id
stringlengths
13
15
title
stringlengths
29
176
description
stringlengths
8
32.1k
cpes
listlengths
0
20
cvss_v4_0
null
cvss_v3_1
float64
0
10
cvss_v3_0
float64
0
10
cvss_v2_0
null
RHSA-2020:4155
Red Hat Security Advisory: thunderbird security update
Mozilla: Memory safety bugs fixed in Firefox 81 and Firefox ESR 78.3 Mozilla: XSS when pasting attacker-controlled data into a contenteditable element Mozilla: Download origin spoofing via redirect Mozilla: When recursing through layers while scrolling, an iterator may have become invalid, resulting in a potential use-after-free scenario
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
8.8
6.1
null
RHSA-2017:0184
Red Hat Security Advisory: mysql security update
mysql: race condition while setting stats during MyISAM table repair (CPU Oct 2016) mysql: general_log can write to configuration files, leading to privilege escalation (CPU Oct 2016) mysql: race condition while setting stats during MyISAM table repair (CPU Oct 2016)
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
7
null
RHSA-2019:2276
Red Hat Security Advisory: mercurial security update
mercurial: Missing check for fragment start position in mpatch.c:mpatch_apply() mercurial: Buffer underflow in mpatch.c:mpatch_apply() mercurial: HTTP server permissions bypass
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
6.5
null
RHSA-2012:0744
Red Hat Security Advisory: python security update
python: potential XSS in SimpleHTTPServer's list_directory() python: distutils creates ~/.pypirc insecurely python: SimpleXMLRPCServer CPU usage DoS via malformed XML-RPC request python: hash table collisions CPU usage DoS (oCERT-2011-003)
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
null
null
RHSA-2023:0286
Red Hat Security Advisory: firefox security update
Mozilla: libusrsctp library out of date Mozilla: Fullscreen notification bypass Mozilla: Arbitrary file read from GTK drag and drop on Linux Mozilla: Malicious command could be hidden in devtools output Mozilla: URL being dragged from cross-origin iframe into same tab triggers navigation Mozilla: Content Security Policy wasn't being correctly applied to WebSockets in WebWorkers Mozilla: Calls to <code>console.log</code> allowed bypasing Content Security Policy via format directive Mozilla: Memory safety bugs fixed in Firefox 109 and Firefox ESR 102.7
[ "cpe:/a:redhat:rhel_eus:9.0::appstream" ]
null
8.8
null
null
RHSA-2023:7783
Red Hat Security Advisory: postgresql security update
postgresql: Buffer overrun from integer overflow in array modification
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
8.8
null
null
RHSA-2020:5083
Red Hat Security Advisory: microcode_ctl security, bug fix, and enhancement update
hw: Information disclosure issue in Intel SGX via RAPL interface hw: Vector Register Leakage-Active hw: Fast forward store predictor
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
5.5
null
null
RHSA-2017:0195
Red Hat Security Advisory: ansible security update
Ansible: Compromised remote hosts can lead to running commands on the Ansible controller
[ "cpe:/a:redhat:openstack:10::el7" ]
null
null
6.6
null
RHSA-2013:0821
Red Hat Security Advisory: thunderbird security update
Mozilla: Miscellaneous memory safety hazards (rv:17.0.6) (MFSA 2013-41) Mozilla: Privileged access for content level constructor (MFSA 2013-42) Mozilla: Use-after-free with video and onresize event (MFSA 2013-46) Mozilla: Uninitialized functions in DOMSVGZoomEvent (MFSA 2013-47) Mozilla: Memory corruption found using Address Sanitizer (MFSA 2013-48) Mozilla: Memory corruption found using Address Sanitizer (MFSA 2013-48) Mozilla: Memory corruption found using Address Sanitizer (MFSA 2013-48) Mozilla: Memory corruption found using Address Sanitizer (MFSA 2013-48) Mozilla: Memory corruption found using Address Sanitizer (MFSA 2013-48) Mozilla: Memory corruption found using Address Sanitizer (MFSA 2013-48)
[ "cpe:/a:redhat:rhel_productivity:5", "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
null
null
RHSA-2024:1055
Red Hat Security Advisory: kpatch-patch security update
kernel: GSM multiplexing race condition leads to privilege escalation
[ "cpe:/o:redhat:rhel_eus:9.2::baseos" ]
null
7
null
null
RHSA-2020:2060
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.2.8 on RHEL 8 security update
jackson-mapper-asl: XML external entity similar to CVE-2016-3720 cxf: OpenId Connect token service does not properly validate the clientId cxf: reflected XSS in the services listing page Wildfly: EJBContext principal is not popped back after invoking another EJB using a different Security Domain SmallRye: SecuritySupport class is incorrectly public and contains a static method to access the current threads context class loader Soteria: security identity corruption across concurrent threads undertow: AJP File Read/Inclusion Vulnerability undertow: servletPath is normalized incorrectly leading to dangerous application mapping which could result in security bypass cryptacular: excessive memory allocation during a decode operation undertow: Memory exhaustion issue in HttpReadListener via "Expect: 100-continue" header undertow: invalid HTTP request with large chunk size
[ "cpe:/a:redhat:jboss_enterprise_application_platform:7.2::el8" ]
null
6.5
8.1
null
RHSA-2007:0542
Red Hat Security Advisory: mcstrans security and bug fix update
mctransd DoS
[ "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
RHSA-2019:2628
Red Hat Security Advisory: redis security update
redis: Heap buffer overflow in HyperLogLog triggered by malicious client
[ "cpe:/a:redhat:openstack:13::el7" ]
null
null
7.2
null
RHSA-2024:4527
Red Hat Security Advisory: ghostscript security update
ghostscript: OPVP device arbitrary code execution via custom Driver library
[ "cpe:/a:redhat:rhel_eus:8.8::appstream", "cpe:/a:redhat:rhel_eus:8.8::crb" ]
null
8.8
null
null
RHSA-2021:4586
Red Hat Security Advisory: gcc-toolset-11-gcc security update
environment: Unicode's bidirectional (BiDi) override characters can cause trojan source attacks
