id
stringlengths 13
15
| title
stringlengths 29
176
| description
stringlengths 8
32.1k
| cpes
listlengths 0
20
| cvss_v4_0
null | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
null |
---|---|---|---|---|---|---|---|
RHSA-2019:0396 | Red Hat Security Advisory: chromium-browser security update | chromium-browser: Inappropriate implementation in V8 | [
"cpe:/a:redhat:rhel_extras:6"
]
| null | null | 6.5 | null |
RHSA-2023:3998 | Red Hat Security Advisory: Logging Subsystem 5.7.3 - Red Hat OpenShift security update | word-wrap: ReDoS tough-cookie: prototype pollution in cookie memstore | [
"cpe:/a:redhat:logging:5.7::el8"
]
| null | 6.5 | null | null |
RHSA-2023:0742 | Red Hat Security Advisory: RHUI 4.3.0 release - Security Fixes, Bug Fixes, and Enhancements Update | django: potential bypass of an upstream access control based on URL paths python-django: Potential denial-of-service vulnerability in internationalized URLs | [
"cpe:/a:redhat:rhui:4::el8"
]
| null | 7.5 | null | null |
RHSA-2018:0465 | Red Hat Security Advisory: Red Hat JBoss Web Server 3.1.0 Service Pack 2 security update | apr: Out-of-bounds array deref in apr_time_exp*() functions tomcat: Remote Code Execution via JSP Upload tomcat: Information Disclosure when using VirtualDirContext tomcat: Remote Code Execution bypass for CVE-2017-12615 tomcat-native: Mishandling of client certificates can allow for OCSP check bypass tomcat: Incorrect handling of empty string URL in security constraints can lead to unintended exposure of resources tomcat: Late application of security constraints can lead to resource exposure for unauthorised users | [
"cpe:/a:redhat:jboss_enterprise_web_server:3.1"
]
| null | null | 4.8 | null |
RHSA-2023:4524 | Red Hat Security Advisory: libcap security update | libcap: Memory Leak on pthread_create() Error libcap: Integer Overflow in _libcap_strdup() | [
"cpe:/o:redhat:enterprise_linux:8::baseos"
]
| null | 7.8 | null | null |
RHSA-2017:0459 | Red Hat Security Advisory: firefox security update | Mozilla: Memory safety bugs fixed in Firefox 52 and Firefox ESR 45.8 (MFSA 2017-06) Mozilla: asm.js JIT-spray bypass of ASLR and DEP (MFSA 2017-06) Mozilla: Memory Corruption when handling ErrorResult (MFSA 2017-06) Mozilla: Use-after-free working with events in FontFace objects (MFSA 2017-06) Mozilla: Use-after-free working with ranges in selections (MFSA 2017-06) Mozilla: FTP response codes can cause use of uninitialized values for ports (MFSA 2017-06) Mozilla: Pixel and history stealing via floating-point timing side channel with SVG filters (MFSA 2017-06) Mozilla: Cross-origin reading of video captions in violation of CORS (MFSA 2017-06) Mozilla: Memory corruption during JavaScript garbage collection incremental sweeping (MFSA 2017-06) | [
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::server",
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
]
| null | null | 9.8 | null |
RHSA-2004:408 | Red Hat Security Advisory: mod_ssl security update | mod_proxy hook format string | [
"cpe:/o:redhat:enterprise_linux:2.1::as",
"cpe:/o:redhat:enterprise_linux:2.1::aw",
"cpe:/o:redhat:enterprise_linux:2.1::es",
"cpe:/o:redhat:enterprise_linux:2.1::ws"
]
| null | null | null | null |
RHSA-2019:0641 | Red Hat Security Advisory: kernel-rt security and bug fix update | kernel: net/rxrpc: overflow in decoding of krb5 principal kernel: Missing length check of payload in net/sctp/sm_make_chunk.c:_sctp_make_chunk() function allows denial of service kernel: MIDI driver race condition leads to a double-free kernel: use-after-free in ntfs_read_locked_inode in the ntfs.ko kernel: stack-based out-of-bounds write in ntfs_end_buffer_async_read in the ntfs.ko kernel: stack-based out-of-bounds write in ntfs_attr_find in the ntfs.ko | [
"cpe:/a:redhat:enterprise_mrg:2:server:el6"
]
| null | null | 4.6 | null |
RHSA-2023:0890 | Red Hat Security Advisory: OpenShift Container Platform 4.12.5 security update | golang: out-of-bounds read in golang.org/x/text/language leads to DoS | [
"cpe:/a:redhat:openshift:4.12::el8",
"cpe:/a:redhat:openshift:4.12::el9"
]
| null | 7.5 | null | null |
RHSA-2025:0385 | Red Hat Security Advisory: VolSync 0.11.1 for RHEL 9 | golang.org/x/crypto/ssh: Misuse of ServerConfig.PublicKeyCallback may cause authorization bypass in golang.org/x/crypto golang.org/x/net/html: Non-linear parsing of case-insensitive content in golang.org/x/net/html quic-go: quic-go affected by an ICMP Packet Too Large Injection Attack on Linux | [
"cpe:/a:redhat:acm:2.12::el9"
]
| null | 6.5 | null | null |
RHSA-2002:026 | Red Hat Security Advisory: : : : Vulnerability in zlib library | zlib: Double free in inflateEnd security flaw security flaw | [
"cpe:/o:redhat:linux:6.2",
"cpe:/o:redhat:linux:7.0",
"cpe:/o:redhat:linux:7.1",
"cpe:/o:redhat:linux:7.2"
]
| null | 7 | null | null |
RHSA-2024:11185 | Red Hat Security Advisory: edk2:20220126gitbb1bba3d77 security update | edk2: Integer overflows in PeCoffLoaderRelocateImage | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
]
| null | 5.9 | null | null |
RHSA-2020:5102 | Red Hat Security Advisory: OpenShift Container Platform 3.11.318 jenkins-2-plugins security update | jenkins-2-plugins/mailer: Missing hostname validation in Mailer Plugin could result in MITM jenkins-2-plugins/blueocean: Path traversal vulnerability in Blue Ocean Plugin could allow to read arbitrary files jenkins-2-plugins/blueocean: Blue Ocean Plugin does not perform permission checks in several HTTP endpoints implementing connection tests. | [
