id
stringlengths 13
15
| title
stringlengths 29
176
| description
stringlengths 8
32.1k
| cpes
sequencelengths 0
20
| cvss_v4_0
null | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
null |
---|---|---|---|---|---|---|---|
RHSA-2024:8717 | Red Hat Security Advisory: Satellite 6.13.7.3 Async Update | foreman: Read-only access to entire DB from templates | [
"cpe:/a:redhat:satellite:6.13::el8",
"cpe:/a:redhat:satellite_capsule:6.13::el8",
"cpe:/a:redhat:satellite_maintenance:6.13::el8",
"cpe:/a:redhat:satellite_utils:6.13::el8"
] | null | 6.3 | null | null |
RHSA-2021:4033 | Red Hat Security Advisory: binutils security update | environment: Unicode's bidirectional (BiDi) override characters can cause trojan source attacks | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 8.5 | null | null |
RHSA-2015:1378 | Red Hat Security Advisory: hivex security and bug fix update | hivex: missing checks for small-sized files | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2022:5606 | Red Hat Security Advisory: Red Hat Integration Camel Extensions for Quarkus 2.7 security update | hadoop: WebHDFS client might send SPNEGO authorization header lz4: memory corruption due to an integer overflow bug caused by memmove argument elasticsearch: executing async search improperly stores HTTP headers leading to information disclosure elasticsearch: Document disclosure flaw in the Elasticsearch suggester elasticsearch: Document disclosure flaw when Document or Field Level Security is used jsoup: Crafted input may cause the jsoup HTML and XML parser to get stuck Kafka: Timing Attack Vulnerability for Apache Kafka Connect and Clients xstream: Injecting highly recursive collections or maps can cause a DoS quarkus: privilege escalation vulnerability with RestEasy Reactive scope leakage in Quarkus | [
"cpe:/a:redhat:camel_quarkus:2.7"
] | null | 7.6 | null | null |
RHSA-2021:2737 | Red Hat Security Advisory: RHV-H security update (redhat-virtualization-host) 4.3.17 | kernel: use-after-free in net/bluetooth/hci_event.c when destroying an hci_chan kernel: size_t-to-int conversion vulnerability in the filesystem layer | [
"cpe:/o:redhat:enterprise_linux:7::hypervisor"
] | null | 7.8 | null | null |
RHSA-2014:0037 | Red Hat Security Advisory: jasperreports-server-pro security, bug fix, and enhancement update | axis: missing connection hostname check against X.509 certificate name hadoop: man-in-the-middle vulnerability | [
"cpe:/a:redhat:rhev_manager:3"
] | null | null | null | null |
RHBA-2006:0287 | Red Hat Bug Fix Advisory: bind bug fix update | INSIST failure in ISC BIND recursive query | [
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws"
] | null | null | null | null |
RHSA-2018:2252 | Red Hat Security Advisory: thunderbird security update | Mozilla: Memory safety bugs fixed in Firefox 61, Firefox ESR 60.1, and Firefox ESR 52.9 Mozilla: Buffer overflow using computed size of canvas element Mozilla: Use-after-free using focus() Mozilla: Integer overflow in SSSE3 scaler Mozilla: Use-after-free when appending DOM nodes Mozilla: CSRF attacks through 307 redirects and NPAPI plugins Mozilla: Compromised IPC child process can list local filenames Mozilla: Invalid data handling during QCMS transformations thunderbird: S/MIME and PGP decryption oracles can be built with HTML emails thunderbird: S/MIME plaintext can be leaked through HTML reply/forward thunderbird: Using form to exfiltrate encrypted mail part by pressing enter in form field | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 4.3 | null |
RHSA-2024:3626 | Red Hat Security Advisory: libxml2 security update | libxml2: use-after-free in XMLReader | [
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 7.5 | null | null |
RHSA-2020:5168 | Red Hat Security Advisory: rh-eclipse security, bug fix and enhancement update | jetty: local temporary directory hijacking vulnerability | [
"cpe:/a:redhat:devtools:2020"
] | null | 7 | null | null |
RHSA-2014:1088 | Red Hat Security Advisory: Red Hat JBoss Web Server 2.1.0 update | tomcat: information disclosure via XXE when running untrusted web applications httpd: mod_deflate denial of service Tomcat/JBossWeb: XML parser hijack by malicious web application httpd: mod_status heap-based buffer overflow Tomcat/JBossWeb: request smuggling and limited DoS in ChunkedInputFilter httpd: mod_cgid denial of service | [
"cpe:/a:redhat:jboss_enterprise_web_server:2::el5"
] | null | null | null | null |
RHSA-2013:0502 | Red Hat Security Advisory: Core X11 clients security, bug fix, and enhancement update | x11perfcomp has dot in its path | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2022:6541 | Red Hat Security Advisory: php:7.4 security update | Archive_Tar: allows an unserialization attack because phar: is blocked but PHAR: is not blocked Archive_Tar: improper filename sanitization leads to file overwrites Archive_Tar: directory traversal due to inadequate checking of symbolic links | [
"cpe:/a:redhat:rhel_eus:8.4::appstream"
] | null | 7.5 | null | null |
RHSA-2025:1680 | Red Hat Security Advisory: kpatch-patch-4_18_0-477_43_1, kpatch-patch-4_18_0-477_67_1, and kpatch-patch-4_18_0-477_81_1 security update | kernel: media: uvcvideo: Skip parsing frames of type UVC_VS_UNDEFINED in uvc_parse_format | [
