2-0:2.2.5.EAP5-5.ep5.el5.noarch",
"product": {
"name": "jboss-seam2-0:2.2.5.EAP5-5.ep5.el5.noarch",
"product_id": "jboss-seam2-0:2.2.5.EAP5-5.ep5.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jboss-seam2@2.2.5.EAP5-5.ep5.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "picketlink-federation-webapp-idp-0:2.0.2-1.1.ep5.el5.noarch",
"product": {
"name": "picketlink-federation-webapp-idp-0:2.0.2-1.1.ep5.el5.noarch",
"product_id": "picketlink-federation-webapp-idp-0:2.0.2-1.1.ep5.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/picketlink-federation-webapp-idp@2.0.2-1.1.ep5.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "picketlink-federation-0:2.0.2-1.1.ep5.el5.noarch",
"product": {
"name": "picketlink-federation-0:2.0.2-1.1.ep5.el5.noarch",
"product_id": "picketlink-federation-0:2.0.2-1.1.ep5.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/picketlink-federation@2.0.2-1.1.ep5.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "picketlink-federation-webapp-pdp-0:2.0.2-1.1.ep5.el5.noarch",
"product": {
"name": "picketlink-federation-webapp-pdp-0:2.0.2-1.1.ep5.el5.noarch",
"product_id": "picketlink-federation-webapp-pdp-0:2.0.2-1.1.ep5.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/picketlink-federation-webapp-pdp@2.0.2-1.1.ep5.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "picketlink-federation-webapp-sts-0:2.0.2-1.1.ep5.el5.noarch",
"product": {
"name": "picketlink-federation-webapp-sts-0:2.0.2-1.1.ep5.el5.noarch",
"product_id": "picketlink-federation-webapp-sts-0:2.0.2-1.1.ep5.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/picketlink-federation-webapp-sts@2.0.2-1.1.ep5.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jboss-messaging-0:1.4.8-9.SP5.1.ep5.el5.noarch",
"product": {
"name": "jboss-messaging-0:1.4.8-9.SP5.1.ep5.el5.noarch",
"product_id": "jboss-messaging-0:1.4.8-9.SP5.1.ep5.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jboss-messaging@1.4.8-9.SP5.1.ep5.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "rhq-common-parent-0:3.0.0-20.EmbJopr4.ep5.el5.noarch",
"product": {
"name": "rhq-common-parent-0:3.0.0-20.EmbJopr4.ep5.el5.noarch",
"product_id": "rhq-common-parent-0:3.0.0-20.EmbJopr4.ep5.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rhq-common-parent@3.0.0-20.EmbJopr4.ep5.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "rhq-parent-0:3.0.0-20.EmbJopr4.ep5.el5.noarch",
"product": {
"name": "rhq-parent-0:3.0.0-20.EmbJopr4.ep5.el5.noarch",
"product_id": "rhq-parent-0:3.0.0-20.EmbJopr4.ep5.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rhq-parent@3.0.0-20.EmbJopr4.ep5.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "rhq-jboss-as-common-0:3.0.0-20.EmbJopr4.ep5.el5.noarch",
"product": {
"name": "rhq-jboss-as-common-0:3.0.0-20.EmbJopr4.ep5.el5.noarch",
"product_id": "rhq-jboss-as-common-0:3.0.0-20.EmbJopr4.ep5.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rhq-jboss-as-common@3.0.0-20.EmbJopr4.ep5.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "rhq-helpers-0:3.0.0-20.EmbJopr4.ep5.el5.noarch",
"product": {
"name": "rhq-helpers-0:3.0.0-20.EmbJopr4.ep5.el5.noarch",
"product_id": "rhq-helpers-0:3.0.0-20.EmbJopr4.ep5.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rhq-helpers@3.0.0-20.EmbJopr4.ep5.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "rhq-core-util-0:3.0.0-20.EmbJopr4.ep5.el5.noarch",
"product": {
"name": "rhq-core-util-0:3.0.0-20.EmbJopr4.ep5.el5.noarch",
"product_id": "rhq-core-util-0:3.0.0-20.EmbJopr4.ep5.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rhq-core-util@3.0.0-20.EmbJopr4.ep5.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "rhq-ant-bundle-common-0:3.0.0-20.EmbJopr4.ep5.el5.noarch",
"product": {
"name": "rhq-ant-bundle-common-0:3.0.0-20.EmbJopr4.ep5.el5.noarch",
"product_id": "rhq-ant-bundle-common-0:3.0.0-20.EmbJopr4.ep5.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rhq-ant-bundle-common@3.0.0-20.EmbJopr4.ep5.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "rhq-core-gui-0:3.0.0-20.EmbJopr4.ep5.el5.noarch",
"product": {
"name": "rhq-core-gui-0:3.0.0-20.EmbJopr4.ep5.el5.noarch",
"product_id": "rhq-core-gui-0:3.0.0-20.EmbJopr4.ep5.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rhq-core-gui@3.0.0-20.EmbJopr4.ep5.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "rhq-core-native-system-0:3.0.0-20.EmbJopr4.ep5.el5.noarch",
"product": {
"name": "rhq-core-native-system-0:3.0.0-20.EmbJopr4.ep5.el5.noarch",
"product_id": "rhq-core-native-system-0:3.0.0-20.EmbJopr4.ep5.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rhq-core-native-system@3.0.0-20.EmbJopr4.ep5.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "rhq-pluginAnnotations-0:3.0.0-20.EmbJopr4.ep5.el5.noarch",
"product": {
"name": "rhq-pluginAnnotations-0:3.0.0-20.EmbJopr4.ep5.el5.noarch",
"product_id": "rhq-pluginAnnotations-0:3.0.0-20.EmbJopr4.ep5.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rhq-pluginAnnotations@3.0.0-20.EmbJopr4.ep5.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "rhq-0:3.0.0-20.EmbJopr4.ep5.el5.noarch",
"product": {
"name": "rhq-0:3.0.0-20.EmbJopr4.ep5.el5.noarch",
"product_id": "rhq-0:3.0.0-20.EmbJopr4.ep5.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rhq@3.0.0-20.EmbJopr4.ep5.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "rhq-core-plugin-api-0:3.0.0-20.EmbJopr4.ep5.el5.noarch",
"product": {
"name": "rhq-core-plugin-api-0:3.0.0-20.EmbJopr4.ep5.el5.noarch",
"product_id": "rhq-core-plugin-api-0:3.0.0-20.EmbJopr4.ep5.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rhq-core-plugin-api@3.0.0-20.EmbJopr4.ep5.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "rhq-core-parent-0:3.0.0-20.EmbJopr4.ep5.el5.noarch",
"product": {
"name": "rhq-core-parent-0:3.0.0-20.EmbJopr4.ep5.el5.noarch",
"product_id": "rhq-core-parent-0:3.0.0-20.EmbJopr4.ep5.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rhq-core-parent@3.0.0-20.EmbJopr4.ep5.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "rhq-filetemplate-bundle-common-0:3.0.0-20.EmbJopr4.ep5.el5.noarch",
"product": {
"name": "rhq-filetemplate-bundle-common-0:3.0.0-20.EmbJopr4.ep5.el5.noarch",
"product_id": "rhq-filetemplate-bundle-common-0:3.0.0-20.EmbJopr4.ep5.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rhq-filetemplate-bundle-common@3.0.0-20.EmbJopr4.ep5.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "rhq-pluginGen-0:3.0.0-20.EmbJopr4.ep5.el5.noarch",
"product": {
"name": "rhq-pluginGen-0:3.0.0-20.EmbJopr4.ep5.el5.noarch",
"product_id": "rhq-pluginGen-0:3.0.0-20.EmbJopr4.ep5.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rhq-pluginGen@3.0.0-20.EmbJopr4.ep5.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "rhq-rtfilter-0:3.0.0-20.EmbJopr4.ep5.el5.noarch",
"product": {
"name": "rhq-rtfilter-0:3.0.0-20.EmbJopr4.ep5.el5.noarch",
"product_id": "rhq-rtfilter-0:3.0.0-20.EmbJopr4.ep5.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rhq-rtfilter@3.0.0-20.EmbJopr4.ep5.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "rhq-modules-parent-0:3.0.0-20.EmbJopr4.ep5.el5.noarch",
"product": {
"name": "rhq-modules-parent-0:3.0.0-20.EmbJopr4.ep5.el5.noarch",
"product_id": "rhq-modules-parent-0:3.0.0-20.EmbJopr4.ep5.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rhq-modules-parent@3.0.0-20.EmbJopr4.ep5.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "rhq-core-dbutils-0:3.0.0-20.EmbJopr4.ep5.el5.noarch",
"product": {
"name": "rhq-core-dbutils-0:3.0.0-20.EmbJopr4.ep5.el5.noarch",
"product_id": "rhq-core-dbutils-0:3.0.0-20.EmbJopr4.ep5.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rhq-core-dbutils@3.0.0-20.EmbJopr4.ep5.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "rhq-plugins-parent-0:3.0.0-20.EmbJopr4.ep5.el5.noarch",
"product": {
"name": "rhq-plugins-parent-0:3.0.0-20.EmbJopr4.ep5.el5.noarch",
"product_id": "rhq-plugins-parent-0:3.0.0-20.EmbJopr4.ep5.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rhq-plugins-parent@3.0.0-20.EmbJopr4.ep5.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "rhq-core-plugin-container-0:3.0.0-20.EmbJopr4.ep5.el5.noarch",
"product": {
"name": "rhq-core-plugin-container-0:3.0.0-20.EmbJopr4.ep5.el5.noarch",
"product_id": "rhq-core-plugin-container-0:3.0.0-20.EmbJopr4.ep5.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rhq-core-plugin-container@3.0.0-20.EmbJopr4.ep5.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "rhq-core-plugindoc-0:3.0.0-20.EmbJopr4.ep5.el5.noarch",
"product": {
"name": "rhq-core-plugindoc-0:3.0.0-20.EmbJopr4.ep5.el5.noarch",
"product_id": "rhq-core-plugindoc-0:3.0.0-20.EmbJopr4.ep5.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rhq-core-plugindoc@3.0.0-20.EmbJopr4.ep5.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "rhq-core-client-api-0:3.0.0-20.EmbJopr4.ep5.el5.noarch",
"product": {
"name": "rhq-core-client-api-0:3.0.0-20.EmbJopr4.ep5.el5.noarch",
"product_id": "rhq-core-client-api-0:3.0.0-20.EmbJopr4.ep5.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rhq-core-client-api@3.0.0-20.EmbJopr4.ep5.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "rhq-core-domain-0:3.0.0-20.EmbJopr4.ep5.el5.noarch",
"product": {
"name": "rhq-core-domain-0:3.0.0-20.EmbJopr4.ep5.el5.noarch",
"product_id": "rhq-core-domain-0:3.0.0-20.EmbJopr4.ep5.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rhq-core-domain@3.0.0-20.EmbJopr4.ep5.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "rhq-plugin-validator-0:3.0.0-20.EmbJopr4.ep5.el5.noarch",
"product": {
"name": "rhq-plugin-validator-0:3.0.0-20.EmbJopr4.ep5.el5.noarch",
"product_id": "rhq-plugin-validator-0:3.0.0-20.EmbJopr4.ep5.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rhq-plugin-validator@3.0.0-20.EmbJopr4.ep5.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "rhq-core-comm-api-0:3.0.0-20.EmbJopr4.ep5.el5.noarch",
"product": {
"name": "rhq-core-comm-api-0:3.0.0-20.EmbJopr4.ep5.el5.noarch",
"product_id": "rhq-core-comm-api-0:3.0.0-20.EmbJopr4.ep5.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rhq-core-comm-api@3.0.0-20.EmbJopr4.ep5.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "rhq-jmx-plugin-0:3.0.0-20.EmbJopr4.ep5.el5.noarch",
"product": {
"name": "rhq-jmx-plugin-0:3.0.0-20.EmbJopr4.ep5.el5.noarch",
"product_id": "rhq-jmx-plugin-0:3.0.0-20.EmbJopr4.ep5.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rhq-jmx-plugin@3.0.0-20.EmbJopr4.ep5.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jacorb-jboss-0:2.3.1-10.patch_03.4.ep5.el5.noarch",
"product": {
"name": "jacorb-jboss-0:2.3.1-10.patch_03.4.ep5.el5.noarch",
"product_id": "jacorb-jboss-0:2.3.1-10.patch_03.4.ep5.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jacorb-jboss@2.3.1-10.patch_03.4.ep5.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jbossts-1:4.6.1-11.CP12.4.ep5.el5.noarch",
"product": {
"name": "jbossts-1:4.6.1-11.CP12.4.ep5.el5.noarch",
"product_id": "jbossts-1:4.6.1-11.CP12.4.ep5.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbossts@4.6.1-11.CP12.4.ep5.el5?arch=noarch\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "jbossts-javadoc-1:4.6.1-11.CP12.4.ep5.el5.noarch",
"product": {
"name": "jbossts-javadoc-1:4.6.1-11.CP12.4.ep5.el5.noarch",
"product_id": "jbossts-javadoc-1:4.6.1-11.CP12.4.ep5.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbossts-javadoc@4.6.1-11.CP12.4.ep5.el5?arch=noarch\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "glassfish-jsf-0:1.2_13-5_patch_01.3.ep5.el5.noarch",
"product": {
"name": "glassfish-jsf-0:1.2_13-5_patch_01.3.ep5.el5.noarch",
"product_id": "glassfish-jsf-0:1.2_13-5_patch_01.3.ep5.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glassfish-jsf@1.2_13-5_patch_01.3.ep5.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jopr-jboss-cache-v3-plugin-0:3.0.0-14.EmbJopr4.ep5.el5.noarch",
"product": {
"name": "jopr-jboss-cache-v3-plugin-0:3.0.0-14.EmbJopr4.ep5.el5.noarch",
"product_id": "jopr-jboss-cache-v3-plugin-0:3.0.0-14.EmbJopr4.ep5.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jopr-jboss-cache-v3-plugin@3.0.0-14.EmbJopr4.ep5.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jopr-embedded-0:1.3.4-18.SP5.8.ep5.el5.noarch",
"product": {
"name": "jopr-embedded-0:1.3.4-18.SP5.8.ep5.el5.noarch",
"product_id": "jopr-embedded-0:1.3.4-18.SP5.8.ep5.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jopr-embedded@1.3.4-18.SP5.8.ep5.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jbossas-ws-cxf-0:5.1.2-8.ep5.el5.noarch",
"product": {
"name": "jbossas-ws-cxf-0:5.1.2-8.ep5.el5.noarch",
"product_id": "jbossas-ws-cxf-0:5.1.2-8.ep5.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbossas-ws-cxf@5.1.2-8.ep5.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "rhq-platform-plugin-0:3.0.0-13.EmbJopr4.ep5.el5.noarch",
"product": {
"name": "rhq-platform-plugin-0:3.0.0-13.EmbJopr4.ep5.el5.noarch",
"product_id": "rhq-platform-plugin-0:3.0.0-13.EmbJopr4.ep5.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rhq-platform-plugin@3.0.0-13.EmbJopr4.ep5.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jopr-hibernate-plugin-0:3.0.0-13.EmbJopr4.ep5.el5.noarch",
"product": {
"name": "jopr-hibernate-plugin-0:3.0.0-13.EmbJopr4.ep5.el5.noarch",
"product_id": "jopr-hibernate-plugin-0:3.0.0-13.EmbJopr4.ep5.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jopr-hibernate-plugin@3.0.0-13.EmbJopr4.ep5.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jopr-jboss-as-5-plugin-0:3.0.0-12.EmbJopr4.ep5.el5.noarch",
"product": {
"name": "jopr-jboss-as-5-plugin-0:3.0.0-12.EmbJopr4.ep5.el5.noarch",
"product_id": "jopr-jboss-as-5-plugin-0:3.0.0-12.EmbJopr4.ep5.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jopr-jboss-as-5-plugin@3.0.0-12.EmbJopr4.ep5.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jbossas-tp-licenses-0:5.1.2-7.ep5.el5.noarch",
"product": {
"name": "jbossas-tp-licenses-0:5.1.2-7.ep5.el5.noarch",
"product_id": "jbossas-tp-licenses-0:5.1.2-7.ep5.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbossas-tp-licenses@5.1.2-7.ep5.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jbossas-0:5.1.2-8.ep5.el5.noarch",
"product": {
"name": "jbossas-0:5.1.2-8.ep5.el5.noarch",
"product_id": "jbossas-0:5.1.2-8.ep5.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbossas@5.1.2-8.ep5.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jbossas-messaging-0:5.1.2-8.ep5.el5.noarch",
"product": {
"name": "jbossas-messaging-0:5.1.2-8.ep5.el5.noarch",
"product_id": "jbossas-messaging-0:5.1.2-8.ep5.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbossas-messaging@5.1.2-8.ep5.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jbossas-ws-native-0:5.1.2-8.ep5.el5.noarch",
"product": {
"name": "jbossas-ws-native-0:5.1.2-8.ep5.el5.noarch",
"product_id": "jbossas-ws-native-0:5.1.2-8.ep5.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbossas-ws-native@5.1.2-8.ep5.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jbossas-client-0:5.1.2-8.ep5.el5.noarch",
"product": {
"name": "jbossas-client-0:5.1.2-8.ep5.el5.noarch",
"product_id": "jbossas-client-0:5.1.2-8.ep5.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbossas-client@5.1.2-8.ep5.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "rh-eap-docs-examples-0:5.1.2-6.ep5.el5.noarch",
"product": {
"name": "rh-eap-docs-examples-0:5.1.2-6.ep5.el5.noarch",
"product_id": "rh-eap-docs-examples-0:5.1.2-6.ep5.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rh-eap-docs-examples@5.1.2-6.ep5.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "rh-eap-docs-0:5.1.2-6.ep5.el5.noarch",
"product": {
"name": "rh-eap-docs-0:5.1.2-6.ep5.el5.noarch",
"product_id": "rh-eap-docs-0:5.1.2-6.ep5.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rh-eap-docs@5.1.2-6.ep5.el5?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "mod_cluster-native-0:1.0.10-3.1.GA_CP02.ep5.el5.x86_64",
"product": {
"name": "mod_cluster-native-0:1.0.10-3.1.GA_CP02.ep5.el5.x86_64",
"product_id": "mod_cluster-native-0:1.0.10-3.1.GA_CP02.ep5.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_cluster-native@1.0.10-3.1.GA_CP02.ep5.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "jboss-eap5-native-0:5.1.2-1.4.ep5.el5.x86_64",
