id
stringlengths
13
15
title
stringlengths
29
176
description
stringlengths
8
32.1k
cpes
sequencelengths
0
20
cvss_v4_0
null
cvss_v3_1
float64
0
10
cvss_v3_0
float64
0
10
cvss_v2_0
null
RHSA-2023:0954
Red Hat Security Advisory: systemd security update
systemd: local information leak due to systemd-coredump not respecting fs.suid_dumpable kernel setting systemd: deadlock in systemd-coredump via a crash with a long backtrace
[ "cpe:/a:redhat:enterprise_linux:9::appstream", "cpe:/o:redhat:enterprise_linux:9::baseos" ]
null
5.5
null
null
RHSA-2021:2813
Red Hat Security Advisory: glibc security update
glibc: stack-based buffer overflow if the input to any of the printf family of functions is an 80-bit long double with a non-canonical bit pattern
[ "cpe:/o:redhat:rhel_aus:7.4::server", "cpe:/o:redhat:rhel_e4s:7.4::server", "cpe:/o:redhat:rhel_tus:7.4::server" ]
null
7.5
null
null
RHSA-2021:5219
Red Hat Security Advisory: Red Hat Single Sign-On security update on RHEL 8
Keycloak: Incorrect authorization allows unpriviledged users to create other users
[ "cpe:/a:redhat:red_hat_single_sign_on:7.5::el8" ]
null
8.3
null
null
RHSA-2015:1923
Red Hat Security Advisory: qemu-kvm-rhev security update
qemu: Heap overflow vulnerability in ne2000_receive() function
[ "cpe:/a:redhat:enterprise_linux:6::hypervisor" ]
null
null
null
null
RHSA-2012:1413
Red Hat Security Advisory: thunderbird security update
Mozilla: Fixes for Location object issues (MFSA 2012-90) Mozilla: Fixes for Location object issues (MFSA 2012-90) Mozilla: Fixes for Location object issues (MFSA 2012-90)
[ "cpe:/a:redhat:rhel_productivity:5", "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
null
null
RHSA-2025:3542
Red Hat Security Advisory: RHODF-4.15-RHEL-9 security update
golang.org/x/crypto/ssh: Misuse of ServerConfig.PublicKeyCallback may cause authorization bypass in golang.org/x/crypto golang.org/x/net/html: Non-linear parsing of case-insensitive content in golang.org/x/net/html
[ "cpe:/a:redhat:openshift_data_foundation:4.15::el9" ]
null
7.5
null
null
RHSA-2013:1542
Red Hat Security Advisory: samba security, bug fix, and enhancement update
samba: clickjacking vulnerability in SWAT samba: cross-site request forgery vulnerability in SWAT samba: DoS via integer overflow when reading an EA list
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
null
null
RHSA-2024:0325
Red Hat Security Advisory: Updated RHEL-7-based Middleware container images
SnakeYaml: Constructor Deserialization Remote Code Execution
[ "cpe:/a:redhat:rhosemc:1.0::el7" ]
null
9.8
null
null
RHSA-2020:2289
Red Hat Security Advisory: kernel security and bug fix update
kernel: double free may be caused by the function allocate_trace_buffer in the file kernel/trace/trace.c kernel: Heap overflow in mwifiex_update_bss_desc_with_ie function in marvell/mwifiex/scan.c kernel: Heap overflow in mwifiex_uap_parse_tail_ies function in drivers/net/wireless/marvell/mwifiex/ie.c kernel: use-after-free in __blk_add_trace in kernel/trace/blktrace.c Kernel: NetLabel: null pointer dereference while receiving CIPSO packet with null category may cause kernel panic
[ "cpe:/o:redhat:enterprise_linux:7::hypervisor", "cpe:/o:redhat:rhel_eus:7.6::computenode", "cpe:/o:redhat:rhel_eus:7.6::server" ]
null
5.9
8
null
RHSA-2019:1455
Red Hat Security Advisory: Advanced Virtualization security update
hardware: Microarchitectural Store Buffer Data Sampling (MSBDS) hardware: Micro-architectural Load Port Data Sampling - Information Leak (MLPDS) hardware: Microarchitectural Fill Buffer Data Sampling (MFBDS) libvirt: wrong permissions in systemd admin-sock due to missing SocketMode parameter hardware: Microarchitectural Data Sampling Uncacheable Memory (MDSUM)
[ "cpe:/a:redhat:advanced_virtualization:8::el8" ]
null
null
3.8
null
RHSA-2018:2371
Red Hat Security Advisory: Red Hat OpenShift Application Runtimes security and bug fix update
vertx: Improper neutralization of CRLF sequences allows remote attackers to inject arbitrary HTTP response headers vertx-web: Incomplete CSRF validation by CSRFHandler
[ "cpe:/a:redhat:openshift_application_runtimes:1.0" ]
null
null
6.8
null
RHSA-2005:363
Red Hat Security Advisory: RealPlayer security update
security flaw
[ "cpe:/a:redhat:rhel_extras:4" ]
null
null
null
null
RHSA-2024:1386
Red Hat Security Advisory: ovn22.12 security update
ovn: insufficient validation of BFD packets may lead to denial of service
[ "cpe:/o:redhat:enterprise_linux:8::fastdatapath" ]
null
6.5
null
null
RHSA-2018:3650
Red Hat Security Advisory: ghostscript security update
ghostscript: .tempfile file permission issues (699657) ghostscript: shading_param incomplete type checking (699660) ghostscript: missing type check in type checker (699659) ghostscript: incorrect access checking in temp file handling to disclose contents of files (699658)
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
5.3
null
RHSA-2010:0660
Red Hat Security Advisory: kernel security and bug fix update
kernel: mm: keep a guard page below a grow-down stack segment kernel: gfs2: rename causes kernel panic
[ "cpe:/o:redhat:rhel_eus:5.3" ]
null
null
null
null
RHSA-2024:5941
Red Hat Security Advisory: libvpx security update
libvpx: Heap buffer overflow related to VP9 encoding libvpx: Integer overflow in vpx_img_alloc()
