id
stringlengths 13
15
| title
stringlengths 29
176
| description
stringlengths 8
32.1k
| cpes
sequencelengths 0
20
| cvss_v4_0
null | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
null |
---|---|---|---|---|---|---|---|
RHSA-2021:4838 | Red Hat Security Advisory: mailman:2.1 security update | mailman: CSRF token derived from admin password allows offline brute-force attack mailman: CSRF token bypass allows to perform CSRF attacks and account takeover | [
"cpe:/a:redhat:rhel_eus:8.1::appstream"
] | null | 8 | null | null |
RHSA-2022:8896 | Red Hat Security Advisory: Red Hat OpenStack Platform 13.0 (python-virtualbmc) security update | VirtualBMC: removes password protection from the managed libvirt XML domain | [
"cpe:/a:redhat:openstack:13::el7"
] | null | 5.5 | null | null |
RHSA-2020:2286 | Red Hat Security Advisory: ipmitool security update | ipmitool: Buffer overflow in read_fru_area_section function in lib/ipmi_fru.c | [
"cpe:/o:redhat:rhel_eus:7.6::computenode",
"cpe:/o:redhat:rhel_eus:7.6::server"
] | null | 8.1 | null | null |
RHSA-2024:0213 | Red Hat Security Advisory: Red Hat OpenStack Platform 17.1 (python-eventlet) security update | python-eventlet: patch regression for CVE-2021-21419 in some Red Hat builds | [
"cpe:/a:redhat:openstack:17.1::el9"
] | null | 5.3 | null | null |
RHSA-2020:3285 | Red Hat Security Advisory: postgresql-jdbc security update | postgresql-jdbc: XML external entity (XXE) vulnerability in PgSQLXML | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 7.7 | null | null |
RHBA-2024:10826 | Red Hat Bug Fix Advisory: OpenShift Container Platform 4.16.26 packages and security update | cri-o: Checkpoint restore can be triggered from different namespaces | [
"cpe:/a:redhat:openshift:4.16::el8",
"cpe:/a:redhat:openshift:4.16::el9"
] | null | 7.4 | null | null |
RHSA-2013:0568 | Red Hat Security Advisory: dbus-glib security update | dbus-glib: Local privilege escalation due improper filtering of message sender when NameOwnerChanged signal received | [
"cpe:/o:redhat:enterprise_linux:5::server",
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2020:0465 | Red Hat Security Advisory: java-1.8.0-ibm security update | OpenJDK: Incorrect exception processing during deserialization in BeanContextSupport (Serialization, 8224909) OpenJDK: Incorrect isBuiltinStreamHandler check causing URL normalization issues (Networking, 8228548) OpenJDK: Serialization filter changes via jdk.serialFilter property modification (Serialization, 8231422) OpenJDK: Incomplete enforcement of maxDatagramSockets limit in DatagramChannelImpl (Networking, 8231795) | [
"cpe:/a:redhat:enterprise_linux:8::supplementary"
] | null | 3.7 | null | null |
RHSA-2022:7790 | Red Hat Security Advisory: bind security update | bind: DNS forwarders - cache poisoning vulnerability | [
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 6.8 | null | null |
RHSA-2013:0234 | Red Hat Security Advisory: JBoss Enterprise Application Platform 6.0.1 security update | JBoss: allows empty password to authenticate against LDAP | [
"cpe:/a:redhat:jboss_enterprise_application_platform:6.0.1"
] | null | null | null | null |
RHSA-2022:7970 | Red Hat Security Advisory: protobuf security update | protobuf: Incorrect parsing of nullchar in the proto symbol leads to Nullptr dereference | [
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::crb"
] | null | 7.5 | null | null |
RHSA-2019:1948 | Red Hat Security Advisory: ruby security update | ruby: OpenSSL::X509:: Name equality check does not work correctly | [
"cpe:/o:redhat:rhel_eus:7.4::computenode",
"cpe:/o:redhat:rhel_eus:7.4::server"
] | null | null | 7.5 | null |
RHSA-2020:5374 | Red Hat Security Advisory: kernel security and bug fix update | kernel: soft-lockups in iov_iter_copy_from_user_atomic() could result in DoS | [
"cpe:/a:redhat:rhel_eus:8.1::crb",
"cpe:/o:redhat:rhel_eus:8.1::baseos"
] | null | 5.5 | null | null |
RHSA-2017:1508 | Red Hat Security Advisory: openstack-nova security, bug fix, and enhancement update | openstack-nova: Sensitive information included in legacy notification exception contexts | [
"cpe:/a:redhat:openstack:9::el7"
] | null | null | 6.1 | null |
RHSA-2023:1472 | Red Hat Security Advisory: thunderbird security update | nss: Arbitrary memory write via PKCS 12 Mozilla: Incorrect code generation during JIT compilation Mozilla: Potential out-of-bounds when accessing throttled streams Mozilla: Invalid downcast in Worklets Mozilla: URL being dragged from a removed cross-origin iframe into the same tab triggered navigation Mozilla: Memory safety bugs fixed in Firefox 111 and Firefox ESR 102.9 | [
"cpe:/a:redhat:rhel_eus:8.4::appstream"
] | null | 8.8 | null | null |
RHSA-2007:0465 | Red Hat Security Advisory: pam security and bug fix update | security flaw security flaw | [
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws"
] | null | null | null | null |
RHSA-2008:1036 | Red Hat Security Advisory: firefox security update | Layout engine crashes - Firefox 2 and 3 Layout engine crash - Firefox 3 only JavaScript engine crash - Firefox 3 only Firefox 3 User tracking via XUL persist attribute Firefox XMLHttpRequest 302 response disclosure Firefox Cross-domain data theft via script redirect error message Firefox errors parsing URLs with control characters Firefox null characters ignored by CSS parser Firefox XSS via XBL bindings to unloaded document Firefox JavaScript privilege escalation Firefox XSS vulnerabilities in SessionStore | [
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws",
