id
stringlengths 13
15
| title
stringlengths 29
176
| description
stringlengths 8
32.1k
| cpes
sequencelengths 0
20
| cvss_v4_0
null | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
null |
---|---|---|---|---|---|---|---|
RHSA-2023:0609 | Red Hat Security Advisory: git security update | git: gitattributes parsing integer overflow git: Heap overflow in `git archive`, `git log --format` leading to RCE | [
"cpe:/a:redhat:rhel_aus:8.2::appstream",
"cpe:/a:redhat:rhel_e4s:8.2::appstream",
"cpe:/a:redhat:rhel_tus:8.2::appstream"
] | null | 9.8 | null | null |
RHSA-2021:2262 | Red Hat Security Advisory: thunderbird security update | Mozilla: Thunderbird stored OpenPGP secret keys without master password protection Mozilla: Partial protection of inline OpenPGP message not indicated Mozilla: Memory safety bugs fixed in Firefox 89 and Firefox ESR 78.11 | [
"cpe:/a:redhat:rhel_eus:8.1::appstream"
] | null | 8.8 | null | null |
RHSA-2019:2892 | Red Hat Security Advisory: qemu-kvm security update | QEMU: ne2000: integer overflow leads to buffer overflow issue QEMU: slirp: heap buffer overflow while reassembling fragmented datagrams QEMU: pcnet: integer overflow leads to buffer overflow QEMU: slirp: heap buffer overflow in tcp_emu() QEMU: qxl: null pointer dereference while releasing spice resources | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | 3.8 | null |
RHSA-2022:1724 | Red Hat Security Advisory: thunderbird security update | Mozilla: Incorrect security status shown after viewing an attached email Mozilla: Bypassing permission prompt in nested browsing contexts Mozilla: iframe Sandbox bypass Mozilla: Reader mode bypassed SameSite cookies Mozilla: Speech Synthesis feature not properly disabled Mozilla: Fullscreen notification bypass using popups Mozilla: Leaking browser history with CSS variables Mozilla: Memory safety bugs fixed in Firefox 100 and Firefox ESR 91.9 | [
"cpe:/a:redhat:rhel_eus:8.2::appstream"
] | null | 9.8 | 7.5 | null |
RHSA-2024:3184 | Red Hat Security Advisory: grub2 security update | grub2: Out-of-bounds write at fs/ntfs.c may lead to unsigned code execution grub2: out-of-bounds read at fs/ntfs.c grub2: grub2-set-bootflag can be abused by local (pseudo-)users | [
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 3.3 | null | null |
RHSA-2002:088 | Red Hat Security Advisory: : Updated ethereal packages are available | security flaw security flaw security flaw security flaw security flaw security flaw security flaw | [
"cpe:/o:redhat:linux:7.2",
"cpe:/o:redhat:linux:7.3"
] | null | null | null | null |
RHSA-2014:2023 | Red Hat Security Advisory: glibc security and bug fix update | glibc: command execution in wordexp() with WRDE_NOCMD specified | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | null | null |
RHSA-2024:3927 | Red Hat Security Advisory: Red Hat Ceph Storage 7.1 container image security, and bug fix update | golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487) jinja2: HTML attribute injection when passing user input as keys to xmlattr filter | [
"cpe:/a:redhat:ceph_storage:7.1::el9"
] | null | 5.4 | null | null |
RHSA-2013:1513 | Red Hat Security Advisory: rhn-java-sat security update | Satellite: Interface to create the initial administrator user remains open after installation | [
"cpe:/a:redhat:network_satellite:5.2::el5"
] | null | null | null | null |
RHSA-2024:3567 | Red Hat Security Advisory: Red Hat Single Sign-On 7.6.9 security update on RHEL 8 | keycloak: exposure of sensitive information in Pushed Authorization Requests (PAR) KC_RESTART cookie | [
"cpe:/a:redhat:red_hat_single_sign_on:7.6::el8"
] | null | 7.5 | null | null |
RHSA-2022:8857 | Red Hat Security Advisory: Red Hat OpenStack Platform 16.2.4 (erlang) security update | erlang/otp: Client Authentication Bypass | [
"cpe:/a:redhat:openstack:16.2::el8"
] | null | 9.4 | null | null |
RHSA-2024:8447 | Red Hat Security Advisory: python3.12 security update | python: cpython: tarfile: ReDos via excessive backtracking while parsing header values | [
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::crb"
] | null | 7.5 | null | null |
RHEA-2024:1143 | Red Hat Enhancement Advisory: redis:7 update | redis: Heap Buffer Overflow may lead to potential remote code execution | [
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 8.1 | null | null |
RHSA-2015:0813 | Red Hat Security Advisory: flash-plugin security update | flash-plugin: multiple code execution issues fixed in APSB15-06 flash-plugin: multiple code execution issues fixed in APSB15-06 flash-plugin: multiple code execution issues fixed in APSB15-06 flash-plugin: multiple code execution issues fixed in APSB15-06 flash-plugin: multiple code execution issues fixed in APSB15-06 flash-plugin: multiple code execution issues fixed in APSB15-06 flash-plugin: multiple code execution issues fixed in APSB15-06 flash-plugin: multiple code execution issues fixed in APSB15-06 flash-plugin: multiple code execution issues fixed in APSB15-06 flash-plugin: multiple code execution issues fixed in APSB15-06 flash-plugin: multiple code execution issues fixed in APSB15-06 flash-plugin: information leaks leading to ASLR bypass (APSB15-06) flash-plugin: multiple code execution issues fixed in APSB15-06 flash-plugin: multiple code execution issues fixed in APSB15-06 flash-plugin: multiple code execution issues fixed in APSB15-06 flash-plugin: multiple code execution issues fixed in APSB15-06 flash-plugin: multiple code execution issues fixed in APSB15-06 flash-plugin: information leaks leading to ASLR bypass (APSB15-06) flash-plugin: multiple code execution issues fixed in APSB15-06 flash-plugin: multiple code execution issues fixed in APSB15-06 flash-plugin: multiple code execution issues fixed in APSB15-06 flash-plugin: security bypass leading to information disclosure (APSB15-06) | [