[ "cpe:/a:redhat:enterprise_linux:8::appstream", "cpe:/a:redhat:enterprise_linux:8::crb" ]
null
7.1
null
null
RHEA-2018:2189
Red Hat Enhancement Advisory: Red Hat JBoss Web Server 5.0.0 enhancement update
tomcat: A bug in the UTF-8 decoder can lead to DoS
[ "cpe:/a:redhat:jboss_enterprise_web_server:5.0::el6" ]
null
null
7.5
null
RHSA-2013:0697
Red Hat Security Advisory: thunderbird security update
Mozilla: Miscellaneous memory safety hazards (rv:17.0.5) (MFSA 2013-30) Mozilla: Cross-site scripting (XSS) using timed history navigations (MFSA 2013-38) Mozilla: Bypass of SOW protections allows cloning of protected nodes (MFSA 2013-36) Mozilla: WebGL crash with Mesa graphics driver on Linux (MFSA 2013-35) Mozilla: Out-of-bounds write in Cairo library (MFSA 2013-31)
[ "cpe:/a:redhat:rhel_productivity:5", "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
null
null
RHSA-2021:2977
Red Hat Security Advisory: OpenShift Container Platform 4.7.23 security update
gogo/protobuf: plugin/unmarshal/unmarshal.go lacks certain index validation
[ "cpe:/a:redhat:openshift:4.7::el8" ]
null
8.6
null
null
RHSA-2018:0342
Red Hat Security Advisory: rh-maven35-jackson-databind security update
jackson-databind: Deserialization vulnerability via readValue method of ObjectMapper jackson-databind: Unsafe deserialization due to incomplete black list (incomplete fix for CVE-2017-7525) jackson-databind: Unsafe deserialization due to incomplete black list (incomplete fix for CVE-2017-15095)
[ "cpe:/a:redhat:rhel_software_collections:3::el7" ]
null
null
8.1
null
RHSA-2020:1353
Red Hat Security Advisory: kernel-rt security and bug fix update
kernel: heap overflow in mwifiex_update_vs_ie() function of Marvell WiFi driver kernel: rtl_p2p_noa_ie in drivers/net/wireless/realtek/rtlwifi/ps.c in the Linux kernel lacks a certain upper-bound check, leading to a buffer overflow
[ "cpe:/a:redhat:enterprise_mrg:2:server:el6" ]
null
null
6.3
null
RHSA-2020:1970
Red Hat Security Advisory: chromium-browser security update
chromium-browser: Out of bounds read and write in PDFium chromium-browser: Use after free in payments chromium-browser: Insufficient data validation in URL formatting chromium-browser: Use after free in ANGLE
[ "cpe:/a:redhat:rhel_extras:6" ]
null
null
8.8
null
RHSA-2015:1633
Red Hat Security Advisory: subversion security update
subversion: (mod_dav_svn) remote denial of service with certain requests with dynamically evaluated revision numbers subversion: (mod_dav_svn) spoofing svn:author property values for new revisions subversion: svn_repos_trace_node_locations() reveals paths hidden by authz
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
null
null
RHSA-2013:0821
Red Hat Security Advisory: thunderbird security update
Mozilla: Miscellaneous memory safety hazards (rv:17.0.6) (MFSA 2013-41) Mozilla: Privileged access for content level constructor (MFSA 2013-42) Mozilla: Use-after-free with video and onresize event (MFSA 2013-46) Mozilla: Uninitialized functions in DOMSVGZoomEvent (MFSA 2013-47) Mozilla: Memory corruption found using Address Sanitizer (MFSA 2013-48) Mozilla: Memory corruption found using Address Sanitizer (MFSA 2013-48) Mozilla: Memory corruption found using Address Sanitizer (MFSA 2013-48) Mozilla: Memory corruption found using Address Sanitizer (MFSA 2013-48) Mozilla: Memory corruption found using Address Sanitizer (MFSA 2013-48) Mozilla: Memory corruption found using Address Sanitizer (MFSA 2013-48)
[ "cpe:/a:redhat:rhel_productivity:5", "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
null
null
RHSA-2022:0024
Red Hat Security Advisory: OpenShift Container Platform 4.6.53 security update
haproxy: an HTTP method name may contain a space followed by the name of a protected resource haproxy: request smuggling attack or response splitting via duplicate content-length header
[ "cpe:/a:redhat:openshift:4.6::el7", "cpe:/a:redhat:openshift:4.6::el8" ]
null
7.5
null
null
RHBA-2024:5691
Red Hat Bug Fix Advisory: ca-certificates bug fix and enhancement update
python-certifi: Removal of e-Tugra root certificate
[ "cpe:/o:redhat:enterprise_linux:9::baseos" ]
null
9.1
null
null
RHSA-2022:8854
Red Hat Security Advisory: Red Hat OpenStack Platform 16.2.4 (python-scciclient) security update
python-scciclient: missing server certificate verification
[ "cpe:/a:redhat:openstack:16.2::el8" ]
null
7.4
null
null
RHSA-2022:5697
Red Hat Security Advisory: java-1.8.0-openjdk security and bug fix update
OpenJDK: class compilation issue (Hotspot, 8281859) OpenJDK: improper restriction of MethodHandle.invokeBasic() (Hotspot, 8281866) OpenJDK: integer truncation issue in Xalan-J (JAXP, 8285407)
[ "cpe:/a:redhat:rhel_eus:8.4::appstream", "cpe:/a:redhat:rhel_eus:8.4::crb" ]
null
7.5
null
null
RHSA-2021:1240
Red Hat Security Advisory: mariadb:10.3 and mariadb-devel:10.3 security update
mariadb: writable system variables allows a database user with SUPER privilege to execute arbitrary code as the system mysql user
[ "cpe:/a:redhat:rhel_eus:8.2::appstream", "cpe:/a:redhat:rhel_eus:8.2::crb" ]
null
7.2
null
null
RHSA-2024:2758
Red Hat Security Advisory: kernel security and bug fix update
kernel: KVM: SVM: improper check in svm_set_x2apic_msr_interception allows direct access to host x2apic msrs kernel: Marvin vulnerability side-channel leakage in the RSA decryption operation hw: amd: Instruction raise #VC exception at exit hw: amd: Instruction raise #VC exception at exit
