id
stringlengths 13
15
| title
stringlengths 29
176
| description
stringlengths 8
32.1k
| cpes
listlengths 0
20
| cvss_v4_0
null | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
null |
---|---|---|---|---|---|---|---|
RHSA-2023:4169 | Red Hat Security Advisory: java-17-openjdk security update | OpenJDK: HTTP client insufficient file name validation (8302475) OpenJDK: ZIP file parsing infinite loop (8302483) OpenJDK: weakness in AES implementation (8308682) OpenJDK: modulo operator array indexing issue (8304460) OpenJDK: array indexing integer overflow issue (8304468) OpenJDK: improper handling of slash characters in URI-to-path conversion (8305312) harfbuzz: allows attackers to trigger O(n^2) growth via consecutive marks | [
"cpe:/a:redhat:rhel_eus:9.0::appstream",
"cpe:/a:redhat:rhel_eus:9.0::crb"
]
| null | 7.5 | null | null |
RHSA-2025:1958 | Red Hat Security Advisory: webkit2gtk3 security update | webkitgtk: Processing maliciously crafted web content may lead to memory corruption webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash | [
"cpe:/a:redhat:rhel_eus:8.8::appstream"
]
| null | 8.8 | null | null |
RHSA-2008:0529 | Red Hat Security Advisory: net-snmp security update | net-snmp SNMPv3 authentication bypass (VU#877044) net-snmp: buffer overflow in perl module's Perl Module __snprint_value() | [
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws",
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws",
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server",
"cpe:/o:redhat:rhel_eus:4.5::as",
"cpe:/o:redhat:rhel_eus:4.5::es"
]
| null | null | null | null |
RHSA-2024:5622 | Red Hat Security Advisory: fence-agents security update | urllib3: proxy-authorization request header is not stripped during cross-origin redirects | [
"cpe:/a:redhat:rhel_aus:8.6::appstream",
"cpe:/a:redhat:rhel_e4s:8.6::appstream",
"cpe:/a:redhat:rhel_e4s:8.6::highavailability",
"cpe:/a:redhat:rhel_tus:8.6::appstream",
"cpe:/a:redhat:rhel_tus:8.6::highavailability"
]
| null | 4.4 | null | null |
RHSA-2024:6840 | Red Hat Security Advisory: pcp security update | pcp: pmcd heap corruption through metric pmstore operations pcp: pmpost symlink attack allows escalating pcp to root user | [
"cpe:/a:redhat:rhel_aus:8.2::appstream"
]
| null | 4.4 | null | null |
RHSA-2024:0903 | Red Hat Security Advisory: Red Hat AMQ Broker 7.10.6 release and security update | zookeeper: Authorization Bypass in Apache ZooKeeper | [
"cpe:/a:redhat:amq_broker:7.10"
]
| null | 9.1 | null | null |
RHSA-2019:2804 | Red Hat Security Advisory: Red Hat JBoss Fuse/A-MQ 6.3 R13 security and bug fix update | jolokia: system-wide CSRF that could lead to Remote Code Execution jackson-databind: Potential information exfiltration with default typing, serialization gadget from MyBatis jackson-databind: improper polymorphic deserialization of types from Jodd-db library jackson-databind: improper polymorphic deserialization of types from Oracle JDBC driver jackson-databind: arbitrary code execution in slf4j-ext class jackson-databind: arbitrary code execution in blaze-ds-opt and blaze-ds-core classes jackson-databind: improper polymorphic deserialization in axis2-transport-jms class jackson-databind: improper polymorphic deserialization in openjpa class jackson-databind: improper polymorphic deserialization in jboss-common-core class jackson-databind: polymorphic typing issue allows attacker to read arbitrary local files on the server via crafted JSON message. | [
"cpe:/a:redhat:jboss_amq:6.3"
]
| null | null | 7.5 | null |
RHSA-2013:0522 | Red Hat Security Advisory: gdb security and bug fix update | gdb: object file .debug_gdb_scripts section improper input validation | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
]
| null | null | null | null |
RHSA-2024:10739 | Red Hat Security Advisory: postgresql:12 security update | postgresql: PostgreSQL PL/Perl environment variable changes execute arbitrary code | [
"cpe:/a:redhat:rhel_aus:8.2::appstream"
]
| null | 8.8 | null | null |
RHSA-2023:5598 | Red Hat Security Advisory: curl security update | curl: IDN wildcard match may lead to Improper Cerificate Validation curl: more POST-after-PUT confusion | [
"cpe:/a:redhat:rhel_eus:9.0::appstream",
"cpe:/o:redhat:rhel_eus:9.0::baseos"
]
| null | 3.7 | null | null |
RHSA-2021:0030 | Red Hat Security Advisory: OpenShift Container Platform 4.4.32 packages and security update | kubernetes: compromised node could escalate to cluster level privileges | [
"cpe:/a:redhat:openshift:4.4::el7",
"cpe:/a:redhat:openshift:4.4::el8"
]
| null | 6.4 | null | null |
RHSA-2018:3466 | Red Hat Security Advisory: CloudForms 4.6.5 security, bug fix and enhancement update | rubyzip: arbitrary file write vulnerability / arbitrary code execution using a specially crafted zip file | [
"cpe:/a:redhat:cloudforms_managementengine:5.9::el7"
]
| null | null | 4.8 | null |
RHSA-2019:2949 | Red Hat Security Advisory: httpd24-httpd and httpd24-nghttp2 security update | HTTP/2: large amount of data requests leads to denial of service HTTP/2: flood using PRIORITY frames results in excessive resource consumption HTTP/2: request for large response leads to denial of service | [
"cpe:/a:redhat:rhel_software_collections:3::el6",
"cpe:/a:redhat:rhel_software_collections:3::el7"
]
| null | null | 7.5 | null |
RHSA-2024:1240 | Red Hat Security Advisory: postgresql security update | postgresql: non-owner 'REFRESH MATERIALIZED VIEW CONCURRENTLY' executes arbitrary SQL | [
"cpe:/a:redhat:rhel_eus:9.0::appstream",
"cpe:/a:redhat:rhel_eus:9.0::crb"
]
| null | 8 | null | null |
