id
stringlengths 13
15
| title
stringlengths 29
176
| description
stringlengths 8
32.1k
| cpes
listlengths 0
20
| cvss_v4_0
null | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
null |
---|---|---|---|---|---|---|---|
RHSA-2020:0378
|
Red Hat Security Advisory: ipa security and bug fix update
|
ipa: Batch API logging user passwords to /var/log/httpd/error_log ipa: Denial of service in IPA server due to wrong use of ber_scanf()
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 8.8 | null |
RHSA-2024:1063
|
Red Hat Security Advisory: edk2 security update
|
edk2: Buffer overflow in the DHCPv6 client via a long Server ID option edk2: Buffer overflow when processing DNS Servers option in a DHCPv6 Advertise message
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 8.8 | null | null |
RHSA-2014:0413
|
Red Hat Security Advisory: java-1.7.0-oracle security update
|
libjpeg: information leak (read of uninitialized memory) libpng: unhandled zero-length PLTE chunk or NULL palette OpenJDK: Incorrect mlib/raster image validation (2D, 8027841) JDK: unspecified vulnerability fixed in 7u55 and 8u5 (Libraries) OpenJDK: Protect logger handlers (Libraries, 8029740) JDK: unspecified vulnerability fixed in 7u55 and 8u5 (Deployment) JDK: unspecified vulnerability fixed in 6u75, 7u55 and 8u5 (Deployment) OpenJDK: AWT incorrect FlavorMap seperation (AWT, 8026797) OpenJDK: incorrect caching of data initialized via TCCL (JAXWS, 8026801) OpenJDK: RSA unpadding timing issues (Security, 8027766) OpenJDK: Prevent SIGNATURE_PRIMITIVE_SET from being modified (Security, 8029745) OpenJDK: MethodHandle variable argument lists handling (Libraries, 8029844) OpenJDK: System.arraycopy() element race condition (Hotspot, 8029858) OpenJDK: ServiceLoader Exception handling security bypass (Libraries, 8031394) OpenJDK: Activation framework default command map caching (JAX-WS, 8025152) lcms: insufficient ICC profile version validation (OpenJDK 2D, 8031335) OpenJDK: missing randomization of JNDI DNS client query IDs (JNDI, 8030731) OpenJDK: Better ScriptEngineManager ScriptEngine management (Libraries, 8036794) OpenJDK: insecure temporary file use in unpack200 (Libraries, 8033618) OpenJDK: classfile parser invalid BootstrapMethods attribute length (Hotspot, 8034926) OpenJDK: insufficient escaping of window title string (Javadoc, 8026736) JDK: unspecified vulnerability fixed in 5.0u75, 6u75, 7u55 and 8u5 (2D) OpenJDK: Incorrect NIO channel separation (Libraries, 8026716) OpenJDK: JAXP CharInfo file access restriction (JAXP, 8029282) JDK: unspecified vulnerability fixed in 6u75, 7u55 and 8u5 (Deployment) OpenJDK: AWT thread context handling (AWT, 8025010) OpenJDK: method handle call hierachy bypass (Libraries, 8032686) OpenJDK: incorrect caching of data initialized via TCCL (JAXB, 8025030) JDK: unspecified vulnerability fixed in 6u75, 7u55 and 8u5 (Deployment) OpenJDK: JPEG decoder input stream handling (2D, 8029854) JDK: unspecified vulnerability fixed in 7u55 and 8u5 (JavaFX) OpenJDK: incorrect caching of data initialized via TCCL (JAXWS, 8026188) OpenJDK: remove insecure Java Sound provider caching (Sound, 8026163) JDK: unspecified vulnerability fixed in 6u75, 7u55 and 8u5 (Deployment)
|
[
"cpe:/a:redhat:rhel_extras_oracle_java:5",
"cpe:/a:redhat:rhel_extras_oracle_java:6"
] | null | null | null | null |
RHSA-2024:9122
|
Red Hat Security Advisory: xorg-x11-server security update
|
xorg-x11-server: Heap buffer overread/data leakage in ProcXIGetSelectedEvents xorg-x11-server: Heap buffer overread/data leakage in ProcXIPassiveGrabDevice xorg-x11-server: Use-after-free in ProcRenderAddGlyphs
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::crb"
] | null | 7.8 | null | null |
RHBA-2020:0690
|
Red Hat Bug Fix Advisory: OpenShift Container Platform 4.1.38 packages update
|
jenkins-git-client-plugin: OS command injection via 'git ls-remote'
|
[
"cpe:/a:redhat:openshift:4.1::el7",
"cpe:/a:redhat:openshift:4.1::el8"
] | null | 8.8 | null | null |
RHSA-2022:6167
|
Red Hat Security Advisory: thunderbird security update
|
Mozilla: Address bar spoofing via XSLT error handling Mozilla: Cross-origin XSLT Documents would have inherited the parent's permissions Mozilla: Data race and potential use-after-free in PK11_ChangePW Mozilla: Memory safety bugs fixed in Firefox 104 and Firefox ESR 102.2 Mozilla: Memory safety bugs fixed in Firefox 104, Firefox ESR 102.2, and Firefox ESR 91.13
|
[
"cpe:/a:redhat:rhel_e4s:8.1::appstream"
] | null | 8.8 | 7.5 | null |
RHSA-2019:3834
|
Red Hat Security Advisory: kernel security update
|
hw: Machine Check Error on Page Size Change (IFU) hw: Intel GPU Denial Of Service while accessing MMIO in lower power state hw: TSX Transaction Asynchronous Abort (TAA)
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 6.5 | null |
RHBA-2021:3033
|
Red Hat Bug Fix Advisory: OpenShift Container Platform 4.7.24 packages update
|
jenkins: improper permission checks allow canceling queue items and aborting builds jenkins: session fixation vulnerability
|
[
"cpe:/a:redhat:openshift:4.7::el7",
"cpe:/a:redhat:openshift:4.7::el8"
] | null | 7.5 | null | null |
RHSA-2019:0368
|
Red Hat Security Advisory: systemd security update
