id
stringlengths
13
15
title
stringlengths
29
176
description
stringlengths
8
32.1k
cpes
listlengths
0
20
cvss_v4_0
null
cvss_v3_1
float64
0
10
cvss_v3_0
float64
0
10
cvss_v2_0
null
RHSA-2023:4169
Red Hat Security Advisory: java-17-openjdk security update
OpenJDK: HTTP client insufficient file name validation (8302475) OpenJDK: ZIP file parsing infinite loop (8302483) OpenJDK: weakness in AES implementation (8308682) OpenJDK: modulo operator array indexing issue (8304460) OpenJDK: array indexing integer overflow issue (8304468) OpenJDK: improper handling of slash characters in URI-to-path conversion (8305312) harfbuzz: allows attackers to trigger O(n^2) growth via consecutive marks
[ "cpe:/a:redhat:rhel_eus:9.0::appstream", "cpe:/a:redhat:rhel_eus:9.0::crb" ]
null
7.5
null
null
RHSA-2025:1958
Red Hat Security Advisory: webkit2gtk3 security update
webkitgtk: Processing maliciously crafted web content may lead to memory corruption webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash
[ "cpe:/a:redhat:rhel_eus:8.8::appstream" ]
null
8.8
null
null
RHSA-2008:0529
Red Hat Security Advisory: net-snmp security update
net-snmp SNMPv3 authentication bypass (VU#877044) net-snmp: buffer overflow in perl module's Perl Module __snprint_value()
[ "cpe:/o:redhat:enterprise_linux:3::as", "cpe:/o:redhat:enterprise_linux:3::desktop", "cpe:/o:redhat:enterprise_linux:3::es", "cpe:/o:redhat:enterprise_linux:3::ws", "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws", "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::client_workstation", "cpe:/o:redhat:enterprise_linux:5::server", "cpe:/o:redhat:rhel_eus:4.5::as", "cpe:/o:redhat:rhel_eus:4.5::es" ]
null
null
null
null
RHSA-2024:5622
Red Hat Security Advisory: fence-agents security update
urllib3: proxy-authorization request header is not stripped during cross-origin redirects
[ "cpe:/a:redhat:rhel_aus:8.6::appstream", "cpe:/a:redhat:rhel_e4s:8.6::appstream", "cpe:/a:redhat:rhel_e4s:8.6::highavailability", "cpe:/a:redhat:rhel_tus:8.6::appstream", "cpe:/a:redhat:rhel_tus:8.6::highavailability" ]
null
4.4
null
null
RHSA-2024:6840
Red Hat Security Advisory: pcp security update
pcp: pmcd heap corruption through metric pmstore operations pcp: pmpost symlink attack allows escalating pcp to root user
[ "cpe:/a:redhat:rhel_aus:8.2::appstream" ]
null
4.4
null
null
RHSA-2024:0903
Red Hat Security Advisory: Red Hat AMQ Broker 7.10.6 release and security update
zookeeper: Authorization Bypass in Apache ZooKeeper
[ "cpe:/a:redhat:amq_broker:7.10" ]
null
9.1
null
null
RHSA-2019:2804
Red Hat Security Advisory: Red Hat JBoss Fuse/A-MQ 6.3 R13 security and bug fix update
jolokia: system-wide CSRF that could lead to Remote Code Execution jackson-databind: Potential information exfiltration with default typing, serialization gadget from MyBatis jackson-databind: improper polymorphic deserialization of types from Jodd-db library jackson-databind: improper polymorphic deserialization of types from Oracle JDBC driver jackson-databind: arbitrary code execution in slf4j-ext class jackson-databind: arbitrary code execution in blaze-ds-opt and blaze-ds-core classes jackson-databind: improper polymorphic deserialization in axis2-transport-jms class jackson-databind: improper polymorphic deserialization in openjpa class jackson-databind: improper polymorphic deserialization in jboss-common-core class jackson-databind: polymorphic typing issue allows attacker to read arbitrary local files on the server via crafted JSON message.
[ "cpe:/a:redhat:jboss_amq:6.3" ]
null
null
7.5
null
RHSA-2013:0522
Red Hat Security Advisory: gdb security and bug fix update
gdb: object file .debug_gdb_scripts section improper input validation
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
null
null
RHSA-2024:10739
Red Hat Security Advisory: postgresql:12 security update
postgresql: PostgreSQL PL/Perl environment variable changes execute arbitrary code
[ "cpe:/a:redhat:rhel_aus:8.2::appstream" ]
null
8.8
null
null
RHSA-2023:5598
Red Hat Security Advisory: curl security update
curl: IDN wildcard match may lead to Improper Cerificate Validation curl: more POST-after-PUT confusion
[ "cpe:/a:redhat:rhel_eus:9.0::appstream", "cpe:/o:redhat:rhel_eus:9.0::baseos" ]
null
3.7
null
null
RHSA-2021:0030
Red Hat Security Advisory: OpenShift Container Platform 4.4.32 packages and security update
kubernetes: compromised node could escalate to cluster level privileges
[ "cpe:/a:redhat:openshift:4.4::el7", "cpe:/a:redhat:openshift:4.4::el8" ]
null
6.4
null
null
RHSA-2018:3466
Red Hat Security Advisory: CloudForms 4.6.5 security, bug fix and enhancement update
rubyzip: arbitrary file write vulnerability / arbitrary code execution using a specially crafted zip file
[ "cpe:/a:redhat:cloudforms_managementengine:5.9::el7" ]
null
null
4.8
null
RHSA-2019:2949
Red Hat Security Advisory: httpd24-httpd and httpd24-nghttp2 security update
HTTP/2: large amount of data requests leads to denial of service HTTP/2: flood using PRIORITY frames results in excessive resource consumption HTTP/2: request for large response leads to denial of service
[ "cpe:/a:redhat:rhel_software_collections:3::el6", "cpe:/a:redhat:rhel_software_collections:3::el7" ]
null
null
7.5
null
RHSA-2024:1240
Red Hat Security Advisory: postgresql security update
postgresql: non-owner 'REFRESH MATERIALIZED VIEW CONCURRENTLY' executes arbitrary SQL
[ "cpe:/a:redhat:rhel_eus:9.0::appstream", "cpe:/a:redhat:rhel_eus:9.0::crb" ]
null
8
null
null
RHSA-2013:1447
Red Hat Security Advisory: java-1.7.0-openjdk security update
