id
stringlengths
13
15
title
stringlengths
29
176
description
stringlengths
8
32.1k
cpes
listlengths
0
20
cvss_v4_0
null
cvss_v3_1
float64
0
10
cvss_v3_0
float64
0
10
cvss_v2_0
null
RHSA-2019:1235
Red Hat Security Advisory: ruby security update
rubygems: Escape sequence injection vulnerability in verbose rubygems: Escape sequence injection vulnerability in gem owner rubygems: Escape sequence injection vulnerability in API response handling rubygems: Installing a malicious gem may lead to arbitrary code execution rubygems: Escape sequence injection vulnerability in errors
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
5.3
null
RHSA-2014:0902
Red Hat Security Advisory: java-1.7.0-oracle security update
OpenJDK: Restrict use of privileged annotations (Libraries, 8034985) OpenJDK: Event logger format string vulnerability (Hotspot, 8037076) JDK: unspecified vulnerability fixed in 7u65 and 8u11 (Deployment) OpenJDK: SubjectDelegator protection insufficient (JMX, 8029755) OpenJDK: Incorrect generic signature attribute parsing (Hotspot, 8037076) OpenJDK: Clone interfaces passed to proxy methods (Libraries, 8035009) OpenJDK: Bytecode verification does not prevent ctor calls to this() and super() (Hotspot, 8035119) JDK: unspecified vulnerability fixed in 7u65 and 8u11 (Deployment) OpenJDK: MethodHandles.Lookup insufficient modifiers checks (Libraries, 8035788) OpenJDK: Incorrect handling of invocations with exhausted ranks (Libraries, 8035793) JDK: unspecified vulnerability fixed in 6u81, 7u65 and 8u11 (Deployment) OpenJDK: RSA blinding issues (Security, 8031346) OpenJDK: Prevent instantiation of service with non-public constructor (Security, 8035004) OpenJDK: AtomicReferenceFieldUpdater missing primitive type check (Libraries, 8039520) OpenJDK: insufficient Diffie-Hellman public key validation (Security, 8037162) OpenJDK: Incorrect TLS/EC management (Security, 8031340) JDK: unspecified vulnerability fixed in 6u81, 7u65 and 8u11 (Deployment) OpenJDK: InfoBuilder incorrect return values (Serviceability, 8033301)
[ "cpe:/a:redhat:rhel_extras_oracle_java:5", "cpe:/a:redhat:rhel_extras_oracle_java:6", "cpe:/a:redhat:rhel_extras_oracle_java:7" ]
null
null
null
null
RHSA-2023:1200
Red Hat Security Advisory: gnutls security and bug fix update
gnutls: timing side-channel in the TLS RSA key exchange code
[ "cpe:/a:redhat:rhel_eus:9.0::appstream", "cpe:/o:redhat:rhel_eus:9.0::baseos" ]
null
7.4
null
null
RHSA-2021:2563
Red Hat Security Advisory: kpatch-patch security update
kernel: use-after-free in net/bluetooth/hci_event.c when destroying an hci_chan
[ "cpe:/o:redhat:enterprise_linux:8::baseos" ]
null
7.8
null
null
RHSA-2024:0050
Red Hat Security Advisory: OpenShift Container Platform 4.14.8 bug fix and security update
golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487) opentelemetry: DoS vulnerability in otelhttp
[ "cpe:/a:redhat:openshift:4.14::el8", "cpe:/a:redhat:openshift:4.14::el9" ]
null
7.5
null
null
RHSA-2022:4887
Red Hat Security Advisory: thunderbird security update
Mozilla: Braille space character caused incorrect sender email to be shown for a digitally signed email Mozilla: Cross-Origin resource's length leaked Mozilla: Heap buffer overflow in WebGL Mozilla: Browser window spoof using fullscreen mode Mozilla: Register allocation problem in WASM on arm64 Mozilla: Uninitialized variable leads to invalid memory read Mozilla: Querying a WebAuthn token with a large number of allowCredential entries may have leaked cross-origin information Mozilla: Memory safety bugs fixed in Firefox 101 and Firefox ESR 91.10
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
9.8
6.1
null
RHSA-2020:1503
Red Hat Security Advisory: rh-git218-git security update
git: Crafted URL containing new lines can cause credential leak
[ "cpe:/a:redhat:rhel_software_collections:3::el7" ]
null
7.5
null
null
RHSA-2016:2706
Red Hat Security Advisory: qemu-kvm-rhev security, bug fix, and enhancement update
Qemu: OOB access in address_space_rw leads to segmentation fault Qemu: OOB access in address_space_rw leads to segmentation fault Qemu: net: out of bounds read in net_checksum_calculate()
[ "cpe:/a:redhat:openstack:5::el7" ]
null
null
4.7
null
RHSA-2004:139
Red Hat Security Advisory: apache, openssl security update for Stronghold
security flaw security flaw security flaw security flaw
[ "cpe:/a:redhat:stronghold:4" ]
null
null
null
null
RHBA-2014:1630
Red Hat Bug Fix Advisory: Red Hat OpenShift Enterprise 2.1 jenkins-plugin-openshift bug fix update
