id
stringlengths 13
15
| title
stringlengths 29
176
| description
stringlengths 8
32.1k
| cpes
listlengths 0
20
| cvss_v4_0
null | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
null |
---|---|---|---|---|---|---|---|
RHSA-2022:2232
|
Red Hat Security Advisory: Red Hat Data Grid 8.3.1 security update
|
jackson-databind: denial of service via a large depth of nested objects Kafka: Timing Attack Vulnerability for Apache Kafka Connect and Clients xnio: org.xnio.StreamConnection.notifyReadClosed log to debug instead of stderr
|
[
"cpe:/a:redhat:jboss_data_grid:8"
] | null | 7.5 | null | null |
RHSA-2015:0416
|
Red Hat Security Advisory: 389-ds-base security, bug fix, and enhancement update
|
389-ds-base: information disclosure through 'cn=changelog' subtree 389-ds-base: password hashing bypassed when "nsslapd-unhashed-pw-switch" is set to off
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | null | null |
RHSA-2020:5246
|
Red Hat Security Advisory: rh-mariadb103-mariadb and rh-mariadb103-galera security update
|
mysql: Server: Replication unspecified vulnerability (CPU Apr 2019) mysql: Server: Security: Privileges unspecified vulnerability (CPU Apr 2019) mysql: InnoDB unspecified vulnerability (CPU Apr 2019) mysql: Server: Pluggable Auth unspecified vulnerability (CPU Jul 2019) mysql: Server: Security: Privileges unspecified vulnerability (CPU Jul 2019) mysql: Server: XML unspecified vulnerability (CPU Jul 2019) mysql: InnoDB unspecified vulnerability (CPU Jul 2019) mysql: Server: Parser unspecified vulnerability (CPU Jul 2019) mysql: InnoDB unspecified vulnerability (CPU Oct 2019) mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2019) mysql: C API unspecified vulnerability (CPU Jan 2020) mysql: C API unspecified vulnerability (CPU Apr 2020) mysql: InnoDB unspecified vulnerability (CPU Apr 2020) mysql: Server: DML unspecified vulnerability (CPU Apr 2020) mysql: Server: Stored Procedure unspecified vulnerability (CPU Apr 2020) mysql: InnoDB unspecified vulnerability (CPU Apr 2020) mysql: C API unspecified vulnerability (CPU Apr 2020) mariadb-connector-c: Improper validation of content in a OK packet received from server mysql: Server: FTS unspecified vulnerability (CPU Oct 2020) mysql: InnoDB unspecified vulnerability (CPU Oct 2020) mysql: Server: FTS unspecified vulnerability (CPU Oct 2020) mysql: Server: Locking unspecified vulnerability (CPU Oct 2020) mariadb: Insufficient SST method name check leading to code injection in mysql-wsrep mysql: C API unspecified vulnerability (CPU Jan 2021) mysql: InnoDB unspecified vulnerability (CPU Jan 2021) mysql: Server: Parser unspecified vulnerability (CPU Apr 2021) mysql: InnoDB unspecified vulnerability (CPU Apr 2021)
|
[
"cpe:/a:redhat:rhel_software_collections:3::el7"
] | null | 4.9 | 3.7 | null |
RHSA-2005:348
|
Red Hat Security Advisory: mysql-server security update
|
security flaw security flaw security flaw
|
[
"cpe:/a:redhat:rhel_extras:3"
] | null | null | null | null |
RHSA-2022:2198
|
Red Hat Security Advisory: rsync security update
|
zlib: A flaw found in zlib when compressing (not decompressing) certain inputs
|
[
"cpe:/o:redhat:rhel_eus:8.4::baseos"
] | null | 8.2 | null | null |
RHSA-2024:2236
|
Red Hat Security Advisory: libvirt security update
|
libvirt: NULL pointer dereference in udevConnectListAllInterfaces()
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::crb"
] | null | 5 | null | null |
RHSA-2024:0712
|
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.4.15 security update
|
jgit: arbitrary file overwrite santuario: Private Key disclosure in debug-log output
|
[
"cpe:/a:redhat:jboss_enterprise_application_platform:7.4::el9"
] | null | 6.5 | null | null |
RHSA-2022:0949
|
Red Hat Security Advisory: virt:av and virt-devel:av security and bug fix update
|
QEMU: virtiofsd: potential privilege escalation via CVE-2018-13405 libnbd: nbdcopy: missing error handling may create corrupted destination image
|
[
"cpe:/a:redhat:advanced_virtualization:8.5::el8"
] | null | 4.8 | null | null |
RHSA-2018:3681
|
Red Hat Security Advisory: rh-nginx114-nginx security update
|
nginx: Excessive memory consumption via flaw in HTTP/2 implementation nginx: Excessive CPU usage via flaw in HTTP/2 implementation nginx: Denial of service and memory disclosure via mp4 module
|
[
"cpe:/a:redhat:rhel_software_collections:3::el7"
] | null | null | 8.2 | null |
RHSA-2020:1516
|
Red Hat Security Advisory: java-1.8.0-openjdk security update
|
OpenJDK: Misplaced regular expression syntax error check in RegExpScanner (Scripting, 8223898) OpenJDK: Incorrect handling of empty string nodes in regular expression Parser (Scripting, 8223904) OpenJDK: Incorrect handling of references to uninitialized class descriptors during deserialization (Serialization, 8224541) OpenJDK: Uncaught InstantiationError exception in ObjectStreamClass (Serialization, 8224549) OpenJDK: Unexpected exceptions raised by DOMKeyInfoFactory and DOMXMLSignatureFactory (Security, 8231415) OpenJDK: Re-use of single TLS session for new connections (JSSE, 8234408) OpenJDK: CRLF injection into HTTP headers in HttpServer (Lightweight HTTP Server, 8234825) OpenJDK: Incorrect bounds checks in NIO Buffers (Libraries, 8234841) OpenJDK: Incorrect type checks in MethodType.readObject() (Libraries, 8235274) OpenJDK: Regular expression DoS in Scanner (Concurrency, 8236201)
