id
stringlengths
13
15
title
stringlengths
29
176
description
stringlengths
8
32.1k
cpes
listlengths
0
20
cvss_v4_0
null
cvss_v3_1
float64
0
10
cvss_v3_0
float64
0
10
cvss_v2_0
null
RHSA-2024:3814
Red Hat Security Advisory: tomcat security and bug fix update
Tomcat: WebSocket DoS with incomplete closing handshake Tomcat: HTTP/2 header handling DoS
[ "cpe:/a:redhat:rhel_eus:8.8::appstream" ]
null
7.5
null
null
RHSA-2024:0970
Red Hat Security Advisory: firefox security update
Mozilla: Out-of-bounds memory read in networking channels Mozilla: Alert dialog could have been spoofed on another site Mozilla: Fullscreen Notification could have been hidden by select element Mozilla: Custom cursor could obscure the permission dialog Mozilla: Mouse cursor re-positioned unexpectedly could have led to unintended permission grants Mozilla: Multipart HTTP Responses would accept the Set-Cookie header in response parts Mozilla: Incorrect code generation on 32-bit ARM devices Mozilla: Memory safety bugs fixed in Firefox 123, Firefox ESR 115.8, and Thunderbird 115.8
[ "cpe:/a:redhat:rhel_eus:8.6::appstream" ]
null
7.5
null
null
RHSA-2020:5023
Red Hat Security Advisory: kernel security and bug fix update
kernel: net-sysfs: *_queue_add_kobject refcount issue kernel: kernel: buffer over write in vgacon_scroll
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
6.6
null
null
RHSA-2020:0002
Red Hat Security Advisory: rh-git218-git security update
git: Arbitrary path overwriting via export-marks in-stream command feature git: Recursive submodule cloning allows using git directory twice with synonymous directory name written in .git/ git: Files inside the .git directory may be overwritten during cloning via NTFS Alternate Data Streams git: Remote code execution in recursive clones with nested submodules
[ "cpe:/a:redhat:rhel_software_collections:3::el7" ]
null
7.5
7.5
null
RHSA-2024:6466
Red Hat Security Advisory: ghostscript security update
ghostscript: format string injection leads to shell command execution (SAFER bypass) ghostscript: path traversal and command execution due to path reduction ghostscript: path traversal to arbitrary files if the current directory is in the permitted paths
[ "cpe:/a:redhat:rhel_eus:9.2::appstream", "cpe:/a:redhat:rhel_eus:9.2::crb" ]
null
6.8
null
null
RHSA-2007:0970
Red Hat Security Advisory: dhcp security update
security flaw dhcpd stack-based buffer overlow
[ "cpe:/o:redhat:enterprise_linux:2.1::as", "cpe:/o:redhat:enterprise_linux:2.1::aw", "cpe:/o:redhat:enterprise_linux:2.1::es" ]
null
null
null
null
RHSA-2021:2047
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.3.7 security update on RHEL 7
velocity: arbitrary code execution when attacker is able to modify templates netty: Information disclosure via the local system temporary directory netty: possible request smuggling in HTTP/2 due missing validation
[ "cpe:/a:redhat:jboss_enterprise_application_platform:7.3::el7" ]
null
5.9
null
null
RHSA-2017:1201
Red Hat Security Advisory: thunderbird security update
libevent: Stack-buffer overflow in the name_parse() function libevent: Stack-buffer overflow in evutil_parse_sockaddr_port() libevent: Out-of-bounds read in search_make_new() Mozilla: Memory safety bugs fixed in Firefox 53, Firefox ESR 45.9, and Firefox ESR 52.1 (MFSA 2017-11, MFSA 2017-12) Mozilla: Use-after-free in text input selection (MFSA 2017-11, MFSA 2017-12) Mozilla: Use-after-free in SMIL animation functions (MFSA 2017-11, MFSA 2017-12) Mozilla: Use-after-free during focus handling (MFSA 2017-11, MFSA 2017-12) Mozilla: Use-after-free during transaction processing in the editor (MFSA 2017-11, MFSA 2017-12) Mozilla: Out-of-bounds write with malicious font in Graphite 2 (MFSA 2017-11, MFSA 2017-12) Mozilla: Use-after-free in nsAutoPtr during XSLT processing (MFSA 2017-11, MFSA 2017-12) Mozilla: Use-after-free in nsTArray Length() during XSLT processing (MFSA 2017-11, MFSA 2017-12) Mozilla: Use-after-free in txExecutionState destructor during XSLT processing (MFSA 2017-11, MFSA 2017-12) Mozilla: Use-after-free with selection during scroll events (MFSA 2017-11, MFSA 2017-12) Mozilla: Use-after-free during style changes (MFSA 2017-11, MFSA 2017-12) Mozilla: Out-of-bounds write during BinHex decoding (MFSA 2017-11, MFSA 2017-12) Mozilla: Buffer overflow while parsing application/http-index-format content (MFSA 2017-11, MFSA 2017-12) Mozilla: Uninitialized values used while parsing application/http-index-format content (MFSA 2017-11, MFSA 2017-12) Mozilla: Out-of-bounds read when HTTP/2 DATA frames are sent with incorrect data (MFSA 2017-11, MFSA 2017-12) Mozilla: Out-of-bounds read during glyph processing (MFSA 2017-11, MFSA 2017-12) Mozilla: Crash during bidirectional unicode manipulation with animation (MFSA 2017-11, MFSA 2017-12) Mozilla: Addressbar spoofing with onblur event (MFSA 2017-12) Mozilla: Sandbox escape allowing file system read access through file picker (MFSA 2017-12) Mozilla: Buffer overflow in WebGL (MFSA 2017-11, MFSA 2017-12) Mozilla: Use-after-free in frame selection (MFSA 2017-11, MFSA 2017-12) Mozilla: Memory corruption with accessibility and DOM manipulation (MFSA 2017-11, MFSA 2017-12) Mozilla: Out-of-bounds read in ConvolvePixel (MFSA 2017-11, MFSA 2017-12) Mozilla: Origin confusion when reloading isolated data:text/html URL (MFSA 2017-12) Mozilla: Memory corruption when drawing Skia content (MFSA 2017-12) Mozilla: Potential Buffer overflow in flex-generated code (MFSA 2017-11, MFSA 2017-12)
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation", "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
9.8
null
RHSA-2021:2736
Red Hat Security Advisory: Red Hat Virtualization Host security and bug fix update [ovirt-4.4.7]
ansible: multiple modules expose secured values kernel: race condition for removal of the HCI controller kernel: use-after-free in net/bluetooth/hci_event.c when destroying an hci_chan kernel: size_t-to-int conversion vulnerability in the filesystem layer systemd: uncontrolled allocation on the stack in function unit_name_path_escape leads to crash
[ "cpe:/o:redhat:rhev_hypervisor:4.4::el8" ]
null
5.5
null
null
RHSA-2024:5982
