id
stringlengths 13
15
| title
stringlengths 29
176
| description
stringlengths 8
32.1k
| cpes
sequencelengths 0
20
| cvss_v4_0
null | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
null |
---|---|---|---|---|---|---|---|
RHSA-2015:1897 | Red Hat Security Advisory: openstack-glance security update | openstack-glance allows illegal modification of image status openstack-glance: Storage overrun by deleting images | [
"cpe:/a:redhat:openstack:5::el6",
"cpe:/a:redhat:openstack:5::el7",
"cpe:/a:redhat:openstack:6::el7",
"cpe:/a:redhat:openstack:7::el7"
] | null | null | null | null |
RHSA-2013:0129 | Red Hat Security Advisory: ruby security and bug fix update | ruby: Incomplete fix for CVE-2011-1005 for NameError#to_s method when used on objects ruby: unintentional file creation caused by inserting an illegal NUL character | [
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2013:1210 | Red Hat Security Advisory: rhevm security and bug fix update | ovirt-engine: RedirectServlet cross-site scripting flaw | [
"cpe:/a:redhat:rhev_manager:3"
] | null | null | null | null |
RHSA-2024:2987 | Red Hat Security Advisory: python27:2.7 security update | pypa-setuptools: Regular Expression Denial of Service (ReDoS) in package_index.py python: use after free in heappushpop() of heapq module python: XML External Entity in XML processing plistlib module python-urllib3: Cookie request header isn't stripped during cross-origin redirects jinja2: HTML attribute injection when passing user input as keys to xmlattr filter | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 5.4 | null | null |
RHSA-2009:1585 | Red Hat Security Advisory: samba3x security and bug fix update | Samba improper file access Samba: Share restriction bypass via home-less directory user account(s) samba: infinite loop flaw in smbd on unexpected oplock break notification reply samba: information disclosure in suid mount.cifs | [
"cpe:/a:redhat:rhel_extras:5::client",
"cpe:/a:redhat:rhel_extras:5::server"
] | null | null | null | null |
RHSA-2021:2205 | Red Hat Security Advisory: Red Hat OpenStack Platform 10.0 (openvswitch) security update | lldpd: buffer overflow in the lldp_decode function in daemon/protocols/lldp.c | [
"cpe:/a:redhat:openstack:10::el7"
] | null | 9.8 | null | null |
RHSA-2024:0710 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.4.15 Security update | jgit: arbitrary file overwrite santuario: Private Key disclosure in debug-log output | [
"cpe:/a:redhat:jboss_enterprise_application_platform:7.4::el7"
] | null | 6.5 | null | null |
RHSA-2023:3366 | Red Hat Security Advisory: OpenShift Container Platform 4.13.2 packages and security update | golang: crash in a golang.org/x/crypto/ssh server golang: path/filepath: path-filepath filepath.Clean path traversal golang: crypto/tls: large handshake records may cause panics golang: net/http, net/textproto: denial of service from excessive memory allocation golang: go/parser: Infinite loop in parsing golang: html/template: backticks not treated as string delimiters golang: html/template: improper sanitization of CSS values golang: html/template: improper handling of JavaScript whitespace golang: html/template: improper handling of empty HTML attributes | [
"cpe:/a:redhat:openshift:4.13::el8",
"cpe:/a:redhat:openshift:4.13::el9",
"cpe:/a:redhat:openshift_ironic:4.13::el9"
] | null | 7.3 | null | null |
RHSA-2021:0774 | Red Hat Security Advisory: kernel-rt security and bug fix update | kernel: bad kfree in auditfilter.c may lead to escalation of privilege kernel: performance counters race condition use-after-free kernel: Local buffer overflow in ctnetlink_parse_tuple_filter in net/netfilter/nf_conntrack_netlink.c kernel: ICMP rate limiting can be used for DNS poisoning attack kernel: locking issue in drivers/tty/tty_jobctrl.c can lead to an use-after-free | [
"cpe:/a:redhat:rhel_eus:8.2::nfv",
"cpe:/a:redhat:rhel_eus:8.2::realtime"
] | null | 7.8 | null | null |
RHSA-2022:7283 | Red Hat Security Advisory: libksba security update | libksba: integer overflow may lead to remote code execution | [
"cpe:/o:redhat:rhel_aus:8.2::baseos",
"cpe:/o:redhat:rhel_e4s:8.2::baseos",
"cpe:/o:redhat:rhel_tus:8.2::baseos"
] | null | 8.6 | null | null |
RHSA-2021:1469 | Red Hat Security Advisory: bind security update | bind: An assertion check can fail while answering queries for DNAME records that require the DNAME to be processed to resolve itself | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 7.5 | null | null |
RHSA-2007:1059 | Red Hat Security Advisory: pcre security update | pcre miscalculation of memory requirements for malformed Posix character class pcre miscalculation of memory requirements for repeated subpattern containing a named recursion or subroutine reference pcre integer overflow pcre miscalculation of memory requirements if options are changed during pattern compilation | [
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2019:1851 | Red Hat Security Advisory: OpenShift Container Platform 3.11 security update | web-console: XSS in OAuth server /oauth/token/request endpoint jenkins-plugin-token-macro: XML External Entity processing the ${XML} macro kube-apiserver: DoS with crafted patch of type json-patch | [
"cpe:/a:redhat:openshift:3.11::el7"
] | null | null | 6.5 | null |
RHSA-2014:0522 | Red Hat Security Advisory: mariadb55-mariadb security update | mysql: unspecified DoS related to XML (CPU April 2014) mysql: unspecified DoS related to Partition (CPU April 2014) mysql: unspecified DoS related to Performance Schema (CPU April 2014) mysql: unspecified DoS related to Options (CPU April 2014) mysql: unspecified DoS related to Federated (CPU April 2014) mysql: unspecified vulnerability related to RBR (CPU April 2014) mysql: unspecified DoS related to Replication (CPU April 2014) | [
"cpe:/a:redhat:rhel_software_collections:1::el6"
] | null | null | null | null |
RHSA-2015:0776 | Red Hat Security Advisory: docker security update | docker: regression of CVE-2014-5277 | [
"cpe:/a:redhat:rhel_extras_other:7"
] | null | null | null | null |
