id
stringlengths 13
15
| title
stringlengths 29
176
| description
stringlengths 8
32.1k
| cpes
listlengths 0
20
| cvss_v4_0
null | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
null |
---|---|---|---|---|---|---|---|
RHSA-2021:0548
|
Red Hat Security Advisory: nodejs:10 security update
|
nodejs-yargs-parser: prototype pollution vulnerability nodejs-npm-user-validate: improper input validation when validating user emails leads to ReDoS nodejs-y18n: prototype pollution vulnerability nodejs-ini: Prototype pollution via malicious INI file nodejs-dot-prop: prototype pollution libuv: buffer overflow in realpath nodejs: use-after-free in the TLS implementation nodejs: HTTP request smuggling via two copies of a header field in an http request npm: sensitive information exposure through logs nodejs-ajv: prototype pollution via crafted JSON schema in ajv.validate function
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 5.6 | 4.3 | null |
RHSA-2015:1929
|
Red Hat Security Advisory: openstack-ironic-discoverd security update
|
openstack-ironic-discoverd: potential remote code execution with debug mode enabled
|
[
"cpe:/a:redhat:openstack-director:7::el7"
] | null | null | null | null |
RHSA-2024:0729
|
Red Hat Security Advisory: Red Hat Advanced Cluster Management 2.7.11 security and bug fix container update
|
go-git: Maliciously crafted Git server replies can cause DoS on go-git clients go-git: Maliciously crafted Git server replies can lead to path traversal and RCE on go-git clients
|
[
"cpe:/a:redhat:acm:2.7::el8"
] | null | 8.1 | null | null |
RHSA-2023:7739
|
Red Hat Security Advisory: tracker-miners security update
|
tracker-miners: sandbox escape
|
[
"cpe:/a:redhat:rhel_aus:8.4::appstream",
"cpe:/a:redhat:rhel_e4s:8.4::appstream",
"cpe:/a:redhat:rhel_tus:8.4::appstream"
] | null | 7.5 | null | null |
RHSA-2024:2731
|
Red Hat Security Advisory: Red Hat OpenStack Platform 17.1 (python-django) security update
|
Django: denial-of-service in ``intcomma`` template filter
|
[
"cpe:/a:redhat:openstack:17.1::el9"
] | null | 7.5 | null | null |
RHSA-2023:0016
|
Red Hat Security Advisory: webkit2gtk3 security update
|
webkitgtk: processing maliciously crafted web content may lead to an arbitrary code execution
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 8.8 | null | null |
RHSA-2025:0845
|
Red Hat Security Advisory: git-lfs security update
|
git-lfs: Git LFS permits exfiltration of credentials via crafted HTTP URLs
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 8.1 | null | null |
RHSA-2024:8688
|
Red Hat Security Advisory: OpenShift Container Platform 4.13.53 bug fix and security update
|
golang-github-gin-gonic-gin: Improper Input Validation golang: net/http, x/net/http2: unlimited number of CONTINUATION frames causes DoS net/http: Denial of service due to improper 100-continue handling in net/http go/parser: golang: Calling any of the Parse functions containing deeply nested literals can cause a panic/stack exhaustion encoding/gob: golang: Calling Decoder.Decode on a message which contains deeply nested structures can cause a panic due to stack exhaustion go/build/constraint: golang: Calling Parse on a "// +build" build tag line with deeply nested expressions can cause a panic due to stack exhaustion
|
[
"cpe:/a:redhat:openshift:4.13::el8",
"cpe:/a:redhat:openshift:4.13::el9"
] | null | 5.9 | null | null |
RHSA-2020:4252
|
Red Hat Security Advisory: Red Hat build of Quarkus 1.7.5 release and security update
|
hibernate: SQL injection issue in Hibernate ORM keycloak: Lack of checks in ObjectInputStream leading to Remote Code Execution keycloak: security headers missing on REST endpoints hibernate-validator: Improper input validation in the interpolation of constraint error messages netty: compression/decompression codecs don't enforce limits on buffer allocation sizes
|
[
"cpe:/a:redhat:openshift_application_runtimes:1.0"
] | null | 7.5 | 7.5 | null |
RHSA-2024:1041
|
Red Hat Security Advisory: go-toolset-1.19-golang security update
|
golang: net/http/internal: Denial of Service (DoS) via Resource Consumption via HTTP requests golang: cmd/go: Protocol Fallback when fetching modules
|
[
"cpe:/a:redhat:devtools:2023::el7"
] | null | 7.5 | null | null |
RHSA-2021:2351
|
Red Hat Security Advisory: .NET 5.0 on RHEL 7 security and bugfix update
|
dotnet: ASP.NET Core Client Disconnect Denial of Service
|
[
"cpe:/a:redhat:rhel_dotnet:5.0::el7"
] | null | 5.9 | null | null |
RHBA-2024:1775
|
Red Hat Bug Fix Advisory: Multicluster Engine for Kubernetes 2.5.2 bug fixes and container updates
|
sanitize-html: Information Exposure when used on the backend jose: resource exhaustion
|
[
"cpe:/a:redhat:multicluster_engine:2.5::el8"
] | null | 5.3 | null | null |
RHSA-2022:9076
|
Red Hat Security Advisory: thunderbird security update
|
Mozilla: Quoting from an HTML email with certain tags will trigger network requests and load remote content, regardless of a configuration to block remote content Mozilla: Arbitrary file read from a compromised content process Mozilla: Drag and Dropped Filenames could have been truncated to malicious extensions Mozilla: Memory safety bugs fixed in Firefox ESR 102.6 and Thunderbird 102.6 Mozilla: Use-after-free in WebGL Mozilla: Memory corruption in WebGL Mozilla: Use-after-free in WebGL
|
[
"cpe:/a:redhat:rhel_aus:8.2::appstream",
"cpe:/a:redhat:rhel_e4s:8.2::appstream",
"cpe:/a:redhat:rhel_tus:8.2::appstream"
] | null | 8.1 | null | null |
RHSA-2024:3826
|
