id
stringlengths
13
15
title
stringlengths
29
176
description
stringlengths
8
32.1k
cpes
sequencelengths
0
20
cvss_v4_0
null
cvss_v3_1
float64
0
10
cvss_v3_0
float64
0
10
cvss_v2_0
null
RHSA-2023:0609
Red Hat Security Advisory: git security update
git: gitattributes parsing integer overflow git: Heap overflow in `git archive`, `git log --format` leading to RCE
[ "cpe:/a:redhat:rhel_aus:8.2::appstream", "cpe:/a:redhat:rhel_e4s:8.2::appstream", "cpe:/a:redhat:rhel_tus:8.2::appstream" ]
null
9.8
null
null
RHSA-2021:2262
Red Hat Security Advisory: thunderbird security update
Mozilla: Thunderbird stored OpenPGP secret keys without master password protection Mozilla: Partial protection of inline OpenPGP message not indicated Mozilla: Memory safety bugs fixed in Firefox 89 and Firefox ESR 78.11
[ "cpe:/a:redhat:rhel_eus:8.1::appstream" ]
null
8.8
null
null
RHSA-2019:2892
Red Hat Security Advisory: qemu-kvm security update
QEMU: ne2000: integer overflow leads to buffer overflow issue QEMU: slirp: heap buffer overflow while reassembling fragmented datagrams QEMU: pcnet: integer overflow leads to buffer overflow QEMU: slirp: heap buffer overflow in tcp_emu() QEMU: qxl: null pointer dereference while releasing spice resources
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
3.8
null
RHSA-2022:1724
Red Hat Security Advisory: thunderbird security update
Mozilla: Incorrect security status shown after viewing an attached email Mozilla: Bypassing permission prompt in nested browsing contexts Mozilla: iframe Sandbox bypass Mozilla: Reader mode bypassed SameSite cookies Mozilla: Speech Synthesis feature not properly disabled Mozilla: Fullscreen notification bypass using popups Mozilla: Leaking browser history with CSS variables Mozilla: Memory safety bugs fixed in Firefox 100 and Firefox ESR 91.9
[ "cpe:/a:redhat:rhel_eus:8.2::appstream" ]
null
9.8
7.5
null
RHSA-2024:3184
Red Hat Security Advisory: grub2 security update
grub2: Out-of-bounds write at fs/ntfs.c may lead to unsigned code execution grub2: out-of-bounds read at fs/ntfs.c grub2: grub2-set-bootflag can be abused by local (pseudo-)users
[ "cpe:/o:redhat:enterprise_linux:8::baseos" ]
null
3.3
null
null
RHSA-2002:088
Red Hat Security Advisory: : Updated ethereal packages are available
security flaw security flaw security flaw security flaw security flaw security flaw security flaw
[ "cpe:/o:redhat:linux:7.2", "cpe:/o:redhat:linux:7.3" ]
null
null
null
null
RHSA-2014:2023
Red Hat Security Advisory: glibc security and bug fix update
glibc: command execution in wordexp() with WRDE_NOCMD specified
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
null
null
RHSA-2024:3927
Red Hat Security Advisory: Red Hat Ceph Storage 7.1 container image security, and bug fix update
golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487) jinja2: HTML attribute injection when passing user input as keys to xmlattr filter
[ "cpe:/a:redhat:ceph_storage:7.1::el9" ]
null
5.4
null
null
RHSA-2013:1513
Red Hat Security Advisory: rhn-java-sat security update
Satellite: Interface to create the initial administrator user remains open after installation
[ "cpe:/a:redhat:network_satellite:5.2::el5" ]
null
null
null
null
RHSA-2024:3567
Red Hat Security Advisory: Red Hat Single Sign-On 7.6.9 security update on RHEL 8
keycloak: exposure of sensitive information in Pushed Authorization Requests (PAR) KC_RESTART cookie
[ "cpe:/a:redhat:red_hat_single_sign_on:7.6::el8" ]
null
7.5
null
null
RHSA-2022:8857
Red Hat Security Advisory: Red Hat OpenStack Platform 16.2.4 (erlang) security update
erlang/otp: Client Authentication Bypass
[ "cpe:/a:redhat:openstack:16.2::el8" ]
null
9.4
null
null
RHSA-2024:8447
Red Hat Security Advisory: python3.12 security update
python: cpython: tarfile: ReDos via excessive backtracking while parsing header values
[ "cpe:/a:redhat:enterprise_linux:9::appstream", "cpe:/a:redhat:enterprise_linux:9::crb" ]
null
7.5
null
null
RHEA-2024:1143
Red Hat Enhancement Advisory: redis:7 update
redis: Heap Buffer Overflow may lead to potential remote code execution
[ "cpe:/a:redhat:enterprise_linux:9::appstream" ]
null
8.1
null
null
RHSA-2015:0813
Red Hat Security Advisory: flash-plugin security update
flash-plugin: multiple code execution issues fixed in APSB15-06 flash-plugin: multiple code execution issues fixed in APSB15-06 flash-plugin: multiple code execution issues fixed in APSB15-06 flash-plugin: multiple code execution issues fixed in APSB15-06 flash-plugin: multiple code execution issues fixed in APSB15-06 flash-plugin: multiple code execution issues fixed in APSB15-06 flash-plugin: multiple code execution issues fixed in APSB15-06 flash-plugin: multiple code execution issues fixed in APSB15-06 flash-plugin: multiple code execution issues fixed in APSB15-06 flash-plugin: multiple code execution issues fixed in APSB15-06 flash-plugin: multiple code execution issues fixed in APSB15-06 flash-plugin: information leaks leading to ASLR bypass (APSB15-06) flash-plugin: multiple code execution issues fixed in APSB15-06 flash-plugin: multiple code execution issues fixed in APSB15-06 flash-plugin: multiple code execution issues fixed in APSB15-06 flash-plugin: multiple code execution issues fixed in APSB15-06 flash-plugin: multiple code execution issues fixed in APSB15-06 flash-plugin: information leaks leading to ASLR bypass (APSB15-06) flash-plugin: multiple code execution issues fixed in APSB15-06 flash-plugin: multiple code execution issues fixed in APSB15-06 flash-plugin: multiple code execution issues fixed in APSB15-06 flash-plugin: security bypass leading to information disclosure (APSB15-06)