RHSA-2018:1320 | Red Hat Security Advisory: Red Hat OpenShift Application Runtimes security and bug fix update | spring-framework: Directory traversal vulnerability with static resources on Windows filesystems spring-framework: Multipart content pollution spring-framework: Address partial fix for CVE-2018-1270 tomcat: Incorrect handling of empty string URL in security constraints can lead to unintended exposure of resources tomcat: Late application of security constraints can lead to resource exposure for unauthorised users | [
"cpe:/a:redhat:openshift_application_runtimes:1.0"
] | null | null | 4.8 | null |
RHSA-2021:4613 | Red Hat Security Advisory: Red Hat JBoss Core Services Apache HTTP Server 2.4.37 SP10 security update | httpd: mod_proxy_wstunnel tunneling of non Upgraded connection pcre: Buffer over-read in JIT when UTF is disabled and \X or \R has fixed quantifier greater than 1 httpd: mod_proxy NULL pointer dereference pcre: Integer overflow when parsing callout numeric arguments httpd: Single zero byte stack overflow in mod_auth_digest JBCS: URL normalization issue with dot-dot-semicolon(s) leads to information disclosure openssl: Read buffer overruns processing ASN.1 strings openssl: integer overflow in CipherUpdate openssl: NULL pointer dereference in X509_issuer_and_serial_hash() httpd: mod_session: NULL pointer dereference when parsing Cookie header httpd: mod_session: Heap overflow via a crafted SessionHeader value httpd: Unexpected URL matching with 'MergeSlashes OFF' httpd: NULL pointer dereference via malformed requests | [
"cpe:/a:redhat:jboss_core_services:1"
] | null | 7.5 | null | null |
RHSA-2012:0107 | Red Hat Security Advisory: kernel security and bug fix update | kernel: ext4: ext4_ext_insert_extent() kernel oops kernel: jbd2: unmapped buffer with _Unwritten or _Delay flags set can lead to DoS kernel: possible privilege escalation via SG_IO ioctl kernel: futex: clear robust_list on execve kernel: igmp: Avoid zero delay when receiving odd mixture of IGMP queries | [
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2006:0264 | Red Hat Security Advisory: sendmail security update | security flaw | [
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws",
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2018:3054 | Red Hat Security Advisory: libreoffice security and bug fix update | libreoffice: Use-after-free in sdstor/stgstrms.cxx:StgSmallStrm class allows for denial of service with crafted document libreoffice: Out of bounds write in filter/ww8/ww8toolbar.cxx:SwCTBWrapper class allows for denial of service with crafted document libreoffice: Information disclosure via SMB connection embedded in malicious file | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 4.3 | null |
RHSA-2024:3318 | Red Hat Security Advisory: kernel security update | kernel: nf_tables: use-after-free vulnerability in the nft_verdict_init() function | [
"cpe:/o:redhat:rhel_aus:7.6::server"
] | null | 7.8 | null | null |
RHSA-2023:4410 | Red Hat Security Advisory: mod_auth_openidc:2.3 security update | cjose: AES GCM decryption uses the Tag length from the actual Authentication Tag provided in the JWE | [
"cpe:/a:redhat:rhel_aus:8.2::appstream",
"cpe:/a:redhat:rhel_e4s:8.2::appstream",
"cpe:/a:redhat:rhel_tus:8.2::appstream"
] | null | 7.5 | null | null |
RHSA-2025:1767 | Red Hat Security Advisory: mysql security update | mysql: Thread Pooling unspecified vulnerability (CPU Jan 2025) | [
"cpe:/a:redhat:rhel_eus:9.2::appstream",
"cpe:/a:redhat:rhel_eus:9.2::crb"
] | null | 7.5 | null | null |
RHSA-2024:8717 | Red Hat Security Advisory: Satellite 6.13.7.3 Async Update | foreman: Read-only access to entire DB from templates | [
"cpe:/a:redhat:satellite:6.13::el8",
"cpe:/a:redhat:satellite_capsule:6.13::el8",
"cpe:/a:redhat:satellite_maintenance:6.13::el8",
"cpe:/a:redhat:satellite_utils:6.13::el8"
] | null | 6.3 | null | null |
RHSA-2020:0961 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.3 security update | thrift: Endless loop when feed with specific input data thrift: Out-of-bounds read related to TJSONProtocol or TSimpleJSONProtocol wildfly: The 'enabled-protocols' value in legacy security is not respected if OpenSSL security provider is in use undertow: AJP File Read/Inclusion Vulnerability | [
"cpe:/a:redhat:jboss_enterprise_application_platform:7.3"
] | null | 7.6 | 7.4 | null |
RHSA-2024:9644 | Red Hat Security Advisory: squid:4 security update | squid: vulnerable to a Denial of Service attack against Cache Manager error responses squid: Denial of Service processing ESI response content | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 7.5 | null | null |
RHSA-2023:1908 | Red Hat Security Advisory: java-1.8.0-openjdk security update | OpenJDK: improper connection handling during TLS handshake (8294474) OpenJDK: missing string checks for NULL characters (8296622) OpenJDK: incorrect handling of NULL characters in ProcessBuilder (8295304) OpenJDK: Swing HTML parsing issue (8296832) OpenJDK: incorrect enqueue of references in garbage collector (8298191) OpenJDK: certificate validation issue in TLS session negotiation (8298310) OpenJDK: missing check for slash characters in URI-to-path conversion (8298667) | [
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb"
] | null | 3.7 | null | null |
RHSA-2023:3432 | Red Hat Security Advisory: webkit2gtk3 security update | webkitgtk: an out-of-bounds read when processing malicious content webkitgtk: a use-after-free when processing maliciously crafted web content | [
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 8.8 | null | null |
RHSA-2004:383 | Red Hat Security Advisory: glibc security update | security flaw | [
"cpe:/o:redhat:enterprise_linux:2.1::as",
"cpe:/o:redhat:enterprise_linux:2.1::aw",
"cpe:/o:redhat:enterprise_linux:2.1::es",
"cpe:/o:redhat:enterprise_linux:2.1::ws"
] | null | null | null | null |
RHSA-2018:0060 | Red Hat Security Advisory: qemu-kvm-rhev security update | An update for qemu-kvm-rhev is now available for Red Hat OpenStack Platform 12.0 (Pike).
