id
stringlengths
13
15
title
stringlengths
29
176
description
stringlengths
8
31.7k
cpes
sequencelengths
0
20
cvss_v4_0
null
cvss_v3_1
float64
0
10
cvss_v3_0
float64
0
10
cvss_v2_0
null
RHSA-2014:0917
Red Hat Security Advisory: nss and nspr security, bug fix, and enhancement update
nss: false start PR_Recv information disclosure security issue nss: TOCTOU, potential use-after-free in libssl's session ticket processing (MFSA 2014-12) nss: Do not allow p-1 as a public DH value (MFSA 2014-12) nss: IDNA hostname matching code does not follow RFC 6125 recommendation (MFSA 2014-45) nss: Race-condition in certificate verification can lead to Remote code execution (MFSA 2014-63) Mozilla: Out of bounds write in NSPR (MFSA 2014-55)
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
null
null
RHSA-2019:2101
Red Hat Security Advisory: exiv2 security, bug fix, and enhancement update
exiv2: heap-buffer-overflow in Exiv2::IptcData::printStructure in src/iptc.cpp exiv2: Excessive memory allocation in Exiv2::Jp2Image::readMetadata function in jp2image.cpp exiv2: out-of-bounds read in Exiv2::Internal::stringFormat image.cpp exiv2: invalid memory access in Exiv2::Internal::printCsLensFFFF function in canonmn_int.cpp exiv2: out of bounds read in IptcData::printStructure in iptc.c exiv2: OOB read in pngimage.cpp:tEXtToDataBuf() allows for crash via crafted file exiv2: SIGABRT caused by memory allocation in types.cpp:Exiv2::Internal::PngChunk::zlibUncompress() exiv2: SIGABRT by triggering an incorrect Safe::add call exiv2: heap-based buffer over-read in parseTXTChunk function exiv2: information leak via a crafted file exiv2: integer overflow in getData function in preview.cpp exiv2: integer overflow in the LoaderExifJpeg class in preview.cpp exiv2: heap-based buffer over-read in WebPImage::decodeChunks in webpimage.cpp exiv2: NULL pointer dereference in Exiv2::DataValue::copy in value.cpp leading to application crash exiv2: Stack overflow in CiffDirectory::readDirectory() at crwimage_int.cpp leading to denial of service exiv2: infinite loop in Exiv2::Image::printIFDStructure function in image.cpp exiv2: heap-based buffer over-read in Exiv2::IptcParser::decode in iptc.cpp exiv2: infinite loop in Exiv2::PsdImage::readMetadata in psdimage.cpp exiv2: heap-based buffer over-read in PngChunk::readRawProfile in pngchunk_int.cpp exiv2: NULL pointer dereference in Exiv2::isoSpeed in easyaccess.cpp exiv2: Heap-based buffer over-read in Exiv2::tEXtToDataBuf function resulting in a denial of service exiv2: Segmentation fault in Exiv2::Internal::TiffParserWorker::findPrimaryGroups function exiv2: Heap-based buffer over-read in Exiv2::Jp2Image::encodeJp2Header resulting in a denial of service exiv2: Infinite loop in Exiv2::Jp2Image::encodeJp2Header resulting in a denial of service exiv2: infinite recursion in Exiv2::Image::printTiffStructure in file image.cpp resulting in denial of service
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
4
null
RHSA-2018:2240
Red Hat Security Advisory: openslp security update
openslp: Heap memory corruption in slpd/slpd_process.c allows denial of service or potentially code execution
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
7.5
null
RHSA-2021:4059
Red Hat Security Advisory: curl security update
curl: Requirement to use TLS not properly enforced for IMAP, POP3, and FTP protocols curl: Server responses received before STARTTLS processed after TLS handshake
[ "cpe:/o:redhat:enterprise_linux:8::baseos" ]
null
6.1
null
null
RHSA-2024:4312
Red Hat Security Advisory: openssh security update
openssh: regreSSHion - race condition in SSH allows RCE/DoS
[ "cpe:/a:redhat:enterprise_linux:9::appstream", "cpe:/o:redhat:enterprise_linux:9::baseos" ]
null
8.1
null
null
RHSA-2024:0095
Red Hat Security Advisory: Red Hat Single Sign-On 7.6.6 security update on RHEL 8
keycloak: LDAP injection on username input keycloak: open redirect via "form_post.jwt" JARM response mode
[ "cpe:/a:redhat:red_hat_single_sign_on:7.6::el8" ]
null
4.6
null
null
RHSA-2015:1947
Red Hat Security Advisory: Red Hat JBoss Operations Network 3.3.4 update
Cassandra: remote code execution via unauthenticated JMX/RMI interface
[ "cpe:/a:redhat:jboss_operations_network:3.3" ]
null
null
null
null
RHSA-2005:582
Red Hat Security Advisory: httpd security update
security flaw security flaw
[ "cpe:/o:redhat:enterprise_linux:3::as", "cpe:/o:redhat:enterprise_linux:3::desktop", "cpe:/o:redhat:enterprise_linux:3::es", "cpe:/o:redhat:enterprise_linux:3::ws", "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws" ]
null
null
null
null
RHSA-2008:0154
Red Hat Security Advisory: kernel security and bug fix update
kernel: denial of service with wedged processes NULL dereference in iwl driver Linux Kernel isdn_net_setcfg buffer overflow Security: some HVM domain can access another domain memory. /proc/cpuinfo DoS on some ppc machines
[ "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
RHSA-2016:1041
