id
stringlengths
13
15
title
stringlengths
29
176
description
stringlengths
8
32.1k
cpes
sequencelengths
0
20
cvss_v4_0
null
cvss_v3_1
float64
0
10
cvss_v3_0
float64
0
10
cvss_v2_0
null
RHSA-2024:3754
Red Hat Security Advisory: ipa security update
freeipa: delegation rules allow a proxy service to impersonate any user to access another target service freeipa: user can obtain a hash of the passwords of all domain users and perform offline brute force
[ "cpe:/a:redhat:enterprise_linux:9::appstream", "cpe:/a:redhat:enterprise_linux:9::crb" ]
null
8.1
null
null
RHSA-2024:7003
Red Hat Security Advisory: kernel-rt security update
kernel: fs: sysfs: Fix reference leak in sysfs_break_active_protection() kernel: TIPC message reassembly use-after-free remote code execution vulnerability kernel: wifi: mac80211: Avoid address calculations via out of bounds array indexing
[ "cpe:/a:redhat:rhel_tus:8.4::nfv", "cpe:/a:redhat:rhel_tus:8.4::realtime" ]
null
7.8
null
null
RHSA-2019:3813
Red Hat Security Advisory: OpenShift Container Platform 3.9 mediawiki123 security update
mediawiki: $wgRateLimits (rate limit / ping limiter) entry for 'user' overrides that for 'newbie' mediawiki: Information exposure when a log event is (partially) hidden mediawiki: BotPassword can bypass CentralAuth's account lock
[ "cpe:/a:redhat:openshift:3.9::el7" ]
null
null
5.3
null
RHSA-2019:0464
Red Hat Security Advisory: java-1.7.0-openjdk security update
OpenJDK: memory disclosure in FileChannelImpl (Libraries, 8206290)
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
3.1
null
RHSA-2024:11143
Red Hat Security Advisory: gstreamer1-plugins-base security update
gstreamer1-plugins-base: GStreamer has a stack-buffer overflow in vorbis_handle_identification_packet gstreamer1-plugins-base: stack-buffer overflow in gst_opus_dec_parse_header gstreamer1-plugins-base: out-of-bounds write in Ogg demuxer
[ "cpe:/a:redhat:rhel_aus:8.4::appstream", "cpe:/a:redhat:rhel_e4s:8.4::appstream", "cpe:/a:redhat:rhel_tus:8.4::appstream" ]
null
9.8
null
null
RHSA-2020:0497
Red Hat Security Advisory: AMQ Online security update
netty: HTTP request smuggling netty: HttpObjectDecoder.java allows Content-Length header to accompanied by second Content-Length header netty: HTTP Request Smuggling due to Transfer-Encoding whitespace mishandling
[ "cpe:/a:redhat:amq_online:1.3" ]
null
7.5
null
null
RHSA-2020:4625
Red Hat Security Advisory: spamassassin security update
spamassassin: crafted configuration files can run system commands without any output or errors spamassassin: crafted email message can lead to DoS spamassassin: command injection via crafted configuration file spamassassin: command injection via crafted configuration file
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
6.7
null
null
RHSA-2023:4693
Red Hat Security Advisory: Red Hat Ansible Automation Platform 2.4 Product Security and Bug Fix Update
platform: token exposed at importing project python-cryptography: memory corruption via immutable objects python-requests: Unintended leak of Proxy-Authorization header python-django: Potential regular expression denial of service vulnerability in EmailValidator/URLValidator
[ "cpe:/a:redhat:ansible_automation_platform:2.4::el8", "cpe:/a:redhat:ansible_automation_platform:2.4::el9", "cpe:/a:redhat:ansible_automation_platform_developer:2.4::el8", "cpe:/a:redhat:ansible_automation_platform_developer:2.4::el9", "cpe:/a:redhat:ansible_automation_platform_inside:2.4::el8", "cpe:/a:redhat:ansible_automation_platform_inside:2.4::el9" ]
null
7.5
null
null
RHSA-2025:3698
Red Hat Security Advisory: opentelemetry-collector security update
golang-jwt/jwt: jwt-go allows excessive memory allocation during header parsing
[ "cpe:/a:redhat:rhel_eus:9.4::appstream" ]
null
7.5
null
null
RHSA-2009:1428
Red Hat Security Advisory: xmlsec1 security update
xml-security-1.3.0-1jpp.ep1.*: XMLDsig HMAC-based signatures spoofing and authentication bypass
[ "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws", "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::client_workstation", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
RHSA-2011:1159
Red Hat Security Advisory: java-1.4.2-ibm security update
IBM JDK Class file parsing denial-of-service JDK: unspecified vulnerabilities fixed in 6u26 (Sound) JDK: unspecified vulnerabilities fixed in 6u26 (Sound) OpenJDK: integer overflows in JPEGImageReader and font SunLayoutEngine (2D, 7013519) OpenJDK: Deserialization allows creation of mutable SignedObject (Deserialization, 6618658) OpenJDK: NetworkInterface information leak (Networking, 7013969) OpenJDK: MediaTracker created Component instances with unnecessary privileges (Swing, 7020198) java-1.4.2-ibm: DoS via class file parser in IBM Java 1.4.2.SR13.FP9
[ "cpe:/a:redhat:rhel_extras:4", "cpe:/a:redhat:rhel_extras:5::client", "cpe:/a:redhat:rhel_extras:5::server" ]
null
null
null
null
RHSA-2022:5030
Red Hat Security Advisory: Red Hat Fuse Online 7.10.2.P1 security update
google-oauth-client: Token signature not verified eventsource: Exposure of Sensitive Information
[ "cpe:/a:redhat:jboss_fuse:7" ]
null
9.3
null
null
RHSA-2020:5417
Red Hat Security Advisory: curl security and bug fix update
curl: Incorrect argument check can allow remote servers to overwrite local files
[ "cpe:/o:redhat:rhel_eus:8.2::baseos" ]
null
5.4
null
null
RHSA-2022:0592
Red Hat Security Advisory: kpatch-patch security update
kernel: use after free in eventpoll.c may lead to escalation of privilege kernel: Use After Free in unix_gc() which could result in a local privilege escalation kernel: xfs: raw block device data leak in XFS_IOC_ALLOCSP IOCTL kernel: possible privileges escalation due to missing TLB flush kernel: failing usercopy allows for use-after-free exploitation
[ "cpe:/o:redhat:enterprise_linux:7::server" ]
null
7
null
null
RHSA-2025:0146
Red Hat Security Advisory: webkit2gtk3 security update
WebKitGTK: Processing maliciously crafted web content may lead to an unexpected process crash webkit: Processing maliciously crafted web content may lead to an unexpected process crash webkit: Processing maliciously crafted web content may lead to memory corruption webkit: Processing maliciously crafted web content may lead to an unexpected process crash
