id
stringlengths
13
15
title
stringlengths
29
176
description
stringlengths
8
32.1k
cpes
sequencelengths
0
20
cvss_v4_0
null
cvss_v3_1
float64
0
10
cvss_v3_0
float64
0
10
cvss_v2_0
null
RHSA-2015:1897
Red Hat Security Advisory: openstack-glance security update
openstack-glance allows illegal modification of image status openstack-glance: Storage overrun by deleting images
[ "cpe:/a:redhat:openstack:5::el6", "cpe:/a:redhat:openstack:5::el7", "cpe:/a:redhat:openstack:6::el7", "cpe:/a:redhat:openstack:7::el7" ]
null
null
null
null
RHSA-2013:0129
Red Hat Security Advisory: ruby security and bug fix update
ruby: Incomplete fix for CVE-2011-1005 for NameError#to_s method when used on objects ruby: unintentional file creation caused by inserting an illegal NUL character
[ "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::client_workstation", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
RHSA-2013:1210
Red Hat Security Advisory: rhevm security and bug fix update
ovirt-engine: RedirectServlet cross-site scripting flaw
[ "cpe:/a:redhat:rhev_manager:3" ]
null
null
null
null
RHSA-2024:2987
Red Hat Security Advisory: python27:2.7 security update
pypa-setuptools: Regular Expression Denial of Service (ReDoS) in package_index.py python: use after free in heappushpop() of heapq module python: XML External Entity in XML processing plistlib module python-urllib3: Cookie request header isn't stripped during cross-origin redirects jinja2: HTML attribute injection when passing user input as keys to xmlattr filter
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
5.4
null
null
RHSA-2009:1585
Red Hat Security Advisory: samba3x security and bug fix update
Samba improper file access Samba: Share restriction bypass via home-less directory user account(s) samba: infinite loop flaw in smbd on unexpected oplock break notification reply samba: information disclosure in suid mount.cifs
[ "cpe:/a:redhat:rhel_extras:5::client", "cpe:/a:redhat:rhel_extras:5::server" ]
null
null
null
null
RHSA-2021:2205
Red Hat Security Advisory: Red Hat OpenStack Platform 10.0 (openvswitch) security update
lldpd: buffer overflow in the lldp_decode function in daemon/protocols/lldp.c
[ "cpe:/a:redhat:openstack:10::el7" ]
null
9.8
null
null
RHSA-2024:0710
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.4.15 Security update
jgit: arbitrary file overwrite santuario: Private Key disclosure in debug-log output
[ "cpe:/a:redhat:jboss_enterprise_application_platform:7.4::el7" ]
null
6.5
null
null
RHSA-2023:3366
Red Hat Security Advisory: OpenShift Container Platform 4.13.2 packages and security update
golang: crash in a golang.org/x/crypto/ssh server golang: path/filepath: path-filepath filepath.Clean path traversal golang: crypto/tls: large handshake records may cause panics golang: net/http, net/textproto: denial of service from excessive memory allocation golang: go/parser: Infinite loop in parsing golang: html/template: backticks not treated as string delimiters golang: html/template: improper sanitization of CSS values golang: html/template: improper handling of JavaScript whitespace golang: html/template: improper handling of empty HTML attributes
[ "cpe:/a:redhat:openshift:4.13::el8", "cpe:/a:redhat:openshift:4.13::el9", "cpe:/a:redhat:openshift_ironic:4.13::el9" ]
null
7.3
null
null
RHSA-2021:0774
Red Hat Security Advisory: kernel-rt security and bug fix update
kernel: bad kfree in auditfilter.c may lead to escalation of privilege kernel: performance counters race condition use-after-free kernel: Local buffer overflow in ctnetlink_parse_tuple_filter in net/netfilter/nf_conntrack_netlink.c kernel: ICMP rate limiting can be used for DNS poisoning attack kernel: locking issue in drivers/tty/tty_jobctrl.c can lead to an use-after-free
[ "cpe:/a:redhat:rhel_eus:8.2::nfv", "cpe:/a:redhat:rhel_eus:8.2::realtime" ]
null
7.8
null
null
RHSA-2022:7283
Red Hat Security Advisory: libksba security update
libksba: integer overflow may lead to remote code execution
[ "cpe:/o:redhat:rhel_aus:8.2::baseos", "cpe:/o:redhat:rhel_e4s:8.2::baseos", "cpe:/o:redhat:rhel_tus:8.2::baseos" ]
null
8.6
null
null
RHSA-2021:1469
Red Hat Security Advisory: bind security update
bind: An assertion check can fail while answering queries for DNAME records that require the DNAME to be processed to resolve itself
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
7.5
null
null
RHSA-2007:1059
Red Hat Security Advisory: pcre security update
pcre miscalculation of memory requirements for malformed Posix character class pcre miscalculation of memory requirements for repeated subpattern containing a named recursion or subroutine reference pcre integer overflow pcre miscalculation of memory requirements if options are changed during pattern compilation
[ "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::client_workstation", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
RHSA-2019:1851
Red Hat Security Advisory: OpenShift Container Platform 3.11 security update
web-console: XSS in OAuth server /oauth/token/request endpoint jenkins-plugin-token-macro: XML External Entity processing the ${XML} macro kube-apiserver: DoS with crafted patch of type json-patch
[ "cpe:/a:redhat:openshift:3.11::el7" ]
null
null
6.5
null
RHSA-2014:0522
Red Hat Security Advisory: mariadb55-mariadb security update
mysql: unspecified DoS related to XML (CPU April 2014) mysql: unspecified DoS related to Partition (CPU April 2014) mysql: unspecified DoS related to Performance Schema (CPU April 2014) mysql: unspecified DoS related to Options (CPU April 2014) mysql: unspecified DoS related to Federated (CPU April 2014) mysql: unspecified vulnerability related to RBR (CPU April 2014) mysql: unspecified DoS related to Replication (CPU April 2014)
