id
stringlengths
13
15
title
stringlengths
29
176
description
stringlengths
8
32.1k
cpes
sequencelengths
0
20
cvss_v4_0
null
cvss_v3_1
float64
0
10
cvss_v3_0
float64
0
10
cvss_v2_0
null
RHSA-2022:7896
Red Hat Security Advisory: Red Hat Integration Debezium 1.9.7 security update
protobuf-java: potential DoS in the parsing procedure for binary data protobuf-java: timeout in parser leads to DoS
[ "cpe:/a:redhat:integration:1" ]
null
7.5
null
null
RHSA-2016:0070
Red Hat Security Advisory: Red Hat OpenShift Enterprise 3.1.1 bug fix and enhancement update
commons-fileupload: Arbitrary file upload via deserialization stapler-adjunct-zeroclipboard: multiple cross-site scripting (XSS) flaws jenkins: denial of service (SECURITY-87) jenkins: username discovery (SECURITY-110) jenkins: job configuration issues (SECURITY-127, SECURITY-128) jenkins: directory traversal flaw (SECURITY-131) jenkins: remote code execution flaw (SECURITY-150) jenkins: plug-in code can be downloaded by anyone with read access (SECURITY-155) jenkins: password exposure in DOM (SECURITY-138) jenkins: cross-site scripting flaw in Jenkins core (SECURITY-143) jenkins: Combination filter Groovy script unsecured (SECURITY-125) jenkins: directory traversal from artifacts via symlink (SECURITY-162) jenkins: update center metadata retrieval DoS attack (SECURITY-163) jenkins: HudsonPrivateSecurityRealm allows creation of reserved names (SECURITY-166) jenkins: Reflective XSS vulnerability (SECURITY-171, SECURITY-177) jenkins: Reflective XSS vulnerability (SECURITY-171, SECURITY-177) jenkins: forced API token change (SECURITY-180) jenkins: Project name disclosure via fingerprints (SECURITY-153) jenkins: Public value used for CSRF protection salt (SECURITY-169) jenkins: XXE injection into job configurations via CLI (SECURITY-173) jenkins: Secret key not verified when connecting a slave (SECURITY-184) jenkins: Information disclosure via sidepanel (SECURITY-192) jenkins: Local file inclusion vulnerability (SECURITY-195) jenkins: API tokens of other users available to admins (SECURITY-200) jenkins: Queue API did show items not visible to the current user (SECURITY-186) jenkins: JNLP slaves not subject to slave-to-master access control (SECURITY-206) jenkins: Stored XSS vulnerability in slave offline status message (SECURITY-214) jenkins: CSRF vulnerability in some administrative actions (SECURITY-225) jenkins: CSRF protection ineffective (SECURITY-233) jenkins: Jenkins plugin manager vulnerable to MITM attacks (SECURITY-234) jenkins: Remote code execution vulnerability due to unsafe deserialization in Jenkins remoting (SECURITY-218) server: patch operation should use patched object to check admission control server: build config to a strategy that isn't allowed by policy
[ "cpe:/a:redhat:openshift:3.1::el7" ]
null
null
null
null
RHSA-2022:0335
Red Hat Security Advisory: kpatch-patch security update
kernel: xfs: raw block device data leak in XFS_IOC_ALLOCSP IOCTL
[ "cpe:/o:redhat:rhel_e4s:8.1::baseos" ]
null
5.5
null
null
RHSA-2016:1657
Red Hat Security Advisory: kernel security update
kernel: Uninitialized variable in request_key handling causes kernel crash in error handling path kernel: infiniband: Unprivileged process can overwrite kernel memory using rdma_ucm.ko kernel: challenge ACK counter information disclosure.
[ "cpe:/o:redhat:rhel_eus:7.1::computenode", "cpe:/o:redhat:rhel_eus:7.1::server" ]
null
null
4.8
null
RHSA-2021:0358
Red Hat Security Advisory: net-snmp security update
net-snmp: Improper Privilege Management in EXTEND MIB may lead to privileged commands execution
[ "cpe:/o:redhat:rhel_eus:7.6::computenode", "cpe:/o:redhat:rhel_eus:7.6::server" ]
null
8.8
null
null
RHSA-2012:0973
Red Hat Security Advisory: nss, nss-util, and nspr security, bug fix, and enhancement update
Updated nss, nss-util, and nspr packages that fix one security issue, several bugs, and add various enhancements are now available for Red Hat Enterprise Linux 6. The Red Hat Security Response Team has rated this update as having moderate security impact.
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
null
null
RHSA-2015:1840
Red Hat Security Advisory: openldap security update
openldap: ber_get_next denial of service vulnerability
[ "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::client_workstation", "cpe:/o:redhat:enterprise_linux:5::server", "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation", "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
null
null
RHSA-2014:1311
Red Hat Security Advisory: bash security update
bash: code execution via specially-crafted environment (Incomplete fix for CVE-2014-6271) bash: parser can allow out-of-bounds memory access while handling redir_stack bash: off-by-one error in deeply nested flow control constructs
[ "cpe:/o:redhat:rhel_els:4::as", "cpe:/o:redhat:rhel_els:4::es", "cpe:/o:redhat:rhel_eus:5.9", "cpe:/o:redhat:rhel_eus:6.4::computenode", "cpe:/o:redhat:rhel_eus:6.4::server", "cpe:/o:redhat:rhel_mission_critical:5.6", "cpe:/o:redhat:rhel_mission_critical:6.2::server" ]
null
null
null
null
RHBA-2019:2044
Red Hat Bug Fix Advisory: gnome bug fix and enhancement update
LibRaw: DoS in parse_rollei function in internal/dcraw_common.cpp LibRaw: DoS in parse_sinar_ia function in internal/dcraw_common.cpp
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
3.3
null
RHSA-2013:1661
Red Hat Security Advisory: RDMA stack security, bug fix, and enhancement update
librdmacm: Tried to connect to port 6125 if ibacm.port was not found ibutils: insecure handling of files in the /tmp directory
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
null
null
RHSA-2016:1025
Red Hat Security Advisory: pcre security update
pcre: infinite recursion compiling pattern with recursive reference in a group with indefinite repeat (8.36/20) pcre: stack overflow caused by mishandled group empty match (8.38/11) pcre: buffer overflow for forward reference within backward assertion with excess closing parenthesis (8.38/18) pcre: buffer overflow caused by named forward reference to duplicate group number (8.38/30) pcre: Buffer overflow caused by lookbehind assertion (8.38/6) pcre: buffer overflow for forward reference within backward assertion with excess closing parenthesis (8.38/18) pcre: inefficient posix character class syntax check (8.38/16) pcre: workspace overflow for (*ACCEPT) with deeply nested parentheses (8.39/13, 10.22/12)