|
[
"cpe:/a:redhat:rhel_e4s:8.0::appstream"
] | null | 5.3 | null | null |
RHSA-2024:5644
|
Red Hat Security Advisory: cups security update
|
cups: Cupsd Listen arbitrary chmod 0140777
|
[
"cpe:/a:redhat:rhel_eus:9.2::appstream",
"cpe:/o:redhat:rhel_eus:9.2::baseos"
] | null | 4.4 | null | null |
RHSA-2018:0380
|
Red Hat Security Advisory: Red Hat CloudForms security, bug fix, and enhancement update
|
rubygem-i18n: cross-site scripting flaw in exception handling cloudforms: XSS in self-service UI snapshot feature
|
[
"cpe:/a:redhat:cloudforms_managementengine:5.9::el7"
] | null | null | 6.5 | null |
RHSA-2023:5541
|
Red Hat Security Advisory: Logging Subsystem 5.6.12 - Red Hat OpenShift security update
|
tough-cookie: prototype pollution in cookie memstore golang: net/http: insufficient sanitization of Host header golang: crypto/tls: slow verification of certificate chains containing large RSA keys golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487) HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack)
|
[
"cpe:/a:redhat:logging:5.6::el8"
] | null | 7.5 | null | null |
RHSA-2024:1428
|
Red Hat Security Advisory: postgresql security update
|
postgresql: non-owner 'REFRESH MATERIALIZED VIEW CONCURRENTLY' executes arbitrary SQL
|
[
"cpe:/a:redhat:rhel_eus:8.8::appstream"
] | null | 8 | null | null |
RHSA-2017:3456
|
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.1.0 security update
|
Artemis: Deserialization of untrusted input vulnerability eap: HTTP header injection / response splitting EAP7 Privilege escalation when managing domain including earlier version slaves EAP7: Internal IP address disclosed on redirect when request header Host field is not set undertow: Long URL proxy request lead to java.nio.BufferOverflowException and DoS EAP: Sensitive data can be exposed at the server level in domain mode admin-cli: Any local users can connect to jboss-cli admin-cli: Potential EAP resource starvation DOS attack via GET requests for server log files wildfly: ParseState headerValuesCache can be exploited to fill heap with garbage wildfly: Arbitrary file read via path traversal undertow: HTTP Request smuggling vulnerability due to permitting invalid characters in HTTP requests undertow: IO thread DoS via unclean Websocket closing jackson-databind: Deserialization vulnerability via readValue method of ObjectMapper hibernate-validator: Privilege escalation when running under the security manager undertow: HTTP Request smuggling vulnerability (incomplete fix of CVE-2017-2666) undertow: improper whitespace parsing leading to potential HTTP request smuggling EAP-7: Wrong privileges on multiple property files
|
[
"cpe:/a:redhat:jboss_enterprise_application_platform:7"
] | null | null | 5.5 | null |
RHSA-2020:1541
|
Red Hat Security Advisory: Ansible security and bug fix update (2.9.7)
|
ansible: insecure temporary directory when running become_user from become directive ansible: path injection on dest parameter in fetch module ansible: Extract-Zip function in win_unzip module does not check extracted path ansible: svn module leaks password when specified as a parameter ansible: secrets readable after ansible-vault edit ansible: Information disclosure issue in ldap_attr and ldap_entry modules Ansible: kubectl connection plugin leaks sensitive information Ansible: code injection when using ansible_facts as a subkey Ansible: modules which use files encrypted with vault are not properly cleaned up Ansible: archive traversal vulnerability in ansible-galaxy collection install
|
[
"cpe:/a:redhat:ansible_engine:2.9::el7",
"cpe:/a:redhat:ansible_engine:2.9::el8"
] | null | 5.2 | null | null |
RHSA-2015:1320
|
Red Hat Security Advisory: ppc64-diag security, bug fix and enhancement update
|
ppc64-diag: multiple temporary file races ppc64-diag: multiple temporary file races
|
[
"cpe:/o:redhat:enterprise_linux:6::server"
] | null | null | null | null |
RHSA-2017:1417
|
Red Hat Security Advisory: rh-java-common-log4j security update
|
log4j: Socket receiver deserialization vulnerability
|
[
"cpe:/a:redhat:rhel_software_collections:2::el6",
"cpe:/a:redhat:rhel_software_collections:2::el7"
] | null | null | 8.1 | null |
RHSA-2020:3017
|
Red Hat Security Advisory: Red Hat support for Spring Boot 2.1.15 security and bug fix update
|
keycloak: Lack of checks in ObjectInputStream leading to Remote Code Execution tomcat: deserialization flaw in session persistence storage leading to RCE
|
[
"cpe:/a:redhat:openshift_application_runtimes:1.0"
] | null | 7 | 7.5 | null |
RHSA-2023:5604
|
Red Hat Security Advisory: kernel security and bug fix update
|
kernel: hash collisions in the IPv6 connection lookup table kernel: Spectre v2 SMT mitigations problem kernel: fbcon: shift-out-of-bounds in fbcon_set_font() kernel: net/sched: Use-after-free vulnerabilities in the net/sched classifiers: cls_fw, cls_u32 and cls_route kernel: denial of service problem in net/unix/diag.c kernel: nf_tables: use-after-free in nft_chain_lookup_byid() kernel: nf_tables: stack-out-of-bounds-read in nft_byteorder_eval() kernel: cls_flower: out-of-bounds write in fl_set_geneve_opt()
|
[
"cpe:/a:redhat:rhel_eus:9.0::appstream",
"cpe:/a:redhat:rhel_eus:9.0::crb",
"cpe:/o:redhat:rhel_eus:9.0::baseos"
] | null | 7.8 | 5.6 | null |
RHSA-2025:1931
|
Red Hat Security Advisory: Red Hat Developer Hub 1.4.2 release.
