id
stringlengths
13
15
title
stringlengths
29
176
description
stringlengths
8
32.1k
cpes
listlengths
0
20
cvss_v4_0
null
cvss_v3_1
float64
0
10
cvss_v3_0
float64
0
10
cvss_v2_0
null
RHSA-2023:6632
Red Hat Security Advisory: shadow-utils security and bug fix update
shadow-utils: possible password leak during passwd(1) change
[ "cpe:/a:redhat:enterprise_linux:9::crb", "cpe:/o:redhat:enterprise_linux:9::baseos" ]
null
4.7
null
null
RHSA-2013:1475
Red Hat Security Advisory: postgresql and postgresql84 security update
postgresql: array indexing error in enum_recv() postgresql: Improper randomization of pgcrypto functions (requiring random seed)
[ "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::client_workstation", "cpe:/o:redhat:enterprise_linux:5::server", "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
null
null
RHSA-2020:5316
Red Hat Security Advisory: rh-postgresql10-postgresql security update
postgresql: Reconnection can downgrade connection security settings postgresql: Multiple features escape "security restricted operation" sandbox postgresql: psql's \gset allows overwriting specially treated variables
[ "cpe:/a:redhat:rhel_software_collections:3::el7" ]
null
7.5
null
null
RHSA-2023:3150
Red Hat Security Advisory: thunderbird security update
Mozilla: Browser prompts could have been obscured by popups Mozilla: Crash in RLBox Expat driver Mozilla: Potential permissions request bypass via clickjacking Mozilla: Content process crash due to invalid wasm code Mozilla: Potential spoof due to obscured address bar Mozilla: Potential memory corruption in FileReader::DoReadData() Mozilla: Memory safety bugs fixed in Firefox 113 and Firefox ESR 102.11
[ "cpe:/a:redhat:enterprise_linux:9::appstream" ]
null
8.8
null
null
RHSA-2023:3263
Red Hat Security Advisory: git security update
git: by feeding specially crafted input to `git apply --reject`, a path outside the working tree can be overwritten with partially controlled contents git: arbitrary configuration injection when renaming or deleting a section from a configuration file
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
7.8
null
null
RHSA-2010:0586
Red Hat Security Advisory: java-1.4.2-ibm-sap security update
OpenJDK Policy/PolicyFile leak dynamic ProtectionDomains. (6633872) OpenJDK File TOCTOU deserialization vulnerability (6736390) JDK unspecified vulnerability in JWS/Plugin component OpenJDK Inflater/Deflater clone issues (6745393) JDK unspecified vulnerability in JavaWS/Plugin component OpenJDK Unsigned applet can retrieve the dragged information before drop action occurs(6887703) OpenJDK Subclasses of InetAddress may incorrectly interpret network addresses (6893954) JDK multiple unspecified vulnerabilities OpenJDK Applet Trusted Methods Chaining Privilege Escalation Vulnerability (6904691) OpenJDK JPEGImageReader stepX Integer Overflow Vulnerability (6909597) JDK multiple unspecified vulnerabilities JDK multiple unspecified vulnerabilities JDK multiple unspecified vulnerabilities JDK unspecified vulnerability in ImageIO component OpenJDK ImagingLib arbitrary code execution vulnerability (6914866) OpenJDK AWT Library Invalid Index Vulnerability (6914823) JDK unspecified vulnerability in Java2D component
[ "cpe:/a:redhat:rhel_extras_sap:4", "cpe:/a:redhat:rhel_extras_sap:5" ]
null
null
null
null
RHSA-2011:1167
Red Hat Security Advisory: seamonkey security update
Mozilla: Miscellaneous memory safety hazards Mozilla: Private data leakage using RegExp.input
[ "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws" ]
null
null
null
null
RHSA-2022:1000
Red Hat Security Advisory: Red Hat OpenStack Platform 16.2 (numpy) security update
numpy: buffer overflow in the PyArray_NewFromDescr_int() in ctors.c numpy: buffer overflow in the array_from_pyobj() in fortranobject.c
[ "cpe:/a:redhat:openstack:16.2::el8" ]
null
5.5
null
null
RHSA-2020:4751
Red Hat Security Advisory: httpd:2.4 security, bug fix, and enhancement update
httpd: mod_http2: DoS via slow, unneeded request bodies httpd: mod_http2: read-after-free on a string compare httpd: mod_http2: possible crash on late upgrade httpd: memory corruption on early pushes httpd: read-after-free in h2 connection shutdown httpd: limited cross-site scripting in mod_proxy error page httpd: null-pointer dereference in mod_remoteip httpd: mod_rewrite potential open redirect httpd: mod_rewrite configurations vulnerable to open redirect httpd: mod_proxy_ftp use of uninitialized value
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
3.7
3.7
null
RHSA-2020:5572
Red Hat Security Advisory: python-django-horizon security update
python-django-horizon: dashboard allows open redirect
[ "cpe:/a:redhat:openstack:13::el7" ]
null
6.1
null
null
RHSA-2020:4000
Red Hat Security Advisory: libvirt security and bug fix update
libvirt: Potential DoS by holding a monitor job while querying QEMU guest-agent libvirt: Potential denial of service via active pool without target path
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
6.5
null
null
RHSA-2018:0022
Red Hat Security Advisory: kernel security update
hw: cpu: speculative execution branch target injection hw: cpu: speculative execution bounds-check bypass hw: cpu: speculative execution permission faults handling
[ "cpe:/o:redhat:rhel_aus:6.5::server" ]
null
null
5.5
null
RHSA-2010:0567
Red Hat Security Advisory: lvm2-cluster security update
lvm2-cluster: insecurity when communicating between lvm2 and clvmd
[ "cpe:/a:redhat:rhel_cluster_storage:5" ]
null
null
null
null
RHSA-2019:1294
Red Hat Security Advisory: bind security update
bind: Limiting simultaneous TCP clients is ineffective
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
8.6
null
RHSA-2018:1609
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform security update
jboss: jbossas: unsafe chown of server.log in jboss init script allows privilege escalation jboss: jbossas writable config files allow privilege escalation
[ "cpe:/a:redhat:jboss_enterprise_application_platform:5::el5", "cpe:/a:redhat:jboss_enterprise_application_platform:5::el6" ]
null
null
