id
stringlengths
13
15
title
stringlengths
29
176
description
stringlengths
8
32.1k
cpes
listlengths
0
20
cvss_v4_0
null
cvss_v3_1
float64
0
10
cvss_v3_0
float64
0
10
cvss_v2_0
null
RHSA-2024:1070
Red Hat Security Advisory: postgresql:12 security update
postgresql: non-owner 'REFRESH MATERIALIZED VIEW CONCURRENTLY' executes arbitrary SQL
[ "cpe:/a:redhat:rhel_eus:8.6::appstream" ]
null
8
null
null
RHSA-2014:1976
Red Hat Security Advisory: rpm security update
rpm: race condition during the installation process rpm: integer overflow and stack overflow in CPIO header parsing
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
null
null
RHSA-2020:3841
Red Hat Security Advisory: OpenShift Container Platform 4.5.13 jenkins security update
jetty: double release of resource can lead to information disclosure jenkins: user-specified tooltip values leads to stored cross-site scripting jenkins: stored XSS vulnerability in project naming strategy jenkins: stored XSS vulnerability in 'trigger builds remotely'
[ "cpe:/a:redhat:openshift:4.5::el7" ]
null
5.4
null
null
RHSA-2022:4655
Red Hat Security Advisory: kpatch-patch security update
kernel: cgroups v1 release_agent feature may allow privilege escalation
[ "cpe:/o:redhat:enterprise_linux:7::server" ]
null
7
null
null
RHEA-2024:0555
Red Hat Enhancement Advisory: Release of AWS Load Balancer Operator 1.1.z on OperatorHub
HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack)
[ "cpe:/a:redhat:aws_lb_optr:1.1::el8" ]
null
7.5
null
null
RHSA-2011:0845
Red Hat Security Advisory: bind security update
bind: Large RRSIG RRsets and Negative Caching can crash named
[ "cpe:/o:redhat:enterprise_linux:5::server", "cpe:/o:redhat:enterprise_linux:6::server" ]
null
null
null
null
RHSA-2011:1110
Red Hat Security Advisory: foomatic security update
foomatic: Improper sanitization of command line option in foomatic-rip (foomatic.c)
[ "cpe:/o:redhat:enterprise_linux:6::server" ]
null
null
null
null
RHSA-2024:6187
Red Hat Security Advisory: gvisor-tap-vsock security update
golang: crypto/x509: Verify panics on certificates with an unknown public key algorithm
[ "cpe:/a:redhat:enterprise_linux:9::appstream" ]
null
5.9
null
null
RHSA-2006:0567
Red Hat Security Advisory: php security update
security flaw security flaw security flaw
[ "cpe:/o:redhat:enterprise_linux:2.1::as", "cpe:/o:redhat:enterprise_linux:2.1::aw", "cpe:/o:redhat:enterprise_linux:2.1::es", "cpe:/o:redhat:enterprise_linux:2.1::ws" ]
null
null
null
null
RHSA-2022:6345
Red Hat Security Advisory: Multicluster Engine for Kubernetes 2.1 security updates and bug fixes
golang: net/http: improper sanitization of Transfer-Encoding header golang: go/parser: stack exhaustion in all Parse* functions golang: encoding/xml: stack exhaustion in Decoder.Skip golang: crypto/tls: session tickets lack random ticket_age_add golang: io/fs: stack exhaustion in Glob golang: compress/gzip: stack exhaustion in Reader.Read golang: path/filepath: stack exhaustion in Glob golang: encoding/xml: stack exhaustion in Unmarshal golang: encoding/gob: stack exhaustion in Decoder.Decode moment: inefficient parsing algorithm resulting in DoS golang: net/http/httputil: NewSingleHostReverseProxy - omit X-Forwarded-For not working
[ "cpe:/a:redhat:multicluster_engine:2.1::el8" ]
null
6.5
null
null
RHSA-2014:1162
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 6.3.0 security update
CXF: SSL hostname verification bypass, incomplete CVE-2012-5783 fix CXF: SSL hostname verification bypass, incomplete CVE-2012-6153 fix
[ "cpe:/a:redhat:jboss_enterprise_application_platform:6::el5", "cpe:/a:redhat:jboss_enterprise_application_platform:6::el6", "cpe:/a:redhat:jboss_enterprise_application_platform:6::el7" ]
null
null
4.8
null
RHSA-2021:3471
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.3.9 security update
undertow: HTTP2SourceChannel fails to write final frame under some circumstances may lead to DoS wildfly-core: Invalid Sensitivity Classification of Vault Expression undertow: buffer leak on incoming websocket PONG message may lead to DoS jakarta-el: ELParserTokenManager enables invalid EL expressions to be evaluate apache-commons-io: Limited path traversal in Apache Commons IO 2.2 to 2.6
[ "cpe:/a:redhat:jboss_enterprise_application_platform:7.3" ]
null
4.8
null
null
RHSA-2024:4934
Red Hat Security Advisory: git-lfs security update
golang: net/http, x/net/http2: unlimited number of CONTINUATION frames causes DoS
[ "cpe:/a:redhat:rhel_eus:9.2::appstream" ]
null
7.5
null
null
RHSA-2002:176
Red Hat Security Advisory: : Updated mailman packages close cross-site scripting vulnerability
security flaw
[ "cpe:/o:redhat:linux:7.2", "cpe:/o:redhat:linux:7.3" ]
null
null
null
null
RHSA-2022:2234
Red Hat Security Advisory: subversion:1.10 security update
subversion: Subversion's mod_dav_svn is vulnerable to memory corruption
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
7.5
null
null
RHSA-2024:7001
Red Hat Security Advisory: kernel-rt security update
