id
stringlengths 13
15
| title
stringlengths 29
176
| description
stringlengths 8
32.1k
| cpes
sequencelengths 0
20
| cvss_v4_0
null | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
null |
---|---|---|---|---|---|---|---|
RHSA-2023:4898 | Red Hat Security Advisory: OpenShift Container Platform 4.10.67 security update | kube-apiserver: PrivEsc | [
"cpe:/a:redhat:openshift:4.10::el7",
"cpe:/a:redhat:openshift:4.10::el8"
] | null | 8 | null | null |
RHSA-2013:0579 | Red Hat Security Advisory: rhev-hypervisor6 security, bug fix, and enhancement update | libvirt+dnsmasq: DNS configured to answer DNS queries from non-virtual networks kernel: block: default SCSI command filter does not accomodate commands overlap across device classes kernel: vhost: fix length for cross region descriptor | [
"cpe:/o:redhat:enterprise_linux:6::hypervisor"
] | null | null | null | null |
RHSA-2022:0162 | Red Hat Security Advisory: gegl security update | gegl: shell expansion via a crafted pathname | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 7.8 | null | null |
RHSA-2007:0640 | Red Hat Security Advisory: conga security, bug fix, and enhancement update | ricci is vulnerable to a connect DoS attack | [
"cpe:/a:redhat:rhel_cluster:5"
] | null | null | null | null |
RHSA-2010:0040 | Red Hat Security Advisory: php security update | php: exif_read_data crash on corrupted JPEG files php: openssl extension: Incorrect verification of SSL certificate with NUL in name php: exif extension: Multiple missing sanity checks in EXIF file processing gd: insufficient input validation in _gdGetColors() PHP: resource exhaustion attack via upload requests with lots of files php: htmlspecialchars() insufficient checking of input for multi-byte encodings | [
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws",
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2024:4739 | Red Hat Security Advisory: tpm2-tss security update | tpm2-tss: Buffer Overlow in TSS2_RC_Decode | [
"cpe:/o:redhat:rhel_eus:8.8::baseos"
] | null | 6.4 | null | null |
RHSA-2021:4408 | Red Hat Security Advisory: libsolv security and bug fix update | libsolv: heap-based buffer overflow in testcase_read() in src/testcase.c | [
"cpe:/a:redhat:enterprise_linux:8::crb",
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 3.3 | null | null |
RHSA-2018:3006 | Red Hat Security Advisory: firefox security update | Mozilla: Memory safety bugs fixed in Firefox ESR 60.3 Mozilla: Memory safety bugs fixed in Firefox 63 and Firefox ESR 60.3 Mozilla: Crash with nested event loops Mozilla: Integer overflow during Unicode conversion while loading JavaScript Mozilla: WebExtension bypass of domain restrictions through header rewriting Mozilla: WebExtension content scripts can execute in disallowed contexts Mozilla: WebExtension local file permission check bypass | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | 7.1 | null |
RHSA-2024:1643 | Red Hat Security Advisory: .NET 7.0 security update | dotnet: Denial of Service in X509Certificate2 | [
"cpe:/a:redhat:rhel_eus:9.2::appstream",
"cpe:/a:redhat:rhel_eus:9.2::crb"
] | null | 7.5 | null | null |
RHSA-2015:0094 | Red Hat Security Advisory: flash-plugin security update | flash-plugin: Vulnerability that could be used to circumvent memory randomization mitigations (APSB15-02) flash-plugin: multiple critical vulnerabilities (APSA15-01)(APSB15-03) flash-plugin: multiple critical vulnerabilities (APSA15-01)(APSB15-03) | [
"cpe:/a:redhat:rhel_extras:5::client",
"cpe:/a:redhat:rhel_extras:5::server",
"cpe:/a:redhat:rhel_extras:6"
] | null | null | null | null |
RHSA-2021:4596 | Red Hat Security Advisory: binutils security update | environment: Unicode's bidirectional (BiDi) override characters can cause trojan source attacks | [
"cpe:/a:redhat:rhel_eus:8.4::appstream",
"cpe:/o:redhat:rhel_eus:8.4::baseos"
] | null | 8.5 | null | null |
RHSA-2009:1461 | Red Hat Security Advisory: Red Hat Application Stack v2.4 security and enhancement update | mysql: mysql command line client XSS flaw MySQL: Format string vulnerability by manipulation with database instances (crash) php: exif_read_data crash on corrupted JPEG files httpd: NULL pointer defer in mod_proxy_ftp caused by crafted EPSV and PASV reply httpd: mod_proxy_ftp FTP command injection via Authorization HTTP header postgresql: authenticated user server DoS via plugin re-LOAD-ing postgresql: SQL privilege escalation, incomplete fix for CVE-2007-6600 postgresql: LDAP authentication bypass when anonymous LDAP bind are allowed | [
"cpe:/a:redhat:rhel_application_stack:2"
] | null | null | null | null |
RHSA-2024:2447 | Red Hat Security Advisory: openssl and openssl-fips-provider security update | openssl: AES-SIV cipher implementation contains a bug that causes it to ignore empty associated data entries openssl: Excessive time spent checking DH keys and parameters OpenSSL: Excessive time spent checking DH q parameter value openssl: Generating excessively long X9.42 DH keys or checking excessively long X9.42 DH keys or parameters may be very slow openssl: POLY1305 MAC implementation corrupts vector registers on PowerPC openssl: Excessive time spent checking invalid RSA public keys openssl: denial of service via null dereference | [
