id
stringlengths 13
15
| title
stringlengths 29
176
| description
stringlengths 8
32.1k
| cpes
sequencelengths 0
20
| cvss_v4_0
null | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
null |
---|---|---|---|---|---|---|---|
RHSA-2018:0577 | Red Hat Security Advisory: Red Hat JBoss BPM Suite 6.4.9 security update | jackson-databind: Unsafe deserialization due to incomplete black list (incomplete fix for CVE-2017-7525) | [
"cpe:/a:redhat:jboss_bpms:6.4"
] | null | null | 8.1 | null |
RHSA-2024:8721 | Red Hat Security Advisory: firefox security update | firefox: thunderbird: Permission leak via embed or object elements firefox: thunderbird: Use-after-free in layout with accessibility firefox: thunderbird: Confusing display of origin for external protocol handler prompt firefox: thunderbird: XSS due to Content-Disposition being ignored in multipart/x-mixed-replace response firefox: thunderbird: Origin of permission prompt could be spoofed by long URL firefox: thunderbird: Cross origin video frame leak firefox: thunderbird: History interface could have been used to cause a Denial of Service condition in the browser firefox: thunderbird: Clipboard "paste" button persisted across tabs firefox: DOM push subscription message could hang Firefox firefox: thunderbird: Memory safety bugs fixed in Firefox 132, Thunderbird 132, Firefox ESR 128.4, and Thunderbird 128.4 | [
"cpe:/a:redhat:rhel_e4s:9.0::appstream"
] | null | 8.8 | null | null |
RHSA-2023:7388 | Red Hat Security Advisory: tigervnc security update | xorg-x11-server: Out-of-bounds write in XIChangeDeviceProperty/RRChangeOutputProperty | [
"cpe:/a:redhat:rhel_eus:9.0::appstream"
] | null | 7.8 | null | null |
RHSA-2017:2457 | Red Hat Security Advisory: flash-plugin security update | flash-plugin: Information Disclosure via Security Bypass issue fixed in APSB17-23 flash-plugin: Remote Code Execution due to Type Confusion issue fixed in APSB17-23 | [
"cpe:/a:redhat:rhel_extras:6"
] | null | null | 8.8 | null |
RHSA-2022:8765 | Red Hat Security Advisory: kernel-rt security and bug fix update | kernel: openvswitch: integer underflow leads to out-of-bounds write in reserve_sfa_size() | [
"cpe:/a:redhat:rhel_eus:8.4::nfv",
"cpe:/a:redhat:rhel_eus:8.4::realtime"
] | null | 7.8 | null | null |
RHSA-2018:3404 | Red Hat Security Advisory: Red Hat Enterprise Linux 7.3 Extended Update Support One-Month Notice | This is the One-Month notification for the retirement of Red Hat Enterprise Linux 7.3 Extended Update Support (EUS). This notification applies only to those customers subscribed to the Extended Update Support (EUS) channel for Red Hat Enterprise Linux 7.3. | [
"cpe:/o:redhat:rhel_eus:7.3::computenode",
"cpe:/o:redhat:rhel_eus:7.3::server"
] | null | null | null | null |
RHSA-2014:1892 | Red Hat Security Advisory: Red Hat JBoss BPM Suite 6.0.3 update | CXF: SSL hostname verification bypass, incomplete CVE-2012-5783 fix CXF: SSL hostname verification bypass, incomplete CVE-2012-6153 fix | [
"cpe:/a:redhat:jboss_bpms:6.0"
] | null | null | 4.8 | null |
RHSA-2009:1453 | Red Hat Security Advisory: pidgin security update | Pidgin: NULL pointer dereference by handling IRC topic(s) (DoS) pidgin: ignores SSL/TLS requirements with old jabber servers Pidgin: NULL pointer dereference by processing incomplete MSN SLP invite (DoS) Pidgin: NULL pointer dereference by processing a custom smiley (DoS) | [
"cpe:/a:redhat:rhel_productivity:5",
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws",
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation"
] | null | null | null | null |
RHSA-2004:245 | Red Hat Security Advisory: apache, mod_ssl security update | mod_ssl ssl_util_uuencode_binary CA issue httpd mod_proxy buffer overflow | [
"cpe:/o:redhat:enterprise_linux:2.1::as",
"cpe:/o:redhat:enterprise_linux:2.1::aw",
"cpe:/o:redhat:enterprise_linux:2.1::es",
"cpe:/o:redhat:enterprise_linux:2.1::ws"
] | null | null | null | null |
RHSA-2022:0536 | Red Hat Security Advisory: thunderbird security update | Mozilla: Extensions could have bypassed permission confirmation during update Mozilla: Drag and dropping an image could have resulted in the dropped object being an executable Mozilla: Sandboxed iframes could have executed script if the parent appended elements Mozilla: Cross-Origin responses could be distinguished between script and non-script content-types Mozilla: frame-ancestors Content Security Policy directive was not enforced for framed extension pages Mozilla: Script Execution during invalid object state Mozilla: Memory safety bugs fixed in Firefox 97 and Firefox ESR 91.6 | [
"cpe:/a:redhat:rhel_eus:8.4::appstream"
] | null | 8.8 | null | null |
RHSA-2022:2137 | Red Hat Security Advisory: java-1.8.0-openjdk security update | OpenJDK: Unbounded memory allocation when compiling crafted XPath expressions (JAXP, 8270504) OpenJDK: Improper object-to-string conversion in AnnotationInvocationHandler (Libraries, 8277672) OpenJDK: Missing check for negative ObjectIdentifier (Libraries, 8275151) OpenJDK: Defective secure validation in Apache Santuario (Libraries, 8278008) OpenJDK: URI parsing inconsistencies (JNDI, 8278972) | [
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::crb"
] | null | 5.3 | null | null |
RHSA-2024:1480 | Red Hat Security Advisory: libreoffice security update | libreoffice: Improper Input Validation leading to arbitrary gstreamer plugin execution libreoffice: Insufficient macro permission validation leading to macro execution | [
"cpe:/a:redhat:rhel_aus:8.4::appstream",
"cpe:/a:redhat:rhel_e4s:8.4::appstream",
"cpe:/a:redhat:rhel_tus:8.4::appstream"
