id
stringlengths 13
15
| title
stringlengths 29
176
| description
stringlengths 8
32.1k
| cpes
sequencelengths 0
20
| cvss_v4_0
null | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
null |
---|---|---|---|---|---|---|---|
RHSA-2025:3540 | Red Hat Security Advisory: Red Hat Integration Camel K 1.10.10 release and security update. | io.netty:netty-handler: SslHandler doesn't correctly validate packets which can lead to native crash when using native SSLEngine | [
"cpe:/a:redhat:camel_k:1.10.10"
] | null | 7.5 | null | null |
RHSA-2008:0181 | Red Hat Security Advisory: krb5 security update | krb5: uninitialized pointer use in krb5kdc krb5: possible leak of sensitive data from krb5kdc using krb4 request krb5: incorrect handling of high-numbered file descriptors in RPC library | [
"cpe:/o:redhat:enterprise_linux:2.1::as",
"cpe:/o:redhat:enterprise_linux:2.1::aw",
"cpe:/o:redhat:enterprise_linux:2.1::es",
"cpe:/o:redhat:enterprise_linux:2.1::ws",
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws"
] | null | null | null | null |
RHSA-2017:1464 | Red Hat Security Advisory: openstack-heat security and bug fix update | openstack-heat: Template source URL allows network port scan openstack-heat: /var/log/heat/ is world readable | [
"cpe:/a:redhat:openstack:9::el7"
] | null | null | 5.9 | null |
RHSA-2020:2506 | Red Hat Security Advisory: Red Hat JBoss Web Server 5.3.1 security update | tomcat: deserialization flaw in session persistence storage leading to RCE | [
"cpe:/a:redhat:jboss_enterprise_web_server:5.3::el6",
"cpe:/a:redhat:jboss_enterprise_web_server:5.3::el7",
"cpe:/a:redhat:jboss_enterprise_web_server:5.3::el8"
] | null | 7 | null | null |
RHSA-2023:1590 | Red Hat Security Advisory: kpatch-patch security update | ALSA: pcm: Move rwsem lock inside snd_ctl_elem_read to prevent UAF | [
"cpe:/o:redhat:rhel_e4s:8.1::baseos"
] | null | 7.8 | null | null |
RHBA-2024:10826 | Red Hat Bug Fix Advisory: OpenShift Container Platform 4.16.26 packages and security update | cri-o: Checkpoint restore can be triggered from different namespaces | [
"cpe:/a:redhat:openshift:4.16::el8",
"cpe:/a:redhat:openshift:4.16::el9"
] | null | 7.4 | null | null |
RHSA-2022:8857 | Red Hat Security Advisory: Red Hat OpenStack Platform 16.2.4 (erlang) security update | erlang/otp: Client Authentication Bypass | [
"cpe:/a:redhat:openstack:16.2::el8"
] | null | 9.4 | null | null |
RHSA-2014:1959 | Red Hat Security Advisory: kernel security and bug fix update | kernel: net: insufficient permision checks of netlink messages | [
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2021:2184 | Red Hat Security Advisory: perl security update | perl: corruption of intermediate language state of compiled regular expression due to recursive S_study_chunk() calls leads to DoS | [
"cpe:/a:redhat:rhel_eus:8.2::appstream",
"cpe:/o:redhat:rhel_eus:8.2::baseos"
] | null | 7.5 | null | null |
RHSA-2023:7428 | Red Hat Security Advisory: tigervnc security update | xorg-x11-server: Out-of-bounds write in XIChangeDeviceProperty/RRChangeOutputProperty xorg-x11-server: Use-after-free bug in DestroyWindow | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 4.7 | null | null |
RHSA-2023:5457 | Red Hat Security Advisory: frr security update | frr: Incorrect handling of a error in parsing of an invalid section of a BGP update can de-peer a router | [
"cpe:/a:redhat:rhel_eus:9.0::appstream"
] | null | 7.5 | null | null |
RHSA-2021:0346 | Red Hat Security Advisory: qemu-kvm-ma security update | QEMU: slirp: use-after-free in ip_reass() function in ip_input.c QEMU: reachable assertion failure in net_tx_pkt_add_raw_fragment() in hw/net/net_tx_pkt.c | [
"cpe:/o:redhat:enterprise_linux:7::server"
] | null | 3.8 | null | null |
RHSA-2013:1284 | Red Hat Security Advisory: ruby193-puppet security update | puppet: remote code execution on master from unauthenticated clients Puppet: resource_type service code execution Puppet: Local Privilege Escalation/Arbitrary Code Execution | [
"cpe:/a:redhat:openstack:3::el6"
] | null | null | null | null |
RHSA-2008:0715 | Red Hat Security Advisory: nss_ldap security and bug fix update | nss_ldap randomly replying with wrong user's data | [
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2022:1777 | Red Hat Security Advisory: webkit2gtk3 security, bug fix, and enhancement update | webkitgtk: Use-after-free leading to arbitrary code execution webkitgtk: Type confusion issue leading to arbitrary code execution webkitgtk: Logic issue leading to HSTS bypass webkitgtk: Out-of-bounds read leading to memory disclosure webkitgtk: Memory corruption issue leading to arbitrary code execution webkitgtk: Memory corruption issue leading to arbitrary code execution webkitgtk: Multiple memory corruption issue leading to arbitrary code execution webkitgtk: Memory corruption issue leading to arbitrary code execution webkitgtk: CSS compositing issue leading to revealing of the browsing history webkitgtk: Logic issue leading to Content Security Policy bypass webkitgtk: Information leak via Content Security Policy reports webkitgtk: Buffer overflow leading to arbitrary code execution webkitgtk: Logic issue leading to universal cross-site scripting webkitgtk: Cross-origin data exfiltration via resource timing API webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution webkitgtk: Incorrect memory allocation in WebCore::ImageBufferCairoImageSurfaceBackend::create webkitgtk: use-after-free in WebCore::ContainerNode::firstChild webkitgtk: use-after-free in WebCore::Frame::page webkitgtk: Processing a maliciously crafted mail message may lead to running arbitrary javascript webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution webkitgtk: Processing maliciously crafted web content may prevent Content Security Policy from being enforced webkitgtk: A malicious website may exfiltrate data cross-origin webkitgtk: maliciously crafted web content may lead to arbitrary code execution due to use after free webkitgtk: logic issue was addressed with improved state management | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 8.8 | null | null |
