id
stringlengths
13
15
title
stringlengths
29
176
description
stringlengths
8
31.7k
cpes
sequencelengths
0
20
cvss_v4_0
null
cvss_v3_1
float64
0
10
cvss_v3_0
float64
0
10
cvss_v2_0
null
RHSA-2020:2217
Red Hat Security Advisory: OpenShift Container Platform 3.11 security update
jquery: Cross-site scripting due to improper injQuery.htmlPrefilter method
[ "cpe:/a:redhat:openshift:3.11::el7" ]
null
6.1
null
null
RHSA-2014:1803
Red Hat Security Advisory: mod_auth_mellon security update
mod_auth_mellon: remote memory disclosure flaw mod_auth_mellon: logout processing leads to denial of service
[ "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
null
null
RHSA-2023:4152
Red Hat Security Advisory: bind security update
bind: named's configured cache size limit can be significantly exceeded
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
7.5
null
null
RHSA-2024:7551
Red Hat Security Advisory: cups-filters security update
cups-filters: libcupsfilters: `cfGetPrinterAttributes` API does not perform sanitization on returned IPP attributes cups: libppd: remote command injection via attacker controlled data in PPD file cups-browsed: cups-browsed binds on UDP INADDR_ANY:631 trusting any packet from any source cups-browsed: cups-filters: cups-browsed vulnerable to DDoS amplification attack
[ "cpe:/o:redhat:rhel_aus:7.7::server" ]
null
7.5
null
null
RHSA-2022:5050
Red Hat Security Advisory: .NET 6.0 security and bugfix update
dotnet: NuGet Credential leak due to loss of control of third party symbol server domain
[ "cpe:/a:redhat:enterprise_linux:9::appstream", "cpe:/a:redhat:enterprise_linux:9::crb" ]
null
5
null
null
RHSA-2012:0302
Red Hat Security Advisory: cups security and bug fix update
David Koblas' GIF decoder LZW decoder buffer overflow
[ "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::client_workstation", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
RHSA-2013:0671
Red Hat Security Advisory: openstack-packstack security and bug fix update
packstack: answerfile creation permissions issue
[ "cpe:/a:redhat:openstack:2::el6" ]
null
null
null
null
RHSA-2019:2411
Red Hat Security Advisory: kernel security update
kernel: hw: Spectre SWAPGS gadget vulnerability kernel: broken permission and object lifetime handling for PTRACE_TRACEME
[ "cpe:/a:redhat:enterprise_linux:8::crb", "cpe:/o:redhat:enterprise_linux:8::baseos" ]
null
null
7.8
null
RHSA-2024:0244
Red Hat Security Advisory: java-17-openjdk security and bug fix update
OpenJDK: array out-of-bounds access due to missing range check in C1 compiler (8314468) OpenJDK: JVM class file verifier flaw allows unverified bytecode execution (8314295) OpenJDK: range check loop optimization issue (8314307) OpenJDK: incorrect handling of ZIP files with duplicate entries (8276123) OpenJDK: logging of digital signature private keys (8316976) OpenJDK: RSA padding issue and timing side-channel attack against TLS (8317547)
[ "cpe:/a:redhat:rhel_eus:9.0::appstream", "cpe:/a:redhat:rhel_eus:9.0::crb" ]
null
7.4
null
null
RHSA-2022:7323
Red Hat Security Advisory: python3.9 security update
python: int() type in PyLong_FromString() does not limit amount of digits converting text to int leading to DoS
[ "cpe:/a:redhat:enterprise_linux:9::appstream", "cpe:/a:redhat:enterprise_linux:9::crb", "cpe:/o:redhat:enterprise_linux:9::baseos" ]
null
7.5
null
null
RHSA-2009:1206
Red Hat Security Advisory: libxml and libxml2 security update
mingw32-libxml2: Stack overflow by parsing root XML element DTD definition mingw32-libxml2: Pointer use-after-free flaws by parsing Notation and Enumeration attribute types
[ "cpe:/o:redhat:enterprise_linux:3::as", "cpe:/o:redhat:enterprise_linux:3::desktop", "cpe:/o:redhat:enterprise_linux:3::es", "cpe:/o:redhat:enterprise_linux:3::ws", "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws", "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::client_workstation", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
RHSA-2018:1206
Red Hat Security Advisory: java-1.7.0-oracle security update
OpenJDK: incorrect merging of sections in the JAR manifest (Security, 8189969) OpenJDK: unrestricted deserialization of data from JCEKS key stores (Security, 8189997) OpenJDK: insufficient consistency checks in deserialization of multiple classes (Security, 8189977) OpenJDK: unbounded memory allocation during deserialization in PriorityBlockingQueue (Concurrency, 8189981) OpenJDK: unbounded memory allocation during deserialization in TabularDataSupport (JMX, 8189985) OpenJDK: unbounded memory allocation during deserialization in Container (AWT, 8189989) OpenJDK: unbounded memory allocation during deserialization in NamedNodeMapImpl (JAXP, 8189993) OpenJDK: RMI HTTP transport enabled by default (RMI, 8193833) OpenJDK: incorrect handling of Reference clones can lead to sandbox bypass (Hotspot, 8192025) OpenJDK: unbounded memory allocation during deserialization in StubIORImpl (Serialization, 8192757)
[ "cpe:/a:redhat:rhel_extras_oracle_java:6" ]
null
null
5.3
null
RHSA-2018:3729
Red Hat Security Advisory: rh-ruby23-ruby security, bug fix, and enhancement update