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
null
null
RHSA-2023:0608
Red Hat Security Advisory: thunderbird security update
Mozilla: Revocation status of S/Mime signature certificates was not checked
[ "cpe:/a:redhat:enterprise_linux:9::appstream" ]
null
7.5
null
null
RHSA-2021:3154
Red Hat Security Advisory: firefox security update
Mozilla: Uninitialized memory in a canvas object could have led to memory corruption Mozilla: Incorrect instruction reordering during JIT optimization Mozilla: Use-after-free media channels Mozilla: Race condition when resolving DNS names could have led to memory corruption Mozilla: Memory corruption as a result of incorrect style treatment Mozilla: Memory safety bugs fixed in Thunderbird 78.13
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
8.8
7.5
null
RHSA-2015:2685
Red Hat Security Advisory: openstack-ironic-discoverd security update
openstack-ironic-discoverd: potential remote code execution with debug mode enabled
[ "cpe:/a:redhat:openstack:6::el7" ]
null
null
null
null
RHSA-2023:5964
Red Hat Security Advisory: Red Hat OpenStack Platform 16.2.5 (collectd-libpod-stats) security update
golang: crypto/tls: large handshake records may cause panics golang: net/http, mime/multipart: denial of service from excessive resource consumption golang: net/http, net/textproto: denial of service from excessive memory allocation golang: net/http, net/textproto, mime/multipart: denial of service from excessive resource consumption golang: go/parser: Infinite loop in parsing golang: html/template: backticks not treated as string delimiters golang: crypto/tls: slow verification of certificate chains containing large RSA keys golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487) HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack)
[ "cpe:/a:redhat:openstack:16.2::el8" ]
null
7.5
null
null
RHSA-2024:0130
Red Hat Security Advisory: frr security update
ffr: Flowspec overflow in bgpd/bgp_flowspec.c ffr: Out of bounds read in bgpd/bgp_label.c frr: crash from specially crafted MP_UNREACH_NLRI-containing BGP UPDATE message frr: crash from malformed EOR-containing BGP UPDATE message
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
7.5
null
null
RHSA-2014:0221
Red Hat Security Advisory: postgresql92-postgresql security update
postgresql: SET ROLE without ADMIN OPTION allows adding and removing group members postgresql: privilege escalation via procedural language validator functions postgresql: CREATE INDEX race condition possibly leading to privilege escalation postgresql: stack-based buffer overflow in datetime input/output postgresql: integer overflows leading to buffer overflows postgresql: possible buffer overflow flaws postgresql: NULL pointer dereference postgresql: multiple integer overflows in hstore_io.c
[ "cpe:/a:redhat:rhel_software_collections:1::el6" ]
null
null
null
null
RHSA-2019:4114
Red Hat Security Advisory: nss security update
nss: Out-of-bounds write when passing an output buffer smaller than the block size to NSC_EncryptUpdate
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
null
8.1
null
RHSA-2013:0214
Red Hat Security Advisory: nss and nspr security, bug fix, and enhancement update
Updated nss and nspr packages that fix one security issue, various bugs, and add enhancements are now available for Red Hat Enterprise Linux 5. The Red Hat Security Response Team has rated this update as having important security impact.
[ "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
RHSA-2022:5730
Red Hat Security Advisory: OpenShift Container Platform 4.10.25 bug fix and security update
golang: math/big: uncontrolled memory consumption due to an unhandled overflow via Rat.SetString golang: encoding/pem: fix stack overflow in Decode golang: regexp: stack exhaustion via a deeply nested expression
[ "cpe:/a:redhat:openshift:4.10::el8" ]
null
7.5
null
null
RHSA-2021:0671
Red Hat Security Advisory: bind security update
bind: Buffer overflow in the SPNEGO implementation affecting GSSAPI security policy negotiation
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
8.1
null
null
RHSA-2020:2250
Red Hat Security Advisory: dotnet3.1 security update
dotnet: Denial of service via untrusted input dotnet: Denial of service due to infinite loop
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
7.5
null
null
RHSA-2019:4087
Red Hat Security Advisory: OpenShift Container Platform 4.1 openshift security update
libseccomp-golang: mishandling of multiple argument rules leading to a bypass of intended access restrictions kubernetes: Bearer tokens written to logs at high verbosity levels (>= 7)
[ "cpe:/a:redhat:openshift:4.1::el7", "cpe:/a:redhat:openshift:4.1::el8" ]
null
null
4.4
null
RHSA-2008:0862
Red Hat Security Advisory: tomcat security update
Apache Tomcat's default security policy is too open Absolute path traversal Apache Tomcat WEBDAV tomcat: Cross-Site-Scripting enabled by sendError call Tomcat host manager xss - name field tomcat RequestDispatcher information disclosure vulnerability tomcat Unicode directory traversal vulnerability
[ "cpe:/a:redhat:rhel_application_server:2" ]
null
null
null
null
RHSA-2022:8976
Red Hat Security Advisory: 389-ds-base security update
389-ds-base: sending crafted message could result in DoS 389-ds-base: expired password was still allowed to access the database 389-ds-base: SIGSEGV in sync_repl
[ "cpe:/a:redhat:rhel_eus:9.0::appstream" ]
null
6.5
null
null
RHSA-2020:0466
Red Hat Security Advisory: nss-softokn security update
nss: Out-of-bounds write when passing an output buffer smaller than the block size to NSC_EncryptUpdate
[ "cpe:/o:redhat:rhel_aus:6.6::server" ]
null
null
8.1
null
RHSA-2021:3145
Red Hat Security Advisory: .NET Core 2.1 security and bugfix update
dotnet: Dump file created world-readable
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
5.5
null
null
RHSA-2022:4584
Red Hat Security Advisory: zlib security update
zlib: A flaw found in zlib when compressing (not decompressing) certain inputs
[ "cpe:/a:redhat:enterprise_linux:9::appstream", "cpe:/a:redhat:enterprise_linux:9::crb", "cpe:/o:redhat:enterprise_linux:9::baseos" ]
null
8.2
null
null
RHSA-2018:1656
Red Hat Security Advisory: qemu-kvm security update
hw: cpu: speculative store bypass
[ "cpe:/o:redhat:rhel_aus:6.4::server" ]
null
null
5.6
