id
stringlengths
13
15
title
stringlengths
29
176
description
stringlengths
8
31.7k
cpes
sequencelengths
0
20
cvss_v4_0
null
cvss_v3_1
float64
0
10
cvss_v3_0
float64
0
10
cvss_v2_0
null
RHSA-2022:0543
Red Hat Security Advisory: ruby:2.6 security update
rubygem-bundler: Dependencies of gems with explicit source may be installed from a different source rubygem-rdoc: Command injection vulnerability in RDoc ruby: FTP PASV command response can cause Net::FTP to connect to arbitrary host ruby: StartTLS stripping vulnerability in Net::IMAP ruby: Regular expression denial of service vulnerability of Date parsing methods ruby: Cookie prefix spoofing in CGI::Cookie.parse
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
7.5
null
null
RHSA-2024:0003
Red Hat Security Advisory: thunderbird security update
Mozilla: Heap-buffer-overflow affecting WebGL <code>DrawElementsInstanced</code> method with Mesa VM driver Mozilla: Symlinks may resolve to smaller than expected buffers Mozilla: Heap buffer overflow in <code>nsTextFragment</code> Mozilla: Use-after-free in PR_GetIdentitiesLayer Mozilla: Potential sandbox escape due to <code>VideoBridge</code> lack of texture validation Mozilla: Heap buffer overflow affected <code>nsWindow::PickerOpen(void)</code> in headless mode Mozilla: Use-after-free in <code>nsDNSService</code> Mozilla: Undefined behavior in <code>ShutdownObserver()</code> Mozilla: Memory safety bugs fixed in Firefox 121, Firefox ESR 115.6, and Thunderbird 115.6 Mozilla: S/MIME signature accepted despite mismatching message date Mozilla: Truncated signed text was shown with a valid OpenPGP signature
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
7.5
null
null
RHSA-2014:1004
Red Hat Security Advisory: yum-updatesd security update
yum: yum-cron installs unsigned packages
[ "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
RHSA-2024:8455
Red Hat Security Advisory: edk2 security update
edk2: Buffer overflow when handling Server ID option from a DHCPv6 proxy Advertise message
[ "cpe:/a:redhat:rhel_aus:8.6::appstream", "cpe:/a:redhat:rhel_e4s:8.6::appstream", "cpe:/a:redhat:rhel_tus:8.6::appstream" ]
null
8.8
null
null
RHSA-2020:1113
Red Hat Security Advisory: bash security update
bash: BASH_CMD is writable in restricted bash shells
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
7.8
null
null
RHSA-2017:0238
Red Hat Security Advisory: thunderbird security update
Mozilla: Memory safety bugs fixed in Firefox 51 and Firefox ESR 45.7 (MFSA 2017-01) Mozilla: Excessive JIT code allocation allows bypass of ASLR and DEP (MFSA 2017-02) Mozilla: Use-after-free in XSL (MFSA 2017-02) Mozilla: Pointer and frame data leakage of Javascript objects (MFSA 2017-02) Mozilla: Potential use-after-free during DOM manipulations (MFSA 2017-02) Mozilla: Location bar spoofing with unicode characters (MFSA 2017-02) Mozilla: Insecure communication methods in Developer Tools JSON viewer (MFSA 2017-02) Mozilla: Use-after-free with Media Decoder (MFSA 2017-02)
[ "cpe:/a:redhat:rhel_productivity:5", "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation", "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
9.8
null
RHEA-2018:3584
Red Hat Enhancement Advisory: new packages: rust-toolset-1.29
rust: rustdoc loads plugins from world writable directory allowing for arbitrary code execution
[ "cpe:/a:redhat:devtools:2018" ]
null
null
5.3
null
RHSA-2024:1004
Red Hat Security Advisory: edk2 security update
edk2: Buffer overflow in the DHCPv6 client via a long Server ID option
[ "cpe:/a:redhat:rhel_aus:8.2::appstream", "cpe:/a:redhat:rhel_e4s:8.2::appstream", "cpe:/a:redhat:rhel_tus:8.2::appstream" ]
null
8.8
null
null
RHSA-2023:3349
Red Hat Security Advisory: kernel security and bug fix update
kernel: netfilter: use-after-free in nf_tables when processing batch requests can lead to privilege escalation
[ "cpe:/a:redhat:enterprise_linux:8::crb", "cpe:/o:redhat:enterprise_linux:8::baseos" ]
null
7.8
null
null
RHSA-2023:4494
Red Hat Security Advisory: thunderbird security update
thunderbird: File Extension Spoofing using the Text Direction Override Character Mozilla: Offscreen Canvas could have bypassed cross-origin restrictions Mozilla: Incorrect value used during WASM compilation Mozilla: Potential permissions request bypass via clickjacking Mozilla: Crash in DOMParser due to out-of-memory conditions Mozilla: Fix potential race conditions when releasing platform objects Mozilla: Stack buffer overflow in StorageManager Mozilla: Cookie jar overflow caused unexpected cookie jar state Mozilla: Memory safety bugs fixed in Firefox 116, Firefox ESR 115.1, Firefox ESR 102.14, Thunderbird 115.1, and Thunderbird 102.14 Mozilla: Memory safety bugs fixed in Firefox ESR 115.1, and Thunderbird 115.1
[ "cpe:/a:redhat:rhel_eus:9.0::appstream" ]
null
9.8
null
null
RHSA-2020:5568
Red Hat Security Advisory: Red Hat Fuse 7.8.0 release and security update
