id
stringlengths 13
15
| title
stringlengths 29
176
| description
stringlengths 8
32.1k
| cpes
listlengths 0
20
| cvss_v4_0
null | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
null |
---|---|---|---|---|---|---|---|
RHSA-2023:3771
|
Red Hat Security Advisory: Red Hat Virtualization security and bug fix update
|
springframework: Security Bypass With Un-Prefixed Double Wildcard Pattern springframework: Spring Expression DoS Vulnerability
|
[
"cpe:/a:redhat:rhev_manager:4.4:el8",
"cpe:/o:redhat:rhev_hypervisor:4.4::el8"
] | null | 5.3 | null | null |
RHBA-2019:4268
|
Red Hat Bug Fix Advisory: idm:DL1 bug fix update
|
ipa: Batch API logging user passwords to /var/log/httpd/error_log ipa: Denial of service in IPA server due to wrong use of ber_scanf()
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | null | 8.8 | null |
RHSA-2024:7736
|
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.4 Security update
|
undertow: Improper State Management in Proxy Protocol parsing causes information leakage
|
[
"cpe:/a:redhat:jboss_enterprise_application_platform:7.4::el7",
"cpe:/a:redhat:jboss_enterprise_application_platform:7.4::el8",
"cpe:/a:redhat:jboss_enterprise_application_platform:7.4::el9"
] | null | 7.5 | null | null |
RHSA-2024:0573
|
Red Hat Security Advisory: libfastjson security update
|
libfastjson: integer overflow and out-of-bounds write via a large JSON file
|
[
"cpe:/a:redhat:rhel_eus:8.8::appstream"
] | null | 7.8 | null | null |
RHSA-2023:4169
|
Red Hat Security Advisory: java-17-openjdk security update
|
OpenJDK: HTTP client insufficient file name validation (8302475) OpenJDK: ZIP file parsing infinite loop (8302483) OpenJDK: weakness in AES implementation (8308682) OpenJDK: modulo operator array indexing issue (8304460) OpenJDK: array indexing integer overflow issue (8304468) OpenJDK: improper handling of slash characters in URI-to-path conversion (8305312) harfbuzz: allows attackers to trigger O(n^2) growth via consecutive marks
|
[
"cpe:/a:redhat:rhel_eus:9.0::appstream",
"cpe:/a:redhat:rhel_eus:9.0::crb"
] | null | 7.5 | null | null |
RHSA-2023:1068
|
Red Hat Security Advisory: libjpeg-turbo security update
|
libjpeg-turbo: heap buffer overflow in get_word_rgb_row() in rdppm.c
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::crb"
] | null | 5.5 | null | null |
RHSA-2024:9921
|
Red Hat Security Advisory: edk2 security update
|
edk2: Integer overflows in PeCoffLoaderRelocateImage
|
[
"cpe:/a:redhat:rhel_eus:9.4::appstream",
"cpe:/a:redhat:rhel_eus:9.4::crb"
] | null | 5.9 | null | null |
RHSA-2023:1436
|
Red Hat Security Advisory: nss security update
|
nss: Arbitrary memory write via PKCS 12
|
[
"cpe:/a:redhat:rhel_e4s:8.1::appstream"
] | null | 8.8 | null | null |
RHSA-2016:2927
|
Red Hat Security Advisory: rh-mariadb100-mariadb security update
|
mysql: unspecified vulnerability in subcomponent: Server: Optimizer (CPU October 2016) mysql: Incorrect input validation allowing code execution via mysqldump mysql: unspecified vulnerability in subcomponent: Server: DML (CPU October 2016) mysql: race condition while setting stats during MyISAM table repair (CPU Oct 2016) mysql: unspecified vulnerability in subcomponent: Server: DML (CPU October 2016) mysql: unspecified vulnerability in subcomponent: Server: GIS (CPU October 2016) mysql: unspecified vulnerability in subcomponent: Server: Federated (CPU October 2016) mysql: unspecified vulnerability in subcomponent: Server: InnoDB (CPU October 2016) mysql: general_log can write to configuration files, leading to privilege escalation (CPU Oct 2016) mysql: race condition while setting stats during MyISAM table repair (CPU Oct 2016) mysql: unspecified vulnerability in subcomponent: Server: Types (CPU October 2016) mysql: Incorrect input validation allowing code execution via mysqldump mysql: Client mysqldump unspecified vulnerability (CPU Jul 2017)
|
[
"cpe:/a:redhat:rhel_software_collections:2::el6",
"cpe:/a:redhat:rhel_software_collections:2::el7"
] | null | null | 4.3 | null |
RHSA-2020:5640
|
Red Hat Security Advisory: openssl security update
|
openssl: EDIPARTYNAME NULL pointer de-reference
|
[
"cpe:/o:redhat:rhel_aus:7.3::server"
] | null | 5.9 | null | null |
RHSA-2019:0366
|
Red Hat Security Advisory: Red Hat JBoss Core Services Apache HTTP Server 2.4.29 SP1 security update
|
libdb: Reads DB_CONFIG from the current working directory httpd: Out of bounds write in mod_authnz_ldap when using too small Accept-Language values httpd: <FilesMatch> bypass with a trailing newline in the file name openssl: Handling of crafted recursive ASN.1 structures can cause a stack overflow and resulting denial of service httpd: Improper handling of headers in mod_session can allow a remote user to modify session data for CGI applications httpd: Out of bounds access after failure in reading the HTTP request httpd: Use-after-free on HTTP/2 stream shutdown httpd: Out of bounds read in mod_cache_socache can allow a remote attacker to cause DoS httpd: Weak Digest auth nonce generation in mod_auth_digest httpd: mod_http2: Too much time allocated to workers, possibly leading to DoS mod_jk: connector path traversal due to mishandled HTTP requests in httpd httpd: DoS for HTTP/2 connections by continuous SETTINGS frames nghttp2: Null pointer dereference when too large ALTSVC frame is received
|
[
"cpe:/a:redhat:jboss_core_services:1"