null
RHSA-2018:1119
Red Hat Security Advisory: flash-plugin security update
flash-plugin: Remote Code Execution vulnerabilities (APSB18-08) flash-plugin: Information Disclosure vulnerabilities (APSB18-08) flash-plugin: Information Disclosure vulnerabilities (APSB18-08) flash-plugin: Remote Code Execution vulnerabilities (APSB18-08) flash-plugin: Information Disclosure vulnerabilities (APSB18-08) flash-plugin: Remote Code Execution vulnerabilities (APSB18-08)
[ "cpe:/a:redhat:rhel_extras:6" ]
null
null
8.8
null
RHSA-2024:9102
Red Hat Security Advisory: podman security update
podman: Symlink error leads to information disclosure containers/image: digest type does not guarantee valid type golang: archive/zip: Incorrect handling of certain ZIP files net/http: Denial of service due to improper 100-continue handling in net/http
[ "cpe:/a:redhat:enterprise_linux:9::appstream" ]
null
5.9
null
null
RHSA-2017:2477
Red Hat Security Advisory: Red Hat JBoss Data Virtualization 6.3 Update 7 security update
thrift: Infinite recursion via vectors involving the skip function zookeeper: Incorrect input validation with wchp/wchc four letter words jackson-databind: Deserialization vulnerability via readValue method of ObjectMapper
[ "cpe:/a:redhat:jboss_data_virtualization:6.3" ]
null
null
8.1
null
RHSA-2003:315
Red Hat Security Advisory: quagga security update
security flaw
[ "cpe:/o:redhat:enterprise_linux:3::as", "cpe:/o:redhat:enterprise_linux:3::es" ]
null
null
null
null
RHSA-2007:1027
Red Hat Security Advisory: tetex security update
t1lib font filename string overflow DCTStream:: readProgressiveDataUnit() DCTStream:: reset() CCITTFaxStream:: lookChar()
[ "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws", "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
RHSA-2016:1423
Red Hat Security Advisory: flash-plugin security update
flash-plugin: multiple code execution issues fixed in APSB16-25 flash-plugin: multiple code execution issues fixed in APSB16-25 flash-plugin: multiple code execution issues fixed in APSB16-25 flash-plugin: multiple code execution issues fixed in APSB16-25 flash-plugin: multiple code execution issues fixed in APSB16-25 flash-plugin: multiple code execution issues fixed in APSB16-25 flash-plugin: multiple code execution issues fixed in APSB16-25 flash-plugin: multiple code execution issues fixed in APSB16-25 flash-plugin: multiple code execution issues fixed in APSB16-25 flash-plugin: multiple code execution issues fixed in APSB16-25 flash-plugin: multiple code execution issues fixed in APSB16-25 flash-plugin: multiple code execution issues fixed in APSB16-25 flash-plugin: multiple code execution issues fixed in APSB16-25 flash-plugin: multiple code execution issues fixed in APSB16-25 flash-plugin: multiple code execution issues fixed in APSB16-25 flash-plugin: multiple code execution issues fixed in APSB16-25 flash-plugin: multiple code execution issues fixed in APSB16-25 flash-plugin: multiple code execution issues fixed in APSB16-25 flash-plugin: multiple code execution issues fixed in APSB16-25 flash-plugin: multiple code execution issues fixed in APSB16-25 flash-plugin: multiple code execution issues fixed in APSB16-25 flash-plugin: multiple code execution issues fixed in APSB16-25 flash-plugin: multiple code execution issues fixed in APSB16-25 flash-plugin: multiple code execution issues fixed in APSB16-25 flash-plugin: multiple code execution issues fixed in APSB16-25 flash-plugin: multiple code execution issues fixed in APSB16-25 flash-plugin: multiple code execution issues fixed in APSB16-25 flash-plugin: multiple code execution issues fixed in APSB16-25 flash-plugin: multiple code execution issues fixed in APSB16-25 flash-plugin: multiple code execution issues fixed in APSB16-25 flash-plugin: multiple code execution issues fixed in APSB16-25 flash-plugin: multiple code execution issues fixed in APSB16-25 flash-plugin: multiple code execution issues fixed in APSB16-25 flash-plugin: multiple code execution issues fixed in APSB16-25 flash-plugin: multiple code execution issues fixed in APSB16-25 flash-plugin: multiple code execution issues fixed in APSB16-25 flash-plugin: multiple code execution issues fixed in APSB16-25 flash-plugin: multiple code execution issues fixed in APSB16-25 flash-plugin: multiple code execution issues fixed in APSB16-25 flash-plugin: multiple code execution issues fixed in APSB16-25 flash-plugin: multiple code execution issues fixed in APSB16-25 flash-plugin: multiple code execution issues fixed in APSB16-25 flash-plugin: multiple code execution issues fixed in APSB16-25 flash-plugin: multiple code execution issues fixed in APSB16-25 flash-plugin: multiple code execution issues fixed in APSB16-25 flash-plugin: multiple code execution issues fixed in APSB16-25 flash-plugin: multiple code execution issues fixed in APSB16-25 flash-plugin: multiple code execution issues fixed in APSB16-25 flash-plugin: multiple code execution issues fixed in APSB16-25 flash-plugin: multiple code execution issues fixed in APSB16-25 flash-plugin: multiple code execution issues fixed in APSB16-25 flash-plugin: multiple code execution issues fixed in APSB16-25 flash-plugin: multiple code execution issues fixed in APSB16-25
[ "cpe:/a:redhat:rhel_extras:5::client", "cpe:/a:redhat:rhel_extras:5::server", "cpe:/a:redhat:rhel_extras:6" ]
null
null
8.8
null
RHSA-2013:0603
Red Hat Security Advisory: java-1.7.0-openjdk security update
OpenJDK: Specially crafted sample model integer overflow (2D, 8007014) OpenJDK: CMM malformed raster memory corruption (2D, 8007675)
[ "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
RHSA-2020:4235
Red Hat Security Advisory: chromium-browser security update