jackson-modules-java8: DoS due to an Improper Input Validation thrift: Endless loop when feed with specific input data thrift: Out-of-bounds read related to TJSONProtocol or TSimpleJSONProtocol mysql-connector-java: privilege escalation in MySQL connector spring-ws: XML External Entity Injection (XXE) when receiving XML data from untrusted sources spring-batch: XML External Entity Injection (XXE) when receiving XML data from untrusted sources codehaus: incomplete fix for unsafe deserialization in jackson-databind vulnerabilities hibernate-validator: safeHTML validator allows XSS AngularJS: Prototype pollution in merge function could result in code injection org.eclipse.paho.client.mqttv3: Improper hostname validation in the MQTT library cxf: does not restrict the number of message attachments cxf: OpenId Connect token service does not properly validate the clientId libquartz: XXE attacks via job description hibernate: SQL injection issue in Hibernate ORM batik: SSRF via "xlink:href" jetty: double release of resource can lead to information disclosure Undertow: Memory Leak in Undertow HttpOpenListener due to holding remoting connections indefinitely keycloak: Lack of checks in ObjectInputStream leading to Remote Code Execution Wildfly: EJBContext principal is not popped back after invoking another EJB using a different Security Domain tika: excessive memory usage in PSDParser apache-flink: JMX information disclosure vulnerability springframework: RFD attack via Content-Disposition Header sourced from request input by Spring MVC or Spring WebFlux Application spring-cloud-config-server: sending a request using a specially crafted URL can lead to a directory traversal attack cryptacular: excessive memory allocation during a decode operation nodejs-angular: XSS due to regex-based HTML replacement log4j: improper validation of certificate with host mismatch in SMTP appender tika-core: Denial of Service Vulnerabilities in Some of Apache Tika's Parsers dom4j: XML External Entity vulnerability in default SAX parser wildfly: unsafe deserialization in Wildfly Enterprise Java Beans netty: compression/decompression codecs don't enforce limits on buffer allocation sizes camel: DNS Rebinding in JMX Connector could result in remote command execution camel: RabbitMQ enables Java deserialization by default which could leed to remote code execution camel: Netty enables Java deserialization by default which could leed to remote code execution karaf: A remote client could create MBeans from arbitrary URLs shiro: spring dynamic controllers, a specially crafted request may cause an authentication bypass camel: server-side template injection and arbitrary file disclosure on templating components postgresql-jdbc: XML external entity (XXE) vulnerability in PgSQLXML shiro: specially crafted HTTP request may cause an authentication bypass RESTEasy: Caching routes in RootNode may result in DoS
[ "cpe:/a:redhat:jboss_fuse:7" ]
null
7.5
7.4
null
RHSA-2023:4204
Red Hat Security Advisory: VolSync 0.7.3 security fixes and enhancements
openshift: OCP & FIPS mode
[ "cpe:/a:redhat:acm:2.8::el8" ]
null
6.5
null
null
RHSA-2022:6542
Red Hat Security Advisory: php:7.4 security update
Archive_Tar: allows an unserialization attack because phar: is blocked but PHAR: is not blocked Archive_Tar: improper filename sanitization leads to file overwrites Archive_Tar: directory traversal due to inadequate checking of symbolic links
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
7.5
null
null
RHSA-2015:0062
Red Hat Security Advisory: kernel security, bug fix, and enhancement update
kernel: sctp: skb_over_panic when receiving malformed ASCONF chunks kernel: net: sctp: fix panic on duplicate ASCONF chunks kernel: net: sctp: remote memory pressure from excessive queueing kernel: lzo1x_decompress_safe() integer overflow kernel: vfs: refcount issues during unmount on symlink
[ "cpe:/o:redhat:rhel_eus:6.5::computenode", "cpe:/o:redhat:rhel_eus:6.5::server" ]
null
null
null
null
RHSA-2019:3887
Red Hat Security Advisory: kernel-rt security update
hw: Intel GPU blitter manipulation can allow for arbitrary kernel memory write
[ "cpe:/a:redhat:rhel_extras_rt:7" ]
null
null
8.8
null
RHSA-2024:4278
Red Hat Security Advisory: qemu-kvm security update
qemu-kvm: 'qemu-img info' leads to host file read/write
[ "cpe:/a:redhat:enterprise_linux:9::appstream" ]
null
7.8
null
null
RHSA-2024:0499
Red Hat Security Advisory: libssh security update
ssh: Prefix truncation attack on Binary Packet Protocol (BPP)
[ "cpe:/a:redhat:rhel_eus:9.2::appstream", "cpe:/o:redhat:rhel_eus:9.2::baseos" ]
null
5.9
null
null
RHSA-2019:0188
Red Hat Security Advisory: kernel-rt security and bug fix update
kernel: Use-after-free due to race condition in AF_PACKET implementation
[ "cpe:/a:redhat:rhel_extras_rt:7" ]
null
null
7
null
RHSA-2006:0195
Red Hat Security Advisory: tar security update
tar archive path traversal issue
[ "cpe:/o:redhat:enterprise_linux:3::as", "cpe:/o:redhat:enterprise_linux:3::desktop", "cpe:/o:redhat:enterprise_linux:3::es", "cpe:/o:redhat:enterprise_linux:3::ws" ]
null
null
null
null
RHSA-2024:4336
Red Hat Security Advisory: security update Logging for Red Hat OpenShift - 5.6.21
golang: net/netip: Unexpected behavior from Is methods for IPv4-mapped IPv6 addresses
[ "cpe:/a:redhat:logging:5.6::el8" ]
null
6.7
null
null
RHSA-2021:3293
Red Hat Security Advisory: java-1.7.1-ibm security update
OpenJDK: FTP PASV command response can cause FtpClient to connect to arbitrary host (Networking, 8258432) OpenJDK: Incorrect verification of JAR files with multiple MANIFEST.MF files (Library, 8260967) JDK: unspecified vulnerability fixed in 7u311 (JNDI)
[ "cpe:/a:redhat:rhel_extras:7" ]
null
3.7
null
null
RHSA-2018:1711
Red Hat Security Advisory: rhev-hypervisor7 security update
Kernel: KVM: error in exception handling leads to wrong debug stack value hw: cpu: speculative store bypass Kernel: error in exception handling leads to DoS
[ "cpe:/o:redhat:enterprise_linux:6::hypervisor", "cpe:/o:redhat:enterprise_linux:7::hypervisor" ]
null
null
6.5
null
RHSA-2020:4039
Red Hat Security Advisory: OpenEXR security update