jenkins: default markup formatter permits offsite-bound forms (SECURITY-88) Jenkins: insecure storage of passwords in Subversion plugin (SECURITY-58) jenkins: configure a project you do not have access to (SECURITY-55) jenkins: command line interface job creation directory traversal (SECURITY-108) jenkins: session hijacking issue in Winstone (SECURITY-106) jenkins: clear text password disclosure (SECURITY-93) jenkins: user tokens not invalidated correctly (SECURITY-89) jenkins: interface vulnerable to clickjacking attacks (SECURITY-80) jenkins: failed log in attemps revealing if a user is valid or not (SECURITY-79) jenkins: input validation issue (SECURITY-77) jenkins: session fixation issue (SECURITY-75) jenkins: stored cross-site scripting flaw (SECURITY-74) jenkins: information leak via system diagnostic functionalities (SECURITY-73) jenkins: denial of service (SECURITY-87) jenkins: username discovery (SECURITY-110) jenkins: job configuration issues (SECURITY-127, SECURITY-128) jenkins: directory traversal flaw (SECURITY-131) jenkins: remote code execution from slaves (SECURITY-144) jenkins: remote code execution flaw (SECURITY-150) jenkins: plug-in code can be downloaded by anyone with read access (SECURITY-155) jenkins: cross-site scripting flaws in the monitoring plug-in (SECURITY-113) jenkins: cross-site scripting flaw in Jenkins core (SECURITY-143)
[ "cpe:/a:redhat:openshift:2.0::el6" ]
null
null
null
null
RHSA-2022:7978
Red Hat Security Advisory: gimp security and enhancement update
gimp: buffer overflow through a crafted XCF file gimp: unhandled exception via a crafted XCF file may lead to DoS
[ "cpe:/a:redhat:enterprise_linux:9::appstream" ]
null
5.5
null
null
RHSA-2020:1084
Red Hat Security Advisory: samba security, bug fix, and enhancement update
samba: Combination of parameters and permissions can allow user to escape from the share path definition samba: smb client vulnerable to filenames containing path separators
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
5.3
null
RHSA-2022:8852
Red Hat Security Advisory: Red Hat OpenStack Platform 16.2.4 (numpy) security update
numpy: NULL pointer dereference in numpy.sort in in the PyArray_DescrNew() due to missing return-value validation
[ "cpe:/a:redhat:openstack:16.2::el8" ]
null
7.5
null
null
RHSA-2024:1561
Red Hat Security Advisory: Red Hat build of MicroShift 4.15.6 security update
golang-fips/openssl: Memory leaks in code encrypting and decrypting RSA payloads
[ "cpe:/a:redhat:openshift:4.15::el9" ]
null
7.5
null
null
RHSA-2024:4562
Red Hat Security Advisory: OpenJDK 8u422 Security Update for Portable Linux Builds
OpenJDK: potential UTF8 size overflow (8314794) OpenJDK: Excessive symbol length can lead to infinite loop (8319859) OpenJDK: Range Check Elimination (RCE) pre-loop limit overflow (8320548) OpenJDK: Pack200 increase loading time due to improper header validation (8322106) OpenJDK: Out-of-bounds access in 2D image handling (8324559) OpenJDK: RangeCheckElimination array index overflow (8323231)
[ "cpe:/a:redhat:openjdk:1.8" ]
null
7.4
null
null
RHSA-2007:0245
Red Hat Security Advisory: cpio security and bug fix update
cpio large filesize buffer overflow
[ "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws" ]
null
null
null
null
RHSA-2024:6493
Red Hat Security Advisory: Red Hat Single Sign-On 7.6.10 security update on RHEL 7
keycloak: potential bypass of brute force protection keycloak: Leak of configured LDAP bind credentials through the Keycloak admin console wildfly-elytron: org.keycloak/keycloak-services: session fixation in elytron saml adapters
[ "cpe:/a:redhat:red_hat_single_sign_on:7.6::el7" ]
null
7.1
null
null
RHSA-2010:0893
Red Hat Security Advisory: kernel security and bug fix update
kernel: nfsd4: bug in read_buf
[ "cpe:/o:redhat:rhel_eus:5.3" ]
null
null
null
null
RHSA-2024:9680
Red Hat Security Advisory: webkit2gtk3 security update
webkitgtk: Memory corruption issue when processing web content webkitgtk: arbitrary javascript code execution webkitgtk: Processing web content may lead to arbitrary code execution webkitgtk: Arbitrary Remote Code Execution chromium-browser: Use after free in ANGLE webkitgtk: type confusion may lead to arbitrary code execution webkitgtk: Processing web content may lead to arbitrary code execution webkitgtk: Processing web content may lead to arbitrary code execution webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution webkitgtk: webkit2gtk: Use after free may lead to Remote Code Execution webkitgtk: webkit2gtk: Out-of-bounds read was addressed with improved bounds checking webkitgtk: webkit2gtk: Out-of-bounds read was addressed with improved bounds checking webkitgtk: webkit2gtk: Use-after-free was addressed with improved memory management webkitgtk: webkit2gtk: Processing maliciously crafted web content may lead to an unexpected process crash webkitgtk: webkit2gtk: Processing maliciously crafted web content may lead to an unexpected process crash webkitgtk: webkit2gtk: Processing maliciously crafted web content may lead to an unexpected process crash webkit: Processing maliciously crafted web content may lead to memory corruption
