id
stringlengths 13
15
| title
stringlengths 29
176
| description
stringlengths 8
32.1k
| cpes
listlengths 0
20
| cvss_v4_0
null | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
null |
---|---|---|---|---|---|---|---|
RHSA-2019:2782
|
Red Hat Security Advisory: qpid-proton security update
|
qpid-proton: TLS Man in the Middle Vulnerability
|
[
"cpe:/a:redhat:rhel_satellite_tools:6.4::el5",
"cpe:/a:redhat:rhel_satellite_tools:6.4::el6",
"cpe:/a:redhat:rhel_satellite_tools:6.4::el7",
"cpe:/o:redhat:enterprise_linux:7::hypervisor"
] | null | null | 7.4 | null |
RHSA-2011:0324
|
Red Hat Security Advisory: logwatch security update
|
logwatch: Privilege escalation due improper sanitization of special characters in log file names
|
[
"cpe:/o:redhat:enterprise_linux:5::server",
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2023:4591
|
Red Hat Security Advisory: RHUI 4.5.0 release - Security, Bug Fixes, and Enhancements
|
sqlparse: Parser contains a regular expression that is vulnerable to ReDOS (Regular Expression Denial of Service) python-django: Potential bypass of validation when uploading multiple files using one form field
|
[
"cpe:/a:redhat:rhui:4::el8"
] | null | 6.5 | null | null |
RHSA-2024:8107
|
Red Hat Security Advisory: kernel security update
|
kernel: watchdog: Fix possible use-after-free by calling del_timer_sync() kernel: mlxsw: spectrum: Protect driver from buggy firmware kernel: ovl: fix use after free in struct ovl_aio_req kernel: udp: do not accept non-tunnel GSO skbs landing in a tunnel kernel: scsi: qla2xxx: Fix off by one in qla_edif_app_getstats() kernel: scsi: lpfc: Release hbalock before calling lpfc_worker_wake_up() kernel: scsi: lpfc: Move NPIV's transport unregistration to after resource clean up kernel: net: openvswitch: fix overwriting ct original tuple for ICMPv6 kernel: md/raid5: fix deadlock that raid5d() wait for itself to clear MD_SB_CHANGE_PENDING kernel: ext4: fix uninitialized ratelimit_state->lock access in __ext4_fill_super() kernel: net/sched: Fix UAF when resolving a clash kernel: tipc: Return non-zero value from tipc_udp_addr2str() on error
|
[
"cpe:/a:redhat:rhel_eus:8.8::crb",
"cpe:/o:redhat:rhel_eus:8.8::baseos"
] | null | 7.3 | null | null |
RHSA-2014:0897
|
Red Hat Security Advisory: Red Hat JBoss Enterprise Web Platform 5.2.0 security update
|
PicketLink: XXE via insecure DocumentBuilderFactory usage
|
[
"cpe:/a:redhat:jboss_enterprise_web_platform:5.2.0"
] | null | null | null | null |
RHSA-2022:6437
|
Red Hat Security Advisory: kernel-rt security and bug fix update
|
hw: cpu: incomplete clean-up of multi-core shared buffers (aka SBDR) hw: cpu: incomplete clean-up of microarchitectural fill buffers (aka SBDS) hw: cpu: incomplete clean-up in specific special register write operations (aka DRPW)
|
[
"cpe:/a:redhat:enterprise_linux:8::nfv",
"cpe:/a:redhat:enterprise_linux:8::realtime"
] | null | 5.5 | null | null |
RHSA-2002:134
|
Red Hat Security Advisory: : Updated mod_ssl packages available
|
security flaw
|
[
"cpe:/o:redhat:linux:7.0",
"cpe:/o:redhat:linux:7.1",
"cpe:/o:redhat:linux:7.2",
"cpe:/o:redhat:linux:7.3"
] | null | null | null | null |
RHSA-2025:1286
|
Red Hat Security Advisory: RHTAS 1.1.1 - Red Hat Trusted Artifact Signer Release
|
cross-spawn: regular expression denial of service
|
[
"cpe:/a:redhat:trusted_artifact_signer:1.1::el9"
] | null | 4.4 | null | null |
RHSA-2010:0757
|
Red Hat Security Advisory: Red Hat Enterprise MRG Messaging security and bug fix update 1.2.2
|
MRG: SSL connections to MRG broker can be blocked MRG: remote authenticated DoS in broker
|
[
"cpe:/a:redhat:enterprise_mrg:1.0::el4"
] | null | null | null | null |
RHSA-2023:6080
|
Red Hat Security Advisory: Red Hat Integration Camel for Spring Boot 4.0.1 release security update
|
HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack)
|
[
"cpe:/a:redhat:camel_spring_boot:4.0.1"
] | null | 7.5 | null | null |
RHSA-2010:0038
|
Red Hat Security Advisory: acroread security update
|
acroread: multiple code execution flaws (APSB10-02) acroread: multiple code execution flaws (APSB10-02) acroread: multiple code execution flaws (APSB10-02) acroread: script injection vulnerability (APSB10-02) acroread: multiple code execution flaws (APSB10-02) acroread: media.newplayer JavaScript API code execution vulnerability (APSB10-02)
|
[
"cpe:/a:redhat:rhel_extras:4"
] | null | null | null | null |
RHSA-2017:2492
|
Red Hat Security Advisory: xmlsec1 security update
|
xmlsec1: xmlsec vulnerable to external entity expansion
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 6.5 | null |
RHSA-2024:7418
|
Red Hat Security Advisory: linux-firmware security update
|
kernel: hw:amd:IOMMU improperly handles certain special address leading to a loss of guest integrity kernel: hw:amd: Incomplete system memory cleanup in SEV firmware corrupt guest private memory
|
[
"cpe:/o:redhat:rhel_aus:8.6::baseos",
"cpe:/o:redhat:rhel_e4s:8.6::baseos",
"cpe:/o:redhat:rhel_tus:8.6::baseos"
] | null | 4.4 | null | null |
RHSA-2022:0687
|
Red Hat Security Advisory: OpenShift API for Data Protection (OADP) 1.0.1 security and bug fix update
|
ulikunitz/xz: Infinite loop in readUvarint allows for denial of service opencontainers: OCI manifest and index parsing confusion
|
[
"cpe:/a:redhat:openshift_api_data_protection:1.0::el8"
] | null | 5 | null | null |
RHSA-2024:6681
|
Red Hat Security Advisory: firefox security update
|
mozilla: Type Confusion in Async Generators in Javascript Engine mozilla: Type confusion when looking up a property name in a "with" block mozilla: Internal event interfaces were exposed to web content when browser EventHandler listener callbacks ran mozilla: Firefox did not ask before openings news: links in an external application mozilla: Garbage collection could mis-color cross-compartment objects in OOM conditions mozilla: WASM type confusion involving ArrayTypes mozilla: SelectElements could be shown over another site if popups are allowed mozilla: Memory safety bugs fixed in Firefox 130, Firefox ESR 128.2, and Thunderbird 128.2
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 9.8 | null | null |
RHSA-2017:1792
|
Red Hat Security Advisory: java-1.6.0-sun security update
|