Red Hat Security Advisory: linux-firmware security update
hw: amd: SMM Lock Bypass
[ "cpe:/o:redhat:rhel_aus:7.7::server" ]
null
7.5
null
null
RHSA-2011:1324
Red Hat Security Advisory: qt4 security update
QT UTF8 improper character expansion qt/harfbuzz buffer overflow
[ "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::client_workstation", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
RHSA-2023:3221
Red Hat Security Advisory: thunderbird security update
Mozilla: Browser prompts could have been obscured by popups Mozilla: Crash in RLBox Expat driver Mozilla: Potential permissions request bypass via clickjacking Mozilla: Content process crash due to invalid wasm code Mozilla: Potential spoof due to obscured address bar Mozilla: Potential memory corruption in FileReader::DoReadData() Mozilla: Memory safety bugs fixed in Firefox 113 and Firefox ESR 102.11
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
8.8
null
null
RHBA-2019:3723
Red Hat Bug Fix Advisory: Advanced Virtualization bug fix and enhancement update
libvirt: virsh domhostname command discloses guest hostname in readonly mode ntfs-3g: heap-based buffer overflow leads to local root privilege escalation QEMU: qxl: null pointer dereference while releasing spice resources QEMU: slirp: heap buffer overflow during packet reassembly
[ "cpe:/a:redhat:advanced_virtualization:8.1::el8" ]
null
null
7
null
RHSA-2020:3432
Red Hat Security Advisory: kernel security update
kernel: buffer overflow in mwifiex_cmd_append_vsie_tlv function in drivers/net/wireless/marvell/mwifiex/scan.c kernel: heap-based buffer overflow in mwifiex_ret_wmm_get_status function in drivers/net/wireless/marvell/mwifiex/wmm.c
[ "cpe:/o:redhat:rhel_aus:7.4::server", "cpe:/o:redhat:rhel_e4s:7.4::server", "cpe:/o:redhat:rhel_tus:7.4::server" ]
null
7.1
null
null
RHSA-2021:3492
Red Hat Security Advisory: cyrus-imapd security update
cyrus-imapd: Denial of service via string hashing algorithm collisions
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
7.5
null
null
RHSA-2017:2841
Red Hat Security Advisory: dnsmasq security update
dnsmasq: heap overflow in the code responsible for building DNS replies
[ "cpe:/o:redhat:rhel_aus:5.9" ]
null
null
9.8
null
RHSA-2024:10696
Red Hat Security Advisory: Red Hat OpenStack Platform 16.2 (python-werkzeug) security update
python-werkzeug: user may execute code on a developer's machine
[ "cpe:/a:redhat:openstack:16.2::el8" ]
null
7.5
null
null
RHSA-2023:1878
Red Hat Security Advisory: java-11-openjdk security update
OpenJDK: improper connection handling during TLS handshake (8294474) OpenJDK: missing string checks for NULL characters (8296622) OpenJDK: incorrect handling of NULL characters in ProcessBuilder (8295304) OpenJDK: Swing HTML parsing issue (8296832) OpenJDK: incorrect enqueue of references in garbage collector (8298191) OpenJDK: certificate validation issue in TLS session negotiation (8298310) OpenJDK: missing check for slash characters in URI-to-path conversion (8298667)
[ "cpe:/a:redhat:rhel_e4s:8.1::appstream" ]
null
3.7
null
null
RHSA-2015:0790
Red Hat Security Advisory: openstack-nova security, bug fix, and enhancement update
openstack-nova: console Cross-Site WebSocket hijacking
[ "cpe:/a:redhat:openstack:6::el7" ]
null
null
null
null
RHSA-2002:083
Red Hat Security Advisory: : Ghostscript command execution vulnerability
security flaw
[ "cpe:/o:redhat:linux:6.2", "cpe:/o:redhat:linux:7.0", "cpe:/o:redhat:linux:7.1", "cpe:/o:redhat:linux:7.2", "cpe:/o:redhat:linux:7.3" ]
null
null
null
null
RHSA-2015:0253
Red Hat Security Advisory: samba3x security update
samba: talloc free on uninitialized stack pointer in netlogon server could lead to remote-code execution
[ "cpe:/o:redhat:rhel_eus:5.9", "cpe:/o:redhat:rhel_mission_critical:5.6" ]
null
null
null
null
RHSA-2012:0313
Red Hat Security Advisory: samba security, bug fix, and enhancement update
samba: insecure "wide links" default
[ "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::client_workstation", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
RHSA-2021:3816
Red Hat Security Advisory: httpd:2.4 security update
httpd: mod_session: Heap overflow via a crafted SessionHeader value httpd: mod_proxy: SSRF via a crafted request uri-path containing "unix:"
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
9
null
null
RHSA-2022:7181
Red Hat Security Advisory: thunderbird security update
Mozilla: Matrix SDK bundled with Thunderbird vulnerable to a data corruption issue Mozilla: Matrix SDK bundled with Thunderbird vulnerable to an impersonation attack by malicious server administrators Mozilla: Matrix SDK bundled with Thunderbird vulnerable to a device verification attack Mozilla: Matrix SDK bundled with Thunderbird vulnerable to an impersonation attack Mozilla: Same-origin policy violation could have leaked cross-origin URLs Mozilla: Memory Corruption in JS Engine Mozilla: Denial of Service via window.print Mozilla: Memory safety bugs fixed in Firefox ESR 102.4 and Thunderbird 102.4
[ "cpe:/a:redhat:rhel_eus:8.4::appstream" ]
null
8.8
6.1
null
RHSA-2003:296
Red Hat Security Advisory: : Updated stunnel packages available
security flaw security flaw
[ "cpe:/o:redhat:linux:7.1", "cpe:/o:redhat:linux:7.2", "cpe:/o:redhat:linux:7.3", "cpe:/o:redhat:linux:8.0" ]
null
null
null
null
RHSA-2020:2082
Red Hat Security Advisory: kernel security and bug fix update
kernel: double free may be caused by the function allocate_trace_buffer in the file kernel/trace/trace.c kernel: use-after-free in __blk_add_trace in kernel/trace/blktrace.c Kernel: NetLabel: null pointer dereference while receiving CIPSO packet with null category may cause kernel panic
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
5.9
null
null
RHSA-2019:1799
Red Hat Security Advisory: thunderbird security and bug fix update
Mozilla: Sandbox escape via installation of malicious language pack Mozilla: Memory safety bugs fixed in Firefox 68 and Firefox ESR 60.8 Mozilla: Script injection within domain through inner window reuse Mozilla: Cross-origin POST requests can be made with NPAPI plugins by following 308 redirects Mozilla: Use-after-free with HTTP/2 cached stream Mozilla: HTML parsing error can contribute to content XSS Mozilla: Caret character improperly escaped in origins Mozilla: Same-origin policy treats all files in a directory as having the same-origin