[ "cpe:/a:redhat:rhel_aus:8.2::appstream" ]
null
8.8
null
null
RHSA-2014:0678
Red Hat Security Advisory: kernel security update
kernel: pty layer race condition leading to memory corruption
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
null
null
RHSA-2014:1947
Red Hat Security Advisory: rhevm-log-collector security update
ovirt-engine-log-collector: database password disclosed in process listing
[ "cpe:/a:redhat:rhev_manager:3" ]
null
null
null
null
RHSA-2022:5244
Red Hat Security Advisory: expat security update
expat: Stack exhaustion in doctype parsing expat: Integer overflow in copyString()
[ "cpe:/a:redhat:enterprise_linux:9::appstream", "cpe:/o:redhat:enterprise_linux:9::baseos" ]
null
7.5
null
null
RHSA-2019:1661
Red Hat Security Advisory: spacewalk-backend security update
spacewalk: Insecure computation of authentication signatures during user authentication
[ "cpe:/a:redhat:network_satellite:5.8::el6" ]
null
null
4.3
null
RHSA-2024:3717
Red Hat Security Advisory: OpenShift Container Platform 4.17.0 security and extras update
golang-protobuf: encoding/protojson, internal/encoding/json: infinite loop in protojson.Unmarshal when unmarshaling certain forms of invalid JSON
[ "cpe:/a:redhat:openshift:4.17::el8", "cpe:/a:redhat:openshift:4.17::el9" ]
null
5.9
null
null
RHSA-2008:0577
Red Hat Security Advisory: rhpki-common security update
System: incorrect handling of Extensions in CSRs (cs71)
[ "cpe:/a:redhat:certificate_system:7.2" ]
null
null
null
null
RHSA-2004:163
Red Hat Security Advisory: : Updated OpenOffice packages fix security vulnerability in neon
security flaw
[ "cpe:/o:redhat:linux:9" ]
null
null
null
null
RHSA-2015:1694
Red Hat Security Advisory: gdk-pixbuf2 security update
Mozilla: Heap overflow in gdk-pixbuf when scaling bitmap images (MFSA 2015-88)
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation", "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
null
null
RHSA-2024:8122
Red Hat Security Advisory: OpenJDK 11.0.25 Security Update for Portable Linux Builds
giflib: Heap-Buffer Overflow during Image Saving in DumpScreen2RGB Function JDK: HTTP client improper handling of maxHeaderSize (8328286) JDK: Array indexing integer overflow (8328544) JDK: Unbounded allocation leads to out-of-memory error (8331446) JDK: Integer conversion error leads to incorrect range check (8332644)
[ "cpe:/a:redhat:openjdk:11" ]
null
4.8
null
null
RHSA-2021:0299
Red Hat Security Advisory: thunderbird security update
Mozilla: IMAP Response Injection when using STARTTLS Mozilla: HTTPS pages could have been intercepted by a registered service worker when they should not have been Mozilla: Cross-origin information leakage via redirected PDF requests Mozilla: Type confusion when using logical assignment operators in JavaScript switch statements Mozilla: Use-after-poison for incorrectly redeclared JavaScript variables during GC Mozilla: Memory safety bugs fixed in Firefox 85 and Firefox ESR 78.7
[ "cpe:/a:redhat:rhel_eus:8.2::appstream" ]
null
8.8
6.1
null
RHSA-2004:045
Red Hat Security Advisory: gaim security update
security flaw security flaw
[ "cpe:/o:redhat:enterprise_linux:2.1::as", "cpe:/o:redhat:enterprise_linux:2.1::aw", "cpe:/o:redhat:enterprise_linux:2.1::es", "cpe:/o:redhat:enterprise_linux:2.1::ws" ]
null
null
null
null
RHSA-2023:6039
Red Hat Security Advisory: Node Maintenance Operator 5.0.1 security update
golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487) HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack)
[ "cpe:/a:redhat:workload_availability_nmo:5.0::el8" ]
null
7.5
null
null
RHSA-2025:0650
Red Hat Security Advisory: OpenShift Container Platform 4.16.32 bug fix and security update
python: Path traversal on tempfile.TemporaryDirectory runc: file descriptor leak golang.org/x/net/html: Non-linear parsing of case-insensitive content in golang.org/x/net/html
[ "cpe:/a:redhat:openshift:4.16::el9" ]
null
7.5
null
null
RHSA-2017:0864
Red Hat Security Advisory: Red Hat Enterprise Linux 7.1 Extended Update Support Retirement Notice
This is the final notification for the retirement of Red Hat Enterprise Linux 7.1 Extended Update Support (EUS). This notification applies only to those customers subscribed to the Extended Update Support (EUS) channel for Red Hat Enterprise Linux 7.1.