chromium-browser: Inappropriate implementation in networking chromium-browser: Use after free in payments chromium-browser: Use after free in Blink chromium-browser: Use after free in WebRTC chromium-browser: Use after free in NFC chromium-browser: Use after free in printing chromium-browser: Use after free in audio chromium-browser: Insufficient policy enforcement in extensions chromium-browser: Integer overflow in Blink chromium-browser: Integer overflow in SwiftShader chromium-browser: Use after free in WebXR chromium-browser: Insufficient data validation in dialogs chromium-browser: Insufficient data validation in navigation chromium-browser: Inappropriate implementation in V8 chromium-browser: Insufficient policy enforcement in Intents chromium-browser: Out of bounds read in audio chromium-browser: Side-channel information leakage in cache chromium-browser: Insufficient data validation in webUI chromium-browser: Insufficient policy enforcement in Omnibox chromium-browser: Inappropriate implementation in Blink chromium-browser: Integer overflow in media chromium-browser: Use after free in WebRTC chromium-browser: Insufficient policy enforcement in downloads chromium-browser: Uninitialized use in PDFium chromium-browser: Use after free in autofill chromium-browser: Use after free in password manager chromium-browser: Insufficient policy enforcement in networking
[ "cpe:/a:redhat:rhel_extras:6" ]
null
8.8
null
null
RHSA-2015:1066
Red Hat Security Advisory: php54 security and bug fix update
php: use after free vulnerability in unserialize() php: out of bounds read when parsing a crafted .php file file: out of bounds read in mconvert() php: heap buffer overflow in enchant_broker_request_dict() gd: buffer read overflow in gd_gif_in.c php: use after free vulnerability in unserialize() (incomplete fix of CVE-2014-8142) php: Free called on unitialized pointer in exif.c php: use after free vulnerability in unserialize() with DateTimeZone php: use after free in opcache extension php: use after free in phar_object.c regex: heap overflow in regcomp() on 32-bit architectures php: move_uploaded_file() NUL byte injection in file name php: buffer over-read in Phar metadata parsing php: use-after-free vulnerability in the process_nested_data function in ext/standard/var_unserializer.re php: invalid pointer free() in phar_tar_process_metadata() php: buffer overflow in phar_set_inode() php: pipelined request executed in deinitialized interpreter under httpd 2.4 php: missing null byte checks for paths in various PHP extensions php: missing null byte checks for paths in various PHP extensions php: SoapClient's __call() type confusion through unserialize() php: SoapClient's do_soap_call() type confusion after unserialize() php: type confusion issue in unserialize() with various SOAP methods php: type confusion issue in unserialize() with various SOAP methods php: type confusion issue in unserialize() with various SOAP methods php: Incomplete Class unserialization type confusion php: exception:: getTraceAsString type confusion issue after unserialize php: denial of service when processing a crafted file with Fileinfo php: denial of service when processing a crafted file with Fileinfo php: HTTP response splitting in header() function
[ "cpe:/a:redhat:rhel_software_collections:2::el6", "cpe:/a:redhat:rhel_software_collections:2::el7" ]
null
null
3.1
null
RHSA-2024:0833
Red Hat Security Advisory: OpenShift Container Platform 4.12.50 bug fix and security update
golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487) opentelemetry: DoS vulnerability in otelhttp go-git: Maliciously crafted Git server replies can cause DoS on go-git clients go-git: Maliciously crafted Git server replies can lead to path traversal and RCE on go-git clients
[ "cpe:/a:redhat:openshift:4.12::el8", "cpe:/a:redhat:openshift:4.12::el9" ]
null
8.1
null
null
RHSA-2021:2093
Red Hat Security Advisory: Release of OpenShift Serverless 1.14.1 security update
golang: crypto/elliptic: incorrect operations on the P-224 curve golang: cmd/go: packages using cgo can cause arbitrary code execution at build time
[ "cpe:/a:redhat:serverless:1.14::el8" ]
null
7.5
null
null
RHSA-2011:0843
Red Hat Security Advisory: postfix security update
(smtpd): Crash due to improper management of SASL handlers for SMTP sessions
[ "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws", "cpe:/o:redhat:enterprise_linux:5::server", "cpe:/o:redhat:enterprise_linux:6::server" ]
null
null
null
null
RHEA-2025:2422
Red Hat Enhancement Advisory: microcode_ctl bug fix and enhancement update
microcode_ctl: Improper input validation in UEFI firmware microcode_ctl: Improper input validation in UEFI firmware microcode_ctl: Improper input validation in XmlCli feature for UEFI firmware microcode_ctl: Improper input validation in UEFI firmware microcode_ctl: Improper input validation in UEFI firmware CseVariableStorageSmm
[ "cpe:/o:redhat:rhel_aus:8.6::baseos", "cpe:/o:redhat:rhel_e4s:8.6::baseos", "cpe:/o:redhat:rhel_tus:8.6::baseos" ]
null
7.5
null
null
RHSA-2022:1053
Red Hat Security Advisory: Red Hat Virtualization Host security and enhancement update [ovirt-4.4.10] Async #2
expat: Malformed 2- and 3-byte UTF-8 sequences can lead to arbitrary code execution expat: Namespace-separator characters in "xmlns[:prefix]" attribute values can lead to arbitrary code execution expat: Integer overflow in storeRawNames()
[ "cpe:/o:redhat:rhev_hypervisor:4.4::el8" ]
null
9.8
null
null
RHSA-2017:1431
Red Hat Security Advisory: qemu-kvm-rhev security and bug fix update
Qemu: display: cirrus: OOB read access issue
[ "cpe:/o:redhat:enterprise_linux:7::hypervisor" ]
null
null
4
null
RHSA-2024:6054
Red Hat Security Advisory: ACS 4.4 enhancement and security update
containers/image: digest type does not guarantee valid type go-retryablehttp: url might write sensitive information to log file gorilla/schema: Potential memory exhaustion attack due to sparse slice deserialization
[ "cpe:/a:redhat:advanced_cluster_security:4.4::el8" ]
null
7.5
null
null
RHSA-2020:0964
Red Hat Security Advisory: OpenShift Container Platform 3.11 jenkins-2-plugins security update
openshift/jenkins-plugin: Deserialization in snakeyaml YAML() objects allows for remote code execution
[ "cpe:/a:redhat:openshift:3.11::el7" ]
null
8.8
null
null
RHSA-2023:1181
Red Hat Security Advisory: Release of OpenShift Serverless 1.27.1
golang: net/http: excessive memory growth in a Go server accepting HTTP/2 requests
[ "cpe:/a:redhat:openshift_serverless:1.27::el8" ]
null
5.3
null
null
RHSA-2013:1207
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 6.1.1 update
httpd: multiple XSS flaws due to unescaped hostnames httpd: XSS flaw in mod_proxy_balancer manager interface httpd: mod_rewrite allows terminal escape sequences to be written to the log file httpd: mod_dav DoS (httpd child process crash) via a URI MERGE request with source URI not handled by mod_dav PicketBox: Insecure storage of masked passwords Java: XML signature spoofing JGroups: Authentication via cached credentials Bayeux: Reflected Cross-Site Scripting (XSS)
