id
stringlengths
13
15
title
stringlengths
29
176
description
stringlengths
8
32.1k
cpes
listlengths
0
20
cvss_v4_0
null
cvss_v3_1
float64
0
10
cvss_v3_0
float64
0
10
cvss_v2_0
null
RHSA-2022:1108
Red Hat Security Advisory: Red Hat Process Automation Manager 7.12.1 security update
netty: Information disclosure via the local system temporary directory springframework: malicious input leads to insertion of additional log entries apache-commons-io: Limited path traversal in Apache Commons IO 2.2 to 2.6 jdom: XXE allows attackers to cause a DoS via a crafted HTTP request logback: remote code execution through JNDI call from within its configuration file
[ "cpe:/a:redhat:jboss_enterprise_bpms_platform:7.12" ]
null
6.6
null
null
RHSA-2020:2617
Red Hat Security Advisory: security update - Red Hat Ansible Tower 3.7.1-1 - RHEL7 Container
Tower: rsyslog configuration has world readable permissions
[ "cpe:/a:redhat:ansible_tower:3.7::el7" ]
null
6.5
null
null
RHSA-2022:0815
Red Hat Security Advisory: firefox security update
expat: Malformed 2- and 3-byte UTF-8 sequences can lead to arbitrary code execution expat: Namespace-separator characters in "xmlns[:prefix]" attribute values can lead to arbitrary code execution expat: Integer overflow in storeRawNames() Mozilla: Use-after-free in text reflows Mozilla: Browser window spoof using fullscreen mode Mozilla: iframe allow-scripts sandbox bypass Mozilla: Temporary files downloaded to /tmp and accessible by other local users Mozilla: Time-of-check time-of-use bug when verifying add-on signatures Mozilla: Use-after-free in XSLT parameter processing Mozilla: Use-after-free in WebGPU IPC Framework
[ "cpe:/a:redhat:rhel_e4s:8.1::appstream" ]
null
8.8
7.5
null
RHSA-2023:5475
Red Hat Security Advisory: thunderbird security update
firefox: use-after-free in workers Mozilla: Out-of-bounds write in PathOps Mozilla: Use-after-free in Ion Compiler Mozilla: Memory safety bugs fixed in Firefox 118, Firefox ESR 115.3, and Thunderbird 115.3 libvpx: Heap buffer overflow in vp8 encoding in libvpx
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
8.8
null
null
RHSA-2019:3024
Red Hat Security Advisory: ovirt-web-ui security and bug fix update
bootstrap: XSS in the tooltip or popover data-template attribute nodejs-lodash: prototype pollution in defaultsDeep function leading to modifying properties jquery: Prototype pollution in object's prototype leading to denial of service, remote code execution, or property injection
[ "cpe:/a:redhat:rhev_manager:4.3" ]
null
null
5.6
null
RHSA-2022:8686
Red Hat Security Advisory: kpatch-patch security update
kernel: KVM: cmpxchg_gpte can write to pfns outside the userspace region
[ "cpe:/o:redhat:rhel_eus:8.4::baseos" ]
null
7
null
null
RHSA-2020:1538
Red Hat Security Advisory: AMQ Online security update
netty: compression/decompression codecs don't enforce limits on buffer allocation sizes
[ "cpe:/a:redhat:amq_online:1.4" ]
null
7.5
null
null
RHSA-2016:0632
Red Hat Security Advisory: Red Hat Ceph Storage 1.2 - 45 Day Retirement Notice
This is the 45-day notification for the retirement of Red Hat Ceph Storage 1.2.
[ "cpe:/a:redhat:ceph_storage:1.2::centos:6", "cpe:/a:redhat:ceph_storage:1.2::el6", "cpe:/a:redhat:ceph_storage:1.2::ubuntu:12.04" ]
null
null
null
null
RHSA-2023:5155
Red Hat Security Advisory: [impact]: OpenShift Container Platform 4.13.13 bug fix and security update
distribution/distribution: DoS from malicious API request
[ "cpe:/a:redhat:openshift:4.13::el8", "cpe:/a:redhat:openshift:4.13::el9" ]
null
6.5
null
null
RHSA-2014:1354
Red Hat Security Advisory: rhev-hypervisor6 security update
nss: RSA PKCS#1 signature verification forgery flaw (MFSA 2014-73) bash: specially-crafted environment variables can be used to inject shell commands bash: code execution via specially-crafted environment (Incomplete fix for CVE-2014-6271) bash: parser can allow out-of-bounds memory access while handling redir_stack bash: off-by-one error in deeply nested flow control constructs
[ "cpe:/a:redhat:rhev_manager:3" ]
null
null
null
null
RHSA-2022:6354
Red Hat Security Advisory: open-vm-tools security update
open-vm-tools: local root privilege escalation in the virtual machine
[ "cpe:/a:redhat:rhel_e4s:8.1::appstream" ]
null
7
null
null
RHSA-2018:0980
Red Hat Security Advisory: openssh security, bug fix, and enhancement update
openssh: Improper write operations in readonly mode allow for zero-length file creation
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
4.3
null
RHSA-2021:1586
Red Hat Security Advisory: GNOME security, bug fix, and enhancement update
glib2: insecure permissions for files and directories webkitgtk: type confusion may lead to arbitrary code execution webkitgtk: use-after-free may lead to arbitrary code execution webkitgtk: out-of-bounds write may lead to code execution webkitgtk: use-after-free may lead to arbitrary code execution webkitgtk: use-after-free may lead to arbitrary code execution gdm: inability to timely contact accountservice via dbus leads gnome-initial-setup to creation of account with admin privileges webkitgtk: Memory corruption leading to arbitrary code execution webkitgtk: Memory initialization issue possibly leading to memory disclosure webkitgtk: Input validation issue leading to cross site scripting attack webkitgtk: Logic issue leading to universal cross site scripting attack webkitgtk: Use-after-free leading to arbitrary code execution
[ "cpe:/a:redhat:enterprise_linux:8::appstream", "cpe:/a:redhat:enterprise_linux:8::crb", "cpe:/o:redhat:enterprise_linux:8::baseos" ]
null
8.8
4.4
null
RHSA-2024:0244
Red Hat Security Advisory: java-17-openjdk security and bug fix update