[ "cpe:/o:redhat:rhel_eus:7.1::computenode", "cpe:/o:redhat:rhel_eus:7.1::server" ]
null
null
null
null
RHSA-2014:1795
Red Hat Security Advisory: cups-filters security update
cups-filters: cups-browsed DoS via process_browse_data() OOB read cups-filters: unsupported BrowseAllow value lets cups-browsed accept from all hosts
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
null
null
RHSA-2023:1102
Red Hat Security Advisory: rh-mysql80-mysql security update
mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2022) mysql: Server: Stored Procedure unspecified vulnerability (CPU Oct 2022) mysql: InnoDB unspecified vulnerability (CPU Oct 2022) mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2022) mysql: InnoDB unspecified vulnerability (CPU Oct 2022) mysql: Server: Connection Handling unspecified vulnerability (CPU Oct 2022) mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2022) mysql: Server: Security: Privileges unspecified vulnerability (CPU Oct 2022) mysql: Server: Replication unspecified vulnerability (CPU Oct 2022) mysql: InnoDB unspecified vulnerability (CPU Oct 2022) mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2022) mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2022) mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2022) mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2022) mysql: Server: DML unspecified vulnerability (CPU Jan 2023) mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2023) mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2023) mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2023) mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2023) mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2023) mysql: InnoDB unspecified vulnerability (CPU Jan 2023) mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2023) mysql: InnoDB unspecified vulnerability (CPU Jan 2023) mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2023) mysql: Server: Thread Pooling unspecified vulnerability (CPU Jan 2023) mysql: Server: Security: Encryption unspecified vulnerability (CPU Jan 2023) mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2023) mysql: InnoDB unspecified vulnerability (CPU Jan 2023) mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2023) mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2023) mysql: InnoDB unspecified vulnerability (CPU Jan 2023) mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2023) mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2023) mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2023) mysql: Server: GIS unspecified vulnerability (CPU Jan 2023) mysql: Server: Security: Privileges unspecified vulnerability (CPU Apr 2023) mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2023) mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2023) mysql: Server: Connection Handling unspecified vulnerability (CPU Apr 2023) mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2023) mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2023) mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2023)
[ "cpe:/a:redhat:rhel_software_collections:3::el7" ]
null
4.9
null
null
RHSA-2020:4469
Red Hat Security Advisory: cups security and bug fix update
cups: heap based buffer overflow in libcups's ppdFindOption() in ppd-mark.c
[ "cpe:/a:redhat:enterprise_linux:8::appstream", "cpe:/o:redhat:enterprise_linux:8::baseos" ]
null
4.5
null
null
RHSA-2004:591
Red Hat Security Advisory: squid security update
Squid SNMP DoS
[ "cpe:/o:redhat:enterprise_linux:3::as", "cpe:/o:redhat:enterprise_linux:3::desktop", "cpe:/o:redhat:enterprise_linux:3::es", "cpe:/o:redhat:enterprise_linux:3::ws" ]
null
null
null
null
RHSA-2024:11559
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 8.0.5 Security update
undertow: information leakage via HTTP/2 request header reuse hornetq-core-client: Arbitrarily overwrite files or access sensitive information
[ "cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el8" ]
null
7.1
null
null
RHSA-2021:1511
Red Hat Security Advisory: AMQ Clients 2.9.1 release and security update
netty: Information disclosure via the local system temporary directory netty: possible request smuggling in HTTP/2 due missing validation netty: Request smuggling via content-length header
[ "cpe:/a:redhat:a_mq_clients:2::el7", "cpe:/a:redhat:a_mq_clients:2::el8" ]
null
5.9
null
null
RHSA-2006:0194
Red Hat Security Advisory: gd security update
gd: additional overflows
[ "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws" ]
null
null
null
null
RHSA-2014:0628
Red Hat Security Advisory: openssl security update
openssl: freelist misuse causing a possible use-after-free openssl: Buffer overflow via DTLS invalid fragment openssl: SSL_MODE_RELEASE_BUFFERS NULL pointer dereference in do_ssl3_write() openssl: DoS when sending invalid DTLS handshake openssl: SSL/TLS MITM vulnerability openssl: client-side denial of service when using anonymous ECDH
[ "cpe:/a:redhat:storage:2.1:server:el6" ]
null
null
null
null
RHSA-2023:7260
Red Hat Security Advisory: open-vm-tools security update
open-vm-tools: SAML token signature bypass open-vm-tools: file descriptor hijack vulnerability in the vmware-user-suid-wrapper
[ "cpe:/a:redhat:rhel_e4s:8.1::appstream" ]
null
7.4
null
null
RHSA-2022:6102
Red Hat Security Advisory: OpenShift Container Platform 4.11.1 packages and security update
golang: crypto/tls: session tickets lack random ticket_age_add
[ "cpe:/a:redhat:openshift:4.11::el8" ]
null
3.1
null
null
RHSA-2024:4626
Red Hat Security Advisory: Errata Advisory for Red Hat OpenShift GitOps v1.11.6 security update
golang-protobuf: encoding/protojson, internal/encoding/json: infinite loop in protojson.Unmarshal when unmarshaling certain forms of invalid JSON helm: Dependency management path traversal helm: Missing YAML Content Leads To Panic
[ "cpe:/a:redhat:openshift_gitops:1.11::el8" ]
null
7.5
null
null
RHSA-2017:0837
Red Hat Security Advisory: icoutils security update
icoutils: Check_offset overflow on 64-bit systems icoutils: Access to unallocated memory possible in extract.c icoutils: Integer overflow vulnerability in extract.c icoutils: Buffer overflow in the decode_ne_resource_id function icoutils: Buffer overflow in the extract_icons function icoutils: Buffer overflow in the simple_vec function
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
8.1
null
RHSA-2021:2666
Red Hat Security Advisory: kernel security and bug fix update
kernel: security bypass in certs/blacklist.c and certs/system_keyring.c kernel: use-after-free in net/bluetooth/hci_event.c when destroying an hci_chan
[ "cpe:/a:redhat:rhel_eus:8.1::crb", "cpe:/o:redhat:rhel_eus:8.1::baseos" ]
null
7.8
null
null
RHSA-2024:10977
Red Hat Security Advisory: ruby security update
rexml: REXML ReDoS vulnerability
