id
stringlengths
13
15
title
stringlengths
29
176
description
stringlengths
8
32.1k
cpes
listlengths
0
20
cvss_v4_0
null
cvss_v3_1
float64
0
10
cvss_v3_0
float64
0
10
cvss_v2_0
null
RHBA-2019:3674
Red Hat Bug Fix Advisory: openldap bug fix and enhancement update
openldap: Certificate validation incorrectly matches name against CN-ID
[ "cpe:/o:redhat:enterprise_linux:8::baseos" ]
null
4.2
null
null
RHSA-2011:0004
Red Hat Security Advisory: kernel security, bug fix, and enhancement update
kernel: sctp: do not reset the packet during sctp_packet_config kernel: prevent heap corruption in snd_ctl_new() kernel: guest->host denial of service from invalid xenbus transitions kernel: setup_arg_pages: diagnose excessive argument size kernel: tipc: heap overflow in tipc_msg_build() kernel: iovec integer overflow in net/rds/rdma.c kernel: net/packet/af_packet.c: reading uninitialized stack memory kernel: logic error in INET_DIAG bytecode auditing kernel: ipc/sem.c: reading uninitialized stack memory kernel: gdth: integer overflow in ioc_general() kernel: rhel5 commit 6865201191 caused deadlock kernel: missing tty ops write function presence check in hci_uart_tty_open() xen: request-processing loop is unbounded in blkback kernel: posix-cpu-timers: workaround to suppress the problems with mt exec
[ "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
RHSA-2022:6173
Red Hat Security Advisory: rsync security update
rsync: remote arbitrary files write inside the directories of connecting peers
[ "cpe:/o:redhat:rhel_e4s:8.1::baseos" ]
null
7.4
null
null
RHSA-2024:0625
Red Hat Security Advisory: libssh security update
ssh: Prefix truncation attack on Binary Packet Protocol (BPP)
[ "cpe:/a:redhat:rhel_eus:8.8::appstream", "cpe:/o:redhat:rhel_eus:8.8::baseos" ]
null
5.9
null
null
RHSA-2017:1664
Red Hat Security Advisory: Red Hat Enterprise Linux 6.2 Advanced Mission Critical 6-Month Notice
This is the six-month notification for the retirement of Red Hat Enterprise Linux 6.2 Advanced Mission Critical (AMC). This notification applies only to those customers subscribed to the Advanced Mission Critical (AMC) channel for Red Hat Enterprise Linux 6.2.
[ "cpe:/o:redhat:rhel_mission_critical:6.2::server" ]
null
null
null
null
RHSA-2024:3178
Red Hat Security Advisory: linux-firmware security update
hw: intel: Protection mechanism failure for some Intel(R) PROSet/Wireless WiFi hw: amd: INVD instruction may lead to a loss of SEV-ES guest machine memory integrity problem
[ "cpe:/o:redhat:enterprise_linux:8::baseos" ]
null
5.3
null
null
RHSA-2023:0552
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.4.9 Security update
jquery: Cross-site scripting via cross-domain ajax requests bootstrap: XSS in the data-target attribute nodejs-moment: Regular expression denial of service bootstrap: Cross-site Scripting (XSS) in the collapse data-parent attribute bootstrap: Cross-site Scripting (XSS) in the data-target property of scrollspy bootstrap: Cross-site Scripting (XSS) in the data-container property of tooltip bootstrap: XSS in the tooltip or popover data-template attribute jquery: Prototype pollution in object's prototype leading to denial of service, remote code execution, or property injection jquery: Cross-site scripting due to improper injQuery.htmlPrefilter method jquery: Untrusted code execution via <option> tag in HTML passed to DOM manipulation methods wildfly-elytron: possible timing attacks via use of unsafe comparator jettison: parser crash by stackoverflow jettison: memory exhaustion via user-supplied XML or JSON data woodstox-core: woodstox to serialise XML data was vulnerable to Denial of Service attacks jackson-databind: deep wrapper array nesting wrt UNWRAP_SINGLE_VALUE_ARRAYS jackson-databind: use of deeply nested arrays mina-sshd: Java unsafe deserialization vulnerability jettison: If the value in map is the map's self, the new new JSONObject(map) cause StackOverflowError which may lead to dos CXF: SSRF Vulnerability
[ "cpe:/a:redhat:jboss_enterprise_application_platform:7.4::el7" ]
null
9.8
5.6
null
RHSA-2008:0500
Red Hat Security Advisory: rhpki-common security update
System: incorrect handling of Extensions in CSRs (cs71)
[ "cpe:/a:redhat:certificate_system:7.3" ]
null
null
null
null
RHSA-2024:4352
Red Hat Security Advisory: kernel-rt security and bug fix update
kernel: Bluetooth BR/EDR PIN Pairing procedure is vulnerable to an impersonation attack kernel: PCI interrupt mapping cause oops kernel: ovl: fix leaked dentry kernel: ipc/mqueue, msg, sem: avoid relying on a stack reference past its expiry kernel: platform/x86: dell-smbios-wmi: Fix oops on rmmod dell_smbios kernel: net: cdc_eem: fix tx fixup skb leak kernel: net: ti: fix UAF in tlan_remove_one kernel: net: qcom/emac: fix UAF in emac_remove kernel: udf: Fix NULL pointer dereference in udf_symlink function kernel: mISDN: fix possible use-after-free in HFC_cleanup() kernel: can: peak_pci: peak_pci_remove(): fix UAF kernel: usbnet: sanity check for maxpacket kernel: KVM: SVM: improper check in svm_set_x2apic_msr_interception allows direct access to host x2apic msrs kernel: EDAC/thunderx: Incorrect buffer size in drivers/edac/thunderx_edac.c kernel: mm/damon/vaddr-test: memory leak in damon_do_test_apply_three_regions() kernel: hwrng: core - Fix page fault dead lock on mmap-ed hwrng kernel: net/mlx5e: Fix operation precedence bug in port timestamping napi_poll context kernel: net/mlx5e: fix a potential double-free in fs_any_create_groups kernel: tipc: fix kernel warning when sending SYN message kernel: net/usb: kalmia: Don&#39;t pass act_len in usb_bulk_msg error path kernel: usb: config: fix iteration issue in &#39;usb_get_bos_descriptor()&#39; kernel: crypto: pcrypt - Fix hungtask for PADATA_RESET kernel: perf/core: Bail out early if