id
stringlengths 13
15
| title
stringlengths 29
176
| description
stringlengths 8
32.1k
| cpes
listlengths 0
20
| cvss_v4_0
null | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
null |
---|---|---|---|---|---|---|---|
RHSA-2025:2157 | Red Hat Security Advisory: emacs security update | emacs: Shell Injection Vulnerability in GNU Emacs via Custom "man" URI Scheme | [
"cpe:/a:redhat:rhel_aus:8.2::appstream",
"cpe:/o:redhat:rhel_aus:8.2::baseos"
]
| null | 8.8 | null | null |
RHSA-2014:0476 | Red Hat Security Advisory: kernel security and bug fix update | Kernel: qeth: buffer overflow in snmp ioctl Kernel: AACRAID Driver compat IOCTL missing capability check | [
"cpe:/o:redhat:rhel_eus:5.9"
]
| null | null | null | null |
RHSA-2020:2769 | Red Hat Security Advisory: ruby security update | ruby: Tainted flags are not propagated in Array#pack and String#unpack with some directives rubygems: Escape sequence injection vulnerability in verbose rubygems: Escape sequence injection vulnerability in gem owner rubygems: Escape sequence injection vulnerability in API response handling rubygems: Installing a malicious gem may lead to arbitrary code execution rubygems: Escape sequence injection vulnerability in errors | [
"cpe:/o:redhat:rhel_aus:7.4::server",
"cpe:/o:redhat:rhel_e4s:7.4::server",
"cpe:/o:redhat:rhel_tus:7.4::server"
]
| null | null | 5.3 | null |
RHSA-2023:4707 | Red Hat Security Advisory: subscription-manager security update | subscription-manager: inadequate authorization of com.redhat.RHSM1 D-Bus interface allows local users to modify configuration | [
"cpe:/o:redhat:rhel_eus:9.0::baseos"
]
| null | 7.8 | null | null |
RHSA-2023:6961 | Red Hat Security Advisory: qt5-qtsvg security update | qt: Uninitialized variable usage in m_unitsPerEm | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
]
| null | 6.5 | null | null |
RHSA-2021:5160 | Red Hat Security Advisory: go-toolset:rhel8 security and bug fix update | golang: net/http: limit growth of header canonicalization cache golang: syscall: don't close fd 0 on ForkExec error | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
]
| null | 4.8 | null | null |
RHSA-2019:1820 | Red Hat Security Advisory: rh-maven35-jackson-databind security update | jackson-databind: failure to block the logback-core class from polymorphic deserialization leading to remote code execution | [
"cpe:/a:redhat:rhel_software_collections:3::el7"
]
| null | null | 8.1 | null |
RHSA-2023:1591 | Red Hat Security Advisory: pcs security update | webpack: avoid cross-realm objects | [
"cpe:/a:redhat:enterprise_linux:9::highavailability",
"cpe:/a:redhat:enterprise_linux:9::resilientstorage"
]
| null | 9.1 | null | null |
RHSA-2022:7314 | Red Hat Security Advisory: zlib security update | zlib: heap-based buffer over-read and overflow in inflate() in inflate.c via a large gzip header extra field | [
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::crb",
"cpe:/o:redhat:enterprise_linux:9::baseos"
]
| null | 7 | null | null |
RHSA-2022:7133 | Red Hat Security Advisory: 389-ds:1.4 security update | 389-ds-base: SIGSEGV in sync_repl | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
]
| null | 6.5 | null | null |
RHSA-2022:0507 | Red Hat Security Advisory: Red Hat JBoss Data Virtualization 6.4.8.SP2 security update | log4j: deserialization of untrusted data in SocketServer log4j: improper validation of certificate with host mismatch in SMTP appender log4j: Remote code execution in Log4j 1.x when application is configured to use JMSAppender log4j: Remote code execution in Log4j 1.x when application is configured to use JMSSink log4j: SQL injection in Log4j 1.x when application is configured to use JDBCAppender log4j: Unsafe deserialization flaw in Chainsaw log viewer | [
"cpe:/a:redhat:jboss_data_virtualization:6.4"
]
| null | 8.8 | null | null |
RHSA-2024:8228 | Red Hat Security Advisory: OpenShift Container Platform 4.17.2 security and extras update | python-certifi: Removal of e-Tugra root certificate | [
"cpe:/a:redhat:openshift:4.17::el9"
]
| null | 9.1 | null | null |
RHSA-2010:0979 | Red Hat Security Advisory: openssl security update | openssl: NETSCAPE_REUSE_CIPHER_CHANGE_BUG ciphersuite downgrade attack | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
]
| null | null | null | null |
RHSA-2020:0952 | Red Hat Security Advisory: Red Hat Single Sign-On 7.3.7 security update | undertow: AJP File Read/Inclusion Vulnerability | [
"cpe:/a:redhat:jboss_single_sign_on:7.3"
]
| null | 7.6 | null | null |
RHSA-2024:1841 | Red Hat Security Advisory: pcs security update | rubygem-rack: Denial of Service Vulnerability in Rack Content-Type Parsing rubygem-rack: Possible DoS Vulnerability with Range Header in Rack rubygem-rack: Possible Denial of Service Vulnerability in Rack Header Parsing | [
"cpe:/a:redhat:rhel_eus:9.0::highavailability",
"cpe:/a:redhat:rhel_eus:9.0::resilientstorage"
]
| null | 5.3 | null | null |
RHSA-2024:9424 | Red Hat Security Advisory: tpm2-tools security update | tpm2-tools: arbitrary quote data may go undetected by tpm2_checkquote tpm2-tools: pcr selection value is not compared with the attest | [
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/o:redhat:enterprise_linux:9::baseos"
]
| null | 3.3 | null | null |
RHSA-2008:0528 | Red Hat Security Advisory: ucd-snmp security update | net-snmp SNMPv3 authentication bypass (VU#877044) | [