] | null | null | 5.9 | null |
RHSA-2024:5627
|
Red Hat Security Advisory: fence-agents security update
|
urllib3: proxy-authorization request header is not stripped during cross-origin redirects
|
[
"cpe:/a:redhat:rhel_e4s:9.0::appstream",
"cpe:/a:redhat:rhel_e4s:9.0::highavailability",
"cpe:/a:redhat:rhel_e4s:9.0::resilientstorage"
] | null | 4.4 | null | null |
RHSA-2015:0845
|
Red Hat Security Advisory: python-django-horizon and python-django-openstack-auth update
|
python-django-horizon: denial of service via login page requests
|
[
"cpe:/a:redhat:openstack:5::el6"
] | null | null | null | null |
RHSA-2021:3230
|
Red Hat Security Advisory: compat-exiv2-026 security update
|
exiv2: Heap-based buffer overflow vulnerability in jp2image.cpp
|
[
"cpe:/a:redhat:rhel_eus:8.2::appstream"
] | null | 8.1 | null | null |
RHSA-2002:312
|
Red Hat Security Advisory: openldap security update
|
security flaw security flaw security flaw
|
[
"cpe:/o:redhat:enterprise_linux:2.1::as",
"cpe:/o:redhat:enterprise_linux:2.1::aw"
] | null | null | null | null |
RHSA-2022:0270
|
Red Hat Security Advisory: polkit security update
|
polkit: Local privilege escalation in pkexec due to incorrect handling of argument vector
|
[
"cpe:/o:redhat:rhel_aus:7.3::server"
] | null | 7.8 | null | null |
RHSA-2019:4357
|
Red Hat Security Advisory: Red Hat Ceph Storage security update
|
ceph: denial of service in RGW daemon
|
[
"cpe:/a:redhat:ceph_storage:3::ubuntu16.04"
] | null | null | 6.5 | null |
RHSA-2023:7782
|
Red Hat Security Advisory: linux-firmware security update
|
amd: Return Address Predictor vulnerability leading to information disclosure hw: amd: Cross-Process Information Leak
|
[
"cpe:/o:redhat:rhel_aus:7.6::server"
] | null | 6.5 | null | null |
RHSA-2020:3906
|
Red Hat Security Advisory: qemu-kvm security, bug fix, and enhancement update
|
QEMU: seccomp: blacklist is not applied to all threads QEMU: vnc: memory leakage upon disconnect
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 3.5 | 5.3 | null |
RHSA-2016:0122
|
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 6.4.6 update on RHEL 6
|
jakarta-taglibs-standard: XXE and RCE via XSL extension in JSTL XML tags
|
[
"cpe:/a:redhat:jboss_enterprise_application_platform:6::el6"
] | null | null | 7.6 | null |
RHSA-2016:0302
|
Red Hat Security Advisory: openssl security update
|
OpenSSL: SSLv2 doesn't block disabled ciphers OpenSSL: BN_hex2bn/BN_dec2bn NULL pointer deref/heap corruption SSL/TLS: Cross-protocol attack on TLS using SSLv2 (DROWN)
|
[
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2017:0211
|
Red Hat Security Advisory: nagios security update
|
snoopy: incomplete fixes for command execution flaws snoopy: incomplete fixes for command execution flaws snoopy: incomplete fixes for command execution flaws nagios: Command injection via curl in MagpieRSS nagios: Privilege escalation issue
|
[
"cpe:/a:redhat:openstack:5::el7"
] | null | null | 7.3 | null |
RHSA-2022:4893
|
Red Hat Security Advisory: postgresql:12 security update
|
postgresql: Autovacuum, REINDEX, and others omit "security restricted operation" sandbox
|
[
"cpe:/a:redhat:rhel_eus:8.2::appstream"
] | null | 8.8 | null | null |
RHSA-2003:095
|
Red Hat Security Advisory: : New samba packages fix security vulnerabilities
|
security flaw security flaw
|
[
"cpe:/o:redhat:linux:6.2",
"cpe:/o:redhat:linux:7.0",
"cpe:/o:redhat:linux:7.1",
"cpe:/o:redhat:linux:7.2",
"cpe:/o:redhat:linux:7.3",
"cpe:/o:redhat:linux:8.0",
"cpe:/o:redhat:linux:9"
] | null | null | null | null |
RHSA-2015:0215
|
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 6.3.3 update
|
Security: Wrong security context loaded when using SAML2 STS Login Module RESTeasy: External entities expanded by DocumentProvider Management: Limited RBAC authorization bypass Subsystem: Information disclosure via incorrect sensitivity classification of attribute Weld: Limited information disclosure via stale thread state
|
[
"cpe:/a:redhat:jboss_enterprise_application_platform:6.3"
] | null | null | null | null |
RHSA-2023:0592
|
Red Hat Security Advisory: libksba security update
|
libksba: integer overflow to code execution
|
[
"cpe:/o:redhat:rhel_aus:8.2::baseos",
"cpe:/o:redhat:rhel_e4s:8.2::baseos",
"cpe:/o:redhat:rhel_tus:8.2::baseos"
] | null | 8.6 | null | null |
RHSA-2016:1427
|
Red Hat Security Advisory: atomic-openshift security and bug fix update
|
Kubernetes: disclosure of information in multi tenant environments via watch-cache list
|
[
"cpe:/a:redhat:openshift:3.2::el7"
] | null | null | 6.5 | null |
RHBA-2019:2819
|
Red Hat Bug Fix Advisory: OpenShift Container Platform 4.1.17 packages update
|
HTTP/2: flood using PING frames results in unbounded memory growth HTTP/2: flood using HEADERS frames results in unbounded memory growth
|
[
"cpe:/a:redhat:openshift:4.1::el7",
"cpe:/a:redhat:openshift:4.1::el8"
] | null | null | 7.5 | null |
RHSA-2003:079
|
Red Hat Security Advisory: : Updated zlib packages fix gzprintf buffer overflow vulnerability
|
security flaw
|
[
"cpe:/o:redhat:linux:7.1",
"cpe:/o:redhat:linux:7.2",
"cpe:/o:redhat:linux:7.3",
"cpe:/o:redhat:linux:8.0"
] | null | null | null | null |
RHSA-2024:3810
|
Red Hat Security Advisory: kernel security and bug fix update
|
