id
stringlengths
13
15
title
stringlengths
29
176
description
stringlengths
8
32.1k
cpes
listlengths
0
20
cvss_v4_0
null
cvss_v3_1
float64
0
10
cvss_v3_0
float64
0
10
cvss_v2_0
null
RHSA-2015:0674
Red Hat Security Advisory: kernel security and bug fix update
kernel: splice: lack of generic write checks kernel: infiniband: uverbs: unprotected physical memory access kernel: iptables restriction bypass if a protocol handler kernel module not loaded kernel: kvm: excessive pages un-pinning in kvm_iommu_map error path
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
null
null
RHSA-2022:8869
Red Hat Security Advisory: Red Hat OpenStack Platform 16.1.9 (puppet-firewall) security update
puppetlabs-firewall: unmanaged rules could leave system in an unsafe state via duplicate comment
[ "cpe:/a:redhat:openstack:16.1::el8" ]
null
9.8
null
null
RHSA-2014:1843
Red Hat Security Advisory: kernel security and bug fix update
Kernel: USB serial: memory corruption flaw kernel: kvm: PIT timer race condition kernel: kvm: vmx: invept vm exit not handled kernel: kvm: vmx: invvpid vm exit not handled
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
null
null
RHSA-2022:5641
Red Hat Security Advisory: kpatch-patch security update
kernel: a use-after-free write in the netfilter subsystem can lead to privilege escalation to root
[ "cpe:/o:redhat:rhel_eus:8.4::baseos" ]
null
7.8
null
null
RHSA-2002:294
Red Hat Security Advisory: fetchmail security update
security flaw
[ "cpe:/o:redhat:enterprise_linux:2.1::as", "cpe:/o:redhat:enterprise_linux:2.1::aw" ]
null
null
null
null
RHSA-2025:1413
Red Hat Security Advisory: Updated service-interconnect rhel9 container images for 1.8
skupper: skupper-cli: Flawed authentication method may lead to arbitrary file read or Denial of Service
[ "cpe:/a:redhat:service_interconnect:1::el9" ]
null
7.1
null
null
RHSA-2021:0028
Red Hat Security Advisory: Red Hat Virtualization security, bug fix, and enhancement update
lldpd: buffer overflow in the lldp_decode function in daemon/protocols/lldp.c
[ "cpe:/a:redhat:rhev_manager:4.3", "cpe:/o:redhat:enterprise_linux:7::hypervisor" ]
null
9.8
null
null
RHSA-2023:6409
Red Hat Security Advisory: libvirt security, bug fix, and enhancement update
libvirt: improper locking in virStoragePoolObjListSearch may lead to denial of service
[ "cpe:/a:redhat:enterprise_linux:9::appstream", "cpe:/a:redhat:enterprise_linux:9::crb" ]
null
6.5
null
null
RHSA-2009:1211
Red Hat Security Advisory: kernel security and bug fix update
kernel: r8169: fix crash when large packets are received kernel: cifs: memory overwrite when saving nativeFileSystem field during mount kernel: cifs: fix potential buffer overruns when converting unicode strings sent by server
[ "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws" ]
null
null
null
null
RHSA-2022:6787
Red Hat Security Advisory: Red Hat Single Sign-On 7.5.3 security update
jackson-databind: denial of service via a large depth of nested objects h2: Remote Code Execution in Console netty: control chars in header names may lead to HTTP request smuggling xnio: org.xnio.StreamConnection.notifyReadClosed log to debug instead of stderr keycloak: Stored XSS in groups dropdown wildfly: Wildfly management of EJB Session context returns wrong caller principal with Elytron Security enabled keycloak: improper input validation permits script injection keycloak: Uploading of SAML javascript protocol mapper scripts through the admin console
[ "cpe:/a:redhat:red_hat_single_sign_on:7" ]
null
6.4
null
null
RHSA-2008:0123
Red Hat Security Advisory: java-1.5.0-sun security update
java-1.5.0 Privilege escalation via unstrusted applet and application
[ "cpe:/a:redhat:rhel_extras:4", "cpe:/a:redhat:rhel_extras:5::client", "cpe:/a:redhat:rhel_extras:5::server" ]
null
null
null
null
RHSA-2022:0438
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 6.4 security update
log4j: Remote code execution in Log4j 1.x when application is configured to use JMSAppender log4j: Remote code execution in Log4j 1.x when application is configured to use JMSSink log4j: SQL injection in Log4j 1.x when application is configured to use JDBCAppender log4j: Unsafe deserialization flaw in Chainsaw log viewer
[ "cpe:/a:redhat:jboss_enterprise_application_platform:6::el6", "cpe:/a:redhat:jboss_enterprise_application_platform:6::el7" ]
null
8.8
null
null
RHSA-2003:245
Red Hat Security Advisory: : Updated wu-ftpd packages fix remote vulnerability.
