id
stringlengths 13
15
| title
stringlengths 29
176
| description
stringlengths 8
32.1k
| cpes
sequencelengths 0
20
| cvss_v4_0
null | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
null |
---|---|---|---|---|---|---|---|
RHSA-2019:2979 | Red Hat Security Advisory: wget security update | wget: do_conversion() heap-based buffer overflow vulnerability | [
"cpe:/o:redhat:rhel_eus:7.5::computenode",
"cpe:/o:redhat:rhel_eus:7.5::server"
] | null | null | 8.8 | null |
RHSA-2011:1369 | Red Hat Security Advisory: httpd security update | httpd: multiple ranges DoS | [
"cpe:/a:redhat:rhel_application_stack:2"
] | null | null | null | null |
RHSA-2023:4945 | Red Hat Security Advisory: thunderbird security update | Mozilla: Full screen notification obscured by file open dialog Mozilla: Full screen notification obscured by external program Mozilla: Memory corruption in IPC CanvasTranslator Mozilla: Memory corruption in IPC ColorPickerShownCallback Mozilla: Memory corruption in IPC FilePickerShownCallback Mozilla: Memory corruption in JIT UpdateRegExpStatics Mozilla: Error reporting methods in SpiderMonkey could have triggered an Out of Memory Exception Mozilla: Push notifications saved to disk unencrypted Mozilla: XLL file extensions were downloadable without warnings Mozilla: Browsing Context potentially not cleared when closing Private Window Mozilla: Memory safety bugs fixed in Firefox 117, Firefox ESR 102.15, Firefox ESR 115.2, Thunderbird 102.15, and Thunderbird 115.2 Mozilla: Memory safety bugs fixed in Firefox 117, Firefox ESR 115.2, and Thunderbird 115.2 | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 8.8 | null | null |
RHSA-2015:1930 | Red Hat Security Advisory: ntp security update | ntp: MITM attacker can force ntpd to make a step larger than the panic threshold ntp: disabling synchronization via crafted KoD packet | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation",
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | null | null |
RHSA-2023:6967 | Red Hat Security Advisory: qt5-qtbase security update | qt: buffer over-read via a crafted reply from a DNS server qt: allows remote attacker to bypass security restrictions caused by flaw in certificate validation qtbase: buffer overflow in QXmlStreamReader qtbase: infinite loops in QXmlStreamReader | [
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb"
] | null | 7.5 | null | null |
RHSA-2020:1216 | Red Hat Security Advisory: qemu-kvm-rhev security, bug fix, and enhancement update | QEMU: qxl: null pointer dereference while releasing spice resources QEMU: slirp: heap buffer overflow during packet reassembly QEMU: block: iscsi: OOB heap access via an unexpected response of iSCSI Server | [
"cpe:/a:redhat:rhev_manager:4.3",
"cpe:/o:redhat:enterprise_linux:7::hypervisor"
] | null | 6 | 7 | null |
RHSA-2023:3380 | Red Hat Security Advisory: apr-util security update | apr-util: out-of-bounds writes in the apr_base64 | [
"cpe:/a:redhat:rhel_aus:8.2::appstream",
"cpe:/a:redhat:rhel_e4s:8.2::appstream",
"cpe:/a:redhat:rhel_tus:8.2::appstream"
] | null | 6.5 | null | null |
RHSA-2019:1429 | Red Hat Security Advisory: CloudForms 4.7.5 security, bug fix and enhancement update | rubygems: Delete directory using symlink when decompressing tar rubygems: Escape sequence injection vulnerability in verbose rubygems: Escape sequence injection vulnerability in gem owner rubygems: Escape sequence injection vulnerability in API response handling rubygems: Installing a malicious gem may lead to arbitrary code execution rubygems: Escape sequence injection vulnerability in errors | [
"cpe:/a:redhat:cloudforms_managementengine:5.10::el7"
] | null | null | 5.3 | null |
RHSA-2023:4037 | Red Hat Security Advisory: bind9.16 security update | bind: named's configured cache size limit can be significantly exceeded | [
"cpe:/a:redhat:rhel_eus:8.6::appstream",
"cpe:/a:redhat:rhel_eus:8.6::crb"
] | null | 7.5 | null | null |
RHSA-2023:5580 | Red Hat Security Advisory: kpatch-patch security update | kernel: use-after-free in l2cap_connect and l2cap_le_connect_req in net/bluetooth/l2cap_core.c kernel: net/sched: Use-after-free vulnerabilities in the net/sched classifiers: cls_fw, cls_u32 and cls_route | [
"cpe:/o:redhat:rhel_e4s:8.2::baseos"
] | null | 7.8 | null | null |
RHSA-2024:0421 | Red Hat Security Advisory: expat security update | expat: use-after free caused by overeager destruction of a shared DTD in XML_ExternalEntityParserCreate | [
"cpe:/o:redhat:rhel_eus:8.6::baseos"
] | null | 7.5 | null | null |
RHSA-2024:0861 | Red Hat Security Advisory: gimp:2.8 security update | gimp: PSD buffer overflow RCE gimp: psp off-by-one RCE | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 7.8 | null | null |
RHSA-2019:1486 | Red Hat Security Advisory: kernel-rt security update | Kernel: tcp: integer overflow while processing SACK blocks allows remote denial of service Kernel: tcp: excessive resource consumption while processing SACK blocks allows remote denial of service kernel: tcp: excessive resource consumption for TCP connections with low MSS allows remote denial of service | [
"cpe:/a:redhat:rhel_extras_rt:7"
] | null | null | 5.3 | null |
