id
stringlengths 13
15
| title
stringlengths 29
176
| description
stringlengths 8
32.1k
| cpes
sequencelengths 0
20
| cvss_v4_0
null | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
null |
---|---|---|---|---|---|---|---|
RHSA-2024:0750 | Red Hat Security Advisory: libmaxminddb security update | libmaxminddb: improper initialization in dump_entry_data_list() in maxminddb.c | [
"cpe:/a:redhat:rhel_eus:8.8::appstream"
] | null | 6.5 | null | null |
RHSA-2023:0536 | Red Hat Security Advisory: kpatch-patch security update | kernel: memory corruption in AX88179_178A based USB ethernet device. kernel: i915: Incorrect GPU TLB flush can lead to random memory access | [
"cpe:/o:redhat:rhel_eus:9.0::baseos"
] | null | 7 | null | null |
RHSA-2015:2548 | Red Hat Security Advisory: Red Hat JBoss Web Server 3.0.1 commons-collections security update | apache-commons-collections: InvokerTransformer code execution during deserialisation | [
"cpe:/a:redhat:jboss_enterprise_web_server:3.0"
] | null | null | null | null |
RHSA-2012:0076 | Red Hat Security Advisory: jbossweb security update | tomcat: Multiple weaknesses in HTTP DIGEST authentication tomcat: security manager restrictions bypass JBoss Web remote denial of service when surrogate pair character is placed at buffer boundary tomcat: hash table collisions CPU usage DoS (oCERT-2011-003) tomcat: Multiple weaknesses in HTTP DIGEST authentication tomcat: Multiple weaknesses in HTTP DIGEST authentication tomcat: Multiple weaknesses in HTTP DIGEST authentication tomcat: large number of parameters DoS | [
"cpe:/a:redhat:jboss_enterprise_web_platform:5::el4",
"cpe:/a:redhat:jboss_enterprise_web_platform:5::el5",
"cpe:/a:redhat:jboss_enterprise_web_platform:5::el6"
] | null | null | null | null |
RHSA-2007:0358 | Red Hat Security Advisory: squirrelmail security update | XSS through HTML message in squirrelmail CSRF through HTML message in squirrelmail | [
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws",
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2023:7213 | Red Hat Security Advisory: squid:4 security update | squid: Request/Response smuggling in HTTP/1.1 and ICAP squid: Denial of Service in HTTP Digest Authentication | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 8.6 | null | null |
RHSA-2014:0416 | Red Hat Security Advisory: rhevm-spice-client security update | SSL/TLS CRIME attack against HTTPS SSL/TLS: CBC padding timing attack (lucky-13) openssl: client NULL dereference crash on malformed handshake packets openssl: information disclosure in handling of TLS heartbeat extension packets | [
"cpe:/a:redhat:rhev_manager:3"
] | null | null | null | null |
RHSA-2021:4060 | Red Hat Security Advisory: libsolv security update | libsolv: heap-based buffer overflow in pool_installable() in src/repo.h libsolv: heap-based buffer overflow in pool_disabled_solvable() in src/repo.h libsolv: heap-based buffer overflow in pool_installable_whatprovides() in src/repo.h libsolv: heap-based buffer overflow in prune_to_recommended() in src/policy.c | [
"cpe:/a:redhat:enterprise_linux:8::crb",
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 7.5 | null | null |
RHSA-2017:1260 | Red Hat Security Advisory: jboss-ec2-eap security, bug fix, and enhancement update | Resteasy: Yaml unmarshalling vulnerable to RCE | [
"cpe:/a:redhat:jboss_enterprise_application_platform:6::el6"
] | null | null | 8.1 | null |
RHSA-2010:0966 | Red Hat Security Advisory: firefox security update | Mozilla use-after-free error with nsDOMAttribute MutationObserver (MFSA 2010-80) Mozilla integer overflow vulnerability in NewIdArray (MFSA 2010-81) Mozilla add support for OTS font sanitizer (MFSA 2010-78) Mozilla XSS hazard in multiple character encodings (MFSA 2010-84) Mozilla Chrome privilege escalation with window.open and <isindex> element (MFSA 2010-76) Mozilla crash and remote code execution using HTML tags inside a XUL tree (MFSA 2010-77) Mozilla incomplete fix for CVE-2010-0179 (MFSA 2010-82) Mozilla location bar SSL spoofing using network error page (MFSA 2010-83) data: URL meta refresh (MFSA 2010-79) Mozilla miscellaneous memory safety hazards (MFSA 2010-74) Mozilla miscellaneous memory safety hazards (MFSA 2010-74) | [
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws",
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server",
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2011:0183 | Red Hat Security Advisory: openoffice.org security and bug fix update | OpenOffice.org: directory traversal flaws in handling of XSLT jar filter descriptions and OXT extension files OpenOffice.org: Array index error by insecure parsing of broken rtf tables OpenOffice.org: Integer signedness error (crash) by processing certain RTF tags OpenOffice.org: Heap-based buffer overflow by processing *.doc files with WW8 list styles with specially-crafted count of list levels OpenOffice.org: Array index error by scanning document typography information of certain *.doc files OpenOffice.org: soffice insecure LD_LIBRARY_PATH setting OpenOffice.org: heap based buffer overflow in PPT import OpenOffice.org: heap based buffer overflow when parsing TGA files | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2023:1045 | Red Hat Security Advisory: Red Hat Single Sign-On 7.6.2 security update on RHEL 9 | bootstrap: Cross-site Scripting (XSS) in the collapse data-parent attribute bootstrap: Cross-site Scripting (XSS) in the data-container property of tooltip jquery: Prototype pollution in object's prototype