id
stringlengths 13
15
| title
stringlengths 29
176
| description
stringlengths 8
32.1k
| cpes
sequencelengths 0
20
| cvss_v4_0
null | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
null |
---|---|---|---|---|---|---|---|
RHSA-2005:110 | Red Hat Security Advisory: emacs security update | security flaw | [
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2020:2218 | Red Hat Security Advisory: OpenShift Container Platform 3.11 security update | containers/image: Container images read entire image manifest into memory | [
"cpe:/a:redhat:openshift:3.11::el7"
] | null | 3.5 | null | null |
RHSA-2022:0185 | Red Hat Security Advisory: java-11-openjdk security update | OpenJDK: Incomplete deserialization class filtering in ObjectInputStream (Serialization, 8264934) OpenJDK: Incorrect reading of TIFF files in TIFFNullDecompressor (ImageIO, 8270952) OpenJDK: Insufficient URI checks in the XSLT TransformerImpl (JAXP, 8270492) OpenJDK: Unexpected exception thrown in regex Pattern (Libraries, 8268813) OpenJDK: Incorrect marking of writeable fields (Hotspot, 8270386) OpenJDK: Incomplete checks of StringBuffer and StringBuilder during deserialization (Libraries, 8270392) OpenJDK: Incorrect IdentityHashMap size checks during deserialization (Libraries, 8270416) OpenJDK: Incorrect access checks in XMLEntityManager (JAXP, 8270498) OpenJDK: Infinite loop related to incorrect handling of newlines in XMLEntityScanner (JAXP, 8270646) OpenJDK: Array indexing issues in LIRGenerator (Hotspot, 8272014) OpenJDK: Excessive resource use when reading JAR manifest attributes (Libraries, 8272026) OpenJDK: Insufficient checks when deserializing exceptions in ObjectInputStream (Serialization, 8272236) OpenJDK: Excessive memory allocation in BMPImageReader (ImageIO, 8273756) OpenJDK: Integer overflow in BMPImageReader (ImageIO, 8273838) OpenJDK: Excessive memory allocation in TIFF*Decompressor (ImageIO, 8274096) | [
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb"
] | null | 5.3 | null | null |
RHSA-2023:3946 | Red Hat Security Advisory: open-vm-tools security update | open-vm-tools: authentication bypass vulnerability in the vgauth module | [
"cpe:/a:redhat:rhel_aus:8.4::appstream",
"cpe:/a:redhat:rhel_e4s:8.4::appstream",
"cpe:/a:redhat:rhel_tus:8.4::appstream"
] | null | 3.9 | null | null |
RHSA-2024:6195 | Red Hat Security Advisory: skopeo security update | golang: crypto/x509: Verify panics on certificates with an unknown public key algorithm | [
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 5.9 | null | null |
RHSA-2024:3462 | Red Hat Security Advisory: kernel security and bug fix update | kernel: net:emac/emac-mac: Fix a use after free in emac_mac_tx_buf_send RHEL: Add Spectre-BHB mitigation for AmpereOne kernel: net: bridge: data races indata-races in br_handle_frame_finish() | [
"cpe:/a:redhat:rhel_eus:8.6::crb",
"cpe:/o:redhat:rhel_eus:8.6::baseos",
"cpe:/o:redhat:rhev_hypervisor:4.4::el8"
] | null | 4.7 | null | null |
RHSA-2020:2842 | Red Hat Security Advisory: microcode_ctl security, bug fix and enhancement update | hw: Special Register Buffer Data Sampling (SRBDS) hw: Vector Register Data Sampling hw: L1D Cache Eviction Sampling | [
"cpe:/o:redhat:rhel_eus:7.6::computenode",
"cpe:/o:redhat:rhel_eus:7.6::server"
] | null | 6.5 | 6.5 | null |
RHSA-2009:1156 | Red Hat Security Advisory: httpd security update | httpd: AllowOverride Options=IncludesNoExec allows Options Includes httpd: mod_proxy reverse proxy DoS (infinite loop) httpd: possible temporary DoS (CPU consumption) in mod_deflate | [
"cpe:/a:redhat:rhel_application_stack:2"
] | null | null | null | null |
RHSA-2024:8981 | Red Hat Security Advisory: OpenShift Container Platform 4.17.4 bug fix and security update | axios: axios: Server-Side Request Forgery dompurify: nesting-based mutation XSS vulnerability | [
"cpe:/a:redhat:openshift:4.17::el9"
] | null | 8 | null | null |
RHSA-2024:2504 | Red Hat Security Advisory: libssh security update | libssh: ProxyCommand/ProxyJump features allow injection of malicious code through hostname libssh: Missing checks for return values for digests | [
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/o:redhat:enterprise_linux:9::baseos"
] | null | 3.7 | null | null |
RHSA-2021:5137 | Red Hat Security Advisory: Openshift Logging Security Release (5.0.10) | log4j-core: Remote code execution in Log4j 2.x when logs contain an attacker-controlled string value log4j-core: DoS in log4j 2.x with thread context message pattern and context lookup pattern (incomplete fix for CVE-2021-44228) | [
"cpe:/a:redhat:logging:5.0::el8"
] | null | 8.1 | null | null |
RHSA-2013:0958 | Red Hat Security Advisory: java-1.7.0-openjdk security update | OpenJDK: Insecure shared memory permissions (2D, 8001034) OpenJDK: Frame injection in generated HTML (Javadoc, 8012375) OpenJDK: Integrate Apache Santuario, rework class loader (Libraries, 6741606, 8008744) OpenJDK: JConsole SSL support (Serviceability, 8003703) OpenJDK: AccessControlContext check order issue (Libraries, 8001330) OpenJDK: Resource denial of service (AWT, 8001038) OpenJDK: Better handling of memory allocation errors (Hotspot, 7158805) OpenJDK: output stream access restrictions (CORBA, 8000642) OpenJDK: Prevent revealing the local address (Networking, 8001318) OpenJDK: Better access restrictions (Sound, 8006328) OpenJDK: GnomeFileTypeDetector path access check (Libraries, 8004288) OpenJDK: ObjectStreamClass circular reference denial of service (Serialization, 8000638) OpenJDK: Unique VMIDs (Libraries, 8001033) OpenJDK: MBeanServer Introspector package access (JMX, 8008124) OpenJDK: SerialJavaObject package restriction (JDBC, 8009554) OpenJDK: getEnclosing* checks (Libraries, 8007812) OpenJDK: ObjectOutputStream access checks (Serialization, 8008132) OpenJDK: Proper class checking (JMX, 8008120) OpenJDK: Method handles (Libraries, 8009424) OpenJDK: Various AWT integer overflow checks (AWT, 8009071) OpenJDK: tracing insufficient access checks (Serviceability, 8010209) OpenJDK: Missing check for valid DOMCanonicalizationMethod canonicalization algorithm (Libraries, 8014281) OpenJDK: Incorrect image attribute verification (2D, 8012438) OpenJDK: Incorrect image channel verification (2D, 8012597) OpenJDK: Incorrect image layout verification (2D, 8012601) OpenJDK: ImagingLib byte lookup processing (2D, 8011243) OpenJDK: Incorrect IntegerComponentRaster size checks (2D, 8011248) OpenJDK: Incorrect ShortBandedRaster size checks (2D, 8011253) OpenJDK: Incorrect ByteBandedRaster size checks (2D, 8011257) | [