[ "cpe:/a:redhat:rhel_software_collections:1::el6" ]
null
null
null
null
RHSA-2015:0776
Red Hat Security Advisory: docker security update
docker: regression of CVE-2014-5277
[ "cpe:/a:redhat:rhel_extras_other:7" ]
null
null
null
null
RHSA-2018:1320
Red Hat Security Advisory: Red Hat OpenShift Application Runtimes security and bug fix update
spring-framework: Directory traversal vulnerability with static resources on Windows filesystems spring-framework: Multipart content pollution spring-framework: Address partial fix for CVE-2018-1270 tomcat: Incorrect handling of empty string URL in security constraints can lead to unintended exposure of resources tomcat: Late application of security constraints can lead to resource exposure for unauthorised users
[ "cpe:/a:redhat:openshift_application_runtimes:1.0" ]
null
null
4.8
null
RHSA-2021:4613
Red Hat Security Advisory: Red Hat JBoss Core Services Apache HTTP Server 2.4.37 SP10 security update
httpd: mod_proxy_wstunnel tunneling of non Upgraded connection pcre: Buffer over-read in JIT when UTF is disabled and \X or \R has fixed quantifier greater than 1 httpd: mod_proxy NULL pointer dereference pcre: Integer overflow when parsing callout numeric arguments httpd: Single zero byte stack overflow in mod_auth_digest JBCS: URL normalization issue with dot-dot-semicolon(s) leads to information disclosure openssl: Read buffer overruns processing ASN.1 strings openssl: integer overflow in CipherUpdate openssl: NULL pointer dereference in X509_issuer_and_serial_hash() httpd: mod_session: NULL pointer dereference when parsing Cookie header httpd: mod_session: Heap overflow via a crafted SessionHeader value httpd: Unexpected URL matching with 'MergeSlashes OFF' httpd: NULL pointer dereference via malformed requests
[ "cpe:/a:redhat:jboss_core_services:1" ]
null
7.5
null
null
RHSA-2012:0107
Red Hat Security Advisory: kernel security and bug fix update
kernel: ext4: ext4_ext_insert_extent() kernel oops kernel: jbd2: unmapped buffer with _Unwritten or _Delay flags set can lead to DoS kernel: possible privilege escalation via SG_IO ioctl kernel: futex: clear robust_list on execve kernel: igmp: Avoid zero delay when receiving odd mixture of IGMP queries
[ "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
RHSA-2006:0264
Red Hat Security Advisory: sendmail security update
security flaw
[ "cpe:/o:redhat:enterprise_linux:3::as", "cpe:/o:redhat:enterprise_linux:3::desktop", "cpe:/o:redhat:enterprise_linux:3::es", "cpe:/o:redhat:enterprise_linux:3::ws", "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws" ]
null
null
null
null
RHSA-2018:3054
Red Hat Security Advisory: libreoffice security and bug fix update
libreoffice: Use-after-free in sdstor/stgstrms.cxx:StgSmallStrm class allows for denial of service with crafted document libreoffice: Out of bounds write in filter/ww8/ww8toolbar.cxx:SwCTBWrapper class allows for denial of service with crafted document libreoffice: Information disclosure via SMB connection embedded in malicious file
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
4.3
null
RHSA-2024:3318
Red Hat Security Advisory: kernel security update
kernel: nf_tables: use-after-free vulnerability in the nft_verdict_init() function
[ "cpe:/o:redhat:rhel_aus:7.6::server" ]
null
7.8
null
null
RHSA-2023:4410
Red Hat Security Advisory: mod_auth_openidc:2.3 security update
cjose: AES GCM decryption uses the Tag length from the actual Authentication Tag provided in the JWE
[ "cpe:/a:redhat:rhel_aus:8.2::appstream", "cpe:/a:redhat:rhel_e4s:8.2::appstream", "cpe:/a:redhat:rhel_tus:8.2::appstream" ]
null
7.5
null
null
RHSA-2025:1767
Red Hat Security Advisory: mysql security update
mysql: Thread Pooling unspecified vulnerability (CPU Jan 2025)
[ "cpe:/a:redhat:rhel_eus:9.2::appstream", "cpe:/a:redhat:rhel_eus:9.2::crb" ]
null
7.5
null
null
RHSA-2024:8717
Red Hat Security Advisory: Satellite 6.13.7.3 Async Update
foreman: Read-only access to entire DB from templates
[ "cpe:/a:redhat:satellite:6.13::el8", "cpe:/a:redhat:satellite_capsule:6.13::el8", "cpe:/a:redhat:satellite_maintenance:6.13::el8", "cpe:/a:redhat:satellite_utils:6.13::el8" ]
null
6.3
null
null
RHSA-2020:0961
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.3 security update
thrift: Endless loop when feed with specific input data thrift: Out-of-bounds read related to TJSONProtocol or TSimpleJSONProtocol wildfly: The 'enabled-protocols' value in legacy security is not respected if OpenSSL security provider is in use undertow: AJP File Read/Inclusion Vulnerability
[ "cpe:/a:redhat:jboss_enterprise_application_platform:7.3" ]
null
7.6
7.4
null
RHSA-2024:9644
Red Hat Security Advisory: squid:4 security update
squid: vulnerable to a Denial of Service attack against Cache Manager error responses squid: Denial of Service processing ESI response content
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
7.5
null
null
RHSA-2023:1908
Red Hat Security Advisory: java-1.8.0-openjdk security update
OpenJDK: improper connection handling during TLS handshake (8294474) OpenJDK: missing string checks for NULL characters (8296622) OpenJDK: incorrect handling of NULL characters in ProcessBuilder (8295304) OpenJDK: Swing HTML parsing issue (8296832) OpenJDK: incorrect enqueue of references in garbage collector (8298191) OpenJDK: certificate validation issue in TLS session negotiation (8298310) OpenJDK: missing check for slash characters in URI-to-path conversion (8298667)
[ "cpe:/a:redhat:enterprise_linux:8::appstream", "cpe:/a:redhat:enterprise_linux:8::crb" ]
null
3.7
null
null
RHSA-2023:3432
Red Hat Security Advisory: webkit2gtk3 security update