[ "cpe:/a:redhat:enterprise_linux:9::appstream" ]
null
6.5
null
null
RHSA-2024:4620
Red Hat Security Advisory: libndp security update
libndp: buffer overflow in route information length field
[ "cpe:/o:redhat:enterprise_linux:8::baseos" ]
null
8.1
null
null
RHSA-2003:010
Red Hat Security Advisory: : Updated PostgreSQL packages fix buffer overrun vulnerabilities
security flaw security flaw security flaw security flaw security flaw security flaw
[ "cpe:/o:redhat:linux:6.2", "cpe:/o:redhat:linux:7.0", "cpe:/o:redhat:linux:7.1", "cpe:/o:redhat:linux:7.2" ]
null
null
null
null
RHSA-2023:1437
Red Hat Security Advisory: openssl security update
openssl: X.400 address type confusion in X.509 GeneralName
[ "cpe:/o:redhat:rhel_e4s:8.1::baseos" ]
null
7.4
null
null
RHSA-2023:7733
Red Hat Security Advisory: tracker-miners security update
tracker-miners: sandbox escape
[ "cpe:/a:redhat:rhel_eus:8.6::appstream" ]
null
7.5
null
null
RHSA-2018:3000
Red Hat Security Advisory: java-1.7.0-oracle security update
OpenJDK: Incorrect handling of unsigned attributes in signed Jar manifests (Security, 8194534) OpenJDK: Leak of sensitive header data via HTTP redirect (Networking, 8196902) OpenJDK: Incomplete enforcement of the trustURLCodebase restriction (JNDI, 8199177) OpenJDK: Improper field access checks (Hotspot, 8199226) OpenJDK: Missing endpoint identification algorithm check during TLS session resumption (JSSE, 8202613) OpenJDK: Infinite loop in RIFF format reader (Sound, 8205361) libpng: Integer overflow and resultant divide-by-zero in pngrutil.c:png_check_chunk_length() allows for denial of service
[ "cpe:/a:redhat:rhel_extras_oracle_java:6" ]
null
null
6.5
null
RHSA-2024:3433
Red Hat Security Advisory: protobuf security update
protobuf: Incorrect parsing of nullchar in the proto symbol leads to Nullptr dereference
[ "cpe:/a:redhat:rhel_eus:8.6::appstream", "cpe:/a:redhat:rhel_eus:8.6::crb" ]
null
7.5
null
null
RHSA-2020:0550
Red Hat Security Advisory: openjpeg2 security update
openjpeg: heap-based buffer overflow in pj_t1_clbl_decode_processor in openjp2/t1.c
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
8.8
null
null
RHSA-2020:3297
Red Hat Security Advisory: kpatch-patch security update
kernel: Rogue cross-process SSBD shutdown. Linux scheduler logical bug allows an attacker to turn off the SSBD protection. kernel: Indirect Branch Prediction Barrier is force-disabled when STIBP is unavailable or enhanced IBRS is available. kernel: Indirect branch speculation can be enabled after it was force-disabled by the PR_SPEC_FORCE_DISABLE prctl command.
[ "cpe:/o:redhat:rhel_eus:8.1::baseos" ]
null
5.5
null
null
RHSA-2022:7683
Red Hat Security Advisory: kernel security, bug fix, and enhancement update
kernel: off-path attacker may inject data or terminate victim's TCP session kernel: race condition in VT_RESIZEX ioctl when vc_cons[i].d is already NULL leading to NULL pointer dereference kernel: use-after-free vulnerability in function sco_sock_sendmsg() kernel: memory leak for large arguments in video_usercopy function in drivers/media/v4l2-core/v4l2-ioctl.c kernel: veth: ensure skb entering GRO are not cloned. kernel: NFSD: Fix READDIR buffer overflow kernel: NFSD: Fix exposure in nfsd4_decode_bitmap() kernel: scsi: scsi_debug: Fix type in min_t to avoid stack OOB kernel: drm/virtio: Ensure that objs is not NULL in virtio_gpu_array_put_free() kernel: smb2_ioctl_query_info NULL pointer dereference kernel: NULL pointer dereference in udf_expand_file_adinicbdue() during writeback kernel: swiotlb information leak with DMA_FROM_DEVICE kernel: uninitialized registers on stack in nft_do_chain can cause kernel pointer leakage to UM kernel: race condition in snd_pcm_hw_free leading to use-after-free kernel: use-after-free in tc_new_tfilter() in net/sched/cls_api.c kernel: KVM: cmpxchg_gpte can write to pfns outside the userspace region kernel: use-after-free and memory errors in ext4 when mounting and operating on a corrupted image kernel: KVM: NULL pointer dereference in kvm_dirty_ring_push in virt/kvm/dirty_ring.c kernel: concurrency use-after-free between drm_setmaster_ioctl and drm_mode_getresources kernel: NULL pointer dereference in x86_emulate_insn may lead to DoS kernel: buffer overflow in nft_set_desc_concat_parse() kernel: KVM: NULL pointer dereference in kvm_irq_delivery_to_apic_fast() kernel: LoadPin bypass via dm-verity table reload kernel: nf_tables cross-table potential use-after-free may lead to local privilege escalation kernel: openvswitch: integer underflow leads to out-of-bounds write in reserve_sfa_size() kernel: use-after-free when psi trigger is destroyed while being polled kernel: hv_netvsc: NULL pointer dereference in netvsc_get_ethtool_stats() kernel: net/packet: slab-out-of-bounds access in packet_recvmsg() kernel: missing DM_TARGET_IMMUTABLE feature flag in verity_target in drivers/md/dm-verity-target.c kernel: possible to use the debugger to write zero into a location of choice hw: cpu: arm64: Spectre-BHB kernel: nfs_atomic_open() returns uninitialized data instead of ENOTDIR hw: cpu: Intel: Post-barrier Return Stack Buffer Predictions kernel: memory leak in drivers/hid/hid-elo.c kernel: double free in ems_usb_start_xmit in drivers/net/can/usb/ems_usb.c kernel: use after free in SUNRPC subsystem kernel: use-after-free due to improper update of reference count in net/sched/cls_u32.c kernel: DoS in nfqnl_mangle in net/netfilter/nfnetlink_queue.c kernel: ASoC: ops: Reject out of bounds values in snd_soc_put_volsw() kernel: KVM: LAPIC: Also cancel preemption timer during SET_LAPIC kernel: vsock: remove vsock from connected table when connect is interrupted by a signal kernel: netfilter: fix use-after-free in __nf_register_net_hook() kernel: thermal: core: Fix TZ_GET_TRIP NULL pointer dereference kernel: iwlwifi: mvm: check debugfs_dir ptr before use kernel: KVM: x86/mmu: make apf token non-zero to fix bug kernel: net/smc: Fix NULL pointer dereference in smc_pnet_find_ib() kernel: ath11k: Fix frames