id
stringlengths
13
15
title
stringlengths
29
176
description
stringlengths
8
32.1k
cpes
listlengths
0
20
cvss_v4_0
null
cvss_v3_1
float64
0
10
cvss_v3_0
float64
0
10
cvss_v2_0
null
RHSA-2021:4582
Red Hat Security Advisory: Release of components for Service Telemetry Framework 1.3.3 - Container Images
golang: crypto/tls: certificate of wrong type is causing TLS client to panic
[ "cpe:/a:redhat:service_telemetry_framework:1.3::el8" ]
null
6.5
null
null
RHEA-2017:3138
Red Hat Enhancement Advisory: Red Hat Virtualization Manager (ovirt-engine) 4.1.7
ovirt-engine: DEBUG logging includes unmasked passwords
[ "cpe:/a:redhat:rhev_manager:4" ]
null
null
7.2
null
RHSA-2022:6523
Red Hat Security Advisory: .NET Core 3.1 security and bugfix update
dotnet: DenialOfService - ASP.NET Core MVC vulnerable to stack overflow via ModelStateDictionary recursion.
[ "cpe:/a:redhat:enterprise_linux:8::appstream", "cpe:/a:redhat:enterprise_linux:8::crb" ]
null
7.5
null
null
RHSA-2022:8626
Red Hat Security Advisory: OpenShift Container Platform 4.11.17 packages and security update
golang: net/http: improper sanitization of Transfer-Encoding header golang: net/http: handle server errors after sending GOAWAY golang: net/http/httputil: NewSingleHostReverseProxy - omit X-Forwarded-For not working golang: math/big: decoding big.Float and big.Rat types can panic if the encoded message is too short, potentially allowing a denial of service
[ "cpe:/a:redhat:openshift:4.11::el8", "cpe:/a:redhat:openshift_ironic:4.11::el8" ]
null
6.5
null
null
RHSA-2020:2104
Red Hat Security Advisory: kernel-alt security and bug fix update
kernel: out of bounds write in function i2c_smbus_xfer_emulated in drivers/i2c/i2c-core-smbus.c kernel: double free may be caused by the function allocate_trace_buffer in the file kernel/trace/trace.c kernel: out of bounds write in i2c driver leads to local escalation of privilege kernel: null pointer dereference in dlpar_parse_cc_property in arch/powerrc/platforms/pseries/dlpar.c causing denial of service kernel: denial of service in in xfs_setattr_nonsize in fs/xfs/xfs_iops.c kernel: mounting a crafted ext4 filesystem image, performing some operations, and unmounting can lead to a use-after-free in ext4_put_super in fs/ext4/super.c kernel: a malicious USB device in the drivers/input/ff-memless.c leads to use-after-free kernel: use-after-free in __blk_add_trace in kernel/trace/blktrace.c kernel: out-of-bounds read in set_fdc in drivers/block/floppy.c Kernel: NetLabel: null pointer dereference while receiving CIPSO packet with null category may cause kernel panic
[ "cpe:/o:redhat:enterprise_linux:7::server" ]
null
5.9
4.6
null
RHSA-2015:0627
Red Hat Security Advisory: chromium-browser security update
chromium-browser: Out-of-bounds write in skia filters chromium-browser: Out-of-bounds write in skia filters chromium-browser: Out-of-bounds write in skia filters chromium-browser: Use-after-free in v8 bindings chromium-browser: Type confusion in v8 bindings chromium-browser: Use-after-free in dom chromium-browser: Integer overflow in webgl chromium-browser: Use-after-free in gif decoder chromium-browser: Use-after-free in web databases chromium-browser: Use-after-free in service workers chromium-browser: Use-after-free in dom chromium-browser: Out-of-bounds read in vpxdecoder chromium-browser: Out-of-bounds read in pdfium chromium-browser: Validation issue in debugger chromium-browser: Uninitialized value in blink chromium-browser: Uninitialized value in rendering chromium-browser: Cookie injection in proxies chromium-browser: Type confusion in v8 chromium-browser: Various fixes from internal audits, fuzzing and other initiatives. chromium-browser: Out-of-bounds write in media
[ "cpe:/a:redhat:rhel_extras:6" ]
null
null
null
null
RHSA-2015:0535
Red Hat Security Advisory: GNOME Shell security, bug fix, and enhancement update
gnome-shell: lockscreen bypass with printscreen key
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
null
null
RHSA-2011:0616
Red Hat Security Advisory: pidgin security and bug fix update
Pidgin: Multiple NULL pointer dereference flaws in Yahoo protocol plug-in Cipher API information disclosure in pidgin
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
null
null
RHSA-2007:0779
Red Hat Security Advisory: mailman security and bug fix update
mailman logfile CRLF injection
[ "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws" ]
null
null
null
null
RHSA-2023:0197
Red Hat Security Advisory: java-11-openjdk security update
OpenJDK: handshake DoS attack against DTLS connections (JSSE, 8287411) OpenJDK: soundbank URL remote loading (Sound, 8293742)
[ "cpe:/a:redhat:rhel_aus:8.2::appstream", "cpe:/a:redhat:rhel_e4s:8.2::appstream", "cpe:/a:redhat:rhel_tus:8.2::appstream" ]
null
3.7
null
null
RHSA-2013:0198
Red Hat Security Advisory: JBoss Enterprise Web Platform 5.2.0 update