RHSA-2013:1447 | Red Hat Security Advisory: java-1.7.0-openjdk security update | OpenJDK: java.util.TimeZone does not restrict setting of default time zone (Libraries, 8001029) OpenJDK: XML parsing Denial of Service (JAXP, 8017298) OpenJDK: insufficient html escaping in jhat (jhat, 8011081) OpenJDK: Inet6Address class IPv6 address processing errors (Libraries, 8015743) OpenJDK: image conversion out of bounds read (2D, 8014102) OpenJDK: key data leak via toString() methods (Libraries, 8011071) OpenJDK: Incorrect awt_getPixelByte/awt_getPixelShort/awt_setPixelByte/awt_setPixelShort image raster checks (2D, 8014093) OpenJDK: JTable not properly performing certain access checks (Swing, 8013744) OpenJDK: insufficient InterfaceImplementor security checks (Scripting, 8017299) OpenJDK: insufficient security checks (Beans, 8012071) OpenJDK: insufficient escaping of window title string (Javadoc, 8016675) OpenJDK: default keytab path information leak (JGSS, 8022931) OpenJDK: javax.xml.transform.TransformerFactory does not properly honor XMLConstants.FEATURE_SECURE_PROCESSING (JAXP, 8012425) OpenJDK: insufficient checks of KDC replies (JGSS, 8014341) OpenJDK: javac does not ignore certain ignorable characters (Javadoc, 8016653) OpenJDK: JPEGImageReader and JPEGImageWriter missing band size checks (2D, 8013510) OpenJDK: RMIConnection stub missing permission check (CORBA, 8011157) OpenJDK: VersionHelper12 does not honor modifyThreadGroup restriction (JNDI, 8013739) OpenJDK: insufficient security checks (JAXWS, 8017505) OpenJDK: com.sun.org.apache.xml.internal.security.utils.UnsyncByteArrayOutputStream Denial of Service (Security, 8021290) OpenJDK: XML parsing Denial of Service (JAXP, 8014530) OpenJDK: Java2d Disposer security bypass (2D, 8017287) OpenJDK: checkPackageAccess missing security check (Libraries, 8017291) OpenJDK: Vulnerability in Libraries component (Libraries, 7023639) OpenJDK: getDeclaringClass() information leak (Libraries, 8014349) OpenJDK: ObjectInputStream/ObjectOutputStream missing checks (Libraries, 8014987) OpenJDK: insufficient DataFlavor security checks (AWT, 8012277) OpenJDK: Missing CORBA security checks (Libraries, 8017196) OpenJDK: XML stream factory finder information leak (JAXP, 8013502) | [
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::server"
]
| null | null | null | null |
RHSA-2023:3624 | Red Hat Security Advisory: Migration Toolkit for Containers (MTC) 1.7.10 security and bug fix update | golang: net/http, net/textproto: denial of service from excessive memory allocation golang: net/http, net/textproto, mime/multipart: denial of service from excessive resource consumption golang: go/parser: Infinite loop in parsing golang: html/template: backticks not treated as string delimiters golang: html/template: improper handling of JavaScript whitespace | [
"cpe:/a:redhat:rhmt:1.7::el8"
]
| null | 8.1 | null | null |
RHSA-2022:7822 | Red Hat Security Advisory: container-tools:rhel8 security, bug fix, and enhancement update | podman: possible information disclosure and modification buildah: possible information disclosure and modification | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
]
| null | 7.1 | null | null |
RHSA-2016:1190 | Red Hat Security Advisory: chromium-browser security update | chromium-browser: cross-origin bypass in extension bindings chromium-browser: cross-origin bypass in blink chromium-browser: cross-origin bypass in extensions chromium-browser: cross-origin bypass in blink chromium-browser: cross-origin bypass in extension bindings chromium-browser: type confusion in v8 chromium-browser: heap overflow in v8 chromium-browser: heap use-after-free in v8 bindings chromium-browser: heap use-after-free in skia chromium-browser: heap overflow in pdfium chromium-browser: csp bypass for serviceworker chromium-browser: out-of-bounds access in libxslt chromium-browser: integer overflow in libxslt chromium-browser: out-of-bounds read in pdfium chromium-browser: out-of-bounds read in pdfium chromium-browser: information leak in extensions chromium-browser: out-of-bounds read in v8 chromium-browser: heap buffer overflow in media chromium-browser: heap use-after-free in autofill chromium-browser: heap buffer-overflow in skia chromium-browser: limited cross-origin bypass in serviceworker chromium-browser: http download of software removal tool chromium-browser: hpkp pins removed on cache clearance chromium-browser: various fixes from internal audits | [
"cpe:/a:redhat:rhel_extras:6"
]
| null | null | null | null |
RHSA-2020:2165 | Red Hat Security Advisory: openstack-manila security update | openstack-manila: User with share-network UUID is able to show, create and delete shares | [
"cpe:/a:redhat:openstack:16::el8"
]
| null | 8.3 | null | null |
RHSA-2019:2924 | Red Hat Security Advisory: redhat-virtualization-host security update | kernel: vhost-net: guest to host kernel escape during migration | [
"cpe:/o:redhat:enterprise_linux:7::hypervisor"
]
| null | null | 7.2 | null |
RHSA-2021:1511 | Red Hat Security Advisory: AMQ Clients 2.9.1 release and security update | netty: Information disclosure via the local system temporary directory netty: possible request smuggling in HTTP/2 due missing validation netty: Request smuggling via content-length header | [
"cpe:/a:redhat:a_mq_clients:2::el7",
"cpe:/a:redhat:a_mq_clients:2::el8"
]
| null | 5.9 | null | null |
RHSA-2024:8238 | Red Hat Security Advisory: OpenShift Container Platform 4.14.39 security update | Podman: Buildah: cri-o: FIPS Crypto-Policy Directory Mounting Issue in containers/common Go Library | [
"cpe:/a:redhat:openshift:4.14::el8",
"cpe:/a:redhat:openshift:4.14::el9"
]
| null | 5.4 | null | null |
RHSA-2023:6569 | Red Hat Security Advisory: sysstat security and bug fix update | sysstat: check_overflow() function can work incorrectly that lead to an overflow | [