"cpe:/a:redhat:openshift:3.11::el7"
]
| null | 4.3 | null | null |
RHBA-2023:6078 | Red Hat Bug Fix Advisory: MTV 2.5.2 Images | golang.org/x/net/http2: avoid quadratic complexity in HPACK decoding golang-github-gin-gonic-gin: Improper Input Validation graphql: Insufficient checks in the OverlappingFieldsCanBeMergedRule.ts file when parsing large queries golang-github-gin-gonic-gin: Gin Web Framework does not properly sanitize filename parameter of Context.FileAttachment function golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487) HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack) | [
"cpe:/a:redhat:migration_toolkit_virtualization:2.5::el8",
"cpe:/a:redhat:migration_toolkit_virtualization:2.5::el9"
]
| null | 7.5 | null | null |
RHSA-2003:093 | Red Hat Security Advisory: : Updated MySQL packages fix vulnerabilities | security flaw security flaw | [
"cpe:/o:redhat:linux:7.1",
"cpe:/o:redhat:linux:7.2",
"cpe:/o:redhat:linux:7.3",
"cpe:/o:redhat:linux:8.0",
"cpe:/o:redhat:linux:9"
]
| null | null | null | null |
RHSA-2023:4282 | Red Hat Security Advisory: Red Hat Virtualization Host 4.4.z SP 1 security update | python: urllib.parse url blocklisting bypass | [
"cpe:/o:redhat:rhev_hypervisor:4.4::el8"
]
| null | 7.5 | null | null |
RHBA-2018:1219 | Red Hat Bug Fix Advisory: Red Hat Virtualization Manager (ovirt-engine) 4.1.11 | ovirt-engine: API exposes power management credentials to administrators | [
"cpe:/a:redhat:rhev_manager:4"
]
| null | null | 7.7 | null |
RHSA-2021:0106 | Red Hat Security Advisory: Red Hat Decision Manager 7.9.1 security update | XStream: remote code execution due to insecure XML deserialization when relying on blocklists | [
"cpe:/a:redhat:jboss_enterprise_brms_platform:7.9"
]
| null | 9 | null | null |
RHSA-2021:5134 | Red Hat Security Advisory: Red Hat Fuse 7.10.0 release and security update | nodejs-lodash: prototype pollution in defaultsDeep function leading to modifying properties poi: a specially crafted Microsoft Excel document allows attacker to read files from the local filesystem mysql-connector-java: allows unauthenticated attacker with network access via multiple protocols to compromise MySQL Connectors which could result in unauthorized update, insert or delete mysql-connector-java: allows unauthenticated attacker with network access via multiple protocols to compromise MySQL Connectors which could result in unauthorized update, insert or delete log4j: improper validation of certificate with host mismatch in SMTP appender batik: SSRF due to improper input validation by the NodePickerPanel xmlgraphics-commons: SSRF due to improper input validation by the XMPParser tomcat: Apache Tomcat HTTP/2 Request mix-up libthrift: potential DoS when processing untrusted payloads bouncycastle: Timing issue within the EC math library groovy: OS temporary directory leads to information disclosure tomcat: HTTP/2 request header mix-up XStream: remote code execution due to insecure XML deserialization when relying on blocklists XStream: arbitrary file deletion on the local host when unmarshalling jetty: buffer not correctly recycled in Gzip Request inflation jetty: request containing multiple Accept headers with a large number of "quality" parameters may lead to DoS undertow: special character in query results in server errors jackson-dataformat-cbor: Unchecked allocation of byte buffer can cause a java.lang.OutOfMemoryError exception jboss-remoting: Threads hold up forever in the EJB server by suppressing the ack from an EJB client wildfly: XSS via admin console when creating roles in domain mode undertow: HTTP2SourceChannel fails to write final frame under some circumstances may lead to DoS undertow: potential security issue in flow control over HTTP/2 may lead to DOS undertow: buffer leak on incoming websocket PONG message may lead to DoS fabric8-kubernetes-client: vulnerable to a path traversal leading to integrity and availability compromise netty: Information disclosure via the local system temporary directory netty: possible request smuggling in HTTP/2 due missing validation XStream: allow a remote attacker to cause DoS only by manipulating the processed input stream XStream: SSRF via crafted input stream XStream: arbitrary file deletion on the local host via crafted input stream XStream: Unsafe deserizaliation of javax.sql.rowset.BaseRowSet XStream: Unsafe deserizaliation of com.sun.corba.se.impl.activation.ServerTableEntry XStream: Unsafe deserizaliation of sun.swing.SwingLazyValue XStream: Unsafe deserizaliation of com.sun.tools.javac.processing.JavacProcessingEnvironment NameProcessIterator XStream: ReDoS vulnerability XStream: SSRF can be activated unmarshalling with XStream to access data streams from an arbitrary URL referencing a resource in an intranet or the local host XStream: Unsafe deserizaliation of com.sun.org.apache.bcel.internal.util.ClassLoader XStream: allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream netty: Request smuggling via content-length header spring-web: (re)creating the temporary storage directory could result in a privilege escalation within WebFlux application cxf: OAuth 2 authorization service vulnerable to DDos attacks xmlbeans: allowed malicious XML input may lead to XML Entity Expansion attack json-smart: uncaught exception may lead to crash or information disclosure jetty: Symlink directory exposes webapp directory contents jetty: Ambiguous paths can access WEB-INF jetty: requests to the ConcatServlet and WelcomeFilter are able to access protected resources within the WEB-INF directory jakarta-el: ELParserTokenManager enables invalid EL expressions to be evaluate apache-commons-io: Limited path traversal in Apache Commons IO 2.2 to 2.6 mina-sshd-core: Memory leak denial of service in Apache Mina SSHD Server CXF: Denial of service vulnerability in parsing JSON via JsonMapObjectReaderWriter jetty: SessionListener can prevent a session from being invalidated breaking logout netty-codec: Bzip2Decoder doesn't allow setting size restrictions for decompressed data netty-codec: SnappyFrameDecoder doesn't restrict chunk length and may buffer skippable chunks in an unnecessary way jsoup: Crafted input may cause the jsoup HTML and XML parser to get stuck log4j-core: Remote code execution in Log4j 2.x when logs contain an attacker-controlled string value | [
