id
stringlengths
13
15
title
stringlengths
29
176
description
stringlengths
8
32.1k
cpes
sequencelengths
0
20
cvss_v4_0
null
cvss_v3_1
float64
0
10
cvss_v3_0
float64
0
10
cvss_v2_0
null
RHSA-2011:1166
Red Hat Security Advisory: thunderbird security update
Mozilla: Crash in SVGTextElement.getCharNumAtPosition() Mozilla: Dangling pointer vulnerability in appendChild Mozilla: Miscellaneous memory safety hazards
[ "cpe:/o:redhat:enterprise_linux:6::server" ]
null
null
null
null
RHSA-2019:2799
Red Hat Security Advisory: nginx:1.14 security update
HTTP/2: large amount of data requests leads to denial of service HTTP/2: flood using PRIORITY frames results in excessive resource consumption HTTP/2: 0-length headers lead to denial of service
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
null
6.5
null
RHSA-2023:2121
Red Hat Security Advisory: libreswan security update
libreswan: Malicious IKEv1 Aggressive Mode packets can crash libreswan
[ "cpe:/a:redhat:rhel_eus:9.0::appstream" ]
null
7.5
null
null
RHSA-2018:2405
Red Hat Security Advisory: Red Hat FIS 2.0 on Fuse 6.3.0 R7 security and bug fix update
spring-boot: Malicious PATCH requests submitted to servers can use specially crafted JSON data to run arbitrary Java code undertow: Client can use bogus uri in Digest authentication spring-framework: Improper URL path validation allows for bypassing of security checks on static resources ignite: Possible Execution of Arbitrary Code Within Deserialization Endpoints spark: Absolute and relative pathnames allow for unintended static file disclosure
[ "cpe:/a:redhat:jboss_fuse:6.3" ]
null
null
5.3
null
RHSA-2021:2714
Red Hat Security Advisory: kernel security and bug fix update
kernel: race condition for removal of the HCI controller kernel: size_t-to-int conversion vulnerability in the filesystem layer
[ "cpe:/a:redhat:enterprise_linux:8::crb", "cpe:/o:redhat:enterprise_linux:8::baseos" ]
null
6.7
null
null
RHSA-2025:2868
Red Hat Security Advisory: libreoffice security update
libreoffice: Macro URL arbitrary script execution
[ "cpe:/a:redhat:enterprise_linux:8::appstream", "cpe:/a:redhat:enterprise_linux:8::crb" ]
null
7.6
null
null
RHSA-2012:0476
Red Hat Security Advisory: Red Hat Enterprise MRG Management Console security update
cumin: multiple XSS flaws
[ "cpe:/a:redhat:enterprise_mrg:2::el5" ]
null
null
null
null
RHSA-2007:0400
Red Hat Security Advisory: firefox security update
Multiple Firefox flaws (CVE-2007-1562, CVE-2007-2867, CVE-2007-2868, CVE-2007-2869, CVE-2007-2870, CVE-2007-2871) security flaw Multiple Firefox flaws (CVE-2007-1562, CVE-2007-2867, CVE-2007-2868, CVE-2007-2869, CVE-2007-2870, CVE-2007-2871) security flaw Multiple Firefox flaws (CVE-2007-1562, CVE-2007-2867, CVE-2007-2868, CVE-2007-2869, CVE-2007-2870, CVE-2007-2871) security flaw Multiple Firefox flaws (CVE-2007-1562, CVE-2007-2867, CVE-2007-2868, CVE-2007-2869, CVE-2007-2870, CVE-2007-2871)
[ "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws", "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::client_workstation", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
RHSA-2025:3931
Red Hat Security Advisory: kernel security update
kernel: ALSA: usb-audio: Fix out of bounds reads when finding clock sources
[ "cpe:/o:redhat:rhel_els:6" ]
null
7.1
null
null
RHSA-2020:2236
Red Hat Security Advisory: java-1.7.1-ibm security update
OpenJDK: Excessive memory usage in OID processing in X.509 certificate parsing (Libraries, 8234037) OpenJDK: Incorrect handling of references to uninitialized class descriptors during deserialization (Serialization, 8224541) OpenJDK: Uncaught InstantiationError exception in ObjectStreamClass (Serialization, 8224549) OpenJDK: Re-use of single TLS session for new connections (JSSE, 8234408) OpenJDK: CRLF injection into HTTP headers in HttpServer (Lightweight HTTP Server, 8234825) OpenJDK: Incorrect bounds checks in NIO Buffers (Libraries, 8234841) OpenJDK: Incorrect type checks in MethodType.readObject() (Libraries, 8235274) OpenJDK: Regular expression DoS in Scanner (Concurrency, 8236201)
[ "cpe:/a:redhat:rhel_extras:6" ]
null
5.3
null
null
RHSA-2024:7854
Red Hat Security Advisory: thunderbird security update
firefox: thunderbird: Compromised content process can bypass site isolation firefox: thunderbird: Cross-origin access to PDF contents through multipart responses firefox: thunderbird: Cross-origin access to JSON contents through multipart responses firefox: thunderbird: Potential memory corruption may occur when cloning certain objects firefox: thunderbird: Potential directory upload bypass via clickjacking firefox: thunderbird: External protocol handlers could be enumerated via popups firefox: thunderbird: Specially crafted WebTransport requests could lead to denial of service firefox: thunderbird: Potential memory corruption during JIT compilation firefox: thunderbird: Memory safety bugs fixed in Firefox 131, Firefox ESR 115.16, Firefox ESR 128.3, Thunderbird 131, and Thunderbird 128.3 firefox: thunderbird: Memory safety bugs fixed in Firefox 131, Firefox ESR 128.3, Thunderbird 131, and Thunderbird 128.3 firefox: thunderbird: Memory safety bugs fixed in Firefox 131 and Thunderbird 131
[ "cpe:/a:redhat:rhel_aus:8.4::appstream", "cpe:/a:redhat:rhel_e4s:8.4::appstream", "cpe:/a:redhat:rhel_tus:8.4::appstream" ]
null
7.5
null
null
RHSA-2022:6351
Red Hat Security Advisory: OpenShift Virtualization 4.10.5 Images security and bug fix update
kubeVirt: Arbitrary file read on the host from KubeVirt VMs go-restful: Authorization Bypass Through User-Controlled Key
[ "cpe:/a:redhat:container_native_virtualization:4.10::el8" ]
null
9.1
null
null
RHSA-2024:11250
Red Hat Security Advisory: pam security update
pam: libpam: Libpam vulnerable to read hashed password
[ "cpe:/a:redhat:enterprise_linux:9::appstream", "cpe:/o:redhat:enterprise_linux:9::baseos" ]
null
4.7
null