flush failure caused by deadlock kernel: ath11k: mhi: use mhi_sync_power_up() kernel: scsi: qla2xxx: Fix scheduling while atomic kernel: RDMA/nldev: Prevent underflow in nldev_stat_set_counter_dynamic_doit() kernel: ath9k_htc: fix uninit value bugs kernel: ext4: fix bug_on in ext4_writepages kernel: scsi: lpfc: Protect memory leak for NPIV ports sending PLOGI_RJT kernel: scsi: lpfc: Fix SCSI I/O completion and abort handler deadlock kernel: ALSA: jack: Access input_dev under mutex kernel: cifs: fix potential double free during failed mount kernel: ASoC: rt711-sdca: fix kernel NULL pointer dereference when IO error kernel: tipc: move bc link creation back to tipc_node_create kernel: RDMA/cm: Fix memory leak in ib_cm_insert_listen kernel: dm raid: fix KASAN warning in raid5_add_disks kernel: igb: fix a use-after-free issue in igb_clean_tx_ring kernel: netfilter: use get_random_u32 instead of prandom kernel: ext4: add reserved GDT blocks check
[ "cpe:/a:redhat:enterprise_linux:8::crb", "cpe:/o:redhat:enterprise_linux:8::baseos" ]
null
5.5
null
null
RHSA-2022:0176
Red Hat Security Advisory: kernel-rt security and bug fix update
kernel: xfs: raw block device data leak in XFS_IOC_ALLOCSP IOCTL kernel: fs_context: heap overflow in legacy parameter handling
[ "cpe:/a:redhat:enterprise_linux:8::nfv", "cpe:/a:redhat:enterprise_linux:8::realtime" ]
null
7.8
null
null
RHSA-2018:3056
Red Hat Security Advisory: samba security, bug fix, and enhancement update
samba: NULL pointer dereference in printer server process samba: Weak authentication protocol regression samba: Insufficient input validation in libsmbclient
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
4.3
null
RHSA-2018:1711
Red Hat Security Advisory: rhev-hypervisor7 security update
Kernel: KVM: error in exception handling leads to wrong debug stack value hw: cpu: speculative store bypass Kernel: error in exception handling leads to DoS
[ "cpe:/o:redhat:enterprise_linux:6::hypervisor", "cpe:/o:redhat:enterprise_linux:7::hypervisor" ]
null
null
6.5
null
RHSA-2017:2633
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 6.4.17 update
log4j: Socket receiver deserialization vulnerability tomcat: Security constrained bypass in error page mechanism jackson-databind: Deserialization vulnerability via readValue method of ObjectMapper log4j: deserialization of untrusted data in SocketServer
[ "cpe:/a:redhat:jboss_enterprise_application_platform:6.4" ]
null
9.8
8.1
null
RHSA-2018:3601
Red Hat Security Advisory: openstack-cinder security and bug fix update
openstack-cinder: Data retained after deletion of a ScaleIO volume
[ "cpe:/a:redhat:openstack:13::el7" ]
null
null
4.8
null
RHSA-2020:4453
Red Hat Security Advisory: vim security update
vim: users can execute arbitrary OS commands via scripting interfaces in the rvim restricted mode
[ "cpe:/a:redhat:enterprise_linux:8::appstream", "cpe:/o:redhat:enterprise_linux:8::baseos" ]
null
5.3
null
null
RHSA-2014:0560
Red Hat Security Advisory: libvirt security and bug fix update
libvirt: unsafe parsing of XML documents allows libvirt DoS and/or arbitrary file read
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
null
null
RHSA-2018:0058
Red Hat Security Advisory: qemu-kvm-rhev security update
An update for qemu-kvm-rhev is now available for Red Hat OpenStack Platform 10.0 (Newton). Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
[ "cpe:/a:redhat:openstack:10::el7" ]
null
null
null
null
RHSA-2023:7695
Red Hat Security Advisory: postgresql:13 security update
postgresql: Extension scripts replace objects not belonging to the extension. postgresql: Client memory disclosure when connecting with Kerberos to modified server postgresql: schema_element defeats protective search_path changes postgresql: row security policies disregard user ID changes after inlining. postgresql: Memory disclosure in aggregate function calls postgresql: Buffer overrun from integer overflow in array modification postgresql: Role pg_signal_backend can signal certain superuser processes. postgresql: extension script @substitutions@ within quoting allow SQL injection
[ "cpe:/a:redhat:rhel_aus:8.4::appstream", "cpe:/a:redhat:rhel_e4s:8.4::appstream", "cpe:/a:redhat:rhel_tus:8.4::appstream" ]
null
7.5
null
null
RHEA-2017:1814
Red Hat Enhancement Advisory: Red Hat Virtualization Manager (ovirt-engine) 4.1.4
4: ovirt-engine exposes cloud-init root password via REST API
[ "cpe:/a:redhat:rhev_manager:4" ]
null
null
6.5
null
RHSA-2023:3444
Red Hat Security Advisory: Red Hat OpenStack Platform 16.2 (python-flask) security update
flask: Possible disclosure of permanent session cookie due to missing Vary: Cookie header
[ "cpe:/a:redhat:openstack:16.2::el8" ]
null
7.5
null
null
RHSA-2019:1789
Red Hat Security Advisory: 389-ds-base security update
389-ds-base: Insufficient fix for CVE-2018-14648 denial of service in RHEL-7.5
[ "cpe:/o:redhat:rhel_eus:7.5::computenode", "cpe:/o:redhat:rhel_eus:7.5::server" ]
null
null
7.5
null
RHSA-2021:4953
Red Hat Security Advisory: nss security update
nss: Memory corruption in decodeECorDsaSignature with DSA signatures (and RSA-PSS)
[ "cpe:/a:redhat:rhel_eus:8.1::appstream" ]
null
9.8
null
null
RHSA-2008:0897
Red Hat Security Advisory: ruby security update
ruby: webrick directory traversal ruby: Memory allocation failure in Ruby regex engine (remotely exploitable DoS) ruby: multiple insufficient safe mode restrictions ruby: WEBrick DoS vulnerability (CPU consumption) ruby: missing "taintness" checks in dl module ruby: DoS vulnerability in the REXML module ruby: use of predictable source port and transaction id in DNS requests done by resolv.rb module
[ "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws", "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::client_workstation", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
RHSA-2012:1379
Red Hat Security Advisory: openstack-swift security update
Openstack-Swift: insecure use of python pickle()
[ "cpe:/a:redhat:openstack:1::el6" ]
null
null
null
null
RHSA-2022:7119
Red Hat Security Advisory: mysql:8.0 security, bug fix, and enhancement update