"cpe:/o:redhat:enterprise_linux:2.1::as",
"cpe:/o:redhat:enterprise_linux:2.1::aw",
"cpe:/o:redhat:enterprise_linux:2.1::es",
"cpe:/o:redhat:enterprise_linux:2.1::ws"
]
| null | null | null | null |
RHSA-2002:117 | Red Hat Security Advisory: : : : Updated secureweb packages fix chunked encoding issue | security flaw | [
"cpe:/a:redhat:secure_web_server:3.2"
]
| null | null | null | null |
RHSA-2020:0933 | Red Hat Security Advisory: OpenShift Container Platform 4.3.9 ose-openshift-apiserver-container security update | kubernetes: Denial of service in API server via crafted YAML payloads by authorized users kubernetes: Use of unbounded 'client' label in apiserver_request_total allows for memory exhaustion | [
"cpe:/a:redhat:openshift:4.3::el7"
]
| null | 4.3 | null | null |
RHSA-2024:6682 | Red Hat Security Advisory: firefox security update | mozilla: Type Confusion in Async Generators in Javascript Engine mozilla: Type confusion when looking up a property name in a "with" block mozilla: Internal event interfaces were exposed to web content when browser EventHandler listener callbacks ran mozilla: Firefox did not ask before openings news: links in an external application mozilla: Garbage collection could mis-color cross-compartment objects in OOM conditions mozilla: WASM type confusion involving ArrayTypes mozilla: SelectElements could be shown over another site if popups are allowed mozilla: Memory safety bugs fixed in Firefox 130, Firefox ESR 128.2, and Thunderbird 128.2 | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
]
| null | 9.8 | null | null |
RHSA-2022:0297 | Red Hat Security Advisory: Red Hat Decision Manager 7.12.0 security update | jackson-dataformat-cbor: Unchecked allocation of byte buffer can cause a java.lang.OutOfMemoryError exception fabric8-kubernetes-client: vulnerable to a path traversal leading to integrity and availability compromise XStream: remote command execution attack by manipulating the processed input stream xstream: Arbitrary code execution via unsafe deserialization of Xalan xsltc.trax.TemplatesImpl xstream: Infinite loop DoS via unsafe deserialization of sun.reflect.annotation.AnnotationInvocationHandler xstream: Arbitrary code execution via unsafe deserialization of com.sun.xml.internal.ws.client.sei.* xstream: Arbitrary code execution via unsafe deserialization of sun.tracing.* xstream: Arbitrary code execution via unsafe deserialization of com.sun.jndi.ldap.LdapBindingEnumeration xstream: Arbitrary code execution via unsafe deserialization of javax.swing.UIDefaults$ProxyLazyValue xstream: Arbitrary code execution via unsafe deserialization of com.sun.jndi.ldap.LdapSearchEnumeration xstream: Arbitrary code execution via unsafe deserialization of com.sun.jndi.toolkit.dir.ContextEnumerator xstream: Arbitrary code execution via unsafe deserialization of com.sun.corba.* xstream: Server-side request forgery (SSRF) via unsafe deserialization of com.sun.xml.internal.ws.client.sei.* xstream: Arbitrary code execution via unsafe deserialization of com.sun.jndi.ldap.LdapBindingEnumeration xstream: Server-side request forgery (SSRF) via unsafe deserialization of jdk.nashorn.internal.runtime.Source$URLData xstream: Arbitrary code execution via unsafe deserialization of Xalan xsltc.trax.TemplatesImpl xstream: Arbitrary code execution via unsafe deserialization of javax.swing.UIDefaults$ProxyLazyValue | [
"cpe:/a:redhat:jboss_enterprise_brms_platform:7.12"
]
| null | 8.5 | null | null |
RHSA-2022:1102 | Red Hat Security Advisory: httpd:2.4 security update | httpd: Errors encountered during the discarding of request body lead to HTTP request smuggling | [
"cpe:/a:redhat:rhel_eus:8.2::appstream"
]
| null | 8.3 | null | null |
RHSA-2020:3699 | Red Hat Security Advisory: .NET Core 3.1 security and bugfix update | dotnet: ASP.NET cookie prefix spoofing vulnerability | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
]
| null | 7.5 | null | null |
RHSA-2023:7207 | Red Hat Security Advisory: c-ares security update | c-ares: Heap buffer over read in ares_parse_soa_reply c-ares: Buffer Underwrite in ares_inet_net_pton() | [
"cpe:/o:redhat:enterprise_linux:8::baseos"
]
| null | 5.7 | null | null |
RHSA-2020:0471 | Red Hat Security Advisory: spice-gtk security update | spice-client: Insufficient encoding checks for LZ can cause different integer/buffer overflows | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
]
| null | null | 7.6 | null |
RHSA-2017:2563 | Red Hat Security Advisory: openssh security update | openssh: User enumeration via covert timing channel | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
]
| null | null | 5.3 | null |
RHSA-2005:601 | Red Hat Security Advisory: thunderbird security update | security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw | [
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
]
| null | null | null | null |
RHSA-2024:6140 | Red Hat Security Advisory: postgresql:15 security update | postgresql: PostgreSQL relation replacement during pg_dump executes arbitrary SQL | [
"cpe:/a:redhat:rhel_eus:9.2::appstream"
]
| null | 7.5 | null | null |