OpenEXR: out-of-bounds read during Huffman uncompression OpenEXR: std:: vector out-of-bounds read and write in ImfTileOffsets.cpp OpenEXR: out-of-bounds write in copyIntoFrameBuffer function in ImfMisc.cpp
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
5.5
null
null
RHSA-2018:1965
Red Hat Security Advisory: kernel security and bug fix update
kernel: Out-of-bounds access via an XFRM_MSG_MIGRATE xfrm Netlink message hw: cpu: speculative store bypass
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
5.6
null
RHSA-2012:0522
Red Hat Security Advisory: openssl security update
openssl: asn1_d2i_read_bio integer errors leading to buffer overflow
[ "cpe:/o:redhat:rhel_els:3::as", "cpe:/o:redhat:rhel_els:3::es", "cpe:/o:redhat:rhel_els:4::as", "cpe:/o:redhat:rhel_els:4::es", "cpe:/o:redhat:rhel_eus:5.6", "cpe:/o:redhat:rhel_eus:6.0", "cpe:/o:redhat:rhel_eus:6.1", "cpe:/o:redhat:rhel_mission_critical:5.3" ]
null
null
null
null
RHSA-2020:4659
Red Hat Security Advisory: gd security update
gd: NULL pointer dereference in gdImageClone gd: Heap-based buffer overflow in gdImageColorMatch() in gd_color_match.c gd: Double free in the gdImage*Ptr in gd_gif_out.c, gd_jpeg.c, and gd_wbmp.c
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
null
5.3
null
RHSA-2014:0423
Red Hat Security Advisory: openshift-origin-broker security update
OpenShift: openshift-origin-broker plugin allows impersonation
[ "cpe:/a:redhat:openshift:2.0::el6" ]
null
null
null
null
RHSA-2012:1148
Red Hat Security Advisory: kernel security update
kernel: netfilter: null pointer dereference in nf_ct_frag6_reasm()
[ "cpe:/o:redhat:rhel_eus:6.1" ]
null
null
null
null
RHSA-2007:0089
Red Hat Security Advisory: php security update for Stronghold
security flaw security flaw security flaw security flaw security flaw security flaw php session extension information leak php session extension global variable clobber php imap_mail_compose() buffer overflow via type.parameters
[ "cpe:/a:redhat:rhel_stronghold:4.0" ]
null
null
null
null
RHSA-2024:4333
Red Hat Security Advisory: security update Logging for Red Hat OpenShift - 5.9.4
golang: net/netip: Unexpected behavior from Is methods for IPv4-mapped IPv6 addresses
[ "cpe:/a:redhat:logging:5.9::el9" ]
null
6.7
null
null
RHSA-2023:5768
Red Hat Security Advisory: nghttp2 security update
HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack)
[ "cpe:/o:redhat:rhel_aus:8.4::baseos", "cpe:/o:redhat:rhel_e4s:8.4::baseos", "cpe:/o:redhat:rhel_tus:8.4::baseos" ]
null
7.5
null
null
RHSA-2012:1559
Red Hat Security Advisory: JBoss Enterprise BRMS Platform 5.3.0 security update
apache-cxf: Apache CXF does not verify that elements were signed / encrypted by a particular Supporting Token
[ "cpe:/a:redhat:jboss_enterprise_brms_platform:5.3" ]
null
null
null
null
RHSA-2007:0386
Red Hat Security Advisory: mutt security update
Multiple mutt tempfile race conditions fetchmail/mutt/evolution/...: APOP password disclosure vulnerability Buffer overflow in mutt's gecos structure handling
[ "cpe:/o:redhat:enterprise_linux:3::as", "cpe:/o:redhat:enterprise_linux:3::desktop", "cpe:/o:redhat:enterprise_linux:3::es", "cpe:/o:redhat:enterprise_linux:3::ws", "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws", "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
RHSA-2007:1165
Red Hat Security Advisory: libexif security update
libexif infinite recursion flaw (DoS) libexif integer overflow
[ "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::client_workstation", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
RHSA-2022:9032
Red Hat Security Advisory: Red Hat build of Eclipse Vert.x 4.3.4 security update
SnakeYaml: Constructor Deserialization Remote Code Execution jackson-databind: deep wrapper array nesting wrt UNWRAP_SINGLE_VALUE_ARRAYS jackson-databind: use of deeply nested arrays
[ "cpe:/a:redhat:openshift_application_runtimes:1.0" ]
null
7.5
null
null
RHSA-2018:3402
Red Hat Security Advisory: libvirt security update
hw: cpu: speculative store bypass
[ "cpe:/o:redhat:rhel_eus:6.7::computenode", "cpe:/o:redhat:rhel_eus:6.7::server" ]
null
null
5.6
null
RHSA-2017:1412
Red Hat Security Advisory: eap7-jboss-ec2-eap security update
Resteasy: Yaml unmarshalling vulnerable to RCE wildfly: Arbitrary file read via path traversal undertow: HTTP Request smuggling vulnerability due to permitting invalid characters in HTTP requests undertow: IO thread DoS via unclean Websocket closing
[ "cpe:/a:redhat:jboss_enterprise_application_platform:7::el6", "cpe:/a:redhat:jboss_enterprise_application_platform:7::el7" ]
null
null
7.5
null
RHSA-2023:0758
Red Hat Security Advisory: Red Hat build of Quarkus 2.13.7 release and security update
SnakeYaml: Constructor Deserialization Remote Code Execution codec-haproxy: HAProxyMessageDecoder Stack Exhaustion DoS postgresql-jdbc: Information leak of prepared statement data due to insecure temporary file permissions mina-sshd: Java unsafe deserialization vulnerability quarkus-vertx-http: a cross-site attack may be initiated which might lead to the Information Disclosure
[ "cpe:/a:redhat:quarkus:2.13" ]
null
5.3
null
null
RHSA-2009:1562
Red Hat Security Advisory: tomcat security update
Improve cookie parsing for tomcat5 tomcat request dispatcher information disclosure vulnerability tomcat6 Denial-Of-Service with AJP connection tomcat6 Information disclosure in authentication classes tomcat: XSS in Apache Tomcat calendar application tomcat XML parser information disclosure
[ "cpe:/a:redhat:rhel_application_server:2" ]
null