7.8
null
RHSA-2014:0367
Red Hat Security Advisory: openstack-swift security update
Swift: TempURL timing attack
[ "cpe:/a:redhat:openstack:3::el6" ]
null
null
null
null
RHSA-2024:1872
Red Hat Security Advisory: mod_http2 security update
httpd: CONTINUATION frames DoS
[ "cpe:/a:redhat:enterprise_linux:9::appstream" ]
null
7.5
null
null
RHSA-2020:1511
Red Hat Security Advisory: git security update
git: Crafted URL containing new lines can cause credential leak
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
7.5
null
null
RHSA-2016:2938
Red Hat Security Advisory: Red Hat JBoss BRMS security update
Workbench: Path traversal vulnerability
[ "cpe:/a:redhat:jboss_enterprise_brms_platform:6.3" ]
null
null
6.5
null
RHSA-2013:1302
Red Hat Security Advisory: xinetd security and bug fix update
xinetd: enables unintentional services over tcpmux port
[ "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
RHSA-2019:2327
Red Hat Security Advisory: mariadb security and bug fix update
mysql: MyISAM unspecified vulnerability (CPU Jul 2018) mysql: Server: Security: Privileges unspecified vulnerability (CPU Jul 2018) mysql: Server: Options unspecified vulnerability (CPU Jul 2018) mysql: Client programs unspecified vulnerability (CPU Jul 2018) mysql: Server: Storage Engines unspecified vulnerability (CPU Oct 2018) mysql: Server: Connection Handling unspecified vulnerability (CPU Jan 2019) mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2019) mysql: Server: Replication unspecified vulnerability (CPU Apr 2019) mysql: Server: Security: Privileges unspecified vulnerability (CPU Apr 2019) mysql: C API unspecified vulnerability (CPU Jul 2020) mysql: C API unspecified vulnerability (CPU Jan 2021)
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
5.9
4.9
null
RHSA-2024:1492
Red Hat Security Advisory: thunderbird security update
nss: timing attack against RSA decryption Mozilla: Crash in NSS TLS method Mozilla: Leaking of encrypted email subjects to other conversations Mozilla: JIT code failed to save return registers on Armv7-A Mozilla: Integer overflow could have led to out of bounds write Mozilla: Improper handling of html and body tags enabled CSP nonce leakage Mozilla: Clickjacking vulnerability could have led to a user accidentally granting permissions Mozilla: Self referencing object could have potentially led to a use-after-free Mozilla: Memory safety bugs fixed in Firefox 124, Firefox ESR 115.9, and Thunderbird 115.9
[ "cpe:/a:redhat:rhel_eus:9.2::appstream" ]
null
7.5
null
null
RHSA-2024:0786
Red Hat Security Advisory: nss security update
nss: vulnerable to Minerva side-channel information leak
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
4.3
null
null
RHSA-2023:5628
Red Hat Security Advisory: kernel security and bug fix update
kernel: netfilter: NULL pointer dereference in nf_tables due to zeroed list head kernel: save/restore speculative MSRs during S3 suspend/resume kernel: net/sched: cls_u32 component reference counter leak if tcf_change_indev() fails kernel: net/sched: cls_fw component can be exploited as result of failure in tcf_change_indev function kernel: net/sched: Use-after-free vulnerabilities in the net/sched classifiers: cls_fw, cls_u32 and cls_route
[ "cpe:/o:redhat:rhel_aus:8.4::baseos", "cpe:/o:redhat:rhel_e4s:8.4::baseos", "cpe:/o:redhat:rhel_tus:8.4::baseos" ]
null
7.8
null
null
RHSA-2015:0093
Red Hat Security Advisory: chromium-browser security update
ICU: regexp engine missing look-behind expression range check chromium-browser: use-after-free in IndexedDB chromium-browser: use-after-free in WebAudio ICU: regexp engine incorrect handling of a zero length quantifier chromium-browser: memory corruption in V8 chromium-browser: memory corruption in V8 chromium-browser: use-after-free in DOM chromium-browser: use-after-free in DOM chromium-browser: memory corruption in V8 chromium-browser: use-after-free in DOM chromium-browser: use-after-free in FFmpeg chromium-browser: use-after-free in DOM chromium-browser: use-after-free in Speech chromium-browser: use-after-free in Views chromium-browser: use-after-free in FFmpeg chromium-browser: memory corruption in Fonts chromium-browser: same-origin-bypass in V8 ICU: uninitialized value use in the collation component chromium-browser: out-of-bounds read in UI chromium-browser: uninitialized-value in Fonts chromium-browser: out-of-bounds read in Skia chromium-browser: out-of-bounds read in PDFium chromium-browser: out-of-bounds read in PDFium chromium-browser: out-of-bounds read in Fonts chromium-browser: out-of-bounds read in PDFium chromium-browser: caching error in AppCache icu: insufficient size limit checks in regular expression compiler chromium-browser: multiple unspecified vulnerabilities chromium-browser: unspecified vulnerability in Google V8
[ "cpe:/a:redhat:rhel_extras:6" ]
null
null
null
null
RHSA-2024:0950
Red Hat Security Advisory: postgresql:15 security update
postgresql: non-owner 'REFRESH MATERIALIZED VIEW CONCURRENTLY' executes arbitrary SQL
[ "cpe:/a:redhat:enterprise_linux:9::appstream" ]
null
8
null
null
RHSA-2024:4848
Red Hat Security Advisory: OpenShift Container Platform 4.13.46 security update
gorilla/schema: Potential memory exhaustion attack due to sparse slice deserialization
[ "cpe:/a:redhat:openshift:4.13::el8", "cpe:/a:redhat:openshift:4.13::el9" ]
null
7.5
null
null
RHSA-2015:2509
Red Hat Security Advisory: java-1.8.0-ibm security update
