id
stringlengths
13
15
title
stringlengths
29
176
description
stringlengths
8
32.1k
cpes
listlengths
0
20
cvss_v4_0
null
cvss_v3_1
float64
0
10
cvss_v3_0
float64
0
10
cvss_v2_0
null
RHBA-2023:0568
Red Hat Bug Fix Advisory: OpenShift Container Platform 4.12.2 packages update
golang: net/url: JoinPath does not strip relative path components in all circumstances
[ "cpe:/a:redhat:openshift:4.12::el8", "cpe:/a:redhat:openshift:4.12::el9" ]
null
7.5
null
null
RHSA-2022:5257
Red Hat Security Advisory: libinput security update
libinput: format string vulnerability may lead to privilege escalation
[ "cpe:/a:redhat:enterprise_linux:9::appstream", "cpe:/a:redhat:enterprise_linux:9::crb" ]
null
7.8
null
null
RHSA-2012:0062
Red Hat Security Advisory: t1lib security update
t1lib: Heap based buffer overflow in DVI file AFM font parser t1lib: Heap-based buffer overflow DVI file AFM font parser t1lib: Invalid pointer dereference via crafted Type 1 font t1lib: invalid read crash via crafted Type 1 font t1lib: Use-after-free via crafted Type 1 font t1lib: Off-by-one via crafted Type 1 font
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
null
null
RHSA-2023:7215
Red Hat Security Advisory: Red Hat OpenShift Service Mesh Containers for 2.2.12
golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487) HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack)
[ "cpe:/a:redhat:service_mesh:2.2::el8" ]
null
7.5
null
null
RHSA-2007:0019
Red Hat Security Advisory: gtk2 security update
security flaw
[ "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws" ]
null
null
null
null
RHSA-2018:2274
Red Hat Security Advisory: Red Hat Ceph Storage 2.5 security, enhancement, and bug fix update
ceph: cephx protocol is vulnerable to replay attack ceph: cephx uses weak signatures ceph: ceph-mon does not perform authorization on OSD pool ops
[ "cpe:/a:redhat:ceph_storage:2::ubuntu16.04" ]
null
null
4.6
null
RHSA-2019:1207
Red Hat Security Advisory: redhat-virtualization-host security update
hardware: Microarchitectural Store Buffer Data Sampling (MSBDS) hardware: Micro-architectural Load Port Data Sampling - Information Leak (MLPDS) hardware: Microarchitectural Fill Buffer Data Sampling (MFBDS) hardware: Microarchitectural Data Sampling Uncacheable Memory (MDSUM)
[ "cpe:/o:redhat:enterprise_linux:7::hypervisor" ]
null
null
3.8
null
RHSA-2017:1483
Red Hat Security Advisory: kernel security update
kernel: heap/stack gap jumping via unbounded stack allocations
[ "cpe:/o:redhat:rhel_aus:5.9" ]
null
null
7.4
null
RHBA-2015:1167
Red Hat Bug Fix Advisory: docker bug fix update
docker: insecure opening of file-descriptor 1 leading to privilege escalation docker: symlink traversal on container respawn allows local privilege escalation docker: Read/write proc paths allow host modification & information disclosure docker: volume mounts allow LSM profile escalation
[ "cpe:/a:redhat:rhel_extras_other:7" ]
null
null
null
null
RHSA-2022:6392
Red Hat Security Advisory: RHV RHEL Host (ovirt-host) [ovirt-4.5.2] security update
moment: inefficient parsing algorithm resulting in DoS
[ "cpe:/o:redhat:rhev_hypervisor:4.4::el8" ]
null
7.5
null
null
RHSA-2020:4433
Red Hat Security Advisory: python3 security and bug fix update
python: XSS vulnerability in the documentation XML-RPC server in server_title field python: infinite loop in the tarfile module via crafted TAR archive python: wrong backtracking in urllib.request.AbstractBasicAuthHandler allows for a ReDoS python: DoS via inefficiency in IPv{4,6}Interface classes
[ "cpe:/a:redhat:enterprise_linux:8::appstream", "cpe:/o:redhat:enterprise_linux:8::baseos" ]
null
5.9
null
null
RHSA-2012:1283
Red Hat Security Advisory: openjpeg security update
openjpeg: heap-based buffer overflow when decoding jpeg2000 files
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
null
null
RHSA-2010:0787
Red Hat Security Advisory: glibc security update
glibc: ld.so insecure handling of $ORIGIN in LD_AUDIT for setuid/setgid programs
[ "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
RHSA-2021:4773
Red Hat Security Advisory: kpatch-patch security update
kernel: use-after-free in drivers/infiniband/core/ucma.c ctx use-after-free
[ "cpe:/o:redhat:rhel_e4s:7.6::server" ]
null
7.8
null
null
RHSA-2015:2248
Red Hat Security Advisory: netcf security, bug fix, and enhancement update
netcf: augeas path expression injection via interface name
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
null
null
RHSA-2020:2970
Red Hat Security Advisory: java-11-openjdk security and enhancement update
OpenJDK: Incorrect handling of access control context in ForkJoinPool (Libraries, 8237117) OpenJDK: Excessive memory usage in ImageIO TIFF plugin (ImageIO, 8233239) OpenJDK: Incomplete interface type checks in Graal compiler (Hotspot, 8236867) OpenJDK: HostnameChecker does not ensure X.509 certificate names are in normalized form (JSSE, 8237592) OpenJDK: Bypass of boundary checks in nio.Buffer via concurrent access (Libraries, 8238920) OpenJDK: Incomplete bounds checks in Affine Transformations (2D, 8240119) OpenJDK: XML validation manipulation due to incomplete application of the use-grammar-pool-only feature (JAXP, 8242136)
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
5.3
null
null
RHSA-2010:0653
Red Hat Security Advisory: ImageMagick security update
GraphicsMagick: Integer overflow in the routine creating X11 images
[ "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws" ]
null
null
null
null
RHSA-2024:7706
Red Hat Security Advisory: Red Hat build of Cryostat security update
webpack: DOM Clobbering vulnerability in AutoPublicPathRuntimeModule dompurify: XSS vulnerability via prototype pollution
[ "cpe:/a:redhat:cryostat:3::el8" ]
null
7
null
null
RHSA-2014:0224
Red Hat Security Advisory: redhat-support-plugin-rhev security update