|
undici: Undici Uses Insufficiently Random Values
|
[
"cpe:/a:redhat:rhdh:1.4::el9"
] | null | 6.8 | null | null |
RHSA-2023:6171
|
Red Hat Security Advisory: Red Hat Product OCP Tools 4.11 Openshift Jenkins security update
|
SnakeYaml: Constructor Deserialization Remote Code Execution maven-shared-utils: Command injection via Commandline class apache-commons-text: variable interpolation RCE jenkins-2-plugins/script-security: Sandbox bypass vulnerability in Script Security Plugin jenkins-2-plugins/JUnit: Stored XSS vulnerability in JUnit Plugin jenkins-2-plugins/pipeline-build-step: Stored XSS vulnerability in Pipeline: Build Step Plugin Jenkins: Temporary file parameter created with insecure permissions Jenkins: Information disclosure through error stack traces related to agents golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487)
|
[
"cpe:/a:redhat:ocp_tools:4.11::el8"
] | null | 7.5 | null | null |
RHSA-2023:7267
|
Red Hat Security Advisory: open-vm-tools security update
|
open-vm-tools: SAML token signature bypass open-vm-tools: file descriptor hijack vulnerability in the vmware-user-suid-wrapper
|
[
"cpe:/a:redhat:rhel_eus:9.0::appstream"
] | null | 7.4 | null | null |
RHSA-2002:259
|
Red Hat Security Advisory: sendmail security update
|
security flaw
|
[
"cpe:/o:redhat:enterprise_linux:2.1::as",
"cpe:/o:redhat:enterprise_linux:2.1::aw"
] | null | null | null | null |
RHSA-2020:2413
|
Red Hat Security Advisory: OpenShift Container Platform 4.5 package security update
|
kubernetes: credential leak in kube-controller-manager via error messages in mount failure logs and events for AzureFile and CephFS volumes kubernetes: Denial of service in API server via crafted YAML payloads by authorized users kubernetes: node localhost services reachable via martian packets proglottis/gpgme: Use-after-free in GPGME bindings during container image pull golang.org/x/crypto: Processing of crafted ssh-ed25519 public keys allows for panic
|
[
"cpe:/a:redhat:openshift:4.5::el7",
"cpe:/a:redhat:openshift:4.5::el8"
] | null | 5.3 | null | null |
RHSA-2021:3173
|
Red Hat Security Advisory: kernel security update
|
kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c kernel: race condition for removal of the HCI controller
|
[
"cpe:/a:redhat:rhel_eus:8.1::crb",
"cpe:/o:redhat:rhel_eus:8.1::baseos"
] | null | 7 | null | null |
RHSA-2024:6846
|
Red Hat Security Advisory: pcp security update
|
pcp: pmcd heap corruption through metric pmstore operations pcp: pmpost symlink attack allows escalating pcp to root user
|
[
"cpe:/a:redhat:rhel_e4s:9.0::appstream"
] | null | 4.4 | null | null |
RHSA-2025:1309
|
Red Hat Security Advisory: gcc-toolset-13-gcc security update
|
jquery: Untrusted code execution via <option> tag in HTML passed to DOM manipulation methods
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 6.1 | null | null |
RHSA-2024:10142
|
Red Hat Security Advisory: OpenShift Container Platform 4.15.39 bug fix and security update
|
golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487)
|
[
"cpe:/a:redhat:openshift:4.15::el8",
"cpe:/a:redhat:openshift:4.15::el9"
] | null | 7.5 | null | null |
RHSA-2019:2196
|
Red Hat Security Advisory: zziplib security update
|
zziplib: Bus error caused by loading of a misaligned address inzzip/zip.c zziplib: Memory leak triggered in the function __zzip_parse_root_directory in zip.c
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 4 | null |
RHSA-2005:345
|
Red Hat Security Advisory: slocate security update
|
security flaw
|
[
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws"
] | null | null | null | null |
RHSA-2022:7128
|
Red Hat Security Advisory: postgresql:12 security update
|
postgresql: Extension scripts replace objects not belonging to the extension.
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 7.1 | null | null |
RHSA-2009:1636
|
Red Hat Security Advisory: JBoss Enterprise Application Platform 4.3.0.CP07 update
|
xml-security-1.3.0-1jpp.ep1.*: XMLDsig HMAC-based signatures spoofing and authentication bypass jbossas JMX-Console cross-site-scripting in filter parameter JBoss Application Server Web Console XSS JDK: XML parsing Denial-Of-Service (6845701) JBoss EAP Twiddle logs the JMX password
|
[
"cpe:/a:redhat:jboss_enterprise_application_platform:4.3.0::el4"
] | null | null | null | null |
RHSA-2009:0331
|
Red Hat Security Advisory: kernel security and bug fix update
|
kernel: enforce a minimum SG_IO timeout kernel: local denial of service in keyctl_join_session_keyring kernel: sctp: memory overflow when FWD-TSN chunk is received with bad stream ID kernel: dell_rbu local oops
|
[
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2019:3158
|
Red Hat Security Advisory: java-1.7.0-openjdk security update
|
OpenJDK: Missing restrictions on use of custom SocketImpl (Networking, 8218573) OpenJDK: NULL pointer dereference in DrawGlyphList (2D, 8222690) OpenJDK: Unexpected exception thrown by Pattern processing crafted regular expression (Concurrency, 8222684) OpenJDK: Unexpected exception thrown by XPathParser processing crafted XPath expression (JAXP, 8223505) OpenJDK: Incorrect handling of nested jar: URLs in Jar URL handler (Networking, 8223892) OpenJDK: Unexpected exception thrown by XPath processing crafted XPath expression (JAXP, 8224532) OpenJDK: Unexpected exception thrown during Font object deserialization (Serialization, 8224915) OpenJDK: Missing glyph bitmap image dimension check in FreetypeFontScaler (2D, 8225286) OpenJDK: Integer overflow in bounds check in SunGraphics2D (2D, 8225292) OpenJDK: Incorrect handling of HTTP proxy responses in HttpURLConnection (Networking, 8225298) OpenJDK: Excessive memory allocation in CMap when reading TrueType font (2D, 8225597) OpenJDK: Insufficient filtering of HTML event attributes in Javadoc (Javadoc, 8226765)
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | 4.7 | null |
RHSA-2024:8064
|
Red Hat Security Advisory: Red Hat Build of Apache Camel 4.4.3 for Spring Boot security update.
