id
stringlengths
13
15
title
stringlengths
29
176
description
stringlengths
8
32.1k
cpes
listlengths
0
20
cvss_v4_0
null
cvss_v3_1
float64
0
10
cvss_v3_0
float64
0
10
cvss_v2_0
null
RHSA-2021:5048
Red Hat Security Advisory: thunderbird security update
Mozilla: Memory safety bugs fixed in Firefox 95 and Firefox ESR 91.4 Mozilla: JavaScript unexpectedly enabled for the composition area Mozilla: URL leakage when navigating while executing asynchronous function Mozilla: Heap buffer overflow when using structured clone Mozilla: Missing fullscreen and pointer lock notification when requesting both Mozilla: GC rooting failure when calling wasm instance methods Mozilla: External protocol handler parameters were unescaped Mozilla: XMLHttpRequest error codes could have leaked the existence of an external protocol handler Mozilla: Bypass of CSP sandbox directive when embedding Mozilla: Denial of Service when using the Location API in a loop Mozilla: Cursor spoofing could overlay user interface when native cursor is zoomed
[ "cpe:/a:redhat:rhel_eus:8.4::appstream" ]
null
5.4
6.1
null
RHSA-2011:1005
Red Hat Security Advisory: sysstat security, bug fix, and enhancement update
sysstat insecure temporary file usage
[ "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
RHSA-2013:0746
Red Hat Security Advisory: rhev-hypervisor6 security and bug fix update
pixman: stack-based buffer overflow kernel: kvm: buffer overflow in handling of MSR_KVM_SYSTEM_TIME kernel: kvm: after free issue with the handling of MSR_KVM_SYSTEM_TIME kernel: kvm: out-of-bounds access in ioapic indirect register reads
[ "cpe:/o:redhat:enterprise_linux:6::hypervisor" ]
null
null
null
null
RHSA-2024:6028
Red Hat Security Advisory: git security update
git: Recursive clones RCE git: RCE while cloning local repos
[ "cpe:/a:redhat:rhel_aus:8.4::appstream", "cpe:/a:redhat:rhel_e4s:8.4::appstream", "cpe:/a:redhat:rhel_tus:8.4::appstream" ]
null
8.1
null
null
RHSA-2010:0383
Red Hat Security Advisory: java-1.6.0-ibm security update
OpenJDK Policy/PolicyFile leak dynamic ProtectionDomains. (6633872) OpenJDK File TOCTOU deserialization vulnerability (6736390) JDK unspecified vulnerability in JWS/Plugin component OpenJDK Inflater/Deflater clone issues (6745393) JDK unspecified vulnerability in JavaWS/Plugin component JDK unspecified vulnerability in JavaWS/Plugin component OpenJDK Unsigned applet can retrieve the dragged information before drop action occurs(6887703) OpenJDK AtomicReferenceArray causes SIGSEGV -> SEGV_MAPERR error (6888149) OpenJDK Deserialization of RMIConnectionImpl objects should enforce stricter checks (6893947) OpenJDK Subclasses of InetAddress may incorrectly interpret network addresses (6893954) OpenJDK JAR "unpack200" must verify input parameters (6902299) OpenJDK CMM readMabCurveData Buffer Overflow Vulnerability (6899653) JDK multiple unspecified vulnerabilities OpenJDK Applet Trusted Methods Chaining Privilege Escalation Vulnerability (6904691) OpenJDK JPEGImageReader stepX Integer Overflow Vulnerability (6909597) JDK multiple unspecified vulnerabilities JDK multiple unspecified vulnerabilities JDK multiple unspecified vulnerabilities JDK unspecified vulnerability in ImageIO component OpenJDK ImagingLib arbitrary code execution vulnerability (6914866) OpenJDK AWT Library Invalid Index Vulnerability (6914823) JDK unspecified vulnerability in Java2D component
[ "cpe:/a:redhat:rhel_extras:4", "cpe:/a:redhat:rhel_extras:5::client", "cpe:/a:redhat:rhel_extras:5::server" ]
null
null
null
null
RHSA-2019:3387
Red Hat Security Advisory: osinfo-db and libosinfo security and bug fix update
Libosinfo: osinfo-install-script option leaks password via command line argument
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
null
2.8
null
RHSA-2005:073
Red Hat Security Advisory: cpio security update
security flaw
[ "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws" ]
null
null
null
null
RHSA-2008:0839
Red Hat Security Advisory: postfix security update
postfix privilege escalation flaw
[ "cpe:/o:redhat:enterprise_linux:3::as", "cpe:/o:redhat:enterprise_linux:3::desktop", "cpe:/o:redhat:enterprise_linux:3::es", "cpe:/o:redhat:enterprise_linux:3::ws", "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws", "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
RHSA-2012:0317
Red Hat Security Advisory: libpng security update
libpng: Heap buffer overflow in png_decompress_chunk (MFSA 2012-11)
[ "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws", "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::client_workstation", "cpe:/o:redhat:enterprise_linux:5::server", "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
null
null
RHSA-2014:1194
Red Hat Security Advisory: conga security and bug fix update
(Plone): Restricted Python injection (Plone): Reflexive HTTP header injection (Plone): Restricted Python injection (Plone): Anonymous users can list user account names (Plone): Partial denial of service through Collections functionality (Plone): Partial denial of service through internal function (Plone): Anonymous users can batch change titles of content items conga: Multiple information leak flaws in various luci site extensions luci: unauthorized administrative access granted to non-administrative users
[ "cpe:/a:redhat:rhel_cluster:5" ]
null
null
null
null
RHSA-2014:0136
Red Hat Security Advisory: java-1.5.0-ibm security update