"cpe:/a:redhat:enterprise_linux:9::appstream"
]
| null | 7 | null | null |
RHSA-2023:7782 | Red Hat Security Advisory: linux-firmware security update | amd: Return Address Predictor vulnerability leading to information disclosure hw: amd: Cross-Process Information Leak | [
"cpe:/o:redhat:rhel_aus:7.6::server"
]
| null | 6.5 | null | null |
RHSA-2024:4462 | Red Hat Security Advisory: ghostscript security update | ghostscript: OPVP device arbitrary code execution via custom Driver library | [
"cpe:/a:redhat:rhel_aus:8.6::appstream",
"cpe:/a:redhat:rhel_e4s:8.6::appstream",
"cpe:/a:redhat:rhel_tus:8.6::appstream"
]
| null | 8.8 | null | null |
RHSA-2022:8535 | Red Hat Security Advisory: OpenShift Container Platform 4.11.16 security update | golang: archive/tar: github.com/vbatts/tar-split: unbounded memory consumption when reading headers golang: net/http/httputil: ReverseProxy should not forward unparseable query parameters golang: net/http: handle server errors after sending GOAWAY golang: math/big: decoding big.Float and big.Rat types can panic if the encoded message is too short, potentially allowing a denial of service golang: regexp/syntax: limit memory used by parsing regexps | [
"cpe:/a:redhat:openshift:4.11::el8"
]
| null | 6.5 | null | null |
RHSA-2022:8806 | Red Hat Security Advisory: usbguard security update | usbguard: Fix unauthorized access via D-Bus | [
"cpe:/a:redhat:rhel_eus:8.6::appstream"
]
| null | 7.8 | null | null |
RHSA-2022:6833 | Red Hat Security Advisory: expat security update | expat: a use-after-free in the doContent function in xmlparse.c | [
"cpe:/o:redhat:rhel_e4s:8.1::baseos"
]
| null | 8.1 | null | null |
RHSA-2023:2261 | Red Hat Security Advisory: bind security and bug fix update | bind: processing large delegations may severely degrade resolver performance bind: flooding with UPDATE requests may lead to DoS bind: sending specific queries to the resolver may cause a DoS bind: sending specific queries to the resolver may cause a DoS | [
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::crb"
]
| null | 7.5 | null | null |
RHSA-2003:065 | Red Hat Security Advisory: XFree86 security update | security flaw security flaw security flaw security flaw security flaw | [
"cpe:/o:redhat:enterprise_linux:2.1::as",
"cpe:/o:redhat:enterprise_linux:2.1::aw",
"cpe:/o:redhat:enterprise_linux:2.1::es",
"cpe:/o:redhat:enterprise_linux:2.1::ws"
]
| null | null | null | null |
RHSA-2024:8170 | Red Hat Security Advisory: fence-agents security update | pypa/setuptools: Remote code execution via download functions in the package_index module in pypa/setuptools | [
"cpe:/a:redhat:rhel_aus:8.4::appstream",
"cpe:/a:redhat:rhel_e4s:8.4::appstream",
"cpe:/a:redhat:rhel_e4s:8.4::highavailability",
"cpe:/a:redhat:rhel_tus:8.4::appstream",
"cpe:/a:redhat:rhel_tus:8.4::highavailability"
]
| null | 8.8 | null | null |
RHSA-2019:0315 | Red Hat Security Advisory: CloudForms 4.6.8 security, bug fix and enhancement update | rubygem-sinatra: XSS in the 400 Bad Request page | [
"cpe:/a:redhat:cloudforms_managementengine:5.9::el7"
]
| null | null | 6.1 | null |
RHBA-2003:308 | Red Hat Bug Fix Advisory: Updated kernel resolves 32-bit address space issue on AMD64 | security flaw | [
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::ws"
]
| null | null | null | null |
RHSA-2012:0094 | Red Hat Security Advisory: freetype security update | freetype: FT_Bitmap_New integer overflow, FreeType TT_Vary_Get_Glyph_Deltas improper input validation freetype: Multiple security flaws when loading CID-keyed Type 1 fonts | [
"cpe:/o:redhat:rhel_eus:5.6"
]
| null | null | null | null |
RHSA-2014:1862 | Red Hat Security Advisory: mariadb55-mariadb security update | mysql: Remote Preauth User Enumeration flaw mysql: unspecified vulnerability related to ENARC (CPU July 2014) mysql: unspecified vulnerability related to SROPTZR (CPU July 2014) mysql: unspecified vulnerability related to ENFED (CPU July 2014) mysql: unspecified vulnerability related to SRINFOSC (CPU July 2014) mysql: unspecified vulnerability related to SRCHAR (CPU July 2014) mysql: unspecified MyISAM temporary file issue fixed in 5.5.39 and 5.6.20 mysql: unspecified vulnerability related to SERVER:CHARACTER SETS (CPU October 2014) mysql: unspecified vulnerability related to SERVER:REPLICATION ROW FORMAT BINARY LOG DML (CPU October 2014) mysql: unspecified vulnerability related to SERVER:INNODB DML FOREIGN KEYS (CPU October 2014) mysql: unspecified vulnerability related to SERVER:OPTIMIZER (CPU October 2014) mysql: unspecified vulnerability related to SERVER:DML (CPU October 2014) mysql: unspecified vulnerability related to SERVER:MEMORY STORAGE ENGINE (CPU October 2014) mysql: unspecified vulnerability related to SERVER:DML (CPU October 2014) mysql: unspecified vulnerability related to SERVER:DDL (CPU October 2014) mysql: unspecified vulnerability related to CLIENT:MYSQLDUMP (CPU October 2014) mysql: unspecified vulnerability related to CLIENT:MYSQLADMIN (CPU October 2014) mysql: unspecified vulnerability related to SERVER:DML (CPU October 2014) mysql: unspecified vulnerability related to C API SSL CERTIFICATE HANDLING (CPU October 2014) | [
"cpe:/a:redhat:rhel_software_collections:1::el6",
"cpe:/a:redhat:rhel_software_collections:1::el7"
]
| null | null | null | null |