null
null
null
RHSA-2016:2006
Red Hat Security Advisory: kernel security and bug fix update
kernel: Uninitialized variable in request_key handling causes kernel crash in error handling path kernel: Heap buffer overflow in hiddev driver
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
7.8
null
RHSA-2022:0226
Red Hat Security Advisory: Red Hat OpenShift Enterprise Logging bug fix and security update (5.1.7)
nodejs-ua-parser-js: ReDoS via malicious User-Agent header log4j-core: remote code execution via JDBC Appender
[ "cpe:/a:redhat:logging:5.1::el8" ]
null
6.6
null
null
RHSA-2023:5719
Red Hat Security Advisory: go-toolset-1.19 and go-toolset-1.19-golang security update
golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487) HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack)
[ "cpe:/a:redhat:devtools:2023::el7" ]
null
7.5
null
null
RHSA-2008:0892
Red Hat Security Advisory: xen security and bug fix update
qemu/kvm/xen: add image format options for USB storage and removable media qemu/xen/kvm: ioemu: Fix PVFB backend to limit frame buffer size
[ "cpe:/a:redhat:rhel_virtualization:5::client", "cpe:/a:redhat:rhel_virtualization:5::server", "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
RHSA-2024:0045
Red Hat Security Advisory: OpenShift Container Platform 4.16.0 security update
dnspython: denial of service in stub resolver golang: net/http/cookiejar: incorrect forwarding of sensitive headers and cookies on HTTP redirect golang: net/http: golang: mime/multipart: golang: net/textproto: memory exhaustion in Request.ParseMultipartForm containers/image: digest type does not guarantee valid type golang: crypto/x509: Verify panics on certificates with an unknown public key algorithm golang: net/mail: comments in display names are incorrectly handled golang: html/template: errors returned from MarshalJSON methods may break template escaping golang-protobuf: encoding/protojson, internal/encoding/json: infinite loop in protojson.Unmarshal when unmarshaling certain forms of invalid JSON jose: resource exhaustion
[ "cpe:/a:redhat:openshift:4.16::el8", "cpe:/a:redhat:openshift:4.16::el9", "cpe:/a:redhat:openshift_ironic:4.16::el9" ]
null
5.3
null
null
RHSA-2021:0834
Red Hat Security Advisory: openvswitch2.11 security update
lldp/openvswitch: denial of service via externally triggered memory leak openvswitch: limitation in the OVS packet parsing in userspace leads to DoS
[ "cpe:/o:redhat:enterprise_linux:7::fastdatapath" ]
null
7.5
null
null
RHSA-2016:2068
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 6.4.11 update on RHEL 6
tomcat: Usage of vulnerable FileUpload package can result in denial of service
[ "cpe:/a:redhat:jboss_enterprise_application_platform:6::el6" ]
null
null
7.5
null
RHSA-2024:11185
Red Hat Security Advisory: edk2:20220126gitbb1bba3d77 security update
edk2: Integer overflows in PeCoffLoaderRelocateImage
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
5.9
null
null
RHSA-2017:3194
Red Hat Security Advisory: httpd security update
httpd: ap_get_basic_auth_pw() authentication bypass httpd: mod_ssl NULL pointer dereference httpd: ap_find_token() buffer overread httpd: mod_mime buffer overread httpd: Uninitialized memory reflection in mod_auth_digest httpd: Use-after-free by limiting unregistered HTTP method (Optionsbleed)
[ "cpe:/o:redhat:rhel_eus:7.3::computenode", "cpe:/o:redhat:rhel_eus:7.3::server" ]
null
null
5.9
null
RHSA-2021:4133
Red Hat Security Advisory: thunderbird security update
Mozilla: iframe sandbox rules did not apply to XSLT stylesheets Mozilla: Use-after-free in file picker dialog Mozilla: Firefox could be coaxed into going into fullscreen mode without notification or warning Mozilla: Opportunistic Encryption in HTTP2 could be used to bypass the Same-Origin-Policy on services hosted on other ports Mozilla: Permission Prompt could be overlaid, resulting in user confusion and potential spoofing Mozilla: Javascript alert box could have been spoofed onto an arbitrary domain thunderbird: Memory corruption when processing S/MIME messages Mozilla: Memory safety bugs fixed in Firefox 94 and Firefox ESR 91.3 Mozilla: Use-after-free in HTTP2 Session object
[ "cpe:/a:redhat:rhel_eus:8.1::appstream" ]
null
8.8
6.1
null
RHSA-2018:2308
Red Hat Security Advisory: openslp security update
openslp: Heap memory corruption in slpd/slpd_process.c allows denial of service or potentially code execution
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
7.5
null
RHSA-2023:6251
Red Hat Security Advisory: OpenShift Virtualization 4.11.7 Images security and bug fix update
golang.org/x/net/http2: avoid quadratic complexity in HPACK decoding golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487) HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack)
[ "cpe:/a:redhat:container_native_virtualization:4.11::el8" ]
null
7.5
null
null
RHSA-2022:5003
Red Hat Security Advisory: Red Hat OpenShift Service Mesh 2.0.10 security update
envoy: Segfault in GrpcHealthCheckerImpl envoy: Decompressors can be zip bombed
[ "cpe:/a:redhat:service_mesh:2.0::el8" ]
null
7.5
null
null
RHSA-2008:0058
Red Hat Security Advisory: wireshark security update
wireshark mp3 and ncp flaws wireshark ppp flaws wireshark DNP3 flaws wireshark SSL and OS/400 trace flaws wireshark ANSI MAP flaws wireshark firebird/interbase flaws wireshark HTTP dissector flaws wireshark MEGACO dissector flaws wireshark DCP ETSI dissector flaws wireshark Bluetooth SDP dissector flaws wireshark RPC Portmap flaws wireshark SMB dissector crash wireshark IPv6 and USB dissector crash wireshark WiMAX dissector possible crash wireshark RPL dissector crash wireshark CIP dissector crash