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
8.5
null
null
RHSA-2009:0256
Red Hat Security Advisory: firefox security update
Firefox layout crashes with evidence of memory corruption Firefox javascript crashes with evidence of memory corruption Firefox XSS using a chrome XBL method and window.eval Firefox local file stealing with SessionStore Firefox Chrome privilege escalation via local .desktop files Firefox XMLHttpRequest allows reading HTTPOnly cookies Firefox directives to not cache pages ignored
[ "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws", "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::client_workstation", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
RHSA-2024:9306
Red Hat Security Advisory: httpd security update
httpd: HTTP response splitting httpd: HTTP Response Splitting in multiple modules
[ "cpe:/a:redhat:enterprise_linux:9::appstream" ]
null
4
null
null
RHSA-2016:0103
Red Hat Security Advisory: kernel security, bug fix, and enhancement update
virt: guest to host DoS by triggering an infinite loop in microcode via #DB exception kernel: Possible use-after-free vulnerability in keyring facility kernel: pipe buffer state corruption after unsuccessful atomic read from pipe
[ "cpe:/o:redhat:rhel_eus:7.1::computenode", "cpe:/o:redhat:rhel_eus:7.1::server" ]
null
null
null
null
RHSA-2024:8884
Red Hat Security Advisory: Red Hat Product OCP Tools 4.15 Openshift Jenkins security update
angus-mail: Enabling Secure Server Identity Checks for Safer SMTPS Communication spring-expression: Denial of service when processing a specially crafted Spring Expression Language expression jenkins: Exposure of multi-line secrets through error messages jenkins: Item creation restriction bypass vulnerability
[ "cpe:/a:redhat:ocp_tools:4.15::el8" ]
null
5.3
null
null
RHSA-2022:0485
Red Hat Security Advisory: OpenShift Container Platform 4.8.31 security update
log4j-core: remote code execution via JDBC Appender
[ "cpe:/a:redhat:openshift:4.8::el8" ]
null
6.6
null
null
RHSA-2021:3296
Red Hat Security Advisory: libX11 security update
libX11: missing request length checks
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
8.1
null
null
RHSA-2023:3827
Red Hat Security Advisory: libtiff security update
libtiff: heap-based buffer overflow in processCropSelections() in tools/tiffcrop.c
[ "cpe:/a:redhat:enterprise_linux:8::appstream", "cpe:/a:redhat:enterprise_linux:8::crb" ]
null
5.5
null
null
RHSA-2020:5434
Red Hat Security Advisory: targetcli security update
targetcli: weak permissions for /etc/target and backup files
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
5.5
null
null
RHSA-2023:5148
Red Hat Security Advisory: Red Hat Integration Camel for Spring Boot 3.20.2 release and security update
spring-boot: Security Bypass With Wildcard Pattern Matching on Cloud Foundry snappy-java: Unchecked chunk length leads to DoS
[ "cpe:/a:redhat:camel_spring_boot:3.20" ]
null
5.9
null
null
RHSA-2024:2236
Red Hat Security Advisory: libvirt security update
libvirt: NULL pointer dereference in udevConnectListAllInterfaces()
[ "cpe:/a:redhat:enterprise_linux:9::appstream", "cpe:/a:redhat:enterprise_linux:9::crb" ]
null
5
null
null
RHSA-2013:0772
Red Hat Security Advisory: mysql security update
mysql: COM_BINLOG_DUMP crash on invalid data mysql: unspecified DoS related to Server Locking (CPU April 2013) mysql: unspecified vulnerability related to Server Locking (CPU April 2013) mysql: unspecified vulnerability related to Server Privileges (CPU April 2013) mysql: unspecified DoS related to Information Schema (CPU April 2013) mysql: unspecified DoS related to Data Manipulation Language (CPU April 2013) mysql: unspecified DoS related to Server Types (CPU April 2013) mysql: unspecified vulnerability related to Server (CPU April 2013) mysql: unspecified DoS related to Server Partition (CPU April 2013) mysql: unspecified vulnerability related to Server Privileges (CPU April 2013) mysql: unspecified vulnerability related to Information Schema (CPU April 2013) mysql: unspecified DoS related to InnoDB (CPU April 2013) mysql: unspecified vulnerability related to Server Install (CPU April 2013) mysql: unspecified DoS related to Server Optimizer (CPU April 2013) mysql: unspecified DoS related to Server Options (CPU July 2013)
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
null
null
RHSA-2021:0948
Red Hat Security Advisory: Red Hat Certificate System security and bug fix update
pki-core: stored Cross-site scripting (XSS) in the pki-tps web Activity tab pki-core: unsanitized token parameters in TPS resulting in stored XSS pki-core: Stored XSS in TPS profile creation
[ "cpe:/a:redhat:certificate_system_eus:9.4::el7" ]
null
4.6
null
null
RHSA-2023:7539
Red Hat Security Advisory: kernel security, bug fix, and enhancement update
hw: Intel: Gather Data Sampling (GDS) side channel vulnerability kernel: use-after-free due to race condition occurring in dvb_register_device() kernel: use-after-free due to race condition occurring in dvb_net.c kernel: use-after-free due to race condition occurring in dvb_ca_en50221.c kernel: use-after-free in smb2_is_status_io_timeout() kernel: net/sched: cls_u32 component reference counter leak if tcf_change_indev() fails kernel: net/sched: Use-after-free vulnerabilities in the net/sched classifiers: cls_fw, cls_u32 and cls_route kernel: net/sched: Use-after-free vulnerabilities in the net/sched classifiers: cls_fw, cls_u32 and cls_route kernel: net/sched: Use-after-free vulnerabilities in the net/sched classifiers: cls_fw, cls_u32 and cls_route kernel: net/sched: Use-after-free vulnerabilities in the net/sched classifiers: cls_fw, cls_u32 and cls_route kernel: Race between task migrating pages and another task calling exit_mmap to release those same pages getting invalid opcode BUG in include/linux/swapops.h kernel: fbcon: out-of-sync arrays in fbcon_mode_deleted due to wrong con2fb_map assignment kernel: netfilter: potential slab-out-of-bound access due to integer underflow kernel: mm/slab_common: slab_caches list corruption after kmem_cache_destroy()
