id
stringlengths
13
15
title
stringlengths
29
176
description
stringlengths
8
31.7k
cpes
sequencelengths
0
20
cvss_v4_0
null
cvss_v3_1
float64
0
10
cvss_v3_0
float64
0
10
cvss_v2_0
null
RHBA-2021:0627
Red Hat Bug Fix Advisory: microcode_ctl bug fix and enhancement update
hw: Vector Register Leakage-Active
[ "cpe:/o:redhat:rhel_aus:7.2::server" ]
null
2.8
null
null
RHSA-2014:1338
Red Hat Security Advisory: openstack-glance security and bug fix update
openstack-glance: Glance store disk space exhaustion
[ "cpe:/a:redhat:openstack:5::el6" ]
null
null
null
null
RHSA-2024:9185
Red Hat Security Advisory: iperf3 security update
iperf3: possible denial of service iperf3: vulnerable to marvin attack if the authentication option is used
[ "cpe:/a:redhat:enterprise_linux:9::appstream" ]
null
5.9
null
null
RHSA-2016:1477
Red Hat Security Advisory: java-1.6.0-sun security update
OpenJDK: insufficient restrictions on the use of custom ValueHandler (CORBA, 8079718) OpenJDK: maximum XML name limit not applied to namespace URIs (JAXP, 8148872) JDK: unspecified vulnerability fixed in 6u121, 7u111, and 8u101 (Install) OpenJDK: missing entity replacement limits (JAXP, 8149962) OpenJDK: integer overflows in bytecode streams (Hotspot, 8152479)
[ "cpe:/a:redhat:rhel_extras_oracle_java:5", "cpe:/a:redhat:rhel_extras_oracle_java:6", "cpe:/a:redhat:rhel_extras_oracle_java:7" ]
null
null
4.3
null
RHSA-2019:0544
Red Hat Security Advisory: .NET Core on Red Hat Enterprise Linux security update for March 2019
dotnet: NuGet Tampering Vulnerability
[ "cpe:/a:redhat:rhel_dotnet:1.0::el7", "cpe:/a:redhat:rhel_dotnet:1.1::el7", "cpe:/a:redhat:rhel_dotnet:2.1::el7", "cpe:/a:redhat:rhel_dotnet:2.2::el7" ]
null
null
7.8
null
RHSA-2021:1305
Red Hat Security Advisory: java-11-openjdk security update
OpenJDK: Incomplete enforcement of JAR signing disabled algorithms (Libraries, 8249906)
[ "cpe:/a:redhat:rhel_eus:8.1::appstream" ]
null
5.3
null
null
RHSA-2015:0021
Red Hat Security Advisory: php security update
php: integer overflow in unserialize() php: heap corruption issue in exif_thumbnail()
[ "cpe:/o:redhat:rhel_eus:6.5::computenode", "cpe:/o:redhat:rhel_eus:6.5::server" ]
null
null
null
null
RHSA-2019:1182
Red Hat Security Advisory: libvirt security update
hardware: Microarchitectural Store Buffer Data Sampling (MSBDS) hardware: Micro-architectural Load Port Data Sampling - Information Leak (MLPDS) hardware: Microarchitectural Fill Buffer Data Sampling (MFBDS) hardware: Microarchitectural Data Sampling Uncacheable Memory (MDSUM)
[ "cpe:/o:redhat:rhel_eus:7.5::computenode", "cpe:/o:redhat:rhel_eus:7.5::server" ]
null
null
3.8
null
RHSA-2013:1173
Red Hat Security Advisory: kernel security and bug fix update
Kernel: Bluetooth: HCI & L2CAP information leaks Kernel: perf/x86: offcore_rsp valid mask for SNB/IVB kernel: sctp: duplicate cookie handling NULL pointer dereference kernel: net: IP_REPOPTS invalid free Kernel: ipv6: using ipv4 vs ipv6 structure during routing lookup in sendmsg Kernel: net: af_key: initialize satype in key_notify_policy_flush
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
null
null
RHSA-2023:6842
Red Hat Security Advisory: OpenShift Container Platform 4.12.43 bug fix and security update
OpenShift: modification of node role labels golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487)
[ "cpe:/a:redhat:openshift:4.12::el8" ]
null
7.5
null
null
RHSA-2008:0275
Red Hat Security Advisory: kernel security and bug fix update
kernel PWC driver DoS IPSec ESP kernel panics kernel: infinite loop in highres timers (kernel hang) kernel: ptrace: Unprivileged crash on x86_64 %cs corruption
[ "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
RHSA-2018:2003
Red Hat Security Advisory: kernel-rt security and bug fix update
kernel: Out-of-bounds access via an XFRM_MSG_MIGRATE xfrm Netlink message hw: cpu: speculative store bypass
[ "cpe:/a:redhat:rhel_extras_rt:7" ]
null
null
5.6
null
RHSA-2023:5849
Red Hat Security Advisory: nodejs:18 security update
nodejs: integrity checks according to policies can be circumvented nodejs: code injection via WebAssembly export names HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack) node-undici: cookie leakage
[ "cpe:/a:redhat:enterprise_linux:9::appstream" ]
null
3.9
null
null
RHSA-2020:4129
Red Hat Security Advisory: Red Hat OpenShift Service Mesh 1.1 servicemesh-proxy security update
envoyproxy/envoy: incorrectly handles multiple HTTP headers in requests
[ "cpe:/a:redhat:service_mesh:1.1::el8" ]
null
8.3
null
null
RHSA-2021:5070
Red Hat Security Advisory: Red Hat OpenStack Platform 16.1 (python-django20) security update
django: Potential directory-traversal via archive.extract() django: potential directory-traversal via uploaded files django: Potential directory-traversal via uploaded files django: Potential directory traversal via ``admindocs`` django: Possible indeterminate SSRF, RFI, and LFI attacks since validators accepted leading zeros in IPv4 addresses
[ "cpe:/a:redhat:openstack:16.1::el8" ]
null
7.5
null
null
RHSA-2023:2736
Red Hat Security Advisory: kernel-rt security and bug fix update
