id
stringlengths 13
15
| title
stringlengths 29
176
| description
stringlengths 8
32.1k
| cpes
listlengths 0
20
| cvss_v4_0
null | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
null |
---|---|---|---|---|---|---|---|
RHSA-2022:4805 | Red Hat Security Advisory: postgresql:10 security update | postgresql: Autovacuum, REINDEX, and others omit "security restricted operation" sandbox | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
]
| null | 8.8 | null | null |
RHSA-2020:3011 | Red Hat Security Advisory: NetworkManager security and bug fix update | NetworkManager: user configuration not honoured leaving the connection unauthenticated via insecure defaults | [
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb",
"cpe:/o:redhat:enterprise_linux:8::baseos"
]
| null | 4.3 | null | null |
RHSA-2013:0195 | Red Hat Security Advisory: JBoss Enterprise Web Platform 5.2.0 update | JBoss: twiddle.sh accepts credentials as command line arguments, exposing them to other local users via a process listing jbossws: Prone to character encoding pattern attack (XML Encryption flaw) jbossws: Prone to Bleichenbacher attack against to be distributed symmetric key Framework: Information (internal server information, classpath, local working directories, session IDs) disclosure CSRF on jmx-console allows invocation of operations on mbeans Console: XSS in invoke operation Cache: NonManagedConnectionFactory will log password in clear text when an exception occurs JBoss invoker servlets do not require authentication JGroups diagnostics service enabled by default with no authentication when a JGroups channel is started apache-cxf: Apache CXF does not verify that elements were signed / encrypted by a particular Supporting Token JBoss: CallerIdentityLoginModule retaining password from previous call if a null password is provided JBoss: SecurityAssociation.getCredential() will return the previous credential if no security context is provided Web: Bypass of security constraints JBoss: AuthorizationInterceptor allows JMX operation to proceed despite authorization failure | [
"cpe:/a:redhat:jboss_enterprise_web_platform:5::el6"
]
| null | null | null | null |
RHSA-2025:3620 | Red Hat Security Advisory: firefox security update | firefox: thunderbird: Use-after-free triggered by XSLTProcessor firefox: thunderbird: URL Bar Spoofing via non-BMP Unicode characters firefox: thunderbird: Memory safety bugs fixed in Firefox 137, Thunderbird 137, Firefox ESR 128.9, and Thunderbird 128.9 | [
"cpe:/a:redhat:rhel_eus:8.8::appstream"
]
| null | 8.8 | null | null |
RHSA-2024:0265 | Red Hat Security Advisory: java-1.8.0-openjdk security and bug fix update | OpenJDK: array out-of-bounds access due to missing range check in C1 compiler (8314468) OpenJDK: JVM class file verifier flaw allows unverified bytecode execution (8314295) OpenJDK: range check loop optimization issue (8314307) OpenJDK: arbitrary Java code execution in Nashorn (8314284) OpenJDK: logging of digital signature private keys (8316976) OpenJDK: RSA padding issue and timing side-channel attack against TLS (8317547) | [
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb",
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::crb",
"cpe:/a:redhat:rhel_eus:8.8::appstream",
"cpe:/a:redhat:rhel_eus:8.8::crb",
"cpe:/a:redhat:rhel_eus:9.2::appstream",
"cpe:/a:redhat:rhel_eus:9.2::crb"
]
| null | 7.4 | null | null |
RHSA-2012:0434 | Red Hat Security Advisory: flash-plugin security update | flash-plugin: arbitrary code execution via memory corruption flaw in NetStream class (APSB12-07) | [
"cpe:/a:redhat:rhel_extras:5::client",
"cpe:/a:redhat:rhel_extras:5::server",
"cpe:/a:redhat:rhel_extras:6"
]
| null | null | null | null |
RHSA-2010:0039 | Red Hat Security Advisory: gcc and gcc4 security update | libtool: libltdl may load and execute code from a library in the current directory | [
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws",
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws",
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
]
| null | null | null | null |
RHSA-2020:2783 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 6.4.23 security update | EAP: Vault system property security attribute value is revealed on CLI 'reload' command tomcat: Apache Tomcat AJP File Read/Inclusion Vulnerability | [
"cpe:/a:redhat:jboss_enterprise_application_platform:6.4"
]
| null | 7.6 | 5.4 | null |
RHSA-2016:1025 | Red Hat Security Advisory: pcre security update | pcre: infinite recursion compiling pattern with recursive reference in a group with indefinite repeat (8.36/20) pcre: stack overflow caused by mishandled group empty match (8.38/11) pcre: buffer overflow for forward reference within backward assertion with excess closing parenthesis (8.38/18) pcre: buffer overflow caused by named forward reference to duplicate group number (8.38/30) pcre: Buffer overflow caused by lookbehind assertion (8.38/6) pcre: buffer overflow for forward reference within backward assertion with excess closing parenthesis (8.38/18) pcre: inefficient posix character class syntax check (8.38/16) pcre: workspace overflow for (*ACCEPT) with deeply nested parentheses (8.39/13, 10.22/12) | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
]
| null | null | null | null |
RHBA-2016:0583 | Red Hat Bug Fix Advisory: Red Hat Enterprise Virtualization Manager 3.6.4 | ovirt-engine: Crash of API when parsing unxepected version number | [
"cpe:/a:redhat:rhev_manager:3"
]
| null | null | null | null |