RHSA-2011:0301 | Red Hat Security Advisory: acroread security update | acroread: critical APSB11-03 acroread: critical APSB11-03 acroread: critical APSB11-03 acroread: critical APSB11-03 acroread: critical APSB11-03 acroread: critical APSB11-03 acroread: critical APSB11-03 acroread: multiple XSS flaws (APSB11-03) acroread: critical APSB11-03 acroread: critical APSB11-03 acroread: critical APSB11-03 acroread: critical APSB11-03 acroread: critical APSB11-03 acroread: critical APSB11-03 acroread: critical APSB11-03 acroread: critical APSB11-03 acroread: critical APSB11-03 acroread: critical APSB11-03 acroread: critical APSB11-03 acroread: critical APSB11-03 acroread: critical APSB11-03 acroread: multiple XSS flaws (APSB11-03) acroread: critical APSB11-03 | [
"cpe:/a:redhat:rhel_extras:4",
"cpe:/a:redhat:rhel_extras:5::client",
"cpe:/a:redhat:rhel_extras:5::server",
"cpe:/a:redhat:rhel_extras:6"
]
| null | null | null | null |
RHSA-2021:2304 | Red Hat Security Advisory: microcode_ctl security, bug fix and enhancement update | hw: vt-d related privilege escalation hw: improper isolation of shared resources in some Intel Processors hw: observable timing discrepancy in some Intel Processors hw: information disclosure on some Intel Atom processors | [
"cpe:/o:redhat:rhel_eus:7.7::computenode",
"cpe:/o:redhat:rhel_eus:7.7::server"
]
| null | 5.6 | null | null |
RHSA-2008:0502 | Red Hat Security Advisory: XFree86 security update | X.org Record and Security extensions memory corruption X.org MIT-SHM extension arbitrary memory read X.org Render extension AllocateGlyph() heap buffer overflow X.org Render extension ProcRenderCreateCursor() crash | [
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws"
]
| null | null | null | null |
RHSA-2014:1149 | Red Hat Security Advisory: Red Hat JBoss Operations Network 3.2.3 update | Tomcat/JBossWeb: Limited DoS in chunked transfer encoding input filter Tomcat/JBossWeb: Request smuggling via malicious content length header | [
"cpe:/a:redhat:jboss_operations_network:3.2.3"
]
| null | null | null | null |
RHSA-2021:1196 | Red Hat Security Advisory: Red Hat JBoss Web Server 5.4.2 Security Update | openssl: NULL pointer dereference in signature_algorithms processing openssl: CA certificate check bypass with X509_V_FLAG_X509_STRICT | [
"cpe:/a:redhat:jboss_enterprise_web_server:5.4"
]
| null | 7.4 | null | null |
RHSA-2015:1564 | Red Hat Security Advisory: kernel-rt security, bug fix, and enhancement update | kernel: netfilter connection tracking extensions denial of service kernel: denial of service (DoS) attack against IPv6 network stacks due to improper handling of Router Advertisements. kernel: ping sockets: use-after-free leading to local privilege escalation | [
"cpe:/a:redhat:enterprise_mrg:2:server:el6"
]
| null | null | null | null |
RHSA-2022:6040 | Red Hat Security Advisory: Release of OpenShift Serverless 1.24.0 | golang: net/http: improper sanitization of Transfer-Encoding header golang: go/parser: stack exhaustion in all Parse* functions go-restful: Authorization Bypass Through User-Controlled Key prometheus/client_golang: Denial of service using InstrumentHandlerCounter golang: encoding/pem: fix stack overflow in Decode golang: regexp: stack exhaustion via a deeply nested expression golang: encoding/xml: stack exhaustion in Decoder.Skip golang: crypto/elliptic: panic caused by oversized scalar golang: crypto/tls: session tickets lack random ticket_age_add golang: io/fs: stack exhaustion in Glob golang: compress/gzip: stack exhaustion in Reader.Read golang: path/filepath: stack exhaustion in Glob golang: encoding/xml: stack exhaustion in Unmarshal golang: encoding/gob: stack exhaustion in Decoder.Decode golang: net/http/httputil: NewSingleHostReverseProxy - omit X-Forwarded-For not working | [
"cpe:/a:redhat:serverless:1.24::el8"
]
| null | 6.5 | null | null |
RHSA-2007:0703 | Red Hat Security Advisory: openssh security and bug fix update | Kerberos information leak audit logging of failed logins | [
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
]
| null | null | null | null |
RHSA-2022:9098 | Red Hat Security Advisory: OpenShift Container Platform 4.10.46 packages and security update | maven-shared-utils: Command injection via Commandline class | [
"cpe:/a:redhat:openshift:4.10::el7",
"cpe:/a:redhat:openshift:4.10::el8"
]
| null | 9.8 | null | null |
RHSA-2018:3456 | Red Hat Security Advisory: Red Hat Satellite Server 5 - 90 day End Of Life Notice | This is the 90 day notification of the End Of Life (EOL) plans for the following versions of Red Hat Satellite 5:
* Red Hat Satellite 5.6
* Red Hat Satellite 5.7 | [
"cpe:/a:redhat:network_satellite:5.6::el6",
"cpe:/a:redhat:network_satellite:5.7::el6"
]
| null | null | null | null |
RHSA-2024:9819 | Red Hat Security Advisory: tigervnc security update | xorg-x11-server: tigervnc: heap-based buffer overflow privilege escalation vulnerability | [
"cpe:/a:redhat:rhel_aus:8.4::appstream",
"cpe:/a:redhat:rhel_e4s:8.4::appstream",
"cpe:/a:redhat:rhel_tus:8.4::appstream"
]
| null | 7.8 | null | null |
RHSA-2024:1353 | Red Hat Security Advisory: Red Hat Process Automation Manager 7.13.5 security update | SnakeYaml: Constructor Deserialization Remote Code Execution xstream: Xstream to serialise XML data was vulnerable to Denial of Service attacks xstream: Denial of Service by injecting recursive collections or maps based on element's hash values raising a stack overflow batik: Server-Side Request Forgery vulnerability batik: Server-Side Request Forgery vulnerability RESTEasy: creation of insecure temp files okio: GzipSource class improper exception handling JSON-java: parser confusion leads to OOM logback: A serialization vulnerability in logback receiver keycloak: XSS via assertion consumer service URL in SAML POST-binding flow bouncycastle: potential blind LDAP injection attack using a self-signed certificate | [
"cpe:/a:redhat:jboss_enterprise_bpms_platform:7.13"
]
| null | 5.3 | null | null |
