id
stringlengths
13
15
title
stringlengths
29
176
description
stringlengths
8
32.1k
cpes
sequencelengths
0
20
cvss_v4_0
null
cvss_v3_1
float64
0
10
cvss_v3_0
float64
0
10
cvss_v2_0
null
RHSA-2022:7004
Red Hat Security Advisory: java-1.8.0-openjdk security update
OpenJDK: improper handling of long NTLM client hostnames (Security, 8286526) OpenJDK: insufficient randomization of JNDI DNS port numbers (JNDI, 8286910) OpenJDK: excessive memory allocation in X.509 certificate parsing (Security, 8286533) OpenJDK: HttpServer no connection count limit (Lightweight HTTP Server, 8286918)
[ "cpe:/a:redhat:rhel_eus:8.2::appstream" ]
null
5.3
null
null
RHSA-2024:10272
Red Hat Security Advisory: edk2 security update
edk2: Integer overflows in PeCoffLoaderRelocateImage
[ "cpe:/a:redhat:rhel_aus:8.4::appstream", "cpe:/a:redhat:rhel_e4s:8.4::appstream", "cpe:/a:redhat:rhel_tus:8.4::appstream" ]
null
5.9
null
null
RHSA-2023:7548
Red Hat Security Advisory: kernel-rt security update
kernel: use-after-free due to race condition occurring in dvb_register_device() kernel: use-after-free due to race condition occurring in dvb_net.c kernel: use-after-free due to race condition occurring in dvb_ca_en50221.c kernel: use-after-free in smb2_is_status_io_timeout() kernel: bpf: Incorrect verifier pruning leads to unsafe code paths being incorrectly marked as safe kernel: tun: bugs for oversize packet when napi frags enabled in tun_napi_alloc_frags kernel: use after free in nvmet_tcp_free_crypto in NVMe
[ "cpe:/a:redhat:enterprise_linux:8::nfv", "cpe:/a:redhat:enterprise_linux:8::realtime" ]
null
8.8
null
null
RHSA-2024:7590
Red Hat Security Advisory: OpenShift Container Platform 4.12.67 bug fix and security update
glibc: Out of bounds write in iconv may lead to remote code execution webob: WebOb's location header normalization during redirect leads to open redirect
[ "cpe:/a:redhat:openshift:4.12::el8", "cpe:/a:redhat:openshift:4.12::el9" ]
null
6.1
null
null
RHSA-2013:0826
Red Hat Security Advisory: acroread security update
acroread: Unspecified vulnerability allows remote attackers to execute arbitrary code (CanSecWest 2013) acroread: multiple code execution flaws (APSB13-15) acroread: multiple code execution flaws (APSB13-15) acroread: multiple code execution flaws (APSB13-15) acroread: multiple code execution flaws (APSB13-15) acroread: multiple code execution flaws (APSB13-15) acroread: multiple code execution flaws (APSB13-15) acroread: multiple code execution flaws (APSB13-15) acroread: multiple code execution flaws (APSB13-15) acroread: multiple code execution flaws (APSB13-15) acroread: multiple code execution flaws (APSB13-15) acroread: multiple code execution flaws (APSB13-15) acroread: multiple code execution flaws (APSB13-15) acroread: multiple code execution flaws (APSB13-15) acroread: multiple code execution flaws (APSB13-15) acroread: multiple code execution flaws (APSB13-15) acroread: multiple code execution flaws (APSB13-15) acroread: multiple code execution flaws (APSB13-15) acroread: multiple code execution flaws (APSB13-15) acroread: unspecified information leak issue (APSB13-15) acroread: multiple code execution flaws (APSB13-15) acroread: multiple code execution flaws (APSB13-15) acroread: multiple code execution flaws (APSB13-15) acroread: multiple code execution flaws (APSB13-15) acroread: multiple code execution flaws (APSB13-15) acroread: multiple code execution flaws (APSB13-15)
[ "cpe:/a:redhat:rhel_extras:5::server", "cpe:/a:redhat:rhel_extras:6" ]
null
null
null
null
RHSA-2020:4990
Red Hat Security Advisory: kernel security update
kernel: net: bluetooth: information leak when processing certain AMP packets
[ "cpe:/o:redhat:rhel_aus:7.2::server" ]
null
5.3
null
null
RHSA-2022:6875
Red Hat Security Advisory: kpatch-patch security update
kernel: a use-after-free in cls_route filter implementation may lead to privilege escalation
[ "cpe:/o:redhat:rhel_e4s:8.1::baseos" ]
null
7.8
null
null
RHSA-2018:2123
Red Hat Security Advisory: python security update
SSL/TLS: Birthday attack against 64-bit block ciphers (SWEET32)
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
7.5
null
RHSA-2019:4237
Red Hat Security Advisory: OpenShift Container Platform 4.1.28 openshift-enterprise-builder-container security update
openshift: Container image TLS verification bypass
[ "cpe:/a:redhat:openshift:4.1::el7" ]
null
null
5.7
null
RHSA-2023:2459
Red Hat Security Advisory: device-mapper-multipath security and bug fix update
device-mapper-multipath: multipathd: insecure handling of files in /dev/shm leading to symlink attack
[ "cpe:/a:redhat:enterprise_linux:9::crb", "cpe:/o:redhat:enterprise_linux:9::baseos" ]
null
7
null
null
RHSA-2021:0472
Red Hat Security Advisory: .NET Core 3.1 on Red Hat Enterprise Linux security and bugfix update
dotnet: certificate chain building recursion Denial of Service
[ "cpe:/a:redhat:rhel_dotnet:3.1::el7" ]
null
6.5
null
null
RHSA-2014:0025
Red Hat Security Advisory: cfme security, bug fix, and enhancement update
CFME: GET request CSRF vulnerability
[ "cpe:/a:redhat:cloudforms_managementengine:5::el6" ]
null
null
null
null
RHSA-2024:3929
Red Hat Security Advisory: dnsmasq security update
bind9: KeyTrap - Extreme CPU consumption in DNSSEC validator bind9: Preparing an NSEC3 closest encloser proof can exhaust CPU resources
[ "cpe:/a:redhat:rhel_aus:8.2::appstream" ]
null
7.5
null
null
RHSA-2012:0035
Red Hat Security Advisory: mod_cluster-native security update
mod_cluster: malicious worker nodes can register on any vhost
[ "cpe:/a:redhat:jboss_enterprise_web_server:1::el4", "cpe:/a:redhat:jboss_enterprise_web_server:1::el5", "cpe:/a:redhat:jboss_enterprise_web_server:1::el6" ]
null
null
null
