id
stringlengths 13
15
| title
stringlengths 29
176
| description
stringlengths 8
32.1k
| cpes
sequencelengths 0
20
| cvss_v4_0
null | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
null |
---|---|---|---|---|---|---|---|
RHSA-2023:1468 | Red Hat Security Advisory: kernel security, bug fix, and enhancement update | kernel: tun: avoid double free in tun_free_netdev | [
"cpe:/a:redhat:rhel_eus:9.0::appstream",
"cpe:/a:redhat:rhel_eus:9.0::crb",
"cpe:/o:redhat:rhel_eus:9.0::baseos"
] | null | 7.8 | null | null |
RHSA-2025:3051 | Red Hat Security Advisory: Gatekeeper v3.17.2 | golang.org/x/oauth2/jws: Unexpected memory consumption during token parsing in golang.org/x/oauth2/jws golang.org/x/crypto/ssh: Denial of Service in the Key Exchange of golang.org/x/crypto/ssh | [
"cpe:/a:redhat:gatekeeper:3.17::el9"
] | null | 7.5 | null | null |
RHSA-2024:9281 | Red Hat Security Advisory: python-jwcrypto security update | JWCrypto: denail of service Via specifically crafted JWE | [
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 5.3 | null | null |
RHSA-2023:5224 | Red Hat Security Advisory: thunderbird security update | libwebp: Heap buffer overflow in WebP Codec libwebp: out-of-bounds write with a specially crafted WebP lossless file | [
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 0 | null | null |
RHSA-2007:0310 | Red Hat Security Advisory: openldap security update | security flaw | [
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2009:1470 | Red Hat Security Advisory: openssh security update | openssh: possible privilege escalation when using ChrootDirectory setting | [
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2022:5736 | Red Hat Security Advisory: java-17-openjdk security, bug fix, and enhancement update | OpenJDK: class compilation issue (Hotspot, 8281859) OpenJDK: improper restriction of MethodHandle.invokeBasic() (Hotspot, 8281866) OpenJDK: random exponentials issue (Libraries, 8283875) OpenJDK: integer truncation issue in Xalan-J (JAXP, 8285407) | [
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::crb"
] | null | 7.5 | null | null |
RHSA-2016:1583 | Red Hat Security Advisory: rh-nodejs4-nodejs-minimatch security update | nodejs-minimatch: Regular expression denial-of-service | [
"cpe:/a:redhat:rhel_software_collections:2::el6",
"cpe:/a:redhat:rhel_software_collections:2::el7"
] | null | null | 5.3 | null |
RHSA-2024:1683 | Red Hat Security Advisory: OpenShift Container Platform 4.13.39 bug fix and security update | golang: net/http, x/net/http2: unlimited number of CONTINUATION frames causes DoS | [
"cpe:/a:redhat:openshift:4.13::el8"
] | null | 7.5 | null | null |
RHSA-2019:0717 | Red Hat Security Advisory: kernel security and bug fix update | kernel: Missing check in fs/inode.c:inode_init_owner() does not clear SGID bit on non-directories for non-members | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | 4.4 | null |
RHSA-2014:0440 | Red Hat Security Advisory: Red Hat Enterprise MRG Grid 2.5 security, bug fix, and enhancement update | mongodb: memory over-read via incorrect BSON object length cumin: weak password hashing | [
"cpe:/a:redhat:enterprise_mrg:2:computenode:el6",
"cpe:/a:redhat:enterprise_mrg:2:server:el6"
] | null | null | null | null |
RHSA-2014:0793 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 5.2.0 security update | Seam: RCE via unsafe logging in AuthenticationFilter | [
"cpe:/a:redhat:jboss_enterprise_application_platform:5::el4",
"cpe:/a:redhat:jboss_enterprise_application_platform:5::el5",
"cpe:/a:redhat:jboss_enterprise_application_platform:5::el6"
] | null | null | null | null |
RHSA-2014:1912 | Red Hat Security Advisory: ruby security update | ruby: off-by-one stack-based buffer overflow in the encodes() function ruby: REXML billion laughs attack via parameter entity expansion ruby: REXML incomplete fix for CVE-2014-8080 | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | null | null |
RHSA-2007:1022 | Red Hat Security Advisory: cups security update | Incomplete fix for CVE-2007-0720 CUPS denial of service cups boundary error DCTStream:: readProgressiveDataUnit() DCTStream:: reset() CCITTFaxStream:: lookChar() | [
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2019:3955 | Red Hat Security Advisory: chromium-browser security update | chromium-browser: use-after-free in bluetooth chromium-browser: out-of-bounds access in bluetooth | [
"cpe:/a:redhat:rhel_extras:6"
] | null | null | 6.3 | null |
RHSA-2018:2395 | Red Hat Security Advisory: kernel-rt security and bug fix update | kernel: crypto: privilege escalation in skcipher_recvmsg function Kernel: hw: cpu: L1 terminal fault (L1TF) Kernel: hw: cpu: L1 terminal fault (L1TF) Kernel: speculative bounds check bypass store kernel: TCP segments with random offsets allow a remote denial of service (SegmentSmack) kernel: race condition in snd_seq_write() may lead to UAF or OOB-access kernel: mm: use-after-free in do_get_mempolicy function allows local DoS or other unspecified impact | [
"cpe:/a:redhat:rhel_extras_rt:7"
] | null | null | 5.5 | null |
RHSA-2024:5598 | Red Hat Security Advisory: libreoffice security update | libreoffice: Ability to trust not validated macro signatures removed in high security mode | [
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb"
] | null | 7.8 | null | null |
RHSA-2024:1270 | Red Hat Security Advisory: docker security update | runc: file descriptor leak | [
"cpe:/a:redhat:rhel_extras_other:7"
] | null | 8.6 | null | null |
RHSA-2020:0666 | Red Hat Security Advisory: qemu-kvm security and enhancement update | hw: TSX Transaction Asynchronous Abort (TAA) | [
"cpe:/o:redhat:rhel_eus:7.6::computenode",
"cpe:/o:redhat:rhel_eus:7.6::server"
] | null | null | 6.5 | null |
RHSA-2020:5564 | Red Hat Security Advisory: firefox security update | chromium-browser: Uninitialized Use in V8 Mozilla: Heap buffer overflow in WebGL Mozilla: CSS Sanitizer performed incorrect sanitization Mozilla: Incorrect cast of StyleGenericFlexBasis resulted in a heap use-after-free Mozilla: Internal network hosts could have been probed by a malicious webpage Mozilla: The proxy.onRequest API did not catch view-source URLs Mozilla: Memory safety bugs fixed in Firefox 84 and Firefox ESR 78.6 | [
