id
stringlengths 13
15
| title
stringlengths 29
176
| description
stringlengths 8
32.1k
| cpes
listlengths 0
20
| cvss_v4_0
null | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
null |
---|---|---|---|---|---|---|---|
RHSA-2022:1108 | Red Hat Security Advisory: Red Hat Process Automation Manager 7.12.1 security update | netty: Information disclosure via the local system temporary directory springframework: malicious input leads to insertion of additional log entries apache-commons-io: Limited path traversal in Apache Commons IO 2.2 to 2.6 jdom: XXE allows attackers to cause a DoS via a crafted HTTP request logback: remote code execution through JNDI call from within its configuration file | [
"cpe:/a:redhat:jboss_enterprise_bpms_platform:7.12"
]
| null | 6.6 | null | null |
RHSA-2020:2617 | Red Hat Security Advisory: security update - Red Hat Ansible Tower 3.7.1-1 - RHEL7 Container | Tower: rsyslog configuration has world readable permissions | [
"cpe:/a:redhat:ansible_tower:3.7::el7"
]
| null | 6.5 | null | null |
RHSA-2022:0815 | Red Hat Security Advisory: firefox security update | expat: Malformed 2- and 3-byte UTF-8 sequences can lead to arbitrary code execution expat: Namespace-separator characters in "xmlns[:prefix]" attribute values can lead to arbitrary code execution expat: Integer overflow in storeRawNames() Mozilla: Use-after-free in text reflows Mozilla: Browser window spoof using fullscreen mode Mozilla: iframe allow-scripts sandbox bypass Mozilla: Temporary files downloaded to /tmp and accessible by other local users Mozilla: Time-of-check time-of-use bug when verifying add-on signatures Mozilla: Use-after-free in XSLT parameter processing Mozilla: Use-after-free in WebGPU IPC Framework | [
"cpe:/a:redhat:rhel_e4s:8.1::appstream"
]
| null | 8.8 | 7.5 | null |
RHSA-2023:5475 | Red Hat Security Advisory: thunderbird security update | firefox: use-after-free in workers Mozilla: Out-of-bounds write in PathOps Mozilla: Use-after-free in Ion Compiler Mozilla: Memory safety bugs fixed in Firefox 118, Firefox ESR 115.3, and Thunderbird 115.3 libvpx: Heap buffer overflow in vp8 encoding in libvpx | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
]
| null | 8.8 | null | null |
RHSA-2019:3024 | Red Hat Security Advisory: ovirt-web-ui security and bug fix update | bootstrap: XSS in the tooltip or popover data-template attribute nodejs-lodash: prototype pollution in defaultsDeep function leading to modifying properties jquery: Prototype pollution in object's prototype leading to denial of service, remote code execution, or property injection | [
"cpe:/a:redhat:rhev_manager:4.3"
]
| null | null | 5.6 | null |
RHSA-2022:8686 | Red Hat Security Advisory: kpatch-patch security update | kernel: KVM: cmpxchg_gpte can write to pfns outside the userspace region | [
"cpe:/o:redhat:rhel_eus:8.4::baseos"
]
| null | 7 | null | null |
RHSA-2020:1538 | Red Hat Security Advisory: AMQ Online security update | netty: compression/decompression codecs don't enforce limits on buffer allocation sizes | [
"cpe:/a:redhat:amq_online:1.4"
]
| null | 7.5 | null | null |
RHSA-2016:0632 | Red Hat Security Advisory: Red Hat Ceph Storage 1.2 - 45 Day Retirement Notice | This is the 45-day notification for the retirement of Red Hat Ceph Storage 1.2. | [
"cpe:/a:redhat:ceph_storage:1.2::centos:6",
"cpe:/a:redhat:ceph_storage:1.2::el6",
"cpe:/a:redhat:ceph_storage:1.2::ubuntu:12.04"
]
| null | null | null | null |
RHSA-2023:5155 | Red Hat Security Advisory: [impact]: OpenShift Container Platform 4.13.13 bug fix and security update | distribution/distribution: DoS from malicious API request | [
"cpe:/a:redhat:openshift:4.13::el8",
"cpe:/a:redhat:openshift:4.13::el9"
]
| null | 6.5 | null | null |
RHSA-2014:1354 | Red Hat Security Advisory: rhev-hypervisor6 security update | nss: RSA PKCS#1 signature verification forgery flaw (MFSA 2014-73) bash: specially-crafted environment variables can be used to inject shell commands bash: code execution via specially-crafted environment (Incomplete fix for CVE-2014-6271) bash: parser can allow out-of-bounds memory access while handling redir_stack bash: off-by-one error in deeply nested flow control constructs | [
"cpe:/a:redhat:rhev_manager:3"
]
| null | null | null | null |
RHSA-2022:6354 | Red Hat Security Advisory: open-vm-tools security update | open-vm-tools: local root privilege escalation in the virtual machine | [
"cpe:/a:redhat:rhel_e4s:8.1::appstream"
]
| null | 7 | null | null |
RHSA-2018:0980 | Red Hat Security Advisory: openssh security, bug fix, and enhancement update | openssh: Improper write operations in readonly mode allow for zero-length file creation | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
]
| null | null | 4.3 | null |
RHSA-2021:1586 | Red Hat Security Advisory: GNOME security, bug fix, and enhancement update | glib2: insecure permissions for files and directories webkitgtk: type confusion may lead to arbitrary code execution webkitgtk: use-after-free may lead to arbitrary code execution webkitgtk: out-of-bounds write may lead to code execution webkitgtk: use-after-free may lead to arbitrary code execution webkitgtk: use-after-free may lead to arbitrary code execution gdm: inability to timely contact accountservice via dbus leads gnome-initial-setup to creation of account with admin privileges webkitgtk: Memory corruption leading to arbitrary code execution webkitgtk: Memory initialization issue possibly leading to memory disclosure webkitgtk: Input validation issue leading to cross site scripting attack webkitgtk: Logic issue leading to universal cross site scripting attack webkitgtk: Use-after-free leading to arbitrary code execution | [
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb",
"cpe:/o:redhat:enterprise_linux:8::baseos"
]
| null | 8.8 | 4.4 | null |
