id
stringlengths 13
15
| title
stringlengths 29
176
| description
stringlengths 8
32.1k
| cpes
sequencelengths 0
20
| cvss_v4_0
null | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
null |
---|---|---|---|---|---|---|---|
RHSA-2024:4375 | Red Hat Security Advisory: postgresql-jdbc security update | pgjdbc: PostgreSQL JDBC Driver allows attacker to inject SQL if using PreferQueryMode=SIMPLE | [
"cpe:/a:redhat:rhel_aus:8.4::appstream",
"cpe:/a:redhat:rhel_e4s:8.4::appstream",
"cpe:/a:redhat:rhel_tus:8.4::appstream"
] | null | 9.8 | null | null |
RHSA-2023:1593 | Red Hat Security Advisory: httpd security update | httpd: HTTP request splitting with mod_rewrite and mod_proxy | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 9.8 | null | null |
RHSA-2023:4634 | Red Hat Security Advisory: rust security update | rust-cargo: cargo does not respect the umask when extracting dependencies | [
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 6.7 | null | null |
RHSA-2015:1679 | Red Hat Security Advisory: python-django-horizon security and bug fix update | python-django-horizon: XSS in Heat stack creation python-django-horizon: persistent XSS in Horizon metadata dashboard | [
"cpe:/a:redhat:openstack:6::el7"
] | null | null | null | null |
RHSA-2023:1486 | Red Hat Security Advisory: Red Hat Gluster Storage web-admin-build security update | puma-5.6.4: http request smuggling vulnerabilities rubygem-rack: crafted multipart POST request may cause a DoS rubygem-rack: crafted requests can cause shell escape sequences moment: inefficient parsing algorithm resulting in DoS rubygem-tzinfo: arbitrary code execution | [
"cpe:/a:redhat:storage:3.5:wa:el7"
] | null | 7.5 | null | null |
RHSA-2012:1539 | Red Hat Security Advisory: Red Hat Network Proxy server jabberd security update | jabberd: Prone to unsolicited XMPP Dialback attacks | [
"cpe:/a:redhat:network_proxy:5.5::el5",
"cpe:/a:redhat:network_proxy:5.5::el6"
] | null | null | null | null |
RHSA-2012:0422 | Red Hat Security Advisory: rhev-hypervisor6 security and bug fix update | kernel: kvm: syscall instruction induced guest panic kernel: igmp: Avoid zero delay when receiving odd mixture of IGMP queries | [
"cpe:/o:redhat:enterprise_linux:6::hypervisor"
] | null | null | null | null |
RHSA-2018:1274 | Red Hat Security Advisory: python-paramiko security, bug fix, and enhancement update | python-paramiko: Authentication bypass in transport.py | [
"cpe:/a:redhat:rhev_manager:4",
"cpe:/o:redhat:enterprise_linux:7::hypervisor"
] | null | null | 9.8 | null |
RHSA-2022:1950 | Red Hat Security Advisory: dovecot security update | dovecot: plaintext commands injection | [
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb"
] | null | 4.2 | null | null |
RHSA-2023:7389 | Red Hat Security Advisory: kernel-rt security update | kernel: use-after-free due to race condition in qdisc_graft() kernel: net/sched: cls_fw component can be exploited as result of failure in tcf_change_indev function kernel: tun: bugs for oversize packet when napi frags enabled in tun_napi_alloc_frags kernel: netfilter: use-after-free due to improper element removal in nft_pipapo_remove() kernel: netfilter: nf_tables_newrule when adding a rule with NFTA_RULE_CHAIN_ID leads to use-after-free hw: amd: Cross-Process Information Leak kernel: netfilter: potential slab-out-of-bound access due to integer underflow | [
"cpe:/a:redhat:rhel_eus:9.0::nfv",
"cpe:/a:redhat:rhel_eus:9.0::realtime"
] | null | 7 | null | null |
RHSA-2022:6608 | Red Hat Security Advisory: dbus-broker security update | dbus-broker: a stack buffer over-read if a malicious Exec line is supplied dbus-broker: null pointer reference when supplying a malformed XML config file | [
"cpe:/o:redhat:enterprise_linux:9::baseos"
] | null | 7.5 | null | null |
RHSA-2015:1455 | Red Hat Security Advisory: thunderbird security update | Mozilla: Miscellaneous memory safety hazards (rv:31.8 / rv:38.1) (MFSA 2015-59) Mozilla: Miscellaneous memory safety hazards (rv:31.8 / rv:38.1) (MFSA 2015-59) Mozilla: Use-after-free in Content Policy due to microtask execution error (MFSA 2015-63) Mozilla: Vulnerabilities found through code inspection (MFSA 2015-66) Mozilla: Vulnerabilities found through code inspection (MFSA 2015-66) Mozilla: Vulnerabilities found through code inspection (MFSA 2015-66) Mozilla: Vulnerabilities found through code inspection (MFSA 2015-66) Mozilla: Vulnerabilities found through code inspection (MFSA 2015-66) Mozilla: Vulnerabilities found through code inspection (MFSA 2015-66) Mozilla: Vulnerabilities found through code inspection (MFSA 2015-66) Mozilla: Key pinning is ignored when overridable errors are encountered (MFSA 2015-67) | [
"cpe:/a:redhat:rhel_productivity:5",
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation",
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | null | null |
RHSA-2017:0938 | Red Hat Security Advisory: python-defusedxml and python-pysaml2 security update | python-pysaml2: Entity expansion issue | [
"cpe:/a:redhat:openstack:10::el7"
] | null | null | 5.3 | null |
RHSA-2018:1458 | Red Hat Security Advisory: dhcp security update | dhcp: Command injection vulnerability in the DHCP client NetworkManager integration script | [
"cpe:/o:redhat:rhel_eus:6.7::computenode",
"cpe:/o:redhat:rhel_eus:6.7::server"
] | null | null | 7.5 | null |