null
RHSA-2016:0081
Red Hat Security Advisory: qemu-kvm-rhev security update
Qemu: nvram: OOB r/w access in processing firmware configurations
[ "cpe:/a:redhat:enterprise_linux:6::hypervisor" ]
null
null
null
null
RHSA-2019:1884
Red Hat Security Advisory: libssh2 security update
libssh2: Out-of-bounds memory comparison with specially crafted message channel request
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
7.3
null
RHSA-2023:0352
Red Hat Security Advisory: OpenJDK 17.0.6 Security Update for Windows Builds
OpenJDK: handshake DoS attack against DTLS connections (JSSE, 8287411) OpenJDK: soundbank URL remote loading (Sound, 8293742)
[ "cpe:/a:redhat:openjdk:17::windows" ]
null
3.7
null
null
RHSA-2019:1289
Red Hat Security Advisory: CloudForms 4.6.9 security, bug fix and enhancement update
rubygem-actionpack: render file directory traversal in Action View rubygem-actionpack: denial of service vulnerability in Action View
[ "cpe:/a:redhat:cloudforms_managementengine:5.9::el7" ]
null
null
5.9
null
RHSA-2021:1028
Red Hat Security Advisory: kernel security and bug fix update
kernel: performance counters race condition use-after-free kernel: locking issue in drivers/tty/tty_jobctrl.c can lead to an use-after-free
[ "cpe:/o:redhat:rhel_eus:7.7::computenode", "cpe:/o:redhat:rhel_eus:7.7::server" ]
null
7.8
null
null
RHSA-2003:187
Red Hat Security Advisory: : Updated 2.4 kernel fixes vulnerabilities and driver bugs
security flaw security flaw security flaw
[ "cpe:/o:redhat:linux:7.1", "cpe:/o:redhat:linux:7.2", "cpe:/o:redhat:linux:7.3", "cpe:/o:redhat:linux:8.0", "cpe:/o:redhat:linux:9" ]
null
null
null
null
RHSA-2004:091
Red Hat Security Advisory: : Updated libxml2 packages fix security vulnerability
libxml2 long URL causes SEGV
[ "cpe:/o:redhat:linux:9" ]
null
null
null
null
RHSA-2021:0329
Red Hat Security Advisory: Red Hat AMQ Broker 7.4.6 release and security update
jetty: local temporary directory hijacking vulnerability jetty: buffer not correctly recycled in Gzip Request inflation
[ "cpe:/a:redhat:amq_broker:7" ]
null
4.8
null
null
RHSA-2024:4533
Red Hat Security Advisory: kernel security update
kernel: ethernet: hisilicon: hns: hns_dsaf_misc: fix a possible array overflow in hns_dsaf_ge_srst_by_port() kernel: net: hns3: fix use-after-free bug in hclgevf_send_mbx_msg kernel: vt: fix memory overlapping when deleting chars in the buffer kernel: can: j1939: prevent deadlock by changing j1939_socks_lock to rwlock kernel: tls: race between async notify and socket close kernel: tls: race between tx work scheduling and socket close kernel: mm/writeback: fix possible divide-by-zero in wb_dirty_limits(), again kernel: mm/vmscan: fix a bug calling wakeup_kswapd() with a wrong zone index kernel: Bluetooth: Avoid potential use-after-free in hci_error_reset kernel: net/ipv6: avoid possible UAF in ip6_route_mpath_notify() kernel: icmp: prevent possible NULL dereferences from icmp_build_probe() kernel: netfilter: nf_tables: Fix potential data-race in __nft_flowtable_type_get() kernel: ipv6: fix race condition between ipv6_get_ifaddr and ipv6_del_addr kernel: netfilter: nf_tables: honor table dormant flag from netdev release event path kernel: tty: n_gsm: fix possible out-of-bounds in gsm0_receive() kernel: TIPC message reassembly use-after-free remote code execution vulnerability
[ "cpe:/a:redhat:rhel_eus:9.2::appstream", "cpe:/a:redhat:rhel_eus:9.2::crb", "cpe:/o:redhat:rhel_eus:9.2::baseos" ]
null
7.1
null
null
RHSA-2024:4820
Red Hat Security Advisory: httpd:2.4 security update
httpd: Substitution encoding issue in mod_rewrite httpd: Improper escaping of output in mod_rewrite httpd: NULL pointer dereference in mod_proxy
[ "cpe:/a:redhat:rhel_aus:8.2::appstream" ]
null
7.5
null
null
RHSA-2017:2484
Red Hat Security Advisory: git security update
git: Command injection via malicious ssh URLs
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
6.3
null
RHSA-2024:4831
Red Hat Security Advisory: kernel-rt security update
kernel: can: j1939: j1939_netdev_start(): fix UAF for rx_kref of j1939_priv kernel: vmwgfx: integer overflow in vmwgfx_execbuf.c kernel: vmwgfx: use-after-free in vmw_cmd_res_check kernel: vmwgfx: use-after-free in vmw_execbuf_tie_context kernel: net: amd-xgbe: Fix skb data length underflow kernel: vmwgfx: reference count issue leads to use-after-free in surface handling kernel: vmwgfx: race condition leading to information disclosure vulnerability kernel: vmwgfx: double free within the handling of vmw_buffer_object objects kernel: smb: client: fix potential OOBs in smb2_parse_contexts() kernel: uio: Fix use-after-free in uio_open kernel: intel: Fix NULL pointer dereference issue in upi_fill_topology() kernel: Bluetooth: hci_codec: Fix leaking content of local_codecs kernel: net: bridge: data races indata-races in br_handle_frame_finish() kernel: sched/psi: Fix use-after-free in ep_remove_wait_queue() kernel: scsi: ibmvfc: Remove BUG_ON in the case of an empty event pool kernel: stack overflow problem in Open vSwitch kernel module leading to DoS kernel: nftables: nft_set_rbtree skip end interval element from gc kernel: netfilter: nft_limit: reject configurations that cause integer overflow kernel: hv_netvsc: Fix race condition between netvsc_probe and netvsc_remove kernel: ext4: fix double-free of blocks due to wrong extents moved_len kernel: net/sched: act_mirred: don't override retval if we already lost the skb kernel: ext4: avoid allocating blocks from corrupted group in ext4_mb_try_best_found() kernel: netfilter: nft_chain_filter: handle NETDEV_UNREGISTER for inet/ingress basechain kernel: vfio/pci: Lock external INTx masking ops kernel: dm: call the resume method on internal suspend kernel: af_unix: Fix garbage collector racing against connect() kernel: netfilter: nf_tables: release mutex after nft_gc_seq_end from abort path kernel: scsi: qla2xxx: Fix