RHSA-2024:0244 | Red Hat Security Advisory: java-17-openjdk security and bug fix update | OpenJDK: array out-of-bounds access due to missing range check in C1 compiler (8314468) OpenJDK: JVM class file verifier flaw allows unverified bytecode execution (8314295) OpenJDK: range check loop optimization issue (8314307) OpenJDK: incorrect handling of ZIP files with duplicate entries (8276123) OpenJDK: logging of digital signature private keys (8316976) OpenJDK: RSA padding issue and timing side-channel attack against TLS (8317547) | [
"cpe:/a:redhat:rhel_eus:9.0::appstream",
"cpe:/a:redhat:rhel_eus:9.0::crb"
]
| null | 7.4 | null | null |
RHSA-2018:1883 | Red Hat Security Advisory: samba4 security and bug fix update | samba: NULL pointer dereference in printer server process | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
]
| null | null | 4.3 | null |
RHSA-2024:10851 | Red Hat Security Advisory: postgresql:15 security update | postgresql: PostgreSQL PL/Perl environment variable changes execute arbitrary code | [
"cpe:/a:redhat:rhel_eus:8.8::appstream"
]
| null | 8.8 | null | null |
RHSA-2017:0263 | Red Hat Security Advisory: java-1.8.0-ibm security update | OpenJDK: incorrect ECDSA signature extraction from the DER input (Libraries, 8168714) OpenJDK: missing ObjectIdentifier length check (Libraries, 8168705) OpenJDK: DSA implementation timing attack (Libraries, 8168728) OpenJDK: ECDSA implementation timing attack (Libraries, 8168724) OpenJDK: incorrect URL parsing in URLStreamHandler (Networking, 8167223) OpenJDK: URLClassLoader insufficient access control checks (Networking, 8151934) OpenJDK: untrusted input deserialization in RMI registry and DCG (RMI, 8156802) OpenJDK: LdapLoginModule incorrect userDN extraction (JAAS, 8161743) OpenJDK: imageio PNGImageReader failed to honor ignoreMetadata for iTXt and zTXt chunks (2D, 8166988) JDK: unspecified vulnerability fixed in 6u141, 7u131, and 8u121 (Deployment) OpenJDK: integer overflow in SocketOutputStream boundary check (Networking, 8164147) OpenJDK: insufficient protected field access checks in atomic field updaters (Libraries, 8165344) OpenJDK: insecure class construction (Hotspot, 8167104) | [
"cpe:/a:redhat:rhel_extras:6",
"cpe:/a:redhat:rhel_extras:7"
]
| null | null | 8.8 | null |
RHSA-2015:0033 | Red Hat Security Advisory: Red Hat Satellite 5.7.0 General Availability | Spacewalk: multiple XSS Spacewalk: XSS in system-group | [
"cpe:/a:redhat:network_satellite:5.7::el6",
"cpe:/a:redhat:network_satellite_managed_db:5.7::el6"
]
| null | null | null | null |
RHSA-2011:1434 | Red Hat Security Advisory: acroread security update | acroread: multiple code execution flaws (APSB11-16) acroread: multiple code execution flaws (APSB11-16) acroread: multiple code execution flaws (APSB11-16) acroread: multiple code execution flaws (APSB11-16) acroread: multiple code execution flaws (APSB11-16) acroread: multiple code execution flaws (APSB11-16) acroread: multiple code execution flaws (APSB11-16) acroread: Multiple denial of service flaws (APSB11-16) acroread: Multiple denial of service flaws (APSB11-16) flash-plugin: Cross-site scripting vulnerability (APSB11-13) flash-plugin: multiple arbitrary code execution flaws (APSB-11-21) flash-plugin: multiple arbitrary code execution flaws (APSB-11-21) flash-plugin: multiple arbitrary code execution flaws (APSB-11-21) flash-plugin: multiple arbitrary code execution flaws (APSB-11-21) flash-plugin: multiple arbitrary code execution flaws (APSB-11-21) flash-plugin: multiple arbitrary code execution flaws (APSB-11-21) flash-plugin: multiple arbitrary code execution flaws (APSB-11-21) flash-plugin: multiple arbitrary code execution flaws (APSB-11-21) flash-plugin: multiple arbitrary code execution flaws (APSB-11-21) flash-plugin: multiple arbitrary code execution flaws (APSB-11-21) flash-plugin: multiple arbitrary code execution flaws (APSB-11-21) flash-plugin: multiple arbitrary code execution flaws (APSB-11-21) flash-plugin: multiple arbitrary code execution flaws (APSB-11-21) flash-plugin: multiple arbitrary code execution flaws (APSB-11-21) flash-plugin: critical flaws fixed in APSB11-26 flash-plugin: critical flaws fixed in APSB11-26 flash-plugin: critical flaws fixed in APSB11-26 flash-plugin: security control bypass information disclosure fixed in APSB11-26 flash-plugin: critical flaws fixed in APSB11-26 acroread: multiple code execution flaws (APSB11-24) acroread: multiple code execution flaws (APSB11-24) acroread: multiple code execution flaws (APSB11-24) acroread: multiple code execution flaws (APSB11-24) acroread: multiple code execution flaws (APSB11-24) acroread: multiple code execution flaws (APSB11-24) acroread: multiple code execution flaws (APSB11-24) acroread: multiple code execution flaws (APSB11-24) acroread: multiple code execution flaws (APSB11-24) acroread: multiple code execution flaws (APSB11-24) acroread: multiple code execution flaws (APSB11-24) flash-plugin: Cross-site scripting vulnerability fixed in APSB11-26 acroread: multiple code execution flaws (APSB11-24) | [
"cpe:/a:redhat:rhel_extras:4",
"cpe:/a:redhat:rhel_extras:5::client",
"cpe:/a:redhat:rhel_extras:5::server",
"cpe:/a:redhat:rhel_extras:6"
]
| null | null | null | null |
RHSA-2025:0823 | Red Hat Security Advisory: traceroute security update | traceroute: improper command line parsing | [
"cpe:/o:redhat:rhel_eus:8.8::baseos"
]
| null | 5.5 | null | null |
RHSA-2024:2985 | Red Hat Security Advisory: python39:3.9 and python39-devel:3.9 security update | pypa-setuptools: Regular Expression Denial of Service (ReDoS) in package_index.py python-cryptography: memory corruption via immutable objects python: Parsing errors in email/_parseaddr.py lead to incorrect value in email address part of tuple python-urllib3: Cookie request header isn't stripped during cross-origin redirects | [
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb"
]
| null | 5.9 | null | null |
RHSA-2017:0454 | Red Hat Security Advisory: kvm security update | Qemu: display: cirrus: oob access while doing bitblt copy backward mode Qemu: display: cirrus: potential arbitrary code execution via cirrus_bitblt_cputovideo | [