Red Hat Security Advisory: podman security and bug fix update
|
golang: net/http: golang: mime/multipart: golang: net/textproto: memory exhaustion in Request.ParseMultipartForm jose: resource exhaustion jose-go: improper handling of highly compressed data
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 4.3 | null | null |
RHSA-2005:575
|
Red Hat Security Advisory: Adobe Acrobat Reader security update
|
security flaw security flaw
|
[
"cpe:/a:redhat:rhel_extras:3",
"cpe:/a:redhat:rhel_extras:4"
] | null | null | null | null |
RHSA-2014:1974
|
Red Hat Security Advisory: rpm security update
|
rpm: race condition during the installation process
|
[
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server",
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2023:7438
|
Red Hat Security Advisory: Red Hat OpenStack Platform 17.1.1 (python-gevent) security update
|
python-gevent: privilege escalation via a crafted script to the WSGIServer component
|
[
"cpe:/a:redhat:openstack:17.1::el9"
] | null | 9.1 | null | null |
RHSA-2024:8728
|
Red Hat Security Advisory: thunderbird security update
|
firefox: thunderbird: Permission leak via embed or object elements firefox: thunderbird: Use-after-free in layout with accessibility firefox: thunderbird: Confusing display of origin for external protocol handler prompt firefox: thunderbird: XSS due to Content-Disposition being ignored in multipart/x-mixed-replace response firefox: thunderbird: Origin of permission prompt could be spoofed by long URL firefox: thunderbird: Cross origin video frame leak firefox: thunderbird: History interface could have been used to cause a Denial of Service condition in the browser firefox: thunderbird: Clipboard "paste" button persisted across tabs firefox: DOM push subscription message could hang Firefox firefox: thunderbird: Memory safety bugs fixed in Firefox 132, Thunderbird 132, Firefox ESR 128.4, and Thunderbird 128.4
|
[
"cpe:/a:redhat:rhel_eus:9.2::appstream"
] | null | 8.8 | null | null |
RHSA-2018:1196
|
Red Hat Security Advisory: kernel security and bug fix update
|
hw: cpu: speculative execution branch target injection
|
[
"cpe:/o:redhat:rhel_els:5"
] | null | null | 5.6 | null |
RHSA-2016:0370
|
Red Hat Security Advisory: nss-util security update
|
nss: Heap buffer overflow vulnerability in ASN1 certificate parsing (MFSA 2016-35)
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation",
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | null | null |
RHSA-2023:1672
|
Red Hat Security Advisory: httpd:2.4 security update
|
httpd: HTTP request splitting with mod_rewrite and mod_proxy
|
[
"cpe:/a:redhat:rhel_aus:8.2::appstream",
"cpe:/a:redhat:rhel_e4s:8.2::appstream",
"cpe:/a:redhat:rhel_tus:8.2::appstream"
] | null | 9.8 | null | null |
RHSA-2019:3390
|
Red Hat Security Advisory: qt5-qtbase security and bug fix update
|
qt5-qtbase: Double free in QXmlStreamReader qt5-qtbase: QImage allocation failure in qgifhandler qt5-qtbase: QBmpHandler segmentation fault on malformed BMP file
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb"
] | null | null | 3.3 | null |
RHSA-2010:0945
|
Red Hat Security Advisory: quagga security update
|
(bgpd): Stack buffer overflow by processing certain Route-Refresh messages (bgpd): DoS (crash) while processing certain BGP update AS path messages
|
[
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2023:5993
|
Red Hat Security Advisory: python27:2.7 security update
|
python: TLS handshake bypass
|
[
"cpe:/a:redhat:rhel_eus:8.6::appstream"
] | null | 8.6 | null | null |
RHSA-2014:1082
|
Red Hat Security Advisory: thermostat1-httpcomponents-client security update
|
CXF: SSL hostname verification bypass, incomplete CVE-2012-6153 fix
|
[
"cpe:/a:redhat:rhel_software_collections:1::el6"
] | null | null | 4.8 | null |
RHSA-2023:1016
|
Red Hat Security Advisory: Red Hat OpenStack Platform 17.0 (openstack-cinder) security update
|
openstack: Arbitrary file access through custom VMDK flat descriptor
|
[
"cpe:/a:redhat:openstack:17.0::el9"
] | null | 7.7 | null | null |
RHSA-2022:1662
|
Red Hat Security Advisory: rh-maven36-maven-shared-utils security update
|
maven-shared-utils: Command injection via Commandline class
|
[
"cpe:/a:redhat:rhel_software_collections:3::el7"
] | null | 9.8 | null | null |
RHSA-2024:8793
|
Red Hat Security Advisory: thunderbird security update
|
firefox: thunderbird: Permission leak via embed or object elements firefox: thunderbird: Use-after-free in layout with accessibility firefox: thunderbird: Confusing display of origin for external protocol handler prompt firefox: thunderbird: XSS due to Content-Disposition being ignored in multipart/x-mixed-replace response firefox: thunderbird: Origin of permission prompt could be spoofed by long URL firefox: thunderbird: Cross origin video frame leak firefox: thunderbird: History interface could have been used to cause a Denial of Service condition in the browser firefox: thunderbird: Clipboard "paste" button persisted across tabs firefox: DOM push subscription message could hang Firefox firefox: thunderbird: Memory safety bugs fixed in Firefox 132, Thunderbird 132, Firefox ESR 128.4, and Thunderbird 128.4
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 8.8 | null | null |
RHSA-2020:4285
|
Red Hat Security Advisory: rh-python36 security, bug fix, and enhancement update
|
