id
stringlengths
13
15
title
stringlengths
29
176
description
stringlengths
8
32.1k
cpes
listlengths
0
20
cvss_v4_0
null
cvss_v3_1
float64
0
10
cvss_v3_0
float64
0
10
cvss_v2_0
null
RHSA-2023:4497
Red Hat Security Advisory: thunderbird security update
thunderbird: File Extension Spoofing using the Text Direction Override Character Mozilla: Offscreen Canvas could have bypassed cross-origin restrictions Mozilla: Incorrect value used during WASM compilation Mozilla: Potential permissions request bypass via clickjacking Mozilla: Crash in DOMParser due to out-of-memory conditions Mozilla: Fix potential race conditions when releasing platform objects Mozilla: Stack buffer overflow in StorageManager Mozilla: Cookie jar overflow caused unexpected cookie jar state Mozilla: Memory safety bugs fixed in Firefox 116, Firefox ESR 115.1, Firefox ESR 102.14, Thunderbird 115.1, and Thunderbird 102.14 Mozilla: Memory safety bugs fixed in Firefox ESR 115.1, and Thunderbird 115.1
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
9.8
null
null
RHSA-2022:5249
Red Hat Security Advisory: kernel security and bug fix update
kernel: Small table perturb size in the TCP source port generation algorithm can lead to information leak kernel: race condition in perf_event_open leads to privilege escalation kernel: netfilter: nf_tables: incorrect NFT_STATEFUL_EXPR check leads to a use-after-free (write) kernel: buffer overflow in IPsec ESP transformation code kernel: a use-after-free write in the netfilter subsystem can lead to privilege escalation to root
[ "cpe:/a:redhat:enterprise_linux:9::appstream", "cpe:/a:redhat:enterprise_linux:9::crb", "cpe:/o:redhat:enterprise_linux:9::baseos" ]
null
7.8
null
null
RHSA-2020:4844
Red Hat Security Advisory: fontforge security update
fontforge: SFD_GetFontMetaData() insufficient CVE-2020-5395 backport
[ "cpe:/a:redhat:enterprise_linux:8::crb" ]
null
8.8
null
null
RHSA-2021:1363
Red Hat Security Advisory: firefox security update
Mozilla: More internal network hosts could have been probed by a malicious webpage Mozilla: Out of bound write due to lazy initialization Mozilla: Use-after-free in Responsive Design Mode Mozilla: Secure Lock icon could have been spoofed Mozilla: Blob URLs may have been granted additional privileges Mozilla: Arbitrary FTP command execution on FTP servers using an encoded URL Mozilla: Incorrect size computation in WebAssembly JIT could lead to null-reads Mozilla: Port blocking could be bypassed
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
8.8
6.1
null
RHSA-2022:6735
Red Hat Security Advisory: java-1.8.0-ibm security update
OpenJDK: Incomplete enforcement of JAR signing disabled algorithms (Libraries, 8249906) JDK: exposure of sensitive information using a combination of flaws and configurations
[ "cpe:/a:redhat:enterprise_linux:8::supplementary" ]
null
7.5
null
null
RHSA-2022:5875
Red Hat Security Advisory: OpenShift Container Platform 4.10.26 security update
golang: cmd/go: misinterpretation of branch names can lead to incorrect access control golang: crypto/elliptic: IsOnCurve returns true for invalid field elements golang: crypto/elliptic: panic caused by oversized scalar golang: compress/gzip: stack exhaustion in Reader.Read
[ "cpe:/a:redhat:openshift:4.10::el8" ]
null
7.5
null
null
RHSA-2014:0924
Red Hat Security Advisory: kernel security update
kernel: x86_64: ptrace: sysret to non-canonical address kernel: net: pppol2tp: level handling in pppol2tp_[s,g]etsockopt()
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
null
null
RHSA-2010:0338
Red Hat Security Advisory: java-1.5.0-sun security update
TLS: MITM attacks via session renegotiation OpenJDK Loader-constraint table allows arrays instead of only the base-classes (6626217) OpenJDK Policy/PolicyFile leak dynamic ProtectionDomains. (6633872) OpenJDK File TOCTOU deserialization vulnerability (6736390) JDK unspecified vulnerability in JWS/Plugin component OpenJDK Inflater/Deflater clone issues (6745393) JDK unspecified vulnerability in JavaWS/Plugin component OpenJDK Unsigned applet can retrieve the dragged information before drop action occurs(6887703) OpenJDK AtomicReferenceArray causes SIGSEGV -> SEGV_MAPERR error (6888149) OpenJDK System.arraycopy unable to reference elements beyond Integer.MAX_VALUE bytes (6892265) OpenJDK Deserialization of RMIConnectionImpl objects should enforce stricter checks (6893947) OpenJDK Subclasses of InetAddress may incorrectly interpret network addresses (6893954) OpenJDK JAR "unpack200" must verify input parameters (6902299) OpenJDK CMM readMabCurveData Buffer Overflow Vulnerability (6899653) JDK multiple unspecified vulnerabilities OpenJDK Applet Trusted Methods Chaining Privilege Escalation Vulnerability (6904691) OpenJDK JPEGImageReader stepX Integer Overflow Vulnerability (6909597) JDK multiple unspecified vulnerabilities JDK multiple unspecified vulnerabilities JDK multiple unspecified vulnerabilities OpenJDK No ClassCastException for HashAttributeSet constructors if run with -Xcomp (6894807) JDK unspecified vulnerability in ImageIO component OpenJDK ImagingLib arbitrary code execution vulnerability (6914866) OpenJDK AWT Library Invalid Index Vulnerability (6914823) JDK unspecified vulnerability in Java2D component
[ "cpe:/a:redhat:rhel_extras:4", "cpe:/a:redhat:rhel_extras:4.7.z", "cpe:/a:redhat:rhel_extras:5", "cpe:/a:redhat:rhel_extras:5::client", "cpe:/a:redhat:rhel_extras:5::server" ]
null
null
null
null
RHSA-2023:3150
Red Hat Security Advisory: thunderbird security update
Mozilla: Browser prompts could have been obscured by popups Mozilla: Crash in RLBox Expat driver Mozilla: Potential permissions request bypass via clickjacking Mozilla: Content process crash due to invalid wasm code Mozilla: Potential spoof due to obscured address bar Mozilla: Potential memory corruption in FileReader::DoReadData() Mozilla: Memory safety bugs fixed in Firefox 113 and Firefox ESR 102.11
