id
stringlengths 13
15
| title
stringlengths 29
176
| description
stringlengths 8
32.1k
| cpes
sequencelengths 0
20
| cvss_v4_0
null | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
null |
---|---|---|---|---|---|---|---|
RHSA-2022:6551 | Red Hat Security Advisory: Red Hat Virtualization security update | kernel: Small table perturb size in the TCP source port generation algorithm can lead to information leak dpdk: DoS when a Vhost header crosses more than two descriptors and exhausts all mbufs systemd-resolved: use-after-free when dealing with DnsStream in resolved-dns-stream.c kernel: a use-after-free in cls_route filter implementation may lead to privilege escalation rsync: remote arbitrary files write inside the directories of connecting peers kernel: a use-after-free write in the netfilter subsystem can lead to privilege escalation to root | [
"cpe:/o:redhat:rhev_hypervisor:4.4::el8"
] | null | 7.8 | null | null |
RHSA-2022:8453 | Red Hat Security Advisory: device-mapper-multipath security update | device-mapper-multipath: Regression of CVE-2022-41974 fix in Red Hat Enterprise Linux | [
"cpe:/a:redhat:enterprise_linux:9::crb",
"cpe:/o:redhat:enterprise_linux:9::baseos"
] | null | 8.4 | null | null |
RHSA-2020:0046 | Red Hat Security Advisory: java-1.8.0-ibm security update | OpenJDK: Missing restrictions on use of custom SocketImpl (Networking, 8218573) OpenJDK: NULL pointer dereference in DrawGlyphList (2D, 8222690) OpenJDK: Unexpected exception thrown by Pattern processing crafted regular expression (Concurrency, 8222684) OpenJDK: Unexpected exception thrown by XPathParser processing crafted XPath expression (JAXP, 8223505) OpenJDK: Unexpected exception thrown during regular expression processing in Nashorn (Scripting, 8223518) OpenJDK: Incorrect handling of nested jar: URLs in Jar URL handler (Networking, 8223892) OpenJDK: Unexpected exception thrown by XPath processing crafted XPath expression (JAXP, 8224532) OpenJDK: Unexpected exception thrown during Font object deserialization (Serialization, 8224915) OpenJDK: Integer overflow in bounds check in SunGraphics2D (2D, 8225292) OpenJDK: Incorrect handling of HTTP proxy responses in HttpURLConnection (Networking, 8225298) OpenJDK: Excessive memory allocation in CMap when reading TrueType font (2D, 8225597) JDK: unspecified vulnerability fixed in 8u221 (Deployment) OpenJDK: Insufficient filtering of HTML event attributes in Javadoc (Javadoc, 8226765) JDK: Unrestricted access to diagnostic operations | [
"cpe:/a:redhat:enterprise_linux:8::supplementary"
] | null | null | 8.4 | null |
RHSA-2018:1459 | Red Hat Security Advisory: dhcp security update | dhcp: Command injection vulnerability in the DHCP client NetworkManager integration script | [
"cpe:/o:redhat:rhel_aus:6.6::server",
"cpe:/o:redhat:rhel_tus:6.6::server"
] | null | null | 7.5 | null |
RHSA-2014:0876 | Red Hat Security Advisory: ruby193-rubygem-activerecord security update | rubygem-activerecord: SQL injection vulnerability in 'bitstring' quoting | [
"cpe:/a:redhat:rhel_software_collections:1::el6",
"cpe:/a:redhat:rhel_software_collections:1::el7"
] | null | null | null | null |
RHSA-2024:10803 | Red Hat Security Advisory: bzip2 security update | bzip2: bzip2: Data integrity error when decompressing (with data integrity tests fail). | [
"cpe:/a:redhat:rhel_eus:9.4::appstream",
"cpe:/o:redhat:rhel_eus:9.4::baseos"
] | null | 4.4 | null | null |
RHSA-2024:6687 | Red Hat Security Advisory: OpenShift Container Platform 4.16.13 bug fix and security update | openshift/builder: Path traversal allows command injection in privileged BuildContainer using docker build strategy jose-go: improper handling of highly compressed data openshift-controller-manager: Elevated Build Pods Can Lead to Node Compromise in OpenShift | [
"cpe:/a:redhat:openshift:4.16::el9"
] | null | 9.9 | null | null |
RHSA-2018:3648 | Red Hat Security Advisory: chromium-browser security update | chromium-browser: Out of bounds memory access in V8 chromium-browser: Use-after-free in GPU | [
"cpe:/a:redhat:rhel_extras:6"
] | null | null | 8.8 | null |
RHSA-2022:6164 | Red Hat Security Advisory: thunderbird security update | Mozilla: Address bar spoofing via XSLT error handling Mozilla: Cross-origin XSLT Documents would have inherited the parent's permissions Mozilla: Data race and potential use-after-free in PK11_ChangePW Mozilla: Memory safety bugs fixed in Firefox 104 and Firefox ESR 102.2 Mozilla: Memory safety bugs fixed in Firefox 104, Firefox ESR 102.2, and Firefox ESR 91.13 | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 8.8 | 7.5 | null |
RHSA-2024:2003 | Red Hat Security Advisory: kernel-rt security update | kernel: race condition in VT_RESIZEX ioctl when vc_cons[i].d is already NULL leading to NULL pointer dereference Kernel: bluetooth: Unauthorized management command execution kernel: use after free in unix_stream_sendpage kernel: net/sched: sch_hfsc UAF kernel: irdma: Improper access control | [
"cpe:/a:redhat:rhel_extras_rt:7"
] | null | 5.6 | null | null |
RHSA-2024:8077 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.4.19 Security update | OpenJDK: integer truncation issue in Xalan-J (JAXP, 8285407) jsoup: The jsoup cleaner may incorrectly sanitize crafted XSS attempts if SafeList.preserveRelativeLinks is enabled jose4j: denial of service via specially crafted JWE wildfly: No timeout for EAP management interface may lead to Denial of Service (DoS) braces: fails to limit the number of characters it can handle | [