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. | [
"cpe:/a:redhat:openstack:12::el7"
] | null | null | null | null |
RHSA-2023:6021 | Red Hat Security Advisory: varnish:6 security update | HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack) | [
"cpe:/a:redhat:rhel_aus:8.4::appstream",
"cpe:/a:redhat:rhel_e4s:8.4::appstream",
"cpe:/a:redhat:rhel_tus:8.4::appstream"
] | null | 7.5 | null | null |
RHSA-2012:1225 | Red Hat Security Advisory: java-1.7.0-oracle security update | OpenJDK: AWT hardening fixes (AWT, 7163201) OpenJDK: beans ClassFinder insufficient permission checks (beans, 7162476) OpenJDK: beans MethodElementHandler insufficient permission checks (beans, 7194567) OpenJDK: beans insufficient permission checks, Java 7 0day (beans, 7162473) | [
"cpe:/a:redhat:rhel_extras:6"
] | null | null | null | null |
RHSA-2014:1042 | Red Hat Security Advisory: java-1.7.1-ibm security update | JDK: Java CMS keystore provider potentially allows brute-force private key recovery JDK: Privilege escalation issue JDK: unspecified vulnerability fixed in 7u65 and 8u11 (Deployment) OpenJDK: SubjectDelegator protection insufficient (JMX, 8029755) OpenJDK: Clone interfaces passed to proxy methods (Libraries, 8035009) OpenJDK: Bytecode verification does not prevent ctor calls to this() and super() (Hotspot, 8035119) JDK: unspecified vulnerability fixed in 7u65 and 8u11 (Deployment) OpenJDK: MethodHandles.Lookup insufficient modifiers checks (Libraries, 8035788) JDK: unspecified vulnerability fixed in 6u81, 7u65 and 8u11 (Deployment) OpenJDK: RSA blinding issues (Security, 8031346) OpenJDK: Prevent instantiation of service with non-public constructor (Security, 8035004) OpenJDK: AtomicReferenceFieldUpdater missing primitive type check (Libraries, 8039520) OpenJDK: insufficient Diffie-Hellman public key validation (Security, 8037162) JDK: unspecified vulnerability fixed in 6u81, 7u65 and 8u11 (Deployment) OpenJDK: InfoBuilder incorrect return values (Serviceability, 8033301) | [
"cpe:/a:redhat:rhel_extras:7"
] | null | null | null | null |
RHSA-2024:8802 | Red Hat Security Advisory: openexr security update | OpenEXR: Heap Overflow in Scanline Deep Data Parsing | [
"cpe:/a:redhat:rhel_e4s:9.0::appstream"
] | null | 9.1 | null | null |
RHSA-2005:569 | Red Hat Security Advisory: zlib security update | zlib DoS | [
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2016:2597 | Red Hat Security Advisory: firewalld security, bug fix, and enhancement update | firewalld: Firewall configuration can be modified by any logged in user | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 6.1 | null |
RHSA-2022:6921 | Red Hat Security Advisory: expat security update | expat: a use-after-free in the doContent function in xmlparse.c | [
"cpe:/o:redhat:rhel_els:6"
] | null | 8.1 | null | null |
RHSA-2017:1390 | Red Hat Security Advisory: samba security update | samba: Loading shared modules from any path in the system leading to RCE (SambaCry) | [
"cpe:/o:redhat:rhel_aus:6.4::server",
"cpe:/o:redhat:rhel_aus:6.5::server",
"cpe:/o:redhat:rhel_aus:6.6::server",
"cpe:/o:redhat:rhel_eus:6.7::computenode",
"cpe:/o:redhat:rhel_eus:6.7::server",
"cpe:/o:redhat:rhel_eus:7.1::server",
"cpe:/o:redhat:rhel_eus:7.2::computenode",
"cpe:/o:redhat:rhel_eus:7.2::server",
"cpe:/o:redhat:rhel_mission_critical:6.2::server",
"cpe:/o:redhat:rhel_tus:6.5::server",
"cpe:/o:redhat:rhel_tus:6.6::server"
] | null | null | 7.5 | null |
RHSA-2021:2865 | Red Hat Security Advisory: RHV Manager (ovirt-engine) security update [ovirt-4.4.7] | nodejs-ua-parser-js: Regular expression denial of service via the regex nodejs-glob-parent: Regular expression denial of service nodejs-path-parse: ReDoS via splitDeviceRe, splitTailRe and splitPathRe nodejs-underscore: Arbitrary code execution via the template function | [
"cpe:/a:redhat:rhev_manager:4.4:el8"
] | null | 7.2 | null | null |
RHSA-2020:5344 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.3.4 security update | hibernate-core: SQL injection vulnerability when both hibernate.use_sql_comments and JPQL String literals are used wildfly-openssl: memory leak per HTTP session creation in WildFly OpenSSL jackson-databind: FasterXML DOMDeserializer insecure entity expansion is vulnerable to XML external entity (XXE) | [
"cpe:/a:redhat:jboss_enterprise_application_platform:7.3"
] | null | 7.5 | null | null |
RHSA-2024:6765 | Red Hat Security Advisory: Red Hat Ansible Automation Platform 2.4 Product Security and Bug Fix Update | pulpcore: RBAC permissions incorrectly assigned in tasks that create objects golang: net: malformed DNS message can cause infinite loop golang: net/netip: Unexpected behavior from Is methods for IPv4-mapped IPv6 addresses urllib3: proxy-authorization request header is not stripped during cross-origin redirects | [
"cpe:/a:redhat:ansible_automation_platform:2.4::el8",
"cpe:/a:redhat:ansible_automation_platform:2.4::el9",
"cpe:/a:redhat:ansible_automation_platform_developer:2.4::el8",
"cpe:/a:redhat:ansible_automation_platform_developer:2.4::el9",
"cpe:/a:redhat:ansible_automation_platform_inside:2.4::el8",
"cpe:/a:redhat:ansible_automation_platform_inside:2.4::el9"
] | null | 4.4 | 6.7 | null |
RHSA-2020:0796 | Red Hat Security Advisory: OpenShift Container Platform 3.11 openshift-enterprise-apb-base-container security update | openshift/apb-base: /etc/passwd is given incorrect privileges | [
"cpe:/a:redhat:openshift:3.11::el7"
] | null | 7 | null | null |
