id
stringlengths 13
15
| title
stringlengths 29
176
| description
stringlengths 8
31.7k
| cpes
sequencelengths 0
20
| cvss_v4_0
null | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
null |
---|---|---|---|---|---|---|---|
RHSA-2020:2217 | Red Hat Security Advisory: OpenShift Container Platform 3.11 security update | jquery: Cross-site scripting due to improper injQuery.htmlPrefilter method | [
"cpe:/a:redhat:openshift:3.11::el7"
] | null | 6.1 | null | null |
RHSA-2014:1803 | Red Hat Security Advisory: mod_auth_mellon security update | mod_auth_mellon: remote memory disclosure flaw mod_auth_mellon: logout processing leads to denial of service | [
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2023:4152 | Red Hat Security Advisory: bind security update | bind: named's configured cache size limit can be significantly exceeded | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 7.5 | null | null |
RHSA-2024:7551 | Red Hat Security Advisory: cups-filters security update | cups-filters: libcupsfilters: `cfGetPrinterAttributes` API does not perform sanitization on returned IPP attributes cups: libppd: remote command injection via attacker controlled data in PPD file cups-browsed: cups-browsed binds on UDP INADDR_ANY:631 trusting any packet from any source cups-browsed: cups-filters: cups-browsed vulnerable to DDoS amplification attack | [
"cpe:/o:redhat:rhel_aus:7.7::server"
] | null | 7.5 | null | null |
RHSA-2022:5050 | Red Hat Security Advisory: .NET 6.0 security and bugfix update | dotnet: NuGet Credential leak due to loss of control of third party symbol server domain | [
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::crb"
] | null | 5 | null | null |
RHSA-2012:0302 | Red Hat Security Advisory: cups security and bug fix update | David Koblas' GIF decoder LZW decoder buffer overflow | [
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2013:0671 | Red Hat Security Advisory: openstack-packstack security and bug fix update | packstack: answerfile creation permissions issue | [
"cpe:/a:redhat:openstack:2::el6"
] | null | null | null | null |
RHSA-2019:2411 | Red Hat Security Advisory: kernel security update | kernel: hw: Spectre SWAPGS gadget vulnerability kernel: broken permission and object lifetime handling for PTRACE_TRACEME | [
"cpe:/a:redhat:enterprise_linux:8::crb",
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | null | 7.8 | null |
RHSA-2024:0244 | Red Hat Security Advisory: java-17-openjdk security and bug fix update | OpenJDK: array out-of-bounds access due to missing range check in C1 compiler (8314468) OpenJDK: JVM class file verifier flaw allows unverified bytecode execution (8314295) OpenJDK: range check loop optimization issue (8314307) OpenJDK: incorrect handling of ZIP files with duplicate entries (8276123) OpenJDK: logging of digital signature private keys (8316976) OpenJDK: RSA padding issue and timing side-channel attack against TLS (8317547) | [
"cpe:/a:redhat:rhel_eus:9.0::appstream",
"cpe:/a:redhat:rhel_eus:9.0::crb"
] | null | 7.4 | null | null |
RHSA-2022:7323 | Red Hat Security Advisory: python3.9 security update | python: int() type in PyLong_FromString() does not limit amount of digits converting text to int leading to DoS | [
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::crb",
"cpe:/o:redhat:enterprise_linux:9::baseos"
] | null | 7.5 | null | null |
RHSA-2009:1206 | Red Hat Security Advisory: libxml and libxml2 security update | mingw32-libxml2: Stack overflow by parsing root XML element DTD definition mingw32-libxml2: Pointer use-after-free flaws by parsing Notation and Enumeration attribute types | [
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws",
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws",
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2018:1206 | Red Hat Security Advisory: java-1.7.0-oracle security update | OpenJDK: incorrect merging of sections in the JAR manifest (Security, 8189969) OpenJDK: unrestricted deserialization of data from JCEKS key stores (Security, 8189997) OpenJDK: insufficient consistency checks in deserialization of multiple classes (Security, 8189977) OpenJDK: unbounded memory allocation during deserialization in PriorityBlockingQueue (Concurrency, 8189981) OpenJDK: unbounded memory allocation during deserialization in TabularDataSupport (JMX, 8189985) OpenJDK: unbounded memory allocation during deserialization in Container (AWT, 8189989) OpenJDK: unbounded memory allocation during deserialization in NamedNodeMapImpl (JAXP, 8189993) OpenJDK: RMI HTTP transport enabled by default (RMI, 8193833) OpenJDK: incorrect handling of Reference clones can lead to sandbox bypass (Hotspot, 8192025) OpenJDK: unbounded memory allocation during deserialization in StubIORImpl (Serialization, 8192757) | [
"cpe:/a:redhat:rhel_extras_oracle_java:6"
] | null | null | 5.3 | null |
RHSA-2018:3729 | Red Hat Security Advisory: rh-ruby23-ruby security, bug fix, and enhancement update | ruby: HTTP response splitting in WEBrick ruby: Unintentional file and directory creation with directory traversal in tempfile and tmpdir ruby: DoS by large request in WEBrick ruby: Buffer under-read in String#unpack ruby: Unintentional socket creation by poisoned NULL byte in UNIXServer and UNIXSocket ruby: Unintentional directory traversal by poisoned NULL byte in Dir ruby: OpenSSL::X509:: Name equality check does not work correctly ruby: Tainted flags are not propagated in Array#pack and String#unpack with some directives rubygems: Path traversal when writing to a symlinked basedir outside of the root rubygems: Unsafe Object Deserialization Vulnerability in gem owner allowing arbitrary code execution on specially crafted YAML rubygems: Infinite loop vulnerability due to negative size in tar header causes Denial of Service rubygems: Improper verification of signatures in tarball allows to install mis-signed gem rubygems: Missing URL validation on spec home attribute allows malicious gem to set an invalid homepage URL rubygems: XSS vulnerability in homepage attribute when displayed via gem server rubygems: Path traversal issue during gem installation allows to write to arbitrary filesystem locations | [