OpenJDK: reading of unprocessed image data in JPEGImageReader (2D, 8169209) OpenJDK: JAR verifier incorrect handling of missing digest (Security, 8169392) OpenJDK: integer overflows in range check loop predicates (Hotspot, 8173770) OpenJDK: incorrect bracket processing in function signature handling (Hotspot, 8170966) OpenJDK: insufficient access control checks in ThreadPoolExecutor (Libraries, 8172204) OpenJDK: insufficient access control checks in ServiceRegistry (ImageIO, 8172461) OpenJDK: insufficient access control checks in XML transformations (JAXP, 8172469) OpenJDK: unrestricted access to com.sun.org.apache.xml.internal.resolver (JAXP, 8173286) OpenJDK: incorrect handling of references in DGC (RMI, 8163958) JDK: unspecified vulnerability fixed in 6u161, 7u151, and 8u141 (Deployment) OpenJDK: insufficient access control checks in ActivationID (RMI, 8173697) OpenJDK: unbounded memory allocation in BasicAttribute deserialization (Serialization, 8174105) OpenJDK: unbounded memory allocation in CodeSource deserialization (Serialization, 8174113) OpenJDK: insufficient access control checks in ImageWatched (AWT, 8174098) OpenJDK: DSA implementation timing attack (JCE, 8175106) OpenJDK: LDAPCertStore following referrals to non-LDAP URLs (Security, 8176067) OpenJDK: PKCS#8 implementation timing attack (JCE, 8176760) OpenJDK: incorrect key size constraint check (Security, 8179101) OpenJDK: incorrect enforcement of certificate path restrictions (Security, 8179998) OpenJDK: insecure XML parsing in wsdlimport (JAX-WS, 8182054)
|
[
"cpe:/a:redhat:rhel_extras_oracle_java:6",
"cpe:/a:redhat:rhel_extras_oracle_java:7"
] | null | null | 6.5 | null |
RHSA-2021:0882
|
Red Hat Security Advisory: tomcat security update
|
tomcat: Session fixation when using FORM authentication tomcat: Mishandling of Transfer-Encoding header allows for HTTP request smuggling
|
[
"cpe:/o:redhat:rhel_eus:7.6::computenode",
"cpe:/o:redhat:rhel_eus:7.6::server"
] | null | 4.3 | null | null |
RHSA-2020:4763
|
Red Hat Security Advisory: dovecot security update
|
dovecot: command followed by sufficient number of newlines leads to use-after-free dovecot: sending mail with empty quoted localpart leads to DoS
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb"
] | null | 5.3 | null | null |
RHSA-2022:2183
|
Red Hat Security Advisory: Release of containers for OSP 16.2.z director operator tech preview
|
kubernetes: YAML parsing vulnerable to "Billion Laughs" attack, allowing for remote denial of service golang-github-miekg-dns: predictable TXID can lead to response forgeries containerd: unrestricted access to abstract Unix domain socket can lead to privileges escalation ulikunitz/xz: Infinite loop in readUvarint allows for denial of service containerd: pulling and extracting crafted container image may result in Unix file permission changes
|
[
"cpe:/a:redhat:openstack:16.2::el8"
] | null | 5.5 | 7.5 | null |
RHSA-2020:3383
|
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 6.4 security update
|
tomcat: multiple requests with invalid payload length in a WebSocket frame could lead to DoS
|
[
"cpe:/a:redhat:jboss_enterprise_application_platform:6::el5",
"cpe:/a:redhat:jboss_enterprise_application_platform:6::el6",
"cpe:/a:redhat:jboss_enterprise_application_platform:6::el7"
] | null | 7.5 | null | null |
RHSA-2018:0279
|
Red Hat Security Advisory: rh-mariadb100-mariadb security update
|
mysql: insecure error log file handling in mysqld_safe (CPU Oct 2016) mysql: insecure error log file handling in mysqld_safe (CPU Oct 2016) mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2017) mysql: Server: Charsets unspecified vulnerability (CPU Jan 2017) mysql: Server: DML unspecified vulnerability (CPU Jan 2017) mysql: Server: InnoDB unspecified vulnerability (CPU Jan 2017) mysql: Server: DDL unspecified vulnerability (CPU Jan 2017) mysql: unsafe chmod/chown use in init script (CPU Jan 2017) mysql: unrestricted mysqld_safe's ledir (CPU Jan 2017) mysql: prepared statement handle use-after-free after disconnect mysql: Server: DML unspecified vulnerability (CPU Apr 2017) mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2017) mysql: insecure error log file handling in mysqld_safe, incomplete CVE-2016-6664 fix (CPU Jan 2017) mysql: Server: MyISAM unspecified vulnerability (CPU Jan 2017) mysql: Logging unspecified vulnerability (CPU Jan 2017) mysql: Server: Error Handling unspecified vulnerability (CPU Jan 2017) mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2017) mysql: Server: DML unspecified vulnerability (CPU Apr 2017) mysql: Server: DDL unspecified vulnerability (CPU Apr 2017) mysql: Client programs unspecified vulnerability (CPU Jul 2017) mysql: Server: DML unspecified vulnerability (CPU Jul 2017) mysql: Server: DDL unspecified vulnerability (CPU Jul 2017) mysql: Server: Replication unspecified vulnerability (CPU Oct 2017) mysql: Server: InnoDB unspecified vulnerability (CPU Oct 2017) mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2017) mysql: Client programs unspecified vulnerability (CPU Oct 2017) mysql: Server: DDL unspecified vulnerability (CPU Oct 2017)
|
[
"cpe:/a:redhat:rhel_software_collections:3::el6",
"cpe:/a:redhat:rhel_software_collections:3::el7"
] | null | null | 6.5 | null |
RHSA-2025:1703
|
Red Hat Security Advisory: OpenShift Container Platform 4.17.18 security update
|
github.com/moby/moby: NULL Pointer Dereference in Moby
|
[
"cpe:/a:redhat:openshift:4.17::el9"
] | null | 6.5 | null | null |
RHSA-2019:4110
|
Red Hat Security Advisory: java-1.7.1-ibm security update
|
OpenJDK: Missing restrictions on use of custom SocketImpl (Networking, 8218573) OpenJDK: NULL pointer dereference in DrawGlyphList (2D, 8222690) OpenJDK: Unexpected exception thrown by Pattern processing crafted regular expression (Concurrency, 8222684) OpenJDK: Unexpected exception thrown by XPathParser processing crafted XPath expression (JAXP, 8223505) OpenJDK: Incorrect handling of nested jar: URLs in Jar URL handler (Networking, 8223892) OpenJDK: Unexpected exception thrown by XPath processing crafted XPath expression (JAXP, 8224532) OpenJDK: Unexpected exception thrown during Font object deserialization (Serialization, 8224915) OpenJDK: Integer overflow in bounds check in SunGraphics2D (2D, 8225292) OpenJDK: Incorrect handling of HTTP proxy responses in HttpURLConnection (Networking, 8225298) OpenJDK: Excessive memory allocation in CMap when reading TrueType font (2D, 8225597) OpenJDK: Insufficient filtering of HTML event attributes in Javadoc (Javadoc, 8226765)