"cpe:/o:redhat:rhel_eus:8.8::baseos"
] | null | 7.3 | null | null |
RHSA-2007:1048 | Red Hat Security Advisory: openoffice.org, hsqldb security update | JBoss HSQLDB component remote command injection OpenOffice.org-base allows Denial-of-Service and command injection | [
"cpe:/a:redhat:rhel_productivity:5",
"cpe:/o:redhat:enterprise_linux:5::client"
] | null | null | null | null |
RHSA-2016:1205 | Red Hat Security Advisory: spice security update | spice: heap-based memory corruption within smartcard handling spice: Host memory access from guest with invalid primary surface parameters | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | null | null |
RHSA-2024:2853 | Red Hat Security Advisory: nodejs:20 security update | nodejs: using the fetch() function to retrieve content from an untrusted URL leads to denial of service c-ares: Out of bounds read in ares__read_line() nodejs: HTTP Request Smuggling via Content Length Obfuscation nodejs: CONTINUATION frames DoS nghttp2: CONTINUATION frames DoS | [
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 5.3 | null | null |
RHSA-2020:4383 | Red Hat Security Advisory: Red Hat JBoss Core Services Apache HTTP Server 2.4.37 SP5 security update | openssl: Integer overflow in RSAZ modular exponentiation on x86_64 curl: Integer overflows in curl_url_set() function httpd: mod_proxy_uwsgi buffer overflow httpd: mod_http2 concurrent pool usage | [
"cpe:/a:redhat:jboss_core_services:1"
] | null | 7.5 | 3.7 | null |
RHSA-2020:1981 | Red Hat Security Advisory: chromium-browser security update | chromium-browser: Use after free in storage chromium-browser: Use after free in task scheduling | [
"cpe:/a:redhat:rhel_extras:6"
] | null | null | 8.8 | null |
RHSA-2009:1059 | Red Hat Security Advisory: pidgin security update | pidgin file transfer buffer overflow pidgin incomplete fix for CVE-2008-2927 | [
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws"
] | null | null | null | null |
RHSA-2023:4698 | Red Hat Security Advisory: kpatch-patch security update | kernel: cls_flower: out-of-bounds write in fl_set_geneve_opt() | [
"cpe:/o:redhat:rhel_e4s:7.7::server"
] | null | 7.8 | null | null |
RHSA-2016:2116 | Red Hat Security Advisory: openstack-manila-ui security update | openstack-manila-ui: persistent XSS in metadata field | [
"cpe:/a:redhat:openstack:8::el7"
] | null | null | 4.1 | null |
RHSA-2018:1663 | Red Hat Security Advisory: qemu-kvm security update | hw: cpu: speculative store bypass | [
"cpe:/o:redhat:rhel_eus:7.4::computenode",
"cpe:/o:redhat:rhel_eus:7.4::server"
] | null | null | 5.6 | null |
RHSA-2025:1875 | Red Hat Security Advisory: Red Hat OpenShift Service Mesh Containers for 2.5.9 | dompurify: Mutation XSS in DOMPurify Due to Improper Template Literal Handling | [
"cpe:/a:redhat:service_mesh:2.5::el8"
] | null | 4.5 | null | null |
RHSA-2020:2276 | Red Hat Security Advisory: ipmitool security update | ipmitool: Buffer overflow in read_fru_area_section function in lib/ipmi_fru.c | [
"cpe:/o:redhat:rhel_aus:7.3::server",
"cpe:/o:redhat:rhel_e4s:7.3::server",
"cpe:/o:redhat:rhel_tus:7.3::server"
] | null | 8.1 | null | null |
RHSA-2011:0436 | Red Hat Security Advisory: avahi security update | avahi: daemon infinite loop triggered by an empty UDP packet (CVE-2010-2244 fix regression) | [
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2021:1351 | Red Hat Security Advisory: thunderbird security update | Mozilla: More internal network hosts could have been probed by a malicious webpage Mozilla: Out of bound write due to lazy initialization Mozilla: Use-after-free in Responsive Design Mode Mozilla: Secure Lock icon could have been spoofed Mozilla: Blob URLs may have been granted additional privileges Mozilla: Arbitrary FTP command execution on FTP servers using an encoded URL Mozilla: Incorrect size computation in WebAssembly JIT could lead to null-reads Mozilla: Port blocking could be bypassed Mozilla: Race condition when reading from disk while verifying signatures | [
"cpe:/a:redhat:rhel_eus:8.1::appstream"
] | null | 2.5 | 6.1 | null |
RHSA-2018:0158 | Red Hat Security Advisory: dhcp security update | dhcp: omapi code doesn't free socket descriptors when empty message is received allowing denial-of-service | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 5.3 | null |
RHSA-2024:11123 | Red Hat Security Advisory: gstreamer1-plugins-base security update | gstreamer1-plugins-base: GStreamer has a stack-buffer overflow in vorbis_handle_identification_packet gstreamer1-plugins-base: stack-buffer overflow in gst_opus_dec_parse_header gstreamer1-plugins-base: out-of-bounds write in Ogg demuxer | [
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 9.8 | null | null |
RHSA-2025:3108 | Red Hat Security Advisory: pcs security update | python-tornado: Tornado has HTTP cookie parsing DoS vulnerability | [
"cpe:/a:redhat:rhel_eus:9.2::highavailability",
"cpe:/a:redhat:rhel_eus:9.2::resilientstorage"
] | null | 7.5 | null | null |
RHSA-2022:0728 | Red Hat Security Advisory: OpenShift Logging bug fix and security update (5.2.8) | jackson-dataformat-cbor: Unchecked allocation of byte buffer can cause a java.lang.OutOfMemoryError exception origin-aggregated-logging/elasticsearch: Incomplete fix for netty-codec-http CVE-2021-21409 | [
