id
stringlengths
13
15
title
stringlengths
29
176
description
stringlengths
8
32.1k
cpes
listlengths
0
20
cvss_v4_0
null
cvss_v3_1
float64
0
10
cvss_v3_0
float64
0
10
cvss_v2_0
null
RHSA-2021:2170
Red Hat Security Advisory: glib2 security and bug fix update
glib: integer overflow in g_bytes_new function on 64-bit platforms due to an implicit cast from 64 bits to 32 bits
[ "cpe:/a:redhat:enterprise_linux:8::crb", "cpe:/o:redhat:enterprise_linux:8::baseos" ]
null
9.8
null
null
RHSA-2019:1663
Red Hat Security Advisory: spacewalk-backend and spacewalk-proxy security update
spacewalk-proxy: Path traversal in proxy authentication cache
[ "cpe:/a:redhat:network_proxy:5.8::el6" ]
null
null
8.1
null
RHSA-2020:2840
Red Hat Security Advisory: tomcat security update
tomcat: Apache Tomcat AJP File Read/Inclusion Vulnerability
[ "cpe:/o:redhat:rhel_eus:7.6::computenode", "cpe:/o:redhat:rhel_eus:7.6::server" ]
null
7.6
null
null
RHSA-2016:2036
Red Hat Security Advisory: Red Hat JBoss A-MQ 6.3 security update
Framework: denial-of-service attack with XML input ObjectMessage: unsafe deserialization bouncycastle: Invalid curve attack allowing to extract private keys activemq: Fileserver web application vulnerability allowing RCE shiro: Security constraint bypass
[ "cpe:/a:redhat:jboss_amq:6.3" ]
null
null
7.3
null
RHSA-2006:0575
Red Hat Security Advisory: Updated kernel packages available for Red Hat Enterprise Linux 4 Update 4
security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw
[ "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws" ]
null
null
null
null
RHSA-2023:0626
Red Hat Security Advisory: libksba security update
libksba: integer overflow to code execution
[ "cpe:/a:redhat:enterprise_linux:9::crb", "cpe:/o:redhat:enterprise_linux:9::baseos" ]
null
8.6
null
null
RHSA-2020:5428
Red Hat Security Advisory: kernel-rt security and bug fix update
kernel: information exposure in drivers/char/random.c and kernel/time/timer.c
[ "cpe:/a:redhat:rhel_eus:8.2::nfv", "cpe:/a:redhat:rhel_eus:8.2::realtime" ]
null
3.7
null
null
RHSA-2023:0245
Red Hat Security Advisory: OpenShift Container Platform 4.11.25 security update
golang: out-of-bounds read in golang.org/x/text/language leads to DoS
[ "cpe:/a:redhat:openshift:4.11::el8" ]
null
7.5
null
null
RHSA-2007:0061
Red Hat Security Advisory: samba security update
security flaw
[ "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
RHSA-2023:0596
Red Hat Security Advisory: git security update
git: gitattributes parsing integer overflow git: Heap overflow in `git archive`, `git log --format` leading to RCE
[ "cpe:/a:redhat:rhel_eus:8.4::appstream" ]
null
9.8
null
null
RHSA-2012:1284
Red Hat Security Advisory: spice-gtk security update
spice-gtk/glib: Possible privilege escalation via un-sanitized environment variable
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
null
null
RHSA-2025:1050
Red Hat Security Advisory: Red Hat OpenShift Service Mesh Containers for 2.4.14
golang.org/x/net/html: Non-linear parsing of case-insensitive content in golang.org/x/net/html
[ "cpe:/a:redhat:service_mesh:2.4::el8" ]
null
7.5
null
null
RHSA-2021:3177
Red Hat Security Advisory: cloud-init security update
cloud-init: randomly generated passwords logged in clear-text to world-readable file
[ "cpe:/a:redhat:rhel_eus:8.1::appstream" ]
null
5.5
null
null
RHSA-2024:2071
Red Hat Security Advisory: OpenShift Container Platform 4.15.11 packages and security update
jose-go: improper handling of highly compressed data
[ "cpe:/a:redhat:openshift:4.15::el8", "cpe:/a:redhat:openshift:4.15::el9", "cpe:/a:redhat:openshift_ironic:4.15::el9" ]
null
4.3
null
null
RHSA-2021:3193
Red Hat Security Advisory: OpenShift Container Platform 3.11.z security and bug fix update
kubernetes: Docker config secrets leaked when file is malformed and loglevel >= 4
[ "cpe:/a:redhat:openshift:3.11::el7" ]
null
5.3
null
null
RHSA-2014:0378
Red Hat Security Advisory: rhev-hypervisor6 security update
openssl: information disclosure in handling of TLS heartbeat extension packets
[ "cpe:/o:redhat:enterprise_linux:6::hypervisor" ]
null
null
null
null
RHSA-2019:3187
Red Hat Security Advisory: kernel security and bug fix update
hardware: bluetooth: BR/EDR encryption key negotiation attacks (KNOB)
[ "cpe:/o:redhat:rhel_aus:7.4::server", "cpe:/o:redhat:rhel_e4s:7.4::server", "cpe:/o:redhat:rhel_tus:7.4::server" ]
null
null
7
null
RHSA-2012:1279
Red Hat Security Advisory: Red Hat Enterprise MRG Messaging 2.2 update
qpid-cpp-server-cluster: unauthorized broker access caused by the use of NullAuthenticator catch-up shadow connections
[ "cpe:/a:redhat:enterprise_mrg:2:computenode:el6", "cpe:/a:redhat:enterprise_mrg:2:server:el6" ]
null
null
null
null
RHSA-2024:8161
Red Hat Security Advisory: kernel security update
kernel: mlxsw: spectrum: Protect driver from buggy firmware kernel: kvm: Avoid potential UAF in LPI translation cache kernel: i40e: Do not allow untrusted VF to remove administratively set MAC kernel: udp: do not accept non-tunnel GSO skbs landing in a tunnel
[ "cpe:/o:redhat:rhel_aus:8.6::baseos", "cpe:/o:redhat:rhel_e4s:8.6::baseos", "cpe:/o:redhat:rhel_tus:8.6::baseos" ]
