id
stringlengths
13
15
title
stringlengths
29
176
description
stringlengths
8
32.1k
cpes
listlengths
0
20
cvss_v4_0
null
cvss_v3_1
float64
0
10
cvss_v3_0
float64
0
10
cvss_v2_0
null
RHSA-2014:0536
Red Hat Security Advisory: mysql55-mysql security update
mysql: unspecified DoS related to XML (CPU April 2014) mysql: unspecified DoS related to Partition (CPU April 2014) mysql: unspecified DoS related to Performance Schema (CPU April 2014) mysql: unspecified DoS related to Options (CPU April 2014) mysql: unspecified DoS related to Federated (CPU April 2014) mysql: unspecified vulnerability related to RBR (CPU April 2014) mysql: unspecified DoS related to Replication (CPU April 2014)
[ "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::client_workstation", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
RHSA-2017:3384
Red Hat Security Advisory: liblouis security update
liblouis: incomplete fix for CVE-2014-8184
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
7.8
null
RHSA-2024:0050
Red Hat Security Advisory: OpenShift Container Platform 4.14.8 bug fix and security update
golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487) opentelemetry: DoS vulnerability in otelhttp
[ "cpe:/a:redhat:openshift:4.14::el8", "cpe:/a:redhat:openshift:4.14::el9" ]
null
7.5
null
null
RHSA-2013:0151
Red Hat Security Advisory: JBoss Enterprise Portal Platform 4.3 CP07 security update
Web: Bypass of security constraints
[ "cpe:/a:redhat:jboss_enterprise_portal_platform:4.3.0:update7" ]
null
null
null
null
RHSA-2018:2585
Red Hat Security Advisory: ansible security update
ansible: Failed tasks do not honour no_log option allowing for secrets to be disclosed in logs ansible: Inventory variables are loaded from current working directory when running ad-hoc command that can lead to code execution ansible: ansible.cfg is being read from current working directory allowing possible code execution
[ "cpe:/a:redhat:openstack:13::el7" ]
null
null
7.8
null
RHSA-2024:0430
Red Hat Security Advisory: python3 security update
python: tarfile module directory traversal python: int() type in PyLong_FromString() does not limit amount of digits converting text to int leading to DoS python: CPU denial of service via inefficient IDNA decoder python: use after free in heappushpop() of heapq module python: DoS when processing malformed Apple Property List files in binary format python: Parsing errors in email/_parseaddr.py lead to incorrect value in email address part of tuple
[ "cpe:/a:redhat:rhel_eus:8.6::appstream", "cpe:/o:redhat:rhel_eus:8.6::baseos" ]
null
5.3
null
null
RHSA-2022:1469
Red Hat Security Advisory: Red Hat Single Sign-On 7.5.2 security update
log4j-core: DoS in log4j 2.x with Thread Context Map (MDC) input data contains a recursive lookup and context lookup pattern
[ "cpe:/a:redhat:red_hat_single_sign_on:7" ]
null
5.9
null
null
RHSA-2019:4191
Red Hat Security Advisory: sudo security update
sudo: Privilege escalation via 'Runas' specification with 'ALL' keyword
[ "cpe:/o:redhat:rhel_els:5" ]
null
null
7
null
RHSA-2017:2760
Red Hat Security Advisory: kernel security and bug fix update
kernel: Stack overflow via ecryptfs and /proc/$pid/environ
[ "cpe:/o:redhat:rhel_eus:6.7::computenode", "cpe:/o:redhat:rhel_eus:6.7::server" ]
null
null
8.1
null
RHSA-2024:7994
Red Hat Security Advisory: Red Hat Advanced Cluster Management 2.11.3 bug fixes and container updates
elliptic: nodejs/elliptic: EDDSA signature malleability due to missing signature length check elliptic: nodejs/elliptic: ECDSA signature malleability due to missing checks elliptic: nodejs/elliptic: ECDSA implementation malleability due to BER-enconded signatures being allowed elliptic: Missing Validation in Elliptic's EDDSA Signature Verification
[ "cpe:/a:redhat:acm:2.11::el9" ]
null
8.2
null
null
RHSA-2004:119
Red Hat Security Advisory: openssl security update
security flaw security flaw
[ "cpe:/o:redhat:enterprise_linux:2.1::as", "cpe:/o:redhat:enterprise_linux:2.1::aw", "cpe:/o:redhat:enterprise_linux:2.1::es", "cpe:/o:redhat:enterprise_linux:2.1::ws" ]
null
null
null
null
RHSA-2024:2113
Red Hat Security Advisory: pcs security update
rubygem-rack: Denial of Service Vulnerability in Rack Content-Type Parsing rubygem-rack: Possible DoS Vulnerability with Range Header in Rack rubygem-rack: Possible Denial of Service Vulnerability in Rack Header Parsing
[ "cpe:/a:redhat:enterprise_linux:9::highavailability", "cpe:/a:redhat:enterprise_linux:9::resilientstorage" ]
null
5.3
null
null
RHSA-2023:0476
Red Hat Security Advisory: thunderbird security update
Mozilla: libusrsctp library out of date Mozilla: Fullscreen notification bypass Mozilla: Arbitrary file read from GTK drag and drop on Linux Mozilla: Malicious command could be hidden in devtools output Mozilla: URL being dragged from cross-origin iframe into same tab triggers navigation Mozilla: Content Security Policy wasn't being correctly applied to WebSockets in WebWorkers Mozilla: Calls to <code>console.log</code> allowed bypasing Content Security Policy via format directive Mozilla: Memory safety bugs fixed in Firefox 109 and Firefox ESR 102.7
[ "cpe:/a:redhat:enterprise_linux:9::appstream" ]
null
8.8
null
null
RHSA-2023:6324
Red Hat Security Advisory: python3.11-pip security update
python: tarfile module directory traversal
[ "cpe:/a:redhat:enterprise_linux:9::appstream" ]
null
5.5
null
null
RHSA-2024:4830
Red Hat Security Advisory: httpd:2.4 security update
httpd: Substitution encoding issue in mod_rewrite httpd: Improper escaping of output in mod_rewrite httpd: NULL pointer dereference in mod_proxy
[ "cpe:/a:redhat:rhel_aus:8.4::appstream", "cpe:/a:redhat:rhel_e4s:8.4::appstream", "cpe:/a:redhat:rhel_tus:8.4::appstream" ]
null
7.5
null
null
RHSA-2021:1631