"product": {
"name": "jboss-eap5-native-0:5.1.2-1.4.ep5.el5.x86_64",
"product_id": "jboss-eap5-native-0:5.1.2-1.4.ep5.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jboss-eap5-native@5.1.2-1.4.ep5.el5?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "mod_cluster-native-0:1.0.10-3.1.GA_CP02.ep5.el5.i386",
"product": {
"name": "mod_cluster-native-0:1.0.10-3.1.GA_CP02.ep5.el5.i386",
"product_id": "mod_cluster-native-0:1.0.10-3.1.GA_CP02.ep5.el5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_cluster-native@1.0.10-3.1.GA_CP02.ep5.el5?arch=i386"
}
}
},
{
"category": "product_version",
"name": "jboss-eap5-native-0:5.1.2-1.4.ep5.el5.i386",
"product": {
"name": "jboss-eap5-native-0:5.1.2-1.4.ep5.el5.i386",
"product_id": "jboss-eap5-native-0:5.1.2-1.4.ep5.el5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jboss-eap5-native@5.1.2-1.4.ep5.el5?arch=i386"
}
}
}
],
"category": "architecture",
"name": "i386"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "apache-cxf-0:2.2.12-4.patch_02.1.1.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 5 Server",
"product_id": "5Server-JBEAP-5:apache-cxf-0:2.2.12-4.patch_02.1.1.ep5.el5.noarch"
},
"product_reference": "apache-cxf-0:2.2.12-4.patch_02.1.1.ep5.el5.noarch",
"relates_to_product_reference": "5Server-JBEAP-5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache-cxf-0:2.2.12-4.patch_02.1.1.ep5.el5.src as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 5 Server",
"product_id": "5Server-JBEAP-5:apache-cxf-0:2.2.12-4.patch_02.1.1.ep5.el5.src"
},
"product_reference": "apache-cxf-0:2.2.12-4.patch_02.1.1.ep5.el5.src",
"relates_to_product_reference": "5Server-JBEAP-5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cglib-0:2.2-5.3.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 5 Server",
"product_id": "5Server-JBEAP-5:cglib-0:2.2-5.3.ep5.el5.noarch"
},
"product_reference": "cglib-0:2.2-5.3.ep5.el5.noarch",
"relates_to_product_reference": "5Server-JBEAP-5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cglib-0:2.2-5.3.ep5.el5.src as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 5 Server",
"product_id": "5Server-JBEAP-5:cglib-0:2.2-5.3.ep5.el5.src"
},
"product_reference": "cglib-0:2.2-5.3.ep5.el5.src",
"relates_to_product_reference": "5Server-JBEAP-5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "facelets-0:1.1.15-3.B1_patch_01.2.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 5 Server",
"product_id": "5Server-JBEAP-5:facelets-0:1.1.15-3.B1_patch_01.2.ep5.el5.noarch"
},
"product_reference": "facelets-0:1.1.15-3.B1_patch_01.2.ep5.el5.noarch",
"relates_to_product_reference": "5Server-JBEAP-5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "facelets-0:1.1.15-3.B1_patch_01.2.ep5.el5.src as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 5 Server",
"product_id": "5Server-JBEAP-5:facelets-0:1.1.15-3.B1_patch_01.2.ep5.el5.src"
},
"product_reference": "facelets-0:1.1.15-3.B1_patch_01.2.ep5.el5.src",
"relates_to_product_reference": "5Server-JBEAP-5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-jaxb-0:2.1.12-10_patch_02.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 5 Server",
"product_id": "5Server-JBEAP-5:glassfish-jaxb-0:2.1.12-10_patch_02.ep5.el5.noarch"
},
"product_reference": "glassfish-jaxb-0:2.1.12-10_patch_02.ep5.el5.noarch",
"relates_to_product_reference": "5Server-JBEAP-5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-jaxb-0:2.1.12-10_patch_02.ep5.el5.src as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 5 Server",
"product_id": "5Server-JBEAP-5:glassfish-jaxb-0:2.1.12-10_patch_02.ep5.el5.src"
},
"product_reference": "glassfish-jaxb-0:2.1.12-10_patch_02.ep5.el5.src",
"relates_to_product_reference": "5Server-JBEAP-5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-jsf-0:1.2_13-5_patch_01.3.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 5 Server",
"product_id": "5Server-JBEAP-5:glassfish-jsf-0:1.2_13-5_patch_01.3.ep5.el5.noarch"
},
"product_reference": "glassfish-jsf-0:1.2_13-5_patch_01.3.ep5.el5.noarch",
"relates_to_product_reference": "5Server-JBEAP-5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-jsf-0:1.2_13-5_patch_01.3.ep5.el5.src as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 5 Server",
"product_id": "5Server-JBEAP-5:glassfish-jsf-0:1.2_13-5_patch_01.3.ep5.el5.src"
},
"product_reference": "glassfish-jsf-0:1.2_13-5_patch_01.3.ep5.el5.src",
"relates_to_product_reference": "5Server-JBEAP-5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jacorb-jboss-0:2.3.1-10.patch_03.4.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 5 Server",
"product_id": "5Server-JBEAP-5:jacorb-jboss-0:2.3.1-10.patch_03.4.ep5.el5.noarch"
},
"product_reference": "jacorb-jboss-0:2.3.1-10.patch_03.4.ep5.el5.noarch",
"relates_to_product_reference": "5Server-JBEAP-5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jacorb-jboss-0:2.3.1-10.patch_03.4.ep5.el5.src as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 5 Server",
"product_id": "5Server-JBEAP-5:jacorb-jboss-0:2.3.1-10.patch_03.4.ep5.el5.src"
},
"product_reference": "jacorb-jboss-0:2.3.1-10.patch_03.4.ep5.el5.src",
"relates_to_product_reference": "5Server-JBEAP-5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jakarta-commons-logging-jboss-0:1.1-10.3_patch_02.1.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 5 Server",
"product_id": "5Server-JBEAP-5:jakarta-commons-logging-jboss-0:1.1-10.3_patch_02.1.ep5.el5.noarch"
},
"product_reference": "jakarta-commons-logging-jboss-0:1.1-10.3_patch_02.1.ep5.el5.noarch",
"relates_to_product_reference": "5Server-JBEAP-5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jakarta-commons-logging-jboss-0:1.1-10.3_patch_02.1.ep5.el5.src as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 5 Server",
"product_id": "5Server-JBEAP-5:jakarta-commons-logging-jboss-0:1.1-10.3_patch_02.1.ep5.el5.src"
},
"product_reference": "jakarta-commons-logging-jboss-0:1.1-10.3_patch_02.1.ep5.el5.src",
"relates_to_product_reference": "5Server-JBEAP-5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-aop2-0:2.1.6-2.CP03.1.1.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 5 Server",
"product_id": "5Server-JBEAP-5:jboss-aop2-0:2.1.6-2.CP03.1.1.ep5.el5.noarch"
},
"product_reference": "jboss-aop2-0:2.1.6-2.CP03.1.1.ep5.el5.noarch",
"relates_to_product_reference": "5Server-JBEAP-5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-aop2-0:2.1.6-2.CP03.1.1.ep5.el5.src as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 5 Server",
"product_id": "5Server-JBEAP-5:jboss-aop2-0:2.1.6-2.CP03.1.1.ep5.el5.src"
},
"product_reference": "jboss-aop2-0:2.1.6-2.CP03.1.1.ep5.el5.src",
"relates_to_product_reference": "5Server-JBEAP-5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-cache-core-0:3.2.8-1.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 5 Server",
"product_id": "5Server-JBEAP-5:jboss-cache-core-0:3.2.8-1.ep5.el5.noarch"
},
"product_reference": "jboss-cache-core-0:3.2.8-1.ep5.el5.noarch",
"relates_to_product_reference": "5Server-JBEAP-5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-cache-core-0:3.2.8-1.ep5.el5.src as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 5 Server",
"product_id": "5Server-JBEAP-5:jboss-cache-core-0:3.2.8-1.ep5.el5.src"
},
"product_reference": "jboss-cache-core-0:3.2.8-1.ep5.el5.src",
"relates_to_product_reference": "5Server-JBEAP-5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-cl-0:2.0.10-1.2.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 5 Server",
"product_id": "5Server-JBEAP-5:jboss-cl-0:2.0.10-1.2.ep5.el5.noarch"
},
"product_reference": "jboss-cl-0:2.0.10-1.2.ep5.el5.noarch",
"relates_to_product_reference": "5Server-JBEAP-5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-cl-0:2.0.10-1.2.ep5.el5.src as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 5 Server",
"product_id": "5Server-JBEAP-5:jboss-cl-0:2.0.10-1.2.ep5.el5.src"
},
"product_reference": "jboss-cl-0:2.0.10-1.2.ep5.el5.src",
"relates_to_product_reference": "5Server-JBEAP-5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-cluster-ha-client-0:1.1.4-1.1.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 5 Server",
"product_id": "5Server-JBEAP-5:jboss-cluster-ha-client-0:1.1.4-1.1.ep5.el5.noarch"
},
"product_reference": "jboss-cluster-ha-client-0:1.1.4-1.1.ep5.el5.noarch",
"relates_to_product_reference": "5Server-JBEAP-5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-cluster-ha-client-0:1.1.4-1.1.ep5.el5.src as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 5 Server",
"product_id": "5Server-JBEAP-5:jboss-cluster-ha-client-0:1.1.4-1.1.ep5.el5.src"
},
"product_reference": "jboss-cluster-ha-client-0:1.1.4-1.1.ep5.el5.src",
"relates_to_product_reference": "5Server-JBEAP-5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-common-core-0:2.2.18-1.1.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 5 Server",
"product_id": "5Server-JBEAP-5:jboss-common-core-0:2.2.18-1.1.ep5.el5.noarch"
},
"product_reference": "jboss-common-core-0:2.2.18-1.1.ep5.el5.noarch",
"relates_to_product_reference": "5Server-JBEAP-5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-common-core-0:2.2.18-1.1.ep5.el5.src as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 5 Server",
"product_id": "5Server-JBEAP-5:jboss-common-core-0:2.2.18-1.1.ep5.el5.src"
},
"product_reference": "jboss-common-core-0:2.2.18-1.1.ep5.el5.src",
"relates_to_product_reference": "5Server-JBEAP-5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-eap5-native-0:5.1.2-1.4.ep5.el5.i386 as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 5 Server",
"product_id": "5Server-JBEAP-5:jboss-eap5-native-0:5.1.2-1.4.ep5.el5.i386"
},
"product_reference": "jboss-eap5-native-0:5.1.2-1.4.ep5.el5.i386",
"relates_to_product_reference": "5Server-JBEAP-5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-eap5-native-0:5.1.2-1.4.ep5.el5.src as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 5 Server",
"product_id": "5Server-JBEAP-5:jboss-eap5-native-0:5.1.2-1.4.ep5.el5.src"
},
"product_reference": "jboss-eap5-native-0:5.1.2-1.4.ep5.el5.src",
"relates_to_product_reference": "5Server-JBEAP-5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-eap5-native-0:5.1.2-1.4.ep5.el5.x86_64 as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 5 Server",
"product_id": "5Server-JBEAP-5:jboss-eap5-native-0:5.1.2-1.4.ep5.el5.x86_64"
},
"product_reference": "jboss-eap5-native-0:5.1.2-1.4.ep5.el5.x86_64",
"relates_to_product_reference": "5Server-JBEAP-5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-ejb3-core-0:1.3.8-0.1.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 5 Server",
"product_id": "5Server-JBEAP-5:jboss-ejb3-core-0:1.3.8-0.1.ep5.el5.noarch"
},
"product_reference": "jboss-ejb3-core-0:1.3.8-0.1.ep5.el5.noarch",
"relates_to_product_reference": "5Server-JBEAP-5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-ejb3-core-0:1.3.8-0.1.ep5.el5.src as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 5 Server",
"product_id": "5Server-JBEAP-5:jboss-ejb3-core-0:1.3.8-0.1.ep5.el5.src"
},
"product_reference": "jboss-ejb3-core-0:1.3.8-0.1.ep5.el5.src",
"relates_to_product_reference": "5Server-JBEAP-5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-ejb3-proxy-clustered-0:1.0.3-2.SP1.1.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 5 Server",
"product_id": "5Server-JBEAP-5:jboss-ejb3-proxy-clustered-0:1.0.3-2.SP1.1.ep5.el5.noarch"
},
"product_reference": "jboss-ejb3-proxy-clustered-0:1.0.3-2.SP1.1.ep5.el5.noarch",
"relates_to_product_reference": "5Server-JBEAP-5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-ejb3-proxy-clustered-0:1.0.3-2.SP1.1.ep5.el5.src as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 5 Server",
"product_id": "5Server-JBEAP-5:jboss-ejb3-proxy-clustered-0:1.0.3-2.SP1.1.ep5.el5.src"
},
"product_reference": "jboss-ejb3-proxy-clustered-0:1.0.3-2.SP1.1.ep5.el5.src",
"relates_to_product_reference": "5Server-JBEAP-5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-ejb3-proxy-impl-0:1.0.6-2.SP2.1.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 5 Server",
"product_id": "5Server-JBEAP-5:jboss-ejb3-proxy-impl-0:1.0.6-2.SP2.1.ep5.el5.noarch"
},
"product_reference": "jboss-ejb3-proxy-impl-0:1.0.6-2.SP2.1.ep5.el5.noarch",
"relates_to_product_reference": "5Server-JBEAP-5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-ejb3-proxy-impl-0:1.0.6-2.SP2.1.ep5.el5.src as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 5 Server",
"product_id": "5Server-JBEAP-5:jboss-ejb3-proxy-impl-0:1.0.6-2.SP2.1.ep5.el5.src"
},
"product_reference": "jboss-ejb3-proxy-impl-0:1.0.6-2.SP2.1.ep5.el5.src",
"relates_to_product_reference": "5Server-JBEAP-5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-el-0:1.0_02-0.CR6.2.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 5 Server",
"product_id": "5Server-JBEAP-5:jboss-el-0:1.0_02-0.CR6.2.ep5.el5.noarch"
},
"product_reference": "jboss-el-0:1.0_02-0.CR6.2.ep5.el5.noarch",
"relates_to_product_reference": "5Server-JBEAP-5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-el-0:1.0_02-0.CR6.2.ep5.el5.src as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 5 Server",
"product_id": "5Server-JBEAP-5:jboss-el-0:1.0_02-0.CR6.2.ep5.el5.src"
},
"product_reference": "jboss-el-0:1.0_02-0.CR6.2.ep5.el5.src",
"relates_to_product_reference": "5Server-JBEAP-5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-messaging-0:1.4.8-9.SP5.1.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 5 Server",
"product_id": "5Server-JBEAP-5:jboss-messaging-0:1.4.8-9.SP5.1.ep5.el5.noarch"
},
"product_reference": "jboss-messaging-0:1.4.8-9.SP5.1.ep5.el5.noarch",
"relates_to_product_reference": "5Server-JBEAP-5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-messaging-0:1.4.8-9.SP5.1.ep5.el5.src as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 5 Server",
"product_id": "5Server-JBEAP-5:jboss-messaging-0:1.4.8-9.SP5.1.ep5.el5.src"
},
"product_reference": "jboss-messaging-0:1.4.8-9.SP5.1.ep5.el5.src",
"relates_to_product_reference": "5Server-JBEAP-5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-naming-0:5.0.3-3.CP01.3.1.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 5 Server",
"product_id": "5Server-JBEAP-5:jboss-naming-0:5.0.3-3.CP01.3.1.ep5.el5.noarch"
},
"product_reference": "jboss-naming-0:5.0.3-3.CP01.3.1.ep5.el5.noarch",
"relates_to_product_reference": "5Server-JBEAP-5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-naming-0:5.0.3-3.CP01.3.1.ep5.el5.src as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 5 Server",
"product_id": "5Server-JBEAP-5:jboss-naming-0:5.0.3-3.CP01.3.1.ep5.el5.src"
},
"product_reference": "jboss-naming-0:5.0.3-3.CP01.3.1.ep5.el5.src",
"relates_to_product_reference": "5Server-JBEAP-5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-remoting-0:2.5.4-9.SP3.1.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 5 Server",
"product_id": "5Server-JBEAP-5:jboss-remoting-0:2.5.4-9.SP3.1.ep5.el5.noarch"
},
"product_reference": "jboss-remoting-0:2.5.4-9.SP3.1.ep5.el5.noarch",
"relates_to_product_reference": "5Server-JBEAP-5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-remoting-0:2.5.4-9.SP3.1.ep5.el5.src as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 5 Server",
"product_id": "5Server-JBEAP-5:jboss-remoting-0:2.5.4-9.SP3.1.ep5.el5.src"
},
"product_reference": "jboss-remoting-0:2.5.4-9.SP3.1.ep5.el5.src",
"relates_to_product_reference": "5Server-JBEAP-5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-seam2-0:2.2.5.EAP5-5.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 5 Server",
"product_id": "5Server-JBEAP-5:jboss-seam2-0:2.2.5.EAP5-5.ep5.el5.noarch"
},
"product_reference": "jboss-seam2-0:2.2.5.EAP5-5.ep5.el5.noarch",
"relates_to_product_reference": "5Server-JBEAP-5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-seam2-0:2.2.5.EAP5-5.ep5.el5.src as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 5 Server",