JBoss: twiddle.sh accepts credentials as command line arguments, exposing them to other local users via a process listing jbossws: Prone to character encoding pattern attack (XML Encryption flaw) jbossws: Prone to Bleichenbacher attack against to be distributed symmetric key Framework: Information (internal server information, classpath, local working directories, session IDs) disclosure CSRF on jmx-console allows invocation of operations on mbeans Console: XSS in invoke operation JBoss invoker servlets do not require authentication JGroups diagnostics service enabled by default with no authentication when a JGroups channel is started apache-cxf: Apache CXF does not verify that elements were signed / encrypted by a particular Supporting Token JBoss: CallerIdentityLoginModule retaining password from previous call if a null password is provided JBoss: SecurityAssociation.getCredential() will return the previous credential if no security context is provided Web: Bypass of security constraints JBoss: AuthorizationInterceptor allows JMX operation to proceed despite authorization failure
[ "cpe:/a:redhat:jboss_enterprise_web_platform:5.2" ]
null
null
null
null
RHSA-2024:9572
Red Hat Security Advisory: libsoup security update
libsoup: HTTP request smuggling via stripping null bytes from the ends of header names
[ "cpe:/a:redhat:rhel_eus:9.4::appstream" ]
null
7.5
null
null
RHSA-2025:1659
Red Hat Security Advisory: kernel security update
kernel: mm: migrate: fix getting incorrect page mapping during page migration
[ "cpe:/a:redhat:enterprise_linux:9::appstream", "cpe:/a:redhat:enterprise_linux:9::crb", "cpe:/a:redhat:enterprise_linux:9::nfv", "cpe:/a:redhat:enterprise_linux:9::realtime", "cpe:/o:redhat:enterprise_linux:9::baseos" ]
null
5.5
null
null
RHSA-2019:2977
Red Hat Security Advisory: bind security update
bind: Limiting simultaneous TCP clients is ineffective
[ "cpe:/o:redhat:rhel_eus:7.5::computenode", "cpe:/o:redhat:rhel_eus:7.5::server" ]
null
null
8.6
null
RHBA-2022:1352
Red Hat Bug Fix Advisory: .NET Core 3.1 on RHEL 7 bugfix update
urijs: Authorization Bypass Through User-Controlled Key
[ "cpe:/a:redhat:rhel_dotnet:3.1::el7" ]
null
6.5
null
null
RHSA-2024:4247
Red Hat Security Advisory: libuv security update
libuv: Improper Domain Lookup that potentially leads to SSRF attacks
[ "cpe:/a:redhat:enterprise_linux:8::appstream", "cpe:/a:redhat:enterprise_linux:8::crb" ]
null
7.3
null
null
RHSA-2005:405
Red Hat Security Advisory: PHP security update
security flaw security flaw security flaw security flaw security flaw
[ "cpe:/o:redhat:enterprise_linux:3::as", "cpe:/o:redhat:enterprise_linux:3::desktop", "cpe:/o:redhat:enterprise_linux:3::es", "cpe:/o:redhat:enterprise_linux:3::ws" ]
null
null
null
null
RHBA-2019:0763
Red Hat Bug Fix Advisory: redhat-virtualization-host security update
python: Information Disclosure due to urlsplit improper NFKC normalization
[ "cpe:/o:redhat:enterprise_linux:7::hypervisor" ]
null
null
9.8
null
RHSA-2023:7277
Red Hat Security Advisory: open-vm-tools security update
open-vm-tools: SAML token signature bypass open-vm-tools: file descriptor hijack vulnerability in the vmware-user-suid-wrapper
[ "cpe:/a:redhat:enterprise_linux:9::appstream" ]
null
7.4
null
null
RHSA-2020:0005
Red Hat Security Advisory: chromium-browser security update
chromium-browser: Use after free in media picker
[ "cpe:/a:redhat:rhel_extras:6" ]
null
null
8.8
null
RHSA-2022:5163
Red Hat Security Advisory: httpd:2.4 security update
httpd: mod_proxy NULL pointer dereference
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
7.5
null
null
RHSA-2020:0806
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.2.7 on RHEL 8 security update
thrift: Endless loop when feed with specific input data thrift: Out-of-bounds read related to TJSONProtocol or TSimpleJSONProtocol apache-commons-beanutils: does not suppresses the class property in PropertyUtilsBean by default xml-security: Apache Santuario potentially loads XML parsing code from an untrusted source wildfly: The 'enabled-protocols' value in legacy security is not respected if OpenSSL security provider is in use netty: HTTP request smuggling netty: HttpObjectDecoder.java allows Content-Length header to accompanied by second Content-Length header netty: HTTP Request Smuggling due to Transfer-Encoding whitespace mishandling
[ "cpe:/a:redhat:jboss_enterprise_application_platform:7.2::el8" ]
null
7.5
7.4
null
RHSA-2008:0537
Red Hat Security Advisory: openoffice.org security update
OpenOffice.org overflow possible on allocation
[ "cpe:/a:redhat:rhel_productivity:5", "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws", "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::client_workstation" ]
null
null
null
null
RHSA-2019:3744
Red Hat Security Advisory: ansible security update
Ansible: path traversal in the fetch module ansible: unsafe template evaluation of returned module data can lead to information disclosure Ansible: disclosure data when prompted for password and template characters are passed
[ "cpe:/a:redhat:openstack:14::el7" ]
null
null
6.4
null
RHSA-2020:1931
Red Hat Security Advisory: container-tools:2.0 security update
buildah: Crafted input tar file may lead to local file overwrite during image build process
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
8.8
null
null
RHSA-2023:0284
Red Hat Security Advisory: sudo security update
sudo: arbitrary file write with privileges of the RunAs user
[ "cpe:/o:redhat:enterprise_linux:8::baseos" ]
null
7.8
null
null
RHSA-2018:3651
Red Hat Security Advisory: kernel security, bug fix, and enhancement update
kernel: stack-based buffer overflow in chap_server_compute_md5() in iscsi target kernel: NULL pointer dereference in af_netlink.c:__netlink_ns_capable() allows for denial of service
