id
stringlengths
13
15
title
stringlengths
29
176
description
stringlengths
8
32.1k
cpes
sequencelengths
0
20
cvss_v4_0
null
cvss_v3_1
float64
0
10
cvss_v3_0
float64
0
10
cvss_v2_0
null
RHSA-2006:0298
Red Hat Security Advisory: openssh security update
security flaw local to local copy uses shell expansion twice
[ "cpe:/o:redhat:enterprise_linux:3::as", "cpe:/o:redhat:enterprise_linux:3::desktop", "cpe:/o:redhat:enterprise_linux:3::es", "cpe:/o:redhat:enterprise_linux:3::ws" ]
null
null
null
null
RHSA-2022:5529
Red Hat Security Advisory: squid:4 security update
squid: DoS when processing gopher server responses
[ "cpe:/a:redhat:rhel_eus:8.2::appstream" ]
null
7.5
null
null
RHSA-2022:2031
Red Hat Security Advisory: libssh security, bug fix, and enhancement update
libssh: possible heap-based buffer overflow when rekeying
[ "cpe:/a:redhat:enterprise_linux:8::appstream", "cpe:/o:redhat:enterprise_linux:8::baseos" ]
null
3.5
null
null
RHSA-2021:2258
Red Hat Security Advisory: rh-nginx118-nginx security update
nginx: Off-by-one in ngx_resolver_copy() when labels are followed by a pointer to a root domain name
[ "cpe:/a:redhat:rhel_software_collections:3::el7" ]
null
8.1
null
null
RHSA-2023:6469
Red Hat Security Advisory: wireshark security update
wireshark: RTPS dissector crash wireshark: IEEE C37.118 Synchrophasor dissector crash wireshark: Candump log file parser crash wireshark: VMS TCPIPtrace file parser crash wireshark: NetScaler file parser crash wireshark: XRA dissector infinite loop
[ "cpe:/a:redhat:enterprise_linux:9::appstream", "cpe:/a:redhat:enterprise_linux:9::crb" ]
null
6.5
null
null
RHSA-2023:5851
Red Hat Security Advisory: RHACS 4.1 enhancement and security update
golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487) HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack)
[ "cpe:/a:redhat:advanced_cluster_security:4.1::el8" ]
null
7.5
null
null
RHSA-2020:4465
Red Hat Security Advisory: binutils security update
binutils: denial of service via crafted ELF file
[ "cpe:/a:redhat:enterprise_linux:8::appstream", "cpe:/o:redhat:enterprise_linux:8::baseos" ]
null
null
5.5
null
RHSA-2024:3047
Red Hat Security Advisory: 389-ds:1.4 security update
389-ds-base: a heap overflow leading to denail-of-servce while writing a value larger than 256 chars (in log_entry_attr)
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
5.5
null
null
RHSA-2022:1402
Red Hat Security Advisory: OpenShift Virtualization 2.6.10 RPMs security and bug fix update
golang: net: lookup functions may return invalid host names golang: net/http/httputil: ReverseProxy forwards connection headers if first one is empty golang: math/big.Rat: may cause a panic or an unrecoverable fatal error if passed inputs with very large exponents
[ "cpe:/a:redhat:container_native_virtualization:2.6::el7", "cpe:/a:redhat:container_native_virtualization:2.6::el8" ]
null
7.5
null
null
RHSA-2021:4844
Red Hat Security Advisory: samba security update
samba: SMB1 client connections can be downgraded to plaintext authentication samba: Active Directory (AD) domain user could become root on domain members
[ "cpe:/a:redhat:storage:3.5:samba:el7" ]
null
8.1
null
null
RHSA-2020:0134
Red Hat Security Advisory: .NET Core on Red Hat Enterprise Linux security and bug fix update
dotnet: Denial of service via backpressure issue dotnet: Memory Corruption in SignalR
[ "cpe:/a:redhat:rhel_dotnet:3.0::el7", "cpe:/a:redhat:rhel_dotnet:3.1::el7" ]
null
8.1
null
null
RHSA-2011:0152
Red Hat Security Advisory: java-1.4.2-ibm security update
krb5: null pointer dereference in GSS-API library leads to DoS (MITKRB5-SA-2010-005) OpenJDK HttpURLConnection incomplete TRACE permission check (6981426)
[ "cpe:/a:redhat:rhel_extras:4", "cpe:/a:redhat:rhel_extras:5::client", "cpe:/a:redhat:rhel_extras:5::server" ]
null
null
null
null
RHSA-2021:3529
Red Hat Security Advisory: Red Hat Single Sign-On 7.4.9 security update on RHEL 8
jackson-dataformat-cbor: Unchecked allocation of byte buffer can cause a java.lang.OutOfMemoryError exception keycloak: X509 Direct Grant Auth does not verify certificate timestamp validity keycloak: Brute force attack is possible even after the account lockout keycloak: Anyone can register a new device when there is no device registered for passwordless login keycloak-model-infinispan: authenticationSessions map in RootAuthenticationSessionEntity grows boundlessly could lead to a DoS attack
[ "cpe:/a:redhat:red_hat_single_sign_on:7::el8" ]
null
7.5
null
null
RHSA-2023:0838
Red Hat Security Advisory: samba security update
samba: RC4/HMAC-MD5 NetLogon Secure Channel is weak and should be avoided
[ "cpe:/a:redhat:enterprise_linux:8::appstream", "cpe:/a:redhat:enterprise_linux:8::crb", "cpe:/o:redhat:enterprise_linux:8::baseos" ]
null
8.1
null
null
RHSA-2022:8126
Red Hat Security Advisory: ignition security, bug fix, and enhancement update
ignition: configs are accessible from unprivileged containers in VMs running on VMware products
[ "cpe:/a:redhat:enterprise_linux:9::appstream" ]
null
7.5
null
null
RHSA-2019:1819
Red Hat Security Advisory: rh-redis5-redis security update