[ "cpe:/a:redhat:rhel_eus:8.8::crb", "cpe:/o:redhat:rhel_eus:8.8::baseos" ]
null
5.5
null
null
RHSA-2020:4111
Red Hat Security Advisory: qemu-kvm-rhev security update
QEMU: usb: out-of-bounds r/w access issue while processing usb packets
[ "cpe:/a:redhat:rhev_manager:4.3", "cpe:/o:redhat:enterprise_linux:7::hypervisor" ]
null
5
null
null
RHSA-2020:5529
Red Hat Security Advisory: Red Hat Single Sign-On 7.4.4 on OpenJDK for OpenShift image security update
containers/redhat-sso-7: /etc/passwd is given incorrect privileges
[ "cpe:/a:redhat:rhosemc:1.0::el8" ]
null
7
null
null
RHSA-2024:8725
Red Hat Security Advisory: firefox security update
firefox: thunderbird: Permission leak via embed or object elements firefox: thunderbird: Use-after-free in layout with accessibility firefox: thunderbird: Confusing display of origin for external protocol handler prompt firefox: thunderbird: XSS due to Content-Disposition being ignored in multipart/x-mixed-replace response firefox: thunderbird: Origin of permission prompt could be spoofed by long URL firefox: thunderbird: Cross origin video frame leak firefox: thunderbird: History interface could have been used to cause a Denial of Service condition in the browser firefox: thunderbird: Clipboard "paste" button persisted across tabs firefox: DOM push subscription message could hang Firefox firefox: thunderbird: Memory safety bugs fixed in Firefox 132, Thunderbird 132, Firefox ESR 128.4, and Thunderbird 128.4
[ "cpe:/a:redhat:rhel_aus:8.6::appstream", "cpe:/a:redhat:rhel_e4s:8.6::appstream", "cpe:/a:redhat:rhel_tus:8.6::appstream" ]
null
8.8
null
null
RHBA-2003:308
Red Hat Bug Fix Advisory: Updated kernel resolves 32-bit address space issue on AMD64
security flaw
[ "cpe:/o:redhat:enterprise_linux:3::as", "cpe:/o:redhat:enterprise_linux:3::ws" ]
null
null
null
null
RHSA-2023:3888
Red Hat Security Advisory: Red Hat Single Sign-On 7.6.4 for OpenShift image security enhancement update
RHSSO: XSS due to lax URI scheme validation Undertow: Infinite loop in SslConduit during close keycloak: Untrusted Certificate Validation keycloak: oauth client impersonation keycloak: client access via device auth request spoof
[ "cpe:/a:redhat:rhosemc:1.0::el8" ]
null
3.5
null
null
RHSA-2019:0984
Red Hat Security Advisory: python36:3.6 security update
python-sqlalchemy: SQL Injection when the order_by parameter can be controlled python-sqlalchemy: SQL Injection when the group_by parameter can be controlled
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
null
7.3
null
RHSA-2007:0095
Red Hat Security Advisory: krb5 security update
Unauthorized access via krb5-telnet daemon krb5_klog_syslog() stack buffer overflow krb5 double free flaw
[ "cpe:/o:redhat:enterprise_linux:2.1::as", "cpe:/o:redhat:enterprise_linux:2.1::aw", "cpe:/o:redhat:enterprise_linux:2.1::es", "cpe:/o:redhat:enterprise_linux:2.1::ws", "cpe:/o:redhat:enterprise_linux:3::as", "cpe:/o:redhat:enterprise_linux:3::desktop", "cpe:/o:redhat:enterprise_linux:3::es", "cpe:/o:redhat:enterprise_linux:3::ws", "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws", "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::client_workstation", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
RHSA-2015:1927
Red Hat Security Advisory: java-1.7.0-oracle security update
OpenJDK: kerberos realm name leak (JGSS, 8048030) OpenJDK: inefficient use of hash tables and lists during XML parsing (JAXP, 8068842) OpenJDK: missing checks for proper initialization in ObjectStreamClass (Serialization, 8103671) OpenJDK: HttpURLConnection header restriction bypass (Libraries, 8130193) JDK: unspecified vulnerability fixed in 7u91 and 8u65 (Deployment) OpenJDK: insufficient permission checks in StubGenerator (CORBA, 8076383) OpenJDK: OOB access in CMS code (2D, 8086092) OpenJDK: leak of user.dir location (JAXP, 8078427) OpenJDK: java.nio Buffers integer overflow issues (Libraries, 8130891) ICU: missing boundary checks in layout engine (OpenJDK 2D, 8132042) OpenJDK: incorrect access control context used in DGCImpl (RMI, 8080688) OpenJDK: protected methods can be used as interface methods via DirectMethodHandle (Libraries) OpenJDK: incomplete constraints enforcement by AlgorithmChecker (Security, 8131291) OpenJDK: missing type checks in IIOPInputStream (CORBA, 8076392) OpenJDK: incorrect String object deserialization in IIOPInputStream (CORBA, 8076387) OpenJDK: incorrect access control context used in DGCClient (RMI, 8076413) OpenJDK: incomplete MaxXMLNameLimit enforcement (JAXP, 8086733) JDK: unspecified vulnerability fixed in 6u105, 7u91 and 8u65 (Deployment) OpenJDK: insufficient proxy class checks in RemoteObjectInvocationHandler (RMI, 8076339) OpenJDK: incomplete supportDTD enforcement (JAXP, 8130078)
[ "cpe:/a:redhat:rhel_extras_oracle_java:5", "cpe:/a:redhat:rhel_extras_oracle_java:6", "cpe:/a:redhat:rhel_extras_oracle_java:7" ]
null
null
null
null
RHSA-2024:1570
Red Hat Security Advisory: ACS 4.4 enhancement and security update
helm: shows secrets with --dry-run option in clear text graphql: Insufficient checks in the OverlappingFieldsCanBeMergedRule.ts file when parsing large queries golang: net/http: insufficient sanitization of Host header go-git: Maliciously crafted Git server replies can cause DoS on go-git clients helm: Missing YAML Content Leads To Panic jose-go: improper handling of highly compressed data
[ "cpe:/a:redhat:advanced_cluster_security:4.4::el8" ]
null
4.3
null
null
RHSA-2008:0505
Red Hat Security Advisory: Red Hat Application Stack v2.1 security and enhancement update
php crash in glob() and fnmatch() functions php htmlentities/htmlspecialchars multibyte sequences php session ID leakage php: buffer overflow in a CGI path translation PHP multibyte shell escape flaw mysql: privilege escalation via DATA/INDEX DIRECTORY directives PHP 32 bit weak random seed PHP weak 64 bit random seed
[ "cpe:/a:redhat:rhel_application_stack:2" ]
null
null
null
null
RHSA-2024:4884
Red Hat Security Advisory: Red Hat Build of Apache Camel 4.4.1 for Spring Boot security update.