[ "cpe:/a:redhat:rhel_e4s:9.0::appstream" ]
null
7.5
null
null
RHSA-2022:8139
Red Hat Security Advisory: wavpack security update
wavpack: Heap out-of-bounds read in WavpackPackSamples()
[ "cpe:/a:redhat:enterprise_linux:9::appstream", "cpe:/a:redhat:enterprise_linux:9::crb" ]
null
3.5
null
null
RHSA-2020:4805
Red Hat Security Advisory: edk2 security, bug fix, and enhancement update
edk2: memory leak in ArpOnFrameRcvdDpc
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
null
5.3
null
RHSA-2021:3254
Red Hat Security Advisory: rh-python38 security, bug fix, and enhancement update
python-cryptography: Bleichenbacher timing oracle attack against RSA decryption python: Unsafe use of eval() on data retrieved via HTTP in the test suite python-lxml: mXSS due to the use of improper parser python-jinja2: ReDoS vulnerability in the urlize filter python-cryptography: Large inputs for symmetric encryption can trigger integer overflow leading to buffer overflow python: Stack-based buffer overflow in PyCArg_repr in _ctypes/callproc.c python: Information disclosure via pydoc python-pip: Incorrect handling of unicode separators in git references python: urllib: Regular expression DoS in AbstractBasicAuthHandler python: ftplib should not use the host from the PASV response python-babel: Relative path traversal allows attacker to load arbitrary locale files and execute arbitrary code python: Web cache poisoning via urllib.parse.parse_qsl and urllib.parse.parse_qs by using a semicolon in query parameters python-lxml: Missing input sanitization for formaction HTML5 attributes may lead to XSS python-ipaddress: Improper input validation of octal strings python-urllib3: ReDoS in the parsing of authority part of URL python-babel: Relative path traversal allows attacker to load arbitrary locale files and execute arbitrary code python: urllib.parse does not sanitize URLs containing ASCII newline and tabs
[ "cpe:/a:redhat:rhel_software_collections:3::el7" ]
null
5.3
null
null
RHSA-2014:1148
Red Hat Security Advisory: squid security update
squid: buffer overflow when processing overly long DNS names (SQUID-2013:2) squid: assertion failure in Range header processing (SQUID-2014:2)
[ "cpe:/o:redhat:enterprise_linux:5::client_workstation", "cpe:/o:redhat:enterprise_linux:5::server", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
null
null
RHSA-2019:1482
Red Hat Security Advisory: kernel security update
Kernel: tcp: integer overflow while processing SACK blocks allows remote denial of service Kernel: tcp: excessive resource consumption while processing SACK blocks allows remote denial of service kernel: tcp: excessive resource consumption for TCP connections with low MSS allows remote denial of service
[ "cpe:/o:redhat:rhel_eus:7.5::computenode", "cpe:/o:redhat:rhel_eus:7.5::server" ]
null
null
5.3
null
RHSA-2018:1643
Red Hat Security Advisory: qemu-kvm-rhev security update
hw: cpu: speculative store bypass QEMU: i386: multiboot OOB access while loading kernel image QEMU: cirrus: OOB access when updating VGA display
[ "cpe:/a:redhat:openstack:12::el7" ]
null
null
5.5
null
RHSA-2022:5132
Red Hat Security Advisory: RHACS 3.68 security update
stackrox: Improper sanitization allows users to retrieve Notifier secrets from GraphQL API in plaintext
[ "cpe:/a:redhat:advanced_cluster_security:3.68::el8" ]
null
8.8
null
null
RHSA-2014:1290
Red Hat Security Advisory: Red Hat JBoss BRMS 6.0.3 update
HawtJNI: predictable temporary file name leading to local arbitrary code execution Java: XML eXternal Entity (XXE) flaw in ParserPool and Decrypter jboss-as-server: Unchecked access to MSC Service Registry under JSM EAP6: Plain text password logging during security audit 6: JSM policy not respected by deployed applications Xalan-Java: insufficient constraints in secure processing feature
[ "cpe:/a:redhat:jboss_brms:6.0" ]
null
null
null
null
RHSA-2024:3783
Red Hat Security Advisory: firefox security update
Mozilla: Arbitrary JavaScript execution in PDF.js Mozilla: IndexedDB files retained in private browsing mode Mozilla: Potential permissions request bypass via clickjacking Mozilla: Cross-origin responses could be distinguished between script and non-script content-types Mozilla: Use-after-free could occur when printing to PDF Mozilla: Memory safety bugs fixed in Firefox 126, Firefox ESR 115.11, and Thunderbird 115.11
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
6.1
null
null
RHSA-2025:4226
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.1.10 on RHEL 7 security update
undertow: buffer leak on incoming websocket PONG message may lead to DoS undertow: client side invocation timeout raised when calling over HTTP2 jsoup: Crafted input may cause the jsoup HTML and XML parser to get stuck xml-security: XPath Transform abuse allows for information disclosure xnio: org.xnio.StreamConnection.notifyReadClosed log to debug instead of stderr undertow: Double AJP response for 400 from EAP 7 results in CPING failures undertow: Large AJP request may cause DoS artemis-commons: Apache ActiveMQ Artemis DoS Moment.js: Path traversal in moment.locale com.google.code.gson-gson: Deserialization of Untrusted Data in com.google.code.gson-gson snakeyaml: Denial of Service due to missing nested depth limitation for collections jettison: parser crash by stackoverflow woodstox-core: woodstox to serialise XML data was vulnerable to Denial of Service attacks Undertow: Infinite loop in SslConduit during close undertow: unrestricted request storage leads to memory exhaustion undertow: OutOfMemoryError due to @MultipartConfig handling undertow: Out-of-memory Error after several closed connections with wildfly-http-client protocol
[ "cpe:/a:redhat:jboss_enterprise_application_platform_eus:7.1::el7" ]
null
7.5
null
null
RHSA-2022:1329
Red Hat Security Advisory: OpenShift Virtualization 4.8.5 RPMs security update
golang: net: lookup functions may return invalid host names golang: net/http/httputil: ReverseProxy forwards connection headers if first one is empty golang: math/big.Rat: may cause a panic or an unrecoverable fatal error if passed inputs with very large exponents golang: crypto/tls: certificate of wrong type is causing TLS client to panic
[ "cpe:/a:redhat:container_native_virtualization:4.8::el7", "cpe:/a:redhat:container_native_virtualization:4.8::el8" ]
null
6.5
null
null
RHSA-2011:1161
Red Hat Security Advisory: freetype security update
BSD compress LZW decoder buffer overflow
[ "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws" ]
null
null
null
null
RHSA-2013:1126
Red Hat Security Advisory: Red Hat Enterprise Linux 3 Extended Lifecycle Support 6-Month Notice
This is the 6-Month notification for the retirement of Red Hat Enterprise Linux 3 Extended Lifecycle Support (ELS).
