id
stringlengths
13
15
title
stringlengths
29
176
description
stringlengths
8
32.1k
cpes
listlengths
0
20
cvss_v4_0
null
cvss_v3_1
float64
0
10
cvss_v3_0
float64
0
10
cvss_v2_0
null
RHSA-2021:0494
Red Hat Security Advisory: Red Hat JBoss Web Server 5.4.1 Security Update
openssl: EDIPARTYNAME NULL pointer de-reference tomcat: Apache Tomcat HTTP/2 Request mix-up tomcat: HTTP/2 request header mix-up tomcat: Information disclosure when using NTFS file system
[ "cpe:/a:redhat:jboss_enterprise_web_server:5.4::el7", "cpe:/a:redhat:jboss_enterprise_web_server:5.4::el8" ]
null
5.9
null
null
RHSA-2018:1202
Red Hat Security Advisory: java-1.8.0-oracle security update
OpenJDK: incorrect merging of sections in the JAR manifest (Security, 8189969) OpenJDK: unrestricted deserialization of data from JCEKS key stores (Security, 8189997) OpenJDK: insufficient consistency checks in deserialization of multiple classes (Security, 8189977) OpenJDK: unbounded memory allocation during deserialization in PriorityBlockingQueue (Concurrency, 8189981) OpenJDK: unbounded memory allocation during deserialization in TabularDataSupport (JMX, 8189985) OpenJDK: unbounded memory allocation during deserialization in Container (AWT, 8189989) OpenJDK: unbounded memory allocation during deserialization in NamedNodeMapImpl (JAXP, 8189993) OpenJDK: RMI HTTP transport enabled by default (RMI, 8193833) JDK: unspecified vulnerability fixed in 8u171 and 10.0.1 (Install) OpenJDK: incorrect handling of Reference clones can lead to sandbox bypass (Hotspot, 8192025) OpenJDK: unbounded memory allocation during deserialization in StubIORImpl (Serialization, 8192757)
[ "cpe:/a:redhat:rhel_extras_oracle_java:6" ]
null
null
5.3
null
RHSA-2025:1959
Red Hat Security Advisory: webkit2gtk3 security update
webkitgtk: Processing maliciously crafted web content may lead to memory corruption webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash
[ "cpe:/a:redhat:rhel_aus:8.4::appstream", "cpe:/a:redhat:rhel_e4s:8.4::appstream", "cpe:/a:redhat:rhel_tus:8.4::appstream" ]
null
8.8
null
null
RHSA-2014:1784
Red Hat Security Advisory: python-keystoneclient security and bug fix update
python-keystoneclient: TLS certificate verification disabled
[ "cpe:/a:redhat:openstack:5::el7" ]
null
null
null
null
RHSA-2009:1181
Red Hat Security Advisory: bind security and bug fix update
bind: DoS (assertion failure) via nsupdate packets
[ "cpe:/o:redhat:enterprise_linux:3::as", "cpe:/o:redhat:enterprise_linux:3::desktop", "cpe:/o:redhat:enterprise_linux:3::es", "cpe:/o:redhat:enterprise_linux:3::ws" ]
null
null
null
null
RHSA-2024:6235
Red Hat Security Advisory: Red Hat Trusted Profile Analyzer 1.1.2
nodejs-async: Regular expression denial of service while parsing function in autoinject
[ "cpe:/a:redhat:trusted_profile_analyzer:1.1::el9" ]
null
5.3
null
null
RHSA-2024:7505
Red Hat Security Advisory: firefox security update
firefox: thunderbird: Compromised content process can bypass site isolation firefox: thunderbird: Cross-origin access to PDF contents through multipart responses firefox: thunderbird: Cross-origin access to JSON contents through multipart responses firefox: thunderbird: Memory safety bugs fixed in Firefox 131, Firefox ESR 115.16, Firefox ESR 128.3, Thunderbird 131, and Thunderbird 128.3 firefox: thunderbird: Memory safety bugs fixed in Firefox 131, Firefox ESR 128.3, Thunderbird 131, and Thunderbird 128.3
[ "cpe:/a:redhat:enterprise_linux:9::appstream" ]
null
7.5
null
null
RHSA-2009:1339
Red Hat Security Advisory: rgmanager security, bug fix, and enhancement update
rgmanager: multiple insecure temporary file use issues
[ "cpe:/a:redhat:rhel_cluster:5" ]
null
null
null
null
RHSA-2017:0868
Red Hat Security Advisory: Red Hat JBoss Fuse/A-MQ 6.3 R2 security and bug fix update
jakarta-commons-httpclient: missing connection hostname check against X.509 certificate name elasticsearch: remote code execution via Groovy sandbox bypass ActiveMQ: DoS in client via shutdown command apache-cxf: XSS in Apache CXF FormattedServiceListWriter Groovy: Remote code execution via deserialization apache-cxf: Atom entity provider of Apache CXF JAX-RS is vulnerable to XXE Spark: Directory traversal vulnerability in version 2.5 swagger-ui: cross-site scripting in key names camel-snakeyaml: Unmarshalling operation is vulnerable to RCE
[ "cpe:/a:redhat:jboss_amq:6.3", "cpe:/a:redhat:jboss_fuse:6.3" ]
null
null
8.1
null
RHSA-2021:4619
Red Hat Security Advisory: freerdp security update
freerdp: improper client input validation for gateway connections allows to overwrite memory freerdp: improper region checks in all clients allow out of bound write to memory
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
8.8
null
null
RHSA-2024:3327
Red Hat Security Advisory: OpenShift Container Platform 4.15.15 security update
golang: net/http, x/net/http2: unlimited number of CONTINUATION frames causes DoS python-gunicorn: HTTP Request Smuggling due to improper validation of Transfer-Encoding headers jose-go: improper handling of highly compressed data
[ "cpe:/a:redhat:openshift:4.15::el8", "cpe:/a:redhat:openshift:4.15::el9" ]
null
4.3
7.5
null
RHSA-2020:3631
Red Hat Security Advisory: thunderbird security update
Mozilla: Attacker-induced prompt for extension installation Mozilla: Use-After-Free when aborting an operation
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
8.8
null
null
RHSA-2022:0500
Red Hat Security Advisory: .NET 6.0 on RHEL 7 security and bugfix update
dotnet: ASP.NET Core Krestel HTTP headers pooling denial of service
[ "cpe:/a:redhat:rhel_dotnet:6.0::el7" ]
null
7.5
null
null
RHSA-2023:6368
Red Hat Security Advisory: qemu-kvm security, bug fix, and enhancement update
QEMU: hcd-ehci: DMA reentrancy issue (incomplete fix for CVE-2021-3750)
[ "cpe:/a:redhat:enterprise_linux:9::appstream" ]
null
7.5
null
null
RHSA-2020:1352
Red Hat Security Advisory: qemu-kvm-ma security update
QEMU: block: iscsi: OOB heap access via an unexpected response of iSCSI Server QEMU: slirp: OOB buffer access while emulating tcp protocols in tcp_emu() QEMU: Slirp: potential OOB access due to unsafe snprintf() usages
[ "cpe:/o:redhat:rhel_eus:7.7::server" ]
null
5.6
null
null
RHSA-2023:1897
Red Hat Security Advisory: Red Hat Advanced Cluster Management 2.6 hotfix security update for console
vm2: sandbox escape vm2: Sandbox Escape vm2: Sandbox Escape when exception sanitization