null
RHSA-2011:1294
Red Hat Security Advisory: httpd security update
httpd: multiple ranges DoS
[ "cpe:/o:redhat:enterprise_linux:5::server", "cpe:/o:redhat:rhel_eus:6.0", "cpe:/o:redhat:rhel_mission_critical:5.3" ]
null
null
null
null
RHSA-2022:1964
Red Hat Security Advisory: fetchmail security update
fetchmail: DoS or information disclosure when logging long messages fetchmail: STARTTLS session encryption bypassing
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
5.9
null
null
RHSA-2003:405
Red Hat Security Advisory: : Updated apache packages fix minor security vulnerability
security flaw
[ "cpe:/o:redhat:linux:7.1", "cpe:/o:redhat:linux:7.2", "cpe:/o:redhat:linux:7.3" ]
null
null
null
null
RHSA-2023:7878
Red Hat Security Advisory: postgresql:10 security update
postgresql: Buffer overrun from integer overflow in array modification
[ "cpe:/a:redhat:rhel_aus:8.4::appstream", "cpe:/a:redhat:rhel_e4s:8.4::appstream", "cpe:/a:redhat:rhel_tus:8.4::appstream" ]
null
8.8
null
null
RHSA-2022:0290
Red Hat Security Advisory: parfait:0.5 security update
log4j: Remote code execution in Log4j 1.x when application is configured to use JMSAppender log4j: Remote code execution in Log4j 1.x when application is configured to use JMSSink log4j: SQL injection in Log4j 1.x when application is configured to use JDBCAppender log4j: Unsafe deserialization flaw in Chainsaw log viewer
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
8.8
null
null
RHSA-2018:0855
Red Hat Security Advisory: ntp security, bug fix, and enhancement update
ntp: Buffer Overflow in DPTS Clock ntp: Authenticated DoS via Malicious Config Option ntp: Denial of Service via Malformed Config
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
5.3
null
RHSA-2003:262
Red Hat Security Advisory: pam_smb security update
security flaw
[ "cpe:/o:redhat:enterprise_linux:2.1::as", "cpe:/o:redhat:enterprise_linux:2.1::aw", "cpe:/o:redhat:enterprise_linux:2.1::es", "cpe:/o:redhat:enterprise_linux:2.1::ws" ]
null
null
null
null
RHSA-2024:3431
Red Hat Security Advisory: pcs security update
rubygem-rack: Denial of Service Vulnerability in Rack Content-Type Parsing rubygem-rack: Possible DoS Vulnerability with Range Header in Rack rubygem-rack: Possible Denial of Service Vulnerability in Rack Header Parsing
[ "cpe:/a:redhat:rhel_eus:8.6::highavailability", "cpe:/a:redhat:rhel_eus:8.6::resilientstorage" ]
null
5.3
null
null
RHSA-2021:4743
Red Hat Security Advisory: llvm-toolset:rhel8 security update
environment: Unicode's bidirectional (BiDi) override characters can cause trojan source attacks
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
8.5
null
null
RHSA-2024:5442
Red Hat Security Advisory: OpenShift Container Platform 4.15.28 packages and security update
golang: net/http: golang: mime/multipart: golang: net/textproto: memory exhaustion in Request.ParseMultipartForm golang: net/netip: Unexpected behavior from Is methods for IPv4-mapped IPv6 addresses
[ "cpe:/a:redhat:openshift:4.15::el8", "cpe:/a:redhat:openshift:4.15::el9" ]
null
6.7
null
null
RHSA-2021:1968
Red Hat Security Advisory: mingw packages security and bug fix update
sqlite: Division by zero in whereLoopAddBtreeIndex in sqlite3.c sqlite: integer overflow in sqlite3_str_vappendf function in printf.c sqlite: Use-after-free in fts3EvalNextRow in ext/fts3/fts3.c sqlite: Virtual table can be renamed into the name of one of its shadow tables sqlite: NULL pointer dereference in ext/fts3/fts3_snippet.c via a crafted matchinfo() query
[ "cpe:/a:redhat:enterprise_linux:8::crb" ]
null
5.5
6.5
null
RHSA-2024:4501
Red Hat Security Advisory: firefox security update
Mozilla: Race condition in permission assignment Mozilla: Memory corruption in thread creation Mozilla: Memory safety bugs fixed in Firefox 128, Firefox ESR 115.13, and Thunderbird 115.13
[ "cpe:/a:redhat:rhel_e4s:9.0::appstream" ]
null
7.5
null
null
RHSA-2021:0986
Red Hat Security Advisory: AMQ Online 1.7.0 release and security update
fabric8-kubernetes-client: vulnerable to a path traversal leading to integrity and availability compromise netty: Information disclosure via the local system temporary directory netty: possible request smuggling in HTTP/2 due missing validation
[ "cpe:/a:redhat:amq_online:1.7" ]
null
5.9
null
null
RHSA-2022:1360
Red Hat Security Advisory: Red Hat Fuse 7.10.2 release and security update
spring-framework: RCE via Data Binding on JDK 9+
[ "cpe:/a:redhat:jboss_fuse:7" ]
null
8.1
null
null
RHSA-2012:0019
Red Hat Security Advisory: php53 and php security update
php: integer overflow in exif_process_IFD_TAG() may lead to DoS or arbitrary memory disclosure php: hash table collisions CPU usage DoS (oCERT-2011-003)
[ "cpe:/o:redhat:enterprise_linux:5::client_workstation", "cpe:/o:redhat:enterprise_linux:5::server", "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
null
null
RHSA-2012:0040
Red Hat Security Advisory: mod_cluster-native security update
mod_cluster: malicious worker nodes can register on any vhost
[ "cpe:/a:redhat:jboss_enterprise_web_platform:5.1" ]
null
null
null
null
RHSA-2021:4122
Red Hat Security Advisory: kpatch-patch security update
kernel: use-after-free in drivers/infiniband/core/ucma.c ctx use-after-free kernel: out-of-bounds write due to a heap buffer overflow in __hidinput_change_resolution_multipliers() of hid-input.c
[ "cpe:/o:redhat:enterprise_linux:8::baseos" ]
null
7.8
null
null
RHSA-2024:9901
Red Hat Security Advisory: tigervnc security update
xorg-x11-server: tigervnc: heap-based buffer overflow privilege escalation vulnerability
[ "cpe:/o:redhat:rhel_els:7" ]
null
7.8
null
null
RHSA-2003:162
Red Hat Security Advisory: : : : Updated Mozilla packages fix security vulnerability.
