id
stringlengths 13
15
| title
stringlengths 29
176
| description
stringlengths 8
32.1k
| cpes
sequencelengths 0
20
| cvss_v4_0
null | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
null |
---|---|---|---|---|---|---|---|
RHSA-2020:2440 | Red Hat Security Advisory: OpenShift Container Platform 4.3.25 openshift security update | kubernetes: Server side request forgery (SSRF) in kube-controller-manager allows users to leak secret information | [
"cpe:/a:redhat:openshift:4.3::el7",
"cpe:/a:redhat:openshift:4.3::el8"
] | null | 6.3 | null | null |
RHSA-2014:0764 | Red Hat Security Advisory: rubygem-openshift-origin-node security update | Origin: Command execution as root via downloadable cartridge source-url | [
"cpe:/a:redhat:openshift:2.0::el6"
] | null | null | null | null |
RHSA-2014:0530 | Red Hat Security Advisory: rubygem-openshift-origin-node security update | OpenShift: downloadable cartridge source url file command execution as root | [
"cpe:/a:redhat:openshift:2.0::el6"
] | null | null | null | null |
RHSA-2024:6044 | Red Hat Security Advisory: Red Hat Advanced Cluster Management 2.11.2 bug fixes and container updates | nodejs-semver: Regular expression denial of service | [
"cpe:/a:redhat:acm:2.11::el9"
] | null | 7.5 | null | null |
RHSA-2009:1188 | Red Hat Security Advisory: flash-plugin security update | flash-plugin: Remote code execution vulnerability via malicious SWF (Shockwave Flash) content flash-plugin: multiple code execution flaws (APSB09-10) flash-plugin: multiple code execution flaws (APSB09-10) flash-plugin: multiple code execution flaws (APSB09-10) flash-plugin: multiple code execution flaws (APSB09-10) flash-plugin: multiple information disclosure flaws (APSB09-10) flash-plugin: multiple code execution flaws (APSB09-10) flash-plugin: multiple code execution flaws (APSB09-10) flash-plugin: multiple information disclosure flaws (APSB09-10) | [
"cpe:/a:redhat:rhel_extras:5::client",
"cpe:/a:redhat:rhel_extras:5::server"
] | null | null | null | null |
RHSA-2007:0108 | Red Hat Security Advisory: thunderbird security update | security flaw NSS: SSLv2 protocol buffer overflows NSS: SSLv2 protocol buffer overflows security flaw security flaw security flaw security flaw security flaw security flaw : seamonkey cookie setting / same-domain bypass vulnerability security flaw security flaw security flaw | [
"cpe:/o:redhat:enterprise_linux:5::client"
] | null | null | null | null |
RHSA-2015:0980 | Red Hat Security Advisory: pcs security and bug fix update | pcs: improper web session variable signing pcs: improper web session variable signing | [
"cpe:/o:redhat:enterprise_linux:7::server"
] | null | null | null | null |
RHSA-2015:0661 | Red Hat Security Advisory: qpid-cpp security and bug fix update | qpid-cpp: 3 qpidd DoS issues in AMQP 0-10 protocol handling qpid-cpp: anonymous access to qpidd cannot be prevented qpid-cpp: AMQP 0-10 protocol sequence-set maximal range DoS (incomplete CVE-2015-0203 fix) | [
"cpe:/a:redhat:enterprise_mrg:2:computenode:el6",
"cpe:/a:redhat:enterprise_mrg:2:server:el6"
] | null | null | null | null |
RHSA-2016:0559 | Red Hat Security Advisory: Red Hat Enterprise Linux 5.6 Advanced Mission Critical (AMC) One-year Notice | This is the One-Year notification for the retirement of Red Hat Enterprise
Linux 5.6 Advanced Mission Critical (AMC). This notification applies only
to those customers subscribed to the Advanced Mission Critical (AMC)
channel for Red Hat Enterprise Linux 5.6. | [
"cpe:/o:redhat:rhel_mission_critical:5.6"
] | null | null | null | null |
RHSA-2012:0406 | Red Hat Security Advisory: JBoss Operations Network 3.0.1 update | tomcat: hash table collisions CPU usage DoS (oCERT-2011-003) CLI: world-writable root directory JON: Unapproved agents can connect using the name of an existing approved agent JON: Unapproved agents can hijack an approved agent's endpoint by using a null security token JON: LDAP authentication allows any user access if bind credentials are bad | [
"cpe:/a:redhat:jboss_operations_network:3.0"
] | null | null | null | null |
RHSA-2020:3433 | Red Hat Security Advisory: bind security update | bind: BIND does not sufficiently limit the number of fetches performed when processing referrals bind: A logic error in code which checks TSIG validity can be used to trigger an assertion failure in tsig.c | [
"cpe:/o:redhat:rhel_aus:7.4::server",
"cpe:/o:redhat:rhel_e4s:7.4::server",
"cpe:/o:redhat:rhel_tus:7.4::server"
] | null | 7.5 | null | null |
RHSA-2014:0578 | Red Hat Security Advisory: openstack-nova security, bug fix, and enhancement update | openstack-nova: Nova host data leak to vm instance in rescue mode | [
"cpe:/a:redhat:openstack:4::el6"
] | null | null | null | null |
RHSA-2023:6496 | Red Hat Security Advisory: haproxy security and bug fix update | haproxy: data leak via fcgi requests | [
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 7.5 | null | null |
RHSA-2006:0451 | Red Hat Security Advisory: xorg-x11 security update | security flaw | [
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2020:0578 | Red Hat Security Advisory: python-pillow security update | python-pillow: reading specially crafted image files leads to allocation of large amounts of memory and denial of service python-pillow: improperly restricted operations on memory buffer in libImaging/PcxDecode.c | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 9.8 | null | null |
RHSA-2015:1981 | Red Hat Security Advisory: nss, nss-util, and nspr security update | nss: use-after-poison in sec_asn1d_parse_leaf() (MFSA 2015-133) nss: ASN.1 decoder heap overflow when decoding constructed OCTET STRING that mixes indefinite and definite length encodings (MFSA 2015-133) nspr: heap-buffer overflow in PL_ARENA_ALLOCATE (MFSA 2015-133) | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation",
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | null | null |
RHSA-2005:034 | Red Hat Security Advisory: xpdf security update | security flaw security flaw security flaw | [