Red Hat Security Advisory: python-urllib3 security update
python-urllib3: CRLF injection via HTTP request method
[ "cpe:/o:redhat:enterprise_linux:8::baseos" ]
null
6.5
null
null
RHSA-2019:1971
Red Hat Security Advisory: kernel-rt security and bug fix update
kernel: infinite loop in update_blocked_averages() in kernel/sched/fair.c leading to denial of service kernel: insufficient input validation in kernel mode driver in Intel i915 graphics leads to privilege escalation kernel: a NULL pointer dereference in drivers/scsi/megaraid/megaraid_sas_base.c leading to DoS kernel: use-after-free in drivers/char/ipmi/ipmi_si_intf.c, ipmi_si_mem_io.c, ipmi_si_port_io.c
[ "cpe:/a:redhat:enterprise_linux:8::nfv", "cpe:/a:redhat:enterprise_linux:8::realtime" ]
null
7
6.2
null
RHSA-2021:3125
Red Hat Security Advisory: Red Hat build of Eclipse Vert.x 4.1.2 security update
jackson-dataformat-cbor: Unchecked allocation of byte buffer can cause a java.lang.OutOfMemoryError exception
[ "cpe:/a:redhat:openshift_application_runtimes:1.0" ]
null
7.5
null
null
RHSA-2020:3783
Red Hat Security Advisory: OpenShift Container Platform 4.4.23 cluster-network-operator-container security update
golang.org/x/text: possibility to trigger an infinite loop in encoding/unicode could lead to crash
[ "cpe:/a:redhat:openshift:4.4::el7" ]
null
7.5
null
null
RHSA-2025:1278
Red Hat Security Advisory: kernel security update
kernel: media: uvcvideo: Skip parsing frames of type UVC_VS_UNDEFINED in uvc_parse_format
[ "cpe:/o:redhat:rhel_aus:8.2::baseos" ]
null
7.3
null
null
RHSA-2011:1508
Red Hat Security Advisory: cyrus-imapd security update
cyrus-imapd: nntpd authentication bypass cyrus-imapd: NULL pointer dereference via crafted References header in email
[ "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws", "cpe:/o:redhat:enterprise_linux:5::client_workstation", "cpe:/o:redhat:enterprise_linux:5::server", "cpe:/o:redhat:enterprise_linux:6::server" ]
null
null
null
null
RHSA-2023:6787
Red Hat Security Advisory: Network Observability security update
golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487) HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack)
[ "cpe:/a:redhat:network_observ_optr:1.4.0::el9" ]
null
7.5
null
null
RHSA-2014:1371
Red Hat Security Advisory: nss security update
nss: RSA PKCS#1 signature verification forgery flaw (MFSA 2014-73)
[ "cpe:/o:redhat:rhel_els:4::as", "cpe:/o:redhat:rhel_els:4::es", "cpe:/o:redhat:rhel_eus:5.9", "cpe:/o:redhat:rhel_eus:6.4::computenode", "cpe:/o:redhat:rhel_eus:6.4::server", "cpe:/o:redhat:rhel_mission_critical:5.6", "cpe:/o:redhat:rhel_mission_critical:6.2::server" ]
null
null
null
null
RHSA-2012:1378
Red Hat Security Advisory: openstack-keystone security update
Keystone: Lack of authorization for adding users to tenants OpenStack-Keystone: role revocation token issues 2012.1.1: fails to validate tokens in Admin API 2012.1.1: fails to raise Unauthorized user error for disabled tenant
[ "cpe:/a:redhat:openstack:1::el6" ]
null
null
null
null
RHSA-2017:0276
Red Hat Security Advisory: bind security update
bind: Assertion failure when using DNS64 and RPZ Can Lead to Crash
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
7.5
null
RHSA-2025:1448
Red Hat Security Advisory: RHOAI 2.17.0 - Red Hat OpenShift AI
cross-spawn: regular expression denial of service golang.org/x/crypto/ssh: Misuse of ServerConfig.PublicKeyCallback may cause authorization bypass in golang.org/x/crypto golang.org/x/net/html: Non-linear parsing of case-insensitive content in golang.org/x/net/html github.com/golang/glog: Vulnerability when creating log files in github.com/golang/glog werkzeug: python-werkzeug: Werkzeug possible resource exhaustion when parsing file data in forms path-to-regexp: path-to-regexp Unpatched `path-to-regexp` ReDoS in 0.1.x nanoid: nanoid mishandles non-integer values
[ "cpe:/a:redhat:openshift_ai:2.17::el8" ]
null
6.5
7.1
null
RHSA-2024:7482
Red Hat Security Advisory: linux-firmware security update
kernel: hw:amd: Incomplete system memory cleanup in SEV firmware corrupt guest private memory
[ "cpe:/o:redhat:rhel_eus:8.8::baseos" ]
null
4.4
null
null
RHSA-2015:1685
Red Hat Security Advisory: python-keystoneclient security update
keystonemiddleware/keystoneclient: S3Token TLS cert verification option not honored
[ "cpe:/a:redhat:openstack:5::el6", "cpe:/a:redhat:openstack:5::el7" ]
null
null
null
null
RHSA-2021:0423
Red Hat Security Advisory: OpenShift Container Platform 4.6.17 security and packages update
ant: insecure temporary file vulnerability ant: insecure temporary file jenkins: Arbitrary file read vulnerability in workspace browsers jenkins: XSS vulnerability in notification bar jenkins: Improper handling of REST API XML deserialization errors jenkins: Path traversal vulnerability in agent names jenkins: Arbitrary file existence check in file fingerprints jenkins: Excessive memory allocation in graph URLs leads to denial of service jenkins: Stored XSS vulnerability in button labels jenkins: Missing permission check for paths with specific prefix jenkins: Reflected XSS vulnerability in markup formatter preview jenkins: Stored XSS vulnerability on new item page jenkins: Filesystem traversal by privileged users
[ "cpe:/a:redhat:openshift:4.6::el7", "cpe:/a:redhat:openshift:4.6::el8" ]
null
5.3
null
null
RHSA-2010:0018
Red Hat Security Advisory: dbus security update
dbus: invalid fix for CVE-2008-3834
[ "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::client_workstation", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
RHSA-2024:1906
Red Hat Security Advisory: firefox security update