[ "cpe:/a:redhat:rhel_extras:5::client", "cpe:/a:redhat:rhel_extras:5::server", "cpe:/a:redhat:rhel_extras:6" ]
null
null
null
null
RHSA-2020:4542
Red Hat Security Advisory: cryptsetup security, bug fix, and enhancement update
cryptsetup: Out-of-bounds write when validating segments
[ "cpe:/a:redhat:enterprise_linux:8::appstream", "cpe:/o:redhat:enterprise_linux:8::baseos" ]
null
7.8
null
null
RHSA-2009:1108
Red Hat Security Advisory: httpd security update
apr-util heap buffer underwrite apr-util billion laughs attack apr-util single NULL byte buffer overflow
[ "cpe:/o:redhat:enterprise_linux:3::as", "cpe:/o:redhat:enterprise_linux:3::desktop", "cpe:/o:redhat:enterprise_linux:3::es", "cpe:/o:redhat:enterprise_linux:3::ws" ]
null
null
null
null
RHSA-2010:0475
Red Hat Security Advisory: sudo security update
sudo: insufficient environment sanitization issue
[ "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
RHSA-2018:0484
Red Hat Security Advisory: chromium-browser security update
chromium-browser: incorrect permissions on shared memory chromium-browser: use-after-free in blink chromium-browser: race condition in v8 chromium-browser: heap buffer overflow in skia chromium-browser: incorrect permissions on shared memory chromium-browser: type confusion in v8 chromium-browser: integer overflow in v8 chromium-browser: same origin bypass via canvas chromium-browser: buffer overflow in skia chromium-browser: stack buffer overflow in skia chromium-browser: csp bypass through extensions chromium-browser: heap bufffer overflow in skia chromium-browser: integer overflow in pdfium chromium-browser: heap bufffer overflow in webgl chromium-browser: mark-of-the-web bypass chromium-browser: overly permissive cross origin downloads chromium-browser: incorrect handling of url fragment identifiers in blink chromium-browser: timing attack using svg filters chromium-browser: url spoof in omnibox chromium-browser: information disclosure via texture data in webgl chromium-browser: information disclosure in ipc call chromium-browser: xss in interstitials chromium-browser: circumvention of port blocking chromium-browser: incorrect processing of appmanifests
[ "cpe:/a:redhat:rhel_extras:6" ]
null
null
4.3
null
RHSA-2023:5766
Red Hat Security Advisory: nghttp2 security update
HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack)
[ "cpe:/o:redhat:rhel_e4s:8.1::baseos" ]
null
7.5
null
null
RHSA-2025:4335
Red Hat Security Advisory: Red Hat build of Keycloak 26.0.11 Images Update
org.keycloak/keycloak-services: JWT Token Cache Exhaustion Leading to Denial of Service (DoS) in Keycloak org.keycloak.protocol.services: Keycloak hostname verification org.keycloak.authentication: Two factor authentication bypass
[ "cpe:/a:redhat:build_keycloak:26.0::el9" ]
null
5.4
null
null
RHSA-2015:1669
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform security update
PicketLink: PicketLink IDP ignores role based authorization
[ "cpe:/a:redhat:jboss_enterprise_application_platform:6::el5" ]
null
null
null
null
RHSA-2011:0311
Red Hat Security Advisory: thunderbird security update
javascript: URLs in chrome documents (MFSA 2011-08) Mozilla miscellaneous memory safety hazards (MFSA 2011-01) Mozilla crash caused by corrupted JPEG image (MFSA 2011-09) Mozilla miscellaneous memory safety hazards (MFSA 2011-01)
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
null
null
RHSA-2017:3081
Red Hat Security Advisory: tomcat security update
tomcat: Incorrect handling of pipelined requests when send file was used tomcat: Vary header not added by CORS filter leading to cache poisoning tomcat: Remote Code Execution via JSP Upload tomcat: Remote Code Execution bypass for CVE-2017-12615
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
8.1
null
RHSA-2021:5085
Red Hat Security Advisory: Red Hat OpenShift Data Foundation 4.9.0 enhancement, security, and bug fix update
kubernetes: Incomplete fix for CVE-2019-11250 allows for token leak in logs when logLevel >= 9 golang: net: lookup functions may return invalid host names golang: net/http/httputil: ReverseProxy forwards connection headers if first one is empty golang: math/big.Rat: may cause a panic or an unrecoverable fatal error if passed inputs with very large exponents golang: crypto/tls: certificate of wrong type is causing TLS client to panic
[ "cpe:/a:redhat:openshift_data_foundation:4.9::el8" ]
null
6.5
null
null
RHSA-2021:1051
Red Hat Security Advisory: RHV-H enhancement and security update (redhat-virtualization-host) 4.3.14
lldp/openvswitch: denial of service via externally triggered memory leak
[ "cpe:/o:redhat:enterprise_linux:7::hypervisor" ]
null
7.5
null
null
RHSA-2019:3076
Red Hat Security Advisory: kpatch-patch security update
kernel: Use-after-free in __blk_drain_queue() function in block/blk-core.c kernel: Heap overflow in mwifiex_update_bss_desc_with_ie function in marvell/mwifiex/scan.c hardware: bluetooth: BR/EDR encryption key negotiation attacks (KNOB) kernel: Heap overflow in mwifiex_uap_parse_tail_ies function in drivers/net/wireless/marvell/mwifiex/ie.c
[ "cpe:/o:redhat:enterprise_linux:7::server" ]
null
null
8
null
RHSA-2014:0843
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 6.2.4 security update
Tomcat/JBossWeb: Limited DoS in chunked transfer encoding input filter Tomcat/JBossWeb: XXE vulnerability via user supplied XSLTs Tomcat/JBossWeb: Request smuggling via malicious content length header Tomcat/JBossWeb: XML parser hijack by malicious web application