[ "cpe:/a:redhat:enterprise_linux:9::appstream" ]
null
8.8
null
null
RHSA-2021:2717
Red Hat Security Advisory: systemd security update
systemd: uncontrolled allocation on the stack in function unit_name_path_escape leads to crash
[ "cpe:/o:redhat:enterprise_linux:8::baseos" ]
null
5.5
null
null
RHSA-2013:0146
Red Hat Security Advisory: jbossweb security update
Web: Bypass of security constraints
[ "cpe:/a:redhat:jboss_enterprise_application_platform:4.3.0:update10" ]
null
null
null
null
RHSA-2021:4385
Red Hat Security Advisory: glib2 security and bug fix update
glib2: Possible privilege escalation thourgh pkexec and aliases glib: g_file_replace() with G_FILE_CREATE_REPLACE_DESTINATION creates empty target for dangling symlink
[ "cpe:/a:redhat:enterprise_linux:8::crb", "cpe:/o:redhat:enterprise_linux:8::baseos" ]
null
5.3
null
null
RHSA-2010:0321
Red Hat Security Advisory: automake security update
Automake: Race condition by creation of "distdir" based directory hierarchy
[ "cpe:/o:redhat:enterprise_linux:5::client_workstation", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
RHSA-2024:0157
Red Hat Security Advisory: .NET 7.0 security update
crypto-js: PBKDF2 1,000 times weaker than specified in 1993 and 1.3M times weaker than current standard dotnet: Information Disclosure: MD.SqlClient(MDS) & System.data.SQLClient (SDS) dotnet: X509 Certificates - Validation Bypass across Azure dotnet: .NET Denial of Service Vulnerability
[ "cpe:/a:redhat:enterprise_linux:8::appstream", "cpe:/a:redhat:enterprise_linux:8::crb" ]
null
6.8
null
null
RHSA-2023:7733
Red Hat Security Advisory: tracker-miners security update
tracker-miners: sandbox escape
[ "cpe:/a:redhat:rhel_eus:8.6::appstream" ]
null
7.5
null
null
RHSA-2007:0087
Red Hat Security Advisory: ekiga security update
security flaw Ekiga format string flaw
[ "cpe:/a:redhat:rhel_productivity:5", "cpe:/o:redhat:enterprise_linux:5::client" ]
null
null
null
null
RHSA-2023:5008
Red Hat Security Advisory: Red Hat build of MicroShift 4.14.0 security update
kube-apiserver: PrivEsc kube-apiserver: Bypassing policies imposed by the ImagePolicyWebhook admission plugin kube-apiserver: Bypassing enforce mountable secrets policy imposed by the ServiceAccount admission plugin golang: html/template: improper handling of HTML-like comments within script contexts golang: html/template: improper handling of special tags within script contexts golang: crypto/tls: panic when processing post-handshake message on QUIC connections golang: crypto/tls: lack of a limit on buffered post-handshake
[ "cpe:/a:redhat:openshift:4.14::el9" ]
null
7.5
null
null
RHSA-2020:1270
Red Hat Security Advisory: chromium-browser security update
usrsctp: Out of bounds reads in sctp_load_addresses_from_init() chromium-browser: Use after free in WebGL chromium-browser: Use after free in media chromium-browser: Insufficient policy enforcement in extensions chromium-browser: Inappropriate implementation in V8 chromium-browser: Use after free in audio chromium-browser: Use after free in audio chromium-browser: Use after free in audio chromium-browser: Use after free in audio
[ "cpe:/a:redhat:rhel_extras:6" ]
null
null
8.8
null
RHSA-2018:0646
Red Hat Security Advisory: python-paramiko security update
python-paramiko: Authentication bypass in transport.py
[ "cpe:/a:redhat:ansible_engine:2::el7" ]
null
null
9.8
null
RHSA-2010:0705
Red Hat Security Advisory: kernel security update
kernel: 64-bit Compatibility Mode Stack Pointer Underflow
[ "cpe:/o:redhat:rhel_eus:5.4" ]
null
null
null
null
RHSA-2021:2755
Red Hat Security Advisory: EAP XP 2 security update to CVE fixes in the EAP 7.3.x base
velocity: arbitrary code execution when attacker is able to modify templates bouncycastle: Timing issue within the EC math library bouncycastle: password bypass in OpenBSDBCrypt.checkPassword utility possible wildfly: XSS via admin console when creating roles in domain mode undertow: Possible regression in fix for CVE-2020-10687 wildfly: Information disclosure due to publicly accessible privileged actions in JBoss EJB Client netty: Information disclosure via the local system temporary directory netty: possible request smuggling in HTTP/2 due missing validation netty: Request smuggling via content-length header
[ "cpe:/a:redhat:jbosseapxp" ]
null
5.9
4.8
null
RHSA-2024:7102
Red Hat Security Advisory: grafana security update
encoding/gob: golang: Calling Decoder.Decode on a message which contains deeply nested structures can cause a panic due to stack exhaustion
[ "cpe:/a:redhat:rhel_e4s:9.0::appstream" ]
null
7.5
null
null
RHSA-2004:687
Red Hat Security Advisory: php security update
security flaw security flaw security flaw security flaw security flaw
[ "cpe:/o:redhat:enterprise_linux:3::as", "cpe:/o:redhat:enterprise_linux:3::desktop", "cpe:/o:redhat:enterprise_linux:3::es", "cpe:/o:redhat:enterprise_linux:3::ws" ]
null
null
null
null
RHSA-2023:7549
Red Hat Security Advisory: kernel security and bug fix update
kernel: use-after-free due to race condition occurring in dvb_register_device() kernel: use-after-free due to race condition occurring in dvb_net.c kernel: use-after-free due to race condition occurring in dvb_ca_en50221.c kernel: use-after-free in smb2_is_status_io_timeout() kernel: bpf: Incorrect verifier pruning leads to unsafe code paths being incorrectly marked as safe kernel: tun: bugs for oversize packet when napi frags enabled in tun_napi_alloc_frags kernel: use after free in nvmet_tcp_free_crypto in NVMe kernel: mm/slab_common: slab_caches list corruption after kmem_cache_destroy()
[ "cpe:/a:redhat:enterprise_linux:8::crb", "cpe:/o:redhat:enterprise_linux:8::baseos" ]
null
5.5
null
null
RHSA-2020:0855
Red Hat Security Advisory: tomcat security update
tomcat: Apache Tomcat AJP File Read/Inclusion Vulnerability
