id
stringlengths
13
15
title
stringlengths
29
176
description
stringlengths
8
32.1k
cpes
sequencelengths
0
20
cvss_v4_0
null
cvss_v3_1
float64
0
10
cvss_v3_0
float64
0
10
cvss_v2_0
null
RHSA-2024:8717
Red Hat Security Advisory: Satellite 6.13.7.3 Async Update
foreman: Read-only access to entire DB from templates
[ "cpe:/a:redhat:satellite:6.13::el8", "cpe:/a:redhat:satellite_capsule:6.13::el8", "cpe:/a:redhat:satellite_maintenance:6.13::el8", "cpe:/a:redhat:satellite_utils:6.13::el8" ]
null
6.3
null
null
RHSA-2021:4033
Red Hat Security Advisory: binutils security update
environment: Unicode's bidirectional (BiDi) override characters can cause trojan source attacks
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
8.5
null
null
RHSA-2015:1378
Red Hat Security Advisory: hivex security and bug fix update
hivex: missing checks for small-sized files
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
null
null
RHSA-2022:5606
Red Hat Security Advisory: Red Hat Integration Camel Extensions for Quarkus 2.7 security update
hadoop: WebHDFS client might send SPNEGO authorization header lz4: memory corruption due to an integer overflow bug caused by memmove argument elasticsearch: executing async search improperly stores HTTP headers leading to information disclosure elasticsearch: Document disclosure flaw in the Elasticsearch suggester elasticsearch: Document disclosure flaw when Document or Field Level Security is used jsoup: Crafted input may cause the jsoup HTML and XML parser to get stuck Kafka: Timing Attack Vulnerability for Apache Kafka Connect and Clients xstream: Injecting highly recursive collections or maps can cause a DoS quarkus: privilege escalation vulnerability with RestEasy Reactive scope leakage in Quarkus
[ "cpe:/a:redhat:camel_quarkus:2.7" ]
null
7.6
null
null
RHSA-2021:2737
Red Hat Security Advisory: RHV-H security update (redhat-virtualization-host) 4.3.17
kernel: use-after-free in net/bluetooth/hci_event.c when destroying an hci_chan kernel: size_t-to-int conversion vulnerability in the filesystem layer
[ "cpe:/o:redhat:enterprise_linux:7::hypervisor" ]
null
7.8
null
null
RHSA-2014:0037
Red Hat Security Advisory: jasperreports-server-pro security, bug fix, and enhancement update
axis: missing connection hostname check against X.509 certificate name hadoop: man-in-the-middle vulnerability
[ "cpe:/a:redhat:rhev_manager:3" ]
null
null
null
null
RHBA-2006:0287
Red Hat Bug Fix Advisory: bind bug fix update
INSIST failure in ISC BIND recursive query
[ "cpe:/o:redhat:enterprise_linux:3::as", "cpe:/o:redhat:enterprise_linux:3::desktop", "cpe:/o:redhat:enterprise_linux:3::es", "cpe:/o:redhat:enterprise_linux:3::ws" ]
null
null
null
null
RHSA-2018:2252
Red Hat Security Advisory: thunderbird security update
Mozilla: Memory safety bugs fixed in Firefox 61, Firefox ESR 60.1, and Firefox ESR 52.9 Mozilla: Buffer overflow using computed size of canvas element Mozilla: Use-after-free using focus() Mozilla: Integer overflow in SSSE3 scaler Mozilla: Use-after-free when appending DOM nodes Mozilla: CSRF attacks through 307 redirects and NPAPI plugins Mozilla: Compromised IPC child process can list local filenames Mozilla: Invalid data handling during QCMS transformations thunderbird: S/MIME and PGP decryption oracles can be built with HTML emails thunderbird: S/MIME plaintext can be leaked through HTML reply/forward thunderbird: Using form to exfiltrate encrypted mail part by pressing enter in form field
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
4.3
null
RHSA-2024:3626
Red Hat Security Advisory: libxml2 security update
libxml2: use-after-free in XMLReader
[ "cpe:/a:redhat:enterprise_linux:8::appstream", "cpe:/o:redhat:enterprise_linux:8::baseos" ]
null
7.5
null
null
RHSA-2020:5168
Red Hat Security Advisory: rh-eclipse security, bug fix and enhancement update
jetty: local temporary directory hijacking vulnerability
[ "cpe:/a:redhat:devtools:2020" ]
null
7
null
null
RHSA-2014:1088
Red Hat Security Advisory: Red Hat JBoss Web Server 2.1.0 update
tomcat: information disclosure via XXE when running untrusted web applications httpd: mod_deflate denial of service Tomcat/JBossWeb: XML parser hijack by malicious web application httpd: mod_status heap-based buffer overflow Tomcat/JBossWeb: request smuggling and limited DoS in ChunkedInputFilter httpd: mod_cgid denial of service
[ "cpe:/a:redhat:jboss_enterprise_web_server:2::el5" ]
null
null
null
null
RHSA-2013:0502
Red Hat Security Advisory: Core X11 clients security, bug fix, and enhancement update
x11perfcomp has dot in its path
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
null
null
RHSA-2022:6541
Red Hat Security Advisory: php:7.4 security update
Archive_Tar: allows an unserialization attack because phar: is blocked but PHAR: is not blocked Archive_Tar: improper filename sanitization leads to file overwrites Archive_Tar: directory traversal due to inadequate checking of symbolic links
[ "cpe:/a:redhat:rhel_eus:8.4::appstream" ]
null
7.5
null
null
RHSA-2025:1680
Red Hat Security Advisory: kpatch-patch-4_18_0-477_43_1, kpatch-patch-4_18_0-477_67_1, and kpatch-patch-4_18_0-477_81_1 security update