RHSA-2011:0369 | Red Hat Security Advisory: wireshark security update | wireshark: buffer overflow in MAC-LTE disector (upstream bug #5530) Wireshark: memory corruption when reading a malformed pcap file (upstream bug #5652) Wireshark: heap-based buffer overflow when reading malformed Nokia DCT3 phone signalling traces Wireshark: Denial Of Service (application crash) via a pcap-ng file that contains a large packet-length field Wireshark: Multiple stack consumption vulnerabilities caused DoS via crafted SMB or CLDAP packet Wireshark: Malformed LDAP filter string causes Denial of Service via excessive memory consumption | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
]
| null | null | null | null |
RHSA-2022:6449 | Red Hat Security Advisory: nodejs:16 security and bug fix update | nodejs-ansi-regex: Regular expression denial of service (ReDoS) matching ANSI escape codes nodejs: DNS rebinding in --inspect via invalid IP addresses nodejs: HTTP request smuggling due to flawed parsing of Transfer-Encoding nodejs: HTTP request smuggling due to improper delimiting of header fields nodejs: HTTP request smuggling due to incorrect parsing of multi-line Transfer-Encoding nodejs-got: missing verification of requested URLs allows redirects to UNIX sockets | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
]
| null | 5.3 | null | null |
RHSA-2024:2881 | Red Hat Security Advisory: firefox security update | Mozilla: Arbitrary JavaScript execution in PDF.js Mozilla: IndexedDB files retained in private browsing mode Mozilla: Potential permissions request bypass via clickjacking Mozilla: Cross-origin responses could be distinguished between script and non-script content-types Mozilla: Use-after-free could occur when printing to PDF Mozilla: Memory safety bugs fixed in Firefox 126, Firefox ESR 115.11, and Thunderbird 115.11 | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
]
| null | 6.1 | null | null |
RHSA-2018:3593 | Red Hat Security Advisory: Red Hat Single Sign-On 7.2.5 on RHEL 7 security and bug fix update | keycloak: auth permitted with expired certs in SAML client keycloak: expiration not validated in SAML broker consumer endpoint keycloak: XSS-Vulnerability with response_mode=form_post keycloak: brute force protection not working for the entire login workflow keycloak: Open Redirect in Login and Logout | [
"cpe:/a:redhat:red_hat_single_sign_on:7::el7"
]
| null | null | 6.1 | null |
RHSA-2022:5498 | Red Hat Security Advisory: Satellite 6.11 Release | libsolv: heap-based buffer overflow in testcase_read() in src/testcase.c foreman: Authenticate remote code execution through Sendmail configuration Satellite: Allow unintended SCA certificate to authenticate Candlepin netty: Information disclosure via the local system temporary directory netty: possible request smuggling in HTTP/2 due missing validation netty: Request smuggling via content-length header sidekiq: XSS via the queue name of the live-poll feature python-sqlparse: ReDoS via regular expression in StripComments filter libsolv: heap-based buffer overflow in pool_installable() in src/repo.h libsolv: heap-based buffer overflow in pool_disabled_solvable() in src/repo.h libsolv: heap-based buffer overflow in pool_installable_whatprovides() in src/repo.h libsolv: heap-based buffer overflow in prune_to_recommended() in src/policy.c rubygem-puma: Inconsistent Interpretation of HTTP Requests ('HTTP Request Smuggling') in puma logback: remote code execution through JNDI call from within its configuration file netty: control chars in header names may lead to HTTP request smuggling python-lxml: HTML Cleaner allows crafted and SVG embedded scripts to pass through django: potential bypass of an upstream access control based on URL paths libsolv: heap-overflows in resolve_dependencies function django: Denial-of-service possibility in UserAttributeSimilarityValidator django: Potential information disclosure in dictsort template filter django: Potential directory-traversal via Storage.save() django: Possible XSS via '{% debug %}' template tag rubygem-actionpack: information leak between requests rubygem-puma: rubygem-rails: information leak between requests django: Denial-of-service possibility in file uploads sidekiq: WebUI Denial of Service caused by number of days on graph Django: SQL injection in QuerySet.annotate(),aggregate() and extra() Django: SQL injection via QuerySet.explain(options) on PostgreSQL | [
"cpe:/a:redhat:satellite:6.11::el7",
"cpe:/a:redhat:satellite:6.11::el8",
"cpe:/a:redhat:satellite_capsule:6.11::el7",
"cpe:/a:redhat:satellite_capsule:6.11::el8",
"cpe:/a:redhat:satellite_maintenance:6.11::el7",
"cpe:/a:redhat:satellite_maintenance:6.11::el8",
"cpe:/a:redhat:satellite_utils:6.11::el7",
"cpe:/a:redhat:satellite_utils:6.11::el8"
]
| null | 9.4 | null | null |
RHSA-2018:3648 | Red Hat Security Advisory: chromium-browser security update | chromium-browser: Out of bounds memory access in V8 chromium-browser: Use-after-free in GPU | [
"cpe:/a:redhat:rhel_extras:6"
]
| null | null | 8.8 | null |
RHSA-2017:1334 | Red Hat Security Advisory: ansible security update | ansible: Arbitrary code execution on control node (incomplete fix for CVE-2016-9587) ansible: Security issue with lookup return not tainting the jinja2 environment | [
"cpe:/a:redhat:storage:3.2:server:el7"
]
| null | null | 5.3 | null |
RHSA-2024:2953 | Red Hat Security Advisory: pcs security update | rubygem-rack: Denial of Service Vulnerability in Rack Content-Type Parsing rubygem-rack: Possible DoS Vulnerability with Range Header in Rack rubygem-rack: Possible Denial of Service Vulnerability in Rack Header Parsing | [
"cpe:/a:redhat:enterprise_linux:8::highavailability",
