id
stringlengths
13
15
title
stringlengths
29
176
description
stringlengths
8
32.1k
cpes
sequencelengths
0
20
cvss_v4_0
null
cvss_v3_1
float64
0
10
cvss_v3_0
float64
0
10
cvss_v2_0
null
RHSA-2023:1662
Red Hat Security Advisory: kpatch-patch security update
ALSA: pcm: Move rwsem lock inside snd_ctl_elem_read to prevent UAF kernel: net/ulp: use-after-free in listening ULP sockets
[ "cpe:/o:redhat:rhel_eus:8.4::baseos" ]
null
7.8
null
null
RHSA-2022:4867
Red Hat Security Advisory: Satellite Tools 6.9.9 Async Bug Fix Update
puppet: unsafe HTTP redirect puppet: silent configuration failure in agent
[ "cpe:/a:redhat:rhel_satellite_tools:6.9::el6", "cpe:/a:redhat:rhel_satellite_tools:6.9::el7", "cpe:/a:redhat:rhel_satellite_tools:6.9::el8" ]
null
6.3
null
null
RHSA-2007:0934
Red Hat Security Advisory: rhpki-util, rhpki-common, rhpki-ca security update
rhcs CRL can get corrupted
[ "cpe:/a:redhat:certificate_system:7.2" ]
null
null
null
null
RHSA-2023:0839
Red Hat Security Advisory: kpatch-patch security update
kernel: mm/mremap.c use-after-free vulnerability kernel: nfsd buffer overflow by RPC message over TCP with garbage data
[ "cpe:/o:redhat:enterprise_linux:8::baseos" ]
null
7.5
null
null
RHSA-2023:0727
Red Hat Security Advisory: OpenShift Container Platform 4.12.3 security update
golang: archive/tar: github.com/vbatts/tar-split: unbounded memory consumption when reading headers golang: net/http/httputil: ReverseProxy should not forward unparseable query parameters golang: compress/gzip: stack exhaustion in Reader.Read golang: regexp/syntax: limit memory used by parsing regexps haproxy: segfault DoS
[ "cpe:/a:redhat:openshift:4.12::el8", "cpe:/a:redhat:openshift:4.12::el9" ]
null
4.3
null
null
RHSA-2023:5540
Red Hat Security Advisory: libvpx security update
libvpx: Heap buffer overflow in vp8 encoding in libvpx libvpx: crash related to VP9 encoding in libvpx
[ "cpe:/a:redhat:rhel_eus:9.0::appstream", "cpe:/a:redhat:rhel_eus:9.0::crb" ]
null
7.5
null
null
RHSA-2017:0881
Red Hat Security Advisory: v8 security update
V8: integer overflow leading to buffer overflow in Zone::New
[ "cpe:/a:redhat:openstack:7::el7" ]
null
null
5.6
null
RHSA-2017:1399
Red Hat Security Advisory: chromium-browser security update
chromium-browser: type confusion in v8 chromium-browser: out of bounds read in v8 chromium-browser: address spoofing in omnibox chromium-browser: use after free in print preview chromium-browser: use after free in apps bluetooth chromium-browser: information leak in csp reporting chromium-browser: address spoofing in omnibox chromium-browser: heap buffer overflow in skia chromium-browser: possible command injection in mailto handling chromium-browser: ui spoofing in blink chromium-browser: use after free in credit card autofill chromium-browser: extension verification bypass chromium-browser: insufficient hardening in credit card editor chromium-browser: ui spoofing in blink chromium-browser: inappropriate javascript execution on webui pages chromium-browser: address spoofing in omnibox
[ "cpe:/a:redhat:rhel_extras:6" ]
null
null
6.5
null
RHSA-2019:1116
Red Hat Security Advisory: redhat-virtualization-host security update
edk2: Buffer Overflow in BlockIo service for RAM disk
[ "cpe:/o:redhat:enterprise_linux:7::hypervisor" ]
null
null
8.3
null
RHSA-2013:1284
Red Hat Security Advisory: ruby193-puppet security update
puppet: remote code execution on master from unauthenticated clients Puppet: resource_type service code execution Puppet: Local Privilege Escalation/Arbitrary Code Execution
[ "cpe:/a:redhat:openstack:3::el6" ]
null
null
null
null
RHSA-2017:3477
Red Hat Security Advisory: Red Hat JBoss Core Services Apache HTTP Server 2.4.23 security update
httpd: ap_get_basic_auth_pw() authentication bypass httpd: mod_ssl NULL pointer dereference httpd: mod_mime buffer overread httpd: Use-after-free by limiting unregistered HTTP method (Optionsbleed) apr: Out-of-bounds array deref in apr_time_exp*() functions
[ "cpe:/a:redhat:jboss_core_services:1::el6" ]
null
null
7.4
null
RHSA-2007:0674
Red Hat Security Advisory: perl-Net-DNS security update
perl-Net-DNS security issue Net:: DNS denial of service
[ "cpe:/o:redhat:enterprise_linux:3::as", "cpe:/o:redhat:enterprise_linux:3::desktop", "cpe:/o:redhat:enterprise_linux:3::es", "cpe:/o:redhat:enterprise_linux:3::ws", "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
RHSA-2023:3725
Red Hat Security Advisory: less security update
less: crafted data can result in "less -R" not filtering ANSI escape sequences sent to the terminal
[ "cpe:/o:redhat:enterprise_linux:9::baseos" ]
null
7.5
null
null
RHSA-2013:1119
Red Hat Security Advisory: 389-ds-base security and bug fix update
Server: ACLs inoperative in some search scenarios
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
null
null
RHSA-2024:10496
Red Hat Security Advisory: webkit2gtk3 security update
webkitgtk: data isolation bypass vulnerability
[ "cpe:/a:redhat:rhel_e4s:9.0::appstream" ]
null
6.1
null
null
RHSA-2013:0656
Red Hat Security Advisory: krb5 security update
krb5: PKINIT null pointer deref leads to DoS krb5: PKINIT null pointer deref leads to DoS (pkinit_check_kdc_pkid())
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
null
null
RHSA-2024:4450
Red Hat Security Advisory: dotnet8.0 security update
dotnet: DoS in System.Text.Json dotnet: DoS in ASP.NET Core 8 dotnet: DoS when parsing X.509 Content and ObjectIdentifiers
[ "cpe:/a:redhat:enterprise_linux:9::appstream", "cpe:/a:redhat:enterprise_linux:9::crb" ]
null
5.3
null
null
RHSA-2022:7640
Red Hat Security Advisory: mutt security update
mutt: buffer overflow in uudecoder function
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
6.5
null
null
RHSA-2017:1102
Red Hat Security Advisory: nss-util security update
nss: Write beyond bounds caused by bugs in Base64 de/encoding in nssb64d.c and nssb64e.c (MFSA 2017-10)
[ "cpe:/o:redhat:rhel_aus:6.4::server", "cpe:/o:redhat:rhel_aus:6.5::server", "cpe:/o:redhat:rhel_aus:6.6::server", "cpe:/o:redhat:rhel_eus:6.7::computenode", "cpe:/o:redhat:rhel_eus:6.7::server", "cpe:/o:redhat:rhel_eus:7.2::computenode", "cpe:/o:redhat:rhel_eus:7.2::server", "cpe:/o:redhat:rhel_mission_critical:6.2::server", "cpe:/o:redhat:rhel_tus:6.5::server", "cpe:/o:redhat:rhel_tus:6.6::server" ]