leading to denial of service, remote code execution, or property injection jquery: Cross-site scripting due to improper injQuery.htmlPrefilter method jquery: Untrusted code execution via <option> tag in HTML passed to DOM manipulation methods glob-parent: Regular Expression Denial of Service minimist: prototype pollution keycloak: HTML injection in execute-actions-email Admin REST API keycloak: XSS on impersonation under specific circumstances SnakeYaml: Constructor Deserialization Remote Code Execution Undertow: DoS can be achieved as Undertow server waits for the LAST_CHUNK forever for EJB invocations keycloak: Session takeover with OIDC offline refreshtokens keycloak: reflected XSS attack Moment.js: Path traversal in moment.locale snakeyaml: Denial of Service due to missing nested depth limitation for collections moment: inefficient parsing algorithm resulting in DoS loader-utils: Regular expression denial of service snakeyaml: Uncaught exception in org.yaml.snakeyaml.composer.Composer.composeSequenceNode snakeyaml: Uncaught exception in org.yaml.snakeyaml.constructor.BaseConstructor.constructObject snakeyaml: Uncaught exception in java.base/java.util.regex.Pattern$Ques.match jettison: parser crash by stackoverflow jettison: memory exhaustion via user-supplied XML or JSON data jackson-databind: deep wrapper array nesting wrt UNWRAP_SINGLE_VALUE_ARRAYS jackson-databind: use of deeply nested arrays mina-sshd: Java unsafe deserialization vulnerability jettison: If the value in map is the map's self, the new new JSONObject(map) cause StackOverflowError which may lead to dos json5: Prototype Pollution in JSON5 via Parse Method CXF: directory listing / code exfiltration CXF: SSRF Vulnerability keycloak: Client Registration endpoint does not check token revocation keycloak: user impersonation via stolen uuid code | [
"cpe:/a:redhat:red_hat_single_sign_on:7.6::el9"
] | null | 4.6 | 5.6 | null |
RHSA-2025:3789 | Red Hat Security Advisory: OpenShift Container Platform 4.15.49 security and extras update | jinja2: Jinja sandbox breakout through attr filter selecting format method | [
"cpe:/a:redhat:openshift:4.15::el8",
"cpe:/a:redhat:openshift:4.15::el9"
] | null | 7.3 | null | null |
RHSA-2024:6508 | Red Hat Security Advisory: Red Hat Build of Apache Camel 4.4.2 for Spring Boot security update. | undertow: response write hangs in case of Java 17 TLSv1.3 NewSessionTicket undertow: Improper State Management in Proxy Protocol parsing causes information leakage spring-expression: Denial of service when processing a specially crafted Spring Expression Language expression | [
"cpe:/a:redhat:apache_camel_spring_boot:4.4.2"
] | null | 5.9 | null | null |
RHSA-2022:0272 | Red Hat Security Advisory: polkit security update | polkit: Local privilege escalation in pkexec due to incorrect handling of argument vector | [
"cpe:/o:redhat:rhel_aus:7.4::server"
] | null | 7.8 | null | null |
RHSA-2023:7753 | Red Hat Security Advisory: fence-agents security update | python-certifi: Removal of e-Tugra root certificate python-urllib3: Cookie request header isn't stripped during cross-origin redirects | [
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::highavailability",
"cpe:/a:redhat:enterprise_linux:9::resilientstorage"
] | null | 5.9 | null | null |
RHSA-2010:0130 | Red Hat Security Advisory: java-1.5.0-ibm security update | TLS: MITM attacks via session renegotiation OpenJDK Policy/PolicyFile leak dynamic ProtectionDomains. (6633872) OpenJDK File TOCTOU deserialization vulnerability (6736390) JDK unspecified vulnerability in JWS/Plugin component OpenJDK Inflater/Deflater clone issues (6745393) JDK unspecified vulnerability in JavaWS/Plugin component OpenJDK Unsigned applet can retrieve the dragged information before drop action occurs(6887703) OpenJDK AtomicReferenceArray causes SIGSEGV -> SEGV_MAPERR error (6888149) OpenJDK Deserialization of RMIConnectionImpl objects should enforce stricter checks (6893947) OpenJDK Subclasses of InetAddress may incorrectly interpret network addresses (6893954) OpenJDK JAR "unpack200" must verify input parameters (6902299) OpenJDK CMM readMabCurveData Buffer Overflow Vulnerability (6899653) JDK multiple unspecified vulnerabilities | [
"cpe:/a:redhat:rhel_extras:4",
"cpe:/a:redhat:rhel_extras:5::client",
"cpe:/a:redhat:rhel_extras:5::server"
] | null | null | null | null |
RHSA-2024:6879 | Red Hat Security Advisory: Red Hat Single Sign-On 7.6.11 security update on RHEL 8 | keycloak-saml-core: Improper Verification of SAML Responses Leading to Privilege Escalation in Keycloak Keycloak: Vulnerable Redirect URI Validation Results in Open Redirec | [
"cpe:/a:redhat:red_hat_single_sign_on:7.6::el8"
] | null | 6.1 | null | null |
RHSA-2019:1301 | Red Hat Security Advisory: Red Hat Enterprise Linux 7.2 E4S and TUS Support 6 month Retirement Notice | This is the 6 month notification for the retirement of Red Hat Enterprise Linux 7.2 Update Services for SAP Solutions (E4S) and Telecommunications Update Service (TUS). This notification applies only to those customers subscribed to the Update Services for SAP Solutions (E4S) and Telecommunications Update Service (TUS) channel for Red Hat Enterprise Linux 7.2. | [
"cpe:/o:redhat:rhel_aus:7.2::server",
"cpe:/o:redhat:rhel_e4s:7.2::server",
"cpe:/o:redhat:rhel_tus:7.2::server"
] | null | null | null | null |
RHSA-2023:5192 | Red Hat Security Advisory: firefox security update | libwebp: Heap buffer overflow in WebP Codec libwebp: out-of-bounds write with a specially crafted WebP lossless file | [