[ "cpe:/o:redhat:rhel_els:3::as", "cpe:/o:redhat:rhel_els:3::es" ]
null
null
null
null
RHSA-2024:4776
Red Hat Security Advisory: cups security update
cups: Cupsd Listen arbitrary chmod 0140777
[ "cpe:/a:redhat:enterprise_linux:9::appstream", "cpe:/o:redhat:enterprise_linux:9::baseos" ]
null
4.4
null
null
RHSA-2023:4708
Red Hat Security Advisory: subscription-manager security update
subscription-manager: inadequate authorization of com.redhat.RHSM1 D-Bus interface allows local users to modify configuration
[ "cpe:/o:redhat:enterprise_linux:9::baseos" ]
null
7.8
null
null
RHSA-2005:377
Red Hat Security Advisory: sharutils security update
security flaw security flaw security flaw
[ "cpe:/o:redhat:enterprise_linux:3::as", "cpe:/o:redhat:enterprise_linux:3::desktop", "cpe:/o:redhat:enterprise_linux:3::es", "cpe:/o:redhat:enterprise_linux:3::ws", "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws" ]
null
null
null
null
RHSA-2024:8359
Red Hat Security Advisory: python39:3.9 and python39-devel:3.9 security update
python: cpython: tarfile: ReDos via excessive backtracking while parsing header values
[ "cpe:/a:redhat:enterprise_linux:8::appstream", "cpe:/a:redhat:enterprise_linux:8::crb" ]
null
7.5
null
null
RHSA-2013:0168
Red Hat Security Advisory: kernel security and bug fix update
kernel: execshield: predictable ascii armour base address kernel: net: acceptation of overlapping ipv6 fragments kernel: xen: Several memory hypercall operations allow invalid extent order values
[ "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
RHSA-2023:5802
Red Hat Security Advisory: Migration Toolkit for Runtimes security update
HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack)
[ "cpe:/a:redhat:migration_toolkit_runtimes:1.0::el8" ]
null
7.5
null
null
RHSA-2021:0993
Red Hat Security Advisory: thunderbird security update
Mozilla: Angle graphics library out of date Mozilla: Texture upload into an unbound backing buffer resulted in an out-of-bound read Mozilla: Internal network hosts could have been probed by a malicious webpage Mozilla: Malicious extensions could have spoofed popup information Mozilla: Memory safety bugs fixed in Firefox 87 and Firefox ESR 78.9
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
8.8
6.1
null
RHSA-2024:6468
Red Hat Security Advisory: httpd:2.4 security update
httpd: Security issues via backend applications whose response headers are malicious or exploitable
[ "cpe:/a:redhat:rhel_aus:8.6::appstream", "cpe:/a:redhat:rhel_e4s:8.6::appstream", "cpe:/a:redhat:rhel_tus:8.6::appstream" ]
null
9.1
null
null
RHSA-2024:6567
Red Hat Security Advisory: kernel security update
kernel: efivarfs: force RO when remounting if SetVariable is not supported kernel: iommufd: Fix missing update of domains_itree after splitting iopt_area kernel: nfsd: fix RELEASE_LOCKOWNER kernel: mm: cachestat: fix folio read-after-free in cache walk kernel: mm/writeback: fix possible divide-by-zero in wb_dirty_limits(), again kernel: Bluetooth: af_bluetooth: Fix deadlock kernel: kprobes/x86: Use copy_from_kernel_nofault() to read from unsafe address kernel: KVM: SVM: Flush pages under kvm->lock to fix UAF in svm_register_enc_region() kernel: mm: cachestat: fix two shmem bugs kernel: x86/coco: Require seeding RNG with RDRAND on CoCo systems kernel: mm/hugetlb: fix missing hugetlb_lock for resv uncharge kernel: regmap: maple: Fix cache corruption in regcache_maple_drop() kernel: net: fix out-of-bounds access in ops_init kernel: net: bridge: mst: fix vlan use-after-free kernel: scsi: qedf: Ensure the copied buf is NUL terminated kernel: usb-storage: alauda: Check whether the media is initialized kernel: xhci: Handle TD clearing for multiple streams case kernel: cxl/region: Fix memregion leaks in devm_cxl_add_region() kernel: net/sched: Fix UAF when resolving a clash kernel: ppp: reject claimed-as-LCP but actually malformed packets kernel: mm: prevent derefencing NULL ptr in pfn_section_valid() kernel: nvme: avoid double free special payload kernel: PCI/MSI: Fix UAF in msi_capability_init kernel: xdp: Remove WARN() from __xdp_reg_mem_model() kernel: x86: stop playing stack games in profile_pc() kernel: Revert "mm/writeback: fix possible divide-by-zero in wb_dirty_limits(), again" kernel: mm: avoid overflows in dirty throttling logic
[ "cpe:/a:redhat:enterprise_linux:9::appstream", "cpe:/a:redhat:enterprise_linux:9::crb", "cpe:/a:redhat:enterprise_linux:9::nfv", "cpe:/a:redhat:enterprise_linux:9::realtime", "cpe:/o:redhat:enterprise_linux:9::baseos" ]
null
4.4
null
null
RHSA-2014:1688
Red Hat Security Advisory: openstack-keystone security and bug fix update