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2015:2083 | Red Hat Security Advisory: postgresql92-postgresql security update | postgresql: limited memory disclosure flaw in crypt() postgresql: stack overflow DoS when parsing json or jsonb inputs | [
"cpe:/a:redhat:rhel_software_collections:2::el6",
"cpe:/a:redhat:rhel_software_collections:2::el7"
] | null | null | null | null |
RHSA-2025:1315 | Red Hat Security Advisory: doxygen security update | jquery: Untrusted code execution via <option> tag in HTML passed to DOM manipulation methods | [
"cpe:/a:redhat:rhel_eus:9.4::crb"
] | null | 6.1 | null | null |
RHBA-2020:3614 | Red Hat Bug Fix Advisory: Satellite 6.7.3 Async Bug Fix Update | foreman-installer: Candlepin plaintext password disclosure while Satellite update | [
"cpe:/a:redhat:satellite:6.7::el7",
"cpe:/a:redhat:satellite_capsule:6.7::el7"
] | null | 5.3 | null | null |
RHSA-2022:6882 | Red Hat Security Advisory: Openshift Logging 5.3.13 security and bug fix release | golang: golang.org/x/text/language: ParseAcceptLanguage takes a long time to parse complex tags | [
"cpe:/a:redhat:logging:5.3::el8"
] | null | 7.5 | null | null |
RHSA-2015:1931 | Red Hat Security Advisory: qemu-kvm-rhev security update | qemu: vnc: insufficient resource limiting in VNC websockets decoder | [
"cpe:/o:redhat:enterprise_linux:7::hypervisor"
] | null | null | null | null |
RHSA-2021:3559 | Red Hat Security Advisory: rh-ruby27-ruby security update | rubygem-bundler: Dependencies of gems with explicit source may be installed from a different source rubygem-rdoc: Command injection vulnerability in RDoc ruby: FTP PASV command response can cause Net::FTP to connect to arbitrary host ruby: StartTLS stripping vulnerability in Net::IMAP | [
"cpe:/a:redhat:rhel_software_collections:3::el7"
] | null | 7.4 | null | null |
RHSA-2008:0197 | Red Hat Security Advisory: gnome-screensaver security update | gnome-screensaver using NIS auth will unlock if NIS goes away | [
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2019:3244 | Red Hat Security Advisory: Red Hat Fuse 7.4.1 security update | syndesis: default CORS configuration is allow all | [
"cpe:/a:redhat:jboss_fuse:7"
] | null | null | 7.4 | null |
RHSA-2021:2305 | Red Hat Security Advisory: microcode_ctl security, bug fix and enhancement update | hw: vt-d related privilege escalation hw: improper isolation of shared resources in some Intel Processors hw: observable timing discrepancy in some Intel Processors hw: information disclosure on some Intel Atom processors | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 5.6 | null | null |
RHSA-2024:11117 | Red Hat Security Advisory: gstreamer1-plugins-base security update | gstreamer1-plugins-base: GStreamer has a stack-buffer overflow in vorbis_handle_identification_packet gstreamer1-plugins-base: stack-buffer overflow in gst_opus_dec_parse_header gstreamer1-plugins-base: out-of-bounds write in Ogg demuxer | [
"cpe:/a:redhat:rhel_eus:9.2::appstream"
] | null | 9.8 | null | null |
RHSA-2020:4903 | Red Hat Security Advisory: nodejs:12 security and bug fix update | nodejs-dot-prop: prototype pollution nodejs: HTTP request smuggling due to CR-to-Hyphen conversion libuv: buffer overflow in realpath npm: sensitive information exposure through logs | [
"cpe:/a:redhat:rhel_eus:8.1::appstream"
] | null | 4.4 | null | null |
RHSA-2024:4016 | Red Hat Security Advisory: thunderbird security update | Mozilla: Use-after-free in JavaScript object transplant Mozilla: External protocol handlers leaked by timing attack Mozilla: Sandboxed iframes were able to bypass sandbox restrictions to open a new window Mozilla: Cross-Origin Image leak via Offscreen Canvas Mozilla: Memory Corruption in Text Fragments Mozilla: Memory safety bugs fixed in Firefox 127, Firefox ESR 115.12, and Thunderbird 115.12 Mozilla: Use-after-free in networking | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 7.5 | null | null |
RHSA-2018:3731 | Red Hat Security Advisory: rh-ruby25-ruby security, bug fix, and enhancement update | ruby: HTTP response splitting in WEBrick ruby: Unintentional file and directory creation with directory traversal in tempfile and tmpdir ruby: DoS by large request in WEBrick ruby: Buffer under-read in String#unpack ruby: Unintentional socket creation by poisoned NULL byte in UNIXServer and UNIXSocket ruby: Unintentional directory traversal by poisoned NULL byte in Dir ruby: OpenSSL::X509:: Name equality check does not work correctly ruby: Tainted flags are not propagated in Array#pack and String#unpack with some directives rubygems: Path traversal when writing to a symlinked basedir outside of the root rubygems: Unsafe Object Deserialization Vulnerability in gem owner allowing arbitrary code execution on specially crafted YAML rubygems: Infinite loop vulnerability due to negative size in tar header causes Denial of Service rubygems: Improper verification of signatures in tarball allows to install mis-signed gem rubygems: Missing URL validation on spec home attribute allows malicious gem to set an invalid homepage URL rubygems: XSS vulnerability in homepage attribute when displayed via gem server rubygems: Path traversal issue during gem installation allows to write to arbitrary filesystem locations | [
"cpe:/a:redhat:rhel_software_collections:3::el7"
] | null | null | 5.5 | null |
RHSA-2024:9818 | Red Hat Security Advisory: tigervnc security update | xorg-x11-server: tigervnc: heap-based buffer overflow privilege escalation vulnerability | [