"cpe:/a:redhat:logging:5.2::el8"
] | null | 5.9 | null | null |
RHSA-2023:0944 | Red Hat Security Advisory: kernel security update | kernel: stack overflow in do_proc_dointvec and proc_skip_spaces | [
"cpe:/o:redhat:rhel_aus:7.7::server",
"cpe:/o:redhat:rhel_e4s:7.7::server",
"cpe:/o:redhat:rhel_tus:7.7::server"
] | null | 7.8 | null | null |
RHSA-2004:378 | Red Hat Security Advisory: ethereal security update | security flaw security flaw security flaw | [
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws"
] | null | null | null | null |
RHSA-2011:1247 | Red Hat Security Advisory: rsyslog security update | rsyslog: parseLegacySyslogMsg off-by-two buffer overflow | [
"cpe:/o:redhat:enterprise_linux:6::server"
] | null | null | null | null |
RHSA-2007:0519 | Red Hat Security Advisory: xorg-x11 security update | security flaw | [
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2014:0207 | Red Hat Security Advisory: rubygems security update | rubygems: version regex algorithmic complexity vulnerability | [
"cpe:/a:redhat:openshift:2.0::el6"
] | null | null | null | null |
RHSA-2008:0966 | Red Hat Security Advisory: Red Hat Application Stack v2.2 security and enhancement update | mod_proxy_balancer: mod_proxy_balancer CSRF httpd: mod_proxy_http DoS via excessive interim responses from the origin server httpd: mod_proxy_ftp globbing XSS | [
"cpe:/a:redhat:rhel_application_stack:2"
] | null | null | null | null |
RHSA-2023:2073 | Red Hat Security Advisory: libwebp security update | Mozilla: libwebp: Double-free in libwebp | [
"cpe:/a:redhat:rhel_e4s:8.1::appstream"
] | null | 7.5 | null | null |
RHSA-2021:1609 | Red Hat Security Advisory: p11-kit security, bug fix, and enhancement update | p11-kit: integer overflow when allocating memory for arrays or attributes and object identifiers p11-kit: out-of-bounds read in p11_rpc_buffer_get_byte_array function in rpc-message.c p11-kit: out-of-bounds write in p11_rpc_buffer_get_byte_array_value function in rpc-message.c | [
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 7.5 | null | null |
RHSA-2005:061 | Red Hat Security Advisory: squid security update | security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw | [
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws"
] | null | null | null | null |
RHSA-2015:2360 | Red Hat Security Advisory: cups-filters security, bug fix, and enhancement update | cups-filters: texttopdf heap-based buffer overflow cups-filters: texttopdf integer overflow | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | null | null |
RHSA-2006:0669 | Red Hat Security Advisory: php security update | security flaw security flaw security flaw gd: GIF handling buffer overflow security flaw | [
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws",
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2017:1561 | Red Hat Security Advisory: thunderbird security update | Mozilla: Memory safety bugs fixed in Firefox 54 and Firefox ESR 52.2 (MFSA 2017-16) Mozilla: Use-after-free using destroyed node when regenerating trees (MFSA 2017-16) Mozilla: Use-after-free during docshell reloading (MFSA 2017-16) Mozilla: Use-after-free with track elements (MFSA 2017-16) Mozilla: Use-after-free with content viewer listeners (MFSA 2017-16) Mozilla: Use-after-free with IME input (MFSA 2017-16) Mozilla: Out-of-bounds read in WebGL with ImageInfo object (MFSA 2017-16) Mozilla: Use-after-free and use-after-scope logging XHR header errors (MFSA 2017-16) Mozilla: Use-after-free in IndexedDB (MFSA 2017-16) Mozilla: Out-of-bounds read in Opus encoder (MFSA 2017-16) Mozilla: Domain spoofing with combination of Canadian Syllabics and other unicode blocks (MFSA 2017-16) graphite2: out of bounds read in "graphite2::Pass::readPass" graphite2: heap-buffer-overflow write "lz4::decompress" (CVE-2017-7772) graphite2: heap-buffer-overflow write "lz4::decompress" (src/Decompressor) graphite2: out of bounds read "graphite2::Silf::readGraphite" graphite2: assertion error "size() > n" graphite2: heap-buffer-overflow read "graphite2::Silf::getClassGlyph" graphite2: use of uninitialized memory "graphite2::GlyphCache::Loader::read_glyph" Mozilla: Vulnerabilities in the Graphite 2 library (MFSA 2017-16) | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation",
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 9.8 | null |
RHSA-2023:0975 | Red Hat Security Advisory: zlib security update | zlib: A flaw found in zlib when compressing (not decompressing) certain inputs | [
"cpe:/o:redhat:rhel_aus:7.6::server"
] | null | 8.2 | null | null |
RHSA-2017:0934 | Red Hat Security Advisory: flash-plugin security update | flash-plugin: multiple code execution issues fixed in APSB17-10 flash-plugin: multiple code execution issues fixed in APSB17-10 flash-plugin: multiple code execution issues fixed in APSB17-10 flash-plugin: multiple code execution issues fixed in APSB17-10 flash-plugin: multiple code execution issues fixed in APSB17-10 flash-plugin: multiple code execution issues fixed in APSB17-10 flash-plugin: multiple code execution issues fixed in APSB17-10 | [
"cpe:/a:redhat:rhel_extras:6"
] | null | null | 8.8 | null |