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
null
6.1
null
RHSA-2022:0821
Red Hat Security Advisory: kernel-rt security and bug fix update
kernel: fget: check that the fd still exists after getting a ref to it kernel: possible privileges escalation due to missing TLB flush kernel: cgroups v1 release_agent feature may allow privilege escalation kernel: improper initialization of the "flags" member of the new pipe_buffer kernel: failing usercopy allows for use-after-free exploitation
[ "cpe:/a:redhat:rhel_eus:8.2::nfv", "cpe:/a:redhat:rhel_eus:8.2::realtime" ]
null
7
null
null
RHSA-2016:0088
Red Hat Security Advisory: qemu-kvm-rhev security update
Qemu: ide: ahci use-after-free vulnerability in aio port commands Qemu: nvram: OOB r/w access in processing firmware configurations
[ "cpe:/a:redhat:openstack:7::el7" ]
null
null
null
null
RHSA-2023:5222
Red Hat Security Advisory: libwebp security update
libwebp: Heap buffer overflow in WebP Codec
[ "cpe:/a:redhat:rhel_aus:8.4::appstream", "cpe:/a:redhat:rhel_e4s:8.4::appstream", "cpe:/a:redhat:rhel_tus:8.4::appstream" ]
null
9.6
null
null
RHSA-2015:1912
Red Hat Security Advisory: chromium-browser security update
chromium-browser: cross-origin bypass in Blink chromium-browser: use-after-free in PDFium chromium-browser: Use-after-free in ServiceWorker chromium-browser: Bad-cast in PDFium chromium-browser: Information leakage in LocalStorage chromium-browser: Improper error handling in libANGLE chromium-browser: Memory corruption in FFMpeg chromium-browser: CORS bypass in CSS fonts chromium-browser: various fixes from internal audits
[ "cpe:/a:redhat:rhel_extras:6" ]
null
null
null
null
RHSA-2018:3521
Red Hat Security Advisory: java-11-openjdk security update
OpenJDK: Incorrect handling of unsigned attributes in signed Jar manifests (Security, 8194534) OpenJDK: Leak of sensitive header data via HTTP redirect (Networking, 8196902) OpenJDK: Incomplete enforcement of the trustURLCodebase restriction (JNDI, 8199177) OpenJDK: Multi-Release attribute read from outside of the main manifest attributes (Utility, 8199171) OpenJDK: Improper field access checks (Hotspot, 8199226) OpenJDK: Missing endpoint identification algorithm check during TLS session resumption (JSSE, 8202613) OpenJDK: Unrestricted access to scripting engine (Scripting, 8202936)
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
8.1
null
RHSA-2017:2016
Red Hat Security Advisory: curl security, bug fix, and enhancement update
curl: escape and unescape integer overflows
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
2.9
null
RHSA-2022:1357
Red Hat Security Advisory: OpenShift Container Platform 4.10.10 security and extras update
moby: Default inheritable capabilities for linux container should be empty
[ "cpe:/a:redhat:openshift:4.10::el8" ]
null
4.8
null
null
RHSA-2016:0613
Red Hat Security Advisory: samba3x security update
samba: crash in dcesrv_auth_bind_ack due to missing error check samba: Man-in-the-middle attacks possible with NTLMSSP authentication samba: Spoofing vulnerability when domain controller is configured samba: Missing downgrade detection samba: Smb signing not required by default when smb client connection is used for ipc usage samba: SAMR and LSA man in the middle attacks
[ "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::client_workstation", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
RHSA-2024:6927
Red Hat Security Advisory: Red Hat JBoss Core Services Apache HTTP Server 2.4.57 SP6 security update
httpd: HTTP response splitting mod_jk: information Disclosure / DoS
[ "cpe:/a:redhat:jboss_core_services:1::el7", "cpe:/a:redhat:jboss_core_services:1::el8" ]
null
5.9
null
null
RHSA-2015:1242
Red Hat Security Advisory: java-1.7.0-oracle security update
OpenJDK: deserialization issue in ObjectInputStream.readSerialData() (Libraries, 8076401) JDK: unspecified vulnerability fixed in 7u85 (Hotspot) OpenJDK: non-constant time comparisons in crypto code (JCE, 8074865) JCE: missing EC parameter validation in ECDH_Derive() (OpenJDK JCE, 8075833) JDK: unspecified vulnerability fixed in 7u85 and 8u51 (2D) OpenJDK: incorrect code permission checks in RMIConnectionImpl (JMX, 8075853) OpenJDK: name for reverse DNS lookup used in certificate identity check (JSSE, 8067694) JDK: unspecified vulnerability fixed in 6u101, 7u85 and 8u51 (Install) OpenJDK: IIOPInputStream type confusion vulnerability (CORBA, 8076376) ICU: integer overflow in LETableReference verifyLength() (OpenJDK 2D, 8077520) JDK: unspecified vulnerability fixed in 6u101, 7u85 and 8u51 (2D) JDK: unspecified vulnerability fixed in 6u101, 7u85 and 8u51 (2D) JDK: unspecified vulnerability fixed in 6u101, 7u85 and 8u51 (Deployment) SSL/TLS: "Invariance Weakness" vulnerability in RC4 stream cipher LOGJAM: TLS connections which support export grade DHE key-exchange are vulnerable to MITM attacks JDK: unspecified vulnerability fixed in 7u85 and 8u51 (Deployment) OpenJDK: improper permission checks in MBeanServerInvocationHandler (JMX, 8076397) OpenJDK: insufficient context checks during object deserialization (Libraries, 8076405) OpenJDK: RemoteObjectInvocationHandler allows calling finalize() (RMI, 8076409) JDK: unspecified vulnerability fixed in 7u85 and 8u51 (Deployment) OpenJDK: incorrect OCSP nextUpdate checking (Libraries, 8075374) OpenJDK: DnsClient fails to release request information after error (JNDI, 8075378) ICU: missing boundary checks in layout engine (OpenJDK 2D, 8071715)
[ "cpe:/a:redhat:rhel_extras_oracle_java:5", "cpe:/a:redhat:rhel_extras_oracle_java:6", "cpe:/a:redhat:rhel_extras_oracle_java:7" ]
null
null
3.7
null
RHSA-2019:0485
Red Hat Security Advisory: tomcat security update
tomcat: Open redirect in default servlet
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
5.3
null
RHSA-2022:6526
Red Hat Security Advisory: OpenShift Virtualization 4.11.0 Images security and bug fix update