OpenJDK: java.util.TimeZone does not restrict setting of default time zone (Libraries, 8001029) OpenJDK: XML parsing Denial of Service (JAXP, 8017298) OpenJDK: insufficient html escaping in jhat (jhat, 8011081) OpenJDK: Inet6Address class IPv6 address processing errors (Libraries, 8015743) OpenJDK: image conversion out of bounds read (2D, 8014102) OpenJDK: key data leak via toString() methods (Libraries, 8011071) OpenJDK: Incorrect awt_getPixelByte/awt_getPixelShort/awt_setPixelByte/awt_setPixelShort image raster checks (2D, 8014093) OpenJDK: JTable not properly performing certain access checks (Swing, 8013744) OpenJDK: insufficient InterfaceImplementor security checks (Scripting, 8017299) OpenJDK: insufficient security checks (Beans, 8012071) OpenJDK: insufficient escaping of window title string (Javadoc, 8016675) OpenJDK: default keytab path information leak (JGSS, 8022931) OpenJDK: javax.xml.transform.TransformerFactory does not properly honor XMLConstants.FEATURE_SECURE_PROCESSING (JAXP, 8012425) OpenJDK: insufficient checks of KDC replies (JGSS, 8014341) OpenJDK: javac does not ignore certain ignorable characters (Javadoc, 8016653) OpenJDK: JPEGImageReader and JPEGImageWriter missing band size checks (2D, 8013510) OpenJDK: RMIConnection stub missing permission check (CORBA, 8011157) OpenJDK: VersionHelper12 does not honor modifyThreadGroup restriction (JNDI, 8013739) OpenJDK: insufficient security checks (JAXWS, 8017505) OpenJDK: com.sun.org.apache.xml.internal.security.utils.UnsyncByteArrayOutputStream Denial of Service (Security, 8021290) OpenJDK: XML parsing Denial of Service (JAXP, 8014530) OpenJDK: Java2d Disposer security bypass (2D, 8017287) OpenJDK: checkPackageAccess missing security check (Libraries, 8017291) OpenJDK: Vulnerability in Libraries component (Libraries, 7023639) OpenJDK: getDeclaringClass() information leak (Libraries, 8014349) OpenJDK: ObjectInputStream/ObjectOutputStream missing checks (Libraries, 8014987) OpenJDK: insufficient DataFlavor security checks (AWT, 8012277) OpenJDK: Missing CORBA security checks (Libraries, 8017196) OpenJDK: XML stream factory finder information leak (JAXP, 8013502)
[ "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
RHSA-2023:3624
Red Hat Security Advisory: Migration Toolkit for Containers (MTC) 1.7.10 security and bug fix update
golang: net/http, net/textproto: denial of service from excessive memory allocation golang: net/http, net/textproto, mime/multipart: denial of service from excessive resource consumption golang: go/parser: Infinite loop in parsing golang: html/template: backticks not treated as string delimiters golang: html/template: improper handling of JavaScript whitespace
[ "cpe:/a:redhat:rhmt:1.7::el8" ]
null
8.1
null
null
RHSA-2022:7822
Red Hat Security Advisory: container-tools:rhel8 security, bug fix, and enhancement update
podman: possible information disclosure and modification buildah: possible information disclosure and modification
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
7.1
null
null
RHSA-2016:1190
Red Hat Security Advisory: chromium-browser security update
chromium-browser: cross-origin bypass in extension bindings chromium-browser: cross-origin bypass in blink chromium-browser: cross-origin bypass in extensions chromium-browser: cross-origin bypass in blink chromium-browser: cross-origin bypass in extension bindings chromium-browser: type confusion in v8 chromium-browser: heap overflow in v8 chromium-browser: heap use-after-free in v8 bindings chromium-browser: heap use-after-free in skia chromium-browser: heap overflow in pdfium chromium-browser: csp bypass for serviceworker chromium-browser: out-of-bounds access in libxslt chromium-browser: integer overflow in libxslt chromium-browser: out-of-bounds read in pdfium chromium-browser: out-of-bounds read in pdfium chromium-browser: information leak in extensions chromium-browser: out-of-bounds read in v8 chromium-browser: heap buffer overflow in media chromium-browser: heap use-after-free in autofill chromium-browser: heap buffer-overflow in skia chromium-browser: limited cross-origin bypass in serviceworker chromium-browser: http download of software removal tool chromium-browser: hpkp pins removed on cache clearance chromium-browser: various fixes from internal audits
[ "cpe:/a:redhat:rhel_extras:6" ]
null
null
null
null
RHSA-2020:2165
Red Hat Security Advisory: openstack-manila security update
openstack-manila: User with share-network UUID is able to show, create and delete shares
[ "cpe:/a:redhat:openstack:16::el8" ]
null
8.3
null
null
RHSA-2019:2924
Red Hat Security Advisory: redhat-virtualization-host security update
kernel: vhost-net: guest to host kernel escape during migration
[ "cpe:/o:redhat:enterprise_linux:7::hypervisor" ]
null
null
7.2
null
RHSA-2021:1511
Red Hat Security Advisory: AMQ Clients 2.9.1 release and security update
netty: Information disclosure via the local system temporary directory netty: possible request smuggling in HTTP/2 due missing validation netty: Request smuggling via content-length header
[ "cpe:/a:redhat:a_mq_clients:2::el7", "cpe:/a:redhat:a_mq_clients:2::el8" ]
null
5.9
null
null
RHSA-2024:8238
Red Hat Security Advisory: OpenShift Container Platform 4.14.39 security update
Podman: Buildah: cri-o: FIPS Crypto-Policy Directory Mounting Issue in containers/common Go Library
[ "cpe:/a:redhat:openshift:4.14::el8", "cpe:/a:redhat:openshift:4.14::el9" ]
null
5.4
null
null
RHSA-2023:6569
Red Hat Security Advisory: sysstat security and bug fix update
sysstat: check_overflow() function can work incorrectly that lead to an overflow
