id
stringlengths 13
15
| title
stringlengths 29
176
| description
stringlengths 8
32.1k
| cpes
listlengths 0
20
| cvss_v4_0
null | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
null |
---|---|---|---|---|---|---|---|
RHSA-2020:4155
|
Red Hat Security Advisory: thunderbird security update
|
Mozilla: Memory safety bugs fixed in Firefox 81 and Firefox ESR 78.3 Mozilla: XSS when pasting attacker-controlled data into a contenteditable element Mozilla: Download origin spoofing via redirect Mozilla: When recursing through layers while scrolling, an iterator may have become invalid, resulting in a potential use-after-free scenario
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 8.8 | 6.1 | null |
RHSA-2017:0184
|
Red Hat Security Advisory: mysql security update
|
mysql: race condition while setting stats during MyISAM table repair (CPU Oct 2016) mysql: general_log can write to configuration files, leading to privilege escalation (CPU Oct 2016) mysql: race condition while setting stats during MyISAM table repair (CPU Oct 2016)
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | 7 | null |
RHSA-2019:2276
|
Red Hat Security Advisory: mercurial security update
|
mercurial: Missing check for fragment start position in mpatch.c:mpatch_apply() mercurial: Buffer underflow in mpatch.c:mpatch_apply() mercurial: HTTP server permissions bypass
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 6.5 | null |
RHSA-2012:0744
|
Red Hat Security Advisory: python security update
|
python: potential XSS in SimpleHTTPServer's list_directory() python: distutils creates ~/.pypirc insecurely python: SimpleXMLRPCServer CPU usage DoS via malformed XML-RPC request python: hash table collisions CPU usage DoS (oCERT-2011-003)
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2023:0286
|
Red Hat Security Advisory: firefox security update
|
Mozilla: libusrsctp library out of date Mozilla: Fullscreen notification bypass Mozilla: Arbitrary file read from GTK drag and drop on Linux Mozilla: Malicious command could be hidden in devtools output Mozilla: URL being dragged from cross-origin iframe into same tab triggers navigation Mozilla: Content Security Policy wasn't being correctly applied to WebSockets in WebWorkers Mozilla: Calls to <code>console.log</code> allowed bypasing Content Security Policy via format directive Mozilla: Memory safety bugs fixed in Firefox 109 and Firefox ESR 102.7
|
[
"cpe:/a:redhat:rhel_eus:9.0::appstream"
] | null | 8.8 | null | null |
RHSA-2023:7783
|
Red Hat Security Advisory: postgresql security update
|
postgresql: Buffer overrun from integer overflow in array modification
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 8.8 | null | null |
RHSA-2020:5083
|
Red Hat Security Advisory: microcode_ctl security, bug fix, and enhancement update
|
hw: Information disclosure issue in Intel SGX via RAPL interface hw: Vector Register Leakage-Active hw: Fast forward store predictor
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 5.5 | null | null |
RHSA-2017:0195
|
Red Hat Security Advisory: ansible security update
|
Ansible: Compromised remote hosts can lead to running commands on the Ansible controller
|
[
"cpe:/a:redhat:openstack:10::el7"
] | null | null | 6.6 | null |
RHSA-2013:0821
|
Red Hat Security Advisory: thunderbird security update
|
Mozilla: Miscellaneous memory safety hazards (rv:17.0.6) (MFSA 2013-41) Mozilla: Privileged access for content level constructor (MFSA 2013-42) Mozilla: Use-after-free with video and onresize event (MFSA 2013-46) Mozilla: Uninitialized functions in DOMSVGZoomEvent (MFSA 2013-47) Mozilla: Memory corruption found using Address Sanitizer (MFSA 2013-48) Mozilla: Memory corruption found using Address Sanitizer (MFSA 2013-48) Mozilla: Memory corruption found using Address Sanitizer (MFSA 2013-48) Mozilla: Memory corruption found using Address Sanitizer (MFSA 2013-48) Mozilla: Memory corruption found using Address Sanitizer (MFSA 2013-48) Mozilla: Memory corruption found using Address Sanitizer (MFSA 2013-48)
|
[
"cpe:/a:redhat:rhel_productivity:5",
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2024:1055
|
Red Hat Security Advisory: kpatch-patch security update
|
kernel: GSM multiplexing race condition leads to privilege escalation
|
[
"cpe:/o:redhat:rhel_eus:9.2::baseos"
] | null | 7 | null | null |
RHSA-2020:2060
|
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.2.8 on RHEL 8 security update
|
jackson-mapper-asl: XML external entity similar to CVE-2016-3720 cxf: OpenId Connect token service does not properly validate the clientId cxf: reflected XSS in the services listing page Wildfly: EJBContext principal is not popped back after invoking another EJB using a different Security Domain SmallRye: SecuritySupport class is incorrectly public and contains a static method to access the current threads context class loader Soteria: security identity corruption across concurrent threads undertow: AJP File Read/Inclusion Vulnerability undertow: servletPath is normalized incorrectly leading to dangerous application mapping which could result in security bypass cryptacular: excessive memory allocation during a decode operation undertow: Memory exhaustion issue in HttpReadListener via "Expect: 100-continue" header undertow: invalid HTTP request with large chunk size
|
[
"cpe:/a:redhat:jboss_enterprise_application_platform:7.2::el8"
] | null | 6.5 | 8.1 | null |
RHSA-2007:0542
|
Red Hat Security Advisory: mcstrans security and bug fix update
|
mctransd DoS
|
[
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2019:2628
|
Red Hat Security Advisory: redis security update
|
redis: Heap buffer overflow in HyperLogLog triggered by malicious client
|
[
"cpe:/a:redhat:openstack:13::el7"
] | null | null | 7.2 | null |
RHSA-2024:4527
|
Red Hat Security Advisory: ghostscript security update
|
ghostscript: OPVP device arbitrary code execution via custom Driver library
|
[
"cpe:/a:redhat:rhel_eus:8.8::appstream",
"cpe:/a:redhat:rhel_eus:8.8::crb"
] | null | 8.8 | null | null |
RHSA-2021:4586
|
Red Hat Security Advisory: gcc-toolset-11-gcc security update