[ "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws", "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::client_workstation", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
RHSA-2023:4164
Red Hat Security Advisory: java-11-openjdk security and bug fix update
OpenJDK: HTTP client insufficient file name validation (8302475) OpenJDK: ZIP file parsing infinite loop (8302483) OpenJDK: weakness in AES implementation (8308682) OpenJDK: array indexing integer overflow issue (8304468) OpenJDK: improper handling of slash characters in URI-to-path conversion (8305312) harfbuzz: allows attackers to trigger O(n^2) growth via consecutive marks
[ "cpe:/a:redhat:rhel_eus:8.6::appstream", "cpe:/a:redhat:rhel_eus:8.6::crb" ]
null
7.5
null
null
RHSA-2008:0516
Red Hat Security Advisory: evolution security update
evolution: iCalendar buffer overflow via large timezone specification
[ "cpe:/o:redhat:enterprise_linux:3::as", "cpe:/o:redhat:enterprise_linux:3::desktop", "cpe:/o:redhat:enterprise_linux:3::es", "cpe:/o:redhat:enterprise_linux:3::ws", "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws" ]
null
null
null
null
RHSA-2024:0990
Red Hat Security Advisory: rh-postgresql12-postgresql security update
postgresql: non-owner 'REFRESH MATERIALIZED VIEW CONCURRENTLY' executes arbitrary SQL
[ "cpe:/a:redhat:rhel_software_collections:3::el7" ]
null
8
null
null
RHSA-2025:2668
Red Hat Security Advisory: .NET 9.0 security, bug fix, and enhancement update
dotnet: Privilege Escalation Vulnerability in .NET SignInManager.RefreshSignInAsync Method
[ "cpe:/a:redhat:enterprise_linux:9::appstream", "cpe:/a:redhat:enterprise_linux:9::crb" ]
null
7.8
null
null
RHSA-2011:1317
Red Hat Security Advisory: cyrus-imapd security update
cyrus-imapd: nntpd buffer overflow in split_wildmats()
[ "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws", "cpe:/o:redhat:enterprise_linux:5::client_workstation", "cpe:/o:redhat:enterprise_linux:5::server", "cpe:/o:redhat:enterprise_linux:6::server" ]
null
null
null
null
RHSA-2020:0924
Red Hat Security Advisory: devtoolset-8-gcc security update
gcc: POWER9 "DARN" RNG intrinsic produces repeated output
[ "cpe:/a:redhat:rhel_software_collections:3::el6", "cpe:/a:redhat:rhel_software_collections:3::el7" ]
null
null
7.5
null
RHSA-2020:1493
Red Hat Security Advisory: kernel-alt security and bug fix update
kernel: triggering AP to send IAPP location updates for stations before the required authentication process has completed can lead to DoS kernel: heap-based buffer overflow in mwifiex_process_country_ie() function in drivers/net/wireless/marvell/mwifiex/sta_ioctl.c kernel: heap overflow in marvell/mwifiex/tdls.c kernel: powerpc: local user can read vector registers of other users' processes via an interrupt kernel: a NULL pointer dereference in drivers/net/wireless/ath/ath10k/usb.c leads to a crash kernel: out-of-bounds array access in __xfrm_policy_unlink kernel: when cpu.cfs_quota_us is used allows attackers to cause a denial of service against non-cpu-bound applications kernel: Null pointer dereference in drop_sysctl_table() in fs/proc/proc_sysctl.c kernel: memory leak in mwifiex_tm_cmd in drivers/net/wireless/marvell/mwifiex/cfg80211.c
[ "cpe:/o:redhat:enterprise_linux:7::server" ]
null
5.2
4.3
null
RHSA-2009:0421
Red Hat Security Advisory: ghostscript security update
ghostscript: DoS (crash) in CCITTFax decoding filter ghostscript: Buffer overflow in BaseFont writer module for pdfwrite device ghostscript: Missing boundary check in Ghostscript's jbig2dec library argyllcms: Incomplete fix for CVE-2009-0583
[ "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::client_workstation", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
RHSA-2018:0011
Red Hat Security Advisory: kernel security update
An update for kernel is now available for Red Hat Enterprise Linux 6.7 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. [Updated 23rd January 2019] The text has been updated to correct the list of architectures addressed by the CVE-2017-5753 mitigation. No changes have been made to the packages.
[ "cpe:/o:redhat:rhel_eus:6.7::computenode", "cpe:/o:redhat:rhel_eus:6.7::server" ]
null
null
null
null
RHSA-2003:190
Red Hat Security Advisory: : : : Updated 2.4 kernel for pSeries and iSeries fixes vulnerabilities
cisco: information leak in ethernet frames. security flaw security flaw security flaw security flaw
[ "cpe:/o:redhat:linux:7.1" ]
null
5.3
null
null
RHSA-2022:5026
Red Hat Security Advisory: OpenShift Virtualization 4.10.2 Images security and bug fix update
prometheus/client_golang: Denial of service using InstrumentHandlerCounter
[ "cpe:/a:redhat:container_native_virtualization:4.10::el8" ]
null
7.5
null
null
RHSA-2019:3335
Red Hat Security Advisory: python27:2.7 security and bug fix update
numpy: crafted serialized object passed in numpy.load() in pickle python module allows arbitrary code execution python: CRLF injection via the query part of the url passed to urlopen() python: CRLF injection via the path part of the url passed to urlopen() python: Undocumented local_file protocol allows remote attackers to bypass protection mechanisms python-urllib3: CRLF injection due to not encoding the '\r\n' sequence leading to possible attack on internal service python-urllib3: Certification mishandle when error should be thrown
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
