id
stringlengths 13
15
| title
stringlengths 29
176
| description
stringlengths 8
32.1k
| cpes
sequencelengths 0
20
| cvss_v4_0
null | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
null |
---|---|---|---|---|---|---|---|
RHSA-2021:3889 | Red Hat Security Advisory: java-1.8.0-openjdk security and bug fix update | OpenJDK: Weak ciphers preferred over stronger ones for TLS (JSSE, 8264210) OpenJDK: Excessive memory allocation in RTFParser (Swing, 8265167) OpenJDK: Excessive memory allocation in RTFReader (Swing, 8265580) OpenJDK: Excessive memory allocation in HashMap and HashSet (Utility, 8266097) OpenJDK: Certificates with end dates too far in the future can corrupt keystore (Keytool, 8266137) OpenJDK: Loop in HttpsServer triggered during TLS session close (JSSE, 8254967) OpenJDK: Incorrect principal selection when using Kerberos Constrained Delegation (Libraries, 8266689) OpenJDK: Unexpected exception raised during TLS handshake (JSSE, 8267729) OpenJDK: Excessive memory allocation in BMPImageReader (ImageIO, 8267735) OpenJDK: Incomplete validation of inner class references in ClassFileParser (Hotspot, 8268071) OpenJDK: Non-constant comparison during TLS handshakes (JSSE, 8269618) | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 3.7 | null | null |
RHSA-2012:0011 | Red Hat Security Advisory: acroread security update | acroread: U3D memory corruption vulnerability (APSB11-30) acroread: unspecified vulnerability in PRC component (APSB11-30) | [
"cpe:/a:redhat:rhel_extras:4",
"cpe:/a:redhat:rhel_extras:5::client",
"cpe:/a:redhat:rhel_extras:5::server",
"cpe:/a:redhat:rhel_extras:6"
] | null | null | null | null |
RHSA-2011:0395 | Red Hat Security Advisory: gdm security update | gdm: privilege escalation vulnerability | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2020:0431 | Red Hat Security Advisory: ksh security update | ksh: certain environment variables interpreted as arithmetic expressions on startup, leading to code injection | [
"cpe:/a:redhat:rhel_e4s:8.0::appstream"
] | null | 7.4 | null | null |
RHSA-2023:7616 | Red Hat Security Advisory: postgresql security update | postgresql: Memory disclosure in aggregate function calls postgresql: Buffer overrun from integer overflow in array modification postgresql: Role pg_signal_backend can signal certain superuser processes. postgresql: extension script @substitutions@ within quoting allow SQL injection | [
"cpe:/a:redhat:rhel_eus:9.2::appstream",
"cpe:/a:redhat:rhel_eus:9.2::crb"
] | null | 7.5 | null | null |
RHSA-2024:6221 | Red Hat Security Advisory: The Red Hat OpenShift Builds 1.1.0 General Availability | golang: net/http, x/net/http2: unlimited number of CONTINUATION frames causes DoS golang: net/http: golang: mime/multipart: golang: net/textproto: memory exhaustion in Request.ParseMultipartForm go-git: Maliciously crafted Git server replies can lead to path traversal and RCE on go-git clients golang: crypto/x509: Verify panics on certificates with an unknown public key algorithm golang: html/template: errors returned from MarshalJSON methods may break template escaping golang-protobuf: encoding/protojson, internal/encoding/json: infinite loop in protojson.Unmarshal when unmarshaling certain forms of invalid JSON golang: net: malformed DNS message can cause infinite loop | [
"cpe:/a:redhat:openshift_builds:1.1::el9"
] | null | 7.5 | null | null |
RHSA-2017:0499 | Red Hat Security Advisory: chromium-browser security update | chromium-browser: integer overflow in libxslt chromium-browser: memory corruption in v8 chromium-browser: use after free in angle chromium-browser: out of bounds write in pdfium chromium-browser: bypass of content security policy in blink chromium-browser: use after free in pdfium chromium-browser: incorrect security ui in omnibox chromium-browser: use after free in pdfium chromium-browser: multiple out of bounds writes in chunkdemuxer chromium-browser: use after free in guestview chromium-browser: use after free in pdfium chromium-browser: information disclosure in v8 chromium-browser: address spoofing in omnibox chromium-browser: incorrect handling of cookies in cast chromium-browser: use after free in guestview chromium-browser: heap overflow in skia chromium-browser: information disclosure in xss auditor chromium-browser: information disclosure in blink | [
"cpe:/a:redhat:rhel_extras:6"
] | null | null | 6.5 | null |
RHSA-2022:0828 | Red Hat Security Advisory: .NET 5.0 on RHEL 7 security and bugfix update | brotli: buffer overflow when input chunk is larger than 2GiB dotnet: ASP.NET Denial of Service via FormPipeReader dotnet: double parser stack buffer overrun | [
"cpe:/a:redhat:rhel_dotnet:5.0::el7"
] | null | 6.3 | null | null |
RHSA-2020:3972 | Red Hat Security Advisory: subversion security update | subversion: remotely triggerable DoS vulnerability in svnserve 'get-deleted-rev' | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 6.5 | null |
RHSA-2007:0106 | Red Hat Security Advisory: gnupg security update | gnupg/gpgme signed message spoofing | [
"cpe:/o:redhat:enterprise_linux:2.1::as",
"cpe:/o:redhat:enterprise_linux:2.1::aw",
"cpe:/o:redhat:enterprise_linux:2.1::es",
"cpe:/o:redhat:enterprise_linux:2.1::ws",
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws",