RHSA-2022:8207 | Red Hat Security Advisory: openjpeg2 security update | openjpeg: segmentation fault in opj2_decompress due to uninitialized pointer | [
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::crb"
] | null | 5.1 | null | null |
RHSA-2018:2835 | Red Hat Security Advisory: firefox security update | Mozilla: Setting a master password post-Firefox 58 does not delete unencrypted previously stored passwords Mozilla: Crash in TransportSecurityInfo due to cached data | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 6.1 | null |
RHSA-2013:0127 | Red Hat Security Advisory: libvirt security and bug fix update | libvirt: address bus= device= when identicle vendor ID/product IDs usb devices attached are ignored | [
"cpe:/a:redhat:rhel_virtualization:5::client",
"cpe:/a:redhat:rhel_virtualization:5::server"
] | null | null | null | null |
RHSA-2015:0849 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 6.4.0 update | openssl: Bignum squaring may produce incorrect results CLI: Insecure default permissions on history file mod_jk: information leak due to incorrect JkMount/JkUnmount directives processing openssl: only allow ephemeral RSA keys in export ciphersuites (FREAK) wss4j: Apache WSS4J is vulnerable to Bleichenbacher's attack (incomplete fix for CVE-2011-2487) wss4j: Apache WSS4J doesn't correctly enforce the requireSignedEncryptedDataElements property PicketLink: SP does not take Audience condition of a SAML assertion into account PicketLink: Lack of validation for the Destination attribute in a Response element in a SAML assertion | [
"cpe:/a:redhat:jboss_enterprise_application_platform:6.4"
] | null | 6.3 | 5.3 | null |
RHSA-2021:0189 | Red Hat Security Advisory: kpatch-patch security update | kernel: Local buffer overflow in ctnetlink_parse_tuple_filter in net/netfilter/nf_conntrack_netlink.c | [
"cpe:/o:redhat:rhel_eus:8.1::baseos"
] | null | 6.7 | null | null |
RHSA-2014:0189 | Red Hat Security Advisory: mariadb55-mariadb security update | mysql: unspecified DoS related to Optimizer (CPU October 2013) mysql: unspecified flaw related to Replication (CPU October 2013) mysql: unspecified vulnerability related to Partition DoS (CPU Jan 2014) mysql: unspecified vulnerability related to Error Handling DoS (CPU Jan 2014) mysql: command-line tool buffer overflow via long server version string mysql: unspecified vulnerability related to Optimizer DoS (CPU Jan 2014) mysql: unspecified vulnerability related to InnoDB affecting integrity (CPU Jan 2014) mysql: unspecified DoS vulnerability (CPU Jan 2014) mysql: unspecified vulnerability related to Locking DoS (CPU Jan 2014) mysql: unspecified vulnerability related to InnoDB DoS (CPU Jan 2014) mysql: unspecified vulnerability related to Replication DoS (CPU Jan 2014) mysql: unspecified vulnerability related to Optimizer DoS (CPU Jan 2014) | [
"cpe:/a:redhat:rhel_software_collections:1::el6"
] | null | null | null | null |
RHSA-2009:1219 | Red Hat Security Advisory: libvorbis security update | libvorbis: Improper codec headers processing (DoS, ACE) | [
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws",
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws",
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2024:5259 | Red Hat Security Advisory: kernel security update | kernel: FUSE allows UAF reads of write() buffers, allowing theft of (partial) /etc/shadow hashes kernel: net: kernel: UAF in network route management | [
"cpe:/o:redhat:rhel_els:7"
] | null | 7.8 | null | null |
RHSA-2022:7811 | Red Hat Security Advisory: mingw-expat security update | expat: integer overflow in the doProlog function expat: Malformed 2- and 3-byte UTF-8 sequences can lead to arbitrary code execution expat: Namespace-separator characters in "xmlns[:prefix]" attribute values can lead to arbitrary code execution expat: Stack exhaustion in doctype parsing expat: Integer overflow in copyString() expat: Integer overflow in storeRawNames() | [
"cpe:/a:redhat:enterprise_linux:8::crb"
] | null | 9.8 | null | null |
RHSA-2006:0574 | Red Hat Security Advisory: kernel security update | Possible privilege escalation through prctl() and suid_dumpable | [
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2019:4245 | Red Hat Security Advisory: kpatch-patch security update | kpatch: hw: incomplete fix for CVE-2018-12207 | [
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | null | 6.5 | null |
RHSA-2007:0777 | Red Hat Security Advisory: gdm security and bug fix update | Gdm denial of service | [
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2024:6421 | Red Hat Security Advisory: bubblewrap and flatpak security update | flatpak: Access to files outside sandbox for apps using persistent= (--persist) | [
"cpe:/a:redhat:rhel_aus:8.6::appstream",
"cpe:/a:redhat:rhel_e4s:8.6::appstream",
"cpe:/a:redhat:rhel_tus:8.6::appstream",
"cpe:/o:redhat:rhel_aus:8.6::baseos",
"cpe:/o:redhat:rhel_e4s:8.6::baseos",
"cpe:/o:redhat:rhel_tus:8.6::baseos"
] | null | 7.4 | null | null |