"cpe:/a:redhat:jboss_fuse:7"
]
| null | 9.8 | 9.1 | null |
RHSA-2002:099 | Red Hat Security Advisory: : Updated mailman packages available | security flaw | [
"cpe:/o:redhat:linux:7.2",
"cpe:/o:redhat:linux:7.3"
]
| null | null | null | null |
RHSA-2016:1593 | Red Hat Security Advisory: Red Hat JBoss BPM Suite 6.3.2 security and bug fix update | Framework: denial-of-service attack with XML input | [
"cpe:/a:redhat:jboss_bpms:6.3"
]
| null | null | 5.3 | null |
RHSA-2019:0160 | Red Hat Security Advisory: thunderbird security update | Mozilla: Memory safety bugs fixed in Firefox 64 and Firefox ESR 60.4 firefox: Memory corruption in Angle Mozilla: Use-after-free with select element Mozilla: Buffer overflow in accelerated 2D canvas with Skia Mozilla: Same-origin policy violation using location attribute and performance.getEntries to steal cross-origin URLs Mozilla: Integer overflow when calculating buffer sizes for images | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
]
| null | null | 9.8 | null |
RHSA-2024:4936 | Red Hat Security Advisory: freeradius:3.0 security update | freeradius: forgery attack | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
]
| null | 9 | null | null |
RHSA-2018:0515 | Red Hat Security Advisory: 389-ds-base security update | 389-ds-base: Authentication bypass due to lack of size check in slapi_ct_memcmp function in ch_malloc.c 389-ds-base: remote Denial of Service (DoS) via search filters in SetUnicodeStringFromUTF_8 in collate.c | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
]
| null | null | 7.5 | null |
RHSA-2020:2615 | Red Hat Security Advisory: thunderbird security update | Mozilla: Security downgrade with IMAP STARTTLS leads to information leakage Mozilla: Use-after-free in SharedWorkerService Mozilla: JavaScript Type confusion with NativeTypes Mozilla: Memory safety bugs fixed in Firefox 77 and Firefox ESR 68.9 | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
]
| null | 8.8 | 7.5 | null |
RHSA-2021:3028 | Red Hat Security Advisory: microcode_ctl security, bug fix and enhancement update | hw: Special Register Buffer Data Sampling (SRBDS) hw: Vector Register Data Sampling hw: L1D Cache Eviction Sampling hw: Information disclosure issue in Intel SGX via RAPL interface hw: Vector Register Leakage-Active hw: Fast forward store predictor hw: vt-d related privilege escalation hw: improper isolation of shared resources in some Intel Processors hw: observable timing discrepancy in some Intel Processors | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
]
| null | 2.8 | 6.5 | null |
RHSA-2020:2971 | Red Hat Security Advisory: jbig2dec security update | jbig2dec: heap-based buffer overflow in jbig2_image_compose in jbig2_image.c | [
"cpe:/a:redhat:rhel_eus:8.1::appstream"
]
| null | 9.8 | null | null |
RHSA-2020:4080 | Red Hat Security Advisory: firefox security and bug fix update | Mozilla: Integer overflow in nsJPEGEncoder::emptyOutputBuffer Mozilla: WebRTC permission prompt could have been bypassed by a compromised content process Mozilla: Out of bound read in Date.parse() Mozilla: X-Frame-Options bypass using object or embed tags Mozilla: Bypassing iframe sandbox when allowing popups Mozilla: Custom cursor can overlay user interface Mozilla: Type confusion for special arguments in IonMonkey Mozilla: Overriding file type when saving to disk Mozilla: Memory safety bugs fixed in Firefox 81 and Firefox ESR 78.3 Mozilla: XSS when pasting attacker-controlled data into a contenteditable element Mozilla: Download origin spoofing via redirect Mozilla: When recursing through layers while scrolling, an iterator may have become invalid, resulting in a potential use-after-free scenario | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
]
| null | 8.8 | 6.1 | null |
RHSA-2022:6700 | Red Hat Security Advisory: firefox security update | Mozilla: Out of bounds read when decoding H264 Mozilla: Content-Security-Policy base-uri bypass Mozilla: Incoherent instruction cache when building WASM on ARM64 Mozilla: Bypassing Secure Context restriction for cookies with __Host and __Secure prefix Mozilla: Bypassing FeaturePolicy restrictions on transient pages Mozilla: Data-race when parsing non-UTF-8 URLs in threads Mozilla: Memory safety bugs fixed in Firefox 105 and Firefox ESR 102.3 | [
"cpe:/a:redhat:enterprise_linux:9::appstream"
]
| null | 8.8 | 7.5 | null |
RHSA-2024:3939 | Red Hat Security Advisory: linux-firmware security update | hw: intel: Improper access control for some Intel(R) PROSet/Wireless WiFi hw: intel: Improper input validation in some Intel(R) PROSet/Wireless WiFi hw: intel: Improper input validation in some Intel(R) PROSet/Wireless WiFi hw: intel: Improper access control for some Intel(R) PROSet/Wireless WiFi hw: intel: Protection mechanism failure for some Intel(R) PROSet/Wireless WiFi | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