RHSA-2023:3153 | Red Hat Security Advisory: thunderbird security update | Mozilla: Browser prompts could have been obscured by popups Mozilla: Crash in RLBox Expat driver Mozilla: Potential permissions request bypass via clickjacking Mozilla: Content process crash due to invalid wasm code Mozilla: Potential spoof due to obscured address bar Mozilla: Potential memory corruption in FileReader::DoReadData() Mozilla: Memory safety bugs fixed in Firefox 113 and Firefox ESR 102.11 | [
"cpe:/a:redhat:rhel_aus:8.2::appstream",
"cpe:/a:redhat:rhel_e4s:8.2::appstream",
"cpe:/a:redhat:rhel_tus:8.2::appstream"
]
| null | 8.8 | null | null |
RHSA-2016:2582 | Red Hat Security Advisory: nettle security and bug fix update | nettle: secp256 calculation bug nettle: miscalculations on secp384 curve nettle: secp256 calculation bug nettle: RSA/DSA code is vulnerable to cache-timing related attacks | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
]
| null | null | 7.4 | null |
RHSA-2015:0252 | Red Hat Security Advisory: samba security update | samba: talloc free on uninitialized stack pointer in netlogon server could lead to remote-code execution | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
]
| null | null | null | null |
RHSA-2022:7529 | Red Hat Security Advisory: container-tools:3.0 security update | golang: net/http: improper sanitization of Transfer-Encoding header cri-o: memory exhaustion on the node when access to the kube api golang: go/parser: stack exhaustion in all Parse* functions prometheus/client_golang: Denial of service using InstrumentHandlerCounter golang: encoding/xml: stack exhaustion in Decoder.Skip golang: io/fs: stack exhaustion in Glob golang: compress/gzip: stack exhaustion in Reader.Read golang: path/filepath: stack exhaustion in Glob golang: encoding/xml: stack exhaustion in Unmarshal golang: net/http/httputil: NewSingleHostReverseProxy - omit X-Forwarded-For not working | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
]
| null | 6.5 | null | null |
RHSA-2011:1219 | Red Hat Security Advisory: samba security update | samba: mount.cifs improper device name and mountpoint strings sanitization samba: Race condition by mount (mount.cifs) operations samba/cifs-utils: mount.cifs and umount.cifs fail to anticipate RLIMIT_FSIZE (SWAT): Absent CSRF protection in various Samba web configuration formulars (SWAT): XSS flaw in Change Password page Samba mtab lock file race condition | [
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws",
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
]
| null | null | null | null |
RHSA-2014:0174 | Red Hat Security Advisory: piranha security update | piranha: web UI authentication bypass using POST requests | [
"cpe:/a:redhat:rhel_cluster:5"
]
| null | null | null | null |
RHSA-2024:6309 | Red Hat Security Advisory: fence-agents security update | pypa/setuptools: Remote code execution via download functions in the package_index module in pypa/setuptools urllib3: proxy-authorization request header is not stripped during cross-origin redirects | [
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::highavailability",
"cpe:/a:redhat:enterprise_linux:8::resilientstorage"
]
| null | 4.4 | null | null |
RHSA-2015:1639 | Red Hat Security Advisory: openstack-glance security update | openstack-glance: Glance v2 API host file disclosure through qcow2 backing file | [
"cpe:/a:redhat:openstack:7::el7"
]
| null | null | null | null |
RHSA-2023:6279 | Red Hat Security Advisory: cert-manager Operator for Red Hat OpenShift 1.11.5 | golang: crypto/tls: slow verification of certificate chains containing large RSA keys golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487) | [
"cpe:/a:redhat:cert_manager:1.11::el9"
]
| null | 7.5 | null | null |
RHSA-2020:3003 | Red Hat Security Advisory: Red Hat Ceph Storage 4.1 security and bug fix update | ceph: header-splitting in RGW GetObject has a possible XSS ceph: radosgw: HTTP header injection via CORS ExposeHeader tag | [
"cpe:/a:redhat:ceph_storage:4::el7",
"cpe:/a:redhat:ceph_storage:4::el8"
]
| null | 5.4 | null | null |
RHSA-2017:2674 | Red Hat Security Advisory: Red Hat Mobile Application Platform security update | RHMAP Millicore IDE allows RCE on SCM RHMAP: SSRF via external_request feature of App Studio RHMAP: Stored XSS in App Store git: Command injection via malicious ssh URLs | [
"cpe:/a:redhat:mobile_application_platform:4.5"
]
| null | null | 6.3 | null |
RHSA-2023:1792 | Red Hat Security Advisory: firefox security update | Mozilla: Memory Corruption in Safe Browsing Code Mozilla: libwebp: Double-free in libwebp Mozilla: Fullscreen notification obscured Mozilla: Potential Memory Corruption following Garbage Collector compaction Mozilla: Invalid free from JavaScript code Mozilla: Content-Disposition filename truncation leads to Reflected File Download Mozilla: Files with malicious extensions could have been downloaded unsafely on Linux Mozilla: Incorrect optimization result on ARM64 Mozilla: Memory safety bugs fixed in Firefox 112 and Firefox ESR 102.10 | [
"cpe:/a:redhat:rhel_e4s:8.1::appstream"
]
| null | 8.8 | null | null |
RHSA-2011:1326 | Red Hat Security Advisory: pango security update | qt/harfbuzz buffer overflow | [
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
]
| null | null | null | null |
RHSA-2022:8434 | Red Hat Security Advisory: dotnet7.0 security, bug fix, and enhancement update | dotnet: Nuget cache poisoning on Linux via world-writable cache directory | [
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::crb"
]
| null | 7.8 | null | null |
RHSA-2006:0129 | Red Hat Security Advisory: spamassassin security update | security flaw | [
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
]