RHSA-2021:4134 | Red Hat Security Advisory: thunderbird security update | Mozilla: iframe sandbox rules did not apply to XSLT stylesheets Mozilla: Use-after-free in file picker dialog Mozilla: Firefox could be coaxed into going into fullscreen mode without notification or warning Mozilla: Opportunistic Encryption in HTTP2 could be used to bypass the Same-Origin-Policy on services hosted on other ports Mozilla: Permission Prompt could be overlaid, resulting in user confusion and potential spoofing Mozilla: Javascript alert box could have been spoofed onto an arbitrary domain thunderbird: Memory corruption when processing S/MIME messages Mozilla: Memory safety bugs fixed in Firefox 94 and Firefox ESR 91.3 Mozilla: Use-after-free in HTTP2 Session object | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 8.8 | 6.1 | null |
RHSA-2011:1073 | Red Hat Security Advisory: bash security, bug fix, and enhancement update | bash: Insecure temporary file use in aliasconv.sh, aliasconv.bash, cshtobash (symlink attack) | [
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2022:7184 | Red Hat Security Advisory: thunderbird security update | Mozilla: Matrix SDK bundled with Thunderbird vulnerable to a data corruption issue Mozilla: Matrix SDK bundled with Thunderbird vulnerable to an impersonation attack by malicious server administrators Mozilla: Matrix SDK bundled with Thunderbird vulnerable to a device verification attack Mozilla: Matrix SDK bundled with Thunderbird vulnerable to an impersonation attack Mozilla: Same-origin policy violation could have leaked cross-origin URLs Mozilla: Memory Corruption in JS Engine Mozilla: Denial of Service via window.print Mozilla: Memory safety bugs fixed in Firefox ESR 102.4 and Thunderbird 102.4 | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 8.8 | 6.1 | null |
RHSA-2020:4483 | Red Hat Security Advisory: opensc security, bug fix, and enhancement update | opensc: Out-of-bounds access of an ASN.1 Bitstring in decode_bit_string in libopensc/asn1.c opensc: Out-of-bounds access of an ASN.1 Octet string in asn1_decode_entry in libopensc/asn1.c opensc: Incorrect read operation during parsing of a SETCOS file attribute opensc: Improper handling of buffer limits for CAC certificates opensc: Double free in coolkey_free_private_data in libopensc/card-coolkey.c | [
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 6.4 | null | null |
RHSA-2021:0343 | Red Hat Security Advisory: perl security update | perl: heap-based buffer overflow in regular expression compiler leads to DoS perl: corruption of intermediate language state of compiled regular expression due to integer overflow leads to DoS perl: corruption of intermediate language state of compiled regular expression due to recursive S_study_chunk() calls leads to DoS | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 7.5 | null | null |
RHSA-2022:6169 | Red Hat Security Advisory: thunderbird security update | Mozilla: Address bar spoofing via XSLT error handling Mozilla: Cross-origin XSLT Documents would have inherited the parent's permissions Mozilla: Data race and potential use-after-free in PK11_ChangePW Mozilla: Memory safety bugs fixed in Firefox 104 and Firefox ESR 102.2 Mozilla: Memory safety bugs fixed in Firefox 104, Firefox ESR 102.2, and Firefox ESR 91.13 | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 8.8 | 7.5 | null |
RHSA-2010:0842 | Red Hat Security Advisory: kernel security and bug fix update | kernel: drm ioctls infoleak kernel: wireless: fix 64K kernel heap content leak via ioctl kernel: arbitrary kernel memory write via i915 GEM ioctl kernel: ftrace NULL ptr deref kernel: 64-bit Compatibility Mode Stack Pointer Underflow kernel: niu: buffer overflow for ETHTOOL_GRXCLSRLALL kernel: IA32 System Call Entry Point Vulnerability kernel: sctp: do not reset the packet during sctp_packet_config kernel: pktcdvd ioctl dev_minor missing range check kernel: prevent heap corruption in snd_ctl_new() kvm: invalid selector in fs/gs causes kernel panic kernel: sctp memory corruption in HMAC handling kernel: RDS sockets local privilege escalation | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2023:6227 | Red Hat Security Advisory: qemu-kvm security update | QEMU: VNC: improper I/O watch removal in TLS handshake can lead to remote unauthenticated denial of service | [
"cpe:/a:redhat:rhel_eus:9.0::appstream"
] | null | 7.5 | null | null |
RHSA-2017:2486 | Red Hat Security Advisory: groovy security update | groovy: remote execution of untrusted code in class MethodClosure Groovy: Remote code execution via deserialization | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 9.6 | null |
RHSA-2018:3805 | Red Hat Security Advisory: Red Hat Enterprise Linux 6.7 Extended Update Support One-Month Retirement Notice | This is the one-Month notification for the retirement of Red Hat Enterprise Linux 6.7 Extended Update Support (EUS). This notification applies only to those customers subscribed to the Extended Update Support (EUS) channel for Red Hat Enterprise Linux 6.7. | [
"cpe:/o:redhat:rhel_eus:6.7::computenode",
"cpe:/o:redhat:rhel_eus:6.7::server"
] | null | null | null | null |