security flaw
[ "cpe:/o:redhat:linux:7.1", "cpe:/o:redhat:linux:7.2", "cpe:/o:redhat:linux:7.3", "cpe:/o:redhat:linux:8.0" ]
null
null
null
null
RHSA-2023:7418
Red Hat Security Advisory: kpatch-patch security update
kernel: net/sched: cls_u32 component reference counter leak if tcf_change_indev() fails kernel: tun: bugs for oversize packet when napi frags enabled in tun_napi_alloc_frags kernel: net/sched: Use-after-free vulnerabilities in the net/sched classifiers: cls_fw, cls_u32 and cls_route kernel: net/sched: Use-after-free vulnerabilities in the net/sched classifiers: cls_fw, cls_u32 and cls_route kernel: net/sched: Use-after-free vulnerabilities in the net/sched classifiers: cls_fw, cls_u32 and cls_route kernel: net/sched: Use-after-free vulnerabilities in the net/sched classifiers: cls_fw, cls_u32 and cls_route kernel: use after free in nvmet_tcp_free_crypto in NVMe kernel: netfilter: potential slab-out-of-bound access due to integer underflow
[ "cpe:/o:redhat:rhel_eus:9.2::baseos" ]
null
7
null
null
RHSA-2019:4052
Red Hat Security Advisory: OpenShift Container Platform 3.11 atomic-openshift security update
kubernetes: Bearer tokens written to logs at high verbosity levels (>= 7)
[ "cpe:/a:redhat:openshift:3.11::el7" ]
null
null
4.4
null
RHSA-2007:1130
Red Hat Security Advisory: squid security update
squid: DoS in cache updates
[ "cpe:/o:redhat:enterprise_linux:2.1::as", "cpe:/o:redhat:enterprise_linux:2.1::aw", "cpe:/o:redhat:enterprise_linux:2.1::es", "cpe:/o:redhat:enterprise_linux:3::as", "cpe:/o:redhat:enterprise_linux:3::desktop", "cpe:/o:redhat:enterprise_linux:3::es", "cpe:/o:redhat:enterprise_linux:3::ws", "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws", "cpe:/o:redhat:enterprise_linux:5::client_workstation", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
RHSA-2015:2587
Red Hat Security Advisory: kernel security, bug fix, and enhancement update
Kernel: vfs: Do not allow escaping from bind mounts virt: guest to host DoS by triggering an infinite loop in microcode via #AC exception kernel: Unauthorized access to IPC objects with SysV shm
[ "cpe:/o:redhat:rhel_eus:7.1::computenode", "cpe:/o:redhat:rhel_eus:7.1::server" ]
null
null
null
null
RHSA-2024:8617
Red Hat Security Advisory: kernel security update
kernel: tty: Fix out-of-bound vmalloc access in imageblit hw: cpu: intel: Native Branch History Injection (BHI) kernel: tcp: add sanity checks to rx zerocopy kernel: mptcp: fix data re-injection from stale subflow kernel: af_unix: Fix garbage collector racing against connect() kernel: scsi: core: Fix unremoved procfs host directory regression kernel: mac802154: fix llsec key resources release in mac802154_llsec_key_del kernel: net/sched: taprio: extend minimum interval restriction to entire cycle too kernel: xfs: fix log recovery buffer allocation for the legacy h_size fixup kernel: netfilter: nft_inner: validate mandatory meta and payload kernel: USB: class: cdc-wdm: Fix CPU lockup caused by excessive log messages kernel: mptcp: ensure snd_una is properly initialized on connect kernel: ipv6: prevent possible NULL dereference in rt6_probe() kernel: ext4: do not create EA inode under buffer lock kernel: wifi: mt76: mt7921s: fix potential hung tasks during chip recovery kernel: net/sched: act_api: fix possible infinite loop in tcf_idr_check_alloc() kernel: ext4: fix uninitialized ratelimit_state->lock access in __ext4_fill_super() kernel: netpoll: Fix race condition in netpoll_owner_active kernel: xfs: don't walk off the end of a directory data block kernel: xfs: add bounds checking to xlog_recover_process_data kernel: block: initialize integrity buffer to zero before writing it to media kernel: netfilter: flowtable: initialise extack before use
[ "cpe:/a:redhat:enterprise_linux:9::appstream", "cpe:/a:redhat:enterprise_linux:9::crb", "cpe:/a:redhat:enterprise_linux:9::nfv", "cpe:/a:redhat:enterprise_linux:9::realtime", "cpe:/o:redhat:enterprise_linux:9::baseos" ]
null
5.5
null
null
RHSA-2024:3127
Red Hat Security Advisory: zziplib security update
zziplib: invalid memory access at zzip_disk_entry_to_file_header in mmapped.c
[ "cpe:/a:redhat:enterprise_linux:8::appstream", "cpe:/a:redhat:enterprise_linux:8::crb" ]
null
5.5
null
null
RHSA-2022:0434
Red Hat Security Advisory: Release of OpenShift Serverless 1.20.0
golang: net: incorrect parsing of extraneous zero characters at the beginning of an IP address octet golang: Command-line arguments may overwrite global data golang: archive/zip: malformed archive may cause panic or memory exhaustion (incomplete fix of CVE-2021-33196)
[ "cpe:/a:redhat:serverless:1.20::el8" ]
null
7.5
null
null
RHSA-2022:7090
Red Hat Security Advisory: libksba security update
libksba: integer overflow may lead to remote code execution
[ "cpe:/a:redhat:enterprise_linux:9::crb", "cpe:/o:redhat:enterprise_linux:9::baseos" ]
null
8.6
null
null
RHSA-2023:5931
Red Hat Security Advisory: Satellite 6.13.5 Async Security Update