OpenJDK: array out-of-bounds access due to missing range check in C1 compiler (8314468) OpenJDK: JVM class file verifier flaw allows unverified bytecode execution (8314295) OpenJDK: range check loop optimization issue (8314307) OpenJDK: incorrect handling of ZIP files with duplicate entries (8276123) OpenJDK: logging of digital signature private keys (8316976) OpenJDK: RSA padding issue and timing side-channel attack against TLS (8317547)
[ "cpe:/a:redhat:rhel_eus:9.0::appstream", "cpe:/a:redhat:rhel_eus:9.0::crb" ]
null
7.4
null
null
RHSA-2018:1883
Red Hat Security Advisory: samba4 security and bug fix update
samba: NULL pointer dereference in printer server process
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
4.3
null
RHSA-2024:10851
Red Hat Security Advisory: postgresql:15 security update
postgresql: PostgreSQL PL/Perl environment variable changes execute arbitrary code
[ "cpe:/a:redhat:rhel_eus:8.8::appstream" ]
null
8.8
null
null
RHSA-2017:0263
Red Hat Security Advisory: java-1.8.0-ibm security update
OpenJDK: incorrect ECDSA signature extraction from the DER input (Libraries, 8168714) OpenJDK: missing ObjectIdentifier length check (Libraries, 8168705) OpenJDK: DSA implementation timing attack (Libraries, 8168728) OpenJDK: ECDSA implementation timing attack (Libraries, 8168724) OpenJDK: incorrect URL parsing in URLStreamHandler (Networking, 8167223) OpenJDK: URLClassLoader insufficient access control checks (Networking, 8151934) OpenJDK: untrusted input deserialization in RMI registry and DCG (RMI, 8156802) OpenJDK: LdapLoginModule incorrect userDN extraction (JAAS, 8161743) OpenJDK: imageio PNGImageReader failed to honor ignoreMetadata for iTXt and zTXt chunks (2D, 8166988) JDK: unspecified vulnerability fixed in 6u141, 7u131, and 8u121 (Deployment) OpenJDK: integer overflow in SocketOutputStream boundary check (Networking, 8164147) OpenJDK: insufficient protected field access checks in atomic field updaters (Libraries, 8165344) OpenJDK: insecure class construction (Hotspot, 8167104)
[ "cpe:/a:redhat:rhel_extras:6", "cpe:/a:redhat:rhel_extras:7" ]
null
null
8.8
null
RHSA-2015:0033
Red Hat Security Advisory: Red Hat Satellite 5.7.0 General Availability
Spacewalk: multiple XSS Spacewalk: XSS in system-group
[ "cpe:/a:redhat:network_satellite:5.7::el6", "cpe:/a:redhat:network_satellite_managed_db:5.7::el6" ]
null
null
null
null
RHSA-2011:1434
Red Hat Security Advisory: acroread security update
acroread: multiple code execution flaws (APSB11-16) acroread: multiple code execution flaws (APSB11-16) acroread: multiple code execution flaws (APSB11-16) acroread: multiple code execution flaws (APSB11-16) acroread: multiple code execution flaws (APSB11-16) acroread: multiple code execution flaws (APSB11-16) acroread: multiple code execution flaws (APSB11-16) acroread: Multiple denial of service flaws (APSB11-16) acroread: Multiple denial of service flaws (APSB11-16) flash-plugin: Cross-site scripting vulnerability (APSB11-13) flash-plugin: multiple arbitrary code execution flaws (APSB-11-21) flash-plugin: multiple arbitrary code execution flaws (APSB-11-21) flash-plugin: multiple arbitrary code execution flaws (APSB-11-21) flash-plugin: multiple arbitrary code execution flaws (APSB-11-21) flash-plugin: multiple arbitrary code execution flaws (APSB-11-21) flash-plugin: multiple arbitrary code execution flaws (APSB-11-21) flash-plugin: multiple arbitrary code execution flaws (APSB-11-21) flash-plugin: multiple arbitrary code execution flaws (APSB-11-21) flash-plugin: multiple arbitrary code execution flaws (APSB-11-21) flash-plugin: multiple arbitrary code execution flaws (APSB-11-21) flash-plugin: multiple arbitrary code execution flaws (APSB-11-21) flash-plugin: multiple arbitrary code execution flaws (APSB-11-21) flash-plugin: multiple arbitrary code execution flaws (APSB-11-21) flash-plugin: multiple arbitrary code execution flaws (APSB-11-21) flash-plugin: critical flaws fixed in APSB11-26 flash-plugin: critical flaws fixed in APSB11-26 flash-plugin: critical flaws fixed in APSB11-26 flash-plugin: security control bypass information disclosure fixed in APSB11-26 flash-plugin: critical flaws fixed in APSB11-26 acroread: multiple code execution flaws (APSB11-24) acroread: multiple code execution flaws (APSB11-24) acroread: multiple code execution flaws (APSB11-24) acroread: multiple code execution flaws (APSB11-24) acroread: multiple code execution flaws (APSB11-24) acroread: multiple code execution flaws (APSB11-24) acroread: multiple code execution flaws (APSB11-24) acroread: multiple code execution flaws (APSB11-24) acroread: multiple code execution flaws (APSB11-24) acroread: multiple code execution flaws (APSB11-24) acroread: multiple code execution flaws (APSB11-24) flash-plugin: Cross-site scripting vulnerability fixed in APSB11-26 acroread: multiple code execution flaws (APSB11-24)
[ "cpe:/a:redhat:rhel_extras:4", "cpe:/a:redhat:rhel_extras:5::client", "cpe:/a:redhat:rhel_extras:5::server", "cpe:/a:redhat:rhel_extras:6" ]
null
null
null
null
RHSA-2025:0823
Red Hat Security Advisory: traceroute security update
traceroute: improper command line parsing
[ "cpe:/o:redhat:rhel_eus:8.8::baseos" ]
null
5.5
null
null
RHSA-2024:2985
Red Hat Security Advisory: python39:3.9 and python39-devel:3.9 security update
pypa-setuptools: Regular Expression Denial of Service (ReDoS) in package_index.py python-cryptography: memory corruption via immutable objects python: Parsing errors in email/_parseaddr.py lead to incorrect value in email address part of tuple python-urllib3: Cookie request header isn't stripped during cross-origin redirects
[ "cpe:/a:redhat:enterprise_linux:8::appstream", "cpe:/a:redhat:enterprise_linux:8::crb" ]
null
5.9
null
null
RHSA-2017:0454
Red Hat Security Advisory: kvm security update
Qemu: display: cirrus: oob access while doing bitblt copy backward mode Qemu: display: cirrus: potential arbitrary code execution via cirrus_bitblt_cputovideo