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2019:2945 | Red Hat Security Advisory: kpatch-patch security update | kernel: brcmfmac heap buffer overflow in brcmf_wowl_nd_results | [
"cpe:/o:redhat:enterprise_linux:7::server"
] | null | null | 6.5 | null |
RHSA-2022:0947 | Red Hat Security Advisory: OpenShift Virtualization 4.10.0 Images security and bug fix update | golang: net: incorrect parsing of extraneous zero characters at the beginning of an IP address octet golang: net: lookup functions may return invalid host names golang: net/http/httputil: ReverseProxy forwards connection headers if first one is empty golang: math/big.Rat: may cause a panic or an unrecoverable fatal error if passed inputs with very large exponents golang: crypto/tls: certificate of wrong type is causing TLS client to panic golang: net/http/httputil: panic due to racy read of persistConn after handler panic golang: net/http: limit growth of header canonicalization cache golang: syscall: don't close fd 0 on ForkExec error | [
"cpe:/a:redhat:container_native_virtualization:4.10::el8"
] | null | 4.8 | null | null |
RHSA-2023:5761 | Red Hat Security Advisory: java-1.8.0-openjdk security update | OpenJDK: IOR deserialization issue in CORBA (8303384) OpenJDK: certificate path validation issue during client authentication (8309966) | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 5.3 | null | null |
RHSA-2018:2855 | Red Hat Security Advisory: openstack-nova security and bug fix update | openstack-nova: Swapping encrypted volumes can allow an attacker to corrupt the LUKS header causing a denial of service in the host | [
"cpe:/a:redhat:openstack:9::el7"
] | null | null | 6.5 | null |
RHSA-2019:2542 | Red Hat Security Advisory: Ansible security and bug fix update | Ansible: disclosure data when prompted for password and template characters are passed Ansible: gcp modules do not flag sensitive data fields properly | [
"cpe:/a:redhat:ansible_engine:2.8::el7",
"cpe:/a:redhat:ansible_engine:2.8::el8"
] | null | null | 5.7 | null |
RHSA-2018:0577 | Red Hat Security Advisory: Red Hat JBoss BPM Suite 6.4.9 security update | jackson-databind: Unsafe deserialization due to incomplete black list (incomplete fix for CVE-2017-7525) | [
"cpe:/a:redhat:jboss_bpms:6.4"
] | null | null | 8.1 | null |
RHSA-2019:3082 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.2 security update | wildfly-core: Incorrect privileges for 'Monitor', 'Auditor' and 'Deployer' user by default | [
"cpe:/a:redhat:jboss_enterprise_application_platform:7.2::el6",
"cpe:/a:redhat:jboss_enterprise_application_platform:7.2::el7",
"cpe:/a:redhat:jboss_enterprise_application_platform:7.2::el8"
] | null | null | 5.2 | null |
RHSA-2015:1228 | Red Hat Security Advisory: java-1.8.0-openjdk security update | OpenJDK: deserialization issue in ObjectInputStream.readSerialData() (Libraries, 8076401) OpenJDK: non-constant time comparisons in crypto code (JCE, 8074865) OpenJDK: incorrect code permission checks in RMIConnectionImpl (JMX, 8075853) OpenJDK: name for reverse DNS lookup used in certificate identity check (JSSE, 8067694) OpenJDK: IIOPInputStream type confusion vulnerability (CORBA, 8076376) ICU: integer overflow in LETableReference verifyLength() (OpenJDK 2D, 8077520) OpenJDK: GCM cipher issue causing JVM crash (Security, 8067648) SSL/TLS: "Invariance Weakness" vulnerability in RC4 stream cipher OpenJDK8: insecure hsperfdata temporary file handling, CVE-2015-0383 regression (Hotspot) LOGJAM: TLS connections which support export grade DHE key-exchange are vulnerable to MITM attacks OpenJDK: improper permission checks in MBeanServerInvocationHandler (JMX, 8076397) OpenJDK: insufficient context checks during object deserialization (Libraries, 8076405) OpenJDK: RemoteObjectInvocationHandler allows calling finalize() (RMI, 8076409) OpenJDK: incorrect OCSP nextUpdate checking (Libraries, 8075374) OpenJDK: DnsClient fails to release request information after error (JNDI, 8075378) ICU: missing boundary checks in layout engine (OpenJDK 2D, 8071715) | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation",
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 3.7 | null |
RHSA-2022:6506 | Red Hat Security Advisory: openvswitch2.16 security update | dpdk: error recovery in mlx5 driver not handled properly, allowing for denial of service | [
"cpe:/o:redhat:enterprise_linux:8::fastdatapath"
] | null | 6.5 | null | null |
RHSA-2022:1413 | Red Hat Security Advisory: kernel-rt security and bug fix update | kernel: fget: check that the fd still exists after getting a ref to it kernel: cgroups v1 release_agent feature may allow privilege escalation kernel: heap out of bounds write in nf_dup_netdev.c | [
"cpe:/a:redhat:rhel_eus:8.4::nfv",
"cpe:/a:redhat:rhel_eus:8.4::realtime"
] | null | 7.8 | null | null |
RHSA-2018:0269 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 6.4.19 security update | artemis/hornetq: memory exhaustion via UDP and JGroups discovery tomcat: Remote Code Execution bypass for CVE-2017-12615 jboss-remoting: High CPU Denial of Service | [
"cpe:/a:redhat:jboss_enterprise_application_platform:6.4"
] | null | null | 4.3 | null |