the request AUX area is out of bound kernel: usb: typec: tcpm: Fix NULL pointer dereference in tcpm_pd_svdm() kernel: can: dev: can_put_echo_skb(): don&#39;t crash kernel if can_priv::echo_skb is accessed out of bounds kernel: TCP-spoofed ghost ACKs and leak leak initial sequence number kernel: tls: race between async notify and socket close kernel: tls: handle backlogging of crypto requests kernel: tls: race between tx work scheduling and socket close kernel: drm/amdgpu: use-after-free vulnerability kernel: ppp_async: limit MRU to 64K kernel: ipv6: sr: fix possible use-after-free and null-ptr-deref kernel: mm/swap: fix race when skipping swapcache kernel: Bluetooth: Avoid potential use-after-free in hci_error_reset kernel: net: ip_tunnel: prevent perpetual headroom growth kernel: mptcp: fix data re-injection from stale subflow kernel: net/bnx2x: Prevent access to a freed page in page_pool kernel: x86/mm: Disallow vsyscall page read for copy_from_kernel_nofault() kernel: RDMA/mlx5: Fix fortify source warning while accessing Eth segment kernel: crypto: qat - resolve race condition during AER recovery kernel: Squashfs: check the inode number is not the invalid value of zero kernel: netfilter: nf_tables: use timestamp to check for set element timeout kernel: wifi: nl80211: reject iftype change with mesh ID change kernel: wifi: mac80211: check/clear fast rx for non-4addr sta VLAN changes kernel: net/mlx5e: fix a double-free in arfs_create_groups kernel: wifi: mac80211: fix potential sta-link leak kernel: wifi: iwlwifi: dbg-tlv: ensure NUL termination kernel: mlxsw: spectrum_acl_tcam: Fix memory leak when canceling rehash work kernel: mlxsw: spectrum_acl_tcam: Fix memory leak during rehash kernel: mlxsw: spectrum_acl_tcam: Fix possible use-after-free during rehash kernel: mlxsw: spectrum_acl_tcam: Fix possible use-after-free during activity update kernel: erspan: make sure erspan_base_hdr is present in skb-&gt;head kernel: gro: fix ownership transfer kernel: net: ena: Fix incorrect descriptor free behavior kernel: net/mlx5e: Fix mlx5e_priv_init() cleanup flow kernel: net/mlx5: Properly link new fs rules into the tree kernel: i40e: Do not use WQ_MEM_RECLAIM flag for workqueue kernel: mlxsw: spectrum_acl_tcam: Fix warning during rehash
[ "cpe:/a:redhat:enterprise_linux:8::nfv", "cpe:/a:redhat:enterprise_linux:8::realtime" ]
null
5.5
null
null
RHSA-2025:1580
Red Hat Security Advisory: gcc security update
jquery: Untrusted code execution via <option> tag in HTML passed to DOM manipulation methods
[ "cpe:/o:redhat:rhel_aus:7.7::server" ]
null
6.1
null
null
RHSA-2014:0923
Red Hat Security Advisory: kernel security update
kernel: x86_64: ptrace: sysret to non-canonical address kernel: net: pppol2tp: level handling in pppol2tp_[s,g]etsockopt()
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
null
null
RHSA-2017:2698
Red Hat Security Advisory: openvswitch security update
openvswitch: Integer underflow in the ofputil_pull_queue_get_config_reply10 function openvswitch: Invalid processing of a malicious OpenFlow role status message openvswitch: Buffer over-read while parsing the group mod OpenFlow message
[ "cpe:/a:redhat:openstack:7::el7" ]
null
null
5.6
null
RHSA-2012:1132
Red Hat Security Advisory: icedtea-web security update
icedtea-web: getvalueforurl uninitialized instance pointer icedtea-web: incorrect handling of not 0-terminated strings
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
null
null
RHSA-2019:0081
Red Hat Security Advisory: openvswitch security and bug fix update
openvswitch: Mishandle of group mods in lib/ofp-util.c:parse_group_prop_ntr_selection_method() allows for assertion failure openvswitch: Error during bundle commit in ofproto/ofproto.c:ofproto_rule_insert__() allows for crash openvswitch: Buffer over-read in lib/ofp-actions.c:decode_bundle()
[ "cpe:/a:redhat:openstack:13::el7" ]
null
null
4.9
null
RHSA-2021:1758
Red Hat Security Advisory: exiv2 security, bug fix, and enhancement update
exiv2: out-of-bounds read in CiffDirectory::readDirectory due to lack of size check
[ "cpe:/a:redhat:enterprise_linux:8::appstream", "cpe:/a:redhat:enterprise_linux:8::crb" ]
null
null
6.5
null
RHSA-2022:0081
Red Hat Security Advisory: virt:av and virt-devel:av security and bug fix update
QEMU: off-by-one error in mode_sense_page() in hw/scsi/scsi-disk.c QEMU: net: e1000: infinite loop while processing transmit descriptors
[ "cpe:/a:redhat:advanced_virtualization:8.5::el8" ]
null
3.2
null
null
RHSA-2018:0488
Red Hat Security Advisory: bind security update
bind: Improper fetch cleanup sequencing in the resolver can cause named to crash
[ "cpe:/o:redhat:rhel_aus:7.2::server", "cpe:/o:redhat:rhel_e4s:7.2::server", "cpe:/o:redhat:rhel_eus:7.3::computenode", "cpe:/o:redhat:rhel_eus:7.3::server", "cpe:/o:redhat:rhel_tus:7.2::server" ]
null
null
7.5
null
RHSA-2024:6297
Red Hat Security Advisory: kernel security update
kernel: cxgb4: avoid accessing registers when clearing filters kernel: nvme-rdma: destroy cm id before destroy qp to avoid use after free kernel: userfaultfd: fix a race between writeprotect and exit_mmap() kernel: mm/slub: fix to return errno if kmalloc() fails kernel: iommu: Fix potential use-after-free during probe kernel: hv_netvsc: Fix race condition between netvsc_probe and netvsc_remove kernel: Squashfs: check the inode number is not the invalid value of zero kernel: vt: fix unicode buffer corruption when deleting characters kernel: bnxt_re: avoid shift undefined behavior in bnxt_qplib_alloc_init_hwq kernel: bpf: Add BPF_PROG_TYPE_CGROUP_SKB attach type enforcement in BPF_LINK_CREATE kernel: r8169: Fix possible ring buffer corruption on fragmented Tx packets. kernel: xfs: add bounds checking to xlog_recover_process_data