|
environment: Unicode's bidirectional (BiDi) override characters can cause trojan source attacks
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 8.5 | null | null |
RHSA-2009:0256
|
Red Hat Security Advisory: firefox security update
|
Firefox layout crashes with evidence of memory corruption Firefox javascript crashes with evidence of memory corruption Firefox XSS using a chrome XBL method and window.eval Firefox local file stealing with SessionStore Firefox Chrome privilege escalation via local .desktop files Firefox XMLHttpRequest allows reading HTTPOnly cookies Firefox directives to not cache pages ignored
|
[
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws",
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2024:9306
|
Red Hat Security Advisory: httpd security update
|
httpd: HTTP response splitting httpd: HTTP Response Splitting in multiple modules
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 4 | null | null |
RHSA-2016:0103
|
Red Hat Security Advisory: kernel security, bug fix, and enhancement update
|
virt: guest to host DoS by triggering an infinite loop in microcode via #DB exception kernel: Possible use-after-free vulnerability in keyring facility kernel: pipe buffer state corruption after unsuccessful atomic read from pipe
|
[
"cpe:/o:redhat:rhel_eus:7.1::computenode",
"cpe:/o:redhat:rhel_eus:7.1::server"
] | null | null | null | null |
RHSA-2024:8884
|
Red Hat Security Advisory: Red Hat Product OCP Tools 4.15 Openshift Jenkins security update
|
angus-mail: Enabling Secure Server Identity Checks for Safer SMTPS Communication spring-expression: Denial of service when processing a specially crafted Spring Expression Language expression jenkins: Exposure of multi-line secrets through error messages jenkins: Item creation restriction bypass vulnerability
|
[
"cpe:/a:redhat:ocp_tools:4.15::el8"
] | null | 5.3 | null | null |
RHSA-2022:0485
|
Red Hat Security Advisory: OpenShift Container Platform 4.8.31 security update
|
log4j-core: remote code execution via JDBC Appender
|
[
"cpe:/a:redhat:openshift:4.8::el8"
] | null | 6.6 | null | null |
RHSA-2021:3296
|
Red Hat Security Advisory: libX11 security update
|
libX11: missing request length checks
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 8.1 | null | null |
RHSA-2023:3827
|
Red Hat Security Advisory: libtiff security update
|
libtiff: heap-based buffer overflow in processCropSelections() in tools/tiffcrop.c
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb"
] | null | 5.5 | null | null |
RHSA-2020:5434
|
Red Hat Security Advisory: targetcli security update
|
targetcli: weak permissions for /etc/target and backup files
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 5.5 | null | null |
RHSA-2023:5148
|
Red Hat Security Advisory: Red Hat Integration Camel for Spring Boot 3.20.2 release and security update
|
spring-boot: Security Bypass With Wildcard Pattern Matching on Cloud Foundry snappy-java: Unchecked chunk length leads to DoS
|
[
"cpe:/a:redhat:camel_spring_boot:3.20"
] | null | 5.9 | null | null |
RHSA-2024:2236
|
Red Hat Security Advisory: libvirt security update
|
libvirt: NULL pointer dereference in udevConnectListAllInterfaces()
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::crb"
] | null | 5 | null | null |
RHSA-2013:0772
|
Red Hat Security Advisory: mysql security update
|
mysql: COM_BINLOG_DUMP crash on invalid data mysql: unspecified DoS related to Server Locking (CPU April 2013) mysql: unspecified vulnerability related to Server Locking (CPU April 2013) mysql: unspecified vulnerability related to Server Privileges (CPU April 2013) mysql: unspecified DoS related to Information Schema (CPU April 2013) mysql: unspecified DoS related to Data Manipulation Language (CPU April 2013) mysql: unspecified DoS related to Server Types (CPU April 2013) mysql: unspecified vulnerability related to Server (CPU April 2013) mysql: unspecified DoS related to Server Partition (CPU April 2013) mysql: unspecified vulnerability related to Server Privileges (CPU April 2013) mysql: unspecified vulnerability related to Information Schema (CPU April 2013) mysql: unspecified DoS related to InnoDB (CPU April 2013) mysql: unspecified vulnerability related to Server Install (CPU April 2013) mysql: unspecified DoS related to Server Optimizer (CPU April 2013) mysql: unspecified DoS related to Server Options (CPU July 2013)
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2021:0948
|
Red Hat Security Advisory: Red Hat Certificate System security and bug fix update
|
pki-core: stored Cross-site scripting (XSS) in the pki-tps web Activity tab pki-core: unsanitized token parameters in TPS resulting in stored XSS pki-core: Stored XSS in TPS profile creation
|
[
"cpe:/a:redhat:certificate_system_eus:9.4::el7"
] | null | 4.6 | null | null |
RHSA-2023:7539
|
Red Hat Security Advisory: kernel security, bug fix, and enhancement update
|
hw: Intel: Gather Data Sampling (GDS) side channel vulnerability kernel: use-after-free due to race condition occurring in dvb_register_device() kernel: use-after-free due to race condition occurring in dvb_net.c kernel: use-after-free due to race condition occurring in dvb_ca_en50221.c kernel: use-after-free in smb2_is_status_io_timeout() kernel: net/sched: cls_u32 component reference counter leak if tcf_change_indev() fails kernel: net/sched: Use-after-free vulnerabilities in the net/sched classifiers: cls_fw, cls_u32 and cls_route kernel: net/sched: Use-after-free vulnerabilities in the net/sched classifiers: cls_fw, cls_u32 and cls_route kernel: net/sched: Use-after-free vulnerabilities in the net/sched classifiers: cls_fw, cls_u32 and cls_route kernel: net/sched: Use-after-free vulnerabilities in the net/sched classifiers: cls_fw, cls_u32 and cls_route kernel: Race between task migrating pages and another task calling exit_mmap to release those same pages getting invalid opcode BUG in include/linux/swapops.h kernel: fbcon: out-of-sync arrays in fbcon_mode_deleted due to wrong con2fb_map assignment kernel: netfilter: potential slab-out-of-bound access due to integer underflow kernel: mm/slab_common: slab_caches list corruption after kmem_cache_destroy()