"cpe:/a:redhat:rhel_software_collections:3::el6",
"cpe:/a:redhat:rhel_software_collections:3::el7"
] | null | null | 5.5 | null |
RHSA-2024:4247 | Red Hat Security Advisory: libuv security update | libuv: Improper Domain Lookup that potentially leads to SSRF attacks | [
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb"
] | null | 7.3 | null | null |
RHSA-2012:1540 | Red Hat Security Advisory: kernel security, bug fix, and enhancement update | kernel: rds-ping cause kernel panic kernel: net: slab corruption due to improper synchronization around inet->opt kernel: ext4: AIO vs fallocate stale data exposure kernel: xen: VCPU timer overflow leads to PCPU deadlock and host death-by-watchdog kernel: xen: Memory mapping failure can crash Xen kernel: xen: XENMEM_exchange may overwrite hypervisor memory | [
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2016:2054 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 6.4.10 natives update on RHEL 7 | httpd: HTTP request smuggling attack against chunked request parser mod_cluster: remotely Segfault Apache http server mod_cluster: Buffer overflow in mod_manager when sending request with long JVMRoute | [
"cpe:/a:redhat:jboss_enterprise_application_platform:6::el7"
] | null | null | 4.8 | null |
RHSA-2007:0125 | Red Hat Security Advisory: XFree86 security update | xserver XC-MISC integer overflow Multiple font integer overflows (CVE-2007-1352) Multiple font integer overflows (CVE-2007-1352) XGetPixel() integer overflow | [
"cpe:/o:redhat:enterprise_linux:2.1::as",
"cpe:/o:redhat:enterprise_linux:2.1::aw",
"cpe:/o:redhat:enterprise_linux:2.1::es",
"cpe:/o:redhat:enterprise_linux:2.1::ws",
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws"
] | null | null | null | null |
RHEA-2020:0635 | Red Hat Enhancement Advisory: microcode_ctl bug fix and enhancement update | hw: Intel SGX information leak | [
"cpe:/o:redhat:rhel_e4s:8.0::baseos"
] | null | null | 6 | null |
RHSA-2025:0039 | Red Hat Security Advisory: bind and bind-dyndb-ldap security update | bind: stack exhaustion in control channel code may lead to DoS bind9: Parsing large DNS messages may cause excessive CPU load bind9: KeyTrap - Extreme CPU consumption in DNSSEC validator bind9: Preparing an NSEC3 closest encloser proof can exhaust CPU resources | [
"cpe:/o:redhat:rhel_els:6"
] | null | 7.5 | null | null |
RHSA-2020:3779 | Red Hat Security Advisory: Red Hat Data Grid 7.3.7 security update | jetty: HTTP request smuggling using the range header jetty: HTTP request smuggling jetty: Incorrect header handling jackson-mapper-asl: XML external entity similar to CVE-2016-3720 resteasy: Improper validation of response header in MediaTypeHeaderDelegate.java class EAP: field-name is not parsed in accordance to RFC7230 Wildfly: EJBContext principal is not popped back after invoking another EJB using a different Security Domain undertow: AJP File Read/Inclusion Vulnerability Wildfly: Improper authorization issue in WildFlySecurityManager when using alternative protection domain undertow: servletPath is normalized incorrectly leading to dangerous application mapping which could result in security bypass jackson-databind: Lacks certain xbean-reflect/JNDI blocking log4j: improper validation of certificate with host mismatch in SMTP appender jackson-databind: Serialization gadgets in shaded-hikari-config jackson-databind: Serialization gadgets in ibatis-sqlmap jackson-databind: Serialization gadgets in anteros-core jackson-databind: mishandles the interaction between serialization gadgets and typing which could result in remote command execution jackson-databind: mishandles the interaction between serialization gadgets and typing which could result in remote command execution wildfly-elytron: session fixation when using FORM authentication jackson-databind: Serialization gadgets in org.aoju.bus.proxy.provider.*.RmiProvider jackson-databind: Serialization gadgets in javax.swing.JEditorPane jackson-databind: Serialization gadgets in org.apache.activemq.jms.pool.XaPooledConnectionFactory jackson-databind: Serialization gadgets in org.apache.commons.proxy.provider.remoting.RmiProvider jackson-databind: Serialization gadgets in org.apache.openjpa.ee.WASRegistryManagedRuntime netty: compression/decompression codecs don't enforce limits on buffer allocation sizes jackson-databind: Serialization gadgets in org.springframework:spring-aop jackson-databind: Serialization gadgets in commons-jelly:commons-jelly | [
"cpe:/a:redhat:jboss_data_grid:7.3"
] | null | 8.1 | 8.1 | null |
RHSA-2021:2993 | Red Hat Security Advisory: rh-varnish6-varnish security update | varnish: HTTP/2 request smuggling attack via a large Content-Length header for a POST request | [
"cpe:/a:redhat:rhel_software_collections:3::el7"
] | null | 8.1 | null | null |
RHSA-2005:013 | Red Hat Security Advisory: cups security update | security flaw security flaw security flaw security flaw security flaw | [