[ "cpe:/a:redhat:jboss_enterprise_application_platform:6::el5", "cpe:/a:redhat:jboss_enterprise_application_platform:6::el6" ]
null
null
null
null
RHSA-2015:1876
Red Hat Security Advisory: python-django security update
python-django: Denial-of-service possibility in logout() view by filling session store
[ "cpe:/a:redhat:openstack:7::el7" ]
null
null
null
null
RHSA-2019:4164
Red Hat Security Advisory: kernel security and bug fix update
kernel: Memory corruption due to incorrect socket cloning kernel: Missing check in fs/inode.c:inode_init_owner() does not clear SGID bit on non-directories for non-members Kernel: page cache side channel attacks
[ "cpe:/o:redhat:rhel_aus:7.2::server", "cpe:/o:redhat:rhel_e4s:7.2::server", "cpe:/o:redhat:rhel_tus:7.2::server" ]
null
null
7.1
null
RHSA-2025:1738
Red Hat Security Advisory: libpq security update
postgresql: PostgreSQL quoting APIs miss neutralizing quoting syntax in text that fails encoding validation
[ "cpe:/a:redhat:enterprise_linux:9::appstream" ]
null
8.1
null
null
RHSA-2021:4133
Red Hat Security Advisory: thunderbird security update
Mozilla: iframe sandbox rules did not apply to XSLT stylesheets Mozilla: Use-after-free in file picker dialog Mozilla: Firefox could be coaxed into going into fullscreen mode without notification or warning Mozilla: Opportunistic Encryption in HTTP2 could be used to bypass the Same-Origin-Policy on services hosted on other ports Mozilla: Permission Prompt could be overlaid, resulting in user confusion and potential spoofing Mozilla: Javascript alert box could have been spoofed onto an arbitrary domain thunderbird: Memory corruption when processing S/MIME messages Mozilla: Memory safety bugs fixed in Firefox 94 and Firefox ESR 91.3 Mozilla: Use-after-free in HTTP2 Session object
[ "cpe:/a:redhat:rhel_eus:8.1::appstream" ]
null
8.8
6.1
null
RHSA-2018:0053
Red Hat Security Advisory: linux-firmware security update
An update for linux-firmware is now available for Red Hat Enterprise Linux 7.2 Advanced Update Support, Red Hat Enterprise Linux 7.2 Telco Extended Update Support, and Red Hat Enterprise Linux 7.2 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
[ "cpe:/o:redhat:rhel_aus:7.2::server", "cpe:/o:redhat:rhel_e4s:7.2::server", "cpe:/o:redhat:rhel_tus:7.2::server" ]
null
null
null
null
RHSA-2015:0284
Red Hat Security Advisory: kernel security and bug fix update
kernel: ipc: ipc_rcu_putref refcount races Kernel: USB serial: memory corruption flaw kernel: kvm: PIT timer race condition kernel: kvm: vmx: invept vm exit not handled kernel: kvm: vmx: invvpid vm exit not handled kernel: net: sctp: NULL pointer dereference in af->from_addr_param on malformed packet kernel: iptables restriction bypass if a protocol handler kernel module not loaded
[ "cpe:/o:redhat:rhel_eus:6.5::computenode", "cpe:/o:redhat:rhel_eus:6.5::server" ]
null
null
null
null
RHSA-2024:4351
Red Hat Security Advisory: virt:rhel and virt-devel:rhel security and bug fix update
libvirt: stack use-after-free in virNetClientIOEventLoop()
[ "cpe:/a:redhat:enterprise_linux:8::appstream", "cpe:/a:redhat:enterprise_linux:8::crb" ]
null
6.2
null
null
RHSA-2008:0597
Red Hat Security Advisory: firefox security update
mozilla: CSS reference counter overflow (ZDI-CAN-349) Firefox command line URL launches multi-tabs security flaw
[ "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::client_workstation", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
RHSA-2020:0086
Red Hat Security Advisory: firefox security update
Mozilla: Bypass of @namespace CSS sanitization during pasting Mozilla: Type Confusion in XPCVariant.cpp Mozilla: CSS sanitization does not escape HTML tags Mozilla: Memory safety bugs fixed in Firefox 72 and Firefox ESR 68.4 Mozilla: IonMonkey type confusion with StoreElementHole and FallibleStoreElement
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
8.8
8.8
null
RHSA-2022:1851
Red Hat Security Advisory: pki-core:10.6 security and bug fix update
JSS: memory leak in TLS connection leads to OOM
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
7.5
null
null
RHSA-2017:2698
Red Hat Security Advisory: openvswitch security update
openvswitch: Integer underflow in the ofputil_pull_queue_get_config_reply10 function openvswitch: Invalid processing of a malicious OpenFlow role status message openvswitch: Buffer over-read while parsing the group mod OpenFlow message
[ "cpe:/a:redhat:openstack:7::el7" ]
null
null
5.6
null
RHSA-2016:0368
Red Hat Security Advisory: rabbitmq-server security update
RabbitMQ: /api/... XSS vulnerability RabbitMQ: /api/definitions response splitting vulnerability
[ "cpe:/a:redhat:openstack:5::el6" ]
null
null
null
null
RHSA-2021:4316
Red Hat Security Advisory: zziplib security update
zziplib: infinite loop via the return value of zzip_file_read() as used in unzzip_cat_file()
[ "cpe:/a:redhat:enterprise_linux:8::appstream", "cpe:/a:redhat:enterprise_linux:8::crb" ]
null
3.3
null
null
RHSA-2024:10883
Red Hat Security Advisory: Red Hat OpenStack Platform 16.2 (osp-director-operator) security update
go/parser: golang: Calling any of the Parse functions containing deeply nested literals can cause a panic/stack exhaustion encoding/gob: golang: Calling Decoder.Decode on a message which contains deeply nested structures can cause a panic due to stack exhaustion
[ "cpe:/a:redhat:openstack:16.2::el8" ]
null
7.5
null
null
RHSA-2014:1102
Red Hat Security Advisory: ror40-rubygem-activerecord security update
rubygem-activerecord: Strong Parameter bypass with create_with
[ "cpe:/a:redhat:rhel_software_collections:1::el6", "cpe:/a:redhat:rhel_software_collections:1::el7" ]