[ "cpe:/o:redhat:rhel_aus:8.6::baseos", "cpe:/o:redhat:rhel_e4s:8.6::baseos", "cpe:/o:redhat:rhel_tus:8.6::baseos" ]
null
6.1
null
null
RHSA-2020:3144
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.2 security update
wildfly: unsafe deserialization in Wildfly Enterprise Java Beans wildfly: Some EJB transaction objects may get accumulated causing Denial of Service wildfly: EJB SessionOpenInvocations may not be removed properly after a response is received causing Denial of Service
[ "cpe:/a:redhat:jboss_enterprise_application_platform:7.2" ]
null
6.5
null
null
RHSA-2018:1957
Red Hat Security Advisory: git security update
git: arbitrary code execution when recursively cloning a malicious repository
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
8.8
null
RHSA-2002:192
Red Hat Security Advisory: : Updated Mozilla packages fix security vulnerabilities
security flaw security flaw security flaw security flaw
[ "cpe:/o:redhat:linux:7.2", "cpe:/o:redhat:linux:7.3", "cpe:/o:redhat:linux:8.0" ]
null
null
null
null
RHSA-2010:0141
Red Hat Security Advisory: tar security update
tar/cpio stack crashing in safer_name_suffix cpio: Heap-based buffer overflow by expanding a specially-crafted archive
[ "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws", "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
RHSA-2016:1439
Red Hat Security Advisory: Red Hat Single Sign-On security update
JGroups: Authorization bypass
[ "cpe:/a:redhat:jboss_single_sign_on:7.0" ]
null
null
9.8
null
RHSA-2024:4943
Red Hat Security Advisory: httpd security update
httpd: Substitution encoding issue in mod_rewrite httpd: Improper escaping of output in mod_rewrite httpd: NULL pointer dereference in mod_proxy
[ "cpe:/o:redhat:rhel_els:7" ]
null
7.5
null
null
RHSA-2020:4442
Red Hat Security Advisory: sqlite security update
sqlite: Use-after-free in window function leading to remote code execution sqlite: Division by zero in whereLoopAddBtreeIndex in sqlite3.c sqlite: selectExpander in select.c proceeds with WITH stack unwinding even after a parsing error sqlite: Out-of-bounds read in SELECT with ON/USING clause sqlite: NULL pointer dereference and segmentation fault because of generated column optimizations sqlite: Use-after-free in fts3EvalNextRow in ext/fts3/fts3.c sqlite: Virtual table can be renamed into the name of one of its shadow tables sqlite: NULL pointer dereference in ext/fts3/fts3_snippet.c via a crafted matchinfo() query
[ "cpe:/a:redhat:enterprise_linux:8::appstream", "cpe:/o:redhat:enterprise_linux:8::baseos" ]
null
5.5
6.5
null
RHSA-2020:3275
Red Hat Security Advisory: grub2 security and bug fix update
grub2: Crafted grub.cfg file can lead to arbitrary code execution during boot process grub2: grub_malloc does not validate allocation size allowing for arithmetic overflow and subsequent heap-based buffer overflow grub2: Integer overflow in grub_squash_read_symlink may lead to heap-based buffer overflow grub2: Integer overflow read_section_as_string may lead to heap-based buffer overflow grub2: Integer overflow in grub_ext2_read_link leads to heap-based buffer overflow grub2: Fail kernel validation without shim protocol grub2: Use-after-free redefining a function whilst the same function is already executing grub2: Integer overflow in initrd size handling
[ "cpe:/o:redhat:rhel_aus:7.4::server", "cpe:/o:redhat:rhel_e4s:7.4::server", "cpe:/o:redhat:rhel_tus:7.4::server" ]
null
5.7
null
null
RHSA-2021:4829
Red Hat Security Advisory: OpenShift Container Platform 4.8.22 security update
coreos-installer: restrict access permissions on /boot/ignition{,/config.ign} jenkins: FilePath#mkdirs does not check permission to create parent directories jenkins: File path filters do not canonicalize paths, allowing operations to follow symbolic links to outside allowed directories jenkins: FilePath#untar does not check permission to create symbolic links when unarchiving a symbolic link jenkins: FilePath#reading(FileVisitor) does not reject any operations allowing users to have unrestricted read access jenkins: FilePath#unzip and FilePath#untar were not subject to any access control jenkins: Agent processes are able to completely bypass file path filtering by wrapping the file operation in an agent file path jenkins: Creating symbolic links is possible without the symlink permission jenkins: The operations FilePath#renameTo and FilePath#moveAllChildrenTo only check read permission on the source path jenkins: When creating temporary files, permission to create files is only checked after they’ve been created. jenkins: FilePath#toURI, FilePath#hasSymlink, FilePath#absolutize, FilePath#isDescendant, and FilePath#get*DiskSpace do not check any permissions jenkins: FilePath#listFiles lists files outside directories with agent read access when following symbolic links. jenkins: Agent-to-controller access control allowed writing to sensitive directory used by Pipeline: Shared Groovy Libraries Plugin jenkins: Agent-to-controller access control allows reading/writing most content of build directories jenkins-2-plugins/subversion: does not restrict the name of a file when looking up a subversion key
[ "cpe:/a:redhat:openshift:4.8::el7", "cpe:/a:redhat:openshift:4.8::el8" ]
null
7.5
null
null
RHSA-2022:0444
Red Hat Security Advisory: Red Hat Single Sign-On 7.4.10 on OpenJDK for OpenShift image security update
log4j: Remote code execution in Log4j 1.x when application is configured to use JMSAppender log4j: Remote code execution in Log4j 1.x when application is configured to use JMSSink log4j: SQL injection in Log4j 1.x when application is configured to use JDBCAppender log4j: Unsafe deserialization flaw in Chainsaw log viewer
[ "cpe:/a:redhat:rhosemc:1.0::el8" ]
null
8.8
null
null
RHSA-2023:3579
Red Hat Security Advisory: firefox security update