openssl: c_rehash script allows command injection openssl: the c_rehash script allows command injection foreman: OS command injection via ct_command and fcct_command GitPython: improper user input validation leads into a RCE ruby-git: code injection vulnerability ruby-git: code injection vulnerability Satellite/Foreman: Arbitrary code execution through yaml global parameters OpenSSL: Excessive time spent checking DH q parameter value python-django: Potential bypass of validation when uploading multiple files using one form field python-django: Potential regular expression denial of service vulnerability in EmailValidator/URLValidator golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487) GitPython: Insecure non-multi options in clone and clone_from is not blocked HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack)
[ "cpe:/a:redhat:satellite:6.13::el8", "cpe:/a:redhat:satellite_capsule:6.13::el8", "cpe:/a:redhat:satellite_maintenance:6.13::el8", "cpe:/a:redhat:satellite_utils:6.13::el8" ]
null
7.5
null
null
RHSA-2024:4074
Red Hat Security Advisory: kpatch-patch security update
kernel: nf_tables: use-after-free vulnerability in the nft_verdict_init() function
[ "cpe:/o:redhat:rhel_eus:9.2::baseos" ]
null
7.8
null
null
RHSA-2024:6973
Red Hat Security Advisory: dovecot security update
dovecot: using a large number of address headers may trigger a denial of service dovecot: very large headers can cause resource exhaustion when parsing message
[ "cpe:/a:redhat:enterprise_linux:8::appstream", "cpe:/a:redhat:enterprise_linux:8::crb" ]
null
6.8
null
null
RHSA-2023:4462
Red Hat Security Advisory: firefox security update
Mozilla: Offscreen Canvas could have bypassed cross-origin restrictions Mozilla: Incorrect value used during WASM compilation Mozilla: Potential permissions request bypass via clickjacking Mozilla: Crash in DOMParser due to out-of-memory conditions Mozilla: Fix potential race conditions when releasing platform objects Mozilla: Stack buffer overflow in StorageManager Mozilla: Cookie jar overflow caused unexpected cookie jar state Mozilla: Memory safety bugs fixed in Firefox 116, Firefox ESR 115.1, Firefox ESR 102.14, Thunderbird 115.1, and Thunderbird 102.14 Mozilla: Memory safety bugs fixed in Firefox ESR 115.1, and Thunderbird 115.1
[ "cpe:/a:redhat:enterprise_linux:9::appstream" ]
null
9.8
null
null
RHSA-2021:3576
Red Hat Security Advisory: krb5 security update
krb5: Sending a request containing PA-ENCRYPTED-CHALLENGE padata element without using FAST could result in NULL dereference in KDC which leads to DoS krb5: NULL pointer dereference in process_tgs_req() in kdc/do_tgs_req.c via a FAST inner body that lacks server field
[ "cpe:/o:redhat:enterprise_linux:8::baseos" ]
null
6.5
null
null
RHSA-2015:1706
Red Hat Security Advisory: bind security update
bind: malformed DNSSEC key failed assertion denial of service
[ "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::client_workstation", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
RHSA-2019:2427
Red Hat Security Advisory: chromium-browser security update
chromium-browser: Use-after-free in offline page fetcher chromium-browser: Use-after-poison in offline audio context chromium-browser: Object leak of utility functions chromium-browser: Memory corruption in regexp length check chromium-browser: Integer overflow in PDFium text rendering chromium-browser: Integer overflow in PDFium chromium-browser: Insufficient checks on filesystem: URI permissions chromium-browser: Comparison of -0 and null yields crash chromium-browser: Insufficient filtering of Open URL service parameters chromium-browser: res: URIs can load alternative browsers chromium-browser: Use-after-free in PDFium chromium-browser: Click location incorrectly checked chromium-browser: AppCache not robust to compromised renderers chromium-browser: Insufficient port filtering in CORS for extensions chromium-browser: Site isolation bypass from compromised renderer
[ "cpe:/a:redhat:rhel_extras:6" ]
null
null
6.5
null
RHSA-2024:2845
Red Hat Security Advisory: kernel security and bug fix update
kernel: netfilter: nftables: exthdr: fix 4-byte stack OOB write kernel: untrusted VMM can trigger int80 syscall handling
[ "cpe:/a:redhat:rhel_eus:9.2::appstream", "cpe:/a:redhat:rhel_eus:9.2::crb", "cpe:/o:redhat:rhel_eus:9.2::baseos" ]
null
5.6
null
null
RHSA-2016:0494
Red Hat Security Advisory: kernel security, bug fix, and enhancement update
kernel: pipe buffer state corruption after unsuccessful atomic read from pipe
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
null
null
RHSA-2014:1676
Red Hat Security Advisory: wireshark security update
wireshark: RTP dissector crash (wnpa-sec-2014-12) wireshark: RTP dissector crash (wnpa-sec-2014-12) wireshark: MEGACO dissector infinite loop (wnpa-sec-2014-13) wireshark: Netflow dissector crash (wnpa-sec-2014-14) wireshark: CUPS dissector crash (wnpa-sec-2014-15) wireshark: HIP dissector infinite loop (wnpa-sec-2014-16) wireshark: RTSP dissector crash (wnpa-sec-2014-17) wireshark: SES dissector crash (wnpa-sec-2014-18) wireshark: DOS Sniffer file parser flaw (wnpa-sec-2014-19) wireshark: DOS Sniffer file parser flaw (wnpa-sec-2014-19) wireshark: DOS Sniffer file parser flaw (wnpa-sec-2014-19) wireshark: DOS Sniffer file parser flaw (wnpa-sec-2014-19)
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation", "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
null
null
RHSA-2024:2044
Red Hat Security Advisory: gnutls security update
gnutls: vulnerable to Minerva side-channel information leak
[ "cpe:/a:redhat:rhel_eus:8.6::appstream", "cpe:/o:redhat:rhel_eus:8.6::baseos" ]
null
5.3
null
null
RHSA-2014:0433
