id
stringlengths
13
15
title
stringlengths
29
176
description
stringlengths
8
32.1k
cpes
sequencelengths
0
20
cvss_v4_0
null
cvss_v3_1
float64
0
10
cvss_v3_0
float64
0
10
cvss_v2_0
null
RHSA-2011:1264
Red Hat Security Advisory: gstreamer-plugins security update
libmodplug: multiple vulnerabilities reported in <= 0.8.8.3 libmodplug: multiple vulnerabilities reported in <= 0.8.8.3 libmodplug: multiple vulnerabilities reported in <= 0.8.8.3 libmodplug: multiple vulnerabilities reported in <= 0.8.8.3 libmodplug: multiple vulnerabilities reported in <= 0.8.8.3
[ "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws" ]
null
null
null
null
RHSA-2014:0254
Red Hat Security Advisory: activemq security update
HawtJNI: predictable temporary file name leading to local arbitrary code execution Framework: XML External Entity (XXE) injection flaw Camel: remote code execution via header field manipulation Camel: remote code execution via XSL
[ "cpe:/a:redhat:openshift:1.2::el6" ]
null
null
null
null
RHSA-2022:0499
Red Hat Security Advisory: .NET 5.0 on RHEL 7 security and bugfix update
dotnet: ASP.NET Core Krestel HTTP headers pooling denial of service
[ "cpe:/a:redhat:rhel_dotnet:5.0::el7" ]
null
7.5
null
null
RHSA-2022:0047
Red Hat Security Advisory: Red Hat OpenShift Enterprise Logging security and bug fix update (5.0.11)
log4j-core: DoS in log4j 2.x with Thread Context Map (MDC) input data contains a recursive lookup and context lookup pattern
[ "cpe:/a:redhat:logging:5.0::el8" ]
null
5.9
null
null
RHSA-2014:1281
Red Hat Security Advisory: kernel security and bug fix update
kernel: DoS with syscall auditing
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
null
null
RHSA-2014:1796
Red Hat Security Advisory: Red Hat OpenShift Enterprise 2.2 Release Advisory
OpenShift: /proc/net/tcp information disclosure Enterprise: gears fail to properly isolate network traffic
[ "cpe:/a:redhat:openshift:2.0::el6" ]
null
null
null
null
RHSA-2023:5970
Red Hat Security Advisory: Red Hat OpenStack Platform 17.1.1 (collectd-libpod-stats) security update
golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487) HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack)
[ "cpe:/a:redhat:openstack:17.1::el8" ]
null
7.5
null
null
RHSA-2013:0663
Red Hat Security Advisory: sssd security and bug fix update
sssd: simple access provider flaw prevents intended ACL use when client to an AD provider
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
null
null
RHSA-2020:3654
Red Hat Security Advisory: libcroco security update
libcroco: Stack overflow in function cr_parser_parse_any_core in cr-parser.c
[ "cpe:/a:redhat:enterprise_linux:8::crb", "cpe:/o:redhat:enterprise_linux:8::baseos" ]
null
6.1
null
null
RHSA-2018:0003
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.0.9 security update
RESTEasy: Abuse of GZIPInterceptor in RESTEasy can lead to denial of service attack undertow: HTTP Request smuggling vulnerability (incomplete fix of CVE-2017-2666) resteasy: Vary header not added by CORS filter leading to cache poisoning undertow: improper whitespace parsing leading to potential HTTP request smuggling EAP-7: Wrong privileges on multiple property files jboss: unsafe chown of server.log in jboss init script allows privilege escalation (Incomplete fix for CVE-2016-8656) Solr: Code execution via entity expansion
[ "cpe:/a:redhat:jboss_enterprise_application_platform:7" ]
null
null
9.8
null
RHSA-2021:1243
Red Hat Security Advisory: redhat-ds:11 security and bug fix update
389-ds-base: information disclosure during the binding of a DN
[ "cpe:/a:redhat:directory_server:11.2::el8" ]
null
5.3
null
null
RHBA-2024:0928
Red Hat Bug Fix Advisory: MTV 2.5.5 Images
follow-redirects: Improper Input Validation due to the improper handling of URLs by the url.parse() jsrsasign: vulnerable to Observable Discrepancy via the RSA PKCS1.5 or RSAOAEP decryption process
[ "cpe:/a:redhat:migration_toolkit_virtualization:2.5::el8", "cpe:/a:redhat:migration_toolkit_virtualization:2.5::el9" ]
null
7.5
null
null
RHSA-2018:1929
Red Hat Security Advisory: libvirt security update
libvirt: Incomplete fix for CVE-2018-5748 triggered by QEMU guest agent libvirt: Resource exhaustion via qemuMonitorIORead() method
[ "cpe:/a:redhat:storage:3:server:el6", "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
3.3
null
RHSA-2024:8365
Red Hat Security Advisory: python-idna security update
python-idna: potential DoS via resource consumption via specially crafted inputs to idna.encode()
[ "cpe:/o:redhat:rhel_els:7" ]
null
6.5
null
null
RHSA-2013:1145
Red Hat Security Advisory: Red Hat Enterprise Linux 5.6 Extended Update Support Retirement Notice
This is the final notification for the retirement of Red Hat Enterprise Linux 5.6 Extended Update Support (EUS).
[ "cpe:/o:redhat:rhel_eus:5.6" ]
null
null
null
null
RHSA-2024:4422
Red Hat Security Advisory: fence-agents security update
urllib3: proxy-authorization request header is not stripped during cross-origin redirects
[ "cpe:/a:redhat:enterprise_linux:9::appstream", "cpe:/a:redhat:enterprise_linux:9::highavailability", "cpe:/a:redhat:enterprise_linux:9::resilientstorage" ]
null
4.4
null
null
RHSA-2019:1140
Red Hat Security Advisory: Red Hat Single Sign-On 7.3.1 security update
jackson-databind: Potential information exfiltration with default typing, serialization gadget from MyBatis jackson-databind: improper polymorphic deserialization of types from Jodd-db library jackson-databind: improper polymorphic deserialization of types from Oracle JDBC driver undertow: Infoleak in some circumstances where Undertow can serve data from a random buffer jackson-databind: exfiltration/XXE in some JDK classes jackson-databind: server-side request forgery (SSRF) in axis2-jaxws class wildfly: Race condition on PID file allows for termination of arbitrary processes by local users keycloak: session hijack using the user access token wildfly: wrong SecurityIdentity for EE concurrency threads that are reused
[ "cpe:/a:redhat:jboss_single_sign_on:7.3" ]
null
null
5.4
null
RHSA-2020:0160
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.2.6 on RHEL 7 security update
hibernate-validator: safeHTML validator allows XSS jackson-databind: Serialization gadgets in com.zaxxer.hikari.HikariConfig EAP: Vault system property security attribute value is revealed on CLI 'reload' command undertow: possible Denial Of Service (DOS) in Undertow HTTP server listening on HTTPS jackson-databind: Serialization gadgets in classes of the commons-configuration package jackson-databind: Serialization gadgets in classes of the xalan package jackson-databind: Serialization gadgets in com.zaxxer.hikari.HikariDataSource netty: HTTP request smuggling by mishandled whitespace before the colon in HTTP headers jackson-databind: Serialization gadgets in org.apache.commons.dbcp.datasources.* jackson-databind: Serialization gadgets in com.p6spy.engine.spy.P6DataSource jackson-databind: Serialization gadgets in classes of the ehcache package jackson-databind: Serialization gadgets in org.apache.log4j.receivers.db.*
[ "cpe:/a:redhat:jboss_enterprise_application_platform:7.2::el7" ]
null
null
8.1
null
RHSA-2006:0580
Red Hat Security Advisory: kernel security update
security flaw security flaw security flaw security flaw security flaw security flaw security flaw
[ "cpe:/o:redhat:enterprise_linux:2.1::as", "cpe:/o:redhat:enterprise_linux:2.1::aw" ]
null
null
null
null
RHSA-2020:5608
Red Hat Security Advisory: fapolicyd bug fix update
An update for fapolicyd is now available for Red Hat Enterprise Linux 8.2 Extended Update Support.