kernel: kyber: fix out of bounds access when preempted kernel: Input: elantech - fix stack out of bound access in elantech_change_report_id() kernel: asix: fix uninit-value in asix_mdio_read() kernel: driver core: auxiliary bus: Fix memory leak when driver_register() fail kernel: ACPI: fix NULL pointer dereference kernel: watchdog: Fix possible use-after-free by calling del_timer_sync() kernel: fbmem: Do not delete the mode that is still in use kernel: virtio-net: Add validation for used length kernel: tty: Fix out-of-bound vmalloc access in imageblit kernel: hwmon: (w83793) Fix NULL pointer dereference by removing unnecessary structure field kernel: hwmon: (w83792d) Fix NULL pointer dereference by removing unnecessary structure field kernel: hwmon: (w83791d) Fix NULL pointer dereference by removing unnecessary structure field kernel: hwmon: (mlxreg-fan) Return non-zero value when fan current state is enforced from sysfs kernel: block: don't call rq_qos_ops->done_bio if the bio isn't tracked kernel: lib/generic-radix-tree.c: Don't overflow in peek() kernel: mlxsw: thermal: Fix out-of-bounds memory accesses kernel: ptp: Fix possible memory leak in ptp_clock_register() kernel: mm, slub: fix potential memoryleak in kmem_cache_open() kernel: nvmem: Fix shift-out-of-bound (UBSAN) with byte size cells kernel: serial: core: fix transmit-buffer reset and memleak kernel: mlxsw: spectrum: Protect driver from buggy firmware kernel: USB: core: Make do_proc_control() and do_proc_bulk() killable kernel: firmware: arm_scpi: Fix string overflow in SCPI genpd driver kernel: event code falling outside of a bitmap in input_set_capability() leads to panic kernel: phylib: fix potential use-after-free kernel: USB: core: Fix hang in usb_kill_urb by adding memory barriers kernel: vt_ioctl: fix array_index_nospec in vt_setactivate kernel: Input: aiptek - properly check endpoint type kernel: HID: hid-thrustmaster: fix OOB read in thrustmaster_interrupts kernel: netfilter: nf_tables: out-of-bounds access in nf_tables_newtable() kernel: null-ptr-deref in alloc_workqueue kernel: perf/x86/lbr: Filter vsyscall addresses kernel: HID: logitech-hidpp: Fix kernel crash on receiver USB disconnect kernel: net: fix possible store tearing in neigh_periodic_work() kernel: ACPI: extlog: fix NULL pointer dereference check kernel: ACPI: LPIT: Avoid u32 multiplication overflow kernel: drm/amdgpu: Fix a null pointer access when the smc_rreg pointer is NULL kernel: Input: synaptics-rmi4 - fix use after free in rmi_unregister_function() kernel: use-after-free in cec_queue_msg_fh kernel: mlxsw: spectrum_acl_tcam: Fix NULL pointer dereference in error path kernel: tracing: Ensure visibility when inserting an element into tracing_map kernel: null pointer when load rlc firmware kernel: tunnels: fix out of bounds access when building IPv6 PMTU error kernel: HID: i2c-hid-of: fix NULL-deref on failed power up kernel: mm/writeback: fix possible divide-by-zero in wb_dirty_limits(), again kernel: nvmet-fc: avoid deadlock on delete association path kernel: net: ice: Fix potential NULL pointer dereference in ice_bridge_setlink() kernel: dm: call the resume method on internal suspend kernel: ACPI: processor_idle: Fix memory leak in acpi_processor_power_exit() kernel: af_unix: Fix garbage collector racing against connect() kernel: drm/i915/vma: Fix UAF on destroy against retire race kernel: tun: limit printing rate when illegal packet received by tun dev kernel: drm/amdgpu: Fix potential out-of-bounds access in 'amdgpu_discovery_reg_base_init()' kernel: PCI/PM: Drain runtime-idle callbacks before driver removal kernel: x86/mm/pat: fix VM_PAT handling in COW mappings kernel: udp: do not accept non-tunnel GSO skbs landing in a tunnel kernel: VMCI: Fix memcpy() run-time warning in dg_dispatch_as_host() kernel: dmaengine: idxd: Fix oops during rmmod on single-CPU platforms kernel: net: fix out-of-bounds access in ops_init kernel: ipv6: prevent NULL dereference in ip6_output() kernel: ipv6: fib6_rules: avoid possible NULL dereference in fib6_rule_action() kernel: scsi: mpi3mr: Avoid memcpy field-spanning write WARNING kernel: nfs: Handle error of rpc_proc_register() in nfs_net_init(). kernel: KVM: arm64: vgic-v2: Check for non-NULL vCPU in vgic_v2_parse_attr() kernel: tcp: Fix shift-out-of-bounds in dctcp_update_alpha(). kernel: net: openvswitch: fix overwriting ct original tuple for ICMPv6 kernel: scsi: qedf: Ensure the copied buf is NUL terminated kernel: gfs2: Fix potential glock use-after-free on unmount kernel: drm/amdgpu/mes: fix use-after-free issue kernel: usb-storage: alauda: Check whether the media is initialized kernel: drm/amdgpu: add error handle to avoid out-of-bounds kernel: vmci: prevent speculation leaks by sanitizing event in event_deliver() kernel: drivers: core: synchronize really_probe() and dev_uevent() kernel: liquidio: Adjust a NULL pointer handling path in lio_vf_rep_copy_packet kernel: scsi: mpt3sas: Avoid test/set_bit() operating in non-allocated memory kernel: USB: class: cdc-wdm: Fix CPU lockup caused by excessive log messages kernel: wifi: cfg80211: Lock wiphy in cfg80211_get_station kernel: wifi: mac80211: Fix deadlock in ieee80211_sta_ps_deliver_wakeup() kernel: wifi: iwlwifi: mvm: check n_ssids before accessing the ssids kernel: mptcp: ensure snd_una is properly initialized on connect kernel: wifi: iwlwifi: mvm: don't read past the mfuart notifcation kernel: net: do not leave a dangling sk pointer, when socket creation fails kernel: netns: Make get_net_ns() handle zero