OpenJDK: kerberos realm name leak (JGSS, 8048030) OpenJDK: inefficient use of hash tables and lists during XML parsing (JAXP, 8068842) OpenJDK: missing checks for proper initialization in ObjectStreamClass (Serialization, 8103671) OpenJDK: HttpURLConnection header restriction bypass (Libraries, 8130193) JDK: unspecified vulnerability fixed in 7u91 and 8u65 (Deployment) OpenJDK: insufficient permission checks in StubGenerator (CORBA, 8076383) OpenJDK: OOB access in CMS code (2D, 8086092) OpenJDK: leak of user.dir location (JAXP, 8078427) OpenJDK: java.nio Buffers integer overflow issues (Libraries, 8130891) ICU: missing boundary checks in layout engine (OpenJDK 2D, 8132042) OpenJDK: incorrect access control context used in DGCImpl (RMI, 8080688) OpenJDK: protected methods can be used as interface methods via DirectMethodHandle (Libraries) OpenJDK: incomplete constraints enforcement by AlgorithmChecker (Security, 8131291) OpenJDK: incorrect String object deserialization in IIOPInputStream (CORBA, 8076387) OpenJDK: incorrect access control context used in DGCClient (RMI, 8076413) OpenJDK: incomplete MaxXMLNameLimit enforcement (JAXP, 8086733) JDK: unspecified vulnerability fixed in 6u105, 7u91 and 8u65 (Deployment) OpenJDK: insufficient proxy class checks in RemoteObjectInvocationHandler (RMI, 8076339) JDK: local disclosure of kerberos credentials cache
[ "cpe:/a:redhat:rhel_extras:7" ]
null
null
null
null
RHSA-2022:8067
Red Hat Security Advisory: httpd security, bug fix, and enhancement update
httpd: mod_lua: Use of uninitialized value of in r:parsebody httpd: core: Possible buffer overflow with very large or unlimited LimitXMLRequestBody httpd: mod_sed: Read/write beyond bounds httpd: mod_proxy_ajp: Possible request smuggling httpd: Out-of-bounds read via ap_rwrite() httpd: Out-of-bounds read in ap_strcmp_match() httpd: mod_lua: DoS in r:parsebody httpd: mod_sed: DoS vulnerability httpd: mod_lua: Information disclosure with websockets httpd: mod_proxy: X-Forwarded-For dropped by hop-by-hop mechanism
[ "cpe:/a:redhat:enterprise_linux:9::appstream" ]
null
7.3
null
null
RHSA-2024:1681
Red Hat Security Advisory: OpenShift Container Platform 4.14.20 bug fix and security update
golang: net/http, x/net/http2: unlimited number of CONTINUATION frames causes DoS
[ "cpe:/a:redhat:openshift:4.14::el8", "cpe:/a:redhat:openshift:4.14::el9" ]
null
7.5
null
null
RHSA-2024:3352
Red Hat Security Advisory: Red Hat OpenStack Platform 16.2 (etcd) security update
golang: html/template: improper handling of HTML-like comments within script contexts golang: html/template: improper handling of special tags within script contexts golang: crypto/tls: panic when processing post-handshake message on QUIC connections golang: crypto/tls: lack of a limit on buffered post-handshake golang: net/http/internal: Denial of Service (DoS) via Resource Consumption via HTTP requests golang: net/http, x/net/http2: unlimited number of CONTINUATION frames causes DoS golang-fips/openssl: Memory leaks in code encrypting and decrypting RSA payloads etcd: Incomplete fix for CVE-2022-41723 in OpenStack Platform etcd: Incomplete fix for CVE-2021-44716 in OpenStack Platform etcd: Incomplete fix for CVE-2023-39325/CVE-2023-44487 in OpenStack Platform
[ "cpe:/a:redhat:openstack:16.2::el8" ]
null
7.5
null
null
RHSA-2024:0957
Red Hat Security Advisory: thunderbird security update
Mozilla: Out-of-bounds memory read in networking channels Mozilla: Alert dialog could have been spoofed on another site Mozilla: Fullscreen Notification could have been hidden by select element Mozilla: Custom cursor could obscure the permission dialog Mozilla: Mouse cursor re-positioned unexpectedly could have led to unintended permission grants Mozilla: Multipart HTTP Responses would accept the Set-Cookie header in response parts Mozilla: Incorrect code generation on 32-bit ARM devices Mozilla: Memory safety bugs fixed in Firefox 123, Firefox ESR 115.8, and Thunderbird 115.8
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
7.5
null
null
RHSA-2024:6595
Red Hat Security Advisory: java-1.8.0-ibm security update
ibm-java: Race condition may cause Denial of Service
[ "cpe:/a:redhat:enterprise_linux:8::supplementary" ]
null
5.9
null
null
RHSA-2025:0167
Red Hat Security Advisory: thunderbird security update
firefox: thunderbird: WebChannel APIs susceptible to confused deputy attack firefox: thunderbird: Use-after-free when breaking lines in text firefox: Alt-Svc ALPN validation failure when redirected firefox: Compartment mismatch when parsing JavaScript JSON module firefox: Memory corruption when using JavaScript Text Segmentation firefox: thunderbird: Memory safety bugs fixed in Firefox 134, Thunderbird 134, Firefox ESR 115.19, Firefox ESR 128.6, Thunderbird 115.19, and Thunderbird 128.6 firefox: thunderbird: Memory safety bugs fixed in Firefox 134, Thunderbird 134, Firefox ESR 128.6, and Thunderbird 128.6
[ "cpe:/a:redhat:rhel_eus:9.2::appstream" ]
null
7.5
null
null
RHSA-2023:4384
Red Hat Security Advisory: openssh security update
openssh: Remote code execution in ssh-agent PKCS#11 support
[ "cpe:/a:redhat:rhel_aus:8.2::appstream", "cpe:/a:redhat:rhel_e4s:8.2::appstream", "cpe:/a:redhat:rhel_tus:8.2::appstream", "cpe:/o:redhat:rhel_aus:8.2::baseos", "cpe:/o:redhat:rhel_e4s:8.2::baseos", "cpe:/o:redhat:rhel_tus:8.2::baseos" ]
null
9.8
null
null
RHSA-2010:0565
Red Hat Security Advisory: w3m security update
w3m: doesn't handle NULL in Common Name properly
[ "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
RHSA-2022:9111
Red Hat Security Advisory: OpenShift Container Platform 4.9.54 bug fix and security update
go-getter: command injection vulnerability go-getter: unsafe download (issue 1 of 3) go-getter: unsafe download (issue 2 of 3) go-getter: unsafe download (issue 3 of 3)
[ "cpe:/a:redhat:openshift:4.9::el8" ]
null
8.6
null
null
RHSA-2016:1763
Red Hat Security Advisory: qemu-kvm-rhev security update
Qemu: block: iscsi: buffer overflow in iscsi_aio_ioctl Qemu: virtio: unbounded memory allocation on host via guest leading to DoS
[ "cpe:/a:redhat:openstack:9::el7" ]
null
null
3.4
null
RHSA-2014:1032
Red Hat Security Advisory: redhat-ds-base security update
389-ds: unauthenticated information disclosure
[ "cpe:/a:redhat:directory_server:8::el5" ]
null
null
null
null
RHSA-2019:3889
Red Hat Security Advisory: kernel security update
hw: Intel GPU blitter manipulation can allow for arbitrary kernel memory write
[ "cpe:/o:redhat:rhel_eus:7.5::computenode", "cpe:/o:redhat:rhel_eus:7.5::server" ]
null
null
8.8
null
RHSA-2024:4429
Red Hat Security Advisory: containernetworking-plugins security update
golang: crypto/tls: Timing Side Channel attack in RSA based TLS key exchanges.