Mozilla: Click-jacking certificate exceptions through rendering lag Mozilla: Memory safety bugs fixed in Firefox 114 and Firefox ESR 102.12
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
9.8
null
null
RHSA-2017:2800
Red Hat Security Advisory: kernel security update
kernel: load_elf_ binary() does not take account of the need to allocate sufficient space for the entire binary
[ "cpe:/o:redhat:rhel_mission_critical:6.2::server" ]
null
null
7.8
null
RHSA-2018:1647
Red Hat Security Advisory: java-1.7.0-openjdk security update
hw: cpu: speculative store bypass
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
5.6
null
RHSA-2024:5324
Red Hat Security Advisory: firefox security update
mozilla: Fullscreen notification dialog can be obscured by document content mozilla: Out of bounds memory access in graphics shared memory handling mozilla: Type confusion in WebAssembly mozilla: Incomplete WebAssembly exception handing mozilla: Out of bounds read in editor component mozilla: CSP strict-dynamic bypass using web-compatibility shims mozilla: Missing permission check when creating a StreamFilter mozilla: Uninitialized memory used by WebGL mozilla: Use-after-free in JavaScript garbage collection mozilla: Use-after-free in IndexedDB mozilla: Document content could partially obscure security prompts
[ "cpe:/o:redhat:rhel_els:7" ]
null
6.1
null
null
RHSA-2020:5506
Red Hat Security Advisory: kernel-rt security and bug fix update
kernel: information exposure in drivers/char/random.c and kernel/time/timer.c
[ "cpe:/a:redhat:enterprise_linux:8::nfv", "cpe:/a:redhat:enterprise_linux:8::realtime" ]
null
3.7
null
null
RHSA-2024:6559
Red Hat Security Advisory: postgresql:12 security update
postgresql: PostgreSQL relation replacement during pg_dump executes arbitrary SQL
[ "cpe:/a:redhat:rhel_aus:8.6::appstream", "cpe:/a:redhat:rhel_e4s:8.6::appstream", "cpe:/a:redhat:rhel_tus:8.6::appstream" ]
null
7.5
null
null
RHSA-2022:6166
Red Hat Security Advisory: thunderbird security update
Mozilla: Address bar spoofing via XSLT error handling Mozilla: Cross-origin XSLT Documents would have inherited the parent's permissions Mozilla: Data race and potential use-after-free in PK11_ChangePW Mozilla: Memory safety bugs fixed in Firefox 104 and Firefox ESR 102.2 Mozilla: Memory safety bugs fixed in Firefox 104, Firefox ESR 102.2, and Firefox ESR 91.13
[ "cpe:/a:redhat:rhel_eus:8.4::appstream" ]
null
8.8
7.5
null
RHSA-2023:0610
Red Hat Security Advisory: git security update
git: gitattributes parsing integer overflow git: Heap overflow in `git archive`, `git log --format` leading to RCE
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
9.8
null
null
RHSA-2022:8870
Red Hat Security Advisory: Red Hat OpenStack Platform 16.1.9 (openstack-neutron) security update
openstack-neutron: unrestricted creation of security groups
[ "cpe:/a:redhat:openstack:16.1::el8" ]
null
4.3
null
null
RHSA-2024:2528
Red Hat Security Advisory: mingw-glib2 security update
glib: GVariant offset table entry size is not checked in is_normal() glib: g_variant_byteswap() can take a long time with some non-normal inputs glib: Timeout in fuzz_variant_text glib: GVariant deserialisation does not match spec for non-normal data
[ "cpe:/a:redhat:enterprise_linux:9::crb" ]
null
6.5
null
null
RHSA-2014:0137
Red Hat Security Advisory: flash-plugin security update
flash-plugin: integer underflow flaw leads to arbitrary code execution (APSB14-04)
[ "cpe:/a:redhat:rhel_extras:5::client", "cpe:/a:redhat:rhel_extras:5::server", "cpe:/a:redhat:rhel_extras:6" ]
null
null
null
null
RHSA-2025:3929
Red Hat Security Advisory: ACS 4.6 enhancement and security update
http-proxy-middleware: Denial of Service redoc: Prototype Pollution in redoc golang-jwt/jwt: jwt-go allows excessive memory allocation during header parsing
[ "cpe:/a:redhat:advanced_cluster_security:4.6::el8" ]
null
7.5
null
null
RHSA-2012:0407
Red Hat Security Advisory: libpng security update
libpng: buffer overflow in png_inflate caused by invalid type conversions
[ "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::client_workstation", "cpe:/o:redhat:enterprise_linux:5::server", "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
null
null
RHSA-2021:0167
Red Hat Security Advisory: postgresql:9.6 security update
postgresql: Selectivity estimators bypass row security policies postgresql: TYPE in pg_temp executes arbitrary SQL during SECURITY DEFINER execution postgresql: ALTER ... DEPENDS ON EXTENSION is missing authorization checks postgresql: Uncontrolled search path element in CREATE EXTENSION postgresql: Reconnection can downgrade connection security settings postgresql: Multiple features escape "security restricted operation" sandbox postgresql: psql's \gset allows overwriting specially treated variables
[ "cpe:/a:redhat:rhel_eus:8.1::appstream" ]
null
7.5
7.5
null
RHSA-2017:1599
Red Hat Security Advisory: ansible security update
ansible: Arbitrary code execution on control node (incomplete fix for CVE-2016-9587) ansible: Security issue with lookup return not tainting the jinja2 environment
[ "cpe:/a:redhat:openstack:10::el7" ]
null
null
5.3
null
RHBA-2020:5356
Red Hat Bug Fix Advisory: OpenShift Container Platform 4.5.23 packages update
golang: data race in certain net/http servers including ReverseProxy can lead to DoS golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs
[ "cpe:/a:redhat:openshift:4.5::el7", "cpe:/a:redhat:openshift:4.5::el8" ]
null
7.5
null
null
RHSA-2020:5111
Red Hat Security Advisory: virt:8.2 and virt-devel:8.2 security and bug fix update
QEMU: reachable assertion failure in net_tx_pkt_add_raw_fragment() in hw/net/net_tx_pkt.c libvirt: double free in qemuAgentGetInterfaces() in qemu_agent.c
[ "cpe:/a:redhat:advanced_virtualization:8.2::el8" ]
null
6.4
null
null
