id
stringlengths 13
15
| title
stringlengths 29
176
| description
stringlengths 8
32.1k
| cpes
listlengths 0
20
| cvss_v4_0
null | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
null |
---|---|---|---|---|---|---|---|
RHSA-2023:6632
|
Red Hat Security Advisory: shadow-utils security and bug fix update
|
shadow-utils: possible password leak during passwd(1) change
|
[
"cpe:/a:redhat:enterprise_linux:9::crb",
"cpe:/o:redhat:enterprise_linux:9::baseos"
] | null | 4.7 | null | null |
RHSA-2024:0790
|
Red Hat Security Advisory: nss security update
|
nss: vulnerable to Minerva side-channel information leak
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 4.3 | null | null |
RHSA-2011:1267
|
Red Hat Security Advisory: thunderbird security update
|
An updated thunderbird package that fixes one security issue is now
available for Red Hat Enterprise Linux 4, 5, and 6.
The Red Hat Security Response Team has rated this update as having
important security impact.
|
[
"cpe:/a:redhat:rhel_productivity:5",
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws",
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:6::server"
] | null | null | null | null |
RHSA-2022:5153
|
Red Hat Security Advisory: Red Hat OpenShift GitOps security update
|
argocd: vulnerable to an uncontrolled memory consumption bug argocd: vulnerable to a variety of attacks when an SSO login is initiated from the Argo CD CLI or the UI. argocd: cross-site scripting (XSS) allow a malicious user to inject a javascript link in the UI argocd: vulnerable to a symlink following bug allowing a malicious user with repository write access
|
[
"cpe:/a:redhat:openshift_gitops:1.4::el8"
] | null | 4.3 | null | null |
RHSA-2024:7703
|
Red Hat Security Advisory: firefox security update
|
firefox: Clipboard write permission bypass firefox: thunderbird: Compromised content process can bypass site isolation firefox: thunderbird: Cross-origin access to PDF contents through multipart responses firefox: thunderbird: Cross-origin access to JSON contents through multipart responses firefox: thunderbird: Potential memory corruption may occur when cloning certain objects firefox: thunderbird: Potential directory upload bypass via clickjacking firefox: thunderbird: External protocol handlers could be enumerated via popups firefox: thunderbird: Specially crafted WebTransport requests could lead to denial of service firefox: thunderbird: Potential memory corruption during JIT compilation firefox: thunderbird: Memory safety bugs fixed in Firefox 131, Firefox ESR 115.16, Firefox ESR 128.3, Thunderbird 131, and Thunderbird 128.3 firefox: thunderbird: Memory safety bugs fixed in Firefox 131, Firefox ESR 128.3, Thunderbird 131, and Thunderbird 128.3 firefox: thunderbird: Memory safety bugs fixed in Firefox 131 and Thunderbird 131
|
[
"cpe:/a:redhat:rhel_aus:8.4::appstream",
"cpe:/a:redhat:rhel_e4s:8.4::appstream",
"cpe:/a:redhat:rhel_tus:8.4::appstream"
] | null | 7.5 | null | null |
RHSA-2024:3058
|
Red Hat Security Advisory: mutt security update
|
mutt: null pointer dereference mutt: null pointer dereference
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 5.7 | null | null |
RHSA-2005:090
|
Red Hat Security Advisory: htdig security update
|
security flaw
|
[
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2021:2099
|
Red Hat Security Advisory: kpatch-patch security update
|
kernel: use after free in eventpoll.c may lead to escalation of privilege kernel: SCSI target (LIO) write to any block on ILO backstore kernel: Use after free via PI futex state
|
[
"cpe:/o:redhat:rhel_eus:8.1::baseos"
] | null | 7 | null | null |
RHSA-2006:0548
|
Red Hat Security Advisory: kdebase security update
|
security flaw
|
[
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2024:7486
|
Red Hat Security Advisory: kernel security update
|
kernel: af_unix: Fix garbage collector racing against connect() kernel: netfilter: tproxy: bail out if IP has been disabled on the device
|
[
"cpe:/o:redhat:rhel_aus:8.6::baseos",
"cpe:/o:redhat:rhel_e4s:8.6::baseos",
"cpe:/o:redhat:rhel_tus:8.6::baseos"
] | null | 5.5 | null | null |
RHSA-2023:2165
|
Red Hat Security Advisory: edk2 security, bug fix, and enhancement update
|
edk2: integer underflow in SmmEntryPoint function leads to potential SMM privilege escalation openssl: timing attack in RSA Decryption implementation openssl: double free after calling PEM_read_bio_ex openssl: use-after-free following BIO_new_NDEF openssl: X.400 address type confusion in X.509 GeneralName
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::crb"
] | null | 7.4 | null | null |
RHSA-2016:0684
|
Red Hat Security Advisory: nss and nspr security, bug fix, and enhancement update
|
nss: Use-after-free in NSS during SSL connections in low memory (MFSA 2016-15) nss: Use-after-free during processing of DER encoded keys in NSS (MFSA 2016-36)
|
[
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2023:5527
|
Red Hat Security Advisory: bind security update
|
bind: stack exhaustion in control channel code may lead to DoS
|
[
"cpe:/a:redhat:rhel_aus:8.2::appstream",
"cpe:/a:redhat:rhel_e4s:8.2::appstream",
"cpe:/a:redhat:rhel_tus:8.2::appstream",
"cpe:/o:redhat:rhel_aus:8.2::baseos",
"cpe:/o:redhat:rhel_e4s:8.2::baseos",
"cpe:/o:redhat:rhel_tus:8.2::baseos"
] | null | 7.5 | null | null |
RHSA-2018:2001
|
Red Hat Security Advisory: qemu-kvm security update
|
hw: cpu: speculative store bypass
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 5.6 | null |
RHSA-2021:5035
|