security flaw
[ "cpe:/o:redhat:linux:7.1", "cpe:/o:redhat:linux:7.2", "cpe:/o:redhat:linux:7.3", "cpe:/o:redhat:linux:8.0" ]
null
null
null
null
RHSA-2016:1166
Red Hat Security Advisory: python27 security, bug fix, and enhancement update
python: ssl.match_hostname() DoS via certificates with specially crafted hostname wildcard patterns python: wildcard matching rules do not follow RFC 6125
[ "cpe:/a:redhat:rhel_software_collections:2::el6", "cpe:/a:redhat:rhel_software_collections:2::el7" ]
null
null
null
null
RHSA-2023:5532
Red Hat Security Advisory: nodejs security and bug fix update
nodejs: Permissions policies can be bypassed via Module._load nodejs: Permissions policies can impersonate other modules in using module.constructor.createRequire() nodejs: Permissions policies can be bypassed via process.binding
[ "cpe:/a:redhat:enterprise_linux:9::appstream" ]
null
7.5
null
null
RHSA-2023:0272
Red Hat Security Advisory: Red Hat support for Spring Boot 2.7.2.SP1 security update
tomcat: local privilege escalation vulnerability
[ "cpe:/a:redhat:openshift_application_runtimes:1.0" ]
null
7
null
null
RHSA-2011:1253
Red Hat Security Advisory: kernel-rt security and bug fix update
kernel: mm: mem allocated invisible to oom_kill() when not attached to any threads kernel: sctp: a race between ICMP protocol unreachable and connect() kernel: no access restrictions of /proc/pid/* after setuid program exec kernel: /sys/kernel/debug/acpi/custom_method can bypass module restrictions kernel: nfs4: Ensure that ACL pages sent over NFS were not allocated from the slab kernel: tpm infoleaks kernel: gro: reset dev and skb_iff on skb reuse kernel: DoS (crash) due slab corruption in inotify_init1 (incomplete fix for CVE-2010-4250) kernel: drivers/scsi/mpt2sas: prevent heap overflows kernel: drivers/scsi/mpt2sas: prevent heap overflows kernel: net: Fix memory leak/corruption on VLAN GRO_DROP kernel: corrupted GUID partition tables can cause kernel oops kernel: cifs session reuse kernel: proc: signedness issue in next_pidmap() kernel: missing check in can/bcm and can/raw socket releases kernel: agp: insufficient pg_start parameter checking in AGPIOC_BIND and AGPIOC_UNBIND ioctls kernel: agp: insufficient page_count parameter checking in agp_allocate_memory() kernel: missing check in can/bcm and can/raw socket releases kernel: netns vs proto registration ordering kernel: netns vs proto registration ordering kernel: dccp: handle invalid feature options length kernel: validate size of EFI GUID partition entries kernel: agp: insufficient pg_start parameter checking in AGPIOC_BIND and AGPIOC_UNBIND ioctls kernel: ksm: race between ksmd and exiting task kernel: inet_diag: insufficient validation kernel: taskstats: duplicate entries in listener mode can lead to DoS kernel: rpc task leak after flock()ing NFS share kernel: bluetooth: l2cap and rfcomm: fix 1 byte infoleak to userspace kernel: /proc/PID/io infoleak kernel: mm: avoid wrapping vm_pgoff in mremap() and stack expansions kernel: bluetooth: buffer overflow in l2cap config request kernel: nl80211: missing check for valid SSID size in scan operations kernel: ext4: kernel panic when writing data to the last block of sparse file
[ "cpe:/a:redhat:enterprise_mrg:2:server:el6" ]
null
null
null
null
RHSA-2017:0263
Red Hat Security Advisory: java-1.8.0-ibm security update
OpenJDK: incorrect ECDSA signature extraction from the DER input (Libraries, 8168714) OpenJDK: missing ObjectIdentifier length check (Libraries, 8168705) OpenJDK: DSA implementation timing attack (Libraries, 8168728) OpenJDK: ECDSA implementation timing attack (Libraries, 8168724) OpenJDK: incorrect URL parsing in URLStreamHandler (Networking, 8167223) OpenJDK: URLClassLoader insufficient access control checks (Networking, 8151934) OpenJDK: untrusted input deserialization in RMI registry and DCG (RMI, 8156802) OpenJDK: LdapLoginModule incorrect userDN extraction (JAAS, 8161743) OpenJDK: imageio PNGImageReader failed to honor ignoreMetadata for iTXt and zTXt chunks (2D, 8166988) JDK: unspecified vulnerability fixed in 6u141, 7u131, and 8u121 (Deployment) OpenJDK: integer overflow in SocketOutputStream boundary check (Networking, 8164147) OpenJDK: insufficient protected field access checks in atomic field updaters (Libraries, 8165344) OpenJDK: insecure class construction (Hotspot, 8167104)
[ "cpe:/a:redhat:rhel_extras:6", "cpe:/a:redhat:rhel_extras:7" ]
null
null
8.8
null
RHSA-2006:0677
Red Hat Security Advisory: thunderbird security update
security flaw security flaw security flaw security flaw security flaw security flaw seamonkey < 1.0.5 multiple vulnerabilities; to replace Mozilla
[ "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws" ]
null
null
null
null
RHSA-2018:1949
Red Hat Security Advisory: ansible security and bug fix update
ansible: Failed tasks do not honour no_log option allowing for secrets to be disclosed in logs
[ "cpe:/a:redhat:ansible_engine:2.5::el7" ]
null
null
5.9
null
RHSA-2013:0157
Red Hat Security Advisory: tomcat6 security update
Web: Bypass of security constraints
[ "cpe:/a:redhat:jboss_enterprise_web_server:1.0.2" ]
null
null
null
null
RHSA-2024:10176
Red Hat Security Advisory: Red Hat build of Keycloak 24.0.9 Update