RHSA-2014:0994 | Red Hat Security Advisory: openstack-keystone security update | openstack-keystone: privilege escalation through trust chained delegation openstack-keystone: Keystone V2 trusts privilege escalation through user supplied project id | [
"cpe:/a:redhat:openstack:3::el6",
"cpe:/a:redhat:openstack:4::el6"
] | null | null | null | null |
RHSA-2017:1616 | Red Hat Security Advisory: kernel-rt security and bug fix update | Kernel: Kvm: vmx/svm potential privilege escalation inside guest kernel: ipv4/tcp: Infinite loop in tcp_splice_read() kernel: net: Heap overflow in skb_to_sgvec in macsec.c kernel: nfsd: Incorrect handling of long RPC replies kernel: NFSv3 server does not properly handle payload bounds checking of WRITE requests kernel: heap/stack gap jumping via unbounded stack allocations kernel: Incorrectly mapped contents of PIE executable | [
"cpe:/a:redhat:rhel_extras_rt:7"
] | null | null | 2.9 | null |
RHSA-2022:0790 | Red Hat Security Advisory: Satellite 6.10.3 Async Bug Fix Update | Satellite: Allow unintended SCA certificate to authenticate Candlepin | [
"cpe:/a:redhat:satellite:6.10::el7",
"cpe:/a:redhat:satellite_capsule:6.10::el7"
] | null | 5.5 | null | null |
RHSA-2021:3527 | Red Hat Security Advisory: Red Hat Single Sign-On 7.4.9 security update on RHEL 6 | jackson-dataformat-cbor: Unchecked allocation of byte buffer can cause a java.lang.OutOfMemoryError exception keycloak: X509 Direct Grant Auth does not verify certificate timestamp validity keycloak: Brute force attack is possible even after the account lockout keycloak: Anyone can register a new device when there is no device registered for passwordless login keycloak-model-infinispan: authenticationSessions map in RootAuthenticationSessionEntity grows boundlessly could lead to a DoS attack | [
"cpe:/a:redhat:red_hat_single_sign_on:7::el6"
] | null | 7.5 | null | null |
RHSA-2025:3124 | Red Hat Security Advisory: Red Hat Ansible Automation Platform 2.4 Container Release Update | jinja2: Jinja sandbox breakout through attr filter selecting format method | [
"cpe:/a:redhat:ansible_automation_platform:2.4::el8",
"cpe:/a:redhat:ansible_automation_platform:2.4::el9"
] | null | 7.3 | null | null |
RHSA-2018:1058 | Red Hat Security Advisory: libvorbis security update | Mozilla: Vorbis audio processing out of bounds write (MFSA 2018-08) | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 7.8 | null |
RHSA-2018:1686 | Red Hat Security Advisory: qemu-kvm-rhev security update | hw: cpu: speculative store bypass | [
"cpe:/a:redhat:openstack:7::el7"
] | null | null | 5.6 | null |
RHSA-2013:0503 | Red Hat Security Advisory: 389-ds-base security, bug fix, and enhancement update | 389-ds-base: Change on SLAPI_MODRDN_NEWSUPERIOR is not evaluated in ACL (ACL rules bypass possible) | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2015:0675 | Red Hat Security Advisory: Red Hat JBoss Data Virtualization 6.1.0 update | CXF: SSL hostname verification bypass, incomplete CVE-2012-5783 fix OpenJDK: XML parsing Denial of Service (JAXP, 8017298) Java: Java XML Signature DoS Attack JSF: XSS due to insufficient escaping of user-supplied content in outputText tags and EL expressions JBossSX/PicketBox: World readable audit.log file Tomcat/JBossWeb: Limited DoS in chunked transfer encoding input filter Tomcat/JBossWeb: XXE vulnerability via user supplied XSLTs Tomcat/JBossWeb: Request smuggling via malicious content length header Tomcat/JBossWeb: XML parser hijack by malicious web application netty: DoS via memory exhaustion during data aggregation Tomcat/JBossWeb: request smuggling and limited DoS in ChunkedInputFilter JAX-RS: Information disclosure via XML eXternal Entity (XXE) RESTEasy: XXE via parameter entities PicketLink: XXE via insecure DocumentBuilderFactory usage CXF: SSL hostname verification bypass, incomplete CVE-2012-6153 fix Framework: Directory traversal CXF: Improper security semantics enforcement of SAML SubjectConfirmation methods RESTeasy: External entities expanded by DocumentProvider Weld: Limited information disclosure via stale thread state | [
"cpe:/a:redhat:jboss_data_virtualization:6.1"
] | null | null | 4.8 | null |
RHSA-2018:2095 | Red Hat Security Advisory: patch security update | patch: Malicious patch files cause ed to execute arbitrary commands | [
"cpe:/o:redhat:rhel_aus:6.6::server",
"cpe:/o:redhat:rhel_tus:6.6::server"
] | null | null | 7.8 | null |
RHSA-2024:0004 | Red Hat Security Advisory: thunderbird security update | Mozilla: Heap-buffer-overflow affecting WebGL <code>DrawElementsInstanced</code> method with Mesa VM driver Mozilla: Symlinks may resolve to smaller than expected buffers Mozilla: Heap buffer overflow in <code>nsTextFragment</code> Mozilla: Use-after-free in PR_GetIdentitiesLayer Mozilla: Potential sandbox escape due to <code>VideoBridge</code> lack of texture validation Mozilla: Heap buffer overflow affected <code>nsWindow::PickerOpen(void)</code> in headless mode Mozilla: Use-after-free in <code>nsDNSService</code> Mozilla: Undefined behavior in <code>ShutdownObserver()</code> Mozilla: Memory safety bugs fixed in Firefox 121, Firefox ESR 115.6, and Thunderbird 115.6 Mozilla: S/MIME signature accepted despite mismatching message date Mozilla: Truncated signed text was shown with a valid OpenPGP signature | [
"cpe:/a:redhat:rhel_eus:8.8::appstream"
