id
stringlengths 13
15
| title
stringlengths 29
176
| description
stringlengths 8
32.1k
| cpes
listlengths 0
20
| cvss_v4_0
null | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
null |
---|---|---|---|---|---|---|---|
RHSA-2012:1266 | Red Hat Security Advisory: bind97 security update | bind: specially crafted resource record causes named to exit | [
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
]
| null | null | null | null |
RHSA-2022:0441 | Red Hat Security Advisory: aide security update | aide: heap-based buffer overflow on outputs larger than B64_BUF | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
]
| null | 7.5 | null | null |
RHSA-2023:1014 | Red Hat Security Advisory: Red Hat OpenStack Platform 17.0 (etcd) security update | go-yaml: Improve heuristics preventing CPU/memory abuse by parsing malicious or large YAML documents | [
"cpe:/a:redhat:openstack:17.0::el9"
]
| null | 7.5 | null | null |
RHSA-2023:7058 | Red Hat Security Advisory: rhc security, bug fix, and enhancement update | golang.org/x/net/http2: avoid quadratic complexity in HPACK decoding | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
]
| null | 7.5 | null | null |
RHSA-2011:1423 | Red Hat Security Advisory: php53 and php security update | php: buffer over-read in Exif extension php: use-after-free vulnerability in substr_replace() php: Crash by converting serial day numbers (SDN) into Julian calendar php: Multiple memory leaks in the OpenSSL extension php: DoS when using HTTP proxy with the FTP wrapper php: DoS (excessive CPU consumption) by processing certain Zip archive files php: stack-based buffer overflow in socket_connect() php: file path injection vulnerability in RFC1867 file upload filename crypt_blowfish: 8-bit character mishandling allows different password pairs to produce the same hash | [
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server",
"cpe:/o:redhat:enterprise_linux:6::server"
]
| null | null | null | null |
RHSA-2025:3853 | Red Hat Security Advisory: OpenJDK 17.0.15 Security Update for Portable Linux Builds | openjdk: Better TLS connection support (Oracle CPU 2025-04) openjdk: Improve compiler transformations (Oracle CPU 2025-04) openjdk: Enhance Buffered Image handling (Oracle CPU 2025-04) | [
"cpe:/a:redhat:openjdk:17"
]
| null | 5.6 | null | null |
RHSA-2022:8222 | Red Hat Security Advisory: xorg-x11-server-Xwayland security update | xorg-x11-server: X.Org Server ProcXkbSetGeometry out-of-bounds access xorg-x11-server: out-of-bounds access in ProcXkbSetDeviceInfo request handler of the Xkb extension | [
"cpe:/a:redhat:enterprise_linux:9::appstream"
]
| null | 7.8 | null | null |
RHSA-2016:0615 | Red Hat Security Advisory: openvswitch security update | openvswitch: MPLS buffer overflow vulnerability | [
"cpe:/a:redhat:openshift:3.1::el7"
]
| null | null | null | null |
RHSA-2017:0172 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.0.4 | EAP: Sensitive data can be exposed at the server level in domain mode admin-cli: Potential EAP resource starvation DOS attack via GET requests for server log files | [
"cpe:/a:redhat:jboss_enterprise_application_platform:7"
]
| null | null | 4.3 | null |
RHSA-2005:015 | Red Hat Security Advisory: pine security update | security flaw | [
"cpe:/o:redhat:enterprise_linux:2.1::as",
"cpe:/o:redhat:enterprise_linux:2.1::aw",
"cpe:/o:redhat:enterprise_linux:2.1::es",
"cpe:/o:redhat:enterprise_linux:2.1::ws"
]
| null | null | null | null |
RHSA-2020:3377 | Red Hat Security Advisory: chromium-browser security update | chromium-browser: Heap buffer overflow in background fetch chromium-browser: Side-channel information leakage in content security policy chromium-browser: Type Confusion in V8 chromium-browser: Heap buffer overflow in PDFium chromium-browser: Inappropriate implementation in WebRTC chromium-browser: Use after free in tab strip chromium-browser: Policy bypass in CORS chromium-browser: Heap buffer overflow in history chromium-browser: Use after free in developer tools chromium-browser: Policy bypass in CSP chromium-browser: Heap buffer overflow in Skia chromium-browser: Side-channel information leakage in autofill chromium-browser: Inappropriate implementation in external protocol handlers chromium-browser: Out of bounds write in Skia chromium-browser: Heap buffer overflow in WebAudio chromium-browser: Heap buffer overflow in Skia chromium-browser: Inappropriate implementation in iframe sandbox chromium-browser: Insufficient policy enforcement in CSP chromium-browser: Incorrect security UI in basic auth chromium-browser: Inappropriate implementation in WebRTC chromium-browser: Out of bounds memory access in developer tools chromium-browser: Side-channel information leakage in scroll to text chromium-browser: Use after free in SCTP chromium-browser: Type Confusion in V8 chromium-browser: Heap buffer overflow in WebRTC chromium-browser: Insufficient data validation in WebUI chromium-browser: Incorrect security UI in PWAs chromium-browser: Type Confusion in V8 chromium-browser: Inappropriate implementation in WebView chromium-browser: Use after free in CSS chromium-browser: Heap buffer overflow in Skia chromium-browser: Use after free in WebUSB | [
"cpe:/a:redhat:rhel_extras:6"
]
| null | 8.8 | null | null |
RHSA-2011:0500 | Red Hat Security Advisory: kernel-rt security and bug fix update | kernel: panic in ib_cm:cm_work_handler kernel: xfs: prevent leaking uninitialized stack memory in FSGEOMETRY_V1 kernel: proc: protect mm start_code/end_code in /proc/pid/stat kernel: fs/partitions: Validate map_count in Mac partition tables kernel: drm_modeset_ctl signedness issue kernel: CAP_SYS_MODULE bypass via CAP_NET_ADMIN kernel: bt sco_conninfo infoleak kernel: bnep device field missing NULL terminator kernel: ebtables stack infoleak kernel: potential kernel deadlock when creating circular epoll file structures kernel: dccp: fix oops on Reset after close kernel: fs/partitions: Corrupted OSF partition table infoleak kernel: ipv4: netfilter: arp_tables: fix infoleak to userspace kernel: ipv4: netfilter: ip_tables: fix infoleak to userspace kernel: ipv6: netfilter: ip6_tables: fix infoleak to userspace | [