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/o:redhat:enterprise_linux:9::baseos"
] | null | 5.5 | null | null |
RHSA-2017:1364 | Red Hat Security Advisory: nss security and bug fix update | nss: Null pointer dereference when handling empty SSLv2 messages | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | 7.5 | null |
RHSA-2025:4028 | Red Hat Security Advisory: thunderbird security update | firefox: thunderbird: Use-after-free triggered by XSLTProcessor firefox: thunderbird: URL Bar Spoofing via non-BMP Unicode characters firefox: thunderbird: Memory safety bugs fixed in Firefox 137, Thunderbird 137, Firefox ESR 128.9, and Thunderbird 128.9 | [
"cpe:/a:redhat:rhel_e4s:9.0::appstream"
] | null | 8.8 | null | null |
RHSA-2015:0696 | Red Hat Security Advisory: freetype security update | freetype: off-by-one buffer over-read in tt_face_load_hdmx() freetype: buffer over-read and integer underflow in tt_face_load_kern() freetype: missing ENDCHAR NULL pointer dereference in the _bdf_parse_glyphs() freetype: out of bounds read in Type42 font parser freetype: out-of-bounds read in tt_cmap4_validate() freetype: off-by-one buffer over-read in parse_charstrings() / t42_parse_charstrings() freetype: integer overflow in tt_face_load_font_dir() leading to out-of-bounds read freetype: multiple integer overflows leading to buffer over-reads in cmap handling freetype: integer overflow in pcf_get_encodings() leading to NULL pointer dereference freetype: integer overflow in pcf_get_properties() leading to NULL pointer dereference freetype: integer signedness error in Mac_Read_POST_Resource() leading to heap-based buffer overflow freetype: multiple integer overflows Mac_Read_POST_Resource() leading to heap-based buffer overflows freetype: information leak in _bdf_add_property() | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation",
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | null | null |
RHSA-2013:0569 | Red Hat Security Advisory: JBoss Web Services security update | jbossws: Prone to character encoding pattern attack (XML Encryption flaw) | [
"cpe:/a:redhat:jboss_enterprise_portal_platform:4.3.0:update7",
"cpe:/a:redhat:jboss_enterprise_soa_platform:4.3.0:update5"
] | null | null | null | null |
RHSA-2017:2801 | Red Hat Security Advisory: kernel security update | kernel: load_elf_ binary() does not take account of the need to allocate sufficient space for the entire binary | [
"cpe:/o:redhat:rhel_els:5"
] | null | null | 7.8 | null |
RHSA-2018:3470 | Red Hat Security Advisory: Red Hat Virtualization security and bug fix update | samba: Insufficient input validation in libsmbclient spice: Missing check in demarshal.py:write_validate_array_item() allows for buffer overflow and denial of service glusterfs: Unsanitized file names in debug/io-stats translator can allow remote attackers to execute arbitrary code glusterfs: Stack-based buffer overflow in server-rpc-fops.c allows remote attackers to execute arbitrary code glusterfs: Improper deserialization in dict.c:dict_unserialize() can allow attackers to read arbitrary memory glusterfs: Information Exposure in posix_get_file_contents function in posix-helpers.c glusterfs: remote denial of service of gluster volumes via posix_get_file_contents function in posix-helpers.c glusterfs: I/O to arbitrary devices on storage server glusterfs: Device files can be created in arbitrary locations glusterfs: File status information leak and denial of service glusterfs: Improper resolution of symlinks allows for privilege escalation glusterfs: Arbitrary file creation on storage server allows for execution of arbitrary code glusterfs: Files can be renamed outside volume glusterfs: Buffer overflow in "features/locks" translator allows for denial of service glusterfs: Heap-based buffer overflow via "gf_getspec_req" RPC message glusterfs: "features/index" translator can create arbitrary, empty files glusterfs: Unlimited file creation via "GF_XATTR_IOSTATS_DUMP_KEY" xattr allows for denial of service glusterfs: Repeat use of "GF_META_LOCK_KEY" xattr allows for memory exhaustion glusterfs: features/locks translator passes an user-controlled string to snprintf without a proper format string resulting in a denial of service python-paramiko: Authentication bypass in auth_handler.py | [
"cpe:/o:redhat:enterprise_linux:7::hypervisor"
] | null | null | 9.8 | null |
RHSA-2023:5928 | Red Hat Security Advisory: tomcat security update | HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack) | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 7.5 | null | null |
RHSA-2017:0293 | Red Hat Security Advisory: kernel security update | kernel: use after free in dccp protocol | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | 7.8 | null |
RHSA-2024:4633 | Red Hat Security Advisory: 389-ds-base security update | 389-ds-base: a heap overflow leading to denail-of-servce while writing a value larger than 256 chars (in log_entry_attr) 389-ds-base: Malformed userPassword may cause crash at do_modify in slapd/modify.c 389-ds-base: potential denial of service via specially crafted kerberos AS-REQ request 389-ds-base: Malformed userPassword hash may cause Denial of Service | [