RHSA-2019:0782 | Red Hat Security Advisory: rh-maven35-jackson-databind security update | jackson-databind: Potential information exfiltration with default typing, serialization gadget from MyBatis jackson-databind: improper polymorphic deserialization of types from Jodd-db library jackson-databind: improper polymorphic deserialization of types from Oracle JDBC driver jackson-databind: arbitrary code execution in slf4j-ext class jackson-databind: arbitrary code execution in blaze-ds-opt and blaze-ds-core classes jackson-databind: exfiltration/XXE in some JDK classes jackson-databind: server-side request forgery (SSRF) in axis2-jaxws class jackson-databind: improper polymorphic deserialization in axis2-transport-jms class jackson-databind: improper polymorphic deserialization in openjpa class jackson-databind: improper polymorphic deserialization in jboss-common-core class | [
"cpe:/a:redhat:rhel_software_collections:3::el7"
]
| null | null | 7.3 | null |
RHSA-2013:1170 | Red Hat Security Advisory: mongodb and pymongo security and enhancement update | MongoDB: Server Side JavaScript Includes allow Remote Code Execution pymongo: null pointer when decoding invalid DBRef | [
"cpe:/a:redhat:enterprise_mrg:2:server:el6"
]
| null | null | null | null |
RHSA-2022:5344 | Red Hat Security Advisory: kernel-rt security and bug fix update | kernel: out-of-bounds read in fbcon_get_font function kernel: buffer overflow in IPsec ESP transformation code | [
"cpe:/a:redhat:enterprise_linux:8::nfv",
"cpe:/a:redhat:enterprise_linux:8::realtime"
]
| null | 7.8 | null | null |
RHSA-2006:0682 | Red Hat Security Advisory: php security update | security flaw security flaw security flaw security flaw | [
"cpe:/o:redhat:enterprise_linux:2.1::as",
"cpe:/o:redhat:enterprise_linux:2.1::aw",
"cpe:/o:redhat:enterprise_linux:2.1::es",
"cpe:/o:redhat:enterprise_linux:2.1::ws"
]
| null | null | null | null |
RHSA-2020:5199 | Red Hat Security Advisory: kernel security update | kernel: metadata validator in XFS may cause an inode with a valid, user-creatable extended attribute to be flagged as corrupt kernel: memory corruption in net/packet/af_packet.c leads to elevation of privilege | [
"cpe:/o:redhat:rhel_e4s:8.0::baseos"
]
| null | 7.8 | null | null |
RHSA-2012:1042 | Red Hat Security Advisory: kernel security and bug fix update | kernel: kvm: device assignment DoS kernel: xfs heap overflow kernel: drm: integer overflow in drm_mode_dirtyfb_ioctl() kernel: regset: Prevent null pointer reference on readonly regsets kernel: thp: __split_huge_page() mapcount != page_mapcount BUG_ON() | [
"cpe:/o:redhat:rhel_eus:6.1"
]
| null | null | null | null |
RHSA-2020:4025 | Red Hat Security Advisory: qt5-qtbase security update | qt: files placed by attacker can influence the working directory and lead to malicious code execution qt: files placed by attacker can influence the working directory and lead to malicious code execution | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
]
| null | 7.3 | null | null |
RHSA-2022:6504 | Red Hat Security Advisory: openvswitch2.17 security update | dpdk: error recovery in mlx5 driver not handled properly, allowing for denial of service | [
"cpe:/o:redhat:enterprise_linux:8::fastdatapath"
]
| null | 6.5 | null | null |
RHSA-2024:5908 | Red Hat Security Advisory: bind security update | bind: bind9: BIND's database will be slow if a very large number of RRs exist at the same nam bind9: bind: SIG(0) can be used to exhaust CPU resources | [
"cpe:/a:redhat:rhel_aus:8.6::appstream",
"cpe:/a:redhat:rhel_e4s:8.6::appstream",
"cpe:/a:redhat:rhel_tus:8.6::appstream",
"cpe:/o:redhat:rhel_aus:8.6::baseos",
"cpe:/o:redhat:rhel_e4s:8.6::baseos",
"cpe:/o:redhat:rhel_tus:8.6::baseos"
]
| null | 7.5 | null | null |
RHSA-2023:7872 | Red Hat Security Advisory: gstreamer1-plugins-bad-free security update | gstreamer: MXF demuxer use-after-free vulnerability | [
"cpe:/a:redhat:rhel_eus:8.6::appstream",
"cpe:/a:redhat:rhel_eus:8.6::crb"
]
| null | 8.8 | null | null |
RHSA-2023:3470 | Red Hat Security Advisory: kernel-rt security and bug fix update | kernel: net/ulp: use-after-free in listening ULP sockets kernel: udmabuf: improper validation of array index leading to local privilege escalation kernel: netfilter: use-after-free in nf_tables when processing batch requests can lead to privilege escalation | [
"cpe:/a:redhat:rhel_eus:9.0::nfv",
"cpe:/a:redhat:rhel_eus:9.0::realtime"
]
| null | 7.8 | null | null |
RHSA-2014:1037 | Red Hat Security Advisory: cfme security and bug fix update | CFME: AgentController get/log application log forging | [
"cpe:/a:redhat:cloudforms_managementengine:5::el6"
]
| null | null | null | null |
RHSA-2022:1935 | Red Hat Security Advisory: php:7.4 security update | php: Local privilege escalation via PHP-FPM php: SSRF bypass in FILTER_VALIDATE_URL | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
]
| null | 5.3 | null | null |
RHSA-2007:0062 | Red Hat Security Advisory: java-1.4.2-ibm security update | openssl signature forgery security flaw security flaw security flaw security flaw | [
"cpe:/a:redhat:rhel_extras:3",
"cpe:/a:redhat:rhel_extras:4"
]
| null | null | null | null |
RHSA-2009:1337 | Red Hat Security Advisory: gfs2-utils security and bug fix update | rgmanager: multiple insecure temporary file use issues | [
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::server"
]
| null | null | null | null |
RHSA-2020:3908 | Red Hat Security Advisory: cpio security update | cpio: improper input validation when writing tar header fields leads to unexpected tar generation | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
]
| null | null | 6.7 | null |
RHSA-2005:201 | Red Hat Security Advisory: squid security update | security flaw | [
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
]
| null | null | null | null |
RHSA-2024:1438 | Red Hat Security Advisory: nodejs security update | nodejs: reading unprocessed HTTP request with unbounded chunk extension allows DoS attacks | [