RHSA-2018:1170 | Red Hat Security Advisory: kernel-rt security and bug fix update | kernel: Use-after-free vulnerability in DCCP socket kernel: Incorrect type conversion for size during dma allocation kernel: v4l2: disabled memory access protection mechanism allowing privilege escalation kernel: Use-after-free in snd_seq_ioctl_create_port() kernel: Missing namespace check in net/netlink/af_netlink.c allows for network monitors to observe systemwide activity kernel: netfilter: use-after-free in tcpmss_mangle_packet function in net/netfilter/xt_TCPMSS.c kernel: Stack information leak in the EFS element | [
"cpe:/a:redhat:enterprise_mrg:2:server:el6"
] | null | null | 6.5 | null |
RHSA-2024:4982 | Red Hat Security Advisory: OpenShift API for Data Protection (OADP) 1.3.3 security and bug fix update | golang: net/http, x/net/http2: unlimited number of CONTINUATION frames causes DoS golang: net: malformed DNS message can cause infinite loop golang: archive/zip: Incorrect handling of certain ZIP files golang: net/netip: Unexpected behavior from Is methods for IPv4-mapped IPv6 addresses | [
"cpe:/a:redhat:openshift_api_data_protection:1.3::el9"
] | null | 6.7 | null | null |
RHSA-2022:6967 | Red Hat Security Advisory: compat-expat1 security update | expat: a use-after-free in the doContent function in xmlparse.c | [
"cpe:/o:redhat:rhel_els:6"
] | null | 8.1 | null | null |
RHSA-2024:3421 | Red Hat Security Advisory: kernel security and bug fix update | kernel: Use-after-free in nft_verdict_dump due to a race between set GC and transaction kernel: Marvin vulnerability side-channel leakage in the RSA decryption operation kernel: inactive elements in nft_pipapo_walk kernel: netfilter: nftables: exthdr: fix 4-byte stack OOB write kernel: nf_tables: use-after-free vulnerability in the nft_verdict_init() function hw: amd: Instruction raise #VC exception at exit hw: amd: Instruction raise #VC exception at exit kernel: mlxsw: spectrum_acl_tcam: Fix stack corruption | [
"cpe:/a:redhat:rhel_eus:9.0::appstream",
"cpe:/a:redhat:rhel_eus:9.0::crb",
"cpe:/o:redhat:rhel_eus:9.0::baseos"
] | null | 6.7 | null | null |
RHSA-2015:1893 | Red Hat Security Advisory: flash-plugin security update | flash-plugin: information leak and hardening fixes in APSB15-25 flash-plugin: multiple code execution issues fixed in APSB15-25 flash-plugin: multiple code execution issues fixed in APSB15-25 flash-plugin: multiple code execution issues fixed in APSB15-25 flash-plugin: information leak and hardening fixes in APSB15-25 flash-plugin: multiple code execution issues fixed in APSB15-25 flash-plugin: multiple code execution issues fixed in APSB15-25 flash-plugin: multiple code execution issues fixed in APSB15-25 flash-plugin: multiple code execution issues fixed in APSB15-25 flash-plugin: multiple code execution issues fixed in APSB15-25 flash-plugin: multiple code execution issues fixed in APSB15-25 flash-plugin: multiple code execution issues fixed in APSB15-25 flash-plugin: multiple code execution issues fixed in APSB15-25 flash-plugin: multiple code execution issues fixed in APSB15-25 flash-plugin: multiple code execution issues fixed in APSB15-25 flash-plugin: multiple code execution issues fixed in APSB15-25 flash-plugin: multiple code execution issues fixed in APSB15-25 flash-plugin: multiple code execution issues fixed in APSB15-25 flash-plugin: multiple code execution issues fixed in APSB15-25 flash-plugin: multiple code execution issues fixed in APSB15-25 flash-plugin: multiple code execution issues fixed in APSB15-25 | [
"cpe:/a:redhat:rhel_extras:6"
] | null | null | null | null |
RHSA-2020:0566 | Red Hat Security Advisory: python-pillow security update | python-pillow: reading specially crafted image files leads to allocation of large amounts of memory and denial of service python-pillow: out-of-bounds write in expandrow in libImaging/SgiRleDecode.c python-pillow: improperly restricted operations on memory buffer in libImaging/PcxDecode.c | [
"cpe:/a:redhat:rhel_e4s:8.0::appstream"
] | null | 9.8 | null | null |
RHSA-2023:7288 | Red Hat Security Advisory: Red Hat Product OCP Tools 4.14 Openshift Jenkins security update | snakeyaml: Denial of Service due to missing nested depth limitation for collections maven-shared-utils: Command injection via Commandline class apache-commons-text: variable interpolation RCE jenkins-2-plugins/script-security: Sandbox bypass vulnerability in Script Security Plugin jenkins-2-plugins/JUnit: Stored XSS vulnerability in JUnit Plugin jenkins-2-plugins/pipeline-build-step: Stored XSS vulnerability in Pipeline: Build Step Plugin golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487) HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack) | [
"cpe:/a:redhat:ocp_tools:4.14::el8"
] | null | 7.5 | null | null |
RHSA-2024:9943 | Red Hat Security Advisory: kernel-rt security update | kernel: iommu: Fix potential use-after-free during probe kernel: blk-mq: fix IO hang from sbitmap wakeup race kernel: mptcp: pm: Fix uaf in __timer_delete_sync | [
"cpe:/a:redhat:rhel_e4s:9.0::nfv",
"cpe:/a:redhat:rhel_e4s:9.0::realtime"
] | null | 7 | null | null |
RHSA-2024:3621 | Red Hat Security Advisory: Red Hat OpenShift distributed tracing 3.2.0 operator/operand containers update | go-resty: HTTP request body disclosure in github.com/go-resty/resty/v2 golang: net/http, x/net/http2: unlimited number of CONTINUATION frames causes DoS golang: net/http/cookiejar: incorrect forwarding of sensitive headers and cookies on HTTP redirect golang: net/http: golang: mime/multipart: golang: net/textproto: memory exhaustion in Request.ParseMultipartForm golang: crypto/x509: Verify panics on certificates with an unknown public key algorithm golang: net/mail: comments in display names are incorrectly handled golang: html/template: errors returned from MarshalJSON methods may break template escaping golang-protobuf: encoding/protojson, internal/encoding/json: infinite loop in protojson.Unmarshal when unmarshaling certain forms of invalid JSON | [