golang: out-of-bounds read in golang.org/x/text/language leads to DoS golang: net/http: limit growth of header canonicalization cache golang: syscall: don't close fd 0 on ForkExec error kubeVirt: Arbitrary file read on the host from KubeVirt VMs prometheus/client_golang: Denial of service using InstrumentHandlerCounter golang: math/big: uncontrolled memory consumption due to an unhandled overflow via Rat.SetString golang: cmd/go: misinterpretation of branch names can lead to incorrect access control golang: crypto/elliptic: IsOnCurve returns true for invalid field elements golang: encoding/pem: fix stack overflow in Decode golang: regexp: stack exhaustion via a deeply nested expression golang: crash in a golang.org/x/crypto/ssh server golang: crypto/elliptic: panic caused by oversized scalar
[ "cpe:/a:redhat:container_native_virtualization:4.11::el8" ]
null
7.5
null
null
RHSA-2014:0355
Red Hat Security Advisory: ruby193-libyaml security update
libyaml: heap-based buffer overflow when parsing YAML tags libyaml: heap-based buffer overflow when parsing URLs
[ "cpe:/a:redhat:rhel_software_collections:1::el6" ]
null
null
null
null
RHSA-2018:3666
Red Hat Security Advisory: kernel-rt security and bug fix update
kernel: stack-based buffer overflow in chap_server_compute_md5() in iscsi target kernel: NULL pointer dereference in af_netlink.c:__netlink_ns_capable() allows for denial of service
[ "cpe:/a:redhat:rhel_extras_rt:7" ]
null
null
5.5
null
RHSA-2024:1512
Red Hat Security Advisory: libreoffice security fix update
libreoffice: Improper Input Validation leading to arbitrary gstreamer plugin execution libreoffice: Insufficient macro permission validation leading to macro execution
[ "cpe:/a:redhat:rhel_aus:8.2::appstream", "cpe:/a:redhat:rhel_e4s:8.2::appstream", "cpe:/a:redhat:rhel_tus:8.2::appstream" ]
null
8.3
null
null
RHSA-2014:0836
Red Hat Security Advisory: Red Hat JBoss Web Server 2.0.1 tomcat7 security update
Tomcat/JBossWeb: Limited DoS in chunked transfer encoding input filter Tomcat/JBossWeb: XXE vulnerability via user supplied XSLTs Tomcat/JBossWeb: Request smuggling via malicious content length header
[ "cpe:/a:redhat:jboss_enterprise_web_server:2.0" ]
null
null
null
null
RHSA-2023:3612
Red Hat Security Advisory: OpenShift Container Platform 4.13.4 packages and security update
golang: net/http: excessive memory growth in a Go server accepting HTTP/2 requests golang.org/x/net/http2: avoid quadratic complexity in HPACK decoding golang: crypto/tls: large handshake records may cause panics golang: net/http, mime/multipart: denial of service from excessive resource consumption golang: net/http, net/textproto: denial of service from excessive memory allocation golang: net/http, net/textproto, mime/multipart: denial of service from excessive resource consumption golang: go/parser: Infinite loop in parsing golang: html/template: backticks not treated as string delimiters golang: html/template: improper handling of JavaScript whitespace runc: volume mount race condition (regression of CVE-2019-19921)
[ "cpe:/a:redhat:openshift:4.13::el8", "cpe:/a:redhat:openshift:4.13::el9" ]
null
7
null
null
RHSA-2013:1373
Red Hat Security Advisory: jboss-remoting security update
Remoting: DoS by file descriptor exhaustion
[ "cpe:/a:redhat:jboss_enterprise_brms_platform:5.3.1" ]
null
null
null
null
RHSA-2014:1691
Red Hat Security Advisory: openstack-packstack security, bug fix, and enhancement update
Neutron: security groups fail to block traffic properly due to packstack configuration
[ "cpe:/a:redhat:openstack:4::el6" ]
null
null
null
null
RHSA-2022:6805
Red Hat Security Advisory: OpenShift Container Platform 4.10.36 security update
go-getter: command injection vulnerability go-getter: unsafe download (issue 1 of 3) go-getter: unsafe download (issue 2 of 3) go-getter: unsafe download (issue 3 of 3)
[ "cpe:/a:redhat:openshift:4.10::el8" ]
null
8.6
null
null
RHSA-2022:0410
Red Hat Security Advisory: Red Hat Single Sign-On 7.4.10 on OpenJ9 for OpenShift image security update
undertow: client side invocation timeout raised when calling over HTTP2
[ "cpe:/a:redhat:rhosemc:1.0::el8" ]
null
7.5
null
null
RHSA-2023:3220
Red Hat Security Advisory: firefox security update
Mozilla: Browser prompts could have been obscured by popups Mozilla: Crash in RLBox Expat driver Mozilla: Potential permissions request bypass via clickjacking Mozilla: Content process crash due to invalid wasm code Mozilla: Potential spoof due to obscured address bar Mozilla: Potential memory corruption in FileReader::DoReadData() Mozilla: Memory safety bugs fixed in Firefox 113 and Firefox ESR 102.11
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
8.8
null
null
RHBA-2021:1503
Red Hat Bug Fix Advisory: samba bug fix update
samba: Netlogon elevation of privilege vulnerability (Zerologon) samba: Missing handle permissions check in SMB1/2/3 ChangeNotify samba: Unprivileged user can crash winbind
[ "cpe:/a:redhat:storage:3.5:samba:el8" ]
null
5
null
null
RHSA-2016:2072
Red Hat Security Advisory: jboss-ec2-eap security and enhancement update for EAP 6.4.11
tomcat: Usage of vulnerable FileUpload package can result in denial of service
[ "cpe:/a:redhat:jboss_enterprise_application_platform:6::el6" ]
null
null
7.5
null
RHSA-2018:2571
Red Hat Security Advisory: bind security update
bind: processing of certain records when "deny-answer-aliases" is in use may trigger an assert leading to a denial of service
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
7.5
null
RHSA-2016:1629
Red Hat Security Advisory: python33-python security update
python: smtplib StartTLS stripping attack python: http protocol steam injection attack CGIHandler: sets environmental variable based on user supplied Proxy request header
[ "cpe:/a:redhat:rhel_software_collections:2::el6", "cpe:/a:redhat:rhel_software_collections:2::el7" ]
null
null
5
null
RHSA-2019:2978
Red Hat Security Advisory: polkit security update
polkit: Temporary auth hijacking via PID reuse and non-atomic fork
[ "cpe:/o:redhat:rhel_eus:7.5::computenode", "cpe:/o:redhat:rhel_eus:7.5::server" ]
null
null
7.3
null
RHSA-2024:4276
Red Hat Security Advisory: qemu-kvm security update
qemu-kvm: 'qemu-img info' leads to host file read/write
[ "cpe:/a:redhat:rhel_e4s:9.0::appstream" ]
null