"cpe:/a:redhat:enterprise_linux:8::resilientstorage"
]
| null | 5.3 | null | null |
RHSA-2022:1589 | Red Hat Security Advisory: kernel security update | kernel: remote stack overflow via kernel panic on systems using TIPC may lead to DoS | [
"cpe:/o:redhat:rhel_e4s:8.1::baseos"
]
| null | 7.1 | null | null |
RHSA-2005:307 | Red Hat Security Advisory: kdelibs security update | security flaw | [
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws"
]
| null | null | null | null |
RHSA-2016:2957 | Red Hat Security Advisory: Red Hat JBoss Core Services Apache HTTP 2.4.23 Release | expat: hash table collisions CPU usage DoS expat: Memory leak in poolGrow httpd: WinNT MPM denial of service OpenSSL: Invalid free in DTLS openssl: use-after-free on invalid EC private key import openssl: invalid pointer use in ASN1_TYPE_cmp() httpd: ap_some_auth_required() does not properly indicate authenticated request in 2.4 OpenSSL: Certificate verify crash with missing PSS parameter OpenSSL: X509_ATTRIBUTE memory leak OpenSSL: Race condition handling PSK identify hint openssl: Crash in ssleay_rand_bytes due to locking regression OpenSSL: Side channel attack on modular exponentiation OpenSSL: Double-free in DSA code OpenSSL: BN_hex2bn/BN_dec2bn NULL pointer deref/heap corruption OpenSSL: Fix memory issues in BIO_*printf functions libxml2: Heap-based buffer-overread in xmlNextChar libxml2: Heap-based buffer overread in htmlCurrentChar libxml2: Heap-buffer-overflow in xmlStrncat libxml2: Heap use-after-free in xmlSAX2AttributeNs libxml2: Heap use-after-free in xmlDictComputeFastKey libxml2: Heap use-after-free in htmlPArsePubidLiteral and htmlParseSystemiteral libxml2: Heap-based buffer overread in xmlPArserPrintFileContextInternal libxml2: Heap-based buffer overread in xmlDictAddString libxml2: Heap-buffer-overflow in xmlFAParserPosCharGroup openssl: EVP_EncodeUpdate overflow openssl: EVP_EncryptUpdate overflow openssl: Padding oracle in AES-NI CBC MAC check openssl: Memory corruption in the ASN.1 encoder openssl: ASN.1 BIO handling of large amounts of data openssl: Possible integer overflow vulnerabilities in codebase openssl: Non-constant time codepath followed for certain operations in DSA implementation openssl: doapr_outch function does not verify that certain memory allocation succeeds libxml2: stack exhaustion while parsing xml files in recovery mode libxml2: stack overflow before detecting invalid XML file libxml2: Heap-based buffer underreads due to xmlParseName libxml2: Format string vulnerability libxml2: Inappropriate fetch of entities content mod_cluster: Buffer overflow in mod_manager when sending request with long JVMRoute libxml2: out-of-bounds read curl: TLS session resumption client cert bypass curl: Re-using connection with wrong client cert mod_jk: Buffer overflow when concatenating virtual host name and URI curl: Incorrect reuse of client certificates mod_cluster: Protocol parsing logic error | [
"cpe:/a:redhat:jboss_core_services:1"
]
| null | null | 4.3 | null |
RHSA-2019:3345 | Red Hat Security Advisory: virt:rhel security, bug fix, and enhancement update | ntfs-3g: heap-based buffer overflow leads to local root privilege escalation QEMU: slirp: information leakage in tcp_emu() due to uninitialized stack variables QEMU: qxl: null pointer dereference while releasing spice resources | [
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb"
]
| null | null | 3.8 | null |
RHSA-2021:3816 | Red Hat Security Advisory: httpd:2.4 security update | httpd: mod_session: Heap overflow via a crafted SessionHeader value httpd: mod_proxy: SSRF via a crafted request uri-path containing "unix:" | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
]
| null | 9 | null | null |
RHSA-2022:0294 | Red Hat Security Advisory: parfait:0.5 security update | log4j: Remote code execution in Log4j 1.x when application is configured to use JMSAppender log4j: Remote code execution in Log4j 1.x when application is configured to use JMSSink log4j: SQL injection in Log4j 1.x when application is configured to use JDBCAppender log4j: Unsafe deserialization flaw in Chainsaw log viewer | [
"cpe:/a:redhat:rhel_e4s:8.1::appstream"
]
| null | 8.8 | null | null |
RHSA-2025:1216 | Red Hat Security Advisory: tbb security update | jquery: Untrusted code execution via <option> tag in HTML passed to DOM manipulation methods | [
"cpe:/a:redhat:rhel_aus:8.6::appstream",
"cpe:/a:redhat:rhel_e4s:8.6::appstream",
"cpe:/a:redhat:rhel_tus:8.6::appstream"
]
| null | 6.1 | null | null |
RHSA-2012:1551 | Red Hat Security Advisory: mysql security update | mysql: acl_get() stack-based buffer overflow | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
]
| null | null | null | null |
RHSA-2021:5130 | Red Hat Security Advisory: Red Hat Integration Camel-K 1.6.2 release and security update | log4j-core: Remote code execution in Log4j 2.x when logs contain an attacker-controlled string value | [
"cpe:/a:redhat:integration:1"
]
| null | 9.8 | null | null |
RHSA-2023:0210 | Red Hat Security Advisory: java-1.8.0-openjdk security and bug fix update | OpenJDK: improper restrictions in CORBA deserialization (Serialization, 8285021) OpenJDK: soundbank URL remote loading (Sound, 8293742) | [
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::crb"
]
| null | 3.7 | null | null |
