id
stringlengths 13
15
| title
stringlengths 29
176
| description
stringlengths 8
32.1k
| cpes
sequencelengths 0
20
| cvss_v4_0
null | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
null |
---|---|---|---|---|---|---|---|
RHSA-2019:2695 | Red Hat Security Advisory: kernel security and bug fix update | kernel: hw: Spectre SWAPGS gadget vulnerability | [
"cpe:/o:redhat:rhel_aus:6.5::server"
] | null | null | 5.9 | null |
RHSA-2012:0516 | Red Hat Security Advisory: thunderbird security update | Mozilla: Off-by-one error in OpenType Sanitizer (MFSA 2012-31) Mozilla: Miscellaneous memory safety hazards (rv:12.0/ rv:10.0.4) (MFSA 2012-20) Mozilla: Miscellaneous memory safety hazards (rv:12.0/ rv:10.0.4) (MFSA 2012-20) Mozilla: use-after-free in IDBKeyRange (MFSA 2012-22) Mozilla: Invalid frees causes heap corruption in gfxImageSurface (MFSA 2012-23) Mozilla: Potential XSS via multibyte content processing errors (MFSA 2012-24) Mozilla: Potential memory corruption during font rendering using cairo-dwrite (MFSA 2012-25) Mozilla: WebGL.drawElements may read illegal video memory due to FindMaxUshortElement error (MFSA 2012-26) Mozilla: Page load short-circuit can lead to XSS (MFSA 2012-27) Mozilla: Potential XSS through ISO-2022-KR/ISO-2022-CN decoding issues (MFSA 2012-29) Mozilla: Crash with WebGL content using textImage2D (MFSA 2012-30) Mozilla: Potential site identity spoofing when loading RSS and Atom feeds (MFSA 2012-33) | [
"cpe:/a:redhat:rhel_productivity:5",
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2013:0631 | Red Hat Security Advisory: jbossweb security update | tomcat: three DIGEST authentication implementation issues tomcat: three DIGEST authentication implementation issues tomcat: three DIGEST authentication implementation issues | [
"cpe:/a:redhat:jboss_enterprise_web_platform:5::el4",
"cpe:/a:redhat:jboss_enterprise_web_platform:5::el5",
"cpe:/a:redhat:jboss_enterprise_web_platform:5::el6"
] | null | null | null | null |
RHSA-2021:4161 | Red Hat Security Advisory: python-jinja2 security update | python-jinja2: ReDoS vulnerability in the urlize filter | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 7.5 | null | null |
RHSA-2021:1762 | Red Hat Security Advisory: virt:rhel and virt-devel:rhel security, bug fix, and enhancement update | QEMU: heap buffer overflow in iscsi_aio_ioctl_cb() in block/iscsi.c may lead to information disclosure QEMU: reachable assertion failure in net_tx_pkt_add_raw_fragment() in hw/net/net_tx_pkt.c libvirt: double free in qemuAgentGetInterfaces() in qemu_agent.c QEMU: infinite loop in e1000e_write_packet_to_guest() in hw/net/e1000e_core.c QEMU: assertion failure through usb_packet_unmap() in hw/usb/hcd-ehci.c QEMU: heap buffer overflow in msix_table_mmio_write() in hw/pci/msix.c QEMU: e1000e: infinite loop scenario in case of null packet descriptor QEMU: slirp: out-of-bounds access while processing ARP/NCSI packets QEMU: slirp: out-of-bounds access while processing ARP/NCSI packets QEMU: ide: atapi: OOB access while processing read commands | [
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb"
] | null | 3.9 | null | null |
RHSA-2024:2079 | Red Hat Security Advisory: git-lfs security update | golang: net/http, x/net/http2: unlimited number of CONTINUATION frames causes DoS | [
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 7.5 | null | null |
RHSA-2023:6144 | Red Hat Security Advisory: Custom Metric Autoscaler operator for Red Hat OpenShift security update | HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack) | [
"cpe:/a:redhat:openshift_custom_metrics_autoscaler:2.0::el8"
] | null | 7.5 | null | null |
RHSA-2008:0967 | Red Hat Security Advisory: httpd security and bug fix update | httpd: mod_proxy_http DoS via excessive interim responses from the origin server httpd: mod_proxy_ftp globbing XSS | [
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws",
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws",
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2023:0471 | Red Hat Security Advisory: Migration Toolkit for Runtimes security update | nodejs-minimatch: ReDoS via the braceExpand function jib-core: RCE via the isDockerInstalled loader-utils: Regular expression denial of service jackson-databind: deep wrapper array nesting wrt UNWRAP_SINGLE_VALUE_ARRAYS jackson-databind: use of deeply nested arrays Apache-Commons-BCEL: arbitrary bytecode produced via out-of-bounds writing | [
"cpe:/a:redhat:migration_toolkit_runtimes:1.0::el8"
] | null | 8.1 | null | null |
RHSA-2023:3287 | Red Hat Security Advisory: OpenShift Container Platform 4.12.19 bug fix and security update | dns: Denial of Service (DoS) | [
"cpe:/a:redhat:openshift:4.12::el8",
"cpe:/a:redhat:openshift:4.12::el9"
] | null | 7.5 | null | null |
RHSA-2024:1327 | Red Hat Security Advisory: gimp:2.8 security update | gimp: PSD buffer overflow RCE gimp: psp off-by-one RCE | [
"cpe:/a:redhat:rhel_aus:8.2::appstream",