"cpe:/a:redhat:rhel_eus:9.2::appstream"
] | null | 5.7 | null | null |
RHSA-2024:4937 | Red Hat Security Advisory: varnish:6 security update | varnish: HTTP/2 Broken Window Attack may result in denial of service | [
"cpe:/a:redhat:rhel_aus:8.2::appstream"
] | null | 7.5 | null | null |
RHSA-2004:404 | Red Hat Security Advisory: samba security update | security flaw | [
"cpe:/o:redhat:enterprise_linux:2.1::as",
"cpe:/o:redhat:enterprise_linux:2.1::aw",
"cpe:/o:redhat:enterprise_linux:2.1::es",
"cpe:/o:redhat:enterprise_linux:2.1::ws"
] | null | null | null | null |
RHSA-2004:190 | Red Hat Security Advisory: cvs security update | security flaw | [
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws"
] | null | null | null | null |
RHSA-2018:2393 | Red Hat Security Advisory: kernel security update | Kernel: hw: cpu: L1 terminal fault (L1TF) Kernel: hw: cpu: L1 terminal fault (L1TF) kernel: kvm: vmx: host GDT limit corruption | [
"cpe:/o:redhat:rhel_aus:6.5::server"
] | null | null | 7.8 | null |
RHSA-2014:1973 | Red Hat Security Advisory: Red Hat JBoss Portal 6.1.1 security update | RichFaces: Cross-site scripting due to incomplete URL sanitization | [
"cpe:/a:redhat:jboss_enterprise_portal_platform:6.1.1"
] | null | null | null | null |
RHSA-2025:0885 | Red Hat Security Advisory: rsync security update | rsync: Info Leak via Uninitialized Stack Contents | [
"cpe:/o:redhat:rhel_aus:8.4::baseos",
"cpe:/o:redhat:rhel_e4s:8.4::baseos",
"cpe:/o:redhat:rhel_tus:8.4::baseos"
] | null | 7.5 | null | null |
RHSA-2009:0308 | Red Hat Security Advisory: cups security update | cups-CVE-2008-3640.patch has been corrupted. | [
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws"
] | null | null | null | null |
RHSA-2020:0463 | Red Hat Security Advisory: OpenShift Container Platform 4.2.18 ose-installer-container security update | openshift/installer: kubeconfig and kubeadmin-password are created with word-readable permissions | [
"cpe:/a:redhat:openshift:4.2::el7"
] | null | null | 4.4 | null |
RHSA-2018:1632 | Red Hat Security Advisory: libvirt security update | hw: cpu: speculative store bypass | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 5.6 | null |
RHSA-2007:1129 | Red Hat Security Advisory: autofs5 security update | autofs defaults don't restrict suid in /net | [
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2022:7261 | Red Hat Security Advisory: OpenShift API for Data Protection (OADP) 1.0.5 security and bug fix update | prometheus/client_golang: Denial of service using InstrumentHandlerCounter | [
"cpe:/a:redhat:openshift_api_data_protection:1.0::el8"
] | null | 7.5 | null | null |
RHSA-2015:1890 | Red Hat Security Advisory: spice security update | spice: insufficient validation of surface_id parameter can cause crash spice: host memory access from guest using crafted images | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | null | null |
RHSA-2025:2502 | Red Hat Security Advisory: tigervnc security update | X.Org: Xwayland: Use-after-free of the root cursor Xorg: xwayland: Buffer overflow in XkbVModMaskText() xorg: xwayland: Heap overflow in XkbWriteKeySyms() xorg: xwayland: Buffer overflow in XkbChangeTypesOfKey() xorg: xwayland: Out-of-bounds write in CreatePointerBarrierClient() xorg: xwayland: Use of uninitialized pointer in compRedirectWindow() xorg: xwayland: Use-after-free in PlayReleasedEvents() xorg: xwayland: Use-after-free in SyncInitTrigger() | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 7.8 | null | null |
RHSA-2023:7823 | Red Hat Security Advisory: OpenShift Container Platform 4.12.46 bug fix and security update | golang.org/x/net/http2: avoid quadratic complexity in HPACK decoding golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487) | [
"cpe:/a:redhat:openshift:4.12::el8",
"cpe:/a:redhat:openshift:4.12::el9"
] | null | 7.5 | null | null |
RHSA-2023:6130 | Red Hat Security Advisory: OpenShift Container Platform 4.13.19 bug fix and security update | OpenShift: modification of node role labels golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487) | [
"cpe:/a:redhat:openshift:4.13::el8",
"cpe:/a:redhat:openshift:4.13::el9"
] | null | 7.5 | null | null |
RHSA-2021:0526 | Red Hat Security Advisory: kernel security and bug fix update | kernel: umask not applied on filesystem without ACL support kernel: TOCTOU mismatch in the NFS client code | [
"cpe:/o:redhat:rhel_eus:7.7::computenode",
"cpe:/o:redhat:rhel_eus:7.7::server"
] | null | 7 | null | null |
RHSA-2006:0207 | Red Hat Security Advisory: gnutls security update | - libtasn1 buffer overflow | [
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2013:0208 | Red Hat Security Advisory: openstack-nova security and bug fix update | Nova: Information leak in libvirt LVM-backed instances openstack-nova: Boot from volume allows access to random volumes | [
"cpe:/a:redhat:openstack:2::el6"
] | null | null | null | null |