Red Hat Security Advisory: RHV-H security update (redhat-virtualization-host) 4.3.20
|
kernel: use-after-free in drivers/infiniband/core/ucma.c ctx use-after-free nss: Memory corruption in decodeECorDsaSignature with DSA signatures (and RSA-PSS)
|
[
"cpe:/o:redhat:enterprise_linux:7::hypervisor"
] | null | 9.8 | null | null |
RHSA-2024:7867
|
Red Hat Security Advisory: .NET 6.0 security update
|
dotnet: Multiple .NET components susceptible to hash flooding dotnet: System.IO.Packaging - Multiple DoS vectors in use of SortedList dotnet: Denial of Service in System.Text.Json
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::crb"
] | null | 7.5 | null | null |
RHSA-2011:1359
|
Red Hat Security Advisory: xorg-x11-server security update
|
X.org: multiple GLX input sanitization flaws X.org: ProcRenderAddGlyphs input sanitization flaw
|
[
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server",
"cpe:/o:redhat:enterprise_linux:6::server"
] | null | null | null | null |
RHSA-2024:1390
|
Red Hat Security Advisory: ovn23.09 security update
|
ovn: insufficient validation of BFD packets may lead to denial of service
|
[
"cpe:/o:redhat:enterprise_linux:9::fastdatapath"
] | null | 6.5 | null | null |
RHSA-2020:3875
|
Red Hat Security Advisory: tigervnc security and bug fix update
|
tigervnc: Stack use-after-return due to incorrect usage of stack memory in ZRLEDecoder tigervnc: Heap buffer overflow triggered from CopyRectDecoder due to incorrect value checks tigervnc: Heap buffer overflow in TightDecoder::FilterGradient tigervnc: Heap buffer overflow in DecodeManager::decodeRect tigervnc: Stack buffer overflow in CMsgReader::readSetCursor
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 7.2 | null | null |
RHSA-2014:0439
|
Red Hat Security Advisory: kernel-rt security, bug fix, and enhancement update
|
kernel: ipc: ipc_rcu_putref refcount races Kernel: net: leakage of uninitialized memory to user-space via recv syscalls Kernel: net: leakage of uninitialized memory to user-space via recv syscalls kernel: net: rds: dereference of a NULL device in rds_ib_laddr_check() kernel: cifs: incorrect handling of bogus user pointers during uncached writes kernel: x86: exceptions are not cleared in AMD FXSAVE workaround Kernel: netfilter: nf_nat: leakage of uninitialized buffer in IRC NAT helper Kernel: SELinux: local denial-of-service Kernel: net: IPv6: crash due to router advertisement flooding kernel: netfilter: nf_conntrack_dccp: incorrect skb_header_pointer API usages
|
[
"cpe:/a:redhat:enterprise_mrg:2:server:el6"
] | null | null | null | null |
RHSA-2003:032
|
Red Hat Security Advisory: : Updated tcpdump packages fix various vulnerabilities
|
security flaw security flaw security flaw security flaw
|
[
"cpe:/o:redhat:linux:7.1",
"cpe:/o:redhat:linux:7.2",
"cpe:/o:redhat:linux:7.3",
"cpe:/o:redhat:linux:8.0"
] | null | null | null | null |
RHSA-2015:0795
|
Red Hat Security Advisory: qemu-kvm-rhev security update
|
qemu: cirrus: insufficient blit region checks
|
[
"cpe:/a:redhat:openstack:5::el7"
] | null | null | null | null |
RHSA-2018:2884
|
Red Hat Security Advisory: firefox security update
|
Mozilla: type confusion in JavaScript Mozilla: stack out-of-bounds read in Array.prototype.push
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 8.8 | null |
RHSA-2021:3500
|
Red Hat Security Advisory: thunderbird security update
|
Mozilla: Memory safety bugs fixed in Firefox 92, Firefox ESR 78.14 and Firefox ESR 91.1
|
[
"cpe:/a:redhat:rhel_eus:8.2::appstream"
] | null | 8.8 | null | null |
RHSA-2015:1766
|
Red Hat Security Advisory: python-django security update
|
python-django: Denial-of-service possibility in logout() view by filling session store python-django: Denial-of-service possibility in logout() view by filling session store
|
[
"cpe:/a:redhat:openstack:5::el6"
] | null | null | null | null |
RHSA-2024:1346
|
Red Hat Security Advisory: Red Hat OpenShift GitOps security update
|
argo-cd: XSS vulnerability in application summary component
|
[
"cpe:/a:redhat:openshift_gitops:1.11::el8"
] | null | 8.9 | null | null |
RHSA-2019:2507
|
Red Hat Security Advisory: qemu-kvm-rhev security update
|
QEMU: device_tree: heap buffer overflow while loading device tree blob
|
[
"cpe:/a:redhat:openstack:9::el7"
] | null | null | 7 | null |
RHSA-2016:2583
|
Red Hat Security Advisory: ntp security and bug fix update
|
ntp: crash with crafted logconfig configuration command ntp: ntpd crash when processing config commands with statistics type ntp: config command can be used to set the pidfile and drift file paths ntp: infinite loop in sntp processing crafted packet ntp: incomplete checks in ntp_crypto.c ntp: incomplete checks in ntp_crypto.c ntp: slow memory leak in CRYPTO_ASSOC ntp: incomplete checks in ntp_crypto.c ntp: config command can be used to set the pidfile and drift file paths ntp: ntpq atoascii memory corruption vulnerability ntp: missing key check allows impersonation between authenticated peers (VU#357792) ntp: restriction list NULL pointer dereference ntp: stack exhaustion in recursive traversal of restriction list ntp: off-path denial of service on authenticated broadcast mode ntp: potential infinite loop in ntpq
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | null | null |
RHSA-2007:0605
|
Red Hat Security Advisory: HelixPlayer security update
|
RealPlayer/HelixPlayer buffer overflow
|
[
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2014:1171
|
Red Hat Security Advisory: Fuse ESB Enterprise/Fuse MQ Enterprise 7.1.0 update