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
5.5
null
RHSA-2024:0009
Red Hat Security Advisory: xorg-x11-server security update
xorg-x11-server: out-of-bounds memory reads/writes in XKB button actions xorg-x11-server: out-of-bounds memory read in RRChangeOutputProperty and RRChangeProviderProperty
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
7.6
null
null
RHSA-2009:1124
Red Hat Security Advisory: net-snmp security update
net-snmp: DoS (division by zero) via SNMP GetBulk requests
[ "cpe:/o:redhat:enterprise_linux:3::as", "cpe:/o:redhat:enterprise_linux:3::desktop", "cpe:/o:redhat:enterprise_linux:3::es", "cpe:/o:redhat:enterprise_linux:3::ws" ]
null
null
null
null
RHSA-2024:1147
Red Hat Security Advisory: rear security update
rear: creates a world-readable initrd
[ "cpe:/a:redhat:enterprise_linux:9::appstream" ]
null
5.5
null
null
RHSA-2006:0742
Red Hat Security Advisory: elinks security update
security flaw
[ "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws" ]
null
null
null
null
RHSA-2023:6126
Red Hat Security Advisory: OpenShift Container Platform 4.12.41 bug fix and security update
golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487)
[ "cpe:/a:redhat:openshift:4.12::el8", "cpe:/a:redhat:openshift:4.12::el9" ]
null
7.5
null
null
RHSA-2023:5007
Red Hat Security Advisory: OpenShift Container Platform 4.14.0 security update
mongo-go-driver: specific cstrings input may not be properly validated golang.org/x/net/http2: avoid quadratic complexity in HPACK decoding golang.org/x/net/html: Cross site scripting goproxy: Denial of service (DoS) via unspecified vectors. golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487)
[ "cpe:/a:redhat:openshift:4.14::el8", "cpe:/a:redhat:openshift:4.14::el9" ]
null
7.5
null
null
RHSA-2025:0785
Red Hat Security Advisory: Red Hat Advanced Cluster Management 2.11.5 bug fixes and container updates
golang.org/x/crypto/ssh: Misuse of ServerConfig.PublicKeyCallback may cause authorization bypass in golang.org/x/crypto golang.org/x/net/html: Non-linear parsing of case-insensitive content in golang.org/x/net/html nanoid: nanoid mishandles non-integer values
[ "cpe:/a:redhat:acm:2.11::el9" ]
null
6.5
null
null
RHSA-2007:0327
Red Hat Security Advisory: tomcat security update
tomcat multiple content-length header poisioning tomcat XSS in example webapps tomcat directory traversal tomcat accept-language xss flaw
[ "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::client_workstation", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
RHSA-2008:0780
Red Hat Security Advisory: coreutils security update
/etc/pam.d/su is wrong in RHEL-4.6
[ "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws" ]
null
null
null
null
RHSA-2015:2231
Red Hat Security Advisory: ntp security, bug fix, and enhancement update
ntp: vallen in extension fields are not validated ntp: drop packets with source address ::1 ntp: vallen in extension fields are not validated ntp: drop packets with source address ::1 ntp: ntpd accepts unauthenticated packets with symmetric key crypto ntp: authentication doesn't protect symmetric associations against DoS attacks ntp: ntp-keygen may generate non-random symmetric keys on big-endian systems
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
null
null
RHSA-2023:6796
Red Hat Security Advisory: insights-client security update
insights-client: unsafe handling of temporary files and directories
[ "cpe:/a:redhat:rhel_eus:9.0::appstream" ]
null
7.8
null
null
RHSA-2019:2938
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.2.4 security update
undertow: Information leak in requests for directories without trailing slashes codehaus: incomplete fix for unsafe deserialization in jackson-databind vulnerabilities undertow: DEBUG log for io.undertow.request.security if enabled leaks credentials to log files jackson-databind: polymorphic typing issue allows attacker to read arbitrary local files on the server. jackson-databind: failure to block the logback-core class from polymorphic deserialization leading to remote code execution jackson-databind: polymorphic typing issue allows attacker to read arbitrary local files on the server via crafted JSON message. jackson-databind: default typing mishandling leading to remote code execution Undertow: Memory Leak in Undertow HttpOpenListener due to holding remoting connections indefinitely
[ "cpe:/a:redhat:jboss_enterprise_application_platform:7.2" ]
null
null
5.9
null
RHSA-2021:2175
Red Hat Security Advisory: glib2 security update
glib: integer overflow in g_bytes_new function on 64-bit platforms due to an implicit cast from 64 bits to 32 bits
[ "cpe:/o:redhat:rhel_eus:7.7::computenode", "cpe:/o:redhat:rhel_eus:7.7::server" ]
null
9.8
null
null
RHSA-2007:0082
Red Hat Security Advisory: php security update
security flaw security flaw security flaw security flaw security flaw security flaw security flaw php session extension information leak php session extension global variable clobber php imap_mail_compose() buffer overflow via type.parameters
[ "cpe:/o:redhat:enterprise_linux:5::client_workstation", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
RHSA-2022:8022
Red Hat Security Advisory: qt5 security and bug fix update
qt: QProcess could execute a binary from the current working directory when not found in the PATH