|
[
"cpe:/a:redhat:rhel_extras:7"
] | null | null | 4.7 | null |
RHSA-2015:1154
|
Red Hat Security Advisory: libreswan security, bug fix and enhancement update
|
libreswan: crafted IKE packet causes daemon restart
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | null | null |
RHSA-2024:5067
|
Red Hat Security Advisory: kernel-rt security update
|
kernel: bnxt: prevent skb UAF after handing over to PTP worker kernel: block: null pointer dereference in ioctl.c when length and logical block size are misaligned kernel: PM / devfreq: Synchronize devfreq_monitor_[start/stop] kernel: scsi: libfc: Fix potential NULL pointer dereference in fc_lport_ptp_setup() kernel: SUNRPC: Fix UAF in svc_tcp_listen_data_ready() kernel: ext4: regenerate buddy after block freeing failed if under fc replay kernel: bpf: Fix racing between bpf_timer_cancel_and_free and bpf_timer_cancel kernel: scsi: qla2xxx: Fix double free of the ha->vp_map pointer kernel: ARM: 9359/1: flush: check if the folio is reserved for no-mapping addresses kernel: octeontx2-af: race condition on interupts kernel: nouveau: lock the client object tree. kernel: ipvlan: Dont Use skb->sk in ipvlan_process_v{4,6}_outbound kernel: vt: fix unicode buffer corruption when deleting characters kernel: mlxbf_gige: stop interface during shutdown kernel: netfilter: validate user input for expected length kernel: netfilter: complete validation of user input kernel: rtnetlink: Correct nested IFLA_VF_VLAN_LIST attribute validation kernel: i40e: fix vf may be used uninitialized in this function warning kernel: net: core: reject skb_copy(_expand) for fraglist GSO skbs kernel: drm/vmwgfx: Fix invalid reads in fence signaled events kernel: blk-cgroup: fix list corruption from reorder of WRITE ->lqueued kernel: blk-cgroup: fix list corruption from resetting io stat
|
[
"cpe:/a:redhat:rhel_eus:9.2::nfv",
"cpe:/a:redhat:rhel_eus:9.2::realtime"
] | null | 4.4 | null | null |
RHSA-2024:8229
|
Red Hat Security Advisory: OpenShift Container Platform 4.17.2 bug fix and security update
|
jose-go: improper handling of highly compressed data go/parser: golang: Calling any of the Parse functions containing deeply nested literals can cause a panic/stack exhaustion encoding/gob: golang: Calling Decoder.Decode on a message which contains deeply nested structures can cause a panic due to stack exhaustion go/build/constraint: golang: Calling Parse on a "// +build" build tag line with deeply nested expressions can cause a panic due to stack exhaustion openstack-ironic: Lack of checksum validation on images
|
[
"cpe:/a:redhat:openshift:4.17::el9"
] | null | 6.3 | null | null |
RHBA-2020:1539
|
Red Hat Bug Fix Advisory: Red Hat Ansible Tower 3.5.6-1 - RHEL7 Container
|
expat: Integer overflow leading to buffer overflow in XML_GetBuffer() libxml2: DoS caused by incorrect error detection during XZ decompression libxml2: Use after free triggered by XPointer paths beginning with range-to libxml2: Use after free in xmlXPathCompOpEvalPositionalPredicate() function in xpath.c libxml2: Unrestricted memory usage in xz_head() function in xzlib.c file: out-of-bounds read via a crafted ELF file libxml2: NULL pointer dereference in xmlXPathCompOpEval() function in xpath.c libxml2: Infinite loop caused by incorrect error detection during LZMA decompression python-requests: Redirect from HTTPS to HTTP does not remove Authorization header python-urllib3: Cross-host redirect does not remove Authorization header allow for credential exposure python: Cookie domain check returns incorrect results gnome-shell: partial lock screen bypass curl: TFTP receive heap buffer overflow in tftp_receive_packet() function bash: BASH_CMD is writable in restricted bash shells python-urllib3: CRLF injection due to not encoding the '\r\n' sequence leading to possible attack on internal service python: email.utils.parseaddr wrongly parses email addresses rsyslog: heap-based overflow in contrib/pmaixforwardedfrom/pmaixforwardedfrom.c rsyslog: heap-based overflow in contrib/pmcisconames/pmcisconames.c ansible: shell enabled by default in a pipe lookup plugin subprocess ansible: path injection on dest parameter in fetch module ansible: atomic_move primitive sets permissive permissions ansible: Extract-Zip function in win_unzip module does not check extracted path ansible: module package can be selected by the ansible facts ansible: svn module leaks password when specified as a parameter ansible: secrets readable after ansible-vault edit ansible: Information disclosure issue in ldap_attr and ldap_entry modules Ansible: kubectl connection plugin leaks sensitive information Ansible: code injection when using ansible_facts as a subkey Ansible: modules which use files encrypted with vault are not properly cleaned up
|
[
"cpe:/a:redhat:ansible_tower:3.5::el7"
] | null | 5 | 7.5 | null |
RHSA-2015:0789
|
Red Hat Security Advisory: openstack-packstack and openstack-puppet-modules security and bug fix update
|
openstack-puppet-modules: pacemaker configured with default password
|
[
"cpe:/a:redhat:openstack:6::el7"
] | null | null | null | null |
RHSA-2003:133
|
Red Hat Security Advisory: : Updated man packages fix minor vulnerability
|
security flaw
|
[
"cpe:/o:redhat:linux:7.1",
"cpe:/o:redhat:linux:7.2",
"cpe:/o:redhat:linux:7.3",
"cpe:/o:redhat:linux:8.0"
] | null | null | null | null |
RHSA-2023:0328
|
Red Hat Security Advisory: go-toolset and golang security and bug fix update
|
golang: archive/tar: github.com/vbatts/tar-split: unbounded memory consumption when reading headers golang: net/http/httputil: ReverseProxy should not forward unparseable query parameters golang: net/http: handle server errors after sending GOAWAY golang: math/big: decoding big.Float and big.Rat types can panic if the encoded message is too short, potentially allowing a denial of service golang: regexp/syntax: limit memory used by parsing regexps golang: net/http: excessive memory growth in a Go server accepting HTTP/2 requests
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 5.3 | null | null |
RHSA-2015:0254
|
Red Hat Security Advisory: samba security update
|
samba: talloc free on uninitialized stack pointer in netlogon server could lead to remote-code execution