kernel: media: uvcvideo: Skip parsing frames of type UVC_VS_UNDEFINED in uvc_parse_format
[ "cpe:/o:redhat:rhel_eus:8.8::baseos" ]
null
7.3
null
null
RHSA-2007:1048
Red Hat Security Advisory: openoffice.org, hsqldb security update
JBoss HSQLDB component remote command injection OpenOffice.org-base allows Denial-of-Service and command injection
[ "cpe:/a:redhat:rhel_productivity:5", "cpe:/o:redhat:enterprise_linux:5::client" ]
null
null
null
null
RHSA-2016:1205
Red Hat Security Advisory: spice security update
spice: heap-based memory corruption within smartcard handling spice: Host memory access from guest with invalid primary surface parameters
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
null
null
RHSA-2024:2853
Red Hat Security Advisory: nodejs:20 security update
nodejs: using the fetch() function to retrieve content from an untrusted URL leads to denial of service c-ares: Out of bounds read in ares__read_line() nodejs: HTTP Request Smuggling via Content Length Obfuscation nodejs: CONTINUATION frames DoS nghttp2: CONTINUATION frames DoS
[ "cpe:/a:redhat:enterprise_linux:9::appstream" ]
null
5.3
null
null
RHSA-2020:4383
Red Hat Security Advisory: Red Hat JBoss Core Services Apache HTTP Server 2.4.37 SP5 security update
openssl: Integer overflow in RSAZ modular exponentiation on x86_64 curl: Integer overflows in curl_url_set() function httpd: mod_proxy_uwsgi buffer overflow httpd: mod_http2 concurrent pool usage
[ "cpe:/a:redhat:jboss_core_services:1" ]
null
7.5
3.7
null
RHSA-2020:1981
Red Hat Security Advisory: chromium-browser security update
chromium-browser: Use after free in storage chromium-browser: Use after free in task scheduling
[ "cpe:/a:redhat:rhel_extras:6" ]
null
null
8.8
null
RHSA-2009:1059
Red Hat Security Advisory: pidgin security update
pidgin file transfer buffer overflow pidgin incomplete fix for CVE-2008-2927
[ "cpe:/o:redhat:enterprise_linux:3::as", "cpe:/o:redhat:enterprise_linux:3::desktop", "cpe:/o:redhat:enterprise_linux:3::es", "cpe:/o:redhat:enterprise_linux:3::ws" ]
null
null
null
null
RHSA-2023:4698
Red Hat Security Advisory: kpatch-patch security update
kernel: cls_flower: out-of-bounds write in fl_set_geneve_opt()
[ "cpe:/o:redhat:rhel_e4s:7.7::server" ]
null
7.8
null
null
RHSA-2016:2116
Red Hat Security Advisory: openstack-manila-ui security update
openstack-manila-ui: persistent XSS in metadata field
[ "cpe:/a:redhat:openstack:8::el7" ]
null
null
4.1
null
RHSA-2018:1663
Red Hat Security Advisory: qemu-kvm security update
hw: cpu: speculative store bypass
[ "cpe:/o:redhat:rhel_eus:7.4::computenode", "cpe:/o:redhat:rhel_eus:7.4::server" ]
null
null
5.6
null
RHSA-2025:1875
Red Hat Security Advisory: Red Hat OpenShift Service Mesh Containers for 2.5.9
dompurify: Mutation XSS in DOMPurify Due to Improper Template Literal Handling
[ "cpe:/a:redhat:service_mesh:2.5::el8" ]
null
4.5
null
null
RHSA-2020:2276
Red Hat Security Advisory: ipmitool security update
ipmitool: Buffer overflow in read_fru_area_section function in lib/ipmi_fru.c
[ "cpe:/o:redhat:rhel_aus:7.3::server", "cpe:/o:redhat:rhel_e4s:7.3::server", "cpe:/o:redhat:rhel_tus:7.3::server" ]
null
8.1
null
null
RHSA-2011:0436
Red Hat Security Advisory: avahi security update
avahi: daemon infinite loop triggered by an empty UDP packet (CVE-2010-2244 fix regression)
[ "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
RHSA-2021:1351
Red Hat Security Advisory: thunderbird security update
Mozilla: More internal network hosts could have been probed by a malicious webpage Mozilla: Out of bound write due to lazy initialization Mozilla: Use-after-free in Responsive Design Mode Mozilla: Secure Lock icon could have been spoofed Mozilla: Blob URLs may have been granted additional privileges Mozilla: Arbitrary FTP command execution on FTP servers using an encoded URL Mozilla: Incorrect size computation in WebAssembly JIT could lead to null-reads Mozilla: Port blocking could be bypassed Mozilla: Race condition when reading from disk while verifying signatures
[ "cpe:/a:redhat:rhel_eus:8.1::appstream" ]
null
2.5
6.1
null
RHSA-2018:0158
Red Hat Security Advisory: dhcp security update
dhcp: omapi code doesn't free socket descriptors when empty message is received allowing denial-of-service
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
5.3
null
RHSA-2024:11123
Red Hat Security Advisory: gstreamer1-plugins-base security update
gstreamer1-plugins-base: GStreamer has a stack-buffer overflow in vorbis_handle_identification_packet gstreamer1-plugins-base: stack-buffer overflow in gst_opus_dec_parse_header gstreamer1-plugins-base: out-of-bounds write in Ogg demuxer
[ "cpe:/a:redhat:enterprise_linux:9::appstream" ]
null
9.8
null
null
RHSA-2025:3108
Red Hat Security Advisory: pcs security update
python-tornado: Tornado has HTTP cookie parsing DoS vulnerability
[ "cpe:/a:redhat:rhel_eus:9.2::highavailability", "cpe:/a:redhat:rhel_eus:9.2::resilientstorage" ]
null
7.5
null
null
RHSA-2022:0728
Red Hat Security Advisory: OpenShift Logging bug fix and security update (5.2.8)
jackson-dataformat-cbor: Unchecked allocation of byte buffer can cause a java.lang.OutOfMemoryError exception origin-aggregated-logging/elasticsearch: Incomplete fix for netty-codec-http CVE-2021-21409