refcount net kernel: xfrm6: check ip6_dst_idev() return value in xfrm6_get_saddr() kernel: ipv6: prevent possible NULL dereference in rt6_probe() kernel: ext4: do not create EA inode under buffer lock kernel: wifi: mt76: mt7921s: fix potential hung tasks during chip recovery kernel: scsi: qedi: Fix crash while reading debugfs attribute kernel: drm/radeon: fix UBSAN warning in kv_dpm.c kernel: KVM: arm64: Disassociate vcpus from redistributor region on teardown kernel: net/sched: act_api: fix possible infinite loop in tcf_idr_check_alloc() kernel: cpufreq: amd-pstate: fix memory leak on CPU EPP exit kernel: ext4: fix uninitialized ratelimit_state->lock access in __ext4_fill_super() kernel: netpoll: Fix race condition in netpoll_owner_active kernel: tcp: avoid too many retransmit packets kernel: drm/amdgpu: change vm->task_info handling kernel: filelock: Remove locks reliably when fcntl/close race is detected kernel: xfs: don't walk off the end of a directory data block kernel: xfs: add bounds checking to xlog_recover_process_data kernel: USB: core: Fix duplicate endpoint bug by clearing reserved bits in the descriptor kernel: firmware: cs_dsp: Prevent buffer overrun when processing V2 alg headers kernel: firmware: cs_dsp: Fix overflow checking of wmfw header kernel: net/sched: Fix UAF when resolving a clash kernel: udp: Set SOCK_RCU_FREE earlier in udp_lib_get_port() kernel: ppp: reject claimed-as-LCP but actually malformed packets kernel: mm: prevent derefencing NULL ptr in pfn_section_valid() kernel: firmware: cs_dsp: Use strnlen() on name fields in V1 wmfw files kernel: drm/radeon: check bo_va->bo is non-NULL before using it kernel: wifi: mac80211: Avoid address calculations via out of bounds array indexing kernel: NFSv4: Fix memory leak in nfs4_set_security_label kernel: virtio-net: tap: mlx5_core short frame denial of service kernel: virtio-net: tun: mlx5_core short frame denial of service kernel: usb: atm: cxacru: fix endpoint checking in cxacru_bind() kernel: ftruncate: pass a signed offset kernel: pinctrl: fix deadlock in create_pinctrl() when handling -EPROBE_DEFER kernel: x86: stop playing stack games in profile_pc() kernel: wifi: cfg80211: restrict NL80211_ATTR_TXQ_QUANTUM values kernel: scsi: qedf: Make qedf_execute_tmf() non-preemptible kernel: mm: avoid overflows in dirty throttling logic kernel: nvmet: fix a possible leak when destroy a ctrl during qp establishment kernel: tcp_metrics: validate source addr length kernel: usb: xhci: prevent potential failure in handle_tx_event() for Transfer events without TRB kernel: drm/amdgpu: Using uninitialized value *size when calling amdgpu_vce_cs_reloc kernel: firmware: cs_dsp: Validate payload length before processing block kernel: firmware: cs_dsp: Return error if block header overflows file kernel: x86/bhi: Avoid warning in #DB handler due to BHI mitigation kernel: net, sunrpc: Remap EPERM in case of connection failure in xs_tcp_setup_socket kernel: ipvs: properly dereference pe in ip_vs_add_service kernel: devres: Fix memory leakage caused by driver API devm_free_percpu()
[ "cpe:/a:redhat:enterprise_linux:8::nfv", "cpe:/a:redhat:enterprise_linux:8::realtime" ]
null
5.5
null
null
RHSA-2024:4719
Red Hat Security Advisory: httpd:2.4 security update
httpd: Substitution encoding issue in mod_rewrite httpd: Improper escaping of output in mod_rewrite httpd: NULL pointer dereference in mod_proxy
[ "cpe:/a:redhat:rhel_eus:8.8::appstream" ]
null
7.5
null
null
RHSA-2022:5753
Red Hat Security Advisory: OpenJDK 8u342 Windows builds release and security update
OpenJDK: class compilation issue (Hotspot, 8281859) OpenJDK: improper restriction of MethodHandle.invokeBasic() (Hotspot, 8281866) OpenJDK: integer truncation issue in Xalan-J (JAXP, 8285407)
[ "cpe:/a:redhat:openjdk:1.8::windows" ]
null
7.5
null
null
RHSA-2007:0965
Red Hat Security Advisory: ruby security update
Net: HTTP insufficient verification of SSL certificate net:: * modules
[ "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::client_workstation", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
RHSA-2024:0722
Red Hat Security Advisory: Red Hat build of Quarkus 3.2.10 release and security update
parsson: Denial of Service due to large number parsing
[ "cpe:/a:redhat:quarkus:3.2::el8" ]
null
7.5
null
null
RHSA-2024:7202
Red Hat Security Advisory: grafana security update
encoding/gob: golang: Calling Decoder.Decode on a message which contains deeply nested structures can cause a panic due to stack exhaustion
[ "cpe:/a:redhat:rhel_eus:9.2::appstream" ]
null
7.5
null
null
RHSA-2023:5103
Red Hat Security Advisory: OpenShift Virtualization 4.11.6 security and bug fix update
openshift: OCP & FIPS mode
[ "cpe:/a:redhat:container_native_virtualization:4.11::el8" ]
null
6.5
null
null
RHSA-2023:1407
Red Hat Security Advisory: thunderbird security update
Mozilla: Incorrect code generation during JIT compilation Mozilla: Potential out-of-bounds when accessing throttled streams Mozilla: Invalid downcast in Worklets Mozilla: URL being dragged from a removed cross-origin iframe into the same tab triggered navigation Mozilla: Memory safety bugs fixed in Firefox 111 and Firefox ESR 102.9
[ "cpe:/a:redhat:enterprise_linux:9::appstream" ]
null
8.8
null
null
RHSA-2023:6894