python: XSS vulnerability in the documentation XML-RPC server in server_title field python: CRLF injection via the host part of the url passed to urlopen() python: infinite loop in the tarfile module via crafted TAR archive python-pip: directory traversal in _download_http_url() function in src/pip/_internal/download.py python: wrong backtracking in urllib.request.AbstractBasicAuthHandler allows for a ReDoS python: DoS via inefficiency in IPv{4,6}Interface classes python: CRLF injection via HTTP request method in httplib/http.client
|
[
"cpe:/a:redhat:rhel_software_collections:3::el6",
"cpe:/a:redhat:rhel_software_collections:3::el7"
] | null | 6.5 | 6.5 | null |
RHSA-2024:1417
|
Red Hat Security Advisory: libX11 security update
|
libX11: InitExt.c can overwrite unintended portions of the Display structure if the extension request leads to a buffer overflow
|
[
"cpe:/a:redhat:rhel_eus:8.8::appstream"
] | null | 7.3 | null | null |
RHSA-2021:3020
|
Red Hat Security Advisory: ruby:2.7 security update
|
rubygem-bundler: Dependencies of gems with explicit source may be installed from a different source rubygem-rdoc: Command injection vulnerability in RDoc ruby: FTP PASV command response can cause Net::FTP to connect to arbitrary host ruby: StartTLS stripping vulnerability in Net::IMAP
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 7.4 | null | null |
RHSA-2007:0540
|
Red Hat Security Advisory: openssh security and bug fix update
|
Kerberos information leak audit logging of failed logins
|
[
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2022:5806
|
Red Hat Security Advisory: kernel security update
|
kernel: race condition in perf_event_open leads to privilege escalation kernel: a use-after-free write in the netfilter subsystem can lead to privilege escalation to root
|
[
"cpe:/o:redhat:rhel_aus:7.3::server"
] | null | 7.8 | null | null |
RHSA-2023:4412
|
Red Hat Security Advisory: openssh security update
|
openssh: Remote code execution in ssh-agent PKCS#11 support
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/o:redhat:enterprise_linux:9::baseos"
] | null | 9.8 | null | null |
RHSA-2007:0066
|
Red Hat Security Advisory: wireshark security update
|
Multiple Wireshark issues (CVE-2007-0457, CVE-2007-0458, CVE-2007-0459) Multiple Wireshark issues (CVE-2007-0457, CVE-2007-0458, CVE-2007-0459) Multiple Wireshark issues (CVE-2007-0457, CVE-2007-0458, CVE-2007-0459) Multiple Wireshark issues (CVE-2007-0457, CVE-2007-0458, CVE-2007-0459)
|
[
"cpe:/o:redhat:enterprise_linux:2.1::as",
"cpe:/o:redhat:enterprise_linux:2.1::aw",
"cpe:/o:redhat:enterprise_linux:2.1::es",
"cpe:/o:redhat:enterprise_linux:2.1::ws",
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws",
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws",
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2024:1004
|
Red Hat Security Advisory: edk2 security update
|
edk2: Buffer overflow in the DHCPv6 client via a long Server ID option
|
[
"cpe:/a:redhat:rhel_aus:8.2::appstream",
"cpe:/a:redhat:rhel_e4s:8.2::appstream",
"cpe:/a:redhat:rhel_tus:8.2::appstream"
] | null | 8.8 | null | null |
RHSA-2013:1024
|
Red Hat Security Advisory: Red Hat Enterprise MRG Messaging 2.3.3 security update
|
python-qpid: client does not validate qpid server TLS/SSL certificate
|
[
"cpe:/a:redhat:enterprise_mrg:2:computenode:el6",
"cpe:/a:redhat:enterprise_mrg:2:server:el6"
] | null | null | null | null |
RHSA-2020:3386
|
Red Hat Security Advisory: java-1.8.0-ibm security update
|
JDK: Information disclosure via calls to System.arraycopy() with invalid length OpenJDK: Improper checks of SASL message properties in GssKrb5Base (Security, 8226352) OpenJDK: Use of unsafe RSA-MD5 checksum in Kerberos TGS (Security, 8229951) OpenJDK: Incorrect handling of access control context in ForkJoinPool (Libraries, 8237117) OpenJDK: HostnameChecker does not ensure X.509 certificate names are in normalized form (JSSE, 8237592) OpenJDK: Unexpected exception raised by DerInputStream (Libraries, 8237731) OpenJDK: Unexpected exception raised by DerValue.equals() (Libraries, 8237736) OpenJDK: Bypass of boundary checks in nio.Buffer via concurrent access (Libraries, 8238920) OpenJDK: Incomplete bounds checks in Affine Transformations (2D, 8240119) OpenJDK: XML validation manipulation due to incomplete application of the use-grammar-pool-only feature (JAXP, 8242136)
|
[
"cpe:/a:redhat:enterprise_linux:8::supplementary"
] | null | 5.3 | null | null |
RHSA-2013:1457
|
Red Hat Security Advisory: libgcrypt security update
|
GnuPG susceptible to Yarom/Falkner flush+reload cache side-channel attack
|
[
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server",
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2008:1028
|
Red Hat Security Advisory: cups security update
|
cups: Incomplete fix for CVE-2008-1722
|
[
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws"
] | null | null | null | null |
RHSA-2023:7218
|
Red Hat Security Advisory: Kernel Module Management security update
|
HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack)
|
[
"cpe:/a:redhat:kernel_module_management:1.1::el9"
] | null | 7.5 | null | null |
RHSA-2024:5406
|
Red Hat Security Advisory: Red Hat Product OCP Tools 4.13 OpenShift Jenkins security update
|
jenkins: Arbitrary file read vulnerability through agent connections can lead to RCE
|
[
"cpe:/a:redhat:ocp_tools:4.13::el8"
] | null | 8.8 | null | null |
RHSA-2022:9073
|
Red Hat Security Advisory: nodejs:16 security, bug fix, and enhancement update
|
