id
stringlengths 13
15
| title
stringlengths 29
176
| description
stringlengths 8
32.1k
| cpes
listlengths 0
20
| cvss_v4_0
null | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
null |
---|---|---|---|---|---|---|---|
RHSA-2022:0577
|
Red Hat Security Advisory: Windows Container Support for Red Hat OpenShift 5.0.0 [security update]
|
golang.org/x/text: Panic in language.ParseAcceptLanguage while parsing -u- extension golang.org/x/text: Panic in language.ParseAcceptLanguage while processing bcp47 tag gogo/protobuf: plugin/unmarshal/unmarshal.go lacks certain index validation golang: net: incorrect parsing of extraneous zero characters at the beginning of an IP address octet golang: net/http: panic in ReadRequest and ReadResponse when reading a very large header golang: net: lookup functions may return invalid host names golang: net/http/httputil: ReverseProxy forwards connection headers if first one is empty golang: math/big.Rat: may cause a panic or an unrecoverable fatal error if passed inputs with very large exponents golang: crypto/tls: certificate of wrong type is causing TLS client to panic golang: net/http/httputil: panic due to racy read of persistConn after handler panic
|
[
"cpe:/a:redhat:openshift:4.10::el8"
] | null | 5.9 | null | null |
RHSA-2024:4156
|
Red Hat Security Advisory: OpenShift Container Platform 4.16.1 bug fix and security update
|
openshift/telemeter: iss check during JWT authentication can be bypassed helm: Missing YAML Content Leads To Panic
|
[
"cpe:/a:redhat:openshift:4.16::el9"
] | null | 7.5 | null | null |
RHSA-2014:1865
|
Red Hat Security Advisory: bash Shift_JIS security update
|
bash: code execution via specially-crafted environment (Incomplete fix for CVE-2014-6271) bash: parser can allow out-of-bounds memory access while handling redir_stack bash: off-by-one error in deeply nested flow control constructs
|
[
"cpe:/a:redhat:rhel_sjis:5"
] | null | null | null | null |
RHSA-2023:3954
|
Red Hat Security Advisory: Red Hat Fuse 7.12 release and security update
|
jakarta-commons-httpclient: missing connection hostname check against X.509 certificate name apache-httpclient: incorrect handling of malformed authority component in request URIs undertow: Server identity in https connection is not checked by the undertow client Moment.js: Path traversal in moment.locale spring-security: Authorization rules can be bypassed via forward or include dispatcher types in Spring Security hazelcast: Hazelcast connection caching batik: Server-Side Request Forgery batik: Server-Side Request Forgery batik: Server-Side Request Forgery (SSRF) vulnerability batik: Apache XML Graphics Batik vulnerable to code execution via SVG dev-java/snakeyaml: DoS via stack overflow codec-haproxy: HAProxyMessageDecoder Stack Exhaustion DoS engine.io: Specially crafted HTTP request can trigger an uncaught exception postgresql-jdbc: Information leak of prepared statement data due to insecure temporary file permissions xstream: Denial of Service by injecting recursive collections or maps based on element's hash values raising a stack overflow batik: Untrusted code execution in Apache XML Graphics Batik Apache-Commons-BCEL: arbitrary bytecode produced via out-of-bounds writing tomcat: JsonErrorReportValve injection CXF: directory listing / code exfiltration CXF: SSRF Vulnerability Undertow: Infinite loop in SslConduit during close json-smart: Uncontrolled Resource Consumption vulnerability in json-smart (Resource Exhaustion) springframework: Security Bypass With Un-Prefixed Double Wildcard Pattern springframework: Spring Expression DoS Vulnerability spring-boot: Spring Boot Welcome Page DoS Vulnerability shiro: Authentication bypass through a specially crafted HTTP request bouncycastle: potential blind LDAP injection attack using a self-signed certificate
|
[
"cpe:/a:redhat:jboss_fuse:7"
] | null | 5.3 | 3.7 | null |
RHSA-2023:0814
|
Red Hat Security Advisory: Red Hat build of Cryostat security update
|
go-restful: Authorization Bypass Through User-Controlled Key
|
[
"cpe:/a:redhat:cryostat:2::el8"
] | null | 9.1 | null | null |
RHSA-2017:1101
|
Red Hat Security Advisory: nss security update
|
nss: Write beyond bounds caused by bugs in Base64 de/encoding in nssb64d.c and nssb64e.c (MFSA 2017-10)
|
[
"cpe:/o:redhat:rhel_els:5"
] | null | null | 9.8 | null |
RHSA-2020:2643
|
Red Hat Security Advisory: chromium-browser security update
|
chromium-browser: Use after free in speech chromium-browser: Insufficient policy enforcement in WebView chromium-browser: Out of bounds write in V8
|
[
"cpe:/a:redhat:rhel_extras:6"
] | null | 8.8 | null | null |
RHSA-2022:5937
|
Red Hat Security Advisory: kernel security and bug fix update
|
hw: cpu: incomplete clean-up of multi-core shared buffers (aka SBDR) hw: cpu: incomplete clean-up of microarchitectural fill buffers (aka SBDS) hw: cpu: incomplete clean-up in specific special register write operations (aka DRPW) hw: cpu: Intel: Stale Data Read from legacy xAPIC vulnerability
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 6 | null | null |
RHSA-2023:4225
|
Red Hat Security Advisory: OpenShift Container Platform 4.13.6 security and extras update
|
golang.org/x/net/http2: avoid quadratic complexity in HPACK decoding
|
[
"cpe:/a:redhat:openshift:4.13::el8"
] | null | 7.5 | null | null |
RHSA-2022:2216
|
Red Hat Security Advisory: Red Hat OpenShift Logging Security and Bug update Release 5.4.1
|
netty-codec: Bzip2Decoder doesn't allow setting size restrictions for decompressed data netty-codec: SnappyFrameDecoder doesn't restrict chunk length and may buffer skippable chunks in an unnecessary way netty: control chars in header names may lead to HTTP request smuggling prometheus/client_golang: Denial of service using InstrumentHandlerCounter
|
[
"cpe:/a:redhat:logging:5.4::el8"
] | null | 7.5 | null | null |
RHSA-2023:5724
|