kernel: net:emac/emac-mac: Fix a use after free in emac_mac_tx_buf_send kernel: use-after-free in drivers/media/rc/ene_ir.c due to race condition kernel: Spectre v2 SMT mitigations problem kernel: NULL pointer dereference in nvmet_tcp_build_iovec kernel: NULL pointer dereference in nvmet_tcp_execute_request kernel: NULL pointer dereference in __nvmet_req_complete kernel: net: bridge: data races indata-races in br_handle_frame_finish() hw: amd: Instruction raise #VC exception at exit hw: amd: Instruction raise #VC exception at exit kernel: mlxsw: spectrum_acl_tcam: Fix stack corruption kernel: sched/membarrier: reduce the ability to hammer on sys_membarrier kernel: netfilter: nf_tables: disallow anonymous set with timeout flag
|
[
"cpe:/a:redhat:rhel_eus:8.8::crb",
"cpe:/o:redhat:rhel_eus:8.8::baseos"
] | null | 4.7 | 5.6 | null |
RHSA-2019:1971
|
Red Hat Security Advisory: kernel-rt security and bug fix update
|
kernel: infinite loop in update_blocked_averages() in kernel/sched/fair.c leading to denial of service kernel: insufficient input validation in kernel mode driver in Intel i915 graphics leads to privilege escalation kernel: a NULL pointer dereference in drivers/scsi/megaraid/megaraid_sas_base.c leading to DoS kernel: use-after-free in drivers/char/ipmi/ipmi_si_intf.c, ipmi_si_mem_io.c, ipmi_si_port_io.c
|
[
"cpe:/a:redhat:enterprise_linux:8::nfv",
"cpe:/a:redhat:enterprise_linux:8::realtime"
] | null | 7 | 6.2 | null |
RHSA-2020:4003
|
Red Hat Security Advisory: NetworkManager security and bug fix update
|
NetworkManager: user configuration not honoured leaving the connection unauthenticated via insecure defaults
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 4.3 | null | null |
RHSA-2020:2274
|
Red Hat Security Advisory: devtoolset-9-gcc security and bug fix update
|
gcc: POWER9 "DARN" RNG intrinsic produces repeated output
|
[
"cpe:/a:redhat:rhel_software_collections:3::el7"
] | null | null | 7.5 | null |
RHSA-2025:2449
|
Red Hat Security Advisory: OpenShift Container Platform 4.18.4 security update
|
mholt/archiver: path traversal vulnerability buildah: Buildah allows arbitrary directory mount golang-protobuf: encoding/protojson, internal/encoding/json: infinite loop in protojson.Unmarshal when unmarshaling certain forms of invalid JSON golang.org/x/net/html: Non-linear parsing of case-insensitive content in golang.org/x/net/html kernel: HID: core: zero-initialize the report buffer distribution: Distribution's token authentication allows attacker to inject an untrusted signing key in a JWT
|
[
"cpe:/a:redhat:openshift:4.18::el9"
] | null | 6.5 | null | null |
RHSA-2019:0640
|
Red Hat Security Advisory: java-1.8.0-ibm security update
|
libjpeg-turbo: Divide By Zero in alloc_sarray function in jmemmgr.c JDK: buffer overflow in jio_snprintf() and jio_vsnprintf() JDK: missing null check when accelerating Unsafe calls OpenJDK: memory disclosure in FileChannelImpl (Libraries, 8206290) JDK: unspecified vulnerability fixed in 8u201 (Deployment)
|
[
"cpe:/a:redhat:network_satellite:5.8::el6"
] | null | null | 3.1 | null |
RHSA-2024:8048
|
Red Hat Security Advisory: .NET 6.0 security update
|
dotnet: Multiple .NET components susceptible to hash flooding dotnet: System.IO.Packaging - Multiple DoS vectors in use of SortedList dotnet: Denial of Service in System.Text.Json
|
[
"cpe:/a:redhat:rhel_e4s:9.0::appstream"
] | null | 7.5 | null | null |
RHSA-2024:4761
|
Red Hat Security Advisory: containernetworking-plugins security update
|
golang-fips/openssl: Memory leaks in code encrypting and decrypting RSA payloads
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 7.5 | null | null |
RHSA-2014:0255
|
Red Hat Security Advisory: subversion security update
|
format): Filenames with newline character can lead to revision corruption subversion: Remote DoS due improper handling of early-closing TCP connections subversion: mod_dav_svn crash when handling certain requests with SVNListParentPath on
|
[
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server",
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2012:0059
|
Red Hat Security Advisory: openssl security update
|
openssl: DTLS plaintext recovery attack openssl: uninitialized SSL 3.0 padding openssl: malformed RFC 3779 data can cause assertion failures openssl: SGC restart DoS attack
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2023:2487
|
Red Hat Security Advisory: fwupd security and bug fix update
|
fwupd: world readable password in /etc/fwupd/redfish.conf shim: 3rd party shim allow secure boot bypass shim: 3rd party shim allow secure boot bypass shim: 3rd party shim allow secure boot bypass
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::crb",
"cpe:/o:redhat:enterprise_linux:9::baseos"
] | null | 7.2 | null | null |
RHSA-2024:4825
|
Red Hat Security Advisory: podman security update
|
gorilla/schema: Potential memory exhaustion attack due to sparse slice deserialization
|
[
"cpe:/a:redhat:rhel_e4s:9.0::appstream"
] | null | 7.5 | null | null |
RHSA-2022:1646
|
Red Hat Security Advisory: Red Hat OpenStack Platform 16.1 (python-twisted) security update
|
python-twisted: possible http request smuggling
|
[
"cpe:/a:redhat:openstack:16.1::el8"
] | null | 8.1 | null | null |
RHSA-2013:1375
|
Red Hat Security Advisory: Red Hat JBoss BRMS 5.3.1 update
|
Java: XML signature spoofing
|
[
"cpe:/a:redhat:jboss_enterprise_brms_platform:5.3"
] | null | null | null | null |
RHSA-2023:0199
|
Red Hat Security Advisory: java-11-openjdk security update