RHSA-2024:6355 | Red Hat Security Advisory: bubblewrap and flatpak security update | flatpak: Access to files outside sandbox for apps using persistent= (--persist) | [
"cpe:/a:redhat:rhel_eus:9.2::appstream",
"cpe:/a:redhat:rhel_eus:9.2::crb",
"cpe:/o:redhat:rhel_eus:9.2::baseos"
]
| null | 7.4 | null | null |
RHSA-2020:0178 | Red Hat Security Advisory: kernel security and enhancement update | kernel: use-after-free in fs/xfs/xfs_super.c | [
"cpe:/o:redhat:rhel_aus:7.3::server",
"cpe:/o:redhat:rhel_e4s:7.3::server",
"cpe:/o:redhat:rhel_tus:7.3::server"
]
| null | null | 7.8 | null |
RHSA-2024:1514 | Red Hat Security Advisory: libreoffice security fix update | libreoffice: Improper Input Validation leading to arbitrary gstreamer plugin execution libreoffice: Insufficient macro permission validation leading to macro execution | [
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb"
]
| null | 8.3 | null | null |
RHSA-2013:0752 | Red Hat Security Advisory: java-1.7.0-openjdk security update | OpenJDK: sun.awt.datatransfer.ClassLoaderObjectInputStream class may incorrectly invoke the system class loader (CanSecWest 2013, AWT, 8009305) OpenJDK: JDBC driver manager improper toString calls (CanSecWest 2013, Libraries, 8009814) OpenJDK: JAXP missing security restrictions (JAXP, 6657673) OpenJDK: remote code loading enabled by default (RMI, 8001040) OpenJDK: LogStream.setDefaultStream() missing security restrictions (RMI, 8001329) OpenJDK: java.beans.ThreadGroupContext missing restrictions (Beans, 7200507) ICU: Layout Engine font layout and glyph table errors (JDK 2D, 8004994) ICU: Layout Engine font layout and glyph table errors (JDK 2D, 8004986) ICU: Layout Engine font layout and glyph table errors (JDK 2D, 8004987) OpenJDK: temporary files created with insecure permissions (JAX-WS, 8003542) OpenJDK: Network InetAddress serialization information disclosure (Networking, 8000724) ICU: Layout Engine font processing errors (JDK 2D, 8001031) OpenJDK: image processing vulnerability (2D, 8007617) OpenJDK: Hotspot MethodHandle lookup error (Hotspot, 8009699) OpenJDK: MethodUtil trampoline class incorrect restrictions (Libraries, 8009857) OpenJDK: incorrect setter access checks in MethodHandles (Hostspot, 8009677) OpenJDK: MBeanInstantiator insufficient class access checks (JMX, 8006435) OpenJDK: ConcurrentHashMap incorrectly calls defaultReadObject() method (Libraries, 8009063) OpenJDK: JPEGImageWriter state corruption (ImageIO, 8007918) OpenJDK: JPEGImageReader state corruption (ImageIO, 8007667) OpenJDK: Hotspot intrinsic frames vulnerability (Hotspot, 8004336) OpenJDK: Wrapper.convert insufficient type checks (Libraries, 8009049) | [
"cpe:/o:redhat:enterprise_linux:5::server"
]
| null | null | null | null |
RHSA-2023:1516 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.4.10 security update | SnakeYaml: Constructor Deserialization Remote Code Execution undertow: Server identity in https connection is not checked by the undertow client snakeyaml: Uncaught exception in java.base/java.util.ArrayList.hashCode hsqldb: Untrusted input may lead to RCE attack dev-java/snakeyaml: DoS via stack overflow codec-haproxy: HAProxyMessageDecoder Stack Exhaustion DoS apache-james-mime4j: Temporary File Information Disclosure in MIME4J TempFileStorageProvider RESTEasy: creation of insecure temp files Undertow: Infinite loop in SslConduit during close | [
"cpe:/a:redhat:jboss_enterprise_application_platform:7.4"
]
| null | 7.5 | null | null |
RHSA-2023:5711 | Red Hat Security Advisory: nginx security update | HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack) | [
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::crb"
]
| null | 7.5 | null | null |
RHSA-2024:6963 | Red Hat Security Advisory: gtk3 security update | gtk3: gtk2: Library injection from CWD | [
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb"
]
| null | 7 | null | null |
RHSA-2017:2494 | Red Hat Security Advisory: Red Hat JBoss Web Server 2 security update | openssl: OCSP Status Request extension unbounded memory growth SSL/TLS: Malformed plain-text ALERT packets could cause remote DoS tomcat: Incorrect handling of pipelined requests when send file was used tomcat: Security constrained bypass in error page mechanism | [
"cpe:/a:redhat:jboss_enterprise_web_server:2.1"
]
| null | null | 7.5 | null |
RHSA-2021:2445 | Red Hat Security Advisory: Red Hat Ceph Storage 4.2 Security and Bug Fix Update | ceph-dashboard: Don't use Browser's LocalStorage for storing JWT but Secure Cookies with proper HTTP Headers ceph-dashboard: Cross-site scripting via token Cookie ceph: Unauthorized global_id reuse in cephx | [
"cpe:/a:redhat:ceph_storage:4::el7",
"cpe:/a:redhat:ceph_storage:4::el8"
]
| null | 8 | null | null |
RHSA-2023:5749 | Red Hat Security Advisory: .NET 7.0 security update | HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack) | [
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::crb"
]
| null | 7.5 | null | null |
RHSA-2003:390 | Red Hat Security Advisory: : Updated gnupg packages disable ElGamal keys | security flaw | [
"cpe:/o:redhat:linux:7.1",
"cpe:/o:redhat:linux:7.2",
"cpe:/o:redhat:linux:7.3",
"cpe:/o:redhat:linux:8.0",
"cpe:/o:redhat:linux:9"
]
| null | null | null | null |
RHSA-2017:3493 | Red Hat Security Advisory: Red Hat Enterprise MRG for Red Hat Enterprise Linux 6 6-month Notice | This is the 6-month notification for the retirement of Red Hat Enterprise MRG Version 2 for Red Hat Enterprise Linux 6.