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
7.6
null
null
RHSA-2006:0720
Red Hat Security Advisory: kdelibs security update
security flaw
[ "cpe:/o:redhat:enterprise_linux:2.1::as", "cpe:/o:redhat:enterprise_linux:2.1::aw", "cpe:/o:redhat:enterprise_linux:2.1::es", "cpe:/o:redhat:enterprise_linux:2.1::ws", "cpe:/o:redhat:enterprise_linux:3::as", "cpe:/o:redhat:enterprise_linux:3::desktop", "cpe:/o:redhat:enterprise_linux:3::es", "cpe:/o:redhat:enterprise_linux:3::ws", "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws" ]
null
null
null
null
RHSA-2023:4696
Red Hat Security Advisory: kernel security update
hw: amd: Cross-Process Information Leak kernel: netfilter: use-after-free in nf_tables when processing batch requests can lead to privilege escalation
[ "cpe:/o:redhat:rhel_aus:7.6::server" ]
null
7.8
null
null
RHSA-2025:3887
Red Hat Security Advisory: kernel security update
kernel: ALSA: usb-audio: Fix out of bounds reads when finding clock sources
[ "cpe:/o:redhat:rhel_aus:8.2::baseos" ]
null
7.1
null
null
RHSA-2008:0245
Red Hat Security Advisory: java-1.6.0-bea security update
java-1.6.0 default external entity processing Untrusted applet and application XSLT processing privilege escalation JRE image parsing library allows privilege escalation (CVE-2008-1194) JRE image parsing library allows privilege escalation (CVE-2008-1194)
[ "cpe:/a:redhat:rhel_extras:5::client", "cpe:/a:redhat:rhel_extras:5::server" ]
null
null
null
null
RHSA-2024:1393
Red Hat Security Advisory: ovn22.03 security update
ovn: insufficient validation of BFD packets may lead to denial of service
[ "cpe:/o:redhat:enterprise_linux:9::fastdatapath" ]
null
6.5
null
null
RHSA-2020:1020
Red Hat Security Advisory: curl security and bug fix update
curl: TFTP receive heap buffer overflow in tftp_receive_packet() function
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
7
null
null
RHSA-2024:10592
Red Hat Security Advisory: thunderbird security update
thunderbird: Potential disclosure of plaintext in OpenPGP encrypted message firefox: thunderbird: Select list elements could be shown over another site firefox: thunderbird: CSP Bypass and XSS Exposure via Web Compatibility Shims firefox: thunderbird: URL Bar Spoofing via Manipulated Punycode and Whitespace Characters firefox: thunderbird: Unhandled Exception in Add-on Signature Verification firefox: thunderbird: Improper Keypress Handling in Executable File Confirmation Dialog firefox: thunderbird: Memory safety bugs fixed in Firefox 133, Thunderbird 133, Firefox ESR 128.5, and Thunderbird 128.5
[ "cpe:/a:redhat:enterprise_linux:9::appstream" ]
null
8.8
null
null
RHSA-2025:3066
Red Hat Security Advisory: OpenShift Container Platform 4.18.6 bug fix and security update
libxml2: Use-After-Free in libxml2 go-jose: Go JOSE's Parsing Vulnerable to Denial of Service
[ "cpe:/a:redhat:openshift:4.18::el9" ]
null
7.5
null
null
RHSA-2014:1193
Red Hat Security Advisory: axis security update
axis: SSL hostname verification bypass, incomplete CVE-2012-5784 fix
[ "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::client_workstation", "cpe:/o:redhat:enterprise_linux:5::server", "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
null
null
RHSA-2023:0821
Red Hat Security Advisory: thunderbird security update
Mozilla: User Interface lockup with messages combining S/MIME and OpenPGP Mozilla: Content security policy leak in violation reports using iframes Mozilla: Extensions could have opened external schemes without user knowledge Mozilla: Screen hijack via browser fullscreen mode Mozilla: Out of bounds memory write from EncodeInputStream Mozilla: Potential use-after-free from compartment mismatch in SpiderMonkey Mozilla: Invalid downcast in SVGUtils::SetupStrokeGeometry Mozilla: Use-after-free in mozilla::dom::ScriptLoadContext::~ScriptLoadContext Mozilla: Web Crypto ImportKey crashes tab Mozilla: Fullscreen notification not shown in Firefox Focus Mozilla: Memory safety bugs fixed in Firefox 110 and Firefox ESR 102.8 Mozilla: Memory safety bugs fixed in Firefox ESR 102.8
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
8.8
null
null
RHSA-2020:0961
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.3 security update
thrift: Endless loop when feed with specific input data thrift: Out-of-bounds read related to TJSONProtocol or TSimpleJSONProtocol wildfly: The 'enabled-protocols' value in legacy security is not respected if OpenSSL security provider is in use undertow: AJP File Read/Inclusion Vulnerability
[ "cpe:/a:redhat:jboss_enterprise_application_platform:7.3" ]
null
7.6
7.4
null
RHSA-2020:0728
Red Hat Security Advisory: Red Hat Data Grid 7.3.4 security update
wildfly-core: Incorrect privileges for 'Monitor', 'Auditor' and 'Deployer' user by default
[ "cpe:/a:redhat:jboss_data_grid:7.3" ]
null
null
5.2
null
RHSA-2016:0597
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 6.4.7 update
tomcat: non-persistent DoS attack by feeding data by aborting an upload EAP: HTTPS NIO connector uses no timeout when reading SSL handshake from client
[ "cpe:/a:redhat:jboss_enterprise_application_platform:6::el7" ]
null
null
null
null
RHSA-2021:4226
Red Hat Security Advisory: grafana security, bug fix, and enhancement update
golang: crypto/elliptic: incorrect operations on the P-224 curve grafana: snapshot feature allow an unauthenticated remote attacker to trigger a DoS via a remote API call golang: net: lookup functions may return invalid host names golang: net/http/httputil: ReverseProxy forwards connection headers if first one is empty golang: crypto/tls: certificate of wrong type is causing TLS client to panic
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
6.5
null
null
RHSA-2016:1624
Red Hat Security Advisory: Red Hat JBoss Web Server 3.0.3 Service Pack 1 security update
