id
stringlengths
13
15
title
stringlengths
29
176
description
stringlengths
8
32.1k
cpes
listlengths
0
20
cvss_v4_0
null
cvss_v3_1
float64
0
10
cvss_v3_0
float64
0
10
cvss_v2_0
null
RHSA-2015:0790
Red Hat Security Advisory: openstack-nova security, bug fix, and enhancement update
openstack-nova: console Cross-Site WebSocket hijacking
[ "cpe:/a:redhat:openstack:6::el7" ]
null
null
null
null
RHSA-2021:0136
Red Hat Security Advisory: kernel-rt security and bug fix update
kernel: soft-lockups in iov_iter_copy_from_user_atomic() could result in DoS
[ "cpe:/a:redhat:rhel_eus:8.2::nfv", "cpe:/a:redhat:rhel_eus:8.2::realtime" ]
null
5.5
null
null
RHSA-2024:1902
Red Hat Security Advisory: shim security update
shim: Out-of-bounds read printing error messages shim: RCE in http boot support may lead to Secure Boot bypass shim: Interger overflow leads to heap buffer overflow in verify_sbat_section on 32-bits systems shim: Out-of-bounds read in verify_buffer_authenticode() malformed PE file shim: Out-of-bound read in verify_buffer_sbat() shim: out of bounds read when parsing MZ binaries
[ "cpe:/o:redhat:enterprise_linux:8::baseos" ]
null
5.1
null
null
RHSA-2017:1950
Red Hat Security Advisory: samba security, bug fix, and enhancement update
samba: fd_open_atomic infinite loop due to wrong handling of dangling symlinks
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
6.5
null
RHSA-2007:0510
Red Hat Security Advisory: evolution-data-server security update
evolution malicious server arbitrary code execution
[ "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::client_workstation", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
RHSA-2012:0058
Red Hat Security Advisory: glibc security and bug fix update
glibc: __tzfile_read integer overflow to buffer overflow glibc: svc_run() produces high cpu usage when accept() fails with EMFILE error
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
null
null
RHSA-2015:1455
Red Hat Security Advisory: thunderbird security update
Mozilla: Miscellaneous memory safety hazards (rv:31.8 / rv:38.1) (MFSA 2015-59) Mozilla: Miscellaneous memory safety hazards (rv:31.8 / rv:38.1) (MFSA 2015-59) Mozilla: Use-after-free in Content Policy due to microtask execution error (MFSA 2015-63) Mozilla: Vulnerabilities found through code inspection (MFSA 2015-66) Mozilla: Vulnerabilities found through code inspection (MFSA 2015-66) Mozilla: Vulnerabilities found through code inspection (MFSA 2015-66) Mozilla: Vulnerabilities found through code inspection (MFSA 2015-66) Mozilla: Vulnerabilities found through code inspection (MFSA 2015-66) Mozilla: Vulnerabilities found through code inspection (MFSA 2015-66) Mozilla: Vulnerabilities found through code inspection (MFSA 2015-66) Mozilla: Key pinning is ignored when overridable errors are encountered (MFSA 2015-67)
[ "cpe:/a:redhat:rhel_productivity:5", "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation", "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
null
null
RHSA-2022:1110
Red Hat Security Advisory: Red Hat Decision Manager 7.12.1 security update
netty: Information disclosure via the local system temporary directory springframework: malicious input leads to insertion of additional log entries apache-commons-io: Limited path traversal in Apache Commons IO 2.2 to 2.6 jdom: XXE allows attackers to cause a DoS via a crafted HTTP request logback: remote code execution through JNDI call from within its configuration file
[ "cpe:/a:redhat:jboss_enterprise_brms_platform:7.12" ]
null
6.6
null
null
RHSA-2023:0383
Red Hat Security Advisory: libXpm security update
libXpm: compression commands depend on $PATH libXpm: Runaway loop on width of 0 and enormous height libXpm: Infinite loop on unclosed comments
[ "cpe:/a:redhat:enterprise_linux:9::appstream" ]
null
7.5
null
null
RHSA-2013:0125
Red Hat Security Advisory: wireshark security, bug fix, and enhancement update
(64bit): NULL pointer dereference by processing of a corrupted Diameter dictionary file wireshark: Stack-based buffer over-read from tvbuff buffer when reading snoop capture files wireshark: Heap-based buffer over-read in Visual Networks dissector wireshark: Infinite loop in the ANSI A Interface (IS-634/IOS) dissector wireshark: buffer overflow in the ERF file reader wireshark: multiple file parser vulnerabilities (wnpa-sec-2012-01) wireshark: NULL pointer vulnerabilities (wnpa-sec-2012-02) Wireshark: Dos via large buffer allocation request Wireshark: Dos due to integer overflow in IPTrace capture format parser wireshark: crash due to zero division in DCP ETSI dissector (wnpa-sec-2012-13) wireshark: DoS via excessive CPU consumption in AFP dissector (wnpa-sec-2012-17) wireshark: DoS via excessive CPU consumption in CTDB dissector (wnpa-sec-2012-23) wireshark: DoS via excessive system resource consumption in CIP dissector (wnpa-sec-2012-20)
[ "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::client_workstation", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
RHSA-2017:1537
Red Hat Security Advisory: Red Hat OpenStack Platform director security update
rhosp-director: libvirtd is deployed with no authentication
[ "cpe:/a:redhat:openstack-director:7::el7" ]
null
null
9.9
null
RHSA-2022:4801
Red Hat Security Advisory: rsyslog security update
rsyslog: Heap-based overflow in TCP syslog server
[ "cpe:/a:redhat:rhel_e4s:8.1::appstream" ]
null
8.1
null
null
RHSA-2008:0896
Red Hat Security Advisory: ruby security update
ruby: Memory allocation failure in Ruby regex engine (remotely exploitable DoS) ruby: multiple insufficient safe mode restrictions ruby: use of predictable source port and transaction id in DNS requests done by resolv.rb module