RHSA-2023:7765 | Red Hat Security Advisory: podman security update | golang: crypto/tls: slow verification of certificate chains containing large RSA keys golang: html/template: improper handling of HTML-like comments within script contexts golang: html/template: improper handling of special tags within script contexts golang: crypto/tls: panic when processing post-handshake message on QUIC connections golang: crypto/tls: lack of a limit on buffered post-handshake | [
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 7.5 | null | null |
RHSA-2024:1362 | Red Hat Security Advisory: OpenShift Container Platform 4.14.17 low-latency extras security update | golang-protobuf: encoding/protojson, internal/encoding/json: infinite loop in protojson.Unmarshal when unmarshaling certain forms of invalid JSON | [
"cpe:/a:redhat:openshift:4.14::el8",
"cpe:/a:redhat:openshift:4.14::el9"
] | null | 5.9 | null | null |
RHSA-2021:1842 | Red Hat Security Advisory: raptor2 security and bug fix update | raptor: heap-based buffer overflows due to an error in calculating the maximum nspace declarations for the XML writer raptor2: malformed input file can lead to a segfault due to an out of bounds array access in raptor_xml_writer_start_element_common | [
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb"
] | null | 6.5 | null | null |
RHSA-2014:0799 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 6.2.4 update | CXF: The SecurityTokenService accepts certain invalid SAML Tokens as valid CXF: UsernameTokens are sent in plaintext with a Symmetric EncryptBeforeSigning policy CXF: HTML content posted to SOAP endpoint could cause OOM errors CXF: Large invalid content could cause temporary space to fill JAX-RS: Information disclosure via XML eXternal Entity (XXE) | [
"cpe:/a:redhat:jboss_enterprise_application_platform:6::el6"
] | null | null | null | null |
RHSA-2024:10928 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.4.20 Security update | undertow: information leakage via HTTP/2 request header reuse | [
"cpe:/a:redhat:jboss_enterprise_application_platform:7.4::el8"
] | null | 0 | null | null |
RHSA-2021:0663 | Red Hat Security Advisory: Ansible security and bug fix update (2.9.18) | ansible: user data leak in snmp_facts module module: bitbucket_pipeline_variable exposes secured values ansible: multiple modules expose secured values ansible: basic.py no_log with fallback option | [
"cpe:/a:redhat:ansible_engine:2::el7",
"cpe:/a:redhat:ansible_engine:2::el8"
] | null | 5 | null | null |
RHSA-2024:2037 | Red Hat Security Advisory: tigervnc security update | xorg-x11-server: Heap buffer overread/data leakage in ProcXIGetSelectedEvents xorg-x11-server: Heap buffer overread/data leakage in ProcXIPassiveGrabDevice xorg-x11-server: Use-after-free in ProcRenderAddGlyphs | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 7.8 | null | null |
RHSA-2014:0745 | Red Hat Security Advisory: flash-plugin security update | flash-plugin: multiple cross-site scripting flaws (APSB14-16) flash-plugin: multiple cross-site scripting flaws (APSB14-16) flash-plugin: multiple cross-site scripting flaws (APSB14-16) flash-plugin: arbitrary code execution flaws (APSB14-16) flash-plugin: arbitrary code execution flaws (APSB14-16) flash-plugin: arbitrary code execution flaws (APSB14-16) | [
"cpe:/a:redhat:rhel_extras:5::client",
"cpe:/a:redhat:rhel_extras:5::server",
"cpe:/a:redhat:rhel_extras:6"
] | null | null | null | null |
RHSA-2009:0466 | Red Hat Security Advisory: java-1.5.0-ibm security update | OpenJDK JMX allows illegal operations with local monitoring (6332953) JRE allows unauthorized file access and connections to localhost JRE allows unauthorized memory read access via a crafted ZIP file OpenJDK Denial-Of-Service in kerberos authentication (6588160) OpenJDK RSA public key length denial-of-service (6497740) OpenJDK allows to list files within the user home directory (6484091) OpenJDK UTF-8 decoder accepts non-shortest form sequences (4486841) OpenJDK Jar200 Decompression buffer overflow (6755943) OpenJDK calendar object deserialization allows privilege escalation (6734167) OpenJDK Privilege escalation in command line applications (6733959) OpenJDK Font processing vulnerability (6733336) OpenJDK Truetype Font processing vulnerability (6751322) OpenJDK Buffer overflow in image processing (6726779) OpenJDK temporary files have guessable file names (6721753) | [
"cpe:/a:redhat:network_satellite:5.2::el4",
"cpe:/a:redhat:network_satellite:5.2::el5"
] | null | null | null | null |
RHSA-2023:7389 | Red Hat Security Advisory: kernel-rt security update | kernel: use-after-free due to race condition in qdisc_graft() kernel: net/sched: cls_fw component can be exploited as result of failure in tcf_change_indev function kernel: tun: bugs for oversize packet when napi frags enabled in tun_napi_alloc_frags kernel: netfilter: use-after-free due to improper element removal in nft_pipapo_remove() kernel: netfilter: nf_tables_newrule when adding a rule with NFTA_RULE_CHAIN_ID leads to use-after-free hw: amd: Cross-Process Information Leak kernel: netfilter: potential slab-out-of-bound access due to integer underflow | [
"cpe:/a:redhat:rhel_eus:9.0::nfv",
"cpe:/a:redhat:rhel_eus:9.0::realtime"
] | null | 7 | null | null |