jakarta-commons-httpclient: missing connection hostname check against X.509 certificate name
[ "cpe:/a:redhat:rhev_manager:3" ]
null
null
3.7
null
RHSA-2006:0179
Red Hat Security Advisory: auth_ldap security update
security flaw
[ "cpe:/o:redhat:enterprise_linux:2.1::as", "cpe:/o:redhat:enterprise_linux:2.1::aw", "cpe:/o:redhat:enterprise_linux:2.1::es", "cpe:/o:redhat:enterprise_linux:2.1::ws" ]
null
null
null
null
RHSA-2021:3320
Red Hat Security Advisory: kernel security update
kernel: use-after-free in n_tty_receive_buf_common function in drivers/tty/n_tty.c kernel: race condition for removal of the HCI controller
[ "cpe:/o:redhat:rhel_aus:7.6::server", "cpe:/o:redhat:rhel_e4s:7.6::server", "cpe:/o:redhat:rhel_tus:7.6::server" ]
null
7
null
null
RHSA-2024:8351
Red Hat Security Advisory: grafana:7.3.6 security update
elliptic: Missing Validation in Elliptic's EDDSA Signature Verification
[ "cpe:/a:redhat:rhel_aus:8.4::appstream", "cpe:/a:redhat:rhel_e4s:8.4::appstream", "cpe:/a:redhat:rhel_tus:8.4::appstream" ]
null
8.2
null
null
RHSA-2022:0539
Red Hat Security Advisory: thunderbird security update
Mozilla: Extensions could have bypassed permission confirmation during update Mozilla: Drag and dropping an image could have resulted in the dropped object being an executable Mozilla: Sandboxed iframes could have executed script if the parent appended elements Mozilla: Cross-Origin responses could be distinguished between script and non-script content-types Mozilla: frame-ancestors Content Security Policy directive was not enforced for framed extension pages Mozilla: Script Execution during invalid object state Mozilla: Memory safety bugs fixed in Firefox 97 and Firefox ESR 91.6
[ "cpe:/a:redhat:rhel_e4s:8.1::appstream" ]
null
8.8
null
null
RHSA-2023:1566
Red Hat Security Advisory: kernel security, bug fix, and enhancement update
kernel: net: CPU soft lockup in TC mirred egress-to-ingress action kernel: stack overflow in do_proc_dointvec and proc_skip_spaces ALSA: pcm: Move rwsem lock inside snd_ctl_elem_read to prevent UAF kernel: FUSE filesystem low-privileged user privileges escalation
[ "cpe:/a:redhat:enterprise_linux:8::crb", "cpe:/o:redhat:enterprise_linux:8::baseos" ]
null
7
null
null
RHSA-2020:4039
Red Hat Security Advisory: OpenEXR security update
OpenEXR: out-of-bounds read during Huffman uncompression OpenEXR: std:: vector out-of-bounds read and write in ImfTileOffsets.cpp OpenEXR: out-of-bounds write in copyIntoFrameBuffer function in ImfMisc.cpp
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
5.5
null
null
RHSA-2023:3139
Red Hat Security Advisory: firefox security update
Mozilla: Browser prompts could have been obscured by popups Mozilla: Crash in RLBox Expat driver Mozilla: Potential permissions request bypass via clickjacking Mozilla: Content process crash due to invalid wasm code Mozilla: Potential spoof due to obscured address bar Mozilla: Potential memory corruption in FileReader::DoReadData() Mozilla: Memory safety bugs fixed in Firefox 113 and Firefox ESR 102.11
[ "cpe:/a:redhat:rhel_aus:8.2::appstream", "cpe:/a:redhat:rhel_e4s:8.2::appstream", "cpe:/a:redhat:rhel_tus:8.2::appstream" ]
null
8.8
null
null
RHSA-2009:0369
Red Hat Security Advisory: java-1.6.0-ibm security update
Java WebStart privilege escalation Java Web Start exposes username and the pathname of the JWS cache Java Web Start BasicService displays local files in the browser Java WebStart allows hidden code privilege escalation OpenJDK UTF-8 decoder accepts non-shortest form sequences (4486841) OpenJDK Font processing vulnerability (6733336) OpenJDK Truetype Font processing vulnerability (6751322) OpenJDK Buffer Overflow in GIF image processing (6766136)
[ "cpe:/a:redhat:rhel_extras:4", "cpe:/a:redhat:rhel_extras:5::client", "cpe:/a:redhat:rhel_extras:5::server" ]
null
null
null
null
RHSA-2022:0447
Red Hat Security Advisory: Red Hat Single Sign-On 7.5.1 security update on RHEL 7
undertow: client side invocation timeout raised when calling over HTTP2 log4j: Remote code execution in Log4j 1.x when application is configured to use JMSAppender log4j: Remote code execution in Log4j 1.x when application is configured to use JMSSink log4j: SQL injection in Log4j 1.x when application is configured to use JDBCAppender log4j: Unsafe deserialization flaw in Chainsaw log viewer
[ "cpe:/a:redhat:red_hat_single_sign_on:7.5::el7" ]
null
8.8
null
null
RHSA-2024:10219
Red Hat Security Advisory: perl-App-cpanminus:1.7044 security update
perl-App-cpanminus: Insecure HTTP in App::cpanminus Allows Code Execution Vulnerability
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
8.1
null
null
RHSA-2015:1002
Red Hat Security Advisory: xen security update
qemu: fdc: out-of-bounds fifo buffer memory access
[ "cpe:/a:redhat:rhel_virtualization:5::client", "cpe:/a:redhat:rhel_virtualization:5::server", "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
RHSA-2022:4931
Red Hat Security Advisory: RHV Appliance (rhvm-appliance) security update [ovirt-4.5.0]
postgresql: memory disclosure in certain queries
[ "cpe:/o:redhat:rhev_hypervisor:4.4::el8" ]
null
6.5
null
null
RHSA-2008:0221
Red Hat Security Advisory: flash-plugin security update
Flash Player input validation error Flash plugin DNS rebinding Flash Player input validation error Flash Player cross-domain and cross-site scripting flaws Flash Player content injection flaw Flash Player cross domain HTTP header flaw Flash Player DNS rebind flaw security flaw
[ "cpe:/a:redhat:rhel_extras:3", "cpe:/a:redhat:rhel_extras:4", "cpe:/a:redhat:rhel_extras:5::client", "cpe:/a:redhat:rhel_extras:5::server" ]
null
null
null
null
RHSA-2019:0633
Red Hat Security Advisory: ghostscript security and bug fix update
ghostscript: superexec operator is available (700585) ghostscript: forceput in DefineResource is still accessible (700576)