"cpe:/a:redhat:rhel_aus:8.2::appstream"
] | null | 7.8 | null | null |
RHEA-2013:1392 | Red Hat Enhancement Advisory: Red Hat Satellite Proxy 5.6.0 General Availability | rhn-proxy: may transmit credentials over clear-text | [
"cpe:/a:redhat:network_proxy:5.6::el5",
"cpe:/a:redhat:network_proxy:5.6::el6"
] | null | null | null | null |
RHSA-2021:0790 | Red Hat Security Advisory: dotnet3.1 security and bugfix update | dotnet: System.Text.Encodings.Web Remote Code Execution | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 8.1 | null | null |
RHSA-2005:512 | Red Hat Security Advisory: mc security update | security flaw security flaw security flaw security flaw security flaw security flaw security flaw | [
"cpe:/o:redhat:enterprise_linux:2.1::as",
"cpe:/o:redhat:enterprise_linux:2.1::aw",
"cpe:/o:redhat:enterprise_linux:2.1::ws"
] | null | null | null | null |
RHSA-2014:0536 | Red Hat Security Advisory: mysql55-mysql security update | mysql: unspecified DoS related to XML (CPU April 2014) mysql: unspecified DoS related to Partition (CPU April 2014) mysql: unspecified DoS related to Performance Schema (CPU April 2014) mysql: unspecified DoS related to Options (CPU April 2014) mysql: unspecified DoS related to Federated (CPU April 2014) mysql: unspecified vulnerability related to RBR (CPU April 2014) mysql: unspecified DoS related to Replication (CPU April 2014) | [
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2002:270 | Red Hat Security Advisory: : : : Updated pine packages available | security flaw | [
"cpe:/o:redhat:linux:6.2",
"cpe:/o:redhat:linux:7.0",
"cpe:/o:redhat:linux:7.1",
"cpe:/o:redhat:linux:7.2",
"cpe:/o:redhat:linux:7.3",
"cpe:/o:redhat:linux:8.0"
] | null | null | null | null |
RHSA-2022:4899 | Red Hat Security Advisory: compat-openssl11 security and bug fix update | openssl: Infinite loop in BN_mod_sqrt() reachable when parsing certificates | [
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 7.5 | null | null |
RHSA-2009:1674 | Red Hat Security Advisory: firefox security update | Mozilla crash with evidence of memory corruption Mozilla crashes with evidence of memory corruption Mozilla NTLM reflection vulnerability Mozilla SSL spoofing with document.location and empty SSL response page Mozilla URL spoofing via invalid document.location Mozilla Chrome privilege escalation via window.opener | [
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws",
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2010:0237 | Red Hat Security Advisory: sendmail security and bug fix update | sendmail allows external mail with from address [email protected] sendmail: incorrect verification of SSL certificate with NUL in name | [
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2004:002 | Red Hat Security Advisory: ethereal security update | security flaw security flaw | [
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws"
] | null | null | null | null |
RHSA-2010:1003 | Red Hat Security Advisory: git security update | (gitweb): XSS due to missing escaping of HTML element attributes | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2020:5257 | Red Hat Security Advisory: firefox security update | Mozilla: Variable time processing of cross-origin images during drawImage calls Mozilla: Parsing mismatches could confuse and bypass security sanitizer for chrome privileged code Mozilla: Fullscreen could be enabled without displaying the security UI Mozilla: XSS through paste (manual and clipboard API) Mozilla: Requests intercepted through ServiceWorkers lacked MIME type restrictions Mozilla: Use-after-free in WebRequestService Mozilla: Potential use-after-free in uses of nsTArray Mozilla: DoH did not filter IPv4 mapped IP Addresses Mozilla: Software keyboards may have remembered typed passwords Mozilla: Memory safety bugs fixed in Firefox 83 and Firefox ESR 78.5 | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | 8.8 | 6.1 | null |
RHSA-2020:2009 | Red Hat Security Advisory: OpenShift Container Platform 4.3.19 ose-cluster-image-registry-operator-container security update | openshift/cluster-image-registry-operator: secrets disclosed in logs | [
"cpe:/a:redhat:openshift:4.3::el7"
] | null | 7 | null | null |
RHSA-2022:8318 | Red Hat Security Advisory: libldb security, bug fix, and enhancement update | samba: AD users can induce a use-after-free in the server process with an LDAP add or modify request | [
"cpe:/a:redhat:enterprise_linux:9::crb",
"cpe:/o:redhat:enterprise_linux:9::baseos"
] | null | 5.4 | null | null |
RHSA-2019:2511 | Red Hat Security Advisory: mysql:8.0 security update | mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2019) mysql: Server: Parser unspecified vulnerability (CPU Jan 2019) mysql: Server: Replication unspecified vulnerability (CPU Jan 2019) mysql: Server: Parser unspecified vulnerability (CPU Jan 2019) mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2019) mysql: Server: PS unspecified vulnerability (CPU Jan 2019) mysql: Server: Security: Privileges unspecified vulnerability (CPU Jan 2019) mysql: Server: DDL unspecified vulnerability (CPU Jan 2019) mysql: Server: DDL unspecified vulnerability (CPU Jan 2019) mysql: InnoDB unspecified vulnerability (CPU Jan 2019) mysql: Server: Connection Handling unspecified vulnerability (CPU Jan 2019) mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2019) mysql: InnoDB unspecified vulnerability (CPU Jan 2019) mysql: Server: Partition unspecified vulnerability (CPU Jan 