|
[
"cpe:/a:redhat:rhel_eus:8.8::crb",
"cpe:/o:redhat:rhel_eus:8.8::baseos"
] | null | 5.5 | null | null |
RHSA-2020:4111
|
Red Hat Security Advisory: qemu-kvm-rhev security update
|
QEMU: usb: out-of-bounds r/w access issue while processing usb packets
|
[
"cpe:/a:redhat:rhev_manager:4.3",
"cpe:/o:redhat:enterprise_linux:7::hypervisor"
] | null | 5 | null | null |
RHSA-2020:5529
|
Red Hat Security Advisory: Red Hat Single Sign-On 7.4.4 on OpenJDK for OpenShift image security update
|
containers/redhat-sso-7: /etc/passwd is given incorrect privileges
|
[
"cpe:/a:redhat:rhosemc:1.0::el8"
] | null | 7 | null | null |
RHSA-2024:8725
|
Red Hat Security Advisory: firefox security update
|
firefox: thunderbird: Permission leak via embed or object elements firefox: thunderbird: Use-after-free in layout with accessibility firefox: thunderbird: Confusing display of origin for external protocol handler prompt firefox: thunderbird: XSS due to Content-Disposition being ignored in multipart/x-mixed-replace response firefox: thunderbird: Origin of permission prompt could be spoofed by long URL firefox: thunderbird: Cross origin video frame leak firefox: thunderbird: History interface could have been used to cause a Denial of Service condition in the browser firefox: thunderbird: Clipboard "paste" button persisted across tabs firefox: DOM push subscription message could hang Firefox firefox: thunderbird: Memory safety bugs fixed in Firefox 132, Thunderbird 132, Firefox ESR 128.4, and Thunderbird 128.4
|
[
"cpe:/a:redhat:rhel_aus:8.6::appstream",
"cpe:/a:redhat:rhel_e4s:8.6::appstream",
"cpe:/a:redhat:rhel_tus:8.6::appstream"
] | null | 8.8 | null | null |
RHBA-2003:308
|
Red Hat Bug Fix Advisory: Updated kernel resolves 32-bit address space issue on AMD64
|
security flaw
|
[
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::ws"
] | null | null | null | null |
RHSA-2023:3888
|
Red Hat Security Advisory: Red Hat Single Sign-On 7.6.4 for OpenShift image security enhancement update
|
RHSSO: XSS due to lax URI scheme validation Undertow: Infinite loop in SslConduit during close keycloak: Untrusted Certificate Validation keycloak: oauth client impersonation keycloak: client access via device auth request spoof
|
[
"cpe:/a:redhat:rhosemc:1.0::el8"
] | null | 3.5 | null | null |
RHSA-2019:0984
|
Red Hat Security Advisory: python36:3.6 security update
|
python-sqlalchemy: SQL Injection when the order_by parameter can be controlled python-sqlalchemy: SQL Injection when the group_by parameter can be controlled
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | null | 7.3 | null |
RHSA-2007:0095
|
Red Hat Security Advisory: krb5 security update
|
Unauthorized access via krb5-telnet daemon krb5_klog_syslog() stack buffer overflow krb5 double free flaw
|
[
"cpe:/o:redhat:enterprise_linux:2.1::as",
"cpe:/o:redhat:enterprise_linux:2.1::aw",
"cpe:/o:redhat:enterprise_linux:2.1::es",
"cpe:/o:redhat:enterprise_linux:2.1::ws",
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws",
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws",
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2015:1927
|
Red Hat Security Advisory: java-1.7.0-oracle security update
|
OpenJDK: kerberos realm name leak (JGSS, 8048030) OpenJDK: inefficient use of hash tables and lists during XML parsing (JAXP, 8068842) OpenJDK: missing checks for proper initialization in ObjectStreamClass (Serialization, 8103671) OpenJDK: HttpURLConnection header restriction bypass (Libraries, 8130193) JDK: unspecified vulnerability fixed in 7u91 and 8u65 (Deployment) OpenJDK: insufficient permission checks in StubGenerator (CORBA, 8076383) OpenJDK: OOB access in CMS code (2D, 8086092) OpenJDK: leak of user.dir location (JAXP, 8078427) OpenJDK: java.nio Buffers integer overflow issues (Libraries, 8130891) ICU: missing boundary checks in layout engine (OpenJDK 2D, 8132042) OpenJDK: incorrect access control context used in DGCImpl (RMI, 8080688) OpenJDK: protected methods can be used as interface methods via DirectMethodHandle (Libraries) OpenJDK: incomplete constraints enforcement by AlgorithmChecker (Security, 8131291) OpenJDK: missing type checks in IIOPInputStream (CORBA, 8076392) OpenJDK: incorrect String object deserialization in IIOPInputStream (CORBA, 8076387) OpenJDK: incorrect access control context used in DGCClient (RMI, 8076413) OpenJDK: incomplete MaxXMLNameLimit enforcement (JAXP, 8086733) JDK: unspecified vulnerability fixed in 6u105, 7u91 and 8u65 (Deployment) OpenJDK: insufficient proxy class checks in RemoteObjectInvocationHandler (RMI, 8076339) OpenJDK: incomplete supportDTD enforcement (JAXP, 8130078)
|
[
"cpe:/a:redhat:rhel_extras_oracle_java:5",
"cpe:/a:redhat:rhel_extras_oracle_java:6",
"cpe:/a:redhat:rhel_extras_oracle_java:7"
] | null | null | null | null |
RHSA-2024:1570
|
Red Hat Security Advisory: ACS 4.4 enhancement and security update
|
helm: shows secrets with --dry-run option in clear text graphql: Insufficient checks in the OverlappingFieldsCanBeMergedRule.ts file when parsing large queries golang: net/http: insufficient sanitization of Host header go-git: Maliciously crafted Git server replies can cause DoS on go-git clients helm: Missing YAML Content Leads To Panic jose-go: improper handling of highly compressed data
|
[
"cpe:/a:redhat:advanced_cluster_security:4.4::el8"
] | null | 4.3 | null | null |
RHSA-2008:0505
|
Red Hat Security Advisory: Red Hat Application Stack v2.1 security and enhancement update
|
php crash in glob() and fnmatch() functions php htmlentities/htmlspecialchars multibyte sequences php session ID leakage php: buffer overflow in a CGI path translation PHP multibyte shell escape flaw mysql: privilege escalation via DATA/INDEX DIRECTORY directives PHP 32 bit weak random seed PHP weak 64 bit random seed
|
[
"cpe:/a:redhat:rhel_application_stack:2"
] | null | null | null | null |
RHSA-2024:4884
|
Red Hat Security Advisory: Red Hat Build of Apache Camel 4.4.1 for Spring Boot security update.