null
7.5
null
RHSA-2023:4523
Red Hat Security Advisory: curl security update
curl: GSS delegation too eager connection re-use curl: IDN wildcard match may lead to Improper Cerificate Validation
[ "cpe:/o:redhat:enterprise_linux:8::baseos" ]
null
5.9
null
null
RHSA-2024:5882
Red Hat Security Advisory: orc:0.4.28 security update
orc: Stack-based buffer overflow vulnerability in ORC
[ "cpe:/a:redhat:rhel_aus:8.2::appstream" ]
null
6.7
null
null
RHSA-2003:083
Red Hat Security Advisory: apache security update for Stronghold
security flaw security flaw
[ "cpe:/a:redhat:rhel_stronghold:4" ]
null
null
null
null
RHSA-2023:2061
Red Hat Security Advisory: Multicluster Engine for Kubernetes 2.1.6 security updates and bug fixes
http-cache-semantics: Regular Expression Denial of Service (ReDoS) vulnerability
[ "cpe:/a:redhat:multicluster_engine:2.1::el8" ]
null
7.5
null
null
RHSA-2023:7612
Red Hat Security Advisory: Red Hat build of Quarkus 3.2.9 release and security update
quarkus: GraphQL operations over WebSockets bypass apache-avro: Apache Avro Java SDK: Memory when deserializing untrusted data in Avro Java SDK snappy-java: Missing upper bound check on chunk length in snappy-java can lead to Denial of Service (DoS) impact
[ "cpe:/a:redhat:quarkus:3.2::el8" ]
null
7.5
null
null
RHSA-2018:2930
Red Hat Security Advisory: Red Hat JBoss Operations Network 3.3.11 security and bug fix update
jackson-databind: Unsafe deserialization due to incomplete black list (incomplete fix for CVE-2017-15095) tomcat: A bug in the UTF-8 decoder can lead to DoS slf4j: Deserialisation vulnerability in EventData constructor can allow for arbitrary code execution RichFaces: Injection of arbitrary EL expressions allows remote code execution via org.richfaces.renderkit.html.Paint2DResource
[ "cpe:/a:redhat:jboss_operations_network:3.3" ]
null
null
9.8
null
RHSA-2011:1249
Red Hat Security Advisory: Red Hat Enterprise MRG Grid 2.0 security, bug fix and enhancement update
cumin: broker username/password appears in the log file
[ "cpe:/a:redhat:enterprise_mrg:2::el5" ]
null
null
null
null
RHSA-2004:181
Red Hat Security Advisory: : Updated libpng packages fix crash
CAN-2004-0421 libpng can access out of bounds memory
[ "cpe:/o:redhat:linux:9" ]
null
null
null
null
RHSA-2024:7202
Red Hat Security Advisory: grafana security update
encoding/gob: golang: Calling Decoder.Decode on a message which contains deeply nested structures can cause a panic due to stack exhaustion
[ "cpe:/a:redhat:rhel_eus:9.2::appstream" ]
null
7.5
null
null
RHSA-2023:5771
Red Hat Security Advisory: bind9.16 security update
bind: stack exhaustion in control channel code may lead to DoS
[ "cpe:/a:redhat:rhel_eus:8.6::appstream", "cpe:/a:redhat:rhel_eus:8.6::crb" ]
null
7.5
null
null
RHSA-2022:5904
Red Hat Security Advisory: php security update
php: password of excessive length triggers buffer overflow leading to RCE
[ "cpe:/a:redhat:enterprise_linux:9::appstream" ]
null
8.8
null
null
RHSA-2006:0158
Red Hat Security Advisory: apache security update
httpd cross-site scripting flaw in mod_imap
[ "cpe:/o:redhat:enterprise_linux:2.1::as", "cpe:/o:redhat:enterprise_linux:2.1::aw", "cpe:/o:redhat:enterprise_linux:2.1::es", "cpe:/o:redhat:enterprise_linux:2.1::ws" ]
null
null
null
null
RHSA-2024:10734
Red Hat Security Advisory: thunderbird security update
thunderbird: Potential disclosure of plaintext in OpenPGP encrypted message firefox: thunderbird: Select list elements could be shown over another site firefox: thunderbird: CSP Bypass and XSS Exposure via Web Compatibility Shims firefox: thunderbird: URL Bar Spoofing via Manipulated Punycode and Whitespace Characters firefox: thunderbird: Unhandled Exception in Add-on Signature Verification firefox: thunderbird: Improper Keypress Handling in Executable File Confirmation Dialog firefox: thunderbird: Memory safety bugs fixed in Firefox 133, Thunderbird 133, Firefox ESR 128.5, and Thunderbird 128.5
[ "cpe:/a:redhat:rhel_aus:8.6::appstream", "cpe:/a:redhat:rhel_e4s:8.6::appstream", "cpe:/a:redhat:rhel_tus:8.6::appstream" ]
null
8.8
null
null
RHSA-2019:3843
Red Hat Security Advisory: kernel security update
hw: Machine Check Error on Page Size Change (IFU) hw: TSX Transaction Asynchronous Abort (TAA)
[ "cpe:/o:redhat:rhel_aus:6.5::server" ]
null
null
6.5
null
RHSA-2022:5337
Red Hat Security Advisory: go-toolset:rhel8 security and bug fix update
golang: encoding/pem: fix stack overflow in Decode golang: regexp: stack exhaustion via a deeply nested expression golang: crypto/elliptic: panic caused by oversized scalar golang: syscall: faccessat checks wrong group
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
6.2
null
null
RHSA-2002:169
Red Hat Security Advisory: : Updated ethereal packages are available
security flaw security flaw security flaw
[ "cpe:/o:redhat:linux:7.2", "cpe:/o:redhat:linux:7.3" ]
null
null
null
null
RHSA-2022:0317
Red Hat Security Advisory: OpenJDK 8u322 security update for Portable Linux Builds
OpenJDK: Incomplete deserialization class filtering in ObjectInputStream (Serialization, 8264934) OpenJDK: Insufficient URI checks in the XSLT TransformerImpl (JAXP, 8270492) OpenJDK: Unexpected exception thrown in regex Pattern (Libraries, 8268813) OpenJDK: Incomplete checks of StringBuffer and StringBuilder during deserialization (Libraries, 8270392) OpenJDK: Incorrect IdentityHashMap size checks during deserialization (Libraries, 8270416) OpenJDK: Incorrect access checks in XMLEntityManager (JAXP, 8270498) OpenJDK: Infinite loop related to incorrect handling of newlines in XMLEntityScanner (JAXP, 8270646) OpenJDK: Array indexing issues in LIRGenerator (Hotspot, 8272014) OpenJDK: Excessive resource use when reading JAR manifest attributes (Libraries, 8272026) OpenJDK: Insufficient checks when deserializing exceptions in ObjectInputStream (Serialization, 8272236) OpenJDK: Excessive memory allocation in BMPImageReader (ImageIO, 8273756) OpenJDK: Integer overflow in BMPImageReader (ImageIO, 8273838)