[ "cpe:/a:redhat:enterprise_linux:9::appstream", "cpe:/a:redhat:enterprise_linux:9::crb" ]
null
7.8
null
null
RHSA-2011:1197
Red Hat Security Advisory: libvirt security and bug fix update
libvirt: integer overflow in VirDomainGetVcpus
[ "cpe:/o:redhat:enterprise_linux:6::server" ]
null
null
null
null
RHSA-2024:5281
Red Hat Security Advisory: kernel security update
kernel: net: qcom/emac: fix UAF in emac_remove kernel: hwmon: (w83792d) Fix NULL pointer dereference by removing unnecessary structure field kernel: proc/vmcore: fix clearing user buffer by properly using clear_user() kernel: bnxt: prevent skb UAF after handing over to PTP worker kernel: NFSD: Fix the behavior of READ near OFFSET_MAX kernel: NFSD: Fix ia_size underflow kernel: NFSD: Fix NFSv3 SETATTR/CREATE's handling of large file sizes kernel: uio: Fix use-after-free in uio_open kernel: gfs2: Fix kernel NULL pointer dereference in gfs2_rgrp_dump kernel: TCP-spoofed ghost ACKs and leak leak initial sequence number kernel: SUNRPC: Fix UAF in svc_tcp_listen_data_ready() kernel: dmaengine/idxd: hardware erratum allows potential security problem with direct access by untrusted application kernel: mlxsw: spectrum_acl_tcam: Fix memory leak when canceling rehash work kernel: rtnetlink: Correct nested IFLA_VF_VLAN_LIST attribute validation kernel: net: kernel: UAF in network route management kernel: ionic: fix use after netif_napi_del() kernel: virtio-net: tap: mlx5_core short frame denial of service kernel: virtio-net: tun: mlx5_core short frame denial of service
[ "cpe:/o:redhat:rhel_aus:8.6::baseos", "cpe:/o:redhat:rhel_e4s:8.6::baseos", "cpe:/o:redhat:rhel_tus:8.6::baseos" ]
null
7.1
null
null
RHSA-2021:5219
Red Hat Security Advisory: Red Hat Single Sign-On security update on RHEL 8
Keycloak: Incorrect authorization allows unpriviledged users to create other users
[ "cpe:/a:redhat:red_hat_single_sign_on:7.5::el8" ]
null
8.3
null
null
RHSA-2015:2594
Red Hat Security Advisory: libpng security update
libpng: Out-of-bounds read in png_convert_to_rfc1123 libpng: Buffer overflow vulnerabilities in png_get_PLTE/png_set_PLTE functions libpng: Buffer overflow vulnerabilities in png_get_PLTE/png_set_PLTE functions
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
null
null
RHSA-2021:1783
Red Hat Security Advisory: tigervnc security, bug fix, and enhancement update
tigervnc: certificate exceptions stored as authorities
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
8.1
null
null
RHSA-2024:6186
Red Hat Security Advisory: containernetworking-plugins security update
golang: crypto/x509: Verify panics on certificates with an unknown public key algorithm
[ "cpe:/a:redhat:enterprise_linux:9::appstream" ]
null
5.9
null
null
RHSA-2023:5732
Red Hat Security Advisory: java-1.8.0-openjdk security update
OpenJDK: segmentation fault in ciMethodBlocks OpenJDK: IOR deserialization issue in CORBA (8303384) OpenJDK: certificate path validation issue during client authentication (8309966)
[ "cpe:/a:redhat:rhel_eus:9.0::appstream", "cpe:/a:redhat:rhel_eus:9.0::crb" ]
null
5.3
null
null
RHSA-2024:4572
Red Hat Security Advisory: OpenJDK 21.0.4 Security Update for Portable Linux Builds
OpenJDK: potential UTF8 size overflow (8314794) OpenJDK: Excessive symbol length can lead to infinite loop (8319859) OpenJDK: Range Check Elimination (RCE) pre-loop limit overflow (8320548) OpenJDK: Out-of-bounds access in 2D image handling (8324559) OpenJDK: RangeCheckElimination array index overflow (8323231)
[ "cpe:/a:redhat:openjdk:21" ]
null
7.4
null
null
RHBA-2019:0763
Red Hat Bug Fix Advisory: redhat-virtualization-host security update
python: Information Disclosure due to urlsplit improper NFKC normalization
[ "cpe:/o:redhat:enterprise_linux:7::hypervisor" ]
null
null
9.8
null
RHSA-2023:7216
Red Hat Security Advisory: Red Hat OpenShift Service Mesh Containers for 2.4.5
golang.org/x/net/html: Cross site scripting
[ "cpe:/a:redhat:service_mesh:2.4::el8" ]
null
6.1
null
null
RHSA-2023:0167
Red Hat Security Advisory: dpdk security update
dpdk: DoS when a Vhost header crosses more than two descriptors and exhausts all mbufs
[ "cpe:/a:redhat:rhel_extras_other:7" ]
null
8.6
null
null
RHSA-2022:8841
Red Hat Security Advisory: Red Hat JBoss Core Services Apache HTTP Server 2.4.51 SP1 security update
openssl: c_rehash script allows command injection openssl: the c_rehash script allows command injection httpd: core: Possible buffer overflow with very large or unlimited LimitXMLRequestBody httpd: mod_sed: Read/write beyond bounds httpd: mod_proxy_ajp: Possible request smuggling curl: CERTINFO never-ending busy-loop httpd: mod_isapi: out-of-bounds read httpd: Out-of-bounds read via ap_rwrite() httpd: Out-of-bounds read in ap_strcmp_match() libxml2: integer overflows in xmlBuf and xmlBuffer lead to out-of-bounds write httpd: mod_sed: DoS vulnerability httpd: mod_proxy: X-Forwarded-For dropped by hop-by-hop mechanism curl: HTTP compression denial of service curl: Unpreserved file permissions curl: FTP-KRB bad message verification curl: POST following PUT confusion curl: Incorrect handling of control code characters in cookies zlib: heap-based buffer over-read and overflow in inflate() in inflate.c via a large gzip header extra field libxml2: integer overflows with XML_PARSE_HUGE libxml2: dict corruption caused by entity reference cycles expat: a use-after-free in the doContent function in xmlparse.c curl: HTTP proxy double-free curl: HSTS bypass via IDN