[ "cpe:/a:redhat:enterprise_linux:9::appstream", "cpe:/a:redhat:enterprise_linux:9::crb", "cpe:/a:redhat:enterprise_linux:9::nfv", "cpe:/a:redhat:enterprise_linux:9::realtime", "cpe:/o:redhat:enterprise_linux:9::baseos" ]
null
7.1
null
null
RHSA-2005:598
Red Hat Security Advisory: sysreport security update
security flaw
[ "cpe:/o:redhat:enterprise_linux:3::as", "cpe:/o:redhat:enterprise_linux:3::desktop", "cpe:/o:redhat:enterprise_linux:3::es", "cpe:/o:redhat:enterprise_linux:3::ws" ]
null
null
null
null
RHSA-2017:0021
Red Hat Security Advisory: gstreamer1-plugins-bad-free security update
gstreamer-plugins-bad-free: Integer overflow when allocating render buffer in VMnc decoder gstreamer-plugins-bad-free: Off-by-one read in gst_h264_parse_set_caps gstreamer1-plugins-bad-free: Out-of-bounds read in gst_mpegts_section_new gstreamer-plugins-bad-free: NULL pointer dereference in mpegts parser
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
4.3
null
RHSA-2007:1176
Red Hat Security Advisory: autofs security update
autofs default doesn't set nodev in /net
[ "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
RHSA-2015:2501
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform security update
apache-commons-collections: InvokerTransformer code execution during deserialisation
[ "cpe:/a:redhat:jboss_enterprise_application_platform:6.1", "cpe:/a:redhat:jboss_enterprise_application_platform:6.2", "cpe:/a:redhat:jboss_enterprise_application_platform:6.3", "cpe:/a:redhat:jboss_enterprise_application_platform:6.4" ]
null
null
null
null
RHSA-2025:0552
Red Hat Security Advisory: Multicluster Engine for Kubernetes 2.4.7 security updates and bug fixes
golang.org/x/crypto/ssh: Misuse of ServerConfig.PublicKeyCallback may cause authorization bypass in golang.org/x/crypto golang.org/x/net/html: Non-linear parsing of case-insensitive content in golang.org/x/net/html
[ "cpe:/a:redhat:multicluster_engine:2.4::el8" ]
null
7.5
null
null
RHSA-2003:221
Red Hat Security Advisory: : Updated stunnel packages fix signal vulnerability
security flaw
[ "cpe:/o:redhat:linux:7.1", "cpe:/o:redhat:linux:7.2", "cpe:/o:redhat:linux:7.3", "cpe:/o:redhat:linux:8.0" ]
null
null
null
null
RHSA-2022:0450
Red Hat Security Advisory: Red Hat Single Sign-On 7.5.1 for OpenShift image security and enhancement update
log4j: Remote code execution in Log4j 1.x when application is configured to use JMSAppender log4j: Remote code execution in Log4j 1.x when application is configured to use JMSSink log4j: SQL injection in Log4j 1.x when application is configured to use JDBCAppender log4j: Unsafe deserialization flaw in Chainsaw log viewer
[ "cpe:/a:redhat:rhosemc:1.0::el8" ]
null
8.8
null
null
RHSA-2019:4269
Red Hat Security Advisory: container-tools:rhel8 security and bug fix update
HTTP/2: flood using PING frames results in unbounded memory growth HTTP/2: flood using HEADERS frames results in unbounded memory growth runc: AppArmor/SELinux bypass with malicious image that specifies a volume at /proc podman: resolving symlink in host filesystem leads to unexpected results of copy operation
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
null
2.5
null
RHSA-2024:10750
Red Hat Security Advisory: postgresql:12 security update
postgresql: PostgreSQL PL/Perl environment variable changes execute arbitrary code
[ "cpe:/a:redhat:rhel_eus:8.8::appstream" ]
null
8.8
null
null
RHSA-2014:0629
Red Hat Security Advisory: rhev-hypervisor6 security update
kernel: vhost-net: insufficiency in handling of big packets in handle_rx() openssl: SSL/TLS MITM vulnerability
[ "cpe:/o:redhat:enterprise_linux:6::hypervisor" ]
null
null
null
null
RHSA-2013:1862
Red Hat Security Advisory: Fuse ESB Enterprise/Fuse MQ Enterprise 7.1.0 update
openjpa: Remote arbitrary code execution by creating a serialized object and leveraging improperly secured server programs Restlet: remote code execution due to insecure XML deserialization Restlet: remote code execution due to insecure deserialization Camel: remote code execution via header field manipulation Console: Stored cross-site scripting (XSS)
[ "cpe:/a:redhat:fuse_esb_enterprise:7.1.0", "cpe:/a:redhat:fuse_management_console:7.1.0", "cpe:/a:redhat:fuse_mq_enterprise:7.1.0" ]
null
null
null
null
RHSA-2018:3676
Red Hat Security Advisory: .NET Core on Red Hat Enterprise Linux security update
Core: Arbitrary file and directory creation
[ "cpe:/a:redhat:rhel_dotnet:2.1::el7" ]
null
null
5.5
null
RHSA-2015:1485
Red Hat Security Advisory: java-1.7.1-ibm security update