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws"
] | null | null | null | null |
RHSA-2018:1957 | Red Hat Security Advisory: git security update | git: arbitrary code execution when recursively cloning a malicious repository | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 8.8 | null |
RHSA-2021:4594 | Red Hat Security Advisory: gcc-toolset-11-binutils security update | environment: Unicode's bidirectional (BiDi) override characters can cause trojan source attacks | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 8.5 | null | null |
RHSA-2005:014 | Red Hat Security Advisory: nfs-utils security update | security flaw security flaw | [
"cpe:/o:redhat:enterprise_linux:2.1::as",
"cpe:/o:redhat:enterprise_linux:2.1::aw",
"cpe:/o:redhat:enterprise_linux:2.1::es",
"cpe:/o:redhat:enterprise_linux:2.1::ws"
] | null | null | null | null |
RHSA-2020:5399 | Red Hat Security Advisory: thunderbird security update | Mozilla: Stack overflow due to incorrect parsing of SMTP server response codes | [
"cpe:/a:redhat:rhel_eus:8.2::appstream"
] | null | 8.8 | null | null |
RHSA-2024:11142 | Red Hat Security Advisory: gstreamer1-plugins-base security update | gstreamer1-plugins-base: GStreamer has a stack-buffer overflow in vorbis_handle_identification_packet gstreamer1-plugins-base: stack-buffer overflow in gst_opus_dec_parse_header gstreamer1-plugins-base: out-of-bounds write in Ogg demuxer | [
"cpe:/a:redhat:rhel_eus:8.8::appstream"
] | null | 9.8 | null | null |
RHSA-2023:6220 | Red Hat Security Advisory: Errata Advisory for Red Hat OpenShift GitOps v1.10.1 security update | golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487) | [
"cpe:/a:redhat:openshift_gitops:1.10::el8"
] | null | 7.5 | null | null |
RHSA-2022:5392 | Red Hat Security Advisory: Red Hat Advanced Cluster Management 2.3.11 security updates and bug fixes | node-fetch: exposure of sensitive information to an unauthorized actor follow-redirects: Exposure of Sensitive Information via Authorization Header leak nconf: Prototype pollution in memory store golang: crypto/elliptic: IsOnCurve returns true for invalid field elements Moment.js: Path traversal in moment.locale golang: syscall: faccessat checks wrong group go-getter: writes SSH credentials into logfile, exposing sensitive credentials to local uses | [
"cpe:/a:redhat:acm:2.3::el7",
"cpe:/a:redhat:acm:2.3::el8"
] | null | 5.1 | null | null |
RHSA-2016:1433 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 6.4.9 update | tomcat: URL Normalization issue JGroups: Authorization bypass | [
"cpe:/a:redhat:jboss_enterprise_application_platform:6::el6"
] | null | null | 9.8 | null |
RHSA-2015:1682 | Red Hat Security Advisory: thunderbird security update | Mozilla: Miscellaneous memory safety hazards (rv:38.2) (MFSA 2015-79) Mozilla: Vulnerabilities found through code inspection (MFSA 2015-90) Mozilla: Vulnerabilities found through code inspection (MFSA 2015-90) Mozilla: Vulnerabilities found through code inspection (MFSA 2015-90) Mozilla: Heap overflow in gdk-pixbuf when scaling bitmap images (MFSA 2015-88) | [
"cpe:/a:redhat:rhel_productivity:5",
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation",
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | null | null |
RHSA-2018:0045 | Red Hat Security Advisory: rhvm-appliance security update | An update for rhvm-appliance is now available for RHEV 4.X, RHEV-H, and Agents for Red Hat Enterprise Linux 7.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. | [
"cpe:/o:redhat:enterprise_linux:7::hypervisor"
] | null | null | null | null |
RHBA-2023:6863 | Red Hat Bug Fix Advisory: LVMS 4.14.z Bug Fix and Enhancement update | golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487) HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack) | [
"cpe:/a:redhat:lvms:4.14::el9"
] | null | 7.5 | null | null |
RHSA-2024:10265 | Red Hat Security Advisory: kernel security update | kernel: xprtrdma: fix pointer derefs in error cases of rpcrdma_ep_create kernel: mptcp: pm: Fix uaf in __timer_delete_sync | [
"cpe:/o:redhat:rhel_aus:8.4::baseos",
"cpe:/o:redhat:rhel_e4s:8.4::baseos",
"cpe:/o:redhat:rhel_tus:8.4::baseos"
] | null | 7 | null | null |
RHSA-2020:0964 | Red Hat Security Advisory: OpenShift Container Platform 3.11 jenkins-2-plugins security update | openshift/jenkins-plugin: Deserialization in snakeyaml YAML() objects allows for remote code execution | [
"cpe:/a:redhat:openshift:3.11::el7"
] | null | 8.8 | null | null |
RHSA-2019:0130 | Red Hat Security Advisory: Red Hat JBoss Web Server 3.1 Service Pack 6 security and bug fix update | tomcat: Host name verification missing in WebSocket client tomcat: Open redirect in default servlet | [
"cpe:/a:redhat:jboss_enterprise_web_server:3.1"
] | null | null | 5.3 | null |
RHSA-2023:5269 | Red Hat Security Advisory: postgresql:15 security update | postgresql: schema_element defeats protective search_path changes postgresql: row security policies disregard user ID changes after inlining. | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 4.2 | null | null |
RHSA-2016:0101 | Red Hat Security Advisory: java-1.6.0-ibm security update | JDK: J9 JVM allows code to invoke non-public interface methods TLS 1.2 Transcipt Collision attacks against MD5 in key exchange protocol (SLOTH) libpng: Out-of-bounds read in png_convert_to_rfc1123 libpng: Buffer overflow vulnerabilities in png_get_PLTE/png_set_PLTE functions libpng: Buffer overflow vulnerabilities in png_get_PLTE/png_set_PLTE functions libpng: underflow read in png_check_keyword() OpenJDK: URL deserialization inconsistencies (Networking, 8059054) OpenJDK: logging of RMI connection secrets (JMX, 8130710) OpenJDK: insufficient enforcement of totalEntitySizeLimit (JAXP, 8133962) OpenJDK: incorrect boundary check in JPEG decoder (AWT, 8139017) ICU: integer signedness issue in IndicRearrangementProcessor (OpenJDK 2D, 8140543) | [