null
null
null
null
RHSA-2010:0155
Red Hat Security Advisory: java-1.4.2-ibm security and bug fix update
TLS: MITM attacks via session renegotiation
[ "cpe:/a:redhat:rhel_extras:3", "cpe:/a:redhat:rhel_extras:4", "cpe:/a:redhat:rhel_extras:5::client", "cpe:/a:redhat:rhel_extras:5::server" ]
null
null
null
null
RHSA-2022:1701
Red Hat Security Advisory: firefox security update
Mozilla: Bypassing permission prompt in nested browsing contexts Mozilla: iframe Sandbox bypass Mozilla: Reader mode bypassed SameSite cookies Mozilla: Fullscreen notification bypass using popups Mozilla: Leaking browser history with CSS variables Mozilla: Memory safety bugs fixed in Firefox 100 and Firefox ESR 91.9
[ "cpe:/a:redhat:rhel_e4s:8.1::appstream" ]
null
9.8
7.5
null
RHSA-2022:7216
Red Hat Security Advisory: OpenShift Container Platform 4.9.51 bug fix and security update
go-getter: command injection vulnerability go-getter: unsafe download (issue 1 of 3) go-getter: unsafe download (issue 2 of 3) go-getter: unsafe download (issue 3 of 3)
[ "cpe:/a:redhat:openshift:4.9::el8" ]
null
8.6
null
null
RHSA-2014:1038
Red Hat Security Advisory: tomcat6 security update
tomcat: information disclosure via XXE when running untrusted web applications Tomcat/JBossWeb: XML parser hijack by malicious web application
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
null
null
RHSA-2020:2331
Red Hat Security Advisory: Red Hat Satellite Proxy 5 - End Of Life Notice
This is the final notification for the End Of Life (EOL) for the following versions of Red Hat Proxy 5: * Red Hat Satellite Proxy 5.8
[ "cpe:/a:redhat:network_proxy:5.8::el6" ]
null
null
null
null
RHSA-2018:0630
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 6.4 security update
slf4j: Deserialisation vulnerability in EventData constructor can allow for arbitrary code execution
[ "cpe:/a:redhat:jboss_enterprise_application_platform:6.4" ]
null
null
8.1
null
RHSA-2023:7731
Red Hat Security Advisory: tracker-miners security update
tracker-miners: sandbox escape
[ "cpe:/a:redhat:rhel_aus:8.2::appstream", "cpe:/a:redhat:rhel_e4s:8.2::appstream", "cpe:/a:redhat:rhel_tus:8.2::appstream" ]
null
7.5
null
null
RHSA-2020:2478
Red Hat Security Advisory: OpenShift Container Platform 3.11 jenkins-2-plugins security update
jenkins-git-client-plugin: OS command injection via 'git ls-remote' jenkins-script-security-plugin: sandbox protection bypass leads to execute arbitrary code in sandboxed scripts jenkins-pipeline-groovy-plugin: sandbox protection bypass through default parameter expressions in CPS-transformed methods jenkins-script-security-plugin: sandbox protection bypass during script compilation phase by applying AST transforming annotations jenkins-subversion-plugin: XSS in project repository base url jenkins-script-security-plugin: sandbox protection bypass via crafted constructor calls and crafted constructor bodies jenkins-script-security-plugin: sandbox protection bypass leads to arbitrary code execution jenkins-git-plugin: stored cross-site scripting
[ "cpe:/a:redhat:openshift:3.11::el7" ]
null
5.4
null
null
RHSA-2023:0427
Red Hat Security Advisory: pcs security update
sinatra: Reflected File Download attack
[ "cpe:/a:redhat:rhel_eus:8.6::highavailability", "cpe:/a:redhat:rhel_eus:8.6::resilientstorage" ]
null
8.8
null
null
RHSA-2020:0199
Red Hat Security Advisory: openslp security update
openslp: Heap-based buffer overflow in ProcessSrvRqst() in slpd_process.c leading to remote code execution
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
9.8
null
RHSA-2020:4946
Red Hat Security Advisory: libX11 security update
libX11: integer overflow leads to double free in locale handling
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
7.8
null
null
RHSA-2005:025
Red Hat Security Advisory: exim security update
security flaw security flaw
[ "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws" ]
null
null
null
null
RHSA-2014:0522
Red Hat Security Advisory: mariadb55-mariadb security update
mysql: unspecified DoS related to XML (CPU April 2014) mysql: unspecified DoS related to Partition (CPU April 2014) mysql: unspecified DoS related to Performance Schema (CPU April 2014) mysql: unspecified DoS related to Options (CPU April 2014) mysql: unspecified DoS related to Federated (CPU April 2014) mysql: unspecified vulnerability related to RBR (CPU April 2014) mysql: unspecified DoS related to Replication (CPU April 2014)
[ "cpe:/a:redhat:rhel_software_collections:1::el6" ]
null
null
null
null
RHSA-2018:1364
Red Hat Security Advisory: 389-ds-base security update
389-ds-base: ns-slapd crash via large filter value in ldapsearch
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
7.5
null
RHSA-2024:11238
Red Hat Security Advisory: python3.11-urllib3 security update
urllib3: Request body not stripped after redirect from 303 status changes request method to GET
[ "cpe:/a:redhat:enterprise_linux:9::appstream" ]
null
4.2
null
null
RHSA-2024:6583
Red Hat Security Advisory: httpd:2.4 security update
httpd: Security issues via backend applications whose response headers are malicious or exploitable
[ "cpe:/a:redhat:rhel_aus:8.2::appstream" ]
null
9.1
null
null
RHSA-2016:2996
Red Hat Security Advisory: Red Hat Enterprise Linux 4 Extended Life Cycle Support Three-Month Notice
This is the Three-Month notification for the retirement of Red Hat Enterprise Linux 4 Extended Life Cycle Support Add-On (ELS). This notification applies only to those customers subscribed to the Extended Life Cycle Support (ELS) channel for Red Hat Enterprise Linux 4.