[ "cpe:/a:redhat:jboss_core_services:1" ]
null
7.5
null
null
RHSA-2024:0292
Red Hat Security Advisory: OpenShift Container Platform 4.14.10 security update
golang: crypto/tls: slow verification of certificate chains containing large RSA keys
[ "cpe:/a:redhat:openshift:4.14::el9" ]
null
5.3
null
null
RHSA-2021:2993
Red Hat Security Advisory: rh-varnish6-varnish security update
varnish: HTTP/2 request smuggling attack via a large Content-Length header for a POST request
[ "cpe:/a:redhat:rhel_software_collections:3::el7" ]
null
8.1
null
null
RHSA-2005:330
Red Hat Security Advisory: krb5 security update
security flaw security flaw
[ "cpe:/o:redhat:enterprise_linux:3::as", "cpe:/o:redhat:enterprise_linux:3::desktop", "cpe:/o:redhat:enterprise_linux:3::es", "cpe:/o:redhat:enterprise_linux:3::ws", "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws" ]
null
null
null
null
RHSA-2020:1074
Red Hat Security Advisory: poppler and evince security update
poppler: integer overflow in Parser::makeStream in Parser.cc poppler: integer overflow in JPXStream::init function leading to memory consumption poppler: heap-based buffer over-read in function PSOutputDev::checkPageSlice in PSOutputDev.cc evince: uninitialized memory use in function tiff_document_render() and tiff_document_get_thumbnail() poppler: heap-based buffer over-read in JPXStream::init in JPEG2000Stream.cc
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
6.6
null
RHSA-2023:4625
Red Hat Security Advisory: Red Hat OpenShift Service Mesh Containers for 2.4.2 security update
envoy: OAuth2 credentials exploit with permanent validity envoy: CORS filter segfault when origin header is removed envoy: Incorrect handling of HTTP requests and responses with mixed case schemes envoy: HTTP/2 memory leak in nghttp2 codec
[ "cpe:/a:redhat:service_mesh:2.4::el8" ]
null
7.5
null
null
RHSA-2001:116
Red Hat Security Advisory: : Updated diffutils packages available
security flaw
[ "cpe:/o:redhat:linux:5.2", "cpe:/o:redhat:linux:6.2", "cpe:/o:redhat:linux:7.0", "cpe:/o:redhat:linux:7.1" ]
null
null
null
null
RHSA-2020:2758
Red Hat Security Advisory: microcode_ctl security, bug fix and enhancement update
hw: Special Register Buffer Data Sampling (SRBDS) hw: Vector Register Data Sampling hw: L1D Cache Eviction Sampling
[ "cpe:/o:redhat:rhel_eus:7.7::computenode", "cpe:/o:redhat:rhel_eus:7.7::server" ]
null
6.5
6.5
null
RHSA-2022:8400
Red Hat Security Advisory: libtirpc security update
libtirpc: DoS vulnerability with lots of connections
[ "cpe:/a:redhat:enterprise_linux:9::crb", "cpe:/o:redhat:enterprise_linux:9::baseos" ]
null
7.5
null
null
RHSA-2023:4734
Red Hat Security Advisory: OpenShift Container Platform 4.13.10 security update
golang: net/http: handle server errors after sending GOAWAY
[ "cpe:/a:redhat:openshift:4.13::el8", "cpe:/a:redhat:openshift:4.13::el9", "cpe:/a:redhat:openshift_ironic:4.13::el9" ]
null
6.5
null
null
RHSA-2022:0457
Red Hat Security Advisory: samba security update
samba: Out-of-bounds heap read/write vulnerability in VFS module vfs_fruit allows code execution
[ "cpe:/a:redhat:storage:3.5:samba:el7" ]
null
9.9
null
null
RHSA-2020:0801
Red Hat Security Advisory: OpenShift Container Platform 3.11 openshift-enterprise-postgresql-apb security update
openshift/postgresql-apb: /etc/passwd is given incorrect privileges
[ "cpe:/a:redhat:openshift:3.11::el7" ]
null
7
null
null
RHSA-2018:0527
Red Hat Security Advisory: firefox security update
Mozilla: Memory safety bugs fixed in Firefox 59 and Firefox ESR 52.7 (MFSA 2018-07) Mozilla: Buffer overflow manipulating SVG animatedPathSegList (MFSA 2018-07) Mozilla: Out-of-bounds write with malformed IPC messages (MFSA 2018-07) Mozilla: Mismatched RTP payload type can trigger memory corruption (MFSA 2018-07) Mozilla: Fetch API improperly returns cached copies of no-store/no-cache resources (MFSA 2018-07) Mozilla: Integer overflow during Unicode conversion (MFSA 2018-07) Mozilla: Memory safety bugs fixed in Firefox ESR 52.7 (MFSA 2018-07)
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
9.8
null
RHSA-2018:3852
Red Hat Security Advisory: java-1.8.0-ibm security update
OpenJDK: Incorrect handling of unsigned attributes in signed Jar manifests (Security, 8194534) OpenJDK: Leak of sensitive header data via HTTP redirect (Networking, 8196902) OpenJDK: Incomplete enforcement of the trustURLCodebase restriction (JNDI, 8199177) OpenJDK: Improper field access checks (Hotspot, 8199226) OpenJDK: Missing endpoint identification algorithm check during TLS session resumption (JSSE, 8202613) OpenJDK: Unrestricted access to scripting engine (Scripting, 8202936) OpenJDK: Infinite loop in RIFF format reader (Sound, 8205361) libpng: Integer overflow and resultant divide-by-zero in pngrutil.c:png_check_chunk_length() allows for denial of service
[ "cpe:/a:redhat:network_satellite:5.8::el6" ]
null
null
6.5
null
RHSA-2017:2484
Red Hat Security Advisory: git security update
git: Command injection via malicious ssh URLs
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
6.3
null
RHSA-2024:10379
Red Hat Security Advisory: pam security update
pam: libpam: Libpam vulnerable to read hashed password pam: Improper Hostname Interpretation in pam_access Leads to Access Control Bypass