hw: cpu: AMD CPUs may transiently execute beyond unconditional direct branch kernel: malicious data for FBIOPUT_VSCREENINFO ioctl may cause OOB write memory kernel: when setting font with malicious data by ioctl PIO_FONT, kernel will write memory out of bounds kernel: net: stmmac: fix tc flower deletion for VLAN priority Rx steering kernel: possible race condition in drivers/tty/tty_buffers.c kernel: use-after-free in ath9k_htc_probe_device() could cause an escalation of privileges kernel: KVM: NULL pointer dereference in kvm_mmu_invpcid_gva kernel: KVM: nVMX: missing IBPB when exiting from nested guest can lead to Spectre v2 attacks kernel: netfilter: nf_conntrack_irc message handling issue kernel: race condition in xfrm_probe_algs can lead to OOB read/write kernel: media: em28xx: initialize refcount before kref_get kernel: race condition in hugetlb_no_page() in mm/hugetlb.c kernel: memory leak in ipv6_renew_options() kernel: use-after-free caused by l2cap_reassemble_sdu() in net/bluetooth/l2cap_core.c kernel: data races around icsk->icsk_af_ops in do_ipv6_setsockopt kernel: data races around sk->sk_prot kernel: memory leak in l2cap_recv_acldata of the file net/bluetooth/l2cap_core.c kernel: denial of service in follow_page_pte in mm/gup.c due to poisoned pte entry kernel: use-after-free after failed devlink reload in devlink_param_get kernel: USB-accessible buffer overflow in brcmfmac kernel: Double-free in split_2MB_gtt_entry when function intel_gvt_dma_map_guest_page failed kernel: l2tp: missing lock when clearing sk_user_data can lead to NULL pointer dereference kernel: Recursive locking violation in usb-storage that can cause the kernel to deadlock kernel: igmp: use-after-free in ip_check_mc_rcu when opening and closing inet sockets kernel: Executable Space Protection Bypass kernel: Unprivileged users may use PTRACE_SEIZE to set PTRACE_O_SUSPEND_SECCOMP option kernel: xfrm_expand_policies() in net/xfrm/xfrm_policy.c can cause a refcount to be dropped twice kernel: unmap_mapping_range() race with munmap() on VM_PFNMAP mappings leads to stale TLB entry kernel: TLB flush operations are mishandled in certain KVM_VCPU_PREEMPTED leading to guest malfunctioning kernel: Report vmalloc UAF in dvb-core/dmxdev kernel: u8 overflow problem in cfg80211_update_notlisted_nontrans() kernel: use-after-free related to leaf anon_vma double reuse kernel: use-after-free in bss_ref_get in net/wireless/scan.c kernel: BSS list corruption in cfg80211_add_nontrans_list in net/wireless/scan.c kernel: Denial of service in beacon protection for P2P-device kernel: memory corruption in usbmon driver kernel: NULL pointer dereference in traffic control subsystem kernel: scsi: mpt3sas: Fix use-after-free warning kernel: NULL pointer dereference in rawv6_push_pending_frames kernel: net/ulp: use-after-free in listening ULP sockets kernel: netfilter: NULL pointer dereference in nf_tables due to zeroed list head kernel: use-after-free caused by invalid pointer hostname in fs/cifs/connect.c kernel: Soft lockup occurred during __page_mapcount Kernel: NULL pointer dereference problem in sctp_sched_dequeue_common kernel: drm/virtio: improper return value check in virtio_gpu_object_shmem_init() kernel: slab-out-of-bounds read vulnerabilities in cbq_classify
[ "cpe:/a:redhat:enterprise_linux:8::nfv", "cpe:/a:redhat:enterprise_linux:8::realtime" ]
null
4.2
null
null
RHSA-2024:10895
Red Hat Security Advisory: Cost Management Metrics Operator Update
go/parser: golang: Calling any of the Parse functions containing deeply nested literals can cause a panic/stack exhaustion
[ "cpe:/a:redhat:cost_management:3.3::el9" ]
null
5.9
null
null
RHSA-2021:0039
Red Hat Security Advisory: OpenShift Container Platform 4.6.12 extras and security update
golang: math/big: panic during recursive division of very large numbers
[ "cpe:/a:redhat:openshift:4.6::el8" ]
null
7.5
null
null
RHSA-2024:2101
Red Hat Security Advisory: Red Hat Satellite Client bug fix and security update
curl: cookie injection with none file
[ "cpe:/a:redhat:rhel_satellite_client:6::el6", "cpe:/a:redhat:rhel_satellite_client:6::el7", "cpe:/a:redhat:rhel_satellite_client:6::el8", "cpe:/a:redhat:rhel_satellite_client:6::el9" ]
null
3.7
null
null
RHSA-2019:1187
Red Hat Security Advisory: libvirt security update
hardware: Microarchitectural Store Buffer Data Sampling (MSBDS) hardware: Micro-architectural Load Port Data Sampling - Information Leak (MLPDS) hardware: Microarchitectural Fill Buffer Data Sampling (MFBDS) hardware: Microarchitectural Data Sampling Uncacheable Memory (MDSUM)
[ "cpe:/o:redhat:rhel_aus:7.3::server", "cpe:/o:redhat:rhel_e4s:7.3::server", "cpe:/o:redhat:rhel_tus:7.3::server" ]
null
null
3.8
null
RHSA-2020:2706
Red Hat Security Advisory: microcode_ctl security, bug fix and enhancement update
hw: Special Register Buffer Data Sampling (SRBDS) hw: Vector Register Data Sampling hw: L1D Cache Eviction Sampling
[ "cpe:/o:redhat:rhel_aus:6.6::server" ]
null
6.5
6.5
null
RHSA-2017:3263
Red Hat Security Advisory: curl security update
curl: IMAP FETCH response out of bounds read
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
4.8
null
RHSA-2024:6189
Red Hat Security Advisory: buildah security update
golang: crypto/x509: Verify panics on certificates with an unknown public key algorithm
[ "cpe:/a:redhat:enterprise_linux:9::appstream" ]
null
5.9
null
null
RHSA-2010:0331
Red Hat Security Advisory: GFS-kernel security and bug fix update