"cpe:/a:redhat:rhel_aus:8.4::appstream",
"cpe:/a:redhat:rhel_e4s:8.4::appstream",
"cpe:/a:redhat:rhel_tus:8.4::appstream"
] | null | 0 | null | null |
RHSA-2024:7187 | Red Hat Security Advisory: OpenShift Container Platform 4.14.38 security update | containers/image: digest type does not guarantee valid type webob: WebOb's location header normalization during redirect leads to open redirect | [
"cpe:/a:redhat:openshift:4.14::el8",
"cpe:/a:redhat:openshift:4.14::el9",
"cpe:/a:redhat:openshift_ironic:4.14::el9"
] | null | 6.1 | null | null |
RHSA-2009:1236 | Red Hat Security Advisory: java-1.5.0-ibm security update | JDK: XML parsing Denial-Of-Service (6845701) OpenJDK Untrusted applet System properties access (6738524) OpenJDK Proxy mechanism information leaks (6801071) OpenJDK Proxy mechanism information leaks (6801071) OpenJDK proxy mechanism allows non-authorized socket connections (6801497) Java Web Start Buffer unpack200 processing integer overflow (6830335) | [
"cpe:/a:redhat:rhel_extras:4",
"cpe:/a:redhat:rhel_extras:5::client",
"cpe:/a:redhat:rhel_extras:5::server"
] | null | null | null | null |
RHSA-2024:1700 | Red Hat Security Advisory: Errata Advisory for Red Hat OpenShift GitOps v1.10.4 security update | CD: Users with `create` but not `override` privileges can perform local sync argo-cd: Bypassing Brute Force Protection via Application Crash and In-Memory Data Loss argo-cd: Denial of Service Due to Unsafe Array Modification in Multi-threaded Environment argo-cd: Bypassing Rate Limit and Brute Force Protection Using Cache Overflow argo-cd: uncontrolled memory allocation vulnerability | [
"cpe:/a:redhat:openshift_gitops:1.10::el8"
] | null | 6.5 | null | null |
RHSA-2011:0432 | Red Hat Security Advisory: xorg-x11 security update | xorg: xrdb code execution via crafted X client hostname | [
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2019:1881 | Red Hat Security Advisory: qemu-kvm-ma security and bug fix update | QEMU: device_tree: heap buffer overflow while loading device tree blob | [
"cpe:/o:redhat:enterprise_linux:7::server"
] | null | null | 7 | null |
RHSA-2017:1678 | Red Hat Security Advisory: rh-postgresql94-postgresql security update | postgresql: Selectivity estimators bypass SELECT privilege checks postgresql: libpq ignores PGREQUIRESSL environment variable postgresql: pg_user_mappings view discloses foreign server passwords | [
"cpe:/a:redhat:rhel_software_collections:2::el6",
"cpe:/a:redhat:rhel_software_collections:2::el7"
] | null | null | 6.3 | null |
RHSA-2020:3806 | Red Hat Security Advisory: Red Hat support for Spring Boot 2.2.6.SP2 security update | RESTEasy: RESTEASY003870 exception in RESTEasy can lead to a reflected XSS attack hibernate-validator: Improper input validation in the interpolation of constraint error messages tomcat: OutOfMemoryException caused by HTTP/2 connection leak could lead to DoS tomcat: multiple requests with invalid payload length in a WebSocket frame could lead to DoS | [
"cpe:/a:redhat:openshift_application_runtimes:1.0"
] | null | 7.5 | null | null |
RHSA-2024:8028 | Red Hat Security Advisory: thunderbird security update | firefox: Use-after-free in Animation timeline (128.3.1 ESR Chemspill) | [
"cpe:/a:redhat:rhel_aus:8.6::appstream",
"cpe:/a:redhat:rhel_e4s:8.6::appstream",
"cpe:/a:redhat:rhel_tus:8.6::appstream"
] | null | 9.8 | null | null |
RHSA-2022:6765 | Red Hat Security Advisory: bind security update | bind: memory leak in ECDSA DNSSEC verification code bind: memory leaks in EdDSA DNSSEC verification code | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 7.5 | null | null |
RHSA-2023:5453 | Red Hat Security Advisory: glibc security update | glibc: Stack read overflow in getaddrinfo in no-aaaa mode glibc: potential use-after-free in getaddrinfo() glibc: potential use-after-free in gaih_inet() glibc: buffer overflow in ld.so leading to privilege escalation | [
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::crb",
"cpe:/o:redhat:enterprise_linux:9::baseos"
] | null | 7.8 | null | null |
RHSA-2014:0412 | Red Hat Security Advisory: java-1.7.0-oracle security update | libjpeg: information leak (read of uninitialized memory) libpng: unhandled zero-length PLTE chunk or NULL palette OpenJDK: Incorrect mlib/raster image validation (2D, 8027841) JDK: unspecified vulnerability fixed in 7u55 and 8u5 (Libraries) OpenJDK: Protect logger handlers (Libraries, 8029740) JDK: unspecified vulnerability fixed in 7u55 and 8u5 (Deployment) JDK: unspecified vulnerability fixed in 6u75, 7u55 and 8u5 (Deployment) OpenJDK: AWT incorrect FlavorMap seperation (AWT, 8026797) OpenJDK: incorrect caching of data initialized via TCCL (JAXWS, 8026801) OpenJDK: RSA unpadding timing issues (Security, 8027766) OpenJDK: Prevent SIGNATURE_PRIMITIVE_SET from being modified (Security, 8029745) OpenJDK: MethodHandle variable argument lists handling (Libraries, 8029844) OpenJDK: System.arraycopy() element race condition (Hotspot, 8029858) OpenJDK: ServiceLoader Exception handling security bypass (Libraries, 8031394) OpenJDK: Activation framework default command map caching (JAX-WS, 8025152) lcms: insufficient ICC profile version validation (OpenJDK 2D, 8031335) OpenJDK: missing randomization of JNDI DNS client query IDs (JNDI, 8030731) OpenJDK: Better ScriptEngineManager ScriptEngine management (Libraries, 8036794) OpenJDK: insecure temporary file use in unpack200 (Libraries, 8033618) OpenJDK: classfile parser invalid BootstrapMethods attribute