RHSA-2017:1647 | Red Hat Security Advisory: kernel-rt security and bug fix update | kernel: ipv4/tcp: Infinite loop in tcp_splice_read() kernel: nfsd: Incorrect handling of long RPC replies kernel: NFSv3 server does not properly handle payload bounds checking of WRITE requests kernel: heap/stack gap jumping via unbounded stack allocations kernel: Incorrectly mapped contents of PIE executable | [
"cpe:/a:redhat:enterprise_mrg:2:server:el6"
] | null | null | 2.9 | null |
RHSA-2025:1280 | Red Hat Security Advisory: kernel-rt security update | kernel: media: uvcvideo: Skip parsing frames of type UVC_VS_UNDEFINED in uvc_parse_format | [
"cpe:/a:redhat:rhel_extras_rt_els:7"
] | null | 7.3 | null | null |
RHSA-2023:1286 | Red Hat Security Advisory: Migration Toolkit for Runtimes security bug fix and enhancement update | spring-security-oauth2-client: Privilege Escalation in spring-security-oauth2-client xstream: Denial of Service by injecting recursive collections or maps based on element's hash values raising a stack overflow CXF: SSRF Vulnerability | [
"cpe:/a:redhat:migration_toolkit_runtimes:1.0::el8"
] | null | 9.8 | null | null |
RHSA-2017:0212 | Red Hat Security Advisory: nagios security update | snoopy: incomplete fixes for command execution flaws snoopy: incomplete fixes for command execution flaws snoopy: incomplete fixes for command execution flaws nagios: Command injection via curl in MagpieRSS nagios: Privilege escalation issue | [
"cpe:/a:redhat:openstack:5::el6"
] | null | null | 7.3 | null |
RHSA-2012:0050 | Red Hat Security Advisory: qemu-kvm security, bug fix, and enhancement update | qemu: e1000: process_tx_desc legacy mode packets heap overflow | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2023:0100 | Red Hat Security Advisory: systemd security and bug fix update | systemd: buffer overrun in format_timespan() function | [
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 5.5 | null | null |
RHSA-2023:5751 | Red Hat Security Advisory: java-17-openjdk security and bug fix update | OpenJDK: memory corruption issue on x86_64 with AVX-512 (8317121) OpenJDK: certificate path validation issue during client authentication (8309966) | [
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb"
] | null | 5.3 | null | null |
RHSA-2023:5530 | Red Hat Security Advisory: Logging Subsystem 5.7.7 - Red Hat OpenShift security update | golang: net/http: insufficient sanitization of Host header golang: crypto/tls: slow verification of certificate chains containing large RSA keys golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487) HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack) | [
"cpe:/a:redhat:logging:5.7::el8"
] | null | 7.5 | null | null |
RHSA-2005:137 | Red Hat Security Advisory: mailman security update | security flaw | [
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2021:0470 | Red Hat Security Advisory: .NET Core 2.1 on Red Hat Enterprise Linux security and bugfix update | dotnet: certificate chain building recursion Denial of Service | [
"cpe:/a:redhat:rhel_dotnet:2.1::el7"
] | null | 6.5 | null | null |
RHSA-2024:4316 | Red Hat Security Advisory: OpenShift Container Platform 4.16.2 bug fix and security update | go-retryablehttp: url might write sensitive information to log file | [
"cpe:/a:redhat:openshift:4.16::el9"
] | null | 6 | null | null |
RHSA-2024:4563 | Red Hat Security Advisory: java-1.8.0-openjdk security update | OpenJDK: potential UTF8 size overflow (8314794) OpenJDK: Excessive symbol length can lead to infinite loop (8319859) OpenJDK: Range Check Elimination (RCE) pre-loop limit overflow (8320548) OpenJDK: Pack200 increase loading time due to improper header validation (8322106) OpenJDK: Out-of-bounds access in 2D image handling (8324559) OpenJDK: RangeCheckElimination array index overflow (8323231) | [
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb",
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::crb",
"cpe:/a:redhat:rhel_aus:8.2::appstream",
"cpe:/a:redhat:rhel_aus:8.4::appstream",
"cpe:/a:redhat:rhel_aus:8.6::appstream",
"cpe:/a:redhat:rhel_e4s:8.4::appstream",
"cpe:/a:redhat:rhel_e4s:8.6::appstream",
"cpe:/a:redhat:rhel_e4s:9.0::appstream",
"cpe:/a:redhat:rhel_eus:8.8::appstream",
"cpe:/a:redhat:rhel_eus:8.8::crb",
"cpe:/a:redhat:rhel_eus:9.2::appstream",
"cpe:/a:redhat:rhel_eus:9.2::crb",
"cpe:/a:redhat:rhel_tus:8.4::appstream",
"cpe:/a:redhat:rhel_tus:8.6::appstream"
] | null | 7.4 | null | null |
RHSA-2023:2802 | Red Hat Security Advisory: container-tools:4.0 security and bug fix update | golang: net/http: improper sanitization of Transfer-Encoding header golang: go/parser: stack exhaustion in all Parse* functions podman: possible information disclosure and modification golang: net/http: handle server errors after sending GOAWAY golang: encoding/xml: stack exhaustion in Decoder.Skip golang: io/fs: stack exhaustion in Glob golang: compress/gzip: stack exhaustion in Reader.Read golang: path/filepath: stack exhaustion in Glob golang: encoding/xml: stack exhaustion in Unmarshal golang: encoding/gob: stack exhaustion in Decoder.Decode golang: net/http/httputil: NewSingleHostReverseProxy - omit X-Forwarded-For not working golang: math/big: decoding big.Float and big.Rat types can panic if the encoded message is too short, potentially allowing a denial of service golang: net/http: excessive memory growth in a Go server accepting HTTP/2 requests podman: symlink exchange attack in podman export volume | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 6.8 | null | null |