[ "cpe:/a:redhat:jboss_enterprise_application_platform:6::el5" ]
null
null
null
null
RHSA-2013:1348
Red Hat Security Advisory: Red Hat Enterprise Linux 5 kernel update
kernel: request_module() OOM local DoS
[ "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
RHSA-2024:11482
Red Hat Security Advisory: kernel security update
kernel: KVM: arm64: Disassociate vcpus from redistributor region on teardown
[ "cpe:/a:redhat:rhel_eus:9.2::appstream", "cpe:/a:redhat:rhel_eus:9.2::crb", "cpe:/o:redhat:rhel_eus:9.2::baseos" ]
null
5.6
null
null
RHSA-2024:5694
Red Hat Security Advisory: tomcat security update
tomcat: Improper Handling of Exceptional Conditions tomcat: Denial of Service in Tomcat
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
7.5
null
null
RHSA-2017:3247
Red Hat Security Advisory: firefox security update
Mozilla: Memory safety bugs fixed in Firefox 57 and Firefox ESR 52.5 (MFSA 2017-25) Mozilla: Use-after-free of PressShell while restyling layout (MFSA 2017-25) Mozilla: Cross-origin URL information leak through Resource Timing API (MFSA 2017-25)
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation", "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
6.5
null
RHSA-2024:0937
Red Hat Security Advisory: kpatch-patch security update
kernel: GSM multiplexing race condition leads to privilege escalation
[ "cpe:/o:redhat:rhel_eus:8.6::baseos" ]
null
7
null
null
RHSA-2011:1749
Red Hat Security Advisory: libxml2 security and bug fix update
libxml2: Crash (stack frame overflow or NULL pointer dereference) by traversal of XPath axis libxml2: double-free in XPath processing code libxml2: Off-by-one error leading to heap-based buffer overflow in encoding libxml2: Heap-based buffer overflow by adding new namespace node to an existing nodeset or merging nodesets libxml2: double free caused by malformed XPath expression in XSLT libxml2: double-free caused by malformed XPath expression in XSLT
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
null
null
RHSA-2023:4948
Red Hat Security Advisory: thunderbird security update
Mozilla: Full screen notification obscured by file open dialog Mozilla: Full screen notification obscured by external program Mozilla: Memory corruption in IPC CanvasTranslator Mozilla: Memory corruption in IPC ColorPickerShownCallback Mozilla: Memory corruption in IPC FilePickerShownCallback Mozilla: Memory corruption in JIT UpdateRegExpStatics Mozilla: Error reporting methods in SpiderMonkey could have triggered an Out of Memory Exception Mozilla: Push notifications saved to disk unencrypted Mozilla: XLL file extensions were downloadable without warnings Mozilla: Browsing Context potentially not cleared when closing Private Window Mozilla: Memory safety bugs fixed in Firefox 117, Firefox ESR 102.15, Firefox ESR 115.2, Thunderbird 102.15, and Thunderbird 115.2 Mozilla: Memory safety bugs fixed in Firefox 117, Firefox ESR 115.2, and Thunderbird 115.2
[ "cpe:/a:redhat:rhel_e4s:8.1::appstream" ]
null
8.8
null
null
RHSA-2010:0489
Red Hat Security Advisory: java-1.5.0-ibm security update
OpenJDK Applet Trusted Methods Chaining Privilege Escalation Vulnerability (6904691) OpenJDK JPEGImageReader stepX Integer Overflow Vulnerability (6909597) JDK multiple unspecified vulnerabilities JDK multiple unspecified vulnerabilities JDK multiple unspecified vulnerabilities JDK unspecified vulnerability in ImageIO component OpenJDK ImagingLib arbitrary code execution vulnerability (6914866) OpenJDK AWT Library Invalid Index Vulnerability (6914823) JDK unspecified vulnerability in Java2D component
[ "cpe:/a:redhat:rhel_extras:4", "cpe:/a:redhat:rhel_extras:5::client", "cpe:/a:redhat:rhel_extras:5::server" ]
null
null
null
null
RHSA-2014:0742
Red Hat Security Advisory: thunderbird security update
Mozilla: Miscellaneous memory safety hazards (rv:24.6) (MFSA 2014-48) Mozilla: Use-after-free and out of bounds issues found using Address Sanitizer (MFSA 2014-49) Mozilla: Use-after-free with SMIL Animation Controller (MFSA 2014-52)
[ "cpe:/a:redhat:rhel_productivity:5", "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
null
null
RHSA-2017:2886
Red Hat Security Advisory: rh-mysql57-mysql security and bug fix update
mysql: Incorrect input validation allowing code execution via mysqldump mysql: Server: Replication unspecified vulnerability (CPU Jan 2017) mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2017) mysql: Server: DML unspecified vulnerability (CPU Jan 2017) mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2017) mysql: Server: Replication unspecified vulnerability (CPU Jan 2017) mysql: Server: InnoDB unspecified vulnerability (CPU Jan 2017) mysql: Server: DDL unspecified vulnerability (CPU Jan 2017) mysql: Server: DDL unspecified vulnerability (CPU Jan 2017) mysql: unrestricted mysqld_safe's ledir (CPU Jan 2017) mysql: Server: DML unspecified vulnerability (CPU Apr 2017) mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2017) mysql: insecure error log file handling in mysqld_safe, incomplete CVE-2016-6664 fix (CPU Jan 2017) mysql: Server: MyISAM unspecified vulnerability (CPU Jan 2017) mysql: Logging unspecified vulnerability (CPU Jan 2017) mysql: Server: Error Handling unspecified vulnerability (CPU Jan 2017) mysql: Server: X Plugin unspecified vulnerability (CPU Jan 2017) mysql: Server: Security: Encryption unspecified vulnerability (CPU Jan 2017) mysql: Server: DML unspecified vulnerability (CPU Apr 2017) mysql: Server: Memcached unspecified vulnerability (CPU Apr 2017) mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2017) mysql: Server: InnoDB unspecified vulnerability (CPU Apr 2017) mysql: Server: Security: Privileges unspecified vulnerability (CPU Apr 2017) mysql: Server: DML unspecified vulnerability (CPU Apr 2017) mysql: Server: DML unspecified vulnerability (CPU Apr 2017) mysql: Server: DML unspecified vulnerability (CPU Apr 2017) mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2017) mysql: Server: Audit Plug-in unspecified vulnerability (CPU Apr 2017) mysql: Server: Security: Privileges unspecified vulnerability (CPU Apr 2017) mysql: Server: Security: Privileges unspecified vulnerability (CPU Apr 2017) mysql: Server: Security: Privileges unspecified vulnerability (CPU Apr 2017) mysql: Server: DDL unspecified