|
systemd: Insufficient input validation in bus_process_object() resulting in PID 1 crash
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 7 | null |
RHSA-2017:0826
|
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 6.4.14 update on RHEL 5
|
RESTEasy: Abuse of GZIPInterceptor in RESTEasy can lead to denial of service attack jboss: jbossas writable config files allow privilege escalation tomcat: Infinite loop in the processing of https requests
|
[
"cpe:/a:redhat:jboss_enterprise_application_platform:6::el5"
] | null | null | 7.5 | null |
RHSA-2004:681
|
Red Hat Security Advisory: samba security update
|
security flaw
|
[
"cpe:/o:redhat:enterprise_linux:2.1::as",
"cpe:/o:redhat:enterprise_linux:2.1::aw",
"cpe:/o:redhat:enterprise_linux:2.1::es",
"cpe:/o:redhat:enterprise_linux:2.1::ws"
] | null | null | null | null |
RHSA-2022:7129
|
Red Hat Security Advisory: git-lfs security and bug fix update
|
golang.org/x/text: Panic in language.ParseAcceptLanguage while parsing -u- extension golang.org/x/text: Panic in language.ParseAcceptLanguage while processing bcp47 tag golang: net/http: improper sanitization of Transfer-Encoding header golang: net/http: handle server errors after sending GOAWAY golang: io/fs: stack exhaustion in Glob golang: path/filepath: stack exhaustion in Glob golang: encoding/gob: stack exhaustion in Decoder.Decode golang: net/http/httputil: NewSingleHostReverseProxy - omit X-Forwarded-For not working golang: math/big: decoding big.Float and big.Rat types can panic if the encoded message is too short, potentially allowing a denial of service
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 6.5 | null | null |
RHSA-2024:10939
|
Red Hat Security Advisory: kernel security update
|
kernel: net/smc: fix illegal rmb_desc access in SMC-D connection dump kernel: block: initialize integrity buffer to zero before writing it to media kernel: iommu: Restore lost return in iommu_report_device_fault() kernel: netfilter: flowtable: initialise extack before use kernel: selinux,smack: don't bypass permissions check in inode_setsecctx hook kernel: net: avoid potential underflow in qdisc_pkt_len_init() with UFO kernel: netfilter: nft_payload: sanitize offset and length before calling skb_checksum()
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::crb",
"cpe:/a:redhat:enterprise_linux:9::nfv",
"cpe:/a:redhat:enterprise_linux:9::realtime",
"cpe:/o:redhat:enterprise_linux:9::baseos"
] | null | 5.5 | null | null |
RHBA-2019:0884
|
Red Hat Bug Fix Advisory: Red Hat Ansible Tower 3.3.5-3 - Container
|
Tower: credentials leaked through environment variables
|
[
"cpe:/a:redhat:ansible_tower:3.3::el7"
] | null | null | 7.2 | null |
RHSA-2023:2123
|
Red Hat Security Advisory: libreswan security update
|
libreswan: Malicious IKEv1 Aggressive Mode packets can crash libreswan
|
[
"cpe:/a:redhat:rhel_eus:8.6::appstream"
] | null | 7.5 | null | null |
RHSA-2021:1350
|
Red Hat Security Advisory: thunderbird security update
|
Mozilla: More internal network hosts could have been probed by a malicious webpage Mozilla: Out of bound write due to lazy initialization Mozilla: Use-after-free in Responsive Design Mode Mozilla: Secure Lock icon could have been spoofed Mozilla: Blob URLs may have been granted additional privileges Mozilla: Arbitrary FTP command execution on FTP servers using an encoded URL Mozilla: Incorrect size computation in WebAssembly JIT could lead to null-reads Mozilla: Port blocking could be bypassed Mozilla: Race condition when reading from disk while verifying signatures
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 2.5 | 6.1 | null |
RHSA-2020:4315
|
Red Hat Security Advisory: firefox security update
|
Mozilla: Memory safety bugs fixed in Firefox 82 and Firefox ESR 78.4 chromium-browser: Use after free in WebRTC
|
[
"cpe:/a:redhat:rhel_eus:8.1::appstream"
] | null | 8.8 | null | null |
RHSA-2023:3950
|
Red Hat Security Advisory: open-vm-tools security update
|
open-vm-tools: authentication bypass vulnerability in the vgauth module
|
[
"cpe:/a:redhat:rhel_eus:8.6::appstream"
] | null | 3.9 | null | null |
RHSA-2021:0473
|
Red Hat Security Advisory: .NET 5.0 on Red Hat Enterprise Linux security and bugfix update
|
dotnet: certificate chain building recursion Denial of Service
|
[
"cpe:/a:redhat:rhel_dotnet:5.0::el7"
] | null | 6.5 | null | null |
RHSA-2023:5188
|
Red Hat Security Advisory: thunderbird security update
|
libwebp: Heap buffer overflow in WebP Codec libwebp: out-of-bounds write with a specially crafted WebP lossless file
|
[
"cpe:/a:redhat:rhel_e4s:8.1::appstream"
] | null | 0 | null | null |
RHSA-2017:2882
|
Red Hat Security Advisory: httpd security update
|
httpd: Use-after-free by limiting unregistered HTTP method (Optionsbleed)
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 5.9 | null |
RHSA-2023:1533
|
Red Hat Security Advisory: nodejs:14 security, bug fix, and enhancement update
|