mvel: TimeOut error when calling ParseTools.subCompileExpression() function io.vertx/vertx-core: memory leak due to the use of Netty FastThreadLocal data structures in Vertx io.vertx:vertx-core: memory leak when a TCP server is configured with TLS and SNI support pgjdbc: PostgreSQL JDBC Driver allows attacker to inject SQL if using PreferQueryMode=SIMPLE undertow: Out-of-memory Error after several closed connections with wildfly-http-client protocol undertow: response write hangs in case of Java 17 TLSv1.3 NewSessionTicket undertow: url-encoded request path information can be broken on ajp-listener jetty: stop accepting new connections from valid clients threetenbp: null pointer exception org.bouncycastle: Importing an EC certificate with crafted F2m parameters may lead to Denial of Service bc-java: BouncyCastle vulnerable to a timing variant of Bleichenbacher (Marvin Attack) org.bouncycastle:bcprov-jdk18on: Infinite loop in ED25519 verification in the ScalarUtil class
[ "cpe:/a:redhat:apache_camel_spring_boot:4.4.1" ]
null
7.5
null
null
RHSA-2023:1408
Red Hat Security Advisory: OpenShift Container Platform 4.12.9 packages and security update
capnproto: out of bounds read when handling a list of lists.
[ "cpe:/a:redhat:openshift:4.12::el8", "cpe:/a:redhat:openshift:4.12::el9" ]
null
5.4
null
null
RHSA-2012:1327
Red Hat Security Advisory: freeradius2 security update
freeradius: stack-based buffer overflow via long expiration date fields in client X509 certificates
[ "cpe:/o:redhat:enterprise_linux:5::client_workstation", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
RHSA-2016:0638
Red Hat Security Advisory: chromium-browser security update
chromium-browser: out-of-bounds read in Pdfium JPEG2000 decoding chromium-browser: universal XSS in extension bindings chromium-browser: out-of-bounds write in V8 chromium-browser: uninitialized memory read in media chromium-browser: use-after-free related to extensions chromium-browser: android downloaded file path restriction bypass chromium-browser: address bar spoofing chromium-browser: potential leak of sensitive information to malicious extensions chromium-browser: various fixes from internal audits
[ "cpe:/a:redhat:rhel_extras:6" ]
null
null
null
null
RHSA-2023:5049
Red Hat Security Advisory: httpd:2.4 security update
httpd: mod_proxy_uwsgi HTTP response splitting
[ "cpe:/a:redhat:rhel_eus:8.6::appstream" ]
null
7.5
null
null
RHBA-2020:4346
Red Hat Bug Fix Advisory: Satellite 6.7.5 Async Bug Fix Update
Satellite: Local user impersonation by Single sign-on (SSO) user leads to account takeover
[ "cpe:/a:redhat:satellite:6.7::el7", "cpe:/a:redhat:satellite_capsule:6.7::el7" ]
null
7.5
null
null
RHSA-2023:6242
Red Hat Security Advisory: .NET 6.0 security update
dotnet: Denial of Service with Client Certificates using .NET Kestrel
[ "cpe:/a:redhat:enterprise_linux:9::appstream", "cpe:/a:redhat:enterprise_linux:9::crb" ]
null
6.5
null
null
RHSA-2023:2236
Red Hat Security Advisory: toolbox security and bug fix update
golang: net/http: handle server errors after sending GOAWAY golang: math/big: decoding big.Float and big.Rat types can panic if the encoded message is too short, potentially allowing a denial of service golang: net/http: excessive memory growth in a Go server accepting HTTP/2 requests
[ "cpe:/a:redhat:enterprise_linux:9::appstream" ]
null
5.3
null
null
RHSA-2024:1516
Red Hat Security Advisory: Red Hat OpenStack Platform 16.1.9 (python-twisted) security update
python-twisted: disordered HTTP pipeline response in twisted.web
[ "cpe:/a:redhat:openstack:16.1::el8" ]
null
5.3
null
null
RHSA-2020:3084
Red Hat Security Advisory: rh-nodejs10-nodejs security update
nodejs-minimist: prototype pollution allows adding or modifying properties of Object.prototype using a constructor or __proto__ payload nodejs: memory corruption in napi_get_value_string_* functions ICU: Integer overflow in UnicodeString::doAppend() nghttp2: overly large SETTINGS frames can lead to DoS
[ "cpe:/a:redhat:rhel_software_collections:3::el7" ]
null
7.5
null
null
RHSA-2024:3838
Red Hat Security Advisory: ruby security update
ruby/cgi-gem: HTTP response splitting in CGI ruby: ReDoS vulnerability in URI ruby: ReDoS vulnerability in Time ruby: Buffer overread vulnerability in StringIO ruby: RCE vulnerability with .rdoc_options in RDoc ruby: Arbitrary memory address read vulnerability with Regex search
[ "cpe:/a:redhat:enterprise_linux:9::appstream", "cpe:/a:redhat:enterprise_linux:9::crb" ]
null
6.6
null
null