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2017:0527 | Red Hat Security Advisory: tomcat6 security update | tomcat: HTTP Request smuggling vulnerability due to permitting invalid character in HTTP requests tomcat: information disclosure due to incorrect Processor sharing | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | 7.5 | null |
RHSA-2021:3255 | Red Hat Security Advisory: microcode_ctl security, bug fix and enhancement update | hw: Special Register Buffer Data Sampling (SRBDS) hw: Vector Register Data Sampling hw: L1D Cache Eviction Sampling hw: Information disclosure issue in Intel SGX via RAPL interface hw: Vector Register Leakage-Active hw: Fast forward store predictor hw: vt-d related privilege escalation hw: improper isolation of shared resources in some Intel Processors hw: observable timing discrepancy in some Intel Processors | [
"cpe:/o:redhat:rhel_aus:7.4::server",
"cpe:/o:redhat:rhel_e4s:7.4::server",
"cpe:/o:redhat:rhel_tus:7.4::server"
] | null | 2.8 | 6.5 | null |
RHSA-2022:2283 | Red Hat Security Advisory: OpenShift Container Platform 4.9.35 bug fix and security update | openshift/router: route hijacking attack via crafted HAProxy configuration file | [
"cpe:/a:redhat:openshift:4.9::el8"
] | null | 6.3 | null | null |
RHSA-2023:7612 | Red Hat Security Advisory: Red Hat build of Quarkus 3.2.9 release and security update | quarkus: GraphQL operations over WebSockets bypass apache-avro: Apache Avro Java SDK: Memory when deserializing untrusted data in Avro Java SDK snappy-java: Missing upper bound check on chunk length in snappy-java can lead to Denial of Service (DoS) impact | [
"cpe:/a:redhat:quarkus:3.2::el8"
] | null | 7.5 | null | null |
RHSA-2023:3243 | Red Hat Security Advisory: git security update | git: by feeding specially crafted input to `git apply --reject`, a path outside the working tree can be overwritten with partially controlled contents git: malicious placement of crafted messages when git was compiled with runtime prefix git: arbitrary configuration injection when renaming or deleting a section from a configuration file | [
"cpe:/a:redhat:rhel_eus:8.4::appstream"
] | null | 7.8 | null | null |
RHSA-2023:4461 | Red Hat Security Advisory: firefox security update | Mozilla: Offscreen Canvas could have bypassed cross-origin restrictions Mozilla: Incorrect value used during WASM compilation Mozilla: Potential permissions request bypass via clickjacking Mozilla: Crash in DOMParser due to out-of-memory conditions Mozilla: Fix potential race conditions when releasing platform objects Mozilla: Stack buffer overflow in StorageManager Mozilla: Cookie jar overflow caused unexpected cookie jar state Mozilla: Memory safety bugs fixed in Firefox 116, Firefox ESR 115.1, Firefox ESR 102.14, Thunderbird 115.1, and Thunderbird 102.14 Mozilla: Memory safety bugs fixed in Firefox ESR 115.1, and Thunderbird 115.1 | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 9.8 | null | null |
RHSA-2015:0020 | Red Hat Security Advisory: python-keystoneclient security update | python-keystoneclient: TLS certificate verification disabled | [
"cpe:/a:redhat:openstack:4::el6"
] | null | null | null | null |
RHSA-2020:0605 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.2 security update | netty: HTTP request smuggling netty: HttpObjectDecoder.java allows Content-Length header to accompanied by second Content-Length header netty: HTTP Request Smuggling due to Transfer-Encoding whitespace mishandling | [
"cpe:/a:redhat:jboss_enterprise_application_platform:7.2::el6",
"cpe:/a:redhat:jboss_enterprise_application_platform:7.2::el7",
"cpe:/a:redhat:jboss_enterprise_application_platform:7.2::el8"
] | null | 7.5 | null | null |
RHSA-2023:6268 | Red Hat Security Advisory: squid security update | squid: Request/Response smuggling in HTTP/1.1 and ICAP squid: Denial of Service in HTTP Digest Authentication squid: denial of Service in FTP | [
"cpe:/a:redhat:rhel_eus:9.0::appstream"
] | null | 8.6 | null | null |
RHSA-2016:2008 | Red Hat Security Advisory: Red Hat Enterprise Linux 7.1 Extended Update Support Six-Month Notice | This is the Six-Month notification for the retirement of Red Hat Enterprise Linux 7.1 Extended Update Support (EUS). This notification applies only to those customers subscribed to the Extended Update Support (EUS) channel for Red Hat Enterprise Linux 7.1. | [
"cpe:/o:redhat:rhel_eus:7.1::server"
] | null | null | null | null |
RHSA-2019:4054 | Red Hat Security Advisory: OpenShift Container Platform 3.11 openshift-external-storage security update | kubernetes-csi: CSI volume snapshot, cloning and resizing features can result in unauthorized volume data access or mutation | [
"cpe:/a:redhat:openshift:3.11::el7"
] | null | null | 4.8 | null |
RHBA-2020:5123 | Red Hat Bug Fix Advisory: OpenShift Container Platform 4.4.31 packages update | golang: data race in certain net/http servers including ReverseProxy can lead to DoS golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs | [
"cpe:/a:redhat:openshift:4.4::el7",
"cpe:/a:redhat:openshift:4.4::el8"
] | null | 7.5 | null | null |
RHSA-2009:1618 | Red Hat Security Advisory: mod_jk security update for Red Hat Network Satellite Server | mod_jk: session information leak | [
"cpe:/a:redhat:network_satellite:5.1::el4",
"cpe:/a:redhat:network_satellite:5.2::el4"
] | null | null | null | null |
RHSA-2008:0364 | Red Hat Security Advisory: mysql security and bug fix update | Mysql log file obfuscation MySQL improper permission revocation mysql improper suid argument evaluation mysql: daemon crash via EXPLAIN on queries on information schema Single MySQL worker can be crashed (NULL deref) with certain SELECT statements mysql: DoS via statement with crafted IF clause mysql DROP privilege not enforced when renaming tables mysql SECURITY INVOKER functions do not drop privileges New release of MySQL fixes security bugs New release of MySQL fixes security bugs | [