7.8
null
null
RHSA-2021:0658
Red Hat Security Advisory: thunderbird security update
Mozilla: Content Security Policy violation report could have contained the destination of a redirect Mozilla: Content Security Policy violation report could have contained the destination of a redirect Mozilla: MediaError message property could have leaked information about cross-origin resources Mozilla: Memory safety bugs fixed in Firefox 86 and Firefox ESR 78.8
[ "cpe:/a:redhat:rhel_eus:8.1::appstream" ]
null
8.8
null
null
RHSA-2023:1823
Red Hat Security Advisory: openvswitch2.13 security update
openvswitch: ip proto 0 triggers incorrect handling
[ "cpe:/o:redhat:enterprise_linux:8::fastdatapath" ]
null
8.2
null
null
RHSA-2014:0703
Red Hat Security Advisory: json-c security update
json-c: buffer overflow if size_t is larger than int json-c: hash collision DoS
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
null
null
RHSA-2013:0626
Red Hat Security Advisory: java-1.7.0-ibm security update
JDK: unspecified vulnerability fixed in 6u39 and 7u13 (Deployment) OpenJDK: MethodHandles incorrect permission checks (Libraries, 8004933) JDK: unspecified vulnerability fixed in 6u39 and 7u13 (Scripting) JDK: unspecified vulnerability fixed in 6u39 and 7u13 (Deployment) OpenJDK: disable Gopher support by default (Gopher, 7189567) JDK: unspecified vulnerability fixed in 6u39 and 7u13 (Deployment) JDK: unspecified vulnerability fixed in 6u39 and 7u13 (JMX) JDK: unspecified vulnerability fixed in 6u39 and 7u13 (Deployment) OpenJDK: MethodHandles.Lookup incorrect permission checks, Java 7 0day (Libraries, 8006017) JDK: unspecified vulnerability fixed in 6u39 and 7u13 (Deployment) OpenJDK: RMI CGIHandler XSS issue (RMI, 6563318) OpenJDK: logging insufficient access control checks (Libraries, 6664509) OpenJDK: logging insufficient access control checks (Libraries, 6664528) OpenJDK: invalid threads subject to interrupts (Libraries, 6776941) OpenJDK: reflection API incorrect checks for proxy classes (Libraries, 7197546, SE-2012-01 Issue 29) OpenJDK: JMX Introspector missing package access check (JMX, 8000539, SE-2012-01 Issue 52) OpenJDK: insufficient clipboard access premission checks (AWT, 7186952) OpenJDK: InetSocketAddress serialization issue (Networking, 7201071) OpenJDK: loadPropertyFile missing restrictions (JAXP, 8001235) OpenJDK: com.sun.xml.internal.* not restricted packages (JAX-WS, 7201068) JDK: unspecified vulnerability fixed in 7u13 (2D) JDK: unspecified vulnerability fixed in 6u39 and 7u13 (Deployment) OpenJDK: CPU consumption DoS via repeated SSL ClientHello packets (JSSE, 7192393) OpenJDK: missing serialization restriction (CORBA, 7201066) OpenJDK: insufficient privilege checking issue (AWT, 7192977) OpenJDK: insufficient Diffie-Hellman public key checks (JSSE, 7192392) OpenJDK: MethodFinder insufficient checks for cached results (Beans, 7200493) OpenJDK: insufficient privilege checking issue (AWT, 8001057) JDK: unspecified vulnerability fixed in 6u39 and 7u13 (Deployment) JDK: unspecified vulnerability fixed in 7u13 (Deployment) OpenJDK: RequiredModelMBean missing access control context checks (JMX, 8000537) OpenJDK: Specially crafted sample model integer overflow (2D, 8007014) JDK: unspecified vulnerability fixed in 6u39 and 7u13 (Deployment) OpenJDK: missing ValueHandlerImpl class constructor access restriction (CORBA, 8000631) OpenJDK: image parser insufficient raster parameter checks (2D, 8001972) OpenJDK: image parser insufficient raster parameter checks (AWT, 8002325) OpenJDK: MethodHandleProxies insufficient privilege checks (Libraries, 8004937) OpenJDK: MethodHandles insufficient privilege checks (Libraries, 8006439) OpenJDK: MBeanServer insufficient privilege restrictions (JMX, 8006446) JDK: unspecified vulnerability fixed in 6u41 and 7u15 (Deployment) OpenJDK: CMM malformed raster memory corruption (2D, 8007675)
[ "cpe:/a:redhat:rhel_extras:5::server", "cpe:/a:redhat:rhel_extras:6" ]
null
null
null
null
RHSA-2024:8093
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.4 security update
apache-avro: Schema parsing may trigger Remote Code Execution (RCE)
[ "cpe:/a:redhat:jboss_enterprise_application_platform:7.4" ]
null
8.8
null
null
RHSA-2022:6306
Red Hat Security Advisory: rh-mariadb103-galera and rh-mariadb103-mariadb security and bug fix update
mariadb: Crash executing query with VIEW, aggregate and subquery mariadb: MariaDB allows an application crash in find_field_in_tables and find_order_in_list via an unused common table expression (CTE) mariadb: MariaDB through 10.5.13 allows a ha_maria::extra application crash via certain SELECT statements mariadb: MariaDB through 10.5.9 allows an application crash in sub_select_postjoin_aggr for a NULL value of aggr mariadb: MariaDB through 10.5.9 allows a sql_parse.cc application crash because of incorrect used_tables expectations mariadb: MariaDB through 10.5.9 allows an application crash via certain long SELECT DISTINCT statements mariadb: MariaDB through 10.5.9 allows attackers to trigger a convert_const_to_int use-after-free when the BIGINT data type is used mysql: Server: FTS unspecified vulnerability (CPU Apr 2022) mysql: C API unspecified vulnerability (CPU Oct 2022) mariadb: lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer mariadb: lack of validating the existence of an object prior to performing operations on the object mariadb: lack of proper validation of a user-supplied string before using it as a format specifier mariadb: CONNECT storage engine heap-based buffer overflow mariadb: assertion failure in Item_args::walk_arg mariadb: use-after-poison when complex conversion is involved in blob mariadb: server crash in create_tmp_table::finalize mariadb: server crash in component arg_comparator::compare_real_fixed mariadb: server crash at my_decimal::operator= mariadb: server crash at Field::set_default via specially crafted SQL statements mariadb: use-after-poison in my_strcasecmp_8bit() of ctype-simple.c mariadb: crash via component Item_subselect::init_expr_cache_tracker mariadb: server crashes in query_arena::set_query_arena upon SELECT from view mariadb: assertion failures in decimal_bin_size mariadb: assertion failure in compare_order_elements mariadb: use-after-poison in Binary_string::free_buffer mariadb: crash in multi-update and implicit grouping mariadb: assertion failure in sql/item_func.cc mariadb: assertion failure in sql/item_cmpfunc.cc mariadb: assertion failure in VDec::VDec at /sql/sql_type.cc mariadb: use-after-poison in Binary_string::free_buffer mariadb: improper locking due to the unreleased lock in extra/mariabackup/ds_compress.cc mariadb: improper locking due to the unreleased lock in extra/mariabackup/ds_compress.cc mariadb: server crash at Item_subselect::init_expr_cache_tracker mariadb: server crash in Item_func_in::cleanup/Item::cleanup_processor mariadb: server crash in Item_args::walk_args mariadb: segmentation fault in Exec_time_tracker::get_loops/Filesort_tracker::report_use/filesort
