id
stringlengths
13
15
title
stringlengths
29
176
description
stringlengths
8
32.1k
cpes
listlengths
0
20
cvss_v4_0
null
cvss_v3_1
float64
0
10
cvss_v3_0
float64
0
10
cvss_v2_0
null
RHSA-2024:6188
Red Hat Security Advisory: runc security update
golang: crypto/x509: Verify panics on certificates with an unknown public key algorithm
[ "cpe:/a:redhat:enterprise_linux:9::appstream" ]
null
5.9
null
null
RHSA-2002:128
Red Hat Security Advisory: Updated kernel with information security fixes, bug fixes, and updated drivers
security flaw
[ "cpe:/o:redhat:enterprise_linux:2.1::as" ]
null
null
null
null
RHSA-2024:5231
Red Hat Security Advisory: bind and bind-dyndb-ldap security update
bind: bind9: BIND's database will be slow if a very large number of RRs exist at the same nam bind9: bind: SIG(0) can be used to exhaust CPU resources bind: bind9: Assertion failure when serving both stale cache data and authoritative zone content
[ "cpe:/a:redhat:enterprise_linux:9::appstream", "cpe:/a:redhat:enterprise_linux:9::crb" ]
null
7.5
null
null
RHSA-2021:3392
Red Hat Security Advisory: kpatch-patch security update
kernel: race condition for removal of the HCI controller
[ "cpe:/o:redhat:rhel_e4s:7.6::server" ]
null
7
null
null
RHSA-2015:0957
Red Hat Security Advisory: spacewalk-java security update
Satellite5: RPC API XML External Entities file disclosure
[ "cpe:/a:redhat:network_satellite:5.7::el6" ]
null
null
null
null
RHSA-2019:0972
Red Hat Security Advisory: openwsman security update
openwsman: Disclosure of arbitrary files outside of the registered URIs
[ "cpe:/a:redhat:enterprise_linux:8::appstream", "cpe:/a:redhat:enterprise_linux:8::crb" ]
null
null
7.5
null
RHSA-2015:1904
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 6.4.4 update
AS/WildFly: missing X-Frame-Options header leading to clickjacking EAP: CSRF vulnerability in EAP & WildFly Web Console OOME from EAP 6 http management console
[ "cpe:/a:redhat:jboss_enterprise_application_platform:6::el5" ]
null
null
null
null
RHSA-2018:3831
Red Hat Security Advisory: firefox security update
Mozilla: Memory safety bugs fixed in Firefox 64 and Firefox ESR 60.4 firefox: Memory corruption in Angle Mozilla: Use-after-free with select element Mozilla: Buffer overflow in accelerated 2D canvas with Skia Mozilla: Same-origin policy violation using location attribute and performance.getEntries to steal cross-origin URLs Mozilla: Integer overflow when calculating buffer sizes for images
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
9.8
null
RHSA-2024:0233
Red Hat Security Advisory: java-11-openjdk security update
OpenJDK: array out-of-bounds access due to missing range check in C1 compiler (8314468) OpenJDK: JVM class file verifier flaw allows unverified bytecode execution (8314295) OpenJDK: range check loop optimization issue (8314307) OpenJDK: arbitrary Java code execution in Nashorn (8314284) OpenJDK: logging of digital signature private keys (8316976) OpenJDK: RSA padding issue and timing side-channel attack against TLS (8317547)
[ "cpe:/a:redhat:rhel_aus:8.2::appstream", "cpe:/a:redhat:rhel_e4s:8.2::appstream", "cpe:/a:redhat:rhel_tus:8.2::appstream" ]
null
7.4
null
null
RHSA-2023:3557
Red Hat Security Advisory: openshift-gitops-kam security update
go-restful: Authorization Bypass Through User-Controlled Key
[ "cpe:/a:redhat:openshift_gitops:1.9::el9" ]
null
9.1
null
null
RHBA-2020:0547
Red Hat Bug Fix Advisory: Container Image Rebuild for Ansible Tower 3.4 Dependency
glibc: getaddrinfo should reject IP addresses with trailing characters ROHNP: Key Extraction Side Channel in Multiple Crypto Libraries openssl: timing side channel attack in the DSA signature algorithm procps: Local privilege escalation in top LibRaw: DoS in parse_rollei function in internal/dcraw_common.cpp LibRaw: DoS in parse_sinar_ia function in internal/dcraw_common.cpp nss: Cache side-channel variant of the Bleichenbacher attack binutils: Stack Exhaustion in the demangling functions provided by libiberty binutils: NULL pointer dereference in work_stuff_copy_to_from in cplus-dem.c. curl: NTLM password overflow via integer overflow python: Missing salt initialization in _elementtree.c module systemd: line splitting via fgets() allows for state injection during daemon-reexec elfutils: Heap-based buffer over-read in libdw/dwarf_getaranges.c:dwarf_getaranges() via crafted file elfutils: Double-free due to double decompression of sections in crafted ELF causes crash elfutils: Heap-based buffer over-read in libdw/dwarf_getabbrev.c and libwd/dwarf_hasattr.c causes crash curl: Heap-based buffer over-read in the curl tool warning formatting systemd: out-of-bounds read when parsing a crafted syslog message systemd: kills privileged process if unprivileged PIDFile was tampered elfutils: invalid memory address dereference was discovered in dwfl_segment_report_module.c in libdwfl elfutils: eu-size cannot handle recursive ar files elfutils: Divide-by-zero in arlib_add_symbols function in arlib.c krb5: Reachable assertion in the KDC using S4U2Self requests binutils: integer overflow leads to heap-based buffer overflow in objdump openssl: 0-byte record padding oracle libssh2: Zero-byte allocation with a specially crafted SFTP packed leading to an out-of-bounds read libssh2: Out-of-bounds reads with specially crafted SSH packets libssh2: Out-of-bounds memory comparison with specially crafted message channel request python: NULL pointer dereference using a specially crafted X509 certificate elfutils: heap-based buffer over-read in read_srclines in dwarf_getsrclines.c in