"cpe:/a:redhat:rhel_e4s:8.2::appstream",
"cpe:/a:redhat:rhel_tus:8.2::appstream"
] | null | 7.8 | null | null |
RHSA-2023:7526 | Red Hat Security Advisory: tigervnc security update | xorg-x11-server: Out-of-bounds write in XIChangeDeviceProperty/RRChangeOutputProperty | [
"cpe:/a:redhat:rhel_aus:8.4::appstream",
"cpe:/a:redhat:rhel_e4s:8.4::appstream",
"cpe:/a:redhat:rhel_tus:8.4::appstream"
] | null | 7.8 | null | null |
RHSA-2021:3841 | Red Hat Security Advisory: thunderbird security update | rust-crossbeam-deque: race condition may lead to double free Mozilla: Use-after-free in MessageTask Mozilla: Validation message could have been overlaid on another origin Mozilla: Use-after-free of nsLanguageAtomService object Mozilla: Memory safety bugs fixed in Firefox 93, Firefox ESR 78.15, and Firefox ESR 91.2 Mozilla: Memory safety bugs fixed in Firefox 93 and Firefox ESR 91.2 Mozilla: Downgrade attack on SMTP STARTTLS connections | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 8.8 | 7.5 | null |
RHSA-2024:1770 | Red Hat Security Advisory: OpenShift Container Platform 4.15.9 bug fix and security update | golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487) HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack) sanitize-html: Information Exposure when used on the backend | [
"cpe:/a:redhat:openshift:4.15::el8",
"cpe:/a:redhat:openshift:4.15::el9"
] | null | 5.3 | null | null |
RHSA-2019:1151 | Red Hat Security Advisory: rh-ruby23-ruby security update | rubygems: Installing a malicious gem may lead to arbitrary code execution | [
"cpe:/a:redhat:rhel_software_collections:3::el6",
"cpe:/a:redhat:rhel_software_collections:3::el7"
] | null | null | 7.2 | null |
RHSA-2013:1196 | Red Hat Security Advisory: Foreman security update | Foreman: hosts_controller.rb power/ipmi_boot Symbol creation DoS foreman: app/controllers/api/v1/hosts_controller.rb API privilege escalation | [
"cpe:/a:redhat:openstack:3::el6"
] | null | null | null | null |
RHSA-2015:0698 | Red Hat Security Advisory: rhevm-spice-client security, bug fix, and enhancement update | jasper: multiple integer overflows in jas_alloc calls jasper: possible buffer overflow in jas_stream_printf() jasper: heap buffer overflow flaws lead to arbitrary code execution (CERT VU#887409) jasper: heap buffer overflow flaws lead to arbitrary code execution (CERT VU#887409) jasper: double-free in in jas_iccattrval_destroy() (oCERT-2014-012) jasper: heap overflow in jp2_decode() (oCERT-2014-012) jasper: dec->numtiles off-by-one check in jpc_dec_process_sot() (oCERT-2015-001) jasper: unrestricted stack memory use in jpc_qmfb.c (oCERT-2015-001) jasper: incorrect component number check in COC, RGN and QCC marker segment decoders (oCERT-2014-009) | [
"cpe:/a:redhat:rhev_manager:3"
] | null | null | null | null |
RHSA-2014:1033 | Red Hat Security Advisory: java-1.6.0-ibm security update | JDK: Java CMS keystore provider potentially allows brute-force private key recovery JDK: Privilege escalation issue OpenJDK: SubjectDelegator protection insufficient (JMX, 8029755) OpenJDK: Clone interfaces passed to proxy methods (Libraries, 8035009) OpenJDK: Bytecode verification does not prevent ctor calls to this() and super() (Hotspot, 8035119) JDK: unspecified vulnerability fixed in 6u81, 7u65 and 8u11 (Deployment) OpenJDK: RSA blinding issues (Security, 8031346) OpenJDK: Prevent instantiation of service with non-public constructor (Security, 8035004) OpenJDK: AtomicReferenceFieldUpdater missing primitive type check (Libraries, 8039520) OpenJDK: insufficient Diffie-Hellman public key validation (Security, 8037162) JDK: unspecified vulnerability fixed in 6u81, 7u65 and 8u11 (Deployment) | [
"cpe:/a:redhat:rhel_extras:5::client",
"cpe:/a:redhat:rhel_extras:5::server",
"cpe:/a:redhat:rhel_extras:6"
] | null | null | null | null |
RHSA-2023:5764 | Red Hat Security Advisory: nodejs security update | HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack) | [
"cpe:/a:redhat:rhel_eus:9.0::appstream"
] | null | 7.5 | null | null |
RHSA-2015:1631 | Red Hat Security Advisory: ceph-deploy security update | ceph-deploy: keyring permissions are world readable in ~ceph ceph-deploy admin command copies keyring file to /etc/ceph which is world readable | [
"cpe:/a:redhat:ceph_storage:1.2::centos:6"
] | null | null | null | null |
RHSA-2024:4571 | Red Hat Security Advisory: OpenJDK 21.0.4 Security Update for Windows Builds | OpenJDK: potential UTF8 size overflow (8314794) OpenJDK: Excessive symbol length can lead to infinite loop (8319859) OpenJDK: Range Check Elimination (RCE) pre-loop limit overflow (8320548) OpenJDK: Out-of-bounds access in 2D image handling (8324559) OpenJDK: RangeCheckElimination array index overflow (8323231) | [
"cpe:/a:redhat:openjdk:21::windows"
] | null | 7.4 | null | null |