Mozilla: Permission prompt input delay could expire when not in focus Mozilla: Denial of Service using HTTP/2 CONTINUATION frames Mozilla: GetBoundName in the JIT returned the wrong object Mozilla: Out-of-bounds-read after mis-optimized switch statement Mozilla: Incorrect JITting of arguments led to use-after-free during garbage collection Mozilla: Integer-overflow led to out-of-bounds-read in the OpenType sanitizer Mozilla: Potential use-after-free due to AlignedBuffer self-move Mozilla: Memory safety bug fixed in Firefox 125, Firefox ESR 115.10, and Thunderbird 115.10
[ "cpe:/a:redhat:rhel_eus:8.6::appstream" ]
null
7.5
null
null
RHSA-2015:0694
Red Hat Security Advisory: kernel-rt security, bug fix, and enhancement update
kernel: splice: lack of generic write checks Kernel: fs: ext4 race condition kernel: soft lockup on aio kernel: NULL pointer dereference in madvise(MADV_WILLNEED) support kernel: xfs: replacing remote attributes memory corruption
[ "cpe:/a:redhat:enterprise_mrg:2:server:el6" ]
null
null
6.2
null
RHSA-2023:4157
Red Hat Security Advisory: java-11-openjdk security update
OpenJDK: HTTP client insufficient file name validation (8302475) OpenJDK: ZIP file parsing infinite loop (8302483) OpenJDK: weakness in AES implementation (8308682) OpenJDK: array indexing integer overflow issue (8304468) OpenJDK: improper handling of slash characters in URI-to-path conversion (8305312) harfbuzz: allows attackers to trigger O(n^2) growth via consecutive marks
[ "cpe:/a:redhat:rhel_eus:9.0::appstream", "cpe:/a:redhat:rhel_eus:9.0::crb" ]
null
7.5
null
null
RHSA-2024:4645
Red Hat Security Advisory: qt5-qtbase security update
qtbase: qtbase: Delay any communication until encrypted() can be responded to
[ "cpe:/a:redhat:rhel_e4s:9.0::appstream" ]
null
7.5
null
null
RHSA-2024:2950
Red Hat Security Advisory: kernel-rt security and bug fix update
kernel: OOB writes in parse_hid_report_descriptor in drivers/input/tablet/gtco.c kernel: out of bounds read in drivers/media/usb/dvb-usb/technisat-usb2.c kernel: use-after-free in read in vt_do_kdgkb_ioctl kernel: a race out-of-bound read in vt kernel: improper input validation may lead to privilege escalation kernel: Linux ebpf logic vulnerability leads to critical memory read and write gaining root privileges kernel: use-after-free in l1oip timer handlers kernel: local privileges escalation in kernel/bpf/verifier.c kernel: integer overflow in l2cap_config_req() in net/bluetooth/l2cap_core.c kernel: KVM: information leak in KVM_GET_DEBUGREGS ioctl on 32-bit systems kernel: use after free in vcs_read in drivers/tty/vt/vc_screen.c due to race kernel: cxgb4: use-after-free in ch_flower_stats_cb() kernel: Use-after-free in nft_verdict_dump due to a race between set GC and transaction kernel: NVMe: info leak due to out-of-bounds read in nvmet_ctrl_find_get kernel: local dos vulnerability in scatterwalk_copychunks kernel: null pointer dereference vulnerability in nft_dynset_init() kernel: Null Pointer Dereference vulnerability in ida_free in lib/idr.c kernel: use-after-free in IPv4 IGMP kernel: Bluetooth Forward and Future Secrecy Attacks and Defenses kernel: irdma: Improper access control Kernel: double free in hci_conn_cleanup of the bluetooth subsystem kernel: race condition between HCIUARTSETPROTO and HCIUARTGETPROTO in hci_uart_tty_ioctl kernel: usb: out-of-bounds read in read_descriptors kernel: fbcon: out-of-sync arrays in fbcon_mode_deleted due to wrong con2fb_map assignment kernel: netfilter: nftables out-of-bounds read in nf_osf_match_one() kernel: netfilter: xtables out-of-bounds read in u32_match_it() kernel: netfilter: xtables sctp out-of-bounds read in match_flags() kernel: xfrm: out-of-bounds read in __xfrm_state_filter_match() kernel: QXL: race condition leading to use-after-free in qxl_mode_dumb_create() kernel: ipv4: NULL pointer dereference in ipv4_send_dest_unreach() kernel: rsvp: out-of-bounds read in rsvp_classify() kernel: lib/kobject.c vulnerable to fill_kobj_path out-of-bounds write kernel: bluetooth: bt_sock_ioctl race condition leads to use-after-free in bt_sock_recvmsg kernel: use-after-free in net/atm/ioctl.c kernel: ICMPv6 “Packet Too Big” packets force a DoS of the Linux kernel by forcing 100% CPU kernel: smb: client: fix potential OOBs in smb2_parse_contexts() kernel: gfs2: Fix kernel NULL pointer dereference in gfs2_rgrp_dump kernel: mm/sparsemem: fix race in accessing memory_section->usage kernel: team: NULL pointer dereference when team device type is changed kernel: net/core: kernel crash in ETH_P_1588 flow dissector kernel: netfilter: nf_tables: memory leak when more than 255 elements expired kernel: KVM: s390: fix setting of fpc register kernel: netfilter: nf_tables: disallow timeout for anonymous sets kernel: hugetlbfs: Null pointer dereference in hugetlbfs_fill_super function hw: amd: Instruction raise #VC exception at exit hw: amd: Instruction raise #VC exception at exit kernel: sched/membarrier: reduce the ability to hammer on sys_membarrier kernel: netfilter: nf_tables: reject QUEUE/DROP verdict parameters kernel: blk-mq: fix IO hang from sbitmap wakeup race
[ "cpe:/a:redhat:enterprise_linux:8::nfv", "cpe:/a:redhat:enterprise_linux:8::realtime" ]
null
4.4
5.3
null
RHSA-2023:4021
Red Hat Security Advisory: kernel security and bug fix update
kernel: use-after-free caused by l2cap_reassemble_sdu() in net/bluetooth/l2cap_core.c
[ "cpe:/o:redhat:rhel_aus:7.6::server" ]
null
7.1
null
null
RHSA-2023:3179
Red Hat Security Advisory: Red Hat Integration Camel Extensions For Quarkus 2.13.2-2 security update
json-smart: Uncontrolled Resource Consumption vulnerability in json-smart (Resource Exhaustion)
[ "cpe:/a:redhat:camel_quarkus:2.13" ]
null
7.5
null
null
RHSA-2020:4310
Red Hat Security Advisory: firefox security update
Mozilla: Memory safety bugs fixed in Firefox 82 and Firefox ESR 78.4 chromium-browser: Use after free in WebRTC
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
8.8
null