Red Hat Security Advisory: Red Hat build of Quarkus security update
|
HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack)
|
[
"cpe:/a:redhat:quarkus:2.13::el8"
] | null | 7.5 | null | null |
RHSA-2018:0005
|
Red Hat Security Advisory: eap7-jboss-ec2-eap security update
|
RESTEasy: Abuse of GZIPInterceptor in RESTEasy can lead to denial of service attack undertow: HTTP Request smuggling vulnerability (incomplete fix of CVE-2017-2666) resteasy: Vary header not added by CORS filter leading to cache poisoning undertow: improper whitespace parsing leading to potential HTTP request smuggling EAP-7: Wrong privileges on multiple property files jboss: unsafe chown of server.log in jboss init script allows privilege escalation (Incomplete fix for CVE-2016-8656) Solr: Code execution via entity expansion
|
[
"cpe:/a:redhat:jboss_enterprise_application_platform:7::el6",
"cpe:/a:redhat:jboss_enterprise_application_platform:7::el7"
] | null | null | 9.8 | null |
RHSA-2016:1001
|
Red Hat Security Advisory: qemu-kvm-rhev security update
|
qemu: incorrect banked access bounds checking in vga module
|
[
"cpe:/a:redhat:openstack:7::el7"
] | null | null | 7.6 | null |
RHSA-2011:0491
|
Red Hat Security Advisory: python security update
|
expat: buffer over-read and crash on XML with malformed UTF-8 sequences python: audioop: incorrect integer overflow checks Python: Memory corruption in audioop module Python: SMTP proxy RFC 2821 module DoS (uncaught exception) (Issue #9129) (CGIHTTPServer): CGI script source code disclosure urllib2): Improper management of ftp:// and file:// URL schemes (Issue #11662)
|
[
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2017:0183
|
Red Hat Security Advisory: squid34 security update
|
squid: Information disclosure in HTTP request processing
|
[
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | 5.3 | null |
RHSA-2023:2101
|
Red Hat Security Advisory: RHUI 4.4.0 release - Security Fixes, Bug Fixes, and Enhancements Update
|
python-future: remote attackers can cause denial of service via crafted Set-Cookie header from malicious web server python-django: Potential denial-of-service via Accept-Language headers python-django: Potential denial-of-service vulnerability in file uploads
|
[
"cpe:/a:redhat:rhui:4::el8"
] | null | 7.5 | null | null |
RHSA-2003:086
|
Red Hat Security Advisory: : : : Updated file packages fix vulnerability
|
security flaw
|
[
"cpe:/o:redhat:linux:6.2",
"cpe:/o:redhat:linux:7.0",
"cpe:/o:redhat:linux:7.1",
"cpe:/o:redhat:linux:7.2",
"cpe:/o:redhat:linux:7.3",
"cpe:/o:redhat:linux:8.0"
] | null | null | null | null |
RHSA-2024:0043
|
Red Hat Security Advisory: Red Hat build of MicroShift 4.16.0 security update
|
kubernetes: kube-apiserver: bypassing mountable secrets policy imposed by the ServiceAccount admission plugin golang-protobuf: encoding/protojson, internal/encoding/json: infinite loop in protojson.Unmarshal when unmarshaling certain forms of invalid JSON
|
[
"cpe:/a:redhat:openshift:4.16::el9"
] | null | 5.9 | null | null |
RHSA-2014:0100
|
Red Hat Security Advisory: kernel-rt security and bug fix update
|
kernel: exec/ptrace: get_dumpable() incorrect tests kernel: perf/ftrace: insufficient check in perf_trace_event_perm() kernel: net: permissions flaw in /proc/sys/net Kernel: net: memory corruption with UDP_CORK and UFO Kernel: drivers: libertas: potential oops in debugfs Kernel: AACRAID Driver compat IOCTL missing capability check kernel: net: fib: fib6_add: potential NULL pointer dereference
|
[
"cpe:/a:redhat:enterprise_mrg:2:server:el6"
] | null | null | null | null |
RHSA-2024:8039
|
Red Hat Security Advisory: podman security update
|
Podman: Buildah: cri-o: FIPS Crypto-Policy Directory Mounting Issue in containers/common Go Library go/parser: golang: Calling any of the Parse functions containing deeply nested literals can cause a panic/stack exhaustion encoding/gob: golang: Calling Decoder.Decode on a message which contains deeply nested structures can cause a panic due to stack exhaustion go/build/constraint: golang: Calling Parse on a "// +build" build tag line with deeply nested expressions can cause a panic due to stack exhaustion
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 5.9 | null | null |
RHSA-2008:0974
|
Red Hat Security Advisory: acroread security update
|
acroread: crash and possible code execution Reader: JavaScript util.printf() function buffer overflow Reader: embedded font handling out-of-bounds array indexing Reader: PDF objects parsing and JavaScript getCosObj handling memory corruption flaw Reader: arbitrary code execution via unspecified JavaScript method Reader: insecure RPATH flaw Reader: Download Manager input validation flaw security flaw
|
[
"cpe:/a:redhat:rhel_extras:3",
"cpe:/a:redhat:rhel_extras:4",
"cpe:/a:redhat:rhel_extras:5::client",
"cpe:/a:redhat:rhel_extras:5::server"
] | null | null | null | null |
RHSA-2021:4036
|
Red Hat Security Advisory: binutils security update
|
environment: Unicode's bidirectional (BiDi) override characters can cause trojan source attacks
|
[
"cpe:/o:redhat:rhel_aus:7.4::server"
] | null | 8.5 | null | null |
RHSA-2021:4613
|
Red Hat Security Advisory: Red Hat JBoss Core Services Apache HTTP Server 2.4.37 SP10 security update
|
httpd: mod_proxy_wstunnel tunneling of non Upgraded connection pcre: Buffer over-read in JIT when UTF is disabled and \X or \R has fixed quantifier greater than 1 httpd: mod_proxy NULL pointer dereference pcre: Integer overflow when parsing callout numeric arguments httpd: Single zero byte stack overflow in mod_auth_digest JBCS: URL normalization issue with dot-dot-semicolon(s) leads to information disclosure openssl: Read buffer overruns processing ASN.1 strings openssl: integer overflow in CipherUpdate openssl: NULL pointer dereference in X509_issuer_and_serial_hash() httpd: mod_session: NULL pointer dereference when parsing Cookie header httpd: mod_session: Heap overflow via a crafted SessionHeader value httpd: Unexpected URL matching with 'MergeSlashes OFF' httpd: NULL pointer dereference via malformed requests