[ "cpe:/o:redhat:enterprise_linux:3::as", "cpe:/o:redhat:enterprise_linux:3::desktop", "cpe:/o:redhat:enterprise_linux:3::es", "cpe:/o:redhat:enterprise_linux:3::ws" ]
null
null
null
null
RHSA-2022:2197
Red Hat Security Advisory: rsync security update
zlib: A flaw found in zlib when compressing (not decompressing) certain inputs
[ "cpe:/o:redhat:rhel_e4s:8.1::baseos" ]
null
8.2
null
null
RHSA-2017:1551
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform security update
tomcat: security manager bypass via IntrospectHelper utility function tomcat: security manager bypass via JSP Servlet config parameters wildfly: Arbitrary file read via path traversal
[ "cpe:/a:redhat:jboss_enterprise_application_platform:6.4" ]
null
null
7.7
null
RHSA-2023:3597
Red Hat Security Advisory: firefox security update
Mozilla: Click-jacking certificate exceptions through rendering lag Mozilla: Memory safety bugs fixed in Firefox 114 and Firefox ESR 102.12
[ "cpe:/a:redhat:rhel_aus:8.4::appstream", "cpe:/a:redhat:rhel_e4s:8.4::appstream", "cpe:/a:redhat:rhel_tus:8.4::appstream" ]
null
9.8
null
null
RHSA-2025:1133
Red Hat Security Advisory: firefox security update
firefox: thunderbird: Use-after-free in XSLT firefox: thunderbird: Use-after-free in Custom Highlight firefox: thunderbird: A bug in WebAssembly code generation could result in a crash firefox: thunderbird: Use-after-free during concurrent delazification firefox: thunderbird: Potential opening of private browsing tabs in normal browsing windows firefox: thunderbird: Certificate length was not properly checked firefox: thunderbird: Memory safety bugs fixed in Firefox 135, Thunderbird 135, Firefox ESR 115.20, Firefox ESR 128.7, Thunderbird 115.20, and Thunderbird 128.7 firefox: thunderbird: Memory safety bugs fixed in Firefox 135, Thunderbird 135, Firefox ESR 128.7, and Thunderbird 128.7
[ "cpe:/a:redhat:rhel_aus:8.2::appstream" ]
null
8.8
null
null
RHSA-2023:0637
Red Hat Security Advisory: samba security update
samba: RC4/HMAC-MD5 NetLogon Secure Channel is weak and should be avoided
[ "cpe:/a:redhat:rhel_eus:8.4::crb", "cpe:/o:redhat:rhel_eus:8.4::baseos" ]
null
8.1
null
null
RHSA-2021:1350
Red Hat Security Advisory: thunderbird security update
Mozilla: More internal network hosts could have been probed by a malicious webpage Mozilla: Out of bound write due to lazy initialization Mozilla: Use-after-free in Responsive Design Mode Mozilla: Secure Lock icon could have been spoofed Mozilla: Blob URLs may have been granted additional privileges Mozilla: Arbitrary FTP command execution on FTP servers using an encoded URL Mozilla: Incorrect size computation in WebAssembly JIT could lead to null-reads Mozilla: Port blocking could be bypassed Mozilla: Race condition when reading from disk while verifying signatures
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
2.5
6.1
null
RHSA-2002:007
Red Hat Security Advisory: : Updated 2.4 kernel available
security flaw security flaw
[ "cpe:/o:redhat:linux:7.1", "cpe:/o:redhat:linux:7.2" ]
null
null
null
null
RHSA-2021:2147
Red Hat Security Advisory: glib2 security update
glib: integer overflow in g_bytes_new function on 64-bit platforms due to an implicit cast from 64 bits to 32 bits
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
9.8
null
null
RHSA-2025:2875
Red Hat Security Advisory: tigervnc security update
X.Org: Xwayland: Use-after-free of the root cursor Xorg: xwayland: Buffer overflow in XkbVModMaskText() xorg: xwayland: Heap overflow in XkbWriteKeySyms() xorg: xwayland: Buffer overflow in XkbChangeTypesOfKey() xorg: xwayland: Out-of-bounds write in CreatePointerBarrierClient() xorg: xwayland: Use of uninitialized pointer in compRedirectWindow() xorg: xwayland: Use-after-free in PlayReleasedEvents() xorg: xwayland: Use-after-free in SyncInitTrigger()
[ "cpe:/a:redhat:rhel_eus:9.4::appstream" ]
null
7.8
null
null
RHSA-2017:0574
Red Hat Security Advisory: gnutls security, bug fix, and enhancement update
SSL/TLS: Malformed plain-text ALERT packets could cause remote DoS gnutls: Out of memory while parsing crafted OpenPGP certificate gnutls: Stack overflow in cdk_pk_get_keyid gnutls: Heap read overflow in read-packet.c
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
5.3
null
RHSA-2020:5487
Red Hat Security Advisory: pacemaker security update
pacemaker: ACL restrictions bypass
[ "cpe:/a:redhat:enterprise_linux:8::appstream", "cpe:/a:redhat:enterprise_linux:8::highavailability", "cpe:/a:redhat:enterprise_linux:8::resilientstorage" ]
null
7.2
null
null
RHSA-2019:3187
Red Hat Security Advisory: kernel security and bug fix update
hardware: bluetooth: BR/EDR encryption key negotiation attacks (KNOB)
[ "cpe:/o:redhat:rhel_aus:7.4::server", "cpe:/o:redhat:rhel_e4s:7.4::server", "cpe:/o:redhat:rhel_tus:7.4::server" ]
null
null
7
null
RHSA-2023:1184
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.4 security update
Undertow: Infinite loop in SslConduit during close
[ "cpe:/a:redhat:jboss_enterprise_application_platform:7.4" ]
null
7.5
null
null
RHBA-2021:1365
Red Hat Bug Fix Advisory: OpenShift Container Platform 4.7.9 bug fix update
gogo/protobuf: plugin/unmarshal/unmarshal.go lacks certain index validation
[ "cpe:/a:redhat:openshift:4.7::el8" ]
null
8.6
null
null
RHSA-2020:2414
Red Hat Security Advisory: unbound security update
unbound: amplification of an incoming query into a large number of queries directed to a target unbound: infinite loop via malformed DNS answers received from upstream servers