[ "cpe:/a:redhat:rhel_eus:8.2::appstream" ]
null
null
null
null
RHSA-2024:1227
Red Hat Security Advisory: openvswitch3.1 security update
openvswsitch: ovs-vswitch fails to recover after malformed geneve metadata packet openvswitch: openvswitch don't match packets on nd_target field
[ "cpe:/o:redhat:enterprise_linux:9::fastdatapath" ]
null
5.5
null
null
RHSA-2005:878
Red Hat Security Advisory: cups security update
security flaw security flaw security flaw security flaw
[ "cpe:/o:redhat:enterprise_linux:3::as", "cpe:/o:redhat:enterprise_linux:3::desktop", "cpe:/o:redhat:enterprise_linux:3::es", "cpe:/o:redhat:enterprise_linux:3::ws", "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws" ]
null
null
null
null
RHSA-2023:3247
Red Hat Security Advisory: git security update
git: by feeding specially crafted input to `git apply --reject`, a path outside the working tree can be overwritten with partially controlled contents git: malicious placement of crafted messages when git was compiled with runtime prefix git: arbitrary configuration injection when renaming or deleting a section from a configuration file
[ "cpe:/a:redhat:rhel_eus:8.6::appstream" ]
null
7.8
null
null
RHSA-2022:7648
Red Hat Security Advisory: grafana-pcp security update
golang: net/http: improper sanitization of Transfer-Encoding header golang: io/fs: stack exhaustion in Glob golang: compress/gzip: stack exhaustion in Reader.Read golang: path/filepath: stack exhaustion in Glob golang: encoding/gob: stack exhaustion in Decoder.Decode golang: net/http/httputil: NewSingleHostReverseProxy - omit X-Forwarded-For not working
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
6.5
null
null
RHSA-2015:2540
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 6.4.5 update
EAP: missing authorization check for Monitor/Deployer/Auditor role when shutting down server apache-commons-collections: InvokerTransformer code execution during deserialisation
[ "cpe:/a:redhat:jboss_enterprise_application_platform:6::el7" ]
null
null
null
null
RHSA-2019:3494
Red Hat Security Advisory: container-tools:1.0 security and bug fix update
containers/image: not enforcing TLS when sending username+password credentials to token servers leading to credential disclosure QEMU: slirp: heap buffer overflow during packet reassembly
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
null
7
null
RHSA-2023:3540
Red Hat Security Advisory: OpenShift Container Platform 4.13.3 bug fix and security update
golang: net/http, net/textproto: denial of service from excessive memory allocation golang: net/http, net/textproto, mime/multipart: denial of service from excessive resource consumption golang: go/parser: Infinite loop in parsing golang: html/template: backticks not treated as string delimiters golang: html/template: improper sanitization of CSS values golang: html/template: improper handling of empty HTML attributes
[ "cpe:/a:redhat:openshift:4.13::el9" ]
null
7.3
null
null
RHSA-2008:0090
Red Hat Security Advisory: icu security update
libicu poor back reference validation libicu incomplete interval handling
[ "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::client_workstation", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
RHSA-2016:0706
Red Hat Security Advisory: mercurial security update
mercurial: command injection via git subrepository urls mercurial: convert extension command injection via git repository names
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
null
null
RHSA-2021:3446
Red Hat Security Advisory: kernel security and bug fix update
kernel: out-of-bounds write due to a heap buffer overflow in __hidinput_change_resolution_multipliers() of hid-input.c kernel: use-after-free in route4_change() in net/sched/cls_route.c kernel: powerpc: KVM guest OS users can cause host OS memory corruption
[ "cpe:/a:redhat:rhel_eus:8.2::crb", "cpe:/o:redhat:rhel_eus:8.2::baseos" ]
null
7.8
null
null
RHSA-2024:9481
Red Hat Security Advisory: Red Hat OpenStack Platform 18.0.3 (python-django) security update
python-django: Potential denial-of-service in django.utils.html.urlize() python-django: Username enumeration through timing difference for users with unusable passwords python-django: Potential directory-traversal in django.core.files.storage.Storage.save() python-django: Potential denial-of-service in django.utils.translation.get_supported_language_variant()
[ "cpe:/a:redhat:openstack:18.0::el9" ]
null
5.3
null
null
RHSA-2020:1332
Red Hat Security Advisory: ksh security update
ksh: certain environment variables interpreted as arithmetic expressions on startup, leading to code injection
[ "cpe:/o:redhat:rhel_eus:7.5::computenode", "cpe:/o:redhat:rhel_eus:7.5::server" ]
null
7.4
null
null
RHSA-2025:2615
Red Hat Security Advisory: java-1.8.0-ibm security update
openjdk: Enhance array handling (Oracle CPU 2025-01)
[ "cpe:/a:redhat:enterprise_linux:8::supplementary" ]
null
4.8
null
null
RHSA-2021:4875
Red Hat Security Advisory: kernel-rt security and bug fix update
kernel: use-after-free in drivers/infiniband/core/ucma.c ctx use-after-free kernel: timer tree corruption leads to missing wakeup and system freeze
[ "cpe:/a:redhat:rhel_eus:8.2::nfv", "cpe:/a:redhat:rhel_eus:8.2::realtime" ]
null
4.4
null
null
RHSA-2023:0630
Red Hat Security Advisory: Red Hat Advanced Cluster Management 2.7.0 security and bug fix updates
nodejs-minimatch: ReDoS via the braceExpand function golang: crypto/tls: session tickets lack random ticket_age_add crewjam/saml: Authentication bypass when processing SAML responses containing multiple Assertion elements luxon: Inefficient regular expression complexity in luxon.js
[ "cpe:/a:redhat:acm:2.7::el8" ]
null
7.5
null
null
RHSA-2020:4945
Red Hat Security Advisory: thunderbird security update
Mozilla: Memory safety bugs fixed in Firefox 82 and Firefox ESR 78.4 chromium-browser: Use after free in WebRTC
[ "cpe:/a:redhat:rhel_eus:8.1::appstream" ]
null
8.8
null
null
RHSA-2018:1448