[ "cpe:/a:redhat:openjdk:1.8" ]
null
5.3
null
null
RHSA-2022:6823
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.4.7 Security update
undertow: potential security issue in flow control over HTTP/2 may lead to DOS(incomplete fix for CVE-2021-3629) undertow: Large AJP request may cause DoS snakeyaml: Denial of Service due to missing nested depth limitation for collections
[ "cpe:/a:redhat:jboss_enterprise_application_platform:7.4::el9" ]
null
7.5
null
null
RHSA-2023:5376
Red Hat Security Advisory: Red Hat OpenShift Data Foundation 4.13.3 security and bug fix update
golang: html/template: improper handling of JavaScript whitespace word-wrap: ReDoS
[ "cpe:/a:redhat:openshift_data_foundation:4.13::el9" ]
null
7.5
null
null
RHSA-2020:4464
Red Hat Security Advisory: libxslt security update
libxslt: xsltCheckRead and xsltCheckWrite routines security bypass by crafted URL libxslt: use after free in xsltCopyText in transform.c could lead to information disclosure
[ "cpe:/a:redhat:enterprise_linux:8::appstream", "cpe:/o:redhat:enterprise_linux:8::baseos" ]
null
7.5
6.3
null
RHSA-2024:1317
Red Hat Security Advisory: Red Hat JBoss Core Services Apache HTTP Server 2.4.57 SP3 security update
openssl: Generating excessively long X9.42 DH keys or checking excessively long X9.42 DH keys or parameters may be very slow mod_cluster/mod_proxy_cluster: Stored Cross site Scripting httpd: mod_macro: out-of-bounds read vulnerability libxml2: crafted xml can cause global buffer overflow curl: information disclosure by exploiting a mixed case flaw curl: excessively long file name may lead to unknown HSTS status libxml2: use-after-free in XMLReader
[ "cpe:/a:redhat:jboss_core_services:1" ]
null
7.5
null
null
RHSA-2011:0372
Red Hat Security Advisory: flash-plugin security update
flash-plugin: crash and potential arbitrary code execution (APSB11-05)
[ "cpe:/a:redhat:rhel_extras:5::client", "cpe:/a:redhat:rhel_extras:5::server", "cpe:/a:redhat:rhel_extras:6" ]
null
null
null
null
RHSA-2007:0513
Red Hat Security Advisory: gimp security update
GIMP multiple image loader integer overflows Gimp PSD integer overflow Gimp image loader multiple input validation flaws
[ "cpe:/o:redhat:enterprise_linux:2.1::as", "cpe:/o:redhat:enterprise_linux:2.1::aw", "cpe:/o:redhat:enterprise_linux:2.1::es", "cpe:/o:redhat:enterprise_linux:2.1::ws", "cpe:/o:redhat:enterprise_linux:3::as", "cpe:/o:redhat:enterprise_linux:3::desktop", "cpe:/o:redhat:enterprise_linux:3::es", "cpe:/o:redhat:enterprise_linux:3::ws", "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws", "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::client_workstation", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
RHSA-2023:1393
Red Hat Security Advisory: OpenShift Container Platform 4.10.55 security update
goutils: RandomAlphaNumeric and CryptoRandomAlphaNumeric are not as random as they should be
[ "cpe:/a:redhat:openshift:4.10::el8" ]
null
7
null
null
RHSA-2016:1485
Red Hat Security Advisory: chromium-browser security update
chromium-browser: various fixes from internal audits chromium-browser: sandbox escape in ppapi chromium-browser: use-after-free in extensions chromium-browser: heap-buffer-overflow in sfntly chromium-browser: same-origin bypass in blink chromium-browser: same-origin bypass in blink chromium-browser: use-after-free in blink chromium-browser: same-origin bypass in v8 chromium-browser: memory corruption in v8 chromium-browser: url spoofing libxml2: Use after free triggered by XPointer paths beginning with range-to chromium-browser: limited same-origin bypass in service workers chromium-browser: origin confusion in proxy authentication chromium-browser: url leakage via pac script chromium-browser: content-security-policy bypass chromium-browser: use after free in extensions chromium-browser: history sniffing with hsts and csp
[ "cpe:/a:redhat:rhel_extras:6" ]
null
null
6.5
null
RHSA-2017:2886
Red Hat Security Advisory: rh-mysql57-mysql security and bug fix update
mysql: Incorrect input validation allowing code execution via mysqldump mysql: Server: Replication unspecified vulnerability (CPU Jan 2017) mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2017) mysql: Server: DML unspecified vulnerability (CPU Jan 2017) mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2017) mysql: Server: Replication unspecified vulnerability (CPU Jan 2017) mysql: Server: InnoDB unspecified vulnerability (CPU Jan 2017) mysql: Server: DDL unspecified vulnerability (CPU Jan 2017) mysql: Server: DDL unspecified vulnerability (CPU Jan 2017) mysql: unrestricted mysqld_safe's ledir (CPU Jan 2017) mysql: Server: DML unspecified vulnerability (CPU Apr 2017) mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2017) mysql: insecure error log file handling in mysqld_safe, incomplete CVE-2016-6664 fix (CPU Jan 2017) mysql: Server: MyISAM unspecified vulnerability (CPU Jan 2017) mysql: Logging unspecified vulnerability (CPU Jan 2017) mysql: Server: Error Handling unspecified vulnerability (CPU Jan 2017) mysql: Server: X Plugin unspecified