[ "cpe:/a:redhat:logging:5.2::el8" ]
null
5.9
null
null
RHSA-2023:0944
Red Hat Security Advisory: kernel security update
kernel: stack overflow in do_proc_dointvec and proc_skip_spaces
[ "cpe:/o:redhat:rhel_aus:7.7::server", "cpe:/o:redhat:rhel_e4s:7.7::server", "cpe:/o:redhat:rhel_tus:7.7::server" ]
null
7.8
null
null
RHSA-2004:378
Red Hat Security Advisory: ethereal security update
security flaw security flaw security flaw
[ "cpe:/o:redhat:enterprise_linux:3::as", "cpe:/o:redhat:enterprise_linux:3::desktop", "cpe:/o:redhat:enterprise_linux:3::es", "cpe:/o:redhat:enterprise_linux:3::ws" ]
null
null
null
null
RHSA-2011:1247
Red Hat Security Advisory: rsyslog security update
rsyslog: parseLegacySyslogMsg off-by-two buffer overflow
[ "cpe:/o:redhat:enterprise_linux:6::server" ]
null
null
null
null
RHSA-2007:0519
Red Hat Security Advisory: xorg-x11 security update
security flaw
[ "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws" ]
null
null
null
null
RHSA-2014:0207
Red Hat Security Advisory: rubygems security update
rubygems: version regex algorithmic complexity vulnerability
[ "cpe:/a:redhat:openshift:2.0::el6" ]
null
null
null
null
RHSA-2008:0966
Red Hat Security Advisory: Red Hat Application Stack v2.2 security and enhancement update
mod_proxy_balancer: mod_proxy_balancer CSRF httpd: mod_proxy_http DoS via excessive interim responses from the origin server httpd: mod_proxy_ftp globbing XSS
[ "cpe:/a:redhat:rhel_application_stack:2" ]
null
null
null
null
RHSA-2023:2073
Red Hat Security Advisory: libwebp security update
Mozilla: libwebp: Double-free in libwebp
[ "cpe:/a:redhat:rhel_e4s:8.1::appstream" ]
null
7.5
null
null
RHSA-2021:1609
Red Hat Security Advisory: p11-kit security, bug fix, and enhancement update
p11-kit: integer overflow when allocating memory for arrays or attributes and object identifiers p11-kit: out-of-bounds read in p11_rpc_buffer_get_byte_array function in rpc-message.c p11-kit: out-of-bounds write in p11_rpc_buffer_get_byte_array_value function in rpc-message.c
[ "cpe:/o:redhat:enterprise_linux:8::baseos" ]
null
7.5
null
null
RHSA-2005:061
Red Hat Security Advisory: squid security update
security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw
[ "cpe:/o:redhat:enterprise_linux:3::as", "cpe:/o:redhat:enterprise_linux:3::desktop", "cpe:/o:redhat:enterprise_linux:3::es", "cpe:/o:redhat:enterprise_linux:3::ws" ]
null
null
null
null
RHSA-2015:2360
Red Hat Security Advisory: cups-filters security, bug fix, and enhancement update
cups-filters: texttopdf heap-based buffer overflow cups-filters: texttopdf integer overflow
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
null
null
RHSA-2006:0669
Red Hat Security Advisory: php security update
security flaw security flaw security flaw gd: GIF handling buffer overflow security flaw
[ "cpe:/o:redhat:enterprise_linux:3::as", "cpe:/o:redhat:enterprise_linux:3::desktop", "cpe:/o:redhat:enterprise_linux:3::es", "cpe:/o:redhat:enterprise_linux:3::ws", "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws" ]
null
null
null
null
RHSA-2017:1561
Red Hat Security Advisory: thunderbird security update
Mozilla: Memory safety bugs fixed in Firefox 54 and Firefox ESR 52.2 (MFSA 2017-16) Mozilla: Use-after-free using destroyed node when regenerating trees (MFSA 2017-16) Mozilla: Use-after-free during docshell reloading (MFSA 2017-16) Mozilla: Use-after-free with track elements (MFSA 2017-16) Mozilla: Use-after-free with content viewer listeners (MFSA 2017-16) Mozilla: Use-after-free with IME input (MFSA 2017-16) Mozilla: Out-of-bounds read in WebGL with ImageInfo object (MFSA 2017-16) Mozilla: Use-after-free and use-after-scope logging XHR header errors (MFSA 2017-16) Mozilla: Use-after-free in IndexedDB (MFSA 2017-16) Mozilla: Out-of-bounds read in Opus encoder (MFSA 2017-16) Mozilla: Domain spoofing with combination of Canadian Syllabics and other unicode blocks (MFSA 2017-16) graphite2: out of bounds read in "graphite2::Pass::readPass" graphite2: heap-buffer-overflow write "lz4::decompress" (CVE-2017-7772) graphite2: heap-buffer-overflow write "lz4::decompress" (src/Decompressor) graphite2: out of bounds read "graphite2::Silf::readGraphite" graphite2: assertion error "size() > n" graphite2: heap-buffer-overflow read "graphite2::Silf::getClassGlyph" graphite2: use of uninitialized memory "graphite2::GlyphCache::Loader::read_glyph" Mozilla: Vulnerabilities in the Graphite 2 library (MFSA 2017-16)
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation", "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
9.8
null
RHSA-2023:0975
Red Hat Security Advisory: zlib security update
zlib: A flaw found in zlib when compressing (not decompressing) certain inputs
[ "cpe:/o:redhat:rhel_aus:7.6::server" ]
null
8.2
null
null
RHSA-2017:0934
Red Hat Security Advisory: flash-plugin security update
flash-plugin: multiple code execution issues fixed in APSB17-10 flash-plugin: multiple code execution issues fixed in APSB17-10 flash-plugin: multiple code execution issues fixed in APSB17-10 flash-plugin: multiple code execution issues fixed in APSB17-10 flash-plugin: multiple code execution issues fixed in APSB17-10 flash-plugin: multiple code execution issues fixed in APSB17-10 flash-plugin: multiple code execution issues fixed in APSB17-10
