id
stringlengths
13
15
title
stringlengths
29
176
description
stringlengths
8
32.1k
cpes
listlengths
0
20
cvss_v4_0
null
cvss_v3_1
float64
0
10
cvss_v3_0
float64
0
10
cvss_v2_0
null
RHSA-2022:8506
Red Hat Security Advisory: Satellite 6.12 Release
netty-codec: Bzip2Decoder doesn't allow setting size restrictions for decompressed data netty-codec: SnappyFrameDecoder doesn't restrict chunk length and may buffer skippable chunks in an unnecessary way django: Possible XSS via '{% debug %}' template tag nokogiri: ReDoS in HTML encoding detection ruby-git: package vulnerable to Command Injection via git argument injection rubygem-nokogiri: Improper Handling of Unexpected Data Type in Nokogiri sinatra: path traversal possible outside of public_dir when serving static files rubygem-rails-html-sanitizer: possible xss with certain configurations python-django: Potential SQL injection via Trunc(kind) and Extract(lookup_name) arguments foreman: foreman: OAuth secret exposure via unauthenticated access to the GraphQL API
[ "cpe:/a:redhat:satellite:6.12::el8", "cpe:/a:redhat:satellite_capsule:6.12::el8", "cpe:/a:redhat:satellite_maintenance:6.12::el8", "cpe:/a:redhat:satellite_utils:6.12::el8" ]
null
7.5
null
null
RHSA-2023:7734
Red Hat Security Advisory: kpatch-patch security update
kernel: use-after-free vulnerability in the smb client component kernel: IGB driver inadequate buffer size for frames larger than MTU
[ "cpe:/o:redhat:enterprise_linux:9::baseos" ]
null
7.5
null
null
RHSA-2023:6813
Red Hat Security Advisory: kernel security and bug fix update
kernel: netfilter: NULL pointer dereference in nf_tables due to zeroed list head kernel: net/sched: cls_u32 component reference counter leak if tcf_change_indev() fails kernel: net/sched: cls_fw component can be exploited as result of failure in tcf_change_indev function kernel: tun: bugs for oversize packet when napi frags enabled in tun_napi_alloc_frags
[ "cpe:/o:redhat:rhel_e4s:8.1::baseos" ]
null
7.8
null
null
RHSA-2023:7662
Red Hat Security Advisory: Red Hat OpenShift for Windows Containers 6.0.3 security update
kubernetes: Insufficient input sanitization in in-tree storage plugin leads to privilege escalation on Windows nodes golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487)
[ "cpe:/a:redhat:openshift:4.11::el8" ]
null
7.5
null
null
RHSA-2023:1402
Red Hat Security Advisory: thunderbird security update
Mozilla: Incorrect code generation during JIT compilation Mozilla: Potential out-of-bounds when accessing throttled streams Mozilla: Invalid downcast in Worklets Mozilla: URL being dragged from a removed cross-origin iframe into the same tab triggered navigation Mozilla: Memory safety bugs fixed in Firefox 111 and Firefox ESR 102.9
[ "cpe:/a:redhat:rhel_eus:9.0::appstream" ]
null
8.8
null
null
RHSA-2013:0981
Red Hat Security Advisory: firefox security update
Mozilla: Miscellaneous memory safety hazards (rv:17.0.7) (MFSA 2013-49) Mozilla: Memory corruption found using Address Sanitizer (MFSA 2013-50) Mozilla: Memory corruption found using Address Sanitizer (MFSA 2013-50) Mozilla: Memory corruption found using Address Sanitizer (MFSA 2013-50) Mozilla: Privileged content access and execution via XBL (MFSA 2013-51) Mozilla: Execution of unmapped memory through onreadystatechange event (MFSA 2013-53) Mozilla: Data in the body of XHR HEAD requests leads to CSRF attacks (MFSA 2013-54) Mozilla: SVG filters can lead to information disclosure (MFSA 2013-55) Mozilla: PreserveWrapper has inconsistent behavior (MFSA 2013-56) Mozilla: XrayWrappers can be bypassed to run user defined methods in a privileged context (MFSA 2013-59)
[ "cpe:/o:redhat:enterprise_linux:5::server", "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
null
null
RHSA-2012:1417
Red Hat Security Advisory: Red Hat Enterprise Linux Extended Update Support 6.0 1-Month EOL Notice
This is the 1-Month notification of the End Of Life plans for Red Hat Enterprise Linux Extended Update Support Add-On (EUS) 6.0.