"product_id": "5Server-JBEAP-5:jboss-seam2-0:2.2.5.EAP5-5.ep5.el5.src"
},
"product_reference": "jboss-seam2-0:2.2.5.EAP5-5.ep5.el5.src",
"relates_to_product_reference": "5Server-JBEAP-5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-seam2-docs-0:2.2.5.EAP5-5.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 5 Server",
"product_id": "5Server-JBEAP-5:jboss-seam2-docs-0:2.2.5.EAP5-5.ep5.el5.noarch"
},
"product_reference": "jboss-seam2-docs-0:2.2.5.EAP5-5.ep5.el5.noarch",
"relates_to_product_reference": "5Server-JBEAP-5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-seam2-examples-0:2.2.5.EAP5-5.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 5 Server",
"product_id": "5Server-JBEAP-5:jboss-seam2-examples-0:2.2.5.EAP5-5.ep5.el5.noarch"
},
"product_reference": "jboss-seam2-examples-0:2.2.5.EAP5-5.ep5.el5.noarch",
"relates_to_product_reference": "5Server-JBEAP-5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-seam2-runtime-0:2.2.5.EAP5-5.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 5 Server",
"product_id": "5Server-JBEAP-5:jboss-seam2-runtime-0:2.2.5.EAP5-5.ep5.el5.noarch"
},
"product_reference": "jboss-seam2-runtime-0:2.2.5.EAP5-5.ep5.el5.noarch",
"relates_to_product_reference": "5Server-JBEAP-5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-security-spi-1:2.0.4-6.SP8.1.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 5 Server",
"product_id": "5Server-JBEAP-5:jboss-security-spi-1:2.0.4-6.SP8.1.ep5.el5.noarch"
},
"product_reference": "jboss-security-spi-1:2.0.4-6.SP8.1.ep5.el5.noarch",
"relates_to_product_reference": "5Server-JBEAP-5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-security-spi-1:2.0.4-6.SP8.1.ep5.el5.src as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 5 Server",
"product_id": "5Server-JBEAP-5:jboss-security-spi-1:2.0.4-6.SP8.1.ep5.el5.src"
},
"product_reference": "jboss-security-spi-1:2.0.4-6.SP8.1.ep5.el5.src",
"relates_to_product_reference": "5Server-JBEAP-5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossas-0:5.1.2-8.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 5 Server",
"product_id": "5Server-JBEAP-5:jbossas-0:5.1.2-8.ep5.el5.noarch"
},
"product_reference": "jbossas-0:5.1.2-8.ep5.el5.noarch",
"relates_to_product_reference": "5Server-JBEAP-5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossas-0:5.1.2-8.ep5.el5.src as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 5 Server",
"product_id": "5Server-JBEAP-5:jbossas-0:5.1.2-8.ep5.el5.src"
},
"product_reference": "jbossas-0:5.1.2-8.ep5.el5.src",
"relates_to_product_reference": "5Server-JBEAP-5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossas-client-0:5.1.2-8.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 5 Server",
"product_id": "5Server-JBEAP-5:jbossas-client-0:5.1.2-8.ep5.el5.noarch"
},
"product_reference": "jbossas-client-0:5.1.2-8.ep5.el5.noarch",
"relates_to_product_reference": "5Server-JBEAP-5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossas-messaging-0:5.1.2-8.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 5 Server",
"product_id": "5Server-JBEAP-5:jbossas-messaging-0:5.1.2-8.ep5.el5.noarch"
},
"product_reference": "jbossas-messaging-0:5.1.2-8.ep5.el5.noarch",
"relates_to_product_reference": "5Server-JBEAP-5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossas-tp-licenses-0:5.1.2-7.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 5 Server",
"product_id": "5Server-JBEAP-5:jbossas-tp-licenses-0:5.1.2-7.ep5.el5.noarch"
},
"product_reference": "jbossas-tp-licenses-0:5.1.2-7.ep5.el5.noarch",
"relates_to_product_reference": "5Server-JBEAP-5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossas-tp-licenses-0:5.1.2-7.ep5.el5.src as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 5 Server",
"product_id": "5Server-JBEAP-5:jbossas-tp-licenses-0:5.1.2-7.ep5.el5.src"
},
"product_reference": "jbossas-tp-licenses-0:5.1.2-7.ep5.el5.src",
"relates_to_product_reference": "5Server-JBEAP-5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossas-ws-cxf-0:5.1.2-8.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 5 Server",
"product_id": "5Server-JBEAP-5:jbossas-ws-cxf-0:5.1.2-8.ep5.el5.noarch"
},
"product_reference": "jbossas-ws-cxf-0:5.1.2-8.ep5.el5.noarch",
"relates_to_product_reference": "5Server-JBEAP-5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossas-ws-cxf-0:5.1.2-8.ep5.el5.src as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 5 Server",
"product_id": "5Server-JBEAP-5:jbossas-ws-cxf-0:5.1.2-8.ep5.el5.src"
},
"product_reference": "jbossas-ws-cxf-0:5.1.2-8.ep5.el5.src",
"relates_to_product_reference": "5Server-JBEAP-5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossas-ws-native-0:5.1.2-8.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 5 Server",
"product_id": "5Server-JBEAP-5:jbossas-ws-native-0:5.1.2-8.ep5.el5.noarch"
},
"product_reference": "jbossas-ws-native-0:5.1.2-8.ep5.el5.noarch",
"relates_to_product_reference": "5Server-JBEAP-5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbosssx2-0:2.0.4-6.SP8.2.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 5 Server",
"product_id": "5Server-JBEAP-5:jbosssx2-0:2.0.4-6.SP8.2.ep5.el5.noarch"
},
"product_reference": "jbosssx2-0:2.0.4-6.SP8.2.ep5.el5.noarch",
"relates_to_product_reference": "5Server-JBEAP-5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbosssx2-0:2.0.4-6.SP8.2.ep5.el5.src as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 5 Server",
"product_id": "5Server-JBEAP-5:jbosssx2-0:2.0.4-6.SP8.2.ep5.el5.src"
},
"product_reference": "jbosssx2-0:2.0.4-6.SP8.2.ep5.el5.src",
"relates_to_product_reference": "5Server-JBEAP-5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossts-1:4.6.1-11.CP12.4.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 5 Server",
"product_id": "5Server-JBEAP-5:jbossts-1:4.6.1-11.CP12.4.ep5.el5.noarch"
},
"product_reference": "jbossts-1:4.6.1-11.CP12.4.ep5.el5.noarch",
"relates_to_product_reference": "5Server-JBEAP-5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossts-1:4.6.1-11.CP12.4.ep5.el5.src as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 5 Server",
"product_id": "5Server-JBEAP-5:jbossts-1:4.6.1-11.CP12.4.ep5.el5.src"
},
"product_reference": "jbossts-1:4.6.1-11.CP12.4.ep5.el5.src",
"relates_to_product_reference": "5Server-JBEAP-5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossts-javadoc-1:4.6.1-11.CP12.4.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 5 Server",
"product_id": "5Server-JBEAP-5:jbossts-javadoc-1:4.6.1-11.CP12.4.ep5.el5.noarch"
},
"product_reference": "jbossts-javadoc-1:4.6.1-11.CP12.4.ep5.el5.noarch",
"relates_to_product_reference": "5Server-JBEAP-5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossweb-0:2.1.12-1.4_patch_01.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 5 Server",
"product_id": "5Server-JBEAP-5:jbossweb-0:2.1.12-1.4_patch_01.ep5.el5.noarch"
},
"product_reference": "jbossweb-0:2.1.12-1.4_patch_01.ep5.el5.noarch",
"relates_to_product_reference": "5Server-JBEAP-5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossweb-0:2.1.12-1.4_patch_01.ep5.el5.src as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 5 Server",
"product_id": "5Server-JBEAP-5:jbossweb-0:2.1.12-1.4_patch_01.ep5.el5.src"
},
"product_reference": "jbossweb-0:2.1.12-1.4_patch_01.ep5.el5.src",
"relates_to_product_reference": "5Server-JBEAP-5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossweb-el-1.0-api-0:2.1.12-1.4_patch_01.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 5 Server",
"product_id": "5Server-JBEAP-5:jbossweb-el-1.0-api-0:2.1.12-1.4_patch_01.ep5.el5.noarch"
},
"product_reference": "jbossweb-el-1.0-api-0:2.1.12-1.4_patch_01.ep5.el5.noarch",
"relates_to_product_reference": "5Server-JBEAP-5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossweb-jsp-2.1-api-0:2.1.12-1.4_patch_01.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 5 Server",
"product_id": "5Server-JBEAP-5:jbossweb-jsp-2.1-api-0:2.1.12-1.4_patch_01.ep5.el5.noarch"
},
"product_reference": "jbossweb-jsp-2.1-api-0:2.1.12-1.4_patch_01.ep5.el5.noarch",
"relates_to_product_reference": "5Server-JBEAP-5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossweb-lib-0:2.1.12-1.4_patch_01.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 5 Server",
"product_id": "5Server-JBEAP-5:jbossweb-lib-0:2.1.12-1.4_patch_01.ep5.el5.noarch"
},
"product_reference": "jbossweb-lib-0:2.1.12-1.4_patch_01.ep5.el5.noarch",
"relates_to_product_reference": "5Server-JBEAP-5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossweb-servlet-2.5-api-0:2.1.12-1.4_patch_01.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 5 Server",
"product_id": "5Server-JBEAP-5:jbossweb-servlet-2.5-api-0:2.1.12-1.4_patch_01.ep5.el5.noarch"
},
"product_reference": "jbossweb-servlet-2.5-api-0:2.1.12-1.4_patch_01.ep5.el5.noarch",
"relates_to_product_reference": "5Server-JBEAP-5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossws-0:3.1.2-7.SP11.4.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 5 Server",
"product_id": "5Server-JBEAP-5:jbossws-0:3.1.2-7.SP11.4.ep5.el5.noarch"
},
"product_reference": "jbossws-0:3.1.2-7.SP11.4.ep5.el5.noarch",
"relates_to_product_reference": "5Server-JBEAP-5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossws-0:3.1.2-7.SP11.4.ep5.el5.src as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 5 Server",
"product_id": "5Server-JBEAP-5:jbossws-0:3.1.2-7.SP11.4.ep5.el5.src"
},
"product_reference": "jbossws-0:3.1.2-7.SP11.4.ep5.el5.src",
"relates_to_product_reference": "5Server-JBEAP-5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossws-common-0:1.1.0-6.SP8_patch_01.1.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 5 Server",
"product_id": "5Server-JBEAP-5:jbossws-common-0:1.1.0-6.SP8_patch_01.1.ep5.el5.noarch"
},
"product_reference": "jbossws-common-0:1.1.0-6.SP8_patch_01.1.ep5.el5.noarch",
"relates_to_product_reference": "5Server-JBEAP-5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossws-common-0:1.1.0-6.SP8_patch_01.1.ep5.el5.src as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 5 Server",
"product_id": "5Server-JBEAP-5:jbossws-common-0:1.1.0-6.SP8_patch_01.1.ep5.el5.src"
},
"product_reference": "jbossws-common-0:1.1.0-6.SP8_patch_01.1.ep5.el5.src",
"relates_to_product_reference": "5Server-JBEAP-5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossws-framework-0:3.1.2-6.SP10.2.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 5 Server",
"product_id": "5Server-JBEAP-5:jbossws-framework-0:3.1.2-6.SP10.2.ep5.el5.noarch"
},
"product_reference": "jbossws-framework-0:3.1.2-6.SP10.2.ep5.el5.noarch",
"relates_to_product_reference": "5Server-JBEAP-5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossws-framework-0:3.1.2-6.SP10.2.ep5.el5.src as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 5 Server",
"product_id": "5Server-JBEAP-5:jbossws-framework-0:3.1.2-6.SP10.2.ep5.el5.src"
},
"product_reference": "jbossws-framework-0:3.1.2-6.SP10.2.ep5.el5.src",
"relates_to_product_reference": "5Server-JBEAP-5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossws-spi-0:1.1.2-5.SP7.1.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 5 Server",
"product_id": "5Server-JBEAP-5:jbossws-spi-0:1.1.2-5.SP7.1.ep5.el5.noarch"
},
"product_reference": "jbossws-spi-0:1.1.2-5.SP7.1.ep5.el5.noarch",
"relates_to_product_reference": "5Server-JBEAP-5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossws-spi-0:1.1.2-5.SP7.1.ep5.el5.src as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 5 Server",
"product_id": "5Server-JBEAP-5:jbossws-spi-0:1.1.2-5.SP7.1.ep5.el5.src"
},
"product_reference": "jbossws-spi-0:1.1.2-5.SP7.1.ep5.el5.src",
"relates_to_product_reference": "5Server-JBEAP-5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jgroups-1:2.6.20-1.1.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 5 Server",
"product_id": "5Server-JBEAP-5:jgroups-1:2.6.20-1.1.ep5.el5.noarch"
},
"product_reference": "jgroups-1:2.6.20-1.1.ep5.el5.noarch",
"relates_to_product_reference": "5Server-JBEAP-5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jgroups-1:2.6.20-1.1.ep5.el5.src as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 5 Server",
"product_id": "5Server-JBEAP-5:jgroups-1:2.6.20-1.1.ep5.el5.src"
},
"product_reference": "jgroups-1:2.6.20-1.1.ep5.el5.src",
"relates_to_product_reference": "5Server-JBEAP-5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jopr-embedded-0:1.3.4-18.SP5.8.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 5 Server",
"product_id": "5Server-JBEAP-5:jopr-embedded-0:1.3.4-18.SP5.8.ep5.el5.noarch"
},
"product_reference": "jopr-embedded-0:1.3.4-18.SP5.8.ep5.el5.noarch",
"relates_to_product_reference": "5Server-JBEAP-5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jopr-embedded-0:1.3.4-18.SP5.8.ep5.el5.src as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 5 Server",
"product_id": "5Server-JBEAP-5:jopr-embedded-0:1.3.4-18.SP5.8.ep5.el5.src"
},
"product_reference": "jopr-embedded-0:1.3.4-18.SP5.8.ep5.el5.src",
"relates_to_product_reference": "5Server-JBEAP-5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jopr-hibernate-plugin-0:3.0.0-13.EmbJopr4.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 5 Server",
"product_id": "5Server-JBEAP-5:jopr-hibernate-plugin-0:3.0.0-13.EmbJopr4.ep5.el5.noarch"
},
"product_reference": "jopr-hibernate-plugin-0:3.0.0-13.EmbJopr4.ep5.el5.noarch",
"relates_to_product_reference": "5Server-JBEAP-5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jopr-hibernate-plugin-0:3.0.0-13.EmbJopr4.ep5.el5.src as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 5 Server",
"product_id": "5Server-JBEAP-5:jopr-hibernate-plugin-0:3.0.0-13.EmbJopr4.ep5.el5.src"
},
"product_reference": "jopr-hibernate-plugin-0:3.0.0-13.EmbJopr4.ep5.el5.src",
"relates_to_product_reference": "5Server-JBEAP-5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jopr-jboss-as-5-plugin-0:3.0.0-12.EmbJopr4.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 5 Server",
"product_id": "5Server-JBEAP-5:jopr-jboss-as-5-plugin-0:3.0.0-12.EmbJopr4.ep5.el5.noarch"
},
"product_reference": "jopr-jboss-as-5-plugin-0:3.0.0-12.EmbJopr4.ep5.el5.noarch",
"relates_to_product_reference": "5Server-JBEAP-5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jopr-jboss-as-5-plugin-0:3.0.0-12.EmbJopr4.ep5.el5.src as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 5 Server",
"product_id": "5Server-JBEAP-5:jopr-jboss-as-5-plugin-0:3.0.0-12.EmbJopr4.ep5.el5.src"
},
"product_reference": "jopr-jboss-as-5-plugin-0:3.0.0-12.EmbJopr4.ep5.el5.src",
"relates_to_product_reference": "5Server-JBEAP-5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jopr-jboss-cache-v3-plugin-0:3.0.0-14.EmbJopr4.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 5 Server",
"product_id": "5Server-JBEAP-5:jopr-jboss-cache-v3-plugin-0:3.0.0-14.EmbJopr4.ep5.el5.noarch"
},
"product_reference": "jopr-jboss-cache-v3-plugin-0:3.0.0-14.EmbJopr4.ep5.el5.noarch",
"relates_to_product_reference": "5Server-JBEAP-5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jopr-jboss-cache-v3-plugin-0:3.0.0-14.EmbJopr4.ep5.el5.src as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 5 Server",
"product_id": "5Server-JBEAP-5:jopr-jboss-cache-v3-plugin-0:3.0.0-14.EmbJopr4.ep5.el5.src"
},
"product_reference": "jopr-jboss-cache-v3-plugin-0:3.0.0-14.EmbJopr4.ep5.el5.src",
"relates_to_product_reference": "5Server-JBEAP-5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_cluster-0:1.0.10-3.1.GA_CP02.ep5.el5.src as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 5 Server",
"product_id": "5Server-JBEAP-5:mod_cluster-0:1.0.10-3.1.GA_CP02.ep5.el5.src"
},
"product_reference": "mod_cluster-0:1.0.10-3.1.GA_CP02.ep5.el5.src",
"relates_to_product_reference": "5Server-JBEAP-5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_cluster-demo-0:1.0.10-3.1.GA_CP02.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 5 Server",
"product_id": "5Server-JBEAP-5:mod_cluster-demo-0:1.0.10-3.1.GA_CP02.ep5.el5.noarch"