RHSA-2019:2112 | Red Hat Security Advisory: mod_auth_openidc security update | mod_auth_openidc: Shows user-supplied content on error pages mod_auth_openidc: OIDC_CLAIM and OIDCAuthNHeader not skipped in an "AuthType oauth20" configuration | [
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 5.9 | null |
RHSA-2022:8847 | Red Hat Security Advisory: Red Hat OpenStack Platform 16.2.4 (protobuf) security update | protobuf: Incorrect parsing of nullchar in the proto symbol leads to Nullptr dereference | [
"cpe:/a:redhat:openstack:16.2::el8"
] | null | 7.5 | null | null |
RHSA-2024:9553 | Red Hat Security Advisory: webkit2gtk3 security update | webkitgtk: Processing a file may lead to unexpected app termination or arbitrary code execution webkitgtk: Visiting a malicious website may lead to address bar spoofing webkitgtk: webkit2gtk: Processing maliciously crafted web content may lead to an unexpected process crash webkitgtk: A malicious website may exfiltrate data cross-origin webkitgtk: webkit2gtk: Processing maliciously crafted web content may lead to an unexpected process crash webkit: Processing maliciously crafted web content may lead to memory corruption | [
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 8.8 | null | null |
RHSA-2005:763 | Red Hat Security Advisory: binutils security update | security flaw | [
"cpe:/o:redhat:enterprise_linux:2.1::as",
"cpe:/o:redhat:enterprise_linux:2.1::aw",
"cpe:/o:redhat:enterprise_linux:2.1::es",
"cpe:/o:redhat:enterprise_linux:2.1::ws"
] | null | null | null | null |
RHSA-2018:2855 | Red Hat Security Advisory: openstack-nova security and bug fix update | openstack-nova: Swapping encrypted volumes can allow an attacker to corrupt the LUKS header causing a denial of service in the host | [
"cpe:/a:redhat:openstack:9::el7"
] | null | null | 6.5 | null |
RHSA-2023:6365 | Red Hat Security Advisory: mod_auth_openidc security and bug fix update | mod_auth_openidc: Open Redirect in oidc_validate_redirect_url() using tab character mod_auth_openidc: NULL pointer dereference when OIDCStripCookies is set and a crafted Cookie header is supplied | [
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 7.5 | null | null |
RHSA-2025:1327 | Red Hat Security Advisory: RHTAS 1.1.1 - Red Hat Trusted Artifact Signer Release | golang.org/x/crypto/ssh: Misuse of ServerConfig.PublicKeyCallback may cause authorization bypass in golang.org/x/crypto | [
"cpe:/a:redhat:trusted_artifact_signer:1.1::el9"
] | null | 8.2 | null | null |
RHSA-2004:467 | Red Hat Security Advisory: samba security update | security flaw security flaw | [
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws"
] | null | null | null | null |
RHSA-2020:3541 | Red Hat Security Advisory: OpenShift Container Platform 3.11 security update | jenkins-jira-plugin: plugin information disclosure openshift-ansible: cors allowed origin allows changing url protocol jenkins: Stored XSS vulnerability in job build time trend jenkins: Stored XSS vulnerability in upstream cause jenkins: Stored XSS vulnerability in 'keep forever' badge icons jenkins: Stored XSS vulnerability in console links jenkins-2-plugins/matrix-project: Stored XSS vulnerability in single axis builds tooltips jenkins-2-plugins/matrix-project: Stored XSS vulnerability in multiple axis builds tooltips jenkins-2-plugins/matrix-auth: Stored XSS vulnerability in Matrix Authorization Strategy Plugin python-rsa: decryption of ciphertext leads to DoS | [
"cpe:/a:redhat:openshift:3.11::el7"
] | null | 7.5 | null | null |
RHSA-2011:0840 | Red Hat Security Advisory: dhcp security update | dhclient: insufficient sanitization of certain DHCP response values | [
"cpe:/o:redhat:rhel_els:3::as",
"cpe:/o:redhat:rhel_els:3::es"
] | null | null | null | null |
RHSA-2023:6106 | Red Hat Security Advisory: Red Hat JBoss Core Services Apache HTTP Server 2.4.57 SP1 security update | HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack) | [
"cpe:/a:redhat:jboss_core_services:1"
] | null | 7.5 | null | null |
RHSA-2024:10178 | Red Hat Security Advisory: Red Hat build of Keycloak 26.0.6 Update | org.keycloak/keycloak-quarkus-server: Keycloak proxy header handling Denial-of-Service (DoS) vulnerability keycloak-core: mTLS passthrough org.keycloak:keycloak-services: Keycloak Denial of Service org.keycloak:keycloak-quarkus-server: Sensitive Data Exposure in Keycloak Build Process keycloak-quarkus-server: Keycloak path trasversal | [
"cpe:/a:redhat:build_keycloak:26"
] | null | 5.9 | 2.7 | null |
RHSA-2023:6256 | Red Hat Security Advisory: OpenShift Container Platform 4.13.21 security and extras update | golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487) | [
"cpe:/a:redhat:openshift:4.13::el8"
] | null | 7.5 | null | null |
RHSA-2006:0754 | Red Hat Security Advisory: gnupg security update | : gnupg2 < 2.0.1 buffer overflow security flaw | [
"cpe:/o:redhat:enterprise_linux:2.1::as",
"cpe:/o:redhat:enterprise_linux:2.1::aw",
"cpe:/o:redhat:enterprise_linux:2.1::es",
"cpe:/o:redhat:enterprise_linux:2.1::ws",
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws",
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2012:0721 | Red Hat Security Advisory: kernel security update | kernel: x86-64: avoid sysret to non-canonical address kernel: denial of service due to AMD Erratum #121 | [