RHSA-2013:0193 | Red Hat Security Advisory: JBoss Enterprise Application Platform 5.2.0 update | JBoss: twiddle.sh accepts credentials as command line arguments, exposing them to other local users via a process listing jbossws: Prone to character encoding pattern attack (XML Encryption flaw) jbossws: Prone to Bleichenbacher attack against to be distributed symmetric key Framework: Information (internal server information, classpath, local working directories, session IDs) disclosure CSRF on jmx-console allows invocation of operations on mbeans Console: XSS in invoke operation Cache: NonManagedConnectionFactory will log password in clear text when an exception occurs JBoss invoker servlets do not require authentication JGroups diagnostics service enabled by default with no authentication when a JGroups channel is started apache-cxf: Apache CXF does not verify that elements were signed / encrypted by a particular Supporting Token JBoss: CallerIdentityLoginModule retaining password from previous call if a null password is provided JBoss: SecurityAssociation.getCredential() will return the previous credential if no security context is provided Web: Bypass of security constraints JBoss: AuthorizationInterceptor allows JMX operation to proceed despite authorization failure | [
"cpe:/a:redhat:jboss_enterprise_application_platform:5::el4"
] | null | null | null | null |
RHSA-2020:2284 | Red Hat Security Advisory: ipmitool security update | ipmitool: Buffer overflow in read_fru_area_section function in lib/ipmi_fru.c | [
"cpe:/o:redhat:rhel_aus:7.2::server"
] | null | 8.1 | null | null |
RHSA-2012:1139 | Red Hat Security Advisory: bind-dyndb-ldap security update | bind-dyndb-ldap: named DoS via DNS query with $ in name | [
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2012:1557 | Red Hat Security Advisory: openstack-keystone security, bug fix, and enhancement update | OpenStack: Keystone extension of token validity through token chaining OpenStack: Keystone EC2-style credentials invalidation issue | [
"cpe:/a:redhat:openstack:2::el6"
] | null | null | null | null |
RHSA-2024:1922 | Red Hat Security Advisory: sssd security update | sssd: Race condition during authorization leads to GPO policies functioning inconsistently | [
"cpe:/a:redhat:rhel_eus:8.8::appstream",
"cpe:/a:redhat:rhel_eus:8.8::crb",
"cpe:/o:redhat:rhel_eus:8.8::baseos"
] | null | 7.1 | null | null |
RHSA-2023:1442 | Red Hat Security Advisory: thunderbird security update | nss: Arbitrary memory write via PKCS 12 Mozilla: Incorrect code generation during JIT compilation Mozilla: Potential out-of-bounds when accessing throttled streams Mozilla: Invalid downcast in Worklets Mozilla: URL being dragged from a removed cross-origin iframe into the same tab triggered navigation Mozilla: Memory safety bugs fixed in Firefox 111 and Firefox ESR 102.9 | [
"cpe:/a:redhat:rhel_e4s:8.1::appstream"
] | null | 8.8 | null | null |
RHSA-2023:3465 | Red Hat Security Advisory: kernel security and bug fix update | kernel: net/ulp: use-after-free in listening ULP sockets kernel: udmabuf: improper validation of array index leading to local privilege escalation kernel: netfilter: use-after-free in nf_tables when processing batch requests can lead to privilege escalation | [
"cpe:/a:redhat:rhel_eus:9.0::appstream",
"cpe:/a:redhat:rhel_eus:9.0::crb",
"cpe:/o:redhat:rhel_eus:9.0::baseos"
] | null | 7.8 | null | null |
RHSA-2023:6220 | Red Hat Security Advisory: Errata Advisory for Red Hat OpenShift GitOps v1.10.1 security update | golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487) | [
"cpe:/a:redhat:openshift_gitops:1.10::el8"
] | null | 7.5 | null | null |
RHSA-2016:1477 | Red Hat Security Advisory: java-1.6.0-sun security update | OpenJDK: insufficient restrictions on the use of custom ValueHandler (CORBA, 8079718) OpenJDK: maximum XML name limit not applied to namespace URIs (JAXP, 8148872) JDK: unspecified vulnerability fixed in 6u121, 7u111, and 8u101 (Install) OpenJDK: missing entity replacement limits (JAXP, 8149962) OpenJDK: integer overflows in bytecode streams (Hotspot, 8152479) | [
"cpe:/a:redhat:rhel_extras_oracle_java:5",
"cpe:/a:redhat:rhel_extras_oracle_java:6",
"cpe:/a:redhat:rhel_extras_oracle_java:7"
] | null | null | 4.3 | null |
RHSA-2023:1930 | Red Hat Security Advisory: emacs security update | emacs: command injection vulnerability in org-mode | [
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 7.8 | null | null |
RHSA-2009:0271 | Red Hat Security Advisory: gstreamer-plugins-good security update | gstreamer-plugins-good: heap-based buffer overflow while parsing malformed QuickTime media files via crafted Composition Time To Sample (aka ctts) atom data gstreamer-plugins-good: Array index error while parsing malformed QuickTime media files via crafted Sync Sample (aka stss) atom data gstreamer-plugins-good: heap-based buffer overflow while parsing malformed QuickTime media files via crafted Time-to-sample (stss) atom data | [
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2024:1892 | Red Hat Security Advisory: OpenShift Container Platform 4.15.10 packages and security update | golang: net/http, x/net/http2: unlimited number of CONTINUATION frames causes DoS | [
"cpe:/a:redhat:openshift:4.15::el8",
"cpe:/a:redhat:openshift:4.15::el9",
"cpe:/a:redhat:openshift_ironic:4.15::el9"
] | null | 7.5 | null | null |