webkitgtk: an out-of-bounds read when processing malicious content webkitgtk: a use-after-free when processing maliciously crafted web content
[ "cpe:/a:redhat:enterprise_linux:9::appstream" ]
null
8.8
null
null
RHSA-2004:383
Red Hat Security Advisory: glibc security update
security flaw
[ "cpe:/o:redhat:enterprise_linux:2.1::as", "cpe:/o:redhat:enterprise_linux:2.1::aw", "cpe:/o:redhat:enterprise_linux:2.1::es", "cpe:/o:redhat:enterprise_linux:2.1::ws" ]
null
null
null
null
RHSA-2018:0060
Red Hat Security Advisory: qemu-kvm-rhev security update
An update for qemu-kvm-rhev is now available for Red Hat OpenStack Platform 12.0 (Pike). Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
[ "cpe:/a:redhat:openstack:12::el7" ]
null
null
null
null
RHSA-2023:6021
Red Hat Security Advisory: varnish:6 security update
HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack)
[ "cpe:/a:redhat:rhel_aus:8.4::appstream", "cpe:/a:redhat:rhel_e4s:8.4::appstream", "cpe:/a:redhat:rhel_tus:8.4::appstream" ]
null
7.5
null
null
RHSA-2012:1225
Red Hat Security Advisory: java-1.7.0-oracle security update
OpenJDK: AWT hardening fixes (AWT, 7163201) OpenJDK: beans ClassFinder insufficient permission checks (beans, 7162476) OpenJDK: beans MethodElementHandler insufficient permission checks (beans, 7194567) OpenJDK: beans insufficient permission checks, Java 7 0day (beans, 7162473)
[ "cpe:/a:redhat:rhel_extras:6" ]
null
null
null
null
RHSA-2014:1042
Red Hat Security Advisory: java-1.7.1-ibm security update
JDK: Java CMS keystore provider potentially allows brute-force private key recovery JDK: Privilege escalation issue JDK: unspecified vulnerability fixed in 7u65 and 8u11 (Deployment) OpenJDK: SubjectDelegator protection insufficient (JMX, 8029755) OpenJDK: Clone interfaces passed to proxy methods (Libraries, 8035009) OpenJDK: Bytecode verification does not prevent ctor calls to this() and super() (Hotspot, 8035119) JDK: unspecified vulnerability fixed in 7u65 and 8u11 (Deployment) OpenJDK: MethodHandles.Lookup insufficient modifiers checks (Libraries, 8035788) JDK: unspecified vulnerability fixed in 6u81, 7u65 and 8u11 (Deployment) OpenJDK: RSA blinding issues (Security, 8031346) OpenJDK: Prevent instantiation of service with non-public constructor (Security, 8035004) OpenJDK: AtomicReferenceFieldUpdater missing primitive type check (Libraries, 8039520) OpenJDK: insufficient Diffie-Hellman public key validation (Security, 8037162) JDK: unspecified vulnerability fixed in 6u81, 7u65 and 8u11 (Deployment) OpenJDK: InfoBuilder incorrect return values (Serviceability, 8033301)
[ "cpe:/a:redhat:rhel_extras:7" ]
null
null
null
null
RHSA-2024:8802
Red Hat Security Advisory: openexr security update
OpenEXR: Heap Overflow in Scanline Deep Data Parsing
[ "cpe:/a:redhat:rhel_e4s:9.0::appstream" ]
null
9.1
null
null
RHSA-2005:569
Red Hat Security Advisory: zlib security update
zlib DoS
[ "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws" ]
null
null
null
null
RHSA-2016:2597
Red Hat Security Advisory: firewalld security, bug fix, and enhancement update
firewalld: Firewall configuration can be modified by any logged in user
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
6.1
null
RHSA-2022:6921
Red Hat Security Advisory: expat security update
expat: a use-after-free in the doContent function in xmlparse.c
[ "cpe:/o:redhat:rhel_els:6" ]
null
8.1
null
null
RHSA-2017:1390
Red Hat Security Advisory: samba security update
samba: Loading shared modules from any path in the system leading to RCE (SambaCry)
[ "cpe:/o:redhat:rhel_aus:6.4::server", "cpe:/o:redhat:rhel_aus:6.5::server", "cpe:/o:redhat:rhel_aus:6.6::server", "cpe:/o:redhat:rhel_eus:6.7::computenode", "cpe:/o:redhat:rhel_eus:6.7::server", "cpe:/o:redhat:rhel_eus:7.1::server", "cpe:/o:redhat:rhel_eus:7.2::computenode", "cpe:/o:redhat:rhel_eus:7.2::server", "cpe:/o:redhat:rhel_mission_critical:6.2::server", "cpe:/o:redhat:rhel_tus:6.5::server", "cpe:/o:redhat:rhel_tus:6.6::server" ]
null
null
7.5
null
RHSA-2021:2865
Red Hat Security Advisory: RHV Manager (ovirt-engine) security update [ovirt-4.4.7]
nodejs-ua-parser-js: Regular expression denial of service via the regex nodejs-glob-parent: Regular expression denial of service nodejs-path-parse: ReDoS via splitDeviceRe, splitTailRe and splitPathRe nodejs-underscore: Arbitrary code execution via the template function
[ "cpe:/a:redhat:rhev_manager:4.4:el8" ]
null
7.2
null
null
RHSA-2020:5344
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.3.4 security update
hibernate-core: SQL injection vulnerability when both hibernate.use_sql_comments and JPQL String literals are used wildfly-openssl: memory leak per HTTP session creation in WildFly OpenSSL jackson-databind: FasterXML DOMDeserializer insecure entity expansion is vulnerable to XML external entity (XXE)
[ "cpe:/a:redhat:jboss_enterprise_application_platform:7.3" ]
null
7.5
null
null
RHSA-2024:6765
Red Hat Security Advisory: Red Hat Ansible Automation Platform 2.4 Product Security and Bug Fix Update
pulpcore: RBAC permissions incorrectly assigned in tasks that create objects golang: net: malformed DNS message can cause infinite loop golang: net/netip: Unexpected behavior from Is methods for IPv4-mapped IPv6 addresses urllib3: proxy-authorization request header is not stripped during cross-origin redirects
[ "cpe:/a:redhat:ansible_automation_platform:2.4::el8", "cpe:/a:redhat:ansible_automation_platform:2.4::el9", "cpe:/a:redhat:ansible_automation_platform_developer:2.4::el8", "cpe:/a:redhat:ansible_automation_platform_developer:2.4::el9", "cpe:/a:redhat:ansible_automation_platform_inside:2.4::el8", "cpe:/a:redhat:ansible_automation_platform_inside:2.4::el9" ]
null
4.4
6.7
null
RHSA-2020:0796