RHSA-2024:1248
Red Hat Security Advisory: kernel security update
kernel: Use-after-free in nft_verdict_dump due to a race between set GC and transaction kernel: A heap out-of-bounds write when function perf_read_group is called and sibling_list is smaller than its child's sibling_list kernel: NULL pointer dereference in nvmet_tcp_build_iovec kernel: NULL pointer dereference in nvmet_tcp_execute_request kernel: NULL pointer dereference in __nvmet_req_complete kernel: Out-Of-Bounds Read vulnerability in smbCalcSize kernel: OOB Access in smb2_dump_detail kernel: inactive elements in nft_pipapo_walk kernel: use-after-free in amdgpu_cs_wait_all_fences in drivers/gpu/drm/amd/amdgpu/amdgpu_cs.c kernel: netfilter: use-after-free in nft_trans_gc_catchall_sync leads to privilege escalation kernel: ktls overwrites readonly memory pages when using function splice with a ktls socket as destination
[ "cpe:/a:redhat:enterprise_linux:9::appstream", "cpe:/a:redhat:enterprise_linux:9::crb", "cpe:/a:redhat:enterprise_linux:9::nfv", "cpe:/a:redhat:enterprise_linux:9::realtime", "cpe:/o:redhat:enterprise_linux:9::baseos" ]
null
7
null
null
RHSA-2024:0485
Red Hat Security Advisory: OpenShift Container Platform 4.12.48 bug fix and security update
golang: net/url: JoinPath does not strip relative path components in all circumstances golang.org/x/net/http2: avoid quadratic complexity in HPACK decoding golang.org/x/net/html: Cross site scripting openshift: incomplete fix for Rapid Reset (CVE-2023-44487/CVE-2023-39325) golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487)
[ "cpe:/a:redhat:openshift:4.12::el8" ]
null
7.5
null
null
RHSA-2020:0592
Red Hat Security Advisory: kernel security, bug fix, and enhancement update
kernel: use-after-free in fs/xfs/xfs_super.c kernel: insufficient input validation in kernel mode driver in Intel i915 graphics leads to privilege escalation kernel: heap-based buffer overflow in mwifiex_process_country_ie() function in drivers/net/wireless/marvell/mwifiex/sta_ioctl.c kernel: buffer overflow in cfg80211_mgd_wext_giwessid in net/wireless/wext-sme.c
[ "cpe:/o:redhat:rhel_aus:7.4::server", "cpe:/o:redhat:rhel_e4s:7.4::server", "cpe:/o:redhat:rhel_tus:7.4::server" ]
null
8
8
null
RHSA-2013:0944
Red Hat Security Advisory: python-keystoneclient security and bug fix update
Keystone: Missing expiration check in Keystone PKI token validation
[ "cpe:/a:redhat:openstack:3::el6" ]
null
null
null
null
RHSA-2023:5093
Red Hat Security Advisory: kpatch-patch security update
kernel: UAF in nftables when nft_set_lookup_global triggered after handling named and anonymous sets in batch requests kernel: netfilter: nf_tables: fix chain binding transaction logic in the abort path of NFT_MSG_NEWRULE kernel: net/sched: cls_fw component can be exploited as result of failure in tcf_change_indev function kernel: netfilter: use-after-free due to improper element removal in nft_pipapo_remove() kernel: netfilter: nf_tables_newrule when adding a rule with NFTA_RULE_CHAIN_ID leads to use-after-free kernel: nf_tables: use-after-free in nft_chain_lookup_byid() kernel: nf_tables: stack-out-of-bounds-read in nft_byteorder_eval()
[ "cpe:/o:redhat:enterprise_linux:9::baseos" ]
null
7.8
null
null
RHSA-2024:0325
Red Hat Security Advisory: Updated RHEL-7-based Middleware container images
SnakeYaml: Constructor Deserialization Remote Code Execution
[ "cpe:/a:redhat:rhosemc:1.0::el7" ]
null
9.8
null
null
RHSA-2021:3499
Red Hat Security Advisory: thunderbird security update
Mozilla: Memory safety bugs fixed in Firefox 92, Firefox ESR 78.14 and Firefox ESR 91.1
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
8.8
null
null
RHSA-2019:0373
Red Hat Security Advisory: firefox security update
mozilla: Use after free in Skia mozilla: Integer overflow in Skia
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
6.5
null
RHBA-2019:1076
Red Hat Bug Fix Advisory: ovirt-engine-api-explorer bug fix and enhancement update for RHV 4.3
bootstrap: XSS in the data-target attribute bootstrap: XSS in the tooltip data-viewport attribute bootstrap: XSS in the affix configuration target property
[ "cpe:/a:redhat:rhev_manager:4.3" ]
null
null
6.1
null
RHSA-2023:7200
Red Hat Security Advisory: OpenShift Container Platform 4.15.z security update
golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487) golang: net/http/internal: Denial of Service (DoS) via Resource Consumption via HTTP requests golang: crypto/tls: Timing Side Channel attack in RSA based TLS key exchanges.