] | null | 8.3 | null | null |
RHSA-2021:2575 | Red Hat Security Advisory: lz4 security update | lz4: memory corruption due to an integer overflow bug caused by memmove argument | [
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 8.6 | null | null |
RHBA-2021:1166 | Red Hat Bug Fix Advisory: openvswitch2.11 bug fix and enhancement update | openvswitch: use-after-free in decode_NXAST_RAW_ENCAP during the decoding of a RAW_ENCAP action | [
"cpe:/o:redhat:enterprise_linux:7::fastdatapath"
] | null | 7.5 | null | null |
RHSA-2015:0140 | Red Hat Security Advisory: flash-plugin security update | flash-plugin: multiple code execution flaws (APSB15-04) flash-plugin: multiple code execution flaws (APSB15-04) flash-plugin: multiple code execution flaws (APSB15-04) flash-plugin: multiple code execution flaws (APSB15-04) flash-plugin: multiple code execution flaws (APSB15-04) flash-plugin: multiple code execution flaws (APSB15-04) flash-plugin: multiple code execution flaws (APSB15-04) flash-plugin: multiple code execution flaws (APSB15-04) flash-plugin: multiple code execution flaws (APSB15-04) flash-plugin: multiple code execution flaws (APSB15-04) flash-plugin: multiple code execution flaws (APSB15-04) flash-plugin: multiple code execution flaws (APSB15-04) flash-plugin: multiple code execution flaws (APSB15-04) flash-plugin: multiple code execution flaws (APSB15-04) flash-plugin: multiple code execution flaws (APSB15-04) flash-plugin: multiple code execution flaws (APSB15-04) flash-plugin: multiple code execution flaws (APSB15-04) flash-plugin: multiple code execution flaws (APSB15-04) | [
"cpe:/a:redhat:rhel_extras:5::client",
"cpe:/a:redhat:rhel_extras:5::server",
"cpe:/a:redhat:rhel_extras:6"
] | null | null | null | null |
RHSA-2020:2113 | Red Hat Security Advisory: Red Hat Single Sign-On 7.3.8 security update | mojarra: Path traversal in ResourceManager.java:getLocalePrefix() via the loc parameter infinispan: invokeAccessibly method from ReflectionUtil class allows to invoke private methods Mojarra: Path traversal via either the loc parameter or the con parameter, incomplete fix of CVE-2018-14371 | [
"cpe:/a:redhat:jboss_single_sign_on:7.3"
] | null | 6.5 | 7.5 | null |
RHSA-2015:1723 | Red Hat Security Advisory: openstack-nova security update | openstack-nova: Nova instance migration process does not stop when instance is deleted | [
"cpe:/a:redhat:openstack:7::el7"
] | null | null | null | null |
RHSA-2019:0983 | Red Hat Security Advisory: wget security update | wget: do_conversion() heap-based buffer overflow vulnerability | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | null | 8.8 | null |
RHSA-2022:7003 | Red Hat Security Advisory: java-1.8.0-openjdk security update | OpenJDK: improper handling of long NTLM client hostnames (Security, 8286526) OpenJDK: insufficient randomization of JNDI DNS port numbers (JNDI, 8286910) OpenJDK: excessive memory allocation in X.509 certificate parsing (Security, 8286533) OpenJDK: HttpServer no connection count limit (Lightweight HTTP Server, 8286918) | [
"cpe:/a:redhat:rhel_e4s:8.1::appstream"
] | null | 5.3 | null | null |
RHSA-2022:1373 | Red Hat Security Advisory: kpatch-patch security update | kernel: Use After Free in unix_gc() which could result in a local privilege escalation kernel: use-after-free in RDMA listen() kernel: fget: check that the fd still exists after getting a ref to it kernel: failing usercopy allows for use-after-free exploitation | [
"cpe:/o:redhat:rhel_e4s:7.7::server"
] | null | 7 | null | null |
RHSA-2015:1177 | Red Hat Security Advisory: Red Hat JBoss A-MQ 6.2.0 update | CXF: SSL hostname verification bypass, incomplete CVE-2012-6153 fix Fuse: insufficient access permissions checks when accessing Hawtio console wss4j: Apache WSS4J is vulnerable to Bleichenbacher's attack (incomplete fix for CVE-2011-2487) wss4j: Apache WSS4J doesn't correctly enforce the requireSignedEncryptedDataElements property Java: PKIX Trust Engines Exhibit Critical Flaw In Trusted Names Evaluation | [
"cpe:/a:redhat:jboss_amq:6.2.0"
] | null | null | 4.8 | null |
RHSA-2010:0577 | Red Hat Security Advisory: freetype security update | freetype: integer overflow vulnerability in smooth/ftgrays.c Freetype demos multiple buffer overflows Freetype ftmulti buffer overflow | [
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws"
] | null | null | null | null |
RHSA-2017:0323 | Red Hat Security Advisory: kernel security update | kernel: dccp: crash while sending ipv6 reset packet kernel: use after free in dccp protocol | [
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | 7.8 | null |
RHSA-2022:8973 | Red Hat Security Advisory: kernel security and bug fix update | kernel: KVM: cmpxchg_gpte can write to pfns outside the userspace region kernel: openvswitch: integer underflow leads to out-of-bounds write in reserve_sfa_size() kernel: watch queue race condition can lead to privilege escalation hw: cpu: incomplete clean-up of multi-core shared buffers (aka SBDR) hw: cpu: incomplete clean-up of microarchitectural fill buffers (aka SBDS) hw: cpu: incomplete clean-up in specific special register write operations (aka DRPW) hw: cpu: AMD: RetBleed Arbitrary Speculative Code Execution with Return Instructions hw: cpu: AMD: Branch Type Confusion (non-retbleed) hw: cpu: Intel: Post-barrier Return Stack Buffer Predictions hw: cpu: Intel: information disclosure via local access hw: cpu: AMD: RetBleed Arbitrary Speculative Code Execution with Return Instructions hw: cpu: Intel: RetBleed Arbitrary Speculative Code Execution with Return Instructions kernel: nfsd buffer overflow by RPC message over TCP with garbage data | [