Red Hat Security Advisory: OpenShift Container Platform 3.11 openshift-enterprise-apb-base-container security update
openshift/apb-base: /etc/passwd is given incorrect privileges
[ "cpe:/a:redhat:openshift:3.11::el7" ]
null
7
null
null
RHSA-2018:1170
Red Hat Security Advisory: kernel-rt security and bug fix update
kernel: Use-after-free vulnerability in DCCP socket kernel: Incorrect type conversion for size during dma allocation kernel: v4l2: disabled memory access protection mechanism allowing privilege escalation kernel: Use-after-free in snd_seq_ioctl_create_port() kernel: Missing namespace check in net/netlink/af_netlink.c allows for network monitors to observe systemwide activity kernel: netfilter: use-after-free in tcpmss_mangle_packet function in net/netfilter/xt_TCPMSS.c kernel: Stack information leak in the EFS element
[ "cpe:/a:redhat:enterprise_mrg:2:server:el6" ]
null
null
6.5
null
RHSA-2024:4982
Red Hat Security Advisory: OpenShift API for Data Protection (OADP) 1.3.3 security and bug fix update
golang: net/http, x/net/http2: unlimited number of CONTINUATION frames causes DoS golang: net: malformed DNS message can cause infinite loop golang: archive/zip: Incorrect handling of certain ZIP files golang: net/netip: Unexpected behavior from Is methods for IPv4-mapped IPv6 addresses
[ "cpe:/a:redhat:openshift_api_data_protection:1.3::el9" ]
null
6.7
null
null
RHSA-2022:6967
Red Hat Security Advisory: compat-expat1 security update
expat: a use-after-free in the doContent function in xmlparse.c
[ "cpe:/o:redhat:rhel_els:6" ]
null
8.1
null
null
RHSA-2024:3421
Red Hat Security Advisory: kernel security and bug fix update
kernel: Use-after-free in nft_verdict_dump due to a race between set GC and transaction kernel: Marvin vulnerability side-channel leakage in the RSA decryption operation kernel: inactive elements in nft_pipapo_walk kernel: netfilter: nftables: exthdr: fix 4-byte stack OOB write kernel: nf_tables: use-after-free vulnerability in the nft_verdict_init() function hw: amd: Instruction raise #VC exception at exit hw: amd: Instruction raise #VC exception at exit kernel: mlxsw: spectrum_acl_tcam: Fix stack corruption
[ "cpe:/a:redhat:rhel_eus:9.0::appstream", "cpe:/a:redhat:rhel_eus:9.0::crb", "cpe:/o:redhat:rhel_eus:9.0::baseos" ]
null
6.7
null
null
RHSA-2015:1893
Red Hat Security Advisory: flash-plugin security update
flash-plugin: information leak and hardening fixes in APSB15-25 flash-plugin: multiple code execution issues fixed in APSB15-25 flash-plugin: multiple code execution issues fixed in APSB15-25 flash-plugin: multiple code execution issues fixed in APSB15-25 flash-plugin: information leak and hardening fixes in APSB15-25 flash-plugin: multiple code execution issues fixed in APSB15-25 flash-plugin: multiple code execution issues fixed in APSB15-25 flash-plugin: multiple code execution issues fixed in APSB15-25 flash-plugin: multiple code execution issues fixed in APSB15-25 flash-plugin: multiple code execution issues fixed in APSB15-25 flash-plugin: multiple code execution issues fixed in APSB15-25 flash-plugin: multiple code execution issues fixed in APSB15-25 flash-plugin: multiple code execution issues fixed in APSB15-25 flash-plugin: multiple code execution issues fixed in APSB15-25 flash-plugin: multiple code execution issues fixed in APSB15-25 flash-plugin: multiple code execution issues fixed in APSB15-25 flash-plugin: multiple code execution issues fixed in APSB15-25 flash-plugin: multiple code execution issues fixed in APSB15-25 flash-plugin: multiple code execution issues fixed in APSB15-25 flash-plugin: multiple code execution issues fixed in APSB15-25 flash-plugin: multiple code execution issues fixed in APSB15-25
[ "cpe:/a:redhat:rhel_extras:6" ]
null
null
null
null
RHSA-2020:0566
Red Hat Security Advisory: python-pillow security update
python-pillow: reading specially crafted image files leads to allocation of large amounts of memory and denial of service python-pillow: out-of-bounds write in expandrow in libImaging/SgiRleDecode.c python-pillow: improperly restricted operations on memory buffer in libImaging/PcxDecode.c
[ "cpe:/a:redhat:rhel_e4s:8.0::appstream" ]
null
9.8
null
null
RHSA-2023:7288
Red Hat Security Advisory: Red Hat Product OCP Tools 4.14 Openshift Jenkins security update
snakeyaml: Denial of Service due to missing nested depth limitation for collections maven-shared-utils: Command injection via Commandline class apache-commons-text: variable interpolation RCE jenkins-2-plugins/script-security: Sandbox bypass vulnerability in Script Security Plugin jenkins-2-plugins/JUnit: Stored XSS vulnerability in JUnit Plugin jenkins-2-plugins/pipeline-build-step: Stored XSS vulnerability in Pipeline: Build Step Plugin golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487) HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack)
[ "cpe:/a:redhat:ocp_tools:4.14::el8" ]
null
7.5
null
null
RHSA-2024:9943
Red Hat Security Advisory: kernel-rt security update
kernel: iommu: Fix potential use-after-free during probe kernel: blk-mq: fix IO hang from sbitmap wakeup race kernel: mptcp: pm: Fix uaf in __timer_delete_sync
[ "cpe:/a:redhat:rhel_e4s:9.0::nfv", "cpe:/a:redhat:rhel_e4s:9.0::realtime" ]
null
7
null
null
RHSA-2024:3621
Red Hat Security Advisory: Red Hat OpenShift distributed tracing 3.2.0 operator/operand containers update
