id
stringlengths
13
15
title
stringlengths
29
176
description
stringlengths
8
32.1k
cpes
listlengths
0
20
cvss_v4_0
null
cvss_v3_1
float64
0
10
cvss_v3_0
float64
0
10
cvss_v2_0
null
RHSA-2019:2782
Red Hat Security Advisory: qpid-proton security update
qpid-proton: TLS Man in the Middle Vulnerability
[ "cpe:/a:redhat:rhel_satellite_tools:6.4::el5", "cpe:/a:redhat:rhel_satellite_tools:6.4::el6", "cpe:/a:redhat:rhel_satellite_tools:6.4::el7", "cpe:/o:redhat:enterprise_linux:7::hypervisor" ]
null
null
7.4
null
RHSA-2011:0324
Red Hat Security Advisory: logwatch security update
logwatch: Privilege escalation due improper sanitization of special characters in log file names
[ "cpe:/o:redhat:enterprise_linux:5::server", "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
null
null
RHSA-2023:4591
Red Hat Security Advisory: RHUI 4.5.0 release - Security, Bug Fixes, and Enhancements
sqlparse: Parser contains a regular expression that is vulnerable to ReDOS (Regular Expression Denial of Service) python-django: Potential bypass of validation when uploading multiple files using one form field
[ "cpe:/a:redhat:rhui:4::el8" ]
null
6.5
null
null
RHSA-2024:8107
Red Hat Security Advisory: kernel security update
kernel: watchdog: Fix possible use-after-free by calling del_timer_sync() kernel: mlxsw: spectrum: Protect driver from buggy firmware kernel: ovl: fix use after free in struct ovl_aio_req kernel: udp: do not accept non-tunnel GSO skbs landing in a tunnel kernel: scsi: qla2xxx: Fix off by one in qla_edif_app_getstats() kernel: scsi: lpfc: Release hbalock before calling lpfc_worker_wake_up() kernel: scsi: lpfc: Move NPIV's transport unregistration to after resource clean up kernel: net: openvswitch: fix overwriting ct original tuple for ICMPv6 kernel: md/raid5: fix deadlock that raid5d() wait for itself to clear MD_SB_CHANGE_PENDING kernel: ext4: fix uninitialized ratelimit_state->lock access in __ext4_fill_super() kernel: net/sched: Fix UAF when resolving a clash kernel: tipc: Return non-zero value from tipc_udp_addr2str() on error
[ "cpe:/a:redhat:rhel_eus:8.8::crb", "cpe:/o:redhat:rhel_eus:8.8::baseos" ]
null
7.3
null
null
RHSA-2014:0897
Red Hat Security Advisory: Red Hat JBoss Enterprise Web Platform 5.2.0 security update
PicketLink: XXE via insecure DocumentBuilderFactory usage
[ "cpe:/a:redhat:jboss_enterprise_web_platform:5.2.0" ]
null
null
null
null
RHSA-2022:6437
Red Hat Security Advisory: kernel-rt security and bug fix update
hw: cpu: incomplete clean-up of multi-core shared buffers (aka SBDR) hw: cpu: incomplete clean-up of microarchitectural fill buffers (aka SBDS) hw: cpu: incomplete clean-up in specific special register write operations (aka DRPW)
[ "cpe:/a:redhat:enterprise_linux:8::nfv", "cpe:/a:redhat:enterprise_linux:8::realtime" ]
null
5.5
null
null
RHSA-2002:134
Red Hat Security Advisory: : Updated mod_ssl packages available
security flaw
[ "cpe:/o:redhat:linux:7.0", "cpe:/o:redhat:linux:7.1", "cpe:/o:redhat:linux:7.2", "cpe:/o:redhat:linux:7.3" ]
null
null
null
null
RHSA-2025:1286
Red Hat Security Advisory: RHTAS 1.1.1 - Red Hat Trusted Artifact Signer Release
cross-spawn: regular expression denial of service
[ "cpe:/a:redhat:trusted_artifact_signer:1.1::el9" ]
null
4.4
null
null
RHSA-2010:0757
Red Hat Security Advisory: Red Hat Enterprise MRG Messaging security and bug fix update 1.2.2
MRG: SSL connections to MRG broker can be blocked MRG: remote authenticated DoS in broker
[ "cpe:/a:redhat:enterprise_mrg:1.0::el4" ]
null
null
null
null
RHSA-2023:6080
Red Hat Security Advisory: Red Hat Integration Camel for Spring Boot 4.0.1 release security update
HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack)
[ "cpe:/a:redhat:camel_spring_boot:4.0.1" ]
null
7.5
null
null
RHSA-2010:0038
Red Hat Security Advisory: acroread security update
acroread: multiple code execution flaws (APSB10-02) acroread: multiple code execution flaws (APSB10-02) acroread: multiple code execution flaws (APSB10-02) acroread: script injection vulnerability (APSB10-02) acroread: multiple code execution flaws (APSB10-02) acroread: media.newplayer JavaScript API code execution vulnerability (APSB10-02)
[ "cpe:/a:redhat:rhel_extras:4" ]
null
null
null
null
RHSA-2017:2492
Red Hat Security Advisory: xmlsec1 security update
xmlsec1: xmlsec vulnerable to external entity expansion
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
6.5
null
RHSA-2024:7418
Red Hat Security Advisory: linux-firmware security update
kernel: hw:amd:IOMMU improperly handles certain special address leading to a loss of guest integrity kernel: hw:amd: Incomplete system memory cleanup in SEV firmware corrupt guest private memory
[ "cpe:/o:redhat:rhel_aus:8.6::baseos", "cpe:/o:redhat:rhel_e4s:8.6::baseos", "cpe:/o:redhat:rhel_tus:8.6::baseos" ]
null
4.4
null
null
RHSA-2022:0687
Red Hat Security Advisory: OpenShift API for Data Protection (OADP) 1.0.1 security and bug fix update
ulikunitz/xz: Infinite loop in readUvarint allows for denial of service opencontainers: OCI manifest and index parsing confusion
[ "cpe:/a:redhat:openshift_api_data_protection:1.0::el8" ]
null
5
null
null
RHSA-2024:6681
Red Hat Security Advisory: firefox security update
mozilla: Type Confusion in Async Generators in Javascript Engine mozilla: Type confusion when looking up a property name in a "with" block mozilla: Internal event interfaces were exposed to web content when browser EventHandler listener callbacks ran mozilla: Firefox did not ask before openings news: links in an external application mozilla: Garbage collection could mis-color cross-compartment objects in OOM conditions mozilla: WASM type confusion involving ArrayTypes mozilla: SelectElements could be shown over another site if popups are allowed mozilla: Memory safety bugs fixed in Firefox 130, Firefox ESR 128.2, and Thunderbird 128.2
[ "cpe:/a:redhat:enterprise_linux:9::appstream" ]
null
9.8
null
null
RHSA-2017:1792
Red Hat Security Advisory: java-1.6.0-sun security update