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 6.4.20 security update
Artemis: Deserialization of untrusted input vulnerability solr: Directory traversal via Index Replication HTTP API jackson-databind: Unsafe deserialization due to incomplete black list (incomplete fix for CVE-2017-7525) jackson-databind: Unsafe deserialization due to incomplete black list (incomplete fix for CVE-2017-15095) tomcat: Incorrect handling of empty string URL in security constraints can lead to unintended exposure of resources jackson-databind: incomplete fix for CVE-2017-7525 permits unsafe serialization via c3p0 libraries slf4j: Deserialisation vulnerability in EventData constructor can allow for arbitrary code execution
[ "cpe:/a:redhat:jboss_enterprise_application_platform:6::el7" ]
null
null
8.1
null
RHSA-2020:2814
Red Hat Security Advisory: RH-SSO 7.4.1 adapters for Red Hat JBoss Enterprise Application Platform 7
keycloak: Lack of checks in ObjectInputStream leading to Remote Code Execution
[ "cpe:/a:redhat:jboss_enterprise_application_platform:7.3::el6", "cpe:/a:redhat:jboss_enterprise_application_platform:7.3::el7", "cpe:/a:redhat:jboss_enterprise_application_platform:7.3::el8" ]
null
null
7.5
null
RHSA-2020:4245
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.3.3 security update on RHEL 8
cxf: JMX integration is vulnerable to a MITM attack picketbox: JBoss EAP reload to admin-only mode allows authentication bypass wildfly: XML validation manipulation due to incomplete application of use-grammar-pool-only in xercesImpl xnio: file descriptor leak caused by growing amounts of NIO Selector file handles may lead to DoS
[ "cpe:/a:redhat:jboss_enterprise_application_platform:7.3::el8" ]
null
5.9
null
null
RHSA-2017:0882
Red Hat Security Advisory: v8 security update
V8: integer overflow leading to buffer overflow in Zone::New
[ "cpe:/a:redhat:openstack:10::el7" ]
null
null
5.6
null
RHSA-2025:3894
Red Hat Security Advisory: kernel-rt security update
kernel: ALSA: usb-audio: Fix out of bounds reads when finding clock sources kernel: xen: Xen hypercall page unsafe against speculative attacks (Xen Security Advisory 466)
[ "cpe:/a:redhat:enterprise_linux:8::nfv", "cpe:/a:redhat:enterprise_linux:8::realtime" ]
null
5.7
null
null
RHSA-2012:0568
Red Hat Security Advisory: php security update
php: command line arguments injection when run in CGI mode (VU#520827)
[ "cpe:/o:redhat:rhel_eus:5.6", "cpe:/o:redhat:rhel_eus:6.0", "cpe:/o:redhat:rhel_eus:6.1", "cpe:/o:redhat:rhel_mission_critical:5.3" ]
null
null
null
null
RHSA-2024:0477
Red Hat Security Advisory: frr security update
ffr: Flowspec overflow in bgpd/bgp_flowspec.c ffr: Out of bounds read in bgpd/bgp_label.c frr: crash from specially crafted MP_UNREACH_NLRI-containing BGP UPDATE message frr: crash from malformed EOR-containing BGP UPDATE message
[ "cpe:/a:redhat:enterprise_linux:9::appstream" ]
null
7.5
null
null
RHSA-2024:1574
Red Hat Security Advisory: OpenShift Container Platform 4.12.54 packages and security update
golang-fips/openssl: Memory leaks in code encrypting and decrypting RSA payloads golang-protobuf: encoding/protojson, internal/encoding/json: infinite loop in protojson.Unmarshal when unmarshaling certain forms of invalid JSON jose-go: improper handling of highly compressed data
[ "cpe:/a:redhat:openshift:4.12::el8", "cpe:/a:redhat:openshift:4.12::el9" ]
null
4.3
null
null
RHSA-2021:2304
Red Hat Security Advisory: microcode_ctl security, bug fix and enhancement update
hw: vt-d related privilege escalation hw: improper isolation of shared resources in some Intel Processors hw: observable timing discrepancy in some Intel Processors hw: information disclosure on some Intel Atom processors
[ "cpe:/o:redhat:rhel_eus:7.7::computenode", "cpe:/o:redhat:rhel_eus:7.7::server" ]
null
5.6
null
null
RHSA-2025:3935
Red Hat Security Advisory: kernel security update
kernel: asix: fix uninit-value in asix_mdio_read() kernel: virtio-blk: fix implicit overflow on virtio_max_dma_size kernel: bonding: stop the device in bond_setup_by_slave() kernel: tcp: make sure init the accept_queue&#39;s spinlocks once kernel: wifi: mac80211: fix race condition on enabling fast-xmit kernel: wifi: brcm80211: handle pmk_op allocation failure kernel: netfilter: nf_tables: reject new basechain after table flag update kernel: wifi: ath11k: decrease MHI channel buffer length to 8KB kernel: igb: Fix string truncation warnings in igb_set_fw_version kernel: ipv6: fib6_rules: avoid possible NULL dereference in fib6_rule_action() kernel: nfs: Handle error of rpc_proc_register() in nfs_net_init(). kernel: irqchip/gic-v4: Don't allow a VMOVP on a dying VPE kernel: ALSA: usb-audio: Fix out of bounds reads when finding clock sources
[ "cpe:/a:redhat:rhel_eus:9.4::appstream", "cpe:/a:redhat:rhel_eus:9.4::crb", "cpe:/a:redhat:rhel_eus:9.4::nfv", "cpe:/a:redhat:rhel_eus:9.4::realtime", "cpe:/o:redhat:rhel_eus:9.4::baseos" ]
null
7.1
null
null
RHSA-2014:0376
Red Hat Security Advisory: openssl security update
openssl: information disclosure in handling of TLS heartbeat extension packets
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
null
null
RHSA-2023:0318
Red Hat Security Advisory: postgresql-jdbc security update
postgresql: SQL Injection in ResultSet.refreshRow() with malicious column names
[ "cpe:/a:redhat:enterprise_linux:9::appstream" ]
null
8
null
null
RHSA-2019:0364
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.1.6 on RHEL 6 security update
wildfly-core: Cross-site scripting (XSS) in JBoss Management Console undertow: Infoleak in some circumstances where Undertow can serve data from a random buffer dom4j: XML Injection in Class: Element. Methods: addElement, addAttribute which can impact the integrity of XML documents
[ "cpe:/a:redhat:jboss_enterprise_application_platform:7::el6" ]
null
null
5.3
null
RHSA-2020:2663
Red Hat Security Advisory: ntp security update
ntp: DoS on client ntpd using server mode packet ntp: ntpd using highly predictable transmit timestamps could result in time change or DoS