kernel: bug in GFS/GFS2 locking code leads to dos
[ "cpe:/a:redhat:rhel_global_file_system:4" ]
null
null
null
null
RHEA-2018:2188
Red Hat Enhancement Advisory: Red Hat JBoss Web Server 5.0.0 enhancement update
tomcat: A bug in the UTF-8 decoder can lead to DoS
[ "cpe:/a:redhat:jboss_enterprise_web_server:5.0::el7" ]
null
null
7.5
null
RHSA-2014:0412
Red Hat Security Advisory: java-1.7.0-oracle security update
libjpeg: information leak (read of uninitialized memory) libpng: unhandled zero-length PLTE chunk or NULL palette OpenJDK: Incorrect mlib/raster image validation (2D, 8027841) JDK: unspecified vulnerability fixed in 7u55 and 8u5 (Libraries) OpenJDK: Protect logger handlers (Libraries, 8029740) JDK: unspecified vulnerability fixed in 7u55 and 8u5 (Deployment) JDK: unspecified vulnerability fixed in 6u75, 7u55 and 8u5 (Deployment) OpenJDK: AWT incorrect FlavorMap seperation (AWT, 8026797) OpenJDK: incorrect caching of data initialized via TCCL (JAXWS, 8026801) OpenJDK: RSA unpadding timing issues (Security, 8027766) OpenJDK: Prevent SIGNATURE_PRIMITIVE_SET from being modified (Security, 8029745) OpenJDK: MethodHandle variable argument lists handling (Libraries, 8029844) OpenJDK: System.arraycopy() element race condition (Hotspot, 8029858) OpenJDK: ServiceLoader Exception handling security bypass (Libraries, 8031394) OpenJDK: Activation framework default command map caching (JAX-WS, 8025152) lcms: insufficient ICC profile version validation (OpenJDK 2D, 8031335) OpenJDK: missing randomization of JNDI DNS client query IDs (JNDI, 8030731) OpenJDK: Better ScriptEngineManager ScriptEngine management (Libraries, 8036794) OpenJDK: insecure temporary file use in unpack200 (Libraries, 8033618) OpenJDK: classfile parser invalid BootstrapMethods attribute length (Hotspot, 8034926) OpenJDK: insufficient escaping of window title string (Javadoc, 8026736) JDK: unspecified vulnerability fixed in 5.0u75, 6u75, 7u55 and 8u5 (2D) OpenJDK: Incorrect NIO channel separation (Libraries, 8026716) OpenJDK: JAXP CharInfo file access restriction (JAXP, 8029282) JDK: unspecified vulnerability fixed in 6u75, 7u55 and 8u5 (Deployment) OpenJDK: AWT thread context handling (AWT, 8025010) OpenJDK: method handle call hierachy bypass (Libraries, 8032686) OpenJDK: incorrect caching of data initialized via TCCL (JAXB, 8025030) JDK: unspecified vulnerability fixed in 6u75, 7u55 and 8u5 (Deployment) OpenJDK: JPEG decoder input stream handling (2D, 8029854) JDK: unspecified vulnerability fixed in 7u55 and 8u5 (JavaFX) OpenJDK: incorrect caching of data initialized via TCCL (JAXWS, 8026188) OpenJDK: remove insecure Java Sound provider caching (Sound, 8026163) JDK: unspecified vulnerability fixed in 6u75, 7u55 and 8u5 (Deployment)
[ "cpe:/a:redhat:rhel_extras:5::client", "cpe:/a:redhat:rhel_extras:5::server", "cpe:/a:redhat:rhel_extras:6" ]
null
null
null
null
RHSA-2024:10831
Red Hat Security Advisory: postgresql:16 security update
postgresql: PostgreSQL row security below e.g. subqueries disregards user ID changes postgresql: PostgreSQL SET ROLE, SET SESSION AUTHORIZATION reset to wrong user ID postgresql: PostgreSQL PL/Perl environment variable changes execute arbitrary code
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
8.8
null
null
RHSA-2021:4782
Red Hat Security Advisory: openssh security update
openssh: privilege escalation when AuthorizedKeysCommand or AuthorizedPrincipalsCommand are configured
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
7
null
null
RHBA-2022:0051
Red Hat Bug Fix Advisory: openvswitch2.13 update
openvswitch: External triggered memory leak in Open vSwitch while processing fragmented packets
[ "cpe:/o:redhat:enterprise_linux:8::fastdatapath" ]
null
7.5
null
null
RHSA-2024:0998
Red Hat Security Advisory: Red Hat OpenShift distributed tracing 3.1.0 operator/operand containers
follow-redirects: Improper Input Validation due to the improper handling of URLs by the url.parse()
[ "cpe:/a:redhat:openshift_distributed_tracing:3.1::el8" ]
null
6.1
null
null
RHSA-2022:8796
Red Hat Security Advisory: Red Hat OpenStack 16.1.9 (openstack-tripleo-heat-templates) security update
openstack-tripleo-heat-templates: data leak of internal URL through keystone_authtoken
[ "cpe:/a:redhat:openstack:16.1::el8" ]
null
4.3
null
null
RHSA-2024:3827
Red Hat Security Advisory: buildah security and bug fix update
golang: net/http: golang: mime/multipart: golang: net/textproto: memory exhaustion in Request.ParseMultipartForm jose: resource exhaustion jose-go: improper handling of highly compressed data
[ "cpe:/a:redhat:enterprise_linux:9::appstream" ]
null
4.3
null
null
RHSA-2019:1207
Red Hat Security Advisory: redhat-virtualization-host security update
hardware: Microarchitectural Store Buffer Data Sampling (MSBDS) hardware: Micro-architectural Load Port Data Sampling - Information Leak (MLPDS) hardware: Microarchitectural Fill Buffer Data Sampling (MFBDS) hardware: Microarchitectural Data Sampling Uncacheable Memory (MDSUM)
[ "cpe:/o:redhat:enterprise_linux:7::hypervisor" ]
null
null
3.8
null
RHSA-2016:1095
Red Hat Security Advisory: Red Hat OpenShift Enterprise 3.1 security update
3: Untrusted content loaded via the API proxy can access web console credentials on the same domain
[ "cpe:/a:redhat:openshift:3.1::el7" ]