},
"product_reference": "mod_cluster-demo-0:1.0.10-3.1.GA_CP02.ep5.el5.noarch",
"relates_to_product_reference": "5Server-JBEAP-5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_cluster-jbossas-0:1.0.10-3.1.GA_CP02.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 5 Server",
"product_id": "5Server-JBEAP-5:mod_cluster-jbossas-0:1.0.10-3.1.GA_CP02.ep5.el5.noarch"
},
"product_reference": "mod_cluster-jbossas-0:1.0.10-3.1.GA_CP02.ep5.el5.noarch",
"relates_to_product_reference": "5Server-JBEAP-5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_cluster-jbossweb2-0:1.0.10-3.1.GA_CP02.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 5 Server",
"product_id": "5Server-JBEAP-5:mod_cluster-jbossweb2-0:1.0.10-3.1.GA_CP02.ep5.el5.noarch"
},
"product_reference": "mod_cluster-jbossweb2-0:1.0.10-3.1.GA_CP02.ep5.el5.noarch",
"relates_to_product_reference": "5Server-JBEAP-5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_cluster-native-0:1.0.10-3.1.GA_CP02.ep5.el5.i386 as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 5 Server",
"product_id": "5Server-JBEAP-5:mod_cluster-native-0:1.0.10-3.1.GA_CP02.ep5.el5.i386"
},
"product_reference": "mod_cluster-native-0:1.0.10-3.1.GA_CP02.ep5.el5.i386",
"relates_to_product_reference": "5Server-JBEAP-5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_cluster-native-0:1.0.10-3.1.GA_CP02.ep5.el5.src as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 5 Server",
"product_id": "5Server-JBEAP-5:mod_cluster-native-0:1.0.10-3.1.GA_CP02.ep5.el5.src"
},
"product_reference": "mod_cluster-native-0:1.0.10-3.1.GA_CP02.ep5.el5.src",
"relates_to_product_reference": "5Server-JBEAP-5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_cluster-native-0:1.0.10-3.1.GA_CP02.ep5.el5.x86_64 as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 5 Server",
"product_id": "5Server-JBEAP-5:mod_cluster-native-0:1.0.10-3.1.GA_CP02.ep5.el5.x86_64"
},
"product_reference": "mod_cluster-native-0:1.0.10-3.1.GA_CP02.ep5.el5.x86_64",
"relates_to_product_reference": "5Server-JBEAP-5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_cluster-tomcat6-0:1.0.10-3.1.GA_CP02.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 5 Server",
"product_id": "5Server-JBEAP-5:mod_cluster-tomcat6-0:1.0.10-3.1.GA_CP02.ep5.el5.noarch"
},
"product_reference": "mod_cluster-tomcat6-0:1.0.10-3.1.GA_CP02.ep5.el5.noarch",
"relates_to_product_reference": "5Server-JBEAP-5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "org-mc4j-ems-0:1.2.15.1-4.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 5 Server",
"product_id": "5Server-JBEAP-5:org-mc4j-ems-0:1.2.15.1-4.ep5.el5.noarch"
},
"product_reference": "org-mc4j-ems-0:1.2.15.1-4.ep5.el5.noarch",
"relates_to_product_reference": "5Server-JBEAP-5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "org-mc4j-ems-0:1.2.15.1-4.ep5.el5.src as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 5 Server",
"product_id": "5Server-JBEAP-5:org-mc4j-ems-0:1.2.15.1-4.ep5.el5.src"
},
"product_reference": "org-mc4j-ems-0:1.2.15.1-4.ep5.el5.src",
"relates_to_product_reference": "5Server-JBEAP-5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "picketlink-federation-0:2.0.2-1.1.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 5 Server",
"product_id": "5Server-JBEAP-5:picketlink-federation-0:2.0.2-1.1.ep5.el5.noarch"
},
"product_reference": "picketlink-federation-0:2.0.2-1.1.ep5.el5.noarch",
"relates_to_product_reference": "5Server-JBEAP-5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "picketlink-federation-0:2.0.2-1.1.ep5.el5.src as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 5 Server",
"product_id": "5Server-JBEAP-5:picketlink-federation-0:2.0.2-1.1.ep5.el5.src"
},
"product_reference": "picketlink-federation-0:2.0.2-1.1.ep5.el5.src",
"relates_to_product_reference": "5Server-JBEAP-5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "picketlink-federation-webapp-idp-0:2.0.2-1.1.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 5 Server",
"product_id": "5Server-JBEAP-5:picketlink-federation-webapp-idp-0:2.0.2-1.1.ep5.el5.noarch"
},
"product_reference": "picketlink-federation-webapp-idp-0:2.0.2-1.1.ep5.el5.noarch",
"relates_to_product_reference": "5Server-JBEAP-5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "picketlink-federation-webapp-pdp-0:2.0.2-1.1.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 5 Server",
"product_id": "5Server-JBEAP-5:picketlink-federation-webapp-pdp-0:2.0.2-1.1.ep5.el5.noarch"
},
"product_reference": "picketlink-federation-webapp-pdp-0:2.0.2-1.1.ep5.el5.noarch",
"relates_to_product_reference": "5Server-JBEAP-5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "picketlink-federation-webapp-sts-0:2.0.2-1.1.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 5 Server",
"product_id": "5Server-JBEAP-5:picketlink-federation-webapp-sts-0:2.0.2-1.1.ep5.el5.noarch"
},
"product_reference": "picketlink-federation-webapp-sts-0:2.0.2-1.1.ep5.el5.noarch",
"relates_to_product_reference": "5Server-JBEAP-5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "resteasy-0:1.2.1-9.CP02.4.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 5 Server",
"product_id": "5Server-JBEAP-5:resteasy-0:1.2.1-9.CP02.4.ep5.el5.noarch"
},
"product_reference": "resteasy-0:1.2.1-9.CP02.4.ep5.el5.noarch",
"relates_to_product_reference": "5Server-JBEAP-5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "resteasy-0:1.2.1-9.CP02.4.ep5.el5.src as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 5 Server",
"product_id": "5Server-JBEAP-5:resteasy-0:1.2.1-9.CP02.4.ep5.el5.src"
},
"product_reference": "resteasy-0:1.2.1-9.CP02.4.ep5.el5.src",
"relates_to_product_reference": "5Server-JBEAP-5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "resteasy-examples-0:1.2.1-9.CP02.4.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 5 Server",
"product_id": "5Server-JBEAP-5:resteasy-examples-0:1.2.1-9.CP02.4.ep5.el5.noarch"
},
"product_reference": "resteasy-examples-0:1.2.1-9.CP02.4.ep5.el5.noarch",
"relates_to_product_reference": "5Server-JBEAP-5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "resteasy-javadoc-0:1.2.1-9.CP02.4.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 5 Server",
"product_id": "5Server-JBEAP-5:resteasy-javadoc-0:1.2.1-9.CP02.4.ep5.el5.noarch"
},
"product_reference": "resteasy-javadoc-0:1.2.1-9.CP02.4.ep5.el5.noarch",
"relates_to_product_reference": "5Server-JBEAP-5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "resteasy-manual-0:1.2.1-9.CP02.4.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 5 Server",
"product_id": "5Server-JBEAP-5:resteasy-manual-0:1.2.1-9.CP02.4.ep5.el5.noarch"
},
"product_reference": "resteasy-manual-0:1.2.1-9.CP02.4.ep5.el5.noarch",
"relates_to_product_reference": "5Server-JBEAP-5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-eap-docs-0:5.1.2-6.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 5 Server",
"product_id": "5Server-JBEAP-5:rh-eap-docs-0:5.1.2-6.ep5.el5.noarch"
},
"product_reference": "rh-eap-docs-0:5.1.2-6.ep5.el5.noarch",
"relates_to_product_reference": "5Server-JBEAP-5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-eap-docs-0:5.1.2-6.ep5.el5.src as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 5 Server",
"product_id": "5Server-JBEAP-5:rh-eap-docs-0:5.1.2-6.ep5.el5.src"
},
"product_reference": "rh-eap-docs-0:5.1.2-6.ep5.el5.src",
"relates_to_product_reference": "5Server-JBEAP-5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-eap-docs-examples-0:5.1.2-6.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 5 Server",
"product_id": "5Server-JBEAP-5:rh-eap-docs-examples-0:5.1.2-6.ep5.el5.noarch"
},
"product_reference": "rh-eap-docs-examples-0:5.1.2-6.ep5.el5.noarch",
"relates_to_product_reference": "5Server-JBEAP-5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhq-0:3.0.0-20.EmbJopr4.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 5 Server",
"product_id": "5Server-JBEAP-5:rhq-0:3.0.0-20.EmbJopr4.ep5.el5.noarch"
},
"product_reference": "rhq-0:3.0.0-20.EmbJopr4.ep5.el5.noarch",
"relates_to_product_reference": "5Server-JBEAP-5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhq-0:3.0.0-20.EmbJopr4.ep5.el5.src as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 5 Server",
"product_id": "5Server-JBEAP-5:rhq-0:3.0.0-20.EmbJopr4.ep5.el5.src"
},
"product_reference": "rhq-0:3.0.0-20.EmbJopr4.ep5.el5.src",
"relates_to_product_reference": "5Server-JBEAP-5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhq-ant-bundle-common-0:3.0.0-20.EmbJopr4.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 5 Server",
"product_id": "5Server-JBEAP-5:rhq-ant-bundle-common-0:3.0.0-20.EmbJopr4.ep5.el5.noarch"
},
"product_reference": "rhq-ant-bundle-common-0:3.0.0-20.EmbJopr4.ep5.el5.noarch",
"relates_to_product_reference": "5Server-JBEAP-5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhq-common-parent-0:3.0.0-20.EmbJopr4.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 5 Server",
"product_id": "5Server-JBEAP-5:rhq-common-parent-0:3.0.0-20.EmbJopr4.ep5.el5.noarch"
},
"product_reference": "rhq-common-parent-0:3.0.0-20.EmbJopr4.ep5.el5.noarch",
"relates_to_product_reference": "5Server-JBEAP-5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhq-core-client-api-0:3.0.0-20.EmbJopr4.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 5 Server",
"product_id": "5Server-JBEAP-5:rhq-core-client-api-0:3.0.0-20.EmbJopr4.ep5.el5.noarch"
},
"product_reference": "rhq-core-client-api-0:3.0.0-20.EmbJopr4.ep5.el5.noarch",
"relates_to_product_reference": "5Server-JBEAP-5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhq-core-comm-api-0:3.0.0-20.EmbJopr4.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 5 Server",
"product_id": "5Server-JBEAP-5:rhq-core-comm-api-0:3.0.0-20.EmbJopr4.ep5.el5.noarch"
},
"product_reference": "rhq-core-comm-api-0:3.0.0-20.EmbJopr4.ep5.el5.noarch",
"relates_to_product_reference": "5Server-JBEAP-5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhq-core-dbutils-0:3.0.0-20.EmbJopr4.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 5 Server",
"product_id": "5Server-JBEAP-5:rhq-core-dbutils-0:3.0.0-20.EmbJopr4.ep5.el5.noarch"
},
"product_reference": "rhq-core-dbutils-0:3.0.0-20.EmbJopr4.ep5.el5.noarch",
"relates_to_product_reference": "5Server-JBEAP-5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhq-core-domain-0:3.0.0-20.EmbJopr4.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 5 Server",
"product_id": "5Server-JBEAP-5:rhq-core-domain-0:3.0.0-20.EmbJopr4.ep5.el5.noarch"
},
"product_reference": "rhq-core-domain-0:3.0.0-20.EmbJopr4.ep5.el5.noarch",
"relates_to_product_reference": "5Server-JBEAP-5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhq-core-gui-0:3.0.0-20.EmbJopr4.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 5 Server",
"product_id": "5Server-JBEAP-5:rhq-core-gui-0:3.0.0-20.EmbJopr4.ep5.el5.noarch"
},
"product_reference": "rhq-core-gui-0:3.0.0-20.EmbJopr4.ep5.el5.noarch",
"relates_to_product_reference": "5Server-JBEAP-5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhq-core-native-system-0:3.0.0-20.EmbJopr4.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 5 Server",
"product_id": "5Server-JBEAP-5:rhq-core-native-system-0:3.0.0-20.EmbJopr4.ep5.el5.noarch"
},
"product_reference": "rhq-core-native-system-0:3.0.0-20.EmbJopr4.ep5.el5.noarch",
"relates_to_product_reference": "5Server-JBEAP-5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhq-core-parent-0:3.0.0-20.EmbJopr4.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 5 Server",
"product_id": "5Server-JBEAP-5:rhq-core-parent-0:3.0.0-20.EmbJopr4.ep5.el5.noarch"
},
"product_reference": "rhq-core-parent-0:3.0.0-20.EmbJopr4.ep5.el5.noarch",
"relates_to_product_reference": "5Server-JBEAP-5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhq-core-plugin-api-0:3.0.0-20.EmbJopr4.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 5 Server",
"product_id": "5Server-JBEAP-5:rhq-core-plugin-api-0:3.0.0-20.EmbJopr4.ep5.el5.noarch"
},
"product_reference": "rhq-core-plugin-api-0:3.0.0-20.EmbJopr4.ep5.el5.noarch",
"relates_to_product_reference": "5Server-JBEAP-5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhq-core-plugin-container-0:3.0.0-20.EmbJopr4.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 5 Server",
"product_id": "5Server-JBEAP-5:rhq-core-plugin-container-0:3.0.0-20.EmbJopr4.ep5.el5.noarch"
},
"product_reference": "rhq-core-plugin-container-0:3.0.0-20.EmbJopr4.ep5.el5.noarch",
"relates_to_product_reference": "5Server-JBEAP-5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhq-core-plugindoc-0:3.0.0-20.EmbJopr4.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 5 Server",
"product_id": "5Server-JBEAP-5:rhq-core-plugindoc-0:3.0.0-20.EmbJopr4.ep5.el5.noarch"
},
"product_reference": "rhq-core-plugindoc-0:3.0.0-20.EmbJopr4.ep5.el5.noarch",
"relates_to_product_reference": "5Server-JBEAP-5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhq-core-util-0:3.0.0-20.EmbJopr4.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 5 Server",
"product_id": "5Server-JBEAP-5:rhq-core-util-0:3.0.0-20.EmbJopr4.ep5.el5.noarch"
},
"product_reference": "rhq-core-util-0:3.0.0-20.EmbJopr4.ep5.el5.noarch",
"relates_to_product_reference": "5Server-JBEAP-5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhq-filetemplate-bundle-common-0:3.0.0-20.EmbJopr4.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 5 Server",
"product_id": "5Server-JBEAP-5:rhq-filetemplate-bundle-common-0:3.0.0-20.EmbJopr4.ep5.el5.noarch"
},
"product_reference": "rhq-filetemplate-bundle-common-0:3.0.0-20.EmbJopr4.ep5.el5.noarch",
"relates_to_product_reference": "5Server-JBEAP-5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhq-helpers-0:3.0.0-20.EmbJopr4.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 5 Server",
"product_id": "5Server-JBEAP-5:rhq-helpers-0:3.0.0-20.EmbJopr4.ep5.el5.noarch"
},
"product_reference": "rhq-helpers-0:3.0.0-20.EmbJopr4.ep5.el5.noarch",
"relates_to_product_reference": "5Server-JBEAP-5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhq-jboss-as-common-0:3.0.0-20.EmbJopr4.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 5 Server",
"product_id": "5Server-JBEAP-5:rhq-jboss-as-common-0:3.0.0-20.EmbJopr4.ep5.el5.noarch"
},
"product_reference": "rhq-jboss-as-common-0:3.0.0-20.EmbJopr4.ep5.el5.noarch",
"relates_to_product_reference": "5Server-JBEAP-5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhq-jmx-plugin-0:3.0.0-20.EmbJopr4.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 5 Server",
"product_id": "5Server-JBEAP-5:rhq-jmx-plugin-0:3.0.0-20.EmbJopr4.ep5.el5.noarch"
},
"product_reference": "rhq-jmx-plugin-0:3.0.0-20.EmbJopr4.ep5.el5.noarch",
"relates_to_product_reference": "5Server-JBEAP-5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhq-jmx-plugin-0:3.0.0-20.EmbJopr4.ep5.el5.src as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 5 Server",
"product_id": "5Server-JBEAP-5:rhq-jmx-plugin-0:3.0.0-20.EmbJopr4.ep5.el5.src"
},
"product_reference": "rhq-jmx-plugin-0:3.0.0-20.EmbJopr4.ep5.el5.src",
"relates_to_product_reference": "5Server-JBEAP-5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhq-modules-parent-0:3.0.0-20.EmbJopr4.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 5 Server",
"product_id": "5Server-JBEAP-5:rhq-modules-parent-0:3.0.0-20.EmbJopr4.ep5.el5.noarch"
},
"product_reference": "rhq-modules-parent-0:3.0.0-20.EmbJopr4.ep5.el5.noarch",
"relates_to_product_reference": "5Server-JBEAP-5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhq-parent-0:3.0.0-20.EmbJopr4.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 5 Server",
"product_id": "5Server-JBEAP-5:rhq-parent-0:3.0.0-20.EmbJopr4.ep5.el5.noarch"
},
"product_reference": "rhq-parent-0:3.0.0-20.EmbJopr4.ep5.el5.noarch",
"relates_to_product_reference": "5Server-JBEAP-5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhq-platform-plugin-0:3.0.0-13.EmbJopr4.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 5 Server",