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2020:4254 | Red Hat Security Advisory: security update - Red Hat Ansible Tower 3.7 runner release (CVE-2019-18874) | python-psutil: Double free because of refcount mishandling | [
"cpe:/a:redhat:ansible_tower:3.7::el7"
] | null | null | 7 | null |
RHBA-2018:3497 | Red Hat Bug Fix Advisory: rhvm-appliance security, bug fix, and enhancement update | python-paramiko: Authentication bypass in auth_handler.py | [
"cpe:/o:redhat:enterprise_linux:7::hypervisor"
] | null | null | 9.8 | null |
RHSA-2010:0582 | Red Hat Security Advisory: tomcat5 security update | tomcat: unexpected file deletion and/or alteration tomcat: unexpected file deletion in work directory tomcat: information leak vulnerability in the handling of 'Transfer-Encoding' header | [
"cpe:/a:redhat:rhel_application_server:2"
] | null | null | null | null |
RHSA-2023:4059 | Red Hat Security Advisory: .NET 6.0 security, bug fix, and enhancement update | dotnet: race condition in Core SignInManager<TUser> PasswordSignInAsync method | [
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb"
] | null | 8.1 | null | null |
RHSA-2008:1029 | Red Hat Security Advisory: cups security update | cups: DoS (daemon crash) caused by the large number of subscriptions | [
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2022:1357 | Red Hat Security Advisory: OpenShift Container Platform 4.10.10 security and extras update | moby: Default inheritable capabilities for linux container should be empty | [
"cpe:/a:redhat:openshift:4.10::el8"
] | null | 4.8 | null | null |
RHSA-2019:3335 | Red Hat Security Advisory: python27:2.7 security and bug fix update | numpy: crafted serialized object passed in numpy.load() in pickle python module allows arbitrary code execution python: CRLF injection via the query part of the url passed to urlopen() python: CRLF injection via the path part of the url passed to urlopen() python: Undocumented local_file protocol allows remote attackers to bypass protection mechanisms python-urllib3: CRLF injection due to not encoding the '\r\n' sequence leading to possible attack on internal service python-urllib3: Certification mishandle when error should be thrown | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | null | 7.5 | null |
RHSA-2015:1704 | Red Hat Security Advisory: Red Hat JBoss Data Virtualization 6.1.0 security update | dashbuilder: XXE/SSRF vulnerability | [
"cpe:/a:redhat:jboss_data_virtualization:6.1"
] | null | null | null | null |
RHSA-2023:1918 | Red Hat Security Advisory: webkit2gtk3 security update | WebKitGTK: use-after-free leads to arbitrary code execution | [
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 8.8 | null | null |
RHSA-2021:0760 | Red Hat Security Advisory: kernel security and bug fix update | kernel: umask not applied on filesystem without ACL support kernel: TOCTOU mismatch in the NFS client code | [
"cpe:/o:redhat:rhel_aus:7.4::server",
"cpe:/o:redhat:rhel_e4s:7.4::server",
"cpe:/o:redhat:rhel_tus:7.4::server"
] | null | 7 | null | null |
RHSA-2020:4609 | Red Hat Security Advisory: kernel-rt security and bug fix update | kernel: kernel pointer leak due to WARN_ON statement in video driver leads to local information disclosure kernel: use after free due to race condition in the video driver leads to local privilege escalation kernel: use-after-free in drivers/bluetooth/hci_ldisc.c kernel: out-of-bounds access in function hclge_tm_schd_mode_vnet_base_cfg kernel: null-pointer dereference in drivers/net/fjes/fjes_main.c kernel: null pointer dereference in drivers/scsi/qla2xxx/qla_os.c kernel: memory leak in ccp_run_sha_cmd() function in drivers/crypto/ccp/ccp-ops.c kernel: memory leak in af9005_identify_state() function in drivers/media/usb/dvb-usb/af9005.c kernel: Denial Of Service in the __ipmi_bmc_register() function in drivers/char/ipmi/ipmi_msghandler.c kernel: A memory leak in the mwifiex_pcie_alloc_cmdrsp_buf() function in drivers/net/wireless/marvell/mwifiex/pcie.c allows to cause DoS kernel: memory leak in the crypto_report() function in crypto/crypto_user_base.c allows for DoS kernel: Two memory leaks in the rtl_usb_probe() function in drivers/net/wireless/realtek/rtlwifi/usb.c allow for a DoS kernel: A memory leak in the rtl8xxxu_submit_int_urb() function in drivers/net/wireless/realtek/rtl8xxxu/rtl8xxxu_core.c allows for a DoS kernel: A memory leak in the predicate_parse() function in kernel/trace/trace_events_filter.c allows for a DoS kernel: out-of-bounds write in ext4_xattr_set_entry in fs/ext4/xattr.c Kernel: kvm: OOB memory write via kvm_dev_ioctl_get_cpuid kernel: mounting a crafted ext4 filesystem image, performing some operations, and unmounting can lead to a use-after-free in ext4_put_super in fs/ext4/super.c kernel: a malicious USB device in the drivers/input/ff-memless.c leads to use-after-free kernel: information leak bug caused by a malicious USB device in the drivers/media/usb/ttusb-dec/ttusb_dec.c kernel: race condition caused by a malicious USB device in the USB character device driver layer kernel: use-after-free in serial_ir_init_module() in drivers/media/rc/serial_ir.c kernel: use-after-free in __ext4_expand_extra_isize and ext4_xattr_set_entry related to fs/ext4/inode.c and fs/ext4/super.c kernel: use-after-free in debugfs_remove in fs/debugfs/inode.c kernel: Null