Red Hat Security Advisory: kernel security, bug fix, and enhancement update
Kernel: net: tcp: potential DoS via SYN+FIN messages Kernel: HID: memory corruption flaw
[ "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
RHSA-2017:1583
Red Hat Security Advisory: bind security and bug fix update
bind: assertion failure while handling responses containing a DNAME answer bind: assertion failure while processing response to an ANY query bind: assertion failure while handling a query response containing inconsistent DNSSEC information bind: assertion failure while handling an unusually-formed DS record response bind: Processing a response containing CNAME or DNAME with unusual order can crash resolver
[ "cpe:/o:redhat:rhel_eus:7.2::computenode", "cpe:/o:redhat:rhel_eus:7.2::server" ]
null
null
7.5
null
RHSA-2024:0965
Red Hat Security Advisory: unbound security update
bind9: KeyTrap - Extreme CPU consumption in DNSSEC validator bind9: Preparing an NSEC3 closest encloser proof can exhaust CPU resources
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
7.5
null
null
RHSA-2010:0661
Red Hat Security Advisory: kernel security update
kernel: mm: keep a guard page below a grow-down stack segment
[ "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
RHSA-2023:2202
Red Hat Security Advisory: frr security, bug fix, and enhancement update
frr: out-of-bounds read in the BGP daemon may lead to information disclosure or denial of service
[ "cpe:/a:redhat:enterprise_linux:9::appstream" ]
null
7.1
null
null
RHSA-2013:0771
Red Hat Security Advisory: curl security update
curl: Cookie domain suffix match vulnerability
[ "cpe:/o:redhat:enterprise_linux:5::server", "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
null
null
RHSA-2020:0901
Red Hat Security Advisory: icu security update
ICU: Integer overflow in UnicodeString::doAppend()
[ "cpe:/o:redhat:rhel_e4s:8.0::baseos" ]
null
8.8
null
null
RHSA-2007:1023
Red Hat Security Advisory: cups security update
Incomplete fix for CVE-2007-0720 CUPS denial of service cups boundary error CCITTFaxStream:: lookChar()
[ "cpe:/o:redhat:enterprise_linux:3::as", "cpe:/o:redhat:enterprise_linux:3::desktop", "cpe:/o:redhat:enterprise_linux:3::es", "cpe:/o:redhat:enterprise_linux:3::ws" ]
null
null
null
null
RHSA-2022:8112
Red Hat Security Advisory: frr security, bug fix, and enhancement update
frrouting: overflow bugs in unpack_tlv_router_cap
[ "cpe:/a:redhat:enterprise_linux:9::appstream" ]
null
7.8
null
null
RHSA-2013:0197
Red Hat Security Advisory: JBoss Enterprise Web Platform 5.2.0 update
JBoss: twiddle.sh accepts credentials as command line arguments, exposing them to other local users via a process listing jbossws: Prone to character encoding pattern attack (XML Encryption flaw) jbossws: Prone to Bleichenbacher attack against to be distributed symmetric key Framework: Information (internal server information, classpath, local working directories, session IDs) disclosure CSRF on jmx-console allows invocation of operations on mbeans Console: XSS in invoke operation Cache: NonManagedConnectionFactory will log password in clear text when an exception occurs JBoss invoker servlets do not require authentication JGroups diagnostics service enabled by default with no authentication when a JGroups channel is started apache-cxf: Apache CXF does not verify that elements were signed / encrypted by a particular Supporting Token JBoss: CallerIdentityLoginModule retaining password from previous call if a null password is provided JBoss: SecurityAssociation.getCredential() will return the previous credential if no security context is provided Web: Bypass of security constraints JBoss: AuthorizationInterceptor allows JMX operation to proceed despite authorization failure
[ "cpe:/a:redhat:jboss_enterprise_web_platform:5::el4" ]
null
null
null
null
RHSA-2021:2040
Red Hat Security Advisory: rh-mariadb103-mariadb and rh-mariadb103-galera security update
mariadb: writable system variables allows a database user with SUPER privilege to execute arbitrary code as the system mysql user
[ "cpe:/a:redhat:rhel_software_collections:3::el7" ]
null
7.2
null
null
RHSA-2023:1092
Red Hat Security Advisory: kernel-rt security and bug fix update
kernel: stack overflow in do_proc_dointvec and proc_skip_spaces kernel: use-after-free related to leaf anon_vma double reuse
[ "cpe:/a:redhat:rhel_extras_rt:7" ]
null
5.5
null
null
RHSA-2008:0579
Red Hat Security Advisory: vsftpd security update
older vsftpd authentication memory leak
[ "cpe:/o:redhat:enterprise_linux:3::as", "cpe:/o:redhat:enterprise_linux:3::es" ]
null
null
null
null
RHSA-2019:3219
Red Hat Security Advisory: sudo security update
sudo: Privilege escalation via 'Runas' specification with 'ALL' keyword
[ "cpe:/o:redhat:rhel_aus:7.3::server", "cpe:/o:redhat:rhel_e4s:7.3::server", "cpe:/o:redhat:rhel_tus:7.3::server" ]
null
null
7
null
RHSA-2025:1230
Red Hat Security Advisory: kernel-rt security update
kernel: media: uvcvideo: Skip parsing frames of type UVC_VS_UNDEFINED in uvc_parse_format
[ "cpe:/a:redhat:enterprise_linux:8::nfv", "cpe:/a:redhat:enterprise_linux:8::realtime" ]
null
7.3
null
null
RHSA-2024:0456
Red Hat Security Advisory: grub2 security update
grub2: bypass the GRUB password protection feature
[ "cpe:/o:redhat:rhel_eus:9.2::baseos" ]
null
6.8
null
null
RHSA-2024:8676