RHSA-2007:0709 | Red Hat Security Advisory: wireshark security and bug fix update | Wireshark crashes when inspecting HTTP traffic Wireshark crashes when inspecting iSeries traffic Wireshark loops infinitely when inspecting DCP ETSI traffic Wireshark crashes when inspecting MMS traffic Wireshark corrupts the stack when inspecting BOOTP traffic | [
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2003:048 | Red Hat Security Advisory: python security update | security flaw | [
"cpe:/o:redhat:enterprise_linux:2.1::as",
"cpe:/o:redhat:enterprise_linux:2.1::aw"
] | null | null | null | null |
RHSA-2018:3598 | Red Hat Security Advisory: OpenShift Container Platform 3.6 security update | kubernetes: authentication/authorization bypass in the handling of non-101 responses | [
"cpe:/a:redhat:openshift:3.6::el7"
] | null | null | 9.8 | null |
RHSA-2021:4368 | Red Hat Security Advisory: openssh security update | openssh: Observable discrepancy leading to an information leak in the algorithm negotiation | [
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 5.9 | null | null |
RHSA-2003:093 | Red Hat Security Advisory: : Updated MySQL packages fix vulnerabilities | security flaw security flaw | [
"cpe:/o:redhat:linux:7.1",
"cpe:/o:redhat:linux:7.2",
"cpe:/o:redhat:linux:7.3",
"cpe:/o:redhat:linux:8.0",
"cpe:/o:redhat:linux:9"
] | null | null | null | null |
RHSA-2024:1946 | Red Hat Security Advisory: Red Hat OpenShift Service Mesh Containers for 2.5.1 security update | follow-redirects: Improper Input Validation due to the improper handling of URLs by the url.parse() golang-protobuf: encoding/protojson, internal/encoding/json: infinite loop in protojson.Unmarshal when unmarshaling certain forms of invalid JSON jose-go: improper handling of highly compressed data follow-redirects: Possible credential leak | [
"cpe:/a:redhat:service_mesh:2.5::el8"
] | null | 6.5 | null | null |
RHSA-2024:1892 | Red Hat Security Advisory: OpenShift Container Platform 4.15.10 packages and security update | golang: net/http, x/net/http2: unlimited number of CONTINUATION frames causes DoS | [
"cpe:/a:redhat:openshift:4.15::el8",
"cpe:/a:redhat:openshift:4.15::el9",
"cpe:/a:redhat:openshift_ironic:4.15::el9"
] | null | 7.5 | null | null |
RHSA-2017:2709 | Red Hat Security Advisory: Red Hat JBoss Core Services security update | httpd: ap_some_auth_required() does not properly indicate authenticated request in 2.4 SSL/TLS: Birthday attack against 64-bit block ciphers (SWEET32) httpd: Uninitialized memory reflection in mod_auth_digest | [
"cpe:/a:redhat:jboss_core_services:1::el7"
] | null | null | 4.8 | null |
RHSA-2023:7544 | Red Hat Security Advisory: libxml2 security update | libxml2: crafted xml can cause global buffer overflow | [
"cpe:/a:redhat:rhel_eus:8.8::appstream",
"cpe:/o:redhat:rhel_eus:8.8::baseos"
] | null | 6.5 | null | null |
RHSA-2011:0336 | Red Hat Security Advisory: tomcat5 security update | JDK Double.parseDouble Denial-Of-Service | [
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHBA-2019:2581 | Red Hat Bug Fix Advisory: OpenShift Container Platform 3.11 images update | SSL/TLS: Birthday attack against 64-bit block ciphers (SWEET32) | [
"cpe:/a:redhat:openshift:3.11::el7"
] | null | null | 7.5 | null |
RHSA-2024:11001 | Red Hat Security Advisory: ruby:2.5 security update | rexml: REXML ReDoS vulnerability | [
"cpe:/a:redhat:rhel_eus:8.8::appstream"
] | null | 7.5 | null | null |
RHSA-2025:3024 | Red Hat Security Advisory: kernel-rt security update | kernel: can: bcm: Fix UAF in bcm_proc_show() | [
"cpe:/a:redhat:rhel_eus:9.2::nfv",
"cpe:/a:redhat:rhel_eus:9.2::realtime"
] | null | 7.8 | null | null |
RHSA-2009:1585 | Red Hat Security Advisory: samba3x security and bug fix update | Samba improper file access Samba: Share restriction bypass via home-less directory user account(s) samba: infinite loop flaw in smbd on unexpected oplock break notification reply samba: information disclosure in suid mount.cifs | [
"cpe:/a:redhat:rhel_extras:5::client",
"cpe:/a:redhat:rhel_extras:5::server"
] | null | null | null | null |
RHSA-2003:342 | Red Hat Security Advisory: : Updated EPIC packages fix security vulnerability | security flaw | [
"cpe:/o:redhat:linux:7.3",
"cpe:/o:redhat:linux:8.0",
"cpe:/o:redhat:linux:9"
] | null | null | null | null |
RHSA-2024:6987 | Red Hat Security Advisory: emacs security update | emacs: Gnus treats inline MIME contents as trusted emacs: Org mode considers contents of remote files to be trusted emacs: org-link-expand-abbrev: Do not evaluate arbitrary unsafe Elisp code | [
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 7.8 | null | null |
RHSA-2017:2247 | Red Hat Security Advisory: tomcat security, bug fix, and enhancement update | tomcat: timing attack in Realm implementation tomcat: security manager bypass via IntrospectHelper utility function tomcat: system property disclosure tomcat: security manager bypass via JSP Servlet config parameters tomcat: unrestricted access to global resources | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 3.7 | null |
RHSA-2024:5532 | Red Hat Security Advisory: python3.11-setuptools security update | pypa/setuptools: Remote code execution via download functions in the package_index module in pypa/setuptools | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 8.8 | null | null |