mysql: Server: DML unspecified vulnerability (CPU Oct 2021) mysql: Server: DML unspecified vulnerability (CPU Oct 2021) mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2021) mysql: Server: Replication unspecified vulnerability (CPU Oct 2021) mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2021) mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2021) mysql: Server: DML unspecified vulnerability (CPU Oct 2021) mysql: Server: Error Handling unspecified vulnerability (CPU Oct 2021) mysql: C API unspecified vulnerability (CPU Oct 2021) mysql: Server: Options unspecified vulnerability (CPU Oct 2021) mysql: InnoDB unspecified vulnerability (CPU Oct 2021) mysql: Server: DML unspecified vulnerability (CPU Oct 2021) mysql: Server: Group Replication Plugin unspecified vulnerability (CPU Oct 2021) mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2021) mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2021) mysql: Server: Security: Encryption unspecified vulnerability (CPU Oct 2021) mysql: Server: Security: Roles unspecified vulnerability (CPU Oct 2021) mysql: Server: Security: Privileges unspecified vulnerability (CPU Oct 2021) mysql: Server: Security: Privileges unspecified vulnerability (CPU Oct 2021) mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2021) mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2021) mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2021) mysql: Server: Options unspecified vulnerability (CPU Oct 2021) mysql: Server: GIS unspecified vulnerability (CPU Oct 2021) mysql: Server: Data Dictionary unspecified vulnerability (CPU Oct 2021) mysql: Server: Logging unspecified vulnerability (CPU Oct 2021) mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2021) mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2021) mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2021) mysql: Server: PS unspecified vulnerability (CPU Oct 2021) mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2021) mysql: Server: Stored Procedure unspecified vulnerability (CPU Oct 2021) mysql: Server: DDL unspecified vulnerability (CPU Oct 2021) mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2021) mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2021) mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2021) mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2021) mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2021) mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2021) mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2021) mysql: Server: FTS unspecified vulnerability (CPU Oct 2021) mysql: Server: Security: Privileges unspecified vulnerability (CPU Jan 2022) mysql: Server: DDL unspecified vulnerability (CPU Jan 2022) mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2022) mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2022) mysql: Server: Group Replication Plugin unspecified vulnerability (CPU Jan 2022) mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2022) mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2022) mysql: Server: Federated unspecified vulnerability (CPU Jan 2022) mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2022) mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2022) mysql: Server: DML unspecified vulnerability (CPU Jan 2022) mysql: InnoDB unspecified vulnerability (CPU Jan 2022) mysql: Server: Stored Procedure unspecified vulnerability (CPU Jan 2022) mysql: Server: Parser unspecified vulnerability (CPU Jan 2022) mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2022) mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2022) mysql: Server: Replication unspecified vulnerability (CPU Jan 2022) mysql: InnoDB unspecified vulnerability (CPU Jan 2022) mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2022) mysql: InnoDB unspecified vulnerability (CPU Jan 2022) mysql: Server: Security: Encryption unspecified vulnerability (CPU Jan 2022) mysql: Server: Information Schema unspecified vulnerability (CPU Jan 2022) mysql: Server: Compiling unspecified vulnerability (CPU Jan 2022) mysql: Server: Components Services unspecified vulnerability (CPU Jan 2022) mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2022) mysql: Server: Security: Encryption unspecified vulnerability (CPU Jan 2022) mysql: Server: Information Schema unspecified vulnerability (CPU Jan 2022) mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2022) mysql: Server: Group Replication Plugin unspecified vulnerability (CPU Jan 2022) mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2022) mysql: Server: DML unspecified vulnerability (CPU Apr 2022) mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2022) mysql: Server: Replication unspecified vulnerability (CPU Apr 2022) mysql: InnoDB unspecified vulnerability (CPU Apr 2022) mysql: InnoDB unspecified vulnerability (CPU Apr 2022) mysql: InnoDB unspecified vulnerability (CPU Apr 2022) mysql: Server: DDL unspecified vulnerability (CPU Apr 2022) mysql: Server: FTS unspecified vulnerability (CPU Apr 2022) mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2022) mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2022) mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2022) mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2022) mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2022) mysql: Server: DDL unspecified vulnerability (CPU Apr 2022) mysql: InnoDB unspecified vulnerability (CPU Apr 2022) mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2022) mysql: Server: Group Replication Plugin unspecified vulnerability (CPU Apr 2022) mysql: Server: PAM Auth Plugin unspecified vulnerability (CPU Jul 2022) mysql: Server: PAM Auth Plugin unspecified vulnerability (CPU Apr 2022) mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2022) mysql: Server: Logging unspecified vulnerability (CPU Apr 2022) mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2022) mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2022) mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2022) mysql: Server: Optimizer unspecified vulnerability (CPU Jul 2022) mysql: Server: Options unspecified vulnerability (CPU Jul 2022) mysql: InnoDB