]
| null | 8.2 | null | null |
RHSA-2011:0143 | Red Hat Security Advisory: Red Hat Enterprise Linux Extended Update Support 5.3 - End Of Life | This is the End Of Life notification for Red Hat Enterprise Linux Extended
Update Support Add-On (EUS) 5.3. | [
"cpe:/o:redhat:rhel_eus:5.3"
]
| null | null | null | null |
RHSA-2023:5790 | Red Hat Security Advisory: python-reportlab security update | python-reportlab: code injection in paraparser.py allows code execution | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
]
| null | 9.8 | null | null |
RHSA-2009:1657 | Red Hat Security Advisory: flash-plugin security update | flash-plugin: multiple code execution flaws (APSB09-19) (CVE-2009-3794, CVE-2009-3796, CVE-2009-3797, CVE-2009-3798, CVE-2009-3799, CVE-2009-3800) flash-plugin: multiple code execution flaws (APSB09-19) (CVE-2009-3794, CVE-2009-3796, CVE-2009-3797, CVE-2009-3798, CVE-2009-3799, CVE-2009-3800) flash-plugin: multiple code execution flaws (APSB09-19) (CVE-2009-3794, CVE-2009-3796, CVE-2009-3797, CVE-2009-3798, CVE-2009-3799, CVE-2009-3800) flash-plugin: multiple code execution flaws (APSB09-19) (CVE-2009-3794, CVE-2009-3796, CVE-2009-3797, CVE-2009-3798, CVE-2009-3799, CVE-2009-3800) flash-plugin: multiple code execution flaws (APSB09-19) (CVE-2009-3794, CVE-2009-3796, CVE-2009-3797, CVE-2009-3798, CVE-2009-3799, CVE-2009-3800) flash-plugin: multiple code execution flaws (APSB09-19) (CVE-2009-3794, CVE-2009-3796, CVE-2009-3797, CVE-2009-3798, CVE-2009-3799, CVE-2009-3800) | [
"cpe:/a:redhat:rhel_extras:5::client",
"cpe:/a:redhat:rhel_extras:5::server"
]
| null | null | null | null |
RHSA-2023:7522 | Red Hat Security Advisory: OpenShift Virtualization 4.13.6 security and bug fix update | golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487) HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack) | [
"cpe:/a:redhat:container_native_virtualization:4.13::el9"
]
| null | 7.5 | null | null |
RHSA-2023:3542 | Red Hat Security Advisory: OpenShift Container Platform 4.11.43 bug fix and security update | golang: out-of-bounds read in golang.org/x/text/language leads to DoS | [
"cpe:/a:redhat:openshift:4.11::el8"
]
| null | 7.5 | null | null |
RHSA-2018:1524 | Red Hat Security Advisory: redhat-virtualization-host bug fix and enhancement update | Kernel: KVM: error in exception handling leads to wrong debug stack value glusterfs: Privilege escalation via gluster_shared_storage when snapshot scheduling is enabled dhcp: Command injection vulnerability in the DHCP client NetworkManager integration script Kernel: error in exception handling leads to DoS | [
"cpe:/o:redhat:enterprise_linux:7::hypervisor"
]
| null | null | 6.5 | null |
RHSA-2023:4799 | Red Hat Security Advisory: virt:rhel and virt-devel:rhel security and bug fix update | libvirt: Memory leak in virPCIVirtualFunctionList cleanup | [
"cpe:/a:redhat:rhel_eus:8.6::appstream",
"cpe:/a:redhat:rhel_eus:8.6::crb"
]
| null | 6.3 | null | null |
RHSA-2023:0625 | Red Hat Security Advisory: libksba security update | libksba: integer overflow to code execution | [
"cpe:/a:redhat:enterprise_linux:8::crb",
"cpe:/o:redhat:enterprise_linux:8::baseos"
]
| null | 8.6 | null | null |
RHSA-2016:0365 | Red Hat Security Advisory: openstack-nova security update | openstack-nova: Host data leak through resize/migration | [
"cpe:/a:redhat:openstack:5::el7"
]
| null | null | null | null |
RHSA-2025:2865 | Red Hat Security Advisory: tigervnc security update | X.Org: Xwayland: Use-after-free of the root cursor Xorg: xwayland: Buffer overflow in XkbVModMaskText() xorg: xwayland: Heap overflow in XkbWriteKeySyms() xorg: xwayland: Buffer overflow in XkbChangeTypesOfKey() xorg: xwayland: Out-of-bounds write in CreatePointerBarrierClient() xorg: xwayland: Use of uninitialized pointer in compRedirectWindow() xorg: xwayland: Use-after-free in PlayReleasedEvents() xorg: xwayland: Use-after-free in SyncInitTrigger() | [
"cpe:/a:redhat:rhel_aus:8.4::appstream",
"cpe:/a:redhat:rhel_e4s:8.4::appstream",
"cpe:/a:redhat:rhel_tus:8.4::appstream"
]
| null | 7.8 | null | null |
RHSA-2017:0244 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform security update | tomcat: HTTP Request smuggling vulnerability due to permitting invalid character in HTTP requests EAP: Sensitive data can be exposed at the server level in domain mode admin-cli: Potential EAP resource starvation DOS attack via GET requests for server log files jboss: jbossas: unsafe chown of server.log in jboss init script allows privilege escalation | [
"cpe:/a:redhat:jboss_enterprise_application_platform:6::el6"
]
| null | null | 7 | null |
RHSA-2023:4520 | Red Hat Security Advisory: python-requests security update | python-requests: Unintended leak of Proxy-Authorization header | [
"cpe:/o:redhat:enterprise_linux:8::baseos"
]
| null | 6.1 | null | null |
RHSA-2022:4994 | Red Hat Security Advisory: xz security update | gzip: arbitrary-file-write vulnerability | [
"cpe:/o:redhat:rhel_e4s:8.1::baseos"
]
| null | 8.8 | null | null |
RHSA-2003:161 | Red Hat Security Advisory: xinetd security update | security flaw | [
"cpe:/o:redhat:enterprise_linux:2.1::as",
"cpe:/o:redhat:enterprise_linux:2.1::aw",
"cpe:/o:redhat:enterprise_linux:2.1::es",
"cpe:/o:redhat:enterprise_linux:2.1::ws"
]
| null | null | null | null |
RHSA-2024:11255 | Red Hat Security Advisory: Red Hat Trusted Profile Analyzer 1.2.1 | protobuf: StackOverflow vulnerability in Protocol Buffers http-proxy-middleware: Denial of Service cross-spawn: regular expression denial of service | [