|
mvel: TimeOut error when calling ParseTools.subCompileExpression() function io.vertx/vertx-core: memory leak due to the use of Netty FastThreadLocal data structures in Vertx io.vertx:vertx-core: memory leak when a TCP server is configured with TLS and SNI support pgjdbc: PostgreSQL JDBC Driver allows attacker to inject SQL if using PreferQueryMode=SIMPLE undertow: Out-of-memory Error after several closed connections with wildfly-http-client protocol undertow: response write hangs in case of Java 17 TLSv1.3 NewSessionTicket undertow: url-encoded request path information can be broken on ajp-listener jetty: stop accepting new connections from valid clients threetenbp: null pointer exception org.bouncycastle: Importing an EC certificate with crafted F2m parameters may lead to Denial of Service bc-java: BouncyCastle vulnerable to a timing variant of Bleichenbacher (Marvin Attack) org.bouncycastle:bcprov-jdk18on: Infinite loop in ED25519 verification in the ScalarUtil class
|
[
"cpe:/a:redhat:apache_camel_spring_boot:4.4.1"
] | null | 7.5 | null | null |
RHSA-2023:1408
|
Red Hat Security Advisory: OpenShift Container Platform 4.12.9 packages and security update
|
capnproto: out of bounds read when handling a list of lists.
|
[
"cpe:/a:redhat:openshift:4.12::el8",
"cpe:/a:redhat:openshift:4.12::el9"
] | null | 5.4 | null | null |
RHSA-2012:1327
|
Red Hat Security Advisory: freeradius2 security update
|
freeradius: stack-based buffer overflow via long expiration date fields in client X509 certificates
|
[
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2016:0638
|
Red Hat Security Advisory: chromium-browser security update
|
chromium-browser: out-of-bounds read in Pdfium JPEG2000 decoding chromium-browser: universal XSS in extension bindings chromium-browser: out-of-bounds write in V8 chromium-browser: uninitialized memory read in media chromium-browser: use-after-free related to extensions chromium-browser: android downloaded file path restriction bypass chromium-browser: address bar spoofing chromium-browser: potential leak of sensitive information to malicious extensions chromium-browser: various fixes from internal audits
|
[
"cpe:/a:redhat:rhel_extras:6"
] | null | null | null | null |
RHSA-2023:5049
|
Red Hat Security Advisory: httpd:2.4 security update
|
httpd: mod_proxy_uwsgi HTTP response splitting
|
[
"cpe:/a:redhat:rhel_eus:8.6::appstream"
] | null | 7.5 | null | null |
RHBA-2020:4346
|
Red Hat Bug Fix Advisory: Satellite 6.7.5 Async Bug Fix Update
|
Satellite: Local user impersonation by Single sign-on (SSO) user leads to account takeover
|
[
"cpe:/a:redhat:satellite:6.7::el7",
"cpe:/a:redhat:satellite_capsule:6.7::el7"
] | null | 7.5 | null | null |
RHSA-2023:6242
|
Red Hat Security Advisory: .NET 6.0 security update
|
dotnet: Denial of Service with Client Certificates using .NET Kestrel
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::crb"
] | null | 6.5 | null | null |
RHSA-2023:2236
|
Red Hat Security Advisory: toolbox security and bug fix update
|
golang: net/http: handle server errors after sending GOAWAY golang: math/big: decoding big.Float and big.Rat types can panic if the encoded message is too short, potentially allowing a denial of service golang: net/http: excessive memory growth in a Go server accepting HTTP/2 requests
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 5.3 | null | null |
RHSA-2024:1516
|
Red Hat Security Advisory: Red Hat OpenStack Platform 16.1.9 (python-twisted) security update
|
python-twisted: disordered HTTP pipeline response in twisted.web
|
[
"cpe:/a:redhat:openstack:16.1::el8"
] | null | 5.3 | null | null |
RHSA-2020:3084
|
Red Hat Security Advisory: rh-nodejs10-nodejs security update
|
nodejs-minimist: prototype pollution allows adding or modifying properties of Object.prototype using a constructor or __proto__ payload nodejs: memory corruption in napi_get_value_string_* functions ICU: Integer overflow in UnicodeString::doAppend() nghttp2: overly large SETTINGS frames can lead to DoS
|
[
"cpe:/a:redhat:rhel_software_collections:3::el7"
] | null | 7.5 | null | null |
RHSA-2024:3838
|
Red Hat Security Advisory: ruby security update
|
ruby/cgi-gem: HTTP response splitting in CGI ruby: ReDoS vulnerability in URI ruby: ReDoS vulnerability in Time ruby: Buffer overread vulnerability in StringIO ruby: RCE vulnerability with .rdoc_options in RDoc ruby: Arbitrary memory address read vulnerability with Regex search
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::crb"
] | null | 6.6 | null | null |
RHSA-2024:1248
|