null
RHSA-2022:6053
Red Hat Security Advisory: OpenShift Container Platform 4.7.56 security and bug fix update
golang: compress/gzip: stack exhaustion in Reader.Read
[ "cpe:/a:redhat:openshift:4.7::el8" ]
null
7.5
null
null
RHSA-2005:072
Red Hat Security Advisory: perl-DBI security update
security flaw
[ "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws" ]
null
null
null
null
RHSA-2014:1354
Red Hat Security Advisory: rhev-hypervisor6 security update
nss: RSA PKCS#1 signature verification forgery flaw (MFSA 2014-73) bash: specially-crafted environment variables can be used to inject shell commands bash: code execution via specially-crafted environment (Incomplete fix for CVE-2014-6271) bash: parser can allow out-of-bounds memory access while handling redir_stack bash: off-by-one error in deeply nested flow control constructs
[ "cpe:/a:redhat:rhev_manager:3" ]
null
null
null
null
RHSA-2022:4890
Red Hat Security Advisory: thunderbird security update
Mozilla: Braille space character caused incorrect sender email to be shown for a digitally signed email Mozilla: Cross-Origin resource's length leaked Mozilla: Heap buffer overflow in WebGL Mozilla: Browser window spoof using fullscreen mode Mozilla: Register allocation problem in WASM on arm64 Mozilla: Uninitialized variable leads to invalid memory read Mozilla: Querying a WebAuthn token with a large number of allowCredential entries may have leaked cross-origin information Mozilla: Memory safety bugs fixed in Firefox 101 and Firefox ESR 91.10
[ "cpe:/a:redhat:rhel_eus:8.2::appstream" ]
null
9.8
6.1
null
RHSA-2017:2533
Red Hat Security Advisory: bind security update
bind: Too long query name causes segmentation fault in lwresd
[ "cpe:/o:redhat:rhel_eus:7.2::computenode", "cpe:/o:redhat:rhel_eus:7.2::server", "cpe:/o:redhat:rhel_eus:7.3::computenode", "cpe:/o:redhat:rhel_eus:7.3::server" ]
null
null
5.9
null
RHSA-2003:048
Red Hat Security Advisory: python security update
security flaw
[ "cpe:/o:redhat:enterprise_linux:2.1::as", "cpe:/o:redhat:enterprise_linux:2.1::aw" ]
null
null
null
null
RHSA-2013:1011
Red Hat Security Advisory: Red Hat JBoss Web Server 2.0.1 update
httpd: multiple XSS flaws due to unescaped hostnames tomcat: Limited DoS in chunked transfer encoding input filter httpd: XSS flaw in mod_proxy_balancer manager interface tomcat: Session fixation in form authenticator tomcat: Information disclosure in asynchronous context when using AsyncListeners that threw RuntimeExceptions
[ "cpe:/a:redhat:jboss_enterprise_web_server:2::el5" ]
null
null
null
null
RHSA-2018:0093
Red Hat Security Advisory: microcode_ctl security update
An update for microcode_ctl is now available for Red Hat Enterprise Linux 6, Red Hat Enterprise Linux 6.2 Advanced Update Support, Red Hat Enterprise Linux 6.4 Advanced Update Support, Red Hat Enterprise Linux 6.5 Advanced Update Support, Red Hat Enterprise Linux 6.6 Advanced Update Support, Red Hat Enterprise Linux 6.6 Telco Extended Update Support, Red Hat Enterprise Linux 6.7 Extended Update Support, Red Hat Enterprise Linux 7, Red Hat Enterprise Linux 7.2 Advanced Update Support, Red Hat Enterprise Linux 7.2 Telco Extended Update Support, Red Hat Enterprise Linux 7.2 Update Services for SAP Solutions, and Red Hat Enterprise Linux 7.3 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation", "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation", "cpe:/o:redhat:rhel_aus:6.4::server", "cpe:/o:redhat:rhel_aus:6.5::server", "cpe:/o:redhat:rhel_aus:6.6::server", "cpe:/o:redhat:rhel_aus:7.2::server", "cpe:/o:redhat:rhel_e4s:7.2::server", "cpe:/o:redhat:rhel_eus:6.7::computenode", "cpe:/o:redhat:rhel_eus:6.7::server", "cpe:/o:redhat:rhel_eus:7.3::computenode", "cpe:/o:redhat:rhel_eus:7.3::server", "cpe:/o:redhat:rhel_mission_critical:6.2::server", "cpe:/o:redhat:rhel_tus:6.6::server", "cpe:/o:redhat:rhel_tus:7.2::server" ]
null
null
null
null
RHSA-2021:4510
Red Hat Security Advisory: lua security update
lua: segmentation fault in getlocal and setlocal functions in ldebug.c
[ "cpe:/a:redhat:enterprise_linux:8::appstream", "cpe:/a:redhat:enterprise_linux:8::crb", "cpe:/o:redhat:enterprise_linux:8::baseos" ]
null
5.3
null
null
RHSA-2007:0964
Red Hat Security Advisory: openssl security update
openssl: RSA side-channel attack openssl dtls out of order vulnerabilitiy openssl: SSL_get_shared_ciphers() off-by-one
[ "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::client_workstation", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
RHSA-2022:4918
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.4.5 security update on RHEL 7
jackson-databind: denial of service via a large depth of nested objects netty-codec: Bzip2Decoder doesn't allow setting size restrictions for decompressed data netty-codec: SnappyFrameDecoder doesn't restrict chunk length and may buffer skippable chunks in an unnecessary way h2: Remote Code Execution in Console netty: control chars in header names may lead to HTTP request smuggling xnio: org.xnio.StreamConnection.notifyReadClosed log to debug instead of stderr jboss-client: memory leakage in remote client transaction wildfly: Wildfly management of EJB Session context returns wrong caller principal with Elytron Security enabled undertow: Double AJP response for 400 from EAP 7 results in CPING failures OpenJDK: Infinite loop related to incorrect handling of newlines in XMLEntityScanner (JAXP, 8270646) mysql-connector-java: Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Connectors h2: Loading of custom classes from remote servers through JNDI xerces-j2: infinite loop when handling specially crafted XML document payloads artemis-commons: Apache ActiveMQ Artemis DoS Moment.js: Path traversal in moment.locale
[ "cpe:/a:redhat:jboss_enterprise_application_platform:7.4::el7" ]