nodejs: Improper handling of URI Subject Alternative Names nodejs: Certificate Verification Bypass via String Injection nodejs: Incorrect handling of certificate subject and issuer fields minimist: prototype pollution nodejs-minimatch: ReDoS via the braceExpand function nodejs: Prototype pollution via console.table properties nodejs: DNS rebinding in inspect via invalid octal IP address
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 7.5 | null | null |
RHSA-2024:8790
|
Red Hat Security Advisory: thunderbird security update
|
firefox: thunderbird: Permission leak via embed or object elements firefox: thunderbird: Use-after-free in layout with accessibility firefox: thunderbird: Confusing display of origin for external protocol handler prompt firefox: thunderbird: XSS due to Content-Disposition being ignored in multipart/x-mixed-replace response firefox: thunderbird: Origin of permission prompt could be spoofed by long URL firefox: thunderbird: Cross origin video frame leak firefox: thunderbird: History interface could have been used to cause a Denial of Service condition in the browser firefox: thunderbird: Clipboard "paste" button persisted across tabs firefox: DOM push subscription message could hang Firefox firefox: thunderbird: Memory safety bugs fixed in Firefox 132, Thunderbird 132, Firefox ESR 128.4, and Thunderbird 128.4
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 8.8 | null | null |
RHSA-2018:0035
|
Red Hat Security Advisory: microcode_ctl security update
|
An update for microcode_ctl is now available for Red Hat Enterprise Linux 7.2 Advanced Update Support, Red Hat Enterprise Linux 7.2 Telco Extended Update Support, and Red Hat Enterprise Linux 7.2 Update Services for SAP Solutions.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
|
[
"cpe:/o:redhat:rhel_aus:7.2::server",
"cpe:/o:redhat:rhel_e4s:7.2::server",
"cpe:/o:redhat:rhel_tus:7.2::server"
] | null | null | null | null |
RHSA-2023:1594
|
Red Hat Security Advisory: tigervnc and xorg-x11-server security update
|
xorg-x11-server: X.Org Server Overlay Window Use-After-Free Local Privilege Escalation Vulnerability
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 7.8 | null | null |
RHSA-2021:1353
|
Red Hat Security Advisory: thunderbird security update
|
Mozilla: More internal network hosts could have been probed by a malicious webpage Mozilla: Out of bound write due to lazy initialization Mozilla: Use-after-free in Responsive Design Mode Mozilla: Secure Lock icon could have been spoofed Mozilla: Blob URLs may have been granted additional privileges Mozilla: Arbitrary FTP command execution on FTP servers using an encoded URL Mozilla: Incorrect size computation in WebAssembly JIT could lead to null-reads Mozilla: Port blocking could be bypassed Mozilla: Race condition when reading from disk while verifying signatures
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 2.5 | 6.1 | null |
RHSA-2020:2667
|
Red Hat Security Advisory: kernel security and bug fix update
|
kernel: use-after-free in block/bfq-iosched.c related to bfq_idle_slice_timer_body
|
[
"cpe:/a:redhat:rhel_eus:8.1::crb",
"cpe:/o:redhat:rhel_eus:8.1::baseos"
] | null | 7 | null | null |
RHSA-2023:5252
|
Red Hat Security Advisory: dmidecode security update
|
dmidecode: dump-bin to overwrite a local file
|
[
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 7.1 | null | null |
RHSA-2018:0094
|
Red Hat Security Advisory: linux-firmware security update
|
An update for linux-firmware is now available for Red Hat Enterprise Linux 7, Red Hat Enterprise Linux 7.2 Advanced Update Support, Red Hat Enterprise Linux 7.2 Telco Extended Update Support, Red Hat Enterprise Linux 7.2 Update Services for SAP Solutions, and Red Hat Enterprise Linux 7.3 Extended Update Support.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation",
"cpe:/o:redhat:rhel_aus:7.2::server",
"cpe:/o:redhat:rhel_e4s:7.2::server",
"cpe:/o:redhat:rhel_eus:7.3::computenode",
"cpe:/o:redhat:rhel_eus:7.3::server",
"cpe:/o:redhat:rhel_tus:7.2::server"
] | null | null | null | null |
RHSA-2024:5337
|
Red Hat Security Advisory: .NET 8.0 security update
|
dotnet8.0: Information disclosure vulnerability in TlsStream
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb"
] | null | 6.5 | null | null |
RHSA-2024:9637
|
Red Hat Security Advisory: webkit2gtk3 security update
|
webkitgtk: webkit2gtk: Processing maliciously crafted web content may lead to an unexpected process crash webkitgtk: webkit2gtk: Processing maliciously crafted web content may lead to an unexpected process crash
|
[
"cpe:/a:redhat:rhel_e4s:9.0::appstream"
] | null | 4.3 | null | null |
RHSA-2023:1889
|
Red Hat Security Advisory: java-11-openjdk security update
|
OpenJDK: improper connection handling during TLS handshake (8294474) OpenJDK: missing string checks for NULL characters (8296622) OpenJDK: incorrect handling of NULL characters in ProcessBuilder (8295304) OpenJDK: Swing HTML parsing issue (8296832) OpenJDK: incorrect enqueue of references in garbage collector (8298191) OpenJDK: certificate validation issue in TLS session negotiation (8298310) OpenJDK: missing check for slash characters in URI-to-path conversion (8298667)
|
[
"cpe:/a:redhat:rhel_eus:8.4::appstream",
"cpe:/a:redhat:rhel_eus:8.4::crb"
] | null | 3.7 | null | null |
RHSA-2008:0288
|
Red Hat Security Advisory: samba security update
|
Samba client buffer overflow
|
[
"cpe:/o:redhat:enterprise_linux:2.1::as",
"cpe:/o:redhat:enterprise_linux:2.1::aw",
"cpe:/o:redhat:enterprise_linux:2.1::es",
"cpe:/o:redhat:enterprise_linux:2.1::ws",