libdw elfutils: segmentation fault in elf64_xlatetom in libelf/elf32_xlatetom.c elfutils: out of bound write in elf_cvt_note in libelf/note_xlate.h elfutils: heap-based buffer over-read in function elf32_xlatetom in elf32_xlatetom.c python: CRLF injection via the query part of the url passed to urlopen() python: CRLF injection via the path part of the url passed to urlopen() python: Undocumented local_file protocol allows remote attackers to bypass protection mechanisms nss: Empty or malformed p256-ECDH public keys may trigger a segmentation fault nss: Out-of-bounds write when passing an output buffer smaller than the block size to NSC_EncryptUpdate sqlite: fts3: improve shadow table corruption detection ansible: shell enabled by default in a pipe lookup plugin subprocess ansible: path injection on dest parameter in fetch module ansible: atomic_move primitive sets permissive permissions ansible: Extract-Zip function in win_unzip module does not check extracted path ansible: module package can be selected by the ansible facts ansible: svn module leaks password when specified as a parameter ansible: secrets readable after ansible-vault edit ansible: Information disclosure issue in ldap_attr and ldap_entry modules Ansible: kubectl connection plugin leaks sensitive information Ansible: code injection when using ansible_facts as a subkey Ansible: modules which use files encrypted with vault are not properly cleaned up
[ "cpe:/a:redhat:ansible_tower:3.4::el7" ]
null
5
8.1
null
RHSA-2024:0930
Red Hat Security Advisory: kernel security update
kernel: malicious data for FBIOPUT_VSCREENINFO ioctl may cause OOB write memory kernel: KVM: nVMX: missing IBPB when exiting from nested guest can lead to Spectre v2 attacks kernel: media: em28xx: initialize refcount before kref_get kernel: use-after-free after failed devlink reload in devlink_param_get kernel: net/packet: slab-out-of-bounds access in packet_recvmsg() hw: cpu: arm64: Spectre-BHB kernel: use-after-free due to improper update of reference count in net/sched/cls_u32.c kernel: vmwgfx: integer overflow in vmwgfx_execbuf.c kernel: vmwgfx: NULL pointer dereference in vmw_cmd_dx_define_query kernel: vmwgfx: use-after-free in vmw_cmd_res_check kernel: vmwgfx: use-after-free in vmw_execbuf_tie_context kernel: sctp: fail if no bound addresses can be used for a given scope kernel: GSM multiplexing race condition leads to privilege escalation kernel: Out of boundary write in perf_read_group() as result of overflow a perf_event's read_size kernel: KVM: nVMX: missing consistency checks for CR0 and CR4 kernel: blocking operation in dvb_frontend_get_event and wait_event_interruptible kernel: use-after-free in amdgpu_cs_wait_all_fences in drivers/gpu/drm/amd/amdgpu/amdgpu_cs.c kernel: nf_tables: use-after-free vulnerability in the nft_verdict_init() function
[ "cpe:/a:redhat:rhel_eus:8.6::crb", "cpe:/o:redhat:rhel_eus:8.6::baseos", "cpe:/o:redhat:rhev_hypervisor:4.4::el8" ]
null
7.8
null
null
RHSA-2024:7785
Red Hat Security Advisory: python-gevent security update
python-gevent: privilege escalation via a crafted script to the WSGIServer component
[ "cpe:/a:redhat:rhel_aus:8.2::appstream" ]
null
9.1
null
null
RHSA-2011:0329
Red Hat Security Advisory: kernel security update
kernel: deficiency in handling of invalid data packets in lockd
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
null
null
RHSA-2018:2321
Red Hat Security Advisory: Red Hat Virtualization security, bug fix, and enhancement update
ansible: Inventory variables are loaded from current working directory when running ad-hoc command that can lead to code execution ansible: ansible.cfg is being read from current working directory allowing possible code execution
[ "cpe:/o:redhat:enterprise_linux:7::hypervisor" ]
null
null
7.8
null
RHSA-2008:0300
Red Hat Security Advisory: bind security, bug fix, and enhancement update
bind: /etc/rndc.key has 644 permissions by default libbind off-by-one buffer overflow
[ "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::client_workstation", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
RHSA-2004:304
Red Hat Security Advisory: pam security update
security flaw
[ "cpe:/o:redhat:enterprise_linux:2.1::as", "cpe:/o:redhat:enterprise_linux:2.1::aw", "cpe:/o:redhat:enterprise_linux:2.1::es", "cpe:/o:redhat:enterprise_linux:2.1::ws" ]
null
null
null
null
RHEA-2021:2679
Red Hat Enhancement Advisory: ACS 3.62 enhancement update
golang: net/http: panic in ReadRequest and ReadResponse when reading a very large header
[ "cpe:/a:redhat:advanced_cluster_security:3.62::el8" ]
null
5.9
null
null
RHSA-2007:0465
Red Hat Security Advisory: pam security and bug fix update
security flaw security flaw
[ "cpe:/o:redhat:enterprise_linux:3::as", "cpe:/o:redhat:enterprise_linux:3::desktop", "cpe:/o:redhat:enterprise_linux:3::es", "cpe:/o:redhat:enterprise_linux:3::ws" ]
null
null
null
null
RHSA-2024:8104
Red Hat Security Advisory: edk2 security update
edk2: Infinite loop when parsing unknown options in the Destination Options header edk2: Infinite loop when parsing a PadN option in the Destination Options header
[ "cpe:/a:redhat:rhel_eus:8.8::appstream" ]
null
7.5
null
null
RHBA-2019:3408
Red Hat Bug Fix Advisory: openjpeg2 bug fix and enhancement update
openjpeg2: Excessive iteration in openjp2/t1.c:opj_t1_encode_cblks can allow for denial of service via crafted BMP file
[ "cpe:/a:redhat:enterprise_linux:8::appstream", "cpe:/a:redhat:enterprise_linux:8::crb" ]
null
null
3.3
null
RHSA-2015:1643
Red Hat Security Advisory: kernel security and bug fix update