This notification applies only to those customers subscribed to Red Hat Enterprise MRG Version 2 for Red Hat Enterprise Linux 6. | [
"cpe:/a:redhat:enterprise_mrg:2:computenode:el6",
"cpe:/a:redhat:enterprise_mrg:2:server:el6"
]
| null | null | null | null |
RHSA-2006:0201 | Red Hat Security Advisory: xpdf security update | security flaw | [
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
]
| null | null | null | null |
RHSA-2016:0346 | Red Hat Security Advisory: postgresql security update | postgresql: case insensitive range handling integer overflow leading to buffer overflow | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
]
| null | null | null | null |
RHSA-2014:1110 | Red Hat Security Advisory: glibc security update | glibc: directory traversal in LC_* locale handling glibc: off-by-one error leading to a heap-based buffer overflow flaw in __gconv_translit_find() | [
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::server",
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation",
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
]
| null | null | null | null |
RHSA-2023:7770 | Red Hat Security Advisory: rh-postgresql12-postgresql security update | postgresql: Memory disclosure in aggregate function calls postgresql: Buffer overrun from integer overflow in array modification postgresql: Role pg_signal_backend can signal certain superuser processes. postgresql: extension script @substitutions@ within quoting allow SQL injection | [
"cpe:/a:redhat:rhel_software_collections:3::el7"
]
| null | 7.5 | null | null |
RHSA-2019:1907 | Red Hat Security Advisory: podman security, bug fix, and enhancement update | podman: Improper symlink resolution allows access to host files when executing `podman cp` on running containers | [
"cpe:/a:redhat:rhel_extras_other:7"
]
| null | null | 7.5 | null |
RHSA-2013:1603 | Red Hat Security Advisory: luci security, bug fix, and enhancement update | luci: short exposure of authentication secrets while generating configuration file luci: paster hidden untrusted path and "command" (callable association) injection | [
"cpe:/o:redhat:enterprise_linux:6::server"
]
| null | null | null | null |
RHSA-2016:0348 | Red Hat Security Advisory: rh-postgresql94-postgresql security update | postgresql: case insensitive range handling integer overflow leading to buffer overflow | [
"cpe:/a:redhat:rhel_software_collections:2::el6",
"cpe:/a:redhat:rhel_software_collections:2::el7"
]
| null | null | null | null |
RHSA-2017:0654 | Red Hat Security Advisory: coreutils security and bug fix update | util-linux: Sending SIGKILL to other processes with root privileges via su | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
]
| null | null | 5.5 | null |
RHSA-2019:4024 | Red Hat Security Advisory: SDL security update | SDL: not fixed in Red Hat Enterprise Linux 7 erratum RHSA-2019:3950 | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
]
| null | null | 8.1 | null |
RHSA-2010:0543 | Red Hat Security Advisory: openldap security update | OpenLDAP: Doesn't properly handle NULL character in subject Common Name openldap: modrdn processing uninitialized pointer free | [
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
]
| null | null | null | null |
RHSA-2020:2515 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.3.1 Security update | mojarra: Path traversal in ResourceManager.java:getLocalePrefix() via the loc parameter thrift: Endless loop when feed with specific input data thrift: Out-of-bounds read related to TJSONProtocol or TSimpleJSONProtocol jackson-mapper-asl: XML external entity similar to CVE-2016-3720 cxf: OpenId Connect token service does not properly validate the clientId wildfly: The 'enabled-protocols' value in legacy security is not respected if OpenSSL security provider is in use cxf: reflected XSS in the services listing page resteasy: Improper validation of response header in MediaTypeHeaderDelegate.java class Wildfly: EJBContext principal is not popped back after invoking another EJB using a different Security Domain SmallRye: SecuritySupport class is incorrectly public and contains a static method to access the current threads context class loader undertow: AJP File Read/Inclusion Vulnerability undertow: servletPath is normalized incorrectly leading to dangerous application mapping which could result in security bypass Mojarra: Path traversal via either the loc parameter or the con parameter, incomplete fix of CVE-2018-14371 cryptacular: excessive memory allocation during a decode operation jackson-databind: Lacks certain xbean-reflect/JNDI blocking jackson-databind: Serialization gadgets in shaded-hikari-config jackson-databind: Serialization gadgets in ibatis-sqlmap jackson-databind: Serialization gadgets in anteros-core RESTEasy: RESTEASY003870 exception in RESTEasy can lead to a reflected XSS attack undertow: Memory exhaustion issue in HttpReadListener via "Expect: 100-continue" header undertow: invalid HTTP request with large chunk size | [