|
elasticsearch: remote code execution flaw via dynamic scripting
|
[
"cpe:/a:redhat:fuse_esb_enterprise:7.1.0",
"cpe:/a:redhat:fuse_management_console:7.1.0",
"cpe:/a:redhat:fuse_mq_enterprise:7.1.0"
] | null | null | null | null |
RHSA-2017:0113
|
Red Hat Security Advisory: kernel-rt security and bug fix update
|
kernel: Use after free in tcp_xmit_retransmit_queue kernel: Use-after-free in the recvmmsg exit path kernel: Slab out-of-bounds access in sctp_sf_ootb() kernel: sound: a race condition in the kernel sound timer in snd_timer_user_read()
|
[
"cpe:/a:redhat:enterprise_mrg:2:server:el6"
] | null | null | 3.6 | null |
RHSA-2015:2659
|
Red Hat Security Advisory: Red Hat JBoss Web Server 3.0.2 security update
|
httpd: bypass of mod_headers rules via chunked requests tomcat: non-persistent DoS attack by feeding data by aborting an upload httpd: NULL pointer dereference in mod_cache if Content-Type has empty value httpd: HTTP request smuggling attack against chunked request parser tomcat: URL Normalization issue
|
[
"cpe:/a:redhat:jboss_enterprise_web_server:3.0::el6"
] | null | null | 4.3 | null |
RHSA-2013:0698
|
Red Hat Security Advisory: rubygem-actionpack and ruby193-rubygem-actionpack security update
|
rubygem-actionpack: css_sanitization: XSS vulnerability in sanitize_css rubygem-actionpack: sanitize_protocol: XSS Vulnerability in the helper of Ruby on Rails
|
[
"cpe:/a:redhat:openshift:1::el6"
] | null | null | null | null |
RHSA-2024:9449
|
Red Hat Security Advisory: bubblewrap and flatpak security update
|
flatpak: Access to files outside sandbox for apps using persistent= (--persist)
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::crb",
"cpe:/o:redhat:enterprise_linux:9::baseos"
] | null | 7.4 | null | null |
RHSA-2014:0634
|
Red Hat Security Advisory: kernel security and bug fix update
|
Kernel: AACRAID Driver compat IOCTL missing capability check kernel: vhost-net: insufficiency in handling of big packets in handle_rx() kernel: netfilter: nf_conntrack_dccp: incorrect skb_header_pointer API usages
|
[
"cpe:/o:redhat:rhel_eus:6.4::computenode",
"cpe:/o:redhat:rhel_eus:6.4::server"
] | null | null | null | null |
RHSA-2020:3283
|
Red Hat Security Advisory: postgresql-jdbc security update
|
postgresql-jdbc: XML external entity (XXE) vulnerability in PgSQLXML
|
[
"cpe:/a:redhat:rhel_e4s:8.0::appstream"
] | null | 7.7 | null | null |
RHSA-2023:3536
|
Red Hat Security Advisory: OpenShift Container Platform 4.13.3 packages and security update
|
golang: net/http, net/textproto: denial of service from excessive memory allocation golang: net/http, net/textproto, mime/multipart: denial of service from excessive resource consumption golang: go/parser: Infinite loop in parsing golang: html/template: backticks not treated as string delimiters flask: Possible disclosure of permanent session cookie due to missing Vary: Cookie header
|
[
"cpe:/a:redhat:openshift:4.13::el8",
"cpe:/a:redhat:openshift:4.13::el9",
"cpe:/a:redhat:openshift_ironic:4.13::el9"
] | null | 7.5 | null | null |
RHSA-2012:1009
|
Red Hat Security Advisory: java-1.7.0-openjdk security and bug fix update
|
OpenJDK: improper protection of CORBA data models (CORBA, 7079902) OpenJDK: fontmanager layout lookup code memory corruption (2D, 7143617) OpenJDK: SynthLookAndFeel application context bypass (Swing, 7143614) OpenJDK: insecure temporary file permissions (JRE, 7143606) OpenJDK: CRL and certificate extensions handling improvements (Security, 7143872) OpenJDK: mutable repository identifiers in generated stub code (CORBA, 7143851) OpenJDK: insufficient field accessibility checks (HotSpot, 7152811) OpenJDK: XML parsing infinite loop (JAXP, 7157609) OpenJDK: insufficient invokespecial <init> verification (HotSpot, 7160757) OpenJDK: java.lang.invoke.MethodHandles.Lookup does not honor access modes (Libraries, 7165628)
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2017:3277
|
Red Hat Security Advisory: tcmu-runner security update
|
tcmu-runner: glfs handler allows local DoS via crafted CheckConfig strings tcmu-runner: qcow handler opens up an information leak via the CheckConfig D-Bus method tcmu-runner: UnregisterHandler D-Bus method in tcmu-runner daemon for internal handler causes DoS tcmu-runner: UnregisterHandler dbus method in tcmu-runner daemon for non-existing handler causes DoS
|
[
"cpe:/a:redhat:storage:3.3:server:el7"
] | null | null | 5.5 | null |
RHSA-2017:1118
|
Red Hat Security Advisory: java-1.7.0-oracle security update
|
OpenJDK: improper re-use of NTLM authenticated connections (Networking, 8163520) OpenJDK: untrusted extension directories search path in Launcher (JCE, 8163528) OpenJDK: incomplete XML parse tree size enforcement (JAXP, 8169011) OpenJDK: newline injection in the FTP client (Networking, 8170222) OpenJDK: MD5 allowed for jar verification (Security, 8171121) OpenJDK: newline injection in the SMTP client (Networking, 8171533)
|
[
"cpe:/a:redhat:rhel_extras_oracle_java:6",
"cpe:/a:redhat:rhel_extras_oracle_java:7"
] | null | null | 3.7 | null |
RHSA-2021:3468
|
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.3.9 security update on RHEL 8
|
undertow: HTTP2SourceChannel fails to write final frame under some circumstances may lead to DoS wildfly-core: Invalid Sensitivity Classification of Vault Expression undertow: buffer leak on incoming websocket PONG message may lead to DoS jakarta-el: ELParserTokenManager enables invalid EL expressions to be evaluate apache-commons-io: Limited path traversal in Apache Commons IO 2.2 to 2.6
