id
stringlengths 13
15
| title
stringlengths 29
176
| description
stringlengths 8
32.1k
| cpes
listlengths 0
20
| cvss_v4_0
null | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
null |
---|---|---|---|---|---|---|---|
RHSA-2017:1491
|
Red Hat Security Advisory: kernel security and bug fix update
|
kernel: heap/stack gap jumping via unbounded stack allocations kernel: Incorrectly mapped contents of PIE executable
|
[
"cpe:/o:redhat:rhel_mission_critical:6.2::server"
] | null | null | 2.9 | null |
RHSA-2020:3176
|
Red Hat Security Advisory: postgresql-jdbc security update
|
postgresql-jdbc: XML external entity (XXE) vulnerability in PgSQLXML
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 7.7 | null | null |
RHSA-2020:0688
|
Red Hat Security Advisory: OpenShift Container Platform 4.2.22 runc security update
|
runc: volume mount race condition with shared mounts leads to information leak/integrity manipulation
|
[
"cpe:/a:redhat:openshift:4.2::el8"
] | null | 7 | null | null |
RHSA-2004:157
|
Red Hat Security Advisory: cadaver security update
|
security flaw
|
[
"cpe:/o:redhat:enterprise_linux:2.1::as",
"cpe:/o:redhat:enterprise_linux:2.1::aw",
"cpe:/o:redhat:enterprise_linux:2.1::es",
"cpe:/o:redhat:enterprise_linux:2.1::ws"
] | null | null | null | null |
RHBA-2023:3300
|
Red Hat Bug Fix Advisory: Release of Bug Advisories for the Jenkins image and Jenkins agent base image
|
dev-java/snakeyaml: DoS via stack overflow
|
[
"cpe:/a:redhat:ocp_tools:4.12::el8"
] | null | 6.5 | null | null |
RHSA-2020:3598
|
Red Hat Security Advisory: kernel security and bug fix update
|
kernel: kernel: DAX hugepages not considered during mremap
|
[
"cpe:/o:redhat:rhel_eus:7.7::computenode",
"cpe:/o:redhat:rhel_eus:7.7::server"
] | null | 7 | null | null |
RHBA-2021:1163
|
Red Hat Bug Fix Advisory: openvswitch2.11 bug fix and enhancement update
|
openvswitch: use-after-free in decode_NXAST_RAW_ENCAP during the decoding of a RAW_ENCAP action
|
[
"cpe:/o:redhat:enterprise_linux:8::fastdatapath"
] | null | 7.5 | null | null |
RHSA-2022:2201
|
Red Hat Security Advisory: rsync security update
|
zlib: A flaw found in zlib when compressing (not decompressing) certain inputs
|
[
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 8.2 | null | null |
RHSA-2022:8940
|
Red Hat Security Advisory: kernel security and bug fix update
|
kernel: KVM: cmpxchg_gpte can write to pfns outside the userspace region kernel: openvswitch: integer underflow leads to out-of-bounds write in reserve_sfa_size()
|
[
"cpe:/o:redhat:rhel_aus:8.2::baseos",
"cpe:/o:redhat:rhel_e4s:8.2::baseos",
"cpe:/o:redhat:rhel_tus:8.2::baseos"
] | null | 7.8 | null | null |
RHSA-2022:8340
|
Red Hat Security Advisory: freetype security update
|
FreeType: Buffer overflow in sfnt_init_face FreeType: Segmentation violation via FNT_Size_Request Freetype: Segmentation violation via FT_Request_Size
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/o:redhat:enterprise_linux:9::baseos"
] | null | 7.1 | null | null |
RHSA-2019:1669
|
Red Hat Security Advisory: openstack-ironic-inspector security update
|
openstack-ironic-inspector: SQL Injection vulnerability when receiving introspection data
|
[
"cpe:/a:redhat:openstack:14::el7"
] | null | null | 8.3 | null |
RHSA-2017:1508
|
Red Hat Security Advisory: openstack-nova security, bug fix, and enhancement update
|
openstack-nova: Sensitive information included in legacy notification exception contexts
|
[
"cpe:/a:redhat:openstack:9::el7"
] | null | null | 6.1 | null |
RHSA-2018:1241
|
Red Hat Security Advisory: OpenShift Container Platform 3.2 security update
|
source-to-image: Improper path sanitization in ExtractTarStreamFromTarReader in tar/tar.go
|
[
"cpe:/a:redhat:openshift:3.2::el7"
] | null | null | 9.9 | null |
RHSA-2021:0281
|
Red Hat Security Advisory: OpenShift Container Platform 4.4.33 bug fix and security update
|
kubernetes: compromised node could escalate to cluster level privileges kubernetes: Docker config secrets leaked when file is malformed and loglevel >= 4 openshift: builder allows read and write of block devices
|
[
"cpe:/a:redhat:openshift:4.4::el7",
"cpe:/a:redhat:openshift:4.4::el8"
] | null | 8.8 | null | null |
RHSA-2017:3466
|
Red Hat Security Advisory: qemu-kvm-rhev security and bug fix update
|
Qemu: qemu-nbd crashes due to undefined I/O coroutine Qemu: qemu-nbd: server breaks with SIGPIPE upon client abort Qemu: exec: oob access during dma operation Qemu: i386: multiboot OOB access while loading kernel image Qemu: cirrus: OOB access issue in mode4and5 write functions
|
[
"cpe:/a:redhat:openstack:11::el7"
] | null | null | 4.4 | null |
RHSA-2011:1694
|
Red Hat Security Advisory: libcap security and bug fix update
|
capsh: does not chdir after chroot
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2023:0624
|
Red Hat Security Advisory: libksba security update
|
libksba: integer overflow to code execution
|
[
"cpe:/a:redhat:rhel_eus:8.4::crb",
"cpe:/o:redhat:rhel_eus:8.4::baseos"
] | null | 8.6 | null | null |
RHSA-2017:1105
|
Red Hat Security Advisory: bind security update
|