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
7.3
null
RHSA-2022:7089
Red Hat Security Advisory: libksba security update
libksba: integer overflow may lead to remote code execution
[ "cpe:/a:redhat:enterprise_linux:8::crb", "cpe:/o:redhat:enterprise_linux:8::baseos" ]
null
8.6
null
null
RHSA-2018:3534
Red Hat Security Advisory: java-1.8.0-ibm security update
OpenJDK: Incorrect handling of unsigned attributes in signed Jar manifests (Security, 8194534) OpenJDK: Leak of sensitive header data via HTTP redirect (Networking, 8196902) OpenJDK: Incomplete enforcement of the trustURLCodebase restriction (JNDI, 8199177) OpenJDK: Improper field access checks (Hotspot, 8199226) OpenJDK: Missing endpoint identification algorithm check during TLS session resumption (JSSE, 8202613) OpenJDK: Unrestricted access to scripting engine (Scripting, 8202936) OpenJDK: Infinite loop in RIFF format reader (Sound, 8205361) libpng: Integer overflow and resultant divide-by-zero in pngrutil.c:png_check_chunk_length() allows for denial of service
[ "cpe:/a:redhat:rhel_extras:7" ]
null
null
6.5
null
RHSA-2025:0754
Red Hat Security Advisory: Red Hat OpenShift Builds 1.2
golang.org/x/net/html: Non-linear parsing of case-insensitive content in golang.org/x/net/html go-git: argument injection via the URL field
[ "cpe:/a:redhat:openshift_builds:1.2::el9" ]
null
8.1
null
null
RHSA-2020:4316
Red Hat Security Advisory: java-11-openjdk security and bug fix update
OpenJDK: High memory usage during deserialization of Proxy class with many interfaces (Serialization, 8236862) OpenJDK: Credentials sent over unencrypted LDAP connection (JNDI, 8237990) OpenJDK: Certificate blacklist bypass via alternate certificate encodings (Libraries, 8237995) OpenJDK: Integer overflow leading to out-of-bounds access (Hotspot, 8241114) OpenJDK: Missing permission check in path to URI conversion (Libraries, 8242680) OpenJDK: Incomplete check for invalid characters in URI to path conversion (Libraries, 8242685) OpenJDK: Race condition in NIO Buffer boundary checks (Libraries, 8244136)
[ "cpe:/a:redhat:rhel_e4s:8.0::appstream" ]
null
5.3
null
null
RHSA-2014:0134
Red Hat Security Advisory: java-1.7.0-ibm security update
OpenJDK: jarsigner does not detect unsigned bytecode injected into signed jars OpenJDK: null xmlns handling issue (Security, 8025026) OpenJDK: insufficient security checks in CORBA stub factories (CORBA, 8026193) JDK: unspecified vulnerability fixed in 6u71 and 7u51 (Deployment) JDK: unspecified vulnerability fixed in 6u71 and 7u51 (Deployment) JDK: unspecified vulnerability fixed in 6u71 and 7u51 (Deployment) OpenJDK: com.sun.corba.se. should be restricted package (CORBA, 8025022) JDK: unspecified vulnerability fixed in 6u71 and 7u51 (Deployment) JDK: unspecified vulnerability fixed in 6u71 and 7u51 (Deployment) ICU: Layout Engine LookupProcessor insufficient input checks (JDK 2D, 8025034) OpenJDK: XML canonicalizer mutable strings passed to untrusted code (Security, 8026417) OpenJDK: insufficient Socket checkListen checks (Networking, 8011786) OpenJDK: SnmpStatusException handling issues (Serviceability, 7068126) JDK: unspecified vulnerability fixed in 6u71 and 7u51 (Deployment) OpenJDK: document builder missing security checks (JAXP, 8027201, 8025018) JDK: unspecified vulnerability fixed in 6u71 and 7u51 (Deployment) JDK: unspecified vulnerability fixed in 6u71 and 7u51 (Deployment) JDK: unspecified vulnerability fixed in 6u71 and 7u51 (Deployment) OpenJDK: TLS/SSL handshake timing issues (JSSE, 8023069) JDK: unspecified vulnerability fixed in 6u71 and 7u51 (Deployment) OpenJDK: insecure subject principals set handling (JAAS, 8024306) JDK: unspecified vulnerability fixed in 5.0u71, 6u71 and 7u51 (2D) OpenJDK: insufficient package access checks in the Naming component (JNDI, 8025758) OpenJDK: XXE issue in decoder (Beans, 8023245) JDK: unspecified vulnerability fixed in 6u71 and 7u51 (Deployment) OpenJDK: insufficient security checks in IIOP streams (CORBA, 8025767)
[ "cpe:/a:redhat:rhel_extras:5::client", "cpe:/a:redhat:rhel_extras:5::server", "cpe:/a:redhat:rhel_extras:6" ]
null
null
null
null
RHSA-2023:4429
Red Hat Security Advisory: mod_auth_openidc:2.3 security update
cjose: AES GCM decryption uses the Tag length from the actual Authentication Tag provided in the JWE
[ "cpe:/a:redhat:rhel_e4s:8.1::appstream" ]
null
7.5
null
null
RHSA-2022:0254
Red Hat Security Advisory: rpm security update
rpm: RPM does not require subkeys to have a valid binding signature
[ "cpe:/a:redhat:rhel_eus:8.4::appstream", "cpe:/o:redhat:rhel_eus:8.4::baseos" ]
null
4.4
null
null
RHSA-2024:0106
Red Hat Security Advisory: nss security update
nss: timing attack against RSA decryption
[ "cpe:/a:redhat:rhel_eus:8.6::appstream" ]
null
6.5
null
null
RHSA-2023:6746
Red Hat Security Advisory: nghttp2 security update
HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack)
[ "cpe:/a:redhat:enterprise_linux:9::crb", "cpe:/o:redhat:enterprise_linux:9::baseos" ]
null
7.5
null
null
RHSA-2025:0400
Red Hat Security Advisory: redis security update
redis: Redis' Lua library commands may lead to remote code execution
[ "cpe:/a:redhat:rhel_e4s:9.0::appstream" ]
null
7
null
null
RHSA-2024:1941
Red Hat Security Advisory: thunderbird security update
Mozilla: Permission prompt input delay could expire when not in focus Mozilla: Denial of Service using HTTP/2 CONTINUATION frames Mozilla: GetBoundName in the JIT returned the wrong object Mozilla: Out-of-bounds-read after mis-optimized switch statement Mozilla: Incorrect JITting of arguments led to use-after-free during garbage collection Mozilla: Integer-overflow led to out-of-bounds-read in the OpenType sanitizer Mozilla: Potential use-after-free due to AlignedBuffer self-move Mozilla: Memory safety bug fixed in Firefox 125, Firefox ESR 115.10, and Thunderbird 115.10