null
7.5
null
null
RHSA-2014:0788
Red Hat Security Advisory: mod_wsgi security update
mod_wsgi: possible privilege escalation in setuid() failure scenarios mod_wsgi: information leak
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
null
null
RHSA-2007:0010
Red Hat Security Advisory: koffice security update
koffice: update to 1.6.1
[ "cpe:/o:redhat:enterprise_linux:2.1::as", "cpe:/o:redhat:enterprise_linux:2.1::aw", "cpe:/o:redhat:enterprise_linux:2.1::es", "cpe:/o:redhat:enterprise_linux:2.1::ws" ]
null
null
null
null
RHSA-2024:3138
Red Hat Security Advisory: kernel security, bug fix, and enhancement update
kernel: OOB writes in parse_hid_report_descriptor in drivers/input/tablet/gtco.c kernel: out of bounds read in drivers/media/usb/dvb-usb/technisat-usb2.c kernel: use-after-free in read in vt_do_kdgkb_ioctl kernel: a race out-of-bound read in vt kernel: improper input validation may lead to privilege escalation kernel: Linux ebpf logic vulnerability leads to critical memory read and write gaining root privileges kernel: use-after-free in l1oip timer handlers kernel: local privileges escalation in kernel/bpf/verifier.c kernel: integer overflow in l2cap_config_req() in net/bluetooth/l2cap_core.c kernel: Bluetooth: L2CAP: Fix u8 overflow kernel: VMCI: Use threaded irqs instead of tasklets kernel: KVM: information leak in KVM_GET_DEBUGREGS ioctl on 32-bit systems kernel: use after free in vcs_read in drivers/tty/vt/vc_screen.c due to race kernel: cxgb4: use-after-free in ch_flower_stats_cb() kernel: Use-after-free in nft_verdict_dump due to a race between set GC and transaction kernel: NVMe: info leak due to out-of-bounds read in nvmet_ctrl_find_get kernel: local dos vulnerability in scatterwalk_copychunks kernel: null pointer dereference vulnerability in nft_dynset_init() kernel: Null Pointer Dereference vulnerability in ida_free in lib/idr.c kernel: use-after-free in IPv4 IGMP kernel: Bluetooth Forward and Future Secrecy Attacks and Defenses kernel: irdma: Improper access control Kernel: double free in hci_conn_cleanup of the bluetooth subsystem kernel: race condition between HCIUARTSETPROTO and HCIUARTGETPROTO in hci_uart_tty_ioctl kernel: usb: out-of-bounds read in read_descriptors kernel: fbcon: out-of-sync arrays in fbcon_mode_deleted due to wrong con2fb_map assignment kernel: netfilter: nftables out-of-bounds read in nf_osf_match_one() kernel: netfilter: xtables out-of-bounds read in u32_match_it() kernel: netfilter: xtables sctp out-of-bounds read in match_flags() kernel: xfrm: out-of-bounds read in __xfrm_state_filter_match() kernel: QXL: race condition leading to use-after-free in qxl_mode_dumb_create() kernel: ipv4: NULL pointer dereference in ipv4_send_dest_unreach() kernel: rsvp: out-of-bounds read in rsvp_classify() kernel: lib/kobject.c vulnerable to fill_kobj_path out-of-bounds write kernel: bluetooth: bt_sock_ioctl race condition leads to use-after-free in bt_sock_recvmsg kernel: use-after-free in net/atm/ioctl.c kernel: ICMPv6 “Packet Too Big” packets force a DoS of the Linux kernel by forcing 100% CPU kernel: smb: client: fix potential OOBs in smb2_parse_contexts() kernel: gfs2: Fix kernel NULL pointer dereference in gfs2_rgrp_dump kernel: mm/sparsemem: fix race in accessing memory_section->usage kernel: team: NULL pointer dereference when team device type is changed kernel: net/core: kernel crash in ETH_P_1588 flow dissector kernel: netfilter: nf_tables: memory leak when more than 255 elements expired kernel: KVM: s390: fix setting of fpc register kernel: netfilter: nf_tables: disallow timeout for anonymous sets kernel: hugetlbfs: Null pointer dereference in hugetlbfs_fill_super function hw: amd: Instruction raise #VC exception at exit hw: amd: Instruction raise #VC exception at exit kernel: sched/membarrier: reduce the ability to hammer on sys_membarrier kernel: netfilter: nf_tables: reject QUEUE/DROP verdict parameters kernel: blk-mq: fix IO hang from sbitmap wakeup race kernel: i40e: Do not allow untrusted VF to remove administratively set MAC
[ "cpe:/a:redhat:enterprise_linux:8::crb", "cpe:/o:redhat:enterprise_linux:8::baseos" ]
null
4.4
5.3
null
RHSA-2019:2889
Red Hat Security Advisory: redhat-virtualization-host security update
kernel: vhost-net: guest to host kernel escape during migration
[ "cpe:/o:redhat:enterprise_linux:7::hypervisor" ]
null
null
7.2
null
RHSA-2012:1538
Red Hat Security Advisory: Red Hat Network Satellite server jabberd security update
jabberd: Prone to unsolicited XMPP Dialback attacks
[ "cpe:/a:redhat:network_satellite:5.5::el5", "cpe:/a:redhat:network_satellite:5.5::el6" ]
null
null
null
null
RHSA-2024:3411
Red Hat Security Advisory: glibc security update
glibc: Out of bounds write in iconv may lead to remote code execution glibc: stack-based buffer overflow in netgroup cache glibc: null pointer dereferences after failed netgroup cache insertion glibc: netgroup cache may terminate daemon on memory allocation failure glibc: netgroup cache assumes NSS callback uses in-buffer strings
[ "cpe:/a:redhat:rhel_eus:9.2::appstream", "cpe:/a:redhat:rhel_eus:9.2::crb", "cpe:/o:redhat:rhel_eus:9.2::baseos" ]
null
4
null
null
RHSA-2023:5701
Red Hat Security Advisory: Red Hat Ansible Automation Platform 2.3 Product Security and Bug Fix Update
Ansible: malicious role archive can cause ansible-galaxy to overwrite arbitrary files python-django: Potential denial of service vulnerability in ``django.utils.encoding.uri_to_iri()``
[ "cpe:/a:redhat:ansible_automation_platform:2.3::el8", "cpe:/a:redhat:ansible_automation_platform:2.3::el9", "cpe:/a:redhat:ansible_automation_platform_developer:2.3::el8", "cpe:/a:redhat:ansible_automation_platform_developer:2.3::el9", "cpe:/a:redhat:ansible_automation_platform_inside:2.3::el8", "cpe:/a:redhat:ansible_automation_platform_inside:2.3::el9" ]