RHSA-2013:1505 | Red Hat Security Advisory: java-1.6.0-openjdk security update | OpenJDK: java.util.TimeZone does not restrict setting of default time zone (Libraries, 8001029) OpenJDK: XML parsing Denial of Service (JAXP, 8017298) OpenJDK: insufficient html escaping in jhat (jhat, 8011081) OpenJDK: Inet6Address class IPv6 address processing errors (Libraries, 8015743) OpenJDK: image conversion out of bounds read (2D, 8014102) OpenJDK: key data leak via toString() methods (Libraries, 8011071) OpenJDK: Incorrect awt_getPixelByte/awt_getPixelShort/awt_setPixelByte/awt_setPixelShort image raster checks (2D, 8014093) OpenJDK: JTable not properly performing certain access checks (Swing, 8013744) OpenJDK: insufficient InterfaceImplementor security checks (Scripting, 8017299) OpenJDK: insufficient security checks (Beans, 8012071) OpenJDK: insufficient escaping of window title string (Javadoc, 8016675) OpenJDK: javax.xml.transform.TransformerFactory does not properly honor XMLConstants.FEATURE_SECURE_PROCESSING (JAXP, 8012425) OpenJDK: insufficient checks of KDC replies (JGSS, 8014341) OpenJDK: javac does not ignore certain ignorable characters (Javadoc, 8016653) OpenJDK: JPEGImageReader and JPEGImageWriter missing band size checks (2D, 8013510) OpenJDK: RMIConnection stub missing permission check (CORBA, 8011157) OpenJDK: VersionHelper12 does not honor modifyThreadGroup restriction (JNDI, 8013739) OpenJDK: insufficient security checks (JAXWS, 8017505) OpenJDK: com.sun.org.apache.xml.internal.security.utils.UnsyncByteArrayOutputStream Denial of Service (Security, 8021290) OpenJDK: XML parsing Denial of Service (JAXP, 8014530) OpenJDK: Java2d Disposer security bypass (2D, 8017287) OpenJDK: checkPackageAccess missing security check (Libraries, 8017291) OpenJDK: getDeclaringClass() information leak (Libraries, 8014349) OpenJDK: ObjectInputStream/ObjectOutputStream missing checks (Libraries, 8014987) OpenJDK: insufficient DataFlavor security checks (AWT, 8012277) OpenJDK: Missing CORBA security checks (Libraries, 8017196) | [
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::server",
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2009:1127 | Red Hat Security Advisory: kdelibs security update | kdelibs: Integer overflow in KJS JavaScript garbage collector kdelibs: KHTML Incorrect handling <head> element content once the <head> element was removed (DoS, ACE) kdelibs: KHTML CSS parser - incorrect handling CSS "style" attribute content (DoS, ACE) | [
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws",
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2018:2177 | Red Hat Security Advisory: Red Hat Ceph Storage 3.0 security and bug fix update | ceph: cephx protocol is vulnerable to replay attack ceph: cephx uses weak signatures ceph: ceph-mon does not perform authorization on OSD pool ops | [
"cpe:/a:redhat:ceph_storage:3::el7"
] | null | null | 4.6 | null |
RHSA-2006:0420 | Red Hat Security Advisory: ethereal security update | security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw | [
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws"
] | null | null | null | null |
RHSA-2018:3107 | Red Hat Security Advisory: wpa_supplicant security and bug fix update | wpa_supplicant: Unauthenticated EAPOL-Key decryption in wpa_supplicant | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 8.3 | null |
RHSA-2023:7712 | Red Hat Security Advisory: tracker-miners security update | tracker-miners: sandbox escape | [
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 7.5 | null | null |
RHSA-2024:4577 | Red Hat Security Advisory: kernel security update | kernel: GSM multiplexing race condition leads to privilege escalation | [
"cpe:/o:redhat:rhel_aus:8.2::baseos"
] | null | 7 | null | null |
RHSA-2017:0036 | Red Hat Security Advisory: kernel security and bug fix update | kernel: out of bounds reads when processing IPT_SO_SET_REPLACE setsockopt kernel: Use after free in tcp_xmit_retransmit_queue kernel: Use-after-free in the recvmmsg exit path | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | 8.1 | null |
RHSA-2011:1160 | Red Hat Security Advisory: dhcp security update | dhcp: denial of service flaws dhcp: denial of service flaws | [
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws",
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server",
"cpe:/o:redhat:enterprise_linux:6::server"
] | null | null | null | null |
RHSA-2022:5913 | Red Hat Security Advisory: Red Hat Kiali for OpenShift Service Mesh 2.0 security update | moment: inefficient parsing algorithm resulting in DoS | [
"cpe:/a:redhat:service_mesh:2.0::el8"
] | null | 7.5 | null | null |
RHSA-2016:1137 | Red Hat Security Advisory: openssl security update | openssl: Memory corruption in the ASN.1 encoder | [
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | 5.6 | null |
RHSA-2023:4276 | Red Hat Security Advisory: DevWorkspace Operator Security Update | openshift: OCP & FIPS mode | [
"cpe:/a:redhat:devworkspace:1.0::el8"
] | null | 6.5 | null | null |