ruby: HTTP response splitting in WEBrick ruby: Unintentional file and directory creation with directory traversal in tempfile and tmpdir ruby: DoS by large request in WEBrick ruby: Buffer under-read in String#unpack ruby: Unintentional socket creation by poisoned NULL byte in UNIXServer and UNIXSocket ruby: Unintentional directory traversal by poisoned NULL byte in Dir ruby: OpenSSL::X509:: Name equality check does not work correctly ruby: Tainted flags are not propagated in Array#pack and String#unpack with some directives rubygems: Path traversal when writing to a symlinked basedir outside of the root rubygems: Unsafe Object Deserialization Vulnerability in gem owner allowing arbitrary code execution on specially crafted YAML rubygems: Infinite loop vulnerability due to negative size in tar header causes Denial of Service rubygems: Improper verification of signatures in tarball allows to install mis-signed gem rubygems: Missing URL validation on spec home attribute allows malicious gem to set an invalid homepage URL rubygems: XSS vulnerability in homepage attribute when displayed via gem server rubygems: Path traversal issue during gem installation allows to write to arbitrary filesystem locations
[ "cpe:/a:redhat:rhel_software_collections:3::el6", "cpe:/a:redhat:rhel_software_collections:3::el7" ]
null
null
5.5
null
RHSA-2024:4247
Red Hat Security Advisory: libuv security update
libuv: Improper Domain Lookup that potentially leads to SSRF attacks
[ "cpe:/a:redhat:enterprise_linux:8::appstream", "cpe:/a:redhat:enterprise_linux:8::crb" ]
null
7.3
null
null
RHSA-2012:1540
Red Hat Security Advisory: kernel security, bug fix, and enhancement update
kernel: rds-ping cause kernel panic kernel: net: slab corruption due to improper synchronization around inet->opt kernel: ext4: AIO vs fallocate stale data exposure kernel: xen: VCPU timer overflow leads to PCPU deadlock and host death-by-watchdog kernel: xen: Memory mapping failure can crash Xen kernel: xen: XENMEM_exchange may overwrite hypervisor memory
[ "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
RHSA-2016:2054
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 6.4.10 natives update on RHEL 7
httpd: HTTP request smuggling attack against chunked request parser mod_cluster: remotely Segfault Apache http server mod_cluster: Buffer overflow in mod_manager when sending request with long JVMRoute
[ "cpe:/a:redhat:jboss_enterprise_application_platform:6::el7" ]
null
null
4.8
null
RHSA-2007:0125
Red Hat Security Advisory: XFree86 security update
xserver XC-MISC integer overflow Multiple font integer overflows (CVE-2007-1352) Multiple font integer overflows (CVE-2007-1352) XGetPixel() integer overflow
[ "cpe:/o:redhat:enterprise_linux:2.1::as", "cpe:/o:redhat:enterprise_linux:2.1::aw", "cpe:/o:redhat:enterprise_linux:2.1::es", "cpe:/o:redhat:enterprise_linux:2.1::ws", "cpe:/o:redhat:enterprise_linux:3::as", "cpe:/o:redhat:enterprise_linux:3::desktop", "cpe:/o:redhat:enterprise_linux:3::es", "cpe:/o:redhat:enterprise_linux:3::ws" ]
null
null
null
null
RHEA-2020:0635
Red Hat Enhancement Advisory: microcode_ctl bug fix and enhancement update
hw: Intel SGX information leak
[ "cpe:/o:redhat:rhel_e4s:8.0::baseos" ]
null
null
6
null
RHSA-2025:0039
Red Hat Security Advisory: bind and bind-dyndb-ldap security update
bind: stack exhaustion in control channel code may lead to DoS bind9: Parsing large DNS messages may cause excessive CPU load bind9: KeyTrap - Extreme CPU consumption in DNSSEC validator bind9: Preparing an NSEC3 closest encloser proof can exhaust CPU resources
[ "cpe:/o:redhat:rhel_els:6" ]
null
7.5
null
null
RHSA-2020:3779
Red Hat Security Advisory: Red Hat Data Grid 7.3.7 security update
jetty: HTTP request smuggling using the range header jetty: HTTP request smuggling jetty: Incorrect header handling jackson-mapper-asl: XML external entity similar to CVE-2016-3720 resteasy: Improper validation of response header in MediaTypeHeaderDelegate.java class EAP: field-name is not parsed in accordance to RFC7230 Wildfly: EJBContext principal is not popped back after invoking another EJB using a different Security Domain undertow: AJP File Read/Inclusion Vulnerability Wildfly: Improper authorization issue in WildFlySecurityManager when using alternative protection domain undertow: servletPath is normalized incorrectly leading to dangerous application mapping which could result in security bypass jackson-databind: Lacks certain xbean-reflect/JNDI blocking log4j: improper validation of certificate with host mismatch in SMTP appender jackson-databind: Serialization gadgets in shaded-hikari-config jackson-databind: Serialization gadgets in ibatis-sqlmap jackson-databind: Serialization gadgets in anteros-core jackson-databind: mishandles the interaction between serialization gadgets and typing which could result in remote command execution jackson-databind: mishandles the interaction between serialization gadgets and typing which could result in remote command execution wildfly-elytron: session fixation when using FORM authentication jackson-databind: Serialization gadgets in org.aoju.bus.proxy.provider.*.RmiProvider jackson-databind: Serialization gadgets in javax.swing.JEditorPane jackson-databind: Serialization gadgets in org.apache.activemq.jms.pool.XaPooledConnectionFactory jackson-databind: Serialization gadgets in org.apache.commons.proxy.provider.remoting.RmiProvider jackson-databind: Serialization gadgets in org.apache.openjpa.ee.WASRegistryManagedRuntime netty: compression/decompression codecs don't enforce limits on buffer allocation sizes jackson-databind: Serialization gadgets in org.springframework:spring-aop jackson-databind: Serialization gadgets in commons-jelly:commons-jelly