[ "cpe:/o:redhat:enterprise_linux:8::baseos" ]
null
7.4
null
null
RHSA-2015:1834
Red Hat Security Advisory: firefox security update
Mozilla: Miscellaneous memory safety hazards (MFSA 2015-96) Mozilla: Buffer overflow in libvpx while parsing vp9 format video (MFSA 2015-101) Mozilla: Use-after-free while manipulating HTML media content (MFSA 2015-106) Mozilla: Buffer overflow while decoding WebM video (MFSA 2015-105) Mozilla: Vulnerabilities found through code inspection (MFSA 2015-112) Mozilla: Dragging and dropping images exposes final URL after redirects (MFSA 2015-110) Mozilla: Errors in the handling of CORS preflight request headers (MFSA 2015-111) Mozilla: Vulnerabilities found through code inspection (MFSA 2015-112) Mozilla: Vulnerabilities found through code inspection (MFSA 2015-112) Mozilla: Vulnerabilities found through code inspection (MFSA 2015-112) Mozilla: Vulnerabilities found through code inspection (MFSA 2015-112) Mozilla: Vulnerabilities found through code inspection (MFSA 2015-112) Mozilla: Vulnerabilities found through code inspection (MFSA 2015-112) Mozilla: Vulnerabilities found through code inspection (MFSA 2015-112)
[ "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::server", "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation", "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
null
null
RHSA-2022:4972
Red Hat Security Advisory: OpenShift Container Platform 4.9.38 packages and security update
cri-o: memory exhaustion on the node when access to the kube api
[ "cpe:/a:redhat:openshift:4.9::el7", "cpe:/a:redhat:openshift:4.9::el8" ]
null
6.8
null
null
RHSA-2024:3575
Red Hat Security Advisory: Red Hat build of Keycloak 24.0.5 enhancement and security update
keycloak: Unguarded admin REST API endpoints allows low privilege users to use administrative functionalities keycloak: exposure of sensitive information in Pushed Authorization Requests (PAR) KC_RESTART cookie
[ "cpe:/a:redhat:build_keycloak:22" ]
null
7.5
null
null
RHSA-2015:2411
Red Hat Security Advisory: kernel-rt security, bug fix, and enhancement update
kernel: crypto api unprivileged arbitrary module load via request_module() kernel: memcg: OOM handling DoS kernel: partial ASLR bypass through TLS base addresses leak kernel: crypto api unprivileged arbitrary module load via request_module() Kernel: vfs: Do not allow escaping from bind mounts kernel: race condition between chown() and execve() kernel: pty layer race condition on tty ldisc shutdown. kernel: Creating multiple sockets when SCTP module isn't loaded leads to kernel panic kernel: Unauthorized access to IPC objects with SysV shm kernel: securelevel disabled after kexec
[ "cpe:/a:redhat:rhel_extras_rt:7" ]
null
null
null
null
RHSA-2021:1214
Red Hat Security Advisory: libldb security update
samba: Out of bounds read in AD DC LDAP server
[ "cpe:/o:redhat:rhel_eus:8.1::baseos" ]
null
7.1
null
null
RHSA-2018:0480
Red Hat Security Advisory: JBoss Enterprise Application Platform 7.1.1 for RHEL 7
resteasy: Vary header not added by CORS filter leading to cache poisoning artemis/hornetq: memory exhaustion via UDP and JGroups discovery undertow: Client can use bogus uri in Digest authentication infinispan: Unsafe deserialization of malicious object injected into data cache jackson-databind: Unsafe deserialization due to incomplete black list (incomplete fix for CVE-2017-7525) jackson-databind: Unsafe deserialization due to incomplete black list (incomplete fix for CVE-2017-15095) undertow: ALLOW_ENCODED_SLASH option not taken into account in the AjpRequestParser jackson-databind: unsafe deserialization due to incomplete blacklist (incomplete fix for CVE-2017-7525 and CVE-2017-17485)
[ "cpe:/a:redhat:jboss_enterprise_application_platform:7.1::el7" ]
null
null
8.1
null
RHSA-2012:1187
Red Hat Security Advisory: katello security update
Katello: Application.config.secret_token is not generated properly
[ "cpe:/a:rhel_sam:1.1::el6" ]
null
null
null
null
RHSA-2016:0597
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 6.4.7 update
tomcat: non-persistent DoS attack by feeding data by aborting an upload EAP: HTTPS NIO connector uses no timeout when reading SSL handshake from client
[ "cpe:/a:redhat:jboss_enterprise_application_platform:6::el7" ]
null
null
null
null
RHSA-2023:6125
Red Hat Security Advisory: OpenShift Container Platform 4.12.41 security and extras update
golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487)
[ "cpe:/a:redhat:openshift:4.12::el8" ]
null
7.5
null
null
RHSA-2009:1204
Red Hat Security Advisory: apr and apr-util security update
apr-util: Integer overflows in memory pool (apr) and relocatable memory (apr-util) management
[ "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws", "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::client_workstation", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
RHSA-2024:1846
Red Hat Security Advisory: pcs security update
rubygem-rack: Denial of Service Vulnerability in Rack Content-Type Parsing rubygem-rack: Possible DoS Vulnerability with Range Header in Rack rubygem-rack: Possible Denial of Service Vulnerability in Rack Header Parsing
[ "cpe:/a:redhat:rhel_eus:9.2::highavailability", "cpe:/a:redhat:rhel_eus:9.2::resilientstorage" ]
null
5.3
null
null
RHSA-2019:3234
Red Hat Security Advisory: pango security update
