id
stringlengths 13
15
| title
stringlengths 29
176
| description
stringlengths 8
32.1k
| cpes
listlengths 0
20
| cvss_v4_0
null | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
null |
---|---|---|---|---|---|---|---|
RHSA-2021:0494
|
Red Hat Security Advisory: Red Hat JBoss Web Server 5.4.1 Security Update
|
openssl: EDIPARTYNAME NULL pointer de-reference tomcat: Apache Tomcat HTTP/2 Request mix-up tomcat: HTTP/2 request header mix-up tomcat: Information disclosure when using NTFS file system
|
[
"cpe:/a:redhat:jboss_enterprise_web_server:5.4::el7",
"cpe:/a:redhat:jboss_enterprise_web_server:5.4::el8"
] | null | 5.9 | null | null |
RHSA-2018:1202
|
Red Hat Security Advisory: java-1.8.0-oracle security update
|
OpenJDK: incorrect merging of sections in the JAR manifest (Security, 8189969) OpenJDK: unrestricted deserialization of data from JCEKS key stores (Security, 8189997) OpenJDK: insufficient consistency checks in deserialization of multiple classes (Security, 8189977) OpenJDK: unbounded memory allocation during deserialization in PriorityBlockingQueue (Concurrency, 8189981) OpenJDK: unbounded memory allocation during deserialization in TabularDataSupport (JMX, 8189985) OpenJDK: unbounded memory allocation during deserialization in Container (AWT, 8189989) OpenJDK: unbounded memory allocation during deserialization in NamedNodeMapImpl (JAXP, 8189993) OpenJDK: RMI HTTP transport enabled by default (RMI, 8193833) JDK: unspecified vulnerability fixed in 8u171 and 10.0.1 (Install) OpenJDK: incorrect handling of Reference clones can lead to sandbox bypass (Hotspot, 8192025) OpenJDK: unbounded memory allocation during deserialization in StubIORImpl (Serialization, 8192757)
|
[
"cpe:/a:redhat:rhel_extras_oracle_java:6"
] | null | null | 5.3 | null |
RHSA-2025:1959
|
Red Hat Security Advisory: webkit2gtk3 security update
|
webkitgtk: Processing maliciously crafted web content may lead to memory corruption webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash
|
[
"cpe:/a:redhat:rhel_aus:8.4::appstream",
"cpe:/a:redhat:rhel_e4s:8.4::appstream",
"cpe:/a:redhat:rhel_tus:8.4::appstream"
] | null | 8.8 | null | null |
RHSA-2014:1784
|
Red Hat Security Advisory: python-keystoneclient security and bug fix update
|
python-keystoneclient: TLS certificate verification disabled
|
[
"cpe:/a:redhat:openstack:5::el7"
] | null | null | null | null |
RHSA-2009:1181
|
Red Hat Security Advisory: bind security and bug fix update
|
bind: DoS (assertion failure) via nsupdate packets
|
[
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws"
] | null | null | null | null |
RHSA-2024:6235
|
Red Hat Security Advisory: Red Hat Trusted Profile Analyzer 1.1.2
|
nodejs-async: Regular expression denial of service while parsing function in autoinject
|
[
"cpe:/a:redhat:trusted_profile_analyzer:1.1::el9"
] | null | 5.3 | null | null |
RHSA-2024:7505
|
Red Hat Security Advisory: firefox security update
|
firefox: thunderbird: Compromised content process can bypass site isolation firefox: thunderbird: Cross-origin access to PDF contents through multipart responses firefox: thunderbird: Cross-origin access to JSON contents through multipart responses firefox: thunderbird: Memory safety bugs fixed in Firefox 131, Firefox ESR 115.16, Firefox ESR 128.3, Thunderbird 131, and Thunderbird 128.3 firefox: thunderbird: Memory safety bugs fixed in Firefox 131, Firefox ESR 128.3, Thunderbird 131, and Thunderbird 128.3
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 7.5 | null | null |
RHSA-2009:1339
|
Red Hat Security Advisory: rgmanager security, bug fix, and enhancement update
|
rgmanager: multiple insecure temporary file use issues
|
[
"cpe:/a:redhat:rhel_cluster:5"
] | null | null | null | null |
RHSA-2017:0868
|
Red Hat Security Advisory: Red Hat JBoss Fuse/A-MQ 6.3 R2 security and bug fix update
|
jakarta-commons-httpclient: missing connection hostname check against X.509 certificate name elasticsearch: remote code execution via Groovy sandbox bypass ActiveMQ: DoS in client via shutdown command apache-cxf: XSS in Apache CXF FormattedServiceListWriter Groovy: Remote code execution via deserialization apache-cxf: Atom entity provider of Apache CXF JAX-RS is vulnerable to XXE Spark: Directory traversal vulnerability in version 2.5 swagger-ui: cross-site scripting in key names camel-snakeyaml: Unmarshalling operation is vulnerable to RCE
|
[
"cpe:/a:redhat:jboss_amq:6.3",
"cpe:/a:redhat:jboss_fuse:6.3"
] | null | null | 8.1 | null |
RHSA-2021:4619
|
Red Hat Security Advisory: freerdp security update
|
freerdp: improper client input validation for gateway connections allows to overwrite memory freerdp: improper region checks in all clients allow out of bound write to memory
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 8.8 | null | null |
RHSA-2024:3327
|
Red Hat Security Advisory: OpenShift Container Platform 4.15.15 security update
|
golang: net/http, x/net/http2: unlimited number of CONTINUATION frames causes DoS python-gunicorn: HTTP Request Smuggling due to improper validation of Transfer-Encoding headers jose-go: improper handling of highly compressed data
|
[
"cpe:/a:redhat:openshift:4.15::el8",
"cpe:/a:redhat:openshift:4.15::el9"
] | null | 4.3 | 7.5 | null |
RHSA-2020:3631
|
Red Hat Security Advisory: thunderbird security update
|
Mozilla: Attacker-induced prompt for extension installation Mozilla: Use-After-Free when aborting an operation
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 8.8 | null | null |
RHSA-2022:0500
|
Red Hat Security Advisory: .NET 6.0 on RHEL 7 security and bugfix update
|
dotnet: ASP.NET Core Krestel HTTP headers pooling denial of service
|
[
"cpe:/a:redhat:rhel_dotnet:6.0::el7"
] | null | 7.5 | null | null |
RHSA-2023:6368
|
Red Hat Security Advisory: qemu-kvm security, bug fix, and enhancement update
|
QEMU: hcd-ehci: DMA reentrancy issue (incomplete fix for CVE-2021-3750)
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 7.5 | null | null |
RHSA-2020:1352
|
Red Hat Security Advisory: qemu-kvm-ma security update
|
QEMU: block: iscsi: OOB heap access via an unexpected response of iSCSI Server QEMU: slirp: OOB buffer access while emulating tcp protocols in tcp_emu() QEMU: Slirp: potential OOB access due to unsafe snprintf() usages
|
[
"cpe:/o:redhat:rhel_eus:7.7::server"
] | null | 5.6 | null | null |
RHSA-2023:1897
|
Red Hat Security Advisory: Red Hat Advanced Cluster Management 2.6 hotfix security update for console
|
vm2: sandbox escape vm2: Sandbox Escape vm2: Sandbox Escape when exception sanitization