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws",
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2025:3827
|
Red Hat Security Advisory: kernel security update
|
kernel: ALSA: usb-audio: Fix out of bounds reads when finding clock sources
|
[
"cpe:/o:redhat:rhel_aus:8.6::baseos",
"cpe:/o:redhat:rhel_e4s:8.6::baseos",
"cpe:/o:redhat:rhel_tus:8.6::baseos"
] | null | 7.1 | null | null |
RHSA-2024:5673
|
Red Hat Security Advisory: kernel-rt security update
|
kernel: efivarfs: force RO when remounting if SetVariable is not supported kernel: bpf, sockmap: Don't let sock_map_{close,destroy,unhash} call itself kernel: igc: avoid returning frame twice in XDP_REDIRECT kernel: mm/hugetlb: fix missing hugetlb_lock for resv uncharge kernel: net: fix out-of-bounds access in ops_init kernel: net/mlx5e: Fix netif state handling kernel: net/sched: act_api: fix possible infinite loop in tcf_idr_check_alloc() kernel: NFSv4: Fix memory leak in nfs4_set_security_label kernel: virtio-net: tap: mlx5_core short frame denial of service kernel: virtio-net: tun: mlx5_core short frame denial of service kernel: ice: Don't process extts if PTP is disabled
|
[
"cpe:/a:redhat:rhel_eus:9.2::nfv",
"cpe:/a:redhat:rhel_eus:9.2::realtime"
] | null | 5.5 | null | null |
RHSA-2020:3587
|
Red Hat Security Advisory: Red Hat JBoss Fuse/A-MQ 6.3 R17 security and bug fix update
|
hawtio: server side request forgery via initial /proxy/ substring of a URI apache-commons-beanutils: does not suppresses the class property in PropertyUtilsBean by default camel: server-side template injection and arbitrary file disclosure on templating components
|
[
"cpe:/a:redhat:jboss_amq:6.3"
] | null | 7.5 | 7.3 | null |
RHSA-2013:1536
|
Red Hat Security Advisory: libguestfs security, bug fix, and enhancement update
|
libguestfs: insecure temporary directory handling for guestfish's network socket
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHBA-2019:0884
|
Red Hat Bug Fix Advisory: Red Hat Ansible Tower 3.3.5-3 - Container
|
Tower: credentials leaked through environment variables
|
[
"cpe:/a:redhat:ansible_tower:3.3::el7"
] | null | null | 7.2 | null |
RHSA-2023:7856
|
Red Hat Security Advisory: Red Hat Single Sign-On 7.6.6 security update on RHEL 8
|
keycloak: reflected XSS via wildcard in OIDC redirect_uri keycloak: redirect_uri validation bypass keycloak: offline session token DoS
|
[
"cpe:/a:redhat:red_hat_single_sign_on:7.6::el8"
] | null | 7.7 | null | null |
RHSA-2021:0739
|
Red Hat Security Advisory: nodejs:12 security update
|
nodejs: HTTP2 'unknownProtocol' cause DoS by resource exhaustion nodejs: DNS rebinding in --inspect
|
[
"cpe:/a:redhat:rhel_eus:8.1::appstream"
] | null | 7.5 | null | null |
RHSA-2011:0959
|
Red Hat Security Advisory: mutt security update
|
mutt: SSL host name check may be skipped when verifying certificate chain
|
[
"cpe:/o:redhat:enterprise_linux:6::server"
] | null | null | null | null |
RHSA-2015:0416
|
Red Hat Security Advisory: 389-ds-base security, bug fix, and enhancement update
|
389-ds-base: information disclosure through 'cn=changelog' subtree 389-ds-base: password hashing bypassed when "nsslapd-unhashed-pw-switch" is set to off
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | null | null |
RHBA-2024:6585
|
Red Hat Bug Fix Advisory: Updated rhel9/toolbox container image
|
glib2: Signal subscription vulnerabilities krb5: GSS message token handling krb5: GSS message token handling
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 6.5 | null | null |
RHSA-2015:1834
|
Red Hat Security Advisory: firefox security update
|
Mozilla: Miscellaneous memory safety hazards (MFSA 2015-96) Mozilla: Buffer overflow in libvpx while parsing vp9 format video (MFSA 2015-101) Mozilla: Use-after-free while manipulating HTML media content (MFSA 2015-106) Mozilla: Buffer overflow while decoding WebM video (MFSA 2015-105) Mozilla: Vulnerabilities found through code inspection (MFSA 2015-112) Mozilla: Dragging and dropping images exposes final URL after redirects (MFSA 2015-110) Mozilla: Errors in the handling of CORS preflight request headers (MFSA 2015-111) Mozilla: Vulnerabilities found through code inspection (MFSA 2015-112) Mozilla: Vulnerabilities found through code inspection (MFSA 2015-112) Mozilla: Vulnerabilities found through code inspection (MFSA 2015-112) Mozilla: Vulnerabilities found through code inspection (MFSA 2015-112) Mozilla: Vulnerabilities found through code inspection (MFSA 2015-112) Mozilla: Vulnerabilities found through code inspection (MFSA 2015-112) Mozilla: Vulnerabilities found through code inspection (MFSA 2015-112)
|
[
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::server",
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation",
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | null | null |
RHSA-2017:2469
|
Red Hat Security Advisory: java-1.8.0-ibm security update
|