RHSA-2024:9524 | Red Hat Security Advisory: libsoup security update | libsoup: HTTP request smuggling via stripping null bytes from the ends of header names | [
"cpe:/a:redhat:rhel_eus:8.8::appstream",
"cpe:/o:redhat:rhel_eus:8.8::baseos"
] | null | 7.5 | null | null |
RHSA-2019:3210 | Red Hat Security Advisory: thunderbird security update | Mozilla: Use-after-free when creating index updates in IndexedDB Mozilla: Potentially exploitable crash due to 360 Total Security Mozilla: Stack buffer overflow in HKDF output Mozilla: Stack buffer overflow in WebRTC networking Mozilla: Unintended access to a privileged JSONView object Mozilla: document.domain-based origin isolation has same-origin-property violation Mozilla: Incorrect HTML parsing results in XSS bypass technique Mozilla: Memory safety bugs fixed in Firefox 70 and Firefox ESR 68.2 expat: heap-based buffer over-read via crafted XML input | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 6.1 | 7.5 | null |
RHSA-2011:1807 | Red Hat Security Advisory: jasper security update | jasper: heap buffer overflow flaws lead to arbitrary code execution (CERT VU#887409) jasper: heap buffer overflow flaws lead to arbitrary code execution (CERT VU#887409) | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2025:2440 | Red Hat Security Advisory: OpenShift Container Platform 4.12.74 security and extras update | golang.org/x/net/html: Non-linear parsing of case-insensitive content in golang.org/x/net/html | [
"cpe:/a:redhat:openshift:4.12::el8"
] | null | 7.5 | null | null |
RHSA-2021:2259 | Red Hat Security Advisory: nginx:1.18 security update | nginx: Off-by-one in ngx_resolver_copy() when labels are followed by a pointer to a root domain name | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 8.1 | null | null |
RHSA-2019:2587 | Red Hat Security Advisory: CloudForms 4.7.9 security, bug fix and enhancement update | cloudforms: stored cross-site scripting in Name field jquery: Prototype pollution in object's prototype leading to denial of service, remote code execution, or property injection | [
"cpe:/a:redhat:cloudforms_managementengine:5.10::el7"
] | null | null | 5.6 | null |
RHSA-2024:3061 | Red Hat Security Advisory: pki-core:10.6 and pki-deps:10.6 security update | jackson-databind: denial of service via a large depth of nested objects | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 7.5 | null | null |
RHSA-2014:1947 | Red Hat Security Advisory: rhevm-log-collector security update | ovirt-engine-log-collector: database password disclosed in process listing | [
"cpe:/a:redhat:rhev_manager:3"
] | null | null | null | null |
RHSA-2014:0150 | Red Hat Security Advisory: gc security update | gc: malloc() and calloc() overflows | [
"cpe:/a:redhat:network_proxy:5.6::el5"
] | null | null | null | null |
RHSA-2020:3344 | Red Hat Security Advisory: thunderbird security update | chromium-browser: Use after free in ANGLE chromium-browser: Inappropriate implementation in WebRTC Mozilla: Potential leak of redirect targets when loading scripts in a worker Mozilla: Memory safety bugs fixed in Firefox 79 and Firefox ESR 68.11 | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 8.8 | 8.8 | null |
RHSA-2024:5638 | Red Hat Security Advisory: orc:0.4.31 security update | orc: Stack-based buffer overflow vulnerability in ORC | [
"cpe:/a:redhat:rhel_eus:9.2::appstream"
] | null | 6.7 | null | null |
RHSA-2020:4923 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.3.3 security update | wildfly-openssl: memory leak per HTTP session creation in WildFly OpenSSL | [
"cpe:/a:redhat:jboss_enterprise_application_platform:7.3"
] | null | 7.5 | null | null |
RHSA-2024:0805 | Red Hat Security Advisory: dotnet7.0 security update | crypto-js: PBKDF2 1,000 times weaker than specified in 1993 and 1.3M times weaker than current standard dotnet: Denial of Service in SignalR server dotnet: Denial of Service in X509Certificate2 | [
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::crb"
] | null | 7.5 | null | null |
RHSA-2025:1295 | Red Hat Security Advisory: buildah security update | podman: buildah: Container breakout by using --jobs=2 and a race condition when building a malicious Containerfile | [
"cpe:/a:redhat:rhel_eus:9.2::appstream"
] | null | 8.6 | null | null |
RHSA-2020:0702 | Red Hat Security Advisory: xerces-c security update | xerces-c: XML parser contains a use-after-free error triggered during the scanning of external DTDs | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | 8.1 | null | null |
RHSA-2020:5437 | Red Hat Security Advisory: kernel security and bug fix update | kernel: The flow_dissector feature allows device tracking kernel: Buffer over-read in crypto_authenc_extractkeys() when a payload longer than 4 bytes is not aligned. kernel: buffer uses out of index in ext3/4 filesystem kernel: metadata validator in XFS may cause an inode with a valid, user-creatable extended attribute to be flagged as corrupt kernel: umask not applied on filesystem without ACL support kernel: TOCTOU mismatch in the NFS client code kernel: improper input validation in ppp_cp_parse_cr function leads to memory corruption and read overflow | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 7.2 | null | null |