] | null | 7.5 | null | null |
RHSA-2019:2205 | Red Hat Security Advisory: tomcat security, bug fix, and enhancement update | tomcat: Incorrect handling of empty string URL in security constraints can lead to unintended exposure of resources tomcat: Late application of security constraints can lead to resource exposure for unauthorised users tomcat: Insecure defaults in CORS filter enable 'supportsCredentials' for all origins tomcat: Host name verification missing in WebSocket client | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 4.3 | null |
RHSA-2005:335 | Red Hat Security Advisory: mozilla security update | security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw | [
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2016:1929 | Red Hat Security Advisory: Red Hat Virtualization Manager (RHV) bug fix 3.6.9 | org.ovirt.engine-root: engine-setup logs contained information for extracting admin password | [
"cpe:/a:redhat:rhev_manager:3"
] | null | null | null | null |
RHSA-2023:3740 | Red Hat Security Advisory: Red Hat Integration Camel for Spring Boot 3.20.1 Patch 1 release security update | spring-boot: Spring Boot Welcome Page DoS Vulnerability vertx-web: StaticHandler disclosure of classpath resources on Windows when mounted on a wildcard route | [
"cpe:/a:redhat:camel_spring_boot:3.20"
] | null | 5.3 | null | null |
RHSA-2002:133 | Red Hat Security Advisory: : Updated bind packages fix buffer overflow in resolver library | security flaw | [
"cpe:/o:redhat:linux:6.2",
"cpe:/o:redhat:linux:7.0",
"cpe:/o:redhat:linux:7.1",
"cpe:/o:redhat:linux:7.2",
"cpe:/o:redhat:linux:7.3"
] | null | null | null | null |
RHSA-2023:5042 | Red Hat Security Advisory: flac security update | flac: Remote Code Execution (RCE) via the bitwriter_grow_ function, by supplying crafted input to the encoder | [
"cpe:/a:redhat:rhel_e4s:8.1::appstream"
] | null | 7.8 | null | null |
RHSA-2023:4506 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform security update | jackson-databind: Possible DoS if using JDK serialization to serialize JsonNode jettison: Uncontrolled Recursion in JSONArray undertow: OutOfMemoryError due to @MultipartConfig handling | [
"cpe:/a:redhat:jboss_enterprise_application_platform:7.4::el8"
] | null | 7.5 | null | null |
RHSA-2008:0906 | Red Hat Security Advisory: java-1.6.0-ibm security update | OpenJDK JMX allows illegal operations with local monitoring (6332953) Java RE allows Same Origin Policy to be Bypassed (6687932) OpenJDK JAX-WS unauthorized URL access (6542088) security flaw Security Vulnerabilities in the Java Runtime Environment Scripting Language Support (6529568, 6529579) security flaw Java Web Start, arbitrary file creation (6703909) Java Web Start, untrusted application may determine Cache Location (6704074) | [
"cpe:/a:redhat:rhel_extras:4",
"cpe:/a:redhat:rhel_extras:5::client",
"cpe:/a:redhat:rhel_extras:5::server"
] | null | null | null | null |
RHSA-2020:5232 | Red Hat Security Advisory: thunderbird security update | Mozilla: Variable time processing of cross-origin images during drawImage calls Mozilla: Parsing mismatches could confuse and bypass security sanitizer for chrome privileged code Mozilla: Fullscreen could be enabled without displaying the security UI Mozilla: XSS through paste (manual and clipboard API) Mozilla: Requests intercepted through ServiceWorkers lacked MIME type restrictions Mozilla: Use-after-free in WebRequestService Mozilla: Potential use-after-free in uses of nsTArray Mozilla: DoH did not filter IPv4 mapped IP Addresses Mozilla: Software keyboards may have remembered typed passwords Mozilla: Memory safety bugs fixed in Firefox 83 and Firefox ESR 78.5 | [
"cpe:/a:redhat:rhel_eus:8.2::appstream"
] | null | 8.8 | 6.1 | null |
RHSA-2021:2389 | Red Hat Security Advisory: postgresql:12 security update | postgresql: Partition constraint violation errors leak values of denied columns postgresql: Buffer overrun from integer overflow in array subscripting calculations postgresql: Memory disclosure in INSERT ... ON CONFLICT ... DO UPDATE postgresql: Memory disclosure in partitioned-table UPDATE ... RETURNING | [
"cpe:/a:redhat:rhel_eus:8.2::appstream"
] | null | 6.5 | null | null |
RHSA-2010:0499 | Red Hat Security Advisory: seamonkey security update | seamonkey/thunderbird: crash when indexing certain messages with attachments Content-Disposition: attachment ignored if Content-Type: multipart also present Mozilla Freed object reuse across plugin instances Mozilla Integer Overflow in XSLT Node Sorting Mozilla Crashes with evidence of memory corruption | [
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws",
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2020:4443 | Red Hat Security Advisory: libarchive security update | libarchive: out-of-bounds read in archive_wstring_append_from_mbs in archive_string.c | [
"cpe:/a:redhat:enterprise_linux:8::crb",
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 6.5 | null | null |