"cpe:/a:redhat:rhel_extras:5::client",
"cpe:/a:redhat:rhel_extras:5::server",
"cpe:/a:redhat:rhel_extras:6"
] | null | null | null | null |
RHSA-2020:4542 | Red Hat Security Advisory: cryptsetup security, bug fix, and enhancement update | cryptsetup: Out-of-bounds write when validating segments | [
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 7.8 | null | null |
RHSA-2009:1108 | Red Hat Security Advisory: httpd security update | apr-util heap buffer underwrite apr-util billion laughs attack apr-util single NULL byte buffer overflow | [
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws"
] | null | null | null | null |
RHSA-2010:0475 | Red Hat Security Advisory: sudo security update | sudo: insufficient environment sanitization issue | [
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2018:0484 | Red Hat Security Advisory: chromium-browser security update | chromium-browser: incorrect permissions on shared memory chromium-browser: use-after-free in blink chromium-browser: race condition in v8 chromium-browser: heap buffer overflow in skia chromium-browser: incorrect permissions on shared memory chromium-browser: type confusion in v8 chromium-browser: integer overflow in v8 chromium-browser: same origin bypass via canvas chromium-browser: buffer overflow in skia chromium-browser: stack buffer overflow in skia chromium-browser: csp bypass through extensions chromium-browser: heap bufffer overflow in skia chromium-browser: integer overflow in pdfium chromium-browser: heap bufffer overflow in webgl chromium-browser: mark-of-the-web bypass chromium-browser: overly permissive cross origin downloads chromium-browser: incorrect handling of url fragment identifiers in blink chromium-browser: timing attack using svg filters chromium-browser: url spoof in omnibox chromium-browser: information disclosure via texture data in webgl chromium-browser: information disclosure in ipc call chromium-browser: xss in interstitials chromium-browser: circumvention of port blocking chromium-browser: incorrect processing of appmanifests | [
"cpe:/a:redhat:rhel_extras:6"
] | null | null | 4.3 | null |
RHSA-2023:5766 | Red Hat Security Advisory: nghttp2 security update | HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack) | [
"cpe:/o:redhat:rhel_e4s:8.1::baseos"
] | null | 7.5 | null | null |
RHSA-2025:4335 | Red Hat Security Advisory: Red Hat build of Keycloak 26.0.11 Images Update | org.keycloak/keycloak-services: JWT Token Cache Exhaustion Leading to Denial of Service (DoS) in Keycloak org.keycloak.protocol.services: Keycloak hostname verification org.keycloak.authentication: Two factor authentication bypass | [
"cpe:/a:redhat:build_keycloak:26.0::el9"
] | null | 5.4 | null | null |
RHSA-2015:1669 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform security update | PicketLink: PicketLink IDP ignores role based authorization | [
"cpe:/a:redhat:jboss_enterprise_application_platform:6::el5"
] | null | null | null | null |
RHSA-2011:0311 | Red Hat Security Advisory: thunderbird security update | javascript: URLs in chrome documents (MFSA 2011-08) Mozilla miscellaneous memory safety hazards (MFSA 2011-01) Mozilla crash caused by corrupted JPEG image (MFSA 2011-09) Mozilla miscellaneous memory safety hazards (MFSA 2011-01) | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2017:3081 | Red Hat Security Advisory: tomcat security update | tomcat: Incorrect handling of pipelined requests when send file was used tomcat: Vary header not added by CORS filter leading to cache poisoning tomcat: Remote Code Execution via JSP Upload tomcat: Remote Code Execution bypass for CVE-2017-12615 | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 8.1 | null |
RHSA-2021:5085 | Red Hat Security Advisory: Red Hat OpenShift Data Foundation 4.9.0 enhancement, security, and bug fix update | kubernetes: Incomplete fix for CVE-2019-11250 allows for token leak in logs when logLevel >= 9 golang: net: lookup functions may return invalid host names golang: net/http/httputil: ReverseProxy forwards connection headers if first one is empty golang: math/big.Rat: may cause a panic or an unrecoverable fatal error if passed inputs with very large exponents golang: crypto/tls: certificate of wrong type is causing TLS client to panic | [
"cpe:/a:redhat:openshift_data_foundation:4.9::el8"
] | null | 6.5 | null | null |
RHSA-2021:1051 | Red Hat Security Advisory: RHV-H enhancement and security update (redhat-virtualization-host) 4.3.14 | lldp/openvswitch: denial of service via externally triggered memory leak | [
"cpe:/o:redhat:enterprise_linux:7::hypervisor"
] | null | 7.5 | null | null |
RHSA-2019:3076 | Red Hat Security Advisory: kpatch-patch security update | kernel: Use-after-free in __blk_drain_queue() function in block/blk-core.c kernel: Heap overflow in mwifiex_update_bss_desc_with_ie function in marvell/mwifiex/scan.c hardware: bluetooth: BR/EDR encryption key negotiation attacks (KNOB) kernel: Heap overflow in mwifiex_uap_parse_tail_ies function in drivers/net/wireless/marvell/mwifiex/ie.c | [
"cpe:/o:redhat:enterprise_linux:7::server"
] | null | null | 8 | null |
RHSA-2014:0843 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 6.2.4 security update | Tomcat/JBossWeb: Limited DoS in chunked transfer encoding input filter Tomcat/JBossWeb: XXE vulnerability via user supplied XSLTs Tomcat/JBossWeb: Request smuggling via malicious content length header Tomcat/JBossWeb: XML parser hijack by malicious web application | [
"cpe:/a:redhat:jboss_enterprise_application_platform:6::el5",
"cpe:/a:redhat:jboss_enterprise_application_platform:6::el6"
] | null | null | null | null |
RHSA-2015:1876 | Red Hat Security Advisory: python-django security update | python-django: Denial-of-service possibility in logout() view by filling session store | [