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2021:0857 | Red Hat Security Advisory: kernel-rt security and bug fix update | kernel: malicious USB devices can lead to multiple out-of-bounds write kernel: out-of-bounds reads in pinctrl subsystem. kernel: use-after-free in i915_ppgtt_close in drivers/gpu/drm/i915/i915_gem_gtt.c kernel: performance counters race condition use-after-free kernel: Local buffer overflow in ctnetlink_parse_tuple_filter in net/netfilter/nf_conntrack_netlink.c kernel: Geneve/IPsec traffic may be unencrypted between two Geneve endpoints kernel: use-after-free in read in vt_do_kdgkb_ioctl kernel: ICMP rate limiting can be used for DNS poisoning attack kernel: SCSI target (LIO) write to any block on ILO backstore kernel: locking issue in drivers/tty/tty_jobctrl.c can lead to an use-after-free kernel: increase slab leak leads to DoS | [
"cpe:/a:redhat:rhel_extras_rt:7"
] | null | 5.1 | 6.8 | null |
RHSA-2024:1692 | Red Hat Security Advisory: less security update | less: missing quoting of shell metacharacters in LESSCLOSE handling | [
"cpe:/o:redhat:enterprise_linux:9::baseos"
] | null | 7 | null | null |
RHSA-2023:0032 | Red Hat Security Advisory: OpenShift Container Platform 4.10.47 bug fix and security update | crewjam/saml: Authentication bypass when processing SAML responses containing multiple Assertion elements | [
"cpe:/a:redhat:openshift:4.10::el8"
] | null | 9.1 | null | null |
RHSA-2019:2002 | Red Hat Security Advisory: redis:5 security update | redis: Heap buffer overflow in HyperLogLog triggered by malicious client redis: Stack buffer overflow in HyperLogLog triggered by malicious client | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | null | 7.2 | null |
RHSA-2023:0335 | Red Hat Security Advisory: dbus security update | dbus: dbus-daemon crashes when receiving message with incorrectly nested parentheses and curly brackets dbus: dbus-daemon can be crashed by messages with array length inconsistent with element type dbus: `_dbus_marshal_byteswap` doesn't process fds in messages with "foreign" endianness correctly | [
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/o:redhat:enterprise_linux:9::baseos"
] | null | 6.5 | null | null |
RHSA-2022:1622 | Red Hat Security Advisory: OpenShift Container Platform 4.6.57 security and extras update | moby: Default inheritable capabilities for linux container should be empty | [
"cpe:/a:redhat:openshift:4.6::el8"
] | null | 4.8 | null | null |
RHSA-2019:2043 | Red Hat Security Advisory: kernel-rt security and bug fix update | kernel: Information exposure in fd_locked_ioctl function in drivers/block/floppy.c kernel: Memory leak in drivers/net/wireless/mac80211_hwsim.c:hwsim_new_radio_nl() can lead to potential denial of service kernel: Buffer overflow in hidp_process_report kernel: HID: debug: Buffer overflow in hid_debug_events_read() in drivers/hid/hid-debug.c kernel: l2tp: Race condition between pppol2tp_session_create() and l2tp_eth_create() kernel: kvm: guest userspace to guest kernel write kernel: Integer overflow in the alarm_timer_nsleep function kernel: NULL pointer dereference in lookup_slow function kernel: NULL pointer dereference in xfs_da_shrink_inode function kernel: NULL pointer dereference in fs/xfs/libxfs/xfs_inode_buf.c kernel: use-after-free Read in vhost_transport_send_pkt kernel: use-after-free in ucma_leave_multicast in drivers/infiniband/core/ucma.c kernel: Mishandling of indirect calls weakens Spectre mitigation for paravirtual guests kernel: Information leak in cdrom_ioctl_drive_status kernel: out-of-bound read in memcpy_fromiovecend() kernel: TLB flush happens too late on mremap kernel: Heap address information leak while using L2CAP_GET_CONF_OPT kernel: Heap address information leak while using L2CAP_PARSE_CONF_RSP kernel: denial of service vector through vfio DMA mappings Kernel: vhost_net: infinite loop while receiving packets leads to DoS Kernel: page cache side channel attacks Kernel: KVM: leak of uninitialized stack contents to guest kernel: OOB write due to missing bounds check leads to local privilege escalation kernel: overlayfs: NULL pointer dereference in ovl_posix_acl_create function in fs/overlayfs/dir.c kernel: fix race condition between mmget_not_zero()/get_task_mm() and core dumping kernel: a NULL pointer dereference in drivers/scsi/megaraid/megaraid_sas_base.c leading to DoS kernel: fs/ext4/extents.c leads to information disclosure | [
"cpe:/a:redhat:rhel_extras_rt:7"
] | null | 6.7 | 5.5 | null |
RHSA-2016:0723 | Red Hat Security Advisory: java-1.6.0-openjdk security update | OpenJDK: insufficient thread consistency checks in ObjectInputStream (Serialization, 8129952) OpenJDK: insufficient byte type checks (Hotspot, 8132051) OpenJDK: insufficient DSA key parameters checks (Security, 8138593) OpenJDK: incorrect handling of surrogate pairs in XML attribute values (JAXP, 8143167) OpenJDK: unrestricted deserialization of authentication credentials (JMX, 8144430) | [
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::server",
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation",
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | null | null |
RHSA-2023:7398 | Red Hat Security Advisory: kernel security and bug fix update | kernel: use-after-free due to race condition occurring in dvb_register_device() kernel: use-after-free due to race condition occurring in dvb_net.c kernel: use-after-free due to race condition occurring in dvb_ca_en50221.c Kernel: NULL pointer dereference problem in sctp_sched_dequeue_common kernel: net/sched: cls_u32 component reference counter leak if tcf_change_indev() fails kernel: net/sched: cls_fw component can be exploited as result of failure in tcf_change_indev function | [
"cpe:/a:redhat:rhel_eus:8.6::crb",
"cpe:/o:redhat:rhel_eus:8.6::baseos",
"cpe:/o:redhat:rhev_hypervisor:4.4::el8"
] | null | 7 | null | null |
RHSA-2023:0607 | Red Hat Security Advisory: thunderbird security update | Mozilla: Revocation status of S/Mime signature certificates was not checked | [
"cpe:/a:redhat:rhel_eus:9.0::appstream"
] | null | 7.5 | null | null |
RHSA-2024:2875 | Red Hat Security Advisory: OpenShift Container Platform 4.13.42 bug fix and security update | golang: net/http, x/net/http2: unlimited number of CONTINUATION frames causes DoS python-gunicorn: HTTP Request Smuggling due to improper validation of Transfer-Encoding headers jose-go: improper handling of highly compressed data ironic-image: Unauthenticated local access to Ironic API | [