"cpe:/a:redhat:rhel_eus:9.0::appstream",
"cpe:/a:redhat:rhel_eus:9.0::crb",
"cpe:/o:redhat:rhel_eus:9.0::baseos"
] | null | 7.5 | null | null |
RHSA-2015:0726 | Red Hat Security Advisory: kernel security and bug fix update | kernel: infiniband: uverbs: unprotected physical memory access kernel: net: slab corruption from use after free on INIT collisions | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | null | null |
RHSA-2009:1551 | Red Hat Security Advisory: java-1.4.2-ibm security update | OpenJDK RSA public key length denial-of-service (6497740) OpenJDK: DoS (disk consumption) via handling of temporary font files JDK: XML parsing Denial-Of-Service (6845701) java-1.6.0-sun: Privilege escalation via crafted image file due improper color profiles parsing (6862970) JRE JPEG JFIF Decoder issue (6862969) OpenJDK JPEG Image Writer quantization problem (6862968) OpenJDK ASN.1/DER input stream parser denial of service (6864911) CVE-2009-3877 OpenJDK ASN.1/DER input stream parser denial of service (6864911) CVE-2009-3877 | [
"cpe:/a:redhat:rhel_extras_sap:4",
"cpe:/a:redhat:rhel_extras_sap:5"
] | null | null | null | null |
RHSA-2020:0513 | Red Hat Security Advisory: flash-plugin security update | flash-plugin: Arbitrary Code Execution vulnerability (APSB20-06) | [
"cpe:/a:redhat:rhel_extras:6"
] | null | null | 8.8 | null |
RHSA-2025:2445 | Red Hat Security Advisory: OpenShift Container Platform 4.17.20 bug fix and security update | buildah: Buildah allows arbitrary directory mount kernel: HID: core: zero-initialize the report buffer distribution: Distribution's token authentication allows attacker to inject an untrusted signing key in a JWT | [
"cpe:/a:redhat:openshift:4.17::el9"
] | null | 6.5 | null | null |
RHSA-2014:0252 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 6.2.1 security update | apache-commons-fileupload: denial of service due to too-small buffer size used by MultipartStream | [
"cpe:/a:redhat:jboss_enterprise_application_platform:6.2"
] | null | null | null | null |
RHSA-2024:2672 | Red Hat Security Advisory: OpenShift Container Platform 4.14.24 packages and security update | golang: net/http, x/net/http2: unlimited number of CONTINUATION frames causes DoS buildah: full container escape at build time cri-o: Arbitrary command injection via pod annotation jose-go: improper handling of highly compressed data | [
"cpe:/a:redhat:openshift:4.14::el8",
"cpe:/a:redhat:openshift:4.14::el9"
] | null | 4.3 | null | null |
RHSA-2008:0157 | Red Hat Security Advisory: cups security update | cups: double free vulnerability in process_browse_data() | [
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2017:1422 | Red Hat Security Advisory: Red Hat Directory Server 9 - Final Day Of Retirement Notice | This is the final day of notification for the retirement of Red Hat Directory Server 9. | [
"cpe:/a:redhat:directory_server:9"
] | null | null | null | null |
RHSA-2021:4626 | Red Hat Security Advisory: RHV Manager (ovirt-engine) security update [ovirt-4.4.9] | nodejs-ua-parser-js: Regular expression denial of service via the regex nodejs-glob-parent: Regular expression denial of service | [
"cpe:/a:redhat:rhev_manager:4.4:el8"
] | null | 7.5 | null | null |
RHSA-2022:7072 | Red Hat Security Advisory: firefox security update | Mozilla: Same-origin policy violation could have leaked cross-origin URLs Mozilla: Memory Corruption in JS Engine Mozilla: Denial of Service via window.print Mozilla: Memory safety bugs fixed in Firefox ESR 102.4 and Thunderbird 102.4 | [
"cpe:/a:redhat:rhel_eus:8.4::appstream"
] | null | 8.8 | 6.1 | null |
RHSA-2010:0408 | Red Hat Security Advisory: java-1.4.2-ibm security update | TLS: MITM attacks via session renegotiation java-1.6.0-sun: Stack-based buffer overflow via a long file: URL argument (6854303) OpenJDK JRE AWT setDifflCM stack overflow (6872357) OpenJDK JRE AWT setBytePixels heap overflow (6872358) OpenJDK ImageI/O JPEG heap overflow (6874643) OpenJDK MessageDigest.isEqual introduces timing attack vulnerabilities (6863503) | [
"cpe:/a:redhat:rhel_extras_sap:4",
"cpe:/a:redhat:rhel_extras_sap:5"
] | null | null | null | null |
RHSA-2020:2939 | Red Hat Security Advisory: .NET Core 3.1 on Red Hat Enterprise Linux security and bugfix update | dotnet: XML source markup processing remote code execution | [
"cpe:/a:redhat:rhel_dotnet:3.1::el7"
] | null | 8.8 | null | null |
RHSA-2024:7208 | Red Hat Security Advisory: osbuild-composer security update | encoding/gob: golang: Calling Decoder.Decode on a message which contains deeply nested structures can cause a panic due to stack exhaustion | [
"cpe:/a:redhat:rhel_e4s:9.0::appstream"
] | null | 7.5 | null | null |
RHSA-2014:0859 | Red Hat Security Advisory: Red Hat Enterprise MRG 2.5 Messaging and Grid security update | cumin: DoS via displayed link names containing non-ASCII characters cumin: session cookies lack httponly setting | [
"cpe:/a:redhat:enterprise_mrg:2::el5"
] | null | null | null | null |
RHSA-2019:0194 | Red Hat Security Advisory: bind security update | bind: Crash from assertion error when debug log level is 10 and log entries meet buffer boundary | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 5.9 | null |
RHSA-2023:0201 | Red Hat Security Advisory: java-11-openjdk security update | OpenJDK: handshake DoS attack against DTLS connections (JSSE, 8287411) OpenJDK: soundbank URL remote loading (Sound, 8293742) | [
"cpe:/a:redhat:rhel_eus:9.0::appstream",
"cpe:/a:redhat:rhel_eus:9.0::crb"
] | null | 3.7 | null | null |
RHSA-2011:0920 | Red Hat Security Advisory: krb5-appl security update | krb5-appl: ftpd incorrect group privilege dropping (MITKRB5-SA-2011-005) | [