|
[
"cpe:/a:redhat:jboss_core_services:1"
] | null | 7.5 | null | null |
RHSA-2016:1435
|
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 6.4.9 update
|
tomcat: URL Normalization issue JGroups: Authorization bypass
|
[
"cpe:/a:redhat:jboss_enterprise_application_platform:6.4"
] | null | null | 9.8 | null |
RHSA-2024:0021
|
Red Hat Security Advisory: firefox security update
|
Mozilla: Heap-buffer-overflow affecting WebGL <code>DrawElementsInstanced</code> method with Mesa VM driver Mozilla: Symlinks may resolve to smaller than expected buffers Mozilla: Heap buffer overflow in <code>nsTextFragment</code> Mozilla: Use-after-free in PR_GetIdentitiesLayer Mozilla: Potential sandbox escape due to <code>VideoBridge</code> lack of texture validation Mozilla: Heap buffer overflow affected <code>nsWindow::PickerOpen(void)</code> in headless mode Mozilla: Use-after-free in <code>nsDNSService</code> Mozilla: Undefined behavior in <code>ShutdownObserver()</code> Mozilla: Memory safety bugs fixed in Firefox 121, Firefox ESR 115.6, and Thunderbird 115.6 Mozilla: Potential exposure of uninitialized data in <code>EncryptingOutputStream</code> Mozilla: Clickjacking permission prompts using the popup transition
|
[
"cpe:/a:redhat:rhel_aus:8.4::appstream",
"cpe:/a:redhat:rhel_e4s:8.4::appstream",
"cpe:/a:redhat:rhel_tus:8.4::appstream"
] | null | 6.1 | null | null |
RHSA-2012:0426
|
Red Hat Security Advisory: openssl security and bug fix update
|
openssl: CMS and PKCS#7 Bleichenbacher attack openssl: mime_param_cmp NULL dereference crash
|
[
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server",
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2013:0831
|
Red Hat Security Advisory: libvirt security and bug fix update
|
libvirt: DoS (max count of open files exhaustion) due sockets leak in the storage pool
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2007:0898
|
Red Hat Security Advisory: xorg-x11 security update
|
X.org composite extension buffer overflow
|
[
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2018:1948
|
Red Hat Security Advisory: ansible security and bug fix update
|
ansible: Failed tasks do not honour no_log option allowing for secrets to be disclosed in logs
|
[
"cpe:/a:redhat:ansible_engine:2::el7"
] | null | null | 5.9 | null |
RHSA-2024:0562
|
Red Hat Security Advisory: kernel security and bug fix update
|
hw: Intel: Gather Data Sampling (GDS) side channel vulnerability kernel: use-after-free in smb2_is_status_io_timeout() kernel: UAF during login when accessing the shost ipaddress kernel: bpf: Incorrect verifier pruning leads to unsafe code paths being incorrectly marked as safe kernel: tun: bugs for oversize packet when napi frags enabled in tun_napi_alloc_frags kernel: use after free in unix_stream_sendpage kernel: net/sched: sch_hfsc UAF kernel: use-after-free in sch_qfq network scheduler kernel: fbcon: out-of-sync arrays in fbcon_mode_deleted due to wrong con2fb_map assignment kernel: netfilter: potential slab-out-of-bound access due to integer underflow kernel: IGB driver inadequate buffer size for frames larger than MTU
|
[
"cpe:/o:redhat:rhel_aus:8.4::baseos",
"cpe:/o:redhat:rhel_e4s:8.4::baseos",
"cpe:/o:redhat:rhel_tus:8.4::baseos"
] | null | 7.5 | null | null |
RHSA-2016:2750
|
Red Hat Security Advisory: rh-php56 security, bug fix, and enhancement update
|
gd: incorrect boundary adjustment in _gdContributionsCalc php: ZipArchive:: extractTo allows for directory traversal when creating directories pcre: heap buffer overflow in compile_branch() pcre: heap buffer over-read in pcre_compile2() (8.37/23) pcre: infinite recursion compiling pattern with zero-repeated groups that include recursive back reference (8.36/19) pcre: infinite recursion compiling pattern with recursive reference in a group with indefinite repeat (8.36/20) pcre: buffer overflow caused by recursive back reference by name within certain group (8.38/4) pcre: stack overflow caused by mishandled group empty match (8.38/11) pcre: buffer overflow for forward reference within backward assertion with excess closing parenthesis (8.38/18) pcre: Buffer overflow caused by duplicate named references (8.38/36) pcre: Buffer overflow caused by repeated conditional group (8.38/3) pcre: buffer overflow caused by recursive back reference by name within certain group (8.38/4) pcre: buffer overflow caused by named forward reference to duplicate group number (8.38/30) pcre: Buffer overflow caused by lookbehind assertion (8.38/6) pcre: buffer overflow for forward reference within backward assertion with excess closing parenthesis (8.38/18) pcre: inefficient posix character class syntax check (8.38/16) pcre: buffer overflow caused by patterns with duplicated named groups with (?| (8.38/27) pcre: Buffer overflow caused by duplicate named references (8.38/36) php: type confusion issue in Soap Client call() method file: Buffer over-write in finfo_open with malformed magic file php: libxml_disable_entity_loader setting is shared between threads php: openssl_random_pseudo_bytes() is not cryptographically secure php: Stack consumption vulnerability in Zend/zend_exceptions.c gd: gdImageFillToBorder deep recursion leading to stack overflow php: Zend/zend_exceptions.c does not validate certain Exception objects gd: gdImageScaleTwoPass function in gd_interpolation.c uses inconsistent allocate and free approaches php: odbc_bindcols function mishandles driver behavior for SQL_WVARCHAR columns php: HTTP response splitting in header() function php: Out-of-bounds memory read via gdImageRotateInterpolated php: buffer overflow in handling of long link names in tar phar archives php: Signedness vulnerability