RHSA-2013:1805 | Red Hat Security Advisory: samba4 security update | samba: Heap-based buffer overflow due to incorrect DCE-RPC fragment length field check | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2022:1372 | Red Hat Security Advisory: Red Hat OpenShift Data Foundation 4.10.0 enhancement, security & bug fix update | golang: net: incorrect parsing of extraneous zero characters at the beginning of an IP address octet golang: crypto/tls: certificate of wrong type is causing TLS client to panic golang: net/http/httputil: panic due to racy read of persistConn after handler panic golang.org/x/crypto: empty plaintext packet causes panic golang: net/http: limit growth of header canonicalization cache golang: syscall: don't close fd 0 on ForkExec error | [
"cpe:/a:redhat:openshift_data_foundation:4.10::el8"
] | null | 4.8 | null | null |
RHSA-2024:0989 | Red Hat Security Advisory: Red Hat Multicluster GlobalHub 1.0.2 bug fixes and security updates | go-git: Maliciously crafted Git server replies can cause DoS on go-git clients go-git: Maliciously crafted Git server replies can lead to path traversal and RCE on go-git clients | [
"cpe:/a:redhat:multicluster_globalhub:1.0::el8"
] | null | 8.1 | null | null |
RHSA-2005:256 | Red Hat Security Advisory: glibc security update | security flaw | [
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws"
] | null | null | null | null |
RHSA-2015:0325 | Red Hat Security Advisory: httpd security, bug fix, and enhancement update | httpd: bypass of mod_headers rules via chunked requests httpd: NULL pointer dereference in mod_cache if Content-Type has empty value | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | null | null |
RHSA-2023:5437 | Red Hat Security Advisory: firefox security update | firefox: use-after-free in workers Mozilla: Out-of-bounds write in PathOps Mozilla: Use-after-free in Ion Compiler Mozilla: Memory safety bugs fixed in Firefox 118, Firefox ESR 115.3, and Thunderbird 115.3 libvpx: Heap buffer overflow in vp8 encoding in libvpx | [
"cpe:/a:redhat:rhel_aus:8.4::appstream",
"cpe:/a:redhat:rhel_e4s:8.4::appstream",
"cpe:/a:redhat:rhel_tus:8.4::appstream"
] | null | 8.8 | null | null |
RHSA-2024:5815 | Red Hat Security Advisory: nodejs:20 security update | nodejs: fs.lstat bypasses permission model nodejs: Bypass network import restriction via data URL nodejs: fs.fchown/fchmod bypasses permission model | [
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 3.9 | 2.9 | null |
RHSA-2014:0112 | Red Hat Security Advisory: openstack-nova security and bug fix update | Nova: Compressed disk image DoS nova: qpid SSL configuration | [
"cpe:/a:redhat:openstack:3::el6"
] | null | null | null | null |
RHSA-2018:2543 | Red Hat Security Advisory: openstack-keystone security update | openstack-keystone: Information Exposure through /v3/OS-FEDERATION/projects | [
"cpe:/a:redhat:openstack:10::el7"
] | null | null | 5.3 | null |
RHSA-2022:6825 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.4.7 Security update | undertow: potential security issue in flow control over HTTP/2 may lead to DOS(incomplete fix for CVE-2021-3629) undertow: Large AJP request may cause DoS snakeyaml: Denial of Service due to missing nested depth limitation for collections | [
"cpe:/a:redhat:jboss_enterprise_application_platform:7.4"
] | null | 7.5 | null | null |
RHSA-2003:030 | Red Hat Security Advisory: lynx security update | security flaw | [
"cpe:/o:redhat:enterprise_linux:2.1::as",
"cpe:/o:redhat:enterprise_linux:2.1::aw"
] | null | null | null | null |
RHSA-2021:2660 | Red Hat Security Advisory: linuxptp security update | linuxptp: missing length check of forwarded messages | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 8.8 | null | null |
RHBA-2004:232 | Red Hat Bug Fix Advisory: Updated lvm package | security flaw | [
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws"
] | null | null | null | null |
RHSA-2019:3297 | Red Hat Security Advisory: Red Hat Process Automation Manager 7.5.0 Security Update | jackson-databind: failure to block the logback-core class from polymorphic deserialization leading to remote code execution jackson-databind: polymorphic typing issue allows attacker to read arbitrary local files on the server via crafted JSON message. jackson-databind: default typing mishandling leading to remote code execution | [
"cpe:/a:redhat:jboss_enterprise_bpms_platform:7.5"
] | null | null | 9.8 | null |
RHSA-2023:2100 | Red Hat Security Advisory: Red Hat Integration Camel for Spring Boot 3.20.1 security update | apache-commons-net: FTP client trusts the host from PASV response by default undertow: Server identity in https connection is not checked by the undertow client snakeyaml: Denial of Service due to missing nested depth limitation for collections apache-spark: XSS vulnerability in log viewer UI Javascript Pulsar: Improper Hostname Verification in Java Client and Proxy can expose authentication data via MITM apache-ivy: Directory Traversal Ivy: Ivy Path traversal batik: Server-Side Request Forgery batik: Server-Side Request Forgery snakeyaml: Uncaught exception in org.yaml.snakeyaml.composer.Composer.composeSequenceNode snakeyaml: Uncaught exception in org.yaml.snakeyaml.constructor.BaseConstructor.constructObject snakeyaml: Uncaught exception in java.base/java.util.regex.Pattern$Ques.match snakeyaml: Uncaught exception in java.base/java.util.ArrayList.hashCode scandium: Failing DTLS handshakes may cause throttling to block processing of records batik: Server-Side Request Forgery (SSRF) vulnerability jettison: memory exhaustion via user-supplied XML or JSON data xstream: Xstream to serialise XML data was vulnerable to Denial of Service attacks woodstox-core: woodstox to serialise XML data was vulnerable to Denial of Service attacks xstream: Xstream to serialise XML data was vulnerable to Denial of Service attacks batik: Apache XML Graphics Batik vulnerable to code execution via SVG JXPath: untrusted XPath expressions may lead to RCE attack hsqldb: Untrusted input may lead to RCE attack dev-java/snakeyaml: DoS via stack overflow codec-haproxy: HAProxyMessageDecoder Stack Exhaustion DoS xstream: Denial of Service by injecting recursive collections or maps based on element's hash values raising a stack overflow jackson-databind: deep wrapper array nesting wrt UNWRAP_SINGLE_VALUE_ARRAYS jackson-databind: use of deeply nested arrays batik: Untrusted code execution in Apache XML Graphics Batik json-smart: Uncontrolled Resource Consumption vulnerability in json-smart (Resource Exhaustion) jettison: Uncontrolled Recursion in JSONArray springframework: Security Bypass With Un-Prefixed Double Wildcard Pattern springframework: Spring Expression DoS Vulnerability springframework: Spring Expression DoS Vulnerability shiro: Authentication bypass through a specially crafted HTTP request FileUpload: FileUpload DoS with excessive parts | [
"cpe:/a:redhat:camel_spring_boot:3.20.1"
] | null | 6.5 | null | null |
RHSA-2021:3733 | Red Hat Security Advisory: OpenShift Virtualization 2.6.7 Images security and bug fix update | golang: net/http: panic in ReadRequest and ReadResponse when reading a very large header golang: crypto/tls: certificate of wrong type is causing TLS client to panic | [
"cpe:/a:redhat:container_native_virtualization:2.6::el8"
] | null | 6.5 | null | null |
RHSA-2016:1106 | Red Hat Security Advisory: jq security update | jq: heap-buffer-overflow in tokenadd() function | [
"cpe:/a:redhat:openstack:8::el7"
] | null | null | null | null |
RHSA-2024:0946 | Red Hat Security Advisory: OpenShift Container Platform 4.13.35 security update | golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487) | [
"cpe:/a:redhat:openshift:4.13::el8",
"cpe:/a:redhat:openshift:4.13::el9"
] | null | 7.5 | null | null |
RHSA-2024:5654 | Red Hat Security Advisory: curl security update | curl: HTTP/2 push headers memory-leak | [
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 7.5 | null | null |
RHSA-2008:0579 | Red Hat Security Advisory: vsftpd security update | older vsftpd authentication memory leak | [
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::es"
] | null | null | null | null |
RHSA-2023:0708 | Red Hat Security Advisory: Release of OpenShift Serverless Client kn 1.27.0 | golang: archive/tar: github.com/vbatts/tar-split: unbounded memory consumption when reading headers golang: net/http/httputil: ReverseProxy should not forward unparseable query parameters golang: net/http: handle server errors after sending GOAWAY golang: regexp/syntax: limit memory used by parsing regexps | [
"cpe:/a:redhat:serverless:1.0::el8"
] | null | 6.5 | null | null |
RHSA-2023:7623 | Red Hat Security Advisory: Red Hat JBoss Web Server 5.7.7 release and security update | openssl: Denial of service by excessive resource usage in verifying X509 policy constraints openssl: Invalid certificate policies in leaf certificates are silently ignored openssl: Certificate policy check not enabled openssl: Possible DoS translating ASN.1 object identifiers openssl: Excessive time spent checking DH keys and parameters OpenSSL: Excessive time spent checking DH q parameter value tomcat: Open Redirect vulnerability in FORM authentication tomcat: FileUpload: DoS due to accumulation of temporary files on Windows | [
"cpe:/a:redhat:jboss_enterprise_web_server:5.7"
] | null | 5.9 | null | null |
RHSA-2006:0688 | Red Hat Security Advisory: php security update | security flaw security flaw gd: GIF handling buffer overflow security flaw security flaw security flaw | [
"cpe:/a:redhat:rhel_application_stack:1"
] | null | null | null | null |
RHSA-2017:0338 | Red Hat Security Advisory: java-1.6.0-ibm security update | SSL/TLS: Birthday attack against 64-bit block ciphers (SWEET32) OpenJDK: incorrect ECDSA signature extraction from the DER input (Libraries, 8168714) OpenJDK: DSA implementation timing attack (Libraries, 8168728) OpenJDK: ECDSA implementation timing attack (Libraries, 8168724) OpenJDK: incorrect URL parsing in URLStreamHandler (Networking, 8167223) OpenJDK: URLClassLoader insufficient access control checks (Networking, 8151934) OpenJDK: untrusted input deserialization in RMI registry and DCG (RMI, 8156802) OpenJDK: LdapLoginModule incorrect userDN extraction (JAAS, 8161743) OpenJDK: imageio PNGImageReader failed to honor ignoreMetadata for iTXt and zTXt chunks (2D, 8166988) JDK: unspecified vulnerability fixed in 6u141, 7u131, and 8u121 (Deployment) OpenJDK: integer overflow in SocketOutputStream boundary check (Networking, 8164147) OpenJDK: insufficient protected field access checks in atomic field updaters (Libraries, 8165344) | [
"cpe:/a:redhat:rhel_extras:5::client",
"cpe:/a:redhat:rhel_extras:5::server",
"cpe:/a:redhat:rhel_extras:6"
] | null | null | 8.8 | null |
RHSA-2019:2805 | Red Hat Security Advisory: systemd security update | systemd: Insufficient input validation in bus_process_object() resulting in PID 1 crash | [
"cpe:/o:redhat:rhel_aus:7.3::server",
"cpe:/o:redhat:rhel_e4s:7.3::server",
"cpe:/o:redhat:rhel_tus:7.3::server"