OpenJDK: reading of unprocessed image data in JPEGImageReader (2D, 8169209) OpenJDK: JAR verifier incorrect handling of missing digest (Security, 8169392) OpenJDK: integer overflows in range check loop predicates (Hotspot, 8173770) OpenJDK: incorrect bracket processing in function signature handling (Hotspot, 8170966) OpenJDK: insufficient access control checks in ThreadPoolExecutor (Libraries, 8172204) OpenJDK: insufficient access control checks in ServiceRegistry (ImageIO, 8172461) OpenJDK: insufficient access control checks in XML transformations (JAXP, 8172469) OpenJDK: unrestricted access to com.sun.org.apache.xml.internal.resolver (JAXP, 8173286) OpenJDK: incorrect handling of references in DGC (RMI, 8163958) JDK: unspecified vulnerability fixed in 6u161, 7u151, and 8u141 (Deployment) OpenJDK: insufficient access control checks in ActivationID (RMI, 8173697) OpenJDK: unbounded memory allocation in BasicAttribute deserialization (Serialization, 8174105) OpenJDK: unbounded memory allocation in CodeSource deserialization (Serialization, 8174113) OpenJDK: insufficient access control checks in ImageWatched (AWT, 8174098) OpenJDK: DSA implementation timing attack (JCE, 8175106) OpenJDK: LDAPCertStore following referrals to non-LDAP URLs (Security, 8176067) OpenJDK: PKCS#8 implementation timing attack (JCE, 8176760) OpenJDK: incorrect key size constraint check (Security, 8179101) OpenJDK: incorrect enforcement of certificate path restrictions (Security, 8179998) OpenJDK: insecure XML parsing in wsdlimport (JAX-WS, 8182054)
[ "cpe:/a:redhat:rhel_extras_oracle_java:6", "cpe:/a:redhat:rhel_extras_oracle_java:7" ]
null
null
6.5
null
RHSA-2021:0882
Red Hat Security Advisory: tomcat security update
tomcat: Session fixation when using FORM authentication tomcat: Mishandling of Transfer-Encoding header allows for HTTP request smuggling
[ "cpe:/o:redhat:rhel_eus:7.6::computenode", "cpe:/o:redhat:rhel_eus:7.6::server" ]
null
4.3
null
null
RHSA-2020:4763
Red Hat Security Advisory: dovecot security update
dovecot: command followed by sufficient number of newlines leads to use-after-free dovecot: sending mail with empty quoted localpart leads to DoS
[ "cpe:/a:redhat:enterprise_linux:8::appstream", "cpe:/a:redhat:enterprise_linux:8::crb" ]
null
5.3
null
null
RHSA-2022:2183
Red Hat Security Advisory: Release of containers for OSP 16.2.z director operator tech preview
kubernetes: YAML parsing vulnerable to "Billion Laughs" attack, allowing for remote denial of service golang-github-miekg-dns: predictable TXID can lead to response forgeries containerd: unrestricted access to abstract Unix domain socket can lead to privileges escalation ulikunitz/xz: Infinite loop in readUvarint allows for denial of service containerd: pulling and extracting crafted container image may result in Unix file permission changes
[ "cpe:/a:redhat:openstack:16.2::el8" ]
null
5.5
7.5
null
RHSA-2020:3383
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 6.4 security update
tomcat: multiple requests with invalid payload length in a WebSocket frame could lead to DoS
[ "cpe:/a:redhat:jboss_enterprise_application_platform:6::el5", "cpe:/a:redhat:jboss_enterprise_application_platform:6::el6", "cpe:/a:redhat:jboss_enterprise_application_platform:6::el7" ]
null
7.5
null
null
RHSA-2018:0279
Red Hat Security Advisory: rh-mariadb100-mariadb security update
mysql: insecure error log file handling in mysqld_safe (CPU Oct 2016) mysql: insecure error log file handling in mysqld_safe (CPU Oct 2016) mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2017) mysql: Server: Charsets unspecified vulnerability (CPU Jan 2017) mysql: Server: DML unspecified vulnerability (CPU Jan 2017) mysql: Server: InnoDB unspecified vulnerability (CPU Jan 2017) mysql: Server: DDL unspecified vulnerability (CPU Jan 2017) mysql: unsafe chmod/chown use in init script (CPU Jan 2017) mysql: unrestricted mysqld_safe's ledir (CPU Jan 2017) mysql: prepared statement handle use-after-free after disconnect mysql: Server: DML unspecified vulnerability (CPU Apr 2017) mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2017) mysql: insecure error log file handling in mysqld_safe, incomplete CVE-2016-6664 fix (CPU Jan 2017) mysql: Server: MyISAM unspecified vulnerability (CPU Jan 2017) mysql: Logging unspecified vulnerability (CPU Jan 2017) mysql: Server: Error Handling unspecified vulnerability (CPU Jan 2017) mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2017) mysql: Server: DML unspecified vulnerability (CPU Apr 2017) mysql: Server: DDL unspecified vulnerability (CPU Apr 2017) mysql: Client programs unspecified vulnerability (CPU Jul 2017) mysql: Server: DML unspecified vulnerability (CPU Jul 2017) mysql: Server: DDL unspecified vulnerability (CPU Jul 2017) mysql: Server: Replication unspecified vulnerability (CPU Oct 2017) mysql: Server: InnoDB unspecified vulnerability (CPU Oct 2017) mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2017) mysql: Client programs unspecified vulnerability (CPU Oct 2017) mysql: Server: DDL unspecified vulnerability (CPU Oct 2017)
[ "cpe:/a:redhat:rhel_software_collections:3::el6", "cpe:/a:redhat:rhel_software_collections:3::el7" ]
null
null
6.5
null
RHSA-2025:1703
Red Hat Security Advisory: OpenShift Container Platform 4.17.18 security update
github.com/moby/moby: NULL Pointer Dereference in Moby
[ "cpe:/a:redhat:openshift:4.17::el9" ]
null
6.5
null
null
RHSA-2019:4110
Red Hat Security Advisory: java-1.7.1-ibm security update
OpenJDK: Missing restrictions on use of custom SocketImpl (Networking, 8218573) OpenJDK: NULL pointer dereference in DrawGlyphList (2D, 8222690) OpenJDK: Unexpected exception thrown by Pattern processing crafted regular expression (Concurrency, 8222684) OpenJDK: Unexpected exception thrown by XPathParser processing crafted XPath expression (JAXP, 8223505) OpenJDK: Incorrect handling of nested jar: URLs in Jar URL handler (Networking, 8223892) OpenJDK: Unexpected exception thrown by XPath processing crafted XPath expression (JAXP, 8224532) OpenJDK: Unexpected exception thrown during Font object deserialization (Serialization, 8224915) OpenJDK: Integer overflow in bounds check in SunGraphics2D (2D, 8225292) OpenJDK: Incorrect handling of HTTP proxy responses in HttpURLConnection (Networking, 8225298) OpenJDK: Excessive memory allocation in CMap when reading TrueType font (2D, 8225597) OpenJDK: Insufficient filtering of HTML event attributes in Javadoc (Javadoc, 8226765)
[ "cpe:/a:redhat:rhel_extras:7" ]