null
null
null
null
RHSA-2025:0324
Red Hat Security Advisory: rsync security update
rsync: Info Leak via Uninitialized Stack Contents
[ "cpe:/a:redhat:enterprise_linux:9::appstream", "cpe:/o:redhat:enterprise_linux:9::baseos" ]
null
7.5
null
null
RHSA-2024:2377
Red Hat Security Advisory: zziplib security update
zziplib: invalid memory access at zzip_disk_entry_to_file_header in mmapped.c
[ "cpe:/a:redhat:enterprise_linux:9::appstream", "cpe:/a:redhat:enterprise_linux:9::crb" ]
null
5.5
null
null
RHSA-2021:0700
Red Hat Security Advisory: grub2 security update
grub2: acpi command allows privileged user to load crafted ACPI tables when Secure Boot is enabled grub2: Use-after-free in rmmod command grub2: Out-of-bounds write in grub_usb_device_initialize() grub2: Stack buffer overflow in grub_parser_split_cmdline() grub2: cutmem command allows privileged user to remove memory regions when Secure Boot is enabled grub2: Heap out-of-bounds write in short form option parser grub2: Heap out-of-bounds write due to miscalculation of space required for quoting
[ "cpe:/o:redhat:rhel_eus:7.7::computenode", "cpe:/o:redhat:rhel_eus:7.7::server" ]
null
7.5
null
null
RHSA-2022:2190
Red Hat Security Advisory: podman security update
psgo: Privilege escalation in 'podman top'
[ "cpe:/a:redhat:rhel_extras_other:7" ]
null
8
null
null
RHSA-2011:0949
Red Hat Security Advisory: JBoss Enterprise Application Platform 5.1.1 update
JBoss Seam EL interpolation in exception handling
[ "cpe:/a:redhat:jboss_enterprise_application_platform:5.1" ]
null
null
null
null
RHSA-2008:0555
Red Hat Security Advisory: java-1.4.2-ibm security update
Untrusted applet and application XSLT processing privilege escalation Buffer overflow security vulnerabilities in Java Web Start
[ "cpe:/a:redhat:rhel_extras:3", "cpe:/a:redhat:rhel_extras:4", "cpe:/a:redhat:rhel_extras:5::client", "cpe:/a:redhat:rhel_extras:5::server" ]
null
null
null
null
RHSA-2005:300
Red Hat Security Advisory: libexif security update
security flaw
[ "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws" ]
null
null
null
null
RHSA-2016:0503
Red Hat Security Advisory: python-django security update
python-django: Malicious redirect and possible XSS attack via user-supplied redirect URLs containing basic auth python-django: User enumeration through timing difference on password hasher work factor upgrade
[ "cpe:/a:redhat:openstack-optools:7::el7" ]
null
null
null
null
RHSA-2011:1437
Red Hat Security Advisory: firefox security update
Mozilla: Security problem with loadSubScript on 1.9.2 branch (MFSA 2011-46) Mozilla: Universal XSS likely with MultiByte charset (MFSA 2011-47) Mozilla: crash while profiling page with many functions (MFSA 2011-49)
[ "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws", "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::client_workstation", "cpe:/o:redhat:enterprise_linux:5::server", "cpe:/o:redhat:enterprise_linux:6::server" ]
null
null
null
null
RHSA-2014:0449
Red Hat Security Advisory: thunderbird security update
Mozilla: Miscellaneous memory safety hazards (rv:24.5) (MFSA 2014-34) Mozilla: Out of bounds read while decoding JPG images (MFSA-2014-37) Mozilla: Buffer overflow when using non-XBL object as XBL (MFSA 2014-38) Mozilla: Privilege escalation through Web Notification API (MFSA 2014-42) Mozilla: Cross-site scripting (XSS) using history navigations (MFSA 2014-43) Mozilla: Use-after-free in imgLoader while resizing images (MFSA 2014-44) Mozilla: Use-after-free in nsHostResolver (MFSA 2014-46)
[ "cpe:/a:redhat:rhel_productivity:5", "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
null
null
RHSA-2015:1184
Red Hat Security Advisory: flash-plugin security update
flash-plugin: code execution issue fixed in APSB15-14
[ "cpe:/a:redhat:rhel_extras:5::client", "cpe:/a:redhat:rhel_extras:5::server", "cpe:/a:redhat:rhel_extras:6" ]
null
null
null
null
RHSA-2021:4179
Red Hat Security Advisory: file-roller security update
file-roller: directory traversal via directory symlink pointing outside of the target directory (incomplete fix for CVE-2020-11736)
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
3.9
null
null
RHSA-2012:1060
Red Hat Security Advisory: cobbler security update
cobbler: command injection flaw in the power management XML-RPC API
[ "cpe:/a:redhat:network_satellite:5.4::el5", "cpe:/a:redhat:network_satellite:5.4::el6" ]
null
null
null
null
RHSA-2020:0120
Red Hat Security Advisory: thunderbird security update
Mozilla: Bypass of @namespace CSS sanitization during pasting Mozilla: Type Confusion in XPCVariant.cpp Mozilla: CSS sanitization does not escape HTML tags Mozilla: Memory safety bugs fixed in Firefox 72 and Firefox ESR 68.4 Mozilla: IonMonkey type confusion with StoreElementHole and FallibleStoreElement
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
8.8
8.8
null
RHSA-2023:7050
Red Hat Security Advisory: python38:3.8 and python38-devel:3.8 security update
python: tarfile module directory traversal python-requests: Unintended leak of Proxy-Authorization header
[ "cpe:/a:redhat:enterprise_linux:8::appstream", "cpe:/a:redhat:enterprise_linux:8::crb" ]
null
6.1
null
null
RHSA-2022:0064
Red Hat Security Advisory: openssl security update
openssl: Read buffer overruns processing ASN.1 strings