redis: Heap buffer overflow in HyperLogLog triggered by malicious client redis: Stack buffer overflow in HyperLogLog triggered by malicious client
[ "cpe:/a:redhat:rhel_software_collections:3::el7" ]
null
null
7.2
null
RHSA-2014:1788
Red Hat Security Advisory: openstack-cinder security and bug fix update
openstack-cinder: Cinder-volume host data leak to virtual machine instance Trove: potential leak of passwords into log files Trove: potential leak of passwords into log files
[ "cpe:/a:redhat:openstack:5::el7" ]
null
null
null
null
RHSA-2023:5739
Red Hat Security Advisory: java-11-openjdk security and bug fix update
OpenJDK: certificate path validation issue during client authentication (8309966)
[ "cpe:/a:redhat:rhel_aus:8.2::appstream", "cpe:/a:redhat:rhel_e4s:8.2::appstream", "cpe:/a:redhat:rhel_tus:8.2::appstream" ]
null
5.3
null
null
RHSA-2021:1509
Red Hat Security Advisory: rh-eclipse-jetty security update
jetty: Symlink directory exposes webapp directory contents jetty: Ambiguous paths can access WEB-INF jetty: Resource exhaustion when receiving an invalid large TLS frame
[ "cpe:/a:redhat:devtools:2021" ]
null
7.5
null
null
RHSA-2020:4137
Red Hat Security Advisory: security update - Red Hat Ansible Tower 3.6.6-1 - RHEL7 Container
django-rest-framework: XSS Vulnerability in API viewer
[ "cpe:/a:redhat:ansible_tower:3.6::el7" ]
null
5.4
null
null
RHSA-2024:10984
Red Hat Security Advisory: ruby:3.1 security update
rexml: REXML ReDoS vulnerability
[ "cpe:/a:redhat:rhel_eus:9.4::appstream" ]
null
7.5
null
null
RHSA-2020:4847
Red Hat Security Advisory: pki-core:10.6 and pki-deps:10.6 security, bug fix, and enhancement update
jquery: Cross-site scripting via cross-domain ajax requests bootstrap: XSS in the data-target attribute bootstrap: Cross-site Scripting (XSS) in the collapse data-parent attribute bootstrap: Cross-site Scripting (XSS) in the data-container property of tooltip bootstrap: XSS in the tooltip or popover data-template attribute pki-core: Reflected XSS in 'path length' constraint field in CA's Agent page pki-core/pki-kra: Reflected XSS in recoveryID search field at KRA's DRM agent page in authorize recovery tab pki-core: Reflected XSS in getcookies?url= endpoint in CA jquery: Prototype pollution in object's prototype leading to denial of service, remote code execution, or property injection pki-core: KRA vulnerable to reflected XSS via the getPk12 page tomcat: Mishandling of Transfer-Encoding header allows for HTTP request smuggling tomcat: Apache Tomcat AJP File Read/Inclusion Vulnerability jquery: Cross-site scripting due to improper injQuery.htmlPrefilter method jquery: Untrusted code execution via <option> tag in HTML passed to DOM manipulation methods pki: Dogtag's python client does not validate certificates pki-core: XSS in the certificate search results tomcat: request mixup
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
8.6
5.6
null
RHSA-2017:1201
Red Hat Security Advisory: thunderbird security update
libevent: Stack-buffer overflow in the name_parse() function libevent: Stack-buffer overflow in evutil_parse_sockaddr_port() libevent: Out-of-bounds read in search_make_new() Mozilla: Memory safety bugs fixed in Firefox 53, Firefox ESR 45.9, and Firefox ESR 52.1 (MFSA 2017-11, MFSA 2017-12) Mozilla: Use-after-free in text input selection (MFSA 2017-11, MFSA 2017-12) Mozilla: Use-after-free in SMIL animation functions (MFSA 2017-11, MFSA 2017-12) Mozilla: Use-after-free during focus handling (MFSA 2017-11, MFSA 2017-12) Mozilla: Use-after-free during transaction processing in the editor (MFSA 2017-11, MFSA 2017-12) Mozilla: Out-of-bounds write with malicious font in Graphite 2 (MFSA 2017-11, MFSA 2017-12) Mozilla: Use-after-free in nsAutoPtr during XSLT processing (MFSA 2017-11, MFSA 2017-12) Mozilla: Use-after-free in nsTArray Length() during XSLT processing (MFSA 2017-11, MFSA 2017-12) Mozilla: Use-after-free in txExecutionState destructor during XSLT processing (MFSA 2017-11, MFSA 2017-12) Mozilla: Use-after-free with selection during scroll events (MFSA 2017-11, MFSA 2017-12) Mozilla: Use-after-free during style changes (MFSA 2017-11, MFSA 2017-12) Mozilla: Out-of-bounds write during BinHex decoding (MFSA 2017-11, MFSA 2017-12) Mozilla: Buffer overflow while parsing application/http-index-format content (MFSA 2017-11, MFSA 2017-12) Mozilla: Uninitialized values used while parsing application/http-index-format content (MFSA 2017-11, MFSA 2017-12) Mozilla: Out-of-bounds read when HTTP/2 DATA frames are sent with incorrect data (MFSA 2017-11, MFSA 2017-12) Mozilla: Out-of-bounds read during glyph processing (MFSA 2017-11, MFSA 2017-12) Mozilla: Crash during bidirectional unicode manipulation with animation (MFSA 2017-11, MFSA 2017-12) Mozilla: Addressbar spoofing with onblur event (MFSA 2017-12) Mozilla: Sandbox escape allowing file system read access through file picker (MFSA 2017-12) Mozilla: Buffer overflow in WebGL (MFSA 2017-11, MFSA 2017-12) Mozilla: Use-after-free in frame selection (MFSA 2017-11, MFSA 2017-12) Mozilla: Memory corruption with accessibility and DOM manipulation (MFSA 2017-11, MFSA 2017-12) Mozilla: Out-of-bounds read in ConvolvePixel (MFSA 2017-11, MFSA 2017-12) Mozilla: Origin confusion when reloading isolated data:text/html URL (MFSA 2017-12) Mozilla: Memory corruption when drawing Skia content (MFSA 2017-12) Mozilla: Potential Buffer overflow in flex-generated code (MFSA 2017-11, MFSA 2017-12)