double free of fcport kernel: scsi: qla2xxx: Fix command flush on cable pull kernel: Squashfs: check the inode number is not the invalid value of zero kernel: netfilter: flowtable: validate pppoe header kernel: netfilter: nf_tables: Fix potential data-race in __nft_obj_type_get() kernel: netfilter: nf_tables: Fix potential data-race in __nft_expr_type_get() kernel: netfilter: nf_tables: do not compare internal table flags on updates kernel: ipv6: fix potential "struct net" leak in inet6_rtm_getaddr() kernel: KVM: SVM: Flush pages under kvm->lock to fix UAF in svm_register_enc_region() kernel: netfilter: nf_tables: discard table flag update with pending basechain deletion kernel: netfilter: nf_tables: flush pending destroy work before exit_net release kernel: drm/client: Fully protect modes[] with dev->mode_config.mutex kernel: scsi: qla2xxx: Fix off by one in qla_edif_app_getstats() kernel: tls: fix missing memory barrier in tls_init kernel: tcp: Use refcount_inc_not_zero() in tcp_twsk_unique(). kernel: scsi: lpfc: Release hbalock before calling lpfc_worker_wake_up() kernel: scsi: lpfc: Move NPIV's transport unregistration to after resource clean up kernel: net: sched: sch_multiq: fix possible OOB write in multiq_tune() kernel: af_unix: Fix data races in unix_release_sock/unix_stream_sendmsg
[ "cpe:/a:redhat:rhel_eus:9.2::nfv", "cpe:/a:redhat:rhel_eus:9.2::realtime" ]
null
4.7
null
null
RHSA-2019:2590
Red Hat Security Advisory: java-1.8.0-ibm security update
OpenJDK: Insufficient checks of suppressed exceptions in deserialization (Utilities, 8212328) OpenJDK: Unbounded memory allocation during deserialization in Collections (Utilities, 8213432) OpenJDK: Insufficient restriction of privileges in AccessController (Security, 8216381) OpenJDK: Missing URL format validation (Networking, 8221518) libpng: use-after-free in png_image_free in png.c JDK: Out-of-bounds access in the String.getBytes method JDK: Failure to privatize a value pulled out of the loop by versioning
[ "cpe:/a:redhat:enterprise_linux:8::supplementary" ]
null
7.4
9.8
null
RHSA-2023:0945
Red Hat Security Advisory: kpatch-patch security update
kernel: stack overflow in do_proc_dointvec and proc_skip_spaces
[ "cpe:/o:redhat:rhel_e4s:7.7::server" ]
null
7.8
null
null
RHSA-2023:3811
Red Hat Security Advisory: python39:3.9 and python39-devel:3.9 security update
python: urllib.parse url blocklisting bypass
[ "cpe:/a:redhat:enterprise_linux:8::appstream", "cpe:/a:redhat:enterprise_linux:8::crb" ]
null
7.5
null
null
RHSA-2024:0014
Red Hat Security Advisory: tigervnc security update
xorg-x11-server: out-of-bounds memory reads/writes in XKB button actions xorg-x11-server: out-of-bounds memory read in RRChangeOutputProperty and RRChangeProviderProperty
[ "cpe:/a:redhat:rhel_eus:8.8::appstream" ]
null
7.6
null
null
RHSA-2020:0738
Red Hat Security Advisory: chromium-browser security update
chromium-browser: Type confusion in V8 chromium-browser: Use after free in WebAudio chromium-browser: Use after free in speech chromium-browser: Out of bounds memory access in streams chromium-browser: Type confusion in V8 ICU: Integer overflow in UnicodeString::doAppend()
[ "cpe:/a:redhat:rhel_extras:6" ]
null
8.8
8.8
null
RHSA-2024:0154
Red Hat Security Advisory: openssl security update
openssl: Excessive time spent checking DH keys and parameters OpenSSL: Excessive time spent checking DH q parameter value openssl: Generating excessively long X9.42 DH keys or checking excessively long X9.42 DH keys or parameters may be very slow
[ "cpe:/o:redhat:rhel_eus:8.8::baseos" ]
null
5.3
null
null
RHSA-2023:1220
Red Hat Security Advisory: kernel-rt security and bug fix update
kernel: use-after-free caused by l2cap_reassemble_sdu() in net/bluetooth/l2cap_core.c kernel: net: CPU soft lockup in TC mirred egress-to-ingress action kernel: stack overflow in do_proc_dointvec and proc_skip_spaces
[ "cpe:/a:redhat:rhel_eus:8.4::nfv", "cpe:/a:redhat:rhel_eus:8.4::realtime" ]
null
7.8
null
null
RHSA-2020:2512
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.3.1 Security update
mojarra: Path traversal in ResourceManager.java:getLocalePrefix() via the loc parameter thrift: Endless loop when feed with specific input data thrift: Out-of-bounds read related to TJSONProtocol or TSimpleJSONProtocol jackson-mapper-asl: XML external entity similar to CVE-2016-3720 cxf: OpenId Connect token service does not properly validate the clientId wildfly: The 'enabled-protocols' value in legacy security is not respected if OpenSSL security provider is in use cxf: reflected XSS in the services listing page resteasy: Improper validation of response header in MediaTypeHeaderDelegate.java class Wildfly: EJBContext principal is not popped back after invoking another EJB using a different Security Domain SmallRye: SecuritySupport class is incorrectly public and contains a static method to access the current threads context class loader undertow: AJP File Read/Inclusion Vulnerability undertow: servletPath is normalized incorrectly leading to dangerous application mapping which could result in security bypass Mojarra: Path traversal via either the loc parameter or the con parameter, incomplete fix of CVE-2018-14371 cryptacular: excessive memory allocation during a decode operation jackson-databind: Lacks certain xbean-reflect/JNDI blocking jackson-databind: Serialization gadgets in shaded-hikari-config jackson-databind: Serialization gadgets in ibatis-sqlmap jackson-databind: Serialization gadgets in anteros-core RESTEasy: RESTEASY003870 exception in RESTEasy can lead to a reflected XSS attack undertow: Memory exhaustion issue in HttpReadListener via "Expect: 100-continue" header undertow: invalid HTTP request with large chunk size
[ "cpe:/a:redhat:jboss_enterprise_application_platform:7.3::el7" ]
null
6.5
8.1
null
RHSA-2024:0254
Red Hat Security Advisory: rsync security update