"cpe:/a:redhat:enterprise_mrg:1::el5"
]
| null | null | null | null |
RHSA-2014:0371 | Red Hat Security Advisory: Red Hat JBoss BPM Suite 6.0.1 update | RESTEasy: XML eXternal Entity (XXE) flaw RESTEasy: XML eXternal Entity (XXE) flaw bouncycastle: TLS CBC padding timing attack Drools: Remote Java Code Execution in MVEL XStream: remote code execution due to insecure XML deserialization Camel: XML eXternal Entity (XXE) flaw in XSLT component Camel: remote code execution via XSL | [
"cpe:/a:redhat:jboss_bpms:6.0"
]
| null | null | null | null |
RHSA-2018:2740 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 6.4.21 security update | keycloak: SAML request parser replaces special strings with system properties hibernate-validator: Privilege escalation when running under the security manager tomcat: A bug in the UTF-8 decoder can lead to DoS guava: Unbounded memory allocation in AtomicDoubleArray and CompoundOrdering classes allow remote attackers to cause a denial of service | [
"cpe:/a:redhat:jboss_enterprise_application_platform:6.4"
]
| null | null | 5.9 | null |
RHSA-2023:3426 | Red Hat Security Advisory: cups-filters security update | cups-filters: remote code execution in cups-filters, beh CUPS backend | [
"cpe:/a:redhat:rhel_eus:8.6::appstream",
"cpe:/a:redhat:rhel_eus:8.6::crb"
]
| null | 8.8 | null | null |
RHSA-2025:0733 | Red Hat Security Advisory: bzip2 security and bug fix update | bzip2: bzip2: Data integrity error when decompressing (with data integrity tests fail). | [
"cpe:/o:redhat:enterprise_linux:8::baseos"
]
| null | 4.4 | null | null |
RHSA-2024:1496 | Red Hat Security Advisory: thunderbird security update | nss: timing attack against RSA decryption Mozilla: Crash in NSS TLS method Mozilla: Leaking of encrypted email subjects to other conversations Mozilla: JIT code failed to save return registers on Armv7-A Mozilla: Integer overflow could have led to out of bounds write Mozilla: Improper handling of html and body tags enabled CSP nonce leakage Mozilla: Clickjacking vulnerability could have led to a user accidentally granting permissions Mozilla: Self referencing object could have potentially led to a use-after-free Mozilla: Memory safety bugs fixed in Firefox 124, Firefox ESR 115.9, and Thunderbird 115.9 | [
"cpe:/a:redhat:rhel_eus:8.8::appstream"
]
| null | 7.5 | null | null |
RHSA-2024:0030 | Red Hat Security Advisory: thunderbird security update | Mozilla: Heap-buffer-overflow affecting WebGL <code>DrawElementsInstanced</code> method with Mesa VM driver Mozilla: Symlinks may resolve to smaller than expected buffers Mozilla: Heap buffer overflow in <code>nsTextFragment</code> Mozilla: Use-after-free in PR_GetIdentitiesLayer Mozilla: Potential sandbox escape due to <code>VideoBridge</code> lack of texture validation Mozilla: Heap buffer overflow affected <code>nsWindow::PickerOpen(void)</code> in headless mode Mozilla: Use-after-free in <code>nsDNSService</code> Mozilla: Undefined behavior in <code>ShutdownObserver()</code> Mozilla: Memory safety bugs fixed in Firefox 121, Firefox ESR 115.6, and Thunderbird 115.6 Mozilla: S/MIME signature accepted despite mismatching message date Mozilla: Truncated signed text was shown with a valid OpenPGP signature | [
"cpe:/a:redhat:rhel_aus:8.2::appstream",
"cpe:/a:redhat:rhel_e4s:8.2::appstream",
"cpe:/a:redhat:rhel_tus:8.2::appstream"
]
| null | 7.5 | null | null |
RHSA-2018:0265 | Red Hat Security Advisory: chromium-browser security update | chromium-browser: use after free in pdfium chromium-browser: same origin bypass in shared worker chromium-browser: race when opening downloaded files chromium-browser: integer overflow in blink chromium-browser: insufficient isolation of devtools from extensions chromium-browser: integer underflow in webassembly chromium-browser: insufficient user gesture requirements in autofill chromium-browser: heap buffer overflow in webgl chromium-browser: xss in devtools chromium-browser: content security policy bypass chromium-browser: url spoof in navigation chromium-browser: url spoof in omnibox chromium-browser: insufficient escaping with external url handlers chromium-browser: insufficient isolation of devtools from extensions chromium-browser: insufficient isolation of devtools from extensions chromium-browser: cross origin url leak in webgl chromium-browser: referrer policy bypass in blink chromium-browser: ui spoof in permissions chromium-browser: url spoof in omnibox chromium-browser: referrer leak in xss auditor chromium-browser: incomplete no-referrer policy implementation chromium-browser: leak of page thumbnails in new tab page chromium-browser: use after free in webui chromium-browser: Insufficient policy enforcement in Catalog Service chromium-browser: Spoof of contents of the Omnibox (URL bar) via a crafted HTML page | [
"cpe:/a:redhat:rhel_extras:6"
]
| null | null | 3.1 | null |
RHSA-2023:2810 | Red Hat Security Advisory: poppler security update | poppler: integer overflow in JBIG2 decoder using malformed files | [
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb"
]
| null | 7.8 | null | null |
RHSA-2010:0175 | Red Hat Security Advisory: httpd security, bug fix, and enhancement update | httpd: request header information leak | [
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
]
| null | null | null | null |