[ "cpe:/a:redhat:acm:2.6::el8" ]
null
9.8
null
null
RHSA-2024:7700
Red Hat Security Advisory: firefox security update
firefox: Clipboard write permission bypass firefox: thunderbird: Compromised content process can bypass site isolation firefox: thunderbird: Cross-origin access to PDF contents through multipart responses firefox: thunderbird: Cross-origin access to JSON contents through multipart responses firefox: thunderbird: Potential memory corruption may occur when cloning certain objects firefox: thunderbird: Potential directory upload bypass via clickjacking firefox: thunderbird: External protocol handlers could be enumerated via popups firefox: thunderbird: Specially crafted WebTransport requests could lead to denial of service firefox: thunderbird: Potential memory corruption during JIT compilation firefox: thunderbird: Memory safety bugs fixed in Firefox 131, Firefox ESR 115.16, Firefox ESR 128.3, Thunderbird 131, and Thunderbird 128.3 firefox: thunderbird: Memory safety bugs fixed in Firefox 131, Firefox ESR 128.3, Thunderbird 131, and Thunderbird 128.3
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
7.5
null
null
RHSA-2022:6177
Red Hat Security Advisory: firefox security update
Mozilla: Address bar spoofing via XSLT error handling Mozilla: Cross-origin XSLT Documents would have inherited the parent's permissions Mozilla: Data race and potential use-after-free in PK11_ChangePW Mozilla: Memory safety bugs fixed in Firefox 104 and Firefox ESR 102.2 Mozilla: Memory safety bugs fixed in Firefox 104, Firefox ESR 102.2, and Firefox ESR 91.13
[ "cpe:/a:redhat:rhel_eus:8.2::appstream" ]
null
8.8
7.5
null
RHSA-2003:067
Red Hat Security Advisory: : Updated XFree86 packages provide security and bug fixes
security flaw security flaw security flaw security flaw security flaw
[ "cpe:/o:redhat:linux:8.0" ]
null
null
null
null
RHSA-2021:0319
Red Hat Security Advisory: Red Hat Single Sign-On 7.4.5 security update on RHEL 7
keycloak: Default Client configuration is vulnerable to SSRF using "request_uri" parameter
[ "cpe:/a:redhat:red_hat_single_sign_on:7::el7" ]
null
5.8
null
null
RHSA-2022:0289
Red Hat Security Advisory: parfait:0.5 security update
log4j: Remote code execution in Log4j 1.x when application is configured to use JMSAppender log4j: Remote code execution in Log4j 1.x when application is configured to use JMSSink log4j: SQL injection in Log4j 1.x when application is configured to use JDBCAppender log4j: Unsafe deserialization flaw in Chainsaw log viewer
[ "cpe:/a:redhat:rhel_eus:8.4::appstream" ]
null
8.8
null
null
RHSA-2008:0649
Red Hat Security Advisory: libxslt security update
libxslt: buffer overflow in libexslt RC4 encryption/decryption functions
[ "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws", "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::client_workstation", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
RHSA-2024:11293
Red Hat Security Advisory: Multicluster Engine for Kubernetes 2.6.4 security enhancements and bug fixes
opentelemetry-go-contrib: DoS vulnerability in otelgrpc due to unbound cardinality metrics path-to-regexp: Backtracking regular expressions cause ReDoS find-my-way: ReDoS vulnerability in multiparametric routes
[ "cpe:/a:redhat:multicluster_engine:2.6::el8", "cpe:/a:redhat:multicluster_engine:2.6::el9" ]
null
7.5
null
null
RHSA-2020:0606
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.2 security update
netty: HTTP request smuggling netty: HttpObjectDecoder.java allows Content-Length header to accompanied by second Content-Length header netty: HTTP Request Smuggling due to Transfer-Encoding whitespace mishandling
[ "cpe:/a:redhat:jboss_enterprise_application_platform:7.2" ]
null
7.5
null
null
RHSA-2021:0145
Red Hat Security Advisory: Red Hat OpenShift Serverless Client kn 1.12.0
golang: default Content-Type setting in net/http/cgi and net/http/fcgi could cause XSS golang: math/big: panic during recursive division of very large numbers golang: malicious symbol names can lead to code execution at build time golang: improper validation of cgo flags can lead to code execution at build time
[ "cpe:/a:redhat:serverless:1.0::el8" ]
null
7.5
null
null
RHSA-2025:3062
Red Hat Security Advisory: postgresql:12 security update
postgresql: PostgreSQL quoting APIs miss neutralizing quoting syntax in text that fails encoding validation
[ "cpe:/a:redhat:rhel_aus:8.4::appstream", "cpe:/a:redhat:rhel_e4s:8.4::appstream", "cpe:/a:redhat:rhel_tus:8.4::appstream" ]
null
8.1
null
null
RHSA-2008:0040
Red Hat Security Advisory: postgresql security update
dblink allows proxying of database connections via 127.0.0.1 postgresql integer overflow in regex code postgresql DoS via infinite loop in regex NFA optimization code postgresql: tempory DoS caused by slow regex NFA cleanup PostgreSQL privilege escalation PostgreSQL privilege escalation via dblink
[ "cpe:/a:redhat:rhel_application_stack:1", "cpe:/a:redhat:rhel_application_stack:2" ]
null
null
null
null
RHSA-2023:7378
Red Hat Security Advisory: fence-agents security update
python-certifi: Removal of e-Tugra root certificate python-urllib3: Cookie request header isn't stripped during cross-origin redirects
[ "cpe:/a:redhat:rhel_eus:9.2::appstream", "cpe:/a:redhat:rhel_eus:9.2::highavailability", "cpe:/a:redhat:rhel_eus:9.2::resilientstorage" ]
null
5.9
null
null
RHSA-2016:0006
Red Hat Security Advisory: samba security update
samba: Insufficient symlink verification in smbd samba: client requesting encryption vulnerable to downgrade attack Samba: Missing access control check in shadow copy code libldb: remote memory read in the Samba LDAP server
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
null
null
RHSA-2024:10385
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 8.0 update
Keycloak: Vulnerable Redirect URI Validation Results in Open Redirec
[ "cpe:/a:redhat:jboss_enterprise_application_platform:8.0" ]
null
6.1
null
null
RHSA-2021:2145
Red Hat Security Advisory: runc security update
runc: vulnerable to symlink exchange attack
[ "cpe:/a:redhat:rhel_extras_other:7" ]
null
7.5
null
null
RHSA-2024:3576
Red Hat Security Advisory: Red Hat build of Keycloak 24.0.5 Images enhancement and security update
keycloak: exposure of sensitive information in Pushed Authorization Requests (PAR) KC_RESTART cookie
[ "cpe:/a:redhat:build_keycloak:24::el9" ]
null
7.5
null
null
RHSA-2014:0124
Red Hat Security Advisory: Apache Camel security update