2019) mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2019) mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2019) mysql: Server: Replication unspecified vulnerability (CPU Jan 2019) mysql: Server: Security: Privileges unspecified vulnerability (CPU Jan 2019) mysql: Server: Security: Privileges unspecified vulnerability (CPU Jan 2019) mysql: Server: Replication unspecified vulnerability (CPU Jan 2019) mysql: Server: Options unspecified vulnerability (CPU Jan 2019) mysql: Server: Packaging unspecified vulnerability (CPU Jan 2019) mysql: Server: DDL unspecified vulnerability (CPU Jan 2019) mysql: Server: Connection unspecified vulnerability (CPU Jan 2019) mysql: InnoDB unspecified vulnerability (CPU Apr 2019) mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2019) mysql: Server: Security: Privileges unspecified vulnerability (CPU Apr 2019) mysql: InnoDB unspecified vulnerability (CPU Apr 2019) mysql: Server: Partition unspecified vulnerability (CPU Apr 2019) mysql: Server: Security: Privileges unspecified vulnerability (CPU Apr 2019) mysql: Server: PS unspecified vulnerability (CPU Apr 2019) mysql: InnoDB unspecified vulnerability (CPU Apr 2019) mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2019) mysql: Server: Security: Privileges unspecified vulnerability (CPU Apr 2019) mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2019) mysql: Server: Replication unspecified vulnerability (CPU Apr 2019) mysql: Server: Replication unspecified vulnerability (CPU Apr 2019) mysql: Server: Security: Privileges unspecified vulnerability (CPU Apr 2019) mysql: Server: Options unspecified vulnerability (CPU Apr 2019) mysql: InnoDB unspecified vulnerability (CPU Apr 2019) mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2019) mysql: Server: DDL unspecified vulnerability (CPU Apr 2019) mysql: Server: Security: Privileges unspecified vulnerability (CPU Apr 2019) mysql: InnoDB unspecified vulnerability (CPU Apr 2019) mysql: Server: Replication unspecified vulnerability (CPU Apr 2019) mysql: Server: Information Schema unspecified vulnerability (CPU Apr 2019) mysql: Server: Replication unspecified vulnerability (CPU Apr 2019) mysql: Server: Replication unspecified vulnerability (CPU Apr 2019) mysql: Server: Group Replication Plugin unspecified vulnerability (CPU Apr 2019) mysql: Server: DDL unspecified vulnerability (CPU Apr 2019) mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2019) mysql: Server: Options unspecified vulnerability (CPU Apr 2019) mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2019) mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2019) mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2019) mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2019) mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2019) mysql: Server: Security: Roles unspecified vulnerability (CPU Apr 2019) mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2019) mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2019) mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2019) mysql: Server: Pluggable Auth unspecified vulnerability (CPU Jul 2019) mysql: Server: Compiling unspecified vulnerability (CPU Jul 2019) mysql: Server: Security: Privileges unspecified vulnerability (CPU Jul 2019) mysql: Server: XML unspecified vulnerability (CPU Jul 2019) mysql: Server: Options unspecified vulnerability (CPU Jul 2019) mysql: Server: Replication unspecified vulnerability (CPU Jul 2019) mysql: Server: Optimizer unspecified vulnerability (CPU Jul 2019) mysql: InnoDB unspecified vulnerability (CPU Jul 2019) mysql: Server: Optimizer unspecified vulnerability (CPU Jul 2019) mysql: Server: Security: Privileges unspecified vulnerability (CPU Jul 2019) mysql: Server: Components / Services unspecified vulnerability (CPU Jul 2019) mysql: Server: DML unspecified vulnerability (CPU Jul 2019) mysql: InnoDB unspecified vulnerability (CPU Jul 2019) mysql: Server: Security: Privileges unspecified vulnerability (CPU Jul 2019) mysql: Server: Charsets unspecified vulnerability (CPU Jul 2019) mysql: Server: Optimizer unspecified vulnerability (CPU Jul 2019) mysql: Client programs unspecified vulnerability (CPU Jul 2019) mysql: InnoDB unspecified vulnerability (CPU Jul 2019) mysql: Server: Replication unspecified vulnerability (CPU Jul 2019) mysql: Server: FTS unspecified vulnerability (CPU Jul 2019) mysql: Server: Optimizer unspecified vulnerability (CPU Jul 2019) mysql: Server: Optimizer unspecified vulnerability (CPU Jul 2019) mysql: Server: Parser unspecified vulnerability (CPU Jul 2019) mysql: Server: Optimizer unspecified vulnerability (CPU Jul 2019) mysql: Server: Optimizer unspecified vulnerability (CPU Jul 2019) mysql: Server: Security: Privileges unspecified vulnerability (CPU Jul 2019) mysql: Server: Optimizer unspecified vulnerability (CPU Jul 2019) mysql: InnoDB unspecified vulnerability (CPU Jul 2019) mysql: Server: Optimizer unspecified vulnerability (CPU Jul 2019) mysql: Server: Security: Audit unspecified vulnerability (CPU Jul 2019) mysql: Server: Security: Roles unspecified vulnerability (CPU Jul 2019) mysql: Server: Optimizer unspecified vulnerability (CPU Jul 2019) mysql: Server: Optimizer unspecified vulnerability (CPU Jul 2019) mysql: InnoDB unspecified vulnerability (CPU Jul 2019) mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2019) mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2019) mysql: Client programs unspecified vulnerability (CPU Oct 2019) mysql: InnoDB unspecified vulnerability (CPU Oct 2019) mysql: Server: Security: Privileges unspecified vulnerability (CPU Oct 2022) | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 4.3 | 4.9 | null |