[ "cpe:/a:redhat:rhel_software_collections:3::el7" ]
null
6.5
null
null
RHSA-2014:1086
Red Hat Security Advisory: Red Hat JBoss Web Server 2.1.0 update
tomcat: information disclosure via XXE when running untrusted web applications httpd: mod_deflate denial of service Tomcat/JBossWeb: XML parser hijack by malicious web application openssl: DoS when sending invalid DTLS handshake httpd: mod_status heap-based buffer overflow Tomcat/JBossWeb: request smuggling and limited DoS in ChunkedInputFilter httpd: mod_cgid denial of service
[ "cpe:/a:redhat:jboss_enterprise_web_server:2.1" ]
null
null
null
null
RHSA-2018:2762
Red Hat Security Advisory: qemu-kvm-ma security update
QEMU: slirp: heap buffer overflow while reassembling fragmented datagrams
[ "cpe:/o:redhat:enterprise_linux:7::server" ]
null
null
5.1
null
RHSA-2020:4047
Red Hat Security Advisory: qemu-kvm-ma security update
QEMU: usb: out-of-bounds r/w access issue while processing usb packets
[ "cpe:/o:redhat:rhel_eus:7.7::server" ]
null
5
null
null
RHSA-2023:5735
Red Hat Security Advisory: OpenJDK 11.0.21 Security Update for Windows Builds
OpenJDK: certificate path validation issue during client authentication (8309966)
[ "cpe:/a:redhat:openjdk:11::windows" ]
null
5.3
null
null
RHSA-2022:5046
Red Hat Security Advisory: .NET 6.0 security and bugfix update
dotnet: NuGet Credential leak due to loss of control of third party symbol server domain
[ "cpe:/a:redhat:enterprise_linux:8::appstream", "cpe:/a:redhat:enterprise_linux:8::crb" ]
null
5
null
null
RHSA-2009:1189
Red Hat Security Advisory: flash-plugin security update
flash-plugin: Remote code execution vulnerability via malicious SWF (Shockwave Flash) content flash-plugin: multiple code execution flaws (APSB09-10) flash-plugin: multiple code execution flaws (APSB09-10) flash-plugin: multiple code execution flaws (APSB09-10) flash-plugin: multiple code execution flaws (APSB09-10) flash-plugin: multiple information disclosure flaws (APSB09-10) flash-plugin: multiple code execution flaws (APSB09-10) flash-plugin: multiple code execution flaws (APSB09-10) flash-plugin: multiple information disclosure flaws (APSB09-10)
[ "cpe:/a:redhat:rhel_extras:3", "cpe:/a:redhat:rhel_extras:4" ]
null
null
null
null
RHSA-2019:3467
Red Hat Security Advisory: dovecot security and bug fix update
dovecot: Improper certificate validation
[ "cpe:/a:redhat:enterprise_linux:8::appstream", "cpe:/a:redhat:enterprise_linux:8::crb" ]
null
null
7.7
null
RHSA-2018:2561
Red Hat Security Advisory: CloudForms 4.6.4 security, bug fix, and enhancement update
rubygem-sprockets: Path traversal in forbidden_request?() can allow remote attackers to read arbitrary files cfme: Improper access control in dRuby allows local users to execute arbitrary commands as root
[ "cpe:/a:redhat:cloudforms_managementengine:5.9::el7" ]
null
null
7.8
null
RHSA-2020:0922
Red Hat Security Advisory: Red Hat AMQ Broker 7.6 release and security update
activemq: Corrupt MQTT frame can cause broker shutdown HTTP/2: large amount of data requests leads to denial of service HTTP/2: flood using PING frames results in unbounded memory growth HTTP/2: flood using HEADERS frames results in unbounded memory growth HTTP/2: flood using SETTINGS frames results in unbounded memory growth HTTP/2: 0-length headers lead to denial of service HTTP/2: request for large response leads to denial of service HTTP/2: flood using empty frames results in excessive resource consumption jetty: using specially formatted URL against DefaultServlet or ResourceHandler leads to XSS conditions jetty: error path information disclosure netty: HTTP request smuggling by mishandled whitespace before the colon in HTTP headers netty: HTTP request smuggling netty: HttpObjectDecoder.java allows Content-Length header to accompanied by second Content-Length header netty: HTTP Request Smuggling due to Transfer-Encoding whitespace mishandling
[ "cpe:/a:redhat:amq_broker:7" ]
null
7.5
7.5
null
RHSA-2024:0960
Red Hat Security Advisory: thunderbird security update
Mozilla: Out-of-bounds memory read in networking channels Mozilla: Alert dialog could have been spoofed on another site Mozilla: Fullscreen Notification could have been hidden by select element Mozilla: Custom cursor could obscure the permission dialog Mozilla: Mouse cursor re-positioned unexpectedly could have led to unintended permission grants Mozilla: Multipart HTTP Responses would accept the Set-Cookie header in response parts Mozilla: Incorrect code generation on 32-bit ARM devices Mozilla: Memory safety bugs fixed in Firefox 123, Firefox ESR 115.8, and Thunderbird 115.8
[ "cpe:/a:redhat:rhel_eus:8.6::appstream" ]
null
7.5
null
null
RHSA-2024:8026
Red Hat Security Advisory: thunderbird security update
firefox: Use-after-free in Animation timeline (128.3.1 ESR Chemspill)
[ "cpe:/a:redhat:rhel_eus:9.2::appstream" ]
null
9.8
null
null
RHSA-2014:1762
Red Hat Security Advisory: spacewalk-java security update
Satellite: Spacewalk contains multiple XSS (stored and reflected)
[ "cpe:/a:redhat:network_satellite:5.5::el5", "cpe:/a:redhat:network_satellite:5.5::el6", "cpe:/a:redhat:network_satellite:5.6::el5", "cpe:/a:redhat:network_satellite:5.6::el6" ]
null
null
null
null
RHSA-2023:7638
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.4.14 on RHEL 8 security update