[ "cpe:/o:redhat:rhel_els:4::as", "cpe:/o:redhat:rhel_els:4::es" ]
null
null
null
null
RHSA-2018:0026
Red Hat Security Advisory: qemu-kvm security update
An update for qemu-kvm is now available for Red Hat Enterprise Linux 7.2 Advanced Update Support, Red Hat Enterprise Linux 7.2 Telco Extended Update Support, and Red Hat Enterprise Linux 7.2 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
[ "cpe:/o:redhat:rhel_aus:7.2::server", "cpe:/o:redhat:rhel_e4s:7.2::server", "cpe:/o:redhat:rhel_tus:7.2::server" ]
null
null
null
null
RHSA-2025:3861
Red Hat Security Advisory: kernel-rt security update
kernel: ALSA: usb-audio: Fix out of bounds reads when finding clock sources
[ "cpe:/a:redhat:rhel_tus:8.4::nfv", "cpe:/a:redhat:rhel_tus:8.4::realtime" ]
null
7.1
null
null
RHSA-2019:1198
Red Hat Security Advisory: qemu-kvm security update
hardware: Microarchitectural Store Buffer Data Sampling (MSBDS) hardware: Micro-architectural Load Port Data Sampling - Information Leak (MLPDS) hardware: Microarchitectural Fill Buffer Data Sampling (MFBDS) hardware: Microarchitectural Data Sampling Uncacheable Memory (MDSUM)
[ "cpe:/o:redhat:rhel_aus:6.5::server" ]
null
null
3.8
null
RHSA-2020:0541
Red Hat Security Advisory: java-1.7.0-openjdk security update
OpenJDK: Incorrect exception processing during deserialization in BeanContextSupport (Serialization, 8224909) OpenJDK: Improper checks of SASL message properties in GssKrb5Base (Security, 8226352) OpenJDK: Incorrect isBuiltinStreamHandler check causing URL normalization issues (Networking, 8228548) OpenJDK: Use of unsafe RSA-MD5 checksum in Kerberos TGS (Security, 8229951) OpenJDK: Serialization filter changes via jdk.serialFilter property modification (Serialization, 8231422) OpenJDK: Excessive memory usage in OID processing in X.509 certificate parsing (Libraries, 8234037) OpenJDK: Incomplete enforcement of maxDatagramSockets limit in DatagramChannelImpl (Networking, 8231795)
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
3.7
null
null
RHSA-2023:5363
Red Hat Security Advisory: nodejs:18 security, bug fix, and enhancement update
nodejs-semver: Regular expression denial of service nodejs: Permissions policies can be bypassed via Module._load nodejs: Permissions policies can impersonate other modules in using module.constructor.createRequire() nodejs: Permissions policies can be bypassed via process.binding
[ "cpe:/a:redhat:enterprise_linux:9::appstream" ]
null
7.5
null
null
RHSA-2014:0509
Red Hat Security Advisory: java-1.5.0-ibm security update
libjpeg: information leak (read of uninitialized memory) OpenJDK: Incorrect mlib/raster image validation (2D, 8027841) OpenJDK: Protect logger handlers (Libraries, 8029740) OpenJDK: AWT incorrect FlavorMap seperation (AWT, 8026797) OpenJDK: RSA unpadding timing issues (Security, 8027766) OpenJDK: ServiceLoader Exception handling security bypass (Libraries, 8031394) OpenJDK: missing randomization of JNDI DNS client query IDs (JNDI, 8030731) JDK: Vulnerability in the IBMSecureRandom implementation of the IBMJCE and IBMSecureRandom cryptographic providers OpenJDK: insecure temporary file use in unpack200 (Libraries, 8033618) OpenJDK: insufficient escaping of window title string (Javadoc, 8026736) JDK: unspecified vulnerability fixed in 5.0u75, 6u75, 7u55 and 8u5 (2D) OpenJDK: AWT thread context handling (AWT, 8025010) OpenJDK: JPEG decoder input stream handling (2D, 8029854) OpenJDK: remove insecure Java Sound provider caching (Sound, 8026163)
[ "cpe:/a:redhat:rhel_extras:5::client", "cpe:/a:redhat:rhel_extras:5::server", "cpe:/a:redhat:rhel_extras:6" ]
null
null
null
null
RHSA-2021:1544
Red Hat Security Advisory: Red Hat OpenShift Service Mesh 2.0.4 security update
kiali/kiali-operator: can deploy specified image to any namespace
[ "cpe:/a:redhat:service_mesh:2.0::el8" ]
null
8.8
null
null
RHSA-2020:4344
Red Hat Security Advisory: Open Liberty 20.0.0.11 Runtime security update
Open Liberty 20.0.0.11 Runtime is now available from the Customer Portal. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
[ "cpe:/a::openliberty:20" ]
null
null
null
null
RHSA-2017:1365
Red Hat Security Advisory: nss security and bug fix update
nss: Null pointer dereference when handling empty SSLv2 messages
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
7.5
null
RHSA-2003:114
Red Hat Security Advisory: mod_auth_any security update
security flaw
[ "cpe:/o:redhat:enterprise_linux:2.1::as", "cpe:/o:redhat:enterprise_linux:2.1::aw", "cpe:/o:redhat:enterprise_linux:2.1::es", "cpe:/o:redhat:enterprise_linux:2.1::ws" ]
null
null
null
null
RHSA-2022:5771
Red Hat Security Advisory: thunderbird security update
Mozilla: Memory safety bugs fixed in Firefox 103 and 102.1 Mozilla: Directory indexes for bundled resources reflected URL parameters Mozilla: Mouse Position spoofing with CSS transforms
[ "cpe:/a:redhat:rhel_eus:8.2::appstream" ]
null
7.5
6.1
null
RHSA-2023:2453
Red Hat Security Advisory: libtpms security update
tpm: TCG TPM2.0 implementations vulnerable to memory corruption tpm2: TCG TPM2.0 implementations vulnerable to memory corruption
[ "cpe:/a:redhat:enterprise_linux:9::appstream" ]
null
5.5
null
null
RHSA-2022:5770
Red Hat Security Advisory: thunderbird security update
Mozilla: Memory safety bugs fixed in Firefox 103 and 102.1 Mozilla: Directory indexes for bundled resources reflected URL parameters Mozilla: Mouse Position spoofing with CSS transforms
[ "cpe:/a:redhat:rhel_e4s:8.1::appstream" ]
null
7.5
6.1
null
RHSA-2022:0539
Red Hat Security Advisory: thunderbird security update