"cpe:/a:redhat:openstack:7::el7"
] | null | null | null | null |
RHSA-2019:4164 | Red Hat Security Advisory: kernel security and bug fix update | kernel: Memory corruption due to incorrect socket cloning kernel: Missing check in fs/inode.c:inode_init_owner() does not clear SGID bit on non-directories for non-members Kernel: page cache side channel attacks | [
"cpe:/o:redhat:rhel_aus:7.2::server",
"cpe:/o:redhat:rhel_e4s:7.2::server",
"cpe:/o:redhat:rhel_tus:7.2::server"
] | null | null | 7.1 | null |
RHSA-2025:1738 | Red Hat Security Advisory: libpq security update | postgresql: PostgreSQL quoting APIs miss neutralizing quoting syntax in text that fails encoding validation | [
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 8.1 | null | null |
RHSA-2021:4133 | Red Hat Security Advisory: thunderbird security update | Mozilla: iframe sandbox rules did not apply to XSLT stylesheets Mozilla: Use-after-free in file picker dialog Mozilla: Firefox could be coaxed into going into fullscreen mode without notification or warning Mozilla: Opportunistic Encryption in HTTP2 could be used to bypass the Same-Origin-Policy on services hosted on other ports Mozilla: Permission Prompt could be overlaid, resulting in user confusion and potential spoofing Mozilla: Javascript alert box could have been spoofed onto an arbitrary domain thunderbird: Memory corruption when processing S/MIME messages Mozilla: Memory safety bugs fixed in Firefox 94 and Firefox ESR 91.3 Mozilla: Use-after-free in HTTP2 Session object | [
"cpe:/a:redhat:rhel_eus:8.1::appstream"
] | null | 8.8 | 6.1 | null |
RHSA-2018:0053 | Red Hat Security Advisory: linux-firmware security update | An update for linux-firmware is now available for Red Hat Enterprise Linux 7.2 Advanced Update Support, Red Hat Enterprise Linux 7.2 Telco Extended Update Support, and Red Hat Enterprise Linux 7.2 Update Services for SAP Solutions.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. | [
"cpe:/o:redhat:rhel_aus:7.2::server",
"cpe:/o:redhat:rhel_e4s:7.2::server",
"cpe:/o:redhat:rhel_tus:7.2::server"
] | null | null | null | null |
RHSA-2015:0284 | Red Hat Security Advisory: kernel security and bug fix update | kernel: ipc: ipc_rcu_putref refcount races Kernel: USB serial: memory corruption flaw kernel: kvm: PIT timer race condition kernel: kvm: vmx: invept vm exit not handled kernel: kvm: vmx: invvpid vm exit not handled kernel: net: sctp: NULL pointer dereference in af->from_addr_param on malformed packet kernel: iptables restriction bypass if a protocol handler kernel module not loaded | [
"cpe:/o:redhat:rhel_eus:6.5::computenode",
"cpe:/o:redhat:rhel_eus:6.5::server"
] | null | null | null | null |
RHSA-2024:4351 | Red Hat Security Advisory: virt:rhel and virt-devel:rhel security and bug fix update | libvirt: stack use-after-free in virNetClientIOEventLoop() | [
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb"
] | null | 6.2 | null | null |
RHSA-2008:0597 | Red Hat Security Advisory: firefox security update | mozilla: CSS reference counter overflow (ZDI-CAN-349) Firefox command line URL launches multi-tabs security flaw | [
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2020:0086 | Red Hat Security Advisory: firefox security update | Mozilla: Bypass of @namespace CSS sanitization during pasting Mozilla: Type Confusion in XPCVariant.cpp Mozilla: CSS sanitization does not escape HTML tags Mozilla: Memory safety bugs fixed in Firefox 72 and Firefox ESR 68.4 Mozilla: IonMonkey type confusion with StoreElementHole and FallibleStoreElement | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | 8.8 | 8.8 | null |
RHSA-2022:1851 | Red Hat Security Advisory: pki-core:10.6 security and bug fix update | JSS: memory leak in TLS connection leads to OOM | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 7.5 | null | null |
RHSA-2017:2698 | Red Hat Security Advisory: openvswitch security update | openvswitch: Integer underflow in the ofputil_pull_queue_get_config_reply10 function openvswitch: Invalid processing of a malicious OpenFlow role status message openvswitch: Buffer over-read while parsing the group mod OpenFlow message | [
"cpe:/a:redhat:openstack:7::el7"
] | null | null | 5.6 | null |
RHSA-2016:0368 | Red Hat Security Advisory: rabbitmq-server security update | RabbitMQ: /api/... XSS vulnerability RabbitMQ: /api/definitions response splitting vulnerability | [
"cpe:/a:redhat:openstack:5::el6"
] | null | null | null | null |
RHSA-2021:4316 | Red Hat Security Advisory: zziplib security update | zziplib: infinite loop via the return value of zzip_file_read() as used in unzzip_cat_file() | [
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb"
] | null | 3.3 | null | null |
RHSA-2024:10883 | Red Hat Security Advisory: Red Hat OpenStack Platform 16.2 (osp-director-operator) security update | go/parser: golang: Calling any of the Parse functions containing deeply nested literals can cause a panic/stack exhaustion encoding/gob: golang: Calling Decoder.Decode on a message which contains deeply nested structures can cause a panic due to stack exhaustion | [
"cpe:/a:redhat:openstack:16.2::el8"
] | null | 7.5 | null | null |
RHSA-2014:1102 | Red Hat Security Advisory: ror40-rubygem-activerecord security update | rubygem-activerecord: Strong Parameter bypass with create_with | [
"cpe:/a:redhat:rhel_software_collections:1::el6",
"cpe:/a:redhat:rhel_software_collections:1::el7"
] | null | null | null | null |
RHSA-2010:0155 | Red Hat Security Advisory: java-1.4.2-ibm security and bug fix update | TLS: MITM attacks via session renegotiation | [
"cpe:/a:redhat:rhel_extras:3",
"cpe:/a:redhat:rhel_extras:4",
"cpe:/a:redhat:rhel_extras:5::client",
"cpe:/a:redhat:rhel_extras:5::server"