null
null
9.8
null
RHSA-2004:219
Red Hat Security Advisory: tcpdump security update
security flaw security flaw
[ "cpe:/o:redhat:enterprise_linux:3::as", "cpe:/o:redhat:enterprise_linux:3::desktop", "cpe:/o:redhat:enterprise_linux:3::es", "cpe:/o:redhat:enterprise_linux:3::ws" ]
null
null
null
null
RHSA-2023:7077
Red Hat Security Advisory: kernel security, bug fix, and enhancement update
kernel: out-of-bounds write in hw_atl_utils_fw_rpc_wait() in drivers/net/ethernet/aquantia/atlantic/hw_atl/hw_atl_utils.c kernel: Rate limit overflow messages in r8152 in intr_callback kernel: use after free flaw in l2cap_conn_del in net/bluetooth/l2cap_core.c kernel: tun: avoid double free in tun_free_netdev kernel: double free in usb_8dev_start_xmit in drivers/net/can/usb/usb_8dev.c kernel: vmwgfx: use-after-free in vmw_cmd_res_check kernel: vmwgfx: use-after-free in vmw_execbuf_tie_context hw: Intel: Gather Data Sampling (GDS) side channel vulnerability kernel: Information leak in l2cap_parse_conf_req in net/bluetooth/l2cap_core.c kernel: KVM: x86/mmu: race condition in direct_page_fault() kernel: memory leak in ttusb_dec_exit_dvb() in media/usb/ttusb-dec/ttusb_dec.c kernel: memcg: fix possible use-after-free in memcg_write_event_control() kernel: char: tpm: Protect tpm_pm_suspend with locks kernel: ixgbevf: Fix resource leak in ixgbevf_init_module() kernel: mm/page_owner: use strscpy() instead of strlcpy() kernel: nvme-pci: fix a NULL pointer dereference in nvme_alloc_admin_tags kernel: cipso: Fix data-races around sysctl. kernel: speculative pointer dereference in do_prlimit() in kernel/sys.c kernel: use-after-free due to race condition in qdisc_graft() kernel: x86/mm: Randomize per-cpu entry area kernel: HID: check empty report_list in hid_validate_values() kernel: sctp: fail if no bound addresses can be used for a given scope kernel: net/tls: tls_is_tx_ready() checked list_entry kernel: hid: Use After Free in asus_remove() kernel: use-after-free in drivers/media/rc/ene_ir.c due to race condition kernel: hash collisions in the IPv6 connection lookup table kernel: ovl: fix use after free in struct ovl_aio_req kernel: denial of service in tipc_conn_close kernel: use-after-free bug in remove function xgene_hwmon_remove kernel: Use after free bug in btsdio_remove due to race condition kernel: Spectre v2 SMT mitigations problem kernel: A possible deadlock in dm_get_inactive_table in dm- ioctl.c leads to dos kernel: ext4: use-after-free in ext4_xattr_set_entry() kernel: Use after free bug in r592_remove kernel: fbcon: shift-out-of-bounds in fbcon_set_font() kernel: gfs2: NULL pointer dereference in gfs2_evict_inode() kernel: out-of-bounds access in relay_file_read kernel: net/sched: cls_u32 component reference counter leak if tcf_change_indev() fails kernel: net/sched: sch_qfq component can be exploited if in qfq_change_agg function happens qfq_enqueue overhead kernel: xfrm: NULL pointer dereference in xfrm_update_ae_params() kernel: net/sched: Use-after-free vulnerabilities in the net/sched classifiers: cls_fw, cls_u32 and cls_route kernel: smsusb: use-after-free caused by do_submit_urb() kernel: KVM: SEV-ES / SEV-SNP VMGEXIT double fetch vulnerability kernel: net/sched: Use-after-free vulnerabilities in the net/sched classifiers: cls_fw, cls_u32 and cls_route kernel: net/sched: Use-after-free vulnerabilities in the net/sched classifiers: cls_fw, cls_u32 and cls_route kernel: net/sched: Use-after-free vulnerabilities in the net/sched classifiers: cls_fw, cls_u32 and cls_route kernel: Race between task migrating pages and another task calling exit_mmap to release those same pages getting invalid opcode BUG in include/linux/swapops.h Kernel: denial of service in atm_tc_enqueue in net/sched/sch_atm.c due to type confusion kernel: mpls: double free on sysctl allocation failure kernel: Denial of service issue in az6027 driver in drivers/media/usb/dev-usb/az6027.c kernel: lib/seq_buf.c has a seq_buf_putmem_hex buffer overflow kernel: KVM: nVMX: missing consistency checks for CR0 and CR4 kernel: blocking operation in dvb_frontend_get_event and wait_event_interruptible kernel: out-of-bounds write in qfq_change_class function kernel: net: qcom/emac: race condition leading to use-after-free in emac_remove() kernel: vmwgfx: race condition leading to information disclosure vulnerability kernel: vmwgfx: double free within the handling of vmw_buffer_object objects kernel: saa7134: race condition leading to use-after-free in saa7134_finidev() kernel: dm1105: race condition leading to use-after-free in dm1105_remove.c() kernel: r592: race condition leading to use-after-free in r592_remove() kernel: use-after-free during a race condition between a nonblocking atomic commit and a driver unload in drivers/gpu/drm/drm_atomic.c kernel: net: sched: sch: Bounds check priority kernel: net: openvswitch: fix flow memory leak in ovs_flow_cmd_new kernel: ipv4: prevent potential spectre v1 gadget in ip_metrics_convert() kernel: blkio memory leakage due to blkcg and some blkgs are not freed after they are made offline. kernel: drm/dp_mst: Fix resetting msg rx state after topology removal
[ "cpe:/a:redhat:enterprise_linux:8::crb", "cpe:/o:redhat:enterprise_linux:8::baseos" ]
null
4.6
5.6
null
RHSA-2022:0350
Red Hat Security Advisory: nodejs:14 security, bug fix, and enhancement update
nodejs-ini: Prototype pollution via malicious INI file nodejs-glob-parent: Regular expression denial of service nodejs-ansi-regex: Regular expression denial of service (ReDoS) matching ANSI escape codes nodejs-json-schema: Prototype pollution vulnerability llhttp: HTTP Request Smuggling due to spaces in headers llhttp: HTTP Request Smuggling when parsing the body of chunked requests nodejs-normalize-url: ReDoS for data URLs nodejs-tar: Insufficient symlink protection due to directory cache poisoning using symbolic links allowing arbitrary file creation and overwrite nodejs-tar: Insufficient symlink protection due to directory cache poisoning using symbolic links allowing arbitrary file creation and overwrite
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
8.1
null
null
RHSA-2010:0818
Red Hat Security Advisory: Red Hat Enterprise Virtualization Manager security update