RHSA-2023:5049 | Red Hat Security Advisory: httpd:2.4 security update | httpd: mod_proxy_uwsgi HTTP response splitting | [
"cpe:/a:redhat:rhel_eus:8.6::appstream"
] | null | 7.5 | null | null |
RHSA-2017:1262 | Red Hat Security Advisory: rpcbind security update | libntirpc: Memory leak when failing to parse XDR strings or bytearrays | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 7.5 | null |
RHSA-2005:811 | Red Hat Security Advisory: gtk2 security update | security flaw security flaw | [
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws",
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2023:6217 | Red Hat Security Advisory: Red Hat OpenShift Enterprise security update | golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487) HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack) | [
"cpe:/a:redhat:openshift:4.14::el8",
"cpe:/a:redhat:openshift:4.14::el9"
] | null | 7.5 | null | null |
RHSA-2022:6582 | Red Hat Security Advisory: kernel-rt security and bug fix update | kernel: buffer overflow in nft_set_desc_concat_parse() kernel: heap overflow in nft_set_elem_init() | [
"cpe:/a:redhat:enterprise_linux:9::nfv",
"cpe:/a:redhat:enterprise_linux:9::realtime"
] | null | 7.8 | null | null |
RHSA-2024:4267 | Red Hat Security Advisory: fontforge security update | fontforge: command injection via crafted filenames fontforge: command injection via crafted archives or compressed files | [
"cpe:/a:redhat:enterprise_linux:8::crb"
] | null | 4.2 | null | null |
RHSA-2022:6003 | Red Hat Security Advisory: kernel security, bug fix, and enhancement update | kernel: information leak in scsi_ioctl() kernel: use-after-free in tc_new_tfilter() in net/sched/cls_api.c kernel: KVM: x86/mmu: make apf token non-zero to fix bug | [
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::crb",
"cpe:/o:redhat:enterprise_linux:9::baseos"
] | null | 5.5 | null | null |
RHSA-2019:2782 | Red Hat Security Advisory: qpid-proton security update | qpid-proton: TLS Man in the Middle Vulnerability | [
"cpe:/a:redhat:rhel_satellite_tools:6.4::el5",
"cpe:/a:redhat:rhel_satellite_tools:6.4::el6",
"cpe:/a:redhat:rhel_satellite_tools:6.4::el7",
"cpe:/o:redhat:enterprise_linux:7::hypervisor"
] | null | null | 7.4 | null |
RHSA-2009:1673 | Red Hat Security Advisory: seamonkey security update | Mozilla crash with evidence of memory corruption Mozilla NTLM reflection vulnerability Mozilla SSL spoofing with document.location and empty SSL response page | [
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws",
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2024:3713 | Red Hat Security Advisory: OpenShift Container Platform 4.12.59 bug fix and security update | python-gunicorn: HTTP Request Smuggling due to improper validation of Transfer-Encoding headers | [
"cpe:/a:redhat:openshift:4.12::el8",
"cpe:/a:redhat:openshift:4.12::el9"
] | null | null | 7.5 | null |
RHSA-2009:1140 | Red Hat Security Advisory: ruby security update | fetchmail/mutt/evolution/...: APOP password disclosure vulnerability ruby: Incorrect checks for validity of X.509 certificates ruby: DoS vulnerability in BigDecimal | [
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws",
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2019:1166 | Red Hat Security Advisory: java-1.7.1-ibm security update | OpenJDK: Slow conversion of BigDecimal to long (Libraries, 8211936) OpenJDK: Incorrect skeleton selection in RMI registry server-side dispatch handling (RMI, 8218453) JDK: Unspecified vulnerability fixed in 7u221 and 8u211 (2D) OpenJDK: Font layout engine out of bounds access setCurrGlyphID() (2D, 8219022) JDK: Read beyond the end of bytecode array causing JVM crash | [
"cpe:/a:redhat:rhel_extras:7"
] | null | null | 7.5 | null |
RHSA-2007:0723 | Red Hat Security Advisory: thunderbird security update | security flaw security flaw security flaw security flaw security flaw security flaw | [
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws",
"cpe:/o:redhat:enterprise_linux:5::client"
] | null | null | null | null |
RHSA-2019:3700 | Red Hat Security Advisory: openssl security, bug fix, and enhancement update | openssl: timing side channel attack in the DSA signature algorithm openssl: timing side channel attack in the ECDSA signature generation openssl: ChaCha20-Poly1305 with long nonces | [
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | null | 2.9 | null |
RHSA-2024:0571 | Red Hat Security Advisory: tcpdump security update | tcpslice: use-after-free in extract_slice() | [
"cpe:/a:redhat:rhel_eus:8.8::appstream"
] | null | 5.5 | null | null |