"cpe:/a:redhat:enterprise_linux:9::appstream"
]
| null | 7.5 | null | null |
RHSA-2023:1875 | Red Hat Security Advisory: java-11-openjdk security update | OpenJDK: improper connection handling during TLS handshake (8294474) OpenJDK: missing string checks for NULL characters (8296622) OpenJDK: incorrect handling of NULL characters in ProcessBuilder (8295304) OpenJDK: Swing HTML parsing issue (8296832) OpenJDK: incorrect enqueue of references in garbage collector (8298191) OpenJDK: certificate validation issue in TLS session negotiation (8298310) OpenJDK: missing check for slash characters in URI-to-path conversion (8298667) | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
]
| null | 3.7 | null | null |
RHSA-2011:1109 | Red Hat Security Advisory: foomatic security update | foomatic: Improper sanitization of command line option in foomatic-rip | [
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws",
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::server"
]
| null | null | null | null |
RHSA-2018:1353 | Red Hat Security Advisory: kernel security update | Kernel: error in exception handling leads to DoS | [
"cpe:/o:redhat:rhel_els:5"
]
| null | null | 6.5 | null |
RHSA-2018:0115 | Red Hat Security Advisory: java-1.6.0-sun security update | OpenJDK: unsynchronized access to encryption key data (Libraries, 8172525) OpenJDK: LdapLoginModule insufficient username encoding in LDAP query (LDAP, 8178449) OpenJDK: DnsClient missing source port randomization (JNDI, 8182125) OpenJDK: loading of classes from untrusted locations (I18n, 8182601) OpenJDK: DerValue unbounded memory allocation (Libraries, 8182387) OpenJDK: insufficient strength of key agreement (JCE, 8185292) OpenJDK: GSS context use-after-free (JGSS, 8186212) OpenJDK: LDAPCertStore insecure handling of LDAP referrals (JNDI, 8186606) OpenJDK: SingleEntryRegistry incorrect setup of deserialization filter (JMX, 8186998) OpenJDK: GTK library loading use-after-free (AWT, 8185325) JDK: unspecified vulnerability fixed in 6u181 and 7u171 (Serialization) OpenJDK: ArrayBlockingQueue deserialization to an inconsistent state (Libraries, 8189284) OpenJDK: unbounded memory allocation during deserialization (AWT, 8190289) OpenJDK: unbounded memory allocation in BasicAttributes deserialization (JNDI, 8191142) | [
"cpe:/a:redhat:rhel_extras_oracle_java:6",
"cpe:/a:redhat:rhel_extras_oracle_java:7"
]
| null | null | 4.3 | null |
RHEA-2021:2679 | Red Hat Enhancement Advisory: ACS 3.62 enhancement update | golang: net/http: panic in ReadRequest and ReadResponse when reading a very large header | [
"cpe:/a:redhat:advanced_cluster_security:3.62::el8"
]
| null | 5.9 | null | null |
RHSA-2024:10667 | Red Hat Security Advisory: thunderbird security update | thunderbird: Potential disclosure of plaintext in OpenPGP encrypted message firefox: thunderbird: Select list elements could be shown over another site firefox: thunderbird: CSP Bypass and XSS Exposure via Web Compatibility Shims firefox: thunderbird: URL Bar Spoofing via Manipulated Punycode and Whitespace Characters firefox: thunderbird: Unhandled Exception in Add-on Signature Verification firefox: thunderbird: Improper Keypress Handling in Executable File Confirmation Dialog firefox: thunderbird: Memory safety bugs fixed in Firefox 133, Thunderbird 133, Firefox ESR 128.5, and Thunderbird 128.5 | [
"cpe:/a:redhat:rhel_eus:9.2::appstream"
]
| null | 8.8 | null | null |
RHSA-2018:3007 | Red Hat Security Advisory: java-1.6.0-sun security update | JDK: unspecified vulnerability fixed in 6u201, 7u191, 8u181, and 10.0.2 (Libraries) OpenJDK: insufficient index validation in PatternSyntaxException getMessage() (Concurrency, 8199547) JDK: unspecified vulnerability fixed in 6u201, 7u191, 8u181, and 10.0.2 (JSSE) OpenJDK: Incorrect handling of unsigned attributes in signed Jar manifests (Security, 8194534) OpenJDK: Leak of sensitive header data via HTTP redirect (Networking, 8196902) OpenJDK: Incomplete enforcement of the trustURLCodebase restriction (JNDI, 8199177) OpenJDK: Missing endpoint identification algorithm check during TLS session resumption (JSSE, 8202613) OpenJDK: Infinite loop in RIFF format reader (Sound, 8205361) libpng: Integer overflow and resultant divide-by-zero in pngrutil.c:png_check_chunk_length() allows for denial of service | [
"cpe:/a:redhat:rhel_extras_oracle_java:7"
]
| null | null | 6.5 | null |
RHSA-2023:0099 | Red Hat Security Advisory: virt:rhel and virt-devel:rhel security and bug fix update | QEMU: QXL: qxl_phys2virt unsafe address translation can lead to out-of-bounds read | [
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb"
]
| null | 6.5 | null | null |
RHSA-2023:6219 | Red Hat Security Advisory: Red Hat Service Interconnect security update | skupper-operator: privelege escalation via config map | [
"cpe:/a:redhat:service_interconnect:1::el9"
]
| null | 6.8 | null | null |
RHSA-2019:0265 | Red Hat Security Advisory: Red Hat Gluster Storage Web Administration security update | django: Catastrophic backtracking in regular expressions via 'urlize' and 'urlizetrunc' django: Catastrophic backtracking in regular expressions via 'truncatechars_html' and 'truncatewords_html' django: Open redirect possibility in CommonMiddleware | [
"cpe:/a:redhat:storage:3.4:na:el7",
"cpe:/a:redhat:storage:3.4:wa:el7"
]
| null | null | 4.7 | null |
RHSA-2021:1068 | Red Hat Security Advisory: flatpak security update | flatpak: "file forwarding" feature can be used to gain unprivileged access to files | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
]
| null | 8.1 | null | null |