[ "cpe:/a:redhat:enterprise_linux:9::appstream" ]
null
7
null
null
RHSA-2023:7782
Red Hat Security Advisory: linux-firmware security update
amd: Return Address Predictor vulnerability leading to information disclosure hw: amd: Cross-Process Information Leak
[ "cpe:/o:redhat:rhel_aus:7.6::server" ]
null
6.5
null
null
RHSA-2024:4462
Red Hat Security Advisory: ghostscript security update
ghostscript: OPVP device arbitrary code execution via custom Driver library
[ "cpe:/a:redhat:rhel_aus:8.6::appstream", "cpe:/a:redhat:rhel_e4s:8.6::appstream", "cpe:/a:redhat:rhel_tus:8.6::appstream" ]
null
8.8
null
null
RHSA-2022:8535
Red Hat Security Advisory: OpenShift Container Platform 4.11.16 security update
golang: archive/tar: github.com/vbatts/tar-split: unbounded memory consumption when reading headers golang: net/http/httputil: ReverseProxy should not forward unparseable query parameters golang: net/http: handle server errors after sending GOAWAY golang: math/big: decoding big.Float and big.Rat types can panic if the encoded message is too short, potentially allowing a denial of service golang: regexp/syntax: limit memory used by parsing regexps
[ "cpe:/a:redhat:openshift:4.11::el8" ]
null
6.5
null
null
RHSA-2022:8806
Red Hat Security Advisory: usbguard security update
usbguard: Fix unauthorized access via D-Bus
[ "cpe:/a:redhat:rhel_eus:8.6::appstream" ]
null
7.8
null
null
RHSA-2022:6833
Red Hat Security Advisory: expat security update
expat: a use-after-free in the doContent function in xmlparse.c
[ "cpe:/o:redhat:rhel_e4s:8.1::baseos" ]
null
8.1
null
null
RHSA-2023:2261
Red Hat Security Advisory: bind security and bug fix update
bind: processing large delegations may severely degrade resolver performance bind: flooding with UPDATE requests may lead to DoS bind: sending specific queries to the resolver may cause a DoS bind: sending specific queries to the resolver may cause a DoS
[ "cpe:/a:redhat:enterprise_linux:9::appstream", "cpe:/a:redhat:enterprise_linux:9::crb" ]
null
7.5
null
null
RHSA-2003:065
Red Hat Security Advisory: XFree86 security update
security flaw security flaw security flaw security flaw security flaw
[ "cpe:/o:redhat:enterprise_linux:2.1::as", "cpe:/o:redhat:enterprise_linux:2.1::aw", "cpe:/o:redhat:enterprise_linux:2.1::es", "cpe:/o:redhat:enterprise_linux:2.1::ws" ]
null
null
null
null
RHSA-2024:8170
Red Hat Security Advisory: fence-agents security update
pypa/setuptools: Remote code execution via download functions in the package_index module in pypa/setuptools
[ "cpe:/a:redhat:rhel_aus:8.4::appstream", "cpe:/a:redhat:rhel_e4s:8.4::appstream", "cpe:/a:redhat:rhel_e4s:8.4::highavailability", "cpe:/a:redhat:rhel_tus:8.4::appstream", "cpe:/a:redhat:rhel_tus:8.4::highavailability" ]
null
8.8
null
null
RHSA-2019:0315
Red Hat Security Advisory: CloudForms 4.6.8 security, bug fix and enhancement update
rubygem-sinatra: XSS in the 400 Bad Request page
[ "cpe:/a:redhat:cloudforms_managementengine:5.9::el7" ]
null
null
6.1
null
RHBA-2003:308
Red Hat Bug Fix Advisory: Updated kernel resolves 32-bit address space issue on AMD64
security flaw
[ "cpe:/o:redhat:enterprise_linux:3::as", "cpe:/o:redhat:enterprise_linux:3::ws" ]
null
null
null
null
RHSA-2012:0094
Red Hat Security Advisory: freetype security update
freetype: FT_Bitmap_New integer overflow, FreeType TT_Vary_Get_Glyph_Deltas improper input validation freetype: Multiple security flaws when loading CID-keyed Type 1 fonts
[ "cpe:/o:redhat:rhel_eus:5.6" ]
null
null
null
null
RHSA-2014:1862
Red Hat Security Advisory: mariadb55-mariadb security update
mysql: Remote Preauth User Enumeration flaw mysql: unspecified vulnerability related to ENARC (CPU July 2014) mysql: unspecified vulnerability related to SROPTZR (CPU July 2014) mysql: unspecified vulnerability related to ENFED (CPU July 2014) mysql: unspecified vulnerability related to SRINFOSC (CPU July 2014) mysql: unspecified vulnerability related to SRCHAR (CPU July 2014) mysql: unspecified MyISAM temporary file issue fixed in 5.5.39 and 5.6.20 mysql: unspecified vulnerability related to SERVER:CHARACTER SETS (CPU October 2014) mysql: unspecified vulnerability related to SERVER:REPLICATION ROW FORMAT BINARY LOG DML (CPU October 2014) mysql: unspecified vulnerability related to SERVER:INNODB DML FOREIGN KEYS (CPU October 2014) mysql: unspecified vulnerability related to SERVER:OPTIMIZER (CPU October 2014) mysql: unspecified vulnerability related to SERVER:DML (CPU October 2014) mysql: unspecified vulnerability related to SERVER:MEMORY STORAGE ENGINE (CPU October 2014) mysql: unspecified vulnerability related to SERVER:DML (CPU October 2014) mysql: unspecified vulnerability related to SERVER:DDL (CPU October 2014) mysql: unspecified vulnerability related to CLIENT:MYSQLDUMP (CPU October 2014) mysql: unspecified vulnerability related to CLIENT:MYSQLADMIN (CPU October 2014) mysql: unspecified vulnerability related to SERVER:DML (CPU October 2014) mysql: unspecified vulnerability related to C API SSL CERTIFICATE HANDLING (CPU October 2014)
[ "cpe:/a:redhat:rhel_software_collections:1::el6", "cpe:/a:redhat:rhel_software_collections:1::el7" ]
null
null
null
null
RHSA-2011:0301
Red Hat Security Advisory: acroread security update
