id
stringlengths
13
15
title
stringlengths
29
176
description
stringlengths
8
32.1k
cpes
listlengths
0
20
cvss_v4_0
null
cvss_v3_1
float64
0
10
cvss_v3_0
float64
0
10
cvss_v2_0
null
RHSA-2024:3953
Red Hat Security Advisory: firefox security update
Mozilla: Use-after-free in JavaScript object transplant Mozilla: External protocol handlers leaked by timing attack Mozilla: Sandboxed iframes were able to bypass sandbox restrictions to open a new window Mozilla: Cross-Origin Image leak via Offscreen Canvas Mozilla: Memory Corruption in Text Fragments Mozilla: Memory safety bugs fixed in Firefox 127, Firefox ESR 115.12, and Thunderbird 115.12 Mozilla: Use-after-free in networking
[ "cpe:/a:redhat:rhel_aus:8.4::appstream", "cpe:/a:redhat:rhel_e4s:8.4::appstream", "cpe:/a:redhat:rhel_tus:8.4::appstream" ]
null
7.5
null
null
RHSA-2021:0603
Red Hat Security Advisory: Red Hat Decision Manager 7.10.0 security update
log4j: improper validation of certificate with host mismatch in SMTP appender apache-httpclient: incorrect handling of malformed authority component in request URIs wildfly: XML validation manipulation due to incomplete application of use-grammar-pool-only in xercesImpl hibernate-core: SQL injection vulnerability when both hibernate.use_sql_comments and JPQL String literals are used
[ "cpe:/a:redhat:jboss_enterprise_brms_platform:7.10" ]
null
7.4
null
null
RHSA-2024:4928
Red Hat Security Advisory: kernel security update
kernel: can: j1939: j1939_netdev_start(): fix UAF for rx_kref of j1939_priv kernel: net: amd-xgbe: Fix skb data length underflow kernel: block: null pointer dereference in ioctl.c when length and logical block size are misaligned kernel: scsi: libfc: Fix potential NULL pointer dereference in fc_lport_ptp_setup() kernel: bpf: Fix racing between bpf_timer_cancel_and_free and bpf_timer_cancel kernel: ext4: avoid allocating blocks from corrupted group in ext4_mb_try_best_found() kernel: net/ipv6: avoid possible UAF in ip6_route_mpath_notify() kernel: dm: call the resume method on internal suspend kernel: Squashfs: check the inode number is not the invalid value of zero kernel: octeontx2-af: race condition on interupts kernel: nfp: flower: handle acti_netdevs allocation failure kernel: icmp: prevent possible NULL dereferences from icmp_build_probe() kernel: mlxbf_gige: stop interface during shutdown kernel: mlxbf_gige: call request_irq() after NAPI initialized kernel: drm/ast: Fix soft lockup kernel: scsi: lpfc: Release hbalock before calling lpfc_worker_wake_up() kernel: scsi: lpfc: Move NPIV's transport unregistration to after resource clean up kernel: epoll: be better about file lifetimes
[ "cpe:/a:redhat:enterprise_linux:9::appstream", "cpe:/a:redhat:enterprise_linux:9::crb", "cpe:/a:redhat:enterprise_linux:9::nfv", "cpe:/a:redhat:enterprise_linux:9::realtime", "cpe:/o:redhat:enterprise_linux:9::baseos" ]
null
3.3
null
null
RHSA-2020:2014
Red Hat Security Advisory: sqlite security update
sqlite: fts3: improve shadow table corruption detection
[ "cpe:/o:redhat:rhel_eus:7.6::computenode", "cpe:/o:redhat:rhel_eus:7.6::server" ]
null
8.8
null
null
RHSA-2010:0175
Red Hat Security Advisory: httpd security, bug fix, and enhancement update
httpd: request header information leak
[ "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws" ]
null
null
null
null
RHSA-2012:1156
Red Hat Security Advisory: kernel security and bug fix update
kernel: bt sco_conninfo infoleak kernel: drm/i915: integer overflow in i915_gem_execbuffer2()
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
null
null
RHSA-2023:4162
Red Hat Security Advisory: java-11-openjdk security and bug fix update
OpenJDK: HTTP client insufficient file name validation (8302475) OpenJDK: ZIP file parsing infinite loop (8302483) OpenJDK: weakness in AES implementation (8308682) OpenJDK: array indexing integer overflow issue (8304468) OpenJDK: improper handling of slash characters in URI-to-path conversion (8305312) harfbuzz: allows attackers to trigger O(n^2) growth via consecutive marks
[ "cpe:/a:redhat:rhel_aus:8.2::appstream", "cpe:/a:redhat:rhel_e4s:8.2::appstream", "cpe:/a:redhat:rhel_tus:8.2::appstream" ]
null
7.5
null
null
RHSA-2018:2331
Red Hat Security Advisory: Red Hat OpenStack Platform 12.0 director security and bug fix update
memcached: UDP server support allows spoofed traffic amplification DoS
[ "cpe:/a:redhat:openstack:12::el7" ]
null
null
5.3
null
RHSA-2022:8806
Red Hat Security Advisory: usbguard security update
usbguard: Fix unauthorized access via D-Bus
[ "cpe:/a:redhat:rhel_eus:8.6::appstream" ]
null
7.8
null
null
RHSA-2024:7481
Red Hat Security Advisory: linux-firmware security update
kernel: hw:amd:IOMMU improperly handles certain special address leading to a loss of guest integrity hw: amd: SMM Lock Bypass kernel: hw:amd: Incomplete system memory cleanup in SEV firmware corrupt guest private memory
[ "cpe:/o:redhat:enterprise_linux:8::baseos" ]
null
4.4
null
null
RHSA-2016:1380
Red Hat Security Advisory: nodejs010-node-gyp and nodejs010-nodejs-qs security and bug fix update
nodejs-qs: Denial-of-Service Memory Exhaustion
[ "cpe:/a:redhat:rhel_software_collections:2::el6", "cpe:/a:redhat:rhel_software_collections:2::el7" ]
null
null
null
null
RHSA-2020:3276
Red Hat Security Advisory: grub2 security and bug fix update