org.keycloak/keycloak-quarkus-server: Keycloak proxy header handling Denial-of-Service (DoS) vulnerability keycloak-core: mTLS passthrough org.keycloak:keycloak-services: Keycloak Denial of Service org.keycloak:keycloak-quarkus-server: Sensitive Data Exposure in Keycloak Build Process keycloak-quarkus-server: Keycloak path trasversal
[ "cpe:/a:redhat:build_keycloak:24" ]
null
5.9
2.7
null
RHSA-2020:0230
Red Hat Security Advisory: python-reportlab security update
python-reportlab: code injection in colors.py allows attacker to execute code
[ "cpe:/a:redhat:rhel_e4s:8.0::appstream" ]
null
null
9.8
null
RHSA-2022:0634
Red Hat Security Advisory: rpm security update
rpm: RPM does not require subkeys to have a valid binding signature
[ "cpe:/a:redhat:rhel_eus:8.2::appstream", "cpe:/o:redhat:rhel_eus:8.2::baseos" ]
null
4.4
null
null
RHSA-2021:3317
Red Hat Security Advisory: microcode_ctl security, bug fix and enhancement update
hw: Special Register Buffer Data Sampling (SRBDS) hw: Vector Register Data Sampling hw: L1D Cache Eviction Sampling hw: Information disclosure issue in Intel SGX via RAPL interface hw: Vector Register Leakage-Active hw: Fast forward store predictor hw: vt-d related privilege escalation hw: improper isolation of shared resources in some Intel Processors hw: observable timing discrepancy in some Intel Processors
[ "cpe:/o:redhat:rhel_aus:7.6::server", "cpe:/o:redhat:rhel_e4s:7.6::server", "cpe:/o:redhat:rhel_tus:7.6::server" ]
null
2.8
6.5
null
RHSA-2015:2535
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 5.2 security update
apache-commons-collections: InvokerTransformer code execution during deserialisation
[ "cpe:/a:redhat:jboss_enterprise_application_platform:5::el4", "cpe:/a:redhat:jboss_enterprise_application_platform:5::el5", "cpe:/a:redhat:jboss_enterprise_application_platform:5::el6" ]
null
null
null
null
RHSA-2023:6290
Red Hat Security Advisory: python security update
python: TLS handshake bypass
[ "cpe:/o:redhat:rhel_els:6" ]
null
8.6
null
null
RHSA-2022:7054
Red Hat Security Advisory: OpenJDK 11.0.17 Security Update for Portable Linux Builds
OpenJDK: improper MultiByte conversion can lead to buffer overflow (JGSS, 8286077) OpenJDK: improper handling of long NTLM client hostnames (Security, 8286526) OpenJDK: insufficient randomization of JNDI DNS port numbers (JNDI, 8286910) OpenJDK: excessive memory allocation in X.509 certificate parsing (Security, 8286533) OpenJDK: HttpServer no connection count limit (Lightweight HTTP Server, 8286918) OpenJDK: missing SNI caching in HTTP/2 (Networking, 8289366)
[ "cpe:/a:redhat:openjdk:11" ]
null
3.7
null
null
RHSA-2018:3127
Red Hat Security Advisory: 389-ds-base security, bug fix, and enhancement update
389-ds-base: Mishandled search requests in servers/slapd/search.c:do_search() allows for denial of service
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
7.5
null
RHSA-2022:7410
Red Hat Security Advisory: Red Hat Single Sign-On 7.6.1 security update on RHEL 8
jackson-databind: denial of service via a large depth of nested objects h2: Remote Code Execution in Console owasp-java-html-sanitizer: improper policies enforcement may lead to remote code execution netty: control chars in header names may lead to HTTP request smuggling xnio: org.xnio.StreamConnection.notifyReadClosed log to debug instead of stderr keycloak: Stored XSS in groups dropdown jboss-client: memory leakage in remote client transaction wildfly: Wildfly management of EJB Session context returns wrong caller principal with Elytron Security enabled undertow: Double AJP response for 400 from EAP 7 results in CPING failures keycloak: Uploading of SAML javascript protocol mapper scripts through the admin console artemis-commons: Apache ActiveMQ Artemis DoS
[ "cpe:/a:redhat:red_hat_single_sign_on:7.6::el8" ]
null
7.5
null
null
RHSA-2017:2635
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 6.4.17 update on RHEL 6
log4j: Socket receiver deserialization vulnerability tomcat: Security constrained bypass in error page mechanism jackson-databind: Deserialization vulnerability via readValue method of ObjectMapper
[ "cpe:/a:redhat:jboss_enterprise_application_platform:6::el6" ]
null
null
8.1
null
RHSA-2023:6821
Red Hat Security Advisory: mariadb:10.5 security update
mariadb: node crashes with Transport endpoint is not connected mysqld got signal 6
[ "cpe:/a:redhat:rhel_aus:8.4::appstream", "cpe:/a:redhat:rhel_e4s:8.4::appstream", "cpe:/a:redhat:rhel_tus:8.4::appstream" ]
null
7.5
null
null
RHSA-2022:5834
Red Hat Security Advisory: kernel-rt security and bug fix update
kernel: Small table perturb size in the TCP source port generation algorithm can lead to information leak kernel: a use-after-free write in the netfilter subsystem can lead to privilege escalation to root
[ "cpe:/a:redhat:enterprise_linux:8::nfv", "cpe:/a:redhat:enterprise_linux:8::realtime" ]
null
7.8
null
null
RHSA-2024:5962
Red Hat Security Advisory: python39:3.9 and python39-devel:3.9 security update
python: incorrect IPv4 and IPv6 private ranges pypa/setuptools: Remote code execution via download functions in the package_index module in pypa/setuptools cpython: python: email module doesn't properly quotes newlines in email headers, allowing header injection python: cpython: Iterating over a malicious ZIP file may lead to Denial of Service