[ "cpe:/a:redhat:rhel_virtualization:5::client", "cpe:/a:redhat:rhel_virtualization:5::server" ]
null
null
5.5
null
RHSA-2023:3822
Red Hat Security Advisory: virt:rhel and virt-devel:rhel security and bug fix update
libvirt: Memory leak in virPCIVirtualFunctionList cleanup
[ "cpe:/a:redhat:enterprise_linux:8::appstream", "cpe:/a:redhat:enterprise_linux:8::crb" ]
null
6.3
null
null
RHSA-2024:1354
Red Hat Security Advisory: rh-nodejs14 security update
nodejs: reading unprocessed HTTP request with unbounded chunk extension allows DoS attacks
[ "cpe:/a:redhat:rhel_software_collections:3::el7" ]
null
7.5
null
null
RHSA-2012:1010
Red Hat Security Advisory: mod_cluster security update
mod_cluster registers and exposes the root context of a server by default, despite ROOT being in the excluded-contexts list
[ "cpe:/a:redhat:jboss_enterprise_application_platform:5.1" ]
null
null
null
null
RHSA-2024:0435
Red Hat Security Advisory: rpm security update
rpm: TOCTOU race in checks for unsafe symlinks rpm: races with chown/chmod/capabilities calls during installation rpm: checks for unsafe symlinks are not performed for intermediary directories
[ "cpe:/a:redhat:rhel_eus:9.0::appstream", "cpe:/o:redhat:rhel_eus:9.0::baseos" ]
null
6.5
null
null
RHSA-2023:0758
Red Hat Security Advisory: Red Hat build of Quarkus 2.13.7 release and security update
SnakeYaml: Constructor Deserialization Remote Code Execution codec-haproxy: HAProxyMessageDecoder Stack Exhaustion DoS postgresql-jdbc: Information leak of prepared statement data due to insecure temporary file permissions mina-sshd: Java unsafe deserialization vulnerability quarkus-vertx-http: a cross-site attack may be initiated which might lead to the Information Disclosure
[ "cpe:/a:redhat:quarkus:2.13" ]
null
5.3
null
null
RHSA-2009:0006
Red Hat Security Advisory: rhpki security and bug fix update
System: insecure config file permissions System: plain text passwords stored in debug log
[ "cpe:/a:redhat:certificate_system:7.2" ]
null
null
null
null
RHSA-2022:7548
Red Hat Security Advisory: Image Builder security, bug fix, and enhancement update
golang: math/big: decoding big.Float and big.Rat types can panic if the encoded message is too short, potentially allowing a denial of service
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
6.5
null
null
RHSA-2024:2006
Red Hat Security Advisory: kernel security and bug fix update
kernel: netfilter: divide error in nft_limit_init kernel: use-after-free in smb2_is_status_io_timeout() kernel: tun: bugs for oversize packet when napi frags enabled in tun_napi_alloc_frags kernel: vmxnet3: NULL pointer dereference in vmxnet3_rq_cleanup() kernel: refcount leak in ctnetlink_create_conntrack() kernel: mlxsw: spectrum_acl_tcam: Fix stack corruption kernel: sched/membarrier: reduce the ability to hammer on sys_membarrier
[ "cpe:/o:redhat:rhel_aus:8.2::baseos", "cpe:/o:redhat:rhel_e4s:8.2::baseos", "cpe:/o:redhat:rhel_tus:8.2::baseos" ]
null
4.7
null
null
RHSA-2022:5314
Red Hat Security Advisory: expat security update
expat: Stack exhaustion in doctype parsing expat: Integer overflow in copyString()
[ "cpe:/o:redhat:enterprise_linux:8::baseos" ]
null
7.5
null
null
RHSA-2018:2228
Red Hat Security Advisory: qemu-kvm-rhev security update
hw: cpu: speculative store bypass
[ "cpe:/a:redhat:openstack:13::el7" ]
null
null
5.6
null
RHSA-2013:0624
Red Hat Security Advisory: java-1.5.0-ibm security update
OpenJDK: disable Gopher support by default (Gopher, 7189567) JDK: unspecified vulnerability fixed in 6u39 and 7u13 (JMX) OpenJDK: RMI CGIHandler XSS issue (RMI, 6563318) OpenJDK: logging insufficient access control checks (Libraries, 6664509) OpenJDK: logging insufficient access control checks (Libraries, 6664528) OpenJDK: invalid threads subject to interrupts (Libraries, 6776941) OpenJDK: reflection API incorrect checks for proxy classes (Libraries, 7197546, SE-2012-01 Issue 29) OpenJDK: insufficient clipboard access premission checks (AWT, 7186952) OpenJDK: InetSocketAddress serialization issue (Networking, 7201071) OpenJDK: loadPropertyFile missing restrictions (JAXP, 8001235) OpenJDK: CPU consumption DoS via repeated SSL ClientHello packets (JSSE, 7192393) OpenJDK: insufficient privilege checking issue (AWT, 7192977) OpenJDK: insufficient Diffie-Hellman public key checks (JSSE, 7192392) OpenJDK: insufficient privilege checking issue (AWT, 8001057) OpenJDK: RequiredModelMBean missing access control context checks (JMX, 8000537) OpenJDK: Specially crafted sample model integer overflow (2D, 8007014) OpenJDK: missing ValueHandlerImpl class constructor access restriction (CORBA, 8000631) OpenJDK: image parser insufficient raster parameter checks (2D, 8001972) OpenJDK: image parser insufficient raster parameter checks (AWT, 8002325) JDK: unspecified vulnerability fixed in 6u39 (Sound) OpenJDK: MBeanServer insufficient privilege restrictions (JMX, 8006446) OpenJDK: CMM malformed raster memory corruption (2D, 8007675)
[ "cpe:/a:redhat:rhel_extras:5::server", "cpe:/a:redhat:rhel_extras:6" ]
null
null
null
null
RHSA-2024:1867
Red Hat Security Advisory: Red Hat build of Keycloak 22.0.10 enhancement and security update
keycloak: impersonation via logout token exchange keycloak: secondary factor bypass in step-up authentication keycloak: Log Injection during WebAuthn authentication or registration keycloak: Authorization Bypass keycloak: XSS via assertion consumer service URL in SAML POST-binding flow keycloak: session hijacking via re-authentication keycloak: path transversal in redirection validation keycloak: org.keycloak.protocol.oidc: unvalidated cross-origin messages in checkLoginIframe leads to DDoS keycloak: path traversal in the redirect validation
[ "cpe:/a:redhat:build_keycloak:22::el9" ]