"cpe:/a:redhat:rhel_extras:5::client",
"cpe:/a:redhat:rhel_extras:5::server",
"cpe:/a:redhat:rhel_extras:6"
] | null | null | 8.8 | null |
RHSA-2021:0833 | Red Hat Security Advisory: OpenShift Container Platform 3.11.404 security and bug fix update | golang-github-gorilla-websocket: integer overflow leads to denial of service | [
"cpe:/a:redhat:openshift:3.11::el7"
] | null | 7.5 | null | null |
RHSA-2023:5739 | Red Hat Security Advisory: java-11-openjdk security and bug fix update | OpenJDK: certificate path validation issue during client authentication (8309966) | [
"cpe:/a:redhat:rhel_aus:8.2::appstream",
"cpe:/a:redhat:rhel_e4s:8.2::appstream",
"cpe:/a:redhat:rhel_tus:8.2::appstream"
] | null | 5.3 | null | null |
RHSA-2014:1552 | Red Hat Security Advisory: openssh security, bug fix, and enhancement update | openssh: AcceptEnv environment restriction bypass flaw openssh: failure to check DNS SSHFP records in certain scenarios | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2024:2433 | Red Hat Security Advisory: avahi security update | avahi: Reachable assertion in avahi_dns_packet_append_record avahi: Reachable assertion in avahi_escape_label avahi: Reachable assertion in dbus_set_host_name avahi: Reachable assertion in avahi_rdata_parse avahi: Reachable assertion in avahi_alternative_host_name | [
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::crb",
"cpe:/o:redhat:enterprise_linux:9::baseos"
] | null | 6.2 | null | null |
RHSA-2021:2431 | Red Hat Security Advisory: OpenShift Container Platform 4.5.41 security update | jetty: local temporary directory hijacking vulnerability jetty: buffer not correctly recycled in Gzip Request inflation jetty: request containing multiple Accept headers with a large number of "quality" parameters may lead to DoS jenkins-2-plugins/config-file-provider: Does not configure its XML parser to prevent XML external entity (XXE) attacks. jenkins-2-plugins/config-file-provider: Does not correctly perform permission checks in several HTTP endpoints. jenkins-2-plugins/config-file-provider: does not require POST requests for an HTTP endpoint, resulting in a cross-site request forgery (CSRF) vulnerability. jenkins-2-plugins/config-file-provider: Does not perform permission checks in several HTTP endpoints. | [
"cpe:/a:redhat:openshift:4.5::el7",
"cpe:/a:redhat:openshift:4.5::el8"
] | null | 4.3 | null | null |
RHSA-2022:1991 | Red Hat Security Advisory: cpio security update | cpio: integer overflow in ds_fgetstr() in dstring.c can lead to an out-of-bounds write via a crafted pattern file | [
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 7 | null | null |
RHSA-2013:0549 | Red Hat Security Advisory: Red Hat Directory Server security and bug fix update | 389: denial of service when using certificate groups | [
"cpe:/a:redhat:directory_server:8::el5"
] | null | null | null | null |
RHSA-2023:0629 | Red Hat Security Advisory: libksba security update | libksba: integer overflow to code execution | [
"cpe:/a:redhat:rhel_eus:9.0::crb",
"cpe:/o:redhat:rhel_eus:9.0::baseos"
] | null | 8.6 | null | null |
RHSA-2020:4247 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.3.3 security update | cxf: JMX integration is vulnerable to a MITM attack picketbox: JBoss EAP reload to admin-only mode allows authentication bypass wildfly: XML validation manipulation due to incomplete application of use-grammar-pool-only in xercesImpl xnio: file descriptor leak caused by growing amounts of NIO Selector file handles may lead to DoS | [
"cpe:/a:redhat:jboss_enterprise_application_platform:7.3"
] | null | 5.9 | null | null |
RHSA-2022:5468 | Red Hat Security Advisory: php:8.0 security update | php: password of excessive length triggers buffer overflow leading to RCE | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 8.8 | null | null |
RHSA-2024:4902 | Red Hat Security Advisory: kernel security update | kernel: ethernet: hisilicon: hns: hns_dsaf_misc: fix a possible array overflow in hns_dsaf_ge_srst_by_port() kernel: net: amd-xgbe: Fix skb data length underflow kernel: net/mlx5e: fix a potential double-free in fs_any_create_groups kernel: bonding: stop the device in bond_setup_by_slave() kernel: arp: Prevent overflow in arp_req_get(). kernel: net/ipv6: avoid possible UAF in ip6_route_mpath_notify() kernel: x86/xen: Add some null pointer checking to smp.c kernel: net/mlx5: Properly link new fs rules into the tree kernel: i40e: fix vf may be used uninitialized in this function warning kernel: scsi: qla2xxx: Fix off by one in qla_edif_app_getstats() kernel: scsi: lpfc: Release hbalock before calling lpfc_worker_wake_up() kernel: net: core: reject skb_copy(_expand) for fraglist GSO skbs kernel: af_unix: Fix data races in unix_release_sock/unix_stream_sendmsg | [
"cpe:/o:redhat:rhel_aus:8.6::baseos",
"cpe:/o:redhat:rhel_e4s:8.6::baseos",
"cpe:/o:redhat:rhel_tus:8.6::baseos"
] | null | 4.7 | null | null |
RHSA-2024:5079 | Red Hat Security Advisory: libtiff security update | libtiff: Heap-based buffer overflow in ChopUpSingleUncompressedStrip in tif_dirread.c libtiff: heap-based buffer overflow in cpStripToTile() in tools/tiffcp.c libtiff: Buffer Overflow via /libtiff/tools/tiffcrop.c libtiff: Segment fault in libtiff in TIFFReadRGBATileExt() leading to denial of service | [