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
7.4
3.7
null
RHSA-2015:1894
Red Hat Security Advisory: python-django security update
python-django: Denial-of-service possibility in logout() view by filling session store python-django: Denial-of-service possibility in logout() view by filling session store
[ "cpe:/a:redhat:openstack:6::el7" ]
null
null
null
null
RHSA-2022:6318
Red Hat Security Advisory: OpenShift Container Platform 4.9.48 extras security update
golang: out-of-bounds read in golang.org/x/text/language leads to DoS
[ "cpe:/a:redhat:openshift:4.9::el8" ]
null
7.5
null
null
RHSA-2016:0441
Red Hat Security Advisory: openstack-heat bug fix and security advisory
openstack-heat: Vulnerability in Heat template validation leading to DoS
[ "cpe:/a:redhat:openstack:5::el7" ]
null
null
null
null
RHSA-2014:1019
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 6.3.0 update
httpd: mod_deflate denial of service netty: DoS via memory exhaustion during data aggregation httpd: mod_status heap-based buffer overflow Tomcat/JBossWeb: request smuggling and limited DoS in ChunkedInputFilter httpd: mod_cgid denial of service WS: Incomplete fix for CVE-2013-2133 Security: Invalid EJB caller role check implementation
[ "cpe:/a:redhat:jboss_enterprise_application_platform:6::el5" ]
null
null
null
null
RHSA-2020:5235
Red Hat Security Advisory: thunderbird security update
Mozilla: Variable time processing of cross-origin images during drawImage calls Mozilla: Parsing mismatches could confuse and bypass security sanitizer for chrome privileged code Mozilla: Fullscreen could be enabled without displaying the security UI Mozilla: XSS through paste (manual and clipboard API) Mozilla: Requests intercepted through ServiceWorkers lacked MIME type restrictions Mozilla: Use-after-free in WebRequestService Mozilla: Potential use-after-free in uses of nsTArray Mozilla: DoH did not filter IPv4 mapped IP Addresses Mozilla: Software keyboards may have remembered typed passwords Mozilla: Memory safety bugs fixed in Firefox 83 and Firefox ESR 78.5
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
8.8
6.1
null
RHSA-2024:6816
Red Hat Security Advisory: thunderbird security update
mozilla: Type Confusion in Async Generators in Javascript Engine mozilla: Type confusion when looking up a property name in a &quot;with&quot; block mozilla: Internal event interfaces were exposed to web content when browser EventHandler listener callbacks ran mozilla: Garbage collection could mis-color cross-compartment objects in OOM conditions mozilla: WASM type confusion involving ArrayTypes mozilla: SelectElements could be shown over another site if popups are allowed mozilla: Memory safety bugs fixed in Firefox 130, Firefox ESR 128.2, and Thunderbird 128.2 thunderbird: Crash when aborting verification of OTR chat
[ "cpe:/a:redhat:rhel_tus:8.6::appstream" ]
null
6.5
null
null
RHSA-2015:2665
Red Hat Security Advisory: chromium-browser security update
chromium-browser: Fixes from internal audits and fuzzing chromium-browser: Use-After-free in MidiHost
[ "cpe:/a:redhat:rhel_extras:6" ]
null
null
null
null
RHSA-2007:0157
Red Hat Security Advisory: xorg-x11-apps and libX11 security update
XGetPixel() integer overflow
[ "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::client_workstation", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
RHSA-2024:3754
Red Hat Security Advisory: ipa security update
freeipa: delegation rules allow a proxy service to impersonate any user to access another target service freeipa: user can obtain a hash of the passwords of all domain users and perform offline brute force
[ "cpe:/a:redhat:enterprise_linux:9::appstream", "cpe:/a:redhat:enterprise_linux:9::crb" ]
null
8.1
null
null
RHSA-2019:3964
Red Hat Security Advisory: python-jinja2 security update
python-jinja2: Sandbox escape due to information disclosure via str.format
[ "cpe:/o:redhat:rhel_eus:7.5::computenode", "cpe:/o:redhat:rhel_eus:7.5::server" ]
null
null
9
null
RHSA-2013:1455
Red Hat Security Advisory: Red Hat Network Satellite server IBM Java Runtime security update
JDK: unspecified vulnerabilities fixed in 6u26 (Sound) JDK: unspecified vulnerabilities fixed in 6u26 (Sound) OpenJDK: integer overflows in JPEGImageReader and font SunLayoutEngine (2D, 7013519) JDK: unspecified vulnerability fixed in 6u26 (Deployment) OpenJDK: Deserialization allows creation of mutable SignedObject (Deserialization, 6618658) OpenJDK: NetworkInterface information leak (Networking, 7013969) OpenJDK: incorrect numeric type conversion in TransformHelper (2D, 7016495) OpenJDK: unprivileged proxy settings change via SOAPConnection (SAAJ, 7013971) OpenJDK: MediaTracker created Component instances with unnecessary privileges (Swing, 7020198) JDK: unspecified vulnerability fixed in 6u26 (2D) HTTPS: block-wise chosen-plaintext attack against SSL/TLS (BEAST) JDK: unspecified vulnerability fixed in 6u29 (Deployment) OpenJDK: IIOP deserialization code execution (Deserialization, 7055902) OpenJDK: missing SecurityManager checks in scripting engine (Scripting, 7046823) JDK: unspecified vulnerability fixed in 6u29 (Sound) JDK: unspecified vulnerability fixed in 6u29 (Deployment) OpenJDK: InputStream skip() information leak (Networking/IO, 7000600) OpenJDK: mutable static AWTKeyStroke.ctor (AWT, 7019773) JDK: unspecified vulnerability fixed in 6u29 (Swing) JDK: unspecified vulnerability fixed in 6u29 (AWT) OpenJDK: Java2D TransformHelper integer overflow (2D, 7023640) OpenJDK: excessive default UDP socket limit under SecurityManager (Networking, 7032417) OpenJDK: JAX-WS stack-traces information leak (JAX-WS, 7046794) OpenJDK: insufficient pack200 JAR files uncompress error checks (Runtime, 7057857) OpenJDK: RMI DGC server remote code execution (RMI, 7077466) OpenJDK: RMI registry privileged code execution (RMI, 7083012) OpenJDK: missing checkSetFactory calls in HttpsURLConnection (JSSE, 7096936) JDK: unspecified vulnerability fixed