RHSA-2018:1972 | Red Hat Security Advisory: Red Hat CloudForms security, bug fix, and enhancement update | ansible-tower: Privilege escalation flaw allows for organization admins to obtain system privileges ansible-tower: Remote code execution by users with access to define variables in job templates python-paramiko: Authentication bypass in transport.py | [
"cpe:/a:redhat:cloudforms_managementengine:5.8::el7"
]
| null | null | 9.8 | null |
RHSA-2021:4591 | Red Hat Security Advisory: gcc-toolset-11-annobin security update | environment: Unicode's bidirectional (BiDi) override characters can cause trojan source attacks | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
]
| null | 8.5 | null | null |
RHSA-2019:2052 | Red Hat Security Advisory: libjpeg-turbo security update | libjpeg: null pointer dereference in cjpeg libjpeg-turbo: Divide By Zero in alloc_sarray function in jmemmgr.c libjpeg: Segmentation fault in get_text_gray_row function in rdppm.c libjpeg: Segmentation fault in get_text_rgb_row function in rdppm.c libjpeg: "cjpeg" utility large loop because read_pixel in rdtarga.c mishandles EOF libjpeg-turbo: heap-based buffer over-read via crafted 8-bit BMP in get_8bit_row in rdbmp.c leads to denial of service | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
]
| null | null | 4.4 | null |
RHSA-2004:342 | Red Hat Security Advisory: httpd security update | mod_ssl ssl_util_uuencode_binary CA issue security flaw | [
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws"
]
| null | null | null | null |
RHSA-2017:0257 | Red Hat Security Advisory: ovirt-engine-extension-aaa-jdbc security update | rhev-m-4: Fails to validate existing expired passwords when changing a password | [
"cpe:/a:redhat:rhev_manager:4"
]
| null | null | 6.8 | null |
RHSA-2008:0544 | Red Hat Security Advisory: php security update | php crash in glob() and fnmatch() functions php htmlentities/htmlspecialchars multibyte sequences php session ID leakage PHP multibyte shell escape flaw PHP 32 bit weak random seed PHP weak 64 bit random seed | [
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
]
| null | null | null | null |
RHSA-2009:0258 | Red Hat Security Advisory: thunderbird security update | Firefox layout crashes with evidence of memory corruption Firefox javascript crashes with evidence of memory corruption Firefox local file stealing with SessionStore Firefox 2 and 3 - Layout engine crashes Firefox 2 and 3 crashes in the JavaScript engine Firefox XUL Linked Clones Double Free Vulnerability Firefox XML data theft via RDFXMLDataSource and cross-domain redirect | [
"cpe:/a:redhat:rhel_productivity:5",
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws",
"cpe:/o:redhat:enterprise_linux:5::client"
]
| null | null | null | null |
RHSA-2024:1897 | Red Hat Security Advisory: OpenShift Container Platform 4.14.22 packages and security update | golang: net/http, x/net/http2: unlimited number of CONTINUATION frames causes DoS golang-fips/openssl: Memory leaks in code encrypting and decrypting RSA payloads | [
"cpe:/a:redhat:openshift:4.14::el8",
"cpe:/a:redhat:openshift:4.14::el9"
]
| null | 7.5 | null | null |
RHSA-2020:3016 | Red Hat Security Advisory: kernel-rt security and bug fix update | kernel: kvm: Information leak within a KVM guest kernel: use-after-free in sound/core/timer.c kernel: kernel: DAX hugepages not considered during mremap kernel: Rogue cross-process SSBD shutdown. Linux scheduler logical bug allows an attacker to turn off the SSBD protection. kernel: Indirect Branch Prediction Barrier is force-disabled when STIBP is unavailable or enhanced IBRS is available. kernel: Indirect branch speculation can be enabled after it was force-disabled by the PR_SPEC_FORCE_DISABLE prctl command. kernel: buffer overflow in mwifiex_cmd_append_vsie_tlv function in drivers/net/wireless/marvell/mwifiex/scan.c kernel: heap-based buffer overflow in mwifiex_ret_wmm_get_status function in drivers/net/wireless/marvell/mwifiex/wmm.c Kernel: vfio: access to disabled MMIO space of some devices may lead to DoS scenario | [
"cpe:/a:redhat:enterprise_linux:8::nfv",
"cpe:/a:redhat:enterprise_linux:8::realtime"
]
| null | 5.3 | null | null |
RHSA-2024:0876 | Red Hat Security Advisory: kpatch-patch security update | kernel: net/sched: sch_hfsc UAF kernel: use-after-free in sch_qfq network scheduler kernel: IGB driver inadequate buffer size for frames larger than MTU kernel: ktls overwrites readonly memory pages when using function splice with a ktls socket as destination | [
"cpe:/o:redhat:enterprise_linux:8::baseos"
]
| null | 7 | null | null |
RHSA-2019:0001 | Red Hat Security Advisory: rh-perl526-perl security and enhancement update | perl: Integer overflow leading to buffer overflow in Perl_my_setenv() perl: Heap-based buffer overflow in S_handle_regex_sets() perl: Heap-based buffer read overflow in S_grok_bslash_N() perl: Heap-based buffer overflow in S_regatom() | [
"cpe:/a:redhat:rhel_software_collections:3::el7"
]
| null | null | 7 | null |
RHSA-2015:0642 | Red Hat Security Advisory: thunderbird security update | Mozilla: Reading of local files through manipulation of form autocomplete (MFSA 2015-24) Mozilla: Out-of-bounds read and write while rendering SVG content (MFSA 2015-19) Mozilla: Use-after-free in IndexedDB (MFSA 2015-16) Mozilla: Miscellaneous memory safety hazards (rv:31.5) (MFSA 2015-11) | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
]
| null | null | null | null |
RHSA-2024:0241 | Red Hat Security Advisory: java-17-openjdk security and bug fix update | OpenJDK: array out-of-bounds access due to missing range check in C1 compiler (8314468) OpenJDK: JVM class file verifier flaw allows unverified bytecode execution (8314295) OpenJDK: range check loop optimization issue (8314307) OpenJDK: incorrect handling of ZIP files with duplicate entries (8276123) OpenJDK: logging of digital signature private keys (8316976) OpenJDK: RSA padding issue and timing side-channel attack against TLS (8317547) | [