Camel: remote code execution via header field manipulation
[ "cpe:/a:redhat:jboss_fuse_service_works:6.0" ]
null
null
null
null
RHSA-2022:6783
Red Hat Security Advisory: Red Hat Single Sign-On 7.5.3 security update on RHEL 8
jackson-databind: denial of service via a large depth of nested objects h2: Remote Code Execution in Console netty: control chars in header names may lead to HTTP request smuggling xnio: org.xnio.StreamConnection.notifyReadClosed log to debug instead of stderr keycloak: Stored XSS in groups dropdown wildfly: Wildfly management of EJB Session context returns wrong caller principal with Elytron Security enabled keycloak: improper input validation permits script injection keycloak: Uploading of SAML javascript protocol mapper scripts through the admin console
[ "cpe:/a:redhat:red_hat_single_sign_on:7.5::el8" ]
null
6.4
null
null
RHSA-2006:0648
Red Hat Security Advisory: kdegraphics security update
security flaw security flaw security flaw Multiple libtiff flaws (CVE-2006-3460 CVE-2006-3461 CVE-2006-3462 CVE-2006-3463 CVE-2006-3464 CVE-2006-3465) Multiple libtiff flaws (CVE-2006-3460 CVE-2006-3461 CVE-2006-3462 CVE-2006-3463 CVE-2006-3464 CVE-2006-3465) Multiple libtiff flaws (CVE-2006-3460 CVE-2006-3461 CVE-2006-3462 CVE-2006-3463 CVE-2006-3464 CVE-2006-3465) Multiple libtiff flaws (CVE-2006-3460 CVE-2006-3461 CVE-2006-3462 CVE-2006-3463 CVE-2006-3464 CVE-2006-3465) Multiple libtiff flaws (CVE-2006-3460 CVE-2006-3461 CVE-2006-3462 CVE-2006-3463 CVE-2006-3464 CVE-2006-3465) Multiple libtiff flaws (CVE-2006-3460 CVE-2006-3461 CVE-2006-3462 CVE-2006-3463 CVE-2006-3464 CVE-2006-3465) Multiple libtiff flaws (CVE-2006-3460 CVE-2006-3461 CVE-2006-3462 CVE-2006-3463 CVE-2006-3464 CVE-2006-3465)
[ "cpe:/o:redhat:enterprise_linux:3::as", "cpe:/o:redhat:enterprise_linux:3::desktop", "cpe:/o:redhat:enterprise_linux:3::es", "cpe:/o:redhat:enterprise_linux:3::ws" ]
null
null
null
null
RHSA-2021:5184
Red Hat Security Advisory: OpenShift Container Platform 4.7.40 security update
log4j: Remote code execution in Log4j 1.x when application is configured to use JMSAppender kube-reporting/hive: Incomplete fix for log4j CVE-2021-44228 and CVE-2021-45046
[ "cpe:/a:redhat:openshift:4.7::el8" ]
null
8.1
null
null
RHSA-2023:3587
Red Hat Security Advisory: thunderbird security update
Mozilla: Click-jacking certificate exceptions through rendering lag Mozilla: Memory safety bugs fixed in Firefox 114 and Firefox ESR 102.12
[ "cpe:/a:redhat:enterprise_linux:9::appstream" ]
null
9.8
null
null
RHSA-2024:3669
Red Hat Security Advisory: less security update
less: OS command injection
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
8.6
null
null
RHSA-2021:0949
Red Hat Security Advisory: Red Hat OpenShift Do openshift/odo-init-image 1.1.3 security update
expat: large number of colons in input makes parser consume high amount of resources, leading to DoS e2fsprogs: Crafted ext4 partition leads to out-of-bounds write e2fsprogs: Out-of-bounds write in e2fsck/rehash.c curl: heap buffer overflow in function tftp_receive_packet() nss: Out-of-bounds read when importing curve25519 private key nss: PKCS#1 v1.5 signatures can be used for TLS 1.3 nss: Use-after-free in sftk_FreeSession due to improper refcounting glib2: file_copy_fallback in gio/gfile.c in GNOME GLib does not properly restrict file permissions while a copy operation is in progress dbus: DBusServer DBUS_COOKIE_SHA1 authentication bypass ibus: missing authorization allows local attacker to access the input bus of another user cpio: improper input validation when writing tar header fields leads to unexpected tar generation expat: heap-based buffer over-read via crafted XML input python: XSS vulnerability in the documentation XML-RPC server in server_title field nss: Check length of inputs for cryptographic primitives nss: TLS 1.3 HelloRetryRequest downgrade request sets client into invalid state libssh2: integer overflow in SSH_MSG_DISCONNECT logic in packet.c glibc: LD_PREFER_MAP_32BIT_EXEC not ignored in setuid binaries libxml2: memory leak in xmlParseBalancedChunkMemoryRecover in parser.c systemd: memory leak in button_open() in login/logind-button.c when udev events are received libxml2: memory leak in xmlSchemaPreRun in xmlschemas.c python: infinite loop in the tarfile module via crafted TAR archive glibc: buffer over-read in iconv when processing invalid multi-byte input sequences in the EUC-KR encoding openssl: EDIPARTYNAME NULL pointer de-reference nss: Side channel attack on ECDSA signature generation libxml2: infinite loop in xmlStringLenDecodeEntities in some end-of-file situations curl: Incorrect argument check can allow remote servers to overwrite local files glibc: stack corruption from crafted input in cosl, sinl, sincosl, and tanl functions openldap: denial of service via nested boolean expressions in LDAP search filters nss: P-384 and P-521 implementation uses a side-channel vulnerable modular inversion function nss: ECDSA timing attack mitigation bypass nss: Side channel vulnerabilities during RSA key generation nss: CHACHA20-POLY1305 decryption with undersized tag leads to out-of-bounds read glibc: stack-based buffer overflow if the input to any of the printf family of functions is an 80-bit long double with a non-canonical bit pattern
[ "cpe:/a:redhat:openshift_do:1.0::el7" ]
null
7.5
2.9
null
RHSA-2012:0716
Red Hat Security Advisory: bind security update
bind: deleted domain name resolving flaw bind: handling of zero length rdata can cause named to terminate unexpectedly
[ "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::client_workstation", "cpe:/o:redhat:enterprise_linux:5::server", "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
null
null
RHSA-2021:0055
Red Hat Security Advisory: firefox security update
Mozilla: Use-after-free write when handling a malicious COOKIE-ECHO SCTP chunk
[ "cpe:/a:redhat:rhel_eus:8.2::appstream" ]
null
null
8.8
null
RHSA-2016:0532
Red Hat Security Advisory: krb5 security update
krb5: xdr_nullstring() doesn't check for terminating null character krb5: krb5 doesn't check for null policy when KADM5_POLICY is set in the mask krb5: Memory leak caused by supplying a null principal name in request
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
null
null
RHSA-2017:1101
Red Hat Security Advisory: nss security update
nss: Write beyond bounds caused by bugs in Base64 de/encoding in nssb64d.c and nssb64e.c (MFSA 2017-10)