JDK: plain text data stored in memory dumps OpenJDK: deserialization issue in ObjectInputStream.readSerialData() (Libraries, 8076401) OpenJDK: non-constant time comparisons in crypto code (JCE, 8074865) JCE: missing EC parameter validation in ECDH_Derive() (OpenJDK JCE, 8075833) JDK: unspecified vulnerability fixed in 7u85 and 8u51 (2D) OpenJDK: incorrect code permission checks in RMIConnectionImpl (JMX, 8075853) OpenJDK: name for reverse DNS lookup used in certificate identity check (JSSE, 8067694) ICU: integer overflow in LETableReference verifyLength() (OpenJDK 2D, 8077520) JDK: unspecified vulnerability fixed in 6u101, 7u85 and 8u51 (2D) JDK: unspecified vulnerability fixed in 6u101, 7u85 and 8u51 (2D) JDK: unspecified vulnerability fixed in 6u101, 7u85 and 8u51 (Deployment) LOGJAM: TLS connections which support export grade DHE key-exchange are vulnerable to MITM attacks JDK: unspecified vulnerability fixed in 7u85 and 8u51 (Deployment) OpenJDK: improper permission checks in MBeanServerInvocationHandler (JMX, 8076397) OpenJDK: insufficient context checks during object deserialization (Libraries, 8076405) OpenJDK: RemoteObjectInvocationHandler allows calling finalize() (RMI, 8076409) JDK: unspecified vulnerability fixed in 7u85 and 8u51 (Deployment) OpenJDK: incorrect OCSP nextUpdate checking (Libraries, 8075374) OpenJDK: DnsClient fails to release request information after error (JNDI, 8075378) ICU: missing boundary checks in layout engine (OpenJDK 2D, 8071715)
[ "cpe:/a:redhat:rhel_extras:6", "cpe:/a:redhat:rhel_extras:7" ]
null
null
3.7
null
RHSA-2024:4559
Red Hat Security Advisory: nodejs security update
nodejs: using the fetch() function to retrieve content from an untrusted URL leads to denial of service c-ares: Out of bounds read in ares__read_line() nodejs: HTTP Request Smuggling via Content Length Obfuscation
[ "cpe:/a:redhat:rhel_eus:9.2::appstream" ]
null
6.1
null
null
RHSA-2004:008
Red Hat Security Advisory: tcpdump security update
security flaw security flaw security flaw
[ "cpe:/o:redhat:enterprise_linux:2.1::as", "cpe:/o:redhat:enterprise_linux:2.1::aw", "cpe:/o:redhat:enterprise_linux:2.1::es", "cpe:/o:redhat:enterprise_linux:2.1::ws", "cpe:/o:redhat:enterprise_linux:3::as", "cpe:/o:redhat:enterprise_linux:3::desktop", "cpe:/o:redhat:enterprise_linux:3::es", "cpe:/o:redhat:enterprise_linux:3::ws" ]
null
null
null
null
RHSA-2018:0649
Red Hat Security Advisory: libvorbis security update
Mozilla: Vorbis audio processing out of bounds write (MFSA 2018-08)
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
7.8
null
RHSA-2022:4589
Red Hat Security Advisory: thunderbird security update
Mozilla: Incorrect security status shown after viewing an attached email Mozilla: Bypassing permission prompt in nested browsing contexts Mozilla: iframe Sandbox bypass Mozilla: Reader mode bypassed SameSite cookies Mozilla: Speech Synthesis feature not properly disabled Mozilla: Fullscreen notification bypass using popups Mozilla: Leaking browser history with CSS variables Mozilla: Memory safety bugs fixed in Firefox 100 and Firefox ESR 91.9
[ "cpe:/a:redhat:enterprise_linux:9::appstream" ]
null
9.8
7.5
null
RHSA-2018:2772
Red Hat Security Advisory: kernel-alt security and bug fix update
kernel: Infoleak/use-after-free in __oom_reap_task_mm function in mm/oom_kill.c
[ "cpe:/o:redhat:enterprise_linux:7::server" ]
null
null
6.7
null
RHSA-2015:1769
Red Hat Security Advisory: libunwind security update
libunwind: off-by-one in dwarf_to_unw_regnum()
[ "cpe:/a:redhat:openstack:5::el7" ]
null
null
null
null
RHSA-2006:0232
Red Hat Security Advisory: tar security update
security flaw
[ "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws" ]
null
null
null
null
RHSA-2024:4726
Red Hat Security Advisory: httpd security update
httpd: Encoding problem in mod_proxy httpd: Substitution encoding issue in mod_rewrite httpd: Improper escaping of output in mod_rewrite httpd: NULL pointer dereference in mod_proxy httpd: Potential SSRF in mod_rewrite
[ "cpe:/a:redhat:enterprise_linux:9::appstream" ]
null
7.4
null
null
RHSA-2008:0890
Red Hat Security Advisory: wireshark security update
wireshark: SCTP dissector crash wireshark: SNMP dissector crash wireshark: TFTP dissector crash wireshark: crash in X.509sat and Roofnet dissectors wireshark: crash in LDAP dissector wireshark: crash in SCCP dissector wireshark: crash in the GSM SMS dissector wireshark: unexpected exit in the PANA and KISMET dissectors wireshark: memory disclosure in the RMI dissector wireshark: crash in the packet reassembling wireshark: multiple buffer overflows in NCP dissector wireshark: infinite loop in the NCP dissector wireshark: crash triggered by zlib-compressed packet data wireshark: crash via crafted Tektronix .rf5 file
[ "cpe:/o:redhat:enterprise_linux:3::as", "cpe:/o:redhat:enterprise_linux:3::desktop", "cpe:/o:redhat:enterprise_linux:3::es", "cpe:/o:redhat:enterprise_linux:3::ws", "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws", "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::client_workstation", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
RHSA-2023:5221
Red Hat Security Advisory: kpatch-patch security update
kernel: ipvlan: out-of-bounds write caused by unclear skb->cb kernel: UAF in nftables when nft_set_lookup_global triggered after handling named and anonymous sets in batch requests kernel: net/sched: cls_fw component can be exploited as result of failure in tcf_change_indev function kernel: netfilter: use-after-free due to improper element removal in nft_pipapo_remove() kernel: nf_tables: stack-out-of-bounds-read in nft_byteorder_eval() kernel: cls_flower: out-of-bounds write in fl_set_geneve_opt()
[ "cpe:/o:redhat:enterprise_linux:8::baseos" ]
null
7.8
null
null
RHSA-2013:0256
Red Hat Security Advisory: JBoss Enterprise Application Platform 5.2.0 security update
apache-cxf: SOAPAction spoofing on document literal web services apache-cxf: Bypass of security constraints on WS endpoints when using WSS4JInInterceptor