Red Hat Security Advisory: thunderbird security update
Mozilla: Miscellaneous memory safety hazards (rv:38.8) (MFSA 2016-39) Mozilla: Miscellaneous memory safety hazards (rv:46.0 / rv:45.1 / rv:38.8) (MFSA 2016-39)
[ "cpe:/a:redhat:rhel_productivity:5", "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation", "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
null
null
RHSA-2020:3908
Red Hat Security Advisory: cpio security update
cpio: improper input validation when writing tar header fields leads to unexpected tar generation
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
6.7
null
RHSA-2025:2483
Red Hat Security Advisory: libxml2 security update
libxml2: Use-After-Free in libxml2 libxml2: Stack-based buffer overflow in xmlSnprintfElements of libxml2
[ "cpe:/a:redhat:rhel_e4s:9.0::appstream", "cpe:/o:redhat:rhel_e4s:9.0::baseos" ]
null
7.8
null
null
RHSA-2021:0811
Red Hat Security Advisory: Red Hat Integration Tech-Preview 3 Camel K security update
cassandra: allows manipulation of the RMI registry to perform a MITM attack and capture user names and passwords used to access the JMX interface apache-httpclient: incorrect handling of malformed authority component in request URIs jackson-databind: FasterXML DOMDeserializer insecure entity expansion is vulnerable to XML external entity (XXE)
[ "cpe:/a:redhat:integration:1" ]
null
7.5
null
null
RHSA-2023:6799
Red Hat Security Advisory: kpatch-patch security update
kernel: net/sched: cls_u32 component reference counter leak if tcf_change_indev() fails kernel: net/sched: cls_fw component can be exploited as result of failure in tcf_change_indev function kernel: tun: bugs for oversize packet when napi frags enabled in tun_napi_alloc_frags
[ "cpe:/o:redhat:rhel_e4s:8.1::baseos" ]
null
7.8
null
null
RHBA-2020:1255
Red Hat Bug Fix Advisory: OpenShift Container Platform 4.3.10 packages update
proglottis/gpgme: Use-after-free in GPGME bindings during container image pull
[ "cpe:/a:redhat:openshift:4.3::el7", "cpe:/a:redhat:openshift:4.3::el8" ]
null
7.5
null
null
RHSA-2016:1385
Red Hat Security Advisory: ceph security update
crash: mon_command crashes ceph monitors on receiving empty prefix
[ "cpe:/a:redhat:ceph_storage:1.3::ubuntu:14.04" ]
null
null
4.9
null
RHSA-2004:402
Red Hat Security Advisory: libpng security update
security flaw security flaw security flaw security flaw
[ "cpe:/o:redhat:enterprise_linux:3::as", "cpe:/o:redhat:enterprise_linux:3::desktop", "cpe:/o:redhat:enterprise_linux:3::es", "cpe:/o:redhat:enterprise_linux:3::ws" ]
null
null
null
null
RHSA-2024:1770
Red Hat Security Advisory: OpenShift Container Platform 4.15.9 bug fix and security update
golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487) HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack) sanitize-html: Information Exposure when used on the backend
[ "cpe:/a:redhat:openshift:4.15::el8", "cpe:/a:redhat:openshift:4.15::el9" ]
null
5.3
null
null
RHSA-2017:3151
Red Hat Security Advisory: chromium-browser security update
chromium-browser: stack buffer overflow in quic chromium-browser: use after free in v8
[ "cpe:/a:redhat:rhel_extras:6" ]
null
null
8.8
null
RHSA-2024:10857
Red Hat Security Advisory: Multicluster Engine for Kubernetes 2.7.2 security updates and bug fixes
opentelemetry-go-contrib: DoS vulnerability in otelgrpc due to unbound cardinality metrics path-to-regexp: Backtracking regular expressions cause ReDoS find-my-way: ReDoS vulnerability in multiparametric routes
[ "cpe:/a:redhat:multicluster_engine:2.7::el8", "cpe:/a:redhat:multicluster_engine:2.7::el9" ]
null
7.5
null
null
RHSA-2022:5729
Red Hat Security Advisory: OpenShift Container Platform 4.10.25 security update
golang: cmd/go: misinterpretation of branch names can lead to incorrect access control golang: crypto/elliptic: IsOnCurve returns true for invalid field elements golang: encoding/pem: fix stack overflow in Decode golang: regexp: stack exhaustion via a deeply nested expression golang: crypto/elliptic: panic caused by oversized scalar golang: syscall: faccessat checks wrong group
[ "cpe:/a:redhat:openshift:4.10::el7", "cpe:/a:redhat:openshift:4.10::el8" ]
null
6.2
null
null
RHSA-2007:0096
Red Hat Security Advisory: mod_jk security update
security flaw
[ "cpe:/a:redhat:rhel_application_stack:1" ]
null
null
null
null
RHSA-2021:0877
Red Hat Security Advisory: curl security update
curl: heap buffer overflow in function tftp_receive_packet()
[ "cpe:/o:redhat:rhel_eus:7.6::computenode", "cpe:/o:redhat:rhel_eus:7.6::server" ]
null
null
6.3
null
RHSA-2013:0235
Red Hat Security Advisory: jbossweb security update
Web: Bypass of security constraints
[ "cpe:/a:redhat:jboss_enterprise_portal_platform:5.2.2", "cpe:/a:redhat:jboss_enterprise_soa_platform:5.3" ]
null
null
null
null
RHSA-2016:1779
Red Hat Security Advisory: Red Hat CloudForms 3.x - 6 Month End Of Life Notice
This is the 6 Month notification for the End of Production Phase 2 of Red Hat CloudForms 3.x (3.0, 3.1 and 3.2).