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb"
] | null | 7.5 | 5.3 | null |
RHSA-2023:3445 | Red Hat Security Advisory: Red Hat OpenStack Platform 16.2 (etcd) security update | etcd: Information discosure via debug function golang.org/x/net/http2: avoid quadratic complexity in HPACK decoding golang: crypto/tls: large handshake records may cause panics golang: net/http, mime/multipart: denial of service from excessive resource consumption golang: net/http, net/textproto: denial of service from excessive memory allocation golang: net/http, net/textproto, mime/multipart: denial of service from excessive resource consumption golang: go/parser: Infinite loop in parsing golang: html/template: backticks not treated as string delimiters golang: html/template: improper sanitization of CSS values golang: html/template: improper handling of JavaScript whitespace golang: html/template: improper handling of empty HTML attributes | [
"cpe:/a:redhat:openstack:16.2::el8"
] | null | 7.3 | null | null |
RHSA-2019:2809 | Red Hat Security Advisory: kernel-alt security, bug fix, and enhancement update | Kernel: page cache side channel attacks Kernel: KVM: potential use-after-free via kvm_ioctl_create_device() kernel: broken permission and object lifetime handling for PTRACE_TRACEME | [
"cpe:/o:redhat:enterprise_linux:7::server"
] | null | null | 7.8 | null |
RHSA-2023:1268 | Red Hat Security Advisory: OpenShift Container Platform 4.12.8 security update | golang: net/http: excessive memory growth in a Go server accepting HTTP/2 requests haproxy: request smuggling attack in HTTP/1 header parsing | [
"cpe:/a:redhat:openshift:4.12::el8",
"cpe:/a:redhat:openshift:4.12::el9"
] | null | 8.2 | null | null |
RHSA-2012:1326 | Red Hat Security Advisory: freeradius security update | freeradius: stack-based buffer overflow via long expiration date fields in client X509 certificates | [
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2023:7725 | Red Hat Security Advisory: RHACS 4.3 enhancement and security update | dexidp: gaining access to applications accepting that token | [
"cpe:/a:redhat:advanced_cluster_security:4.3::el8"
] | null | 6.5 | null | null |
RHSA-2024:0371 | Red Hat Security Advisory: kpatch-patch security update | kernel: netfilter: potential slab-out-of-bound access due to integer underflow | [
"cpe:/o:redhat:enterprise_linux:7::server"
] | null | 7 | null | null |
RHSA-2014:0687 | Red Hat Security Advisory: libtasn1 security update | libtasn1: multiple boundary check issues libtasn1: asn1_get_bit_der() can return negative bit length libtasn1: asn1_read_value_type() NULL pointer dereference | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | null | null |
RHSA-2012:0729 | Red Hat Security Advisory: java-1.6.0-openjdk security update | OpenJDK: improper protection of CORBA data models (CORBA, 7079902) OpenJDK: fontmanager layout lookup code memory corruption (2D, 7143617) OpenJDK: SynthLookAndFeel application context bypass (Swing, 7143614) OpenJDK: insecure temporary file permissions (JRE, 7143606) OpenJDK: CRL and certificate extensions handling improvements (Security, 7143872) OpenJDK: mutable repository identifiers in generated stub code (CORBA, 7143851) OpenJDK: insufficient field accessibility checks (HotSpot, 7152811) OpenJDK: XML parsing infinite loop (JAXP, 7157609) OpenJDK: insufficient invokespecial <init> verification (HotSpot, 7160757) | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2007:1026 | Red Hat Security Advisory: poppler security update | DCTStream:: readProgressiveDataUnit() DCTStream:: reset() CCITTFaxStream:: lookChar() | [
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2020:1428 | Red Hat Security Advisory: Open Liberty 20.0.0.4 Runtime security update | Open Liberty 20.0.0.4 Runtime is now available from the Customer Portal.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. | [
"cpe:/a::openliberty:20"
] | null | null | null | null |
RHSA-2021:5170 | Red Hat Security Advisory: Red Hat Single Sign-On 7.4.10 security update | undertow: potential security issue in flow control over HTTP/2 may lead to DOS wildfly-elytron: possible timing attack in ScramServer wildfly: incorrect JBOSS_LOCAL_USER challenge location may lead to giving access to all the local users resteasy: Error message exposes endpoint class information jsoup: Crafted input may cause the jsoup HTML and XML parser to get stuck xml-security: XPath Transform abuse allows for information disclosure | [
"cpe:/a:redhat:red_hat_single_sign_on:7"
] | null | 7.5 | null | null |
RHSA-2003:182 | Red Hat Security Advisory: ghostscript security update | security flaw | [
"cpe:/o:redhat:enterprise_linux:2.1::as",
"cpe:/o:redhat:enterprise_linux:2.1::aw",
"cpe:/o:redhat:enterprise_linux:2.1::es",
"cpe:/o:redhat:enterprise_linux:2.1::ws"
] | null | null | null | null |
RHSA-2023:6685 | Red Hat Security Advisory: tpm2-tss security and enhancement update | tpm2-tss: Buffer Overlow in TSS2_RC_Decode | [
"cpe:/a:redhat:enterprise_linux:9::crb",
"cpe:/o:redhat:enterprise_linux:9::baseos"
] | null | 6.4 | null | null |
RHSA-2003:151 | Red Hat Security Advisory: tcpdump security update | security flaw security flaw | [
"cpe:/o:redhat:enterprise_linux:2.1::as",
"cpe:/o:redhat:enterprise_linux:2.1::aw",
"cpe:/o:redhat:enterprise_linux:2.1::es",
"cpe:/o:redhat:enterprise_linux:2.1::ws"
] | null | null | null | null |
RHSA-2015:1904 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 6.4.4 update | AS/WildFly: missing X-Frame-Options header leading to clickjacking EAP: CSRF vulnerability in EAP & WildFly Web Console OOME from EAP 6 http management console | [