zlib: heap-based buffer over-read and overflow in inflate() in inflate.c via a large gzip header extra field
[ "cpe:/o:redhat:rhel_eus:8.6::baseos" ]
null
7
null
null
RHSA-2022:5187
Red Hat Security Advisory: Red Hat OpenShift GitOps security update
argocd: vulnerable to an uncontrolled memory consumption bug argocd: vulnerable to a variety of attacks when an SSO login is initiated from the Argo CD CLI or the UI. argocd: cross-site scripting (XSS) allow a malicious user to inject a javascript link in the UI argocd: vulnerable to a symlink following bug allowing a malicious user with repository write access
[ "cpe:/a:redhat:openshift_gitops:1.3::el8" ]
null
4.3
null
null
RHSA-2019:1245
Red Hat Security Advisory: Red Hat Quay 3.0.2 security and bug fix update
SSL/TLS: Birthday attack against 64-bit block ciphers (SWEET32)
[ "cpe:/a:redhat:quay:3::el7" ]
null
null
7.5
null
RHSA-2019:3255
Red Hat Security Advisory: heketi security, bug fix, and enhancement update
heketi: heketi can be installed using insecure defaults
[ "cpe:/a:redhat:storage:3.5:server:el7", "cpe:/a:redhat:storage:3:client:el7" ]
null
null
7.3
null
RHSA-2024:6188
Red Hat Security Advisory: runc security update
golang: crypto/x509: Verify panics on certificates with an unknown public key algorithm
[ "cpe:/a:redhat:enterprise_linux:9::appstream" ]
null
5.9
null
null
RHSA-2015:1768
Red Hat Security Advisory: libunwind security update
libunwind: off-by-one in dwarf_to_unw_regnum()
[ "cpe:/a:redhat:openstack:5::el6" ]
null
null
null
null
RHSA-2024:4118
Red Hat Security Advisory: Red Hat Ceph Storage 5.3 security, bug fix, and enhancement update
golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487) opentelemetry: DoS vulnerability in otelhttp go-git: Maliciously crafted Git server replies can lead to path traversal and RCE on go-git clients
[ "cpe:/a:redhat:ceph_storage:5.3::el8", "cpe:/a:redhat:ceph_storage:5.3::el9" ]
null
8.1
null
null
RHSA-2019:2695
Red Hat Security Advisory: kernel security and bug fix update
kernel: hw: Spectre SWAPGS gadget vulnerability
[ "cpe:/o:redhat:rhel_aus:6.5::server" ]
null
null
5.9
null
RHSA-2017:1561
Red Hat Security Advisory: thunderbird security update
Mozilla: Memory safety bugs fixed in Firefox 54 and Firefox ESR 52.2 (MFSA 2017-16) Mozilla: Use-after-free using destroyed node when regenerating trees (MFSA 2017-16) Mozilla: Use-after-free during docshell reloading (MFSA 2017-16) Mozilla: Use-after-free with track elements (MFSA 2017-16) Mozilla: Use-after-free with content viewer listeners (MFSA 2017-16) Mozilla: Use-after-free with IME input (MFSA 2017-16) Mozilla: Out-of-bounds read in WebGL with ImageInfo object (MFSA 2017-16) Mozilla: Use-after-free and use-after-scope logging XHR header errors (MFSA 2017-16) Mozilla: Use-after-free in IndexedDB (MFSA 2017-16) Mozilla: Out-of-bounds read in Opus encoder (MFSA 2017-16) Mozilla: Domain spoofing with combination of Canadian Syllabics and other unicode blocks (MFSA 2017-16) graphite2: out of bounds read in "graphite2::Pass::readPass" graphite2: heap-buffer-overflow write "lz4::decompress" (CVE-2017-7772) graphite2: heap-buffer-overflow write "lz4::decompress" (src/Decompressor) graphite2: out of bounds read "graphite2::Silf::readGraphite" graphite2: assertion error "size() > n" graphite2: heap-buffer-overflow read "graphite2::Silf::getClassGlyph" graphite2: use of uninitialized memory "graphite2::GlyphCache::Loader::read_glyph" Mozilla: Vulnerabilities in the Graphite 2 library (MFSA 2017-16)
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation", "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
9.8
null
RHSA-2023:1079
Red Hat Security Advisory: Red Hat OpenStack Platform 16.2 (osp-director-downloader-container, osp-director-agent-container and osp-director-operator-container) security update
golang: archive/tar: github.com/vbatts/tar-split: unbounded memory consumption when reading headers golang: regexp/syntax: limit memory used by parsing regexps golang: net/http: excessive memory growth in a Go server accepting HTTP/2 requests
[ "cpe:/a:redhat:openstack:16.2::el8" ]
null
5.3
null
null
RHSA-2012:1207
Red Hat Security Advisory: glibc security and bug fix update
glibc: Integer overflows, leading to stack-based buffer overflows in strto* related routines
[ "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
RHSA-2005:348
Red Hat Security Advisory: mysql-server security update
security flaw security flaw security flaw
[ "cpe:/a:redhat:rhel_extras:3" ]
null
null
null
null
RHSA-2021:5036
Red Hat Security Advisory: virt:8.2 and virt-devel:8.2 security update
QEMU: virtio-net: heap use-after-free in virtio_net_receive_rcu
[ "cpe:/a:redhat:advanced_virtualization:8.2::el8" ]
null
7.5
null
null
RHSA-2020:2041
Red Hat Security Advisory: squid:4 security update
squid: improper check for new member in ESIExpression::Evaluate allows for stack buffer overflow squid: parsing of header Proxy-Authentication leads to memory corruption squid: improper access restriction upon Digest Authentication nonce replay could lead to remote code execution
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
8.1
4.3
null
RHSA-2023:4509
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.4.12 security update
jackson-databind: Possible DoS if using JDK serialization to serialize JsonNode jettison: Uncontrolled Recursion in JSONArray undertow: OutOfMemoryError due to @MultipartConfig handling undertow: AJP Request closes connection exceeding maxRequestSize
[ "cpe:/a:redhat:jboss_enterprise_application_platform:7.4" ]
null
7.5
null
null
RHSA-2021:0816
Red Hat Security Advisory: wpa_supplicant security update
wpa_supplicant: Use-after-free in P2P provision discovery processing
[ "cpe:/o:redhat:rhel_eus:8.2::baseos" ]
null
7.5
null
null
RHSA-2024:0990
Red Hat Security Advisory: rh-postgresql12-postgresql security update