[ "cpe:/o:redhat:rhel_eus:6.0" ]
null
null
null
null
RHSA-2018:2757
Red Hat Security Advisory: 389-ds-base security and bug fix update
389-ds-base: race condition on reference counter leads to DoS using persistent search 389-ds-base: ldapsearch with server side sort allows users to cause a crash 389-ds-base: Server crash through modify command with large DN 389-ds-base: Crash in delete_passwdPolicy when persistent search connections are terminated unexpectedly
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
7.5
null
RHSA-2024:3885
Red Hat Security Advisory: OpenShift Container Platform 4.13.44 bug fix and security update
graphql-go: Denial of service via stack overflow panics golang: net/http, x/net/http2: unlimited number of CONTINUATION frames causes DoS
[ "cpe:/a:redhat:openshift:4.13::el8", "cpe:/a:redhat:openshift:4.13::el9" ]
null
7.5
null
null
RHSA-2024:9442
Red Hat Security Advisory: mingw-glib2 security update
glib2: Signal subscription vulnerabilities
[ "cpe:/a:redhat:enterprise_linux:9::crb" ]
null
3.8
null
null
RHSA-2023:0553
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.4.9 Security update
jquery: Cross-site scripting via cross-domain ajax requests bootstrap: XSS in the data-target attribute nodejs-moment: Regular expression denial of service bootstrap: Cross-site Scripting (XSS) in the collapse data-parent attribute bootstrap: Cross-site Scripting (XSS) in the data-target property of scrollspy bootstrap: Cross-site Scripting (XSS) in the data-container property of tooltip bootstrap: XSS in the tooltip or popover data-template attribute jquery: Prototype pollution in object's prototype leading to denial of service, remote code execution, or property injection jquery: Cross-site scripting due to improper injQuery.htmlPrefilter method jquery: Untrusted code execution via <option> tag in HTML passed to DOM manipulation methods wildfly-elytron: possible timing attacks via use of unsafe comparator jettison: parser crash by stackoverflow jettison: memory exhaustion via user-supplied XML or JSON data woodstox-core: woodstox to serialise XML data was vulnerable to Denial of Service attacks jackson-databind: deep wrapper array nesting wrt UNWRAP_SINGLE_VALUE_ARRAYS jackson-databind: use of deeply nested arrays mina-sshd: Java unsafe deserialization vulnerability jettison: If the value in map is the map's self, the new new JSONObject(map) cause StackOverflowError which may lead to dos CXF: SSRF Vulnerability
[ "cpe:/a:redhat:jboss_enterprise_application_platform:7.4::el8" ]
null
9.8
5.6
null
RHSA-2009:1616
Red Hat Security Advisory: tomcat security update for Red Hat Network Satellite Server
Improve cookie parsing for tomcat5 tomcat request dispatcher information disclosure vulnerability tomcat6 Denial-Of-Service with AJP connection tomcat6 Information disclosure in authentication classes tomcat XML parser information disclosure
[ "cpe:/a:redhat:network_satellite:5.2::el4", "cpe:/a:redhat:network_satellite:5.3::el4" ]
null
null
null
null
RHSA-2021:3631
Red Hat Security Advisory: OpenShift Container Platform 4.8.13 security update
kubernetes: Symlink exchange can allow host filesystem access
[ "cpe:/a:redhat:openshift:4.8::el7", "cpe:/a:redhat:openshift:4.8::el8" ]
null
8.8
null
null
RHSA-2022:0817
Red Hat Security Advisory: firefox security update
expat: Malformed 2- and 3-byte UTF-8 sequences can lead to arbitrary code execution expat: Namespace-separator characters in "xmlns[:prefix]" attribute values can lead to arbitrary code execution expat: Integer overflow in storeRawNames() Mozilla: Use-after-free in text reflows Mozilla: Browser window spoof using fullscreen mode Mozilla: iframe allow-scripts sandbox bypass Mozilla: Temporary files downloaded to /tmp and accessible by other local users Mozilla: Time-of-check time-of-use bug when verifying add-on signatures Mozilla: Use-after-free in XSLT parameter processing Mozilla: Use-after-free in WebGPU IPC Framework
[ "cpe:/a:redhat:rhel_eus:8.4::appstream" ]
null
8.8
7.5
null
RHSA-2024:3497
Red Hat Security Advisory: edk2 security update
edk2: Buffer overflow in the DHCPv6 client via a long Server ID option edk2: Buffer overflow when processing DNS Servers option in a DHCPv6 Advertise message
[ "cpe:/a:redhat:rhel_eus:8.6::appstream" ]
null
8.8
null
null
RHSA-2024:4417
Red Hat Security Advisory: libreswan security update
libreswan: IKEv1 default AH/ESP responder can crash and restart
[ "cpe:/a:redhat:rhel_aus:8.6::appstream", "cpe:/a:redhat:rhel_e4s:8.6::appstream", "cpe:/a:redhat:rhel_tus:8.6::appstream" ]
null
6.5
null
null
RHSA-2022:1439
Red Hat Security Advisory: OpenJDK 11.0.15 security update for Windows Builds
OpenJDK: Unbounded memory allocation when compiling crafted XPath expressions (JAXP, 8270504) OpenJDK: Improper object-to-string conversion in AnnotationInvocationHandler (Libraries, 8277672) OpenJDK: Missing check for negative ObjectIdentifier (Libraries, 8275151) OpenJDK: Defective secure validation in Apache Santuario (Libraries, 8278008) OpenJDK: URI parsing inconsistencies (JNDI, 8278972)
[ "cpe:/a:redhat:openjdk:11::windows" ]
null
5.3
null
null
RHSA-2023:3325
Red Hat Security Advisory: Multicluster Engine for Kubernetes 2.1.7 security fixes and container updates
vm2: Inspect Manipulation vm2: Sandbox Escape
[ "cpe:/a:redhat:multicluster_engine:2.1::el8" ]
null
9.8
null
null
RHSA-2015:0236
Red Hat Security Advisory: Red Hat JBoss Fuse/A-MQ 6.1.0 security and bug fix update
CXF: Improper security semantics enforcement of SAML SubjectConfirmation methods Framework: directory traversal flaw
[ "cpe:/a:redhat:jboss_amq:6.1.0", "cpe:/a:redhat:jboss_fuse:6.1.0" ]
null
null
null
null
RHSA-2023:3278
Red Hat Security Advisory: kpatch-patch security update