RHSA-2015:1930 | Red Hat Security Advisory: ntp security update | ntp: MITM attacker can force ntpd to make a step larger than the panic threshold ntp: disabling synchronization via crafted KoD packet | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation",
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
]
| null | null | null | null |
RHSA-2024:7700 | Red Hat Security Advisory: firefox security update | firefox: Clipboard write permission bypass firefox: thunderbird: Compromised content process can bypass site isolation firefox: thunderbird: Cross-origin access to PDF contents through multipart responses firefox: thunderbird: Cross-origin access to JSON contents through multipart responses firefox: thunderbird: Potential memory corruption may occur when cloning certain objects firefox: thunderbird: Potential directory upload bypass via clickjacking firefox: thunderbird: External protocol handlers could be enumerated via popups firefox: thunderbird: Specially crafted WebTransport requests could lead to denial of service firefox: thunderbird: Potential memory corruption during JIT compilation firefox: thunderbird: Memory safety bugs fixed in Firefox 131, Firefox ESR 115.16, Firefox ESR 128.3, Thunderbird 131, and Thunderbird 128.3 firefox: thunderbird: Memory safety bugs fixed in Firefox 131, Firefox ESR 128.3, Thunderbird 131, and Thunderbird 128.3 | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
]
| null | 7.5 | null | null |
RHSA-2015:2660 | Red Hat Security Advisory: Red Hat JBoss Web Server 3.0.2 security update | httpd: bypass of mod_headers rules via chunked requests tomcat: non-persistent DoS attack by feeding data by aborting an upload httpd: NULL pointer dereference in mod_cache if Content-Type has empty value httpd: HTTP request smuggling attack against chunked request parser tomcat: URL Normalization issue | [
"cpe:/a:redhat:jboss_enterprise_web_server:3.0::el7"
]
| null | null | 4.3 | null |
RHSA-2024:4874 | Red Hat Security Advisory: freeradius:3.0 security update | freeradius: forgery attack | [
"cpe:/a:redhat:rhel_aus:8.4::appstream",
"cpe:/a:redhat:rhel_e4s:8.4::appstream",
"cpe:/a:redhat:rhel_tus:8.4::appstream"
]
| null | 9 | null | null |
RHSA-2015:1176 | Red Hat Security Advisory: Red Hat JBoss Fuse 6.2.0 update | async-http-client: SSL/TLS certificate verification is disabled under certain conditions async-http-client: missing hostname verification for SSL certificates smack: incorrect X.509 certificate validation smack: IQ response spoofing CXF: SSL hostname verification bypass, incomplete CVE-2012-6153 fix JClouds: predictable tmp file creation in ScriptBuilder Statements smack: MitM vulnerability Fuse: insufficient access permissions checks when accessing Hawtio console wss4j: Apache WSS4J is vulnerable to Bleichenbacher's attack (incomplete fix for CVE-2011-2487) wss4j: Apache WSS4J doesn't correctly enforce the requireSignedEncryptedDataElements property Java: PKIX Trust Engines Exhibit Critical Flaw In Trusted Names Evaluation activemq: Fileserver web application vulnerability allowing RCE | [
"cpe:/a:redhat:jboss_fuse:6.2.0"
]
| null | null | 4.8 | null |
RHSA-2010:0603 | Red Hat Security Advisory: gnupg2 security update | 2: use-after-free when importing certificate with many alternate names | [
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::server"
]
| null | null | null | null |
RHSA-2021:2070 | Red Hat Security Advisory: Red Hat Single Sign-On 7.4.7 security update | keycloak: Internationalized domain name (IDN) homograph attack to impersonate users keycloak: Backchannel logout not working when Principal Type is set to Attribute Name for external SAML IDP netty: Information disclosure via the local system temporary directory netty: possible request smuggling in HTTP/2 due missing validation | [
"cpe:/a:redhat:red_hat_single_sign_on:7"
]
| null | 5.9 | null | null |
RHSA-2019:3936 | Red Hat Security Advisory: kpatch-patch security update | hw: Machine Check Error on Page Size Change (IFU) hw: TSX Transaction Asynchronous Abort (TAA) | [
"cpe:/o:redhat:enterprise_linux:8::baseos"
]
| null | null | 6.5 | null |
RHSA-2008:0575 | Red Hat Security Advisory: rdesktop security update | rdesktop: iso_recv_msg() Integer Underflow Vulnerability rdesktop: channel_process() Integer Signedness Vulnerability | [
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::server"
]
| null | null | null | null |
RHSA-2013:1429 | Red Hat Security Advisory: jakarta-commons-fileupload security update | commons-fileupload: Arbitrary file upload via deserialization | [
"cpe:/a:redhat:jboss_enterprise_web_server:1.0.2"
]
| null | null | null | null |
RHSA-2020:3555 | Red Hat Security Advisory: firefox security update | Mozilla: Integer overflow in nsJPEGEncoder::emptyOutputBuffer Mozilla: WebRTC permission prompt could have been bypassed by a compromised content process Mozilla: Out of bound read in Date.parse() Mozilla: X-Frame-Options bypass using object or embed tags Mozilla: Bypassing iframe sandbox when allowing popups Mozilla: Custom cursor can overlay user interface Mozilla: Type confusion for special arguments in IonMonkey Mozilla: Overriding file type when saving to disk Mozilla: Attacker-induced prompt for extension installation Mozilla: Use-After-Free when aborting an operation | [
"cpe:/a:redhat:rhel_e4s:8.0::appstream"
]
| null | 8.8 | 6.1 | null |
RHSA-2020:1635 | Red Hat Security Advisory: gdb security and bug fix update | gdb: buffer overflow while opening an ELF for debugging leads to Dos, information dislosure and code execution | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
]
| null | null | 6.1 | null |
RHSA-2019:1237 | Red Hat Security Advisory: rh-python35-python-jinja2 security update | python-jinja2: Sandbox escape due to information disclosure via str.format python-jinja2: str.format_map allows sandbox escape | [
"cpe:/a:redhat:rhel_software_collections:3::el6",