spice activex/spicec named pipe races
[ "cpe:/a:redhat:rhev_manager:2" ]
null
null
null
null
RHSA-2001:116
Red Hat Security Advisory: : Updated diffutils packages available
security flaw
[ "cpe:/o:redhat:linux:5.2", "cpe:/o:redhat:linux:6.2", "cpe:/o:redhat:linux:7.0", "cpe:/o:redhat:linux:7.1" ]
null
null
null
null
RHSA-2017:2997
Red Hat Security Advisory: chromium-browser security update
chromium-browser: uxss with mhtml chromium-browser: heap overflow in skia chromium-browser: use after free in pdfium chromium-browser: use after free in pdfium chromium-browser: heap overflow in webgl chromium-browser: use after free in webaudio chromium-browser: heap overflow in libxml2 chromium-browser: out of bounds write in skia chromium-browser: incorrect stack manipulation in webassembly chromium-browser: out of bounds write in skia chromium-browser: ui spoofing in blink chromium-browser: content security bypass chromium-browser: out of bounds read in skia chromium-browser: url spoofing in omnibox chromium-browser: url spoofing in omnibox chromium-browser: extension limitation bypass in extensions chromium-browser: incorrect registry key handling in platformintegration chromium-browser: referrer leak in devtools chromium-browser: url spoofing in extensions ui chromium-browser: null pointer dereference in imagecapture
[ "cpe:/a:redhat:rhel_extras:6" ]
null
null
4.3
null
RHSA-2020:1479
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 6.4 security update
tomcat: Apache Tomcat AJP File Read/Inclusion Vulnerability
[ "cpe:/a:redhat:jboss_enterprise_application_platform:6.4" ]
null
7.6
null
null
RHSA-2020:0601
Red Hat Security Advisory: AMQ Clients 2.6.0 Release
netty: HTTP request smuggling netty: HttpObjectDecoder.java allows Content-Length header to accompanied by second Content-Length header netty: HTTP Request Smuggling due to Transfer-Encoding whitespace mishandling
[ "cpe:/a:redhat:a_mq_clients:2::el6", "cpe:/a:redhat:a_mq_clients:2::el7", "cpe:/a:redhat:a_mq_clients:2::el8" ]
null
7.5
null
null
RHSA-2023:0584
Red Hat Security Advisory: Secondary Scheduler Operator for Red Hat OpenShift 1.1.1 security update
golang: net/http/httputil: ReverseProxy should not forward unparseable query parameters golang: net/http: handle server errors after sending GOAWAY golang: math/big: decoding big.Float and big.Rat types can panic if the encoded message is too short, potentially allowing a denial of service golang: net/url: JoinPath does not strip relative path components in all circumstances golang: regexp/syntax: limit memory used by parsing regexps golang: net/http: excessive memory growth in a Go server accepting HTTP/2 requests golang: crypto/tls: large handshake records may cause panics golang: net/http, mime/multipart: denial of service from excessive resource consumption
[ "cpe:/a:redhat:openshift_secondary_scheduler:1.1::el8" ]
null
7.5
null
null
RHSA-2018:3757
Red Hat Security Advisory: rh-postgresql10-postgresql security update
postgresql: SQL injection in pg_upgrade and pg_dump, via CREATE TRIGGER ... REFERENCING
[ "cpe:/a:redhat:rhel_software_collections:3::el7" ]
null
null
8
null
RHSA-2023:3360
Red Hat Security Advisory: apr-util security update
apr-util: out-of-bounds writes in the apr_base64
[ "cpe:/a:redhat:rhel_eus:8.4::appstream" ]
null
6.5
null
null
RHSA-2021:3980
Red Hat Security Advisory: Red Hat OpenStack Platform 13.0 (redis) security update
redis: Lua scripts can overflow the heap-based Lua stack redis: Integer overflow issue with Streams redis: Integer overflow bug in the ziplist data structure redis: Denial of service via Redis Standard Protocol (RESP) request redis: Integer overflow issue with intsets redis: Integer overflow issue with strings
[ "cpe:/a:redhat:openstack:13::el7" ]
null
7.5
null
null
RHSA-2023:2963
Red Hat Security Advisory: curl security and bug fix update
curl: Incorrect handling of control code characters in cookies curl: Use-after-free triggered by an HTTP proxy deny response
[ "cpe:/o:redhat:enterprise_linux:8::baseos" ]
null
5.9
null
null
RHSA-2024:6890
Red Hat Security Advisory: Red Hat build of Keycloak 24.0.8 Update
keycloak-saml-core: Improper Verification of SAML Responses Leading to Privilege Escalation in Keycloak Keycloak: Vulnerable Redirect URI Validation Results in Open Redirec
[ "cpe:/a:redhat:build_keycloak:24" ]
null
6.1
null
null
RHSA-2011:0345
Red Hat Security Advisory: qemu-kvm security update
qemu-kvm: Setting VNC password to empty string silently disables all authentication
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
null
null
RHSA-2022:6875
Red Hat Security Advisory: kpatch-patch security update
kernel: a use-after-free in cls_route filter implementation may lead to privilege escalation
[ "cpe:/o:redhat:rhel_e4s:8.1::baseos" ]
null
7.8
null
null
RHSA-2018:0587
Red Hat Security Advisory: rh-mysql56-mysql security update
mysql: Server: Partition unspecified vulnerability (CPU Jan 2018) mysql: Server: GIS unspecified vulnerability (CPU Jan 2018) mysql: Stored Procedure unspecified vulnerability (CPU Jan 2018) mysql: Server: Performance Schema unspecified vulnerability (CPU Jan 2018) mysql: Server : Partition unspecified vulnerability (CPU Jan 2018) mysql: InnoDB unspecified vulnerability (CPU Jan 2018) mysql: Server: DDL unspecified vulnerability (CPU Jan 2018) mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2018) mysql: Server: Performance Schema unspecified vulnerability (CPU Jan 2018) mysql: Server: Replication unspecified vulnerability (CPU Jan 2018) mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2018) mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2018) mysql: sha256_password authentication DoS via long password mysql: sha256_password authentication DoS via hash with large rounds value
[ "cpe:/a:redhat:rhel_software_collections:3::el6", "cpe:/a:redhat:rhel_software_collections:3::el7" ]
null
null
6.5
null
RHSA-2018:1837
Red Hat Security Advisory: rh-maven33-plexus-archiver and rh-maven35-plexus-archiver security update
plexus-archiver: arbitrary file write vulnerability / arbitrary code execution using a specially crafted zip file
[ "cpe:/a:redhat:rhel_software_collections:3::el6", "cpe:/a:redhat:rhel_software_collections:3::el7" ]
null
null
7.3
null
RHSA-2019:4055