causing heap overflow in libgd php: Use after free in WDDX Deserialize when processing XML data php: Out-of-bounds read in phar_parse_zipfile() php: Integer overflow in php_raw_url_encode php: Format string vulnerability in php_snmp_error() php: Invalid memory write in phar on filename containing \0 inside name php: mb_strcut() Negative size parameter in memcpy php: use of uninitialized pointer in PharFileInfo::getContent php: Uninitialized pointer in phar_make_dirstream() php: Invalid free() instead of efree() in phar_extract_file() php: bcpowmod accepts negative scale causing heap buffer overflow corrupting _one_ definition php: bcpowmod accepts negative scale causing heap buffer overflow corrupting _one_ definition php: xml_parse_into_struct() can crash when XML parser is re-used php: OOB read in grapheme_stripos and grapheme_strpos when negative offset is used php: OOB read in grapheme_stripos and grapheme_strpos when negative offset is used php: Out-of-bounds heap memory read in exif_read_data() caused by malformed input php: Out-of-bounds heap memory read in exif_read_data() caused by malformed input php: Out-of-bounds heap memory read in exif_read_data() caused by malformed input php: improper nul termination leading to out-of-bounds read in get_icu_value_internal php: Integer overflow in php_html_entities() php: Integer underflow causing arbitrary null write in fread/gzread php: out-of-bounds write in fpm_log.c php: Improper error handling in bzread() gd: Integer overflow in _gd2GetHeader() resulting in heap overflow gd: Integer Overflow in gdImagePaletteToTrueColor() resulting in heap overflow php: Double free in _php_mb_regex_ereg_replace_exec php: Int/size_t confusion in SplFileObject::fread php: Use After Free Vulnerability in PHP's GC algorithm and unserialize php: Double Free Corruption in wddx_deserialize php: ZipArchive class Use After Free Vulnerability in PHP's GC algorithm and unserialize gd: Invalid color index not properly handled php,gd: Integer overflow error within _gdContributionsAlloc() php: Buffer over-read in php_url_parse_ex php: Integer overflow leads to buffer overflow in virtual_file_ex php: Use after free in unserialize() with Unexpected Session Deserialization php: Out-of-bounds access in exif_process_IFD_in_MAKERNOTE php: Null pointer dereference in exif_process_user_comment php: Out-of-bounds access in locale_accept_from_http php: Use after free in SNMP with GC and unserialize() php: Heap buffer overflow vulnerability in simplestring_addn in simplestring.c php: Stack-based buffer overflow vulnerability in php_stream_zip_opener php: bypass __wakeup() in deserialization of an unexpected object php: Session Data Injection Vulnerability php: select_colors write out-of-bounds php: imagegammacorrect allows arbitrary write access php: Memory Leakage In exif_process_IFD_in_TIFF php: wddx_deserialize allows illegal memory access php: wddx_deserialize null dereference php: wddx_deserialize null dereference with invalid xml php: wddx_deserialize null dereference in php_wddx_pop_element
|
[
"cpe:/a:redhat:rhel_software_collections:2::el6",
"cpe:/a:redhat:rhel_software_collections:2::el7"
] | null | null | 7.5 | null |
RHSA-2004:585
|
Red Hat Security Advisory: xchat security update
|
security flaw
|
[
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws"
] | null | null | null | null |
RHEA-2017:1716
|
Red Hat Enhancement Advisory: Red Hat OpenShift Container Platform 3.6 RPM Release Advisory
|
jenkins-plugin-script-security: Unsafe methods in the default whitelist (SECURITY-538)
|
[
"cpe:/a:redhat:openshift:3.6::el7"
] | null | null | 8.8 | null |
RHSA-2004:323
|
Red Hat Security Advisory: lha security update
|
security flaw security flaw security flaw security flaw
|
[
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws"
] | null | null | null | null |
RHSA-2013:1801
|
Red Hat Security Advisory: kernel security, bug fix, and enhancement update
|
Kernel: signal: information leak in tkill/tgkill Kernel: net: memory corruption with UDP_CORK and UFO kvm: division by zero in apic_get_tmcct() kvm: cross page vapic_addr access
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2023:5783
|
Red Hat Security Advisory: Red Hat JBoss Web Server 5.7.5 release and security update
|
HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack)
|
[
"cpe:/a:redhat:jboss_enterprise_web_server:5.7::el7",
"cpe:/a:redhat:jboss_enterprise_web_server:5.7::el8",
"cpe:/a:redhat:jboss_enterprise_web_server:5.7::el9"
] | null | 7.5 | null | null |
RHSA-2021:2203
|
Red Hat Security Advisory: glib2 security update
|
glib: integer overflow in g_bytes_new function on 64-bit platforms due to an implicit cast from 64 bits to 32 bits
|
[
"cpe:/o:redhat:rhel_aus:7.2::server"
] | null | 9.8 | null | null |
RHSA-2020:0567
|
Red Hat Security Advisory: Red Hat build of Eclipse Vert.x 3.8.5 security update
|
netty: HTTP request smuggling netty: HttpObjectDecoder.java allows Content-Length header to accompanied by second Content-Length header netty: HTTP Request Smuggling due to Transfer-Encoding whitespace mishandling
|
[
"cpe:/a:redhat:openshift_application_runtimes:1.0"
] | null | 7.5 | null | null |
RHSA-2015:1664
|
Red Hat Security Advisory: nss security, bug fix, and enhancement update
|
NSS: incorrectly permited skipping of ServerKeyExchange (MFSA 2015-71) NSS: ECDSA signature validation fails to handle some signatures correctly (MFSA 2015-64)
|
[
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2016:1595
|
Red Hat Security Advisory: python-django security update
|
django: XSS in admin's add/change related popup
|
[
"cpe:/a:redhat:openstack:7::el7"
] | null | null | 6.1 | null |
RHSA-2008:0818
|
Red Hat Security Advisory: hplip security update
|
hpssd of hplip allows unprivileged user to trigger alert mail hplip hpssd.py Denial-Of-Service parsing vulnerability