go-resty: HTTP request body disclosure in github.com/go-resty/resty/v2 golang: net/http, x/net/http2: unlimited number of CONTINUATION frames causes DoS golang: net/http/cookiejar: incorrect forwarding of sensitive headers and cookies on HTTP redirect golang: net/http: golang: mime/multipart: golang: net/textproto: memory exhaustion in Request.ParseMultipartForm golang: crypto/x509: Verify panics on certificates with an unknown public key algorithm golang: net/mail: comments in display names are incorrectly handled golang: html/template: errors returned from MarshalJSON methods may break template escaping golang-protobuf: encoding/protojson, internal/encoding/json: infinite loop in protojson.Unmarshal when unmarshaling certain forms of invalid JSON
[ "cpe:/a:redhat:openshift_distributed_tracing:3.2::el8" ]
null
5.9
null
null
RHSA-2015:2541
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 6.4.5 update
EAP: missing authorization check for Monitor/Deployer/Auditor role when shutting down server apache-commons-collections: InvokerTransformer code execution during deserialisation
[ "cpe:/a:redhat:jboss_enterprise_application_platform:6.4" ]
null
null
null
null
RHSA-2024:3494
Red Hat Security Advisory: OpenShift Container Platform 4.13.43 security update
golang.org/x/net/http2: avoid quadratic complexity in HPACK decoding
[ "cpe:/a:redhat:openshift:4.13::el8", "cpe:/a:redhat:openshift:4.13::el9" ]
null
7.5
null
null
RHSA-2018:3459
Red Hat Security Advisory: kernel security, bug fix, and enhancement update
kernel: out-of-bounds access in the show_timer function in kernel/time/posix-timers.c kernel: IP fragments with random offsets allow a remote denial of service (FragmentSmack)
[ "cpe:/o:redhat:rhel_eus:7.5::computenode", "cpe:/o:redhat:rhel_eus:7.5::server" ]
null
null
7.5
null
RHSA-2024:2913
Red Hat Security Advisory: thunderbird security update
Mozilla: Arbitrary JavaScript execution in PDF.js Mozilla: IndexedDB files retained in private browsing mode Mozilla: Potential permissions request bypass via clickjacking Mozilla: Cross-origin responses could be distinguished between script and non-script content-types Mozilla: Use-after-free could occur when printing to PDF Mozilla: Memory safety bugs fixed in Firefox 126, Firefox ESR 115.11, and Thunderbird 115.11
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
6.1
null
null
RHSA-2023:0287
Red Hat Security Advisory: sudo security update
sudo: arbitrary file write with privileges of the RunAs user
[ "cpe:/o:redhat:rhel_els:6" ]
null
7.8
null
null
RHSA-2009:0008
Red Hat Security Advisory: dbus security update
dbus denial of service
[ "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::client_workstation", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
RHSA-2017:0214
Red Hat Security Advisory: nagios security update
snoopy: incomplete fixes for command execution flaws snoopy: incomplete fixes for command execution flaws snoopy: incomplete fixes for command execution flaws nagios: Command injection via curl in MagpieRSS nagios: Privilege escalation issue
[ "cpe:/a:redhat:openstack:7::el7" ]
null
null
7.3
null
RHSA-2020:1267
Red Hat Security Advisory: nss-softokn security update
ROHNP: Key Extraction Side Channel in Multiple Crypto Libraries nss: Out-of-bounds write when passing an output buffer smaller than the block size to NSC_EncryptUpdate
[ "cpe:/o:redhat:rhel_eus:7.5::computenode", "cpe:/o:redhat:rhel_eus:7.5::server" ]
null
null
8.1
null
RHSA-2019:0638
Red Hat Security Advisory: openwsman security update
openwsman: Disclosure of arbitrary files outside of the registered URIs
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
7.5
null
RHSA-2024:9989
Red Hat Security Advisory: RHOSP 17.1.4 (python-webob) security update
webob: WebOb's location header normalization during redirect leads to open redirect
[ "cpe:/a:redhat:openstack:17.1::el8" ]
null
6.1
null
null
RHSA-2022:1476
Red Hat Security Advisory: Red Hat Advanced Cluster Management 2.4.3 security updates and bug fixes
cached-path-relative: Prototype Pollution via the cache variable nanoid: Information disclosure via valueOf() function opencontainers: OCI manifest and index parsing confusion golang.org/x/crypto: empty plaintext packet causes panic nodejs-shelljs: improper privilege management follow-redirects: Exposure of Private Personal Information to an Unauthorized Actor node-fetch: exposure of sensitive information to an unauthorized actor follow-redirects: Exposure of Sensitive Information via Authorization Header leak openssl: Infinite loop in BN_mod_sqrt() reachable when parsing certificates nats-server: misusing the "dynamically provisioned sandbox accounts" feature authenticated user can obtain the privileges of the System account imgcrypt: Unauthorized access to encryted container image on a shared system due to missing check in CheckAuthorization() code path golang: crash in a golang.org/x/crypto/ssh server
[ "cpe:/a:redhat:acm:2.4::el8" ]
null
7.5
null
null
RHSA-2023:0848
Red Hat Security Advisory: php:8.0 security update
php: potential buffer overflow in php_cli_server_startup_workers php: phar: infinite loop when decompressing quine gzip file php: standard insecure cookie could be treated as a '__Host-' or '__Secure-' cookie by PHP applications php: OOB read due to insufficient input validation in imageloadfont() php: PDO:: quote() may return unquoted string due to an integer overflow XKCP: buffer overflow in the SHA-3 reference implementation
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
8.1
null
null
RHSA-2022:0445
Red Hat Security Advisory: Red Hat Single Sign-On 7.4.10 on OpenJ9 for OpenShift image security update
log4j: Remote code execution in Log4j 1.x when application is configured to use JMSAppender log4j: Remote code execution in Log4j 1.x when application is configured to use JMSSink log4j: SQL injection in Log4j 1.x when application is configured to use JDBCAppender log4j: Unsafe deserialization flaw in Chainsaw log viewer
[ "cpe:/a:redhat:rhosemc:1.0::el8" ]
null
8.8
null