kernel: ping sockets: use-after-free leading to local privilege escalation
[ "cpe:/o:redhat:rhel_aus:6.4::server" ]
null
null
null
null
RHSA-2015:1081
Red Hat Security Advisory: kernel security, bug fix, and enhancement update
kernel: partial ASLR bypass through TLS base addresses leak Kernel: fs: isofs: infinite loop in CE record entries kernel: ASLR bruteforce possible for vdso library kernel: pipe: iovec overrun leading to memory corruption Kernel: crypto: buffer overruns in RFC4106 implementation using AESNI
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
null
null
RHSA-2024:4619
Red Hat Security Advisory: libndp security update
libndp: buffer overflow in route information length field
[ "cpe:/o:redhat:rhel_e4s:9.0::baseos" ]
null
8.1
null
null
RHSA-2016:0358
Red Hat Security Advisory: openstack-glance security update
openstack-glance: Glance image status manipulation through locations
[ "cpe:/a:redhat:openstack:5::el6" ]
null
null
null
null
RHSA-2002:302
Red Hat Security Advisory: vim security update
security flaw
[ "cpe:/o:redhat:enterprise_linux:2.1::as", "cpe:/o:redhat:enterprise_linux:2.1::aw" ]
null
null
null
null
RHSA-2020:5399
Red Hat Security Advisory: thunderbird security update
Mozilla: Stack overflow due to incorrect parsing of SMTP server response codes
[ "cpe:/a:redhat:rhel_eus:8.2::appstream" ]
null
8.8
null
null
RHSA-2020:0513
Red Hat Security Advisory: flash-plugin security update
flash-plugin: Arbitrary Code Execution vulnerability (APSB20-06)
[ "cpe:/a:redhat:rhel_extras:6" ]
null
null
8.8
null
RHSA-2016:0118
Red Hat Security Advisory: Red Hat JBoss Operations Network 3.3.5 update
groovy: remote execution of untrusted code in class MethodClosure apache-commons-collections: InvokerTransformer code execution during deserialisation
[ "cpe:/a:redhat:jboss_operations_network:3.3" ]
null
null
9.6
null
RHSA-2024:2877
Red Hat Security Advisory: OpenShift Container Platform 4.13.42 packages and security update
buildah: full container escape at build time jose-go: improper handling of highly compressed data
[ "cpe:/a:redhat:openshift:4.13::el8", "cpe:/a:redhat:openshift:4.13::el9" ]
null
4.3
null
null
RHSA-2024:4003
Red Hat Security Advisory: thunderbird security update
Mozilla: Use-after-free in JavaScript object transplant Mozilla: External protocol handlers leaked by timing attack Mozilla: Sandboxed iframes were able to bypass sandbox restrictions to open a new window Mozilla: Cross-Origin Image leak via Offscreen Canvas Mozilla: Memory Corruption in Text Fragments Mozilla: Memory safety bugs fixed in Firefox 127, Firefox ESR 115.12, and Thunderbird 115.12 Mozilla: Use-after-free in networking
[ "cpe:/a:redhat:rhel_aus:8.4::appstream", "cpe:/a:redhat:rhel_e4s:8.4::appstream", "cpe:/a:redhat:rhel_tus:8.4::appstream" ]
null
7.5
null
null
RHSA-2015:0806
Red Hat Security Advisory: java-1.7.0-openjdk security update
jar: directory traversal vulnerability OpenJDK: incorrect handling of phantom references (Hotspot, 8071931) ICU: layout engine glyphStorage off-by-one (OpenJDK 2D, 8067699) OpenJDK: incorrect permissions check in resource loading (Beans, 8068320) OpenJDK: insufficient hardening of RSA-CRT implementation (JCE, 8071726) OpenJDK: jar directory traversal issues (Tools, 8064601) OpenJDK: certificate options parsing uncaught exception (JSSE, 8068720)
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation", "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
null
null
RHSA-2020:2506
Red Hat Security Advisory: Red Hat JBoss Web Server 5.3.1 security update
tomcat: deserialization flaw in session persistence storage leading to RCE
[ "cpe:/a:redhat:jboss_enterprise_web_server:5.3::el6", "cpe:/a:redhat:jboss_enterprise_web_server:5.3::el7", "cpe:/a:redhat:jboss_enterprise_web_server:5.3::el8" ]
null
7
null
null
RHSA-2008:0616
Red Hat Security Advisory: thunderbird security update
mozilla: CSS reference counter overflow (ZDI-CAN-349) Firefox malformed web content flaws Firefox javascript arbitrary code execution Firefox XSS attacks Firefox arbitrary signed JAR code execution Firefox arbitrary JavaScript code execution Firefox javascript arbitrary code execution Firefox arbitrary file disclosure Firefox .properties memory leak Firefox file location escaping flaw Firefox self signed certificate flaw Firefox arbitrary file disclosure Firefox block reflow flaw
[ "cpe:/a:redhat:rhel_productivity:5", "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws", "cpe:/o:redhat:enterprise_linux:5::client" ]
null
null
null
null
RHSA-2011:1102
Red Hat Security Advisory: libsoup security update
libsoup: SoupServer directory traversal flaw
[ "cpe:/o:redhat:enterprise_linux:6::server" ]
null
null
null
null
RHSA-2020:0903
Red Hat Security Advisory: zsh security update
zsh: insecure dropping of privileges when unsetting PRIVILEGED option
[ "cpe:/a:redhat:enterprise_linux:8::appstream", "cpe:/o:redhat:enterprise_linux:8::baseos" ]
null
7.8
null
null
RHSA-2007:0155
Red Hat Security Advisory: php security update
gd: buffer overrun security flaw security flaw security flaw security flaw security flaw security flaw
[ "cpe:/o:redhat:enterprise_linux:3::as", "cpe:/o:redhat:enterprise_linux:3::desktop", "cpe:/o:redhat:enterprise_linux:3::es", "cpe:/o:redhat:enterprise_linux:3::ws", "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws" ]
null
null
null
null
RHSA-2003:307
Red Hat Security Advisory: : Updated zebra packages fix security vulnerabilities
security flaw security flaw
[ "cpe:/o:redhat:linux:7.2", "cpe:/o:redhat:linux:7.3", "cpe:/o:redhat:linux:8.0", "cpe:/o:redhat:linux:9" ]