[ "cpe:/a:redhat:jboss_data_grid:7.3" ]
null
8.1
8.1
null
RHSA-2021:2993
Red Hat Security Advisory: rh-varnish6-varnish security update
varnish: HTTP/2 request smuggling attack via a large Content-Length header for a POST request
[ "cpe:/a:redhat:rhel_software_collections:3::el7" ]
null
8.1
null
null
RHSA-2005:013
Red Hat Security Advisory: cups security update
security flaw security flaw security flaw security flaw security flaw
[ "cpe:/o:redhat:enterprise_linux:3::as", "cpe:/o:redhat:enterprise_linux:3::desktop", "cpe:/o:redhat:enterprise_linux:3::es", "cpe:/o:redhat:enterprise_linux:3::ws" ]
null
null
null
null
RHSA-2018:1957
Red Hat Security Advisory: git security update
git: arbitrary code execution when recursively cloning a malicious repository
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
8.8
null
RHSA-2021:4594
Red Hat Security Advisory: gcc-toolset-11-binutils security update
environment: Unicode's bidirectional (BiDi) override characters can cause trojan source attacks
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
8.5
null
null
RHSA-2005:014
Red Hat Security Advisory: nfs-utils security update
security flaw security flaw
[ "cpe:/o:redhat:enterprise_linux:2.1::as", "cpe:/o:redhat:enterprise_linux:2.1::aw", "cpe:/o:redhat:enterprise_linux:2.1::es", "cpe:/o:redhat:enterprise_linux:2.1::ws" ]
null
null
null
null
RHSA-2020:5399
Red Hat Security Advisory: thunderbird security update
Mozilla: Stack overflow due to incorrect parsing of SMTP server response codes
[ "cpe:/a:redhat:rhel_eus:8.2::appstream" ]
null
8.8
null
null
RHSA-2024:11142
Red Hat Security Advisory: gstreamer1-plugins-base security update
gstreamer1-plugins-base: GStreamer has a stack-buffer overflow in vorbis_handle_identification_packet gstreamer1-plugins-base: stack-buffer overflow in gst_opus_dec_parse_header gstreamer1-plugins-base: out-of-bounds write in Ogg demuxer
[ "cpe:/a:redhat:rhel_eus:8.8::appstream" ]
null
9.8
null
null
RHSA-2023:6220
Red Hat Security Advisory: Errata Advisory for Red Hat OpenShift GitOps v1.10.1 security update
golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487)
[ "cpe:/a:redhat:openshift_gitops:1.10::el8" ]
null
7.5
null
null
RHSA-2022:5392
Red Hat Security Advisory: Red Hat Advanced Cluster Management 2.3.11 security updates and bug fixes
node-fetch: exposure of sensitive information to an unauthorized actor follow-redirects: Exposure of Sensitive Information via Authorization Header leak nconf: Prototype pollution in memory store golang: crypto/elliptic: IsOnCurve returns true for invalid field elements Moment.js: Path traversal in moment.locale golang: syscall: faccessat checks wrong group go-getter: writes SSH credentials into logfile, exposing sensitive credentials to local uses
[ "cpe:/a:redhat:acm:2.3::el7", "cpe:/a:redhat:acm:2.3::el8" ]
null
5.1
null
null
RHSA-2016:1433
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 6.4.9 update
tomcat: URL Normalization issue JGroups: Authorization bypass
[ "cpe:/a:redhat:jboss_enterprise_application_platform:6::el6" ]
null
null
9.8
null
RHSA-2015:1682
Red Hat Security Advisory: thunderbird security update
Mozilla: Miscellaneous memory safety hazards (rv:38.2) (MFSA 2015-79) Mozilla: Vulnerabilities found through code inspection (MFSA 2015-90) Mozilla: Vulnerabilities found through code inspection (MFSA 2015-90) Mozilla: Vulnerabilities found through code inspection (MFSA 2015-90) Mozilla: Heap overflow in gdk-pixbuf when scaling bitmap images (MFSA 2015-88)
[ "cpe:/a:redhat:rhel_productivity:5", "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation", "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
null
null
RHSA-2018:0045
Red Hat Security Advisory: rhvm-appliance security update
An update for rhvm-appliance is now available for RHEV 4.X, RHEV-H, and Agents for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
[ "cpe:/o:redhat:enterprise_linux:7::hypervisor" ]
null
null
null
null
RHBA-2023:6863
Red Hat Bug Fix Advisory: LVMS 4.14.z Bug Fix and Enhancement update
golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487) HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack)
[ "cpe:/a:redhat:lvms:4.14::el9" ]
null
7.5
null
null
RHSA-2024:10265
Red Hat Security Advisory: kernel security update
kernel: xprtrdma: fix pointer derefs in error cases of rpcrdma_ep_create kernel: mptcp: pm: Fix uaf in __timer_delete_sync
[ "cpe:/o:redhat:rhel_aus:8.4::baseos", "cpe:/o:redhat:rhel_e4s:8.4::baseos", "cpe:/o:redhat:rhel_tus:8.4::baseos" ]
null
7
null
null
RHSA-2020:0964
Red Hat Security Advisory: OpenShift Container Platform 3.11 jenkins-2-plugins security update
openshift/jenkins-plugin: Deserialization in snakeyaml YAML() objects allows for remote code execution
[ "cpe:/a:redhat:openshift:3.11::el7" ]
null
8.8
null
null
RHSA-2019:0130
Red Hat Security Advisory: Red Hat JBoss Web Server 3.1 Service Pack 6 security and bug fix update
tomcat: Host name verification missing in WebSocket client tomcat: Open redirect in default servlet
[ "cpe:/a:redhat:jboss_enterprise_web_server:3.1" ]
null
null
5.3
null
RHSA-2023:5269
Red Hat Security Advisory: postgresql:15 security update
postgresql: schema_element defeats protective search_path changes postgresql: row security policies disregard user ID changes after inlining.