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
7.4
null
null
RHSA-2020:3328
Red Hat Security Advisory: Red Hat Ansible Tower 3.7.2-1 - RHEL7 Container
Tower: SSRF: Server Side Request Forgery on Credential Tower: SSRF: Server Side Request Forgery on webhooks Tower: Sensitive Data Exposure on Label Tower: Named URLs allow for testing the presence or absence of objects
[ "cpe:/a:redhat:ansible_tower:3.7::el7" ]
null
5.8
null
null
RHSA-2023:7772
Red Hat Security Advisory: rh-postgresql13-postgresql security update
postgresql: Client memory disclosure when connecting with Kerberos to modified server postgresql: schema_element defeats protective search_path changes postgresql: row security policies disregard user ID changes after inlining. postgresql: Memory disclosure in aggregate function calls postgresql: Buffer overrun from integer overflow in array modification postgresql: Role pg_signal_backend can signal certain superuser processes. postgresql: extension script @substitutions@ within quoting allow SQL injection
[ "cpe:/a:redhat:rhel_software_collections:3::el7" ]
null
7.5
null
null
RHSA-2004:592
Red Hat Security Advisory: xpdf security update
security flaw
[ "cpe:/o:redhat:enterprise_linux:3::as", "cpe:/o:redhat:enterprise_linux:3::desktop", "cpe:/o:redhat:enterprise_linux:3::es", "cpe:/o:redhat:enterprise_linux:3::ws" ]
null
null
null
null
RHSA-2024:6879
Red Hat Security Advisory: Red Hat Single Sign-On 7.6.11 security update on RHEL 8
keycloak-saml-core: Improper Verification of SAML Responses Leading to Privilege Escalation in Keycloak Keycloak: Vulnerable Redirect URI Validation Results in Open Redirec
[ "cpe:/a:redhat:red_hat_single_sign_on:7.6::el8" ]
null
6.1
null
null
RHSA-2009:0008
Red Hat Security Advisory: dbus security update
dbus denial of service
[ "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::client_workstation", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
RHSA-2020:4306
Red Hat Security Advisory: java-11-openjdk security and bug fix update
OpenJDK: High memory usage during deserialization of Proxy class with many interfaces (Serialization, 8236862) OpenJDK: Credentials sent over unencrypted LDAP connection (JNDI, 8237990) OpenJDK: Certificate blacklist bypass via alternate certificate encodings (Libraries, 8237995) OpenJDK: Integer overflow leading to out-of-bounds access (Hotspot, 8241114) OpenJDK: Missing permission check in path to URI conversion (Libraries, 8242680) OpenJDK: Incomplete check for invalid characters in URI to path conversion (Libraries, 8242685) OpenJDK: Race condition in NIO Buffer boundary checks (Libraries, 8244136)
[ "cpe:/a:redhat:rhel_eus:8.1::appstream" ]
null
5.3
null
null
RHSA-2022:7417
Red Hat Security Advisory: Red Hat Single Sign-On 7.6.1 security update
jackson-databind: denial of service via a large depth of nested objects h2: Remote Code Execution in Console owasp-java-html-sanitizer: improper policies enforcement may lead to remote code execution netty: control chars in header names may lead to HTTP request smuggling xnio: org.xnio.StreamConnection.notifyReadClosed log to debug instead of stderr keycloak: Stored XSS in groups dropdown jboss-client: memory leakage in remote client transaction wildfly: Wildfly management of EJB Session context returns wrong caller principal with Elytron Security enabled undertow: Double AJP response for 400 from EAP 7 results in CPING failures keycloak: Uploading of SAML javascript protocol mapper scripts through the admin console artemis-commons: Apache ActiveMQ Artemis DoS
[ "cpe:/a:redhat:red_hat_single_sign_on:7.6.1" ]
null
7.5
null
null
RHSA-2013:0500
Red Hat Security Advisory: hplip security, bug fix and enhancement update
hplip: insecure temporary file handling hplip: insecure temporary file handling flaws
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
null
null
RHSA-2021:0862
Red Hat Security Advisory: kpatch-patch security update
kernel: SCSI target (LIO) write to any block on ILO backstore kernel: locking issue in drivers/tty/tty_jobctrl.c can lead to an use-after-free
[ "cpe:/o:redhat:enterprise_linux:7::server" ]
null
7.8
null
null
RHSA-2019:0054
Red Hat Security Advisory: ansible security update
ansible: Failed tasks do not honour no_log option allowing for secrets to be disclosed in logs ansible: Inventory variables are loaded from current working directory when running ad-hoc command that can lead to code execution ansible: ansible.cfg is being read from current working directory allowing possible code execution
[ "cpe:/a:redhat:openstack:10::el7" ]
null
null
7.8
null
RHSA-2023:3740
Red Hat Security Advisory: Red Hat Integration Camel for Spring Boot 3.20.1 Patch 1 release security update
spring-boot: Spring Boot Welcome Page DoS Vulnerability vertx-web: StaticHandler disclosure of classpath resources on Windows when mounted on a wildcard route
[ "cpe:/a:redhat:camel_spring_boot:3.20" ]
null
5.3
null
null
RHSA-2013:0964
Red Hat Security Advisory: tomcat6 security update
tomcat: Session fixation in form authenticator
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
null
null
RHSA-2023:6943
Red Hat Security Advisory: cloud-init security, bug fix, and enhancement update
cloud-init: sensitive data could be exposed in logs
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