JDK: class verifier allowing Security Manager bypass OpenJDK: reading of unprocessed image data in JPEGImageReader (2D, 8169209) OpenJDK: JAR verifier incorrect handling of missing digest (Security, 8169392) OpenJDK: Nashorn incompletely blocking access to Java APIs (Scripting, 8171539) OpenJDK: insufficient access control checks in ThreadPoolExecutor (Libraries, 8172204) OpenJDK: insufficient access control checks in ServiceRegistry (ImageIO, 8172461) OpenJDK: insufficient access control checks in AsynchronousChannelGroupImpl (8172465, Libraries) OpenJDK: insufficient access control checks in XML transformations (JAXP, 8172469) OpenJDK: unrestricted access to com.sun.org.apache.xml.internal.resolver (JAXP, 8173286) OpenJDK: incorrect handling of references in DGC (RMI, 8163958) JDK: unspecified vulnerability fixed in 6u161, 7u151, and 8u141 (Deployment) OpenJDK: insufficient access control checks in ActivationID (RMI, 8173697) OpenJDK: unbounded memory allocation in BasicAttribute deserialization (Serialization, 8174105) OpenJDK: unbounded memory allocation in CodeSource deserialization (Serialization, 8174113) OpenJDK: insufficient access control checks in ImageWatched (AWT, 8174098) OpenJDK: DSA implementation timing attack (JCE, 8175106) OpenJDK: LDAPCertStore following referrals to non-LDAP URLs (Security, 8176067) OpenJDK: insecure XML parsing in wsdlimport (JAX-WS, 8182054)
|
[
"cpe:/a:redhat:rhel_extras:6",
"cpe:/a:redhat:rhel_extras:7"
] | null | null | 6.5 | null |
RHSA-2023:6798
|
Red Hat Security Advisory: insights-client security update
|
insights-client: unsafe handling of temporary files and directories
|
[
"cpe:/a:redhat:rhel_aus:8.4::appstream",
"cpe:/a:redhat:rhel_e4s:8.4::appstream",
"cpe:/a:redhat:rhel_tus:8.4::appstream"
] | null | 7.8 | null | null |
RHSA-2007:1082
|
Red Hat Security Advisory: firefox security update
|
jar: protocol XSS Multiple flaws in Firefox Mozilla Cross-site Request Forgery flaw
|
[
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws",
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::server",
"cpe:/o:redhat:rhel_eus:4.5::as",
"cpe:/o:redhat:rhel_eus:4.5::es"
] | null | null | null | null |
RHSA-2018:1229
|
Red Hat Security Advisory: OpenShift Container Platform 3.8 security update
|
source-to-image: Improper path sanitization in ExtractTarStreamFromTarReader in tar/tar.go
|
[
"cpe:/a:redhat:openshift:3.8::el7"
] | null | null | 9.9 | null |
RHSA-2020:4451
|
Red Hat Security Advisory: GNOME security, bug fix, and enhancement update
|
webkitgtk: Incorrect state management leading to universal cross-site scripting webkitgtk: Multiple memory corruption issues leading to arbitrary code execution webkitgtk: Multiple memory corruption issues leading to arbitrary code execution webkitgtk: Multiple memory corruption issues leading to arbitrary code execution webkitgtk: Incorrect state management leading to universal cross-site scripting webkitgtk: Multiple memory corruption issues leading to arbitrary code execution webkitgtk: Websites could reveal browsing history webkitgtk: Violation of iframe sandboxing policy webkitgtk: Multiple memory corruption issues leading to arbitrary code execution webkitgtk: Multiple memory corruption issues leading to arbitrary code execution webkitgtk: Multiple memory corruption issues leading to arbitrary code execution webkitgtk: Multiple memory corruption issues leading to arbitrary code execution webkitgtk: Multiple memory corruption issues leading to arbitrary code execution webkitgtk: Incorrect state management leading to universal cross-site scripting webkitgtk: Multiple memory corruption issues leading to arbitrary code execution webkitgtk: Multiple memory corruption issues leading to arbitrary code execution webkitgtk: Multiple memory corruption issues leading to arbitrary code execution webkitgtk: Multiple memory corruption issues leading to arbitrary code execution webkitgtk: Multiple memory corruption issues leading to arbitrary code execution webkitgtk: Multiple memory corruption issues leading to arbitrary code execution webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution webkitgtk: Use after free issue may lead to remote code execution webkitgtk: Denial of service via incorrect memory handling webkitgtk: Non-unique security origin for DOM object contexts webkitgtk: Incorrect security check for a top-level DOM object context webkitgtk: Incorrect state management leading to universal cross-site scripting webkitgtk: Multiple memory corruption issues leading to arbitrary code execution webkitgtk: Incorrect processing of file URLs webkitgtk: Race condition allows reading of restricted memory webkitgtk: Memory corruption triggered by a malicious web content webkitgtk: Type confusion leading to arbitrary code execution webkitgtk: Memory consumption issue leading to arbitrary code execution webkitgtk: Memory corruption triggered by a malicious web content webkitgtk: Type confusion leading to arbitrary code execution webkitgtk: Input validation issue leading to cross-site script attack webkitgtk: Logic issue may lead to arbitrary code execution webkitgtk: Memory corruption may lead to arbitrary code execution webkitgtk: Logic issue may lead to cross site scripting webkitgtk: Memory corruption may lead to arbitrary code execution webkitgtk: Memory corruption may lead to arbitrary code execution webkitgtk: Input validation issue may lead to cross site scripting webkitgtk: Logic issue may lead to arbitrary code execution webkitgtk: Command injection in web inspector webkitgtk: Use-after-free may lead to application termination or arbitrary code execution webkitgtk: Out-of-bounds read may lead to unexpected application termination or arbitrary code execution webkitgtk: Use-after-free may lead to application termination or arbitrary code execution webkitgtk: Access issue in content security policy webkitgtk: A logic issue may lead to cross site scripting webkitgtk: input validation issue may lead to a cross site scripting webkitgtk: Use-after-free issue in accessibility/AXObjectCache.cpp webkitgtk: use-after-free via crafted web content gnome-settings-daemon: Red Hat Customer Portal password logged and passed as command line argument when user registers through GNOME control center LibRaw: lack of thumbnail size range check can lead to buffer overflow webkitgtk: Buffer overflow leading to arbitrary code execution webkitgtk: Memory corruption leading to arbitrary code execution webkitgtk: Use-after-free leading to arbitrary code execution