pointer dereference in drop_sysctl_table() in fs/proc/proc_sysctl.c kernel: out-of-bounds write via crafted keycode table kernel: possible use-after-free due to a race condition in cdev_get of char_dev.c kernel: out-of-bounds read in in vc_do_resize function in drivers/tty/vt/vt.c kernel: use-after-free in n_tty_receive_buf_common function in drivers/tty/n_tty.c kernel: invalid read location in vgacon_invert_region function in drivers/video/console/vgacon.c kernel: uninitialized kernel data leak in userspace coredumps kernel: SELinux netlink permission check bypass kernel: possibility of memory disclosure when reading the file /proc/sys/kernel/rh_features kernel: vhost-net: stack overflow in get_raw_socket while checking sk_family field kernel: out-of-bounds write in mpol_parse_str function in mm/mempolicy.c kernel: mishandles invalid descriptors in drivers/media/usb/gspca/xirlink_cit.c kernel: sync of excessive duration via an XFS v5 image with crafted metadata kernel: xdp_umem_reg in net/xdp/xdp_umem.c has an out-of-bounds write which could result in crash and data coruption kernel: sg_write function lacks an sg_remove_request call in a certain failure case kernel: possible to send arbitrary signals to a privileged (suidroot) parent process kernel: referencing inode of removed superblock in get_futex_key() causes UAF kernel: soft-lockups in iov_iter_copy_from_user_atomic() could result in DoS kernel: use-after-free in route4_change() in net/sched/cls_route.c | [
"cpe:/a:redhat:enterprise_linux:8::nfv",
"cpe:/a:redhat:enterprise_linux:8::realtime"
] | null | 7.8 | 4.6 | null |
RHSA-2019:0368 | Red Hat Security Advisory: systemd security update | systemd: Insufficient input validation in bus_process_object() resulting in PID 1 crash | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 7 | null |
RHSA-2010:0965 | Red Hat Security Advisory: jboss-remoting security update | jboss-remoting: missing fix for CVE-2010-3862 | [
"cpe:/a:redhat:jboss_enterprise_application_platform:4.3"
] | null | null | null | null |
RHSA-2024:2890 | Red Hat Security Advisory: bind and dhcp security update | bind9: Parsing large DNS messages may cause excessive CPU load bind9: KeyTrap - Extreme CPU consumption in DNSSEC validator bind9: Preparing an NSEC3 closest encloser proof can exhaust CPU resources | [
"cpe:/a:redhat:rhel_aus:8.2::appstream",
"cpe:/o:redhat:rhel_aus:8.2::baseos"
] | null | 7.5 | null | null |
RHSA-2020:0708 | Red Hat Security Advisory: http-parser security update | nodejs: HTTP request smuggling using malformed Transfer-Encoding header | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 7.1 | null | null |
RHSA-2019:1017 | Red Hat Security Advisory: ghostscript security update | ghostscript: missing attack vector protections for CVE-2019-6116 | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 7.3 | null |
RHSA-2012:0676 | Red Hat Security Advisory: kvm security and bug fix update | kernel: kvm: irqchip_in_kernel() and vcpu->arch.apic inconsistency kvm: device assignment page leak | [
"cpe:/a:redhat:rhel_virtualization:5::client",
"cpe:/a:redhat:rhel_virtualization:5::server"
] | null | null | null | null |
RHSA-2003:281 | Red Hat Security Advisory: : Updated MySQL packages fix vulnerability | security flaw | [
"cpe:/o:redhat:linux:7.1",
"cpe:/o:redhat:linux:7.2",
"cpe:/o:redhat:linux:7.3",
"cpe:/o:redhat:linux:8.0",
"cpe:/o:redhat:linux:9"
] | null | null | null | null |
RHSA-2022:0306 | Red Hat Security Advisory: java-1.8.0-openjdk security update | OpenJDK: Incomplete deserialization class filtering in ObjectInputStream (Serialization, 8264934) OpenJDK: Insufficient URI checks in the XSLT TransformerImpl (JAXP, 8270492) OpenJDK: Unexpected exception thrown in regex Pattern (Libraries, 8268813) OpenJDK: Incomplete checks of StringBuffer and StringBuilder during deserialization (Libraries, 8270392) OpenJDK: Incorrect IdentityHashMap size checks during deserialization (Libraries, 8270416) OpenJDK: Incorrect access checks in XMLEntityManager (JAXP, 8270498) OpenJDK: Infinite loop related to incorrect handling of newlines in XMLEntityScanner (JAXP, 8270646) OpenJDK: Array indexing issues in LIRGenerator (Hotspot, 8272014) OpenJDK: Excessive resource use when reading JAR manifest attributes (Libraries, 8272026) OpenJDK: Insufficient checks when deserializing exceptions in ObjectInputStream (Serialization, 8272236) OpenJDK: Excessive memory allocation in BMPImageReader (ImageIO, 8273756) OpenJDK: Integer overflow in BMPImageReader (ImageIO, 8273838) | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 5.3 | null | null |
RHSA-2019:0547 | Red Hat Security Advisory: OpenShift Container Platform 3.9 haproxy security update | haproxy: Out-of-bounds read in dns.c:dns_validate_dns_response() allows for memory disclosure haproxy: Mishandling of priority flag in short HEADERS frame by HTTP/2 decoder allows for crash | [
"cpe:/a:redhat:openshift:3.9::el7"
] | null | null | 5.9 | null |
RHSA-2023:1326 | Red Hat Security Advisory: OpenShift Container Platform 4.13.0 security update | go-yaml: Denial of Service in go-yaml goutils: RandomAlphaNumeric and CryptoRandomAlphaNumeric are not as random as they should be mongo-go-driver: specific cstrings input may not be properly validated golang: out-of-bounds read in golang.org/x/text/language leads to DoS prometheus/client_golang: Denial of service using InstrumentHandlerCounter helm: Denial of service through through repository index file helm: Denial of service through schema file golang: crash in a golang.org/x/crypto/ssh server vault: insufficient certificate revocation list checking golang: net/http: excessive memory growth in a Go server accepting HTTP/2 requests x/net/http2/h2c: request smuggling golang.org/x/net/http2: avoid quadratic complexity in HPACK decoding golang: crypto/tls: large handshake records may cause panics golang: net/http, mime/multipart: denial of service from excessive resource consumption exporter-toolkit: authentication bypass via cache poisoning vault: Vault’s Microsoft SQL Database Storage Backend Vulnerable to SQL Injection Via Configuration File hashicorp/vault: Vault’s PKI Issuer Endpoint Did Not Correctly Authorize Access to Issuer Metadata hashicorp/vault: Cache-Timing Attacks During Seal and Unseal Operations helm: getHostByName Function Information Disclosure containerd: Supplementary groups are not set up properly runc: Rootless runc makes `/sys/fs/cgroup` writable runc: volume mount race condition (regression of CVE-2019-19921) runc: AppArmor can be bypassed when `/proc` inside the container is symlinked with a specific mount configuration baremetal-operator: plain-text username and hashed password readable by anyone having a cluster-wide read-access | [