"cpe:/a:redhat:jboss_enterprise_application_platform:6::el5"
] | null | null | null | null |
RHBA-2006:0287 | Red Hat Bug Fix Advisory: bind bug fix update | INSIST failure in ISC BIND recursive query | [
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws"
] | null | null | null | null |
RHSA-2022:1463 | Red Hat Security Advisory: Red Hat Single Sign-On 7.5.2 security update on RHEL 8 | log4j-core: DoS in log4j 2.x with Thread Context Map (MDC) input data contains a recursive lookup and context lookup pattern | [
"cpe:/a:redhat:red_hat_single_sign_on:7.5::el8"
] | null | 5.9 | null | null |
RHSA-2012:0679 | Red Hat Security Advisory: tomcat5 security and bug fix update | tomcat: Multiple weaknesses in HTTP DIGEST authentication tomcat: password disclosure vulnerability tomcat: security manager restrictions bypass tomcat: authentication bypass and information disclosure tomcat: hash table collisions CPU usage DoS (oCERT-2011-003) tomcat: Multiple weaknesses in HTTP DIGEST authentication tomcat: Multiple weaknesses in HTTP DIGEST authentication tomcat: Multiple weaknesses in HTTP DIGEST authentication tomcat: large number of parameters DoS | [
"cpe:/a:redhat:jboss_enterprise_web_server:1.0"
] | null | null | null | null |
RHSA-2020:3875 | Red Hat Security Advisory: tigervnc security and bug fix update | tigervnc: Stack use-after-return due to incorrect usage of stack memory in ZRLEDecoder tigervnc: Heap buffer overflow triggered from CopyRectDecoder due to incorrect value checks tigervnc: Heap buffer overflow in TightDecoder::FilterGradient tigervnc: Heap buffer overflow in DecodeManager::decodeRect tigervnc: Stack buffer overflow in CMsgReader::readSetCursor | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 7.2 | null | null |
RHSA-2011:1424 | Red Hat Security Advisory: perl security update | Perl decode_xs heap-based buffer overflow Perl Digest improper control of generation of code | [
"cpe:/o:redhat:enterprise_linux:6::server"
] | null | null | null | null |
RHSA-2019:1107 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.2.1 on RHEL 6 security update | jackson-databind: Potential information exfiltration with default typing, serialization gadget from MyBatis jackson-databind: improper polymorphic deserialization of types from Jodd-db library jackson-databind: improper polymorphic deserialization of types from Oracle JDBC driver undertow: Infoleak in some circumstances where Undertow can serve data from a random buffer jackson-databind: exfiltration/XXE in some JDK classes jackson-databind: server-side request forgery (SSRF) in axis2-jaxws class wildfly: Race condition on PID file allows for termination of arbitrary processes by local users wildfly: wrong SecurityIdentity for EE concurrency threads that are reused | [
"cpe:/a:redhat:jboss_enterprise_application_platform:7.2::el6"
] | null | null | 5.4 | null |
RHSA-2023:6431 | Red Hat Security Advisory: libfastjson security update | libfastjson: integer overflow and out-of-bounds write via a large JSON file | [
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::crb"
] | null | 7.8 | null | null |
RHSA-2015:0234 | Red Hat Security Advisory: Red Hat JBoss BPM Suite 6.0.3 security update | CXF: SSL hostname verification bypass, incomplete CVE-2012-5783 fix OpenJDK: XML parsing Denial of Service (JAXP, 8017298) JSF: XSS due to insufficient escaping of user-supplied content in outputText tags and EL expressions PicketBox/JBossSX: Unauthorized access to and modification of application server configuration and state by application Tomcat/JBossWeb: Limited DoS in chunked transfer encoding input filter Tomcat/JBossWeb: XXE vulnerability via user supplied XSLTs Tomcat/JBossWeb: Request smuggling via malicious content length header Tomcat/JBossWeb: XML parser hijack by malicious web application netty: DoS via memory exhaustion during data aggregation Tomcat/JBossWeb: request smuggling and limited DoS in ChunkedInputFilter Security: Invalid EJB caller role check implementation RESTEasy: XXE via parameter entities PicketLink: XXE via insecure DocumentBuilderFactory usage Validator: JSM bypass via ReflectionHelper CXF: SSL hostname verification bypass, incomplete CVE-2012-6153 fix Framework: Directory traversal Framework: directory traversal flaw jbpm-designer: XXE in BPMN2 import UberFire: Information disclosure and RCE via insecure file upload/download servlets Workbench: Insufficient authorization constraints | [
"cpe:/a:redhat:jboss_bpms:6.0"
] | null | null | 4.8 | null |
RHSA-2010:0742 | Red Hat Security Advisory: postgresql and postgresql84 security update | PL/Tcl): SECURITY DEFINER function keyword bypass | [
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws",
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2019:2205 | Red Hat Security Advisory: tomcat security, bug fix, and enhancement update | tomcat: Incorrect handling of empty string URL in security constraints can lead to unintended exposure of resources tomcat: Late application of security constraints can lead to resource exposure for unauthorised users tomcat: Insecure defaults in CORS filter enable 'supportsCredentials' for all origins tomcat: Host name verification missing in WebSocket client | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 4.3 | null |
RHSA-2004:153 | Red Hat Security Advisory: cvs security update | security flaw security flaw | [
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws"
] | null | null | null | null |