|
nimbus-jose-jwt: large JWE p2c header value causes Denial of Service org.springframework:spring-web: Spring Framework DoS via conditional HTTP request spring-webmvc: Path Traversal Vulnerability in Spring Applications Using RouterFunctions and FileSystemResource org.hl7.fhir.core: org.hl7.fhir.dstu3: org.hl7.fhir.r4: org.hl7.fhir.r4b: org.hl7.fhir.r5: org.hl7.fhir.utilities: XXE vulnerability in XSLT transforms in `org.hl7.fhir.core` apache-avro: Schema parsing may trigger Remote Code Execution (RCE)
|
[
"cpe:/a:redhat:apache_camel_spring_boot:4.4.3"
] | null | 8.8 | null | null |
RHSA-2020:3038
|
Red Hat Security Advisory: thunderbird security update
|
Mozilla: Memory corruption due to missing sign-extension for ValueTags on ARM64 Mozilla: Information disclosure due to manipulated URL object Mozilla: Use-after-free in nsGlobalWindowInner Mozilla: Use-After-Free when trying to connect to a STUN server Mozilla: Add-On updates did not respect the same certificate trust rules as software updates Mozilla: Automatic account setup leaks Microsoft Exchange login credentials
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 5.9 | 6.1 | null |
RHSA-2018:0414
|
Red Hat Security Advisory: 389-ds-base security and bug fix update
|
389-ds-base: Authentication bypass due to lack of size check in slapi_ct_memcmp function in ch_malloc.c 389-ds-base: remote Denial of Service (DoS) via search filters in SetUnicodeStringFromUTF_8 in collate.c
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 7.5 | null |
RHSA-2023:5587
|
Red Hat Security Advisory: virt:rhel security update
|
NTFS-3G: buffer overflow issue in NTFS-3G can cause code execution via crafted metadata in an NTFS image QEMU: VNC: improper I/O watch removal in TLS handshake can lead to remote unauthenticated denial of service
|
[
"cpe:/a:redhat:rhel_aus:8.2::appstream",
"cpe:/a:redhat:rhel_e4s:8.2::appstream",
"cpe:/a:redhat:rhel_tus:8.2::appstream"
] | null | 7.5 | null | null |
RHSA-2005:864
|
Red Hat Security Advisory: udev security update
|
security flaw
|
[
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2016:1985
|
Red Hat Security Advisory: thunderbird security update
|
Mozilla: Memory safety bugs fixed in Firefox ESR 45.4 (MFSA 2016-85, MFSA 2016-86)
|
[
"cpe:/a:redhat:rhel_productivity:5",
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation",
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 9.8 | null |
RHSA-2025:1736
|
Red Hat Security Advisory: postgresql:13 security update
|
postgresql: PostgreSQL quoting APIs miss neutralizing quoting syntax in text that fails encoding validation
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 8.1 | null | null |
RHSA-2009:0350
|
Red Hat Security Advisory: php security update
|
php: buffer overflow in the imageloadfont function in gd extension php: FastCGI module DoS via multiple dots preceding the extension php: libgd imagerotate() array index error memory disclosure php: Heap-based buffer overflow in the mbstring extension via crafted string containing a HTML entity (arb code execution) php: ZipArchive:: extractTo() Directory Traversal Vulnerability php: XSS via PHP error messages PHP mbstring.func_overload web server denial of service php: crash on malformed input in json_decode()
|
[
"cpe:/a:redhat:rhel_application_stack:2"
] | null | null | null | null |
RHSA-2023:5726
|
Red Hat Security Advisory: OpenJDK 8u392 Windows Security Update
|
OpenJDK: IOR deserialization issue in CORBA (8303384) OpenJDK: certificate path validation issue during client authentication (8309966)
|
[
"cpe:/a:redhat:openjdk:1.8::windows"
] | null | 5.3 | null | null |
RHSA-2023:6403
|
Red Hat Security Advisory: httpd and mod_http2 security, bug fix, and enhancement update
|
httpd: mod_proxy_uwsgi HTTP response splitting
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 7.5 | null | null |
RHSA-2011:0886
|
Red Hat Security Advisory: thunderbird security update
|
Mozilla Multiple dangling pointer vulnerabilities (MFSA 2011-23) Mozilla Multiple dangling pointer vulnerabilities (MFSA 2011-23) Mozilla Cookie isolation error (MFSA 2011-24) Mozilla Multiple dangling pointer vulnerabilities (MFSA 2011-23) Mozilla Miscellaneous memory safety hazards (MFSA 2011-19) Mozilla Miscellaneous memory safety hazards (MFSA 2011-19) Mozilla Miscellaneous memory safety hazards (MFSA 2011-19) Mozilla Miscellaneous memory safety hazards (MFSA 2011-19) Mozilla Miscellaneous memory safety hazards (MFSA 2011-19) Mozilla Crash caused by corrupted JPEG image (MFSA 2011-21) Mozilla Miscellaneous memory safety hazards (MFSA 2011-19)
|
[
"cpe:/o:redhat:enterprise_linux:6::server"
] | null | null | null | null |
RHSA-2015:1243
|
Red Hat Security Advisory: java-1.6.0-sun security update
|