"cpe:/a:redhat:jboss_enterprise_application_platform:7.4::el9"
] | null | 7.5 | null | null |
RHSA-2020:1511 | Red Hat Security Advisory: git security update | git: Crafted URL containing new lines can cause credential leak | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 7.5 | null | null |
RHSA-2016:1270 | Red Hat Security Advisory: python-django-horizon security update | python-django-horizon: XSS in client side template | [
"cpe:/a:redhat:openstack:8::el7"
] | null | null | null | null |
RHSA-2023:3277 | Red Hat Security Advisory: kernel security update | kernel: use-after-free caused by l2cap_reassemble_sdu() in net/bluetooth/l2cap_core.c | [
"cpe:/o:redhat:rhel_aus:7.7::server",
"cpe:/o:redhat:rhel_e4s:7.7::server",
"cpe:/o:redhat:rhel_tus:7.7::server"
] | null | 7.1 | null | null |
RHSA-2020:2516 | Red Hat Security Advisory: libexif security update | libexif: several buffer over-reads in EXIF MakerNote handling can lead to information disclosure and DoS | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | 9.1 | null | null |
RHSA-2015:1196 | Red Hat Security Advisory: rh-postgresql94-postgresql security update | postgresql: double-free after authentication timeout postgresql: unanticipated errors from the standard library postgresql: pgcrypto has multiple error messages for decryption with an incorrect key. | [
"cpe:/a:redhat:rhel_software_collections:2::el6",
"cpe:/a:redhat:rhel_software_collections:2::el7"
] | null | null | null | null |
RHSA-2017:0530 | Red Hat Security Advisory: rabbitmq-server security and bug fix update | rabbitmq-server: DoS via lengths_age or lengths_incr parameter in the management plugin | [
"cpe:/a:redhat:openstack:7::el7"
] | null | null | 6.5 | null |
RHSA-2019:2730 | Red Hat Security Advisory: kernel-rt security and bug fix update | kernel: Memory corruption due to incorrect socket cloning kernel: Missing check in fs/inode.c:inode_init_owner() does not clear SGID bit on non-directories for non-members kernel: nfs: NULL pointer dereference due to an anomalized NFS message sequence kernel: nfs: use-after-free in svc_process_common() kernel: hw: Spectre SWAPGS gadget vulnerability | [
"cpe:/a:redhat:enterprise_mrg:2:server:el6"
] | null | null | 5.9 | null |
RHSA-2019:3600 | Red Hat Security Advisory: gnutls security, bug fix, and enhancement update | gnutls: use-after-free/double-free in certificate verification gnutls: invalid pointer access upon receiving async handshake messages | [
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | null | 5.9 | null |
RHSA-2009:1203 | Red Hat Security Advisory: subversion security update | subversion: multiple heap overflow issues | [
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2024:0614 | Red Hat Security Advisory: tigervnc security update | xorg-x11-server: Heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer xorg-x11-server: reattaching to different master device may lead to out-of-bounds memory access xorg-x11-server: heap buffer overflow in XISendDeviceHierarchyEvent xorg-x11-server: heap buffer overflow in DisableDevice | [
"cpe:/a:redhat:rhel_eus:9.0::appstream"
] | null | 7.8 | null | null |
RHSA-2022:7007 | Red Hat Security Advisory: java-1.8.0-openjdk security update | OpenJDK: improper handling of long NTLM client hostnames (Security, 8286526) OpenJDK: insufficient randomization of JNDI DNS port numbers (JNDI, 8286910) OpenJDK: excessive memory allocation in X.509 certificate parsing (Security, 8286533) OpenJDK: HttpServer no connection count limit (Lightweight HTTP Server, 8286918) | [
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::crb"
] | null | 5.3 | null | null |
RHSA-2024:9333 | Red Hat Security Advisory: openssl and openssl-fips-provider security update | openssl: Unbounded memory growth with session handling in TLSv1.3 openssl: Excessive time spent checking DSA keys and parameters openssl: Use After Free with SSL_free_buffers openssl: SSL_select_next_proto buffer overread | [
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/o:redhat:enterprise_linux:9::baseos"
] | null | 5.6 | 5.9 | null |
RHSA-2014:1606 | Red Hat Security Advisory: file security and bug fix update | file: out of bounds read in CDF parser file: cdf_unpack_summary_info() excessive looping DoS file: CDF property info parsing nelements infinite loop file: unrestricted recursion in handling of indirect type rules file: out-of-bounds access in search rules with offsets from input file file: cdf_check_stream_offset insufficient boundary check file: cdf_count_chain insufficient boundary check | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2024:7441 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 8.0 security update | undertow: Improper State Management in Proxy Protocol parsing causes information leakage ion-java: ion-java: Ion Java StackOverflow vulnerability | [
"cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el8",
"cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el9"
] | null | 7.5 | null | null |
RHSA-2014:1801 | Red Hat Security Advisory: shim security update | shim: out-of-bounds memory read flaw in DHCPv6 packet processing shim: heap-based buffer overflow flaw in IPv6 address parsing shim: memory corruption flaw when processing Machine Owner Keys (MOKs) | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | null | null |