"cpe:/a:redhat:rhel_virtualization:5::client",
"cpe:/a:redhat:rhel_virtualization:5::server"
]
| null | null | 5.5 | null |
RHSA-2023:3822 | Red Hat Security Advisory: virt:rhel and virt-devel:rhel security and bug fix update | libvirt: Memory leak in virPCIVirtualFunctionList cleanup | [
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb"
]
| null | 6.3 | null | null |
RHSA-2024:1354 | Red Hat Security Advisory: rh-nodejs14 security update | nodejs: reading unprocessed HTTP request with unbounded chunk extension allows DoS attacks | [
"cpe:/a:redhat:rhel_software_collections:3::el7"
]
| null | 7.5 | null | null |
RHSA-2012:1010 | Red Hat Security Advisory: mod_cluster security update | mod_cluster registers and exposes the root context of a server by default, despite ROOT being in the excluded-contexts list | [
"cpe:/a:redhat:jboss_enterprise_application_platform:5.1"
]
| null | null | null | null |
RHSA-2024:0435 | Red Hat Security Advisory: rpm security update | rpm: TOCTOU race in checks for unsafe symlinks rpm: races with chown/chmod/capabilities calls during installation rpm: checks for unsafe symlinks are not performed for intermediary directories | [
"cpe:/a:redhat:rhel_eus:9.0::appstream",
"cpe:/o:redhat:rhel_eus:9.0::baseos"
]
| null | 6.5 | null | null |
RHSA-2023:0758 | Red Hat Security Advisory: Red Hat build of Quarkus 2.13.7 release and security update | SnakeYaml: Constructor Deserialization Remote Code Execution codec-haproxy: HAProxyMessageDecoder Stack Exhaustion DoS postgresql-jdbc: Information leak of prepared statement data due to insecure temporary file permissions mina-sshd: Java unsafe deserialization vulnerability quarkus-vertx-http: a cross-site attack may be initiated which might lead to the Information Disclosure | [
"cpe:/a:redhat:quarkus:2.13"
]
| null | 5.3 | null | null |
RHSA-2009:0006 | Red Hat Security Advisory: rhpki security and bug fix update | System: insecure config file permissions System: plain text passwords stored in debug log | [
"cpe:/a:redhat:certificate_system:7.2"
]
| null | null | null | null |
RHSA-2022:7548 | Red Hat Security Advisory: Image Builder security, bug fix, and enhancement update | golang: math/big: decoding big.Float and big.Rat types can panic if the encoded message is too short, potentially allowing a denial of service | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
]
| null | 6.5 | null | null |
RHSA-2024:2006 | Red Hat Security Advisory: kernel security and bug fix update | kernel: netfilter: divide error in nft_limit_init kernel: use-after-free in smb2_is_status_io_timeout() kernel: tun: bugs for oversize packet when napi frags enabled in tun_napi_alloc_frags kernel: vmxnet3: NULL pointer dereference in vmxnet3_rq_cleanup() kernel: refcount leak in ctnetlink_create_conntrack() kernel: mlxsw: spectrum_acl_tcam: Fix stack corruption kernel: sched/membarrier: reduce the ability to hammer on sys_membarrier | [
"cpe:/o:redhat:rhel_aus:8.2::baseos",
"cpe:/o:redhat:rhel_e4s:8.2::baseos",
"cpe:/o:redhat:rhel_tus:8.2::baseos"
]
| null | 4.7 | null | null |
RHSA-2022:5314 | Red Hat Security Advisory: expat security update | expat: Stack exhaustion in doctype parsing expat: Integer overflow in copyString() | [
"cpe:/o:redhat:enterprise_linux:8::baseos"
]
| null | 7.5 | null | null |
RHSA-2018:2228 | Red Hat Security Advisory: qemu-kvm-rhev security update | hw: cpu: speculative store bypass | [
"cpe:/a:redhat:openstack:13::el7"
]
| null | null | 5.6 | null |
RHSA-2013:0624 | Red Hat Security Advisory: java-1.5.0-ibm security update | OpenJDK: disable Gopher support by default (Gopher, 7189567) JDK: unspecified vulnerability fixed in 6u39 and 7u13 (JMX) OpenJDK: RMI CGIHandler XSS issue (RMI, 6563318) OpenJDK: logging insufficient access control checks (Libraries, 6664509) OpenJDK: logging insufficient access control checks (Libraries, 6664528) OpenJDK: invalid threads subject to interrupts (Libraries, 6776941) OpenJDK: reflection API incorrect checks for proxy classes (Libraries, 7197546, SE-2012-01 Issue 29) OpenJDK: insufficient clipboard access premission checks (AWT, 7186952) OpenJDK: InetSocketAddress serialization issue (Networking, 7201071) OpenJDK: loadPropertyFile missing restrictions (JAXP, 8001235) OpenJDK: CPU consumption DoS via repeated SSL ClientHello packets (JSSE, 7192393) OpenJDK: insufficient privilege checking issue (AWT, 7192977) OpenJDK: insufficient Diffie-Hellman public key checks (JSSE, 7192392) OpenJDK: insufficient privilege checking issue (AWT, 8001057) OpenJDK: RequiredModelMBean missing access control context checks (JMX, 8000537) OpenJDK: Specially crafted sample model integer overflow (2D, 8007014) OpenJDK: missing ValueHandlerImpl class constructor access restriction (CORBA, 8000631) OpenJDK: image parser insufficient raster parameter checks (2D, 8001972) OpenJDK: image parser insufficient raster parameter checks (AWT, 8002325) JDK: unspecified vulnerability fixed in 6u39 (Sound) OpenJDK: MBeanServer insufficient privilege restrictions (JMX, 8006446) OpenJDK: CMM malformed raster memory corruption (2D, 8007675) | [
"cpe:/a:redhat:rhel_extras:5::server",
"cpe:/a:redhat:rhel_extras:6"
]
| null | null | null | null |
RHSA-2024:1867 | Red Hat Security Advisory: Red Hat build of Keycloak 22.0.10 enhancement and security update | keycloak: impersonation via logout token exchange keycloak: secondary factor bypass in step-up authentication keycloak: Log Injection during WebAuthn authentication or registration keycloak: Authorization Bypass keycloak: XSS via assertion consumer service URL in SAML POST-binding flow keycloak: session hijacking via re-authentication keycloak: path transversal in redirection validation keycloak: org.keycloak.protocol.oidc: unvalidated cross-origin messages in checkLoginIframe leads to DDoS keycloak: path traversal in the redirect validation | [