Mozilla: Extensions could have bypassed permission confirmation during update Mozilla: Drag and dropping an image could have resulted in the dropped object being an executable Mozilla: Sandboxed iframes could have executed script if the parent appended elements Mozilla: Cross-Origin responses could be distinguished between script and non-script content-types Mozilla: frame-ancestors Content Security Policy directive was not enforced for framed extension pages Mozilla: Script Execution during invalid object state Mozilla: Memory safety bugs fixed in Firefox 97 and Firefox ESR 91.6
[ "cpe:/a:redhat:rhel_e4s:8.1::appstream" ]
null
8.8
null
null
RHSA-2020:1497
Red Hat Security Advisory: tigervnc security update
tigervnc: Stack use-after-return due to incorrect usage of stack memory in ZRLEDecoder tigervnc: Heap buffer overflow triggered from CopyRectDecoder due to incorrect value checks tigervnc: Heap buffer overflow in TightDecoder::FilterGradient tigervnc: Heap buffer overflow in DecodeManager::decodeRect tigervnc: Stack buffer overflow in CMsgReader::readSetCursor
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
7.2
null
null
RHSA-2020:3142
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.2 security update
wildfly: unsafe deserialization in Wildfly Enterprise Java Beans wildfly: Some EJB transaction objects may get accumulated causing Denial of Service wildfly: EJB SessionOpenInvocations may not be removed properly after a response is received causing Denial of Service
[ "cpe:/a:redhat:jboss_enterprise_application_platform:7.2::el6", "cpe:/a:redhat:jboss_enterprise_application_platform:7.2::el7", "cpe:/a:redhat:jboss_enterprise_application_platform:7.2::el8" ]
null
6.5
null
null
RHSA-2012:1418
Red Hat Security Advisory: kdelibs security update
kdelibs: Heap-based buffer overflow when parsing location of a font face source kdelibs: Heap-based buffer over-read when calculating dimensions of the canvas within the scale loop
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
null
null
RHSA-2016:0726
Red Hat Security Advisory: ImageMagick security update
ImageMagick: Insufficient shell characters filtering ImageMagick: File deletion ImageMagick: File moving ImageMagick: Local file read ImageMagick: SSRF vulnerability
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation", "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
8.4
null
RHSA-2013:1263
Red Hat Security Advisory: Red Hat Storage Console 2.1 security update
RESTEasy: XML eXternal Entity (XXE) flaw
[ "cpe:/a:redhat:storage:2.1:console:el6" ]
null
null
null
null
RHSA-2024:3752
Red Hat Security Advisory: Red Hat AMQ Broker 7.10.7 release and security update
JSON-java: parser confusion leads to OOM keycloak: path transversal in redirection validation
[ "cpe:/a:redhat:amq_broker:7.10" ]
null
8.1
null
null
RHSA-2024:6912
Red Hat Security Advisory: go-toolset:rhel8 security update
net/http: Denial of service due to improper 100-continue handling in net/http encoding/gob: golang: Calling Decoder.Decode on a message which contains deeply nested structures can cause a panic due to stack exhaustion
[ "cpe:/a:redhat:rhel_eus:8.8::appstream" ]
null
7.5
null
null
RHSA-2018:2945
Red Hat Security Advisory: Red Hat OpenShift Application Runtimes Spring Boot 1.5.16 update
tomcat: A bug in the UTF-8 decoder can lead to DoS
[ "cpe:/a:redhat:openshift_application_runtimes:1.0" ]
null
null
7.5
null
RHSA-2015:0113
Red Hat Security Advisory: libvncserver security update
libvncserver: integer overflow flaw, leading to a heap-based buffer overflow in screen size handling libvncserver: server stacked-based buffer overflow flaws in file transfer handling
[ "cpe:/o:redhat:rhel_eus:6.5::server" ]
null
null
null
null
RHSA-2024:1088
Red Hat Security Advisory: libX11 security update
libX11: InitExt.c can overwrite unintended portions of the Display structure if the extension request leads to a buffer overflow
[ "cpe:/a:redhat:rhel_eus:9.2::appstream" ]
null
7.3
null
null
RHSA-2018:3779
Red Hat Security Advisory: java-1.7.1-ibm security update
OpenJDK: Incorrect handling of unsigned attributes in signed Jar manifests (Security, 8194534) OpenJDK: Leak of sensitive header data via HTTP redirect (Networking, 8196902) OpenJDK: Incomplete enforcement of the trustURLCodebase restriction (JNDI, 8199177) OpenJDK: Improper field access checks (Hotspot, 8199226) OpenJDK: Missing endpoint identification algorithm check during TLS session resumption (JSSE, 8202613) OpenJDK: Infinite loop in RIFF format reader (Sound, 8205361) libpng: Integer overflow and resultant divide-by-zero in pngrutil.c:png_check_chunk_length() allows for denial of service
[ "cpe:/a:redhat:network_satellite:5.6::el6", "cpe:/a:redhat:network_satellite:5.7::el6" ]
null
null
6.5
null
RHSA-2015:0644
Red Hat Security Advisory: openstack-glance security and bug fix update
openstack-glance: user storage quota bypass
[ "cpe:/a:redhat:openstack:6::el7" ]
null
null
null
null
RHSA-2023:6643
Red Hat Security Advisory: libssh security update
libssh: NULL pointer dereference during rekeying with algorithm guessing libssh: authorization bypass in pki_verify_data_signature
[ "cpe:/a:redhat:enterprise_linux:9::appstream", "cpe:/o:redhat:enterprise_linux:9::baseos" ]
null
4.8
null
null
RHSA-2007:0662
Red Hat Security Advisory: httpd security update
httpd scoreboard lack of PID protection
[ "cpe:/o:redhat:enterprise_linux:3::as", "cpe:/o:redhat:enterprise_linux:3::desktop", "cpe:/o:redhat:enterprise_linux:3::es", "cpe:/o:redhat:enterprise_linux:3::ws", "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws" ]
null
null
null
null
RHSA-2013:0158
Red Hat Security Advisory: tomcat6 security update
Web: Bypass of security constraints
[ "cpe:/a:redhat:jboss_enterprise_web_server:1::el5", "cpe:/a:redhat:jboss_enterprise_web_server:1::el6" ]
null
null
null
null
RHSA-2020:3197
Red Hat Security Advisory: Red Hat Process Automation Manager 7.8.0 Security Update