LOGJAM: TLS connections which support export grade DHE key-exchange are vulnerable to MITM attacks HTTPD: sets environmental variable based on user supplied Proxy request header Tomcat: CGI sets environmental variable based on user supplied Proxy request header
[ "cpe:/a:redhat:jboss_enterprise_web_server:3.0" ]
null
null
3.5
null
RHSA-2023:5790
Red Hat Security Advisory: python-reportlab security update
python-reportlab: code injection in paraparser.py allows code execution
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
9.8
null
null
RHSA-2006:0665
Red Hat Security Advisory: xorg-x11 security update
security flaw security flaw
[ "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws" ]
null
null
null
null
RHSA-2022:8880
Red Hat Security Advisory: java-1.8.0-ibm security update
OpenJDK: improper handling of long NTLM client hostnames (Security, 8286526) OpenJDK: insufficient randomization of JNDI DNS port numbers (JNDI, 8286910) OpenJDK: excessive memory allocation in X.509 certificate parsing (Security, 8286533) OpenJDK: HttpServer no connection count limit (Lightweight HTTP Server, 8286918)
[ "cpe:/a:redhat:rhel_extras:7" ]
null
5.3
null
null
RHSA-2017:0019
Red Hat Security Advisory: gstreamer-plugins-good security update
gstreamer-plugins-good: Heap buffer overflow in FLIC decoder gstreamer-plugins-good: Heap buffer overflow in FLIC decoder gstreamer-plugins-good: Heap buffer overflow in FLIC decoder gstreamer-plugins-good: Invalid memory read in flx_decode_chunks gstreamer-plugins-good: Heap buffer overflow in FLIC decoder
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
7.5
null
RHSA-2023:0526
Red Hat Security Advisory: kernel-rt security and bug fix update
kernel: memory corruption in AX88179_178A based USB ethernet device. kernel: i915: Incorrect GPU TLB flush can lead to random memory access
[ "cpe:/a:redhat:rhel_eus:9.0::nfv", "cpe:/a:redhat:rhel_eus:9.0::realtime" ]
null
7
null
null
RHSA-2018:0029
Red Hat Security Advisory: libvirt security update
An update for libvirt is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
null
null
RHSA-2025:1663
Red Hat Security Advisory: kpatch-patch-4_18_0-305_120_1, kpatch-patch-4_18_0-305_138_1, and kpatch-patch-4_18_0-305_145_1 security update
kernel: media: uvcvideo: Skip parsing frames of type UVC_VS_UNDEFINED in uvc_parse_format
[ "cpe:/o:redhat:rhel_e4s:8.4::baseos" ]
null
7.3
null
null
RHSA-2021:4142
Red Hat Security Advisory: pcs security, bug fix, and enhancement update
jquery: Prototype pollution in object's prototype leading to denial of service, remote code execution, or property injection jquery: Cross-site scripting (XSS) via <script> HTML tags containing whitespaces jquery: Untrusted code execution via <option> tag in HTML passed to DOM manipulation methods
[ "cpe:/a:redhat:enterprise_linux:8::highavailability", "cpe:/a:redhat:enterprise_linux:8::resilientstorage" ]
null
6.1
5.6
null
RHSA-2024:3855
Red Hat Security Advisory: kernel security update
kernel: KVM: SVM: improper check in svm_set_x2apic_msr_interception allows direct access to host x2apic msrs kernel: bluetooth: bt_sock_ioctl race condition leads to use-after-free in bt_sock_recvmsg kernel: KVM: s390: vsie: fix race during shadow creation kernel: net/mlx5e: fix a potential double-free in fs_any_create_groups kernel: kvm: Avoid potential UAF in LPI translation cache
[ "cpe:/a:redhat:rhel_eus:9.2::appstream", "cpe:/a:redhat:rhel_eus:9.2::crb", "cpe:/o:redhat:rhel_eus:9.2::baseos" ]
null
7.8
null
null
RHSA-2013:0657
Red Hat Security Advisory: openstack-nova security, bug fix, and enhancement update
bindings: Internal entity expansion in Python XML libraries inflicts DoS vulnerabilities bindings: External entity expansion in Python XML libraries inflicts potential security flaws and DoS vulnerabilities
[ "cpe:/a:redhat:openstack:2::el6" ]
null
null
null
null
RHSA-2016:1972
Red Hat Security Advisory: Red Hat Ceph Storage 1.3.3 security, bug fix, and enhancement update
ceph: RGW permits bucket listing when authenticated_users=read
[ "cpe:/a:redhat:ceph_storage:1.3::el7" ]
null
null
3
null
RHSA-2019:0966
Red Hat Security Advisory: firefox security update
Mozilla: Proxy Auto-Configuration file can define localhost access to be proxied Mozilla: Memory safety bugs fixed in Firefox 66 and Firefox ESR 60.6 Mozilla: Use-after-free when removing in-use DOM elements Mozilla: Type inference is incorrect for constructors entered through on-stack replacement with IonMonkey Mozilla: IonMonkey leaks JS_OPTIMIZED_OUT magic value to script Mozilla: Improper bounds checks when Spectre mitigations are disabled Mozilla: Type-confusion in IonMonkey JIT compiler Mozilla: Use-after-free with SMIL animation controller Mozilla: IonMonkey MArraySlice has incorrect alias information Mozilla: Ionmonkey type confusion with __proto__ mutations
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
null
8.8
null
RHSA-2021:1031
Red Hat Security Advisory: kpatch-patch security update
kernel: locking issue in drivers/tty/tty_jobctrl.c can lead to an use-after-free
[ "cpe:/o:redhat:rhel_eus:7.7::server" ]
null
7.8
null
null
RHSA-2021:4866
Red Hat Security Advisory: samba security update
samba: Negative idmap cache entries can cause incorrect group entries in the Samba file server process token
[ "cpe:/a:redhat:rhel_eus:8.2::crb", "cpe:/o:redhat:rhel_eus:8.2::baseos" ]
null
6.8
null
null
RHSA-2014:0924
Red Hat Security Advisory: kernel security update
kernel: x86_64: ptrace: sysret to non-canonical address kernel: net: pppol2tp: level handling in pppol2tp_[s,g]etsockopt()
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
null
null
RHSA-2014:1042
Red Hat Security Advisory: java-1.7.1-ibm security update