RHSA-2024:6569 | Red Hat Security Advisory: 389-ds:1.4 security update | 389-ds-base: Malformed userPassword hash may cause Denial of Service | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 5.7 | null | null |
RHSA-2022:5698 | Red Hat Security Advisory: java-1.8.0-openjdk security, bug fix, and enhancement update | OpenJDK: class compilation issue (Hotspot, 8281859) OpenJDK: improper restriction of MethodHandle.invokeBasic() (Hotspot, 8281866) OpenJDK: integer truncation issue in Xalan-J (JAXP, 8285407) | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 7.5 | null | null |
RHSA-2022:0896 | Red Hat Security Advisory: glibc security update | glibc: Off-by-one buffer overflow/underflow in getcwd() glibc: Stack-based buffer overflow in svcunix_create via long pathnames glibc: Stack-based buffer overflow in sunrpc clnt_create via a long pathname | [
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb",
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 7 | null | null |
RHSA-2024:0464 | Red Hat Security Advisory: python-urllib3 security update | python-urllib3: Cookie request header isn't stripped during cross-origin redirects urllib3: Request body not stripped after redirect from 303 status changes request method to GET | [
"cpe:/o:redhat:enterprise_linux:9::baseos"
] | null | 4.2 | null | null |
RHSA-2014:1121 | Red Hat Security Advisory: openstack-keystone security and bug fix update | openstack-keystone: revocation events are broken with mysql openstack-keystone: token expiration date stored incorrectly openstack-keystone: domain-scoped tokens don't get revoked | [
"cpe:/a:redhat:openstack:5::el7"
] | null | null | null | null |
RHSA-2011:0407 | Red Hat Security Advisory: logrotate security update | logrotate: TOCTOU race condition by creation of new files (between opening the file and moment, final permissions have been applied) [information disclosure] logrotate: Shell command injection by using the shred configuration directive logrotate: DoS due improper escaping of file names within 'write state' action | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2007:0963 | Red Hat Security Advisory: java-1.5.0-sun security update | Security Vulnerability in Java Runtime Environment With Applet Caching Vulnerabilities in Java Web Start allow to determine the location of the Java Web Start cache Untrusted Application or Applet May Move or Copy Arbitrary Files Applets or Applications are allowed to display an oversized window Anti-DNS Pinning and Java Applets with HTTP proxy Anti-DNS Pinning and Java Applets with Opera and Firefox java-jre: Applet Privilege Escalation | [
"cpe:/a:redhat:rhel_extras:4",
"cpe:/a:redhat:rhel_extras:5::client",
"cpe:/a:redhat:rhel_extras:5::server"
] | null | null | null | null |
RHSA-2024:1750 | Red Hat Security Advisory: unbound security update | unbound: unrestricted reconfiguration enabled to anyone that may lead to local privilege escalation | [
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::crb"
] | null | 8 | null | null |
RHSA-2017:1840 | Red Hat Security Advisory: devtoolset-4-jackson-databind security update | jackson-databind: Deserialization vulnerability via readValue method of ObjectMapper | [
"cpe:/a:redhat:rhel_software_collections:2::el6",
"cpe:/a:redhat:rhel_software_collections:2::el7"
] | null | null | 8.1 | null |
RHSA-2025:0209 | Red Hat Security Advisory: dpdk security update | dpdk: Denial Of Service from malicious guest on hypervisors using DPDK Vhost library | [
"cpe:/a:redhat:rhel_eus:9.4::appstream"
] | null | null | 7.4 | null |
RHSA-2024:1060 | Red Hat Security Advisory: python-pillow security update | pillow: Arbitrary Code Execution via the environment parameter | [
"cpe:/a:redhat:rhel_aus:8.4::appstream",
"cpe:/a:redhat:rhel_e4s:8.4::appstream",
"cpe:/a:redhat:rhel_tus:8.4::appstream"
] | null | 8.1 | null | null |
RHSA-2018:2172 | Red Hat Security Advisory: kernel security update | kernel: Divide-by-zero in __tcp_select_window hw: cpu: speculative store bypass | [
"cpe:/o:redhat:rhel_els:5"
] | null | null | 5.6 | null |
RHSA-2015:1627 | Red Hat Security Advisory: glibc security update | glibc: Invalid-free when using getaddrinfo() | [
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2020:3915 | Red Hat Security Advisory: libssh2 security update | libssh2: integer overflow in SSH_MSG_DISCONNECT logic in packet.c | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 6.5 | null |
RHSA-2024:2782 | Red Hat Security Advisory: OpenShift Container Platform 4.12.57 security update | osin: manipulation of the argument secret leads to observable timing discrepancy golang: net/http, x/net/http2: unlimited number of CONTINUATION frames causes DoS cluster-monitoring-operator: credentials leak ironic-image: Unauthenticated local access to Ironic API | [
"cpe:/a:redhat:openshift:4.12::el8",
"cpe:/a:redhat:openshift:4.12::el9"
] | null | 4.7 | null | null |