RHSA-2022:6825 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.4.7 Security update | undertow: potential security issue in flow control over HTTP/2 may lead to DOS(incomplete fix for CVE-2021-3629) undertow: Large AJP request may cause DoS snakeyaml: Denial of Service due to missing nested depth limitation for collections | [
"cpe:/a:redhat:jboss_enterprise_application_platform:7.4"
] | null | 7.5 | null | null |
RHSA-2024:2853 | Red Hat Security Advisory: nodejs:20 security update | nodejs: using the fetch() function to retrieve content from an untrusted URL leads to denial of service c-ares: Out of bounds read in ares__read_line() nodejs: HTTP Request Smuggling via Content Length Obfuscation nodejs: CONTINUATION frames DoS nghttp2: CONTINUATION frames DoS | [
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 5.3 | null | null |
RHSA-2022:6878 | Red Hat Security Advisory: expat security update | expat: a use-after-free in the doContent function in xmlparse.c | [
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 8.1 | null | null |
RHSA-2020:2391 | Red Hat Security Advisory: Red Hat build of Eclipse Vert.x 3.9.1 security update | log4j: improper validation of certificate with host mismatch in SMTP appender | [
"cpe:/a:redhat:openshift_application_runtimes:1.0"
] | null | 3.7 | null | null |
RHSA-2024:5258 | Red Hat Security Advisory: container-tools:rhel8 security update | golang: net/http: golang: mime/multipart: golang: net/textproto: memory exhaustion in Request.ParseMultipartForm golang-fips/openssl: Memory leaks in code encrypting and decrypting RSA payloads containers/image: digest type does not guarantee valid type go-retryablehttp: url might write sensitive information to log file golang: crypto/x509: Verify panics on certificates with an unknown public key algorithm golang: net/mail: comments in display names are incorrectly handled golang: archive/zip: Incorrect handling of certain ZIP files gorilla/schema: Potential memory exhaustion attack due to sparse slice deserialization | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 7.5 | null | null |
RHSA-2021:3444 | Red Hat Security Advisory: kernel security and bug fix update | kernel: race condition in net/can/bcm.c leads to local privilege escalation kernel: use-after-free in route4_change() in net/sched/cls_route.c kernel: powerpc: KVM guest OS users can cause host OS memory corruption | [
"cpe:/a:redhat:rhel_eus:8.1::crb",
"cpe:/o:redhat:rhel_eus:8.1::baseos"
] | null | 7.8 | null | null |
RHSA-2024:5858 | Red Hat Security Advisory: kpatch-patch-5_14_0-70_85_1 security update | kernel: TIPC message reassembly use-after-free remote code execution vulnerability kernel: net: kernel: UAF in network route management kernel: virtio-net: tap: mlx5_core short frame denial of service kernel: virtio-net: tun: mlx5_core short frame denial of service | [
"cpe:/o:redhat:rhel_e4s:9.0::baseos"
] | null | 7.1 | null | null |
RHSA-2018:0481 | Red Hat Security Advisory: jboss-ec2-eap package for EAP 7.1.1 | resteasy: Vary header not added by CORS filter leading to cache poisoning artemis/hornetq: memory exhaustion via UDP and JGroups discovery undertow: Client can use bogus uri in Digest authentication infinispan: Unsafe deserialization of malicious object injected into data cache jackson-databind: Unsafe deserialization due to incomplete black list (incomplete fix for CVE-2017-7525) jackson-databind: Unsafe deserialization due to incomplete black list (incomplete fix for CVE-2017-15095) undertow: ALLOW_ENCODED_SLASH option not taken into account in the AjpRequestParser jackson-databind: unsafe deserialization due to incomplete blacklist (incomplete fix for CVE-2017-7525 and CVE-2017-17485) | [
"cpe:/a:redhat:jboss_enterprise_application_platform:7.1::el7",
"cpe:/a:redhat:jboss_enterprise_application_platform:7::el6"
] | null | null | 8.1 | null |
RHSA-2024:1555 | Red Hat Security Advisory: .NET 6.0 security update | dotnet: Denial of Service in X509Certificate2 | [
"cpe:/a:redhat:rhel_eus:9.2::appstream",
"cpe:/a:redhat:rhel_eus:9.2::crb"
] | null | 7.5 | null | null |
RHSA-2005:012 | Red Hat Security Advisory: krb5 security update | security flaw security flaw | [
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws"
] | null | null | null | null |
RHSA-2006:0663 | Red Hat Security Advisory: ncompress security update | ncompress: .bss buffer underflow in decompression | [
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws",
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2020:3377 | Red Hat Security Advisory: chromium-browser security update | chromium-browser: Heap buffer overflow in background fetch chromium-browser: Side-channel information leakage in content security policy chromium-browser: Type Confusion in V8 chromium-browser: Heap buffer overflow in PDFium chromium-browser: Inappropriate implementation in WebRTC chromium-browser: Use after free in tab strip chromium-browser: Policy bypass in CORS chromium-browser: Heap buffer overflow in history chromium-browser: Use after free in developer tools chromium-browser: Policy bypass in CSP chromium-browser: Heap buffer overflow in Skia chromium-browser: Side-channel information leakage in autofill chromium-browser: Inappropriate implementation in external protocol handlers chromium-browser: Out of bounds write in Skia chromium-browser: Heap buffer overflow in WebAudio chromium-browser: Heap buffer overflow in Skia chromium-browser: Inappropriate implementation in iframe sandbox chromium-browser: Insufficient policy enforcement in CSP chromium-browser: Incorrect security UI in basic auth chromium-browser: Inappropriate implementation in WebRTC chromium-browser: Out of bounds memory access in developer tools chromium-browser: Side-channel information leakage in scroll to text chromium-browser: Use after free in SCTP chromium-browser: Type Confusion in V8 chromium-browser: Heap buffer overflow in WebRTC chromium-browser: Insufficient data validation in WebUI chromium-browser: Incorrect security UI in PWAs chromium-browser: Type Confusion in V8 chromium-browser: Inappropriate implementation in WebView chromium-browser: Use after free in CSS chromium-browser: Heap buffer overflow in Skia chromium-browser: Use after free in WebUSB | [