"cpe:/a:redhat:openshift:4.13::el8",
"cpe:/a:redhat:openshift:4.13::el9"
] | null | 4.7 | 7.5 | null |
RHSA-2016:1079 | Red Hat Security Advisory: flash-plugin security update | flash-plugin: multiple code execution issues fixed in APSB16-15 flash-plugin: multiple code execution issues fixed in APSB16-15 flash-plugin: multiple code execution issues fixed in APSB16-15 flash-plugin: multiple code execution issues fixed in APSB16-15 flash-plugin: multiple code execution issues fixed in APSB16-15 flash-plugin: multiple code execution issues fixed in APSB16-15 flash-plugin: multiple code execution issues fixed in APSB16-15 flash-plugin: multiple code execution issues fixed in APSB16-15 flash-plugin: multiple code execution issues fixed in APSB16-15 flash-plugin: multiple code execution issues fixed in APSB16-15 flash-plugin: multiple code execution issues fixed in APSB16-15 flash-plugin: multiple code execution issues fixed in APSB16-15 flash-plugin: multiple code execution issues fixed in APSB16-15 flash-plugin: multiple code execution issues fixed in APSB16-15 flash-plugin: multiple code execution issues fixed in APSB16-15 flash-plugin: multiple code execution issues fixed in APSB16-15 flash-plugin: multiple code execution issues fixed in APSB16-15 flash-plugin: multiple code execution issues fixed in APSB16-15 flash-plugin: multiple code execution issues fixed in APSB16-15 flash-plugin: multiple code execution issues fixed in APSB16-15 flash-plugin: multiple code execution issues fixed in APSB16-15 flash-plugin: multiple code execution issues fixed in APSB16-15 flash-plugin: multiple code execution issues fixed in APSB16-15 flash-plugin: multiple code execution issues fixed in APSB16-15 flash-plugin: multiple code execution issues fixed in APSB16-15 flash-plugin: multiple code execution issues fixed in APSB16-15 flash-plugin: multiple code execution issues fixed in APSB16-15 flash-plugin: multiple code execution issues fixed in APSB16-15 flash-plugin: multiple code execution issues fixed in APSB16-15 flash-plugin: multiple code execution issues fixed in APSB16-15 flash-plugin: multiple code execution issues fixed in APSB16-15 | [
"cpe:/a:redhat:rhel_extras:5::client",
"cpe:/a:redhat:rhel_extras:5::server",
"cpe:/a:redhat:rhel_extras:6"
] | null | null | null | null |
RHSA-2006:0191 | Red Hat Security Advisory: kernel security update | security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw | [
"cpe:/o:redhat:enterprise_linux:2.1::as",
"cpe:/o:redhat:enterprise_linux:2.1::es",
"cpe:/o:redhat:enterprise_linux:2.1::ws"
] | null | null | null | null |
RHSA-2017:1259 | Red Hat Security Advisory: spacewalk-backend security update | spacewalk-backend: spacewalk-channel can be used by non-admin or disabled users for performing administrative tasks | [
"cpe:/a:redhat:network_satellite:5.6::el5",
"cpe:/a:redhat:network_satellite:5.6::el6",
"cpe:/a:redhat:network_satellite:5.7::el6"
] | null | null | 6.5 | null |
RHSA-2012:0682 | Red Hat Security Advisory: tomcat6 security and bug fix update | tomcat: Multiple weaknesses in HTTP DIGEST authentication tomcat: password disclosure vulnerability tomcat: security manager restrictions bypass tomcat: authentication bypass and information disclosure tomcat: information disclosure due to improper response and request object recycling tomcat: hash table collisions CPU usage DoS (oCERT-2011-003) tomcat: Multiple weaknesses in HTTP DIGEST authentication tomcat: Multiple weaknesses in HTTP DIGEST authentication tomcat: Multiple weaknesses in HTTP DIGEST authentication tomcat: large number of parameters DoS | [
"cpe:/a:redhat:jboss_enterprise_web_server:1::el5",
"cpe:/a:redhat:jboss_enterprise_web_server:1::el6"
] | null | null | null | null |
RHSA-2013:0577 | Red Hat Security Advisory: Red Hat Enterprise Virtualization 2 - End Of Life | This is the End of Life notification for Red Hat Enterprise
Virtualization 2. | [] | null | null | null | null |
RHSA-2022:5331 | Red Hat Security Advisory: libinput security update | libinput: format string vulnerability may lead to privilege escalation | [
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb"
] | null | 7.8 | null | null |
RHSA-2021:1307 | Red Hat Security Advisory: java-11-openjdk security update | OpenJDK: Incomplete enforcement of JAR signing disabled algorithms (Libraries, 8249906) | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 5.3 | null | null |
RHSA-2017:2450 | Red Hat Security Advisory: openstack-neutron security update | openstack-neutron: iptables not active after update | [
"cpe:/a:redhat:openstack:7::el7"
] | null | null | 5.3 | null |
RHSA-2018:2729 | Red Hat Security Advisory: Red Hat Enterprise Linux OpenStack Platform security update | openstack-rabbitmq-container: Insecure download of rabbitmq_clusterer during docker build | [
"cpe:/a:redhat:openstack:12::el7"
] | null | null | 4.7 | null |
RHSA-2024:2085 | Red Hat Security Advisory: libreswan security and bug fix update | libreswan: Missing PreSharedKey for connection can cause crash | [
"cpe:/a:redhat:rhel_eus:9.2::appstream"
] | null | 5 | null | null |
RHSA-2024:1404 | Red Hat Security Advisory: kernel security and bug fix update | kernel: out-of-bounds write in hw_atl_utils_fw_rpc_wait() in drivers/net/ethernet/aquantia/atlantic/hw_atl/hw_atl_utils.c kernel: nfp: use-after-free in area_cache_get() kernel: Rate limit overflow messages in r8152 in intr_callback kernel: tun: avoid double free in tun_free_netdev kernel: double free in usb_8dev_start_xmit in drivers/net/can/usb/usb_8dev.c kernel: vmwgfx: integer overflow in vmwgfx_execbuf.c kernel: vmwgfx: NULL pointer dereference in vmw_cmd_dx_define_query kernel: vmwgfx: use-after-free in vmw_cmd_res_check kernel: vmwgfx: use-after-free in vmw_execbuf_tie_context kernel: null-ptr-deref vulnerabilities in sl_tx_timeout in drivers/net/slip kernel: KVM: x86/mmu: race condition in direct_page_fault() kernel: memory leak in ttusb_dec_exit_dvb() in media/usb/ttusb-dec/ttusb_dec.c kernel: denial of service in tipc_conn_close kernel: NULL pointer dereference in can_rcv_filter kernel: Slab-out-of-bound read in compare_netdev_and_ip kernel: use-after-free in sch_qfq network scheduler kernel: vmwgfx: reference count issue leads to use-after-free in surface handling kernel: Out-Of-Bounds Read vulnerability in smbCalcSize kernel: OOB Access in smb2_dump_detail kernel: inactive elements in nft_pipapo_walk kernel: Out of boundary write in perf_read_group() as result of overflow a perf_event's read_size kernel: use-after-free in IPv4 IGMP kernel: refcount leak in ctnetlink_create_conntrack() kernel: lib/seq_buf.c has a seq_buf_putmem_hex buffer overflow kernel: KVM: nVMX: missing consistency checks for CR0 and CR4 kernel: blocking operation in dvb_frontend_get_event and wait_event_interruptible kernel: vmwgfx: race condition leading to information disclosure vulnerability kernel: vmwgfx: double free within the handling of vmw_buffer_object objects kernel: use-after-free in l2cap_sock_release in net/bluetooth/l2cap_sock.c kernel: drivers/usb/storage/ene_ub6250.c kernel: use-after-free in amdgpu_cs_wait_all_fences in drivers/gpu/drm/amd/amdgpu/amdgpu_cs.c kernel: use-after-free during a race condition between a nonblocking atomic commit and a driver unload in drivers/gpu/drm/drm_atomic.c kernel: CIFS Filesystem Decryption Improper Input Validation Remote Code Execution Vulnerability in function receive_encrypted_standard of client kernel: ktls overwrites readonly memory pages when using function splice with a ktls socket as destination kernel: nf_tables: use-after-free vulnerability in the nft_verdict_init() function | [
"cpe:/a:redhat:rhel_eus:8.8::crb",
"cpe:/o:redhat:rhel_eus:8.8::baseos"
] | null | 7.8 | null | null |
RHSA-2019:2437 | Red Hat Security Advisory: Red Hat Virtualization security update | sssd: improper implementation of GPOs due to too restrictive permissions rsyslog: imptcp: integer overflow when Octet-Counted TCP Framing is enabled edk2: stack overflow in XHCI causing denial of service openssl: 0-byte record padding oracle cockpit-ovirt: admin and appliance passwords saved in plain text variable file during HE deployment python: regression of CVE-2019-9636 due to functional fix to allow port numbers in netloc | [
"cpe:/o:redhat:enterprise_linux:7::hypervisor"
] | null | 5.9 | 9.8 | null |
RHSA-2018:1216 | Red Hat Security Advisory: kernel security and bug fix update | hw: cpu: speculative execution branch target injection kernel: Use-after-free vulnerability in DCCP socket | [
"cpe:/o:redhat:rhel_aus:7.2::server",
"cpe:/o:redhat:rhel_e4s:7.2::server",
"cpe:/o:redhat:rhel_tus:7.2::server"
] | null | null | 7.8 | null |
RHSA-2024:2882 | Red Hat Security Advisory: firefox security update | Mozilla: Arbitrary JavaScript execution in PDF.js Mozilla: IndexedDB files retained in private browsing mode Mozilla: Potential permissions request bypass via clickjacking Mozilla: Cross-origin responses could be distinguished between script and non-script content-types Mozilla: Use-after-free could occur when printing to PDF Mozilla: Memory safety bugs fixed in Firefox 126, Firefox ESR 115.11, and Thunderbird 115.11 | [
"cpe:/a:redhat:rhel_aus:8.2::appstream"
] | null | 6.1 | null | null |
RHSA-2012:0529 | Red Hat Security Advisory: Red Hat Enterprise MRG Messaging 2.1 security and enhancement update | qpid-cpp: cluster authentication ignores cluster-* settings | [
"cpe:/a:redhat:enterprise_mrg:2::el5"
] | null | null | null | null |
RHSA-2018:2267 | Red Hat Security Advisory: procps security update | procps: Integer overflows leading to heap overflow in file2strvec procps: incorrect integer size in proc/alloc.* leading to truncation / integer overflow issues | [
"cpe:/o:redhat:rhel_eus:6.7::computenode",
"cpe:/o:redhat:rhel_eus:6.7::server"
] | null | null | 4.8 | null |
RHSA-2012:1331 | Red Hat Security Advisory: JBoss Operations Network 3.1.1 update | tomcat: large number of parameters DoS | [
"cpe:/a:redhat:jboss_operations_network:3.1"
] | null | null | null | null |
RHSA-2022:6187 | Red Hat Security Advisory: Node Health Check Operator 0.3.1 security update | golang: net/http: improper sanitization of Transfer-Encoding header golang: crypto/elliptic: panic caused by oversized scalar golang: compress/gzip: stack exhaustion in Reader.Read | [
"cpe:/a:redhat:workload_availability_node_healthcheck:0.3::el8"
] | null | 7.5 | null | null |
RHSA-2022:8502 | Red Hat Security Advisory: RHV Manager (ovirt-engine) [ovirt-4.5.3] bug fix and security update | follow-redirects: Exposure of Private Personal Information to an Unauthorized Actor ovirt-engine: RHVM admin password is logged unfiltered when using otopi-style | [
"cpe:/a:redhat:rhev_manager:4.4:el8"
] | null | 5.1 | null | null |
RHSA-2021:1086 | Red Hat Security Advisory: 389-ds:1.4 security and bug fix update | 389-ds-base: information disclosure during the binding of a DN | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 5.3 | null | null |
RHSA-2021:2965 | Red Hat Security Advisory: Red Hat Single Sign-On 7.4.8 security update | wildfly: XSS via admin console when creating roles in domain mode netty: Request smuggling via content-length header | [
"cpe:/a:redhat:red_hat_single_sign_on:7"
] | null | 5.9 | null | null |
RHSA-2013:1173 | Red Hat Security Advisory: kernel security and bug fix update | Kernel: Bluetooth: HCI & L2CAP information leaks Kernel: perf/x86: offcore_rsp valid mask for SNB/IVB kernel: sctp: duplicate cookie handling NULL pointer dereference kernel: net: IP_REPOPTS invalid free Kernel: ipv6: using ipv4 vs ipv6 structure during routing lookup in sendmsg Kernel: net: af_key: initialize satype in key_notify_policy_flush | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2002:289 | Red Hat Security Advisory: mysql security update | security flaw security flaw security flaw security flaw | [
"cpe:/o:redhat:enterprise_linux:2.1::as",
"cpe:/o:redhat:enterprise_linux:2.1::aw"
] | null | null | null | null |
RHSA-2020:1840 | Red Hat Security Advisory: openssl security and bug fix update | openssl: side-channel weak encryption vulnerability openssl: information disclosure in fork() openssl: information disclosure in PKCS7_dataDecode and CMS_decrypt_set1_pkey | [