Red Hat Security Advisory: kernel security update
|
kernel: Use-after-free in nft_verdict_dump due to a race between set GC and transaction kernel: A heap out-of-bounds write when function perf_read_group is called and sibling_list is smaller than its child's sibling_list kernel: NULL pointer dereference in nvmet_tcp_build_iovec kernel: NULL pointer dereference in nvmet_tcp_execute_request kernel: NULL pointer dereference in __nvmet_req_complete kernel: Out-Of-Bounds Read vulnerability in smbCalcSize kernel: OOB Access in smb2_dump_detail kernel: inactive elements in nft_pipapo_walk kernel: use-after-free in amdgpu_cs_wait_all_fences in drivers/gpu/drm/amd/amdgpu/amdgpu_cs.c kernel: netfilter: use-after-free in nft_trans_gc_catchall_sync leads to privilege escalation kernel: ktls overwrites readonly memory pages when using function splice with a ktls socket as destination
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::crb",
"cpe:/a:redhat:enterprise_linux:9::nfv",
"cpe:/a:redhat:enterprise_linux:9::realtime",
"cpe:/o:redhat:enterprise_linux:9::baseos"
] | null | 7 | null | null |
RHSA-2024:0485
|
Red Hat Security Advisory: OpenShift Container Platform 4.12.48 bug fix and security update
|
golang: net/url: JoinPath does not strip relative path components in all circumstances golang.org/x/net/http2: avoid quadratic complexity in HPACK decoding golang.org/x/net/html: Cross site scripting openshift: incomplete fix for Rapid Reset (CVE-2023-44487/CVE-2023-39325) golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487)
|
[
"cpe:/a:redhat:openshift:4.12::el8"
] | null | 7.5 | null | null |
RHSA-2020:0592
|
Red Hat Security Advisory: kernel security, bug fix, and enhancement update
|
kernel: use-after-free in fs/xfs/xfs_super.c kernel: insufficient input validation in kernel mode driver in Intel i915 graphics leads to privilege escalation kernel: heap-based buffer overflow in mwifiex_process_country_ie() function in drivers/net/wireless/marvell/mwifiex/sta_ioctl.c kernel: buffer overflow in cfg80211_mgd_wext_giwessid in net/wireless/wext-sme.c
|
[
"cpe:/o:redhat:rhel_aus:7.4::server",
"cpe:/o:redhat:rhel_e4s:7.4::server",
"cpe:/o:redhat:rhel_tus:7.4::server"
] | null | 8 | 8 | null |
RHSA-2013:0944
|
Red Hat Security Advisory: python-keystoneclient security and bug fix update
|
Keystone: Missing expiration check in Keystone PKI token validation
|
[
"cpe:/a:redhat:openstack:3::el6"
] | null | null | null | null |
RHSA-2023:5093
|
Red Hat Security Advisory: kpatch-patch security update
|
kernel: UAF in nftables when nft_set_lookup_global triggered after handling named and anonymous sets in batch requests kernel: netfilter: nf_tables: fix chain binding transaction logic in the abort path of NFT_MSG_NEWRULE kernel: net/sched: cls_fw component can be exploited as result of failure in tcf_change_indev function kernel: netfilter: use-after-free due to improper element removal in nft_pipapo_remove() kernel: netfilter: nf_tables_newrule when adding a rule with NFTA_RULE_CHAIN_ID leads to use-after-free kernel: nf_tables: use-after-free in nft_chain_lookup_byid() kernel: nf_tables: stack-out-of-bounds-read in nft_byteorder_eval()
|
[
"cpe:/o:redhat:enterprise_linux:9::baseos"
] | null | 7.8 | null | null |
RHSA-2024:0325
|
Red Hat Security Advisory: Updated RHEL-7-based Middleware container images
|
SnakeYaml: Constructor Deserialization Remote Code Execution
|
[
"cpe:/a:redhat:rhosemc:1.0::el7"
] | null | 9.8 | null | null |
RHSA-2021:3499
|
Red Hat Security Advisory: thunderbird security update
|
Mozilla: Memory safety bugs fixed in Firefox 92, Firefox ESR 78.14 and Firefox ESR 91.1
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 8.8 | null | null |
RHSA-2019:0373
|
Red Hat Security Advisory: firefox security update
|
mozilla: Use after free in Skia mozilla: Integer overflow in Skia
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | 6.5 | null |
RHBA-2019:1076
|
Red Hat Bug Fix Advisory: ovirt-engine-api-explorer bug fix and enhancement update for RHV 4.3
|
bootstrap: XSS in the data-target attribute bootstrap: XSS in the tooltip data-viewport attribute bootstrap: XSS in the affix configuration target property
|
[
"cpe:/a:redhat:rhev_manager:4.3"
] | null | null | 6.1 | null |
RHSA-2023:7200
|
Red Hat Security Advisory: OpenShift Container Platform 4.15.z security update
|
golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487) golang: net/http/internal: Denial of Service (DoS) via Resource Consumption via HTTP requests golang: crypto/tls: Timing Side Channel attack in RSA based TLS key exchanges.