|
OpenJDK: handshake DoS attack against DTLS connections (JSSE, 8287411) OpenJDK: soundbank URL remote loading (Sound, 8293742)
|
[
"cpe:/a:redhat:rhel_eus:8.6::appstream",
"cpe:/a:redhat:rhel_eus:8.6::crb"
] | null | 3.7 | null | null |
RHSA-2020:2040
|
Red Hat Security Advisory: squid security update
|
squid: improper check for new member in ESIExpression::Evaluate allows for stack buffer overflow squid: parsing of header Proxy-Authentication leads to memory corruption squid: improper access restriction upon Digest Authentication nonce replay could lead to remote code execution
|
[
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 8.1 | 4.3 | null |
RHSA-2016:0041
|
Red Hat Security Advisory: Red Hat JBoss BRMS 6.1.5 update
|
batik: XML External Entity (XXE) injection in SVG parsing
|
[
"cpe:/a:redhat:jboss_brms:6.1"
] | null | null | null | null |
RHSA-2024:1193
|
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 8.0.1 security update
|
parsson: Denial of Service due to large number parsing jgit: arbitrary file overwrite apache-mina-sshd: information exposure in SFTP server implementations ssh: Prefix truncation attack on Binary Packet Protocol (BPP)
|
[
"cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el9"
] | null | 5.9 | null | null |
RHSA-2024:1566
|
Red Hat Security Advisory: Red Hat build of MicroShift 4.14.19 security update
|
golang-fips/openssl: Memory leaks in code encrypting and decrypting RSA payloads
|
[
"cpe:/a:redhat:openshift:4.14::el9"
] | null | 7.5 | null | null |
RHSA-2019:0374
|
Red Hat Security Advisory: firefox security update
|
mozilla: Use after free in Skia mozilla: Integer overflow in Skia
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 6.5 | null |
RHSA-2020:1346
|
Red Hat Security Advisory: python security update
|
python: DOS via regular expression catastrophic backtracking in apop() method in pop3lib python: DOS via regular expression backtracking in difflib.IS_LINE_JUNK method in difflib python: Missing salt initialization in _elementtree.c module python: CRLF injection via the query part of the url passed to urlopen() python: CRLF injection via the path part of the url passed to urlopen() python: Undocumented local_file protocol allows remote attackers to bypass protection mechanisms
|
[
"cpe:/o:redhat:rhel_aus:7.4::server",
"cpe:/o:redhat:rhel_e4s:7.4::server",
"cpe:/o:redhat:rhel_tus:7.4::server"
] | null | null | 7.4 | null |
RHSA-2024:10035
|
Red Hat Security Advisory: Red Hat Build of Apache Camel 4.4 for Quarkus 3.8 update is now available (RHBQ 3.8.6.SP2)
|
io.quarkiverse.cxf:quarkus-cxf: Quarkus CXF may log user password and secret to application log org.hl7.fhir.convertors: org.hl7.fhir.dstu2: org.hl7.fhir.dstu2016may: org.hl7.fhir.dstu3: org.hl7.fhir.r4: org.hl7.fhir.r5: org.hl7.fhir.utilities: org.hl7.fhir.validation: org.hl7.fhir.core: FHIR arbitrary code execution via specially-crafted request
|
[
"cpe:/a:redhat:camel_quarkus:3.8"
] | null | 5.3 | 9.1 | null |
RHSA-2020:2238
|
Red Hat Security Advisory: java-1.7.1-ibm security update
|
OpenJDK: Excessive memory usage in OID processing in X.509 certificate parsing (Libraries, 8234037) OpenJDK: Incorrect handling of references to uninitialized class descriptors during deserialization (Serialization, 8224541) OpenJDK: Uncaught InstantiationError exception in ObjectStreamClass (Serialization, 8224549) OpenJDK: Re-use of single TLS session for new connections (JSSE, 8234408) OpenJDK: CRLF injection into HTTP headers in HttpServer (Lightweight HTTP Server, 8234825) OpenJDK: Incorrect bounds checks in NIO Buffers (Libraries, 8234841) OpenJDK: Incorrect type checks in MethodType.readObject() (Libraries, 8235274) OpenJDK: Regular expression DoS in Scanner (Concurrency, 8236201)
|
[
"cpe:/a:redhat:rhel_extras:7"
] | null | 5.3 | null | null |
RHSA-2023:6939
|
Red Hat Security Advisory: container-tools:rhel8 security and bug fix update
|
go-yaml: Improve heuristics preventing CPU/memory abuse by parsing malicious or large YAML documents golang.org/x/net/http2: avoid quadratic complexity in HPACK decoding golang: crypto/tls: large handshake records may cause panics golang: net/http, mime/multipart: denial of service from excessive resource consumption golang.org/x/net/html: Cross site scripting golang: net/http, net/textproto: denial of service from excessive memory allocation golang: net/http, net/textproto, mime/multipart: denial of service from excessive resource consumption golang: go/parser: Infinite loop in parsing golang: html/template: backticks not treated as string delimiters golang: html/template: improper sanitization of CSS values golang: html/template: improper handling of JavaScript whitespace containerd: Supplementary groups are not set up properly runc: Rootless runc makes `/sys/fs/cgroup` writable runc: volume mount race condition (regression of CVE-2019-19921) runc: AppArmor can be bypassed when `/proc` inside the container is symlinked with a specific mount configuration golang: html/template: improper handling of empty HTML attributes golang: net/http: insufficient sanitization of Host header
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 6.5 | null | null |
RHSA-2023:3884
|
Red Hat Security Advisory: Red Hat Single Sign-On 7.6.4 security update on RHEL 8
|