[ "cpe:/o:redhat:rhel_els:5" ]
null
null
9.8
null
RHSA-2020:4320
Red Hat Security Advisory: OpenShift Container Platform 4.5.16 security update
openshift: restricted SCC allows pods to craft custom network packets
[ "cpe:/a:redhat:openshift:4.5::el7" ]
null
3.1
null
null
RHSA-2021:5129
Red Hat Security Advisory: Openshift Logging security and bug update (5.3.1)
netty: Request smuggling via content-length header netty-codec: Bzip2Decoder doesn't allow setting size restrictions for decompressed data netty-codec: SnappyFrameDecoder doesn't restrict chunk length and may buffer skippable chunks in an unnecessary way log4j-core: Remote code execution in Log4j 2.x when logs contain an attacker-controlled string value log4j-core: DoS in log4j 2.x with thread context message pattern and context lookup pattern (incomplete fix for CVE-2021-44228)
[ "cpe:/a:redhat:logging:5.3::el8" ]
null
8.1
null
null
RHSA-2024:8077
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.4.19 Security update
OpenJDK: integer truncation issue in Xalan-J (JAXP, 8285407) jsoup: The jsoup cleaner may incorrectly sanitize crafted XSS attempts if SafeList.preserveRelativeLinks is enabled jose4j: denial of service via specially crafted JWE wildfly: No timeout for EAP management interface may lead to Denial of Service (DoS) braces: fails to limit the number of characters it can handle
[ "cpe:/a:redhat:jboss_enterprise_application_platform:7.4::el9" ]
null
7.5
null
null
RHSA-2004:432
Red Hat Security Advisory: acroread security update
security flaw security flaw
[ "cpe:/a:redhat:rhel_extras:3" ]
null
null
null
null
RHSA-2018:3432
Red Hat Security Advisory: glusterfs security and bug fix update
glusterfs: glusterfs server exploitable via symlinks to relative paths glusterfs: Buffer overflow in "features/locks" translator allows for denial of service glusterfs: Heap-based buffer overflow via "gf_getspec_req" RPC message glusterfs: "features/index" translator can create arbitrary, empty files glusterfs: Unlimited file creation via "GF_XATTR_IOSTATS_DUMP_KEY" xattr allows for denial of service glusterfs: Repeat use of "GF_META_LOCK_KEY" xattr allows for memory exhaustion glusterfs: features/locks translator passes an user-controlled string to snprintf without a proper format string resulting in a denial of service
[ "cpe:/a:redhat:storage:3.4:server:el7", "cpe:/a:redhat:storage:3:client:el7", "cpe:/o:redhat:enterprise_linux:7::hypervisor" ]
null
null
6.5
null
RHSA-2024:0107
Red Hat Security Advisory: nss security update
nss: timing attack against RSA decryption
[ "cpe:/a:redhat:rhel_eus:9.2::appstream" ]
null
6.5
null
null
RHSA-2022:5633
Red Hat Security Advisory: kernel-rt security and bug fix update
kernel: the copy-on-write implementation can grant unintended write access because of a race condition in a THP mapcount check kernel: cgroup: Use open-time creds and namespace for migration perm checks kernel: Race condition in races in sk_peer_pid and sk_peer_cred accesses kernel: Small table perturb size in the TCP source port generation algorithm can lead to information leak kernel: race condition in perf_event_open leads to privilege escalation kernel: a use-after-free write in the netfilter subsystem can lead to privilege escalation to root
[ "cpe:/a:redhat:rhel_eus:8.4::nfv", "cpe:/a:redhat:rhel_eus:8.4::realtime" ]
null
7.8
null
null
RHSA-2023:0123
Red Hat Security Advisory: kpatch-patch security update
kernel: memory corruption in AX88179_178A based USB ethernet device. kernel: i915: Incorrect GPU TLB flush can lead to random memory access
[ "cpe:/o:redhat:enterprise_linux:8::baseos" ]
null
7
null
null
RHSA-2024:0215
Red Hat Security Advisory: Red Hat OpenStack Platform 17.1 (GitPython) security update
GitPython: Blind local file inclusion
[ "cpe:/a:redhat:openstack:17.1::el9" ]
null
5.1
null
null
RHSA-2023:0496
Red Hat Security Advisory: kernel security and bug fix update
kernel: memory corruption in AX88179_178A based USB ethernet device. kernel: i915: Incorrect GPU TLB flush can lead to random memory access
[ "cpe:/a:redhat:rhel_eus:8.4::crb", "cpe:/o:redhat:rhel_eus:8.4::baseos" ]
null
7
null
null
RHSA-2023:4957
Red Hat Security Advisory: firefox security update
Mozilla: Full screen notification obscured by file open dialog Mozilla: Full screen notification obscured by external program Mozilla: Memory corruption in IPC CanvasTranslator Mozilla: Memory corruption in IPC ColorPickerShownCallback Mozilla: Memory corruption in IPC FilePickerShownCallback Mozilla: Memory corruption in JIT UpdateRegExpStatics Mozilla: Error reporting methods in SpiderMonkey could have triggered an Out of Memory Exception Mozilla: Push notifications saved to disk unencrypted Mozilla: XLL file extensions were downloadable without warnings Mozilla: Browsing Context potentially not cleared when closing Private Window Mozilla: Memory safety bugs fixed in Firefox 117, Firefox ESR 102.15, Firefox ESR 115.2, Thunderbird 102.15, and Thunderbird 115.2 Mozilla: Memory safety bugs fixed in Firefox 117, Firefox ESR 115.2, and Thunderbird 115.2
[ "cpe:/a:redhat:rhel_aus:8.4::appstream", "cpe:/a:redhat:rhel_e4s:8.4::appstream", "cpe:/a:redhat:rhel_tus:8.4::appstream" ]
null
8.8
null
null
RHSA-2024:3269
Red Hat Security Advisory: glibc security update
glibc: Out of bounds write in iconv may lead to remote code execution
[ "cpe:/a:redhat:enterprise_linux:8::appstream", "cpe:/a:redhat:enterprise_linux:8::crb", "cpe:/o:redhat:enterprise_linux:8::baseos" ]
null
8.8
null
null
RHSA-2022:0203
Red Hat Security Advisory: Red Hat Fuse 7.8-7.10 security update
log4j-core: Remote code execution in Log4j 2.x when logs contain an attacker-controlled string value log4j-core: remote code execution via JDBC Appender log4j-core: DoS in log4j 2.x with thread context message pattern and context lookup pattern (incomplete fix for CVE-2021-44228) log4j-core: DoS in log4j 2.x with Thread Context Map (MDC) input data contains a recursive lookup and context lookup pattern
[ "cpe:/a:redhat:jboss_fuse:7" ]
null
5.9
null
null
RHSA-2019:1862
Red Hat Security Advisory: Red Hat OpenShift Enterprise one-month end-of-life notice
This is the one-month notification for the end of the maintenance phase for Red Hat OpenShift Enterprise 3.6 and 3.7. This notification applies only to customers with subscriptions for Red Hat OpenShift Enterprise 3.6 and 3.7.