null
7.1
null
null
RHSA-2004:615
Red Hat Security Advisory: libxml2 security update
libxml2 various overflows
[ "cpe:/o:redhat:enterprise_linux:3::as", "cpe:/o:redhat:enterprise_linux:3::desktop", "cpe:/o:redhat:enterprise_linux:3::es", "cpe:/o:redhat:enterprise_linux:3::ws" ]
null
null
null
null
RHSA-2014:0500
Red Hat Security Advisory: struts security update
1: Class Loader manipulation via request parameters
[ "cpe:/a:redhat:network_satellite:5.4::el6", "cpe:/a:redhat:network_satellite:5.5::el6", "cpe:/a:redhat:network_satellite:5.6::el6" ]
null
null
null
null
RHBA-2019:3384
Red Hat Bug Fix Advisory: ruby:2.5 bug fix and enhancement update
rubygems: Delete directory using symlink when decompressing tar rubygems: Escape sequence injection vulnerability in verbose rubygems: Escape sequence injection vulnerability in gem owner rubygems: Escape sequence injection vulnerability in API response handling rubygems: Escape sequence injection vulnerability in errors
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
null
5.3
null
RHSA-2023:4063
Red Hat Security Advisory: thunderbird security update
Mozilla: Use-after-free in WebRTC certificate generation Mozilla: Potential use-after-free from compartment mismatch in SpiderMonkey Mozilla: Fullscreen notification obscured Mozilla: Lack of warning when opening Diagcab files Mozilla: Memory safety bugs fixed in Firefox 115, Firefox ESR 102.13, and Thunderbird 102.13
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
8.8
null
null
RHSA-2017:2489
Red Hat Security Advisory: mercurial security update
Mercurial: pathaudit: path traversal via symlink mercurial: command injection on clients through malicious ssh URLs
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
6.3
null
RHEA-2021:3287
Red Hat Enhancement Advisory: Red Hat OpenShift Service on AWS 1.0 enhancements
golang: crypto/tls: certificate of wrong type is causing TLS client to panic
[ "cpe:/a:redhat:openshift_service_on_aws:1::el8" ]
null
6.5
null
null
RHSA-2023:5747
Red Hat Security Advisory: java-17-openjdk security and bug fix update
OpenJDK: memory corruption issue on x86_64 with AVX-512 (8317121) OpenJDK: certificate path validation issue during client authentication (8309966)
[ "cpe:/a:redhat:rhel_aus:8.4::appstream", "cpe:/a:redhat:rhel_e4s:8.4::appstream", "cpe:/a:redhat:rhel_tus:8.4::appstream" ]
null
5.3
null
null
RHSA-2024:10517
Red Hat Security Advisory: OpenShift Container Platform 4.17.7 security and extras update
PostCSS: Improper input validation in PostCSS
[ "cpe:/a:redhat:openshift:4.17::el9" ]
null
5.3
null
null
RHSA-2020:0172
Red Hat Security Advisory: openvswitch2.12 security and bug fix update
dpdk: possible memory leak leads to denial of service
[ "cpe:/o:redhat:enterprise_linux:8::fastdatapath" ]
null
null
7.5
null
RHSA-2019:2494
Red Hat Security Advisory: java-1.7.1-ibm security update
OpenJDK: Insufficient checks of suppressed exceptions in deserialization (Utilities, 8212328) OpenJDK: Unbounded memory allocation during deserialization in Collections (Utilities, 8213432) OpenJDK: Missing URL format validation (Networking, 8221518) libpng: use-after-free in png_image_free in png.c JDK: Failure to privatize a value pulled out of the loop by versioning
[ "cpe:/a:redhat:rhel_extras:6" ]
null
7.4
5.3
null
RHSA-2011:1479
Red Hat Security Advisory: kernel security, bug fix, and enhancement update
kernel: tpm: infoleak virt: VT-d (PCI passthrough) MSI trap injection kernel: hfs_find_init() sb->ext_tree NULL pointer dereference kernel: taskstats io infoleak kernel: cifs: always do is_path_accessible check in cifs_mount kernel: keys: NULL pointer deref in the user-defined key type
[ "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
RHSA-2023:5744
Red Hat Security Advisory: java-11-openjdk security and bug fix update
OpenJDK: certificate path validation issue during client authentication (8309966)
[ "cpe:/a:redhat:enterprise_linux:9::appstream", "cpe:/a:redhat:enterprise_linux:9::crb" ]
null
5.3
null
null
RHSA-2012:0050
Red Hat Security Advisory: qemu-kvm security, bug fix, and enhancement update
qemu: e1000: process_tx_desc legacy mode packets heap overflow
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
null
null
RHSA-2024:0759
Red Hat Security Advisory: container-tools:rhel8 security update
runc: file descriptor leak
[ "cpe:/a:redhat:rhel_eus:8.8::appstream" ]
null
8.6
null
null
RHSA-2023:4415
Red Hat Security Advisory: iperf3 security update
iperf3: memory allocation hazard and crash
[ "cpe:/a:redhat:rhel_aus:8.2::appstream", "cpe:/a:redhat:rhel_e4s:8.2::appstream", "cpe:/a:redhat:rhel_tus:8.2::appstream" ]
null
7.5
null
null
RHSA-2022:5188
Red Hat Security Advisory: RHACS 3.69 security update
golang.org/x/crypto: empty plaintext packet causes panic stackrox: Improper sanitization allows users to retrieve Notifier secrets from GraphQL API in plaintext
[ "cpe:/a:redhat:advanced_cluster_security:3.69::el8" ]
null
8.8
null
null
RHSA-2014:0914
Red Hat Security Advisory: libvirt security and bug fix update
libvirt: unsafe parsing of XML documents allows libvirt DoS and/or arbitrary file read libvirt: unsafe parsing of XML documents allows libvirt DoS and/or arbitrary file read
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
null
null
RHSA-2025:3165
Red Hat Security Advisory: podman security update
golang.org/x/crypto/ssh: Denial of Service in the Key Exchange of golang.org/x/crypto/ssh
[ "cpe:/a:redhat:rhel_e4s:9.0::appstream" ]
null
7.5
null
null
RHSA-2005:612
Red Hat Security Advisory: kdelibs security update
security flaw
[ "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws" ]
null
null
null
null
RHSA-2020:4553
Red Hat Security Advisory: systemd security, bug fix, and enhancement update