"cpe:/a:redhat:openshift:4.13::el8",
"cpe:/a:redhat:openshift:4.13::el9"
] | null | 6 | null | null |
RHSA-2020:4682 | Red Hat Security Advisory: grafana security, bug fix, and enhancement update | grafana: XSS vulnerability via a column style on the "Dashboard > Table Panel" screen grafana: arbitrary file read via MySQL data source grafana: stored XSS grafana: XSS annotation popup vulnerability grafana: XSS via column.title or cellLinkTooltip grafana: information disclosure through world-readable /var/lib/grafana/grafana.db grafana: information disclosure through world-readable grafana configuration files grafana: XSS via the OpenTSDB datasource | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 6.1 | null | null |
RHSA-2024:8035 | Red Hat Security Advisory: python3.11-urllib3 security update | urllib3: proxy-authorization request header is not stripped during cross-origin redirects | [
"cpe:/a:redhat:rhel_eus:8.8::appstream"
] | null | 4.4 | null | null |
RHSA-2024:7136 | Red Hat Security Advisory: git-lfs security update | encoding/gob: golang: Calling Decoder.Decode on a message which contains deeply nested structures can cause a panic due to stack exhaustion | [
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 7.5 | null | null |
RHSA-2023:5707 | Red Hat Security Advisory: dotnet6.0 security update | HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack) | [
"cpe:/a:redhat:rhel_eus:8.6::appstream",
"cpe:/a:redhat:rhel_eus:8.6::crb"
] | null | 7.5 | null | null |
RHSA-2023:7885 | Red Hat Security Advisory: postgresql:15 security update | postgresql: Memory disclosure in aggregate function calls postgresql: Buffer overrun from integer overflow in array modification postgresql: Role pg_signal_backend can signal certain superuser processes. postgresql: extension script @substitutions@ within quoting allow SQL injection postgresql: MERGE fails to enforce UPDATE or SELECT row security policies | [
"cpe:/a:redhat:rhel_eus:9.2::appstream"
] | null | 3.1 | null | null |
RHBA-2019:2794 | Red Hat Bug Fix Advisory: OpenShift Container Platform 4.1.16 packages update | kubernetes: Incomplete fixes for CVE-2019-1002101 and CVE-2019-11246, kubectl cp potential directory traversal | [
"cpe:/a:redhat:openshift:4.1::el7",
"cpe:/a:redhat:openshift:4.1::el8"
] | null | null | 4.8 | null |
RHSA-2024:3580 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 8.0.2 Security update | eap-galleon: custom provisioning creates unsecured http-invoker EAP: OIDC app attempting to access the second tenant, the user should be prompted to log jberet: jberet-core logging database credentials EAP: wildfly-elytron has a SSRF security issue | [
"cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el8"
] | null | 7.3 | null | null |
RHSA-2013:1825 | Red Hat Security Advisory: php53 security update | php: memory corruption in openssl_x509_parse() | [
"cpe:/o:redhat:rhel_eus:5.6",
"cpe:/o:redhat:rhel_eus:5.9"
] | null | null | null | null |
RHSA-2019:3624 | Red Hat Security Advisory: libseccomp security, bug fix, and enhancement update | libseccomp: incorrect generation of syscall filters in libseccomp | [
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb",
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | null | 7.3 | null |
RHSA-2021:1313 | Red Hat Security Advisory: Satellite 6.9 Release | rubygem-rest-client: session fixation vulnerability Set-Cookie headers present in an HTTP 30x redirection responses rubygem-rest-client: unsanitized application logging foreman: Managing repositories with their id via hammer does not respect the role filters rack-protection: Timing attack in authenticity_token.rb rubygem-rack: hijack sessions by using timing attacks targeting the session id python-psutil: Double free because of refcount mishandling rubygem-activestorage: circumvention of file size limits in ActiveStorage rubygem-actionpack: possible strong parameters bypass rubygem-activesupport: potentially unintended unmarshalling of user-provided objects in MemCacheStore and RedisCacheStore rubygem-actionpack: ability to forge per-form CSRF tokens given a global CSRF token rubygem-actionview: CSRF vulnerability in rails-ujs rubygem-rails: untrusted users able to run pending migrations in production django: potential SQL injection via "tolerance" parameter in GIS functions and aggregates on Oracle netty: compression/decompression codecs don't enforce limits on buffer allocation sizes foreman: world-readable OMAPI secret through the ISC DHCP server rubygem-activeview: Cross-site scripting in translation helpers resteasy-client: potential sensitive information leakage in JAX-RS RESTEasy Client's WebApplicationException handling | [
"cpe:/a:redhat:satellite:6.9::el7",
"cpe:/a:redhat:satellite_capsule:6.9::el7"
] | null | 5.3 | 7 | null |
RHSA-2024:5871 | Red Hat Security Advisory: bind security update | bind: bind9: BIND's database will be slow if a very large number of RRs exist at the same nam bind9: bind: SIG(0) can be used to exhaust CPU resources | [
"cpe:/a:redhat:rhel_aus:8.4::appstream",
"cpe:/a:redhat:rhel_e4s:8.4::appstream",
"cpe:/a:redhat:rhel_tus:8.4::appstream",