[ "cpe:/a:redhat:openshift:3.6::el7", "cpe:/a:redhat:openshift:3.7::el7" ]
null
null
null
null
RHSA-2023:5603
Red Hat Security Advisory: kernel-rt security and bug fix update
kernel: hash collisions in the IPv6 connection lookup table kernel: Spectre v2 SMT mitigations problem kernel: fbcon: shift-out-of-bounds in fbcon_set_font() kernel: net/sched: Use-after-free vulnerabilities in the net/sched classifiers: cls_fw, cls_u32 and cls_route kernel: denial of service problem in net/unix/diag.c kernel: nf_tables: use-after-free in nft_chain_lookup_byid() kernel: nf_tables: stack-out-of-bounds-read in nft_byteorder_eval() kernel: cls_flower: out-of-bounds write in fl_set_geneve_opt()
[ "cpe:/a:redhat:rhel_eus:9.0::nfv", "cpe:/a:redhat:rhel_eus:9.0::realtime" ]
null
7.8
5.6
null
RHSA-2017:0386
Red Hat Security Advisory: kernel security, bug fix, and enhancement update
kernel: kvm: x86: NULL pointer dereference during instruction decode kernel: Race condition in packet_set_ring leads to use after free kernel: State machine confusion bug in vfio driver leading to memory corruption kernel: Integer overflow when using kzalloc in vfio driver
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
5.3
null
RHSA-2022:1821
Red Hat Security Advisory: python27:2.7 security update
python: urllib: Regular expression DoS in AbstractBasicAuthHandler python: urllib: HTTP client possible infinite loop on a 100 Continue response python: ftplib should not use the host from the PASV response python-lxml: HTML Cleaner allows crafted and SVG embedded scripts to pass through python: urllib.parse does not sanitize URLs containing ASCII newline and tabs
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
5.3
null
null
RHSA-2013:0271
Red Hat Security Advisory: firefox security update
Mozilla: Use-after-free in nsImageLoadingContent (MFSA 2013-26) Mozilla: Phishing on HTTPS connection through malicious proxy (MFSA 2013-27) Mozilla: Use-after-free, out of bounds read, and buffer overflow issues found using Address Sanitizer (MFSA 2013-28) Mozilla: Use-after-free, out of bounds read, and buffer overflow issues found using Address Sanitizer (MFSA 2013-28) Mozilla: Miscellaneous memory safety hazards (rv:17.0.3) (MFSA 2013-21)
[ "cpe:/o:redhat:enterprise_linux:5::server", "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
null
null
RHSA-2015:0917
Red Hat Security Advisory: Red Hat Satellite Server 5 - 30 Day End Of Life Notice
This is the 30 day notification of the End Of Life (EOL) plans for the following versions of Red Hat Satellite 5: * Red Hat Satellite 5.2 * Red Hat Satellite 5.3 * Red Hat Satellite 5.4 * Red Hat Satellite 5.5
[ "cpe:/a:redhat:network_satellite:5.2::el5", "cpe:/a:redhat:network_satellite:5.3::el5", "cpe:/a:redhat:network_satellite:5.4::el5", "cpe:/a:redhat:network_satellite:5.4::el6", "cpe:/a:redhat:network_satellite:5.5::el5", "cpe:/a:redhat:network_satellite:5.5::el6" ]
null
null
null
null
RHSA-2021:1775
Red Hat Security Advisory: pki-core:10.6 and pki-deps:10.6 security, bug fix, and enhancement update
resteasy: Improper validation of response header in MediaTypeHeaderDelegate.java class
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
null
7.5
null
RHSA-2013:1605
Red Hat Security Advisory: glibc security, bug fix, and enhancement update
glibc: Buffer overrun (DoS) in regexp matcher by processing multibyte characters glibc: Stack (frame) overflow in getaddrinfo() when processing entry mapping to long list of address structures glibc: three integer overflows in memory allocator
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
null
null
RHSA-2011:1088
Red Hat Security Advisory: systemtap security update
systemtap: insufficient security check when loading uprobes kernel module systemtap: signed module loading race condition
[ "cpe:/o:redhat:enterprise_linux:6::server" ]
null
null
null
null
RHSA-2023:0623
Red Hat Security Advisory: tigervnc security update
xorg-x11-server: DeepCopyPointerClasses use-after-free leads to privilege elevation
[ "cpe:/a:redhat:rhel_eus:9.0::appstream" ]
null
7.8
null
null
RHSA-2022:8902
Red Hat Security Advisory: Red Hat Camel for Spring Boot 3.18.3 release and security update
sdk-server: Denial of Service reactor-netty-http: Log request headers in some cases of invalid HTTP requests apache-commons-text: variable interpolation RCE
[ "cpe:/a:redhat:camel_spring_boot:3.18.3" ]
null
9.8
null
null
RHSA-2020:4283
Red Hat Security Advisory: openstack-cinder security update
openstack-cinder: Improper handling of ScaleIO backend credentials
[ "cpe:/a:redhat:openstack:16.1::el8" ]
null
6.5
null
null
RHSA-2024:9555
Red Hat Security Advisory: NetworkManager-libreswan security update
NetworkManager-libreswan: Local privilege escalation via leftupdown
[ "cpe:/a:redhat:enterprise_linux:9::appstream" ]
null
7.8
null
null
RHSA-2022:8685
Red Hat Security Advisory: kernel security and bug fix update
kernel: KVM: cmpxchg_gpte can write to pfns outside the userspace region
[ "cpe:/a:redhat:rhel_eus:8.4::crb", "cpe:/o:redhat:rhel_eus:8.4::baseos" ]
null
7
null
null
RHSA-2023:4531
Red Hat Security Advisory: kpatch-patch security update
kernel: use-after-free in l2cap_connect and l2cap_le_connect_req in net/bluetooth/l2cap_core.c kernel: tcindex: use-after-free vulnerability in traffic control index filter allows privilege escalation kernel: Use-after-free vulnerability in the Linux Kernel traffic control index filter
[ "cpe:/o:redhat:enterprise_linux:8::baseos" ]
null
7.4
null
null
RHSA-2024:6882
Red Hat Security Advisory: Red Hat Single Sign-On 7.6.11 for OpenShift image enhancement update
keycloak-saml-core: Improper Verification of SAML Responses Leading to Privilege Escalation in Keycloak Keycloak: Vulnerable Redirect URI Validation Results in Open Redirec
[ "cpe:/a:redhat:rhosemc:1.0::el8" ]
null
6.1
null
null
RHSA-2023:5956
Red Hat Security Advisory: Red Hat Build of OptaPlanner 8.38.0 SP2 security update
HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack)
[ "cpe:/a:redhat:optaplanner:::el6" ]
null
7.5
null
null
RHSA-2023:6199
Red Hat Security Advisory: firefox security update