"cpe:/a:redhat:jboss_enterprise_application_platform:7"
]
| null | 6.5 | 8.1 | null |
RHSA-2023:4770 | Red Hat Security Advisory: cups security update | cups: Information leak through Cups-Get-Document operation | [
"cpe:/a:redhat:rhel_eus:8.6::appstream",
"cpe:/o:redhat:rhel_eus:8.6::baseos"
]
| null | 6.5 | null | null |
RHSA-2023:6849 | Red Hat Security Advisory: Red Hat JBoss Fuse/A-MQ Fuse 6.3 R20 HF1 security and bug fix update | activemq-openwire: OpenWire Module: Unbounded deserialization causes ActiveMQ to be vulnerable to a remote code execution (RCE) attack | [
"cpe:/a:redhat:jboss_amq:6.3"
]
| null | 9.8 | null | null |
RHSA-2010:0394 | Red Hat Security Advisory: kernel security, bug fix, and enhancement update | kernel: ia64: ptrace: peek_or_poke requests miss ptrace_check_attach() kernel: information leak via userspace USB interface kernel: ALSA: hda-intel: Avoid divide by zero crash kernel: dvb-core: DoS bug in ULE decapsulation code kernel: ipv6: skb is unexpectedly freed | [
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
]
| null | null | null | null |
RHSA-2024:6999 | Red Hat Security Advisory: kernel security update | kernel: wifi: mac80211: Avoid address calculations via out of bounds array indexing | [
"cpe:/o:redhat:rhel_aus:7.7::server"
]
| null | 7.8 | null | null |
RHSA-2016:1939 | Red Hat Security Advisory: kernel security and bug fix update | kernel: challenge ACK counter information disclosure. | [
"cpe:/o:redhat:rhel_eus:6.6::computenode",
"cpe:/o:redhat:rhel_eus:6.6::server"
]
| null | null | 4.8 | null |
RHSA-2019:1185 | Red Hat Security Advisory: qemu-kvm security update | hardware: Microarchitectural Store Buffer Data Sampling (MSBDS) hardware: Micro-architectural Load Port Data Sampling - Information Leak (MLPDS) hardware: Microarchitectural Fill Buffer Data Sampling (MFBDS) hardware: Microarchitectural Data Sampling Uncacheable Memory (MDSUM) | [
"cpe:/o:redhat:rhel_eus:7.4::computenode",
"cpe:/o:redhat:rhel_eus:7.4::server"
]
| null | null | 3.8 | null |
RHSA-2013:0574 | Red Hat Security Advisory: flash-plugin security update | flash-plugin: multiple code execution flaws (APSB13-08) flash-plugin: Firefox sandbox permissions issue (APSB13-08) flash-plugin: multiple code execution flaws (APSB13-08) | [
"cpe:/a:redhat:rhel_extras:5::server",
"cpe:/a:redhat:rhel_extras:6"
]
| null | null | null | null |
RHSA-2020:0637 | Red Hat Security Advisory: Red Hat Satellite 5 - 90 day End Of Life Notice | This is the 90 day notification of the End Of Life (EOL) plans for the
following versions of Red Hat Satellite 5:
* Red Hat Satellite 5.8 on Red Hat Enterprise Linux 6 | [
"cpe:/a:redhat:network_satellite:5.8::el6"
]
| null | null | null | null |
RHSA-2016:0497 | Red Hat Security Advisory: git19-git security update | git: path_name() integer truncation and overflow leading to buffer overflow git: path_name() integer truncation and overflow leading to buffer overflow | [
"cpe:/a:redhat:rhel_software_collections:2::el6",
"cpe:/a:redhat:rhel_software_collections:2::el7"
]
| null | null | null | null |
RHSA-2019:2869 | Red Hat Security Advisory: kernel security and bug fix update | kernel: vhost-net: guest to host kernel escape during migration | [
"cpe:/o:redhat:rhel_aus:6.6::server"
]
| null | null | 7.2 | null |
RHSA-2019:4358 | Red Hat Security Advisory: openstack-keystone security update | openstack-keystone: Credentials API allows non-admin to list and retrieve all users credentials | [
"cpe:/a:redhat:openstack:15::el8"
]
| null | null | 8.1 | null |
RHSA-2019:0593 | Red Hat Security Advisory: openstack-octavia security update | openstack-octavia: Private keys written to world-readable log files | [
"cpe:/a:redhat:openstack:14::el7"
]
| null | null | 5.5 | null |
RHSA-2022:0260 | Red Hat Security Advisory: Red Hat OpenStack Platform 16.1 (etcd) security update | golang: net: incorrect parsing of extraneous zero characters at the beginning of an IP address octet golang: crypto/tls: certificate of wrong type is causing TLS client to panic golang: net/http: limit growth of header canonicalization cache | [
"cpe:/a:redhat:openstack:16.1::el8"
]
| null | 7.5 | null | null |
RHSA-2022:4722 | Red Hat Security Advisory: subversion:1.14 security update | subversion: Subversion's mod_dav_svn is vulnerable to memory corruption | [
"cpe:/a:redhat:rhel_eus:8.4::appstream"
]
| null | 7.5 | null | null |
RHSA-2014:1686 | Red Hat Security Advisory: openstack-neutron security and bug fix update | openstack-neutron: Admin-only network attributes may be reset to defaults by non-privileged users | [
"cpe:/a:redhat:openstack:4::el6"
]
| null | null | null | null |
RHSA-2015:0442 | Red Hat Security Advisory: ipa security, bug fix, and enhancement update | jquery-ui: XSS vulnerability in jQuery.ui.dialog title option jquery-ui: XSS vulnerability in default content in Tooltip widget | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
]
| null | null | null | null |