[ "cpe:/a:redhat:openshift:4.15::el9" ]
null
7.5
null
null
RHSA-2021:3971
Red Hat Security Advisory: Red Hat OpenStack Platform 10.0 (redis) security update
redis: Lua scripts can overflow the heap-based Lua stack redis: Integer overflow issue with Streams redis: Integer overflow bug in the ziplist data structure redis: Denial of service via Redis Standard Protocol (RESP) request redis: Integer overflow issue with intsets redis: Integer overflow issue with strings
[ "cpe:/a:redhat:openstack:10::el7" ]
null
7.5
null
null
RHSA-2023:2077
Red Hat Security Advisory: libwebp security update
Mozilla: libwebp: Double-free in libwebp
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
7.5
null
null
RHSA-2024:0582
Red Hat Security Advisory: rpm security update
rpm: TOCTOU race in checks for unsafe symlinks rpm: races with chown/chmod/capabilities calls during installation rpm: checks for unsafe symlinks are not performed for intermediary directories
[ "cpe:/a:redhat:rhel_eus:8.8::appstream", "cpe:/o:redhat:rhel_eus:8.8::baseos" ]
null
6.5
null
null
RHSA-2014:0415
Red Hat Security Advisory: libyaml security update
libyaml: heap-based buffer overflow when parsing YAML tags libyaml: heap-based buffer overflow when parsing URLs
[ "cpe:/a:redhat:rhel_common:6::el6" ]
null
null
null
null
RHSA-2021:3955
Red Hat Security Advisory: redhat-ds:11 security, bug fix, and enhancement update
389-ds-base: sync_repl NULL pointer dereference in sync_create_state_control() 389-ds-base: CRYPT password hash with asterisk allows any bind attempt to succeed
[ "cpe:/a:redhat:directory_server:11.4::el8" ]
null
6.5
null
null
RHSA-2011:0918
Red Hat Security Advisory: curl security update
curl: Improper delegation of client credentials during GSS negotiation
[ "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws", "cpe:/o:redhat:enterprise_linux:5::server", "cpe:/o:redhat:enterprise_linux:6::server" ]
null
null
null
null
RHSA-2022:1108
Red Hat Security Advisory: Red Hat Process Automation Manager 7.12.1 security update
netty: Information disclosure via the local system temporary directory springframework: malicious input leads to insertion of additional log entries apache-commons-io: Limited path traversal in Apache Commons IO 2.2 to 2.6 jdom: XXE allows attackers to cause a DoS via a crafted HTTP request logback: remote code execution through JNDI call from within its configuration file
[ "cpe:/a:redhat:jboss_enterprise_bpms_platform:7.12" ]
null
6.6
null
null
RHSA-2024:9627
Red Hat Security Advisory: Red Hat OpenShift Service Mesh Containers for 2.6.3
http-proxy-middleware: Denial of Service
[ "cpe:/a:redhat:service_mesh:2.6::el8", "cpe:/a:redhat:service_mesh:2.6::el9" ]
null
7.5
null
null
RHSA-2024:3545
Red Hat Security Advisory: nodejs security update
nodejs: HTTP Request Smuggling via Content Length Obfuscation nodejs: CONTINUATION frames DoS
[ "cpe:/a:redhat:rhel_eus:9.0::appstream" ]
null
7.5
null
null
RHSA-2021:0526
Red Hat Security Advisory: kernel security and bug fix update
kernel: umask not applied on filesystem without ACL support kernel: TOCTOU mismatch in the NFS client code
[ "cpe:/o:redhat:rhel_eus:7.7::computenode", "cpe:/o:redhat:rhel_eus:7.7::server" ]
null
7
null
null
RHSA-2012:0149
Red Hat Security Advisory: kvm security and bug fix update
kernel: kvm: device assignment DoS
[ "cpe:/a:redhat:rhel_virtualization:5::client", "cpe:/a:redhat:rhel_virtualization:5::server" ]
null
null
null
null
RHSA-2013:0648
Red Hat Security Advisory: jbossweb security update
Tomcat/JBoss Web - Bypass of CSRF prevention filter tomcat: three DIGEST authentication implementation issues tomcat: three DIGEST authentication implementation issues tomcat: three DIGEST authentication implementation issues
[ "cpe:/a:redhat:jboss_enterprise_application_platform:6.0.1" ]
null
null
null
null
RHSA-2018:1722
Red Hat Security Advisory: java-1.8.0-ibm security update
JDK: unspecified vulnerability fixed in 6u191, 7u171, and 8u161 (Security) OpenJDK: incorrect merging of sections in the JAR manifest (Security, 8189969) OpenJDK: unrestricted deserialization of data from JCEKS key stores (Security, 8189997) OpenJDK: insufficient consistency checks in deserialization of multiple classes (Security, 8189977) OpenJDK: unbounded memory allocation during deserialization in PriorityBlockingQueue (Concurrency, 8189981) OpenJDK: unbounded memory allocation during deserialization in TabularDataSupport (JMX, 8189985) OpenJDK: unbounded memory allocation during deserialization in Container (AWT, 8189989) OpenJDK: unbounded memory allocation during deserialization in NamedNodeMapImpl (JAXP, 8189993) OpenJDK: RMI HTTP transport enabled by default (RMI, 8193833)
[ "cpe:/a:redhat:rhel_extras:6" ]
null
null
4.2
null
RHSA-2023:7276
Red Hat Security Advisory: open-vm-tools security update
open-vm-tools: SAML token signature bypass open-vm-tools: file descriptor hijack vulnerability in the vmware-user-suid-wrapper
[ "cpe:/a:redhat:rhel_eus:9.2::appstream" ]
null
7.4
null
null
RHSA-2023:5591
Red Hat Security Advisory: linux-firmware security update
hw: amd: Cross-Process Information Leak
[ "cpe:/o:redhat:rhel_aus:8.2::baseos", "cpe:/o:redhat:rhel_e4s:8.2::baseos", "cpe:/o:redhat:rhel_tus:8.2::baseos" ]
null
6.5
null
null
RHSA-2010:0756
Red Hat Security Advisory: Red Hat Enterprise MRG Messaging security and bug fix update 1.2.2
MRG: SSL connections to MRG broker can be blocked MRG: remote authenticated DoS in broker
[ "cpe:/a:redhat:enterprise_mrg:1::el5" ]
null
null
null
null
RHSA-2023:6271