length (Hotspot, 8034926) OpenJDK: insufficient escaping of window title string (Javadoc, 8026736) JDK: unspecified vulnerability fixed in 5.0u75, 6u75, 7u55 and 8u5 (2D) OpenJDK: Incorrect NIO channel separation (Libraries, 8026716) OpenJDK: JAXP CharInfo file access restriction (JAXP, 8029282) JDK: unspecified vulnerability fixed in 6u75, 7u55 and 8u5 (Deployment) OpenJDK: AWT thread context handling (AWT, 8025010) OpenJDK: method handle call hierachy bypass (Libraries, 8032686) OpenJDK: incorrect caching of data initialized via TCCL (JAXB, 8025030) JDK: unspecified vulnerability fixed in 6u75, 7u55 and 8u5 (Deployment) OpenJDK: JPEG decoder input stream handling (2D, 8029854) JDK: unspecified vulnerability fixed in 7u55 and 8u5 (JavaFX) OpenJDK: incorrect caching of data initialized via TCCL (JAXWS, 8026188) OpenJDK: remove insecure Java Sound provider caching (Sound, 8026163) JDK: unspecified vulnerability fixed in 6u75, 7u55 and 8u5 (Deployment) | [
"cpe:/a:redhat:rhel_extras:5::client",
"cpe:/a:redhat:rhel_extras:5::server",
"cpe:/a:redhat:rhel_extras:6"
] | null | null | null | null |
RHSA-2024:6708 | Red Hat Security Advisory: ACS 4.5 enhancement and security update | containers/image: digest type does not guarantee valid type | [
"cpe:/a:redhat:advanced_cluster_security:4.5::el8"
] | null | 8.3 | null | null |
RHSA-2012:0428 | Red Hat Security Advisory: gnutls security update | gnutls: buffer overflow in gnutls_session_get_data() (GNUTLS-SA-2011-2) libtasn1: DER decoding buffer overflow (GNUTLS-SA-2012-3, MU-201202-02) gnutls: TLS record handling issue (GNUTLS-SA-2012-2, MU-201202-01) | [
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2022:5602 | Red Hat Security Advisory: RHUI 4.1.1 release - Security Fixes and Enhancement Update | Django: SQL injection in QuerySet.annotate(),aggregate() and extra() Django: SQL injection via QuerySet.explain(options) on PostgreSQL | [
"cpe:/a:redhat:rhui:4::el8"
] | null | 9.4 | null | null |
RHSA-2022:5331 | Red Hat Security Advisory: libinput security update | libinput: format string vulnerability may lead to privilege escalation | [
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb"
] | null | 7.8 | null | null |
RHSA-2005:806 | Red Hat Security Advisory: cpio security update | security flaw security flaw | [
"cpe:/o:redhat:enterprise_linux:2.1::as",
"cpe:/o:redhat:enterprise_linux:2.1::aw",
"cpe:/o:redhat:enterprise_linux:2.1::es",
"cpe:/o:redhat:enterprise_linux:2.1::ws"
] | null | null | null | null |
RHSA-2019:1763 | Red Hat Security Advisory: firefox security update | Mozilla: Sandbox escape via installation of malicious language pack Mozilla: Memory safety bugs fixed in Firefox 68 and Firefox ESR 60.8 Mozilla: Script injection within domain through inner window reuse Mozilla: Cross-origin POST requests can be made with NPAPI plugins by following 308 redirects Mozilla: Use-after-free with HTTP/2 cached stream Mozilla: HTML parsing error can contribute to content XSS Mozilla: Caret character improperly escaped in origins Mozilla: Same-origin policy treats all files in a directory as having the same-origin | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 6.1 | null |
RHSA-2023:2366 | Red Hat Security Advisory: emacs security and bug fix update | emacs: ctags local command execution vulnerability | [
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 7.8 | null | null |
RHSA-2022:6383 | Red Hat Security Advisory: openvswitch2.17 security update | dpdk: DoS when a Vhost header crosses more than two descriptors and exhausts all mbufs | [
"cpe:/o:redhat:enterprise_linux:8::fastdatapath"
] | null | 8.6 | null | null |
RHSA-2021:4173 | Red Hat Security Advisory: exiv2 security, bug fix, and enhancement update | exiv2: Heap-based buffer overflow in Jp2Image::readMetadata() exiv2: Heap-based buffer overflow in Exiv2::Jp2Image::doWriteMetadata exiv2: Out-of-bounds read in Exiv2::Internal::CrwMap::encode exiv2: Out-of-bounds read in Exiv2::WebPImage::doWriteMetadata exiv2: Heap-based buffer overflow in Exiv2::Jp2Image::encodeJp2Header exiv2: Out-of-bounds read in Exiv2::Jp2Image::encodeJp2Header exiv2: Out-of-bounds read in Exiv2::Jp2Image::doWriteMetadata exiv2: Use of uninitialized memory in isWebPType() may lead to information leak exiv2: Integer overflow in CrwMap:encode0x1810 leading to heap-based buffer overflow and DoS exiv2: DoS due to quadratic complexity in ProcessUTF8Portion exiv2: Out-of-bounds read in Exiv2::Jp2Image::printStructure exiv2: Out-of-bounds read in Exiv2::Jp2Image::encodeJp2Header | [
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb"
] | null | 4.7 | null | null |
RHSA-2018:2909 | Red Hat Security Advisory: Red Hat Process Automation Manager 7.1.0 bug fix and security update | Resteasy: Yaml unmarshalling vulnerable to RCE | [
"cpe:/a:redhat:jboss_bpms:7.1"
] | null | null | 8.1 | null |
RHSA-2024:0848 | Red Hat Security Advisory: .NET 8.0 security update | dotnet: Denial of Service in SignalR server dotnet: Denial of Service in X509Certificate2 | [
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::crb"
] | null | 7.5 | null | null |
RHSA-2007:0088 | Red Hat Security Advisory: php security update | security flaw security flaw security flaw security flaw security flaw security flaw php session extension information leak php session extension global variable clobber php imap_mail_compose() buffer overflow via type.parameters | [
"cpe:/a:redhat:rhel_application_stack:1"
] | null | null | null | null |