null
5.5
null
null
RHSA-2024:0720
Red Hat Security Advisory: Migration Toolkit for Runtimes security, bug fix and enhancement update
apache-ivy: XML External Entity vulnerability follow-redirects: Improper Input Validation due to the improper handling of URLs by the url.parse()
[ "cpe:/a:redhat:migration_toolkit_runtimes:1.0::el8" ]
null
6.1
null
null
RHSA-2024:8162
Red Hat Security Advisory: kernel security update
kernel: hwmon: (w83792d) Fix NULL pointer dereference by removing unnecessary structure field kernel: Local information disclosure on Intel(R) Atom(R) processors kernel: Revert "net/mlx5: Block entering switchdev mode with ns inconsistency" kernel: netfilter: nft_flow_offload: reset dst in route object after setting up flow kernel: dmaengine: idxd: Fix oops during rmmod on single-CPU platforms kernel: mptcp: ensure snd_nxt is properly initialized on connect kernel: net: sched: sch_multiq: fix possible OOB write in multiq_tune() kernel: net/mlx5: Add a timeout to acquire the command queue semaphore kernel: KVM: SVM: WARN on vNMI + NMI window iff NMIs are outright masked kernel: ionic: fix use after netif_napi_del() kernel: xfrm6: check ip6_dst_idev() return value in xfrm6_get_saddr() kernel: gfs2: Fix NULL pointer dereference in gfs2_log_flush kernel: sched: act_ct: take care of padding in struct zones_ht_key kernel: tipc: Return non-zero value from tipc_udp_addr2str() on error
[ "cpe:/a:redhat:enterprise_linux:9::appstream", "cpe:/a:redhat:enterprise_linux:9::crb", "cpe:/a:redhat:enterprise_linux:9::nfv", "cpe:/a:redhat:enterprise_linux:9::realtime", "cpe:/o:redhat:enterprise_linux:9::baseos" ]
null
7.3
null
null
RHSA-2024:10389
Red Hat Security Advisory: OpenShift Virtualization 4.13.11 Images
net/http: Denial of service due to improper 100-continue handling in net/http
[ "cpe:/a:redhat:container_native_virtualization:4.13::el9" ]
null
5.9
null
null
RHSA-2012:0308
Red Hat Security Advisory: busybox security and bug fix update
ncompress: .bss buffer underflow in decompression busybox: udhcpc insufficient checking of DHCP options
[ "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
RHSA-2024:10770
Red Hat Security Advisory: Red Hat Ansible Automation Platform Execution Environments Container Release Update
ansible-core: Unsafe Tagging Bypass via hostvars Object in Ansible-Core
[ "cpe:/a:redhat:ansible_automation_platform:ee::el8", "cpe:/a:redhat:ansible_automation_platform:ee::el9" ]
null
5.5
null
null
RHSA-2023:7477
Red Hat Security Advisory: OpenShift Container Platform 4.13.24 packages and security update
python-werkzeug: high resource consumption leading to denial of service
[ "cpe:/a:redhat:openshift:4.13::el8", "cpe:/a:redhat:openshift:4.13::el9", "cpe:/a:redhat:openshift_ironic:4.13::el9" ]
null
7.5
null
null
RHSA-2016:1433
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 6.4.9 update
tomcat: URL Normalization issue JGroups: Authorization bypass
[ "cpe:/a:redhat:jboss_enterprise_application_platform:6::el6" ]
null
null
9.8
null
RHSA-2021:5171
Red Hat Security Advisory: nodejs:16 security, bug fix, and enhancement update
nodejs-ini: Prototype pollution via malicious INI file nodejs-glob-parent: Regular expression denial of service nodejs-ansi-regex: Regular expression denial of service (ReDoS) matching ANSI escape codes nodejs-json-schema: Prototype pollution vulnerability llhttp: HTTP Request Smuggling due to spaces in headers llhttp: HTTP Request Smuggling when parsing the body of chunked requests nodejs-normalize-url: ReDoS for data URLs
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
7.5
null
null
RHSA-2021:3365
Red Hat Security Advisory: sssd security update
sssd: shell command injection in sssctl
[ "cpe:/a:redhat:rhel_eus:8.2::crb", "cpe:/o:redhat:rhel_eus:8.2::baseos" ]
null
6.7
null
null
RHSA-2018:2277
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.1 security update
apache-cxf: TLS hostname verification does not work correctly with com.sun.net.ssl.* wildfly-core: Path traversal can allow the extraction of .war archives to write arbitrary files (Zip Slip)
[ "cpe:/a:redhat:jboss_enterprise_application_platform:7.1" ]
null
null
7.6
null
RHSA-2020:0295
Red Hat Security Advisory: firefox security update
Mozilla: Buffer overflow in plain text serializer Mozilla: Use-after-free in worker destruction Mozilla: Use-after-free when performing device orientation checks Mozilla: Use-after-free when retrieving a document in antitracking Mozilla: Memory safety bugs fixed in Firefox 71 and Firefox ESR 68.3 Mozilla: Bypass of @namespace CSS sanitization during pasting Mozilla: Type Confusion in XPCVariant.cpp Mozilla: CSS sanitization does not escape HTML tags Mozilla: Memory safety bugs fixed in Firefox 72 and Firefox ESR 68.4 Mozilla: IonMonkey type confusion with StoreElementHole and FallibleStoreElement
[ "cpe:/a:redhat:rhel_e4s:8.0::appstream" ]
null
8.8
8.8
null
RHSA-2005:016
Red Hat Security Advisory: kernel security update
security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw
[ "cpe:/o:redhat:enterprise_linux:2.1::as", "cpe:/o:redhat:enterprise_linux:2.1::es", "cpe:/o:redhat:enterprise_linux:2.1::ws" ]
null
null
null
null
RHSA-2017:1801
Red Hat Security Advisory: Red Hat JBoss Web Server 3.1.0 Service Pack 1 security update
openssl: OCSP Status Request extension unbounded memory growth openssl: ECDSA P-256 timing attack key recovery SSL/TLS: Malformed plain-text ALERT packets could cause remote DoS log4j: Socket receiver deserialization vulnerability tomcat: Incorrect handling of pipelined requests when send file was used tomcat: Calls to application listeners did not use the appropriate facade object tomcat: Security constrained bypass in error page mechanism tomcat: Vary header not added by CORS filter leading to cache poisoning log4j: deserialization of untrusted data in SocketServer
[ "cpe:/a:redhat:jboss_enterprise_web_server:3.1::el6", "cpe:/a:redhat:jboss_enterprise_web_server:3.1::el7" ]
null
9.8
5.9
null
RHSA-2008:0849
Red Hat Security Advisory: ipsec-tools security update
ipsec-tools: racoon memory leak caused by invalid proposals ipsec-tools: racoon orphaned ph1s memory leak
[ "cpe:/o:redhat:enterprise_linux:3::as", "cpe:/o:redhat:enterprise_linux:3::desktop", "cpe:/o:redhat:enterprise_linux:3::es", "cpe:/o:redhat:enterprise_linux:3::ws", "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws", "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
RHSA-2021:3856
Red Hat Security Advisory: httpd security update
httpd: mod_proxy: SSRF via a crafted request uri-path containing "unix:"
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation", "cpe:/o:redhat:rhel_aus:7.2::server", "cpe:/o:redhat:rhel_aus:7.3::server", "cpe:/o:redhat:rhel_aus:7.4::server", "cpe:/o:redhat:rhel_aus:7.6::server", "cpe:/o:redhat:rhel_aus:7.7::server", "cpe:/o:redhat:rhel_e4s:7.6::server", "cpe:/o:redhat:rhel_e4s:7.7::server", "cpe:/o:redhat:rhel_tus:7.6::server", "cpe:/o:redhat:rhel_tus:7.7::server" ]
null
9
null
null
RHSA-2024:9548
Red Hat Security Advisory: openexr security update
OpenEXR: Heap Overflow in Scanline Deep Data Parsing
[ "cpe:/a:redhat:enterprise_linux:9::appstream", "cpe:/a:redhat:enterprise_linux:9::crb" ]
null
9.1
null
null
RHSA-2022:5201
Red Hat Security Advisory: Red Hat Advanced Cluster Management 2.4.5 security updates and bug fixes
golang.org/x/crypto: empty plaintext packet causes panic nconf: Prototype pollution in memory store golang: crypto/elliptic: IsOnCurve returns true for invalid field elements nats-server: misusing the "dynamically provisioned sandbox accounts" feature authenticated user can obtain the privileges of the System account Moment.js: Path traversal in moment.locale dset: Prototype Pollution in dset golang: syscall: faccessat checks wrong group go-getter: writes SSH credentials into logfile, exposing sensitive credentials to local uses
[ "cpe:/a:redhat:acm:2.4::el8" ]
null
5.1
null
null
RHSA-2018:0107
Red Hat Security Advisory: qemu-kvm security update
An update for qemu-kvm is now available for Red Hat Enterprise Linux 6.2 Advanced Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
[ "cpe:/o:redhat:rhel_mission_critical:6.2::server" ]
null
null
null
null
RHSA-2022:4729
Red Hat Security Advisory: firefox security update
Mozilla: Untrusted input used in JavaScript object indexing, leading to prototype pollution Mozilla: Prototype pollution in Top-Level Await implementation
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
8.8
null
RHSA-2005:320
Red Hat Security Advisory: ImageMagick security update
security flaw
[ "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws" ]
null
null
null
null
RHSA-2024:0310
Red Hat Security Advisory: openssl security update
openssl: Incorrect cipher key and IV length processing
[ "cpe:/a:redhat:enterprise_linux:9::appstream", "cpe:/o:redhat:enterprise_linux:9::baseos" ]
null
7.5
null
null
RHSA-2024:0992
Red Hat Security Advisory: rh-postgresql10-postgresql security update
postgresql: non-owner 'REFRESH MATERIALIZED VIEW CONCURRENTLY' executes arbitrary SQL
[ "cpe:/a:redhat:rhel_software_collections:3::el7" ]
null
8
null
null
RHSA-2005:334
Red Hat Security Advisory: mysql security update
security flaw security flaw security flaw
[ "cpe:/o:redhat:enterprise_linux:3::as", "cpe:/o:redhat:enterprise_linux:3::desktop", "cpe:/o:redhat:enterprise_linux:3::es", "cpe:/o:redhat:enterprise_linux:3::ws", "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws" ]
null
null
null
null
RHSA-2020:2367
Red Hat Security Advisory: Red Hat support for Spring Boot 2.1.13 security and bug fix update
undertow: possible Denial Of Service (DOS) in Undertow HTTP server listening on HTTPS undertow: AJP File Read/Inclusion Vulnerability tomcat: Mishandling of Transfer-Encoding header allows for HTTP request smuggling tomcat: Apache Tomcat AJP File Read/Inclusion Vulnerability
[ "cpe:/a:redhat:openshift_application_runtimes:1.0" ]
null
7.6
7.5
null
RHSA-2020:0892
Red Hat Security Advisory: zsh security update
zsh: insecure dropping of privileges when unsetting PRIVILEGED option
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
7.8
null
null
RHSA-2025:0066
Red Hat Security Advisory: kernel-rt security update