"cpe:/a:redhat:rhel_software_collections:3::el7"
]
| null | null | 9 | null |
RHSA-2024:3543 | Red Hat Security Advisory: python-idna security and bug fix update | python-idna: potential DoS via resource consumption via specially crafted inputs to idna.encode() | [
"cpe:/o:redhat:rhel_eus:8.8::baseos"
]
| null | 6.5 | null | null |
RHSA-2024:6239 | Red Hat Security Advisory: resource-agents security update | urllib3: proxy-authorization request header is not stripped during cross-origin redirects | [
"cpe:/a:redhat:rhel_e4s:8.4::highavailability",
"cpe:/a:redhat:rhel_tus:8.4::highavailability"
]
| null | 4.4 | null | null |
RHSA-2023:1791 | Red Hat Security Advisory: firefox security update | Mozilla: Memory Corruption in Safe Browsing Code Mozilla: libwebp: Double-free in libwebp Mozilla: Fullscreen notification obscured Mozilla: Potential Memory Corruption following Garbage Collector compaction Mozilla: Invalid free from JavaScript code Mozilla: Content-Disposition filename truncation leads to Reflected File Download Mozilla: Files with malicious extensions could have been downloaded unsafely on Linux Mozilla: Incorrect optimization result on ARM64 Mozilla: Memory safety bugs fixed in Firefox 112 and Firefox ESR 102.10 | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
]
| null | 8.8 | null | null |
RHSA-2020:5605 | Red Hat Security Advisory: Red Hat OpenShift Container Storage 4.6.0 security, bug fix, enhancement update | nodejs-node-forge: prototype pollution via the util.setPath function nodejs-json-bigint: Prototype pollution via `__proto__` assignment could result in DoS golang.org/x/text: possibility to trigger an infinite loop in encoding/unicode could lead to crash golang: data race in certain net/http servers including ReverseProxy can lead to DoS golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs | [
"cpe:/a:redhat:openshift_container_storage:4.6::el8"
]
| null | 7.5 | null | null |
RHSA-2025:1676 | Red Hat Security Advisory: bind9.16 security update | bind: bind9: Many records in the additional section cause CPU exhaustion | [
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb"
]
| null | 7.5 | null | null |
RHSA-2023:6748 | Red Hat Security Advisory: squid security update | squid: Request/Response smuggling in HTTP/1.1 and ICAP squid: Denial of Service in HTTP Digest Authentication squid: denial of Service in FTP | [
"cpe:/a:redhat:enterprise_linux:9::appstream"
]
| null | 8.6 | null | null |
RHSA-2024:1912 | Red Hat Security Advisory: firefox security update | Mozilla: Permission prompt input delay could expire when not in focus Mozilla: Denial of Service using HTTP/2 CONTINUATION frames Mozilla: GetBoundName in the JIT returned the wrong object Mozilla: Out-of-bounds-read after mis-optimized switch statement Mozilla: Incorrect JITting of arguments led to use-after-free during garbage collection Mozilla: Integer-overflow led to out-of-bounds-read in the OpenType sanitizer Mozilla: Potential use-after-free due to AlignedBuffer self-move Mozilla: Memory safety bug fixed in Firefox 125, Firefox ESR 115.10, and Thunderbird 115.10 | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
]
| null | 7.5 | null | null |
RHSA-2009:0205 | Red Hat Security Advisory: dovecot security and bug fix update | dovecot: incorrect handling of negative rights in the ACL plugin dovecot: ssl_key_password disclosure due to an insecure dovecot.conf permissions | [
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
]
| null | null | null | null |
RHSA-2024:9439 | Red Hat Security Advisory: fontforge security update | fontforge: command injection via crafted filenames fontforge: command injection via crafted archives or compressed files | [
"cpe:/a:redhat:enterprise_linux:9::crb"
]
| null | 4.2 | null | null |
RHSA-2015:1621 | Red Hat Security Advisory: Red Hat JBoss Web Server 2.1.0 tomcat security update | tomcat: non-persistent DoS attack by feeding data by aborting an upload Tomcat/JbossWeb: security manager bypass via EL expressions | [
"cpe:/a:redhat:jboss_enterprise_web_server:2.1.0"
]
| null | null | null | null |
RHSA-2014:1337 | Red Hat Security Advisory: openstack-glance security and bug fix update | openstack-glance: Glance store disk space exhaustion | [
"cpe:/a:redhat:openstack:5::el7"
]
| null | null | null | null |
RHSA-2013:0727 | Red Hat Security Advisory: kvm security update | kernel: kvm: buffer overflow in handling of MSR_KVM_SYSTEM_TIME kernel: kvm: after free issue with the handling of MSR_KVM_SYSTEM_TIME kernel: kvm: out-of-bounds access in ioapic indirect register reads | [
"cpe:/a:redhat:rhel_virtualization:5::server"
]
| null | null | null | null |
RHSA-2022:1078 | Red Hat Security Advisory: openssl security update | openssl: Infinite loop in BN_mod_sqrt() reachable when parsing certificates | [
"cpe:/o:redhat:rhel_aus:7.6::server",
"cpe:/o:redhat:rhel_e4s:7.6::server",
"cpe:/o:redhat:rhel_tus:7.6::server"
]
| null | 7.5 | null | null |
RHSA-2025:1729 | Red Hat Security Advisory: postgresql:13 security update | postgresql: PostgreSQL quoting APIs miss neutralizing quoting syntax in text that fails encoding validation | [
"cpe:/a:redhat:rhel_eus:8.8::appstream"
]
| null | 8.1 | null | null |
RHSA-2021:0761 | Red Hat Security Advisory: python security update | python: infinite loop in the tarfile module via crafted TAR archive | [
"cpe:/o:redhat:rhel_aus:7.4::server",
"cpe:/o:redhat:rhel_e4s:7.4::server",
"cpe:/o:redhat:rhel_tus:7.4::server"
]
| null | 7.5 | null | null |
RHSA-2011:1814 | Red Hat Security Advisory: ipmitool security update | OpenIPMI: IPMI event daemon creates PID file with world writeable permissions | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
]
| null | null | null | null |