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2016:0166 | Red Hat Security Advisory: flash-plugin security update | flash-plugin: multiple code execution issues fixed in APSB16-04 flash-plugin: multiple code execution issues fixed in APSB16-04 flash-plugin: multiple code execution issues fixed in APSB16-04 flash-plugin: multiple code execution issues fixed in APSB16-04 flash-plugin: multiple code execution issues fixed in APSB16-04 flash-plugin: multiple code execution issues fixed in APSB16-04 flash-plugin: multiple code execution issues fixed in APSB16-04 flash-plugin: multiple code execution issues fixed in APSB16-04 flash-plugin: multiple code execution issues fixed in APSB16-04 flash-plugin: multiple code execution issues fixed in APSB16-04 flash-plugin: multiple code execution issues fixed in APSB16-04 flash-plugin: multiple code execution issues fixed in APSB16-04 flash-plugin: multiple code execution issues fixed in APSB16-04 flash-plugin: multiple code execution issues fixed in APSB16-04 flash-plugin: multiple code execution issues fixed in APSB16-04 flash-plugin: multiple code execution issues fixed in APSB16-04 flash-plugin: multiple code execution issues fixed in APSB16-04 flash-plugin: multiple code execution issues fixed in APSB16-04 flash-plugin: multiple code execution issues fixed in APSB16-04 flash-plugin: multiple code execution issues fixed in APSB16-04 flash-plugin: multiple code execution issues fixed in APSB16-04 flash-plugin: multiple code execution issues fixed in APSB16-04 | [
"cpe:/a:redhat:rhel_extras:5::client",
"cpe:/a:redhat:rhel_extras:5::server",
"cpe:/a:redhat:rhel_extras:6"
] | null | null | null | null |
RHBA-2007:0331 | Red Hat Bug Fix Advisory: conga bug fix update | security flaw security flaw | [
"cpe:/a:redhat:rhel_cluster:5"
] | null | null | null | null |
RHSA-2009:0339 | Red Hat Security Advisory: lcms security update | LittleCms memory leak LittleCms integer overflow LittleCms lack of upper-bounds check on sizes | [
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2022:7023 | Red Hat Security Advisory: thunderbird security update | expat: a use-after-free in the doContent function in xmlparse.c | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 8.1 | null | null |
RHSA-2016:0354 | Red Hat Security Advisory: openstack-glance security update | openstack-glance: Glance image status manipulation through locations | [
"cpe:/a:redhat:openstack:5::el7"
] | null | null | null | null |
RHSA-2022:6717 | Red Hat Security Advisory: thunderbird security update | Mozilla: Remote content specified in an HTML document that was nested inside an iframe's srcdoc attribute was not blocked Mozilla: Leaking of sensitive information when composing a response to an HTML email with a META refresh tag Mozilla: An iframe element in an HTML email could trigger a network request Mozilla: Out of bounds read when decoding H264 Mozilla: Matrix SDK bundled with Thunderbird vulnerable to denial-of-service attack Mozilla: Content-Security-Policy base-uri bypass Mozilla: Incoherent instruction cache when building WASM on ARM64 Mozilla: Bypassing Secure Context restriction for cookies with __Host and __Secure prefix Mozilla: Bypassing FeaturePolicy restrictions on transient pages Mozilla: Data-race when parsing non-UTF-8 URLs in threads Mozilla: Memory safety bugs fixed in Firefox 105 and Firefox ESR 102.3 | [
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 8.8 | 7.5 | null |
RHSA-2017:1479 | Red Hat Security Advisory: glibc security update | glibc: heap/stack gap jumping via unbounded stack allocations | [
"cpe:/o:redhat:rhel_aus:5.9",
"cpe:/o:redhat:rhel_aus:6.4::server",
"cpe:/o:redhat:rhel_aus:6.5::server",
"cpe:/o:redhat:rhel_aus:6.6::server",
"cpe:/o:redhat:rhel_els:5",
"cpe:/o:redhat:rhel_eus:6.7::computenode",
"cpe:/o:redhat:rhel_eus:6.7::server",
"cpe:/o:redhat:rhel_eus:7.2::computenode",
"cpe:/o:redhat:rhel_eus:7.2::server",
"cpe:/o:redhat:rhel_mission_critical:6.2::server",
"cpe:/o:redhat:rhel_tus:6.5::server",
"cpe:/o:redhat:rhel_tus:6.6::server"
] | null | null | 7.4 | null |
RHSA-2024:2071 | Red Hat Security Advisory: OpenShift Container Platform 4.15.11 packages and security update | jose-go: improper handling of highly compressed data | [
"cpe:/a:redhat:openshift:4.15::el8",
"cpe:/a:redhat:openshift:4.15::el9",
"cpe:/a:redhat:openshift_ironic:4.15::el9"
] | null | 4.3 | null | null |
RHEA-2021:3139 | Red Hat Enhancement Advisory: Web Terminal 1.3 release | helm: information disclosure vulnerability | [
"cpe:/a:redhat:rhosemc:1.0::el8"
] | null | 6.8 | null | null |
RHSA-2019:3708 | Red Hat Security Advisory: mariadb:10.3 security and bug fix update | mysql: InnoDB unspecified vulnerability (CPU Jan 2019) mysql: Server: DDL unspecified vulnerability (CPU Jan 2019) mysql: Server: Replication unspecified vulnerability (CPU Apr 2019) mysql: Server: Security: Privileges unspecified vulnerability (CPU Apr 2019) mysql: InnoDB unspecified vulnerability (CPU Apr 2019) mysql: Server: Pluggable Auth unspecified vulnerability (CPU Jul 2019) mysql: Server: Security: Privileges unspecified vulnerability (CPU Jul 2019) mysql: Server: XML unspecified vulnerability (CPU Jul 2019) mysql: InnoDB unspecified vulnerability (CPU Jul 2019) mysql: Server: Parser unspecified vulnerability (CPU Jul 2019) mysql: C API unspecified vulnerability (CPU Apr 2020) mysql: C API unspecified vulnerability (CPU Jan 2021) | [