JDK: Java CMS keystore provider potentially allows brute-force private key recovery JDK: Privilege escalation issue JDK: unspecified vulnerability fixed in 7u65 and 8u11 (Deployment) OpenJDK: SubjectDelegator protection insufficient (JMX, 8029755) OpenJDK: Clone interfaces passed to proxy methods (Libraries, 8035009) OpenJDK: Bytecode verification does not prevent ctor calls to this() and super() (Hotspot, 8035119) JDK: unspecified vulnerability fixed in 7u65 and 8u11 (Deployment) OpenJDK: MethodHandles.Lookup insufficient modifiers checks (Libraries, 8035788) JDK: unspecified vulnerability fixed in 6u81, 7u65 and 8u11 (Deployment) OpenJDK: RSA blinding issues (Security, 8031346) OpenJDK: Prevent instantiation of service with non-public constructor (Security, 8035004) OpenJDK: AtomicReferenceFieldUpdater missing primitive type check (Libraries, 8039520) OpenJDK: insufficient Diffie-Hellman public key validation (Security, 8037162) JDK: unspecified vulnerability fixed in 6u81, 7u65 and 8u11 (Deployment) OpenJDK: InfoBuilder incorrect return values (Serviceability, 8033301)
[ "cpe:/a:redhat:rhel_extras:7" ]
null
null
null
null
RHSA-2018:1668
Red Hat Security Advisory: libvirt security update
hw: cpu: speculative store bypass
[ "cpe:/o:redhat:rhel_aus:7.2::server", "cpe:/o:redhat:rhel_e4s:7.2::server", "cpe:/o:redhat:rhel_tus:7.2::server" ]
null
null
5.6
null
RHSA-2021:0671
Red Hat Security Advisory: bind security update
bind: Buffer overflow in the SPNEGO implementation affecting GSSAPI security policy negotiation
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
8.1
null
null
RHSA-2016:0015
Red Hat Security Advisory: samba security update
samba: Insufficient symlink verification in smbd samba: client requesting encryption vulnerable to downgrade attack Samba: Missing access control check in shadow copy code libldb: remote memory read in the Samba LDAP server samba: DoS to AD-DC due to insufficient checking of asn1 memory allocation
[ "cpe:/a:redhat:storage:3.1:samba:el6" ]
null
null
null
null
RHSA-2023:1179
Red Hat Security Advisory: Release of OpenShift Serverless Client kn 1.27.1
golang: net/http: excessive memory growth in a Go server accepting HTTP/2 requests
[ "cpe:/a:redhat:serverless:1.0::el8" ]
null
5.3
null
null
RHSA-2020:4960
Red Hat Security Advisory: Red Hat Decision Manager 7.9.0 security update
hibernate: SQL injection issue in Hibernate ORM batik: SSRF via "xlink:href" Wildfly: Improper authorization issue in WildFlySecurityManager when using alternative protection domain ant: insecure temporary file vulnerability cxf: JMX integration is vulnerable to a MITM attack mysql-connector-java: allows unauthenticated attacker with network access via multiple protocols to compromise MySQL Connectors which could result in unauthorized update, insert or delete mysql-connector-java: allows high privileged attacker with network access via multiple protocols to compromise MySQL Connectors which could result in unauthorized partial DoS mysql-connector-java: allows unauthenticated attacker with network access via multiple protocols to compromise MySQL Connectors which could result in unauthorized update, insert or delete dom4j: XML External Entity vulnerability in default SAX parser hibernate-validator: Improper input validation in the interpolation of constraint error messages wildfly-elytron: session fixation when using FORM authentication
[ "cpe:/a:redhat:jboss_enterprise_brms_platform:7.9" ]
null
7.5
7.4
null
RHSA-2024:0564
Red Hat Security Advisory: container-tools:3.0 security update
prometheus/client_golang: Denial of service using InstrumentHandlerCounter runc: AppArmor can be bypassed when `/proc` inside the container is symlinked with a specific mount configuration
[ "cpe:/a:redhat:rhel_aus:8.4::appstream", "cpe:/a:redhat:rhel_e4s:8.4::appstream", "cpe:/a:redhat:rhel_tus:8.4::appstream" ]
null
7.8
null
null
RHBA-2024:4589
Red Hat Bug Fix Advisory: Satellite 6.15.2 Async Update
foreman: Host ssh key not being checked in remote execution
[ "cpe:/a:redhat:satellite:6.15::el8", "cpe:/a:redhat:satellite_capsule:6.15::el8", "cpe:/a:redhat:satellite_utils:6.15::el8" ]
null
6.8
null
null
RHSA-2022:5923
Red Hat Security Advisory: Service Telemetry Framework 1.3 security update
golang: compress/gzip: stack exhaustion in Reader.Read
[ "cpe:/a:redhat:service_telemetry_framework:1.3::el8" ]
null
7.5
null
null
RHSA-2013:0682
Red Hat Security Advisory: jakarta-commons-httpclient security update
jakarta-commons-httpclient: missing connection hostname check against X.509 certificate name
[ "cpe:/a:redhat:jboss_enterprise_web_platform:5::el4", "cpe:/a:redhat:jboss_enterprise_web_platform:5::el5", "cpe:/a:redhat:jboss_enterprise_web_platform:5::el6" ]
null
null
3.7
null
RHSA-2024:9497
Red Hat Security Advisory: kernel security update
kernel: net: fix possible store tearing in neigh_periodic_work() kernel: tcp: add sanity checks to rx zerocopy kernel: drm/amdgpu: use-after-free vulnerability kernel: ext4: avoid allocating blocks from corrupted group in ext4_mb_find_by_goal() kernel: NFSv4.2: fix nfs4_listxattr kernel BUG at mm/usercopy.c:102 kernel: x86/mm: Disallow vsyscall page read for copy_from_kernel_nofault() kernel: genirq/cpuhotplug, x86/vector: Prevent vector leak during CPU offline kernel: mptcp: ensure snd_una is properly initialized on connect kernel: firmware: cs_dsp: Fix overflow checking of wmfw header kernel: net/iucv: fix use after free in iucv_sock_close() kernel: mptcp: pm: Fix uaf in __timer_delete_sync
[ "cpe:/a:redhat:rhel_eus:9.2::appstream", "cpe:/a:redhat:rhel_eus:9.2::crb", "cpe:/o:redhat:rhel_eus:9.2::baseos" ]
null
7
null
null
RHSA-2016:1986
Red Hat Security Advisory: Red Hat Enterprise Linux 4 Extended Life Cycle Support Six-Month Notice
This is the Six-Month notification for the retirement of Red Hat Enterprise Linux 4 Extended Life Cycle Support Add-On (ELS). This notification applies only to those customers subscribed to the Extended Life Cycle Support (ELS) channel for Red Hat Enterprise Linux 4.
