id
stringlengths
13
15
title
stringlengths
29
176
description
stringlengths
8
32.1k
cpes
sequencelengths
0
20
cvss_v4_0
null
cvss_v3_1
float64
0
10
cvss_v3_0
float64
0
10
cvss_v2_0
null
RHSA-2024:1479
Red Hat Security Advisory: squid:4 security update
squid: Denial of Service in HTTP Chunked Decoding
[ "cpe:/a:redhat:rhel_eus:8.6::appstream" ]
null
8.6
null
null
RHSA-2014:1676
Red Hat Security Advisory: wireshark security update
wireshark: RTP dissector crash (wnpa-sec-2014-12) wireshark: RTP dissector crash (wnpa-sec-2014-12) wireshark: MEGACO dissector infinite loop (wnpa-sec-2014-13) wireshark: Netflow dissector crash (wnpa-sec-2014-14) wireshark: CUPS dissector crash (wnpa-sec-2014-15) wireshark: HIP dissector infinite loop (wnpa-sec-2014-16) wireshark: RTSP dissector crash (wnpa-sec-2014-17) wireshark: SES dissector crash (wnpa-sec-2014-18) wireshark: DOS Sniffer file parser flaw (wnpa-sec-2014-19) wireshark: DOS Sniffer file parser flaw (wnpa-sec-2014-19) wireshark: DOS Sniffer file parser flaw (wnpa-sec-2014-19) wireshark: DOS Sniffer file parser flaw (wnpa-sec-2014-19)
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation", "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
null
null
RHSA-2016:2094
Red Hat Security Advisory: bind97 security update
bind: assertion failure triggered by a packet with malformed options
[ "cpe:/o:redhat:enterprise_linux:5::client_workstation", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
7.5
null
RHSA-2014:1039
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 6.3.0 security update
RESTEasy: XXE via parameter entities
[ "cpe:/a:redhat:jboss_enterprise_application_platform:6.3" ]
null
null
null
null
RHSA-2005:358
Red Hat Security Advisory: exim security update
pcre heap overflow
[ "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws" ]
null
null
null
null
RHSA-2005:392
Red Hat Security Advisory: HelixPlayer security update
security flaw
[ "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws" ]
null
null
null
null
RHSA-2018:3409
Red Hat Security Advisory: java-1.7.0-openjdk security update
OpenJDK: Incorrect handling of unsigned attributes in signed Jar manifests (Security, 8194534) OpenJDK: Leak of sensitive header data via HTTP redirect (Networking, 8196902) OpenJDK: Incomplete enforcement of the trustURLCodebase restriction (JNDI, 8199177) OpenJDK: Improper field access checks (Hotspot, 8199226) OpenJDK: Missing endpoint identification algorithm check during TLS session resumption (JSSE, 8202613) OpenJDK: Infinite loop in RIFF format reader (Sound, 8205361)
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
5.3
null
RHSA-2022:2265
Red Hat Security Advisory: OpenShift Container Platform 4.6.58 security and extras update
moby: Default inheritable capabilities for linux container should be empty
[ "cpe:/a:redhat:openshift:4.6::el8" ]
null
4.8
null
null
RHSA-2023:3580
Red Hat Security Advisory: .NET 6.0 security, bug fix, and enhancement update
dotnet: Bypass restrictions when deserializing a DataSet or DataTable from XML dotnet: .NET Kestrel: Denial of Service processing X509 Certificates dotnet: vulnerability exists in NuGet where a potential race condition can lead to a symlink attack dotnet: Remote Code Execution - Source generators issue can lead to a crash due to unmanaged heap corruption
[ "cpe:/a:redhat:rhel_dotnet:6.0::el7" ]
null
7.3
null
null
RHSA-2011:1749
Red Hat Security Advisory: libxml2 security and bug fix update
libxml2: Crash (stack frame overflow or NULL pointer dereference) by traversal of XPath axis libxml2: double-free in XPath processing code libxml2: Off-by-one error leading to heap-based buffer overflow in encoding libxml2: Heap-based buffer overflow by adding new namespace node to an existing nodeset or merging nodesets libxml2: double free caused by malformed XPath expression in XSLT libxml2: double-free caused by malformed XPath expression in XSLT
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
null
null
RHSA-2017:0831
Red Hat Security Advisory: JBoss Enterprise Application Platform 7.0.5 on RHEL 6
jboss: jbossas: unsafe chown of server.log in jboss init script allows privilege escalation wildfly: ParseState headerValuesCache can be exploited to fill heap with garbage
[ "cpe:/a:redhat:jboss_enterprise_application_platform:7::el6" ]
null
null
7.5
null
RHSA-2021:3639
Red Hat Security Advisory: nodejs:12 security and bug fix update
c-ares: Missing input validation of host names may lead to domain hijacking libuv: out-of-bounds read in uv__idna_toascii() can lead to information disclosures or crashes nodejs: Use-after-free on close http2 on stream canceling nodejs: Improper handling of untypical characters in domain names nodejs: Incomplete validation of tls rejectUnauthorized parameter nodejs: Use-after-free on close http2 on stream canceling nodejs-path-parse: ReDoS via splitDeviceRe, splitTailRe and splitPathRe nodejs-hosted-git-info: Regular Expression denial of service via shortcutMatch in fromUrl() nodejs-ssri: Regular expression DoS (ReDoS) when parsing malicious SRI in strict mode nodejs-tar: Insufficient symlink protection allowing arbitrary file creation and overwrite nodejs-tar: Insufficient absolute path sanitization allowing arbitrary file creation and overwrite
[ "cpe:/a:redhat:rhel_eus:8.1::appstream" ]
null
8.1
null
null
RHSA-2022:6184