grub2: Crafted grub.cfg file can lead to arbitrary code execution during boot process grub2: grub_malloc does not validate allocation size allowing for arithmetic overflow and subsequent heap-based buffer overflow grub2: Integer overflow in grub_squash_read_symlink may lead to heap-based buffer overflow grub2: Integer overflow read_section_as_string may lead to heap-based buffer overflow grub2: Integer overflow in grub_ext2_read_link leads to heap-based buffer overflow grub2: Fail kernel validation without shim protocol grub2: Use-after-free redefining a function whilst the same function is already executing grub2: Integer overflow in initrd size handling
[ "cpe:/o:redhat:rhel_aus:7.3::server", "cpe:/o:redhat:rhel_e4s:7.3::server", "cpe:/o:redhat:rhel_tus:7.3::server" ]
null
5.7
null
null
RHSA-2007:1038
Red Hat Security Advisory: openldap security and enhancement update
openldap slapd DoS via objectClasses attribute
[ "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws" ]
null
null
null
null
RHSA-2020:3199
Red Hat Security Advisory: openstack-tripleo-heat-templates security update
openstack-tripleo-heat-templates: No sVirt protection for OSP16 VMs due to disabled SELinux
[ "cpe:/a:redhat:openstack:16.1::el8" ]
null
9.9
null
null
RHSA-2018:1396
Red Hat Security Advisory: libvirt security and bug fix update
libvirt: Incomplete fix for CVE-2018-5748 triggered by QEMU guest agent libvirt: Resource exhaustion via qemuMonitorIORead() method
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
3.3
null
RHSA-2025:1137
Red Hat Security Advisory: firefox security update
firefox: thunderbird: Use-after-free in XSLT firefox: thunderbird: Use-after-free in Custom Highlight firefox: thunderbird: A bug in WebAssembly code generation could result in a crash firefox: thunderbird: Use-after-free during concurrent delazification firefox: thunderbird: Potential opening of private browsing tabs in normal browsing windows firefox: thunderbird: Certificate length was not properly checked firefox: thunderbird: Memory safety bugs fixed in Firefox 135, Thunderbird 135, Firefox ESR 115.20, Firefox ESR 128.7, Thunderbird 115.20, and Thunderbird 128.7 firefox: thunderbird: Memory safety bugs fixed in Firefox 135, Thunderbird 135, Firefox ESR 128.7, and Thunderbird 128.7
[ "cpe:/a:redhat:rhel_eus:8.8::appstream" ]
null
8.8
null
null
RHSA-2012:1264
Red Hat Security Advisory: postgresql security update
module): XXE by applying XSL stylesheet to the document
[ "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::client_workstation", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
RHSA-2008:0178
Red Hat Security Advisory: evolution security update
Evolution format string flaw
[ "cpe:/o:redhat:rhel_eus:4.5::as", "cpe:/o:redhat:rhel_eus:4.5::es" ]
null
null
null
null
RHSA-2024:0371
Red Hat Security Advisory: kpatch-patch security update
kernel: netfilter: potential slab-out-of-bound access due to integer underflow
[ "cpe:/o:redhat:enterprise_linux:7::server" ]
null
7
null
null
RHSA-2011:0950
Red Hat Security Advisory: jboss-seam2 security update
JBoss Seam EL interpolation in exception handling
[ "cpe:/a:redhat:jboss_enterprise_application_platform:4.3.0::el4", "cpe:/a:redhat:jboss_enterprise_application_platform:4.3.0::el5" ]
null
null
null
null
RHSA-2020:4697
Red Hat Security Advisory: targetcli security and enhancement update
targetcli: weak permissions for /etc/target and backup files
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
5.5
null
null
RHSA-2022:0129
Red Hat Security Advisory: thunderbird security update
Mozilla: Iframe sandbox bypass with XSLT Mozilla: Race condition when playing audio files Mozilla: Heap-buffer-overflow in blendGaussianBlur Mozilla: Missing throttling on external protocol launch dialog Mozilla: Use-after-free of ChannelEventQueue::mOwner Mozilla: Browser window spoof using fullscreen mode Mozilla: Out-of-bounds memory access when inserting text in edit mode Mozilla: Browser window spoof using fullscreen mode Mozilla: Leaking cross-origin URLs through securitypolicyviolation event Mozilla: Crash when handling empty pkcs7 sequence Mozilla: Spoofed origin on external protocol launch dialog Mozilla: Memory safety bugs fixed in Firefox 96 and Firefox ESR 91.5
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
8.8
6.1
null
RHSA-2024:7703
Red Hat Security Advisory: firefox security update
firefox: Clipboard write permission bypass firefox: thunderbird: Compromised content process can bypass site isolation firefox: thunderbird: Cross-origin access to PDF contents through multipart responses firefox: thunderbird: Cross-origin access to JSON contents through multipart responses firefox: thunderbird: Potential memory corruption may occur when cloning certain objects firefox: thunderbird: Potential directory upload bypass via clickjacking firefox: thunderbird: External protocol handlers could be enumerated via popups firefox: thunderbird: Specially crafted WebTransport requests could lead to denial of service firefox: thunderbird: Potential memory corruption during JIT compilation firefox: thunderbird: Memory safety bugs fixed in Firefox 131, Firefox ESR 115.16, Firefox ESR 128.3, Thunderbird 131, and Thunderbird 128.3 firefox: thunderbird: Memory safety bugs fixed in Firefox 131, Firefox ESR 128.3, Thunderbird 131, and Thunderbird 128.3 firefox: thunderbird: Memory safety bugs fixed in Firefox 131 and Thunderbird 131