|
[
"cpe:/a:redhat:jboss_enterprise_application_platform:7.3::el8"
] | null | 4.8 | null | null |
RHSA-2019:2143
|
Red Hat Security Advisory: openssh security, bug fix, and enhancement update
|
openssh: User enumeration via malformed packets in authentication requests
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 5.3 | null |
RHSA-2023:7400
|
Red Hat Security Advisory: libcap security update
|
libcap: Memory Leak on pthread_create() Error libcap: Integer Overflow in _libcap_strdup()
|
[
"cpe:/o:redhat:rhel_eus:8.6::baseos"
] | null | 7.8 | null | null |
RHSA-2023:1663
|
Red Hat Security Advisory: Red Hat JBoss Web Server 5.7.2 release and security update
|
tomcat: request smuggling tomcat: JsonErrorReportValve injection
|
[
"cpe:/a:redhat:jboss_enterprise_web_server:5.7::el7",
"cpe:/a:redhat:jboss_enterprise_web_server:5.7::el8",
"cpe:/a:redhat:jboss_enterprise_web_server:5.7::el9"
] | null | 7.5 | null | null |
RHEA-2019:3280
|
Red Hat Enhancement Advisory: nss, nss-softokn, nss-util and nspr bug fix and enhancement update
|
nss: Handling of Netscape Certificate Sequences in CERT_DecodeCertPackage() may crash with a NULL deref leading to DoS
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | 7.5 | null |
RHSA-2024:1800
|
Red Hat Security Advisory: bind and bind-dyndb-ldap security updates
|
bind9: Parsing large DNS messages may cause excessive CPU load bind9: Querying RFC 1918 reverse zones may cause an assertion failure when “nxdomain-redirect” is enabled bind9: Enabling both DNS64 and serve-stale may cause an assertion failure during recursive resolution bind9: Specific recursive query patterns may lead to an out-of-memory condition bind9: KeyTrap - Extreme CPU consumption in DNSSEC validator bind9: Preparing an NSEC3 closest encloser proof can exhaust CPU resources
|
[
"cpe:/a:redhat:rhel_eus:9.0::appstream",
"cpe:/a:redhat:rhel_eus:9.0::crb"
] | null | 7.5 | null | null |
RHSA-2024:6011
|
Red Hat Security Advisory: OpenShift Container Platform 4.13.49 packages and security update
|
jinja2: accepts keys containing non-attribute characters
|
[
"cpe:/a:redhat:openshift:4.13::el8",
"cpe:/a:redhat:openshift:4.13::el9",
"cpe:/a:redhat:openshift_ironic:4.13::el9"
] | null | 5.4 | null | null |
RHSA-2024:0152
|
Red Hat Security Advisory: .NET 8.0 security update
|
dotnet: Information Disclosure: MD.SqlClient(MDS) & System.data.SQLClient (SDS) dotnet: X509 Certificates - Validation Bypass across Azure dotnet: .NET Denial of Service Vulnerability
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::crb"
] | null | 6.8 | null | null |
RHSA-2021:2323
|
Red Hat Security Advisory: 389-ds-base security and bug fix update
|
389-ds-base: information disclosure during the binding of a DN
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 5.3 | null | null |
RHSA-2019:1175
|
Red Hat Security Advisory: virt:rhel security update
|
hardware: Microarchitectural Store Buffer Data Sampling (MSBDS) hardware: Micro-architectural Load Port Data Sampling - Information Leak (MLPDS) hardware: Microarchitectural Fill Buffer Data Sampling (MFBDS) QEMU: device_tree: heap buffer overflow while loading device tree blob libssh2: Integer overflow in transport read resulting in out of bounds write libssh2: Integer overflow in keyboard interactive handling resulting in out of bounds write libssh2: Integer overflow in SSH packet processing channel resulting in out of bounds write libssh2: Integer overflow in user authenticate keyboard interactive allows out-of-bounds writes hardware: Microarchitectural Data Sampling Uncacheable Memory (MDSUM)
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | null | 3.8 | null |
RHSA-2019:1193
|
Red Hat Security Advisory: kernel security update
|
hardware: Microarchitectural Store Buffer Data Sampling (MSBDS) hardware: Micro-architectural Load Port Data Sampling - Information Leak (MLPDS) hardware: Microarchitectural Fill Buffer Data Sampling (MFBDS) hardware: Microarchitectural Data Sampling Uncacheable Memory (MDSUM)
|
[
"cpe:/o:redhat:rhel_aus:6.6::server"
] | null | null | 3.8 | null |
RHSA-2023:0692
|
Red Hat Security Advisory: OpenShift API for Data Protection (OADP) 1.0.7 security and bug fix update
|
golang: golang.org/x/text/language: ParseAcceptLanguage takes a long time to parse complex tags golang: net/http: excessive memory growth in a Go server accepting HTTP/2 requests
|
[
"cpe:/a:redhat:openshift_api_data_protection:1.0::el8"
] | null | 5.3 | null | null |
RHSA-2022:4795
|
Red Hat Security Advisory: rsyslog security update
|
rsyslog: Heap-based overflow in TCP syslog server
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 8.1 | null | null |
RHSA-2017:1871
|
Red Hat Security Advisory: tcpdump security, bug fix, and enhancement update
|