5.5
null
null
RHSA-2025:1637
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.4.21 security update
hornetq-core-client: Arbitrarily overwrite files or access sensitive information
[ "cpe:/a:redhat:jboss_enterprise_application_platform:7.4::el8" ]
null
7.1
null
null
RHSA-2023:7579
Red Hat Security Advisory: postgresql:13 security update
postgresql: Memory disclosure in aggregate function calls postgresql: Buffer overrun from integer overflow in array modification postgresql: Role pg_signal_backend can signal certain superuser processes. postgresql: extension script @substitutions@ within quoting allow SQL injection
[ "cpe:/a:redhat:rhel_eus:8.8::appstream" ]
null
7.5
null
null
RHSA-2020:3545
Red Hat Security Advisory: kernel-alt security and bug fix update
kernel: Denial Of Service in the __ipmi_bmc_register() function in drivers/char/ipmi/ipmi_msghandler.c kernel: Buffer over-read in crypto_authenc_extractkeys() when a payload longer than 4 bytes is not aligned. kernel: sync of excessive duration via an XFS v5 image with crafted metadata
[ "cpe:/o:redhat:enterprise_linux:7::server" ]
null
5.5
null
null
RHSA-2015:0269
Red Hat Security Advisory: Red Hat JBoss Operations Network 3.3.1 update
OpenJDK: XML parsing Denial of Service (JAXP, 8017298)
[ "cpe:/a:redhat:jboss_operations_network:3.3" ]
null
null
null
null
RHSA-2022:0958
Red Hat Security Advisory: kpatch-patch-4_18_0-147_58_1 security and bug fix update
kernel: Use After Free in unix_gc() which could result in a local privilege escalation kernel: use-after-free in RDMA listen() kernel: fget: check that the fd still exists after getting a ref to it kernel: xfs: raw block device data leak in XFS_IOC_ALLOCSP IOCTL kernel: possible privileges escalation due to missing TLB flush kernel: cgroups v1 release_agent feature may allow privilege escalation kernel: failing usercopy allows for use-after-free exploitation
[ "cpe:/o:redhat:rhel_e4s:8.1::baseos" ]
null
7
null
null
RHSA-2012:0683
Red Hat Security Advisory: bind-dyndb-ldap security update
bind-dyndb-ldap: Bind DoS (named hang) by processing DNS query for zone served by bind-dyndb-ldap
[ "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
null
null
RHSA-2012:0899
Red Hat Security Advisory: openldap security and bug fix update
(slapd): Assertion failure by processing search queries requesting only attributes for particular entry
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
null
null
RHSA-2017:0855
Red Hat Security Advisory: Red Hat Satellite 5 - day of End Of Life Notice
This is the day of notification of the End Of Life (EOL) plans for the following versions of Red Hat Satellite 5: * Red Hat Satellite 5.6 on Red Hat Enterprise Linux 5
[ "cpe:/a:redhat:network_satellite:5.6::el5" ]
null
null
null
null
RHSA-2014:0285
Red Hat Security Advisory: kernel security, bug fix, and enhancement update
kernel: exec/ptrace: get_dumpable() incorrect tests kernel: ipc: ipc_rcu_putref refcount races kernel: xen: hypercalls exposed to privilege rings 1 and 2 of HVM guests Kernel: qeth: buffer overflow in snmp ioctl Kernel: AACRAID Driver compat IOCTL missing capability check hw: AMD CPU erratum may cause core hang Kernel: net: leakage of uninitialized memory to user-space via recv syscalls
[ "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
RHSA-2021:0957
Red Hat Security Advisory: OpenShift Container Platform 4.7.4 security update
golang: crypto/elliptic: incorrect operations on the P-224 curve
[ "cpe:/a:redhat:openshift:4.7::el8" ]
null
6.5
null
null
RHSA-2009:1106
Red Hat Security Advisory: kernel security and bug fix update
kernel: nfsd should drop CAP_MKNOD for non-root kernel: agp: zero pages before sending to userspace kernel: cifs: memory overwrite when saving nativeFileSystem field during mount kernel: nfs: fix NFS v4 client handling of MAY_EXEC in nfs_permission kernel: cifs: fix potential buffer overruns when converting unicode strings sent by server kernel: xen: local denial of service kernel: random: add robust get_random_u32, remove weak get_random_int
[ "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
RHSA-2022:8800
Red Hat Security Advisory: grub2 security update
grub2: Buffer overflow in grub_font_construct_glyph() can lead to out-of-bound write and possible secure boot bypass grub2: Heap based out-of-bounds write when redering certain unicode sequences
[ "cpe:/o:redhat:rhel_aus:8.2::baseos", "cpe:/o:redhat:rhel_e4s:8.2::baseos", "cpe:/o:redhat:rhel_tus:8.2::baseos" ]
null
7.1
null
null
RHSA-2021:4324
Red Hat Security Advisory: python-psutil security update
python-psutil: Double free because of refcount mishandling
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
null
7
null
RHSA-2023:0832
Red Hat Security Advisory: kernel security and bug fix update
kernel: an out-of-bounds vulnerability in i2c-ismt driver kernel: mm/mremap.c use-after-free vulnerability kernel: nfsd buffer overflow by RPC message over TCP with garbage data
[ "cpe:/a:redhat:enterprise_linux:8::crb", "cpe:/o:redhat:enterprise_linux:8::baseos" ]
null
7.5
null
null
RHSA-2021:2737
Red Hat Security Advisory: RHV-H security update (redhat-virtualization-host) 4.3.17
kernel: use-after-free in net/bluetooth/hci_event.c when destroying an hci_chan kernel: size_t-to-int conversion vulnerability in the filesystem layer