kernel: i40e: fix race condition by adding filter's intermediate sync state kernel: mptcp: cope racing subflow creation in mptcp_rcv_space_adjust
[ "cpe:/a:redhat:enterprise_linux:8::nfv", "cpe:/a:redhat:enterprise_linux:8::realtime" ]
null
5.9
null
null
RHSA-2009:0259
Red Hat Security Advisory: mod_auth_mysql security update
mod_auth_mysql: character encoding SQL injection flaw
[ "cpe:/o:redhat:enterprise_linux:5::client_workstation", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
RHSA-2020:2827
Red Hat Security Advisory: firefox security update
Mozilla: Memory corruption due to missing sign-extension for ValueTags on ARM64 Mozilla: Information disclosure due to manipulated URL object Mozilla: Use-after-free in nsGlobalWindowInner Mozilla: Use-After-Free when trying to connect to a STUN server Mozilla: Add-On updates did not respect the same certificate trust rules as software updates
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
8.8
6.1
null
RHSA-2024:8117
Red Hat Security Advisory: java-1.8.0-openjdk security update
giflib: Heap-Buffer Overflow during Image Saving in DumpScreen2RGB Function JDK: HTTP client improper handling of maxHeaderSize (8328286) JDK: Array indexing integer overflow (8328544) JDK: Unbounded allocation leads to out-of-memory error (8331446) JDK: Integer conversion error leads to incorrect range check (8332644)
[ "cpe:/a:redhat:enterprise_linux:8::appstream", "cpe:/a:redhat:enterprise_linux:8::crb", "cpe:/a:redhat:enterprise_linux:9::appstream", "cpe:/a:redhat:enterprise_linux:9::crb", "cpe:/a:redhat:rhel_aus:8.2::appstream", "cpe:/a:redhat:rhel_aus:8.4::appstream", "cpe:/a:redhat:rhel_aus:8.6::appstream", "cpe:/a:redhat:rhel_e4s:8.4::appstream", "cpe:/a:redhat:rhel_e4s:8.6::appstream", "cpe:/a:redhat:rhel_e4s:9.0::appstream", "cpe:/a:redhat:rhel_eus:8.8::appstream", "cpe:/a:redhat:rhel_eus:8.8::crb", "cpe:/a:redhat:rhel_eus:9.2::appstream", "cpe:/a:redhat:rhel_eus:9.2::crb", "cpe:/a:redhat:rhel_tus:8.4::appstream", "cpe:/a:redhat:rhel_tus:8.6::appstream" ]
null
4.8
null
null
RHBA-2021:0622
Red Hat Bug Fix Advisory: microcode_ctl bug fix and enhancement update
hw: Vector Register Leakage-Active
[ "cpe:/o:redhat:rhel_aus:7.3::server" ]
null
2.8
null
null
RHSA-2020:2789
Red Hat Security Advisory: OpenShift Container Platform 4.4.11 ose-baremetal-operator-container security update
golang.org/x/crypto: Processing of crafted ssh-ed25519 public keys allows for panic
[ "cpe:/a:redhat:openshift:4.4::el7" ]
null
5.3
null
null
RHSA-2018:1251
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.1.2 security update
undertow: Path traversal in ServletResourceManager class undertow: HTTP header injection using CRLF with UTF-8 Encoding (incomplete fix of CVE-2016-4993) slf4j: Deserialisation vulnerability in EventData constructor can allow for arbitrary code execution
[ "cpe:/a:redhat:jboss_enterprise_application_platform:7.1" ]
null
null
8.1
null
RHSA-2016:0081
Red Hat Security Advisory: qemu-kvm-rhev security update
Qemu: nvram: OOB r/w access in processing firmware configurations
[ "cpe:/a:redhat:enterprise_linux:6::hypervisor" ]
null
null
null
null
RHSA-2023:4020
Red Hat Security Advisory: kernel security and bug fix update
kernel: use-after-free caused by l2cap_reassemble_sdu() in net/bluetooth/l2cap_core.c
[ "cpe:/o:redhat:rhel_aus:7.4::server" ]
null
7.1
null
null
RHSA-2013:1285
Red Hat Security Advisory: openstack-keystone security update
OpenStack: Keystone Token revocation failure using Keystone memcache/KVS backends
[ "cpe:/a:redhat:openstack:3::el6" ]
null
null
null
null
RHSA-2023:3664
Red Hat Security Advisory: OpenShift Jenkins image and Jenkins agent base image security update
golang: net/http: improper sanitization of Transfer-Encoding header golang: net/http/httputil: ReverseProxy should not forward unparseable query parameters golang: crypto/elliptic: panic caused by oversized scalar golang: net/http/httputil: NewSingleHostReverseProxy - omit X-Forwarded-For not working golang: regexp/syntax: limit memory used by parsing regexps golang: net/http: excessive memory growth in a Go server accepting HTTP/2 requests
[ "cpe:/a:redhat:ocp_tools:4.11::el8" ]
null
5.3
null
null
RHSA-2018:1812
Red Hat Security Advisory: java-1.7.1-ibm security update
OpenJDK: unsynchronized access to encryption key data (Libraries, 8172525) JDK: unspecified vulnerability fixed in 7u171, 8u161, and 9.0.4 (JavaFX) OpenJDK: LdapLoginModule insufficient username encoding in LDAP query (LDAP, 8178449) OpenJDK: DnsClient missing source port randomization (JNDI, 8182125) OpenJDK: loading of classes from untrusted locations (I18n, 8182601) OpenJDK: DerValue unbounded memory allocation (Libraries, 8182387) OpenJDK: insufficient strength of key agreement (JCE, 8185292) OpenJDK: GSS context use-after-free (JGSS, 8186212) OpenJDK: LDAPCertStore insecure handling of LDAP referrals (JNDI, 8186606) OpenJDK: use of global credentials for HTTP/SPNEGO (JGSS, 8186600) OpenJDK: SingleEntryRegistry incorrect setup of deserialization filter (JMX, 8186998) OpenJDK: GTK library loading use-after-free (AWT, 8185325) JDK: unspecified vulnerability fixed in 6u181 and 7u171 (Serialization) OpenJDK: ArrayBlockingQueue deserialization to an inconsistent state (Libraries, 8189284) OpenJDK: unbounded memory allocation during deserialization (AWT, 8190289) OpenJDK: unbounded memory allocation in BasicAttributes deserialization (JNDI, 8191142)