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
7.5
null
null
RHSA-2009:0339
Red Hat Security Advisory: lcms security update
LittleCms memory leak LittleCms integer overflow LittleCms lack of upper-bounds check on sizes
[ "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::client_workstation", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
RHSA-2021:1972
Red Hat Security Advisory: pandoc security update
cmark-gfm: Exponential time to parse certain inputs could lead to DoS
[ "cpe:/a:redhat:enterprise_linux:8::crb" ]
null
6.5
null
null
RHSA-2025:1051
Red Hat Security Advisory: Red Hat OpenShift Service Mesh Containers for 2.5.8
golang.org/x/net/html: Non-linear parsing of case-insensitive content in golang.org/x/net/html path-to-regexp: path-to-regexp Unpatched `path-to-regexp` ReDoS in 0.1.x nanoid: nanoid mishandles non-integer values
[ "cpe:/a:redhat:service_mesh:2.5::el8" ]
null
6.5
null
null
RHSA-2007:0345
Red Hat Security Advisory: vixie-cron security update
crontab denial of service
[ "cpe:/o:redhat:enterprise_linux:3::as", "cpe:/o:redhat:enterprise_linux:3::desktop", "cpe:/o:redhat:enterprise_linux:3::es", "cpe:/o:redhat:enterprise_linux:3::ws", "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws", "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
RHSA-2005:659
Red Hat Security Advisory: binutils security update
security flaw
[ "cpe:/o:redhat:enterprise_linux:3::as", "cpe:/o:redhat:enterprise_linux:3::desktop", "cpe:/o:redhat:enterprise_linux:3::es", "cpe:/o:redhat:enterprise_linux:3::ws" ]
null
null
null
null
RHSA-2021:4532
Red Hat Security Advisory: OpenJDK 17.0.1 security update for Portable Linux Builds
OpenJDK: Excessive memory allocation in RTFParser (Swing, 8265167) OpenJDK: Excessive memory allocation in RTFReader (Swing, 8265580) OpenJDK: Excessive memory allocation in HashMap and HashSet (Utility, 8266097) OpenJDK: Certificates with end dates too far in the future can corrupt keystore (Keytool, 8266137) OpenJDK: Incorrect principal selection when using Kerberos Constrained Delegation (Libraries, 8266689) OpenJDK: Unexpected exception raised during TLS handshake (JSSE, 8267729) OpenJDK: Excessive memory allocation in BMPImageReader (ImageIO, 8267735) OpenJDK: Non-constant comparison during TLS handshakes (JSSE, 8269618)
[ "cpe:/a:redhat:openjdk:17" ]
null
3.7
null
null
RHSA-2024:1563
Red Hat Security Advisory: OpenShift Container Platform 4.15.6 packages and security update
golang-fips/openssl: Memory leaks in code encrypting and decrypting RSA payloads golang-protobuf: encoding/protojson, internal/encoding/json: infinite loop in protojson.Unmarshal when unmarshaling certain forms of invalid JSON jose-go: improper handling of highly compressed data
[ "cpe:/a:redhat:openshift:4.15::el8", "cpe:/a:redhat:openshift:4.15::el9" ]
null
4.3
null
null
RHSA-2017:0276
Red Hat Security Advisory: bind security update
bind: Assertion failure when using DNS64 and RPZ Can Lead to Crash
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
7.5
null
RHSA-2005:603
Red Hat Security Advisory: dhcpcd security update
security flaw
[ "cpe:/o:redhat:enterprise_linux:2.1::as", "cpe:/o:redhat:enterprise_linux:2.1::aw", "cpe:/o:redhat:enterprise_linux:2.1::es", "cpe:/o:redhat:enterprise_linux:2.1::ws" ]
null
null
null
null
RHSA-2004:447
Red Hat Security Advisory: gdk-pixbuf security update
security flaw security flaw security flaw security flaw
[ "cpe:/o:redhat:enterprise_linux:3::as", "cpe:/o:redhat:enterprise_linux:3::desktop", "cpe:/o:redhat:enterprise_linux:3::es", "cpe:/o:redhat:enterprise_linux:3::ws" ]
null
null
null
null
RHSA-2004:689
Red Hat Security Advisory: kernel security update
security flaw security flaw security flaw security flaw security flaw security flaw security flaw
[ "cpe:/o:redhat:enterprise_linux:3::as", "cpe:/o:redhat:enterprise_linux:3::desktop", "cpe:/o:redhat:enterprise_linux:3::es", "cpe:/o:redhat:enterprise_linux:3::ws" ]
null
null
null
null
RHSA-2017:2888
Red Hat Security Advisory: Red Hat JBoss BRMS 6.4.6 security update
log4j: Socket receiver deserialization vulnerability XStream: DoS when unmarshalling void type log4j: deserialization of untrusted data in SocketServer
[ "cpe:/a:redhat:jboss_enterprise_brms_platform:6.4" ]
null
9.8
5.9
null
RHSA-2023:5446
Red Hat Security Advisory: Red Hat Build of OptaPlanner 8.38.0 SP1
quarkus: HTTP security policy bypass
[ "cpe:/a:redhat:optaplanner:::el6" ]
null
8.1
null
null
RHSA-2011:1197
Red Hat Security Advisory: libvirt security and bug fix update
libvirt: integer overflow in VirDomainGetVcpus
[ "cpe:/o:redhat:enterprise_linux:6::server" ]
null
null
null
null
RHSA-2022:0892
Red Hat Security Advisory: libarchive security update
libarchive: extracting a symlink with ACLs modifies ACLs of target libarchive: symbolic links incorrectly followed when changing modes, times, ACL and flags of a file while extracting an archive
[ "cpe:/a:redhat:enterprise_linux:8::crb", "cpe:/o:redhat:enterprise_linux:8::baseos" ]
null
7.1
null
null
RHSA-2023:6497
Red Hat Security Advisory: libX11 security update
libX11: InitExt.c can overwrite unintended portions of the Display structure if the extension request leads to a buffer overflow
[ "cpe:/a:redhat:enterprise_linux:9::appstream" ]
null
7.3
null
null
RHSA-2002:170
Red Hat Security Advisory: ethereal security update
security flaw security flaw security flaw security flaw security flaw security flaw
[ "cpe:/o:redhat:enterprise_linux:2.1::as" ]
null
null
null
null
RHSA-2021:5141
Red Hat Security Advisory: OpenShift Container Platform 4.6.52 security update