RHSA-2020:4760 | Red Hat Security Advisory: tcpdump security, bug fix, and enhancement update | tcpdump: SMB data printing mishandled tcpdump: SMB data printing mishandled tcpdump: Buffer over-read in ldp_tlv_print() function in print-ldp.c tcpdump: Buffer over-read in icmp_print() function in print-icmp.c tcpdump: Buffer over-read in vrrp_print() function in print-vrrp.c tcpdump: Buffer over-read in lmp_print_data_link_subobjs() function in print-lmp.c tcpdump: Buffer over-read in rsvp_obj_print() function in print-rsvp.c tcpdump: Buffer over-read in print-icmp6.c tcpdump: Buffer over-read in bgp_capabilities_print() in print-bgp.c tcpdump: Buffer over-read in mfr_print() function in print-fr.c tcpdump: Buffer over-read in ikev1_n_print() function in print-isakmp.c tcpdump: Buffer over-read in babel_print_v2() in print-babel.c tcpdump: Out of bounds read/write in in get_next_file() in tcpdump.c tcpdump: Buffer over-read in ospf6_print_lshdr() function in print-ospf6.c tcpdump: Buffer over-read in bgp_capabilities_print() function in print-bgp.c tcpdump: Buffer over-read in function rpl_dio_printopt in print-icmp6.c tcpdump: Buffer over-read in print-802_11.c tcpdump: Access to uninitialized buffer in print_prefix() function in print-hncp.c tcpdump: Buffer over-read in dccp_print_option() function in print-dccp.c tcpdump: Buffer over-read in bgp_attr_print() function in print-bgp.c tcpdump: Resource exhaustion in bgp_attr_print() function in print-bgp.c tcpdump: Buffer over-read in print_trans() function in print-smb.c tcpdump: Resource exhaustion in smb_fdata() funtion in smbutil.c tcpdump: Buffer overflow in lmp_print_data_link_subobjs() in print-lmp.c | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 7.5 | null | null |
RHSA-2023:1177 | Red Hat Security Advisory: Red Hat Integration Camel Extension For Quarkus 2.7-1 security update | postgresql-jdbc: Information leak of prepared statement data due to insecure temporary file permissions xstream: Denial of Service by injecting recursive collections or maps based on element's hash values raising a stack overflow | [
"cpe:/a:redhat:camel_quarkus:2.7"
] | null | 7.5 | null | null |
RHSA-2005:135 | Red Hat Security Advisory: squirrelmail security update | security flaw security flaw security flaw | [
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws"
] | null | null | null | null |
RHSA-2021:1859 | Red Hat Security Advisory: grafana security, bug fix, and enhancement update | grafana: XSS via a query alias for the Elasticsearch and Testdata datasource crewjam/saml: authentication bypass in saml authentication | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 9.8 | null | null |
RHSA-2023:7407 | Red Hat Security Advisory: fence-agents security update | python-certifi: Removal of e-Tugra root certificate python-urllib3: Cookie request header isn't stripped during cross-origin redirects | [
"cpe:/a:redhat:rhel_eus:8.6::appstream",
"cpe:/a:redhat:rhel_eus:8.6::highavailability",
"cpe:/a:redhat:rhel_eus:8.6::resilientstorage"
] | null | 5.9 | null | null |
RHSA-2024:2865 | Red Hat Security Advisory: OpenShift Container Platform 4.15.14 bug fix and security update | golang: net/http, x/net/http2: unlimited number of CONTINUATION frames causes DoS opentelemetry-go-contrib: DoS vulnerability in otelgrpc due to unbound cardinality metrics helm: Dependency management path traversal helm: Missing YAML Content Leads To Panic jose-go: improper handling of highly compressed data | [
"cpe:/a:redhat:openshift:4.15::el8",
"cpe:/a:redhat:openshift:4.15::el9"
] | null | 4.3 | null | null |
RHSA-2004:543 | Red Hat Security Advisory: cups security update | security flaw security flaw | [
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws"
] | null | null | null | null |
RHSA-2025:0922 | Red Hat Security Advisory: podman security update | podman: buildah: Container breakout by using --jobs=2 and a race condition when building a malicious Containerfile | [
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 8.6 | null | null |
RHSA-2002:004 | Red Hat Security Advisory: : : : New groff packages available to fix security problems | security flaw security flaw | [
"cpe:/o:redhat:linux:7.0",
"cpe:/o:redhat:linux:7.1",
"cpe:/o:redhat:linux:7.2"
] | null | null | null | null |
RHSA-2024:8935 | Red Hat Security Advisory: edk2 security update | openssl: Possible denial of service in X.509 name checks | [
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::crb"
] | null | 5.9 | null | null |
RHSA-2015:1742 | Red Hat Security Advisory: subversion security update | subversion: (mod_dav_svn) remote denial of service with certain requests with dynamically evaluated revision numbers subversion: (mod_dav_svn) spoofing svn:author property values for new revisions subversion: Mixed anonymous/authenticated path-based authz with httpd 2.4 subversion: svn_repos_trace_node_locations() reveals paths hidden by authz | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | null | null |
RHSA-2023:1904 | Red Hat Security Advisory: java-1.8.0-openjdk security and bug fix update | OpenJDK: improper connection handling during TLS handshake (8294474) OpenJDK: missing string checks for NULL characters (8296622) OpenJDK: incorrect handling of NULL characters in ProcessBuilder (8295304) OpenJDK: Swing HTML parsing issue (8296832) OpenJDK: incorrect enqueue of references in garbage collector (8298191) OpenJDK: certificate validation issue in TLS session negotiation (8298310) OpenJDK: missing check for slash characters in URI-to-path conversion (8298667) | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 3.7 | null | null |
RHSA-2023:1891 | Red Hat Security Advisory: java-17-openjdk security and bug fix update | OpenJDK: improper connection handling during TLS handshake (8294474) OpenJDK: missing string checks for NULL characters (8296622) OpenJDK: incorrect handling of NULL characters in ProcessBuilder (8295304) OpenJDK: Swing HTML parsing issue (8296832) OpenJDK: incorrect enqueue of references in garbage collector (8298191) OpenJDK: certificate validation issue in TLS session negotiation (8298310) OpenJDK: missing check for slash characters in URI-to-path conversion (8298667) | [
"cpe:/a:redhat:rhel_eus:8.6::appstream",
"cpe:/a:redhat:rhel_eus:8.6::crb"
] | null | 3.7 | null | null |