vulnerability (CPU Apr 2017) mysql: Server: Security: Privileges unspecified vulnerability (CPU Apr 2017) mysql: Server: C API unspecified vulnerability (CPU Apr 2017) mysql: Server: Security: Encryption unspecified vulnerability (CPU Apr 2017) mysql: Server: UDF unspecified vulnerability (CPU Jul 2017) mysql: integer underflow in get_56_lenc_string() leading to DoS (CPU Apr 2017) mysql: Incorrect input validation allowing code execution via mysqldump mysql: Server: Memcached unspecified vulnerability (CPU Jul 2017) mysql: Server: DML unspecified vulnerability (CPU Jul 2017) mysql: X Plugin unspecified vulnerability (CPU Jul 2017) mysql: Server: Optimizer unspecified vulnerability (CPU Jul 2017) mysql: Server: DML unspecified vulnerability (CPU Jul 2017) mysql: Server: DML unspecified vulnerability (CPU Jul 2017) mysql: Server: DML unspecified vulnerability (CPU Jul 2017) mysql: Server: Optimizer unspecified vulnerability (CPU Jul 2017) mysql: Server: DML unspecified vulnerability (CPU Jul 2017) mysql: Server: DML unspecified vulnerability (CPU Jul 2017) mysql: Server: Optimizer unspecified vulnerability (CPU Jul 2017) mysql: X Plugin unspecified vulnerability (CPU Jul 2017) mysql: Server: Replication unspecified vulnerability (CPU Jul 2017) mysql: Server: Charsets unspecified vulnerability (CPU Jul 2017) mysql: Server: Replication unspecified vulnerability (CPU Jul 2017) mysql: C API unspecified vulnerability (CPU Jul 2017) mysql: Client mysqldump unspecified vulnerability (CPU Jul 2017) mysql: Server: DDL unspecified vulnerability (CPU Jul 2017) mysql: Server: DDL unspecified vulnerability (CPU Jul 2017) mysql: Server: Security: Privileges unspecified vulnerability (CPU Jul 2019)
[ "cpe:/a:redhat:rhel_software_collections:2::el6", "cpe:/a:redhat:rhel_software_collections:2::el7" ]
null
null
2.7
null
RHSA-2022:8851
Red Hat Security Advisory: Red Hat OpenStack Platform 16.2.4 (rabbitmq-server) security update
rabbitmq-server: improper neutralization of script-related HTML tags in a web page (basic XSS) in management UI rabbitmq-server: improper neutralization of script-related HTML tags in a web page (basic XSS) in federation management plugin
[ "cpe:/a:redhat:openstack:16.2::el8" ]
null
4.8
null
null
RHSA-2022:6764
Red Hat Security Advisory: bind security update
bind: memory leak in ECDSA DNSSEC verification code bind: memory leaks in EdDSA DNSSEC verification code
[ "cpe:/a:redhat:rhel_e4s:8.1::appstream", "cpe:/o:redhat:rhel_e4s:8.1::baseos" ]
null
7.5
null
null
RHSA-2024:1795
Red Hat Security Advisory: VolSync 0.9.1 security fixes and enhancements
golang-protobuf: encoding/protojson, internal/encoding/json: infinite loop in protojson.Unmarshal when unmarshaling certain forms of invalid JSON
[ "cpe:/a:redhat:acm:2.10::el9" ]
null
5.9
null
null
RHSA-2021:4270
Red Hat Security Advisory: rust-toolset:rhel8 security, bug fix, and enhancement update
rust: incorrect parsing of extraneous zero characters at the beginning of an IP address string
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
7.3
null
null
RHSA-2023:3277
Red Hat Security Advisory: kernel security update
kernel: use-after-free caused by l2cap_reassemble_sdu() in net/bluetooth/l2cap_core.c
[ "cpe:/o:redhat:rhel_aus:7.7::server", "cpe:/o:redhat:rhel_e4s:7.7::server", "cpe:/o:redhat:rhel_tus:7.7::server" ]
null
7.1
null
null
RHSA-2017:3368
Red Hat Security Advisory: qemu-kvm security update
Qemu: i386: multiboot OOB access while loading kernel image Qemu: cirrus: OOB access issue in mode4and5 write functions
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
4.4
null
RHSA-2008:0617
Red Hat Security Advisory: vim security update
vim format string flaw vim: command execution via scripts not sanitizing inputs to execute and system vim: heap buffer overflow in mch_expand_wildcards() vim: arbitrary code execution in commands: K, Control-], g]
[ "cpe:/o:redhat:enterprise_linux:3::as", "cpe:/o:redhat:enterprise_linux:3::desktop", "cpe:/o:redhat:enterprise_linux:3::es", "cpe:/o:redhat:enterprise_linux:3::ws", "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws" ]
null
null
null
null
RHSA-2024:2004
Red Hat Security Advisory: kernel security and bug fix update
kernel: race condition in VT_RESIZEX ioctl when vc_cons[i].d is already NULL leading to NULL pointer dereference Kernel: bluetooth: Unauthorized management command execution kernel: use after free in unix_stream_sendpage kernel: net/sched: sch_hfsc UAF kernel: irdma: Improper access control
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
5.6
null
null
RHSA-2024:3583
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 8.0.2 Security update
eap-galleon: custom provisioning creates unsecured http-invoker EAP: OIDC app attempting to access the second tenant, the user should be prompted to log jberet: jberet-core logging database credentials EAP: wildfly-elytron has a SSRF security issue
[ "cpe:/a:redhat:jboss_enterprise_application_platform:8.0" ]
null
7.3
null
null
RHSA-2020:4213
Red Hat Security Advisory: Red Hat support for Spring Boot 2.2.10 security update
keycloak: security headers missing on REST endpoints
[ "cpe:/a:redhat:openshift_application_runtimes:1.0" ]
null
4.8
null
null
RHSA-2017:0153
Red Hat Security Advisory: openstack-cinder security update
openstack-nova/glance/cinder: Malicious image may exhaust resources
[ "cpe:/a:redhat:openstack:5::el7" ]
null
null
5.3
null
RHSA-2021:2351
Red Hat Security Advisory: .NET 5.0 on RHEL 7 security and bugfix update
dotnet: ASP.NET Core Client Disconnect Denial of Service
[ "cpe:/a:redhat:rhel_dotnet:5.0::el7" ]
null
5.9
null
null
RHSA-2019:3193
Red Hat Security Advisory: firefox security update
Mozilla: Use-after-free when creating index updates in IndexedDB Mozilla: Potentially exploitable crash due to 360 Total Security Mozilla: Stack buffer overflow in HKDF output Mozilla: Stack buffer overflow in WebRTC networking Mozilla: Unintended access to a privileged JSONView object Mozilla: document.domain-based origin isolation has same-origin-property violation Mozilla: Incorrect HTML parsing results in XSS bypass technique Mozilla: Memory safety bugs fixed in Firefox 70 and Firefox ESR 68.2 expat: heap-based buffer over-read via crafted XML input
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
6.1
7.5
null
RHSA-2014:0508
Red Hat Security Advisory: java-1.6.0-ibm security update