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
4.2
null
null
RHSA-2016:0101
Red Hat Security Advisory: java-1.6.0-ibm security update
JDK: J9 JVM allows code to invoke non-public interface methods TLS 1.2 Transcipt Collision attacks against MD5 in key exchange protocol (SLOTH) libpng: Out-of-bounds read in png_convert_to_rfc1123 libpng: Buffer overflow vulnerabilities in png_get_PLTE/png_set_PLTE functions libpng: Buffer overflow vulnerabilities in png_get_PLTE/png_set_PLTE functions libpng: underflow read in png_check_keyword() OpenJDK: URL deserialization inconsistencies (Networking, 8059054) OpenJDK: logging of RMI connection secrets (JMX, 8130710) OpenJDK: insufficient enforcement of totalEntitySizeLimit (JAXP, 8133962) OpenJDK: incorrect boundary check in JPEG decoder (AWT, 8139017) ICU: integer signedness issue in IndicRearrangementProcessor (OpenJDK 2D, 8140543)
[ "cpe:/a:redhat:rhel_extras:5::client", "cpe:/a:redhat:rhel_extras:5::server", "cpe:/a:redhat:rhel_extras:6" ]
null
null
8.8
null
RHSA-2021:0833
Red Hat Security Advisory: OpenShift Container Platform 3.11.404 security and bug fix update
golang-github-gorilla-websocket: integer overflow leads to denial of service
[ "cpe:/a:redhat:openshift:3.11::el7" ]
null
7.5
null
null
RHSA-2023:5739
Red Hat Security Advisory: java-11-openjdk security and bug fix update
OpenJDK: certificate path validation issue during client authentication (8309966)
[ "cpe:/a:redhat:rhel_aus:8.2::appstream", "cpe:/a:redhat:rhel_e4s:8.2::appstream", "cpe:/a:redhat:rhel_tus:8.2::appstream" ]
null
5.3
null
null
RHSA-2014:1552
Red Hat Security Advisory: openssh security, bug fix, and enhancement update
openssh: AcceptEnv environment restriction bypass flaw openssh: failure to check DNS SSHFP records in certain scenarios
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
null
null
RHSA-2024:2433
Red Hat Security Advisory: avahi security update
avahi: Reachable assertion in avahi_dns_packet_append_record avahi: Reachable assertion in avahi_escape_label avahi: Reachable assertion in dbus_set_host_name avahi: Reachable assertion in avahi_rdata_parse avahi: Reachable assertion in avahi_alternative_host_name
[ "cpe:/a:redhat:enterprise_linux:9::appstream", "cpe:/a:redhat:enterprise_linux:9::crb", "cpe:/o:redhat:enterprise_linux:9::baseos" ]
null
6.2
null
null
RHSA-2021:2431
Red Hat Security Advisory: OpenShift Container Platform 4.5.41 security update
jetty: local temporary directory hijacking vulnerability jetty: buffer not correctly recycled in Gzip Request inflation jetty: request containing multiple Accept headers with a large number of "quality" parameters may lead to DoS jenkins-2-plugins/config-file-provider: Does not configure its XML parser to prevent XML external entity (XXE) attacks. jenkins-2-plugins/config-file-provider: Does not correctly perform permission checks in several HTTP endpoints. jenkins-2-plugins/config-file-provider: does not require POST requests for an HTTP endpoint, resulting in a cross-site request forgery (CSRF) vulnerability. jenkins-2-plugins/config-file-provider: Does not perform permission checks in several HTTP endpoints.
[ "cpe:/a:redhat:openshift:4.5::el7", "cpe:/a:redhat:openshift:4.5::el8" ]
null
4.3
null
null
RHSA-2022:1991
Red Hat Security Advisory: cpio security update
cpio: integer overflow in ds_fgetstr() in dstring.c can lead to an out-of-bounds write via a crafted pattern file
[ "cpe:/o:redhat:enterprise_linux:8::baseos" ]
null
7
null
null
RHSA-2013:0549
Red Hat Security Advisory: Red Hat Directory Server security and bug fix update
389: denial of service when using certificate groups
[ "cpe:/a:redhat:directory_server:8::el5" ]
null
null
null
null
RHSA-2023:0629
Red Hat Security Advisory: libksba security update
libksba: integer overflow to code execution
[ "cpe:/a:redhat:rhel_eus:9.0::crb", "cpe:/o:redhat:rhel_eus:9.0::baseos" ]
null
8.6
null
null
RHSA-2020:4247
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.3.3 security update
cxf: JMX integration is vulnerable to a MITM attack picketbox: JBoss EAP reload to admin-only mode allows authentication bypass wildfly: XML validation manipulation due to incomplete application of use-grammar-pool-only in xercesImpl xnio: file descriptor leak caused by growing amounts of NIO Selector file handles may lead to DoS
[ "cpe:/a:redhat:jboss_enterprise_application_platform:7.3" ]
null
5.9
null
null
RHSA-2022:5468
Red Hat Security Advisory: php:8.0 security update
php: password of excessive length triggers buffer overflow leading to RCE
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
8.8
null
null
RHSA-2024:4902
Red Hat Security Advisory: kernel security update
kernel: ethernet: hisilicon: hns: hns_dsaf_misc: fix a possible array overflow in hns_dsaf_ge_srst_by_port() kernel: net: amd-xgbe: Fix skb data length underflow kernel: net/mlx5e: fix a potential double-free in fs_any_create_groups kernel: bonding: stop the device in bond_setup_by_slave() kernel: arp: Prevent overflow in arp_req_get(). kernel: net/ipv6: avoid possible UAF in ip6_route_mpath_notify() kernel: x86/xen: Add some null pointer checking to smp.c kernel: net/mlx5: Properly link new fs rules into the tree kernel: i40e: fix vf may be used uninitialized in this function warning kernel: scsi: qla2xxx: Fix off by one in qla_edif_app_getstats() kernel: scsi: lpfc: Release hbalock before calling lpfc_worker_wake_up() kernel: net: core: reject skb_copy(_expand) for fraglist GSO skbs kernel: af_unix: Fix data races in unix_release_sock/unix_stream_sendmsg
[ "cpe:/o:redhat:rhel_aus:8.6::baseos", "cpe:/o:redhat:rhel_e4s:8.6::baseos", "cpe:/o:redhat:rhel_tus:8.6::baseos" ]