|
[
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2023:1600
|
Red Hat Security Advisory: tigervnc security update
|
xorg-x11-server: X.Org Server Overlay Window Use-After-Free Local Privilege Escalation Vulnerability
|
[
"cpe:/a:redhat:rhel_e4s:8.1::appstream"
] | null | 7.8 | null | null |
RHSA-2024:6914
|
Red Hat Security Advisory: golang security update
|
net/http: Denial of service due to improper 100-continue handling in net/http encoding/gob: golang: Calling Decoder.Decode on a message which contains deeply nested structures can cause a panic due to stack exhaustion
|
[
"cpe:/a:redhat:rhel_eus:9.2::appstream"
] | null | 7.5 | null | null |
RHSA-2023:4209
|
Red Hat Security Advisory: OpenJDK 8u382 Security Update for Portable Linux Builds
|
OpenJDK: array indexing integer overflow issue (8304468) OpenJDK: improper handling of slash characters in URI-to-path conversion (8305312)
|
[
"cpe:/a:redhat:openjdk:1.8"
] | null | 3.7 | null | null |
RHSA-2023:6575
|
Red Hat Security Advisory: libtiff security update
|
libtiff: null pointer deference in LZWDecode() in libtiff/tif_lzw.c libtiff: tiffcrop: null pointer dereference in TIFFClose() libtiff: memory leak in tiffcrop.c libtiff: heap-based use after free via a crafted TIFF image in loadImage() in tiffcrop.c libtiff: Buffer Overflow in uv_encode()
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::crb"
] | null | 5.5 | null | null |
RHSA-2025:1019
|
Red Hat Security Advisory: Satellite 6.16.2 Async Update
|
grpc: Denial of Service through Data corruption in gRPC-C++
|
[
"cpe:/a:redhat:satellite:6.16::el8",
"cpe:/a:redhat:satellite:6.16::el9",
"cpe:/a:redhat:satellite_capsule:6.16::el8",
"cpe:/a:redhat:satellite_capsule:6.16::el9",
"cpe:/a:redhat:satellite_maintenance:6.16::el8",
"cpe:/a:redhat:satellite_maintenance:6.16::el9",
"cpe:/a:redhat:satellite_utils:6.16::el8",
"cpe:/a:redhat:satellite_utils:6.16::el9"
] | null | 5.3 | null | null |
RHSA-2024:6357
|
Red Hat Security Advisory: bubblewrap and flatpak security update
|
flatpak: Access to files outside sandbox for apps using persistent= (--persist)
|
[
"cpe:/a:redhat:rhel_e4s:9.0::appstream",
"cpe:/o:redhat:rhel_e4s:9.0::baseos"
] | null | 7.4 | null | null |
RHSA-2018:2742
|
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 6.4.21 security update
|
keycloak: SAML request parser replaces special strings with system properties hibernate-validator: Privilege escalation when running under the security manager tomcat: A bug in the UTF-8 decoder can lead to DoS guava: Unbounded memory allocation in AtomicDoubleArray and CompoundOrdering classes allow remote attackers to cause a denial of service
|
[
"cpe:/a:redhat:jboss_enterprise_application_platform:6::el5"
] | null | null | 5.9 | null |
RHSA-2018:0151
|
Red Hat Security Advisory: kernel security and bug fix update
|
kernel: local privesc in key management hw: cpu: speculative execution bounds-check bypass kernel: keyctl_set_reqkey_keyring() leaks thread keyrings kernel: NULL pointer dereference due to KEYCTL_READ on negative key kernel: Null pointer dereference due to incorrect node-splitting in assoc_array implementation kernel: Use-after-free in the af_packet.c
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 7.8 | null |
RHSA-2013:1410
|
Red Hat Security Advisory: Red Hat JBoss Fuse/A-MQ 6.0.0 patch 4
|
Restlet: remote code execution due to insecure XML deserialization Restlet: remote code execution due to insecure deserialization Camel: remote code execution via header field manipulation
|
[
"cpe:/a:redhat:jboss_amq:6.0.0",
"cpe:/a:redhat:jboss_fuse:6.0.0"
] | null | null | null | null |
RHSA-2019:1884
|
Red Hat Security Advisory: libssh2 security update
|
libssh2: Out-of-bounds memory comparison with specially crafted message channel request
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 7.3 | null |
RHSA-2010:0356
|
Red Hat Security Advisory: java-1.6.0-sun security update
|
Java: Java Web Start arbitrary command line injection Java: Java Web Start arbitrary command line injection
|
[
"cpe:/a:redhat:rhel_extras:4",
"cpe:/a:redhat:rhel_extras:5::client",
"cpe:/a:redhat:rhel_extras:5::server"
] | null | null | null | null |
RHSA-2012:1308
|
Red Hat Security Advisory: openssl security update
|
openssl: DTLS plaintext recovery attack openssl: double-free in policy checks openssl: uninitialized SSL 3.0 padding openssl: SGC restart DoS attack openssl: CMS and PKCS#7 Bleichenbacher attack openssl: mime_param_cmp NULL dereference crash openssl: asn1_d2i_read_bio integer errors leading to buffer overflow openssl: record length handling integer underflow
|
[
"cpe:/a:redhat:jboss_enterprise_application_platform:6.0"
] | null | null | null | null |
RHSA-2007:0002
|
Red Hat Security Advisory: XFree86 security update
|
security flaw security flaw security flaw
|
[
"cpe:/o:redhat:enterprise_linux:2.1::as",
"cpe:/o:redhat:enterprise_linux:2.1::aw",
"cpe:/o:redhat:enterprise_linux:2.1::es",
"cpe:/o:redhat:enterprise_linux:2.1::ws",
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws"
] | null | null | null | null |
RHSA-2025:1093
|
Red Hat Security Advisory: ovn23.03 security update
|
ovn: egress ACLs may be bypassed via specially crafted UDP packet
|
[
"cpe:/o:redhat:enterprise_linux:9::fastdatapath"
] | null | 8.1 | null | null |
RHSA-2005:150
|
Red Hat Security Advisory: postgresql security update
|
security flaw security flaw security flaw
|
[
"cpe:/o:redhat:enterprise_linux:2.1::as",
"cpe:/o:redhat:enterprise_linux:2.1::aw",
"cpe:/o:redhat:enterprise_linux:2.1::es",
"cpe:/o:redhat:enterprise_linux:2.1::ws"
] | null | null | null | null |
RHSA-2024:0675
|
Red Hat Security Advisory: gimp security update
|
gimp: dds buffer overflow RCE gimp: PSD buffer overflow RCE gimp: psp integer overflow RCE gimp: psp off-by-one RCE
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 7.8 | null | null |