libjpeg: information leak (read of uninitialized memory) libpng: unhandled zero-length PLTE chunk or NULL palette OpenJDK: Incorrect mlib/raster image validation (2D, 8027841) OpenJDK: Protect logger handlers (Libraries, 8029740) JDK: unspecified vulnerability fixed in 6u75, 7u55 and 8u5 (Deployment) OpenJDK: AWT incorrect FlavorMap seperation (AWT, 8026797) OpenJDK: incorrect caching of data initialized via TCCL (JAXWS, 8026801) OpenJDK: RSA unpadding timing issues (Security, 8027766) OpenJDK: ServiceLoader Exception handling security bypass (Libraries, 8031394) OpenJDK: Activation framework default command map caching (JAX-WS, 8025152) OpenJDK: missing randomization of JNDI DNS client query IDs (JNDI, 8030731) OpenJDK: Better ScriptEngineManager ScriptEngine management (Libraries, 8036794) JDK: Vulnerability in the IBMSecureRandom implementation of the IBMJCE and IBMSecureRandom cryptographic providers OpenJDK: insecure temporary file use in unpack200 (Libraries, 8033618) OpenJDK: insufficient escaping of window title string (Javadoc, 8026736) JDK: unspecified vulnerability fixed in 5.0u75, 6u75, 7u55 and 8u5 (2D) JDK: unspecified vulnerability fixed in 6u75, 7u55 and 8u5 (Deployment) OpenJDK: AWT thread context handling (AWT, 8025010) OpenJDK: incorrect caching of data initialized via TCCL (JAXB, 8025030) JDK: unspecified vulnerability fixed in 6u75, 7u55 and 8u5 (Deployment) OpenJDK: JPEG decoder input stream handling (2D, 8029854) OpenJDK: incorrect caching of data initialized via TCCL (JAXWS, 8026188) OpenJDK: remove insecure Java Sound provider caching (Sound, 8026163) JDK: unspecified vulnerability fixed in 6u75, 7u55 and 8u5 (Deployment)
[ "cpe:/a:redhat:rhel_extras:5::client", "cpe:/a:redhat:rhel_extras:5::server", "cpe:/a:redhat:rhel_extras:6" ]
null
null
null
null
RHSA-2022:5696
Red Hat Security Advisory: java-1.8.0-openjdk security, bug fix, and enhancement update
OpenJDK: class compilation issue (Hotspot, 8281859) OpenJDK: improper restriction of MethodHandle.invokeBasic() (Hotspot, 8281866) OpenJDK: integer truncation issue in Xalan-J (JAXP, 8285407)
[ "cpe:/a:redhat:enterprise_linux:8::appstream", "cpe:/a:redhat:enterprise_linux:8::crb" ]
null
7.5
null
null
RHSA-2007:0402
Red Hat Security Advisory: seamonkey security update
Multiple Firefox flaws (CVE-2007-1562, CVE-2007-2867, CVE-2007-2868, CVE-2007-2869, CVE-2007-2870, CVE-2007-2871) fetchmail/mutt/evolution/...: APOP password disclosure vulnerability security flaw Multiple Firefox flaws (CVE-2007-1562, CVE-2007-2867, CVE-2007-2868, CVE-2007-2869, CVE-2007-2870, CVE-2007-2871) security flaw Multiple Firefox flaws (CVE-2007-1562, CVE-2007-2867, CVE-2007-2868, CVE-2007-2869, CVE-2007-2870, CVE-2007-2871) security flaw Multiple Firefox flaws (CVE-2007-1562, CVE-2007-2867, CVE-2007-2868, CVE-2007-2869, CVE-2007-2870, CVE-2007-2871)
[ "cpe:/o:redhat:enterprise_linux:2.1::as", "cpe:/o:redhat:enterprise_linux:2.1::aw", "cpe:/o:redhat:enterprise_linux:2.1::es", "cpe:/o:redhat:enterprise_linux:2.1::ws", "cpe:/o:redhat:enterprise_linux:3::as", "cpe:/o:redhat:enterprise_linux:3::desktop", "cpe:/o:redhat:enterprise_linux:3::es", "cpe:/o:redhat:enterprise_linux:3::ws", "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws" ]
null
null
null
null
RHSA-2020:4187
Red Hat Security Advisory: spice and spice-gtk security update
spice: multiple buffer overflow vulnerabilities in QUIC decoding code
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
6.6
null
null
RHSA-2018:3397
Red Hat Security Advisory: qemu-kvm security update
hw: cpu: speculative store bypass
[ "cpe:/o:redhat:rhel_aus:6.5::server" ]
null
null
5.6
null
RHSA-2021:3959
Red Hat Security Advisory: Red Hat build of Eclipse Vert.x 4.1.5 security update
netty-codec: Bzip2Decoder doesn't allow setting size restrictions for decompressed data netty-codec: SnappyFrameDecoder doesn't restrict chunk length and may buffer skippable chunks in an unnecessary way
[ "cpe:/a:redhat:openshift_application_runtimes:1.0" ]
null
7.5
null
null
RHSA-2021:0831
Red Hat Security Advisory: rh-nodejs12-nodejs security update
nodejs: HTTP2 'unknownProtocol' cause DoS by resource exhaustion nodejs: DNS rebinding in --inspect
[ "cpe:/a:redhat:rhel_software_collections:3::el7" ]
null
7.5
null
null
RHSA-2018:0336
Red Hat Security Advisory: Satellite 6.3 security, bug fix, and enhancement update
rubygem-will_paginate: XSS vulnerabilities foreman: models with a 'belongs_to' association to an Organization do not verify association belongs to that Organization V8: integer overflow leading to buffer overflow in Zone::New foreman: inspect in a provisioning template exposes sensitive controller information pulp: Leakage of CA key in pulp-qpid-ssl-cfg pulp: Unsafe use of bash $RANDOM for NSS DB password and seed foreman: privilege escalation through Organization and Locations API foreman: Information disclosure in provisioning template previews foreman: inside discovery-debug, the root password is displayed in plaintext foreman: Persistent XSS in Foreman remote execution plugin foreman: Foreman information leak through unauthorized multiple_checkboxes helper foreman: Information leak through organizations and locations feature foreman: Stored XSS vulnerability in remote execution plugin foreman: Stored XSS in org/loc wizard foreman: Stored XSS via organization/location with HTML in name foreman-debug: missing obfuscation of sensitive information katello-debug: Possible symlink attacks due to use of predictable file names puppet: Unsafe YAML deserialization rubygem-hammer_cli: no verification of API server's SSL certificate foreman: Image password leak Interconnect: Denial of Service vulnerability in Red Hat JBoss AMQ Interconnect katello: SQL inject in errata-related REST API
[ "cpe:/a:redhat:satellite:6.3::el7", "cpe:/a:redhat:satellite_capsule:6.3::el7" ]
null
null
4.3
null
RHSA-2020:1470
Red Hat Security Advisory: ntp security update
ntp: Stack-based buffer overflow in ntpq and ntpdc allows denial of service or code execution
[ "cpe:/o:redhat:rhel_eus:7.6::computenode", "cpe:/o:redhat:rhel_eus:7.6::server" ]
null
null
7
null
RHSA-2022:8062
Red Hat Security Advisory: unbound security, bug fix, and enhancement update
unbound: novel ghost domain attack that allows attackers to trigger continued resolvability of malicious domain names unbound: novel ghost domain attack that allows attackers to trigger continued resolvability of malicious domain names