"cpe:/a:redhat:rhel_eus:8.1::appstream"
] | null | 8.8 | 6.1 | null |
RHSA-2013:1319 | Red Hat Security Advisory: sssd security and bug fix update | sssd: TOCTOU race conditions by copying and removing directory trees | [
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2024:4933 | Red Hat Security Advisory: git-lfs security update | golang: net/http, x/net/http2: unlimited number of CONTINUATION frames causes DoS | [
"cpe:/a:redhat:rhel_aus:8.4::appstream",
"cpe:/a:redhat:rhel_e4s:8.4::appstream",
"cpe:/a:redhat:rhel_tus:8.4::appstream"
] | null | 7.5 | null | null |
RHSA-2023:1512 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.4.10 on RHEL 7 security update | SnakeYaml: Constructor Deserialization Remote Code Execution undertow: Server identity in https connection is not checked by the undertow client snakeyaml: Uncaught exception in java.base/java.util.ArrayList.hashCode hsqldb: Untrusted input may lead to RCE attack dev-java/snakeyaml: DoS via stack overflow codec-haproxy: HAProxyMessageDecoder Stack Exhaustion DoS apache-james-mime4j: Temporary File Information Disclosure in MIME4J TempFileStorageProvider RESTEasy: creation of insecure temp files Undertow: Infinite loop in SslConduit during close | [
"cpe:/a:redhat:jboss_enterprise_application_platform:7.4::el7"
] | null | 7.5 | null | null |
RHSA-2022:7272 | Red Hat Security Advisory: Red Hat JBoss Web Server 5.7.0 release and security update | Tomcat: Information disclosure tomcat: local privilege escalation vulnerability | [
"cpe:/a:redhat:jboss_enterprise_web_server:5.7::el7",
"cpe:/a:redhat:jboss_enterprise_web_server:5.7::el8",
"cpe:/a:redhat:jboss_enterprise_web_server:5.7::el9"
] | null | 7 | null | null |
RHSA-2023:0691 | Red Hat Security Advisory: openvswitch2.17 security, bug fix and enhancement update | openvswitch: Out-of-Bounds Read in Organization Specific TLV openvswitch: Integer Underflow in Organization Specific TLV | [
"cpe:/o:redhat:enterprise_linux:9::fastdatapath"
] | null | 9.8 | null | null |
RHSA-2024:8036 | Red Hat Security Advisory: .NET 6.0 security update | dotnet: Multiple .NET components susceptible to hash flooding dotnet: System.IO.Packaging - Multiple DoS vectors in use of SortedList dotnet: Denial of Service in System.Text.Json | [
"cpe:/a:redhat:rhel_eus:8.8::appstream",
"cpe:/a:redhat:rhel_eus:8.8::crb"
] | null | 7.5 | null | null |
RHSA-2016:2962 | Red Hat Security Advisory: kernel security and bug fix update | kernel: Use-after-free in the recvmmsg exit path | [
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | 8.1 | null |
RHSA-2020:2520 | Red Hat Security Advisory: python security update | python: email.utils.parseaddr wrongly parses email addresses | [
"cpe:/o:redhat:rhel_eus:7.7::computenode",
"cpe:/o:redhat:rhel_eus:7.7::server"
] | null | null | 7.3 | null |
RHSA-2023:0687 | Red Hat Security Advisory: openvswitch2.15 security, bug fix and enhancement update | openvswitch: Out-of-Bounds Read in Organization Specific TLV openvswitch: Integer Underflow in Organization Specific TLV | [
"cpe:/o:redhat:enterprise_linux:8::fastdatapath"
] | null | 9.8 | null | null |
RHSA-2009:0445 | Red Hat Security Advisory: java-1.4.2-ibm security update | Java Web Start File Inclusion via System Properties Override JavaWebStart allows unauthorized network connections Java WebStart privilege escalation Java Web Start BasicService displays local files in the browser Java WebStart allows hidden code privilege escalation Java WebStart unprivileged local file and network access JRE allows unauthorized file access and connections to localhost JRE allows unauthorized memory read access via a crafted ZIP file OpenJDK Denial-Of-Service in kerberos authentication (6588160) OpenJDK allows to list files within the user home directory (6484091) OpenJDK UTF-8 decoder accepts non-shortest form sequences (4486841) OpenJDK calendar object deserialization allows privilege escalation (6734167) OpenJDK Privilege escalation in command line applications (6733959) OpenJDK Buffer overflow in image processing (6726779) OpenJDK temporary files have guessable file names (6721753) | [
"cpe:/a:redhat:rhel_extras:3",
"cpe:/a:redhat:rhel_extras:4",
"cpe:/a:redhat:rhel_extras:5::client",
"cpe:/a:redhat:rhel_extras:5::server"
] | null | null | null | null |
RHSA-2018:0008 | Red Hat Security Advisory: kernel security update | An update for kernel is now available for Red Hat Enterprise Linux 6.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
[Updated 23rd January 2019]
The text has been updated to correct the list of architectures addressed by the CVE-2017-5753 mitigation. No changes have been made to the packages. | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2008:0648 | Red Hat Security Advisory: tomcat security update | tomcat: Cross-Site-Scripting enabled by sendError call Tomcat host manager xss - name field tomcat RequestDispatcher information disclosure vulnerability tomcat Unicode directory traversal vulnerability | [
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2024:0622 | Red Hat Security Advisory: firefox security update | Mozilla: Out of bounds write in ANGLE Mozilla: Failure to update user input timestamp Mozilla: Crash when listing printers on Linux Mozilla: Bypass of Content Security Policy when directive unsafe-inline was set Mozilla: Phishing site popup could show local origin in address bar Mozilla: Potential permissions request bypass via clickjacking Mozilla: Privilege escalation through devtools Mozilla: HSTS policy on subdomain could bypass policy of upper domain Mozilla: Memory safety bugs fixed in Firefox 122, Firefox ESR 115.7, and Thunderbird 115.7 | [
"cpe:/a:redhat:rhel_eus:8.6::appstream"
] | null | 8.8 | null | null |
RHSA-2024:5882 | Red Hat Security Advisory: orc:0.4.28 security update | orc: Stack-based buffer overflow vulnerability in ORC | [
"cpe:/a:redhat:rhel_aus:8.2::appstream"
] | null | 6.7 | null | null |
RHSA-2013:0841 | Red Hat Security Advisory: kernel security update | kernel: perf_swevent_enabled array out-of-bound access | [