RHSA-2015:0034
Red Hat Security Advisory: Red Hat JBoss Data Virtualization 6.0.0 security update
HawtJNI: predictable temporary file name leading to local arbitrary code execution EAP6: Plain text password logging during security audit Odata4j: XML eXternal Entity (XXE) flaw
[ "cpe:/a:redhat:jboss_data_virtualization:6.0" ]
null
null
null
null
RHSA-2024:7855
Red Hat Security Advisory: thunderbird security update
firefox: thunderbird: Compromised content process can bypass site isolation firefox: thunderbird: Cross-origin access to PDF contents through multipart responses firefox: thunderbird: Cross-origin access to JSON contents through multipart responses firefox: thunderbird: Potential memory corruption may occur when cloning certain objects firefox: thunderbird: Potential directory upload bypass via clickjacking firefox: thunderbird: External protocol handlers could be enumerated via popups firefox: thunderbird: Specially crafted WebTransport requests could lead to denial of service firefox: thunderbird: Potential memory corruption during JIT compilation firefox: thunderbird: Memory safety bugs fixed in Firefox 131, Firefox ESR 115.16, Firefox ESR 128.3, Thunderbird 131, and Thunderbird 128.3 firefox: thunderbird: Memory safety bugs fixed in Firefox 131, Firefox ESR 128.3, Thunderbird 131, and Thunderbird 128.3 firefox: thunderbird: Memory safety bugs fixed in Firefox 131 and Thunderbird 131
[ "cpe:/a:redhat:rhel_e4s:9.0::appstream" ]
null
7.5
null
null
RHSA-2017:0847
Red Hat Security Advisory: curl security update
curl: negotiate not treated as connection-oriented (incomplete fix for CVE-2015-3148)
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
4.8
null
RHSA-2024:8036
Red Hat Security Advisory: .NET 6.0 security update
dotnet: Multiple .NET components susceptible to hash flooding dotnet: System.IO.Packaging - Multiple DoS vectors in use of SortedList dotnet: Denial of Service in System.Text.Json
[ "cpe:/a:redhat:rhel_eus:8.8::appstream", "cpe:/a:redhat:rhel_eus:8.8::crb" ]
null
7.5
null
null
RHSA-2020:5428
Red Hat Security Advisory: kernel-rt security and bug fix update
kernel: information exposure in drivers/char/random.c and kernel/time/timer.c
[ "cpe:/a:redhat:rhel_eus:8.2::nfv", "cpe:/a:redhat:rhel_eus:8.2::realtime" ]
null
3.7
null
null
RHSA-2020:2306
Red Hat Security Advisory: OpenShift Container Platform 4.2.34 ose-openshift-apiserver-container security update
kubernetes: Use of unbounded 'client' label in apiserver_request_total allows for memory exhaustion
[ "cpe:/a:redhat:openshift:4.2::el7" ]
null
4.3
null
null
RHSA-2023:4517
Red Hat Security Advisory: kernel security and bug fix update
kernel: use-after-free in l2cap_connect and l2cap_le_connect_req in net/bluetooth/l2cap_core.c kernel: tcindex: use-after-free vulnerability in traffic control index filter allows privilege escalation kernel: Use-after-free vulnerability in the Linux Kernel traffic control index filter kernel: OOB access in the Linux kernel's XFS subsystem kernel: i2c: out-of-bounds write in xgene_slimpro_i2c_xfer() kernel: use-after-free vulnerability in the perf_group_detach function of the Linux Kernel Performance Events
[ "cpe:/a:redhat:enterprise_linux:8::crb", "cpe:/o:redhat:enterprise_linux:8::baseos" ]
null
7.8
null
null
RHSA-2020:2509
Red Hat Security Advisory: Red Hat JBoss Web Server 5.3.1 security update
tomcat: deserialization flaw in session persistence storage leading to RCE
[ "cpe:/a:redhat:jboss_enterprise_web_server:5.3" ]
null
7
null
null
RHSA-2021:2391
Red Hat Security Advisory: postgresql:9.6 security update
postgresql: Buffer overrun from integer overflow in array subscripting calculations postgresql: Memory disclosure in INSERT ... ON CONFLICT ... DO UPDATE
[ "cpe:/a:redhat:rhel_eus:8.2::appstream" ]
null
6.5
null
null
RHSA-2017:2493
Red Hat Security Advisory: Red Hat JBoss Web Server 2 security update
openssl: OCSP Status Request extension unbounded memory growth SSL/TLS: Malformed plain-text ALERT packets could cause remote DoS tomcat: Incorrect handling of pipelined requests when send file was used tomcat: Security constrained bypass in error page mechanism
[ "cpe:/a:redhat:jboss_enterprise_web_server:2::el6", "cpe:/a:redhat:jboss_enterprise_web_server:2::el7" ]
null
null
7.5
null
RHSA-2021:4933
Red Hat Security Advisory: nss security update
nss: Memory corruption in decodeECorDsaSignature with DSA signatures (and RSA-PSS)
[ "cpe:/o:redhat:rhel_aus:7.6::server", "cpe:/o:redhat:rhel_e4s:7.6::server", "cpe:/o:redhat:rhel_tus:7.6::server" ]
null
9.8
null
null
RHSA-2014:1051
Red Hat Security Advisory: flash-plugin security update
flash-plugin: multiple code execution or security bypass flaws (APSB14-18) flash-plugin: multiple code execution or security bypass flaws (APSB14-18) flash-plugin: multiple code execution or security bypass flaws (APSB14-18) flash-plugin: multiple code execution or security bypass flaws (APSB14-18) flash-plugin: multiple code execution or security bypass flaws (APSB14-18) flash-plugin: multiple code execution or security bypass flaws (APSB14-18) flash-plugin: multiple code execution or security bypass flaws (APSB14-18) flash-plugin: multiple code execution or security bypass flaws (APSB14-18)
[ "cpe:/a:redhat:rhel_extras:5::client", "cpe:/a:redhat:rhel_extras:5::server", "cpe:/a:redhat:rhel_extras:6" ]
null
null
null
null
RHSA-2020:1047
Red Hat Security Advisory: wireshark security and bug fix update
wireshark: SIGCOMP dissector crash in packet-sigcomp.c wireshark: Out-of-bounds read in packet-ldss.c wireshark: Multiple dissectors could crash (wnpa-sec-2018-36) wireshark: DICOM dissector infinite loop (wnpa-sec-2018-39) wireshark: Bazaar dissector infinite loop (wnpa-sec-2018-40) wireshark: Radiotap dissector crash wireshark: Infinite loop in the MMSE dissector