[ "cpe:/a:redhat:rhel_aus:8.4::appstream", "cpe:/a:redhat:rhel_e4s:8.4::appstream", "cpe:/a:redhat:rhel_tus:8.4::appstream" ]
null
7.5
null
null
RHSA-2017:1865
Red Hat Security Advisory: X.org X11 libraries security, bug fix and enhancement update
libXpm: Out-of-bounds write in XPM extension parsing libXdmcp: weak entropy usage for session keys libICE: weak entropy usage in session keys
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
5.2
null
RHSA-2022:1455
Red Hat Security Advisory: kernel security, bug fix, and enhancement update
kernel: fget: check that the fd still exists after getting a ref to it kernel: cgroups v1 release_agent feature may allow privilege escalation kernel: heap out of bounds write in nf_dup_netdev.c
[ "cpe:/a:redhat:rhel_eus:8.4::crb", "cpe:/o:redhat:rhel_eus:8.4::baseos" ]
null
7.8
null
null
RHSA-2023:7370
Red Hat Security Advisory: kernel security, bug fix, and enhancement update
kernel: AMD: Cross-Thread Return Address Predictions hw: Intel: Gather Data Sampling (GDS) side channel vulnerability kernel: net/sched: cls_u32 component reference counter leak if tcf_change_indev() fails kernel: tun: bugs for oversize packet when napi frags enabled in tun_napi_alloc_frags kernel: net/sched: Use-after-free vulnerabilities in the net/sched classifiers: cls_fw, cls_u32 and cls_route kernel: net/sched: Use-after-free vulnerabilities in the net/sched classifiers: cls_fw, cls_u32 and cls_route kernel: net/sched: Use-after-free vulnerabilities in the net/sched classifiers: cls_fw, cls_u32 and cls_route kernel: net/sched: Use-after-free vulnerabilities in the net/sched classifiers: cls_fw, cls_u32 and cls_route kernel: use after free in nvmet_tcp_free_crypto in NVMe kernel: netfilter: potential slab-out-of-bound access due to integer underflow kernel: blkio memory leakage due to blkcg and some blkgs are not freed after they are made offline.
[ "cpe:/a:redhat:rhel_eus:9.2::appstream", "cpe:/a:redhat:rhel_eus:9.2::crb", "cpe:/o:redhat:rhel_eus:9.2::baseos" ]
null
5.5
null
null
RHSA-2004:689
Red Hat Security Advisory: kernel security update
security flaw security flaw security flaw security flaw security flaw security flaw security flaw
[ "cpe:/o:redhat:enterprise_linux:3::as", "cpe:/o:redhat:enterprise_linux:3::desktop", "cpe:/o:redhat:enterprise_linux:3::es", "cpe:/o:redhat:enterprise_linux:3::ws" ]
null
null
null
null
RHSA-2020:4244
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.3.3 security update on RHEL 6
cxf: JMX integration is vulnerable to a MITM attack picketbox: JBoss EAP reload to admin-only mode allows authentication bypass wildfly: XML validation manipulation due to incomplete application of use-grammar-pool-only in xercesImpl xnio: file descriptor leak caused by growing amounts of NIO Selector file handles may lead to DoS
[ "cpe:/a:redhat:jboss_enterprise_application_platform:7.3::el6" ]
null
5.9
null
null
RHSA-2023:0283
Red Hat Security Advisory: sudo security update
sudo: arbitrary file write with privileges of the RunAs user
[ "cpe:/o:redhat:rhel_eus:8.6::baseos" ]
null
7.8
null
null
RHSA-2024:4340
Red Hat Security Advisory: openssh security update
openssh: regreSSHion - race condition in SSH allows RCE/DoS
[ "cpe:/a:redhat:rhel_eus:9.2::appstream", "cpe:/o:redhat:rhel_eus:9.2::baseos" ]
null
8.1
null
null
RHSA-2020:1797
Red Hat Security Advisory: binutils security and bug fix update
binutils: integer overflow leading to a SEGV in _bfd_dwarf2_find_nearest_line in dwarf2.c binutils: Improper Input Validation, Signed/Unsigned Comparison, Out-of-bounds Read in gold/fileread.cc and elfcpp/elfcpp_file.h leads to denial of service
[ "cpe:/a:redhat:enterprise_linux:8::appstream", "cpe:/o:redhat:enterprise_linux:8::baseos" ]
null
null
4.7
null
RHSA-2020:1296
Red Hat Security Advisory: qemu-kvm-rhev security update
QEMU: block: iscsi: OOB heap access via an unexpected response of iSCSI Server QEMU: slirp: OOB buffer access while emulating tcp protocols in tcp_emu()
[ "cpe:/a:redhat:openstack:13::el7" ]
null
5.6
null
null
RHSA-2013:0840
Red Hat Security Advisory: kernel security update
kernel: perf_swevent_enabled array out-of-bound access
[ "cpe:/o:redhat:rhel_eus:6.2::server" ]
null
null
null
null
RHSA-2023:7116
Red Hat Security Advisory: c-ares security update
c-ares: buffer overflow in config_sortlist() due to missing string length check
[ "cpe:/o:redhat:enterprise_linux:8::baseos" ]
null
8.6
null
null
RHSA-2018:3396
Red Hat Security Advisory: libvirt security update
hw: cpu: speculative store bypass
[ "cpe:/o:redhat:rhel_aus:6.5::server" ]
null
null
5.6
null
RHSA-2016:0055
Red Hat Security Advisory: java-1.8.0-oracle security update
TLS 1.2 Transcipt Collision attacks against MD5 in key exchange protocol (SLOTH) libpng: Buffer overflow vulnerabilities in png_get_PLTE/png_set_PLTE functions libpng: Buffer overflow vulnerabilities in png_get_PLTE/png_set_PLTE functions OpenJDK: URL deserialization inconsistencies (Networking, 8059054) OpenJDK: logging of RMI connection secrets (JMX, 8130710) OpenJDK: insufficient enforcement of totalEntitySizeLimit (JAXP, 8133962) OpenJDK: PBE incorrect key lengths (Libraries, 8138589) OpenJDK: incorrect boundary check in JPEG decoder (AWT, 8139017) ICU: integer signedness issue in IndicRearrangementProcessor (OpenJDK 2D, 8140543)