bind: Incorrect error handling causes assertion failure when using DNS64 with "break-dnssec yes;" bind: Processing a response containing CNAME or DNAME with unusual order can crash resolver
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | 7.5 | null |
RHSA-2016:0305
|
Red Hat Security Advisory: openssl security update
|
OpenSSL: SSLv2 doesn't block disabled ciphers SSL/TLS: Cross-protocol attack on TLS using SSLv2 (DROWN)
|
[
"cpe:/o:redhat:rhel_eus:6.6::computenode",
"cpe:/o:redhat:rhel_eus:6.6::server",
"cpe:/o:redhat:rhel_eus:7.1::computenode",
"cpe:/o:redhat:rhel_eus:7.1::server"
] | null | null | null | null |
RHSA-2023:1747
|
Red Hat Security Advisory: pki-core:10.6 security update
|
pki-core: access to external entities when parsing XML can lead to XXE
|
[
"cpe:/a:redhat:rhel_aus:8.2::appstream",
"cpe:/a:redhat:rhel_e4s:8.2::appstream",
"cpe:/a:redhat:rhel_tus:8.2::appstream"
] | null | 7.5 | null | null |
RHSA-2024:5520
|
Red Hat Security Advisory: kpatch-patch-4_18_0-477_43_1 security update
|
kernel: TIPC message reassembly use-after-free remote code execution vulnerability kernel: net: kernel: UAF in network route management
|
[
"cpe:/o:redhat:rhel_eus:8.8::baseos"
] | null | 7.8 | null | null |
RHSA-2004:586
|
Red Hat Security Advisory: glibc security update
|
security flaw
|
[
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws"
] | null | null | null | null |
RHSA-2022:0546
|
Red Hat Security Advisory: ruby:2.5 security update
|
rubygem-bundler: Dependencies of gems with explicit source may be installed from a different source
|
[
"cpe:/a:redhat:rhel_eus:8.4::appstream"
] | null | 8.8 | null | null |
RHSA-2014:0370
|
Red Hat Security Advisory: httpd security update
|
httpd: mod_dav denial of service via crafted DAV WRITE request httpd: mod_log_config does not properly handle logging certain cookies resulting in DoS
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2023:4021
|
Red Hat Security Advisory: kernel security and bug fix update
|
kernel: use-after-free caused by l2cap_reassemble_sdu() in net/bluetooth/l2cap_core.c
|
[
"cpe:/o:redhat:rhel_aus:7.6::server"
] | null | 7.1 | null | null |
RHSA-2016:1034
|
Red Hat Security Advisory: docker security, bug fix, and enhancement update
|
docker: privilege escalation via confusion of usernames and UIDs
|
[
"cpe:/a:redhat:rhel_extras_other:7"
] | null | null | null | null |
RHSA-2018:2572
|
Red Hat Security Advisory: Red Hat Enterprise Linux 6.4 Advanced Mission Critical (AMC) Six-Month Notice
|
This is the Six-Month notification for the retirement of Red Hat Enterprise Linux 6.4 Advanced Mission Critical (AMC). This notification applies only to those customers subscribed to the Advanced Mission Critical (AMC) channel for Red Hat Enterprise Linux 6.4.
|
[
"cpe:/o:redhat:rhel_aus:6.4::server"
] | null | null | null | null |
RHSA-2005:639
|
Red Hat Security Advisory: kdenetwork security update
|
security flaw security flaw security flaw security flaw
|
[
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2016:0701
|
Red Hat Security Advisory: java-1.7.1-ibm security update
|
JDK: buffer overflow vulnerability in the IBM JVM JDK: insecure use of invoke method in CORBA component, incorrect CVE-2013-3009 fix JDK: insecure deserialization in CORBA, incorrect CVE-2013-5456 fix OpenJDK: insufficient thread consistency checks in ObjectInputStream (Serialization, 8129952) OpenJDK: insufficient byte type checks (Hotspot, 8132051) JDK: unspecified vulnerability fixed in 6u115, 7u101 and 8u91 (2D) OpenJDK: non-constant time GCM authentication tag comparison (JCE, 8143945) OpenJDK: unrestricted deserialization of authentication credentials (JMX, 8144430) JDK: unspecified vulnerability fixed in 6u115, 7u101 and 8u91 (2D) JDK: unspecified vulnerability fixed in 6u115, 7u101 and 8u91 (Deployment)
|
[
"cpe:/a:redhat:rhel_extras:6",
"cpe:/a:redhat:rhel_extras:7"
] | null | null | null | null |
RHSA-2020:2054
|
Red Hat Security Advisory: Open Liberty 20.0.0.5 Runtime security update
|
Open Liberty 20.0.0.5 Runtime is now available from the Customer Portal.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
|
[
"cpe:/a:openliberty:20"
] | null | null | null | null |
RHSA-2017:0359
|
Red Hat Security Advisory: openstack-puppet-modules security update
|
puppet-swift: installs config file with world readable permissions
|
[
"cpe:/a:redhat:openstack:9::el7"
] | null | null | 6.5 | null |
RHSA-2024:4846
|
Red Hat Security Advisory: OpenShift Container Platform 4.13.46 security update
|
dnspython: denial of service in stub resolver go-retryablehttp: url might write sensitive information to log file
|
[
"cpe:/a:redhat:openshift:4.13::el8",
"cpe:/a:redhat:openshift:4.13::el9"
] | null | 6 | null | null |
RHSA-2024:10696
|
Red Hat Security Advisory: Red Hat OpenStack Platform 16.2 (python-werkzeug) security update
|
python-werkzeug: user may execute code on a developer's machine
|
[
"cpe:/a:redhat:openstack:16.2::el8"
] | null | 7.5 | null | null |
RHSA-2010:0924
|
Red Hat Security Advisory: wireshark security update
|
wireshark: stack overflow in BER dissector Wireshark: Heap-based buffer overflow in LDSS dissector
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2019:1793