in 6u29 (Deployment) OpenJDK: JavaSound incorrect bounds check (Sound, 7088367) GlassFish: hash table collisions CPU usage DoS (oCERT-2011-003) OpenJDK: insufficient checking of the graphics rendering object (2D, 7112642) JDK: unspecified vulnerability fixed in 6u31 and 7u3 (2D) JDK: unspecified vulnerability fixed in 6u31 and 7u3 (2D) JDK: unspecified vulnerability fixed in 6u31 and 7u3 (Deployment) OpenJDK: off-by-one bug in ZIP reading code (JRE, 7118283) OpenJDK: KeyboardFocusManager focus stealing (AWT, 7110683) OpenJDK: unrestricted use of TimeZone.setDefault() (i18n, 7110687) OpenJDK: incomplete info in the deserialization exception (Serialization, 7110700) OpenJDK: mutable repository identifiers (CORBA, 7110704) OpenJDK: AtomicReferenceArray insufficient array type check (Concurrency, 7082299) OpenJDK: AWT hardening fixes (AWT, 7163201) JDK: unspecified vulnerability fixed in 6u33 and 7u5 (Deployment) JDK: unspecified vulnerability (2D) JDK: unspecified vulnerability (Deployment) JDK: unspecified vulnerability (Deployment) JDK: unspecified vulnerability fixed in 6u39 and 7u13 (Deployment) OpenJDK: beans ClassFinder insufficient permission checks (beans, 7162476) OpenJDK: fontmanager layout lookup code memory corruption (2D, 7143617) OpenJDK: SynthLookAndFeel application context bypass (Swing, 7143614) OpenJDK: insecure temporary file permissions (JRE, 7143606) OpenJDK: CRL and certificate extensions handling improvements (Security, 7143872) OpenJDK: mutable repository identifiers in generated stub code (CORBA, 7143851) JDK: unspecified vulnerability fixed in 6u33 and 7u5 (Deployment) JDK: unspecified vulnerability fixed in 6u33 and 7u5 (Deployment) OpenJDK: insufficient invokespecial <init> verification (HotSpot, 7160757) JDK: unspecified vulnerability (JMX) JDK: unspecified vulnerability (Deployment) JDK: unspecified vulnerability fixed in 6u39 and 7u13 (Scripting) OpenJDK: java.io.FilePermission information leak (Libraries, 6631398) JDK: unspecified vulnerability fixed in 6u39 and 7u13 (Deployment) JDK: java.lang.reflect.Method invoke() code execution JDK: java.lang.class code execution JDK: java.lang.ClassLoder defineClass() code execution OpenJDK: RhinoScriptEngine security bypass (Scripting, 7143535) OpenJDK: Executors state handling issues (Concurrency, 7189103) OpenJDK: DescriptorSupport insufficient package access checks (JMX, 7192975) OpenJDK: AccessController.doPrivilegedWithCombiner() information disclosure (Security, 7172522) OpenJDK: LogManager security bypass (Libraries, 7169884) OpenJDK: RMIConnectionImpl information disclosure (JMX, 7169888) OpenJDK: ServiceLoader reject not subtype classes without instantiating (Libraries, 7195919) OpenJDK: JSSE denial of service (JSSE, 7186286) JDK: unspecified vulnerability (2D) OpenJDK: DefaultFormatter insufficient data validation (Swing, 7195194) OpenJDK: RMIConnectionImpl insufficient access control checks (JMX, 7198296) SSL/TLS: CBC padding timing attack (lucky-13) JDK: unspecified vulnerability fixed in 6u39 and 7u13 (Deployment) OpenJDK: sun.awt.datatransfer.ClassLoaderObjectInputStream class may incorrectly invoke the system class loader (CanSecWest 2013, AWT, 8009305) JDK: unspecified vulnerability fixed in 6u39 and 7u13 (JMX) JDK: unspecified vulnerability fixed in 6u39 and 7u13 (Deployment) JDK: unspecified vulnerability fixed in 6u39 and 7u13 (Deployment) OpenJDK: RMI CGIHandler XSS issue (RMI, 6563318) OpenJDK: logging insufficient access control checks (Libraries, 6664509) OpenJDK: logging insufficient access control checks (Libraries, 6664528) OpenJDK: invalid threads subject to interrupts (Libraries, 6776941) OpenJDK: reflection API incorrect checks for proxy classes (Libraries, 7197546, SE-2012-01 Issue 29) OpenJDK: insufficient clipboard access premission checks (AWT, 7186952) OpenJDK: InetSocketAddress serialization issue (Networking, 7201071) OpenJDK: loadPropertyFile missing restrictions (JAXP, 8001235) OpenJDK: com.sun.xml.internal.* not restricted packages (JAX-WS, 7201068) JDK: unspecified vulnerability fixed in 6u39 and 7u13 (Deployment) OpenJDK: CPU consumption DoS via repeated SSL ClientHello packets (JSSE, 7192393) OpenJDK: missing serialization restriction (CORBA, 7201066) OpenJDK: insufficient privilege checking issue (AWT, 7192977) OpenJDK: insufficient Diffie-Hellman public key checks (JSSE, 7192392) OpenJDK: insufficient privilege checking issue (AWT, 8001057) JDK: unspecified vulnerability fixed in 6u39 and 7u13 (Deployment) OpenJDK: RequiredModelMBean missing access control context checks (JMX, 8000537) OpenJDK: Specially crafted sample model integer overflow (2D, 8007014) JDK: unspecified vulnerability fixed in 6u39 and 7u13 (Deployment) OpenJDK: missing ValueHandlerImpl class constructor access restriction (CORBA, 8000631) OpenJDK: image parser insufficient raster parameter checks (2D, 8001972) OpenJDK: image parser insufficient raster parameter checks (AWT, 8002325) JDK: unspecified vulnerability fixed in 6u39 (Sound) OpenJDK: MBeanServer insufficient privilege restrictions (JMX, 8006446) JDK: unspecified vulnerability fixed in 6u41 and 7u15 (Deployment) JDK: unspecified sanbox bypass (CanSecWest 2013, 2D) OpenJDK: CMM malformed raster memory corruption (2D, 8007675) OpenJDK: Insecure shared memory permissions (2D, 8001034) OpenJDK: remote code loading enabled by default (RMI, 8001040) JDK: unspecified vulnerability fixed in 7u21 and 6u45 (Deployment) OpenJDK: LogStream.setDefaultStream() missing security restrictions (RMI, 8001329) JDK: unspecified vulnerability fixed in 7u21 and 6u45 (Install) ICU: Layout Engine font layout and glyph table errors (JDK 2D, 8004994) OpenJDK: Frame injection in generated HTML (Javadoc, 8012375) ICU: Layout Engine font layout and glyph table errors (JDK 2D, 8004986) ICU: Layout Engine font layout and glyph table errors (JDK 2D, 8004987) JDK: unspecified vulnerability fixed in 7u21 and 6u45 (2D) OpenJDK: Integrate Apache Santuario, rework class