"cpe:/a:redhat:openshift_distributed_tracing:3.2::el8"
] | null | 5.9 | null | null |
RHSA-2015:2541 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 6.4.5 update | EAP: missing authorization check for Monitor/Deployer/Auditor role when shutting down server apache-commons-collections: InvokerTransformer code execution during deserialisation | [
"cpe:/a:redhat:jboss_enterprise_application_platform:6.4"
] | null | null | null | null |
RHSA-2024:3494 | Red Hat Security Advisory: OpenShift Container Platform 4.13.43 security update | golang.org/x/net/http2: avoid quadratic complexity in HPACK decoding | [
"cpe:/a:redhat:openshift:4.13::el8",
"cpe:/a:redhat:openshift:4.13::el9"
] | null | 7.5 | null | null |
RHSA-2018:3459 | Red Hat Security Advisory: kernel security, bug fix, and enhancement update | kernel: out-of-bounds access in the show_timer function in kernel/time/posix-timers.c kernel: IP fragments with random offsets allow a remote denial of service (FragmentSmack) | [
"cpe:/o:redhat:rhel_eus:7.5::computenode",
"cpe:/o:redhat:rhel_eus:7.5::server"
] | null | null | 7.5 | null |
RHSA-2024:2913 | Red Hat Security Advisory: thunderbird security update | Mozilla: Arbitrary JavaScript execution in PDF.js Mozilla: IndexedDB files retained in private browsing mode Mozilla: Potential permissions request bypass via clickjacking Mozilla: Cross-origin responses could be distinguished between script and non-script content-types Mozilla: Use-after-free could occur when printing to PDF Mozilla: Memory safety bugs fixed in Firefox 126, Firefox ESR 115.11, and Thunderbird 115.11 | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 6.1 | null | null |
RHSA-2023:0287 | Red Hat Security Advisory: sudo security update | sudo: arbitrary file write with privileges of the RunAs user | [
"cpe:/o:redhat:rhel_els:6"
] | null | 7.8 | null | null |
RHSA-2009:0008 | Red Hat Security Advisory: dbus security update | dbus denial of service | [
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2017:0214 | Red Hat Security Advisory: nagios security update | snoopy: incomplete fixes for command execution flaws snoopy: incomplete fixes for command execution flaws snoopy: incomplete fixes for command execution flaws nagios: Command injection via curl in MagpieRSS nagios: Privilege escalation issue | [
"cpe:/a:redhat:openstack:7::el7"
] | null | null | 7.3 | null |
RHSA-2020:1267 | Red Hat Security Advisory: nss-softokn security update | ROHNP: Key Extraction Side Channel in Multiple Crypto Libraries nss: Out-of-bounds write when passing an output buffer smaller than the block size to NSC_EncryptUpdate | [
"cpe:/o:redhat:rhel_eus:7.5::computenode",
"cpe:/o:redhat:rhel_eus:7.5::server"
] | null | null | 8.1 | null |
RHSA-2019:0638 | Red Hat Security Advisory: openwsman security update | openwsman: Disclosure of arbitrary files outside of the registered URIs | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 7.5 | null |
RHSA-2024:9989 | Red Hat Security Advisory: RHOSP 17.1.4 (python-webob) security update | webob: WebOb's location header normalization during redirect leads to open redirect | [
"cpe:/a:redhat:openstack:17.1::el8"
] | null | 6.1 | null | null |
RHSA-2022:1476 | Red Hat Security Advisory: Red Hat Advanced Cluster Management 2.4.3 security updates and bug fixes | cached-path-relative: Prototype Pollution via the cache variable nanoid: Information disclosure via valueOf() function opencontainers: OCI manifest and index parsing confusion golang.org/x/crypto: empty plaintext packet causes panic nodejs-shelljs: improper privilege management follow-redirects: Exposure of Private Personal Information to an Unauthorized Actor node-fetch: exposure of sensitive information to an unauthorized actor follow-redirects: Exposure of Sensitive Information via Authorization Header leak openssl: Infinite loop in BN_mod_sqrt() reachable when parsing certificates nats-server: misusing the "dynamically provisioned sandbox accounts" feature authenticated user can obtain the privileges of the System account imgcrypt: Unauthorized access to encryted container image on a shared system due to missing check in CheckAuthorization() code path golang: crash in a golang.org/x/crypto/ssh server | [
"cpe:/a:redhat:acm:2.4::el8"
] | null | 7.5 | null | null |
RHSA-2023:0848 | Red Hat Security Advisory: php:8.0 security update | php: potential buffer overflow in php_cli_server_startup_workers php: phar: infinite loop when decompressing quine gzip file php: standard insecure cookie could be treated as a '__Host-' or '__Secure-' cookie by PHP applications php: OOB read due to insufficient input validation in imageloadfont() php: PDO:: quote() may return unquoted string due to an integer overflow XKCP: buffer overflow in the SHA-3 reference implementation | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 8.1 | null | null |
RHSA-2022:0445 | Red Hat Security Advisory: Red Hat Single Sign-On 7.4.10 on OpenJ9 for OpenShift image security update | log4j: Remote code execution in Log4j 1.x when application is configured to use JMSAppender log4j: Remote code execution in Log4j 1.x when application is configured to use JMSSink log4j: SQL injection in Log4j 1.x when application is configured to use JDBCAppender log4j: Unsafe deserialization flaw in Chainsaw log viewer | [
"cpe:/a:redhat:rhosemc:1.0::el8"
] | null | 8.8 | null | null |
RHSA-2015:1657 | Red Hat Security Advisory: rh-ruby22-ruby security update | rubygems: DNS hijacking vulnerability in api_endpoint() | [