Red Hat Security Advisory: OpenShift Container Platform 4.11.53 security and extras update
golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487)
[ "cpe:/a:redhat:openshift:4.11::el8" ]
null
7.5
null
null
RHSA-2015:1009
Red Hat Security Advisory: Red Hat JBoss Portal 6.2.0 update
CXF: SSL hostname verification bypass, incomplete CVE-2012-5783 fix bouncycastle: TLS CBC padding timing attack WS: EJB3 role restrictions are not applied to jaxws handlers tomcat: multiple content-length header poisoning flaws JSF: XSS due to insufficient escaping of user-supplied content in outputText tags and EL expressions XStream: remote code execution due to insecure XML deserialization PicketBox/JBossSX: Unauthorized access to and modification of application server configuration and state by application jboss-as-server: Unchecked access to MSC Service Registry under JSM CXF: The SecurityTokenService accepts certain invalid SAML Tokens as valid CXF: UsernameTokens are sent in plaintext with a Symmetric EncryptBeforeSigning policy apache-commons-fileupload: denial of service due to too-small buffer size used by MultipartStream EAP6: Plain text password logging during security audit JBossSX/PicketBox: World readable audit.log file Tomcat/JBossWeb: Limited DoS in chunked transfer encoding input filter RichFaces: remote denial of service via memory exhaustion 6: JSM policy not respected by deployed applications Tomcat/JBossWeb: XXE vulnerability via user supplied XSLTs Tomcat/JBossWeb: Request smuggling via malicious content length header Xalan-Java: insufficient constraints in secure processing feature CXF: HTML content posted to SOAP endpoint could cause OOM errors CXF: Large invalid content could cause temporary space to fill Tomcat/JBossWeb: XML parser hijack by malicious web application netty: DoS via memory exhaustion during data aggregation Tomcat/JBossWeb: request smuggling and limited DoS in ChunkedInputFilter WSRP: Information disclosure via unsafe concurrency handling in interceptor Security: Invalid EJB caller role check implementation JAX-RS: Information disclosure via XML eXternal Entity (XXE) RESTEasy: XXE via parameter entities apache-poi: XML eXternal Entity (XXE) flaw PicketLink: XXE via insecure DocumentBuilderFactory usage apache-poi: entity expansion (billion laughs) flaw CXF: SSL hostname verification bypass, incomplete CVE-2012-6153 fix CLI: Insecure default permissions on history file cas-client: Bypass of security constraints via URL parameter injection RESTeasy: External entities expanded by DocumentProvider wss4j: Apache WSS4J is vulnerable to Bleichenbacher's attack (incomplete fix for CVE-2011-2487) wss4j: Apache WSS4J doesn't correctly enforce the requireSignedEncryptedDataElements property
[ "cpe:/a:redhat:jboss_enterprise_portal_platform:6.2" ]
null
null
4.8
null
RHSA-2023:7197
Red Hat Security Advisory: OpenShift Container Platform 4.15.0 security and extras update
golang.org/x/net/html: Cross site scripting opentelemetry: DoS vulnerability in otelhttp opentelemetry-go-contrib: DoS vulnerability in otelgrpc due to unbound cardinality metrics ssh: Prefix truncation attack on Binary Packet Protocol (BPP) go-git: Maliciously crafted Git server replies can lead to path traversal and RCE on go-git clients
[ "cpe:/a:redhat:openshift:4.15::el8", "cpe:/a:redhat:openshift:4.15::el9" ]
null
8.1
null
null
RHSA-2024:6887
Red Hat Security Advisory: Red Hat build of Keycloak 22.0.13 Images Update
keycloak-saml-core: Improper Verification of SAML Responses Leading to Privilege Escalation in Keycloak Keycloak: Vulnerable Redirect URI Validation Results in Open Redirec
[ "cpe:/a:redhat:build_keycloak:22::el9" ]
null
6.1
null
null
RHSA-2012:1149
Red Hat Security Advisory: sudo security and bug fix update
sudo: insecure temporary file use in RPM %postun script
[ "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
RHSA-2024:8461
Red Hat Security Advisory: krb5 security update
freeradius: forgery attack
[ "cpe:/a:redhat:rhel_eus:9.2::appstream", "cpe:/o:redhat:rhel_eus:9.2::baseos" ]
null
9
null
null
RHSA-2014:0627
Red Hat Security Advisory: openssl security update
openssl: SSL/TLS MITM vulnerability
[ "cpe:/o:redhat:rhel_els:4::as", "cpe:/o:redhat:rhel_els:4::es", "cpe:/o:redhat:rhel_eus:5.9", "cpe:/o:redhat:rhel_eus:6.3::computenode", "cpe:/o:redhat:rhel_eus:6.3::server", "cpe:/o:redhat:rhel_eus:6.4::computenode", "cpe:/o:redhat:rhel_eus:6.4::server", "cpe:/o:redhat:rhel_mission_critical:5.6", "cpe:/o:redhat:rhel_mission_critical:6.2::server" ]
null
null
null
null
RHSA-2022:9081
Red Hat Security Advisory: thunderbird security update
Mozilla: Quoting from an HTML email with certain tags will trigger network requests and load remote content, regardless of a configuration to block remote content Mozilla: Arbitrary file read from a compromised content process Mozilla: Drag and Dropped Filenames could have been truncated to malicious extensions Mozilla: Memory safety bugs fixed in Firefox ESR 102.6 and Thunderbird 102.6 Mozilla: Use-after-free in WebGL Mozilla: Memory corruption in WebGL Mozilla: Use-after-free in WebGL
[ "cpe:/a:redhat:rhel_eus:9.0::appstream" ]
null
8.1
null
null
RHSA-2020:4007
Red Hat Security Advisory: systemd security and bug fix update
systemd: memory leak in button_open() in login/logind-button.c when udev events are received
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
2.4
null
null
RHSA-2024:6632
Red Hat Security Advisory: OpenShift Container Platform 4.16.12 security update