null
null
4.7
null
RHSA-2015:1154
Red Hat Security Advisory: libreswan security, bug fix and enhancement update
libreswan: crafted IKE packet causes daemon restart
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
null
null
RHSA-2024:5067
Red Hat Security Advisory: kernel-rt security update
kernel: bnxt: prevent skb UAF after handing over to PTP worker kernel: block: null pointer dereference in ioctl.c when length and logical block size are misaligned kernel: PM / devfreq: Synchronize devfreq_monitor_[start/stop] kernel: scsi: libfc: Fix potential NULL pointer dereference in fc_lport_ptp_setup() kernel: SUNRPC: Fix UAF in svc_tcp_listen_data_ready() kernel: ext4: regenerate buddy after block freeing failed if under fc replay kernel: bpf: Fix racing between bpf_timer_cancel_and_free and bpf_timer_cancel kernel: scsi: qla2xxx: Fix double free of the ha->vp_map pointer kernel: ARM: 9359/1: flush: check if the folio is reserved for no-mapping addresses kernel: octeontx2-af: race condition on interupts kernel: nouveau: lock the client object tree. kernel: ipvlan: Dont Use skb->sk in ipvlan_process_v{4,6}_outbound kernel: vt: fix unicode buffer corruption when deleting characters kernel: mlxbf_gige: stop interface during shutdown kernel: netfilter: validate user input for expected length kernel: netfilter: complete validation of user input kernel: rtnetlink: Correct nested IFLA_VF_VLAN_LIST attribute validation kernel: i40e: fix vf may be used uninitialized in this function warning kernel: net: core: reject skb_copy(_expand) for fraglist GSO skbs kernel: drm/vmwgfx: Fix invalid reads in fence signaled events kernel: blk-cgroup: fix list corruption from reorder of WRITE ->lqueued kernel: blk-cgroup: fix list corruption from resetting io stat
[ "cpe:/a:redhat:rhel_eus:9.2::nfv", "cpe:/a:redhat:rhel_eus:9.2::realtime" ]
null
4.4
null
null
RHSA-2024:8229
Red Hat Security Advisory: OpenShift Container Platform 4.17.2 bug fix and security update
jose-go: improper handling of highly compressed data go/parser: golang: Calling any of the Parse functions containing deeply nested literals can cause a panic/stack exhaustion encoding/gob: golang: Calling Decoder.Decode on a message which contains deeply nested structures can cause a panic due to stack exhaustion go/build/constraint: golang: Calling Parse on a "// +build" build tag line with deeply nested expressions can cause a panic due to stack exhaustion openstack-ironic: Lack of checksum validation on images
[ "cpe:/a:redhat:openshift:4.17::el9" ]
null
6.3
null
null
RHBA-2020:1539
Red Hat Bug Fix Advisory: Red Hat Ansible Tower 3.5.6-1 - RHEL7 Container
expat: Integer overflow leading to buffer overflow in XML_GetBuffer() libxml2: DoS caused by incorrect error detection during XZ decompression libxml2: Use after free triggered by XPointer paths beginning with range-to libxml2: Use after free in xmlXPathCompOpEvalPositionalPredicate() function in xpath.c libxml2: Unrestricted memory usage in xz_head() function in xzlib.c file: out-of-bounds read via a crafted ELF file libxml2: NULL pointer dereference in xmlXPathCompOpEval() function in xpath.c libxml2: Infinite loop caused by incorrect error detection during LZMA decompression python-requests: Redirect from HTTPS to HTTP does not remove Authorization header python-urllib3: Cross-host redirect does not remove Authorization header allow for credential exposure python: Cookie domain check returns incorrect results gnome-shell: partial lock screen bypass curl: TFTP receive heap buffer overflow in tftp_receive_packet() function bash: BASH_CMD is writable in restricted bash shells python-urllib3: CRLF injection due to not encoding the '\r\n' sequence leading to possible attack on internal service python: email.utils.parseaddr wrongly parses email addresses rsyslog: heap-based overflow in contrib/pmaixforwardedfrom/pmaixforwardedfrom.c rsyslog: heap-based overflow in contrib/pmcisconames/pmcisconames.c ansible: shell enabled by default in a pipe lookup plugin subprocess ansible: path injection on dest parameter in fetch module ansible: atomic_move primitive sets permissive permissions ansible: Extract-Zip function in win_unzip module does not check extracted path ansible: module package can be selected by the ansible facts ansible: svn module leaks password when specified as a parameter ansible: secrets readable after ansible-vault edit ansible: Information disclosure issue in ldap_attr and ldap_entry modules Ansible: kubectl connection plugin leaks sensitive information Ansible: code injection when using ansible_facts as a subkey Ansible: modules which use files encrypted with vault are not properly cleaned up
[ "cpe:/a:redhat:ansible_tower:3.5::el7" ]
null
5
7.5
null
RHSA-2015:0789
Red Hat Security Advisory: openstack-packstack and openstack-puppet-modules security and bug fix update
openstack-puppet-modules: pacemaker configured with default password
[ "cpe:/a:redhat:openstack:6::el7" ]
null
null
null
null
RHSA-2003:133
Red Hat Security Advisory: : Updated man packages fix minor vulnerability
security flaw
[ "cpe:/o:redhat:linux:7.1", "cpe:/o:redhat:linux:7.2", "cpe:/o:redhat:linux:7.3", "cpe:/o:redhat:linux:8.0" ]
null
null
null
null
RHSA-2023:0328
Red Hat Security Advisory: go-toolset and golang security and bug fix update
golang: archive/tar: github.com/vbatts/tar-split: unbounded memory consumption when reading headers golang: net/http/httputil: ReverseProxy should not forward unparseable query parameters golang: net/http: handle server errors after sending GOAWAY golang: math/big: decoding big.Float and big.Rat types can panic if the encoded message is too short, potentially allowing a denial of service golang: regexp/syntax: limit memory used by parsing regexps golang: net/http: excessive memory growth in a Go server accepting HTTP/2 requests
[ "cpe:/a:redhat:enterprise_linux:9::appstream" ]
null
5.3
null
null
RHSA-2015:0254
Red Hat Security Advisory: samba security update
samba: talloc free on uninitialized stack pointer in netlogon server could lead to remote-code execution
[ "cpe:/o:redhat:rhel_eus:6.4::computenode", "cpe:/o:redhat:rhel_eus:6.4::server", "cpe:/o:redhat:rhel_eus:6.5::computenode", "cpe:/o:redhat:rhel_eus:6.5::server", "cpe:/o:redhat:rhel_mission_critical:6.2::server" ]