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation", "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
9.8
null
RHSA-2017:0170
Red Hat Security Advisory: JBoss Enterprise Application Platform 7.0.4 on RHEL 6
EAP: Sensitive data can be exposed at the server level in domain mode admin-cli: Potential EAP resource starvation DOS attack via GET requests for server log files
[ "cpe:/a:redhat:jboss_enterprise_application_platform:7::el6" ]
null
null
4.3
null
RHSA-2025:1253
Red Hat Security Advisory: kernel security update
kernel: media: uvcvideo: Skip parsing frames of type UVC_VS_UNDEFINED in uvc_parse_format kernel: mm: fix NULL pointer dereference in alloc_pages_bulk_noprof
[ "cpe:/a:redhat:rhel_e4s:9.0::appstream", "cpe:/o:redhat:rhel_e4s:9.0::baseos" ]
null
5.5
null
null
RHSA-2005:831
Red Hat Security Advisory: php security update
security flaw security flaw security flaw security flaw
[ "cpe:/o:redhat:enterprise_linux:3::as", "cpe:/o:redhat:enterprise_linux:3::desktop", "cpe:/o:redhat:enterprise_linux:3::es", "cpe:/o:redhat:enterprise_linux:3::ws", "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws" ]
null
null
null
null
RHSA-2023:3318
Red Hat Security Advisory: go-toolset and golang security update
golang: crypto/internal/nistec: specific unreduced P-256 scalars produce incorrect results golang: net/http, net/textproto: denial of service from excessive memory allocation golang: net/http, net/textproto, mime/multipart: denial of service from excessive resource consumption golang: go/parser: Infinite loop in parsing golang: html/template: backticks not treated as string delimiters golang: html/template: improper sanitization of CSS values golang: html/template: improper handling of JavaScript whitespace golang: html/template: improper handling of empty HTML attributes
[ "cpe:/a:redhat:enterprise_linux:9::appstream" ]
null
7.3
null
null
RHSA-2012:1232
Red Hat Security Advisory: JBoss Enterprise Portal Platform 5.2.2 update
JDK: XML parsing Denial-Of-Service (6845701) CSRF on jmx-console allows invocation of operations on mbeans JNDI: unauthenticated remote write access is permitted by default jakarta: JVM destabilization due to memory exhaustion when processing CDF/CFBF files JBoss: authentication bypass when running under JACC with ignoreBaseDecision on JBossWebRealm JGroups diagnostics service enabled by default with no authentication when a JGroups channel is started
[ "cpe:/a:redhat:jboss_enterprise_portal_platform:5.2" ]
null
null
null
null
RHSA-2022:1860
Red Hat Security Advisory: maven:3.6 security and enhancement update
apache-httpclient: incorrect handling of malformed authority component in request URIs
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
5.3
null
null
RHSA-2019:0237
Red Hat Security Advisory: etcd security, bug fix, and enhancement update
An update for etcd is now available for Red Hat Enterprise Linux 7 Extras. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. [Updated 5th March 2019] On 5th February 2019, the updated etcd packages previously included in this erratum were removed. For further details about this removal, refer to the Red Hat Knowledgebase article 3938261 linked in the References section.
[ "cpe:/a:redhat:rhel_extras_other:7" ]
null
null
null
null
RHSA-2011:0427
Red Hat Security Advisory: spice-xpi security update
spice-xpi: unitialized pointer writes possible when getting plugin properties
[ "cpe:/a:redhat:rhel_productivity:5" ]
null
null
null
null
RHSA-2015:0884
Red Hat Security Advisory: novnc security update
novnc: session hijack through insecurely set session token cookies
[ "cpe:/a:redhat:openstack:4::el6" ]
null
null
null
null
RHSA-2017:3382
Red Hat Security Advisory: firefox security update
Mozilla: Web worker in Private Browsing mode can write IndexedDB data
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation", "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
7.5
null
RHSA-2022:1823
Red Hat Security Advisory: mod_auth_openidc:2.3 security update
mod_auth_openidc: open redirect in oidc_validate_redirect_url() mod_auth_openidc: hardcoded static IV and AAD with a reused key in AES GCM encryption mod_auth_openidc: XSS when using OIDCPreservePost On mod_auth_openidc: open redirect due to target_link_uri parameter not validated
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
6.1
6.1
null
RHSA-2020:4444
Red Hat Security Advisory: glibc security, bug fix, and enhancement update
glibc: array overflow in backtrace functions for powerpc glibc: use-after-free in glob() function when expanding ~user glibc: stack corruption from crafted input in cosl, sinl, sincosl, and tanl functions
[ "cpe:/a:redhat:enterprise_linux:8::appstream", "cpe:/a:redhat:enterprise_linux:8::crb", "cpe:/o:redhat:enterprise_linux:8::baseos" ]