glob-parent: Regular Expression Denial of Service minimist: prototype pollution nodejs-minimatch: ReDoS via the braceExpand function c-ares: buffer overflow in config_sortlist() due to missing string length check express: "qs" prototype poisoning causes the hang of the node process http-cache-semantics: Regular Expression Denial of Service (ReDoS) vulnerability nodejs: HTTP Request Smuggling due to incorrect parsing of header fields decode-uri-component: improper input validation resulting in DoS nodejs: DNS rebinding in inspect via invalid octal IP address Node.js: Permissions policies can be bypassed via process.mainModule Node.js: insecure loading of ICU data through ICU_DATA environment variable
|
[
"cpe:/a:redhat:rhel_eus:8.4::appstream"
] | null | 4.2 | null | null |
RHSA-2022:5620
|
Red Hat Security Advisory: 389-ds:1.4 security update
|
389-ds-base: sending crafted message could result in DoS 389-ds-base: expired password was still allowed to access the database
|
[
"cpe:/a:redhat:rhel_eus:8.4::appstream"
] | null | 5.7 | null | null |
RHSA-2017:2285
|
Red Hat Security Advisory: authconfig security, bug fix, and enhancement update
|
authconfig: Information leak when SSSD is used for authentication against remote server
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 5.3 | null |
RHSA-2003:242
|
Red Hat Security Advisory: ddskk security update
|
security flaw
|
[
"cpe:/o:redhat:enterprise_linux:2.1::as",
"cpe:/o:redhat:enterprise_linux:2.1::aw",
"cpe:/o:redhat:enterprise_linux:2.1::es",
"cpe:/o:redhat:enterprise_linux:2.1::ws"
] | null | null | null | null |
RHSA-2024:3318
|
Red Hat Security Advisory: kernel security update
|
kernel: nf_tables: use-after-free vulnerability in the nft_verdict_init() function
|
[
"cpe:/o:redhat:rhel_aus:7.6::server"
] | null | 7.8 | null | null |
RHSA-2017:1860
|
Red Hat Security Advisory: libtasn1 security, bug fix, and enhancement update
|
libtasn1: stack overflow in asn1_der_decoding libtasn1: heap overflow flaw in _asn1_extract_der_octet()
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 5.9 | null |
RHSA-2022:8874
|
Red Hat Security Advisory: Red Hat OpenStack Platform 16.1.9 (openstack-barbican) security update
|
openstack-barbican: Barbican allows authenticated users to add/modify/delete arbitrary metadata on any secret openstack-barbican: Barbican allows anyone with an admin role to add their secrets to a different project's containers
|
[
"cpe:/a:redhat:openstack:16.1::el8"
] | null | 3.8 | null | null |
RHSA-2017:0190
|
Red Hat Security Advisory: firefox security update
|
Mozilla: Memory safety bugs fixed in Firefox 51 and Firefox ESR 45.7 (MFSA 2017-01) Mozilla: Excessive JIT code allocation allows bypass of ASLR and DEP (MFSA 2017-02) Mozilla: Use-after-free in XSL (MFSA 2017-02) Mozilla: Pointer and frame data leakage of Javascript objects (MFSA 2017-02) Mozilla: Potential use-after-free during DOM manipulations (MFSA 2017-02) Mozilla: Location bar spoofing with unicode characters (MFSA 2017-02) Mozilla: WebExtensions can use data: protocol to affect other extensions (MFSA 2017-02) Mozilla: Insecure communication methods in Developer Tools JSON viewer (MFSA 2017-02) Mozilla: Use-after-free with Media Decoder (MFSA 2017-02)
|
[
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::server",
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation",
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 9.8 | null |
RHSA-2021:3229
|
Red Hat Security Advisory: Red Hat OpenShift Jaeger 1.20.5 security update
|
golang: net: lookup functions may return invalid host names golang: archive/zip: malformed archive may cause panic or memory exhaustion golang: net/http/httputil: ReverseProxy forwards connection headers if first one is empty golang: math/big.Rat: may cause a panic or an unrecoverable fatal error if passed inputs with very large exponents golang: crypto/tls: certificate of wrong type is causing TLS client to panic
|
[
"cpe:/a:redhat:jaeger:1.20::el8"
] | null | 6.5 | null | null |
RHSA-2024:1150
|
Red Hat Security Advisory: buildah security update
|
ssh: Prefix truncation attack on Binary Packet Protocol (BPP)
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 5.9 | null | null |
RHSA-2021:5227
|
Red Hat Security Advisory: kernel security and bug fix update
|
kernel: In Overlayfs missing a check for a negative dentry before calling vfs_rename()
|
[
"cpe:/a:redhat:enterprise_linux:8::crb",
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 5.5 | null | null |
RHSA-2023:7687
|
Red Hat Security Advisory: OpenShift Container Platform 4.13.26 bug fix and security update
|
golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487) HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack)
|
[
"cpe:/a:redhat:openshift:4.13::el8",
"cpe:/a:redhat:openshift:4.13::el9"
] | null | 7.5 | null | null |
RHSA-2012:1537
|
Red Hat Security Advisory: jasperreports-server-pro security and bug fix update
|
JDK: XML parsing Denial-Of-Service (6845701)
|
[
"cpe:/a:redhat:rhev_manager:3"
] | null | null | null | null |
RHSA-2011:1440
|
Red Hat Security Advisory: seamonkey security update
|
Mozilla: Universal XSS likely with MultiByte charset (MFSA 2011-47)
|
[
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2019:2298
|
Red Hat Security Advisory: libarchive security update
|