|
[
"cpe:/o:redhat:rhel_eus:6.4::computenode",
"cpe:/o:redhat:rhel_eus:6.4::server",
"cpe:/o:redhat:rhel_eus:6.5::computenode",
"cpe:/o:redhat:rhel_eus:6.5::server",
"cpe:/o:redhat:rhel_mission_critical:6.2::server"
] | null | null | null | null |
RHSA-2022:6780
|
Red Hat Security Advisory: bind security update
|
bind: memory leak in ECDSA DNSSEC verification code bind: memory leaks in EdDSA DNSSEC verification code
|
[
"cpe:/a:redhat:rhel_eus:8.2::appstream",
"cpe:/o:redhat:rhel_eus:8.2::baseos"
] | null | 7.5 | null | null |
RHSA-2015:0856
|
Red Hat Security Advisory: postgresql92-postgresql security update
|
postgresql: information leak through constraint violation errors postgresql: buffer overflow in the to_char() function postgresql: buffer overflow flaws in contrib/pgcrypto postgresql: loss of frontend/backend protocol synchronization after an error
|
[
"cpe:/a:redhat:network_satellite:5.7::el6",
"cpe:/a:redhat:network_satellite_managed_db:5.7::el6"
] | null | null | null | null |
RHSA-2023:7401
|
Red Hat Security Advisory: linux-firmware security update
|
amd: Return Address Predictor vulnerability leading to information disclosure hw: amd: Cross-Process Information Leak
|
[
"cpe:/o:redhat:rhel_eus:8.6::baseos"
] | null | 6.5 | null | null |
RHSA-2022:1830
|
Red Hat Security Advisory: postgresql:10 security update
|
postgresql: server processes unencrypted bytes from man-in-the-middle
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 8.1 | null | null |
RHSA-2023:6837
|
Red Hat Security Advisory: OpenShift Container Platform 4.14.2 bug fix and security update
|
golang.org/x/net/html: Cross site scripting golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487) HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack)
|
[
"cpe:/a:redhat:openshift:4.14::el8",
"cpe:/a:redhat:openshift:4.14::el9"
] | null | 7.5 | null | null |
RHSA-2022:7209
|
Red Hat Security Advisory: libksba security update
|
libksba: integer overflow may lead to remote code execution
|
[
"cpe:/o:redhat:rhel_e4s:8.1::baseos"
] | null | 8.6 | null | null |
RHSA-2024:4374
|
Red Hat Security Advisory: virt:rhel and virt-devel:rhel security update
|
qemu-kvm: 'qemu-img info' leads to host file read/write
|
[
"cpe:/a:redhat:rhel_aus:8.4::appstream",
"cpe:/a:redhat:rhel_e4s:8.4::appstream",
"cpe:/a:redhat:rhel_tus:8.4::appstream"
] | null | 7.8 | null | null |
RHSA-2025:2679
|
Red Hat Security Advisory: libxml2 security update
|
libxml2: Use-After-Free in libxml2 libxml2: Stack-based buffer overflow in xmlSnprintfElements of libxml2
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/o:redhat:enterprise_linux:9::baseos"
] | null | 7.8 | null | null |
RHSA-2023:6884
|
Red Hat Security Advisory: squid security update
|
squid: Denial of Service in HTTP Digest Authentication
|
[
"cpe:/o:redhat:rhel_els:6"
] | null | 8.6 | null | null |
RHSA-2018:2570
|
Red Hat Security Advisory: bind security update
|
bind: processing of certain records when "deny-answer-aliases" is in use may trigger an assert leading to a denial of service
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 7.5 | null |
RHSA-2020:0946
|
Red Hat Security Advisory: Red Hat Single Sign-On 7.3.7 security update on RHEL 7
|
keycloak: failedLogin Event not sent to BruteForceProtector when using Post Login Flow with Conditional-OTP
|
[
"cpe:/a:redhat:red_hat_single_sign_on:7::el7"
] | null | 5.6 | null | null |
RHSA-2023:6283
|
Red Hat Security Advisory: insights-client security update
|
insights-client: unsafe handling of temporary files and directories
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 7.8 | null | null |
RHSA-2020:0851
|
Red Hat Security Advisory: python-virtualenv security update
|
python-requests: Redirect from HTTPS to HTTP does not remove Authorization header python-urllib3: Cross-host redirect does not remove Authorization header allow for credential exposure python-urllib3: CRLF injection due to not encoding the '\r\n' sequence leading to possible attack on internal service
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 6.5 | null |
RHSA-2006:0178
|
Red Hat Security Advisory: ImageMagick security update
|
security flaw security flaw
|
[
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws",
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2009:1647
|
Red Hat Security Advisory: java-1.5.0-ibm security update
|
java-1.6.0-sun: Stack-based buffer overflow via a long file: URL argument (6854303) java-1.6.0-sun: Privilege escalation via crafted image file due improper color profiles parsing (6862970) OpenJDK JRE AWT setDifflCM stack overflow (6872357) OpenJDK JRE AWT setBytePixels heap overflow (6872358) JRE JPEG JFIF Decoder issue (6862969) OpenJDK JPEG Image Writer quantization problem (6862968) OpenJDK ImageI/O JPEG heap overflow (6874643) OpenJDK MessageDigest.isEqual introduces timing attack vulnerabilities (6863503) OpenJDK ASN.1/DER input stream parser denial of service (6864911) CVE-2009-3877 OpenJDK ASN.1/DER input stream parser denial of service (6864911) CVE-2009-3877
|
[
"cpe:/a:redhat:rhel_extras:4",
"cpe:/a:redhat:rhel_extras:5::client",
"cpe:/a:redhat:rhel_extras:5::server"
] | null | null | null | null |
RHSA-2010:0054
|
Red Hat Security Advisory: openssl security update
|
deprecate MD2 in SSL cert validation (Kaminsky) openssl significant memory leak in certain SSLv3 requests (DoS)
|
[
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2024:2045
|
Red Hat Security Advisory: unbound security update
|
unbound: NRDelegation attack leads to uncontrolled resource consumption (Non-Responsive Delegation Attack) unbound: novel ghost domain attack that allows attackers to trigger continued resolvability of malicious domain names unbound: novel ghost domain attack that allows attackers to trigger continued resolvability of malicious domain names
|
[
"cpe:/a:redhat:rhel_eus:8.6::appstream"
] | null | 6.5 | null | null |
RHSA-2021:1582
|
Red Hat Security Advisory: cpio security update
|
cpio: improper input validation when writing tar header fields leads to unexpected tar generation
|
[
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | null | 6.7 | null |
RHSA-2023:7820
|
Red Hat Security Advisory: Red Hat OpenShift Data Foundation 4.12.10 Bug Fix Update
|