log4j: Remote code execution in Log4j 1.x when application is configured to use JMSAppender log4j-core: Remote code execution in Log4j 2.x when logs contain an attacker-controlled string value log4j-core: DoS in log4j 2.x with thread context message pattern and context lookup pattern (incomplete fix for CVE-2021-44228)
[ "cpe:/a:redhat:openshift:4.6::el8" ]
null
8.1
null
null
RHSA-2005:336
Red Hat Security Advisory: firefox security update
security flaw security flaw security flaw
[ "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws" ]
null
null
null
null
RHSA-2020:2519
Red Hat Security Advisory: kpatch-patch security update
kernel: use-after-free in __blk_add_trace in kernel/trace/blktrace.c Kernel: NetLabel: null pointer dereference while receiving CIPSO packet with null category may cause kernel panic
[ "cpe:/o:redhat:rhel_eus:7.7::server" ]
null
5.9
null
null
RHSA-2020:1344
Red Hat Security Advisory: virt:rhel security update
QEMU: slirp: OOB buffer access while emulating tcp protocols in tcp_emu()
[ "cpe:/a:redhat:rhel_e4s:8.0::appstream" ]
null
5.6
null
null
RHSA-2018:3425
Red Hat Security Advisory: qemu-kvm security update
hw: cpu: speculative store bypass
[ "cpe:/o:redhat:rhel_aus:6.6::server", "cpe:/o:redhat:rhel_tus:6.6::server" ]
null
null
5.6
null
RHSA-2023:4771
Red Hat Security Advisory: cups security update
cups: Information leak through Cups-Get-Document operation
[ "cpe:/a:redhat:rhel_aus:8.2::appstream", "cpe:/a:redhat:rhel_e4s:8.2::appstream", "cpe:/a:redhat:rhel_tus:8.2::appstream", "cpe:/o:redhat:rhel_aus:8.2::baseos", "cpe:/o:redhat:rhel_e4s:8.2::baseos", "cpe:/o:redhat:rhel_tus:8.2::baseos" ]
null
6.5
null
null
RHSA-2021:2416
Red Hat Security Advisory: dhcp security update
dhcp: stack-based buffer overflow when parsing statements with colon-separated hex digits in config or lease files in dhcpd and dhclient
[ "cpe:/o:redhat:rhel_eus:8.1::baseos" ]
null
8.8
null
null
RHSA-2002:084
Red Hat Security Advisory: : : : Updated nss_ldap packages fix pam_ldap vulnerability
security flaw
[ "cpe:/o:redhat:linux:6.2", "cpe:/o:redhat:linux:7.0", "cpe:/o:redhat:linux:7.1", "cpe:/o:redhat:linux:7.2", "cpe:/o:redhat:linux:7.3" ]
null
null
null
null
RHSA-2022:0401
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.4.3 security update
undertow: client side invocation timeout raised when calling over HTTP2 7: Incomplete fix of CVE-2016-4978 in HornetQ library
[ "cpe:/a:redhat:jboss_enterprise_application_platform:7.4::el8" ]
null
6.6
null
null
RHSA-2023:5068
Red Hat Security Advisory: linux-firmware security update
hw: amd: Cross-Process Information Leak
[ "cpe:/o:redhat:enterprise_linux:9::baseos" ]
null
6.5
null
null
RHSA-2017:1162
Red Hat Security Advisory: python27 security, bug fix, and enhancement update
python: failure to validate certificates in the HTTP client with TLS (PEP 476)
[ "cpe:/a:redhat:rhel_software_collections:2::el6", "cpe:/a:redhat:rhel_software_collections:2::el7" ]
null
null
4.7
null
RHSA-2020:3665
Red Hat Security Advisory: go-toolset:rhel8 security update
golang.org/x/text: possibility to trigger an infinite loop in encoding/unicode could lead to crash golang: data race in certain net/http servers including ReverseProxy can lead to DoS golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
7.5
null
null
RHSA-2024:8023
Red Hat Security Advisory: Release of OpenShift Serverless Logic 1.34.0 security update & enhancements
io.vertx:vertx-grpc-client: io.vertx:vertx-grpc-server: Vertx gRPC server does not limit the maximum message size axios: axios: Server-Side Request Forgery webpack: DOM Clobbering vulnerability in AutoPublicPathRuntimeModule express: Improper Input Handling in Express Redirects send: Code Execution Vulnerability in Send Library serve-static: Improper Sanitization in serve-static
[ "cpe:/a:redhat:openshift_serverless:1.34::el8" ]
null
5
null
null
RHSA-2006:0675
Red Hat Security Advisory: firefox security update
security flaw security flaw security flaw security flaw security flaw security flaw security flaw seamonkey < 1.0.5 multiple vulnerabilities; to replace Mozilla
[ "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws" ]
null
null
null
null
RHSA-2024:9814
Red Hat Security Advisory: squid:4 security update
squid: Denial of Service processing ESI response content
[ "cpe:/a:redhat:rhel_aus:8.6::appstream", "cpe:/a:redhat:rhel_e4s:8.6::appstream", "cpe:/a:redhat:rhel_tus:8.6::appstream" ]
null
7.5
null
null
RHSA-2022:1435
Red Hat Security Advisory: OpenJDK 11.0.15 security update for Portable Linux Builds
OpenJDK: Unbounded memory allocation when compiling crafted XPath expressions (JAXP, 8270504) OpenJDK: Improper object-to-string conversion in AnnotationInvocationHandler (Libraries, 8277672) OpenJDK: Missing check for negative ObjectIdentifier (Libraries, 8275151) OpenJDK: Defective secure validation in Apache Santuario (Libraries, 8278008) OpenJDK: URI parsing inconsistencies (JNDI, 8278972)
[ "cpe:/a:redhat:openjdk:11" ]
null
5.3
null
null
RHSA-2020:0633
Red Hat Security Advisory: ppp security update
ppp: Buffer overflow in the eap_request and eap_response functions in eap.c
[ "cpe:/a:redhat:enterprise_linux:8::appstream", "cpe:/a:redhat:enterprise_linux:8::crb", "cpe:/o:redhat:enterprise_linux:8::baseos" ]
null
9.8
null
null
RHSA-2007:0081
Red Hat Security Advisory: php security update
security flaw security flaw security flaw security flaw security flaw security flaw php session extension information leak php session extension global variable clobber php imap_mail_compose() buffer overflow via type.parameters