RHSA-2023:1583 | Red Hat Security Advisory: nodejs:18 security, bug fix, and enhancement update | glob-parent: Regular Expression Denial of Service http-cache-semantics: Regular Expression Denial of Service (ReDoS) vulnerability Node.js: Permissions policies can be bypassed via process.mainModule Node.js: OpenSSL error handling issues in nodejs crypto library Node.js: insecure loading of ICU data through ICU_DATA environment variable Node.js: Fetch API did not protect against CRLF injection in host headers Node.js: Regular Expression Denial of Service in Headers fetch API | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 7.5 | null | null |
RHSA-2024:4972 | Red Hat Security Advisory: Errata Advisory for Red Hat OpenShift GitOps v1.11.7 security update | argo-cd: Argo CD web terminal session doesn't expire argocd: Unauthenticated Denial of Service (DoS) Vulnerability via /api/webhook Endpoint in Argo CD | [
"cpe:/a:redhat:openshift_gitops:1.11::el8"
] | null | 7.5 | null | null |
RHSA-2023:5042 | Red Hat Security Advisory: flac security update | flac: Remote Code Execution (RCE) via the bitwriter_grow_ function, by supplying crafted input to the encoder | [
"cpe:/a:redhat:rhel_e4s:8.1::appstream"
] | null | 7.8 | null | null |
RHSA-2023:0633 | Red Hat Security Advisory: Red Hat OpenShift (Logging Subsystem) security update | Logging Subsystem 5.5.7 - Red Hat OpenShift | [
"cpe:/a:redhat:logging:5.5::el8"
] | null | null | null | null |
RHSA-2016:1139 | Red Hat Security Advisory: squid security update | squid: buffer overflow in cachemgr.cgi squid: multiple issues in ESI processing squid: multiple issues in ESI processing squid: multiple issues in ESI processing squid: Cache poisoning issue in HTTP Request handling squid: Header Smuggling issue in HTTP Request processing squid: SegFault from ESIInclude::Start squid: SIGSEGV in ESIContext response handling | [
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | null | null |
RHSA-2023:2061 | Red Hat Security Advisory: Multicluster Engine for Kubernetes 2.1.6 security updates and bug fixes | http-cache-semantics: Regular Expression Denial of Service (ReDoS) vulnerability | [
"cpe:/a:redhat:multicluster_engine:2.1::el8"
] | null | 7.5 | null | null |
RHSA-2016:1594 | Red Hat Security Advisory: python-django security update | django: XSS in admin's add/change related popup | [
"cpe:/a:redhat:openstack-optools:8::el7"
] | null | null | 6.1 | null |
RHSA-2012:0143 | Red Hat Security Advisory: xulrunner security update | libpng: Heap buffer overflow in png_decompress_chunk (MFSA 2012-11) | [
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server",
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2012:0074 | Red Hat Security Advisory: jbossweb security update | tomcat: Multiple weaknesses in HTTP DIGEST authentication tomcat: security manager restrictions bypass JBoss Web remote denial of service when surrogate pair character is placed at buffer boundary tomcat: hash table collisions CPU usage DoS (oCERT-2011-003) tomcat: Multiple weaknesses in HTTP DIGEST authentication tomcat: Multiple weaknesses in HTTP DIGEST authentication tomcat: Multiple weaknesses in HTTP DIGEST authentication tomcat: large number of parameters DoS | [
"cpe:/a:redhat:jboss_enterprise_application_platform:5::el4",
"cpe:/a:redhat:jboss_enterprise_application_platform:5::el5",
"cpe:/a:redhat:jboss_enterprise_application_platform:5::el6"
] | null | null | null | null |
RHSA-2020:4379 | Red Hat Security Advisory: Red Hat build of Eclipse Vert.x 3.9.4 security update | jackson-databind: FasterXML DOMDeserializer insecure entity expansion is vulnerable to XML external entity (XXE) | [
"cpe:/a:redhat:openshift_application_runtimes:1.0"
] | null | 7.5 | null | null |
RHSA-2003:335 | Red Hat Security Advisory: : Updated Net-SNMP packages fix security and other bugs | security flaw | [
"cpe:/o:redhat:linux:8.0",
"cpe:/o:redhat:linux:9"
] | null | null | null | null |
RHSA-2023:7861 | Red Hat Security Advisory: Red Hat build of Keycloak 22.0.7 images enhancement and security update | keycloak: reflected XSS via wildcard in OIDC redirect_uri keycloak: redirect_uri validation bypass | [
"cpe:/a:redhat:build_keycloak:22::el9"
] | null | 7.1 | null | null |
RHSA-2020:0853 | Red Hat Security Advisory: zsh security update | zsh: insecure dropping of privileges when unsetting PRIVILEGED option | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 7.8 | null | null |
RHSA-2023:1919 | Red Hat Security Advisory: webkit2gtk3 security update | WebKitGTK: use-after-free leads to arbitrary code execution | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 8.8 | null | null |
RHSA-2020:2550 | Red Hat Security Advisory: libexif security update | libexif: several buffer over-reads in EXIF MakerNote handling can lead to information disclosure and DoS | [
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb"
] | null | 9.1 | null | null |
RHSA-2024:3056 | Red Hat Security Advisory: qt5-qtbase security update | qt: incorrect integer overflow check qtbase: potential buffer overflow when reading KTX images | [
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb"
] | null | 6.2 | null | null |