libarchive: Out-of-bounds read in lha_read_data_none libarchive: Double free in RAR decoder resulting in a denial of service libarchive: Use after free in RAR decoder resulting in a denial of service libarchive: Out of bounds read in archive_read_support_format_7zip.c resulting in a denial of service libarchive: Infinite recursion in archive_read_support_format_iso9660.c resulting in denial of service
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 6.5 | null |
RHSA-2019:2769
|
Red Hat Security Advisory: OpenShift Container Platform 3.9 security update
|
HTTP/2: flood using PING frames results in unbounded memory growth HTTP/2: flood using HEADERS frames results in unbounded memory growth kubernetes: API server allows access to cluster-scoped custom resources as if resources were namespaced
|
[
"cpe:/a:redhat:openshift:3.9::el7"
] | null | null | 5 | null |
RHSA-2022:6292
|
Red Hat Security Advisory: Red Hat AMQ Broker 7.8.7 release and security update
|
activemq-artemis: AMQ Broker web console HTML Injection
|
[
"cpe:/a:redhat:amq_broker:7"
] | null | 6.1 | null | null |
RHSA-2024:0411
|
Red Hat Security Advisory: libfastjson security update
|
libfastjson: integer overflow and out-of-bounds write via a large JSON file
|
[
"cpe:/a:redhat:rhel_eus:8.6::appstream"
] | null | 7.8 | null | null |
RHSA-2021:5218
|
Red Hat Security Advisory: Red Hat Single Sign-On 7.5.0 security update on RHEL 7
|
Keycloak: Incorrect authorization allows unpriviledged users to create other users
|
[
"cpe:/a:redhat:red_hat_single_sign_on:7.5::el7"
] | null | 8.3 | null | null |
RHSA-2024:1493
|
Red Hat Security Advisory: thunderbird security update
|
nss: timing attack against RSA decryption Mozilla: Crash in NSS TLS method Mozilla: Leaking of encrypted email subjects to other conversations Mozilla: JIT code failed to save return registers on Armv7-A Mozilla: Integer overflow could have led to out of bounds write Mozilla: Improper handling of html and body tags enabled CSP nonce leakage Mozilla: Clickjacking vulnerability could have led to a user accidentally granting permissions Mozilla: Self referencing object could have potentially led to a use-after-free Mozilla: Memory safety bugs fixed in Firefox 124, Firefox ESR 115.9, and Thunderbird 115.9
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 7.5 | null | null |
RHSA-2021:3546
|
Red Hat Security Advisory: cyrus-imapd security update
|
cyrus-imapd: Denial of service via string hashing algorithm collisions
|
[
"cpe:/a:redhat:rhel_eus:8.1::appstream"
] | null | 7.5 | null | null |
RHSA-2023:3776
|
Red Hat Security Advisory: python39:3.9 and python39-devel:3.9 security update
|
python: urllib.parse url blocklisting bypass
|
[
"cpe:/a:redhat:rhel_eus:8.6::appstream",
"cpe:/a:redhat:rhel_eus:8.6::crb"
] | null | 7.5 | null | null |
RHSA-2021:2175
|
Red Hat Security Advisory: glib2 security update
|
glib: integer overflow in g_bytes_new function on 64-bit platforms due to an implicit cast from 64 bits to 32 bits
|
[
"cpe:/o:redhat:rhel_eus:7.7::computenode",
"cpe:/o:redhat:rhel_eus:7.7::server"
] | null | 9.8 | null | null |
RHSA-2024:1071
|
Red Hat Security Advisory: postgresql:12 security update
|
postgresql: non-owner 'REFRESH MATERIALIZED VIEW CONCURRENTLY' executes arbitrary SQL
|
[
"cpe:/a:redhat:rhel_aus:8.2::appstream",
"cpe:/a:redhat:rhel_e4s:8.2::appstream",
"cpe:/a:redhat:rhel_tus:8.2::appstream"
] | null | 8 | null | null |
RHSA-2020:2784
|
Red Hat Security Advisory: httpd24-nghttp2 security update
|
nghttp2: overly large SETTINGS frames can lead to DoS
|
[
"cpe:/a:redhat:rhel_software_collections:3::el6",
"cpe:/a:redhat:rhel_software_collections:3::el7"
] | null | 7.5 | null | null |
RHSA-2010:0101
|
Red Hat Security Advisory: openoffice.org security update
|
openoffice.org: integer overflow in XPM processing openoffice.org: GIF file parsing heap overflow OpenOffice.org Word sprmTDefTable Memory Corruption OpenOffice.org Word sprmTSetBrc Memory Corruption
|
[
"cpe:/a:redhat:rhel_productivity:5",
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws",
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws",
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation"
] | null | null | null | null |
RHSA-2015:0062
|
Red Hat Security Advisory: kernel security, bug fix, and enhancement update
|
kernel: sctp: skb_over_panic when receiving malformed ASCONF chunks kernel: net: sctp: fix panic on duplicate ASCONF chunks kernel: net: sctp: remote memory pressure from excessive queueing kernel: lzo1x_decompress_safe() integer overflow kernel: vfs: refcount issues during unmount on symlink
|
[
"cpe:/o:redhat:rhel_eus:6.5::computenode",
"cpe:/o:redhat:rhel_eus:6.5::server"
] | null | null | null | null |
RHSA-2016:2093
|
Red Hat Security Advisory: bind security update
|
bind: assertion failure triggered by a packet with malformed options
|
[
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server",
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | 7.5 | null |
RHSA-2019:3067
|
Red Hat Security Advisory: jss security update
|
JSS: OCSP policy "Leaf and Chain" implicitly trusts the root certificate
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 6.8 | null |
RHSA-2011:0002
|
Red Hat Security Advisory: RHN Proxy Server 4 - End Of Life
|
This is the End Of Life notification for RHN Proxy Server 4.