loader (Libraries, 6741606, 8008744) OpenJDK: JConsole SSL support (Serviceability, 8003703) OpenJDK: Network InetAddress serialization information disclosure (Networking, 8000724) JDK: unspecified vulnerability fixed in 7u21 and 6u45 (Deployment) ICU: Layout Engine font processing errors (JDK 2D, 8001031) OpenJDK: image processing vulnerability (2D, 8007617) OpenJDK: MethodUtil trampoline class incorrect restrictions (Libraries, 8009857) OpenJDK: MBeanInstantiator insufficient class access checks (JMX, 8006435) OpenJDK: JPEGImageWriter state corruption (ImageIO, 8007918) OpenJDK: JPEGImageReader state corruption (ImageIO, 8007667) JDK: unspecified vulnerability fixed in 7u21 and 6u45 (2D) JDK: unspecified vulnerability fixed in 7u21 and 6u45 (Deployment) JDK: unspecified vulnerability fixed in 7u21 and 6u45 (Deployment) JDK: unspecified vulnerability fixed in 7u25 (Deployment) JDK: unspecified vulnerability fixed in 7u21 and 6u45 (Deployment) JDK: unspecified vulnerability fixed in 7u25 (Deployment) OpenJDK: AccessControlContext check order issue (Libraries, 8001330) OpenJDK: Resource denial of service (AWT, 8001038) OpenJDK: output stream access restrictions (CORBA, 8000642) OpenJDK: Prevent revealing the local address (Networking, 8001318) OpenJDK: Better access restrictions (Sound, 8006328) OpenJDK: ObjectStreamClass circular reference denial of service (Serialization, 8000638) OpenJDK: exclusive port binding (Networking, 7170730) OpenJDK: Unique VMIDs (Libraries, 8001033) OpenJDK: MBeanServer Introspector package access (JMX, 8008124) OpenJDK: SerialJavaObject package restriction (JDBC, 8009554) OpenJDK: getEnclosing* checks (Libraries, 8007812) OpenJDK: ObjectOutputStream access checks (Serialization, 8008132) OpenJDK: Proper class checking (JMX, 8008120) OpenJDK: Various AWT integer overflow checks (AWT, 8009071) OpenJDK: Incorrect image attribute verification (2D, 8012438) JDK: unspecified vulnerability fixed in 7u25 (2D) OpenJDK: Incorrect image channel verification (2D, 8012597) JDK: unspecified vulnerability fixed in 7u25 (Deployment) JDK: unspecified vulnerability fixed in 7u25 (Deployment) OpenJDK: Incorrect image layout verification (2D, 8012601) OpenJDK: ImagingLib byte lookup processing (2D, 8011243) OpenJDK: Incorrect IntegerComponentRaster size checks (2D, 8011248) OpenJDK: Incorrect ShortBandedRaster size checks (2D, 8011253) OpenJDK: Incorrect ByteBandedRaster size checks (2D, 8011257) JDK: unspecified vulnerability fixed in 6u51 and 5u51 (AWT)
[ "cpe:/a:redhat:network_satellite:5.4::el5", "cpe:/a:redhat:network_satellite:5.4::el6" ]
null
null
null
null
RHSA-2024:0386
Red Hat Security Advisory: kpatch-patch security update
kernel: net/sched: sch_hfsc UAF kernel: use after free in nvmet_tcp_free_crypto in NVMe kernel: IGB driver inadequate buffer size for frames larger than MTU
[ "cpe:/o:redhat:rhel_eus:9.0::baseos" ]
null
7.5
null
null
RHSA-2022:0237
Red Hat Security Advisory: Red Hat OpenStack Platform 16.2 (etcd) security update
golang: net: incorrect parsing of extraneous zero characters at the beginning of an IP address octet golang: crypto/tls: certificate of wrong type is causing TLS client to panic golang: net/http: limit growth of header canonicalization cache
[ "cpe:/a:redhat:openstack:16.2::el8" ]
null
7.5
null
null
RHSA-2016:2055
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 6.4.10 natives update on RHEL 6
httpd: HTTP request smuggling attack against chunked request parser mod_cluster: remotely Segfault Apache http server mod_cluster: Buffer overflow in mod_manager when sending request with long JVMRoute
[ "cpe:/a:redhat:jboss_enterprise_application_platform:6::el6" ]
null
null
4.8
null
RHSA-2012:0100
Red Hat Security Advisory: MRG Grid security, bug fix, and enhancement update
Condor: Multiple format string flaws
[ "cpe:/a:redhat:enterprise_mrg:2::el5" ]
null
null
null
null
RHSA-2022:5526
Red Hat Security Advisory: squid:4 security update
squid: DoS when processing gopher server responses
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
7.5
null
null
RHSA-2004:051
Red Hat Security Advisory: : Updated mutt packages fix remotely-triggerable crash
security flaw
[ "cpe:/o:redhat:linux:9" ]
null
null
null
null
RHBA-2023:5988
Red Hat Bug Fix Advisory: Updated rhel9/firefox-flatpak container image
libwebp: Heap buffer overflow in WebP Codec
[ "cpe:/a:redhat:enterprise_linux:9::appstream" ]
null
9.6
null
null
RHSA-2023:2166
Red Hat Security Advisory: freeradius security and bug fix update
freeradius: Information leakage in EAP-PWD freeradius: Crash on unknown option in EAP-SIM freeradius: Crash on invalid abinary data
[ "cpe:/a:redhat:enterprise_linux:9::appstream", "cpe:/a:redhat:enterprise_linux:9::crb" ]
null
7.5
null
null
RHSA-2024:5858
Red Hat Security Advisory: kpatch-patch-5_14_0-70_85_1 security update
kernel: TIPC message reassembly use-after-free remote code execution vulnerability kernel: net: kernel: UAF in network route management kernel: virtio-net: tap: mlx5_core short frame denial of service kernel: virtio-net: tun: mlx5_core short frame denial of service
[ "cpe:/o:redhat:rhel_e4s:9.0::baseos" ]
null
7.1
null
null
RHSA-2022:6838
Red Hat Security Advisory: expat security update
expat: a use-after-free in the doContent function in xmlparse.c
[ "cpe:/a:redhat:enterprise_linux:9::appstream", "cpe:/o:redhat:enterprise_linux:9::baseos" ]
null
8.1
null
null
RHSA-2017:2860
Red Hat Security Advisory: postgresql security update
postgresql: Empty password accepted in some authentication methods
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
5.6
null
RHSA-2019:2947
Red Hat Security Advisory: Red Hat Enterprise Linux 5.9 Advanced Mission Critical (AMC) Six-Month Notice
This is the Six-Month notification for the retirement of Red Hat Enterprise Linux 5.9 Advanced Mission Critical (AMC). This notification applies only to those customers subscribed to the Advanced Mission Critical (AMC) channel for Red Hat Enterprise Linux 5.9.