tcpdump: IPv6 mobility printer mobility_opt_print() typecastimg/signedness error tcpdump: tcp printer rpki_rtr_pdu_print() missing length check tcpdump: ethernet printer osi_print_cksum() missing sanity checks out-of-bounds read tcpdump: force printer vulnerability tcpdump: multiple overflow issues in protocol decoding tcpdump: multiple overflow issues in protocol decoding tcpdump: multiple overflow issues in protocol decoding tcpdump: multiple overflow issues in protocol decoding tcpdump: multiple overflow issues in protocol decoding tcpdump: multiple overflow issues in protocol decoding tcpdump: multiple overflow issues in protocol decoding tcpdump: multiple overflow issues in protocol decoding tcpdump: multiple overflow issues in protocol decoding tcpdump: multiple overflow issues in protocol decoding tcpdump: multiple overflow issues in protocol decoding tcpdump: multiple overflow issues in protocol decoding tcpdump: multiple overflow issues in protocol decoding tcpdump: multiple overflow issues in protocol decoding tcpdump: multiple overflow issues in protocol decoding tcpdump: multiple overflow issues in protocol decoding tcpdump: multiple overflow issues in protocol decoding tcpdump: multiple overflow issues in protocol decoding tcpdump: multiple overflow issues in protocol decoding tcpdump: multiple overflow issues in protocol decoding tcpdump: multiple overflow issues in protocol decoding tcpdump: multiple overflow issues in protocol decoding tcpdump: multiple overflow issues in protocol decoding tcpdump: multiple overflow issues in protocol decoding tcpdump: multiple overflow issues in protocol decoding tcpdump: multiple overflow issues in protocol decoding tcpdump: multiple overflow issues in protocol decoding tcpdump: multiple overflow issues in protocol decoding tcpdump: multiple overflow issues in protocol decoding tcpdump: multiple overflow issues in protocol decoding tcpdump: multiple overflow issues in protocol decoding tcpdump: multiple overflow issues in protocol decoding tcpdump: multiple overflow issues in protocol decoding tcpdump: multiple overflow issues in protocol decoding tcpdump: multiple overflow issues in protocol decoding tcpdump: multiple overflow issues in protocol decoding tcpdump: multiple overflow issues in protocol decoding tcpdump: multiple overflow issues in protocol decoding tcpdump: multiple overflow issues in protocol decoding tcpdump: multiple overflow issues in protocol decoding tcpdump: multiple overflow issues in protocol decoding
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 6.5 | null |
RHSA-2023:1888
|
Red Hat Security Advisory: Red Hat Advanced Cluster Management 2.7.3 security fixes and bug fixes
|
RHACM: unauthenticated SSRF in console API endpoint http-cache-semantics: Regular Expression Denial of Service (ReDoS) vulnerability vm2: sandbox escape vm2: Sandbox Escape vm2: Sandbox Escape when exception sanitization
|
[
"cpe:/a:redhat:acm:2.7::el8"
] | null | 9.8 | null | null |
RHSA-2023:5219
|
Red Hat Security Advisory: frr security and bug fix update
|
frr: Incorrect handling of a error in parsing of an invalid section of a BGP update can de-peer a router
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 7.5 | null | null |
RHSA-2014:2024
|
Red Hat Security Advisory: ntp security update
|
ntp: automatic generation of weak default key in config_auth() ntp: ntp-keygen uses weak random number generator and seed when generating MD5 keys ntp: Multiple buffer overflows via specially-crafted packets ntp: receive() missing return on error
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation",
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | null | null |
RHSA-2015:1123
|
Red Hat Security Advisory: cups security update
|
cups: cupsRasterReadPixels buffer overflow cups: incorrect string reference counting (VU#810572) cups: cross-site scripting flaw in CUPS web UI (VU#810572)
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation",
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | null | null |
RHSA-2021:2499
|
Red Hat Security Advisory: OpenShift Container Platform 4.6.36 security update
|
jetty: local temporary directory hijacking vulnerability jetty: buffer not correctly recycled in Gzip Request inflation jetty: request containing multiple Accept headers with a large number of "quality" parameters may lead to DoS
|
[
"cpe:/a:redhat:openshift:4.6::el7",
"cpe:/a:redhat:openshift:4.6::el8"
] | null | 5.3 | null | null |
RHSA-2020:5656
|
Red Hat Security Advisory: kernel security update
|
kernel: out of bounds write in function i2c_smbus_xfer_emulated in drivers/i2c/i2c-core-smbus.c kernel: race condition in smp_task_timedout() and smp_task_done() in drivers/scsi/libsas/sas_expander.c leads to use-after-free kernel: out of bounds write in i2c driver leads to local escalation of privilege kernel: Denial Of Service in the __ipmi_bmc_register() function in drivers/char/ipmi/ipmi_msghandler.c kernel: mounting a crafted ext4 filesystem image, performing some operations, and unmounting can lead to a use-after-free in ext4_put_super in fs/ext4/super.c kernel: out-of-bounds write via crafted keycode table kernel: sg_write function lacks an sg_remove_request call in a certain failure case
|
[
"cpe:/o:redhat:enterprise_linux:7::hypervisor",
"cpe:/o:redhat:rhel_eus:7.6::computenode",
"cpe:/o:redhat:rhel_eus:7.6::server"
] | null | 6.7 | 7.8 | null |
RHSA-2023:0470
|
Red Hat Security Advisory: Migration Toolkit for Runtimes security update
|
Apache-Commons-BCEL: arbitrary bytecode produced via out-of-bounds writing
|
[
"cpe:/a:redhat:migration_toolkit_runtimes:1.0::el8"
] | null | 8.1 | null | null |
RHSA-2024:3513
|
Red Hat Security Advisory: less security update
|
less: OS command injection
|
[
"cpe:/o:redhat:enterprise_linux:9::baseos"
] | null | 8.6 | null | null |
RHSA-2022:9098
|
Red Hat Security Advisory: OpenShift Container Platform 4.10.46 packages and security update
|
maven-shared-utils: Command injection via Commandline class
|
[
"cpe:/a:redhat:openshift:4.10::el7",
"cpe:/a:redhat:openshift:4.10::el8"
] | null | 9.8 | null | null |
RHBA-2023:6928
|
Red Hat Bug Fix Advisory: go-toolset:rhel8 bug fix and enhancement update
|