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
5.3
null
RHSA-2024:7428
Red Hat Security Advisory: kpatch-patch-5_14_0-70_112_1 and kpatch-patch-5_14_0-70_85_1 security update
kernel: wifi: mac80211: Avoid address calculations via out of bounds array indexing
[ "cpe:/o:redhat:rhel_e4s:9.0::baseos" ]
null
7.8
null
null
RHSA-2005:523
Red Hat Security Advisory: RealPlayer security update
security flaw
[ "cpe:/a:redhat:rhel_extras:3", "cpe:/a:redhat:rhel_extras:4" ]
null
null
null
null
RHSA-2020:1631
Red Hat Security Advisory: GStreamer, libmad, and SDL security, bug fix, and enhancement update
libmad: Double-free in the mad_decoder_run() function
[ "cpe:/a:redhat:enterprise_linux:8::appstream", "cpe:/a:redhat:enterprise_linux:8::crb" ]
null
null
3.3
null
RHSA-2015:1583
Red Hat Security Advisory: kernel security and bug fix update
kernel: ping sockets: use-after-free leading to local privilege escalation
[ "cpe:/o:redhat:rhel_eus:6.5::computenode", "cpe:/o:redhat:rhel_eus:6.5::server" ]
null
null
null
null
RHSA-2014:0513
Red Hat Security Advisory: libxml2 security update
libxml2: Out-of-bounds read via a document that ends abruptly libxml2: external parameter entity loaded when entity substitution is disabled
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
null
null
RHSA-2022:1292
Red Hat Security Advisory: Release of OpenShift Serverless 1.21.1
spring-cloud-function: Remote code execution by malicious Spring Expression
[ "cpe:/a:redhat:serverless:1.21::el8" ]
null
9.8
null
null
RHSA-2021:1762
Red Hat Security Advisory: virt:rhel and virt-devel:rhel security, bug fix, and enhancement update
QEMU: heap buffer overflow in iscsi_aio_ioctl_cb() in block/iscsi.c may lead to information disclosure QEMU: reachable assertion failure in net_tx_pkt_add_raw_fragment() in hw/net/net_tx_pkt.c libvirt: double free in qemuAgentGetInterfaces() in qemu_agent.c QEMU: infinite loop in e1000e_write_packet_to_guest() in hw/net/e1000e_core.c QEMU: assertion failure through usb_packet_unmap() in hw/usb/hcd-ehci.c QEMU: heap buffer overflow in msix_table_mmio_write() in hw/pci/msix.c QEMU: e1000e: infinite loop scenario in case of null packet descriptor QEMU: slirp: out-of-bounds access while processing ARP/NCSI packets QEMU: slirp: out-of-bounds access while processing ARP/NCSI packets QEMU: ide: atapi: OOB access while processing read commands
[ "cpe:/a:redhat:enterprise_linux:8::appstream", "cpe:/a:redhat:enterprise_linux:8::crb" ]
null
3.9
null
null
RHSA-2024:3421
Red Hat Security Advisory: kernel security and bug fix update
kernel: Use-after-free in nft_verdict_dump due to a race between set GC and transaction kernel: Marvin vulnerability side-channel leakage in the RSA decryption operation kernel: inactive elements in nft_pipapo_walk kernel: netfilter: nftables: exthdr: fix 4-byte stack OOB write kernel: nf_tables: use-after-free vulnerability in the nft_verdict_init() function hw: amd: Instruction raise #VC exception at exit hw: amd: Instruction raise #VC exception at exit kernel: mlxsw: spectrum_acl_tcam: Fix stack corruption
[ "cpe:/a:redhat:rhel_eus:9.0::appstream", "cpe:/a:redhat:rhel_eus:9.0::crb", "cpe:/o:redhat:rhel_eus:9.0::baseos" ]
null
6.7
null
null
RHSA-2024:8157
Red Hat Security Advisory: kernel security update
kernel: hwmon: (w83792d) Fix NULL pointer dereference by removing unnecessary structure field kernel: Local information disclosure on Intel(R) Atom(R) processors kernel: net/sched: taprio: extend minimum interval restriction to entire cycle too kernel: xfs: fix log recovery buffer allocation for the legacy h_size fixup kernel: firmware: cs_dsp: Use strnlen() on name fields in V1 wmfw files kernel: ibmvnic: Add tx check to prevent skb leak kernel: pinctrl: fix deadlock in create_pinctrl() when handling -EPROBE_DEFER kernel: sched: act_ct: take care of padding in struct zones_ht_key kernel: tipc: Return non-zero value from tipc_udp_addr2str() on error
[ "cpe:/a:redhat:rhel_eus:9.2::appstream", "cpe:/a:redhat:rhel_eus:9.2::crb", "cpe:/o:redhat:rhel_eus:9.2::baseos" ]
null
7.3
null
null
RHSA-2020:5240
Red Hat Security Advisory: thunderbird security update
Mozilla: Variable time processing of cross-origin images during drawImage calls Mozilla: Parsing mismatches could confuse and bypass security sanitizer for chrome privileged code Mozilla: Fullscreen could be enabled without displaying the security UI Mozilla: XSS through paste (manual and clipboard API) Mozilla: Requests intercepted through ServiceWorkers lacked MIME type restrictions Mozilla: Use-after-free in WebRequestService Mozilla: Potential use-after-free in uses of nsTArray Mozilla: DoH did not filter IPv4 mapped IP Addresses Mozilla: Software keyboards may have remembered typed passwords Mozilla: Memory safety bugs fixed in Firefox 83 and Firefox ESR 78.5
[ "cpe:/a:redhat:rhel_e4s:8.0::appstream" ]
null
8.8
6.1
null
RHSA-2024:2885
Red Hat Security Advisory: firefox security update
Mozilla: Arbitrary JavaScript execution in PDF.js Mozilla: IndexedDB files retained in private browsing mode Mozilla: Potential permissions request bypass via clickjacking Mozilla: Cross-origin responses could be distinguished between script and non-script content-types Mozilla: Use-after-free could occur when printing to PDF Mozilla: Memory safety bugs fixed in Firefox 126, Firefox ESR 115.11, and Thunderbird 115.11
[ "cpe:/a:redhat:rhel_eus:8.8::appstream" ]
null
6.1
null
null
RHSA-2005:020
Red Hat Security Advisory: samba security update
security flaw
[ "cpe:/o:redhat:enterprise_linux:2.1::as", "cpe:/o:redhat:enterprise_linux:2.1::aw", "cpe:/o:redhat:enterprise_linux:2.1::es", "cpe:/o:redhat:enterprise_linux:2.1::ws" ]
null
null
null
null
RHSA-2023:0296
Red Hat Security Advisory: firefox security update