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | null | 3.7 | null |
RHSA-2024:6033 | Red Hat Security Advisory: openldap security update | openldap: null pointer dereference in ber_memalloc_x function | [
"cpe:/a:redhat:rhel_eus:8.8::crb",
"cpe:/o:redhat:rhel_eus:8.8::baseos"
] | null | 7.1 | null | null |
RHSA-2019:1488 | Red Hat Security Advisory: kernel security and bug fix update | kernel: Double free in lib/idr.c Kernel: tcp: integer overflow while processing SACK blocks allows remote denial of service Kernel: tcp: excessive resource consumption while processing SACK blocks allows remote denial of service kernel: tcp: excessive resource consumption for TCP connections with low MSS allows remote denial of service | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | 5.3 | null |
RHSA-2019:4099 | Red Hat Security Advisory: OpenShift Container Platform 4.2 csi-provisioner-container security update | kubernetes-csi: CSI volume snapshot, cloning and resizing features can result in unauthorized volume data access or mutation | [
"cpe:/a:redhat:openshift:4.2::el7"
] | null | null | 4.8 | null |
RHSA-2022:0843 | Red Hat Security Advisory: thunderbird security update | thunderbird: Crafted email could trigger an out-of-bounds write expat: Malformed 2- and 3-byte UTF-8 sequences can lead to arbitrary code execution expat: Namespace-separator characters in "xmlns[:prefix]" attribute values can lead to arbitrary code execution expat: Integer overflow in storeRawNames() Mozilla: Use-after-free in text reflows Mozilla: Browser window spoof using fullscreen mode Mozilla: iframe allow-scripts sandbox bypass Mozilla: Temporary files downloaded to /tmp and accessible by other local users Mozilla: Time-of-check time-of-use bug when verifying add-on signatures Mozilla: Use-after-free in XSLT parameter processing Mozilla: Use-after-free in WebGPU IPC Framework | [
"cpe:/a:redhat:rhel_eus:8.2::appstream"
] | null | 8.8 | 7.5 | null |
RHSA-2020:4162 | Red Hat Security Advisory: qemu-kvm-ma security update | QEMU: usb: out-of-bounds r/w access issue while processing usb packets | [
"cpe:/o:redhat:rhel_eus:7.6::server"
] | null | 5 | null | null |
RHSA-2009:1024 | Red Hat Security Advisory: Red Hat Enterprise Linux 4.8 kernel security and bug fix update | kernel: nfsv4 client can be crashed by stating a long filename kernel: exit_notify: kill the wrong capable(CAP_KILL) check | [
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2015:0919 | Red Hat Security Advisory: kernel security update | kernel: infiniband: uverbs: unprotected physical memory access | [
"cpe:/o:redhat:rhel_mission_critical:5.6"
] | null | null | null | null |
RHSA-2023:4950 | Red Hat Security Advisory: firefox security update | Mozilla: Full screen notification obscured by file open dialog Mozilla: Full screen notification obscured by external program Mozilla: Memory corruption in IPC CanvasTranslator Mozilla: Memory corruption in IPC ColorPickerShownCallback Mozilla: Memory corruption in IPC FilePickerShownCallback Mozilla: Memory corruption in JIT UpdateRegExpStatics Mozilla: Error reporting methods in SpiderMonkey could have triggered an Out of Memory Exception Mozilla: Push notifications saved to disk unencrypted Mozilla: XLL file extensions were downloadable without warnings Mozilla: Browsing Context potentially not cleared when closing Private Window Mozilla: Memory safety bugs fixed in Firefox 117, Firefox ESR 102.15, Firefox ESR 115.2, Thunderbird 102.15, and Thunderbird 115.2 Mozilla: Memory safety bugs fixed in Firefox 117, Firefox ESR 115.2, and Thunderbird 115.2 | [
"cpe:/a:redhat:rhel_eus:9.0::appstream"
] | null | 8.8 | null | null |
RHSA-2024:8831 | Red Hat Security Advisory: bcc security update | bcc: unprivileged users can force loading of compromised linux headers | [
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb"
] | null | 2.8 | null | null |
RHSA-2016:1635 | Red Hat Security Advisory: Red Hat JBoss Web Server 3.0.3 Service Pack 1 security update | HTTPD: sets environmental variable based on user supplied Proxy request header Tomcat: CGI sets environmental variable based on user supplied Proxy request header | [
"cpe:/a:redhat:jboss_enterprise_web_server:3.0::el7"
] | null | null | 3.5 | null |
RHSA-2020:0609 | Red Hat Security Advisory: kernel-rt security and bug fix update | kernel: use-after-free in fs/xfs/xfs_super.c kernel: insufficient input validation in kernel mode driver in Intel i915 graphics leads to privilege escalation kernel: heap-based buffer overflow in mwifiex_process_country_ie() function in drivers/net/wireless/marvell/mwifiex/sta_ioctl.c kernel: buffer overflow in cfg80211_mgd_wext_giwessid in net/wireless/wext-sme.c | [
"cpe:/a:redhat:enterprise_mrg:2:server:el6"
] | null | 8 | 8 | null |
RHSA-2009:1549 | Red Hat Security Advisory: wget security update | wget: incorrect verification of SSL certificate with NUL in name | [
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws",
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws",
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2011:0507 | Red Hat Security Advisory: apr security update | apr: unconstrained recursion in apr_fnmatch | [
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws",
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server",
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2010:0768 | Red Hat Security Advisory: java-1.6.0-openjdk security and bug fix update | TLS: MITM attacks via session renegotiation OpenJDK HttpURLConnection allows arbitrary request headers (6961084,6980004) OpenJDK DNS server IP address information leak (6957564) OpenJDK HttpURLConnection request splitting (6952017) OpenJDK local network address disclosure (6952603) OpenJDK Swing unsafe reflection usage (6622002) OpenJDK corba reflection vulnerabilities (6891766,6925672) OpenJDK Swing mutable static (6938813) OpenJDK corba reflection vulnerabilities (6891766,6925672) OpenJDK IndexColorModel double-free (6925710) OpenJDK kerberos vulnerability (6958060) OpenJDK JPEG writeImage remote code execution (6963023) OpenJDK ICU Opentype layout engine crash (6963285) OpenJDK Deserialization Race condition (6559775) OpenJDK Serialization inconsistencies (6966692) OpenJDK HttpURLConnection allows arbitrary request headers (6961084,6980004) OpenJDK HttpURLConnection incomplete TRACE permission check (6981426) | [