|
[
"cpe:/a:redhat:openshift:4.15::el9"
] | null | 7.5 | null | null |
RHSA-2021:3971
|
Red Hat Security Advisory: Red Hat OpenStack Platform 10.0 (redis) security update
|
redis: Lua scripts can overflow the heap-based Lua stack redis: Integer overflow issue with Streams redis: Integer overflow bug in the ziplist data structure redis: Denial of service via Redis Standard Protocol (RESP) request redis: Integer overflow issue with intsets redis: Integer overflow issue with strings
|
[
"cpe:/a:redhat:openstack:10::el7"
] | null | 7.5 | null | null |
RHSA-2023:2077
|
Red Hat Security Advisory: libwebp security update
|
Mozilla: libwebp: Double-free in libwebp
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 7.5 | null | null |
RHSA-2024:0582
|
Red Hat Security Advisory: rpm security update
|
rpm: TOCTOU race in checks for unsafe symlinks rpm: races with chown/chmod/capabilities calls during installation rpm: checks for unsafe symlinks are not performed for intermediary directories
|
[
"cpe:/a:redhat:rhel_eus:8.8::appstream",
"cpe:/o:redhat:rhel_eus:8.8::baseos"
] | null | 6.5 | null | null |
RHSA-2014:0415
|
Red Hat Security Advisory: libyaml security update
|
libyaml: heap-based buffer overflow when parsing YAML tags libyaml: heap-based buffer overflow when parsing URLs
|
[
"cpe:/a:redhat:rhel_common:6::el6"
] | null | null | null | null |
RHSA-2021:3955
|
Red Hat Security Advisory: redhat-ds:11 security, bug fix, and enhancement update
|
389-ds-base: sync_repl NULL pointer dereference in sync_create_state_control() 389-ds-base: CRYPT password hash with asterisk allows any bind attempt to succeed
|
[
"cpe:/a:redhat:directory_server:11.4::el8"
] | null | 6.5 | null | null |
RHSA-2011:0918
|
Red Hat Security Advisory: curl security update
|
curl: Improper delegation of client credentials during GSS negotiation
|
[
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws",
"cpe:/o:redhat:enterprise_linux:5::server",
"cpe:/o:redhat:enterprise_linux:6::server"
] | null | null | null | null |
RHSA-2022:1108
|
Red Hat Security Advisory: Red Hat Process Automation Manager 7.12.1 security update
|
netty: Information disclosure via the local system temporary directory springframework: malicious input leads to insertion of additional log entries apache-commons-io: Limited path traversal in Apache Commons IO 2.2 to 2.6 jdom: XXE allows attackers to cause a DoS via a crafted HTTP request logback: remote code execution through JNDI call from within its configuration file
|
[
"cpe:/a:redhat:jboss_enterprise_bpms_platform:7.12"
] | null | 6.6 | null | null |
RHSA-2024:9627
|
Red Hat Security Advisory: Red Hat OpenShift Service Mesh Containers for 2.6.3
|
http-proxy-middleware: Denial of Service
|
[
"cpe:/a:redhat:service_mesh:2.6::el8",
"cpe:/a:redhat:service_mesh:2.6::el9"
] | null | 7.5 | null | null |
RHSA-2024:3545
|
Red Hat Security Advisory: nodejs security update
|
nodejs: HTTP Request Smuggling via Content Length Obfuscation nodejs: CONTINUATION frames DoS
|
[
"cpe:/a:redhat:rhel_eus:9.0::appstream"
] | null | 7.5 | null | null |
RHSA-2021:0526
|
Red Hat Security Advisory: kernel security and bug fix update
|
kernel: umask not applied on filesystem without ACL support kernel: TOCTOU mismatch in the NFS client code
|
[
"cpe:/o:redhat:rhel_eus:7.7::computenode",
"cpe:/o:redhat:rhel_eus:7.7::server"
] | null | 7 | null | null |
RHSA-2012:0149
|
Red Hat Security Advisory: kvm security and bug fix update
|
kernel: kvm: device assignment DoS
|
[
"cpe:/a:redhat:rhel_virtualization:5::client",
"cpe:/a:redhat:rhel_virtualization:5::server"
] | null | null | null | null |
RHSA-2013:0648
|
Red Hat Security Advisory: jbossweb security update
|
Tomcat/JBoss Web - Bypass of CSRF prevention filter tomcat: three DIGEST authentication implementation issues tomcat: three DIGEST authentication implementation issues tomcat: three DIGEST authentication implementation issues
|
[
"cpe:/a:redhat:jboss_enterprise_application_platform:6.0.1"
] | null | null | null | null |
RHSA-2018:1722
|
Red Hat Security Advisory: java-1.8.0-ibm security update
|
JDK: unspecified vulnerability fixed in 6u191, 7u171, and 8u161 (Security) OpenJDK: incorrect merging of sections in the JAR manifest (Security, 8189969) OpenJDK: unrestricted deserialization of data from JCEKS key stores (Security, 8189997) OpenJDK: insufficient consistency checks in deserialization of multiple classes (Security, 8189977) OpenJDK: unbounded memory allocation during deserialization in PriorityBlockingQueue (Concurrency, 8189981) OpenJDK: unbounded memory allocation during deserialization in TabularDataSupport (JMX, 8189985) OpenJDK: unbounded memory allocation during deserialization in Container (AWT, 8189989) OpenJDK: unbounded memory allocation during deserialization in NamedNodeMapImpl (JAXP, 8189993) OpenJDK: RMI HTTP transport enabled by default (RMI, 8193833)
|
[
"cpe:/a:redhat:rhel_extras:6"
] | null | null | 4.2 | null |
RHSA-2023:7276
|
Red Hat Security Advisory: open-vm-tools security update
|
open-vm-tools: SAML token signature bypass open-vm-tools: file descriptor hijack vulnerability in the vmware-user-suid-wrapper
|
[
"cpe:/a:redhat:rhel_eus:9.2::appstream"
] | null | 7.4 | null | null |
RHSA-2023:5591
|
Red Hat Security Advisory: linux-firmware security update
|
hw: amd: Cross-Process Information Leak
|
[
"cpe:/o:redhat:rhel_aus:8.2::baseos",
"cpe:/o:redhat:rhel_e4s:8.2::baseos",
"cpe:/o:redhat:rhel_tus:8.2::baseos"
] | null | 6.5 | null | null |
RHSA-2010:0756
|
Red Hat Security Advisory: Red Hat Enterprise MRG Messaging security and bug fix update 1.2.2
|
MRG: SSL connections to MRG broker can be blocked MRG: remote authenticated DoS in broker
|
[
"cpe:/a:redhat:enterprise_mrg:1::el5"