"cpe:/o:redhat:enterprise_linux:6::server"
] | null | null | null | null |
RHSA-2016:2695 | Red Hat Security Advisory: kernel security, bug fix, and enhancement update | kernel: use-after-free via crafted IPV6 sendmsg for raw / tcp / udp / l2tp sockets. | [
"cpe:/o:redhat:rhel_eus:7.2::computenode",
"cpe:/o:redhat:rhel_eus:7.2::server"
] | null | null | 8.4 | null |
RHSA-2016:1484 | Red Hat Security Advisory: spacewalk-java security and bug fix update | spacewalk-monitoring: XSS issue in monitoring probe spacewalk-java: Multiple XSS flaws | [
"cpe:/a:redhat:network_satellite:5.7::el6"
] | null | null | 5.4 | null |
RHSA-2022:7813 | Red Hat Security Advisory: mingw-zlib security update | zlib: A flaw found in zlib when compressing (not decompressing) certain inputs | [
"cpe:/a:redhat:enterprise_linux:8::crb"
] | null | 8.2 | null | null |
RHSA-2009:0358 | Red Hat Security Advisory: evolution security update | evolution-data-server: insufficient checking of NTLM authentication challenge packets evolution-data-server: integer overflow in base64 encoding functions | [
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws"
] | null | null | null | null |
RHSA-2016:1458 | Red Hat Security Advisory: java-1.8.0-openjdk security update | OpenJDK: insufficient restrictions on the use of custom ValueHandler (CORBA, 8079718) OpenJDK: maximum XML name limit not applied to namespace URIs (JAXP, 8148872) OpenJDK: missing entity replacement limits (JAXP, 8149962) OpenJDK: integer overflows in bytecode streams (Hotspot, 8152479) OpenJDK: insufficient protection of MethodHandle.invokeBasic() (Hotspot, 8154475) OpenJDK: incorrect handling of MethodHandles.dropArguments() argument (Libraries, 8155985) OpenJDK: insufficient bytecode verification (Hotspot, 8155981) OpenJDK: insufficient value count check in MethodHandles.filterReturnValue() (Libraries, 8158571) | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation",
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 8.8 | null |
RHSA-2024:7135 | Red Hat Security Advisory: git-lfs security update | encoding/gob: golang: Calling Decoder.Decode on a message which contains deeply nested structures can cause a panic due to stack exhaustion | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 7.5 | null | null |
RHSA-2012:0128 | Red Hat Security Advisory: httpd security update | httpd: ap_pregsub Integer overflow to buffer overflow httpd: http 0.9 request bypass of the reverse proxy vulnerability CVE-2011-3368 fix httpd: uri scheme bypass of the reverse proxy vulnerability CVE-2011-3368 fix httpd: possible crash on shutdown due to flaw in scoreboard handling httpd: cookie exposure due to error responses | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2011:1391 | Red Hat Security Advisory: httpd security and bug fix update | httpd: mod_proxy_ajp remote temporary DoS httpd: reverse web proxy vulnerability | [
"cpe:/o:redhat:enterprise_linux:6::server"
] | null | null | null | null |
RHSA-2019:3517 | Red Hat Security Advisory: kernel security, bug fix, and enhancement update | kernel: Linux stack ASLR implementation Integer overflow kernel: nfs: use-after-free in svc_process_common() kernel: Information Disclosure in crypto_report_one in crypto/crypto_user.c kernel: oob memory read in hso_probe in drivers/net/usb/hso.c kernel: usb: missing size check in the __usb_get_extra_descriptor() leading to DoS kernel: Heap address information leak while using L2CAP_GET_CONF_OPT kernel: Heap address information leak while using L2CAP_PARSE_CONF_RSP kernel: SCTP socket buffer memory leak leading to denial of service kernel: denial of service vector through vfio DMA mappings Kernel: vhost_net: infinite loop while receiving packets leads to DoS Kernel: page cache side channel attacks Kernel: KVM: leak of uninitialized stack contents to guest hardware: bluetooth: BR/EDR encryption key negotiation attacks (KNOB) kernel: Heap overflow in mwifiex_uap_parse_tail_ies function in drivers/net/wireless/marvell/mwifiex/ie.c kernel: null-pointer dereference in hci_uart_set_flow_control Kernel: net: weak IP ID generation leads to remote device tracking kernel: fix race condition between mmget_not_zero()/get_task_mm() and core dumping kernel: fs/ext4/extents.c leads to information disclosure kernel: sensitive information disclosure from kernel stack memory via HIDPCONNADD command kernel: unchecked kstrdup of fwstr in drm_load_edid_firmware leads to denial of service kernel: use-after-free in arch/x86/lib/insn-eval.c kernel: denial of service in arch/powerpc/kernel/signal_32.c and arch/powerpc/kernel/signal_64.c via sigreturn() system call Kernel: KVM: OOB memory access via mmio ring buffer kernel: use-after-free in sound/core/init.c and sound/core/info.c kernel: out-of-bounds array access in __xfrm_policy_unlink kernel: memory leak in register_queue_kobjects() in net/core/net-sysfs.c leads to denial of service kernel: use-after-free in SMB2_write function in fs/cifs/smb2pdu.c kernel: use-after-free information leak in SMB2_read kernel: memory leak in genl_register_family() in net/netlink/genetlink.c kernel: null pointer dereference in drivers/net/ethernet/intel/fm10k/fm10k_main.c kernel: out-of-bounds in function build_audio_procunit in sound/usb/mixer.c kernel: Memory leak in sit_init_net() in net/ipv6/sit.c kernel: net-sysfs: *_queue_add_kobject refcount issue kernel: use-after-free read in napi_gro_frags() in the Linux kernel | [
"cpe:/a:redhat:enterprise_linux:8::crb",
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 5.3 | 5.5 | null |