Red Hat Security Advisory: OpenShift Container Platform 3.11 jenkins-2-plugins security update
jenkins-script-security-plugin: handling of method names in method call expressions allowed attackers to execute arbitrary code in sandboxed scripts jenkins-script-security-plugin: handling of property names in property expressions on the left-hand side of assignment expression leads to execute arbitrary code in sandboxed scripts jenkins-script-security-plugin: handling of property names in property expressions in increment and decrement expressions allowed attackers to execute arbitrary code in sandboxed scripts jenkins-script-security-plugin: handling of subexpressions in increment and decrement expressions not involving actual assignment allowed attackers to execute arbitrary code in sandboxed scripts jenkins-script-security: Sandbox bypass vulnerability in Script Security Plugin jenkins-2-plugins: Stored XSS vulnerability in HTML Publisher Plugin
[ "cpe:/a:redhat:openshift:3.11::el7" ]
null
4.2
5.4
null
RHSA-2003:102
Red Hat Security Advisory: openssl security update
security flaw security flaw
[ "cpe:/o:redhat:enterprise_linux:2.1::as", "cpe:/o:redhat:enterprise_linux:2.1::aw", "cpe:/o:redhat:enterprise_linux:2.1::es", "cpe:/o:redhat:enterprise_linux:2.1::ws" ]
null
null
null
null
RHBA-2019:2261
Red Hat Bug Fix Advisory: webkitgtk4 bug fix update
webkitgtk: crafted web content leads to arbitrary code execution webkitgtk: arbitrary code execution via malicious web content webkitgtk: logic issue leads to code execution webkitgtk: malicious crafted web content leads to information disclosure webkitgtk: malicious web content leads to arbitrary code execution webkitgtk: malicious web content leads to arbitrary code execution
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
6.3
null
RHSA-2025:1718
Red Hat Security Advisory: bind security update
bind: bind9: Many records in the additional section cause CPU exhaustion
[ "cpe:/o:redhat:rhel_els:7" ]
null
7.5
null
null
RHSA-2023:1332
Red Hat Security Advisory: nss security update
nss: Arbitrary memory write via PKCS 12
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
8.8
null
null
RHSA-2009:1587
Red Hat Security Advisory: kernel security and bug fix update
kernel: SELinux and mmap_min_addr kernel: fs: pipe.c null pointer dereference
[ "cpe:/o:redhat:rhel_eus:5.3" ]
null
null
null
null
RHSA-2022:4965
Red Hat Security Advisory: OpenShift Container Platform 4.7.53 packages and security update
cri-o: memory exhaustion on the node when access to the kube api
[ "cpe:/a:redhat:openshift:4.7::el7", "cpe:/a:redhat:openshift:4.7::el8" ]
null
6.8
null
null
RHSA-2023:5803
Red Hat Security Advisory: nodejs:16 security update
HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack)
[ "cpe:/a:redhat:rhel_eus:8.6::appstream" ]
null
7.5
null
null
RHSA-2005:801
Red Hat Security Advisory: gdb security update
security flaw security flaw
[ "cpe:/o:redhat:enterprise_linux:2.1::as", "cpe:/o:redhat:enterprise_linux:2.1::aw", "cpe:/o:redhat:enterprise_linux:2.1::es", "cpe:/o:redhat:enterprise_linux:2.1::ws" ]
null
null
null
null
RHSA-2020:1880
Red Hat Security Advisory: ibus and glib2 security and bug fix update
ibus: missing authorization allows local attacker to access the input bus of another user
[ "cpe:/a:redhat:enterprise_linux:8::appstream", "cpe:/a:redhat:enterprise_linux:8::crb", "cpe:/o:redhat:enterprise_linux:8::baseos" ]
null
null
6.1
null
RHSA-2018:3062
Red Hat Security Advisory: qemu-kvm-ma security, bug fix, and enhancement update
Qemu: memory exhaustion through framebuffer update request message in VNC server
[ "cpe:/o:redhat:enterprise_linux:7::server" ]
null
null
3.5
null
RHSA-2023:6745
Red Hat Security Advisory: curl security update
curl: heap based buffer overflow in the SOCKS5 proxy handshake curl: cookie injection with none file
[ "cpe:/a:redhat:enterprise_linux:9::appstream", "cpe:/o:redhat:enterprise_linux:9::baseos" ]
null
3.7
null
null
RHSA-2025:1332
Red Hat Security Advisory: Gatekeeper v3.15.3
golang.org/x/crypto/ssh: Misuse of ServerConfig.PublicKeyCallback may cause authorization bypass in golang.org/x/crypto golang.org/x/net/html: Non-linear parsing of case-insensitive content in golang.org/x/net/html
[ "cpe:/a:redhat:gatekeeper:3.15::el9" ]
null
7.5
null
null
RHSA-2023:1334
Red Hat Security Advisory: Red Hat Process Automation Manager 7.13.2 security update
Solr: Code execution via entity expansion unboundid-ldapsdk: Incorrect Access Control vulnerability in process function in SimpleBindRequest class nodejs-handlebars: prototype pollution leading to remote code execution via crafted payloads nodejs-handlebars: lookup helper fails to properly validate templates allowing for arbitrary JavaScript execution nodejs-handlebars: an endless loop while processing specially-crafted templates leads to DoS nodejs-handlebars: Remote code execution when compiling untrusted compile templates with strict:true option nodejs-handlebars: Remote code execution when compiling untrusted compile templates with compat:true option maven: Block repositories using http by default
[ "cpe:/a:redhat:jboss_enterprise_bpms_platform:7.13" ]
null
7.4
7
null
RHSA-2014:0833
Red Hat Security Advisory: Red Hat JBoss Web Server 2.0.1 tomcat6 security update
Tomcat/JBossWeb: Limited DoS in chunked transfer encoding input filter Tomcat/JBossWeb: XXE vulnerability via user supplied XSLTs Tomcat/JBossWeb: Request smuggling via malicious content length header
[ "cpe:/a:redhat:jboss_enterprise_web_server:2.0" ]
null
null
null
null
RHSA-2021:4038
Red Hat Security Advisory: binutils security update
environment: Unicode's bidirectional (BiDi) override characters can cause trojan source attacks
[ "cpe:/o:redhat:rhel_aus:7.2::server" ]
null
8.5
null
null
RHSA-2020:1504
Red Hat Security Advisory: chromium-browser security update
chromium-browser: Use after free in speech recognizer
[ "cpe:/a:redhat:rhel_extras:6" ]
null
null
9.6
null
RHSA-2017:2524
Red Hat Security Advisory: ansible security, bug fix, and enhancement update
ansible: Security issue with lookup return not tainting the jinja2 environment
[ "cpe:/a:redhat:rhev_manager:4" ]
null
null
5.3
null
RHSA-2014:1054
Red Hat Security Advisory: openssl security update