RHSA-2019:3699 | Red Hat Security Advisory: evolution security and bug fix update | evolution-ews: all certificate errors ignored if error is ignored during initial account setup in gnome-online-accounts | [
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb"
] | null | null | 8.1 | null |
RHSA-2021:2106 | Red Hat Security Advisory: kernel security and bug fix update | kernel: use after free in eventpoll.c may lead to escalation of privilege kernel: Integer overflow in Intel(R) Graphics Drivers kernel: SCSI target (LIO) write to any block on ILO backstore kernel: Use after free via PI futex state | [
"cpe:/a:redhat:rhel_eus:8.1::crb",
"cpe:/o:redhat:rhel_eus:8.1::baseos"
] | null | 7 | null | null |
RHSA-2024:6197 | Red Hat Security Advisory: ghostscript security update | ghostscript: format string injection leads to shell command execution (SAFER bypass) ghostscript: path traversal and command execution due to path reduction ghostscript: path traversal to arbitrary files if the current directory is in the permitted paths | [
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::crb"
] | null | 6.8 | null | null |
RHSA-2022:5903 | Red Hat Security Advisory: Red Hat Process Automation Manager 7.13.0 security update | mysql-connector-java: unauthorized access to critical wildfly-elytron: possible timing attack in ScramServer wildfly-core: Invalid Sensitivity Classification of Vault Expression wildfly: incorrect JBOSS_LOCAL_USER challenge location may lead to giving access to all the local users protobuf-java: potential DoS in the parsing procedure for binary data ant: excessive memory allocation when reading a specially crafted TAR archive netty-codec: Bzip2Decoder doesn't allow setting size restrictions for decompressed data netty-codec: SnappyFrameDecoder doesn't restrict chunk length and may buffer skippable chunks in an unnecessary way jsoup: Crafted input may cause the jsoup HTML and XML parser to get stuck netty: control chars in header names may lead to HTTP request smuggling spring-expression: Denial of service via specially crafted SpEL expression com.google.code.gson-gson: Deserialization of Untrusted Data in com.google.code.gson-gson | [
"cpe:/a:redhat:jboss_enterprise_bpms_platform:7.13"
] | null | 7.5 | null | null |
RHSA-2022:4835 | Red Hat Security Advisory: kernel-rt security and bug fix update | kernel: security regression for CVE-2018-13405 kernel: new DNS Cache Poisoning Attack based on ICMP fragment needed packets replies kernel: buffer overflow in IPsec ESP transformation code | [
"cpe:/a:redhat:rhel_eus:8.4::nfv",
"cpe:/a:redhat:rhel_eus:8.4::realtime"
] | null | 7.8 | null | null |
RHSA-2024:0749 | Red Hat Security Advisory: unbound security update | unbound: integer overflow in the regional allocator via the ALIGN_UP macro | [
"cpe:/a:redhat:rhel_eus:8.6::appstream"
] | null | 9.8 | null | null |
RHSA-2008:0157 | Red Hat Security Advisory: cups security update | cups: double free vulnerability in process_browse_data() | [
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2014:1060 | Red Hat Security Advisory: Transition Red Hat Network Classic Hosted to Red Hat Subscription Management | This is the 3-year notification of the target date to migrate systems from
Red Hat Network Classic Hosted to Red Hat Subscription Management. All
systems using Red Hat Network Classic Hosted must be migrated to Red Hat
Subscription Management. | [] | null | null | null | null |
RHSA-2009:1528 | Red Hat Security Advisory: samba security and bug fix update | samba: infinite loop flaw in smbd on unexpected oplock break notification reply | [
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws"
] | null | null | null | null |
RHSA-2021:3770 | Red Hat Security Advisory: grafana security update | grafana: Snapshot authentication bypass | [
"cpe:/a:redhat:rhel_eus:8.2::appstream"
] | null | 7.3 | null | null |
RHSA-2019:3204 | Red Hat Security Advisory: sudo security update | sudo: Privilege escalation via 'Runas' specification with 'ALL' keyword | [
"cpe:/o:redhat:rhel_eus:7.5::computenode",
"cpe:/o:redhat:rhel_eus:7.5::server"
] | null | null | 7 | null |
RHSA-2023:4499 | Red Hat Security Advisory: thunderbird security update | thunderbird: File Extension Spoofing using the Text Direction Override Character Mozilla: Offscreen Canvas could have bypassed cross-origin restrictions Mozilla: Incorrect value used during WASM compilation Mozilla: Potential permissions request bypass via clickjacking Mozilla: Crash in DOMParser due to out-of-memory conditions Mozilla: Fix potential race conditions when releasing platform objects Mozilla: Stack buffer overflow in StorageManager Mozilla: Cookie jar overflow caused unexpected cookie jar state Mozilla: Memory safety bugs fixed in Firefox 116, Firefox ESR 115.1, Firefox ESR 102.14, Thunderbird 115.1, and Thunderbird 102.14 Mozilla: Memory safety bugs fixed in Firefox ESR 115.1, and Thunderbird 115.1 | [
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 9.8 | null | null |
RHSA-2019:0735 | Red Hat Security Advisory: katello-installer-base security and enhancement update | katello-installer-base: QMF methods exposed to goferd via qdrouterd | [
"cpe:/a:redhat:satellite:6.4::el7",
"cpe:/a:redhat:satellite_capsule:6.4::el7"