OpenJDK: jarsigner does not detect unsigned bytecode injected into signed jars ICU: Layout Engine LookupProcessor insufficient input checks (JDK 2D, 8025034) OpenJDK: insufficient Socket checkListen checks (Networking, 8011786) OpenJDK: SnmpStatusException handling issues (Serviceability, 7068126) OpenJDK: document builder missing security checks (JAXP, 8027201, 8025018) OpenJDK: TLS/SSL handshake timing issues (JSSE, 8023069) OpenJDK: insecure subject principals set handling (JAAS, 8024306) JDK: unspecified vulnerability fixed in 5.0u71, 6u71 and 7u51 (2D) OpenJDK: insufficient package access checks in the Naming component (JNDI, 8025758) OpenJDK: XXE issue in decoder (Beans, 8023245) OpenJDK: insufficient security checks in IIOP streams (CORBA, 8025767)
[ "cpe:/a:redhat:rhel_extras:5::client", "cpe:/a:redhat:rhel_extras:5::server", "cpe:/a:redhat:rhel_extras:6" ]
null
null
null
null
RHSA-2022:1891
Red Hat Security Advisory: libpq security update
postgresql: libpq processes unencrypted bytes from man-in-the-middle
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
3.7
null
null
RHSA-2020:4464
Red Hat Security Advisory: libxslt security update
libxslt: xsltCheckRead and xsltCheckWrite routines security bypass by crafted URL libxslt: use after free in xsltCopyText in transform.c could lead to information disclosure
[ "cpe:/a:redhat:enterprise_linux:8::appstream", "cpe:/o:redhat:enterprise_linux:8::baseos" ]
null
7.5
6.3
null
RHSA-2022:0997
Red Hat Security Advisory: Red Hat OpenStack Platform 16.2 (golang-qpid-apache) security update
golang: net: incorrect parsing of extraneous zero characters at the beginning of an IP address octet
[ "cpe:/a:redhat:openstack:16.2::el8" ]
null
7.3
null
null
RHSA-2025:0222
Red Hat Security Advisory: dpdk security update
dpdk: Denial Of Service from malicious guest on hypervisors using DPDK Vhost library
[ "cpe:/a:redhat:enterprise_linux:8::appstream", "cpe:/a:redhat:enterprise_linux:8::crb" ]
null
null
7.4
null
RHSA-2020:2530
Red Hat Security Advisory: tomcat security update
tomcat: deserialization flaw in session persistence storage leading to RCE
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
7
null
null
RHSA-2023:7010
Red Hat Security Advisory: sysstat security and bug fix update
sysstat: check_overflow() function can work incorrectly that lead to an overflow
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
7
null
null
RHSA-2023:1297
Red Hat Security Advisory: OpenShift Container Platform 4.11.32 security and extras update
goutils: RandomAlphaNumeric and CryptoRandomAlphaNumeric are not as random as they should be
[ "cpe:/a:redhat:openshift:4.11::el8" ]
null
7
null
null
RHSA-2022:6801
Red Hat Security Advisory: OpenShift Container Platform 4.8.51 packages and security update
go-getter: command injection vulnerability go-getter: unsafe download (issue 1 of 3) go-getter: unsafe download (issue 2 of 3) go-getter: unsafe download (issue 3 of 3)
[ "cpe:/a:redhat:openshift:4.8::el8" ]
null
8.6
null
null
RHSA-2013:1635
Red Hat Security Advisory: pacemaker security, bug fix, and enhancement update
pacemaker: remote DoS when CIB management is enabled caused by use of blocking sockets
[ "cpe:/o:redhat:enterprise_linux:6::server" ]
null
null
null
null
RHSA-2017:0980
Red Hat Security Advisory: qemu-kvm-rhev security update
Qemu: cirrus: heap buffer overflow via vnc connection Qemu: display: cirrus: OOB read access issue Qemu: display: cirrus: OOB r/w access issues in bitblt routines
[ "cpe:/a:redhat:openstack:5::el7" ]
null
null
5.5
null
RHSA-2023:3361
Red Hat Security Advisory: gnutls security update
gnutls: timing side-channel in the TLS RSA key exchange code
[ "cpe:/a:redhat:rhel_eus:8.6::appstream", "cpe:/o:redhat:rhel_eus:8.6::baseos" ]
null
7.4
null
null
RHSA-2024:4418
Red Hat Security Advisory: less security update
less: OS command injection
[ "cpe:/o:redhat:rhel_aus:8.6::baseos", "cpe:/o:redhat:rhel_e4s:8.6::baseos", "cpe:/o:redhat:rhel_tus:8.6::baseos" ]
null
8.6
null
null
RHSA-2022:5002
Red Hat Security Advisory: virt:av and virt-devel:av security and bug fix update
QEMU: QXL: integer overflow in cursor_alloc() can lead to heap buffer overflow QEMU: QXL: double fetch in qxl_cursor() can lead to heap buffer overflow QEMU: virtio-net: map leaking on error during receive QEMU: vhost-vsock: missing virtqueue detach on error can lead to memory leak
[ "cpe:/a:redhat:advanced_virtualization:8.4::el8" ]
null
2.5
null
null
RHSA-2023:0601
Red Hat Security Advisory: thunderbird security update
Mozilla: Revocation status of S/Mime signature certificates was not checked
[ "cpe:/a:redhat:rhel_e4s:8.1::appstream" ]
null
7.5
null
null
RHSA-2016:1637
Red Hat Security Advisory: rh-mariadb101-mariadb security update
mysql: unspecified vulnerability in subcomponent: Server: Parser (CPU July 2016) mysql: unspecified vulnerability in subcomponent: Server: Types (CPU July 2016) mysql: unspecified vulnerability in subcomponent: Server: DML (CPU July 2016) mysql: unspecified vulnerability in subcomponent: Server: RBR (CPU July 2016)
[ "cpe:/a:redhat:rhel_software_collections:2::el6", "cpe:/a:redhat:rhel_software_collections:2::el7" ]
null
null
4.9
null
RHSA-2006:0731
Red Hat Security Advisory: php security update
PHP buffer overflow
[ "cpe:/a:redhat:rhel_application_stack:1" ]
null
null
null
null
RHSA-2020:1489
Red Hat Security Advisory: thunderbird security update