HTTP/2: flood using PING frames results in unbounded memory growth HTTP/2: flood using HEADERS frames results in unbounded memory growth HTTP/2: flood using SETTINGS frames results in unbounded memory growth HTTP/2: flood using empty frames results in excessive resource consumption apache-commons-beanutils: does not suppresses the class property in PropertyUtilsBean by default cxf: does not restrict the number of message attachments cxf: OpenId Connect token service does not properly validate the clientId libquartz: XXE attacks via job description netty: HTTP request smuggling by mishandled whitespace before the colon in HTTP headers cxf: reflected XSS in the services listing page jackson-databind: lacks certain net.sf.ehcache blocking netty: HTTP request smuggling netty: HttpObjectDecoder.java allows Content-Length header to accompanied by second Content-Length header keycloak: security issue on reset credential flow netty: HTTP Request Smuggling due to Transfer-Encoding whitespace mishandling jackson-databind: Lacks certain xbean-reflect/JNDI blocking jackson-databind: Serialization gadgets in shaded-hikari-config jackson-databind: Serialization gadgets in ibatis-sqlmap jackson-databind: Serialization gadgets in anteros-core jackson-databind: mishandles the interaction between serialization gadgets and typing which could result in remote command execution jackson-databind: mishandles the interaction between serialization gadgets and typing which could result in remote command execution jackson-databind: Serialization gadgets in org.aoju.bus.proxy.provider.*.RmiProvider jackson-databind: Serialization gadgets in javax.swing.JEditorPane jackson-databind: Serialization gadgets in org.apache.activemq.jms.pool.XaPooledConnectionFactory jackson-databind: Serialization gadgets in org.apache.commons.proxy.provider.remoting.RmiProvider jackson-databind: Serialization gadgets in org.apache.openjpa.ee.WASRegistryManagedRuntime netty: compression/decompression codecs don't enforce limits on buffer allocation sizes jackson-databind: Serialization gadgets in org.springframework:spring-aop jackson-databind: Serialization gadgets in commons-jelly:commons-jelly jackson-databind: serialization in oadd.org.apache.xalan.lib.sql.JNDIConnectionPool jackson-databind: serialization in weblogic/oracle-aqjms jackson-databind: serialization in com.sun.org.apache.xalan.internal.lib.sql.JNDIConnectionPool
[ "cpe:/a:redhat:jboss_enterprise_bpms_platform:7.8" ]
null
8.1
7.5
null
RHSA-2023:3455
Red Hat Security Advisory: Release of OpenShift Serverless 1.29.0
golang.org/x/net/http2: avoid quadratic complexity in HPACK decoding golang: crypto/tls: large handshake records may cause panics golang: net/http, mime/multipart: denial of service from excessive resource consumption golang: net/http, net/textproto: denial of service from excessive memory allocation golang: net/http, net/textproto, mime/multipart: denial of service from excessive resource consumption golang: go/parser: Infinite loop in parsing golang: html/template: backticks not treated as string delimiters containerd: Supplementary groups are not set up properly
[ "cpe:/a:redhat:openshift_serverless:1.29::el8" ]
null
7.3
null
null
RHSA-2019:1236
Red Hat Security Advisory: .NET Core on Red Hat Enterprise Linux security and bug fix update
dotnet: timeouts for regular expressions are not enforced dotnet: infinite loop in Uri.TryCreate leading to ASP.Net Core Denial of Service dotnet: crash in IPAddress.TryCreate leading to ASP.Net Core Denial of Service
[ "cpe:/a:redhat:rhel_dotnet:1.0::el7", "cpe:/a:redhat:rhel_dotnet:1.1::el7", "cpe:/a:redhat:rhel_dotnet:2.1::el7", "cpe:/a:redhat:rhel_dotnet:2.2::el7" ]
null
null
7.5
null
RHSA-2020:4451
Red Hat Security Advisory: GNOME security, bug fix, and enhancement update
webkitgtk: Incorrect state management leading to universal cross-site scripting webkitgtk: Multiple memory corruption issues leading to arbitrary code execution webkitgtk: Multiple memory corruption issues leading to arbitrary code execution webkitgtk: Multiple memory corruption issues leading to arbitrary code execution webkitgtk: Incorrect state management leading to universal cross-site scripting webkitgtk: Multiple memory corruption issues leading to arbitrary code execution webkitgtk: Websites could reveal browsing history webkitgtk: Violation of iframe sandboxing policy webkitgtk: Multiple memory corruption issues leading to arbitrary code execution webkitgtk: Multiple memory corruption issues leading to arbitrary code execution webkitgtk: Multiple memory corruption issues leading to arbitrary code execution webkitgtk: Multiple memory corruption issues leading to arbitrary code execution webkitgtk: Multiple memory corruption issues leading to arbitrary code execution webkitgtk: Incorrect state management leading to universal cross-site scripting webkitgtk: Multiple memory corruption issues leading to arbitrary code execution webkitgtk: Multiple memory corruption issues leading to arbitrary code execution webkitgtk: Multiple memory corruption issues leading to arbitrary code execution webkitgtk: Multiple memory corruption issues leading to arbitrary code execution webkitgtk: Multiple memory corruption issues leading to arbitrary code execution webkitgtk: Multiple memory corruption issues leading to arbitrary code execution webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution webkitgtk: Use after free issue may lead to remote code execution webkitgtk: Denial of service via incorrect memory handling webkitgtk: Non-unique security origin for DOM object contexts webkitgtk: Incorrect security check for a top-level DOM object context webkitgtk: Incorrect state management leading to universal cross-site scripting webkitgtk: Multiple memory corruption issues leading to arbitrary code execution