unspecified vulnerability (CPU Jul 2022) mysql: Server: Stored Procedure unspecified vulnerability (CPU Jul 2022) mysql: Server: Optimizer unspecified vulnerability (CPU Jul 2022) mysql: Server: Optimizer unspecified vulnerability (CPU Jul 2022) mysql: Server: Optimizer unspecified vulnerability (CPU Jul 2022) mysql: Server: Optimizer unspecified vulnerability (CPU Jul 2022) mysql: Server: Optimizer unspecified vulnerability (CPU Jul 2022) mysql: Server: Optimizer unspecified vulnerability (CPU Jul 2022) mysql: Server: Optimizer unspecified vulnerability (CPU Jul 2022) mysql: Server: Stored Procedure unspecified vulnerability (CPU Jul 2022) mysql: InnoDB unspecified vulnerability (CPU Jul 2022) mysql: Server: Security: Encryption unspecified vulnerability (CPU Jul 2022) mysql: InnoDB unspecified vulnerability (CPU Jul 2022) mysql: Server: Federated unspecified vulnerability (CPU Jul 2022) mysql: Server: Optimizer unspecified vulnerability (CPU Jul 2022) mysql: Server: Optimizer unspecified vulnerability (CPU Jul 2022) mysql: Server: Optimizer unspecified vulnerability (CPU Jul 2022) mysql: Server: Security: Encryption unspecified vulnerability (CPU Oct 2022) mysql: C API unspecified vulnerability (CPU Oct 2022) mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2022) mysql: Server: Data Dictionary unspecified vulnerability (CPU Oct 2022) mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2022) mysql: InnoDB unspecified vulnerability (CPU Oct 2022) mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2022) mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2022) mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2023) mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2023) mysql: Server: Replication unspecified vulnerability (CPU Jul 2023)
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
4.9
null
null
RHSA-2006:0266
Red Hat Security Advisory: gnupg security update
security flaw security flaw
[ "cpe:/o:redhat:enterprise_linux:3::as", "cpe:/o:redhat:enterprise_linux:3::desktop", "cpe:/o:redhat:enterprise_linux:3::es", "cpe:/o:redhat:enterprise_linux:3::ws", "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws" ]
null
null
null
null
RHSA-2022:0871
Red Hat Security Advisory: OpenShift Container Platform 4.8.35 security update
CRI-O: Arbitrary code execution in cri-o via abusing “kernel.core_pattern” kernel parameter workflow-cps: OS command execution through crafted SCM contents workflow-cps-global-lib: OS command execution through crafted SCM contents workflow-multibranch: OS command execution through crafted SCM contents workflow-cps: Pipeline-related plugins follow symbolic links or do not limit path names workflow-cps-global-lib: Pipeline-related plugins follow symbolic links or do not limit path names workflow-cps-global-lib: Pipeline-related plugins follow symbolic links or do not limit path names workflow-multibranch: Pipeline-related plugins follow symbolic links or do not limit path names workflow-cps: Password parameters are included from the original build in replayed builds workflow-cps-global-lib: Sandbox bypass vulnerability workflow-cps-global-lib: Sandbox bypass vulnerability workflow-cps-global-lib: Sandbox bypass vulnerability pipeline-build-step: Password parameter default values exposed credentials: Stored XSS vulnerabilities in jenkins plugin subversion: Stored XSS vulnerabilities in Jenkins subversion plugin
[ "cpe:/a:redhat:openshift:4.8::el7", "cpe:/a:redhat:openshift:4.8::el8" ]
null
5.4
null
null
RHSA-2020:0204
Red Hat Security Advisory: kernel security and bug fix update
hw: Machine Check Error on Page Size Change (IFU) kernel: nfs: use-after-free in svc_process_common() hw: Intel GPU Denial Of Service while accessing MMIO in lower power state hw: Intel GPU blitter manipulation can allow for arbitrary kernel memory write Kernel: vhost_net: infinite loop while receiving packets leads to DoS Kernel: page cache side channel attacks hardware: bluetooth: BR/EDR encryption key negotiation attacks (KNOB) kernel: Heap overflow in mwifiex_uap_parse_tail_ies function in drivers/net/wireless/marvell/mwifiex/ie.c hw: TSX Transaction Asynchronous Abort (TAA) kernel: heap overflow in mwifiex_update_vs_ie() function of Marvell WiFi driver Kernel: KVM: OOB memory access via mmio ring buffer kernel: heap overflow in marvell/mwifiex/tdls.c
[ "cpe:/o:redhat:rhel_e4s:8.0::baseos" ]
null
null
8.8
null
RHSA-2024:7004
Red Hat Security Advisory: kernel security update
kernel: gpiolib: cdev: Fix use after free in lineinfo_changed_notify kernel: wifi: mac80211: Avoid address calculations via out of bounds array indexing kernel: ice: Fix improper extts handling
[ "cpe:/a:redhat:rhel_eus:9.2::appstream", "cpe:/a:redhat:rhel_eus:9.2::crb", "cpe:/o:redhat:rhel_eus:9.2::baseos" ]
null
4.4
null
null
RHSA-2011:0345
Red Hat Security Advisory: qemu-kvm security update
qemu-kvm: Setting VNC password to empty string silently disables all authentication
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
null
null
RHSA-2009:1572
Red Hat Security Advisory: 4Suite security update
expat: buffer over-read and crash on XML with malformed UTF-8 sequences
[ "cpe:/o:redhat:enterprise_linux:3::as", "cpe:/o:redhat:enterprise_linux:3::desktop", "cpe:/o:redhat:enterprise_linux:3::es", "cpe:/o:redhat:enterprise_linux:3::ws", "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws" ]
null
null
null
null
RHSA-2011:0308
Red Hat Security Advisory: mailman security update
mailman: Multiple security flaws leading to cross-site scripting (XSS) attacks Mailman: Three XSS flaws due improper escaping of the full name of the member
[ "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
null
null
RHSA-2015:1896
Red Hat Security Advisory: qemu-kvm-rhev security update
qemu: Heap overflow vulnerability in ne2000_receive() function
[ "cpe:/a:redhat:openstack:5::el6" ]
null
null
null
null
RHSA-2021:2659
Red Hat Security Advisory: linuxptp security update
linuxptp: missing length check of forwarded messages
[ "cpe:/a:redhat:rhel_eus:8.1::appstream" ]
null
8.8
null
null
RHSA-2022:5813
Red Hat Security Advisory: vim security update