"cpe:/a:redhat:trusted_profile_analyzer:1.2::el9"
]
| null | 4.4 | null | null |
RHSA-2020:0856 | Red Hat Security Advisory: java-1.8.0-ibm security update | OpenJDK: Incorrect exception processing during deserialization in BeanContextSupport (Serialization, 8224909) OpenJDK: Incorrect isBuiltinStreamHandler check causing URL normalization issues (Networking, 8228548) OpenJDK: Serialization filter changes via jdk.serialFilter property modification (Serialization, 8231422) OpenJDK: Incomplete enforcement of maxDatagramSockets limit in DatagramChannelImpl (Networking, 8231795) | [
"cpe:/a:redhat:network_satellite:5.8::el6"
]
| null | 3.7 | null | null |
RHSA-2024:1018 | Red Hat Security Advisory: kernel security update | kernel: vmwgfx: NULL pointer dereference in vmw_cmd_dx_define_query kernel: Use-after-free in nft_verdict_dump due to a race between set GC and transaction kernel: GSM multiplexing race condition leads to privilege escalation kernel: inactive elements in nft_pipapo_walk kernel: Out of boundary write in perf_read_group() as result of overflow a perf_event's read_size kernel: use-after-free in amdgpu_cs_wait_all_fences in drivers/gpu/drm/amd/amdgpu/amdgpu_cs.c kernel: use-after-free during a race condition between a nonblocking atomic commit and a driver unload in drivers/gpu/drm/drm_atomic.c kernel: netfilter: use-after-free in nft_trans_gc_catchall_sync leads to privilege escalation kernel: nf_tables: use-after-free vulnerability in the nft_setelem_catchall_deactivate() function kernel: nf_tables: use-after-free vulnerability in the nft_verdict_init() function | [
"cpe:/a:redhat:rhel_eus:9.2::appstream",
"cpe:/a:redhat:rhel_eus:9.2::crb",
"cpe:/o:redhat:rhel_eus:9.2::baseos"
]
| null | 7.8 | null | null |
RHSA-2016:1484 | Red Hat Security Advisory: spacewalk-java security and bug fix update | spacewalk-monitoring: XSS issue in monitoring probe spacewalk-java: Multiple XSS flaws | [
"cpe:/a:redhat:network_satellite:5.7::el6"
]
| null | null | 5.4 | null |
RHSA-2025:3482 | Red Hat Security Advisory: Red Hat OpenStack Platform 17.1 (openstack-ironic) security update | openstack-ironic: Lack of checksum validation on images | [
"cpe:/a:redhat:openstack:17.1::el9"
]
| null | 6.3 | null | null |
RHSA-2008:0629 | Red Hat Security Advisory: Red Hat Network Satellite Server Solaris client security update | zlib DoS zlib DoS openssl mitm downgrade attack python buffer overflow openssl ASN.1 DoS openssl public key DoS openssl get_shared_ciphers overflow openssl signature forgery openssl sslv2 client code python repr unicode buffer overflow python off-by-one locale.strxfrm() (possible memory disclosure) python imageop module heap corruption | [
"cpe:/a:redhat:network_satellite:5.1::el4"
]
| null | null | null | null |
RHSA-2005:383 | Red Hat Security Advisory: firefox security update | security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw | [
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
]
| null | null | null | null |
RHBA-2023:5806 | Red Hat Bug Fix Advisory: Red Hat Ansible Automation Platform 2.4 Container Release Update | golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487) HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack) | [
"cpe:/a:redhat:ansible_automation_platform:2.4::el8",
"cpe:/a:redhat:ansible_automation_platform:2.4::el9",
"cpe:/a:redhat:ansible_automation_platform_cloud_billing:2.4::el8"
]
| null | 7.5 | null | null |
RHSA-2024:1103 | Red Hat Security Advisory: emacs security update | emacs: ctags local command execution vulnerability emacs: command execution via shell metacharacters emacs: command injection vulnerability in htmlfontify.el | [
"cpe:/a:redhat:rhel_eus:8.6::appstream",
"cpe:/o:redhat:rhel_eus:8.6::baseos"
]
| null | 7.8 | null | null |
RHSA-2023:4420 | Red Hat Security Advisory: OpenShift Virtualization 4.12.5 RPMs security and bug fix update | golang: html/template: improper handling of JavaScript whitespace | [
"cpe:/a:redhat:container_native_virtualization:4.12::el7",
"cpe:/a:redhat:container_native_virtualization:4.12::el8"
]
| null | 8.1 | null | null |
RHSA-2023:6839 | Red Hat Security Advisory: OpenShift Container Platform 4.14.2 security update | golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487) HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack) | [
"cpe:/a:redhat:openshift:4.14::el9"
]
| null | 7.5 | null | null |
RHSA-2024:0618 | Red Hat Security Advisory: firefox security update | Mozilla: Out of bounds write in ANGLE Mozilla: Failure to update user input timestamp Mozilla: Crash when listing printers on Linux Mozilla: Bypass of Content Security Policy when directive unsafe-inline was set Mozilla: Phishing site popup could show local origin in address bar Mozilla: Potential permissions request bypass via clickjacking Mozilla: Privilege escalation through devtools Mozilla: HSTS policy on subdomain could bypass policy of upper domain Mozilla: Memory safety bugs fixed in Firefox 122, Firefox ESR 115.7, and Thunderbird 115.7 | [
"cpe:/a:redhat:rhel_aus:8.2::appstream",
"cpe:/a:redhat:rhel_e4s:8.2::appstream",
"cpe:/a:redhat:rhel_tus:8.2::appstream"
]
| null | 8.8 | null | null |
RHSA-2022:5716 | Red Hat Security Advisory: grafana security update | grafana: OAuth account takeover | [
"cpe:/a:redhat:enterprise_linux:9::appstream"
]
| null | 7.1 | null | null |
RHSA-2016:2672 | Red Hat Security Advisory: chromium-browser security update | chromium-browser: out of bounds memory access in v8 | [