RHSA-2024:4373 | Red Hat Security Advisory: virt:rhel and virt-devel:rhel security update | qemu-kvm: 'qemu-img info' leads to host file read/write | [
"cpe:/a:redhat:rhel_aus:8.6::appstream",
"cpe:/a:redhat:rhel_e4s:8.6::appstream",
"cpe:/a:redhat:rhel_tus:8.6::appstream"
] | null | 7.8 | null | null |
RHSA-2022:5622 | Red Hat Security Advisory: container-tools:rhel8 security and bug fix update | psgo: Privilege escalation in 'podman top' | [
"cpe:/a:redhat:rhel_eus:8.4::appstream"
] | null | 8 | null | null |
RHSA-2006:0195 | Red Hat Security Advisory: tar security update | tar archive path traversal issue | [
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws"
] | null | null | null | null |
RHSA-2025:2026 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 8.0.6 security update | wildfly: Wildfly vulnerable to Cross-Site Scripting (XSS) | [
"cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el9"
] | null | 6.1 | null | null |
RHSA-2014:1143 | Red Hat Security Advisory: kernel security and bug fix update | kernel: DoS with syscall auditing | [
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2023:6595 | Red Hat Security Advisory: linux-firmware security, bug fix, and enhancement update | hw: intel: Improper access control for some Intel(R) PROSet/Wireless WiFi hw: intel: Improper input validation in some Intel(R) PROSet/Wireless WiFi hw: intel: Improper input validation in some Intel(R) PROSet/Wireless WiFi hw: intel: Improper access control for some Intel(R) PROSet/Wireless WiFi hw: intel: Protection mechanism failure for some Intel(R) PROSet/Wireless WiFi amd: Return Address Predictor vulnerability leading to information disclosure | [
"cpe:/o:redhat:enterprise_linux:9::baseos"
] | null | 5.6 | null | null |
RHSA-2016:2041 | Red Hat Security Advisory: python-django security update | python-django: CSRF protection bypass on a site with Google Analytics | [
"cpe:/a:redhat:openstack:7::el7"
] | null | null | 6.1 | null |
RHSA-2025:2426 | Red Hat Security Advisory: pki-core security update | jquery: Untrusted code execution via <option> tag in HTML passed to DOM manipulation methods | [
"cpe:/o:redhat:rhel_aus:7.7::server"
] | null | 6.1 | null | null |
RHSA-2009:0369 | Red Hat Security Advisory: java-1.6.0-ibm security update | Java WebStart privilege escalation Java Web Start exposes username and the pathname of the JWS cache Java Web Start BasicService displays local files in the browser Java WebStart allows hidden code privilege escalation OpenJDK UTF-8 decoder accepts non-shortest form sequences (4486841) OpenJDK Font processing vulnerability (6733336) OpenJDK Truetype Font processing vulnerability (6751322) OpenJDK Buffer Overflow in GIF image processing (6766136) | [
"cpe:/a:redhat:rhel_extras:4",
"cpe:/a:redhat:rhel_extras:5::client",
"cpe:/a:redhat:rhel_extras:5::server"
] | null | null | null | null |
RHSA-2024:5884 | Red Hat Security Advisory: krb5 security update | krb5: GSS message token handling krb5: GSS message token handling | [
"cpe:/o:redhat:rhel_aus:8.2::baseos"
] | null | 6.5 | null | null |
RHSA-2013:0686 | Red Hat Security Advisory: Subscription Asset Manager 1.2.1 update | Candlepin: bootstrap RPM deploys CA certificate file with mode 666 Candlepin: Re-enable manifest signature checking rubygem-rdoc: Cross-site scripting in the documentation created by Darkfish Rdoc HTML generator / template rubygem-rack: Timing attack in cookie sessions rubygem-json: Denial of Service and SQL Injection rubygem-activerecord/rubygem-activemodel: circumvention of attr_protected Katello: Notifications page Username XSS | [
"cpe:/a:rhel_sam:1.2::el6"
] | null | null | null | null |
RHSA-2024:5978 | Red Hat Security Advisory: linux-firmware security update | hw: amd: SMM Lock Bypass | [
"cpe:/o:redhat:rhel_els:7"
] | null | 7.5 | null | null |
RHSA-2023:4698 | Red Hat Security Advisory: kpatch-patch security update | kernel: cls_flower: out-of-bounds write in fl_set_geneve_opt() | [
"cpe:/o:redhat:rhel_e4s:7.7::server"
] | null | 7.8 | null | null |
RHSA-2021:3303 | Red Hat Security Advisory: OpenShift Container Platform 4.7.29 bug fix and security update | gogo/protobuf: plugin/unmarshal/unmarshal.go lacks certain index validation | [
"cpe:/a:redhat:openshift:4.7::el8"
] | null | 8.6 | null | null |
RHSA-2024:7164 | Red Hat Security Advisory: Migration Toolkit for Containers (MTC) 1.8.4 security and bug fix update | github.com/gin-contrib/cors: Gin mishandles a wildcard in the origin string in github.com/gin-contrib/cors golang: net/http, x/net/http2: unlimited number of CONTINUATION frames causes DoS golang: net/http/cookiejar: incorrect forwarding of sensitive headers and cookies on HTTP redirect containers/image: digest type does not guarantee valid type braces: fails to limit the number of characters it can handle golang: net: malformed DNS message can cause infinite loop jose-go: improper handling of highly compressed data follow-redirects: Possible credential leak node-tar: denial of service while parsing a tar file due to lack of folders depth validation moby: external DNS requests from 'internal' networks could lead to data exfiltration express: cause malformed URLs to be evaluated webpack-dev-middleware: lack of URL validation may lead to file leak axios: axios: Server-Side Request Forgery | [