[ "cpe:/a:redhat:rhel_extras:6" ]
null
null
8.8
null
RHSA-2024:9524
Red Hat Security Advisory: libsoup security update
libsoup: HTTP request smuggling via stripping null bytes from the ends of header names
[ "cpe:/a:redhat:rhel_eus:8.8::appstream", "cpe:/o:redhat:rhel_eus:8.8::baseos" ]
null
7.5
null
null
RHSA-2019:3210
Red Hat Security Advisory: thunderbird security update
Mozilla: Use-after-free when creating index updates in IndexedDB Mozilla: Potentially exploitable crash due to 360 Total Security Mozilla: Stack buffer overflow in HKDF output Mozilla: Stack buffer overflow in WebRTC networking Mozilla: Unintended access to a privileged JSONView object Mozilla: document.domain-based origin isolation has same-origin-property violation Mozilla: Incorrect HTML parsing results in XSS bypass technique Mozilla: Memory safety bugs fixed in Firefox 70 and Firefox ESR 68.2 expat: heap-based buffer over-read via crafted XML input
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
6.1
7.5
null
RHSA-2011:1807
Red Hat Security Advisory: jasper security update
jasper: heap buffer overflow flaws lead to arbitrary code execution (CERT VU#887409) jasper: heap buffer overflow flaws lead to arbitrary code execution (CERT VU#887409)
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
null
null
RHSA-2025:2440
Red Hat Security Advisory: OpenShift Container Platform 4.12.74 security and extras update
golang.org/x/net/html: Non-linear parsing of case-insensitive content in golang.org/x/net/html
[ "cpe:/a:redhat:openshift:4.12::el8" ]
null
7.5
null
null
RHSA-2021:2259
Red Hat Security Advisory: nginx:1.18 security update
nginx: Off-by-one in ngx_resolver_copy() when labels are followed by a pointer to a root domain name
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
8.1
null
null
RHSA-2019:2587
Red Hat Security Advisory: CloudForms 4.7.9 security, bug fix and enhancement update
cloudforms: stored cross-site scripting in Name field jquery: Prototype pollution in object's prototype leading to denial of service, remote code execution, or property injection
[ "cpe:/a:redhat:cloudforms_managementengine:5.10::el7" ]
null
null
5.6
null
RHSA-2024:3061
Red Hat Security Advisory: pki-core:10.6 and pki-deps:10.6 security update
jackson-databind: denial of service via a large depth of nested objects
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
7.5
null
null
RHSA-2014:1947
Red Hat Security Advisory: rhevm-log-collector security update
ovirt-engine-log-collector: database password disclosed in process listing
[ "cpe:/a:redhat:rhev_manager:3" ]
null
null
null
null
RHSA-2014:0150
Red Hat Security Advisory: gc security update
gc: malloc() and calloc() overflows
[ "cpe:/a:redhat:network_proxy:5.6::el5" ]
null
null
null
null
RHSA-2020:3344
Red Hat Security Advisory: thunderbird security update
chromium-browser: Use after free in ANGLE chromium-browser: Inappropriate implementation in WebRTC Mozilla: Potential leak of redirect targets when loading scripts in a worker Mozilla: Memory safety bugs fixed in Firefox 79 and Firefox ESR 68.11
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
8.8
8.8
null
RHSA-2024:5638
Red Hat Security Advisory: orc:0.4.31 security update
orc: Stack-based buffer overflow vulnerability in ORC
[ "cpe:/a:redhat:rhel_eus:9.2::appstream" ]
null
6.7
null
null
RHSA-2020:4923
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.3.3 security update
wildfly-openssl: memory leak per HTTP session creation in WildFly OpenSSL
[ "cpe:/a:redhat:jboss_enterprise_application_platform:7.3" ]
null
7.5
null
null
RHSA-2024:0805
Red Hat Security Advisory: dotnet7.0 security update
crypto-js: PBKDF2 1,000 times weaker than specified in 1993 and 1.3M times weaker than current standard dotnet: Denial of Service in SignalR server dotnet: Denial of Service in X509Certificate2
[ "cpe:/a:redhat:enterprise_linux:9::appstream", "cpe:/a:redhat:enterprise_linux:9::crb" ]
null
7.5
null
null
RHSA-2025:1295
Red Hat Security Advisory: buildah security update
podman: buildah: Container breakout by using --jobs=2 and a race condition when building a malicious Containerfile
[ "cpe:/a:redhat:rhel_eus:9.2::appstream" ]
null
8.6
null
null
RHSA-2020:0702
Red Hat Security Advisory: xerces-c security update
xerces-c: XML parser contains a use-after-free error triggered during the scanning of external DTDs
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
8.1
null
null
RHSA-2020:5437
Red Hat Security Advisory: kernel security and bug fix update
kernel: The flow_dissector feature allows device tracking kernel: Buffer over-read in crypto_authenc_extractkeys() when a payload longer than 4 bytes is not aligned. kernel: buffer uses out of index in ext3/4 filesystem kernel: metadata validator in XFS may cause an inode with a valid, user-creatable extended attribute to be flagged as corrupt kernel: umask not applied on filesystem without ACL support kernel: TOCTOU mismatch in the NFS client code kernel: improper input validation in ppp_cp_parse_cr function leads to memory corruption and read overflow