null
RHSA-2015:1657
Red Hat Security Advisory: rh-ruby22-ruby security update
rubygems: DNS hijacking vulnerability in api_endpoint()
[ "cpe:/a:redhat:rhel_software_collections:2::el6", "cpe:/a:redhat:rhel_software_collections:2::el7" ]
null
null
null
null
RHSA-2022:5101
Red Hat Security Advisory: Red Hat AMQ Broker 7.10.0 release and security update
nodejs-lodash: prototype pollution in defaultsDeep function leading to modifying properties jackson-databind: denial of service via a large depth of nested objects Broker: Malformed message can result in partial DoS (OOM) netty: control chars in header names may lead to HTTP request smuggling amq: AMQ Broker Operator ClusterWide Edit Permissions Due Token Exposure Framework: Data Binding Rules Vulnerability artemis-commons: Apache ActiveMQ Artemis DoS
[ "cpe:/a:redhat:amq_broker:7" ]
null
7.5
9.1
null
RHSA-2023:5841
Red Hat Security Advisory: httpd24-nghttp2 security update
HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack)
[ "cpe:/a:redhat:rhel_software_collections:3::el7" ]
null
7.5
null
null
RHSA-2015:1176
Red Hat Security Advisory: Red Hat JBoss Fuse 6.2.0 update
async-http-client: SSL/TLS certificate verification is disabled under certain conditions async-http-client: missing hostname verification for SSL certificates smack: incorrect X.509 certificate validation smack: IQ response spoofing CXF: SSL hostname verification bypass, incomplete CVE-2012-6153 fix JClouds: predictable tmp file creation in ScriptBuilder Statements smack: MitM vulnerability Fuse: insufficient access permissions checks when accessing Hawtio console wss4j: Apache WSS4J is vulnerable to Bleichenbacher's attack (incomplete fix for CVE-2011-2487) wss4j: Apache WSS4J doesn't correctly enforce the requireSignedEncryptedDataElements property Java: PKIX Trust Engines Exhibit Critical Flaw In Trusted Names Evaluation activemq: Fileserver web application vulnerability allowing RCE
[ "cpe:/a:redhat:jboss_fuse:6.2.0" ]
null
null
4.8
null
RHSA-2023:0506
Red Hat Security Advisory: pcs security update
sinatra: Reflected File Download attack
[ "cpe:/a:redhat:rhel_eus:8.4::highavailability", "cpe:/a:redhat:rhel_eus:8.4::resilientstorage" ]
null
8.8
null
null
RHSA-2012:1097
Red Hat Security Advisory: glibc security and bug fix update
glibc: printf() unbound alloca() usage in case of positional parameters + many format specs
[ "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
RHSA-2023:6282
Red Hat Security Advisory: insights-client security update
insights-client: unsafe handling of temporary files and directories
[ "cpe:/a:redhat:enterprise_linux:9::appstream" ]
null
7.8
null
null
RHSA-2015:2131
Red Hat Security Advisory: openldap security, bug fix, and enhancement update
openldap: crash in ldap_domain2hostlist when processing SRV records openldap: incorrect multi-keyword mode cipherstring parsing
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
3.7
null
RHSA-2023:4032
Red Hat Security Advisory: python38:3.8 and python38-devel:3.8 security update
python: urllib.parse url blocklisting bypass
[ "cpe:/a:redhat:rhel_eus:8.6::appstream", "cpe:/a:redhat:rhel_eus:8.6::crb" ]
null
7.5
null
null
RHSA-2007:0980
Red Hat Security Advisory: seamonkey security update
security flaw security flaw security flaw about: blank windows security flaw security flaw security flaw security flaw security flaw
[ "cpe:/o:redhat:enterprise_linux:2.1::as", "cpe:/o:redhat:enterprise_linux:2.1::aw", "cpe:/o:redhat:enterprise_linux:2.1::es", "cpe:/o:redhat:enterprise_linux:2.1::ws", "cpe:/o:redhat:enterprise_linux:3::as", "cpe:/o:redhat:enterprise_linux:3::desktop", "cpe:/o:redhat:enterprise_linux:3::es", "cpe:/o:redhat:enterprise_linux:3::ws", "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws" ]
null
null
null
null
RHSA-2017:0193
Red Hat Security Advisory: Red Hat JBoss Core Services Apache HTTP Server 2.4.23 Release on RHEL 6
openssl: Memory corruption in the ASN.1 encoder openssl: Possible integer overflow vulnerabilities in codebase openssl: Non-constant time codepath followed for certain operations in DSA implementation mod_cluster: Buffer overflow in mod_manager when sending request with long JVMRoute mod_jk: Buffer overflow when concatenating virtual host name and URI mod_cluster: Protocol parsing logic error
[ "cpe:/a:redhat:jboss_core_services:1::el6" ]
null
null
4.3
null
RHSA-2021:3810
Red Hat Security Advisory: libxml2 security update
libxml2: Use after free via namespace node in XPointer ranges
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
5.3
null
RHSA-2019:2506
Red Hat Security Advisory: redis security update
redis: Heap buffer overflow in HyperLogLog triggered by malicious client
[ "cpe:/a:redhat:openstack-optools:9::el7" ]
null
null
7.2
null
RHSA-2020:2249
Red Hat Security Advisory: .NET Core on Red Hat Enterprise Linux security and bug fix update
dotnet: Denial of service via untrusted input dotnet: Denial of service due to infinite loop
[ "cpe:/a:redhat:rhel_dotnet:3.1::el7" ]
null
7.5
null
null
RHSA-2023:1785
Red Hat Security Advisory: firefox security update
Mozilla: Memory Corruption in Safe Browsing Code Mozilla: libwebp: Double-free in libwebp Mozilla: Fullscreen notification obscured Mozilla: Potential Memory Corruption following Garbage Collector compaction Mozilla: Invalid free from JavaScript code Mozilla: Content-Disposition filename truncation leads to Reflected File Download Mozilla: Files with malicious extensions could have been downloaded unsafely on Linux Mozilla: Incorrect optimization result on ARM64 Mozilla: Memory safety bugs fixed in Firefox 112 and Firefox ESR 102.10
[ "cpe:/a:redhat:rhel_eus:9.0::appstream" ]
null
8.8
null
null
RHSA-2017:0091