Red Hat Security Advisory: Self Node Remediation Operator 0.4.1 security update
golang: compress/gzip: stack exhaustion in Reader.Read
[ "cpe:/a:redhat:workload_availability_self_node_remediation:0.4::el8" ]
null
7.5
null
null
RHSA-2024:6889
Red Hat Security Advisory: Red Hat build of Keycloak 24.0.8 Images Update
keycloak-saml-core: Improper Verification of SAML Responses Leading to Privilege Escalation in Keycloak Keycloak: Vulnerable Redirect URI Validation Results in Open Redirec
[ "cpe:/a:redhat:build_keycloak:24::el9" ]
null
6.1
null
null
RHSA-2020:3344
Red Hat Security Advisory: thunderbird security update
chromium-browser: Use after free in ANGLE chromium-browser: Inappropriate implementation in WebRTC Mozilla: Potential leak of redirect targets when loading scripts in a worker Mozilla: Memory safety bugs fixed in Firefox 79 and Firefox ESR 68.11
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
8.8
8.8
null
RHSA-2007:1020
Red Hat Security Advisory: cups security and bug fix update
cups boundary error
[ "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::client_workstation", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
RHSA-2010:0398
Red Hat Security Advisory: kernel security and bug fix update
kernel: DoS on x86_64 kernel: OOM/crash in drivers/connector xen: emulator instruction decoding inconsistency kernel: ALSA: hda-intel: Avoid divide by zero crash kernel: dvb-core: DoS bug in ULE decapsulation code
[ "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
RHSA-2024:4000
Red Hat Security Advisory: ghostscript security update
ghostscript: OPVP device arbitrary code execution via custom Driver library
[ "cpe:/a:redhat:enterprise_linux:8::appstream", "cpe:/a:redhat:enterprise_linux:8::crb" ]
null
8.8
null
null
RHSA-2024:2845
Red Hat Security Advisory: kernel security and bug fix update
kernel: netfilter: nftables: exthdr: fix 4-byte stack OOB write kernel: untrusted VMM can trigger int80 syscall handling
[ "cpe:/a:redhat:rhel_eus:9.2::appstream", "cpe:/a:redhat:rhel_eus:9.2::crb", "cpe:/o:redhat:rhel_eus:9.2::baseos" ]
null
5.6
null
null
RHSA-2024:0948
Red Hat Security Advisory: OpenShift Container Platform 4.13.35 security update
golang.org/x/net/http2: avoid quadratic complexity in HPACK decoding
[ "cpe:/a:redhat:openshift:4.13::el8", "cpe:/a:redhat:openshift:4.13::el9" ]
null
7.5
null
null
RHSA-2020:5201
Red Hat Security Advisory: net-snmp security and bug fix update
net-snmp: Improper Privilege Management in EXTEND MIB may lead to privileged commands execution
[ "cpe:/a:redhat:rhel_e4s:8.0::appstream", "cpe:/o:redhat:rhel_e4s:8.0::baseos" ]
null
8.8
null
null
RHSA-2015:1272
Red Hat Security Advisory: kernel security, bug fix, and enhancement update
Kernel: HID: off by one error in various _report_fixup routines Kernel: missing check during hugepage migration Kernel: ALSA: control: protect user controls against races & memory disclosure kernel: x86: espfix(64) bypass via set_thread_area and CLONE_SETTLS kernel: net: mac80211: plain text information leak kernel: buffer overflow in eCryptfs kernel: kvm: insufficient sysenter emulation when invoked from 16-bit code kernel: race condition between chown() and execve()
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
null
null
RHSA-2023:3563
Red Hat Security Advisory: thunderbird security update
Mozilla: Click-jacking certificate exceptions through rendering lag Mozilla: Memory safety bugs fixed in Firefox 114 and Firefox ESR 102.12
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
9.8
null
null
RHSA-2022:0132
Red Hat Security Advisory: firefox security update
Mozilla: Iframe sandbox bypass with XSLT Mozilla: Race condition when playing audio files Mozilla: Heap-buffer-overflow in blendGaussianBlur Mozilla: Missing throttling on external protocol launch dialog Mozilla: Use-after-free of ChannelEventQueue::mOwner Mozilla: Browser window spoof using fullscreen mode Mozilla: Out-of-bounds memory access when inserting text in edit mode Mozilla: Browser window spoof using fullscreen mode Mozilla: Leaking cross-origin URLs through securitypolicyviolation event Mozilla: Crash when handling empty pkcs7 sequence Mozilla: Spoofed origin on external protocol launch dialog Mozilla: Memory safety bugs fixed in Firefox 96 and Firefox ESR 91.5
[ "cpe:/a:redhat:rhel_eus:8.2::appstream" ]
null
8.8
6.1
null
RHSA-2007:0342
Red Hat Security Advisory: ipsec-tools security update
ipsec-tools racoon DoS
[ "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
RHSA-2021:0317
Red Hat Security Advisory: Red Hat JBoss EAP XP 1.0.4.GA release and security update
wildfly: Potential Memory leak in Wildfly when using OpenTracing
[ "cpe:/a:redhat:jbosseapxp" ]
null
5.9
null
null
RHSA-2024:8352
Red Hat Security Advisory: NetworkManager-libreswan:1.2.14 security update
NetworkManager-libreswan: Local privilege escalation via leftupdown
[ "cpe:/a:redhat:rhel_eus:9.2::appstream" ]
null
7.8
null
null
RHSA-2008:0193
Red Hat Security Advisory: lspp-eal4-config-ibm and capp-lspp-eal4-config-hp security update
system-auth-ac is world-writable
[ "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::client_workstation", "cpe:/o:redhat:enterprise_linux:5::hypervisor", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
RHSA-2020:1650
Red Hat Security Advisory: container-tools:rhel8 security, bug fix, and enhancement update