null
5.7
null
null
RHSA-2005:010
Red Hat Security Advisory: vim security update
security flaw
[ "cpe:/o:redhat:enterprise_linux:3::as", "cpe:/o:redhat:enterprise_linux:3::desktop", "cpe:/o:redhat:enterprise_linux:3::es", "cpe:/o:redhat:enterprise_linux:3::ws" ]
null
null
null
null
RHSA-2021:3886
Red Hat Security Advisory: java-11-openjdk security update
OpenJDK: Weak ciphers preferred over stronger ones for TLS (JSSE, 8264210) OpenJDK: Excessive memory allocation in RTFParser (Swing, 8265167) OpenJDK: Excessive memory allocation in RTFReader (Swing, 8265580) OpenJDK: Excessive memory allocation in HashMap and HashSet (Utility, 8266097) OpenJDK: Certificates with end dates too far in the future can corrupt keystore (Keytool, 8266137) OpenJDK: Loop in HttpsServer triggered during TLS session close (JSSE, 8254967) OpenJDK: Incorrect principal selection when using Kerberos Constrained Delegation (Libraries, 8266689) OpenJDK: Unexpected exception raised during TLS handshake (JSSE, 8267729) OpenJDK: Excessive memory allocation in BMPImageReader (ImageIO, 8267735) OpenJDK: Non-constant comparison during TLS handshakes (JSSE, 8269618)
[ "cpe:/a:redhat:rhel_eus:8.1::appstream" ]
null
3.7
null
null
RHSA-2014:1321
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 5.2.0 security update
CXF: SSL hostname verification bypass, incomplete CVE-2012-5783 fix CXF: SSL hostname verification bypass, incomplete CVE-2012-6153 fix
[ "cpe:/a:redhat:jboss_enterprise_application_platform:5::el4", "cpe:/a:redhat:jboss_enterprise_application_platform:5::el5", "cpe:/a:redhat:jboss_enterprise_application_platform:5::el6" ]
null
null
4.8
null
RHSA-2023:6207
Red Hat Security Advisory: Red Hat JBoss Web Server 5.7.6 release and security update
tomcat: improper cleaning of recycled objects could lead to information leak tomcat: incorrectly parsed http trailer headers can cause request smuggling
[ "cpe:/a:redhat:jboss_enterprise_web_server:5.7" ]
null
5.3
null
null
RHSA-2024:1787
Red Hat Security Advisory: squid security update
squid: Denial of Service in SSL Certificate validation squid: NULL pointer dereference in the gopher protocol code squid: Buffer over-read in the HTTP Message processing feature squid: Incorrect Check of Function Return Value In Helper Process management squid: denial of service in HTTP request parsing squid: denial of service in HTTP header parser
[ "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
8.6
null
null
RHSA-2010:0750
Red Hat Security Advisory: xpdf security update
xpdf: uninitialized Gfx::parser pointer dereference
[ "cpe:/o:redhat:enterprise_linux:3::as", "cpe:/o:redhat:enterprise_linux:3::desktop", "cpe:/o:redhat:enterprise_linux:3::es", "cpe:/o:redhat:enterprise_linux:3::ws" ]
null
null
null
null
RHSA-2023:3204
Red Hat Security Advisory: OpenShift Virtualization 4.13.0 RPMs security and bug fix update
golang: net/http: handle server errors after sending GOAWAY golang: golang.org/x/text/language: ParseAcceptLanguage takes a long time to parse complex tags golang: math/big: decoding big.Float and big.Rat types can panic if the encoded message is too short, potentially allowing a denial of service golang: net/url: JoinPath does not strip relative path components in all circumstances golang: net/http: excessive memory growth in a Go server accepting HTTP/2 requests
[ "cpe:/a:redhat:container_native_virtualization:4.13::el7", "cpe:/a:redhat:container_native_virtualization:4.13::el8", "cpe:/a:redhat:container_native_virtualization:4.13::el9" ]
null
5.3
null
null
RHSA-2024:4645
Red Hat Security Advisory: qt5-qtbase security update
qtbase: qtbase: Delay any communication until encrypted() can be responded to
[ "cpe:/a:redhat:rhel_e4s:9.0::appstream" ]
null
7.5
null
null
RHSA-2018:1860
Red Hat Security Advisory: samba security and bug fix update
samba: NULL pointer dereference in printer server process
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
4.3
null
RHSA-2024:3128
Red Hat Security Advisory: perl:5.32 security update
perl: Write past buffer end via illegal user-defined Unicode property
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
7
null
null
RHSA-2011:0200
Red Hat Security Advisory: krb5 security update
krb5: kpropd unexpected termination on invalid input (MITKRB5-SA-2011-001) krb5: KDC hang when using LDAP backend caused by special principal name (MITKRB5-SA-2011-002) krb5: KDC crash when using LDAP backend caused by a special principal name (MITKRB5-SA-2011-002)
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
null
null
RHSA-2023:1905
Red Hat Security Advisory: java-1.8.0-openjdk security update
OpenJDK: improper connection handling during TLS handshake (8294474) OpenJDK: missing string checks for NULL characters (8296622) OpenJDK: incorrect handling of NULL characters in ProcessBuilder (8295304) OpenJDK: Swing HTML parsing issue (8296832) OpenJDK: incorrect enqueue of references in garbage collector (8298191) OpenJDK: certificate validation issue in TLS session negotiation (8298310) OpenJDK: missing check for slash characters in URI-to-path conversion (8298667)