postgresql: non-owner 'REFRESH MATERIALIZED VIEW CONCURRENTLY' executes arbitrary SQL
[ "cpe:/a:redhat:rhel_software_collections:3::el7" ]
null
8
null
null
RHSA-2022:6152
Red Hat Security Advisory: Secondary Scheduler Operator for Red Hat OpenShift 1.1.0 security update
golang: net/http: improper sanitization of Transfer-Encoding header golang: go/parser: stack exhaustion in all Parse* functions golang: encoding/pem: fix stack overflow in Decode golang: encoding/xml: stack exhaustion in Decoder.Skip golang: crypto/elliptic: panic caused by oversized scalar golang: crypto/tls: session tickets lack random ticket_age_add golang: io/fs: stack exhaustion in Glob golang: compress/gzip: stack exhaustion in Reader.Read golang: path/filepath: stack exhaustion in Glob golang: encoding/xml: stack exhaustion in Unmarshal golang: encoding/gob: stack exhaustion in Decoder.Decode golang: net/http/httputil: NewSingleHostReverseProxy - omit X-Forwarded-For not working
[ "cpe:/a:redhat:openshift_secondary_scheduler:1.1::el8" ]
null
6.5
null
null
RHSA-2018:2439
Red Hat Security Advisory: mariadb security and bug fix update
mysql: Client programs unspecified vulnerability (CPU Jul 2017) mysql: Server: DML unspecified vulnerability (CPU Jul 2017) mysql: Client mysqldump unspecified vulnerability (CPU Jul 2017) mysql: Server: DDL unspecified vulnerability (CPU Jul 2017) mysql: Server: Replication unspecified vulnerability (CPU Oct 2017) mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2017) mysql: Client programs unspecified vulnerability (CPU Oct 2017) mysql: Server: DDL unspecified vulnerability (CPU Oct 2017) mysql: Server: Partition unspecified vulnerability (CPU Jan 2018) mysql: Server: DDL unspecified vulnerability (CPU Jan 2018) mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2018) mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2018) mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2018) mysql: Server: Replication unspecified vulnerability (CPU Apr 2018) mysql: Client programs unspecified vulnerability (CPU Apr 2018) mysql: use of SSL/TLS not enforced in libmysqld (Return of BACKRONYM) mysql: Server: Locking unspecified vulnerability (CPU Apr 2018) mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2018) mysql: Server: DDL unspecified vulnerability (CPU Apr 2018) mysql: Server: DDL unspecified vulnerability (CPU Apr 2018) mysql: InnoDB unspecified vulnerability (CPU Apr 2018) mysql: Server: Parser unspecified vulnerability (CPU Oct 2018) mysql: Server: Parser unspecified vulnerability (CPU Jan 2019)
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
6.5
null
RHBA-2018:0135
Red Hat Bug Fix Advisory: org.ovirt.engine-root bug fix and enhancement update
ovirt-engine: When Wipe After Delete (WAD) and Enable Discard are both enabled for a VM disk, discarded data might not be wiped after the disk is removed.
[ "cpe:/a:redhat:rhev_manager:4" ]
null
null
4.2
null
RHSA-2023:1554
Red Hat Security Advisory: kernel security, bug fix, and enhancement update
ALSA: pcm: Move rwsem lock inside snd_ctl_elem_read to prevent UAF kernel: FUSE filesystem low-privileged user privileges escalation
[ "cpe:/a:redhat:rhel_eus:8.6::crb", "cpe:/o:redhat:rhel_eus:8.6::baseos", "cpe:/o:redhat:rhev_hypervisor:4.4::el8" ]
null
7
null
null
RHSA-2017:0680
Red Hat Security Advisory: glibc security and bug fix update
glibc: Unbounded stack allocation in nan* functions glibc: Segmentation fault caused by passing out-of-range data to strftime() glibc: Integer overflow in hcreate and hcreate_r glibc: Unbounded stack allocation in catopen function
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
8.1
null
RHSA-2020:4040
Red Hat Security Advisory: libexif security, bug fix, and enhancement update
libexif: out of bounds write in exif-data.c libexif: out of bounds read due to a missing bounds check in exif_data_save_data_entry function in exif-data.c libexif: out of bounds read due to a missing bounds check in exif_entry_get_value function in exif-entry.c libexif: divide-by-zero in exif_entry_get_value function in exif-entry.c libexif: use of uninitialized memory in EXIF Makernote handling can lead to crashes and use-after-free libexif: unrestricted size in handling Canon EXIF MakerNote data can lead to consumption of large amounts of compute time
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
7.5
null
null
RHSA-2007:1063
Red Hat Security Advisory: pcre security update
pcre integer overflow pcre regular expression flaws
[ "cpe:/o:redhat:enterprise_linux:3::as", "cpe:/o:redhat:enterprise_linux:3::desktop", "cpe:/o:redhat:enterprise_linux:3::es", "cpe:/o:redhat:enterprise_linux:3::ws" ]
null
null
null
null
RHSA-2024:4414
Red Hat Security Advisory: fence-agents security update
jinja2: accepts keys containing non-attribute characters
[ "cpe:/a:redhat:rhel_e4s:9.0::appstream", "cpe:/a:redhat:rhel_e4s:9.0::highavailability", "cpe:/a:redhat:rhel_e4s:9.0::resilientstorage" ]
null
5.4
null
null
RHSA-2012:0325
Red Hat Security Advisory: jbossweb security update
tomcat: Multiple weaknesses in HTTP DIGEST authentication tomcat: security manager restrictions bypass JBoss Web remote denial of service when surrogate pair character is placed at buffer boundary tomcat: hash table collisions CPU usage DoS (oCERT-2011-003) tomcat: Multiple weaknesses in HTTP DIGEST authentication tomcat: Multiple weaknesses in HTTP DIGEST authentication tomcat: Multiple weaknesses in HTTP DIGEST authentication tomcat: large number of parameters DoS
[ "cpe:/a:redhat:jboss_enterprise_brms_platform:5.1", "cpe:/a:redhat:jboss_enterprise_portal_platform:5.2", "cpe:/a:redhat:jboss_soa_platform:5.2" ]
null
null
null
null
RHSA-2023:7851
Red Hat Security Advisory: Satellite 6.14.1 Async Security Update