vim: Out-of-bounds Write vim: out-of-bounds write in vim_regsub_both() in regexp.c vim: buffer over-read in utf_ptr2char() in mbyte.c
[ "cpe:/a:redhat:enterprise_linux:8::appstream", "cpe:/o:redhat:enterprise_linux:8::baseos", "cpe:/o:redhat:rhev_hypervisor:4.4::el8" ]
null
7.8
null
null
RHSA-2024:2700
Red Hat Security Advisory: varnish security update
varnish: HTTP/2 Broken Window Attack may result in denial of service
[ "cpe:/a:redhat:rhel_eus:9.0::appstream", "cpe:/a:redhat:rhel_eus:9.0::crb" ]
null
7.5
null
null
RHSA-2022:7514
Red Hat Security Advisory: fribidi security update
fribidi: Stack based buffer overflow fribidi: Heap-buffer-overflow in fribidi_cap_rtl_to_unicode fribidi: SEGV in fribidi_remove_bidi_marks
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
5.5
null
null
RHSA-2015:1330
Red Hat Security Advisory: python security, bug fix, and enhancement update
python: multiple unbound readline() DoS flaws in python stdlib python: buffer overflow in socket.recvfrom_into() python: CGIHTTPServer module does not properly handle URL-encoded path separators in URLs python: buffer() integer overflow leading to out of bounds read
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
null
null
RHSA-2016:0152
Red Hat Security Advisory: sos security and bug fix update
sos: Usage of predictable temporary files allows privilege escalation
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
null
null
RHSA-2024:1210
Red Hat Security Advisory: OpenShift Container Platform 4.15.2 bug fix and security update
ssh: Prefix truncation attack on Binary Packet Protocol (BPP)
[ "cpe:/a:redhat:openshift:4.15::el8", "cpe:/a:redhat:openshift:4.15::el9" ]
null
5.9
null
null
RHSA-2005:543
Red Hat Security Advisory: ruby security update
security flaw
[ "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws" ]
null
null
null
null
RHEA-2021:1580
Red Hat Enhancement Advisory: libarchive bug fix and enhancement update
libarchive: Heap-based buffer over-read in the atol8 function libarchive: Out-of-bounds read in parse_file_info libarchive: Off-by-one error in the read_header function
[ "cpe:/a:redhat:enterprise_linux:8::crb", "cpe:/o:redhat:enterprise_linux:8::baseos" ]
null
7.5
3.3
null
RHSA-2019:0856
Red Hat Security Advisory: Red Hat Single Sign-On 7.2.7 security update on RHEL 7
keycloak: session hijack using the user access token
[ "cpe:/a:redhat:red_hat_single_sign_on:7::el7" ]
null
null
3.8
null
RHSA-2024:6783
Red Hat Security Advisory: openssl security update
openssl: Possible denial of service in X.509 name checks
[ "cpe:/a:redhat:enterprise_linux:9::appstream", "cpe:/o:redhat:enterprise_linux:9::baseos" ]
null
5.9
null
null
RHSA-2021:0713
Red Hat Security Advisory: OpenShift Container Platform 4.5.34 packages and security update
golang: data race in certain net/http servers including ReverseProxy can lead to DoS golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs
[ "cpe:/a:redhat:openshift:4.5::el7", "cpe:/a:redhat:openshift:4.5::el8" ]
null
7.5
null
null
RHSA-2018:1224
Red Hat Security Advisory: PackageKit security update
PackageKit: authentication bypass allows to install signed packages without administrator privileges
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
5.5
null
RHSA-2017:1504
Red Hat Security Advisory: Red Hat OpenStack Platform director security update
rhosp-director: libvirtd is deployed with no authentication
[ "cpe:/a:redhat:openstack-director:9::el7" ]
null
null
9.9
null
RHSA-2021:3967
Red Hat Security Advisory: OpenJDK 11.0.13 security update for Portable Linux Builds
OpenJDK: Weak ciphers preferred over stronger ones for TLS (JSSE, 8264210) OpenJDK: Excessive memory allocation in RTFParser (Swing, 8265167) OpenJDK: Excessive memory allocation in RTFReader (Swing, 8265580) OpenJDK: Excessive memory allocation in HashMap and HashSet (Utility, 8266097) OpenJDK: Certificates with end dates too far in the future can corrupt keystore (Keytool, 8266137) OpenJDK: Loop in HttpsServer triggered during TLS session close (JSSE, 8254967) OpenJDK: Incorrect principal selection when using Kerberos Constrained Delegation (Libraries, 8266689) OpenJDK: Unexpected exception raised during TLS handshake (JSSE, 8267729) OpenJDK: Excessive memory allocation in BMPImageReader (ImageIO, 8267735) OpenJDK: Non-constant comparison during TLS handshakes (JSSE, 8269618)
[ "cpe:/a:redhat:openjdk:11" ]
null
3.7
null
null
RHSA-2024:1154
Red Hat Security Advisory: libfastjson security update
libfastjson: integer overflow and out-of-bounds write via a large JSON file
[ "cpe:/a:redhat:rhel_eus:9.0::appstream" ]
null
7.8
null
null
RHSA-2017:0324
Red Hat Security Advisory: kernel security update
kernel: use after free in dccp protocol
[ "cpe:/o:redhat:rhel_aus:6.6::server", "cpe:/o:redhat:rhel_tus:6.6::server" ]
null
null
7.8
null
RHSA-2024:11381
Red Hat Security Advisory: Red Hat Advanced Cluster Management 2.11.4 security enhancements and bug fixes
path-to-regexp: Backtracking regular expressions cause ReDoS dompurify: XSS vulnerability via prototype pollution find-my-way: ReDoS vulnerability in multiparametric routes
[ "cpe:/a:redhat:acm:2.11::el9" ]
null
7.5
null
null
RHSA-2022:0436
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.4 security update
log4j: Remote code execution in Log4j 1.x when application is configured to use JMSAppender log4j: Remote code execution in Log4j 1.x when application is configured to use JMSSink log4j: SQL injection in Log4j 1.x when application is configured to use JDBCAppender log4j: Unsafe deserialization flaw in Chainsaw log viewer
[ "cpe:/a:redhat:jboss_enterprise_application_platform:7.4::el7", "cpe:/a:redhat:jboss_enterprise_application_platform:7.4::el8" ]
null
8.8
null
null
RHSA-2012:0104
Red Hat Security Advisory: libxml2 security update
libxml2: Heap-based buffer overflow when decoding an entity reference with a long name
[ "cpe:/o:redhat:rhel_eus:5.6" ]
null
null
null
null
RHSA-2016:0778
Red Hat Security Advisory: icedtea-web security, bug fix, and enhancement update
icedtea-web: unexpected permanent authorization of unsigned applets icedtea-web: applet origin spoofing