null
4.7
null
null
RHSA-2024:5079
Red Hat Security Advisory: libtiff security update
libtiff: Heap-based buffer overflow in ChopUpSingleUncompressedStrip in tif_dirread.c libtiff: heap-based buffer overflow in cpStripToTile() in tools/tiffcp.c libtiff: Buffer Overflow via /libtiff/tools/tiffcrop.c libtiff: Segment fault in libtiff in TIFFReadRGBATileExt() leading to denial of service
[ "cpe:/a:redhat:enterprise_linux:8::appstream", "cpe:/a:redhat:enterprise_linux:8::crb" ]
null
7.5
5.3
null
RHSA-2023:3445
Red Hat Security Advisory: Red Hat OpenStack Platform 16.2 (etcd) security update
etcd: Information discosure via debug function golang.org/x/net/http2: avoid quadratic complexity in HPACK decoding golang: crypto/tls: large handshake records may cause panics golang: net/http, mime/multipart: denial of service from excessive resource consumption golang: net/http, net/textproto: denial of service from excessive memory allocation golang: net/http, net/textproto, mime/multipart: denial of service from excessive resource consumption golang: go/parser: Infinite loop in parsing golang: html/template: backticks not treated as string delimiters golang: html/template: improper sanitization of CSS values golang: html/template: improper handling of JavaScript whitespace golang: html/template: improper handling of empty HTML attributes
[ "cpe:/a:redhat:openstack:16.2::el8" ]
null
7.3
null
null
RHSA-2019:2809
Red Hat Security Advisory: kernel-alt security, bug fix, and enhancement update
Kernel: page cache side channel attacks Kernel: KVM: potential use-after-free via kvm_ioctl_create_device() kernel: broken permission and object lifetime handling for PTRACE_TRACEME
[ "cpe:/o:redhat:enterprise_linux:7::server" ]
null
null
7.8
null
RHSA-2023:1268
Red Hat Security Advisory: OpenShift Container Platform 4.12.8 security update
golang: net/http: excessive memory growth in a Go server accepting HTTP/2 requests haproxy: request smuggling attack in HTTP/1 header parsing
[ "cpe:/a:redhat:openshift:4.12::el8", "cpe:/a:redhat:openshift:4.12::el9" ]
null
8.2
null
null
RHSA-2012:1326
Red Hat Security Advisory: freeradius security update
freeradius: stack-based buffer overflow via long expiration date fields in client X509 certificates
[ "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
null
null
RHSA-2023:7725
Red Hat Security Advisory: RHACS 4.3 enhancement and security update
dexidp: gaining access to applications accepting that token
[ "cpe:/a:redhat:advanced_cluster_security:4.3::el8" ]
null
6.5
null
null
RHSA-2024:0371
Red Hat Security Advisory: kpatch-patch security update
kernel: netfilter: potential slab-out-of-bound access due to integer underflow
[ "cpe:/o:redhat:enterprise_linux:7::server" ]
null
7
null
null
RHSA-2014:0687
Red Hat Security Advisory: libtasn1 security update
libtasn1: multiple boundary check issues libtasn1: asn1_get_bit_der() can return negative bit length libtasn1: asn1_read_value_type() NULL pointer dereference
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
null
null
RHSA-2012:0729
Red Hat Security Advisory: java-1.6.0-openjdk security update
OpenJDK: improper protection of CORBA data models (CORBA, 7079902) OpenJDK: fontmanager layout lookup code memory corruption (2D, 7143617) OpenJDK: SynthLookAndFeel application context bypass (Swing, 7143614) OpenJDK: insecure temporary file permissions (JRE, 7143606) OpenJDK: CRL and certificate extensions handling improvements (Security, 7143872) OpenJDK: mutable repository identifiers in generated stub code (CORBA, 7143851) OpenJDK: insufficient field accessibility checks (HotSpot, 7152811) OpenJDK: XML parsing infinite loop (JAXP, 7157609) OpenJDK: insufficient invokespecial <init> verification (HotSpot, 7160757)
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
null
null
RHSA-2007:1026
Red Hat Security Advisory: poppler security update
DCTStream:: readProgressiveDataUnit() DCTStream:: reset() CCITTFaxStream:: lookChar()
[ "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::client_workstation", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
RHSA-2020:1428
Red Hat Security Advisory: Open Liberty 20.0.0.4 Runtime security update
Open Liberty 20.0.0.4 Runtime is now available from the Customer Portal. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
[ "cpe:/a::openliberty:20" ]
null
null
null
null
RHSA-2021:5170
Red Hat Security Advisory: Red Hat Single Sign-On 7.4.10 security update
undertow: potential security issue in flow control over HTTP/2 may lead to DOS wildfly-elytron: possible timing attack in ScramServer wildfly: incorrect JBOSS_LOCAL_USER challenge location may lead to giving access to all the local users resteasy: Error message exposes endpoint class information jsoup: Crafted input may cause the jsoup HTML and XML parser to get stuck xml-security: XPath Transform abuse allows for information disclosure
[ "cpe:/a:redhat:red_hat_single_sign_on:7" ]
null
7.5
null
null
RHSA-2003:182
Red Hat Security Advisory: ghostscript security update
security flaw
[ "cpe:/o:redhat:enterprise_linux:2.1::as", "cpe:/o:redhat:enterprise_linux:2.1::aw", "cpe:/o:redhat:enterprise_linux:2.1::es", "cpe:/o:redhat:enterprise_linux:2.1::ws" ]
null
null
null
null
RHSA-2023:6685
Red Hat Security Advisory: tpm2-tss security and enhancement update
tpm2-tss: Buffer Overlow in TSS2_RC_Decode
[ "cpe:/a:redhat:enterprise_linux:9::crb", "cpe:/o:redhat:enterprise_linux:9::baseos" ]
null
6.4
null
null
RHSA-2003:151
Red Hat Security Advisory: tcpdump security update
security flaw security flaw
[ "cpe:/o:redhat:enterprise_linux:2.1::as", "cpe:/o:redhat:enterprise_linux:2.1::aw", "cpe:/o:redhat:enterprise_linux:2.1::es", "cpe:/o:redhat:enterprise_linux:2.1::ws" ]