kernel: use-after-free caused by l2cap_reassemble_sdu() in net/bluetooth/l2cap_core.c
[ "cpe:/o:redhat:rhel_e4s:7.7::server" ]
null
7.1
null
null
RHSA-2020:2966
Red Hat Security Advisory: thunderbird security update
Mozilla: Information disclosure due to manipulated URL object Mozilla: Use-after-free in nsGlobalWindowInner Mozilla: Use-After-Free when trying to connect to a STUN server Mozilla: Add-On updates did not respect the same certificate trust rules as software updates Mozilla: Automatic account setup leaks Microsoft Exchange login credentials
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
5.9
6.1
null
RHSA-2024:1464
Red Hat Security Advisory: OpenShift Container Platform 4.11.59 bug fix and security update
golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487)
[ "cpe:/a:redhat:openshift:4.11::el8" ]
null
7.5
null
null
RHSA-2020:0574
Red Hat Security Advisory: thunderbird security update
Mozilla: Message ID calculation was based on uninitialized data Mozilla: Out-of-bounds read when processing certain email messages Mozilla: Setting a master password post-Thunderbird 52 does not delete unencrypted previously stored passwords Mozilla: Crash processing S/MIME messages with multiple signatures Mozilla: Incorrect parsing of template tag could result in JavaScript injection Mozilla: Memory safety bugs fixed in Firefox 73 and Firefox ESR 68.5
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
8.8
6.1
null
RHSA-2013:0550
Red Hat Security Advisory: bind security and enhancement update
bind: denial of service when processing queries and with both DNS64 and RPZ enabled
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
null
null
RHSA-2018:3761
Red Hat Security Advisory: ghostscript security and bug fix update
ghostscript: incomplete fix for CVE-2018-16509
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
7.3
null
RHSA-2020:5388
Red Hat Security Advisory: Red Hat support for Spring Boot 2.2.11 security update
tomcat: specially crafted sequence of HTTP/2 requests can lead to DoS hibernate-core: SQL injection vulnerability when both hibernate.use_sql_comments and JPQL String literals are used
[ "cpe:/a:redhat:openshift_application_runtimes:1.0" ]
null
7.4
null
null
RHSA-2023:4139
Red Hat Security Advisory: curl security update
curl: POST following PUT confusion curl: HTTP multi-header compression denial of service
[ "cpe:/a:redhat:rhel_eus:9.0::appstream", "cpe:/o:redhat:rhel_eus:9.0::baseos" ]
null
6.5
null
null
RHSA-2023:3269
Red Hat Security Advisory: devtoolset-12-binutils security update
libiberty: Heap/stack buffer overflow in the dlang_lname function in d-demangle.c binutils: NULL pointer dereference in _bfd_elf_get_symbol_version_string leads to segfault
[ "cpe:/a:redhat:rhel_software_collections:3::el7" ]
null
5.5
null
null
RHSA-2016:0997
Red Hat Security Advisory: qemu-kvm security update
qemu: incorrect banked access bounds checking in vga module
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
7.6
null
RHSA-2021:4088
Red Hat Security Advisory: kernel-rt security and bug fix update
kernel: use-after-free in drivers/infiniband/core/ucma.c ctx use-after-free kernel: out-of-bounds write due to a heap buffer overflow in __hidinput_change_resolution_multipliers() of hid-input.c kernel: SVM nested virtualization issue in KVM (VMLOAD/VMSAVE)
[ "cpe:/a:redhat:enterprise_linux:8::nfv", "cpe:/a:redhat:enterprise_linux:8::realtime" ]
null
8.8
null
null
RHSA-2011:0299
Red Hat Security Advisory: java-1.4.2-ibm-sap security update
JDK Double.parseDouble Denial-Of-Service
[ "cpe:/a:redhat:rhel_extras_sap:4", "cpe:/a:redhat:rhel_extras_sap:5" ]
null
null
null
null
RHSA-2013:1076
Red Hat Security Advisory: rhev-hypervisor6 security and bug fix update
gnutls: out of bounds read in _gnutls_ciphertext2compressed (GNUTLS-SA-2013-2)
[ "cpe:/o:redhat:enterprise_linux:6::hypervisor" ]
null
null
null
null
RHSA-2010:0758
Red Hat Security Advisory: kernel-rt security and bug fix update
kernel: do_io_submit() infoleak kernel: 64-bit Compatibility Mode Stack Pointer Underflow
[ "cpe:/a:redhat:enterprise_mrg:1::el5" ]
null
null
null
null
RHSA-2022:5564
Red Hat Security Advisory: kernel security, bug fix, and enhancement update
kernel: race condition in perf_event_open leads to privilege escalation
[ "cpe:/a:redhat:enterprise_linux:8::crb", "cpe:/o:redhat:enterprise_linux:8::baseos", "cpe:/o:redhat:rhev_hypervisor:4.4::el8" ]
null
7.4
null
null
RHSA-2005:010
Red Hat Security Advisory: vim security update
security flaw
[ "cpe:/o:redhat:enterprise_linux:3::as", "cpe:/o:redhat:enterprise_linux:3::desktop", "cpe:/o:redhat:enterprise_linux:3::es", "cpe:/o:redhat:enterprise_linux:3::ws" ]
null
null
null
null
RHSA-2020:5398
Red Hat Security Advisory: thunderbird security update
Mozilla: Stack overflow due to incorrect parsing of SMTP server response codes
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
8.8
null
null
RHSA-2023:6916
Red Hat Security Advisory: xorg-x11-server security and bug fix update
xorg-x11-server: X.Org Server Overlay Window Use-After-Free Local Privilege Escalation Vulnerability
[ "cpe:/a:redhat:enterprise_linux:8::appstream", "cpe:/a:redhat:enterprise_linux:8::crb" ]
null
7.8
null
null
RHSA-2019:0566
Red Hat Security Advisory: openstack-ceilometer security and bug fix update
openstack-ceilometer: ceilometer-agent prints sensitive data from config files through log files
[ "cpe:/a:redhat:openstack:13::el7" ]
null
null
4
null
RHSA-2014:1041
Red Hat Security Advisory: java-1.7.0-ibm security update