foreman: World readable file containing secrets actionpack: Possible XSS via User Supplied Values to redirect_to GitPython: Blind local file inclusion python-urllib3: Cookie request header isn't stripped during cross-origin redirects urllib3: Request body not stripped after redirect from 303 status changes request method to GET
[ "cpe:/a:redhat:satellite:6.14::el8", "cpe:/a:redhat:satellite_capsule:6.14::el8", "cpe:/a:redhat:satellite_utils:6.14::el8" ]
null
4.2
null
null
RHSA-2024:5147
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.4.18 Security update
undertow: LearningPushHandler can lead to remote memory DoS attacks undertow: response write hangs in case of Java 17 TLSv1.3 NewSessionTicket httpd: CONTINUATION frames DoS netty-codec-http: Allocation of Resources Without Limits or Throttling org.bouncycastle: Importing an EC certificate with crafted F2m parameters may lead to Denial of Service bc-java: BouncyCastle vulnerable to a timing variant of Bleichenbacher (Marvin Attack) org.bouncycastle:bcprov-jdk18on: Infinite loop in ED25519 verification in the ScalarUtil class
[ "cpe:/a:redhat:jboss_enterprise_application_platform:7.4" ]
null
7.5
null
null
RHSA-2011:1106
Red Hat Security Advisory: kernel security, bug fix, and enhancement update
kernel: net: Fix memory leak/corruption on VLAN GRO_DROP
[ "cpe:/o:redhat:rhel_eus:6.0" ]
null
null
null
null
RHSA-2025:2653
Red Hat Security Advisory: grub2 security update
grub2: net: Out-of-bounds write in grub_net_search_config_file()
[ "cpe:/o:redhat:rhel_aus:8.6::baseos", "cpe:/o:redhat:rhel_e4s:8.6::baseos", "cpe:/o:redhat:rhel_tus:8.6::baseos" ]
null
7.6
null
null
RHSA-2007:0747
Red Hat Security Advisory: httpd security, bug fix, and enhancement update
httpd: out of bounds read
[ "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws" ]
null
null
null
null
RHSA-2021:2760
Red Hat Security Advisory: nettle security update
nettle: Out of bounds memory access in signature verification
[ "cpe:/o:redhat:rhel_aus:7.3::server" ]
null
8.1
null
null
RHSA-2017:0062
Red Hat Security Advisory: bind security update
bind: assertion failure while processing response to an ANY query bind: assertion failure while handling a query response containing inconsistent DNSSEC information bind: assertion failure while handling an unusually-formed DS record response
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
7.5
null
RHSA-2023:7055
Red Hat Security Advisory: webkit2gtk3 security, bug fix, and enhancement update
webkitgtk: Memory corruption issue when processing web content webkitgtk: Visiting a website that frames malicious content may lead to UI spoofing. webkitgtk: A website may able to track visited websites in private browsing webkitgtk: Visiting a malicious website may lead to address bar spoofing webkitgtk: Visiting a malicious website may lead to address bar spoofing. webkitgtk: Same Origin Policy bypass via crafted web content webkitgtk: Website may be able to track sensitive user information webkitgtk: use after free vulnerability webkitgtk: content security policy blacklist failure webkitgtk: arbitrary code execution webkitgtk: disclose sensitive information webkitgtk: bypass Same Origin Policy webkitgtk: Processing web content may lead to arbitrary code execution webkitgtk: arbitrary code execution webkitgtk: arbitrary code execution webkitgtk: arbitrary code execution webkitgtk: track sensitive user information webkitgtk: arbitrary code execution webkitgtk: arbitrary code execution webkitgtk: arbitrary javascript code execution webkitgtk: attacker with JavaScript execution may be able to execute arbitrary code webkitgtk: Processing web content may lead to arbitrary code execution
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
8.8
null
null
RHSA-2024:2410
Red Hat Security Advisory: harfbuzz security update
harfbuzz: allows attackers to trigger O(n^2) growth via consecutive marks
[ "cpe:/a:redhat:enterprise_linux:9::appstream", "cpe:/o:redhat:enterprise_linux:9::baseos" ]
null
7.5
null
null
RHSA-2023:2078
Red Hat Security Advisory: libwebp security update
Mozilla: libwebp: Double-free in libwebp
[ "cpe:/a:redhat:enterprise_linux:9::appstream" ]
null
7.5
null
null
RHSA-2019:3217
Red Hat Security Advisory: kernel-alt security and bug fix update
kernel: MIDI driver race condition leads to a double-free kernel: Use-after-free in __blk_drain_queue() function in block/blk-core.c kernel: brcmfmac heap buffer overflow in brcmf_wowl_nd_results hardware: bluetooth: BR/EDR encryption key negotiation attacks (KNOB) kernel: a NULL pointer dereference in drivers/scsi/megaraid/megaraid_sas_base.c leading to DoS
[ "cpe:/o:redhat:enterprise_linux:7::server" ]
null
null
6.2
null
RHSA-2022:6834
Red Hat Security Advisory: expat security update
expat: a use-after-free in the doContent function in xmlparse.c
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
8.1
null
null
RHSA-2023:5001
Red Hat Security Advisory: OpenShift Container Platform 4.11.49 bug fix and security update
exporter-toolkit: authentication bypass via cache poisoning
[ "cpe:/a:redhat:openshift:4.11::el8" ]
null
7.5
null
null
RHSA-2018:2255
Red Hat Security Advisory: java-1.7.0-oracle security update
JDK: unspecified vulnerability fixed in 6u201, 7u191, 8u181, and 10.0.2 (Libraries) JDK: unspecified vulnerability fixed in 7u191, 8u181, and 10.0.2 (JavaFX) OpenJDK: insufficient index validation in PatternSyntaxException getMessage() (Concurrency, 8199547) JDK: unspecified vulnerability fixed in 6u201, 7u191, 8u181, and 10.0.2 (JSSE)
[ "cpe:/a:redhat:rhel_extras_oracle_java:6" ]
null
null
5.9
null
RHSA-2025:3932
Red Hat Security Advisory: Red Hat OpenShift Dev Spaces 3.20.0 release
tar-fs: link following and path traversal via maliciously crafted tar file golang.org/x/oauth2/jws: Unexpected memory consumption during token parsing in golang.org/x/oauth2/jws golang.org/x/crypto/ssh: Denial of Service in the Key Exchange of golang.org/x/crypto/ssh
[ "cpe:/a:redhat:openshift_devspaces:3::el9" ]