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2023:4956 | Red Hat Security Advisory: thunderbird security update | Mozilla: Full screen notification obscured by file open dialog Mozilla: Full screen notification obscured by external program Mozilla: Memory corruption in IPC CanvasTranslator Mozilla: Memory corruption in IPC ColorPickerShownCallback Mozilla: Memory corruption in IPC FilePickerShownCallback Mozilla: Memory corruption in JIT UpdateRegExpStatics Mozilla: Error reporting methods in SpiderMonkey could have triggered an Out of Memory Exception Mozilla: Push notifications saved to disk unencrypted Mozilla: XLL file extensions were downloadable without warnings Mozilla: Browsing Context potentially not cleared when closing Private Window Mozilla: Memory safety bugs fixed in Firefox 117, Firefox ESR 102.15, Firefox ESR 115.2, Thunderbird 102.15, and Thunderbird 115.2 Mozilla: Memory safety bugs fixed in Firefox 117, Firefox ESR 115.2, and Thunderbird 115.2 | [
"cpe:/a:redhat:rhel_aus:8.4::appstream",
"cpe:/a:redhat:rhel_e4s:8.4::appstream",
"cpe:/a:redhat:rhel_tus:8.4::appstream"
] | null | 8.8 | null | null |
RHSA-2023:4541 | Red Hat Security Advisory: kernel-rt security and bug fix update | kernel: use-after-free in l2cap_connect and l2cap_le_connect_req in net/bluetooth/l2cap_core.c kernel: tcindex: use-after-free vulnerability in traffic control index filter allows privilege escalation kernel: Use-after-free vulnerability in the Linux Kernel traffic control index filter kernel: OOB access in the Linux kernel's XFS subsystem kernel: i2c: out-of-bounds write in xgene_slimpro_i2c_xfer() kernel: use-after-free vulnerability in the perf_group_detach function of the Linux Kernel Performance Events | [
"cpe:/a:redhat:enterprise_linux:8::nfv",
"cpe:/a:redhat:enterprise_linux:8::realtime"
] | null | 7.8 | null | null |
RHSA-2024:8697 | Red Hat Security Advisory: OpenShift Container Platform 4.14.40 bug fix and security update | golang-github-gin-gonic-gin: Gin Web Framework does not properly sanitize filename parameter of Context.FileAttachment function net/http: Denial of service due to improper 100-continue handling in net/http go/parser: golang: Calling any of the Parse functions containing deeply nested literals can cause a panic/stack exhaustion encoding/gob: golang: Calling Decoder.Decode on a message which contains deeply nested structures can cause a panic due to stack exhaustion go/build/constraint: golang: Calling Parse on a "// +build" build tag line with deeply nested expressions can cause a panic due to stack exhaustion | [
"cpe:/a:redhat:openshift:4.14::el8",
"cpe:/a:redhat:openshift:4.14::el9"
] | null | 5.9 | null | null |
RHSA-2020:0556 | Red Hat Security Advisory: Open Liberty 20.0.0.2 Runtime security update | Open Liberty 20.0.0.2 Runtime is now available from the Customer Portal.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. | [
"cpe:/a:openliberty:20"
] | null | null | null | null |
RHSA-2018:2552 | Red Hat Security Advisory: Red Hat OpenShift Application Runtimes Node.js 8.11.4 security update | openssl: Malicious server can send large prime to client during DH(E) TLS handshake causing the client to hang nodejs: Out of bounds (OOB) write via UCS-2 encoding | [
"cpe:/a:redhat:openshift_application_runtimes:1.0::el7"
] | null | null | 8.1 | null |
RHSA-2024:4101 | Red Hat Security Advisory: samba security update | samba: infinite loop in mdssvc RPC service for spotlight | [
"cpe:/a:redhat:rhel_eus:9.2::appstream",
"cpe:/a:redhat:rhel_eus:9.2::crb",
"cpe:/a:redhat:rhel_eus:9.2::resilientstorage",
"cpe:/o:redhat:rhel_eus:9.2::baseos"
] | null | 7.5 | null | null |
RHSA-2020:1350 | Red Hat Security Advisory: chromium-browser security update | chromium-browser: Use after free in WebAudio chromium-browser: Use after free in WebAudio chromium-browser: Heap buffer overflow in media chromium-browser: Inappropriate implementation in V8 | [
"cpe:/a:redhat:rhel_extras:6"
] | null | null | 8.8 | null |
RHSA-2021:4788 | Red Hat Security Advisory: krb5 security update | krb5: NULL pointer dereference in process_tgs_req() in kdc/do_tgs_req.c via a FAST inner body that lacks server field | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 6.5 | null | null |
RHSA-2018:0517 | Red Hat Security Advisory: libreoffice security update | libreoffice: Remote arbitrary file disclosure vulnerability via WEBSERVICE formula | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | 4.7 | null |
RHSA-2020:1665 | Red Hat Security Advisory: qt5 security, bug fix, and enhancement update | qt5-qtsvg: Invalid parsing of malformed url reference resulting in a denial of service qt5-qtimageformats: QTgaFile CPU exhaustion qt: Malformed PPM image causing division by zero and crash in qppmhandler.cpp qt5-qtbase: Out-of-bounds access in generateDirectionalRuns() function in qtextengine.cpp | [
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb"
] | null | null | 4.3 | null |
RHSA-2018:2282 | Red Hat Security Advisory: chromium-browser security update | chromium-browser: Cross origin information leak in Blink chromium-browser: Cross origin information disclosure in Service Workers chromium-browser: Bad cast in DevTools chromium-browser: Local file write in DevTools chromium-browser: Stack buffer overflow in Skia chromium-browser: Heap buffer overflow in WebGL chromium-browser: Use after free in WebRTC chromium-browser: Heap buffer overflow in WebRTC chromium-browser: Type confusion in WebRTC chromium-browser: Use after free in Blink chromium-browser: Same origin policy bypass in ServiceWorker chromium-browser: Same origin policy bypass in WebAudio chromium-browser: Heap buffer overflow in WebGL chromium-browser: URL spoof in Omnibox chromium-browser: Same origin policy bypass in ServiceWorker chromium-browser: URL spoof in Omnibox chromium-browser: URL spoof in Omnibox chromium-browser: URL spoof in Omnibox chromium-browser: CORS bypass in Blink chromium-browser: Permissions bypass in extension installation chromium-browser: Type confusion in PDFium chromium-browser: Use after free in WebBluetooth chromium-browser: URL spoof in Omnibox chromium-browser: URL spoof in Omnibox chromium-browser: Integer overflow in SwiftShader chromium-browser: URL spoof in Omnibox chromium-browser: Local user privilege escalation in Extensions chromium-browser: Cross origin information leak in Blink chromium-browser: UI spoof in Extensions chromium-browser: Local file information leak in Extensions chromium-browser: Request privilege escalation in Extensions | [