"cpe:/a:redhat:build_keycloak:22::el9"
]
| null | 7.1 | null | null |
RHSA-2004:615 | Red Hat Security Advisory: libxml2 security update | libxml2 various overflows | [
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws"
]
| null | null | null | null |
RHSA-2014:0500 | Red Hat Security Advisory: struts security update | 1: Class Loader manipulation via request parameters | [
"cpe:/a:redhat:network_satellite:5.4::el6",
"cpe:/a:redhat:network_satellite:5.5::el6",
"cpe:/a:redhat:network_satellite:5.6::el6"
]
| null | null | null | null |
RHBA-2019:3384 | Red Hat Bug Fix Advisory: ruby:2.5 bug fix and enhancement update | rubygems: Delete directory using symlink when decompressing tar rubygems: Escape sequence injection vulnerability in verbose rubygems: Escape sequence injection vulnerability in gem owner rubygems: Escape sequence injection vulnerability in API response handling rubygems: Escape sequence injection vulnerability in errors | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
]
| null | null | 5.3 | null |
RHSA-2023:4063 | Red Hat Security Advisory: thunderbird security update | Mozilla: Use-after-free in WebRTC certificate generation Mozilla: Potential use-after-free from compartment mismatch in SpiderMonkey Mozilla: Fullscreen notification obscured Mozilla: Lack of warning when opening Diagcab files Mozilla: Memory safety bugs fixed in Firefox 115, Firefox ESR 102.13, and Thunderbird 102.13 | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
]
| null | 8.8 | null | null |
RHSA-2017:2489 | Red Hat Security Advisory: mercurial security update | Mercurial: pathaudit: path traversal via symlink mercurial: command injection on clients through malicious ssh URLs | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
]
| null | null | 6.3 | null |
RHEA-2021:3287 | Red Hat Enhancement Advisory: Red Hat OpenShift Service on AWS 1.0 enhancements | golang: crypto/tls: certificate of wrong type is causing TLS client to panic | [
"cpe:/a:redhat:openshift_service_on_aws:1::el8"
]
| null | 6.5 | null | null |
RHSA-2023:5747 | Red Hat Security Advisory: java-17-openjdk security and bug fix update | OpenJDK: memory corruption issue on x86_64 with AVX-512 (8317121) OpenJDK: certificate path validation issue during client authentication (8309966) | [
"cpe:/a:redhat:rhel_aus:8.4::appstream",
"cpe:/a:redhat:rhel_e4s:8.4::appstream",
"cpe:/a:redhat:rhel_tus:8.4::appstream"
]
| null | 5.3 | null | null |
RHSA-2024:10517 | Red Hat Security Advisory: OpenShift Container Platform 4.17.7 security and extras update | PostCSS: Improper input validation in PostCSS | [
"cpe:/a:redhat:openshift:4.17::el9"
]
| null | 5.3 | null | null |
RHSA-2020:0172 | Red Hat Security Advisory: openvswitch2.12 security and bug fix update | dpdk: possible memory leak leads to denial of service | [
"cpe:/o:redhat:enterprise_linux:8::fastdatapath"
]
| null | null | 7.5 | null |
RHSA-2019:2494 | Red Hat Security Advisory: java-1.7.1-ibm security update | OpenJDK: Insufficient checks of suppressed exceptions in deserialization (Utilities, 8212328) OpenJDK: Unbounded memory allocation during deserialization in Collections (Utilities, 8213432) OpenJDK: Missing URL format validation (Networking, 8221518) libpng: use-after-free in png_image_free in png.c JDK: Failure to privatize a value pulled out of the loop by versioning | [
"cpe:/a:redhat:rhel_extras:6"
]
| null | 7.4 | 5.3 | null |
RHSA-2011:1479 | Red Hat Security Advisory: kernel security, bug fix, and enhancement update | kernel: tpm: infoleak virt: VT-d (PCI passthrough) MSI trap injection kernel: hfs_find_init() sb->ext_tree NULL pointer dereference kernel: taskstats io infoleak kernel: cifs: always do is_path_accessible check in cifs_mount kernel: keys: NULL pointer deref in the user-defined key type | [
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::server"
]
| null | null | null | null |
RHSA-2023:5744 | Red Hat Security Advisory: java-11-openjdk security and bug fix update | OpenJDK: certificate path validation issue during client authentication (8309966) | [
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::crb"
]
| null | 5.3 | null | null |
RHSA-2012:0050 | Red Hat Security Advisory: qemu-kvm security, bug fix, and enhancement update | qemu: e1000: process_tx_desc legacy mode packets heap overflow | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
]
| null | null | null | null |
RHSA-2024:0759 | Red Hat Security Advisory: container-tools:rhel8 security update | runc: file descriptor leak | [
"cpe:/a:redhat:rhel_eus:8.8::appstream"
]
| null | 8.6 | null | null |
RHSA-2023:4415 | Red Hat Security Advisory: iperf3 security update | iperf3: memory allocation hazard and crash | [
"cpe:/a:redhat:rhel_aus:8.2::appstream",
"cpe:/a:redhat:rhel_e4s:8.2::appstream",
"cpe:/a:redhat:rhel_tus:8.2::appstream"
]
| null | 7.5 | null | null |
RHSA-2022:5188 | Red Hat Security Advisory: RHACS 3.69 security update | golang.org/x/crypto: empty plaintext packet causes panic stackrox: Improper sanitization allows users to retrieve Notifier secrets from GraphQL API in plaintext | [
"cpe:/a:redhat:advanced_cluster_security:3.69::el8"
]
| null | 8.8 | null | null |
RHSA-2014:0914 | Red Hat Security Advisory: libvirt security and bug fix update | libvirt: unsafe parsing of XML documents allows libvirt DoS and/or arbitrary file read libvirt: unsafe parsing of XML documents allows libvirt DoS and/or arbitrary file read | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
]
| null | null | null | null |
RHSA-2025:3165 | Red Hat Security Advisory: podman security update | golang.org/x/crypto/ssh: Denial of Service in the Key Exchange of golang.org/x/crypto/ssh | [
"cpe:/a:redhat:rhel_e4s:9.0::appstream"
]
| null | 7.5 | null | null |
RHSA-2005:612 | Red Hat Security Advisory: kdelibs security update | security flaw | [
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
]