Red Hat Security Advisory: OpenShift Container Platform 4.12.44 bug fix and security update
golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487)
[ "cpe:/a:redhat:openshift:4.12::el8", "cpe:/a:redhat:openshift:4.12::el9" ]
null
7.5
null
null
RHSA-2024:5393
Red Hat Security Advisory: thunderbird security update
mozilla: Fullscreen notification dialog can be obscured by document content mozilla: Out of bounds memory access in graphics shared memory handling mozilla: Type confusion in WebAssembly mozilla: Incomplete WebAssembly exception handing mozilla: Out of bounds read in editor component mozilla: Missing permission check when creating a StreamFilter mozilla: Uninitialized memory used by WebGL mozilla: Use-after-free in JavaScript garbage collection mozilla: Use-after-free in IndexedDB mozilla: Document content could partially obscure security prompts
[ "cpe:/a:redhat:rhel_aus:8.2::appstream" ]
null
6.1
null
null
RHSA-2024:5291
Red Hat Security Advisory: grafana security update
golang: net: malformed DNS message can cause infinite loop golang: archive/zip: Incorrect handling of certain ZIP files golang: net/netip: Unexpected behavior from Is methods for IPv4-mapped IPv6 addresses
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
6.7
null
null
RHSA-2019:3201
Red Hat Security Advisory: Ansible security update
ansible: secrets disclosed on logs when no_log enabled ansible: Incomplete fix for CVE-2019-10206 ansible: sub parameters marked as no_log are not masked in certain failure scenarios
[ "cpe:/a:redhat:ansible_engine:2.6::el7" ]
null
5
6.4
null
RHBA-2017:1929
Red Hat Bug Fix Advisory: openssl bug fix and enhancement update
openssl: ECDSA P-256 timing attack key recovery
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
5.5
null
RHSA-2022:5757
Red Hat Security Advisory: OpenJDK 17.0.4 security update for Windows Builds
OpenJDK: class compilation issue (Hotspot, 8281859) OpenJDK: improper restriction of MethodHandle.invokeBasic() (Hotspot, 8281866) OpenJDK: random exponentials issue (Libraries, 8283875) OpenJDK: integer truncation issue in Xalan-J (JAXP, 8285407)
[ "cpe:/a:redhat:openjdk:17::windows" ]
null
7.5
null
null
RHSA-2019:1205
Red Hat Security Advisory: rhvm-setup-plugins security update
hardware: Microarchitectural Store Buffer Data Sampling (MSBDS) hardware: Micro-architectural Load Port Data Sampling - Information Leak (MLPDS) hardware: Microarchitectural Fill Buffer Data Sampling (MFBDS) hardware: Microarchitectural Data Sampling Uncacheable Memory (MDSUM)
[ "cpe:/a:redhat:rhev_manager:4.3" ]
null
null
3.8
null
RHSA-2022:0548
Red Hat Security Advisory: ruby:2.5 security update
rubygem-bundler: Dependencies of gems with explicit source may be installed from a different source
[ "cpe:/a:redhat:rhel_e4s:8.1::appstream" ]
null
8.8
null
null
RHSA-2024:0561
Red Hat Security Advisory: linux-firmware security update
amd: Return Address Predictor vulnerability leading to information disclosure hw: amd: Cross-Process Information Leak
[ "cpe:/o:redhat:rhel_aus:8.4::baseos", "cpe:/o:redhat:rhel_e4s:8.4::baseos", "cpe:/o:redhat:rhel_tus:8.4::baseos" ]
null
6.5
null
null
RHSA-2016:0176
Red Hat Security Advisory: glibc security and bug fix update
glibc: calloc may return non-zero memory glibc: getaddrinfo stack-based buffer overflow
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
null
null
RHSA-2023:7860
Red Hat Security Advisory: Red Hat build of Keycloak 22.0.7 enhancement and security update
keycloak: reflected XSS via wildcard in OIDC redirect_uri keycloak: redirect_uri validation bypass
[ "cpe:/a:redhat:build_keycloak:22" ]
null
7.1
null
null
RHSA-2005:137
Red Hat Security Advisory: mailman security update
security flaw
[ "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws" ]
null
null
null
null
RHSA-2012:1080
Red Hat Security Advisory: java-1.4.2-ibm-sap security update
OpenJDK: JavaSound incorrect bounds check (Sound, 7088367) JDK: unspecified vulnerability fixed in 6u31 and 7u3 (2D) OpenJDK: KeyboardFocusManager focus stealing (AWT, 7110683) OpenJDK: unrestricted use of TimeZone.setDefault() (i18n, 7110687) OpenJDK: incomplete info in the deserialization exception (Serialization, 7110700) OpenJDK: mutable repository identifiers (CORBA, 7110704)
[ "cpe:/a:redhat:rhel_extras_sap:5" ]
null
null
null
null
RHSA-2015:0042
Red Hat Security Advisory: cloud-init security, bug fix, and enhancement update
python: ssl.match_hostname() DoS via certificates with specially crafted hostname wildcard patterns
[ "cpe:/a:redhat:rhel_common:6::el6" ]
null
null
null
null
RHSA-2020:5473
Red Hat Security Advisory: kernel security and bug fix update
kernel: information exposure in drivers/char/random.c and kernel/time/timer.c
[ "cpe:/a:redhat:enterprise_linux:8::crb", "cpe:/o:redhat:enterprise_linux:8::baseos" ]
null
3.7
null
null
RHSA-2017:0183
Red Hat Security Advisory: squid34 security update
squid: Information disclosure in HTTP request processing
[ "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
5.3
null
RHSA-2021:2743
Red Hat Security Advisory: firefox security update
Mozilla: Use-after-free in accessibility features of a document Mozilla: Memory safety bugs fixed in Firefox 90 and Firefox ESR 78.12 chromium-browser: Out of bounds write in ANGLE