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
null
null
RHBA-2019:2794
Red Hat Bug Fix Advisory: OpenShift Container Platform 4.1.16 packages update
kubernetes: Incomplete fixes for CVE-2019-1002101 and CVE-2019-11246, kubectl cp potential directory traversal
[ "cpe:/a:redhat:openshift:4.1::el7", "cpe:/a:redhat:openshift:4.1::el8" ]
null
null
4.8
null
RHBA-2018:0042
Red Hat Bug Fix Advisory: dracut bug fix update
hw: cpu: speculative execution branch target injection
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
5.6
null
RHSA-2008:0271
Red Hat Security Advisory: libvorbis security update
vorbis: zero-dim codebooks can cause crash, infinite loop or heap overflow vorbis: integer overflow in partvals computation vorbis: integer oveflow caused by huge codebooks vorbis: insufficient validation of Huffman tree causing memory corruption in _make_decode_tree()
[ "cpe:/o:redhat:enterprise_linux:2.1::as", "cpe:/o:redhat:enterprise_linux:2.1::aw", "cpe:/o:redhat:enterprise_linux:2.1::es", "cpe:/o:redhat:enterprise_linux:2.1::ws" ]
null
null
null
null
RHSA-2022:6850
Red Hat Security Advisory: openvswitch2.11 security update
dpdk: DoS when a Vhost header crosses more than two descriptors and exhausts all mbufs
[ "cpe:/o:redhat:enterprise_linux:7::fastdatapath" ]
null
8.6
null
null
RHSA-2024:0702
Red Hat Security Advisory: gimp security update
gimp: dds buffer overflow RCE gimp: PSD buffer overflow RCE gimp: psp integer overflow RCE gimp: psp off-by-one RCE
[ "cpe:/a:redhat:rhel_eus:9.2::appstream" ]
null
7.8
null
null
RHSA-2021:1027
Red Hat Security Advisory: curl security update
curl: heap buffer overflow in function tftp_receive_packet()
[ "cpe:/o:redhat:rhel_eus:7.7::computenode", "cpe:/o:redhat:rhel_eus:7.7::server" ]
null
null
6.3
null
RHSA-2013:0791
Red Hat Security Advisory: qemu-kvm-rhev security and bug fix update
Updated qemu-kvm-rhev packages that fix one security issue and two bugs are now available for Red Hat Enterprise Linux 6. The Red Hat Security Response Team has rated this update as having moderate security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section.
[ "cpe:/a:redhat:enterprise_linux:6::hypervisor" ]
null
null
null
null
RHSA-2024:4370
Red Hat Security Advisory: python3 security update
python: Path traversal on tempfile.TemporaryDirectory
[ "cpe:/a:redhat:rhel_eus:8.8::appstream", "cpe:/a:redhat:rhel_eus:8.8::crb" ]
null
7.8
null
null
RHSA-2015:0325
Red Hat Security Advisory: httpd security, bug fix, and enhancement update
httpd: bypass of mod_headers rules via chunked requests httpd: NULL pointer dereference in mod_cache if Content-Type has empty value
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
null
null
RHSA-2017:0515
Red Hat Security Advisory: ansible and ceph-ansible security, bug fix, and enhancement update
Ansible: Compromised remote hosts can lead to running commands on the Ansible controller
[ "cpe:/a:redhat:rhscon:2::el7" ]
null
null
6.6
null
RHSA-2021:4770
Red Hat Security Advisory: kernel security and bug fix update
kernel: use-after-free in drivers/infiniband/core/ucma.c ctx use-after-free
[ "cpe:/o:redhat:rhel_aus:7.6::server", "cpe:/o:redhat:rhel_e4s:7.6::server", "cpe:/o:redhat:rhel_tus:7.6::server" ]
null
7.8
null
null
RHSA-2014:0365
Red Hat Security Advisory: python-django-horizon security and bug fix update
openstack: horizon multiple XSS vulnerabilities.
[ "cpe:/a:redhat:openstack:3::el6" ]
null
null
null
null
RHSA-2016:2131
Red Hat Security Advisory: mariadb55-mariadb security update
mysql: unspecified vulnerability in subcomponent: Server: Optimizer (CPU October 2016) mysql: Incorrect input validation allowing code execution via mysqldump mysql: unspecified vulnerability in subcomponent: Server: DML (CPU October 2016) mysql: race condition while setting stats during MyISAM table repair (CPU Oct 2016) mysql: unspecified vulnerability in subcomponent: Server: DML (CPU October 2016) mysql: unspecified vulnerability in subcomponent: Server: GIS (CPU October 2016) mysql: unspecified vulnerability in subcomponent: Server: Federated (CPU October 2016) mysql: general_log can write to configuration files, leading to privilege escalation (CPU Oct 2016) mysql: race condition while setting stats during MyISAM table repair (CPU Oct 2016) mysql: unspecified vulnerability in subcomponent: Server: Types (CPU October 2016)
[ "cpe:/a:redhat:rhel_software_collections:2::el6", "cpe:/a:redhat:rhel_software_collections:2::el7" ]
null
null
4.3
null
RHSA-2024:8228
Red Hat Security Advisory: OpenShift Container Platform 4.17.2 security and extras update
python-certifi: Removal of e-Tugra root certificate
[ "cpe:/a:redhat:openshift:4.17::el9" ]
null
9.1
null
null
RHSA-2016:0711
Red Hat Security Advisory: jenkins security update
jenkins: Remote code execution vulnerability in remoting module (SECURITY-232) jenkins: HTTP response splitting vulnerability (SECURITY-238) jenkins: Non-constant time comparison of API token (SECURITY-241) jenkins: Non-constant time comparison of CSRF crumbs (SECURITY-245) jenkins: Remote code execution through remote API (SECURITY-247)
[ "cpe:/a:redhat:openshift:3.1::el7" ]
null
null
null
null
RHSA-2024:11381
Red Hat Security Advisory: Red Hat Advanced Cluster Management 2.11.4 security enhancements and bug fixes
path-to-regexp: Backtracking regular expressions cause ReDoS dompurify: XSS vulnerability via prototype pollution find-my-way: ReDoS vulnerability in multiparametric routes
[ "cpe:/a:redhat:acm:2.11::el9" ]
null
7.5
null
null
RHSA-2020:3780
Red Hat Security Advisory: OpenShift Container Platform 4.5.11 ose-cluster-svcat-apiserver-operator-container security update
golang.org/x/text: possibility to trigger an infinite loop in encoding/unicode could lead to crash
[ "cpe:/a:redhat:openshift:4.5::el7" ]
null
7.5
null
null
RHSA-2011:0305
Red Hat Security Advisory: samba security update
Samba unsafe fd_set usage
[ "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws", "cpe:/o:redhat:enterprise_linux:5::server", "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
null
null
RHSA-2022:6985
Red Hat Security Advisory: nodejs:14 security and bug fix update