RHSA-2022:0998 | Red Hat Security Advisory: Red Hat OpenStack Platform 16.2 (golang-github-vbatts-tar-split) security update | golang: net: incorrect parsing of extraneous zero characters at the beginning of an IP address octet golang: crypto/tls: certificate of wrong type is causing TLS client to panic | [
"cpe:/a:redhat:openstack:16.2::el8"
]
| null | 6.5 | null | null |
RHSA-2023:1805 | Red Hat Security Advisory: thunderbird security update | Thunderbird: Revocation status of S/Mime recipient certificates was not checked Mozilla: Memory Corruption in Safe Browsing Code Mozilla: libwebp: Double-free in libwebp Mozilla: Matrix SDK bundled with Thunderbird vulnerable to denial-of-service attack Thunderbird: Hang when processing certain OpenPGP messages Mozilla: Fullscreen notification obscured Mozilla: Potential Memory Corruption following Garbage Collector compaction Mozilla: Invalid free from JavaScript code Mozilla: Content-Disposition filename truncation leads to Reflected File Download Mozilla: Files with malicious extensions could have been downloaded unsafely on Linux Mozilla: Incorrect optimization result on ARM64 Mozilla: Memory safety bugs fixed in Firefox 112 and Firefox ESR 102.10 | [
"cpe:/a:redhat:rhel_aus:8.2::appstream",
"cpe:/a:redhat:rhel_e4s:8.2::appstream",
"cpe:/a:redhat:rhel_tus:8.2::appstream"
]
| null | 8.8 | null | null |
RHSA-2021:4602 | Red Hat Security Advisory: binutils security update | environment: Unicode's bidirectional (BiDi) override characters can cause trojan source attacks | [
"cpe:/a:redhat:rhel_eus:8.1::appstream",
"cpe:/o:redhat:rhel_eus:8.1::baseos"
]
| null | 8.5 | null | null |
RHSA-2013:0630 | Red Hat Security Advisory: kernel security and bug fix update | kernel: xen: userspace alterable %ds access in xen_iret() kernel: x86/msr: /dev/cpu/*/msr local privilege escalation | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
]
| null | null | null | null |
RHSA-2024:4977 | Red Hat Security Advisory: Red Hat JBoss Web Server 6.0.3 release and security update | tomcat: Improper Handling of Exceptional Conditions tomcat: Denial of Service in Tomcat | [
"cpe:/a:redhat:jboss_enterprise_web_server:6.0"
]
| null | 7.5 | null | null |
RHSA-2021:1362 | Red Hat Security Advisory: firefox security update | Mozilla: More internal network hosts could have been probed by a malicious webpage Mozilla: Out of bound write due to lazy initialization Mozilla: Use-after-free in Responsive Design Mode Mozilla: Secure Lock icon could have been spoofed Mozilla: Blob URLs may have been granted additional privileges Mozilla: Arbitrary FTP command execution on FTP servers using an encoded URL Mozilla: Incorrect size computation in WebAssembly JIT could lead to null-reads Mozilla: Port blocking could be bypassed | [
"cpe:/a:redhat:rhel_eus:8.1::appstream"
]
| null | 8.8 | 6.1 | null |
RHSA-2022:9023 | Red Hat Security Advisory: Red Hat build of Quarkus 2.13.5 release and security update | protobuf-java: timeout in parser leads to DoS quarkus_dev_ui: Dev UI Config Editor is vulnerable to drive-by localhost attacks leading to RCE quarkus-vertx-http: Security misconfiguration of CORS : OWASP A05_2021 level in Quarkus postgresql: SQL Injection in ResultSet.refreshRow() with malicious column names graphql-java: DoS by malicious query jackson-databind: deep wrapper array nesting wrt UNWRAP_SINGLE_VALUE_ARRAYS jackson-databind: use of deeply nested arrays apache-commons-text: variable interpolation RCE | [
"cpe:/a:redhat:quarkus:2.13"
]
| null | 9.8 | null | null |
RHSA-2019:3255 | Red Hat Security Advisory: heketi security, bug fix, and enhancement update | heketi: heketi can be installed using insecure defaults | [
"cpe:/a:redhat:storage:3.5:server:el7",
"cpe:/a:redhat:storage:3:client:el7"
]
| null | null | 7.3 | null |
RHSA-2014:2020 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 6.3.2 security update | CXF: SSL hostname verification bypass, incomplete CVE-2012-5783 fix CXF: SSL hostname verification bypass, incomplete CVE-2012-6153 fix CXF: Improper security semantics enforcement of SAML SubjectConfirmation methods | [
"cpe:/a:redhat:jboss_enterprise_application_platform:6.3"
]
| null | null | 4.8 | null |
RHSA-2013:0896 | Red Hat Security Advisory: qemu-kvm security and bug fix update | qemu: guest agent creates files with insecure permissions in deamon mode | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
]
| null | null | null | null |
RHSA-2017:0352 | Red Hat Security Advisory: qemu-kvm security update | Qemu: display: cirrus: potential arbitrary code execution via cirrus_bitblt_cputovideo | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
]
| null | null | 5.5 | null |
RHSA-2020:5361 | Red Hat Security Advisory: Red Hat build of Thorntail 2.7.2 security and bug fix update | picketbox: JBoss EAP reload to admin-only mode allows authentication bypass wildfly: XML validation manipulation due to incomplete application of use-grammar-pool-only in xercesImpl xnio: file descriptor leak caused by growing amounts of NIO Selector file handles may lead to DoS hibernate-core: SQL injection vulnerability when both hibernate.use_sql_comments and JPQL String literals are used jackson-databind: FasterXML DOMDeserializer insecure entity expansion is vulnerable to XML external entity (XXE) | [
"cpe:/a:redhat:openshift_application_runtimes:1.0"
]
| null | 7.5 | null | null |
RHBA-2019:2599 | Red Hat Bug Fix Advisory: krb5 bug fix update | krb5: Reachable assertion in the KDC using S4U2Self requests | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
]
| null | null | 5.3 | null |