"cpe:/o:redhat:rhel_eus:6.1"
] | null | null | null | null |
RHSA-2024:11091 | Red Hat Security Advisory: python36:3.6 security update | virtualenv: potential command injection via virtual environment activation scripts | [
"cpe:/a:redhat:rhel_aus:8.2::appstream"
] | null | 7.8 | null | null |
RHSA-2021:2569 | Red Hat Security Advisory: libxml2 security update | libxml2: Use-after-free in xmlEncodeEntitiesInternal() in entities.c libxml2: Heap-based buffer overflow in xmlEncodeEntitiesInternal() in entities.c libxml2: Use-after-free in xmlXIncludeDoProcess() in xinclude.c libxml2: NULL pointer dereference when post-validating mixed content parsed in recovery mode libxml2: Exponential entity expansion attack bypasses all existing protection mechanisms | [
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 6.5 | null | null |
RHSA-2015:2507 | Red Hat Security Advisory: java-1.7.0-ibm security update | OpenJDK: kerberos realm name leak (JGSS, 8048030) OpenJDK: inefficient use of hash tables and lists during XML parsing (JAXP, 8068842) OpenJDK: missing checks for proper initialization in ObjectStreamClass (Serialization, 8103671) OpenJDK: HttpURLConnection header restriction bypass (Libraries, 8130193) JDK: unspecified vulnerability fixed in 7u91 and 8u65 (Deployment) OpenJDK: insufficient permission checks in StubGenerator (CORBA, 8076383) OpenJDK: OOB access in CMS code (2D, 8086092) OpenJDK: leak of user.dir location (JAXP, 8078427) OpenJDK: java.nio Buffers integer overflow issues (Libraries, 8130891) ICU: missing boundary checks in layout engine (OpenJDK 2D, 8132042) OpenJDK: incorrect access control context used in DGCImpl (RMI, 8080688) OpenJDK: protected methods can be used as interface methods via DirectMethodHandle (Libraries) OpenJDK: incomplete constraints enforcement by AlgorithmChecker (Security, 8131291) OpenJDK: incorrect String object deserialization in IIOPInputStream (CORBA, 8076387) OpenJDK: incorrect access control context used in DGCClient (RMI, 8076413) OpenJDK: incomplete MaxXMLNameLimit enforcement (JAXP, 8086733) JDK: unspecified vulnerability fixed in 6u105, 7u91 and 8u65 (Deployment) OpenJDK: insufficient proxy class checks in RemoteObjectInvocationHandler (RMI, 8076339) JDK: local disclosure of kerberos credentials cache | [
"cpe:/a:redhat:rhel_extras:5::client",
"cpe:/a:redhat:rhel_extras:5::server"
] | null | null | null | null |
RHSA-2021:3273 | Red Hat Security Advisory: Red Hat OpenShift Service Mesh 1.1.17.1 security update | envoyproxy/envoy: HTTP request with multiple value headers can bypass authorization policies envoyproxy/envoy: HTTP request with a URL fragment in the URI can bypass authorization policies envoyproxy/envoy: denial of service when using extensions that modify request or response sizes istio/istio: HTTP request can bypass authorization mechanisms due to case insensitive host comparison istio/istio: HTTP request with fragment in URI can bypass authorization mechanisms | [
"cpe:/a:redhat:service_mesh:1.1::el8"
] | null | 8.3 | null | null |
RHSA-2015:0797 | Red Hat Security Advisory: xorg-x11-server security update | xorg-x11-server: information leak in the XkbSetGeometry request of X servers | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation",
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | null | null |
RHSA-2022:2200 | Red Hat Security Advisory: .NET 5.0 security, bug fix, and enhancement update | dotnet: excess memory allocation via HttpClient causes DoS dotnet: malicious content causes high CPU and memory usage dotnet: parsing HTML causes Denial of Service | [
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb"
] | null | 7.5 | null | null |
RHSA-2022:8849 | Red Hat Security Advisory: Red Hat OpenStack Platform 16.2.4 (python-XStatic-Angular) security update | AngularJS: Prototype pollution in merge function could result in code injection | [
"cpe:/a:redhat:openstack:16.2::el8"
] | null | 7.5 | null | null |
RHSA-2024:0399 | Red Hat Security Advisory: gnutls security update | gnutls: timing side-channel in the RSA-PSK authentication | [
"cpe:/a:redhat:rhel_eus:8.8::appstream",
"cpe:/o:redhat:rhel_eus:8.8::baseos"
] | null | 5.9 | null | null |
RHSA-2024:2737 | Red Hat Security Advisory: Red Hat OpenStack Platform 17.1 (python-openstackclient) security update | openstack: deleting a non existing access rule deletes another existing access rule in it's scope | [
"cpe:/a:redhat:openstack:17.1::el9"
] | null | 5.5 | null | null |
RHSA-2017:0988 | Red Hat Security Advisory: qemu-kvm-rhev security update | Qemu: cirrus: heap buffer overflow via vnc connection Qemu: display: cirrus: OOB read access issue Qemu: display: cirrus: OOB r/w access issues in bitblt routines | [
"cpe:/a:redhat:openstack:10::el7"
] | null | null | 5.5 | null |
RHSA-2023:5361 | Red Hat Security Advisory: nodejs:16 security, bug fix, and enhancement update | nodejs-semver: Regular expression denial of service nodejs: mainModule.proto bypass experimental policy mechanism nodejs: process interuption due to invalid Public Key information in x509 certificates nodejs: HTTP Request Smuggling via Empty headers separated by CR nodejs: DiffieHellman do not generate keys after setting a private key nodejs: Permissions policies can be bypassed via Module._load nodejs: Permissions policies can impersonate other modules in using module.constructor.createRequire() nodejs: Permissions policies can be bypassed via process.binding | [
"cpe:/a:redhat:rhel_eus:8.6::appstream"
] | null | 7.5 | null | null |