"product_id": "5Server-JBEAP-5:rhq-platform-plugin-0:3.0.0-13.EmbJopr4.ep5.el5.noarch"
},
"product_reference": "rhq-platform-plugin-0:3.0.0-13.EmbJopr4.ep5.el5.noarch",
"relates_to_product_reference": "5Server-JBEAP-5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhq-platform-plugin-0:3.0.0-13.EmbJopr4.ep5.el5.src as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 5 Server",
"product_id": "5Server-JBEAP-5:rhq-platform-plugin-0:3.0.0-13.EmbJopr4.ep5.el5.src"
},
"product_reference": "rhq-platform-plugin-0:3.0.0-13.EmbJopr4.ep5.el5.src",
"relates_to_product_reference": "5Server-JBEAP-5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhq-plugin-validator-0:3.0.0-20.EmbJopr4.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 5 Server",
"product_id": "5Server-JBEAP-5:rhq-plugin-validator-0:3.0.0-20.EmbJopr4.ep5.el5.noarch"
},
"product_reference": "rhq-plugin-validator-0:3.0.0-20.EmbJopr4.ep5.el5.noarch",
"relates_to_product_reference": "5Server-JBEAP-5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhq-pluginAnnotations-0:3.0.0-20.EmbJopr4.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 5 Server",
"product_id": "5Server-JBEAP-5:rhq-pluginAnnotations-0:3.0.0-20.EmbJopr4.ep5.el5.noarch"
},
"product_reference": "rhq-pluginAnnotations-0:3.0.0-20.EmbJopr4.ep5.el5.noarch",
"relates_to_product_reference": "5Server-JBEAP-5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhq-pluginGen-0:3.0.0-20.EmbJopr4.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 5 Server",
"product_id": "5Server-JBEAP-5:rhq-pluginGen-0:3.0.0-20.EmbJopr4.ep5.el5.noarch"
},
"product_reference": "rhq-pluginGen-0:3.0.0-20.EmbJopr4.ep5.el5.noarch",
"relates_to_product_reference": "5Server-JBEAP-5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhq-plugins-parent-0:3.0.0-20.EmbJopr4.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 5 Server",
"product_id": "5Server-JBEAP-5:rhq-plugins-parent-0:3.0.0-20.EmbJopr4.ep5.el5.noarch"
},
"product_reference": "rhq-plugins-parent-0:3.0.0-20.EmbJopr4.ep5.el5.noarch",
"relates_to_product_reference": "5Server-JBEAP-5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhq-rtfilter-0:3.0.0-20.EmbJopr4.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 5 Server",
"product_id": "5Server-JBEAP-5:rhq-rtfilter-0:3.0.0-20.EmbJopr4.ep5.el5.noarch"
},
"product_reference": "rhq-rtfilter-0:3.0.0-20.EmbJopr4.ep5.el5.noarch",
"relates_to_product_reference": "5Server-JBEAP-5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "slf4j-0:1.5.8-10_patch_01.2.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 5 Server",
"product_id": "5Server-JBEAP-5:slf4j-0:1.5.8-10_patch_01.2.ep5.el5.noarch"
},
"product_reference": "slf4j-0:1.5.8-10_patch_01.2.ep5.el5.noarch",
"relates_to_product_reference": "5Server-JBEAP-5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "slf4j-0:1.5.8-10_patch_01.2.ep5.el5.src as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 5 Server",
"product_id": "5Server-JBEAP-5:slf4j-0:1.5.8-10_patch_01.2.ep5.el5.src"
},
"product_reference": "slf4j-0:1.5.8-10_patch_01.2.ep5.el5.src",
"relates_to_product_reference": "5Server-JBEAP-5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xalan-j2-0:2.7.1-6_patch_05.1.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 5 Server",
"product_id": "5Server-JBEAP-5:xalan-j2-0:2.7.1-6_patch_05.1.ep5.el5.noarch"
},
"product_reference": "xalan-j2-0:2.7.1-6_patch_05.1.ep5.el5.noarch",
"relates_to_product_reference": "5Server-JBEAP-5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xalan-j2-0:2.7.1-6_patch_05.1.ep5.el5.src as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 5 Server",
"product_id": "5Server-JBEAP-5:xalan-j2-0:2.7.1-6_patch_05.1.ep5.el5.src"
},
"product_reference": "xalan-j2-0:2.7.1-6_patch_05.1.ep5.el5.src",
"relates_to_product_reference": "5Server-JBEAP-5"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2011-4085",
"discovery_date": "2011-10-26T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "750422"
}
],
"notes": [
{
"category": "description",
"text": "The servlets invoked by httpha-invoker in JBoss Enterprise Application Platform before 5.1.2, SOA Platform before 5.2.0, BRMS Platform before 5.3.0, and Portal Platform before 4.3 CP07 perform access control only for the GET and POST methods, which allow remote attackers to bypass authentication by sending a request with a different method. NOTE: this vulnerability exists because of a CVE-2010-0738 regression.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Invoker servlets authentication bypass (HTTP verb tampering)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-JBEAP-5:apache-cxf-0:2.2.12-4.patch_02.1.1.ep5.el5.noarch",
"5Server-JBEAP-5:apache-cxf-0:2.2.12-4.patch_02.1.1.ep5.el5.src",
"5Server-JBEAP-5:cglib-0:2.2-5.3.ep5.el5.noarch",
"5Server-JBEAP-5:cglib-0:2.2-5.3.ep5.el5.src",
"5Server-JBEAP-5:facelets-0:1.1.15-3.B1_patch_01.2.ep5.el5.noarch",
"5Server-JBEAP-5:facelets-0:1.1.15-3.B1_patch_01.2.ep5.el5.src",
"5Server-JBEAP-5:glassfish-jaxb-0:2.1.12-10_patch_02.ep5.el5.noarch",
"5Server-JBEAP-5:glassfish-jaxb-0:2.1.12-10_patch_02.ep5.el5.src",
"5Server-JBEAP-5:glassfish-jsf-0:1.2_13-5_patch_01.3.ep5.el5.noarch",
"5Server-JBEAP-5:glassfish-jsf-0:1.2_13-5_patch_01.3.ep5.el5.src",
"5Server-JBEAP-5:jacorb-jboss-0:2.3.1-10.patch_03.4.ep5.el5.noarch",
"5Server-JBEAP-5:jacorb-jboss-0:2.3.1-10.patch_03.4.ep5.el5.src",
"5Server-JBEAP-5:jakarta-commons-logging-jboss-0:1.1-10.3_patch_02.1.ep5.el5.noarch",
"5Server-JBEAP-5:jakarta-commons-logging-jboss-0:1.1-10.3_patch_02.1.ep5.el5.src",
"5Server-JBEAP-5:jboss-aop2-0:2.1.6-2.CP03.1.1.ep5.el5.noarch",
"5Server-JBEAP-5:jboss-aop2-0:2.1.6-2.CP03.1.1.ep5.el5.src",
"5Server-JBEAP-5:jboss-cache-core-0:3.2.8-1.ep5.el5.noarch",
"5Server-JBEAP-5:jboss-cache-core-0:3.2.8-1.ep5.el5.src",
"5Server-JBEAP-5:jboss-cl-0:2.0.10-1.2.ep5.el5.noarch",
"5Server-JBEAP-5:jboss-cl-0:2.0.10-1.2.ep5.el5.src",
"5Server-JBEAP-5:jboss-cluster-ha-client-0:1.1.4-1.1.ep5.el5.noarch",
"5Server-JBEAP-5:jboss-cluster-ha-client-0:1.1.4-1.1.ep5.el5.src",
"5Server-JBEAP-5:jboss-common-core-0:2.2.18-1.1.ep5.el5.noarch",
"5Server-JBEAP-5:jboss-common-core-0:2.2.18-1.1.ep5.el5.src",
"5Server-JBEAP-5:jboss-eap5-native-0:5.1.2-1.4.ep5.el5.i386",
"5Server-JBEAP-5:jboss-eap5-native-0:5.1.2-1.4.ep5.el5.src",
"5Server-JBEAP-5:jboss-eap5-native-0:5.1.2-1.4.ep5.el5.x86_64",
"5Server-JBEAP-5:jboss-ejb3-core-0:1.3.8-0.1.ep5.el5.noarch",
"5Server-JBEAP-5:jboss-ejb3-core-0:1.3.8-0.1.ep5.el5.src",
"5Server-JBEAP-5:jboss-ejb3-proxy-clustered-0:1.0.3-2.SP1.1.ep5.el5.noarch",
"5Server-JBEAP-5:jboss-ejb3-proxy-clustered-0:1.0.3-2.SP1.1.ep5.el5.src",
"5Server-JBEAP-5:jboss-ejb3-proxy-impl-0:1.0.6-2.SP2.1.ep5.el5.noarch",
"5Server-JBEAP-5:jboss-ejb3-proxy-impl-0:1.0.6-2.SP2.1.ep5.el5.src",
"5Server-JBEAP-5:jboss-el-0:1.0_02-0.CR6.2.ep5.el5.noarch",
"5Server-JBEAP-5:jboss-el-0:1.0_02-0.CR6.2.ep5.el5.src",
"5Server-JBEAP-5:jboss-messaging-0:1.4.8-9.SP5.1.ep5.el5.noarch",
"5Server-JBEAP-5:jboss-messaging-0:1.4.8-9.SP5.1.ep5.el5.src",
"5Server-JBEAP-5:jboss-naming-0:5.0.3-3.CP01.3.1.ep5.el5.noarch",
"5Server-JBEAP-5:jboss-naming-0:5.0.3-3.CP01.3.1.ep5.el5.src",
"5Server-JBEAP-5:jboss-remoting-0:2.5.4-9.SP3.1.ep5.el5.noarch",
"5Server-JBEAP-5:jboss-remoting-0:2.5.4-9.SP3.1.ep5.el5.src",
"5Server-JBEAP-5:jboss-seam2-0:2.2.5.EAP5-5.ep5.el5.noarch",
"5Server-JBEAP-5:jboss-seam2-0:2.2.5.EAP5-5.ep5.el5.src",
"5Server-JBEAP-5:jboss-seam2-docs-0:2.2.5.EAP5-5.ep5.el5.noarch",
"5Server-JBEAP-5:jboss-seam2-examples-0:2.2.5.EAP5-5.ep5.el5.noarch",
"5Server-JBEAP-5:jboss-seam2-runtime-0:2.2.5.EAP5-5.ep5.el5.noarch",
"5Server-JBEAP-5:jboss-security-spi-1:2.0.4-6.SP8.1.ep5.el5.noarch",
"5Server-JBEAP-5:jboss-security-spi-1:2.0.4-6.SP8.1.ep5.el5.src",
"5Server-JBEAP-5:jbossas-0:5.1.2-8.ep5.el5.noarch",
"5Server-JBEAP-5:jbossas-0:5.1.2-8.ep5.el5.src",
"5Server-JBEAP-5:jbossas-client-0:5.1.2-8.ep5.el5.noarch",
"5Server-JBEAP-5:jbossas-messaging-0:5.1.2-8.ep5.el5.noarch",
"5Server-JBEAP-5:jbossas-tp-licenses-0:5.1.2-7.ep5.el5.noarch",
"5Server-JBEAP-5:jbossas-tp-licenses-0:5.1.2-7.ep5.el5.src",
"5Server-JBEAP-5:jbossas-ws-cxf-0:5.1.2-8.ep5.el5.noarch",
"5Server-JBEAP-5:jbossas-ws-cxf-0:5.1.2-8.ep5.el5.src",
"5Server-JBEAP-5:jbossas-ws-native-0:5.1.2-8.ep5.el5.noarch",
"5Server-JBEAP-5:jbosssx2-0:2.0.4-6.SP8.2.ep5.el5.noarch",
"5Server-JBEAP-5:jbosssx2-0:2.0.4-6.SP8.2.ep5.el5.src",
"5Server-JBEAP-5:jbossts-1:4.6.1-11.CP12.4.ep5.el5.noarch",
"5Server-JBEAP-5:jbossts-1:4.6.1-11.CP12.4.ep5.el5.src",
"5Server-JBEAP-5:jbossts-javadoc-1:4.6.1-11.CP12.4.ep5.el5.noarch",
"5Server-JBEAP-5:jbossweb-0:2.1.12-1.4_patch_01.ep5.el5.noarch",
"5Server-JBEAP-5:jbossweb-0:2.1.12-1.4_patch_01.ep5.el5.src",
"5Server-JBEAP-5:jbossweb-el-1.0-api-0:2.1.12-1.4_patch_01.ep5.el5.noarch",
"5Server-JBEAP-5:jbossweb-jsp-2.1-api-0:2.1.12-1.4_patch_01.ep5.el5.noarch",
"5Server-JBEAP-5:jbossweb-lib-0:2.1.12-1.4_patch_01.ep5.el5.noarch",
"5Server-JBEAP-5:jbossweb-servlet-2.5-api-0:2.1.12-1.4_patch_01.ep5.el5.noarch",
"5Server-JBEAP-5:jbossws-0:3.1.2-7.SP11.4.ep5.el5.noarch",
"5Server-JBEAP-5:jbossws-0:3.1.2-7.SP11.4.ep5.el5.src",
"5Server-JBEAP-5:jbossws-common-0:1.1.0-6.SP8_patch_01.1.ep5.el5.noarch",
"5Server-JBEAP-5:jbossws-common-0:1.1.0-6.SP8_patch_01.1.ep5.el5.src",
"5Server-JBEAP-5:jbossws-framework-0:3.1.2-6.SP10.2.ep5.el5.noarch",
"5Server-JBEAP-5:jbossws-framework-0:3.1.2-6.SP10.2.ep5.el5.src",
"5Server-JBEAP-5:jbossws-spi-0:1.1.2-5.SP7.1.ep5.el5.noarch",
"5Server-JBEAP-5:jbossws-spi-0:1.1.2-5.SP7.1.ep5.el5.src",
"5Server-JBEAP-5:jgroups-1:2.6.20-1.1.ep5.el5.noarch",
"5Server-JBEAP-5:jgroups-1:2.6.20-1.1.ep5.el5.src",
"5Server-JBEAP-5:jopr-embedded-0:1.3.4-18.SP5.8.ep5.el5.noarch",
"5Server-JBEAP-5:jopr-embedded-0:1.3.4-18.SP5.8.ep5.el5.src",
"5Server-JBEAP-5:jopr-hibernate-plugin-0:3.0.0-13.EmbJopr4.ep5.el5.noarch",
"5Server-JBEAP-5:jopr-hibernate-plugin-0:3.0.0-13.EmbJopr4.ep5.el5.src",
"5Server-JBEAP-5:jopr-jboss-as-5-plugin-0:3.0.0-12.EmbJopr4.ep5.el5.noarch",
"5Server-JBEAP-5:jopr-jboss-as-5-plugin-0:3.0.0-12.EmbJopr4.ep5.el5.src",
"5Server-JBEAP-5:jopr-jboss-cache-v3-plugin-0:3.0.0-14.EmbJopr4.ep5.el5.noarch",
"5Server-JBEAP-5:jopr-jboss-cache-v3-plugin-0:3.0.0-14.EmbJopr4.ep5.el5.src",
"5Server-JBEAP-5:mod_cluster-0:1.0.10-3.1.GA_CP02.ep5.el5.src",
"5Server-JBEAP-5:mod_cluster-demo-0:1.0.10-3.1.GA_CP02.ep5.el5.noarch",
"5Server-JBEAP-5:mod_cluster-jbossas-0:1.0.10-3.1.GA_CP02.ep5.el5.noarch",
"5Server-JBEAP-5:mod_cluster-jbossweb2-0:1.0.10-3.1.GA_CP02.ep5.el5.noarch",
"5Server-JBEAP-5:mod_cluster-native-0:1.0.10-3.1.GA_CP02.ep5.el5.i386",
"5Server-JBEAP-5:mod_cluster-native-0:1.0.10-3.1.GA_CP02.ep5.el5.src",
"5Server-JBEAP-5:mod_cluster-native-0:1.0.10-3.1.GA_CP02.ep5.el5.x86_64",
"5Server-JBEAP-5:mod_cluster-tomcat6-0:1.0.10-3.1.GA_CP02.ep5.el5.noarch",
"5Server-JBEAP-5:org-mc4j-ems-0:1.2.15.1-4.ep5.el5.noarch",
"5Server-JBEAP-5:org-mc4j-ems-0:1.2.15.1-4.ep5.el5.src",
"5Server-JBEAP-5:picketlink-federation-0:2.0.2-1.1.ep5.el5.noarch",
"5Server-JBEAP-5:picketlink-federation-0:2.0.2-1.1.ep5.el5.src",
"5Server-JBEAP-5:picketlink-federation-webapp-idp-0:2.0.2-1.1.ep5.el5.noarch",
"5Server-JBEAP-5:picketlink-federation-webapp-pdp-0:2.0.2-1.1.ep5.el5.noarch",
"5Server-JBEAP-5:picketlink-federation-webapp-sts-0:2.0.2-1.1.ep5.el5.noarch",
"5Server-JBEAP-5:resteasy-0:1.2.1-9.CP02.4.ep5.el5.noarch",
"5Server-JBEAP-5:resteasy-0:1.2.1-9.CP02.4.ep5.el5.src",
"5Server-JBEAP-5:resteasy-examples-0:1.2.1-9.CP02.4.ep5.el5.noarch",
"5Server-JBEAP-5:resteasy-javadoc-0:1.2.1-9.CP02.4.ep5.el5.noarch",
"5Server-JBEAP-5:resteasy-manual-0:1.2.1-9.CP02.4.ep5.el5.noarch",
"5Server-JBEAP-5:rh-eap-docs-0:5.1.2-6.ep5.el5.noarch",
"5Server-JBEAP-5:rh-eap-docs-0:5.1.2-6.ep5.el5.src",
"5Server-JBEAP-5:rh-eap-docs-examples-0:5.1.2-6.ep5.el5.noarch",
"5Server-JBEAP-5:rhq-0:3.0.0-20.EmbJopr4.ep5.el5.noarch",
"5Server-JBEAP-5:rhq-0:3.0.0-20.EmbJopr4.ep5.el5.src",
"5Server-JBEAP-5:rhq-ant-bundle-common-0:3.0.0-20.EmbJopr4.ep5.el5.noarch",
"5Server-JBEAP-5:rhq-common-parent-0:3.0.0-20.EmbJopr4.ep5.el5.noarch",
"5Server-JBEAP-5:rhq-core-client-api-0:3.0.0-20.EmbJopr4.ep5.el5.noarch",
"5Server-JBEAP-5:rhq-core-comm-api-0:3.0.0-20.EmbJopr4.ep5.el5.noarch",
"5Server-JBEAP-5:rhq-core-dbutils-0:3.0.0-20.EmbJopr4.ep5.el5.noarch",
"5Server-JBEAP-5:rhq-core-domain-0:3.0.0-20.EmbJopr4.ep5.el5.noarch",
"5Server-JBEAP-5:rhq-core-gui-0:3.0.0-20.EmbJopr4.ep5.el5.noarch",
"5Server-JBEAP-5:rhq-core-native-system-0:3.0.0-20.EmbJopr4.ep5.el5.noarch",
"5Server-JBEAP-5:rhq-core-parent-0:3.0.0-20.EmbJopr4.ep5.el5.noarch",
"5Server-JBEAP-5:rhq-core-plugin-api-0:3.0.0-20.EmbJopr4.ep5.el5.noarch",
"5Server-JBEAP-5:rhq-core-plugin-container-0:3.0.0-20.EmbJopr4.ep5.el5.noarch",
"5Server-JBEAP-5:rhq-core-plugindoc-0:3.0.0-20.EmbJopr4.ep5.el5.noarch",
"5Server-JBEAP-5:rhq-core-util-0:3.0.0-20.EmbJopr4.ep5.el5.noarch",
"5Server-JBEAP-5:rhq-filetemplate-bundle-common-0:3.0.0-20.EmbJopr4.ep5.el5.noarch",
"5Server-JBEAP-5:rhq-helpers-0:3.0.0-20.EmbJopr4.ep5.el5.noarch",
"5Server-JBEAP-5:rhq-jboss-as-common-0:3.0.0-20.EmbJopr4.ep5.el5.noarch",
"5Server-JBEAP-5:rhq-jmx-plugin-0:3.0.0-20.EmbJopr4.ep5.el5.noarch",
"5Server-JBEAP-5:rhq-jmx-plugin-0:3.0.0-20.EmbJopr4.ep5.el5.src",
"5Server-JBEAP-5:rhq-modules-parent-0:3.0.0-20.EmbJopr4.ep5.el5.noarch",
"5Server-JBEAP-5:rhq-parent-0:3.0.0-20.EmbJopr4.ep5.el5.noarch",
"5Server-JBEAP-5:rhq-platform-plugin-0:3.0.0-13.EmbJopr4.ep5.el5.noarch",
"5Server-JBEAP-5:rhq-platform-plugin-0:3.0.0-13.EmbJopr4.ep5.el5.src",
"5Server-JBEAP-5:rhq-plugin-validator-0:3.0.0-20.EmbJopr4.ep5.el5.noarch",
"5Server-JBEAP-5:rhq-pluginAnnotations-0:3.0.0-20.EmbJopr4.ep5.el5.noarch",
"5Server-JBEAP-5:rhq-pluginGen-0:3.0.0-20.EmbJopr4.ep5.el5.noarch",
"5Server-JBEAP-5:rhq-plugins-parent-0:3.0.0-20.EmbJopr4.ep5.el5.noarch",
"5Server-JBEAP-5:rhq-rtfilter-0:3.0.0-20.EmbJopr4.ep5.el5.noarch",
"5Server-JBEAP-5:slf4j-0:1.5.8-10_patch_01.2.ep5.el5.noarch",
"5Server-JBEAP-5:slf4j-0:1.5.8-10_patch_01.2.ep5.el5.src",
"5Server-JBEAP-5:xalan-j2-0:2.7.1-6_patch_05.1.ep5.el5.noarch",
"5Server-JBEAP-5:xalan-j2-0:2.7.1-6_patch_05.1.ep5.el5.src"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-4085"
},
{
"category": "external",
"summary": "RHBZ#750422",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=750422"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-4085",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-4085"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-4085",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-4085"
}
],
"release_date": "2011-11-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-12-08T19:30:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"5Server-JBEAP-5:apache-cxf-0:2.2.12-4.patch_02.1.1.ep5.el5.noarch",
"5Server-JBEAP-5:apache-cxf-0:2.2.12-4.patch_02.1.1.ep5.el5.src",
"5Server-JBEAP-5:cglib-0:2.2-5.3.ep5.el5.noarch",
"5Server-JBEAP-5:cglib-0:2.2-5.3.ep5.el5.src",
"5Server-JBEAP-5:facelets-0:1.1.15-3.B1_patch_01.2.ep5.el5.noarch",
"5Server-JBEAP-5:facelets-0:1.1.15-3.B1_patch_01.2.ep5.el5.src",
"5Server-JBEAP-5:glassfish-jaxb-0:2.1.12-10_patch_02.ep5.el5.noarch",
"5Server-JBEAP-5:glassfish-jaxb-0:2.1.12-10_patch_02.ep5.el5.src",
"5Server-JBEAP-5:glassfish-jsf-0:1.2_13-5_patch_01.3.ep5.el5.noarch",
"5Server-JBEAP-5:glassfish-jsf-0:1.2_13-5_patch_01.3.ep5.el5.src",
"5Server-JBEAP-5:jacorb-jboss-0:2.3.1-10.patch_03.4.ep5.el5.noarch",
"5Server-JBEAP-5:jacorb-jboss-0:2.3.1-10.patch_03.4.ep5.el5.src",
"5Server-JBEAP-5:jakarta-commons-logging-jboss-0:1.1-10.3_patch_02.1.ep5.el5.noarch",
"5Server-JBEAP-5:jakarta-commons-logging-jboss-0:1.1-10.3_patch_02.1.ep5.el5.src",
"5Server-JBEAP-5:jboss-aop2-0:2.1.6-2.CP03.1.1.ep5.el5.noarch",
"5Server-JBEAP-5:jboss-aop2-0:2.1.6-2.CP03.1.1.ep5.el5.src",
"5Server-JBEAP-5:jboss-cache-core-0:3.2.8-1.ep5.el5.noarch",
"5Server-JBEAP-5:jboss-cache-core-0:3.2.8-1.ep5.el5.src",
"5Server-JBEAP-5:jboss-cl-0:2.0.10-1.2.ep5.el5.noarch",
"5Server-JBEAP-5:jboss-cl-0:2.0.10-1.2.ep5.el5.src",
"5Server-JBEAP-5:jboss-cluster-ha-client-0:1.1.4-1.1.ep5.el5.noarch",