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
8.8
null
null
RHBA-2020:1494
Red Hat Bug Fix Advisory: Satellite 6.6.3 Async Bug Fix Update
jackson-databind: polymorphic typing issue allows attacker to read arbitrary local files on the server. jackson-databind: lacks certain net.sf.ehcache blocking jackson-databind: Lacks certain xbean-reflect/JNDI blocking jackson-databind: Serialization gadgets in shaded-hikari-config jackson-databind: Serialization gadgets in ibatis-sqlmap jackson-databind: Serialization gadgets in anteros-core jackson-databind: Serialization gadgets in org.aoju.bus.proxy.provider.*.RmiProvider jackson-databind: Serialization gadgets in javax.swing.JEditorPane jackson-databind: Serialization gadgets in org.springframework:spring-aop jackson-databind: serialization in oadd.org.apache.xalan.lib.sql.JNDIConnectionPool jackson-databind: serialization in weblogic/oracle-aqjms jackson-databind: serialization in com.sun.org.apache.xalan.internal.lib.sql.JNDIConnectionPool jackson-databind: serialization in org.jsecurity.realm.jndi.JndiRealmFactory
[ "cpe:/a:redhat:satellite:6.6::el7", "cpe:/a:redhat:satellite_capsule:6.6::el7" ]
null
8.1
0
null
RHSA-2019:2541
Red Hat Security Advisory: Red Hat Ceph Storage 3.3 security, bug fix, and enhancement update
ceph: authenticated user with read only permissions can steal dm-crypt / LUKS key ceph: ListBucket max-keys has no defined limit in the RGW codebase ceph: debug logging for v4 auth does not sanitize encryption keys
[ "cpe:/a:redhat:ceph_storage:3::ubuntu16.04" ]
null
null
5.5
null
RHSA-2021:2479
Red Hat Security Advisory: Red Hat OpenShift Container Storage 4.6.5 security and bug fix update
NooBaa: noobaa-operator leaking RPC AuthToken into log files
[ "cpe:/a:redhat:openshift_container_storage:4.6::el8" ]
null
8.8
null
null
RHSA-2006:0743
Red Hat Security Advisory: jbossas security update
security flaw
[ "cpe:/a:redhat:rhel_application_stack:1" ]
null
null
null
null
RHSA-2019:4074
Red Hat Security Advisory: OpenShift Container Platform 4.2 runc security update
runc: AppArmor/SELinux bypass with malicious image that specifies a volume at /proc
[ "cpe:/a:redhat:openshift:4.2::el8" ]
null
null
6.5
null
RHSA-2024:0565
Red Hat Security Advisory: thunderbird security update
Mozilla: Out of bounds write in ANGLE Mozilla: Failure to update user input timestamp Mozilla: Crash when listing printers on Linux Mozilla: Bypass of Content Security Policy when directive unsafe-inline was set Mozilla: Phishing site popup could show local origin in address bar Mozilla: Potential permissions request bypass via clickjacking Mozilla: Privilege escalation through devtools Mozilla: HSTS policy on subdomain could bypass policy of upper domain Mozilla: Memory safety bugs fixed in Firefox 122, Firefox ESR 115.7, and Thunderbird 115.7
[ "cpe:/a:redhat:rhel_aus:8.4::appstream", "cpe:/a:redhat:rhel_e4s:8.4::appstream", "cpe:/a:redhat:rhel_tus:8.4::appstream" ]
null
8.8
null
null
RHSA-2024:0255
Red Hat Security Advisory: .NET 6.0 security, bug fix, and enhancement update
dotnet: Information Disclosure: MD.SqlClient(MDS) & System.data.SQLClient (SDS) dotnet: X509 Certificates - Validation Bypass across Azure dotnet: .NET Denial of Service Vulnerability
[ "cpe:/a:redhat:rhel_dotnet:6.0::el7" ]
null
6.8
null
null
RHSA-2025:0758
Red Hat Security Advisory: git-lfs security update
git-lfs: Git LFS permits exfiltration of credentials via crafted HTTP URLs
[ "cpe:/a:redhat:rhel_e4s:9.0::appstream" ]
null
8.1
null
null
RHSA-2023:1785
Red Hat Security Advisory: firefox security update
Mozilla: Memory Corruption in Safe Browsing Code Mozilla: libwebp: Double-free in libwebp Mozilla: Fullscreen notification obscured Mozilla: Potential Memory Corruption following Garbage Collector compaction Mozilla: Invalid free from JavaScript code Mozilla: Content-Disposition filename truncation leads to Reflected File Download Mozilla: Files with malicious extensions could have been downloaded unsafely on Linux Mozilla: Incorrect optimization result on ARM64 Mozilla: Memory safety bugs fixed in Firefox 112 and Firefox ESR 102.10
[ "cpe:/a:redhat:rhel_eus:9.0::appstream" ]
null
8.8
null
null
RHSA-2024:4581
Red Hat Security Advisory: podman security update
golang-fips/openssl: Memory leaks in code encrypting and decrypting RSA payloads
[ "cpe:/a:redhat:rhel_e4s:9.0::appstream" ]
null
7.5
null
null
RHSA-2018:2700
Red Hat Security Advisory: Red Hat JBoss Web Server 3.1.0 Service Pack 5 security and bug fix update
tomcat: A bug in the UTF-8 decoder can lead to DoS
[ "cpe:/a:redhat:jboss_enterprise_web_server:3.1" ]
null
null
7.5
null
RHSA-2010:0652
Red Hat Security Advisory: ImageMagick security and bug fix update
GraphicsMagick: Integer overflow in the routine creating X11 images
[ "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::client_workstation", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
RHSA-2014:0261
Red Hat Security Advisory: Red Hat Enterprise MRG for Red Hat Enterprise Linux 5 1-month Notice
This is the one-month notification for the retirement of Red Hat Enterprise MRG Version 1 for Red Hat Enterprise Linux 5. This notification applies only to those customers with subscriptions for Red Hat Enterprise MRG Version 1 for Red Hat Enterprise Linux 5.