OpenJDK: deserialization issue in ObjectInputStream.readSerialData() (Libraries, 8076401) OpenJDK: non-constant time comparisons in crypto code (JCE, 8074865) OpenJDK: incorrect code permission checks in RMIConnectionImpl (JMX, 8075853) OpenJDK: name for reverse DNS lookup used in certificate identity check (JSSE, 8067694) JDK: unspecified vulnerability fixed in 6u101, 7u85 and 8u51 (Install) OpenJDK: IIOPInputStream type confusion vulnerability (CORBA, 8076376) ICU: integer overflow in LETableReference verifyLength() (OpenJDK 2D, 8077520) JDK: unspecified vulnerability fixed in 6u101, 7u85 and 8u51 (2D) JDK: unspecified vulnerability fixed in 6u101, 7u85 and 8u51 (2D) JDK: unspecified vulnerability fixed in 6u101, 7u85 and 8u51 (Deployment) SSL/TLS: "Invariance Weakness" vulnerability in RC4 stream cipher LOGJAM: TLS connections which support export grade DHE key-exchange are vulnerable to MITM attacks OpenJDK: improper permission checks in MBeanServerInvocationHandler (JMX, 8076397) OpenJDK: insufficient context checks during object deserialization (Libraries, 8076405) OpenJDK: RemoteObjectInvocationHandler allows calling finalize() (RMI, 8076409) OpenJDK: incorrect OCSP nextUpdate checking (Libraries, 8075374) OpenJDK: DnsClient fails to release request information after error (JNDI, 8075378) ICU: missing boundary checks in layout engine (OpenJDK 2D, 8071715)
|
[
"cpe:/a:redhat:rhel_extras_oracle_java:5",
"cpe:/a:redhat:rhel_extras_oracle_java:6",
"cpe:/a:redhat:rhel_extras_oracle_java:7"
] | null | null | 3.7 | null |
RHSA-2024:6497
|
Red Hat Security Advisory: Red Hat Single Sign-On 7.6.10 for OpenShift image enhancement update
|
keycloak: potential bypass of brute force protection keycloak: Leak of configured LDAP bind credentials through the Keycloak admin console wildfly-elytron: org.keycloak/keycloak-services: session fixation in elytron saml adapters
|
[
"cpe:/a:redhat:rhosemc:1.0::el8"
] | null | 7.1 | null | null |
RHSA-2021:2704
|
Red Hat Security Advisory: Release of OpenShift Serverless Client kn 1.16.0
|
golang: encoding/xml: infinite loop when using xml.NewTokenDecoder with a custom TokenReader golang: net/http: panic in ReadRequest and ReadResponse when reading a very large header golang: archive/zip: malformed archive may cause panic or memory exhaustion
|
[
"cpe:/a:redhat:serverless:1.0::el8"
] | null | 7.5 | null | null |
RHSA-2020:2667
|
Red Hat Security Advisory: kernel security and bug fix update
|
kernel: use-after-free in block/bfq-iosched.c related to bfq_idle_slice_timer_body
|
[
"cpe:/a:redhat:rhel_eus:8.1::crb",
"cpe:/o:redhat:rhel_eus:8.1::baseos"
] | null | 7 | null | null |
RHSA-2020:0375
|
Red Hat Security Advisory: kernel-rt security and bug fix update
|
kernel: heap overflow in mwifiex_update_vs_ie() function of Marvell WiFi driver kernel: heap-based buffer overflow in mwifiex_process_country_ie() function in drivers/net/wireless/marvell/mwifiex/sta_ioctl.c kernel: incomplete fix for race condition between mmget_not_zero()/get_task_mm() and core dumping in CVE-2019-11599 kernel: heap overflow in marvell/mwifiex/tdls.c kernel: buffer overflow in cfg80211_mgd_wext_giwessid in net/wireless/wext-sme.c
|
[
"cpe:/a:redhat:rhel_extras_rt:7"
] | null | 8 | 8.8 | null |
RHSA-2022:8580
|
Red Hat Security Advisory: firefox security update
|
Mozilla: Service Workers might have learned size of cross-origin media files Mozilla: Fullscreen notification bypass Mozilla: Use-after-free in InputStream implementation Mozilla: Use-after-free of a JavaScript Realm Mozilla: Fullscreen notification bypass via windowName Mozilla: Use-after-free in Garbage Collection Mozilla: ServiceWorker-intercepted requests bypassed SameSite cookie policy Mozilla: Cross-Site Tracing was possible via non-standard override headers Mozilla: Symlinks may resolve to partially uninitialized buffers Mozilla: Keystroke Side-Channel Leakage Mozilla: Custom mouse cursor could have been drawn over browser UI Mozilla: Iframe contents could be rendered outside the iframe Mozilla: Memory safety bugs fixed in Firefox 107 and Firefox ESR 102.5
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 8.8 | 6.1 | null |
RHSA-2024:4732
|
Red Hat Security Advisory: nghttp2 security update
|
nghttp2: CONTINUATION frames DoS
|
[
"cpe:/o:redhat:rhel_aus:8.4::baseos",
"cpe:/o:redhat:rhel_e4s:8.4::baseos",
"cpe:/o:redhat:rhel_tus:8.4::baseos"
] | null | 5.3 | null | null |
RHSA-2018:1738
|
Red Hat Security Advisory: kernel security, bug fix, and enhancement update
|
hw: cpu: speculative store bypass
|
[
"cpe:/o:redhat:rhel_eus:7.4::computenode",
"cpe:/o:redhat:rhel_eus:7.4::server"
] | null | null | 5.6 | null |
RHSA-2018:2585
|
Red Hat Security Advisory: ansible security update
|
ansible: Failed tasks do not honour no_log option allowing for secrets to be disclosed in logs ansible: Inventory variables are loaded from current working directory when running ad-hoc command that can lead to code execution ansible: ansible.cfg is being read from current working directory allowing possible code execution
|
[
"cpe:/a:redhat:openstack:13::el7"
] | null | null | 7.8 | null |
RHSA-2014:0009
|
Red Hat Security Advisory: samba security update
|
samba: Heap-based buffer overflow due to incorrect DCE-RPC fragment length field check samba: no access check verification on stream files
|
[
"cpe:/a:redhat:storage:2.1:server:el6"
] | null | null | null | null |
RHSA-2019:1580
|
Red Hat Security Advisory: virt:rhel security update
|