runc: volume mount race condition with shared mounts leads to information leak/integrity manipulation containers/image: Container images read entire image manifest into memory podman: incorrectly allows existing files in volumes to be overwritten by a container when it is created
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
5.9
null
null
RHSA-2024:0095
Red Hat Security Advisory: Red Hat Single Sign-On 7.6.6 security update on RHEL 8
keycloak: LDAP injection on username input keycloak: open redirect via "form_post.jwt" JARM response mode
[ "cpe:/a:redhat:red_hat_single_sign_on:7.6::el8" ]
null
4.6
null
null
RHSA-2022:0294
Red Hat Security Advisory: parfait:0.5 security update
log4j: Remote code execution in Log4j 1.x when application is configured to use JMSAppender log4j: Remote code execution in Log4j 1.x when application is configured to use JMSSink log4j: SQL injection in Log4j 1.x when application is configured to use JDBCAppender log4j: Unsafe deserialization flaw in Chainsaw log viewer
[ "cpe:/a:redhat:rhel_e4s:8.1::appstream" ]
null
8.8
null
null
RHSA-2024:10183
Red Hat Security Advisory: Red Hat Advanced Cluster Management 2.8.8 bug fixes and container updates
elliptic: nodejs/elliptic: EDDSA signature malleability due to missing signature length check elliptic: nodejs/elliptic: ECDSA signature malleability due to missing checks elliptic: nodejs/elliptic: ECDSA implementation malleability due to BER-enconded signatures being allowed elliptic: Missing Validation in Elliptic's EDDSA Signature Verification
[ "cpe:/a:redhat:acm:2.8::el8" ]
null
8.2
null
null
RHSA-2013:1213
Red Hat Security Advisory: gdm security update
gdm: TOCTTOU race condition on /tmp/.X11-unix
[ "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
RHSA-2019:4237
Red Hat Security Advisory: OpenShift Container Platform 4.1.28 openshift-enterprise-builder-container security update
openshift: Container image TLS verification bypass
[ "cpe:/a:redhat:openshift:4.1::el7" ]
null
null
5.7
null
RHSA-2015:1193
Red Hat Security Advisory: xerces-c security update
xerces-c: crashes on malformed input
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
null
null
RHSA-2024:10677
Red Hat Security Advisory: postgresql:13 security update
postgresql: PostgreSQL PL/Perl environment variable changes execute arbitrary code
[ "cpe:/a:redhat:rhel_aus:8.6::appstream", "cpe:/a:redhat:rhel_e4s:8.6::appstream", "cpe:/a:redhat:rhel_tus:8.6::appstream" ]
null
8.8
null
null
RHSA-2025:3216
Red Hat Security Advisory: kernel security update
kernel: arm64: cacheinfo: Avoid out-of-bounds write to cacheinfo array
[ "cpe:/a:redhat:rhel_eus:8.8::crb", "cpe:/o:redhat:rhel_eus:8.8::baseos" ]
null
7
null
null
RHSA-2010:0935
Red Hat Security Advisory: java-1.4.2-ibm security update
krb5: null pointer dereference in GSS-API library leads to DoS (MITKRB5-SA-2010-005) OpenJDK HttpURLConnection incomplete TRACE permission check (6981426)
[ "cpe:/a:redhat:rhel_extras:4", "cpe:/a:redhat:rhel_extras:5::client", "cpe:/a:redhat:rhel_extras:5::server" ]
null
null
null
null
RHBA-2023:7648
Red Hat Bug Fix Advisory: MTV 2.5.3 Images
golang: html/template: improper handling of HTML-like comments within script contexts golang: html/template: improper handling of special tags within script contexts golang: crypto/tls: panic when processing post-handshake message on QUIC connections golang: crypto/tls: lack of a limit on buffered post-handshake opentelemetry: DoS vulnerability in otelhttp
[ "cpe:/a:redhat:migration_toolkit_virtualization:2.5::el8", "cpe:/a:redhat:migration_toolkit_virtualization:2.5::el9" ]
null
7.5
null
null
RHSA-2021:3499
Red Hat Security Advisory: thunderbird security update
Mozilla: Memory safety bugs fixed in Firefox 92, Firefox ESR 78.14 and Firefox ESR 91.1
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
8.8
null
null
RHSA-2017:2911
Red Hat Security Advisory: wpa_supplicant security update
wpa_supplicant: Reinstallation of the pairwise key in the 4-way handshake wpa_supplicant: Reinstallation of the group key in the 4-way handshake wpa_supplicant: Reinstallation of the group key in the group key handshake wpa_supplicant: reinstallation of the group key (GTK) when processing a Wireless Network Management (WNM) Sleep Mode Response frame
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
8.1
null
RHSA-2022:1681
Red Hat Security Advisory: Red Hat Advanced Cluster Management 2.4.4 security updates and bug fixes
vm2: vulnerable to Sandbox Bypass golang.org/x/crypto: empty plaintext packet causes panic follow-redirects: Exposure of Private Personal Information to an Unauthorized Actor node-fetch: exposure of sensitive information to an unauthorized actor follow-redirects: Exposure of Sensitive Information via Authorization Header leak urijs: Authorization Bypass Through User-Controlled Key cross-fetch: Exposure of Private Personal Information to an Unauthorized Actor nconf: Prototype pollution in memory store nats-server: misusing the "dynamically provisioned sandbox accounts" feature authenticated user can obtain the privileges of the System account urijs: Leading white space bypasses protocol validation node-forge: Signature verification leniency in checking `digestAlgorithm` structure can lead to signature forgery node-forge: Signature verification failing to check tailing garbage bytes can lead to signature forgery node-forge: Signature verification leniency in checking `DigestInfo` structure Moment.js: Path traversal in moment.locale