] | null | null | null | null |
RHSA-2022:1701 | Red Hat Security Advisory: firefox security update | Mozilla: Bypassing permission prompt in nested browsing contexts Mozilla: iframe Sandbox bypass Mozilla: Reader mode bypassed SameSite cookies Mozilla: Fullscreen notification bypass using popups Mozilla: Leaking browser history with CSS variables Mozilla: Memory safety bugs fixed in Firefox 100 and Firefox ESR 91.9 | [
"cpe:/a:redhat:rhel_e4s:8.1::appstream"
] | null | 9.8 | 7.5 | null |
RHSA-2022:7216 | Red Hat Security Advisory: OpenShift Container Platform 4.9.51 bug fix and security update | go-getter: command injection vulnerability go-getter: unsafe download (issue 1 of 3) go-getter: unsafe download (issue 2 of 3) go-getter: unsafe download (issue 3 of 3) | [
"cpe:/a:redhat:openshift:4.9::el8"
] | null | 8.6 | null | null |
RHSA-2014:1038 | Red Hat Security Advisory: tomcat6 security update | tomcat: information disclosure via XXE when running untrusted web applications Tomcat/JBossWeb: XML parser hijack by malicious web application | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2020:2331 | Red Hat Security Advisory: Red Hat Satellite Proxy 5 - End Of Life Notice | This is the final notification for the End Of Life (EOL) for the following versions of Red Hat Proxy 5:
* Red Hat Satellite Proxy 5.8 | [
"cpe:/a:redhat:network_proxy:5.8::el6"
] | null | null | null | null |
RHSA-2018:0630 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 6.4 security update | slf4j: Deserialisation vulnerability in EventData constructor can allow for arbitrary code execution | [
"cpe:/a:redhat:jboss_enterprise_application_platform:6.4"
] | null | null | 8.1 | null |
RHSA-2023:7731 | Red Hat Security Advisory: tracker-miners security update | tracker-miners: sandbox escape | [
"cpe:/a:redhat:rhel_aus:8.2::appstream",
"cpe:/a:redhat:rhel_e4s:8.2::appstream",
"cpe:/a:redhat:rhel_tus:8.2::appstream"
] | null | 7.5 | null | null |
RHSA-2020:2478 | Red Hat Security Advisory: OpenShift Container Platform 3.11 jenkins-2-plugins security update | jenkins-git-client-plugin: OS command injection via 'git ls-remote' jenkins-script-security-plugin: sandbox protection bypass leads to execute arbitrary code in sandboxed scripts jenkins-pipeline-groovy-plugin: sandbox protection bypass through default parameter expressions in CPS-transformed methods jenkins-script-security-plugin: sandbox protection bypass during script compilation phase by applying AST transforming annotations jenkins-subversion-plugin: XSS in project repository base url jenkins-script-security-plugin: sandbox protection bypass via crafted constructor calls and crafted constructor bodies jenkins-script-security-plugin: sandbox protection bypass leads to arbitrary code execution jenkins-git-plugin: stored cross-site scripting | [
"cpe:/a:redhat:openshift:3.11::el7"
] | null | 5.4 | null | null |
RHSA-2023:0427 | Red Hat Security Advisory: pcs security update | sinatra: Reflected File Download attack | [
"cpe:/a:redhat:rhel_eus:8.6::highavailability",
"cpe:/a:redhat:rhel_eus:8.6::resilientstorage"
] | null | 8.8 | null | null |
RHSA-2020:0199 | Red Hat Security Advisory: openslp security update | openslp: Heap-based buffer overflow in ProcessSrvRqst() in slpd_process.c leading to remote code execution | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | 9.8 | null |
RHSA-2020:4946 | Red Hat Security Advisory: libX11 security update | libX11: integer overflow leads to double free in locale handling | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | 7.8 | null | null |
RHSA-2005:025 | Red Hat Security Advisory: exim security update | security flaw security flaw | [
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2014:0522 | Red Hat Security Advisory: mariadb55-mariadb security update | mysql: unspecified DoS related to XML (CPU April 2014) mysql: unspecified DoS related to Partition (CPU April 2014) mysql: unspecified DoS related to Performance Schema (CPU April 2014) mysql: unspecified DoS related to Options (CPU April 2014) mysql: unspecified DoS related to Federated (CPU April 2014) mysql: unspecified vulnerability related to RBR (CPU April 2014) mysql: unspecified DoS related to Replication (CPU April 2014) | [
"cpe:/a:redhat:rhel_software_collections:1::el6"
] | null | null | null | null |
RHSA-2018:1364 | Red Hat Security Advisory: 389-ds-base security update | 389-ds-base: ns-slapd crash via large filter value in ldapsearch | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | 7.5 | null |
RHSA-2024:11238 | Red Hat Security Advisory: python3.11-urllib3 security update | urllib3: Request body not stripped after redirect from 303 status changes request method to GET | [
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 4.2 | null | null |
RHSA-2024:6583 | Red Hat Security Advisory: httpd:2.4 security update | httpd: Security issues via backend applications whose response headers are malicious or exploitable | [
"cpe:/a:redhat:rhel_aus:8.2::appstream"
] | null | 9.1 | null | null |
RHSA-2016:2996 | Red Hat Security Advisory: Red Hat Enterprise Linux 4 Extended Life Cycle Support Three-Month Notice | This is the Three-Month notification for the retirement of Red Hat Enterprise Linux 4 Extended Life Cycle Support Add-On (ELS). This notification applies only to those customers subscribed to the Extended Life Cycle Support (ELS) channel for Red Hat Enterprise Linux 4. | [
"cpe:/o:redhat:rhel_els:4::as",
"cpe:/o:redhat:rhel_els:4::es"
] | null | null | null | null |
RHSA-2018:0026 | Red Hat Security Advisory: qemu-kvm security update | An update for qemu-kvm is now available for Red Hat Enterprise Linux 7.2 Advanced Update Support, Red Hat Enterprise Linux 7.2 Telco Extended Update Support, and Red Hat Enterprise Linux 7.2 Update Services for SAP Solutions.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. | [