[ "cpe:/a:redhat:rhel_eus:9.2::appstream" ]
null
7.5
null
null
RHSA-2024:0979
Red Hat Security Advisory: linux-firmware security update
hw: amd: INVD instruction may lead to a loss of SEV-ES guest machine memory integrity problem
[ "cpe:/o:redhat:rhel_aus:7.7::server" ]
null
5.3
null
null
RHSA-2004:612
Red Hat Security Advisory: XFree86 security update
openmotif21 stack overflows in libxpm
[ "cpe:/o:redhat:enterprise_linux:3::as", "cpe:/o:redhat:enterprise_linux:3::desktop", "cpe:/o:redhat:enterprise_linux:3::es", "cpe:/o:redhat:enterprise_linux:3::ws" ]
null
null
null
null
RHSA-2015:1230
Red Hat Security Advisory: java-1.7.0-openjdk security update
OpenJDK: deserialization issue in ObjectInputStream.readSerialData() (Libraries, 8076401) OpenJDK: non-constant time comparisons in crypto code (JCE, 8074865) OpenJDK: incorrect code permission checks in RMIConnectionImpl (JMX, 8075853) OpenJDK: name for reverse DNS lookup used in certificate identity check (JSSE, 8067694) OpenJDK: IIOPInputStream type confusion vulnerability (CORBA, 8076376) ICU: integer overflow in LETableReference verifyLength() (OpenJDK 2D, 8077520) SSL/TLS: "Invariance Weakness" vulnerability in RC4 stream cipher LOGJAM: TLS connections which support export grade DHE key-exchange are vulnerable to MITM attacks OpenJDK: improper permission checks in MBeanServerInvocationHandler (JMX, 8076397) OpenJDK: insufficient context checks during object deserialization (Libraries, 8076405) OpenJDK: RemoteObjectInvocationHandler allows calling finalize() (RMI, 8076409) OpenJDK: incorrect OCSP nextUpdate checking (Libraries, 8075374) OpenJDK: DnsClient fails to release request information after error (JNDI, 8075378) ICU: missing boundary checks in layout engine (OpenJDK 2D, 8071715)
[ "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
3.7
null
RHSA-2005:366
Red Hat Security Advisory: kernel security update
security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw
[ "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws" ]
null
null
null
null
RHSA-2008:0980
Red Hat Security Advisory: flash-plugin security update
Flash movie can determine whether a TCP port is open Flash Player cross-domain and cross-site scripting flaws flash: clipboard hijack attack flash-plugin: upload/download user interaction Adobe Flash Player clickjacking Flash Player XSS Flash Player DNS rebind attack jar: protocol handler Flash Player policy file interpretation flaw Flash Player HTML injection flaw security flaw security flaw security flaw security flaw
[ "cpe:/a:redhat:rhel_extras:3", "cpe:/a:redhat:rhel_extras:4" ]
null
null
null
null
RHSA-2003:182
Red Hat Security Advisory: ghostscript security update
security flaw
[ "cpe:/o:redhat:enterprise_linux:2.1::as", "cpe:/o:redhat:enterprise_linux:2.1::aw", "cpe:/o:redhat:enterprise_linux:2.1::es", "cpe:/o:redhat:enterprise_linux:2.1::ws" ]
null
null
null
null
RHSA-2021:1225
Red Hat Security Advisory: OpenShift Container Platform 4.7.8 security and bug fix update
gogo/protobuf: plugin/unmarshal/unmarshal.go lacks certain index validation
[ "cpe:/a:redhat:openshift:4.7::el8" ]
null
8.6
null
null
RHSA-2011:1794
Red Hat Security Advisory: Red Hat Network Satellite server security update
satellite: XSS flaw in custom system information key handling
[ "cpe:/a:redhat:network_satellite:5.4::el5", "cpe:/a:redhat:network_satellite:5.4::el6" ]
null
null
null
null
RHSA-2018:1658
Red Hat Security Advisory: qemu-kvm security update
hw: cpu: speculative store bypass
[ "cpe:/o:redhat:rhel_aus:6.6::server", "cpe:/o:redhat:rhel_tus:6.6::server" ]
null
null
5.6
null
RHSA-2024:4727
Red Hat Security Advisory: Advanced Virtualization 8.2.1z security update
qemu-kvm: 'qemu-img info' leads to host file read/write
[ "cpe:/a:redhat:advanced_virtualization:8.2::el8" ]
null
7.8
null
null
RHSA-2023:1392
Red Hat Security Advisory: OpenShift Container Platform 4.10.55 security update
mongo-go-driver: specific cstrings input may not be properly validated
[ "cpe:/a:redhat:openshift:4.10::el8" ]
null
6.5
null
null
RHSA-2021:2292
Red Hat Security Advisory: container-tools:2.0 security update
runc: vulnerable to symlink exchange attack
[ "cpe:/a:redhat:rhel_eus:8.2::appstream" ]
null
7.5
null
null
RHSA-2005:017
Red Hat Security Advisory: kernel security update
security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw
[ "cpe:/o:redhat:enterprise_linux:2.1::as", "cpe:/o:redhat:enterprise_linux:2.1::aw" ]
null
null
null
null
RHSA-2024:1786
Red Hat Security Advisory: httpd:2.4/mod_http2 security update
httpd: CONTINUATION frames DoS
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
7.5
null
null
RHSA-2024:1515
Red Hat Security Advisory: squid security and bug fix update
squid: Denial of Service in HTTP Chunked Decoding
[ "cpe:/a:redhat:rhel_eus:9.2::appstream" ]
null
8.6
null
null
RHSA-2008:0100
Red Hat Security Advisory: java-1.4.2-bea security update
Integer overflow in the embedded ICC profile image parser in Sun Java Development Kit BMP image parser vulnerability Java Secure Socket Extension Does Not Correctly Process SSL/TLS Handshake Requests Resulting in a Denial of Service (DoS) Condition java: Vulnerability in the font parsing code Security Vulnerability in Java Runtime Environment With Applet Caching Untrusted Application or Applet May Move or Copy Arbitrary Files Applets or Applications are allowed to display an oversized window Anti-DNS Pinning and Java Applets with HTTP proxy
[ "cpe:/a:redhat:rhel_extras:3", "cpe:/a:redhat:rhel_extras:5::client", "cpe:/a:redhat:rhel_extras:5::server" ]
null
null
null
null
RHSA-2017:0217
Red Hat Security Advisory: kernel security and bug fix update
kernel: pipe: limit the per-user amount of pages allocated in pipes kernel: Use-after-free in the recvmmsg exit path
[ "cpe:/o:redhat:rhel_eus:7.2::computenode", "cpe:/o:redhat:rhel_eus:7.2::server" ]
null
null
8.1
null
RHSA-2015:1499
Red Hat Security Advisory: chromium-browser security update
ICU: Uninitialized memory read fixed in Chrome 44.0.2403.89 chromium-browser: Heap-buffer-overflow in pdfium chromium-browser: Use-after-free related to unexpected GPU process termination in unspecified chromium-browser: Heap-buffer-overflow in pdfium. chromium-browser: Settings allowed executable files to run immediately after download in unsepcified chromium-browser: Use-after-free in IndexedDB. chromium-browser: Use-after-free in accessibility. chromium-browser: URL spoofing using pdf files in unspecified chromium-browser: Heap-buffer-overflow in pdfium. chromium-browser: Memory corruption in skia chromium-browser: CSP bypass in unspecified component chromium-browser: Use-after-free in pdfium. chromium-browser: Heap-buffer-overflow in expat. chromium-browser: Use-after-free in blink. chromium-browser: Information leak in XSS auditor. chromium-browser: UXSS in blink. chromium-browser: SOP bypass with CSS in unspecified chromium-browser: Spell checking dictionaries fetched over HTTP in unspecified chromium-browser: Various fixes from internal audits, fuzzing and other initiatives chromium-browser: v8 denial of service