RHSA-2022:0951 | Red Hat Security Advisory: expat security update | expat: Large number of prefixed XML attributes on a single tag can crash libexpat expat: Integer overflow in doProlog in xmlparse.c expat: Integer overflow in addBinding in xmlparse.c expat: Integer overflow in build_model in xmlparse.c expat: Integer overflow in defineAttribute in xmlparse.c expat: Integer overflow in lookup in xmlparse.c expat: Integer overflow in nextScaffoldPart in xmlparse.c expat: Integer overflow in storeAtts in xmlparse.c expat: Integer overflow in function XML_GetBuffer expat: Malformed 2- and 3-byte UTF-8 sequences can lead to arbitrary code execution expat: Namespace-separator characters in "xmlns[:prefix]" attribute values can lead to arbitrary code execution expat: Integer overflow in storeRawNames() | [
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 9.8 | null | null |
RHSA-2016:0072 | Red Hat Security Advisory: chromium-browser security update | chromium-browser: Multiple unspecified vulnerabilities in HarfBuzz before 1.0.6 chromium-browser: bad cast in V8 chromium-browser: use-after-free in PDFium chromium-browser: information leak in Blink chromium-browser: origin confusion in Omnibox chromium-browser: various fixes from internal audits chromium-browser: various fixes from internal audits chromium-browser: weak random number generator in Blink chromium-browser: out-of-bounds read in PDFium chromium-browser: various fixes from internal audits chromium-browser: Multiple unspecified vulnerabilities in Google V8 before 4.8.271.17 chromium-browser: Multiple unspecified vulnerabilities in HarfBuzz before 1.0.6 | [
"cpe:/a:redhat:rhel_extras:6"
] | null | null | null | null |
RHSA-2018:1204 | Red Hat Security Advisory: java-1.8.0-oracle security update | OpenJDK: incorrect merging of sections in the JAR manifest (Security, 8189969) OpenJDK: unrestricted deserialization of data from JCEKS key stores (Security, 8189997) OpenJDK: insufficient consistency checks in deserialization of multiple classes (Security, 8189977) OpenJDK: unbounded memory allocation during deserialization in PriorityBlockingQueue (Concurrency, 8189981) OpenJDK: unbounded memory allocation during deserialization in TabularDataSupport (JMX, 8189985) OpenJDK: unbounded memory allocation during deserialization in Container (AWT, 8189989) OpenJDK: unbounded memory allocation during deserialization in NamedNodeMapImpl (JAXP, 8189993) OpenJDK: RMI HTTP transport enabled by default (RMI, 8193833) JDK: unspecified vulnerability fixed in 8u171 and 10.0.1 (Install) OpenJDK: incorrect handling of Reference clones can lead to sandbox bypass (Hotspot, 8192025) OpenJDK: unbounded memory allocation during deserialization in StubIORImpl (Serialization, 8192757) | [
"cpe:/a:redhat:rhel_extras_oracle_java:7"
] | null | null | 5.3 | null |
RHSA-2019:1594 | Red Hat Security Advisory: redhat-virtualization-host security update | Kernel: tcp: integer overflow while processing SACK blocks allows remote denial of service Kernel: tcp: excessive resource consumption while processing SACK blocks allows remote denial of service kernel: tcp: excessive resource consumption for TCP connections with low MSS allows remote denial of service | [
"cpe:/o:redhat:enterprise_linux:7::hypervisor"
] | null | null | 5.3 | null |
RHSA-2022:0187 | Red Hat Security Advisory: kernel-rt security and bug fix update | kernel: local privilege escalation by exploiting the fsconfig syscall parameter leads to container breakout kernel: xfs: raw block device data leak in XFS_IOC_ALLOCSP IOCTL kernel: fs_context: heap overflow in legacy parameter handling | [
"cpe:/a:redhat:rhel_eus:8.4::nfv",
"cpe:/a:redhat:rhel_eus:8.4::realtime"
] | null | 7.8 | null | null |
RHSA-2007:0729 | Red Hat Security Advisory: kdegraphics security update | xpdf integer overflow | [
"cpe:/a:redhat:rhel_productivity:5",
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws",
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation"
] | null | null | null | null |
RHSA-2020:0464 | Red Hat Security Advisory: 389-ds:1.4 security update | 389-ds-base: Read permission check bypass via the deref plugin | [
"cpe:/a:redhat:rhel_e4s:8.0::appstream"
] | null | null | 6.5 | null |
RHSA-2007:0892 | Red Hat Security Advisory: krb5 security update | krb5 incomplete fix for CVE-2007-3999 | [
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHEA-2021:5066 | Red Hat Enhancement Advisory: MTV 2.2.0 Images | nodejs-axios: Regular expression denial of service in trim function moby: `docker cp` allows unexpected chmod of host file | [
"cpe:/a:redhat:migration_toolkit_virtualization:2.2::el8"
] | null | 5.3 | null | null |
RHSA-2015:1739 | Red Hat Security Advisory: qemu-kvm-rhev security update | Qemu: rtl8139 uninitialized heap memory information leakage to guest (XSA-140) | [
"cpe:/o:redhat:enterprise_linux:7::hypervisor"
] | null | null | null | null |
RHSA-2021:2065 | Red Hat Security Advisory: Red Hat Single Sign-On 7.4.7 security update on RHEL 8 | keycloak: Internationalized domain name (IDN) homograph attack to impersonate users keycloak: Backchannel logout not working when Principal Type is set to Attribute Name for external SAML IDP | [
"cpe:/a:redhat:red_hat_single_sign_on:7::el8"
] | null | 7.1 | null | null |