JDK: Java CMS keystore provider potentially allows brute-force private key recovery JDK: Privilege escalation issue JDK: unspecified vulnerability fixed in 7u65 and 8u11 (Deployment) OpenJDK: SubjectDelegator protection insufficient (JMX, 8029755) OpenJDK: Clone interfaces passed to proxy methods (Libraries, 8035009) OpenJDK: Bytecode verification does not prevent ctor calls to this() and super() (Hotspot, 8035119) JDK: unspecified vulnerability fixed in 7u65 and 8u11 (Deployment) OpenJDK: MethodHandles.Lookup insufficient modifiers checks (Libraries, 8035788) JDK: unspecified vulnerability fixed in 6u81, 7u65 and 8u11 (Deployment) OpenJDK: RSA blinding issues (Security, 8031346) OpenJDK: Prevent instantiation of service with non-public constructor (Security, 8035004) OpenJDK: AtomicReferenceFieldUpdater missing primitive type check (Libraries, 8039520) OpenJDK: insufficient Diffie-Hellman public key validation (Security, 8037162) JDK: unspecified vulnerability fixed in 6u81, 7u65 and 8u11 (Deployment) OpenJDK: InfoBuilder incorrect return values (Serviceability, 8033301)
[ "cpe:/a:redhat:rhel_extras:5::client", "cpe:/a:redhat:rhel_extras:5::server", "cpe:/a:redhat:rhel_extras:6" ]
null
null
null
null
RHSA-2025:2997
Red Hat Security Advisory: webkit2gtk3 security update
webkitgtk: out-of-bounds write vulnerability
[ "cpe:/a:redhat:rhel_eus:9.4::appstream" ]
null
7.5
null
null
RHSA-2023:6570
Red Hat Security Advisory: tomcat security and bug fix update
FileUpload: FileUpload DoS with excessive parts tomcat: not including the secure attribute causes information disclosure tomcat: Fix for CVE-2023-24998 was incomplete
[ "cpe:/a:redhat:enterprise_linux:9::appstream" ]
null
7.5
null
null
RHSA-2021:3837
Red Hat Security Advisory: httpd:2.4 security update
httpd: mod_proxy: SSRF via a crafted request uri-path containing "unix:"
[ "cpe:/a:redhat:rhel_eus:8.1::appstream" ]
null
9
null
null
RHSA-2021:2064
Red Hat Security Advisory: Red Hat Single Sign-On 7.4.7 security update on RHEL 7
keycloak: Internationalized domain name (IDN) homograph attack to impersonate users keycloak: Backchannel logout not working when Principal Type is set to Attribute Name for external SAML IDP
[ "cpe:/a:redhat:red_hat_single_sign_on:7::el7" ]
null
7.1
null
null
RHSA-2016:2575
Red Hat Security Advisory: curl security, bug fix, and enhancement update
curl: TLS session resumption client cert bypass curl: Re-using connection with wrong client cert curl: Incorrect reuse of client certificates
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
4.2
null
RHSA-2025:2481
Red Hat Security Advisory: firefox security update
firefox: AudioIPC StreamData could trigger a use-after-free in the Browser process firefox: Use-after-free in WebTransportChild firefox: Inconsistent comparator in XSLT sorting led to out-of-bounds access firefox: JIT corruption of WASM i32 return values on 64-bit CPUs firefox: Unexpected GC during RegExp bailout processing firefox: Clickjacking the registerProtocolHandler info-bar Reporter firefox: Adding %00 and a fake extension to a jar: URL changed the interpretation of the contents firefox: thunderbird: Memory safety bugs fixed in Firefox 136, Thunderbird 136, Firefox ESR 115.21, Firefox ESR 128.8, and Thunderbird 128.8 firefox: thunderbird: Memory safety bugs fixed in Firefox 136, Thunderbird 136, Firefox ESR 128.8, and Thunderbird 128.8
[ "cpe:/a:redhat:rhel_e4s:9.0::appstream" ]
null
8.8
null
null
RHSA-2021:2693
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.3.8 on RHEL 7 security update
wildfly: XSS via admin console when creating roles in domain mode netty: Request smuggling via content-length header
[ "cpe:/a:redhat:jboss_enterprise_application_platform:7.3::el7" ]
null
5.9
null
null
RHSA-2013:1778
Red Hat Security Advisory: gimp security update
plug-in): Stack-based buffer overflow when loading XWD file gimp: xwd plugin g_new() integer overflow gimp: XWD plugin color map heap-based buffer overflow
[ "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::client_workstation", "cpe:/o:redhat:enterprise_linux:5::server", "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
null
null
RHSA-2023:0552
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.4.9 Security update
jquery: Cross-site scripting via cross-domain ajax requests bootstrap: XSS in the data-target attribute nodejs-moment: Regular expression denial of service bootstrap: Cross-site Scripting (XSS) in the collapse data-parent attribute bootstrap: Cross-site Scripting (XSS) in the data-target property of scrollspy bootstrap: Cross-site Scripting (XSS) in the data-container property of tooltip bootstrap: XSS in the tooltip or popover data-template attribute jquery: Prototype pollution in object's prototype leading to denial of service, remote code execution, or property injection jquery: Cross-site scripting due to improper injQuery.htmlPrefilter method jquery: Untrusted code execution via <option> tag in HTML passed to DOM manipulation methods wildfly-elytron: possible timing attacks via use of unsafe comparator jettison: parser crash by stackoverflow jettison: memory exhaustion via user-supplied XML or JSON data woodstox-core: woodstox to serialise XML data was vulnerable to Denial of Service attacks jackson-databind: deep wrapper array nesting wrt UNWRAP_SINGLE_VALUE_ARRAYS jackson-databind: use of deeply nested arrays mina-sshd: Java unsafe deserialization vulnerability jettison: If the value in map is the map's self, the new new JSONObject(map) cause StackOverflowError which may lead to dos CXF: SSRF Vulnerability
[ "cpe:/a:redhat:jboss_enterprise_application_platform:7.4::el7" ]
null
9.8
5.6
null
RHSA-2011:1815
Red Hat Security Advisory: icu security update
icu: Stack-based buffer overflow by canonicalizing the given localeID
[ "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::client_workstation", "cpe:/o:redhat:enterprise_linux:5::server", "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