"5Server-JBEAP-5:jboss-cluster-ha-client-0:1.1.4-1.1.ep5.el5.src",
"5Server-JBEAP-5:jboss-common-core-0:2.2.18-1.1.ep5.el5.noarch",
"5Server-JBEAP-5:jboss-common-core-0:2.2.18-1.1.ep5.el5.src",
"5Server-JBEAP-5:jboss-eap5-native-0:5.1.2-1.4.ep5.el5.i386",
"5Server-JBEAP-5:jboss-eap5-native-0:5.1.2-1.4.ep5.el5.src",
"5Server-JBEAP-5:jboss-eap5-native-0:5.1.2-1.4.ep5.el5.x86_64",
"5Server-JBEAP-5:jboss-ejb3-core-0:1.3.8-0.1.ep5.el5.noarch",
"5Server-JBEAP-5:jboss-ejb3-core-0:1.3.8-0.1.ep5.el5.src",
"5Server-JBEAP-5:jboss-ejb3-proxy-clustered-0:1.0.3-2.SP1.1.ep5.el5.noarch",
"5Server-JBEAP-5:jboss-ejb3-proxy-clustered-0:1.0.3-2.SP1.1.ep5.el5.src",
"5Server-JBEAP-5:jboss-ejb3-proxy-impl-0:1.0.6-2.SP2.1.ep5.el5.noarch",
"5Server-JBEAP-5:jboss-ejb3-proxy-impl-0:1.0.6-2.SP2.1.ep5.el5.src",
"5Server-JBEAP-5:jboss-el-0:1.0_02-0.CR6.2.ep5.el5.noarch",
"5Server-JBEAP-5:jboss-el-0:1.0_02-0.CR6.2.ep5.el5.src",
"5Server-JBEAP-5:jboss-messaging-0:1.4.8-9.SP5.1.ep5.el5.noarch",
"5Server-JBEAP-5:jboss-messaging-0:1.4.8-9.SP5.1.ep5.el5.src",
"5Server-JBEAP-5:jboss-naming-0:5.0.3-3.CP01.3.1.ep5.el5.noarch",
"5Server-JBEAP-5:jboss-naming-0:5.0.3-3.CP01.3.1.ep5.el5.src",
"5Server-JBEAP-5:jboss-remoting-0:2.5.4-9.SP3.1.ep5.el5.noarch",
"5Server-JBEAP-5:jboss-remoting-0:2.5.4-9.SP3.1.ep5.el5.src",
"5Server-JBEAP-5:jboss-seam2-0:2.2.5.EAP5-5.ep5.el5.noarch",
"5Server-JBEAP-5:jboss-seam2-0:2.2.5.EAP5-5.ep5.el5.src",
"5Server-JBEAP-5:jboss-seam2-docs-0:2.2.5.EAP5-5.ep5.el5.noarch",
"5Server-JBEAP-5:jboss-seam2-examples-0:2.2.5.EAP5-5.ep5.el5.noarch",
"5Server-JBEAP-5:jboss-seam2-runtime-0:2.2.5.EAP5-5.ep5.el5.noarch",
"5Server-JBEAP-5:jboss-security-spi-1:2.0.4-6.SP8.1.ep5.el5.noarch",
"5Server-JBEAP-5:jboss-security-spi-1:2.0.4-6.SP8.1.ep5.el5.src",
"5Server-JBEAP-5:jbossas-0:5.1.2-8.ep5.el5.noarch",
"5Server-JBEAP-5:jbossas-0:5.1.2-8.ep5.el5.src",
"5Server-JBEAP-5:jbossas-client-0:5.1.2-8.ep5.el5.noarch",
"5Server-JBEAP-5:jbossas-messaging-0:5.1.2-8.ep5.el5.noarch",
"5Server-JBEAP-5:jbossas-tp-licenses-0:5.1.2-7.ep5.el5.noarch",
"5Server-JBEAP-5:jbossas-tp-licenses-0:5.1.2-7.ep5.el5.src",
"5Server-JBEAP-5:jbossas-ws-cxf-0:5.1.2-8.ep5.el5.noarch",
"5Server-JBEAP-5:jbossas-ws-cxf-0:5.1.2-8.ep5.el5.src",
"5Server-JBEAP-5:jbossas-ws-native-0:5.1.2-8.ep5.el5.noarch",
"5Server-JBEAP-5:jbosssx2-0:2.0.4-6.SP8.2.ep5.el5.noarch",
"5Server-JBEAP-5:jbosssx2-0:2.0.4-6.SP8.2.ep5.el5.src",
"5Server-JBEAP-5:jbossts-1:4.6.1-11.CP12.4.ep5.el5.noarch",
"5Server-JBEAP-5:jbossts-1:4.6.1-11.CP12.4.ep5.el5.src",
"5Server-JBEAP-5:jbossts-javadoc-1:4.6.1-11.CP12.4.ep5.el5.noarch",
"5Server-JBEAP-5:jbossweb-0:2.1.12-1.4_patch_01.ep5.el5.noarch",
"5Server-JBEAP-5:jbossweb-0:2.1.12-1.4_patch_01.ep5.el5.src",
"5Server-JBEAP-5:jbossweb-el-1.0-api-0:2.1.12-1.4_patch_01.ep5.el5.noarch",
"5Server-JBEAP-5:jbossweb-jsp-2.1-api-0:2.1.12-1.4_patch_01.ep5.el5.noarch",
"5Server-JBEAP-5:jbossweb-lib-0:2.1.12-1.4_patch_01.ep5.el5.noarch",
"5Server-JBEAP-5:jbossweb-servlet-2.5-api-0:2.1.12-1.4_patch_01.ep5.el5.noarch",
"5Server-JBEAP-5:jbossws-0:3.1.2-7.SP11.4.ep5.el5.noarch",
"5Server-JBEAP-5:jbossws-0:3.1.2-7.SP11.4.ep5.el5.src",
"5Server-JBEAP-5:jbossws-common-0:1.1.0-6.SP8_patch_01.1.ep5.el5.noarch",
"5Server-JBEAP-5:jbossws-common-0:1.1.0-6.SP8_patch_01.1.ep5.el5.src",
"5Server-JBEAP-5:jbossws-framework-0:3.1.2-6.SP10.2.ep5.el5.noarch",
"5Server-JBEAP-5:jbossws-framework-0:3.1.2-6.SP10.2.ep5.el5.src",
"5Server-JBEAP-5:jbossws-spi-0:1.1.2-5.SP7.1.ep5.el5.noarch",
"5Server-JBEAP-5:jbossws-spi-0:1.1.2-5.SP7.1.ep5.el5.src",
"5Server-JBEAP-5:jgroups-1:2.6.20-1.1.ep5.el5.noarch",
"5Server-JBEAP-5:jgroups-1:2.6.20-1.1.ep5.el5.src",
"5Server-JBEAP-5:jopr-embedded-0:1.3.4-18.SP5.8.ep5.el5.noarch",
"5Server-JBEAP-5:jopr-embedded-0:1.3.4-18.SP5.8.ep5.el5.src",
"5Server-JBEAP-5:jopr-hibernate-plugin-0:3.0.0-13.EmbJopr4.ep5.el5.noarch",
"5Server-JBEAP-5:jopr-hibernate-plugin-0:3.0.0-13.EmbJopr4.ep5.el5.src",
"5Server-JBEAP-5:jopr-jboss-as-5-plugin-0:3.0.0-12.EmbJopr4.ep5.el5.noarch",
"5Server-JBEAP-5:jopr-jboss-as-5-plugin-0:3.0.0-12.EmbJopr4.ep5.el5.src",
"5Server-JBEAP-5:jopr-jboss-cache-v3-plugin-0:3.0.0-14.EmbJopr4.ep5.el5.noarch",
"5Server-JBEAP-5:jopr-jboss-cache-v3-plugin-0:3.0.0-14.EmbJopr4.ep5.el5.src",
"5Server-JBEAP-5:mod_cluster-0:1.0.10-3.1.GA_CP02.ep5.el5.src",
"5Server-JBEAP-5:mod_cluster-demo-0:1.0.10-3.1.GA_CP02.ep5.el5.noarch",
"5Server-JBEAP-5:mod_cluster-jbossas-0:1.0.10-3.1.GA_CP02.ep5.el5.noarch",
"5Server-JBEAP-5:mod_cluster-jbossweb2-0:1.0.10-3.1.GA_CP02.ep5.el5.noarch",
"5Server-JBEAP-5:mod_cluster-native-0:1.0.10-3.1.GA_CP02.ep5.el5.i386",
"5Server-JBEAP-5:mod_cluster-native-0:1.0.10-3.1.GA_CP02.ep5.el5.src",
"5Server-JBEAP-5:mod_cluster-native-0:1.0.10-3.1.GA_CP02.ep5.el5.x86_64",
"5Server-JBEAP-5:mod_cluster-tomcat6-0:1.0.10-3.1.GA_CP02.ep5.el5.noarch",
"5Server-JBEAP-5:org-mc4j-ems-0:1.2.15.1-4.ep5.el5.noarch",
"5Server-JBEAP-5:org-mc4j-ems-0:1.2.15.1-4.ep5.el5.src",
"5Server-JBEAP-5:picketlink-federation-0:2.0.2-1.1.ep5.el5.noarch",
"5Server-JBEAP-5:picketlink-federation-0:2.0.2-1.1.ep5.el5.src",
"5Server-JBEAP-5:picketlink-federation-webapp-idp-0:2.0.2-1.1.ep5.el5.noarch",
"5Server-JBEAP-5:picketlink-federation-webapp-pdp-0:2.0.2-1.1.ep5.el5.noarch",
"5Server-JBEAP-5:picketlink-federation-webapp-sts-0:2.0.2-1.1.ep5.el5.noarch",
"5Server-JBEAP-5:resteasy-0:1.2.1-9.CP02.4.ep5.el5.noarch",
"5Server-JBEAP-5:resteasy-0:1.2.1-9.CP02.4.ep5.el5.src",
"5Server-JBEAP-5:resteasy-examples-0:1.2.1-9.CP02.4.ep5.el5.noarch",
"5Server-JBEAP-5:resteasy-javadoc-0:1.2.1-9.CP02.4.ep5.el5.noarch",
"5Server-JBEAP-5:resteasy-manual-0:1.2.1-9.CP02.4.ep5.el5.noarch",
"5Server-JBEAP-5:rh-eap-docs-0:5.1.2-6.ep5.el5.noarch",
"5Server-JBEAP-5:rh-eap-docs-0:5.1.2-6.ep5.el5.src",
"5Server-JBEAP-5:rh-eap-docs-examples-0:5.1.2-6.ep5.el5.noarch",
"5Server-JBEAP-5:rhq-0:3.0.0-20.EmbJopr4.ep5.el5.noarch",
"5Server-JBEAP-5:rhq-0:3.0.0-20.EmbJopr4.ep5.el5.src",
"5Server-JBEAP-5:rhq-ant-bundle-common-0:3.0.0-20.EmbJopr4.ep5.el5.noarch",
"5Server-JBEAP-5:rhq-common-parent-0:3.0.0-20.EmbJopr4.ep5.el5.noarch",
"5Server-JBEAP-5:rhq-core-client-api-0:3.0.0-20.EmbJopr4.ep5.el5.noarch",
"5Server-JBEAP-5:rhq-core-comm-api-0:3.0.0-20.EmbJopr4.ep5.el5.noarch",
"5Server-JBEAP-5:rhq-core-dbutils-0:3.0.0-20.EmbJopr4.ep5.el5.noarch",
"5Server-JBEAP-5:rhq-core-domain-0:3.0.0-20.EmbJopr4.ep5.el5.noarch",
"5Server-JBEAP-5:rhq-core-gui-0:3.0.0-20.EmbJopr4.ep5.el5.noarch",
"5Server-JBEAP-5:rhq-core-native-system-0:3.0.0-20.EmbJopr4.ep5.el5.noarch",
"5Server-JBEAP-5:rhq-core-parent-0:3.0.0-20.EmbJopr4.ep5.el5.noarch",
"5Server-JBEAP-5:rhq-core-plugin-api-0:3.0.0-20.EmbJopr4.ep5.el5.noarch",
"5Server-JBEAP-5:rhq-core-plugin-container-0:3.0.0-20.EmbJopr4.ep5.el5.noarch",
"5Server-JBEAP-5:rhq-core-plugindoc-0:3.0.0-20.EmbJopr4.ep5.el5.noarch",
"5Server-JBEAP-5:rhq-core-util-0:3.0.0-20.EmbJopr4.ep5.el5.noarch",
"5Server-JBEAP-5:rhq-filetemplate-bundle-common-0:3.0.0-20.EmbJopr4.ep5.el5.noarch",
"5Server-JBEAP-5:rhq-helpers-0:3.0.0-20.EmbJopr4.ep5.el5.noarch",
"5Server-JBEAP-5:rhq-jboss-as-common-0:3.0.0-20.EmbJopr4.ep5.el5.noarch",
"5Server-JBEAP-5:rhq-jmx-plugin-0:3.0.0-20.EmbJopr4.ep5.el5.noarch",
"5Server-JBEAP-5:rhq-jmx-plugin-0:3.0.0-20.EmbJopr4.ep5.el5.src",
"5Server-JBEAP-5:rhq-modules-parent-0:3.0.0-20.EmbJopr4.ep5.el5.noarch",
"5Server-JBEAP-5:rhq-parent-0:3.0.0-20.EmbJopr4.ep5.el5.noarch",
"5Server-JBEAP-5:rhq-platform-plugin-0:3.0.0-13.EmbJopr4.ep5.el5.noarch",
"5Server-JBEAP-5:rhq-platform-plugin-0:3.0.0-13.EmbJopr4.ep5.el5.src",
"5Server-JBEAP-5:rhq-plugin-validator-0:3.0.0-20.EmbJopr4.ep5.el5.noarch",
"5Server-JBEAP-5:rhq-pluginAnnotations-0:3.0.0-20.EmbJopr4.ep5.el5.noarch",
"5Server-JBEAP-5:rhq-pluginGen-0:3.0.0-20.EmbJopr4.ep5.el5.noarch",
"5Server-JBEAP-5:rhq-plugins-parent-0:3.0.0-20.EmbJopr4.ep5.el5.noarch",
"5Server-JBEAP-5:rhq-rtfilter-0:3.0.0-20.EmbJopr4.ep5.el5.noarch",
"5Server-JBEAP-5:slf4j-0:1.5.8-10_patch_01.2.ep5.el5.noarch",
"5Server-JBEAP-5:slf4j-0:1.5.8-10_patch_01.2.ep5.el5.src",
"5Server-JBEAP-5:xalan-j2-0:2.7.1-6_patch_05.1.ep5.el5.noarch",
"5Server-JBEAP-5:xalan-j2-0:2.7.1-6_patch_05.1.ep5.el5.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:1799"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 2.6,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:H/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"5Server-JBEAP-5:apache-cxf-0:2.2.12-4.patch_02.1.1.ep5.el5.noarch",
"5Server-JBEAP-5:apache-cxf-0:2.2.12-4.patch_02.1.1.ep5.el5.src",
"5Server-JBEAP-5:cglib-0:2.2-5.3.ep5.el5.noarch",
"5Server-JBEAP-5:cglib-0:2.2-5.3.ep5.el5.src",
"5Server-JBEAP-5:facelets-0:1.1.15-3.B1_patch_01.2.ep5.el5.noarch",
"5Server-JBEAP-5:facelets-0:1.1.15-3.B1_patch_01.2.ep5.el5.src",
"5Server-JBEAP-5:glassfish-jaxb-0:2.1.12-10_patch_02.ep5.el5.noarch",
"5Server-JBEAP-5:glassfish-jaxb-0:2.1.12-10_patch_02.ep5.el5.src",
"5Server-JBEAP-5:glassfish-jsf-0:1.2_13-5_patch_01.3.ep5.el5.noarch",
"5Server-JBEAP-5:glassfish-jsf-0:1.2_13-5_patch_01.3.ep5.el5.src",
"5Server-JBEAP-5:jacorb-jboss-0:2.3.1-10.patch_03.4.ep5.el5.noarch",
"5Server-JBEAP-5:jacorb-jboss-0:2.3.1-10.patch_03.4.ep5.el5.src",
"5Server-JBEAP-5:jakarta-commons-logging-jboss-0:1.1-10.3_patch_02.1.ep5.el5.noarch",
"5Server-JBEAP-5:jakarta-commons-logging-jboss-0:1.1-10.3_patch_02.1.ep5.el5.src",
"5Server-JBEAP-5:jboss-aop2-0:2.1.6-2.CP03.1.1.ep5.el5.noarch",
"5Server-JBEAP-5:jboss-aop2-0:2.1.6-2.CP03.1.1.ep5.el5.src",
"5Server-JBEAP-5:jboss-cache-core-0:3.2.8-1.ep5.el5.noarch",
"5Server-JBEAP-5:jboss-cache-core-0:3.2.8-1.ep5.el5.src",
"5Server-JBEAP-5:jboss-cl-0:2.0.10-1.2.ep5.el5.noarch",
"5Server-JBEAP-5:jboss-cl-0:2.0.10-1.2.ep5.el5.src",
"5Server-JBEAP-5:jboss-cluster-ha-client-0:1.1.4-1.1.ep5.el5.noarch",
"5Server-JBEAP-5:jboss-cluster-ha-client-0:1.1.4-1.1.ep5.el5.src",
"5Server-JBEAP-5:jboss-common-core-0:2.2.18-1.1.ep5.el5.noarch",
"5Server-JBEAP-5:jboss-common-core-0:2.2.18-1.1.ep5.el5.src",
"5Server-JBEAP-5:jboss-eap5-native-0:5.1.2-1.4.ep5.el5.i386",
"5Server-JBEAP-5:jboss-eap5-native-0:5.1.2-1.4.ep5.el5.src",
"5Server-JBEAP-5:jboss-eap5-native-0:5.1.2-1.4.ep5.el5.x86_64",
"5Server-JBEAP-5:jboss-ejb3-core-0:1.3.8-0.1.ep5.el5.noarch",
"5Server-JBEAP-5:jboss-ejb3-core-0:1.3.8-0.1.ep5.el5.src",
"5Server-JBEAP-5:jboss-ejb3-proxy-clustered-0:1.0.3-2.SP1.1.ep5.el5.noarch",
"5Server-JBEAP-5:jboss-ejb3-proxy-clustered-0:1.0.3-2.SP1.1.ep5.el5.src",
"5Server-JBEAP-5:jboss-ejb3-proxy-impl-0:1.0.6-2.SP2.1.ep5.el5.noarch",
"5Server-JBEAP-5:jboss-ejb3-proxy-impl-0:1.0.6-2.SP2.1.ep5.el5.src",
"5Server-JBEAP-5:jboss-el-0:1.0_02-0.CR6.2.ep5.el5.noarch",
"5Server-JBEAP-5:jboss-el-0:1.0_02-0.CR6.2.ep5.el5.src",
"5Server-JBEAP-5:jboss-messaging-0:1.4.8-9.SP5.1.ep5.el5.noarch",
"5Server-JBEAP-5:jboss-messaging-0:1.4.8-9.SP5.1.ep5.el5.src",
"5Server-JBEAP-5:jboss-naming-0:5.0.3-3.CP01.3.1.ep5.el5.noarch",
"5Server-JBEAP-5:jboss-naming-0:5.0.3-3.CP01.3.1.ep5.el5.src",
"5Server-JBEAP-5:jboss-remoting-0:2.5.4-9.SP3.1.ep5.el5.noarch",
"5Server-JBEAP-5:jboss-remoting-0:2.5.4-9.SP3.1.ep5.el5.src",
"5Server-JBEAP-5:jboss-seam2-0:2.2.5.EAP5-5.ep5.el5.noarch",
"5Server-JBEAP-5:jboss-seam2-0:2.2.5.EAP5-5.ep5.el5.src",
"5Server-JBEAP-5:jboss-seam2-docs-0:2.2.5.EAP5-5.ep5.el5.noarch",
"5Server-JBEAP-5:jboss-seam2-examples-0:2.2.5.EAP5-5.ep5.el5.noarch",
"5Server-JBEAP-5:jboss-seam2-runtime-0:2.2.5.EAP5-5.ep5.el5.noarch",
"5Server-JBEAP-5:jboss-security-spi-1:2.0.4-6.SP8.1.ep5.el5.noarch",
"5Server-JBEAP-5:jboss-security-spi-1:2.0.4-6.SP8.1.ep5.el5.src",
"5Server-JBEAP-5:jbossas-0:5.1.2-8.ep5.el5.noarch",
"5Server-JBEAP-5:jbossas-0:5.1.2-8.ep5.el5.src",
"5Server-JBEAP-5:jbossas-client-0:5.1.2-8.ep5.el5.noarch",
"5Server-JBEAP-5:jbossas-messaging-0:5.1.2-8.ep5.el5.noarch",
"5Server-JBEAP-5:jbossas-tp-licenses-0:5.1.2-7.ep5.el5.noarch",
"5Server-JBEAP-5:jbossas-tp-licenses-0:5.1.2-7.ep5.el5.src",
"5Server-JBEAP-5:jbossas-ws-cxf-0:5.1.2-8.ep5.el5.noarch",
"5Server-JBEAP-5:jbossas-ws-cxf-0:5.1.2-8.ep5.el5.src",
"5Server-JBEAP-5:jbossas-ws-native-0:5.1.2-8.ep5.el5.noarch",
"5Server-JBEAP-5:jbosssx2-0:2.0.4-6.SP8.2.ep5.el5.noarch",
"5Server-JBEAP-5:jbosssx2-0:2.0.4-6.SP8.2.ep5.el5.src",
"5Server-JBEAP-5:jbossts-1:4.6.1-11.CP12.4.ep5.el5.noarch",
"5Server-JBEAP-5:jbossts-1:4.6.1-11.CP12.4.ep5.el5.src",
"5Server-JBEAP-5:jbossts-javadoc-1:4.6.1-11.CP12.4.ep5.el5.noarch",
"5Server-JBEAP-5:jbossweb-0:2.1.12-1.4_patch_01.ep5.el5.noarch",
"5Server-JBEAP-5:jbossweb-0:2.1.12-1.4_patch_01.ep5.el5.src",
"5Server-JBEAP-5:jbossweb-el-1.0-api-0:2.1.12-1.4_patch_01.ep5.el5.noarch",
"5Server-JBEAP-5:jbossweb-jsp-2.1-api-0:2.1.12-1.4_patch_01.ep5.el5.noarch",
"5Server-JBEAP-5:jbossweb-lib-0:2.1.12-1.4_patch_01.ep5.el5.noarch",
"5Server-JBEAP-5:jbossweb-servlet-2.5-api-0:2.1.12-1.4_patch_01.ep5.el5.noarch",
"5Server-JBEAP-5:jbossws-0:3.1.2-7.SP11.4.ep5.el5.noarch",
"5Server-JBEAP-5:jbossws-0:3.1.2-7.SP11.4.ep5.el5.src",
"5Server-JBEAP-5:jbossws-common-0:1.1.0-6.SP8_patch_01.1.ep5.el5.noarch",
"5Server-JBEAP-5:jbossws-common-0:1.1.0-6.SP8_patch_01.1.ep5.el5.src",
"5Server-JBEAP-5:jbossws-framework-0:3.1.2-6.SP10.2.ep5.el5.noarch",
"5Server-JBEAP-5:jbossws-framework-0:3.1.2-6.SP10.2.ep5.el5.src",
"5Server-JBEAP-5:jbossws-spi-0:1.1.2-5.SP7.1.ep5.el5.noarch",
"5Server-JBEAP-5:jbossws-spi-0:1.1.2-5.SP7.1.ep5.el5.src",
"5Server-JBEAP-5:jgroups-1:2.6.20-1.1.ep5.el5.noarch",
"5Server-JBEAP-5:jgroups-1:2.6.20-1.1.ep5.el5.src",
"5Server-JBEAP-5:jopr-embedded-0:1.3.4-18.SP5.8.ep5.el5.noarch",
"5Server-JBEAP-5:jopr-embedded-0:1.3.4-18.SP5.8.ep5.el5.src",
"5Server-JBEAP-5:jopr-hibernate-plugin-0:3.0.0-13.EmbJopr4.ep5.el5.noarch",
"5Server-JBEAP-5:jopr-hibernate-plugin-0:3.0.0-13.EmbJopr4.ep5.el5.src",
"5Server-JBEAP-5:jopr-jboss-as-5-plugin-0:3.0.0-12.EmbJopr4.ep5.el5.noarch",
"5Server-JBEAP-5:jopr-jboss-as-5-plugin-0:3.0.0-12.EmbJopr4.ep5.el5.src",
"5Server-JBEAP-5:jopr-jboss-cache-v3-plugin-0:3.0.0-14.EmbJopr4.ep5.el5.noarch",
"5Server-JBEAP-5:jopr-jboss-cache-v3-plugin-0:3.0.0-14.EmbJopr4.ep5.el5.src",
"5Server-JBEAP-5:mod_cluster-0:1.0.10-3.1.GA_CP02.ep5.el5.src",
"5Server-JBEAP-5:mod_cluster-demo-0:1.0.10-3.1.GA_CP02.ep5.el5.noarch",
"5Server-JBEAP-5:mod_cluster-jbossas-0:1.0.10-3.1.GA_CP02.ep5.el5.noarch",
"5Server-JBEAP-5:mod_cluster-jbossweb2-0:1.0.10-3.1.GA_CP02.ep5.el5.noarch",
"5Server-JBEAP-5:mod_cluster-native-0:1.0.10-3.1.GA_CP02.ep5.el5.i386",
"5Server-JBEAP-5:mod_cluster-native-0:1.0.10-3.1.GA_CP02.ep5.el5.src",
"5Server-JBEAP-5:mod_cluster-native-0:1.0.10-3.1.GA_CP02.ep5.el5.x86_64",
"5Server-JBEAP-5:mod_cluster-tomcat6-0:1.0.10-3.1.GA_CP02.ep5.el5.noarch",
"5Server-JBEAP-5:org-mc4j-ems-0:1.2.15.1-4.ep5.el5.noarch",
"5Server-JBEAP-5:org-mc4j-ems-0:1.2.15.1-4.ep5.el5.src",
"5Server-JBEAP-5:picketlink-federation-0:2.0.2-1.1.ep5.el5.noarch",
"5Server-JBEAP-5:picketlink-federation-0:2.0.2-1.1.ep5.el5.src",
"5Server-JBEAP-5:picketlink-federation-webapp-idp-0:2.0.2-1.1.ep5.el5.noarch",
"5Server-JBEAP-5:picketlink-federation-webapp-pdp-0:2.0.2-1.1.ep5.el5.noarch",
"5Server-JBEAP-5:picketlink-federation-webapp-sts-0:2.0.2-1.1.ep5.el5.noarch",
"5Server-JBEAP-5:resteasy-0:1.2.1-9.CP02.4.ep5.el5.noarch",
"5Server-JBEAP-5:resteasy-0:1.2.1-9.CP02.4.ep5.el5.src",
"5Server-JBEAP-5:resteasy-examples-0:1.2.1-9.CP02.4.ep5.el5.noarch",
"5Server-JBEAP-5:resteasy-javadoc-0:1.2.1-9.CP02.4.ep5.el5.noarch",
"5Server-JBEAP-5:resteasy-manual-0:1.2.1-9.CP02.4.ep5.el5.noarch",
"5Server-JBEAP-5:rh-eap-docs-0:5.1.2-6.ep5.el5.noarch",
"5Server-JBEAP-5:rh-eap-docs-0:5.1.2-6.ep5.el5.src",
"5Server-JBEAP-5:rh-eap-docs-examples-0:5.1.2-6.ep5.el5.noarch",
"5Server-JBEAP-5:rhq-0:3.0.0-20.EmbJopr4.ep5.el5.noarch",
"5Server-JBEAP-5:rhq-0:3.0.0-20.EmbJopr4.ep5.el5.src",
"5Server-JBEAP-5:rhq-ant-bundle-common-0:3.0.0-20.EmbJopr4.ep5.el5.noarch",
"5Server-JBEAP-5:rhq-common-parent-0:3.0.0-20.EmbJopr4.ep5.el5.noarch",
"5Server-JBEAP-5:rhq-core-client-api-0:3.0.0-20.EmbJopr4.ep5.el5.noarch",
"5Server-JBEAP-5:rhq-core-comm-api-0:3.0.0-20.EmbJopr4.ep5.el5.noarch",
"5Server-JBEAP-5:rhq-core-dbutils-0:3.0.0-20.EmbJopr4.ep5.el5.noarch",