"cpe:/o:redhat:rhel_aus:7.2::server",
"cpe:/o:redhat:rhel_e4s:7.2::server",
"cpe:/o:redhat:rhel_tus:7.2::server"
] | null | null | null | null |
RHSA-2025:3861 | Red Hat Security Advisory: kernel-rt security update | kernel: ALSA: usb-audio: Fix out of bounds reads when finding clock sources | [
"cpe:/a:redhat:rhel_tus:8.4::nfv",
"cpe:/a:redhat:rhel_tus:8.4::realtime"
] | null | 7.1 | null | null |
RHSA-2019:1198 | Red Hat Security Advisory: qemu-kvm security update | hardware: Microarchitectural Store Buffer Data Sampling (MSBDS) hardware: Micro-architectural Load Port Data Sampling - Information Leak (MLPDS) hardware: Microarchitectural Fill Buffer Data Sampling (MFBDS) hardware: Microarchitectural Data Sampling Uncacheable Memory (MDSUM) | [
"cpe:/o:redhat:rhel_aus:6.5::server"
] | null | null | 3.8 | null |
RHSA-2020:0541 | Red Hat Security Advisory: java-1.7.0-openjdk security update | OpenJDK: Incorrect exception processing during deserialization in BeanContextSupport (Serialization, 8224909) OpenJDK: Improper checks of SASL message properties in GssKrb5Base (Security, 8226352) OpenJDK: Incorrect isBuiltinStreamHandler check causing URL normalization issues (Networking, 8228548) OpenJDK: Use of unsafe RSA-MD5 checksum in Kerberos TGS (Security, 8229951) OpenJDK: Serialization filter changes via jdk.serialFilter property modification (Serialization, 8231422) OpenJDK: Excessive memory usage in OID processing in X.509 certificate parsing (Libraries, 8234037) OpenJDK: Incomplete enforcement of maxDatagramSockets limit in DatagramChannelImpl (Networking, 8231795) | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 3.7 | null | null |
RHSA-2023:5363 | Red Hat Security Advisory: nodejs:18 security, bug fix, and enhancement update | nodejs-semver: Regular expression denial of service nodejs: Permissions policies can be bypassed via Module._load nodejs: Permissions policies can impersonate other modules in using module.constructor.createRequire() nodejs: Permissions policies can be bypassed via process.binding | [
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 7.5 | null | null |
RHSA-2014:0509 | Red Hat Security Advisory: java-1.5.0-ibm security update | libjpeg: information leak (read of uninitialized memory) OpenJDK: Incorrect mlib/raster image validation (2D, 8027841) OpenJDK: Protect logger handlers (Libraries, 8029740) OpenJDK: AWT incorrect FlavorMap seperation (AWT, 8026797) OpenJDK: RSA unpadding timing issues (Security, 8027766) OpenJDK: ServiceLoader Exception handling security bypass (Libraries, 8031394) OpenJDK: missing randomization of JNDI DNS client query IDs (JNDI, 8030731) JDK: Vulnerability in the IBMSecureRandom implementation of the IBMJCE and IBMSecureRandom cryptographic providers OpenJDK: insecure temporary file use in unpack200 (Libraries, 8033618) OpenJDK: insufficient escaping of window title string (Javadoc, 8026736) JDK: unspecified vulnerability fixed in 5.0u75, 6u75, 7u55 and 8u5 (2D) OpenJDK: AWT thread context handling (AWT, 8025010) OpenJDK: JPEG decoder input stream handling (2D, 8029854) OpenJDK: remove insecure Java Sound provider caching (Sound, 8026163) | [
"cpe:/a:redhat:rhel_extras:5::client",
"cpe:/a:redhat:rhel_extras:5::server",
"cpe:/a:redhat:rhel_extras:6"
] | null | null | null | null |
RHSA-2021:1544 | Red Hat Security Advisory: Red Hat OpenShift Service Mesh 2.0.4 security update | kiali/kiali-operator: can deploy specified image to any namespace | [
"cpe:/a:redhat:service_mesh:2.0::el8"
] | null | 8.8 | null | null |
RHSA-2020:4344 | Red Hat Security Advisory: Open Liberty 20.0.0.11 Runtime security update | Open Liberty 20.0.0.11 Runtime is now available from the Customer Portal.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. | [
"cpe:/a::openliberty:20"
] | null | null | null | null |
RHSA-2017:1365 | Red Hat Security Advisory: nss security and bug fix update | nss: Null pointer dereference when handling empty SSLv2 messages | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 7.5 | null |
RHSA-2003:114 | Red Hat Security Advisory: mod_auth_any security update | security flaw | [
"cpe:/o:redhat:enterprise_linux:2.1::as",
"cpe:/o:redhat:enterprise_linux:2.1::aw",
"cpe:/o:redhat:enterprise_linux:2.1::es",
"cpe:/o:redhat:enterprise_linux:2.1::ws"
] | null | null | null | null |
RHSA-2022:5771 | Red Hat Security Advisory: thunderbird security update | Mozilla: Memory safety bugs fixed in Firefox 103 and 102.1 Mozilla: Directory indexes for bundled resources reflected URL parameters Mozilla: Mouse Position spoofing with CSS transforms | [
"cpe:/a:redhat:rhel_eus:8.2::appstream"
] | null | 7.5 | 6.1 | null |
RHSA-2023:2453 | Red Hat Security Advisory: libtpms security update | tpm: TCG TPM2.0 implementations vulnerable to memory corruption tpm2: TCG TPM2.0 implementations vulnerable to memory corruption | [
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 5.5 | null | null |
RHSA-2022:5770 | Red Hat Security Advisory: thunderbird security update | Mozilla: Memory safety bugs fixed in Firefox 103 and 102.1 Mozilla: Directory indexes for bundled resources reflected URL parameters Mozilla: Mouse Position spoofing with CSS transforms | [
"cpe:/a:redhat:rhel_e4s:8.1::appstream"
] | null | 7.5 | 6.1 | null |
RHSA-2022:0539 | Red Hat Security Advisory: thunderbird security update | Mozilla: Extensions could have bypassed permission confirmation during update Mozilla: Drag and dropping an image could have resulted in the dropped object being an executable Mozilla: Sandboxed iframes could have executed script if the parent appended elements Mozilla: Cross-Origin responses could be distinguished between script and non-script content-types Mozilla: frame-ancestors Content Security Policy directive was not enforced for framed extension pages Mozilla: Script Execution during invalid object state Mozilla: Memory safety bugs fixed in Firefox 97 and Firefox ESR 91.6 | [