RHSA-2023:0005 | Red Hat Security Advisory: bcel security update | Apache-Commons-BCEL: arbitrary bytecode produced via out-of-bounds writing | [
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 8.1 | null | null |
RHSA-2019:1931 | Red Hat Security Advisory: kernel security and bug fix update | kernel: Exploitable memory corruption due to UFO to non-UFO path switch | [
"cpe:/o:redhat:rhel_els:5"
] | null | null | 7 | null |
RHSA-2024:0978 | Red Hat Security Advisory: linux-firmware security update | hw: amd: INVD instruction may lead to a loss of SEV-ES guest machine memory integrity problem | [
"cpe:/o:redhat:rhel_aus:7.6::server"
] | null | 5.3 | null | null |
RHSA-2016:2585 | Red Hat Security Advisory: qemu-kvm security, bug fix, and enhancement update | Qemu: net: e1000 infinite loop in start_xmit and e1000_receive_iov routines qemu-kvm: Out-of-bounds read when creating weird vga screen surface | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | null | null |
RHSA-2024:2077 | Red Hat Security Advisory: container-tools:rhel8 security and bug fix update | podman: Symlink error leads to information disclosure golang: golang.org/x/text/language: ParseAcceptLanguage takes a long time to parse complex tags buildah: full container escape at build time | [
"cpe:/a:redhat:rhel_eus:8.8::appstream"
] | null | 8.6 | null | null |
RHSA-2009:1617 | Red Hat Security Advisory: tomcat security update for Red Hat Network Satellite Server | tomcat request dispatcher information disclosure vulnerability tomcat6 Denial-Of-Service with AJP connection tomcat XML parser information disclosure | [
"cpe:/a:redhat:network_satellite:5.1::el4"
] | null | null | null | null |
RHSA-2004:404 | Red Hat Security Advisory: samba security update | security flaw | [
"cpe:/o:redhat:enterprise_linux:2.1::as",
"cpe:/o:redhat:enterprise_linux:2.1::aw",
"cpe:/o:redhat:enterprise_linux:2.1::es",
"cpe:/o:redhat:enterprise_linux:2.1::ws"
] | null | null | null | null |
RHSA-2022:0323 | Red Hat Security Advisory: nginx:1.20 security update | nginx: Off-by-one in ngx_resolver_copy() when labels are followed by a pointer to a root domain name | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 8.1 | null | null |
RHSA-2011:0017 | Red Hat Security Advisory: Red Hat Enterprise Linux 5.6 kernel security and bug fix update | kernel: drivers/net/cxgb3/cxgb3_main.c reading uninitialized stack memory kernel: net/tipc/socket.c: reading uninitialized stack memory kernel: ipc/shm.c: reading uninitialized stack memory kernel: ipc/compat*.c: reading uninitialized stack memory kernel: drivers/serial/serial_core.c: reading uninitialized stack memory kernel: drivers/sound/pci/rme9652/hdsp.c: reading uninitialized stack memory kernel: drivers/sound/pci/rme9652/hdspm.c: reading uninitialized stack memory kernel: socket filters infoleak kernel: Xen Dom0 crash with Windows 2008 R2 64bit DomU + GPLPV kernel: mm: mem allocated invisible to oom_kill() when not attached to any threads xen: 64-bit PV xen guest can crash host by accessing hypervisor per-domain memory area kernel: igb panics when receiving tag vlan packet kernel: bfa driver sysfs crash | [
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2013:0700 | Red Hat Security Advisory: jenkins security update | maven-wagon: all SSL certificate checking is disabled by default | [
"cpe:/a:redhat:openshift:1::el6"
] | null | null | null | null |
RHSA-2018:0273 | Red Hat Security Advisory: Red Hat Satellite 6 security, bug fix, and enhancement update | Twisted: sets environmental variable based on user supplied Proxy request header | [
"cpe:/a:redhat:satellite:6.1::el6",
"cpe:/a:redhat:satellite:6.2::el7",
"cpe:/a:redhat:satellite_capsule:6.1::el6",
"cpe:/a:redhat:satellite_capsule:6.2::el7"
] | null | null | 5 | null |
RHSA-2024:0664 | Red Hat Security Advisory: OpenShift Container Platform 4.12.49 bug fix update and security update | golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487) | [
"cpe:/a:redhat:openshift:4.12::el8",
"cpe:/a:redhat:openshift:4.12::el9"
] | null | 7.5 | null | null |
RHSA-2024:2905 | Red Hat Security Advisory: thunderbird security update | Mozilla: Arbitrary JavaScript execution in PDF.js Mozilla: IndexedDB files retained in private browsing mode Mozilla: Potential permissions request bypass via clickjacking Mozilla: Cross-origin responses could be distinguished between script and non-script content-types Mozilla: Use-after-free could occur when printing to PDF Mozilla: Memory safety bugs fixed in Firefox 126, Firefox ESR 115.11, and Thunderbird 115.11 | [
"cpe:/a:redhat:rhel_eus:8.8::appstream"
] | null | 6.1 | null | null |
RHSA-2013:0833 | Red Hat Security Advisory: JBoss Enterprise Application Platform 6.1.0 update | Web: jsessionid exposed via encoded url when using cookie based session tracking JBoss: custom authorization module implementations shared between applications apache-cxf: XML encryption backwards compatibility attacks openssl: DoS due to improper handling of OCSP response verification SSL/TLS: CBC padding timing attack (lucky-13) Installer: Generated auto-install xml is world readable tomcat: Session fixation in form authenticator | [
"cpe:/a:redhat:jboss_enterprise_application_platform:6.1"
] | null | null | null | null |