null
null
RHSA-2021:4222
Red Hat Security Advisory: container-tools:3.0 security and bug fix update
buildah: Host environment variables leaked in build container when using chroot isolation
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
5.6
null
null
RHSA-2024:0623
Red Hat Security Advisory: thunderbird security update
Mozilla: Out of bounds write in ANGLE Mozilla: Failure to update user input timestamp Mozilla: Crash when listing printers on Linux Mozilla: Bypass of Content Security Policy when directive unsafe-inline was set Mozilla: Phishing site popup could show local origin in address bar Mozilla: Potential permissions request bypass via clickjacking Mozilla: Privilege escalation through devtools Mozilla: HSTS policy on subdomain could bypass policy of upper domain Mozilla: Memory safety bugs fixed in Firefox 122, Firefox ESR 115.7, and Thunderbird 115.7
[ "cpe:/a:redhat:rhel_eus:8.6::appstream" ]
null
8.8
null
null
RHSA-2021:3585
Red Hat Security Advisory: go-toolset:rhel8 security update
golang: net: incorrect parsing of extraneous zero characters at the beginning of an IP address octet
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
7.3
null
null
RHSA-2023:0397
Red Hat Security Advisory: sssd security update
sssd: libsss_certmap fails to sanitise certificate data used in LDAP filters
[ "cpe:/o:redhat:rhel_aus:8.2::baseos", "cpe:/o:redhat:rhel_e4s:8.2::baseos", "cpe:/o:redhat:rhel_tus:8.2::baseos" ]
null
8.8
null
null
RHSA-2019:0774
Red Hat Security Advisory: java-1.8.0-openjdk security and bug fix update
OpenJDK: Slow conversion of BigDecimal to long (Libraries, 8211936) OpenJDK: Incorrect skeleton selection in RMI registry server-side dispatch handling (RMI, 8218453) OpenJDK: Font layout engine out of bounds access setCurrGlyphID() (2D, 8219022)
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
7.5
null
RHSA-2017:2029
Red Hat Security Advisory: openssh security, bug fix, and enhancement update
openssh: User enumeration via covert timing channel openssh: Denial of service via very long passwords openssh: loading of untrusted PKCS#11 modules in ssh-agent openssh: Leak of host private key material to privilege-separated child process via realloc() openssh: Bounds check can be evaded in the shared memory manager used by pre-authentication compression support openssh: Out of sequence NEWKEYS message can allow remote attacker to cause denial of service
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
5.3
null
RHSA-2015:0217
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 6.3.3 update
Security: Wrong security context loaded when using SAML2 STS Login Module RESTeasy: External entities expanded by DocumentProvider Management: Limited RBAC authorization bypass Subsystem: Information disclosure via incorrect sensitivity classification of attribute Weld: Limited information disclosure via stale thread state
[ "cpe:/a:redhat:jboss_enterprise_application_platform:6::el6" ]
null
null
null
null
RHSA-2023:4025
Red Hat Security Advisory: Red Hat OpenShift support for Windows Containers 7.1.0 [security update]
containerd: Supplementary groups are not set up properly
[ "cpe:/a:redhat:openshift:4.12::el8" ]
null
7.3
null
null
RHSA-2024:6406
Red Hat Security Advisory: OpenShift Container Platform 4.14.36 security update
opentelemetry: DoS vulnerability in otelhttp golang: net/http, x/net/http2: unlimited number of CONTINUATION frames causes DoS opentelemetry-go-contrib: DoS vulnerability in otelgrpc due to unbound cardinality metrics ssh: Prefix truncation attack on Binary Packet Protocol (BPP) coredns: CD bit response is cached and served later bind: bind9: BIND's database will be slow if a very large number of RRs exist at the same nam bind9: bind: SIG(0) can be used to exhaust CPU resources bind: bind9: Assertion failure when serving both stale cache data and authoritative zone content go-retryablehttp: url might write sensitive information to log file python-werkzeug: user may execute code on a developer's machine
[ "cpe:/a:redhat:openshift:4.14::el8", "cpe:/a:redhat:openshift:4.14::el9" ]
null
7.5
null
null
RHSA-2019:3673
Red Hat Security Advisory: lldpad security and bug fix update
lldptool: improper sanitization of shell-escape codes
[ "cpe:/o:redhat:enterprise_linux:8::baseos" ]
null
null
4.3
null
RHSA-2023:1326
Red Hat Security Advisory: OpenShift Container Platform 4.13.0 security update
go-yaml: Denial of Service in go-yaml goutils: RandomAlphaNumeric and CryptoRandomAlphaNumeric are not as random as they should be mongo-go-driver: specific cstrings input may not be properly validated golang: out-of-bounds read in golang.org/x/text/language leads to DoS prometheus/client_golang: Denial of service using InstrumentHandlerCounter helm: Denial of service through through repository index file helm: Denial of service through schema file golang: crash in a golang.org/x/crypto/ssh server vault: insufficient certificate revocation list checking golang: net/http: excessive memory growth in a Go server accepting HTTP/2 requests x/net/http2/h2c: request smuggling golang.org/x/net/http2: avoid quadratic complexity in HPACK decoding golang: crypto/tls: large handshake records may cause panics golang: net/http, mime/multipart: denial of service from excessive resource consumption exporter-toolkit: authentication bypass via cache poisoning vault: Vault’s Microsoft SQL Database Storage Backend Vulnerable to SQL Injection Via Configuration File hashicorp/vault: Vault’s PKI Issuer Endpoint Did Not Correctly Authorize Access to Issuer Metadata hashicorp/vault: Cache-Timing Attacks During Seal and Unseal Operations helm: getHostByName Function Information Disclosure containerd: Supplementary groups are not set up properly runc: Rootless runc makes `/sys/fs/cgroup` writable runc: volume mount race condition (regression of CVE-2019-19921) runc: AppArmor can be bypassed when `/proc` inside the container is symlinked with a specific mount configuration baremetal-operator: plain-text username and hashed password readable by anyone having a cluster-wide read-access