null
7.5
null
null
RHSA-2019:1942
Red Hat Security Advisory: perl security update
perl: Integer overflow leading to buffer overflow in Perl_my_setenv()
[ "cpe:/o:redhat:rhel_eus:7.4::computenode", "cpe:/o:redhat:rhel_eus:7.4::server" ]
null
null
8.1
null
RHSA-2025:3052
Red Hat Security Advisory: Gatekeeper v3.18.0
golang.org/x/crypto/ssh: Denial of Service in the Key Exchange of golang.org/x/crypto/ssh
[ "cpe:/a:redhat:gatekeeper:3.18::el9" ]
null
7.5
null
null
RHSA-2016:0999
Red Hat Security Advisory: qemu-kvm-rhev security update
qemu: incorrect banked access bounds checking in vga module
[ "cpe:/a:redhat:openstack:5::el7" ]
null
null
7.6
null
RHSA-2009:0360
Red Hat Security Advisory: kernel-rt security and bug fix update
kernel: local denial of service in keyctl_join_session_keyring kernel: ecryptfs readlink flaw kernel: dell_rbu local oops kernel: skfp_ioctl inverted logic flaw kernel: memory disclosure in SO_BSDCOMPAT gsopt
[ "cpe:/a:redhat:enterprise_mrg:1::el5" ]
null
null
null
null
RHSA-2021:4123
Red Hat Security Advisory: firefox security update
Mozilla: iframe sandbox rules did not apply to XSLT stylesheets Mozilla: Use-after-free in file picker dialog Mozilla: Firefox could be coaxed into going into fullscreen mode without notification or warning Mozilla: Opportunistic Encryption in HTTP2 could be used to bypass the Same-Origin-Policy on services hosted on other ports Mozilla: Permission Prompt could be overlaid, resulting in user confusion and potential spoofing Mozilla: Javascript alert box could have been spoofed onto an arbitrary domain Mozilla: Memory safety bugs fixed in Firefox 94 and Firefox ESR 91.3 Mozilla: Use-after-free in HTTP2 Session object
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
8.8
6.1
null
RHSA-2024:9472
Red Hat Security Advisory: grafana-pcp security update
encoding/gob: golang: Calling Decoder.Decode on a message which contains deeply nested structures can cause a panic due to stack exhaustion
[ "cpe:/a:redhat:enterprise_linux:9::appstream" ]
null
7.5
null
null
RHSA-2020:5162
Red Hat Security Advisory: thunderbird security update
Mozilla: Write side effects in MCallGetProperty opcode not accounted for
[ "cpe:/a:redhat:rhel_eus:8.2::appstream" ]
null
null
8.8
null
RHSA-2024:5930
Red Hat Security Advisory: bind security update
bind: bind9: BIND's database will be slow if a very large number of RRs exist at the same nam bind9: bind: SIG(0) can be used to exhaust CPU resources
[ "cpe:/o:redhat:rhel_els:7" ]
null
7.5
null
null
RHSA-2012:0345
Red Hat Security Advisory: jbossweb security and bug fix update
tomcat: large number of parameters DoS
[ "cpe:/a:redhat:jboss_enterprise_portal_platform:4.3" ]
null
null
null
null
RHSA-2022:6206
Red Hat Security Advisory: systemd security update
systemd-resolved: use-after-free when dealing with DnsStream in resolved-dns-stream.c
[ "cpe:/o:redhat:enterprise_linux:8::baseos" ]
null
9.8
null
null
RHSA-2012:0509
Red Hat Security Advisory: wireshark security update
Wireshark: Null pointer dereference causing application crash when reading malformed pcap file Wireshark: Use-after-free causes heap-based buffer overflow in X.509if dissector wireshark: Infinite loop in the DICOM dissector (64bit): NULL pointer dereference by processing of a corrupted Diameter dictionary file wireshark: Stack-based buffer over-read from tvbuff buffer when reading snoop capture files wireshark: Double-free flaw by uncompressing of a zlib compressed packet wireshark: Heap-based buffer over-read in Visual Networks dissector wireshark: infinite loop DoS in lucent/ascend file parser wireshark: Infinite loop in the ANSI A Interface (IS-634/IOS) dissector wireshark: buffer overflow in the ERF file reader wireshark: multiple file parser vulnerabilities (wnpa-sec-2012-01) wireshark: NULL pointer vulnerabilities (wnpa-sec-2012-02) Wireshark: Dos via large buffer allocation request Wireshark: Dos due to integer overflow in IPTrace capture format parser wireshark: Heap-based buffer overflow when reading ERF packets from pcap/pcap-ng trace files
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
null
null
RHSA-2018:0560
Red Hat Security Advisory: collectd security, bug fix, and enhancement update
collectd: double free in csnmp_read_table function in snmp.c
[ "cpe:/a:redhat:rhev_manager:4", "cpe:/o:redhat:enterprise_linux:7::hypervisor" ]
null
null
5.6
null
RHSA-2020:2478
Red Hat Security Advisory: OpenShift Container Platform 3.11 jenkins-2-plugins security update
jenkins-git-client-plugin: OS command injection via 'git ls-remote' jenkins-script-security-plugin: sandbox protection bypass leads to execute arbitrary code in sandboxed scripts jenkins-pipeline-groovy-plugin: sandbox protection bypass through default parameter expressions in CPS-transformed methods jenkins-script-security-plugin: sandbox protection bypass during script compilation phase by applying AST transforming annotations jenkins-subversion-plugin: XSS in project repository base url jenkins-script-security-plugin: sandbox protection bypass via crafted constructor calls and crafted constructor bodies jenkins-script-security-plugin: sandbox protection bypass leads to arbitrary code execution jenkins-git-plugin: stored cross-site scripting
[ "cpe:/a:redhat:openshift:3.11::el7" ]
null
5.4
null
null
RHSA-2020:3639
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.2.9 on RHEL 8 security update