[ "cpe:/a:redhat:acm:2.4::el8" ]
null
7.5
null
null
RHSA-2022:1620
Red Hat Security Advisory: OpenShift Container Platform 4.6.57 packages and security update
haproxy: Denial of service via set-cookie2 header workflow-cps: OS command execution through crafted SCM contents workflow-cps-global-lib: OS command execution through crafted SCM contents workflow-multibranch: OS command execution through crafted SCM contents workflow-cps: Pipeline-related plugins follow symbolic links or do not limit path names workflow-cps-global-lib: Pipeline-related plugins follow symbolic links or do not limit path names workflow-cps-global-lib: Pipeline-related plugins follow symbolic links or do not limit path names workflow-multibranch: Pipeline-related plugins follow symbolic links or do not limit path names workflow-cps: Password parameters are included from the original build in replayed builds workflow-cps-global-lib: Sandbox bypass vulnerability workflow-cps-global-lib: Sandbox bypass vulnerability workflow-cps-global-lib: Sandbox bypass vulnerability pipeline-build-step: Password parameter default values exposed
[ "cpe:/a:redhat:openshift:4.6::el7", "cpe:/a:redhat:openshift:4.6::el8" ]
null
6.5
null
null
RHSA-2018:0315
Red Hat Security Advisory: openstack-aodh security update
openstack-aodh: Aodh can be used to launder Keystone trusts
[ "cpe:/a:redhat:openstack:11::el7" ]
null
null
4.9
null
RHSA-2013:1090
Red Hat Security Advisory: ruby security update
ruby: hostname check bypassing vulnerability in SSL client
[ "cpe:/o:redhat:enterprise_linux:5::server", "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
null
null
RHSA-2022:7279
Red Hat Security Advisory: kernel security and bug fix update
kernel: a use-after-free in cls_route filter implementation may lead to privilege escalation hw: cpu: incomplete clean-up of multi-core shared buffers (aka SBDR) hw: cpu: incomplete clean-up of microarchitectural fill buffers (aka SBDS) hw: cpu: incomplete clean-up in specific special register write operations (aka DRPW)
[ "cpe:/o:redhat:rhel_aus:8.2::baseos", "cpe:/o:redhat:rhel_e4s:8.2::baseos", "cpe:/o:redhat:rhel_tus:8.2::baseos" ]
null
5.5
null
null
RHSA-2020:5342
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.3.4 security update
hibernate-core: SQL injection vulnerability when both hibernate.use_sql_comments and JPQL String literals are used wildfly-openssl: memory leak per HTTP session creation in WildFly OpenSSL jackson-databind: FasterXML DOMDeserializer insecure entity expansion is vulnerable to XML external entity (XXE)
[ "cpe:/a:redhat:jboss_enterprise_application_platform:7.3::el8" ]
null
7.5
null
null
RHBA-2014:1977
Red Hat Bug Fix Advisory: docker bug fix and enhancement update
docker: symbolic and hardlink issues leading to privilege escalation docker: Path traversal and spoofing opportunities presented through image identifiers
[ "cpe:/a:redhat:rhel_extras_other:7" ]
null
null
null
null
RHSA-2014:1327
Red Hat Security Advisory: php security update
gd: NULL pointer dereference in gdImageCreateFromXpm() file: mconvert incorrect handling of truncated pascal string size file: unrestricted regular expression matching file: incomplete fix for CVE-2012-1571 in cdf_read_property_info php: multiple buffer over-reads in php_parserr php: SPL Iterators use-after-free php: ArrayIterator use-after-free due to object change during sorting php: gd extension NUL byte injection in file names
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
null
null
RHSA-2025:3740
Red Hat Security Advisory: Red Hat OpenShift distributed tracing platform (Tempo) 3.5.1 release
tempo-operator: ServiceAccount Token Exposure Leading to Token and Subject Access Reviews in OpenShift Tempo Operator tempo-operator: Tempo Operator Token Exposition lead to read sensitive data golang.org/x/oauth2/jws: Unexpected memory consumption during token parsing in golang.org/x/oauth2/jws github.com/expr-lang/expr: Memory Exhaustion in Expr Parser with Unrestricted Input golang-jwt/jwt: jwt-go allows excessive memory allocation during header parsing
[ "cpe:/a:redhat:openshift_distributed_tracing:3.5::el8" ]
null
7.5
null
null
RHSA-2021:1169
Red Hat Security Advisory: RHV Manager (ovirt-engine) 4.4.z [ovirt-4.4.5] security, bug fix, enhancement
nodejs-bootstrap-select: not escaping title values on <option> may lead to XSS m2crypto: bleichenbacher timing attacks in the RSA decryption API datatables.net: prototype pollution if 'constructor' were used in a data property name nodejs-immer: prototype pollution may lead to DoS or remote code execution
[ "cpe:/a:redhat:rhev_manager:4.4:el8" ]
null
7.5
null
null
RHSA-2025:3530
Red Hat Security Advisory: libgcrypt security update
libgcrypt: vulnerable to Marvin Attack
[ "cpe:/a:redhat:rhel_eus:9.4::appstream", "cpe:/o:redhat:rhel_eus:9.4::baseos" ]
null
5.9
null
null
RHSA-2023:1866
Red Hat Security Advisory: OpenShift Container Platform 4.10.58 security update
jenkins-2-plugins/JUnit: Stored XSS vulnerability in JUnit Plugin jenkins-2-plugins/pipeline-build-step: Stored XSS vulnerability in Pipeline: Build Step Plugin
[ "cpe:/a:redhat:openshift:4.10::el7", "cpe:/a:redhat:openshift:4.10::el8" ]