RHSA-2003:070 | Red Hat Security Advisory: : : : Updated hanterm packages provide security fixes | security flaw security flaw | [
"cpe:/o:redhat:linux:7.2",
"cpe:/o:redhat:linux:7.3",
"cpe:/o:redhat:linux:8.0"
] | null | null | null | null |
RHSA-2017:2547 | Red Hat Security Advisory: Red Hat JBoss BRMS 6.4.5 security update | jasypt: Vulnerable to timing attack against the password hash comparison batik: XML external entity processing vulnerability jackson-databind: Deserialization vulnerability via readValue method of ObjectMapper | [
"cpe:/a:redhat:jboss_enterprise_brms_platform:6.4"
] | null | null | 8.1 | null |
RHSA-2025:0978 | Red Hat Security Advisory: python-jinja2 security update | jinja2: Jinja has a sandbox breakout through indirect reference to format method | [
"cpe:/a:redhat:rhel_eus:9.2::appstream"
] | null | 6.3 | null | null |
RHSA-2007:0057 | Red Hat Security Advisory: bind security update | bind use-after-free BIND dnssec denial of service | [
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2022:5460 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 6.4.24 security update | tomcat: multiple requests with invalid payload length in a WebSocket frame could lead to DoS jbossweb: Incomplete fix of CVE-2020-13935 for WebSocket in JBossWeb could lead to DoS log4j: Remote code execution in Log4j 1.x when application is configured to use JMSAppender log4j: Remote code execution in Log4j 1.x when application is configured to use JMSSink log4j: SQL injection in Log4j 1.x when application is configured to use JDBCAppender log4j: Unsafe deserialization flaw in Chainsaw log viewer | [
"cpe:/a:redhat:jboss_enterprise_application_platform:6::el7"
] | null | 8.8 | null | null |
RHSA-2024:5815 | Red Hat Security Advisory: nodejs:20 security update | nodejs: fs.lstat bypasses permission model nodejs: Bypass network import restriction via data URL nodejs: fs.fchown/fchmod bypasses permission model | [
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 3.9 | 2.9 | null |
RHSA-2009:1278 | Red Hat Security Advisory: lftp security and bug fix update | lftp mirror --script does not escape names and targets of symbolic links | [
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2014:0139 | Red Hat Security Advisory: pidgin security update | pidgin: DoS when decoding non-UTF-8 strings in Yahoo protocol plugin pidgin: DoS when handling timestamps in the XMPP plugin pidgin: DoS when rendering long URLs pidgin: DoS when parsing certain HTTP response headers pidgin: DoS caused due to OOB read in Yahoo protocol plugin pidgin: DoS via multiple null pointer dereferences in MSN protocol plugin pidgin: Possible spoofing using iq replies in XMPP protocol plugin pidgin: DoS via specially-crafted stun messages pidgin: Heap-based buffer overflow when parsing chunked HTTP responses pidgin: Heap-based buffer overflow in Gadu-Gadu protocol plugin pidgin: Heap-based buffer overflow in MXit emoticon parsing pidgin: Heap-based buffer overflow in SIMPLE protocol plugin pidgin: DoS in IRC protocol plugin due to arguement parsing | [
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2017:1766 | Red Hat Security Advisory: kernel security and bug fix update | kernel: NFSv3 server does not properly handle payload bounds checking of WRITE requests | [
"cpe:/o:redhat:rhel_eus:7.2::computenode",
"cpe:/o:redhat:rhel_eus:7.2::server"
] | null | null | 6.5 | null |
RHSA-2022:0491 | Red Hat Security Advisory: OpenShift Container Platform 4.7.43 security update | jenkins: no POST request is required for the endpoint handling manual build requests which could result in CSRF jenkins-2-plugins/docker-commons: does not sanitize the name of an image or a tag which could result in an OS command execution | [
"cpe:/a:redhat:openshift:4.7::el8"
] | null | 8.8 | null | null |
RHSA-2015:0136 | Red Hat Security Advisory: java-1.5.0-ibm security update | ICU: font parsing OOB read (OpenJDK 2D, 8055489) ICU: font parsing OOB read (OpenJDK 2D, 8056276) OpenJDK: incorrect tracking of ChangeCipherSpec during SSL/TLS handshake (JSSE, 8057555) JDK: unspecified full Java sandbox bypass fixed in Feb 2015 update JDK: unspecified partial Java sandbox bypass fixed in Feb 2015 update OpenJDK: phantom references handling issue in garbage collector (Hotspot, 8047125) OpenJDK: directory information leak via file chooser (Swing, 8055304) OpenJDK: incorrect context class loader use in RMI transport (RMI, 8055309) OpenJDK: DER decoder infinite loop (Security, 8059485) | [
"cpe:/a:redhat:rhel_extras:5::client",
"cpe:/a:redhat:rhel_extras:5::server",
"cpe:/a:redhat:rhel_extras:6"
] | null | null | null | null |
RHSA-2023:2417 | Red Hat Security Advisory: php:8.1 security update | php: phar: infinite loop when decompressing quine gzip file php: standard insecure cookie could be treated as a '__Host-' or '__Secure-' cookie by PHP applications php: OOB read due to insufficient input validation in imageloadfont() php: PDO:: quote() may return unquoted string due to an integer overflow XKCP: buffer overflow in the SHA-3 reference implementation | [
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 8.1 | null | null |
RHSA-2018:2733 | Red Hat Security Advisory: rubygem-smart_proxy_dynflow security update | smart_proxy_dynflow: Authentication bypass in Foreman remote execution feature | [
"cpe:/a:redhat:satellite:6.3::el7",
"cpe:/a:redhat:satellite_capsule:6.3::el7"
] | null | null | 9.8 | null |
RHSA-2017:0533 | Red Hat Security Advisory: rabbitmq-server security update | rabbitmq-server: DoS via lengths_age or lengths_incr parameter in the management plugin | [