"cpe:/a:redhat:rhel_e4s:8.1::appstream"
] | null | 8.8 | null | null |
RHSA-2020:1497 | Red Hat Security Advisory: tigervnc security update | tigervnc: Stack use-after-return due to incorrect usage of stack memory in ZRLEDecoder tigervnc: Heap buffer overflow triggered from CopyRectDecoder due to incorrect value checks tigervnc: Heap buffer overflow in TightDecoder::FilterGradient tigervnc: Heap buffer overflow in DecodeManager::decodeRect tigervnc: Stack buffer overflow in CMsgReader::readSetCursor | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 7.2 | null | null |
RHSA-2020:3142 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.2 security update | wildfly: unsafe deserialization in Wildfly Enterprise Java Beans wildfly: Some EJB transaction objects may get accumulated causing Denial of Service wildfly: EJB SessionOpenInvocations may not be removed properly after a response is received causing Denial of Service | [
"cpe:/a:redhat:jboss_enterprise_application_platform:7.2::el6",
"cpe:/a:redhat:jboss_enterprise_application_platform:7.2::el7",
"cpe:/a:redhat:jboss_enterprise_application_platform:7.2::el8"
] | null | 6.5 | null | null |
RHSA-2012:1418 | Red Hat Security Advisory: kdelibs security update | kdelibs: Heap-based buffer overflow when parsing location of a font face source kdelibs: Heap-based buffer over-read when calculating dimensions of the canvas within the scale loop | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2016:0726 | Red Hat Security Advisory: ImageMagick security update | ImageMagick: Insufficient shell characters filtering ImageMagick: File deletion ImageMagick: File moving ImageMagick: Local file read ImageMagick: SSRF vulnerability | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation",
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 8.4 | null |
RHSA-2013:1263 | Red Hat Security Advisory: Red Hat Storage Console 2.1 security update | RESTEasy: XML eXternal Entity (XXE) flaw | [
"cpe:/a:redhat:storage:2.1:console:el6"
] | null | null | null | null |
RHSA-2024:3752 | Red Hat Security Advisory: Red Hat AMQ Broker 7.10.7 release and security update | JSON-java: parser confusion leads to OOM keycloak: path transversal in redirection validation | [
"cpe:/a:redhat:amq_broker:7.10"
] | null | 8.1 | null | null |
RHSA-2024:6912 | Red Hat Security Advisory: go-toolset:rhel8 security update | net/http: Denial of service due to improper 100-continue handling in net/http encoding/gob: golang: Calling Decoder.Decode on a message which contains deeply nested structures can cause a panic due to stack exhaustion | [
"cpe:/a:redhat:rhel_eus:8.8::appstream"
] | null | 7.5 | null | null |
RHSA-2018:2945 | Red Hat Security Advisory: Red Hat OpenShift Application Runtimes Spring Boot 1.5.16 update | tomcat: A bug in the UTF-8 decoder can lead to DoS | [
"cpe:/a:redhat:openshift_application_runtimes:1.0"
] | null | null | 7.5 | null |
RHSA-2015:0113 | Red Hat Security Advisory: libvncserver security update | libvncserver: integer overflow flaw, leading to a heap-based buffer overflow in screen size handling libvncserver: server stacked-based buffer overflow flaws in file transfer handling | [
"cpe:/o:redhat:rhel_eus:6.5::server"
] | null | null | null | null |
RHSA-2024:1088 | Red Hat Security Advisory: libX11 security update | libX11: InitExt.c can overwrite unintended portions of the Display structure if the extension request leads to a buffer overflow | [
"cpe:/a:redhat:rhel_eus:9.2::appstream"
] | null | 7.3 | null | null |
RHSA-2018:3779 | Red Hat Security Advisory: java-1.7.1-ibm security update | OpenJDK: Incorrect handling of unsigned attributes in signed Jar manifests (Security, 8194534) OpenJDK: Leak of sensitive header data via HTTP redirect (Networking, 8196902) OpenJDK: Incomplete enforcement of the trustURLCodebase restriction (JNDI, 8199177) OpenJDK: Improper field access checks (Hotspot, 8199226) OpenJDK: Missing endpoint identification algorithm check during TLS session resumption (JSSE, 8202613) OpenJDK: Infinite loop in RIFF format reader (Sound, 8205361) libpng: Integer overflow and resultant divide-by-zero in pngrutil.c:png_check_chunk_length() allows for denial of service | [
"cpe:/a:redhat:network_satellite:5.6::el6",
"cpe:/a:redhat:network_satellite:5.7::el6"
] | null | null | 6.5 | null |
RHSA-2015:0644 | Red Hat Security Advisory: openstack-glance security and bug fix update | openstack-glance: user storage quota bypass | [
"cpe:/a:redhat:openstack:6::el7"
] | null | null | null | null |
RHSA-2023:6643 | Red Hat Security Advisory: libssh security update | libssh: NULL pointer dereference during rekeying with algorithm guessing libssh: authorization bypass in pki_verify_data_signature | [
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/o:redhat:enterprise_linux:9::baseos"
] | null | 4.8 | null | null |
RHSA-2007:0662 | Red Hat Security Advisory: httpd security update | httpd scoreboard lack of PID protection | [
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws",
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2013:0158 | Red Hat Security Advisory: tomcat6 security update | Web: Bypass of security constraints | [
"cpe:/a:redhat:jboss_enterprise_web_server:1::el5",
"cpe:/a:redhat:jboss_enterprise_web_server:1::el6"
] | null | null | null | null |