null
null
null
null
RHSA-2022:6780
Red Hat Security Advisory: bind security update
bind: memory leak in ECDSA DNSSEC verification code bind: memory leaks in EdDSA DNSSEC verification code
[ "cpe:/a:redhat:rhel_eus:8.2::appstream", "cpe:/o:redhat:rhel_eus:8.2::baseos" ]
null
7.5
null
null
RHSA-2015:0856
Red Hat Security Advisory: postgresql92-postgresql security update
postgresql: information leak through constraint violation errors postgresql: buffer overflow in the to_char() function postgresql: buffer overflow flaws in contrib/pgcrypto postgresql: loss of frontend/backend protocol synchronization after an error
[ "cpe:/a:redhat:network_satellite:5.7::el6", "cpe:/a:redhat:network_satellite_managed_db:5.7::el6" ]
null
null
null
null
RHSA-2023:7401
Red Hat Security Advisory: linux-firmware security update
amd: Return Address Predictor vulnerability leading to information disclosure hw: amd: Cross-Process Information Leak
[ "cpe:/o:redhat:rhel_eus:8.6::baseos" ]
null
6.5
null
null
RHSA-2022:1830
Red Hat Security Advisory: postgresql:10 security update
postgresql: server processes unencrypted bytes from man-in-the-middle
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
8.1
null
null
RHSA-2023:6837
Red Hat Security Advisory: OpenShift Container Platform 4.14.2 bug fix and security update
golang.org/x/net/html: Cross site scripting golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487) HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack)
[ "cpe:/a:redhat:openshift:4.14::el8", "cpe:/a:redhat:openshift:4.14::el9" ]
null
7.5
null
null
RHSA-2022:7209
Red Hat Security Advisory: libksba security update
libksba: integer overflow may lead to remote code execution
[ "cpe:/o:redhat:rhel_e4s:8.1::baseos" ]
null
8.6
null
null
RHSA-2024:4374
Red Hat Security Advisory: virt:rhel and virt-devel:rhel security update
qemu-kvm: 'qemu-img info' leads to host file read/write
[ "cpe:/a:redhat:rhel_aus:8.4::appstream", "cpe:/a:redhat:rhel_e4s:8.4::appstream", "cpe:/a:redhat:rhel_tus:8.4::appstream" ]
null
7.8
null
null
RHSA-2025:2679
Red Hat Security Advisory: libxml2 security update
libxml2: Use-After-Free in libxml2 libxml2: Stack-based buffer overflow in xmlSnprintfElements of libxml2
[ "cpe:/a:redhat:enterprise_linux:9::appstream", "cpe:/o:redhat:enterprise_linux:9::baseos" ]
null
7.8
null
null
RHSA-2023:6884
Red Hat Security Advisory: squid security update
squid: Denial of Service in HTTP Digest Authentication
[ "cpe:/o:redhat:rhel_els:6" ]
null
8.6
null
null
RHSA-2018:2570
Red Hat Security Advisory: bind security update
bind: processing of certain records when "deny-answer-aliases" is in use may trigger an assert leading to a denial of service
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
7.5
null
RHSA-2020:0946
Red Hat Security Advisory: Red Hat Single Sign-On 7.3.7 security update on RHEL 7
keycloak: failedLogin Event not sent to BruteForceProtector when using Post Login Flow with Conditional-OTP
[ "cpe:/a:redhat:red_hat_single_sign_on:7::el7" ]
null
5.6
null
null
RHSA-2023:6283
Red Hat Security Advisory: insights-client security update
insights-client: unsafe handling of temporary files and directories
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
7.8
null
null
RHSA-2020:0851
Red Hat Security Advisory: python-virtualenv security update
python-requests: Redirect from HTTPS to HTTP does not remove Authorization header python-urllib3: Cross-host redirect does not remove Authorization header allow for credential exposure python-urllib3: CRLF injection due to not encoding the '\r\n' sequence leading to possible attack on internal service
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
6.5
null
RHSA-2006:0178
Red Hat Security Advisory: ImageMagick security update
security flaw security flaw
[ "cpe:/o:redhat:enterprise_linux:3::as", "cpe:/o:redhat:enterprise_linux:3::desktop", "cpe:/o:redhat:enterprise_linux:3::es", "cpe:/o:redhat:enterprise_linux:3::ws", "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws" ]
null
null
null
null
RHSA-2009:1647
Red Hat Security Advisory: java-1.5.0-ibm security update
java-1.6.0-sun: Stack-based buffer overflow via a long file: URL argument (6854303) java-1.6.0-sun: Privilege escalation via crafted image file due improper color profiles parsing (6862970) OpenJDK JRE AWT setDifflCM stack overflow (6872357) OpenJDK JRE AWT setBytePixels heap overflow (6872358) JRE JPEG JFIF Decoder issue (6862969) OpenJDK JPEG Image Writer quantization problem (6862968) OpenJDK ImageI/O JPEG heap overflow (6874643) OpenJDK MessageDigest.isEqual introduces timing attack vulnerabilities (6863503) OpenJDK ASN.1/DER input stream parser denial of service (6864911) CVE-2009-3877 OpenJDK ASN.1/DER input stream parser denial of service (6864911) CVE-2009-3877
[ "cpe:/a:redhat:rhel_extras:4", "cpe:/a:redhat:rhel_extras:5::client", "cpe:/a:redhat:rhel_extras:5::server" ]
null
null
null
null
RHSA-2010:0054
Red Hat Security Advisory: openssl security update
deprecate MD2 in SSL cert validation (Kaminsky) openssl significant memory leak in certain SSLv3 requests (DoS)
[ "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::client_workstation", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
RHSA-2024:2045
Red Hat Security Advisory: unbound security update
unbound: NRDelegation attack leads to uncontrolled resource consumption (Non-Responsive Delegation Attack) unbound: novel ghost domain attack that allows attackers to trigger continued resolvability of malicious domain names unbound: novel ghost domain attack that allows attackers to trigger continued resolvability of malicious domain names
[ "cpe:/a:redhat:rhel_eus:8.6::appstream" ]
null
6.5
null
null
RHSA-2021:1582
Red Hat Security Advisory: cpio security update
cpio: improper input validation when writing tar header fields leads to unexpected tar generation
[ "cpe:/o:redhat:enterprise_linux:8::baseos" ]
null
null
6.7
null
RHSA-2023:7820
Red Hat Security Advisory: Red Hat OpenShift Data Foundation 4.12.10 Bug Fix Update
validator: Inefficient Regular Expression Complexity in Validator.js
[ "cpe:/a:redhat:openshift_data_foundation:4.12::el8" ]
null
7.5
null
null
RHSA-2020:0201