|
Red Hat Security Advisory: vim security update
|
vim/neovim: ': source!' command allows arbitrary command execution via modelines
|
[
"cpe:/o:redhat:rhel_eus:7.5::computenode",
"cpe:/o:redhat:rhel_eus:7.5::server"
] | null | 5.3 | null | null |
RHSA-2022:1728
|
Red Hat Security Advisory: java-11-openjdk security update
|
OpenJDK: Unbounded memory allocation when compiling crafted XPath expressions (JAXP, 8270504) OpenJDK: Improper object-to-string conversion in AnnotationInvocationHandler (Libraries, 8277672) OpenJDK: Missing check for negative ObjectIdentifier (Libraries, 8275151) OpenJDK: Defective secure validation in Apache Santuario (Libraries, 8278008) OpenJDK: URI parsing inconsistencies (JNDI, 8278972)
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::crb"
] | null | 5.3 | null | null |
RHSA-2024:11121
|
Red Hat Security Advisory: gstreamer1-plugins-good security update
|
gstreamer1-plugins-good: OOB-write in isomp4/qtdemux.c gstreamer1-plugins-good: OOB-write in convert_to_s334_1a gstreamer1-plugins-good: uninitialized stack memory in Matroska/WebM demuxer gstreamer1-plugins-good: integer overflows in MP4/MOV demuxer and memory allocator that can lead to out-of-bounds writes gstreamer1-plugins-good: null pointer dereference in gst_gdk_pixbuf_dec_flush
|
[
"cpe:/a:redhat:rhel_eus:9.4::appstream"
] | null | 6.5 | null | null |
RHSA-2017:2863
|
Red Hat Security Advisory: kernel security and bug fix update
|
kernel: Possible heap buffer overflow in brcmf_cfg80211_mgmt_tx()
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | 6.8 | null |
RHSA-2023:5142
|
Red Hat Security Advisory: .NET 6.0 security and bug fix update
|
dotnet: Denial of Service with Client Certificates using .NET Kestrel
|
[
"cpe:/a:redhat:rhel_dotnet:6.0::el7"
] | null | 6.5 | null | null |
RHBA-2021:1167
|
Red Hat Bug Fix Advisory: Openshift Logging Bug Fix Release (5.0.2)
|
golang: crypto/elliptic: incorrect operations on the P-224 curve
|
[
"cpe:/a:redhat:logging:5.0::el8"
] | null | 6.5 | null | null |
RHSA-2018:1347
|
Red Hat Security Advisory: kernel security update
|
Kernel: KVM: error in exception handling leads to wrong debug stack value Kernel: error in exception handling leads to DoS kernel: ptrace() incorrect error handling leads to corruption and DoS
|
[
"cpe:/o:redhat:rhel_aus:7.2::server",
"cpe:/o:redhat:rhel_e4s:7.2::server",
"cpe:/o:redhat:rhel_tus:7.2::server"
] | null | null | 7.8 | null |
RHSA-2024:4468
|
Red Hat Security Advisory: OpenShift Container Platform 4.16.3 security update
|
goproxy: Denial of service (DoS) via unspecified vectors.
|
[
"cpe:/a:redhat:openshift:4.16::el9"
] | null | 7.5 | null | null |
RHSA-2017:2192
|
Red Hat Security Advisory: mariadb security and bug fix update
|
mysql: Incorrect input validation allowing code execution via mysqldump mysql: insecure error log file handling in mysqld_safe (CPU Oct 2016) mysql: insecure error log file handling in mysqld_safe (CPU Oct 2016) mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2017) mysql: Server: Charsets unspecified vulnerability (CPU Jan 2017) mysql: Server: DML unspecified vulnerability (CPU Jan 2017) mysql: Server: DDL unspecified vulnerability (CPU Jan 2017) mysql: unsafe chmod/chown use in init script (CPU Jan 2017) mysql: unrestricted mysqld_safe's ledir (CPU Jan 2017) mysql: prepared statement handle use-after-free after disconnect mysql: Server: DML unspecified vulnerability (CPU Apr 2017) mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2017) mysql: insecure error log file handling in mysqld_safe, incomplete CVE-2016-6664 fix (CPU Jan 2017) mysql: Server: MyISAM unspecified vulnerability (CPU Jan 2017) mysql: Logging unspecified vulnerability (CPU Jan 2017) mysql: Server: Error Handling unspecified vulnerability (CPU Jan 2017) mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2017) mysql: Server: DML unspecified vulnerability (CPU Apr 2017) mysql: Server: DDL unspecified vulnerability (CPU Apr 2017) mysql: Incorrect input validation allowing code execution via mysqldump mysql: Client mysqldump unspecified vulnerability (CPU Jul 2017)
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 4.3 | null |
RHSA-2020:4223
|
Red Hat Security Advisory: OpenShift Container Platform 3.11.306 jenkins security update
|
jetty: double release of resource can lead to information disclosure jenkins: user-specified tooltip values leads to stored cross-site scripting jenkins: stored XSS vulnerability in project naming strategy jenkins: stored XSS vulnerability in 'trigger builds remotely'
|
[
"cpe:/a:redhat:openshift:3.11::el7"
] | null | 5.4 | null | null |
RHSA-2008:0196
|
Red Hat Security Advisory: unzip security update
|
unzip: free() called for uninitialized or already freed pointer
|
[
"cpe:/o:redhat:enterprise_linux:2.1::as",
"cpe:/o:redhat:enterprise_linux:2.1::aw",
"cpe:/o:redhat:enterprise_linux:2.1::es",
"cpe:/o:redhat:enterprise_linux:2.1::ws",
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws"
] | null | null | null | null |
RHSA-2022:6181
|
Red Hat Security Advisory: rsync security update
|
rsync: remote arbitrary files write inside the directories of connecting peers