RHSA-2015:1647 | Red Hat Security Advisory: mariadb55-mariadb security update | mysql: unspecified vulnerability related to Server:InnoDB:DML (CPU April 2015) mysql: unspecified vulnerability related to Server:Security:Encryption (CPU April 2015) mysql: unspecified vulnerability related to Server:Federated (CPU April 2015) mysql: unspecified vulnerability related to Server:Compiling (CPU April 2015) mysql: unspecified vulnerability related to Server:DDL (CPU April 2015) mysql: unspecified vulnerability related to Server:Security:Privileges (CPU April 2015) mysql: unspecified vulnerability related to Server:Optimizer (CPU April 2015) mysql: unspecified vulnerability related to Server:DDL (CPU April 2015) mysql: unspecified vulnerability related to Server:GIS (CPU July 2015) mysql: unspecified vulnerability related to Server:Security:Privileges (CPU July 2015) mysql: unspecified vulnerability related to Server:Optimizer (CPU July 2015) mysql: unspecified vulnerability related to Server:DML (CPU July 2015) mysql: use of SSL/TLS can not be enforced in mysql client library (oCERT-2015-003, BACKRONYM) mysql: unspecified vulnerability related to Server:Pluggable Auth (CPU July 2015) mysql: unspecified vulnerability related to Server:I_S (CPU July 2015) mysql: unspecified vulnerability related to Server:Optimizer (CPU July 2015) mysql: unspecified vulnerability related to Server:Security:Privileges (CPU October 2015) | [
"cpe:/a:redhat:rhel_software_collections:2::el6",
"cpe:/a:redhat:rhel_software_collections:2::el7"
] | null | null | null | null |
RHSA-2021:3146 | Red Hat Security Advisory: ACS 3.64 security and enhancement update | golang: net: lookup functions may return invalid host names golang: net/http/httputil: ReverseProxy forwards connection headers if first one is empty golang: math/big.Rat: may cause a panic or an unrecoverable fatal error if passed inputs with very large exponents golang: crypto/tls: certificate of wrong type is causing TLS client to panic | [
"cpe:/a:redhat:advanced_cluster_security:3.64::el8"
] | null | 6.5 | null | null |
RHSA-2014:0740 | Red Hat Security Advisory: kernel security and bug fix update | kernel: net: rds: dereference of a NULL device in rds_ib_laddr_check() kernel: block: floppy: privilege escalation via FDRAWCMD floppy ioctl command kernel: block: floppy: privilege escalation via FDRAWCMD floppy ioctl command | [
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2023:7531 | Red Hat Security Advisory: pixman security update | pixman: Integer overflow in pixman_sample_floor_y leading to heap out-of-bounds write | [
"cpe:/a:redhat:rhel_eus:8.8::appstream"
] | null | 7 | null | null |
RHSA-2018:1062 | Red Hat Security Advisory: kernel security, bug fix, and enhancement update | kernel: unlimiting the stack disables ASLR kernel: media: use-after-free in [tuner-xc2028] media driver kernel: Buffer overflow in firewire driver via crafted incoming packets hw: cpu: speculative execution branch target injection hw: cpu: speculative execution permission faults handling kernel: drm/vmwgfx: fix integer overflow in vmw_surface_define_ioctl() kernel: Use-after-free vulnerability in DCCP socket kernel: Incorrect type conversion for size during dma allocation Kernel: kvm: nVMX: L2 guest could access hardware(L0) CR8 register kernel: memory leak when merging buffers in SCSI IO vectors kernel: v4l2: disabled memory access protection mechanism allowing privilege escalation kernel: Buffer over-read in keyring subsystem allows exposing potentially sensitive information to local attacker kernel: Missing permission check in move_pages system call kernel: Null pointer dereference in rngapi_reset function kernel: vfs: BUG in truncate_inode_pages_range() and fuse client kernel: Use-after-free in userfaultfd_event_wait_completion function in userfaultfd.c kernel: Improper error handling of VM_SHARED hugetlbfs mapping in mm/hugetlb.c kernel: net: double-free and memory corruption in get_net_ns_by_id() kernel: Use-after-free in snd_seq_ioctl_create_port() kernel: dereferencing NULL payload with nonzero length kernel: Missing capabilities check in net/netfilter/nfnetlink_cthelper.c allows for unprivileged access to systemwide nfnl_cthelper_list structure kernel: Missing namespace check in net/netlink/af_netlink.c allows for network monitors to observe systemwide activity kernel: Unallocated memory access by malicious USB device via bNumInterfaces overflow kernel: netfilter: use-after-free in tcpmss_mangle_packet function in net/netfilter/xt_TCPMSS.c kernel: Race condition in drivers/md/dm.c:dm_get_from_kobject() allows local users to cause a denial of service kernel: improper keyrings creation kernel: kvm: Reachable BUG() on out-of-bounds guest IRQ Kernel: KVM: DoS via write flood to I/O port 0x80 kernel: Stack information leak in the EFS element kernel: Null pointer dereference in fs/cifs/cifsencrypt.c:setup_ntlmv2_rsp() when empty TargetInfo is returned in NTLMSSP setup negotiation response allowing to crash client's kernel kernel: Kernel address information leak in drivers/acpi/sbshc.c:acpi_smbus_hc_add() function potentially allowing KASLR bypass kernel: Integer overflow in futex.c:futux_requeue can lead to denial of service or unspecified impact kernel: Race condition in sound system can lead to denial of service | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 4.7 | null |
RHSA-2024:0777 | Red Hat Security Advisory: jenkins and jenkins-2-plugins security update | snakeyaml: Denial of Service due to missing nested depth limitation for collections maven-shared-utils: Command injection via Commandline class apache-commons-text: variable interpolation RCE guava: insecure temporary directory creation jenkins-2-plugins/script-security: Sandbox bypass vulnerability in Script Security Plugin jenkins-2-plugins/JUnit: Stored XSS vulnerability in JUnit Plugin jenkins-2-plugins/pipeline-build-step: Stored XSS vulnerability in Pipeline: Build Step Plugin jackson-databind: denial of service via cylic dependencies Jenkins: Session fixation vulnerability in OpenShift Login Plugin Jenkins: Open redirect vulnerability in OpenShift Login Plugin golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487) jenkins-plugins: cloudbees-folder: CSRF vulnerability in Folders Plugin may approve unsandboxed scripts jenkins-plugins: cloudbees-folder: CSRF vulnerability in Folders Plugin jenkins-plugins: cloudbees-folder: Information disclosure in Folders Plugin jenkins-plugins: config-file-provider: Improper masking of credentials in Config File Provider Plugin jenkins-plugins: blueocean: CSRF vulnerability in Blue Ocean Plugin allows capturing credentials HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack) | [