| null | null | null | null |
RHSA-2005:049 | Red Hat Security Advisory: cups security update | security flaw | [
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws"
]
| null | null | null | null |
RHSA-2017:0211 | Red Hat Security Advisory: nagios security update | snoopy: incomplete fixes for command execution flaws snoopy: incomplete fixes for command execution flaws snoopy: incomplete fixes for command execution flaws nagios: Command injection via curl in MagpieRSS nagios: Privilege escalation issue | [
"cpe:/a:redhat:openstack:5::el7"
]
| null | null | 7.3 | null |
RHSA-2022:7068 | Red Hat Security Advisory: firefox security update | Mozilla: Same-origin policy violation could have leaked cross-origin URLs Mozilla: Memory Corruption in JS Engine Mozilla: Denial of Service via window.print Mozilla: Memory safety bugs fixed in Firefox ESR 102.4 and Thunderbird 102.4 | [
"cpe:/a:redhat:rhel_eus:8.2::appstream"
]
| null | 8.8 | 6.1 | null |
RHSA-2023:7858 | Red Hat Security Advisory: Red Hat Single Sign-On 7.6.6 security update | keycloak: reflected XSS via wildcard in OIDC redirect_uri keycloak: redirect_uri validation bypass keycloak: offline session token DoS | [
"cpe:/a:redhat:red_hat_single_sign_on:7.6.6"
]
| null | 7.7 | null | null |
RHSA-2020:0594 | Red Hat Security Advisory: curl security update | curl: HTTP authentication leak in redirects curl: FTP path trickery leads to NIL byte out of bounds write curl: LDAP NULL pointer dereference curl: RTSP RTP buffer over-read curl: Out-of-bounds heap read when missing RTSP headers allows information leak or denial of service | [
"cpe:/o:redhat:rhel_aus:7.4::server",
"cpe:/o:redhat:rhel_e4s:7.4::server",
"cpe:/o:redhat:rhel_tus:7.4::server"
]
| null | null | 5.4 | null |
RHSA-2010:0963 | Red Hat Security Advisory: JBoss Enterprise Application Platform 5.1.0 security update | JBoss Remoting Denial-Of-Service | [
"cpe:/a:redhat:jboss_enterprise_application_platform:5.1"
]
| null | null | null | null |
RHSA-2022:6447 | Red Hat Security Advisory: ruby:2.7 security, bug fix, and enhancement update | ruby: Regular expression denial of service vulnerability of Date parsing methods ruby: Cookie prefix spoofing in CGI::Cookie.parse ruby: Buffer overrun in String-to-Float conversion | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
]
| null | 6.2 | null | null |
RHSA-2011:0212 | Red Hat Security Advisory: jbossweb security update | JDK Double.parseDouble Denial-Of-Service | [
"cpe:/a:redhat:jboss_enterprise_application_platform:4.2",
"cpe:/a:redhat:jboss_enterprise_application_platform:4.3",
"cpe:/a:redhat:jboss_enterprise_application_platform:5.1"
]
| null | null | null | null |
RHSA-2019:2866 | Red Hat Security Advisory: kernel security update | kernel: vhost-net: guest to host kernel escape during migration | [
"cpe:/o:redhat:rhel_eus:7.5::computenode",
"cpe:/o:redhat:rhel_eus:7.5::server"
]
| null | null | 7.2 | null |
RHSA-2023:7395 | Red Hat Security Advisory: python-setuptools security update | pypa-setuptools: Regular Expression Denial of Service (ReDoS) in package_index.py | [
"cpe:/o:redhat:rhel_eus:8.6::baseos"
]
| null | 5.9 | null | null |
RHSA-2003:101 | Red Hat Security Advisory: : Updated OpenSSL packages fix vulnerabilities | security flaw security flaw | [
"cpe:/o:redhat:linux:6.2",
"cpe:/o:redhat:linux:7.0",
"cpe:/o:redhat:linux:7.1",
"cpe:/o:redhat:linux:7.2",
"cpe:/o:redhat:linux:7.3",
"cpe:/o:redhat:linux:8.0",
"cpe:/o:redhat:linux:9"
]
| null | null | null | null |
RHSA-2013:0586 | Red Hat Security Advisory: jbosssx security update | JBoss: allows empty password to authenticate against LDAP | [
"cpe:/a:redhat:jboss_enterprise_brms_platform:5.3.1",
"cpe:/a:redhat:jboss_enterprise_portal_platform:4.3.0:update7",
"cpe:/a:redhat:jboss_enterprise_portal_platform:5.2.2",
"cpe:/a:redhat:jboss_enterprise_soa_platform:4.2.0:update5",
"cpe:/a:redhat:jboss_enterprise_soa_platform:4.3.0:update5",
"cpe:/a:redhat:jboss_enterprise_soa_platform:5.3.1"
]
| null | null | null | null |
RHSA-2013:0266 | Red Hat Security Advisory: tomcat6 security update | tomcat: HTTP NIO connector OOM DoS via a request with large headers Tomcat/JBoss Web - Bypass of CSRF prevention filter Tomcat - Denial Of Service when using NIO+SSL+sendfile tomcat: three DIGEST authentication implementation issues tomcat: three DIGEST authentication implementation issues tomcat: three DIGEST authentication implementation issues | [
"cpe:/a:redhat:jboss_enterprise_web_server:2::el5",
"cpe:/a:redhat:jboss_enterprise_web_server:2::el6"
]
| null | null | null | null |
RHSA-2021:0153 | Red Hat Security Advisory: dnsmasq security update | dnsmasq: loose address/port check in reply_query() makes forging replies easier for an off-path attacker dnsmasq: loose query name check in reply_query() makes forging replies easier for an off-path attacker dnsmasq: multiple queries forwarded for the same name makes forging replies easier for an off-path attacker | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
]
| null | 4 | null | null |
RHSA-2022:1075 | Red Hat Security Advisory: httpd24-httpd security update | httpd: Errors encountered during the discarding of request body lead to HTTP request smuggling | [
"cpe:/a:redhat:rhel_software_collections:3::el7"
]
| null | 8.3 | null | null |
RHSA-2021:4826 | Red Hat Security Advisory: mailman:2.1 security update | mailman: CSRF token derived from admin password allows offline brute-force attack mailman: CSRF token bypass allows to perform CSRF attacks and account takeover | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
]
| null | 8 | null | null |