"5Server-JBEAP-5:rhq-core-domain-0:3.0.0-20.EmbJopr4.ep5.el5.noarch",
"5Server-JBEAP-5:rhq-core-gui-0:3.0.0-20.EmbJopr4.ep5.el5.noarch",
"5Server-JBEAP-5:rhq-core-native-system-0:3.0.0-20.EmbJopr4.ep5.el5.noarch",
"5Server-JBEAP-5:rhq-core-parent-0:3.0.0-20.EmbJopr4.ep5.el5.noarch",
"5Server-JBEAP-5:rhq-core-plugin-api-0:3.0.0-20.EmbJopr4.ep5.el5.noarch",
"5Server-JBEAP-5:rhq-core-plugin-container-0:3.0.0-20.EmbJopr4.ep5.el5.noarch",
"5Server-JBEAP-5:rhq-core-plugindoc-0:3.0.0-20.EmbJopr4.ep5.el5.noarch",
"5Server-JBEAP-5:rhq-core-util-0:3.0.0-20.EmbJopr4.ep5.el5.noarch",
"5Server-JBEAP-5:rhq-filetemplate-bundle-common-0:3.0.0-20.EmbJopr4.ep5.el5.noarch",
"5Server-JBEAP-5:rhq-helpers-0:3.0.0-20.EmbJopr4.ep5.el5.noarch",
"5Server-JBEAP-5:rhq-jboss-as-common-0:3.0.0-20.EmbJopr4.ep5.el5.noarch",
"5Server-JBEAP-5:rhq-jmx-plugin-0:3.0.0-20.EmbJopr4.ep5.el5.noarch",
"5Server-JBEAP-5:rhq-jmx-plugin-0:3.0.0-20.EmbJopr4.ep5.el5.src",
"5Server-JBEAP-5:rhq-modules-parent-0:3.0.0-20.EmbJopr4.ep5.el5.noarch",
"5Server-JBEAP-5:rhq-parent-0:3.0.0-20.EmbJopr4.ep5.el5.noarch",
"5Server-JBEAP-5:rhq-platform-plugin-0:3.0.0-13.EmbJopr4.ep5.el5.noarch",
"5Server-JBEAP-5:rhq-platform-plugin-0:3.0.0-13.EmbJopr4.ep5.el5.src",
"5Server-JBEAP-5:rhq-plugin-validator-0:3.0.0-20.EmbJopr4.ep5.el5.noarch",
"5Server-JBEAP-5:rhq-pluginAnnotations-0:3.0.0-20.EmbJopr4.ep5.el5.noarch",
"5Server-JBEAP-5:rhq-pluginGen-0:3.0.0-20.EmbJopr4.ep5.el5.noarch",
"5Server-JBEAP-5:rhq-plugins-parent-0:3.0.0-20.EmbJopr4.ep5.el5.noarch",
"5Server-JBEAP-5:rhq-rtfilter-0:3.0.0-20.EmbJopr4.ep5.el5.noarch",
"5Server-JBEAP-5:slf4j-0:1.5.8-10_patch_01.2.ep5.el5.noarch",
"5Server-JBEAP-5:slf4j-0:1.5.8-10_patch_01.2.ep5.el5.src",
"5Server-JBEAP-5:xalan-j2-0:2.7.1-6_patch_05.1.ep5.el5.noarch",
"5Server-JBEAP-5:xalan-j2-0:2.7.1-6_patch_05.1.ep5.el5.src"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "Invoker servlets authentication bypass (HTTP verb tampering)"
},
{
"cve": "CVE-2011-4314",
"discovery_date": "2011-11-16T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "754386"
}
],
"notes": [
{
"category": "description",
"text": "message/ax/AxMessage.java in OpenID4Java before 0.9.6 final, as used in JBoss Enterprise Application Platform 5.1 before 5.1.2, Step2, Kay Framework before 1.0.2, and possibly other products does not verify that Attribute Exchange (AX) information is signed, which allows remote attackers to modify potentially sensitive AX information without detection via a man-in-the-middle (MITM) attack.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "extension): MITM due to improper validation of AX attribute signatures",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-JBEAP-5:apache-cxf-0:2.2.12-4.patch_02.1.1.ep5.el5.noarch",
"5Server-JBEAP-5:apache-cxf-0:2.2.12-4.patch_02.1.1.ep5.el5.src",
"5Server-JBEAP-5:cglib-0:2.2-5.3.ep5.el5.noarch",
"5Server-JBEAP-5:cglib-0:2.2-5.3.ep5.el5.src",
"5Server-JBEAP-5:facelets-0:1.1.15-3.B1_patch_01.2.ep5.el5.noarch",
"5Server-JBEAP-5:facelets-0:1.1.15-3.B1_patch_01.2.ep5.el5.src",
"5Server-JBEAP-5:glassfish-jaxb-0:2.1.12-10_patch_02.ep5.el5.noarch",
"5Server-JBEAP-5:glassfish-jaxb-0:2.1.12-10_patch_02.ep5.el5.src",
"5Server-JBEAP-5:glassfish-jsf-0:1.2_13-5_patch_01.3.ep5.el5.noarch",
"5Server-JBEAP-5:glassfish-jsf-0:1.2_13-5_patch_01.3.ep5.el5.src",
"5Server-JBEAP-5:jacorb-jboss-0:2.3.1-10.patch_03.4.ep5.el5.noarch",
"5Server-JBEAP-5:jacorb-jboss-0:2.3.1-10.patch_03.4.ep5.el5.src",
"5Server-JBEAP-5:jakarta-commons-logging-jboss-0:1.1-10.3_patch_02.1.ep5.el5.noarch",
"5Server-JBEAP-5:jakarta-commons-logging-jboss-0:1.1-10.3_patch_02.1.ep5.el5.src",
"5Server-JBEAP-5:jboss-aop2-0:2.1.6-2.CP03.1.1.ep5.el5.noarch",
"5Server-JBEAP-5:jboss-aop2-0:2.1.6-2.CP03.1.1.ep5.el5.src",
"5Server-JBEAP-5:jboss-cache-core-0:3.2.8-1.ep5.el5.noarch",
"5Server-JBEAP-5:jboss-cache-core-0:3.2.8-1.ep5.el5.src",
"5Server-JBEAP-5:jboss-cl-0:2.0.10-1.2.ep5.el5.noarch",
"5Server-JBEAP-5:jboss-cl-0:2.0.10-1.2.ep5.el5.src",
"5Server-JBEAP-5:jboss-cluster-ha-client-0:1.1.4-1.1.ep5.el5.noarch",
"5Server-JBEAP-5:jboss-cluster-ha-client-0:1.1.4-1.1.ep5.el5.src",
"5Server-JBEAP-5:jboss-common-core-0:2.2.18-1.1.ep5.el5.noarch",
"5Server-JBEAP-5:jboss-common-core-0:2.2.18-1.1.ep5.el5.src",
"5Server-JBEAP-5:jboss-eap5-native-0:5.1.2-1.4.ep5.el5.i386",
"5Server-JBEAP-5:jboss-eap5-native-0:5.1.2-1.4.ep5.el5.src",
"5Server-JBEAP-5:jboss-eap5-native-0:5.1.2-1.4.ep5.el5.x86_64",
"5Server-JBEAP-5:jboss-ejb3-core-0:1.3.8-0.1.ep5.el5.noarch",
"5Server-JBEAP-5:jboss-ejb3-core-0:1.3.8-0.1.ep5.el5.src",
"5Server-JBEAP-5:jboss-ejb3-proxy-clustered-0:1.0.3-2.SP1.1.ep5.el5.noarch",
"5Server-JBEAP-5:jboss-ejb3-proxy-clustered-0:1.0.3-2.SP1.1.ep5.el5.src",
"5Server-JBEAP-5:jboss-ejb3-proxy-impl-0:1.0.6-2.SP2.1.ep5.el5.noarch",
"5Server-JBEAP-5:jboss-ejb3-proxy-impl-0:1.0.6-2.SP2.1.ep5.el5.src",
"5Server-JBEAP-5:jboss-el-0:1.0_02-0.CR6.2.ep5.el5.noarch",
"5Server-JBEAP-5:jboss-el-0:1.0_02-0.CR6.2.ep5.el5.src",
"5Server-JBEAP-5:jboss-messaging-0:1.4.8-9.SP5.1.ep5.el5.noarch",
"5Server-JBEAP-5:jboss-messaging-0:1.4.8-9.SP5.1.ep5.el5.src",
"5Server-JBEAP-5:jboss-naming-0:5.0.3-3.CP01.3.1.ep5.el5.noarch",
"5Server-JBEAP-5:jboss-naming-0:5.0.3-3.CP01.3.1.ep5.el5.src",
"5Server-JBEAP-5:jboss-remoting-0:2.5.4-9.SP3.1.ep5.el5.noarch",
"5Server-JBEAP-5:jboss-remoting-0:2.5.4-9.SP3.1.ep5.el5.src",
"5Server-JBEAP-5:jboss-seam2-0:2.2.5.EAP5-5.ep5.el5.noarch",
"5Server-JBEAP-5:jboss-seam2-0:2.2.5.EAP5-5.ep5.el5.src",
"5Server-JBEAP-5:jboss-seam2-docs-0:2.2.5.EAP5-5.ep5.el5.noarch",
"5Server-JBEAP-5:jboss-seam2-examples-0:2.2.5.EAP5-5.ep5.el5.noarch",
"5Server-JBEAP-5:jboss-seam2-runtime-0:2.2.5.EAP5-5.ep5.el5.noarch",
"5Server-JBEAP-5:jboss-security-spi-1:2.0.4-6.SP8.1.ep5.el5.noarch",
"5Server-JBEAP-5:jboss-security-spi-1:2.0.4-6.SP8.1.ep5.el5.src",
"5Server-JBEAP-5:jbossas-0:5.1.2-8.ep5.el5.noarch",
"5Server-JBEAP-5:jbossas-0:5.1.2-8.ep5.el5.src",
"5Server-JBEAP-5:jbossas-client-0:5.1.2-8.ep5.el5.noarch",
"5Server-JBEAP-5:jbossas-messaging-0:5.1.2-8.ep5.el5.noarch",
"5Server-JBEAP-5:jbossas-tp-licenses-0:5.1.2-7.ep5.el5.noarch",
"5Server-JBEAP-5:jbossas-tp-licenses-0:5.1.2-7.ep5.el5.src",
"5Server-JBEAP-5:jbossas-ws-cxf-0:5.1.2-8.ep5.el5.noarch",
"5Server-JBEAP-5:jbossas-ws-cxf-0:5.1.2-8.ep5.el5.src",
"5Server-JBEAP-5:jbossas-ws-native-0:5.1.2-8.ep5.el5.noarch",
"5Server-JBEAP-5:jbosssx2-0:2.0.4-6.SP8.2.ep5.el5.noarch",
"5Server-JBEAP-5:jbosssx2-0:2.0.4-6.SP8.2.ep5.el5.src",
"5Server-JBEAP-5:jbossts-1:4.6.1-11.CP12.4.ep5.el5.noarch",
"5Server-JBEAP-5:jbossts-1:4.6.1-11.CP12.4.ep5.el5.src",
"5Server-JBEAP-5:jbossts-javadoc-1:4.6.1-11.CP12.4.ep5.el5.noarch",
"5Server-JBEAP-5:jbossweb-0:2.1.12-1.4_patch_01.ep5.el5.noarch",
"5Server-JBEAP-5:jbossweb-0:2.1.12-1.4_patch_01.ep5.el5.src",
"5Server-JBEAP-5:jbossweb-el-1.0-api-0:2.1.12-1.4_patch_01.ep5.el5.noarch",
"5Server-JBEAP-5:jbossweb-jsp-2.1-api-0:2.1.12-1.4_patch_01.ep5.el5.noarch",
"5Server-JBEAP-5:jbossweb-lib-0:2.1.12-1.4_patch_01.ep5.el5.noarch",
"5Server-JBEAP-5:jbossweb-servlet-2.5-api-0:2.1.12-1.4_patch_01.ep5.el5.noarch",
"5Server-JBEAP-5:jbossws-0:3.1.2-7.SP11.4.ep5.el5.noarch",
"5Server-JBEAP-5:jbossws-0:3.1.2-7.SP11.4.ep5.el5.src",
"5Server-JBEAP-5:jbossws-common-0:1.1.0-6.SP8_patch_01.1.ep5.el5.noarch",
"5Server-JBEAP-5:jbossws-common-0:1.1.0-6.SP8_patch_01.1.ep5.el5.src",
"5Server-JBEAP-5:jbossws-framework-0:3.1.2-6.SP10.2.ep5.el5.noarch",
"5Server-JBEAP-5:jbossws-framework-0:3.1.2-6.SP10.2.ep5.el5.src",
"5Server-JBEAP-5:jbossws-spi-0:1.1.2-5.SP7.1.ep5.el5.noarch",
"5Server-JBEAP-5:jbossws-spi-0:1.1.2-5.SP7.1.ep5.el5.src",
"5Server-JBEAP-5:jgroups-1:2.6.20-1.1.ep5.el5.noarch",
"5Server-JBEAP-5:jgroups-1:2.6.20-1.1.ep5.el5.src",
"5Server-JBEAP-5:jopr-embedded-0:1.3.4-18.SP5.8.ep5.el5.noarch",
"5Server-JBEAP-5:jopr-embedded-0:1.3.4-18.SP5.8.ep5.el5.src",
"5Server-JBEAP-5:jopr-hibernate-plugin-0:3.0.0-13.EmbJopr4.ep5.el5.noarch",
"5Server-JBEAP-5:jopr-hibernate-plugin-0:3.0.0-13.EmbJopr4.ep5.el5.src",
"5Server-JBEAP-5:jopr-jboss-as-5-plugin-0:3.0.0-12.EmbJopr4.ep5.el5.noarch",
"5Server-JBEAP-5:jopr-jboss-as-5-plugin-0:3.0.0-12.EmbJopr4.ep5.el5.src",
"5Server-JBEAP-5:jopr-jboss-cache-v3-plugin-0:3.0.0-14.EmbJopr4.ep5.el5.noarch",
"5Server-JBEAP-5:jopr-jboss-cache-v3-plugin-0:3.0.0-14.EmbJopr4.ep5.el5.src",
"5Server-JBEAP-5:mod_cluster-0:1.0.10-3.1.GA_CP02.ep5.el5.src",
"5Server-JBEAP-5:mod_cluster-demo-0:1.0.10-3.1.GA_CP02.ep5.el5.noarch",
"5Server-JBEAP-5:mod_cluster-jbossas-0:1.0.10-3.1.GA_CP02.ep5.el5.noarch",
"5Server-JBEAP-5:mod_cluster-jbossweb2-0:1.0.10-3.1.GA_CP02.ep5.el5.noarch",
"5Server-JBEAP-5:mod_cluster-native-0:1.0.10-3.1.GA_CP02.ep5.el5.i386",
"5Server-JBEAP-5:mod_cluster-native-0:1.0.10-3.1.GA_CP02.ep5.el5.src",
"5Server-JBEAP-5:mod_cluster-native-0:1.0.10-3.1.GA_CP02.ep5.el5.x86_64",
"5Server-JBEAP-5:mod_cluster-tomcat6-0:1.0.10-3.1.GA_CP02.ep5.el5.noarch",
"5Server-JBEAP-5:org-mc4j-ems-0:1.2.15.1-4.ep5.el5.noarch",
"5Server-JBEAP-5:org-mc4j-ems-0:1.2.15.1-4.ep5.el5.src",
"5Server-JBEAP-5:picketlink-federation-0:2.0.2-1.1.ep5.el5.noarch",
"5Server-JBEAP-5:picketlink-federation-0:2.0.2-1.1.ep5.el5.src",
"5Server-JBEAP-5:picketlink-federation-webapp-idp-0:2.0.2-1.1.ep5.el5.noarch",
"5Server-JBEAP-5:picketlink-federation-webapp-pdp-0:2.0.2-1.1.ep5.el5.noarch",
"5Server-JBEAP-5:picketlink-federation-webapp-sts-0:2.0.2-1.1.ep5.el5.noarch",
"5Server-JBEAP-5:resteasy-0:1.2.1-9.CP02.4.ep5.el5.noarch",
"5Server-JBEAP-5:resteasy-0:1.2.1-9.CP02.4.ep5.el5.src",
"5Server-JBEAP-5:resteasy-examples-0:1.2.1-9.CP02.4.ep5.el5.noarch",
"5Server-JBEAP-5:resteasy-javadoc-0:1.2.1-9.CP02.4.ep5.el5.noarch",
"5Server-JBEAP-5:resteasy-manual-0:1.2.1-9.CP02.4.ep5.el5.noarch",
"5Server-JBEAP-5:rh-eap-docs-0:5.1.2-6.ep5.el5.noarch",
"5Server-JBEAP-5:rh-eap-docs-0:5.1.2-6.ep5.el5.src",
"5Server-JBEAP-5:rh-eap-docs-examples-0:5.1.2-6.ep5.el5.noarch",
"5Server-JBEAP-5:rhq-0:3.0.0-20.EmbJopr4.ep5.el5.noarch",
"5Server-JBEAP-5:rhq-0:3.0.0-20.EmbJopr4.ep5.el5.src",
"5Server-JBEAP-5:rhq-ant-bundle-common-0:3.0.0-20.EmbJopr4.ep5.el5.noarch",
"5Server-JBEAP-5:rhq-common-parent-0:3.0.0-20.EmbJopr4.ep5.el5.noarch",
"5Server-JBEAP-5:rhq-core-client-api-0:3.0.0-20.EmbJopr4.ep5.el5.noarch",
"5Server-JBEAP-5:rhq-core-comm-api-0:3.0.0-20.EmbJopr4.ep5.el5.noarch",
"5Server-JBEAP-5:rhq-core-dbutils-0:3.0.0-20.EmbJopr4.ep5.el5.noarch",
"5Server-JBEAP-5:rhq-core-domain-0:3.0.0-20.EmbJopr4.ep5.el5.noarch",
"5Server-JBEAP-5:rhq-core-gui-0:3.0.0-20.EmbJopr4.ep5.el5.noarch",
"5Server-JBEAP-5:rhq-core-native-system-0:3.0.0-20.EmbJopr4.ep5.el5.noarch",
"5Server-JBEAP-5:rhq-core-parent-0:3.0.0-20.EmbJopr4.ep5.el5.noarch",
"5Server-JBEAP-5:rhq-core-plugin-api-0:3.0.0-20.EmbJopr4.ep5.el5.noarch",
"5Server-JBEAP-5:rhq-core-plugin-container-0:3.0.0-20.EmbJopr4.ep5.el5.noarch",
"5Server-JBEAP-5:rhq-core-plugindoc-0:3.0.0-20.EmbJopr4.ep5.el5.noarch",
"5Server-JBEAP-5:rhq-core-util-0:3.0.0-20.EmbJopr4.ep5.el5.noarch",
"5Server-JBEAP-5:rhq-filetemplate-bundle-common-0:3.0.0-20.EmbJopr4.ep5.el5.noarch",
"5Server-JBEAP-5:rhq-helpers-0:3.0.0-20.EmbJopr4.ep5.el5.noarch",
"5Server-JBEAP-5:rhq-jboss-as-common-0:3.0.0-20.EmbJopr4.ep5.el5.noarch",
"5Server-JBEAP-5:rhq-jmx-plugin-0:3.0.0-20.EmbJopr4.ep5.el5.noarch",
"5Server-JBEAP-5:rhq-jmx-plugin-0:3.0.0-20.EmbJopr4.ep5.el5.src",
"5Server-JBEAP-5:rhq-modules-parent-0:3.0.0-20.EmbJopr4.ep5.el5.noarch",
"5Server-JBEAP-5:rhq-parent-0:3.0.0-20.EmbJopr4.ep5.el5.noarch",
"5Server-JBEAP-5:rhq-platform-plugin-0:3.0.0-13.EmbJopr4.ep5.el5.noarch",
"5Server-JBEAP-5:rhq-platform-plugin-0:3.0.0-13.EmbJopr4.ep5.el5.src",
"5Server-JBEAP-5:rhq-plugin-validator-0:3.0.0-20.EmbJopr4.ep5.el5.noarch",
"5Server-JBEAP-5:rhq-pluginAnnotations-0:3.0.0-20.EmbJopr4.ep5.el5.noarch",
"5Server-JBEAP-5:rhq-pluginGen-0:3.0.0-20.EmbJopr4.ep5.el5.noarch",
"5Server-JBEAP-5:rhq-plugins-parent-0:3.0.0-20.EmbJopr4.ep5.el5.noarch",
"5Server-JBEAP-5:rhq-rtfilter-0:3.0.0-20.EmbJopr4.ep5.el5.noarch",
"5Server-JBEAP-5:slf4j-0:1.5.8-10_patch_01.2.ep5.el5.noarch",
"5Server-JBEAP-5:slf4j-0:1.5.8-10_patch_01.2.ep5.el5.src",
"5Server-JBEAP-5:xalan-j2-0:2.7.1-6_patch_05.1.ep5.el5.noarch",
"5Server-JBEAP-5:xalan-j2-0:2.7.1-6_patch_05.1.ep5.el5.src"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-4314"
},
{
"category": "external",
"summary": "RHBZ#754386",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=754386"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-4314",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-4314"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-4314",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-4314"
}
],
"release_date": "2011-05-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-12-08T19:30:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"5Server-JBEAP-5:apache-cxf-0:2.2.12-4.patch_02.1.1.ep5.el5.noarch",
"5Server-JBEAP-5:apache-cxf-0:2.2.12-4.patch_02.1.1.ep5.el5.src",
"5Server-JBEAP-5:cglib-0:2.2-5.3.ep5.el5.noarch",
"5Server-JBEAP-5:cglib-0:2.2-5.3.ep5.el5.src",
"5Server-JBEAP-5:facelets-0:1.1.15-3.B1_patch_01.2.ep5.el5.noarch",
"5Server-JBEAP-5:facelets-0:1.1.15-3.B1_patch_01.2.ep5.el5.src",
"5Server-JBEAP-5:glassfish-jaxb-0:2.1.12-10_patch_02.ep5.el5.noarch",
"5Server-JBEAP-5:glassfish-jaxb-0:2.1.12-10_patch_02.ep5.el5.src",
"5Server-JBEAP-5:glassfish-jsf-0:1.2_13-5_patch_01.3.ep5.el5.noarch",
"5Server-JBEAP-5:glassfish-jsf-0:1.2_13-5_patch_01.3.ep5.el5.src",
"5Server-JBEAP-5:jacorb-jboss-0:2.3.1-10.patch_03.4.ep5.el5.noarch",
"5Server-JBEAP-5:jacorb-jboss-0:2.3.1-10.patch_03.4.ep5.el5.src",
"5Server-JBEAP-5:jakarta-commons-logging-jboss-0:1.1-10.3_patch_02.1.ep5.el5.noarch",
"5Server-JBEAP-5:jakarta-commons-logging-jboss-0:1.1-10.3_patch_02.1.ep5.el5.src",
"5Server-JBEAP-5:jboss-aop2-0:2.1.6-2.CP03.1.1.ep5.el5.noarch",
"5Server-JBEAP-5:jboss-aop2-0:2.1.6-2.CP03.1.1.ep5.el5.src",
"5Server-JBEAP-5:jboss-cache-core-0:3.2.8-1.ep5.el5.noarch",
"5Server-JBEAP-5:jboss-cache-core-0:3.2.8-1.ep5.el5.src",
"5Server-JBEAP-5:jboss-cl-0:2.0.10-1.2.ep5.el5.noarch",
"5Server-JBEAP-5:jboss-cl-0:2.0.10-1.2.ep5.el5.src",
"5Server-JBEAP-5:jboss-cluster-ha-client-0:1.1.4-1.1.ep5.el5.noarch",
"5Server-JBEAP-5:jboss-cluster-ha-client-0:1.1.4-1.1.ep5.el5.src",
"5Server-JBEAP-5:jboss-common-core-0:2.2.18-1.1.ep5.el5.noarch",
"5Server-JBEAP-5:jboss-common-core-0:2.2.18-1.1.ep5.el5.src",
"5Server-JBEAP-5:jboss-eap5-native-0:5.1.2-1.4.ep5.el5.i386",
"5Server-JBEAP-5:jboss-eap5-native-0:5.1.2-1.4.ep5.el5.src",
"5Server-JBEAP-5:jboss-eap5-native-0:5.1.2-1.4.ep5.el5.x86_64",
"5Server-JBEAP-5:jboss-ejb3-core-0:1.3.8-0.1.ep5.el5.noarch",
"5Server-JBEAP-5:jboss-ejb3-core-0:1.3.8-0.1.ep5.el5.src",
"5Server-JBEAP-5:jboss-ejb3-proxy-clustered-0:1.0.3-2.SP1.1.ep5.el5.noarch",
"5Server-JBEAP-5:jboss-ejb3-proxy-clustered-0:1.0.3-2.SP1.1.ep5.el5.src",
"5Server-JBEAP-5:jboss-ejb3-proxy-impl-0:1.0.6-2.SP2.1.ep5.el5.noarch",
"5Server-JBEAP-5:jboss-ejb3-proxy-impl-0:1.0.6-2.SP2.1.ep5.el5.src",
"5Server-JBEAP-5:jboss-el-0:1.0_02-0.CR6.2.ep5.el5.noarch",
"5Server-JBEAP-5:jboss-el-0:1.0_02-0.CR6.2.ep5.el5.src",
"5Server-JBEAP-5:jboss-messaging-0:1.4.8-9.SP5.1.ep5.el5.noarch",
"5Server-JBEAP-5:jboss-messaging-0:1.4.8-9.SP5.1.ep5.el5.src",
"5Server-JBEAP-5:jboss-naming-0:5.0.3-3.CP01.3.1.ep5.el5.noarch",
"5Server-JBEAP-5:jboss-naming-0:5.0.3-3.CP01.3.1.ep5.el5.src",
"5Server-JBEAP-5:jboss-remoting-0:2.5.4-9.SP3.1.ep5.el5.noarch",
"5Server-JBEAP-5:jboss-remoting-0:2.5.4-9.SP3.1.ep5.el5.src",
"5Server-JBEAP-5:jboss-seam2-0:2.2.5.EAP5-5.ep5.el5.noarch",
"5Server-JBEAP-5:jboss-seam2-0:2.2.5.EAP5-5.ep5.el5.src",
"5Server-JBEAP-5:jboss-seam2-docs-0:2.2.5.EAP5-5.ep5.el5.noarch",
"5Server-JBEAP-5:jboss-seam2-examples-0:2.2.5.EAP5-5.ep5.el5.noarch",
"5Server-JBEAP-5:jboss-seam2-runtime-0:2.2.5.EAP5-5.ep5.el5.noarch",
"5Server-JBEAP-5:jboss-security-spi-1:2.0.4-6.SP8.1.ep5.el5.noarch",
"5Server-JBEAP-5:jboss-security-spi-1:2.0.4-6.SP8.1.ep5.el5.src",
"5Server-JBEAP-5:jbossas-0:5.1.2-8.ep5.el5.noarch",
"5Server-JBEAP-5:jbossas-0:5.1.2-8.ep5.el5.src",
"5Server-JBEAP-5:jbossas-client-0:5.1.2-8.ep5.el5.noarch",