RHSA-2021:1063 | Red Hat Security Advisory: openssl security update | openssl: NULL pointer dereference in signature_algorithms processing | [
"cpe:/o:redhat:rhel_eus:8.2::baseos"
]
| null | 5.9 | null | null |
RHSA-2024:7442 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 8.0 security update | undertow: Improper State Management in Proxy Protocol parsing causes information leakage ion-java: ion-java: Ion Java StackOverflow vulnerability | [
"cpe:/a:redhat:jboss_enterprise_application_platform:8.0"
]
| null | 7.5 | null | null |
RHSA-2018:2616 | Red Hat Security Advisory: RHGS WA security, bug fix, and enhancement update | tendrl-api: Improper cleanup of session token can allow attackers to hijack user sessions | [
"cpe:/a:redhat:storage:3.4:na:el7",
"cpe:/a:redhat:storage:3.4:wa:el7"
]
| null | null | 4.2 | null |
RHSA-2019:4019 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.2.5 on RHEL 7 security update | HTTP/2: large amount of data requests leads to denial of service HTTP/2: flood using PING frames results in unbounded memory growth HTTP/2: flood using HEADERS frames results in unbounded memory growth HTTP/2: flood using SETTINGS frames results in unbounded memory growth wildfly-core: Incorrect privileges for 'Monitor', 'Auditor' and 'Deployer' user by default wildfly-security-manager: security manager authorization bypass | [
"cpe:/a:redhat:jboss_enterprise_application_platform:7.2::el7"
]
| null | null | 7.5 | null |
RHSA-2017:3260 | Red Hat Security Advisory: samba security update | samba: Use-after-free in processing SMB1 requests samba: Server heap-memory disclosure | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
]
| null | null | 4.3 | null |
RHSA-2017:0932 | Red Hat Security Advisory: kernel-rt security and bug fix update | kernel: Null pointer dereference via keyctl kernel: Signed overflow for SO_{SND|RCV}BUFFORCE kernel: Off-by-one error in selinux_setprocattr (/proc/self/attr/fscreate) kernel: Race condition access to n_hdlc.tbuf causes double free in n_hdlc_release() kernel: use after free in dccp protocol | [
"cpe:/a:redhat:enterprise_mrg:2:server:el6"
]
| null | null | 7.8 | null |
RHSA-2024:9302 | Red Hat Security Advisory: emacs security update | emacs: Gnus treats inline MIME contents as trusted emacs: LaTeX preview is enabled by default for e-mail attachments emacs: Org mode considers contents of remote files to be trusted | [
"cpe:/a:redhat:enterprise_linux:9::appstream"
]
| null | 7.8 | null | null |
RHBA-2019:2715 | Red Hat Bug Fix Advisory: virt:rhel bug fix update | QEMU: slirp: heap buffer overflow during packet reassembly | [
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb"
]
| null | null | 7 | null |
RHSA-2024:2764 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 8.0 security update | undertow: unrestricted request storage leads to memory exhaustion undertow: Cookie Smuggling/Spoofing undertow: directory traversal vulnerability | [
"cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el8",
"cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el9"
]
| null | 5.3 | null | null |
RHSA-2016:0305 | Red Hat Security Advisory: openssl security update | OpenSSL: SSLv2 doesn't block disabled ciphers SSL/TLS: Cross-protocol attack on TLS using SSLv2 (DROWN) | [
"cpe:/o:redhat:rhel_eus:6.6::computenode",
"cpe:/o:redhat:rhel_eus:6.6::server",
"cpe:/o:redhat:rhel_eus:7.1::computenode",
"cpe:/o:redhat:rhel_eus:7.1::server"
]
| null | null | null | null |
RHSA-2017:2585 | Red Hat Security Advisory: kernel-rt security and bug fix update | kernel: a race between inotify_handle_event() and sys_rename() | [
"cpe:/a:redhat:rhel_extras_rt:7"
]
| null | null | 7.8 | null |
RHSA-2019:2037 | Red Hat Security Advisory: fence-agents security, bug fix, and enhancement update | fence-agents: mis-handling of non-ASCII characters in guest comment fields | [
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
]
| null | null | 5 | null |
RHSA-2024:1700 | Red Hat Security Advisory: Errata Advisory for Red Hat OpenShift GitOps v1.10.4 security update | CD: Users with `create` but not `override` privileges can perform local sync argo-cd: Bypassing Brute Force Protection via Application Crash and In-Memory Data Loss argo-cd: Denial of Service Due to Unsafe Array Modification in Multi-threaded Environment argo-cd: Bypassing Rate Limit and Brute Force Protection Using Cache Overflow argo-cd: uncontrolled memory allocation vulnerability | [
"cpe:/a:redhat:openshift_gitops:1.10::el8"
]
| null | 6.5 | null | null |
RHSA-2024:5279 | Red Hat Security Advisory: python3.11-setuptools security update | pypa/setuptools: Remote code execution via download functions in the package_index module in pypa/setuptools | [
"cpe:/a:redhat:enterprise_linux:9::appstream"
]
| null | 8.8 | null | null |
RHSA-2024:2936 | Red Hat Security Advisory: go-toolset:rhel8 security update | golang: net/http, x/net/http2: unlimited number of CONTINUATION frames causes DoS | [
"cpe:/a:redhat:rhel_eus:8.8::appstream"
]
| null | 7.5 | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.