|
[
"cpe:/a:redhat:acm:2.6::el8"
] | null | 9.8 | null | null |
RHSA-2024:7700
|
Red Hat Security Advisory: firefox security update
|
firefox: Clipboard write permission bypass firefox: thunderbird: Compromised content process can bypass site isolation firefox: thunderbird: Cross-origin access to PDF contents through multipart responses firefox: thunderbird: Cross-origin access to JSON contents through multipart responses firefox: thunderbird: Potential memory corruption may occur when cloning certain objects firefox: thunderbird: Potential directory upload bypass via clickjacking firefox: thunderbird: External protocol handlers could be enumerated via popups firefox: thunderbird: Specially crafted WebTransport requests could lead to denial of service firefox: thunderbird: Potential memory corruption during JIT compilation firefox: thunderbird: Memory safety bugs fixed in Firefox 131, Firefox ESR 115.16, Firefox ESR 128.3, Thunderbird 131, and Thunderbird 128.3 firefox: thunderbird: Memory safety bugs fixed in Firefox 131, Firefox ESR 128.3, Thunderbird 131, and Thunderbird 128.3
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 7.5 | null | null |
RHSA-2022:6177
|
Red Hat Security Advisory: firefox security update
|
Mozilla: Address bar spoofing via XSLT error handling Mozilla: Cross-origin XSLT Documents would have inherited the parent's permissions Mozilla: Data race and potential use-after-free in PK11_ChangePW Mozilla: Memory safety bugs fixed in Firefox 104 and Firefox ESR 102.2 Mozilla: Memory safety bugs fixed in Firefox 104, Firefox ESR 102.2, and Firefox ESR 91.13
|
[
"cpe:/a:redhat:rhel_eus:8.2::appstream"
] | null | 8.8 | 7.5 | null |
RHSA-2003:067
|
Red Hat Security Advisory: : Updated XFree86 packages provide security and bug fixes
|
security flaw security flaw security flaw security flaw security flaw
|
[
"cpe:/o:redhat:linux:8.0"
] | null | null | null | null |
RHSA-2021:0319
|
Red Hat Security Advisory: Red Hat Single Sign-On 7.4.5 security update on RHEL 7
|
keycloak: Default Client configuration is vulnerable to SSRF using "request_uri" parameter
|
[
"cpe:/a:redhat:red_hat_single_sign_on:7::el7"
] | null | 5.8 | null | null |
RHSA-2022:0289
|
Red Hat Security Advisory: parfait:0.5 security update
|
log4j: Remote code execution in Log4j 1.x when application is configured to use JMSAppender log4j: Remote code execution in Log4j 1.x when application is configured to use JMSSink log4j: SQL injection in Log4j 1.x when application is configured to use JDBCAppender log4j: Unsafe deserialization flaw in Chainsaw log viewer
|
[
"cpe:/a:redhat:rhel_eus:8.4::appstream"
] | null | 8.8 | null | null |
RHSA-2008:0649
|
Red Hat Security Advisory: libxslt security update
|
libxslt: buffer overflow in libexslt RC4 encryption/decryption functions
|
[
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws",
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2024:11293
|
Red Hat Security Advisory: Multicluster Engine for Kubernetes 2.6.4 security enhancements and bug fixes
|
opentelemetry-go-contrib: DoS vulnerability in otelgrpc due to unbound cardinality metrics path-to-regexp: Backtracking regular expressions cause ReDoS find-my-way: ReDoS vulnerability in multiparametric routes
|
[
"cpe:/a:redhat:multicluster_engine:2.6::el8",
"cpe:/a:redhat:multicluster_engine:2.6::el9"
] | null | 7.5 | null | null |
RHSA-2020:0606
|
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.2 security update
|
netty: HTTP request smuggling netty: HttpObjectDecoder.java allows Content-Length header to accompanied by second Content-Length header netty: HTTP Request Smuggling due to Transfer-Encoding whitespace mishandling
|
[
"cpe:/a:redhat:jboss_enterprise_application_platform:7.2"
] | null | 7.5 | null | null |
RHSA-2021:0145
|
Red Hat Security Advisory: Red Hat OpenShift Serverless Client kn 1.12.0
|
golang: default Content-Type setting in net/http/cgi and net/http/fcgi could cause XSS golang: math/big: panic during recursive division of very large numbers golang: malicious symbol names can lead to code execution at build time golang: improper validation of cgo flags can lead to code execution at build time
|
[
"cpe:/a:redhat:serverless:1.0::el8"
] | null | 7.5 | null | null |
RHSA-2025:3062
|
Red Hat Security Advisory: postgresql:12 security update
|
postgresql: PostgreSQL quoting APIs miss neutralizing quoting syntax in text that fails encoding validation
|
[
"cpe:/a:redhat:rhel_aus:8.4::appstream",
"cpe:/a:redhat:rhel_e4s:8.4::appstream",
"cpe:/a:redhat:rhel_tus:8.4::appstream"
] | null | 8.1 | null | null |
RHSA-2008:0040
|
Red Hat Security Advisory: postgresql security update
|
dblink allows proxying of database connections via 127.0.0.1 postgresql integer overflow in regex code postgresql DoS via infinite loop in regex NFA optimization code postgresql: tempory DoS caused by slow regex NFA cleanup PostgreSQL privilege escalation PostgreSQL privilege escalation via dblink
|
[
"cpe:/a:redhat:rhel_application_stack:1",
"cpe:/a:redhat:rhel_application_stack:2"
] | null | null | null | null |
RHSA-2023:7378
|
Red Hat Security Advisory: fence-agents security update
|
python-certifi: Removal of e-Tugra root certificate python-urllib3: Cookie request header isn't stripped during cross-origin redirects
|
[
"cpe:/a:redhat:rhel_eus:9.2::appstream",
"cpe:/a:redhat:rhel_eus:9.2::highavailability",
"cpe:/a:redhat:rhel_eus:9.2::resilientstorage"
] | null | 5.9 | null | null |
RHSA-2016:0006
|
Red Hat Security Advisory: samba security update
|
samba: Insufficient symlink verification in smbd samba: client requesting encryption vulnerable to downgrade attack Samba: Missing access control check in shadow copy code libldb: remote memory read in the Samba LDAP server
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | null | null |
RHSA-2024:10385
|
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 8.0 update
|
Keycloak: Vulnerable Redirect URI Validation Results in Open Redirec
|
[
"cpe:/a:redhat:jboss_enterprise_application_platform:8.0"
] | null | 6.1 | null | null |
RHSA-2021:2145
|
Red Hat Security Advisory: runc security update
|
runc: vulnerable to symlink exchange attack
|
[
"cpe:/a:redhat:rhel_extras_other:7"
] | null | 7.5 | null | null |
RHSA-2024:3576
|
Red Hat Security Advisory: Red Hat build of Keycloak 24.0.5 Images enhancement and security update
|
keycloak: exposure of sensitive information in Pushed Authorization Requests (PAR) KC_RESTART cookie
|
[
"cpe:/a:redhat:build_keycloak:24::el9"