[ "cpe:/a:cloudforms_managementengine:5::el6" ]
null
null
null
null
RHSA-2019:0651
Red Hat Security Advisory: Red Hat Ansible Tower 3.4.3
Red Hat Ansible Tower 3.4.3
[ "cpe:/a:redhat:ansible_tower:3.4::el7" ]
null
null
null
null
RHSA-2005:332
Red Hat Security Advisory: xloadimage security update
security flaw
[ "cpe:/o:redhat:enterprise_linux:3::as", "cpe:/o:redhat:enterprise_linux:3::desktop", "cpe:/o:redhat:enterprise_linux:3::es", "cpe:/o:redhat:enterprise_linux:3::ws", "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws" ]
null
null
null
null
RHSA-2013:0256
Red Hat Security Advisory: JBoss Enterprise Application Platform 5.2.0 security update
apache-cxf: SOAPAction spoofing on document literal web services apache-cxf: Bypass of security constraints on WS endpoints when using WSS4JInInterceptor
[ "cpe:/a:redhat:jboss_enterprise_application_platform:5.2.0" ]
null
null
null
null
RHSA-2003:068
Red Hat Security Advisory: vnc security update
security flaw
[ "cpe:/o:redhat:enterprise_linux:2.1::as" ]
null
null
null
null
RHSA-2019:0778
Red Hat Security Advisory: java-11-openjdk security update
OpenJDK: Slow conversion of BigDecimal to long (Libraries, 8211936) OpenJDK: Incorrect skeleton selection in RMI registry server-side dispatch handling (RMI, 8218453)
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
5.9
null
RHSA-2025:1674
Red Hat Security Advisory: bind security update
bind: bind9: Many records in the additional section cause CPU exhaustion
[ "cpe:/o:redhat:rhel_aus:7.7::server" ]
null
7.5
null
null
RHSA-2024:4672
Red Hat Security Advisory: containernetworking-plugins security update
golang-fips/openssl: Memory leaks in code encrypting and decrypting RSA payloads
[ "cpe:/a:redhat:rhel_e4s:9.0::appstream" ]
null
7.5
null
null
RHSA-2016:0625
Red Hat Security Advisory: samba security update
samba: Man-in-the-middle attacks possible with NTLMSSP authentication samba: Spoofing vulnerability when domain controller is configured samba: SAMR and LSA man in the middle attacks
[ "cpe:/o:redhat:rhel_els:4::as", "cpe:/o:redhat:rhel_els:4::es" ]
null
null
null
null
RHSA-2011:1105
Red Hat Security Advisory: libpng security update
libpng: regression of CVE-2004-0421 in 1.2.23+ libpng: buffer overwrite in png_rgb_to_gray libpng: Invalid read when handling empty sCAL chunks
[ "cpe:/o:redhat:enterprise_linux:6::server" ]
null
null
null
null
RHSA-2015:2077
Red Hat Security Advisory: rh-postgresql94-postgresql security update
postgresql: limited memory disclosure flaw in crypt() postgresql: stack overflow DoS when parsing json or jsonb inputs
[ "cpe:/a:redhat:rhel_software_collections:2::el6", "cpe:/a:redhat:rhel_software_collections:2::el7" ]
null
null
null
null
RHSA-2015:1189
Red Hat Security Advisory: kvm security update
qemu: pcnet: multi-tmd buffer overflow in the tx path
[ "cpe:/a:redhat:rhel_virtualization:5::client", "cpe:/a:redhat:rhel_virtualization:5::server" ]
null
null
null
null
RHSA-2013:1221
Red Hat Security Advisory: Fuse Message Broker 5.5.1 security update
activemq: Unauthenticated access to web console
[ "cpe:/a:redhat:fuse_message_broker:5.5.1" ]
null
null
null
null
RHSA-2002:261
Red Hat Security Advisory: Canna security update
security flaw security flaw
[ "cpe:/o:redhat:enterprise_linux:2.1::as", "cpe:/o:redhat:enterprise_linux:2.1::aw" ]
null
null
null
null
RHSA-2024:8172
Red Hat Security Advisory: resource-agents security update
pypa/setuptools: Remote code execution via download functions in the package_index module in pypa/setuptools
[ "cpe:/a:redhat:rhel_e4s:8.4::highavailability", "cpe:/a:redhat:rhel_tus:8.4::highavailability" ]
null
8.8
null
null
RHSA-2020:0703
Red Hat Security Advisory: http-parser security update
nodejs: HTTP request smuggling using malformed Transfer-Encoding header
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
7.1
null
null
RHSA-2019:2000
Red Hat Security Advisory: Red Hat OpenShift Enterprise final end-of-life notice
This is the final notification for the retirement of Red Hat OpenShift Enterprise 3.6 and Red Hat OpenShift Container Platform 3.7. This notification applies only to those customers with subscriptions for Red Hat OpenShift Enterprise 3.6 and Red Hat OpenShift Container Platform 3.7.