guava: insecure temporary directory creation eap-galleon: custom provisioning creates unsecured http-invoker xnio: StackOverflowException when the chain of notifier states becomes problematically big jetty-server: OutOfMemoryError for large multipart without filename read via request.getParameter() jetty-server: Cookie parsing of quoted values can exfiltrate values from other cookies apache-mina-sshd: information exposure in SFTP server implementations apache-avro: Apache Avro Java SDK: Memory when deserializing untrusted data in Avro Java SDK HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack)
[ "cpe:/a:redhat:jboss_enterprise_application_platform:7.4::el8" ]
null
7.5
null
null
RHSA-2025:1658
Red Hat Security Advisory: kernel security update
kernel: of: Fix double free in of_parse_phandle_with_args_map kernel: Integer Overflow in raid5_cache_count kernel: netfilter: nft_set_pipapo: do not free live element kernel: mm: swap: fix race between free_swap_and_cache() and swapoff() kernel: netfilter: nf_tables: fix memleak in map from abort path kernel: netfilter: nf_tables: restore set elements when delete set fails kernel: netfilter: nft_set_pipapo: walk over current view on netlink dump kernel: misc: lis3lv02d_i2c: Fix regulators getting en-/dis-abled twice on suspend/resume kernel: x86/mce: Make sure to grab mce_sysfs_mutex in set_bank() kernel: tipc: fix a possible memleak in tipc_buf_append kernel: selinux,smack: don't bypass permissions check in inode_setsecctx hook kernel: xfrm: fix one more kernel-infoleak in algo dumping kernel: xfrm: validate new SA's prefixlen using SA family when sel.family is unset kernel: netfilter: nf_reject_ipv6: fix potential crash in nf_send_reset6() kernel: arm64/sve: Discard stale CPU state when handling SVE traps kernel: mm: fix NULL pointer dereference in alloc_pages_bulk_noprof
[ "cpe:/a:redhat:rhel_eus:9.4::appstream", "cpe:/a:redhat:rhel_eus:9.4::crb", "cpe:/a:redhat:rhel_eus:9.4::nfv", "cpe:/a:redhat:rhel_eus:9.4::realtime", "cpe:/o:redhat:rhel_eus:9.4::baseos" ]
null
5.5
null
null
RHSA-2022:5483
Red Hat Security Advisory: Migration Toolkit for Containers (MTC) 1.7.2 security and bug fix update
nodejs-ansi-regex: Regular expression denial of service (ReDoS) matching ANSI escape codes node-fetch: exposure of sensitive information to an unauthorized actor follow-redirects: Exposure of Sensitive Information via Authorization Header leak
[ "cpe:/a:redhat:rhmt:1.7::el8" ]
null
5.9
null
null
RHSA-2016:1000
Red Hat Security Advisory: qemu-kvm-rhev security update
qemu: incorrect banked access bounds checking in vga module
[ "cpe:/a:redhat:openstack:6::el7" ]
null
null
7.6
null
RHSA-2021:4213
Red Hat Security Advisory: php:7.4 security, bug fix, and enhancement update
php: Use of freed hash key in the phar_parse_zipfile function php: Wrong ciphertext/tag in AES-CCM encryption for a 12 bytes IV php: URL decoding of cookie names can lead to different interpretation of cookies between browser and server php: FILTER_VALIDATE_URL accepts URLs with invalid userinfo php: NULL pointer dereference in SoapClient
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
7.5
null
null
RHSA-2024:8496
Red Hat Security Advisory: webkit2gtk3 security update
webkitgtk: Memory corruption issue when processing web content webkitgtk: arbitrary javascript code execution webkitgtk: Processing web content may lead to arbitrary code execution webkitgtk: Arbitrary Remote Code Execution chromium-browser: Use after free in ANGLE webkitgtk: type confusion may lead to arbitrary code execution webkitgtk: Processing web content may lead to arbitrary code execution webkitgtk: Processing web content may lead to arbitrary code execution webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution webkitgtk: webkit2gtk: Use after free may lead to Remote Code Execution webkitgtk: webkit2gtk: Out-of-bounds read was addressed with improved bounds checking webkitgtk: webkit2gtk: Out-of-bounds read was addressed with improved bounds checking webkitgtk: webkit2gtk: Use-after-free was addressed with improved memory management webkitgtk: webkit2gtk: Processing maliciously crafted web content may lead to an unexpected process crash webkit: Processing maliciously crafted web content may lead to memory corruption
[ "cpe:/a:redhat:rhel_e4s:9.0::appstream" ]
null
8.8
null
null
RHSA-2021:2587
Red Hat Security Advisory: ruby:2.5 security, bug fix, and enhancement update
ruby: NUL injection vulnerability of File.fnmatch and File.fnmatch? ruby: Regular expression denial of service vulnerability of WEBrick's Digest authentication ruby: HTTP response splitting in WEBrick ruby: Code injection via command argument of Shell#test / Shell#[] rubygem-json: Unsafe object creation vulnerability in JSON ruby: BasicSocket#read_nonblock method leads to information disclosure ruby: Potential HTTP request smuggling in WEBrick ruby: XML round-trip vulnerability in REXML
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
7.5
7.5
null
RHSA-2020:0813
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.2 security update
undertow: AJP File Read/Inclusion Vulnerability
[ "cpe:/a:redhat:jboss_enterprise_application_platform:7.2::el6", "cpe:/a:redhat:jboss_enterprise_application_platform:7.2::el7", "cpe:/a:redhat:jboss_enterprise_application_platform:7.2::el8" ]
null
7.6
null
null
RHSA-2018:1826
Red Hat Security Advisory: kernel security, bug fix, and enhancement update
hw: cpu: speculative store bypass
[ "cpe:/o:redhat:rhel_eus:6.7::computenode", "cpe:/o:redhat:rhel_eus:6.7::server" ]
null
null
5.6
null
RHSA-2010:0165
Red Hat Security Advisory: nss security update
TLS: MITM attacks via session renegotiation
[ "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws", "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::client_workstation", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
RHSA-2018:0024
Red Hat Security Advisory: qemu-kvm security update
An update for qemu-kvm is now available for Red Hat Enterprise Linux 6. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
null
null
RHSA-2024:4053
Red Hat Security Advisory: Red Hat OpenStack Platform 16.2 security update
YAQL: OpenStack Murano Component Information Leakage