] | null | null | 7 | null |
RHSA-2023:7029 | Red Hat Security Advisory: libX11 security update | libX11: InitExt.c can overwrite unintended portions of the Display structure if the extension request leads to a buffer overflow | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 7.3 | null | null |
RHSA-2023:1270 | Red Hat Security Advisory: OpenShift Container Platform 4.12.8 security update | goutils: RandomAlphaNumeric and CryptoRandomAlphaNumeric are not as random as they should be | [
"cpe:/a:redhat:openshift:4.12::el8"
] | null | 7 | null | null |
RHSA-2021:4056 | Red Hat Security Advisory: kernel security, bug fix, and enhancement update | kernel: use-after-free in drivers/infiniband/core/ucma.c ctx use-after-free kernel: out-of-bounds write due to a heap buffer overflow in __hidinput_change_resolution_multipliers() of hid-input.c kernel: SVM nested virtualization issue in KVM (VMLOAD/VMSAVE) | [
"cpe:/a:redhat:enterprise_linux:8::crb",
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 8.8 | null | null |
RHSA-2021:2026 | Red Hat Security Advisory: ipa security update | slapi-nis: NULL dereference (DoS) with specially crafted Binding DN | [
"cpe:/a:redhat:rhel_eus:8.2::appstream"
] | null | 7.5 | null | null |
RHSA-2018:1263 | Red Hat Security Advisory: Red Hat Mobile Application Platform 4.6.0 release - RPMs | nodejs-tough-cookie: Regular expression denial of service hoek: Prototype pollution in utilities function | [
"cpe:/a:redhat:mobile_application_platform:4.6"
] | null | null | 2.9 | null |
RHSA-2018:0548 | Red Hat Security Advisory: ceph security update | ceph: Unauthenticated malformed HTTP requests handled by rgw_civetweb.cc:RGW::init_env() can lead to denial of service | [
"cpe:/a:redhat:ceph_storage:3::ubuntu16.04"
] | null | null | 7.3 | null |
RHSA-2022:4765 | Red Hat Security Advisory: firefox security update | Mozilla: Untrusted input used in JavaScript object indexing, leading to prototype pollution Mozilla: Prototype pollution in Top-Level Await implementation | [
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | null | 8.8 | null |
RHSA-2021:0761 | Red Hat Security Advisory: python security update | python: infinite loop in the tarfile module via crafted TAR archive | [
"cpe:/o:redhat:rhel_aus:7.4::server",
"cpe:/o:redhat:rhel_e4s:7.4::server",
"cpe:/o:redhat:rhel_tus:7.4::server"
] | null | 7.5 | null | null |
RHSA-2024:10734 | Red Hat Security Advisory: thunderbird security update | thunderbird: Potential disclosure of plaintext in OpenPGP encrypted message firefox: thunderbird: Select list elements could be shown over another site firefox: thunderbird: CSP Bypass and XSS Exposure via Web Compatibility Shims firefox: thunderbird: URL Bar Spoofing via Manipulated Punycode and Whitespace Characters firefox: thunderbird: Unhandled Exception in Add-on Signature Verification firefox: thunderbird: Improper Keypress Handling in Executable File Confirmation Dialog firefox: thunderbird: Memory safety bugs fixed in Firefox 133, Thunderbird 133, Firefox ESR 128.5, and Thunderbird 128.5 | [
"cpe:/a:redhat:rhel_aus:8.6::appstream",
"cpe:/a:redhat:rhel_e4s:8.6::appstream",
"cpe:/a:redhat:rhel_tus:8.6::appstream"
] | null | 8.8 | null | null |
RHBA-2024:4458 | Red Hat Bug Fix Advisory: Multicluster Engine for Kubernetes 2.5.5 bug fix updates | braces: fails to limit the number of characters it can handle | [
"cpe:/a:redhat:multicluster_engine:2.5::el8"
] | null | 7.5 | null | null |
RHSA-2020:0316 | Red Hat Security Advisory: git security update | git: arbitrary code execution via .gitmodules | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | 8.8 | null |
RHSA-2003:150 | Red Hat Security Advisory: LPRng security update | security flaw | [
"cpe:/o:redhat:enterprise_linux:2.1::as",
"cpe:/o:redhat:enterprise_linux:2.1::aw",
"cpe:/o:redhat:enterprise_linux:2.1::es",
"cpe:/o:redhat:enterprise_linux:2.1::ws"
] | null | null | null | null |
RHSA-2017:2451 | Red Hat Security Advisory: openstack-neutron security update | openstack-neutron: iptables not active after update | [
"cpe:/a:redhat:openstack:8::el7"
] | null | null | 5.3 | null |
RHSA-2024:9454 | Red Hat Security Advisory: podman security update | Podman: Buildah: cri-o: FIPS Crypto-Policy Directory Mounting Issue in containers/common Go Library Buildah: Podman: Improper Input Validation in bind-propagation Option of Dockerfile RUN --mount Instruction buildah: Buildah allows arbitrary directory mount Podman: Buildah: CRI-O: symlink traversal vulnerability in the containers/storage library can cause Denial of Service (DoS) go/parser: golang: Calling any of the Parse functions containing deeply nested literals can cause a panic/stack exhaustion encoding/gob: golang: Calling Decoder.Decode on a message which contains deeply nested structures can cause a panic due to stack exhaustion go/build/constraint: golang: Calling Parse on a "// +build" build tag line with deeply nested expressions can cause a panic due to stack exhaustion | [
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 5.9 | null | null |
RHSA-2007:0106 | Red Hat Security Advisory: gnupg security update | gnupg/gpgme signed message spoofing | [
"cpe:/o:redhat:enterprise_linux:2.1::as",
"cpe:/o:redhat:enterprise_linux:2.1::aw",
"cpe:/o:redhat:enterprise_linux:2.1::es",
"cpe:/o:redhat:enterprise_linux:2.1::ws",