[ "cpe:/o:redhat:rhel_els:4::as", "cpe:/o:redhat:rhel_els:4::es" ]
null
null
null
null
RHSA-2023:7854
Red Hat Security Advisory: Red Hat Single Sign-On 7.6.6 security update on RHEL 7
keycloak: reflected XSS via wildcard in OIDC redirect_uri keycloak: redirect_uri validation bypass keycloak: offline session token DoS
[ "cpe:/a:redhat:red_hat_single_sign_on:7.6::el7" ]
null
7.7
null
null
RHSA-2021:0774
Red Hat Security Advisory: kernel-rt security and bug fix update
kernel: bad kfree in auditfilter.c may lead to escalation of privilege kernel: performance counters race condition use-after-free kernel: Local buffer overflow in ctnetlink_parse_tuple_filter in net/netfilter/nf_conntrack_netlink.c kernel: ICMP rate limiting can be used for DNS poisoning attack kernel: locking issue in drivers/tty/tty_jobctrl.c can lead to an use-after-free
[ "cpe:/a:redhat:rhel_eus:8.2::nfv", "cpe:/a:redhat:rhel_eus:8.2::realtime" ]
null
7.8
null
null
RHSA-2019:3833
Red Hat Security Advisory: kernel-rt security update
hw: Machine Check Error on Page Size Change (IFU) hw: Intel GPU Denial Of Service while accessing MMIO in lower power state hw: TSX Transaction Asynchronous Abort (TAA)
[ "cpe:/a:redhat:enterprise_linux:8::nfv", "cpe:/a:redhat:enterprise_linux:8::realtime" ]
null
null
6.5
null
RHSA-2008:0145
Red Hat Security Advisory: ImageMagick security update
Heap overflow in ImageMagick's DCM and XWD coders Infinite loops in ImageMagick's XCF and DCM coders Multiple integer overflows in ImageMagick Integer overflow in ImageMagick's DIB coder Out of bound write in ImageMagick's XCF coder Memory corruption in ImageMagick's PCX coder
[ "cpe:/o:redhat:enterprise_linux:3::as", "cpe:/o:redhat:enterprise_linux:3::desktop", "cpe:/o:redhat:enterprise_linux:3::es", "cpe:/o:redhat:enterprise_linux:3::ws", "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws", "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::client_workstation", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
RHSA-2022:0184
Red Hat Security Advisory: gegl04 security update
gegl: shell expansion via a crafted pathname
[ "cpe:/a:redhat:rhel_eus:8.2::appstream", "cpe:/a:redhat:rhel_eus:8.2::crb" ]
null
7.8
null
null
RHSA-2019:0380
Red Hat Security Advisory: Red Hat Single Sign-On 7.2.6 security update
wildfly-core: Cross-site scripting (XSS) in JBoss Management Console undertow: Infoleak in some circumstances where Undertow can serve data from a random buffer dom4j: XML Injection in Class: Element. Methods: addElement, addAttribute which can impact the integrity of XML documents
[ "cpe:/a:redhat:jboss_single_sign_on:7.2" ]
null
null
5.3
null
RHSA-2023:3560
Red Hat Security Advisory: firefox security update
Mozilla: Click-jacking certificate exceptions through rendering lag Mozilla: Memory safety bugs fixed in Firefox 114 and Firefox ESR 102.12
[ "cpe:/a:redhat:rhel_eus:8.6::appstream" ]
null
9.8
null
null
RHBA-2010:0266
Red Hat Bug Fix Advisory: cman bug fix and enhancement update
cman/fence: insecure temporary file usage in the egenera fence agent
[ "cpe:/o:redhat:enterprise_linux:5::client_workstation", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
RHSA-2020:5571
Red Hat Security Advisory: python-XStatic-Bootstrap-SCSS security update
bootstrap: XSS in the data-target attribute bootstrap: Cross-site Scripting (XSS) in the data-container property of tooltip bootstrap: XSS in the tooltip data-viewport attribute bootstrap: XSS in the affix configuration target property bootstrap: XSS in the tooltip or popover data-template attribute
[ "cpe:/a:redhat:openstack:13::el7" ]
null
null
6.1
null
RHSA-2024:1141
Red Hat Security Advisory: mysql security update
zstd: mysql: buffer overrun in util.c mysql: InnoDB unspecified vulnerability (CPU Apr 2023) mysql: Server: DDL unspecified vulnerability (CPU Apr 2023) mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2023) mysql: Server: DDL unspecified vulnerability (CPU Apr 2023) mysql: Server: DDL unspecified vulnerability (CPU Apr 2023) mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2023) mysql: Server: Components Services unspecified vulnerability (CPU Apr 2023) mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2023) mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2023) mysql: Server: Components Services unspecified vulnerability (CPU Apr 2023) mysql: Server: Partition unspecified vulnerability (CPU Apr 2023) mysql: Server: Partition unspecified vulnerability (CPU Apr 2023) mysql: Server: Components Services unspecified vulnerability (CPU Apr 2023) mysql: Server: JSON unspecified vulnerability (CPU Apr 2023) mysql: Server: DML unspecified vulnerability (CPU Apr 2023) mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2023) mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2023) mysql: Client programs unspecified vulnerability (CPU Apr 2023) mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2023) mysql: Server: Replication unspecified vulnerability (CPU Jul 2023) mysql: Server: Replication unspecified vulnerability (CPU Jul 2023) mysql: InnoDB unspecified vulnerability (CPU Jul 2023) mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2023) mysql: InnoDB unspecified vulnerability (CPU Jul 2023) mysql: Server: Security: Privileges unspecified vulnerability (CPU Jul 2023) mysql: Server: Optimizer unspecified vulnerability (CPU Jul 2023) mysql: Server: Pluggable Auth unspecified vulnerability (CPU Jul 2023) mysql: Client programs unspecified vulnerability (CPU Jul 2023) mysql: Server: Optimizer unspecified vulnerability (CPU Jul 2023) mysql: Server: Optimizer unspecified vulnerability (CPU Jul 2023) mysql: Server: Replication unspecified vulnerability (CPU Jul 2023) mysql: Server: DDL unspecified