Mozilla: Use-after-free while running the nsDocShell destructor Mozilla: Use-after-free when handling a ReadableStream Mozilla: Uninitialized memory could be read when using the WebGL copyTexSubImage method Mozilla: Out of bounds write in GMPDecodeData when processing large images Mozilla: Memory safety bugs fixed in Firefox 75 and Firefox ESR 68.7
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
9.8
null
null
RHSA-2022:0056
Red Hat Security Advisory: OpenShift Container Platform 4.10.3 security update
gogo/protobuf: plugin/unmarshal/unmarshal.go lacks certain index validation nodejs-axios: Regular expression denial of service in trim function grafana: Snapshot authentication bypass golang: archive/zip: Reader.Open panics on empty string grafana: directory traversal vulnerability golang: net/http: limit growth of header canonicalization cache golang: syscall: don't close fd 0 on ForkExec error grafana: Forward OAuth Identity Token can allow users to access some data sources
[ "cpe:/a:redhat:openshift:4.10::el8" ]
null
4.3
null
null
RHSA-2022:6157
Red Hat Security Advisory: curl security update
curl: HTTP compression denial of service curl: Unpreserved file permissions curl: FTP-KRB bad message verification
[ "cpe:/a:redhat:enterprise_linux:9::appstream", "cpe:/o:redhat:enterprise_linux:9::baseos" ]
null
5.3
null
null
RHSA-2014:0134
Red Hat Security Advisory: java-1.7.0-ibm security update
OpenJDK: jarsigner does not detect unsigned bytecode injected into signed jars OpenJDK: null xmlns handling issue (Security, 8025026) OpenJDK: insufficient security checks in CORBA stub factories (CORBA, 8026193) JDK: unspecified vulnerability fixed in 6u71 and 7u51 (Deployment) JDK: unspecified vulnerability fixed in 6u71 and 7u51 (Deployment) JDK: unspecified vulnerability fixed in 6u71 and 7u51 (Deployment) OpenJDK: com.sun.corba.se. should be restricted package (CORBA, 8025022) JDK: unspecified vulnerability fixed in 6u71 and 7u51 (Deployment) JDK: unspecified vulnerability fixed in 6u71 and 7u51 (Deployment) ICU: Layout Engine LookupProcessor insufficient input checks (JDK 2D, 8025034) OpenJDK: XML canonicalizer mutable strings passed to untrusted code (Security, 8026417) OpenJDK: insufficient Socket checkListen checks (Networking, 8011786) OpenJDK: SnmpStatusException handling issues (Serviceability, 7068126) JDK: unspecified vulnerability fixed in 6u71 and 7u51 (Deployment) OpenJDK: document builder missing security checks (JAXP, 8027201, 8025018) JDK: unspecified vulnerability fixed in 6u71 and 7u51 (Deployment) JDK: unspecified vulnerability fixed in 6u71 and 7u51 (Deployment) JDK: unspecified vulnerability fixed in 6u71 and 7u51 (Deployment) OpenJDK: TLS/SSL handshake timing issues (JSSE, 8023069) JDK: unspecified vulnerability fixed in 6u71 and 7u51 (Deployment) OpenJDK: insecure subject principals set handling (JAAS, 8024306) JDK: unspecified vulnerability fixed in 5.0u71, 6u71 and 7u51 (2D) OpenJDK: insufficient package access checks in the Naming component (JNDI, 8025758) OpenJDK: XXE issue in decoder (Beans, 8023245) JDK: unspecified vulnerability fixed in 6u71 and 7u51 (Deployment) OpenJDK: insufficient security checks in IIOP streams (CORBA, 8025767)
[ "cpe:/a:redhat:rhel_extras:5::client", "cpe:/a:redhat:rhel_extras:5::server", "cpe:/a:redhat:rhel_extras:6" ]
null
null
null
null
RHSA-2009:1692
Red Hat Security Advisory: rhev-hypervisor security and bug fix update
kernel: flood ping cause out-of-iommu error and panic when mtu larger than 1500 kernel: KVM: x86 emulator: limit instructions to 15 bytes
[ "cpe:/o:redhat:enterprise_linux:5::hypervisor" ]
null
null
null
null
RHSA-2022:4623
Red Hat Security Advisory: Red Hat build of Quarkus 2.7.5 release and security update
smallrye-health-ui: persistent cross-site scripting in endpoint protobuf-java: potential DoS in the parsing procedure for binary data gradle: repository content filters do not work in Settings pluginManagement gradle: local privilege escalation through system temporary directory gradle: information disclosure through temporary directory permissions netty: control chars in header names may lead to HTTP request smuggling quarkus: privilege escalation vulnerability with RestEasy Reactive scope leakage in Quarkus mysql-connector-java: Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Connectors jdbc-postgresql: Unchecked Class Instantiation when providing Plugin Classes
[ "cpe:/a:redhat:quarkus:2.7" ]
null
7
null
null
RHSA-2020:2274
Red Hat Security Advisory: devtoolset-9-gcc security and bug fix update
gcc: POWER9 "DARN" RNG intrinsic produces repeated output
[ "cpe:/a:redhat:rhel_software_collections:3::el7" ]
null
null
7.5
null
RHSA-2024:9540
Red Hat Security Advisory: tigervnc security update
xorg-x11-server: tigervnc: heap-based buffer overflow privilege escalation vulnerability
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
7.8
null
null
RHSA-2018:1450
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 6.4.20 security update
Artemis: Deserialization of untrusted input vulnerability solr: Directory traversal via Index Replication HTTP API jackson-databind: Deserialization vulnerability via readValue method of ObjectMapper jackson-databind: Unsafe deserialization due to incomplete black list (incomplete fix for CVE-2017-7525) jackson-databind: Unsafe deserialization due to incomplete black list (incomplete fix for CVE-2017-15095) tomcat: Incorrect handling of empty string URL in security constraints can lead to unintended exposure of resources jackson-databind: incomplete fix for CVE-2017-7525 permits unsafe serialization via c3p0 libraries slf4j: Deserialisation vulnerability in EventData constructor can allow for arbitrary code execution