null
null
null
null
RHSA-2021:1811
Red Hat Security Advisory: libvncserver security update
libvncserver: uninitialized memory contents are vulnerable to Information Leak libvncserver: buffer overflow in ConnectClientToUnixSock() libvncserver: libvncserver/rfbregion.c has a NULL pointer dereference libvncserver: libvncclient/rfbproto.c does not limit TextChat size libvncserver: libvncserver/rfbserver.c has a divide by zero which could result in DoS
[ "cpe:/a:redhat:enterprise_linux:8::appstream", "cpe:/a:redhat:enterprise_linux:8::crb" ]
null
7.5
null
null
RHSA-2011:0013
Red Hat Security Advisory: wireshark security update
Wireshark: Stack-based array index error in ENTTEC dissector (upstream bug #5539)
[ "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws", "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::client_workstation", "cpe:/o:redhat:enterprise_linux:5::server", "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
null
null
RHSA-2009:1560
Red Hat Security Advisory: java-1.6.0-sun security update
deprecate MD2 in SSL cert validation (Kaminsky) OpenJDK ICC_Profile file existence detection information leak (6631533) JRE TrueType font parsing crash (6815780) java-1.6.0-sun: ACE in JRE Deployment Toolkit (6869752) java-1.6.0-sun: Privilege escalation in the Java Web Start Installer (6872824) java-1.6.0-sun: Stack-based buffer overflow via a long file: URL argument (6854303) java-1.6.0-sun: Privilege escalation via crafted image file due improper color profiles parsing (6862970) OpenJDK JRE AWT setDifflCM stack overflow (6872357) OpenJDK JRE AWT setBytePixels heap overflow (6872358) JRE JPEG JFIF Decoder issue (6862969) OpenJDK JPEG Image Writer quantization problem (6862968) OpenJDK ImageI/O JPEG heap overflow (6874643) OpenJDK MessageDigest.isEqual introduces timing attack vulnerabilities (6863503) OpenJDK ASN.1/DER input stream parser denial of service (6864911) CVE-2009-3877 OpenJDK ASN.1/DER input stream parser denial of service (6864911) CVE-2009-3877 OpenJDK GraphicsConfiguration information leak(6822057) OpenJDK UI logging information leakage(6664512) OpenJDK resurrected classloaders can still have children (6636650) OpenJDK information leaks in mutable variables (6657026,6657138) OpenJDK information leaks in mutable variables (6657026,6657138) OpenJDK zoneinfo file existence information leak (6824265) REGRESSION: have problem to run JNLP app and applets with signed Jar files (6870531)
[ "cpe:/a:redhat:rhel_extras:4", "cpe:/a:redhat:rhel_extras:5::client", "cpe:/a:redhat:rhel_extras:5::server" ]
null
null
null
null
RHSA-2024:0975
Red Hat Security Advisory: postgresql:13 security update
postgresql: non-owner 'REFRESH MATERIALIZED VIEW CONCURRENTLY' executes arbitrary SQL
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
8
null
null
RHSA-2023:5048
Red Hat Security Advisory: flac security update
flac: Remote Code Execution (RCE) via the bitwriter_grow_ function, by supplying crafted input to the encoder
[ "cpe:/a:redhat:enterprise_linux:9::appstream", "cpe:/a:redhat:enterprise_linux:9::crb" ]
null
7.8
null
null
RHSA-2012:0137
Red Hat Security Advisory: texlive security update
t1lib: Heap based buffer overflow in DVI file AFM font parser t1lib: Heap-based buffer overflow DVI file AFM font parser t1lib: Invalid pointer dereference via crafted Type 1 font t1lib: invalid read crash via crafted Type 1 font t1lib: Use-after-free via crafted Type 1 font t1lib: Off-by-one via crafted Type 1 font
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
null
null
RHSA-2011:1087
Red Hat Security Advisory: java-1.5.0-ibm security update
JDK: unspecified vulnerabilities fixed in 6u26 (Sound) JDK: unspecified vulnerabilities fixed in 6u26 (Sound) OpenJDK: integer overflows in JPEGImageReader and font SunLayoutEngine (2D, 7013519) OpenJDK: Deserialization allows creation of mutable SignedObject (Deserialization, 6618658) OpenJDK: NetworkInterface information leak (Networking, 7013969) OpenJDK: MediaTracker created Component instances with unnecessary privileges (Swing, 7020198) JDK: unspecified vulnerability fixed in 6u26 (2D)
[ "cpe:/a:redhat:rhel_extras:4", "cpe:/a:redhat:rhel_extras:5::client", "cpe:/a:redhat:rhel_extras:5::server", "cpe:/a:redhat:rhel_extras:6" ]
null
null
null
null
RHSA-2023:0777
Red Hat Security Advisory: OpenShift Container Platform 4.9.56 security update
google-oauth-client: missing PKCE support in accordance with the RFC for OAuth 2.0 for Native Apps can lead to improper authorization SnakeYaml: Constructor Deserialization Remote Code Execution http2-server: Invalid HTTP/2 requests cause DoS snakeyaml: Denial of Service due to missing nested depth limitation for collections plugin: CSRF vulnerability in Script Security Plugin plugin: User-scoped credentials exposed to other users by Pipeline SCM API for Blue Ocean Plugin plugin: CSRF vulnerability in Blue Ocean Plugin plugin: missing permission checks in Blue Ocean Plugin jenkins: Observable timing discrepancy allows determining username validity jenkins-plugin: Cross-site Request Forgery (CSRF) in org.jenkins-ci.plugins:git plugin: Lack of authentication mechanism in Git Plugin webhook plugin: Lack of authentication mechanism in Git Plugin webhook plugin: Non-constant time webhook signature comparison in GitHub Plugin jenkins-plugin/script-security: Sandbox bypass vulnerabilities in Jenkins Script Security Plugin jenkins-plugin/workflow-cps: Sandbox bypass vulnerabilities in Pipeline: Groovy Plugin jenkins-plugin/script-security: Sandbox bypass vulnerabilities