] | null | null | 8 | null |
RHSA-2005:587 | Red Hat Security Advisory: mozilla security update | security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw | [
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2020:0861 | Red Hat Security Advisory: Red Hat JBoss Web Server 3.1 Service Pack 8 security update | tomcat: XSS in SSI printenv tomcat: local privilege escalation tomcat: Session fixation when using FORM authentication tomcat: Apache Tomcat AJP File Read/Inclusion Vulnerability | [
"cpe:/a:redhat:jboss_enterprise_web_server:3.1::el6",
"cpe:/a:redhat:jboss_enterprise_web_server:3.1::el7"
] | null | 7.6 | 5 | null |
RHSA-2025:3807 | Red Hat Security Advisory: RHTAS 1.1.2 - Red Hat Trusted Artifact Signer Release | next.js: next: authorization bypass in Next.js next.js: Next.js Vulnerable to Denial of Service (DoS) with Server Actions | [
"cpe:/a:redhat:trusted_artifact_signer:1.1::el9"
] | null | 5.3 | null | null |
RHSA-2025:3970 | Red Hat Security Advisory: openvswitch3.1 security update | dpdk: Denial Of Service from malicious guest on hypervisors using DPDK Vhost library | [
"cpe:/o:redhat:enterprise_linux:8::fastdatapath"
] | null | null | 7.4 | null |
RHSA-2008:0602 | Red Hat Security Advisory: redhat-ds-base and redhat-ds-admin security and bug fix update | Server: temporary DoS via crafted pattern searches Server: multiple memory leaks | [
"cpe:/a:redhat:directory_server:8::el4",
"cpe:/a:redhat:directory_server:8::el5"
] | null | null | null | null |
RHSA-2023:4164 | Red Hat Security Advisory: java-11-openjdk security and bug fix update | OpenJDK: HTTP client insufficient file name validation (8302475) OpenJDK: ZIP file parsing infinite loop (8302483) OpenJDK: weakness in AES implementation (8308682) OpenJDK: array indexing integer overflow issue (8304468) OpenJDK: improper handling of slash characters in URI-to-path conversion (8305312) harfbuzz: allows attackers to trigger O(n^2) growth via consecutive marks | [
"cpe:/a:redhat:rhel_eus:8.6::appstream",
"cpe:/a:redhat:rhel_eus:8.6::crb"
] | null | 7.5 | null | null |
RHSA-2024:0423 | Red Hat Security Advisory: samba security update | samba: GnuTLS gnutls_rnd() can fail and give predictable random values samba: out-of-bounds read in winbind AUTH_CRAP samba: infinite loop in mdssvc RPC service for spotlight samba: type confusion in mdssvc RPC service for spotlight samba: spotlight server-side share path disclosure | [
"cpe:/a:redhat:rhel_eus:8.6::appstream",
"cpe:/a:redhat:rhel_eus:8.6::crb",
"cpe:/o:redhat:rhel_eus:8.6::baseos",
"cpe:/o:redhat:rhev_hypervisor:4.4::el8"
] | null | 5.3 | null | null |
RHSA-2023:5730 | Red Hat Security Advisory: java-1.8.0-openjdk security update | OpenJDK: segmentation fault in ciMethodBlocks OpenJDK: IOR deserialization issue in CORBA (8303384) OpenJDK: certificate path validation issue during client authentication (8309966) | [
"cpe:/a:redhat:rhel_eus:8.6::appstream",
"cpe:/a:redhat:rhel_eus:8.6::crb"
] | null | 5.3 | null | null |
RHSA-2025:0903 | Red Hat Security Advisory: libsoup security update | libsoup: buffer overflow via UTF-8 conversion in soup_header_parse_param_list_strict | [
"cpe:/a:redhat:rhel_aus:8.2::appstream",
"cpe:/o:redhat:rhel_aus:8.2::baseos"
] | null | 9 | null | null |
RHSA-2013:0257 | Red Hat Security Advisory: JBoss Enterprise Application Platform 5.2.0 security update | apache-cxf: SOAPAction spoofing on document literal web services apache-cxf: Bypass of security constraints on WS endpoints when using WSS4JInInterceptor | [
"cpe:/a:redhat:jboss_enterprise_application_platform:5::el4",
"cpe:/a:redhat:jboss_enterprise_application_platform:5::el5",
"cpe:/a:redhat:jboss_enterprise_application_platform:5::el6"
] | null | null | null | null |
RHSA-2019:0590 | Red Hat Security Advisory: ansible security and bug fix update | Ansible: Information leak in "user" module ansible: Information disclosure in vvv+ mode with no_log on | [
"cpe:/a:redhat:openstack:14::el7"
] | null | 5.3 | 7.8 | null |
RHSA-2023:7713 | Red Hat Security Advisory: tracker-miners security update | tracker-miners: sandbox escape | [
"cpe:/a:redhat:rhel_eus:9.0::appstream"
] | null | 7.5 | null | null |
RHSA-2018:3754 | Red Hat Security Advisory: OpenShift Container Platform 3.3 security update | kubernetes: authentication/authorization bypass in the handling of non-101 responses | [
"cpe:/a:redhat:openshift:3.3::el7"
] | null | null | 8.8 | null |
RHSA-2023:1789 | Red Hat Security Advisory: firefox security update | Mozilla: Memory Corruption in Safe Browsing Code Mozilla: libwebp: Double-free in libwebp Mozilla: Fullscreen notification obscured Mozilla: Potential Memory Corruption following Garbage Collector compaction Mozilla: Invalid free from JavaScript code Mozilla: Content-Disposition filename truncation leads to Reflected File Download Mozilla: Files with malicious extensions could have been downloaded unsafely on Linux Mozilla: Incorrect optimization result on ARM64 Mozilla: Memory safety bugs fixed in Firefox 112 and Firefox ESR 102.10 | [
"cpe:/a:redhat:rhel_aus:8.2::appstream",
"cpe:/a:redhat:rhel_e4s:8.2::appstream",
"cpe:/a:redhat:rhel_tus:8.2::appstream"
] | null | 8.8 | null | null |
RHSA-2007:0074 | Red Hat Security Advisory: spamassassin security update | security flaw | [
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2024:2033 | Red Hat Security Advisory: libreswan security and bug fix update | libreswan: Missing PreSharedKey for connection can cause crash | [