null
5.4
null
null
RHSA-2017:2704
Red Hat Security Advisory: kernel-rt security update
kernel: stack buffer overflow in the native Bluetooth stack
[ "cpe:/a:redhat:rhel_extras_rt:7" ]
null
null
7.5
null
RHSA-2009:1154
Red Hat Security Advisory: dhcp security update
dhclient: stack overflow leads to arbitrary code execution as root dhcp: insecure temporary file use in the dhcpd init script
[ "cpe:/o:redhat:enterprise_linux:3::as", "cpe:/o:redhat:enterprise_linux:3::desktop", "cpe:/o:redhat:enterprise_linux:3::es", "cpe:/o:redhat:enterprise_linux:3::ws" ]
null
null
null
null
RHSA-2024:1765
Red Hat Security Advisory: OpenShift Container Platform 4.14.21 bug fix and security update
golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487) golang-protobuf: encoding/protojson, internal/encoding/json: infinite loop in protojson.Unmarshal when unmarshaling certain forms of invalid JSON kernel: sched/membarrier: reduce the ability to hammer on sys_membarrier
[ "cpe:/a:redhat:openshift:4.14::el8", "cpe:/a:redhat:openshift:4.14::el9" ]
null
4.7
null
null
RHSA-2008:0389
Red Hat Security Advisory: nss_ldap security and bug fix update
nss_ldap randomly replying with wrong user's data
[ "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
RHSA-2021:4605
Red Hat Security Advisory: firefox security update
Mozilla: iframe sandbox rules did not apply to XSLT stylesheets Mozilla: Use-after-free in file picker dialog Mozilla: Firefox could be coaxed into going into fullscreen mode without notification or warning Mozilla: Opportunistic Encryption in HTTP2 could be used to bypass the Same-Origin-Policy on services hosted on other ports Mozilla: Permission Prompt could be overlaid, resulting in user confusion and potential spoofing Mozilla: Javascript alert box could have been spoofed onto an arbitrary domain Mozilla: Memory safety bugs fixed in Firefox 94 and Firefox ESR 91.3 Mozilla: Use-after-free in HTTP2 Session object
[ "cpe:/a:redhat:rhel_eus:8.2::appstream" ]
null
8.8
6.1
null
RHSA-2014:1167
Red Hat Security Advisory: kernel security and bug fix update
kernel: futex: refcount issue in case of requeue Kernel: netdevice.h: NULL pointer dereference over VxLAN kernel: DoS with syscall auditing kernel: sctp: sk_ack_backlog wrap-around problem
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
null
null
RHSA-2007:0384
Red Hat Security Advisory: krb5 security update
krb5 RPC library unitialized pointer free krb5 RPC library stack overflow krb5 kadmind buffer overflow
[ "cpe:/o:redhat:enterprise_linux:2.1::as", "cpe:/o:redhat:enterprise_linux:2.1::aw", "cpe:/o:redhat:enterprise_linux:2.1::es", "cpe:/o:redhat:enterprise_linux:2.1::ws", "cpe:/o:redhat:enterprise_linux:3::as", "cpe:/o:redhat:enterprise_linux:3::desktop", "cpe:/o:redhat:enterprise_linux:3::es", "cpe:/o:redhat:enterprise_linux:3::ws" ]
null
null
null
null
RHSA-2023:6251
Red Hat Security Advisory: OpenShift Virtualization 4.11.7 Images security and bug fix update
golang.org/x/net/http2: avoid quadratic complexity in HPACK decoding golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487) HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack)
[ "cpe:/a:redhat:container_native_virtualization:4.11::el8" ]
null
7.5
null
null
RHSA-2017:0832
Red Hat Security Advisory: JBoss Enterprise Application Platform 7.0.5 on RHEL 7
jboss: jbossas: unsafe chown of server.log in jboss init script allows privilege escalation wildfly: ParseState headerValuesCache can be exploited to fill heap with garbage
[ "cpe:/a:redhat:jboss_enterprise_application_platform:7::el7" ]
null
null
7.5
null
RHSA-2023:4704
Red Hat Security Advisory: subscription-manager security update
subscription-manager: inadequate authorization of com.redhat.RHSM1 D-Bus interface allows local users to modify configuration
[ "cpe:/a:redhat:rhel_aus:8.4::appstream", "cpe:/a:redhat:rhel_e4s:8.4::appstream", "cpe:/a:redhat:rhel_tus:8.4::appstream", "cpe:/o:redhat:rhel_aus:8.4::baseos", "cpe:/o:redhat:rhel_e4s:8.4::baseos", "cpe:/o:redhat:rhel_tus:8.4::baseos" ]
null
7.8
null
null
RHSA-2024:0626
Red Hat Security Advisory: tigervnc security update
xorg-x11-server: Heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer xorg-x11-server: reattaching to different master device may lead to out-of-bounds memory access xorg-x11-server: heap buffer overflow in XISendDeviceHierarchyEvent xorg-x11-server: heap buffer overflow in DisableDevice
[ "cpe:/a:redhat:rhel_eus:9.2::appstream" ]
null
7.8
null
null
RHSA-2023:0190
Red Hat Security Advisory: java-17-openjdk security update
OpenJDK: handshake DoS attack against DTLS connections (JSSE, 8287411) OpenJDK: soundbank URL remote loading (Sound, 8293742)
[ "cpe:/a:redhat:rhel_eus:8.6::appstream", "cpe:/a:redhat:rhel_eus:8.6::crb" ]
null
3.7
null
null
RHSA-2024:4572
Red Hat Security Advisory: OpenJDK 21.0.4 Security Update for Portable Linux Builds
OpenJDK: potential UTF8 size overflow (8314794) OpenJDK: Excessive symbol length can lead to infinite loop (8319859) OpenJDK: Range Check Elimination (RCE) pre-loop limit overflow (8320548) OpenJDK: Out-of-bounds access in 2D image handling (8324559) OpenJDK: RangeCheckElimination array index overflow (8323231)
[ "cpe:/a:redhat:openjdk:21" ]
null
7.4
null
null
RHSA-2019:4148
Red Hat Security Advisory: thunderbird security update