[ "cpe:/o:redhat:enterprise_linux:2.1::as", "cpe:/o:redhat:enterprise_linux:2.1::aw", "cpe:/o:redhat:enterprise_linux:2.1::es", "cpe:/o:redhat:enterprise_linux:2.1::ws" ]
null
null
null
null
RHSA-2021:4859
Red Hat Security Advisory: kpatch-patch security update
kernel: use-after-free in drivers/infiniband/core/ucma.c ctx use-after-free
[ "cpe:/o:redhat:rhel_eus:8.2::baseos" ]
null
7.8
null
null
RHSA-2021:1032
Red Hat Security Advisory: perl security update
perl: heap-based buffer overflow in regular expression compiler leads to DoS perl: corruption of intermediate language state of compiled regular expression due to integer overflow leads to DoS perl: corruption of intermediate language state of compiled regular expression due to recursive S_study_chunk() calls leads to DoS
[ "cpe:/o:redhat:rhel_eus:7.7::computenode", "cpe:/o:redhat:rhel_eus:7.7::server" ]
null
7.5
null
null
RHSA-2023:3781
Red Hat Security Advisory: python38:3.8 and python38-devel:3.8 security update
python: urllib.parse url blocklisting bypass
[ "cpe:/a:redhat:enterprise_linux:8::appstream", "cpe:/a:redhat:enterprise_linux:8::crb" ]
null
7.5
null
null
RHSA-2023:5462
Red Hat Security Advisory: python3.9 security update
python: TLS handshake bypass
[ "cpe:/a:redhat:enterprise_linux:9::appstream", "cpe:/a:redhat:enterprise_linux:9::crb", "cpe:/o:redhat:enterprise_linux:9::baseos" ]
null
8.6
null
null
RHSA-2023:3625
Red Hat Security Advisory: OpenShift Container Platform 4.10.62 security update
xstream: Denial of Service by injecting recursive collections or maps based on element's hash values raising a stack overflow springframework: Security Bypass With Un-Prefixed Double Wildcard Pattern jenkins-2-plugin: workflow-job: Stored XSS vulnerability in Pipeline: Job Plugin jenkins-2-plugin: email-ext: Missing permission check in Email Extension Plugin jenkins-2-plugin: email-ext: CSRF vulnerability in Email Extension Plugin jenkins-2-plugin: pipeline-utility-steps: Arbitrary file write vulnerability on agents in Pipeline Utility Steps Plugin
[ "cpe:/a:redhat:openshift:4.10::el7", "cpe:/a:redhat:openshift:4.10::el8" ]
null
6.3
null
null
RHSA-2020:5435
Red Hat Security Advisory: python-rtslib security update
python-rtslib: weak permissions for /etc/target/saveconfig.json
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
6.6
null
null
RHSA-2021:3811
Red Hat Security Advisory: rh-mysql80-mysql security, bug fix, and enhancement update
mysql: Server: Stored Procedure unspecified vulnerability (CPU Oct 2020) mysql: Server: FTS unspecified vulnerability (CPU Oct 2020) mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2020) mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2020) mysql: InnoDB unspecified vulnerability (CPU Oct 2020) mysql: InnoDB unspecified vulnerability (CPU Oct 2020) mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2020) mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2020) mysql: Server: PS unspecified vulnerability (CPU Oct 2020) mysql: Server: FTS unspecified vulnerability (CPU Oct 2020) mysql: Server: PS unspecified vulnerability (CPU Oct 2020) mysql: InnoDB unspecified vulnerability (CPU Oct 2020) mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2020) mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2020) mysql: Server: Security: Encryption unspecified vulnerability (CPU Oct 2020) mysql: Server: FTS unspecified vulnerability (CPU Oct 2020) mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2020) mysql: Server: Locking unspecified vulnerability (CPU Oct 2020) mysql: Server: DML unspecified vulnerability (CPU Oct 2020) mysql: InnoDB unspecified vulnerability (CPU Oct 2020) mysql: Server: DML unspecified vulnerability (CPU Oct 2020) mysql: InnoDB unspecified vulnerability (CPU Oct 2020) mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2020) mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2020) mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2020) mysql: Server: Security: Privileges unspecified vulnerability (CPU Oct 2020) mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2020) mysql: Server: PS unspecified vulnerability (CPU Oct 2020) mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2020) mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2020) mysql: InnoDB unspecified vulnerability (CPU Oct 2020) mysql: Server: Charsets unspecified vulnerability (CPU Oct 2020) mysql: Server: Security: Roles unspecified vulnerability (CPU Oct 2020) mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2020) mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2020) mysql: Server: DDL unspecified vulnerability (CPU Oct 2020) mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2020) mysql: Server: X Plugin unspecified vulnerability (CPU Oct 2020) mysql: Server: Logging unspecified vulnerability (CPU Oct 2020) mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2020) mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2020) mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2020) mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2021) mysql: Server: Replication unspecified vulnerability (CPU Jan 2021) mysql: C API unspecified vulnerability (CPU Jan 2021) mysql: C API unspecified vulnerability (CPU Jan 2021) mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2021) mysql: InnoDB unspecified vulnerability (CPU Jan 2021) mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2021) mysql: InnoDB unspecified vulnerability (CPU Jan 2021) mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2021) mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2021) mysql: Information Schema unspecified vulnerability (CPU Jan 2021) mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2021) mysql: Server: Components Services unspecified vulnerability (CPU Jan 2021) mysql: InnoDB unspecified vulnerability (CPU Jan 2021) mysql: Server: Stored Procedure unspecified vulnerability (CPU Jan 2021) mysql: InnoDB unspecified vulnerability (CPU Jan 2021) mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2021) mysql: Server: DML unspecified vulnerability (CPU Jan 2021) mysql: Server: Locking unspecified vulnerability (CPU Jan 2021) mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2021) mysql: Server: DDL unspecified vulnerability (CPU Jan 2021) mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2021) mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2021) mysql: Server: Stored Procedure unspecified vulnerability (CPU Jan 2021) mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2021) mysql: Server: Stored Procedure unspecified vulnerability (CPU Jan 2021) mysql: Server: DML unspecified vulnerability (CPU Jan 2021) mysql: Server: DML unspecified vulnerability (CPU Jan 2021) mysql: Server: DDL unspecified vulnerability (CPU Jan 2021) mysql: Server: Options unspecified vulnerability (CPU Apr 2021) mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2021) mysql: Server: DML unspecified vulnerability (CPU Apr 2021) mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2021) mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2021) mysql: Server: Replication unspecified vulnerability (CPU Apr 2021) mysql: Server: DML unspecified vulnerability (CPU Apr 2021) mysql: InnoDB unspecified vulnerability (CPU Apr 2021) mysql: Server: Replication unspecified vulnerability (CPU Apr 2021) mysql: Server: Group Replication Plugin unspecified vulnerability (CPU Apr 2021) mysql: InnoDB unspecified vulnerability (CPU Apr 2021) mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2021) mysql: InnoDB unspecified vulnerability (CPU Apr 2021) mysql: Server: DML unspecified vulnerability (CPU Apr 2021) mysql: Server: Partition unspecified vulnerability (CPU Apr 2021) mysql: Server: Replication unspecified vulnerability (CPU Apr 2021) mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2021) mysql: Server: Partition unspecified vulnerability (CPU Apr 2021) mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2021) mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2021) mysql: Server: Stored Procedure unspecified vulnerability (CPU Apr 2021) mysql: Server: Stored Procedure unspecified vulnerability (CPU Apr 2021) mysql: Server: Information Schema unspecified vulnerability (CPU Apr 2021) mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2021) mysql: Server: Group Replication Plugin unspecified vulnerability (CPU Apr 2021) mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2021) mysql: Server: Stored Procedure unspecified vulnerability (CPU Apr 2021) mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2021) mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2021) mysql: Server: DML unspecified vulnerability (CPU Apr 2021) mysql: Server: Information Schema unspecified vulnerability (CPU Apr 2021) mysql: Server: Stored Procedure unspecified vulnerability (CPU Apr 2021) mysql: Server: DML unspecified vulnerability (CPU Apr 2021) mysql: Server: Packaging unspecified vulnerability (CPU Apr 2021) mysql: Server: Information Schema unspecified vulnerability (CPU Apr 2021) mysql: Server: DDL unspecified vulnerability (CPU Jul 2021) mysql: Server: Memcached unspecified vulnerability (CPU Jul 2021) mysql: Server: Optimizer unspecified vulnerability (CPU Jul 2021) mysql: Server: DDL unspecified vulnerability (CPU Jul 2021) mysql: Server: Federated unspecified vulnerability (CPU Jul 2021) mysql: Server: Replication unspecified vulnerability (CPU Jul 2021) mysql: Server: Optimizer unspecified vulnerability (CPU Jul 2021) mysql: Server: Optimizer unspecified vulnerability (CPU Jul 2021) mysql: Server: DML unspecified vulnerability (CPU Jul 2021) mysql: InnoDB unspecified vulnerability (CPU Jul 2021) mysql: InnoDB unspecified vulnerability (CPU Jul 2021) mysql: Server: Optimizer unspecified vulnerability (CPU Jul 2021) mysql: Server: Optimizer unspecified vulnerability (CPU Jul 2021) mysql: Server: Replication unspecified vulnerability (CPU Jul 2021) mysql: Server: Optimizer unspecified vulnerability (CPU Jul 2021) mysql: InnoDB unspecified vulnerability (CPU Jul 2021) mysql: InnoDB unspecified vulnerability (CPU Jul 2021) mysql: Server: DDL unspecified vulnerability (CPU Jul 2021) mysql: Server: Locking unspecified vulnerability (CPU Jul 2021) mysql: Server: Optimizer unspecified vulnerability (CPU Jul 2021) mysql: Server: Optimizer unspecified vulnerability (CPU Jul 2021) mysql: Server: GIS unspecified vulnerability (CPU Jul 2021) mysql: Server: Optimizer unspecified vulnerability (CPU Jul 2021) mysql: Server: PS unspecified vulnerability (CPU Jul 2021) mysql: Server: Stored Procedure unspecified vulnerability (CPU Jul 2021) mysql: Server: Optimizer unspecified vulnerability (CPU Jul 2021) mysql: Server: Optimizer unspecified vulnerability (CPU Jul 2021) mysql: Server: Optimizer unspecified vulnerability (CPU Jul 2021) mysql: InnoDB unspecified vulnerability (CPU Jul 2021) mysql: Server: Optimizer unspecified vulnerability (CPU Jul 2021) mysql: Server: DML unspecified vulnerability (CPU Jul 2021) mysql: Server: Optimizer unspecified vulnerability (CPU Jul 2021) mysql: Server: Optimizer unspecified vulnerability (CPU Jul 2021) mysql: Server: DML unspecified vulnerability (CPU Oct 2021) mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2021)