[ "cpe:/a:redhat:enterprise_linux:8::appstream", "cpe:/a:redhat:enterprise_linux:8::crb" ]
null
5.3
null
null
RHSA-2020:0694
Red Hat Security Advisory: OpenShift Container Platform 4.1.38 security update
openshift/mediawiki-apb: /etc/passwd is given incorrect privileges openshift/mariadb-apb: /etc/passwd is given incorrect privileges openshift/apb-base: /etc/passwd is given incorrect privileges openshift/postgresql-apb: /etc/passwd is given incorrect privileges openshift/mysql-apb: /etc/passwd is given incorrect privileges openshift/mediawiki: /etc/passwd is given incorrect privileges
[ "cpe:/a:redhat:openshift:4.1::el7" ]
null
7
null
null
RHSA-2021:0494
Red Hat Security Advisory: Red Hat JBoss Web Server 5.4.1 Security Update
openssl: EDIPARTYNAME NULL pointer de-reference tomcat: Apache Tomcat HTTP/2 Request mix-up tomcat: HTTP/2 request header mix-up tomcat: Information disclosure when using NTFS file system
[ "cpe:/a:redhat:jboss_enterprise_web_server:5.4::el7", "cpe:/a:redhat:jboss_enterprise_web_server:5.4::el8" ]
null
5.9
null
null
RHBA-2007:0304
Red Hat Bug Fix Advisory: Updated kernel packages available for Red Hat Enterprise Linux 4 Update 5
security flaw security flaw security flaw security flaw IPv6 oops triggerable by any user security flaw
[ "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws" ]
null
null
null
null
RHSA-2020:5483
Red Hat Security Advisory: gnutls security and bug fix update
gnutls: Heap buffer overflow in handshake with no_renegotiation alert sent
[ "cpe:/a:redhat:enterprise_linux:8::appstream", "cpe:/o:redhat:enterprise_linux:8::baseos" ]
null
7.5
null
null
RHSA-2021:4595
Red Hat Security Advisory: binutils security update
environment: Unicode's bidirectional (BiDi) override characters can cause trojan source attacks
[ "cpe:/a:redhat:enterprise_linux:8::appstream", "cpe:/o:redhat:enterprise_linux:8::baseos" ]
null
8.5
null
null
RHSA-2009:1457
Red Hat Security Advisory: kernel security update
kernel: r8169: fix crash when large packets are received kernel: uninit op in SOCKOPS_WRAP() leads to privesc kernel: udp socket NULL ptr dereference
[ "cpe:/o:redhat:rhel_eus:5.2" ]
null
null
null
null
RHSA-2019:1543
Red Hat Security Advisory: Red Hat JBoss Core Services Apache HTTP Server 2.4.29 SP2 security update
ROHNP: Key Extraction Side Channel in Multiple Crypto Libraries openssl: Malicious server can send large prime to client during DH(E) TLS handshake causing the client to hang libxml2: NULL pointer dereference in xmlXPathCompOpEval() function in xpath.c curl: Integer overflow leading to heap-based buffer overflow in Curl_sasl_create_plain_message() curl: Use-after-free when closing "easy" handle in Curl_close() curl: Heap-based buffer over-read in the curl tool warning formatting curl: NTLM type-2 heap out-of-bounds buffer read curl: Out-of-bounds read in code handling HTTP/2 trailers curl: HTTP authentication leak in redirects curl: FTP path trickery leads to NIL byte out of bounds write curl: LDAP NULL pointer dereference curl: RTSP RTP buffer over-read httpd: privilege escalation from modules scripts curl: NTLMv2 type-3 header stack buffer overflow curl: SMTP end-of-response out-of-bounds read curl: TFTP receive heap buffer overflow in tftp_receive_packet() function
[ "cpe:/a:redhat:jboss_core_services:1" ]
null
7
4.3
null
RHSA-2008:0135
Red Hat Security Advisory: tk security update
Tk GIF processing buffer overflow tk: GIF handling buffer overflow
[ "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws" ]
null
null
null
null
RHSA-2016:2126
Red Hat Security Advisory: kernel security update
kernel: mm: privilege escalation via MAP_PRIVATE COW breakage
[ "cpe:/o:redhat:rhel_aus:5.9" ]
null
null
7.8
null
RHSA-2005:748
Red Hat Security Advisory: php security update
security flaw
[ "cpe:/o:redhat:enterprise_linux:3::as", "cpe:/o:redhat:enterprise_linux:3::desktop", "cpe:/o:redhat:enterprise_linux:3::es", "cpe:/o:redhat:enterprise_linux:3::ws", "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws" ]
null
null
null
null
RHSA-2024:1865
Red Hat Security Advisory: Red Hat Single Sign-On 7.6.8 Operator enhancement and security update
keycloak: Log Injection during WebAuthn authentication or registration
[ "cpe:/a:redhat:rhosemc:1.0::el8" ]
null
5.3
null
null
RHSA-2009:1550
Red Hat Security Advisory: kernel security and bug fix update
kernel: Unix sockets kernel panic kernel: fix soft lockups/OOM issues with unix socket garbage collector kernel: exit_notify: kill the wrong capable(CAP_KILL) check kernel: e1000_clean_rx_irq() denial of service kernel: personality: fix PER_CLEAR_ON_SETID kernel: execve: must clear current->clear_child_tid kernel: numerous getname() infoleaks kernel: fs: pipe.c null pointer dereference
[ "cpe:/o:redhat:enterprise_linux:3::as", "cpe:/o:redhat:enterprise_linux:3::desktop", "cpe:/o:redhat:enterprise_linux:3::es", "cpe:/o:redhat:enterprise_linux:3::ws" ]
null
null
null
null
RHSA-2018:2102
Red Hat Security Advisory: Red Hat OpenStack Platform 10 Security, Bug Fix, and Enhancement Advisory
dpdk: Information exposure in unchecked guest physical to host virtual address translations