[ "cpe:/a:redhat:rhel_extras:6" ]
null
null
null
null
RHSA-2015:0661
Red Hat Security Advisory: qpid-cpp security and bug fix update
qpid-cpp: 3 qpidd DoS issues in AMQP 0-10 protocol handling qpid-cpp: anonymous access to qpidd cannot be prevented qpid-cpp: AMQP 0-10 protocol sequence-set maximal range DoS (incomplete CVE-2015-0203 fix)
[ "cpe:/a:redhat:enterprise_mrg:2:computenode:el6", "cpe:/a:redhat:enterprise_mrg:2:server:el6" ]
null
null
null
null
RHSA-2025:1135
Red Hat Security Advisory: firefox security update
firefox: thunderbird: Use-after-free in XSLT firefox: thunderbird: Use-after-free in Custom Highlight firefox: thunderbird: A bug in WebAssembly code generation could result in a crash firefox: thunderbird: Use-after-free during concurrent delazification firefox: thunderbird: Potential opening of private browsing tabs in normal browsing windows firefox: thunderbird: Certificate length was not properly checked firefox: thunderbird: Memory safety bugs fixed in Firefox 135, Thunderbird 135, Firefox ESR 115.20, Firefox ESR 128.7, Thunderbird 115.20, and Thunderbird 128.7 firefox: thunderbird: Memory safety bugs fixed in Firefox 135, Thunderbird 135, Firefox ESR 128.7, and Thunderbird 128.7
[ "cpe:/a:redhat:rhel_aus:8.4::appstream", "cpe:/a:redhat:rhel_e4s:8.4::appstream", "cpe:/a:redhat:rhel_tus:8.4::appstream" ]
null
8.8
null
null
RHSA-2020:3461
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.3.2 security update
hibernate: SQL injection issue in Hibernate ORM EAP: field-name is not parsed in accordance to RFC7230 Wildfly: Improper authorization issue in WildFlySecurityManager when using alternative protection domain jackson-databind: mishandles the interaction between serialization gadgets and typing which could result in remote command execution jackson-databind: mishandles the interaction between serialization gadgets and typing which could result in remote command execution dom4j: XML External Entity vulnerability in default SAX parser Undertow: Incomplete fix for CVE-2017-2666 due to permitting invalid characters in HTTP requests hibernate-validator: Improper input validation in the interpolation of constraint error messages wildfly-elytron: session fixation when using FORM authentication wildfly: exposed setting of TCCL via the EmbeddedManagedProcess API wildfly: unsafe deserialization in Wildfly Enterprise Java Beans netty: compression/decompression codecs don't enforce limits on buffer allocation sizes wildfly: Some EJB transaction objects may get accumulated causing Denial of Service wildfly: EJB SessionOpenInvocations may not be removed properly after a response is received causing Denial of Service
[ "cpe:/a:redhat:jboss_enterprise_application_platform:7.3::el6" ]
null
6.5
4.8
null
RHSA-2024:3625
Red Hat Security Advisory: libxml2 security update
libxml2: use-after-free in XMLReader
[ "cpe:/a:redhat:rhel_eus:9.2::appstream", "cpe:/o:redhat:rhel_eus:9.2::baseos" ]
null
7.5
null
null
RHSA-2020:1324
Red Hat Security Advisory: python-django security update
Django: Incorrect HTTP detection with reverse-proxy connecting via HTTPS Django: backtracking in a regular expression in django.utils.text.Truncator leads to DoS Django: the behavior of the underlying HTMLParser leading to DoS Django: SQL injection possibility in key and index lookups for JSONField/HStoreField Django: Potential memory exhaustion in django.utils.encoding.uri_to_iri()
[ "cpe:/a:redhat:openstack:15::el8" ]
null
null
5.3
null
RHSA-2024:3385
Red Hat Security Advisory: Red Hat JBoss EAP 7.4.14 XP 4.0.2.GA security release
okio: GzipSource class improper exception handling jetty-server: OutOfMemoryError for large multipart without filename read via request.getParameter() jetty-server: Cookie parsing of quoted values can exfiltrate values from other cookies
[ "cpe:/a:redhat:jbosseapxp" ]
null
5.3
null
null
RHSA-2022:6370
Red Hat Security Advisory: Red Hat Advanced Cluster Management 2.6.0 security updates and bug fixes
golang: net/http: improper sanitization of Transfer-Encoding header golang: go/parser: stack exhaustion in all Parse* functions golang: encoding/xml: stack exhaustion in Decoder.Skip golang: crypto/tls: session tickets lack random ticket_age_add golang: io/fs: stack exhaustion in Glob golang: compress/gzip: stack exhaustion in Reader.Read golang: path/filepath: stack exhaustion in Glob golang: encoding/xml: stack exhaustion in Unmarshal golang: encoding/gob: stack exhaustion in Decoder.Decode moment: inefficient parsing algorithm resulting in DoS golang: net/http/httputil: NewSingleHostReverseProxy - omit X-Forwarded-For not working
[ "cpe:/a:redhat:acm:2.6::el8" ]
null
6.5
null
null
RHSA-2004:651
Red Hat Security Advisory: imlib security update
security flaw security flaw
[ "cpe:/o:redhat:enterprise_linux:3::as", "cpe:/o:redhat:enterprise_linux:3::desktop", "cpe:/o:redhat:enterprise_linux:3::es", "cpe:/o:redhat:enterprise_linux:3::ws" ]
null
null
null
null
RHSA-2013:1137
Red Hat Security Advisory: ruby193-ruby security update
ruby: hostname check bypassing vulnerability in SSL client
[ "cpe:/a:redhat:openshift:1.2::el6" ]
null
null
null
null
RHSA-2024:2169
Red Hat Security Advisory: xorg-x11-server security update
xorg-x11-server: Out-of-bounds write in XIChangeDeviceProperty/RRChangeOutputProperty xorg-x11-server: Use-after-free bug in DestroyWindow xorg-x11-server: out-of-bounds memory reads/writes in XKB button actions xorg-x11-server: out-of-bounds memory read in RRChangeOutputProperty and RRChangeProviderProperty xorg-x11-server: Heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer xorg-x11-server: reattaching to different master device may lead to out-of-bounds memory access xorg-x11-server: SELinux unlabeled GLX PBuffer xorg-x11-server: SELinux context corruption xorg-x11-server: heap buffer overflow in XISendDeviceHierarchyEvent xorg-x11-server: heap buffer overflow in DisableDevice
[ "cpe:/a:redhat:enterprise_linux:9::appstream", "cpe:/a:redhat:enterprise_linux:9::crb" ]
null
7.8
null
null
RHSA-2017:0286
Red Hat Security Advisory: openssl security update
SSL/TLS: Malformed plain-text ALERT packets could cause remote DoS openssl: Truncated packet could crash via OOB read
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation", "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
5.9
null
RHSA-2018:3410
Red Hat Security Advisory: xorg-x11-server security update
xorg-x11-server: Incorrect permission check in Xorg X server allows for privilege escalation
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
6.6
null
RHSA-2004:448
Red Hat Security Advisory: krb5 security update