[ "cpe:/a:redhat:rhel_aus:8.2::appstream", "cpe:/a:redhat:rhel_e4s:8.2::appstream", "cpe:/a:redhat:rhel_tus:8.2::appstream" ]
null
3.7
null
null
RHSA-2011:0265
Red Hat Security Advisory: ccs security update
rgmanager: multiple insecure temporary file use issues
[ "cpe:/a:redhat:rhel_cluster:4" ]
null
null
null
null
RHSA-2022:0737
Red Hat Security Advisory: Red Hat build of Eclipse Vert.x 4.2.5 security update
Kafka: Timing Attack Vulnerability for Apache Kafka Connect and Clients
[ "cpe:/a:redhat:openshift_application_runtimes:1.0" ]
null
5.9
null
null
RHSA-2023:3581
Red Hat Security Advisory: .NET 6.0 security, bug fix, and enhancement update
dotnet: Bypass restrictions when deserializing a DataSet or DataTable from XML dotnet: .NET Kestrel: Denial of Service processing X509 Certificates dotnet: vulnerability exists in NuGet where a potential race condition can lead to a symlink attack dotnet: Remote Code Execution - Source generators issue can lead to a crash due to unmanaged heap corruption
[ "cpe:/a:redhat:enterprise_linux:9::appstream", "cpe:/a:redhat:enterprise_linux:9::crb" ]
null
7.3
null
null
RHSA-2015:2547
Red Hat Security Advisory: Red Hat JBoss Operations Network 3.2.3 security update
apache-commons-collections: InvokerTransformer code execution during deserialisation
[ "cpe:/a:redhat:jboss_operations_network:3.2.3" ]
null
null
null
null
RHSA-2019:1968
Red Hat Security Advisory: qemu-kvm-rhev security and bug fix update
QEMU: device_tree: heap buffer overflow while loading device tree blob QEMU: slirp: heap buffer overflow in tcp_emu()
[ "cpe:/a:redhat:rhev_manager:4.2", "cpe:/a:redhat:rhev_manager:4.3", "cpe:/o:redhat:enterprise_linux:7::hypervisor" ]
null
null
7.8
null
RHSA-2023:1900
Red Hat Security Advisory: java-17-openjdk security and bug fix update
OpenJDK: improper connection handling during TLS handshake (8294474) OpenJDK: missing string checks for NULL characters (8296622) OpenJDK: incorrect handling of NULL characters in ProcessBuilder (8295304) OpenJDK: Swing HTML parsing issue (8296832) OpenJDK: incorrect enqueue of references in garbage collector (8298191) OpenJDK: certificate validation issue in TLS session negotiation (8298310) OpenJDK: missing check for slash characters in URI-to-path conversion (8298667)
[ "cpe:/a:redhat:rhel_eus:9.0::appstream", "cpe:/a:redhat:rhel_eus:9.0::crb" ]
null
3.7
null
null
RHSA-2023:5313
Red Hat Security Advisory: open-vm-tools security update
open-vm-tools: SAML token signature bypass
[ "cpe:/a:redhat:enterprise_linux:9::appstream" ]
null
7.1
null
null
RHSA-2022:5542
Red Hat Security Advisory: squid security update
squid: DoS when processing gopher server responses
[ "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
7.5
null
null
RHSA-2023:0823
Red Hat Security Advisory: thunderbird security update
Mozilla: User Interface lockup with messages combining S/MIME and OpenPGP Mozilla: Content security policy leak in violation reports using iframes Mozilla: Extensions could have opened external schemes without user knowledge Mozilla: Screen hijack via browser fullscreen mode Mozilla: Out of bounds memory write from EncodeInputStream Mozilla: Potential use-after-free from compartment mismatch in SpiderMonkey Mozilla: Invalid downcast in SVGUtils::SetupStrokeGeometry Mozilla: Use-after-free in mozilla::dom::ScriptLoadContext::~ScriptLoadContext Mozilla: Web Crypto ImportKey crashes tab Mozilla: Fullscreen notification not shown in Firefox Focus Mozilla: Memory safety bugs fixed in Firefox 110 and Firefox ESR 102.8 Mozilla: Memory safety bugs fixed in Firefox ESR 102.8
[ "cpe:/a:redhat:rhel_eus:9.0::appstream" ]
null
8.8
null
null
RHSA-2021:1299
Red Hat Security Advisory: java-1.8.0-openjdk security update
OpenJDK: Incomplete enforcement of JAR signing disabled algorithms (Libraries, 8249906)
[ "cpe:/a:redhat:rhel_eus:8.2::appstream" ]
null
5.3
null
null
RHSA-2024:3347
Red Hat Security Advisory: python3 security update
python: Path traversal on tempfile.TemporaryDirectory python: The zipfile module is vulnerable to zip-bombs leading to denial of service
[ "cpe:/a:redhat:enterprise_linux:8::appstream", "cpe:/o:redhat:enterprise_linux:8::baseos" ]
null
6.2
null
null
RHSA-2021:5226
Red Hat Security Advisory: openssl security update
openssl: Read buffer overruns processing ASN.1 strings
[ "cpe:/o:redhat:enterprise_linux:8::baseos" ]
null
7.4
null
null
RHSA-2024:6663
Red Hat Security Advisory: kpatch-patch-4_18_0-305_120_1 and kpatch-patch-4_18_0-305_138_1 security update
kernel: virtio-net: tap: mlx5_core short frame denial of service kernel: virtio-net: tun: mlx5_core short frame denial of service
[ "cpe:/o:redhat:rhel_e4s:8.4::baseos" ]
null
7.1
null
null
RHSA-2009:1146
Red Hat Security Advisory: JBoss Enterprise Application Platform 4.3.0.CP05 update
tomcat request dispatcher information disclosure vulnerability tomcat6 Information disclosure in authentication classes tomcat XML parser information disclosure
[ "cpe:/a:redhat:jboss_enterprise_application_platform:4.3.0::el4" ]
null
null
null
null
RHSA-2024:9017
Red Hat Security Advisory: thunderbird security update