null
7.5
null
null
RHSA-2023:4634
Red Hat Security Advisory: rust security update
rust-cargo: cargo does not respect the umask when extracting dependencies
[ "cpe:/a:redhat:enterprise_linux:9::appstream" ]
null
6.7
null
null
RHSA-2022:4589
Red Hat Security Advisory: thunderbird security update
Mozilla: Incorrect security status shown after viewing an attached email Mozilla: Bypassing permission prompt in nested browsing contexts Mozilla: iframe Sandbox bypass Mozilla: Reader mode bypassed SameSite cookies Mozilla: Speech Synthesis feature not properly disabled Mozilla: Fullscreen notification bypass using popups Mozilla: Leaking browser history with CSS variables Mozilla: Memory safety bugs fixed in Firefox 100 and Firefox ESR 91.9
[ "cpe:/a:redhat:enterprise_linux:9::appstream" ]
null
9.8
7.5
null
RHSA-2017:2425
Red Hat Security Advisory: rh-postgresql95-postgresql security update
postgresql: CASE/WHEN with inlining can cause untrusted pointer dereference postgresql: privilege escalation via crafted database and role names postgresql: Selectivity estimators bypass SELECT privilege checks postgresql: libpq ignores PGREQUIRESSL environment variable postgresql: pg_user_mappings view discloses foreign server passwords
[ "cpe:/a:redhat:network_satellite:5.7::el6", "cpe:/a:redhat:network_satellite_managed_db:5.7::el6" ]
null
null
6.3
null
RHSA-2016:0430
Red Hat Security Advisory: xerces-c security update
xerces-c: parser crashes on malformed input
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
null
null
RHSA-2020:2938
Red Hat Security Advisory: .NET Core security and bugfix update
dotnet: XML source markup processing remote code execution
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
8.8
null
null
RHSA-2020:0197
Red Hat Security Advisory: python-reportlab security update
python-reportlab: code injection in colors.py allows attacker to execute code
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
9.8
null
RHSA-2021:3323
Red Hat Security Advisory: microcode_ctl security, bug fix and enhancement update
hw: Special Register Buffer Data Sampling (SRBDS) hw: Vector Register Data Sampling hw: L1D Cache Eviction Sampling hw: Information disclosure issue in Intel SGX via RAPL interface hw: Vector Register Leakage-Active hw: Fast forward store predictor hw: vt-d related privilege escalation hw: improper isolation of shared resources in some Intel Processors hw: observable timing discrepancy in some Intel Processors
[ "cpe:/o:redhat:rhel_aus:7.2::server" ]
null
2.8
6.5
null
RHSA-2013:1449
Red Hat Security Advisory: kernel security and bug fix update
kernel: handling of IPv6 temporary addresses kernel: dm: dm-snapshot data leak kernel: ansi_cprng: off by one error in non-block size request xen: information leak through outs instruction emulation (XSA-67)
[ "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
RHSA-2016:2610
Red Hat Security Advisory: systemd security and bug fix update
systemd: Assertion failure when PID 1 receives a zero-length message over notify socket
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
6.8
null
RHSA-2021:3364
Red Hat Security Advisory: microcode_ctl security, bug fix and enhancement update
hw: Special Register Buffer Data Sampling (SRBDS) hw: Vector Register Data Sampling hw: L1D Cache Eviction Sampling hw: Information disclosure issue in Intel SGX via RAPL interface hw: Vector Register Leakage-Active hw: Fast forward store predictor hw: vt-d related privilege escalation hw: improper isolation of shared resources in some Intel Processors hw: observable timing discrepancy in some Intel Processors
[ "cpe:/o:redhat:rhel_eus:8.2::baseos" ]
null
2.8
6.5
null
RHSA-2006:0281
Red Hat Security Advisory: struts security update for Red Hat Application Server
struts bypass validation security flaw struts LookupDispatchAction XSS
[ "cpe:/a:redhat:rhel_application_server:1", "cpe:/a:redhat:rhel_application_server:2" ]
null
null
null
null
RHSA-2022:0418
Red Hat Security Advisory: varnish:6 security update
varnish: HTTP/1 request smuggling vulnerability
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
9.1
null
null
RHSA-2023:5745
Red Hat Security Advisory: OpenJDK 17.0.9 Security Update for Portable Linux Builds
freetype: integer overflowin in tt_hvadvance_adjust() in src/truetype/ttgxvar.c OpenJDK: memory corruption issue on x86_64 with AVX-512 (8317121) OpenJDK: certificate path validation issue during client authentication (8309966)
[ "cpe:/a:redhat:openjdk:17" ]
null
5.3
null
null
RHSA-2019:3742
Red Hat Security Advisory: qemu-kvm-rhev security update
QEMU: qxl: null pointer dereference while releasing spice resources QEMU: slirp: heap buffer overflow during packet reassembly
[ "cpe:/a:redhat:openstack:14::el7" ]
null
null
7
null
RHSA-2023:0077
Red Hat Security Advisory: .NET 6.0 security, bug fix, and enhancement update
dotnet: Parsing an empty HTTP response as a JSON.NET JObject causes a stack overflow and crashes a process
[ "cpe:/a:redhat:enterprise_linux:9::appstream", "cpe:/a:redhat:enterprise_linux:9::crb" ]
null
7.5
null
null
RHSA-2024:7699
Red Hat Security Advisory: thunderbird security update
firefox: thunderbird: Compromised content process can bypass site isolation firefox: thunderbird: Cross-origin access to PDF contents through multipart responses firefox: thunderbird: Cross-origin access to JSON contents through multipart responses firefox: thunderbird: Potential memory corruption may occur when cloning certain objects firefox: thunderbird: Potential directory upload bypass via clickjacking firefox: thunderbird: External protocol handlers could be enumerated via popups firefox: thunderbird: Specially crafted WebTransport requests could lead to denial of service firefox: thunderbird: Potential memory corruption during JIT compilation firefox: thunderbird: Memory safety bugs fixed in Firefox 131, Firefox ESR 115.16, Firefox ESR 128.3, Thunderbird 131, and Thunderbird 128.3 firefox: thunderbird: Memory safety bugs fixed in Firefox 131, Firefox ESR 128.3, Thunderbird 131, and Thunderbird 128.3 firefox: thunderbird: Memory safety bugs fixed in Firefox 131 and Thunderbird 131