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/o:redhat:enterprise_linux:9::baseos"
] | null | 7.4 | null | null |
RHSA-2023:0858
|
Red Hat Security Advisory: kpatch-patch security update
|
kernel: memory corruption in AX88179_178A based USB ethernet device. kernel: use-after-free caused by l2cap_reassemble_sdu() in net/bluetooth/l2cap_core.c kernel: stack overflow in do_proc_dointvec and proc_skip_spaces
|
[
"cpe:/o:redhat:rhel_e4s:8.1::baseos"
] | null | 7.8 | null | null |
RHSA-2016:0726
|
Red Hat Security Advisory: ImageMagick security update
|
ImageMagick: Insufficient shell characters filtering ImageMagick: File deletion ImageMagick: File moving ImageMagick: Local file read ImageMagick: SSRF vulnerability
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation",
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 8.4 | null |
RHSA-2023:2029
|
Red Hat Security Advisory: OpenShift Security Profiles Operator bug fix update
|
go-getter: go-getter vulnerable to denial of service via malicious compressed archive containerd: Supplementary groups are not set up properly
|
[
"cpe:/a:redhat:openshift_security_profiles_operator_stable:::el8"
] | null | 7.3 | null | null |
RHSA-2020:4500
|
Red Hat Security Advisory: bind security, bug fix, and enhancement update
|
bind: asterisk character in an empty non-terminal can cause an assertion failure in rbtdb.c bind: truncated TSIG response can lead to an assertion failure bind: remotely triggerable assertion failure in pk11.c bind: incorrect enforcement of update-policy rules of type "subdomain"
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 4.3 | null | null |
RHSA-2006:0276
|
Red Hat Security Advisory: php security update
|
security flaw security flaw security flaw security flaw security flaw security flaw
|
[
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws",
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2017:1125
|
Red Hat Security Advisory: kernel security and bug fix update
|
kernel: Race condition access to n_hdlc.tbuf causes double free in n_hdlc_release()
|
[
"cpe:/o:redhat:rhel_eus:7.2::computenode",
"cpe:/o:redhat:rhel_eus:7.2::server"
] | null | null | 7.8 | null |
RHSA-2008:0134
|
Red Hat Security Advisory: tcltk security update
|
postgresql DoS via infinite loop in regex NFA optimization code Tk GIF processing buffer overflow tk: GIF handling buffer overflow
|
[
"cpe:/o:redhat:enterprise_linux:2.1::as",
"cpe:/o:redhat:enterprise_linux:2.1::aw",
"cpe:/o:redhat:enterprise_linux:2.1::es",
"cpe:/o:redhat:enterprise_linux:2.1::ws",
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws"
] | null | null | null | null |
RHSA-2021:3144
|
Red Hat Security Advisory: .NET Core 2.1 on Red Hat Enterprise Linux security and bugfix update
|
dotnet: Dump file created world-readable
|
[
"cpe:/a:redhat:rhel_dotnet:2.1::el7"
] | null | 5.5 | null | null |
RHSA-2023:6068
|
Red Hat Security Advisory: python39:3.9 and python39-devel:3.9 security update
|
python: TLS handshake bypass
|
[
"cpe:/a:redhat:rhel_eus:8.6::appstream",
"cpe:/a:redhat:rhel_eus:8.6::crb"
] | null | 8.6 | null | null |
RHSA-2009:0002
|
Red Hat Security Advisory: thunderbird security update
|
Layout engine crashes - Firefox 2 and 3 Layout engine crash - Firefox 3 only JavaScript engine crash - Firefox 3 only Firefox 2 Information stealing via loadBindingDocument Firefox XMLHttpRequest 302 response disclosure Firefox Cross-domain data theft via script redirect error message Firefox errors parsing URLs with control characters Firefox XSS via XBL bindings to unloaded document Firefox JavaScript privilege escalation Firefox XSS vulnerabilities in SessionStore
|
[
"cpe:/a:redhat:rhel_productivity:5",
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws",
"cpe:/o:redhat:enterprise_linux:5::client"
] | null | null | null | null |
RHSA-2025:0312
|
Red Hat Security Advisory: raptor2 security update
|
raptor: integer underflow when normalizing a URI with the turtle parser
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::crb"
] | null | 7.3 | null | null |
RHSA-2024:9097
|
Red Hat Security Advisory: buildah security update
|
containers/image: digest type does not guarantee valid type net/http: Denial of service due to improper 100-continue handling in net/http
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 5.9 | null | null |
RHSA-2024:1239
|
Red Hat Security Advisory: opencryptoki security update
|
opencryptoki: timing side-channel in handling of RSA PKCS#1 v1.5 padded ciphertexts (Marvin)
|
[
"cpe:/a:redhat:enterprise_linux:9::crb",
"cpe:/o:redhat:enterprise_linux:9::baseos"
] | null | 5.9 | null | null |
RHSA-2022:0444
|
Red Hat Security Advisory: Red Hat Single Sign-On 7.4.10 on OpenJDK for OpenShift image security update
|
log4j: Remote code execution in Log4j 1.x when application is configured to use JMSAppender log4j: Remote code execution in Log4j 1.x when application is configured to use JMSSink log4j: SQL injection in Log4j 1.x when application is configured to use JDBCAppender log4j: Unsafe deserialization flaw in Chainsaw log viewer
|
[
"cpe:/a:redhat:rhosemc:1.0::el8"