RHSA-2012:0544 | Red Hat Security Advisory: ImageMagick security update | ImageMagick: configuration files read from $CWD may allow arbitrary code execution ImageMagick: invalid validation of images denial of service ImageMagick: invalid validation of images denial of service ImageMagick: Out-of heap-based buffer read by processing crafted JPEG EXIF header tag value ImageMagick: excessive CPU use DoS by processing JPEG images with crafted restart markers ImageMagick: Out-of-bounds buffer read by copying image bytes for TIFF images with crafted TIFF EXIF IFD value | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2012:1384 | Red Hat Security Advisory: java-1.6.0-openjdk security update | OpenJDK: java.io.FilePermission information leak (Libraries, 6631398) OpenJDK: uninitialized Array JVM memory disclosure (Hotspot, 7198606) OpenJDK: RhinoScriptEngine security bypass (Scripting, 7143535) OpenJDK: Executors state handling issues (Concurrency, 7189103) OpenJDK: DescriptorSupport insufficient package access checks (JMX, 7192975) OpenJDK: AccessController.doPrivilegedWithCombiner() information disclosure (Security, 7172522) OpenJDK: LogManager security bypass (Libraries, 7169884) OpenJDK: RMIConnectionImpl information disclosure (JMX, 7169888) OpenJDK: SecureRandom mulitple seeders information disclosure (Security, 7167656) OpenJDK: ServiceLoader reject not subtype classes without instantiating (Libraries, 7195919) OpenJDK: JSSE denial of service (JSSE, 7186286) OpenJDK: DefaultFormatter insufficient data validation (Swing, 7195194) OpenJDK: disable Gopher support by default (Gopher, 7189567) OpenJDK: XMLDecoder sandbox restriction bypass (Beans, 7195917) OpenJDK: RMIConnectionImpl insufficient access control checks (JMX, 7198296) | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2020:3643 | Red Hat Security Advisory: thunderbird security update | Mozilla: Attacker-induced prompt for extension installation Mozilla: Use-After-Free when aborting an operation | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | 8.8 | null | null |
RHSA-2020:4766 | Red Hat Security Advisory: libexif security, bug fix, and enhancement update | libexif: out of bounds write in exif-data.c libexif: out of bounds read due to a missing bounds check in exif_data_save_data_entry function in exif-data.c libexif: integer overflow in exif_data_load_data_thumbnail function in exif-data.c libexif: out of bounds read due to a missing bounds check in exif_entry_get_value function in exif-entry.c libexif: integer overflow in exif_data_load_data_content function in exif-data.c libexif: divide-by-zero in exif_entry_get_value function in exif-entry.c libexif: use of uninitialized memory in EXIF Makernote handling can lead to crashes and use-after-free libexif: unrestricted size in handling Canon EXIF MakerNote data can lead to consumption of large amounts of compute time | [
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb"
] | null | 7.5 | null | null |
RHSA-2021:4628 | Red Hat Security Advisory: Openshift Logging 5.1.4 bug fix and security update | nodejs-handlebars: Remote code execution when compiling untrusted compile templates with strict:true option nodejs-handlebars: Remote code execution when compiling untrusted compile templates with compat:true option | [
"cpe:/a:redhat:logging:5.1::el8"
] | null | 9.8 | null | null |
RHSA-2016:0359 | Red Hat Security Advisory: chromium-browser security update | chromium-browser: same-origin bypass in Blink chromium-browser: same-origin bypass in Pepper Plugin chromium-browser: bad cast in Extensions chromium-browser: use-after-free in Blink chromium-browser: use-after-free in Blink chromium-browser: use-after-free in Blink chromium-browser: SRI Validation Bypass chromium-browser: information leak in Skia chromium-browser: WebAPI Bypass chromium-browser: use-after-free in WebRTC chromium-browser: origin confusion in Extensions UI chromium-browser: use-after-free in Favicon chromium-browser: various fixes from internal audits chromium-browser: Multiple unspecified vulnerabilities in V8 before 4.9.385.26 chromium-browser: LayoutBlock.cpp in Blink does not properly determine when anonymous block wrappers may exist chromium-browser: CSP implementation in Blink does not ignore a URL's path component in the case of a ServiceWorker fetch | [
"cpe:/a:redhat:rhel_extras:6"
] | null | null | null | null |
RHBA-2019:0764 | Red Hat Bug Fix Advisory: rhvm-appliance security update | python: Information Disclosure due to urlsplit improper NFKC normalization | [
"cpe:/o:redhat:enterprise_linux:7::hypervisor"
] | null | null | 9.8 | null |
RHSA-2015:0791 | Red Hat Security Advisory: Red Hat Enterprise Linux OpenStack Platform Installer update | openstack-puppet-modules: pacemaker configured with default password | [
"cpe:/a:redhat:openstack-installer:6::el7"
] | null | null | null | null |
RHSA-2014:0995 | Red Hat Security Advisory: Red Hat Enterprise Linux OpenStack Platform 3.0 Retirement Notice | This is the final notification for the retirement of Red Hat Enterprise
Linux OpenStack Platform 3.0. | [] | null | null | null | null |
RHSA-2018:2939 | Red Hat Security Advisory: Red Hat FIS 2.0 on Fuse 6.3.0 R8 security and bug fix update | tomcat: Remote Code Execution bypass for CVE-2017-12615 spring-security-oauth: remote code execution in the authorization process spring-framework: Possible RCE via spring messaging spring-framework: Directory traversal vulnerability with static resources on Windows filesystems spring-framework: Address partial fix for CVE-2018-1270 tomcat: Incorrect handling of empty string URL in security constraints can lead to unintended exposure of resources tomcat: Late application of security constraints can lead to resource exposure for unauthorised users tomcat: A bug in the UTF-8 decoder can lead to DoS jackson-databind: incomplete fix for CVE-2017-7525 permits unsafe serialization via c3p0 libraries | [
"cpe:/a:redhat:jboss_fuse:6.3"