|
[
"cpe:/a:redhat:network_proxy:4.2::el3",
"cpe:/a:redhat:network_proxy:4.2::el4"
] | null | null | null | null |
RHSA-2021:3757
|
Red Hat Security Advisory: firefox security update
|
rust-crossbeam-deque: race condition may lead to double free Mozilla: Use-after-free in MessageTask Mozilla: Validation message could have been overlaid on another origin Mozilla: Use-after-free of nsLanguageAtomService object Mozilla: Memory safety bugs fixed in Firefox 93, Firefox ESR 78.15, and Firefox ESR 91.2 Mozilla: Memory safety bugs fixed in Firefox 93 and Firefox ESR 91.2
|
[
"cpe:/a:redhat:rhel_eus:8.1::appstream"
] | null | 8.8 | null | null |
RHSA-2024:1184
|
Red Hat Security Advisory: squid security update
|
squid: denial of service in HTTP header parser
|
[
"cpe:/a:redhat:rhel_eus:9.2::appstream"
] | null | 8.6 | null | null |
RHSA-2023:0685
|
Red Hat Security Advisory: openvswitch2.13 security, bug fix and enhancement update
|
openvswitch: Out-of-Bounds Read in Organization Specific TLV openvswitch: Integer Underflow in Organization Specific TLV
|
[
"cpe:/o:redhat:enterprise_linux:8::fastdatapath"
] | null | 9.8 | null | null |
RHSA-2015:1628
|
Red Hat Security Advisory: mysql55-mysql security update
|
mysql: unspecified vulnerability related to Server:InnoDB:DML (CPU Jan 2015) mysql: unspecified vulnerability related to Server:Security:Privileges:Foreign Key (CPU Jan 2015) mysql: unspecified vulnerability related to Server:Replication (CPU Jan 2015) mysql: unspecified vulnerability related to Server:Replication (CPU Jan 2015) mysql: unspecified vulnerability related to Server:DDL (CPU Jan 2015) mysql: unspecified vulnerability related to Server:Security:Encryption (CPU Jan 2015) mysql: unspecified vulnerability related to Server:InnoDB:DDL:Foreign Key (CPU Jan 2015) mysql: unspecified vulnerability related to Server:InnoDB:DML (CPU April 2015) mysql: unspecified vulnerability related to Server:Security:Encryption (CPU April 2015) mysql: unspecified vulnerability related to Server:Federated (CPU April 2015) mysql: unspecified vulnerability related to Server:Compiling (CPU April 2015) mysql: unspecified vulnerability related to Server:DDL (CPU April 2015) mysql: unspecified vulnerability related to Server:Security:Privileges (CPU April 2015) mysql: unspecified vulnerability related to Server:Optimizer (CPU April 2015) mysql: unspecified vulnerability related to Server:DDL (CPU April 2015) mysql: unspecified vulnerability related to Server:GIS (CPU July 2015) mysql: unspecified vulnerability related to Server:Security:Privileges (CPU July 2015) mysql: unspecified vulnerability related to Server:Optimizer (CPU July 2015) mysql: unspecified vulnerability related to Server:DML (CPU July 2015) mysql: unspecified vulnerability related to Server:Pluggable Auth (CPU July 2015) mysql: unspecified vulnerability related to Server:I_S (CPU July 2015) mysql: unspecified vulnerability related to Server:Optimizer (CPU July 2015) mysql: unspecified vulnerability related to Server:InnoDB (CPU October 2015) mysql: unspecified vulnerability related to Client programs (CPU October 2015) mysql: unspecified vulnerability related to Server:Security:Privileges (CPU October 2015) mysql: unspecified vulnerability related to Server:DML (CPU October 2015)
|
[
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2022:6317
|
Red Hat Security Advisory: OpenShift Container Platform 4.9.48 bug fix and security update
|
grafana: Snapshot authentication bypass
|
[
"cpe:/a:redhat:openshift:4.9::el8"
] | null | 7.3 | null | null |
RHSA-2016:0456
|
Red Hat Security Advisory: rh-ror41 security update
|
rubygem-actionpack: directory traversal in Action View, incomplete CVE-2016-0752 fix rubygem-actionpack: code injection vulnerability in Action View
|
[
"cpe:/a:redhat:rhel_software_collections:2::el6",
"cpe:/a:redhat:rhel_software_collections:2::el7"
] | null | null | null | null |
RHSA-2024:8563
|
Red Hat Security Advisory: buildah security update
|
buildah: Buildah allows arbitrary directory mount
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 7.8 | null | null |
RHSA-2016:1585
|
Red Hat Security Advisory: qemu-kvm security update
|
Qemu: virtio: unbounded memory allocation on host via guest leading to DoS
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | 3.4 | null |
RHSA-2021:3371
|
Red Hat Security Advisory: cloud-init security update
|
cloud-init: randomly generated passwords logged in clear-text to world-readable file
|
[
"cpe:/a:redhat:rhel_eus:8.2::appstream"
] | null | 5.5 | null | null |
RHSA-2022:4797
|
Red Hat Security Advisory: maven:3.6 security update
|
maven-shared-utils: Command injection via Commandline class
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:rhel_eus:8.2::appstream",
"cpe:/a:redhat:rhel_eus:8.4::appstream"
] | null | 9.8 | null | null |
RHSA-2024:1999
|
Red Hat Security Advisory: postgresql-jdbc security update
|
pgjdbc: PostgreSQL JDBC Driver allows attacker to inject SQL if using PreferQueryMode=SIMPLE
|
[
"cpe:/a:redhat:rhel_eus:9.0::appstream"
] | null | 9.8 | null | null |
RHSA-2016:0515
|
Red Hat Security Advisory: java-1.7.0-oracle security update
|
OpenJDK: missing type safety checks for MethodHandle calls across class loaders, incorrect CVE-2013-5838 fix (Hotspot, 8151666)
|
[
"cpe:/a:redhat:rhel_extras_oracle_java:5",
"cpe:/a:redhat:rhel_extras_oracle_java:6",
"cpe:/a:redhat:rhel_extras_oracle_java:7"
] | null | null | null | null |
RHSA-2016:1989
|
Red Hat Security Advisory: Red Hat Enterprise Developer Toolset Version 3.x One-Month Retirement Notice
|
This is the One-Month notification for the retirement of Red Hat Developer Toolset Version 3.x. This notification applies only to those customers subscribed to the channel for Red Hat Developer Toolset Version 3.x.
|
[] | null | null | null | null |
RHSA-2023:5046
|
Red Hat Security Advisory: flac security update
|
flac: Remote Code Execution (RCE) via the bitwriter_grow_ function, by supplying crafted input to the encoder
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb"
] | null | 7.8 | null | null |
RHSA-2016:0061
|
Red Hat Security Advisory: httpd and httpd22 security update
|
httpd: bypass of mod_headers rules via chunked requests httpd: HTTP request smuggling attack against chunked request parser
|
[
"cpe:/a:redhat:jboss_enterprise_web_server:2::el5",
"cpe:/a:redhat:jboss_enterprise_web_server:2::el6",
"cpe:/a:redhat:jboss_enterprise_web_server:2::el7"
] | null | null | 3.7 | null |
RHSA-2023:5529
|
Red Hat Security Advisory: bind security update
|
bind: stack exhaustion in control channel code may lead to DoS
|
[
"cpe:/a:redhat:rhel_aus:8.4::appstream",
"cpe:/a:redhat:rhel_e4s:8.4::appstream",
"cpe:/a:redhat:rhel_tus:8.4::appstream",
"cpe:/o:redhat:rhel_aus:8.4::baseos",
"cpe:/o:redhat:rhel_e4s:8.4::baseos",
"cpe:/o:redhat:rhel_tus:8.4::baseos"
] | null | 7.5 | null | null |
RHSA-2019:2000
|
Red Hat Security Advisory: Red Hat OpenShift Enterprise final end-of-life notice
|
This is the final notification for the retirement of Red Hat OpenShift Enterprise 3.6 and Red Hat OpenShift Container Platform 3.7. This notification applies only to those customers with subscriptions for Red Hat OpenShift Enterprise 3.6 and Red Hat OpenShift Container Platform 3.7.