libvirt: arbitrary file read/exec via virDomainSaveImageGetXMLDesc API libvirt: virDomainManagedSaveDefineXML API exposed to readonly clients libvirt: arbitrary command execution via virConnectGetDomainCapabilities API libvirt: arbitrary command execution via virConnectBaselineHypervisorCPU and virConnectCompareHypervisorCPU APIs
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | null | 8.8 | null |
RHSA-2012:0140
|
Red Hat Security Advisory: thunderbird security update
|
libpng: Heap buffer overflow in png_decompress_chunk (MFSA 2012-11)
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2019:2901
|
Red Hat Security Advisory: kernel security update
|
kernel: vhost-net: guest to host kernel escape during migration
|
[
"cpe:/o:redhat:rhel_aus:6.5::server"
] | null | null | 7.2 | null |
RHSA-2011:1581
|
Red Hat Security Advisory: ruby security, bug fix, and enhancement update
|
ruby: Properly initialize the random number generator when forking new process ruby: Properly initialize the random number generator when forking new process
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2022:7639
|
Red Hat Security Advisory: openblas security update
|
lapack: Out-of-bounds read in *larrv
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb"
] | null | 5.9 | null | null |
RHSA-2022:6850
|
Red Hat Security Advisory: openvswitch2.11 security update
|
dpdk: DoS when a Vhost header crosses more than two descriptors and exhausts all mbufs
|
[
"cpe:/o:redhat:enterprise_linux:7::fastdatapath"
] | null | 8.6 | null | null |
RHSA-2024:10214
|
Red Hat Security Advisory: Red Hat Data Grid 8.5.2 security update
|
webpack: DOM Clobbering vulnerability in AutoPublicPathRuntimeModule com.thoughtworks.xstream: XStream is vulnerable to a Denial of Service attack due to stack overflow from a manipulated binary input stream
|
[
"cpe:/a:redhat:jboss_data_grid:8"
] | null | 7.5 | null | null |
RHSA-2019:3050
|
Red Hat Security Advisory: Red Hat Single Sign-On 7.3.4 security update
|
keycloak: script execution via UMA policy trigger keycloak: script execution via realm management policy trigger undertow: Information leak in requests for directories without trailing slashes undertow: DEBUG log for io.undertow.request.security if enabled leaks credentials to log files jackson-databind: polymorphic typing issue allows attacker to read arbitrary local files on the server. jackson-databind: polymorphic typing issue allows attacker to read arbitrary local files on the server via crafted JSON message. jackson-databind: default typing mishandling leading to remote code execution keycloak: adapter endpoints are exposed via arbitrary URLs keycloak: cross-realm user access auth bypass
|
[
"cpe:/a:redhat:jboss_single_sign_on:7.3"
] | null | 6.6 | 5 | null |
RHSA-2015:1581
|
Red Hat Security Advisory: firefox security update
|
Mozilla: Same origin violation and local file stealing via PDF reader (MFSA 2015-78)
|
[
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::server",
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation",
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | null | null |
RHSA-2017:2705
|
Red Hat Security Advisory: kernel-rt security update
|
kernel: stack buffer overflow in the native Bluetooth stack
|
[
"cpe:/a:redhat:enterprise_mrg:2:server:el6"
] | null | null | 7.5 | null |
RHSA-2002:307
|
Red Hat Security Advisory: xpdf security update
|
security flaw
|
[
"cpe:/o:redhat:enterprise_linux:2.1::as",
"cpe:/o:redhat:enterprise_linux:2.1::aw"
] | null | null | null | null |
RHSA-2003:083
|
Red Hat Security Advisory: apache security update for Stronghold
|
security flaw security flaw
|
[
"cpe:/a:redhat:rhel_stronghold:4"
] | null | null | null | null |
RHSA-2024:7204
|
Red Hat Security Advisory: osbuild-composer security update
|
encoding/gob: golang: Calling Decoder.Decode on a message which contains deeply nested structures can cause a panic due to stack exhaustion
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 7.5 | null | null |
RHSA-2014:0597
|
Red Hat Security Advisory: squid security update
|
squid: denial of service when using SSL-Bump
|
[
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2014:1087
|
Red Hat Security Advisory: Red Hat JBoss Web Server 2.1.0 update
|
tomcat: information disclosure via XXE when running untrusted web applications httpd: mod_deflate denial of service Tomcat/JBossWeb: XML parser hijack by malicious web application httpd: mod_status heap-based buffer overflow Tomcat/JBossWeb: request smuggling and limited DoS in ChunkedInputFilter httpd: mod_cgid denial of service
|
[
"cpe:/a:redhat:jboss_enterprise_web_server:2::el6"
] | null | null | null | null |
RHSA-2024:1646
|
Red Hat Security Advisory: grafana security and bug fix update
|
golang-fips/openssl: Memory leaks in code encrypting and decrypting RSA payloads
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 7.5 | null | null |
RHSA-2018:2902
|
Red Hat Security Advisory: .NET Core on Red Hat Enterprise Linux security update
|
Core: information disclosure due to authentication information exposed in a redirect
|
[
"cpe:/a:redhat:rhel_dotnet:1.0::el7",
"cpe:/a:redhat:rhel_dotnet:1.1::el7"
] | null | null | 7.4 | null |
RHSA-2024:0855
|
Red Hat Security Advisory: Red Hat Ansible Automation Platform 2.4 Product Security and Bug Fix Update