[ "cpe:/o:redhat:enterprise_linux:7::hypervisor" ]
null
7.8
null
null
RHSA-2016:1218
Red Hat Security Advisory: Red Hat JBoss BPM Suite security and bug fix update
Framework: denial-of-service attack with XML input
[ "cpe:/a:redhat:jboss_bpms:6.2" ]
null
null
5.3
null
RHSA-2005:772
Red Hat Security Advisory: cups security update
security flaw
[ "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws" ]
null
null
null
null
RHBA-2014:1630
Red Hat Bug Fix Advisory: Red Hat OpenShift Enterprise 2.1 jenkins-plugin-openshift bug fix update
jenkins: default markup formatter permits offsite-bound forms (SECURITY-88) Jenkins: insecure storage of passwords in Subversion plugin (SECURITY-58) jenkins: configure a project you do not have access to (SECURITY-55) jenkins: command line interface job creation directory traversal (SECURITY-108) jenkins: session hijacking issue in Winstone (SECURITY-106) jenkins: clear text password disclosure (SECURITY-93) jenkins: user tokens not invalidated correctly (SECURITY-89) jenkins: interface vulnerable to clickjacking attacks (SECURITY-80) jenkins: failed log in attemps revealing if a user is valid or not (SECURITY-79) jenkins: input validation issue (SECURITY-77) jenkins: session fixation issue (SECURITY-75) jenkins: stored cross-site scripting flaw (SECURITY-74) jenkins: information leak via system diagnostic functionalities (SECURITY-73) jenkins: denial of service (SECURITY-87) jenkins: username discovery (SECURITY-110) jenkins: job configuration issues (SECURITY-127, SECURITY-128) jenkins: directory traversal flaw (SECURITY-131) jenkins: remote code execution from slaves (SECURITY-144) jenkins: remote code execution flaw (SECURITY-150) jenkins: plug-in code can be downloaded by anyone with read access (SECURITY-155) jenkins: cross-site scripting flaws in the monitoring plug-in (SECURITY-113) jenkins: cross-site scripting flaw in Jenkins core (SECURITY-143)
[ "cpe:/a:redhat:openshift:2.0::el6" ]
null
null
null
null
RHSA-2024:3312
Red Hat Security Advisory: glibc security update
glibc: Out of bounds write in iconv may lead to remote code execution glibc: stack-based buffer overflow in netgroup cache glibc: null pointer dereferences after failed netgroup cache insertion glibc: netgroup cache may terminate daemon on memory allocation failure glibc: netgroup cache assumes NSS callback uses in-buffer strings
[ "cpe:/a:redhat:rhel_eus:8.8::appstream", "cpe:/a:redhat:rhel_eus:8.8::crb", "cpe:/o:redhat:rhel_eus:8.8::baseos" ]
null
4
null
null
RHSA-2020:1636
Red Hat Security Advisory: libsndfile security update
libsndfile: stack-based buffer overflow in sndfile-deinterleave utility libsndfile: buffer over-read in the function i2alaw_array in alaw.c
[ "cpe:/a:redhat:enterprise_linux:8::appstream", "cpe:/a:redhat:enterprise_linux:8::crb" ]
null
null
3.3
null
RHSA-2024:8329
Red Hat Security Advisory: Red Hat build of Cryostat security update
go/parser: golang: Calling any of the Parse functions containing deeply nested literals can cause a panic/stack exhaustion encoding/gob: golang: Calling Decoder.Decode on a message which contains deeply nested structures can cause a panic due to stack exhaustion go/build/constraint: golang: Calling Parse on a "// +build" build tag line with deeply nested expressions can cause a panic due to stack exhaustion graphql-java: Allocation of Resources Without Limits or Throttling in GraphQL Java
[ "cpe:/a:redhat:cryostat:3::el8" ]
null
7.5
null
null
RHSA-2023:0457
Red Hat Security Advisory: thunderbird security update
Mozilla: libusrsctp library out of date Mozilla: Fullscreen notification bypass Mozilla: Arbitrary file read from GTK drag and drop on Linux Mozilla: Malicious command could be hidden in devtools output Mozilla: URL being dragged from cross-origin iframe into same tab triggers navigation Mozilla: Content Security Policy wasn't being correctly applied to WebSockets in WebWorkers Mozilla: Calls to <code>console.log</code> allowed bypasing Content Security Policy via format directive Mozilla: Memory safety bugs fixed in Firefox 109 and Firefox ESR 102.7
[ "cpe:/a:redhat:rhel_e4s:8.1::appstream" ]
null
8.8
null
null
RHSA-2024:0778
Red Hat Security Advisory: Jenkins and Jenkins-2-plugins security update
google-oauth-client: missing PKCE support in accordance with the RFC for OAuth 2.0 for Native Apps can lead to improper authorization maven: Block repositories using http by default golang: go/parser: stack exhaustion in all Parse* functions snakeyaml: Denial of Service due to missing nested depth limitation for collections maven-shared-utils: Command injection via Commandline class apache-commons-text: variable interpolation RCE guava: insecure temporary directory creation springframework: Spring Expression DoS Vulnerability spring-security: Empty SecurityContext Is Not Properly Saved Upon Logout jenkins-2-plugins/script-security: Sandbox bypass vulnerability in Script Security Plugin jenkins-2-plugins/JUnit: Stored XSS vulnerability in JUnit Plugin jenkins-2-plugins/pipeline-build-step: Stored XSS vulnerability in Pipeline: Build Step Plugin jetty-server: OutOfMemoryError for large multipart without filename read via request.getParameter() jetty-server: Cookie parsing of quoted values can exfiltrate values from other cookies Jenkins: Temporary file parameter created with insecure permissions Jenkins: Information disclosure through error stack traces related to agents Jenkins: Open redirect vulnerability in OpenShift Login Plugin jetty: Improper validation of HTTP/1 content-length jenkins-plugins: cloudbees-folder: CSRF vulnerability in Folders Plugin jenkins-plugins: cloudbees-folder: Information disclosure in Folders Plugin jenkins-plugins: config-file-provider: Improper masking of credentials in Config File Provider Plugin jenkins-plugins: blueocean: CSRF vulnerability in Blue Ocean Plugin allows capturing credentials jenkins: Arbitrary file read vulnerability through the CLI can lead to RCE jenkins: cross-site WebSocket hijacking