Red Hat Security Advisory: Red Hat OpenShift Data Foundation 4.17.0 Security, Enhancement, & Bug Fix Update
tough-cookie: prototype pollution in cookie memstore css-tools: Improper Input Validation causes Denial of Service via Regular Expression golang-protobuf: encoding/protojson, internal/encoding/json: infinite loop in protojson.Unmarshal when unmarshaling certain forms of invalid JSON golang: archive/zip: Incorrect handling of certain ZIP files jose: resource exhaustion fast-xml-parser: ReDOS at currency parsing in currency.js webpack: DOM Clobbering vulnerability in AutoPublicPathRuntimeModule express: Improper Input Handling in Express Redirects send: Code Execution Vulnerability in Send Library serve-static: Improper Sanitization in serve-static path-to-regexp: Backtracking regular expressions cause ReDoS body-parser: Denial of Service Vulnerability in body-parser
[ "cpe:/a:redhat:openshift_data_foundation:4.17::el9" ]
null
7.5
null
null
RHSA-2021:4722
Red Hat Security Advisory: OpenShift Virtualization 2.6.8 RPMs security and bug fix update
golang: net: incorrect parsing of extraneous zero characters at the beginning of an IP address octet golang: crypto/tls: certificate of wrong type is causing TLS client to panic
[ "cpe:/a:redhat:container_native_virtualization:2.6::el7", "cpe:/a:redhat:container_native_virtualization:2.6::el8" ]
null
6.5
null
null
RHSA-2009:0325
Red Hat Security Advisory: seamonkey security update
libpng arbitrary free() flaw Firefox 2 and 3 - Layout engine crashes Firefox 2 and 3 crashes in the JavaScript engine Firefox XUL Linked Clones Double Free Vulnerability Firefox XML data theft via RDFXMLDataSource and cross-domain redirect
[ "cpe:/o:redhat:enterprise_linux:2.1::as", "cpe:/o:redhat:enterprise_linux:2.1::aw", "cpe:/o:redhat:enterprise_linux:2.1::es", "cpe:/o:redhat:enterprise_linux:2.1::ws", "cpe:/o:redhat:enterprise_linux:3::as", "cpe:/o:redhat:enterprise_linux:3::desktop", "cpe:/o:redhat:enterprise_linux:3::es", "cpe:/o:redhat:enterprise_linux:3::ws", "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws" ]
null
null
null
null
RHSA-2019:1602
Red Hat Security Advisory: kernel-alt security update
Kernel: tcp: integer overflow while processing SACK blocks allows remote denial of service Kernel: tcp: excessive resource consumption while processing SACK blocks allows remote denial of service kernel: tcp: excessive resource consumption for TCP connections with low MSS allows remote denial of service
[ "cpe:/o:redhat:enterprise_linux:7::server" ]
null
null
5.3
null
RHSA-2017:2452
Red Hat Security Advisory: openstack-neutron security update
openstack-neutron: iptables not active after update
[ "cpe:/a:redhat:openstack:6::el7" ]
null
null
5.3
null
RHSA-2022:0063
Red Hat Security Advisory: kernel security and bug fix update
kernel: perf_event_parse_addr_filter memory kernel: fuse: fuse_do_getattr() calls make_bad_inode() in inappropriate situations kernel: Heap buffer overflow in firedtv driver
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
6.7
null
null
RHSA-2003:419
Red Hat Security Advisory: kernel security update
security flaw
[ "cpe:/o:redhat:enterprise_linux:2.1::as", "cpe:/o:redhat:enterprise_linux:2.1::es", "cpe:/o:redhat:enterprise_linux:2.1::ws" ]
null
null
null
null
RHSA-2024:5258
Red Hat Security Advisory: container-tools:rhel8 security update
golang: net/http: golang: mime/multipart: golang: net/textproto: memory exhaustion in Request.ParseMultipartForm golang-fips/openssl: Memory leaks in code encrypting and decrypting RSA payloads containers/image: digest type does not guarantee valid type go-retryablehttp: url might write sensitive information to log file golang: crypto/x509: Verify panics on certificates with an unknown public key algorithm golang: net/mail: comments in display names are incorrectly handled golang: archive/zip: Incorrect handling of certain ZIP files gorilla/schema: Potential memory exhaustion attack due to sparse slice deserialization
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
7.5
null
null
RHSA-2024:8843
Red Hat Security Advisory: python3.11-urllib3 security update
urllib3: proxy-authorization request header is not stripped during cross-origin redirects
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
4.4
null
null
RHSA-2018:2766
Red Hat Security Advisory: flatpak security update
flatpak: sandbox escape in D-Bus filtering by a crafted authentication handshake
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
6.5
null
RHSA-2022:6160
Red Hat Security Advisory: systemd security update
systemd-resolved: use-after-free when dealing with DnsStream in resolved-dns-stream.c
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
9.8
null
null
RHSA-2003:073
Red Hat Security Advisory: : Updated sendmail packages fix critical security issues
security flaw security flaw
[ "cpe:/o:redhat:linux:6.2", "cpe:/o:redhat:linux:7.0", "cpe:/o:redhat:linux:7.1", "cpe:/o:redhat:linux:7.2", "cpe:/o:redhat:linux:7.3", "cpe:/o:redhat:linux:8.0" ]
null
null
null
null
RHSA-2014:1069
Red Hat Security Advisory: Transition Red Hat Network Classic Hosted to Red Hat Subscription Management
This is the 3-year notification of the target date to migrate systems from Red Hat Network Classic Hosted to Red Hat Subscription Management. All systems using Red Hat Network Classic Hosted must be migrated to Red Hat Subscription Management.