"cpe:/a:redhat:rhel_extras:6"
] | null | 8.8 | null | null |
RHSA-2023:7668 | Red Hat Security Advisory: squid:4 security update | squid: DoS against HTTP and HTTPS squid: Use-After-Free in the HTTP Collapsed Forwarding Feature | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 7.5 | null | null |
RHSA-2018:1593 | Red Hat Security Advisory: Red Hat OpenStack Platform director security update | openstack-tripleo-heat-templates: Ceph client keyring is world-readable when deployed by director memcached: UDP server support allows spoofed traffic amplification DoS | [
"cpe:/a:redhat:openstack:10::el7"
] | null | null | 5.3 | null |
RHSA-2024:4409 | Red Hat Security Advisory: linux-firmware security update | kernel: Reserved fields in guest message responses may not be zero initialized | [
"cpe:/o:redhat:rhel_aus:8.6::baseos",
"cpe:/o:redhat:rhel_e4s:8.6::baseos",
"cpe:/o:redhat:rhel_tus:8.6::baseos"
] | null | 4.4 | null | null |
RHSA-2024:2580 | Red Hat Security Advisory: yajl security update | yajl: Memory leak in yajl_tree_parse function | [
"cpe:/a:redhat:rhel_eus:8.8::appstream",
"cpe:/a:redhat:rhel_eus:8.8::crb"
] | null | 6.5 | null | null |
RHSA-2014:1995 | Red Hat Security Advisory: Red Hat JBoss Fuse Service Works 6.0.0 security update | HawtJNI: predictable temporary file name leading to local arbitrary code execution Java: XML eXternal Entity (XXE) flaw in ParserPool and Decrypter jboss-as-server: Unchecked access to MSC Service Registry under JSM EAP6: Plain text password logging during security audit 6: JSM policy not respected by deployed applications Xalan-Java: insufficient constraints in secure processing feature | [
"cpe:/a:redhat:jboss_fuse_service_works:6.0"
] | null | null | null | null |
RHSA-2022:0065 | Red Hat Security Advisory: kernel-rt security and bug fix update | kernel: perf_event_parse_addr_filter memory kernel: fuse: fuse_do_getattr() calls make_bad_inode() in inappropriate situations kernel: Heap buffer overflow in firedtv driver | [
"cpe:/a:redhat:rhel_extras_rt:7"
] | null | 6.7 | null | null |
RHSA-2017:2437 | Red Hat Security Advisory: kernel security and bug fix update | kernel: crypto: GPF in lrw_crypt caused by null-deref kernel: l2tp: Race condition in the L2TPv3 IP encapsulation feature kernel: Null pointer dereference in search_keyring kernel: NFSv4 server does not properly validate layout type when processing NFSv4 pNFS LAYOUTGET operand | [
"cpe:/o:redhat:rhel_eus:7.3::computenode",
"cpe:/o:redhat:rhel_eus:7.3::server"
] | null | null | 8.6 | null |
RHSA-2015:0851 | Red Hat Security Advisory: Red Hat JBoss BPM Suite 6.1.0 update | CXF: SSL hostname verification bypass, incomplete CVE-2012-5783 fix WS: EJB3 role restrictions are not applied to jaxws handlers Java: Java XML Signature DoS Attack async-http-client: SSL/TLS certificate verification is disabled under certain conditions async-http-client: missing hostname verification for SSL certificates CXF: The SecurityTokenService accepts certain invalid SAML Tokens as valid CXF: UsernameTokens are sent in plaintext with a Symmetric EncryptBeforeSigning policy JBossSX/PicketBox: World readable audit.log file CXF: HTML content posted to SOAP endpoint could cause OOM errors CXF: Large invalid content could cause temporary space to fill CXF: SSL hostname verification bypass, incomplete CVE-2012-6153 fix CXF: Improper security semantics enforcement of SAML SubjectConfirmation methods Security: Wrong security context loaded when using SAML2 STS Login Module RESTeasy: External entities expanded by DocumentProvider Weld: Limited information disclosure via stale thread state jBPM: BPMN2 file processing XXE in Process Execution | [
"cpe:/a:redhat:jboss_bpms:6.0"
] | null | null | 4.8 | null |
RHBA-2024:1440 | Red Hat Bug Fix Advisory: MTV 2.5.6 Images | golang: net/http/internal: Denial of Service (DoS) via Resource Consumption via HTTP requests nodejs-ip: arbitrary code execution via the isPublic() function | [
"cpe:/a:redhat:migration_toolkit_virtualization:2.5::el8",
"cpe:/a:redhat:migration_toolkit_virtualization:2.5::el9"
] | null | 9.8 | null | null |
RHSA-2022:5527 | Red Hat Security Advisory: squid security update | squid: DoS when processing gopher server responses | [
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 7.5 | null | null |
RHSA-2020:5198 | Red Hat Security Advisory: Red Hat OpenShift Jaeger security update | golang-github-miekg-dns: predictable TXID can lead to response forgeries golang.org/x/text: possibility to trigger an infinite loop in encoding/unicode could lead to crash | [
"cpe:/a:redhat:jaeger:1.20::el8"
] | null | 7.5 | null | null |
RHSA-2021:1679 | Red Hat Security Advisory: bash security and bug fix update | bash: when effective UID is not equal to its real UID the saved UID is not dropped | [
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 7.8 | null | null |
Subsets and Splits