[ "cpe:/a:redhat:enterprise_mrg:1::el5", "cpe:/a:redhat:enterprise_mrg:2::el5" ]
null
null
null
null
RHSA-2021:2167
Red Hat Security Advisory: kpatch-patch security update
kernel: use after free in eventpoll.c may lead to escalation of privilege kernel: SCSI target (LIO) write to any block on ILO backstore
[ "cpe:/o:redhat:rhel_eus:8.2::baseos" ]
null
8.1
null
null
RHSA-2022:0971
Red Hat Security Advisory: virt:av and virt-devel:av security and bug fix update
QEMU: virtiofsd: potential privilege escalation via CVE-2018-13405 libnbd: nbdcopy: missing error handling may create corrupted destination image
[ "cpe:/a:redhat:advanced_virtualization:8.4::el8" ]
null
4.8
null
null
RHSA-2024:5328
Red Hat Security Advisory: firefox security update
mozilla: Fullscreen notification dialog can be obscured by document content mozilla: Out of bounds memory access in graphics shared memory handling mozilla: Type confusion in WebAssembly mozilla: Incomplete WebAssembly exception handing mozilla: Out of bounds read in editor component mozilla: CSP strict-dynamic bypass using web-compatibility shims mozilla: Missing permission check when creating a StreamFilter mozilla: Uninitialized memory used by WebGL mozilla: Use-after-free in JavaScript garbage collection mozilla: Use-after-free in IndexedDB mozilla: Document content could partially obscure security prompts
[ "cpe:/a:redhat:rhel_eus:9.2::appstream" ]
null
6.1
null
null
RHSA-2023:4166
Red Hat Security Advisory: java-1.8.0-openjdk security and bug fix update
OpenJDK: array indexing integer overflow issue (8304468) OpenJDK: improper handling of slash characters in URI-to-path conversion (8305312)
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
3.7
null
null
RHSA-2005:332
Red Hat Security Advisory: xloadimage security update
security flaw
[ "cpe:/o:redhat:enterprise_linux:3::as", "cpe:/o:redhat:enterprise_linux:3::desktop", "cpe:/o:redhat:enterprise_linux:3::es", "cpe:/o:redhat:enterprise_linux:3::ws", "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws" ]
null
null
null
null
RHSA-2011:1160
Red Hat Security Advisory: dhcp security update
dhcp: denial of service flaws dhcp: denial of service flaws
[ "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws", "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::client_workstation", "cpe:/o:redhat:enterprise_linux:5::server", "cpe:/o:redhat:enterprise_linux:6::server" ]
null
null
null
null
RHSA-2021:0530
Red Hat Security Advisory: java-1.8.0-ibm security update
OpenJDK: High memory usage during deserialization of Proxy class with many interfaces (Serialization, 8236862) OpenJDK: Missing permission check in path to URI conversion (Libraries, 8242680) OpenJDK: Incomplete check for invalid characters in URI to path conversion (Libraries, 8242685)
[ "cpe:/a:redhat:enterprise_linux:8::supplementary" ]
null
3.7
null
null
RHSA-2021:4589
Red Hat Security Advisory: gcc-toolset-10-annobin security update
environment: Unicode's bidirectional (BiDi) override characters can cause trojan source attacks
[ "cpe:/a:redhat:rhel_eus:8.4::appstream" ]
null
8.5
null
null
RHSA-2023:3097
Red Hat Security Advisory: gssntlmssp security update
gssntlmssp: multiple out-of-bounds read when decoding NTLM fields gssntlmssp: memory corruption when decoding UTF16 strings gssntlmssp: incorrect free when decoding target information gssntlmssp: memory leak when parsing usernames gssntlmssp: out-of-bounds read when decoding target information
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
7.5
null
null
RHSA-2024:9613
Red Hat Security Advisory: OpenShift Container Platform 4.17.5 security update
waitress: python-waitress: request processing race condition in HTTP pipelining with invalid first request waitress: Waitress has a denial of service leading to high CPU usage/resource exhaustion
[ "cpe:/a:redhat:openshift:4.17::el8", "cpe:/a:redhat:openshift:4.17::el9", "cpe:/a:redhat:openshift_ironic:4.17::el9" ]
null
7.5
null
null
RHSA-2023:4060
Red Hat Security Advisory: .NET 6.0 security, bug fix, and enhancement update
dotnet: race condition in Core SignInManager<TUser> PasswordSignInAsync method
[ "cpe:/a:redhat:enterprise_linux:9::appstream", "cpe:/a:redhat:enterprise_linux:9::crb" ]
null
8.1
null
null
RHSA-2022:6024
Red Hat Security Advisory: New container image for Red Hat Ceph Storage 5.2 Security update
grafana: directory traversal vulnerability grafana: Forward OAuth Identity Token can allow users to access some data sources
[ "cpe:/a:redhat:ceph_storage:5.2::el8" ]
null
4.3
null
null
RHSA-2025:3847
Red Hat Security Advisory: OpenJDK 8u452 Windows Security Update
openjdk: Better TLS connection support (Oracle CPU 2025-04) openjdk: Improve compiler transformations (Oracle CPU 2025-04) openjdk: Enhance Buffered Image handling (Oracle CPU 2025-04)
[ "cpe:/a:redhat:openjdk:1.8::windows" ]
null
5.6
null
null
RHSA-2005:589
Red Hat Security Advisory: gaim security update
security flaw
[ "cpe:/o:redhat:enterprise_linux:2.1::as", "cpe:/o:redhat:enterprise_linux:2.1::aw", "cpe:/o:redhat:enterprise_linux:2.1::es", "cpe:/o:redhat:enterprise_linux:2.1::ws" ]
null
null
null
null
RHEA-2022:1596
Red Hat Enhancement Advisory: OpenShift Virtualization 4.9.4 Images
golang: net/http/httputil: panic due to racy read of persistConn after handler panic golang: net/http: limit growth of header canonicalization cache golang: syscall: don't close fd 0 on ForkExec error
[ "cpe:/a:redhat:container_native_virtualization:4.9::el8" ]
null
4.8
null
null
RHSA-2025:1242
Red Hat Security Advisory: OpenShift Container Platform 4.12.73 bug fix and security update
rsync: Info Leak via Uninitialized Stack Contents kernel: media: uvcvideo: Skip parsing frames of type UVC_VS_UNDEFINED in uvc_parse_format
[ "cpe:/a:redhat:openshift:4.12::el8" ]
null
7.3
null
null
RHSA-2016:0103
Red Hat Security Advisory: kernel security, bug fix, and enhancement update
virt: guest to host DoS by triggering an infinite loop in microcode via #DB exception kernel: Possible use-after-free vulnerability in keyring facility kernel: pipe buffer state corruption after unsuccessful atomic read from pipe
[ "cpe:/o:redhat:rhel_eus:7.1::computenode", "cpe:/o:redhat:rhel_eus:7.1::server" ]