"5Server-JBEAP-5:jbossas-messaging-0:5.1.2-8.ep5.el5.noarch",
"5Server-JBEAP-5:jbossas-tp-licenses-0:5.1.2-7.ep5.el5.noarch",
"5Server-JBEAP-5:jbossas-tp-licenses-0:5.1.2-7.ep5.el5.src",
"5Server-JBEAP-5:jbossas-ws-cxf-0:5.1.2-8.ep5.el5.noarch",
"5Server-JBEAP-5:jbossas-ws-cxf-0:5.1.2-8.ep5.el5.src",
"5Server-JBEAP-5:jbossas-ws-native-0:5.1.2-8.ep5.el5.noarch",
"5Server-JBEAP-5:jbosssx2-0:2.0.4-6.SP8.2.ep5.el5.noarch",
"5Server-JBEAP-5:jbosssx2-0:2.0.4-6.SP8.2.ep5.el5.src",
"5Server-JBEAP-5:jbossts-1:4.6.1-11.CP12.4.ep5.el5.noarch",
"5Server-JBEAP-5:jbossts-1:4.6.1-11.CP12.4.ep5.el5.src",
"5Server-JBEAP-5:jbossts-javadoc-1:4.6.1-11.CP12.4.ep5.el5.noarch",
"5Server-JBEAP-5:jbossweb-0:2.1.12-1.4_patch_01.ep5.el5.noarch",
"5Server-JBEAP-5:jbossweb-0:2.1.12-1.4_patch_01.ep5.el5.src",
"5Server-JBEAP-5:jbossweb-el-1.0-api-0:2.1.12-1.4_patch_01.ep5.el5.noarch",
"5Server-JBEAP-5:jbossweb-jsp-2.1-api-0:2.1.12-1.4_patch_01.ep5.el5.noarch",
"5Server-JBEAP-5:jbossweb-lib-0:2.1.12-1.4_patch_01.ep5.el5.noarch",
"5Server-JBEAP-5:jbossweb-servlet-2.5-api-0:2.1.12-1.4_patch_01.ep5.el5.noarch",
"5Server-JBEAP-5:jbossws-0:3.1.2-7.SP11.4.ep5.el5.noarch",
"5Server-JBEAP-5:jbossws-0:3.1.2-7.SP11.4.ep5.el5.src",
"5Server-JBEAP-5:jbossws-common-0:1.1.0-6.SP8_patch_01.1.ep5.el5.noarch",
"5Server-JBEAP-5:jbossws-common-0:1.1.0-6.SP8_patch_01.1.ep5.el5.src",
"5Server-JBEAP-5:jbossws-framework-0:3.1.2-6.SP10.2.ep5.el5.noarch",
"5Server-JBEAP-5:jbossws-framework-0:3.1.2-6.SP10.2.ep5.el5.src",
"5Server-JBEAP-5:jbossws-spi-0:1.1.2-5.SP7.1.ep5.el5.noarch",
"5Server-JBEAP-5:jbossws-spi-0:1.1.2-5.SP7.1.ep5.el5.src",
"5Server-JBEAP-5:jgroups-1:2.6.20-1.1.ep5.el5.noarch",
"5Server-JBEAP-5:jgroups-1:2.6.20-1.1.ep5.el5.src",
"5Server-JBEAP-5:jopr-embedded-0:1.3.4-18.SP5.8.ep5.el5.noarch",
"5Server-JBEAP-5:jopr-embedded-0:1.3.4-18.SP5.8.ep5.el5.src",
"5Server-JBEAP-5:jopr-hibernate-plugin-0:3.0.0-13.EmbJopr4.ep5.el5.noarch",
"5Server-JBEAP-5:jopr-hibernate-plugin-0:3.0.0-13.EmbJopr4.ep5.el5.src",
"5Server-JBEAP-5:jopr-jboss-as-5-plugin-0:3.0.0-12.EmbJopr4.ep5.el5.noarch",
"5Server-JBEAP-5:jopr-jboss-as-5-plugin-0:3.0.0-12.EmbJopr4.ep5.el5.src",
"5Server-JBEAP-5:jopr-jboss-cache-v3-plugin-0:3.0.0-14.EmbJopr4.ep5.el5.noarch",
"5Server-JBEAP-5:jopr-jboss-cache-v3-plugin-0:3.0.0-14.EmbJopr4.ep5.el5.src",
"5Server-JBEAP-5:mod_cluster-0:1.0.10-3.1.GA_CP02.ep5.el5.src",
"5Server-JBEAP-5:mod_cluster-demo-0:1.0.10-3.1.GA_CP02.ep5.el5.noarch",
"5Server-JBEAP-5:mod_cluster-jbossas-0:1.0.10-3.1.GA_CP02.ep5.el5.noarch",
"5Server-JBEAP-5:mod_cluster-jbossweb2-0:1.0.10-3.1.GA_CP02.ep5.el5.noarch",
"5Server-JBEAP-5:mod_cluster-native-0:1.0.10-3.1.GA_CP02.ep5.el5.i386",
"5Server-JBEAP-5:mod_cluster-native-0:1.0.10-3.1.GA_CP02.ep5.el5.src",
"5Server-JBEAP-5:mod_cluster-native-0:1.0.10-3.1.GA_CP02.ep5.el5.x86_64",
"5Server-JBEAP-5:mod_cluster-tomcat6-0:1.0.10-3.1.GA_CP02.ep5.el5.noarch",
"5Server-JBEAP-5:org-mc4j-ems-0:1.2.15.1-4.ep5.el5.noarch",
"5Server-JBEAP-5:org-mc4j-ems-0:1.2.15.1-4.ep5.el5.src",
"5Server-JBEAP-5:picketlink-federation-0:2.0.2-1.1.ep5.el5.noarch",
"5Server-JBEAP-5:picketlink-federation-0:2.0.2-1.1.ep5.el5.src",
"5Server-JBEAP-5:picketlink-federation-webapp-idp-0:2.0.2-1.1.ep5.el5.noarch",
"5Server-JBEAP-5:picketlink-federation-webapp-pdp-0:2.0.2-1.1.ep5.el5.noarch",
"5Server-JBEAP-5:picketlink-federation-webapp-sts-0:2.0.2-1.1.ep5.el5.noarch",
"5Server-JBEAP-5:resteasy-0:1.2.1-9.CP02.4.ep5.el5.noarch",
"5Server-JBEAP-5:resteasy-0:1.2.1-9.CP02.4.ep5.el5.src",
"5Server-JBEAP-5:resteasy-examples-0:1.2.1-9.CP02.4.ep5.el5.noarch",
"5Server-JBEAP-5:resteasy-javadoc-0:1.2.1-9.CP02.4.ep5.el5.noarch",
"5Server-JBEAP-5:resteasy-manual-0:1.2.1-9.CP02.4.ep5.el5.noarch",
"5Server-JBEAP-5:rh-eap-docs-0:5.1.2-6.ep5.el5.noarch",
"5Server-JBEAP-5:rh-eap-docs-0:5.1.2-6.ep5.el5.src",
"5Server-JBEAP-5:rh-eap-docs-examples-0:5.1.2-6.ep5.el5.noarch",
"5Server-JBEAP-5:rhq-0:3.0.0-20.EmbJopr4.ep5.el5.noarch",
"5Server-JBEAP-5:rhq-0:3.0.0-20.EmbJopr4.ep5.el5.src",
"5Server-JBEAP-5:rhq-ant-bundle-common-0:3.0.0-20.EmbJopr4.ep5.el5.noarch",
"5Server-JBEAP-5:rhq-common-parent-0:3.0.0-20.EmbJopr4.ep5.el5.noarch",
"5Server-JBEAP-5:rhq-core-client-api-0:3.0.0-20.EmbJopr4.ep5.el5.noarch",
"5Server-JBEAP-5:rhq-core-comm-api-0:3.0.0-20.EmbJopr4.ep5.el5.noarch",
"5Server-JBEAP-5:rhq-core-dbutils-0:3.0.0-20.EmbJopr4.ep5.el5.noarch",
"5Server-JBEAP-5:rhq-core-domain-0:3.0.0-20.EmbJopr4.ep5.el5.noarch",
"5Server-JBEAP-5:rhq-core-gui-0:3.0.0-20.EmbJopr4.ep5.el5.noarch",
"5Server-JBEAP-5:rhq-core-native-system-0:3.0.0-20.EmbJopr4.ep5.el5.noarch",
"5Server-JBEAP-5:rhq-core-parent-0:3.0.0-20.EmbJopr4.ep5.el5.noarch",
"5Server-JBEAP-5:rhq-core-plugin-api-0:3.0.0-20.EmbJopr4.ep5.el5.noarch",
"5Server-JBEAP-5:rhq-core-plugin-container-0:3.0.0-20.EmbJopr4.ep5.el5.noarch",
"5Server-JBEAP-5:rhq-core-plugindoc-0:3.0.0-20.EmbJopr4.ep5.el5.noarch",
"5Server-JBEAP-5:rhq-core-util-0:3.0.0-20.EmbJopr4.ep5.el5.noarch",
"5Server-JBEAP-5:rhq-filetemplate-bundle-common-0:3.0.0-20.EmbJopr4.ep5.el5.noarch",
"5Server-JBEAP-5:rhq-helpers-0:3.0.0-20.EmbJopr4.ep5.el5.noarch",
"5Server-JBEAP-5:rhq-jboss-as-common-0:3.0.0-20.EmbJopr4.ep5.el5.noarch",
"5Server-JBEAP-5:rhq-jmx-plugin-0:3.0.0-20.EmbJopr4.ep5.el5.noarch",
"5Server-JBEAP-5:rhq-jmx-plugin-0:3.0.0-20.EmbJopr4.ep5.el5.src",
"5Server-JBEAP-5:rhq-modules-parent-0:3.0.0-20.EmbJopr4.ep5.el5.noarch",
"5Server-JBEAP-5:rhq-parent-0:3.0.0-20.EmbJopr4.ep5.el5.noarch",
"5Server-JBEAP-5:rhq-platform-plugin-0:3.0.0-13.EmbJopr4.ep5.el5.noarch",
"5Server-JBEAP-5:rhq-platform-plugin-0:3.0.0-13.EmbJopr4.ep5.el5.src",
"5Server-JBEAP-5:rhq-plugin-validator-0:3.0.0-20.EmbJopr4.ep5.el5.noarch",
"5Server-JBEAP-5:rhq-pluginAnnotations-0:3.0.0-20.EmbJopr4.ep5.el5.noarch",
"5Server-JBEAP-5:rhq-pluginGen-0:3.0.0-20.EmbJopr4.ep5.el5.noarch",
"5Server-JBEAP-5:rhq-plugins-parent-0:3.0.0-20.EmbJopr4.ep5.el5.noarch",
"5Server-JBEAP-5:rhq-rtfilter-0:3.0.0-20.EmbJopr4.ep5.el5.noarch",
"5Server-JBEAP-5:slf4j-0:1.5.8-10_patch_01.2.ep5.el5.noarch",
"5Server-JBEAP-5:slf4j-0:1.5.8-10_patch_01.2.ep5.el5.src",
"5Server-JBEAP-5:xalan-j2-0:2.7.1-6_patch_05.1.ep5.el5.noarch",
"5Server-JBEAP-5:xalan-j2-0:2.7.1-6_patch_05.1.ep5.el5.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:1799"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"products": [
"5Server-JBEAP-5:apache-cxf-0:2.2.12-4.patch_02.1.1.ep5.el5.noarch",
"5Server-JBEAP-5:apache-cxf-0:2.2.12-4.patch_02.1.1.ep5.el5.src",
"5Server-JBEAP-5:cglib-0:2.2-5.3.ep5.el5.noarch",
"5Server-JBEAP-5:cglib-0:2.2-5.3.ep5.el5.src",
"5Server-JBEAP-5:facelets-0:1.1.15-3.B1_patch_01.2.ep5.el5.noarch",
"5Server-JBEAP-5:facelets-0:1.1.15-3.B1_patch_01.2.ep5.el5.src",
"5Server-JBEAP-5:glassfish-jaxb-0:2.1.12-10_patch_02.ep5.el5.noarch",
"5Server-JBEAP-5:glassfish-jaxb-0:2.1.12-10_patch_02.ep5.el5.src",
"5Server-JBEAP-5:glassfish-jsf-0:1.2_13-5_patch_01.3.ep5.el5.noarch",
"5Server-JBEAP-5:glassfish-jsf-0:1.2_13-5_patch_01.3.ep5.el5.src",
"5Server-JBEAP-5:jacorb-jboss-0:2.3.1-10.patch_03.4.ep5.el5.noarch",
"5Server-JBEAP-5:jacorb-jboss-0:2.3.1-10.patch_03.4.ep5.el5.src",
"5Server-JBEAP-5:jakarta-commons-logging-jboss-0:1.1-10.3_patch_02.1.ep5.el5.noarch",
"5Server-JBEAP-5:jakarta-commons-logging-jboss-0:1.1-10.3_patch_02.1.ep5.el5.src",
"5Server-JBEAP-5:jboss-aop2-0:2.1.6-2.CP03.1.1.ep5.el5.noarch",
"5Server-JBEAP-5:jboss-aop2-0:2.1.6-2.CP03.1.1.ep5.el5.src",
"5Server-JBEAP-5:jboss-cache-core-0:3.2.8-1.ep5.el5.noarch",
"5Server-JBEAP-5:jboss-cache-core-0:3.2.8-1.ep5.el5.src",
"5Server-JBEAP-5:jboss-cl-0:2.0.10-1.2.ep5.el5.noarch",
"5Server-JBEAP-5:jboss-cl-0:2.0.10-1.2.ep5.el5.src",
"5Server-JBEAP-5:jboss-cluster-ha-client-0:1.1.4-1.1.ep5.el5.noarch",
"5Server-JBEAP-5:jboss-cluster-ha-client-0:1.1.4-1.1.ep5.el5.src",
"5Server-JBEAP-5:jboss-common-core-0:2.2.18-1.1.ep5.el5.noarch",
"5Server-JBEAP-5:jboss-common-core-0:2.2.18-1.1.ep5.el5.src",
"5Server-JBEAP-5:jboss-eap5-native-0:5.1.2-1.4.ep5.el5.i386",
"5Server-JBEAP-5:jboss-eap5-native-0:5.1.2-1.4.ep5.el5.src",
"5Server-JBEAP-5:jboss-eap5-native-0:5.1.2-1.4.ep5.el5.x86_64",
"5Server-JBEAP-5:jboss-ejb3-core-0:1.3.8-0.1.ep5.el5.noarch",
"5Server-JBEAP-5:jboss-ejb3-core-0:1.3.8-0.1.ep5.el5.src",
"5Server-JBEAP-5:jboss-ejb3-proxy-clustered-0:1.0.3-2.SP1.1.ep5.el5.noarch",
"5Server-JBEAP-5:jboss-ejb3-proxy-clustered-0:1.0.3-2.SP1.1.ep5.el5.src",
"5Server-JBEAP-5:jboss-ejb3-proxy-impl-0:1.0.6-2.SP2.1.ep5.el5.noarch",
"5Server-JBEAP-5:jboss-ejb3-proxy-impl-0:1.0.6-2.SP2.1.ep5.el5.src",
"5Server-JBEAP-5:jboss-el-0:1.0_02-0.CR6.2.ep5.el5.noarch",
"5Server-JBEAP-5:jboss-el-0:1.0_02-0.CR6.2.ep5.el5.src",
"5Server-JBEAP-5:jboss-messaging-0:1.4.8-9.SP5.1.ep5.el5.noarch",
"5Server-JBEAP-5:jboss-messaging-0:1.4.8-9.SP5.1.ep5.el5.src",
"5Server-JBEAP-5:jboss-naming-0:5.0.3-3.CP01.3.1.ep5.el5.noarch",
"5Server-JBEAP-5:jboss-naming-0:5.0.3-3.CP01.3.1.ep5.el5.src",
"5Server-JBEAP-5:jboss-remoting-0:2.5.4-9.SP3.1.ep5.el5.noarch",
"5Server-JBEAP-5:jboss-remoting-0:2.5.4-9.SP3.1.ep5.el5.src",
"5Server-JBEAP-5:jboss-seam2-0:2.2.5.EAP5-5.ep5.el5.noarch",
"5Server-JBEAP-5:jboss-seam2-0:2.2.5.EAP5-5.ep5.el5.src",
"5Server-JBEAP-5:jboss-seam2-docs-0:2.2.5.EAP5-5.ep5.el5.noarch",
"5Server-JBEAP-5:jboss-seam2-examples-0:2.2.5.EAP5-5.ep5.el5.noarch",
"5Server-JBEAP-5:jboss-seam2-runtime-0:2.2.5.EAP5-5.ep5.el5.noarch",
"5Server-JBEAP-5:jboss-security-spi-1:2.0.4-6.SP8.1.ep5.el5.noarch",
"5Server-JBEAP-5:jboss-security-spi-1:2.0.4-6.SP8.1.ep5.el5.src",
"5Server-JBEAP-5:jbossas-0:5.1.2-8.ep5.el5.noarch",
"5Server-JBEAP-5:jbossas-0:5.1.2-8.ep5.el5.src",
"5Server-JBEAP-5:jbossas-client-0:5.1.2-8.ep5.el5.noarch",
"5Server-JBEAP-5:jbossas-messaging-0:5.1.2-8.ep5.el5.noarch",
"5Server-JBEAP-5:jbossas-tp-licenses-0:5.1.2-7.ep5.el5.noarch",
"5Server-JBEAP-5:jbossas-tp-licenses-0:5.1.2-7.ep5.el5.src",
"5Server-JBEAP-5:jbossas-ws-cxf-0:5.1.2-8.ep5.el5.noarch",
"5Server-JBEAP-5:jbossas-ws-cxf-0:5.1.2-8.ep5.el5.src",
"5Server-JBEAP-5:jbossas-ws-native-0:5.1.2-8.ep5.el5.noarch",
"5Server-JBEAP-5:jbosssx2-0:2.0.4-6.SP8.2.ep5.el5.noarch",
"5Server-JBEAP-5:jbosssx2-0:2.0.4-6.SP8.2.ep5.el5.src",
"5Server-JBEAP-5:jbossts-1:4.6.1-11.CP12.4.ep5.el5.noarch",
"5Server-JBEAP-5:jbossts-1:4.6.1-11.CP12.4.ep5.el5.src",
"5Server-JBEAP-5:jbossts-javadoc-1:4.6.1-11.CP12.4.ep5.el5.noarch",
"5Server-JBEAP-5:jbossweb-0:2.1.12-1.4_patch_01.ep5.el5.noarch",
"5Server-JBEAP-5:jbossweb-0:2.1.12-1.4_patch_01.ep5.el5.src",
"5Server-JBEAP-5:jbossweb-el-1.0-api-0:2.1.12-1.4_patch_01.ep5.el5.noarch",
"5Server-JBEAP-5:jbossweb-jsp-2.1-api-0:2.1.12-1.4_patch_01.ep5.el5.noarch",
"5Server-JBEAP-5:jbossweb-lib-0:2.1.12-1.4_patch_01.ep5.el5.noarch",
"5Server-JBEAP-5:jbossweb-servlet-2.5-api-0:2.1.12-1.4_patch_01.ep5.el5.noarch",
"5Server-JBEAP-5:jbossws-0:3.1.2-7.SP11.4.ep5.el5.noarch",
"5Server-JBEAP-5:jbossws-0:3.1.2-7.SP11.4.ep5.el5.src",
"5Server-JBEAP-5:jbossws-common-0:1.1.0-6.SP8_patch_01.1.ep5.el5.noarch",
"5Server-JBEAP-5:jbossws-common-0:1.1.0-6.SP8_patch_01.1.ep5.el5.src",
"5Server-JBEAP-5:jbossws-framework-0:3.1.2-6.SP10.2.ep5.el5.noarch",
"5Server-JBEAP-5:jbossws-framework-0:3.1.2-6.SP10.2.ep5.el5.src",
"5Server-JBEAP-5:jbossws-spi-0:1.1.2-5.SP7.1.ep5.el5.noarch",
"5Server-JBEAP-5:jbossws-spi-0:1.1.2-5.SP7.1.ep5.el5.src",
"5Server-JBEAP-5:jgroups-1:2.6.20-1.1.ep5.el5.noarch",
"5Server-JBEAP-5:jgroups-1:2.6.20-1.1.ep5.el5.src",
"5Server-JBEAP-5:jopr-embedded-0:1.3.4-18.SP5.8.ep5.el5.noarch",
"5Server-JBEAP-5:jopr-embedded-0:1.3.4-18.SP5.8.ep5.el5.src",
"5Server-JBEAP-5:jopr-hibernate-plugin-0:3.0.0-13.EmbJopr4.ep5.el5.noarch",
"5Server-JBEAP-5:jopr-hibernate-plugin-0:3.0.0-13.EmbJopr4.ep5.el5.src",
"5Server-JBEAP-5:jopr-jboss-as-5-plugin-0:3.0.0-12.EmbJopr4.ep5.el5.noarch",
"5Server-JBEAP-5:jopr-jboss-as-5-plugin-0:3.0.0-12.EmbJopr4.ep5.el5.src",
"5Server-JBEAP-5:jopr-jboss-cache-v3-plugin-0:3.0.0-14.EmbJopr4.ep5.el5.noarch",
"5Server-JBEAP-5:jopr-jboss-cache-v3-plugin-0:3.0.0-14.EmbJopr4.ep5.el5.src",
"5Server-JBEAP-5:mod_cluster-0:1.0.10-3.1.GA_CP02.ep5.el5.src",
"5Server-JBEAP-5:mod_cluster-demo-0:1.0.10-3.1.GA_CP02.ep5.el5.noarch",
"5Server-JBEAP-5:mod_cluster-jbossas-0:1.0.10-3.1.GA_CP02.ep5.el5.noarch",
"5Server-JBEAP-5:mod_cluster-jbossweb2-0:1.0.10-3.1.GA_CP02.ep5.el5.noarch",
"5Server-JBEAP-5:mod_cluster-native-0:1.0.10-3.1.GA_CP02.ep5.el5.i386",
"5Server-JBEAP-5:mod_cluster-native-0:1.0.10-3.1.GA_CP02.ep5.el5.src",
"5Server-JBEAP-5:mod_cluster-native-0:1.0.10-3.1.GA_CP02.ep5.el5.x86_64",
"5Server-JBEAP-5:mod_cluster-tomcat6-0:1.0.10-3.1.GA_CP02.ep5.el5.noarch",
"5Server-JBEAP-5:org-mc4j-ems-0:1.2.15.1-4.ep5.el5.noarch",
"5Server-JBEAP-5:org-mc4j-ems-0:1.2.15.1-4.ep5.el5.src",
"5Server-JBEAP-5:picketlink-federation-0:2.0.2-1.1.ep5.el5.noarch",
"5Server-JBEAP-5:picketlink-federation-0:2.0.2-1.1.ep5.el5.src",
"5Server-JBEAP-5:picketlink-federation-webapp-idp-0:2.0.2-1.1.ep5.el5.noarch",
"5Server-JBEAP-5:picketlink-federation-webapp-pdp-0:2.0.2-1.1.ep5.el5.noarch",
"5Server-JBEAP-5:picketlink-federation-webapp-sts-0:2.0.2-1.1.ep5.el5.noarch",
"5Server-JBEAP-5:resteasy-0:1.2.1-9.CP02.4.ep5.el5.noarch",
"5Server-JBEAP-5:resteasy-0:1.2.1-9.CP02.4.ep5.el5.src",
"5Server-JBEAP-5:resteasy-examples-0:1.2.1-9.CP02.4.ep5.el5.noarch",
"5Server-JBEAP-5:resteasy-javadoc-0:1.2.1-9.CP02.4.ep5.el5.noarch",
"5Server-JBEAP-5:resteasy-manual-0:1.2.1-9.CP02.4.ep5.el5.noarch",
"5Server-JBEAP-5:rh-eap-docs-0:5.1.2-6.ep5.el5.noarch",
"5Server-JBEAP-5:rh-eap-docs-0:5.1.2-6.ep5.el5.src",
"5Server-JBEAP-5:rh-eap-docs-examples-0:5.1.2-6.ep5.el5.noarch",
"5Server-JBEAP-5:rhq-0:3.0.0-20.EmbJopr4.ep5.el5.noarch",
"5Server-JBEAP-5:rhq-0:3.0.0-20.EmbJopr4.ep5.el5.src",
"5Server-JBEAP-5:rhq-ant-bundle-common-0:3.0.0-20.EmbJopr4.ep5.el5.noarch",
"5Server-JBEAP-5:rhq-common-parent-0:3.0.0-20.EmbJopr4.ep5.el5.noarch",
"5Server-JBEAP-5:rhq-core-client-api-0:3.0.0-20.EmbJopr4.ep5.el5.noarch",
"5Server-JBEAP-5:rhq-core-comm-api-0:3.0.0-20.EmbJopr4.ep5.el5.noarch",
"5Server-JBEAP-5:rhq-core-dbutils-0:3.0.0-20.EmbJopr4.ep5.el5.noarch",
"5Server-JBEAP-5:rhq-core-domain-0:3.0.0-20.EmbJopr4.ep5.el5.noarch",
"5Server-JBEAP-5:rhq-core-gui-0:3.0.0-20.EmbJopr4.ep5.el5.noarch",
"5Server-JBEAP-5:rhq-core-native-system-0:3.0.0-20.EmbJopr4.ep5.el5.noarch",
"5Server-JBEAP-5:rhq-core-parent-0:3.0.0-20.EmbJopr4.ep5.el5.noarch",
"5Server-JBEAP-5:rhq-core-plugin-api-0:3.0.0-20.EmbJopr4.ep5.el5.noarch",
"5Server-JBEAP-5:rhq-core-plugin-container-0:3.0.0-20.EmbJopr4.ep5.el5.noarch",
"5Server-JBEAP-5:rhq-core-plugindoc-0:3.0.0-20.EmbJopr4.ep5.el5.noarch",
"5Server-JBEAP-5:rhq-core-util-0:3.0.0-20.EmbJopr4.ep5.el5.noarch",
"5Server-JBEAP-5:rhq-filetemplate-bundle-common-0:3.0.0-20.EmbJopr4.ep5.el5.noarch",
"5Server-JBEAP-5:rhq-helpers-0:3.0.0-20.EmbJopr4.ep5.el5.noarch",
"5Server-JBEAP-5:rhq-jboss-as-common-0:3.0.0-20.EmbJopr4.ep5.el5.noarch",
"5Server-JBEAP-5:rhq-jmx-plugin-0:3.0.0-20.EmbJopr4.ep5.el5.noarch",
"5Server-JBEAP-5:rhq-jmx-plugin-0:3.0.0-20.EmbJopr4.ep5.el5.src",
"5Server-JBEAP-5:rhq-modules-parent-0:3.0.0-20.EmbJopr4.ep5.el5.noarch",
"5Server-JBEAP-5:rhq-parent-0:3.0.0-20.EmbJopr4.ep5.el5.noarch",
"5Server-JBEAP-5:rhq-platform-plugin-0:3.0.0-13.EmbJopr4.ep5.el5.noarch",
"5Server-JBEAP-5:rhq-platform-plugin-0:3.0.0-13.EmbJopr4.ep5.el5.src",
"5Server-JBEAP-5:rhq-plugin-validator-0:3.0.0-20.EmbJopr4.ep5.el5.noarch",
"5Server-JBEAP-5:rhq-pluginAnnotations-0:3.0.0-20.EmbJopr4.ep5.el5.noarch",
"5Server-JBEAP-5:rhq-pluginGen-0:3.0.0-20.EmbJopr4.ep5.el5.noarch",
"5Server-JBEAP-5:rhq-plugins-parent-0:3.0.0-20.EmbJopr4.ep5.el5.noarch",
"5Server-JBEAP-5:rhq-rtfilter-0:3.0.0-20.EmbJopr4.ep5.el5.noarch",
"5Server-JBEAP-5:slf4j-0:1.5.8-10_patch_01.2.ep5.el5.noarch",
"5Server-JBEAP-5:slf4j-0:1.5.8-10_patch_01.2.ep5.el5.src",
"5Server-JBEAP-5:xalan-j2-0:2.7.1-6_patch_05.1.ep5.el5.noarch",
"5Server-JBEAP-5:xalan-j2-0:2.7.1-6_patch_05.1.ep5.el5.src"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "extension): MITM due to improper validation of AX attribute signatures"
}
]
}
Sightings
| Author | Source | Type | Date | Other |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.