RHSA-2023:3394 | Red Hat Security Advisory: pki-core:10.6 security update | pki-core: When using the caServerKeygen_DirUserCert profile, user can get certificates for other UIDs by entering name in Subject field pki-core: access to external entities when parsing XML can lead to XXE | [
"cpe:/a:redhat:rhel_eus:8.6::appstream"
] | null | 7.5 | null | null |
RHSA-2024:1914 | Red Hat Security Advisory: Red Hat JBoss Web Server 5.8.0 release and security update | Tomcat: WebSocket DoS with incomplete closing handshake | [
"cpe:/a:redhat:jboss_enterprise_web_server:5.8"
] | null | 7.5 | null | null |
RHSA-2019:4041 | Red Hat Security Advisory: Red Hat Single Sign-On 7.3.5 security update on RHEL 7 | HTTP/2: flood using PING frames results in unbounded memory growth HTTP/2: flood using HEADERS frames results in unbounded memory growth HTTP/2: flood using SETTINGS frames results in unbounded memory growth keycloak: keycloak uses hardcoded open dummy domain for new accounts enabling information disclosure wildfly-core: Incorrect privileges for 'Monitor', 'Auditor' and 'Deployer' user by default wildfly-security-manager: security manager authorization bypass | [
"cpe:/a:redhat:red_hat_single_sign_on:7::el7"
] | null | null | 7.5 | null |
RHSA-2024:3659 | Red Hat Security Advisory: booth security update | booth: specially crafted hash can lead to invalid HMAC being accepted by Booth server | [
"cpe:/a:redhat:enterprise_linux:8::highavailability",
"cpe:/a:redhat:enterprise_linux:8::resilientstorage"
] | null | 5.9 | null | null |
RHSA-2023:0934 | Red Hat Security Advisory: Migration Toolkit for Applications security and bug fix update | gin: Unsanitized input in the default logger in github.com/gin-gonic/gin glob-parent: Regular Expression Denial of Service express: "qs" prototype poisoning causes the hang of the node process loader-utils: prototype pollution in function parseQuery in parseQuery.js loader-utils: Regular expression denial of service golang: net/http: excessive memory growth in a Go server accepting HTTP/2 requests Apache-Commons-BCEL: arbitrary bytecode produced via out-of-bounds writing json5: Prototype Pollution in JSON5 via Parse Method | [
"cpe:/a:redhat:migration_toolkit_applications:6.0::el8"
] | null | 8.8 | null | null |
RHSA-2022:0557 | Red Hat Security Advisory: OpenShift Container Platform 4.9.22 security update | golang: net: incorrect parsing of extraneous zero characters at the beginning of an IP address octet golang: net/http/httputil: panic due to racy read of persistConn after handler panic golang: net/http: limit growth of header canonicalization cache golang: syscall: don't close fd 0 on ForkExec error | [
"cpe:/a:redhat:openshift:4.9::el7",
"cpe:/a:redhat:openshift:4.9::el8"
] | null | 4.8 | null | null |
RHSA-2019:3132 | Red Hat Security Advisory: OpenShift Container Platform 4.1.20 openshift security update | kubernetes: YAML parsing vulnerable to "Billion Laughs" attack, allowing for remote denial of service | [
"cpe:/a:redhat:openshift:4.1::el7",
"cpe:/a:redhat:openshift:4.1::el8"
] | null | null | 7.5 | null |
RHSA-2003:417 | Red Hat Security Advisory: : Updated kernel resolves security vulnerability | security flaw security flaw | [
"cpe:/o:redhat:linux:7.1",
"cpe:/o:redhat:linux:7.2",
"cpe:/o:redhat:linux:7.3",
"cpe:/o:redhat:linux:8.0",
"cpe:/o:redhat:linux:9"
] | null | null | null | null |
RHSA-2020:0589 | Red Hat Security Advisory: CloudForms 4.7.15 security, bug fix and enhancement update | CloudForms: RCE vulnerability in NFS schedule backup | [
"cpe:/a:redhat:cloudforms_managementengine:5.10::el7"
] | null | 8 | null | null |
RHSA-2018:3400 | Red Hat Security Advisory: libvirt security update | hw: cpu: speculative store bypass | [
"cpe:/o:redhat:rhel_aus:6.6::server",
"cpe:/o:redhat:rhel_tus:6.6::server"
] | null | null | 5.6 | null |
RHSA-2017:2832 | Red Hat Security Advisory: nss security update | nss: Potential use-after-free in TLS 1.2 server when verifying client authentication | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation",
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 7.5 | null |
RHSA-2014:0170 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 6.2.1 update | Java: Java XML Signature DoS Attack Java: XML eXternal Entity (XXE) flaw in ParserPool and Decrypter jboss-as-server: Unchecked access to MSC Service Registry under JSM | [
"cpe:/a:redhat:jboss_enterprise_application_platform:6::el5"
] | null | null | null | null |
RHSA-2023:5529 | Red Hat Security Advisory: bind security update | bind: stack exhaustion in control channel code may lead to DoS | [
"cpe:/a:redhat:rhel_aus:8.4::appstream",
"cpe:/a:redhat:rhel_e4s:8.4::appstream",
"cpe:/a:redhat:rhel_tus:8.4::appstream",
"cpe:/o:redhat:rhel_aus:8.4::baseos",
"cpe:/o:redhat:rhel_e4s:8.4::baseos",
"cpe:/o:redhat:rhel_tus:8.4::baseos"
] | null | 7.5 | null | null |
RHSA-2003:193 | Red Hat Security Advisory: kdelibs security update | security flaw | [
"cpe:/o:redhat:enterprise_linux:2.1::as",