[ "cpe:/a:redhat:rhel_eus:9.2::appstream" ]
null
7.5
null
null
RHSA-2014:0597
Red Hat Security Advisory: squid security update
squid: denial of service when using SSL-Bump
[ "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
null
null
RHSA-2020:5554
Red Hat Security Advisory: CloudForms 5.0.10 security, bug fix and enhancement update
Cloudforms: Incomplete fix for CVE-2020-10783
[ "cpe:/a:redhat:cloudforms_managementengine:5.11::el8" ]
null
8.4
null
null
RHSA-2022:2255
Red Hat Security Advisory: pcs security update
sinatra: path traversal possible outside of public_dir when serving static files
[ "cpe:/a:redhat:rhel_e4s:8.1::highavailability" ]
null
7.5
null
null
RHSA-2025:0850
Red Hat Security Advisory: python-jinja2 security update
jinja2: Jinja has a sandbox breakout through indirect reference to format method
[ "cpe:/a:redhat:rhel_eus:9.4::appstream" ]
null
6.3
null
null
RHSA-2024:1461
Red Hat Security Advisory: OpenShift Container Platform 4.14.18 packages and security update
golang-protobuf: encoding/protojson, internal/encoding/json: infinite loop in protojson.Unmarshal when unmarshaling certain forms of invalid JSON
[ "cpe:/a:redhat:openshift:4.14::el8", "cpe:/a:redhat:openshift:4.14::el9" ]
null
5.9
null
null
RHSA-2019:3843
Red Hat Security Advisory: kernel security update
hw: Machine Check Error on Page Size Change (IFU) hw: TSX Transaction Asynchronous Abort (TAA)
[ "cpe:/o:redhat:rhel_aus:6.5::server" ]
null
null
6.5
null
RHSA-2023:7740
Red Hat Security Advisory: Red Hat Ceph Storage 6.1 security, enhancements, and bug fix update
grafana: missing access control allows test alerts by underprivileged user grafana: data source proxy race condition
[ "cpe:/a:redhat:ceph_storage:6.1::el9" ]
null
7.5
null
null
RHSA-2023:7577
Red Hat Security Advisory: firefox security update
Mozilla: Out-of-bound memory access in WebGL2 blitFramebuffer Mozilla: Use-after-free in MessagePort::Entangled Mozilla: Clickjacking permission prompts using the fullscreen transition Mozilla: Use-after-free in ReadableByteStreamQueueEntry::Buffer Mozilla: Using Selection API would copy contents into X11 primary selection. Mozilla: Incorrect parsing of relative URLs starting with "///" Mozilla: Memory safety bugs fixed in Firefox 120, Firefox ESR 115.5, and Thunderbird 115.5
[ "cpe:/a:redhat:rhel_eus:9.2::appstream" ]
null
8.8
null
null
RHSA-2018:0481
Red Hat Security Advisory: jboss-ec2-eap package for EAP 7.1.1
resteasy: Vary header not added by CORS filter leading to cache poisoning artemis/hornetq: memory exhaustion via UDP and JGroups discovery undertow: Client can use bogus uri in Digest authentication infinispan: Unsafe deserialization of malicious object injected into data cache jackson-databind: Unsafe deserialization due to incomplete black list (incomplete fix for CVE-2017-7525) jackson-databind: Unsafe deserialization due to incomplete black list (incomplete fix for CVE-2017-15095) undertow: ALLOW_ENCODED_SLASH option not taken into account in the AjpRequestParser jackson-databind: unsafe deserialization due to incomplete blacklist (incomplete fix for CVE-2017-7525 and CVE-2017-17485)
[ "cpe:/a:redhat:jboss_enterprise_application_platform:7.1::el7", "cpe:/a:redhat:jboss_enterprise_application_platform:7::el6" ]
null
null
8.1
null
RHSA-2024:9195
Red Hat Security Advisory: cyrus-imapd security update
cyrus-imapd: unbounded memory allocation by sending many LITERALs in a single command
[ "cpe:/a:redhat:enterprise_linux:9::appstream" ]
null
6.5
null
null
RHSA-2024:0894
Red Hat Security Advisory: mysql:8.0 security update
zstd: mysql: buffer overrun in util.c mysql: InnoDB unspecified vulnerability (CPU Apr 2023) mysql: Server: DDL unspecified vulnerability (CPU Apr 2023) mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2023) mysql: Server: DDL unspecified vulnerability (CPU Apr 2023) mysql: Server: DDL unspecified vulnerability (CPU Apr 2023) mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2023) mysql: Server: Components Services unspecified vulnerability (CPU Apr 2023) mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2023) mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2023) mysql: Server: Components Services unspecified vulnerability (CPU Apr 2023) mysql: Server: Partition unspecified vulnerability (CPU Apr 2023) mysql: Server: Partition unspecified vulnerability (CPU Apr 2023) mysql: Server: Components Services unspecified vulnerability (CPU Apr 2023) mysql: Server: JSON unspecified vulnerability (CPU Apr 2023) mysql: Server: DML unspecified vulnerability (CPU Apr 2023) mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2023) mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2023) mysql: Client programs unspecified vulnerability (CPU Apr 2023) mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2023) mysql: Server: Replication unspecified vulnerability (CPU Jul 2023) mysql: Server: Replication unspecified vulnerability (CPU Jul 2023) mysql: InnoDB unspecified vulnerability (CPU Jul 2023) mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2023) mysql: InnoDB unspecified vulnerability (CPU Jul 2023) mysql: Server: Security: Privileges unspecified vulnerability (CPU Jul 2023) mysql: Server: Optimizer unspecified vulnerability (CPU Jul 2023) mysql: Server: Pluggable Auth unspecified vulnerability (CPU Jul 2023) mysql: Client programs unspecified vulnerability (CPU Jul 2023) mysql: Server: Optimizer unspecified vulnerability (CPU Jul 2023) mysql: Server: Optimizer unspecified vulnerability (CPU Jul 2023) mysql: Server: Replication unspecified vulnerability (CPU Jul 2023) mysql: Server: DDL unspecified vulnerability (CPU Jul 2023) mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2023) mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2023) mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2023) mysql: InnoDB unspecified vulnerability (CPU Oct 2023) mysql: InnoDB unspecified vulnerability (CPU Oct 2023) mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2023) mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2023) mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2023) mysql: InnoDB unspecified vulnerability (CPU Oct 2023) mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2023) mysql: InnoDB unspecified vulnerability (CPU Oct 2023) mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2023) mysql: InnoDB unspecified vulnerability (CPU Oct 2023) mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2023) mysql: Server: UDF unspecified vulnerability (CPU Oct 2023) mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2023) mysql: Server: Security: Encryption unspecified vulnerability (CPU Oct 2023) mysql: InnoDB unspecified vulnerability (CPU Oct 2023) mysql: Server: DML unspecified vulnerability (CPU Oct 2023) mysql: Server: RAPID unspecified vulnerability (CPU Jan 2024) mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2024) mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2024) mysql: Server: Security: Encryption unspecified vulnerability (CPU Jan 2024) mysql: Server: Security: Privileges unspecified vulnerability (CPU Jan 2024) mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2024) mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2024) mysql: Server: Replication unspecified vulnerability (CPU Jan 2024) mysql: Server: Options unspecified vulnerability (CPU Jan 2024) mysql: Server: DDL unspecified vulnerability (CPU Jan 2024) mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2024) mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2024) mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2024) mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2024) mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2024) mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2024) mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2024) mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2024) mysql: Server: DDL unspecified vulnerability (CPU Jan 2024) mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2024) mysql: Server: DML unspecified vulnerability (CPU Jan 2024) mysql: Server : Security : Firewall unspecified vulnerability (CPU Jan 2024) mysql: Server: UDF unspecified vulnerability (CPU Jan 2024) mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2024) mysql: Server: DML unspecified vulnerability (CPU Apr 2024) mysql: Server: DML unspecified vulnerability (CPU Apr 2024) mysql: Server: DML unspecified vulnerability (CPU Apr 2024) mysql: Server: DML unspecified vulnerability (CPU Apr 2024) mysql: Server: DML unspecified vulnerability (CPU Apr 2024) mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2024) mysql: Server: DML unspecified vulnerability (CPU Apr 2024) mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2024) mysql: Server: Audit Plug-in unspecified vulnerability (CPU Apr 2024) mysql: Optimizer unspecified vulnerability (CPU Jul 2024) mysql: Optimizer unspecified vulnerability (CPU Oct 2024)
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
4.9
null
null
RHSA-2015:1330
Red Hat Security Advisory: python security, bug fix, and enhancement update
python: multiple unbound readline() DoS flaws in python stdlib python: buffer overflow in socket.recvfrom_into() python: CGIHTTPServer module does not properly handle URL-encoded path separators in URLs python: buffer() integer overflow leading to out of bounds read
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
null
null
RHSA-2023:7500
Red Hat Security Advisory: thunderbird security update
Mozilla: Out-of-bound memory access in WebGL2 blitFramebuffer Mozilla: Use-after-free in MessagePort::Entangled Mozilla: Clickjacking permission prompts using the fullscreen transition Mozilla: Use-after-free in ReadableByteStreamQueueEntry::Buffer Mozilla: Using Selection API would copy contents into X11 primary selection. Mozilla: Incorrect parsing of relative URLs starting with "///" Mozilla: Memory safety bugs fixed in Firefox 120, Firefox ESR 115.5, and Thunderbird 115.5
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
8.8
null
null
RHSA-2022:1081
Red Hat Security Advisory: Gatekeeper Operator v0.2 security updates and bug fixes
golang.org/x/crypto: empty plaintext packet causes panic golang: crypto/elliptic: IsOnCurve returns true for invalid field elements
[ "cpe:/a:redhat:acm:2.3::el8" ]
null
7.1
null
null
RHSA-2024:1992
Red Hat Security Advisory: opencryptoki security update
opencryptoki: timing side-channel in handling of RSA PKCS#1 v1.5 padded ciphertexts (Marvin)
[ "cpe:/a:redhat:rhel_eus:8.6::crb", "cpe:/o:redhat:rhel_eus:8.6::baseos" ]
null
5.9
null
null
RHSA-2020:3432
Red Hat Security Advisory: kernel security update
kernel: buffer overflow in mwifiex_cmd_append_vsie_tlv function in drivers/net/wireless/marvell/mwifiex/scan.c kernel: heap-based buffer overflow in mwifiex_ret_wmm_get_status function in drivers/net/wireless/marvell/mwifiex/wmm.c
[ "cpe:/o:redhat:rhel_aus:7.4::server", "cpe:/o:redhat:rhel_e4s:7.4::server", "cpe:/o:redhat:rhel_tus:7.4::server" ]
null
7.1
null
null
RHSA-2015:1459
Red Hat Security Advisory: ntp security, bug fix, and enhancement update
ntp: vallen in extension fields are not validated ntp: drop packets with source address ::1 ntp: vallen in extension fields are not validated ntp: drop packets with source address ::1 ntp: ntpd accepts unauthenticated packets with symmetric key crypto ntp: authentication doesn't protect symmetric associations against DoS attacks ntp: ntp-keygen may generate non-random symmetric keys on big-endian systems
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
null
null
RHSA-2022:2043
Red Hat Security Advisory: c-ares security update