RHSA-2015:1629 | Red Hat Security Advisory: mysql55-mysql security update | mysql: unspecified vulnerability related to Server:InnoDB:DML (CPU April 2015) mysql: unspecified vulnerability related to Server:Security:Encryption (CPU April 2015) mysql: unspecified vulnerability related to Server:Federated (CPU April 2015) mysql: unspecified vulnerability related to Server:Compiling (CPU April 2015) mysql: unspecified vulnerability related to Server:DDL (CPU April 2015) mysql: unspecified vulnerability related to Server:Security:Privileges (CPU April 2015) mysql: unspecified vulnerability related to Server:Optimizer (CPU April 2015) mysql: unspecified vulnerability related to Server:DDL (CPU April 2015) mysql: unspecified vulnerability related to Server:GIS (CPU July 2015) mysql: unspecified vulnerability related to Server:Security:Privileges (CPU July 2015) mysql: unspecified vulnerability related to Server:Optimizer (CPU July 2015) mysql: unspecified vulnerability related to Server:DML (CPU July 2015) mysql: unspecified vulnerability related to Server:Pluggable Auth (CPU July 2015) mysql: unspecified vulnerability related to Server:I_S (CPU July 2015) mysql: unspecified vulnerability related to Server:Optimizer (CPU July 2015) mysql: unspecified vulnerability related to Server:InnoDB (CPU October 2015) mysql: unspecified vulnerability related to Client programs (CPU October 2015) mysql: unspecified vulnerability related to Server:Security:Privileges (CPU October 2015) mysql: unspecified vulnerability related to Server:DML (CPU October 2015) | [
"cpe:/a:redhat:rhel_software_collections:2::el6",
"cpe:/a:redhat:rhel_software_collections:2::el7"
] | null | null | null | null |
RHSA-2011:0861 | Red Hat Security Advisory: subversion security update | (mod_dav_svn): DoS (crash) via request to deliver baselined WebDAV resources | [
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2021:2206 | Red Hat Security Advisory: firefox security update | Mozilla: Memory safety bugs fixed in Firefox 89 and Firefox ESR 78.11 | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 8.8 | null | null |
RHSA-2004:392 | Red Hat Security Advisory: php security update | security flaw security flaw | [
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws"
] | null | null | null | null |
RHBA-2011:0054 | Red Hat Bug Fix Advisory: samba3x bug fix and enhancement update | samba: mount.cifs improper device name and mountpoint strings sanitization samba: Race condition by mount (mount.cifs) operations | [
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2013:1213 | Red Hat Security Advisory: gdm security update | gdm: TOCTTOU race condition on /tmp/.X11-unix | [
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2016:0329 | Red Hat Security Advisory: openstack-swift security update | openstack-swift: Information leak via Swift tempurls openstack-swift: Client to proxy DoS through Large Objects openstack-swift: Proxy to server DoS through Large Objects | [
"cpe:/a:redhat:storage:3.1:server:el6"
] | null | null | null | null |
RHSA-2015:2517 | Red Hat Security Advisory: Red Hat Fuse Service Works 6.0.0 commons-collections security update | apache-commons-collections: InvokerTransformer code execution during deserialisation | [
"cpe:/a:redhat:jboss_fuse_service_works:6.0"
] | null | null | null | null |
RHSA-2020:5340 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.3.4 security update | hibernate-core: SQL injection vulnerability when both hibernate.use_sql_comments and JPQL String literals are used wildfly-openssl: memory leak per HTTP session creation in WildFly OpenSSL jackson-databind: FasterXML DOMDeserializer insecure entity expansion is vulnerable to XML external entity (XXE) | [
"cpe:/a:redhat:jboss_enterprise_application_platform:7.3::el6"
] | null | 7.5 | null | null |
RHSA-2020:0803 | Red Hat Security Advisory: OpenShift Container Platform 3.11 jenkins-slave-base-rhel7-container security update | openshift/jenkins: /etc/passwd is given incorrect privileges | [
"cpe:/a:redhat:openshift:3.11::el7"
] | null | 7 | null | null |
RHSA-2016:0624 | Red Hat Security Advisory: samba3x security update | samba: crash in dcesrv_auth_bind_ack due to missing error check samba: Man-in-the-middle attacks possible with NTLMSSP authentication samba: Spoofing vulnerability when domain controller is configured samba: Missing downgrade detection samba: Smb signing not required by default when smb client connection is used for ipc usage samba: SAMR and LSA man in the middle attacks | [
"cpe:/o:redhat:rhel_aus:5.9",
"cpe:/o:redhat:rhel_mission_critical:5.6"
] | null | null | null | null |
RHSA-2024:6734 | Red Hat Security Advisory: Red Hat OpenShift for Windows Containers 7.2.2 product release [security update] | kubelet: Incorrect permissions on Windows containers logs | [
"cpe:/a:redhat:openshift:4.12::el8"
] | null | 6.1 | null | null |
RHSA-2023:0811 | Red Hat Security Advisory: firefox security update | Mozilla: Content security policy leak in violation reports using iframes Mozilla: Extensions could have opened external schemes without user knowledge Mozilla: Screen hijack via browser fullscreen mode Mozilla: Out of bounds memory write from EncodeInputStream Mozilla: Potential use-after-free from compartment mismatch in SpiderMonkey Mozilla: Invalid downcast in SVGUtils::SetupStrokeGeometry Mozilla: Use-after-free in mozilla::dom::ScriptLoadContext::~ScriptLoadContext Mozilla: Web Crypto ImportKey crashes tab Mozilla: Fullscreen notification not shown in Firefox Focus Mozilla: Memory safety bugs fixed in Firefox 110 and Firefox ESR 102.8 Mozilla: Memory safety bugs fixed in Firefox ESR 102.8 | [
"cpe:/a:redhat:rhel_aus:8.2::appstream",
"cpe:/a:redhat:rhel_e4s:8.2::appstream",
"cpe:/a:redhat:rhel_tus:8.2::appstream"
] | null | 8.8 | null | null |
RHSA-2010:0400 | Red Hat Security Advisory: tetex security update | xpdf: Multiple buffer overflows in JBIG2 decoder (setBitmap, readSymbolDictSeg) (CVE-2009-0195) xpdf: Multiple integer overflows in JBIG2 decoder xpdf: Freeing of potentially uninitialized memory in JBIG2 decoder xpdf: Multiple buffer overflows in JBIG2 decoder (setBitmap, readSymbolDictSeg) (CVE-2009-0195) xpdf: multiple integer overflows PDF JBIG2 decoder OOB read PDF JBIG2 multiple input validation flaws PDF JBIG2 integer overflow PDF JBIG2 invalid free() PDF JBIG2 NULL dereference PDF JBIG2 MMR decoder buffer overflows PDF JBIG2 MMR infinite loop DoS xpdf/poppler: integer overflow in ObjectStream::ObjectStream (oCERT-2009-016) xpdf/poppler: ImageStream:: ImageStream integer overflow texlive: Integer overflow by processing special commands dvipng: Multiple array index errors during DVI-to-PNG translation texlive: Integer overflow by processing special commands | [