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb"
] | null | 3.7 | 3.7 | null |
RHSA-2019:0051 | Red Hat Security Advisory: python-django security update | django: Catastrophic backtracking in regular expressions via 'urlize' and 'urlizetrunc' | [
"cpe:/a:redhat:openstack:10::el7"
] | null | null | 5.3 | null |
RHEA-2020:2011 | Red Hat Enhancement Advisory: CNV 2.3.0 Images | virt-handler: virt-handler daemonset clusterroles allows retrieval of secrets nmstate/kubernetes-nmstate-handler: /etc/passwd is given incorrect privileges | [
"cpe:/a:redhat:container_native_virtualization:2.3::el8"
] | null | 7 | null | null |
RHSA-2013:0150 | Red Hat Security Advisory: acroread security update | acroread: multiple code execution flaws (APSB13-02) acroread: multiple code execution flaws (APSB13-02) acroread: multiple code execution flaws (APSB13-02) acroread: multiple code execution flaws (APSB13-02) acroread: multiple code execution flaws (APSB13-02) acroread: multiple code execution flaws (APSB13-02) acroread: multiple code execution flaws (APSB13-02) acroread: multiple code execution flaws (APSB13-02) acroread: multiple code execution flaws (APSB13-02) acroread: multiple code execution flaws (APSB13-02) acroread: multiple code execution flaws (APSB13-02) acroread: multiple code execution flaws (APSB13-02) acroread: multiple code execution flaws (APSB13-02) acroread: multiple code execution flaws (APSB13-02) acroread: multiple code execution flaws (APSB13-02) acroread: multiple code execution flaws (APSB13-02) acroread: multiple code execution flaws (APSB13-02) acroread: multiple code execution flaws (APSB13-02) acroread: multiple code execution flaws (APSB13-02) acroread: multiple code execution flaws (APSB13-02) acroread: multiple code execution flaws (APSB13-02) acroread: multiple code execution flaws (APSB13-02) acroread: multiple code execution flaws (APSB13-02) acroread: multiple code execution flaws (APSB13-02) acroread: multiple code execution flaws (APSB13-02) | [
"cpe:/a:redhat:rhel_extras:5::server",
"cpe:/a:redhat:rhel_extras:6"
] | null | null | null | null |
RHSA-2021:2350 | Red Hat Security Advisory: .NET Core 3.1 on RHEL 7 security and bugfix update | dotnet: ASP.NET Core Client Disconnect Denial of Service | [
"cpe:/a:redhat:rhel_dotnet:3.1::el7"
] | null | 5.9 | null | null |
RHSA-2023:4283 | Red Hat Security Advisory: Red Hat OpenStack Platform 16.2 (openstack-neutron) security update | openstack-neutron: unrestricted creation of security groups (fix for CVE-2022-3277) | [
"cpe:/a:redhat:openstack:16.2::el8"
] | null | 4.3 | null | null |
RHSA-2024:0798 | Red Hat Security Advisory: Red Hat Single Sign-On 7.6.7 security update on RHEL 7 | guava: insecure temporary directory creation keycloak: reflected XSS via wildcard in OIDC redirect_uri keycloak: redirect_uri validation bypass keycloak: Log Injection during WebAuthn authentication or registration keycloak: open redirect via "form_post.jwt" JARM response mode jetty-server: OutOfMemoryError for large multipart without filename read via request.getParameter() jetty-server: Cookie parsing of quoted values can exfiltrate values from other cookies santuario: Private Key disclosure in debug-log output | [
"cpe:/a:redhat:red_hat_single_sign_on:7.6::el7"
] | null | 6.5 | null | null |
RHSA-2013:0849 | Red Hat Security Advisory: KVM image security update | livecd-tools: improper handling of passwords | [
"cpe:/o:redhat:enterprise_linux_common:6::server"
] | null | null | null | null |
RHSA-2024:3467 | Red Hat Security Advisory: Red Hat OpenStack Platform 16.1 (etcd) security update | golang: html/template: improper handling of HTML-like comments within script contexts golang: html/template: improper handling of special tags within script contexts golang: crypto/tls: panic when processing post-handshake message on QUIC connections golang: crypto/tls: lack of a limit on buffered post-handshake golang: net/http/internal: Denial of Service (DoS) via Resource Consumption via HTTP requests golang: net/http, x/net/http2: unlimited number of CONTINUATION frames causes DoS etcd: Incomplete fix for CVE-2022-41723 in OpenStack Platform etcd: Incomplete fix for CVE-2021-44716 in OpenStack Platform etcd: Incomplete fix for CVE-2023-39325/CVE-2023-44487 in OpenStack Platform | [
"cpe:/a:redhat:openstack:16.1::el8"
] | null | 7.5 | null | null |
RHSA-2025:2029 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 8.0.6 security update | wildfly: Wildfly vulnerable to Cross-Site Scripting (XSS) | [
"cpe:/a:redhat:jboss_enterprise_application_platform:8.0"
] | null | 6.1 | null | null |
RHSA-2024:7861 | Red Hat Security Advisory: Apicurio Registry (container images) release and security update [ 2.6.5 GA ] | apache-avro: Schema parsing may trigger Remote Code Execution (RCE) | [
"cpe:/a:redhat:apicurio_registry:2.6"
] | null | 8.8 | null | null |
RHSA-2007:1022 | Red Hat Security Advisory: cups security update | Incomplete fix for CVE-2007-0720 CUPS denial of service cups boundary error DCTStream:: readProgressiveDataUnit() DCTStream:: reset() CCITTFaxStream:: lookChar() | [