acroread: critical APSB11-03 acroread: critical APSB11-03 acroread: critical APSB11-03 acroread: critical APSB11-03 acroread: critical APSB11-03 acroread: critical APSB11-03 acroread: critical APSB11-03 acroread: multiple XSS flaws (APSB11-03) acroread: critical APSB11-03 acroread: critical APSB11-03 acroread: critical APSB11-03 acroread: critical APSB11-03 acroread: critical APSB11-03 acroread: critical APSB11-03 acroread: critical APSB11-03 acroread: critical APSB11-03 acroread: critical APSB11-03 acroread: critical APSB11-03 acroread: critical APSB11-03 acroread: critical APSB11-03 acroread: critical APSB11-03 acroread: multiple XSS flaws (APSB11-03) acroread: critical APSB11-03
[ "cpe:/a:redhat:rhel_extras:4", "cpe:/a:redhat:rhel_extras:5::client", "cpe:/a:redhat:rhel_extras:5::server", "cpe:/a:redhat:rhel_extras:6" ]
null
null
null
null
RHSA-2021:2304
Red Hat Security Advisory: microcode_ctl security, bug fix and enhancement update
hw: vt-d related privilege escalation hw: improper isolation of shared resources in some Intel Processors hw: observable timing discrepancy in some Intel Processors hw: information disclosure on some Intel Atom processors
[ "cpe:/o:redhat:rhel_eus:7.7::computenode", "cpe:/o:redhat:rhel_eus:7.7::server" ]
null
5.6
null
null
RHSA-2008:0502
Red Hat Security Advisory: XFree86 security update
X.org Record and Security extensions memory corruption X.org MIT-SHM extension arbitrary memory read X.org Render extension AllocateGlyph() heap buffer overflow X.org Render extension ProcRenderCreateCursor() crash
[ "cpe:/o:redhat:enterprise_linux:3::as", "cpe:/o:redhat:enterprise_linux:3::desktop", "cpe:/o:redhat:enterprise_linux:3::es", "cpe:/o:redhat:enterprise_linux:3::ws" ]
null
null
null
null
RHSA-2014:1149
Red Hat Security Advisory: Red Hat JBoss Operations Network 3.2.3 update
Tomcat/JBossWeb: Limited DoS in chunked transfer encoding input filter Tomcat/JBossWeb: Request smuggling via malicious content length header
[ "cpe:/a:redhat:jboss_operations_network:3.2.3" ]
null
null
null
null
RHSA-2021:1196
Red Hat Security Advisory: Red Hat JBoss Web Server 5.4.2 Security Update
openssl: NULL pointer dereference in signature_algorithms processing openssl: CA certificate check bypass with X509_V_FLAG_X509_STRICT
[ "cpe:/a:redhat:jboss_enterprise_web_server:5.4" ]
null
7.4
null
null
RHSA-2015:1564
Red Hat Security Advisory: kernel-rt security, bug fix, and enhancement update
kernel: netfilter connection tracking extensions denial of service kernel: denial of service (DoS) attack against IPv6 network stacks due to improper handling of Router Advertisements. kernel: ping sockets: use-after-free leading to local privilege escalation
[ "cpe:/a:redhat:enterprise_mrg:2:server:el6" ]
null
null
null
null
RHSA-2022:6040
Red Hat Security Advisory: Release of OpenShift Serverless 1.24.0
golang: net/http: improper sanitization of Transfer-Encoding header golang: go/parser: stack exhaustion in all Parse* functions go-restful: Authorization Bypass Through User-Controlled Key prometheus/client_golang: Denial of service using InstrumentHandlerCounter golang: encoding/pem: fix stack overflow in Decode golang: regexp: stack exhaustion via a deeply nested expression golang: encoding/xml: stack exhaustion in Decoder.Skip golang: crypto/elliptic: panic caused by oversized scalar golang: crypto/tls: session tickets lack random ticket_age_add golang: io/fs: stack exhaustion in Glob golang: compress/gzip: stack exhaustion in Reader.Read golang: path/filepath: stack exhaustion in Glob golang: encoding/xml: stack exhaustion in Unmarshal golang: encoding/gob: stack exhaustion in Decoder.Decode golang: net/http/httputil: NewSingleHostReverseProxy - omit X-Forwarded-For not working
[ "cpe:/a:redhat:serverless:1.24::el8" ]
null
6.5
null
null
RHSA-2007:0703
Red Hat Security Advisory: openssh security and bug fix update
Kerberos information leak audit logging of failed logins
[ "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws" ]
null
null
null
null
RHSA-2022:9098
Red Hat Security Advisory: OpenShift Container Platform 4.10.46 packages and security update
maven-shared-utils: Command injection via Commandline class
[ "cpe:/a:redhat:openshift:4.10::el7", "cpe:/a:redhat:openshift:4.10::el8" ]
null
9.8
null
null
RHSA-2018:3456
Red Hat Security Advisory: Red Hat Satellite Server 5 - 90 day End Of Life Notice
This is the 90 day notification of the End Of Life (EOL) plans for the following versions of Red Hat Satellite 5: * Red Hat Satellite 5.6 * Red Hat Satellite 5.7
[ "cpe:/a:redhat:network_satellite:5.6::el6", "cpe:/a:redhat:network_satellite:5.7::el6" ]
null
null
null
null
RHSA-2024:9819
Red Hat Security Advisory: tigervnc security update
xorg-x11-server: tigervnc: heap-based buffer overflow privilege escalation vulnerability
[ "cpe:/a:redhat:rhel_aus:8.4::appstream", "cpe:/a:redhat:rhel_e4s:8.4::appstream", "cpe:/a:redhat:rhel_tus:8.4::appstream" ]
null
7.8
null
null
RHSA-2024:1353
Red Hat Security Advisory: Red Hat Process Automation Manager 7.13.5 security update
SnakeYaml: Constructor Deserialization Remote Code Execution xstream: Xstream to serialise XML data was vulnerable to Denial of Service attacks xstream: Denial of Service by injecting recursive collections or maps based on element's hash values raising a stack overflow batik: Server-Side Request Forgery vulnerability batik: Server-Side Request Forgery vulnerability RESTEasy: creation of insecure temp files okio: GzipSource class improper exception handling JSON-java: parser confusion leads to OOM logback: A serialization vulnerability in logback receiver keycloak: XSS via assertion consumer service URL in SAML POST-binding flow bouncycastle: potential blind LDAP injection attack using a self-signed certificate
[ "cpe:/a:redhat:jboss_enterprise_bpms_platform:7.13" ]
null
5.3
null
null
RHSA-2023:3153
Red Hat Security Advisory: thunderbird security update