] | null | 8.8 | null | null |
RHSA-2023:0468
|
Red Hat Security Advisory: Red Hat OpenShift GitOps security update
|
ArgoCD: JWT audience claim is not verified
|
[
"cpe:/a:redhat:openshift_gitops:1.5::el8"
] | null | 8.8 | null | null |
RHSA-2022:6061
|
Red Hat Security Advisory: Red Hat OpenStack Platform 16.2 (etcd) security update
|
prometheus/client_golang: Denial of service using InstrumentHandlerCounter golang: compress/gzip: stack exhaustion in Reader.Read
|
[
"cpe:/a:redhat:openstack:16.2::el8"
] | null | 7.5 | null | null |
RHSA-2021:1796
|
Red Hat Security Advisory: container-tools:rhel8 security, bug fix, and enhancement update
|
golang: crypto/ssh: crafted authentication request can lead to nil pointer dereference podman: Remote traffic to rootless containers is seen as orginating from localhost
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 5.9 | null | null |
RHSA-2020:4647
|
Red Hat Security Advisory: freerdp and vinagre security, bug fix, and enhancement update
|
freerdp: Out of bound read in cliprdr_server_receive_capabilities freerdp: Out of bound read in update_recv could result in a crash freerdp: Integer overflow in VIDEO channel freerdp: Out of bound read/write in usb redirection channel freerdp: Out of bound access in clear_decompress_subcode_rlex freerdp: Unchecked read of array offset in rdpsnd_recv_wave2_pdu freerdp: out-of-bounds read in update_read_icon_info function freerdp: out of bound read in rfx_process_message_tileset freerdp: double free in update_read_cache_bitmap_v3_order function freerdp: out of bounds read in update_read_bitmap_data function freerdp: out of bounds seek in update_read_synchronize function could lead out of bounds read freerdp: out-of-bounds read in autodetect_recv_bandwidth_measure_results function freerdp: out-of-bounds read could result in aborting the session freerdp: out-of-bound read of client memory that is then passed on to the protocol parser freerdp: stream out-of-bounds seek in rdp_read_font_capability_set could lead to out-of-bounds read freerdp: out-of-bounds read in cliprdr_read_format_list function freerdp: out-of-bounds read in ntlm_read_ntlm_v2_client_challenge function freerdp: out-of-bounds read in ntlm_read_AuthenticateMessage freerdp: out-of-bounds read in ntlm_read_NegotiateMessage freerdp: out-of-bounds read in irp functions freerdp: out-of-bounds read in gdi.c freerdp: out-of-bounds read in bitmap.c freerdp: Stream pointer out of bounds in update_recv_secondary_order could lead out of bounds read later freerdp: Out-of-bounds read in ntlm_read_ChallengeMessage in winpr/libwinpr/sspi/NTLM/ntlm_message.c. freerdp: Out-of-bounds read in security_fips_decrypt in libfreerdp/core/security.c
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb"
] | null | 6.1 | null | null |
RHSA-2007:0894
|
Red Hat Security Advisory: mysql security update
|
mysql DROP privilege not enforced when renaming tables mysql SECURITY INVOKER functions do not drop privileges mysql malformed password crasher New release of MySQL fixes security bugs New release of MySQL fixes security bugs
|
[
"cpe:/a:redhat:rhel_application_stack:1"
] | null | null | null | null |
RHSA-2013:1763
|
Red Hat Security Advisory: ruby193-ruby security update
|
ruby: heap overflow in floating point parsing
|
[
"cpe:/a:redhat:rhel_software_collections:1::el6"
] | null | null | null | null |
RHSA-2018:1202
|
Red Hat Security Advisory: java-1.8.0-oracle security update
|
OpenJDK: incorrect merging of sections in the JAR manifest (Security, 8189969) OpenJDK: unrestricted deserialization of data from JCEKS key stores (Security, 8189997) OpenJDK: insufficient consistency checks in deserialization of multiple classes (Security, 8189977) OpenJDK: unbounded memory allocation during deserialization in PriorityBlockingQueue (Concurrency, 8189981) OpenJDK: unbounded memory allocation during deserialization in TabularDataSupport (JMX, 8189985) OpenJDK: unbounded memory allocation during deserialization in Container (AWT, 8189989) OpenJDK: unbounded memory allocation during deserialization in NamedNodeMapImpl (JAXP, 8189993) OpenJDK: RMI HTTP transport enabled by default (RMI, 8193833) JDK: unspecified vulnerability fixed in 8u171 and 10.0.1 (Install) OpenJDK: incorrect handling of Reference clones can lead to sandbox bypass (Hotspot, 8192025) OpenJDK: unbounded memory allocation during deserialization in StubIORImpl (Serialization, 8192757)
|
[
"cpe:/a:redhat:rhel_extras_oracle_java:6"
] | null | null | 5.3 | null |
RHSA-2016:1978
|
Red Hat Security Advisory: python-twisted-web security update
|
Twisted: sets environmental variable based on user supplied Proxy request header
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation",
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 5 | null |
RHSA-2023:0387
|
Red Hat Security Advisory: OpenJDK 8u362 Security Update for Portable Linux Builds
|
OpenJDK: improper restrictions in CORBA deserialization (Serialization, 8285021) OpenJDK: soundbank URL remote loading (Sound, 8293742)
|
[
"cpe:/a:redhat:openjdk:1.8"
] | null | 3.7 | null | null |
RHSA-2023:3291
|