[ "cpe:/a:redhat:openstack:10::el7" ]
null
null
6.1
null
RHSA-2022:0514
Red Hat Security Advisory: firefox security update
Mozilla: Extensions could have bypassed permission confirmation during update Mozilla: Drag and dropping an image could have resulted in the dropped object being an executable Mozilla: Sandboxed iframes could have executed script if the parent appended elements Mozilla: Cross-Origin responses could be distinguished between script and non-script content-types Mozilla: frame-ancestors Content Security Policy directive was not enforced for framed extension pages Mozilla: Script Execution during invalid object state Mozilla: Memory safety bugs fixed in Firefox 97 and Firefox ESR 91.6
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
8.8
null
null
RHSA-2018:1879
Red Hat Security Advisory: glibc security and bug fix update
glibc: Buffer overflow in glob with GLOB_TILDE glibc: Buffer overflow during unescaping of user names with the ~ operator
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
5.5
null
RHSA-2024:0975
Red Hat Security Advisory: postgresql:13 security update
postgresql: non-owner 'REFRESH MATERIALIZED VIEW CONCURRENTLY' executes arbitrary SQL
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
8
null
null
RHSA-2019:2827
Red Hat Security Advisory: kernel security update
kernel: vhost-net: guest to host kernel escape during migration
[ "cpe:/a:redhat:enterprise_linux:8::crb", "cpe:/o:redhat:enterprise_linux:8::baseos" ]
null
null
7.2
null
RHSA-2011:0862
Red Hat Security Advisory: subversion security update
(mod_dav_svn): DoS (crash) via request to deliver baselined WebDAV resources (mod_dav_svn): DoS (excessive memory use) when configured to provide path-based access control (mod_dav_svn): File contents disclosure of files configured to be unreadable by those users
[ "cpe:/o:redhat:enterprise_linux:5::server", "cpe:/o:redhat:enterprise_linux:6::server" ]
null
null
null
null
RHSA-2020:0983
Red Hat Security Advisory: Red Hat Fuse 7.6.0 security update
jquery: Cross-site scripting via cross-domain ajax requests logback: Serialization vulnerability in SocketServer and ServerSocketReceiver js-jquery: XSS in responses from cross-origin ajax requests apache-commons-compress: ZipArchiveInputStream.read() fails to identify correct EOF allowing for DoS via crafted zip jetty: full server path revealed when using the default Error Handling springframework: DoS Attack via Range Requests spring-data-api: potential information disclosure through maliciously crafted example value in ExampleMatcher undertow: leak credentials to log files UndertowLogger.REQUEST_LOGGER.undertowRequestFailed c3p0: loading XML configuration leads to denial of service HTTP/2: flood using PING frames results in unbounded memory growth HTTP/2: flood using PRIORITY frames results in excessive resource consumption HTTP/2: flood using HEADERS frames results in unbounded memory growth HTTP/2: flood using SETTINGS frames results in unbounded memory growth HTTP/2: 0-length headers lead to denial of service HTTP/2: request for large response leads to denial of service HTTP/2: flood using empty frames results in excessive resource consumption infinispan: invokeAccessibly method from ReflectionUtil class allows to invoke private methods undertow: Information leak in requests for directories without trailing slashes jetty: using specially formatted URL against DefaultServlet or ResourceHandler leads to XSS conditions jetty: error path information disclosure spring-security-core: mishandling of user passwords allows logging in with a password of NULL jackson-databind: failure to block the logback-core class from polymorphic deserialization leading to remote code execution shiro: Cookie padding oracle vulnerability with default configuration jackson-databind: polymorphic typing issue allows attacker to read arbitrary local files on the server via crafted JSON message. jackson-databind: default typing mishandling leading to remote code execution jackson-databind: Polymorphic typing issue related to logback/JNDI xmlrpc: Deserialization of server-side exception from faultCause in XMLRPC error response
[ "cpe:/a:redhat:jboss_fuse:7" ]
null
null
9.8
null
RHSA-2009:1159
Red Hat Security Advisory: libtiff security update
libtiff: LZWDecodeCompat underflow libtiff: integer overflows in various inter-color spaces conversion tools (crash, ACE)
[ "cpe:/o:redhat:enterprise_linux:3::as", "cpe:/o:redhat:enterprise_linux:3::desktop", "cpe:/o:redhat:enterprise_linux:3::es", "cpe:/o:redhat:enterprise_linux:3::ws", "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws", "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::client_workstation", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
RHSA-2020:1460
Red Hat Security Advisory: kernel security and bug fix update
hardware: bluetooth: BR/EDR encryption key negotiation attacks (KNOB)
[ "cpe:/o:redhat:rhel_aus:7.2::server" ]
null
null
7
null
RHSA-2018:2943
Red Hat Security Advisory: java-1.8.0-openjdk security update