RHSSO: XSS due to lax URI scheme validation Undertow: Infinite loop in SslConduit during close keycloak: Untrusted Certificate Validation keycloak: oauth client impersonation keycloak: client access via device auth request spoof
|
[
"cpe:/a:redhat:red_hat_single_sign_on:7.6::el8"
] | null | 3.5 | null | null |
RHSA-2008:1001
|
Red Hat Security Advisory: tog-pegasus security update
|
tog-pegasus: WBEM services access not restricted to dedicated user after 2.7.0 rebase tog-pegasus: failed authentication attempts not logged via PAM
|
[
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2025:1268
|
Red Hat Security Advisory: kernel security update
|
kernel: media: uvcvideo: Skip parsing frames of type UVC_VS_UNDEFINED in uvc_parse_format kernel: mm: fix NULL pointer dereference in alloc_pages_bulk_noprof
|
[
"cpe:/a:redhat:rhel_eus:9.2::appstream",
"cpe:/a:redhat:rhel_eus:9.2::crb",
"cpe:/o:redhat:rhel_eus:9.2::baseos"
] | null | 5.5 | null | null |
RHSA-2022:7007
|
Red Hat Security Advisory: java-1.8.0-openjdk security update
|
OpenJDK: improper handling of long NTLM client hostnames (Security, 8286526) OpenJDK: insufficient randomization of JNDI DNS port numbers (JNDI, 8286910) OpenJDK: excessive memory allocation in X.509 certificate parsing (Security, 8286533) OpenJDK: HttpServer no connection count limit (Lightweight HTTP Server, 8286918)
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::crb"
] | null | 5.3 | null | null |
RHSA-2022:6386
|
Red Hat Security Advisory: openvswitch2.17 security update
|
dpdk: DoS when a Vhost header crosses more than two descriptors and exhausts all mbufs
|
[
"cpe:/o:redhat:enterprise_linux:9::fastdatapath"
] | null | 8.6 | null | null |
RHSA-2024:5481
|
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 8.0.3 Security update
|
cxf-core: Apache CXF SSRF Vulnerability using the Aegis databinding netty-codec-http: Allocation of Resources Without Limits or Throttling org.bouncycastle: Importing an EC certificate with crafted F2m parameters may lead to Denial of Service bc-java: BouncyCastle vulnerable to a timing variant of Bleichenbacher (Marvin Attack) org.bouncycastle:bcprov-jdk18on: Infinite loop in ED25519 verification in the ScalarUtil class
|
[
"cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el9"
] | null | 7.5 | null | null |
RHSA-2024:0113
|
Red Hat Security Advisory: kernel security update
|
kernel: vmwgfx: integer overflow in vmwgfx_execbuf.c kernel: UAF during login when accessing the shost ipaddress kernel: use after free in unix_stream_sendpage kernel: vmwgfx: reference count issue leads to use-after-free in surface handling amd: Return Address Predictor vulnerability leading to information disclosure kernel: netfilter: potential slab-out-of-bound access due to integer underflow
|
[
"cpe:/a:redhat:enterprise_linux:8::crb",
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 7 | null | null |
RHSA-2020:1864
|
Red Hat Security Advisory: gcc security and bug fix update
|
gcc: POWER9 "DARN" RNG intrinsic produces repeated output
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb",
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | null | 7.5 | null |
RHSA-2017:2706
|
Red Hat Security Advisory: kernel security update
|
kernel: stack buffer overflow in the native Bluetooth stack
|
[
"cpe:/o:redhat:rhel_eus:7.2::computenode",
"cpe:/o:redhat:rhel_eus:7.2::server"
] | null | null | 7.5 | null |
RHSA-2024:1499
|
Red Hat Security Advisory: thunderbird security update
|
nss: timing attack against RSA decryption Mozilla: Crash in NSS TLS method Mozilla: Leaking of encrypted email subjects to other conversations Mozilla: JIT code failed to save return registers on Armv7-A Mozilla: Integer overflow could have led to out of bounds write Mozilla: Improper handling of html and body tags enabled CSP nonce leakage Mozilla: Clickjacking vulnerability could have led to a user accidentally granting permissions Mozilla: Self referencing object could have potentially led to a use-after-free Mozilla: Memory safety bugs fixed in Firefox 124, Firefox ESR 115.9, and Thunderbird 115.9
|
[
"cpe:/a:redhat:rhel_aus:8.4::appstream",
"cpe:/a:redhat:rhel_e4s:8.4::appstream",
"cpe:/a:redhat:rhel_tus:8.4::appstream"
] | null | 7.5 | null | null |
RHSA-2023:5223
|
Red Hat Security Advisory: thunderbird security update
|
libwebp: Heap buffer overflow in WebP Codec libwebp: out-of-bounds write with a specially crafted WebP lossless file
|
[
"cpe:/a:redhat:rhel_eus:9.0::appstream"
] | null | 0 | null | null |
RHSA-2018:1278
|
Red Hat Security Advisory: java-1.7.0-openjdk security update
|
OpenJDK: incorrect merging of sections in the JAR manifest (Security, 8189969) OpenJDK: unrestricted deserialization of data from JCEKS key stores (Security, 8189997) OpenJDK: insufficient consistency checks in deserialization of multiple classes (Security, 8189977) OpenJDK: unbounded memory allocation during deserialization in PriorityBlockingQueue (Concurrency, 8189981) OpenJDK: unbounded memory allocation during deserialization in TabularDataSupport (JMX, 8189985) OpenJDK: unbounded memory allocation during deserialization in Container (AWT, 8189989) OpenJDK: unbounded memory allocation during deserialization in NamedNodeMapImpl (JAXP, 8189993) OpenJDK: RMI HTTP transport enabled by default (RMI, 8193833) OpenJDK: incorrect handling of Reference clones can lead to sandbox bypass (Hotspot, 8192025) OpenJDK: unbounded memory allocation during deserialization in StubIORImpl (Serialization, 8192757)