[ "cpe:/o:redhat:rhel_aus:5.9" ]
null
null
null
null
RHSA-2022:6176
Red Hat Security Advisory: firefox security update
Mozilla: Address bar spoofing via XSLT error handling Mozilla: Cross-origin XSLT Documents would have inherited the parent's permissions Mozilla: Data race and potential use-after-free in PK11_ChangePW Mozilla: Memory safety bugs fixed in Firefox 104 and Firefox ESR 102.2 Mozilla: Memory safety bugs fixed in Firefox 104, Firefox ESR 102.2, and Firefox ESR 91.13
[ "cpe:/a:redhat:rhel_eus:8.4::appstream" ]
null
8.8
7.5
null
RHSA-2015:2524
Red Hat Security Advisory: Red Hat JBoss Operations Network 3.3.4 security update
apache-commons-collections: InvokerTransformer code execution during deserialisation
[ "cpe:/a:redhat:jboss_operations_network:3.3" ]
null
null
null
null
RHSA-2018:1660
Red Hat Security Advisory: qemu-kvm security update
hw: cpu: speculative store bypass
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
5.6
null
RHSA-2024:4559
Red Hat Security Advisory: nodejs security update
nodejs: using the fetch() function to retrieve content from an untrusted URL leads to denial of service c-ares: Out of bounds read in ares__read_line() nodejs: HTTP Request Smuggling via Content Length Obfuscation
[ "cpe:/a:redhat:rhel_eus:9.2::appstream" ]
null
6.1
null
null
RHSA-2021:1563
Red Hat Security Advisory: OpenShift Container Platform 4.7.12 extras and security update
gogo/protobuf: plugin/unmarshal/unmarshal.go lacks certain index validation
[ "cpe:/a:redhat:openshift:4.7::el8" ]
null
8.6
null
null
RHSA-2024:9185
Red Hat Security Advisory: iperf3 security update
iperf3: possible denial of service iperf3: vulnerable to marvin attack if the authentication option is used
[ "cpe:/a:redhat:enterprise_linux:9::appstream" ]
null
5.9
null
null
RHSA-2011:0279
Red Hat Security Advisory: Red Hat Enterprise Linux Extended Update Support 4.7 6-Month EOL Notice
This is the 6-month notification of the End Of Life plans for Red Hat Enterprise Linux Extended Update Support Add-On (EUS) 4.7.
[ "cpe:/o:redhat:rhel_eus:4.7::as", "cpe:/o:redhat:rhel_eus:4.7::es" ]
null
null
null
null
RHSA-2009:1287
Red Hat Security Advisory: openssh security, bug fix, and enhancement update
OpenSSH: Plaintext Recovery Attack against CBC ciphers
[ "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
RHSA-2022:1991
Red Hat Security Advisory: cpio security update
cpio: integer overflow in ds_fgetstr() in dstring.c can lead to an out-of-bounds write via a crafted pattern file
[ "cpe:/o:redhat:enterprise_linux:8::baseos" ]
null
7
null
null
RHSA-2024:1234
Red Hat Security Advisory: openvswitch2.17 security update
openvswsitch: ovs-vswitch fails to recover after malformed geneve metadata packet openvswitch: openvswitch don't match packets on nd_target field
[ "cpe:/o:redhat:enterprise_linux:8::fastdatapath" ]
null
5.5
null
null
RHSA-2018:1809
Red Hat Security Advisory: Red Hat OpenShift Application Runtimes Spring Boot security and bug fix update
spring-framework: ReDoS Attack with spring-messaging spring-data-commons: XXE with Spring Data’s XMLBeam integration spring-security-oauth: remote code execution in the authorization process
[ "cpe:/a:redhat:openshift_application_runtimes:1.0" ]
null
null
6.3
null
RHSA-2021:3723
Red Hat Security Advisory: samba security, bug fix and enhancement update
samba: Netlogon elevation of privilege vulnerability (Zerologon) samba: Missing handle permissions check in SMB1/2/3 ChangeNotify samba: Unprivileged user can crash winbind samba: Negative idmap cache entries can cause incorrect group entries in the Samba file server process token
[ "cpe:/a:redhat:storage:3.5:samba:el7" ]
null
6.8
null
null
RHSA-2021:3903
Red Hat Security Advisory: curl security update
curl: Content not matching hash in Metalink is not being discarded curl: Metalink download sends credentials
[ "cpe:/o:redhat:rhel_eus:8.2::baseos" ]
null
5.7
null
null
RHSA-2023:0198
Red Hat Security Advisory: java-11-openjdk security update
OpenJDK: handshake DoS attack against DTLS connections (JSSE, 8287411) OpenJDK: soundbank URL remote loading (Sound, 8293742)
[ "cpe:/a:redhat:rhel_eus:8.4::appstream", "cpe:/a:redhat:rhel_eus:8.4::crb" ]
null
3.7
null
null
RHSA-2023:2802
Red Hat Security Advisory: container-tools:4.0 security and bug fix update
golang: net/http: improper sanitization of Transfer-Encoding header golang: go/parser: stack exhaustion in all Parse* functions podman: possible information disclosure and modification golang: net/http: handle server errors after sending GOAWAY golang: encoding/xml: stack exhaustion in Decoder.Skip golang: io/fs: stack exhaustion in Glob golang: compress/gzip: stack exhaustion in Reader.Read golang: path/filepath: stack exhaustion in Glob golang: encoding/xml: stack exhaustion in Unmarshal golang: encoding/gob: stack exhaustion in Decoder.Decode golang: net/http/httputil: NewSingleHostReverseProxy - omit X-Forwarded-For not working golang: math/big: decoding big.Float and big.Rat types can panic if the encoded message is too short, potentially allowing a denial of service golang: net/http: excessive memory growth in a Go server accepting HTTP/2 requests podman: symlink exchange attack in podman export volume
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
6.8
null
null
RHSA-2013:1060
Red Hat Security Advisory: java-1.7.0-ibm security update