security flaw security flaw security flaw
[ "cpe:/o:redhat:enterprise_linux:2.1::as", "cpe:/o:redhat:enterprise_linux:2.1::aw", "cpe:/o:redhat:enterprise_linux:2.1::es", "cpe:/o:redhat:enterprise_linux:2.1::ws" ]
null
null
null
null
RHSA-2020:2345
Red Hat Security Advisory: bind security update
bind: BIND does not sufficiently limit the number of fetches performed when processing referrals bind: A logic error in code which checks TSIG validity can be used to trigger an assertion failure in tsig.c
[ "cpe:/a:redhat:rhel_eus:8.1::appstream", "cpe:/o:redhat:rhel_eus:8.1::baseos" ]
null
7.5
null
null
RHSA-2018:1353
Red Hat Security Advisory: kernel security update
Kernel: error in exception handling leads to DoS
[ "cpe:/o:redhat:rhel_els:5" ]
null
null
6.5
null
RHSA-2021:1468
Red Hat Security Advisory: bind security update
bind: An assertion check can fail while answering queries for DNAME records that require the DNAME to be processed to resolve itself
[ "cpe:/o:redhat:rhel_els:6" ]
null
7.5
null
null
RHSA-2020:2813
Red Hat Security Advisory: Red Hat Single Sign-On 7.4.1 security update
keycloak: verify-token-audience support is missing in the NodeJS adapter keycloak: Lack of checks in ObjectInputStream leading to Remote Code Execution jackson-databind: Lacks certain xbean-reflect/JNDI blocking jackson-databind: Serialization gadgets in shaded-hikari-config jackson-databind: Serialization gadgets in ibatis-sqlmap jackson-databind: Serialization gadgets in anteros-core undertow: invalid HTTP request with large chunk size keycloak: top-level navigations to data URLs resulting in XSS are possible (incomplete fix of CVE-2020-1697) jackson-databind: Serialization gadgets in javax.swing.JEditorPane jquery: Cross-site scripting due to improper injQuery.htmlPrefilter method jquery: Untrusted code execution via <option> tag in HTML passed to DOM manipulation methods
[ "cpe:/a:redhat:jboss_single_sign_on:7.4" ]
null
6.1
7.5
null
RHSA-2022:4667
Red Hat Security Advisory: OpenShift Virtualization 4.10.1 RPMs security and bug fix update
prometheus/client_golang: Denial of service using InstrumentHandlerCounter
[ "cpe:/a:redhat:container_native_virtualization:4.10::el7", "cpe:/a:redhat:container_native_virtualization:4.10::el8" ]
null
7.5
null
null
RHSA-2012:1166
Red Hat Security Advisory: mod_cluster security update
mod_cluster registers and exposes the root context of a server by default, despite ROOT being in the excluded-contexts list
[ "cpe:/a:redhat:jboss_enterprise_web_server:1::el5", "cpe:/a:redhat:jboss_enterprise_web_server:1::el6" ]
null
null
null
null
RHSA-2021:2461
Red Hat Security Advisory: Red Hat Advanced Cluster Management 2.2.4 security and bug fix update
redis: integer overflow when configurable limit for maximum supported bulk input size is too big on 32-bit platforms nodejs-is-svg: ReDoS via malicious string nodejs-netmask: improper input validation of octal input data
[ "cpe:/a:redhat:acm:2.2::el7", "cpe:/a:redhat:acm:2.2::el8" ]
null
9.1
null
null
RHSA-2024:5258
Red Hat Security Advisory: container-tools:rhel8 security update
golang: net/http: golang: mime/multipart: golang: net/textproto: memory exhaustion in Request.ParseMultipartForm golang-fips/openssl: Memory leaks in code encrypting and decrypting RSA payloads containers/image: digest type does not guarantee valid type go-retryablehttp: url might write sensitive information to log file golang: crypto/x509: Verify panics on certificates with an unknown public key algorithm golang: net/mail: comments in display names are incorrectly handled golang: archive/zip: Incorrect handling of certain ZIP files gorilla/schema: Potential memory exhaustion attack due to sparse slice deserialization
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
7.5
null
null
RHSA-2023:4506
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform security update
jackson-databind: Possible DoS if using JDK serialization to serialize JsonNode jettison: Uncontrolled Recursion in JSONArray undertow: OutOfMemoryError due to @MultipartConfig handling
[ "cpe:/a:redhat:jboss_enterprise_application_platform:7.4::el8" ]
null
7.5
null
null
RHSA-2024:10984
Red Hat Security Advisory: ruby:3.1 security update
rexml: REXML ReDoS vulnerability
[ "cpe:/a:redhat:rhel_eus:9.4::appstream" ]
null
7.5
null
null
RHSA-2015:1154
Red Hat Security Advisory: libreswan security, bug fix and enhancement update
libreswan: crafted IKE packet causes daemon restart
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
null
null
RHSA-2020:1180
Red Hat Security Advisory: ImageMagick security, bug fix, and enhancement update
ImageMagick: memory leak vulnerability in ReadXWDImage function in coders/xwd.c ImageMagick: memory exhaustion in function ReadTIFFImage causing denial of service ImageMagick: memory exhaustion in function format8BIM causing denial of service ImageMagick: memory leak in ReadPCDImage function in coders/pcd.c ImageMagick: assertion failure in MogrifyImageList function in MagickWand/mogrify.c ImageMagick: memory leak in WriteGIFImage function in coders/gif.c ImageMagick: infinite loop in ReadMIFFImage function in coders/miff.c ImageMagick: infinite loop ReadTXTImage in function in coders/txt.c ImageMagick: CPU exhaustion vulnerability in function ReadDDSInfo in coders/dds.c ImageMagick: double free in WriteEPTImage function in coders/ept.c ImageMagick: excessive iteration in the DecodeLabImage and EncodeLabImage functions in coders/tiff.c ImageMagick: Infinite loop in coders/png.c:ReadOneMNGImage() allows attackers to cause a denial of service via crafted MNG file ImageMagick: Memory leak in WriteTIFFImage ImageMagick: Memory leak in ReadYCBCRImage ImageMagick: memory leak in ReadDCMImage function in coders/dcm.c ImageMagick: out of bounds write in ReadBMPImage and WriteBMPImage in coders/bmp.c ImageMagick: out of bounds write ReadDIBImage and WriteDIBImage in coders/dib.c ImageMagick: memory leak in the XMagickCommand function in MagickCore/animate.c ImageMagick: memory leak for a colormap in WriteMPCImage in coders/mpc.c ImageMagick: memory leak in DecodeImage in coders/pcd.c ImageMagick: memory leak in ReadMIFFImage in coders/miff.c ImageMagick: memory leak in parse8BIM in coders/meta.c ImageMagick: CPU Exhaustion via crafted input file ImageMagick: NULL pointer dereference in CheckEventLogging function in MagickCore/log.c ImageMagick: memory leak in ReadOneJNGImage function in coders/png.c ImageMagick: out-of-bounds write in InsertRow function in coders/cut.c ImageMagick: missing check for fputc function in multiple files ImageMagick: improper check for length in ReadDCMImage of coders/dcm.c and ReadPICTImage of coders/pict.c ImageMagick: Out-of-memory ReadBMPImage of coders/bmp.c and ReadDIBImage of codes/dib.c ImageMagick: reachable assertion in ReadOneJNGImage in coders/png.c ImageMagick: Memory leak