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 5.3 | null |
RHSA-2022:5054
|
Red Hat Security Advisory: cups security update
|
cups: authorization bypass when using "local" authorization
|
[
"cpe:/a:redhat:rhel_e4s:8.1::appstream",
"cpe:/o:redhat:rhel_e4s:8.1::baseos"
] | null | 6.7 | null | null |
RHBA-2023:6364
|
Red Hat Bug Fix Advisory: golang and delve bug fix and enhancement update
|
golang: html/template: improper handling of HTML-like comments within script contexts golang: html/template: improper handling of special tags within script contexts golang: crypto/tls: panic when processing post-handshake message on QUIC connections golang: crypto/tls: lack of a limit on buffered post-handshake
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 7.5 | null | null |
RHSA-2015:0118
|
Red Hat Security Advisory: mariadb security update
|
mysql: unspecified vulnerability related to Server:InnoDB:DML (CPU Jan 2015) mysql: unspecified vulnerability related to Server:Security:Privileges:Foreign Key (CPU Jan 2015) mysql: unspecified vulnerability related to Server:Replication (CPU Jan 2015) mysql: unspecified vulnerability related to Server:Replication (CPU Jan 2015) mysql: unspecified vulnerability related to Server:DDL (CPU Jan 2015) mysql: unspecified vulnerability related to Server:Security:Encryption (CPU Jan 2015) mysql: unspecified vulnerability related to Server:InnoDB:DDL:Foreign Key (CPU Jan 2015)
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | null | null |
RHSA-2024:6044
|
Red Hat Security Advisory: Red Hat Advanced Cluster Management 2.11.2 bug fixes and container updates
|
nodejs-semver: Regular expression denial of service
|
[
"cpe:/a:redhat:acm:2.11::el9"
] | null | 7.5 | null | null |
RHSA-2018:3399
|
Red Hat Security Advisory: libvirt security update
|
hw: cpu: speculative store bypass
|
[
"cpe:/o:redhat:rhel_aus:6.4::server"
] | null | null | 5.6 | null |
RHSA-2015:2559
|
Red Hat Security Advisory: Red Hat JBoss BRMS 6.2.0 update
|
batik: XML External Entity (XXE) injection in SVG parsing jsoup: XSS vulnerability related to incomplete tags at EOF apache-commons-collections: InvokerTransformer code execution during deserialisation
|
[
"cpe:/a:redhat:jboss_brms:6.2"
] | null | null | null | null |
RHSA-2023:5432
|
Red Hat Security Advisory: thunderbird security update
|
firefox: use-after-free in workers Mozilla: Out-of-bounds write in PathOps Mozilla: Use-after-free in Ion Compiler Mozilla: Memory safety bugs fixed in Firefox 118, Firefox ESR 115.3, and Thunderbird 115.3 libvpx: Heap buffer overflow in vp8 encoding in libvpx
|
[
"cpe:/a:redhat:rhel_aus:8.2::appstream",
"cpe:/a:redhat:rhel_e4s:8.2::appstream",
"cpe:/a:redhat:rhel_tus:8.2::appstream"
] | null | 8.8 | null | null |
RHSA-2009:0373
|
Red Hat Security Advisory: systemtap security update
|
systemtap: race condition leads to privilege escalation
|
[
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws",
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2018:2419
|
Red Hat Security Advisory: Red Hat JBoss BPM Suite 6.4.11 security update
|
slf4j: Deserialisation vulnerability in EventData constructor can allow for arbitrary code execution
|
[
"cpe:/a:redhat:jboss_bpms:6.4"
] | null | null | 8.1 | null |
RHSA-2012:0037
|
Red Hat Security Advisory: mod_cluster-native security update
|
mod_cluster: malicious worker nodes can register on any vhost
|
[
"cpe:/a:redhat:jboss_enterprise_application_platform:5::el4",
"cpe:/a:redhat:jboss_enterprise_application_platform:5::el5",
"cpe:/a:redhat:jboss_enterprise_application_platform:5::el6"
] | null | null | null | null |
RHSA-2021:2185
|
Red Hat Security Advisory: kernel security and bug fix update
|
kernel: use after free in eventpoll.c may lead to escalation of privilege kernel: DoS by corrupting mountpoint reference counter kernel: Integer overflow in Intel(R) Graphics Drivers kernel: SCSI target (LIO) write to any block on ILO backstore
|
[
"cpe:/a:redhat:rhel_eus:8.2::crb",
"cpe:/o:redhat:rhel_eus:8.2::baseos"
] | null | 8.1 | null | null |
RHSA-2020:1462
|
Red Hat Security Advisory: python security update
|
python: Missing salt initialization in _elementtree.c module python: CRLF injection via the query part of the url passed to urlopen() python: CRLF injection via the path part of the url passed to urlopen() python: Undocumented local_file protocol allows remote attackers to bypass protection mechanisms
|
[
"cpe:/o:redhat:rhel_eus:7.6::computenode",
"cpe:/o:redhat:rhel_eus:7.6::server"
] | null | null | 7.4 | null |
RHSA-2012:1591
|
Red Hat Security Advisory: JBoss Enterprise Application Platform 6.0.1 update
|
httpd: mod_negotiation XSS via untrusted file names in directories with MultiViews enabled apache-cxf: Certain child policies of WS-SecurityPolicy 1.1 SupportingToken policy not applied on the client side apache-cxf: Apache CXF does not verify that elements were signed / encrypted by a particular Supporting Token Mojarra: deployed web applications can read FacesContext from other applications under certain conditions httpd: mod_negotiation XSS via untrusted file names in directories with MultiViews enabled JBoss: Datasource connection manager returns valid connection for wrong credentials when using security-domains apache-cxf: SOAPAction spoofing on document literal web services AS: EJB authorization succeeds for any role when allowed roles list is empty JACC: Security constraints configured for EJBs are incorrectly interpreted and not applied