[ "cpe:/a:redhat:rhel_software_collections:3::el7" ]
null
4.9
null
null
RHSA-2021:0743
Red Hat Security Advisory: virt:8.2 and virt-devel:8.2 security update
QEMU: virtiofsd: potential privileged host device access from guest
[ "cpe:/a:redhat:advanced_virtualization:8.2::el8" ]
null
7.5
null
null
RHSA-2024:0223
Red Hat Security Advisory: java-1.8.0-openjdk security and bug fix update
OpenJDK: array out-of-bounds access due to missing range check in C1 compiler (8314468) OpenJDK: JVM class file verifier flaw allows unverified bytecode execution (8314295) OpenJDK: range check loop optimization issue (8314307) OpenJDK: arbitrary Java code execution in Nashorn (8314284) OpenJDK: logging of digital signature private keys (8316976) OpenJDK: RSA padding issue and timing side-channel attack against TLS (8317547)
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
7.4
null
null
RHSA-2014:1728
Red Hat Security Advisory: Red Hat JBoss Enterprise Web Platform 5.2.0 security update
Java: Java XML Signature DoS Attack
[ "cpe:/a:redhat:jboss_enterprise_web_platform:5::el4", "cpe:/a:redhat:jboss_enterprise_web_platform:5::el5", "cpe:/a:redhat:jboss_enterprise_web_platform:5::el6" ]
null
null
null
null
RHSA-2023:5738
Red Hat Security Advisory: go-toolset and golang security and bug fix update
golang: net/http: insufficient sanitization of Host header golang: crypto/tls: slow verification of certificate chains containing large RSA keys golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487) HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack)
[ "cpe:/a:redhat:enterprise_linux:9::appstream" ]
null
7.5
null
null
RHSA-2022:0727
Red Hat Security Advisory: OpenShift Logging bug fix and security update (5.1.9)
jackson-dataformat-cbor: Unchecked allocation of byte buffer can cause a java.lang.OutOfMemoryError exception origin-aggregated-logging/elasticsearch: Incomplete fix for netty-codec-http CVE-2021-21409
[ "cpe:/a:redhat:logging:5.1::el8" ]
null
5.9
null
null
RHSA-2024:1677
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.4.16 Security update
undertow: unrestricted request storage leads to memory exhaustion undertow: Cookie Smuggling/Spoofing ssh: Prefix truncation attack on Binary Packet Protocol (BPP) undertow: directory traversal vulnerability undertow: Out-of-memory Error after several closed connections with wildfly-http-client protocol
[ "cpe:/a:redhat:jboss_enterprise_application_platform:7.4" ]
null
7.5
null
null
RHSA-2023:4651
Red Hat Security Advisory: rust-toolset-1.66-rust security update
rust-cargo: cargo does not respect the umask when extracting dependencies
[ "cpe:/a:redhat:devtools:2023::el7" ]
null
6.7
null
null
RHSA-2015:1495
Red Hat Security Advisory: Red Hat Gluster Storage 3.1 update
check-mk: multiple flaws fixed in versions 1.2.4p4 and 1.2.5i4 check-mk: multiple flaws fixed in versions 1.2.4p4 and 1.2.5i4 check-mk: multiple flaws fixed in versions 1.2.4p4 and 1.2.5i4 openstack-swift: Swift metadata constraints are not correctly enforced
[ "cpe:/a:redhat:storage:2:client:el5", "cpe:/a:redhat:storage:3.1:nagios:el6", "cpe:/a:redhat:storage:3.1:nfs:el6", "cpe:/a:redhat:storage:3.1:samba:el6", "cpe:/a:redhat:storage:3.1:server:el6", "cpe:/a:redhat:storage:3:client:el6" ]
null
null
null
null
RHSA-2016:0004
Red Hat Security Advisory: kernel security update
virt: guest to host DoS by triggering an infinite loop in microcode via #AC exception virt: guest to host DoS by triggering an infinite loop in microcode via #DB exception
[ "cpe:/o:redhat:rhel_aus:6.4::server" ]
null
null
null
null
RHSA-2011:1851
Red Hat Security Advisory: krb5 security update
krb5: telnet client and server encrypt_keyid heap-based buffer overflow
[ "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws", "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::client_workstation", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
RHSA-2020:2635
Red Hat Security Advisory: OpenShift Container Platform 4.3.26 python-psutil security update
python-psutil: Double free because of refcount mishandling
[ "cpe:/a:redhat:openshift:4.3::el7" ]
null
null
7
null
RHSA-2021:1073
Red Hat Security Advisory: flatpak security update
flatpak: "file forwarding" feature can be used to gain unprivileged access to files
[ "cpe:/a:redhat:rhel_eus:8.2::appstream" ]
null
8.1
null
null
RHSA-2022:5003
Red Hat Security Advisory: Red Hat OpenShift Service Mesh 2.0.10 security update
envoy: Segfault in GrpcHealthCheckerImpl envoy: Decompressors can be zip bombed
[ "cpe:/a:redhat:service_mesh:2.0::el8" ]
null
7.5
null
null
RHSA-2020:3887
Red Hat Security Advisory: python-pillow security update
python-pillow: out-of-bounds read in ImagingFliDecode when loading FLI images
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
8.2
null
null
RHSA-2019:2989
Red Hat Security Advisory: OpenShift Container Platform 3.10 atomic-openshift kube-apiserver security update
atomic-openshift: OpenShift builds don't verify SSH Host Keys for the git repository containers/image: not enforcing TLS when sending username+password credentials to token servers leading to credential disclosure
[ "cpe:/a:redhat:openshift:3.10::el7" ]
null
null
6.4
null
RHSA-2014:0225
Red Hat Security Advisory: Red Hat Enterprise Linux 5.3 Advanced Mission Critical 1-month Notice
This is the 1-month notification for the retirement of Red Hat Enterprise Linux 5.3 Advanced Mission Critical (AMC).