systemd: memory leak in button_open() in login/logind-button.c when udev events are received
[ "cpe:/o:redhat:enterprise_linux:8::baseos" ]
null
2.4
null
null
RHSA-2015:0629
Red Hat Security Advisory: firefox security update
Mozilla: Reading of local files through manipulation of form autocomplete (MFSA 2015-24) Mozilla: Out-of-bounds read and write while rendering SVG content (MFSA 2015-19) Mozilla: Use-after-free in IndexedDB (MFSA 2015-16) Mozilla: Miscellaneous memory safety hazards (rv:31.5) (MFSA 2015-11)
[ "cpe:/o:redhat:enterprise_linux:7::server" ]
null
null
null
null
RHSA-2015:2545
Red Hat Security Advisory: chromium-browser security update
v8: unspecified out-of-bounds access vulnerability chromium-browser: Use-after-free in AppCache chromium-browser: Use-after-free in AppCache chromium-browser: Use-after-free in AppCache chromium-browser: Cross-origin bypass in DOM chromium-browser: Cross-origin bypass in core chromium-browser: Cross-origin bypass in DOM chromium-browser: Out of bounds access in v8 chromium-browser: Cross-origin bypass in DOM chromium-browser: Out of bounds access in Skia chromium-browser: Use-after-free in Extensions chromium-browser: Type confusion in PDFium chromium-browser: Out of bounds access in PDFium chromium-browser: Use-after-free in DOM chromium-browser: Out of bounds access in PDFium chromium-browser: Scheme bypass in PDFium chromium-browser: Use-after-free in Infobars chromium-browser: Integer overflow in Sfntly chromium-browser: Content spoofing in Omnibox chromium-browser: Escaping issue in saved pages chromium-browser: Wildcard matching issue in CSP chromium-browser: Scheme bypass in CSP chromium-browser: Various fixes from internal audits v8: multiple vulnerabilities fixed in 4.7.80.23 chromium-browser: Various fixes from internal audits chromium-browser: Various fixes from internal audits
[ "cpe:/a:redhat:rhel_extras:6" ]
null
null
null
null
RHSA-2007:1030
Red Hat Security Advisory: xpdf security update
t1lib font filename string overflow DCTStream:: readProgressiveDataUnit() DCTStream:: reset() CCITTFaxStream:: lookChar()
[ "cpe:/o:redhat:enterprise_linux:3::as", "cpe:/o:redhat:enterprise_linux:3::desktop", "cpe:/o:redhat:enterprise_linux:3::es", "cpe:/o:redhat:enterprise_linux:3::ws" ]
null
null
null
null
RHSA-2020:1509
Red Hat Security Advisory: java-11-openjdk security update
OpenJDK: Misplaced regular expression syntax error check in RegExpScanner (Scripting, 8223898) OpenJDK: Incorrect handling of empty string nodes in regular expression Parser (Scripting, 8223904) OpenJDK: Incorrect handling of references to uninitialized class descriptors during deserialization (Serialization, 8224541) OpenJDK: Uncaught InstantiationError exception in ObjectStreamClass (Serialization, 8224549) OpenJDK: Incorrect handling of Certificate messages during TLS handshake (JSSE, 8232581) OpenJDK: Unexpected exceptions raised by DOMKeyInfoFactory and DOMXMLSignatureFactory (Security, 8231415) OpenJDK: Incomplete enforcement of algorithm restrictions for TLS (JSSE, 8232424) OpenJDK: Re-use of single TLS session for new connections (JSSE, 8234408) OpenJDK: CRLF injection into HTTP headers in HttpServer (Lightweight HTTP Server, 8234825) OpenJDK: Incorrect bounds checks in NIO Buffers (Libraries, 8234841) OpenJDK: Incorrect type checks in MethodType.readObject() (Libraries, 8235274) OpenJDK: Application data accepted before TLS handshake completion (JSSE, 8235691) OpenJDK: Regular expression DoS in Scanner (Concurrency, 8236201)
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
5.3
null
null
RHSA-2019:4113
Red Hat Security Advisory: java-1.8.0-ibm security update
OpenJDK: Missing restrictions on use of custom SocketImpl (Networking, 8218573) OpenJDK: NULL pointer dereference in DrawGlyphList (2D, 8222690) OpenJDK: Unexpected exception thrown by Pattern processing crafted regular expression (Concurrency, 8222684) OpenJDK: Unexpected exception thrown by XPathParser processing crafted XPath expression (JAXP, 8223505) OpenJDK: Unexpected exception thrown during regular expression processing in Nashorn (Scripting, 8223518) OpenJDK: Incorrect handling of nested jar: URLs in Jar URL handler (Networking, 8223892) OpenJDK: Unexpected exception thrown by XPath processing crafted XPath expression (JAXP, 8224532) OpenJDK: Unexpected exception thrown during Font object deserialization (Serialization, 8224915) OpenJDK: Integer overflow in bounds check in SunGraphics2D (2D, 8225292) OpenJDK: Incorrect handling of HTTP proxy responses in HttpURLConnection (Networking, 8225298) OpenJDK: Excessive memory allocation in CMap when reading TrueType font (2D, 8225597) JDK: unspecified vulnerability fixed in 8u221 (Deployment) OpenJDK: Insufficient filtering of HTML event attributes in Javadoc (Javadoc, 8226765) JDK: Unrestricted access to diagnostic operations
[ "cpe:/a:redhat:rhel_extras:6" ]
null
null
8.4
null
RHSA-2003:016
Red Hat Security Advisory: fileutils security update
security flaw
[ "cpe:/o:redhat:enterprise_linux:2.1::as", "cpe:/o:redhat:enterprise_linux:2.1::aw" ]
null
null
null
null
RHSA-2024:6705
Red Hat Security Advisory: OpenShift Container Platform 4.12.66 security update
openshift/builder: Path traversal allows command injection in privileged BuildContainer using docker build strategy openshift-controller-manager: Elevated Build Pods Can Lead to Node Compromise in OpenShift
[ "cpe:/a:redhat:openshift:4.12::el8" ]
null
9.9
null
null
RHSA-2024:1916
Red Hat Security Advisory: Red Hat JBoss Web Server 6.0.2 release and security update
Tomcat: WebSocket DoS with incomplete closing handshake
[ "cpe:/a:redhat:jboss_enterprise_web_server:6.0::el8", "cpe:/a:redhat:jboss_enterprise_web_server:6.0::el9" ]
null
7.5
null
null
RHSA-2024:4077
Red Hat Security Advisory: python3.11 security update