"cpe:/a:redhat:rhel_software_collections:2::el6",
"cpe:/a:redhat:rhel_software_collections:2::el7"
] | null | null | null | null |
RHSA-2022:5101 | Red Hat Security Advisory: Red Hat AMQ Broker 7.10.0 release and security update | nodejs-lodash: prototype pollution in defaultsDeep function leading to modifying properties jackson-databind: denial of service via a large depth of nested objects Broker: Malformed message can result in partial DoS (OOM) netty: control chars in header names may lead to HTTP request smuggling amq: AMQ Broker Operator ClusterWide Edit Permissions Due Token Exposure Framework: Data Binding Rules Vulnerability artemis-commons: Apache ActiveMQ Artemis DoS | [
"cpe:/a:redhat:amq_broker:7"
] | null | 7.5 | 9.1 | null |
RHSA-2023:5841 | Red Hat Security Advisory: httpd24-nghttp2 security update | HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack) | [
"cpe:/a:redhat:rhel_software_collections:3::el7"
] | null | 7.5 | null | null |
RHSA-2015:1176 | Red Hat Security Advisory: Red Hat JBoss Fuse 6.2.0 update | async-http-client: SSL/TLS certificate verification is disabled under certain conditions async-http-client: missing hostname verification for SSL certificates smack: incorrect X.509 certificate validation smack: IQ response spoofing CXF: SSL hostname verification bypass, incomplete CVE-2012-6153 fix JClouds: predictable tmp file creation in ScriptBuilder Statements smack: MitM vulnerability Fuse: insufficient access permissions checks when accessing Hawtio console wss4j: Apache WSS4J is vulnerable to Bleichenbacher's attack (incomplete fix for CVE-2011-2487) wss4j: Apache WSS4J doesn't correctly enforce the requireSignedEncryptedDataElements property Java: PKIX Trust Engines Exhibit Critical Flaw In Trusted Names Evaluation activemq: Fileserver web application vulnerability allowing RCE | [
"cpe:/a:redhat:jboss_fuse:6.2.0"
] | null | null | 4.8 | null |
RHSA-2023:0506 | Red Hat Security Advisory: pcs security update | sinatra: Reflected File Download attack | [
"cpe:/a:redhat:rhel_eus:8.4::highavailability",
"cpe:/a:redhat:rhel_eus:8.4::resilientstorage"
] | null | 8.8 | null | null |
RHSA-2012:1097 | Red Hat Security Advisory: glibc security and bug fix update | glibc: printf() unbound alloca() usage in case of positional parameters + many format specs | [
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2023:6282 | Red Hat Security Advisory: insights-client security update | insights-client: unsafe handling of temporary files and directories | [
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 7.8 | null | null |
RHSA-2015:2131 | Red Hat Security Advisory: openldap security, bug fix, and enhancement update | openldap: crash in ldap_domain2hostlist when processing SRV records openldap: incorrect multi-keyword mode cipherstring parsing | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 3.7 | null |
RHSA-2023:4032 | Red Hat Security Advisory: python38:3.8 and python38-devel:3.8 security update | python: urllib.parse url blocklisting bypass | [
"cpe:/a:redhat:rhel_eus:8.6::appstream",
"cpe:/a:redhat:rhel_eus:8.6::crb"
] | null | 7.5 | null | null |
RHSA-2007:0980 | Red Hat Security Advisory: seamonkey security update | security flaw security flaw security flaw about: blank windows security flaw security flaw security flaw security flaw security flaw | [
"cpe:/o:redhat:enterprise_linux:2.1::as",
"cpe:/o:redhat:enterprise_linux:2.1::aw",
"cpe:/o:redhat:enterprise_linux:2.1::es",
"cpe:/o:redhat:enterprise_linux:2.1::ws",
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws",
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2017:0193 | Red Hat Security Advisory: Red Hat JBoss Core Services Apache HTTP Server 2.4.23 Release on RHEL 6 | openssl: Memory corruption in the ASN.1 encoder openssl: Possible integer overflow vulnerabilities in codebase openssl: Non-constant time codepath followed for certain operations in DSA implementation mod_cluster: Buffer overflow in mod_manager when sending request with long JVMRoute mod_jk: Buffer overflow when concatenating virtual host name and URI mod_cluster: Protocol parsing logic error | [
"cpe:/a:redhat:jboss_core_services:1::el6"
] | null | null | 4.3 | null |
RHSA-2021:3810 | Red Hat Security Advisory: libxml2 security update | libxml2: Use after free via namespace node in XPointer ranges | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 5.3 | null |
RHSA-2019:2506 | Red Hat Security Advisory: redis security update | redis: Heap buffer overflow in HyperLogLog triggered by malicious client | [
"cpe:/a:redhat:openstack-optools:9::el7"
] | null | null | 7.2 | null |
RHSA-2020:2249 | Red Hat Security Advisory: .NET Core on Red Hat Enterprise Linux security and bug fix update | dotnet: Denial of service via untrusted input dotnet: Denial of service due to infinite loop | [
"cpe:/a:redhat:rhel_dotnet:3.1::el7"
] | null | 7.5 | null | null |
RHSA-2023:1785 | Red Hat Security Advisory: firefox security update | Mozilla: Memory Corruption in Safe Browsing Code Mozilla: libwebp: Double-free in libwebp Mozilla: Fullscreen notification obscured Mozilla: Potential Memory Corruption following Garbage Collector compaction Mozilla: Invalid free from JavaScript code Mozilla: Content-Disposition filename truncation leads to Reflected File Download Mozilla: Files with malicious extensions could have been downloaded unsafely on Linux Mozilla: Incorrect optimization result on ARM64 Mozilla: Memory safety bugs fixed in Firefox 112 and Firefox ESR 102.10 | [
"cpe:/a:redhat:rhel_eus:9.0::appstream"
] | null | 8.8 | null | null |