openssl: DTLS packet processing double free openssl: DTLS memory exhaustion openssl: DTLS memory leak from zero-length fragments openssl: information leak in pretty printing functions openssl: race condition in ssl_parse_serverhello_tlsext openssl: DTLS anonymous (EC)DH denial of service openssl: TLS protocol downgrade attack
[ "cpe:/a:redhat:storage:2.1:server:el6" ]
null
null
null
null
RHSA-2022:0267
Red Hat Security Advisory: polkit security update
polkit: Local privilege escalation in pkexec due to incorrect handling of argument vector
[ "cpe:/o:redhat:enterprise_linux:8::baseos" ]
null
7.8
null
null
RHSA-2018:2179
Red Hat Security Advisory: Red Hat Ceph Storage 3.0 security and bug fix update
ceph: cephx protocol is vulnerable to replay attack ceph: cephx uses weak signatures ceph: ceph-mon does not perform authorization on OSD pool ops
[ "cpe:/a:redhat:ceph_storage:3::ubuntu16.04" ]
null
null
4.6
null
RHBA-2021:4438
Red Hat Bug Fix Advisory: samba bug fix and enhancement update
samba: Symlink race error can allow directory creation outside of the exported share
[ "cpe:/a:redhat:enterprise_linux:8::appstream", "cpe:/a:redhat:enterprise_linux:8::crb", "cpe:/o:redhat:enterprise_linux:8::baseos" ]
null
2.6
null
null
RHSA-2009:1107
Red Hat Security Advisory: apr-util security update
apr-util heap buffer underwrite apr-util billion laughs attack apr-util single NULL byte buffer overflow
[ "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws", "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::client_workstation", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
RHSA-2024:0143
Red Hat Security Advisory: idm:DL1 security update
Kerberos: delegation constrain bypass in S4U2Proxy ipa: Invalid CSRF protection
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
6.5
null
null
RHSA-2021:0038
Red Hat Security Advisory: OpenShift Container Platform 4.6.12 packages and security update
jenkins-2-plugins/subversion: XML parser is not preventing XML external entity (XXE) attacks jenkins-2-plugins/mercurial: XML parser is not preventing XML external entity (XXE) attacks jenkins-2-plugins/mercurial: Missing permission check in an HTTP endpoint could result in information disclosure jenkins-2-plugins/kubernetes: Jenkins controller environment variables are accessible in Kubernetes Plugin jenkins-2-plugins/kubernetes: Missing permission check in Kubernetes Plugin allows listing pod templates jenkins-2-plugins/kubernetes: Missing permission check in Kubernetes Plugin allows enumerating credentials IDs golang: math/big: panic during recursive division of very large numbers
[ "cpe:/a:redhat:openshift:4.6::el7", "cpe:/a:redhat:openshift:4.6::el8" ]
null
7.5
null
null
RHSA-2022:0492
Red Hat Security Advisory: OpenShift Container Platform 4.7.43 security update
containernetworking-cni: Arbitrary path injection via type field in CNI configuration
[ "cpe:/a:redhat:openshift:4.7::el8" ]
null
7.2
null
null
RHSA-2022:5216
Red Hat Security Advisory: kpatch-patch security update
kernel: netfilter: nf_tables: incorrect NFT_STATEFUL_EXPR check leads to a use-after-free (write) kernel: a use-after-free write in the netfilter subsystem can lead to privilege escalation to root
[ "cpe:/o:redhat:enterprise_linux:7::server" ]
null
7.8
null
null
RHSA-2008:0208
Red Hat Security Advisory: seamonkey security update
mozilla: multiple file input focus stealing vulnerabilities Mozilla products XPCNativeWrapper pollution universal XSS using event handlers chrome privilege via wrong principal browser engine crashes javascript crashes Referrer spoofing bug XUL popup spoofing
[ "cpe:/o:redhat:enterprise_linux:2.1::as", "cpe:/o:redhat:enterprise_linux:2.1::aw", "cpe:/o:redhat:enterprise_linux:2.1::es", "cpe:/o:redhat:enterprise_linux:2.1::ws", "cpe:/o:redhat:enterprise_linux:3::as", "cpe:/o:redhat:enterprise_linux:3::desktop", "cpe:/o:redhat:enterprise_linux:3::es", "cpe:/o:redhat:enterprise_linux:3::ws", "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws" ]
null
null
null
null
RHSA-2020:1404
Red Hat Security Advisory: firefox security update
Mozilla: Uninitialized memory could be read when using the WebGL copyTexSubImage method Mozilla: Out of bounds write in GMPDecodeData when processing large images Mozilla: Memory safety bugs fixed in Firefox 75 and Firefox ESR 68.7
[ "cpe:/a:redhat:rhel_e4s:8.0::appstream" ]
null
9.8
null
null
RHBA-2020:4196
Red Hat Bug Fix Advisory: OpenShift Container Platform 4.6 GA Images
openshift/openshift-apiserver: oauth tokens not encrypted when enabling encryption of data at rest
[ "cpe:/a:redhat:openshift:4.6::el8" ]
null
6.3
null
null
RHSA-2020:4481
Red Hat Security Advisory: bluez security update
bluez: Improper access control in subsystem could result in privilege escalation and DoS
[ "cpe:/a:redhat:enterprise_linux:8::appstream", "cpe:/a:redhat:enterprise_linux:8::crb", "cpe:/o:redhat:enterprise_linux:8::baseos" ]
null
7.1
null
null
RHSA-2023:1428
Red Hat Security Advisory: Migration Toolkit for Containers (MTC) 1.7.8 security and bug fix update
gin: Unsanitized input in the default logger in github.com/gin-gonic/gin express: "qs" prototype poisoning causes the hang of the node process http-cache-semantics: Regular Expression Denial of Service (ReDoS) vulnerability ua-parser-js: ReDoS vulnerability via the trim() function loader-utils: Regular expression denial of service decode-uri-component: improper input validation resulting in DoS json5: Prototype Pollution in JSON5 via Parse Method jszip: directory traversal via a crafted ZIP archive
[ "cpe:/a:redhat:rhmt:1.7::el8" ]
null
7.3
null
null
RHSA-2020:1764
Red Hat Security Advisory: python3 security and bug fix update
python: Cookie domain check returns incorrect results python: email.utils.parseaddr wrongly parses email addresses
[ "cpe:/a:redhat:enterprise_linux:8::appstream", "cpe:/o:redhat:enterprise_linux:8::baseos" ]
null
null
7.3
null
RHSA-2021:3230
Red Hat Security Advisory: compat-exiv2-026 security update
exiv2: Heap-based buffer overflow vulnerability in jp2image.cpp
[ "cpe:/a:redhat:rhel_eus:8.2::appstream" ]
null
8.1
null
null
RHSA-2021:4767
Red Hat Security Advisory: Red Hat Integration Camel Extensions for Quarkus GA security update