pango: pango_log2vis_get_embedding_levels() heap-based buffer overflow
[ "cpe:/o:redhat:rhel_eus:7.6::computenode", "cpe:/o:redhat:rhel_eus:7.6::server" ]
null
null
9.8
null
RHSA-2021:4645
Red Hat Security Advisory: kpatch-patch security update
kernel: Insufficient validation of user-supplied sizes for the MSG_CRYPTO message type
[ "cpe:/o:redhat:enterprise_linux:8::baseos" ]
null
8.8
null
null
RHSA-2023:1529
Red Hat Security Advisory: Service Telemetry Framework 1.5 security update
golang: net/http: improper sanitization of Transfer-Encoding header golang: math/big: uncontrolled memory consumption due to an unhandled overflow via Rat.SetString golang: cmd/go: misinterpretation of branch names can lead to incorrect access control golang: crypto/elliptic: IsOnCurve returns true for invalid field elements golang: encoding/pem: fix stack overflow in Decode golang: net/http: handle server errors after sending GOAWAY golang: crypto/elliptic: panic caused by oversized scalar golang: syscall: faccessat checks wrong group golang: crypto/tls: session tickets lack random ticket_age_add golang: io/fs: stack exhaustion in Glob golang: compress/gzip: stack exhaustion in Reader.Read golang: path/filepath: stack exhaustion in Glob golang: math/big: decoding big.Float and big.Rat types can panic if the encoded message is too short, potentially allowing a denial of service golang: regexp/syntax: limit memory used by parsing regexps golang: net/http: excessive memory growth in a Go server accepting HTTP/2 requests
[ "cpe:/a:redhat:service_telemetry_framework:1.5::el8" ]
null
5.3
null
null
RHSA-2024:8789
Red Hat Security Advisory: krb5 security update
freeradius: forgery attack
[ "cpe:/o:redhat:rhel_aus:8.2::baseos" ]
null
9
null
null
RHSA-2023:6119
Red Hat Security Advisory: Multicluster Engine for Kubernetes 2.3.3 security updates and bug fixes
golang: html/template: improper handling of HTML-like comments within script contexts golang: html/template: improper handling of special tags within script contexts golang: crypto/tls: panic when processing post-handshake message on QUIC connections golang: crypto/tls: lack of a limit on buffered post-handshake golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487) HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack)
[ "cpe:/a:redhat:multicluster_engine:2.3::el8" ]
null
7.5
null
null
RHSA-2022:6174
Red Hat Security Advisory: firefox security update
Mozilla: Address bar spoofing via XSLT error handling Mozilla: Cross-origin XSLT Documents would have inherited the parent's permissions Mozilla: Data race and potential use-after-free in PK11_ChangePW Mozilla: Memory safety bugs fixed in Firefox 104 and Firefox ESR 102.2 Mozilla: Memory safety bugs fixed in Firefox 104, Firefox ESR 102.2, and Firefox ESR 91.13
[ "cpe:/a:redhat:enterprise_linux:9::appstream" ]
null
8.8
7.5
null
RHSA-2025:1724
Red Hat Security Advisory: postgresql:13 security update
postgresql: PostgreSQL quoting APIs miss neutralizing quoting syntax in text that fails encoding validation
[ "cpe:/a:redhat:rhel_aus:8.4::appstream", "cpe:/a:redhat:rhel_e4s:8.4::appstream", "cpe:/a:redhat:rhel_tus:8.4::appstream" ]
null
8.1
null
null
RHSA-2020:2063
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.2 security update
mojarra: Path traversal in ResourceManager.java:getLocalePrefix() via the loc parameter infinispan: invokeAccessibly method from ReflectionUtil class allows to invoke private methods
[ "cpe:/a:redhat:jboss_enterprise_application_platform:7.2::el6", "cpe:/a:redhat:jboss_enterprise_application_platform:7.2::el7", "cpe:/a:redhat:jboss_enterprise_application_platform:7.2::el8" ]
null
null
7.5
null
RHSA-2013:1204
Red Hat Security Advisory: haproxy security update
haproxy: http_get_hdr()/get_ip_from_hdr2() MAX_HDR_HISTORY handling denial of service
[ "cpe:/a:redhat:openshift:1.2::el6" ]
null
null
null
null
RHEA-2022:1596
Red Hat Enhancement Advisory: OpenShift Virtualization 4.9.4 Images
golang: net/http/httputil: panic due to racy read of persistConn after handler panic golang: net/http: limit growth of header canonicalization cache golang: syscall: don't close fd 0 on ForkExec error
[ "cpe:/a:redhat:container_native_virtualization:4.9::el8" ]
null
4.8
null
null
RHSA-2012:0465
Red Hat Security Advisory: samba security update
samba: Multiple heap-based buffer overflows in memory management based on NDR marshalling code output
[ "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::client_workstation", "cpe:/o:redhat:enterprise_linux:5::server", "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation", "cpe:/o:redhat:rhel_eus:5.6", "cpe:/o:redhat:rhel_eus:6.0", "cpe:/o:redhat:rhel_eus:6.1", "cpe:/o:redhat:rhel_mission_critical:5.3" ]
null
null
null
null
RHSA-2023:7109
Red Hat Security Advisory: linux-firmware security, bug fix, and enhancement update
amd: Return Address Predictor vulnerability leading to information disclosure
[ "cpe:/o:redhat:enterprise_linux:8::baseos" ]
null
5.6
null
null
RHSA-2025:2485
Red Hat Security Advisory: firefox security update