"cpe:/a:redhat:rhel_aus:8.4::appstream",
"cpe:/a:redhat:rhel_e4s:8.4::appstream",
"cpe:/a:redhat:rhel_tus:8.4::appstream"
]
| null | 7.4 | null | null |
RHSA-2015:0809 | Red Hat Security Advisory: java-1.8.0-openjdk security update | jar: directory traversal vulnerability OpenJDK: incorrect handling of phantom references (Hotspot, 8071931) ICU: layout engine glyphStorage off-by-one (OpenJDK 2D, 8067699) OpenJDK: incorrect handling of default methods (Hotspot, 8065366) OpenJDK: incorrect permissions check in resource loading (Beans, 8068320) OpenJDK: insufficient hardening of RSA-CRT implementation (JCE, 8071726) OpenJDK: jar directory traversal issues (Tools, 8064601) OpenJDK: certificate options parsing uncaught exception (JSSE, 8068720) | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation",
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
]
| null | null | null | null |
RHSA-2009:1038 | Red Hat Security Advisory: java-1.5.0-ibm security update | OpenJDK remote LDAP Denial-Of-Service (6717680) OpenJDK LDAP client remote code execution (6737315) OpenJDK Pack200 Buffer overflow vulnerability (6792554) OpenJDK Pack200 Buffer overflow vulnerability (6792554) OpenJDK: PNG and GIF processing buffer overflow vulnerabilities (6804996, 6804997) OpenJDK GIF processing buffer overflow vulnerability (6804998) OpenJDK: Type1 font processing buffer overflow vulnerability OpenJDK: DoS (disk consumption) via handling of temporary font files OpenJDK JAX-WS service endpoint remote Denial-of-Service (6630639) OpenJDK: Files disclosure, arbitrary code execution via "deserializing applets" (6646860) OpenJDK: Intended access restrictions bypass via LiveConnect (6724331) OpenJDK: Possibility of trusted applet run in older, vulnerable version of JRE (6706490) OpenJDK: Improper parsing of crossdomain.xml files (intended access restriction bypass) (6798948) OpenJDK: Signed applet remote misuse possibility (6782871) | [
"cpe:/a:redhat:rhel_extras:4",
"cpe:/a:redhat:rhel_extras:5::client",
"cpe:/a:redhat:rhel_extras:5::server"
]
| null | null | null | null |
RHEA-2015:1077 | Red Hat Enhancement Advisory: Red Hat JBoss Enterprise Application Platform 6.4.1 update | EAP: LDAP bind password is being logged with TRACE log level | [
"cpe:/a:redhat:jboss_enterprise_application_platform:6.4"
]
| null | null | null | null |
RHSA-2025:4187 | Red Hat Security Advisory: Red Hat OpenStack Platform 17.1 (python-django) security update | python-django: Potential regular expression denial-of-service in django.utils.text.Truncator.words() | [
"cpe:/a:redhat:openstack:17.1::el9"
]
| null | 7.5 | null | null |
RHSA-2009:0332 | Red Hat Security Advisory: flash-plugin security update | flash-plugin: Input validation flaw (DoS) flash-plugin: Buffer overflow (arbitrary code execution) via crafted SWF file. flash-plugin: Linux-specific information disclosure (privilege escalation) | [
"cpe:/a:redhat:rhel_extras:5::client",
"cpe:/a:redhat:rhel_extras:5::server"
]
| null | null | null | null |
RHSA-2023:6803 | Red Hat Security Advisory: squid:4 security update | squid: Request/Response smuggling in HTTP/1.1 and ICAP squid: Denial of Service in HTTP Digest Authentication | [
"cpe:/a:redhat:rhel_aus:8.2::appstream",
"cpe:/a:redhat:rhel_e4s:8.2::appstream",
"cpe:/a:redhat:rhel_tus:8.2::appstream"
]
| null | 8.6 | null | null |
RHSA-2024:8130 | Red Hat Security Advisory: python3.9 security update | python: cpython: tarfile: ReDos via excessive backtracking while parsing header values | [
"cpe:/a:redhat:rhel_e4s:9.0::appstream",
"cpe:/o:redhat:rhel_e4s:9.0::baseos"
]
| null | 7.5 | null | null |
RHSA-2021:4226 | Red Hat Security Advisory: grafana security, bug fix, and enhancement update | golang: crypto/elliptic: incorrect operations on the P-224 curve grafana: snapshot feature allow an unauthenticated remote attacker to trigger a DoS via a remote API call golang: net: lookup functions may return invalid host names golang: net/http/httputil: ReverseProxy forwards connection headers if first one is empty golang: crypto/tls: certificate of wrong type is causing TLS client to panic | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
]
| null | 6.5 | null | null |
RHSA-2023:2932 | Red Hat Security Advisory: edk2 security update | openssl: timing attack in RSA Decryption implementation openssl: double free after calling PEM_read_bio_ex openssl: use-after-free following BIO_new_NDEF openssl: X.400 address type confusion in X.509 GeneralName | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
]
| null | 7.4 | null | null |
RHSA-2021:2500 | Red Hat Security Advisory: Red Hat OpenShift Enterprise security and bug fix update | nodejs-handlebars: lookup helper fails to properly validate templates allowing for arbitrary JavaScript execution nodejs-handlebars: an endless loop while processing specially-crafted templates leads to DoS nodejs-handlebars: Remote code execution when compiling untrusted compile templates with strict:true option nodejs-handlebars: Remote code execution when compiling untrusted compile templates with compat:true option | [
"cpe:/a:redhat:openshift:4.6::el8"
]
| null | 9.8 | null | null |