RHSA-2020:0595
|
Red Hat Security Advisory: procps-ng security update
|
procps: Local privilege escalation in top
|
[
"cpe:/o:redhat:rhel_aus:7.4::server",
"cpe:/o:redhat:rhel_e4s:7.4::server",
"cpe:/o:redhat:rhel_tus:7.4::server"
] | null | null | 6.7 | null |
RHSA-2013:0586
|
Red Hat Security Advisory: jbosssx security update
|
JBoss: allows empty password to authenticate against LDAP
|
[
"cpe:/a:redhat:jboss_enterprise_brms_platform:5.3.1",
"cpe:/a:redhat:jboss_enterprise_portal_platform:4.3.0:update7",
"cpe:/a:redhat:jboss_enterprise_portal_platform:5.2.2",
"cpe:/a:redhat:jboss_enterprise_soa_platform:4.2.0:update5",
"cpe:/a:redhat:jboss_enterprise_soa_platform:4.3.0:update5",
"cpe:/a:redhat:jboss_enterprise_soa_platform:5.3.1"
] | null | null | null | null |
RHSA-2003:010
|
Red Hat Security Advisory: : Updated PostgreSQL packages fix buffer overrun vulnerabilities
|
security flaw security flaw security flaw security flaw security flaw security flaw
|
[
"cpe:/o:redhat:linux:6.2",
"cpe:/o:redhat:linux:7.0",
"cpe:/o:redhat:linux:7.1",
"cpe:/o:redhat:linux:7.2"
] | null | null | null | null |
RHSA-2017:2596
|
Red Hat Security Advisory: rh-maven33-groovy security update
|
groovy: remote execution of untrusted code in class MethodClosure Groovy: Remote code execution via deserialization
|
[
"cpe:/a:redhat:rhel_software_collections:2::el6",
"cpe:/a:redhat:rhel_software_collections:2::el7"
] | null | null | 9.6 | null |
RHSA-2019:0229
|
Red Hat Security Advisory: ghostscript security and bug fix update
|
ghostscript: use-after-free in copydevice handling (699661) ghostscript: access bypass in psi/zdevice2.c (700153) ghostscript: access bypass in psi/zicc.c (700169) ghostscript: access bypass in psi/zfjbig2.c (700168) ghostscript: subroutines within pseudo-operators must themselves be pseudo-operators (700317)
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 7.3 | null |
RHSA-2023:3525
|
Red Hat Security Advisory: python-flask security update
|
flask: Possible disclosure of permanent session cookie due to missing Vary: Cookie header
|
[
"cpe:/a:redhat:rhel_extras_other:7"
] | null | 7.5 | null | null |
RHSA-2024:1819
|
Red Hat Security Advisory: OpenJDK 11.0.23 Security Update for Portable Linux Builds
|
OpenJDK: long Exception message leading to crash (8319851) OpenJDK: HTTP/2 client improper reverse DNS lookup (8315708) OpenJDK: integer overflow in C1 compiler address generation (8322122) OpenJDK: Pack200 excessive memory allocation (8322114) OpenJDK: C2 compilation fails with "Exceeded _node_regs array" (8317507)
|
[
"cpe:/a:redhat:openjdk:11"
] | null | 3.7 | null | null |
RHSA-2020:4011
|
Red Hat Security Advisory: e2fsprogs security and bug fix update
|
e2fsprogs: Crafted ext4 partition leads to out-of-bounds write e2fsprogs: Out-of-bounds write in e2fsck/rehash.c
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 7.5 | 6.4 | null |
RHSA-2022:1305
|
Red Hat Security Advisory: thunderbird security update
|
Mozilla: Use-after-free in NSSToken objects Mozilla: Use-after-free after VR Process destruction Mozilla: OpenPGP revocation information was ignored Mozilla: Denial of Service via complex regular expressions Mozilla: Out of bounds write due to unexpected WebAuthN Extensions Mozilla: Use-after-free in DocumentL10n::TranslateDocument Mozilla: Incorrect AliasSet used in JIT Codegen Mozilla: iframe contents could be rendered outside the border Mozilla: Memory safety bugs fixed in Firefox 99 and Firefox ESR 91.8
|
[
"cpe:/a:redhat:rhel_eus:8.4::appstream"
] | null | 8.8 | 6.1 | null |
RHSA-2010:0149
|
Red Hat Security Advisory: kernel security and bug fix update
|
kernel: create_elf_tables can leave urandom in a bad state kernel: sctp remote denial of service kernel: ipv6: fix ip6_dst_lookup_tail() NULL pointer dereference
|
[
"cpe:/o:redhat:rhel_eus:5.3"
] | null | null | null | null |
RHSA-2022:8634
|
Red Hat Security Advisory: OpenShift API for Data Protection (OADP) 1.1.1 security and bug fix update
|
golang: crash in a golang.org/x/crypto/ssh server golang: net/http: handle server errors after sending GOAWAY golang: path/filepath: stack exhaustion in Glob golang: encoding/gob: stack exhaustion in Decoder.Decode golang: net/url: JoinPath does not strip relative path components in all circumstances
|
[
"cpe:/a:redhat:openshift_api_data_protection:1.1::el8"
] | null | 7.5 | null | null |
RHSA-2024:0119
|
Red Hat Security Advisory: libxml2 security update
|
libxml2: crafted xml can cause global buffer overflow
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 6.5 | null | null |
RHSA-2014:0486
|
Red Hat Security Advisory: java-1.7.0-ibm security update
|
libjpeg: information leak (read of uninitialized memory) libpng: unhandled zero-length PLTE chunk or NULL palette OpenJDK: Incorrect mlib/raster image validation (2D, 8027841) OpenJDK: Protect logger handlers (Libraries, 8029740) JDK: unspecified vulnerability fixed in 7u55 and 8u5 (Deployment) JDK: unspecified vulnerability fixed in 6u75, 7u55 and 8u5 (Deployment) OpenJDK: AWT incorrect FlavorMap seperation (AWT, 8026797) OpenJDK: incorrect caching of data initialized via TCCL (JAXWS, 8026801) OpenJDK: RSA unpadding timing issues (Security, 8027766) OpenJDK: Prevent SIGNATURE_PRIMITIVE_SET from being modified (Security, 8029745) OpenJDK: MethodHandle variable argument lists handling (Libraries, 8029844) OpenJDK: ServiceLoader Exception handling security bypass (Libraries, 8031394) OpenJDK: Activation framework default command map caching (JAX-WS, 8025152) lcms: insufficient ICC profile version validation (OpenJDK 2D, 8031335) OpenJDK: missing randomization of JNDI DNS client query IDs (JNDI, 8030731) OpenJDK: Better ScriptEngineManager ScriptEngine management (Libraries, 8036794) JDK: Vulnerability in the IBMSecureRandom implementation of the IBMJCE and IBMSecureRandom cryptographic providers OpenJDK: insecure temporary file use in unpack200 (Libraries, 8033618) OpenJDK: insufficient escaping of window title string (Javadoc, 8026736) JDK: unspecified vulnerability fixed in 5.0u75, 6u75, 7u55 and 8u5 (2D) OpenJDK: Incorrect NIO channel separation (Libraries, 8026716) JDK: unspecified vulnerability fixed in 6u75, 7u55 and 8u5 (Deployment) OpenJDK: AWT thread context handling (AWT, 8025010) OpenJDK: incorrect caching of data initialized via TCCL (JAXB, 8025030) JDK: unspecified vulnerability fixed in 6u75, 7u55 and 8u5 (Deployment) OpenJDK: JPEG decoder input stream handling (2D, 8029854) OpenJDK: incorrect caching of data initialized via TCCL (JAXWS, 8026188) OpenJDK: remove insecure Java Sound provider caching (Sound, 8026163) JDK: unspecified vulnerability fixed in 6u75, 7u55 and 8u5 (Deployment)