[ "cpe:/a:redhat:jboss_enterprise_application_platform:5.2.0" ]
null
null
null
null
RHSA-2011:1409
Red Hat Security Advisory: openssl security update
openssl: CRL verification vulnerability
[ "cpe:/o:redhat:enterprise_linux:6::server" ]
null
null
null
null
RHSA-2021:4153
Red Hat Security Advisory: dnsmasq security and bug fix update
dnsmasq: fixed outgoing port used when --server is used with an interface name
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
4
null
null
RHSA-2017:0206
Red Hat Security Advisory: chromium-browser security update
chromium-browser: universal xss in blink chromium-browser: universal xss in blink chromium-browser: universal xss in blink chromium-browser: out of bounds memory access in webrtc chromium-browser: universal xss in blink chromium-browser: unauthorised file access in devtools chromium-browser: heap overflow in v8 chromium-browser: address spoofing in omnibox chromium-browser: heap overflow in skia chromium-browser: address spoofing in omnibox chromium-browser: ui spoofing in blink chromium-browser: uninitialised memory access in webm video chromium-browser: universal xss in chrome://apps chromium-browser: use after free in renderer chromium-browser: universal xss in chrome://downloads chromium-browser: use after free in extensions chromium-browser: bypass of content security policy in blink chromium-browser: type confusion in metrics chromium-browser: heap overflow in ffmpeg chromium-browser: heap overflow in ffmpeg chromium-browser: ui spoofing
[ "cpe:/a:redhat:rhel_extras:6" ]
null
null
4.3
null
RHSA-2021:2106
Red Hat Security Advisory: kernel security and bug fix update
kernel: use after free in eventpoll.c may lead to escalation of privilege kernel: Integer overflow in Intel(R) Graphics Drivers kernel: SCSI target (LIO) write to any block on ILO backstore kernel: Use after free via PI futex state
[ "cpe:/a:redhat:rhel_eus:8.1::crb", "cpe:/o:redhat:rhel_eus:8.1::baseos" ]
null
7
null
null
RHSA-2024:0422
Red Hat Security Advisory: perl-HTTP-Tiny security update
http-tiny: insecure TLS cert default
[ "cpe:/o:redhat:rhel_eus:8.6::baseos" ]
null
6.8
null
null
RHSA-2016:1033
Red Hat Security Advisory: kernel security and bug fix update
kernel: tags with indefinite length can corrupt pointers in asn1_find_indefinite_length() kernel: Infinite loop vulnerability in KVM
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
5.4
null
RHSA-2020:0470
Red Hat Security Advisory: java-1.8.0-ibm security update
OpenJDK: Incorrect exception processing during deserialization in BeanContextSupport (Serialization, 8224909) OpenJDK: Incorrect isBuiltinStreamHandler check causing URL normalization issues (Networking, 8228548) OpenJDK: Serialization filter changes via jdk.serialFilter property modification (Serialization, 8231422) OpenJDK: Incomplete enforcement of maxDatagramSockets limit in DatagramChannelImpl (Networking, 8231795)
[ "cpe:/a:redhat:rhel_extras:7" ]
null
3.7
null
null
RHSA-2009:1618
Red Hat Security Advisory: mod_jk security update for Red Hat Network Satellite Server
mod_jk: session information leak
[ "cpe:/a:redhat:network_satellite:5.1::el4", "cpe:/a:redhat:network_satellite:5.2::el4" ]
null
null
null
null
RHSA-2020:4285
Red Hat Security Advisory: rh-python36 security, bug fix, and enhancement update
python: XSS vulnerability in the documentation XML-RPC server in server_title field python: CRLF injection via the host part of the url passed to urlopen() python: infinite loop in the tarfile module via crafted TAR archive python-pip: directory traversal in _download_http_url() function in src/pip/_internal/download.py python: wrong backtracking in urllib.request.AbstractBasicAuthHandler allows for a ReDoS python: DoS via inefficiency in IPv{4,6}Interface classes python: CRLF injection via HTTP request method in httplib/http.client
[ "cpe:/a:redhat:rhel_software_collections:3::el6", "cpe:/a:redhat:rhel_software_collections:3::el7" ]
null
6.5
6.5
null
RHSA-2023:0200
Red Hat Security Advisory: java-11-openjdk security and bug fix update
OpenJDK: handshake DoS attack against DTLS connections (JSSE, 8287411) OpenJDK: soundbank URL remote loading (Sound, 8293742)
[ "cpe:/a:redhat:enterprise_linux:8::appstream", "cpe:/a:redhat:enterprise_linux:8::crb" ]
null
3.7
null
null
RHSA-2024:3428
Red Hat Security Advisory: rust-toolset:rhel8 security update
rust-cargo: cargo does not respect the umask when extracting dependencies
[ "cpe:/a:redhat:rhel_eus:8.6::appstream" ]
null
6.7
null
null
RHSA-2022:8222
Red Hat Security Advisory: xorg-x11-server-Xwayland security update
xorg-x11-server: X.Org Server ProcXkbSetGeometry out-of-bounds access xorg-x11-server: out-of-bounds access in ProcXkbSetDeviceInfo request handler of the Xkb extension
[ "cpe:/a:redhat:enterprise_linux:9::appstream" ]
null
7.8
null
null
RHSA-2024:0569
Red Hat Security Advisory: virt:rhel and virt-devel:rhel security update
QEMU: hcd-ehci: DMA reentrancy issue leads to use-after-free QEMU: e1000e: heap use-after-free in e1000e_write_packet_to_guest()
[ "cpe:/a:redhat:rhel_eus:8.8::appstream", "cpe:/a:redhat:rhel_eus:8.8::crb" ]
null
6
null
null
RHSA-2023:0294
Red Hat Security Advisory: firefox security update