[ "cpe:/a:redhat:network_satellite:5.6::el6", "cpe:/a:redhat:network_satellite:5.7::el6" ]
null
null
4.3
null
RHSA-2018:2391
Red Hat Security Advisory: kernel security update
Kernel: hw: cpu: L1 terminal fault (L1TF) Kernel: hw: cpu: L1 terminal fault (L1TF) kernel: kvm: vmx: host GDT limit corruption
[ "cpe:/o:redhat:rhel_eus:6.7::computenode", "cpe:/o:redhat:rhel_eus:6.7::server" ]
null
null
7.8
null
RHSA-2024:7725
Red Hat Security Advisory: Red Hat OpenShift Service Mesh Containers for 2.5.5
envoy: Envoy incorrectly accepts HTTP 200 response for entering upgrade mode envoy: HTTP/2 CPU exhaustion due to CONTINUATION frame flood envoy: abnormal termination when using auto_sni with authority header longer than 255 characters envoy: Brotli decompressor infinite loop webpack: DOM Clobbering vulnerability in AutoPublicPathRuntimeModule send: Code Execution Vulnerability in Send Library serve-static: Improper Sanitization in serve-static body-parser: Denial of Service Vulnerability in body-parser envoy: Potential to manipulate `x-envoy` headers from external sources
[ "cpe:/a:redhat:service_mesh:2.5::el8" ]
null
7.4
null
null
RHBA-2020:2215
Red Hat Bug Fix Advisory: OpenShift Container Platform 3.11 bug fix and enhancement update
kubernetes: Use of unbounded 'client' label in apiserver_request_total allows for memory exhaustion
[ "cpe:/a:redhat:openshift:3.11::el7" ]
null
4.3
null
null
RHSA-2021:1578
Red Hat Security Advisory: kernel security, bug fix, and enhancement update
kernel: memory leak in sof_set_get_large_ctrl_data() function in sound/soc/sof/ipc.c kernel: use-after-free caused by a malicious USB device in the drivers/usb/misc/adutux.c driver kernel: use-after-free bug caused by a malicious USB device in the drivers/usb/misc/iowarrior.c driver kernel: possible out of bounds write in kbd_keycode of keyboard.c kernel: NULL pointer dereferences in ov511_mode_init_regs and ov518_mode_init_regs in drivers/media/usb/gspca/ov519.c kernel: DoS by corrupting mountpoint reference counter kernel: Integer overflow in Intel(R) Graphics Drivers kernel: Improper input validation in some Intel(R) Graphics Drivers kernel: Null pointer dereference in some Intel(R) Graphics Drivers kernel: use-after-free in usb_sg_cancel function in drivers/usb/core/message.c kernel: buffer uses out of index in ext3/4 filesystem kernel: Use After Free vulnerability in cgroup BPF component kernel: NULL pointer dereference in serial8250_isa_init_ports function in drivers/tty/serial/8250/8250_core.c kernel: umask not applied on filesystem without ACL support kernel: TOCTOU mismatch in the NFS client code kernel: incomplete permission checking for access to rbd devices kernel: race condition between hugetlb sysctl handlers in mm/hugetlb.c kernel: improper input validation in ppp_cp_parse_cr function leads to memory corruption and read overflow kernel: perf_event_parse_addr_filter memory kernel: use-after-free in kernel midi subsystem kernel: child process is able to access parent mm through hfi dev file handle kernel: slab-out-of-bounds read in fbcon kernel: fork: fix copy_process(CLONE_PARENT) race with the exiting ->real_parent kernel: fuse: fuse_do_getattr() calls make_bad_inode() in inappropriate situations kernel: race condition between the VT_DISALLOCATE ioctl and closing/opening of ttys, causing a use-after-free in con_shutdown(). kernel: netfilter: use-after-free in the packet processing context kernel: use after free in tun_get_user of tun.c could lead to local escalation of privilege kernel: In pfkey_dump() dplen and splen can both be specified to access the xfrm_address_t structure out of bounds kernel: integer overflow in ext4_es_cache_extent kernel: remote DoS in TIPC kernel module
[ "cpe:/a:redhat:enterprise_linux:8::crb", "cpe:/o:redhat:enterprise_linux:8::baseos" ]
null
7.5
null
null
RHSA-2023:4039
Red Hat Security Advisory: rh-nodejs14-nodejs security update
c-ares: AutoTools does not set CARES_RANDOM_FILE during cross compilation c-ares: Buffer Underwrite in ares_inet_net_pton() c-ares: Insufficient randomness in generation of DNS query IDs c-ares: 0-byte UDP payload Denial of Service
[ "cpe:/a:redhat:rhel_software_collections:3::el7" ]
null
7.5
null
null
RHSA-2023:2256
Red Hat Security Advisory: webkit2gtk3 security and bug fix update