|
[
"cpe:/a:redhat:rhel_extras:5::client",
"cpe:/a:redhat:rhel_extras:5::server",
"cpe:/a:redhat:rhel_extras:6"
] | null | null | null | null |
RHSA-2024:6909
|
Red Hat Security Advisory: python3.9 security update
|
python: cpython: tarfile: ReDos via excessive backtracking while parsing header values cpython: python: email module doesn't properly quotes newlines in email headers, allowing header injection
|
[
"cpe:/a:redhat:rhel_eus:9.2::appstream",
"cpe:/a:redhat:rhel_eus:9.2::crb",
"cpe:/o:redhat:rhel_eus:9.2::baseos"
] | null | 6.8 | null | null |
RHSA-2023:6186
|
Red Hat Security Advisory: firefox security update
|
Mozilla: Queued up rendering could have allowed websites to clickjack Mozilla: Large WebGL draw could have led to a crash Mozilla: WebExtensions could open arbitrary URLs Mozilla: Improper object tracking during GC in the JavaScript engine could have led to a crash. Mozilla: Memory safety bugs fixed in Firefox 119, Firefox ESR 115.4, and Thunderbird 115.4 Mozilla: Address bar spoofing via bidirectional characters libvpx: crash related to VP9 encoding in libvpx
|
[
"cpe:/a:redhat:rhel_eus:8.6::appstream"
] | null | 7.5 | null | null |
RHSA-2023:1673
|
Red Hat Security Advisory: httpd:2.4 security update
|
httpd: HTTP request splitting with mod_rewrite and mod_proxy
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 9.8 | null | null |
RHSA-2021:2689
|
Red Hat Security Advisory: Red Hat AMQ Broker 7.8.2 release and security update
|
jetty: request containing multiple Accept headers with a large number of "quality" parameters may lead to DoS Broker: discloses JDBC username and password in the application log file netty: Information disclosure via the local system temporary directory netty: possible request smuggling in HTTP/2 due missing validation netty: Request smuggling via content-length header jetty: Symlink directory exposes webapp directory contents jetty: Ambiguous paths can access WEB-INF jetty: Resource exhaustion when receiving an invalid large TLS frame
|
[
"cpe:/a:redhat:amq_broker:7"
] | null | 7.5 | null | null |
RHSA-2017:0259
|
Red Hat Security Advisory: nagios security update
|
nagios: Command injection via curl in MagpieRSS nagios: Privilege escalation issue
|
[
"cpe:/a:redhat:storage:3.1:nagios:el6",
"cpe:/a:redhat:storage:3.1:server:el6"
] | null | null | 7.3 | null |
RHBA-2021:0624
|
Red Hat Bug Fix Advisory: microcode_ctl bug fix and enhancement update
|
hw: Vector Register Leakage-Active
|
[
"cpe:/o:redhat:rhel_eus:8.1::baseos"
] | null | 2.8 | null | null |
RHSA-2005:329
|
Red Hat Security Advisory: XFree86 security update
|
security flaw
|
[
"cpe:/o:redhat:enterprise_linux:2.1::as",
"cpe:/o:redhat:enterprise_linux:2.1::aw",
"cpe:/o:redhat:enterprise_linux:2.1::es",
"cpe:/o:redhat:enterprise_linux:2.1::ws"
] | null | null | null | null |
RHSA-2021:2285
|
Red Hat Security Advisory: kpatch-patch security update
|
kernel: Use after free via PI futex state
|
[
"cpe:/o:redhat:enterprise_linux:7::server"
] | null | 7 | null | null |
RHSA-2020:2638
|
Red Hat Security Advisory: gnutls security update
|
gnutls: session resumption works without master key allowing MITM
|
[
"cpe:/a:redhat:rhel_eus:8.1::appstream",
"cpe:/o:redhat:rhel_eus:8.1::baseos"
] | null | 7.4 | null | null |
RHSA-2012:1573
|
Red Hat Security Advisory: JBoss Enterprise BRMS Platform 5.3.1 update
|
apache-cxf: Apache CXF does not verify that elements were signed / encrypted by a particular Supporting Token
|
[
"cpe:/a:redhat:jboss_enterprise_brms_platform:5.3"
] | null | null | null | null |
RHSA-2022:0304
|
Red Hat Security Advisory: java-1.8.0-openjdk security update
|
OpenJDK: Incomplete deserialization class filtering in ObjectInputStream (Serialization, 8264934) OpenJDK: Insufficient URI checks in the XSLT TransformerImpl (JAXP, 8270492) OpenJDK: Unexpected exception thrown in regex Pattern (Libraries, 8268813) OpenJDK: Incomplete checks of StringBuffer and StringBuilder during deserialization (Libraries, 8270392) OpenJDK: Incorrect IdentityHashMap size checks during deserialization (Libraries, 8270416) OpenJDK: Incorrect access checks in XMLEntityManager (JAXP, 8270498) OpenJDK: Infinite loop related to incorrect handling of newlines in XMLEntityScanner (JAXP, 8270646) OpenJDK: Array indexing issues in LIRGenerator (Hotspot, 8272014) OpenJDK: Excessive resource use when reading JAR manifest attributes (Libraries, 8272026) OpenJDK: Insufficient checks when deserializing exceptions in ObjectInputStream (Serialization, 8272236) OpenJDK: Excessive memory allocation in BMPImageReader (ImageIO, 8273756) OpenJDK: Integer overflow in BMPImageReader (ImageIO, 8273838)
|
[
"cpe:/a:redhat:rhel_e4s:8.1::appstream"
] | null | 5.3 | null | null |
RHSA-2020:2048
|
Red Hat Security Advisory: thunderbird security update
|
usrsctp: Buffer overflow in AUTH chunk input validation Mozilla: Use-after-free during worker shutdown Mozilla: Arbitrary local file access with 'Copy as cURL' Mozilla: Memory safety bugs fixed in Firefox 76 and Firefox ESR 68.8 Mozilla: Sender Email Address Spoofing using encoded Unicode characters