null
null
null
null
RHSA-2015:1904
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 6.4.4 update
AS/WildFly: missing X-Frame-Options header leading to clickjacking EAP: CSRF vulnerability in EAP & WildFly Web Console OOME from EAP 6 http management console
[ "cpe:/a:redhat:jboss_enterprise_application_platform:6::el5" ]
null
null
null
null
RHBA-2006:0287
Red Hat Bug Fix Advisory: bind bug fix update
INSIST failure in ISC BIND recursive query
[ "cpe:/o:redhat:enterprise_linux:3::as", "cpe:/o:redhat:enterprise_linux:3::desktop", "cpe:/o:redhat:enterprise_linux:3::es", "cpe:/o:redhat:enterprise_linux:3::ws" ]
null
null
null
null
RHSA-2022:1463
Red Hat Security Advisory: Red Hat Single Sign-On 7.5.2 security update on RHEL 8
log4j-core: DoS in log4j 2.x with Thread Context Map (MDC) input data contains a recursive lookup and context lookup pattern
[ "cpe:/a:redhat:red_hat_single_sign_on:7.5::el8" ]
null
5.9
null
null
RHSA-2012:0679
Red Hat Security Advisory: tomcat5 security and bug fix update
tomcat: Multiple weaknesses in HTTP DIGEST authentication tomcat: password disclosure vulnerability tomcat: security manager restrictions bypass tomcat: authentication bypass and information disclosure tomcat: hash table collisions CPU usage DoS (oCERT-2011-003) tomcat: Multiple weaknesses in HTTP DIGEST authentication tomcat: Multiple weaknesses in HTTP DIGEST authentication tomcat: Multiple weaknesses in HTTP DIGEST authentication tomcat: large number of parameters DoS
[ "cpe:/a:redhat:jboss_enterprise_web_server:1.0" ]
null
null
null
null
RHSA-2020:3875
Red Hat Security Advisory: tigervnc security and bug fix update
tigervnc: Stack use-after-return due to incorrect usage of stack memory in ZRLEDecoder tigervnc: Heap buffer overflow triggered from CopyRectDecoder due to incorrect value checks tigervnc: Heap buffer overflow in TightDecoder::FilterGradient tigervnc: Heap buffer overflow in DecodeManager::decodeRect tigervnc: Stack buffer overflow in CMsgReader::readSetCursor
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
7.2
null
null
RHSA-2011:1424
Red Hat Security Advisory: perl security update
Perl decode_xs heap-based buffer overflow Perl Digest improper control of generation of code
[ "cpe:/o:redhat:enterprise_linux:6::server" ]
null
null
null
null
RHSA-2019:1107
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.2.1 on RHEL 6 security update
jackson-databind: Potential information exfiltration with default typing, serialization gadget from MyBatis jackson-databind: improper polymorphic deserialization of types from Jodd-db library jackson-databind: improper polymorphic deserialization of types from Oracle JDBC driver undertow: Infoleak in some circumstances where Undertow can serve data from a random buffer jackson-databind: exfiltration/XXE in some JDK classes jackson-databind: server-side request forgery (SSRF) in axis2-jaxws class wildfly: Race condition on PID file allows for termination of arbitrary processes by local users wildfly: wrong SecurityIdentity for EE concurrency threads that are reused
[ "cpe:/a:redhat:jboss_enterprise_application_platform:7.2::el6" ]
null
null
5.4
null
RHSA-2023:6431
Red Hat Security Advisory: libfastjson security update
libfastjson: integer overflow and out-of-bounds write via a large JSON file
[ "cpe:/a:redhat:enterprise_linux:9::appstream", "cpe:/a:redhat:enterprise_linux:9::crb" ]
null
7.8
null
null
RHSA-2015:0234
Red Hat Security Advisory: Red Hat JBoss BPM Suite 6.0.3 security update
CXF: SSL hostname verification bypass, incomplete CVE-2012-5783 fix OpenJDK: XML parsing Denial of Service (JAXP, 8017298) JSF: XSS due to insufficient escaping of user-supplied content in outputText tags and EL expressions PicketBox/JBossSX: Unauthorized access to and modification of application server configuration and state by application Tomcat/JBossWeb: Limited DoS in chunked transfer encoding input filter Tomcat/JBossWeb: XXE vulnerability via user supplied XSLTs Tomcat/JBossWeb: Request smuggling via malicious content length header Tomcat/JBossWeb: XML parser hijack by malicious web application netty: DoS via memory exhaustion during data aggregation Tomcat/JBossWeb: request smuggling and limited DoS in ChunkedInputFilter Security: Invalid EJB caller role check implementation RESTEasy: XXE via parameter entities PicketLink: XXE via insecure DocumentBuilderFactory usage Validator: JSM bypass via ReflectionHelper CXF: SSL hostname verification bypass, incomplete CVE-2012-6153 fix Framework: Directory traversal Framework: directory traversal flaw jbpm-designer: XXE in BPMN2 import UberFire: Information disclosure and RCE via insecure file upload/download servlets Workbench: Insufficient authorization constraints
[ "cpe:/a:redhat:jboss_bpms:6.0" ]
null
null
4.8
null
RHSA-2010:0742
Red Hat Security Advisory: postgresql and postgresql84 security update
PL/Tcl): SECURITY DEFINER function keyword bypass
[ "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws", "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::client_workstation", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
RHSA-2019:2205
Red Hat Security Advisory: tomcat security, bug fix, and enhancement update
tomcat: Incorrect handling of empty string URL in security constraints can lead to unintended exposure of resources tomcat: Late application of security constraints can lead to resource exposure for unauthorised users tomcat: Insecure defaults in CORS filter enable 'supportsCredentials' for all origins tomcat: Host name verification missing in WebSocket client
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