RHSA-2018:3004 | Red Hat Security Advisory: chromium-browser security update | chromium-browser: Lack of limits on update() in ServiceWorker lcms2: Integer overflow in AllocateDataSet() in cmscgats.c leading to heap-based buffer overflow chromium-browser: Sandbox escape in AppCache chromium-browser: Remote code execution in V8 chromium-browser: URL spoof in Omnibox chromium-browser: Use after free in V8 firefox: Memory corruption in Angle chromium-browser: URL spoof in Omnibox chromium-browser: Cross-origin URL disclosure in Blink chromium-browser: Heap buffer overflow in PDFium chromium-browser: Memory corruption in GPU Internals chromium-browser: Security UI occlusion in full screen mode chromium-browser: URL spoof in Omnibox chromium-browser: Use after free in Blink chromium-browser: URL spoof in Omnibox chromium-browser: Security UI occlusion in full screen mode chromium-browser: UI spoof in Extensions | [
"cpe:/a:redhat:rhel_extras:6"
]
| null | null | 4.3 | null |
RHSA-2014:0687 | Red Hat Security Advisory: libtasn1 security update | libtasn1: multiple boundary check issues libtasn1: asn1_get_bit_der() can return negative bit length libtasn1: asn1_read_value_type() NULL pointer dereference | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
]
| null | null | null | null |
RHSA-2024:3801 | Red Hat Security Advisory: OpenShift Container Platform 4.12.58 CNF vRAN extras security update | baremetal-operator: plain-text username and hashed password readable by anyone having a cluster-wide read-access | [
"cpe:/a:redhat:openshift:4.12::el8"
]
| null | 6 | null | null |
RHSA-2022:0866 | Red Hat Security Advisory: OpenShift Container Platform 4.6.56 packages and security update | cri-o: pod with access to 'hostIPC' and 'hostNetwork' kernel namespace allows sysctl from the list of safe sysctls to be applied to the host CRI-O: Arbitrary code execution in cri-o via abusing “kernel.core_pattern” kernel parameter | [
"cpe:/a:redhat:openshift:4.6::el7",
"cpe:/a:redhat:openshift:4.6::el8"
]
| null | 8.8 | null | null |
RHSA-2015:1592 | Red Hat Security Advisory: Red Hat Satellite 6.1.1 on RHEL 6 | python-oauth2: _check_signature() ignores the nonce value when validating signed urls python-oauth2: Uses poor PRNG in nonce rhn_satellite_6: cross-site request forgery (CSRF) can force logout foreman: cross-site scripting (XSS) flaw in template preview screen foreman: lack of SSL certificate validation when performing LDAPS authentication foreman: API not scoping resources to taxonomies foreman: the _session_id cookie is issued without the Secure flag foreman: edit_users permission allows changing of admin passwords | [
"cpe:/a:redhat:satellite:6.1::el6",
"cpe:/a:redhat:satellite_capsule:6.1::el6"
]
| null | null | null | null |
RHSA-2018:2425 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.1 security update | cxf: Improper size validation in message attachment header for JAX-WS and JAX-RS services apache-cxf: TLS hostname verification does not work correctly with com.sun.net.ssl.* guava: Unbounded memory allocation in AtomicDoubleArray and CompoundOrdering classes allow remote attackers to cause a denial of service wildfly-core: Path traversal can allow the extraction of .war archives to write arbitrary files (Zip Slip) bouncycastle: flaw in the low-level interface to RSA key pair generator | [
"cpe:/a:redhat:jboss_enterprise_application_platform:7.1"
]
| null | null | 4.8 | null |
RHSA-2021:3704 | Red Hat Security Advisory: virt:8.2 and virt-devel:8.2 security update | libvirt: Insecure sVirt label generation libvirt: Improper locking on ACL failure in virStoragePoolLookupByTargetPath API QEMU: usbredir: free() call on invalid pointer in bufp_alloc() ntfs-3g: Out-of-bounds heap buffer access in ntfs_get_attribute_value() due to incorrect check of bytes_in_use value in MFT records ntfs-3g: Heap buffer overflow triggered by a specially crafted Unicode string ntfs-3g: Heap buffer overflow in ntfs_attr_pread_i() triggered by specially crafted NTFS attributes ntfs-3g: Heap buffer overflow triggered by a specially crafted MFT section ntfs-3g: Heap buffer overflow triggered by a specially crafted NTFS inode pathname ntfs-3g: Stack buffer overflow triggered when correcting differences between MFT and MFTMirror sections ntfs-3g: Heap buffer overflow in ntfs_inode_real_open() triggered by a specially crafted NTFS inode ntfs-3g: Heap buffer overflow in ntfs_attr_setup_flag() triggered by a specially crafted NTFS attribute from MFT ntfs-3g: NULL pointer dereference in ntfs_extent_inode_open() ntfs-3g: Out-of-bounds read in ntfs_ie_lookup() ntfs-3g: Out-of-bounds read in ntfs_runlists_merge_i() ntfs-3g: Integer overflow in memmove() leading to heap buffer overflow in ntfs_attr_record_resize() ntfs-3g: Out-of-bounds read ntfs_attr_find_in_attrdef() triggered by an invalid attribute ntfs-3g: Heap buffer overflow in ntfs_inode_lookup_by_name() ntfs-3g: Endless recursion from ntfs_attr_pwrite() triggered by an unallocated bitmap ntfs-3g: Out-of-bounds reads in ntfs_attr_find() and ntfs_external_attr_find() ntfs-3g: Out-of-bounds access in ntfs_inode_lookup_by_name() caused by an unsanitized attribute length ntfs-3g: Out-of-bounds access in ntfs_inode_sync_standard_information() ntfs-3g: Heap buffer overflow in ntfs_compressed_pwrite() ntfs-3g: Out-of-bounds access in ntfs_decompress() ntfs-3g: Heap buffer overflow in ntfs_get_attribute_value() caused by an unsanitized attribute | [
"cpe:/a:redhat:advanced_virtualization:8.2::el8"
]
| null | 7.8 | null | null |
RHSA-2023:7517 | Red Hat Security Advisory: Red Hat Ansible Automation Platform 2.4 Product Security and Bug Fix Update | golang: crypto/tls: panic when processing post-handshake message on QUIC connections golang: crypto/tls: lack of a limit on buffered post-handshake | [
"cpe:/a:redhat:ansible_automation_platform:2.4::el8",
"cpe:/a:redhat:ansible_automation_platform:2.4::el9",
"cpe:/a:redhat:ansible_automation_platform_developer:2.4::el8",
"cpe:/a:redhat:ansible_automation_platform_developer:2.4::el9",