] | null | 7.5 | null | null |
RHSA-2014:0124
|
Red Hat Security Advisory: Apache Camel security update
|
Camel: remote code execution via header field manipulation
|
[
"cpe:/a:redhat:jboss_fuse_service_works:6.0"
] | null | null | null | null |
RHSA-2022:6783
|
Red Hat Security Advisory: Red Hat Single Sign-On 7.5.3 security update on RHEL 8
|
jackson-databind: denial of service via a large depth of nested objects h2: Remote Code Execution in Console netty: control chars in header names may lead to HTTP request smuggling xnio: org.xnio.StreamConnection.notifyReadClosed log to debug instead of stderr keycloak: Stored XSS in groups dropdown wildfly: Wildfly management of EJB Session context returns wrong caller principal with Elytron Security enabled keycloak: improper input validation permits script injection keycloak: Uploading of SAML javascript protocol mapper scripts through the admin console
|
[
"cpe:/a:redhat:red_hat_single_sign_on:7.5::el8"
] | null | 6.4 | null | null |
RHSA-2006:0648
|
Red Hat Security Advisory: kdegraphics security update
|
security flaw security flaw security flaw Multiple libtiff flaws (CVE-2006-3460 CVE-2006-3461 CVE-2006-3462 CVE-2006-3463 CVE-2006-3464 CVE-2006-3465) Multiple libtiff flaws (CVE-2006-3460 CVE-2006-3461 CVE-2006-3462 CVE-2006-3463 CVE-2006-3464 CVE-2006-3465) Multiple libtiff flaws (CVE-2006-3460 CVE-2006-3461 CVE-2006-3462 CVE-2006-3463 CVE-2006-3464 CVE-2006-3465) Multiple libtiff flaws (CVE-2006-3460 CVE-2006-3461 CVE-2006-3462 CVE-2006-3463 CVE-2006-3464 CVE-2006-3465) Multiple libtiff flaws (CVE-2006-3460 CVE-2006-3461 CVE-2006-3462 CVE-2006-3463 CVE-2006-3464 CVE-2006-3465) Multiple libtiff flaws (CVE-2006-3460 CVE-2006-3461 CVE-2006-3462 CVE-2006-3463 CVE-2006-3464 CVE-2006-3465) Multiple libtiff flaws (CVE-2006-3460 CVE-2006-3461 CVE-2006-3462 CVE-2006-3463 CVE-2006-3464 CVE-2006-3465)
|
[
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws"
] | null | null | null | null |
RHSA-2021:5184
|
Red Hat Security Advisory: OpenShift Container Platform 4.7.40 security update
|
log4j: Remote code execution in Log4j 1.x when application is configured to use JMSAppender kube-reporting/hive: Incomplete fix for log4j CVE-2021-44228 and CVE-2021-45046
|
[
"cpe:/a:redhat:openshift:4.7::el8"
] | null | 8.1 | null | null |
RHSA-2023:3587
|
Red Hat Security Advisory: thunderbird security update
|
Mozilla: Click-jacking certificate exceptions through rendering lag Mozilla: Memory safety bugs fixed in Firefox 114 and Firefox ESR 102.12
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 9.8 | null | null |
RHSA-2024:3669
|
Red Hat Security Advisory: less security update
|
less: OS command injection
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 8.6 | null | null |
RHSA-2021:0949
|
Red Hat Security Advisory: Red Hat OpenShift Do openshift/odo-init-image 1.1.3 security update
|
expat: large number of colons in input makes parser consume high amount of resources, leading to DoS e2fsprogs: Crafted ext4 partition leads to out-of-bounds write e2fsprogs: Out-of-bounds write in e2fsck/rehash.c curl: heap buffer overflow in function tftp_receive_packet() nss: Out-of-bounds read when importing curve25519 private key nss: PKCS#1 v1.5 signatures can be used for TLS 1.3 nss: Use-after-free in sftk_FreeSession due to improper refcounting glib2: file_copy_fallback in gio/gfile.c in GNOME GLib does not properly restrict file permissions while a copy operation is in progress dbus: DBusServer DBUS_COOKIE_SHA1 authentication bypass ibus: missing authorization allows local attacker to access the input bus of another user cpio: improper input validation when writing tar header fields leads to unexpected tar generation expat: heap-based buffer over-read via crafted XML input python: XSS vulnerability in the documentation XML-RPC server in server_title field nss: Check length of inputs for cryptographic primitives nss: TLS 1.3 HelloRetryRequest downgrade request sets client into invalid state libssh2: integer overflow in SSH_MSG_DISCONNECT logic in packet.c glibc: LD_PREFER_MAP_32BIT_EXEC not ignored in setuid binaries libxml2: memory leak in xmlParseBalancedChunkMemoryRecover in parser.c systemd: memory leak in button_open() in login/logind-button.c when udev events are received libxml2: memory leak in xmlSchemaPreRun in xmlschemas.c python: infinite loop in the tarfile module via crafted TAR archive glibc: buffer over-read in iconv when processing invalid multi-byte input sequences in the EUC-KR encoding openssl: EDIPARTYNAME NULL pointer de-reference nss: Side channel attack on ECDSA signature generation libxml2: infinite loop in xmlStringLenDecodeEntities in some end-of-file situations curl: Incorrect argument check can allow remote servers to overwrite local files glibc: stack corruption from crafted input in cosl, sinl, sincosl, and tanl functions openldap: denial of service via nested boolean expressions in LDAP search filters nss: P-384 and P-521 implementation uses a side-channel vulnerable modular inversion function nss: ECDSA timing attack mitigation bypass nss: Side channel vulnerabilities during RSA key generation nss: CHACHA20-POLY1305 decryption with undersized tag leads to out-of-bounds read glibc: stack-based buffer overflow if the input to any of the printf family of functions is an 80-bit long double with a non-canonical bit pattern
|
[
"cpe:/a:redhat:openshift_do:1.0::el7"
] | null | 7.5 | 2.9 | null |
RHSA-2012:0716
|
Red Hat Security Advisory: bind security update
|
bind: deleted domain name resolving flaw bind: handling of zero length rdata can cause named to terminate unexpectedly
|
[
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server",
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2021:0055
|
Red Hat Security Advisory: firefox security update
|
Mozilla: Use-after-free write when handling a malicious COOKIE-ECHO SCTP chunk
|
[
"cpe:/a:redhat:rhel_eus:8.2::appstream"
] | null | null | 8.8 | null |
RHSA-2016:0532
|
Red Hat Security Advisory: krb5 security update
|
krb5: xdr_nullstring() doesn't check for terminating null character krb5: krb5 doesn't check for null policy when KADM5_POLICY is set in the mask krb5: Memory leak caused by supplying a null principal name in request
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | null | null |
RHSA-2017:1101
|
Red Hat Security Advisory: nss security update
|
nss: Write beyond bounds caused by bugs in Base64 de/encoding in nssb64d.c and nssb64e.c (MFSA 2017-10)
|
[
"cpe:/o:redhat:rhel_els:5"