"cpe:/a:redhat:rhel_extras:6"
]
| null | null | 8.8 | null |
RHSA-2023:6402 | Red Hat Security Advisory: containernetworking-plugins security and bug fix update | golang.org/x/net/http2: avoid quadratic complexity in HPACK decoding golang: crypto/tls: large handshake records may cause panics golang: net/http, mime/multipart: denial of service from excessive resource consumption golang: net/http, net/textproto: denial of service from excessive memory allocation golang: net/http, net/textproto, mime/multipart: denial of service from excessive resource consumption golang: html/template: backticks not treated as string delimiters golang: html/template: improper sanitization of CSS values golang: html/template: improper handling of JavaScript whitespace golang: html/template: improper handling of empty HTML attributes golang: net/http: insufficient sanitization of Host header | [
"cpe:/a:redhat:enterprise_linux:9::appstream"
]
| null | 6.5 | null | null |
RHSA-2006:0270 | Red Hat Security Advisory: Red Hat Directory Server 7.1 security update | memory leaks using ber_scanf when handling bad BER packets (CVE-2006-0453) recursion causes OOM with bad DN in dn2ancestor security flaw | [
"cpe:/a:redhat:directory_server:7.1"
]
| null | null | null | null |
RHSA-2024:5886 | Red Hat Security Advisory: libreoffice security update | libreoffice: Ability to trust not validated macro signatures removed in high security mode | [
"cpe:/a:redhat:rhel_aus:8.2::appstream"
]
| null | 7.8 | null | null |
RHSA-2021:0871 | Red Hat Security Advisory: Red Hat Integration Debezium 1.4.2 security update | mongo-java-driver: client-side field level encryption not verifying KMS host name | [
"cpe:/a:redhat:integration:1"
]
| null | 6.4 | null | null |
RHSA-2024:11531 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.4 security update | hornetq-core-client: Arbitrarily overwrite files or access sensitive information | [
"cpe:/a:redhat:jboss_enterprise_application_platform:7.4"
]
| null | 7.1 | null | null |
RHSA-2022:1713 | Red Hat Security Advisory: security update for rh-sso-7/sso75-openshift-rhel8 container image | keycloak: Privilege escalation vulnerability on Token Exchange | [
"cpe:/a:redhat:rhosemc:1.0::el8"
]
| null | 8 | null | null |
RHSA-2022:2211 | Red Hat Security Advisory: kpatch-patch security update | kernel: use-after-free in RDMA listen() kernel: cgroups v1 release_agent feature may allow privilege escalation | [
"cpe:/o:redhat:rhel_e4s:7.6::server"
]
| null | 7 | null | null |
RHSA-2024:6203 | Red Hat Security Advisory: emacs security update | emacs: org-link-expand-abbrev: Do not evaluate arbitrary unsafe Elisp code | [
"cpe:/a:redhat:rhel_eus:8.8::appstream",
"cpe:/o:redhat:rhel_eus:8.8::baseos"
]
| null | 7.8 | null | null |
RHSA-2014:0520 | Red Hat Security Advisory: kernel security and bug fix update | kernel: net: sctp: null pointer dereference when processing authenticated cookie_echo chunk kernel: pty layer race condition leading to memory corruption kernel: netfilter: nf_conntrack_dccp: incorrect skb_header_pointer API usages | [
"cpe:/o:redhat:rhel_mission_critical:6.2::server"
]
| null | null | null | null |
RHSA-2021:4994 | Red Hat Security Advisory: nss security update | nss: Memory corruption in decodeECorDsaSignature with DSA signatures (and RSA-PSS) | [
"cpe:/o:redhat:rhel_aus:7.3::server"
]
| null | 9.8 | null | null |
RHSA-2022:6551 | Red Hat Security Advisory: Red Hat Virtualization security update | kernel: Small table perturb size in the TCP source port generation algorithm can lead to information leak dpdk: DoS when a Vhost header crosses more than two descriptors and exhausts all mbufs systemd-resolved: use-after-free when dealing with DnsStream in resolved-dns-stream.c kernel: a use-after-free in cls_route filter implementation may lead to privilege escalation rsync: remote arbitrary files write inside the directories of connecting peers kernel: a use-after-free write in the netfilter subsystem can lead to privilege escalation to root | [
"cpe:/o:redhat:rhev_hypervisor:4.4::el8"
]
| null | 7.8 | null | null |
RHSA-2017:1367 | Red Hat Security Advisory: CFME 5.8.0 security, bug, and enhancement update | CFME: default certificate used across all installs CloudForms: cloudforms fails to properly check certificates when communicating with RHEV and OpenShift and custom CA | [
"cpe:/a:redhat:cloudforms_managementengine:5.8::el7"
]
| null | null | 6.5 | null |
RHSA-2024:7551 | Red Hat Security Advisory: cups-filters security update | cups-filters: libcupsfilters: `cfGetPrinterAttributes` API does not perform sanitization on returned IPP attributes cups: libppd: remote command injection via attacker controlled data in PPD file cups-browsed: cups-browsed binds on UDP INADDR_ANY:631 trusting any packet from any source cups-browsed: cups-filters: cups-browsed vulnerable to DDoS amplification attack | [
"cpe:/o:redhat:rhel_aus:7.7::server"
]
| null | 7.5 | null | null |
RHSA-2014:0044 | Red Hat Security Advisory: augeas security update | augeas: incorrect permissions set on newly created files | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
]
| null | null | null | null |
RHSA-2021:0245 | Red Hat Security Advisory: dnsmasq security update | dnsmasq: loose address/port check in reply_query() makes forging replies easier for an off-path attacker dnsmasq: loose query name check in reply_query() makes forging replies easier for an off-path attacker dnsmasq: multiple queries forwarded for the same name makes forging replies easier for an off-path attacker | [