"cpe:/o:redhat:rhel_aus:8.4::baseos",
"cpe:/o:redhat:rhel_e4s:8.4::baseos",
"cpe:/o:redhat:rhel_tus:8.4::baseos"
] | null | 7.5 | null | null |
RHSA-2014:0865 | Red Hat Security Advisory: tomcat6 security and bug fix update | Tomcat/JBossWeb: Limited DoS in chunked transfer encoding input filter Tomcat/JBossWeb: XXE vulnerability via user supplied XSLTs Tomcat/JBossWeb: Request smuggling via malicious content length header | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2018:2938 | Red Hat Security Advisory: Red Hat OpenShift Application Runtimes Thorntail 2.2.0 security & bug fix update | undertow: Path traversal in ServletResourceManager class jackson-databind: incomplete fix for CVE-2017-7525 permits unsafe serialization via c3p0 libraries | [
"cpe:/a:redhat:openshift_application_runtimes:1.0"
] | null | null | 8.1 | null |
RHSA-2011:0169 | Red Hat Security Advisory: java-1.5.0-ibm security and bug fix update | OpenJDK Swing unsafe reflection usage (6622002) OpenJDK Swing mutable static (6938813) JDK unspecified vulnerability in 2D component | [
"cpe:/a:redhat:rhel_extras:4",
"cpe:/a:redhat:rhel_extras:5::client",
"cpe:/a:redhat:rhel_extras:5::server",
"cpe:/a:redhat:rhel_extras:6"
] | null | null | null | null |
RHSA-2021:4994 | Red Hat Security Advisory: nss security update | nss: Memory corruption in decodeECorDsaSignature with DSA signatures (and RSA-PSS) | [
"cpe:/o:redhat:rhel_aus:7.3::server"
] | null | 9.8 | null | null |
RHSA-2021:3516 | Red Hat Security Advisory: EAP XP 2 security update to CVE fixes in the EAP 7.3.x base | undertow: HTTP2SourceChannel fails to write final frame under some circumstances may lead to DoS wildfly-core: Invalid Sensitivity Classification of Vault Expression undertow: buffer leak on incoming websocket PONG message may lead to DoS jakarta-el: ELParserTokenManager enables invalid EL expressions to be evaluate apache-commons-io: Limited path traversal in Apache Commons IO 2.2 to 2.6 | [
"cpe:/a:redhat:jbosseapxp"
] | null | 4.8 | null | null |
RHSA-2017:3474 | Red Hat Security Advisory: qemu-kvm-rhev security and bug fix update | Qemu: qemu-nbd crashes due to undefined I/O coroutine Qemu: qemu-nbd: server breaks with SIGPIPE upon client abort Qemu: exec: oob access during dma operation Qemu: i386: multiboot OOB access while loading kernel image Qemu: cirrus: OOB access issue in mode4and5 write functions | [
"cpe:/a:redhat:openstack:10::el7"
] | null | null | 4.4 | null |
RHSA-2019:0148 | Red Hat Security Advisory: qemu-kvm-rhev security update | hw: cpu: speculative store bypass | [
"cpe:/a:redhat:openstack_els:7::el7.4"
] | null | null | 5.6 | null |
RHSA-2021:0257 | Red Hat Security Advisory: net-snmp security update | net-snmp: Improper Privilege Management in EXTEND MIB may lead to privileged commands execution | [
"cpe:/o:redhat:rhel_aus:7.4::server",
"cpe:/o:redhat:rhel_e4s:7.4::server",
"cpe:/o:redhat:rhel_tus:7.4::server"
] | null | 8.8 | null | null |
RHSA-2012:0108 | Red Hat Security Advisory: jbosscache security update | Cache: NonManagedConnectionFactory will log password in clear text when an exception occurs | [
"cpe:/a:redhat:jboss_enterprise_application_platform:5.1"
] | null | null | null | null |
RHSA-2022:7461 | Red Hat Security Advisory: libreoffice security update | libreoffice: Incorrect trust validation of signature with ambiguous KeyInfo children | [
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb"
] | null | 6.2 | null | null |
RHSA-2008:0515 | Red Hat Security Advisory: evolution28 security update | evolution: iCalendar buffer overflow via large timezone specification evolution: iCalendar buffer overflow via large description parameter | [
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2021:0163 | Red Hat Security Advisory: postgresql:12 security update | postgresql: ALTER ... DEPENDS ON EXTENSION is missing authorization checks postgresql: Uncontrolled search path element in logical replication postgresql: Uncontrolled search path element in CREATE EXTENSION postgresql: Reconnection can downgrade connection security settings postgresql: Multiple features escape "security restricted operation" sandbox postgresql: psql's \gset allows overwriting specially treated variables | [
"cpe:/a:redhat:rhel_eus:8.2::appstream"
] | null | 7.5 | null | null |
RHSA-2022:0629 | Red Hat Security Advisory: kernel-rt security and bug fix update | kernel: Use After Free in unix_gc() which could result in a local privilege escalation kernel: use-after-free in RDMA listen() kernel: xfs: raw block device data leak in XFS_IOC_ALLOCSP IOCTL | [
"cpe:/a:redhat:rhel_eus:8.2::nfv",
"cpe:/a:redhat:rhel_eus:8.2::realtime"
] | null | 5.5 | null | null |
RHSA-2014:1762 | Red Hat Security Advisory: spacewalk-java security update | Satellite: Spacewalk contains multiple XSS (stored and reflected) | [
"cpe:/a:redhat:network_satellite:5.5::el5",
"cpe:/a:redhat:network_satellite:5.5::el6",
"cpe:/a:redhat:network_satellite:5.6::el5",
"cpe:/a:redhat:network_satellite:5.6::el6"
] | null | null | null | null |
RHSA-2018:2840 | Red Hat Security Advisory: Red Hat JBoss Fuse/A-MQ 6.3 R9 security and bug fix update | Console: HTTPOnly and Secure attributes not set on cookies in Red Hat AMQ | [
"cpe:/a:redhat:jboss_amq:6.3",
"cpe:/a:redhat:jboss_fuse:6.3"
] | null | null | null | null |
RHSA-2023:5706 | Red Hat Security Advisory: dotnet6.0 security update | HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack) | [
"cpe:/a:redhat:rhel_eus:9.0::appstream",
"cpe:/a:redhat:rhel_eus:9.0::crb"
] | null | 7.5 | null | null |
RHSA-2024:5076 | Red Hat Security Advisory: krb5 security update | krb5: GSS message token handling krb5: GSS message token handling | [
"cpe:/o:redhat:rhel_els:7"
] | null | 6.5 | null | null |
RHBA-2024:1246 | Red Hat Bug Fix Advisory: Multicluster Engine for Kubernetes 2.4.4 bug fixes | moby: Encrypted overlay network may be unauthenticated moby: Encrypted overlay network traffic may be unencrypted moby: Encrypted overlay network with a single endpoint is unauthenticated | [