| null | null | null | null |
RHSA-2020:4553 | Red Hat Security Advisory: systemd security, bug fix, and enhancement update | systemd: memory leak in button_open() in login/logind-button.c when udev events are received | [
"cpe:/o:redhat:enterprise_linux:8::baseos"
]
| null | 2.4 | null | null |
RHSA-2015:0629 | Red Hat Security Advisory: firefox security update | Mozilla: Reading of local files through manipulation of form autocomplete (MFSA 2015-24) Mozilla: Out-of-bounds read and write while rendering SVG content (MFSA 2015-19) Mozilla: Use-after-free in IndexedDB (MFSA 2015-16) Mozilla: Miscellaneous memory safety hazards (rv:31.5) (MFSA 2015-11) | [
"cpe:/o:redhat:enterprise_linux:7::server"
]
| null | null | null | null |
RHSA-2015:2545 | Red Hat Security Advisory: chromium-browser security update | v8: unspecified out-of-bounds access vulnerability chromium-browser: Use-after-free in AppCache chromium-browser: Use-after-free in AppCache chromium-browser: Use-after-free in AppCache chromium-browser: Cross-origin bypass in DOM chromium-browser: Cross-origin bypass in core chromium-browser: Cross-origin bypass in DOM chromium-browser: Out of bounds access in v8 chromium-browser: Cross-origin bypass in DOM chromium-browser: Out of bounds access in Skia chromium-browser: Use-after-free in Extensions chromium-browser: Type confusion in PDFium chromium-browser: Out of bounds access in PDFium chromium-browser: Use-after-free in DOM chromium-browser: Out of bounds access in PDFium chromium-browser: Scheme bypass in PDFium chromium-browser: Use-after-free in Infobars chromium-browser: Integer overflow in Sfntly chromium-browser: Content spoofing in Omnibox chromium-browser: Escaping issue in saved pages chromium-browser: Wildcard matching issue in CSP chromium-browser: Scheme bypass in CSP chromium-browser: Various fixes from internal audits v8: multiple vulnerabilities fixed in 4.7.80.23 chromium-browser: Various fixes from internal audits chromium-browser: Various fixes from internal audits | [
"cpe:/a:redhat:rhel_extras:6"
]
| null | null | null | null |
RHSA-2007:1030 | Red Hat Security Advisory: xpdf security update | t1lib font filename string overflow DCTStream:: readProgressiveDataUnit() DCTStream:: reset() CCITTFaxStream:: lookChar() | [
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws"
]
| null | null | null | null |
RHSA-2020:1509 | Red Hat Security Advisory: java-11-openjdk security update | OpenJDK: Misplaced regular expression syntax error check in RegExpScanner (Scripting, 8223898) OpenJDK: Incorrect handling of empty string nodes in regular expression Parser (Scripting, 8223904) OpenJDK: Incorrect handling of references to uninitialized class descriptors during deserialization (Serialization, 8224541) OpenJDK: Uncaught InstantiationError exception in ObjectStreamClass (Serialization, 8224549) OpenJDK: Incorrect handling of Certificate messages during TLS handshake (JSSE, 8232581) OpenJDK: Unexpected exceptions raised by DOMKeyInfoFactory and DOMXMLSignatureFactory (Security, 8231415) OpenJDK: Incomplete enforcement of algorithm restrictions for TLS (JSSE, 8232424) OpenJDK: Re-use of single TLS session for new connections (JSSE, 8234408) OpenJDK: CRLF injection into HTTP headers in HttpServer (Lightweight HTTP Server, 8234825) OpenJDK: Incorrect bounds checks in NIO Buffers (Libraries, 8234841) OpenJDK: Incorrect type checks in MethodType.readObject() (Libraries, 8235274) OpenJDK: Application data accepted before TLS handshake completion (JSSE, 8235691) OpenJDK: Regular expression DoS in Scanner (Concurrency, 8236201) | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
]
| null | 5.3 | null | null |
RHSA-2019:4113 | Red Hat Security Advisory: java-1.8.0-ibm security update | OpenJDK: Missing restrictions on use of custom SocketImpl (Networking, 8218573) OpenJDK: NULL pointer dereference in DrawGlyphList (2D, 8222690) OpenJDK: Unexpected exception thrown by Pattern processing crafted regular expression (Concurrency, 8222684) OpenJDK: Unexpected exception thrown by XPathParser processing crafted XPath expression (JAXP, 8223505) OpenJDK: Unexpected exception thrown during regular expression processing in Nashorn (Scripting, 8223518) OpenJDK: Incorrect handling of nested jar: URLs in Jar URL handler (Networking, 8223892) OpenJDK: Unexpected exception thrown by XPath processing crafted XPath expression (JAXP, 8224532) OpenJDK: Unexpected exception thrown during Font object deserialization (Serialization, 8224915) OpenJDK: Integer overflow in bounds check in SunGraphics2D (2D, 8225292) OpenJDK: Incorrect handling of HTTP proxy responses in HttpURLConnection (Networking, 8225298) OpenJDK: Excessive memory allocation in CMap when reading TrueType font (2D, 8225597) JDK: unspecified vulnerability fixed in 8u221 (Deployment) OpenJDK: Insufficient filtering of HTML event attributes in Javadoc (Javadoc, 8226765) JDK: Unrestricted access to diagnostic operations | [
"cpe:/a:redhat:rhel_extras:6"
]
| null | null | 8.4 | null |
RHSA-2003:016 | Red Hat Security Advisory: fileutils security update | security flaw | [
"cpe:/o:redhat:enterprise_linux:2.1::as",
"cpe:/o:redhat:enterprise_linux:2.1::aw"
]
| null | null | null | null |
RHSA-2024:6705 | Red Hat Security Advisory: OpenShift Container Platform 4.12.66 security update | openshift/builder: Path traversal allows command injection in privileged BuildContainer using docker build strategy openshift-controller-manager: Elevated Build Pods Can Lead to Node Compromise in OpenShift | [
"cpe:/a:redhat:openshift:4.12::el8"
]
| null | 9.9 | null | null |
RHSA-2024:1916 | Red Hat Security Advisory: Red Hat JBoss Web Server 6.0.2 release and security update | Tomcat: WebSocket DoS with incomplete closing handshake | [
"cpe:/a:redhat:jboss_enterprise_web_server:6.0::el8",
"cpe:/a:redhat:jboss_enterprise_web_server:6.0::el9"
]
| null | 7.5 | null | null |