[ "cpe:/a:redhat:openshift:3.6::el7", "cpe:/a:redhat:openshift:3.7::el7" ]
null
null
null
null
RHSA-2020:2107
Red Hat Security Advisory: Red Hat Single Sign-On 7.3.8 security update on RHEL 7
keycloak: security issue on reset credential flow keycloak: problem with privacy after user logout keycloak: improper verification of certificate with host mismatch could result in information disclosure
[ "cpe:/a:redhat:red_hat_single_sign_on:7::el7" ]
null
5.3
null
null
RHSA-2008:0129
Red Hat Security Advisory: kernel security update
kernel vmsplice_to_pipe flaw
[ "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
RHSA-2023:7500
Red Hat Security Advisory: thunderbird security update
Mozilla: Out-of-bound memory access in WebGL2 blitFramebuffer Mozilla: Use-after-free in MessagePort::Entangled Mozilla: Clickjacking permission prompts using the fullscreen transition Mozilla: Use-after-free in ReadableByteStreamQueueEntry::Buffer Mozilla: Using Selection API would copy contents into X11 primary selection. Mozilla: Incorrect parsing of relative URLs starting with "///" Mozilla: Memory safety bugs fixed in Firefox 120, Firefox ESR 115.5, and Thunderbird 115.5
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
8.8
null
null
RHSA-2024:4052
Red Hat Security Advisory: dnsmasq security update
dnsmasq: default maximum EDNS.0 UDP packet size was set to 4096 but should be 1232
[ "cpe:/a:redhat:rhel_eus:9.2::appstream" ]
null
7.5
null
null
RHSA-2020:5118
Red Hat Security Advisory: OpenShift Container Platform 4.5.20 bug fix and golang security update
golang: data race in certain net/http servers including ReverseProxy can lead to DoS golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs
[ "cpe:/a:redhat:openshift:4.5::el7", "cpe:/a:redhat:openshift:4.5::el8" ]
null
7.5
null
null
RHSA-2017:2906
Red Hat Security Advisory: Red Hat Single Sign-On security update
jasypt: Vulnerable to timing attack against the password hash comparison keycloak: reflected XSS using HOST header keycloak: CSRF token fixation keycloak: resource privilege extension via access token in oauth libpam4j: Account check bypass
[ "cpe:/a:redhat:jboss_single_sign_on:7.1" ]
null
null
4.3
null
RHSA-2024:9552
Red Hat Security Advisory: thunderbird security update
firefox: Use-after-free in Animation timeline (128.3.1 ESR Chemspill) firefox: thunderbird: Permission leak via embed or object elements firefox: thunderbird: Use-after-free in layout with accessibility firefox: thunderbird: Confusing display of origin for external protocol handler prompt firefox: thunderbird: XSS due to Content-Disposition being ignored in multipart/x-mixed-replace response firefox: thunderbird: Origin of permission prompt could be spoofed by long URL firefox: thunderbird: Cross origin video frame leak firefox: thunderbird: History interface could have been used to cause a Denial of Service condition in the browser firefox: thunderbird: Clipboard "paste" button persisted across tabs firefox: DOM push subscription message could hang Firefox firefox: thunderbird: Memory safety bugs fixed in Firefox 132, Thunderbird 132, Firefox ESR 128.4, and Thunderbird 128.4
[ "cpe:/a:redhat:enterprise_linux:9::appstream" ]
null
8.8
null
null
RHSA-2012:0730
Red Hat Security Advisory: java-1.6.0-openjdk security update
OpenJDK: improper protection of CORBA data models (CORBA, 7079902) OpenJDK: fontmanager layout lookup code memory corruption (2D, 7143617) OpenJDK: SynthLookAndFeel application context bypass (Swing, 7143614) OpenJDK: insecure temporary file permissions (JRE, 7143606) OpenJDK: CRL and certificate extensions handling improvements (Security, 7143872) OpenJDK: mutable repository identifiers in generated stub code (CORBA, 7143851) OpenJDK: insufficient field accessibility checks (HotSpot, 7152811) OpenJDK: XML parsing infinite loop (JAXP, 7157609) OpenJDK: insufficient invokespecial <init> verification (HotSpot, 7160757)
[ "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
RHSA-2017:0455
Red Hat Security Advisory: Red Hat JBoss Web Server 3.1.0 security and enhancement update
tomcat: timing attack in Realm implementation tomcat: unsafe chown of catalina.log in tomcat init script allows privilege escalation tomcat: Usage of vulnerable FileUpload package can result in denial of service tomcat: security manager bypass via IntrospectHelper utility function tomcat: tomcat writable config files allow privilege escalation tomcat: system property disclosure tomcat: security manager bypass via JSP Servlet config parameters tomcat: unrestricted access to global resources tomcat: HTTP Request smuggling vulnerability due to permitting invalid character in HTTP requests tomcat: Remote code execution vulnerability in JmxRemoteLifecycleListener tomcat: information disclosure due to incorrect Processor sharing
[ "cpe:/a:redhat:jboss_enterprise_web_server:3.1::el6" ]
null
null
7.5
null
RHBA-2019:3092
Red Hat Bug Fix Advisory: docker bug fix update
docker: command injection due to a missing validation of the git ref command
[ "cpe:/a:redhat:rhel_extras_other:7" ]
null
null
6.7
null
RHSA-2024:2094
Red Hat Security Advisory: security update Logging for Red Hat OpenShift - 5.8.6