RHSA-2022:1821 | Red Hat Security Advisory: python27:2.7 security update | python: urllib: Regular expression DoS in AbstractBasicAuthHandler python: urllib: HTTP client possible infinite loop on a 100 Continue response python: ftplib should not use the host from the PASV response python-lxml: HTML Cleaner allows crafted and SVG embedded scripts to pass through python: urllib.parse does not sanitize URLs containing ASCII newline and tabs | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 5.3 | null | null |
RHSA-2009:1671 | Red Hat Security Advisory: kernel security and bug fix update | kernel: x86_64 32 bit process register leak kernel: flood ping cause out-of-iommu error and panic when mtu larger than 1500 kernel: r128 IOCTL NULL pointer dereferences when CCE state is uninitialised kernel: AF_UNIX: Fix deadlock on connecting to shutdown socket | [
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2020:0229 | Red Hat Security Advisory: sqlite security update | sqlite: fts3: improve shadow table corruption detection | [
"cpe:/a:redhat:rhel_e4s:8.0::appstream",
"cpe:/o:redhat:rhel_e4s:8.0::baseos"
] | null | 8.8 | null | null |
RHSA-2021:1852 | Red Hat Security Advisory: ghostscript security, bug fix, and enhancement update | ghostscript: use-after-free vulnerability in igc_reloc_struct_ptr() could result in DoS ghostscript: buffer overflow in lprn_is_black() in contrib/lips4/gdevlprn.c could result in a DoS ghostscript: buffer overflow in pj_common_print_page() in devices/gdevpjet.c could result in a DoS ghostscript: buffer overflow in cif_print_page() in devices/gdevcif.c could result in a DoS ghostscript: buffer overflow in jetp3852_print_page() in devices/gdev3852.c could result in a DoS ghostscript: buffer overflow in contrib/gdevdj9.c could result in a DoS ghostscript: buffer overflow in mj_raster_cmd() in contrib/japanese/gdevmjc.c could result in a DoS ghostscript: NULL pointer dereference in compose_group_nonknockout_nonblend_isolated_allmask_common() in base/gxblend.c could result in a DoS ghostscript: buffer overflow in epsc_print_page() in devices/gdevepsc.c could result in a DoS ghostscript: NULL pointer dereference in clj_media_size() in devices/gdevclj.c could result in a DoS ghostscript: buffer overflow in GetNumWrongData() in contrib/lips4/gdevlips.c could result in a DoS ghostscript: buffer overflow in FloydSteinbergDitheringC() in contrib/gdevbjca.c could result in a DoS ghostscript: buffer overflow in mj_color_correct() in contrib/japanese/gdevmjc.c could result in a DoS ghostscript: division by zero in bj10v_print_page() in contrib/japanese/gdev10v.c could result in a DoS ghostscript: buffer overflow in tiff12_print_page() in devices/gdevtfnx.c could result in a DoS ghostscript: buffer overflow in okiibm_print_page1() in devices/gdevokii.c could result in a DoS ghostscript: buffer overflow in jetp3852_print_page() in devices/gdev3852.c could result in a privilege escalation ghostscript: use-after-free in xps_finish_image_path() in devices/vector/gdevxps.c could result in a privilege escalation ghostscript: buffer overflow in image_render_color_thresh() in base/gxicolor.c could result in a DoS ghostscript: buffer overflow in pcx_write_rle() in contrib/japanese/gdev10v.c could result in a DoS ghostscript: NULL pointer dereference in devices/gdevtsep.c could result in a DoS ghostscript: NULL pointer dereference in devices/vector/gdevtxtw.c and psi/zbfont.c could result in a DoS ghostscript: buffer overflow in p_print_image() in devices/gdevcdj.c could result in a DoS ghostscript: buffer overflow in lxm5700m_print_page() in devices/gdevlxm.c could result in a DoS ghostscript: division by zero in dot24_print_page() in devices/gdevdm24.c could result in a DoS ghostscript: buffer overflow in GetNumSameData() in contrib/lips4/gdevlips.c could result in a DoS | [
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb"
] | null | 5.5 | null | null |
RHSA-2013:0134 | Red Hat Security Advisory: freeradius2 security and bug fix update | freeradius: does not respect expired passwords when using the unix module | [
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2023:5721 | Red Hat Security Advisory: go-toolset:rhel8 security update | golang: net/http: insufficient sanitization of Host header golang: crypto/tls: slow verification of certificate chains containing large RSA keys golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487) HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack) | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 7.5 | null | null |
RHSA-2020:3922 | Red Hat Security Advisory: libsndfile security update | libsndfile: buffer over-read in the function i2alaw_array in alaw.c | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 3.3 | null |
RHSA-2015:0624 | Red Hat Security Advisory: qemu-kvm-rhev security, bug fix, and enhancement update | qemu: slirp: NULL pointer deref in sosendto() qemu: vnc: insufficient bits_per_pixel from the client sanitization qemu: insufficient parameter validation during ram load qemu: cirrus: insufficient blit region checks | [
"cpe:/o:redhat:enterprise_linux:7::hypervisor"
] | null | null | null | null |
RHSA-2019:2978 | Red Hat Security Advisory: polkit security update | polkit: Temporary auth hijacking via PID reuse and non-atomic fork | [
"cpe:/o:redhat:rhel_eus:7.5::computenode",
"cpe:/o:redhat:rhel_eus:7.5::server"
] | null | null | 7.3 | null |