vulnerability (CPU Jul 2023) mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2023) mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2023) mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2023) mysql: InnoDB unspecified vulnerability (CPU Oct 2023) mysql: InnoDB unspecified vulnerability (CPU Oct 2023) mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2023) mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2023) mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2023) mysql: InnoDB unspecified vulnerability (CPU Oct 2023) mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2023) mysql: InnoDB unspecified vulnerability (CPU Oct 2023) mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2023) mysql: InnoDB unspecified vulnerability (CPU Oct 2023) mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2023) mysql: Server: UDF unspecified vulnerability (CPU Oct 2023) mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2023) mysql: Server: Security: Encryption unspecified vulnerability (CPU Oct 2023) mysql: InnoDB unspecified vulnerability (CPU Oct 2023) mysql: Server: DML unspecified vulnerability (CPU Oct 2023) mysql: Server: RAPID unspecified vulnerability (CPU Jan 2024) mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2024) mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2024) mysql: Server: Security: Encryption unspecified vulnerability (CPU Jan 2024) mysql: Server: Security: Privileges unspecified vulnerability (CPU Jan 2024) mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2024) mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2024) mysql: Server: Replication unspecified vulnerability (CPU Jan 2024) mysql: Server: Options unspecified vulnerability (CPU Jan 2024) mysql: Server: DDL unspecified vulnerability (CPU Jan 2024) mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2024) mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2024) mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2024) mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2024) mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2024) mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2024) mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2024) mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2024) mysql: Server: DDL unspecified vulnerability (CPU Jan 2024) mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2024) mysql: Server: DML unspecified vulnerability (CPU Jan 2024) mysql: Server : Security : Firewall unspecified vulnerability (CPU Jan 2024) mysql: Server: UDF unspecified vulnerability (CPU Jan 2024) mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2024) mysql: Server: DML unspecified vulnerability (CPU Apr 2024) mysql: Server: DML unspecified vulnerability (CPU Apr 2024) mysql: Server: DML unspecified vulnerability (CPU Apr 2024) mysql: Server: DML unspecified vulnerability (CPU Apr 2024) mysql: Server: DML unspecified vulnerability (CPU Apr 2024) mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2024) mysql: Server: DML unspecified vulnerability (CPU Apr 2024) mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2024) mysql: Server: Audit Plug-in unspecified vulnerability (CPU Apr 2024) mysql: Optimizer unspecified vulnerability (CPU Jul 2024) mysql: Optimizer unspecified vulnerability (CPU Oct 2024)
[ "cpe:/a:redhat:enterprise_linux:9::appstream", "cpe:/a:redhat:enterprise_linux:9::crb" ]
null
4.9
null
null
RHSA-2022:1589
Red Hat Security Advisory: kernel security update
kernel: remote stack overflow via kernel panic on systems using TIPC may lead to DoS
[ "cpe:/o:redhat:rhel_e4s:8.1::baseos" ]
null
7.1
null
null
RHBA-2012:0319
Red Hat Bug Fix Advisory: gnutls bug fix update
gnutls: unknown hash algorithm NULL pointer derefence [GNUTLS-SA-2006-2]
[ "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::client_workstation", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
RHSA-2022:8980
Red Hat Security Advisory: thunderbird security update
Mozilla: Service Workers might have learned size of cross-origin media files Mozilla: Fullscreen notification bypass Mozilla: Use-after-free in InputStream implementation Mozilla: Use-after-free of a JavaScript Realm Mozilla: Fullscreen notification bypass via windowName Mozilla: Use-after-free in Garbage Collection Mozilla: ServiceWorker-intercepted requests bypassed SameSite cookie policy Mozilla: Cross-Site Tracing was possible via non-standard override headers Mozilla: Symlinks may resolve to partially uninitialized buffers Mozilla: Keystroke Side-Channel Leakage Mozilla: Custom mouse cursor could have been drawn over browser UI Mozilla: Iframe contents could be rendered outside the iframe Mozilla: Memory safety bugs fixed in Firefox 107 and Firefox ESR 102.5
[ "cpe:/a:redhat:rhel_eus:9.0::appstream" ]
null
8.8
6.1
null
RHSA-2024:2090
Red Hat Security Advisory: container-tools:rhel8 security update
buildah: full container escape at build time
[ "cpe:/a:redhat:rhel_eus:8.6::appstream" ]
null
8.6
null
null
RHSA-2020:2773
Red Hat Security Advisory: virt:rhel security update
QEMU: Slirp: potential OOB access due to unsafe snprintf() usages
[ "cpe:/a:redhat:rhel_eus:8.1::appstream", "cpe:/a:redhat:rhel_eus:8.1::crb" ]
null
5.6
null
null
RHSA-2025:2660
Red Hat Security Advisory: libxml2 security update
libxml2: Use-After-Free in libxml2 libxml2: Stack-based buffer overflow in xmlSnprintfElements of libxml2
[ "cpe:/a:redhat:rhel_aus:8.4::appstream", "cpe:/a:redhat:rhel_e4s:8.4::appstream", "cpe:/a:redhat:rhel_tus:8.4::appstream", "cpe:/o:redhat:rhel_aus:8.4::baseos", "cpe:/o:redhat:rhel_e4s:8.4::baseos", "cpe:/o:redhat:rhel_tus:8.4::baseos" ]
null
7.8
null
null
RHSA-2023:1586
Red Hat Security Advisory: pesign security update