Mozilla: libusrsctp library out of date Mozilla: Fullscreen notification bypass Mozilla: Arbitrary file read from GTK drag and drop on Linux Mozilla: Malicious command could be hidden in devtools output Mozilla: URL being dragged from cross-origin iframe into same tab triggers navigation Mozilla: Content Security Policy wasn't being correctly applied to WebSockets in WebWorkers Mozilla: Calls to <code>console.log</code> allowed bypasing Content Security Policy via format directive Mozilla: Memory safety bugs fixed in Firefox 109 and Firefox ESR 102.7
[ "cpe:/a:redhat:rhel_aus:8.2::appstream", "cpe:/a:redhat:rhel_e4s:8.2::appstream", "cpe:/a:redhat:rhel_tus:8.2::appstream" ]
null
8.8
null
null
RHSA-2023:5869
Red Hat Security Advisory: nodejs:18 security update
nodejs: integrity checks according to policies can be circumvented nodejs: code injection via WebAssembly export names HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack) node-undici: cookie leakage
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
3.9
null
null
RHSA-2023:2097
Red Hat Security Advisory: Satellite 6.13 Release
jackson-databind: Possible DoS if using JDK serialization to serialize JsonNode SnakeYaml: Constructor Deserialization Remote Code Execution rubygem-actionpack: Possible cross-site scripting vulnerability in Action Pack rubygem-loofah: inefficient regular expression leading to denial of service rubygem-loofah: Improper neutralization of data URIs leading to Cross Site Scripting rubygem-loofah: Uncontrolled Recursion leading to denial of service rubygem-rails-html-sanitizer: Inefficient Regular Expression leading to denial of service rubygem-rails-html-sanitizer: Improper neutralization of data URIs leading to Cross site scripting rubygem-rails-html-sanitizer: Cross site scripting vulnerability with certain configurations rubygem-rails-html-sanitizer: Cross site scripting vulnerability with certain configurations snakeyaml: Denial of Service due to missing nested depth limitation for collections tfm-rubygem-actionview: Possible cross-site scripting vulnerability in Action View tag helpers rubygem-tzinfo: arbitrary code execution activerecord: Possible RCE escalation bug with Serialized Columns in Active Record apache-commons-configuration: Apache Commons Configuration insecure interpolation defaults snakeyaml: Uncaught exception in org.yaml.snakeyaml.composer.Composer.composeSequenceNode snakeyaml: Uncaught exception in org.yaml.snakeyaml.constructor.BaseConstructor.constructObject snakeyaml: Uncaught exception in java.base/java.util.regex.Pattern$Ques.match snakeyaml: Uncaught exception in java.base/java.util.ArrayList.hashCode python-django: Potential denial-of-service vulnerability in internationalized URLs postgresql-jdbc: Information leak of prepared statement data due to insecure temporary file permissions jackson-databind: deep wrapper array nesting wrt UNWRAP_SINGLE_VALUE_ARRAYS jackson-databind: use of deeply nested arrays apache-commons-text: variable interpolation RCE python-django: Potential denial-of-service via Accept-Language headers python-django: Potential denial-of-service vulnerability in file uploads
[ "cpe:/a:redhat:satellite:6.13::el8", "cpe:/a:redhat:satellite_capsule:6.13::el8", "cpe:/a:redhat:satellite_maintenance:6.13::el8", "cpe:/a:redhat:satellite_utils:6.13::el8" ]
null
7.5
null
null
RHSA-2003:249
Red Hat Security Advisory: glibc security update
security flaw
[ "cpe:/o:redhat:enterprise_linux:2.1::as", "cpe:/o:redhat:enterprise_linux:2.1::aw", "cpe:/o:redhat:enterprise_linux:2.1::es", "cpe:/o:redhat:enterprise_linux:2.1::ws" ]
null
null
null
null
RHBA-2024:3983
Red Hat Bug Fix Advisory: kernel bug fix update
kernel: hwmon: (coretemp) Fix out-of-bounds memory access
[ "cpe:/a:redhat:enterprise_linux:9::appstream", "cpe:/a:redhat:enterprise_linux:9::crb", "cpe:/a:redhat:enterprise_linux:9::nfv", "cpe:/a:redhat:enterprise_linux:9::realtime", "cpe:/o:redhat:enterprise_linux:9::baseos" ]
null
6
null
null
RHBA-2024:2274
Red Hat Bug Fix Advisory: git-lfs bug fix and enhancement update
golang: net/http: insufficient sanitization of Host header
[ "cpe:/a:redhat:enterprise_linux:9::appstream" ]
null
6.5
null
null
RHSA-2023:2444
Red Hat Security Advisory: net-snmp security and bug fix update
net-snmp: NULL Pointer Exception when handling ipDefaultTTL net-snmp: NULL Pointer Exception when handling pv6IpForwarding
[ "cpe:/a:redhat:enterprise_linux:9::appstream" ]
null
6.5
null
null
RHSA-2009:1650
Red Hat Security Advisory: JBoss Enterprise Application Platform 4.2.0.CP08 update
xml-security-1.3.0-1jpp.ep1.*: XMLDsig HMAC-based signatures spoofing and authentication bypass jbossas JMX-Console cross-site-scripting in filter parameter JBoss Application Server Web Console XSS JDK: XML parsing Denial-Of-Service (6845701) JBoss EAP Twiddle logs the JMX password
[ "cpe:/a:redhat:jboss_enterprise_application_platform:4.2.0::el5" ]
null
null
null
null
RHSA-2009:1462
Red Hat Security Advisory: httpd22 security update
apr-util: Integer overflows in memory pool (apr) and relocatable memory (apr-util) management
[ "cpe:/a:redhat:jboss_enterprise_web_server:1::el4" ]
null
null
null
null
RHSA-2004:106
Red Hat Security Advisory: kernel security update
security flaw security flaw security flaw security flaw security flaw security flaw
[ "cpe:/o:redhat:enterprise_linux:2.1::as", "cpe:/o:redhat:enterprise_linux:2.1::aw" ]
null
null
null
null
RHSA-2022:0513