Red Hat Security Advisory: python-reportlab security update
python-reportlab: code injection in colors.py allows attacker to execute code
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
null
9.8
null
RHSA-2007:0286
Red Hat Security Advisory: gdm security and bug fix update
security flaw
[ "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws" ]
null
null
null
null
RHSA-2021:1775
Red Hat Security Advisory: pki-core:10.6 and pki-deps:10.6 security, bug fix, and enhancement update
resteasy: Improper validation of response header in MediaTypeHeaderDelegate.java class
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
null
7.5
null
RHSA-2023:3590
Red Hat Security Advisory: firefox security update
Mozilla: Click-jacking certificate exceptions through rendering lag Mozilla: Memory safety bugs fixed in Firefox 114 and Firefox ESR 102.12
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
9.8
null
null
RHSA-2011:0862
Red Hat Security Advisory: subversion security update
(mod_dav_svn): DoS (crash) via request to deliver baselined WebDAV resources (mod_dav_svn): DoS (excessive memory use) when configured to provide path-based access control (mod_dav_svn): File contents disclosure of files configured to be unreadable by those users
[ "cpe:/o:redhat:enterprise_linux:5::server", "cpe:/o:redhat:enterprise_linux:6::server" ]
null
null
null
null
RHSA-2007:1011
Red Hat Security Advisory: perl security update
perl regular expression UTF parsing errors
[ "cpe:/a:redhat:rhel_application_stack:1" ]
null
null
null
null
RHSA-2021:3487
Red Hat Security Advisory: Red Hat OpenStack Platform 16.2 (etcd) security update
golang: net/http: panic in ReadRequest and ReadResponse when reading a very large header golang: net: lookup functions may return invalid host names golang: net/http/httputil: ReverseProxy forwards connection headers if first one is empty golang: math/big.Rat: may cause a panic or an unrecoverable fatal error if passed inputs with very large exponents
[ "cpe:/a:redhat:openstack:16.2::el8" ]
null
7.5
null
null
RHSA-2023:0977
Red Hat Security Advisory: Red Hat OpenShift Data Science 1.22.1 security update
odh-notebook-controller-container: Missing authorization allows for file contents disclosure
[ "cpe:/a:redhat:openshift_data_science:1.22::el8" ]
null
9.8
null
null
RHSA-2023:7786
Red Hat Security Advisory: postgresql:10 security update
postgresql: Buffer overrun from integer overflow in array modification
[ "cpe:/a:redhat:rhel_eus:8.8::appstream" ]
null
8.8
null
null
RHSA-2022:7968
Red Hat Security Advisory: virt-v2v security, bug fix, and enhancement update
libguestfs: Buffer overflow in get_keys leads to DoS
[ "cpe:/a:redhat:enterprise_linux:9::appstream", "cpe:/a:redhat:enterprise_linux:9::crb" ]
null
5.5
null
null
RHSA-2009:1463
Red Hat Security Advisory: newt security update
newt: heap-overflow in textbox when text reflowing
[ "cpe:/o:redhat:enterprise_linux:3::as", "cpe:/o:redhat:enterprise_linux:3::desktop", "cpe:/o:redhat:enterprise_linux:3::es", "cpe:/o:redhat:enterprise_linux:3::ws", "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws", "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::client_workstation", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
RHSA-2014:1083
Red Hat Security Advisory: kernel-rt security and bug fix update
Kernel: ALSA: control: protect user controls against races & memory disclosure Kernel: ALSA: control: do not access controls outside of protected regions Kernel: ALSA: control: use-after-free in replacing user controls Kernel: ALSA: control: use-after-free in replacing user controls Kernel: ALSA: control: integer overflow in id.index & id.numid Kernel: net: SCTP: fix a NULL pointer dereference during INIT collisions
[ "cpe:/a:redhat:enterprise_mrg:2:server:el6" ]
null
null
null
null
RHSA-2024:5598
Red Hat Security Advisory: libreoffice security update
libreoffice: Ability to trust not validated macro signatures removed in high security mode
[ "cpe:/a:redhat:enterprise_linux:8::appstream", "cpe:/a:redhat:enterprise_linux:8::crb" ]
null
7.8
null
null
RHSA-2022:2283
Red Hat Security Advisory: OpenShift Container Platform 4.9.35 bug fix and security update
openshift/router: route hijacking attack via crafted HAProxy configuration file
[ "cpe:/a:redhat:openshift:4.9::el8" ]
null
6.3
null
null
RHSA-2024:2994
Red Hat Security Advisory: LibRaw security update
LibRaw: stack buffer overflow in LibRaw_buffer_datastream::gets() in src/libraw_datastream.cpp
[ "cpe:/a:redhat:enterprise_linux:8::appstream", "cpe:/a:redhat:enterprise_linux:8::crb" ]
null
5.3
null
null
RHSA-2008:0892
Red Hat Security Advisory: xen security and bug fix update
qemu/kvm/xen: add image format options for USB storage and removable media qemu/xen/kvm: ioemu: Fix PVFB backend to limit frame buffer size
[ "cpe:/a:redhat:rhel_virtualization:5::client", "cpe:/a:redhat:rhel_virtualization:5::server", "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
RHSA-2020:0103
Red Hat Security Advisory: kernel security and bug fix update
kernel: kvm: guest userspace to guest kernel write kernel: TLB flush happens too late on mremap kernel: Use-after-free in __blk_drain_queue() function in block/blk-core.c Kernel: KVM: potential use-after-free via kvm_ioctl_create_device() kernel: fix race condition between mmget_not_zero()/get_task_mm() and core dumping
[ "cpe:/o:redhat:rhel_aus:7.4::server", "cpe:/o:redhat:rhel_e4s:7.4::server", "cpe:/o:redhat:rhel_tus:7.4::server" ]
null
null
6.1
null
RHSA-2024:6001
Red Hat Security Advisory: postgresql:15 security update
postgresql: PostgreSQL pg_stats_ext and pg_stats_ext_exprs lack authorization checks postgresql: PostgreSQL relation replacement during pg_dump executes arbitrary SQL
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
7.5
null
null
RHSA-2011:1777
Red Hat Security Advisory: qemu-kvm security update
qemu: ccid: buffer overflow in handling of VSC_ATR message
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
null
null
RHSA-2019:0806
Red Hat Security Advisory: python27-python security update
python: Information Disclosure due to urlsplit improper NFKC normalization
[ "cpe:/a:redhat:rhel_software_collections:3::el6", "cpe:/a:redhat:rhel_software_collections:3::el7" ]