[]
null
null
null
null
RHSA-2023:3722
Red Hat Security Advisory: openssl security and bug fix update
openssl: Denial of service by excessive resource usage in verifying X509 policy constraints openssl: Invalid certificate policies in leaf certificates are silently ignored openssl: Certificate policy check not enabled openssl: Input buffer over-read in AES-XTS implementation on 64 bit ARM openssl: Possible DoS translating ASN.1 object identifiers
[ "cpe:/a:redhat:enterprise_linux:9::appstream", "cpe:/o:redhat:enterprise_linux:9::baseos" ]
null
6.5
null
null
RHSA-2014:1298
Red Hat Security Advisory: Red Hat JBoss Data Grid 6.3.1 update
RESTEasy: XXE via parameter entities
[ "cpe:/a:redhat:jboss_data_grid:6.3.1" ]
null
null
null
null
RHBA-2023:0030
Red Hat Bug Fix Advisory: updated RHEL-8 based Middleware Containers container images
SnakeYaml: Constructor Deserialization Remote Code Execution
[ "cpe:/a:redhat:rhosemc:1.0::el8" ]
null
9.8
null
null
RHSA-2016:1292
Red Hat Security Advisory: libxml2 security update
libxml2: Heap-based buffer-overread in xmlNextChar libxml2: Heap-based buffer overread in htmlCurrentChar libxml2: Heap-buffer-overflow in xmlStrncat libxml2: Heap use-after-free in xmlSAX2AttributeNs libxml2: Heap use-after-free in xmlDictComputeFastKey libxml2: Heap use-after-free in htmlPArsePubidLiteral and htmlParseSystemiteral libxml2: Heap-based buffer overread in xmlPArserPrintFileContextInternal libxml2: Heap-based buffer overread in xmlDictAddString libxml2: Heap-buffer-overflow in xmlFAParserPosCharGroup libxml2: stack exhaustion while parsing xml files in recovery mode libxml2: stack overflow before detecting invalid XML file libxml2: Heap-based buffer underreads due to xmlParseName libxml2: Format string vulnerability libxml2: Inappropriate fetch of entities content
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation", "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
7
null
RHSA-2019:2017
Red Hat Security Advisory: zsh security and bug fix update
zsh: Improper handling of shebang line longer than 64
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
5.3
null
RHSA-2017:0892
Red Hat Security Advisory: kernel security and bug fix update
kernel: Use after free in seq file kernel: Race condition access to n_hdlc.tbuf causes double free in n_hdlc_release()
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
7.8
null
RHSA-2011:1104
Red Hat Security Advisory: libpng security update
libpng: buffer overwrite in png_rgb_to_gray libpng: Invalid read when handling empty sCAL chunks
[ "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::client_workstation", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
RHSA-2019:2332
Red Hat Security Advisory: advancecomp security update
advancecomp: null pointer dereference in function be_uint32_read() in endianrw.h advancecomp: denial of service in function adv_png_unfilter_8 in lib/png.c
[ "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
3.9
null
RHSA-2003:094
Red Hat Security Advisory: mysql security update
security flaw security flaw
[ "cpe:/o:redhat:enterprise_linux:2.1::as", "cpe:/o:redhat:enterprise_linux:2.1::aw", "cpe:/o:redhat:enterprise_linux:2.1::es", "cpe:/o:redhat:enterprise_linux:2.1::ws" ]
null
null
null
null
RHSA-2021:2881
Red Hat Security Advisory: thunderbird security update
Mozilla: IMAP server responses sent by a MITM prior to STARTTLS could be processed Mozilla: Use-after-free in accessibility features of a document Mozilla: Memory safety bugs fixed in Firefox 90 and Firefox ESR 78.12 chromium-browser: Out of bounds write in ANGLE
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
8.8
null
null
RHSA-2022:6263
Red Hat Security Advisory: OpenShift Container Platform 4.6.61 security and extras update
golang: out-of-bounds read in golang.org/x/text/language leads to DoS
[ "cpe:/a:redhat:openshift:4.6::el8" ]
null
7.5
null
null
RHSA-2022:1407
Red Hat Security Advisory: container-tools:2.0 security and bug fix update
podman: Default inheritable capabilities for linux container should be empty buildah: Default inheritable capabilities for linux container should be empty
[ "cpe:/a:redhat:rhel_eus:8.4::appstream" ]
null
4.8
null
null
RHSA-2018:2834
Red Hat Security Advisory: firefox security update
Mozilla: Setting a master password post-Firefox 58 does not delete unencrypted previously stored passwords Mozilla: Crash in TransportSecurityInfo due to cached data
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
6.1
null
RHSA-2013:0633
Red Hat Security Advisory: jbossweb security update
tomcat: three DIGEST authentication implementation issues tomcat: three DIGEST authentication implementation issues tomcat: three DIGEST authentication implementation issues
[ "cpe:/a:redhat:jboss_enterprise_web_platform:5.2.0" ]
null
null
null
null
RHSA-2012:1201
Red Hat Security Advisory: tetex security update
t1lib: Heap based buffer overflow in DVI file AFM font parser xpdf: uninitialized Gfx::parser pointer dereference xpdf: array indexing error in FoFiType1::parse() t1lib: Heap-based buffer overflow DVI file AFM font parser t1lib: Invalid pointer dereference via crafted Type 1 font t1lib: invalid read crash via crafted Type 1 font t1lib: Use-after-free via crafted Type 1 font t1lib: Off-by-one via crafted Type 1 font
[ "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
RHSA-2002:229
Red Hat Security Advisory: : : : Updated wget packages fix directory traversal bug
security flaw
[ "cpe:/o:redhat:linux:6.2", "cpe:/o:redhat:linux:7.0", "cpe:/o:redhat:linux:7.1", "cpe:/o:redhat:linux:7.2", "cpe:/o:redhat:linux:7.3", "cpe:/o:redhat:linux:8.0" ]
null
null
null
null
RHSA-2022:0026