openstack-keystone: denial of service via V3 API authentication chaining openstack-keystone: configuration data information leak through Keystone catalog
[ "cpe:/a:redhat:openstack:4::el6" ]
null
null
null
null
RHSA-2020:3343
Red Hat Security Advisory: thunderbird security update
chromium-browser: Use after free in ANGLE chromium-browser: Inappropriate implementation in WebRTC Mozilla: Potential leak of redirect targets when loading scripts in a worker Mozilla: Memory safety bugs fixed in Firefox 79 and Firefox ESR 68.11
[ "cpe:/a:redhat:rhel_e4s:8.0::appstream" ]
null
8.8
8.8
null
RHSA-2022:6356
Red Hat Security Advisory: open-vm-tools security update
open-vm-tools: local root privilege escalation in the virtual machine
[ "cpe:/a:redhat:rhel_eus:8.4::appstream" ]
null
7
null
null
RHSA-2023:1159
Red Hat Security Advisory: OpenShift Container Platform 4.11.31 security and extras update
goutils: RandomAlphaNumeric and CryptoRandomAlphaNumeric are not as random as they should be
[ "cpe:/a:redhat:openshift:4.11::el8" ]
null
7
null
null
RHSA-2019:1946
Red Hat Security Advisory: kernel security, bug fix, and enhancement update
Kernel: kvm: nVMX: L2 guest could access hardware(L0) CR8 register kernel: net: double-free and memory corruption in get_net_ns_by_id() kernel: dereferencing NULL payload with nonzero length Kernel: speculative bounds check bypass store kernel: stack-based buffer overflow in chap_server_compute_md5() in iscsi target
[ "cpe:/o:redhat:rhel_eus:7.4::computenode", "cpe:/o:redhat:rhel_eus:7.4::server" ]
null
null
7
null
RHSA-2021:3646
Red Hat Security Advisory: OpenShift Container Platform 3.11.524 security and bug fix update
kubernetes: Symlink exchange can allow host filesystem access
[ "cpe:/a:redhat:openshift:3.11::el7" ]
null
8.8
null
null
RHSA-2017:1365
Red Hat Security Advisory: nss security and bug fix update
nss: Null pointer dereference when handling empty SSLv2 messages
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
7.5
null
RHSA-2024:10528
Red Hat Security Advisory: OpenShift Container Platform 4.16.25 bug fix and security update
QEMU: Denial of Service via Improper Synchronization in QEMU NBD Server During Socket Closure pam: Improper Hostname Interpretation in pam_access Leads to Access Control Bypass microcode_ctl: Denial of Service
[ "cpe:/a:redhat:openshift:4.16::el9" ]
null
5.3
7.5
null
RHSA-2022:5162
Red Hat Security Advisory: postgresql security update
postgresql: Autovacuum, REINDEX, and others omit "security restricted operation" sandbox
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
8.8
null
null
RHSA-2018:2253
Red Hat Security Advisory: java-1.8.0-oracle security update
JDK: unspecified vulnerability fixed in 6u201, 7u191, 8u181, and 10.0.2 (Libraries) JDK: unspecified vulnerability fixed in 7u191, 8u181, and 10.0.2 (JavaFX) OpenJDK: insufficient index validation in PatternSyntaxException getMessage() (Concurrency, 8199547) JDK: unspecified vulnerability fixed in 8u181 and 10.0.2 (Deployment) JDK: unspecified vulnerability fixed in 6u201, 7u191, 8u181, and 10.0.2 (JSSE)
[ "cpe:/a:redhat:rhel_extras_oracle_java:7" ]
null
null
5.9
null
RHSA-2008:0180
Red Hat Security Advisory: krb5 security update
krb5: double free in gssapi lib krb5: uninitialized pointer use in krb5kdc krb5: possible leak of sensitive data from krb5kdc using krb4 request
[ "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws" ]
null
null
null
null
RHSA-2023:1303
Red Hat Security Advisory: Red Hat Data Grid 7.3.10 security update
xstream: Arbitrary code execution via unsafe deserialization of sun.tracing.*
[ "cpe:/a:redhat:jboss_data_grid:7.3" ]
null
8.5
null
null
RHSA-2007:1029
Red Hat Security Advisory: xpdf security update
DCTStream:: readProgressiveDataUnit() DCTStream:: reset() CCITTFaxStream:: lookChar()
[ "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws" ]
null
null
null
null
RHSA-2014:1654
Red Hat Security Advisory: rsyslog7 security update
rsyslog: remote syslog PRI vulnerability
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
null
null
RHSA-2013:0769
Red Hat Security Advisory: glibc security and bug fix update
glibc: Buffer overrun (DoS) in regexp matcher by processing multibyte characters glibc: Stack (frame) overflow in getaddrinfo() when processing entry mapping to long list of address structures
[ "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
RHSA-2021:0088
Red Hat Security Advisory: thunderbird security update
Mozilla: Use-after-free write when handling a malicious COOKIE-ECHO SCTP chunk
[ "cpe:/a:redhat:rhel_eus:8.2::appstream" ]
null
null
8.8
null
RHSA-2016:2932
Red Hat Security Advisory: python-XStatic-jquery-ui security update