|
[
"cpe:/a:redhat:openshift:3.6::el7",
"cpe:/a:redhat:openshift:3.7::el7"
] | null | null | null | null |
RHSA-2018:0048
|
Red Hat Security Advisory: vdsm security update
|
An update for vdsm is now available for RHEV 3.X Hypervisor and Agents for Red Hat Enterprise Linux 7 ELS.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
|
[
"cpe:/o:redhat:enterprise_linux:7::hypervisor"
] | null | null | null | null |
RHSA-2024:1086
|
Red Hat Security Advisory: libfastjson security update
|
libfastjson: integer overflow and out-of-bounds write via a large JSON file
|
[
"cpe:/a:redhat:rhel_eus:9.2::appstream"
] | null | 7.8 | null | null |
RHSA-2009:0458
|
Red Hat Security Advisory: gpdf security update
|
xpdf: Multiple buffer overflows in JBIG2 decoder (setBitmap, readSymbolDictSeg) (CVE-2009-0195) xpdf: Multiple integer overflows in JBIG2 decoder xpdf: Freeing of potentially uninitialized memory in JBIG2 decoder xpdf: Multiple buffer overflows in JBIG2 decoder (setBitmap, readSymbolDictSeg) (CVE-2009-0195) PDF JBIG2 decoder OOB read PDF JBIG2 multiple input validation flaws PDF JBIG2 integer overflow PDF JBIG2 invalid free() PDF JBIG2 NULL dereference PDF JBIG2 MMR decoder buffer overflows PDF JBIG2 MMR infinite loop DoS xpdf/poppler: PSOutputDev:: doImageL1Sep integer overflow
|
[
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2024:5363
|
Red Hat Security Advisory: kernel security update
|
kernel: net: netlink: af_netlink: Prevent empty skb by adding a check on len. kernel: wifi: ath10k: fix NULL pointer dereference in ath10k_wmi_tlv_op_pull_mgmt_tx_compl_ev() kernel: ipvlan: add ipvlan_route_v6_outbound() helper kernel: platform/x86: wmi: Fix opening of char device kernel: dmaengine/idxd: hardware erratum allows potential security problem with direct access by untrusted application kernel: phy: ti: phy-omap-usb2: Fix NULL pointer dereference for SRP kernel: netfilter: nft_chain_filter: handle NETDEV_UNREGISTER for inet/ingress basechain kernel: cifs: fix underflow in parse_server_interfaces() kernel: igc: avoid returning frame twice in XDP_REDIRECT kernel: nfs: fix panic when nfs4_ff_layout_prepare_ds() fails kernel: wifi: ath9k: delay all of ath9k_wmi_event_tasklet() until init is complete kernel: wifi: mt76: mt7925e: fix use-after-free in free_irq() kernel: wifi: rtl8xxxu: add cancel_work_sync() for c2hcmd_work kernel: netfilter: nf_tables: do not compare internal table flags on updates kernel: ipv6: fix potential "struct net" leak in inet6_rtm_getaddr() kernel: wifi: iwlwifi: mvm: don't set the MFP flag for the GTK kernel: ipvlan: Dont Use skb->sk in ipvlan_process_v{4,6}_outbound kernel: wifi: mac80211: check/clear fast rx for non-4addr sta VLAN changes kernel: efi: fix panic in kdump kernel kernel: vt: fix unicode buffer corruption when deleting characters kernel: wifi: iwlwifi: dbg-tlv: ensure NUL termination kernel: eeprom: at24: fix memory corruption race condition kernel: mlxsw: spectrum_acl_tcam: Fix memory leak when canceling rehash work kernel: netfilter: nf_tables: flush pending destroy work before exit_net release kernel: ice: fix memory corruption bug with suspend and rebuild kernel: wifi: cfg80211: check A-MSDU format more carefully kernel: ipv6: fix race condition between ipv6_get_ifaddr and ipv6_del_addr kernel: netfilter: nf_tables: honor table dormant flag from netdev release event path kernel: rtnetlink: Correct nested IFLA_VF_VLAN_LIST attribute validation kernel: i40e: fix vf may be used uninitialized in this function warning kernel: tls: fix missing memory barrier in tls_init kernel: ipv6: Fix potential uninit-value access in __ip6_make_skb() kernel: wifi: iwlwifi: mvm: guard against invalid STA ID on removal kernel: wifi: iwlwifi: read txq->read_ptr under lock kernel: net: core: reject skb_copy(_expand) for fraglist GSO skbs kernel: wifi: nl80211: don't free NULL coalescing rule kernel: net: kernel: UAF in network route management kernel: virtio: delete vq in vp_find_vqs_msix() when request_irq() fails kernel: tcp: Fix shift-out-of-bounds in dctcp_update_alpha(). kernel: cxl/region: Fix cxlr_pmem leaks kernel: net: openvswitch: fix overwriting ct original tuple for ICMPv6 kernel: wifi: brcmfmac: pcie: handle randbuf allocation failure kernel: bonding: Fix out-of-bounds read in bond_option_arp_ip_targets_set() kernel: net: ethtool: fix the error condition in ethtool_get_phy_stats_ethtool() kernel: net: do not leave a dangling sk pointer, when socket creation fails kernel: netns: Make get_net_ns() handle zero refcount net kernel: ipv6: prevent possible NULL deref in fib6_nh_init()
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::crb",
"cpe:/a:redhat:enterprise_linux:9::nfv",
"cpe:/a:redhat:enterprise_linux:9::realtime",
"cpe:/o:redhat:enterprise_linux:9::baseos"
] | null | 5.5 | null | null |
RHSA-2003:058
|
Red Hat Security Advisory: shadow-utils security update
|
security flaw
|
[
"cpe:/o:redhat:enterprise_linux:2.1::as",
"cpe:/o:redhat:enterprise_linux:2.1::aw"
] | null | null | null | null |
RHSA-2021:2168
|
Red Hat Security Advisory: kernel security and bug fix update
|
kernel: userspace applications can misuse the KVM API to cause a write of 16 bytes at an offset up to 32 GB from vcpu->run kernel: nitro_enclaves stale file descriptors on failed usercopy