] | null | null | 9.8 | null |
RHSA-2020:4320
|
Red Hat Security Advisory: OpenShift Container Platform 4.5.16 security update
|
openshift: restricted SCC allows pods to craft custom network packets
|
[
"cpe:/a:redhat:openshift:4.5::el7"
] | null | 3.1 | null | null |
RHSA-2021:5129
|
Red Hat Security Advisory: Openshift Logging security and bug update (5.3.1)
|
netty: Request smuggling via content-length header netty-codec: Bzip2Decoder doesn't allow setting size restrictions for decompressed data netty-codec: SnappyFrameDecoder doesn't restrict chunk length and may buffer skippable chunks in an unnecessary way log4j-core: Remote code execution in Log4j 2.x when logs contain an attacker-controlled string value log4j-core: DoS in log4j 2.x with thread context message pattern and context lookup pattern (incomplete fix for CVE-2021-44228)
|
[
"cpe:/a:redhat:logging:5.3::el8"
] | null | 8.1 | null | null |
RHSA-2024:8077
|
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.4.19 Security update
|
OpenJDK: integer truncation issue in Xalan-J (JAXP, 8285407) jsoup: The jsoup cleaner may incorrectly sanitize crafted XSS attempts if SafeList.preserveRelativeLinks is enabled jose4j: denial of service via specially crafted JWE wildfly: No timeout for EAP management interface may lead to Denial of Service (DoS) braces: fails to limit the number of characters it can handle
|
[
"cpe:/a:redhat:jboss_enterprise_application_platform:7.4::el9"
] | null | 7.5 | null | null |
RHSA-2004:432
|
Red Hat Security Advisory: acroread security update
|
security flaw security flaw
|
[
"cpe:/a:redhat:rhel_extras:3"
] | null | null | null | null |
RHSA-2018:3432
|
Red Hat Security Advisory: glusterfs security and bug fix update
|
glusterfs: glusterfs server exploitable via symlinks to relative paths glusterfs: Buffer overflow in "features/locks" translator allows for denial of service glusterfs: Heap-based buffer overflow via "gf_getspec_req" RPC message glusterfs: "features/index" translator can create arbitrary, empty files glusterfs: Unlimited file creation via "GF_XATTR_IOSTATS_DUMP_KEY" xattr allows for denial of service glusterfs: Repeat use of "GF_META_LOCK_KEY" xattr allows for memory exhaustion glusterfs: features/locks translator passes an user-controlled string to snprintf without a proper format string resulting in a denial of service
|
[
"cpe:/a:redhat:storage:3.4:server:el7",
"cpe:/a:redhat:storage:3:client:el7",
"cpe:/o:redhat:enterprise_linux:7::hypervisor"
] | null | null | 6.5 | null |
RHSA-2024:0107
|
Red Hat Security Advisory: nss security update
|
nss: timing attack against RSA decryption
|
[
"cpe:/a:redhat:rhel_eus:9.2::appstream"
] | null | 6.5 | null | null |
RHSA-2022:5633
|
Red Hat Security Advisory: kernel-rt security and bug fix update
|
kernel: the copy-on-write implementation can grant unintended write access because of a race condition in a THP mapcount check kernel: cgroup: Use open-time creds and namespace for migration perm checks kernel: Race condition in races in sk_peer_pid and sk_peer_cred accesses kernel: Small table perturb size in the TCP source port generation algorithm can lead to information leak kernel: race condition in perf_event_open leads to privilege escalation kernel: a use-after-free write in the netfilter subsystem can lead to privilege escalation to root
|
[
"cpe:/a:redhat:rhel_eus:8.4::nfv",
"cpe:/a:redhat:rhel_eus:8.4::realtime"
] | null | 7.8 | null | null |
RHSA-2023:0123
|
Red Hat Security Advisory: kpatch-patch security update
|
kernel: memory corruption in AX88179_178A based USB ethernet device. kernel: i915: Incorrect GPU TLB flush can lead to random memory access
|
[
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 7 | null | null |
RHSA-2024:0215
|
Red Hat Security Advisory: Red Hat OpenStack Platform 17.1 (GitPython) security update
|
GitPython: Blind local file inclusion
|
[
"cpe:/a:redhat:openstack:17.1::el9"
] | null | 5.1 | null | null |
RHSA-2023:0496
|
Red Hat Security Advisory: kernel security and bug fix update
|
kernel: memory corruption in AX88179_178A based USB ethernet device. kernel: i915: Incorrect GPU TLB flush can lead to random memory access
|
[
"cpe:/a:redhat:rhel_eus:8.4::crb",
"cpe:/o:redhat:rhel_eus:8.4::baseos"
] | null | 7 | null | null |
RHSA-2023:4957
|
Red Hat Security Advisory: firefox security update
|
Mozilla: Full screen notification obscured by file open dialog Mozilla: Full screen notification obscured by external program Mozilla: Memory corruption in IPC CanvasTranslator Mozilla: Memory corruption in IPC ColorPickerShownCallback Mozilla: Memory corruption in IPC FilePickerShownCallback Mozilla: Memory corruption in JIT UpdateRegExpStatics Mozilla: Error reporting methods in SpiderMonkey could have triggered an Out of Memory Exception Mozilla: Push notifications saved to disk unencrypted Mozilla: XLL file extensions were downloadable without warnings Mozilla: Browsing Context potentially not cleared when closing Private Window Mozilla: Memory safety bugs fixed in Firefox 117, Firefox ESR 102.15, Firefox ESR 115.2, Thunderbird 102.15, and Thunderbird 115.2 Mozilla: Memory safety bugs fixed in Firefox 117, Firefox ESR 115.2, and Thunderbird 115.2
|
[
"cpe:/a:redhat:rhel_aus:8.4::appstream",
"cpe:/a:redhat:rhel_e4s:8.4::appstream",
"cpe:/a:redhat:rhel_tus:8.4::appstream"
] | null | 8.8 | null | null |
RHSA-2024:3269
|
Red Hat Security Advisory: glibc security update
|
glibc: Out of bounds write in iconv may lead to remote code execution
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb",
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 8.8 | null | null |
RHSA-2022:0203
|
Red Hat Security Advisory: Red Hat Fuse 7.8-7.10 security update
|
log4j-core: Remote code execution in Log4j 2.x when logs contain an attacker-controlled string value log4j-core: remote code execution via JDBC Appender log4j-core: DoS in log4j 2.x with thread context message pattern and context lookup pattern (incomplete fix for CVE-2021-44228) log4j-core: DoS in log4j 2.x with Thread Context Map (MDC) input data contains a recursive lookup and context lookup pattern
|
[
"cpe:/a:redhat:jboss_fuse:7"
] | null | 5.9 | null | null |
RHSA-2019:1862
|
Red Hat Security Advisory: Red Hat OpenShift Enterprise one-month end-of-life notice
|
This is the one-month notification for the end of the maintenance phase for Red Hat OpenShift Enterprise 3.6 and 3.7. This notification applies only to customers with subscriptions for Red Hat OpenShift Enterprise 3.6 and 3.7.