RHSA-2017:3453 | Red Hat Security Advisory: java-1.8.0-ibm security update | zlib: Out-of-bounds pointer arithmetic in inftrees.c zlib: Out-of-bounds pointer arithmetic in inffast.c zlib: Undefined left shift of negative number zlib: Big-endian out-of-bounds pointer lcms2: Out-of-bounds read in Type_MLU_Read() JDK: XML External Entity Injection (XXE) error when processing XML data OpenJDK: improper re-use of NTLM authenticated connections (Networking, 8163520) OpenJDK: untrusted extension directories search path in Launcher (JCE, 8163528) OpenJDK: newline injection in the FTP client (Networking, 8170222) OpenJDK: MD5 allowed for jar verification (Security, 8171121) OpenJDK: newline injection in the SMTP client (Networking, 8171533) OpenJDK: reading of unprocessed image data in JPEGImageReader (2D, 8169209) OpenJDK: JAR verifier incorrect handling of missing digest (Security, 8169392) OpenJDK: Nashorn incompletely blocking access to Java APIs (Scripting, 8171539) OpenJDK: insufficient access control checks in ThreadPoolExecutor (Libraries, 8172204) OpenJDK: insufficient access control checks in ServiceRegistry (ImageIO, 8172461) OpenJDK: insufficient access control checks in AsynchronousChannelGroupImpl (8172465, Libraries) OpenJDK: insufficient access control checks in XML transformations (JAXP, 8172469) OpenJDK: unrestricted access to com.sun.org.apache.xml.internal.resolver (JAXP, 8173286) OpenJDK: incorrect handling of references in DGC (RMI, 8163958) JDK: unspecified vulnerability fixed in 6u161, 7u151, and 8u141 (Deployment) OpenJDK: insufficient access control checks in ActivationID (RMI, 8173697) OpenJDK: unbounded memory allocation in BasicAttribute deserialization (Serialization, 8174105) OpenJDK: unbounded memory allocation in CodeSource deserialization (Serialization, 8174113) OpenJDK: insufficient access control checks in ImageWatched (AWT, 8174098) OpenJDK: DSA implementation timing attack (JCE, 8175106) OpenJDK: LDAPCertStore following referrals to non-LDAP URLs (Security, 8176067) OpenJDK: insecure XML parsing in wsdlimport (JAX-WS, 8182054) OpenJDK: multiple unbounded memory allocations in deserialization (Serialization, 8174109) OpenJDK: incorrect privilege use when handling unreferenced objects (RMI, 8174966) OpenJDK: HTTP client insufficient check for newline in URLs (Networking, 8176751) JDK: unspecified vulnerability fixed in 8u151 and 9.0.1 (Deployment) OpenJDK: unbounded resource use in JceKeyStore deserialization (Serialization, 8181370) OpenJDK: insufficient loader constraints checks for invokespecial (Hotspot, 8180711) OpenJDK: unbounded memory allocation in SimpleTimeZone deserialization (Serialization, 8181323) OpenJDK: multiple unbounded memory allocations in deserialization (Libraries, 8181432) OpenJDK: unbounded memory allocation in PredicatedNodeTest deserialization (JAXP, 8181327) OpenJDK: unbounded memory allocation in JAXWSExceptionBase deserialization (JAX-WS, 8181100) OpenJDK: no default network operations timeouts in FtpClient (Networking, 8181612) OpenJDK: weak protection of key stores against brute forcing (Security, 8181692) OpenJDK: unbounded memory allocation in ObjectInputStream deserialization (Serialization, 8181597) OpenJDK: use of unprotected sname in Kerberos client (Libraries, 8178794) | [
"cpe:/a:redhat:network_satellite:5.8::el6"
] | null | null | 6.8 | null |
RHSA-2013:0612 | Red Hat Security Advisory: ruby security update | ruby: Incomplete fix for CVE-2011-1005 for NameError#to_s method when used on objects ruby: entity expansion DoS vulnerability in REXML | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2012:1081 | Red Hat Security Advisory: sudo security update | sudo: Multiple netmask values used in Host / Host_List configuration cause any host to be allowed access | [
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::server",
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2016:1978 | Red Hat Security Advisory: python-twisted-web security update | Twisted: sets environmental variable based on user supplied Proxy request header | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation",
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 5 | null |
RHSA-2011:1819 | Red Hat Security Advisory: dhcp security update | dhcp: DoS due to processing certain regular expressions | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2021:3968 | Red Hat Security Advisory: OpenJDK 11.0.13 security update for Windows Builds | OpenJDK: Weak ciphers preferred over stronger ones for TLS (JSSE, 8264210) OpenJDK: Excessive memory allocation in RTFParser (Swing, 8265167) OpenJDK: Excessive memory allocation in RTFReader (Swing, 8265580) OpenJDK: Excessive memory allocation in HashMap and HashSet (Utility, 8266097) OpenJDK: Certificates with end dates too far in the future can corrupt keystore (Keytool, 8266137) OpenJDK: Loop in HttpsServer triggered during TLS session close (JSSE, 8254967) OpenJDK: Incorrect principal selection when using Kerberos Constrained Delegation (Libraries, 8266689) OpenJDK: Unexpected exception raised during TLS handshake (JSSE, 8267729) OpenJDK: Excessive memory allocation in BMPImageReader (ImageIO, 8267735) OpenJDK: Non-constant comparison during TLS handshakes (JSSE, 8269618) | [