RHSA-2023:7379 | Red Hat Security Advisory: kernel-rt security update | kernel: AMD: Cross-Thread Return Address Predictions hw: Intel: Gather Data Sampling (GDS) side channel vulnerability kernel: net/sched: cls_u32 component reference counter leak if tcf_change_indev() fails kernel: tun: bugs for oversize packet when napi frags enabled in tun_napi_alloc_frags kernel: net/sched: Use-after-free vulnerabilities in the net/sched classifiers: cls_fw, cls_u32 and cls_route kernel: net/sched: Use-after-free vulnerabilities in the net/sched classifiers: cls_fw, cls_u32 and cls_route kernel: net/sched: Use-after-free vulnerabilities in the net/sched classifiers: cls_fw, cls_u32 and cls_route kernel: net/sched: Use-after-free vulnerabilities in the net/sched classifiers: cls_fw, cls_u32 and cls_route kernel: use after free in nvmet_tcp_free_crypto in NVMe kernel: netfilter: potential slab-out-of-bound access due to integer underflow | [
"cpe:/a:redhat:rhel_eus:9.2::nfv",
"cpe:/a:redhat:rhel_eus:9.2::realtime"
]
| null | 7 | null | null |
RHSA-2023:1018 | Red Hat Security Advisory: Red Hat OpenStack Platform 17.0 (python-werkzeug) security update | python-werkzeug: cookie prefixed with = can shadow unprefixed cookie python-werkzeug: high resource usage when parsing multipart form data with many fields | [
"cpe:/a:redhat:openstack:17.0::el9"
]
| null | 7.5 | null | null |
RHSA-2024:3925 | Red Hat Security Advisory: Red Hat Ceph Storage 7.1 security, enhancements, and bug fix update | grafana: account takeover possible when using Azure AD OAuth grafana: incorrect assessment of permissions across organizations go-git: Maliciously crafted Git server replies can cause DoS on go-git clients go-git: Maliciously crafted Git server replies can lead to path traversal and RCE on go-git clients | [
"cpe:/a:redhat:ceph_storage:7.1::el8",
"cpe:/a:redhat:ceph_storage:7.1::el9"
]
| null | 8.1 | null | null |
RHSA-2023:2126 | Red Hat Security Advisory: libreswan security update | libreswan: Malicious IKEv1 Aggressive Mode packets can crash libreswan | [
"cpe:/a:redhat:rhel_e4s:8.1::appstream"
]
| null | 7.5 | null | null |
RHSA-2024:6975 | Red Hat Security Advisory: python3 security update | python: incorrect IPv4 and IPv6 private ranges python: cpython: tarfile: ReDos via excessive backtracking while parsing header values cpython: python: email module doesn't properly quotes newlines in email headers, allowing header injection | [
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/o:redhat:enterprise_linux:8::baseos"
]
| null | 6.8 | null | null |
RHSA-2008:0965 | Red Hat Security Advisory: lynx security update | lynx: .mailcap and .mime.types files read from CWD lynx: remote arbitrary command execution via a crafted lynxcgi: URL | [
"cpe:/o:redhat:enterprise_linux:2.1::as",
"cpe:/o:redhat:enterprise_linux:2.1::aw",
"cpe:/o:redhat:enterprise_linux:2.1::es",
"cpe:/o:redhat:enterprise_linux:2.1::ws",
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws",
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws",
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::server"
]
| null | null | null | null |
RHSA-2020:1913 | Red Hat Security Advisory: e2fsprogs security, bug fix, and enhancement update | e2fsprogs: Crafted ext4 partition leads to out-of-bounds write e2fsprogs: Out-of-bounds write in e2fsck/rehash.c | [
"cpe:/o:redhat:enterprise_linux:8::baseos"
]
| null | 7.5 | 6.4 | null |
RHSA-2016:1602 | Red Hat Security Advisory: mariadb security update | mysql: unspecified vulnerability in subcomponent: Server: DML (CPU April 2016) mysql: unspecified vulnerability in subcomponent: Server: MyISAM (CPU April 2016) mysql: unspecified vulnerability in subcomponent: Server: DML (CPU April 2016) mysql: unspecified vulnerability in subcomponent: Server: DDL (CPU April 2016) mysql: unspecified vulnerability in subcomponent: Server: DML (CPU April 2016) mysql: unspecified vulnerability in subcomponent: Server: FTS (CPU April 2016) mysql: unspecified vulnerability in subcomponent: Server: PS (CPU April 2016) mysql: unspecified vulnerability in subcomponent: Server: PS (CPU April 2016) mysql: unspecified vulnerability in subcomponent: Server: Replication (CPU April 2016) mysql: unspecified vulnerability in subcomponent: Server: Security: Privileges (CPU April 2016) mysql: unspecified vulnerability in subcomponent: Server: Security: Encryption (CPU July 2016) mysql: unspecified vulnerability in subcomponent: Server: Parser (CPU July 2016) mysql: unspecified vulnerability in subcomponent: Server: Types (CPU July 2016) mysql: unspecified vulnerability in subcomponent: Server: DML (CPU July 2016) mysql: unspecified vulnerability in subcomponent: Server: RBR (CPU July 2016) mysql: unspecified vulnerability in subcomponent: Server: Connection (CPU July 2016) | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
]
| null | null | 3.7 | null |
RHSA-2020:3299 | Red Hat Security Advisory: python-pillow security update | python-pillow: out-of-bounds reads/writes in the parsing of SGI image files in expandrow/expandrow2 | [
"cpe:/a:redhat:rhel_eus:8.1::appstream"
]
| null | 8.1 | null | null |
RHSA-2020:0602 | Red Hat Security Advisory: rh-nodejs12-nodejs security update | nodejs: Remotely trigger an assertion on a TLS server with a malformed certificate string nodejs: HTTP request smuggling using malformed Transfer-Encoding header nodejs: HTTP header values do not have trailing optional whitespace trimmed npm: Symlink reference outside of node_modules folder through the bin field upon installation npm: Arbitrary file write via constructed entry in the package.json bin field npm: Global node_modules Binary Overwrite | [
"cpe:/a:redhat:rhel_software_collections:3::el7"
]
| null | 4.8 | null | null |
RHSA-2020:2684 | Red Hat Security Advisory: containernetworking-plugins security update | containernetworking/plugins: IPv6 router advertisements allow for MitM attacks on IPv4 clusters | [
"cpe:/a:redhat:rhel_extras_other:7"
]
| null | 6 | null | null |