[ "cpe:/a:redhat:jboss_enterprise_application_platform:6::el5" ]
null
null
8.1
null
RHSA-2021:1201
Red Hat Security Advisory: thunderbird security update
Mozilla: An attacker may use Thunderbird's OpenPGP key refresh mechanism to poison an existing key Mozilla: A crafted OpenPGP key with an invalid user ID could be used to confuse the user Mozilla: Inability to send encrypted OpenPGP email after importing a crafted OpenPGP key Mozilla: Thunderbird might execute an alternative OTR library Mozilla: Logic issue potentially leaves key material unlocked
[ "cpe:/a:redhat:rhel_eus:8.2::appstream" ]
null
7.5
null
null
RHSA-2004:015
Red Hat Security Advisory: httpd security update
security flaw
[ "cpe:/o:redhat:enterprise_linux:3::as", "cpe:/o:redhat:enterprise_linux:3::desktop", "cpe:/o:redhat:enterprise_linux:3::es", "cpe:/o:redhat:enterprise_linux:3::ws" ]
null
null
null
null
RHSA-2015:1539
Red Hat Security Advisory: Red Hat JBoss BPM Suite 6.1.2 update
Camel: XXE in via SAXSource expansion Camel: XXE via XPath expression evaluation dashbuilder: XXE/SSRF vulnerability
[ "cpe:/a:redhat:jboss_bpms:6.0" ]
null
null
null
null
RHSA-2024:11145
Red Hat Security Advisory: Red Hat Ansible Automation Platform 2.5 Product Security and Bug Fix Update
ansible-core: Unsafe Tagging Bypass via hostvars Object in Ansible-Core automation-gateway: Improper Scope Handling in OAuth2 Tokens for AAP 2.5
[ "cpe:/a:redhat:ansible_automation_platform:2.5::el8", "cpe:/a:redhat:ansible_automation_platform:2.5::el9", "cpe:/a:redhat:ansible_automation_platform_developer:2.5::el8", "cpe:/a:redhat:ansible_automation_platform_developer:2.5::el9", "cpe:/a:redhat:ansible_automation_platform_inside:2.5::el8", "cpe:/a:redhat:ansible_automation_platform_inside:2.5::el9" ]
null
5
null
null
RHSA-2017:0366
Red Hat Security Advisory: kernel security update
kernel: use after free in dccp protocol
[ "cpe:/o:redhat:rhel_aus:6.5::server", "cpe:/o:redhat:rhel_tus:6.5::server" ]
null
null
7.8
null
RHSA-2022:6155
Red Hat Security Advisory: Red Hat OpenShift Data Foundation 4.11.0 security, enhancement & bugfix update
golang: math/big: uncontrolled memory consumption due to an unhandled overflow via Rat.SetString golang: encoding/pem: fix stack overflow in Decode golang: crypto/elliptic: panic caused by oversized scalar
[ "cpe:/a:redhat:openshift_data_foundation:4.11::el8" ]
null
7.5
null
null
RHSA-2020:1598
Red Hat Security Advisory: libreoffice security and bug fix update
libreoffice: Remote resources protection module not applied to bullet graphics libreoffice: Insufficient URL validation allowing LibreLogo script execution libreoffice: LibreLogo global-event script execution libreoffice: Insufficient URL encoding flaw in allowed script location check libreoffice: Insufficient URL decoding flaw in categorizing macro location libreoffice: Unsafe URL assembly flaw in allowed script location check
[ "cpe:/a:redhat:enterprise_linux:8::appstream", "cpe:/a:redhat:enterprise_linux:8::crb" ]
null
7.8
7.8
null
RHSA-2023:3708
Red Hat Security Advisory: kernel-rt security and bug fix update
Kernel: bluetooth: Unauthorized management command execution kernel: OOB access in the Linux kernel's XFS subsystem kernel: i2c: out-of-bounds write in xgene_slimpro_i2c_xfer() kernel: use-after-free vulnerability in the perf_group_detach function of the Linux Kernel Performance Events kernel: tls: race condition in do_tls_getsockopt may lead to use-after-free or NULL pointer dereference kernel: netfilter: use-after-free in nf_tables when processing batch requests can lead to privilege escalation
[ "cpe:/a:redhat:enterprise_linux:9::nfv", "cpe:/a:redhat:enterprise_linux:9::realtime" ]
null
7.8
null
null
RHSA-2016:0679
Red Hat Security Advisory: java-1.6.0-sun security update
OpenJDK: insufficient thread consistency checks in ObjectInputStream (Serialization, 8129952) OpenJDK: insufficient byte type checks (Hotspot, 8132051) OpenJDK: insufficient DSA key parameters checks (Security, 8138593) JDK: unspecified vulnerability fixed in 6u115, 7u101 and 8u91 (2D) OpenJDK: incorrect handling of surrogate pairs in XML attribute values (JAXP, 8143167) OpenJDK: unrestricted deserialization of authentication credentials (JMX, 8144430) JDK: unspecified vulnerability fixed in 6u115, 7u101 and 8u91 (2D) JDK: unspecified vulnerability fixed in 6u115, 7u101 and 8u91 (Deployment)
[ "cpe:/a:redhat:rhel_extras_oracle_java:5", "cpe:/a:redhat:rhel_extras_oracle_java:6", "cpe:/a:redhat:rhel_extras_oracle_java:7" ]
null
null
null
null
RHSA-2024:4636
Red Hat Security Advisory: libndp security update
libndp: buffer overflow in route information length field
[ "cpe:/o:redhat:enterprise_linux:9::baseos" ]
null
8.1
null
null
RHSA-2018:1662
Red Hat Security Advisory: qemu-kvm security update
hw: cpu: speculative store bypass
[ "cpe:/o:redhat:rhel_eus:7.3::computenode", "cpe:/o:redhat:rhel_eus:7.3::server" ]
null
null
5.6
null
RHSA-2017:0153
Red Hat Security Advisory: openstack-cinder security update
openstack-nova/glance/cinder: Malicious image may exhaust resources
[ "cpe:/a:redhat:openstack:5::el7" ]