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws",
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2009:1132 | Red Hat Security Advisory: kernel security and bug fix update | kernel: nfsd should drop CAP_MKNOD for non-root kernel: agp: zero pages before sending to userspace kernel: e1000_clean_rx_irq() denial of service kernel: nfs: fix NFS v4 client handling of MAY_EXEC in nfs_permission kernel: xen: local denial of service | [
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2019:1176 | Red Hat Security Advisory: kernel-rt security update | hardware: Microarchitectural Store Buffer Data Sampling (MSBDS) hardware: Micro-architectural Load Port Data Sampling - Information Leak (MLPDS) hardware: Microarchitectural Fill Buffer Data Sampling (MFBDS) hardware: Microarchitectural Data Sampling Uncacheable Memory (MDSUM) | [
"cpe:/a:redhat:rhel_extras_rt:7"
] | null | null | 3.8 | null |
RHSA-2008:0595 | Red Hat Security Advisory: java-1.5.0-sun security update | OpenJDK JMX allows illegal operations with local monitoring (6332953) Java RE allows Same Origin Policy to be Bypassed (6687932) JDK untrusted applet/application privilege escalation (6661918) Java Web Start Buffer overflow vulnerabilities (6557220) Java Web Start, arbitrary file creation (6703909) Java Web Start arbitrary file creation/deletion file with user permissions (6704077) Java Web Start, untrusted application may determine Cache Location (6704074) | [
"cpe:/a:redhat:rhel_extras:4",
"cpe:/a:redhat:rhel_extras:5::client",
"cpe:/a:redhat:rhel_extras:5::server"
] | null | null | null | null |
RHSA-2020:2476 | Red Hat Security Advisory: .NET Core on Red Hat Enterprise Linux 7 security update | dotnet: Denial of service via untrusted input | [
"cpe:/a:redhat:rhel_dotnet:2.1::el7"
] | null | 7.5 | null | null |
RHSA-2024:2096 | Red Hat Security Advisory: security update Logging for Red Hat OpenShift - 5.9.1 | golang: net/http/cookiejar: incorrect forwarding of sensitive headers and cookies on HTTP redirect golang: net/http: golang: mime/multipart: golang: net/textproto: memory exhaustion in Request.ParseMultipartForm golang: crypto/x509: Verify panics on certificates with an unknown public key algorithm golang: html/template: errors returned from MarshalJSON methods may break template escaping golang-protobuf: encoding/protojson, internal/encoding/json: infinite loop in protojson.Unmarshal when unmarshaling certain forms of invalid JSON jose-go: improper handling of highly compressed data | [
"cpe:/a:redhat:logging:5.9::el9"
] | null | 4.3 | null | null |
RHSA-2023:3154 | Red Hat Security Advisory: thunderbird security update | Mozilla: Browser prompts could have been obscured by popups Mozilla: Crash in RLBox Expat driver Mozilla: Potential permissions request bypass via clickjacking Mozilla: Content process crash due to invalid wasm code Mozilla: Potential spoof due to obscured address bar Mozilla: Potential memory corruption in FileReader::DoReadData() Mozilla: Memory safety bugs fixed in Firefox 113 and Firefox ESR 102.11 | [
"cpe:/a:redhat:rhel_eus:8.4::appstream"
] | null | 8.8 | null | null |
RHSA-2014:0439 | Red Hat Security Advisory: kernel-rt security, bug fix, and enhancement update | kernel: ipc: ipc_rcu_putref refcount races Kernel: net: leakage of uninitialized memory to user-space via recv syscalls Kernel: net: leakage of uninitialized memory to user-space via recv syscalls kernel: net: rds: dereference of a NULL device in rds_ib_laddr_check() kernel: cifs: incorrect handling of bogus user pointers during uncached writes kernel: x86: exceptions are not cleared in AMD FXSAVE workaround Kernel: netfilter: nf_nat: leakage of uninitialized buffer in IRC NAT helper Kernel: SELinux: local denial-of-service Kernel: net: IPv6: crash due to router advertisement flooding kernel: netfilter: nf_conntrack_dccp: incorrect skb_header_pointer API usages | [
"cpe:/a:redhat:enterprise_mrg:2:server:el6"
] | null | null | null | null |
RHSA-2023:2075 | Red Hat Security Advisory: libwebp security update | Mozilla: libwebp: Double-free in libwebp | [
"cpe:/a:redhat:rhel_eus:9.0::appstream"
] | null | 7.5 | null | null |
RHSA-2020:1402 | Red Hat Security Advisory: OpenShift Container Platform 4.2.28 openshift-enterprise-builder-container security update | proglottis/gpgme: Use-after-free in GPGME bindings during container image pull | [
"cpe:/a:redhat:openshift:4.2::el7"
] | null | 7.5 | null | null |
RHSA-2010:0774 | Red Hat Security Advisory: Red Hat Enterprise MRG Messaging and Grid Version 1.3 | qpid: crash on receipt of invalid AMQP data qpid: crash when redeclaring the exchange with specified alternate_exchange | [
"cpe:/a:redhat:enterprise_mrg:1.0::el4"
] | null | null | null | null |
RHSA-2009:1066 | Red Hat Security Advisory: squirrelmail security update | SquirrelMail: Multiple cross site scripting issues SquirrelMail: Server-side code injection in map_yp_alias username map SquirrelMail: CSS positioning vulnerability | [
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws",
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2023:5194 | Red Hat Security Advisory: frr security update | frr: Incorrect handling of a error in parsing of an invalid section of a BGP update can de-peer a router | [
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 7.5 | null | null |