] | null | null | 8.1 | null |
RHSA-2022:0822 | Red Hat Security Advisory: kernel-rt security update | kernel: improper initialization of the "flags" member of the new pipe_buffer | [
"cpe:/a:redhat:rhel_eus:8.4::nfv",
"cpe:/a:redhat:rhel_eus:8.4::realtime"
] | null | 7.8 | null | null |
RHEA-2022:5463 | Red Hat Enhancement Advisory: Red Hat Single Sign-On 7.6.0 update | liquibase: Improper Restriction of XML External Entity | [
"cpe:/a:redhat:red_hat_single_sign_on:7.6.0"
] | null | 7.3 | null | null |
RHSA-2021:3381 | Red Hat Security Advisory: kpatch-patch security update | kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c kernel: race condition for removal of the HCI controller | [
"cpe:/o:redhat:enterprise_linux:7::server"
] | null | 7 | null | null |
RHSA-2013:0833 | Red Hat Security Advisory: JBoss Enterprise Application Platform 6.1.0 update | Web: jsessionid exposed via encoded url when using cookie based session tracking JBoss: custom authorization module implementations shared between applications apache-cxf: XML encryption backwards compatibility attacks openssl: DoS due to improper handling of OCSP response verification SSL/TLS: CBC padding timing attack (lucky-13) Installer: Generated auto-install xml is world readable tomcat: Session fixation in form authenticator | [
"cpe:/a:redhat:jboss_enterprise_application_platform:6.1"
] | null | null | null | null |
RHSA-2024:7848 | Red Hat Security Advisory: openssl security update | openssl: SSL_select_next_proto buffer overread | [
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | null | 5.9 | null |
RHSA-2009:1140 | Red Hat Security Advisory: ruby security update | fetchmail/mutt/evolution/...: APOP password disclosure vulnerability ruby: Incorrect checks for validity of X.509 certificates ruby: DoS vulnerability in BigDecimal | [
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws",
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2017:1854 | Red Hat Security Advisory: pidgin security, bug fix, and enhancement update | pidgin: SSL/TLS plug-ins failed to check Basic Constraints pidgin: crash in Mxit protocol plug-in pidgin: denial of service parsing Groupwise server message pidgin: remote information leak via crafted XMPP message pidgin: Out-of-bounds write in purple_markup_unescape_entity triggered by invalid XML | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 7.5 | null |
RHSA-2024:1130 | Red Hat Security Advisory: openssh security update | ssh: Prefix truncation attack on Binary Packet Protocol (BPP) openssh: potential command injection via shell metacharacters | [
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/o:redhat:enterprise_linux:9::baseos"
] | null | 6.5 | null | null |
RHSA-2024:0843 | Red Hat Security Advisory: Release of OpenShift Serverless 1.31.1 | logback: A serialization vulnerability in logback receiver golang: net/http/internal: Denial of Service (DoS) via Resource Consumption via HTTP requests ssh: Prefix truncation attack on Binary Packet Protocol (BPP) go-git: Maliciously crafted Git server replies can cause DoS on go-git clients go-git: Maliciously crafted Git server replies can lead to path traversal and RCE on go-git clients | [
"cpe:/a:redhat:openshift_serverless:1.31::el8"
] | null | 8.1 | null | null |
RHSA-2014:0221 | Red Hat Security Advisory: postgresql92-postgresql security update | postgresql: SET ROLE without ADMIN OPTION allows adding and removing group members postgresql: privilege escalation via procedural language validator functions postgresql: CREATE INDEX race condition possibly leading to privilege escalation postgresql: stack-based buffer overflow in datetime input/output postgresql: integer overflows leading to buffer overflows postgresql: possible buffer overflow flaws postgresql: NULL pointer dereference postgresql: multiple integer overflows in hstore_io.c | [
"cpe:/a:redhat:rhel_software_collections:1::el6"
] | null | null | null | null |
RHSA-2011:0180 | Red Hat Security Advisory: pango security update | pango: Heap-based buffer overflow by rendering glyph box for certain FT_Bitmap objects | [
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws",
"cpe:/o:redhat:enterprise_linux:5::server",
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2020:0734 | Red Hat Security Advisory: Red Hat OpenShift Service Mesh 1.0.9 servicemesh-proxy security update | envoy: Excessive CPU and/or memory usage when proxying HTTP/1.1 envoy: TLS inspector bypassc envoy: Response flooding for HTTP/1.1 envoy: Incorrect Access Control when using SDS with Combined Validation Context | [
"cpe:/a:redhat:service_mesh:1.0::el8"
] | null | 7.3 | null | null |
RHSA-2017:0320 | Red Hat Security Advisory: CFME 5.7.1 bug fixes and enhancement update | rubygem-i18n: cross-site scripting flaw in exception handling cfme: tenant administrator can create a group with higher permissions | [
"cpe:/a:redhat:cloudforms_managementengine:5.7::el7"
] | null | null | 4.9 | null |
RHSA-2017:0337 | Red Hat Security Advisory: java-1.7.0-ibm security update | SSL/TLS: Birthday attack against 64-bit block ciphers (SWEET32) OpenJDK: incorrect ECDSA signature extraction from the DER input (Libraries, 8168714) OpenJDK: missing ObjectIdentifier length check (Libraries, 8168705) OpenJDK: DSA implementation timing attack (Libraries, 8168728) OpenJDK: ECDSA implementation timing attack (Libraries, 8168724) OpenJDK: incorrect URL parsing in URLStreamHandler (Networking, 8167223) OpenJDK: URLClassLoader insufficient access control checks (Networking, 8151934) OpenJDK: untrusted input deserialization in RMI registry and DCG (RMI, 8156802) OpenJDK: LdapLoginModule incorrect userDN extraction (JAAS, 8161743) OpenJDK: imageio PNGImageReader failed to honor ignoreMetadata for iTXt and zTXt chunks (2D, 8166988) JDK: unspecified vulnerability fixed in 6u141, 7u131, and 8u121 (Deployment) OpenJDK: integer overflow in SocketOutputStream boundary check (Networking, 8164147) OpenJDK: insufficient protected field access checks in atomic field updaters (Libraries, 8165344) OpenJDK: insecure class construction (Hotspot, 8167104) | [