"cpe:/a:redhat:openjdk:11::windows"
] | null | 3.7 | null | null |
RHSA-2014:0596 | Red Hat Security Advisory: libtasn1 security update | libtasn1: multiple boundary check issues libtasn1: asn1_get_bit_der() can return negative bit length libtasn1: asn1_read_value_type() NULL pointer dereference | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2007:0064 | Red Hat Security Advisory: postgresql security update | security flaw security flaw | [
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws",
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2025:3001 | Red Hat Security Advisory: webkit2gtk3 security update | webkitgtk: out-of-bounds write vulnerability | [
"cpe:/a:redhat:rhel_eus:9.2::appstream"
] | null | 7.5 | null | null |
RHSA-2011:0938 | Red Hat Security Advisory: java-1.6.0-ibm security update | JDK: unspecified vulnerabilities fixed in 6u26 (Sound) JDK: unspecified vulnerabilities fixed in 6u26 (Sound) OpenJDK: integer overflows in JPEGImageReader and font SunLayoutEngine (2D, 7013519) JDK: unspecified vulnerability fixed in 6u26 (Deployment) OpenJDK: Deserialization allows creation of mutable SignedObject (Deserialization, 6618658) OpenJDK: NetworkInterface information leak (Networking, 7013969) OpenJDK: incorrect numeric type conversion in TransformHelper (2D, 7016495) OpenJDK: unprivileged proxy settings change via SOAPConnection (SAAJ, 7013971) OpenJDK: MediaTracker created Component instances with unnecessary privileges (Swing, 7020198) JDK: unspecified vulnerability fixed in 6u26 (2D) | [
"cpe:/a:redhat:rhel_extras:4",
"cpe:/a:redhat:rhel_extras:5::client",
"cpe:/a:redhat:rhel_extras:5::server",
"cpe:/a:redhat:rhel_extras:6"
] | null | null | null | null |
RHSA-2015:2315 | Red Hat Security Advisory: NetworkManager security, bug fix, and enhancement update | NetworkManager: remote DoS using IPv6 RA with bogus MTU NetworkManager: denial of service (DoS) attack against IPv6 network stacks due to improper handling of Router Advertisements | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | null | null |
RHSA-2023:3397 | Red Hat Security Advisory: qatzip security and bug fix update | qatzip: local privilege escalation | [
"cpe:/a:redhat:rhel_eus:8.6::appstream",
"cpe:/a:redhat:rhel_eus:8.6::crb"
] | null | 7.8 | null | null |
RHSA-2016:0426 | Red Hat Security Advisory: redhat-support-plugin-rhev security, bug fix and enhancement update | redhat-support-plugin-rhev: Remote code execution by SuperUser role on hosts in RHEV | [
"cpe:/a:redhat:rhev_manager:3"
] | null | null | null | null |
RHSA-2024:0256 | Red Hat Security Advisory: python3 security update | python: Parsing errors in email/_parseaddr.py lead to incorrect value in email address part of tuple | [
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 5.3 | null | null |
RHSA-2024:4527 | Red Hat Security Advisory: ghostscript security update | ghostscript: OPVP device arbitrary code execution via custom Driver library | [
"cpe:/a:redhat:rhel_eus:8.8::appstream",
"cpe:/a:redhat:rhel_eus:8.8::crb"
] | null | 8.8 | null | null |
RHSA-2020:2732 | Red Hat Security Advisory: openstack-keystone security update | openstack-keystone: EC2 and credential endpoints are not protected from a scoped context openstack-keystone: Credentials endpoint policy logic allows changing credential owner and target project ID openstack-keystone: failure to check signature TTL of the EC2 credential auth method | [
"cpe:/a:redhat:openstack:13::el7"
] | null | 5.4 | null | null |
RHSA-2011:0330 | Red Hat Security Advisory: kernel-rt security and bug fix update | kernel: net/sched/act_police.c infoleak kernel: L2TP send buffer allocation size overflows kernel: bio: integer overflow page count when mapping/copying user data kernel: panic when submitting certain 0-length I/O requests kernel: possible kernel oops from user MSS kernel: missing tty ops write function presence check in hci_uart_tty_open() kernel: posix-cpu-timers: workaround to suppress the problems with mt exec kernel: unix socket local dos kernel: inotify memory leak kernel: install_special_mapping skips security_file_mmap check kernel: local privilege escalation via /sys/kernel/debug/acpi/custom_method kernel: CAN info leak kernel: orinoco: fix TKIP countermeasure behaviour kernel: IB/uverbs: Handle large number of entries in poll CQ kernel: heap contents leak for CAP_NET_ADMIN via ethtool ioctl kernel: iowarrior usb device heap overflow kernel: panic when submitting certain 0-length I/O requests kernel: av7110 negative array offset kernel: IB/uverbs: Handle large number of entries in poll CQ | [
"cpe:/a:redhat:enterprise_mrg:1::el5"
] | null | null | null | null |
RHSA-2020:0860 | Red Hat Security Advisory: Red Hat JBoss Web Server 3.1 Service Pack 8 security update | tomcat: XSS in SSI printenv tomcat: local privilege escalation tomcat: Session fixation when using FORM authentication tomcat: Apache Tomcat AJP File Read/Inclusion Vulnerability | [
"cpe:/a:redhat:jboss_enterprise_web_server:3.1"
] | null | 7.6 | 5 | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.