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 5 | null | null |
RHSA-2024:6501 | Red Hat Security Advisory: Red Hat build of Keycloak 22.0.12 Update | keycloak: potential bypass of brute force protection keycloak: Leak of configured LDAP bind credentials through the Keycloak admin console wildfly-elytron: org.keycloak/keycloak-services: session fixation in elytron saml adapters | [
"cpe:/a:redhat:build_keycloak:22"
] | null | 7.1 | null | null |
RHSA-2016:2036 | Red Hat Security Advisory: Red Hat JBoss A-MQ 6.3 security update | Framework: denial-of-service attack with XML input ObjectMessage: unsafe deserialization bouncycastle: Invalid curve attack allowing to extract private keys activemq: Fileserver web application vulnerability allowing RCE shiro: Security constraint bypass | [
"cpe:/a:redhat:jboss_amq:6.3"
] | null | null | 7.3 | null |
RHSA-2018:2224 | Red Hat Security Advisory: Red Hat Enterprise Linux 6.7 Extended Update Support Six-Month Notice | This is the Six-Month notification for the retirement of Red Hat Enterprise Linux 6.7 Extended Update Support (EUS). This notification applies only to those customers subscribed to the Extended Update Support (EUS) channel for Red Hat Enterprise Linux 6.7. | [
"cpe:/o:redhat:rhel_eus:6.7::computenode",
"cpe:/o:redhat:rhel_eus:6.7::server"
] | null | null | null | null |
RHSA-2023:0123 | Red Hat Security Advisory: kpatch-patch security update | kernel: memory corruption in AX88179_178A based USB ethernet device. kernel: i915: Incorrect GPU TLB flush can lead to random memory access | [
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 7 | null | null |
RHSA-2024:0664 | Red Hat Security Advisory: OpenShift Container Platform 4.12.49 bug fix update and security update | golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487) | [
"cpe:/a:redhat:openshift:4.12::el8",
"cpe:/a:redhat:openshift:4.12::el9"
] | null | 7.5 | null | null |
RHSA-2021:3746 | Red Hat Security Advisory: Red Hat JBoss Core Services Apache HTTP Server 2.4.37 SP9 security update | httpd: mod_proxy: SSRF via a crafted request uri-path containing "unix:" | [
"cpe:/a:redhat:jboss_core_services:1::el7",
"cpe:/a:redhat:jboss_core_services:1::el8"
] | null | 9 | null | null |
RHSA-2010:0237 | Red Hat Security Advisory: sendmail security and bug fix update | sendmail allows external mail with from address [email protected] sendmail: incorrect verification of SSL certificate with NUL in name | [
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2024:2882 | Red Hat Security Advisory: firefox security update | Mozilla: Arbitrary JavaScript execution in PDF.js Mozilla: IndexedDB files retained in private browsing mode Mozilla: Potential permissions request bypass via clickjacking Mozilla: Cross-origin responses could be distinguished between script and non-script content-types Mozilla: Use-after-free could occur when printing to PDF Mozilla: Memory safety bugs fixed in Firefox 126, Firefox ESR 115.11, and Thunderbird 115.11 | [
"cpe:/a:redhat:rhel_aus:8.2::appstream"
] | null | 6.1 | null | null |
RHSA-2023:1766 | Red Hat Security Advisory: openvswitch3.1 security update | openvswitch: ip proto 0 triggers incorrect handling | [
"cpe:/o:redhat:enterprise_linux:8::fastdatapath"
] | null | 8.2 | null | null |
RHSA-2021:5071 | Red Hat Security Advisory: Red Hat OpenStack Platform 16.1 (python-eventlet) security update | python-eventlet: improper handling of highly compressed data and memory allocation with excessive size allows DoS | [
"cpe:/a:redhat:openstack:16.1::el8"
] | null | 5.3 | null | null |
RHSA-2020:4481 | Red Hat Security Advisory: bluez security update | bluez: Improper access control in subsystem could result in privilege escalation and DoS | [
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb",
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 7.1 | null | null |
RHSA-2014:0898 | Red Hat Security Advisory: Red Hat JBoss Enterprise Web Platform 5.2.0 security update | PicketLink: XXE via insecure DocumentBuilderFactory usage | [
"cpe:/a:redhat:jboss_enterprise_web_platform:5::el4",
"cpe:/a:redhat:jboss_enterprise_web_platform:5::el5",
"cpe:/a:redhat:jboss_enterprise_web_platform:5::el6"
] | null | null | null | null |
RHSA-2023:7540 | Red Hat Security Advisory: curl security and bug fix update | curl: cookie injection with none file | [
"cpe:/o:redhat:rhel_eus:8.8::baseos"
] | null | 3.7 | null | null |
RHSA-2001:142 | Red Hat Security Advisory: kernel 2.2 and 2.4 | security flaw security flaw | [
"cpe:/o:redhat:linux:6.2",
"cpe:/o:redhat:linux:7.0",
"cpe:/o:redhat:linux:7.1",
"cpe:/o:redhat:linux:7.2"
] | null | null | null | null |
RHSA-2025:2960 | Red Hat Security Advisory: thunderbird security update | firefox: thunderbird: Memory safety bugs fixed in Firefox 136, Thunderbird 136, Firefox ESR 115.21, Firefox ESR 128.8, and Thunderbird 128.8 firefox: thunderbird: Memory safety bugs fixed in Firefox 136, Thunderbird 136, Firefox ESR 128.8, and Thunderbird 128.8 | [
"cpe:/a:redhat:rhel_aus:8.2::appstream"
] | null | 8.8 | null | null |
RHSA-2020:2774 | Red Hat Security Advisory: virt:rhel security update | QEMU: vnc: memory leakage upon disconnect QEMU: Slirp: potential OOB access due to unsafe snprintf() usages | [