|
[
"cpe:/a:redhat:enterprise_linux:8::crb",
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 6.7 | null | null |
RHSA-2010:0773
|
Red Hat Security Advisory: Red Hat Enterprise MRG Messaging and Grid Version 1.3
|
qpid: crash on receipt of invalid AMQP data qpid: crash when redeclaring the exchange with specified alternate_exchange
|
[
"cpe:/a:redhat:enterprise_mrg:1::el5"
] | null | null | null | null |
RHSA-2020:4025
|
Red Hat Security Advisory: qt5-qtbase security update
|
qt: files placed by attacker can influence the working directory and lead to malicious code execution qt: files placed by attacker can influence the working directory and lead to malicious code execution
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 7.3 | null | null |
RHSA-2023:1437
|
Red Hat Security Advisory: openssl security update
|
openssl: X.400 address type confusion in X.509 GeneralName
|
[
"cpe:/o:redhat:rhel_e4s:8.1::baseos"
] | null | 7.4 | null | null |
RHSA-2023:3641
|
Red Hat Security Advisory: Red Hat Integration Camel for Spring Boot 3.18.3 Patch 2 release
|
snakeyaml: Denial of Service due to missing nested depth limitation for collections snakeyaml: Uncaught exception in org.yaml.snakeyaml.composer.Composer.composeSequenceNode snakeyaml: Uncaught exception in org.yaml.snakeyaml.constructor.BaseConstructor.constructObject snakeyaml: Uncaught exception in java.base/java.util.regex.Pattern$Ques.match snakeyaml: Uncaught exception in java.base/java.util.ArrayList.hashCode woodstox-core: woodstox to serialise XML data was vulnerable to Denial of Service attacks xstream: Xstream to serialise XML data was vulnerable to Denial of Service attacks dev-java/snakeyaml: DoS via stack overflow jackson-databind: deep wrapper array nesting wrt UNWRAP_SINGLE_VALUE_ARRAYS jackson-databind: use of deeply nested arrays mina-sshd: Java unsafe deserialization vulnerability CXF: directory listing / code exfiltration CXF: SSRF Vulnerability json-smart: Uncontrolled Resource Consumption vulnerability in json-smart (Resource Exhaustion) jettison: Uncontrolled Recursion in JSONArray spring-boot: Spring Boot Welcome Page DoS Vulnerability
|
[
"cpe:/a:redhat:camel_spring_boot:3.18"
] | null | 7.5 | null | null |
RHSA-2023:6529
|
Red Hat Security Advisory: nodejs:20 bug fix and enhancement update
|
An update for the nodejs:20 module is now available for Red Hat Enterprise Linux 9.
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | null | null | null |
RHSA-2007:0912
|
Red Hat Security Advisory: libvorbis security update
|
libvorbis array boundary condition Multiple libvorbis flaws (CVE-2007-4066, CVE-2007-4029) Multiple libvorbis flaws (CVE-2007-4066, CVE-2007-4029) Multiple libvorbis flaws (CVE-2007-4066, CVE-2007-4029)
|
[
"cpe:/o:redhat:enterprise_linux:2.1::as",
"cpe:/o:redhat:enterprise_linux:2.1::aw",
"cpe:/o:redhat:enterprise_linux:2.1::es",
"cpe:/o:redhat:enterprise_linux:2.1::ws"
] | null | null | null | null |
RHSA-2018:0158
|
Red Hat Security Advisory: dhcp security update
|
dhcp: omapi code doesn't free socket descriptors when empty message is received allowing denial-of-service
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 5.3 | null |
RHSA-2024:2463
|
Red Hat Security Advisory: systemd security update
|
systemd-resolved: Unsigned name response in signed zone is not refused when DNSSEC=yes
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::crb",
"cpe:/o:redhat:enterprise_linux:9::baseos"
] | null | 5.9 | null | null |
RHSA-2024:3203
|
Red Hat Security Advisory: systemd security update
|
systemd-resolved: Unsigned name response in signed zone is not refused when DNSSEC=yes
|
[
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 5.9 | null | null |
RHSA-2021:2741
|
Red Hat Security Advisory: firefox security update
|
Mozilla: Use-after-free in accessibility features of a document Mozilla: Memory safety bugs fixed in Firefox 90 and Firefox ESR 78.12 chromium-browser: Out of bounds write in ANGLE
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 8.8 | null | null |
RHSA-2022:2192
|
Red Hat Security Advisory: rsync security update
|
zlib: A flaw found in zlib when compressing (not decompressing) certain inputs
|
[
"cpe:/o:redhat:rhel_eus:8.2::baseos"
] | null | 8.2 | null | null |
RHSA-2021:2634
|
Red Hat Security Advisory: go-toolset-1.15 and go-toolset-1.15-golang security and bug fix update
|
golang: archive/zip: malformed archive may cause panic or memory exhaustion
|
[
"cpe:/a:redhat:devtools:2021"
] | null | 7.5 | null | null |
RHSA-2014:1620
|
Red Hat Security Advisory: java-1.7.0-openjdk security and bug fix update
|
OpenJDK: Triple Handshake attack against TLS/SSL connections (JSSE, 8037066) OpenJDK: LogRecord use of incorrect CL when loading ResourceBundle (Libraries, 8042797) OpenJDK: incorrect optimization of range checks in C2 compiler (Hotspot, 8022783) OpenJDK: insufficient permission checks when setting resource bundle on system logger (Libraries, 8041564) ICU: Layout Engine ContextualSubstitution missing boundary checks (JDK 2D, 8041540) OpenJDK: DatagramSocket connected socket missing source check (Libraries, 8039509) OpenJDK: StAX parser parameter entity XXE (JAXP, 8039533) OpenJDK: missing BootstrapMethods bounds check (Hotspot, 8041717) OpenJDK: insufficient ResourceBundle name check (Libraries, 8044274) OpenJDK: CipherInputStream incorrect exception handling (Security, 8037846)