[ "cpe:/a:redhat:rhel_extras_oracle_java:6", "cpe:/a:redhat:rhel_extras_oracle_java:7" ]
null
null
null
null
RHSA-2025:3627
Red Hat Security Advisory: libxslt security update
libxslt: Use-After-Free in libxslt (xsltGetInheritedNsList) libxslt: Use-After-Free in libxslt numbers.c
[ "cpe:/a:redhat:rhel_e4s:9.0::appstream" ]
null
7.8
null
null
RHSA-2016:0678
Red Hat Security Advisory: java-1.7.0-oracle security update
OpenJDK: insufficient thread consistency checks in ObjectInputStream (Serialization, 8129952) OpenJDK: insufficient byte type checks (Hotspot, 8132051) OpenJDK: insufficient DSA key parameters checks (Security, 8138593) JDK: unspecified vulnerability fixed in 6u115, 7u101 and 8u91 (2D) OpenJDK: incorrect handling of surrogate pairs in XML attribute values (JAXP, 8143167) OpenJDK: unrestricted deserialization of authentication credentials (JMX, 8144430) JDK: unspecified vulnerability fixed in 6u115, 7u101 and 8u91 (2D) JDK: unspecified vulnerability fixed in 6u115, 7u101 and 8u91 (Deployment)
[ "cpe:/a:redhat:rhel_extras_oracle_java:5", "cpe:/a:redhat:rhel_extras_oracle_java:6", "cpe:/a:redhat:rhel_extras_oracle_java:7" ]
null
null
null
null
RHSA-2011:0558
Red Hat Security Advisory: perl security and bug fix update
perl-CGI-Simple: - hardcoded MIME boundary value for multipart content, CVE-2010-4410 - CRLF injection allowing HTTP response splitting perl-CGI-Simple: - hardcoded MIME boundary value for multipart content, CVE-2010-4410 - CRLF injection allowing HTTP response splitting perl: lc(), uc() routines are laundering tainted data
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
null
null
RHSA-2022:4899
Red Hat Security Advisory: compat-openssl11 security and bug fix update
openssl: Infinite loop in BN_mod_sqrt() reachable when parsing certificates
[ "cpe:/a:redhat:enterprise_linux:9::appstream" ]
null
7.5
null
null
RHSA-2023:7697
Red Hat Security Advisory: AMQ Clients 2023.Q4
SnakeYaml: Constructor Deserialization Remote Code Execution snakeyaml: Denial of Service due to missing nested depth limitation for collections snakeyaml: Uncaught exception in org.yaml.snakeyaml.composer.Composer.composeSequenceNode dev-java/snakeyaml: DoS via stack overflow json-smart: Uncontrolled Resource Consumption vulnerability in json-smart (Resource Exhaustion) springframework-amqp: Deserialization Vulnerability netty: SniHandler 16MB allocation leads to OOM jetty: Improper validation of HTTP/1 content-length
[ "cpe:/a:redhat:amq_clients:2023_q4" ]
null
5.3
null
null
RHSA-2023:1815
Red Hat Security Advisory: Red Hat Integration Debezium 2.1.4 security update
postgresql-jdbc: Information leak of prepared statement data due to insecure temporary file permissions
[ "cpe:/a:redhat:debezium:2" ]
null
5.5
null
null
RHSA-2022:7108
Red Hat Security Advisory: sqlite security update
sqlite: Null pointer derreference in src/select.c sqlite: Out of bounds access during table rename
[ "cpe:/a:redhat:enterprise_linux:8::appstream", "cpe:/o:redhat:enterprise_linux:8::baseos" ]
null
8.1
null
null
RHSA-2023:6365
Red Hat Security Advisory: mod_auth_openidc security and bug fix update
mod_auth_openidc: Open Redirect in oidc_validate_redirect_url() using tab character mod_auth_openidc: NULL pointer dereference when OIDCStripCookies is set and a crafted Cookie header is supplied
[ "cpe:/a:redhat:enterprise_linux:9::appstream" ]
null
7.5
null
null
RHSA-2020:4174
Red Hat Security Advisory: rh-mariadb102-mariadb and rh-mariadb102-galera security and bug fix update
mysql: Server: Replication unspecified vulnerability (CPU Apr 2019) mysql: Server: Security: Privileges unspecified vulnerability (CPU Apr 2019) mysql: InnoDB unspecified vulnerability (CPU Apr 2019) mysql: Server: Pluggable Auth unspecified vulnerability (CPU Jul 2019) mysql: Server: Security: Privileges unspecified vulnerability (CPU Jul 2019) mysql: Server: XML unspecified vulnerability (CPU Jul 2019) mysql: InnoDB unspecified vulnerability (CPU Jul 2019) mysql: Server: Parser unspecified vulnerability (CPU Jul 2019) mysql: InnoDB unspecified vulnerability (CPU Oct 2019) mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2019) mysql: C API unspecified vulnerability (CPU Jan 2020) mysql: C API unspecified vulnerability (CPU Apr 2020) mysql: InnoDB unspecified vulnerability (CPU Apr 2020) mysql: Server: DML unspecified vulnerability (CPU Apr 2020) mysql: Server: Stored Procedure unspecified vulnerability (CPU Apr 2020) mysql: InnoDB unspecified vulnerability (CPU Apr 2020) mysql: C API unspecified vulnerability (CPU Apr 2020) mariadb-connector-c: Improper validation of content in a OK packet received from server
[ "cpe:/a:redhat:rhel_software_collections:3::el6", "cpe:/a:redhat:rhel_software_collections:3::el7" ]
null
8.8
3.7
null
RHSA-2018:0018
Red Hat Security Advisory: kernel security update
hw: cpu: speculative execution branch target injection hw: cpu: speculative execution bounds-check bypass hw: cpu: speculative execution permission faults handling
[ "cpe:/o:redhat:rhel_aus:6.4::server" ]
null
null
5.5
null
RHSA-2005:543
Red Hat Security Advisory: ruby security update
security flaw
[ "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws" ]
null
null
null
null
RHSA-2008:0177
Red Hat Security Advisory: evolution security update
Evolution format string flaw
[ "cpe:/a:redhat:rhel_productivity:5", "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws", "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::client_workstation" ]