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb",
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 8.8 | null | null |
RHSA-2005:128
|
Red Hat Security Advisory: imap security update
|
security flaw
|
[
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws"
] | null | null | null | null |
RHSA-2024:0764
|
Red Hat Security Advisory: container-tools:rhel8 security update
|
runc: file descriptor leak
|
[
"cpe:/a:redhat:rhel_eus:8.6::appstream"
] | null | 8.6 | null | null |
RHSA-2014:1011
|
Red Hat Security Advisory: resteasy-base security update
|
RESTEasy: XXE via parameter entities
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | null | null |
RHSA-2013:1273
|
Red Hat Security Advisory: spice-gtk security update
|
spice-gtk: Insecure calling of polkit via polkit_unix_process_new()
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2005:582
|
Red Hat Security Advisory: httpd security update
|
security flaw security flaw
|
[
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws",
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2023:6249
|
Red Hat Security Advisory: .NET 6.0 security, bug fix, and enhancement update
|
dotnet: Denial of Service with Client Certificates using .NET Kestrel
|
[
"cpe:/a:redhat:rhel_dotnet:6.0::el7"
] | null | 6.5 | null | null |
RHSA-2024:5138
|
Red Hat Security Advisory: httpd security update
|
httpd: Security issues via backend applications whose response headers are malicious or exploitable
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 9.1 | null | null |
RHSA-2024:11024
|
Red Hat Security Advisory: python3.9:3.9.18 security update
|
python: Virtual environment (venv) activation scripts don't quote paths
|
[
"cpe:/a:redhat:rhel_eus:9.4::appstream",
"cpe:/a:redhat:rhel_eus:9.4::crb",
"cpe:/o:redhat:rhel_eus:9.4::baseos"
] | null | 6.3 | null | null |
RHSA-2019:1201
|
Red Hat Security Advisory: qemu-kvm-rhev security update
|
hardware: Microarchitectural Store Buffer Data Sampling (MSBDS) hardware: Micro-architectural Load Port Data Sampling - Information Leak (MLPDS) hardware: Microarchitectural Fill Buffer Data Sampling (MFBDS) hardware: Microarchitectural Data Sampling Uncacheable Memory (MDSUM)
|
[
"cpe:/a:redhat:openstack:13::el7"
] | null | null | 3.8 | null |
RHSA-2022:5239
|
Red Hat Security Advisory: 389-ds-base security, bug fix, and enhancement update
|
389-ds-base: sending crafted message could result in DoS 389-ds-base: expired password was still allowed to access the database
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 5.7 | null | null |
RHSA-2021:2308
|
Red Hat Security Advisory: microcode_ctl security, bug fix and enhancement update
|
hw: vt-d related privilege escalation hw: improper isolation of shared resources in some Intel Processors hw: observable timing discrepancy in some Intel Processors hw: information disclosure on some Intel Atom processors
|
[
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 5.6 | null | null |
RHSA-2002:263
|
Red Hat Security Advisory: kernel security update
|
security flaw security flaw
|
[
"cpe:/o:redhat:enterprise_linux:2.1::as"
] | null | null | null | null |
RHSA-2015:0327
|
Red Hat Security Advisory: glibc security and bug fix update
|
glibc: crash in code page decoding functions (IBM933, IBM935, IBM937, IBM939, IBM1364) glibc: Unexpected closing of nss_files databases after lookups causes denial of service
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | null | null |
RHSA-2011:0393
|
Red Hat Security Advisory: conga security update
|
plone: unauthorized remote administrative access
|
[
"cpe:/a:redhat:rhel_cluster:4"
] | null | null | null | null |
RHSA-2007:1016
|
Red Hat Security Advisory: samba security update
|
samba incorrect primary group assignment for domain users using the rfc2307 or sfu winbind nss info plugin samba buffer overflow Samba "reply_netbios_packet()" Buffer Overflow Vulnerability
|
[
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHBA-2020:5307
|
Red Hat Bug Fix Advisory: openvswitch2.11 bug fix and enhancement update
|
lldpd: buffer overflow in the lldp_decode function in daemon/protocols/lldp.c
|
[
"cpe:/o:redhat:enterprise_linux:7::fastdatapath"
] | null | 9.8 | null | null |
RHSA-2022:0821
|
Red Hat Security Advisory: kernel-rt security and bug fix update
|
kernel: fget: check that the fd still exists after getting a ref to it kernel: possible privileges escalation due to missing TLB flush kernel: cgroups v1 release_agent feature may allow privilege escalation kernel: improper initialization of the "flags" member of the new pipe_buffer kernel: failing usercopy allows for use-after-free exploitation
|
[
"cpe:/a:redhat:rhel_eus:8.2::nfv",
"cpe:/a:redhat:rhel_eus:8.2::realtime"
] | null | 7 | null | null |
RHSA-2019:2622
|
Red Hat Security Advisory: openstack-nova security and bug fix update
|
openstack-nova: Nova server resource faults leak external exception details
|
[
"cpe:/a:redhat:openstack:13::el7"
] | null | null | 6.5 | null |
RHSA-2015:0263
|
Red Hat Security Advisory: Red Hat Satellite IBM Java Runtime security update