[ "cpe:/a:redhat:enterprise_linux:9::appstream", "cpe:/a:redhat:enterprise_linux:9::crb" ]
null
6.5
null
null
RHSA-2022:0721
Red Hat Security Advisory: OpenShift Logging bug fix and security update (5.3.5)
jackson-dataformat-cbor: Unchecked allocation of byte buffer can cause a java.lang.OutOfMemoryError exception origin-aggregated-logging/elasticsearch: Incomplete fix for netty-codec-http CVE-2021-21409
[ "cpe:/a:redhat:logging:5.3::el8" ]
null
5.9
null
null
RHSA-2024:3323
Red Hat Security Advisory: pcp security update
pcp: exposure of the redis server backend allows remote command execution via pmproxy
[ "cpe:/a:redhat:rhel_aus:8.4::appstream", "cpe:/a:redhat:rhel_e4s:8.4::appstream", "cpe:/a:redhat:rhel_tus:8.4::appstream" ]
null
8.8
null
null
RHSA-2013:0130
Red Hat Security Advisory: httpd security, bug fix, and enhancement update
httpd: mod_negotiation XSS via untrusted file names in directories with MultiViews enabled httpd: mod_negotiation CRLF injection via untrusted file names in directories with MultiViews enabled httpd: mod_negotiation XSS via untrusted file names in directories with MultiViews enabled
[ "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::client_workstation", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
RHSA-2019:0136
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.2.0 security update
keycloak: SAML request parser replaces special strings with system properties
[ "cpe:/a:redhat:jboss_enterprise_application_platform:7.2::el6" ]
null
null
6.5
null
RHSA-2021:4153
Red Hat Security Advisory: dnsmasq security and bug fix update
dnsmasq: fixed outgoing port used when --server is used with an interface name
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
4
null
null
RHSA-2022:1254
Red Hat Security Advisory: Red Hat OpenStack Platform 16.1 (python-waitress) security update
waitress: Inconsistent Interpretation of HTTP Requests ('HTTP Request Smuggling')
[ "cpe:/a:redhat:openstack:16.1::el8" ]
null
7.5
null
null
RHSA-2024:0606
Red Hat Security Advisory: openssh security update
ssh: Prefix truncation attack on Binary Packet Protocol (BPP) openssh: potential command injection via shell metacharacters
[ "cpe:/a:redhat:enterprise_linux:8::appstream", "cpe:/o:redhat:enterprise_linux:8::baseos" ]
null
6.5
null
null
RHSA-2010:0440
Red Hat Security Advisory: rhev-hypervisor security and bug fix update
openssl: missing bn_wexpand return value checks TLS: MITM attacks via session renegotiation
[ "cpe:/o:redhat:enterprise_linux:5::hypervisor" ]
null
null
null
null
RHSA-2021:4798
Red Hat Security Advisory: kpatch-patch security update
kernel: use-after-free in drivers/infiniband/core/ucma.c ctx use-after-free
[ "cpe:/o:redhat:enterprise_linux:7::server" ]
null
7.8
null
null
RHSA-2002:041
Red Hat Security Advisory: : Updated mod_ssl packages available
security flaw
[ "cpe:/o:redhat:linux:7.0", "cpe:/o:redhat:linux:7.1", "cpe:/o:redhat:linux:7.2" ]
null
null
null
null
RHSA-2019:1972
Red Hat Security Advisory: ruby:2.5 security update
rubygems: Installing a malicious gem may lead to arbitrary code execution
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
null
7.2
null
RHSA-2023:6940
Red Hat Security Advisory: mod_auth_openidc:2.3 security and bug fix update
mod_auth_openidc: Open Redirect in oidc_validate_redirect_url() using tab character mod_auth_openidc: NULL pointer dereference when OIDCStripCookies is set and a crafted Cookie header is supplied
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
7.5
null
null
RHSA-2019:1553
Red Hat Security Advisory: chromium-browser security update
chromium-browser: Use-after-free in Blink
[ "cpe:/a:redhat:rhel_extras:6" ]
null
null
8.8
null
RHSA-2021:3020
Red Hat Security Advisory: ruby:2.7 security update
rubygem-bundler: Dependencies of gems with explicit source may be installed from a different source rubygem-rdoc: Command injection vulnerability in RDoc ruby: FTP PASV command response can cause Net::FTP to connect to arbitrary host ruby: StartTLS stripping vulnerability in Net::IMAP
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
7.4
null
null
RHSA-2022:6178
Red Hat Security Advisory: firefox security update
Mozilla: Address bar spoofing via XSLT error handling Mozilla: Cross-origin XSLT Documents would have inherited the parent's permissions Mozilla: Data race and potential use-after-free in PK11_ChangePW Mozilla: Memory safety bugs fixed in Firefox 104 and Firefox ESR 102.2 Mozilla: Memory safety bugs fixed in Firefox 104, Firefox ESR 102.2, and Firefox ESR 91.13
[ "cpe:/a:redhat:rhel_e4s:8.1::appstream" ]
null
8.8
7.5
null
RHSA-2019:3834
Red Hat Security Advisory: kernel security update
hw: Machine Check Error on Page Size Change (IFU) hw: Intel GPU Denial Of Service while accessing MMIO in lower power state hw: TSX Transaction Asynchronous Abort (TAA)
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
6.5
null
RHSA-2018:1249
Red Hat Security Advisory: jboss-ec2-eap package for EAP 7.1.2
undertow: Path traversal in ServletResourceManager class undertow: HTTP header injection using CRLF with UTF-8 Encoding (incomplete fix of CVE-2016-4993) slf4j: Deserialisation vulnerability in EventData constructor can allow for arbitrary code execution
[ "cpe:/a:redhat:jboss_enterprise_application_platform:7.1::el7", "cpe:/a:redhat:jboss_enterprise_application_platform:7::el6" ]
null
null
8.1
null
RHSA-2015:0808
Red Hat Security Advisory: java-1.6.0-openjdk security update
jar: directory traversal vulnerability OpenJDK: incorrect handling of phantom references (Hotspot, 8071931) ICU: layout engine glyphStorage off-by-one (OpenJDK 2D, 8067699) OpenJDK: incorrect permissions check in resource loading (Beans, 8068320) OpenJDK: insufficient hardening of RSA-CRT implementation (JCE, 8071726) OpenJDK: jar directory traversal issues (Tools, 8064601) OpenJDK: certificate options parsing uncaught exception (JSSE, 8068720)
[ "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::server", "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation", "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
null
null
RHSA-2020:4024
Red Hat Security Advisory: okular security update
okular: local binary execution via specially crafted PDF files
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
5.3
null
null