c-ares: Missing input validation of host names may lead to domain hijacking
[ "cpe:/o:redhat:enterprise_linux:8::baseos" ]
null
5.6
null
null
RHEA-2023:7493
Red Hat Enhancement Advisory: OpenShift sandboxed containers 1.5.0 update
containerd: Supplementary groups are not set up properly
[ "cpe:/a:redhat:openshift_sandboxed_containers:1.5.0::el9" ]
null
7.3
null
null
RHSA-2019:4357
Red Hat Security Advisory: Red Hat Ceph Storage security update
ceph: denial of service in RGW daemon
[ "cpe:/a:redhat:ceph_storage:3::ubuntu16.04" ]
null
null
6.5
null
RHBA-2020:0402
Red Hat Bug Fix Advisory: OpenShift Container Platform 3.11 bug fix update
jquery: Prototype pollution in object's prototype leading to denial of service, remote code execution, or property injection jenkins: Inbound TCP Agent Protocol/3 authentication bypass jenkins: UDP multicast/broadcast service amplification reflection attack jenkins: Non-constant time comparison of inbound TCP agent connection secret jenkins: Non-constant time HMAC comparison jenkins: Exposed session identifiers on user detail object in the whoAmI diagnostic page jenkins: Memory usage graphs accessible to anyone with Overall/Read jenkins: REST APIs vulnerable to clickjacking
[ "cpe:/a:redhat:openshift:3.11::el7" ]
null
3.1
5.6
null
RHSA-2016:2641
Red Hat Security Advisory: JBoss Enterprise Application Platform 7.0.3 for RHEL 7
undertow: Long URL proxy request lead to java.nio.BufferOverflowException and DoS
[ "cpe:/a:redhat:jboss_enterprise_application_platform:7::el7" ]
null
null
6.5
null
RHSA-2011:1187
Red Hat Security Advisory: dovecot security update
dovecot: potential crash when parsing header names that contain NUL characters
[ "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws", "cpe:/o:redhat:enterprise_linux:5::client_workstation", "cpe:/o:redhat:enterprise_linux:5::server", "cpe:/o:redhat:enterprise_linux:6::server" ]
null
null
null
null
RHSA-2010:0958
Red Hat Security Advisory: kernel-rt security and bug fix update
kernel: arbitrary kernel memory write via i915 GEM ioctl kernel: sctp: do not reset the packet during sctp_packet_config kernel: prevent heap corruption in snd_ctl_new() kernel: sctp memory corruption in HMAC handling kernel: setup_arg_pages: diagnose excessive argument size kernel: heap contents leak from ETHTOOL_GRXCLSRLALL kernel: CAN minor heap overflow kernel: net/packet/af_packet.c: reading uninitialized stack memory kernel: logic error in INET_DIAG bytecode auditing kernel: ipc/shm.c: reading uninitialized stack memory kernel: ipc/compat*.c: reading uninitialized stack memory kernel: drivers/usb/serial/mos*.c: reading uninitialized stack memory kernel: drivers/serial/serial_core.c: reading uninitialized stack memory kernel: drivers/char/nozomi.c: reading uninitialized stack memory kernel: drivers/video/ivtv/ivtvfb.c: reading uninitialized stack memory kernel: drivers/sound/pci/rme9652/hdsp.c: reading uninitialized stack memory kernel: drivers/video/via/ioctl.c: reading uninitialized stack memory kernel: ipc/sem.c: reading uninitialized stack memory kernel: gdth: integer overflow in ioc_general() kernel: socket filters infoleak kernel: perf bug
[ "cpe:/a:redhat:enterprise_mrg:1::el5" ]
null
null
null
null
RHSA-2020:0232
Red Hat Security Advisory: java-11-openjdk security update
OpenJDK: Incorrect exception processing during deserialization in BeanContextSupport (Serialization, 8224909) OpenJDK: Improper checks of SASL message properties in GssKrb5Base (Security, 8226352) OpenJDK: Incorrect isBuiltinStreamHandler check causing URL normalization issues (Networking, 8228548) OpenJDK: Use of unsafe RSA-MD5 checksum in Kerberos TGS (Security, 8229951) OpenJDK: Serialization filter changes via jdk.serialFilter property modification (Serialization, 8231422) OpenJDK: Excessive memory usage in OID processing in X.509 certificate parsing (Libraries, 8234037) OpenJDK: Incorrect handling of unexpected CertificateVerify TLS handshake messages (JSSE, 8231780)
[ "cpe:/a:redhat:rhel_e4s:8.0::appstream" ]
null
4.8
null
null
RHSA-2021:3851
Red Hat Security Advisory: Red Hat 3scale API Management 2.11.0 Release - Container Images
aws/aws-sdk-go: CBC padding oracle issue in AWS S3 Crypto SDK for golang aws-sdk-go: In-band key negotiation issue in AWS S3 Crypto SDK for golang RHOAM: XSS in 3scale at various places 3scale: missing validation of access token nginx: Off-by-one in ngx_resolver_copy() when labels are followed by a pointer to a root domain name
[ "cpe:/a:redhat:3scale_amp:2.11::el7", "cpe:/a:redhat:3scale_amp:2.11::el8" ]
null
8.1
null
null
RHSA-2005:014
Red Hat Security Advisory: nfs-utils security update
security flaw security flaw
[ "cpe:/o:redhat:enterprise_linux:2.1::as", "cpe:/o:redhat:enterprise_linux:2.1::aw", "cpe:/o:redhat:enterprise_linux:2.1::es", "cpe:/o:redhat:enterprise_linux:2.1::ws" ]
null
null
null
null
RHSA-2023:4350
Red Hat Security Advisory: python-requests security update
python-requests: Unintended leak of Proxy-Authorization header
[ "cpe:/a:redhat:enterprise_linux:9::appstream", "cpe:/o:redhat:enterprise_linux:9::baseos" ]
null
6.1
null
null
RHSA-2020:3119
Red Hat Security Advisory: samba security update
samba: NULL pointer de-reference and use-after-free in Samba AD DC LDAP Server with ASQ, VLV and paged_results
[ "cpe:/a:redhat:storage:3.5:samba:el8" ]
null
0
null
null
RHSA-2023:4696
Red Hat Security Advisory: kernel security update
hw: amd: Cross-Process Information Leak kernel: netfilter: use-after-free in nf_tables when processing batch requests can lead to privilege escalation
[ "cpe:/o:redhat:rhel_aus:7.6::server" ]
null
7.8
null
null
RHSA-2023:3152
Red Hat Security Advisory: thunderbird security update