[ "cpe:/a:redhat:openshift:4.13::el8", "cpe:/a:redhat:openshift:4.13::el9" ]
null
6
null
null
RHSA-2023:6195
Red Hat Security Advisory: thunderbird security update
Mozilla: Queued up rendering could have allowed websites to clickjack Mozilla: Large WebGL draw could have led to a crash Mozilla: WebExtensions could open arbitrary URLs Mozilla: Improper object tracking during GC in the JavaScript engine could have led to a crash. Mozilla: Memory safety bugs fixed in Firefox 119, Firefox ESR 115.4, and Thunderbird 115.4 Mozilla: Address bar spoofing via bidirectional characters libvpx: crash related to VP9 encoding in libvpx
[ "cpe:/a:redhat:rhel_eus:8.6::appstream" ]
null
7.5
null
null
RHBA-2023:6109
Red Hat Bug Fix Advisory: MTV 2.4.3 Images
golang: net/url: JoinPath does not strip relative path components in all circumstances golang.org/x/net/http2: avoid quadratic complexity in HPACK decoding golang: crypto/tls: large handshake records may cause panics golang: net/http, mime/multipart: denial of service from excessive resource consumption golang.org/x/net/html: Cross site scripting golang: net/http, net/textproto: denial of service from excessive memory allocation golang: net/http, net/textproto, mime/multipart: denial of service from excessive resource consumption golang: go/parser: Infinite loop in parsing golang: html/template: backticks not treated as string delimiters golang: html/template: improper sanitization of CSS values golang: html/template: improper handling of empty HTML attributes golang: crypto/tls: slow verification of certificate chains containing large RSA keys golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487) HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack)
[ "cpe:/a:redhat:migration_toolkit_virtualization:2.4::el8", "cpe:/a:redhat:migration_toolkit_virtualization:2.4::el9" ]
null
7.5
null
null
RHSA-2015:0164
Red Hat Security Advisory: kernel security and bug fix update
kernel: splice: lack of generic write checks
[ "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
RHSA-2023:4076
Red Hat Security Advisory: firefox security update
Mozilla: Use-after-free in WebRTC certificate generation Mozilla: Potential use-after-free from compartment mismatch in SpiderMonkey Mozilla: Fullscreen notification obscured Mozilla: Lack of warning when opening Diagcab files Mozilla: Memory safety bugs fixed in Firefox 115, Firefox ESR 102.13, and Thunderbird 102.13
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
8.8
null
null
RHSA-2016:1612
Red Hat Security Advisory: rh-php56-php security update
PHP: sets environmental variable based on user supplied Proxy request header
[ "cpe:/a:redhat:rhel_software_collections:2::el6", "cpe:/a:redhat:rhel_software_collections:2::el7" ]
null
null
5
null
RHSA-2013:1861
Red Hat Security Advisory: nss security update
Updated nss packages that fix one security issue are now available for Red Hat Enterprise Linux 5 and 6. The Red Hat Security Response Team has rated this update as having moderate security impact.
[ "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::client_workstation", "cpe:/o:redhat:enterprise_linux:5::server", "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
null
null
RHSA-2022:6357
Red Hat Security Advisory: open-vm-tools security update
open-vm-tools: local root privilege escalation in the virtual machine
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
7
null
null
RHSA-2020:4847
Red Hat Security Advisory: pki-core:10.6 and pki-deps:10.6 security, bug fix, and enhancement update
jquery: Cross-site scripting via cross-domain ajax requests bootstrap: XSS in the data-target attribute bootstrap: Cross-site Scripting (XSS) in the collapse data-parent attribute bootstrap: Cross-site Scripting (XSS) in the data-container property of tooltip bootstrap: XSS in the tooltip or popover data-template attribute pki-core: Reflected XSS in 'path length' constraint field in CA's Agent page pki-core/pki-kra: Reflected XSS in recoveryID search field at KRA's DRM agent page in authorize recovery tab pki-core: Reflected XSS in getcookies?url= endpoint in CA jquery: Prototype pollution in object's prototype leading to denial of service, remote code execution, or property injection pki-core: KRA vulnerable to reflected XSS via the getPk12 page tomcat: Mishandling of Transfer-Encoding header allows for HTTP request smuggling tomcat: Apache Tomcat AJP File Read/Inclusion Vulnerability jquery: Cross-site scripting due to improper injQuery.htmlPrefilter method jquery: Untrusted code execution via <option> tag in HTML passed to DOM manipulation methods pki: Dogtag's python client does not validate certificates pki-core: XSS in the certificate search results tomcat: request mixup
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
8.6
5.6
null
RHSA-2023:6492
Red Hat Security Advisory: tang security update
tang: Race condition exists in the key generation and rotation functionality
[ "cpe:/a:redhat:enterprise_linux:9::appstream" ]
null
5.3
null
null
RHSA-2016:2615
Red Hat Security Advisory: bind security update
bind: assertion failure while handling responses containing a DNAME answer
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
7.5
null
RHSA-2023:4624
Red Hat Security Advisory: Red Hat OpenShift Service Mesh Containers for 2.3.6 security update