RHSA-2025:0057 | Red Hat Security Advisory: kernel security update | kernel: md: fix resync softlockup when bitmap size is less than array size kernel: i40e: fix race condition by adding filter's intermediate sync state kernel: mptcp: cope racing subflow creation in mptcp_rcv_space_adjust | [
"cpe:/a:redhat:rhel_eus:9.4::appstream",
"cpe:/a:redhat:rhel_eus:9.4::crb",
"cpe:/a:redhat:rhel_eus:9.4::nfv",
"cpe:/a:redhat:rhel_eus:9.4::realtime",
"cpe:/o:redhat:rhel_eus:9.4::baseos"
]
| null | 5.9 | null | null |
RHSA-2024:7262 | Red Hat Security Advisory: osbuild-composer security update | golang-fips/openssl: Memory leaks in code encrypting and decrypting RSA payloads encoding/gob: golang: Calling Decoder.Decode on a message which contains deeply nested structures can cause a panic due to stack exhaustion | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
]
| null | 7.5 | null | null |
RHSA-2009:1116 | Red Hat Security Advisory: cyrus-imapd security update | cyrus-sasl: sasl_encode64() does not reliably null-terminate its output | [
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
]
| null | null | null | null |
RHSA-2012:1059 | Red Hat Security Advisory: resteasy security update | RESTEasy: XML eXternal Entity (XXE) flaw RESTEasy: XML eXternal Entity (XXE) flaw | [
"cpe:/a:redhat:jboss_enterprise_application_platform:5::el4",
"cpe:/a:redhat:jboss_enterprise_application_platform:5::el5",
"cpe:/a:redhat:jboss_enterprise_application_platform:5::el6"
]
| null | null | null | null |
RHSA-2022:0128 | Red Hat Security Advisory: thunderbird security update | Mozilla: Iframe sandbox bypass with XSLT Mozilla: Race condition when playing audio files Mozilla: Heap-buffer-overflow in blendGaussianBlur Mozilla: Missing throttling on external protocol launch dialog Mozilla: Use-after-free of ChannelEventQueue::mOwner Mozilla: Browser window spoof using fullscreen mode Mozilla: Out-of-bounds memory access when inserting text in edit mode Mozilla: Browser window spoof using fullscreen mode Mozilla: Leaking cross-origin URLs through securitypolicyviolation event Mozilla: Crash when handling empty pkcs7 sequence Mozilla: Spoofed origin on external protocol launch dialog Mozilla: Memory safety bugs fixed in Firefox 96 and Firefox ESR 91.5 | [
"cpe:/a:redhat:rhel_eus:8.4::appstream"
]
| null | 8.8 | 6.1 | null |
RHSA-2024:1765 | Red Hat Security Advisory: OpenShift Container Platform 4.14.21 bug fix and security update | golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487) golang-protobuf: encoding/protojson, internal/encoding/json: infinite loop in protojson.Unmarshal when unmarshaling certain forms of invalid JSON kernel: sched/membarrier: reduce the ability to hammer on sys_membarrier | [
"cpe:/a:redhat:openshift:4.14::el8",
"cpe:/a:redhat:openshift:4.14::el9"
]
| null | 4.7 | null | null |
RHSA-2007:0883 | Red Hat Security Advisory: qt security update | QT UTF8 improper character expansion QT off by one buffer overflow | [
"cpe:/o:redhat:enterprise_linux:2.1::as",
"cpe:/o:redhat:enterprise_linux:2.1::aw",
"cpe:/o:redhat:enterprise_linux:2.1::es",
"cpe:/o:redhat:enterprise_linux:2.1::ws",
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws",
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws",
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
]
| null | null | null | null |
RHSA-2019:1775 | Red Hat Security Advisory: thunderbird security update | Mozilla: Sandbox escape via installation of malicious language pack Mozilla: Memory safety bugs fixed in Firefox 68 and Firefox ESR 60.8 Mozilla: Script injection within domain through inner window reuse Mozilla: Cross-origin POST requests can be made with NPAPI plugins by following 308 redirects Mozilla: Use-after-free with HTTP/2 cached stream Mozilla: HTML parsing error can contribute to content XSS Mozilla: Caret character improperly escaped in origins Mozilla: Same-origin policy treats all files in a directory as having the same-origin | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
]
| null | null | 6.1 | null |
RHSA-2015:1793 | Red Hat Security Advisory: qemu-kvm security fix update | Qemu: rtl8139 uninitialized heap memory information leakage to guest (XSA-140) | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
]
| null | null | null | null |
RHSA-2020:2847 | Red Hat Security Advisory: nodejs:12 security update | nodejs-minimist: prototype pollution allows adding or modifying properties of Object.prototype using a constructor or __proto__ payload nodejs: TLS session reuse can lead to hostname verification bypass nodejs: memory corruption in napi_get_value_string_* functions nghttp2: overly large SETTINGS frames can lead to DoS | [
"cpe:/a:redhat:rhel_eus:8.1::appstream"
]
| null | 7.5 | null | null |
RHSA-2018:0379 | Red Hat Security Advisory: .NET Core on Red Hat Enterprise Linux security update | Core: Improper processing of XML documents can cause a denial of service | [
"cpe:/a:redhat:rhel_dotnet:1.0::el7",
"cpe:/a:redhat:rhel_dotnet:1.1::el7",
"cpe:/a:redhat:rhel_dotnet:2.0::el7"
]
| null | null | 5.3 | null |
RHSA-2024:5527 | Red Hat Security Advisory: thunderbird security update | mozilla: Fullscreen notification dialog can be obscured by document content mozilla: Out of bounds memory access in graphics shared memory handling mozilla: Type confusion in WebAssembly mozilla: Incomplete WebAssembly exception handing mozilla: Out of bounds read in editor component mozilla: Missing permission check when creating a StreamFilter mozilla: Uninitialized memory used by WebGL mozilla: Use-after-free in JavaScript garbage collection mozilla: Use-after-free in IndexedDB mozilla: Document content could partially obscure security prompts | [
"cpe:/a:redhat:rhel_aus:8.4::appstream",
"cpe:/a:redhat:rhel_e4s:8.4::appstream",
"cpe:/a:redhat:rhel_tus:8.4::appstream"
]