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb"
] | null | 5.6 | null | null |
RHSA-2024:5453 | Red Hat Security Advisory: Fence Agents Remediation 0.4.1 - Security update | fence-agents-remediation: Fence Agent Command Line Options Leads to Remote Code Execution | [
"cpe:/a:redhat:workload_availability_fence_agents_remediation:0.4::el8"
] | null | 8.8 | null | null |
RHSA-2019:0049 | Red Hat Security Advisory: systemd security update | systemd: Out-of-bounds heap write in systemd-networkd dhcpv6 option handling systemd: stack overflow when calling syslog from a command with long cmdline systemd: stack overflow when receiving many journald entries | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 7.5 | null |
RHSA-2020:1520 | Red Hat Security Advisory: Red Hat JBoss Web Server 5.3 release | tomcat: local privilege escalation tomcat: Session fixation when using FORM authentication tomcat: Regression in handling of Transfer-Encoding header allows for HTTP request smuggling tomcat: Mishandling of Transfer-Encoding header allows for HTTP request smuggling tomcat: Apache Tomcat AJP File Read/Inclusion Vulnerability | [
"cpe:/a:redhat:jboss_enterprise_web_server:5.3::el6",
"cpe:/a:redhat:jboss_enterprise_web_server:5.3::el7",
"cpe:/a:redhat:jboss_enterprise_web_server:5.3::el8"
] | null | 7.6 | null | null |
RHSA-2010:0613 | Red Hat Security Advisory: Red Hat Enterprise Virtualization Manager security update | GUI: Man in the middle attack possible on the GUI to Backend SSL connection | [
"cpe:/a:redhat:enterprise_linux:5::hypervisor"
] | null | null | null | null |
RHSA-2013:0763 | Red Hat Security Advisory: JBoss Web Framework Kit 2.2.0 update | JDK: XML parsing Denial-Of-Service (6845701) jakarta-commons-httpclient: missing connection hostname check against X.509 certificate name | [
"cpe:/a:redhat:jboss_enterprise_web_framework:2.2.0"
] | null | null | 3.7 | null |
RHSA-2023:3447 | Red Hat Security Advisory: Red Hat OpenStack Platform 16.1 (etcd) security update | etcd: Information discosure via debug function golang.org/x/net/http2: avoid quadratic complexity in HPACK decoding | [
"cpe:/a:redhat:openstack:16.1::el8"
] | null | 7.5 | null | null |
RHSA-2024:0950 | Red Hat Security Advisory: postgresql:15 security update | postgresql: non-owner 'REFRESH MATERIALIZED VIEW CONCURRENTLY' executes arbitrary SQL | [
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 8 | null | null |
RHSA-2023:5238 | Red Hat Security Advisory: kernel security update | kernel: UAF in nftables when nft_set_lookup_global triggered after handling named and anonymous sets in batch requests kernel: net/sched: Use-after-free vulnerabilities in the net/sched classifiers: cls_fw, cls_u32 and cls_route kernel: nf_tables: stack-out-of-bounds-read in nft_byteorder_eval() | [
"cpe:/o:redhat:rhel_e4s:8.1::baseos"
] | null | 7.8 | null | null |
RHSA-2024:6880 | Red Hat Security Advisory: Red Hat Single Sign-On 7.6.11 security update on RHEL 9 | keycloak-saml-core: Improper Verification of SAML Responses Leading to Privilege Escalation in Keycloak Keycloak: Vulnerable Redirect URI Validation Results in Open Redirec | [
"cpe:/a:redhat:red_hat_single_sign_on:7.6::el9"
] | null | 6.1 | null | null |
RHSA-2024:0028 | Red Hat Security Advisory: thunderbird security update | Mozilla: Heap-buffer-overflow affecting WebGL <code>DrawElementsInstanced</code> method with Mesa VM driver Mozilla: Symlinks may resolve to smaller than expected buffers Mozilla: Heap buffer overflow in <code>nsTextFragment</code> Mozilla: Use-after-free in PR_GetIdentitiesLayer Mozilla: Potential sandbox escape due to <code>VideoBridge</code> lack of texture validation Mozilla: Heap buffer overflow affected <code>nsWindow::PickerOpen(void)</code> in headless mode Mozilla: Use-after-free in <code>nsDNSService</code> Mozilla: Undefined behavior in <code>ShutdownObserver()</code> Mozilla: Memory safety bugs fixed in Firefox 121, Firefox ESR 115.6, and Thunderbird 115.6 Mozilla: S/MIME signature accepted despite mismatching message date Mozilla: Truncated signed text was shown with a valid OpenPGP signature | [
"cpe:/a:redhat:rhel_aus:8.4::appstream",
"cpe:/a:redhat:rhel_e4s:8.4::appstream",
"cpe:/a:redhat:rhel_tus:8.4::appstream"
] | null | 7.5 | null | null |
RHSA-2018:0054 | Red Hat Security Advisory: qemu-kvm-rhev security and bug fix update | An update for qemu-kvm-rhev is now available for Red Hat Enterprise Linux OpenStack Platform 6.0 (Juno) for Red Hat Enterprise Linux 7.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. | [
"cpe:/a:redhat:openstack:6::el7"
] | null | null | null | null |
RHSA-2019:1545 | Red Hat Security Advisory: Red Hat Fuse 7.3.1 security update | bsh2: remote code execution via deserialization log4j: Socket receiver deserialization vulnerability uima: XML external entity expansion (XXE) can allow attackers to execute arbitrary code mysql-connector-java: Connector/J unspecified vulnerability (CPU October 2018) thrift: Improper Access Control grants access to files outside the webservers docroot path log4j: deserialization of untrusted data in SocketServer | [
"cpe:/a:redhat:jboss_fuse:7"
] | null | 9.8 | 7.5 | null |