null
null
5.3
null
RHSA-2022:5250
Red Hat Security Advisory: libxml2 security update
libxml2: integer overflows in xmlBuf and xmlBuffer lead to out-of-bounds write
[ "cpe:/a:redhat:enterprise_linux:9::appstream", "cpe:/o:redhat:enterprise_linux:9::baseos" ]
null
7.4
null
null
RHSA-2016:2947
Red Hat Security Advisory: flash-plugin security update
flash-plugin: multiple code execution issues fixed in APSB16-39 flash-plugin: multiple code execution issues fixed in APSB16-39 flash-plugin: multiple code execution issues fixed in APSB16-39 flash-plugin: multiple code execution issues fixed in APSB16-39 flash-plugin: multiple code execution issues fixed in APSB16-39 flash-plugin: multiple code execution issues fixed in APSB16-39 flash-plugin: multiple code execution issues fixed in APSB16-39 flash-plugin: multiple code execution issues fixed in APSB16-39 flash-plugin: multiple code execution issues fixed in APSB16-39 flash-plugin: multiple code execution issues fixed in APSB16-39 flash-plugin: multiple code execution issues fixed in APSB16-39 flash-plugin: multiple code execution issues fixed in APSB16-39 flash-plugin: multiple code execution issues fixed in APSB16-39 flash-plugin: multiple code execution issues fixed in APSB16-39 flash-plugin: multiple code execution issues fixed in APSB16-39 flash-plugin: multiple code execution issues fixed in APSB16-39 flash-plugin: multiple code execution issues fixed in APSB16-39
[ "cpe:/a:redhat:rhel_extras:6" ]
null
null
8.8
null
RHSA-2023:4380
Red Hat Security Advisory: kpatch-patch security update
kernel: ipvlan: out-of-bounds write caused by unclear skb->cb kernel: cls_flower: out-of-bounds write in fl_set_geneve_opt()
[ "cpe:/o:redhat:enterprise_linux:9::baseos" ]
null
7.8
null
null
RHSA-2021:2139
Red Hat Security Advisory: Red Hat Data Grid 8.2.0 security update
infinispan-server-rest: Actions with effects should not be permitted via GET requests using REST API XStream: Server-Side Forgery Request vulnerability can be activated when unmarshalling XStream: arbitrary file deletion on the local host when unmarshalling netty: Information disclosure via the local system temporary directory netty: possible request smuggling in HTTP/2 due missing validation XStream: allow a remote attacker to cause DoS only by manipulating the processed input stream XStream: SSRF via crafted input stream XStream: arbitrary file deletion on the local host via crafted input stream XStream: Unsafe deserizaliation of javax.sql.rowset.BaseRowSet XStream: Unsafe deserizaliation of com.sun.corba.se.impl.activation.ServerTableEntry XStream: Unsafe deserizaliation of sun.swing.SwingLazyValue XStream: Unsafe deserizaliation of com.sun.tools.javac.processing.JavacProcessingEnvironment NameProcessIterator XStream: ReDoS vulnerability XStream: SSRF can be activated unmarshalling with XStream to access data streams from an arbitrary URL referencing a resource in an intranet or the local host XStream: Unsafe deserizaliation of com.sun.org.apache.bcel.internal.util.ClassLoader XStream: allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream netty: Request smuggling via content-length header Infinispan: Authentication bypass on REST endpoints when using DIGEST authentication mechanism
[ "cpe:/a:redhat:jboss_data_grid:8" ]
null
9.8
null
null
RHSA-2023:2713
Red Hat Security Advisory: Red Hat Single Sign-On 7.6.3 security update
okhttp: information disclosure via improperly used cryptographic function undertow: Server identity in https connection is not checked by the undertow client snakeyaml: Uncaught exception in java.base/java.util.ArrayList.hashCode dev-java/snakeyaml: DoS via stack overflow codec-haproxy: HAProxyMessageDecoder Stack Exhaustion DoS apache-james-mime4j: Temporary File Information Disclosure in MIME4J TempFileStorageProvider RESTEasy: creation of insecure temp files
[ "cpe:/a:redhat:red_hat_single_sign_on:7.6.3" ]
null
5.3
null
null
RHSA-2025:0053
Red Hat Security Advisory: kpatch-patch-4_18_0-305_120_1, kpatch-patch-4_18_0-305_138_1, and kpatch-patch-4_18_0-305_145_1 security update
kernel: mptcp: cope racing subflow creation in mptcp_rcv_space_adjust
[ "cpe:/o:redhat:rhel_e4s:8.4::baseos" ]
null
5.9
null
null
RHSA-2024:3543
Red Hat Security Advisory: python-idna security and bug fix update
python-idna: potential DoS via resource consumption via specially crafted inputs to idna.encode()
[ "cpe:/o:redhat:rhel_eus:8.8::baseos" ]
null
6.5
null
null
RHSA-2023:6685
Red Hat Security Advisory: tpm2-tss security and enhancement update
tpm2-tss: Buffer Overlow in TSS2_RC_Decode
[ "cpe:/a:redhat:enterprise_linux:9::crb", "cpe:/o:redhat:enterprise_linux:9::baseos" ]
null
6.4
null
null
RHSA-2021:3872
Red Hat Security Advisory: Ansible security and bug fix update (2.9.27)
Ansible: ansible-connection module discloses sensitive info in traceback error message
[ "cpe:/a:redhat:ansible_engine:2::el7", "cpe:/a:redhat:ansible_engine:2::el8" ]
null
5.5
null
null
RHSA-2020:0602
Red Hat Security Advisory: rh-nodejs12-nodejs security update
nodejs: Remotely trigger an assertion on a TLS server with a malformed certificate string nodejs: HTTP request smuggling using malformed Transfer-Encoding header nodejs: HTTP header values do not have trailing optional whitespace trimmed npm: Symlink reference outside of node_modules folder through the bin field upon installation npm: Arbitrary file write via constructed entry in the package.json bin field npm: Global node_modules Binary Overwrite