] | null | null | null | null |
RHSA-2023:6271
|
Red Hat Security Advisory: OpenShift Container Platform 4.11.53 security and extras update
|
golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487)
|
[
"cpe:/a:redhat:openshift:4.11::el8"
] | null | 7.5 | null | null |
RHSA-2015:1009
|
Red Hat Security Advisory: Red Hat JBoss Portal 6.2.0 update
|
CXF: SSL hostname verification bypass, incomplete CVE-2012-5783 fix bouncycastle: TLS CBC padding timing attack WS: EJB3 role restrictions are not applied to jaxws handlers tomcat: multiple content-length header poisoning flaws JSF: XSS due to insufficient escaping of user-supplied content in outputText tags and EL expressions XStream: remote code execution due to insecure XML deserialization PicketBox/JBossSX: Unauthorized access to and modification of application server configuration and state by application jboss-as-server: Unchecked access to MSC Service Registry under JSM CXF: The SecurityTokenService accepts certain invalid SAML Tokens as valid CXF: UsernameTokens are sent in plaintext with a Symmetric EncryptBeforeSigning policy apache-commons-fileupload: denial of service due to too-small buffer size used by MultipartStream EAP6: Plain text password logging during security audit JBossSX/PicketBox: World readable audit.log file Tomcat/JBossWeb: Limited DoS in chunked transfer encoding input filter RichFaces: remote denial of service via memory exhaustion 6: JSM policy not respected by deployed applications Tomcat/JBossWeb: XXE vulnerability via user supplied XSLTs Tomcat/JBossWeb: Request smuggling via malicious content length header Xalan-Java: insufficient constraints in secure processing feature CXF: HTML content posted to SOAP endpoint could cause OOM errors CXF: Large invalid content could cause temporary space to fill Tomcat/JBossWeb: XML parser hijack by malicious web application netty: DoS via memory exhaustion during data aggregation Tomcat/JBossWeb: request smuggling and limited DoS in ChunkedInputFilter WSRP: Information disclosure via unsafe concurrency handling in interceptor Security: Invalid EJB caller role check implementation JAX-RS: Information disclosure via XML eXternal Entity (XXE) RESTEasy: XXE via parameter entities apache-poi: XML eXternal Entity (XXE) flaw PicketLink: XXE via insecure DocumentBuilderFactory usage apache-poi: entity expansion (billion laughs) flaw CXF: SSL hostname verification bypass, incomplete CVE-2012-6153 fix CLI: Insecure default permissions on history file cas-client: Bypass of security constraints via URL parameter injection RESTeasy: External entities expanded by DocumentProvider wss4j: Apache WSS4J is vulnerable to Bleichenbacher's attack (incomplete fix for CVE-2011-2487) wss4j: Apache WSS4J doesn't correctly enforce the requireSignedEncryptedDataElements property
|
[
"cpe:/a:redhat:jboss_enterprise_portal_platform:6.2"
] | null | null | 4.8 | null |
RHSA-2023:7197
|
Red Hat Security Advisory: OpenShift Container Platform 4.15.0 security and extras update
|
golang.org/x/net/html: Cross site scripting opentelemetry: DoS vulnerability in otelhttp opentelemetry-go-contrib: DoS vulnerability in otelgrpc due to unbound cardinality metrics ssh: Prefix truncation attack on Binary Packet Protocol (BPP) go-git: Maliciously crafted Git server replies can lead to path traversal and RCE on go-git clients
|
[
"cpe:/a:redhat:openshift:4.15::el8",
"cpe:/a:redhat:openshift:4.15::el9"
] | null | 8.1 | null | null |
RHSA-2024:6887
|
Red Hat Security Advisory: Red Hat build of Keycloak 22.0.13 Images Update
|
keycloak-saml-core: Improper Verification of SAML Responses Leading to Privilege Escalation in Keycloak Keycloak: Vulnerable Redirect URI Validation Results in Open Redirec
|
[
"cpe:/a:redhat:build_keycloak:22::el9"
] | null | 6.1 | null | null |
RHSA-2012:1149
|
Red Hat Security Advisory: sudo security and bug fix update
|
sudo: insecure temporary file use in RPM %postun script
|
[
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2024:8461
|
Red Hat Security Advisory: krb5 security update
|
freeradius: forgery attack
|
[
"cpe:/a:redhat:rhel_eus:9.2::appstream",
"cpe:/o:redhat:rhel_eus:9.2::baseos"
] | null | 9 | null | null |
RHSA-2014:0627
|
Red Hat Security Advisory: openssl security update
|
openssl: SSL/TLS MITM vulnerability
|
[
"cpe:/o:redhat:rhel_els:4::as",
"cpe:/o:redhat:rhel_els:4::es",
"cpe:/o:redhat:rhel_eus:5.9",
"cpe:/o:redhat:rhel_eus:6.3::computenode",
"cpe:/o:redhat:rhel_eus:6.3::server",
"cpe:/o:redhat:rhel_eus:6.4::computenode",
"cpe:/o:redhat:rhel_eus:6.4::server",
"cpe:/o:redhat:rhel_mission_critical:5.6",
"cpe:/o:redhat:rhel_mission_critical:6.2::server"
] | null | null | null | null |
RHSA-2022:9081
|
Red Hat Security Advisory: thunderbird security update
|
Mozilla: Quoting from an HTML email with certain tags will trigger network requests and load remote content, regardless of a configuration to block remote content Mozilla: Arbitrary file read from a compromised content process Mozilla: Drag and Dropped Filenames could have been truncated to malicious extensions Mozilla: Memory safety bugs fixed in Firefox ESR 102.6 and Thunderbird 102.6 Mozilla: Use-after-free in WebGL Mozilla: Memory corruption in WebGL Mozilla: Use-after-free in WebGL
|
[
"cpe:/a:redhat:rhel_eus:9.0::appstream"
] | null | 8.1 | null | null |
RHSA-2020:4007
|
Red Hat Security Advisory: systemd security and bug fix update
|
systemd: memory leak in button_open() in login/logind-button.c when udev events are received
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 2.4 | null | null |
RHSA-2024:6632
|
Red Hat Security Advisory: OpenShift Container Platform 4.16.12 security update
|