Mozilla: Queued up rendering could have allowed websites to clickjack Mozilla: Large WebGL draw could have led to a crash Mozilla: WebExtensions could open arbitrary URLs Mozilla: Improper object tracking during GC in the JavaScript engine could have led to a crash. Mozilla: Memory safety bugs fixed in Firefox 119, Firefox ESR 115.4, and Thunderbird 115.4 Mozilla: Address bar spoofing via bidirectional characters libvpx: crash related to VP9 encoding in libvpx
[ "cpe:/a:redhat:rhel_eus:9.0::appstream" ]
null
7.5
null
null
RHSA-2015:1766
Red Hat Security Advisory: python-django security update
python-django: Denial-of-service possibility in logout() view by filling session store python-django: Denial-of-service possibility in logout() view by filling session store
[ "cpe:/a:redhat:openstack:5::el6" ]
null
null
null
null
RHSA-2024:1106
Red Hat Security Advisory: fwupd security update
fwupd: world readable password in /etc/fwupd/redfish.conf
[ "cpe:/a:redhat:rhel_eus:8.6::crb", "cpe:/o:redhat:rhel_eus:8.6::baseos" ]
null
5.5
null
null
RHSA-2021:2021
Red Hat Security Advisory: Release of OpenShift Serverless 1.10.2 security update
golang: crypto/elliptic: incorrect operations on the P-224 curve golang: cmd/go: packages using cgo can cause arbitrary code execution at build time
[ "cpe:/a:redhat:serverless:1.10::el8" ]
null
7.5
null
null
RHSA-2005:332
Red Hat Security Advisory: xloadimage security update
security flaw
[ "cpe:/o:redhat:enterprise_linux:3::as", "cpe:/o:redhat:enterprise_linux:3::desktop", "cpe:/o:redhat:enterprise_linux:3::es", "cpe:/o:redhat:enterprise_linux:3::ws", "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws" ]
null
null
null
null
RHSA-2023:6783
Red Hat Security Advisory: Node Health Check Operator 0.4.1
golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487) HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack)
[ "cpe:/a:redhat:workload_availability_node_healthcheck:0.4::el8" ]
null
7.5
null
null
RHSA-2011:0930
Red Hat Security Advisory: NetworkManager security update
NetworkManager: Did not honour PolicyKit auth_admin action element by creation of Ad-Hoc wireless networks
[ "cpe:/o:redhat:enterprise_linux:6::server" ]
null
null
null
null
RHSA-2006:0579
Red Hat Security Advisory: kernel security update
security flaw security flaw security flaw security flaw security flaw security flaw security flaw
[ "cpe:/o:redhat:enterprise_linux:2.1::as", "cpe:/o:redhat:enterprise_linux:2.1::es", "cpe:/o:redhat:enterprise_linux:2.1::ws" ]
null
null
null
null
RHSA-2020:4483
Red Hat Security Advisory: opensc security, bug fix, and enhancement update
opensc: Out-of-bounds access of an ASN.1 Bitstring in decode_bit_string in libopensc/asn1.c opensc: Out-of-bounds access of an ASN.1 Octet string in asn1_decode_entry in libopensc/asn1.c opensc: Incorrect read operation during parsing of a SETCOS file attribute opensc: Improper handling of buffer limits for CAC certificates opensc: Double free in coolkey_free_private_data in libopensc/card-coolkey.c
[ "cpe:/o:redhat:enterprise_linux:8::baseos" ]
null
6.4
null
null
RHSA-2013:1409
Red Hat Security Advisory: xinetd security update
xinetd: ignores user and group directives for tcpmux services
[ "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::server", "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
null
null
RHSA-2010:0580
Red Hat Security Advisory: tomcat5 security update
tomcat: unexpected file deletion and/or alteration tomcat: missing fix for CVE-2009-0781 tomcat: unexpected file deletion in work directory tomcat: information leak vulnerability in the handling of 'Transfer-Encoding' header
[ "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::client_workstation", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
RHSA-2023:4126
Red Hat Security Advisory: kernel-rt security and bug fix update
kernel: net/ulp: use-after-free in listening ULP sockets kernel: tcindex: use-after-free vulnerability in traffic control index filter allows privilege escalation kernel: remote DoS in TIPC kernel module kernel: netfilter: use-after-free in nf_tables when processing batch requests can lead to privilege escalation
[ "cpe:/a:redhat:rhel_tus:8.2::nfv", "cpe:/a:redhat:rhel_tus:8.2::realtime" ]
null
7.8
null
null
RHSA-2023:0852
Red Hat Security Advisory: httpd:2.4 security and bug fix update
httpd: mod_dav: out-of-bounds read/write of zero byte httpd: mod_proxy_ajp: Possible request smuggling httpd: mod_proxy: HTTP response splitting
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
5.3
null
null
RHSA-2023:4037
Red Hat Security Advisory: bind9.16 security update
bind: named's configured cache size limit can be significantly exceeded
[ "cpe:/a:redhat:rhel_eus:8.6::appstream", "cpe:/a:redhat:rhel_eus:8.6::crb" ]
null
7.5
null
null
RHSA-2024:10665
Red Hat Security Advisory: ACS 4.4 enhancement and security update
cross-spawn: regular expression denial of service
[ "cpe:/a:redhat:advanced_cluster_security:4.4::el8" ]
null
4.4
null
null
RHSA-2021:4913
Red Hat Security Advisory: mailman security update
mailman: CSRF protection missing in the user options page mailman: CSRF token bypass allows to perform CSRF attacks and account takeover mailman: CSRF token bypass allows to perform CSRF attacks and admin takeover
[ "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
8
6.5
null
RHSA-2023:2519
Red Hat Security Advisory: samba security, bug fix, and enhancement update
samba: GnuTLS gnutls_rnd() can fail and give predictable random values
[ "cpe:/a:redhat:enterprise_linux:9::appstream", "cpe:/a:redhat:enterprise_linux:9::crb", "cpe:/a:redhat:enterprise_linux:9::resilientstorage", "cpe:/o:redhat:enterprise_linux:9::baseos" ]
null
5.1
null
null
RHSA-2005:506
Red Hat Security Advisory: mikmod security update
security flaw
[ "cpe:/o:redhat:enterprise_linux:3::as", "cpe:/o:redhat:enterprise_linux:3::desktop", "cpe:/o:redhat:enterprise_linux:3::es", "cpe:/o:redhat:enterprise_linux:3::ws", "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws" ]
null
null
null
null
RHSA-2009:0015
Red Hat Security Advisory: java-1.6.0-ibm security update