null
null
null
null
RHSA-2016:0046
Red Hat Security Advisory: kernel security update
virt: guest to host DoS by triggering an infinite loop in microcode via #AC exception virt: guest to host DoS by triggering an infinite loop in microcode via #DB exception
[ "cpe:/o:redhat:rhel_mission_critical:6.2::server" ]
null
null
null
null
RHSA-2016:2056
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 6.4.10 update
httpd: HTTP request smuggling attack against chunked request parser OpenSSL: X509_ATTRIBUTE memory leak LOGJAM: TLS connections which support export grade DHE key-exchange are vulnerable to MITM attacks openssl: EVP_EncodeUpdate overflow openssl: EVP_EncryptUpdate overflow openssl: Memory corruption in the ASN.1 encoder openssl: ASN.1 BIO handling of large amounts of data mod_cluster: remotely Segfault Apache http server mod_cluster: Buffer overflow in mod_manager when sending request with long JVMRoute
[ "cpe:/a:redhat:jboss_enterprise_application_platform:6.4" ]
null
null
4.8
null
RHSA-2024:7179
Red Hat Security Advisory: OpenShift Container Platform 4.15.35 bug fix and security update
jose-go: improper handling of highly compressed data
[ "cpe:/a:redhat:openshift:4.15::el8", "cpe:/a:redhat:openshift:4.15::el9" ]
null
4.3
null
null
RHSA-2018:3651
Red Hat Security Advisory: kernel security, bug fix, and enhancement update
kernel: stack-based buffer overflow in chap_server_compute_md5() in iscsi target kernel: NULL pointer dereference in af_netlink.c:__netlink_ns_capable() allows for denial of service
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
5.5
null
RHSA-2022:6703
Red Hat Security Advisory: firefox security update
Mozilla: Out of bounds read when decoding H264 Mozilla: Content-Security-Policy base-uri bypass Mozilla: Incoherent instruction cache when building WASM on ARM64 Mozilla: Bypassing Secure Context restriction for cookies with __Host and __Secure prefix Mozilla: Bypassing FeaturePolicy restrictions on transient pages Mozilla: Data-race when parsing non-UTF-8 URLs in threads Mozilla: Memory safety bugs fixed in Firefox 105 and Firefox ESR 102.3
[ "cpe:/a:redhat:rhel_e4s:8.1::appstream" ]
null
8.8
7.5
null
RHSA-2010:0101
Red Hat Security Advisory: openoffice.org security update
openoffice.org: integer overflow in XPM processing openoffice.org: GIF file parsing heap overflow OpenOffice.org Word sprmTDefTable Memory Corruption OpenOffice.org Word sprmTSetBrc Memory Corruption
[ "cpe:/a:redhat:rhel_productivity:5", "cpe:/o:redhat:enterprise_linux:3::as", "cpe:/o:redhat:enterprise_linux:3::desktop", "cpe:/o:redhat:enterprise_linux:3::es", "cpe:/o:redhat:enterprise_linux:3::ws", "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws", "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::client_workstation" ]
null
null
null
null
RHSA-2025:3743
Red Hat Security Advisory: Red Hat build of OpenTelemetry 3.5.1 release
golang.org/x/oauth2/jws: Unexpected memory consumption during token parsing in golang.org/x/oauth2/jws go-jose: Go JOSE's Parsing Vulnerable to Denial of Service github.com/expr-lang/expr: Memory Exhaustion in Expr Parser with Unrestricted Input golang-jwt/jwt: jwt-go allows excessive memory allocation during header parsing
[ "cpe:/a:redhat:openshift_distributed_tracing:3.5::el8" ]
null
7.5
null
null
RHSA-2017:2390
Red Hat Security Advisory: qemu-kvm-rhev security update
Qemu: qemu-nbd: server breaks with SIGPIPE upon client abort
[ "cpe:/o:redhat:enterprise_linux:7::hypervisor" ]
null
null
5.3
null
RHSA-2019:2582
Red Hat Security Advisory: pango security update
pango: pango_log2vis_get_embedding_levels() heap-based buffer overflow
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
null
9.8
null
RHSA-2024:4277
Red Hat Security Advisory: qemu-kvm security update
qemu-kvm: 'qemu-img info' leads to host file read/write
[ "cpe:/a:redhat:rhel_eus:9.2::appstream" ]
null
7.8
null
null
RHSA-2010:0044
Red Hat Security Advisory: pidgin security update
pidgin/libpurple: MSN custom smiley request directory traversal file disclosure
[ "cpe:/a:redhat:rhel_productivity:5", "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws", "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::client_workstation" ]
null
null
null
null
RHSA-2016:2820
Red Hat Security Advisory: memcached security update
memcached: Server append/prepend remote code execution memcached: Server update remote code execution
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
9.8
null
RHSA-2024:0499
Red Hat Security Advisory: libssh security update
ssh: Prefix truncation attack on Binary Packet Protocol (BPP)
[ "cpe:/a:redhat:rhel_eus:9.2::appstream", "cpe:/o:redhat:rhel_eus:9.2::baseos" ]
null
5.9
null
null
RHSA-2018:1675
Red Hat Security Advisory: vdsm security update
hw: cpu: speculative store bypass
[ "cpe:/o:redhat:enterprise_linux:7::hypervisor" ]
null
null
5.6
null
RHSA-2024:6722
Red Hat Security Advisory: thunderbird security update
mozilla: Type Confusion in Async Generators in Javascript Engine mozilla: Type confusion when looking up a property name in a "with" block mozilla: Internal event interfaces were exposed to web content when browser EventHandler listener callbacks ran mozilla: Garbage collection could mis-color cross-compartment objects in OOM conditions mozilla: WASM type confusion involving ArrayTypes mozilla: SelectElements could be shown over another site if popups are allowed mozilla: Memory safety bugs fixed in Firefox 130, Firefox ESR 128.2, and Thunderbird 128.2 thunderbird: Crash when aborting verification of OTR chat