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2023:1151 | Red Hat Security Advisory: Satellite 6.11.5 Async Security Update | activerecord: Possible RCE escalation bug with Serialized Columns in Active Record jackson-databind: deep wrapper array nesting wrt UNWRAP_SINGLE_VALUE_ARRAYS | [
"cpe:/a:redhat:satellite:6.11::el7",
"cpe:/a:redhat:satellite:6.11::el8",
"cpe:/a:redhat:satellite_capsule:6.11::el7",
"cpe:/a:redhat:satellite_capsule:6.11::el8",
"cpe:/a:redhat:satellite_maintenance:6.11::el7",
"cpe:/a:redhat:satellite_maintenance:6.11::el8",
"cpe:/a:redhat:satellite_utils:6.11::el7",
"cpe:/a:redhat:satellite_utils:6.11::el8"
] | null | 7.5 | null | null |
RHSA-2015:1718 | Red Hat Security Advisory: qemu-kvm-rhev security update | Qemu: rtl8139 uninitialized heap memory information leakage to guest (XSA-140) | [
"cpe:/a:redhat:openstack:7::el7"
] | null | null | null | null |
RHSA-2013:1041 | Red Hat Security Advisory: Red Hat JBoss Web Framework Kit 2.3.0 update | RichFaces: Remote code execution due to insecure deserialization | [
"cpe:/a:redhat:jboss_enterprise_web_framework:2.3.0"
] | null | null | null | null |
RHSA-2011:1100 | Red Hat Security Advisory: icedtea-web security update | icedtea-web: home directory path disclosure to untrusted applications icedtea-web: Java Web Start security warning dialog manipulation | [
"cpe:/o:redhat:enterprise_linux:6::server"
] | null | null | null | null |
RHSA-2019:2837 | Red Hat Security Advisory: kernel security and bug fix update | Kernel: page cache side channel attacks kernel: a NULL pointer dereference in drivers/scsi/megaraid/megaraid_sas_base.c leading to DoS | [
"cpe:/o:redhat:enterprise_linux:7::hypervisor",
"cpe:/o:redhat:rhel_eus:7.6::computenode",
"cpe:/o:redhat:rhel_eus:7.6::server"
] | null | null | 6.2 | null |
RHSA-2016:0049 | Red Hat Security Advisory: java-1.8.0-openjdk security update | TLS 1.2 Transcipt Collision attacks against MD5 in key exchange protocol (SLOTH) OpenJDK: URL deserialization inconsistencies (Networking, 8059054) OpenJDK: logging of RMI connection secrets (JMX, 8130710) OpenJDK: insufficient enforcement of totalEntitySizeLimit (JAXP, 8133962) OpenJDK: PBE incorrect key lengths (Libraries, 8138589) OpenJDK: incorrect boundary check in JPEG decoder (AWT, 8139017) ICU: integer signedness issue in IndicRearrangementProcessor (OpenJDK 2D, 8140543) | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | null | null |
RHSA-2023:6944 | Red Hat Security Advisory: protobuf-c security update | protobuf-c: unsigned integer overflow in parse_required_member | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 6.2 | null | null |
RHSA-2024:4671 | Red Hat Security Advisory: thunderbird security update | Mozilla: Race condition in permission assignment Mozilla: Memory corruption in NSS Mozilla: Memory corruption in thread creation Mozilla: Memory safety bugs fixed in Firefox 128, Firefox ESR 115.13, and Thunderbird 115.13 | [
"cpe:/a:redhat:rhel_aus:8.4::appstream",
"cpe:/a:redhat:rhel_e4s:8.4::appstream",
"cpe:/a:redhat:rhel_tus:8.4::appstream"
] | null | 7.5 | null | null |
RHSA-2024:1697 | Red Hat Security Advisory: Errata Advisory for Red Hat OpenShift GitOps v1.11.3 security update | CD: Users with `create` but not `override` privileges can perform local sync argo-cd: Bypassing Brute Force Protection via Application Crash and In-Memory Data Loss argo-cd: Denial of Service Due to Unsafe Array Modification in Multi-threaded Environment argo-cd: Bypassing Rate Limit and Brute Force Protection Using Cache Overflow argo-cd: uncontrolled memory allocation vulnerability | [
"cpe:/a:redhat:openshift_gitops:1.11::el8"
] | null | 6.5 | null | null |
RHSA-2024:1426 | Red Hat Security Advisory: postgresql security update | postgresql: non-owner 'REFRESH MATERIALIZED VIEW CONCURRENTLY' executes arbitrary SQL | [
"cpe:/a:redhat:rhel_eus:8.8::appstream"
] | null | 8 | null | null |
RHSA-2022:4587 | Red Hat Security Advisory: pcs security update | sinatra: path traversal possible outside of public_dir when serving static files | [
"cpe:/a:redhat:enterprise_linux:9::highavailability",
"cpe:/a:redhat:enterprise_linux:9::resilientstorage"
] | null | 7.5 | null | null |
RHSA-2014:0133 | Red Hat Security Advisory: thunderbird security update | Mozilla: Miscellaneous memory safety hazards (rv:24.3) (MFSA 2014-01) Mozilla: Clone protected content with XBL scopes (MFSA 2014-02) Mozilla: Inconsistent JavaScript handling of access to Window objects (MFSA 2014-13) Mozilla: Incorrect use of discarded images by RasterImage (MFSA 2014-04) Mozilla: Use-after-free with imgRequestProxy and image proccessing (MFSA 2014-08) Mozilla: Cross-origin information leak through web workers (MFSA 2014-09) | [
"cpe:/a:redhat:rhel_productivity:5",
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2012:1125 | Red Hat Security Advisory: JBoss Enterprise SOA Platform 5.3.0 update | OpenSSO: unspecified vulnerability in the authentication component OpenSSO: unspecified vulnerability in the authentication component JNDI: unauthenticated remote write access is permitted by default jruby: hash table collisions DoS (oCERT-2011-003) RESTEasy: XML eXternal Entity (XXE) flaw OpenSSO: Unspecified vulnerability allows remote attackers to affect integrity via unknown vectors RESTEasy: XML eXternal Entity (XXE) flaw JBoss: authentication bypass when running under JACC with ignoreBaseDecision on JBossWebRealm JGroups diagnostics service enabled by default with no authentication when a JGroups channel is started | [