vulnerability (CPU Jan 2017) mysql: Server: Security: Encryption unspecified vulnerability (CPU Jan 2017) mysql: Server: DML unspecified vulnerability (CPU Apr 2017) mysql: Server: Memcached unspecified vulnerability (CPU Apr 2017) mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2017) mysql: Server: InnoDB unspecified vulnerability (CPU Apr 2017) mysql: Server: Security: Privileges unspecified vulnerability (CPU Apr 2017) mysql: Server: DML unspecified vulnerability (CPU Apr 2017) mysql: Server: DML unspecified vulnerability (CPU Apr 2017) mysql: Server: DML unspecified vulnerability (CPU Apr 2017) mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2017) mysql: Server: Audit Plug-in unspecified vulnerability (CPU Apr 2017) mysql: Server: Security: Privileges unspecified vulnerability (CPU Apr 2017) mysql: Server: Security: Privileges unspecified vulnerability (CPU Apr 2017) mysql: Server: Security: Privileges unspecified vulnerability (CPU Apr 2017) mysql: Server: DDL unspecified vulnerability (CPU Apr 2017) mysql: Server: Security: Privileges unspecified vulnerability (CPU Apr 2017) mysql: Server: C API unspecified vulnerability (CPU Apr 2017) mysql: Server: Security: Encryption unspecified vulnerability (CPU Apr 2017) mysql: Server: UDF unspecified vulnerability (CPU Jul 2017) mysql: integer underflow in get_56_lenc_string() leading to DoS (CPU Apr 2017) mysql: Incorrect input validation allowing code execution via mysqldump mysql: Server: Memcached unspecified vulnerability (CPU Jul 2017) mysql: Server: DML unspecified vulnerability (CPU Jul 2017) mysql: X Plugin unspecified vulnerability (CPU Jul 2017) mysql: Server: Optimizer unspecified vulnerability (CPU Jul 2017) mysql: Server: DML unspecified vulnerability (CPU Jul 2017) mysql: Server: DML unspecified vulnerability (CPU Jul 2017) mysql: Server: DML unspecified vulnerability (CPU Jul 2017) mysql: Server: Optimizer unspecified vulnerability (CPU Jul 2017) mysql: Server: DML unspecified vulnerability (CPU Jul 2017) mysql: Server: DML unspecified vulnerability (CPU Jul 2017) mysql: Server: Optimizer unspecified vulnerability (CPU Jul 2017) mysql: X Plugin unspecified vulnerability (CPU Jul 2017) mysql: Server: Replication unspecified vulnerability (CPU Jul 2017) mysql: Server: Charsets unspecified vulnerability (CPU Jul 2017) mysql: Server: Replication unspecified vulnerability (CPU Jul 2017) mysql: C API unspecified vulnerability (CPU Jul 2017) mysql: Client mysqldump unspecified vulnerability (CPU Jul 2017) mysql: Server: DDL unspecified vulnerability (CPU Jul 2017) mysql: Server: DDL unspecified vulnerability (CPU Jul 2017) mysql: Server: Security: Privileges unspecified vulnerability (CPU Jul 2019)
[ "cpe:/a:redhat:rhel_software_collections:2::el6", "cpe:/a:redhat:rhel_software_collections:2::el7" ]
null
null
2.7
null
RHSA-2007:0710
Red Hat Security Advisory: wireshark security update
Wireshark crashes when inspecting HTTP traffic Wireshark crashes when inspecting iSeries traffic Wireshark loops infinitely when inspecting DCP ETSI traffic Wireshark crashes when inspecting MMS traffic Wireshark corrupts the stack when inspecting BOOTP traffic
[ "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::client_workstation", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
RHSA-2003:068
Red Hat Security Advisory: vnc security update
security flaw
[ "cpe:/o:redhat:enterprise_linux:2.1::as" ]
null
null
null
null
RHSA-2024:4450
Red Hat Security Advisory: dotnet8.0 security update
dotnet: DoS in System.Text.Json dotnet: DoS in ASP.NET Core 8 dotnet: DoS when parsing X.509 Content and ObjectIdentifiers
[ "cpe:/a:redhat:enterprise_linux:9::appstream", "cpe:/a:redhat:enterprise_linux:9::crb" ]
null
5.3
null
null
RHSA-2005:366
Red Hat Security Advisory: kernel security update
security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw
[ "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws" ]
null
null
null
null
RHSA-2024:4562
Red Hat Security Advisory: OpenJDK 8u422 Security Update for Portable Linux Builds
OpenJDK: potential UTF8 size overflow (8314794) OpenJDK: Excessive symbol length can lead to infinite loop (8319859) OpenJDK: Range Check Elimination (RCE) pre-loop limit overflow (8320548) OpenJDK: Pack200 increase loading time due to improper header validation (8322106) OpenJDK: Out-of-bounds access in 2D image handling (8324559) OpenJDK: RangeCheckElimination array index overflow (8323231)
[ "cpe:/a:redhat:openjdk:1.8" ]
null
7.4
null
null
RHSA-2021:1214
Red Hat Security Advisory: libldb security update
samba: Out of bounds read in AD DC LDAP server
[ "cpe:/o:redhat:rhel_eus:8.1::baseos" ]
null
7.1
null
null
RHSA-2021:1030
Red Hat Security Advisory: tomcat security update
tomcat: Session fixation when using FORM authentication tomcat: Mishandling of Transfer-Encoding header allows for HTTP request smuggling
[ "cpe:/o:redhat:rhel_eus:7.7::computenode", "cpe:/o:redhat:rhel_eus:7.7::server" ]
null
4.3
null
null
RHSA-2020:1828
Red Hat Security Advisory: glibc security, bug fix, and enhancement update
glibc: LD_PREFER_MAP_32BIT_EXEC not ignored in setuid binaries
[ "cpe:/a:redhat:enterprise_linux:8::appstream", "cpe:/a:redhat:enterprise_linux:8::crb", "cpe:/o:redhat:enterprise_linux:8::baseos" ]
null
null
2.9
null
RHSA-2019:2551
Red Hat Security Advisory: OpenShift Container Platform 3.9 atomic-openshift-web-console security update
xterm.js: Mishandling of special characters allows for remote code execution
[ "cpe:/a:redhat:openshift:3.9::el7" ]
null
null
7.5
null