golang: html/template: improper handling of HTML-like comments within script contexts golang: html/template: improper handling of special tags within script contexts golang: crypto/tls: panic when processing post-handshake message on QUIC connections golang: crypto/tls: lack of a limit on buffered post-handshake golang: cmd/go: line directives allows arbitrary execution during build
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 8.1 | null | null |
RHSA-2024:2664
|
Red Hat Security Advisory: OpenShift Container Platform 4.15.12 security update
|
golang: net/http, x/net/http2: unlimited number of CONTINUATION frames causes DoS
|
[
"cpe:/a:redhat:openshift:4.15::el8",
"cpe:/a:redhat:openshift:4.15::el9"
] | null | 7.5 | null | null |
RHSA-2004:137
|
Red Hat Security Advisory: : Updated Ethereal packages fix security issues
|
security flaw security flaw security flaw security flaw
|
[
"cpe:/o:redhat:linux:9"
] | null | null | null | null |
RHSA-2020:0519
|
Red Hat Security Advisory: firefox security update
|
Mozilla: Missing bounds check on shared memory read in the parent process Mozilla: Incorrect parsing of template tag could result in JavaScript injection Mozilla: Memory safety bugs fixed in Firefox 73 and Firefox ESR 68.5
|
[
"cpe:/a:redhat:rhel_e4s:8.0::appstream"
] | null | 8.8 | 6.1 | null |
RHSA-2005:882
|
Red Hat Security Advisory: openssl, php, mod_ssl, mod_imap security update for Stronghold
|
security flaw security flaw security flaw security flaw openssl mitm downgrade attack httpd cross-site scripting flaw in mod_imap security flaw security flaw security flaw
|
[
"cpe:/a:redhat:stronghold:4"
] | null | null | null | null |
RHSA-2023:2179
|
Red Hat Security Advisory: libguestfs-winsupport security update
|
ntfs-3g: heap-based buffer overflow in ntfsck ntfs-3g: crafted NTFS image can cause heap exhaustion in ntfs_get_attribute_value ntfs-3g: crafted NTFS image can cause a heap-based buffer overflow in ntfs_names_full_collate ntfs-3g: crafted NTFS image can cause a heap-based buffer overflow in ntfs_mft_rec_alloc ntfs-3g: crafted NTFS image can cause a heap-based buffer overflow in ntfs_check_log_client_array
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 7.8 | null | null |
RHSA-2020:0934
|
Red Hat Security Advisory: OpenShift Container Platform 4.3.9 ose-openshift-controller-manager-container security update
|
proglottis/gpgme: Use-after-free in GPGME bindings during container image pull
|
[
"cpe:/a:redhat:openshift:4.3::el7"
] | null | 7.5 | null | null |
RHSA-2024:2950
|
Red Hat Security Advisory: kernel-rt security and bug fix update
|
kernel: OOB writes in parse_hid_report_descriptor in drivers/input/tablet/gtco.c kernel: out of bounds read in drivers/media/usb/dvb-usb/technisat-usb2.c kernel: use-after-free in read in vt_do_kdgkb_ioctl kernel: a race out-of-bound read in vt kernel: improper input validation may lead to privilege escalation kernel: Linux ebpf logic vulnerability leads to critical memory read and write gaining root privileges kernel: use-after-free in l1oip timer handlers kernel: local privileges escalation in kernel/bpf/verifier.c kernel: integer overflow in l2cap_config_req() in net/bluetooth/l2cap_core.c kernel: KVM: information leak in KVM_GET_DEBUGREGS ioctl on 32-bit systems kernel: use after free in vcs_read in drivers/tty/vt/vc_screen.c due to race kernel: cxgb4: use-after-free in ch_flower_stats_cb() kernel: Use-after-free in nft_verdict_dump due to a race between set GC and transaction kernel: NVMe: info leak due to out-of-bounds read in nvmet_ctrl_find_get kernel: local dos vulnerability in scatterwalk_copychunks kernel: null pointer dereference vulnerability in nft_dynset_init() kernel: Null Pointer Dereference vulnerability in ida_free in lib/idr.c kernel: use-after-free in IPv4 IGMP kernel: Bluetooth Forward and Future Secrecy Attacks and Defenses kernel: irdma: Improper access control Kernel: double free in hci_conn_cleanup of the bluetooth subsystem kernel: race condition between HCIUARTSETPROTO and HCIUARTGETPROTO in hci_uart_tty_ioctl kernel: usb: out-of-bounds read in read_descriptors kernel: fbcon: out-of-sync arrays in fbcon_mode_deleted due to wrong con2fb_map assignment kernel: netfilter: nftables out-of-bounds read in nf_osf_match_one() kernel: netfilter: xtables out-of-bounds read in u32_match_it() kernel: netfilter: xtables sctp out-of-bounds read in match_flags() kernel: xfrm: out-of-bounds read in __xfrm_state_filter_match() kernel: QXL: race condition leading to use-after-free in qxl_mode_dumb_create() kernel: ipv4: NULL pointer dereference in ipv4_send_dest_unreach() kernel: rsvp: out-of-bounds read in rsvp_classify() kernel: lib/kobject.c vulnerable to fill_kobj_path out-of-bounds write kernel: bluetooth: bt_sock_ioctl race condition leads to use-after-free in bt_sock_recvmsg kernel: use-after-free in net/atm/ioctl.c kernel: ICMPv6 “Packet Too Big” packets force a DoS of the Linux kernel by forcing 100% CPU kernel: smb: client: fix potential OOBs in smb2_parse_contexts() kernel: gfs2: Fix kernel NULL pointer dereference in gfs2_rgrp_dump kernel: mm/sparsemem: fix race in accessing memory_section->usage kernel: team: NULL pointer dereference when team device type is changed kernel: net/core: kernel crash in ETH_P_1588 flow dissector kernel: netfilter: nf_tables: memory leak when more than 255 elements expired kernel: KVM: s390: fix setting of fpc register kernel: netfilter: nf_tables: disallow timeout for anonymous sets kernel: hugetlbfs: Null pointer dereference in hugetlbfs_fill_super function hw: amd: Instruction raise #VC exception at exit hw: amd: Instruction raise #VC exception at exit kernel: sched/membarrier: reduce the ability to hammer on sys_membarrier kernel: netfilter: nf_tables: reject QUEUE/DROP verdict parameters kernel: blk-mq: fix IO hang from sbitmap wakeup race