pesign: Local privilege escalation on pesign systemd service
[ "cpe:/a:redhat:rhel_e4s:8.1::appstream" ]
null
7.8
null
null
RHSA-2007:0345
Red Hat Security Advisory: vixie-cron security update
crontab denial of service
[ "cpe:/o:redhat:enterprise_linux:3::as", "cpe:/o:redhat:enterprise_linux:3::desktop", "cpe:/o:redhat:enterprise_linux:3::es", "cpe:/o:redhat:enterprise_linux:3::ws", "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws", "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
RHSA-2024:10979
Red Hat Security Advisory: python3.11 security update
python: Virtual environment (venv) activation scripts don't quote paths
[ "cpe:/a:redhat:enterprise_linux:8::appstream", "cpe:/a:redhat:enterprise_linux:8::crb" ]
null
6.3
null
null
RHSA-2018:1979
Red Hat Security Advisory: pki-core security, bug fix, and enhancement update
pki-core: Mishandled ACL configuration in AAclAuthz.java reverses rules that allow and deny access
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
7.5
null
RHSA-2021:1384
Red Hat Security Advisory: nss security and bug fix update
nss: TLS 1.3 CCS flood remote DoS Attack
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
7.5
null
null
RHSA-2024:6503
Red Hat Security Advisory: Red Hat build of Keycloak 24.0.7 Update
keycloak-core: Open Redirect on Account page keycloak-core: One Time Passcode (OTP) is valid longer than expiration timeSeverity wildfly-elytron: org.keycloak/keycloak-services: session fixation in elytron saml adapters
[ "cpe:/a:redhat:build_keycloak:24" ]
null
7.1
null
null
RHSA-2023:2654
Red Hat Security Advisory: nodejs:18 security, bug fix, and enhancement update
glob-parent: Regular Expression Denial of Service c-ares: buffer overflow in config_sortlist() due to missing string length check http-cache-semantics: Regular Expression Denial of Service (ReDoS) vulnerability Node.js: Permissions policies can be bypassed via process.mainModule Node.js: OpenSSL error handling issues in nodejs crypto library Node.js: insecure loading of ICU data through ICU_DATA environment variable Node.js: Fetch API did not protect against CRLF injection in host headers Node.js: Regular Expression Denial of Service in Headers fetch API
[ "cpe:/a:redhat:enterprise_linux:9::appstream" ]
null
7.5
null
null
RHSA-2020:2670
Red Hat Security Advisory: pcs security and bug fix update
rubygem-json: Unsafe object creation vulnerability in JSON
[ "cpe:/a:redhat:rhel_eus:8.1::highavailability", "cpe:/a:redhat:rhel_eus:8.1::resilientstorage" ]
null
7.3
null
null
RHSA-2017:1233
Red Hat Security Advisory: kernel security update
kernel: Race condition access to n_hdlc.tbuf causes double free in n_hdlc_release()
[ "cpe:/o:redhat:rhel_eus:6.7::computenode", "cpe:/o:redhat:rhel_eus:6.7::server" ]
null
null
7.8
null
RHSA-2021:0306
Red Hat Security Advisory: flatpak security update
flatpak: sandbox escape via spawn portal
[ "cpe:/a:redhat:rhel_eus:8.1::appstream" ]
null
8.8
null
null
RHSA-2017:2585
Red Hat Security Advisory: kernel-rt security and bug fix update
kernel: a race between inotify_handle_event() and sys_rename()
[ "cpe:/a:redhat:rhel_extras_rt:7" ]
null
null
7.8
null
RHSA-2020:3462
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.3.2 security update
hibernate: SQL injection issue in Hibernate ORM EAP: field-name is not parsed in accordance to RFC7230 Wildfly: Improper authorization issue in WildFlySecurityManager when using alternative protection domain jackson-databind: mishandles the interaction between serialization gadgets and typing which could result in remote command execution jackson-databind: mishandles the interaction between serialization gadgets and typing which could result in remote command execution dom4j: XML External Entity vulnerability in default SAX parser Undertow: Incomplete fix for CVE-2017-2666 due to permitting invalid characters in HTTP requests hibernate-validator: Improper input validation in the interpolation of constraint error messages wildfly-elytron: session fixation when using FORM authentication wildfly: exposed setting of TCCL via the EmbeddedManagedProcess API wildfly: unsafe deserialization in Wildfly Enterprise Java Beans netty: compression/decompression codecs don't enforce limits on buffer allocation sizes wildfly: Some EJB transaction objects may get accumulated causing Denial of Service wildfly: EJB SessionOpenInvocations may not be removed properly after a response is received causing Denial of Service
[ "cpe:/a:redhat:jboss_enterprise_application_platform:7.3::el7" ]
null
6.5
4.8
null
RHSA-2023:5945
Red Hat Security Advisory: Red Hat AMQ Broker 7.10.4 release and security update
HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack)
[ "cpe:/a:redhat:amq_broker:7" ]
null
7.5
null
null
RHSA-2016:0715
Red Hat Security Advisory: kernel security, bug fix, and enhancement update
kernel: x86-64: IRET faults during NMIs processing kernel: SCTP denial of service during timeout
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
null
null
RHSA-2020:4484
Red Hat Security Advisory: expat security update
expat: large number of colons in input makes parser consume high amount of resources, leading to DoS expat: heap-based buffer over-read via crafted XML input
[ "cpe:/o:redhat:enterprise_linux:8::baseos" ]
null
7.5
7.5
null
RHSA-2013:0907
Red Hat Security Advisory: rhev-hypervisor6 security and bug fix update
vdsm: unfiltered guestInfo dictionary DoS kernel: kvm: pv_eoi guest updates with interrupts disabled
[ "cpe:/o:redhat:enterprise_linux:6::hypervisor" ]
null
null
null
null
RHSA-2010:0808
Red Hat Security Advisory: firefox security update
Firefox race condition flaw (MFSA 2010-73)
[ "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws" ]
null
null
null
null