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
7.2
null
null
RHSA-2023:1583
Red Hat Security Advisory: nodejs:18 security, bug fix, and enhancement update
glob-parent: Regular Expression Denial of Service http-cache-semantics: Regular Expression Denial of Service (ReDoS) vulnerability Node.js: Permissions policies can be bypassed via process.mainModule Node.js: OpenSSL error handling issues in nodejs crypto library Node.js: insecure loading of ICU data through ICU_DATA environment variable Node.js: Fetch API did not protect against CRLF injection in host headers Node.js: Regular Expression Denial of Service in Headers fetch API
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
7.5
null
null
RHSA-2024:4972
Red Hat Security Advisory: Errata Advisory for Red Hat OpenShift GitOps v1.11.7 security update
argo-cd: Argo CD web terminal session doesn't expire argocd: Unauthenticated Denial of Service (DoS) Vulnerability via /api/webhook Endpoint in Argo CD
[ "cpe:/a:redhat:openshift_gitops:1.11::el8" ]
null
7.5
null
null
RHSA-2023:5042
Red Hat Security Advisory: flac security update
flac: Remote Code Execution (RCE) via the bitwriter_grow_ function, by supplying crafted input to the encoder
[ "cpe:/a:redhat:rhel_e4s:8.1::appstream" ]
null
7.8
null
null
RHSA-2023:0633
Red Hat Security Advisory: Red Hat OpenShift (Logging Subsystem) security update
Logging Subsystem 5.5.7 - Red Hat OpenShift
[ "cpe:/a:redhat:logging:5.5::el8" ]
null
null
null
null
RHSA-2016:1139
Red Hat Security Advisory: squid security update
squid: buffer overflow in cachemgr.cgi squid: multiple issues in ESI processing squid: multiple issues in ESI processing squid: multiple issues in ESI processing squid: Cache poisoning issue in HTTP Request handling squid: Header Smuggling issue in HTTP Request processing squid: SegFault from ESIInclude::Start squid: SIGSEGV in ESIContext response handling
[ "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
null
null
RHSA-2023:2061
Red Hat Security Advisory: Multicluster Engine for Kubernetes 2.1.6 security updates and bug fixes
http-cache-semantics: Regular Expression Denial of Service (ReDoS) vulnerability
[ "cpe:/a:redhat:multicluster_engine:2.1::el8" ]
null
7.5
null
null
RHSA-2016:1594
Red Hat Security Advisory: python-django security update
django: XSS in admin's add/change related popup
[ "cpe:/a:redhat:openstack-optools:8::el7" ]
null
null
6.1
null
RHSA-2012:0143
Red Hat Security Advisory: xulrunner security update
libpng: Heap buffer overflow in png_decompress_chunk (MFSA 2012-11)
[ "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::client_workstation", "cpe:/o:redhat:enterprise_linux:5::server", "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
null
null
RHSA-2012:0074
Red Hat Security Advisory: jbossweb security update
tomcat: Multiple weaknesses in HTTP DIGEST authentication tomcat: security manager restrictions bypass JBoss Web remote denial of service when surrogate pair character is placed at buffer boundary tomcat: hash table collisions CPU usage DoS (oCERT-2011-003) tomcat: Multiple weaknesses in HTTP DIGEST authentication tomcat: Multiple weaknesses in HTTP DIGEST authentication tomcat: Multiple weaknesses in HTTP DIGEST authentication tomcat: large number of parameters DoS
[ "cpe:/a:redhat:jboss_enterprise_application_platform:5::el4", "cpe:/a:redhat:jboss_enterprise_application_platform:5::el5", "cpe:/a:redhat:jboss_enterprise_application_platform:5::el6" ]
null
null
null
null
RHSA-2020:4379
Red Hat Security Advisory: Red Hat build of Eclipse Vert.x 3.9.4 security update
jackson-databind: FasterXML DOMDeserializer insecure entity expansion is vulnerable to XML external entity (XXE)
[ "cpe:/a:redhat:openshift_application_runtimes:1.0" ]
null
7.5
null
null
RHSA-2003:335
Red Hat Security Advisory: : Updated Net-SNMP packages fix security and other bugs
security flaw
[ "cpe:/o:redhat:linux:8.0", "cpe:/o:redhat:linux:9" ]
null
null
null
null
RHSA-2023:7861
Red Hat Security Advisory: Red Hat build of Keycloak 22.0.7 images enhancement and security update
keycloak: reflected XSS via wildcard in OIDC redirect_uri keycloak: redirect_uri validation bypass
[ "cpe:/a:redhat:build_keycloak:22::el9" ]
null
7.1
null
null
RHSA-2020:0853
Red Hat Security Advisory: zsh security update
zsh: insecure dropping of privileges when unsetting PRIVILEGED option
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
7.8
null
null
RHSA-2023:1919
Red Hat Security Advisory: webkit2gtk3 security update
WebKitGTK: use-after-free leads to arbitrary code execution
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
8.8
null
null
RHSA-2020:2550
Red Hat Security Advisory: libexif security update
libexif: several buffer over-reads in EXIF MakerNote handling can lead to information disclosure and DoS
[ "cpe:/a:redhat:enterprise_linux:8::appstream", "cpe:/a:redhat:enterprise_linux:8::crb" ]
null
9.1
null
null
RHSA-2024:3056
Red Hat Security Advisory: qt5-qtbase security update
qt: incorrect integer overflow check qtbase: potential buffer overflow when reading KTX images
[ "cpe:/a:redhat:enterprise_linux:8::appstream", "cpe:/a:redhat:enterprise_linux:8::crb" ]
null
6.2
null
null