"cpe:/o:redhat:enterprise_linux:2.1::aw",
"cpe:/o:redhat:enterprise_linux:2.1::es",
"cpe:/o:redhat:enterprise_linux:2.1::ws"
] | null | null | null | null |
RHSA-2024:1833 | Red Hat Security Advisory: squid security update | squid: Denial of Service in HTTP Chunked Decoding squid: denial of service in HTTP header parser | [
"cpe:/a:redhat:rhel_eus:9.0::appstream"
] | null | 8.6 | null | null |
RHSA-2012:0699 | Red Hat Security Advisory: openssl security and bug fix update | openssl: record length handling integer underflow | [
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server",
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2014:1352 | Red Hat Security Advisory: libvirt security and bug fix update | libvirt: qemu: out-of-bounds read access in qemuDomainGetBlockIoTune() due to invalid index libvirt: domain_conf: domain deadlock DoS | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | null | null |
RHBA-2019:3303 | Red Hat Bug Fix Advisory: OpenShift Container Platform 4.2.4 images update | golang: HTTP/1.1 headers with a space before the colon leads to filter bypass or request smuggling | [
"cpe:/a:redhat:openshift:4.2::el7",
"cpe:/a:redhat:openshift:4.2::el8"
] | null | null | 6.5 | null |
RHSA-2021:3146 | Red Hat Security Advisory: ACS 3.64 security and enhancement update | golang: net: lookup functions may return invalid host names golang: net/http/httputil: ReverseProxy forwards connection headers if first one is empty golang: math/big.Rat: may cause a panic or an unrecoverable fatal error if passed inputs with very large exponents golang: crypto/tls: certificate of wrong type is causing TLS client to panic | [
"cpe:/a:redhat:advanced_cluster_security:3.64::el8"
] | null | 6.5 | null | null |
RHSA-2018:2692 | Red Hat Security Advisory: firefox security update | Mozilla: Proxy bypass using automount and autofs Mozilla: Memory safety bugs fixed in Firefox 62 and Firefox ESR 60.2 Mozilla: Use-after-free in driver timers Mozilla: Use-after-free in IndexedDB Mozilla: Out-of-bounds write with malicious MAR file Mozilla: Same-origin policy violation using meta refresh and performance.getEntries to steal cross-origin URLs | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 6.5 | null |
RHSA-2022:7024 | Red Hat Security Advisory: firefox security update | expat: a use-after-free in the doContent function in xmlparse.c | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 8.1 | null | null |
RHSA-2024:0292 | Red Hat Security Advisory: OpenShift Container Platform 4.14.10 security update | golang: crypto/tls: slow verification of certificate chains containing large RSA keys | [
"cpe:/a:redhat:openshift:4.14::el9"
] | null | 5.3 | null | null |
RHSA-2024:3835 | Red Hat Security Advisory: libreoffice security update | libreoffice: Improper Input Validation leading to arbitrary gstreamer plugin execution libreoffice: Insufficient macro permission validation leading to macro execution | [
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::crb"
] | null | 8.3 | null | null |
RHSA-2022:7077 | Red Hat Security Advisory: Red Hat Certificate System 9.7 CVE bug fix update | pki-core: When using the caServerKeygen_DirUserCert profile, user can get certificates for other UIDs by entering name in Subject field | [
"cpe:/a:redhat:certificate_system:9.7::el7"
] | null | 7.6 | null | null |
RHSA-2023:4255 | Red Hat Security Advisory: kernel-rt security and bug fix update | kernel: tcindex: use-after-free vulnerability in traffic control index filter allows privilege escalation kernel: netfilter: use-after-free in nf_tables when processing batch requests can lead to privilege escalation | [
"cpe:/a:redhat:rhel_e4s:8.4::nfv",
"cpe:/a:redhat:rhel_tus:8.4::nfv",
"cpe:/a:redhat:rhel_tus:8.4::realtime"
] | null | 7.8 | null | null |
RHSA-2015:1714 | Red Hat Security Advisory: spice security update | spice: memory corruption in worker_update_monitors_config() | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | null | null |
RHSA-2017:1551 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform security update | tomcat: security manager bypass via IntrospectHelper utility function tomcat: security manager bypass via JSP Servlet config parameters wildfly: Arbitrary file read via path traversal | [
"cpe:/a:redhat:jboss_enterprise_application_platform:6.4"
] | null | null | 7.7 | null |
RHSA-2025:1487 | Red Hat Security Advisory: updated discovery container images | libxml: use-after-free in xmlXIncludeAddNode openssl: RFC7250 handshakes with unauthenticated servers don't abort as expected | [
"cpe:/o:redhat:discovery:1.0::el9"
] | null | 7.4 | null | null |
RHSA-2023:0396 | Red Hat Security Advisory: kpatch-patch security update | kernel: memory corruption in AX88179_178A based USB ethernet device. | [
"cpe:/o:redhat:rhel_e4s:8.2::baseos"
] | null | 7.8 | null | null |