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2012:0958 | Red Hat Security Advisory: sos security, bug fix, and enhancement update | sosreport does not blank root password in anaconda plugin | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2016:0011 | Red Hat Security Advisory: samba security update | samba: Insufficient symlink verification in smbd samba: client requesting encryption vulnerable to downgrade attack Samba: Missing access control check in shadow copy code | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2018:2308 | Red Hat Security Advisory: openslp security update | openslp: Heap memory corruption in slpd/slpd_process.c allows denial of service or potentially code execution | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | 7.5 | null |
RHSA-2008:0218 | Red Hat Security Advisory: gnome-screensaver security update | gnome-screensaver using NIS auth will unlock if NIS goes away | [
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2023:6343 | Red Hat Security Advisory: LibRaw security update | LibRaw: stack buffer overflow in LibRaw_buffer_datastream::gets() in src/libraw_datastream.cpp | [
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::crb"
] | null | 5.3 | null | null |
RHSA-2024:3635 | Red Hat Security Advisory: Red Hat Product OCP Tools 4.12 Openshift Jenkins security update | ssh: Prefix truncation attack on Binary Packet Protocol (BPP) jetty: stop accepting new connections from valid clients jenkins-2-plugins: git-server plugin arbitrary file read vulnerability jenkins-2-plugins: matrix-project plugin path traversal vulnerability golang-protobuf: encoding/protojson, internal/encoding/json: infinite loop in protojson.Unmarshal when unmarshaling certain forms of invalid JSON jenkins-2-plugins: Improper input sanitization in HTML Publisher Plugin jenkins-plugin/script-security: sandbox bypass via crafted constructor bodies jenkins-plugin/script-security: sandbox bypass via sandbox-defined classes | [
"cpe:/a:redhat:ocp_tools:4.12::el8"
] | null | 8.8 | null | null |
RHSA-2004:191 | Red Hat Security Advisory: cadaver security update | security flaw | [
"cpe:/o:redhat:enterprise_linux:2.1::as",
"cpe:/o:redhat:enterprise_linux:2.1::aw",
"cpe:/o:redhat:enterprise_linux:2.1::es",
"cpe:/o:redhat:enterprise_linux:2.1::ws"
] | null | null | null | null |
RHSA-2022:0405 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.3 security update | undertow: client side invocation timeout raised when calling over HTTP2 | [
"cpe:/a:redhat:jboss_enterprise_application_platform:7.3::el6",
"cpe:/a:redhat:jboss_enterprise_application_platform:7.3::el7",
"cpe:/a:redhat:jboss_enterprise_application_platform:7.3::el8"
] | null | 7.5 | null | null |
RHSA-2024:3961 | Red Hat Security Advisory: flatpak security update | flatpak: sandbox escape via RequestBackground portal | [
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb"
] | null | 8.4 | null | null |
RHSA-2024:1335 | Red Hat Security Advisory: dnsmasq security update | bind9: KeyTrap - Extreme CPU consumption in DNSSEC validator bind9: Preparing an NSEC3 closest encloser proof can exhaust CPU resources | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 7.5 | null | null |
RHSA-2009:0457 | Red Hat Security Advisory: libwmf security update | libwmf: embedded gd use-after-free error | [
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws",
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2024:6824 | Red Hat Security Advisory: OpenShift Container Platform 4.16.14 security update | containers/image: digest type does not guarantee valid type golang-protobuf: encoding/protojson, internal/encoding/json: infinite loop in protojson.Unmarshal when unmarshaling certain forms of invalid JSON Bare Metal Operator: BMO can expose particularly named secrets from other namespaces via BMH CRD | [
"cpe:/a:redhat:openshift:4.16::el9"
] | null | 4.9 | null | null |
RHSA-2022:0464 | Red Hat Security Advisory: aide security update | aide: heap-based buffer overflow on outputs larger than B64_BUF | [
"cpe:/a:redhat:rhel_e4s:8.1::appstream"
] | null | 7.5 | null | null |
RHSA-2007:0473 | Red Hat Security Advisory: gcc security and bug fix update | Directory traversal issue in fastjar | [
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws"
] | null | null | null | null |
RHSA-2012:1304 | Red Hat Security Advisory: kernel security and bug fix update | kernel: unfiltered netdev rio_ioctl access by users kernel: drm/i915: integer overflow in i915_gem_do_execbuffer() kernel: huge pages: memory leak on mmap failure kernel: recv{from,msg}() on an rds socket can leak kernel memory kernel: net: slab corruption due to improper synchronization around inet->opt | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2009:0004 | Red Hat Security Advisory: openssl security update | OpenSSL Incorrect checks for malformed signatures | [
"cpe:/o:redhat:enterprise_linux:2.1::as",
"cpe:/o:redhat:enterprise_linux:2.1::aw",
"cpe:/o:redhat:enterprise_linux:2.1::es",
"cpe:/o:redhat:enterprise_linux:2.1::ws",
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws",
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws",