"cpe:/a:redhat:rhmt:1.8::el8"
] | null | 7.5 | null | null |
RHSA-2021:5045 | Red Hat Security Advisory: thunderbird security update | Mozilla: Memory safety bugs fixed in Firefox 95 and Firefox ESR 91.4 Mozilla: JavaScript unexpectedly enabled for the composition area Mozilla: URL leakage when navigating while executing asynchronous function Mozilla: Heap buffer overflow when using structured clone Mozilla: Missing fullscreen and pointer lock notification when requesting both Mozilla: GC rooting failure when calling wasm instance methods Mozilla: External protocol handler parameters were unescaped Mozilla: XMLHttpRequest error codes could have leaked the existence of an external protocol handler Mozilla: Bypass of CSP sandbox directive when embedding Mozilla: Denial of Service when using the Location API in a loop Mozilla: Cursor spoofing could overlay user interface when native cursor is zoomed | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 5.4 | 6.1 | null |
RHSA-2022:1437 | Red Hat Security Advisory: OpenJDK 17.0.3 security update for Windows Builds | OpenJDK: Unbounded memory allocation when compiling crafted XPath expressions (JAXP, 8270504) OpenJDK: Improper object-to-string conversion in AnnotationInvocationHandler (Libraries, 8277672) OpenJDK: Missing check for negative ObjectIdentifier (Libraries, 8275151) OpenJDK: Improper ECDSA signature verification (Libraries, 8277233) OpenJDK: Defective secure validation in Apache Santuario (Libraries, 8278008) OpenJDK: URI parsing inconsistencies (JNDI, 8278972) | [
"cpe:/a:redhat:openjdk:17::windows"
] | null | 5.3 | null | null |
RHSA-2025:1347 | Red Hat Security Advisory: kernel security update | kernel: media: uvcvideo: Skip parsing frames of type UVC_VS_UNDEFINED in uvc_parse_format | [
"cpe:/o:redhat:rhel_els:6"
] | null | 7.3 | null | null |
RHSA-2019:2863 | Red Hat Security Advisory: kernel security update | kernel: vhost-net: guest to host kernel escape during migration | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | 7.2 | null |
RHEA-2018:0705 | Red Hat Enhancement Advisory: tcpdump bug fix and enhancement update | tcpdump: Heap buffer overflow in the EXTRACT_16BITS function tcpdump: heap-based buffer over-read in the lldp_print tcpdump: heap-based buffer over-read in the pimv1_print tcpdump: buffer overflow in the sliplink_print function tcpdump: Segmentation Violation in the compressed_sl_print tcpdump: Buffer over-read in smbutil.c:name_len() in SMB/CIFS parser tcpdump: Buffer over-read in addrtoname.c:lookup_bytestring() tcpdump: Buffer over-read in print-icmp.c:icmp_print() in ICMP parser tcpdump: Buffer over-read in print-isakmp.c:isakmp_rfc3948_print() in ISAKMP parser tcpdump: Buffer over-read in print-isoclns.c:isoclns_print() in ISO CLNS parser tcpdump: Buffer over-read in print-nfs.c:interp_reply() in NFS parser tcpdump: Buffer over-read in print-decnet.c:decnet_print() in DECnet parser tcpdump: Buffer over-read in util-print.c:tok2strbuf() tcpdump: Buffer over-read in print-eigrp.c:eigrp_print() in EIGRP parser tcpdump: Buffer over-read in print-zephyr.c, several functions in Zephyr parser tcpdump: Buffer over-read in print-ip6.c:ip6_print() in IPv6 parser tcpdump: Buffer over-read in print-rt6.c:rt6_print() in IPv6 routing header parser tcpdump: Buffer over-read in print-802_11.c:parse_elements() in IEEE 802.11 parser tcpdump: Buffer over-read in print-telnet.c:telnet_parse() in telnet parser tcpdump: Infinite loop due to a bug in print-resp.c:resp_get_length() in RESP parser tcpdump: Infinite loop due to bugs in print-isakmp.c, several functions in ISAKMP parser tcpdump: Buffer over-read in print-bgp.c:bgp_attr_print() in BGP parser tcpdump: Buffer over-read in print-ripng.c:ripng_print() in RIPng parser tcpdump: Buffer over-read in print-juniper.c, several functions in Juniper protocols parser tcpdump: Buffer over-read in print-bgp.c:bgp_attr_print() in BGP parser tcpdump: Infinite loop due to a bug in print-domain.c:ns_print() in DNS parser tcpdump: Buffer over-read in print-pim.c:pimv2_print() in PIMv2 parser tcpdump: Infinite loop due to a bug in print-lldp.c:lldp_private_8021_print() in LLDP parser tcpdump: Buffer over-read in print-isoclns.c:isis_print_extd_ip_reach() in IS-IS parser tcpdump: Buffer over-read in print-isoclns.c:isis_print() in IS-IS parser tcpdump: Buffer over-read in print-802_15_4.c:ieee802_15_4_if_print() in IEEE 802.15.4 parser tcpdump: Buffer over-read in print-nfs.c:nfs_printfh() in NFS parser tcpdump: Buffer over-read in print-aodv.c:aodv_extension() in AODV parser tcpdump: Buffer over-read in print-lmp.c:lmp_print() in LMP parser tcpdump: Buffer over-read in print-juniper.c:juniper_parse_header() in Juniper protocols parser tcpdump: Buffer over-read in print-nfs.c:xid_map_enter() in NFS parser tcpdump: Buffer over-read in print-l2tp.c, several functions in L2TP parser tcpdump: Buffer over-read in print-pktap.c:pktap_if_print() in Apple PKTAP parser tcpdump: Buffer over-read in print-802_11.c:parse_elements() in IEEE 802.11 parser tcpdump: Buffer over-read in print-mobility.c:mobility_print() in IPv6 mobility parser tcpdump: Buffer over-read in print-beep.c:l_strnstart() in BEEP parser tcpdump: Buffer overflow in