envoy: OAuth2 credentials exploit with permanent validity envoy: gRPC access log crash caused by the listener draining envoy: CORS filter segfault when origin header is removed envoy: Incorrect handling of HTTP requests and responses with mixed case schemes envoy: HTTP/2 memory leak in nghttp2 codec
[ "cpe:/a:redhat:service_mesh:2.3::el8" ]
null
7.5
null
null
RHSA-2023:7265
Red Hat Security Advisory: open-vm-tools security update
open-vm-tools: SAML token signature bypass open-vm-tools: file descriptor hijack vulnerability in the vmware-user-suid-wrapper
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
7.4
null
null
RHSA-2020:0512
Red Hat Security Advisory: firefox security update
Mozilla: Missing bounds check on shared memory read in the parent process Mozilla: Incorrect parsing of template tag could result in JavaScript injection Mozilla: Memory safety bugs fixed in Firefox 73 and Firefox ESR 68.5
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
8.8
6.1
null
RHSA-2020:3901
Red Hat Security Advisory: libpng security update
libpng: does not check length of chunks against user limit
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
3.7
null
RHSA-2016:1595
Red Hat Security Advisory: python-django security update
django: XSS in admin's add/change related popup
[ "cpe:/a:redhat:openstack:7::el7" ]
null
null
6.1
null
RHSA-2018:3650
Red Hat Security Advisory: ghostscript security update
ghostscript: .tempfile file permission issues (699657) ghostscript: shading_param incomplete type checking (699660) ghostscript: missing type check in type checker (699659) ghostscript: incorrect access checking in temp file handling to disclose contents of files (699658)
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
5.3
null
RHSA-2021:0976
Red Hat Security Advisory: Red Hat Virtualization Host security, bug fix and enhancement update (4.4.4-2)
lldp/openvswitch: denial of service via externally triggered memory leak
[ "cpe:/o:redhat:rhev_hypervisor:4.4::el8" ]
null
7.5
null
null
RHSA-2018:3586
Red Hat Security Advisory: kernel-rt security and bug fix update
kernel: out-of-bounds access in the show_timer function in kernel/time/posix-timers.c kernel: IP fragments with random offsets allow a remote denial of service (FragmentSmack) kernel: mm: use-after-free in do_get_mempolicy function allows local DoS or other unspecified impact kernel: Integer overflow in Linux's create_elf_tables function
[ "cpe:/a:redhat:enterprise_mrg:2:server:el6" ]
null
null
7.8
null
RHSA-2021:3336
Red Hat Security Advisory: sssd security and bug fix update
sssd: shell command injection in sssctl
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
6.7
null
null
RHSA-2015:2522
Red Hat Security Advisory: apache-commons-collections security update
apache-commons-collections: InvokerTransformer code execution during deserialisation
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
null
null
RHSA-2024:1484
Red Hat Security Advisory: firefox security update
nss: timing attack against RSA decryption Mozilla: Crash in NSS TLS method Mozilla: JIT code failed to save return registers on Armv7-A Mozilla: Integer overflow could have led to out of bounds write Mozilla: Improper handling of html and body tags enabled CSP nonce leakage Mozilla: Clickjacking vulnerability could have led to a user accidentally granting permissions Mozilla: Self referencing object could have potentially led to a use-after-free Mozilla: Memory safety bugs fixed in Firefox 124, Firefox ESR 115.9, and Thunderbird 115.9 Mozilla: Improve handling of out-of-memory conditions in ICU Mozilla: Privileged JavaScript Execution via Event Handlers
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
8.8
null
null
RHSA-2023:4464
Red Hat Security Advisory: firefox security update
Mozilla: Offscreen Canvas could have bypassed cross-origin restrictions Mozilla: Incorrect value used during WASM compilation Mozilla: Potential permissions request bypass via clickjacking Mozilla: Crash in DOMParser due to out-of-memory conditions Mozilla: Fix potential race conditions when releasing platform objects Mozilla: Stack buffer overflow in StorageManager Mozilla: Cookie jar overflow caused unexpected cookie jar state Mozilla: Memory safety bugs fixed in Firefox 116, Firefox ESR 115.1, Firefox ESR 102.14, Thunderbird 115.1, and Thunderbird 102.14 Mozilla: Memory safety bugs fixed in Firefox ESR 115.1, and Thunderbird 115.1
[ "cpe:/a:redhat:rhel_e4s:8.1::appstream" ]
null
9.8
null
null
RHSA-2009:0347
Red Hat Security Advisory: JBoss Enterprise Application Platform 4.3.0CP04 update
JBoss EAP unprivileged local xml file access
[ "cpe:/a:redhat:jboss_enterprise_application_platform:4.3.0::el4" ]
null
null
null
null
RHSA-2015:1005
Red Hat Security Advisory: flash-plugin security update
flash-plugin: multiple code execution issues fixed in APSB15-09 flash-plugin: multiple code execution issues fixed in APSB15-09 flash-plugin: security bypass leading to information disclosure (APSB15-09) flash-plugin: multiple code execution issues fixed in APSB15-09 flash-plugin: multiple code execution issues fixed in APSB15-09 flash-plugin: multiple code execution issues fixed in APSB15-09 flash-plugin: multiple code execution issues fixed in APSB15-09 flash-plugin: multiple code execution issues fixed in APSB15-09 flash-plugin: multiple code execution issues fixed in APSB15-09 flash-plugin: multiple code execution issues fixed in APSB15-09 flash-plugin: multiple code execution issues fixed in APSB15-09 flash-plugin: multiple code execution issues fixed in APSB15-09 flash-plugin: multiple code execution issues fixed in APSB15-09 flash-plugin: information leaks leading to ASLR bypass (APSB15-09) flash-plugin: information leaks leading to ASLR bypass (APSB15-09) flash-plugin: multiple code execution issues fixed in APSB15-09