Red Hat Security Advisory: OpenShift Container Platform 4.6.53 security update
log4j-core: DoS in log4j 2.x with Thread Context Map (MDC) input data contains a recursive lookup and context lookup pattern
[ "cpe:/a:redhat:openshift:4.6::el8" ]
null
5.9
null
null
RHSA-2014:0790
Red Hat Security Advisory: dovecot security update
dovecot: denial of service through maxxing out SSL connections
[ "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
null
null
RHSA-2012:1263
Red Hat Security Advisory: postgresql and postgresql84 security update
module): XXE by applying XSL stylesheet to the document postgresql: File disclosure through XXE in xmlparse by DTD validation
[ "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::client_workstation", "cpe:/o:redhat:enterprise_linux:5::server", "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
null
null
RHSA-2019:0734
Red Hat Security Advisory: katello-installer-base security and enhancement update
katello-installer-base: QMF methods exposed to goferd via qdrouterd
[ "cpe:/a:redhat:satellite:6.1::el6", "cpe:/a:redhat:satellite:6.2::el7", "cpe:/a:redhat:satellite_capsule:6.1::el6", "cpe:/a:redhat:satellite_capsule:6.2::el7" ]
null
null
8
null
RHSA-2020:4062
Red Hat Security Advisory: kernel-rt security and bug fix update
kernel: out of bounds write in function i2c_smbus_xfer_emulated in drivers/i2c/i2c-core-smbus.c kernel: race condition in smp_task_timedout() and smp_task_done() in drivers/scsi/libsas/sas_expander.c leads to use-after-free kernel: out of bounds write in i2c driver leads to local escalation of privilege kernel: use after free due to race condition in the video driver leads to local privilege escalation kernel: null pointer dereference in drivers/media/usb/zr364xx/zr364xx.c driver kernel: Memory leak in drivers/scsi/libsas/sas_expander.c kernel: use-after-free in drivers/bluetooth/hci_ldisc.c kernel: null-pointer dereference in drivers/net/fjes/fjes_main.c kernel: null pointer dereference in drivers/scsi/qla2xxx/qla_os.c kernel: Memory leak in sit_init_net() in net/ipv6/sit.c kernel: unprivileged users able to create RAW sockets in AF_IEEE802154 network protocol kernel: unprivileged users able to create RAW sockets in AF_ISDN network protocol kernel: memory leak in ccp_run_sha_cmd() function in drivers/crypto/ccp/ccp-ops.c kernel: Denial Of Service in the __ipmi_bmc_register() function in drivers/char/ipmi/ipmi_msghandler.c kernel: memory leak in the nl80211_get_ftm_responder_stats() function in net/wireless/nl80211.c allows DoS kernel: A memory leak in the alloc_sgtable() function in drivers/net/wireless/intel/iwlwifi/fw/dbg.c allows for a DoS kernel: Multiple memory leaks in the iwl_pcie_ctxt_info_gen3_init() function in drivers/net/wireless/intel/iwlwifi/pcie/ctxt-info-gen3.c allows for a DoS kernel: memory leak in the crypto_report() function in crypto/crypto_user_base.c allows for DoS kernel: Two memory leaks in the rtl_usb_probe() function in drivers/net/wireless/realtek/rtlwifi/usb.c allow for a DoS Kernel: kvm: OOB memory write via kvm_dev_ioctl_get_cpuid kernel: mounting a crafted ext4 filesystem image, performing some operations, and unmounting can lead to a use-after-free in ext4_put_super in fs/ext4/super.c kernel: use-after-free caused by a malicious USB device in the drivers/usb/misc/adutux.c driver kernel: a malicious USB device in the drivers/input/ff-memless.c leads to use-after-free kernel: use-after-free caused by a malicious USB device in the drivers/usb/class/cdc-acm.c driver kernel: information leak bug caused by a malicious USB device in the drivers/net/can/usb/peak_usb/pcan_usb_core.c driver kernel: race condition caused by a malicious USB device in the USB character device driver layer kernel: use-after-free in __ext4_expand_extra_isize and ext4_xattr_set_entry related to fs/ext4/inode.c and fs/ext4/super.c kernel: use-after-free in sound/core/timer.c kernel: Null pointer dereference in drop_sysctl_table() in fs/proc/proc_sysctl.c kernel: memory leak in mwifiex_tm_cmd in drivers/net/wireless/marvell/mwifiex/cfg80211.c kernel: out-of-bounds write via crafted keycode table kernel: some ipv6 protocols not encrypted over ipsec tunnel Kernel: kvm: nVMX: L2 guest may trick the L0 hypervisor to access sensitive L1 resources kernel: out-of-bounds read in in vc_do_resize function in drivers/tty/vt/vt.c kernel: invalid read location in vgacon_invert_region function in drivers/video/console/vgacon.c kernel: out-of-bounds read in set_fdc in drivers/block/floppy.c kernel: use-after-free in cdev_put() when a PTP device is removed while it's chardev is open kernel: uninitialized kernel data leak in userspace coredumps kernel: NFS client crash due to index buffer overflow during Direct IO write causing kernel panic kernel: SELinux netlink permission check bypass kernel: vhost-net: stack overflow in get_raw_socket while checking sk_family field kernel: out-of-bounds write in mpol_parse_str function in mm/mempolicy.c kernel: sg_write function lacks an sg_remove_request call in a certain failure case kernel: possible to send arbitrary signals to a privileged (suidroot) parent process kernel: memory corruption in Voice over IP nf_conntrack_h323 module
[ "cpe:/a:redhat:rhel_extras_rt:7" ]
null
8.1
4.6
null
RHSA-2023:7608
Red Hat Security Advisory: OpenShift Container Platform 4.12.45 bug fix and security update
golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487)
[ "cpe:/a:redhat:openshift:4.12::el8", "cpe:/a:redhat:openshift:4.12::el9" ]
null
7.5
null
null
RHSA-2021:5176
Red Hat Security Advisory: go-toolset-1.16 and go-toolset-1.16-golang security and bug fix update