Mozilla: Browser prompts could have been obscured by popups Mozilla: Crash in RLBox Expat driver Mozilla: Potential permissions request bypass via clickjacking Mozilla: Content process crash due to invalid wasm code Mozilla: Potential spoof due to obscured address bar Mozilla: Potential memory corruption in FileReader::DoReadData() Mozilla: Memory safety bugs fixed in Firefox 113 and Firefox ESR 102.11
[ "cpe:/a:redhat:rhel_aus:8.2::appstream", "cpe:/a:redhat:rhel_e4s:8.2::appstream", "cpe:/a:redhat:rhel_tus:8.2::appstream" ]
null
8.8
null
null
RHSA-2016:2582
Red Hat Security Advisory: nettle security and bug fix update
nettle: secp256 calculation bug nettle: miscalculations on secp384 curve nettle: secp256 calculation bug nettle: RSA/DSA code is vulnerable to cache-timing related attacks
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
7.4
null
RHSA-2015:0252
Red Hat Security Advisory: samba security update
samba: talloc free on uninitialized stack pointer in netlogon server could lead to remote-code execution
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
null
null
RHSA-2022:7529
Red Hat Security Advisory: container-tools:3.0 security update
golang: net/http: improper sanitization of Transfer-Encoding header cri-o: memory exhaustion on the node when access to the kube api golang: go/parser: stack exhaustion in all Parse* functions prometheus/client_golang: Denial of service using InstrumentHandlerCounter golang: encoding/xml: stack exhaustion in Decoder.Skip golang: io/fs: stack exhaustion in Glob golang: compress/gzip: stack exhaustion in Reader.Read golang: path/filepath: stack exhaustion in Glob golang: encoding/xml: stack exhaustion in Unmarshal golang: net/http/httputil: NewSingleHostReverseProxy - omit X-Forwarded-For not working
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
6.5
null
null
RHSA-2011:1219
Red Hat Security Advisory: samba security update
samba: mount.cifs improper device name and mountpoint strings sanitization samba: Race condition by mount (mount.cifs) operations samba/cifs-utils: mount.cifs and umount.cifs fail to anticipate RLIMIT_FSIZE (SWAT): Absent CSRF protection in various Samba web configuration formulars (SWAT): XSS flaw in Change Password page Samba mtab lock file race condition
[ "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws", "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::client_workstation", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
RHSA-2014:0174
Red Hat Security Advisory: piranha security update
piranha: web UI authentication bypass using POST requests
[ "cpe:/a:redhat:rhel_cluster:5" ]
null
null
null
null
RHSA-2024:6309
Red Hat Security Advisory: fence-agents security update
pypa/setuptools: Remote code execution via download functions in the package_index module in pypa/setuptools urllib3: proxy-authorization request header is not stripped during cross-origin redirects
[ "cpe:/a:redhat:enterprise_linux:8::appstream", "cpe:/a:redhat:enterprise_linux:8::highavailability", "cpe:/a:redhat:enterprise_linux:8::resilientstorage" ]
null
4.4
null
null
RHSA-2015:1639
Red Hat Security Advisory: openstack-glance security update
openstack-glance: Glance v2 API host file disclosure through qcow2 backing file
[ "cpe:/a:redhat:openstack:7::el7" ]
null
null
null
null
RHSA-2023:6279
Red Hat Security Advisory: cert-manager Operator for Red Hat OpenShift 1.11.5
golang: crypto/tls: slow verification of certificate chains containing large RSA keys golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487)
[ "cpe:/a:redhat:cert_manager:1.11::el9" ]
null
7.5
null
null
RHSA-2020:3003
Red Hat Security Advisory: Red Hat Ceph Storage 4.1 security and bug fix update
ceph: header-splitting in RGW GetObject has a possible XSS ceph: radosgw: HTTP header injection via CORS ExposeHeader tag
[ "cpe:/a:redhat:ceph_storage:4::el7", "cpe:/a:redhat:ceph_storage:4::el8" ]
null
5.4
null
null
RHSA-2017:2674
Red Hat Security Advisory: Red Hat Mobile Application Platform security update
RHMAP Millicore IDE allows RCE on SCM RHMAP: SSRF via external_request feature of App Studio RHMAP: Stored XSS in App Store git: Command injection via malicious ssh URLs
[ "cpe:/a:redhat:mobile_application_platform:4.5" ]
null
null
6.3
null
RHSA-2023:1792
Red Hat Security Advisory: firefox security update
Mozilla: Memory Corruption in Safe Browsing Code Mozilla: libwebp: Double-free in libwebp Mozilla: Fullscreen notification obscured Mozilla: Potential Memory Corruption following Garbage Collector compaction Mozilla: Invalid free from JavaScript code Mozilla: Content-Disposition filename truncation leads to Reflected File Download Mozilla: Files with malicious extensions could have been downloaded unsafely on Linux Mozilla: Incorrect optimization result on ARM64 Mozilla: Memory safety bugs fixed in Firefox 112 and Firefox ESR 102.10
[ "cpe:/a:redhat:rhel_e4s:8.1::appstream" ]
null
8.8
null
null
RHSA-2011:1326
Red Hat Security Advisory: pango security update
qt/harfbuzz buffer overflow
[ "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::client_workstation", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
RHSA-2022:8434
Red Hat Security Advisory: dotnet7.0 security, bug fix, and enhancement update
dotnet: Nuget cache poisoning on Linux via world-writable cache directory
[ "cpe:/a:redhat:enterprise_linux:9::appstream", "cpe:/a:redhat:enterprise_linux:9::crb" ]
null
7.8
null
null
RHSA-2006:0129
Red Hat Security Advisory: spamassassin security update
security flaw
[ "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws" ]