[ "cpe:/a:redhat:rhel_software_collections:3::el7" ]
null
4.8
null
null
RHSA-2024:8113
Red Hat Security Advisory: Red Hat OpenShift Data Foundation 4.16.3 security and bug fix update
webpack: DOM Clobbering vulnerability in AutoPublicPathRuntimeModule express: Improper Input Handling in Express Redirects send: Code Execution Vulnerability in Send Library serve-static: Improper Sanitization in serve-static body-parser: Denial of Service Vulnerability in body-parser
[ "cpe:/a:redhat:openshift_data_foundation:4.16::el9" ]
null
7.5
null
null
RHSA-2024:11142
Red Hat Security Advisory: gstreamer1-plugins-base security update
gstreamer1-plugins-base: GStreamer has a stack-buffer overflow in vorbis_handle_identification_packet gstreamer1-plugins-base: stack-buffer overflow in gst_opus_dec_parse_header gstreamer1-plugins-base: out-of-bounds write in Ogg demuxer
[ "cpe:/a:redhat:rhel_eus:8.8::appstream" ]
null
9.8
null
null
RHSA-2019:2585
Red Hat Security Advisory: java-1.8.0-ibm security update
OpenJDK: Insufficient checks of suppressed exceptions in deserialization (Utilities, 8212328) OpenJDK: Unbounded memory allocation during deserialization in Collections (Utilities, 8213432) OpenJDK: Insufficient restriction of privileges in AccessController (Security, 8216381) OpenJDK: Missing URL format validation (Networking, 8221518) libpng: use-after-free in png_image_free in png.c JDK: Out-of-bounds access in the String.getBytes method JDK: Failure to privatize a value pulled out of the loop by versioning
[ "cpe:/a:redhat:rhel_extras:7" ]
null
7.4
9.8
null
RHSA-2020:2117
Red Hat Security Advisory: podman security update
proglottis/gpgme: Use-after-free in GPGME bindings during container image pull buildah: Crafted input tar file may lead to local file overwrite during image build process
[ "cpe:/a:redhat:rhel_extras_other:7" ]
null
8.8
null
null
RHSA-2016:2073
Red Hat Security Advisory: openssl security update
OpenSSL: Fix memory issues in BIO_*printf functions openssl: EVP_EncodeUpdate overflow openssl: EVP_EncryptUpdate overflow openssl: Padding oracle in AES-NI CBC MAC check openssl: Memory corruption in the ASN.1 encoder openssl: ASN.1 BIO handling of large amounts of data openssl: doapr_outch function does not verify that certain memory allocation succeeds
[ "cpe:/o:redhat:rhel_eus:6.7::computenode", "cpe:/o:redhat:rhel_eus:6.7::server" ]
null
null
4
null
RHSA-2021:2394
Red Hat Security Advisory: rh-postgresql12-postgresql security update
postgresql: Partition constraint violation errors leak values of denied columns postgresql: Buffer overrun from integer overflow in array subscripting calculations postgresql: Memory disclosure in INSERT ... ON CONFLICT ... DO UPDATE postgresql: Memory disclosure in partitioned-table UPDATE ... RETURNING
[ "cpe:/a:redhat:rhel_software_collections:3::el7" ]
null
6.5
null
null
RHSA-2016:1650
Red Hat Security Advisory: Red Hat JBoss Web Server 2.1.1 security update
openssl: Bignum squaring may produce incorrect results openssl: only allow ephemeral RSA keys in export ciphersuites (FREAK) openssl: EVP_EncodeUpdate overflow openssl: EVP_EncryptUpdate overflow mod_cluster: remotely Segfault Apache http server HTTPD: sets environmental variable based on user supplied Proxy request header
[ "cpe:/a:redhat:jboss_enterprise_web_server:2.1" ]
null
null
5
null
RHSA-2015:1564
Red Hat Security Advisory: kernel-rt security, bug fix, and enhancement update
kernel: netfilter connection tracking extensions denial of service kernel: denial of service (DoS) attack against IPv6 network stacks due to improper handling of Router Advertisements. kernel: ping sockets: use-after-free leading to local privilege escalation
[ "cpe:/a:redhat:enterprise_mrg:2:server:el6" ]
null
null
null
null
RHSA-2016:1096
Red Hat Security Advisory: kernel security and bug fix update
kernel: net: incorrect processing of checksums in UDP implementation kernel: net: incorrect processing of checksums in UDP implementation
[ "cpe:/o:redhat:rhel_aus:6.4::server" ]
null
null
null
null
RHSA-2017:1836
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.0.7
Artemis: Deserialization of untrusted input vulnerability jackson-databind: Deserialization vulnerability via readValue method of ObjectMapper
[ "cpe:/a:redhat:jboss_enterprise_application_platform:7" ]
null
null
8.1
null
RHSA-2022:9108
Red Hat Security Advisory: OpenShift Container Platform 4.11.21 extras and security update
crewjam/saml: Authentication bypass when processing SAML responses containing multiple Assertion elements
[ "cpe:/a:redhat:openshift:4.11::el8" ]
null
9.1
null
null
RHSA-2014:0884
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 6.2.4 security update
PicketLink: XXE via insecure DocumentBuilderFactory usage
[ "cpe:/a:redhat:jboss_enterprise_application_platform:6.2.4" ]
null
null
null
null
RHSA-2010:0935
Red Hat Security Advisory: java-1.4.2-ibm security update
krb5: null pointer dereference in GSS-API library leads to DoS (MITKRB5-SA-2010-005) OpenJDK HttpURLConnection incomplete TRACE permission check (6981426)
[ "cpe:/a:redhat:rhel_extras:4", "cpe:/a:redhat:rhel_extras:5::client", "cpe:/a:redhat:rhel_extras:5::server" ]
null
null
null
null
RHSA-2023:2107
Red Hat Security Advisory: Migration Toolkit for Containers (MTC) 1.7.9 security and bug fix update