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
7.5
null
null
RHSA-2021:0145
Red Hat Security Advisory: Red Hat OpenShift Serverless Client kn 1.12.0
golang: default Content-Type setting in net/http/cgi and net/http/fcgi could cause XSS golang: math/big: panic during recursive division of very large numbers golang: malicious symbol names can lead to code execution at build time golang: improper validation of cgo flags can lead to code execution at build time
[ "cpe:/a:redhat:serverless:1.0::el8" ]
null
7.5
null
null
RHSA-2021:2355
Red Hat Security Advisory: kernel security and bug fix update
kernel: malicious USB devices can lead to multiple out-of-bounds write kernel: Integer overflow in Intel(R) Graphics Drivers kernel: Local buffer overflow in ctnetlink_parse_tuple_filter in net/netfilter/nf_conntrack_netlink.c kernel: ICMP rate limiting can be used for DNS poisoning attack
[ "cpe:/o:redhat:rhel_aus:7.6::server", "cpe:/o:redhat:rhel_e4s:7.6::server", "cpe:/o:redhat:rhel_tus:7.6::server" ]
null
7.4
6.8
null
RHSA-2012:0304
Red Hat Security Advisory: vixie-cron security, bug fix, and enhancement update
cronie: Race condition by setting timestamp of user's crontab file, when editing the file
[ "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
RHSA-2014:1668
Red Hat Security Advisory: kernel security, bug fix, and enhancement update
Kernel: net: SCTP: fix a NULL pointer dereference during INIT collisions
[ "cpe:/o:redhat:rhel_eus:6.5::computenode", "cpe:/o:redhat:rhel_eus:6.5::server" ]
null
null
null
null
RHSA-2019:0566
Red Hat Security Advisory: openstack-ceilometer security and bug fix update
openstack-ceilometer: ceilometer-agent prints sensitive data from config files through log files
[ "cpe:/a:redhat:openstack:13::el7" ]
null
null
4
null
RHSA-2012:1200
Red Hat Security Advisory: rhev-hypervisor6 security and bug fix update
glibc: incorrect size calculation in formatted printing can lead to FORTIFY_SOURCE format string protection bypass glibc: incorrect use of extend_alloca() in formatted printing can lead to FORTIFY_SOURCE format string protection bypass glibc: printf() unbound alloca() usage in case of positional parameters + many format specs
[ "cpe:/o:redhat:enterprise_linux:6::hypervisor" ]
null
null
null
null
RHSA-2020:4157
Red Hat Security Advisory: thunderbird security update
Mozilla: Memory safety bugs fixed in Firefox 81 and Firefox ESR 78.3 Mozilla: XSS when pasting attacker-controlled data into a contenteditable element Mozilla: Download origin spoofing via redirect Mozilla: When recursing through layers while scrolling, an iterator may have become invalid, resulting in a potential use-after-free scenario
[ "cpe:/a:redhat:rhel_eus:8.1::appstream" ]
null
8.8
6.1
null
RHSA-2019:0204
Red Hat Security Advisory: systemd security update
systemd: stack overflow when calling syslog from a command with long cmdline systemd: stack overflow when receiving many journald entries
[ "cpe:/o:redhat:rhel_eus:7.5::computenode", "cpe:/o:redhat:rhel_eus:7.5::server" ]
null
null
7.5
null
RHSA-2013:0145
Red Hat Security Advisory: thunderbird security update
Mozilla: Use-after-free when displaying table with many columns and column groups (MFSA 2013-05) Mozilla: Compartment mismatch with quickstubs returned values (MFSA 2013-09) Mozilla: Address space layout leaked in XBL objects (MFSA 2013-11) Mozilla: Buffer overflow in Javascript string concatenation (MFSA 2013-12) Mozilla: Use-after-free in serializeToStream (MFSA 2013-16) Mozilla: Use-after-free in ListenerManager (MFSA 2013-17) Mozilla: Chrome Object Wrapper (COW) bypass through plugin objects (MFSA 2013-15) Mozilla: URL spoofing in addressbar during page loads (MFSA 2013-04) Mozilla: Use-after-free and buffer overflow issues found using Address Sanitizer (MFSA 2013-02) Mozilla: Use-after-free and buffer overflow issues found using Address Sanitizer (MFSA 2013-02) Mozilla: Use-after-free and buffer overflow issues found using Address Sanitizer (MFSA 2013-02) Mozilla: Miscellaneous memory safety hazards (rv:10.0.12) (MFSA 2013-01)
[ "cpe:/a:redhat:rhel_productivity:5", "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
null
null
RHSA-2020:1660
Red Hat Security Advisory: mod_auth_mellon security and bug fix update
mod_auth_mellon: Open Redirect via the login?ReturnTo= substring which could facilitate information theft
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
null
6.1
null
RHSA-2017:2771
Red Hat Security Advisory: emacs security update
emacs: command injection flaw within "enriched mode" handling
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
8.1
null
RHSA-2024:5325
Red Hat Security Advisory: firefox security update
mozilla: Fullscreen notification dialog can be obscured by document content mozilla: Out of bounds memory access in graphics shared memory handling mozilla: Type confusion in WebAssembly mozilla: Incomplete WebAssembly exception handing mozilla: Out of bounds read in editor component mozilla: CSP strict-dynamic bypass using web-compatibility shims mozilla: Missing permission check when creating a StreamFilter mozilla: Uninitialized memory used by WebGL mozilla: Use-after-free in JavaScript garbage collection mozilla: Use-after-free in IndexedDB mozilla: Document content could partially obscure security prompts
[ "cpe:/a:redhat:rhel_aus:8.4::appstream", "cpe:/a:redhat:rhel_e4s:8.4::appstream", "cpe:/a:redhat:rhel_tus:8.4::appstream" ]