kernel: Use-after-free in nft_verdict_dump due to a race between set GC and transaction openssl: Incorrect cipher key and IV length processing kernel: A heap out-of-bounds write when function perf_read_group is called and sibling_list is smaller than its child's sibling_list gnutls: timing side-channel in the RSA-PSK authentication kernel: NULL pointer dereference in nvmet_tcp_build_iovec kernel: NULL pointer dereference in nvmet_tcp_execute_request kernel: NULL pointer dereference in __nvmet_req_complete kernel: Out-Of-Bounds Read vulnerability in smbCalcSize kernel: OOB Access in smb2_dump_detail kernel: inactive elements in nft_pipapo_walk curl: information disclosure by exploiting a mixed case flaw kernel: use-after-free in amdgpu_cs_wait_all_fences in drivers/gpu/drm/amd/amdgpu/amdgpu_cs.c kernel: netfilter: use-after-free in nft_trans_gc_catchall_sync leads to privilege escalation gnutls: incomplete fix for CVE-2023-5981 gnutls: rejects certificate chain with distributed trust kernel: ktls overwrites readonly memory pages when using function splice with a ktls socket as destination
[ "cpe:/a:redhat:logging:5.8::el9" ]
null
7
null
null
RHSA-2023:6808
Red Hat Security Advisory: tigervnc security update
xorg-x11-server: Out-of-bounds write in XIChangeDeviceProperty/RRChangeOutputProperty
[ "cpe:/a:redhat:rhel_e4s:8.1::appstream" ]
null
7.8
null
null
RHSA-2015:1919
Red Hat Security Advisory: java-1.8.0-openjdk security update
OpenJDK: kerberos realm name leak (JGSS, 8048030) OpenJDK: inefficient use of hash tables and lists during XML parsing (JAXP, 8068842) OpenJDK: missing checks for proper initialization in ObjectStreamClass (Serialization, 8103671) OpenJDK: HttpURLConnection header restriction bypass (Libraries, 8130193) OpenJDK: insufficient permission checks in StubGenerator (CORBA, 8076383) OpenJDK: OOB access in CMS code (2D, 8086092) OpenJDK: leak of user.dir location (JAXP, 8078427) OpenJDK: java.nio Buffers integer overflow issues (Libraries, 8130891) ICU: missing boundary checks in layout engine (OpenJDK 2D, 8132042) OpenJDK: incorrect access control context used in DGCImpl (RMI, 8080688) OpenJDK: CRL checking flaw (Libraries, 8081744) OpenJDK: incomplete constraints enforcement by AlgorithmChecker (Security, 8131291) OpenJDK: missing type checks in IIOPInputStream (CORBA, 8076392) OpenJDK: incorrect String object deserialization in IIOPInputStream (CORBA, 8076387) OpenJDK: incorrect access control context used in DGCClient (RMI, 8076413) OpenJDK: incomplete MaxXMLNameLimit enforcement (JAXP, 8086733) OpenJDK: insufficient proxy class checks in RemoteObjectInvocationHandler (RMI, 8076339) OpenJDK: incomplete supportDTD enforcement (JAXP, 8130078)
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation", "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
null
null
RHSA-2023:0688
Red Hat Security Advisory: openvswitch2.17 security, bug fix and enhancement update
openvswitch: Out-of-Bounds Read in Organization Specific TLV openvswitch: Integer Underflow in Organization Specific TLV
[ "cpe:/o:redhat:enterprise_linux:8::fastdatapath" ]
null
9.8
null
null
RHSA-2007:0891
Red Hat Security Advisory: php security update
gd / php-gd ImageCreateFromPng infinite loop caused by truncated PNG php chunk_split integer overflow php cross-site cookie insertion php multiple integer overflows in gd php floating point exception inside wordwrap php money_format format string issue php malformed cookie handling
[ "cpe:/a:redhat:rhel_application_stack:1" ]
null
null
null
null
RHSA-2024:2517
Red Hat Security Advisory: wpa_supplicant security update
wpa_supplicant: potential authorization bypass
[ "cpe:/o:redhat:enterprise_linux:9::baseos" ]
null
6.5
null
null
RHSA-2024:7443
Red Hat Security Advisory: RHACS 4.5 enhancement and security update
nodejs-async: Regular expression denial of service while parsing function in autoinject
[ "cpe:/a:redhat:advanced_cluster_security:4.5::el8" ]
null
5.3
null
null
RHSA-2003:041
Red Hat Security Advisory: : : : Updated VNC packages fix replay and cookie vulnerabilities
security flaw security flaw
[ "cpe:/o:redhat:linux:7.0", "cpe:/o:redhat:linux:7.1", "cpe:/o:redhat:linux:7.2", "cpe:/o:redhat:linux:7.3", "cpe:/o:redhat:linux:8.0" ]
null
null
null
null
RHSA-2004:240
Red Hat Security Advisory: squirrelmail security update
security flaw security flaw security flaw
[ "cpe:/o:redhat:enterprise_linux:3::as", "cpe:/o:redhat:enterprise_linux:3::desktop", "cpe:/o:redhat:enterprise_linux:3::es", "cpe:/o:redhat:enterprise_linux:3::ws" ]
null
null
null
null
RHSA-2015:0115
Red Hat Security Advisory: kernel security update
kernel: sctp: skb_over_panic when receiving malformed ASCONF chunks kernel: net: sctp: fix panic on duplicate ASCONF chunks kernel: net: sctp: remote memory pressure from excessive queueing
[ "cpe:/o:redhat:rhel_mission_critical:6.2::server" ]
null
null
null
null
RHSA-2020:4111
Red Hat Security Advisory: qemu-kvm-rhev security update
QEMU: usb: out-of-bounds r/w access issue while processing usb packets
[ "cpe:/a:redhat:rhev_manager:4.3", "cpe:/o:redhat:enterprise_linux:7::hypervisor" ]
null
5
null
null
RHSA-2013:1270
Red Hat Security Advisory: polkit security update
polkit: unix-process subject for authorization is racy
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
null
null
RHSA-2008:0812
Red Hat Security Advisory: RealPlayer security update
RealPlayer: SWF Frame Handling Buffer Overflow
[ "cpe:/a:redhat:rhel_extras:3", "cpe:/a:redhat:rhel_extras:4", "cpe:/a:redhat:rhel_extras:5::client", "cpe:/a:redhat:rhel_extras:5::server" ]
null
null
null
null
RHSA-2019:1633
Red Hat Security Advisory: Red Hat OpenShift Container Platform 3.11 atomic-openshift security update
kubernetes: Incomplete fix for CVE-2019-1002101 allows for arbitrary file write via `kubectl cp`
[ "cpe:/a:redhat:openshift:3.11::el7" ]
null
null
5.3
null
RHSA-2020:2040
Red Hat Security Advisory: squid security update