RHSA-2020:5656 | Red Hat Security Advisory: kernel security update | kernel: out of bounds write in function i2c_smbus_xfer_emulated in drivers/i2c/i2c-core-smbus.c kernel: race condition in smp_task_timedout() and smp_task_done() in drivers/scsi/libsas/sas_expander.c leads to use-after-free kernel: out of bounds write in i2c driver leads to local escalation of privilege kernel: Denial Of Service in the __ipmi_bmc_register() function in drivers/char/ipmi/ipmi_msghandler.c kernel: mounting a crafted ext4 filesystem image, performing some operations, and unmounting can lead to a use-after-free in ext4_put_super in fs/ext4/super.c kernel: out-of-bounds write via crafted keycode table kernel: sg_write function lacks an sg_remove_request call in a certain failure case | [
"cpe:/o:redhat:enterprise_linux:7::hypervisor",
"cpe:/o:redhat:rhel_eus:7.6::computenode",
"cpe:/o:redhat:rhel_eus:7.6::server"
]
| null | 6.7 | 7.8 | null |
RHSA-2018:3529 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.1.5 on RHEL 6 security update | JBoss/WildFly: iiop does not honour strict transport confidentiality | [
"cpe:/a:redhat:jboss_enterprise_application_platform:7::el6"
]
| null | null | 5.3 | null |
RHSA-2020:1794 | Red Hat Security Advisory: systemd security, bug fix, and enhancement update | systemd: services with DynamicUser can create SUID/SGID binaries systemd: services with DynamicUser can get new privileges and create SGID binaries | [
"cpe:/o:redhat:enterprise_linux:8::baseos"
]
| null | null | 4.5 | null |
RHSA-2020:0160 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.2.6 on RHEL 7 security update | hibernate-validator: safeHTML validator allows XSS jackson-databind: Serialization gadgets in com.zaxxer.hikari.HikariConfig EAP: Vault system property security attribute value is revealed on CLI 'reload' command undertow: possible Denial Of Service (DOS) in Undertow HTTP server listening on HTTPS jackson-databind: Serialization gadgets in classes of the commons-configuration package jackson-databind: Serialization gadgets in classes of the xalan package jackson-databind: Serialization gadgets in com.zaxxer.hikari.HikariDataSource netty: HTTP request smuggling by mishandled whitespace before the colon in HTTP headers jackson-databind: Serialization gadgets in org.apache.commons.dbcp.datasources.* jackson-databind: Serialization gadgets in com.p6spy.engine.spy.P6DataSource jackson-databind: Serialization gadgets in classes of the ehcache package jackson-databind: Serialization gadgets in org.apache.log4j.receivers.db.* | [
"cpe:/a:redhat:jboss_enterprise_application_platform:7.2::el7"
]
| null | null | 8.1 | null |
RHSA-2024:2941 | Red Hat Security Advisory: RHACS 4.4 enhancement and security update | golang: net/http, x/net/http2: unlimited number of CONTINUATION frames causes DoS golang: net/http/cookiejar: incorrect forwarding of sensitive headers and cookies on HTTP redirect golang: net/http: golang: mime/multipart: golang: net/textproto: memory exhaustion in Request.ParseMultipartForm golang: crypto/x509: Verify panics on certificates with an unknown public key algorithm golang: net/mail: comments in display names are incorrectly handled webpack-dev-middleware: lack of URL validation may lead to file leak | [
"cpe:/a:redhat:advanced_cluster_security:4.4::el8"
]
| null | 7.4 | null | null |
RHSA-2012:0841 | Red Hat Security Advisory: abrt, libreport, btparser, and python-meh security and bug fix update | abrt: may leak some personal information to bugzilla with some certain applications abrt: Setuid process core dump archived with unsafe GID permissions | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
]
| null | null | null | null |
RHSA-2018:3090 | Red Hat Security Advisory: ovmf security, bug fix, and enhancement update | openssl: Handling of crafted recursive ASN.1 structures can cause a stack overflow and resulting denial of service | [
"cpe:/o:redhat:enterprise_linux:7::server"
]
| null | null | 6.5 | null |
RHSA-2008:0584 | Red Hat Security Advisory: pidgin security and bug fix update | pidgin MSN integer overflow | [
"cpe:/a:redhat:rhel_productivity:5",
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws",
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws",
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation"
]
| null | null | null | null |
RHSA-2009:1512 | Red Hat Security Advisory: kdegraphics security update | xpdf: multiple integer overflows xpdf/poppler: SplashBitmap integer overflow xpdf/poppler: Splash:: drawImage integer overflow and missing allocation return value check xpdf/poppler: integer overflow in ObjectStream::ObjectStream (oCERT-2009-016) xpdf/poppler: ImageStream:: ImageStream integer overflow | [
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
]
| null | null | null | null |
RHSA-2025:3645 | Red Hat Security Advisory: tomcat security update | tomcat: RCE due to TOCTOU issue in JSP compilation tomcat: Potential RCE and/or information disclosure and/or information corruption with partial PUT | [
"cpe:/a:redhat:enterprise_linux:9::appstream"
]
| null | 8.6 | null | null |
RHSA-2024:5436 | Red Hat Security Advisory: OpenShift Container Platform 4.14.35 security update | golang: net/http: golang: mime/multipart: golang: net/textproto: memory exhaustion in Request.ParseMultipartForm golang: net/netip: Unexpected behavior from Is methods for IPv4-mapped IPv6 addresses | [
"cpe:/a:redhat:openshift:4.14::el8",
"cpe:/a:redhat:openshift:4.14::el9"
]
| null | 6.7 | null | null |