velocity: arbitrary code execution when attacker is able to modify templates RESTEasy: Caching routes in RootNode may result in DoS XStream: remote code execution due to insecure XML deserialization when relying on blocklists XStream: Server-Side Forgery Request vulnerability can be activated when unmarshalling XStream: arbitrary file deletion on the local host when unmarshalling jetty: buffer not correctly recycled in Gzip Request inflation jetty: request containing multiple Accept headers with a large number of "quality" parameters may lead to DoS bouncycastle: password bypass in OpenBSDBCrypt.checkPassword utility possible jackson-dataformat-cbor: Unchecked allocation of byte buffer can cause a java.lang.OutOfMemoryError exception undertow: potential security issue in flow control over HTTP/2 may lead to DOS wildfly-elytron: possible timing attack in ScramServer undertow: buffer leak on incoming websocket PONG message may lead to DoS resteasy: Error message exposes endpoint class information mongo-java-driver: client-side field level encryption not verifying KMS host name XStream: allow a remote attacker to cause DoS only by manipulating the processed input stream XStream: SSRF via crafted input stream XStream: arbitrary file deletion on the local host via crafted input stream XStream: Unsafe deserizaliation of javax.sql.rowset.BaseRowSet XStream: Unsafe deserizaliation of com.sun.corba.se.impl.activation.ServerTableEntry XStream: Unsafe deserizaliation of sun.swing.SwingLazyValue XStream: Unsafe deserizaliation of com.sun.tools.javac.processing.JavacProcessingEnvironment NameProcessIterator XStream: ReDoS vulnerability XStream: SSRF can be activated unmarshalling with XStream to access data streams from an arbitrary URL referencing a resource in an intranet or the local host XStream: Unsafe deserizaliation of com.sun.org.apache.bcel.internal.util.ClassLoader XStream: allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream json-smart: uncaught exception may lead to crash or information disclosure jetty: Symlink directory exposes webapp directory contents jetty: Ambiguous paths can access WEB-INF jetty: Resource exhaustion when receiving an invalid large TLS frame jetty: requests to the ConcatServlet and WelcomeFilter are able to access protected resources within the WEB-INF directory gradle: information disclosure through temporary directory permissions XStream: remote command execution attack by manipulating the processed input stream jetty: SessionListener can prevent a session from being invalidated breaking logout xstream: Arbitrary code execution via unsafe deserialization of Xalan xsltc.trax.TemplatesImpl xstream: Infinite loop DoS via unsafe deserialization of sun.reflect.annotation.AnnotationInvocationHandler xstream: Arbitrary code execution via unsafe deserialization of com.sun.xml.internal.ws.client.sei.* xstream: Arbitrary code execution via unsafe deserialization of sun.tracing.* xstream: Arbitrary code execution via unsafe deserialization of com.sun.jndi.ldap.LdapBindingEnumeration xstream: Arbitrary code execution via unsafe deserialization of javax.swing.UIDefaults$ProxyLazyValue xstream: Arbitrary code execution via unsafe deserialization of com.sun.jndi.ldap.LdapSearchEnumeration xstream: Arbitrary code execution via unsafe deserialization of com.sun.jndi.toolkit.dir.ContextEnumerator xstream: Arbitrary code execution via unsafe deserialization of com.sun.corba.* xstream: Server-side request forgery (SSRF) via unsafe deserialization of com.sun.xml.internal.ws.client.sei.* xstream: Arbitrary code execution via unsafe deserialization of com.sun.jndi.ldap.LdapBindingEnumeration xstream: Server-side request forgery (SSRF) via unsafe deserialization of jdk.nashorn.internal.runtime.Source$URLData xstream: Arbitrary code execution via unsafe deserialization of Xalan xsltc.trax.TemplatesImpl xstream: Arbitrary code execution via unsafe deserialization of javax.swing.UIDefaults$ProxyLazyValue
[ "cpe:/a:redhat:camel_quarkus:2.2" ]
null
8.5
null
null
RHSA-2009:0005
Red Hat Security Advisory: gnome-vfs, gnome-vfs2 security update
grip,libcdaudio: buffer overflow caused by large amount of CDDB replies
[ "cpe:/o:redhat:enterprise_linux:2.1::as", "cpe:/o:redhat:enterprise_linux:2.1::aw", "cpe:/o:redhat:enterprise_linux:2.1::es", "cpe:/o:redhat:enterprise_linux:2.1::ws", "cpe:/o:redhat:enterprise_linux:3::as", "cpe:/o:redhat:enterprise_linux:3::desktop", "cpe:/o:redhat:enterprise_linux:3::es", "cpe:/o:redhat:enterprise_linux:3::ws", "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws" ]
null
null
null
null
RHSA-2023:2645
Red Hat Security Advisory: openssh security update
openssh: the functions order_hostkeyalgs() and list_hostkey_types() leads to double-free vulnerability
[ "cpe:/a:redhat:enterprise_linux:9::appstream", "cpe:/o:redhat:enterprise_linux:9::baseos" ]
null
6.5
null
null
RHSA-2004:035
Red Hat Security Advisory: mc security update
security flaw
[ "cpe:/o:redhat:enterprise_linux:2.1::as", "cpe:/o:redhat:enterprise_linux:2.1::aw", "cpe:/o:redhat:enterprise_linux:2.1::ws" ]
null
null
null
null
RHSA-2021:2356
Red Hat Security Advisory: nettle security update
nettle: Out of bounds memory access in signature verification
[ "cpe:/o:redhat:rhel_aus:7.6::server", "cpe:/o:redhat:rhel_e4s:7.6::server", "cpe:/o:redhat:rhel_tus:7.6::server" ]
null
8.1
null
null
RHSA-2024:4018
Red Hat Security Advisory: thunderbird security update
Mozilla: Use-after-free in JavaScript object transplant Mozilla: External protocol handlers leaked by timing attack Mozilla: Sandboxed iframes were able to bypass sandbox restrictions to open a new window Mozilla: Cross-Origin Image leak via Offscreen Canvas Mozilla: Memory Corruption in Text Fragments Mozilla: Memory safety bugs fixed in Firefox 127, Firefox ESR 115.12, and Thunderbird 115.12 Mozilla: Use-after-free in networking
[ "cpe:/a:redhat:rhel_eus:8.8::appstream" ]
null
7.5
null
null
RHSA-2009:1109
Red Hat Security Advisory: acroread security update