opentelemetry-go-contrib: DoS vulnerability in otelgrpc due to unbound cardinality metrics
[ "cpe:/a:redhat:openshift:4.16::el9" ]
null
7.5
null
null
RHSA-2023:4172
Red Hat Security Advisory: java-1.8.0-openjdk security update
OpenJDK: array indexing integer overflow issue (8304468) OpenJDK: improper handling of slash characters in URI-to-path conversion (8305312)
[ "cpe:/a:redhat:rhel_aus:8.4::appstream", "cpe:/a:redhat:rhel_e4s:8.4::appstream", "cpe:/a:redhat:rhel_tus:8.4::appstream" ]
null
3.7
null
null
RHSA-2017:0515
Red Hat Security Advisory: ansible and ceph-ansible security, bug fix, and enhancement update
Ansible: Compromised remote hosts can lead to running commands on the Ansible controller
[ "cpe:/a:redhat:rhscon:2::el7" ]
null
null
6.6
null
RHSA-2023:1192
Red Hat Security Advisory: kpatch-patch security update
kernel: memory corruption in AX88179_178A based USB ethernet device. kernel: mm/mremap.c use-after-free vulnerability
[ "cpe:/o:redhat:rhel_eus:8.6::baseos" ]
null
7
null
null
RHSA-2022:8792
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.4.8 Security update
Undertow: DoS can be achieved as Undertow server waits for the LAST_CHUNK forever for EJB invocations
[ "cpe:/a:redhat:jboss_enterprise_application_platform:7.4::el9" ]
null
4.2
null
null
RHSA-2007:0096
Red Hat Security Advisory: mod_jk security update
security flaw
[ "cpe:/a:redhat:rhel_application_stack:1" ]
null
null
null
null
RHSA-2021:3885
Red Hat Security Advisory: java-1.8.0-openjdk security update
OpenJDK: Weak ciphers preferred over stronger ones for TLS (JSSE, 8264210) OpenJDK: Excessive memory allocation in RTFParser (Swing, 8265167) OpenJDK: Excessive memory allocation in RTFReader (Swing, 8265580) OpenJDK: Excessive memory allocation in HashMap and HashSet (Utility, 8266097) OpenJDK: Certificates with end dates too far in the future can corrupt keystore (Keytool, 8266137) OpenJDK: Loop in HttpsServer triggered during TLS session close (JSSE, 8254967) OpenJDK: Incorrect principal selection when using Kerberos Constrained Delegation (Libraries, 8266689) OpenJDK: Unexpected exception raised during TLS handshake (JSSE, 8267729) OpenJDK: Excessive memory allocation in BMPImageReader (ImageIO, 8267735) OpenJDK: Incomplete validation of inner class references in ClassFileParser (Hotspot, 8268071) OpenJDK: Non-constant comparison during TLS handshakes (JSSE, 8269618)
[ "cpe:/a:redhat:rhel_eus:8.2::appstream" ]
null
3.7
null
null
RHSA-2021:4135
Red Hat Security Advisory: java-17-openjdk security update
OpenJDK: Excessive memory allocation in RTFParser (Swing, 8265167) OpenJDK: Excessive memory allocation in RTFReader (Swing, 8265580) OpenJDK: Excessive memory allocation in HashMap and HashSet (Utility, 8266097) OpenJDK: Certificates with end dates too far in the future can corrupt keystore (Keytool, 8266137) OpenJDK: Incorrect principal selection when using Kerberos Constrained Delegation (Libraries, 8266689) OpenJDK: Unexpected exception raised during TLS handshake (JSSE, 8267729) OpenJDK: Excessive memory allocation in BMPImageReader (ImageIO, 8267735) OpenJDK: Non-constant comparison during TLS handshakes (JSSE, 8269618)
[ "cpe:/a:redhat:enterprise_linux:8::appstream", "cpe:/a:redhat:enterprise_linux:8::crb" ]
null
3.7
null
null
RHSA-2011:1854
Red Hat Security Advisory: krb5-appl security update
krb5: telnet client and server encrypt_keyid heap-based buffer overflow
[ "cpe:/o:redhat:rhel_eus:6.0", "cpe:/o:redhat:rhel_eus:6.1" ]
null
null
null
null
RHSA-2022:6820
Red Hat Security Advisory: prometheus-jmx-exporter security update
snakeyaml: Denial of Service due to missing nested depth limitation for collections
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
7.5
null
null
RHSA-2012:0748
Red Hat Security Advisory: libvirt security, bug fix, and enhancement update
libvirt: address bus= device= when identicle vendor ID/product IDs usb devices attached are ignored
[ "cpe:/a:redhat:storage:3:server:el6", "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
null
null
RHSA-2023:0076
Red Hat Security Advisory: Red Hat Ceph Storage 5.3 security update and Bug Fix
Moment.js: Path traversal in moment.locale
[ "cpe:/a:redhat:ceph_storage:5.3::el8", "cpe:/a:redhat:ceph_storage:5.3::el9" ]
null
7.5
null
null
RHSA-2015:2520
Red Hat Security Advisory: ntp security update
ntp: disabling synchronization via crafted KoD packet
[ "cpe:/o:redhat:rhel_eus:6.5::computenode", "cpe:/o:redhat:rhel_eus:6.5::server", "cpe:/o:redhat:rhel_eus:6.6::computenode", "cpe:/o:redhat:rhel_eus:6.6::server" ]
null
null
null
null
RHSA-2024:5894
Red Hat Security Advisory: bind security update
bind: bind9: BIND's database will be slow if a very large number of RRs exist at the same nam bind9: bind: SIG(0) can be used to exhaust CPU resources
[ "cpe:/o:redhat:rhel_aus:7.7::server" ]
null
7.5
null
null
RHSA-2016:2975
Red Hat Security Advisory: gstreamer-plugins-good security update
gstreamer-plugins-good: Heap buffer overflow in FLIC decoder gstreamer-plugins-good: Heap buffer overflow in FLIC decoder gstreamer-plugins-good: Heap buffer overflow in FLIC decoder gstreamer-plugins-good: Invalid memory read in flx_decode_chunks gstreamer-plugins-good: Heap buffer overflow in FLIC decoder
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
7.5
null
RHSA-2021:2416
Red Hat Security Advisory: dhcp security update
dhcp: stack-based buffer overflow when parsing statements with colon-separated hex digits in config or lease files in dhcpd and dhclient
[ "cpe:/o:redhat:rhel_eus:8.1::baseos" ]
null
8.8
null
null