webkitgtk: buffer overflow issue was addressed with improved memory handling webkitgtk: out-of-bounds write issue was addressed with improved bounds checking webkitgtk: correctness issue in the JIT was addressed with improved checks webkitgtk: issue was addressed with improved UI handling webkitgtk: type confusion issue leading to arbitrary code execution webkitgtk: sensitive information disclosure issue webkitgtk: use-after-free issue leading to arbitrary code execution webkitgtk: memory disclosure issue was addressed with improved memory handling webkitgtk: memory corruption issue leading to arbitrary code execution webkitgtk: use-after-free issue leading to arbitrary code execution webkitgtk: memory corruption issue leading to arbitrary code execution webkitgtk: Same Origin Policy bypass issue webkitgtk: logic issue leading to user information disclosure webkitgtk: memory corruption issue leading to arbitrary code execution webkitgtk: memory corruption issue leading to arbitrary code execution webkitgtk: improper bounds checking leading to arbitrary code execution webkitgtk: memory corruption issue leading to arbitrary code execution webkitgtk: memory corruption issue leading to arbitrary code execution webkitgtk: heap-use-after-free in WebCore::RenderLayer::addChild() webkitgtk: heap-use-after-free in WebCore::RenderLayer::renderer() webkitgtk: heap-use-after-free in WebCore::RenderLayer::setNextSibling() webkitgtk: heap-use-after-free in WebCore::RenderLayer::repaintBlockSelectionGaps() webkitgtk: heap-use-after-free in WebCore::RenderLayer::updateDescendantDependentFlags()
[ "cpe:/a:redhat:enterprise_linux:9::appstream" ]
null
7.5
null
null
RHSA-2020:0805
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.2.7 on RHEL 7 security update
thrift: Endless loop when feed with specific input data thrift: Out-of-bounds read related to TJSONProtocol or TSimpleJSONProtocol apache-commons-beanutils: does not suppresses the class property in PropertyUtilsBean by default xml-security: Apache Santuario potentially loads XML parsing code from an untrusted source wildfly: The 'enabled-protocols' value in legacy security is not respected if OpenSSL security provider is in use netty: HTTP request smuggling netty: HttpObjectDecoder.java allows Content-Length header to accompanied by second Content-Length header netty: HTTP Request Smuggling due to Transfer-Encoding whitespace mishandling
[ "cpe:/a:redhat:jboss_enterprise_application_platform:7.2::el7" ]
null
7.5
7.4
null
RHSA-2023:4535
Red Hat Security Advisory: postgresql:12 security update
postgresql: Client memory disclosure when connecting with Kerberos to modified server postgresql: schema_element defeats protective search_path changes postgresql: row security policies disregard user ID changes after inlining.
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
4.2
null
null
RHSA-2025:1047
Red Hat Security Advisory: libsoup security update
libsoup: buffer overflow via UTF-8 conversion in soup_header_parse_param_list_strict
[ "cpe:/o:redhat:rhel_els:7" ]
null
9
null
null
RHSA-2012:1491
Red Hat Security Advisory: kernel-rt security and bug fix update
kernel: uts: stack memory leak in UNAME26 kernel: use after free bug in "quota" handling kernel: udf: buffer overflow when parsing sparing table kernel: recv{from,msg}() on an rds socket can leak kernel memory kernel: mm: use-after-free in madvise_remove() kernel: af_netlink: invalid handling of SCM_CREDENTIALS passing kernel: ext4: AIO vs fallocate stale data exposure kernel: net: divide by zero in tcp algorithm illinois
[ "cpe:/a:redhat:enterprise_mrg:2:server:el6" ]
null
null
null
null
RHSA-2019:0917
Red Hat Security Advisory: openstack-cinder security and bug fix update
openstack-cinder: Data retained after deletion of a ScaleIO volume
[ "cpe:/a:redhat:openstack:10::el7" ]
null
null
4.8
null
RHSA-2019:0737
Red Hat Security Advisory: flash-plugin security update
flash-plugin: Arbitrary Code Execution vulnerability (APSB19-19) flash-plugin: Information Disclosure vulnerability (APSB19-19)
[ "cpe:/a:redhat:rhel_extras:6" ]
null
null
6.5
null
RHSA-2014:1436
Red Hat Security Advisory: X11 client libraries security, bug fix, and enhancement update
libX11: Multiple integer overflows leading to heap-based buffer-overflows libXext: Multiple integer overflows leading to heap-based buffer-overflows libXfixes: Integer overflow leading to heap-based buffer overflow libXi: Multiple integer overflows leading to heap-based buffer-overflows libXinerama: Integer overflow leading to heap-based buffer overflow libXrandr: Multiple integer overflows leading to heap-based bufer overflows libXrender: Multiple integer overflows leading to heap-based bufer overflows libXRes: Multiple integer overflows leading to heap-based bufer overflows libXv: Multiple integer overflows leading to heap-based bufer overflows libXvMC: Multiple integer overflows leading to heap-based buffer overflows libXxf86dga: Multiple integer overflows leading to heap-based buffer overflows libdmx: Multiple integer overflows leading to heap-based bufer overflows libXi: Sign extension issues resulting in heap-based buffer overflow libX11: Multiple Array Index error leading to heap-based OOB write libXi: Multiple Array Index error leading to heap-based OOB write libXvMC: Array Index error leading to heap-based OOB write libXxf86dga: Array Index error leading to heap-based OOB write libXxf86vm: Multiple Array Index error leading to heap-based OOB write libXt: Array Index error leading to heap-based OOB write libXcursor: Integer overflow leading to heap-based buffer overflow libX11: unbounded recursion leading to stack-overflow libXt: Memory corruption due to unchecked use of unchecked function pointers libXp: Integer overflow leading to heap-based buffer overflow libXtst: Integer overflow leading to heap-based buffer overlow libxcb: Integer overflow leading to heap-based buffer overflow libXv: Array Index error leading to heap-based OOB write libX11: buffer overflow in MakeBigReq macro