[ "cpe:/a:redhat:rhel_extras:5::client", "cpe:/a:redhat:rhel_extras:5::server", "cpe:/a:redhat:rhel_extras:6" ]
null
null
null
null
RHSA-2022:1360
Red Hat Security Advisory: Red Hat Fuse 7.10.2 release and security update
spring-framework: RCE via Data Binding on JDK 9+
[ "cpe:/a:redhat:jboss_fuse:7" ]
null
8.1
null
null
RHSA-2005:498
Red Hat Security Advisory: spamassassin security update
security flaw
[ "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws" ]
null
null
null
null
RHSA-2018:3221
Red Hat Security Advisory: openssl security, bug fix, and enhancement update
openssl: Malformed X.509 IPAdressFamily could cause OOB read ROHNP: Key Extraction Side Channel in Multiple Crypto Libraries openssl: Malicious server can send large prime to client during DH(E) TLS handshake causing the client to hang openssl: RSA key generation cache timing vulnerability in crypto/rsa/rsa_gen.c allows attackers to recover private keys openssl: Handling of crafted recursive ASN.1 structures can cause a stack overflow and resulting denial of service
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
6.5
null
RHSA-2024:10953
Red Hat Security Advisory: python36:3.6 security update
virtualenv: potential command injection via virtual environment activation scripts
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
7.8
null
null
RHSA-2021:4198
Red Hat Security Advisory: edk2 security, bug fix, and enhancement update
edk2: NULL pointer dereference in AuthenticodeVerify() openssl: integer overflow in CipherUpdate openssl: NULL pointer dereference in X509_issuer_and_serial_hash() edk2: unlimited FV recursion, round 2
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
7.8
null
null
RHSA-2024:1559
Red Hat Security Advisory: OpenShift Container Platform 4.15.6 bug fix and security update
kubevirt-csi: PersistentVolume allows access to HCP's root node golang-protobuf: encoding/protojson, internal/encoding/json: infinite loop in protojson.Unmarshal when unmarshaling certain forms of invalid JSON
[ "cpe:/a:redhat:openshift:4.15::el8", "cpe:/a:redhat:openshift:4.15::el9" ]
null
5.9
null
null
RHSA-2024:3312
Red Hat Security Advisory: glibc security update
glibc: Out of bounds write in iconv may lead to remote code execution glibc: stack-based buffer overflow in netgroup cache glibc: null pointer dereferences after failed netgroup cache insertion glibc: netgroup cache may terminate daemon on memory allocation failure glibc: netgroup cache assumes NSS callback uses in-buffer strings
[ "cpe:/a:redhat:rhel_eus:8.8::appstream", "cpe:/a:redhat:rhel_eus:8.8::crb", "cpe:/o:redhat:rhel_eus:8.8::baseos" ]
null
4
null
null
RHSA-2023:0859
Red Hat Security Advisory: Red Hat Virtualization Host 4.4.z SP 1 security update batch#4 (oVirt-4.5.3-4)
kernel: i915: Incorrect GPU TLB flush can lead to random memory access libksba: integer overflow to code execution sudo: arbitrary file write with privileges of the RunAs user
[ "cpe:/o:redhat:rhev_hypervisor:4.4::el8" ]
null
7.8
null
null
RHSA-2003:317
Red Hat Security Advisory: iproute security update
security flaw
[ "cpe:/o:redhat:enterprise_linux:3::as", "cpe:/o:redhat:enterprise_linux:3::desktop", "cpe:/o:redhat:enterprise_linux:3::es", "cpe:/o:redhat:enterprise_linux:3::ws" ]
null
null
null
null
RHSA-2024:4972
Red Hat Security Advisory: Errata Advisory for Red Hat OpenShift GitOps v1.11.7 security update
argo-cd: Argo CD web terminal session doesn't expire argocd: Unauthenticated Denial of Service (DoS) Vulnerability via /api/webhook Endpoint in Argo CD
[ "cpe:/a:redhat:openshift_gitops:1.11::el8" ]
null
7.5
null
null
RHSA-2015:2684
Red Hat Security Advisory: openstack-nova secuity and bug fix advisory
openstack-nova: network security group changes are not applied to running instances
[ "cpe:/a:redhat:openstack:5::el7" ]
null
null
null
null
RHSA-2024:3120
Red Hat Security Advisory: freeglut security update
freeglut: memory leak via glutAddSubMenu() function freeglut: memory leak via glutAddMenuEntry() function
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
5.3
null
null
RHSA-2024:5601
Red Hat Security Advisory: libreoffice security update
libreoffice: Ability to trust not validated macro signatures removed in high security mode
[ "cpe:/a:redhat:rhel_aus:8.4::appstream", "cpe:/a:redhat:rhel_e4s:8.4::appstream", "cpe:/a:redhat:rhel_tus:8.4::appstream" ]
null
7.8
null
null
RHSA-2020:1308
Red Hat Security Advisory: Red Hat Virtualization Engine security, bug fix 4.3.9
apache-commons-beanutils: does not suppresses the class property in PropertyUtilsBean by default nimbus-jose-jwt: Uncaught exceptions while parsing a JWT
[ "cpe:/a:redhat:rhev_manager:4.3", "cpe:/o:redhat:enterprise_linux:7::hypervisor" ]
null
null
6.5
null
RHSA-2018:3458
Red Hat Security Advisory: thunderbird security update
Mozilla: Proxy bypass using automount and autofs Mozilla: Memory safety bugs fixed in Firefox 62 and Firefox ESR 60.2 Mozilla: Use-after-free in driver timers Mozilla: Use-after-free in IndexedDB Mozilla: Out-of-bounds write with malicious MAR file Mozilla: Setting a master password post-Firefox 58 does not delete unencrypted previously stored passwords Mozilla: Crash in TransportSecurityInfo due to cached data Mozilla: Same-origin policy violation using meta refresh and performance.getEntries to steal cross-origin URLs
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
6.5
null
RHSA-2003:044
Red Hat Security Advisory: : Updated w3m packages fix cross-site scripting issues
security flaw security flaw
[ "cpe:/o:redhat:linux:7.0j", "cpe:/o:redhat:linux:7.2", "cpe:/o:redhat:linux:7.3", "cpe:/o:redhat:linux:8.0" ]
null
null
null
null