firefox: thunderbird: Permission leak via embed or object elements firefox: thunderbird: Use-after-free in layout with accessibility firefox: thunderbird: Confusing display of origin for external protocol handler prompt firefox: thunderbird: XSS due to Content-Disposition being ignored in multipart/x-mixed-replace response firefox: thunderbird: Origin of permission prompt could be spoofed by long URL firefox: thunderbird: Cross origin video frame leak firefox: thunderbird: History interface could have been used to cause a Denial of Service condition in the browser firefox: thunderbird: Clipboard "paste" button persisted across tabs firefox: DOM push subscription message could hang Firefox firefox: thunderbird: Memory safety bugs fixed in Firefox 132, Thunderbird 132, Firefox ESR 128.4, and Thunderbird 128.4
[ "cpe:/a:redhat:rhel_aus:8.6::appstream", "cpe:/a:redhat:rhel_e4s:8.6::appstream", "cpe:/a:redhat:rhel_tus:8.6::appstream" ]
null
8.8
null
null
RHSA-2022:0026
Red Hat Security Advisory: OpenShift Container Platform 4.6.53 security update
log4j-core: DoS in log4j 2.x with Thread Context Map (MDC) input data contains a recursive lookup and context lookup pattern
[ "cpe:/a:redhat:openshift:4.6::el8" ]
null
5.9
null
null
RHSA-2011:0841
Red Hat Security Advisory: systemtap security update
systemtap: does not guard against DWARF operations div-by-zero errors, which can cause a kernel panic
[ "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
RHSA-2023:4488
Red Hat Security Advisory: Red Hat OpenShift support for Windows Containers 6.0.1[security update]
golang: crash in a golang.org/x/crypto/ssh server golang: crypto/tls: session tickets lack random ticket_age_add containerd: Supplementary groups are not set up properly
[ "cpe:/a:redhat:openshift:4.11::el8" ]
null
7.3
null
null
RHSA-2022:5100
Red Hat Security Advisory: grub2, mokutil, shim, and shim-unsigned-x64 security update
grub2: Crafted PNG grayscale images may lead to out-of-bounds write in heap grub2: Crafted PNG image may lead to out-of-bound write during huffman table handling grub2: Crafted JPEG image can lead to buffer underflow write in the heap grub2: Integer underflow in grub_net_recv_ip4_packets grub2: Out-of-bound write when handling split HTTP headers grub2: shim_lock verifier allows non-kernel files to be loaded grub2: use-after-free in grub_cmd_chainloader() shim: Buffer overflow when loading crafted EFI images
[ "cpe:/a:redhat:rhel_eus:8.2::crb", "cpe:/o:redhat:rhel_eus:8.2::baseos" ]
null
7.3
null
null
RHSA-2020:5661
Red Hat Security Advisory: postgresql:9.6 security update
postgresql: Selectivity estimators bypass row security policies postgresql: TYPE in pg_temp executes arbitrary SQL during SECURITY DEFINER execution postgresql: ALTER ... DEPENDS ON EXTENSION is missing authorization checks postgresql: Uncontrolled search path element in CREATE EXTENSION postgresql: Reconnection can downgrade connection security settings postgresql: Multiple features escape "security restricted operation" sandbox postgresql: psql's \gset allows overwriting specially treated variables
[ "cpe:/a:redhat:rhel_e4s:8.0::appstream" ]
null
7.5
7.5
null
RHSA-2024:0278
Red Hat Security Advisory: Red Hat AMQ Broker 7.11.5 release and security update
bouncycastle: potential blind LDAP injection attack using a self-signed certificate
[ "cpe:/a:redhat:amq_broker:7.11" ]
null
5.3
null
null
RHSA-2018:1688
Red Hat Security Advisory: org.ovirt.engine-root security update
hw: cpu: speculative store bypass
[ "cpe:/a:redhat:rhev_manager:3" ]
null
null
5.6
null
RHSA-2007:0355
Red Hat Security Advisory: php security update
php libxmlrpc library overflow php CRLF injection php make_http_soap_request flaw
[ "cpe:/a:redhat:rhel_application_stack:1" ]
null
null
null
null
RHSA-2022:6782
Red Hat Security Advisory: Red Hat Single Sign-On 7.5.3 security update on RHEL 7
jackson-databind: denial of service via a large depth of nested objects h2: Remote Code Execution in Console netty: control chars in header names may lead to HTTP request smuggling xnio: org.xnio.StreamConnection.notifyReadClosed log to debug instead of stderr keycloak: Stored XSS in groups dropdown wildfly: Wildfly management of EJB Session context returns wrong caller principal with Elytron Security enabled keycloak: improper input validation permits script injection keycloak: Uploading of SAML javascript protocol mapper scripts through the admin console
[ "cpe:/a:redhat:red_hat_single_sign_on:7.5::el7" ]
null
6.4
null
null
RHSA-2007:0153
Red Hat Security Advisory: php security update
gd: buffer overrun security flaw security flaw security flaw
[ "cpe:/o:redhat:enterprise_linux:5::client_workstation", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
RHSA-2014:0830
Red Hat Security Advisory: Red Hat Enterprise Linux 6.3 Extended Update Support Retirement Notice
This is the final notification for the retirement of Red Hat Enterprise Linux 6.3 Extended Update Support (EUS). This notification applies only to those customers subscribed to the Extended Update Support (EUS) channel for Red Hat Enterprise Linux 6.3.