Red Hat Security Advisory: rh-ruby27-ruby security, bug fix, and enhancement update
|
ruby/cgi-gem: HTTP response splitting in CGI ruby: ReDoS vulnerability in URI ruby: ReDoS vulnerability in Time
|
[
"cpe:/a:redhat:rhel_software_collections:3::el7"
] | null | 5.3 | null | null |
RHSA-2019:1174
|
Red Hat Security Advisory: kernel-rt security update
|
hardware: Microarchitectural Store Buffer Data Sampling (MSBDS) hardware: Micro-architectural Load Port Data Sampling - Information Leak (MLPDS) hardware: Microarchitectural Fill Buffer Data Sampling (MFBDS) hardware: Microarchitectural Data Sampling Uncacheable Memory (MDSUM)
|
[
"cpe:/a:redhat:enterprise_linux:8::nfv",
"cpe:/a:redhat:enterprise_linux:8::realtime"
] | null | null | 3.8 | null |
RHSA-2016:1330
|
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 6.4 security update
|
JGroups: Authorization bypass
|
[
"cpe:/a:redhat:jboss_enterprise_application_platform:6::el5",
"cpe:/a:redhat:jboss_enterprise_application_platform:6::el6",
"cpe:/a:redhat:jboss_enterprise_application_platform:6::el7"
] | null | null | 9.8 | null |
RHSA-2008:1043
|
Red Hat Security Advisory: java-1.4.2-bea security update
|
java-1.4.2-bea as shipped in Red Hat Enterprise Linux 3 Extras, Red Hat
Enterprise Linux 4 Extras, and Red Hat Enterprise Linux 5 Supplementary,
contains security flaws and should not be used.
This update has been rated as having important security impact by the Red
Hat Security Response Team.
|
[
"cpe:/a:redhat:rhel_extras:3",
"cpe:/a:redhat:rhel_extras:4",
"cpe:/a:redhat:rhel_extras:5::client",
"cpe:/a:redhat:rhel_extras:5::server"
] | null | null | null | null |
RHSA-2022:1069
|
Red Hat Security Advisory: expat security update
|
expat: Large number of prefixed XML attributes on a single tag can crash libexpat expat: Integer overflow in doProlog in xmlparse.c expat: Integer overflow in addBinding in xmlparse.c expat: Integer overflow in build_model in xmlparse.c expat: Integer overflow in defineAttribute in xmlparse.c expat: Integer overflow in lookup in xmlparse.c expat: Integer overflow in nextScaffoldPart in xmlparse.c expat: Integer overflow in storeAtts in xmlparse.c expat: Integer overflow in function XML_GetBuffer expat: Malformed 2- and 3-byte UTF-8 sequences can lead to arbitrary code execution expat: Namespace-separator characters in "xmlns[:prefix]" attribute values can lead to arbitrary code execution expat: Integer overflow in storeRawNames()
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 9.8 | null | null |
RHSA-2016:2039
|
Red Hat Security Advisory: python-django security update
|
python-django: CSRF protection bypass on a site with Google Analytics
|
[
"cpe:/a:redhat:openstack:5::el7"
] | null | null | 6.1 | null |
RHBA-2024:5645
|
Red Hat Bug Fix Advisory: linux-firmware bug fix and enhancement update
|
hw: amd: SMM Lock Bypass
|
[
"cpe:/o:redhat:rhel_eus:9.2::baseos"
] | null | 7.5 | null | null |
RHSA-2019:3725
|
Red Hat Security Advisory: rh-python36-python security, bug fix, and enhancement update
|
python: DOS via regular expression catastrophic backtracking in apop() method in pop3lib python: DOS via regular expression backtracking in difflib.IS_LINE_JUNK method in difflib python: Missing salt initialization in _elementtree.c module python: Integer overflow in Modules/_pickle.c allows for memory exhaustion if serializing gigabytes of data python: Cookie domain check returns incorrect results python: NULL pointer dereference using a specially crafted X509 certificate python: CRLF injection via the query part of the url passed to urlopen() python: CRLF injection via the path part of the url passed to urlopen() python: Undocumented local_file protocol allows remote attackers to bypass protection mechanisms python: email.utils.parseaddr wrongly parses email addresses
|
[
"cpe:/a:redhat:rhel_software_collections:3::el6",
"cpe:/a:redhat:rhel_software_collections:3::el7"
] | null | null | 7.3 | null |
RHSA-2024:4406
|
Red Hat Security Advisory: python3 security update
|
python: Path traversal on tempfile.TemporaryDirectory python: The zipfile module is vulnerable to zip-bombs leading to denial of service
|
[
"cpe:/a:redhat:rhel_aus:8.6::appstream",
"cpe:/a:redhat:rhel_e4s:8.6::appstream",
"cpe:/a:redhat:rhel_tus:8.6::appstream",
"cpe:/o:redhat:rhel_aus:8.6::baseos",
"cpe:/o:redhat:rhel_e4s:8.6::baseos",
"cpe:/o:redhat:rhel_tus:8.6::baseos"
] | null | 6.2 | null | null |
RHSA-2016:2808
|
Red Hat Security Advisory: Red Hat JBoss Web Server 2.1.2 security update for Tomcat 7
|
tomcat: Session fixation tomcat: CSRF token leak tomcat: security manager bypass via StatusManagerServlet tomcat: Security Manager bypass via persistence mechanisms tomcat: security manager bypass via setGlobalContext() tomcat: Usage of vulnerable FileUpload package can result in denial of service
|
[
"cpe:/a:redhat:jboss_enterprise_web_server:2.1"
] | null | null | 7.5 | null |
RHSA-2023:4889
|
Red Hat Security Advisory: DevWorkspace Operator 0.22 release
|
openssh: Remote code execution in ssh-agent PKCS#11 support
|
[
"cpe:/a:redhat:devworkspace:1.0::el8"
] | null | 9.8 | null | null |
RHSA-2020:4667
|