4.3
null
RHSA-2004:153
Red Hat Security Advisory: cvs security update
security flaw security flaw
[ "cpe:/o:redhat:enterprise_linux:3::as", "cpe:/o:redhat:enterprise_linux:3::desktop", "cpe:/o:redhat:enterprise_linux:3::es", "cpe:/o:redhat:enterprise_linux:3::ws" ]
null
null
null
null
RHSA-2022:6825
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.4.7 Security update
undertow: potential security issue in flow control over HTTP/2 may lead to DOS(incomplete fix for CVE-2021-3629) undertow: Large AJP request may cause DoS snakeyaml: Denial of Service due to missing nested depth limitation for collections
[ "cpe:/a:redhat:jboss_enterprise_application_platform:7.4" ]
null
7.5
null
null
RHSA-2024:2853
Red Hat Security Advisory: nodejs:20 security update
nodejs: using the fetch() function to retrieve content from an untrusted URL leads to denial of service c-ares: Out of bounds read in ares__read_line() nodejs: HTTP Request Smuggling via Content Length Obfuscation nodejs: CONTINUATION frames DoS nghttp2: CONTINUATION frames DoS
[ "cpe:/a:redhat:enterprise_linux:9::appstream" ]
null
5.3
null
null
RHSA-2022:6878
Red Hat Security Advisory: expat security update
expat: a use-after-free in the doContent function in xmlparse.c
[ "cpe:/o:redhat:enterprise_linux:8::baseos" ]
null
8.1
null
null
RHSA-2020:2391
Red Hat Security Advisory: Red Hat build of Eclipse Vert.x 3.9.1 security update
log4j: improper validation of certificate with host mismatch in SMTP appender
[ "cpe:/a:redhat:openshift_application_runtimes:1.0" ]
null
3.7
null
null
RHSA-2024:5258
Red Hat Security Advisory: container-tools:rhel8 security update
golang: net/http: golang: mime/multipart: golang: net/textproto: memory exhaustion in Request.ParseMultipartForm golang-fips/openssl: Memory leaks in code encrypting and decrypting RSA payloads containers/image: digest type does not guarantee valid type go-retryablehttp: url might write sensitive information to log file golang: crypto/x509: Verify panics on certificates with an unknown public key algorithm golang: net/mail: comments in display names are incorrectly handled golang: archive/zip: Incorrect handling of certain ZIP files gorilla/schema: Potential memory exhaustion attack due to sparse slice deserialization
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
7.5
null
null
RHSA-2021:3444
Red Hat Security Advisory: kernel security and bug fix update
kernel: race condition in net/can/bcm.c leads to local privilege escalation kernel: use-after-free in route4_change() in net/sched/cls_route.c kernel: powerpc: KVM guest OS users can cause host OS memory corruption
[ "cpe:/a:redhat:rhel_eus:8.1::crb", "cpe:/o:redhat:rhel_eus:8.1::baseos" ]
null
7.8
null
null
RHSA-2024:5858
Red Hat Security Advisory: kpatch-patch-5_14_0-70_85_1 security update
kernel: TIPC message reassembly use-after-free remote code execution vulnerability kernel: net: kernel: UAF in network route management kernel: virtio-net: tap: mlx5_core short frame denial of service kernel: virtio-net: tun: mlx5_core short frame denial of service
[ "cpe:/o:redhat:rhel_e4s:9.0::baseos" ]
null
7.1
null
null
RHSA-2018:0481
Red Hat Security Advisory: jboss-ec2-eap package for EAP 7.1.1
resteasy: Vary header not added by CORS filter leading to cache poisoning artemis/hornetq: memory exhaustion via UDP and JGroups discovery undertow: Client can use bogus uri in Digest authentication infinispan: Unsafe deserialization of malicious object injected into data cache jackson-databind: Unsafe deserialization due to incomplete black list (incomplete fix for CVE-2017-7525) jackson-databind: Unsafe deserialization due to incomplete black list (incomplete fix for CVE-2017-15095) undertow: ALLOW_ENCODED_SLASH option not taken into account in the AjpRequestParser jackson-databind: unsafe deserialization due to incomplete blacklist (incomplete fix for CVE-2017-7525 and CVE-2017-17485)
[ "cpe:/a:redhat:jboss_enterprise_application_platform:7.1::el7", "cpe:/a:redhat:jboss_enterprise_application_platform:7::el6" ]
null
null
8.1
null
RHSA-2024:1555
Red Hat Security Advisory: .NET 6.0 security update
dotnet: Denial of Service in X509Certificate2
[ "cpe:/a:redhat:rhel_eus:9.2::appstream", "cpe:/a:redhat:rhel_eus:9.2::crb" ]
null
7.5
null
null
RHSA-2005:012
Red Hat Security Advisory: krb5 security update
security flaw security flaw
[ "cpe:/o:redhat:enterprise_linux:3::as", "cpe:/o:redhat:enterprise_linux:3::desktop", "cpe:/o:redhat:enterprise_linux:3::es", "cpe:/o:redhat:enterprise_linux:3::ws" ]
null
null
null
null
RHSA-2006:0663
Red Hat Security Advisory: ncompress security update
ncompress: .bss buffer underflow in decompression
[ "cpe:/o:redhat:enterprise_linux:3::as", "cpe:/o:redhat:enterprise_linux:3::desktop", "cpe:/o:redhat:enterprise_linux:3::es", "cpe:/o:redhat:enterprise_linux:3::ws", "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws" ]
null
null
null
null
RHSA-2020:3377
Red Hat Security Advisory: chromium-browser security update