Mozilla: Buffer overflow in plain text serializer Mozilla: Use-after-free in worker destruction Mozilla: Use-after-free when performing device orientation checks Mozilla: Use-after-free when retrieving a document in antitracking Mozilla: Memory safety bugs fixed in Firefox 71 and Firefox ESR 68.3
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
8.8
null
null
RHSA-2015:2670
Red Hat Security Advisory: Red Hat JBoss BRMS 5.3.1 commons-collections security update
apache-commons-collections: InvokerTransformer code execution during deserialisation
[ "cpe:/a:redhat:jboss_enterprise_brms_platform:5.3" ]
null
null
null
null
RHSA-2025:3590
Red Hat Security Advisory: firefox security update
firefox: thunderbird: Use-after-free triggered by XSLTProcessor firefox: thunderbird: URL Bar Spoofing via non-BMP Unicode characters firefox: thunderbird: Memory safety bugs fixed in Firefox 137, Thunderbird 137, Firefox ESR 128.9, and Thunderbird 128.9
[ "cpe:/a:redhat:rhel_eus:9.4::appstream" ]
null
8.8
null
null
RHSA-2024:11237
Red Hat Security Advisory: libsndfile:1.0.31 security update
libsndfile: Segmentation fault error in ogg_vorbis.c:417 vorbis_analysis_wrote()
[ "cpe:/a:redhat:enterprise_linux:9::appstream", "cpe:/a:redhat:enterprise_linux:9::crb" ]
null
5.5
null
null
RHSA-2023:0600
Red Hat Security Advisory: thunderbird security update
Mozilla: Revocation status of S/Mime signature certificates was not checked
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
7.5
null
null
RHSA-2025:1185
Red Hat Security Advisory: doxygen security update
jquery: Untrusted code execution via <option> tag in HTML passed to DOM manipulation methods
[ "cpe:/a:redhat:rhel_eus:9.2::crb" ]
null
6.1
null
null
RHSA-2024:8032
Red Hat Security Advisory: firefox security update
firefox: Use-after-free in Animation timeline (128.3.1 ESR Chemspill)
[ "cpe:/a:redhat:rhel_e4s:9.0::appstream" ]
null
9.8
null
null
RHSA-2023:7526
Red Hat Security Advisory: tigervnc security update
xorg-x11-server: Out-of-bounds write in XIChangeDeviceProperty/RRChangeOutputProperty
[ "cpe:/a:redhat:rhel_aus:8.4::appstream", "cpe:/a:redhat:rhel_e4s:8.4::appstream", "cpe:/a:redhat:rhel_tus:8.4::appstream" ]
null
7.8
null
null
RHSA-2020:4273
Red Hat Security Advisory: python27 security, bug fix, and enhancement update
python: CRLF injection via the host part of the url passed to urlopen() python: infinite loop in the tarfile module via crafted TAR archive python-pip: directory traversal in _download_http_url() function in src/pip/_internal/download.py python: CRLF injection via HTTP request method in httplib/http.client
[ "cpe:/a:redhat:rhel_software_collections:3::el7" ]
null
6.5
6.5
null
RHSA-2005:108
Red Hat Security Advisory: python security update
security flaw
[ "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws" ]
null
null
null
null
RHSA-2023:0164
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.4 security update
CXF: SSRF Vulnerability
[ "cpe:/a:redhat:jboss_enterprise_application_platform:7.4" ]
null
9.8
null
null
RHSA-2008:0159
Red Hat Security Advisory: dbus security update
dbus security policy circumvention
[ "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::client_workstation", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
RHSA-2018:1369
Red Hat Security Advisory: qemu-kvm-rhev security and bug fix update
QEMU: i386: multiboot OOB access while loading kernel image QEMU: cirrus: OOB access when updating VGA display
[ "cpe:/o:redhat:enterprise_linux:7::hypervisor" ]
null
null
5.5
null
RHSA-2020:2529
Red Hat Security Advisory: tomcat6 security update
tomcat: deserialization flaw in session persistence storage leading to RCE
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
7
null
null
RHSA-2014:1725
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 5.2.0 security update
Java: Java XML Signature DoS Attack
[ "cpe:/a:redhat:jboss_enterprise_application_platform:5.2.0" ]
null
null
null
null
RHSA-2023:1017
Red Hat Security Advisory: Red Hat OpenStack Platform 17.0 (openstack-glance) security update
openstack: Arbitrary file access through custom VMDK flat descriptor
[ "cpe:/a:redhat:openstack:17.0::el9" ]
null
7.7
null
null
RHSA-2011:1301
Red Hat Security Advisory: jbossws-common security update
JBossWS remote Denial of Service
[ "cpe:/a:redhat:jboss_enterprise_application_platform:5::el4", "cpe:/a:redhat:jboss_enterprise_application_platform:5::el5", "cpe:/a:redhat:jboss_enterprise_application_platform:5::el6" ]
null
null
null
null
RHSA-2024:3527
Red Hat Security Advisory: Red Hat AMQ Streams 2.7.0 release and security update
lz4: memory corruption due to an integer overflow bug caused by memmove argument zstd: Race condition allows attacker to access world-readable destination file protobuf-java: timeout in parser leads to DoS zstd: mysql: buffer overrun in util.c apache-commons-text: variable interpolation RCE Apache-Commons-BCEL: arbitrary bytecode produced via out-of-bounds writing json-smart: Uncontrolled Resource Consumption vulnerability in json-smart (Resource Exhaustion) guava: insecure temporary directory creation bouncycastle: potential blind LDAP injection attack using a self-signed certificate bc-java: Out of memory while parsing ASN.1 crafted data in org.bouncycastle.openssl.PEMParser class snappy-java: Missing upper bound check on chunk length in snappy-java can lead to Denial of Service (DoS) impact json-path: stack-based buffer overflow in Criteria.parse method io.vertx/vertx-core: memory leak due to the use of Netty FastThreadLocal data structures in Vertx io.vertx:vertx-core: memory leak when a TCP server is configured with TLS and SNI support quarkus-core: Leak of local configuration properties into Quarkus applications commons-compress: Denial of service caused by an infinite loop for a corrupted DUMP file netty-codec-http: Allocation of Resources Without Limits or Throttling