|
[
"cpe:/a:redhat:enterprise_linux:8::nfv",
"cpe:/a:redhat:enterprise_linux:8::realtime"
] | null | 4.4 | 5.3 | null |
RHSA-2021:3522
|
Red Hat Security Advisory: kernel security and bug fix update
|
kernel: use-after-free in n_tty_receive_buf_common function in drivers/tty/n_tty.c kernel: Use after free via PI futex state kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c kernel: race condition for removal of the HCI controller
|
[
"cpe:/o:redhat:rhel_aus:7.7::server",
"cpe:/o:redhat:rhel_e4s:7.7::server",
"cpe:/o:redhat:rhel_tus:7.7::server"
] | null | 7 | null | null |
RHSA-2002:155
|
Red Hat Security Advisory: : Updated openssl packages fix remote vulnerabilities
|
security flaw security flaw
|
[
"cpe:/o:redhat:linux:6.2",
"cpe:/o:redhat:linux:7.0",
"cpe:/o:redhat:linux:7.1",
"cpe:/o:redhat:linux:7.2",
"cpe:/o:redhat:linux:7.3"
] | null | null | null | null |
RHSA-2024:0433
|
Red Hat Security Advisory: linux-firmware security update
|
amd: Return Address Predictor vulnerability leading to information disclosure
|
[
"cpe:/o:redhat:rhel_eus:9.0::baseos"
] | null | 5.6 | null | null |
RHSA-2020:3253
|
Red Hat Security Advisory: firefox security update
|
chromium-browser: Use after free in ANGLE chromium-browser: Inappropriate implementation in WebRTC Mozilla: Potential leak of redirect targets when loading scripts in a worker Mozilla: Memory safety bugs fixed in Firefox 79 and Firefox ESR 68.11
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 8.8 | 8.8 | null |
RHSA-2023:5376
|
Red Hat Security Advisory: Red Hat OpenShift Data Foundation 4.13.3 security and bug fix update
|
golang: html/template: improper handling of JavaScript whitespace word-wrap: ReDoS
|
[
"cpe:/a:redhat:openshift_data_foundation:4.13::el9"
] | null | 7.5 | null | null |
RHSA-2022:6078
|
Red Hat Security Advisory: Red Hat Ansible Automation Platform 2.1.3 security and bug fix update
|
Ansible: Logic flaw leads to privilage escalation
|
[
"cpe:/a:redhat:ansible_automation_platform:2.1::el8"
] | null | 7.2 | null | null |
RHSA-2016:1541
|
Red Hat Security Advisory: kernel-rt security and bug fix update
|
kernel: Permission bypass on overlayfs during copy_up kernel: Uninitialized variable in request_key handling causes kernel crash in error handling path
|
[
"cpe:/a:redhat:rhel_extras_rt:7"
] | null | null | 7.8 | null |
RHSA-2017:0170
|
Red Hat Security Advisory: JBoss Enterprise Application Platform 7.0.4 on RHEL 6
|
EAP: Sensitive data can be exposed at the server level in domain mode admin-cli: Potential EAP resource starvation DOS attack via GET requests for server log files
|
[
"cpe:/a:redhat:jboss_enterprise_application_platform:7::el6"
] | null | null | 4.3 | null |
RHSA-2013:0896
|
Red Hat Security Advisory: qemu-kvm security and bug fix update
|
qemu: guest agent creates files with insecure permissions in deamon mode
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2021:0620
|
Red Hat Security Advisory: stunnel security update
|
stunnel: client certificate not correctly verified when redirect and verifyChain options are used
|
[
"cpe:/o:redhat:rhel_eus:8.1::baseos"
] | null | 7.5 | null | null |
RHSA-2024:6437
|
Red Hat Security Advisory: Red Hat build of Quarkus 3.8.6 release and security update
|
undertow: LearningPushHandler can lead to remote memory DoS attacks io.vertx:vertx-grpc-client: io.vertx:vertx-grpc-server: Vertx gRPC server does not limit the maximum message size
|
[
"cpe:/a:redhat:quarkus:3.8::el8"
] | null | 5.3 | null | null |
RHSA-2019:0831
|
Red Hat Security Advisory: kernel-alt security and bug fix update
|
kernel: Integer overflow in the alarm_timer_nsleep function kernel: NULL pointer dereference in xfs_da_shrink_inode function kernel: use-after-free in ucma_leave_multicast in drivers/infiniband/core/ucma.c kernel: Unprivileged users able to inspect kernel stacks of arbitrary tasks kernel: TLB flush happens too late on mremap kernel: Type confusion in drivers/tty/n_tty.c allows for a denial of service kernel: userfaultfd bypasses tmpfs file permissions kernel: lack of check for mmap minimum address in expand_downwards in mm/mmap.c leads to NULL pointer dereferences exploit on non-SMAP platforms
|
[
"cpe:/o:redhat:enterprise_linux:7::server"
] | null | null | 5.5 | null |
RHSA-2022:5729
|
Red Hat Security Advisory: OpenShift Container Platform 4.10.25 security update
|
golang: cmd/go: misinterpretation of branch names can lead to incorrect access control golang: crypto/elliptic: IsOnCurve returns true for invalid field elements golang: encoding/pem: fix stack overflow in Decode golang: regexp: stack exhaustion via a deeply nested expression golang: crypto/elliptic: panic caused by oversized scalar golang: syscall: faccessat checks wrong group
|
[
"cpe:/a:redhat:openshift:4.10::el7",
"cpe:/a:redhat:openshift:4.10::el8"
] | null | 6.2 | null | null |
RHSA-2025:1885
|
Red Hat Security Advisory: Red Hat build of Quarkus 3.15.3.SP1 Security Update
|
io.quarkus:quarkus-rest: Quarkus REST Endpoint Request Parameter Leakage Due to Shared Instance io.quarkus:quarkus-resteasy: Memory Leak in Quarkus RESTEasy Classic When Client Requests Timeout io.netty:netty-handler: SslHandler doesn't correctly validate packets which can lead to native crash when using native SSLEngine