"cpe:/a:redhat:multicluster_engine:2.4::el8"
] | null | 6.8 | null | null |
RHSA-2020:2849 | Red Hat Security Advisory: nodejs:10 security update | nodejs-minimist: prototype pollution allows adding or modifying properties of Object.prototype using a constructor or __proto__ payload nodejs: memory corruption in napi_get_value_string_* functions nghttp2: overly large SETTINGS frames can lead to DoS | [
"cpe:/a:redhat:rhel_eus:8.1::appstream"
] | null | 7.5 | null | null |
RHSA-2017:1597 | Red Hat Security Advisory: openstack-keystone security, bug fix, and enhancement update | openstack-keystone: Incorrect role assignment with federated Keystone | [
"cpe:/a:redhat:openstack:10::el7"
] | null | null | 6.8 | null |
RHSA-2020:3833 | Red Hat Security Advisory: firefox security update | Mozilla: Memory safety bugs fixed in Firefox 81 and Firefox ESR 78.3 Mozilla: XSS when pasting attacker-controlled data into a contenteditable element Mozilla: Download origin spoofing via redirect Mozilla: When recursing through layers while scrolling, an iterator may have become invalid, resulting in a potential use-after-free scenario | [
"cpe:/a:redhat:rhel_eus:8.1::appstream"
] | null | 8.8 | 6.1 | null |
RHSA-2022:8361 | Red Hat Security Advisory: e2fsprogs security update | e2fsprogs: out-of-bounds read/write via crafted filesystem | [
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/o:redhat:enterprise_linux:9::baseos"
] | null | 5.8 | null | null |
RHSA-2016:0619 | Red Hat Security Advisory: samba security update | samba: crash in dcesrv_auth_bind_ack due to missing error check samba: Man-in-the-middle attacks possible with NTLMSSP authentication samba: Spoofing vulnerability when domain controller is configured samba: Missing downgrade detection samba: Smb signing not required by default when smb client connection is used for ipc usage samba: SAMR and LSA man in the middle attacks | [
"cpe:/o:redhat:rhel_aus:6.4::server",
"cpe:/o:redhat:rhel_aus:6.5::server",
"cpe:/o:redhat:rhel_eus:6.6::computenode",
"cpe:/o:redhat:rhel_eus:6.6::server",
"cpe:/o:redhat:rhel_mission_critical:6.2::server"
] | null | null | null | null |
RHSA-2015:2645 | Red Hat Security Advisory: kernel security and bug fix update | virt: guest to host DoS by triggering an infinite loop in microcode via #AC exception virt: guest to host DoS by triggering an infinite loop in microcode via #DB exception | [
"cpe:/o:redhat:rhel_aus:6.5::server"
] | null | null | null | null |
RHSA-2016:0534 | Red Hat Security Advisory: mariadb security and bug fix update | mysql: unspecified vulnerability related to Server:Partition (CPU October 2015) mysql: unspecified vulnerability related to Server:Partition (CPU October 2015) mysql: unspecified vulnerability related to Server:DDL (CPU October 2015) mysql: unspecified vulnerability related to Server:InnoDB (CPU October 2015) mysql: unspecified vulnerability related to Client programs (CPU October 2015) mysql: unspecified vulnerability related to Server:Types (CPU October 2015) mysql: unspecified vulnerability related to Server:Security:Privileges (CPU October 2015) mysql: unspecified vulnerability related to Server:SP (CPU October 2015) mysql: unspecified vulnerability related to Server:DML (CPU October 2015) mysql: unspecified vulnerability related to Server:InnoDB (CPU October 2015) mysql: unspecified vulnerability related to Server:Parser (CPU October 2015) mysql: unspecified vulnerability related to Server:DML (CPU October 2015) mysql: unspecified vulnerability related to Server:DML (CPU October 2015) mysql: unspecified vulnerability in subcomponent: Server: Options (CPU January 2016) mysql: unspecified vulnerability in subcomponent: Client (CPU January 2016) mysql: unspecified vulnerability in subcomponent: Server: DML (CPU January 2016) mysql: unspecified vulnerability in subcomponent: Server: Optimizer (CPU January 2016) mysql: unspecified vulnerability in subcomponent: Server: DML (CPU January 2016) mysql: unspecified vulnerability in subcomponent: Server: InnoDB (CPU January 2016) mysql: unspecified vulnerability in subcomponent: Server: Security: Encryption (CPU January 2016) mysql: unspecified vulnerability in subcomponent: Server: UDF (CPU January 2016) mysql: unspecified vulnerability in subcomponent: Server: Security: Privileges (CPU January 2016) mysql: unspecified vulnerability in subcomponent: Server: Optimizer (CPU January 2016) mysql: unspecified vulnerability in subcomponent: Server: Federated (CPU April 2016) mysql: unspecified vulnerability in subcomponent: Server: Optimizer (CPU April 2016) mysql: ssl-validate-cert incorrect hostname check mysql: unspecified vulnerability in subcomponent: Server: Option (CPU July 2016) | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 7.5 | null |
RHSA-2017:0260 | Red Hat Security Advisory: ansible and gdeploy security and bug fix update | Ansible: Compromised remote hosts can lead to running commands on the Ansible controller | [
"cpe:/a:redhat:storage:3.1:server:el7"
] | null | null | 6.6 | null |
RHSA-2006:0197 | Red Hat Security Advisory: python security update | pcre heap overflow | [
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws",
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2003:095 | Red Hat Security Advisory: : New samba packages fix security vulnerabilities | security flaw security flaw | [
"cpe:/o:redhat:linux:6.2",
"cpe:/o:redhat:linux:7.0",
"cpe:/o:redhat:linux:7.1",
"cpe:/o:redhat:linux:7.2",
"cpe:/o:redhat:linux:7.3",
"cpe:/o:redhat:linux:8.0",
"cpe:/o:redhat:linux:9"
] | null | null | null | null |
RHSA-2013:1063 | Red Hat Security Advisory: php security update | php: xml_parse_into_struct buffer overflow when parsing deeply nested XML | [
"cpe:/o:redhat:rhel_els:3::as",
"cpe:/o:redhat:rhel_els:3::es",
"cpe:/o:redhat:rhel_els:4::as",
"cpe:/o:redhat:rhel_els:4::es"