"cpe:/a:redhat:ocp_tools:4.14::el8"
] | null | 7.5 | null | null |
RHSA-2021:0603 | Red Hat Security Advisory: Red Hat Decision Manager 7.10.0 security update | log4j: improper validation of certificate with host mismatch in SMTP appender apache-httpclient: incorrect handling of malformed authority component in request URIs wildfly: XML validation manipulation due to incomplete application of use-grammar-pool-only in xercesImpl hibernate-core: SQL injection vulnerability when both hibernate.use_sql_comments and JPQL String literals are used | [
"cpe:/a:redhat:jboss_enterprise_brms_platform:7.10"
] | null | 7.4 | null | null |
RHSA-2016:2778 | Red Hat Security Advisory: atomic-openshift-utils security and bug fix update | ansible: Command injection by compromised server via fact variables | [
"cpe:/a:redhat:openshift:3.2::el7",
"cpe:/a:redhat:openshift:3.3::el7"
] | null | null | 7.6 | null |
RHSA-2022:4943 | Red Hat Security Advisory: OpenShift Container Platform 4.10.18 packages and security update | cri-o: memory exhaustion on the node when access to the kube api | [
"cpe:/a:redhat:openshift:4.10::el8"
] | null | 6.8 | null | null |
RHSA-2022:7006 | Red Hat Security Advisory: java-1.8.0-openjdk security update | OpenJDK: improper handling of long NTLM client hostnames (Security, 8286526) OpenJDK: insufficient randomization of JNDI DNS port numbers (JNDI, 8286910) OpenJDK: excessive memory allocation in X.509 certificate parsing (Security, 8286533) OpenJDK: HttpServer no connection count limit (Lightweight HTTP Server, 8286918) | [
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb"
] | null | 5.3 | null | null |
RHSA-2024:4717 | Red Hat Security Advisory: thunderbird security update | Mozilla: Race condition in permission assignment Mozilla: Memory corruption in NSS Mozilla: Memory corruption in thread creation Mozilla: Memory safety bugs fixed in Firefox 128, Firefox ESR 115.13, and Thunderbird 115.13 | [
"cpe:/a:redhat:rhel_aus:8.2::appstream"
] | null | 7.5 | null | null |
RHSA-2023:5693 | Red Hat Security Advisory: Red Hat Ceph Storage 6.1 security, enhancement, and bug fix update | bootstrap: Cross-site Scripting (XSS) in the data-target property of scrollspy bootstrap: XSS in the tooltip data-viewport attribute bootstrap: XSS in the affix configuration target property rgw: improperly verified POST keys ceph: RGW crash upon misconfigured CORS rule | [
"cpe:/a:redhat:ceph_storage:6.1::el9"
] | null | 2.6 | 6.1 | null |
RHSA-2018:3834 | Red Hat Security Advisory: ghostscript security and bug fix update | ghostscript: Uninitialized memory access in the aesdecode operator (699665) ghostscript: Incorrect free logic in pagedevice replacement (699664) ghostscript: Incorrect "restoration of privilege" checking when running out of stack during exception handling ghostscript: User-writable error exception table ghostscript: Saved execution stacks can leak operator arrays (incomplete fix for CVE-2018-17183) ghostscript: Saved execution stacks can leak operator arrays ghostscript: 1Policy operator allows a sandbox protection bypass ghostscript: Type confusion in setpattern (700141) ghostscript: Improperly implemented security check in zsetdevice function in psi/zdevice.c | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 7.3 | null |
RHSA-2014:0374 | Red Hat Security Advisory: Red Hat JBoss Data Grid 6.2.1 update | tomcat: multiple content-length header poisoning flaws XStream: remote code execution due to insecure XML deserialization | [
"cpe:/a:redhat:jboss_data_grid:6.2.1"
] | null | null | null | null |
RHEA-2024:8852 | Red Hat Enhancement Advisory: libproxy bug fix and enhancement update | libproxy: sending more than 102400 bytes in PAC without a Content-Length present could result in buffer overflow | [
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb",
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 7.5 | null | null |
RHSA-2010:0659 | Red Hat Security Advisory: httpd security and bug fix update | mod_dav: DoS (httpd child process crash) by parsing URI structure with missing path segments httpd: Reverse proxy sends wrong responses after time-outs | [
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2024:2366 | Red Hat Security Advisory: freeglut security update | freeglut: memory leak via glutAddSubMenu() function freeglut: memory leak via glutAddMenuEntry() function | [
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 5.3 | null | null |
RHSA-2024:2184 | Red Hat Security Advisory: libsndfile security update | libsndfile: integer overflow in src/mat4.c and src/au.c leads to DoS | [
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::crb"
] | null | 7.8 | null | null |
RHSA-2018:0516 | Red Hat Security Advisory: qemu-kvm security update | Qemu: cirrus: OOB access issue in mode4and5 write functions | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | 4.4 | null |
RHSA-2015:1603 | Red Hat Security Advisory: flash-plugin security update | flash-plugin: multiple code execution flaws (APSB15-19) flash-plugin: multiple code execution flaws (APSB15-19) flash-plugin: multiple code execution flaws (APSB15-19) flash-plugin: multiple code execution flaws (APSB15-19) flash-plugin: multiple code execution flaws (APSB15-19) flash-plugin: multiple code execution flaws (APSB15-19) flash-plugin: multiple code execution flaws (APSB15-19) flash-plugin: multiple code execution flaws (APSB15-19) flash-plugin: multiple code execution flaws (APSB15-19) flash-plugin: multiple code execution flaws (APSB15-19) flash-plugin: multiple code execution flaws (APSB15-19) flash-plugin: multiple code execution flaws (APSB15-19) flash-plugin: multiple code execution flaws (APSB15-19) flash-plugin: multiple code execution flaws (APSB15-19) flash-plugin: multiple code execution flaws (APSB15-19) flash-plugin: multiple code execution flaws (APSB15-19) flash-plugin: multiple code execution flaws (APSB15-19) flash-plugin: multiple code execution flaws (APSB15-19) flash-plugin: multiple code execution flaws (APSB15-19) flash-plugin: multiple code execution flaws (APSB15-19) flash-plugin: multiple code execution flaws (APSB15-19) flash-plugin: multiple code execution flaws (APSB15-19) flash-plugin: multiple code execution flaws (APSB15-19) flash-plugin: multiple code execution flaws (APSB15-19) flash-plugin: multiple code execution flaws (APSB15-19) flash-plugin: multiple code execution flaws (APSB15-19) flash-plugin: multiple code execution flaws (APSB15-19) flash-plugin: multiple code execution flaws (APSB15-19) flash-plugin: multiple code execution flaws (APSB15-19) flash-plugin: multiple code execution flaws (APSB15-19) flash-plugin: multiple code execution flaws (APSB15-19) flash-plugin: multiple code execution flaws (APSB15-19) flash-plugin: multiple code execution flaws (APSB15-19) | [