OpenJDK: Insecure shared memory permissions (2D, 8001034) OpenJDK: Frame injection in generated HTML (Javadoc, 8012375) JDK: unspecified vulnerability fixed in 7u25 (Deployment) OpenJDK: Integrate Apache Santuario, rework class loader (Libraries, 6741606, 8008744) OpenJDK: JConsole SSL support (Serviceability, 8003703) JDK: unspecified vulnerability fixed in 7u25 (Deployment) JDK: unspecified vulnerability fixed in 7u25 (Deployment) OpenJDK: Resource denial of service (AWT, 8001038) OpenJDK: output stream access restrictions (CORBA, 8000642) OpenJDK: Prevent revealing the local address (Networking, 8001318) OpenJDK: Better access restrictions (Sound, 8006328) OpenJDK: GnomeFileTypeDetector path access check (Libraries, 8004288) OpenJDK: ObjectStreamClass circular reference denial of service (Serialization, 8000638) OpenJDK: exclusive port binding (Networking, 7170730) OpenJDK: Unique VMIDs (Libraries, 8001033) OpenJDK: MBeanServer Introspector package access (JMX, 8008124) OpenJDK: SerialJavaObject package restriction (JDBC, 8009554) OpenJDK: getEnclosing* checks (Libraries, 8007812) OpenJDK: ObjectOutputStream access checks (Serialization, 8008132) OpenJDK: Proper class checking (JMX, 8008120) OpenJDK: Method handles (Libraries, 8009424) OpenJDK: Various AWT integer overflow checks (AWT, 8009071) OpenJDK: tracing insufficient access checks (Serviceability, 8010209) JDK: unspecified vulnerability fixed in 7u25 (Deployment) OpenJDK: Incorrect image attribute verification (2D, 8012438) JDK: unspecified vulnerability fixed in 7u25 (2D) OpenJDK: Incorrect image channel verification (2D, 8012597) JDK: unspecified vulnerability fixed in 7u25 (Deployment) JDK: unspecified vulnerability fixed in 7u25 (Deployment) OpenJDK: Incorrect image layout verification (2D, 8012601) OpenJDK: ImagingLib byte lookup processing (2D, 8011243) OpenJDK: Incorrect IntegerComponentRaster size checks (2D, 8011248) OpenJDK: Incorrect ShortBandedRaster size checks (2D, 8011253) OpenJDK: Incorrect ByteBandedRaster size checks (2D, 8011257) JDK: Unspecified security fixes (July 2013) JDK: Unspecified security fixes (July 2013) JDK: Unspecified security fixes (July 2013) JDK: Unspecified security fixes (July 2013) JDK: Unspecified security fixes (July 2013) JDK: Unspecified security fixes (July 2013) JDK: Unspecified security fixes (July 2013) JDK: unspecified vulnerability fixed in 7u25 (Deployment) OpenJDK: XML parsing Denial of Service (JAXP, 8017298)
[ "cpe:/a:redhat:rhel_extras:5::server", "cpe:/a:redhat:rhel_extras:6" ]
null
null
null
null
RHSA-2024:0290
Red Hat Security Advisory: OpenShift Container Platform 4.14.10 bug fix and security update
golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487)
[ "cpe:/a:redhat:openshift:4.14::el8", "cpe:/a:redhat:openshift:4.14::el9" ]
null
7.5
null
null
RHSA-2012:0811
Red Hat Security Advisory: php-pecl-apc security, bug fix, and enhancement update
php-pecl-apc: potential XSS in apc.php
[ "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
null
null
RHSA-2024:0144
Red Hat Security Advisory: idm:DL1 security update
ipa: Invalid CSRF protection
[ "cpe:/a:redhat:rhel_aus:8.2::appstream", "cpe:/a:redhat:rhel_e4s:8.2::appstream", "cpe:/a:redhat:rhel_tus:8.2::appstream" ]
null
6.5
null
null
RHSA-2020:2619
Red Hat Security Advisory: Red Hat Fuse 7.6.0 on EAP security update
apache-commons-beanutils: does not suppresses the class property in PropertyUtilsBean by default
[ "cpe:/a:redhat:jboss_fuse:7" ]
null
null
7.3
null
RHSA-2020:5170
Red Hat Security Advisory: Red Hat JBoss Web Server 5.4 security release
tomcat: specially crafted sequence of HTTP/2 requests can lead to DoS
[ "cpe:/a:redhat:jboss_enterprise_web_server:5.4::el6", "cpe:/a:redhat:jboss_enterprise_web_server:5.4::el7", "cpe:/a:redhat:jboss_enterprise_web_server:5.4::el8" ]
null
7.5
null
null
RHSA-2004:007
Red Hat Security Advisory: : : : Updated tcpdump packages fix various vulnerabilities
security flaw security flaw security flaw
[ "cpe:/o:redhat:linux:9" ]
null
null
null
null
RHSA-2023:2903
Red Hat Security Advisory: php:7.4 security update
php: phar: infinite loop when decompressing quine gzip file php: standard insecure cookie could be treated as a '__Host-' or '__Secure-' cookie by PHP applications php: OOB read due to insufficient input validation in imageloadfont() php: PDO:: quote() may return unquoted string due to an integer overflow XKCP: buffer overflow in the SHA-3 reference implementation
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
8.1
null
null
RHBA-2020:2785
Red Hat Bug Fix Advisory: OpenShift Container Platform 4.4.11 packages update
python-urllib3: CRLF injection due to not encoding the '\r\n' sequence leading to possible attack on internal service python-urllib3: Certification mishandle when error should be thrown
[ "cpe:/a:redhat:openshift:4.4::el7", "cpe:/a:redhat:openshift:4.4::el8" ]
null
null
7.5
null
RHSA-2024:10952
Red Hat Security Advisory: php:7.4 security update
php: Password_verify() always return true with some hash php: 1-byte array overrun in common path resolve code php: Missing error check and insufficient random bytes in HTTP Digest authentication for SOAP php: XML loading external entity without being enabled php: phar Buffer mismanagement php: host/secure cookie bypass due to partial CVE-2022-31629 fix php: password_verify can erroneously return true, opening ATO risk php: Filter bypass in filter_var (FILTER_VALIDATE_URL) php: Erroneous parsing of multipart form data php: cgi.force_redirect configuration is bypassable due to the environment variable collision php: PHP-FPM Log Manipulation Vulnerability
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
3.3
null
null
RHSA-2021:3365
Red Hat Security Advisory: sssd security update
sssd: shell command injection in sssctl
[ "cpe:/a:redhat:rhel_eus:8.2::crb", "cpe:/o:redhat:rhel_eus:8.2::baseos" ]
null
6.7
null
null
RHSA-2024:7624
Red Hat Security Advisory: Red Hat OpenShift Data Foundation 4.14.11 security and bug fix update
go-retryablehttp: url might write sensitive information to log file express: cause malformed URLs to be evaluated fast-xml-parser: ReDOS at currency parsing in currency.js
[ "cpe:/a:redhat:openshift_data_foundation:4.14::el9" ]
null
7.5
null
null