OpenJDK: Incorrect handling of unsigned attributes in signed Jar manifests (Security, 8194534) OpenJDK: Leak of sensitive header data via HTTP redirect (Networking, 8196902) OpenJDK: Incomplete enforcement of the trustURLCodebase restriction (JNDI, 8199177) OpenJDK: Improper field access checks (Hotspot, 8199226) OpenJDK: Missing endpoint identification algorithm check during TLS session resumption (JSSE, 8202613) OpenJDK: Unrestricted access to scripting engine (Scripting, 8202936) OpenJDK: Infinite loop in RIFF format reader (Sound, 8205361)
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
5.3
null
RHSA-2022:6292
Red Hat Security Advisory: Red Hat AMQ Broker 7.8.7 release and security update
activemq-artemis: AMQ Broker web console HTML Injection
[ "cpe:/a:redhat:amq_broker:7" ]
null
6.1
null
null
RHSA-2024:0538
Red Hat Security Advisory: libssh security update
libssh: NULL pointer dereference during rekeying with algorithm guessing libssh: authorization bypass in pki_verify_data_signature ssh: Prefix truncation attack on Binary Packet Protocol (BPP)
[ "cpe:/a:redhat:rhel_eus:8.6::appstream", "cpe:/o:redhat:rhel_eus:8.6::baseos" ]
null
5.9
null
null
RHSA-2020:2391
Red Hat Security Advisory: Red Hat build of Eclipse Vert.x 3.9.1 security update
log4j: improper validation of certificate with host mismatch in SMTP appender
[ "cpe:/a:redhat:openshift_application_runtimes:1.0" ]
null
3.7
null
null
RHSA-2024:1458
Red Hat Security Advisory: OpenShift Container Platform 4.14.18 bug fix and security update
golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487) opentelemetry-go-contrib: DoS vulnerability in otelgrpc due to unbound cardinality metrics
[ "cpe:/a:redhat:openshift:4.14::el8", "cpe:/a:redhat:openshift:4.14::el9" ]
null
7.5
null
null
RHEA-2019:3845
Red Hat Enhancement Advisory: microcode_ctl bug fix and enhancement update
hw: Intel SGX information leak
[ "cpe:/o:redhat:enterprise_linux:8::baseos" ]
null
null
6
null
RHSA-2009:1648
Red Hat Security Advisory: ntp security update
ntpd: DoS with mode 7 packets (VU#568372)
[ "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws", "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
RHSA-2022:0826
Red Hat Security Advisory: .NET 6.0 security and bugfix update
dotnet: ASP.NET Denial of Service via FormPipeReader dotnet: double parser stack buffer overrun
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
6.3
null
null
RHSA-2017:3267
Red Hat Security Advisory: java-1.8.0-ibm security update
lcms2: Out-of-bounds read in Type_MLU_Read() OpenJDK: multiple unbounded memory allocations in deserialization (Serialization, 8174109) OpenJDK: incorrect privilege use when handling unreferenced objects (RMI, 8174966) OpenJDK: HTTP client insufficient check for newline in URLs (Networking, 8176751) JDK: unspecified vulnerability fixed in 8u151 and 9.0.1 (Deployment) OpenJDK: unbounded resource use in JceKeyStore deserialization (Serialization, 8181370) OpenJDK: insufficient loader constraints checks for invokespecial (Hotspot, 8180711) OpenJDK: unbounded memory allocation in SimpleTimeZone deserialization (Serialization, 8181323) OpenJDK: multiple unbounded memory allocations in deserialization (Libraries, 8181432) OpenJDK: unbounded memory allocation in PredicatedNodeTest deserialization (JAXP, 8181327) OpenJDK: unbounded memory allocation in JAXWSExceptionBase deserialization (JAX-WS, 8181100) OpenJDK: no default network operations timeouts in FtpClient (Networking, 8181612) OpenJDK: weak protection of key stores against brute forcing (Security, 8181692) OpenJDK: unbounded memory allocation in ObjectInputStream deserialization (Serialization, 8181597) OpenJDK: use of unprotected sname in Kerberos client (Libraries, 8178794)
[ "cpe:/a:redhat:rhel_extras:6" ]
null
null
6.8
null
RHSA-2018:0585
Red Hat Security Advisory: rh-ruby23-ruby security, bug fix, and enhancement update
ruby: Buffer underrun vulnerability in Kernel.sprintf rubygems: Escape sequence in the "summary" field of gemspec rubygems: No size limit in summary length of gem spec rubygems: Arbitrary file overwrite due to incorrect validation of specification name rubygems: DNS hijacking vulnerability rubygems: Unsafe object deserialization through YAML formatted gem specifications ruby: Escape sequence injection vulnerability in the Basic authentication of WEBrick ruby: Buffer underrun in OpenSSL ASN1 decode ruby: Arbitrary heap exposure during a JSON.generate call ruby: Command injection vulnerability in Net::FTP ruby: Command injection in lib/resolv.rb:lazy_initialize() allows arbitrary code execution
[ "cpe:/a:redhat:rhel_software_collections:3::el6", "cpe:/a:redhat:rhel_software_collections:3::el7" ]
null
null
8.1
null
RHSA-2024:4367
Red Hat Security Advisory: pki-core security update
ca: token authentication bypass vulnerability
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
7.5
null
null
RHSA-2020:0947
Red Hat Security Advisory: Red Hat Single Sign-On 7.3.7 security update on RHEL 8
keycloak: failedLogin Event not sent to BruteForceProtector when using Post Login Flow with Conditional-OTP
[ "cpe:/a:redhat:red_hat_single_sign_on:7::el8" ]
null
5.6
null
null
RHSA-2019:4090
Red Hat Security Advisory: OpenShift Container Platform 4.1 libseccomp-golang security update
libseccomp-golang: mishandling of multiple argument rules leading to a bypass of intended access restrictions
[ "cpe:/a:redhat:openshift:4.1::el7" ]
null
null
6.5
null