Mozilla: Browser prompts could have been obscured by popups Mozilla: Crash in RLBox Expat driver Mozilla: Potential permissions request bypass via clickjacking Mozilla: Content process crash due to invalid wasm code Mozilla: Potential spoof due to obscured address bar Mozilla: Potential memory corruption in FileReader::DoReadData() Mozilla: Memory safety bugs fixed in Firefox 113 and Firefox ESR 102.11
[ "cpe:/a:redhat:rhel_e4s:8.1::appstream" ]
null
8.8
null
null
RHSA-2025:2415
Red Hat Security Advisory: Red Hat Insights for Runtimes security update
golang.org/x/net/html: Non-linear parsing of case-insensitive content in golang.org/x/net/html
[ "cpe:/a:redhat:insights_runtimes_operator:1.0::el8" ]
null
7.5
null
null
RHSA-2022:4786
Red Hat Security Advisory: openvswitch2.13 security update
DPDK: out-of-bounds read/write in vhost_user_set_inflight_fd() may lead to crash dpdk: sending vhost-user-inflight type messages could lead to DoS
[ "cpe:/o:redhat:enterprise_linux:8::fastdatapath" ]
null
6.5
null
null
RHSA-2021:3441
Red Hat Security Advisory: kpatch-patch security update
kernel: use-after-free in route4_change() in net/sched/cls_route.c
[ "cpe:/o:redhat:enterprise_linux:7::server" ]
null
7.8
null
null
RHSA-2019:0450
Red Hat Security Advisory: Red Hat JBoss Web Server 5.0 Service Pack 2 security and bug fix update
tomcat: Insecure defaults in CORS filter enable 'supportsCredentials' for all origins tomcat: Host name verification missing in WebSocket client
[ "cpe:/a:redhat:jboss_enterprise_web_server:5.0" ]
null
null
4.3
null
RHSA-2024:2098
Red Hat Security Advisory: container-tools:rhel8 security and bug fix update
buildah: full container escape at build time
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
8.6
null
null
RHSA-2022:1489
Red Hat Security Advisory: java-1.8.0-openjdk security update
OpenJDK: Unbounded memory allocation when compiling crafted XPath expressions (JAXP, 8270504) OpenJDK: Improper object-to-string conversion in AnnotationInvocationHandler (Libraries, 8277672) OpenJDK: Missing check for negative ObjectIdentifier (Libraries, 8275151) OpenJDK: Defective secure validation in Apache Santuario (Libraries, 8278008) OpenJDK: URI parsing inconsistencies (JNDI, 8278972)
[ "cpe:/a:redhat:rhel_eus:8.2::appstream" ]
null
5.3
null
null
RHSA-2020:4167
Red Hat Security Advisory: qemu-kvm-rhev security update
QEMU: vnc: memory leakage upon disconnect QEMU: usb: out-of-bounds r/w access issue while processing usb packets
[ "cpe:/a:redhat:openstack:13::el7" ]
null
5
null
null
RHSA-2012:1047
Red Hat Security Advisory: php53 security update
php: Format string flaw in phar extension via phar_stream_flush() (MOPS-2010-024) php: zend_strndup() NULL pointer dereference may cause DoS php: XSLT file writing vulnerability php: strtotime timezone memory leak php: $_FILES array indexes corruption crypt(): DES encrypted password weakness php: incomplete CVE-2012-1823 fix - missing filtering of -T and -h php: Integer overflow leading to heap-buffer overflow in the Phar extension
[ "cpe:/o:redhat:enterprise_linux:5::client_workstation", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
RHSA-2021:0558
Red Hat Security Advisory: kernel security, bug fix, and enhancement update
kernel: performance counters race condition use-after-free kernel: ICMP rate limiting can be used for DNS poisoning attack kernel: locking issue in drivers/tty/tty_jobctrl.c can lead to an use-after-free
[ "cpe:/a:redhat:enterprise_linux:8::crb", "cpe:/o:redhat:enterprise_linux:8::baseos" ]
null
7.8
null
null
RHSA-2018:2533
Red Hat Security Advisory: openstack-keystone security update
openstack-keystone: Information Exposure through /v3/OS-FEDERATION/projects
[ "cpe:/a:redhat:openstack:13::el7" ]
null
null
5.3
null
RHSA-2020:0127
Red Hat Security Advisory: thunderbird security update
Mozilla: Bypass of @namespace CSS sanitization during pasting Mozilla: Type Confusion in XPCVariant.cpp Mozilla: CSS sanitization does not escape HTML tags Mozilla: Memory safety bugs fixed in Firefox 72 and Firefox ESR 68.4 Mozilla: IonMonkey type confusion with StoreElementHole and FallibleStoreElement
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
8.8
8.8
null
RHSA-2013:0941
Red Hat Security Advisory: flash-plugin security update
flash-plugin: code execution flaw (APSB13-16)
[ "cpe:/a:redhat:rhel_extras:5::server", "cpe:/a:redhat:rhel_extras:6" ]
null
null
null
null
RHSA-2023:2161
Red Hat Security Advisory: fence-agents security and bug fix update
python-oauthlib: DoS when attacker provides malicious IPV6 URI
[ "cpe:/a:redhat:enterprise_linux:9::appstream", "cpe:/a:redhat:enterprise_linux:9::highavailability", "cpe:/a:redhat:enterprise_linux:9::resilientstorage" ]
null
6.5
null
null
RHSA-2024:0563
Red Hat Security Advisory: kernel-rt security update
hw: Intel: Gather Data Sampling (GDS) side channel vulnerability kernel: use-after-free in smb2_is_status_io_timeout() kernel: UAF during login when accessing the shost ipaddress kernel: bpf: Incorrect verifier pruning leads to unsafe code paths being incorrectly marked as safe kernel: tun: bugs for oversize packet when napi frags enabled in tun_napi_alloc_frags kernel: use after free in unix_stream_sendpage kernel: net/sched: sch_hfsc UAF kernel: use-after-free in sch_qfq network scheduler kernel: fbcon: out-of-sync arrays in fbcon_mode_deleted due to wrong con2fb_map assignment kernel: netfilter: potential slab-out-of-bound access due to integer underflow kernel: IGB driver inadequate buffer size for frames larger than MTU
[ "cpe:/a:redhat:rhel_tus:8.4::nfv", "cpe:/a:redhat:rhel_tus:8.4::realtime" ]
null
7.5
null
null
RHSA-2010:0749
Red Hat Security Advisory: poppler security update
xpdf: uninitialized Gfx::parser pointer dereference xpdf: array indexing error in FoFiType1::parse()
[ "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::client_workstation", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
RHBA-2019:0802
Red Hat Bug Fix Advisory: Red Hat Virtualization Manager (ovirt-engine) 4.2.8