"cpe:/o:redhat:rhel_aus:7.3::server"
]
| null | 4 | null | null |
RHSA-2022:4924 | Red Hat Security Advisory: kernel security and bug fix update | kernel: buffer overflow in IPsec ESP transformation code | [
"cpe:/o:redhat:rhel_e4s:8.1::baseos"
]
| null | 7.8 | null | null |
RHSA-2017:2060 | Red Hat Security Advisory: GStreamer security, bug fix, and enhancement update | gstreamer-plugins-bad-free: Missing initialization of allocated heap memory leads to information leak gstreamer: Invalid memory read in g_type_check_instance_is_fundamentally_a gstreamer: Out of bounds heap read in windows_icon_typefind gstreamer-plugins-good: Invalid memory read in gst_aac_parse_sink_setcaps gstreamer-plugins-good: Out of bounds read in qtdemux_tag_add_str_full gstreamer-plugins-base: Floating point exception in gst_riff_create_audio_caps gstreamer: Out-of-bounds read in gst_date_time_new_from_iso8601_string() gstreamer-plugins-base: Stack overflow in gst_riff_create_audio_caps gstreamer-plugins-good: Out of bounds heap read in qtdemux_parse_samples gstreamer-plugins-good: Heap out-of-bounds read in gst_avi_demux_parse_ncdt gstreamer-plugins-base: Out-of-bounds heap read in html_context_handle_element gstreamer-plugins-bad-free: Use after free in gst_mini_object_unref / gst_tag_list_unref / gst_mxf_demux_update_essence_tracks gstreamer-plugins-base: Floating point exception in gst_riff_create_audio_caps gstreamer-plugins-good: Invalid memory read in gst_avi_demux_parse_ncdt gstreamer-plugins-bad-free: Invalid memory read in gst_ps_demux_parse_psm | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
]
| null | null | 5.5 | null |
RHSA-2010:0607 | Red Hat Security Advisory: freetype security update | FreeType: Multiple stack overflows by processing CFF opcodes | [
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws",
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws",
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
]
| null | null | null | null |
RHSA-2012:0051 | Red Hat Security Advisory: kvm security update | kernel: kvm: pit timer with no irqchip crashes the system qemu: e1000: process_tx_desc legacy mode packets heap overflow | [
"cpe:/a:redhat:rhel_virtualization:5::client",
"cpe:/a:redhat:rhel_virtualization:5::server"
]
| null | null | null | null |
RHSA-2021:4112 | Red Hat Security Advisory: virt:av and virt-devel:av security and bug fix update | QEMU: virtio-net: heap use-after-free in virtio_net_receive_rcu | [
"cpe:/a:redhat:advanced_virtualization:8.4::el8"
]
| null | 7.5 | null | null |
RHSA-2019:3131 | Red Hat Security Advisory: OpenShift Container Platform 4.1.20 golang security update | HTTP/2: flood using PING frames results in unbounded memory growth HTTP/2: flood using HEADERS frames results in unbounded memory growth | [
"cpe:/a:redhat:openshift:4.1::el7",
"cpe:/a:redhat:openshift:4.1::el8"
]
| null | null | 7.5 | null |
RHSA-2024:5200 | Red Hat Security Advisory: OpenShift Container Platform 4.12.63 bug fix and security update | ssh: Prefix truncation attack on Binary Packet Protocol (BPP) openshift/telemeter: iss check during JWT authentication can be bypassed go-retryablehttp: url might write sensitive information to log file kernel: net: kernel: UAF in network route management | [
"cpe:/a:redhat:openshift:4.12::el8",
"cpe:/a:redhat:openshift:4.12::el9"
]
| null | 7.8 | null | null |
RHSA-2017:1205 | Red Hat Security Advisory: qemu-kvm-rhev security update | Qemu: cirrus: heap buffer overflow via vnc connection Qemu: VNC: memory corruption due to unchecked resolution limit Qemu: display: cirrus: OOB read access issue Qemu: display: cirrus: OOB r/w access issues in bitblt routines | [
"cpe:/a:redhat:enterprise_linux:6::hypervisor"
]
| null | null | 5.5 | null |
RHSA-2020:5118 | Red Hat Security Advisory: OpenShift Container Platform 4.5.20 bug fix and golang security update | golang: data race in certain net/http servers including ReverseProxy can lead to DoS golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs | [
"cpe:/a:redhat:openshift:4.5::el7",
"cpe:/a:redhat:openshift:4.5::el8"
]
| null | 7.5 | null | null |
RHSA-2018:3528 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.1.5 on RHEL 7 security update | JBoss/WildFly: iiop does not honour strict transport confidentiality | [
"cpe:/a:redhat:jboss_enterprise_application_platform:7.1::el7"
]
| null | null | 5.3 | null |
RHSA-2012:0303 | Red Hat Security Advisory: xorg-x11-server security and bug fix update | xorg-x11-server: File existence disclosure vulnerability | [
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
]
| null | null | null | null |
RHSA-2023:0295 | Red Hat Security Advisory: firefox security update | Mozilla: libusrsctp library out of date Mozilla: Fullscreen notification bypass Mozilla: Arbitrary file read from GTK drag and drop on Linux Mozilla: Malicious command could be hidden in devtools output Mozilla: URL being dragged from cross-origin iframe into same tab triggers navigation Mozilla: Content Security Policy wasn't being correctly applied to WebSockets in WebWorkers Mozilla: Calls to <code>console.log</code> allowed bypasing Content Security Policy via format directive Mozilla: Memory safety bugs fixed in Firefox 109 and Firefox ESR 102.7 | [
"cpe:/a:redhat:rhel_eus:8.4::appstream"
]
| null | 8.8 | null | null |
RHSA-2020:0689 | Red Hat Security Advisory: OpenShift Container Platform 4.2.22 skopeo security update | proglottis/gpgme: Use-after-free in GPGME bindings during container image pull | [