RHSA-2010:0981
Red Hat Security Advisory: HelixPlayer removal
HelixPlayer multiple flaws (CVE-2010-2997, CVE-2010-4375, CVE-2010-4378, CVE-2010-4379, CVE-2010-4382, CVE-2010-4383, CVE-2010-4385, CVE-2010-4386, CVE-2010-4392, CVE-2010-4376) HelixPlayer multiple flaws (CVE-2010-2997, CVE-2010-4375, CVE-2010-4378, CVE-2010-4379, CVE-2010-4382, CVE-2010-4383, CVE-2010-4385, CVE-2010-4386, CVE-2010-4392, CVE-2010-4376) HelixPlayer multiple flaws (CVE-2010-2997, CVE-2010-4375, CVE-2010-4378, CVE-2010-4379, CVE-2010-4382, CVE-2010-4383, CVE-2010-4385, CVE-2010-4386, CVE-2010-4392, CVE-2010-4376) HelixPlayer multiple flaws (CVE-2010-2997, CVE-2010-4375, CVE-2010-4378, CVE-2010-4379, CVE-2010-4382, CVE-2010-4383, CVE-2010-4385, CVE-2010-4386, CVE-2010-4392, CVE-2010-4376) HelixPlayer multiple flaws (CVE-2010-2997, CVE-2010-4375, CVE-2010-4378, CVE-2010-4379, CVE-2010-4382, CVE-2010-4383, CVE-2010-4385, CVE-2010-4386, CVE-2010-4392, CVE-2010-4376) HelixPlayer multiple flaws (CVE-2010-2997, CVE-2010-4375, CVE-2010-4378, CVE-2010-4379, CVE-2010-4382, CVE-2010-4383, CVE-2010-4385, CVE-2010-4386, CVE-2010-4392, CVE-2010-4376) HelixPlayer multiple flaws (CVE-2010-2997, CVE-2010-4375, CVE-2010-4378, CVE-2010-4379, CVE-2010-4382, CVE-2010-4383, CVE-2010-4385, CVE-2010-4386, CVE-2010-4392, CVE-2010-4376) HelixPlayer multiple flaws (CVE-2010-2997, CVE-2010-4375, CVE-2010-4378, CVE-2010-4379, CVE-2010-4382, CVE-2010-4383, CVE-2010-4385, CVE-2010-4386, CVE-2010-4392, CVE-2010-4376) HelixPlayer multiple flaws (CVE-2010-2997, CVE-2010-4375, CVE-2010-4378, CVE-2010-4379, CVE-2010-4382, CVE-2010-4383, CVE-2010-4385, CVE-2010-4386, CVE-2010-4392, CVE-2010-4376) HelixPlayer multiple flaws (CVE-2010-2997, CVE-2010-4375, CVE-2010-4378, CVE-2010-4379, CVE-2010-4382, CVE-2010-4383, CVE-2010-4385, CVE-2010-4386, CVE-2010-4392, CVE-2010-4376)
[ "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws" ]
null
null
null
null
RHSA-2011:1251
Red Hat Security Advisory: JBoss Enterprise Portal Platform 5.1.1 update
JBoss Seam privilege escalation caused by EL interpolation in FacesMessages
[ "cpe:/a:redhat:jboss_enterprise_portal_platform:5" ]
null
null
null
null
RHSA-2023:3388
Red Hat Security Advisory: kernel security, bug fix, and enhancement update
kernel: use-after-free caused by l2cap_reassemble_sdu() in net/bluetooth/l2cap_core.c kernel: stack overflow in do_proc_dointvec and proc_skip_spaces kernel: unmap_mapping_range() race with munmap() on VM_PFNMAP mappings leads to stale TLB entry kernel: use-after-free related to leaf anon_vma double reuse
[ "cpe:/a:redhat:rhel_eus:8.6::crb", "cpe:/o:redhat:rhel_eus:8.6::baseos", "cpe:/o:redhat:rhev_hypervisor:4.4::el8" ]
null
5.5
null
null
RHSA-2020:1428
Red Hat Security Advisory: Open Liberty 20.0.0.4 Runtime security update
Open Liberty 20.0.0.4 Runtime is now available from the Customer Portal. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
[ "cpe:/a::openliberty:20" ]
null
null
null
null
RHSA-2021:0710
Red Hat Security Advisory: container-tools:2.0 security update
podman: container users permissions are not respected in privileged containers
[ "cpe:/a:redhat:rhel_eus:8.2::appstream" ]
null
7
null
null
RHSA-2023:4829
Red Hat Security Advisory: kpatch-patch security update
kernel: ipvlan: out-of-bounds write caused by unclear skb->cb kernel: cls_flower: out-of-bounds write in fl_set_geneve_opt()
[ "cpe:/o:redhat:rhel_e4s:8.2::baseos" ]
null
7.8
null
null
RHSA-2023:7264
Red Hat Security Advisory: open-vm-tools security update
open-vm-tools: SAML token signature bypass open-vm-tools: file descriptor hijack vulnerability in the vmware-user-suid-wrapper
[ "cpe:/a:redhat:rhel_eus:8.8::appstream" ]
null
7.4
null
null
RHSA-2015:0816
Red Hat Security Advisory: chromium-browser security update
chromium-browser: Cross-origin-bypass in HTML parser chromium-browser: Cross-origin-bypass in Blink chromium-browser: Use-after-free in IPC chromium-browser: Out-of-bounds write in Skia chromium-browser: Out-of-bounds read in WebGL chromium-browser: tap-jacking vulnerability chromium-browser: Type confusion in V8 chromium-browser: HSTS bypass in WebSockets chromium-browser: Use-after-free in PDFium chromium-browser: Out-of-bounds read in Blink chromium-browser: Scheme issues in OpenSearch chromium-browser: SafeBrowsing bypass chromium-browser: Various fixes from internal audits, fuzzing and other initiatives
[ "cpe:/a:redhat:rhel_extras:6" ]
null
null
null
null
RHSA-2015:0112
Red Hat Security Advisory: libyaml security update
libyaml: assert failure when processing wrapped strings
[ "cpe:/a:redhat:rhel_software_collections:1::el6" ]
null
null
null
null
RHSA-2013:1220
Red Hat Security Advisory: xml-security security update
Java: XML signature spoofing
[ "cpe:/a:redhat:jboss_enterprise_web_platform:5.2.0" ]
null
null
null
null
RHSA-2011:0452
Red Hat Security Advisory: libtiff security update
libtiff ojpeg buffer overflow
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
null
null
RHSA-2022:8962
Red Hat Security Advisory: Red Hat Single Sign-On 7.6.1 security update on RHEL 8
keycloak: path traversal via double URL encoding keycloak: Session takeover with OIDC offline refreshtokens
[ "cpe:/a:redhat:red_hat_single_sign_on:7.6::el8" ]
null
6.8
null
null