null
null
null
null
RHSA-2024:1826
Red Hat Security Advisory: OpenJDK 21.0.3 Security Update for Portable Linux Builds
OpenJDK: long Exception message leading to crash (8319851) OpenJDK: HTTP/2 client improper reverse DNS lookup (8315708) OpenJDK: integer overflow in C1 compiler address generation (8322122)
[ "cpe:/a:redhat:openjdk:21" ]
null
3.7
null
null
RHSA-2022:1487
Red Hat Security Advisory: java-1.8.0-openjdk security, bug fix, and enhancement update
OpenJDK: Unbounded memory allocation when compiling crafted XPath expressions (JAXP, 8270504) OpenJDK: Improper object-to-string conversion in AnnotationInvocationHandler (Libraries, 8277672) OpenJDK: Missing check for negative ObjectIdentifier (Libraries, 8275151) OpenJDK: Defective secure validation in Apache Santuario (Libraries, 8278008) OpenJDK: URI parsing inconsistencies (JNDI, 8278972)
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
5.3
null
null
RHSA-2018:1826
Red Hat Security Advisory: kernel security, bug fix, and enhancement update
hw: cpu: speculative store bypass
[ "cpe:/o:redhat:rhel_eus:6.7::computenode", "cpe:/o:redhat:rhel_eus:6.7::server" ]
null
null
5.6
null
RHSA-2020:3560
Red Hat Security Advisory: chromium-browser security update
chromium-browser: Use after free in ANGLE chromium-browser: Use after free in task scheduling chromium-browser: Use after free in media chromium-browser: Use after free in audio chromium-browser: Inappropriate implementation in installer chromium-browser: Incorrect security UI in media chromium-browser: Heap buffer overflow in Skia chromium-browser: Use after free in media chromium-browser: Use after free in IndexedDB chromium-browser: Use after free in WebXR chromium-browser: Use after free in Blink chromium-browser: Use after free in offline mode chromium-browser: Use after free in extensions chromium-browser: Out of bounds read in WebGL chromium-browser: Heap buffer overflow in SwiftShader
[ "cpe:/a:redhat:rhel_extras:6" ]
null
8.8
null
null
RHBA-2007:0418
Red Hat Bug Fix Advisory: unzip bug fix update
security flaw security flaw
[ "cpe:/o:redhat:enterprise_linux:3::as", "cpe:/o:redhat:enterprise_linux:3::desktop", "cpe:/o:redhat:enterprise_linux:3::es", "cpe:/o:redhat:enterprise_linux:3::ws" ]
null
null
null
null
RHSA-2014:1981
Red Hat Security Advisory: flash-plugin security update
flash-plugin: Same-Origin-Policy bypass flaw (APSB14-27) flash-plugin: Multiple code-execution flaws (APSB14-27) flash-plugin: Multiple code-execution flaws (APSB14-27) flash-plugin: Information disclosure vulnerability (APSB14-27) flash-plugin: Multiple code-execution flaws (APSB14-27) flash-plugin: Multiple code-execution flaws (APSB14-27)
[ "cpe:/a:redhat:rhel_extras:5::client", "cpe:/a:redhat:rhel_extras:5::server", "cpe:/a:redhat:rhel_extras:6" ]
null
null
null
null
RHSA-2024:3877
Red Hat Security Advisory: dnsmasq security update
bind9: KeyTrap - Extreme CPU consumption in DNSSEC validator bind9: Preparing an NSEC3 closest encloser proof can exhaust CPU resources
[ "cpe:/a:redhat:rhel_aus:8.4::appstream", "cpe:/a:redhat:rhel_e4s:8.4::appstream", "cpe:/a:redhat:rhel_tus:8.4::appstream" ]
null
7.5
null
null
RHSA-2018:3680
Red Hat Security Advisory: rh-nginx112-nginx security update
nginx: Excessive memory consumption via flaw in HTTP/2 implementation nginx: Excessive CPU usage via flaw in HTTP/2 implementation nginx: Denial of service and memory disclosure via mp4 module
[ "cpe:/a:redhat:rhel_software_collections:3::el7" ]
null
null
8.2
null
RHSA-2023:7481
Red Hat Security Advisory: OpenShift Container Platform 4.11.54 packages and security update
HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack)
[ "cpe:/a:redhat:openshift:4.11::el8" ]
null
7.5
null
null
RHSA-2019:2808
Red Hat Security Advisory: kernel security update
Kernel: page cache side channel attacks
[ "cpe:/o:redhat:rhel_els:5" ]
null
null
7.1
null
RHSA-2023:3018
Red Hat Security Advisory: libarchive security update
libarchive: NULL pointer dereference in archive_write.c
[ "cpe:/a:redhat:enterprise_linux:8::crb", "cpe:/o:redhat:enterprise_linux:8::baseos" ]
null
5.9
null
null
RHSA-2024:10785
Red Hat Security Advisory: postgresql:12 security update
postgresql: PostgreSQL row security below e.g. subqueries disregards user ID changes postgresql: PostgreSQL SET ROLE, SET SESSION AUTHORIZATION reset to wrong user ID postgresql: PostgreSQL PL/Perl environment variable changes execute arbitrary code
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
8.8
null
null
RHSA-2022:5460
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 6.4.24 security update
tomcat: multiple requests with invalid payload length in a WebSocket frame could lead to DoS jbossweb: Incomplete fix of CVE-2020-13935 for WebSocket in JBossWeb could lead to DoS log4j: Remote code execution in Log4j 1.x when application is configured to use JMSAppender log4j: Remote code execution in Log4j 1.x when application is configured to use JMSSink log4j: SQL injection in Log4j 1.x when application is configured to use JDBCAppender log4j: Unsafe deserialization flaw in Chainsaw log viewer
[ "cpe:/a:redhat:jboss_enterprise_application_platform:6::el7" ]
null
8.8
null
null
RHSA-2014:1338
Red Hat Security Advisory: openstack-glance security and bug fix update
openstack-glance: Glance store disk space exhaustion
[ "cpe:/a:redhat:openstack:5::el6" ]
null
null
null
null
RHEA-2019:3846
Red Hat Enhancement Advisory: microcode_ctl bug fix and enhancement update
hw: Intel SGX information leak
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
6
null
RHSA-2022:5115
Red Hat Security Advisory: Red Hat OpenStack Platform 16.2 (python-django20) security update
Django: SQL injection in QuerySet.annotate(),aggregate() and extra()
[ "cpe:/a:redhat:openstack:16.2::el8" ]
null
9.4
null
null
RHSA-2007:0089
Red Hat Security Advisory: php security update for Stronghold
security flaw security flaw security flaw security flaw security flaw security flaw php session extension information leak php session extension global variable clobber php imap_mail_compose() buffer overflow via type.parameters
[ "cpe:/a:redhat:rhel_stronghold:4.0" ]