[ "cpe:/o:redhat:rhel_eus:6.3::server" ]
null
null
null
null
RHSA-2023:1325
Red Hat Security Advisory: OpenShift Container Platform 4.13.0 security update
buildah: possible information disclosure and modification OpenShift: Missing HTTP Strict Transport Security golang: crash in a golang.org/x/crypto/ssh server golang: net/http: excessive memory growth in a Go server accepting HTTP/2 requests golang: path/filepath: path-filepath filepath.Clean path traversal golang.org/x/net/http2: avoid quadratic complexity in HPACK decoding golang: crypto/tls: large handshake records may cause panics golang: net/http, mime/multipart: denial of service from excessive resource consumption haproxy: segfault DoS openshift/apiserver-library-go: Bypass of SCC seccomp profile restrictions podman: symlink exchange attack in podman export volume python-werkzeug: high resource usage when parsing multipart form data with many fields haproxy: request smuggling attack in HTTP/1 header parsing
[ "cpe:/a:redhat:openshift:4.13::el8", "cpe:/a:redhat:openshift:4.13::el9", "cpe:/a:redhat:openshift_ironic:4.13::el9" ]
null
8.2
null
null
RHBA-2013:0009
Red Hat Bug Fix Advisory: mod_nss bug fix update
mod_nss: FakeBasicAuth authentication bypass
[ "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
RHSA-2005:232
Red Hat Security Advisory: ipsec-tools security update
security flaw
[ "cpe:/o:redhat:enterprise_linux:3::as", "cpe:/o:redhat:enterprise_linux:3::desktop", "cpe:/o:redhat:enterprise_linux:3::es", "cpe:/o:redhat:enterprise_linux:3::ws", "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws" ]
null
null
null
null
RHSA-2022:5767
Red Hat Security Advisory: firefox security update
Mozilla: Memory safety bugs fixed in Firefox 103 and 102.1 Mozilla: Directory indexes for bundled resources reflected URL parameters Mozilla: Mouse Position spoofing with CSS transforms
[ "cpe:/a:redhat:enterprise_linux:9::appstream" ]
null
7.5
6.1
null
RHSA-2023:0209
Red Hat Security Advisory: java-1.8.0-openjdk security update
OpenJDK: improper restrictions in CORBA deserialization (Serialization, 8285021) OpenJDK: soundbank URL remote loading (Sound, 8293742)
[ "cpe:/a:redhat:rhel_eus:9.0::appstream", "cpe:/a:redhat:rhel_eus:9.0::crb" ]
null
3.7
null
null
RHSA-2015:1646
Red Hat Security Advisory: rh-mariadb100-mariadb security update
mysql: unspecified vulnerability related to Server:Federated (CPU April 2015) mysql: unspecified vulnerability related to Server:Compiling (CPU April 2015) mysql: unspecified vulnerability related to Server:DDL (CPU April 2015) mysql: unspecified vulnerability related to Server:Optimizer (CPU April 2015) mysql: unspecified vulnerability related to Server:GIS (CPU July 2015) mysql: unspecified vulnerability related to Server:DML (CPU July 2015) mysql: unspecified vulnerability related to Server:Partition (CPU July 2015) mysql: unspecified vulnerability related to Server:Security:Privileges (CPU July 2015) mysql: unspecified vulnerability related to Server:Security:Firewall (CPU July 2015) mysql: unspecified vulnerability related to Server:Security:Privileges (CPU July 2015) mysql: unspecified vulnerability related to Server:Optimizer (CPU July 2015) mysql: unspecified vulnerability related to Server:DML (CPU July 2015) mysql: unspecified vulnerability related to Client (CPU July 2015) mysql: use of SSL/TLS can not be enforced in mysql client library (oCERT-2015-003, BACKRONYM) mysql: unspecified vulnerability related to Server:Pluggable Auth (CPU July 2015) mysql: unspecified vulnerability related to Server:I_S (CPU July 2015) mysql: unspecified vulnerability related to Server:InnoDB (CPU July 2015) mysql: unspecified vulnerability related to Server:Optimizer (CPU July 2015) mysql: unspecified vulnerability related to Server:Memcached (CPU July 2015) mysql: unspecified vulnerability related to Server:Security:Firewall (CPU July 2015) mysql: unspecified vulnerability related to Server:Security:Firewall (CPU July 2015) mysql: unspecified vulnerability related to Server:RBR (CPU July 2015) mysql: unspecified vulnerability related to Server:Partition (CPU July 2015) mysql: unspecified vulnerability related to Server:Security:Privileges (CPU October 2015) mysql: unspecified vulnerability related to Server:InnoDB (CPU October 2015)
[ "cpe:/a:redhat:rhel_software_collections:2::el6", "cpe:/a:redhat:rhel_software_collections:2::el7" ]
null
null
null
null
RHSA-2024:4744
Red Hat Security Advisory: resource-agents update
urllib3: proxy-authorization request header is not stripped during cross-origin redirects
[ "cpe:/a:redhat:rhel_eus:8.8::highavailability", "cpe:/a:redhat:rhel_eus:8.8::resilientstorage" ]
null
4.4
null
null
RHSA-2022:8226
Red Hat Security Advisory: python-lxml security update
lxml: NULL Pointer Dereference in lxml
[ "cpe:/a:redhat:enterprise_linux:9::appstream" ]
null
7.5
null
null
RHSA-2023:0728
Red Hat Security Advisory: OpenShift Container Platform 4.12.3 security update
goutils: RandomAlphaNumeric and CryptoRandomAlphaNumeric are not as random as they should be golang: net/http: excessive memory growth in a Go server accepting HTTP/2 requests
[ "cpe:/a:redhat:openshift:4.12::el8", "cpe:/a:redhat:openshift:4.12::el9" ]
null
5.3
null
null
RHSA-2023:0772
Red Hat Security Advisory: OpenShift Container Platform 4.12.4 security update
kubernetes: Unauthorized read of Custom Resources
[ "cpe:/a:redhat:openshift:4.12::el8" ]
null
6.5
null
null
RHSA-2021:3081
Red Hat Security Advisory: cloud-init security update