Red Hat Security Advisory: kernel-rt security and bug fix update
kernel: Use after free in tcp_xmit_retransmit_queue kernel: Use-after-free in the recvmmsg exit path kernel: Slab out-of-bounds access in sctp_sf_ootb()
[ "cpe:/a:redhat:rhel_extras_rt:7" ]
null
null
5.9
null
RHSA-2010:0606
Red Hat Security Advisory: kernel security and bug fix update
kernel: cifs: Fix a kernel BUG with remote OS/2 server kernel: nfsd4: bug in read_buf
[ "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws" ]
null
null
null
null
RHSA-2023:3151
Red Hat Security Advisory: thunderbird security update
Mozilla: Browser prompts could have been obscured by popups Mozilla: Crash in RLBox Expat driver Mozilla: Potential permissions request bypass via clickjacking Mozilla: Content process crash due to invalid wasm code Mozilla: Potential spoof due to obscured address bar Mozilla: Potential memory corruption in FileReader::DoReadData() Mozilla: Memory safety bugs fixed in Firefox 113 and Firefox ESR 102.11
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
8.8
null
null
RHBA-2024:1440
Red Hat Bug Fix Advisory: MTV 2.5.6 Images
golang: net/http/internal: Denial of Service (DoS) via Resource Consumption via HTTP requests nodejs-ip: arbitrary code execution via the isPublic() function
[ "cpe:/a:redhat:migration_toolkit_virtualization:2.5::el8", "cpe:/a:redhat:migration_toolkit_virtualization:2.5::el9" ]
null
9.8
null
null
RHSA-2019:3048
Red Hat Security Advisory: RH-SSO 7.3.4 adapters for Enterprise Application Platform 6 security update
keycloak: adapter endpoints are exposed via arbitrary URLs
[ "cpe:/a:redhat:jboss_enterprise_application_platform:6::el6", "cpe:/a:redhat:jboss_enterprise_application_platform:6::el7" ]
null
null
4.3
null
RHSA-2007:0150
Red Hat Security Advisory: freetype security update
Multiple font integer overflows (CVE-2007-1352)
[ "cpe:/o:redhat:enterprise_linux:3::as", "cpe:/o:redhat:enterprise_linux:3::desktop", "cpe:/o:redhat:enterprise_linux:3::es", "cpe:/o:redhat:enterprise_linux:3::ws", "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws", "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::client_workstation", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
RHSA-2023:4409
Red Hat Security Advisory: mod_auth_openidc:2.3 security update
cjose: AES GCM decryption uses the Tag length from the actual Authentication Tag provided in the JWE
[ "cpe:/a:redhat:rhel_aus:8.4::appstream", "cpe:/a:redhat:rhel_e4s:8.4::appstream", "cpe:/a:redhat:rhel_tus:8.4::appstream" ]
null
7.5
null
null
RHSA-2005:004
Red Hat Security Advisory: lesstif security update
openmotif21 stack overflows in libxpm openmotif21 stack overflows in libxpm openmotif21 stack overflows in libxpm
[ "cpe:/o:redhat:enterprise_linux:2.1::as", "cpe:/o:redhat:enterprise_linux:2.1::aw", "cpe:/o:redhat:enterprise_linux:2.1::es", "cpe:/o:redhat:enterprise_linux:2.1::ws" ]
null
null
null
null
RHSA-2019:3757
Red Hat Security Advisory: patch security update
patch: do_ed_script in pch.c does not block strings beginning with a ! character patch: OS shell command injection when processing crafted patch files
[ "cpe:/o:redhat:rhel_eus:7.5::computenode", "cpe:/o:redhat:rhel_eus:7.5::server" ]
null
null
7.8
null
RHSA-2014:0897
Red Hat Security Advisory: Red Hat JBoss Enterprise Web Platform 5.2.0 security update
PicketLink: XXE via insecure DocumentBuilderFactory usage
[ "cpe:/a:redhat:jboss_enterprise_web_platform:5.2.0" ]
null
null
null
null
RHSA-2016:2062
Red Hat Security Advisory: mariadb-galera security update
mysql: general_log can write to configuration files, leading to privilege escalation (CPU Oct 2016)
[ "cpe:/a:redhat:openstack:9::el7" ]
null
null
9.8
null
RHSA-2024:8528
Red Hat Security Advisory: pki-servlet-engine security update
tomcat: Denial of Service in Tomcat
[ "cpe:/a:redhat:rhel_eus:9.0::appstream" ]
null
7.5
null
null
RHSA-2021:3447
Red Hat Security Advisory: kernel security and bug fix update
kernel: powerpc: KVM guest OS users can cause host OS memory corruption kernel: slab-out-of-bounds access in xdr_set_page_base() in net/sunrpc/xdr.c
[ "cpe:/a:redhat:enterprise_linux:8::crb", "cpe:/o:redhat:enterprise_linux:8::baseos" ]
null
7.5
null
null
RHSA-2025:3501
Red Hat Security Advisory: Custom Metrics Autoscaler Operator for Red Hat OpenShift 2.15.1-4 Update
encoding/gob: golang: Calling Decoder.Decode on a message which contains deeply nested structures can cause a panic due to stack exhaustion golang.org/x/oauth2/jws: Unexpected memory consumption during token parsing in golang.org/x/oauth2/jws go-jose: Go JOSE's Parsing Vulnerable to Denial of Service
[ "cpe:/a:redhat:openshift_custom_metrics_autoscaler:2.15::el9" ]
null
7.5
null
null
RHSA-2023:1677
Red Hat Security Advisory: Red Hat Virtualization Host 4.4.z SP 1 security update batch#5 (oVirt-4.5.3-5)
git: gitattributes parsing integer overflow git: Heap overflow in `git archive`, `git log --format` leading to RCE ALSA: pcm: Move rwsem lock inside snd_ctl_elem_read to prevent UAF kernel: FUSE filesystem low-privileged user privileges escalation nss: Arbitrary memory write via PKCS 12
[ "cpe:/o:redhat:rhev_hypervisor:4.4::el8" ]
null
8.8
null
null
RHSA-2014:0921
Red Hat Security Advisory: httpd security update
httpd: mod_cache NULL pointer dereference crash httpd: mod_proxy denial of service httpd: mod_deflate denial of service httpd: mod_status heap-based buffer overflow httpd: mod_cgid denial of service
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
null
null
RHSA-2016:2035
Red Hat Security Advisory: Red Hat JBoss Fuse 6.3 security update