Red Hat Security Advisory: mailman:2.1 security and bug fix update
|
mailman: XSS via file attachments in list archives
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 6.1 | null | null |
RHSA-2022:4651
|
Red Hat Security Advisory: container-tools:2.0 security update
|
psgo: Privilege escalation in 'podman top' podman: Default inheritable capabilities for linux container should be empty buildah: Default inheritable capabilities for linux container should be empty
|
[
"cpe:/a:redhat:rhel_eus:8.2::appstream"
] | null | 4.8 | null | null |
RHBA-2018:0337
|
Red Hat Bug Fix Advisory: Red Hat Satellite 6.3 Base Libraries
|
v8: multiple vulnerabilities fixed in Google Chrome version 33.0.1750.146 rubygem-rack: Potential Denial of Service Vulnerability in Rack normalize_params() qpid-proton: reactor sends messages in clear if ssl is requested but not available
|
[
"cpe:/a:redhat:satellite:6.3::el7",
"cpe:/a:redhat:satellite_capsule:6.3::el7"
] | null | null | null | null |
RHSA-2004:188
|
Red Hat Security Advisory: Updated kernel packages available for Red Hat Enterprise Linux 3 Update 2
|
security flaw security flaw security flaw security flaw security flaw security flaw
|
[
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws"
] | null | null | null | null |
RHSA-2018:0521
|
Red Hat Security Advisory: java-1.7.1-ibm security update
|
JDK: J9 JVM allows untrusted code running under a security manager to elevate its privileges OpenJDK: unsynchronized access to encryption key data (Libraries, 8172525) OpenJDK: insufficient validation of the invokeinterface instruction (Hotspot, 8174962) OpenJDK: LdapLoginModule insufficient username encoding in LDAP query (LDAP, 8178449) OpenJDK: DnsClient missing source port randomization (JNDI, 8182125) OpenJDK: loading of classes from untrusted locations (I18n, 8182601) OpenJDK: DerValue unbounded memory allocation (Libraries, 8182387) OpenJDK: insufficient strength of key agreement (JCE, 8185292) OpenJDK: LDAPCertStore insecure handling of LDAP referrals (JNDI, 8186606) OpenJDK: use of global credentials for HTTP/SPNEGO (JGSS, 8186600) OpenJDK: SingleEntryRegistry incorrect setup of deserialization filter (JMX, 8186998) OpenJDK: GTK library loading use-after-free (AWT, 8185325) JDK: unspecified vulnerability fixed in 6u181 and 7u171 (Serialization) OpenJDK: ArrayBlockingQueue deserialization to an inconsistent state (Libraries, 8189284) OpenJDK: unbounded memory allocation during deserialization (AWT, 8190289) OpenJDK: unbounded memory allocation in BasicAttributes deserialization (JNDI, 8191142)
|
[
"cpe:/a:redhat:rhel_extras:6"
] | null | null | 4.3 | null |
RHSA-2019:3134
|
Red Hat Security Advisory: java-1.8.0-openjdk security update
|
OpenJDK: Missing restrictions on use of custom SocketImpl (Networking, 8218573) OpenJDK: Improper handling of Kerberos proxy credentials (Kerberos, 8220302) OpenJDK: NULL pointer dereference in DrawGlyphList (2D, 8222690) OpenJDK: Unexpected exception thrown by Pattern processing crafted regular expression (Concurrency, 8222684) OpenJDK: Unexpected exception thrown by XPathParser processing crafted XPath expression (JAXP, 8223505) OpenJDK: Unexpected exception thrown during regular expression processing in Nashorn (Scripting, 8223518) OpenJDK: Incorrect handling of nested jar: URLs in Jar URL handler (Networking, 8223892) OpenJDK: Unexpected exception thrown by XPath processing crafted XPath expression (JAXP, 8224532) OpenJDK: Unexpected exception thrown during Font object deserialization (Serialization, 8224915) OpenJDK: Missing glyph bitmap image dimension check in FreetypeFontScaler (2D, 8225286) OpenJDK: Integer overflow in bounds check in SunGraphics2D (2D, 8225292) OpenJDK: Incorrect handling of HTTP proxy responses in HttpURLConnection (Networking, 8225298) OpenJDK: Excessive memory allocation in CMap when reading TrueType font (2D, 8225597) OpenJDK: Insufficient filtering of HTML event attributes in Javadoc (Javadoc, 8226765)
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | null | 4.7 | null |
RHSA-2014:0294
|
Red Hat Security Advisory: XStream security update
|
XStream: remote code execution due to insecure XML deserialization
|
[
"cpe:/a:redhat:jboss_data_virtualization:6.0"
] | null | null | null | null |
RHSA-2025:0882
|
Red Hat Security Advisory: libsoup security update
|
libsoup: buffer overflow via UTF-8 conversion in soup_header_parse_param_list_strict
|
[
"cpe:/a:redhat:rhel_e4s:9.0::appstream"
] | null | 9 | null | null |
RHSA-2017:2840
|
Red Hat Security Advisory: dnsmasq security update
|
dnsmasq: heap overflow in the code responsible for building DNS replies
|
[
"cpe:/o:redhat:rhel_els:5"
] | null | null | 9.8 | null |
RHSA-2014:1833
|
Red Hat Security Advisory: Red Hat JBoss Enterprise Web Platform 5.2.0 security update
|
CXF: SSL hostname verification bypass, incomplete CVE-2012-5783 fix CXF: SSL hostname verification bypass, incomplete CVE-2012-6153 fix
|
[
"cpe:/a:redhat:jboss_enterprise_web_platform:5::el4",
"cpe:/a:redhat:jboss_enterprise_web_platform:5::el5",
"cpe:/a:redhat:jboss_enterprise_web_platform:5::el6"
] | null | null | 4.8 | null |
RHSA-2024:4390
|