golang: crypto/tls: large handshake records may cause panics golang: net/http, mime/multipart: denial of service from excessive resource consumption containerd: Supplementary groups are not set up properly
[ "cpe:/a:redhat:rhmt:1.7::el8" ]
null
7.3
null
null
RHSA-2005:039
Red Hat Security Advisory: enscript security update
security flaw security flaw security flaw
[ "cpe:/o:redhat:enterprise_linux:3::as", "cpe:/o:redhat:enterprise_linux:3::desktop", "cpe:/o:redhat:enterprise_linux:3::es", "cpe:/o:redhat:enterprise_linux:3::ws" ]
null
null
null
null
RHSA-2011:0938
Red Hat Security Advisory: java-1.6.0-ibm security update
JDK: unspecified vulnerabilities fixed in 6u26 (Sound) JDK: unspecified vulnerabilities fixed in 6u26 (Sound) OpenJDK: integer overflows in JPEGImageReader and font SunLayoutEngine (2D, 7013519) JDK: unspecified vulnerability fixed in 6u26 (Deployment) OpenJDK: Deserialization allows creation of mutable SignedObject (Deserialization, 6618658) OpenJDK: NetworkInterface information leak (Networking, 7013969) OpenJDK: incorrect numeric type conversion in TransformHelper (2D, 7016495) OpenJDK: unprivileged proxy settings change via SOAPConnection (SAAJ, 7013971) OpenJDK: MediaTracker created Component instances with unnecessary privileges (Swing, 7020198) JDK: unspecified vulnerability fixed in 6u26 (2D)
[ "cpe:/a:redhat:rhel_extras:4", "cpe:/a:redhat:rhel_extras:5::client", "cpe:/a:redhat:rhel_extras:5::server", "cpe:/a:redhat:rhel_extras:6" ]
null
null
null
null
RHSA-2016:0369
Red Hat Security Advisory: rabbitmq-server security and bug fix update
RabbitMQ: /api/... XSS vulnerability RabbitMQ: /api/definitions response splitting vulnerability
[ "cpe:/a:redhat:openstack:5::el7" ]
null
null
null
null
RHSA-2024:5528
Red Hat Security Advisory: thunderbird security update
mozilla: Fullscreen notification dialog can be obscured by document content mozilla: Out of bounds memory access in graphics shared memory handling mozilla: Type confusion in WebAssembly mozilla: Incomplete WebAssembly exception handing mozilla: Out of bounds read in editor component mozilla: Missing permission check when creating a StreamFilter mozilla: Uninitialized memory used by WebGL mozilla: Use-after-free in JavaScript garbage collection mozilla: Use-after-free in IndexedDB mozilla: Document content could partially obscure security prompts
[ "cpe:/a:redhat:rhel_aus:8.6::appstream", "cpe:/a:redhat:rhel_e4s:8.6::appstream", "cpe:/a:redhat:rhel_tus:8.6::appstream" ]
null
6.1
null
null
RHSA-2022:4803
Red Hat Security Advisory: rsyslog security update
rsyslog: Heap-based overflow in TCP syslog server
[ "cpe:/a:redhat:rhev_manager:4.3", "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::hypervisor", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
8.1
null
null
RHSA-2021:2437
Red Hat Security Advisory: OpenShift Container Platform 4.8.2 packages and security update
golang: crypto/elliptic: incorrect operations on the P-224 curve gogo/protobuf: plugin/unmarshal/unmarshal.go lacks certain index validation openshift: Injected service-ca.crt incorrectly contains additional internal CAs python-eventlet: improper handling of highly compressed data and memory allocation with excessive size allows DoS jenkins-2-plugins/matrix-auth: Incorrect permission checks in Matrix Authorization Strategy Plugin jenkins: lack of type validation in agent related REST API jenkins: view name validation bypass jenkins-2-plugins/credentials: Reflected XSS vulnerability in Credentials Plugin kubernetes: Validating Admission Webhook does not observe some previous fields kubernetes: Holes in EndpointSlice Validation Enable Host Network Hijack
[ "cpe:/a:redhat:openshift:4.8::el7", "cpe:/a:redhat:openshift:4.8::el8" ]
null
2.7
null
null
RHSA-2021:3280
Red Hat Security Advisory: rh-nodejs14-nodejs and rh-nodejs14-nodejs-nodemon security update
nodejs-ini: Prototype pollution via malicious INI file nodejs-glob-parent: Regular expression denial of service c-ares: Missing input validation of host names may lead to domain hijacking nodejs: Use-after-free on close http2 on stream canceling nodejs: Improper handling of untypical characters in domain names nodejs: Incomplete validation of tls rejectUnauthorized parameter nodejs: Use-after-free on close http2 on stream canceling nodejs-path-parse: ReDoS via splitDeviceRe, splitTailRe and splitPathRe nodejs-tar: Insufficient symlink protection allowing arbitrary file creation and overwrite nodejs-tar: Insufficient absolute path sanitization allowing arbitrary file creation and overwrite
[ "cpe:/a:redhat:rhel_software_collections:3::el7" ]
null
8.1
null
null
RHSA-2024:3044
Red Hat Security Advisory: idm:DL1 security update
freeipa: specially crafted HTTP requests potentially lead to denial of service
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
5.3
null
null
RHSA-2024:3486
Red Hat Security Advisory: gdisk security update
gdisk: possible out-of-bounds-write in LoadPartitionTable of gpt.cc gdisk: possible out-of-bounds-write in ReadLogicalParts of basicmbr.cc
[ "cpe:/o:redhat:rhel_eus:8.6::baseos" ]
null
6.8
null
null
RHSA-2022:0330
Red Hat Security Advisory: samba security update
samba: Out-of-bounds heap read/write vulnerability in VFS module vfs_fruit allows code execution
[ "cpe:/a:redhat:rhel_eus:8.2::crb", "cpe:/o:redhat:rhel_eus:8.2::baseos" ]
null
9.9
null
null
RHSA-2024:8129