|
[
"cpe:/a:redhat:openshift:3.6::el7",
"cpe:/a:redhat:openshift:3.7::el7"
] | null | null | null | null |
RHSA-2023:5603
|
Red Hat Security Advisory: kernel-rt security and bug fix update
|
kernel: hash collisions in the IPv6 connection lookup table kernel: Spectre v2 SMT mitigations problem kernel: fbcon: shift-out-of-bounds in fbcon_set_font() kernel: net/sched: Use-after-free vulnerabilities in the net/sched classifiers: cls_fw, cls_u32 and cls_route kernel: denial of service problem in net/unix/diag.c kernel: nf_tables: use-after-free in nft_chain_lookup_byid() kernel: nf_tables: stack-out-of-bounds-read in nft_byteorder_eval() kernel: cls_flower: out-of-bounds write in fl_set_geneve_opt()
|
[
"cpe:/a:redhat:rhel_eus:9.0::nfv",
"cpe:/a:redhat:rhel_eus:9.0::realtime"
] | null | 7.8 | 5.6 | null |
RHSA-2017:0386
|
Red Hat Security Advisory: kernel security, bug fix, and enhancement update
|
kernel: kvm: x86: NULL pointer dereference during instruction decode kernel: Race condition in packet_set_ring leads to use after free kernel: State machine confusion bug in vfio driver leading to memory corruption kernel: Integer overflow when using kzalloc in vfio driver
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 5.3 | null |
RHSA-2022:1821
|
Red Hat Security Advisory: python27:2.7 security update
|
python: urllib: Regular expression DoS in AbstractBasicAuthHandler python: urllib: HTTP client possible infinite loop on a 100 Continue response python: ftplib should not use the host from the PASV response python-lxml: HTML Cleaner allows crafted and SVG embedded scripts to pass through python: urllib.parse does not sanitize URLs containing ASCII newline and tabs
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 5.3 | null | null |
RHSA-2013:0271
|
Red Hat Security Advisory: firefox security update
|
Mozilla: Use-after-free in nsImageLoadingContent (MFSA 2013-26) Mozilla: Phishing on HTTPS connection through malicious proxy (MFSA 2013-27) Mozilla: Use-after-free, out of bounds read, and buffer overflow issues found using Address Sanitizer (MFSA 2013-28) Mozilla: Use-after-free, out of bounds read, and buffer overflow issues found using Address Sanitizer (MFSA 2013-28) Mozilla: Miscellaneous memory safety hazards (rv:17.0.3) (MFSA 2013-21)
|
[
"cpe:/o:redhat:enterprise_linux:5::server",
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2015:0917
|
Red Hat Security Advisory: Red Hat Satellite Server 5 - 30 Day End Of Life Notice
|
This is the 30 day notification of the End Of Life (EOL) plans for the
following versions of Red Hat Satellite 5:
* Red Hat Satellite 5.2
* Red Hat Satellite 5.3
* Red Hat Satellite 5.4
* Red Hat Satellite 5.5
|
[
"cpe:/a:redhat:network_satellite:5.2::el5",
"cpe:/a:redhat:network_satellite:5.3::el5",
"cpe:/a:redhat:network_satellite:5.4::el5",
"cpe:/a:redhat:network_satellite:5.4::el6",
"cpe:/a:redhat:network_satellite:5.5::el5",
"cpe:/a:redhat:network_satellite:5.5::el6"
] | null | null | null | null |
RHSA-2021:1775
|
Red Hat Security Advisory: pki-core:10.6 and pki-deps:10.6 security, bug fix, and enhancement update
|
resteasy: Improper validation of response header in MediaTypeHeaderDelegate.java class
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | null | 7.5 | null |
RHSA-2013:1605
|
Red Hat Security Advisory: glibc security, bug fix, and enhancement update
|
glibc: Buffer overrun (DoS) in regexp matcher by processing multibyte characters glibc: Stack (frame) overflow in getaddrinfo() when processing entry mapping to long list of address structures glibc: three integer overflows in memory allocator
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2011:1088
|
Red Hat Security Advisory: systemtap security update
|
systemtap: insufficient security check when loading uprobes kernel module systemtap: signed module loading race condition
|
[
"cpe:/o:redhat:enterprise_linux:6::server"
] | null | null | null | null |
RHSA-2023:0623
|
Red Hat Security Advisory: tigervnc security update
|
xorg-x11-server: DeepCopyPointerClasses use-after-free leads to privilege elevation
|
[
"cpe:/a:redhat:rhel_eus:9.0::appstream"
] | null | 7.8 | null | null |
RHSA-2022:8902
|
Red Hat Security Advisory: Red Hat Camel for Spring Boot 3.18.3 release and security update
|
sdk-server: Denial of Service reactor-netty-http: Log request headers in some cases of invalid HTTP requests apache-commons-text: variable interpolation RCE
|
[
"cpe:/a:redhat:camel_spring_boot:3.18.3"
] | null | 9.8 | null | null |
RHSA-2020:4283
|
Red Hat Security Advisory: openstack-cinder security update
|
openstack-cinder: Improper handling of ScaleIO backend credentials
|
[
"cpe:/a:redhat:openstack:16.1::el8"
] | null | 6.5 | null | null |
RHSA-2024:9555
|
Red Hat Security Advisory: NetworkManager-libreswan security update
|
NetworkManager-libreswan: Local privilege escalation via leftupdown
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 7.8 | null | null |
RHSA-2022:8685
|
Red Hat Security Advisory: kernel security and bug fix update
|
kernel: KVM: cmpxchg_gpte can write to pfns outside the userspace region
|
[
"cpe:/a:redhat:rhel_eus:8.4::crb",
"cpe:/o:redhat:rhel_eus:8.4::baseos"
] | null | 7 | null | null |
RHSA-2023:4531
|
Red Hat Security Advisory: kpatch-patch security update
|
kernel: use-after-free in l2cap_connect and l2cap_le_connect_req in net/bluetooth/l2cap_core.c kernel: tcindex: use-after-free vulnerability in traffic control index filter allows privilege escalation kernel: Use-after-free vulnerability in the Linux Kernel traffic control index filter
|
[
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 7.4 | null | null |
RHSA-2024:6882
|
Red Hat Security Advisory: Red Hat Single Sign-On 7.6.11 for OpenShift image enhancement update
|
keycloak-saml-core: Improper Verification of SAML Responses Leading to Privilege Escalation in Keycloak Keycloak: Vulnerable Redirect URI Validation Results in Open Redirec
|
[
"cpe:/a:redhat:rhosemc:1.0::el8"
] | null | 6.1 | null | null |
RHSA-2023:5956
|
Red Hat Security Advisory: Red Hat Build of OptaPlanner 8.38.0 SP2 security update
|
HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack)
|
[
"cpe:/a:redhat:optaplanner:::el6"
] | null | 7.5 | null | null |