"cpe:/a:redhat:openshift:4.2::el8"
]
| null | 7.5 | null | null |
RHSA-2017:1685 | Red Hat Security Advisory: ansible security, bug fix, and enhancement update | Ansible: in some circumstances the mysql_user module may fail to correctly change a password Ansible: Compromised remote hosts can lead to running commands on the Ansible controller ansible: Arbitrary code execution on control node (incomplete fix for CVE-2016-9587) | [
"cpe:/a:redhat:rhev_manager:4"
]
| null | null | 8 | null |
RHSA-2012:1015 | Red Hat Security Advisory: Red Hat Enterprise Linux Extended Update Support 6.0 6-Month EOL Notice | This is the 6-Month notification of the End Of Life plans for Red Hat
Enterprise Linux Extended Update Support Add-On (EUS) 6.0. | [
"cpe:/o:redhat:rhel_eus:6.0"
]
| null | null | null | null |
RHSA-2005:745 | Red Hat Security Advisory: vim security update | security flaw | [
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws",
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
]
| null | null | null | null |
RHSA-2024:3314 | Red Hat Security Advisory: OpenShift Virtualization 4.15.2 Images security update | follow-redirects: Improper Input Validation due to the improper handling of URLs by the url.parse() golang: net/http, x/net/http2: unlimited number of CONTINUATION frames causes DoS axios: exposure of confidential data stored in cookies | [
"cpe:/a:redhat:container_native_virtualization:4.15::el9"
]
| null | 6.5 | null | null |
RHSA-2003:045 | Red Hat Security Advisory: w3m security update | security flaw security flaw | [
"cpe:/o:redhat:enterprise_linux:2.1::as",
"cpe:/o:redhat:enterprise_linux:2.1::aw"
]
| null | null | null | null |
RHSA-2024:1982 | Red Hat Security Advisory: thunderbird security update | Mozilla: Permission prompt input delay could expire when not in focus Mozilla: Denial of Service using HTTP/2 CONTINUATION frames Mozilla: GetBoundName in the JIT returned the wrong object Mozilla: Out-of-bounds-read after mis-optimized switch statement Mozilla: Incorrect JITting of arguments led to use-after-free during garbage collection Mozilla: Integer-overflow led to out-of-bounds-read in the OpenType sanitizer Mozilla: Potential use-after-free due to AlignedBuffer self-move Mozilla: Memory safety bug fixed in Firefox 125, Firefox ESR 115.10, and Thunderbird 115.10 | [
"cpe:/a:redhat:rhel_aus:8.4::appstream",
"cpe:/a:redhat:rhel_e4s:8.4::appstream",
"cpe:/a:redhat:rhel_tus:8.4::appstream"
]
| null | 7.5 | null | null |
RHSA-2023:3305 | Red Hat Security Advisory: OpenShift Container Platform 4.13.1 security and extras update | golang.org/x/net/http2: avoid quadratic complexity in HPACK decoding | [
"cpe:/a:redhat:openshift:4.13::el8"
]
| null | 7.5 | null | null |
RHSA-2006:0567 | Red Hat Security Advisory: php security update | security flaw security flaw security flaw | [
"cpe:/o:redhat:enterprise_linux:2.1::as",
"cpe:/o:redhat:enterprise_linux:2.1::aw",
"cpe:/o:redhat:enterprise_linux:2.1::es",
"cpe:/o:redhat:enterprise_linux:2.1::ws"
]
| null | null | null | null |
RHSA-2021:0946 | Red Hat Security Advisory: Red Hat Build of OpenJDK 1.8 (container images) release and security update | containers/openjdk: /etc/passwd is given incorrect privileges | [
"cpe:/a:redhat:openjdk:1.8"
]
| null | 7 | null | null |
RHSA-2022:0131 | Red Hat Security Advisory: thunderbird security update | Mozilla: Iframe sandbox bypass with XSLT Mozilla: Race condition when playing audio files Mozilla: Heap-buffer-overflow in blendGaussianBlur Mozilla: Missing throttling on external protocol launch dialog Mozilla: Use-after-free of ChannelEventQueue::mOwner Mozilla: Browser window spoof using fullscreen mode Mozilla: Out-of-bounds memory access when inserting text in edit mode Mozilla: Browser window spoof using fullscreen mode Mozilla: Leaking cross-origin URLs through securitypolicyviolation event Mozilla: Crash when handling empty pkcs7 sequence Mozilla: Spoofed origin on external protocol launch dialog Mozilla: Memory safety bugs fixed in Firefox 96 and Firefox ESR 91.5 | [
"cpe:/a:redhat:rhel_e4s:8.1::appstream"
]
| null | 8.8 | 6.1 | null |
RHSA-2021:2208 | Red Hat Security Advisory: firefox security update | Mozilla: Memory safety bugs fixed in Firefox 89 and Firefox ESR 78.11 | [
"cpe:/a:redhat:rhel_eus:8.2::appstream"
]
| null | 8.8 | null | null |
RHSA-2020:2125 | Red Hat Security Advisory: kpatch-patch security update | Kernel: NetLabel: null pointer dereference while receiving CIPSO packet with null category may cause kernel panic | [
"cpe:/o:redhat:enterprise_linux:8::baseos"
]
| null | 5.9 | null | null |
RHSA-2010:0129 | Red Hat Security Advisory: cups security update | cups Incomplete fix for CVE-2009-3553 | [
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
]
| null | null | null | null |
RHSA-2023:1790 | Red Hat Security Advisory: firefox security update | Mozilla: Memory Corruption in Safe Browsing Code Mozilla: libwebp: Double-free in libwebp Mozilla: Fullscreen notification obscured Mozilla: Potential Memory Corruption following Garbage Collector compaction Mozilla: Invalid free from JavaScript code Mozilla: Content-Disposition filename truncation leads to Reflected File Download Mozilla: Files with malicious extensions could have been downloaded unsafely on Linux Mozilla: Incorrect optimization result on ARM64 Mozilla: Memory safety bugs fixed in Firefox 112 and Firefox ESR 102.10 | [
"cpe:/a:redhat:rhel_eus:8.4::appstream"
]
| null | 8.8 | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.