[ "cpe:/a:redhat:amq_streams:2" ]
null
5.3
null
null
RHSA-2016:1060
Red Hat Security Advisory: postgresql92-postgresql security update
postgresql: case insensitive range handling integer overflow leading to buffer overflow
[ "cpe:/a:redhat:network_satellite:5.7::el6", "cpe:/a:redhat:network_satellite_managed_db:5.7::el6" ]
null
null
null
null
RHSA-2012:0468
Red Hat Security Advisory: libtiff security update
libtiff: Heap-buffer overflow due to TileSize calculation when parsing tiff files
[ "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::client_workstation", "cpe:/o:redhat:enterprise_linux:5::server", "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
null
null
RHSA-2020:4482
Red Hat Security Advisory: libgcrypt security, bug fix, and enhancement update
libgcrypt: ECDSA timing attack allowing private key leak
[ "cpe:/o:redhat:enterprise_linux:8::baseos" ]
null
null
6.3
null
RHSA-2021:0599
Red Hat Security Advisory: redhat-ds:11 security and bug fix update
389-ds-base: information disclosure during the binding of a DN
[ "cpe:/a:redhat:directory_server:11.1::el8" ]
null
5.3
null
null
RHSA-2019:1519
Red Hat Security Advisory: go-toolset:rhel8 security update
golang: CRLF injection in net/http
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
null
5.3
null
RHSA-2024:0724
Red Hat Security Advisory: kernel security and bug fix update
kernel: use-after-free vulnerability in function sco_sock_sendmsg() kernel: improper input validation may lead to privilege escalation kernel: memory leak for large arguments in video_usercopy function in drivers/media/v4l2-core/v4l2-ioctl.c kernel: eBPF verification flaw kernel: smb2_ioctl_query_info NULL pointer dereference kernel: Linux ebpf logic vulnerability leads to critical memory read and write gaining root privileges kernel: NULL pointer dereference in udf_expand_file_adinicbdue() during writeback kernel: possible race condition in drivers/tty/tty_buffers.c kernel: buffer overflow in nft_set_desc_concat_parse() kernel: nf_tables cross-table potential use-after-free may lead to local privilege escalation kernel: netfilter: nf_conntrack_irc message handling issue kernel: memory leak in ipv6_renew_options() kernel: nfp: use-after-free in area_cache_get() kernel: data races around icsk->icsk_af_ops in do_ipv6_setsockopt kernel: Rate limit overflow messages in r8152 in intr_callback kernel: memory leak in l2cap_recv_acldata of the file net/bluetooth/l2cap_core.c kernel: denial of service in follow_page_pte in mm/gup.c due to poisoned pte entry kernel: Double-free in split_2MB_gtt_entry when function intel_gvt_dma_map_guest_page failed kernel: possible to use the debugger to write zero into a location of choice kernel: local privileges escalation in kernel/bpf/verifier.c kernel: nfs_atomic_open() returns uninitialized data instead of ENOTDIR kernel: Executable Space Protection Bypass kernel: double free in usb_8dev_start_xmit in drivers/net/can/usb/usb_8dev.c kernel: double free in ems_usb_start_xmit in drivers/net/can/usb/ems_usb.c kernel: use after free in SUNRPC subsystem kernel: DoS in nfqnl_mangle in net/netfilter/nfnetlink_queue.c kernel: TLB flush operations are mishandled in certain KVM_VCPU_PREEMPTED leading to guest malfunctioning kernel: memory leak in ttusb_dec_exit_dvb() in media/usb/ttusb-dec/ttusb_dec.c kernel: speculative pointer dereference in do_prlimit() in kernel/sys.c kernel: net/tls: tls_is_tx_ready() checked list_entry kernel: ovl: fix use after free in struct ovl_aio_req kernel: Use after free bug in btsdio_remove due to race condition kernel: NULL pointer dereference in can_rcv_filter kernel: Slab-out-of-bound read in compare_netdev_and_ip kernel: Use after free bug in r592_remove kernel: smsusb: use-after-free caused by do_submit_urb() kernel: use-after-free in sch_qfq network scheduler kernel: A heap out-of-bounds write when function perf_read_group is called and sibling_list is smaller than its child's sibling_list kernel: NULL pointer dereference in nvmet_tcp_build_iovec kernel: NULL pointer dereference in nvmet_tcp_execute_request kernel: NULL pointer dereference in __nvmet_req_complete kernel: OOB Access in smb2_dump_detail kernel: inactive elements in nft_pipapo_walk kernel: use-after-free in IPv4 IGMP amd: Return Address Predictor vulnerability leading to information disclosure Kernel: denial of service in atm_tc_enqueue in net/sched/sch_atm.c due to type confusion kernel: Denial of service issue in az6027 driver in drivers/media/usb/dev-usb/az6027.c kernel: lib/seq_buf.c has a seq_buf_putmem_hex buffer overflow kernel: r592: race condition leading to use-after-free in r592_remove() kernel: use-after-free in l2cap_sock_release in net/bluetooth/l2cap_sock.c kernel: drivers/usb/storage/ene_ub6250.c kernel: SEV-ES local priv escalation kernel: ktls overwrites readonly memory pages when using function splice with a ktls socket as destination