RHSA-2024:4077 | Red Hat Security Advisory: python3.11 security update | python: Path traversal on tempfile.TemporaryDirectory | [
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::crb"
]
| null | 7.8 | null | null |
RHSA-2020:4676 | Red Hat Security Advisory: virt:rhel and virt-devel:rhel security, bug fix, and enhancement update | QEMU: Slirp: use-after-free during packet reassembly libvirt: Potential DoS by holding a monitor job while querying QEMU guest-agent QEMU: slirp: use-after-free in ip_reass() function in ip_input.c libvirt: Potential denial of service via active pool without target path libvirt: leak of sensitive cookie information via dumpxml libvirt: leak of /dev/mapper/control into QEMU guests | [
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb"
]
| null | 8.8 | 5.6 | null |
RHSA-2023:7515 | Red Hat Security Advisory: Red Hat OpenShift for Windows Containers 9.0.0 security update | kubernetes: Insufficient input sanitization on Windows nodes leads to privilege escalation kubernetes: Insufficient input sanitization on Windows nodes leads to privilege escalation golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487) | [
"cpe:/a:redhat:openshift:4.14::el9"
]
| null | 7.5 | null | null |
RHSA-2024:6991 | Red Hat Security Advisory: kernel security update | kernel: hwmon: (mlxreg-fan) Return non-zero value when fan current state is enforced from sysfs kernel: net/smc: Fix NULL pointer dereferencing in smc_vlan_by_tcpsk() kernel: powerpc/fixmap: Fix VM debug warning on unmap kernel: xprtrdma: fix pointer derefs in error cases of rpcrdma_ep_create kernel: vsock: remove vsock from connected table when connect is interrupted by a signal kernel: perf: Fix list corruption in perf_cgroup_switch() kernel: SUNRPC: lock against ->sock changing during sysfs read kernel: mm/sparsemem: fix race in accessing memory_section->usage kernel: ACPICA: Revert "ACPICA: avoid Info: mapping multiple BARs. Your kernel is fine." kernel: net/sched: act_api: fix possible infinite loop in tcf_idr_check_alloc() kernel: mm: prevent derefencing NULL ptr in pfn_section_valid() kernel: wifi: mac80211: Avoid address calculations via out of bounds array indexing | [
"cpe:/a:redhat:rhel_e4s:9.0::appstream",
"cpe:/o:redhat:rhel_e4s:9.0::baseos"
]
| null | 7.8 | null | null |
RHSA-2016:0129 | Red Hat Security Advisory: python-django security update | python-django: Information leak through date template filter | [
"cpe:/a:redhat:openstack:6::el7"
]
| null | null | null | null |
RHSA-2024:2932 | Red Hat Security Advisory: logging for Red Hat OpenShift security update | golang: net/http, x/net/http2: unlimited number of CONTINUATION frames causes DoS | [
"cpe:/a:redhat:logging:5.8::el9"
]
| null | 7.5 | null | null |
RHSA-2020:2894 | Red Hat Security Advisory: dbus security update | dbus: denial of service via file descriptor leak | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
]
| null | 6.5 | null | null |
RHSA-2024:2119 | Red Hat Security Advisory: Image builder components bug fix, enhancement and security update | osbuild-composer: race condition may disable GPG verification for package repositories | [
"cpe:/a:redhat:enterprise_linux:9::appstream"
]
| null | 6.1 | null | null |
RHSA-2022:8851 | Red Hat Security Advisory: Red Hat OpenStack Platform 16.2.4 (rabbitmq-server) security update | rabbitmq-server: improper neutralization of script-related HTML tags in a web page (basic XSS) in management UI rabbitmq-server: improper neutralization of script-related HTML tags in a web page (basic XSS) in federation management plugin | [
"cpe:/a:redhat:openstack:16.2::el8"
]
| null | 4.8 | null | null |
RHSA-2020:4670 | Red Hat Security Advisory: idm:DL1 and idm:client security, bug fix, and enhancement update | jquery: Cross-site scripting via cross-domain ajax requests bootstrap: XSS in the data-target attribute bootstrap: Cross-site Scripting (XSS) in the collapse data-parent attribute bootstrap: Cross-site Scripting (XSS) in the data-container property of tooltip bootstrap: XSS in the tooltip data-viewport attribute bootstrap: XSS in the affix configuration target property bootstrap: XSS in the tooltip or popover data-template attribute jquery: Prototype pollution in object's prototype leading to denial of service, remote code execution, or property injection ipa: No password length restriction leads to denial of service jquery: Cross-site scripting due to improper injQuery.htmlPrefilter method | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
]
| null | 6.1 | 5.6 | null |
RHSA-2024:4911 | Red Hat Security Advisory: freeradius security update | freeradius: forgery attack | [
"cpe:/o:redhat:rhel_els:7"
]
| null | 9 | null | null |
RHSA-2022:9073 | Red Hat Security Advisory: nodejs:16 security, bug fix, and enhancement update | nodejs: Improper handling of URI Subject Alternative Names nodejs: Certificate Verification Bypass via String Injection nodejs: Incorrect handling of certificate subject and issuer fields minimist: prototype pollution nodejs-minimatch: ReDoS via the braceExpand function nodejs: Prototype pollution via console.table properties nodejs: DNS rebinding in inspect via invalid octal IP address | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
]
| null | 7.5 | null | null |
RHSA-2014:1924 | Red Hat Security Advisory: thunderbird security update | Mozilla: Miscellaneous memory safety hazards (rv:31.3) (MFSA 2014-83) Mozilla: XMLHttpRequest crashes with some input streams (MFSA 2014-85) Mozilla: Use-after-free during HTML5 parsing (MFSA 2014-87) Mozilla: Buffer overflow while parsing media content (MFSA 2014-88) Mozilla: Bad casting from the BasicThebesLayer to BasicContainerLayer (MFSA 2014-89) | [
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
]
| null | null | null | null |