"cpe:/a:redhat:ansible_automation_platform_inside:2.4::el8",
"cpe:/a:redhat:ansible_automation_platform_inside:2.4::el9"
]
| null | 7.5 | null | null |
RHSA-2019:3871 | Red Hat Security Advisory: kernel security update | hw: Intel GPU blitter manipulation can allow for arbitrary kernel memory write | [
"cpe:/a:redhat:enterprise_linux:8::crb",
"cpe:/o:redhat:enterprise_linux:8::baseos"
]
| null | null | 8.8 | null |
RHSA-2023:0274 | Red Hat Security Advisory: Red Hat OpenStack Platform 17.0 (python-XStatic-Angular) security update | AngularJS: Prototype pollution in merge function could result in code injection | [
"cpe:/a:redhat:openstack:17.0::el9"
]
| null | 7.5 | null | null |
RHSA-2010:0937 | Red Hat Security Advisory: JBoss Enterprise Application Platform 4.3.0.CP09 update | JBoss drools deserialization remote code execution JBoss Remoting Denial-Of-Service JBoss EAP jmx console FileDeployment CSRF | [
"cpe:/a:redhat:jboss_enterprise_application_platform:4.3.0::el4"
]
| null | null | null | null |
RHSA-2023:1919 | Red Hat Security Advisory: webkit2gtk3 security update | WebKitGTK: use-after-free leads to arbitrary code execution | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
]
| null | 8.8 | null | null |
RHSA-2024:8317 | Red Hat Security Advisory: Logging for Red Hat OpenShift - 5.8.14 | net/http: Denial of service due to improper 100-continue handling in net/http go/parser: golang: Calling any of the Parse functions containing deeply nested literals can cause a panic/stack exhaustion encoding/gob: golang: Calling Decoder.Decode on a message which contains deeply nested structures can cause a panic due to stack exhaustion go/build/constraint: golang: Calling Parse on a "// +build" build tag line with deeply nested expressions can cause a panic due to stack exhaustion | [
"cpe:/a:redhat:logging:5.8::el9"
]
| null | 5.9 | null | null |
RHSA-2019:1021 | Red Hat Security Advisory: chromium-browser security update | chromium-browser: Use after free in PDFium chromium-browser: Integer overflow in Angle chromium-browser: Memory corruption in V8 chromium-browser: Use after free in Blink chromium-browser: Use after free in Blink chromium-browser: User information disclosure in Autofill chromium-browser: CORS bypass in Blink chromium-browser: Out of bounds read in V8 chromium-browser: CORS bypass in Blink chromium-browser: Heap buffer overflow in Blink chromium-browser: Uninitialized value in media reader chromium-browser: Incorrect escaping in developer tools chromium-browser: Integer overflow in PDFium chromium-browser: Integer overflow in PDFium chromium-browser: CORS bypass in download manager chromium-browser: Forced navigation from service worker chromium-browser: Out-of-bounds write in V8 chromium-browser: Use-after-free in IndexedDB chromium-browser: Inappropriate implementation in accessibility chromium-browser: Insufficient policy enforcement in notifications | [
"cpe:/a:redhat:rhel_extras:6"
]
| null | null | 4.3 | null |
RHSA-2019:2577 | Red Hat Security Advisory: ceph security update | ceph: Unauthenticated clients can crash ceph RGW configured with beast as frontend | [
"cpe:/a:redhat:ceph_storage:3::el7"
]
| null | null | 7.5 | null |
RHSA-2023:2138 | Red Hat Security Advisory: OpenShift Container Platform 4.13.0 CNF vRAN extras security update | vault: GCP Auth Method Allows Authentication Bypass vault: incorrect policy enforcement | [
"cpe:/a:redhat:openshift:4.13::el8"
]
| null | 6.5 | null | null |
RHSA-2023:1101 | Red Hat Security Advisory: kpatch-patch security update | kernel: stack overflow in do_proc_dointvec and proc_skip_spaces | [
"cpe:/o:redhat:enterprise_linux:7::server"
]
| null | 7.8 | null | null |
RHSA-2018:2882 | Red Hat Security Advisory: rh-haproxy18-haproxy security update | haproxy: Out-of-bounds read in HPACK decoder | [
"cpe:/a:redhat:rhel_software_collections:3::el7"
]
| null | null | 7.5 | null |
RHSA-2023:1912 | Red Hat Security Advisory: OpenJDK 8u372 Windows Security Update | OpenJDK: improper connection handling during TLS handshake (8294474) OpenJDK: missing string checks for NULL characters (8296622) OpenJDK: incorrect handling of NULL characters in ProcessBuilder (8295304) OpenJDK: Swing HTML parsing issue (8296832) OpenJDK: incorrect enqueue of references in garbage collector (8298191) OpenJDK: certificate validation issue in TLS session negotiation (8298310) OpenJDK: missing check for slash characters in URI-to-path conversion (8298667) | [
"cpe:/a:redhat:openjdk:1.8::windows"
]
| null | 3.7 | null | null |
RHSA-2022:4644 | Red Hat Security Advisory: kernel-rt security and bug fix update | kernel: cgroups v1 release_agent feature may allow privilege escalation | [
"cpe:/a:redhat:rhel_extras_rt:7"
]
| null | 7 | null | null |
RHSA-2024:8158 | Red Hat Security Advisory: kernel-rt security update | kernel: hwmon: (w83792d) Fix NULL pointer dereference by removing unnecessary structure field kernel: Local information disclosure on Intel(R) Atom(R) processors kernel: net/sched: taprio: extend minimum interval restriction to entire cycle too kernel: xfs: fix log recovery buffer allocation for the legacy h_size fixup kernel: firmware: cs_dsp: Use strnlen() on name fields in V1 wmfw files kernel: ibmvnic: Add tx check to prevent skb leak kernel: pinctrl: fix deadlock in create_pinctrl() when handling -EPROBE_DEFER kernel: sched: act_ct: take care of padding in struct zones_ht_key kernel: tipc: Return non-zero value from tipc_udp_addr2str() on error | [
"cpe:/a:redhat:rhel_eus:9.2::nfv",
"cpe:/a:redhat:rhel_eus:9.2::realtime"
]
| null | 7.3 | null | null |
RHSA-2022:8384 | Red Hat Security Advisory: harfbuzz security update | harfbuzz: integer overflow in the component hb-ot-shape-fallback.cc | [