RHSA-2011:0462 | Red Hat Security Advisory: jboss-seam security update | JBoss Seam privilege escalation caused by EL interpolation in FacesMessages | [
"cpe:/a:redhat:jboss_enterprise_application_platform:4.3",
"cpe:/a:redhat:jboss_enterprise_application_platform:5.1"
] | null | null | null | null |
RHSA-2023:6403 | Red Hat Security Advisory: httpd and mod_http2 security, bug fix, and enhancement update | httpd: mod_proxy_uwsgi HTTP response splitting | [
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 7.5 | null | null |
RHSA-2014:0423 | Red Hat Security Advisory: openshift-origin-broker security update | OpenShift: openshift-origin-broker plugin allows impersonation | [
"cpe:/a:redhat:openshift:2.0::el6"
] | null | null | null | null |
RHSA-2015:0840 | Red Hat Security Advisory: redhat-access-plugin security update | dashboard: log file arbitrary file retrieval | [
"cpe:/a:redhat:openstack:5::el7"
] | null | null | null | null |
RHSA-2024:3467 | Red Hat Security Advisory: Red Hat OpenStack Platform 16.1 (etcd) security update | golang: html/template: improper handling of HTML-like comments within script contexts golang: html/template: improper handling of special tags within script contexts golang: crypto/tls: panic when processing post-handshake message on QUIC connections golang: crypto/tls: lack of a limit on buffered post-handshake golang: net/http/internal: Denial of Service (DoS) via Resource Consumption via HTTP requests golang: net/http, x/net/http2: unlimited number of CONTINUATION frames causes DoS etcd: Incomplete fix for CVE-2022-41723 in OpenStack Platform etcd: Incomplete fix for CVE-2021-44716 in OpenStack Platform etcd: Incomplete fix for CVE-2023-39325/CVE-2023-44487 in OpenStack Platform | [
"cpe:/a:redhat:openstack:16.1::el8"
] | null | 7.5 | null | null |
RHSA-2020:4004 | Red Hat Security Advisory: tomcat security and bug fix update | tomcat: Session fixation when using FORM authentication tomcat: multiple requests with invalid payload length in a WebSocket frame could lead to DoS | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 7.5 | null | null |
RHSA-2024:8179 | Red Hat Security Advisory: resource-agents security update | pypa/setuptools: Remote code execution via download functions in the package_index module in pypa/setuptools | [
"cpe:/a:redhat:rhel_eus:8.8::highavailability",
"cpe:/a:redhat:rhel_eus:8.8::resilientstorage"
] | null | 8.8 | null | null |
RHSA-2020:5083 | Red Hat Security Advisory: microcode_ctl security, bug fix, and enhancement update | hw: Information disclosure issue in Intel SGX via RAPL interface hw: Vector Register Leakage-Active hw: Fast forward store predictor | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 5.5 | null | null |
RHSA-2023:0046 | Red Hat Security Advisory: xorg-x11-server security update | xorg-x11-server: XkbGetKbdByName use-after-free xorg-x11-server: XTestSwapFakeInput stack overflow xorg-x11-server: XIPassiveUngrab out-of-bounds access xorg-x11-server: XvdiSelectVideoNotify use-after-free xorg-x11-server: ScreenSaverSetAttributes use-after-free xorg-x11-server: XIChangeProperty out-of-bounds access | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 8.8 | null | null |
RHSA-2005:343 | Red Hat Security Advisory: gdk-pixbuf security update | security flaw | [
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws",
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2008:0636 | Red Hat Security Advisory: Red Hat Network Satellite Server Sun Java Runtime security update | OpenJDK JMX allows illegal operations with local monitoring (6332953) Java RE allows Same Origin Policy to be Bypassed (6687932) JDK untrusted applet/application privilege escalation (6661918) Java Web Start Buffer overflow vulnerabilities (6557220) Java Web Start, arbitrary file creation (6703909) Java Web Start arbitrary file creation/deletion file with user permissions (6704077) Java Web Start, untrusted application may determine Cache Location (6704074) | [
"cpe:/a:redhat:network_satellite:5.1::el4"
] | null | null | null | null |
RHSA-2024:6461 | Red Hat Security Advisory: Red Hat OpenShift for Windows Containers 8.1.3 product release & security update | kubelet: Incorrect permissions on Windows containers logs | [
"cpe:/a:redhat:openshift:4.13::el9"
] | null | 6.1 | null | null |
RHSA-2015:2154 | Red Hat Security Advisory: krb5 security, bug fix, and enhancement update | krb5: unauthenticated denial of service in recvauth_common() and others krb5: issues in OTP and PKINIT kdcpreauth modules leading to requires_preauth bypass | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | null | null |
RHSA-2023:3350 | Red Hat Security Advisory: kernel-rt security and bug fix update | kernel: netfilter: use-after-free in nf_tables when processing batch requests can lead to privilege escalation | [
"cpe:/a:redhat:enterprise_linux:8::nfv",
"cpe:/a:redhat:enterprise_linux:8::realtime"
] | null | 7.8 | null | null |
RHSA-2022:0820 | Red Hat Security Advisory: kernel security, bug fix, and enhancement update | kernel: fget: check that the fd still exists after getting a ref to it kernel: possible privileges escalation due to missing TLB flush kernel: cgroups v1 release_agent feature may allow privilege escalation kernel: improper initialization of the "flags" member of the new pipe_buffer kernel: failing usercopy allows for use-after-free exploitation | [