"cpe:/a:redhat:rhel_extras:5::client",
"cpe:/a:redhat:rhel_extras:5::server"
] | null | null | 8.8 | null |
RHSA-2021:4325 | Red Hat Security Advisory: lasso security and enhancement update | lasso: XML signature wrapping vulnerability when parsing SAML responses | [
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb"
] | null | 8.8 | null | null |
RHSA-2022:4913 | Red Hat Security Advisory: rh-postgresql10-postgresql security update | postgresql: Autovacuum, REINDEX, and others omit "security restricted operation" sandbox | [
"cpe:/a:redhat:rhel_software_collections:3::el7"
] | null | 8.8 | null | null |
RHSA-2021:0152 | Red Hat Security Advisory: dnsmasq security update | dnsmasq: heap-based buffer overflow in sort_rrset() when DNSSEC is enabled dnsmasq: buffer overflow in extract_name() due to missing length check when DNSSEC is enabled dnsmasq: heap-based buffer overflow with large memcpy in get_rdata() when DNSSEC is enabled dnsmasq: loose address/port check in reply_query() makes forging replies easier for an off-path attacker dnsmasq: loose query name check in reply_query() makes forging replies easier for an off-path attacker dnsmasq: multiple queries forwarded for the same name makes forging replies easier for an off-path attacker dnsmasq: heap-based buffer overflow with large memcpy in sort_rrset() when DNSSEC is enabled | [
"cpe:/a:redhat:rhel_eus:8.1::appstream"
] | null | 5.9 | null | null |
RHSA-2016:0082 | Red Hat Security Advisory: qemu-kvm security update | Qemu: nvram: OOB r/w access in processing firmware configurations | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2023:2710 | Red Hat Security Advisory: Red Hat Single Sign-On 7.6.3 for OpenShift image security update | okhttp: information disclosure via improperly used cryptographic function undertow: Server identity in https connection is not checked by the undertow client snakeyaml: Uncaught exception in java.base/java.util.ArrayList.hashCode dev-java/snakeyaml: DoS via stack overflow codec-haproxy: HAProxyMessageDecoder Stack Exhaustion DoS apache-james-mime4j: Temporary File Information Disclosure in MIME4J TempFileStorageProvider RESTEasy: creation of insecure temp files | [
"cpe:/a:redhat:rhosemc:1.0::el8"
] | null | 5.3 | null | null |
RHSA-2009:1601 | Red Hat Security Advisory: kdelibs security update | array index error in dtoa implementation of many products | [
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws",
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2024:3088 | Red Hat Security Advisory: gstreamer1-plugins-base security update | gstreamer-plugins-base: heap overwrite in subtitle parsing | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 5.5 | null | null |
RHSA-2021:2725 | Red Hat Security Advisory: kernel security and bug fix update | kernel: use-after-free in show_numa_stats function kernel: mishandles invalid descriptors in drivers/media/usb/gspca/xirlink_cit.c kernel: use-after-free in cipso_v4_genopt in net/ipv4/cipso_ipv4.c kernel: use-after-free in net/bluetooth/hci_event.c when destroying an hci_chan kernel: size_t-to-int conversion vulnerability in the filesystem layer | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 6.7 | null | null |
RHSA-2017:1546 | Red Hat Security Advisory: Red Hat OpenStack Platform director security update | rhosp-director: libvirtd is deployed with no authentication | [
"cpe:/a:redhat:openstack-director:8::el7"
] | null | null | 9.9 | null |
RHSA-2022:4692 | Red Hat Security Advisory: Red Hat OpenShift GitOps security update | argocd: Symlink following allows leaking out-of-bound manifests and JSON files from Argo CD repo-server argocd: Login screen allows message spoofing if SSO is enabled argocd: ArgoCD will blindly trust JWT claims if anonymous access is enabled | [
"cpe:/a:redhat:openshift_gitops:1.4::el8"
] | null | 10 | null | null |
RHSA-2012:0469 | Red Hat Security Advisory: acroread security update | acroread: multiple unspecified flaws (APSB12-08, APSB12-01) acroread: multiple unspecified flaws (APSB12-08, APSB12-01) acroread: multiple unspecified flaws (APSB12-08, APSB12-01) acroread: multiple unspecified flaws (APSB12-08, APSB12-01) acroread: multiple unspecified flaws (APSB12-08, APSB12-01) acroread: multiple unspecified flaws (APSB12-08, APSB12-01) acroread: multiple unspecified flaws (APSB12-08, APSB12-01) | [
"cpe:/a:redhat:rhel_extras:5::client",
"cpe:/a:redhat:rhel_extras:5::server",
"cpe:/a:redhat:rhel_extras:6"
] | null | null | null | null |
RHSA-2012:1491 | Red Hat Security Advisory: kernel-rt security and bug fix update | kernel: uts: stack memory leak in UNAME26 kernel: use after free bug in "quota" handling kernel: udf: buffer overflow when parsing sparing table kernel: recv{from,msg}() on an rds socket can leak kernel memory kernel: mm: use-after-free in madvise_remove() kernel: af_netlink: invalid handling of SCM_CREDENTIALS passing kernel: ext4: AIO vs fallocate stale data exposure kernel: net: divide by zero in tcp algorithm illinois | [
"cpe:/a:redhat:enterprise_mrg:2:server:el6"
] | null | null | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.