opentelemetry-go-contrib: DoS vulnerability in otelgrpc due to unbound cardinality metrics
|
[
"cpe:/a:redhat:openshift:4.16::el9"
] | null | 7.5 | null | null |
RHSA-2023:4172
|
Red Hat Security Advisory: java-1.8.0-openjdk security update
|
OpenJDK: array indexing integer overflow issue (8304468) OpenJDK: improper handling of slash characters in URI-to-path conversion (8305312)
|
[
"cpe:/a:redhat:rhel_aus:8.4::appstream",
"cpe:/a:redhat:rhel_e4s:8.4::appstream",
"cpe:/a:redhat:rhel_tus:8.4::appstream"
] | null | 3.7 | null | null |
RHSA-2017:0515
|
Red Hat Security Advisory: ansible and ceph-ansible security, bug fix, and enhancement update
|
Ansible: Compromised remote hosts can lead to running commands on the Ansible controller
|
[
"cpe:/a:redhat:rhscon:2::el7"
] | null | null | 6.6 | null |
RHSA-2023:1192
|
Red Hat Security Advisory: kpatch-patch security update
|
kernel: memory corruption in AX88179_178A based USB ethernet device. kernel: mm/mremap.c use-after-free vulnerability
|
[
"cpe:/o:redhat:rhel_eus:8.6::baseos"
] | null | 7 | null | null |
RHSA-2022:8792
|
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.4.8 Security update
|
Undertow: DoS can be achieved as Undertow server waits for the LAST_CHUNK forever for EJB invocations
|
[
"cpe:/a:redhat:jboss_enterprise_application_platform:7.4::el9"
] | null | 4.2 | null | null |
RHSA-2007:0096
|
Red Hat Security Advisory: mod_jk security update
|
security flaw
|
[
"cpe:/a:redhat:rhel_application_stack:1"
] | null | null | null | null |
RHSA-2021:3885
|
Red Hat Security Advisory: java-1.8.0-openjdk security update
|
OpenJDK: Weak ciphers preferred over stronger ones for TLS (JSSE, 8264210) OpenJDK: Excessive memory allocation in RTFParser (Swing, 8265167) OpenJDK: Excessive memory allocation in RTFReader (Swing, 8265580) OpenJDK: Excessive memory allocation in HashMap and HashSet (Utility, 8266097) OpenJDK: Certificates with end dates too far in the future can corrupt keystore (Keytool, 8266137) OpenJDK: Loop in HttpsServer triggered during TLS session close (JSSE, 8254967) OpenJDK: Incorrect principal selection when using Kerberos Constrained Delegation (Libraries, 8266689) OpenJDK: Unexpected exception raised during TLS handshake (JSSE, 8267729) OpenJDK: Excessive memory allocation in BMPImageReader (ImageIO, 8267735) OpenJDK: Incomplete validation of inner class references in ClassFileParser (Hotspot, 8268071) OpenJDK: Non-constant comparison during TLS handshakes (JSSE, 8269618)
|
[
"cpe:/a:redhat:rhel_eus:8.2::appstream"
] | null | 3.7 | null | null |
RHSA-2021:4135
|
Red Hat Security Advisory: java-17-openjdk security update
|
OpenJDK: Excessive memory allocation in RTFParser (Swing, 8265167) OpenJDK: Excessive memory allocation in RTFReader (Swing, 8265580) OpenJDK: Excessive memory allocation in HashMap and HashSet (Utility, 8266097) OpenJDK: Certificates with end dates too far in the future can corrupt keystore (Keytool, 8266137) OpenJDK: Incorrect principal selection when using Kerberos Constrained Delegation (Libraries, 8266689) OpenJDK: Unexpected exception raised during TLS handshake (JSSE, 8267729) OpenJDK: Excessive memory allocation in BMPImageReader (ImageIO, 8267735) OpenJDK: Non-constant comparison during TLS handshakes (JSSE, 8269618)
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb"
] | null | 3.7 | null | null |
RHSA-2011:1854
|
Red Hat Security Advisory: krb5-appl security update
|
krb5: telnet client and server encrypt_keyid heap-based buffer overflow
|
[
"cpe:/o:redhat:rhel_eus:6.0",
"cpe:/o:redhat:rhel_eus:6.1"
] | null | null | null | null |
RHSA-2022:6820
|
Red Hat Security Advisory: prometheus-jmx-exporter security update
|
snakeyaml: Denial of Service due to missing nested depth limitation for collections
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 7.5 | null | null |
RHSA-2012:0748
|
Red Hat Security Advisory: libvirt security, bug fix, and enhancement update
|
libvirt: address bus= device= when identicle vendor ID/product IDs usb devices attached are ignored
|
[
"cpe:/a:redhat:storage:3:server:el6",
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2023:0076
|
Red Hat Security Advisory: Red Hat Ceph Storage 5.3 security update and Bug Fix
|
Moment.js: Path traversal in moment.locale
|
[
"cpe:/a:redhat:ceph_storage:5.3::el8",
"cpe:/a:redhat:ceph_storage:5.3::el9"
] | null | 7.5 | null | null |
RHSA-2015:2520
|
Red Hat Security Advisory: ntp security update
|
ntp: disabling synchronization via crafted KoD packet
|
[
"cpe:/o:redhat:rhel_eus:6.5::computenode",
"cpe:/o:redhat:rhel_eus:6.5::server",
"cpe:/o:redhat:rhel_eus:6.6::computenode",
"cpe:/o:redhat:rhel_eus:6.6::server"
] | null | null | null | null |
RHSA-2024:5894
|
Red Hat Security Advisory: bind security update
|
bind: bind9: BIND's database will be slow if a very large number of RRs exist at the same nam bind9: bind: SIG(0) can be used to exhaust CPU resources
|
[
"cpe:/o:redhat:rhel_aus:7.7::server"
] | null | 7.5 | null | null |
RHSA-2016:2975
|
Red Hat Security Advisory: gstreamer-plugins-good security update
|
gstreamer-plugins-good: Heap buffer overflow in FLIC decoder gstreamer-plugins-good: Heap buffer overflow in FLIC decoder gstreamer-plugins-good: Heap buffer overflow in FLIC decoder gstreamer-plugins-good: Invalid memory read in flx_decode_chunks gstreamer-plugins-good: Heap buffer overflow in FLIC decoder
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | 7.5 | null |
RHSA-2021:2416
|
Red Hat Security Advisory: dhcp security update
|
dhcp: stack-based buffer overflow when parsing statements with colon-separated hex digits in config or lease files in dhcpd and dhclient
|
[
"cpe:/o:redhat:rhel_eus:8.1::baseos"
] | null | 8.8 | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.