"cpe:/a:redhat:jboss_soa_platform:5.3"
] | null | null | null | null |
RHSA-2021:1006 | Red Hat Security Advisory: OpenShift Container Platform 4.7.5 security and bug fix update | golang: crypto/elliptic: incorrect operations on the P-224 curve gogo/protobuf: plugin/unmarshal/unmarshal.go lacks certain index validation fabric8-kubernetes-client: vulnerable to a path traversal leading to integrity and availability compromise | [
"cpe:/a:redhat:openshift:4.7::el7",
"cpe:/a:redhat:openshift:4.7::el8"
] | null | 7.4 | null | null |
RHSA-2022:1354 | Red Hat Security Advisory: rh-dotnet31-curl security update | curl: Leak of authentication credentials in URL via automatic Referer curl: Bad connection reuse due to flawed path name checks curl: Requirement to use TLS not properly enforced for IMAP, POP3, and FTP protocols curl: Server responses received before STARTTLS processed after TLS handshake | [
"cpe:/a:redhat:rhel_dotnet:3.1::el7"
] | null | 6.1 | null | null |
RHSA-2013:1172 | Red Hat Security Advisory: condor security update | condor: condor_startd DoS when parsing policy definition that evaluates to ERROR or UNDEFINED | [
"cpe:/a:redhat:enterprise_mrg:2:computenode:el6",
"cpe:/a:redhat:enterprise_mrg:2:server:el6"
] | null | null | null | null |
RHSA-2024:2988 | Red Hat Security Advisory: container-tools:rhel8 security update | urllib3: urllib3 does not remove the authorization HTTP header when following a cross-origin redirect golang: math/big.Rat: may cause a panic or an unrecoverable fatal error if passed inputs with very large exponents golang: crypto/tls: certificate of wrong type is causing TLS client to panic golang: archive/tar: github.com/vbatts/tar-split: unbounded memory consumption when reading headers golang: net/http/httputil: ReverseProxy should not forward unparseable query parameters golang: regexp/syntax: limit memory used by parsing regexps golang: crypto/tls: slow verification of certificate chains containing large RSA keys golang: html/template: improper handling of HTML-like comments within script contexts golang: html/template: improper handling of special tags within script contexts golang: crypto/tls: panic when processing post-handshake message on QUIC connections golang: crypto/tls: lack of a limit on buffered post-handshake golang: net/http/internal: Denial of Service (DoS) via Resource Consumption via HTTP requests golang: crypto/tls: Timing Side Channel attack in RSA based TLS key exchanges. urllib3: Request body not stripped after redirect from 303 status changes request method to GET ssh: Prefix truncation attack on Binary Packet Protocol (BPP) moby/buildkit: Possible race condition with accessing subpaths from cache mounts | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 5.3 | null | null |
RHSA-2025:3612 | Red Hat Security Advisory: libxslt security update | libxslt: Use-After-Free in libxslt (xsltGetInheritedNsList) libxslt: Use-After-Free in libxslt numbers.c | [
"cpe:/o:redhat:rhel_els:7"
] | null | 7.8 | null | null |
RHSA-2022:4999 | Red Hat Security Advisory: OpenShift Container Platform 3.11.715 packages and security update | cri-o: memory exhaustion on the node when access to the kube api | [
"cpe:/a:redhat:openshift:3.11::el7"
] | null | 6.8 | null | null |
RHSA-2010:0361 | Red Hat Security Advisory: sudo security update | sudo: incomplete fix for the sudoedit privilege escalation issue CVE-2010-0426 | [
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2021:1852 | Red Hat Security Advisory: ghostscript security, bug fix, and enhancement update | ghostscript: use-after-free vulnerability in igc_reloc_struct_ptr() could result in DoS ghostscript: buffer overflow in lprn_is_black() in contrib/lips4/gdevlprn.c could result in a DoS ghostscript: buffer overflow in pj_common_print_page() in devices/gdevpjet.c could result in a DoS ghostscript: buffer overflow in cif_print_page() in devices/gdevcif.c could result in a DoS ghostscript: buffer overflow in jetp3852_print_page() in devices/gdev3852.c could result in a DoS ghostscript: buffer overflow in contrib/gdevdj9.c could result in a DoS ghostscript: buffer overflow in mj_raster_cmd() in contrib/japanese/gdevmjc.c could result in a DoS ghostscript: NULL pointer dereference in compose_group_nonknockout_nonblend_isolated_allmask_common() in base/gxblend.c could result in a DoS ghostscript: buffer overflow in epsc_print_page() in devices/gdevepsc.c could result in a DoS ghostscript: NULL pointer dereference in clj_media_size() in devices/gdevclj.c could result in a DoS ghostscript: buffer overflow in GetNumWrongData() in contrib/lips4/gdevlips.c could result in a DoS ghostscript: buffer overflow in FloydSteinbergDitheringC() in contrib/gdevbjca.c could result in a DoS ghostscript: buffer overflow in mj_color_correct() in contrib/japanese/gdevmjc.c could result in a DoS ghostscript: division by zero in bj10v_print_page() in contrib/japanese/gdev10v.c could result in a DoS ghostscript: buffer overflow in tiff12_print_page() in devices/gdevtfnx.c could result in a DoS ghostscript: buffer overflow in okiibm_print_page1() in devices/gdevokii.c could result in a DoS ghostscript: buffer overflow in jetp3852_print_page() in devices/gdev3852.c could result in a privilege escalation ghostscript: use-after-free in xps_finish_image_path() in devices/vector/gdevxps.c could result in a privilege escalation ghostscript: buffer overflow in image_render_color_thresh() in base/gxicolor.c could result in a DoS ghostscript: buffer overflow in pcx_write_rle() in contrib/japanese/gdev10v.c could result in a DoS ghostscript: NULL pointer dereference in devices/gdevtsep.c could result in a DoS ghostscript: NULL pointer dereference in devices/vector/gdevtxtw.c and psi/zbfont.c could result in a DoS ghostscript: buffer overflow in p_print_image() in devices/gdevcdj.c could result in a DoS ghostscript: buffer overflow in lxm5700m_print_page() in devices/gdevlxm.c could result in a DoS ghostscript: division by zero in dot24_print_page() in devices/gdevdm24.c could result in a DoS ghostscript: buffer overflow in GetNumSameData() in contrib/lips4/gdevlips.c could result in a DoS | [