RHSA-2023:6199
|
Red Hat Security Advisory: firefox security update
|
Mozilla: Queued up rendering could have allowed websites to clickjack Mozilla: Large WebGL draw could have led to a crash Mozilla: WebExtensions could open arbitrary URLs Mozilla: Improper object tracking during GC in the JavaScript engine could have led to a crash. Mozilla: Memory safety bugs fixed in Firefox 119, Firefox ESR 115.4, and Thunderbird 115.4 Mozilla: Address bar spoofing via bidirectional characters libvpx: crash related to VP9 encoding in libvpx
|
[
"cpe:/a:redhat:rhel_eus:9.0::appstream"
] | null | 7.5 | null | null |
RHSA-2015:1766
|
Red Hat Security Advisory: python-django security update
|
python-django: Denial-of-service possibility in logout() view by filling session store python-django: Denial-of-service possibility in logout() view by filling session store
|
[
"cpe:/a:redhat:openstack:5::el6"
] | null | null | null | null |
RHSA-2024:1106
|
Red Hat Security Advisory: fwupd security update
|
fwupd: world readable password in /etc/fwupd/redfish.conf
|
[
"cpe:/a:redhat:rhel_eus:8.6::crb",
"cpe:/o:redhat:rhel_eus:8.6::baseos"
] | null | 5.5 | null | null |
RHSA-2021:2021
|
Red Hat Security Advisory: Release of OpenShift Serverless 1.10.2 security update
|
golang: crypto/elliptic: incorrect operations on the P-224 curve golang: cmd/go: packages using cgo can cause arbitrary code execution at build time
|
[
"cpe:/a:redhat:serverless:1.10::el8"
] | null | 7.5 | null | null |
RHSA-2005:332
|
Red Hat Security Advisory: xloadimage security update
|
security flaw
|
[
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws",
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2023:6783
|
Red Hat Security Advisory: Node Health Check Operator 0.4.1
|
golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487) HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack)
|
[
"cpe:/a:redhat:workload_availability_node_healthcheck:0.4::el8"
] | null | 7.5 | null | null |
RHSA-2011:0930
|
Red Hat Security Advisory: NetworkManager security update
|
NetworkManager: Did not honour PolicyKit auth_admin action element by creation of Ad-Hoc wireless networks
|
[
"cpe:/o:redhat:enterprise_linux:6::server"
] | null | null | null | null |
RHSA-2006:0579
|
Red Hat Security Advisory: kernel security update
|
security flaw security flaw security flaw security flaw security flaw security flaw security flaw
|
[
"cpe:/o:redhat:enterprise_linux:2.1::as",
"cpe:/o:redhat:enterprise_linux:2.1::es",
"cpe:/o:redhat:enterprise_linux:2.1::ws"
] | null | null | null | null |
RHSA-2020:4483
|
Red Hat Security Advisory: opensc security, bug fix, and enhancement update
|
opensc: Out-of-bounds access of an ASN.1 Bitstring in decode_bit_string in libopensc/asn1.c opensc: Out-of-bounds access of an ASN.1 Octet string in asn1_decode_entry in libopensc/asn1.c opensc: Incorrect read operation during parsing of a SETCOS file attribute opensc: Improper handling of buffer limits for CAC certificates opensc: Double free in coolkey_free_private_data in libopensc/card-coolkey.c
|
[
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 6.4 | null | null |
RHSA-2013:1409
|
Red Hat Security Advisory: xinetd security update
|
xinetd: ignores user and group directives for tcpmux services
|
[
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::server",
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2010:0580
|
Red Hat Security Advisory: tomcat5 security update
|
tomcat: unexpected file deletion and/or alteration tomcat: missing fix for CVE-2009-0781 tomcat: unexpected file deletion in work directory tomcat: information leak vulnerability in the handling of 'Transfer-Encoding' header
|
[
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2023:4126
|
Red Hat Security Advisory: kernel-rt security and bug fix update
|
kernel: net/ulp: use-after-free in listening ULP sockets kernel: tcindex: use-after-free vulnerability in traffic control index filter allows privilege escalation kernel: remote DoS in TIPC kernel module kernel: netfilter: use-after-free in nf_tables when processing batch requests can lead to privilege escalation
|
[
"cpe:/a:redhat:rhel_tus:8.2::nfv",
"cpe:/a:redhat:rhel_tus:8.2::realtime"
] | null | 7.8 | null | null |
RHSA-2023:0852
|
Red Hat Security Advisory: httpd:2.4 security and bug fix update
|
httpd: mod_dav: out-of-bounds read/write of zero byte httpd: mod_proxy_ajp: Possible request smuggling httpd: mod_proxy: HTTP response splitting
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 5.3 | null | null |
RHSA-2023:4037
|
Red Hat Security Advisory: bind9.16 security update
|
bind: named's configured cache size limit can be significantly exceeded
|
[
"cpe:/a:redhat:rhel_eus:8.6::appstream",
"cpe:/a:redhat:rhel_eus:8.6::crb"
] | null | 7.5 | null | null |
RHSA-2024:10665
|
Red Hat Security Advisory: ACS 4.4 enhancement and security update
|
cross-spawn: regular expression denial of service
|
[
"cpe:/a:redhat:advanced_cluster_security:4.4::el8"
] | null | 4.4 | null | null |
RHSA-2021:4913
|
Red Hat Security Advisory: mailman security update
|
mailman: CSRF protection missing in the user options page mailman: CSRF token bypass allows to perform CSRF attacks and account takeover mailman: CSRF token bypass allows to perform CSRF attacks and admin takeover
|
[
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 8 | 6.5 | null |
RHSA-2023:2519
|
Red Hat Security Advisory: samba security, bug fix, and enhancement update
|
samba: GnuTLS gnutls_rnd() can fail and give predictable random values
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::crb",
"cpe:/a:redhat:enterprise_linux:9::resilientstorage",
"cpe:/o:redhat:enterprise_linux:9::baseos"
] | null | 5.1 | null | null |
RHSA-2005:506
|
Red Hat Security Advisory: mikmod security update
|
security flaw
|
[
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws",
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2009:0015
|
Red Hat Security Advisory: java-1.6.0-ibm security update
|