validator: Inefficient Regular Expression Complexity in Validator.js
|
[
"cpe:/a:redhat:openshift_data_foundation:4.12::el8"
] | null | 7.5 | null | null |
RHSA-2020:0201
|
Red Hat Security Advisory: python-reportlab security update
|
python-reportlab: code injection in colors.py allows attacker to execute code
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | null | 9.8 | null |
RHSA-2007:0286
|
Red Hat Security Advisory: gdm security and bug fix update
|
security flaw
|
[
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2021:1775
|
Red Hat Security Advisory: pki-core:10.6 and pki-deps:10.6 security, bug fix, and enhancement update
|
resteasy: Improper validation of response header in MediaTypeHeaderDelegate.java class
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | null | 7.5 | null |
RHSA-2023:3590
|
Red Hat Security Advisory: firefox security update
|
Mozilla: Click-jacking certificate exceptions through rendering lag Mozilla: Memory safety bugs fixed in Firefox 114 and Firefox ESR 102.12
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 9.8 | null | null |
RHSA-2011:0862
|
Red Hat Security Advisory: subversion security update
|
(mod_dav_svn): DoS (crash) via request to deliver baselined WebDAV resources (mod_dav_svn): DoS (excessive memory use) when configured to provide path-based access control (mod_dav_svn): File contents disclosure of files configured to be unreadable by those users
|
[
"cpe:/o:redhat:enterprise_linux:5::server",
"cpe:/o:redhat:enterprise_linux:6::server"
] | null | null | null | null |
RHSA-2007:1011
|
Red Hat Security Advisory: perl security update
|
perl regular expression UTF parsing errors
|
[
"cpe:/a:redhat:rhel_application_stack:1"
] | null | null | null | null |
RHSA-2021:3487
|
Red Hat Security Advisory: Red Hat OpenStack Platform 16.2 (etcd) security update
|
golang: net/http: panic in ReadRequest and ReadResponse when reading a very large header golang: net: lookup functions may return invalid host names golang: net/http/httputil: ReverseProxy forwards connection headers if first one is empty golang: math/big.Rat: may cause a panic or an unrecoverable fatal error if passed inputs with very large exponents
|
[
"cpe:/a:redhat:openstack:16.2::el8"
] | null | 7.5 | null | null |
RHSA-2023:0977
|
Red Hat Security Advisory: Red Hat OpenShift Data Science 1.22.1 security update
|
odh-notebook-controller-container: Missing authorization allows for file contents disclosure
|
[
"cpe:/a:redhat:openshift_data_science:1.22::el8"
] | null | 9.8 | null | null |
RHSA-2023:7786
|
Red Hat Security Advisory: postgresql:10 security update
|
postgresql: Buffer overrun from integer overflow in array modification
|
[
"cpe:/a:redhat:rhel_eus:8.8::appstream"
] | null | 8.8 | null | null |
RHSA-2022:7968
|
Red Hat Security Advisory: virt-v2v security, bug fix, and enhancement update
|
libguestfs: Buffer overflow in get_keys leads to DoS
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::crb"
] | null | 5.5 | null | null |
RHSA-2009:1463
|
Red Hat Security Advisory: newt security update
|
newt: heap-overflow in textbox when text reflowing
|
[
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws",
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws",
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2014:1083
|
Red Hat Security Advisory: kernel-rt security and bug fix update
|
Kernel: ALSA: control: protect user controls against races & memory disclosure Kernel: ALSA: control: do not access controls outside of protected regions Kernel: ALSA: control: use-after-free in replacing user controls Kernel: ALSA: control: use-after-free in replacing user controls Kernel: ALSA: control: integer overflow in id.index & id.numid Kernel: net: SCTP: fix a NULL pointer dereference during INIT collisions
|
[
"cpe:/a:redhat:enterprise_mrg:2:server:el6"
] | null | null | null | null |
RHSA-2024:5598
|
Red Hat Security Advisory: libreoffice security update
|
libreoffice: Ability to trust not validated macro signatures removed in high security mode
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb"
] | null | 7.8 | null | null |
RHSA-2022:2283
|
Red Hat Security Advisory: OpenShift Container Platform 4.9.35 bug fix and security update
|
openshift/router: route hijacking attack via crafted HAProxy configuration file
|
[
"cpe:/a:redhat:openshift:4.9::el8"
] | null | 6.3 | null | null |
RHSA-2024:2994
|
Red Hat Security Advisory: LibRaw security update
|
LibRaw: stack buffer overflow in LibRaw_buffer_datastream::gets() in src/libraw_datastream.cpp
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb"
] | null | 5.3 | null | null |
RHSA-2008:0892
|
Red Hat Security Advisory: xen security and bug fix update
|
qemu/kvm/xen: add image format options for USB storage and removable media qemu/xen/kvm: ioemu: Fix PVFB backend to limit frame buffer size
|
[
"cpe:/a:redhat:rhel_virtualization:5::client",
"cpe:/a:redhat:rhel_virtualization:5::server",
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2020:0103
|
Red Hat Security Advisory: kernel security and bug fix update
|
kernel: kvm: guest userspace to guest kernel write kernel: TLB flush happens too late on mremap kernel: Use-after-free in __blk_drain_queue() function in block/blk-core.c Kernel: KVM: potential use-after-free via kvm_ioctl_create_device() kernel: fix race condition between mmget_not_zero()/get_task_mm() and core dumping
|
[
"cpe:/o:redhat:rhel_aus:7.4::server",
"cpe:/o:redhat:rhel_e4s:7.4::server",
"cpe:/o:redhat:rhel_tus:7.4::server"
] | null | null | 6.1 | null |
RHSA-2024:6001
|
Red Hat Security Advisory: postgresql:15 security update
|
postgresql: PostgreSQL pg_stats_ext and pg_stats_ext_exprs lack authorization checks postgresql: PostgreSQL relation replacement during pg_dump executes arbitrary SQL
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 7.5 | null | null |
RHSA-2011:1777
|
Red Hat Security Advisory: qemu-kvm security update
|
qemu: ccid: buffer overflow in handling of VSC_ATR message
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2019:0806
|
Red Hat Security Advisory: python27-python security update
|
python: Information Disclosure due to urlsplit improper NFKC normalization
|
[
"cpe:/a:redhat:rhel_software_collections:3::el6",
"cpe:/a:redhat:rhel_software_collections:3::el7"
] | null | null | 9.8 | null |
RHSA-2024:1363