Mozilla: libusrsctp library out of date Mozilla: Fullscreen notification bypass Mozilla: Arbitrary file read from GTK drag and drop on Linux Mozilla: Malicious command could be hidden in devtools output Mozilla: URL being dragged from cross-origin iframe into same tab triggers navigation Mozilla: Content Security Policy wasn't being correctly applied to WebSockets in WebWorkers Mozilla: Calls to <code>console.log</code> allowed bypasing Content Security Policy via format directive Mozilla: Memory safety bugs fixed in Firefox 109 and Firefox ESR 102.7
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
8.8
null
null
RHSA-2020:5526
Red Hat Security Advisory: Red Hat Single Sign-On 7.4.4 security update on RHEL 6
keycloak: Account REST API can update user metadata attributes
[ "cpe:/a:redhat:red_hat_single_sign_on:7::el6" ]
null
4.2
null
null
RHSA-2014:1170
Red Hat Security Advisory: Red Hat JBoss Fuse/A-MQ 6.1.0 security update
elasticsearch: remote code execution flaw via dynamic scripting
[ "cpe:/a:redhat:jboss_amq:6.1.0", "cpe:/a:redhat:jboss_fuse:6.1.0" ]
null
null
null
null
RHSA-2016:1201
Red Hat Security Advisory: chromium-browser security update
chromium-browser: cross-origin bypass in extension bindings chromium-browser: cross-origin bypass in blink chromium-browser: information leak in extension bindings chromium-browser: parameter sanitization failure in devtools chromium-browser: use-after-free in extensions chromium-browser: use-after-free in autofill chromium-browser: out-of-bounds read in skia chromium-browser: various fixes from internal audits
[ "cpe:/a:redhat:rhel_extras:6" ]
null
null
null
null
RHSA-2006:0594
Red Hat Security Advisory: seamonkey security update (was mozilla)
security flaw security flaw security flaw security flaw (seamonkey): DOS/arbitrary code execution vuln with vcards security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw vulnerabilities: CVE-2006-{3113,3677,3801-3812}
[ "cpe:/o:redhat:enterprise_linux:2.1::as", "cpe:/o:redhat:enterprise_linux:2.1::aw", "cpe:/o:redhat:enterprise_linux:2.1::es", "cpe:/o:redhat:enterprise_linux:2.1::ws" ]
null
null
null
null
RHSA-2016:2871
Red Hat Security Advisory: bind security update
bind: assertion failure while handling responses containing a DNAME answer
[ "cpe:/o:redhat:rhel_aus:6.4::server", "cpe:/o:redhat:rhel_aus:6.5::server", "cpe:/o:redhat:rhel_aus:6.6::server", "cpe:/o:redhat:rhel_eus:6.7::computenode", "cpe:/o:redhat:rhel_eus:6.7::server", "cpe:/o:redhat:rhel_mission_critical:6.2::server", "cpe:/o:redhat:rhel_tus:6.5::server", "cpe:/o:redhat:rhel_tus:6.6::server" ]
null
null
7.5
null
RHSA-2018:3822
Red Hat Security Advisory: kernel security and bug fix update
kernel: Use-after-free vulnerability in DCCP socket kernel: Use-after-free in sys_mq_notify() kernel: Use-after-free in snd_seq_ioctl_create_port()
[ "cpe:/o:redhat:rhel_els:5" ]
null
null
5.5
null
RHSA-2018:2924
Red Hat Security Advisory: kernel security and bug fix update
kernel: TCP segments with random offsets allow a remote denial of service (SegmentSmack) kernel: IP fragments with random offsets allow a remote denial of service (FragmentSmack) kernel: mm: use-after-free in do_get_mempolicy function allows local DoS or other unspecified impact kernel: Integer overflow in Linux's create_elf_tables function
[ "cpe:/o:redhat:rhel_aus:6.6::server", "cpe:/o:redhat:rhel_tus:6.6::server" ]
null
null
7.8
null
RHSA-2019:3928
Red Hat Security Advisory: ansible security and bug fix update
Ansible: Splunk and Sumologic callback plugins leak sensitive data in logs
[ "cpe:/a:redhat:ansible_engine:2::el7", "cpe:/a:redhat:ansible_engine:2::el8" ]
null
null
5.7
null
RHSA-2023:1130
Red Hat Security Advisory: kernel security and bug fix update
kernel: memory corruption in AX88179_178A based USB ethernet device. kernel: net: CPU soft lockup in TC mirred egress-to-ingress action kernel: mm/mremap.c use-after-free vulnerability kernel: IPv6: panic in fib6_rule_suppress when fib6_rule_lookup fails
[ "cpe:/a:redhat:rhel_eus:8.6::crb", "cpe:/o:redhat:rhel_eus:8.6::baseos", "cpe:/o:redhat:rhev_hypervisor:4.4::el8" ]
null
5.9
null
null
RHSA-2009:1649
Red Hat Security Advisory: JBoss Enterprise Application Platform 4.3.0.CP07 update
xml-security-1.3.0-1jpp.ep1.*: XMLDsig HMAC-based signatures spoofing and authentication bypass jbossas JMX-Console cross-site-scripting in filter parameter JBoss Application Server Web Console XSS JDK: XML parsing Denial-Of-Service (6845701) JBoss EAP Twiddle logs the JMX password
[ "cpe:/a:redhat:jboss_enterprise_application_platform:4.3.0::el5" ]
null
null
null
null
RHSA-2011:1265
Red Hat Security Advisory: java-1.4.2-ibm-sap security update
IBM JDK Class file parsing denial-of-service JDK: unspecified vulnerabilities fixed in 6u26 (Sound) JDK: unspecified vulnerabilities fixed in 6u26 (Sound) OpenJDK: integer overflows in JPEGImageReader and font SunLayoutEngine (2D, 7013519) OpenJDK: Deserialization allows creation of mutable SignedObject (Deserialization, 6618658) OpenJDK: NetworkInterface information leak (Networking, 7013969) OpenJDK: MediaTracker created Component instances with unnecessary privileges (Swing, 7020198) java-1.4.2-ibm: DoS via class file parser in IBM Java 1.4.2.SR13.FP9
[ "cpe:/a:redhat:rhel_extras_sap:4", "cpe:/a:redhat:rhel_extras_sap:5" ]
null
null
null
null
RHSA-2020:1804
Red Hat Security Advisory: sudo security, bug fix, and enhancement update
sudo: attacker with access to a Runas ALL sudoer account can impersonate a nonexistent user sudo: by using ! character in the shadow file instead of a password hash can access to a run as all sudoer account
[ "cpe:/o:redhat:enterprise_linux:8::baseos" ]
null
7.5
7.5
null
RHSA-2022:5216
Red Hat Security Advisory: kpatch-patch security update