RHBA-2021:1550 | Red Hat Bug Fix Advisory: OpenShift Container Platform 4.7.11 bug fix update | openshift/ovn-kubernetes: Egress Firewall does not reliably apply firewall rules | [
"cpe:/a:redhat:openshift:4.7::el8"
] | null | 5.6 | null | null |
RHSA-2024:8704 | Red Hat Security Advisory: Kube Descheduler Operator for Red Hat OpenShift 5.0.2 for RHEL 9 | golang-protobuf: encoding/protojson, internal/encoding/json: infinite loop in protojson.Unmarshal when unmarshaling certain forms of invalid JSON go/parser: golang: Calling any of the Parse functions containing deeply nested literals can cause a panic/stack exhaustion go/build/constraint: golang: Calling Parse on a "// +build" build tag line with deeply nested expressions can cause a panic due to stack exhaustion | [
"cpe:/a:redhat:kube_descheduler_operator:5.0::el9"
] | null | 5.9 | null | null |
RHSA-2024:10848 | Red Hat Security Advisory: firefox security update | firefox: thunderbird: Select list elements could be shown over another site firefox: thunderbird: CSP Bypass and XSS Exposure via Web Compatibility Shims firefox: thunderbird: URL Bar Spoofing via Manipulated Punycode and Whitespace Characters firefox: thunderbird: Unhandled Exception in Add-on Signature Verification firefox: thunderbird: Improper Keypress Handling in Executable File Confirmation Dialog firefox: thunderbird: Memory safety bugs fixed in Firefox 133, Thunderbird 133, Firefox ESR 128.5, and Thunderbird 128.5 | [
"cpe:/a:redhat:rhel_eus:8.8::appstream"
] | null | 8.8 | null | null |
RHEA-2015:2527 | Red Hat Enhancement Advisory: rhev-hypervisor bug fix, and enhancement update | RHEV: vdsm spice disable-ticketing and VM suspend and restore allows auth bypass | [
"cpe:/o:redhat:enterprise_linux:6::hypervisor",
"cpe:/o:redhat:enterprise_linux:7::hypervisor"
] | null | null | null | null |
RHSA-2021:2587 | Red Hat Security Advisory: ruby:2.5 security, bug fix, and enhancement update | ruby: NUL injection vulnerability of File.fnmatch and File.fnmatch? ruby: Regular expression denial of service vulnerability of WEBrick's Digest authentication ruby: HTTP response splitting in WEBrick ruby: Code injection via command argument of Shell#test / Shell#[] rubygem-json: Unsafe object creation vulnerability in JSON ruby: BasicSocket#read_nonblock method leads to information disclosure ruby: Potential HTTP request smuggling in WEBrick ruby: XML round-trip vulnerability in REXML | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 7.5 | 7.5 | null |
RHSA-2023:2029 | Red Hat Security Advisory: OpenShift Security Profiles Operator bug fix update | go-getter: go-getter vulnerable to denial of service via malicious compressed archive containerd: Supplementary groups are not set up properly | [
"cpe:/a:redhat:openshift_security_profiles_operator_stable:::el8"
] | null | 7.3 | null | null |
RHSA-2018:1349 | Red Hat Security Advisory: kernel security and bug fix update | Kernel: error in exception handling leads to DoS | [
"cpe:/o:redhat:rhel_aus:6.4::server"
] | null | null | 6.5 | null |
RHSA-2023:3042 | Red Hat Security Advisory: emacs security and bug fix update | emacs: ctags local command execution vulnerability | [
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 7.8 | null | null |
RHSA-2008:0261 | Red Hat Security Advisory: Red Hat Network Satellite Server security update | mod_ssl SSLCipherSuite bypass libxpm buffer overflow tomcat multiple content-length header poisioning tomcat DoS openmotif libUil buffer overflows tomcat manager example DoS tomcat examples XSS perl-Crypt-CBC weaker encryption with some ciphers jabberd SASL DoS tomcat directory listing issue httpd mod_status XSS tomcat XSS in example webapps tomcat XSS in example webapps mod_jk chunk too long java-jre: GIF buffer overflow tomcat directory traversal mod_perl PerlRun denial of service tomcat XSS in samples tomcat accept-language xss flaw mod_jk sends decoded URL to tomcat javaws vulnerabilities tomcat examples jsp XSS tomcat host manager XSS Integer overflow in the embedded ICC profile image parser in Sun Java Development Kit BMP image parser vulnerability httpd scoreboard lack of PID protection tomcat handling of cookies tomcat handling of cookie values mod_autoindex XSS httpd: mod_imagemap XSS Absolute path traversal Apache Tomcat WEBDAV RHN XSS flaw JFreeChart: XSS vulnerabilities in the image map feature apache mod_status cross-site scripting tomcat5 SSO cookie login information disclosure | [
"cpe:/a:redhat:network_satellite:5.0:el4"
] | null | null | null | null |
RHSA-2023:0772 | Red Hat Security Advisory: OpenShift Container Platform 4.12.4 security update | kubernetes: Unauthorized read of Custom Resources | [
"cpe:/a:redhat:openshift:4.12::el8"
] | null | 6.5 | null | null |
RHSA-2023:7528 | Red Hat Security Advisory: fence-agents security update | python-certifi: Removal of e-Tugra root certificate python-urllib3: Cookie request header isn't stripped during cross-origin redirects | [
"cpe:/a:redhat:rhel_eus:8.8::appstream",