"cpe:/a:redhat:rhel_extras:5::client",
"cpe:/a:redhat:rhel_extras:5::server",
"cpe:/a:redhat:rhel_extras:6"
] | null | null | null | null |
RHSA-2016:0617 | Red Hat Security Advisory: kernel security and bug fix update | kernel: pipe buffer state corruption after unsuccessful atomic read from pipe | [
"cpe:/o:redhat:rhel_eus:6.6::computenode",
"cpe:/o:redhat:rhel_eus:6.6::server"
] | null | null | null | null |
RHSA-2021:4954 | Red Hat Security Advisory: thunderbird security update | nss: Memory corruption in decodeECorDsaSignature with DSA signatures (and RSA-PSS) | [
"cpe:/a:redhat:rhel_eus:8.2::appstream"
] | null | 9.8 | null | null |
RHSA-2009:0337 | Red Hat Security Advisory: php security update | php: buffer overflow in the imageloadfont function in gd extension php: FastCGI module DoS via multiple dots preceding the extension php: libgd imagerotate() array index error memory disclosure php: Heap-based buffer overflow in the mbstring extension via crafted string containing a HTML entity (arb code execution) PHP mbstring.func_overload web server denial of service | [
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws",
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2016:1581 | Red Hat Security Advisory: kernel security update | kernel: infiniband: Unprivileged process can overwrite kernel memory using rdma_ucm.ko | [
"cpe:/o:redhat:rhel_aus:6.4::server"
] | null | null | 7.8 | null |
RHSA-2017:0249 | Red Hat Security Advisory: Red Hat JBoss BPM Suite security update | pdfbox: XML External Entity vulnerability tika: XML External Entity vulnerability JBoss bpms 6.3.x cookie does not set httponly bpms: stored XSS in dashbuilder | [
"cpe:/a:redhat:jboss_bpms:6.4"
] | null | null | 4.2 | null |
RHSA-2014:1256 | Red Hat Security Advisory: Red Hat JBoss Web Server 2.1.0 openssl security update | openssl: DTLS packet processing double free openssl: DTLS memory exhaustion openssl: information leak in pretty printing functions openssl: DTLS anonymous (EC)DH denial of service | [
"cpe:/a:redhat:jboss_enterprise_web_server:2.1"
] | null | null | null | null |
RHSA-2021:0548 | Red Hat Security Advisory: nodejs:10 security update | nodejs-yargs-parser: prototype pollution vulnerability nodejs-npm-user-validate: improper input validation when validating user emails leads to ReDoS nodejs-y18n: prototype pollution vulnerability nodejs-ini: Prototype pollution via malicious INI file nodejs-dot-prop: prototype pollution libuv: buffer overflow in realpath nodejs: use-after-free in the TLS implementation nodejs: HTTP request smuggling via two copies of a header field in an http request npm: sensitive information exposure through logs nodejs-ajv: prototype pollution via crafted JSON schema in ajv.validate function | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 5.6 | 4.3 | null |
RHSA-2016:0458 | Red Hat Security Advisory: bind97 security update | bind: malformed packet sent to rndc can trigger assertion failure bind: malformed signature records for DNAME records can trigger assertion failure | [
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2024:9158 | Red Hat Security Advisory: lldpd security update | lldp/openvswitch: denial of service via externally triggered memory leak lldpd: out-of-bounds read when decoding SONMP packets lldpd: CDP PDU Packet cdp.c out-of-bounds read | [
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 7.5 | null | null |
RHSA-2006:0156 | Red Hat Security Advisory: ethereal security update | security flaw security flaw security flaw | [
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws"
] | null | null | null | null |
RHSA-2021:1051 | Red Hat Security Advisory: RHV-H enhancement and security update (redhat-virtualization-host) 4.3.14 | lldp/openvswitch: denial of service via externally triggered memory leak | [
"cpe:/o:redhat:enterprise_linux:7::hypervisor"
] | null | 7.5 | null | null |
RHSA-2020:1054 | Red Hat Security Advisory: mailman security and bug fix update | mailman: Cross-site scripting vulnerability allows malicious listowners to inject scripts into listinfo pages mailman: Mishandled URLs in Utils.py:GetPathPieces() allows attackers to display arbitrary text on trusted sites | [
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 4.3 | null |
RHSA-2023:0017 | Red Hat Security Advisory: OpenShift Container Platform 4.8.56 packages and security update | http2-server: Invalid HTTP/2 requests cause DoS Libraries: Untrusted users can modify some Pipeline libraries in Pipeline Shared Groovy Libraries Plugin plugin: Sandbox bypass vulnerability through implicitly allowlisted platform Groovy files in Pipeline: Groovy Plugin plugin: CSRF vulnerability in Script Security Plugin plugin: Mercurial SCM plugin can check out from the controller file system plugin: User-scoped credentials exposed to other users by Pipeline SCM API for Blue Ocean Plugin plugin: CSRF vulnerability in Blue Ocean Plugin plugin: missing permission checks in Blue Ocean Plugin jenkins: Observable timing discrepancy allows determining username validity jenkins-plugin/junit: Stored XSS vulnerability in JUnit Plugin jenkins-plugin: Arbitrary file write vulnerability in Pipeline Input Step Plugin jenkins-plugin: Man-in-the-Middle (MitM) in org.jenkins-ci.plugins:git-client jenkins-plugin: Cross-site Request Forgery (CSRF) in org.jenkins-ci.plugins:git plugin: Lack of authentication mechanism in Git Plugin webhook plugin: Lack of authentication mechanism in Git Plugin webhook plugin: Non-constant time webhook signature comparison in GitHub Plugin | [