squid: improper check for new member in ESIExpression::Evaluate allows for stack buffer overflow squid: parsing of header Proxy-Authentication leads to memory corruption squid: improper access restriction upon Digest Authentication nonce replay could lead to remote code execution
[ "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
8.1
4.3
null
RHSA-2004:191
Red Hat Security Advisory: cadaver security update
security flaw
[ "cpe:/o:redhat:enterprise_linux:2.1::as", "cpe:/o:redhat:enterprise_linux:2.1::aw", "cpe:/o:redhat:enterprise_linux:2.1::es", "cpe:/o:redhat:enterprise_linux:2.1::ws" ]
null
null
null
null
RHSA-2023:6179
Red Hat Security Advisory: Red Hat Product OCP Tools 4.13 OpenShift Jenkins security update
snakeyaml: Denial of Service due to missing nested depth limitation for collections maven-shared-utils: Command injection via Commandline class apache-commons-text: variable interpolation RCE jenkins-2-plugins/script-security: Sandbox bypass vulnerability in Script Security Plugin jenkins-2-plugins/JUnit: Stored XSS vulnerability in JUnit Plugin jenkins-2-plugins/pipeline-build-step: Stored XSS vulnerability in Pipeline: Build Step Plugin golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487) HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack)
[ "cpe:/a:redhat:ocp_tools:4.13::el8" ]
null
7.5
null
null
RHSA-2024:1557
Red Hat Security Advisory: Errata Advisory for Red Hat OpenShift Builds 1.0.1
ssh: Prefix truncation attack on Binary Packet Protocol (BPP) go-git: Maliciously crafted Git server replies can cause DoS on go-git clients go-git: Maliciously crafted Git server replies can lead to path traversal and RCE on go-git clients
[ "cpe:/a:redhat:openshift_builds:1.0::el8" ]
null
8.1
null
null
RHSA-2023:2293
Red Hat Security Advisory: pki-core security, bug fix, and enhancement update
pki-core: When using the caServerKeygen_DirUserCert profile, user can get certificates for other UIDs by entering name in Subject field
[ "cpe:/a:redhat:enterprise_linux:9::appstream" ]
null
7.6
null
null
RHSA-2013:0770
Red Hat Security Advisory: java-1.6.0-openjdk security update
OpenJDK: sun.awt.datatransfer.ClassLoaderObjectInputStream class may incorrectly invoke the system class loader (CanSecWest 2013, AWT, 8009305) OpenJDK: JDBC driver manager improper toString calls (CanSecWest 2013, Libraries, 8009814) OpenJDK: JAXP missing security restrictions (JAXP, 6657673) OpenJDK: remote code loading enabled by default (RMI, 8001040) OpenJDK: LogStream.setDefaultStream() missing security restrictions (RMI, 8001329) OpenJDK: java.beans.ThreadGroupContext missing restrictions (Beans, 7200507) ICU: Layout Engine font layout and glyph table errors (JDK 2D, 8004994) ICU: Layout Engine font layout and glyph table errors (JDK 2D, 8004986) ICU: Layout Engine font layout and glyph table errors (JDK 2D, 8004987) OpenJDK: temporary files created with insecure permissions (JAX-WS, 8003542) OpenJDK: Network InetAddress serialization information disclosure (Networking, 8000724) ICU: Layout Engine font processing errors (JDK 2D, 8001031) OpenJDK: image processing vulnerability (2D, 8007617) OpenJDK: Hotspot MethodHandle lookup error (Hotspot, 8009699) OpenJDK: MethodUtil trampoline class incorrect restrictions (Libraries, 8009857) OpenJDK: MBeanInstantiator insufficient class access checks (JMX, 8006435) OpenJDK: ConcurrentHashMap incorrectly calls defaultReadObject() method (Libraries, 8009063) OpenJDK: JPEGImageWriter state corruption (ImageIO, 8007918) OpenJDK: JPEGImageReader state corruption (ImageIO, 8007667) OpenJDK: Hotspot intrinsic frames vulnerability (Hotspot, 8004336)
[ "cpe:/o:redhat:enterprise_linux:5::server", "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
null
null
RHSA-2024:4035
Red Hat Security Advisory: ovn-2021 security update
ovn: insufficient validation of BFD packets may lead to denial of service
[ "cpe:/o:redhat:enterprise_linux:8::fastdatapath" ]
null
6.5
null
null
RHSA-2019:3844
Red Hat Security Advisory: kernel-rt security update
hw: Machine Check Error on Page Size Change (IFU) hw: Intel GPU Denial Of Service while accessing MMIO in lower power state hw: TSX Transaction Asynchronous Abort (TAA)
[ "cpe:/a:redhat:enterprise_mrg:2:server:el6" ]
null
null
6.5
null
RHSA-2003:198
Red Hat Security Advisory: kernel security update
security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw
[ "cpe:/o:redhat:enterprise_linux:2.1::as", "cpe:/o:redhat:enterprise_linux:2.1::aw" ]
null
null
null
null
RHSA-2022:5095
Red Hat Security Advisory: grub2, mokutil, shim, and shim-unsigned-x64 security update
grub2: Crafted PNG grayscale images may lead to out-of-bounds write in heap grub2: Crafted PNG image may lead to out-of-bound write during huffman table handling grub2: Crafted JPEG image can lead to buffer underflow write in the heap grub2: Integer underflow in grub_net_recv_ip4_packets grub2: Out-of-bound write when handling split HTTP headers grub2: shim_lock verifier allows non-kernel files to be loaded grub2: use-after-free in grub_cmd_chainloader() shim: Buffer overflow when loading crafted EFI images
[ "cpe:/a:redhat:enterprise_linux:8::crb", "cpe:/o:redhat:enterprise_linux:8::baseos" ]
null
7.3
null
null
RHSA-2023:5376
Red Hat Security Advisory: Red Hat OpenShift Data Foundation 4.13.3 security and bug fix update
golang: html/template: improper handling of JavaScript whitespace word-wrap: ReDoS
[ "cpe:/a:redhat:openshift_data_foundation:4.13::el9" ]
null
7.5
null
null
RHSA-2023:2459
Red Hat Security Advisory: device-mapper-multipath security and bug fix update
device-mapper-multipath: multipathd: insecure handling of files in /dev/shm leading to symlink attack