RHSA-2018:2187 | Red Hat Security Advisory: Red Hat JBoss Core Services Apache HTTP Server 2.4.29 security update | openssl: Out-of-bounds write caused by unchecked errors in BN_bn2dec() openssl: Insufficient TLS session ticket HMAC length checks openssl: certificate message OOB reads openssl: Carry propagating bug in Montgomery multiplication openssl: Truncated packet could crash via OOB read openssl: BN_mod_exp may produce incorrect results on x86_64 openssl: bn_sqrx8x_internal carry bug on x86_64 openssl: Read/write after SSL object in error state openssl: rsaz_1024_mul_avx2 overflow bug on x86_64 | [
"cpe:/a:redhat:jboss_core_services:1"
] | null | null | 5.9 | null |
RHSA-2016:0053 | Red Hat Security Advisory: java-1.7.0-openjdk security update | OpenJDK: protected methods can be used as interface methods via DirectMethodHandle (Libraries) TLS 1.2 Transcipt Collision attacks against MD5 in key exchange protocol (SLOTH) OpenJDK: URL deserialization inconsistencies (Networking, 8059054) OpenJDK: logging of RMI connection secrets (JMX, 8130710) OpenJDK: insufficient enforcement of totalEntitySizeLimit (JAXP, 8133962) OpenJDK: incorrect boundary check in JPEG decoder (AWT, 8139017) ICU: integer signedness issue in IndicRearrangementProcessor (OpenJDK 2D, 8140543) | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2019:1326 | Red Hat Security Advisory: Red Hat JBoss Fuse/A-MQ 6.3 R12 security and bug fix update | infinispan: Unsafe deserialization of malicious object injected into data cache | [
"cpe:/a:redhat:jboss_amq:6.3"
] | null | null | 8 | null |
RHSA-2024:4235 | Red Hat Security Advisory: 389-ds security update | 389-ds-base: Malformed userPassword may cause crash at do_modify in slapd/modify.c 389-ds-base: potential denial of service via specially crafted kerberos AS-REQ request | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 7.5 | null | null |
RHSA-2019:1467 | Red Hat Security Advisory: python security update | python: Information Disclosure due to urlsplit improper NFKC normalization | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | 9.8 | null |
RHSA-2023:4413 | Red Hat Security Advisory: openssh security update | openssh: Remote code execution in ssh-agent PKCS#11 support | [
"cpe:/a:redhat:rhel_eus:8.6::appstream",
"cpe:/o:redhat:rhel_eus:8.6::baseos"
] | null | 9.8 | null | null |
RHSA-2020:2067 | Red Hat Security Advisory: Red Hat build of Thorntail 2.5.1 security and bug fix update | thrift: Endless loop when feed with specific input data thrift: Out-of-bounds read related to TJSONProtocol or TSimpleJSONProtocol keycloak: missing signatures validation on CRL used to verify client certificates HTTP/2: large amount of data requests leads to denial of service HTTP/2: flood using PING frames results in unbounded memory growth HTTP/2: flood using HEADERS frames results in unbounded memory growth HTTP/2: flood using SETTINGS frames results in unbounded memory growth apache-commons-beanutils: does not suppresses the class property in PropertyUtilsBean by default keycloak: CSRF check missing in My Resources functionality in the Account Console keycloak: SAML broker does not check existence of signature on document allowing any user impersonation hibernate-validator: safeHTML validator allows XSS xml-security: Apache Santuario potentially loads XML parsing code from an untrusted source cxf: does not restrict the number of message attachments cxf: OpenId Connect token service does not properly validate the clientId jackson-databind: Serialization gadgets in com.zaxxer.hikari.HikariConfig keycloak: adapter endpoints are exposed via arbitrary URLs keycloak: cross-realm user access auth bypass wildfly-core: Incorrect privileges for 'Monitor', 'Auditor' and 'Deployer' user by default wildfly: The 'enabled-protocols' value in legacy security is not respected if OpenSSL security provider is in use undertow: possible Denial Of Service (DOS) in Undertow HTTP server listening on HTTPS jackson-databind: Serialization gadgets in classes of the commons-configuration package jackson-databind: Serialization gadgets in classes of the xalan package jackson-databind: Serialization gadgets in com.zaxxer.hikari.HikariDataSource jackson-databind: Serialization gadgets in org.apache.commons.dbcp.datasources.* jackson-databind: Serialization gadgets in com.p6spy.engine.spy.P6DataSource jackson-databind: Serialization gadgets in classes of the ehcache package jackson-databind: Serialization gadgets in org.apache.log4j.receivers.db.* jackson-databind: lacks certain net.sf.ehcache blocking SmallRye: SecuritySupport class is incorrectly public and contains a static method to access the current threads context class loader netty: HTTP Request Smuggling due to Transfer-Encoding whitespace mishandling jackson-databind: Lacks certain xbean-reflect/JNDI blocking jackson-databind: Serialization gadgets in shaded-hikari-config jackson-databind: Serialization gadgets in ibatis-sqlmap jackson-databind: Serialization gadgets in anteros-core jackson-databind: mishandles the interaction between serialization gadgets and typing which could result in remote command execution jackson-databind: mishandles the interaction between serialization gadgets and typing which could result in remote command execution jackson-databind: Serialization gadgets in org.aoju.bus.proxy.provider.*.RmiProvider jackson-databind: Serialization gadgets in javax.swing.JEditorPane jackson-databind: Serialization gadgets in org.apache.activemq.jms.pool.XaPooledConnectionFactory jackson-databind: Serialization gadgets in org.apache.commons.proxy.provider.remoting.RmiProvider jackson-databind: Serialization gadgets in org.apache.openjpa.ee.WASRegistryManagedRuntime jackson-databind: Serialization gadgets in org.springframework:spring-aop jackson-databind: Serialization gadgets in commons-jelly:commons-jelly | [