RHSA-2004:005 | Red Hat Security Advisory: kdepim security update | security flaw | [
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws"
] | null | null | null | null |
RHSA-2017:0282 | Red Hat Security Advisory: openstack-cinder, openstack-glance, and openstack-nova security update | openstack-nova/glance/cinder: Malicious image may exhaust resources | [
"cpe:/a:redhat:openstack:7::el7"
] | null | null | 5.3 | null |
RHSA-2020:2321 | Red Hat Security Advisory: Red Hat Data Grid 7.3.6 security update | wildfly-core: Path traversal can allow the extraction of .war archives to write arbitrary files (Zip Slip) thrift: Endless loop when feed with specific input data thrift: Out-of-bounds read related to TJSONProtocol or TSimpleJSONProtocol apache-commons-beanutils: does not suppresses the class property in PropertyUtilsBean by default hibernate-validator: safeHTML validator allows XSS jackson-databind: Serialization gadgets in com.zaxxer.hikari.HikariConfig netty: HTTP request smuggling by mishandled whitespace before the colon in HTTP headers jackson-databind: Serialization gadgets in org.apache.commons.dbcp.datasources.* jackson-databind: Serialization gadgets in com.p6spy.engine.spy.P6DataSource jackson-databind: Serialization gadgets in classes of the ehcache package netty: HTTP request smuggling netty: HttpObjectDecoder.java allows Content-Length header to accompanied by second Content-Length header netty: HTTP Request Smuggling due to Transfer-Encoding whitespace mishandling | [
"cpe:/a:redhat:jboss_data_grid:7.3"
] | null | 7.5 | 7.5 | null |
RHSA-2020:0046 | Red Hat Security Advisory: java-1.8.0-ibm security update | OpenJDK: Missing restrictions on use of custom SocketImpl (Networking, 8218573) OpenJDK: NULL pointer dereference in DrawGlyphList (2D, 8222690) OpenJDK: Unexpected exception thrown by Pattern processing crafted regular expression (Concurrency, 8222684) OpenJDK: Unexpected exception thrown by XPathParser processing crafted XPath expression (JAXP, 8223505) OpenJDK: Unexpected exception thrown during regular expression processing in Nashorn (Scripting, 8223518) OpenJDK: Incorrect handling of nested jar: URLs in Jar URL handler (Networking, 8223892) OpenJDK: Unexpected exception thrown by XPath processing crafted XPath expression (JAXP, 8224532) OpenJDK: Unexpected exception thrown during Font object deserialization (Serialization, 8224915) OpenJDK: Integer overflow in bounds check in SunGraphics2D (2D, 8225292) OpenJDK: Incorrect handling of HTTP proxy responses in HttpURLConnection (Networking, 8225298) OpenJDK: Excessive memory allocation in CMap when reading TrueType font (2D, 8225597) JDK: unspecified vulnerability fixed in 8u221 (Deployment) OpenJDK: Insufficient filtering of HTML event attributes in Javadoc (Javadoc, 8226765) JDK: Unrestricted access to diagnostic operations | [
"cpe:/a:redhat:enterprise_linux:8::supplementary"
] | null | null | 8.4 | null |
RHSA-2015:1707 | Red Hat Security Advisory: bind97 security update | bind: malformed DNSSEC key failed assertion denial of service | [
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2020:3078 | Red Hat Security Advisory: OpenShift Container Platform 4.4.14 ose-cluster-machine-approver-container security update | golang.org/x/crypto: Processing of crafted ssh-ed25519 public keys allows for panic | [
"cpe:/a:redhat:openshift:4.4::el7"
] | null | 5.3 | null | null |
RHSA-2009:0410 | Red Hat Security Advisory: krb5 security update | krb5: ASN.1 decoder can free uninitialized pointer when decoding an invalid encoding (MITKRB5-SA-2009-002) | [
"cpe:/o:redhat:enterprise_linux:2.1::as",
"cpe:/o:redhat:enterprise_linux:2.1::aw",
"cpe:/o:redhat:enterprise_linux:2.1::es",
"cpe:/o:redhat:enterprise_linux:2.1::ws",
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws"
] | null | null | null | null |
RHSA-2024:3049 | Red Hat Security Advisory: perl-Convert-ASN1 security update | perl-Convert-ASN1: allows remote attackers to cause an infinite loop via unexpected input | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 7.5 | null | null |
RHSA-2017:2794 | Red Hat Security Advisory: kernel security update | kernel: load_elf_ binary() does not take account of the need to allocate sufficient space for the entire binary | [
"cpe:/o:redhat:rhel_eus:7.2::computenode",
"cpe:/o:redhat:rhel_eus:7.2::server"
] | null | null | 7.8 | null |
RHSA-2020:0295 | Red Hat Security Advisory: firefox security update | Mozilla: Buffer overflow in plain text serializer Mozilla: Use-after-free in worker destruction Mozilla: Use-after-free when performing device orientation checks Mozilla: Use-after-free when retrieving a document in antitracking Mozilla: Memory safety bugs fixed in Firefox 71 and Firefox ESR 68.3 Mozilla: Bypass of @namespace CSS sanitization during pasting Mozilla: Type Confusion in XPCVariant.cpp Mozilla: CSS sanitization does not escape HTML tags Mozilla: Memory safety bugs fixed in Firefox 72 and Firefox ESR 68.4 Mozilla: IonMonkey type confusion with StoreElementHole and FallibleStoreElement | [
"cpe:/a:redhat:rhel_e4s:8.0::appstream"
] | null | 8.8 | 8.8 | null |
RHSA-2015:0788 | Red Hat Security Advisory: novnc security update | novnc: session hijack through insecurely set session token cookies | [
"cpe:/a:redhat:openstack:6::el7"
] | null | null | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.