Red Hat Security Advisory: firefox security update
Mozilla: Extensions could have bypassed permission confirmation during update Mozilla: Drag and dropping an image could have resulted in the dropped object being an executable Mozilla: Sandboxed iframes could have executed script if the parent appended elements Mozilla: Cross-Origin responses could be distinguished between script and non-script content-types Mozilla: frame-ancestors Content Security Policy directive was not enforced for framed extension pages Mozilla: Script Execution during invalid object state Mozilla: Memory safety bugs fixed in Firefox 97 and Firefox ESR 91.6
[ "cpe:/a:redhat:rhel_e4s:8.1::appstream" ]
null
8.8
null
null
RHSA-2017:1865
Red Hat Security Advisory: X.org X11 libraries security, bug fix and enhancement update
libXpm: Out-of-bounds write in XPM extension parsing libXdmcp: weak entropy usage for session keys libICE: weak entropy usage in session keys
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
5.2
null
RHSA-2022:8431
Red Hat Security Advisory: podman security, bug fix, and enhancement update
podman: possible information disclosure and modification buildah: possible information disclosure and modification
[ "cpe:/a:redhat:enterprise_linux:9::appstream" ]
null
7.1
null
null
RHSA-2018:1347
Red Hat Security Advisory: kernel security update
Kernel: KVM: error in exception handling leads to wrong debug stack value Kernel: error in exception handling leads to DoS kernel: ptrace() incorrect error handling leads to corruption and DoS
[ "cpe:/o:redhat:rhel_aus:7.2::server", "cpe:/o:redhat:rhel_e4s:7.2::server", "cpe:/o:redhat:rhel_tus:7.2::server" ]
null
null
7.8
null
RHSA-2020:1208
Red Hat Security Advisory: qemu-kvm security update
QEMU: Slirp: potential OOB access due to unsafe snprintf() usages
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
5.6
null
null
RHSA-2018:0350
Red Hat Security Advisory: gcab security update
gcab: Extracting malformed .cab files causes stack smashing potentially leading to arbitrary code execution
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
5.3
null
RHSA-2024:6220
Red Hat Security Advisory: python39:3.9 security update
pypa/setuptools: Remote code execution via download functions in the package_index module in pypa/setuptools
[ "cpe:/a:redhat:rhel_aus:8.6::appstream", "cpe:/a:redhat:rhel_e4s:8.6::appstream", "cpe:/a:redhat:rhel_tus:8.6::appstream" ]
null
8.8
null
null
RHSA-2010:0427
Red Hat Security Advisory: postgresql security update
postgresql: SQL privilege escalation via modifications to session-local state postgresql: substring() negative length argument buffer overflow postgresql: Integer overflow in hash table size calculation PostgreSQL: PL/Perl Intended restriction bypass PostgreSQL: PL/Tcl Intended restriction bypass
[ "cpe:/o:redhat:enterprise_linux:3::as", "cpe:/o:redhat:enterprise_linux:3::desktop", "cpe:/o:redhat:enterprise_linux:3::es", "cpe:/o:redhat:enterprise_linux:3::ws" ]
null
null
null
null
RHSA-2024:0436
Red Hat Security Advisory: libcap security update
libcap: Integer Overflow in _libcap_strdup()
[ "cpe:/a:redhat:rhel_eus:9.0::appstream", "cpe:/o:redhat:rhel_eus:9.0::baseos" ]
null
7.8
null
null
RHSA-2024:8031
Red Hat Security Advisory: firefox security update
firefox: Use-after-free in Animation timeline (128.3.1 ESR Chemspill)
[ "cpe:/a:redhat:rhel_eus:9.2::appstream" ]
null
9.8
null
null
RHSA-2024:11027
Red Hat Security Advisory: ruby:2.5 security update
rexml: REXML ReDoS vulnerability
[ "cpe:/a:redhat:rhel_aus:8.2::appstream" ]
null
7.5
null
null
RHSA-2011:1439
Red Hat Security Advisory: thunderbird security update
Mozilla: Security problem with loadSubScript on 1.9.2 branch (MFSA 2011-46) Mozilla: Universal XSS likely with MultiByte charset (MFSA 2011-47) Mozilla: crash while profiling page with many functions (MFSA 2011-49)
[ "cpe:/o:redhat:enterprise_linux:6::server" ]
null
null
null
null
RHSA-2023:4331
Red Hat Security Advisory: nodejs security, bug fix, and enhancement update
nodejs: mainModule.proto bypass experimental policy mechanism nodejs: process interuption due to invalid Public Key information in x509 certificates nodejs: HTTP Request Smuggling via Empty headers separated by CR nodejs: DiffieHellman do not generate keys after setting a private key
[ "cpe:/a:redhat:enterprise_linux:9::appstream" ]
null
7.5
null
null
RHSA-2024:0941
Red Hat Security Advisory: OpenShift Container Platform 4.14.14 bug fix and security update
golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487)
[ "cpe:/a:redhat:openshift:4.14::el8", "cpe:/a:redhat:openshift:4.14::el9" ]
null
7.5
null
null
RHBA-2019:0885
Red Hat Bug Fix Advisory: Red Hat Ansible Tower 3.4.3-4 - Container
Tower: credentials leaked through environment variables
[ "cpe:/a:redhat:ansible_tower:3.4::el7" ]
null
null
7.2
null
RHSA-2015:1242
Red Hat Security Advisory: java-1.7.0-oracle security update