[ "cpe:/a:redhat:openstack:16.2::el8" ]
null
8.4
null
null
RHSA-2011:0474
Red Hat Security Advisory: thunderbird security update
Mozilla dangling pointer flaw (MFSA 2011-13) Mozilla crash from several marquee elements (MFSA 2011-12) Mozilla crash from bad iframe source (MFSA 2011-12) Mozilla integer overflow in frameset spec (MFSA 2011-12) Mozilla OOM condition arbitrary memory write (MFSA 2011-12) Mozilla memory safety issue (MFSA 2011-12)
[ "cpe:/a:redhat:rhel_productivity:5", "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws", "cpe:/o:redhat:enterprise_linux:5::client" ]
null
null
null
null
RHSA-2017:1263
Red Hat Security Advisory: libtirpc security update
libntirpc: Memory leak when failing to parse XDR strings or bytearrays
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
7.5
null
RHSA-2017:1244
Red Hat Security Advisory: ansible and openshift-ansible security and bug fix update
ansible: Arbitrary code execution on control node (incomplete fix for CVE-2016-9587) ansible: Security issue with lookup return not tainting the jinja2 environment
[ "cpe:/a:redhat:openshift:3.2::el7", "cpe:/a:redhat:openshift:3.3::el7", "cpe:/a:redhat:openshift:3.4::el7", "cpe:/a:redhat:openshift:3.5::el7" ]
null
null
5.3
null
RHSA-2017:2913
Red Hat Security Advisory: rh-nodejs6-nodejs-tough-cookie security update
nodejs-tough-cookie: Regular expression denial of service
[ "cpe:/a:redhat:rhel_software_collections:2::el6", "cpe:/a:redhat:rhel_software_collections:2::el7" ]
null
null
5.3
null
RHSA-2011:1220
Red Hat Security Advisory: samba3x security update
samba/cifs-utils: mount.cifs and umount.cifs fail to anticipate RLIMIT_FSIZE (SWAT): Absent CSRF protection in various Samba web configuration formulars (SWAT): XSS flaw in Change Password page cifs-utils: mount.cifs incorrect fix for CVE-2010-0547
[ "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::client_workstation", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
RHSA-2024:4413
Red Hat Security Advisory: pki-core security update
ca: token authentication bypass vulnerability
[ "cpe:/a:redhat:rhel_e4s:9.0::appstream" ]
null
7.5
null
null
RHSA-2011:1299
Red Hat Security Advisory: Red Hat Network Satellite server security and enhancement update
Spacewalk: login page open redirect via url_bounce Spacewalk: XSS on SystemGroupList.do page Satellite: XSS flaw(s) in filter handling Satellite/Spacewalk: XSS flaw in channels search Satellite/Spacewalk: XSS on the Lost Password page
[ "cpe:/a:redhat:network_satellite:5.4::el5", "cpe:/a:redhat:network_satellite:5.4::el6" ]
null
null
null
null
RHSA-2024:10743
Red Hat Security Advisory: firefox security update
firefox: thunderbird: Select list elements could be shown over another site firefox: thunderbird: CSP Bypass and XSS Exposure via Web Compatibility Shims firefox: thunderbird: URL Bar Spoofing via Manipulated Punycode and Whitespace Characters firefox: thunderbird: Unhandled Exception in Add-on Signature Verification firefox: thunderbird: Improper Keypress Handling in Executable File Confirmation Dialog firefox: thunderbird: Memory safety bugs fixed in Firefox 133, Thunderbird 133, Firefox ESR 128.5, and Thunderbird 128.5
[ "cpe:/a:redhat:rhel_e4s:9.0::appstream" ]
null
8.8
null
null
RHSA-2020:2832
Red Hat Security Advisory: kernel security and bug fix update
kernel: buffer overflow in mwifiex_cmd_append_vsie_tlv function in drivers/net/wireless/marvell/mwifiex/scan.c kernel: heap-based buffer overflow in mwifiex_ret_wmm_get_status function in drivers/net/wireless/marvell/mwifiex/wmm.c Kernel: vfio: access to disabled MMIO space of some devices may lead to DoS scenario
[ "cpe:/o:redhat:rhel_aus:7.3::server", "cpe:/o:redhat:rhel_e4s:7.3::server", "cpe:/o:redhat:rhel_tus:7.3::server" ]
null
5.3
null
null
RHSA-2008:0834
Red Hat Security Advisory: JBoss Enterprise Application Platform 4.2.0CP04 security update
Apache Tomcat's default security policy is too open JBossEAP allows download of non-EJB class files
[ "cpe:/a:redhat:jboss_enterprise_application_platform:4.2.0::el5" ]
null
null
null
null
RHSA-2017:0934
Red Hat Security Advisory: flash-plugin security update
flash-plugin: multiple code execution issues fixed in APSB17-10 flash-plugin: multiple code execution issues fixed in APSB17-10 flash-plugin: multiple code execution issues fixed in APSB17-10 flash-plugin: multiple code execution issues fixed in APSB17-10 flash-plugin: multiple code execution issues fixed in APSB17-10 flash-plugin: multiple code execution issues fixed in APSB17-10 flash-plugin: multiple code execution issues fixed in APSB17-10
[ "cpe:/a:redhat:rhel_extras:6" ]
null
null
8.8
null
RHSA-2010:0623
Red Hat Security Advisory: flash-plugin security update
flash-plugin: multiple security flaws (APSB10-16) flash-plugin: multiple security flaws (APSB10-16) flash-plugin: multiple security flaws (APSB10-16) flash-plugin: multiple security flaws (APSB10-16) flash-plugin: multiple security flaws (APSB10-16)
[ "cpe:/a:redhat:rhel_extras:5::client", "cpe:/a:redhat:rhel_extras:5::server" ]
null
null
null
null
RHSA-2022:7928
Red Hat Security Advisory: device-mapper-multipath security update
device-mapper-multipath: Regression of CVE-2022-41974 fix in Red Hat Enterprise Linux
[ "cpe:/a:redhat:enterprise_linux:8::crb", "cpe:/o:redhat:enterprise_linux:8::baseos" ]
null
8.4
null
null
RHSA-2014:0919
Red Hat Security Advisory: firefox security update
Mozilla: Miscellaneous memory safety hazards (rv:24.7) (MFSA 2014-56) Mozilla: Use-after-free with FireOnStateChange event (MFSA 2014-61) Mozilla: Exploitable WebGL crash with Cesium JavaScript library (MFSA 2014-62) Mozilla: Crash in Skia library when scaling high quality images (MFSA 2014-64)
[ "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::server", "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation", "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
null
null
RHSA-2014:0896
Red Hat Security Advisory: Red Hat JBoss Web Framework Kit 2.6.0 update
bouncycastle: TLS CBC padding timing attack JSF: XSS due to insufficient escaping of user-supplied content in outputText tags and EL expressions
[ "cpe:/a:redhat:jboss_enterprise_web_framework:2.6.0" ]
null
null
null
null