RHSA-2016:0460 | Red Hat Security Advisory: thunderbird security update | Mozilla: Miscellaneous memory safety hazards (rv:38.7) (MFSA 2016-16) Mozilla: Local file overwriting and potential privilege escalation through CSP reports (MFSA 2016-17) Mozilla: Memory leak in libstagefright when deleting an array during MP4 processing (MFSA 2016-20) Mozilla: Use-after-free in HTML5 string parser (MFSA 2016-23) Mozilla: Use-after-free in SetBody (MFSA 2016-24) Mozilla: Use-after-free during XML transformations (MFSA 2016-27) Mozilla: Memory corruption with malicious NPAPI plugin (MFSA 2016-31) Mozilla: Out-of-bounds read in HTML parser following a failed allocation (MFSA 2016-34) graphite2: multiple font parsing vulnerabilities (Mozilla MFSA 2016-37) graphite2: multiple font parsing vulnerabilities (Mozilla MFSA 2016-37) graphite2: multiple font parsing vulnerabilities (Mozilla MFSA 2016-37) graphite2: multiple font parsing vulnerabilities (Mozilla MFSA 2016-37) graphite2: multiple font parsing vulnerabilities (Mozilla MFSA 2016-37) graphite2: multiple font parsing vulnerabilities (Mozilla MFSA 2016-37) graphite2: multiple font parsing vulnerabilities (Mozilla MFSA 2016-37) graphite2: multiple font parsing vulnerabilities (Mozilla MFSA 2016-37) graphite2: multiple font parsing vulnerabilities (Mozilla MFSA 2016-37) graphite2: multiple font parsing vulnerabilities (Mozilla MFSA 2016-37) graphite2: multiple font parsing vulnerabilities (Mozilla MFSA 2016-37) graphite2: multiple font parsing vulnerabilities (Mozilla MFSA 2016-37) graphite2: multiple font parsing vulnerabilities (Mozilla MFSA 2016-37) graphite2: multiple font parsing vulnerabilities (Mozilla MFSA 2016-37) | [
"cpe:/a:redhat:rhel_productivity:5",
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation",
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
]
| null | null | null | null |
RHSA-2015:0727 | Red Hat Security Advisory: kernel-rt security and bug fix update | kernel: infiniband: uverbs: unprotected physical memory access kernel: net: slab corruption from use after free on INIT collisions | [
"cpe:/a:redhat:rhel_extras_rt:7"
]
| null | null | null | null |
RHSA-2005:090 | Red Hat Security Advisory: htdig security update | security flaw | [
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
]
| null | null | null | null |
RHSA-2022:6711 | Red Hat Security Advisory: firefox security update | Mozilla: Out of bounds read when decoding H264 Mozilla: Content-Security-Policy base-uri bypass Mozilla: Incoherent instruction cache when building WASM on ARM64 Mozilla: Bypassing Secure Context restriction for cookies with __Host and __Secure prefix Mozilla: Bypassing FeaturePolicy restrictions on transient pages Mozilla: Data-race when parsing non-UTF-8 URLs in threads Mozilla: Memory safety bugs fixed in Firefox 105 and Firefox ESR 102.3 | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
]
| null | 8.8 | 7.5 | null |
RHSA-2011:1445 | Red Hat Security Advisory: flash-plugin security update | flash-plugin: mulitple code execution flaws (APSB11-28) flash-plugin: mulitple code execution flaws (APSB11-28) flash-plugin: mulitple code execution flaws (APSB11-28) flash-plugin: mulitple code execution flaws (APSB11-28) flash-plugin: mulitple code execution flaws (APSB11-28) flash-plugin: mulitple code execution flaws (APSB11-28) flash-plugin: mulitple code execution flaws (APSB11-28) flash-plugin: mulitple code execution flaws (APSB11-28) flash-plugin: mulitple code execution flaws (APSB11-28) flash-plugin: mulitple code execution flaws (APSB11-28) flash-plugin: mulitple code execution flaws (APSB11-28) | [
"cpe:/a:redhat:rhel_extras:5::client",
"cpe:/a:redhat:rhel_extras:5::server",
"cpe:/a:redhat:rhel_extras:6"
]
| null | null | null | null |
RHSA-2023:5775 | Red Hat Security Advisory: kpatch-patch security update | kernel: net/sched: cls_u32 component reference counter leak if tcf_change_indev() fails kernel: net/sched: cls_fw component can be exploited as result of failure in tcf_change_indev function kernel: net/sched: Use-after-free vulnerabilities in the net/sched classifiers: cls_fw, cls_u32 and cls_route | [
"cpe:/o:redhat:rhel_e4s:8.4::baseos"
]
| null | 7.8 | null | null |
RHSA-2017:2912 | Red Hat Security Advisory: rh-nodejs4-nodejs-tough-cookie security update | nodejs-tough-cookie: regular expression DoS via Cookie header with many semicolons nodejs-tough-cookie: Regular expression denial of service | [
"cpe:/a:redhat:rhel_software_collections:2::el6",
"cpe:/a:redhat:rhel_software_collections:2::el7"
]
| null | null | 5.3 | null |
RHSA-2020:0683 | Red Hat Security Advisory: OpenShift Container Platform 4.3.5 openshift-enterprise-ansible-operator-container security update | openshift/ocp-release-operator-sdk: /etc/passwd is given incorrect privileges | [
"cpe:/a:redhat:openshift:4.3::el7"
]
| null | 7 | null | null |
RHSA-2022:0114 | Red Hat Security Advisory: OpenShift Container Platform 4.7.41 security update | haproxy: an HTTP method name may contain a space followed by the name of a protected resource haproxy: request smuggling attack or response splitting via duplicate content-length header | [
"cpe:/a:redhat:openshift:4.7::el7",
"cpe:/a:redhat:openshift:4.7::el8"
]
| null | 7.5 | null | null |
RHSA-2008:0863 | Red Hat Security Advisory: libtiff security update | libtiff: use of uninitialized memory in LZW decoder | [
"cpe:/o:redhat:enterprise_linux:2.1::as",
"cpe:/o:redhat:enterprise_linux:2.1::aw",
"cpe:/o:redhat:enterprise_linux:2.1::es",
"cpe:/o:redhat:enterprise_linux:2.1::ws",
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws"
]
| null | null | null | null |
RHSA-2015:2066 | Red Hat Security Advisory: Red Hat Ceph Storage 1.3.1 security, bug fix, and enhancement update | Ceph: RGW returns requested bucket name raw in Bucket response header | [
"cpe:/a:redhat:ceph_storage:1.3::el7"
]
| null | null | null | null |
RHBA-2020:1255 | Red Hat Bug Fix Advisory: OpenShift Container Platform 4.3.10 packages update | proglottis/gpgme: Use-after-free in GPGME bindings during container image pull | [
"cpe:/a:redhat:openshift:4.3::el7",