python: Path traversal on tempfile.TemporaryDirectory
[ "cpe:/a:redhat:enterprise_linux:9::appstream", "cpe:/a:redhat:enterprise_linux:9::crb" ]
null
7.8
null
null
RHSA-2020:4676
Red Hat Security Advisory: virt:rhel and virt-devel:rhel security, bug fix, and enhancement update
QEMU: Slirp: use-after-free during packet reassembly libvirt: Potential DoS by holding a monitor job while querying QEMU guest-agent QEMU: slirp: use-after-free in ip_reass() function in ip_input.c libvirt: Potential denial of service via active pool without target path libvirt: leak of sensitive cookie information via dumpxml libvirt: leak of /dev/mapper/control into QEMU guests
[ "cpe:/a:redhat:enterprise_linux:8::appstream", "cpe:/a:redhat:enterprise_linux:8::crb" ]
null
8.8
5.6
null
RHSA-2023:7515
Red Hat Security Advisory: Red Hat OpenShift for Windows Containers 9.0.0 security update
kubernetes: Insufficient input sanitization on Windows nodes leads to privilege escalation kubernetes: Insufficient input sanitization on Windows nodes leads to privilege escalation golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487)
[ "cpe:/a:redhat:openshift:4.14::el9" ]
null
7.5
null
null
RHSA-2024:6991
Red Hat Security Advisory: kernel security update
kernel: hwmon: (mlxreg-fan) Return non-zero value when fan current state is enforced from sysfs kernel: net/smc: Fix NULL pointer dereferencing in smc_vlan_by_tcpsk() kernel: powerpc/fixmap: Fix VM debug warning on unmap kernel: xprtrdma: fix pointer derefs in error cases of rpcrdma_ep_create kernel: vsock: remove vsock from connected table when connect is interrupted by a signal kernel: perf: Fix list corruption in perf_cgroup_switch() kernel: SUNRPC: lock against ->sock changing during sysfs read kernel: mm/sparsemem: fix race in accessing memory_section->usage kernel: ACPICA: Revert "ACPICA: avoid Info: mapping multiple BARs. Your kernel is fine." kernel: net/sched: act_api: fix possible infinite loop in tcf_idr_check_alloc() kernel: mm: prevent derefencing NULL ptr in pfn_section_valid() kernel: wifi: mac80211: Avoid address calculations via out of bounds array indexing
[ "cpe:/a:redhat:rhel_e4s:9.0::appstream", "cpe:/o:redhat:rhel_e4s:9.0::baseos" ]
null
7.8
null
null
RHSA-2016:0129
Red Hat Security Advisory: python-django security update
python-django: Information leak through date template filter
[ "cpe:/a:redhat:openstack:6::el7" ]
null
null
null
null
RHSA-2024:2932
Red Hat Security Advisory: logging for Red Hat OpenShift security update
golang: net/http, x/net/http2: unlimited number of CONTINUATION frames causes DoS
[ "cpe:/a:redhat:logging:5.8::el9" ]
null
7.5
null
null
RHSA-2020:2894
Red Hat Security Advisory: dbus security update
dbus: denial of service via file descriptor leak
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
6.5
null
null
RHSA-2024:2119
Red Hat Security Advisory: Image builder components bug fix, enhancement and security update
osbuild-composer: race condition may disable GPG verification for package repositories
[ "cpe:/a:redhat:enterprise_linux:9::appstream" ]
null
6.1
null
null
RHSA-2022:8851
Red Hat Security Advisory: Red Hat OpenStack Platform 16.2.4 (rabbitmq-server) security update
rabbitmq-server: improper neutralization of script-related HTML tags in a web page (basic XSS) in management UI rabbitmq-server: improper neutralization of script-related HTML tags in a web page (basic XSS) in federation management plugin
[ "cpe:/a:redhat:openstack:16.2::el8" ]
null
4.8
null
null
RHSA-2020:4670
Red Hat Security Advisory: idm:DL1 and idm:client security, bug fix, and enhancement update
jquery: Cross-site scripting via cross-domain ajax requests bootstrap: XSS in the data-target attribute bootstrap: Cross-site Scripting (XSS) in the collapse data-parent attribute bootstrap: Cross-site Scripting (XSS) in the data-container property of tooltip bootstrap: XSS in the tooltip data-viewport attribute bootstrap: XSS in the affix configuration target property bootstrap: XSS in the tooltip or popover data-template attribute jquery: Prototype pollution in object's prototype leading to denial of service, remote code execution, or property injection ipa: No password length restriction leads to denial of service jquery: Cross-site scripting due to improper injQuery.htmlPrefilter method
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
6.1
5.6
null
RHSA-2024:4911
Red Hat Security Advisory: freeradius security update
freeradius: forgery attack
[ "cpe:/o:redhat:rhel_els:7" ]
null
9
null
null
RHSA-2022:9073
Red Hat Security Advisory: nodejs:16 security, bug fix, and enhancement update
nodejs: Improper handling of URI Subject Alternative Names nodejs: Certificate Verification Bypass via String Injection nodejs: Incorrect handling of certificate subject and issuer fields minimist: prototype pollution nodejs-minimatch: ReDoS via the braceExpand function nodejs: Prototype pollution via console.table properties nodejs: DNS rebinding in inspect via invalid octal IP address
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
7.5
null
null
RHSA-2014:1924
Red Hat Security Advisory: thunderbird security update
Mozilla: Miscellaneous memory safety hazards (rv:31.3) (MFSA 2014-83) Mozilla: XMLHttpRequest crashes with some input streams (MFSA 2014-85) Mozilla: Use-after-free during HTML5 parsing (MFSA 2014-87) Mozilla: Buffer overflow while parsing media content (MFSA 2014-88) Mozilla: Bad casting from the BasicThebesLayer to BasicContainerLayer (MFSA 2014-89)
[ "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
null
null
RHSA-2016:0460
Red Hat Security Advisory: thunderbird security update