RHSA-2020:3197 | Red Hat Security Advisory: Red Hat Process Automation Manager 7.8.0 Security Update | HTTP/2: flood using PING frames results in unbounded memory growth HTTP/2: flood using HEADERS frames results in unbounded memory growth HTTP/2: flood using SETTINGS frames results in unbounded memory growth HTTP/2: flood using empty frames results in excessive resource consumption apache-commons-beanutils: does not suppresses the class property in PropertyUtilsBean by default cxf: does not restrict the number of message attachments cxf: OpenId Connect token service does not properly validate the clientId libquartz: XXE attacks via job description netty: HTTP request smuggling by mishandled whitespace before the colon in HTTP headers cxf: reflected XSS in the services listing page jackson-databind: lacks certain net.sf.ehcache blocking netty: HTTP request smuggling netty: HttpObjectDecoder.java allows Content-Length header to accompanied by second Content-Length header keycloak: security issue on reset credential flow netty: HTTP Request Smuggling due to Transfer-Encoding whitespace mishandling jackson-databind: Lacks certain xbean-reflect/JNDI blocking jackson-databind: Serialization gadgets in shaded-hikari-config jackson-databind: Serialization gadgets in ibatis-sqlmap jackson-databind: Serialization gadgets in anteros-core jackson-databind: mishandles the interaction between serialization gadgets and typing which could result in remote command execution jackson-databind: mishandles the interaction between serialization gadgets and typing which could result in remote command execution jackson-databind: Serialization gadgets in org.aoju.bus.proxy.provider.*.RmiProvider jackson-databind: Serialization gadgets in javax.swing.JEditorPane jackson-databind: Serialization gadgets in org.apache.activemq.jms.pool.XaPooledConnectionFactory jackson-databind: Serialization gadgets in org.apache.commons.proxy.provider.remoting.RmiProvider jackson-databind: Serialization gadgets in org.apache.openjpa.ee.WASRegistryManagedRuntime netty: compression/decompression codecs don't enforce limits on buffer allocation sizes jackson-databind: Serialization gadgets in org.springframework:spring-aop jackson-databind: Serialization gadgets in commons-jelly:commons-jelly jackson-databind: serialization in oadd.org.apache.xalan.lib.sql.JNDIConnectionPool jackson-databind: serialization in weblogic/oracle-aqjms jackson-databind: serialization in com.sun.org.apache.xalan.internal.lib.sql.JNDIConnectionPool | [
"cpe:/a:redhat:jboss_enterprise_bpms_platform:7.8"
] | null | 8.1 | 7.5 | null |
RHSA-2023:3455 | Red Hat Security Advisory: Release of OpenShift Serverless 1.29.0 | golang.org/x/net/http2: avoid quadratic complexity in HPACK decoding golang: crypto/tls: large handshake records may cause panics golang: net/http, mime/multipart: denial of service from excessive resource consumption golang: net/http, net/textproto: denial of service from excessive memory allocation golang: net/http, net/textproto, mime/multipart: denial of service from excessive resource consumption golang: go/parser: Infinite loop in parsing golang: html/template: backticks not treated as string delimiters containerd: Supplementary groups are not set up properly | [
"cpe:/a:redhat:openshift_serverless:1.29::el8"
] | null | 7.3 | null | null |
RHSA-2019:1236 | Red Hat Security Advisory: .NET Core on Red Hat Enterprise Linux security and bug fix update | dotnet: timeouts for regular expressions are not enforced dotnet: infinite loop in Uri.TryCreate leading to ASP.Net Core Denial of Service dotnet: crash in IPAddress.TryCreate leading to ASP.Net Core Denial of Service | [
"cpe:/a:redhat:rhel_dotnet:1.0::el7",
"cpe:/a:redhat:rhel_dotnet:1.1::el7",
"cpe:/a:redhat:rhel_dotnet:2.1::el7",
"cpe:/a:redhat:rhel_dotnet:2.2::el7"
] | null | null | 7.5 | null |
RHSA-2020:4451 | Red Hat Security Advisory: GNOME security, bug fix, and enhancement update | webkitgtk: Incorrect state management leading to universal cross-site scripting webkitgtk: Multiple memory corruption issues leading to arbitrary code execution webkitgtk: Multiple memory corruption issues leading to arbitrary code execution webkitgtk: Multiple memory corruption issues leading to arbitrary code execution webkitgtk: Incorrect state management leading to universal cross-site scripting webkitgtk: Multiple memory corruption issues leading to arbitrary code execution webkitgtk: Websites could reveal browsing history webkitgtk: Violation of iframe sandboxing policy webkitgtk: Multiple memory corruption issues leading to arbitrary code execution webkitgtk: Multiple memory corruption issues leading to arbitrary code execution webkitgtk: Multiple memory corruption issues leading to arbitrary code execution webkitgtk: Multiple memory corruption issues leading to arbitrary code execution webkitgtk: Multiple memory corruption issues leading to arbitrary code execution webkitgtk: Incorrect state management leading to universal cross-site scripting webkitgtk: Multiple memory corruption issues leading to arbitrary code execution webkitgtk: Multiple memory corruption issues leading to arbitrary code execution webkitgtk: Multiple memory corruption issues leading to arbitrary code execution webkitgtk: Multiple memory corruption issues leading to arbitrary code execution webkitgtk: Multiple memory corruption issues leading to arbitrary code execution webkitgtk: Multiple memory corruption issues leading to arbitrary code execution webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution webkitgtk: Use after free issue may lead to remote code execution webkitgtk: Denial of service via incorrect memory handling webkitgtk: Non-unique security origin for DOM object contexts webkitgtk: Incorrect security check for a top-level DOM object context webkitgtk: Incorrect state management leading to universal cross-site scripting webkitgtk: Multiple memory corruption issues leading to arbitrary code execution webkitgtk: Incorrect processing of file URLs webkitgtk: Race condition allows reading