|
Red Hat Security Advisory: OpenShift Container Platform 4.15.3 low-latency extras security update
|
golang-protobuf: encoding/protojson, internal/encoding/json: infinite loop in protojson.Unmarshal when unmarshaling certain forms of invalid JSON
|
[
"cpe:/a:redhat:openshift:4.15::el8",
"cpe:/a:redhat:openshift:4.15::el9"
] | null | 5.9 | null | null |
RHSA-2022:7279
|
Red Hat Security Advisory: kernel security and bug fix update
|
kernel: a use-after-free in cls_route filter implementation may lead to privilege escalation hw: cpu: incomplete clean-up of multi-core shared buffers (aka SBDR) hw: cpu: incomplete clean-up of microarchitectural fill buffers (aka SBDS) hw: cpu: incomplete clean-up in specific special register write operations (aka DRPW)
|
[
"cpe:/o:redhat:rhel_aus:8.2::baseos",
"cpe:/o:redhat:rhel_e4s:8.2::baseos",
"cpe:/o:redhat:rhel_tus:8.2::baseos"
] | null | 5.5 | null | null |
RHSA-2018:0352
|
Red Hat Security Advisory: java-1.8.0-ibm security update
|
JDK: J9 JVM allows untrusted code running under a security manager to elevate its privileges OpenJDK: unsynchronized access to encryption key data (Libraries, 8172525) OpenJDK: insufficient validation of the invokeinterface instruction (Hotspot, 8174962) OpenJDK: LdapLoginModule insufficient username encoding in LDAP query (LDAP, 8178449) OpenJDK: DnsClient missing source port randomization (JNDI, 8182125) OpenJDK: loading of classes from untrusted locations (I18n, 8182601) OpenJDK: DerValue unbounded memory allocation (Libraries, 8182387) OpenJDK: insufficient strength of key agreement (JCE, 8185292) OpenJDK: LDAPCertStore insecure handling of LDAP referrals (JNDI, 8186606) OpenJDK: use of global credentials for HTTP/SPNEGO (JGSS, 8186600) OpenJDK: SingleEntryRegistry incorrect setup of deserialization filter (JMX, 8186998) JDK: unspecified vulnerability fixed in 8u161 and 9.0.4 (Deployment) JDK: unspecified vulnerability fixed in 8u161 and 9.0.4 (Deployment) OpenJDK: GTK library loading use-after-free (AWT, 8185325) OpenJDK: ArrayBlockingQueue deserialization to an inconsistent state (Libraries, 8189284) OpenJDK: unbounded memory allocation during deserialization (AWT, 8190289) OpenJDK: unbounded memory allocation in BasicAttributes deserialization (JNDI, 8191142)
|
[
"cpe:/a:redhat:rhel_extras:6"
] | null | null | 4.3 | null |
RHSA-2022:0474
|
Red Hat Security Advisory: Red Hat Ansible Automation Platform 2.0 ansible-runner security update
|
ansible-tower: Privilege escalation via job isolation escape
|
[
"cpe:/a:redhat:ansible_automation_platform:2.0::el8"
] | null | 8.8 | null | null |
RHSA-2019:0031
|
Red Hat Security Advisory: Red Hat Enterprise Linux 6.6 Telco Update Support Final Retirement Notice
|
This is the final notification for the retirement of Red Hat Enterprise Linux 6.6 Telco Update Service (TUS). This notification applies only to those customers subscribed to the Telco Update Service (TUS) channel for Red Hat Enterprise Linux 6.6.
|
[
"cpe:/o:redhat:rhel_aus:6.6::server",
"cpe:/o:redhat:rhel_tus:6.6::server"
] | null | null | null | null |
RHSA-2023:4655
|
Red Hat Security Advisory: redhat-ds:11 security, bug fix, and enhancement update
|
RHDS: LDAP browser tries to decode userPassword instead of userCertificate attribute
|
[
"cpe:/a:redhat:directory_server:11.6::el8"
] | null | 5.5 | null | null |
RHSA-2017:0830
|
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform security update
|
wildfly: ParseState headerValuesCache can be exploited to fill heap with garbage
|
[
"cpe:/a:redhat:jboss_enterprise_application_platform:7"
] | null | null | 7.5 | null |
RHSA-2014:1971
|
Red Hat Security Advisory: kernel security and bug fix update
|
kernel: exec/ptrace: get_dumpable() incorrect tests Kernel: drivers: media: an information leakage Kernel: HID: OOB write in magicmouse driver Kernel: HID: logitech-dj OOB array access Kernel: HID: off by one error in various _report_fixup routines Kernel: USB serial: memory corruption flaw Kernel: HID: memory corruption via OOB write kernel: keys: incorrect termination condition in assoc array garbage collection kernel: sctp: skb_over_panic when receiving malformed ASCONF chunks kernel: net: sctp: fix panic on duplicate ASCONF chunks kernel: net: sctp: remote memory pressure from excessive queueing Kernel: target/rd: imformation leakage Kernel: ALSA: control: protect user controls against races & memory disclosure Kernel: ALSA: control: use-after-free in replacing user controls Kernel: ALSA: control: use-after-free in replacing user controls Kernel: ALSA: control: integer overflow in id.index & id.numid kernel: vfs: refcount issues during unmount on symlink kernel: udf: Avoid infinite loop when processing indirect ICBs
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | null | null |
RHSA-2020:4311
|
Red Hat Security Advisory: firefox security update
|
Mozilla: Memory safety bugs fixed in Firefox 82 and Firefox ESR 78.4 chromium-browser: Use after free in WebRTC
|
[
"cpe:/a:redhat:rhel_e4s:8.0::appstream"
] | null | 8.8 | null | null |
RHSA-2012:0307
|
Red Hat Security Advisory: util-linux security, bug fix, and enhancement update
|
util-linux: mount fails to anticipate RLIMIT_FSIZE util-linux: umount may fail to remove /etc/mtab~ lock file
|
[
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2011:1306
|
Red Hat Security Advisory: jbossws-common security update
|
JBossWS remote Denial of Service
|
[
"cpe:/a:redhat:jboss_enterprise_application_platform:4.3.0::el4",
"cpe:/a:redhat:jboss_enterprise_application_platform:4.3.0::el5"
] | null | null | null | null |
RHSA-2023:7368
|
Red Hat Security Advisory: c-ares security update
|
c-ares: buffer overflow in config_sortlist() due to missing string length check
|
[
"cpe:/a:redhat:rhel_eus:9.2::appstream",
"cpe:/o:redhat:rhel_eus:9.2::baseos"
] | null | 8.6 | null | null |
RHSA-2021:3088
|
Red Hat Security Advisory: kernel-rt security and bug fix update
|
kernel: race condition in net/can/bcm.c leads to local privilege escalation kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c
|
[
"cpe:/a:redhat:enterprise_linux:8::nfv",
"cpe:/a:redhat:enterprise_linux:8::realtime"
] | null | 7.8 | null | null |
RHSA-2015:0782
|
Red Hat Security Advisory: kernel security and bug fix update
|