Mozilla: Miscellaneous memory safety hazards (rv:38.7) (MFSA 2016-16) Mozilla: Local file overwriting and potential privilege escalation through CSP reports (MFSA 2016-17) Mozilla: Memory leak in libstagefright when deleting an array during MP4 processing (MFSA 2016-20) Mozilla: Use-after-free in HTML5 string parser (MFSA 2016-23) Mozilla: Use-after-free in SetBody (MFSA 2016-24) Mozilla: Use-after-free during XML transformations (MFSA 2016-27) Mozilla: Memory corruption with malicious NPAPI plugin (MFSA 2016-31) Mozilla: Out-of-bounds read in HTML parser following a failed allocation (MFSA 2016-34) graphite2: multiple font parsing vulnerabilities (Mozilla MFSA 2016-37) graphite2: multiple font parsing vulnerabilities (Mozilla MFSA 2016-37) graphite2: multiple font parsing vulnerabilities (Mozilla MFSA 2016-37) graphite2: multiple font parsing vulnerabilities (Mozilla MFSA 2016-37) graphite2: multiple font parsing vulnerabilities (Mozilla MFSA 2016-37) graphite2: multiple font parsing vulnerabilities (Mozilla MFSA 2016-37) graphite2: multiple font parsing vulnerabilities (Mozilla MFSA 2016-37) graphite2: multiple font parsing vulnerabilities (Mozilla MFSA 2016-37) graphite2: multiple font parsing vulnerabilities (Mozilla MFSA 2016-37) graphite2: multiple font parsing vulnerabilities (Mozilla MFSA 2016-37) graphite2: multiple font parsing vulnerabilities (Mozilla MFSA 2016-37) graphite2: multiple font parsing vulnerabilities (Mozilla MFSA 2016-37) graphite2: multiple font parsing vulnerabilities (Mozilla MFSA 2016-37) graphite2: multiple font parsing vulnerabilities (Mozilla MFSA 2016-37)
[ "cpe:/a:redhat:rhel_productivity:5", "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation", "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
null
null
RHSA-2015:0727
Red Hat Security Advisory: kernel-rt security and bug fix update
kernel: infiniband: uverbs: unprotected physical memory access kernel: net: slab corruption from use after free on INIT collisions
[ "cpe:/a:redhat:rhel_extras_rt:7" ]
null
null
null
null
RHSA-2005:090
Red Hat Security Advisory: htdig security update
security flaw
[ "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws" ]
null
null
null
null
RHSA-2022:6711
Red Hat Security Advisory: firefox security update
Mozilla: Out of bounds read when decoding H264 Mozilla: Content-Security-Policy base-uri bypass Mozilla: Incoherent instruction cache when building WASM on ARM64 Mozilla: Bypassing Secure Context restriction for cookies with __Host and __Secure prefix Mozilla: Bypassing FeaturePolicy restrictions on transient pages Mozilla: Data-race when parsing non-UTF-8 URLs in threads Mozilla: Memory safety bugs fixed in Firefox 105 and Firefox ESR 102.3
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
8.8
7.5
null
RHSA-2011:1445
Red Hat Security Advisory: flash-plugin security update
flash-plugin: mulitple code execution flaws (APSB11-28) flash-plugin: mulitple code execution flaws (APSB11-28) flash-plugin: mulitple code execution flaws (APSB11-28) flash-plugin: mulitple code execution flaws (APSB11-28) flash-plugin: mulitple code execution flaws (APSB11-28) flash-plugin: mulitple code execution flaws (APSB11-28) flash-plugin: mulitple code execution flaws (APSB11-28) flash-plugin: mulitple code execution flaws (APSB11-28) flash-plugin: mulitple code execution flaws (APSB11-28) flash-plugin: mulitple code execution flaws (APSB11-28) flash-plugin: mulitple code execution flaws (APSB11-28)
[ "cpe:/a:redhat:rhel_extras:5::client", "cpe:/a:redhat:rhel_extras:5::server", "cpe:/a:redhat:rhel_extras:6" ]
null
null
null
null
RHSA-2023:5775
Red Hat Security Advisory: kpatch-patch security update
kernel: net/sched: cls_u32 component reference counter leak if tcf_change_indev() fails kernel: net/sched: cls_fw component can be exploited as result of failure in tcf_change_indev function kernel: net/sched: Use-after-free vulnerabilities in the net/sched classifiers: cls_fw, cls_u32 and cls_route
[ "cpe:/o:redhat:rhel_e4s:8.4::baseos" ]
null
7.8
null
null
RHSA-2017:2912
Red Hat Security Advisory: rh-nodejs4-nodejs-tough-cookie security update
nodejs-tough-cookie: regular expression DoS via Cookie header with many semicolons nodejs-tough-cookie: Regular expression denial of service
[ "cpe:/a:redhat:rhel_software_collections:2::el6", "cpe:/a:redhat:rhel_software_collections:2::el7" ]
null
null
5.3
null
RHSA-2020:0683
Red Hat Security Advisory: OpenShift Container Platform 4.3.5 openshift-enterprise-ansible-operator-container security update
openshift/ocp-release-operator-sdk: /etc/passwd is given incorrect privileges
[ "cpe:/a:redhat:openshift:4.3::el7" ]
null
7
null
null
RHSA-2022:0114
Red Hat Security Advisory: OpenShift Container Platform 4.7.41 security update
haproxy: an HTTP method name may contain a space followed by the name of a protected resource haproxy: request smuggling attack or response splitting via duplicate content-length header
[ "cpe:/a:redhat:openshift:4.7::el7", "cpe:/a:redhat:openshift:4.7::el8" ]
null
7.5
null
null
RHSA-2008:0863
Red Hat Security Advisory: libtiff security update
libtiff: use of uninitialized memory in LZW decoder
[ "cpe:/o:redhat:enterprise_linux:2.1::as", "cpe:/o:redhat:enterprise_linux:2.1::aw", "cpe:/o:redhat:enterprise_linux:2.1::es", "cpe:/o:redhat:enterprise_linux:2.1::ws", "cpe:/o:redhat:enterprise_linux:3::as", "cpe:/o:redhat:enterprise_linux:3::desktop", "cpe:/o:redhat:enterprise_linux:3::es", "cpe:/o:redhat:enterprise_linux:3::ws" ]
null
null
null
null
RHSA-2015:2066
Red Hat Security Advisory: Red Hat Ceph Storage 1.3.1 security, bug fix, and enhancement update
Ceph: RGW returns requested bucket name raw in Bucket response header
[ "cpe:/a:redhat:ceph_storage:1.3::el7" ]
null
null
null
null
RHBA-2020:1255
Red Hat Bug Fix Advisory: OpenShift Container Platform 4.3.10 packages update
proglottis/gpgme: Use-after-free in GPGME bindings during container image pull
[ "cpe:/a:redhat:openshift:4.3::el7", "cpe:/a:redhat:openshift:4.3::el8" ]