null
6.1
null
null
RHSA-2024:2580
Red Hat Security Advisory: yajl security update
yajl: Memory leak in yajl_tree_parse function
[ "cpe:/a:redhat:rhel_eus:8.8::appstream", "cpe:/a:redhat:rhel_eus:8.8::crb" ]
null
6.5
null
null
RHSA-2019:2977
Red Hat Security Advisory: bind security update
bind: Limiting simultaneous TCP clients is ineffective
[ "cpe:/o:redhat:rhel_eus:7.5::computenode", "cpe:/o:redhat:rhel_eus:7.5::server" ]
null
null
8.6
null
RHSA-2019:0342
Red Hat Security Advisory: redhat-virtualization-host security update
systemd: stack overflow when calling syslog from a command with long cmdline systemd: stack overflow when receiving many journald entries
[ "cpe:/o:redhat:enterprise_linux:7::hypervisor" ]
null
null
7.5
null
RHSA-2019:2662
Red Hat Security Advisory: Red Hat OpenShift Container Platform 4.1 jenkins-2-plugins security update
jenkins-plugin-script-security: Sandbox bypass through type casts in Script Security Plugin jenkins-plugin-script-security: Sandbox bypass through method pointer expressions in Script Security Plugin jenkins-plugin-workflow-cps-global-lib: Missing permission check in Pipeline: Shared Groovy Libraries Plugin
[ "cpe:/a:redhat:openshift:4.1::el7" ]
null
null
4.3
null
RHSA-2024:0332
Red Hat Security Advisory: ACS 4.1 enhancement update
postgresql: Memory disclosure in aggregate function calls postgresql: Buffer overrun from integer overflow in array modification postgresql: Role pg_signal_backend can signal certain superuser processes. postgresql: extension script @substitutions@ within quoting allow SQL injection
[ "cpe:/a:redhat:advanced_cluster_security:4.1::el8" ]
null
7.5
null
null
RHSA-2004:597
Red Hat Security Advisory: mysql security update
security flaw security flaw security flaw security flaw security flaw security flaw security flaw
[ "cpe:/o:redhat:enterprise_linux:2.1::as", "cpe:/o:redhat:enterprise_linux:2.1::aw", "cpe:/o:redhat:enterprise_linux:2.1::es", "cpe:/o:redhat:enterprise_linux:2.1::ws" ]
null
null
null
null
RHSA-2021:1445
Red Hat Security Advisory: OpenJDK 8u292 Windows Builds release and security update
OpenJDK: Incorrect handling of partially quoted arguments in ProcessBuilder on Windows (Libraries, 8250568) OpenJDK: Incomplete enforcement of JAR signing disabled algorithms (Libraries, 8249906)
[ "cpe:/a:redhat:openjdk:1.8::windows" ]
null
5.3
null
null
RHSA-2006:0144
Red Hat Security Advisory: Updated kernel packages available for Red Hat Enterprise Linux 3 Update 7
security flaw security flaw security flaw security flaw
[ "cpe:/o:redhat:enterprise_linux:3::as", "cpe:/o:redhat:enterprise_linux:3::desktop", "cpe:/o:redhat:enterprise_linux:3::es", "cpe:/o:redhat:enterprise_linux:3::ws" ]
null
null
null
null
RHSA-2023:6849
Red Hat Security Advisory: Red Hat JBoss Fuse/A-MQ Fuse 6.3 R20 HF1 security and bug fix update
activemq-openwire: OpenWire Module: Unbounded deserialization causes ActiveMQ to be vulnerable to a remote code execution (RCE) attack
[ "cpe:/a:redhat:jboss_amq:6.3" ]
null
9.8
null
null
RHSA-2004:600
Red Hat Security Advisory: apache, mod_ssl security update
httpd mod_digest nonce not verified mod_ssl SSLCipherSuite bypass httpd mod_include SSI overflow
[ "cpe:/o:redhat:enterprise_linux:2.1::as", "cpe:/o:redhat:enterprise_linux:2.1::aw", "cpe:/o:redhat:enterprise_linux:2.1::es", "cpe:/o:redhat:enterprise_linux:2.1::ws" ]
null
null
null
null
RHSA-2012:0899
Red Hat Security Advisory: openldap security and bug fix update
(slapd): Assertion failure by processing search queries requesting only attributes for particular entry
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
null
null
RHSA-2022:4818
Red Hat Security Advisory: mariadb:10.3 security and bug fix update
mysql: Server: DML unspecified vulnerability (CPU Apr 2021) mysql: Server: DML unspecified vulnerability (CPU Apr 2021) mysql: InnoDB unspecified vulnerability (CPU Jul 2021) mysql: InnoDB unspecified vulnerability (CPU Jul 2021) mysql: InnoDB unspecified vulnerability (CPU Oct 2021) mariadb: Crash in get_sort_by_table() in subquery with ORDER BY having outer ref mariadb: save_window_function_values triggers an abort during IN subquery mariadb: Crash in set_var.cc via certain UPDATE queries with nested subqueries mariadb: Crash caused by mishandling of a pushdown from a HAVING clause to a WHERE clause mariadb: Integer overflow in sql_lex.cc integer leading to crash mariadb: crash in Used_tables_and_const_cache::used_tables_and_const_cache_join mariadb: improper locking due to unreleased lock in the ds_xbstream.cc mariadb: DoS due to improper locking due to unreleased lock in plugin/server_audit/server_audit.c
[ "cpe:/a:redhat:rhel_eus:8.4::appstream" ]
null
5.5
null
null
RHSA-2025:0662
Red Hat Security Advisory: grafana security update
go-git: argument injection via the URL field go-git: go-git clients vulnerable to DoS via maliciously crafted Git server replies
[ "cpe:/a:redhat:rhel_eus:9.4::appstream" ]
null
7.5
null
null
RHEA-2018:1547
Red Hat Enhancement Advisory: openvswitch bug fix and enhancement update
dpdk: Information exposure in unchecked guest physical to host virtual address translations
[ "cpe:/a:redhat:rhev_manager:4.2" ]
null
null
6.1
null
RHSA-2012:0150
Red Hat Security Advisory: Red Hat Enterprise Linux 5.8 kernel update
kernel: excessive in kernel CPU consumption when creating large nested epoll structures
[ "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
RHSA-2021:1202
Red Hat Security Advisory: Red Hat JBoss Web Server 3.1 Service Pack 12 security update
openssl: NULL pointer dereference in signature_algorithms processing openssl: CA certificate check bypass with X509_V_FLAG_X509_STRICT
[ "cpe:/a:redhat:jboss_enterprise_web_server:3.1::el7" ]
null
7.4
null
null