] | null | null | null | null |
RHSA-2008:0955 | Red Hat Security Advisory: java-1.4.2-ibm security update | Java RE allows Same Origin Policy to be Bypassed (6687932) Java Web Start, arbitrary file creation (6703909) Java Web Start arbitrary file creation/deletion file with user permissions (6704077) Java Web Start, untrusted application may determine Cache Location (6704074) | [
"cpe:/a:redhat:rhel_extras:3",
"cpe:/a:redhat:rhel_extras:4",
"cpe:/a:redhat:rhel_extras:5::client",
"cpe:/a:redhat:rhel_extras:5::server"
] | null | null | null | null |
RHSA-2023:5615 | Red Hat Security Advisory: libssh2 security update | libssh2: use-of-uninitialized-value in _libssh2_transport_read | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 7.5 | null | null |
RHSA-2018:3324 | Red Hat Security Advisory: fuse security update | fuse: bypass of the "user_allow_other" restriction when SELinux is active | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 5.3 | null |
RHSA-2020:0250 | Red Hat Security Advisory: Red Hat JBoss Core Services Apache HTTP Server 2.4.37 SP1 Security Update | httpd: URL normalization inconsistency curl: double free due to subsequent call of realloc() curl: heap buffer overflow in function tftp_receive_packet() | [
"cpe:/a:redhat:jboss_core_services:1::el6",
"cpe:/a:redhat:jboss_core_services:1::el7"
] | null | null | 6.3 | null |
RHSA-2021:3660 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.4.1 security update | velocity: arbitrary code execution when attacker is able to modify templates wildfly: XSS via admin console when creating roles in domain mode undertow: HTTP2SourceChannel fails to write final frame under some circumstances may lead to DoS wildfly-elytron: possible timing attack in ScramServer wildfly-core: Invalid Sensitivity Classification of Vault Expression undertow: buffer leak on incoming websocket PONG message may lead to DoS netty: possible request smuggling in HTTP/2 due missing validation netty: Request smuggling via content-length header jakarta-el: ELParserTokenManager enables invalid EL expressions to be evaluate apache-commons-io: Limited path traversal in Apache Commons IO 2.2 to 2.6 | [
"cpe:/a:redhat:jboss_enterprise_application_platform:7.4"
] | null | 4.8 | null | null |
RHSA-2014:0372 | Red Hat Security Advisory: Red Hat JBoss BRMS 6.0.1 update | RESTEasy: XML eXternal Entity (XXE) flaw RESTEasy: XML eXternal Entity (XXE) flaw bouncycastle: TLS CBC padding timing attack Drools: Remote Java Code Execution in MVEL XStream: remote code execution due to insecure XML deserialization Camel: XML eXternal Entity (XXE) flaw in XSLT component Camel: remote code execution via XSL | [
"cpe:/a:redhat:jboss_brms:6.0"
] | null | null | null | null |
RHSA-2024:4210 | Red Hat Security Advisory: redhat-ds:11 security update | 389-ds-base: Malformed userPassword may cause crash at do_modify in slapd/modify.c 389-ds-base: potential denial of service via specially crafted kerberos AS-REQ request | [
"cpe:/a:redhat:directory_server:11.9::el8"
] | null | 7.5 | null | null |
RHSA-2024:0089 | Red Hat Security Advisory: kpatch-patch security update | kernel: use after free in unix_stream_sendpage kernel: netfilter: potential slab-out-of-bound access due to integer underflow | [
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 7 | null | null |
RHSA-2019:4159 | Red Hat Security Advisory: kernel security and bug fix update | kernel: Out-of-bounds heap access in xfrm kernel: Exploitable memory corruption due to UFO to non-UFO path switch kernel: Out-of-bounds write via userland offsets in ebt_entry struct in netfilter/ebtables.c kernel: Memory corruption due to incorrect socket cloning kernel: Missing check in fs/inode.c:inode_init_owner() does not clear SGID bit on non-directories for non-members kernel: Use-after-free due to race condition in AF_PACKET implementation Kernel: page cache side channel attacks | [
"cpe:/o:redhat:rhel_aus:7.3::server",
"cpe:/o:redhat:rhel_e4s:7.3::server",
"cpe:/o:redhat:rhel_tus:7.3::server"
] | null | null | 7.1 | null |
RHSA-2015:1913 | Red Hat Security Advisory: flash-plugin security update | flash-plugin: multiple code execution issue fixed in APSB15-27 flash-plugin: multiple code execution issue fixed in APSB15-27 flash-plugin: multiple code execution issue fixed in APSB15-27 | [
"cpe:/a:redhat:rhel_extras:6"
] | null | null | null | null |
RHSA-2023:3193 | Red Hat Security Advisory: Red Hat Integration Camel Extensions for Quarkus 2.7.1-1 security update | json-smart: Uncontrolled Resource Consumption vulnerability in json-smart (Resource Exhaustion) | [
"cpe:/a:redhat:camel_quarkus:2.7"
] | null | 7.5 | null | null |
RHSA-2001:142 | Red Hat Security Advisory: kernel 2.2 and 2.4 | security flaw security flaw | [
"cpe:/o:redhat:linux:6.2",
"cpe:/o:redhat:linux:7.0",
"cpe:/o:redhat:linux:7.1",
"cpe:/o:redhat:linux:7.2"
] | null | null | null | null |
RHSA-2022:0843 | Red Hat Security Advisory: thunderbird security update | thunderbird: Crafted email could trigger an out-of-bounds write expat: Malformed 2- and 3-byte UTF-8 sequences can lead to arbitrary code execution expat: Namespace-separator characters in "xmlns[:prefix]" attribute values can lead to arbitrary code execution expat: Integer overflow in storeRawNames() Mozilla: Use-after-free in text reflows Mozilla: Browser window spoof using fullscreen mode Mozilla: iframe allow-scripts sandbox bypass Mozilla: Temporary files downloaded to /tmp and accessible by other local users Mozilla: Time-of-check time-of-use bug when verifying add-on signatures Mozilla: Use-after-free in XSLT parameter processing Mozilla: Use-after-free in WebGPU IPC Framework | [
"cpe:/a:redhat:rhel_eus:8.2::appstream"
] | null | 8.8 | 7.5 | null |
RHSA-2020:1764 | Red Hat Security Advisory: python3 security and bug fix update | python: Cookie domain check returns incorrect results python: email.utils.parseaddr wrongly parses email addresses | [