in the formatIPTCfromBuffer function in coders/meta.c ImageMagick: memory leak in WritePDBImage in coders/pdb.c ImageMagick: memory leak in ReadBGRImage in coders/bgr.c. ImageMagick: memory leak in WritePCXImage in coders/pcx.c ImageMagick: infinite loop in the ReadBMPImage function of the coders/bmp.c ImageMagick: memory leak in WriteMSLImage of coders/msl.c ImageMagick: infinite loop in coders/bmp.c imagemagick: memory leak in function DecodeImage in coders/pcd.c ImageMagick: Memory leak in the WritePDFImage function in coders/pdf.c ImageMagick: Memory leak in the WriteDIBImage function in coders/dib.c imagemagick: stack-based buffer overflow in function PopHexPixel in coders/ps.c ImageMagick: off-by-one read in formatIPTCfromBuffer function in coders/meta.c ImageMagick: heap-based buffer over-read in WriteTIFFImage of coders/tiff.c leads to denial of service or information disclosure via crafted image file ImageMagick: denial of service in cineon parsing component ImageMagick: denial of service in ReadXWDImage in coders/xwd.c in the XWD image parsing component ImageMagick: heap-based buffer over-read in the function WriteTIFFImage of coders/tiff.c leading to DoS or information disclosure ImageMagick: heap-based buffer over-read in the function WritePNMImage of coders/pnm.c leading to DoS or information disclosure imagemagick: null-pointer dereference in function ReadPANGOImage in coders/pango.c and ReadVIDImage in coders/vid.c causing denial of service imagemagick: memory leak vulnerability in function WriteDPXImage in coders/dpx.c imagemagick: memory leak vulnerability in function ReadPCLImage in coders/pcl.c imagemagick: use of uninitialized value in function ReadPANGOImage in coders/pango.c imagemagick: use of uninitialized value in functionSyncImageSettings in MagickCore/image.c ImageMagick: a memory leak vulnerability in the function ReadBMPImage in coders/bmp.c ImageMagick: a memory leak vulnerability in the function ReadVIFFImage in coders/viff.c ImageMagick: a "use of uninitialized value" vulnerability in the function ReadCUTImage leading to a crash and DoS ImageMagick: heap-based buffer over-read at MagickCore/threshold.c in AdaptiveThresholdImage because a width of zero is mishandled ImageMagick: heap-based buffer over-read at MagickCore/threshold.c in AdaptiveThresholdImage because a height of zero is mishandled ImageMagick: heap-based buffer overflow at MagickCore/statistic.c in EvaluateImages because of mishandling columns ImageMagick: memory leaks in AcquireMagickMemory ImageMagick: stack-based buffer overflow at coders/pnm.c in WritePNMImage because of a misplaced assignment ImageMagick: stack-based buffer overflow at coders/pnm.c in WritePNMImage because of a misplaced strncpy and an off-by-one error ImageMagick: stack-based buffer overflow at coders/pnm.c in WritePNMImage because of off-by-one errors ImageMagick: heap-based buffer overflow at MagickCore/statistic.c in EvaluateImages because of mishandling rows ImageMagick: memory leaks at AcquireMagickMemory due to mishandling the NoSuchImage error in CLIListOperatorImages ImageMagick: memory leaks at AcquireMagickMemory because of an error in MagickWand/mogrify.c ImageMagick: memory leaks at AcquireMagickMemory because of a wand/mogrify.c error ImageMagick: division by zero in RemoveDuplicateLayers in MagickCore/layer.c ImageMagick: use-after-free in magick/blob.c resulting in a denial of service ImageMagick: division by zero in MeanShiftImage in MagickCore/feature.c ImageMagick: out-of-bounds read in ReadXWDImage in coders/xwd.c ImageMagick: Use after free in ReadMATImage in coders/mat.c ImageMagick: heap-based buffer overflow in WriteTIFFImage in coders/tiff.c ImageMagick: memory leak in magick/xwindow.c ImageMagick: memory leak in coders/dps.c ImageMagick: memory leak in coders/dot.c ImageMagick: memory leak in Huffman2DEncodeImage in coders/ps2.c ImageMagick: memory leak in Huffman2DEncodeImage in coders/ps3.c ImageMagick: memory leak in coders/dot.c ImageMagick: heap-based buffer overflow in ReadPSInfo in coders/ps.c ImageMagick: Use after free in ReadICCProfile function in coders/jpeg.c ImageMagick: heap-based buffer overflow in WriteSGIImage in coders/sgi.c ImageMagick: heap-based buffer over-read in WritePNGImage in coders/png.c
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
3.3
7.8
null
RHSA-2018:2887
Red Hat Security Advisory: qemu-kvm-rhev security update
QEMU: slirp: heap buffer overflow while reassembling fragmented datagrams
[ "cpe:/o:redhat:enterprise_linux:7::hypervisor" ]
null
null
5.1
null
RHSA-2017:0352
Red Hat Security Advisory: qemu-kvm security update
Qemu: display: cirrus: potential arbitrary code execution via cirrus_bitblt_cputovideo
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
5.5
null
RHSA-2019:1209
Red Hat Security Advisory: redhat-virtualization-host security update
hardware: Microarchitectural Store Buffer Data Sampling (MSBDS) hardware: Micro-architectural Load Port Data Sampling - Information Leak (MLPDS) hardware: Microarchitectural Fill Buffer Data Sampling (MFBDS) hardware: Microarchitectural Data Sampling Uncacheable Memory (MDSUM)
[ "cpe:/o:redhat:enterprise_linux:7::hypervisor" ]
null
null
3.8
null
RHSA-2022:7090
Red Hat Security Advisory: libksba security update
libksba: integer overflow may lead to remote code execution
[ "cpe:/a:redhat:enterprise_linux:9::crb", "cpe:/o:redhat:enterprise_linux:9::baseos" ]
null
8.6
null
null
RHSA-2024:4411
Red Hat Security Advisory: booth security update
booth: specially crafted hash can lead to invalid HMAC being accepted by Booth server
[ "cpe:/a:redhat:rhel_e4s:9.0::highavailability", "cpe:/a:redhat:rhel_e4s:9.0::resilientstorage" ]
null
5.9
null
null
RHSA-2017:0495
Red Hat Security Advisory: Red Hat Gluster Storage 3.2.0 samba security, bug fixes and enhancement update
samba: Unconditional privilege delegation to Kerberos servers in trusted realms samba: Flaws in Kerberos PAC validation can trigger privilege elevation
[ "cpe:/a:redhat:storage:3.2:samba:el7" ]
null
null
3.5
null
RHSA-2023:0049
Red Hat Security Advisory: grub2 security update
grub2: Buffer overflow in grub_font_construct_glyph() can lead to out-of-bound write and possible secure boot bypass grub2: Heap based out-of-bounds write when redering certain unicode sequences
[ "cpe:/o:redhat:enterprise_linux:8::baseos" ]
null
7.1
null
null
RHBA-2019:1076
Red Hat Bug Fix Advisory: ovirt-engine-api-explorer bug fix and enhancement update for RHV 4.3
bootstrap: XSS in the data-target attribute bootstrap: XSS in the tooltip data-viewport attribute bootstrap: XSS in the affix configuration target property
[ "cpe:/a:redhat:rhev_manager:4.3" ]
null
null
6.1
null
RHSA-2017:3193
Red Hat Security Advisory: httpd security update