in Jenkins Script Security Plugin jenkins-plugin/script-security: Sandbox bypass vulnerabilities in Jenkins Script Security Plugin jenkins-plugin/pipeline-groovy-lib: Sandbox bypass vulnerability in Pipeline: Groovy Libraries Plugin jenkins-plugin/workflow-cps-global-lib: Sandbox bypass vulnerability in Pipeline: Deprecated Groovy Libraries Plugin jenkins-plugin/pipeline-input-step: CSRF protection for any URL can be bypassed in Pipeline: Input Step Plugin jenkins-plugin/pipeline-stage-view: CSRF protection for any URL can be bypassed in Pipeline: Stage View Plugin jenkins-plugin/workflow-support: Stored XSS vulnerability in Pipeline: Supporting APIs Plugin mina-sshd: Java unsafe deserialization vulnerability jenkins-plugin/script-security: Whole-script approval in Script Security Plugin vulnerable to SHA-1 collisions jenkins-plugin/JUnit: Stored XSS vulnerability in JUnit Plugin jenkins-plugin/pipeline-utility-steps: Arbitrary file read vulnerability in Pipeline Utility Steps Plugin
[ "cpe:/a:redhat:openshift:4.9::el8" ]
null
8.1
null
null
RHSA-2004:505
Red Hat Security Advisory: Updated kernel packages fix security vulnerability
security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw
[ "cpe:/o:redhat:enterprise_linux:2.1::as", "cpe:/o:redhat:enterprise_linux:2.1::es", "cpe:/o:redhat:enterprise_linux:2.1::ws" ]
null
null
null
null
RHSA-2025:0308
Red Hat Security Advisory: fence-agents security update
jinja2: Jinja has a sandbox breakout through malicious filenames jinja2: Jinja has a sandbox breakout through indirect reference to format method
[ "cpe:/a:redhat:enterprise_linux:9::appstream", "cpe:/a:redhat:enterprise_linux:9::highavailability", "cpe:/a:redhat:enterprise_linux:9::resilientstorage" ]
null
6.3
null
null
RHSA-2010:0470
Red Hat Security Advisory: flash-plugin security update
flash-plugin: crash caused by SWF files with different SWF versions obtained from the same URL flash-plugin: multiple security flaws (APSB10-14) flash-plugin: Arbitrary code execution by opening a specially-crafted PDF file with malicious SWF content (APSA10-01) flash-plugin: multiple security flaws (APSB10-14) flash-plugin: multiple security flaws (APSB10-14) flash-plugin: multiple security flaws (APSB10-14) flash-plugin: multiple security flaws (APSB10-14) flash-plugin: multiple security flaws (APSB10-14) flash-plugin: multiple security flaws (APSB10-14) flash-plugin: multiple security flaws (APSB10-14) flash-plugin: multiple security flaws (APSB10-14) flash-plugin: multiple security flaws (APSB10-14) flash-plugin: multiple security flaws (APSB10-14) flash-plugin: multiple security flaws (APSB10-14) flash-plugin: "possible player crash" affects also v9.x versions of Adobe Flash Player flash-plugin: multiple security flaws (APSB10-14) flash-plugin: multiple security flaws (APSB10-14) flash-plugin: multiple security flaws (APSB10-14) flash-plugin: multiple security flaws (APSB10-14) flash-plugin: multiple security flaws (APSB10-14) flash-plugin: multiple security flaws (APSB10-14) flash-plugin: multiple security flaws (APSB10-14) flash-plugin: multiple security flaws (APSB10-14) flash-plugin: multiple security flaws (APSB10-14) flash-plugin: multiple security flaws (APSB10-14) flash-plugin: multiple security flaws (APSB10-14) flash-plugin: multiple security flaws (APSB10-14) flash-plugin: multiple security flaws (APSB10-14) flash-plugin: multiple security flaws (APSB10-14) flash-plugin: multiple security flaws (APSB10-14) flash-plugin: multiple security flaws (APSB10-14)
[ "cpe:/a:redhat:rhel_extras:3", "cpe:/a:redhat:rhel_extras:4" ]
null
null
null
null
RHSA-2025:4240
Red Hat Security Advisory: Updated 6.1 container image is now available in the Red Hat Ecosystem Catalog.
golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487) golang: net/http, x/net/http2: unlimited number of CONTINUATION frames causes DoS golang: archive/zip: Incorrect handling of certain ZIP files golang: net/netip: Unexpected behavior from Is methods for IPv4-mapped IPv6 addresses encoding/gob: golang: Calling Decoder.Decode on a message which contains deeply nested structures can cause a panic due to stack exhaustion
[ "cpe:/a:redhat:ceph_storage:6.1::el9" ]
null
7.5
null
null
RHSA-2022:1703
Red Hat Security Advisory: firefox security update
Mozilla: Bypassing permission prompt in nested browsing contexts Mozilla: iframe Sandbox bypass Mozilla: Reader mode bypassed SameSite cookies Mozilla: Fullscreen notification bypass using popups Mozilla: Leaking browser history with CSS variables Mozilla: Memory safety bugs fixed in Firefox 100 and Firefox ESR 91.9
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
9.8
7.5
null
RHSA-2024:2039
Red Hat Security Advisory: tigervnc security update
xorg-x11-server: Heap buffer overread/data leakage in ProcXIGetSelectedEvents xorg-x11-server: Heap buffer overread/data leakage in ProcXIPassiveGrabDevice xorg-x11-server: Use-after-free in ProcRenderAddGlyphs
[ "cpe:/a:redhat:rhel_eus:8.6::appstream" ]
null
7.8
null
null
RHSA-2024:0100
Red Hat Security Advisory: Red Hat build of Keycloak 22.0.8 images enhancement and security update
keycloak: open redirect via "form_post.jwt" JARM response mode
[ "cpe:/a:redhat:build_keycloak:22::el9" ]
null
4.6
null
null
RHSA-2003:109
Red Hat Security Advisory: : Updated balsa and mutt packages fix vulnerabilities
security flaw security flaw
[ "cpe:/o:redhat:linux:7.2", "cpe:/o:redhat:linux:7.3", "cpe:/o:redhat:linux:8.0", "cpe:/o:redhat:linux:9" ]
null
null
null
null
RHSA-2022:6113
Red Hat Security Advisory: Red Hat Application Interconnect 1.0 Release (rpms)