RHSA-2024:0897 | Red Hat Security Advisory: kernel security update | kernel: nfp: use-after-free in area_cache_get() kernel: null-ptr-deref vulnerabilities in sl_tx_timeout in drivers/net/slip kernel: HID: check empty report_list in hid_validate_values() kernel: Possible use-after-free since the two fdget() during vhost_net_set_backend() kernel: NULL pointer dereference in can_rcv_filter kernel: Slab-out-of-bound read in compare_netdev_and_ip kernel: net/sched: sch_hfsc UAF kernel: use-after-free in sch_qfq network scheduler kernel: A heap out-of-bounds write when function perf_read_group is called and sibling_list is smaller than its child's sibling_list kernel: NULL pointer dereference in nvmet_tcp_build_iovec kernel: NULL pointer dereference in nvmet_tcp_execute_request kernel: NULL pointer dereference in __nvmet_req_complete kernel: Out-Of-Bounds Read vulnerability in smbCalcSize kernel: OOB Access in smb2_dump_detail kernel: inactive elements in nft_pipapo_walk kernel: use-after-free in l2cap_sock_release in net/bluetooth/l2cap_sock.c kernel: IGB driver inadequate buffer size for frames larger than MTU kernel: SEV-ES local priv escalation kernel: ktls overwrites readonly memory pages when using function splice with a ktls socket as destination | [
"cpe:/a:redhat:enterprise_linux:8::crb",
"cpe:/o:redhat:enterprise_linux:8::baseos"
]
| null | 7 | null | null |
RHSA-2008:0594 | Red Hat Security Advisory: java-1.6.0-sun security update | OpenJDK JMX allows illegal operations with local monitoring (6332953) Java RE allows Same Origin Policy to be Bypassed (6687932) OpenJDK JAX-WS unauthorized URL access (6542088) security flaw JDK untrusted applet/application privilege escalation (6661918) Security Vulnerabilities in the Java Runtime Environment Scripting Language Support (6529568, 6529579) security flaw Java Web Start, arbitrary file creation (6703909) Java Web Start, untrusted application may determine Cache Location (6704074) | [
"cpe:/a:redhat:rhel_extras:4",
"cpe:/a:redhat:rhel_extras:5::client",
"cpe:/a:redhat:rhel_extras:5::server"
]
| null | null | null | null |
RHSA-2005:235 | Red Hat Security Advisory: mailman security update | security flaw | [
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws",
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
]
| null | null | null | null |
RHSA-2021:2519 | Red Hat Security Advisory: RHV-H security update (redhat-virtualization-host) 4.3.16 | hw: vt-d related privilege escalation dhcp: stack-based buffer overflow when parsing statements with colon-separated hex digits in config or lease files in dhcpd and dhclient glib: integer overflow in g_bytes_new function on 64-bit platforms due to an implicit cast from 64 bits to 32 bits | [
"cpe:/o:redhat:enterprise_linux:7::hypervisor"
]
| null | 9.8 | null | null |
RHSA-2008:0789 | Red Hat Security Advisory: dnsmasq security update | bind: implement source UDP port randomization (CERT VU#800113) | [
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::server"
]
| null | null | null | null |
RHSA-2023:1586 | Red Hat Security Advisory: pesign security update | pesign: Local privilege escalation on pesign systemd service | [
"cpe:/a:redhat:rhel_e4s:8.1::appstream"
]
| null | 7.8 | null | null |
RHSA-2021:0857 | Red Hat Security Advisory: kernel-rt security and bug fix update | kernel: malicious USB devices can lead to multiple out-of-bounds write kernel: out-of-bounds reads in pinctrl subsystem. kernel: use-after-free in i915_ppgtt_close in drivers/gpu/drm/i915/i915_gem_gtt.c kernel: performance counters race condition use-after-free kernel: Local buffer overflow in ctnetlink_parse_tuple_filter in net/netfilter/nf_conntrack_netlink.c kernel: Geneve/IPsec traffic may be unencrypted between two Geneve endpoints kernel: use-after-free in read in vt_do_kdgkb_ioctl kernel: ICMP rate limiting can be used for DNS poisoning attack kernel: SCSI target (LIO) write to any block on ILO backstore kernel: locking issue in drivers/tty/tty_jobctrl.c can lead to an use-after-free kernel: increase slab leak leads to DoS | [
"cpe:/a:redhat:rhel_extras_rt:7"
]
| null | 5.1 | 6.8 | null |
RHBA-2015:0364 | Red Hat Bug Fix Advisory: nss, nss-softokn, nss-util, and nspr bug fix and enhancement update | Mozilla: Out of bounds write in NSPR (MFSA 2014-55) | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
]
| null | null | null | null |
RHSA-2023:1407 | Red Hat Security Advisory: thunderbird security update | Mozilla: Incorrect code generation during JIT compilation Mozilla: Potential out-of-bounds when accessing throttled streams Mozilla: Invalid downcast in Worklets Mozilla: URL being dragged from a removed cross-origin iframe into the same tab triggered navigation Mozilla: Memory safety bugs fixed in Firefox 111 and Firefox ESR 102.9 | [
"cpe:/a:redhat:enterprise_linux:9::appstream"
]
| null | 8.8 | null | null |
RHSA-2013:1028 | Red Hat Security Advisory: Fuse ESB Enterprise 7.1.0 update | apache-cxf: XML encryption backwards compatibility attacks rubygem-json: Denial of Service and SQL Injection ruby: entity expansion DoS vulnerability in REXML apache-cxf: Multiple denial of service flaws in the StAX parser | [
"cpe:/a:redhat:fuse_esb_enterprise:7.1.0"
]
| null | null | null | null |
RHSA-2022:6429 | Red Hat Security Advisory: Migration Toolkit for Containers (MTC) 1.7.4 security and bug fix update | nodejs-lodash: ReDoS via the toNumber, trim and trimEnd functions nodejs-lodash: command injection via template nodejs-url-parse: authorization bypass through user-controlled key npm-url-parse: Authorization Bypass Through User-Controlled Key npm-url-parse: Authorization bypass through user-controlled key npm-url-parse: authorization bypass through user-controlled key eventsource: Exposure of Sensitive Information golang: compress/gzip: stack exhaustion in Reader.Read | [
"cpe:/a:redhat:rhmt:1.7::el8"
]
| null | 7.5 | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.