chromium-browser: Heap buffer overflow in background fetch chromium-browser: Side-channel information leakage in content security policy chromium-browser: Type Confusion in V8 chromium-browser: Heap buffer overflow in PDFium chromium-browser: Inappropriate implementation in WebRTC chromium-browser: Use after free in tab strip chromium-browser: Policy bypass in CORS chromium-browser: Heap buffer overflow in history chromium-browser: Use after free in developer tools chromium-browser: Policy bypass in CSP chromium-browser: Heap buffer overflow in Skia chromium-browser: Side-channel information leakage in autofill chromium-browser: Inappropriate implementation in external protocol handlers chromium-browser: Out of bounds write in Skia chromium-browser: Heap buffer overflow in WebAudio chromium-browser: Heap buffer overflow in Skia chromium-browser: Inappropriate implementation in iframe sandbox chromium-browser: Insufficient policy enforcement in CSP chromium-browser: Incorrect security UI in basic auth chromium-browser: Inappropriate implementation in WebRTC chromium-browser: Out of bounds memory access in developer tools chromium-browser: Side-channel information leakage in scroll to text chromium-browser: Use after free in SCTP chromium-browser: Type Confusion in V8 chromium-browser: Heap buffer overflow in WebRTC chromium-browser: Insufficient data validation in WebUI chromium-browser: Incorrect security UI in PWAs chromium-browser: Type Confusion in V8 chromium-browser: Inappropriate implementation in WebView chromium-browser: Use after free in CSS chromium-browser: Heap buffer overflow in Skia chromium-browser: Use after free in WebUSB
[ "cpe:/a:redhat:rhel_extras:6" ]
null
8.8
null
null
RHSA-2023:7668
Red Hat Security Advisory: squid:4 security update
squid: DoS against HTTP and HTTPS squid: Use-After-Free in the HTTP Collapsed Forwarding Feature
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
7.5
null
null
RHSA-2018:1593
Red Hat Security Advisory: Red Hat OpenStack Platform director security update
openstack-tripleo-heat-templates: Ceph client keyring is world-readable when deployed by director memcached: UDP server support allows spoofed traffic amplification DoS
[ "cpe:/a:redhat:openstack:10::el7" ]
null
null
5.3
null
RHSA-2024:4409
Red Hat Security Advisory: linux-firmware security update
kernel: Reserved fields in guest message responses may not be zero initialized
[ "cpe:/o:redhat:rhel_aus:8.6::baseos", "cpe:/o:redhat:rhel_e4s:8.6::baseos", "cpe:/o:redhat:rhel_tus:8.6::baseos" ]
null
4.4
null
null
RHSA-2024:2580
Red Hat Security Advisory: yajl security update
yajl: Memory leak in yajl_tree_parse function
[ "cpe:/a:redhat:rhel_eus:8.8::appstream", "cpe:/a:redhat:rhel_eus:8.8::crb" ]
null
6.5
null
null
RHSA-2014:1995
Red Hat Security Advisory: Red Hat JBoss Fuse Service Works 6.0.0 security update
HawtJNI: predictable temporary file name leading to local arbitrary code execution Java: XML eXternal Entity (XXE) flaw in ParserPool and Decrypter jboss-as-server: Unchecked access to MSC Service Registry under JSM EAP6: Plain text password logging during security audit 6: JSM policy not respected by deployed applications Xalan-Java: insufficient constraints in secure processing feature
[ "cpe:/a:redhat:jboss_fuse_service_works:6.0" ]
null
null
null
null
RHSA-2022:0065
Red Hat Security Advisory: kernel-rt security and bug fix update
kernel: perf_event_parse_addr_filter memory kernel: fuse: fuse_do_getattr() calls make_bad_inode() in inappropriate situations kernel: Heap buffer overflow in firedtv driver
[ "cpe:/a:redhat:rhel_extras_rt:7" ]
null
6.7
null
null
RHSA-2017:2437
Red Hat Security Advisory: kernel security and bug fix update
kernel: crypto: GPF in lrw_crypt caused by null-deref kernel: l2tp: Race condition in the L2TPv3 IP encapsulation feature kernel: Null pointer dereference in search_keyring kernel: NFSv4 server does not properly validate layout type when processing NFSv4 pNFS LAYOUTGET operand
[ "cpe:/o:redhat:rhel_eus:7.3::computenode", "cpe:/o:redhat:rhel_eus:7.3::server" ]
null
null
8.6
null
RHSA-2015:0851
Red Hat Security Advisory: Red Hat JBoss BPM Suite 6.1.0 update
CXF: SSL hostname verification bypass, incomplete CVE-2012-5783 fix WS: EJB3 role restrictions are not applied to jaxws handlers Java: Java XML Signature DoS Attack async-http-client: SSL/TLS certificate verification is disabled under certain conditions async-http-client: missing hostname verification for SSL certificates CXF: The SecurityTokenService accepts certain invalid SAML Tokens as valid CXF: UsernameTokens are sent in plaintext with a Symmetric EncryptBeforeSigning policy JBossSX/PicketBox: World readable audit.log file CXF: HTML content posted to SOAP endpoint could cause OOM errors CXF: Large invalid content could cause temporary space to fill CXF: SSL hostname verification bypass, incomplete CVE-2012-6153 fix CXF: Improper security semantics enforcement of SAML SubjectConfirmation methods Security: Wrong security context loaded when using SAML2 STS Login Module RESTeasy: External entities expanded by DocumentProvider Weld: Limited information disclosure via stale thread state jBPM: BPMN2 file processing XXE in Process Execution
[ "cpe:/a:redhat:jboss_bpms:6.0" ]
null
null
4.8
null
RHBA-2024:1440
Red Hat Bug Fix Advisory: MTV 2.5.6 Images
golang: net/http/internal: Denial of Service (DoS) via Resource Consumption via HTTP requests nodejs-ip: arbitrary code execution via the isPublic() function
[ "cpe:/a:redhat:migration_toolkit_virtualization:2.5::el8", "cpe:/a:redhat:migration_toolkit_virtualization:2.5::el9" ]
null
9.8
null
null
RHSA-2022:5527
Red Hat Security Advisory: squid security update
squid: DoS when processing gopher server responses
[ "cpe:/a:redhat:enterprise_linux:9::appstream" ]
null
7.5
null
null
RHSA-2020:5198
Red Hat Security Advisory: Red Hat OpenShift Jaeger security update
golang-github-miekg-dns: predictable TXID can lead to response forgeries golang.org/x/text: possibility to trigger an infinite loop in encoding/unicode could lead to crash
[ "cpe:/a:redhat:jaeger:1.20::el8" ]
null
7.5
null
null
RHSA-2021:1679
Red Hat Security Advisory: bash security and bug fix update
bash: when effective UID is not equal to its real UID the saved UID is not dropped
[ "cpe:/o:redhat:enterprise_linux:8::baseos" ]
null
7.8
null
null