"cpe:/a:redhat:openshift_application_runtimes:1.0"
] | null | 8.1 | 8.1 | null |
RHSA-2024:2724 | Red Hat Security Advisory: git-lfs security update | golang: net/http, x/net/http2: unlimited number of CONTINUATION frames causes DoS golang: net/http/cookiejar: incorrect forwarding of sensitive headers and cookies on HTTP redirect golang: net/http: golang: mime/multipart: golang: net/textproto: memory exhaustion in Request.ParseMultipartForm golang: crypto/x509: Verify panics on certificates with an unknown public key algorithm | [
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 5.9 | null | null |
RHSA-2015:1241 | Red Hat Security Advisory: java-1.8.0-oracle security update | OpenJDK: deserialization issue in ObjectInputStream.readSerialData() (Libraries, 8076401) OpenJDK: non-constant time comparisons in crypto code (JCE, 8074865) JCE: missing EC parameter validation in ECDH_Derive() (OpenJDK JCE, 8075833) JDK: unspecified vulnerability fixed in 7u85 and 8u51 (2D) OpenJDK: incorrect code permission checks in RMIConnectionImpl (JMX, 8075853) OpenJDK: name for reverse DNS lookup used in certificate identity check (JSSE, 8067694) JDK: unspecified vulnerability fixed in 6u101, 7u85 and 8u51 (Install) OpenJDK: IIOPInputStream type confusion vulnerability (CORBA, 8076376) ICU: integer overflow in LETableReference verifyLength() (OpenJDK 2D, 8077520) JDK: unspecified vulnerability fixed in 6u101, 7u85 and 8u51 (2D) JDK: unspecified vulnerability fixed in 6u101, 7u85 and 8u51 (2D) OpenJDK: GCM cipher issue causing JVM crash (Security, 8067648) JDK: unspecified vulnerability fixed in 6u101, 7u85 and 8u51 (Deployment) SSL/TLS: "Invariance Weakness" vulnerability in RC4 stream cipher LOGJAM: TLS connections which support export grade DHE key-exchange are vulnerable to MITM attacks JDK: unspecified vulnerability fixed in 7u85 and 8u51 (Deployment) OpenJDK: improper permission checks in MBeanServerInvocationHandler (JMX, 8076397) OpenJDK: insufficient context checks during object deserialization (Libraries, 8076405) OpenJDK: RemoteObjectInvocationHandler allows calling finalize() (RMI, 8076409) JDK: unspecified vulnerability fixed in 7u85 and 8u51 (Deployment) OpenJDK: incorrect OCSP nextUpdate checking (Libraries, 8075374) OpenJDK: DnsClient fails to release request information after error (JNDI, 8075378) ICU: missing boundary checks in layout engine (OpenJDK 2D, 8071715) | [
"cpe:/a:redhat:rhel_extras_oracle_java:6",
"cpe:/a:redhat:rhel_extras_oracle_java:7"
] | null | null | 3.7 | null |
RHSA-2022:6133 | Red Hat Security Advisory: OpenShift Container Platform 4.10.30 bug fix and security update | go-getter: command injection vulnerability go-getter: unsafe download (issue 1 of 3) go-getter: unsafe download (issue 2 of 3) go-getter: unsafe download (issue 3 of 3) | [
"cpe:/a:redhat:openshift:4.10::el8"
] | null | 8.6 | null | null |
RHSA-2023:4071 | Red Hat Security Advisory: firefox security update | Mozilla: Use-after-free in WebRTC certificate generation Mozilla: Potential use-after-free from compartment mismatch in SpiderMonkey Mozilla: Fullscreen notification obscured Mozilla: Lack of warning when opening Diagcab files Mozilla: Memory safety bugs fixed in Firefox 115, Firefox ESR 102.13, and Thunderbird 102.13 | [
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 8.8 | null | null |
RHSA-2024:5534 | Red Hat Security Advisory: python-setuptools security update | pypa/setuptools: Remote code execution via download functions in the package_index module in pypa/setuptools | [
"cpe:/o:redhat:enterprise_linux:9::baseos"
] | null | 8.8 | null | null |
RHSA-2018:1345 | Red Hat Security Advisory: kernel security update | Kernel: KVM: error in exception handling leads to wrong debug stack value Kernel: error in exception handling leads to DoS kernel: ptrace() incorrect error handling leads to corruption and DoS | [
"cpe:/o:redhat:rhel_eus:7.4::computenode",
"cpe:/o:redhat:rhel_eus:7.4::server"
] | null | null | 7.8 | null |
RHSA-2025:0361 | Red Hat Security Advisory: Red Hat JBoss Web Server 5.8.2 release and security update | tomcat: RCE due to TOCTOU issue in JSP compilation | [
"cpe:/a:redhat:jboss_enterprise_web_server:5.8::el7",
"cpe:/a:redhat:jboss_enterprise_web_server:5.8::el8",
"cpe:/a:redhat:jboss_enterprise_web_server:5.8::el9"
] | null | 8.1 | null | null |
RHSA-2005:081 | Red Hat Security Advisory: ghostscript security update | temporary file vulnerabilities in various ghostscript scripts. | [
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws"
] | null | null | null | null |
RHSA-2020:3372 | Red Hat Security Advisory: Red Hat OpenShift Service Mesh 3scale-istio-adapter-rhel8-container security update | golang.org/x/crypto: Processing of crafted ssh-ed25519 public keys allows for panic golang.org/x/text: possibility to trigger an infinite loop in encoding/unicode could lead to crash | [
"cpe:/a:redhat:service_mesh:1.0::el8"
] | null | 7.5 | null | null |
RHSA-2005:133 | Red Hat Security Advisory: xemacs security update | security flaw | [
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.