"cpe:/a:redhat:openstack:5::el6"
] | null | null | 6.5 | null |
RHSA-2015:1087 | Red Hat Security Advisory: qemu-kvm security update | qemu: pcnet: multi-tmd buffer overflow in the tx path | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2023:4252 | Red Hat Security Advisory: edk2 security update | openssl: X.400 address type confusion in X.509 GeneralName | [
"cpe:/a:redhat:rhel_aus:8.4::appstream",
"cpe:/a:redhat:rhel_e4s:8.4::appstream",
"cpe:/a:redhat:rhel_tus:8.4::appstream"
] | null | 7.4 | null | null |
RHSA-2018:2279 | Red Hat Security Advisory: Red Hat Single Sign-On 7.2 security update | apache-cxf: TLS hostname verification does not work correctly with com.sun.net.ssl.* wildfly-core: Path traversal can allow the extraction of .war archives to write arbitrary files (Zip Slip) | [
"cpe:/a:redhat:jboss_single_sign_on:7.2"
] | null | null | 7.6 | null |
RHSA-2012:0476 | Red Hat Security Advisory: Red Hat Enterprise MRG Management Console security update | cumin: multiple XSS flaws | [
"cpe:/a:redhat:enterprise_mrg:2::el5"
] | null | null | null | null |
RHSA-2016:1839 | Red Hat Security Advisory: JBoss Enterprise Application Platform 7.0.2 for RHEL 7 | jakarta-taglibs-standard: XXE and RCE via XSL extension in JSTL XML tags eap: HTTP header injection / response splitting EAP7 Privilege escalation when managing domain including earlier version slaves | [
"cpe:/a:redhat:jboss_enterprise_application_platform:7::el7"
] | null | null | 7.5 | null |
RHSA-2024:0011 | Red Hat Security Advisory: firefox security update | Mozilla: Heap-buffer-overflow affecting WebGL <code>DrawElementsInstanced</code> method with Mesa VM driver Mozilla: Symlinks may resolve to smaller than expected buffers Mozilla: Heap buffer overflow in <code>nsTextFragment</code> Mozilla: Use-after-free in PR_GetIdentitiesLayer Mozilla: Potential sandbox escape due to <code>VideoBridge</code> lack of texture validation Mozilla: Heap buffer overflow affected <code>nsWindow::PickerOpen(void)</code> in headless mode Mozilla: Use-after-free in <code>nsDNSService</code> Mozilla: Undefined behavior in <code>ShutdownObserver()</code> Mozilla: Memory safety bugs fixed in Firefox 121, Firefox ESR 115.6, and Thunderbird 115.6 Mozilla: Potential exposure of uninitialized data in <code>EncryptingOutputStream</code> Mozilla: Clickjacking permission prompts using the popup transition | [
"cpe:/a:redhat:rhel_eus:8.8::appstream"
] | null | 6.1 | null | null |
RHSA-2021:5017 | Red Hat Security Advisory: firefox security update | Mozilla: Memory safety bugs fixed in Firefox 95 and Firefox ESR 91.4 Mozilla: URL leakage when navigating while executing asynchronous function Mozilla: Heap buffer overflow when using structured clone Mozilla: Missing fullscreen and pointer lock notification when requesting both Mozilla: GC rooting failure when calling wasm instance methods Mozilla: External protocol handler parameters were unescaped Mozilla: XMLHttpRequest error codes could have leaked the existence of an external protocol handler Mozilla: Bypass of CSP sandbox directive when embedding Mozilla: Denial of Service when using the Location API in a loop Mozilla: Cursor spoofing could overlay user interface when native cursor is zoomed | [
"cpe:/a:redhat:rhel_e4s:8.1::appstream"
] | null | 5.4 | 6.1 | null |
RHSA-2022:0460 | Red Hat Security Advisory: Red Hat Ansible Automation Platform 2.1 ansible-runner security update | ansible-tower: Privilege escalation via job isolation escape | [
"cpe:/a:redhat:ansible_automation_platform:2.1::el8"
] | null | 8.8 | null | null |
RHSA-2007:0343 | Red Hat Security Advisory: gimp security update | Stack overflow in gimp's sunras plugin | [
"cpe:/o:redhat:enterprise_linux:2.1::as",
"cpe:/o:redhat:enterprise_linux:2.1::aw",
"cpe:/o:redhat:enterprise_linux:2.1::es",
"cpe:/o:redhat:enterprise_linux:2.1::ws",
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws",
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws",
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2019:0697 | Red Hat Security Advisory: freerdp security update | freerdp: Integer truncation leading to heap-based buffer overflow in update_read_bitmap_update() function freerdp: Integer overflow leading to heap-based buffer overflow in gdi_Bitmap_Decompress() function freerdp: Out-of-bounds write in nsc_rle_decode() function | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 8.8 | null |
RHSA-2010:0088 | Red Hat Security Advisory: kvm security and bug fix update | kvm-userspace-rhel5: usb-linux.c: fix buffer overflow kvm: emulator privilege escalation kvm: emulator privilege escalation IOPL/CPL level check kvm: cat /dev/port in guest cause the host hang | [
"cpe:/a:redhat:rhel_virtualization:5::client",
"cpe:/a:redhat:rhel_virtualization:5::server"
] | null | null | null | null |
RHSA-2016:2837 | Red Hat Security Advisory: Red Hat CloudForms 3.x - 90 day End Of Life Notice | This is the 90 day notification for the End of Production Phase 2 of
Red Hat CloudForms 3.x. | [
"cpe:/a:redhat:cloudforms:3.0"
] | null | null | null | null |
RHSA-2008:0031 | Red Hat Security Advisory: xorg-x11-server security update | xorg: invalid array indexing in XFree86-Misc extension Xorg / XFree86 file existence disclosure vulnerability xfree86: memory corruption via XInput extension xfree86: information disclosure via TOG-CUP extension xfree86: integer overflow in EVI extension | [
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.