RHSA-2017:0091 | Red Hat Security Advisory: kernel-rt security and bug fix update | kernel: Use after free in tcp_xmit_retransmit_queue kernel: Use-after-free in the recvmmsg exit path kernel: Slab out-of-bounds access in sctp_sf_ootb() | [
"cpe:/a:redhat:rhel_extras_rt:7"
] | null | null | 5.9 | null |
RHSA-2010:0606 | Red Hat Security Advisory: kernel security and bug fix update | kernel: cifs: Fix a kernel BUG with remote OS/2 server kernel: nfsd4: bug in read_buf | [
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2023:3151 | Red Hat Security Advisory: thunderbird security update | Mozilla: Browser prompts could have been obscured by popups Mozilla: Crash in RLBox Expat driver Mozilla: Potential permissions request bypass via clickjacking Mozilla: Content process crash due to invalid wasm code Mozilla: Potential spoof due to obscured address bar Mozilla: Potential memory corruption in FileReader::DoReadData() Mozilla: Memory safety bugs fixed in Firefox 113 and Firefox ESR 102.11 | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 8.8 | null | null |
RHBA-2024:1440 | Red Hat Bug Fix Advisory: MTV 2.5.6 Images | golang: net/http/internal: Denial of Service (DoS) via Resource Consumption via HTTP requests nodejs-ip: arbitrary code execution via the isPublic() function | [
"cpe:/a:redhat:migration_toolkit_virtualization:2.5::el8",
"cpe:/a:redhat:migration_toolkit_virtualization:2.5::el9"
] | null | 9.8 | null | null |
RHSA-2019:3048 | Red Hat Security Advisory: RH-SSO 7.3.4 adapters for Enterprise Application Platform 6 security update | keycloak: adapter endpoints are exposed via arbitrary URLs | [
"cpe:/a:redhat:jboss_enterprise_application_platform:6::el6",
"cpe:/a:redhat:jboss_enterprise_application_platform:6::el7"
] | null | null | 4.3 | null |
RHSA-2007:0150 | Red Hat Security Advisory: freetype security update | Multiple font integer overflows (CVE-2007-1352) | [
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws",
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws",
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2023:4409 | Red Hat Security Advisory: mod_auth_openidc:2.3 security update | cjose: AES GCM decryption uses the Tag length from the actual Authentication Tag provided in the JWE | [
"cpe:/a:redhat:rhel_aus:8.4::appstream",
"cpe:/a:redhat:rhel_e4s:8.4::appstream",
"cpe:/a:redhat:rhel_tus:8.4::appstream"
] | null | 7.5 | null | null |
RHSA-2005:004 | Red Hat Security Advisory: lesstif security update | openmotif21 stack overflows in libxpm openmotif21 stack overflows in libxpm openmotif21 stack overflows in libxpm | [
"cpe:/o:redhat:enterprise_linux:2.1::as",
"cpe:/o:redhat:enterprise_linux:2.1::aw",
"cpe:/o:redhat:enterprise_linux:2.1::es",
"cpe:/o:redhat:enterprise_linux:2.1::ws"
] | null | null | null | null |
RHSA-2019:3757 | Red Hat Security Advisory: patch security update | patch: do_ed_script in pch.c does not block strings beginning with a ! character patch: OS shell command injection when processing crafted patch files | [
"cpe:/o:redhat:rhel_eus:7.5::computenode",
"cpe:/o:redhat:rhel_eus:7.5::server"
] | null | null | 7.8 | null |
RHSA-2014:0897 | Red Hat Security Advisory: Red Hat JBoss Enterprise Web Platform 5.2.0 security update | PicketLink: XXE via insecure DocumentBuilderFactory usage | [
"cpe:/a:redhat:jboss_enterprise_web_platform:5.2.0"
] | null | null | null | null |
RHSA-2016:2062 | Red Hat Security Advisory: mariadb-galera security update | mysql: general_log can write to configuration files, leading to privilege escalation (CPU Oct 2016) | [
"cpe:/a:redhat:openstack:9::el7"
] | null | null | 9.8 | null |
RHSA-2024:8528 | Red Hat Security Advisory: pki-servlet-engine security update | tomcat: Denial of Service in Tomcat | [
"cpe:/a:redhat:rhel_eus:9.0::appstream"
] | null | 7.5 | null | null |
RHSA-2021:3447 | Red Hat Security Advisory: kernel security and bug fix update | kernel: powerpc: KVM guest OS users can cause host OS memory corruption kernel: slab-out-of-bounds access in xdr_set_page_base() in net/sunrpc/xdr.c | [
"cpe:/a:redhat:enterprise_linux:8::crb",
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 7.5 | null | null |
RHSA-2025:3501 | Red Hat Security Advisory: Custom Metrics Autoscaler Operator for Red Hat OpenShift 2.15.1-4 Update | encoding/gob: golang: Calling Decoder.Decode on a message which contains deeply nested structures can cause a panic due to stack exhaustion golang.org/x/oauth2/jws: Unexpected memory consumption during token parsing in golang.org/x/oauth2/jws go-jose: Go JOSE's Parsing Vulnerable to Denial of Service | [
"cpe:/a:redhat:openshift_custom_metrics_autoscaler:2.15::el9"
] | null | 7.5 | null | null |
RHSA-2023:1677 | Red Hat Security Advisory: Red Hat Virtualization Host 4.4.z SP 1 security update batch#5 (oVirt-4.5.3-5) | git: gitattributes parsing integer overflow git: Heap overflow in `git archive`, `git log --format` leading to RCE ALSA: pcm: Move rwsem lock inside snd_ctl_elem_read to prevent UAF kernel: FUSE filesystem low-privileged user privileges escalation nss: Arbitrary memory write via PKCS 12 | [
"cpe:/o:redhat:rhev_hypervisor:4.4::el8"
] | null | 8.8 | null | null |
RHSA-2014:0921 | Red Hat Security Advisory: httpd security update | httpd: mod_cache NULL pointer dereference crash httpd: mod_proxy denial of service httpd: mod_deflate denial of service httpd: mod_status heap-based buffer overflow httpd: mod_cgid denial of service | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | null | null |