"cpe:/a:redhat:rhel_eus:8.2::crb",
"cpe:/o:redhat:rhel_eus:8.2::baseos"
] | null | 7 | null | null |
RHSA-2014:1997 | Red Hat Security Advisory: kernel security and bug fix update | Kernel: net: guard tcp_set_keepalive against crash kernel: sctp: skb_over_panic when receiving malformed ASCONF chunks kernel: net: sctp: fix panic on duplicate ASCONF chunks kernel: net: sctp: remote memory pressure from excessive queueing kernel: isofs: unbound recursion when processing relocated directories kernel: isofs: unbound recursion when processing relocated directories kernel: udf: Avoid infinite loop when processing indirect ICBs kernel: x86: local privesc due to bad_iret and paranoid entry incompatibility | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | 8.4 | null |
RHSA-2024:6738 | Red Hat Security Advisory: Multicluster Engine for Kubernetes 2.5.7 security updates and bug fixes | go-retryablehttp: url might write sensitive information to log file elliptic: nodejs/elliptic: EDDSA signature malleability due to missing signature length check elliptic: nodejs/elliptic: ECDSA signature malleability due to missing checks elliptic: nodejs/elliptic: ECDSA implementation malleability due to BER-enconded signatures being allowed elliptic: Missing Validation in Elliptic's EDDSA Signature Verification | [
"cpe:/a:redhat:multicluster_engine:2.5::el8"
] | null | 8.2 | null | null |
RHSA-2011:0586 | Red Hat Security Advisory: libguestfs security, bug fix, and enhancement update | libguestfs: missing disk format specifier when adding a disk | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2024:1325 | Red Hat Security Advisory: Red Hat JBoss Web Server 6.0.1 release and security update | openssl: Generating excessively long X9.42 DH keys or checking excessively long X9.42 DH keys or parameters may be very slow tomcat: Open Redirect vulnerability in FORM authentication tomcat: HTTP request smuggling via malformed trailer headers Tomcat: HTTP/2 header handling DoS | [
"cpe:/a:redhat:jboss_enterprise_web_server:6.0"
] | null | 7.5 | null | null |
RHSA-2023:7083 | Red Hat Security Advisory: emacs security update | emacs: command execution via shell metacharacters emacs: command injection vulnerability in htmlfontify.el | [
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 7.8 | null | null |
RHSA-2015:0079 | Red Hat Security Advisory: java-1.7.0-oracle security update | SSL/TLS: Padding Oracle On Downgraded Legacy Encryption attack ICU: font parsing OOB read (OpenJDK 2D, 8055489) OpenJDK: MulticastSocket NULL pointer dereference (Libraries, 8056264) ICU: font parsing OOB read (OpenJDK 2D, 8056276) OpenJDK: incorrect tracking of ChangeCipherSpec during SSL/TLS handshake (JSSE, 8057555) OpenJDK: class verifier insufficient invokespecial calls verification (Hotspot, 8058982) OpenJDK: insecure hsperfdata temporary file handling (Hotspot, 8050807) OpenJDK: phantom references handling issue in garbage collector (Hotspot, 8047125) JDK: unspecified vulnerability fixed in 6u91, 7u75 and 8u31 (Deployment) JDK: unspecified vulnerability fixed in 6u91, 7u75 and 8u31 (Deployment) OpenJDK: directory information leak via file chooser (Swing, 8055304) OpenJDK: incorrect context class loader use in RMI transport (RMI, 8055309) OpenJDK: DER decoder infinite loop (Security, 8059485) OpenJDK: insufficient code privileges checks (JAX-WS, 8054367) JDK: unspecified vulnerability fixed in 7u75 and 8u31 (Serviceability) | [
"cpe:/a:redhat:rhel_extras_oracle_java:5",
"cpe:/a:redhat:rhel_extras_oracle_java:6",
"cpe:/a:redhat:rhel_extras_oracle_java:7"
] | null | null | null | null |
RHSA-2024:4412 | Red Hat Security Advisory: kernel-rt security and bug fix update | kernel: smb: client: fix potential OOBs in smb2_parse_contexts() kernel: netfilter: use-after-free in nft_trans_gc_catchall_sync leads to privilege escalation kernel: netfilter: nft_ct: sanitize layer 3 and 4 protocol number in custom expectations | [
"cpe:/a:redhat:rhel_e4s:9.0::nfv",
"cpe:/a:redhat:rhel_e4s:9.0::realtime"
] | null | 6.1 | null | null |
RHSA-2015:1551 | Red Hat Security Advisory: Red Hat JBoss Fuse Service Works 6.0.0 security update | async-http-client: SSL/TLS certificate verification is disabled under certain conditions async-http-client: missing hostname verification for SSL certificates | [
"cpe:/a:redhat:jboss_fuse_service_works:6.0"
] | null | null | null | null |
RHSA-2017:1583 | Red Hat Security Advisory: bind security and bug fix update | bind: assertion failure while handling responses containing a DNAME answer bind: assertion failure while processing response to an ANY query bind: assertion failure while handling a query response containing inconsistent DNSSEC information bind: assertion failure while handling an unusually-formed DS record response bind: Processing a response containing CNAME or DNAME with unusual order can crash resolver | [
"cpe:/o:redhat:rhel_eus:7.2::computenode",
"cpe:/o:redhat:rhel_eus:7.2::server"
] | null | null | 7.5 | null |