[ "cpe:/a:redhat:rhel_eus:8.6::crb", "cpe:/o:redhat:rhel_eus:8.6::baseos", "cpe:/o:redhat:rhev_hypervisor:4.4::el8" ]
null
7
null
null
RHSA-2009:0341
Red Hat Security Advisory: curl security update
curl: local file access via unsafe redirects
[ "cpe:/o:redhat:enterprise_linux:2.1::as", "cpe:/o:redhat:enterprise_linux:2.1::aw", "cpe:/o:redhat:enterprise_linux:2.1::es", "cpe:/o:redhat:enterprise_linux:2.1::ws", "cpe:/o:redhat:enterprise_linux:3::as", "cpe:/o:redhat:enterprise_linux:3::desktop", "cpe:/o:redhat:enterprise_linux:3::es", "cpe:/o:redhat:enterprise_linux:3::ws", "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws", "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::client_workstation", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
RHSA-2014:0496
Red Hat Security Advisory: flash-plugin security update
flash-plugin: use-after-free flaw leads to arbitrary code execution flash-plugin: same origin policy bypass (APSB14-14) flash-plugin: security protection bypass (APSB14-14) flash-plugin: security protection bypass (APSB14-14) flash-plugin: security protection bypass (APSB14-14) flash-plugin: security protection bypass (APSB14-14)
[ "cpe:/a:redhat:rhel_extras:5::client", "cpe:/a:redhat:rhel_extras:5::server", "cpe:/a:redhat:rhel_extras:6" ]
null
null
null
null
RHSA-2007:0244
Red Hat Security Advisory: busybox security update
security flaw
[ "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws" ]
null
null
null
null
RHSA-2024:2081
Red Hat Security Advisory: libreswan security update
libreswan: Missing PreSharedKey for connection can cause crash
[ "cpe:/a:redhat:rhel_eus:8.8::appstream" ]
null
5
null
null
RHSA-2007:0310
Red Hat Security Advisory: openldap security update
security flaw
[ "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws" ]
null
null
null
null
RHSA-2024:8157
Red Hat Security Advisory: kernel security update
kernel: hwmon: (w83792d) Fix NULL pointer dereference by removing unnecessary structure field kernel: Local information disclosure on Intel(R) Atom(R) processors kernel: net/sched: taprio: extend minimum interval restriction to entire cycle too kernel: xfs: fix log recovery buffer allocation for the legacy h_size fixup kernel: firmware: cs_dsp: Use strnlen() on name fields in V1 wmfw files kernel: ibmvnic: Add tx check to prevent skb leak kernel: pinctrl: fix deadlock in create_pinctrl() when handling -EPROBE_DEFER kernel: sched: act_ct: take care of padding in struct zones_ht_key kernel: tipc: Return non-zero value from tipc_udp_addr2str() on error
[ "cpe:/a:redhat:rhel_eus:9.2::appstream", "cpe:/a:redhat:rhel_eus:9.2::crb", "cpe:/o:redhat:rhel_eus:9.2::baseos" ]
null
7.3
null
null
RHSA-2012:0369
Red Hat Security Advisory: python-sqlalchemy security update
python-sqlalchemy: SQL injection flaw due to not checking LIMIT input for correct type
[ "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
null
null
RHSA-2024:4867
Red Hat Security Advisory: Release of openshift-serverless-clients kn 1.33.1 security update and bug fixes
golang: archive/zip: Incorrect handling of certain ZIP files
[ "cpe:/a:redhat:serverless:1.0::el8" ]
null
7.5
null
null
RHSA-2005:767
Red Hat Security Advisory: openldap and nss_ldap security update
security flaw security flaw
[ "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws" ]
null
null
null
null
RHSA-2010:0337
Red Hat Security Advisory: java-1.6.0-sun security update
TLS: MITM attacks via session renegotiation OpenJDK Loader-constraint table allows arrays instead of only the base-classes (6626217) OpenJDK Policy/PolicyFile leak dynamic ProtectionDomains. (6633872) OpenJDK File TOCTOU deserialization vulnerability (6736390) JDK unspecified vulnerability in JWS/Plugin component OpenJDK Inflater/Deflater clone issues (6745393) JDK unspecified vulnerability in JavaWS/Plugin component JDK unspecified vulnerability in JavaWS/Plugin component OpenJDK Unsigned applet can retrieve the dragged information before drop action occurs(6887703) OpenJDK AtomicReferenceArray causes SIGSEGV -> SEGV_MAPERR error (6888149) OpenJDK System.arraycopy unable to reference elements beyond Integer.MAX_VALUE bytes (6892265) OpenJDK Deserialization of RMIConnectionImpl objects should enforce stricter checks (6893947) OpenJDK Subclasses of InetAddress may incorrectly interpret network addresses (6893954) OpenJDK JAR "unpack200" must verify input parameters (6902299) OpenJDK CMM readMabCurveData Buffer Overflow Vulnerability (6899653) JDK multiple unspecified vulnerabilities OpenJDK Applet Trusted Methods Chaining Privilege Escalation Vulnerability (6904691) OpenJDK JPEGImageReader stepX Integer Overflow Vulnerability (6909597) JDK multiple unspecified vulnerabilities JDK multiple unspecified vulnerabilities JDK multiple unspecified vulnerabilities OpenJDK No ClassCastException for HashAttributeSet constructors if run with -Xcomp (6894807) JDK unspecified vulnerability in ImageIO component OpenJDK ImagingLib arbitrary code execution vulnerability (6914866) OpenJDK AWT Library Invalid Index Vulnerability (6914823) JDK unspecified vulnerability in Java2D component
[ "cpe:/a:redhat:rhel_extras:4", "cpe:/a:redhat:rhel_extras:5::client", "cpe:/a:redhat:rhel_extras:5::server" ]
null
null
null
null