"cpe:/a:redhat:openshift:4.8::el8"
] | null | 5.3 | null | null |
RHSA-2022:0163 | Red Hat Security Advisory: Cryostat security update | golang: net/http: limit growth of header canonicalization cache | [
"cpe:/a:redhat:cryostat:2::el8"
] | null | 7.5 | null | null |
RHSA-2022:6755 | Red Hat Security Advisory: java-1.7.1-ibm security update | OpenJDK: Incomplete enforcement of JAR signing disabled algorithms (Libraries, 8249906) | [
"cpe:/a:redhat:rhel_extras:7"
] | null | 5.3 | null | null |
RHSA-2024:0412 | Red Hat Security Advisory: kernel security and bug fix update | kernel: swiotlb information leak with DMA_FROM_DEVICE kernel: uninitialized registers on stack in nft_do_chain can cause kernel pointer leakage to UM kernel: use-after-free in ath9k_htc_probe_device() could cause an escalation of privileges kernel: race condition in xfrm_probe_algs can lead to OOB read/write kernel: race condition in hugetlb_no_page() in mm/hugetlb.c kernel: data races around sk->sk_prot kernel: USB-accessible buffer overflow in brcmfmac kernel: l2tp: missing lock when clearing sk_user_data can lead to NULL pointer dereference kernel: igmp: use-after-free in ip_check_mc_rcu when opening and closing inet sockets kernel: Unprivileged users may use PTRACE_SEIZE to set PTRACE_O_SUSPEND_SECCOMP option hw: Intel: Gather Data Sampling (GDS) side channel vulnerability kernel: Report vmalloc UAF in dvb-core/dmxdev kernel: null-ptr-deref vulnerabilities in sl_tx_timeout in drivers/net/slip kernel: memory corruption in usbmon driver kernel: NULL pointer dereference in traffic control subsystem kernel: NULL pointer dereference in rawv6_push_pending_frames kernel: HID: check empty report_list in hid_validate_values() kernel: hid: Use After Free in asus_remove() kernel: use-after-free in smb2_is_status_io_timeout() kernel: use-after-free caused by invalid pointer hostname in fs/cifs/connect.c kernel: denial of service in tipc_conn_close kernel: Possible use-after-free since the two fdget() during vhost_net_set_backend() kernel: use-after-free bug in remove function xgene_hwmon_remove kernel: Spectre v2 SMT mitigations problem kernel: UAF during login when accessing the shost ipaddress kernel: bpf: Incorrect verifier pruning leads to unsafe code paths being incorrectly marked as safe kernel: i2c: out-of-bounds write in xgene_slimpro_i2c_xfer() kernel: ext4: use-after-free in ext4_xattr_set_entry() kernel: fbcon: shift-out-of-bounds in fbcon_set_font() kernel: out-of-bounds access in relay_file_read kernel: use after free in vcs_read in drivers/tty/vt/vc_screen.c due to race kernel: net/sched: sch_qfq component can be exploited if in qfq_change_agg function happens qfq_enqueue overhead kernel: xfrm: NULL pointer dereference in xfrm_update_ae_params() kernel: tun: bugs for oversize packet when napi frags enabled in tun_napi_alloc_frags kernel: vmxnet3: NULL pointer dereference in vmxnet3_rq_cleanup() kernel: use after free in unix_stream_sendpage kernel: net/sched: sch_hfsc UAF kernel: Race between task migrating pages and another task calling exit_mmap to release those same pages getting invalid opcode BUG in include/linux/swapops.h kernel: use after free in nvmet_tcp_free_crypto in NVMe kernel: slab-out-of-bounds read vulnerabilities in cbq_classify kernel: mpls: double free on sysctl allocation failure kernel: out-of-bounds write in qfq_change_class function kernel: net: qcom/emac: race condition leading to use-after-free in emac_remove() kernel: saa7134: race condition leading to use-after-free in saa7134_finidev() kernel: dm1105: race condition leading to use-after-free in dm1105_remove.c() kernel: fbcon: out-of-sync arrays in fbcon_mode_deleted due to wrong con2fb_map assignment kernel: netfilter: potential slab-out-of-bound access due to integer underflow kernel: IGB driver inadequate buffer size for frames larger than MTU kernel: use-after-free after removing device in wb_inode_writeback_end in mm/page-writeback.c | [
"cpe:/a:redhat:rhel_eus:8.6::crb",
"cpe:/o:redhat:rhel_eus:8.6::baseos",
"cpe:/o:redhat:rhev_hypervisor:4.4::el8"
] | null | 7.8 | 5.6 | null |
RHSA-2024:8232 | Red Hat Security Advisory: OpenShift Container Platform 4.17.2 packages and security update | github.com/jaraco/zipp: Denial of Service (infinite loop) via crafted zip file in jaraco/zipp go/parser: golang: Calling any of the Parse functions containing deeply nested literals can cause a panic/stack exhaustion encoding/gob: golang: Calling Decoder.Decode on a message which contains deeply nested structures can cause a panic due to stack exhaustion go/build/constraint: golang: Calling Parse on a "// +build" build tag line with deeply nested expressions can cause a panic due to stack exhaustion | [
"cpe:/a:redhat:openshift:4.17::el8",
"cpe:/a:redhat:openshift:4.17::el9",
"cpe:/a:redhat:openshift_ironic:4.17::el9"
] | null | 5.9 | null | null |
RHSA-2011:1371 | Red Hat Security Advisory: pidgin security update | Pidgin: Multiple NULL pointer dereference flaws in Yahoo protocol plug-in libpurple: invalid UTF-8 string handling in SILC messages | [
"cpe:/a:redhat:rhel_productivity:5",
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws",
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation"
] | null | null | null | null |
RHSA-2024:2054 | Red Hat Security Advisory: OpenShift Container Platform 4.14.23 security update | kubernetes: kube-apiserver: bypassing mountable secrets policy imposed by the ServiceAccount admission plugin jose-go: improper handling of highly compressed data | [
"cpe:/a:redhat:openshift:4.14::el8",
"cpe:/a:redhat:openshift:4.14::el9"
] | null | 4.3 | null | null |
RHSA-2012:0569 | Red Hat Security Advisory: php53 security update | php: command line arguments injection when run in CGI mode (VU#520827) | [
"cpe:/o:redhat:rhel_eus:5.6"
] | null | null | null | null |