of restricted memory webkitgtk: Memory corruption triggered by a malicious web content webkitgtk: Type confusion leading to arbitrary code execution webkitgtk: Memory consumption issue leading to arbitrary code execution webkitgtk: Memory corruption triggered by a malicious web content webkitgtk: Type confusion leading to arbitrary code execution webkitgtk: Input validation issue leading to cross-site script attack webkitgtk: Logic issue may lead to arbitrary code execution webkitgtk: Memory corruption may lead to arbitrary code execution webkitgtk: Logic issue may lead to cross site scripting webkitgtk: Memory corruption may lead to arbitrary code execution webkitgtk: Memory corruption may lead to arbitrary code execution webkitgtk: Input validation issue may lead to cross site scripting webkitgtk: Logic issue may lead to arbitrary code execution webkitgtk: Command injection in web inspector webkitgtk: Use-after-free may lead to application termination or arbitrary code execution webkitgtk: Out-of-bounds read may lead to unexpected application termination or arbitrary code execution webkitgtk: Use-after-free may lead to application termination or arbitrary code execution webkitgtk: Access issue in content security policy webkitgtk: A logic issue may lead to cross site scripting webkitgtk: input validation issue may lead to a cross site scripting webkitgtk: Use-after-free issue in accessibility/AXObjectCache.cpp webkitgtk: use-after-free via crafted web content gnome-settings-daemon: Red Hat Customer Portal password logged and passed as command line argument when user registers through GNOME control center LibRaw: lack of thumbnail size range check can lead to buffer overflow webkitgtk: Buffer overflow leading to arbitrary code execution webkitgtk: Memory corruption leading to arbitrary code execution webkitgtk: Use-after-free leading to arbitrary code execution | [
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb",
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 8.8 | null | null |
RHSA-2024:3527 | Red Hat Security Advisory: Red Hat AMQ Streams 2.7.0 release and security update | lz4: memory corruption due to an integer overflow bug caused by memmove argument zstd: Race condition allows attacker to access world-readable destination file protobuf-java: timeout in parser leads to DoS zstd: mysql: buffer overrun in util.c apache-commons-text: variable interpolation RCE Apache-Commons-BCEL: arbitrary bytecode produced via out-of-bounds writing json-smart: Uncontrolled Resource Consumption vulnerability in json-smart (Resource Exhaustion) guava: insecure temporary directory creation bouncycastle: potential blind LDAP injection attack using a self-signed certificate bc-java: Out of memory while parsing ASN.1 crafted data in org.bouncycastle.openssl.PEMParser class snappy-java: Missing upper bound check on chunk length in snappy-java can lead to Denial of Service (DoS) impact json-path: stack-based buffer overflow in Criteria.parse method io.vertx/vertx-core: memory leak due to the use of Netty FastThreadLocal data structures in Vertx io.vertx:vertx-core: memory leak when a TCP server is configured with TLS and SNI support quarkus-core: Leak of local configuration properties into Quarkus applications commons-compress: Denial of service caused by an infinite loop for a corrupted DUMP file netty-codec-http: Allocation of Resources Without Limits or Throttling | [
"cpe:/a:redhat:amq_streams:2"
] | null | 5.3 | null | null |
RHSA-2011:0839 | Red Hat Security Advisory: gimp security update | Gimp: Stack-based buffer overflow in Lighting plug-in Gimp: Stack-based buffer overflow in SphereDesigner plug-in Gimp: Stack-based buffer overflow in Gfig plug-in Gimp: Heap-based buffer overflow in Paint Shop Pro (PSP) plug-in | [
"cpe:/o:redhat:enterprise_linux:6::server"
] | null | null | null | null |
RHSA-2024:3060 | Red Hat Security Advisory: gstreamer1-plugins-bad-free security update | gstreamer-plugins-bad: Integer overflow leading to heap overwrite in MXF file handling with uncompressed video gstreamer-plugins-bad: Integer overflow leading to heap overwrite in MXF file handling with AES3 audio gstreamer-plugins-bad: Integer overflow in H.265 video parser leading to stack overwrite | [
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb"
] | null | 5.5 | null | null |
RHSA-2024:2763 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 8.0 security update | undertow: unrestricted request storage leads to memory exhaustion undertow: Cookie Smuggling/Spoofing undertow: directory traversal vulnerability | [
"cpe:/a:redhat:jboss_enterprise_application_platform:8.0"
] | null | 5.3 | null | null |
RHSA-2015:1671 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform security update | PicketLink: PicketLink IDP ignores role based authorization | [
"cpe:/a:redhat:jboss_enterprise_application_platform:6::el7"
] | null | null | null | null |
RHSA-2017:0323 | Red Hat Security Advisory: kernel security update | kernel: dccp: crash while sending ipv6 reset packet kernel: use after free in dccp protocol | [
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | 7.8 | null |
RHSA-2023:3490 | Red Hat Security Advisory: kpatch-patch security update | kernel: net/ulp: use-after-free in listening ULP sockets kernel: udmabuf: improper validation of array index leading to local privilege escalation kernel: netfilter: use-after-free in nf_tables when processing batch requests can lead to privilege escalation | [
"cpe:/o:redhat:rhel_eus:9.0::baseos"
] | null | 7.8 | null | null |
RHSA-2023:1988 | Red Hat Security Advisory: kernel-rt security and bug fix update | kernel: memory corruption in usbmon driver | [
"cpe:/a:redhat:rhel_extras_rt:7"
] | null | 6.7 | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.