firefox: AudioIPC StreamData could trigger a use-after-free in the Browser process firefox: Use-after-free in WebTransportChild firefox: Inconsistent comparator in XSLT sorting led to out-of-bounds access firefox: JIT corruption of WASM i32 return values on 64-bit CPUs firefox: Unexpected GC during RegExp bailout processing firefox: Clickjacking the registerProtocolHandler info-bar Reporter firefox: Adding %00 and a fake extension to a jar: URL changed the interpretation of the contents firefox: thunderbird: Memory safety bugs fixed in Firefox 136, Thunderbird 136, Firefox ESR 115.21, Firefox ESR 128.8, and Thunderbird 128.8 firefox: thunderbird: Memory safety bugs fixed in Firefox 136, Thunderbird 136, Firefox ESR 128.8, and Thunderbird 128.8
[ "cpe:/a:redhat:rhel_aus:8.6::appstream", "cpe:/a:redhat:rhel_e4s:8.6::appstream", "cpe:/a:redhat:rhel_tus:8.6::appstream" ]
null
8.8
null
null
RHSA-2008:0533
Red Hat Security Advisory: bind security update
bind: implement source UDP port randomization (CERT VU#800113)
[ "cpe:/o:redhat:enterprise_linux:2.1::as", "cpe:/o:redhat:enterprise_linux:2.1::aw", "cpe:/o:redhat:enterprise_linux:2.1::es", "cpe:/o:redhat:enterprise_linux:2.1::ws", "cpe:/o:redhat:enterprise_linux:3::as", "cpe:/o:redhat:enterprise_linux:3::desktop", "cpe:/o:redhat:enterprise_linux:3::es", "cpe:/o:redhat:enterprise_linux:3::ws", "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws", "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::client_workstation", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
RHSA-2021:3623
Red Hat Security Advisory: nodejs:12 security and bug fix update
c-ares: Missing input validation of host names may lead to domain hijacking nodejs: Use-after-free on close http2 on stream canceling nodejs: Improper handling of untypical characters in domain names nodejs: Incomplete validation of tls rejectUnauthorized parameter nodejs: Use-after-free on close http2 on stream canceling nodejs-path-parse: ReDoS via splitDeviceRe, splitTailRe and splitPathRe nodejs-tar: Insufficient symlink protection allowing arbitrary file creation and overwrite nodejs-tar: Insufficient absolute path sanitization allowing arbitrary file creation and overwrite
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
8.1
null
null
RHSA-2017:0531
Red Hat Security Advisory: rabbitmq-server security and bug fix update
rabbitmq-server: DoS via lengths_age or lengths_incr parameter in the management plugin
[ "cpe:/a:redhat:openstack:6::el7" ]
null
null
6.5
null
RHSA-2024:0603
Red Hat Security Advisory: firefox security update
Mozilla: Out of bounds write in ANGLE Mozilla: Failure to update user input timestamp Mozilla: Crash when listing printers on Linux Mozilla: Bypass of Content Security Policy when directive unsafe-inline was set Mozilla: Phishing site popup could show local origin in address bar Mozilla: Potential permissions request bypass via clickjacking Mozilla: Privilege escalation through devtools Mozilla: HSTS policy on subdomain could bypass policy of upper domain Mozilla: Memory safety bugs fixed in Firefox 122, Firefox ESR 115.7, and Thunderbird 115.7
[ "cpe:/a:redhat:enterprise_linux:9::appstream" ]
null
8.8
null
null
RHSA-2023:1006
Red Hat Security Advisory: Red Hat build of Quarkus 2.7.7 release and security update
SnakeYaml: Constructor Deserialization Remote Code Execution protobuf-java: timeout in parser leads to DoS postgresql: SQL Injection in ResultSet.refreshRow() with malicious column names postgresql-jdbc: Information leak of prepared statement data due to insecure temporary file permissions xstream: Denial of Service by injecting recursive collections or maps based on element's hash values raising a stack overflow jackson-databind: deep wrapper array nesting wrt UNWRAP_SINGLE_VALUE_ARRAYS jackson-databind: use of deeply nested arrays apache-commons-text: variable interpolation RCE quarkus-vertx-http: a cross-site attack may be initiated which might lead to the Information Disclosure
[ "cpe:/a:redhat:quarkus:2.7" ]
null
5.3
null
null
RHSA-2015:1586
Red Hat Security Advisory: firefox security update
Mozilla: Miscellaneous memory safety hazards (rv:38.2) (MFSA 2015-79) Mozilla: Out-of-bounds read with malformed MP3 file (MFSA 2015-80) Mozilla: Redefinition of non-configurable JavaScript object properties (MFSA 2015-82) Mozilla: Overflow issues in libstagefright (MFSA 2015-83) Mozilla: Overflow issues in libstagefright (MFSA 2015-83) Mozilla: Crash when using shared memory in JavaScript (MFSA 2015-87) Mozilla: Buffer overflows on Libvpx when decoding WebM video (MFSA 2015-89) Mozilla: Buffer overflows on Libvpx when decoding WebM video (MFSA 2015-89) Mozilla: Vulnerabilities found through code inspection (MFSA 2015-90) Mozilla: Vulnerabilities found through code inspection (MFSA 2015-90) Mozilla: Vulnerabilities found through code inspection (MFSA 2015-90) Mozilla: Heap overflow in gdk-pixbuf when scaling bitmap images (MFSA 2015-88) Mozilla: Use-after-free in XMLHttpRequest with shared workers (MFSA 2015-92) Mozilla: Overflow issues in libstagefright (MFSA 2015-83)
[ "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::server", "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation", "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
null
null
RHSA-2023:5175
Red Hat Security Advisory: Red Hat OpenShift Service Mesh 2.2.10 security update
envoy: OAuth2 credentials exploit with permanent validity envoy: Incorrect handling of HTTP requests and responses with mixed case schemes envoy: HTTP/2 memory leak in nghttp2 codec
[ "cpe:/a:redhat:service_mesh:2.2::el8" ]
null
7.5
null
null