RHSA-2021:2989 | Red Hat Security Advisory: lasso security update | lasso: XML signature wrapping vulnerability when parsing SAML responses | [
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 8.8 | null | null |
RHSA-2005:044 | Red Hat Security Advisory: XFree86 security update | libxpm buffer overflow | [
"cpe:/o:redhat:enterprise_linux:2.1::as",
"cpe:/o:redhat:enterprise_linux:2.1::aw",
"cpe:/o:redhat:enterprise_linux:2.1::es",
"cpe:/o:redhat:enterprise_linux:2.1::ws"
] | null | null | null | null |
RHSA-2023:4347 | Red Hat Security Advisory: libeconf security update | libeconf: stack-based buffer overflow in read_file() in lib/getfilecontents.c libeconf: Stack overflow in function read_file at libeconf/lib/getfilecontents.c | [
"cpe:/o:redhat:enterprise_linux:9::baseos"
] | null | 8.8 | null | null |
RHSA-2021:4235 | Red Hat Security Advisory: jasper security update | jasper: Heap-based buffer overflow in cp_create() in jpc_enc.c jasper: Heap-based buffer over-read in jp2_decode() in jp2_dec.c jasper: Out of bounds read in jp2_decode() in jp2_dec.c jasper: NULL pointer dereference in jp2_decode() in jp2_dec.c | [
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb"
] | null | 5.5 | null | null |
RHSA-2014:1186 | Red Hat Security Advisory: katello-configure security update | elasticsearch: remote code execution flaw via dynamic scripting | [
"cpe:/a:rhel_sam:1.4::el6"
] | null | null | null | null |
RHSA-2012:1123 | Red Hat Security Advisory: bind security update | bind: heavy DNSSEC validation load can cause assertion failure | [
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server",
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2020:3842 | Red Hat Security Advisory: OpenShift Container Platform 4.5.13 openshift-enterprise-console-container security update | SSL/TLS: Birthday attack against 64-bit block ciphers (SWEET32) | [
"cpe:/a:redhat:openshift:4.5::el7"
] | null | null | 7.5 | null |
RHSA-2024:1902 | Red Hat Security Advisory: shim security update | shim: Out-of-bounds read printing error messages shim: RCE in http boot support may lead to Secure Boot bypass shim: Interger overflow leads to heap buffer overflow in verify_sbat_section on 32-bits systems shim: Out-of-bounds read in verify_buffer_authenticode() malformed PE file shim: Out-of-bound read in verify_buffer_sbat() shim: out of bounds read when parsing MZ binaries | [
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 5.1 | null | null |
RHSA-2016:1424 | Red Hat Security Advisory: Red Hat JBoss Fuse/A-MQ 6.2.1 security and bug fix update | Console: CORS headers set to allow all in Red Hat AMQ activemq: Clickjacking in Web Console activemq: Cross-site scripting vulnerabilities in web console | [
"cpe:/a:redhat:jboss_amq:6.2",
"cpe:/a:redhat:jboss_fuse:6.2"
] | null | null | 4.2 | null |
RHSA-2018:0412 | Red Hat Security Advisory: kernel-rt security and bug fix update | Kernel: KVM: debug exception via syscall emulation Kernel: KVM: MMU potential stack buffer overrun during page walks kernel: improper keyrings creation | [
"cpe:/a:redhat:rhel_extras_rt:7"
] | null | null | 4.4 | null |
RHSA-2021:4902 | Red Hat Security Advisory: ACS 3.67 security and enhancement update | civetweb: directory traversal when using the built-in example HTTP form-based file upload mechanism via the mg_handle_form_request API nodejs-axios: Regular expression denial of service in trim function nodejs-prismjs: ReDoS vulnerability nodejs-path-parse: ReDoS via splitDeviceRe, splitTailRe and splitPathRe golang: net: incorrect parsing of extraneous zero characters at the beginning of an IP address octet helm: information disclosure vulnerability golang: archive/zip: malformed archive may cause panic or memory exhaustion (incomplete fix of CVE-2021-33196) | [
"cpe:/a:redhat:advanced_cluster_security:3.67::el8"
] | null | 7.5 | null | null |
RHSA-2019:2893 | Red Hat Security Advisory: httpd:2.4 security update | HTTP/2: request for large response leads to denial of service | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | null | 7.5 | null |
RHSA-2017:0388 | Red Hat Security Advisory: ipa security and bug fix update | ipa: Insufficient permission check for ca-del, ca-disable and ca-enable commands | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 8.1 | null |
RHSA-2023:6059 | Red Hat Security Advisory: Red Hat OpenShift Pipelines Client tkn for 1.12.1 release and security update | golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487) HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack) | [
"cpe:/a:redhat:openshift_pipelines:1.12::el8"
] | null | 7.5 | null | null |
RHSA-2021:4827 | Red Hat Security Advisory: OpenShift Container Platform 3.11.569 security update | jenkins: FilePath#mkdirs does not check permission to create parent directories jenkins: File path filters do not canonicalize paths, allowing operations to follow symbolic links to outside allowed directories jenkins: FilePath#untar does not check permission to create symbolic links when unarchiving a symbolic link jenkins: FilePath#reading(FileVisitor) does not reject any operations allowing users to have unrestricted read access jenkins: FilePath#unzip and FilePath#untar were not subject to any access control jenkins: Agent processes are able to completely bypass file path filtering by wrapping the file operation in an agent file path jenkins: Creating symbolic links is possible without the symlink permission jenkins: The operations FilePath#renameTo and FilePath#moveAllChildrenTo only check read permission on the source path jenkins: When creating temporary files, permission to create files is only checked after they’ve been created. jenkins: FilePath#toURI, FilePath#hasSymlink, FilePath#absolutize, FilePath#isDescendant, and FilePath#get*DiskSpace do not check any permissions jenkins: FilePath#listFiles lists files outside directories with agent read access when following symbolic links. jenkins: Agent-to-controller access control allowed writing to sensitive directory used by Pipeline: Shared Groovy Libraries Plugin jenkins: Agent-to-controller access control allows reading/writing most content of build directories jenkins-2-plugins/subversion: does not restrict the name of a file when looking up a subversion key | [