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
null
null
RHSA-2004:653
Red Hat Security Advisory: apache, mod_ssl security update for Stronghold
httpd mod_digest nonce not verified mod_ssl SSLCipherSuite bypass httpd mod_include SSI overflow
[ "cpe:/a:redhat:stronghold:4" ]
null
null
null
null
RHSA-2021:2883
Red Hat Security Advisory: thunderbird security update
Mozilla: IMAP server responses sent by a MITM prior to STARTTLS could be processed Mozilla: Use-after-free in accessibility features of a document Mozilla: Memory safety bugs fixed in Firefox 90 and Firefox ESR 78.12 chromium-browser: Out of bounds write in ANGLE
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
8.8
null
null
RHSA-2021:1026
Red Hat Security Advisory: nss-softokn security update
nss: Use-after-free in sftk_FreeSession due to improper refcounting nss: Check length of inputs for cryptographic primitives nss: CHACHA20-POLY1305 decryption with undersized tag leads to out-of-bounds read
[ "cpe:/o:redhat:rhel_eus:7.7::computenode", "cpe:/o:redhat:rhel_eus:7.7::server" ]
null
7.4
8.1
null
RHSA-2018:3401
Red Hat Security Advisory: qemu-kvm security update
hw: cpu: speculative store bypass
[ "cpe:/o:redhat:rhel_aus:6.4::server" ]
null
null
5.6
null
RHSA-2020:1317
Red Hat Security Advisory: nodejs:10 security update
ICU: Integer overflow in UnicodeString::doAppend()
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
8.8
null
null
RHBA-2020:5095
Red Hat Bug Fix Advisory: Red Hat Advanced Cluster Management for Kubernetes version 2.0.5 images
rhacm: certificate re-use in grcuiapi and topologyapi
[ "cpe:/a:redhat:acm:2.0::el8" ]
null
3.5
null
null
RHSA-2021:5235
Red Hat Security Advisory: postgresql:12 security update
postgresql: memory disclosure in certain queries postgresql: server processes unencrypted bytes from man-in-the-middle
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
8.1
null
null
RHSA-2014:0798
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 6.2.4 update
CXF: The SecurityTokenService accepts certain invalid SAML Tokens as valid CXF: UsernameTokens are sent in plaintext with a Symmetric EncryptBeforeSigning policy CXF: HTML content posted to SOAP endpoint could cause OOM errors CXF: Large invalid content could cause temporary space to fill JAX-RS: Information disclosure via XML eXternal Entity (XXE)
[ "cpe:/a:redhat:jboss_enterprise_application_platform:6::el5" ]
null
null
null
null
RHSA-2007:0993
Red Hat Security Advisory: kernel security update
ALSA memory disclosure flaw kernel ieee80211 off-by-two integer underflow open(O_ATOMICLOOKUP) leaks dentry
[ "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
RHSA-2023:5761
Red Hat Security Advisory: java-1.8.0-openjdk security update
OpenJDK: IOR deserialization issue in CORBA (8303384) OpenJDK: certificate path validation issue during client authentication (8309966)
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
5.3
null
null
RHSA-2022:7514
Red Hat Security Advisory: fribidi security update
fribidi: Stack based buffer overflow fribidi: Heap-buffer-overflow in fribidi_cap_rtl_to_unicode fribidi: SEGV in fribidi_remove_bidi_marks
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
5.5
null
null
RHSA-2019:3238
Red Hat Security Advisory: OpenShift Container Platform 3.10 mediawiki security update
mediawiki: $wgRateLimits (rate limit / ping limiter) entry for 'user' overrides that for 'newbie' mediawiki: Information exposure when a log event is (partially) hidden mediawiki: BotPassword can bypass CentralAuth's account lock
[ "cpe:/a:redhat:openshift:3.10::el7" ]
null
null
5.3
null
RHSA-2010:0520
Red Hat Security Advisory: libtiff security update
libtiff: integer overflows leading to heap overflow in Fax3SetupState libtiff: crash when reading image with not configured compression
[ "cpe:/o:redhat:enterprise_linux:3::as", "cpe:/o:redhat:enterprise_linux:3::desktop", "cpe:/o:redhat:enterprise_linux:3::es", "cpe:/o:redhat:enterprise_linux:3::ws" ]
null
null
null
null
RHSA-2012:1508
Red Hat Security Advisory: rhev-3.1.0 vdsm security, bug fix, and enhancement update
rhev: vds_installer insecure /tmp use rhev: vds_installer is prone to MITM when downloading 2nd stage installer
[ "cpe:/a:redhat:enterprise_linux:6::hypervisor" ]
null
null
null
null
RHSA-2022:8444
Red Hat Security Advisory: keylime security update
keylime: exception handling and impedance match in tornado_requests
[ "cpe:/a:redhat:enterprise_linux:9::appstream" ]
null
5.1
null
null
RHSA-2014:0821
Red Hat Security Advisory: Red Hat Storage 2.0 - Retirement Notice
This is the end of life notification for the retirement of Red Hat Storage 2.0.