| null | 6.1 | null | null |
RHBA-2021:0626 | Red Hat Bug Fix Advisory: microcode_ctl bug fix and enhancement update | hw: Vector Register Leakage-Active | [
"cpe:/o:redhat:rhel_eus:7.6::computenode",
"cpe:/o:redhat:rhel_eus:7.6::server"
]
| null | 2.8 | null | null |
RHSA-2013:0602 | Red Hat Security Advisory: java-1.7.0-openjdk security update | OpenJDK: Specially crafted sample model integer overflow (2D, 8007014) OpenJDK: CMM malformed raster memory corruption (2D, 8007675) | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
]
| null | null | null | null |
RHSA-2003:193 | Red Hat Security Advisory: kdelibs security update | security flaw | [
"cpe:/o:redhat:enterprise_linux:2.1::as",
"cpe:/o:redhat:enterprise_linux:2.1::aw",
"cpe:/o:redhat:enterprise_linux:2.1::es",
"cpe:/o:redhat:enterprise_linux:2.1::ws"
]
| null | null | null | null |
RHSA-2015:0028 | Red Hat Security Advisory: cfme security, bug fix, and enhancement update | CFME: check_privileges logic error resulting in privilege escalation CFME: default fallback password in customization_templates.yml CFME: REST API SQL Injection | [
"cpe:/a:redhat:cloudforms_managementengine:5::el6"
]
| null | null | null | null |
RHSA-2020:4909 | Red Hat Security Advisory: thunderbird security update | Mozilla: Memory safety bugs fixed in Firefox 82 and Firefox ESR 78.4 chromium-browser: Use after free in WebRTC | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
]
| null | 8.8 | null | null |
RHSA-2018:1169 | Red Hat Security Advisory: corosync security update | corosync: Integer overflow in exec/totemcrypto.c:authenticate_nss_2_3() function | [
"cpe:/o:redhat:enterprise_linux:7::server"
]
| null | null | 7.5 | null |
RHSA-2021:4384 | Red Hat Security Advisory: bind security and bug fix update | bind: Broken inbound incremental zone update (IXFR) can cause named to terminate unexpectedly | [
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/o:redhat:enterprise_linux:8::baseos"
]
| null | 6.5 | null | null |
RHSA-2015:1419 | Red Hat Security Advisory: libxml2 security and bug fix update | libxml2: denial of service processing a crafted XML document | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
]
| null | null | null | null |
RHSA-2013:0257 | Red Hat Security Advisory: JBoss Enterprise Application Platform 5.2.0 security update | apache-cxf: SOAPAction spoofing on document literal web services apache-cxf: Bypass of security constraints on WS endpoints when using WSS4JInInterceptor | [
"cpe:/a:redhat:jboss_enterprise_application_platform:5::el4",
"cpe:/a:redhat:jboss_enterprise_application_platform:5::el5",
"cpe:/a:redhat:jboss_enterprise_application_platform:5::el6"
]
| null | null | null | null |
RHSA-2016:0349 | Red Hat Security Advisory: postgresql92-postgresql security update | postgresql: case insensitive range handling integer overflow leading to buffer overflow | [
"cpe:/a:redhat:rhel_software_collections:2::el6",
"cpe:/a:redhat:rhel_software_collections:2::el7"
]
| null | null | null | null |
RHSA-2012:1543 | Red Hat Security Advisory: CloudForms System Engine 1.1 update | katello: pulp admin password logged in plaintext in world-readable katello/production.log pulp /etc/pulp/pulp.conf world readable, contains default admin password Katello: lack of authorization in proxies_controller.rb grinder: /var/lib/pulp/cache/grinder directory is world-writeable | [
"cpe:/a:cloudforms_systemengine:1::el6",
"cpe:/a:cloudforms_tools:1::el5",
"cpe:/a:cloudforms_tools:1::el6"
]
| null | null | null | null |
RHSA-2023:1401 | Red Hat Security Advisory: thunderbird security update | Mozilla: Incorrect code generation during JIT compilation Mozilla: Potential out-of-bounds when accessing throttled streams Mozilla: Invalid downcast in Worklets Mozilla: URL being dragged from a removed cross-origin iframe into the same tab triggered navigation Mozilla: Memory safety bugs fixed in Firefox 111 and Firefox ESR 102.9 | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
]
| null | 8.8 | null | null |
RHSA-2022:8544 | Red Hat Security Advisory: thunderbird security update | Mozilla: Service Workers might have learned size of cross-origin media files Mozilla: Fullscreen notification bypass Mozilla: Use-after-free in InputStream implementation Mozilla: Use-after-free of a JavaScript Realm Mozilla: Fullscreen notification bypass via windowName Mozilla: Use-after-free in Garbage Collection Mozilla: ServiceWorker-intercepted requests bypassed SameSite cookie policy Mozilla: Cross-Site Tracing was possible via non-standard override headers Mozilla: Symlinks may resolve to partially uninitialized buffers Mozilla: Keystroke Side-Channel Leakage Mozilla: Custom mouse cursor could have been drawn over browser UI Mozilla: Iframe contents could be rendered outside the iframe Mozilla: Memory safety bugs fixed in Firefox 107 and Firefox ESR 102.5 | [
"cpe:/a:redhat:rhel_eus:8.4::appstream"
]
| null | 8.8 | 6.1 | null |
RHSA-2018:1130 | Red Hat Security Advisory: kernel security and bug fix update | hw: cpu: speculative execution branch target injection kernel: Use-after-free vulnerability in DCCP socket kernel: Incorrect type conversion for size during dma allocation kernel: v4l2: disabled memory access protection mechanism allowing privilege escalation kernel: Use-after-free in snd_seq_ioctl_create_port() kernel: Missing namespace check in net/netlink/af_netlink.c allows for network monitors to observe systemwide activity kernel: netfilter: use-after-free in tcpmss_mangle_packet function in net/netfilter/xt_TCPMSS.c kernel: kvm: Reachable BUG() on out-of-bounds guest IRQ kernel: Stack information leak in the EFS element | [
"cpe:/o:redhat:rhel_eus:7.4::computenode",
"cpe:/o:redhat:rhel_eus:7.4::server"
]
| null | null | 6.5 | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.