RHSA-2016:2035 | Red Hat Security Advisory: Red Hat JBoss Fuse 6.3 security update | Framework: denial-of-service attack with XML input ObjectMessage: unsafe deserialization camel-xstream: Java object de-serialization vulnerability leads to RCE Camel: Java object deserialisation in Jetty/Servlet bouncycastle: Invalid curve attack allowing to extract private keys JGroups: Authorization bypass bsh2: remote code execution via deserialization shiro: Security constraint bypass | [
"cpe:/a:redhat:jboss_fuse:6.3"
] | null | null | 7.3 | null |
RHSA-2020:5588 | Red Hat Security Advisory: openssl security update | openssl: EDIPARTYNAME NULL pointer de-reference | [
"cpe:/o:redhat:rhel_e4s:8.0::baseos"
] | null | 5.9 | null | null |
RHSA-2022:5766 | Red Hat Security Advisory: firefox security update | Mozilla: Memory safety bugs fixed in Firefox 103 and 102.1 Mozilla: Directory indexes for bundled resources reflected URL parameters Mozilla: Mouse Position spoofing with CSS transforms | [
"cpe:/a:redhat:rhel_e4s:8.1::appstream"
] | null | 7.5 | 6.1 | null |
RHSA-2020:3192 | Red Hat Security Advisory: Red Hat Fuse 7.7.0 release and security update | netty: Infinite loop vulnerability when handling renegotiation using SslProvider.OpenSsl elasticsearch: Information exposure via _cluster/settings API pdfbox: unbounded computation in parser resulting in a denial of service vertx: WebSocket HTTP upgrade implementation holds the entire http request in memory before the handshake dom4j: XML Injection in Class: Element. Methods: addElement, addAttribute which can impact the integrity of XML documents mina-core: Retaining an open socket in close_notify SSL-TLS leading to Information disclosure. spring-data-jpa: Additional information exposure with Spring Data JPA derived queries HTTP/2: large amount of data requests leads to denial of service hawtio: server side request forgery via initial /proxy/ substring of a URI apache-commons-beanutils: does not suppresses the class property in PropertyUtilsBean by default jackson-mapper-asl: XML external entity similar to CVE-2016-3720 jackson-databind: polymorphic typing issue allows attacker to read arbitrary local files on the server. xml-security: Apache Santuario potentially loads XML parsing code from an untrusted source cxf: OpenId Connect token service does not properly validate the clientId jackson-databind: Serialization gadgets in com.zaxxer.hikari.HikariConfig undertow: possible Denial Of Service (DOS) in Undertow HTTP server listening on HTTPS jackson-databind: Serialization gadgets in classes of the commons-configuration package jackson-databind: Serialization gadgets in classes of the xalan package jackson-databind: Serialization gadgets in com.zaxxer.hikari.HikariDataSource jackson-databind: Serialization gadgets in org.apache.commons.dbcp.datasources.* jackson-databind: Serialization gadgets in com.p6spy.engine.spy.P6DataSource jackson-databind: Serialization gadgets in classes of the ehcache package jackson-databind: Serialization gadgets in org.apache.log4j.receivers.db.* cxf: reflected XSS in the services listing page jackson-databind: lacks certain net.sf.ehcache blocking netty: HTTP request smuggling netty: HttpObjectDecoder.java allows Content-Length header to accompanied by second Content-Length header undertow: AJP File Read/Inclusion Vulnerability undertow: servletPath is normalized incorrectly leading to dangerous application mapping which could result in security bypass apache-commons-configuration: uncontrolled class instantiation when loading YAML files netty: HTTP Request Smuggling due to Transfer-Encoding whitespace mishandling jackson-databind: Lacks certain xbean-reflect/JNDI blocking jackson-databind: Serialization gadgets in shaded-hikari-config jackson-databind: Serialization gadgets in ibatis-sqlmap jackson-databind: Serialization gadgets in anteros-core jackson-databind: mishandles the interaction between serialization gadgets and typing which could result in remote command execution jackson-databind: mishandles the interaction between serialization gadgets and typing which could result in remote command execution Undertow: Incomplete fix for CVE-2017-2666 due to permitting invalid characters in HTTP requests jackson-databind: Serialization gadgets in org.aoju.bus.proxy.provider.*.RmiProvider jackson-databind: Serialization gadgets in javax.swing.JEditorPane jackson-databind: Serialization gadgets in org.apache.activemq.jms.pool.XaPooledConnectionFactory jackson-databind: Serialization gadgets in org.apache.commons.proxy.provider.remoting.RmiProvider jackson-databind: Serialization gadgets in org.apache.openjpa.ee.WASRegistryManagedRuntime jackson-databind: Serialization gadgets in org.springframework:spring-aop jackson-databind: Serialization gadgets in commons-jelly:commons-jelly jackson-databind: serialization in oadd.org.apache.xalan.lib.sql.JNDIConnectionPool jackson-databind: serialization in weblogic/oracle-aqjms jackson-databind: serialization in com.sun.org.apache.xalan.internal.lib.sql.JNDIConnectionPool jackson-databind: serialization in org.jsecurity.realm.jndi.JndiRealmFactory | [
"cpe:/a:redhat:jboss_fuse:7"
] | null | 8.1 | 4.8 | null |
RHSA-2010:0782 | Red Hat Security Advisory: firefox security update | firefox/nss: doesn't handle IP-based wildcards in X509 certificates safely NSS: insecure Diffie-Hellman key exchange Mozilla miscellaneous memory safety hazards Mozilla miscellaneous memory safety hazards Mozilla XSS in gopher parser when parsing hrefs Mozilla cross-site information disclosure via modal calls Mozilla buffer overflow and memory corruption using document.write Mozilla use-after-free error in nsBarProp Mozilla unsafe library loading flaw Mozilla dangling pointer vulnerability in LookupGetterOrSetter | [
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws",
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.