null
7.5
null
null
RHSA-2004:133
Red Hat Security Advisory: squid security update
security flaw
[ "cpe:/o:redhat:enterprise_linux:3::as", "cpe:/o:redhat:enterprise_linux:3::desktop", "cpe:/o:redhat:enterprise_linux:3::es", "cpe:/o:redhat:enterprise_linux:3::ws" ]
null
null
null
null
RHSA-2023:4569
Red Hat Security Advisory: dbus security update
dbus: dbus-daemon: assertion failure when a monitor is active and a message from the driver cannot be delivered
[ "cpe:/a:redhat:enterprise_linux:9::appstream", "cpe:/o:redhat:enterprise_linux:9::baseos" ]
null
6.2
null
null
RHSA-2022:5006
Red Hat Security Advisory: Red Hat OpenShift Service Mesh 2.1.3 Containers security update
eventsource: Exposure of Sensitive Information golang: crypto/elliptic: IsOnCurve returns true for invalid field elements golang: encoding/pem: fix stack overflow in Decode Moment.js: Path traversal in moment.locale golang: crypto/elliptic: panic caused by oversized scalar
[ "cpe:/a:redhat:service_mesh:2.1::el8" ]
null
7.5
null
null
RHSA-2017:0535
Red Hat Security Advisory: policycoreutils security update
policycoreutils: SELinux sandbox escape via TIOCSTI ioctl
[ "cpe:/o:redhat:rhel_eus:7.2::computenode", "cpe:/o:redhat:rhel_eus:7.2::server" ]
null
null
8.6
null
RHSA-2024:1860
Red Hat Security Advisory: Red Hat Single Sign-On 7.6.8 enhancement and security update on RHEL 7
keycloak: Log Injection during WebAuthn authentication or registration keycloak: Authorization Bypass keycloak: path transversal in redirection validation keycloak: org.keycloak.protocol.oidc: unvalidated cross-origin messages in checkLoginIframe leads to DDoS undertow: Out-of-memory Error after several closed connections with wildfly-http-client protocol
[ "cpe:/a:redhat:red_hat_single_sign_on:7.6::el7" ]
null
7.5
null
null
RHSA-2024:9092
Red Hat Security Advisory: freerdp security update
freerdp: Integer Overflow leading to Heap Overflow in freerdp_bitmap_planar_context_reset freerdp: Integer overflow & OutOfBound Write in clear_decompress_residual_data freerdp: integer underflow in nsc_rle_decode freerdp: OutOfBound Read in zgfx_decompress_segment freerdp: OutOfBound Read in planar_skip_plane_rle freerdp: out-of-bounds read in ncrush_decompress freerdp: OutOfBound Read in interleaved_decompress FreeRDP: ExtractRunLengthRegular* out of bound read freerdp: freerdp_image_copy out of bound read freerdp: zgfx_decompress out of memory freerdp: rdp_write_logon_info_v1 NULL access freerdp: out-of-bounds read
[ "cpe:/a:redhat:enterprise_linux:9::appstream", "cpe:/a:redhat:enterprise_linux:9::crb" ]
null
7.5
null
null
RHSA-2023:4419
Red Hat Security Advisory: openssh security update
openssh: Remote code execution in ssh-agent PKCS#11 support
[ "cpe:/a:redhat:enterprise_linux:8::appstream", "cpe:/o:redhat:enterprise_linux:8::baseos" ]
null
9.8
null
null
RHSA-2022:1040
Red Hat Security Advisory: Red Hat OpenShift GitOps security update
Openshift-Gitops: Improper access control allows admin privilege escalation argocd: path traversal and improper access control allows leaking out-of-bound files argocd: path traversal allows leaking out-of-bound files
[ "cpe:/a:redhat:openshift_gitops:1.3::el8" ]
null
6.8
null
null
RHSA-2024:10860
Red Hat Security Advisory: ruby:3.1 security update
rexml: REXML ReDoS vulnerability
[ "cpe:/a:redhat:enterprise_linux:9::appstream" ]
null
7.5
null
null
RHSA-2023:7697
Red Hat Security Advisory: AMQ Clients 2023.Q4
SnakeYaml: Constructor Deserialization Remote Code Execution snakeyaml: Denial of Service due to missing nested depth limitation for collections snakeyaml: Uncaught exception in org.yaml.snakeyaml.composer.Composer.composeSequenceNode dev-java/snakeyaml: DoS via stack overflow json-smart: Uncontrolled Resource Consumption vulnerability in json-smart (Resource Exhaustion) springframework-amqp: Deserialization Vulnerability netty: SniHandler 16MB allocation leads to OOM jetty: Improper validation of HTTP/1 content-length
[ "cpe:/a:redhat:amq_clients:2023_q4" ]
null
5.3
null
null
RHSA-2024:6437
Red Hat Security Advisory: Red Hat build of Quarkus 3.8.6 release and security update
undertow: LearningPushHandler can lead to remote memory DoS attacks io.vertx:vertx-grpc-client: io.vertx:vertx-grpc-server: Vertx gRPC server does not limit the maximum message size
[ "cpe:/a:redhat:quarkus:3.8::el8" ]
null
5.3
null
null
RHSA-2023:0286
Red Hat Security Advisory: firefox security update
Mozilla: libusrsctp library out of date Mozilla: Fullscreen notification bypass Mozilla: Arbitrary file read from GTK drag and drop on Linux Mozilla: Malicious command could be hidden in devtools output Mozilla: URL being dragged from cross-origin iframe into same tab triggers navigation Mozilla: Content Security Policy wasn't being correctly applied to WebSockets in WebWorkers Mozilla: Calls to <code>console.log</code> allowed bypasing Content Security Policy via format directive Mozilla: Memory safety bugs fixed in Firefox 109 and Firefox ESR 102.7
[ "cpe:/a:redhat:rhel_eus:9.0::appstream" ]
null
8.8
null
null
RHSA-2020:0820
Red Hat Security Advisory: firefox security update
usrsctp: Out of bounds reads in sctp_load_addresses_from_init() Mozilla: Use-after-free when removing data about origins Mozilla: BodyStream:: OnInputStreamReady was missing protections against state confusion Mozilla: Use-after-free in cubeb during stream destruction Mozilla: Devtools' 'Copy as cURL' feature did not fully escape website-controlled data, potentially leading to command injection Mozilla: The names of AirPods with personally identifiable information were exposed to websites with camera or microphone permission Mozilla: Memory safety bugs fixed in Firefox 74 and Firefox ESR 68.6
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
9.8
6.1
null