[ "cpe:/a:redhat:enterprise_linux:9::crb", "cpe:/o:redhat:enterprise_linux:9::baseos" ]
null
7
null
null
RHSA-2015:1766
Red Hat Security Advisory: python-django security update
python-django: Denial-of-service possibility in logout() view by filling session store python-django: Denial-of-service possibility in logout() view by filling session store
[ "cpe:/a:redhat:openstack:5::el6" ]
null
null
null
null
RHSA-2022:8543
Red Hat Security Advisory: thunderbird security update
Mozilla: Service Workers might have learned size of cross-origin media files Mozilla: Fullscreen notification bypass Mozilla: Use-after-free in InputStream implementation Mozilla: Use-after-free of a JavaScript Realm Mozilla: Fullscreen notification bypass via windowName Mozilla: Use-after-free in Garbage Collection Mozilla: ServiceWorker-intercepted requests bypassed SameSite cookie policy Mozilla: Cross-Site Tracing was possible via non-standard override headers Mozilla: Symlinks may resolve to partially uninitialized buffers Mozilla: Keystroke Side-Channel Leakage Mozilla: Custom mouse cursor could have been drawn over browser UI Mozilla: Iframe contents could be rendered outside the iframe Mozilla: Memory safety bugs fixed in Firefox 107 and Firefox ESR 102.5
[ "cpe:/a:redhat:rhel_aus:8.2::appstream", "cpe:/a:redhat:rhel_e4s:8.2::appstream", "cpe:/a:redhat:rhel_tus:8.2::appstream" ]
null
8.8
6.1
null
RHSA-2020:3209
Red Hat Security Advisory: AMQ Online 1.5.2 release and security update
postgresql-jdbc: XML external entity (XXE) vulnerability in PgSQLXML amq-on: CSRF (in graphQL requests) AMQ: Denial of Service via unrecognized field injection
[ "cpe:/a:redhat:amq_online:1.5" ]
null
4.3
null
null
RHSA-2003:275
Red Hat Security Advisory: : Updated CUPS packages fix denial of service
security flaw
[ "cpe:/o:redhat:linux:8.0", "cpe:/o:redhat:linux:9" ]
null
null
null
null
RHSA-2024:0564
Red Hat Security Advisory: container-tools:3.0 security update
prometheus/client_golang: Denial of service using InstrumentHandlerCounter runc: AppArmor can be bypassed when `/proc` inside the container is symlinked with a specific mount configuration
[ "cpe:/a:redhat:rhel_aus:8.4::appstream", "cpe:/a:redhat:rhel_e4s:8.4::appstream", "cpe:/a:redhat:rhel_tus:8.4::appstream" ]
null
7.8
null
null
RHSA-2014:0027
Red Hat Security Advisory: java-1.7.0-openjdk security update
OpenJDK: jarsigner does not detect unsigned bytecode injected into signed jars OpenJDK: null xmlns handling issue (Security, 8025026) OpenJDK: insufficient security checks in CORBA stub factories (CORBA, 8026193) OpenJDK: JVM method processing issues (Libraries, 8029507) OpenJDK: com.sun.corba.se. should be restricted package (CORBA, 8025022) ICU: Layout Engine LookupProcessor insufficient input checks (JDK 2D, 8025034) OpenJDK: XML canonicalizer mutable strings passed to untrusted code (Security, 8026417) OpenJDK: insufficient Socket checkListen checks (Networking, 8011786) OpenJDK: SnmpStatusException handling issues (Serviceability, 7068126) OpenJDK: document builder missing security checks (JAXP, 8027201, 8025018) OpenJDK: TLS/SSL handshake timing issues (JSSE, 8023069) OpenJDK: insecure subject principals set handling (JAAS, 8024306) OpenJDK: insufficient package access checks in the Naming component (JNDI, 8025758) OpenJDK: XXE issue in decoder (Beans, 8023245) OpenJDK: insufficient security checks in IIOP streams (CORBA, 8025767)
[ "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
RHSA-2019:1714
Red Hat Security Advisory: bind security update
bind: Race condition when discarding malformed packets can cause bind to exit with assertion failure
[ "cpe:/a:redhat:enterprise_linux:8::appstream", "cpe:/o:redhat:enterprise_linux:8::baseos" ]
null
null
5.9
null
RHSA-2015:1646
Red Hat Security Advisory: rh-mariadb100-mariadb security update
mysql: unspecified vulnerability related to Server:Federated (CPU April 2015) mysql: unspecified vulnerability related to Server:Compiling (CPU April 2015) mysql: unspecified vulnerability related to Server:DDL (CPU April 2015) mysql: unspecified vulnerability related to Server:Optimizer (CPU April 2015) mysql: unspecified vulnerability related to Server:GIS (CPU July 2015) mysql: unspecified vulnerability related to Server:DML (CPU July 2015) mysql: unspecified vulnerability related to Server:Partition (CPU July 2015) mysql: unspecified vulnerability related to Server:Security:Privileges (CPU July 2015) mysql: unspecified vulnerability related to Server:Security:Firewall (CPU July 2015) mysql: unspecified vulnerability related to Server:Security:Privileges (CPU July 2015) mysql: unspecified vulnerability related to Server:Optimizer (CPU July 2015) mysql: unspecified vulnerability related to Server:DML (CPU July 2015) mysql: unspecified vulnerability related to Client (CPU July 2015) mysql: use of SSL/TLS can not be enforced in mysql client library (oCERT-2015-003, BACKRONYM) mysql: unspecified vulnerability related to Server:Pluggable Auth (CPU July 2015) mysql: unspecified vulnerability related to Server:I_S (CPU July 2015) mysql: unspecified vulnerability related to Server:InnoDB (CPU July 2015) mysql: unspecified vulnerability related to Server:Optimizer (CPU July 2015) mysql: unspecified vulnerability related to Server:Memcached (CPU July 2015) mysql: unspecified vulnerability related to Server:Security:Firewall (CPU July 2015) mysql: unspecified vulnerability related to Server:Security:Firewall (CPU July 2015) mysql: unspecified vulnerability related to Server:RBR (CPU July 2015) mysql: unspecified vulnerability related to Server:Partition (CPU July 2015) mysql: unspecified vulnerability related to Server:Security:Privileges (CPU October 2015) mysql: unspecified vulnerability related to Server:InnoDB (CPU October 2015)