"cpe:/a:redhat:rhel_extras:6"
] | null | null | 4.3 | null |
RHSA-2022:7192 | Red Hat Security Advisory: device-mapper-multipath security update | device-mapper-multipath: Authorization bypass, multipathd daemon listens for client connections on an abstract Unix socket | [
"cpe:/a:redhat:enterprise_linux:8::crb",
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 7.8 | null | null |
RHSA-2021:4590 | Red Hat Security Advisory: rust-toolset:rhel8 security update | environment: Unicode's bidirectional (BiDi) override characters can cause trojan source attacks | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 8.5 | null | null |
RHBA-2007:0331 | Red Hat Bug Fix Advisory: conga bug fix update | security flaw security flaw | [
"cpe:/a:redhat:rhel_cluster:5"
] | null | null | null | null |
RHSA-2016:1238 | Red Hat Security Advisory: flash-plugin security update | flash-plugin: multiple code execution issues fixed in APSB16-18 flash-plugin: multiple code execution issues fixed in APSB16-18 flash-plugin: multiple code execution issues fixed in APSB16-18 flash-plugin: multiple code execution issues fixed in APSB16-18 flash-plugin: multiple code execution issues fixed in APSB16-18 flash-plugin: multiple code execution issues fixed in APSB16-18 flash-plugin: multiple code execution issues fixed in APSB16-18 flash-plugin: multiple code execution issues fixed in APSB16-18 flash-plugin: multiple code execution issues fixed in APSB16-18 flash-plugin: multiple code execution issues fixed in APSB16-18 flash-plugin: multiple code execution issues fixed in APSB16-18 flash-plugin: multiple code execution issues fixed in APSB16-18 flash-plugin: multiple code execution issues fixed in APSB16-18 flash-plugin: multiple code execution issues fixed in APSB16-18 flash-plugin: multiple code execution issues fixed in APSB16-18 flash-plugin: multiple code execution issues fixed in APSB16-18 flash-plugin: multiple code execution issues fixed in APSB16-18 flash-plugin: multiple code execution issues fixed in APSB16-18 flash-plugin: multiple code execution issues fixed in APSB16-18 flash-plugin: multiple code execution issues fixed in APSB16-18 flash-plugin: multiple code execution issues fixed in APSB16-18 flash-plugin: multiple code execution issues fixed in APSB16-18 flash-plugin: multiple code execution issues fixed in APSB16-18 flash-plugin: multiple code execution issues fixed in APSB16-18 flash-plugin: multiple code execution issues fixed in APSB16-18 flash-plugin: multiple code execution issues fixed in APSB16-18 flash-plugin: multiple code execution issues fixed in APSB16-18 flash-plugin: multiple code execution issues fixed in APSB16-18 flash-plugin: multiple code execution issues fixed in APSB16-18 flash-plugin: multiple code execution issues fixed in APSB16-18 flash-plugin: multiple code execution issues fixed in APSB16-18 flash-plugin: multiple code execution issues fixed in APSB16-18 flash-plugin: multiple code execution issues fixed in APSB16-18 flash-plugin: multiple code execution issues fixed in APSB16-18 flash-plugin: multiple code execution issues fixed in APSB16-18 flash-plugin: multiple code execution issues fixed in APSB16-18 | [
"cpe:/a:redhat:rhel_extras:5::client",
"cpe:/a:redhat:rhel_extras:5::server",
"cpe:/a:redhat:rhel_extras:6"
] | null | null | null | null |
RHSA-2021:5086 | Red Hat Security Advisory: Red Hat OpenShift Data Foundation 4.9.0 enhancement, security, and bug fix update | kubernetes: Incomplete fix for CVE-2019-11250 allows for token leak in logs when logLevel >= 9 nodejs-tar: Insufficient symlink protection allowing arbitrary file creation and overwrite nodejs-tar: Insufficient absolute path sanitization allowing arbitrary file creation and overwrite golang: net: lookup functions may return invalid host names golang: net/http/httputil: ReverseProxy forwards connection headers if first one is empty golang: math/big.Rat: may cause a panic or an unrecoverable fatal error if passed inputs with very large exponents golang: crypto/tls: certificate of wrong type is causing TLS client to panic nodejs-tar: Insufficient symlink protection due to directory cache poisoning using symbolic links allowing arbitrary file creation and overwrite nodejs-tar: Insufficient symlink protection due to directory cache poisoning using symbolic links allowing arbitrary file creation and overwrite | [
"cpe:/a:redhat:openshift_data_foundation:4.9::el8"
] | null | 8.1 | null | null |
RHSA-2023:3373 | Red Hat Security Advisory: Migration Toolkit for Runtimes security update | jackson-databind: Possible DoS if using JDK serialization to serialize JsonNode dev-java/snakeyaml: DoS via stack overflow codec-haproxy: HAProxyMessageDecoder Stack Exhaustion DoS | [
"cpe:/a:redhat:migration_toolkit_runtimes:1.0::el8"
] | null | 7.5 | null | null |
RHSA-2021:1197 | Red Hat Security Advisory: libldb security update | samba: Out of bounds read in AD DC LDAP server | [
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 7.1 | null | null |
RHSA-2024:1998 | Red Hat Security Advisory: libreswan security update | libreswan: Missing PreSharedKey for connection can cause crash | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 5 | null | null |
RHSA-2020:5607 | Red Hat Security Advisory: fapolicyd bug fix update | An update for fapolicyd is now available for Red Hat Enterprise Linux 8. | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | null | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.