webkitgtk: Incorrect processing of file URLs webkitgtk: Race condition allows reading of restricted memory webkitgtk: Memory corruption triggered by a malicious web content webkitgtk: Type confusion leading to arbitrary code execution webkitgtk: Memory consumption issue leading to arbitrary code execution webkitgtk: Memory corruption triggered by a malicious web content webkitgtk: Type confusion leading to arbitrary code execution webkitgtk: Input validation issue leading to cross-site script attack webkitgtk: Logic issue may lead to arbitrary code execution webkitgtk: Memory corruption may lead to arbitrary code execution webkitgtk: Logic issue may lead to cross site scripting webkitgtk: Memory corruption may lead to arbitrary code execution webkitgtk: Memory corruption may lead to arbitrary code execution webkitgtk: Input validation issue may lead to cross site scripting webkitgtk: Logic issue may lead to arbitrary code execution webkitgtk: Command injection in web inspector webkitgtk: Use-after-free may lead to application termination or arbitrary code execution webkitgtk: Out-of-bounds read may lead to unexpected application termination or arbitrary code execution webkitgtk: Use-after-free may lead to application termination or arbitrary code execution webkitgtk: Access issue in content security policy webkitgtk: A logic issue may lead to cross site scripting webkitgtk: input validation issue may lead to a cross site scripting webkitgtk: Use-after-free issue in accessibility/AXObjectCache.cpp webkitgtk: use-after-free via crafted web content gnome-settings-daemon: Red Hat Customer Portal password logged and passed as command line argument when user registers through GNOME control center LibRaw: lack of thumbnail size range check can lead to buffer overflow webkitgtk: Buffer overflow leading to arbitrary code execution webkitgtk: Memory corruption leading to arbitrary code execution webkitgtk: Use-after-free leading to arbitrary code execution
[ "cpe:/a:redhat:enterprise_linux:8::appstream", "cpe:/a:redhat:enterprise_linux:8::crb", "cpe:/o:redhat:enterprise_linux:8::baseos" ]
null
8.8
null
null
RHSA-2024:3527
Red Hat Security Advisory: Red Hat AMQ Streams 2.7.0 release and security update
lz4: memory corruption due to an integer overflow bug caused by memmove argument zstd: Race condition allows attacker to access world-readable destination file protobuf-java: timeout in parser leads to DoS zstd: mysql: buffer overrun in util.c apache-commons-text: variable interpolation RCE Apache-Commons-BCEL: arbitrary bytecode produced via out-of-bounds writing json-smart: Uncontrolled Resource Consumption vulnerability in json-smart (Resource Exhaustion) guava: insecure temporary directory creation bouncycastle: potential blind LDAP injection attack using a self-signed certificate bc-java: Out of memory while parsing ASN.1 crafted data in org.bouncycastle.openssl.PEMParser class snappy-java: Missing upper bound check on chunk length in snappy-java can lead to Denial of Service (DoS) impact json-path: stack-based buffer overflow in Criteria.parse method io.vertx/vertx-core: memory leak due to the use of Netty FastThreadLocal data structures in Vertx io.vertx:vertx-core: memory leak when a TCP server is configured with TLS and SNI support quarkus-core: Leak of local configuration properties into Quarkus applications commons-compress: Denial of service caused by an infinite loop for a corrupted DUMP file netty-codec-http: Allocation of Resources Without Limits or Throttling
[ "cpe:/a:redhat:amq_streams:2" ]
null
5.3
null
null
RHSA-2011:0839
Red Hat Security Advisory: gimp security update
Gimp: Stack-based buffer overflow in Lighting plug-in Gimp: Stack-based buffer overflow in SphereDesigner plug-in Gimp: Stack-based buffer overflow in Gfig plug-in Gimp: Heap-based buffer overflow in Paint Shop Pro (PSP) plug-in
[ "cpe:/o:redhat:enterprise_linux:6::server" ]
null
null
null
null
RHSA-2024:3060
Red Hat Security Advisory: gstreamer1-plugins-bad-free security update
gstreamer-plugins-bad: Integer overflow leading to heap overwrite in MXF file handling with uncompressed video gstreamer-plugins-bad: Integer overflow leading to heap overwrite in MXF file handling with AES3 audio gstreamer-plugins-bad: Integer overflow in H.265 video parser leading to stack overwrite
[ "cpe:/a:redhat:enterprise_linux:8::appstream", "cpe:/a:redhat:enterprise_linux:8::crb" ]
null
5.5
null
null
RHSA-2024:2763
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 8.0 security update
undertow: unrestricted request storage leads to memory exhaustion undertow: Cookie Smuggling/Spoofing undertow: directory traversal vulnerability
[ "cpe:/a:redhat:jboss_enterprise_application_platform:8.0" ]
null
5.3
null
null
RHSA-2015:1671
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform security update
PicketLink: PicketLink IDP ignores role based authorization
[ "cpe:/a:redhat:jboss_enterprise_application_platform:6::el7" ]
null
null
null
null
RHSA-2017:0323
Red Hat Security Advisory: kernel security update
kernel: dccp: crash while sending ipv6 reset packet kernel: use after free in dccp protocol
[ "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
7.8
null
RHSA-2023:3490
Red Hat Security Advisory: kpatch-patch security update
kernel: net/ulp: use-after-free in listening ULP sockets kernel: udmabuf: improper validation of array index leading to local privilege escalation kernel: netfilter: use-after-free in nf_tables when processing batch requests can lead to privilege escalation
[ "cpe:/o:redhat:rhel_eus:9.0::baseos" ]
null
7.8
null
null
RHSA-2023:1988
Red Hat Security Advisory: kernel-rt security and bug fix update
kernel: memory corruption in usbmon driver
[ "cpe:/a:redhat:rhel_extras_rt:7" ]
null
6.7
null
null