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | null | 7.3 | null |
RHSA-2024:1059 | Red Hat Security Advisory: python-pillow security update | pillow: Arbitrary Code Execution via the environment parameter | [
"cpe:/a:redhat:rhel_aus:8.2::appstream"
] | null | 8.1 | null | null |
RHSA-2017:2675 | Red Hat Security Advisory: Red Hat Mobile Application Platform security update | RHMAP Millicore IDE allows RCE on SCM RHMAP: SSRF via external_request feature of App Studio RHMAP: Stored XSS in App Store git: Command injection via malicious ssh URLs | [
"cpe:/a:redhat:mobile_application_platform:4.5"
] | null | null | 6.3 | null |
RHSA-2021:3891 | Red Hat Security Advisory: java-11-openjdk security update | OpenJDK: Weak ciphers preferred over stronger ones for TLS (JSSE, 8264210) OpenJDK: Excessive memory allocation in RTFParser (Swing, 8265167) OpenJDK: Excessive memory allocation in RTFReader (Swing, 8265580) OpenJDK: Excessive memory allocation in HashMap and HashSet (Utility, 8266097) OpenJDK: Certificates with end dates too far in the future can corrupt keystore (Keytool, 8266137) OpenJDK: Loop in HttpsServer triggered during TLS session close (JSSE, 8254967) OpenJDK: Incorrect principal selection when using Kerberos Constrained Delegation (Libraries, 8266689) OpenJDK: Unexpected exception raised during TLS handshake (JSSE, 8267729) OpenJDK: Excessive memory allocation in BMPImageReader (ImageIO, 8267735) OpenJDK: Non-constant comparison during TLS handshakes (JSSE, 8269618) | [
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb"
] | null | 3.7 | null | null |
RHSA-2008:0616 | Red Hat Security Advisory: thunderbird security update | mozilla: CSS reference counter overflow (ZDI-CAN-349) Firefox malformed web content flaws Firefox javascript arbitrary code execution Firefox XSS attacks Firefox arbitrary signed JAR code execution Firefox arbitrary JavaScript code execution Firefox javascript arbitrary code execution Firefox arbitrary file disclosure Firefox .properties memory leak Firefox file location escaping flaw Firefox self signed certificate flaw Firefox arbitrary file disclosure Firefox block reflow flaw | [
"cpe:/a:redhat:rhel_productivity:5",
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws",
"cpe:/o:redhat:enterprise_linux:5::client"
] | null | null | null | null |
RHSA-2019:2860 | Red Hat Security Advisory: OpenShift Container Platform 4.1.18 security update | kibana: Cross-site scripting vulnerability permits perform destructive actions on behalf of other Kibana users kibana: Arbitrary code execution flaw in the Timelion visualizer kibana: Audit logging Remote Code Execution issue | [
"cpe:/a:redhat:openshift:4.1::el7"
] | null | null | 8.1 | null |
RHSA-2019:0010 | Red Hat Security Advisory: rh-perl524-perl security update | perl: Integer overflow leading to buffer overflow in Perl_my_setenv() perl: Heap-based buffer overflow in S_handle_regex_sets() perl: Heap-based buffer read overflow in S_grok_bslash_N() perl: Heap-based buffer overflow in S_regatom() | [
"cpe:/a:redhat:rhel_software_collections:3::el6",
"cpe:/a:redhat:rhel_software_collections:3::el7"
] | null | null | 7 | null |
RHSA-2014:0593 | Red Hat Security Advisory: kernel security and bug fix update | kernel: vhost-net: insufficiency in handling of big packets in handle_rx() kernel: netfilter: nf_conntrack_dccp: incorrect skb_header_pointer API usages | [
"cpe:/o:redhat:rhel_eus:6.3::computenode",
"cpe:/o:redhat:rhel_eus:6.3::server"
] | null | null | null | null |
RHSA-2019:1484 | Red Hat Security Advisory: kernel security and bug fix update | Kernel: tcp: integer overflow while processing SACK blocks allows remote denial of service Kernel: tcp: excessive resource consumption while processing SACK blocks allows remote denial of service kernel: tcp: excessive resource consumption for TCP connections with low MSS allows remote denial of service | [
"cpe:/o:redhat:rhel_aus:7.3::server",
"cpe:/o:redhat:rhel_e4s:7.3::server",
"cpe:/o:redhat:rhel_tus:7.3::server"
] | null | null | 5.3 | null |
RHSA-2011:0372 | Red Hat Security Advisory: flash-plugin security update | flash-plugin: crash and potential arbitrary code execution (APSB11-05) | [
"cpe:/a:redhat:rhel_extras:5::client",
"cpe:/a:redhat:rhel_extras:5::server",
"cpe:/a:redhat:rhel_extras:6"
] | null | null | null | null |
RHSA-2016:2973 | Red Hat Security Advisory: thunderbird security update | Mozilla: Memory safety bugs fixed in Firefox 50.1 and Firefox ESR 45.6 (MFSA 2016-95) Mozilla: CSP bypass using marquee tag (MFSA 2016-94, MFSA 2016-95) Mozilla: Use-after-free while manipulating DOM events and audio elements (MFSA 2016-94, MFSA 2016-95) Mozilla: Restricted external resources can be loaded by SVG images through data URLs (MFSA 2016-94, MFSA 2016-95) Mozilla: Data from Pocket server improperly sanitized before execution (MFSA 2016-94, MFSA 2016-95) Mozilla: Pocket extension does not validate the origin of events (MFSA 2016-94, MFSA 2016-95) Mozilla: Crash in EnumerateSubDocuments (MFSA 2016-94, MFSA 2016-95) | [
"cpe:/a:redhat:rhel_productivity:5",
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation",
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 8.8 | null |
RHSA-2024:6358 | Red Hat Security Advisory: python-urllib3 security update | urllib3: proxy-authorization request header is not stripped during cross-origin redirects | [
"cpe:/o:redhat:rhel_e4s:9.0::baseos"
] | null | 4.4 | null | null |
RHSA-2019:0711 | Red Hat Security Advisory: openssh security update | openssh: User enumeration via malformed packets in authentication requests | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | 5.3 | null |
RHSA-2023:5204 | Red Hat Security Advisory: libwebp security update | libwebp: Heap buffer overflow in WebP Codec libwebp: out-of-bounds write with a specially crafted WebP lossless file | [
"cpe:/a:redhat:rhel_eus:9.0::appstream"
] | null | 0 | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.