[]
null
null
null
null
RHSA-2024:0791
Red Hat Security Advisory: nss security update
nss: vulnerable to Minerva side-channel information leak
[ "cpe:/a:redhat:rhel_eus:9.2::appstream" ]
null
4.3
null
null
RHSA-2016:2945
Red Hat Security Advisory: Red Hat Single Sign-On security update
keycloak: account hijacking via auth code fixation
[ "cpe:/a:redhat:jboss_single_sign_on:7.0" ]
null
null
3.7
null
RHSA-2015:1921
Red Hat Security Advisory: java-1.7.0-openjdk security update
OpenJDK: kerberos realm name leak (JGSS, 8048030) OpenJDK: inefficient use of hash tables and lists during XML parsing (JAXP, 8068842) OpenJDK: missing checks for proper initialization in ObjectStreamClass (Serialization, 8103671) OpenJDK: HttpURLConnection header restriction bypass (Libraries, 8130193) OpenJDK: insufficient permission checks in StubGenerator (CORBA, 8076383) OpenJDK: OOB access in CMS code (2D, 8086092) OpenJDK: leak of user.dir location (JAXP, 8078427) OpenJDK: java.nio Buffers integer overflow issues (Libraries, 8130891) ICU: missing boundary checks in layout engine (OpenJDK 2D, 8132042) OpenJDK: incorrect access control context used in DGCImpl (RMI, 8080688) OpenJDK: incomplete constraints enforcement by AlgorithmChecker (Security, 8131291) OpenJDK: missing type checks in IIOPInputStream (CORBA, 8076392) OpenJDK: incorrect String object deserialization in IIOPInputStream (CORBA, 8076387) OpenJDK: incorrect access control context used in DGCClient (RMI, 8076413) OpenJDK: incomplete MaxXMLNameLimit enforcement (JAXP, 8086733) OpenJDK: insufficient proxy class checks in RemoteObjectInvocationHandler (RMI, 8076339) OpenJDK: incomplete supportDTD enforcement (JAXP, 8130078)
[ "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
RHSA-2014:0285
Red Hat Security Advisory: kernel security, bug fix, and enhancement update
kernel: exec/ptrace: get_dumpable() incorrect tests kernel: ipc: ipc_rcu_putref refcount races kernel: xen: hypercalls exposed to privilege rings 1 and 2 of HVM guests Kernel: qeth: buffer overflow in snmp ioctl Kernel: AACRAID Driver compat IOCTL missing capability check hw: AMD CPU erratum may cause core hang Kernel: net: leakage of uninitialized memory to user-space via recv syscalls
[ "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
RHSA-2006:0742
Red Hat Security Advisory: elinks security update
security flaw
[ "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws" ]
null
null
null
null
RHSA-2015:2620
Red Hat Security Advisory: CFME 5.4.4 bug fixes, and enhancement update
CloudForms: insecure password storage in PostgreSQL database
[ "cpe:/a:redhat:cloudforms_managementengine:5::el6" ]
null
null
null
null
RHSA-2013:1274
Red Hat Security Advisory: hplip security update
hplip: Insecure calling of polkit
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
null
null
RHSA-2017:0196
Red Hat Security Advisory: kernel security update
kernel: Use-after-free in the recvmmsg exit path
[ "cpe:/o:redhat:rhel_aus:6.4::server" ]
null
null
8.1
null
RHSA-2018:0666
Red Hat Security Advisory: krb5 security, bug fix, and enhancement update
krb5: Authentication bypass by improper validation of certificate EKU and SAN krb5: Invalid S4U2Self or S4U2Proxy request causes assertion failure
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
6.5
null
RHSA-2009:1536
Red Hat Security Advisory: pidgin security update
Pidgin: Invalid pointer dereference (crash) after receiving contacts from SIM IM client
[ "cpe:/a:redhat:rhel_productivity:5", "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws", "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::client_workstation" ]
null
null
null
null
RHSA-2023:4161
Red Hat Security Advisory: OpenJDK 11.0.20 Security Update for Windows Builds
OpenJDK: HTTP client insufficient file name validation (8302475) OpenJDK: ZIP file parsing infinite loop (8302483) OpenJDK: weakness in AES implementation (8308682) OpenJDK: array indexing integer overflow issue (8304468) OpenJDK: improper handling of slash characters in URI-to-path conversion (8305312) harfbuzz: allows attackers to trigger O(n^2) growth via consecutive marks
[ "cpe:/a:redhat:openjdk:11::windows" ]
null
7.5
null
null
RHSA-2007:0675
Red Hat Security Advisory: perl-Net-DNS security update
perl-Net-DNS security issue
[ "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws" ]
null
null
null
null
RHSA-2022:6172
Red Hat Security Advisory: rsync security update
rsync: remote arbitrary files write inside the directories of connecting peers
[ "cpe:/o:redhat:rhel_eus:8.2::baseos" ]
null
7.4
null
null
RHSA-2025:0161
Red Hat Security Advisory: iperf3 security update
iperf: Denial of Service in iperf Due to Improper JSON Handling
[ "cpe:/a:redhat:enterprise_linux:9::appstream" ]
null
7.5
null
null
RHSA-2023:1043
Red Hat Security Advisory: Red Hat Single Sign-On 7.6.2 security update on RHEL 7
bootstrap: Cross-site Scripting (XSS) in the collapse data-parent attribute bootstrap: Cross-site Scripting (XSS) in the data-container property of tooltip jquery: Prototype pollution in object's prototype leading to denial of service, remote code execution, or property injection jquery: Cross-site scripting due to improper injQuery.htmlPrefilter method jquery: Untrusted code execution via <option> tag in HTML passed to DOM manipulation methods glob-parent: Regular Expression Denial of Service minimist: prototype pollution keycloak: HTML injection in execute-actions-email Admin REST API keycloak: XSS on impersonation under specific circumstances SnakeYaml: Constructor Deserialization Remote Code Execution Undertow: DoS can be achieved as Undertow server waits for the LAST_CHUNK forever for EJB invocations keycloak: Session takeover with OIDC offline refreshtokens keycloak: reflected XSS attack Moment.js: Path traversal in moment.locale snakeyaml: Denial of Service due to missing nested depth limitation for collections moment: inefficient parsing algorithm resulting in DoS loader-utils: Regular expression denial of service snakeyaml: Uncaught exception in org.yaml.snakeyaml.composer.Composer.composeSequenceNode snakeyaml: Uncaught exception in org.yaml.snakeyaml.constructor.BaseConstructor.constructObject snakeyaml: Uncaught exception in java.base/java.util.regex.Pattern$Ques.match jettison: parser crash by stackoverflow jettison: memory exhaustion via user-supplied XML or JSON data jackson-databind: deep wrapper array nesting wrt UNWRAP_SINGLE_VALUE_ARRAYS jackson-databind: use of deeply nested arrays mina-sshd: Java unsafe deserialization vulnerability jettison: If the value in map is the map's self, the new new JSONObject(map) cause StackOverflowError which may lead to dos json5: Prototype Pollution in JSON5 via Parse Method CXF: directory listing / code exfiltration CXF: SSRF Vulnerability keycloak: Client Registration endpoint does not check token revocation keycloak: user impersonation via stolen uuid code
[ "cpe:/a:redhat:red_hat_single_sign_on:7.6::el7" ]
null
4.6
5.6
null