null
null
9.8
null
RHSA-2024:1363
Red Hat Security Advisory: OpenShift Container Platform 4.15.3 low-latency extras security update
golang-protobuf: encoding/protojson, internal/encoding/json: infinite loop in protojson.Unmarshal when unmarshaling certain forms of invalid JSON
[ "cpe:/a:redhat:openshift:4.15::el8", "cpe:/a:redhat:openshift:4.15::el9" ]
null
5.9
null
null
RHSA-2022:7279
Red Hat Security Advisory: kernel security and bug fix update
kernel: a use-after-free in cls_route filter implementation may lead to privilege escalation hw: cpu: incomplete clean-up of multi-core shared buffers (aka SBDR) hw: cpu: incomplete clean-up of microarchitectural fill buffers (aka SBDS) hw: cpu: incomplete clean-up in specific special register write operations (aka DRPW)
[ "cpe:/o:redhat:rhel_aus:8.2::baseos", "cpe:/o:redhat:rhel_e4s:8.2::baseos", "cpe:/o:redhat:rhel_tus:8.2::baseos" ]
null
5.5
null
null
RHSA-2018:0352
Red Hat Security Advisory: java-1.8.0-ibm security update
JDK: J9 JVM allows untrusted code running under a security manager to elevate its privileges OpenJDK: unsynchronized access to encryption key data (Libraries, 8172525) OpenJDK: insufficient validation of the invokeinterface instruction (Hotspot, 8174962) OpenJDK: LdapLoginModule insufficient username encoding in LDAP query (LDAP, 8178449) OpenJDK: DnsClient missing source port randomization (JNDI, 8182125) OpenJDK: loading of classes from untrusted locations (I18n, 8182601) OpenJDK: DerValue unbounded memory allocation (Libraries, 8182387) OpenJDK: insufficient strength of key agreement (JCE, 8185292) OpenJDK: LDAPCertStore insecure handling of LDAP referrals (JNDI, 8186606) OpenJDK: use of global credentials for HTTP/SPNEGO (JGSS, 8186600) OpenJDK: SingleEntryRegistry incorrect setup of deserialization filter (JMX, 8186998) JDK: unspecified vulnerability fixed in 8u161 and 9.0.4 (Deployment) JDK: unspecified vulnerability fixed in 8u161 and 9.0.4 (Deployment) OpenJDK: GTK library loading use-after-free (AWT, 8185325) OpenJDK: ArrayBlockingQueue deserialization to an inconsistent state (Libraries, 8189284) OpenJDK: unbounded memory allocation during deserialization (AWT, 8190289) OpenJDK: unbounded memory allocation in BasicAttributes deserialization (JNDI, 8191142)
[ "cpe:/a:redhat:rhel_extras:6" ]
null
null
4.3
null
RHSA-2022:0474
Red Hat Security Advisory: Red Hat Ansible Automation Platform 2.0 ansible-runner security update
ansible-tower: Privilege escalation via job isolation escape
[ "cpe:/a:redhat:ansible_automation_platform:2.0::el8" ]
null
8.8
null
null
RHSA-2019:0031
Red Hat Security Advisory: Red Hat Enterprise Linux 6.6 Telco Update Support Final Retirement Notice
This is the final notification for the retirement of Red Hat Enterprise Linux 6.6 Telco Update Service (TUS). This notification applies only to those customers subscribed to the Telco Update Service (TUS) channel for Red Hat Enterprise Linux 6.6.
[ "cpe:/o:redhat:rhel_aus:6.6::server", "cpe:/o:redhat:rhel_tus:6.6::server" ]
null
null
null
null
RHSA-2023:4655
Red Hat Security Advisory: redhat-ds:11 security, bug fix, and enhancement update
RHDS: LDAP browser tries to decode userPassword instead of userCertificate attribute
[ "cpe:/a:redhat:directory_server:11.6::el8" ]
null
5.5
null
null
RHSA-2017:0830
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform security update
wildfly: ParseState headerValuesCache can be exploited to fill heap with garbage
[ "cpe:/a:redhat:jboss_enterprise_application_platform:7" ]
null
null
7.5
null
RHSA-2014:1971
Red Hat Security Advisory: kernel security and bug fix update
kernel: exec/ptrace: get_dumpable() incorrect tests Kernel: drivers: media: an information leakage Kernel: HID: OOB write in magicmouse driver Kernel: HID: logitech-dj OOB array access Kernel: HID: off by one error in various _report_fixup routines Kernel: USB serial: memory corruption flaw Kernel: HID: memory corruption via OOB write kernel: keys: incorrect termination condition in assoc array garbage collection kernel: sctp: skb_over_panic when receiving malformed ASCONF chunks kernel: net: sctp: fix panic on duplicate ASCONF chunks kernel: net: sctp: remote memory pressure from excessive queueing Kernel: target/rd: imformation leakage Kernel: ALSA: control: protect user controls against races & memory disclosure Kernel: ALSA: control: use-after-free in replacing user controls Kernel: ALSA: control: use-after-free in replacing user controls Kernel: ALSA: control: integer overflow in id.index & id.numid kernel: vfs: refcount issues during unmount on symlink kernel: udf: Avoid infinite loop when processing indirect ICBs
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
null
null
RHSA-2020:4311
Red Hat Security Advisory: firefox security update
Mozilla: Memory safety bugs fixed in Firefox 82 and Firefox ESR 78.4 chromium-browser: Use after free in WebRTC
[ "cpe:/a:redhat:rhel_e4s:8.0::appstream" ]
null
8.8
null
null
RHSA-2012:0307
Red Hat Security Advisory: util-linux security, bug fix, and enhancement update
util-linux: mount fails to anticipate RLIMIT_FSIZE util-linux: umount may fail to remove /etc/mtab~ lock file
[ "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
RHSA-2011:1306
Red Hat Security Advisory: jbossws-common security update
JBossWS remote Denial of Service
[ "cpe:/a:redhat:jboss_enterprise_application_platform:4.3.0::el4", "cpe:/a:redhat:jboss_enterprise_application_platform:4.3.0::el5" ]
null
null
null
null
RHSA-2023:7368
Red Hat Security Advisory: c-ares security update
c-ares: buffer overflow in config_sortlist() due to missing string length check
[ "cpe:/a:redhat:rhel_eus:9.2::appstream", "cpe:/o:redhat:rhel_eus:9.2::baseos" ]
null
8.6
null
null
RHSA-2021:3088
Red Hat Security Advisory: kernel-rt security and bug fix update
kernel: race condition in net/can/bcm.c leads to local privilege escalation kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c
[ "cpe:/a:redhat:enterprise_linux:8::nfv", "cpe:/a:redhat:enterprise_linux:8::realtime" ]
null
7.8
null
null
RHSA-2015:0782
Red Hat Security Advisory: kernel security and bug fix update