golang: archive/zip: Reader.Open panics on empty string golang: net/http: limit growth of header canonicalization cache golang: syscall: don't close fd 0 on ForkExec error
[ "cpe:/a:redhat:devtools:2021" ]
null
4.8
null
null
RHSA-2023:0287
Red Hat Security Advisory: sudo security update
sudo: arbitrary file write with privileges of the RunAs user
[ "cpe:/o:redhat:rhel_els:6" ]
null
7.8
null
null
RHSA-2010:0376
Red Hat Security Advisory: JBoss Enterprise Application Platform 4.2.0.CP09 update
JBoss EAP jmx authentication bypass with crafted HTTP request JBoss Application Server Web Console Authentication bypass JBossEAP status servlet info leak
[ "cpe:/a:redhat:jboss_enterprise_application_platform:4.2.0::el4" ]
null
null
null
null
RHSA-2024:5257
Red Hat Security Advisory: kernel security update
kernel: net/sunrpc: fix reference count leaks in rpc_sysfs_xprt_state_change kernel: KVM: s390: vsie: fix race during shadow creation kernel: dmaengine/idxd: hardware erratum allows potential security problem with direct access by untrusted application kernel: netfilter: nf_tables: disallow anonymous set with timeout flag kernel: netfilter: nft_chain_filter: handle NETDEV_UNREGISTER for inet/ingress basechain kernel: fs: sysfs: Fix reference leak in sysfs_break_active_protection() kernel: xen-netfront: Add missing skb_mark_for_recycle kernel: netfilter: nf_tables: use timestamp to check for set element timeout kernel: netfilter: nft_flow_offload: reset dst in route object after setting up flow kernel: netfilter: nf_tables: discard table flag update with pending basechain deletion kernel: netfilter: nf_tables: Fix potential data-race in __nft_flowtable_type_get() kernel: TIPC message reassembly use-after-free remote code execution vulnerability kernel: net: kernel: UAF in network route management kernel: ionic: fix use after netif_napi_del() kernel: scsi: qedi: Fix crash while reading debugfs attribute kernel: virtio-net: tap: mlx5_core short frame denial of service kernel: virtio-net: tun: mlx5_core short frame denial of service
[ "cpe:/a:redhat:rhel_e4s:9.0::appstream", "cpe:/o:redhat:rhel_e4s:9.0::baseos" ]
null
7.1
null
null
RHSA-2021:2760
Red Hat Security Advisory: nettle security update
nettle: Out of bounds memory access in signature verification
[ "cpe:/o:redhat:rhel_aus:7.3::server" ]
null
8.1
null
null
RHSA-2018:2284
Red Hat Security Advisory: yum-utils security update
yum-utils: reposync: improper path validation may lead to directory traversal
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
8.8
null
RHSA-2023:7482
Red Hat Security Advisory: Red Hat Single Sign-On 7.6.6 security update on RHEL 7
keycloak: impersonation and lockout possible through incorrect handling of email trust bouncycastle: potential blind LDAP injection attack using a self-signed certificate HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack)
[ "cpe:/a:redhat:red_hat_single_sign_on:7.6::el7" ]
null
7.5
null
null
RHSA-2019:2280
Red Hat Security Advisory: uriparser security update
uriparser: Out-of-bounds write via uriComposeQuery* or uriComposeQueryEx* function uriparser: Integer overflow via uriComposeQuery* or uriComposeQueryEx* function
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
7.3
null
RHSA-2020:2382
Red Hat Security Advisory: firefox security update
Mozilla: Use-after-free in SharedWorkerService Mozilla: JavaScript Type confusion with NativeTypes Mozilla: Memory safety bugs fixed in Firefox 77 and Firefox ESR 68.9
[ "cpe:/a:redhat:rhel_e4s:8.0::appstream" ]
null
8.8
null
null
RHSA-2023:0403
Red Hat Security Advisory: sssd security and bug fix update
sssd: libsss_certmap fails to sanitise certificate data used in LDAP filters
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
8.8
null
null
RHSA-2025:0646
Red Hat Security Advisory: OpenShift Container Platform 4.15.44 security update
python: Path traversal on tempfile.TemporaryDirectory golang.org/x/net/html: Non-linear parsing of case-insensitive content in golang.org/x/net/html
[ "cpe:/a:redhat:openshift:4.15::el8", "cpe:/a:redhat:openshift:4.15::el9" ]
null
7.5
null
null
RHSA-2015:1684
Red Hat Security Advisory: openstack-swift security update
Swift: unauthorized deletion of versioned Swift object
[ "cpe:/a:redhat:openstack:5::el6", "cpe:/a:redhat:openstack:5::el7" ]
null
null
null
null
RHSA-2009:1689
Red Hat Security Advisory: condor security update
Condor: queue super user cannot drop privs
[ "cpe:/a:redhat:enterprise_mrg:1::el5" ]
null
null
null
null
RHBA-2021:0482
Red Hat Bug Fix Advisory: Red Hat OpenShift Service Mesh 2.0.2 RPMs
golang: math/big: panic during recursive division of very large numbers
[ "cpe:/a:redhat:service_mesh:2.0::el8" ]
null
7.5
null
null
RHSA-2022:8535
Red Hat Security Advisory: OpenShift Container Platform 4.11.16 security update
golang: archive/tar: github.com/vbatts/tar-split: unbounded memory consumption when reading headers golang: net/http/httputil: ReverseProxy should not forward unparseable query parameters golang: net/http: handle server errors after sending GOAWAY golang: math/big: decoding big.Float and big.Rat types can panic if the encoded message is too short, potentially allowing a denial of service golang: regexp/syntax: limit memory used by parsing regexps
[ "cpe:/a:redhat:openshift:4.11::el8" ]
null
6.5
null
null
RHSA-2017:2447
Red Hat Security Advisory: openstack-neutron security update
openstack-neutron: iptables not active after update
[ "cpe:/a:redhat:openstack:9::el7" ]
null
null
5.3
null
RHSA-2023:3562
Red Hat Security Advisory: firefox security update
Mozilla: Click-jacking certificate exceptions through rendering lag Mozilla: Memory safety bugs fixed in Firefox 114 and Firefox ESR 102.12
[ "cpe:/a:redhat:rhel_eus:9.0::appstream" ]
null
9.8
null
null