null
null
null
null
RHSA-2005:049
Red Hat Security Advisory: cups security update
security flaw
[ "cpe:/o:redhat:enterprise_linux:3::as", "cpe:/o:redhat:enterprise_linux:3::desktop", "cpe:/o:redhat:enterprise_linux:3::es", "cpe:/o:redhat:enterprise_linux:3::ws" ]
null
null
null
null
RHSA-2017:0211
Red Hat Security Advisory: nagios security update
snoopy: incomplete fixes for command execution flaws snoopy: incomplete fixes for command execution flaws snoopy: incomplete fixes for command execution flaws nagios: Command injection via curl in MagpieRSS nagios: Privilege escalation issue
[ "cpe:/a:redhat:openstack:5::el7" ]
null
null
7.3
null
RHSA-2022:7068
Red Hat Security Advisory: firefox security update
Mozilla: Same-origin policy violation could have leaked cross-origin URLs Mozilla: Memory Corruption in JS Engine Mozilla: Denial of Service via window.print Mozilla: Memory safety bugs fixed in Firefox ESR 102.4 and Thunderbird 102.4
[ "cpe:/a:redhat:rhel_eus:8.2::appstream" ]
null
8.8
6.1
null
RHSA-2023:7858
Red Hat Security Advisory: Red Hat Single Sign-On 7.6.6 security update
keycloak: reflected XSS via wildcard in OIDC redirect_uri keycloak: redirect_uri validation bypass keycloak: offline session token DoS
[ "cpe:/a:redhat:red_hat_single_sign_on:7.6.6" ]
null
7.7
null
null
RHSA-2020:0594
Red Hat Security Advisory: curl security update
curl: HTTP authentication leak in redirects curl: FTP path trickery leads to NIL byte out of bounds write curl: LDAP NULL pointer dereference curl: RTSP RTP buffer over-read curl: Out-of-bounds heap read when missing RTSP headers allows information leak or denial of service
[ "cpe:/o:redhat:rhel_aus:7.4::server", "cpe:/o:redhat:rhel_e4s:7.4::server", "cpe:/o:redhat:rhel_tus:7.4::server" ]
null
null
5.4
null
RHSA-2010:0963
Red Hat Security Advisory: JBoss Enterprise Application Platform 5.1.0 security update
JBoss Remoting Denial-Of-Service
[ "cpe:/a:redhat:jboss_enterprise_application_platform:5.1" ]
null
null
null
null
RHSA-2022:6447
Red Hat Security Advisory: ruby:2.7 security, bug fix, and enhancement update
ruby: Regular expression denial of service vulnerability of Date parsing methods ruby: Cookie prefix spoofing in CGI::Cookie.parse ruby: Buffer overrun in String-to-Float conversion
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
6.2
null
null
RHSA-2011:0212
Red Hat Security Advisory: jbossweb security update
JDK Double.parseDouble Denial-Of-Service
[ "cpe:/a:redhat:jboss_enterprise_application_platform:4.2", "cpe:/a:redhat:jboss_enterprise_application_platform:4.3", "cpe:/a:redhat:jboss_enterprise_application_platform:5.1" ]
null
null
null
null
RHSA-2019:2866
Red Hat Security Advisory: kernel security update
kernel: vhost-net: guest to host kernel escape during migration
[ "cpe:/o:redhat:rhel_eus:7.5::computenode", "cpe:/o:redhat:rhel_eus:7.5::server" ]
null
null
7.2
null
RHSA-2023:7395
Red Hat Security Advisory: python-setuptools security update
pypa-setuptools: Regular Expression Denial of Service (ReDoS) in package_index.py
[ "cpe:/o:redhat:rhel_eus:8.6::baseos" ]
null
5.9
null
null
RHSA-2003:101
Red Hat Security Advisory: : Updated OpenSSL packages fix vulnerabilities
security flaw security flaw
[ "cpe:/o:redhat:linux:6.2", "cpe:/o:redhat:linux:7.0", "cpe:/o:redhat:linux:7.1", "cpe:/o:redhat:linux:7.2", "cpe:/o:redhat:linux:7.3", "cpe:/o:redhat:linux:8.0", "cpe:/o:redhat:linux:9" ]
null
null
null
null
RHSA-2013:0586
Red Hat Security Advisory: jbosssx security update
JBoss: allows empty password to authenticate against LDAP
[ "cpe:/a:redhat:jboss_enterprise_brms_platform:5.3.1", "cpe:/a:redhat:jboss_enterprise_portal_platform:4.3.0:update7", "cpe:/a:redhat:jboss_enterprise_portal_platform:5.2.2", "cpe:/a:redhat:jboss_enterprise_soa_platform:4.2.0:update5", "cpe:/a:redhat:jboss_enterprise_soa_platform:4.3.0:update5", "cpe:/a:redhat:jboss_enterprise_soa_platform:5.3.1" ]
null
null
null
null
RHSA-2013:0266
Red Hat Security Advisory: tomcat6 security update
tomcat: HTTP NIO connector OOM DoS via a request with large headers Tomcat/JBoss Web - Bypass of CSRF prevention filter Tomcat - Denial Of Service when using NIO+SSL+sendfile tomcat: three DIGEST authentication implementation issues tomcat: three DIGEST authentication implementation issues tomcat: three DIGEST authentication implementation issues
[ "cpe:/a:redhat:jboss_enterprise_web_server:2::el5", "cpe:/a:redhat:jboss_enterprise_web_server:2::el6" ]
null
null
null
null
RHSA-2021:0153
Red Hat Security Advisory: dnsmasq security update
dnsmasq: loose address/port check in reply_query() makes forging replies easier for an off-path attacker dnsmasq: loose query name check in reply_query() makes forging replies easier for an off-path attacker dnsmasq: multiple queries forwarded for the same name makes forging replies easier for an off-path attacker
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
4
null
null
RHSA-2022:1075
Red Hat Security Advisory: httpd24-httpd security update
httpd: Errors encountered during the discarding of request body lead to HTTP request smuggling
[ "cpe:/a:redhat:rhel_software_collections:3::el7" ]
null
8.3
null
null
RHSA-2021:4826
Red Hat Security Advisory: mailman:2.1 security update
mailman: CSRF token derived from admin password allows offline brute-force attack mailman: CSRF token bypass allows to perform CSRF attacks and account takeover
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
8
null
null
RHSA-2020:5656
Red Hat Security Advisory: kernel security update