kernel: integer overflow in fb_mmap kernel: kvm: vmx: invalid host cr4 handling across vm entries kernel: isofs: unbound recursion when processing relocated directories kernel: isofs: unbound recursion when processing relocated directories kernel: infiniband: uverbs: unprotected physical memory access kernel: usb: buffer overflow in ttusb-dec kernel: net: slab corruption from use after free on INIT collisions
[ "cpe:/o:redhat:rhel_eus:6.5::computenode", "cpe:/o:redhat:rhel_eus:6.5::server" ]
null
null
null
null
RHSA-2022:8649
Red Hat Security Advisory: varnish:6 security update
varnish: Request Forgery Vulnerability
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
7.5
null
null
RHSA-2023:7474
Red Hat Security Advisory: OpenShift Container Platform 4.13.24 security and extras update
golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487)
[ "cpe:/a:redhat:openshift:4.13::el8", "cpe:/a:redhat:openshift:4.13::el9" ]
null
7.5
null
null
RHSA-2009:0445
Red Hat Security Advisory: java-1.4.2-ibm security update
Java Web Start File Inclusion via System Properties Override JavaWebStart allows unauthorized network connections Java WebStart privilege escalation Java Web Start BasicService displays local files in the browser Java WebStart allows hidden code privilege escalation Java WebStart unprivileged local file and network access JRE allows unauthorized file access and connections to localhost JRE allows unauthorized memory read access via a crafted ZIP file OpenJDK Denial-Of-Service in kerberos authentication (6588160) OpenJDK allows to list files within the user home directory (6484091) OpenJDK UTF-8 decoder accepts non-shortest form sequences (4486841) OpenJDK calendar object deserialization allows privilege escalation (6734167) OpenJDK Privilege escalation in command line applications (6733959) OpenJDK Buffer overflow in image processing (6726779) OpenJDK temporary files have guessable file names (6721753)
[ "cpe:/a:redhat:rhel_extras:3", "cpe:/a:redhat:rhel_extras:4", "cpe:/a:redhat:rhel_extras:5::client", "cpe:/a:redhat:rhel_extras:5::server" ]
null
null
null
null
RHSA-2010:0786
Red Hat Security Advisory: java-1.4.2-ibm security update
TLS: MITM attacks via session renegotiation OpenJDK HttpURLConnection allows arbitrary request headers (6961084,6980004) OpenJDK DNS server IP address information leak (6957564) OpenJDK HttpURLConnection request splitting (6952017) OpenJDK local network address disclosure (6952603) OpenJDK Swing unsafe reflection usage (6622002) JDK unspecified vulnerability in 2D component OpenJDK Swing mutable static (6938813) OpenJDK IndexColorModel double-free (6925710) OpenJDK JPEG writeImage remote code execution (6963023) OpenJDK Deserialization Race condition (6559775) OpenJDK Serialization inconsistencies (6966692) JDK unspecified vulnerability in 2D component JDK unspecified vulnerability in Sound component
[ "cpe:/a:redhat:rhel_extras:3", "cpe:/a:redhat:rhel_extras:4", "cpe:/a:redhat:rhel_extras:5::client", "cpe:/a:redhat:rhel_extras:5::server" ]
null
null
null
null
RHSA-2007:0009
Red Hat Security Advisory: flash-plugin security update
security flaw
[ "cpe:/a:redhat:rhel_extras:3", "cpe:/a:redhat:rhel_extras:4" ]
null
null
null
null
RHSA-2024:2619
Red Hat Security Advisory: rh-mysql80-mysql security update
zstd: mysql: buffer overrun in util.c mysql: InnoDB unspecified vulnerability (CPU Apr 2023) mysql: Server: DDL unspecified vulnerability (CPU Apr 2023) mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2023) mysql: Server: DDL unspecified vulnerability (CPU Apr 2023) mysql: Server: DDL unspecified vulnerability (CPU Apr 2023) mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2023) mysql: Server: Components Services unspecified vulnerability (CPU Apr 2023) mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2023) mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2023) mysql: Server: Components Services unspecified vulnerability (CPU Apr 2023) mysql: Server: Partition unspecified vulnerability (CPU Apr 2023) mysql: Server: Partition unspecified vulnerability (CPU Apr 2023) mysql: Server: Components Services unspecified vulnerability (CPU Apr 2023) mysql: Server: JSON unspecified vulnerability (CPU Apr 2023) mysql: Server: DML unspecified vulnerability (CPU Apr 2023) mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2023) mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2023) mysql: Client programs unspecified vulnerability (CPU Apr 2023) mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2023) mysql: Server: Replication unspecified vulnerability (CPU Jul 2023) mysql: Server: Replication unspecified vulnerability (CPU Jul 2023) mysql: InnoDB unspecified vulnerability (CPU Jul 2023) mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2023) mysql: InnoDB unspecified vulnerability (CPU Jul 2023) mysql: Server: Security: Privileges unspecified vulnerability (CPU Jul 2023) mysql: Server: Optimizer unspecified vulnerability (CPU Jul 2023) mysql: Server: Pluggable Auth unspecified vulnerability (CPU Jul 2023) mysql: Client programs unspecified vulnerability (CPU Jul 2023) mysql: Server: Optimizer unspecified vulnerability (CPU Jul 2023) mysql: Server: Optimizer unspecified vulnerability (CPU Jul 2023) mysql: Server: Replication unspecified vulnerability (CPU Jul 2023) mysql: Server: DDL unspecified vulnerability (CPU Jul 2023) mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2023) mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2023) mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2023) mysql: InnoDB unspecified vulnerability (CPU Oct 2023) mysql: InnoDB unspecified vulnerability (CPU Oct 2023) mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2023) mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2023) mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2023) mysql: InnoDB unspecified vulnerability (CPU Oct 2023) mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2023) mysql: InnoDB unspecified vulnerability (CPU Oct 2023) mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2023) mysql: InnoDB unspecified vulnerability (CPU Oct 2023) mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2023) mysql: Server: UDF unspecified vulnerability (CPU Oct 2023) mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2023) mysql: Server: Security: Encryption