httpd: ap_get_basic_auth_pw() authentication bypass httpd: mod_ssl NULL pointer dereference httpd: ap_find_token() buffer overread httpd: mod_mime buffer overread httpd: Uninitialized memory reflection in mod_auth_digest httpd: Use-after-free by limiting unregistered HTTP method (Optionsbleed)
[ "cpe:/o:redhat:rhel_eus:7.2::computenode", "cpe:/o:redhat:rhel_eus:7.2::server" ]
null
null
5.9
null
RHSA-2019:3193
Red Hat Security Advisory: firefox security update
Mozilla: Use-after-free when creating index updates in IndexedDB Mozilla: Potentially exploitable crash due to 360 Total Security Mozilla: Stack buffer overflow in HKDF output Mozilla: Stack buffer overflow in WebRTC networking Mozilla: Unintended access to a privileged JSONView object Mozilla: document.domain-based origin isolation has same-origin-property violation Mozilla: Incorrect HTML parsing results in XSS bypass technique Mozilla: Memory safety bugs fixed in Firefox 70 and Firefox ESR 68.2 expat: heap-based buffer over-read via crafted XML input
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
6.1
7.5
null
RHSA-2020:1300
Red Hat Security Advisory: qemu-kvm-rhev security update
QEMU: block: iscsi: OOB heap access via an unexpected response of iSCSI Server QEMU: slirp: OOB buffer access while emulating tcp protocols in tcp_emu() QEMU: Slirp: potential OOB access due to unsafe snprintf() usages
[ "cpe:/a:redhat:openstack:10::el7" ]
null
5.6
null
null
RHSA-2022:7185
Red Hat Security Advisory: device-mapper-multipath security update
device-mapper-multipath: Authorization bypass, multipathd daemon listens for client connections on an abstract Unix socket
[ "cpe:/a:redhat:enterprise_linux:9::crb", "cpe:/o:redhat:enterprise_linux:9::baseos" ]
null
7.8
null
null
RHSA-2005:806
Red Hat Security Advisory: cpio security update
security flaw security flaw
[ "cpe:/o:redhat:enterprise_linux:2.1::as", "cpe:/o:redhat:enterprise_linux:2.1::aw", "cpe:/o:redhat:enterprise_linux:2.1::es", "cpe:/o:redhat:enterprise_linux:2.1::ws" ]
null
null
null
null
RHSA-2024:7164
Red Hat Security Advisory: Migration Toolkit for Containers (MTC) 1.8.4 security and bug fix update
github.com/gin-contrib/cors: Gin mishandles a wildcard in the origin string in github.com/gin-contrib/cors golang: net/http, x/net/http2: unlimited number of CONTINUATION frames causes DoS golang: net/http/cookiejar: incorrect forwarding of sensitive headers and cookies on HTTP redirect containers/image: digest type does not guarantee valid type braces: fails to limit the number of characters it can handle golang: net: malformed DNS message can cause infinite loop jose-go: improper handling of highly compressed data follow-redirects: Possible credential leak node-tar: denial of service while parsing a tar file due to lack of folders depth validation moby: external DNS requests from 'internal' networks could lead to data exfiltration express: cause malformed URLs to be evaluated webpack-dev-middleware: lack of URL validation may lead to file leak axios: axios: Server-Side Request Forgery
[ "cpe:/a:redhat:rhmt:1.8::el8" ]
null
7.5
null
null
RHSA-2025:3623
Red Hat Security Advisory: firefox security update
firefox: thunderbird: Use-after-free triggered by XSLTProcessor firefox: thunderbird: URL Bar Spoofing via non-BMP Unicode characters firefox: thunderbird: Memory safety bugs fixed in Firefox 137, Thunderbird 137, Firefox ESR 128.9, and Thunderbird 128.9
[ "cpe:/a:redhat:rhel_aus:8.2::appstream" ]
null
8.8
null
null
RHSA-2022:1975
Red Hat Security Advisory: kernel-rt security and bug fix update
kernel: avoid cyclic entity chains due to malformed USB descriptors kernel: integer overflow in k_ascii() in drivers/tty/vt/keyboard.c kernel: use-after-free in nouveau kernel module kernel: out-of-bounds read in bpf_skb_change_head() of filter.c due to a use-after-free kernel: joydev: zero size passed to joydev_handle_JSIOCSBTNMAP() kernel: reading /proc/sysvipc/shm does not scale with large shared memory segment counts kernel: out-of-bound Read in qrtr_endpoint_post in net/qrtr/qrtr.c kernel: crypto: ccp - fix resource leaks in ccp_run_aes_gcm_cmd() kernel: possible use-after-free in bluetooth module kernel: unaccounted ipc objects in Linux kernel lead to breaking memcg limits and DoS attacks kernel: DoS in ccp_run_aes_gcm_cmd() function kernel: sctp: Invalid chunks may be used to remotely remove existing associations kernel: lack of port sanity checking in natd and netfilter leads to exploit of OpenVPN clients kernel: stack information leak in infiniband RDMA kernel: possible leak or coruption of data residing on hugetlbfs kernel: security regression for CVE-2018-13405 kernel: fget: check that the fd still exists after getting a ref to it kernel: KVM: SVM: out-of-bounds read/write in sev_es_string_io kernel: Buffer overwrite in decode_nfs_fh function kernel: cgroup: Use open-time creds and namespace for migration perm checks kernel: Race condition in races in sk_peer_pid and sk_peer_cred accesses kernel: new DNS Cache Poisoning Attack based on ICMP fragment needed packets replies hw: cpu: LFENCE/JMP Mitigation Update for CVE-2017-5715 kernel: Local privilege escalation due to incorrect BPF JIT branch displacement computation kernel: use-after-free in hso_free_net_device() in drivers/net/usb/hso.c kernel: eBPF multiplication integer overflow in prealloc_elems_and_freelist() in kernel/bpf/stackmap.c leads to out-of-bounds write kernel: Heap buffer overflow in firedtv driver kernel: an array-index-out-bounds in detach_capi_ctr in drivers/isdn/capi/kcapi.c kernel: mwifiex_usb_recv() in drivers/net/wireless/marvell/mwifiex/usb.c allows an attacker to cause DoS via crafted USB device kernel: use-after-free in the TEE subsystem kernel: information leak in the IPv6 implementation kernel: information leak in the IPv4 implementation kernel: dm: fix mempool NULL pointer race when completing IO kernel: tcp: fix page frag corruption on page fault kernel: ethtool: ioctl: fix potential NULL deref in ethtool_set_coalesce() kernel: mptcp: fix deadlock in __mptcp_push_pending() kernel: RDMA/irdma: Fix a user-after-free in add_pble_prm hw: cpu: intel: Branch History Injection (BHI) hw: cpu: intel: Intra-Mode BTI kernel: Local denial of service in bond_ipsec_add_sa kernel: DoS in sctp_addto_chunk in net/sctp/sm_make_chunk.c kernel: information leak in copy_page_to_iter() in iov_iter.c kernel: FUSE allows UAF reads of write() buffers, allowing theft of (partial) /etc/shadow hashes kernel: RDMA/uverbs: NULL pointer dereference in uapi_finalize() kernel: sfc_ef100: NULL pointer dereference in ef100_update_stats() kernel: drm/amdkfd: NULL pointer dereference in kfd_parse_subtype_iolink() kernel: Copy_from_user on 64-bit versions may leak kernel information kernel: IPv6: panic in fib6_rule_suppress when fib6_rule_lookup fails
[ "cpe:/a:redhat:enterprise_linux:8::nfv", "cpe:/a:redhat:enterprise_linux:8::realtime" ]
null
5.9
null
null