|
quic-go: memory exhaustion attack against QUIC's path validation mechanism
|
[
"cpe:/a:redhat:ansible_automation_platform:2.4::el8",
"cpe:/a:redhat:ansible_automation_platform:2.4::el9",
"cpe:/a:redhat:ansible_automation_platform_developer:2.4::el8",
"cpe:/a:redhat:ansible_automation_platform_developer:2.4::el9",
"cpe:/a:redhat:ansible_automation_platform_inside:2.4::el8",
"cpe:/a:redhat:ansible_automation_platform_inside:2.4::el9"
] | null | 6.5 | null | null |
RHSA-2019:0031
|
Red Hat Security Advisory: Red Hat Enterprise Linux 6.6 Telco Update Support Final Retirement Notice
|
This is the final notification for the retirement of Red Hat Enterprise Linux 6.6 Telco Update Service (TUS). This notification applies only to those customers subscribed to the Telco Update Service (TUS) channel for Red Hat Enterprise Linux 6.6.
|
[
"cpe:/o:redhat:rhel_aus:6.6::server",
"cpe:/o:redhat:rhel_tus:6.6::server"
] | null | null | null | null |
RHSA-2016:0225
|
Red Hat Security Advisory: glibc security update
|
glibc: getaddrinfo stack-based buffer overflow
|
[
"cpe:/o:redhat:rhel_aus:6.4::server",
"cpe:/o:redhat:rhel_aus:6.5::server",
"cpe:/o:redhat:rhel_eus:6.6::computenode",
"cpe:/o:redhat:rhel_eus:6.6::server",
"cpe:/o:redhat:rhel_eus:7.1::computenode",
"cpe:/o:redhat:rhel_eus:7.1::server",
"cpe:/o:redhat:rhel_mission_critical:6.2::server"
] | null | null | null | null |
RHSA-2024:1424
|
Red Hat Security Advisory: nodejs security update
|
nodejs: reading unprocessed HTTP request with unbounded chunk extension allows DoS attacks
|
[
"cpe:/a:redhat:rhel_eus:9.0::appstream"
] | null | 7.5 | null | null |
RHSA-2024:2276
|
Red Hat Security Advisory: qt5-qtbase security update
|
qt: incorrect integer overflow check qtbase: potential buffer overflow when reading KTX images
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::crb"
] | null | 6.2 | null | null |
RHSA-2011:0479
|
Red Hat Security Advisory: libvirt security and bug fix update
|
libvirt: error reporting in libvirtd is not thread safe
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2015:0895
|
Red Hat Security Advisory: 389-ds-base security update
|
389-ds-base: access control bypass with modrdn
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | null | null |
RHSA-2023:1656
|
Red Hat Security Advisory: OpenShift Container Platform 4.10.56 security update
|
mongo-go-driver: specific cstrings input may not be properly validated
|
[
"cpe:/a:redhat:openshift:4.10::el8"
] | null | 6.5 | null | null |
RHSA-2021:1469
|
Red Hat Security Advisory: bind security update
|
bind: An assertion check can fail while answering queries for DNAME records that require the DNAME to be processed to resolve itself
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 7.5 | null | null |
RHSA-2018:0034
|
Red Hat Security Advisory: microcode_ctl security update
|
An update for microcode_ctl is now available for Red Hat Enterprise Linux 7.3 Extended Update Support.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
|
[
"cpe:/o:redhat:rhel_eus:7.3::computenode",
"cpe:/o:redhat:rhel_eus:7.3::server"
] | null | null | null | null |
RHSA-2014:1766
|
Red Hat Security Advisory: php55-php security update
|
file: cdf_read_short_sector insufficient boundary check file: cdf_unpack_summary_info() excessive looping DoS file: CDF property info parsing nelements infinite loop gd: NULL pointer dereference in gdImageCreateFromXpm() file: mconvert incorrect handling of truncated pascal string size file: cdf_check_stream_offset insufficient boundary check file: cdf_count_chain insufficient boundary check file: cdf_read_property_info insufficient boundary check php: unserialize() SPL ArrayObject / SPLObjectStorage type confusion flaw file: unrestricted regular expression matching file: incomplete fix for CVE-2012-1571 in cdf_read_property_info php: multiple buffer over-reads in php_parserr php: xmlrpc ISO8601 date format parsing out-of-bounds read in mkgmtime() php: integer overflow in unserialize() php: heap corruption issue in exif_thumbnail() file: out-of-bounds read in elf note headers php: heap-based buffer overflow in DNS TXT record parsing php: SPL Iterators use-after-free php: ArrayIterator use-after-free due to object change during sorting php: type confusion issue in phpinfo() leading to information leak php: gd extension NUL byte injection in file names
|
[
"cpe:/a:redhat:rhel_software_collections:1::el6",
"cpe:/a:redhat:rhel_software_collections:1::el7"
] | null | null | null | null |
RHSA-2018:0048
|
Red Hat Security Advisory: vdsm security update
|
An update for vdsm is now available for RHEV 3.X Hypervisor and Agents for Red Hat Enterprise Linux 7 ELS.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
|
[
"cpe:/o:redhat:enterprise_linux:7::hypervisor"
] | null | null | null | null |
RHSA-2019:0095
|
Red Hat Security Advisory: Red Hat Enterprise Linux 6.7 EUS Final Retirement Notice
|
This is the final notification for the retirement of Red Hat Enterprise Linux 6.7 Extended Update Support (EUS). This notification applies only to those customers subscribed to the Extended Update Support (EUS) channel for Red Hat Enterprise Linux 6.7.