kernel: integer overflow in fb_mmap kernel: kvm: vmx: invalid host cr4 handling across vm entries kernel: isofs: unbound recursion when processing relocated directories kernel: isofs: unbound recursion when processing relocated directories kernel: infiniband: uverbs: unprotected physical memory access kernel: usb: buffer overflow in ttusb-dec kernel: net: slab corruption from use after free on INIT collisions
|
[
"cpe:/o:redhat:rhel_eus:6.5::computenode",
"cpe:/o:redhat:rhel_eus:6.5::server"
] | null | null | null | null |
RHSA-2022:8649
|
Red Hat Security Advisory: varnish:6 security update
|
varnish: Request Forgery Vulnerability
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 7.5 | null | null |
RHSA-2023:7474
|
Red Hat Security Advisory: OpenShift Container Platform 4.13.24 security and extras update
|
golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487)
|
[
"cpe:/a:redhat:openshift:4.13::el8",
"cpe:/a:redhat:openshift:4.13::el9"
] | null | 7.5 | null | null |
RHSA-2009:0445
|
Red Hat Security Advisory: java-1.4.2-ibm security update
|
Java Web Start File Inclusion via System Properties Override JavaWebStart allows unauthorized network connections Java WebStart privilege escalation Java Web Start BasicService displays local files in the browser Java WebStart allows hidden code privilege escalation Java WebStart unprivileged local file and network access JRE allows unauthorized file access and connections to localhost JRE allows unauthorized memory read access via a crafted ZIP file OpenJDK Denial-Of-Service in kerberos authentication (6588160) OpenJDK allows to list files within the user home directory (6484091) OpenJDK UTF-8 decoder accepts non-shortest form sequences (4486841) OpenJDK calendar object deserialization allows privilege escalation (6734167) OpenJDK Privilege escalation in command line applications (6733959) OpenJDK Buffer overflow in image processing (6726779) OpenJDK temporary files have guessable file names (6721753)
|
[
"cpe:/a:redhat:rhel_extras:3",
"cpe:/a:redhat:rhel_extras:4",
"cpe:/a:redhat:rhel_extras:5::client",
"cpe:/a:redhat:rhel_extras:5::server"
] | null | null | null | null |
RHSA-2010:0786
|
Red Hat Security Advisory: java-1.4.2-ibm security update
|
TLS: MITM attacks via session renegotiation OpenJDK HttpURLConnection allows arbitrary request headers (6961084,6980004) OpenJDK DNS server IP address information leak (6957564) OpenJDK HttpURLConnection request splitting (6952017) OpenJDK local network address disclosure (6952603) OpenJDK Swing unsafe reflection usage (6622002) JDK unspecified vulnerability in 2D component OpenJDK Swing mutable static (6938813) OpenJDK IndexColorModel double-free (6925710) OpenJDK JPEG writeImage remote code execution (6963023) OpenJDK Deserialization Race condition (6559775) OpenJDK Serialization inconsistencies (6966692) JDK unspecified vulnerability in 2D component JDK unspecified vulnerability in Sound component
|
[
"cpe:/a:redhat:rhel_extras:3",
"cpe:/a:redhat:rhel_extras:4",
"cpe:/a:redhat:rhel_extras:5::client",
"cpe:/a:redhat:rhel_extras:5::server"
] | null | null | null | null |
RHSA-2007:0009
|
Red Hat Security Advisory: flash-plugin security update
|
security flaw
|
[
"cpe:/a:redhat:rhel_extras:3",
"cpe:/a:redhat:rhel_extras:4"
] | null | null | null | null |
RHSA-2024:2619
|
Red Hat Security Advisory: rh-mysql80-mysql security update
|
zstd: mysql: buffer overrun in util.c mysql: InnoDB unspecified vulnerability (CPU Apr 2023) mysql: Server: DDL unspecified vulnerability (CPU Apr 2023) mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2023) mysql: Server: DDL unspecified vulnerability (CPU Apr 2023) mysql: Server: DDL unspecified vulnerability (CPU Apr 2023) mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2023) mysql: Server: Components Services unspecified vulnerability (CPU Apr 2023) mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2023) mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2023) mysql: Server: Components Services unspecified vulnerability (CPU Apr 2023) mysql: Server: Partition unspecified vulnerability (CPU Apr 2023) mysql: Server: Partition unspecified vulnerability (CPU Apr 2023) mysql: Server: Components Services unspecified vulnerability (CPU Apr 2023) mysql: Server: JSON unspecified vulnerability (CPU Apr 2023) mysql: Server: DML unspecified vulnerability (CPU Apr 2023) mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2023) mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2023) mysql: Client programs unspecified vulnerability (CPU Apr 2023) mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2023) mysql: Server: Replication unspecified vulnerability (CPU Jul 2023) mysql: Server: Replication unspecified vulnerability (CPU Jul 2023) mysql: InnoDB unspecified vulnerability (CPU Jul 2023) mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2023) mysql: InnoDB unspecified vulnerability (CPU Jul 2023) mysql: Server: Security: Privileges unspecified vulnerability (CPU Jul 2023) mysql: Server: Optimizer unspecified vulnerability (CPU Jul 2023) mysql: Server: Pluggable Auth unspecified vulnerability (CPU Jul 2023) mysql: Client programs unspecified vulnerability (CPU Jul 2023) mysql: Server: Optimizer unspecified vulnerability (CPU Jul 2023) mysql: Server: Optimizer unspecified vulnerability (CPU Jul 2023) mysql: Server: Replication unspecified vulnerability (CPU Jul 2023) mysql: Server: DDL unspecified vulnerability (CPU Jul 2023) mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2023) mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2023) mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2023) mysql: InnoDB unspecified vulnerability (CPU Oct 2023) mysql: InnoDB unspecified vulnerability (CPU Oct 2023) mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2023) mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2023) mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2023) mysql: InnoDB unspecified vulnerability (CPU Oct 2023) mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2023) mysql: InnoDB unspecified vulnerability (CPU Oct 2023) mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2023) mysql: InnoDB unspecified vulnerability (CPU Oct 2023) mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2023) mysql: Server: UDF unspecified vulnerability (CPU Oct 