kernel: out of bounds write in function i2c_smbus_xfer_emulated in drivers/i2c/i2c-core-smbus.c kernel: race condition in smp_task_timedout() and smp_task_done() in drivers/scsi/libsas/sas_expander.c leads to use-after-free kernel: out of bounds write in i2c driver leads to local escalation of privilege kernel: Denial Of Service in the __ipmi_bmc_register() function in drivers/char/ipmi/ipmi_msghandler.c kernel: mounting a crafted ext4 filesystem image, performing some operations, and unmounting can lead to a use-after-free in ext4_put_super in fs/ext4/super.c kernel: out-of-bounds write via crafted keycode table kernel: sg_write function lacks an sg_remove_request call in a certain failure case
[ "cpe:/o:redhat:enterprise_linux:7::hypervisor", "cpe:/o:redhat:rhel_eus:7.6::computenode", "cpe:/o:redhat:rhel_eus:7.6::server" ]
null
6.7
7.8
null
RHSA-2018:3529
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.1.5 on RHEL 6 security update
JBoss/WildFly: iiop does not honour strict transport confidentiality
[ "cpe:/a:redhat:jboss_enterprise_application_platform:7::el6" ]
null
null
5.3
null
RHSA-2020:1794
Red Hat Security Advisory: systemd security, bug fix, and enhancement update
systemd: services with DynamicUser can create SUID/SGID binaries systemd: services with DynamicUser can get new privileges and create SGID binaries
[ "cpe:/o:redhat:enterprise_linux:8::baseos" ]
null
null
4.5
null
RHSA-2020:0160
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.2.6 on RHEL 7 security update
hibernate-validator: safeHTML validator allows XSS jackson-databind: Serialization gadgets in com.zaxxer.hikari.HikariConfig EAP: Vault system property security attribute value is revealed on CLI 'reload' command undertow: possible Denial Of Service (DOS) in Undertow HTTP server listening on HTTPS jackson-databind: Serialization gadgets in classes of the commons-configuration package jackson-databind: Serialization gadgets in classes of the xalan package jackson-databind: Serialization gadgets in com.zaxxer.hikari.HikariDataSource netty: HTTP request smuggling by mishandled whitespace before the colon in HTTP headers jackson-databind: Serialization gadgets in org.apache.commons.dbcp.datasources.* jackson-databind: Serialization gadgets in com.p6spy.engine.spy.P6DataSource jackson-databind: Serialization gadgets in classes of the ehcache package jackson-databind: Serialization gadgets in org.apache.log4j.receivers.db.*
[ "cpe:/a:redhat:jboss_enterprise_application_platform:7.2::el7" ]
null
null
8.1
null
RHSA-2024:2941
Red Hat Security Advisory: RHACS 4.4 enhancement and security update
golang: net/http, x/net/http2: unlimited number of CONTINUATION frames causes DoS golang: net/http/cookiejar: incorrect forwarding of sensitive headers and cookies on HTTP redirect golang: net/http: golang: mime/multipart: golang: net/textproto: memory exhaustion in Request.ParseMultipartForm golang: crypto/x509: Verify panics on certificates with an unknown public key algorithm golang: net/mail: comments in display names are incorrectly handled webpack-dev-middleware: lack of URL validation may lead to file leak
[ "cpe:/a:redhat:advanced_cluster_security:4.4::el8" ]
null
7.4
null
null
RHSA-2012:0841
Red Hat Security Advisory: abrt, libreport, btparser, and python-meh security and bug fix update
abrt: may leak some personal information to bugzilla with some certain applications abrt: Setuid process core dump archived with unsafe GID permissions
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
null
null
RHSA-2018:3090
Red Hat Security Advisory: ovmf security, bug fix, and enhancement update
openssl: Handling of crafted recursive ASN.1 structures can cause a stack overflow and resulting denial of service
[ "cpe:/o:redhat:enterprise_linux:7::server" ]
null
null
6.5
null
RHSA-2008:0584
Red Hat Security Advisory: pidgin security and bug fix update
pidgin MSN integer overflow
[ "cpe:/a:redhat:rhel_productivity:5", "cpe:/o:redhat:enterprise_linux:3::as", "cpe:/o:redhat:enterprise_linux:3::desktop", "cpe:/o:redhat:enterprise_linux:3::es", "cpe:/o:redhat:enterprise_linux:3::ws", "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws", "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::client_workstation" ]
null
null
null
null
RHSA-2009:1512
Red Hat Security Advisory: kdegraphics security update
xpdf: multiple integer overflows xpdf/poppler: SplashBitmap integer overflow xpdf/poppler: Splash:: drawImage integer overflow and missing allocation return value check xpdf/poppler: integer overflow in ObjectStream::ObjectStream (oCERT-2009-016) xpdf/poppler: ImageStream:: ImageStream integer overflow
[ "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws" ]
null
null
null
null
RHSA-2025:3645
Red Hat Security Advisory: tomcat security update
tomcat: RCE due to TOCTOU issue in JSP compilation tomcat: Potential RCE and/or information disclosure and/or information corruption with partial PUT
[ "cpe:/a:redhat:enterprise_linux:9::appstream" ]
null
8.6
null
null
RHSA-2024:5436
Red Hat Security Advisory: OpenShift Container Platform 4.14.35 security update
golang: net/http: golang: mime/multipart: golang: net/textproto: memory exhaustion in Request.ParseMultipartForm golang: net/netip: Unexpected behavior from Is methods for IPv4-mapped IPv6 addresses
[ "cpe:/a:redhat:openshift:4.14::el8", "cpe:/a:redhat:openshift:4.14::el9" ]
null
6.7
null
null
RHSA-2024:0897
Red Hat Security Advisory: kernel security update