Java Web Start File Inclusion via System Properties Override JavaWebStart allows unauthorized network connections Java WebStart unprivileged local file and network access JRE allows unauthorized file access and connections to localhost OpenJDK applet privilege escalation via JAX package access (6592792) OpenJDK Denial-Of-Service in kerberos authentication (6588160) OpenJDK allows to list files within the user home directory (6484091) OpenJDK Jar200 Decompression buffer overflow (6755943) OpenJDK calendar object deserialization allows privilege escalation (6734167) OpenJDK Privilege escalation in command line applications (6733959) OpenJDK Buffer overflow in image processing (6726779) OpenJDK temporary files have guessable file names (6721753)
|
[
"cpe:/a:redhat:rhel_extras:4",
"cpe:/a:redhat:rhel_extras:5::client",
"cpe:/a:redhat:rhel_extras:5::server"
] | null | null | null | null |
RHSA-2021:0028
|
Red Hat Security Advisory: Red Hat Virtualization security, bug fix, and enhancement update
|
lldpd: buffer overflow in the lldp_decode function in daemon/protocols/lldp.c
|
[
"cpe:/a:redhat:rhev_manager:4.3",
"cpe:/o:redhat:enterprise_linux:7::hypervisor"
] | null | 9.8 | null | null |
RHSA-2020:2285
|
Red Hat Security Advisory: kernel security update
|
kernel: double free may be caused by the function allocate_trace_buffer in the file kernel/trace/trace.c kernel: use-after-free in __blk_add_trace in kernel/trace/blktrace.c Kernel: NetLabel: null pointer dereference while receiving CIPSO packet with null category may cause kernel panic
|
[
"cpe:/o:redhat:rhel_aus:7.2::server"
] | null | 5.9 | null | null |
RHSA-2022:6518
|
Red Hat Security Advisory: rh-mysql80-mysql security, bug fix, and enhancement update
|
mysql: Server: DML unspecified vulnerability (CPU Oct 2021) mysql: Server: DML unspecified vulnerability (CPU Oct 2021) mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2021) mysql: Server: Replication unspecified vulnerability (CPU Oct 2021) mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2021) mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2021) mysql: Server: DML unspecified vulnerability (CPU Oct 2021) mysql: Server: Error Handling unspecified vulnerability (CPU Oct 2021) mysql: C API unspecified vulnerability (CPU Oct 2021) mysql: Server: Options unspecified vulnerability (CPU Oct 2021) mysql: InnoDB unspecified vulnerability (CPU Oct 2021) mysql: Server: DML unspecified vulnerability (CPU Oct 2021) mysql: Server: Group Replication Plugin unspecified vulnerability (CPU Oct 2021) mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2021) mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2021) mysql: Server: Security: Encryption unspecified vulnerability (CPU Oct 2021) mysql: Server: Security: Roles unspecified vulnerability (CPU Oct 2021) mysql: Server: Security: Privileges unspecified vulnerability (CPU Oct 2021) mysql: Server: Security: Privileges unspecified vulnerability (CPU Oct 2021) mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2021) mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2021) mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2021) mysql: Server: Options unspecified vulnerability (CPU Oct 2021) mysql: Server: GIS unspecified vulnerability (CPU Oct 2021) mysql: Server: Data Dictionary unspecified vulnerability (CPU Oct 2021) mysql: Server: Logging unspecified vulnerability (CPU Oct 2021) mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2021) mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2021) mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2021) mysql: Server: PS unspecified vulnerability (CPU Oct 2021) mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2021) mysql: Server: Stored Procedure unspecified vulnerability (CPU Oct 2021) mysql: Server: DDL unspecified vulnerability (CPU Oct 2021) mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2021) mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2021) mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2021) mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2021) mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2021) mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2021) mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2021) mysql: Server: FTS unspecified vulnerability (CPU Oct 2021) mysql: Server: Security: Privileges unspecified vulnerability (CPU Jan 2022) mysql: Server: DDL unspecified vulnerability (CPU Jan 2022) mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2022) mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2022) mysql: Server: Group Replication Plugin unspecified vulnerability (CPU Jan 2022) mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2022) mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2022) mysql: Server: Federated unspecified vulnerability (CPU Jan 2022) mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2022) mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2022) mysql: Server: DML unspecified vulnerability (CPU Jan 2022) mysql: InnoDB unspecified vulnerability (CPU Jan 2022) mysql: Server: Stored Procedure unspecified vulnerability (CPU Jan 2022) mysql: Server: Parser unspecified vulnerability (CPU Jan 2022) mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2022) mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2022) mysql: Server: Replication unspecified vulnerability (CPU Jan 2022) mysql: InnoDB unspecified vulnerability (CPU Jan 2022) mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2022) mysql: InnoDB unspecified vulnerability (CPU Jan 2022) mysql: Server: Security: Encryption unspecified vulnerability (CPU Jan 2022) mysql: Server: Information Schema unspecified vulnerability (CPU Jan 2022) mysql: Server: Compiling unspecified vulnerability (CPU Jan 2022) mysql: Server: Components Services unspecified vulnerability (CPU Jan 2022) mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2022) mysql: Server: Security: Encryption unspecified vulnerability (CPU Jan 2022) mysql: Server: Information Schema unspecified vulnerability (CPU Jan 2022) mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2022) mysql: Server: Group Replication Plugin unspecified vulnerability (CPU Jan 2022) mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2022) mysql: Server: DML unspecified vulnerability (CPU Apr 2022) mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2022) mysql: Server: Replication unspecified vulnerability (CPU Apr 2022) mysql: InnoDB unspecified vulnerability (CPU Apr 2022) mysql: InnoDB unspecified vulnerability (CPU Apr 2022) mysql: InnoDB unspecified vulnerability (CPU Apr 2022) mysql: Server: DDL unspecified vulnerability (CPU Apr 2022) mysql: Server: FTS unspecified vulnerability (CPU Apr 2022) mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2022) mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2022) mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2022) mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2022) mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2022) mysql: Server: DDL unspecified vulnerability (CPU Apr 2022) mysql: InnoDB unspecified vulnerability (CPU Apr 2022) mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2022) mysql: Server: Group Replication Plugin unspecified vulnerability (CPU Apr 2022) mysql: Server: PAM Auth Plugin unspecified vulnerability (CPU Jul 2022) mysql: Server: PAM Auth Plugin unspecified vulnerability (CPU Apr 2022) mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2022) mysql: Server: Logging unspecified vulnerability (CPU Apr 2022) mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2022) mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2022) mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2022) mysql: Server: Optimizer unspecified vulnerability (CPU Jul 2022) mysql: Server: Options unspecified vulnerability (CPU Jul 2022) mysql: InnoDB unspecified vulnerability (CPU Jul 2022) mysql: Server: Stored Procedure unspecified vulnerability (CPU Jul 2022) mysql: Server: Optimizer unspecified vulnerability (CPU Jul 2022) mysql: Server: Optimizer unspecified vulnerability (CPU Jul 2022) mysql: Server: Optimizer unspecified vulnerability (CPU Jul 2022) mysql: Server: Optimizer unspecified vulnerability (CPU Jul 2022) mysql: Server: Optimizer unspecified vulnerability (CPU Jul 2022) mysql: Server: Optimizer unspecified vulnerability (CPU Jul 2022) mysql: Server: Optimizer unspecified vulnerability (CPU Jul 2022) mysql: Server: Stored Procedure unspecified vulnerability (CPU Jul 2022) mysql: InnoDB unspecified vulnerability (CPU Jul 2022) mysql: Server: Security: Encryption unspecified vulnerability (CPU Jul 2022) mysql: InnoDB unspecified vulnerability (CPU Jul 2022) mysql: Server: Federated unspecified vulnerability (CPU Jul 2022) mysql: Server: Optimizer unspecified vulnerability (CPU Jul 2022) mysql: Server: Optimizer unspecified vulnerability (CPU Jul 2022) mysql: Server: Optimizer unspecified vulnerability (CPU Jul 2022) mysql: Server: Security: Encryption unspecified vulnerability (CPU Oct 2022) mysql: C API unspecified vulnerability (CPU Oct 2022) mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2022) mysql: Server: Data Dictionary unspecified vulnerability (CPU Oct 2022) mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2022) mysql: InnoDB unspecified vulnerability (CPU Oct 2022) mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2022) mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2022) mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2023) mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2023) mysql: Server: Replication unspecified vulnerability (CPU Jul 2023)
|
[
"cpe:/a:redhat:rhel_software_collections:3::el7"
] | null | 4.9 | null | null |
RHSA-2014:0981
|
Red Hat Security Advisory: kernel security, bug fix, and enhancement update
|
Kernel: futex: forbid uaddr == uaddr2 in futex_wait_requeue_pi() kernel: net: rds: dereference of a NULL device in rds_ib_laddr_check() kernel: ath9k: tid->sched race in ath_tx_aggr_sleep() kernel: net: rds: dereference of a NULL device in rds_iw_laddr_check() Kernel: net: mac80211: crash dues to AP powersave TX vs. wakeup race kernel: net: ping: refcount issue in ping_init_sock() function Kernel: filter: prevent nla extensions to peek beyond the end of the message Kernel: filter: prevent nla extensions to peek beyond the end of the message
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2024:3043
|
Red Hat Security Advisory: ansible-core bug fix, enhancement, and security update
|
ansible-core: possible information leak in tasks that ignore ANSIBLE_NO_LOG configuration
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 5 | null | null |
RHSA-2024:4447
|
Red Hat Security Advisory: kernel security update
|
kernel: net/sched: act_skbmod: Skip non-Ethernet packets kernel: net: ti: fix UAF in tlan_remove_one kernel: KVM: NULL pointer dereference in kvm_mmu_invpcid_gva kernel: tls: race between async notify and socket close kernel: tls: handle backlogging of crypto requests kernel: tls: race between tx work scheduling and socket close kernel: ipv6: sr: fix possible use-after-free and null-ptr-deref kernel: Bluetooth: Avoid potential use-after-free in hci_error_reset kernel: net: ip_tunnel: prevent perpetual headroom growth kernel: netfilter: nf_tables: use timestamp to check for set element timeout kernel: net: ena: Fix incorrect descriptor free behavior kernel: ipv6: fix race condition between ipv6_get_ifaddr and ipv6_del_addr kernel: netfilter: nf_tables: honor table dormant flag from netdev release event path kernel: TIPC message reassembly use-after-free remote code execution vulnerability kernel: scsi: lpfc: Move NPIV's transport unregistration to after resource clean up
|
[
"cpe:/o:redhat:rhel_aus:8.6::baseos",
"cpe:/o:redhat:rhel_e4s:8.6::baseos",
"cpe:/o:redhat:rhel_tus:8.6::baseos"
] | null | 4.4 | null | null |
RHSA-2024:5240
|
Red Hat Security Advisory: Red Hat JBoss Core Services Apache HTTP Server 2.4.57 SP5 security update
|
httpd: Encoding problem in mod_proxy httpd: Substitution encoding issue in mod_rewrite httpd: Improper escaping of output in mod_rewrite httpd: Security issues via backend applications whose response headers are malicious or exploitable httpd: NULL pointer dereference in mod_proxy httpd: Potential SSRF in mod_rewrite
|
[
"cpe:/a:redhat:jboss_core_services:1"
] | null | 7.4 | null | null |
RHSA-2012:1165
|
Red Hat Security Advisory: JBoss Enterprise BRMS Platform 5.3.0 update
|
CSRF on jmx-console allows invocation of operations on mbeans
|
[
"cpe:/a:redhat:jboss_enterprise_brms_platform:5.3"
] | null | null | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.