|
[
"cpe:/a:redhat:quarkus:3.15::el8"
] | null | 7.5 | null | null |
RHSA-2017:2810
|
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform security update
|
jasypt: Vulnerable to timing attack against the password hash comparison bouncycastle: Information disclosure in GCMBlockCipher keycloak: SAML request parser replaces special strings with system properties log4j: Socket receiver deserialization vulnerability hibernate-validator: Privilege escalation when running under the security manager log4j: deserialization of untrusted data in SocketServer
|
[
"cpe:/a:redhat:jboss_enterprise_application_platform:7"
] | null | 9.8 | 6.3 | null |
RHSA-2005:567
|
Red Hat Security Advisory: krb5 security update
|
security flaw security flaw security flaw security flaw
|
[
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2023:4417
|
Red Hat Security Advisory: cjose security update
|
cjose: AES GCM decryption uses the Tag length from the actual Authentication Tag provided in the JWE
|
[
"cpe:/a:redhat:rhel_eus:9.0::appstream"
] | null | 7.5 | null | null |
RHSA-2012:1505
|
Red Hat Security Advisory: rhev-hypervisor6 security, bug fix, and enhancement update
|
rhev: vds_installer is prone to MITM when downloading 2nd stage installer
|
[
"cpe:/o:redhat:enterprise_linux:6::hypervisor"
] | null | null | null | null |
RHSA-2009:1130
|
Red Hat Security Advisory: kdegraphics security update
|
kdegraphics: KSVG NULL-pointer dereference in the SVGList interface implementation (ACE) kdegraphics: KSVG Pointer use-after-free error in the SVG animation element (DoS, ACE)
|
[
"cpe:/a:redhat:rhel_productivity:5",
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation"
] | null | null | null | null |
RHSA-2013:1323
|
Red Hat Security Advisory: ccid security and bug fix update
|
CCID: Integer overflow, leading to array index error when processing crafted serial number of certain cards
|
[
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2014:1818
|
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 6.3.2 update
|
OpenJDK: XML parsing Denial of Service (JAXP, 8017298)
|
[
"cpe:/a:redhat:jboss_enterprise_application_platform:6::el6"
] | null | null | null | null |
RHSA-2022:0329
|
Red Hat Security Advisory: samba security update
|
samba: Out-of-bounds heap read/write vulnerability in VFS module vfs_fruit allows code execution
|
[
"cpe:/a:redhat:rhel_e4s:8.1::appstream",
"cpe:/o:redhat:rhel_e4s:8.1::baseos"
] | null | 9.9 | null | null |
RHSA-2021:2261
|
Red Hat Security Advisory: thunderbird security update
|
Mozilla: Thunderbird stored OpenPGP secret keys without master password protection Mozilla: Partial protection of inline OpenPGP message not indicated Mozilla: Memory safety bugs fixed in Firefox 89 and Firefox ESR 78.11
|
[
"cpe:/a:redhat:rhel_eus:8.2::appstream"
] | null | 8.8 | null | null |
RHSA-2019:2003
|
Red Hat Security Advisory: icedtea-web security update
|
icedtea-web: unsigned code injection in a signed JAR file icedtea-web: path traversal while processing <jar/> elements of JNLP files results in arbitrary file overwrite icedtea-web: directory traversal in the nested jar auto-extraction leading to arbitrary file overwrite
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 8.2 | null |
RHSA-2024:8846
|
Red Hat Security Advisory: container-tools:rhel8 security update
|
Podman: Buildah: cri-o: FIPS Crypto-Policy Directory Mounting Issue in containers/common Go Library Buildah: Podman: Improper Input Validation in bind-propagation Option of Dockerfile RUN --mount Instruction buildah: Buildah allows arbitrary directory mount
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 7.8 | null | null |
RHSA-2023:4500
|
Red Hat Security Advisory: thunderbird security update
|
thunderbird: File Extension Spoofing using the Text Direction Override Character Mozilla: Offscreen Canvas could have bypassed cross-origin restrictions Mozilla: Incorrect value used during WASM compilation Mozilla: Potential permissions request bypass via clickjacking Mozilla: Crash in DOMParser due to out-of-memory conditions Mozilla: Fix potential race conditions when releasing platform objects Mozilla: Stack buffer overflow in StorageManager Mozilla: Cookie jar overflow caused unexpected cookie jar state Mozilla: Memory safety bugs fixed in Firefox 116, Firefox ESR 115.1, Firefox ESR 102.14, Thunderbird 115.1, and Thunderbird 102.14 Mozilla: Memory safety bugs fixed in Firefox ESR 115.1, and Thunderbird 115.1
|
[
"cpe:/a:redhat:rhel_aus:8.4::appstream",
"cpe:/a:redhat:rhel_e4s:8.4::appstream",
"cpe:/a:redhat:rhel_tus:8.4::appstream"
] | null | 9.8 | null | null |
RHSA-2021:0258
|
Red Hat Security Advisory: cryptsetup security update
|
cryptsetup: Out-of-bounds write when validating segments
|
[
"cpe:/a:redhat:rhel_eus:8.2::appstream",
"cpe:/o:redhat:rhel_eus:8.2::baseos"
] | null | 7.8 | null | null |
RHSA-2022:8385
|
Red Hat Security Advisory: dhcp security and enhancement update
|
bind: DNS forwarders - cache poisoning vulnerability
|
[
"cpe:/o:redhat:enterprise_linux:9::baseos"
] | null | 6.8 | null | null |
RHSA-2017:0872
|
Red Hat Security Advisory: Red Hat Single Sign-On 7.1 update on RHEL 6
|
keycloak: user deletion via incorrect permissions check wildfly: ParseState headerValuesCache can be exploited to fill heap with garbage keycloak: timing attack in JWS signature verification
|
[
"cpe:/a:redhat:red_hat_single_sign_on:7::el6"
] | null | null | 3.7 | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.