|
[
"cpe:/a:redhat:jboss_enterprise_application_platform:6::el5"
] | null | null | null | null |
RHSA-2018:1927
|
Red Hat Security Advisory: pcs security update
|
pcs: Debug parameter removal bypass, allowing information disclosure
|
[
"cpe:/o:redhat:enterprise_linux:6::server"
] | null | null | 4.3 | null |
RHSA-2014:0819
|
Red Hat Security Advisory: Red Hat JBoss BPM Suite 6.0.2 update
|
Xalan-Java: insufficient constraints in secure processing feature smack: incorrect X.509 certificate validation smack: IQ response spoofing
|
[
"cpe:/a:redhat:jboss_bpms:6.0"
] | null | null | null | null |
RHSA-2022:7581
|
Red Hat Security Advisory: python38:3.8 and python38-devel:3.8 security update
|
python: mailcap: findmatch() function does not sanitize the second argument
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb"
] | null | 7.6 | null | null |
RHSA-2021:4038
|
Red Hat Security Advisory: binutils security update
|
environment: Unicode's bidirectional (BiDi) override characters can cause trojan source attacks
|
[
"cpe:/o:redhat:rhel_aus:7.2::server"
] | null | 8.5 | null | null |
RHSA-2005:217
|
Red Hat Security Advisory: mc security update
|
security flaw security flaw security flaw
|
[
"cpe:/o:redhat:enterprise_linux:2.1::as",
"cpe:/o:redhat:enterprise_linux:2.1::aw",
"cpe:/o:redhat:enterprise_linux:2.1::ws"
] | null | null | null | null |
RHSA-2019:3286
|
Red Hat Security Advisory: php security update
|
php: underflow in env_path_info in fpm_main.c
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 8.1 | null |
RHSA-2023:4919
|
Red Hat Security Advisory: Red Hat Single Sign-On 7.6.5 security update on RHEL 8
|
jackson-databind: Possible DoS if using JDK serialization to serialize JsonNode jettison: Uncontrolled Recursion in JSONArray undertow: OutOfMemoryError due to @MultipartConfig handling
|
[
"cpe:/a:redhat:red_hat_single_sign_on:7.6::el8"
] | null | 7.5 | null | null |
RHSA-2024:3309
|
Red Hat Security Advisory: glibc security update
|
glibc: Out of bounds write in iconv may lead to remote code execution glibc: stack-based buffer overflow in netgroup cache glibc: null pointer dereferences after failed netgroup cache insertion glibc: netgroup cache may terminate daemon on memory allocation failure glibc: netgroup cache assumes NSS callback uses in-buffer strings
|
[
"cpe:/a:redhat:rhel_aus:8.4::appstream",
"cpe:/a:redhat:rhel_e4s:8.4::appstream",
"cpe:/a:redhat:rhel_tus:8.4::appstream",
"cpe:/o:redhat:rhel_aus:8.4::baseos",
"cpe:/o:redhat:rhel_e4s:8.4::baseos",
"cpe:/o:redhat:rhel_tus:8.4::baseos"
] | null | 4 | null | null |
RHSA-2011:1533
|
Red Hat Security Advisory: ipa security and bug fix update
|
FreeIPA: CSRF vulnerability
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2020:3952
|
Red Hat Security Advisory: expat security update
|
expat: large number of colons in input makes parser consume high amount of resources, leading to DoS expat: heap-based buffer over-read via crafted XML input
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 7.5 | 7.5 | null |
RHSA-2014:0030
|
Red Hat Security Advisory: java-1.7.0-oracle security update
|
OpenJDK: jarsigner does not detect unsigned bytecode injected into signed jars JDK: multiple unspecified vulnerabilities fixed in 7u51 (JavaFX) OpenJDK: null xmlns handling issue (Security, 8025026) OpenJDK: insufficient security checks in CORBA stub factories (CORBA, 8026193) JDK: unspecified vulnerability fixed in 6u71 and 7u51 (Deployment) JDK: unspecified vulnerability fixed in 6u71 and 7u51 (Deployment) JDK: unspecified vulnerability fixed in 6u71 and 7u51 (Deployment) OpenJDK: JVM method processing issues (Libraries, 8029507) JDK: multiple unspecified vulnerabilities fixed in 7u51 (JavaFX) OpenJDK: com.sun.corba.se. should be restricted package (CORBA, 8025022) JDK: unspecified vulnerability fixed in 6u71 and 7u51 (Deployment) JDK: unspecified vulnerability fixed in 6u71 and 7u51 (Deployment) JDK: unspecified vulnerability fixed in 6u71 and 7u51 (Deployment) JDK: unspecified vulnerability fixed in 7u51 (Deployment) JDK: unspecified vulnerability fixed in 5.0u71, 6u71 and 7u51 (Install) JDK: unspecified vulnerability fixed in 5.0u71, 6u71 and 7u51 (Install) ICU: Layout Engine LookupProcessor insufficient input checks (JDK 2D, 8025034) OpenJDK: XML canonicalizer mutable strings passed to untrusted code (Security, 8026417) OpenJDK: insufficient Socket checkListen checks (Networking, 8011786) OpenJDK: SnmpStatusException handling issues (Serviceability, 7068126) JDK: unspecified vulnerability fixed in 6u71 and 7u51 (Deployment) OpenJDK: document builder missing security checks (JAXP, 8027201, 8025018) JDK: multiple unspecified vulnerabilities fixed in 7u51 (JavaFX) JDK: unspecified vulnerability fixed in 6u71 and 7u51 (Deployment) JDK: unspecified vulnerability fixed in 6u71 and 7u51 (Deployment) JDK: unspecified vulnerability fixed in 6u71 and 7u51 (Deployment) OpenJDK: TLS/SSL handshake timing issues (JSSE, 8023069) JDK: unspecified vulnerability fixed in 6u71 and 7u51 (Deployment) OpenJDK: insecure subject principals set handling (JAAS, 8024306) JDK: unspecified vulnerability fixed in 5.0u71, 6u71 and 7u51 (2D) JDK: unspecified vulnerability fixed in 6u71 and 7u51 (Deployment) OpenJDK: insufficient package access checks in the Naming component (JNDI, 8025758) OpenJDK: XXE issue in decoder (Beans, 8023245) JDK: unspecified vulnerability fixed in 6u71 and 7u51 (Deployment) OpenJDK: insufficient security checks in IIOP streams (CORBA, 8025767)