acroread: multiple security fixes in version 8.1.6 (APSB09-07) acroread: multiple security fixes in version 8.1.6 (APSB09-07) acroread: multiple security fixes in version 8.1.6 (APSB09-07) acroread: multiple security fixes in version 8.1.6 (APSB09-07) acroread: multiple security fixes in version 8.1.6 (APSB09-07) acroread: multiple security fixes in version 8.1.6 (APSB09-07) acroread: multiple security fixes in version 8.1.6 (APSB09-07) acroread: multiple security fixes in version 8.1.6 (APSB09-07) acroread: multiple security fixes in version 8.1.6 (APSB09-07) acroread: multiple security fixes in version 8.1.6 (APSB09-07) acroread: multiple security fixes in version 8.1.6 (APSB09-07) acroread: multiple security fixes in version 8.1.6 (APSB09-07) acroread: multiple security fixes in version 8.1.6 (APSB09-07) acroread: multiple security fixes in version 8.1.6 (APSB09-07)
[ "cpe:/a:redhat:rhel_extras:3", "cpe:/a:redhat:rhel_extras:4", "cpe:/a:redhat:rhel_extras:5::client", "cpe:/a:redhat:rhel_extras:5::server" ]
null
null
null
null
RHSA-2007:1090
Red Hat Security Advisory: openoffice.org2 security update
OpenOffice.org-base allows Denial-of-Service and command injection
[ "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws" ]
null
null
null
null
RHSA-2023:4466
Red Hat Security Advisory: Satellite 6.13.3 Async Security Update
python-future: remote attackers can cause denial of service via crafted Set-Cookie header from malicious web server Foreman: Arbitrary code execution through templates
[ "cpe:/a:redhat:satellite:6.13::el8", "cpe:/a:redhat:satellite_capsule:6.13::el8", "cpe:/a:redhat:satellite_maintenance:6.13::el8", "cpe:/a:redhat:satellite_utils:6.13::el8" ]
null
9.1
null
null
RHSA-2024:0224
Red Hat Security Advisory: java-1.8.0-openjdk security and bug fix update
OpenJDK: array out-of-bounds access due to missing range check in C1 compiler (8314468) OpenJDK: JVM class file verifier flaw allows unverified bytecode execution (8314295) OpenJDK: range check loop optimization issue (8314307) OpenJDK: arbitrary Java code execution in Nashorn (8314284) OpenJDK: logging of digital signature private keys (8316976) OpenJDK: RSA padding issue and timing side-channel attack against TLS (8317547)
[ "cpe:/a:redhat:rhel_aus:8.2::appstream", "cpe:/a:redhat:rhel_e4s:8.2::appstream", "cpe:/a:redhat:rhel_tus:8.2::appstream" ]
null
7.4
null
null
RHSA-2015:2556
Red Hat Security Advisory: Red Hat JBoss Fuse 6.2.1 update
groovy: remote execution of untrusted code in class MethodClosure Console: script injection into queue name apache-commons-collections: InvokerTransformer code execution during deserialisation
[ "cpe:/a:redhat:jboss_fuse:6.2" ]
null
null
9.6
null
RHSA-2024:8977
Red Hat Security Advisory: python39:3.9 security update
python: cpython: tarfile: ReDos via excessive backtracking while parsing header values
[ "cpe:/a:redhat:rhel_aus:8.4::appstream", "cpe:/a:redhat:rhel_e4s:8.4::appstream", "cpe:/a:redhat:rhel_tus:8.4::appstream" ]
null
7.5
null
null
RHSA-2013:0525
Red Hat Security Advisory: pcsc-lite security and bug fix update
pcsc-lite: Stack-based buffer overflow in Answer-to-Reset (ATR) decoder
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
null
null
RHSA-2023:7057
Red Hat Security Advisory: yajl security update
yajl: Memory leak in yajl_tree_parse function
[ "cpe:/a:redhat:enterprise_linux:8::appstream", "cpe:/a:redhat:enterprise_linux:8::crb" ]
null
6.5
null
null
RHSA-2022:1396
Red Hat Security Advisory: Migration Toolkit for Containers (MTC) 1.5.4 security update
golang: net/http/httputil: panic due to racy read of persistConn after handler panic
[ "cpe:/a:redhat:rhmt:1.5::el7", "cpe:/a:redhat:rhmt:1.5::el8" ]
null
5.9
null
null
RHSA-2024:2892
Red Hat Security Advisory: go-toolset-1.19-golang security update
golang: net/http, x/net/http2: unlimited number of CONTINUATION frames causes DoS
[ "cpe:/a:redhat:devtools:2023::el7" ]
null
7.5
null
null
RHSA-2020:2067
Red Hat Security Advisory: Red Hat build of Thorntail 2.5.1 security and bug fix update
thrift: Endless loop when feed with specific input data thrift: Out-of-bounds read related to TJSONProtocol or TSimpleJSONProtocol keycloak: missing signatures validation on CRL used to verify client certificates HTTP/2: large amount of data requests leads to denial of service HTTP/2: flood using PING frames results in unbounded memory growth HTTP/2: flood using HEADERS frames results in unbounded memory growth HTTP/2: flood using SETTINGS frames results in unbounded memory growth apache-commons-beanutils: does not suppresses the class property in PropertyUtilsBean by default keycloak: CSRF check missing in My Resources functionality in the Account Console keycloak: SAML broker does not check existence of signature on document allowing any user impersonation hibernate-validator: safeHTML validator allows XSS xml-security: Apache Santuario potentially loads XML parsing code from an untrusted source cxf: does not restrict the number of message attachments cxf: OpenId Connect token service does not properly validate the clientId jackson-databind: Serialization gadgets in com.zaxxer.hikari.HikariConfig keycloak: adapter endpoints are exposed via arbitrary URLs keycloak: cross-realm user access auth bypass wildfly-core: Incorrect privileges for 'Monitor', 'Auditor' and 'Deployer' user by default wildfly: The 'enabled-protocols' value in legacy security is not respected if OpenSSL security provider is in use undertow: possible Denial Of Service (DOS) in Undertow HTTP server listening on HTTPS jackson-databind: Serialization gadgets in classes of the commons-configuration package jackson-databind: Serialization gadgets in classes of the xalan package jackson-databind: Serialization gadgets in com.zaxxer.hikari.HikariDataSource jackson-databind: Serialization gadgets in org.apache.commons.dbcp.datasources.* jackson-databind: Serialization gadgets in com.p6spy.engine.spy.P6DataSource jackson-databind: Serialization gadgets in classes of the ehcache package jackson-databind: Serialization gadgets in org.apache.log4j.receivers.db.* jackson-databind: lacks certain net.sf.ehcache blocking SmallRye: SecuritySupport class is incorrectly public and contains a static method to access the current threads context class loader netty: HTTP Request Smuggling due to Transfer-Encoding whitespace mishandling jackson-databind: Lacks certain xbean-reflect/JNDI blocking jackson-databind: Serialization gadgets in shaded-hikari-config jackson-databind: Serialization gadgets in ibatis-sqlmap jackson-databind: Serialization gadgets in anteros-core jackson-databind: mishandles the interaction between serialization gadgets and typing which could result in remote command execution jackson-databind: mishandles the interaction between serialization gadgets and typing which could result in remote command execution jackson-databind: Serialization gadgets in org.aoju.bus.proxy.provider.*.RmiProvider jackson-databind: Serialization gadgets in javax.swing.JEditorPane jackson-databind: Serialization gadgets in org.apache.activemq.jms.pool.XaPooledConnectionFactory jackson-databind: Serialization gadgets in org.apache.commons.proxy.provider.remoting.RmiProvider jackson-databind: Serialization gadgets in org.apache.openjpa.ee.WASRegistryManagedRuntime jackson-databind: Serialization gadgets in org.springframework:spring-aop jackson-databind: Serialization gadgets in commons-jelly:commons-jelly