golang: net/http: improper sanitization of Transfer-Encoding header golang: go/parser: stack exhaustion in all Parse* functions golang: encoding/xml: stack exhaustion in Decoder.Skip golang: io/fs: stack exhaustion in Glob golang: compress/gzip: stack exhaustion in Reader.Read golang: path/filepath: stack exhaustion in Glob golang: encoding/xml: stack exhaustion in Unmarshal golang: net/http/httputil: NewSingleHostReverseProxy - omit X-Forwarded-For not working
[ "cpe:/a:redhat:application_interconnect:1::el8" ]
null
6.5
null
null
RHSA-2015:1082
Red Hat Security Advisory: kernel security update
kernel: net: slab corruption from use after free on INIT collisions kernel: pipe: iovec overrun leading to memory corruption
[ "cpe:/o:redhat:rhel_mission_critical:6.2::server" ]
null
null
null
null
RHSA-2022:6358
Red Hat Security Advisory: open-vm-tools security update
open-vm-tools: local root privilege escalation in the virtual machine
[ "cpe:/a:redhat:enterprise_linux:9::appstream" ]
null
7
null
null
RHSA-2017:2679
Red Hat Security Advisory: kernel security update
kernel: stack buffer overflow in the native Bluetooth stack
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
7.5
null
RHSA-2022:1627
Red Hat Security Advisory: Red Hat AMQ Broker 7.9.4 release and security update
spring-framework: RCE via Data Binding on JDK 9+
[ "cpe:/a:redhat:amq_broker:7" ]
null
8.1
null
null
RHSA-2002:195
Red Hat Security Advisory: tetex security update
security flaw
[ "cpe:/o:redhat:enterprise_linux:2.1::as" ]
null
null
null
null
RHSA-2024:4050
Red Hat Security Advisory: libreswan security update
libreswan: IKEv1 default AH/ESP responder can crash and restart
[ "cpe:/a:redhat:enterprise_linux:9::appstream" ]
null
6.5
null
null
RHSA-2004:414
Red Hat Security Advisory: qt security update
security flaw security flaw security flaw
[ "cpe:/o:redhat:enterprise_linux:3::as", "cpe:/o:redhat:enterprise_linux:3::desktop", "cpe:/o:redhat:enterprise_linux:3::es", "cpe:/o:redhat:enterprise_linux:3::ws" ]
null
null
null
null
RHSA-2023:7544
Red Hat Security Advisory: libxml2 security update
libxml2: crafted xml can cause global buffer overflow
[ "cpe:/a:redhat:rhel_eus:8.8::appstream", "cpe:/o:redhat:rhel_eus:8.8::baseos" ]
null
6.5
null
null
RHSA-2016:1538
Red Hat Security Advisory: golang security, bug fix, and enhancement update
golang: HTTP request smuggling in net/http library golang: HTTP request smuggling in net/http library golang: HTTP request smuggling in net/http library golang: infinite loop in several big integer routines Go: sets environmental variable based on user supplied Proxy request header
[ "cpe:/o:redhat:enterprise_linux:7::server" ]
null
null
5
null
RHSA-2023:7540
Red Hat Security Advisory: curl security and bug fix update
curl: cookie injection with none file
[ "cpe:/o:redhat:rhel_eus:8.8::baseos" ]
null
3.7
null
null
RHSA-2010:0873
Red Hat Security Advisory: java-1.5.0-ibm security update
krb5: null pointer dereference in GSS-API library leads to DoS (MITKRB5-SA-2010-005) OpenJDK HttpURLConnection allows arbitrary request headers (6961084,6980004) OpenJDK DNS server IP address information leak (6957564) OpenJDK HttpURLConnection request splitting (6952017) JDK unspecified vulnerability in Java Web Start component OpenJDK local network address disclosure (6952603) JDK unspecified vulnerability in 2D component JDK unspecified vulnerability in Sound component OpenJDK IndexColorModel double-free (6925710) OpenJDK JPEG writeImage remote code execution (6963023) OpenJDK ICC Profile remote code execution (6963489) OpenJDK Deserialization Race condition (6559775) OpenJDK Serialization inconsistencies (6966692) JDK unspecified vulnerability in Sound component OpenJDK HttpURLConnection allows arbitrary request headers (6961084,6980004) OpenJDK HttpURLConnection incomplete TRACE permission check (6981426)
[ "cpe:/a:redhat:rhel_extras:6" ]
null
null
null
null
RHSA-2020:2792
Red Hat Security Advisory: OpenShift Container Platform 4.4.11 grafana-container security update
grafana: SSRF incorrect access control vulnerability allows unauthenticated users to make grafana send HTTP requests to any URL
[ "cpe:/a:redhat:openshift:4.4::el7" ]
null
8.2
null
null
RHSA-2021:5151
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.3.10 security update on RHEL 8
undertow: potential security issue in flow control over HTTP/2 may lead to DOS wildfly-elytron: possible timing attack in ScramServer wildfly: incorrect JBOSS_LOCAL_USER challenge location may lead to giving access to all the local users resteasy: Error message exposes endpoint class information jsoup: Crafted input may cause the jsoup HTML and XML parser to get stuck xml-security: XPath Transform abuse allows for information disclosure
[ "cpe:/a:redhat:jboss_enterprise_application_platform:7.3::el8" ]
null
7.5
null
null
RHSA-2023:6894
Red Hat Security Advisory: OpenShift Container Platform 4.12.44 bug fix and security update
golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487)
[ "cpe:/a:redhat:openshift:4.12::el8", "cpe:/a:redhat:openshift:4.12::el9" ]
null
7.5
null
null
RHSA-2014:1335
Red Hat Security Advisory: python-django-horizon security and bug fix update
openstack-horizon: persistent XSS in Horizon Host Aggregates interface
[ "cpe:/a:redhat:openstack:5::el7" ]
null
null
null
null
RHSA-2021:3956
Red Hat Security Advisory: xstream security update