"cpe:/a:redhat:openshift:3.11::el7"
] | null | 7.5 | null | null |
RHSA-2019:2051 | Red Hat Security Advisory: compat-libtiff3 security update | libtiff: NULL pointer dereference in tif_print.c:TIFFPrintDirectory() causes a denial of service | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 3.3 | null |
RHSA-2017:3354 | Red Hat Security Advisory: Red Hat JBoss BRMS 6.4.7 security update | zookeeper: Incorrect input validation with wchp/wchc four letter words jbpmmigration: XXE vulnerability in XmlUtils | [
"cpe:/a:redhat:jboss_enterprise_brms_platform:6.4"
] | null | null | 6.5 | null |
RHSA-2018:2916 | Red Hat Security Advisory: spamassassin security update | spamassassin: Certain unclosed tags in crafted emails allow for scan timeouts and result in denial of service spamassassin: Local user code injection in the meta rule syntax | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 8.4 | null |
RHSA-2023:0903 | Red Hat Security Advisory: webkit2gtk3 security update | webkitgtk: processing maliciously crafted web content may be exploited for arbitrary code execution | [
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 8.8 | null | null |
RHSA-2019:2126 | Red Hat Security Advisory: libwpd security update | libwpd: NULL pointer dereference in the function WP6ContentListener::defineTable in WP6ContentListener.cpp | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 3.3 | null |
RHSA-2012:1058 | Red Hat Security Advisory: resteasy security update | RESTEasy: XML eXternal Entity (XXE) flaw RESTEasy: XML eXternal Entity (XXE) flaw | [
"cpe:/a:redhat:jboss_enterprise_web_platform:5::el4",
"cpe:/a:redhat:jboss_enterprise_web_platform:5::el5",
"cpe:/a:redhat:jboss_enterprise_web_platform:5::el6"
] | null | null | null | null |
RHSA-2024:2994 | Red Hat Security Advisory: LibRaw security update | LibRaw: stack buffer overflow in LibRaw_buffer_datastream::gets() in src/libraw_datastream.cpp | [
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb"
] | null | 5.3 | null | null |
RHSA-2010:0178 | Red Hat Security Advisory: Red Hat Enterprise Linux 5.5 kernel security and bug fix update | kernel: mac80211: fix spurious delBA handling kernel: ext4: avoid divide by zero when trying to mount a corrupted file system kernel: bug in GFS/GFS2 locking code leads to dos kernel: ipv6: skb is unexpectedly freed | [
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2024:1601 | Red Hat Security Advisory: curl security and bug fix update | curl: more POST-after-PUT confusion curl: cookie injection with none file curl: information disclosure by exploiting a mixed case flaw | [
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 5.3 | null | null |
RHSA-2021:0711 | Red Hat Security Advisory: virt:rhel and virt-devel:rhel security update | QEMU: virtiofsd: potential privileged host device access from guest | [
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb"
] | null | 7.5 | null | null |
RHSA-2020:4047 | Red Hat Security Advisory: qemu-kvm-ma security update | QEMU: usb: out-of-bounds r/w access issue while processing usb packets | [
"cpe:/o:redhat:rhel_eus:7.7::server"
] | null | 5 | null | null |
RHSA-2013:0168 | Red Hat Security Advisory: kernel security and bug fix update | kernel: execshield: predictable ascii armour base address kernel: net: acceptation of overlapping ipv6 fragments kernel: xen: Several memory hypercall operations allow invalid extent order values | [
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2022:0472 | Red Hat Security Advisory: aide security update | aide: heap-based buffer overflow on outputs larger than B64_BUF | [
"cpe:/o:redhat:rhel_els:6"
] | null | 7.5 | null | null |
RHSA-2017:0498 | Red Hat Security Advisory: thunderbird security update | Mozilla: Memory safety bugs fixed in Firefox 52 and Firefox ESR 45.8 (MFSA 2017-06) Mozilla: asm.js JIT-spray bypass of ASLR and DEP (MFSA 2017-06) Mozilla: Memory Corruption when handling ErrorResult (MFSA 2017-06) Mozilla: Use-after-free working with events in FontFace objects (MFSA 2017-06) Mozilla: Use-after-free working with ranges in selections (MFSA 2017-06) Mozilla: FTP response codes can cause use of uninitialized values for ports (MFSA 2017-06) Mozilla: Pixel and history stealing via floating-point timing side channel with SVG filters (MFSA 2017-06) Mozilla: Cross-origin reading of video captions in violation of CORS (MFSA 2017-06) Mozilla: Memory corruption during JavaScript garbage collection incremental sweeping (MFSA 2017-06) | [
"cpe:/a:redhat:rhel_productivity:5",
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation",
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 9.8 | null |