cloud-init: randomly generated passwords logged in clear-text to world-readable file
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
5.5
null
null
RHSA-2021:3143
Red Hat Security Advisory: .NET Core 3.1 on RHEL 7 security and bugfix update
dotnet: ASP.NET Core WebSocket frame processing DoS dotnet: Dump file created world-readable dotnet: ASP.NET Core JWT token logging
[ "cpe:/a:redhat:rhel_dotnet:3.1::el7" ]
null
5.5
null
null
RHSA-2003:368
Red Hat Security Advisory: Updated IA64 kernel packages address security vulnerabilities, bugfixes
security flaw security flaw
[ "cpe:/o:redhat:enterprise_linux:2.1::as", "cpe:/o:redhat:enterprise_linux:2.1::aw" ]
null
null
null
null
RHSA-2015:2417
Red Hat Security Advisory: autofs security, bug fix and enhancement update
autofs: priv escalation via interpreter load path for program based automount maps
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
null
null
RHSA-2022:8963
Red Hat Security Advisory: Red Hat Single Sign-On 7.6.1 security update on RHEL 9
keycloak: path traversal via double URL encoding keycloak: Session takeover with OIDC offline refreshtokens
[ "cpe:/a:redhat:red_hat_single_sign_on:7.6::el9" ]
null
6.8
null
null
RHSA-2004:304
Red Hat Security Advisory: pam security update
security flaw
[ "cpe:/o:redhat:enterprise_linux:2.1::as", "cpe:/o:redhat:enterprise_linux:2.1::aw", "cpe:/o:redhat:enterprise_linux:2.1::es", "cpe:/o:redhat:enterprise_linux:2.1::ws" ]
null
null
null
null
RHSA-2021:1989
Red Hat Security Advisory: bind security update
bind: An assertion check can fail while answering queries for DNAME records that require the DNAME to be processed to resolve itself
[ "cpe:/a:redhat:enterprise_linux:8::appstream", "cpe:/o:redhat:enterprise_linux:8::baseos" ]
null
7.5
null
null
RHSA-2008:0581
Red Hat Security Advisory: bluez-libs and bluez-utils security update
bluez-libs: SDP payload processing vulnerability
[ "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws", "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::client_workstation", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
RHSA-2022:0855
Red Hat Security Advisory: OpenShift sandboxed containers 1.2.0 security update
golang: net/http/httputil: panic due to racy read of persistConn after handler panic golang: net/http: limit growth of header canonicalization cache
[ "cpe:/a:redhat:openshift_sandboxed_containers:1.2.0::el8" ]
null
7.5
null
null
RHSA-2022:9070
Red Hat Security Advisory: firefox security update
Mozilla: Arbitrary file read from a compromised content process Mozilla: Drag and Dropped Filenames could have been truncated to malicious extensions Mozilla: Memory safety bugs fixed in Firefox ESR 102.6 and Thunderbird 102.6 Mozilla: Use-after-free in WebGL Mozilla: Memory corruption in WebGL Mozilla: Use-after-free in WebGL
[ "cpe:/a:redhat:rhel_aus:8.2::appstream", "cpe:/a:redhat:rhel_e4s:8.2::appstream", "cpe:/a:redhat:rhel_tus:8.2::appstream" ]
null
8.1
null
null
RHSA-2021:3436
Red Hat Security Advisory: kpatch-patch security update
kernel: powerpc: KVM guest OS users can cause host OS memory corruption
[ "cpe:/o:redhat:enterprise_linux:8::baseos" ]
null
7.8
null
null
RHSA-2023:6257
Red Hat Security Advisory: OpenShift Container Platform 4.13.21 bug fix and security update
golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487)
[ "cpe:/a:redhat:openshift:4.13::el8", "cpe:/a:redhat:openshift:4.13::el9" ]
null
7.5
null
null
RHSA-2022:6073
Red Hat Security Advisory: kernel security update
kernel: a use-after-free write in the netfilter subsystem can lead to privilege escalation to root
[ "cpe:/o:redhat:rhel_aus:7.7::server", "cpe:/o:redhat:rhel_e4s:7.7::server", "cpe:/o:redhat:rhel_tus:7.7::server" ]
null
7.8
null
null
RHSA-2015:0749
Red Hat Security Advisory: libxml2 security update
libxml2: external parameter entity loaded when entity substitution is disabled
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
null
null
RHSA-2023:1805
Red Hat Security Advisory: thunderbird security update
Thunderbird: Revocation status of S/Mime recipient certificates was not checked Mozilla: Memory Corruption in Safe Browsing Code Mozilla: libwebp: Double-free in libwebp Mozilla: Matrix SDK bundled with Thunderbird vulnerable to denial-of-service attack Thunderbird: Hang when processing certain OpenPGP messages Mozilla: Fullscreen notification obscured Mozilla: Potential Memory Corruption following Garbage Collector compaction Mozilla: Invalid free from JavaScript code Mozilla: Content-Disposition filename truncation leads to Reflected File Download Mozilla: Files with malicious extensions could have been downloaded unsafely on Linux Mozilla: Incorrect optimization result on ARM64 Mozilla: Memory safety bugs fixed in Firefox 112 and Firefox ESR 102.10
[ "cpe:/a:redhat:rhel_aus:8.2::appstream", "cpe:/a:redhat:rhel_e4s:8.2::appstream", "cpe:/a:redhat:rhel_tus:8.2::appstream" ]
null
8.8
null
null
RHSA-2020:0606
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.2 security update
netty: HTTP request smuggling netty: HttpObjectDecoder.java allows Content-Length header to accompanied by second Content-Length header netty: HTTP Request Smuggling due to Transfer-Encoding whitespace mishandling
[ "cpe:/a:redhat:jboss_enterprise_application_platform:7.2" ]
null
7.5
null
null
RHSA-2023:6802
Red Hat Security Advisory: xorg-x11-server security update
xorg-x11-server: Out-of-bounds write in XIChangeDeviceProperty/RRChangeOutputProperty
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
7.8
null
null