xstream: Arbitrary code execution via unsafe deserialization of Xalan xsltc.trax.TemplatesImpl xstream: Infinite loop DoS via unsafe deserialization of sun.reflect.annotation.AnnotationInvocationHandler xstream: Arbitrary code execution via unsafe deserialization of com.sun.xml.internal.ws.client.sei.* xstream: Arbitrary code execution via unsafe deserialization of sun.tracing.* xstream: Arbitrary code execution via unsafe deserialization of com.sun.jndi.ldap.LdapBindingEnumeration xstream: Arbitrary code execution via unsafe deserialization of javax.swing.UIDefaults$ProxyLazyValue xstream: Arbitrary code execution via unsafe deserialization of com.sun.jndi.ldap.LdapSearchEnumeration xstream: Arbitrary code execution via unsafe deserialization of com.sun.jndi.toolkit.dir.ContextEnumerator xstream: Arbitrary code execution via unsafe deserialization of com.sun.corba.* xstream: Server-side request forgery (SSRF) via unsafe deserialization of com.sun.xml.internal.ws.client.sei.* xstream: Arbitrary code execution via unsafe deserialization of com.sun.jndi.ldap.LdapBindingEnumeration xstream: Server-side request forgery (SSRF) via unsafe deserialization of jdk.nashorn.internal.runtime.Source$URLData xstream: Arbitrary code execution via unsafe deserialization of Xalan xsltc.trax.TemplatesImpl xstream: Arbitrary code execution via unsafe deserialization of javax.swing.UIDefaults$ProxyLazyValue
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
8.5
null
null
RHSA-2020:1176
Red Hat Security Advisory: avahi security update
avahi: Multicast DNS responds to unicast queries outside of local network
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
5.8
null
RHSA-2015:1909
Red Hat Security Advisory: openstack-neutron security and bug fix update
openstack-neutron: Firewall rules bypass through port update
[ "cpe:/a:redhat:openstack:5::el6", "cpe:/a:redhat:openstack:5::el7", "cpe:/a:redhat:openstack:6::el7", "cpe:/a:redhat:openstack:7::el7" ]
null
null
null
null
RHSA-2025:1386
Red Hat Security Advisory: OpenShift Container Platform 4.16.35 security update
golang.org/x/net/html: Non-linear parsing of case-insensitive content in golang.org/x/net/html kernel: media: uvcvideo: Skip parsing frames of type UVC_VS_UNDEFINED in uvc_parse_format
[ "cpe:/a:redhat:openshift:4.16::el9" ]
null
7.3
null
null
RHSA-2024:10525
Red Hat Security Advisory: Red Hat build of MicroShift 4.14.42 security update
runc: file descriptor leak
[ "cpe:/a:redhat:openshift:4.14::el9" ]
null
8.6
null
null
RHSA-2015:0327
Red Hat Security Advisory: glibc security and bug fix update
glibc: crash in code page decoding functions (IBM933, IBM935, IBM937, IBM939, IBM1364) glibc: Unexpected closing of nss_files databases after lookups causes denial of service
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
null
null
RHSA-2023:5946
Red Hat Security Advisory: Red Hat AMQ Broker 7.11.3 release and security update
netty: SniHandler 16MB allocation leads to OOM jetty: Improper validation of HTTP/1 content-length tomcat: Open Redirect vulnerability in FORM authentication HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack)
[ "cpe:/a:redhat:amq_broker:7" ]
null
7.5
null
null
RHSA-2024:1544
Red Hat Security Advisory: dnsmasq security and bug fix update
dnsmasq: default maximum EDNS.0 UDP packet size was set to 4096 but should be 1232 bind9: KeyTrap - Extreme CPU consumption in DNSSEC validator bind9: Preparing an NSEC3 closest encloser proof can exhaust CPU resources
[ "cpe:/a:redhat:rhel_eus:8.8::appstream" ]
null
7.5
null
null
RHSA-2024:7735
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.4 security update
undertow: Improper State Management in Proxy Protocol parsing causes information leakage
[ "cpe:/a:redhat:jboss_enterprise_application_platform:7.4" ]
null
7.5
null
null
RHSA-2024:9884
Red Hat Security Advisory: Red Hat Trusted Profile Analyzer 1.2.0
path-to-regexp: Backtracking regular expressions cause ReDoS body-parser: Denial of Service Vulnerability in body-parser
[ "cpe:/a:redhat:trusted_profile_analyzer:1.2::el9" ]
null
7.5
null
null
RHSA-2020:1342
Red Hat Security Advisory: telnet security update
telnet-server: no bounds checks in nextitem() function allows to remotely execute arbitrary code
[ "cpe:/a:redhat:rhel_e4s:8.0::appstream" ]
null
9.8
null
null
RHSA-2022:2190
Red Hat Security Advisory: podman security update
psgo: Privilege escalation in 'podman top'
[ "cpe:/a:redhat:rhel_extras_other:7" ]
null
8
null
null
RHSA-2016:2600
Red Hat Security Advisory: squid security, bug fix, and enhancement update
squid: some code paths fail to check bounds in string object squid: some code paths fail to check bounds in string object squid: wrong error handling for malformed HTTP responses squid: wrong error handling for malformed HTTP responses squid: denial of service issue in HTTP response processing
[ "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
null
null
RHSA-2019:1777
Red Hat Security Advisory: thunderbird security update
Mozilla: Sandbox escape via installation of malicious language pack Mozilla: Memory safety bugs fixed in Firefox 68 and Firefox ESR 60.8 Mozilla: Script injection within domain through inner window reuse Mozilla: Cross-origin POST requests can be made with NPAPI plugins by following 308 redirects Mozilla: Use-after-free with HTTP/2 cached stream Mozilla: HTML parsing error can contribute to content XSS Mozilla: Caret character improperly escaped in origins Mozilla: Same-origin policy treats all files in a directory as having the same-origin
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
6.1
null
RHSA-2013:1134
Red Hat Security Advisory: httpd security update