2023) mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2023) mysql: Server: Security: Encryption unspecified vulnerability (CPU Oct 2023) mysql: InnoDB unspecified vulnerability (CPU Oct 2023) mysql: Server: DML unspecified vulnerability (CPU Oct 2023) mysql: Server: RAPID unspecified vulnerability (CPU Jan 2024) mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2024) mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2024) mysql: Server: Security: Encryption unspecified vulnerability (CPU Jan 2024) mysql: Server: Security: Privileges unspecified vulnerability (CPU Jan 2024) mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2024) mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2024) mysql: Server: Replication unspecified vulnerability (CPU Jan 2024) mysql: Server: Options unspecified vulnerability (CPU Jan 2024) mysql: Server: DDL unspecified vulnerability (CPU Jan 2024) mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2024) mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2024) mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2024) mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2024) mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2024) mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2024) mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2024) mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2024) mysql: Server: DDL unspecified vulnerability (CPU Jan 2024) mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2024) mysql: Server: DML unspecified vulnerability (CPU Jan 2024) mysql: Server : Security : Firewall unspecified vulnerability (CPU Jan 2024) mysql: Server: UDF unspecified vulnerability (CPU Jan 2024) mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2024) mysql: Server: DML unspecified vulnerability (CPU Apr 2024) mysql: Server: DML unspecified vulnerability (CPU Apr 2024) mysql: Server: DML unspecified vulnerability (CPU Apr 2024) mysql: Server: DML unspecified vulnerability (CPU Apr 2024) mysql: Server: DML unspecified vulnerability (CPU Apr 2024) mysql: Server: DML unspecified vulnerability (CPU Apr 2024) mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2024) mysql: Server: DML unspecified vulnerability (CPU Apr 2024) mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2024) mysql: Server: Audit Plug-in unspecified vulnerability (CPU Apr 2024)
|
[
"cpe:/a:redhat:rhel_software_collections:3::el7"
] | null | 4.9 | null | null |
RHSA-2013:1199
|
Red Hat Security Advisory: openstack-nova security and bug fix update
|
OpenStack: Nova private flavors resource limit circumvention OpenStack: Nova XML entities DoS OpenStack: Nova network source security groups denial of service OpenStack: openstack-nova-compute console-log DoS
|
[
"cpe:/a:redhat:openstack:3::el6"
] | null | null | null | null |
RHSA-2008:0790
|
Red Hat Security Advisory: java-1.5.0-ibm security update
|
Java RE allows Same Origin Policy to be Bypassed (6687932) security flaw Security Vulnerability with JRE fonts processing may allow Elevation of Privileges (6450319) Java Web Start Buffer overflow vulnerabilities (6557220) Java Web Start, arbitrary file creation (6703909) Java Web Start arbitrary file creation/deletion file with user permissions (6704077) Java Web Start, untrusted application may determine Cache Location (6704074)
|
[
"cpe:/a:redhat:rhel_extras:4",
"cpe:/a:redhat:rhel_extras:5::client",
"cpe:/a:redhat:rhel_extras:5::server"
] | null | null | null | null |
RHSA-2024:1489
|
Red Hat Security Advisory: firefox security update
|
nss: timing attack against RSA decryption Mozilla: Crash in NSS TLS method Mozilla: JIT code failed to save return registers on Armv7-A Mozilla: Integer overflow could have led to out of bounds write Mozilla: Improper handling of html and body tags enabled CSP nonce leakage Mozilla: Clickjacking vulnerability could have led to a user accidentally granting permissions Mozilla: Self referencing object could have potentially led to a use-after-free Mozilla: Memory safety bugs fixed in Firefox 124, Firefox ESR 115.9, and Thunderbird 115.9 Mozilla: Improve handling of out-of-memory conditions in ICU Mozilla: Privileged JavaScript Execution via Event Handlers
|
[
"cpe:/a:redhat:rhel_eus:8.6::appstream"
] | null | 8.8 | null | null |
RHSA-2024:7977
|
Red Hat Security Advisory: firefox security update
|
firefox: Use-after-free in Animation timeline (128.3.1 ESR Chemspill)
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 9.8 | null | null |
RHSA-2023:2969
|
Red Hat Security Advisory: net-snmp security and bug fix update
|
net-snmp: NULL Pointer Exception when handling ipDefaultTTL net-snmp: NULL Pointer Exception when handling pv6IpForwarding
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 6.5 | null | null |
RHSA-2024:6356
|
Red Hat Security Advisory: bubblewrap and flatpak security update
|
flatpak: Access to files outside sandbox for apps using persistent= (--persist)
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::crb",
"cpe:/o:redhat:enterprise_linux:9::baseos"
] | null | 7.4 | null | null |
RHSA-2019:4111
|
Red Hat Security Advisory: firefox security update
|
Mozilla: Buffer overflow in plain text serializer Mozilla: Use-after-free in worker destruction Mozilla: Use-after-free when performing device orientation checks Mozilla: Use-after-free when retrieving a document in antitracking Mozilla: Memory safety bugs fixed in Firefox 71 and Firefox ESR 68.3
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 8.8 | null | null |
RHSA-2010:0528
|
Red Hat Security Advisory: avahi security update
|
avahi: remote DoS via legacy unicast mDNS queries avahi: assertion failure after receiving a packet with corrupted checksum
|
[
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2019:0774
|
Red Hat Security Advisory: java-1.8.0-openjdk security and bug fix update
|
OpenJDK: Slow conversion of BigDecimal to long (Libraries, 8211936) OpenJDK: Incorrect skeleton selection in RMI registry server-side dispatch handling (RMI, 8218453) OpenJDK: Font layout engine out of bounds access setCurrGlyphID() (2D, 8219022)
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | 7.5 | null |
RHSA-2016:0332
|
Red Hat Security Advisory: RHEL Atomic OSTree Update 7.2.2
|
RHEL Atomic OSTree Update 7.2.2
|
[] | null | null | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.