|
ICU: font parsing OOB read (OpenJDK 2D, 8055489) OpenJDK: MulticastSocket NULL pointer dereference (Libraries, 8056264) ICU: font parsing OOB read (OpenJDK 2D, 8056276) OpenJDK: incorrect tracking of ChangeCipherSpec during SSL/TLS handshake (JSSE, 8057555) JDK: unspecified full Java sandbox bypass fixed in Feb 2015 update JDK: unspecified partial Java sandbox bypass fixed in Feb 2015 update OpenJDK: phantom references handling issue in garbage collector (Hotspot, 8047125) JDK: unspecified vulnerability fixed in 6u91, 7u75 and 8u31 (Deployment) JDK: unspecified vulnerability fixed in 6u91, 7u75 and 8u31 (Deployment) OpenJDK: directory information leak via file chooser (Swing, 8055304) OpenJDK: incorrect context class loader use in RMI transport (RMI, 8055309) OpenJDK: DER decoder infinite loop (Security, 8059485) OpenJDK: insufficient code privileges checks (JAX-WS, 8054367)
|
[
"cpe:/a:redhat:network_satellite:5.7::el6"
] | null | null | null | null |
RHSA-2023:2202
|
Red Hat Security Advisory: frr security, bug fix, and enhancement update
|
frr: out-of-bounds read in the BGP daemon may lead to information disclosure or denial of service
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 7.1 | null | null |
RHSA-2018:2944
|
Red Hat Security Advisory: rh-nodejs6-nodejs security update
|
nodejs: Out of bounds (OOB) write via UCS-2 encoding
|
[
"cpe:/a:redhat:rhel_software_collections:3::el6",
"cpe:/a:redhat:rhel_software_collections:3::el7"
] | null | null | 8.1 | null |
RHSA-2017:0316
|
Red Hat Security Advisory: kernel security and bug fix update
|
kernel: use after free in dccp protocol
|
[
"cpe:/o:redhat:rhel_eus:6.7::computenode",
"cpe:/o:redhat:rhel_eus:6.7::server"
] | null | null | 7.8 | null |
RHSA-2018:1655
|
Red Hat Security Advisory: qemu-kvm-rhev security update
|
hw: cpu: speculative store bypass
|
[
"cpe:/o:redhat:enterprise_linux:7::hypervisor"
] | null | null | 5.6 | null |
RHSA-2022:6531
|
Red Hat Security Advisory: OpenShift Container Platform 4.10.33 packages and security update
|
jenkins-plugin/junit: Stored XSS vulnerability in JUnit Plugin jenkins-plugin: Arbitrary file write vulnerability in Pipeline Input Step Plugin
|
[
"cpe:/a:redhat:openshift:4.10::el7",
"cpe:/a:redhat:openshift:4.10::el8"
] | null | 7.5 | null | null |
RHBA-2021:3054
|
Red Hat Bug Fix Advisory: opencryptoki bug fix and enhancement update
|
openCryptoki: Soft token does not check if an EC key is valid
|
[
"cpe:/a:redhat:enterprise_linux:8::crb",
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 5.1 | null | null |
RHSA-2017:3463
|
Red Hat Security Advisory: go-toolset-7 and go-toolset-7-golang security and bug fix update
|
golang: arbitrary code execution during "go get" or "go get -d" golang: smtp.PlainAuth susceptible to man-in-the-middle password harvesting
|
[
"cpe:/a:redhat:devtools:2::el7"
] | null | null | 5.3 | null |
RHSA-2025:3503
|
Red Hat Security Advisory: Red Hat build of Cryostat security update
|
golang.org/x/oauth2/jws: Unexpected memory consumption during token parsing in golang.org/x/oauth2/jws golang-jwt/jwt: jwt-go allows excessive memory allocation during header parsing
|
[
"cpe:/a:redhat:cryostat:4::el9"
] | null | 7.5 | null | null |
RHSA-2010:0743
|
Red Hat Security Advisory: acroread security update
|
Acroread: Stack-based buffer overflow by processing certain fonts (APSA10-02) Flash: crash or potential arbitrary code execution (APSB10-22) acroread: use of insecure RPATH (APSB10-21) acroread: multiple code execution flaws (APSB10-21) acroread: multiple code execution flaws (APSB10-21) acroread: multiple code execution flaws (APSB10-21) acroread: multiple code execution flaws (APSB10-21) acroread: multiple code execution flaws (APSB10-21) acroread: multiple code execution flaws (APSB10-21) acroread: multiple code execution flaws (APSB10-21) acroread: multiple code execution flaws (APSB10-21) acroread: multiple code execution flaws (APSB10-21) acroread: multiple code execution flaws (APSB10-21) acroread: multiple code execution flaws (APSB10-21) acroread: multiple code execution flaws (APSB10-21) acroread: multiple code execution flaws (APSB10-21) acroread: denial of service flaws (APSB10-21) acroread: denial of service flaws (APSB10-21) acroread: multiple code execution flaws (APSB10-21)
|
[
"cpe:/a:redhat:rhel_extras:4",
"cpe:/a:redhat:rhel_extras:5::client",
"cpe:/a:redhat:rhel_extras:5::server"
] | null | null | null | null |
RHSA-2020:4247
|
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.3.3 security update
|
cxf: JMX integration is vulnerable to a MITM attack picketbox: JBoss EAP reload to admin-only mode allows authentication bypass wildfly: XML validation manipulation due to incomplete application of use-grammar-pool-only in xercesImpl xnio: file descriptor leak caused by growing amounts of NIO Selector file handles may lead to DoS
|
[
"cpe:/a:redhat:jboss_enterprise_application_platform:7.3"
] | null | 5.9 | null | null |
RHSA-2024:9605
|
Red Hat Security Advisory: kernel security update
|
kernel: net: nexthop: Initialize all fields in dumped nexthops kernel: iommufd: Require drivers to supply the cache_invalidate_user ops kernel: mptcp: pm: Fix uaf in __timer_delete_sync
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::crb",
"cpe:/a:redhat:enterprise_linux:9::nfv",
"cpe:/a:redhat:enterprise_linux:9::realtime",
"cpe:/o:redhat:enterprise_linux:9::baseos"
] | null | 7 | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.