unspecified vulnerability (CPU Oct 2023) mysql: InnoDB unspecified vulnerability (CPU Oct 2023) mysql: Server: DML unspecified vulnerability (CPU Oct 2023) mysql: Server: RAPID unspecified vulnerability (CPU Jan 2024) mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2024) mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2024) mysql: Server: Security: Encryption unspecified vulnerability (CPU Jan 2024) mysql: Server: Security: Privileges unspecified vulnerability (CPU Jan 2024) mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2024) mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2024) mysql: Server: Replication unspecified vulnerability (CPU Jan 2024) mysql: Server: Options unspecified vulnerability (CPU Jan 2024) mysql: Server: DDL unspecified vulnerability (CPU Jan 2024) mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2024) mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2024) mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2024) mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2024) mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2024) mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2024) mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2024) mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2024) mysql: Server: DDL unspecified vulnerability (CPU Jan 2024) mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2024) mysql: Server: DML unspecified vulnerability (CPU Jan 2024) mysql: Server : Security : Firewall unspecified vulnerability (CPU Jan 2024) mysql: Server: UDF unspecified vulnerability (CPU Jan 2024) mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2024) mysql: Server: DML unspecified vulnerability (CPU Apr 2024) mysql: Server: DML unspecified vulnerability (CPU Apr 2024) mysql: Server: DML unspecified vulnerability (CPU Apr 2024) mysql: Server: DML unspecified vulnerability (CPU Apr 2024) mysql: Server: DML unspecified vulnerability (CPU Apr 2024) mysql: Server: DML unspecified vulnerability (CPU Apr 2024) mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2024) mysql: Server: DML unspecified vulnerability (CPU Apr 2024) mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2024) mysql: Server: Audit Plug-in unspecified vulnerability (CPU Apr 2024)
[ "cpe:/a:redhat:rhel_software_collections:3::el7" ]
null
4.9
null
null
RHSA-2013:1199
Red Hat Security Advisory: openstack-nova security and bug fix update
OpenStack: Nova private flavors resource limit circumvention OpenStack: Nova XML entities DoS OpenStack: Nova network source security groups denial of service OpenStack: openstack-nova-compute console-log DoS
[ "cpe:/a:redhat:openstack:3::el6" ]
null
null
null
null
RHSA-2008:0790
Red Hat Security Advisory: java-1.5.0-ibm security update
Java RE allows Same Origin Policy to be Bypassed (6687932) security flaw Security Vulnerability with JRE fonts processing may allow Elevation of Privileges (6450319) Java Web Start Buffer overflow vulnerabilities (6557220) Java Web Start, arbitrary file creation (6703909) Java Web Start arbitrary file creation/deletion file with user permissions (6704077) Java Web Start, untrusted application may determine Cache Location (6704074)
[ "cpe:/a:redhat:rhel_extras:4", "cpe:/a:redhat:rhel_extras:5::client", "cpe:/a:redhat:rhel_extras:5::server" ]
null
null
null
null
RHSA-2024:1489
Red Hat Security Advisory: firefox security update
nss: timing attack against RSA decryption Mozilla: Crash in NSS TLS method Mozilla: JIT code failed to save return registers on Armv7-A Mozilla: Integer overflow could have led to out of bounds write Mozilla: Improper handling of html and body tags enabled CSP nonce leakage Mozilla: Clickjacking vulnerability could have led to a user accidentally granting permissions Mozilla: Self referencing object could have potentially led to a use-after-free Mozilla: Memory safety bugs fixed in Firefox 124, Firefox ESR 115.9, and Thunderbird 115.9 Mozilla: Improve handling of out-of-memory conditions in ICU Mozilla: Privileged JavaScript Execution via Event Handlers
[ "cpe:/a:redhat:rhel_eus:8.6::appstream" ]
null
8.8
null
null
RHSA-2024:7977
Red Hat Security Advisory: firefox security update
firefox: Use-after-free in Animation timeline (128.3.1 ESR Chemspill)
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
9.8
null
null
RHSA-2023:2969
Red Hat Security Advisory: net-snmp security and bug fix update
net-snmp: NULL Pointer Exception when handling ipDefaultTTL net-snmp: NULL Pointer Exception when handling pv6IpForwarding
[ "cpe:/a:redhat:enterprise_linux:8::appstream", "cpe:/o:redhat:enterprise_linux:8::baseos" ]
null
6.5
null
null
RHSA-2024:6356
Red Hat Security Advisory: bubblewrap and flatpak security update
flatpak: Access to files outside sandbox for apps using persistent= (--persist)
[ "cpe:/a:redhat:enterprise_linux:9::appstream", "cpe:/a:redhat:enterprise_linux:9::crb", "cpe:/o:redhat:enterprise_linux:9::baseos" ]
null
7.4
null
null
RHSA-2019:4111
Red Hat Security Advisory: firefox security update
Mozilla: Buffer overflow in plain text serializer Mozilla: Use-after-free in worker destruction Mozilla: Use-after-free when performing device orientation checks Mozilla: Use-after-free when retrieving a document in antitracking Mozilla: Memory safety bugs fixed in Firefox 71 and Firefox ESR 68.3
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
8.8
null
null
RHSA-2010:0528
Red Hat Security Advisory: avahi security update
avahi: remote DoS via legacy unicast mDNS queries avahi: assertion failure after receiving a packet with corrupted checksum
[ "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::client_workstation", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
RHSA-2019:0774
Red Hat Security Advisory: java-1.8.0-openjdk security and bug fix update
OpenJDK: Slow conversion of BigDecimal to long (Libraries, 8211936) OpenJDK: Incorrect skeleton selection in RMI registry server-side dispatch handling (RMI, 8218453) OpenJDK: Font layout engine out of bounds access setCurrGlyphID() (2D, 8219022)
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
7.5
null
RHSA-2016:0332
Red Hat Security Advisory: RHEL Atomic OSTree Update 7.2.2
RHEL Atomic OSTree Update 7.2.2
[]
null
null
null
null