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 8.0 security update
|
httpd: CONTINUATION frames DoS
|
[
"cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el8",
"cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el9"
] | null | 7.5 | null | null |
RHSA-2012:1592
|
Red Hat Security Advisory: JBoss Enterprise Application Platform 6.0.1 update
|
httpd: mod_negotiation XSS via untrusted file names in directories with MultiViews enabled apache-cxf: Certain child policies of WS-SecurityPolicy 1.1 SupportingToken policy not applied on the client side apache-cxf: Apache CXF does not verify that elements were signed / encrypted by a particular Supporting Token Mojarra: deployed web applications can read FacesContext from other applications under certain conditions httpd: mod_negotiation XSS via untrusted file names in directories with MultiViews enabled JBoss: Datasource connection manager returns valid connection for wrong credentials when using security-domains apache-cxf: SOAPAction spoofing on document literal web services AS: EJB authorization succeeds for any role when allowed roles list is empty JACC: Security constraints configured for EJBs are incorrectly interpreted and not applied
|
[
"cpe:/a:redhat:jboss_enterprise_application_platform:6::el6"
] | null | null | null | null |
RHSA-2006:0486
|
Red Hat Security Advisory: mailman security update
|
security flaw
|
[
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws",
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2009:1321
|
Red Hat Security Advisory: nfs-utils security and bug fix update
|
nfs-utils: incorrect use of tcp_wrappers, causing hostname-based rules to be ignored
|
[
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2014:1088
|
Red Hat Security Advisory: Red Hat JBoss Web Server 2.1.0 update
|
tomcat: information disclosure via XXE when running untrusted web applications httpd: mod_deflate denial of service Tomcat/JBossWeb: XML parser hijack by malicious web application httpd: mod_status heap-based buffer overflow Tomcat/JBossWeb: request smuggling and limited DoS in ChunkedInputFilter httpd: mod_cgid denial of service
|
[
"cpe:/a:redhat:jboss_enterprise_web_server:2::el5"
] | null | null | null | null |
RHSA-2018:0336
|
Red Hat Security Advisory: Satellite 6.3 security, bug fix, and enhancement update
|
rubygem-will_paginate: XSS vulnerabilities foreman: models with a 'belongs_to' association to an Organization do not verify association belongs to that Organization V8: integer overflow leading to buffer overflow in Zone::New foreman: inspect in a provisioning template exposes sensitive controller information pulp: Leakage of CA key in pulp-qpid-ssl-cfg pulp: Unsafe use of bash $RANDOM for NSS DB password and seed foreman: privilege escalation through Organization and Locations API foreman: Information disclosure in provisioning template previews foreman: inside discovery-debug, the root password is displayed in plaintext foreman: Persistent XSS in Foreman remote execution plugin foreman: Foreman information leak through unauthorized multiple_checkboxes helper foreman: Information leak through organizations and locations feature foreman: Stored XSS vulnerability in remote execution plugin foreman: Stored XSS in org/loc wizard foreman: Stored XSS via organization/location with HTML in name foreman-debug: missing obfuscation of sensitive information katello-debug: Possible symlink attacks due to use of predictable file names puppet: Unsafe YAML deserialization rubygem-hammer_cli: no verification of API server's SSL certificate foreman: Image password leak Interconnect: Denial of Service vulnerability in Red Hat JBoss AMQ Interconnect katello: SQL inject in errata-related REST API
|
[
"cpe:/a:redhat:satellite:6.3::el7",
"cpe:/a:redhat:satellite_capsule:6.3::el7"
] | null | null | 4.3 | null |
RHBA-2024:1228
|
Red Hat Bug Fix Advisory: openvswitch3.2 bug fix and enhancement update
|
openvswitch: openvswitch don't match packets on nd_target field
|
[
"cpe:/o:redhat:enterprise_linux:9::fastdatapath"
] | null | 5.5 | null | null |
RHSA-2024:0413
|
Red Hat Security Advisory: libxml2 security update
|
libxml2: integer overflows with XML_PARSE_HUGE libxml2: dict corruption caused by entity reference cycles libxml2: NULL dereference in xmlSchemaFixupComplexType libxml2: Hashing of empty dict strings isn't deterministic libxml2: crafted xml can cause global buffer overflow
|
[
"cpe:/a:redhat:rhel_eus:8.6::appstream",
"cpe:/o:redhat:rhel_eus:8.6::baseos"
] | null | 6.5 | null | null |
RHSA-2022:7700
|
Red Hat Security Advisory: gdisk security update
|
gdisk: possible out-of-bounds-write in LoadPartitionTable of gpt.cc gdisk: possible out-of-bounds-write in ReadLogicalParts of basicmbr.cc
|
[
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 6.8 | null | null |
RHSA-2017:1097
|
Red Hat Security Advisory: Red Hat JBoss Data Grid 7.1
|
netty: Infinite loop vulnerability when handling renegotiation using SslProvider.OpenSsl infinispan: auth bypass in REST api
|
[
"cpe:/a:redhat:jboss_data_grid:7.1"
] | null | null | 6.5 | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.