[ "cpe:/a:redhat:openshift_application_runtimes:1.0" ]
null
8.1
8.1
null
RHSA-2016:0005
Red Hat Security Advisory: rpcbind security update
rpcbind: Use-after-free vulnerability in PMAP_CALLIT
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation", "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
null
null
RHSA-2003:047
Red Hat Security Advisory: : Updated kon2 packages fix buffer overflow
security flaw
[ "cpe:/o:redhat:linux:7.1", "cpe:/o:redhat:linux:7.2", "cpe:/o:redhat:linux:7.3", "cpe:/o:redhat:linux:8.0", "cpe:/o:redhat:linux:9" ]
null
null
null
null
RHSA-2015:0752
Red Hat Security Advisory: openssl security update
openssl: use-after-free on invalid EC private key import openssl: invalid pointer use in ASN1_TYPE_cmp() openssl: ASN.1 structure reuse memory corruption openssl: X509_to_X509_REQ NULL pointer dereference openssl: PKCS7 NULL pointer dereference openssl: integer underflow leading to buffer overflow in base64 decoding openssl: assertion failure in SSLv2 servers openssl: Divide-and-conquer session key recovery in SSLv2 openssl: SSLv2 Bleichenbacher protection overwrites wrong bytes for export ciphers
[ "cpe:/a:redhat:storage:2.1:server:el6" ]
null
null
null
null
RHSA-2014:0406
Red Hat Security Advisory: java-1.7.0-openjdk security update
OpenJDK: Incorrect mlib/raster image validation (2D, 8027841) OpenJDK: Protect logger handlers (Libraries, 8029740) OpenJDK: AWT incorrect FlavorMap seperation (AWT, 8026797) OpenJDK: incorrect caching of data initialized via TCCL (JAXWS, 8026801) OpenJDK: RSA unpadding timing issues (Security, 8027766) OpenJDK: Prevent SIGNATURE_PRIMITIVE_SET from being modified (Security, 8029745) OpenJDK: MethodHandle variable argument lists handling (Libraries, 8029844) OpenJDK: System.arraycopy() element race condition (Hotspot, 8029858) OpenJDK: ServiceLoader Exception handling security bypass (Libraries, 8031394) OpenJDK: Activation framework default command map caching (JAX-WS, 8025152) lcms: insufficient ICC profile version validation (OpenJDK 2D, 8031335) OpenJDK: missing randomization of JNDI DNS client query IDs (JNDI, 8030731) OpenJDK: Better ScriptEngineManager ScriptEngine management (Libraries, 8036794) OpenJDK: insecure temporary file use in unpack200 (Libraries, 8033618) OpenJDK: classfile parser invalid BootstrapMethods attribute length (Hotspot, 8034926) OpenJDK: insufficient escaping of window title string (Javadoc, 8026736) OpenJDK: Incorrect NIO channel separation (Libraries, 8026716) OpenJDK: JAXP CharInfo file access restriction (JAXP, 8029282) OpenJDK: AWT thread context handling (AWT, 8025010) OpenJDK: method handle call hierachy bypass (Libraries, 8032686) OpenJDK: incorrect caching of data initialized via TCCL (JAXB, 8025030) OpenJDK: JPEG decoder input stream handling (2D, 8029854) OpenJDK: incorrect caching of data initialized via TCCL (JAXWS, 8026188) OpenJDK: remove insecure Java Sound provider caching (Sound, 8026163)
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
null
null
RHSA-2012:1036
Red Hat Security Advisory: postgresql security update
crypt(): DES encrypted password weakness
[ "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::client_workstation", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
RHSA-2013:1011
Red Hat Security Advisory: Red Hat JBoss Web Server 2.0.1 update
httpd: multiple XSS flaws due to unescaped hostnames tomcat: Limited DoS in chunked transfer encoding input filter httpd: XSS flaw in mod_proxy_balancer manager interface tomcat: Session fixation in form authenticator tomcat: Information disclosure in asynchronous context when using AsyncListeners that threw RuntimeExceptions
[ "cpe:/a:redhat:jboss_enterprise_web_server:2::el5" ]
null
null
null
null
RHSA-2010:0273
Red Hat Security Advisory: curl security, bug fix and enhancement update
curl: zlib-compression causes curl to pass more than CURL_MAX_WRITE_SIZE bytes to write callback
[ "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::client_workstation", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
RHSA-2024:0966
Red Hat Security Advisory: opensc security update
OpenSC: Side-channel leaks while stripping encryption PKCS#1 padding
[ "cpe:/o:redhat:enterprise_linux:9::baseos" ]
null
5.6
null
null
RHSA-2023:4172
Red Hat Security Advisory: java-1.8.0-openjdk security update
OpenJDK: array indexing integer overflow issue (8304468) OpenJDK: improper handling of slash characters in URI-to-path conversion (8305312)
[ "cpe:/a:redhat:rhel_aus:8.4::appstream", "cpe:/a:redhat:rhel_e4s:8.4::appstream", "cpe:/a:redhat:rhel_tus:8.4::appstream" ]
null
3.7
null
null
RHSA-2023:6972
Red Hat Security Advisory: grafana security and enhancement update
grafana: account takeover possible when using Azure AD OAuth
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
9.8
null
null
RHSA-2023:1918
Red Hat Security Advisory: webkit2gtk3 security update
WebKitGTK: use-after-free leads to arbitrary code execution
[ "cpe:/a:redhat:enterprise_linux:9::appstream" ]
null
8.8
null
null
RHSA-2007:0340
Red Hat Security Advisory: tomcat security update
tomcat multiple content-length header poisioning tomcat DoS tomcat manager example DoS tomcat directory listing issue tomcat XSS in example webapps tomcat XSS in example webapps tomcat directory traversal tomcat anonymous cipher issue
[ "cpe:/a:redhat:rhel_application_server:1" ]
null
null
null
null