[ "cpe:/a:redhat:rhel_e4s:9.0::appstream" ]
null
6.5
null
null
RHSA-2024:4823
Red Hat Security Advisory: kernel security update
kernel: can: j1939: j1939_netdev_start(): fix UAF for rx_kref of j1939_priv kernel: vmwgfx: integer overflow in vmwgfx_execbuf.c kernel: vmwgfx: use-after-free in vmw_cmd_res_check kernel: vmwgfx: use-after-free in vmw_execbuf_tie_context kernel: net: amd-xgbe: Fix skb data length underflow kernel: vmwgfx: reference count issue leads to use-after-free in surface handling kernel: vmwgfx: race condition leading to information disclosure vulnerability kernel: vmwgfx: double free within the handling of vmw_buffer_object objects kernel: smb: client: fix potential OOBs in smb2_parse_contexts() kernel: uio: Fix use-after-free in uio_open kernel: intel: Fix NULL pointer dereference issue in upi_fill_topology() kernel: Bluetooth: hci_codec: Fix leaking content of local_codecs kernel: net: bridge: data races indata-races in br_handle_frame_finish() kernel: sched/psi: Fix use-after-free in ep_remove_wait_queue() kernel: scsi: ibmvfc: Remove BUG_ON in the case of an empty event pool kernel: stack overflow problem in Open vSwitch kernel module leading to DoS kernel: nftables: nft_set_rbtree skip end interval element from gc kernel: netfilter: nft_limit: reject configurations that cause integer overflow kernel: hv_netvsc: Fix race condition between netvsc_probe and netvsc_remove kernel: ext4: fix double-free of blocks due to wrong extents moved_len kernel: net/sched: act_mirred: don't override retval if we already lost the skb kernel: ext4: avoid allocating blocks from corrupted group in ext4_mb_try_best_found() kernel: netfilter: nft_chain_filter: handle NETDEV_UNREGISTER for inet/ingress basechain kernel: vfio/pci: Lock external INTx masking ops kernel: dm: call the resume method on internal suspend kernel: x86/xen: Add some null pointer checking to smp.c kernel: af_unix: Fix garbage collector racing against connect() kernel: netfilter: nf_tables: release mutex after nft_gc_seq_end from abort path kernel: scsi: qla2xxx: Fix double free of fcport kernel: scsi: qla2xxx: Fix command flush on cable pull kernel: Squashfs: check the inode number is not the invalid value of zero kernel: netfilter: flowtable: validate pppoe header kernel: netfilter: nf_tables: Fix potential data-race in __nft_obj_type_get() kernel: netfilter: nf_tables: Fix potential data-race in __nft_expr_type_get() kernel: netfilter: nf_tables: do not compare internal table flags on updates kernel: ipv6: fix potential "struct net" leak in inet6_rtm_getaddr() kernel: KVM: SVM: Flush pages under kvm->lock to fix UAF in svm_register_enc_region() kernel: netfilter: nf_tables: discard table flag update with pending basechain deletion kernel: netfilter: nf_tables: flush pending destroy work before exit_net release kernel: drm/client: Fully protect modes[] with dev->mode_config.mutex kernel: scsi: qla2xxx: Fix off by one in qla_edif_app_getstats() kernel: tls: fix missing memory barrier in tls_init kernel: tcp: Use refcount_inc_not_zero() in tcp_twsk_unique(). kernel: scsi: lpfc: Release hbalock before calling lpfc_worker_wake_up() kernel: scsi: lpfc: Move NPIV's transport unregistration to after resource clean up kernel: net: sched: sch_multiq: fix possible OOB write in multiq_tune() kernel: af_unix: Fix data races in unix_release_sock/unix_stream_sendmsg
[ "cpe:/a:redhat:rhel_eus:9.2::appstream", "cpe:/a:redhat:rhel_eus:9.2::crb", "cpe:/o:redhat:rhel_eus:9.2::baseos" ]
null
4.7
null
null
RHSA-2024:9524
Red Hat Security Advisory: libsoup security update
libsoup: HTTP request smuggling via stripping null bytes from the ends of header names
[ "cpe:/a:redhat:rhel_eus:8.8::appstream", "cpe:/o:redhat:rhel_eus:8.8::baseos" ]
null
7.5
null
null
RHSA-2019:0879
Red Hat Security Advisory: openstack-neutron security update
openstack-neutron: incorrect validation of port settings in iptables security group driver openstack-neutron: DOS via broken port range merging in security group
[ "cpe:/a:redhat:openstack:14::el7" ]
null
null
7.5
null
RHSA-2012:0730
Red Hat Security Advisory: java-1.6.0-openjdk security update
OpenJDK: improper protection of CORBA data models (CORBA, 7079902) OpenJDK: fontmanager layout lookup code memory corruption (2D, 7143617) OpenJDK: SynthLookAndFeel application context bypass (Swing, 7143614) OpenJDK: insecure temporary file permissions (JRE, 7143606) OpenJDK: CRL and certificate extensions handling improvements (Security, 7143872) OpenJDK: mutable repository identifiers in generated stub code (CORBA, 7143851) OpenJDK: insufficient field accessibility checks (HotSpot, 7152811) OpenJDK: XML parsing infinite loop (JAXP, 7157609) OpenJDK: insufficient invokespecial <init> verification (HotSpot, 7160757)
[ "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
RHSA-2008:0497
Red Hat Security Advisory: sblim security update
sblim: libraries built with insecure RPATH
[ "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws", "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::client_workstation", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