nodejs: DNS rebinding in --inspect via invalid IP addresses nodejs: HTTP request smuggling due to flawed parsing of Transfer-Encoding nodejs: HTTP request smuggling due to improper delimiting of header fields nodejs: HTTP request smuggling due to incorrect parsing of multi-line Transfer-Encoding nodejs-got: missing verification of requested URLs allows redirects to UNIX sockets
[ "cpe:/a:redhat:rhel_eus:8.4::appstream" ]
null
5.3
null
null
RHSA-2022:6999
Red Hat Security Advisory: java-17-openjdk security and bug fix update
OpenJDK: improper MultiByte conversion can lead to buffer overflow (JGSS, 8286077) OpenJDK: improper handling of long NTLM client hostnames (Security, 8286526) OpenJDK: insufficient randomization of JNDI DNS port numbers (JNDI, 8286910) OpenJDK: excessive memory allocation in X.509 certificate parsing (Security, 8286533) OpenJDK: HttpServer no connection count limit (Lightweight HTTP Server, 8286918) harfbuzz: integer overflow in the component hb-ot-shape-fallback.cc OpenJDK: missing SNI caching in HTTP/2 (Networking, 8289366)
[ "cpe:/a:redhat:enterprise_linux:9::appstream", "cpe:/a:redhat:enterprise_linux:9::crb" ]
null
3.7
null
null
RHSA-2019:0219
Red Hat Security Advisory: firefox security update
Mozilla: Use-after-free parsing HTML5 stream Mozilla: Memory safety bugs fixed in Firefox 65 and Firefox ESR 60.5 Mozilla: Privilege escalation through IPC channel messages
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
10
null
RHSA-2007:0338
Red Hat Security Advisory: freeradius security update
security flaw
[ "cpe:/o:redhat:enterprise_linux:3::as", "cpe:/o:redhat:enterprise_linux:3::es", "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:5::client_workstation", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
RHSA-2013:1523
Red Hat Security Advisory: ruby193-ruby security update
rubygems: version regex algorithmic complexity vulnerability
[ "cpe:/a:redhat:openstack:3::el6" ]
null
null
null
null
RHSA-2020:1190
Red Hat Security Advisory: libxml2 security update
libxml2: DoS caused by incorrect error detection during XZ decompression libxml2: Use after free triggered by XPointer paths beginning with range-to libxml2: Use after free in xmlXPathCompOpEvalPositionalPredicate() function in xpath.c libxml2: Unrestricted memory usage in xz_head() function in xzlib.c libxml2: NULL pointer dereference in xmlXPathCompOpEval() function in xpath.c libxml2: Infinite loop caused by incorrect error detection during LZMA decompression
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
4.3
null
RHSA-2023:5607
Red Hat Security Advisory: linux-firmware security and enhancement update
hw: amd: Cross-Process Information Leak
[ "cpe:/o:redhat:rhel_eus:9.0::baseos" ]
null
6.5
null
null
RHSA-2003:234
Red Hat Security Advisory: : Updated semi packages fix vulnerability
security flaw
[ "cpe:/o:redhat:linux:7.1", "cpe:/o:redhat:linux:7.2", "cpe:/o:redhat:linux:7.3", "cpe:/o:redhat:linux:8.0", "cpe:/o:redhat:linux:9" ]
null
null
null
null
RHSA-2019:1774
Red Hat Security Advisory: vim security update
vim/neovim: ': source!' command allows arbitrary command execution via modelines
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
5.3
null
null
RHSA-2024:8315
Red Hat Security Advisory: Logging for Red Hat OpenShift - 5.9.8
net/http: Denial of service due to improper 100-continue handling in net/http go/parser: golang: Calling any of the Parse functions containing deeply nested literals can cause a panic/stack exhaustion encoding/gob: golang: Calling Decoder.Decode on a message which contains deeply nested structures can cause a panic due to stack exhaustion go/build/constraint: golang: Calling Parse on a "// +build" build tag line with deeply nested expressions can cause a panic due to stack exhaustion
[ "cpe:/a:redhat:logging:5.9::el9" ]
null
5.9
null
null
RHSA-2021:4035
Red Hat Security Advisory: binutils security update
environment: Unicode's bidirectional (BiDi) override characters can cause trojan source attacks
[ "cpe:/o:redhat:rhel_aus:7.6::server", "cpe:/o:redhat:rhel_e4s:7.6::server", "cpe:/o:redhat:rhel_tus:7.6::server" ]
null
8.5
null
null
RHSA-2023:5006
Red Hat Security Advisory: OpenShift Container Platform 4.14.0 bug fix and security update
dns: Denial of Service (DoS) osin: manipulation of the argument secret leads to observable timing discrepancy mongo-go-driver: specific cstrings input may not be properly validated cortex: Grafana Cortex directory traversal go-yaml: Improve heuristics preventing CPU/memory abuse by parsing malicious or large YAML documents helm: Denial of service through through repository index file helm: Denial of service through schema file golang.org/x/net/http2: avoid quadratic complexity in HPACK decoding go-getter: go-getter vulnerable to denial of service via malicious compressed archive vault: Vault’s Microsoft SQL Database Storage Backend Vulnerable to SQL Injection Via Configuration File hashicorp/vault: Vault’s PKI Issuer Endpoint Did Not Correctly Authorize Access to Issuer Metadata openshift: OCP & FIPS mode golang.org/x/net/html: Cross site scripting OpenShift: modification of node role labels hashicorp/vault: Cache-Timing Attacks During Seal and Unseal Operations helm: getHostByName Function Information Disclosure containerd: Supplementary groups are not set up properly word-wrap: ReDoS tough-cookie: prototype pollution in cookie memstore runc: volume mount race condition (regression of CVE-2019-19921) golang-github-gin-gonic-gin: Gin Web Framework does not properly sanitize filename parameter of Context.FileAttachment function goproxy: Denial of service (DoS) via unspecified vectors. golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487) HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack)
[ "cpe:/a:redhat:openshift:4.14::el8", "cpe:/a:redhat:openshift:4.14::el9" ]
null
7.5
null
null
RHSA-2006:0158
Red Hat Security Advisory: apache security update
httpd cross-site scripting flaw in mod_imap
[ "cpe:/o:redhat:enterprise_linux:2.1::as", "cpe:/o:redhat:enterprise_linux:2.1::aw", "cpe:/o:redhat:enterprise_linux:2.1::es", "cpe:/o:redhat:enterprise_linux:2.1::ws" ]
null
null
null
null