RHSA-2024:4373
Red Hat Security Advisory: virt:rhel and virt-devel:rhel security update
qemu-kvm: 'qemu-img info' leads to host file read/write
[ "cpe:/a:redhat:rhel_aus:8.6::appstream", "cpe:/a:redhat:rhel_e4s:8.6::appstream", "cpe:/a:redhat:rhel_tus:8.6::appstream" ]
null
7.8
null
null
RHSA-2022:5622
Red Hat Security Advisory: container-tools:rhel8 security and bug fix update
psgo: Privilege escalation in 'podman top'
[ "cpe:/a:redhat:rhel_eus:8.4::appstream" ]
null
8
null
null
RHSA-2006:0195
Red Hat Security Advisory: tar security update
tar archive path traversal issue
[ "cpe:/o:redhat:enterprise_linux:3::as", "cpe:/o:redhat:enterprise_linux:3::desktop", "cpe:/o:redhat:enterprise_linux:3::es", "cpe:/o:redhat:enterprise_linux:3::ws" ]
null
null
null
null
RHSA-2025:2026
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 8.0.6 security update
wildfly: Wildfly vulnerable to Cross-Site Scripting (XSS)
[ "cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el9" ]
null
6.1
null
null
RHSA-2014:1143
Red Hat Security Advisory: kernel security and bug fix update
kernel: DoS with syscall auditing
[ "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
RHSA-2023:6595
Red Hat Security Advisory: linux-firmware security, bug fix, and enhancement update
hw: intel: Improper access control for some Intel(R) PROSet/Wireless WiFi hw: intel: Improper input validation in some Intel(R) PROSet/Wireless WiFi hw: intel: Improper input validation in some Intel(R) PROSet/Wireless WiFi hw: intel: Improper access control for some Intel(R) PROSet/Wireless WiFi hw: intel: Protection mechanism failure for some Intel(R) PROSet/Wireless WiFi amd: Return Address Predictor vulnerability leading to information disclosure
[ "cpe:/o:redhat:enterprise_linux:9::baseos" ]
null
5.6
null
null
RHSA-2016:2041
Red Hat Security Advisory: python-django security update
python-django: CSRF protection bypass on a site with Google Analytics
[ "cpe:/a:redhat:openstack:7::el7" ]
null
null
6.1
null
RHSA-2025:2426
Red Hat Security Advisory: pki-core security update
jquery: Untrusted code execution via <option> tag in HTML passed to DOM manipulation methods
[ "cpe:/o:redhat:rhel_aus:7.7::server" ]
null
6.1
null
null
RHSA-2009:0369
Red Hat Security Advisory: java-1.6.0-ibm security update
Java WebStart privilege escalation Java Web Start exposes username and the pathname of the JWS cache Java Web Start BasicService displays local files in the browser Java WebStart allows hidden code privilege escalation OpenJDK UTF-8 decoder accepts non-shortest form sequences (4486841) OpenJDK Font processing vulnerability (6733336) OpenJDK Truetype Font processing vulnerability (6751322) OpenJDK Buffer Overflow in GIF image processing (6766136)
[ "cpe:/a:redhat:rhel_extras:4", "cpe:/a:redhat:rhel_extras:5::client", "cpe:/a:redhat:rhel_extras:5::server" ]
null
null
null
null
RHSA-2024:5884
Red Hat Security Advisory: krb5 security update
krb5: GSS message token handling krb5: GSS message token handling
[ "cpe:/o:redhat:rhel_aus:8.2::baseos" ]
null
6.5
null
null
RHSA-2013:0686
Red Hat Security Advisory: Subscription Asset Manager 1.2.1 update
Candlepin: bootstrap RPM deploys CA certificate file with mode 666 Candlepin: Re-enable manifest signature checking rubygem-rdoc: Cross-site scripting in the documentation created by Darkfish Rdoc HTML generator / template rubygem-rack: Timing attack in cookie sessions rubygem-json: Denial of Service and SQL Injection rubygem-activerecord/rubygem-activemodel: circumvention of attr_protected Katello: Notifications page Username XSS
[ "cpe:/a:rhel_sam:1.2::el6" ]
null
null
null
null
RHSA-2024:5978
Red Hat Security Advisory: linux-firmware security update
hw: amd: SMM Lock Bypass
[ "cpe:/o:redhat:rhel_els:7" ]
null
7.5
null
null
RHSA-2023:4698
Red Hat Security Advisory: kpatch-patch security update
kernel: cls_flower: out-of-bounds write in fl_set_geneve_opt()
[ "cpe:/o:redhat:rhel_e4s:7.7::server" ]
null
7.8
null
null
RHSA-2021:3303
Red Hat Security Advisory: OpenShift Container Platform 4.7.29 bug fix and security update
gogo/protobuf: plugin/unmarshal/unmarshal.go lacks certain index validation
[ "cpe:/a:redhat:openshift:4.7::el8" ]
null
8.6
null
null
RHSA-2024:7164
Red Hat Security Advisory: Migration Toolkit for Containers (MTC) 1.8.4 security and bug fix update
github.com/gin-contrib/cors: Gin mishandles a wildcard in the origin string in github.com/gin-contrib/cors golang: net/http, x/net/http2: unlimited number of CONTINUATION frames causes DoS golang: net/http/cookiejar: incorrect forwarding of sensitive headers and cookies on HTTP redirect containers/image: digest type does not guarantee valid type braces: fails to limit the number of characters it can handle golang: net: malformed DNS message can cause infinite loop jose-go: improper handling of highly compressed data follow-redirects: Possible credential leak node-tar: denial of service while parsing a tar file due to lack of folders depth validation moby: external DNS requests from 'internal' networks could lead to data exfiltration express: cause malformed URLs to be evaluated webpack-dev-middleware: lack of URL validation may lead to file leak axios: axios: Server-Side Request Forgery