[ "cpe:/a:redhat:rhel_software_collections:2::el6", "cpe:/a:redhat:rhel_software_collections:2::el7" ]
null
null
null
null
RHSA-2011:1019
Red Hat Security Advisory: libvirt security, bug fix, and enhancement update
libvirt: integer overflow in VirDomainGetVcpus
[ "cpe:/a:redhat:rhel_virtualization:5::client", "cpe:/a:redhat:rhel_virtualization:5::server" ]
null
null
null
null
RHSA-2023:5580
Red Hat Security Advisory: kpatch-patch security update
kernel: use-after-free in l2cap_connect and l2cap_le_connect_req in net/bluetooth/l2cap_core.c kernel: net/sched: Use-after-free vulnerabilities in the net/sched classifiers: cls_fw, cls_u32 and cls_route
[ "cpe:/o:redhat:rhel_e4s:8.2::baseos" ]
null
7.8
null
null
RHSA-2025:2959
Red Hat Security Advisory: thunderbird security update
firefox: thunderbird: Memory safety bugs fixed in Firefox 136, Thunderbird 136, Firefox ESR 115.21, Firefox ESR 128.8, and Thunderbird 128.8 firefox: thunderbird: Memory safety bugs fixed in Firefox 136, Thunderbird 136, Firefox ESR 128.8, and Thunderbird 128.8
[ "cpe:/a:redhat:rhel_eus:9.2::appstream" ]
null
8.8
null
null
RHSA-2023:7419
Red Hat Security Advisory: kpatch-patch security update
kernel: net/sched: sch_qfq component can be exploited if in qfq_change_agg function happens qfq_enqueue overhead kernel: net/sched: cls_fw component can be exploited as result of failure in tcf_change_indev function kernel: net/sched: Use-after-free vulnerabilities in the net/sched classifiers: cls_fw, cls_u32 and cls_route kernel: net/sched: Use-after-free vulnerabilities in the net/sched classifiers: cls_fw, cls_u32 and cls_route kernel: net/sched: Use-after-free vulnerabilities in the net/sched classifiers: cls_fw, cls_u32 and cls_route kernel: net/sched: Use-after-free vulnerabilities in the net/sched classifiers: cls_fw, cls_u32 and cls_route
[ "cpe:/o:redhat:enterprise_linux:7::server" ]
null
7.8
null
null
RHSA-2024:7670
Red Hat Security Advisory: Red Hat build of Quarkus 3.8.6.SP1 Security Update
An update is now available for Red Hat build of Quarkus. Red Hat Product Security has rated this update as having a security impact of Critical. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability. For more information, see the CVE links in the References section.
[ "cpe:/a:redhat:quarkus:3.8::el8" ]
null
null
null
null
RHSA-2010:0114
Red Hat Security Advisory: acroread security and bug fix update
flash-plugin: unauthorized cross-domain requests (APSB10-06) acroread: unspecified code execution flaw
[ "cpe:/a:redhat:rhel_extras:4", "cpe:/a:redhat:rhel_extras:5::client", "cpe:/a:redhat:rhel_extras:5::server" ]
null
null
null
null
RHSA-2021:1518
Red Hat Security Advisory: Red Hat Ceph Storage 3.3 Security and Bug Fix Update
ceph: specially crafted XML payload on POST requests leads to DoS by crashing RGW grafana: SSRF incorrect access control vulnerability allows unauthenticated users to make grafana send HTTP requests to any URL ceph: User credentials can be manipulated and stolen by Native CephFS consumers of OpenStack Manila tcmu-runner: SCSI target (LIO) write to any block on ILO backstore
[ "cpe:/a:redhat:ceph_storage:3::el7" ]
null
8.1
null
null
RHSA-2023:0612
Red Hat Security Advisory: rh-nodejs14-nodejs and rh-nodejs14-nodejs-nodemon security update
glob-parent: Regular Expression Denial of Service minimist: prototype pollution node-fetch: exposure of sensitive information to an unauthorized actor nodejs-minimatch: ReDoS via the braceExpand function express: "qs" prototype poisoning causes the hang of the node process nodejs: DNS rebinding in inspect via invalid octal IP address
[ "cpe:/a:redhat:rhel_software_collections:3::el7" ]
null
7.5
null
null
RHSA-2022:5805
Red Hat Security Advisory: kernel security update
kernel: a use-after-free write in the netfilter subsystem can lead to privilege escalation to root
[ "cpe:/o:redhat:rhel_aus:7.4::server" ]
null
7.8
null
null
RHSA-2012:1331
Red Hat Security Advisory: JBoss Operations Network 3.1.1 update
tomcat: large number of parameters DoS
[ "cpe:/a:redhat:jboss_operations_network:3.1" ]
null
null
null
null
RHSA-2017:0091
Red Hat Security Advisory: kernel-rt security and bug fix update
kernel: Use after free in tcp_xmit_retransmit_queue kernel: Use-after-free in the recvmmsg exit path kernel: Slab out-of-bounds access in sctp_sf_ootb()
[ "cpe:/a:redhat:rhel_extras_rt:7" ]
null
null
5.9
null
RHSA-2023:1747
Red Hat Security Advisory: pki-core:10.6 security update
pki-core: access to external entities when parsing XML can lead to XXE
[ "cpe:/a:redhat:rhel_aus:8.2::appstream", "cpe:/a:redhat:rhel_e4s:8.2::appstream", "cpe:/a:redhat:rhel_tus:8.2::appstream" ]
null
7.5
null
null
RHSA-2020:4391
Red Hat Security Advisory: openstack-cinder security update
openstack-cinder: Improper handling of ScaleIO backend credentials
[ "cpe:/a:redhat:openstack:13::el7" ]
null
6.5
null
null
RHSA-2024:8788
Red Hat Security Advisory: krb5 security update
freeradius: forgery attack
[ "cpe:/o:redhat:rhel_els:7" ]
null
9
null
null
RHSA-2020:2041
Red Hat Security Advisory: squid:4 security update
squid: improper check for new member in ESIExpression::Evaluate allows for stack buffer overflow squid: parsing of header Proxy-Authentication leads to memory corruption squid: improper access restriction upon Digest Authentication nonce replay could lead to remote code execution
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
8.1
4.3
null