RHSA-2022:6182 | Red Hat Security Advisory: Openshift Logging Security and Bug Fix update (5.3.11) | golang: compress/gzip: stack exhaustion in Reader.Read | [
"cpe:/a:redhat:logging:5.3::el8"
] | null | 7.5 | null | null |
RHSA-2021:5186 | Red Hat Security Advisory: OpenShift Container Platform 4.6.52 security update | log4j: Remote code execution in Log4j 1.x when application is configured to use JMSAppender kube-reporting/hive: Incomplete fix for log4j CVE-2021-44228 and CVE-2021-45046 | [
"cpe:/a:redhat:openshift:4.6::el8"
] | null | 8.1 | null | null |
RHSA-2011:1312 | Red Hat Security Advisory: jbossws-common security update | JBossWS remote Denial of Service | [
"cpe:/a:redhat:jboss_enterprise_application_platform:4.3"
] | null | null | null | null |
RHSA-2021:0084 | Red Hat Security Advisory: Red Hat build of Quarkus 1.7.6 release and security update | apache-httpclient: incorrect handling of malformed authority component in request URIs | [
"cpe:/a:redhat:openshift_application_runtimes:1.0"
] | null | 5.3 | null | null |
RHSA-2019:0049 | Red Hat Security Advisory: systemd security update | systemd: Out-of-bounds heap write in systemd-networkd dhcpv6 option handling systemd: stack overflow when calling syslog from a command with long cmdline systemd: stack overflow when receiving many journald entries | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 7.5 | null |
RHSA-2024:0298 | Red Hat Security Advisory: Red Hat Advanced Cluster Management 2.9.2 security and bug fix container updates | go-git: Maliciously crafted Git server replies can cause DoS on go-git clients go-git: Maliciously crafted Git server replies can lead to path traversal and RCE on go-git clients | [
"cpe:/a:redhat:acm:2.9::el8"
] | null | 8.1 | null | null |
RHSA-2024:6907 | Red Hat Security Advisory: python-setuptools security update | pypa/setuptools: Remote code execution via download functions in the package_index module in pypa/setuptools | [
"cpe:/o:redhat:rhel_aus:8.2::baseos"
] | null | 8.8 | null | null |
RHSA-2022:1519 | Red Hat Security Advisory: Red Hat JBoss Web Server 5.6.2 Security Update | openssl: Infinite loop in BN_mod_sqrt() reachable when parsing certificates | [
"cpe:/a:redhat:jboss_enterprise_web_server:5.6::el7",
"cpe:/a:redhat:jboss_enterprise_web_server:5.6::el8"
] | null | 7.5 | null | null |
RHSA-2012:0084 | Red Hat Security Advisory: seamonkey security update | Mozilla: Same-origin bypass using IPv6-like hostname syntax (MFSA 2012-02) Mozilla: memory safety hazards in 10.0/1.9.2.26 (MFSA 2012-01) | [
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2022:9096 | Red Hat Security Advisory: Red Hat OpenShift support for Windows Containers 7.0.0 [security update] | kubelet: runAsNonRoot logic bypass for Windows containers prometheus/client_golang: Denial of service using InstrumentHandlerCounter golang: crash in a golang.org/x/crypto/ssh server | [
"cpe:/a:redhat:openshift:4.12::el8"
] | null | 7.5 | null | null |
RHSA-2014:0345 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 6.2.2 update | tomcat: multiple content-length header poisoning flaws PicketBox/JBossSX: Unauthorized access to and modification of application server configuration and state by application 6: JSM policy not respected by deployed applications | [
"cpe:/a:redhat:jboss_enterprise_application_platform:6.2.2"
] | null | null | null | null |
RHSA-2024:0235 | Red Hat Security Advisory: java-11-openjdk security update | OpenJDK: array out-of-bounds access due to missing range check in C1 compiler (8314468) OpenJDK: JVM class file verifier flaw allows unverified bytecode execution (8314295) OpenJDK: range check loop optimization issue (8314307) OpenJDK: arbitrary Java code execution in Nashorn (8314284) OpenJDK: logging of digital signature private keys (8316976) OpenJDK: RSA padding issue and timing side-channel attack against TLS (8317547) | [
"cpe:/a:redhat:rhel_eus:8.6::appstream",
"cpe:/a:redhat:rhel_eus:8.6::crb"
] | null | 7.4 | null | null |
RHSA-2004:102 | Red Hat Security Advisory: : Updated gdk-pixbuf packages fix denial of service vulnerability | security flaw | [
"cpe:/o:redhat:linux:9"
] | null | null | null | null |
RHSA-2020:0159 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.2.6 on RHEL 6 security update | hibernate-validator: safeHTML validator allows XSS jackson-databind: Serialization gadgets in com.zaxxer.hikari.HikariConfig EAP: Vault system property security attribute value is revealed on CLI 'reload' command undertow: possible Denial Of Service (DOS) in Undertow HTTP server listening on HTTPS jackson-databind: Serialization gadgets in classes of the commons-configuration package jackson-databind: Serialization gadgets in classes of the xalan package jackson-databind: Serialization gadgets in com.zaxxer.hikari.HikariDataSource netty: HTTP request smuggling by mishandled whitespace before the colon in HTTP headers jackson-databind: Serialization gadgets in org.apache.commons.dbcp.datasources.* jackson-databind: Serialization gadgets in com.p6spy.engine.spy.P6DataSource jackson-databind: Serialization gadgets in classes of the ehcache package jackson-databind: Serialization gadgets in org.apache.log4j.receivers.db.* | [