|
[
"cpe:/a:redhat:rhel_e4s:8.0::appstream"
] | null | 4.3 | 6.1 | null |
RHSA-2014:0704
|
Red Hat Security Advisory: qemu-kvm security and bug fix update
|
QEMU: out of bounds buffer accesses, guest triggerable via IDE SMART
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | null | null |
RHSA-2024:0968
|
Red Hat Security Advisory: firefox security update
|
Mozilla: Out-of-bounds memory read in networking channels Mozilla: Alert dialog could have been spoofed on another site Mozilla: Fullscreen Notification could have been hidden by select element Mozilla: Custom cursor could obscure the permission dialog Mozilla: Mouse cursor re-positioned unexpectedly could have led to unintended permission grants Mozilla: Multipart HTTP Responses would accept the Set-Cookie header in response parts Mozilla: Incorrect code generation on 32-bit ARM devices Mozilla: Memory safety bugs fixed in Firefox 123, Firefox ESR 115.8, and Thunderbird 115.8
|
[
"cpe:/a:redhat:rhel_eus:9.0::appstream"
] | null | 7.5 | null | null |
RHSA-2011:0837
|
Red Hat Security Advisory: gimp security update
|
Gimp: Integer overflow in the BMP image file plugin Gimp: Stack-based buffer overflow in SphereDesigner plug-in Gimp: Heap-based buffer overflow in Paint Shop Pro (PSP) plug-in Gimp: Integer overflow in the PCX image file plug-in
|
[
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2023:6785
|
Red Hat Security Advisory: Machine Deletion Remediation Operator 0.2.1 security update
|
golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487) HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack)
|
[
"cpe:/a:redhat:workload_availability_machine_deletion_remediation:0.2::el8"
] | null | 7.5 | null | null |
RHSA-2024:8168
|
Red Hat Security Advisory: fence-agents security update
|
pypa/setuptools: Remote code execution via download functions in the package_index module in pypa/setuptools
|
[
"cpe:/a:redhat:rhel_eus:8.8::appstream",
"cpe:/a:redhat:rhel_eus:8.8::highavailability",
"cpe:/a:redhat:rhel_eus:8.8::resilientstorage"
] | null | 8.8 | null | null |
RHSA-2020:2730
|
Red Hat Security Advisory: qemu-kvm-rhev security update
|
QEMU: slirp: OOB buffer access while emulating tcp protocols in tcp_emu() QEMU: Slirp: potential OOB access due to unsafe snprintf() usages
|
[
"cpe:/a:redhat:openstack:13::el7"
] | null | 5.6 | null | null |
RHSA-2023:2085
|
Red Hat Security Advisory: libwebp security update
|
Mozilla: libwebp: Double-free in libwebp
|
[
"cpe:/a:redhat:rhel_eus:8.6::appstream"
] | null | 7.5 | null | null |
RHSA-2014:1193
|
Red Hat Security Advisory: axis security update
|
axis: SSL hostname verification bypass, incomplete CVE-2012-5784 fix
|
[
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server",
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2013:0729
|
Red Hat Security Advisory: haproxy security update
|
haproxy: rewrite rules flaw can lead to arbitrary code execution
|
[
"cpe:/a:redhat:openshift:1::el6"
] | null | null | null | null |
RHSA-2017:1680
|
Red Hat Security Advisory: bind security and bug fix update
|
bind: An error in TSIG authentication can permit unauthorized zone transfers bind: An error in TSIG authentication can permit unauthorized dynamic updates
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 7.5 | null |
RHSA-2022:6389
|
Red Hat Security Advisory: rh-nodejs14-nodejs and rh-nodejs14-nodejs-nodemon security and bug fix update
|
nodejs: DNS rebinding in --inspect via invalid IP addresses nodejs: HTTP request smuggling due to flawed parsing of Transfer-Encoding nodejs: HTTP request smuggling due to improper delimiting of header fields nodejs: HTTP request smuggling due to incorrect parsing of multi-line Transfer-Encoding nodejs-got: missing verification of requested URLs allows redirects to UNIX sockets
|
[
"cpe:/a:redhat:rhel_software_collections:3::el7"
] | null | 5.3 | null | null |
RHSA-2024:1013
|
Red Hat Security Advisory: edk2 security update
|
edk2: Buffer overflow in the DHCPv6 client via a long Server ID option
|
[
"cpe:/a:redhat:rhel_aus:8.4::appstream",
"cpe:/a:redhat:rhel_e4s:8.4::appstream",
"cpe:/a:redhat:rhel_tus:8.4::appstream"
] | null | 8.8 | null | null |
RHSA-2023:5715
|
Red Hat Security Advisory: nginx:1.20 security update
|
HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack)
|
[
"cpe:/a:redhat:rhel_eus:8.6::appstream"
] | null | 7.5 | null | null |
RHSA-2021:2292
|
Red Hat Security Advisory: container-tools:2.0 security update
|
runc: vulnerable to symlink exchange attack
|
[
"cpe:/a:redhat:rhel_eus:8.2::appstream"
] | null | 7.5 | null | null |
RHSA-2021:1675
|
Red Hat Security Advisory: libdb security update
|
libdb: Denial of service in the Data Store component
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb",
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 3.3 | null | null |
RHSA-2023:7711
|
Red Hat Security Advisory: apr security update
|
apr: integer overflow/wraparound in apr_encode
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 6.5 | null | null |
RHSA-2016:1985
|
Red Hat Security Advisory: thunderbird security update
|
Mozilla: Memory safety bugs fixed in Firefox ESR 45.4 (MFSA 2016-85, MFSA 2016-86)
|
[
"cpe:/a:redhat:rhel_productivity:5",
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation",
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 9.8 | null |
RHSA-2020:3841
|
Red Hat Security Advisory: OpenShift Container Platform 4.5.13 jenkins security update
|
jetty: double release of resource can lead to information disclosure jenkins: user-specified tooltip values leads to stored cross-site scripting jenkins: stored XSS vulnerability in project naming strategy jenkins: stored XSS vulnerability in 'trigger builds remotely'
|
[
"cpe:/a:redhat:openshift:4.5::el7"
] | null | 5.4 | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.