RHSA-2019:1024
Red Hat Security Advisory: flatpak security update
flatpak: Sandbox bypass via IOCSTI (incomplete fix for CVE-2017-5226)
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
8.8
null
RHSA-2023:7216
Red Hat Security Advisory: Red Hat OpenShift Service Mesh Containers for 2.4.5
golang.org/x/net/html: Cross site scripting
[ "cpe:/a:redhat:service_mesh:2.4::el8" ]
null
6.1
null
null
RHSA-2022:0989
Red Hat Security Advisory: Red Hat OpenStack Platform 16.1 (golang-qpid-apache) security update
golang: net: incorrect parsing of extraneous zero characters at the beginning of an IP address octet
[ "cpe:/a:redhat:openstack:16.1::el8" ]
null
7.3
null
null
RHSA-2010:0907
Red Hat Security Advisory: kernel security and bug fix update
kernel: nfsd4: bug in read_buf
[ "cpe:/o:redhat:rhel_eus:5.4" ]
null
null
null
null
RHSA-2020:3040
Red Hat Security Advisory: virt:rhel security update
QEMU: Slirp: potential OOB access due to unsafe snprintf() usages
[ "cpe:/a:redhat:rhel_e4s:8.0::appstream" ]
null
5.6
null
null
RHSA-2016:0619
Red Hat Security Advisory: samba security update
samba: crash in dcesrv_auth_bind_ack due to missing error check samba: Man-in-the-middle attacks possible with NTLMSSP authentication samba: Spoofing vulnerability when domain controller is configured samba: Missing downgrade detection samba: Smb signing not required by default when smb client connection is used for ipc usage samba: SAMR and LSA man in the middle attacks
[ "cpe:/o:redhat:rhel_aus:6.4::server", "cpe:/o:redhat:rhel_aus:6.5::server", "cpe:/o:redhat:rhel_eus:6.6::computenode", "cpe:/o:redhat:rhel_eus:6.6::server", "cpe:/o:redhat:rhel_mission_critical:6.2::server" ]
null
null
null
null
RHSA-2015:2355
Red Hat Security Advisory: sssd security, bug fix, and enhancement update
sssd: memory leak in the sssd_pac_plugin
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
null
null
RHSA-2024:5392
Red Hat Security Advisory: thunderbird security update
mozilla: Fullscreen notification dialog can be obscured by document content mozilla: Out of bounds memory access in graphics shared memory handling mozilla: Type confusion in WebAssembly mozilla: Incomplete WebAssembly exception handing mozilla: Out of bounds read in editor component mozilla: Missing permission check when creating a StreamFilter mozilla: Uninitialized memory used by WebGL mozilla: Use-after-free in JavaScript garbage collection mozilla: Use-after-free in IndexedDB mozilla: Document content could partially obscure security prompts
[ "cpe:/a:redhat:enterprise_linux:9::appstream" ]
null
6.1
null
null
RHSA-2024:6205
Red Hat Security Advisory: libproxy security update
libproxy: uncontrolled recursion via an infinite stream response leading to stack exhaustion libproxy: sending more than 102400 bytes in PAC without a Content-Length present could result in buffer overflow
[ "cpe:/a:redhat:rhel_eus:8.8::appstream", "cpe:/a:redhat:rhel_eus:8.8::crb", "cpe:/o:redhat:rhel_eus:8.8::baseos" ]
null
7.5
null
null
RHSA-2024:10710
Red Hat Security Advisory: thunderbird security update
thunderbird: Potential disclosure of plaintext in OpenPGP encrypted message firefox: thunderbird: Select list elements could be shown over another site firefox: thunderbird: CSP Bypass and XSS Exposure via Web Compatibility Shims firefox: thunderbird: URL Bar Spoofing via Manipulated Punycode and Whitespace Characters firefox: thunderbird: Unhandled Exception in Add-on Signature Verification firefox: thunderbird: Improper Keypress Handling in Executable File Confirmation Dialog firefox: thunderbird: Memory safety bugs fixed in Firefox 133, Thunderbird 133, Firefox ESR 128.5, and Thunderbird 128.5
[ "cpe:/a:redhat:rhel_eus:8.8::appstream" ]
null
8.8
null
null
RHSA-2021:1295
Red Hat Security Advisory: kpatch-patch security update
kernel: Use after free via PI futex state kernel: out-of-bounds read in libiscsi module kernel: heap buffer overflow in the iSCSI subsystem
[ "cpe:/o:redhat:rhel_eus:8.2::baseos" ]
null
7.8
null
null
RHSA-2020:0124
Red Hat Security Advisory: git security update
git: Remote code execution in recursive clones with nested submodules
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
7.5
null
RHSA-2016:1929
Red Hat Security Advisory: Red Hat Virtualization Manager (RHV) bug fix 3.6.9
org.ovirt.engine-root: engine-setup logs contained information for extracting admin password
[ "cpe:/a:redhat:rhev_manager:3" ]
null
null
null
null
RHSA-2012:0094
Red Hat Security Advisory: freetype security update
freetype: FT_Bitmap_New integer overflow, FreeType TT_Vary_Get_Glyph_Deltas improper input validation freetype: Multiple security flaws when loading CID-keyed Type 1 fonts
[ "cpe:/o:redhat:rhel_eus:5.6" ]
null
null
null
null
RHSA-2018:2392
Red Hat Security Advisory: kernel security update
Kernel: hw: cpu: L1 terminal fault (L1TF) Kernel: hw: cpu: L1 terminal fault (L1TF) kernel: kvm: vmx: host GDT limit corruption
[ "cpe:/o:redhat:rhel_aus:6.6::server", "cpe:/o:redhat:rhel_tus:6.6::server" ]
null
null
7.8
null
RHSA-2012:1268
Red Hat Security Advisory: bind security update
bind: specially crafted resource record causes named to exit
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
null
null
RHSA-2009:1024
Red Hat Security Advisory: Red Hat Enterprise Linux 4.8 kernel security and bug fix update