[ "cpe:/o:redhat:rhel_mission_critical:5.3" ]
null
null
null
null
RHSA-2021:0976
Red Hat Security Advisory: Red Hat Virtualization Host security, bug fix and enhancement update (4.4.4-2)
lldp/openvswitch: denial of service via externally triggered memory leak
[ "cpe:/o:redhat:rhev_hypervisor:4.4::el8" ]
null
7.5
null
null
RHSA-2024:2562
Red Hat Security Advisory: golang security update
golang: net/http, x/net/http2: unlimited number of CONTINUATION frames causes DoS golang: net/http/cookiejar: incorrect forwarding of sensitive headers and cookies on HTTP redirect golang: net/http: golang: mime/multipart: golang: net/textproto: memory exhaustion in Request.ParseMultipartForm golang-fips/openssl: Memory leaks in code encrypting and decrypting RSA payloads golang: crypto/x509: Verify panics on certificates with an unknown public key algorithm golang: net/mail: comments in display names are incorrectly handled golang: html/template: errors returned from MarshalJSON methods may break template escaping
[ "cpe:/a:redhat:enterprise_linux:9::appstream" ]
null
6.5
null
null
RHSA-2022:1704
Red Hat Security Advisory: firefox security update
Mozilla: Bypassing permission prompt in nested browsing contexts Mozilla: iframe Sandbox bypass Mozilla: Reader mode bypassed SameSite cookies Mozilla: Fullscreen notification bypass using popups Mozilla: Leaking browser history with CSS variables Mozilla: Memory safety bugs fixed in Firefox 100 and Firefox ESR 91.9
[ "cpe:/a:redhat:rhel_eus:8.2::appstream" ]
null
9.8
7.5
null
RHSA-2005:823
Red Hat Security Advisory: fetchmail security update
security flaw
[ "cpe:/o:redhat:enterprise_linux:2.1::as", "cpe:/o:redhat:enterprise_linux:2.1::aw", "cpe:/o:redhat:enterprise_linux:2.1::es", "cpe:/o:redhat:enterprise_linux:2.1::ws" ]
null
null
null
null
RHSA-2023:0708
Red Hat Security Advisory: Release of OpenShift Serverless Client kn 1.27.0
golang: archive/tar: github.com/vbatts/tar-split: unbounded memory consumption when reading headers golang: net/http/httputil: ReverseProxy should not forward unparseable query parameters golang: net/http: handle server errors after sending GOAWAY golang: regexp/syntax: limit memory used by parsing regexps
[ "cpe:/a:redhat:serverless:1.0::el8" ]
null
6.5
null
null
RHSA-2010:0168
Red Hat Security Advisory: httpd security and enhancement update
httpd: mod_proxy_ajp remote temporary DoS httpd: request header information leak
[ "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::client_workstation", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
RHSA-2020:3633
Red Hat Security Advisory: thunderbird security update
Mozilla: Attacker-induced prompt for extension installation Mozilla: Use-After-Free when aborting an operation
[ "cpe:/a:redhat:rhel_e4s:8.0::appstream" ]
null
8.8
null
null
RHSA-2011:0910
Red Hat Security Advisory: ruby security update
ruby: memory corruption in BigDecimal on 64bit platforms Ruby: Symlink race condition by removing directory trees in fileutils module Ruby: Untrusted codes able to modify arbitrary strings
[ "cpe:/o:redhat:enterprise_linux:6::server" ]
null
null
null
null
RHSA-2016:0620
Red Hat Security Advisory: samba4 security, bug fix, and enhancement update
samba: crash in dcesrv_auth_bind_ack due to missing error check samba: Man-in-the-middle attacks possible with NTLMSSP authentication samba: Spoofing vulnerability when domain controller is configured samba: Missing downgrade detection samba: Server certificates not validated at client side samba: Samba based active directory domain controller does not enforce smb signing samba: Smb signing not required by default when smb client connection is used for ipc usage samba: SAMR and LSA man in the middle attacks
[ "cpe:/o:redhat:rhel_aus:6.4::server", "cpe:/o:redhat:rhel_aus:6.5::server", "cpe:/o:redhat:rhel_eus:6.6::computenode", "cpe:/o:redhat:rhel_eus:6.6::server", "cpe:/o:redhat:rhel_mission_critical:6.2::server" ]
null
null
null
null
RHSA-2021:2782
Red Hat Security Advisory: java-11-openjdk security update
OpenJDK: FTP PASV command response can cause FtpClient to connect to arbitrary host (Networking, 8258432) OpenJDK: Incorrect verification of JAR files with multiple MANIFEST.MF files (Library, 8260967) OpenJDK: Incorrect comparison during range check elimination (Hotspot, 8264066)
[ "cpe:/a:redhat:rhel_eus:8.2::appstream" ]
null
7.5
null
null
RHSA-2024:10779
Red Hat Security Advisory: python3:3.6.8 security update
python: Virtual environment (venv) activation scripts don't quote paths python: Improper validation of IPv6 and IPvFuture addresses
[ "cpe:/a:redhat:enterprise_linux:8::appstream", "cpe:/o:redhat:enterprise_linux:8::baseos" ]
null
3.7
null
null
RHSA-2022:6819
Red Hat Security Advisory: Red Hat AMQ Streams 2.2.0 release and security update
jackson-databind: denial of service via a large depth of nested objects netty: world readable temporary file containing sensitive data com.google.code.gson-gson: Deserialization of Untrusted Data in com.google.code.gson-gson Kafka: Unauthenticated clients may cause OutOfMemoryError on brokers
[ "cpe:/a:redhat:amq_streams:2" ]
null
7.5
null
null
RHSA-2013:0829
Red Hat Security Advisory: kernel-rt security and bug fix update
Kernel: drm/i915: heap writing overflow Kernel: sa_restorer information leak Kernel: tmpfs: fix use-after-free of mempolicy object Kernel: USB io_ti driver NULL pointer dereference in routine chase_port Kernel: keys: race condition in install_user_keyrings() kernel: xfs: _xfs_buf_find oops on blocks beyond the filesystem end kernel: ext3: format string issues kernel: usb: cdc-wdm buffer overflow triggered by device Kernel: tg3: buffer overflow in VPD firmware parsing kernel: net: incorrect SCM_CREDENTIALS passing kernel: perf_swevent_enabled array out-of-bound access kernel: crypto: info leaks in report API kernel: crypto: info leaks in report API kernel: crypto: info leaks in report API kernel: Information leak in the Data Center Bridging (DCB) component kernel: Information leak in the RTNETLINK component Kernel: crypto: algif - suppress sending source address information in recvmsg Kernel: atm: update msg_namelen in vcc_recvmsg() Kernel: Bluetooth: possible info leak in bt_sock_recvmsg() Kernel: Bluetooth: RFCOMM - missing msg_namelen update in rfcomm_sock_recvmsg Kernel: llc: Fix missing msg_namelen update in llc_ui_recvmsg
[ "cpe:/a:redhat:enterprise_mrg:2:server:el6" ]
null
null
null
null
RHSA-2025:0821
Red Hat Security Advisory: RHSA: Submariner 0.17.5 - bug and security fixes
golang.org/x/net/html: Non-linear parsing of case-insensitive content in golang.org/x/net/html
[ "cpe:/a:redhat:acm:2.10::el9" ]
null
7.5
null
null