"cpe:/a:redhat:openshift:4.3::el8"
]
| null | 7.5 | null | null |
RHSA-2004:133 | Red Hat Security Advisory: squid security update | security flaw | [
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws"
]
| null | null | null | null |
RHSA-2023:4569 | Red Hat Security Advisory: dbus security update | dbus: dbus-daemon: assertion failure when a monitor is active and a message from the driver cannot be delivered | [
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/o:redhat:enterprise_linux:9::baseos"
]
| null | 6.2 | null | null |
RHSA-2022:5006 | Red Hat Security Advisory: Red Hat OpenShift Service Mesh 2.1.3 Containers security update | eventsource: Exposure of Sensitive Information golang: crypto/elliptic: IsOnCurve returns true for invalid field elements golang: encoding/pem: fix stack overflow in Decode Moment.js: Path traversal in moment.locale golang: crypto/elliptic: panic caused by oversized scalar | [
"cpe:/a:redhat:service_mesh:2.1::el8"
]
| null | 7.5 | null | null |
RHSA-2017:0535 | Red Hat Security Advisory: policycoreutils security update | policycoreutils: SELinux sandbox escape via TIOCSTI ioctl | [
"cpe:/o:redhat:rhel_eus:7.2::computenode",
"cpe:/o:redhat:rhel_eus:7.2::server"
]
| null | null | 8.6 | null |
RHSA-2024:1860 | Red Hat Security Advisory: Red Hat Single Sign-On 7.6.8 enhancement and security update on RHEL 7 | keycloak: Log Injection during WebAuthn authentication or registration keycloak: Authorization Bypass keycloak: path transversal in redirection validation keycloak: org.keycloak.protocol.oidc: unvalidated cross-origin messages in checkLoginIframe leads to DDoS undertow: Out-of-memory Error after several closed connections with wildfly-http-client protocol | [
"cpe:/a:redhat:red_hat_single_sign_on:7.6::el7"
]
| null | 7.5 | null | null |
RHSA-2024:9092 | Red Hat Security Advisory: freerdp security update | freerdp: Integer Overflow leading to Heap Overflow in freerdp_bitmap_planar_context_reset freerdp: Integer overflow & OutOfBound Write in clear_decompress_residual_data freerdp: integer underflow in nsc_rle_decode freerdp: OutOfBound Read in zgfx_decompress_segment freerdp: OutOfBound Read in planar_skip_plane_rle freerdp: out-of-bounds read in ncrush_decompress freerdp: OutOfBound Read in interleaved_decompress FreeRDP: ExtractRunLengthRegular* out of bound read freerdp: freerdp_image_copy out of bound read freerdp: zgfx_decompress out of memory freerdp: rdp_write_logon_info_v1 NULL access freerdp: out-of-bounds read | [
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::crb"
]
| null | 7.5 | null | null |
RHSA-2023:4419 | Red Hat Security Advisory: openssh security update | openssh: Remote code execution in ssh-agent PKCS#11 support | [
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/o:redhat:enterprise_linux:8::baseos"
]
| null | 9.8 | null | null |
RHSA-2022:1040 | Red Hat Security Advisory: Red Hat OpenShift GitOps security update | Openshift-Gitops: Improper access control allows admin privilege escalation argocd: path traversal and improper access control allows leaking out-of-bound files argocd: path traversal allows leaking out-of-bound files | [
"cpe:/a:redhat:openshift_gitops:1.3::el8"
]
| null | 6.8 | null | null |
RHSA-2024:10860 | Red Hat Security Advisory: ruby:3.1 security update | rexml: REXML ReDoS vulnerability | [
"cpe:/a:redhat:enterprise_linux:9::appstream"
]
| null | 7.5 | null | null |
RHSA-2023:7697 | Red Hat Security Advisory: AMQ Clients 2023.Q4 | SnakeYaml: Constructor Deserialization Remote Code Execution snakeyaml: Denial of Service due to missing nested depth limitation for collections snakeyaml: Uncaught exception in org.yaml.snakeyaml.composer.Composer.composeSequenceNode dev-java/snakeyaml: DoS via stack overflow json-smart: Uncontrolled Resource Consumption vulnerability in json-smart (Resource Exhaustion) springframework-amqp: Deserialization Vulnerability netty: SniHandler 16MB allocation leads to OOM jetty: Improper validation of HTTP/1 content-length | [
"cpe:/a:redhat:amq_clients:2023_q4"
]
| null | 5.3 | null | null |
RHSA-2024:6437 | Red Hat Security Advisory: Red Hat build of Quarkus 3.8.6 release and security update | undertow: LearningPushHandler can lead to remote memory DoS attacks io.vertx:vertx-grpc-client: io.vertx:vertx-grpc-server: Vertx gRPC server does not limit the maximum message size | [
"cpe:/a:redhat:quarkus:3.8::el8"
]
| null | 5.3 | null | null |
RHSA-2023:0286 | Red Hat Security Advisory: firefox security update | Mozilla: libusrsctp library out of date Mozilla: Fullscreen notification bypass Mozilla: Arbitrary file read from GTK drag and drop on Linux Mozilla: Malicious command could be hidden in devtools output Mozilla: URL being dragged from cross-origin iframe into same tab triggers navigation Mozilla: Content Security Policy wasn't being correctly applied to WebSockets in WebWorkers Mozilla: Calls to <code>console.log</code> allowed bypasing Content Security Policy via format directive Mozilla: Memory safety bugs fixed in Firefox 109 and Firefox ESR 102.7 | [
"cpe:/a:redhat:rhel_eus:9.0::appstream"
]
| null | 8.8 | null | null |
RHSA-2020:0820 | Red Hat Security Advisory: firefox security update | usrsctp: Out of bounds reads in sctp_load_addresses_from_init() Mozilla: Use-after-free when removing data about origins Mozilla: BodyStream:: OnInputStreamReady was missing protections against state confusion Mozilla: Use-after-free in cubeb during stream destruction Mozilla: Devtools' 'Copy as cURL' feature did not fully escape website-controlled data, potentially leading to command injection Mozilla: The names of AirPods with personally identifiable information were exposed to websites with camera or microphone permission Mozilla: Memory safety bugs fixed in Firefox 74 and Firefox ESR 68.6 | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
]
| null | 9.8 | 6.1 | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.