null
null
null
null
RHSA-2018:2093
Red Hat Security Advisory: patch security update
patch: Malicious patch files cause ed to execute arbitrary commands
[ "cpe:/o:redhat:rhel_aus:7.2::server", "cpe:/o:redhat:rhel_e4s:7.2::server", "cpe:/o:redhat:rhel_tus:7.2::server" ]
null
null
7.8
null
RHSA-2016:1972
Red Hat Security Advisory: Red Hat Ceph Storage 1.3.3 security, bug fix, and enhancement update
ceph: RGW permits bucket listing when authenticated_users=read
[ "cpe:/a:redhat:ceph_storage:1.3::el7" ]
null
null
3
null
RHSA-2024:4913
Red Hat Security Advisory: freeradius:3.0 security update
freeradius: forgery attack
[ "cpe:/a:redhat:rhel_aus:8.2::appstream" ]
null
9
null
null
RHSA-2020:1034
Red Hat Security Advisory: doxygen security and bug fix update
doxygen: cross-site scripting in templates/html/search_opensearch.php
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
6.1
null
RHSA-2024:4597
Red Hat Security Advisory: Red Hat Product OCP Tools 4.15 OpenShift Jenkins security update
ssh: Prefix truncation attack on Binary Packet Protocol (BPP) runc: file descriptor leak jetty: stop accepting new connections from valid clients jenkins-2-plugins: git-server plugin arbitrary file read vulnerability jenkins-2-plugins: matrix-project plugin path traversal vulnerability golang-protobuf: encoding/protojson, internal/encoding/json: infinite loop in protojson.Unmarshal when unmarshaling certain forms of invalid JSON jenkins-2-plugins: Improper input sanitization in HTML Publisher Plugin jenkins-plugin/script-security: sandbox bypass via crafted constructor bodies jenkins-plugin/script-security: sandbox bypass via sandbox-defined classes
[ "cpe:/a:redhat:ocp_tools:4.15::el8" ]
null
8.8
null
null
RHSA-2013:0199
Red Hat Security Advisory: libvirt security update
libvirt: use-after-free in virNetMessageFree()
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
null
null
RHSA-2024:4564
Red Hat Security Advisory: java-11-openjdk security update
OpenJDK: potential UTF8 size overflow (8314794) OpenJDK: Excessive symbol length can lead to infinite loop (8319859) OpenJDK: Range Check Elimination (RCE) pre-loop limit overflow (8320548) OpenJDK: Pack200 increase loading time due to improper header validation (8322106) OpenJDK: Out-of-bounds access in 2D image handling (8324559) OpenJDK: RangeCheckElimination array index overflow (8323231)
[ "cpe:/o:redhat:rhel_els:7" ]
null
7.4
null
null
RHSA-2018:1213
Red Hat Security Advisory: python-paramiko security update
python-paramiko: Authentication bypass in transport.py
[ "cpe:/a:redhat:ansible_engine:2.4::el7" ]
null
null
9.8
null
RHSA-2012:1549
Red Hat Security Advisory: bind security update
bind: DoS on servers using DNS64
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
null
null
RHSA-2015:1135
Red Hat Security Advisory: php security and bug fix update
php: use after free vulnerability in unserialize() file: out of bounds read in mconvert() php: heap buffer overflow in enchant_broker_request_dict() gd: buffer read overflow in gd_gif_in.c php: use after free vulnerability in unserialize() (incomplete fix of CVE-2014-8142) php: Free called on unitialized pointer in exif.c php: use after free vulnerability in unserialize() with DateTimeZone php: use after free in phar_object.c php: move_uploaded_file() NUL byte injection in file name php: buffer over-read in Phar metadata parsing php: use-after-free vulnerability in the process_nested_data function in ext/standard/var_unserializer.re php: invalid pointer free() in phar_tar_process_metadata() php: buffer overflow in phar_set_inode() php: pipelined request executed in deinitialized interpreter under httpd 2.4 php: missing null byte checks for paths in various PHP extensions php: missing null byte checks for paths in various PHP extensions php: memory corruption in phar_parse_tarfile caused by empty entry file name php: integer overflow leading to heap overflow when reading FTP file listing php: multipart/form-data request parsing CPU usage DoS php: regressions in 5.4+ php: pcntl_exec() accepts paths with NUL character php: SoapClient's __call() type confusion through unserialize() php: SoapClient's do_soap_call() type confusion after unserialize() php: missing null byte checks for paths in DOM and GD extensions php: type confusion issue in unserialize() with various SOAP methods php: type confusion issue in unserialize() with various SOAP methods php: type confusion issue in unserialize() with various SOAP methods php: Incomplete Class unserialization type confusion php: exception:: getTraceAsString type confusion issue after unserialize php: denial of service when processing a crafted file with Fileinfo php: denial of service when processing a crafted file with Fileinfo php: integer overflow in ftp_genlist() resulting in heap overflow (improved fix for CVE-2015-4022)
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
null
null
RHSA-2023:0664
Red Hat Security Advisory: tigervnc security update
xorg-x11-server: DeepCopyPointerClasses use-after-free leads to privilege elevation
[ "cpe:/a:redhat:rhel_eus:8.4::appstream" ]
null
7.8
null
null
RHSA-2005:748
Red Hat Security Advisory: php security update
security flaw
[ "cpe:/o:redhat:enterprise_linux:3::as", "cpe:/o:redhat:enterprise_linux:3::desktop", "cpe:/o:redhat:enterprise_linux:3::es", "cpe:/o:redhat:enterprise_linux:3::ws", "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws" ]
null
null
null
null
RHSA-2018:2575
Red Hat Security Advisory: java-1.8.0-ibm security update
OpenSSL: Double-free in DSA code openssl: BN_mod_exp may produce incorrect results on x86_64 openssl: bn_sqrx8x_internal carry bug on x86_64 JDK: DoS in the java.math component JDK: path traversal flaw in the Diagnostic Tooling Framework JDK: unspecified vulnerability fixed in 6u201, 7u191, 8u181, and 10.0.2 (Libraries) OpenJDK: insufficient index validation in PatternSyntaxException getMessage() (Concurrency, 8199547) JDK: unspecified vulnerability fixed in 6u201, 7u191, 8u181, and 10.0.2 (JSSE) JDK: privilege escalation via insufficiently restricted access to Attach API
[ "cpe:/a:redhat:rhel_extras:6" ]
null
null
8.4
null