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2021:5085 | Red Hat Security Advisory: Red Hat OpenShift Data Foundation 4.9.0 enhancement, security, and bug fix update | kubernetes: Incomplete fix for CVE-2019-11250 allows for token leak in logs when logLevel >= 9 golang: net: lookup functions may return invalid host names golang: net/http/httputil: ReverseProxy forwards connection headers if first one is empty golang: math/big.Rat: may cause a panic or an unrecoverable fatal error if passed inputs with very large exponents golang: crypto/tls: certificate of wrong type is causing TLS client to panic | [
"cpe:/a:redhat:openshift_data_foundation:4.9::el8"
] | null | 6.5 | null | null |
RHSA-2023:3355 | Red Hat Security Advisory: Red Hat JBoss Core Services Apache HTTP Server 2.4.51 SP2 security update | httpd: mod_dav: out-of-bounds read/write of zero byte openssl: timing attack in RSA Decryption implementation openssl: double free after calling PEM_read_bio_ex apr-util: out-of-bounds writes in the apr_base64 curl: HSTS bypass via IDN curl: Use-after-free triggered by an HTTP proxy deny response expat: use-after free caused by overeager destruction of a shared DTD in XML_ExternalEntityParserCreate openssl: use-after-free following BIO_new_NDEF openssl: X.400 address type confusion in X.509 GeneralName curl: HSTS ignored on multiple requests curl: HSTS amnesia with --parallel curl: HTTP multi-header compression denial of service httpd: HTTP request splitting with mod_rewrite and mod_proxy curl: TELNET option IAC injection curl: SFTP path ~ resolving discrepancy | [
"cpe:/a:redhat:jboss_core_services:1"
] | null | 3.7 | null | null |
RHSA-2016:1099 | Red Hat Security Advisory: jq security update | jq: heap-buffer-overflow in tokenadd() function | [
"cpe:/a:redhat:openstack:7::el7"
] | null | null | null | null |
RHSA-2025:4026 | Red Hat Security Advisory: thunderbird security update | firefox: thunderbird: Use-after-free triggered by XSLTProcessor firefox: thunderbird: URL Bar Spoofing via non-BMP Unicode characters firefox: thunderbird: Memory safety bugs fixed in Firefox 137, Thunderbird 137, Firefox ESR 128.9, and Thunderbird 128.9 | [
"cpe:/a:redhat:rhel_eus:9.4::appstream"
] | null | 8.8 | null | null |
RHSA-2024:5193 | Red Hat Security Advisory: httpd:2.4 security update | httpd: Security issues via backend applications whose response headers are malicious or exploitable | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 9.1 | null | null |
RHSA-2017:1395 | Red Hat Security Advisory: libntirpc security update | libntirpc: Memory leak when failing to parse XDR strings or bytearrays | [
"cpe:/a:redhat:storage:3.2:nfs:el6",
"cpe:/a:redhat:storage:3.2:nfs:el7"
] | null | null | 7.5 | null |
RHSA-2014:0859 | Red Hat Security Advisory: Red Hat Enterprise MRG 2.5 Messaging and Grid security update | cumin: DoS via displayed link names containing non-ASCII characters cumin: session cookies lack httponly setting | [
"cpe:/a:redhat:enterprise_mrg:2::el5"
] | null | null | null | null |
RHSA-2014:1036 | Red Hat Security Advisory: java-1.5.0-ibm security update | JDK: Java CMS keystore provider potentially allows brute-force private key recovery JDK: Privilege escalation issue OpenJDK: SubjectDelegator protection insufficient (JMX, 8029755) OpenJDK: Clone interfaces passed to proxy methods (Libraries, 8035009) OpenJDK: Bytecode verification does not prevent ctor calls to this() and super() (Hotspot, 8035119) OpenJDK: RSA blinding issues (Security, 8031346) OpenJDK: Prevent instantiation of service with non-public constructor (Security, 8035004) OpenJDK: AtomicReferenceFieldUpdater missing primitive type check (Libraries, 8039520) OpenJDK: insufficient Diffie-Hellman public key validation (Security, 8037162) | [
"cpe:/a:redhat:rhel_extras:5::client",
"cpe:/a:redhat:rhel_extras:5::server",
"cpe:/a:redhat:rhel_extras:6"
] | null | null | null | null |
RHSA-2024:7429 | Red Hat Security Advisory: kpatch-patch-4_18_0-553 and kpatch-patch-4_18_0-553_16_1 security update | kernel: wifi: mac80211: Avoid address calculations via out of bounds array indexing kernel: virtio-net: tap: mlx5_core short frame denial of service kernel: virtio-net: tun: mlx5_core short frame denial of service | [
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 7.1 | null | null |
RHSA-2016:0364 | Red Hat Security Advisory: openstack-nova security update | openstack-nova: Host data leak through resize/migration | [
"cpe:/a:redhat:openstack:6::el7"
] | null | null | null | null |
RHSA-2025:1601 | Red Hat Security Advisory: gcc security update | jquery: Untrusted code execution via <option> tag in HTML passed to DOM manipulation methods | [
"cpe:/o:redhat:rhel_els:7"
] | null | 6.1 | null | null |
RHSA-2023:4114 | Red Hat Security Advisory: Red Hat OpenShift Service Mesh Containers for 2.4.1 security update | openshift: OCP & FIPS mode | [
"cpe:/a:redhat:service_mesh:2.4::el8"
] | null | 6.5 | null | null |
RHSA-2013:1525 | Red Hat Security Advisory: openstack-glance security and bug fix update | Glance: image_download policy not enforced for cached images | [
"cpe:/a:redhat:openstack:3::el6"
] | null | null | null | null |