[ "cpe:/a:redhat:ocp_tools:4.12::el8" ]
null
8.8
null
null
RHSA-2023:5750
Red Hat Security Advisory: java-17-openjdk security and bug fix update
OpenJDK: memory corruption issue on x86_64 with AVX-512 (8317121) OpenJDK: certificate path validation issue during client authentication (8309966)
[ "cpe:/a:redhat:rhel_eus:8.6::appstream", "cpe:/a:redhat:rhel_eus:8.6::crb" ]
null
5.3
null
null
RHSA-2022:7211
Red Hat Security Advisory: OpenShift Container Platform 4.10.39 bug fix and security update
go-getter: command injection vulnerability go-getter: unsafe download (issue 1 of 3) go-getter: unsafe download (issue 2 of 3) go-getter: unsafe download (issue 3 of 3)
[ "cpe:/a:redhat:openshift:4.10::el8" ]
null
8.6
null
null
RHSA-2024:6757
Red Hat Security Advisory: libnbd security update
libnbd: NBD server improper certificate validation
[ "cpe:/a:redhat:enterprise_linux:9::appstream", "cpe:/a:redhat:enterprise_linux:9::crb" ]
null
7.4
null
null
RHSA-2024:3830
Red Hat Security Advisory: gvisor-tap-vsock security and bug fix update
golang: net/http: golang: mime/multipart: golang: net/textproto: memory exhaustion in Request.ParseMultipartForm
[ "cpe:/a:redhat:enterprise_linux:9::appstream" ]
null
5.3
null
null
RHSA-2018:2569
Red Hat Security Advisory: java-1.7.1-ibm security update
JDK: DoS in the java.math component JDK: path traversal flaw in the Diagnostic Tooling Framework JDK: unspecified vulnerability fixed in 6u201, 7u191, 8u181, and 10.0.2 (Libraries) OpenJDK: insufficient index validation in PatternSyntaxException getMessage() (Concurrency, 8199547) JDK: unspecified vulnerability fixed in 6u201, 7u191, 8u181, and 10.0.2 (JSSE) JDK: privilege escalation via insufficiently restricted access to Attach API
[ "cpe:/a:redhat:rhel_extras:7" ]
null
null
8.4
null
RHSA-2019:4088
Red Hat Security Advisory: OpenShift Container Platform 4.1 ose-cluster-openshift-apiserver-operator-container security update
openshift: Secret data written to pod logs when operator set at Debug level or higher
[ "cpe:/a:redhat:openshift:4.1::el7" ]
null
null
5.3
null
RHSA-2003:063
Red Hat Security Advisory: openssl security update
security flaw
[ "cpe:/o:redhat:enterprise_linux:2.1::as", "cpe:/o:redhat:enterprise_linux:2.1::aw", "cpe:/o:redhat:enterprise_linux:2.1::es", "cpe:/o:redhat:enterprise_linux:2.1::ws" ]
null
null
null
null
RHSA-2024:2038
Red Hat Security Advisory: tigervnc security update
xorg-x11-server: Heap buffer overread/data leakage in ProcXIGetSelectedEvents xorg-x11-server: Heap buffer overread/data leakage in ProcXIPassiveGrabDevice xorg-x11-server: Use-after-free in ProcRenderAddGlyphs
[ "cpe:/a:redhat:rhel_eus:8.8::appstream" ]
null
7.8
null
null
RHSA-2017:0002
Red Hat Security Advisory: rh-nodejs4-nodejs and rh-nodejs4-http-parser security update
V8: integer overflow leading to buffer overflow in Zone::New c-ares: Single byte out of buffer write nodejs: reason argument in ServerResponse#writeHead() not properly validated nodejs: wildcard certificates not properly validated
[ "cpe:/a:redhat:rhel_software_collections:2::el6", "cpe:/a:redhat:rhel_software_collections:2::el7" ]
null
null
7.4
null
RHSA-2006:0617
Red Hat Security Advisory: kernel security update
security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw
[ "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws" ]
null
null
null
null
RHSA-2023:5747
Red Hat Security Advisory: java-17-openjdk security and bug fix update
OpenJDK: memory corruption issue on x86_64 with AVX-512 (8317121) OpenJDK: certificate path validation issue during client authentication (8309966)
[ "cpe:/a:redhat:rhel_aus:8.4::appstream", "cpe:/a:redhat:rhel_e4s:8.4::appstream", "cpe:/a:redhat:rhel_tus:8.4::appstream" ]
null
5.3
null
null
RHSA-2017:2635
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 6.4.17 update on RHEL 6
log4j: Socket receiver deserialization vulnerability tomcat: Security constrained bypass in error page mechanism jackson-databind: Deserialization vulnerability via readValue method of ObjectMapper
[ "cpe:/a:redhat:jboss_enterprise_application_platform:6::el6" ]
null
null
8.1
null
RHSA-2022:0239
Red Hat Security Advisory: libreswan security update
libreswan: Malicious IKEv1 packet can cause libreswan to restart
[ "cpe:/a:redhat:rhel_eus:8.4::appstream" ]
null
7.5
null
null
RHSA-2023:3189
Red Hat Security Advisory: emacs security update
emacs: command injection vulnerability in org-mode
[ "cpe:/a:redhat:rhel_e4s:8.1::appstream", "cpe:/o:redhat:rhel_e4s:8.1::baseos" ]
null
7.8
null
null