httpd: mod_rewrite allows terminal escape sequences to be written to the log file httpd: mod_dav DoS (httpd child process crash) via a URI MERGE request with source URI not handled by mod_dav
[ "cpe:/a:redhat:jboss_enterprise_web_server:2.0.1" ]
null
null
null
null
RHSA-2022:8648
Red Hat Security Advisory: krb5 security update
krb5: integer overflow vulnerabilities in PAC parsing
[ "cpe:/o:redhat:rhel_aus:8.2::baseos", "cpe:/o:redhat:rhel_e4s:8.2::baseos", "cpe:/o:redhat:rhel_tus:8.2::baseos" ]
null
8.8
null
null
RHSA-2021:3488
Red Hat Security Advisory: Red Hat OpenStack Platform 16.2 (openstack-neutron) security update
openstack-neutron: arbitrary dnsmasq reconfiguration via extra_dhcp_opts
[ "cpe:/a:redhat:openstack:16.2::el8" ]
null
7.6
null
null
RHSA-2020:3247
Red Hat Security Advisory: RHV Manager (ovirt-engine) 4.4 security, bug fix, and enhancement update
novnc: XSS vulnerability via the messages propagated to the status field bootstrap: XSS in the tooltip or popover data-template attribute libquartz: XXE attacks via job description ovirt-engine: response_type parameter allows reflected XSS nodejs-minimist: prototype pollution allows adding or modifying properties of Object.prototype using a constructor or __proto__ payload ovirt-engine: Redirect to arbitrary URL allows for phishing jquery: Cross-site scripting due to improper injQuery.htmlPrefilter method jquery: Untrusted code execution via <option> tag in HTML passed to DOM manipulation methods
[ "cpe:/a:redhat:rhev_manager:4.4:el8" ]
null
6.1
5.4
null
RHSA-2011:1691
Red Hat Security Advisory: util-linux-ng security, bug fix, and enhancement update
util-linux: mount fails to anticipate RLIMIT_FSIZE util-linux: umount may fail to remove /etc/mtab~ lock file
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
null
null
RHSA-2020:3555
Red Hat Security Advisory: firefox security update
Mozilla: Integer overflow in nsJPEGEncoder::emptyOutputBuffer Mozilla: WebRTC permission prompt could have been bypassed by a compromised content process Mozilla: Out of bound read in Date.parse() Mozilla: X-Frame-Options bypass using object or embed tags Mozilla: Bypassing iframe sandbox when allowing popups Mozilla: Custom cursor can overlay user interface Mozilla: Type confusion for special arguments in IonMonkey Mozilla: Overriding file type when saving to disk Mozilla: Attacker-induced prompt for extension installation Mozilla: Use-After-Free when aborting an operation
[ "cpe:/a:redhat:rhel_e4s:8.0::appstream" ]
null
8.8
6.1
null
RHSA-2024:4826
Red Hat Security Advisory: freeradius:3.0 security update
freeradius: forgery attack
[ "cpe:/a:redhat:rhel_aus:8.6::appstream", "cpe:/a:redhat:rhel_e4s:8.6::appstream", "cpe:/a:redhat:rhel_tus:8.6::appstream" ]
null
9
null
null
RHSA-2020:0853
Red Hat Security Advisory: zsh security update
zsh: insecure dropping of privileges when unsetting PRIVILEGED option
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
7.8
null
null
RHSA-2024:1316
Red Hat Security Advisory: Red Hat JBoss Core Services Apache HTTP Server 2.4.57 SP3 security update
openssl: Generating excessively long X9.42 DH keys or checking excessively long X9.42 DH keys or parameters may be very slow mod_cluster/mod_proxy_cluster: Stored Cross site Scripting httpd: mod_macro: out-of-bounds read vulnerability curl: information disclosure by exploiting a mixed case flaw curl: excessively long file name may lead to unknown HSTS status
[ "cpe:/a:redhat:jboss_core_services:1::el7", "cpe:/a:redhat:jboss_core_services:1::el8" ]
null
5.3
null
null
RHSA-2016:1593
Red Hat Security Advisory: Red Hat JBoss BPM Suite 6.3.2 security and bug fix update
Framework: denial-of-service attack with XML input
[ "cpe:/a:redhat:jboss_bpms:6.3" ]
null
null
5.3
null
RHSA-2024:6946
Red Hat Security Advisory: grafana-pcp security update
encoding/gob: golang: Calling Decoder.Decode on a message which contains deeply nested structures can cause a panic due to stack exhaustion
[ "cpe:/a:redhat:enterprise_linux:9::appstream" ]
null
7.5
null
null
RHSA-2017:2799
Red Hat Security Advisory: kernel security update
kernel: load_elf_ binary() does not take account of the need to allocate sufficient space for the entire binary
[ "cpe:/o:redhat:rhel_aus:6.4::server" ]
null
null
7.8
null
RHSA-2020:2027
Red Hat Security Advisory: OpenShift Container Platform 4.2.33 openshift-clients security update
proglottis/gpgme: Use-after-free in GPGME bindings during container image pull
[ "cpe:/a:redhat:openshift:4.2::el8" ]
null
7.5
null
null
RHSA-2020:1708
Red Hat Security Advisory: liblouis security and bug fix update
liblouis: Segmentation fault in logging.c:lou_logPrint() liblouis: Stack-based buffer overflow in function includeFile in compileTranslationTable.c liblouis: Stack-based buffer overflow in function compileHyphenation in compileTranslationTable.c liblouis: Stack-based buffer overflow in compileTranslationTable.c
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
null
3.3
null
RHSA-2017:0862
Red Hat Security Advisory: Red Hat Enterprise Linux 5 Retirement Notice
This is the final notification for the retirement of Red Hat Enterprise Linux 5. This notification applies only to those customers subscribed to the channel for Red Hat Enterprise Linux 5.
[ "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
RHSA-2014:0939
Red Hat Security Advisory: python-django-horizon security, bug fix, and enhancement update
openstack-horizon: multiple XSS flaws openstack-horizon: multiple XSS flaws openstack-horizon: multiple XSS flaws openstack-horizon: multiple XSS flaws
[ "cpe:/a:redhat:openstack:5::el7" ]
null
null
null
null