jquery-ui: cross-site scripting in dialog closeText
[ "cpe:/a:redhat:openstack:8::el7" ]
null
null
6.1
null
RHSA-2012:1181
Red Hat Security Advisory: gimp security update
Gimp: Integer overflow in the PSD image file plugin David Koblas' GIF decoder LZW decoder buffer overflow plug-in): Heap-buffer overflow by decoding certain PSD headers plug-in): heap buffer overflow when loading external palette files plug-in): Heap-based buffer overflow by loading certain GIF images
[ "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::client_workstation", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
RHSA-2018:3829
Red Hat Security Advisory: RHGS WA security and bug fix update
grafana: authentication bypass knowing only a username of an LDAP or OAuth user
[ "cpe:/a:redhat:storage:3.4:na:el7", "cpe:/a:redhat:storage:3.4:wa:el7" ]
null
null
5.5
null
RHSA-2023:4102
Red Hat Security Advisory: bind security update
bind: named's configured cache size limit can be significantly exceeded
[ "cpe:/a:redhat:enterprise_linux:8::appstream", "cpe:/o:redhat:enterprise_linux:8::baseos" ]
null
7.5
null
null
RHSA-2023:7669
Red Hat Security Advisory: Red Hat build of Cryostat 2.4.0: new RHEL 8 container images
vertx-web: StaticHandler disclosure of classpath resources on Windows when mounted on a wildcard route bouncycastle: potential blind LDAP injection attack using a self-signed certificate netty: SniHandler 16MB allocation leads to OOM
[ "cpe:/a:redhat:cryostat:2::el8" ]
null
6.5
null
null
RHSA-2014:1287
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 6.3.1 update
Validator: JSM bypass via ReflectionHelper
[ "cpe:/a:redhat:jboss_enterprise_application_platform:6::el7" ]
null
null
null
null
RHSA-2009:0362
Red Hat Security Advisory: NetworkManager security update
NetworkManager: GetSecrets disclosure
[ "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws" ]
null
null
null
null
RHSA-2016:1609
Red Hat Security Advisory: php security update
PHP: sets environmental variable based on user supplied Proxy request header
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
5
null
RHSA-2019:1024
Red Hat Security Advisory: flatpak security update
flatpak: Sandbox bypass via IOCSTI (incomplete fix for CVE-2017-5226)
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
8.8
null
RHSA-2024:10869
Red Hat Security Advisory: redis:7 security update
redis: Redis SORT_RO may bypass ACL configuration redis: possible bypass of Unix socket permissions on startup redis: Denial-of-service due to malformed ACL selectors in Redis redis: Denial-of-service due to unbounded pattern matching in Redis redis: Lua library commands may lead to stack overflow and RCE in Redis
[ "cpe:/a:redhat:enterprise_linux:9::appstream" ]
null
7
null
null
RHSA-2015:1139
Red Hat Security Advisory: kernel-rt security, bug fix, and enhancement update
Kernel: fs: isofs: infinite loop in CE record entries kernel: use-after-free during key garbage collection kernel: isofs: unchecked printing of ER records kernel: panic while flushing nftables rules that reference deleted chains. kernel: Linux stack ASLR implementation Integer overflow kernel: pipe: iovec overrun leading to memory corruption kernel: int80 fork from 64-bit tasks mishandling
[ "cpe:/a:redhat:rhel_extras_rt:7" ]
null
null
null
null
RHSA-2023:5750
Red Hat Security Advisory: java-17-openjdk security and bug fix update
OpenJDK: memory corruption issue on x86_64 with AVX-512 (8317121) OpenJDK: certificate path validation issue during client authentication (8309966)
[ "cpe:/a:redhat:rhel_eus:8.6::appstream", "cpe:/a:redhat:rhel_eus:8.6::crb" ]
null
5.3
null
null
RHSA-2014:1031
Red Hat Security Advisory: 389-ds-base security update
389-ds: unauthenticated information disclosure
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation", "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
null
null
RHSA-2022:5192
Red Hat Security Advisory: Red Hat OpenShift GitOps security update
argocd: vulnerable to an uncontrolled memory consumption bug argocd: vulnerable to a variety of attacks when an SSO login is initiated from the Argo CD CLI or the UI. argocd: cross-site scripting (XSS) allow a malicious user to inject a javascript link in the UI argocd: vulnerable to a symlink following bug allowing a malicious user with repository write access
[ "cpe:/a:redhat:openshift_gitops:1.3::el8" ]
null
4.3
null
null
RHSA-2024:10953
Red Hat Security Advisory: python36:3.6 security update
virtualenv: potential command injection via virtual environment activation scripts
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
7.8
null
null