[ "cpe:/a:redhat:rhmt:1.8::el8" ]
null
7.5
null
null
RHSA-2021:5045
Red Hat Security Advisory: thunderbird security update
Mozilla: Memory safety bugs fixed in Firefox 95 and Firefox ESR 91.4 Mozilla: JavaScript unexpectedly enabled for the composition area Mozilla: URL leakage when navigating while executing asynchronous function Mozilla: Heap buffer overflow when using structured clone Mozilla: Missing fullscreen and pointer lock notification when requesting both Mozilla: GC rooting failure when calling wasm instance methods Mozilla: External protocol handler parameters were unescaped Mozilla: XMLHttpRequest error codes could have leaked the existence of an external protocol handler Mozilla: Bypass of CSP sandbox directive when embedding Mozilla: Denial of Service when using the Location API in a loop Mozilla: Cursor spoofing could overlay user interface when native cursor is zoomed
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
5.4
6.1
null
RHSA-2022:1437
Red Hat Security Advisory: OpenJDK 17.0.3 security update for Windows Builds
OpenJDK: Unbounded memory allocation when compiling crafted XPath expressions (JAXP, 8270504) OpenJDK: Improper object-to-string conversion in AnnotationInvocationHandler (Libraries, 8277672) OpenJDK: Missing check for negative ObjectIdentifier (Libraries, 8275151) OpenJDK: Improper ECDSA signature verification (Libraries, 8277233) OpenJDK: Defective secure validation in Apache Santuario (Libraries, 8278008) OpenJDK: URI parsing inconsistencies (JNDI, 8278972)
[ "cpe:/a:redhat:openjdk:17::windows" ]
null
5.3
null
null
RHSA-2025:1347
Red Hat Security Advisory: kernel security update
kernel: media: uvcvideo: Skip parsing frames of type UVC_VS_UNDEFINED in uvc_parse_format
[ "cpe:/o:redhat:rhel_els:6" ]
null
7.3
null
null
RHSA-2019:2863
Red Hat Security Advisory: kernel security update
kernel: vhost-net: guest to host kernel escape during migration
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
7.2
null
RHEA-2018:0705
Red Hat Enhancement Advisory: tcpdump bug fix and enhancement update
tcpdump: Heap buffer overflow in the EXTRACT_16BITS function tcpdump: heap-based buffer over-read in the lldp_print tcpdump: heap-based buffer over-read in the pimv1_print tcpdump: buffer overflow in the sliplink_print function tcpdump: Segmentation Violation in the compressed_sl_print tcpdump: Buffer over-read in smbutil.c:name_len() in SMB/CIFS parser tcpdump: Buffer over-read in addrtoname.c:lookup_bytestring() tcpdump: Buffer over-read in print-icmp.c:icmp_print() in ICMP parser tcpdump: Buffer over-read in print-isakmp.c:isakmp_rfc3948_print() in ISAKMP parser tcpdump: Buffer over-read in print-isoclns.c:isoclns_print() in ISO CLNS parser tcpdump: Buffer over-read in print-nfs.c:interp_reply() in NFS parser tcpdump: Buffer over-read in print-decnet.c:decnet_print() in DECnet parser tcpdump: Buffer over-read in util-print.c:tok2strbuf() tcpdump: Buffer over-read in print-eigrp.c:eigrp_print() in EIGRP parser tcpdump: Buffer over-read in print-zephyr.c, several functions in Zephyr parser tcpdump: Buffer over-read in print-ip6.c:ip6_print() in IPv6 parser tcpdump: Buffer over-read in print-rt6.c:rt6_print() in IPv6 routing header parser tcpdump: Buffer over-read in print-802_11.c:parse_elements() in IEEE 802.11 parser tcpdump: Buffer over-read in print-telnet.c:telnet_parse() in telnet parser tcpdump: Infinite loop due to a bug in print-resp.c:resp_get_length() in RESP parser tcpdump: Infinite loop due to bugs in print-isakmp.c, several functions in ISAKMP parser tcpdump: Buffer over-read in print-bgp.c:bgp_attr_print() in BGP parser tcpdump: Buffer over-read in print-ripng.c:ripng_print() in RIPng parser tcpdump: Buffer over-read in print-juniper.c, several functions in Juniper protocols parser tcpdump: Buffer over-read in print-bgp.c:bgp_attr_print() in BGP parser tcpdump: Infinite loop due to a bug in print-domain.c:ns_print() in DNS parser tcpdump: Buffer over-read in print-pim.c:pimv2_print() in PIMv2 parser tcpdump: Infinite loop due to a bug in print-lldp.c:lldp_private_8021_print() in LLDP parser tcpdump: Buffer over-read in print-isoclns.c:isis_print_extd_ip_reach() in IS-IS parser tcpdump: Buffer over-read in print-isoclns.c:isis_print() in IS-IS parser tcpdump: Buffer over-read in print-802_15_4.c:ieee802_15_4_if_print() in IEEE 802.15.4 parser tcpdump: Buffer over-read in print-nfs.c:nfs_printfh() in NFS parser tcpdump: Buffer over-read in print-aodv.c:aodv_extension() in AODV parser tcpdump: Buffer over-read in print-lmp.c:lmp_print() in LMP parser tcpdump: Buffer over-read in print-juniper.c:juniper_parse_header() in Juniper protocols parser tcpdump: Buffer over-read in print-nfs.c:xid_map_enter() in NFS parser tcpdump: Buffer over-read in print-l2tp.c, several functions in L2TP parser tcpdump: Buffer over-read in print-pktap.c:pktap_if_print() in Apple PKTAP parser tcpdump: Buffer over-read in print-802_11.c:parse_elements() in IEEE 802.11 parser tcpdump: Buffer over-read in print-mobility.c:mobility_print() in IPv6 mobility parser tcpdump: Buffer over-read in print-beep.c:l_strnstart() in BEEP parser tcpdump: Buffer