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation",
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | null | null |
RHSA-2023:6242
|
Red Hat Security Advisory: .NET 6.0 security update
|
dotnet: Denial of Service with Client Certificates using .NET Kestrel
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::crb"
] | null | 6.5 | null | null |
RHSA-2017:1491
|
Red Hat Security Advisory: kernel security and bug fix update
|
kernel: heap/stack gap jumping via unbounded stack allocations kernel: Incorrectly mapped contents of PIE executable
|
[
"cpe:/o:redhat:rhel_mission_critical:6.2::server"
] | null | null | 2.9 | null |
RHBA-2021:2979
|
Red Hat Bug Fix Advisory: OpenShift Container Platform 4.7.23 packages update
|
golang: net/http: panic in ReadRequest and ReadResponse when reading a very large header golang: net: lookup functions may return invalid host names golang: net/http/httputil: ReverseProxy forwards connection headers if first one is empty golang: math/big.Rat: may cause a panic or an unrecoverable fatal error if passed inputs with very large exponents golang: crypto/tls: certificate of wrong type is causing TLS client to panic
|
[
"cpe:/a:redhat:openshift:4.7::el7",
"cpe:/a:redhat:openshift:4.7::el8"
] | null | 6.5 | null | null |
RHSA-2023:0338
|
Red Hat Security Advisory: libxml2 security update
|
libxml2: integer overflows with XML_PARSE_HUGE libxml2: dict corruption caused by entity reference cycles
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/o:redhat:enterprise_linux:9::baseos"
] | null | 7.8 | null | null |
RHSA-2014:1102
|
Red Hat Security Advisory: ror40-rubygem-activerecord security update
|
rubygem-activerecord: Strong Parameter bypass with create_with
|
[
"cpe:/a:redhat:rhel_software_collections:1::el6",
"cpe:/a:redhat:rhel_software_collections:1::el7"
] | null | null | null | null |
RHSA-2008:0522
|
Red Hat Security Advisory: perl security update
|
perl: heap corruption by regular expressions with utf8 characters
|
[
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws",
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws",
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2020:2851
|
Red Hat Security Advisory: kernel security and bug fix update
|
kernel: denial of service via ioctl call in network tun handling kernel: usb: missing size check in the __usb_get_extra_descriptor() leading to DoS kernel: perf_event_open() and execve() race in setuid programs allows a data leak kernel: Count overflow in FUSE request leading to use-after-free issues. kernel: use-after-free in arch/x86/lib/insn-eval.c Kernel: KVM: OOB memory access via mmio ring buffer kernel: memory leak in register_queue_kobjects() in net/core/net-sysfs.c leads to denial of service kernel: powerpc: incomplete Spectre-RSB mitigation leads to information exposure Kernel: vfio: access to disabled MMIO space of some devices may lead to DoS scenario
|
[
"cpe:/o:redhat:enterprise_linux:7::hypervisor",
"cpe:/o:redhat:rhel_eus:7.6::computenode",
"cpe:/o:redhat:rhel_eus:7.6::server"
] | null | 5.3 | 5.5 | null |
RHSA-2021:2465
|
Red Hat Security Advisory: Red Hat build of Eclipse Vert.x 4.1.0 security update
|
netty: Request smuggling via content-length header apache-commons-io: Limited path traversal in Apache Commons IO 2.2 to 2.6
|
[
"cpe:/a:redhat:openshift_application_runtimes:1.0"
] | null | 4.8 | null | null |
RHSA-2020:5443
|
Red Hat Security Advisory: gd security update
|
gd: Integer overflow in _gd2GetHeader() resulting in heap overflow
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 5.6 | null |
RHSA-2024:2627
|
Red Hat Security Advisory: kernel security and bug fix update
|
hw: amd: Instruction raise #VC exception at exit hw: amd: Instruction raise #VC exception at exit
|
[
"cpe:/a:redhat:rhel_eus:9.2::appstream",
"cpe:/a:redhat:rhel_eus:9.2::crb",
"cpe:/o:redhat:rhel_eus:9.2::baseos"
] | null | 7.1 | null | null |
RHSA-2014:1122
|
Red Hat Security Advisory: openstack-keystone security and bug fix update
|
openstack-keystone: revocation events are broken with mysql openstack-keystone: token expiration date stored incorrectly openstack-keystone: domain-scoped tokens don't get revoked
|
[
"cpe:/a:redhat:openstack:5::el6"
] | null | null | null | null |
RHSA-2015:0034
|
Red Hat Security Advisory: Red Hat JBoss Data Virtualization 6.0.0 security update
|
HawtJNI: predictable temporary file name leading to local arbitrary code execution EAP6: Plain text password logging during security audit Odata4j: XML eXternal Entity (XXE) flaw
|
[
"cpe:/a:redhat:jboss_data_virtualization:6.0"
] | null | null | null | null |
RHSA-2011:0952
|
Red Hat Security Advisory: JBoss Enterprise SOA Platform 4.3.0.CP05 and 5.1.0 security update
|
JBoss Seam EL interpolation in exception handling
|
[
"cpe:/a:redhat:jboss_soa_platform:4.3",
"cpe:/a:redhat:jboss_soa_platform:5.1"
] | null | null | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.