kernel: nfsv4 client can be crashed by stating a long filename kernel: exit_notify: kill the wrong capable(CAP_KILL) check
[ "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws" ]
null
null
null
null
RHSA-2016:2604
Red Hat Security Advisory: resteasy-base security and bug fix update
RESTEasy: SerializableProvider enabled by default and deserializes untrusted data
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
9
null
RHSA-2018:1633
Red Hat Security Advisory: qemu-kvm security update
hw: cpu: speculative store bypass
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
5.6
null
RHSA-2016:0706
Red Hat Security Advisory: mercurial security update
mercurial: command injection via git subrepository urls mercurial: convert extension command injection via git repository names
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
null
null
RHSA-2023:6041
Red Hat Security Advisory: Self Node Remediation Operator 0.7.1 security update
golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487) HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack)
[ "cpe:/a:redhat:workload_availability_self_node_remediation:0.7::el8" ]
null
7.5
null
null
RHSA-2014:1187
Red Hat Security Advisory: qemu-kvm-rhev security update
Qemu: qcow1: validate L2 table size to avoid integer overflows Qemu: qcow1: validate image size to avoid out-of-bounds memory access
[ "cpe:/a:redhat:openstack:4::el6", "cpe:/a:redhat:openstack:5::el6" ]
null
null
null
null
RHSA-2020:1261
Red Hat Security Advisory: virt:8.1 security update
QEMU: slirp: OOB buffer access while emulating tcp protocols in tcp_emu() QEMU: Slirp: potential OOB access due to unsafe snprintf() usages
[ "cpe:/a:redhat:advanced_virtualization:8.1::el8" ]
null
5.6
null
null
RHSA-2023:6420
Red Hat Security Advisory: grafana security and enhancement update
grafana: persistent xss in grafana core plugins grafana: plugin signature bypass grafana: data source and plugin proxy endpoints leaking authentication tokens to some destination plugins grafana: Data source and plugin proxy endpoints could leak the authentication cookie to some destination plugins grafana: email addresses and usernames cannot be trusted grafana: User enumeration via forget password grafana: Spoofing of the originalUrl parameter of snapshots golang: net/http: excessive memory growth in a Go server accepting HTTP/2 requests golang: net/http, net/textproto: denial of service from excessive memory allocation
[ "cpe:/a:redhat:enterprise_linux:9::appstream" ]
null
7.5
null
null
RHSA-2014:0627
Red Hat Security Advisory: openssl security update
openssl: SSL/TLS MITM vulnerability
[ "cpe:/o:redhat:rhel_els:4::as", "cpe:/o:redhat:rhel_els:4::es", "cpe:/o:redhat:rhel_eus:5.9", "cpe:/o:redhat:rhel_eus:6.3::computenode", "cpe:/o:redhat:rhel_eus:6.3::server", "cpe:/o:redhat:rhel_eus:6.4::computenode", "cpe:/o:redhat:rhel_eus:6.4::server", "cpe:/o:redhat:rhel_mission_critical:5.6", "cpe:/o:redhat:rhel_mission_critical:6.2::server" ]
null
null
null
null
RHSA-2022:4771
Red Hat Security Advisory: postgresql security update
postgresql: Autovacuum, REINDEX, and others omit "security restricted operation" sandbox
[ "cpe:/a:redhat:enterprise_linux:9::appstream", "cpe:/a:redhat:enterprise_linux:9::crb" ]
null
8.8
null
null
RHSA-2020:2217
Red Hat Security Advisory: OpenShift Container Platform 3.11 security update
jquery: Cross-site scripting due to improper injQuery.htmlPrefilter method
[ "cpe:/a:redhat:openshift:3.11::el7" ]
null
6.1
null
null
RHSA-2022:5316
Red Hat Security Advisory: kernel security and bug fix update
kernel: out-of-bounds read in fbcon_get_font function kernel: buffer overflow in IPsec ESP transformation code
[ "cpe:/a:redhat:enterprise_linux:8::crb", "cpe:/o:redhat:enterprise_linux:8::baseos", "cpe:/o:redhat:rhev_hypervisor:4.4::el8" ]
null
7.8
null
null
RHSA-2018:2737
Red Hat Security Advisory: mod_perl security update
mod_perl: arbitrary Perl code execution in the context of the user account via a user-owned .htaccess
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
6.3
null
RHSA-2010:0810
Red Hat Security Advisory: seamonkey security update
Firefox race condition flaw (MFSA 2010-73)
[ "cpe:/o:redhat:enterprise_linux:3::as", "cpe:/o:redhat:enterprise_linux:3::desktop", "cpe:/o:redhat:enterprise_linux:3::es", "cpe:/o:redhat:enterprise_linux:3::ws", "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws" ]
null
null
null
null
RHSA-2024:2980
Red Hat Security Advisory: harfbuzz security update
harfbuzz: allows attackers to trigger O(n^2) growth via consecutive marks
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
7.5
null
null
RHSA-2022:6348
Red Hat Security Advisory: Gatekeeper Operator v0.2 security and container updates
golang: net/http: improper sanitization of Transfer-Encoding header golang: go/parser: stack exhaustion in all Parse* functions golang: encoding/xml: stack exhaustion in Decoder.Skip golang: crypto/tls: session tickets lack random ticket_age_add golang: io/fs: stack exhaustion in Glob golang: compress/gzip: stack exhaustion in Reader.Read golang: path/filepath: stack exhaustion in Glob golang: encoding/xml: stack exhaustion in Unmarshal golang: encoding/gob: stack exhaustion in Decoder.Decode golang: net/http/httputil: NewSingleHostReverseProxy - omit X-Forwarded-For not working
[ "cpe:/a:redhat:acm:2.5::el8" ]
null
6.5
null
null