util-print.c:bittok2str_internal() tcpdump: Buffer over-read in print-icmp.c:icmp_print() in ICMP parser tcpdump: Buffer over-read in print-arp.c, several functions in ARP parser tcpdump: Buffer over-read in print-wb.c:wb_prep(), several functions in White Board protocol parser tcpdump: Buffer over-read in print-eap.c:eap_print() in EAP parser tcpdump: Buffer over-read in print-isoclns.c:esis_print() in ISO ES-IS parser tcpdump: Buffer over-read in print-dhcp6.c:dhcp6opt_print() in DHCPv6 parser tcpdump: Buffer over-read in print-pgm.c:pgm_print() in PGM parser tcpdump: Buffer over-read in print-pgm.c:pgm_print() in PGM parser tcpdump: Buffer over-read in print-vtp.c:vtp_print() in VTP parser tcpdump: Buffer over-read in print-icmp6.c:icmp6_print() in ICMPv6 parser tcpdump: Buffer over-read in print-ip.c:ip_printroute() in IP parser tcpdump: Buffer over-read in print-mobility.c:mobility_opt_print() in IPv6 mobility parser tcpdump: Buffer over-read in print-mobility.c:mobility_opt_print() in IPv6 mobility parser tcpdump: Buffer over-read in print-mobility.c:mobility_opt_print() in IPv6 mobility parser tcpdump: Buffer over-read in print-isoclns.c, several functions in ISO IS-IS parser tcpdump: Buffer over-read in print-lldp.c:lldp_mgmt_addr_tlv_print() in LLDP parser tcpdump: Buffer over-read in print-bootp.c:bootp_print() in BOOTP parser tcpdump: Buffer over-read in print-ppp.c:print_ccp_config_options() in PPP parser tcpdump: Buffer over-read in print-pim.c, several functions in PIM parser tcpdump: Buffer over-read in print-frag6.c:frag6_print() in IPv6 fragmentation header parser tcpdump: Buffer over-read in print-radius.c:print_attr_string() in RADIUS parser tcpdump: Buffer over-read in print-vtp.c:vtp_print() in VTP parser tcpdump: Buffer over-read in print-pgm.c:pgm_print() in PGM parser tcpdump: Buffer over-read in print-isoclns.c:isis_print_id() in ISO IS-IS parser tcpdump: Buffer over-read in print-ospf6.c:ospf6_decode_v3() in OSPFv3 parser tcpdump: Buffer over-read in print-ip.c:ip_printts() in IP parser tcpdump: Buffer over-read in print-ppp.c:handle_mlppp() in PPP parser tcpdump: Buffer over-read in print-isakmp.c, several functions in ISAKMP parser tcpdump: Buffer over-read in print-mptcp.c, several functions in MPTCP parser tcpdump: Buffer over-read in print-icmp6.c:icmp6_nodeinfo_print() in ICMPv6 parser tcpdump: Buffer over-read in print-hncp.c:dhcpv6_print() in HNCP parser tcpdump: Buffer over-read in print-bgp.c:decode_multicast_vpn() in BGP parser tcpdump: Buffer over-read in print-hncp.c:dhcpv4_print() in HNCP parser tcpdump: Buffer over-read in print-vqp.c:vqp_print() in VQP parser tcpdump: Buffer over-read in print-bgp.c:bgp_attr_print() in BGP parser tcpdump: Buffer over-read in print-isoclns.c:esis_print() in ISO ES-IS parser tcpdump: Buffer over-read in print-rsvp.c:rsvp_obj_print() in RSVP parser tcpdump: Buffer over-read in print-rx.c:ubik_print() in Rx protocol parser tcpdump: Buffer over-read in print-rpki-rtr.c:rpki_rtr_pdu_print() in RPKI-Router parser tcpdump: Buffer over-read in print-rsvp.c:rsvp_obj_print() in RSVP parser tcpdump: Buffer over-read in print-cfm.c:cfm_print() in CFM parser tcpdump: Buffer over-read in print-bgp.c:decode_rt_routing_info() in BGP parser tcpdump: Buffer over-read in print-lldp.c:lldp_private_8023_print() in LLDP parser tcpdump: Buffer over-read in print-isoclns.c:isis_print_is_reach_subtlv() in ISO IS-IS parser tcpdump: Buffer over-read in print-chdlc.c:chdlc_print() in Cisco HDLC parser tcpdump: Buffer over-read in print-olsr.c:olsr_print() in OLSR parser tcpdump: Buffer over-read in print-isakmp.c:ikev1_id_print() in IKEv1 parser tcpdump: Buffer over-read in print-isakmp.c, several functions in IKEv2 parser tcpdump: Buffer over-read in print-rt6.c:rt6_print() in IPv6 routing header parser | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 6.5 | null |
RHSA-2022:7186 | Red Hat Security Advisory: device-mapper-multipath security update | device-mapper-multipath: Authorization bypass, multipathd daemon listens for client connections on an abstract Unix socket | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 7.8 | null | null |
RHSA-2020:1527 | Red Hat Security Advisory: OpenShift Container Platform 4.2.29 openshift security update | kubernetes: Use of unbounded 'client' label in apiserver_request_total allows for memory exhaustion | [
"cpe:/a:redhat:openshift:4.2::el7",
"cpe:/a:redhat:openshift:4.2::el8"
] | null | 4.3 | null | null |
RHSA-2023:3450 | Red Hat Security Advisory: OpenShift Serverless Client kn 1.29.0 release | golang.org/x/net/http2: avoid quadratic complexity in HPACK decoding golang: crypto/tls: large handshake records may cause panics golang: net/http, mime/multipart: denial of service from excessive resource consumption golang: net/http, net/textproto: denial of service from excessive memory allocation golang: net/http, net/textproto, mime/multipart: denial of service from excessive resource consumption golang: go/parser: Infinite loop in parsing golang: html/template: backticks not treated as string delimiters containerd: Supplementary groups are not set up properly | [
"cpe:/a:redhat:serverless:1.0::el8"
] | null | 7.3 | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.