"cpe:/a:redhat:jboss_enterprise_application_platform:7.2::el6"
] | null | null | 8.1 | null |
RHSA-2005:049 | Red Hat Security Advisory: cups security update | security flaw | [
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws"
] | null | null | null | null |
RHSA-2021:2742 | Red Hat Security Advisory: firefox security update | Mozilla: Use-after-free in accessibility features of a document Mozilla: Memory safety bugs fixed in Firefox 90 and Firefox ESR 78.12 chromium-browser: Out of bounds write in ANGLE | [
"cpe:/a:redhat:rhel_eus:8.2::appstream"
] | null | 8.8 | null | null |
RHSA-2021:4149 | Red Hat Security Advisory: python-pillow security update | python-pillow: Buffer over-read in PCX image reader python-pillow: Buffer over-read in SGI RLE image reader python-pillow: Out-of-bounds read in J2K image reader python-pillow: Out-of-bounds read in J2K image reader python-pillow: Negative-offset memcpy in TIFF image reader python-pillow: Regular expression DoS in PDF format parser python-pillow: Out-of-bounds read in SGI RLE image reader python-pillow: Excessive memory allocation in BLP image reader python-pillow: Excessive memory allocation in ICNS image reader python-pillow: Excessive memory allocation in ICO image reader python-pillow: Excessive memory allocation in PSD image reader python-pillow: Infinite loop in FLI image reader python-pillow: Excessive CPU use in EPS image reader python-pillow: Excessive looping in BLP image reader python-pillow: Buffer overflow in image convert function | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 5.9 | null | null |
RHSA-2024:9277 | Red Hat Security Advisory: oci-seccomp-bpf-hook security update | golang: net: malformed DNS message can cause infinite loop | [
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 7.5 | null | null |
RHSA-2016:2657 | Red Hat Security Advisory: JBoss Enterprise Application Platform 7.0.3 | undertow: Long URL proxy request lead to java.nio.BufferOverflowException and DoS | [
"cpe:/a:redhat:jboss_enterprise_application_platform:7"
] | null | null | 6.5 | null |
RHSA-2007:0208 | Red Hat Security Advisory: w3c-libwww security and bug fix update | Multiple bugs in libwww - one exploitable - in Library/src/HTBound.c | [
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2024:0250 | Red Hat Security Advisory: OpenJDK 21.0.2 security update | OpenJDK: array out-of-bounds access due to missing range check in C1 compiler (8314468) OpenJDK: JVM class file verifier flaw allows unverified bytecode execution (8314295) OpenJDK: range check loop optimization issue (8314307) OpenJDK: logging of digital signature private keys (8316976) OpenJDK: RSA padding issue and timing side-channel attack against TLS (8317547) | [
"cpe:/a:redhat:openjdk:21::windows"
] | null | 7.4 | null | null |
RHSA-2020:4807 | Red Hat Security Advisory: prometheus-jmx-exporter security update | snakeyaml: Billion laughs attack via alias feature | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 7.6 | null | null |
RHSA-2024:9525 | Red Hat Security Advisory: libsoup security update | libsoup: HTTP request smuggling via stripping null bytes from the ends of header names | [
"cpe:/a:redhat:rhel_aus:8.6::appstream",
"cpe:/a:redhat:rhel_e4s:8.6::appstream",
"cpe:/a:redhat:rhel_tus:8.6::appstream",
"cpe:/o:redhat:rhel_aus:8.6::baseos",
"cpe:/o:redhat:rhel_e4s:8.6::baseos",
"cpe:/o:redhat:rhel_tus:8.6::baseos"
] | null | 7.5 | null | null |
RHSA-2024:1868 | Red Hat Security Advisory: Red Hat build of Keycloak security update | keycloak: impersonation via logout token exchange keycloak: secondary factor bypass in step-up authentication keycloak: Log Injection during WebAuthn authentication or registration keycloak: Authorization Bypass keycloak: XSS via assertion consumer service URL in SAML POST-binding flow keycloak: session hijacking via re-authentication keycloak: path transversal in redirection validation keycloak: org.keycloak.protocol.oidc: unvalidated cross-origin messages in checkLoginIframe leads to DDoS | [
"cpe:/a:redhat:build_keycloak:22"
] | null | 7.4 | null | null |
RHSA-2024:8849 | Red Hat Security Advisory: haproxy security update | haproxy: untrimmed URI fragments may lead to exposure of confidential data on static servers | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 5.3 | null | null |
RHSA-2021:2866 | Red Hat Security Advisory: RHV Engine and Host Common Packages security update [ovirt-4.4.7] | ansible: multiple modules expose secured values | [
"cpe:/a:redhat:rhev_manager:4.4:el8",
"cpe:/o:redhat:rhev_hypervisor:4.4::el8"
] | null | 5 | null | null |
RHSA-2015:1631 | Red Hat Security Advisory: ceph-deploy security update | ceph-deploy: keyring permissions are world readable in ~ceph ceph-deploy admin command copies keyring file to /etc/ceph which is world readable | [
"cpe:/a:redhat:ceph_storage:1.2::centos:6"
] | null | null | null | null |
RHSA-2004:165 | Red Hat Security Advisory: ipsec-tools security update | security flaw security flaw security flaw | [
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws"
] | null | null | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.