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb"
] | null | 5.5 | null | null |
RHSA-2007:0730 | Red Hat Security Advisory: gpdf security update | xpdf integer overflow | [
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2024:1328 | Red Hat Security Advisory: Red Hat Advanced Cluster Management 2.9.3 security and bug fix container updates | opentelemetry: DoS vulnerability in otelhttp opentelemetry-go-contrib: DoS vulnerability in otelgrpc due to unbound cardinality metrics helm: Dependency management path traversal helm: Missing YAML Content Leads To Panic | [
"cpe:/a:redhat:acm:2.9::el8"
] | null | 7.5 | null | null |
RHSA-2011:1526 | Red Hat Security Advisory: glibc security, bug fix, and enhancement update | glibc: ldd unexpected code execution issue glibc: Suid mount helpers fail to anticipate RLIMIT_FSIZE | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2021:2692 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.3.8 on RHEL 6 security update | wildfly: XSS via admin console when creating roles in domain mode netty: Request smuggling via content-length header | [
"cpe:/a:redhat:jboss_enterprise_application_platform:7.3::el6"
] | null | 5.9 | null | null |
RHSA-2007:1063 | Red Hat Security Advisory: pcre security update | pcre integer overflow pcre regular expression flaws | [
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws"
] | null | null | null | null |
RHSA-2024:10942 | Red Hat Security Advisory: kernel:5.14.0 security update | kernel: nouveau: lock the client object tree. kernel: filelock: fix potential use-after-free in posix_lock_inode kernel: powerpc/eeh: avoid possible crash when edev->pdev changes kernel: scsi: qedf: Make qedf_execute_tmf() non-preemptible kernel: bpf: Fix use-after-free in bpf_uprobe_multi_link_attach() kernel: bpf: Fix a sdiv overflow issue kernel: bpf: Fix out-of-bounds write in trie_get_next_key() | [
"cpe:/a:redhat:rhel_eus:9.4::appstream",
"cpe:/a:redhat:rhel_eus:9.4::crb",
"cpe:/a:redhat:rhel_eus:9.4::nfv",
"cpe:/a:redhat:rhel_eus:9.4::realtime",
"cpe:/o:redhat:rhel_eus:9.4::baseos"
] | null | 6.7 | null | null |
RHSA-2024:3401 | Red Hat Security Advisory: rpm-ostree security update | rpm-ostree: world-readable /etc/shadow file | [
"cpe:/a:redhat:rhel_eus:9.2::appstream"
] | null | 6.2 | null | null |
RHSA-2016:0008 | Red Hat Security Advisory: openssl security update | TLS 1.2 Transcipt Collision attacks against MD5 in key exchange protocol (SLOTH) | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation",
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | null | null |
RHSA-2023:0691 | Red Hat Security Advisory: openvswitch2.17 security, bug fix and enhancement update | openvswitch: Out-of-Bounds Read in Organization Specific TLV openvswitch: Integer Underflow in Organization Specific TLV | [
"cpe:/o:redhat:enterprise_linux:9::fastdatapath"
] | null | 9.8 | null | null |
RHSA-2023:4421 | Red Hat Security Advisory: OpenShift Virtualization 4.12.5 security and bug fix update | golang.org/x/net/http2: avoid quadratic complexity in HPACK decoding openshift: OCP & FIPS mode golang: html/template: improper handling of JavaScript whitespace | [
"cpe:/a:redhat:container_native_virtualization:4.12::el8"
] | null | 8.1 | null | null |
RHSA-2021:2992 | Red Hat Security Advisory: rh-php73-php security, bug fix, and enhancement update | php: Use of freed hash key in the phar_parse_zipfile function php: Wrong ciphertext/tag in AES-CCM encryption for a 12 bytes IV php: URL decoding of cookie names can lead to different interpretation of cookies between browser and server php: FILTER_VALIDATE_URL accepts URLs with invalid userinfo php: NULL pointer dereference in SoapClient php: SSRF bypass in FILTER_VALIDATE_URL | [
"cpe:/a:redhat:rhel_software_collections:3::el7"
] | null | 5.3 | null | null |
RHSA-2023:2085 | Red Hat Security Advisory: libwebp security update | Mozilla: libwebp: Double-free in libwebp | [
"cpe:/a:redhat:rhel_eus:8.6::appstream"
] | null | 7.5 | null | null |
RHSA-2021:4033 | Red Hat Security Advisory: binutils security update | environment: Unicode's bidirectional (BiDi) override characters can cause trojan source attacks | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 8.5 | null | null |
RHSA-2016:1994 | Red Hat Security Advisory: Red Hat OpenShift Enterprise 2.x - 3 Month End Of Life Notice | This is the 3 Month notification for the End of Production Phase 1 of Red
Hat OpenShift Enterprise 2.x (2.0, 2.1 and 2.2). | [
"cpe:/a:redhat:openshift:2.0::enterprise"
] | null | null | null | null |
RHSA-2020:5149 | Red Hat Security Advisory: Release of OpenShift Serverless 1.11.0 | golang.org/x/text: possibility to trigger an infinite loop in encoding/unicode could lead to crash | [
"cpe:/a:redhat:serverless:1.11::el8"
] | null | 7.5 | null | null |
RHSA-2025:3684 | Red Hat Security Advisory: tomcat security update | tomcat: RCE due to TOCTOU issue in JSP compilation tomcat: Potential RCE and/or information disclosure and/or information corruption with partial PUT | [
"cpe:/a:redhat:rhel_eus:8.8::appstream"
] | null | 8.6 | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.