kernel: nfp: use-after-free in area_cache_get() kernel: null-ptr-deref vulnerabilities in sl_tx_timeout in drivers/net/slip kernel: HID: check empty report_list in hid_validate_values() kernel: Possible use-after-free since the two fdget() during vhost_net_set_backend() kernel: NULL pointer dereference in can_rcv_filter kernel: Slab-out-of-bound read in compare_netdev_and_ip kernel: net/sched: sch_hfsc UAF kernel: use-after-free in sch_qfq network scheduler kernel: A heap out-of-bounds write when function perf_read_group is called and sibling_list is smaller than its child's sibling_list kernel: NULL pointer dereference in nvmet_tcp_build_iovec kernel: NULL pointer dereference in nvmet_tcp_execute_request kernel: NULL pointer dereference in __nvmet_req_complete kernel: Out-Of-Bounds Read vulnerability in smbCalcSize kernel: OOB Access in smb2_dump_detail kernel: inactive elements in nft_pipapo_walk kernel: use-after-free in l2cap_sock_release in net/bluetooth/l2cap_sock.c kernel: IGB driver inadequate buffer size for frames larger than MTU kernel: SEV-ES local priv escalation kernel: ktls overwrites readonly memory pages when using function splice with a ktls socket as destination
[ "cpe:/a:redhat:enterprise_linux:8::crb", "cpe:/o:redhat:enterprise_linux:8::baseos" ]
null
7
null
null
RHSA-2008:0594
Red Hat Security Advisory: java-1.6.0-sun security update
OpenJDK JMX allows illegal operations with local monitoring (6332953) Java RE allows Same Origin Policy to be Bypassed (6687932) OpenJDK JAX-WS unauthorized URL access (6542088) security flaw JDK untrusted applet/application privilege escalation (6661918) Security Vulnerabilities in the Java Runtime Environment Scripting Language Support (6529568, 6529579) security flaw Java Web Start, arbitrary file creation (6703909) Java Web Start, untrusted application may determine Cache Location (6704074)
[ "cpe:/a:redhat:rhel_extras:4", "cpe:/a:redhat:rhel_extras:5::client", "cpe:/a:redhat:rhel_extras:5::server" ]
null
null
null
null
RHSA-2005:235
Red Hat Security Advisory: mailman security update
security flaw
[ "cpe:/o:redhat:enterprise_linux:3::as", "cpe:/o:redhat:enterprise_linux:3::desktop", "cpe:/o:redhat:enterprise_linux:3::es", "cpe:/o:redhat:enterprise_linux:3::ws", "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws" ]
null
null
null
null
RHSA-2021:2519
Red Hat Security Advisory: RHV-H security update (redhat-virtualization-host) 4.3.16
hw: vt-d related privilege escalation dhcp: stack-based buffer overflow when parsing statements with colon-separated hex digits in config or lease files in dhcpd and dhclient glib: integer overflow in g_bytes_new function on 64-bit platforms due to an implicit cast from 64 bits to 32 bits
[ "cpe:/o:redhat:enterprise_linux:7::hypervisor" ]
null
9.8
null
null
RHSA-2008:0789
Red Hat Security Advisory: dnsmasq security update
bind: implement source UDP port randomization (CERT VU#800113)
[ "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
RHSA-2023:1586
Red Hat Security Advisory: pesign security update
pesign: Local privilege escalation on pesign systemd service
[ "cpe:/a:redhat:rhel_e4s:8.1::appstream" ]
null
7.8
null
null
RHSA-2021:0857
Red Hat Security Advisory: kernel-rt security and bug fix update
kernel: malicious USB devices can lead to multiple out-of-bounds write kernel: out-of-bounds reads in pinctrl subsystem. kernel: use-after-free in i915_ppgtt_close in drivers/gpu/drm/i915/i915_gem_gtt.c kernel: performance counters race condition use-after-free kernel: Local buffer overflow in ctnetlink_parse_tuple_filter in net/netfilter/nf_conntrack_netlink.c kernel: Geneve/IPsec traffic may be unencrypted between two Geneve endpoints kernel: use-after-free in read in vt_do_kdgkb_ioctl kernel: ICMP rate limiting can be used for DNS poisoning attack kernel: SCSI target (LIO) write to any block on ILO backstore kernel: locking issue in drivers/tty/tty_jobctrl.c can lead to an use-after-free kernel: increase slab leak leads to DoS
[ "cpe:/a:redhat:rhel_extras_rt:7" ]
null
5.1
6.8
null
RHBA-2015:0364
Red Hat Bug Fix Advisory: nss, nss-softokn, nss-util, and nspr bug fix and enhancement update
Mozilla: Out of bounds write in NSPR (MFSA 2014-55)
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
null
null
RHSA-2023:1407
Red Hat Security Advisory: thunderbird security update
Mozilla: Incorrect code generation during JIT compilation Mozilla: Potential out-of-bounds when accessing throttled streams Mozilla: Invalid downcast in Worklets Mozilla: URL being dragged from a removed cross-origin iframe into the same tab triggered navigation Mozilla: Memory safety bugs fixed in Firefox 111 and Firefox ESR 102.9
[ "cpe:/a:redhat:enterprise_linux:9::appstream" ]
null
8.8
null
null
RHSA-2013:1028
Red Hat Security Advisory: Fuse ESB Enterprise 7.1.0 update
apache-cxf: XML encryption backwards compatibility attacks rubygem-json: Denial of Service and SQL Injection ruby: entity expansion DoS vulnerability in REXML apache-cxf: Multiple denial of service flaws in the StAX parser
[ "cpe:/a:redhat:fuse_esb_enterprise:7.1.0" ]
null
null
null
null
RHSA-2022:6429
Red Hat Security Advisory: Migration Toolkit for Containers (MTC) 1.7.4 security and bug fix update
nodejs-lodash: ReDoS via the toNumber, trim and trimEnd functions nodejs-lodash: command injection via template nodejs-url-parse: authorization bypass through user-controlled key npm-url-parse: Authorization Bypass Through User-Controlled Key npm-url-parse: Authorization bypass through user-controlled key npm-url-parse: authorization bypass through user-controlled key eventsource: Exposure of Sensitive Information golang: compress/gzip: stack exhaustion in Reader.Read
[ "cpe:/a:redhat:rhmt:1.7::el8" ]
null
7.5
null
null