Framework: denial-of-service attack with XML input ObjectMessage: unsafe deserialization camel-xstream: Java object de-serialization vulnerability leads to RCE Camel: Java object deserialisation in Jetty/Servlet bouncycastle: Invalid curve attack allowing to extract private keys JGroups: Authorization bypass bsh2: remote code execution via deserialization shiro: Security constraint bypass
[ "cpe:/a:redhat:jboss_fuse:6.3" ]
null
null
7.3
null
RHSA-2020:5588
Red Hat Security Advisory: openssl security update
openssl: EDIPARTYNAME NULL pointer de-reference
[ "cpe:/o:redhat:rhel_e4s:8.0::baseos" ]
null
5.9
null
null
RHSA-2022:5766
Red Hat Security Advisory: firefox security update
Mozilla: Memory safety bugs fixed in Firefox 103 and 102.1 Mozilla: Directory indexes for bundled resources reflected URL parameters Mozilla: Mouse Position spoofing with CSS transforms
[ "cpe:/a:redhat:rhel_e4s:8.1::appstream" ]
null
7.5
6.1
null
RHSA-2020:3192
Red Hat Security Advisory: Red Hat Fuse 7.7.0 release and security update
netty: Infinite loop vulnerability when handling renegotiation using SslProvider.OpenSsl elasticsearch: Information exposure via _cluster/settings API pdfbox: unbounded computation in parser resulting in a denial of service vertx: WebSocket HTTP upgrade implementation holds the entire http request in memory before the handshake dom4j: XML Injection in Class: Element. Methods: addElement, addAttribute which can impact the integrity of XML documents mina-core: Retaining an open socket in close_notify SSL-TLS leading to Information disclosure. spring-data-jpa: Additional information exposure with Spring Data JPA derived queries HTTP/2: large amount of data requests leads to denial of service hawtio: server side request forgery via initial /proxy/ substring of a URI apache-commons-beanutils: does not suppresses the class property in PropertyUtilsBean by default jackson-mapper-asl: XML external entity similar to CVE-2016-3720 jackson-databind: polymorphic typing issue allows attacker to read arbitrary local files on the server. xml-security: Apache Santuario potentially loads XML parsing code from an untrusted source cxf: OpenId Connect token service does not properly validate the clientId jackson-databind: Serialization gadgets in com.zaxxer.hikari.HikariConfig undertow: possible Denial Of Service (DOS) in Undertow HTTP server listening on HTTPS jackson-databind: Serialization gadgets in classes of the commons-configuration package jackson-databind: Serialization gadgets in classes of the xalan package jackson-databind: Serialization gadgets in com.zaxxer.hikari.HikariDataSource jackson-databind: Serialization gadgets in org.apache.commons.dbcp.datasources.* jackson-databind: Serialization gadgets in com.p6spy.engine.spy.P6DataSource jackson-databind: Serialization gadgets in classes of the ehcache package jackson-databind: Serialization gadgets in org.apache.log4j.receivers.db.* cxf: reflected XSS in the services listing page jackson-databind: lacks certain net.sf.ehcache blocking netty: HTTP request smuggling netty: HttpObjectDecoder.java allows Content-Length header to accompanied by second Content-Length header undertow: AJP File Read/Inclusion Vulnerability undertow: servletPath is normalized incorrectly leading to dangerous application mapping which could result in security bypass apache-commons-configuration: uncontrolled class instantiation when loading YAML files netty: HTTP Request Smuggling due to Transfer-Encoding whitespace mishandling jackson-databind: Lacks certain xbean-reflect/JNDI blocking jackson-databind: Serialization gadgets in shaded-hikari-config jackson-databind: Serialization gadgets in ibatis-sqlmap jackson-databind: Serialization gadgets in anteros-core jackson-databind: mishandles the interaction between serialization gadgets and typing which could result in remote command execution jackson-databind: mishandles the interaction between serialization gadgets and typing which could result in remote command execution Undertow: Incomplete fix for CVE-2017-2666 due to permitting invalid characters in HTTP requests jackson-databind: Serialization gadgets in org.aoju.bus.proxy.provider.*.RmiProvider jackson-databind: Serialization gadgets in javax.swing.JEditorPane jackson-databind: Serialization gadgets in org.apache.activemq.jms.pool.XaPooledConnectionFactory jackson-databind: Serialization gadgets in org.apache.commons.proxy.provider.remoting.RmiProvider jackson-databind: Serialization gadgets in org.apache.openjpa.ee.WASRegistryManagedRuntime jackson-databind: Serialization gadgets in org.springframework:spring-aop jackson-databind: Serialization gadgets in commons-jelly:commons-jelly jackson-databind: serialization in oadd.org.apache.xalan.lib.sql.JNDIConnectionPool jackson-databind: serialization in weblogic/oracle-aqjms jackson-databind: serialization in com.sun.org.apache.xalan.internal.lib.sql.JNDIConnectionPool jackson-databind: serialization in org.jsecurity.realm.jndi.JndiRealmFactory
[ "cpe:/a:redhat:jboss_fuse:7" ]
null
8.1
4.8
null
RHSA-2010:0782
Red Hat Security Advisory: firefox security update
firefox/nss: doesn't handle IP-based wildcards in X509 certificates safely NSS: insecure Diffie-Hellman key exchange Mozilla miscellaneous memory safety hazards Mozilla miscellaneous memory safety hazards Mozilla XSS in gopher parser when parsing hrefs Mozilla cross-site information disclosure via modal calls Mozilla buffer overflow and memory corruption using document.write Mozilla use-after-free error in nsBarProp Mozilla unsafe library loading flaw Mozilla dangling pointer vulnerability in LookupGetterOrSetter
[ "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws", "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::client_workstation", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null