|
[
"cpe:/o:redhat:rhel_eus:6.7::computenode",
"cpe:/o:redhat:rhel_eus:6.7::server"
] | null | null | null | null |
RHSA-2012:0744
|
Red Hat Security Advisory: python security update
|
python: potential XSS in SimpleHTTPServer's list_directory() python: distutils creates ~/.pypirc insecurely python: SimpleXMLRPCServer CPU usage DoS via malformed XML-RPC request python: hash table collisions CPU usage DoS (oCERT-2011-003)
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2019:2791
|
Red Hat Security Advisory: OpenShift Container Platform 4.1.16 container image security update
|
openshift: Secret data written to pod logs when operator set at Debug level or higher
|
[
"cpe:/a:redhat:openshift:4.1::el7"
] | null | null | 5.3 | null |
RHSA-2005:256
|
Red Hat Security Advisory: glibc security update
|
security flaw
|
[
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws"
] | null | null | null | null |
RHSA-2016:0504
|
Red Hat Security Advisory: python-django security update
|
python-django: Malicious redirect and possible XSS attack via user-supplied redirect URLs containing basic auth python-django: User enumeration through timing difference on password hasher work factor upgrade
|
[
"cpe:/a:redhat:openstack:7::el7"
] | null | null | null | null |
RHSA-2021:4845
|
Red Hat Security Advisory: Red Hat OpenShift Container Storage 4.8.5 Security and Bug Fix Update
|
nodejs-ssh2: Command injection by calling vulnerable method with untrusted input
|
[
"cpe:/a:redhat:openshift_container_storage:4.8::el8"
] | null | 5.4 | null | null |
RHSA-2023:7705
|
Red Hat Security Advisory: Red Hat Build of Apache Camel for Quarkus 2.13.3 security update (RHBQ 2.13.9.Final)
|
Red Hat Build of Apache Camel for Quarkus 2.13.3 release and security update is now available (updates to RHBQ 2.13.9.Final). The purpose of this text-only errata is to inform you about the security issues fixed.
Red Hat Product Security has rated this update as having an impact of Important.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
|
[
"cpe:/a:redhat:camel_quarkus:2.13.3"
] | null | null | null | null |
RHSA-2014:0305
|
Red Hat Security Advisory: samba security update
|
samba: clickjacking vulnerability in SWAT samba: cross-site request forgery vulnerability in SWAT samba: DoS via integer overflow when reading an EA list
|
[
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2024:1913
|
Red Hat Security Advisory: Red Hat JBoss Web Server 5.8.0 release and security update
|
Tomcat: WebSocket DoS with incomplete closing handshake
|
[
"cpe:/a:redhat:jboss_enterprise_web_server:5.8::el7",
"cpe:/a:redhat:jboss_enterprise_web_server:5.8::el8",
"cpe:/a:redhat:jboss_enterprise_web_server:5.8::el9"
] | null | 7.5 | null | null |
RHSA-2015:0254
|
Red Hat Security Advisory: samba security update
|
samba: talloc free on uninitialized stack pointer in netlogon server could lead to remote-code execution
|
[
"cpe:/o:redhat:rhel_eus:6.4::computenode",
"cpe:/o:redhat:rhel_eus:6.4::server",
"cpe:/o:redhat:rhel_eus:6.5::computenode",
"cpe:/o:redhat:rhel_eus:6.5::server",
"cpe:/o:redhat:rhel_mission_critical:6.2::server"
] | null | null | null | null |
RHSA-2024:4716
|
Red Hat Security Advisory: openssh security update
|
openssh: Possible remote code execution due to a race condition in signal handling affecting Red Hat Enterprise Linux 9
|
[
"cpe:/a:redhat:rhel_eus:9.2::appstream",
"cpe:/o:redhat:rhel_eus:9.2::baseos"
] | null | 7 | null | null |
RHSA-2018:0242
|
Red Hat Security Advisory: erlang security update
|
erlang: TLS server vulnerable to Adaptive Chosen Ciphertext attack allowing plaintext recovery or MITM attack
|
[
"cpe:/a:redhat:openstack:12::el7"
] | null | null | 6.5 | null |
RHSA-2023:6265
|
Red Hat Security Advisory: ghostscript security update
|
Ghostscript: GhostPDL can lead to remote code execution via crafted PostScript documents
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::crb"
] | null | 8.8 | null | null |
RHSA-2009:0205
|
Red Hat Security Advisory: dovecot security and bug fix update
|
dovecot: incorrect handling of negative rights in the ACL plugin dovecot: ssl_key_password disclosure due to an insecure dovecot.conf permissions
|
[
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2015:1551
|
Red Hat Security Advisory: Red Hat JBoss Fuse Service Works 6.0.0 security update
|
async-http-client: SSL/TLS certificate verification is disabled under certain conditions async-http-client: missing hostname verification for SSL certificates
|
[
"cpe:/a:redhat:jboss_fuse_service_works:6.0"
] | null | null | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.