overflow in util-print.c:bittok2str_internal() tcpdump: Buffer over-read in print-icmp.c:icmp_print() in ICMP parser tcpdump: Buffer over-read in print-arp.c, several functions in ARP parser tcpdump: Buffer over-read in print-wb.c:wb_prep(), several functions in White Board protocol parser tcpdump: Buffer over-read in print-eap.c:eap_print() in EAP parser tcpdump: Buffer over-read in print-isoclns.c:esis_print() in ISO ES-IS parser tcpdump: Buffer over-read in print-dhcp6.c:dhcp6opt_print() in DHCPv6 parser tcpdump: Buffer over-read in print-pgm.c:pgm_print() in PGM parser tcpdump: Buffer over-read in print-pgm.c:pgm_print() in PGM parser tcpdump: Buffer over-read in print-vtp.c:vtp_print() in VTP parser tcpdump: Buffer over-read in print-icmp6.c:icmp6_print() in ICMPv6 parser tcpdump: Buffer over-read in print-ip.c:ip_printroute() in IP parser tcpdump: Buffer over-read in print-mobility.c:mobility_opt_print() in IPv6 mobility parser tcpdump: Buffer over-read in print-mobility.c:mobility_opt_print() in IPv6 mobility parser tcpdump: Buffer over-read in print-mobility.c:mobility_opt_print() in IPv6 mobility parser tcpdump: Buffer over-read in print-isoclns.c, several functions in ISO IS-IS parser tcpdump: Buffer over-read in print-lldp.c:lldp_mgmt_addr_tlv_print() in LLDP parser tcpdump: Buffer over-read in print-bootp.c:bootp_print() in BOOTP parser tcpdump: Buffer over-read in print-ppp.c:print_ccp_config_options() in PPP parser tcpdump: Buffer over-read in print-pim.c, several functions in PIM parser tcpdump: Buffer over-read in print-frag6.c:frag6_print() in IPv6 fragmentation header parser tcpdump: Buffer over-read in print-radius.c:print_attr_string() in RADIUS parser tcpdump: Buffer over-read in print-vtp.c:vtp_print() in VTP parser tcpdump: Buffer over-read in print-pgm.c:pgm_print() in PGM parser tcpdump: Buffer over-read in print-isoclns.c:isis_print_id() in ISO IS-IS parser tcpdump: Buffer over-read in print-ospf6.c:ospf6_decode_v3() in OSPFv3 parser tcpdump: Buffer over-read in print-ip.c:ip_printts() in IP parser tcpdump: Buffer over-read in print-ppp.c:handle_mlppp() in PPP parser tcpdump: Buffer over-read in print-isakmp.c, several functions in ISAKMP parser tcpdump: Buffer over-read in print-mptcp.c, several functions in MPTCP parser tcpdump: Buffer over-read in print-icmp6.c:icmp6_nodeinfo_print() in ICMPv6 parser tcpdump: Buffer over-read in print-hncp.c:dhcpv6_print() in HNCP parser tcpdump: Buffer over-read in print-bgp.c:decode_multicast_vpn() in BGP parser tcpdump: Buffer over-read in print-hncp.c:dhcpv4_print() in HNCP parser tcpdump: Buffer over-read in print-vqp.c:vqp_print() in VQP parser tcpdump: Buffer over-read in print-bgp.c:bgp_attr_print() in BGP parser tcpdump: Buffer over-read in print-isoclns.c:esis_print() in ISO ES-IS parser tcpdump: Buffer over-read in print-rsvp.c:rsvp_obj_print() in RSVP parser tcpdump: Buffer over-read in print-rx.c:ubik_print() in Rx protocol parser tcpdump: Buffer over-read in print-rpki-rtr.c:rpki_rtr_pdu_print() in RPKI-Router parser tcpdump: Buffer over-read in print-rsvp.c:rsvp_obj_print() in RSVP parser tcpdump: Buffer over-read in print-cfm.c:cfm_print() in CFM parser tcpdump: Buffer over-read in print-bgp.c:decode_rt_routing_info() in BGP parser tcpdump: Buffer over-read in print-lldp.c:lldp_private_8023_print() in LLDP parser tcpdump: Buffer over-read in print-isoclns.c:isis_print_is_reach_subtlv() in ISO IS-IS parser tcpdump: Buffer over-read in print-chdlc.c:chdlc_print() in Cisco HDLC parser tcpdump: Buffer over-read in print-olsr.c:olsr_print() in OLSR parser tcpdump: Buffer over-read in print-isakmp.c:ikev1_id_print() in IKEv1 parser tcpdump: Buffer over-read in print-isakmp.c, several functions in IKEv2 parser tcpdump: Buffer over-read in print-rt6.c:rt6_print() in IPv6 routing header parser
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
6.5
null
RHSA-2022:7186
Red Hat Security Advisory: device-mapper-multipath security update
device-mapper-multipath: Authorization bypass, multipathd daemon listens for client connections on an abstract Unix socket
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
7.8
null
null
RHSA-2020:1527
Red Hat Security Advisory: OpenShift Container Platform 4.2.29 openshift security update
kubernetes: Use of unbounded 'client' label in apiserver_request_total allows for memory exhaustion
[ "cpe:/a:redhat:openshift:4.2::el7", "cpe:/a:redhat:openshift:4.2::el8" ]
null
4.3
null
null
RHSA-2023:3450
Red Hat Security Advisory: OpenShift Serverless Client kn 1.29.0 release
golang.org/x/net/http2: avoid quadratic complexity in HPACK decoding golang: crypto/tls: large handshake records may cause panics golang: net/http, mime/multipart: denial of service from excessive resource consumption golang: net/http, net/textproto: denial of service from excessive memory allocation golang: net/http, net/textproto, mime/multipart: denial of service from excessive resource consumption golang: go/parser: Infinite loop in parsing golang: html/template: backticks not treated as string delimiters containerd: Supplementary groups are not set up properly
[ "cpe:/a:redhat:serverless:1.0::el8" ]
null
7.3
null
null