RHSA-2023:1802 | Red Hat Security Advisory: thunderbird security update | Thunderbird: Revocation status of S/Mime recipient certificates was not checked Mozilla: Memory Corruption in Safe Browsing Code Mozilla: libwebp: Double-free in libwebp Mozilla: Matrix SDK bundled with Thunderbird vulnerable to denial-of-service attack Thunderbird: Hang when processing certain OpenPGP messages Mozilla: Fullscreen notification obscured Mozilla: Potential Memory Corruption following Garbage Collector compaction Mozilla: Invalid free from JavaScript code Mozilla: Content-Disposition filename truncation leads to Reflected File Download Mozilla: Files with malicious extensions could have been downloaded unsafely on Linux Mozilla: Incorrect optimization result on ARM64 Mozilla: Memory safety bugs fixed in Firefox 112 and Firefox ESR 102.10 | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 8.8 | null | null |
RHSA-2021:0794 | Red Hat Security Advisory: .NET 5.0 on Red Hat Enterprise Linux security and bugfix update | dotnet: System.Text.Encodings.Web Remote Code Execution | [
"cpe:/a:redhat:rhel_dotnet:5.0::el7"
] | null | 8.1 | null | null |
RHSA-2015:2618 | Red Hat Security Advisory: chromium-browser security update | chromium-browser: Type confusion in extensions chromium-browser: Use-after free in Blink chromium-browser: Escaping issue in saved pages chromium-browser: Various fixes from internal audits, fuzzing and other initiatives v8: multiple vulnerabilities fixed in 4.7.80.23 | [
"cpe:/a:redhat:rhel_extras:6"
] | null | null | null | null |
RHSA-2022:7108 | Red Hat Security Advisory: sqlite security update | sqlite: Null pointer derreference in src/select.c sqlite: Out of bounds access during table rename | [
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 8.1 | null | null |
RHSA-2018:2092 | Red Hat Security Advisory: patch security update | patch: Malicious patch files cause ed to execute arbitrary commands | [
"cpe:/o:redhat:rhel_eus:7.3::computenode",
"cpe:/o:redhat:rhel_eus:7.3::server"
] | null | null | 7.8 | null |
RHSA-2009:1130 | Red Hat Security Advisory: kdegraphics security update | kdegraphics: KSVG NULL-pointer dereference in the SVGList interface implementation (ACE) kdegraphics: KSVG Pointer use-after-free error in the SVG animation element (DoS, ACE) | [
"cpe:/a:redhat:rhel_productivity:5",
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation"
] | null | null | null | null |
RHSA-2020:1508 | Red Hat Security Advisory: java-1.7.0-openjdk security update | OpenJDK: Incorrect handling of references to uninitialized class descriptors during deserialization (Serialization, 8224541) OpenJDK: Uncaught InstantiationError exception in ObjectStreamClass (Serialization, 8224549) OpenJDK: Unexpected exceptions raised by DOMKeyInfoFactory and DOMXMLSignatureFactory (Security, 8231415) OpenJDK: Re-use of single TLS session for new connections (JSSE, 8234408) OpenJDK: CRLF injection into HTTP headers in HttpServer (Lightweight HTTP Server, 8234825) OpenJDK: Incorrect bounds checks in NIO Buffers (Libraries, 8234841) OpenJDK: Incorrect type checks in MethodType.readObject() (Libraries, 8235274) OpenJDK: Regular expression DoS in Scanner (Concurrency, 8236201) | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | 5.3 | null | null |
RHSA-2008:0858 | Red Hat Security Advisory: redhat-ds-base security and bug fix update | Server: temporary DoS via crafted pattern searches Server: multiple memory leaks | [
"cpe:/a:redhat:enterprise_ipa:1.0"
] | null | null | null | null |
RHSA-2023:1822 | Red Hat Security Advisory: kernel security update | kernel: stack overflow in do_proc_dointvec and proc_skip_spaces | [
"cpe:/o:redhat:rhel_els:6"
] | null | 7.8 | null | null |
RHSA-2023:4238 | Red Hat Security Advisory: Red Hat OpenShift Data Foundation 4.11.9 security and bug fix update | openshift: OCP & FIPS mode | [
"cpe:/a:redhat:openshift_data_foundation:4.11::el8"
] | null | 6.5 | null | null |
RHSA-2020:4214 | Red Hat Security Advisory: go-toolset-1.13-golang security and bug fix update | golang.org/x/text: possibility to trigger an infinite loop in encoding/unicode could lead to crash golang: data race in certain net/http servers including ReverseProxy can lead to DoS golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs | [
"cpe:/a:redhat:devtools:2020"
] | null | 7.5 | null | null |
RHSA-2019:3044 | Red Hat Security Advisory: Red Hat Single Sign-On 7.3.4 security update on RHEL 6 | undertow: Information leak in requests for directories without trailing slashes jackson-databind: polymorphic typing issue allows attacker to read arbitrary local files on the server. jackson-databind: polymorphic typing issue allows attacker to read arbitrary local files on the server via crafted JSON message. jackson-databind: default typing mishandling leading to remote code execution keycloak: adapter endpoints are exposed via arbitrary URLs keycloak: cross-realm user access auth bypass | [
"cpe:/a:redhat:red_hat_single_sign_on:7::el6"
] | null | null | 5 | null |
RHSA-2023:7202 | Red Hat Security Advisory: container-tools:4.0 security and bug fix update | golang: net/http: insufficient sanitization of Host header | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 6.5 | null | null |
RHEA-2022:5139 | Red Hat Enhancement Advisory: nodejs:12 bug fix and enhancement update | nodejs-json-schema: Prototype pollution vulnerability llhttp: HTTP Request Smuggling due to spaces in headers llhttp: HTTP Request Smuggling when parsing the body of chunked requests nodejs-tar: Insufficient symlink protection due to directory cache poisoning using symbolic links allowing arbitrary file creation and overwrite nodejs-tar: Insufficient symlink protection due to directory cache poisoning using symbolic links allowing arbitrary file creation and overwrite nodejs: Improper handling of URI Subject Alternative Names nodejs: Certificate Verification Bypass via String Injection nodejs: Incorrect handling of certificate subject and issuer fields nodejs: Prototype pollution via console.table properties | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 8.2 | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.