"cpe:/a:redhat:rhel_eus:8.8::highavailability",
"cpe:/a:redhat:rhel_eus:8.8::resilientstorage"
] | null | 5.9 | null | null |
RHSA-2010:0752 | Red Hat Security Advisory: gpdf security update | xpdf: uninitialized Gfx::parser pointer dereference xpdf: array indexing error in FoFiType1::parse() | [
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2010:0966 | Red Hat Security Advisory: firefox security update | Mozilla use-after-free error with nsDOMAttribute MutationObserver (MFSA 2010-80) Mozilla integer overflow vulnerability in NewIdArray (MFSA 2010-81) Mozilla add support for OTS font sanitizer (MFSA 2010-78) Mozilla XSS hazard in multiple character encodings (MFSA 2010-84) Mozilla Chrome privilege escalation with window.open and <isindex> element (MFSA 2010-76) Mozilla crash and remote code execution using HTML tags inside a XUL tree (MFSA 2010-77) Mozilla incomplete fix for CVE-2010-0179 (MFSA 2010-82) Mozilla location bar SSL spoofing using network error page (MFSA 2010-83) data: URL meta refresh (MFSA 2010-79) Mozilla miscellaneous memory safety hazards (MFSA 2010-74) Mozilla miscellaneous memory safety hazards (MFSA 2010-74) | [
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws",
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server",
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2013:0604 | Red Hat Security Advisory: java-1.6.0-openjdk security update | OpenJDK: Specially crafted sample model integer overflow (2D, 8007014) OpenJDK: CMM malformed raster memory corruption (2D, 8007675) | [
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2009:1451 | Red Hat Security Advisory: freeradius security update | FreeRADIUS: Missing check for Tunnel-Password attributes with zero length (DoS) -- re-appearance of CVE-2003-0967 | [
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2016:1140 | Red Hat Security Advisory: squid34 security update | squid: buffer overflow in cachemgr.cgi squid: multiple issues in ESI processing squid: multiple issues in ESI processing squid: multiple issues in ESI processing squid: Cache poisoning issue in HTTP Request handling squid: Header Smuggling issue in HTTP Request processing squid: SegFault from ESIInclude::Start squid: SIGSEGV in ESIContext response handling | [
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2023:4061 | Red Hat Security Advisory: .NET 6.0 security, bug fix, and enhancement update | dotnet: race condition in Core SignInManager<TUser> PasswordSignInAsync method | [
"cpe:/a:redhat:rhel_dotnet:6.0::el7"
] | null | 8.1 | null | null |
RHSA-2019:0547 | Red Hat Security Advisory: OpenShift Container Platform 3.9 haproxy security update | haproxy: Out-of-bounds read in dns.c:dns_validate_dns_response() allows for memory disclosure haproxy: Mishandling of priority flag in short HEADERS frame by HTTP/2 decoder allows for crash | [
"cpe:/a:redhat:openshift:3.9::el7"
] | null | null | 5.9 | null |
RHSA-2024:0113 | Red Hat Security Advisory: kernel security update | kernel: vmwgfx: integer overflow in vmwgfx_execbuf.c kernel: UAF during login when accessing the shost ipaddress kernel: use after free in unix_stream_sendpage kernel: vmwgfx: reference count issue leads to use-after-free in surface handling amd: Return Address Predictor vulnerability leading to information disclosure kernel: netfilter: potential slab-out-of-bound access due to integer underflow | [
"cpe:/a:redhat:enterprise_linux:8::crb",
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 7 | null | null |
RHBA-2022:5721 | Red Hat Bug Fix Advisory: .NET 6.0 on RHEL 7 bugfix update | eventsource: Exposure of Sensitive Information | [
"cpe:/a:redhat:rhel_dotnet:6.0::el7"
] | null | 9.3 | null | null |
RHSA-2022:5474 | Red Hat Security Advisory: firefox security update | Mozilla: Undesired attributes could be set as part of prototype pollution Mozilla: CSP bypass enabling stylesheet injection Mozilla: CSP sandbox header without `allow-scripts` can be bypassed via retargeted javascript: URI Mozilla: Use-after-free in nsSHistory Mozilla: Unavailable PAC file resulted in OCSP requests being blocked Mozilla: A popup window could be resized in a way to overlay the address bar with web content Mozilla: Potential integer overflow in ReplaceElementsAt Mozilla: Memory safety bugs fixed in Firefox 102 and Firefox ESR 91.11 | [
"cpe:/a:redhat:rhel_eus:8.2::appstream"
] | null | 8.8 | 7.5 | null |
RHSA-2018:2733 | Red Hat Security Advisory: rubygem-smart_proxy_dynflow security update | smart_proxy_dynflow: Authentication bypass in Foreman remote execution feature | [
"cpe:/a:redhat:satellite:6.3::el7",
"cpe:/a:redhat:satellite_capsule:6.3::el7"
] | null | null | 9.8 | null |
RHSA-2003:258 | Red Hat Security Advisory: : GDM allows local user to read any file. | security flaw security flaw security flaw | [
"cpe:/o:redhat:linux:7.1",
"cpe:/o:redhat:linux:7.2",
"cpe:/o:redhat:linux:7.3",
"cpe:/o:redhat:linux:8.0",
"cpe:/o:redhat:linux:9"
] | null | null | null | null |