ovirt-engine: Missing permissions check in web ui allows a user with basic privileges to delete disks
[ "cpe:/a:redhat:rhev_manager:4.2" ]
null
null
6.5
null
RHSA-2008:0857
Red Hat Security Advisory: kernel security and bug fix update
kernel snd_seq_oss_synth_make_info leak Linux kernel local filesystem DoS Linux kernel dccp_setsockopt_change() integer overflow Linux kernel sctp_setsockopt_auth_key() integer overflow kernel: tmpfs: fix kernel BUG in shmem_delete_inode kernel: fix off-by-one error in iov_iter_advance() kernel: sctp: fix potential panics in the SCTP-AUTH API kernel: nfsd: fix buffer overrun decoding NFSv4 acl kernel: sctp_getsockopt_hmac_ident information disclosure kernel: sctp: fix random memory dereference with SCTP_HMAC_IDENT option
[ "cpe:/a:redhat:enterprise_mrg:1::el5" ]
null
null
null
null
RHSA-2023:4952
Red Hat Security Advisory: firefox security update
Mozilla: Full screen notification obscured by file open dialog Mozilla: Full screen notification obscured by external program Mozilla: Memory corruption in IPC CanvasTranslator Mozilla: Memory corruption in IPC ColorPickerShownCallback Mozilla: Memory corruption in IPC FilePickerShownCallback Mozilla: Memory corruption in JIT UpdateRegExpStatics Mozilla: Error reporting methods in SpiderMonkey could have triggered an Out of Memory Exception Mozilla: Push notifications saved to disk unencrypted Mozilla: XLL file extensions were downloadable without warnings Mozilla: Browsing Context potentially not cleared when closing Private Window Mozilla: Memory safety bugs fixed in Firefox 117, Firefox ESR 102.15, Firefox ESR 115.2, Thunderbird 102.15, and Thunderbird 115.2 Mozilla: Memory safety bugs fixed in Firefox 117, Firefox ESR 115.2, and Thunderbird 115.2
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
8.8
null
null
RHSA-2024:7455
Red Hat Security Advisory: git-lfs security update
encoding/gob: golang: Calling Decoder.Decode on a message which contains deeply nested structures can cause a panic due to stack exhaustion
[ "cpe:/a:redhat:rhel_aus:8.6::appstream", "cpe:/a:redhat:rhel_e4s:8.6::appstream", "cpe:/a:redhat:rhel_tus:8.6::appstream" ]
null
7.5
null
null
RHSA-2024:4431
Red Hat Security Advisory: libreswan security update
libreswan: IKEv1 default AH/ESP responder can crash and restart
[ "cpe:/a:redhat:rhel_eus:9.2::appstream" ]
null
6.5
null
null
RHSA-2003:030
Red Hat Security Advisory: lynx security update
security flaw
[ "cpe:/o:redhat:enterprise_linux:2.1::as", "cpe:/o:redhat:enterprise_linux:2.1::aw" ]
null
null
null
null
RHSA-2022:6094
Red Hat Security Advisory: OpenShift Container Platform 4.10.28 packages and security update
golang: cmd/go: misinterpretation of branch names can lead to incorrect access control golang: crypto/elliptic: IsOnCurve returns true for invalid field elements golang: encoding/pem: fix stack overflow in Decode golang: crypto/elliptic: panic caused by oversized scalar
[ "cpe:/a:redhat:openshift:4.10::el7", "cpe:/a:redhat:openshift:4.10::el8" ]
null
7.5
null
null
RHSA-2023:1047
Red Hat Security Advisory: Red Hat Single Sign-On 7.6.2 for OpenShift image security and enhancement update
bootstrap: Cross-site Scripting (XSS) in the collapse data-parent attribute bootstrap: Cross-site Scripting (XSS) in the data-container property of tooltip jquery: Prototype pollution in object's prototype leading to denial of service, remote code execution, or property injection jquery: Cross-site scripting due to improper injQuery.htmlPrefilter method glob-parent: Regular Expression Denial of Service minimist: prototype pollution keycloak: HTML injection in execute-actions-email Admin REST API keycloak: XSS on impersonation under specific circumstances SnakeYaml: Constructor Deserialization Remote Code Execution Undertow: DoS can be achieved as Undertow server waits for the LAST_CHUNK forever for EJB invocations keycloak: path traversal via double URL encoding keycloak: Session takeover with OIDC offline refreshtokens rhsso-container-image: unsecured management interface exposed to adjecent network Moment.js: Path traversal in moment.locale snakeyaml: Denial of Service due to missing nested depth limitation for collections moment: inefficient parsing algorithm resulting in DoS loader-utils: Regular expression denial of service snakeyaml: Uncaught exception in org.yaml.snakeyaml.composer.Composer.composeSequenceNode snakeyaml: Uncaught exception in org.yaml.snakeyaml.constructor.BaseConstructor.constructObject snakeyaml: Uncaught exception in java.base/java.util.regex.Pattern$Ques.match jettison: parser crash by stackoverflow jettison: memory exhaustion via user-supplied XML or JSON data jackson-databind: deep wrapper array nesting wrt UNWRAP_SINGLE_VALUE_ARRAYS jackson-databind: use of deeply nested arrays mina-sshd: Java unsafe deserialization vulnerability jettison: If the value in map is the map's self, the new new JSONObject(map) cause StackOverflowError which may lead to dos json5: Prototype Pollution in JSON5 via Parse Method CXF: directory listing / code exfiltration CXF: SSRF Vulnerability keycloak: Client Registration endpoint does not check token revocation keycloak: user impersonation via stolen uuid code
[ "cpe:/a:redhat:rhosemc:1.0::el8" ]
null
4.6
5.6
null
RHSA-2018:3598
Red Hat Security Advisory: OpenShift Container Platform 3.6 security update
kubernetes: authentication/authorization bypass in the handling of non-101 responses
[ "cpe:/a:redhat:openshift:3.6::el7" ]
null
null
9.8
null
RHSA-2016:0446
Red Hat Security Advisory: Red Hat JBoss Web Server 3.0.2 OpenSSL Security Update
openssl: assertion failure in SSLv2 servers OpenSSL: SSLv2 doesn't block disabled ciphers SSL/TLS: Cross-protocol attack on TLS using SSLv2 (DROWN)
[ "cpe:/a:redhat:jboss_enterprise_web_server:3.0" ]
null
null
null
null