|
[
"cpe:/a:redhat:rhel_extras:5::client",
"cpe:/a:redhat:rhel_extras:5::server",
"cpe:/a:redhat:rhel_extras:6"
] | null | null | null | null |
RHSA-2005:850
|
Red Hat Security Advisory: imap security update
|
security flaw
|
[
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws"
] | null | null | null | null |
RHSA-2023:4770
|
Red Hat Security Advisory: cups security update
|
cups: Information leak through Cups-Get-Document operation
|
[
"cpe:/a:redhat:rhel_eus:8.6::appstream",
"cpe:/o:redhat:rhel_eus:8.6::baseos"
] | null | 6.5 | null | null |
RHSA-2021:5055
|
Red Hat Security Advisory: thunderbird security update
|
Mozilla: Memory safety bugs fixed in Firefox 95 and Firefox ESR 91.4 Mozilla: JavaScript unexpectedly enabled for the composition area Mozilla: URL leakage when navigating while executing asynchronous function Mozilla: Heap buffer overflow when using structured clone Mozilla: Missing fullscreen and pointer lock notification when requesting both Mozilla: GC rooting failure when calling wasm instance methods Mozilla: External protocol handler parameters were unescaped Mozilla: XMLHttpRequest error codes could have leaked the existence of an external protocol handler Mozilla: Bypass of CSP sandbox directive when embedding Mozilla: Denial of Service when using the Location API in a loop Mozilla: Cursor spoofing could overlay user interface when native cursor is zoomed
|
[
"cpe:/a:redhat:rhel_e4s:8.1::appstream"
] | null | 5.4 | 6.1 | null |
RHSA-2022:0450
|
Red Hat Security Advisory: Red Hat Single Sign-On 7.5.1 for OpenShift image security and enhancement update
|
log4j: Remote code execution in Log4j 1.x when application is configured to use JMSAppender log4j: Remote code execution in Log4j 1.x when application is configured to use JMSSink log4j: SQL injection in Log4j 1.x when application is configured to use JDBCAppender log4j: Unsafe deserialization flaw in Chainsaw log viewer
|
[
"cpe:/a:redhat:rhosemc:1.0::el8"
] | null | 8.8 | null | null |
RHSA-2021:2989
|
Red Hat Security Advisory: lasso security update
|
lasso: XML signature wrapping vulnerability when parsing SAML responses
|
[
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 8.8 | null | null |
RHSA-2021:4588
|
Red Hat Security Advisory: gcc-toolset-10-binutils security update
|
environment: Unicode's bidirectional (BiDi) override characters can cause trojan source attacks
|
[
"cpe:/a:redhat:rhel_eus:8.4::appstream"
] | null | 8.5 | null | null |
RHSA-2021:3295
|
Red Hat Security Advisory: libsndfile security update
|
libsndfile: Heap buffer overflow via crafted WAV file allows arbitrary code execution
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 8.8 | null | null |
RHSA-2020:2968
|
Red Hat Security Advisory: java-1.8.0-openjdk security update
|
OpenJDK: Incorrect handling of access control context in ForkJoinPool (Libraries, 8237117) OpenJDK: HostnameChecker does not ensure X.509 certificate names are in normalized form (JSSE, 8237592) OpenJDK: Unexpected exception raised by DerInputStream (Libraries, 8237731) OpenJDK: Unexpected exception raised by DerValue.equals() (Libraries, 8237736) OpenJDK: Bypass of boundary checks in nio.Buffer via concurrent access (Libraries, 8238920) OpenJDK: Incomplete bounds checks in Affine Transformations (2D, 8240119) OpenJDK: XML validation manipulation due to incomplete application of the use-grammar-pool-only feature (JAXP, 8242136)
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 5.3 | null | null |
RHSA-2022:5914
|
Red Hat Security Advisory: Red Hat Kiali for OpenShift Service Mesh 2.1 security update
|
moment: inefficient parsing algorithm resulting in DoS
|
[
"cpe:/a:redhat:service_mesh:2.1::el8"
] | null | 7.5 | null | null |
RHSA-2019:1456
|
Red Hat Security Advisory: Red Hat Single Sign-On 7.3.2 security update
|
bootstrap: XSS in the data-target attribute bootstrap: Cross-site Scripting (XSS) in the data-target property of scrollspy bootstrap: XSS in the tooltip data-viewport attribute bootstrap: XSS in the affix configuration target property picketlink: reflected XSS in SAMLRequest via RelayState parameter picketlink: URL injection via xinclude parameter keycloak: missing signatures validation on CRL used to verify client certificates undertow: leak credentials to log files UndertowLogger.REQUEST_LOGGER.undertowRequestFailed bootstrap: XSS in the tooltip or popover data-template attribute keycloak: Node.js adapter internal NBF can be manipulated leading to DoS. jquery: Prototype pollution in object's prototype leading to denial of service, remote code execution, or property injection
|
[
"cpe:/a:redhat:jboss_single_sign_on:7.3"
] | null | null | 5.6 | null |
RHSA-2009:1579
|
Red Hat Security Advisory: httpd security update
|
httpd: NULL pointer defer in mod_proxy_ftp caused by crafted EPSV and PASV reply httpd: mod_proxy_ftp FTP command injection via Authorization HTTP header TLS: MITM attacks via session renegotiation
|
[
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws",
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.