RHSA-2023:4167 | Red Hat Security Advisory: java-1.8.0-openjdk security update | OpenJDK: array indexing integer overflow issue (8304468) OpenJDK: improper handling of slash characters in URI-to-path conversion (8305312) | [
"cpe:/a:redhat:rhel_e4s:8.1::appstream"
] | null | 3.7 | null | null |
RHSA-2018:0051 | Red Hat Security Advisory: rhevm-setup-plugins security, bug fix, and enhancement update | An update for rhevm-setup-plugins is now available for RHEV Engine version 4.1.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. | [
"cpe:/a:redhat:rhev_manager:4"
] | null | null | null | null |
RHSA-2020:5562 | Red Hat Security Advisory: firefox security update | chromium-browser: Uninitialized Use in V8 Mozilla: Heap buffer overflow in WebGL Mozilla: CSS Sanitizer performed incorrect sanitization Mozilla: Incorrect cast of StyleGenericFlexBasis resulted in a heap use-after-free Mozilla: Internal network hosts could have been probed by a malicious webpage Mozilla: The proxy.onRequest API did not catch view-source URLs Mozilla: Memory safety bugs fixed in Firefox 84 and Firefox ESR 78.6 | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 8.8 | 6.1 | null |
RHSA-2020:5021 | Red Hat Security Advisory: qt and qt5-qtbase security update | qt: buffer over-read in read_xbm_body in gui/image/qxbmhandler.cpp | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 5.3 | null | null |
RHSA-2018:1458 | Red Hat Security Advisory: dhcp security update | dhcp: Command injection vulnerability in the DHCP client NetworkManager integration script | [
"cpe:/o:redhat:rhel_eus:6.7::computenode",
"cpe:/o:redhat:rhel_eus:6.7::server"
] | null | null | 7.5 | null |
RHSA-2022:6634 | Red Hat Security Advisory: webkit2gtk3 security update | webkitgtk: processing maliciously crafted web content may lead to arbitrary code execution | [
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 8.8 | null | null |
RHSA-2012:1169 | Red Hat Security Advisory: condor security update | condor: host based authentication does not implement forward-confirmed reverse dns | [
"cpe:/a:redhat:enterprise_mrg:2:computenode:el6",
"cpe:/a:redhat:enterprise_mrg:2:server:el6"
] | null | null | null | null |
RHSA-2019:2779 | Red Hat Security Advisory: qpid-proton security update | qpid-proton: TLS Man in the Middle Vulnerability | [
"cpe:/a:redhat:satellite:6.3::el7",
"cpe:/a:redhat:satellite_capsule:6.3::el7"
] | null | null | 7.4 | null |
RHSA-2011:1424 | Red Hat Security Advisory: perl security update | Perl decode_xs heap-based buffer overflow Perl Digest improper control of generation of code | [
"cpe:/o:redhat:enterprise_linux:6::server"
] | null | null | null | null |
RHSA-2023:0859 | Red Hat Security Advisory: Red Hat Virtualization Host 4.4.z SP 1 security update batch#4 (oVirt-4.5.3-4) | kernel: i915: Incorrect GPU TLB flush can lead to random memory access libksba: integer overflow to code execution sudo: arbitrary file write with privileges of the RunAs user | [
"cpe:/o:redhat:rhev_hypervisor:4.4::el8"
] | null | 7.8 | null | null |
RHSA-2018:0026 | Red Hat Security Advisory: qemu-kvm security update | An update for qemu-kvm is now available for Red Hat Enterprise Linux 7.2 Advanced Update Support, Red Hat Enterprise Linux 7.2 Telco Extended Update Support, and Red Hat Enterprise Linux 7.2 Update Services for SAP Solutions.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. | [
"cpe:/o:redhat:rhel_aus:7.2::server",
"cpe:/o:redhat:rhel_e4s:7.2::server",
"cpe:/o:redhat:rhel_tus:7.2::server"
] | null | null | null | null |
RHSA-2018:3347 | Red Hat Security Advisory: python-paramiko security update | python-paramiko: Authentication bypass in auth_handler.py | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 9.8 | null |
RHSA-2022:0422 | Red Hat Security Advisory: varnish:6 security update | varnish: HTTP/1 request smuggling vulnerability | [
"cpe:/a:redhat:rhel_eus:8.4::appstream"
] | null | 9.1 | null | null |
RHEA-2013:1032 | Red Hat Enhancement Advisory: Red Hat OpenShift Enterprise 1.2 Node Release Advisory | stapler-adjunct-zeroclipboard: XSS via copying XSS payload into buffer Jenkins: Build Description XSS Jenkins: Multiple CSRF in MavenAbstractArtifactRecord.doRedeploy and Jenkins.doEval | [
"cpe:/a:redhat:openshift:1.2::el6"
] | null | null | null | null |
RHSA-2021:0765 | Red Hat Security Advisory: kernel security, bug fix, and enhancement update | kernel: bad kfree in auditfilter.c may lead to escalation of privilege kernel: performance counters race condition use-after-free kernel: Local buffer overflow in ctnetlink_parse_tuple_filter in net/netfilter/nf_conntrack_netlink.c kernel: ICMP rate limiting can be used for DNS poisoning attack kernel: locking issue in drivers/tty/tty_jobctrl.c can lead to an use-after-free | [
"cpe:/a:redhat:rhel_eus:8.2::crb",
"cpe:/o:redhat:rhel_eus:8.2::baseos"
] | null | 7.8 | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.