hibernate: SQL injection issue in Hibernate ORM resteasy: Improper validation of response header in MediaTypeHeaderDelegate.java class EAP: field-name is not parsed in accordance to RFC7230 Wildfly: Improper authorization issue in WildFlySecurityManager when using alternative protection domain Mojarra: Path traversal via either the loc parameter or the con parameter, incomplete fix of CVE-2018-14371 jackson-databind: Lacks certain xbean-reflect/JNDI blocking jackson-databind: Serialization gadgets in shaded-hikari-config jackson-databind: Serialization gadgets in ibatis-sqlmap jackson-databind: Serialization gadgets in anteros-core jackson-databind: mishandles the interaction between serialization gadgets and typing which could result in remote command execution jackson-databind: mishandles the interaction between serialization gadgets and typing which could result in remote command execution dom4j: XML External Entity vulnerability in default SAX parser Undertow: Incomplete fix for CVE-2017-2666 due to permitting invalid characters in HTTP requests hibernate-validator: Improper input validation in the interpolation of constraint error messages wildfly-elytron: session fixation when using FORM authentication wildfly: exposed setting of TCCL via the EmbeddedManagedProcess API wildfly: unsafe deserialization in Wildfly Enterprise Java Beans wildfly: Some EJB transaction objects may get accumulated causing Denial of Service wildfly: EJB SessionOpenInvocations may not be removed properly after a response is received causing Denial of Service
[ "cpe:/a:redhat:jboss_enterprise_application_platform:7.2::el8" ]
null
6.5
4.8
null
RHSA-2008:0895
Red Hat Security Advisory: ruby security update
ruby: Memory allocation failure in Ruby regex engine (remotely exploitable DoS) ruby: multiple insufficient safe mode restrictions
[ "cpe:/o:redhat:enterprise_linux:2.1::as", "cpe:/o:redhat:enterprise_linux:2.1::es", "cpe:/o:redhat:enterprise_linux:2.1::ws" ]
null
null
null
null
RHSA-2012:1125
Red Hat Security Advisory: JBoss Enterprise SOA Platform 5.3.0 update
OpenSSO: unspecified vulnerability in the authentication component OpenSSO: unspecified vulnerability in the authentication component JNDI: unauthenticated remote write access is permitted by default jruby: hash table collisions DoS (oCERT-2011-003) RESTEasy: XML eXternal Entity (XXE) flaw OpenSSO: Unspecified vulnerability allows remote attackers to affect integrity via unknown vectors RESTEasy: XML eXternal Entity (XXE) flaw JBoss: authentication bypass when running under JACC with ignoreBaseDecision on JBossWebRealm JGroups diagnostics service enabled by default with no authentication when a JGroups channel is started
[ "cpe:/a:redhat:jboss_soa_platform:5.3" ]
null
null
null
null
RHSA-2023:1368
Red Hat Security Advisory: nss security and bug fix update
nss: Arbitrary memory write via PKCS 12
[ "cpe:/a:redhat:enterprise_linux:9::appstream" ]
null
8.8
null
null
RHSA-2024:11529
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.4 security update
hornetq-core-client: Arbitrarily overwrite files or access sensitive information
[ "cpe:/a:redhat:jboss_enterprise_application_platform:7.4::el7", "cpe:/a:redhat:jboss_enterprise_application_platform:7.4::el8", "cpe:/a:redhat:jboss_enterprise_application_platform:7.4::el9" ]
null
7.1
null
null
RHSA-2020:1189
Red Hat Security Advisory: libqb security update
libqb: Insecure treatment of IPC (temporary) files
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
6.5
null
RHSA-2019:2548
Red Hat Security Advisory: OpenShift Container Platform 4.1 jenkins security update
jenkins: Arbitrary file write vulnerability using file parameter definitions (SECURITY-1424) jenkins: CSRF protection tokens did not expire (SECURITY-626) jenkins: Unauthorized view fragment access (SECURITY-534)
[ "cpe:/a:redhat:openshift:4.1::el7" ]
null
null
4.3
null
RHSA-2024:3401
Red Hat Security Advisory: rpm-ostree security update
rpm-ostree: world-readable /etc/shadow file
[ "cpe:/a:redhat:rhel_eus:9.2::appstream" ]
null
6.2
null
null
RHSA-2024:10946
Red Hat Security Advisory: kernel-rt security update
kernel: bpf: Add BPF_PROG_TYPE_CGROUP_SKB attach type enforcement in BPF_LINK_CREATE
[ "cpe:/a:redhat:rhel_eus:9.2::nfv", "cpe:/a:redhat:rhel_eus:9.2::realtime" ]
null
4.4
null
null
RHSA-2017:0177
Red Hat Security Advisory: java-1.6.0-sun security update
OpenJDK: incorrect ECDSA signature extraction from the DER input (Libraries, 8168714) OpenJDK: DSA implementation timing attack (Libraries, 8168728) OpenJDK: incorrect URL parsing in URLStreamHandler (Networking, 8167223) OpenJDK: URLClassLoader insufficient access control checks (Networking, 8151934) OpenJDK: untrusted input deserialization in RMI registry and DCG (RMI, 8156802) OpenJDK: LdapLoginModule incorrect userDN extraction (JAAS, 8161743) OpenJDK: imageio PNGImageReader failed to honor ignoreMetadata for iTXt and zTXt chunks (2D, 8166988) JDK: unspecified vulnerability fixed in 6u141, 7u131, and 8u121 (Deployment) OpenJDK: integer overflow in SocketOutputStream boundary check (Networking, 8164147) OpenJDK: insufficient protected field access checks in atomic field updaters (Libraries, 8165344)
[ "cpe:/a:redhat:rhel_extras_oracle_java:5", "cpe:/a:redhat:rhel_extras_oracle_java:6", "cpe:/a:redhat:rhel_extras_oracle_java:7" ]
null
null
8.8
null
RHSA-2016:0511
Red Hat Security Advisory: java-1.7.0-openjdk security update
OpenJDK: missing type safety checks for MethodHandle calls across class loaders, incorrect CVE-2013-5838 fix (Hotspot, 8151666)
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
null
null
RHBA-2012:0496
Red Hat Bug Fix Advisory: Red Hat Enterprise MRG Realtime 2.1 kernel bug fix update
kernel: excessive in kernel CPU consumption when creating large nested epoll structures
[ "cpe:/a:redhat:enterprise_mrg:2:server:el6" ]
null
null
null
null
RHSA-2024:7869
Red Hat Security Advisory: .NET 8.0 security update
dotnet: kestrel: closing an HTTP/3 stream can cause a race condition and lead to remote code execution dotnet: Multiple .NET components susceptible to hash flooding dotnet: System.IO.Packaging - Multiple DoS vectors in use of SortedList dotnet: Denial of Service in System.Text.Json
[ "cpe:/a:redhat:enterprise_linux:9::appstream", "cpe:/a:redhat:enterprise_linux:9::crb" ]
null
7.5
null
null