RHSA-2020:2663 | Red Hat Security Advisory: ntp security update | ntp: DoS on client ntpd using server mode packet ntp: ntpd using highly predictable transmit timestamps could result in time change or DoS | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 7.4 | 3.7 | null |
RHEA-2015:1076 | Red Hat Enhancement Advisory: Red Hat JBoss Enterprise Application Platform 6.4.1 update on RHEL 5 | EAP: LDAP bind password is being logged with TRACE log level | [
"cpe:/a:redhat:jboss_enterprise_application_platform:6::el5"
] | null | null | null | null |
RHSA-2015:1926 | Red Hat Security Advisory: java-1.8.0-oracle security update | OpenJDK: kerberos realm name leak (JGSS, 8048030) OpenJDK: inefficient use of hash tables and lists during XML parsing (JAXP, 8068842) OpenJDK: missing checks for proper initialization in ObjectStreamClass (Serialization, 8103671) OpenJDK: HttpURLConnection header restriction bypass (Libraries, 8130193) JDK: unspecified vulnerability fixed in 7u91 and 8u65 (Deployment) OpenJDK: insufficient permission checks in StubGenerator (CORBA, 8076383) OpenJDK: OOB access in CMS code (2D, 8086092) OpenJDK: leak of user.dir location (JAXP, 8078427) OpenJDK: java.nio Buffers integer overflow issues (Libraries, 8130891) ICU: missing boundary checks in layout engine (OpenJDK 2D, 8132042) OpenJDK: incorrect access control context used in DGCImpl (RMI, 8080688) OpenJDK: CRL checking flaw (Libraries, 8081744) OpenJDK: incomplete constraints enforcement by AlgorithmChecker (Security, 8131291) OpenJDK: missing type checks in IIOPInputStream (CORBA, 8076392) OpenJDK: incorrect String object deserialization in IIOPInputStream (CORBA, 8076387) OpenJDK: incorrect access control context used in DGCClient (RMI, 8076413) OpenJDK: incomplete MaxXMLNameLimit enforcement (JAXP, 8086733) JDK: unspecified vulnerability fixed in 8u65 (JavaFX) JDK: unspecified vulnerability fixed in 6u105, 7u91 and 8u65 (Deployment) OpenJDK: insufficient proxy class checks in RemoteObjectInvocationHandler (RMI, 8076339) JDK: unspecified vulnerability fixed in 8u65 (JavaFX) JDK: unspecified vulnerability fixed in 8u65 (JavaFX) OpenJDK: incomplete supportDTD enforcement (JAXP, 8130078) JDK: unspecified vulnerability fixed in 8u65 (JavaFX) | [
"cpe:/a:redhat:rhel_extras_oracle_java:6",
"cpe:/a:redhat:rhel_extras_oracle_java:7"
] | null | null | null | null |
RHSA-2024:6421 | Red Hat Security Advisory: bubblewrap and flatpak security update | flatpak: Access to files outside sandbox for apps using persistent= (--persist) | [
"cpe:/a:redhat:rhel_aus:8.6::appstream",
"cpe:/a:redhat:rhel_e4s:8.6::appstream",
"cpe:/a:redhat:rhel_tus:8.6::appstream",
"cpe:/o:redhat:rhel_aus:8.6::baseos",
"cpe:/o:redhat:rhel_e4s:8.6::baseos",
"cpe:/o:redhat:rhel_tus:8.6::baseos"
] | null | 7.4 | null | null |
RHSA-2020:0100 | Red Hat Security Advisory: kernel-rt security and bug fix update | kernel: TLB flush happens too late on mremap kernel: Use-after-free in __blk_drain_queue() function in block/blk-core.c kernel: fix race condition between mmget_not_zero()/get_task_mm() and core dumping | [
"cpe:/a:redhat:enterprise_mrg:2:server:el6"
] | null | null | 6.1 | null |
RHSA-2022:0849 | Red Hat Security Advisory: kpatch-patch security update | kernel: Use After Free in unix_gc() which could result in a local privilege escalation kernel: local privilege escalation by exploiting the fsconfig syscall parameter leads to container breakout kernel: possible privileges escalation due to missing TLB flush kernel: remote stack overflow via kernel panic on systems using TIPC may lead to DoS kernel: cgroups v1 release_agent feature may allow privilege escalation kernel: failing usercopy allows for use-after-free exploitation | [
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 7 | null | null |
RHSA-2013:0509 | Red Hat Security Advisory: rdma security, bug fix and enhancement update | ibacm: DoS (ibacm deamon crash) by joining responses for multicast destinations ibacm: ibacm service files created with world writable permissions (DoS) | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2024:0429 | Red Hat Security Advisory: openssh security update | ssh: Prefix truncation attack on Binary Packet Protocol (BPP) openssh: potential command injection via shell metacharacters | [
"cpe:/a:redhat:rhel_eus:8.6::appstream",
"cpe:/o:redhat:rhel_eus:8.6::baseos"
] | null | 6.5 | null | null |
RHSA-2023:7670 | Red Hat Security Advisory: Migration Toolkit for Runtimes bug fix, enhancement and security update | jettison: Uncontrolled Recursion in JSONArray | [
"cpe:/a:redhat:migration_toolkit_runtimes:1.0::el8"
] | null | 7.5 | null | null |
RHSA-2021:0224 | Red Hat Security Advisory: sudo security update | sudo: Heap buffer overflow in argument parsing | [
"cpe:/o:redhat:rhel_aus:7.4::server",
"cpe:/o:redhat:rhel_e4s:7.4::server",
"cpe:/o:redhat:rhel_tus:7.4::server"
] | null | 7.8 | null | null |
RHBA-2025:0409 | Red Hat Bug Fix Advisory: Red Hat Developer Hub 1.4.1 release. | golang.org/x/net/html: Non-linear parsing of case-insensitive content in golang.org/x/net/html path-to-regexp: path-to-regexp Unpatched `path-to-regexp` ReDoS in 0.1.x nanoid: nanoid mishandles non-integer values jinja2: Jinja has a sandbox breakout through malicious filenames jinja2: Jinja has a sandbox breakout through indirect reference to format method systeminformation: Command injection vulnerability in getWindowsIEEE8021x (SSID) function in systeminformation | [
"cpe:/a:redhat:rhdh:1.4::el9"
] | null | 8 | null | null |