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/o:redhat:enterprise_linux:9::baseos"
]
| null | 5.5 | null | null |
RHSA-2022:0199 | Red Hat Security Advisory: libreswan security update | libreswan: Malicious IKEv1 packet can cause libreswan to restart | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
]
| null | 7.5 | null | null |
RHSA-2006:0276 | Red Hat Security Advisory: php security update | security flaw security flaw security flaw security flaw security flaw security flaw | [
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws",
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
]
| null | null | null | null |
RHSA-2016:0612 | Red Hat Security Advisory: samba and samba4 security, bug fix, and enhancement update | samba: crash in dcesrv_auth_bind_ack due to missing error check samba: Man-in-the-middle attacks possible with NTLMSSP authentication samba: Spoofing vulnerability when domain controller is configured samba: Missing downgrade detection samba: Server certificates not validated at client side samba: Samba based active directory domain controller does not enforce smb signing samba: Smb signing not required by default when smb client connection is used for ipc usage samba: SAMR and LSA man in the middle attacks | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation",
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
]
| null | null | null | null |
RHSA-2013:0856 | Red Hat Security Advisory: pki-tps security update | System: pki-tps XSS flaw System: pki-tps format string injection | [
"cpe:/a:redhat:certificate_system:8::el5"
]
| null | null | null | null |
RHSA-2024:0409 | Red Hat Security Advisory: oniguruma security update | oniguruma: Use-after-free in onig_new_deluxe() in regext.c oniguruma: Stack exhaustion in regcomp.c because of recursion in regparse.c oniguruma: integer overflow in search_in_range function in regexec.c leads to out-of-bounds read oniguruma: Heap-based buffer over-read in function gb18030_mbc_enc_len in file gb18030.c oniguruma: Heap-based buffer over-read in function fetch_interval_quantifier in regparse.c | [
"cpe:/a:redhat:rhel_eus:8.6::appstream",
"cpe:/a:redhat:rhel_eus:8.6::crb"
]
| null | 7.5 | 6.5 | null |
RHSA-2014:0459 | Red Hat Security Advisory: Red Hat JBoss Fuse Service Works 6.0.0 security update | tomcat: multiple content-length header poisoning flaws Camel: XML eXternal Entity (XXE) flaw in XSLT component Camel: remote code execution via XSL apache-commons-fileupload: denial of service due to too-small buffer size used by MultipartStream | [
"cpe:/a:redhat:jboss_fuse_service_works:6.0"
]
| null | null | null | null |
RHSA-2019:0832 | Red Hat Security Advisory: polkit security update | polkit: Temporary auth hijacking via PID reuse and non-atomic fork | [
"cpe:/o:redhat:rhel_aus:6.6::server"
]
| null | null | 7.3 | null |
RHSA-2024:1962 | Red Hat Security Advisory: go-toolset:rhel8 security update | golang: net/http, x/net/http2: unlimited number of CONTINUATION frames causes DoS | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
]
| null | 7.5 | null | null |
RHSA-2023:0573 | Red Hat Security Advisory: OpenShift Container Platform 4.9.55 security update | maven-shared-utils: Command injection via Commandline class | [
"cpe:/a:redhat:openshift:4.9::el8"
]
| null | 9.8 | null | null |
RHSA-2024:8847 | Red Hat Security Advisory: grafana-pcp security update | golang-fips: Golang FIPS zeroed buffer | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
]
| null | 6.5 | null | null |
RHSA-2024:1078 | Red Hat Security Advisory: Service Telemetry Framework 1.5.4 security update | golang: net/http/internal: Denial of Service (DoS) via Resource Consumption via HTTP requests golang: crypto/tls: Timing Side Channel attack in RSA based TLS key exchanges. | [
"cpe:/a:redhat:service_telemetry_framework:1.5::el8"
]
| null | 7.5 | null | null |
RHSA-2023:3714 | Red Hat Security Advisory: postgresql security update | postgresql: schema_element defeats protective search_path changes postgresql: row security policies disregard user ID changes after inlining. | [
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::crb"
]
| null | 4.2 | null | null |
RHSA-2022:0439 | Red Hat Security Advisory: rh-maven36-log4j12 security update | log4j: Remote code execution in Log4j 1.x when application is configured to use JMSSink log4j: SQL injection in Log4j 1.x when application is configured to use JDBCAppender log4j: Unsafe deserialization flaw in Chainsaw log viewer | [
"cpe:/a:redhat:rhel_software_collections:3::el7"
]
| null | 8.8 | null | null |
RHSA-2024:4010 | Red Hat Security Advisory: OpenShift Container Platform 4.14.31 security update | golang: net/http, x/net/http2: unlimited number of CONTINUATION frames causes DoS ssh: Prefix truncation attack on Binary Packet Protocol (BPP) go-git: Maliciously crafted Git server replies can cause DoS on go-git clients jose-go: improper handling of highly compressed data | [
"cpe:/a:redhat:openshift:4.14::el8",
"cpe:/a:redhat:openshift:4.14::el9"
]
| null | 4.3 | null | null |
RHSA-2007:0353 | Red Hat Security Advisory: evolution security update | fetchmail/mutt/evolution/...: APOP password disclosure vulnerability | [
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws",
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
]
| null | null | null | null |
RHSA-2019:2798 | Red Hat Security Advisory: patch security update | patch: do_ed_script in pch.c does not block strings beginning with a ! character patch: OS shell command injection when processing crafted patch files | [
"cpe:/o:redhat:enterprise_linux:8::baseos"
]
| null | null | 7.8 | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.