RHSA-2020:5533 | Red Hat Security Advisory: Red Hat Single Sign-On 7.4.4 security update | containers/redhat-sso-7: /etc/passwd is given incorrect privileges nodejs-elliptic: improper encoding checks allows a certain degree of signature malleability in ECDSA signatures hibernate-core: SQL injection vulnerability when both hibernate.use_sql_comments and JPQL String literals are used jackson-databind: FasterXML DOMDeserializer insecure entity expansion is vulnerable to XML external entity (XXE) keycloak: Account REST API can update user metadata attributes | [
"cpe:/a:redhat:red_hat_single_sign_on"
] | null | 4.2 | null | null |
RHSA-2022:6523 | Red Hat Security Advisory: .NET Core 3.1 security and bugfix update | dotnet: DenialOfService - ASP.NET Core MVC vulnerable to stack overflow via ModelStateDictionary recursion. | [
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb"
] | null | 7.5 | null | null |
RHSA-2025:3666 | Red Hat Security Advisory: openssl security update | openssl: SSL_select_next_proto buffer overread | [
"cpe:/a:redhat:rhel_eus:9.4::appstream",
"cpe:/o:redhat:rhel_eus:9.4::baseos"
] | null | null | 5.9 | null |
RHSA-2007:0858 | Red Hat Security Advisory: krb5 security update | krb5 RPC library buffer overflow krb5 kadmind uninitialized pointer | [
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2018:3854 | Red Hat Security Advisory: ntp security update | ntp: Stack-based buffer overflow in ntpq and ntpdc allows denial of service or code execution | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | 7 | null |
RHSA-2017:2839 | Red Hat Security Advisory: dnsmasq security update | dnsmasq: heap overflow in the code responsible for building DNS replies | [
"cpe:/o:redhat:rhel_aus:6.4::server",
"cpe:/o:redhat:rhel_aus:6.5::server",
"cpe:/o:redhat:rhel_aus:6.6::server",
"cpe:/o:redhat:rhel_eus:6.7::computenode",
"cpe:/o:redhat:rhel_eus:6.7::server",
"cpe:/o:redhat:rhel_mission_critical:6.2::server",
"cpe:/o:redhat:rhel_tus:6.5::server",
"cpe:/o:redhat:rhel_tus:6.6::server"
] | null | null | 9.8 | null |
RHSA-2023:5008 | Red Hat Security Advisory: Red Hat build of MicroShift 4.14.0 security update | kube-apiserver: PrivEsc kube-apiserver: Bypassing policies imposed by the ImagePolicyWebhook admission plugin kube-apiserver: Bypassing enforce mountable secrets policy imposed by the ServiceAccount admission plugin golang: html/template: improper handling of HTML-like comments within script contexts golang: html/template: improper handling of special tags within script contexts golang: crypto/tls: panic when processing post-handshake message on QUIC connections golang: crypto/tls: lack of a limit on buffered post-handshake | [
"cpe:/a:redhat:openshift:4.14::el9"
] | null | 7.5 | null | null |
RHSA-2023:0661 | Red Hat Security Advisory: Red Hat Fuse 7.11.1.P1 security update for Fuse on EAP | hazelcast: Hazelcast connection caching | [
"cpe:/a:redhat:jboss_fuse:7"
] | null | 9.1 | null | null |
RHSA-2017:2795 | Red Hat Security Advisory: kernel security update | kernel: load_elf_ binary() does not take account of the need to allocate sufficient space for the entire binary | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | 7.8 | null |
RHSA-2024:0972 | Red Hat Security Advisory: firefox security update | Mozilla: Out-of-bounds memory read in networking channels Mozilla: Alert dialog could have been spoofed on another site Mozilla: Fullscreen Notification could have been hidden by select element Mozilla: Custom cursor could obscure the permission dialog Mozilla: Mouse cursor re-positioned unexpectedly could have led to unintended permission grants Mozilla: Multipart HTTP Responses would accept the Set-Cookie header in response parts Mozilla: Incorrect code generation on 32-bit ARM devices Mozilla: Memory safety bugs fixed in Firefox 123, Firefox ESR 115.8, and Thunderbird 115.8 | [
"cpe:/a:redhat:rhel_aus:8.2::appstream",
"cpe:/a:redhat:rhel_e4s:8.2::appstream",
"cpe:/a:redhat:rhel_tus:8.2::appstream"
] | null | 7.5 | null | null |
RHSA-2009:0473 | Red Hat Security Advisory: kernel security and bug fix update | Kernel BUG() in locks_remove_flock kernel: ecryptfs file header infoleak kernel: x86-64: syscall-audit: 32/64 syscall hole kernel: nfsv4 client can be crashed by stating a long filename kernel: exit_notify: kill the wrong capable(CAP_KILL) check | [
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2021:0495 | Red Hat Security Advisory: Red Hat JBoss Web Server 5.4.1 Security Update | openssl: EDIPARTYNAME NULL pointer de-reference tomcat: Apache Tomcat HTTP/2 Request mix-up tomcat: HTTP/2 request header mix-up tomcat: Information disclosure when using NTFS file system | [
"cpe:/a:redhat:jboss_enterprise_web_server:5.4"
] | null | 5.9 | null | null |
RHSA-2015:0694 | Red Hat Security Advisory: kernel-rt security, bug fix, and enhancement update | kernel: splice: lack of generic write checks Kernel: fs: ext4 race condition kernel: soft lockup on aio kernel: NULL pointer dereference in madvise(MADV_WILLNEED) support kernel: xfs: replacing remote attributes memory corruption | [
"cpe:/a:redhat:enterprise_mrg:2:server:el6"
] | null | null | 6.2 | null |
RHSA-2013:0590 | Red Hat Security Advisory: nss-pam-ldapd security update | nss-pam-ldapd: FD_SET array index error, leading to stack-based buffer overflow | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.