RHSA-2018:1694 | Red Hat Security Advisory: Red Hat OpenShift Application Runtimes security and bug fix update | cxf: CXF's STSClient uses a flawed way of caching tokens that are associated with delegation tokens | [
"cpe:/a:redhat:openshift_application_runtimes:1.0"
] | null | null | 5.3 | null |
RHSA-2023:3677 | Red Hat Security Advisory: c-ares security update | c-ares: 0-byte UDP payload Denial of Service | [
"cpe:/o:redhat:rhel_aus:8.4::baseos",
"cpe:/o:redhat:rhel_e4s:8.4::baseos",
"cpe:/o:redhat:rhel_tus:8.4::baseos"
] | null | 7.5 | null | null |
RHSA-2024:0005 | Red Hat Security Advisory: thunderbird security update | Mozilla: Heap-buffer-overflow affecting WebGL <code>DrawElementsInstanced</code> method with Mesa VM driver Mozilla: Symlinks may resolve to smaller than expected buffers Mozilla: Heap buffer overflow in <code>nsTextFragment</code> Mozilla: Use-after-free in PR_GetIdentitiesLayer Mozilla: Potential sandbox escape due to <code>VideoBridge</code> lack of texture validation Mozilla: Heap buffer overflow affected <code>nsWindow::PickerOpen(void)</code> in headless mode Mozilla: Use-after-free in <code>nsDNSService</code> Mozilla: Undefined behavior in <code>ShutdownObserver()</code> Mozilla: Memory safety bugs fixed in Firefox 121, Firefox ESR 115.6, and Thunderbird 115.6 Mozilla: S/MIME signature accepted despite mismatching message date Mozilla: Truncated signed text was shown with a valid OpenPGP signature | [
"cpe:/a:redhat:rhel_eus:8.6::appstream"
] | null | 7.5 | null | null |
RHSA-2016:1610 | Red Hat Security Advisory: php54-php security update | PHP: sets environmental variable based on user supplied Proxy request header | [
"cpe:/a:redhat:rhel_software_collections:2::el6",
"cpe:/a:redhat:rhel_software_collections:2::el7"
] | null | null | 5 | null |
RHSA-2018:3853 | Red Hat Security Advisory: ntp security update | ntp: Stack-based buffer overflow in ntpq and ntpdc allows denial of service or code execution | [
"cpe:/o:redhat:rhel_eus:6.7::computenode",
"cpe:/o:redhat:rhel_eus:6.7::server"
] | null | null | 7 | null |
RHSA-2016:0157 | Red Hat Security Advisory: python-django security update | python-django: Information leak through date template filter | [
"cpe:/a:redhat:openstack:5::el7"
] | null | null | null | null |
RHSA-2023:4885 | Red Hat Security Advisory: Red Hat OpenShift support for Windows Containers 8.0.2 security update | kubernetes: Insufficient input sanitization on Windows nodes leads to privilege escalation kubernetes: Insufficient input sanitization on Windows nodes leads to privilege escalation | [
"cpe:/a:redhat:openshift:4.13::el9"
] | null | 8.8 | null | null |
RHSA-2018:3408 | Red Hat Security Advisory: git security update | git: arbitrary code execution via .gitmodules | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 8.8 | null |
RHBA-2021:0621 | Red Hat Bug Fix Advisory: microcode_ctl bug fix and enhancement update | hw: Vector Register Leakage-Active | [
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 2.8 | null | null |
RHSA-2017:2727 | Red Hat Security Advisory: openvswitch security update | openvswitch: Integer underflow in the ofputil_pull_queue_get_config_reply10 function openvswitch: Invalid processing of a malicious OpenFlow role status message openvswitch: Buffer over-read while parsing malformed TCP, UDP and IPv6 packets openvswitch: Buffer over-read while parsing the group mod OpenFlow message | [
"cpe:/a:redhat:openstack:11::el7"
] | null | null | 5.6 | null |
RHSA-2022:5809 | Red Hat Security Advisory: pcre2 security update | pcre2: Out-of-bounds read in compile_xclass_matchingpath in pcre2_jit_compile.c | [
"cpe:/a:redhat:enterprise_linux:8::crb",
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 7.5 | null | null |
RHSA-2010:0114 | Red Hat Security Advisory: acroread security and bug fix update | flash-plugin: unauthorized cross-domain requests (APSB10-06) acroread: unspecified code execution flaw | [
"cpe:/a:redhat:rhel_extras:4",
"cpe:/a:redhat:rhel_extras:5::client",
"cpe:/a:redhat:rhel_extras:5::server"
] | null | null | null | null |
RHSA-2019:2505 | Red Hat Security Advisory: openstack-ironic-inspector security update | openstack-ironic-inspector: SQL Injection vulnerability when receiving introspection data | [
"cpe:/a:redhat:openstack-director:9::el7"
] | null | null | 8.3 | null |
RHSA-2020:5104 | Red Hat Security Advisory: firefox security update | Mozilla: Write side effects in MCallGetProperty opcode not accounted for | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | 8.8 | null |
RHSA-2022:0771 | Red Hat Security Advisory: kernel-rt security and bug fix update | kernel: Use After Free in unix_gc() which could result in a local privilege escalation kernel: use-after-free in RDMA listen() kernel: possible privileges escalation due to missing TLB flush kernel: remote stack overflow via kernel panic on systems using TIPC may lead to DoS kernel: failing usercopy allows for use-after-free exploitation | [
"cpe:/a:redhat:rhel_eus:8.4::nfv",
"cpe:/a:redhat:rhel_eus:8.4::realtime"
] | null | 7 | null | null |
RHSA-2014:0369 | Red Hat Security Advisory: httpd security update | httpd: mod_dav denial of service via crafted DAV WRITE request httpd: mod_log_config does not properly handle logging certain cookies resulting in DoS | [
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2016:0321 | Red Hat Security Advisory: Red Hat JBoss Fuse 6.2.1 update | apache-cxf: SAML SSO processing is vulnerable to wrapping attack | [
"cpe:/a:redhat:jboss_fuse:6.2"
] | null | null | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.