OpenJDK: deserialization issue in ObjectInputStream.readSerialData() (Libraries, 8076401) JDK: unspecified vulnerability fixed in 7u85 (Hotspot) OpenJDK: non-constant time comparisons in crypto code (JCE, 8074865) JCE: missing EC parameter validation in ECDH_Derive() (OpenJDK JCE, 8075833) JDK: unspecified vulnerability fixed in 7u85 and 8u51 (2D) OpenJDK: incorrect code permission checks in RMIConnectionImpl (JMX, 8075853) OpenJDK: name for reverse DNS lookup used in certificate identity check (JSSE, 8067694) JDK: unspecified vulnerability fixed in 6u101, 7u85 and 8u51 (Install) OpenJDK: IIOPInputStream type confusion vulnerability (CORBA, 8076376) ICU: integer overflow in LETableReference verifyLength() (OpenJDK 2D, 8077520) JDK: unspecified vulnerability fixed in 6u101, 7u85 and 8u51 (2D) JDK: unspecified vulnerability fixed in 6u101, 7u85 and 8u51 (2D) JDK: unspecified vulnerability fixed in 6u101, 7u85 and 8u51 (Deployment) SSL/TLS: "Invariance Weakness" vulnerability in RC4 stream cipher LOGJAM: TLS connections which support export grade DHE key-exchange are vulnerable to MITM attacks JDK: unspecified vulnerability fixed in 7u85 and 8u51 (Deployment) OpenJDK: improper permission checks in MBeanServerInvocationHandler (JMX, 8076397) OpenJDK: insufficient context checks during object deserialization (Libraries, 8076405) OpenJDK: RemoteObjectInvocationHandler allows calling finalize() (RMI, 8076409) JDK: unspecified vulnerability fixed in 7u85 and 8u51 (Deployment) OpenJDK: incorrect OCSP nextUpdate checking (Libraries, 8075374) OpenJDK: DnsClient fails to release request information after error (JNDI, 8075378) ICU: missing boundary checks in layout engine (OpenJDK 2D, 8071715)
[ "cpe:/a:redhat:rhel_extras_oracle_java:5", "cpe:/a:redhat:rhel_extras_oracle_java:6", "cpe:/a:redhat:rhel_extras_oracle_java:7" ]
null
null
3.7
null
RHSA-2022:0308
Red Hat Security Advisory: OpenShift Container Storage 3.11.z security and bug fix update
golang: crypto/elliptic: incorrect operations on the P-224 curve golang: net/http: panic in ReadRequest and ReadResponse when reading a very large header
[ "cpe:/a:redhat:storage:3.5:server:el7", "cpe:/a:redhat:storage:3:client:el7" ]
null
5.9
null
null
RHSA-2008:0364
Red Hat Security Advisory: mysql security and bug fix update
Mysql log file obfuscation MySQL improper permission revocation mysql improper suid argument evaluation mysql: daemon crash via EXPLAIN on queries on information schema Single MySQL worker can be crashed (NULL deref) with certain SELECT statements mysql: DoS via statement with crafted IF clause mysql DROP privilege not enforced when renaming tables mysql SECURITY INVOKER functions do not drop privileges New release of MySQL fixes security bugs New release of MySQL fixes security bugs
[ "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::client_workstation", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
RHSA-2023:1809
Red Hat Security Advisory: thunderbird security update
Thunderbird: Revocation status of S/Mime recipient certificates was not checked Mozilla: Memory Corruption in Safe Browsing Code Mozilla: libwebp: Double-free in libwebp Mozilla: Matrix SDK bundled with Thunderbird vulnerable to denial-of-service attack Thunderbird: Hang when processing certain OpenPGP messages Mozilla: Fullscreen notification obscured Mozilla: Potential Memory Corruption following Garbage Collector compaction Mozilla: Invalid free from JavaScript code Mozilla: Content-Disposition filename truncation leads to Reflected File Download Mozilla: Files with malicious extensions could have been downloaded unsafely on Linux Mozilla: Incorrect optimization result on ARM64 Mozilla: Memory safety bugs fixed in Firefox 112 and Firefox ESR 102.10
[ "cpe:/a:redhat:enterprise_linux:9::appstream" ]
null
8.8
null
null
RHSA-2023:3491
Red Hat Security Advisory: Red Hat Virtualization Host 4.4.z SP 1 security update
kernel: use-after-free caused by l2cap_reassemble_sdu() in net/bluetooth/l2cap_core.c kernel: stack overflow in do_proc_dointvec and proc_skip_spaces samba: RC4/HMAC-MD5 NetLogon Secure Channel is weak and should be avoided kernel: mm/mremap.c use-after-free vulnerability kernel: net/ulp: use-after-free in listening ULP sockets openvswitch: ip proto 0 triggers incorrect handling
[ "cpe:/o:redhat:rhev_hypervisor:4.4::el8" ]
null
8.2
null
null
RHSA-2023:4780
Red Hat Security Advisory: Red Hat OpenShift support for Windows Containers 6.0.2 security update
kubernetes: Insufficient input sanitization on Windows nodes leads to privilege escalation kubernetes: Insufficient input sanitization on Windows nodes leads to privilege escalation
[ "cpe:/a:redhat:openshift:4.11::el8" ]
null
8.8
null
null
RHSA-2024:3581
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 8.0.2 Security update
eap-galleon: custom provisioning creates unsecured http-invoker EAP: OIDC app attempting to access the second tenant, the user should be prompted to log jberet: jberet-core logging database credentials EAP: wildfly-elytron has a SSRF security issue
[ "cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el9" ]
null
7.3
null
null
RHSA-2021:4364
Red Hat Security Advisory: binutils security update
binutils: Heap-based buffer overflow in bfd_getl_signed_32() in libbfd.c because sh_entsize is not validated in _bfd_elf_slurp_secondary_reloc_section() in elf.c binutils: Excessive debug section size can cause excessive memory consumption in bfd's dwarf2.c read_section() binutils: Race window allows users to own arbitrary files binutils: Heap-based buffer overflow in _bfd_elf_slurp_secondary_reloc_section in elf.c
[ "cpe:/a:redhat:enterprise_linux:8::appstream", "cpe:/o:redhat:enterprise_linux:8::baseos" ]
null
4.7
null
null