kernel: netfilter: nf_tables: incorrect NFT_STATEFUL_EXPR check leads to a use-after-free (write) kernel: a use-after-free write in the netfilter subsystem can lead to privilege escalation to root
[ "cpe:/o:redhat:enterprise_linux:7::server" ]
null
7.8
null
null
RHSA-2024:9654
Red Hat Security Advisory: libsoup security update
libsoup: HTTP request smuggling via stripping null bytes from the ends of header names
[ "cpe:/o:redhat:rhel_els:7" ]
null
7.5
null
null
RHSA-2008:0167
Red Hat Security Advisory: kernel security and bug fix update
Buffer overflow in CIFS VFS
[ "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws" ]
null
null
null
null
RHSA-2011:1402
Red Hat Security Advisory: freetype security update
freetype: FT_Bitmap_New integer overflow, FreeType TT_Vary_Get_Glyph_Deltas improper input validation
[ "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws", "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::client_workstation", "cpe:/o:redhat:enterprise_linux:5::server", "cpe:/o:redhat:enterprise_linux:6::server" ]
null
null
null
null
RHSA-2014:1322
Red Hat Security Advisory: Red Hat JBoss Enterprise Web Platform 5.2.0 security update
CXF: SSL hostname verification bypass, incomplete CVE-2012-5783 fix CXF: SSL hostname verification bypass, incomplete CVE-2012-6153 fix
[ "cpe:/a:redhat:jboss_enterprise_web_platform:5.2.0" ]
null
null
4.8
null
RHSA-2014:0408
Red Hat Security Advisory: java-1.6.0-openjdk security and bug fix update
OpenJDK: Incorrect mlib/raster image validation (2D, 8027841) OpenJDK: Protect logger handlers (Libraries, 8029740) OpenJDK: AWT incorrect FlavorMap seperation (AWT, 8026797) OpenJDK: incorrect caching of data initialized via TCCL (JAXWS, 8026801) OpenJDK: RSA unpadding timing issues (Security, 8027766) OpenJDK: System.arraycopy() element race condition (Hotspot, 8029858) OpenJDK: ServiceLoader Exception handling security bypass (Libraries, 8031394) OpenJDK: Activation framework default command map caching (JAX-WS, 8025152) OpenJDK: missing randomization of JNDI DNS client query IDs (JNDI, 8030731) OpenJDK: Better ScriptEngineManager ScriptEngine management (Libraries, 8036794) OpenJDK: insecure temporary file use in unpack200 (Libraries, 8033618) OpenJDK: classfile parser invalid BootstrapMethods attribute length (Hotspot, 8034926) OpenJDK: insufficient escaping of window title string (Javadoc, 8026736) OpenJDK: JAXP CharInfo file access restriction (JAXP, 8029282) OpenJDK: AWT thread context handling (AWT, 8025010) OpenJDK: incorrect caching of data initialized via TCCL (JAXB, 8025030) OpenJDK: JPEG decoder input stream handling (2D, 8029854) OpenJDK: incorrect caching of data initialized via TCCL (JAXWS, 8026188) OpenJDK: remove insecure Java Sound provider caching (Sound, 8026163)
[ "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::server", "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
null
null
RHSA-2015:1956
Red Hat Security Advisory: Red Hat Storage 2.1 Retirement Notice
This is the final notification for the retirement of Red Hat Storage 2.1.
[]
null
null
null
null
RHSA-2016:0366
Red Hat Security Advisory: openstack-nova security update
openstack-nova: Host data leak through resize/migration
[ "cpe:/a:redhat:openstack:5::el6" ]
null
null
null
null
RHSA-2024:4244
Red Hat Security Advisory: python3.11-PyMySQL security update
python-pymysql: SQL injection if used with untrusted JSON input
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
6.3
null
null
RHSA-2018:3806
Red Hat Security Advisory: Red Hat Enterprise Linux 6.6 Telco Update Service One-Month Notice
This is the one-Month notification for the retirement of Red Hat Enterprise Linux 6.6 Telco Update Service (TUS). This notification applies only to those customers subscribed to the Telco Update Service (TUS) channel for Red Hat Enterprise Linux 6.6.
[ "cpe:/o:redhat:rhel_aus:6.6::server", "cpe:/o:redhat:rhel_tus:6.6::server" ]
null
null
null
null
RHSA-2017:0486
Red Hat Security Advisory: Red Hat Gluster Storage 3.2.0 security, bug fix, and enhancement update
glusterfs: glusterfs-server %pretrans rpm script temporary file issue
[ "cpe:/a:redhat:storage:3.2:server:el7", "cpe:/a:redhat:storage:3:client:el7", "cpe:/o:redhat:enterprise_linux:7::hypervisor" ]
null
null
4.8
null
RHSA-2019:0451
Red Hat Security Advisory: Red Hat JBoss Web Server 5.0 Service Pack 2 security and bug fix update
tomcat: Insecure defaults in CORS filter enable 'supportsCredentials' for all origins tomcat: Host name verification missing in WebSocket client
[ "cpe:/a:redhat:jboss_enterprise_web_server:5.0::el6", "cpe:/a:redhat:jboss_enterprise_web_server:5.0::el7" ]
null
null
4.3
null
RHSA-2023:5705
Red Hat Security Advisory: rh-dotnet60-dotnet security, bug fix, and enhancement update
HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack)
[ "cpe:/a:redhat:rhel_dotnet:6.0::el7" ]
null
7.5
null
null
RHSA-2024:3253
Red Hat Security Advisory: virt:rhel and virt-devel:rhel security update
libvirt: negative g_new0 length can lead to unbounded memory allocation
[ "cpe:/a:redhat:enterprise_linux:8::appstream", "cpe:/a:redhat:enterprise_linux:8::crb" ]
null
6.2
null
null
RHSA-2017:0558
Red Hat Security Advisory: firefox security update
Mozilla: integer overflow in createImageBitmap() (MFSA 2017-08)
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
9.8
null
RHSA-2011:0337
Red Hat Security Advisory: vsftpd security update
vsftpd: remote DoS via crafted glob pattern
[ "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:5::server", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
null
null
RHSA-2023:6068
Red Hat Security Advisory: python39:3.9 and python39-devel:3.9 security update
python: TLS handshake bypass
[ "cpe:/a:redhat:rhel_eus:8.6::appstream", "cpe:/a:redhat:rhel_eus:8.6::crb" ]
null
8.6
null
null