Red Hat Security Advisory: OpenJDK 21.0.5 Security Update for Windows Builds
giflib: Heap-Buffer Overflow during Image Saving in DumpScreen2RGB Function JDK: HTTP client improper handling of maxHeaderSize (8328286) JDK: Array indexing integer overflow (8328544) JDK: Unbounded allocation leads to out-of-memory error (8331446) JDK: Integer conversion error leads to incorrect range check (8332644)
[ "cpe:/a:redhat:openjdk:21::windows" ]
null
4.8
null
null
RHSA-2023:3148
Red Hat Security Advisory: libreswan security update
libreswan: Regression of CVE-2023-30570 fixes in the Red Hat Enterprise Linux
[ "cpe:/a:redhat:enterprise_linux:9::appstream" ]
null
7.5
null
null
RHSA-2018:1669
Red Hat Security Advisory: libvirt security update
hw: cpu: speculative store bypass
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
5.6
null
RHSA-2014:0517
Red Hat Security Advisory: openstack-foreman-installer security, bug fix, and enhancement update
foreman-installer: insecure defaults
[ "cpe:/a:redhat:openstack:4::el6" ]
null
null
null
null
RHSA-2018:2913
Red Hat Security Advisory: Red Hat Decision Manager 7.1.0 bug fix and security update
Resteasy: Yaml unmarshalling vulnerable to RCE
[ "cpe:/a:redhat:jboss_enterprise_brms_platform:7.1" ]
null
null
8.1
null
RHSA-2024:7485
Red Hat Security Advisory: golang security update
encoding/gob: golang: Calling Decoder.Decode on a message which contains deeply nested structures can cause a panic due to stack exhaustion
[ "cpe:/a:redhat:rhel_e4s:9.0::appstream" ]
null
7.5
null
null
RHBA-2023:0898
Red Hat Bug Fix Advisory: OpenShift Container Platform 4.10.53 packages update
haproxy: segfault DoS
[ "cpe:/a:redhat:openshift:4.10::el8" ]
null
4.3
null
null
RHSA-2015:0137
Red Hat Security Advisory: Red Hat JBoss Fuse/A-MQ 6.1.0 security and bug fix update
ActiveMQ: DoS via unauthenticated remote shutdown command ActiveMQ: XXE via XPath expression evaluation JAAS: LDAPLoginModule allows empty password authentication
[ "cpe:/a:redhat:jboss_amq:6.1.0", "cpe:/a:redhat:jboss_fuse:6.1.0" ]
null
null
null
null
RHSA-2007:0983
Red Hat Security Advisory: conga security, bug fix, and enhancement update
ricci is vulnerable to a connect DoS attack
[ "cpe:/a:redhat:rhel_cluster:4" ]
null
null
null
null
RHSA-2008:1007
Red Hat Security Advisory: tomcat security update for Red Hat Network Satellite Server
tomcat: Cross-Site-Scripting enabled by sendError call Tomcat host manager xss - name field tomcat RequestDispatcher information disclosure vulnerability tomcat Unicode directory traversal vulnerability tomcat RemoteFilterValve Information disclosure
[ "cpe:/a:redhat:network_satellite:5.0:el4", "cpe:/a:redhat:network_satellite:5.1::el4" ]
null
null
null
null
RHSA-2022:7338
Red Hat Security Advisory: kernel-rt security and bug fix update
kernel: a use-after-free in cls_route filter implementation may lead to privilege escalation hw: cpu: AMD: RetBleed Arbitrary Speculative Code Execution with Return Instructions hw: cpu: AMD: Branch Type Confusion (non-retbleed) hw: cpu: Intel: Post-barrier Return Stack Buffer Predictions hw: cpu: Intel: information disclosure via local access hw: cpu: AMD: RetBleed Arbitrary Speculative Code Execution with Return Instructions hw: cpu: Intel: RetBleed Arbitrary Speculative Code Execution with Return Instructions
[ "cpe:/a:redhat:rhel_extras_rt:7" ]
null
5.6
null
null
RHSA-2008:0583
Red Hat Security Advisory: openldap security update
OpenLDAP denial-of-service flaw in ASN.1 decoder
[ "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws", "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::client_workstation", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
RHSA-2023:3185
Red Hat Security Advisory: Red Hat AMQ Broker 7.10.3 release and security update
keycloak: path traversal via double URL encoding springframework: DoS via data binding to multipartFile or servlet part springframework: DoS with STOMP over WebSocket RESTEasy: creation of insecure temp files springframework: Security Bypass With Un-Prefixed Double Wildcard Pattern springframework: Spring Expression DoS Vulnerability
[ "cpe:/a:redhat:amq_broker:7" ]
null
5.3
null
null
RHSA-2016:1855
Red Hat Security Advisory: rh-ror42 security update
rubygem-actionview: cross-site scripting flaw in Action View rubygem-activerecord: unsafe query generation in Active Record
[ "cpe:/a:redhat:rhel_software_collections:2::el7" ]
null
null
5.3
null
RHSA-2015:1705
Red Hat Security Advisory: bind security update
bind: malformed DNSSEC key failed assertion denial of service
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation", "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
null
null
RHSA-2006:0265
Red Hat Security Advisory: sendmail security update
security flaw
[ "cpe:/o:redhat:enterprise_linux:2.1::as", "cpe:/o:redhat:enterprise_linux:2.1::aw", "cpe:/o:redhat:enterprise_linux:2.1::es", "cpe:/o:redhat:enterprise_linux:2.1::ws" ]
null
null
null
null
RHSA-2022:2008
Red Hat Security Advisory: cockpit security, bug fix, and enhancement update
cockpit: pages vulnerable to clickjacking cockpit: authenticates with revoked certificates
[ "cpe:/o:redhat:enterprise_linux:8::baseos" ]
null
7.5
null
null
RHSA-2024:2337
Red Hat Security Advisory: python3.11-cryptography security update
python-cryptography: NULL-dereference when loading PKCS7 certificates
[ "cpe:/a:redhat:enterprise_linux:9::appstream" ]
null
7.5
null
null