Java Web Start File Inclusion via System Properties Override JavaWebStart allows unauthorized network connections Java WebStart unprivileged local file and network access JRE allows unauthorized file access and connections to localhost OpenJDK applet privilege escalation via JAX package access (6592792) OpenJDK Denial-Of-Service in kerberos authentication (6588160) OpenJDK allows to list files within the user home directory (6484091) OpenJDK Jar200 Decompression buffer overflow (6755943) OpenJDK calendar object deserialization allows privilege escalation (6734167) OpenJDK Privilege escalation in command line applications (6733959) OpenJDK Buffer overflow in image processing (6726779) OpenJDK temporary files have guessable file names (6721753)
[ "cpe:/a:redhat:rhel_extras:4", "cpe:/a:redhat:rhel_extras:5::client", "cpe:/a:redhat:rhel_extras:5::server" ]
null
null
null
null
RHSA-2021:0028
Red Hat Security Advisory: Red Hat Virtualization security, bug fix, and enhancement update
lldpd: buffer overflow in the lldp_decode function in daemon/protocols/lldp.c
[ "cpe:/a:redhat:rhev_manager:4.3", "cpe:/o:redhat:enterprise_linux:7::hypervisor" ]
null
9.8
null
null
RHSA-2020:2285
Red Hat Security Advisory: kernel security update
kernel: double free may be caused by the function allocate_trace_buffer in the file kernel/trace/trace.c kernel: use-after-free in __blk_add_trace in kernel/trace/blktrace.c Kernel: NetLabel: null pointer dereference while receiving CIPSO packet with null category may cause kernel panic
[ "cpe:/o:redhat:rhel_aus:7.2::server" ]
null
5.9
null
null
RHSA-2022:6518
Red Hat Security Advisory: rh-mysql80-mysql security, bug fix, and enhancement update
mysql: Server: DML unspecified vulnerability (CPU Oct 2021) mysql: Server: DML unspecified vulnerability (CPU Oct 2021) mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2021) mysql: Server: Replication unspecified vulnerability (CPU Oct 2021) mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2021) mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2021) mysql: Server: DML unspecified vulnerability (CPU Oct 2021) mysql: Server: Error Handling unspecified vulnerability (CPU Oct 2021) mysql: C API unspecified vulnerability (CPU Oct 2021) mysql: Server: Options unspecified vulnerability (CPU Oct 2021) mysql: InnoDB unspecified vulnerability (CPU Oct 2021) mysql: Server: DML unspecified vulnerability (CPU Oct 2021) mysql: Server: Group Replication Plugin unspecified vulnerability (CPU Oct 2021) mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2021) mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2021) mysql: Server: Security: Encryption unspecified vulnerability (CPU Oct 2021) mysql: Server: Security: Roles unspecified vulnerability (CPU Oct 2021) mysql: Server: Security: Privileges unspecified vulnerability (CPU Oct 2021) mysql: Server: Security: Privileges unspecified vulnerability (CPU Oct 2021) mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2021) mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2021) mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2021) mysql: Server: Options unspecified vulnerability (CPU Oct 2021) mysql: Server: GIS unspecified vulnerability (CPU Oct 2021) mysql: Server: Data Dictionary unspecified vulnerability (CPU Oct 2021) mysql: Server: Logging unspecified vulnerability (CPU Oct 2021) mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2021) mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2021) mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2021) mysql: Server: PS unspecified vulnerability (CPU Oct 2021) mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2021) mysql: Server: Stored Procedure unspecified vulnerability (CPU Oct 2021) mysql: Server: DDL unspecified vulnerability (CPU Oct 2021) mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2021) mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2021) mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2021) mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2021) mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2021) mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2021) mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2021) mysql: Server: FTS unspecified vulnerability (CPU Oct 2021) mysql: Server: Security: Privileges unspecified vulnerability (CPU Jan 2022) mysql: Server: DDL unspecified vulnerability (CPU Jan 2022) mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2022) mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2022) mysql: Server: Group Replication Plugin unspecified vulnerability (CPU Jan 2022) mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2022) mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2022) mysql: Server: Federated unspecified vulnerability (CPU Jan 2022) mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2022) mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2022) mysql: Server: DML unspecified vulnerability (CPU Jan 2022) mysql: InnoDB unspecified vulnerability (CPU Jan 2022) mysql: Server: Stored Procedure unspecified vulnerability (CPU Jan 2022) mysql: Server: Parser unspecified vulnerability (CPU Jan 2022) mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2022) mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2022) mysql: Server: Replication unspecified vulnerability (CPU Jan 2022) mysql: InnoDB unspecified vulnerability (CPU Jan 2022) mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2022) mysql: InnoDB unspecified vulnerability (CPU Jan 2022) mysql: Server: Security: Encryption unspecified vulnerability (CPU Jan 2022) mysql: Server: Information Schema unspecified vulnerability (CPU Jan 2022) mysql: Server: Compiling unspecified vulnerability (CPU Jan 2022) mysql: Server: Components Services unspecified vulnerability (CPU Jan 2022) mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2022) mysql: Server: Security: Encryption unspecified vulnerability (CPU Jan 2022) mysql: Server: Information Schema unspecified vulnerability (CPU Jan 2022) mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2022) mysql: Server: Group Replication Plugin unspecified vulnerability (CPU Jan 2022) mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2022) mysql: Server: DML unspecified vulnerability (CPU Apr 2022) mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2022) mysql: Server: Replication unspecified vulnerability (CPU Apr 2022) mysql: InnoDB unspecified vulnerability (CPU Apr 2022) mysql: InnoDB unspecified vulnerability (CPU Apr 2022) mysql: InnoDB unspecified vulnerability (CPU Apr 2022) mysql: Server: DDL unspecified vulnerability (CPU Apr 2022) mysql: Server: FTS unspecified vulnerability (CPU Apr 2022) mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2022) mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2022) mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2022) mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2022) mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2022) mysql: Server: DDL unspecified vulnerability (CPU Apr 2022) mysql: InnoDB unspecified vulnerability (CPU Apr 2022) mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2022) mysql: Server: Group Replication Plugin unspecified vulnerability (CPU Apr 2022) mysql: Server: PAM Auth Plugin unspecified vulnerability (CPU Jul 2022) mysql: Server: PAM Auth Plugin unspecified vulnerability (CPU Apr 2022) mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2022) mysql: Server: Logging unspecified vulnerability (CPU Apr 2022) mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2022) mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2022) mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2022) mysql: Server: Optimizer unspecified vulnerability (CPU Jul 2022) mysql: Server: Options unspecified vulnerability (CPU Jul 2022) mysql: InnoDB unspecified vulnerability (CPU Jul 2022) mysql: Server: Stored Procedure unspecified vulnerability (CPU Jul 2022) mysql: Server: Optimizer unspecified vulnerability (CPU Jul 2022) mysql: Server: Optimizer unspecified vulnerability (CPU Jul 2022) mysql: Server: Optimizer unspecified vulnerability (CPU Jul 2022) mysql: Server: Optimizer unspecified vulnerability (CPU Jul 2022) mysql: Server: Optimizer unspecified vulnerability (CPU Jul 2022) mysql: Server: Optimizer unspecified vulnerability (CPU Jul 2022) mysql: Server: Optimizer unspecified vulnerability (CPU Jul 2022) mysql: Server: Stored Procedure unspecified vulnerability (CPU Jul 2022) mysql: InnoDB unspecified vulnerability (CPU Jul 2022) mysql: Server: Security: Encryption unspecified vulnerability (CPU Jul 2022) mysql: InnoDB unspecified vulnerability (CPU Jul 2022) mysql: Server: Federated unspecified vulnerability (CPU Jul 2022) mysql: Server: Optimizer unspecified vulnerability (CPU Jul 2022) mysql: Server: Optimizer unspecified vulnerability (CPU Jul 2022) mysql: Server: Optimizer unspecified vulnerability (CPU Jul 2022) mysql: Server: Security: Encryption unspecified vulnerability (CPU Oct 2022) mysql: C API unspecified vulnerability (CPU Oct 2022) mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2022) mysql: Server: Data Dictionary unspecified vulnerability (CPU Oct 2022) mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2022) mysql: InnoDB unspecified vulnerability (CPU Oct 2022) mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2022) mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2022) mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2023) mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2023) mysql: Server: Replication unspecified vulnerability (CPU Jul 2023)
[ "cpe:/a:redhat:rhel_software_collections:3::el7" ]
null
4.9
null
null
RHSA-2014:0981
Red Hat Security Advisory: kernel security, bug fix, and enhancement update
Kernel: futex: forbid uaddr == uaddr2 in futex_wait_requeue_pi() kernel: net: rds: dereference of a NULL device in rds_ib_laddr_check() kernel: ath9k: tid->sched race in ath_tx_aggr_sleep() kernel: net: rds: dereference of a NULL device in rds_iw_laddr_check() Kernel: net: mac80211: crash dues to AP powersave TX vs. wakeup race kernel: net: ping: refcount issue in ping_init_sock() function Kernel: filter: prevent nla extensions to peek beyond the end of the message Kernel: filter: prevent nla extensions to peek beyond the end of the message
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
null
null
RHSA-2024:3043
Red Hat Security Advisory: ansible-core bug fix, enhancement, and security update
ansible-core: possible information leak in tasks that ignore ANSIBLE_NO_LOG configuration
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
5
null
null
RHSA-2024:4447
Red Hat Security Advisory: kernel security update
kernel: net/sched: act_skbmod: Skip non-Ethernet packets kernel: net: ti: fix UAF in tlan_remove_one kernel: KVM: NULL pointer dereference in kvm_mmu_invpcid_gva kernel: tls: race between async notify and socket close kernel: tls: handle backlogging of crypto requests kernel: tls: race between tx work scheduling and socket close kernel: ipv6: sr: fix possible use-after-free and null-ptr-deref kernel: Bluetooth: Avoid potential use-after-free in hci_error_reset kernel: net: ip_tunnel: prevent perpetual headroom growth kernel: netfilter: nf_tables: use timestamp to check for set element timeout kernel: net: ena: Fix incorrect descriptor free behavior kernel: ipv6: fix race condition between ipv6_get_ifaddr and ipv6_del_addr kernel: netfilter: nf_tables: honor table dormant flag from netdev release event path kernel: TIPC message reassembly use-after-free remote code execution vulnerability kernel: scsi: lpfc: Move NPIV's transport unregistration to after resource clean up
[ "cpe:/o:redhat:rhel_aus:8.6::baseos", "cpe:/o:redhat:rhel_e4s:8.6::baseos", "cpe:/o:redhat:rhel_tus:8.6::baseos" ]
null
4.4
null
null
RHSA-2024:5240
Red Hat Security Advisory: Red Hat JBoss Core Services Apache HTTP Server 2.4.57 SP5 security update
httpd: Encoding problem in mod_proxy httpd: Substitution encoding issue in mod_rewrite httpd: Improper escaping of output in mod_rewrite httpd: Security issues via backend applications whose response headers are malicious or exploitable httpd: NULL pointer dereference in mod_proxy httpd: Potential SSRF in mod_rewrite
[ "cpe:/a:redhat:jboss_core_services:1" ]
null
7.4
null
null
RHSA-2012:1165
Red Hat Security Advisory: JBoss Enterprise BRMS Platform 5.3.0 update
CSRF on jmx-console allows invocation of operations on mbeans
[ "cpe:/a:redhat:jboss_enterprise_brms_platform:5.3" ]
null
null
null
null