id
stringlengths 13
15
| title
stringlengths 29
176
| description
stringlengths 8
32.1k
| cpes
sequencelengths 0
20
| cvss_v4_0
null | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
null |
---|---|---|---|---|---|---|---|
RHSA-2004:464 | Red Hat Security Advisory: mc security update | security flaw | [
"cpe:/o:redhat:enterprise_linux:2.1::as",
"cpe:/o:redhat:enterprise_linux:2.1::aw",
"cpe:/o:redhat:enterprise_linux:2.1::ws"
] | null | null | null | null |
RHSA-2024:1881 | Red Hat Security Advisory: kernel security and bug fix update | kernel: Marvin vulnerability side-channel leakage in the RSA decryption operation kernel: tls: use-after-free with partial reads and async decrypt kernel: tls: handle backlogging of crypto requests kernel: mlxsw: spectrum_acl_tcam: Fix stack corruption kernel: gro: fix ownership transfer | [
"cpe:/a:redhat:rhel_eus:9.2::appstream",
"cpe:/a:redhat:rhel_eus:9.2::crb",
"cpe:/o:redhat:rhel_eus:9.2::baseos"
] | null | 5.5 | null | null |
RHSA-2023:3424 | Red Hat Security Advisory: cups-filters security update | cups-filters: remote code execution in cups-filters, beh CUPS backend | [
"cpe:/a:redhat:rhel_eus:9.0::appstream",
"cpe:/a:redhat:rhel_eus:9.0::crb"
] | null | 8.8 | null | null |
RHSA-2018:1703 | Red Hat Security Advisory: librelp security update | librelp: Stack-based buffer overflow in relpTcpChkPeerName function in src/tcp.c | [
"cpe:/o:redhat:rhel_aus:7.2::server",
"cpe:/o:redhat:rhel_e4s:7.2::server",
"cpe:/o:redhat:rhel_tus:7.2::server"
] | null | null | 8.1 | null |
RHSA-2022:8856 | Red Hat Security Advisory: Red Hat OpenStack Platform 16.2.4 (python-django-horizon) security update | OpenStack: Horizon session cookies are not flagged HttpOnly | [
"cpe:/a:redhat:openstack:16.2::el8"
] | null | 4.2 | null | null |
RHSA-2014:0573 | Red Hat Security Advisory: Red Hat Enterprise Linux 6.3 Extended Update Support One-Month Notice | This is the One-Month notification for the retirement of Red Hat Enterprise
Linux 6.3 Extended Update Support (EUS). This notification applies only to
those customers subscribed to the Extended Update Support (EUS) channel for
Red Hat Enterprise Linux 6.3. | [
"cpe:/o:redhat:rhel_eus:6.3::server"
] | null | null | null | null |
RHSA-2012:1359 | Red Hat Security Advisory: libvirt security and bug fix update | libvirt: null function pointer invocation in virNetServerProgramDispatchCall() | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2024:10966 | Red Hat Security Advisory: ruby:3.1 security update | rexml: REXML ReDoS vulnerability | [
"cpe:/a:redhat:rhel_eus:8.8::appstream"
] | null | 7.5 | null | null |
RHSA-2005:761 | Red Hat Security Advisory: pcre security update | pcre heap overflow | [
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws",
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2002:184 | Red Hat Security Advisory: openssl security update for Stronghold | security flaw | [
"cpe:/a:redhat:stronghold:3"
] | null | null | null | null |
RHSA-2024:4746 | Red Hat Security Advisory: fence-agents update | urllib3: proxy-authorization request header is not stripped during cross-origin redirects | [
"cpe:/a:redhat:rhel_eus:8.8::appstream",
"cpe:/a:redhat:rhel_eus:8.8::highavailability",
"cpe:/a:redhat:rhel_eus:8.8::resilientstorage"
] | null | 4.4 | null | null |
RHSA-2021:2588 | Red Hat Security Advisory: ruby:2.6 security, bug fix, and enhancement update | rubygem-bundler: Insecure permissions on directory in /tmp/ allows for execution of malicious code ruby: NUL injection vulnerability of File.fnmatch and File.fnmatch? ruby: Regular expression denial of service vulnerability of WEBrick's Digest authentication ruby: HTTP response splitting in WEBrick ruby: Code injection via command argument of Shell#test / Shell#[] rubygem-json: Unsafe object creation vulnerability in JSON ruby: BasicSocket#read_nonblock method leads to information disclosure ruby: Potential HTTP request smuggling in WEBrick ruby: XML round-trip vulnerability in REXML | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 7.5 | 7.5 | null |
RHSA-2025:3608 | Red Hat Security Advisory: Red Hat JBoss Web Server 6.1.0 release and security update | tomcat: Apache Tomcat: Authentication bypass when using Jakarta Authentication API tomcat: Potential RCE and/or information disclosure and/or information corruption with partial PUT | [
"cpe:/a:redhat:jboss_enterprise_web_server:6.1::el8",
"cpe:/a:redhat:jboss_enterprise_web_server:6.1::el9"
] | null | 8.6 | null | null |
RHSA-2023:6707 | Red Hat Security Advisory: avahi security update | avahi: Local DoS by event-busy-loop from writing long lines to /run/avahi-daemon/socket avahi: reachable assertion in avahi_s_host_name_resolver_start when trying to resolve badly-formatted hostnames avahi: avahi-daemon can be crashed via DBus | [
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::crb",
"cpe:/o:redhat:enterprise_linux:9::baseos"
] | null | 6.2 | null | null |
RHSA-2022:6536 | Red Hat Security Advisory: OpenShift Container Platform 4.11.5 bug fix and security update | gogo/protobuf: plugin/unmarshal/unmarshal.go lacks certain index validation | [
"cpe:/a:redhat:openshift:4.11::el8"
] | null | 8.6 | null | null |
RHSA-2018:0592 | Red Hat Security Advisory: slf4j security update | slf4j: Deserialisation vulnerability in EventData constructor can allow for arbitrary code execution | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 8.1 | null |
RHSA-2024:1449 | Red Hat Security Advisory: OpenShift Container Platform 4.15.5 bug fix and security update | golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487) opentelemetry-go-contrib: DoS vulnerability in otelgrpc due to unbound cardinality metrics | [
"cpe:/a:redhat:openshift:4.15::el8",
"cpe:/a:redhat:openshift:4.15::el9"
] | null | 7.5 | null | null |
RHSA-2017:0531 | Red Hat Security Advisory: rabbitmq-server security and bug fix update | rabbitmq-server: DoS via lengths_age or lengths_incr parameter in the management plugin | [
"cpe:/a:redhat:openstack:6::el7"
] | null | null | 6.5 | null |
RHSA-2013:1269 | Red Hat Security Advisory: thunderbird security update | Mozilla: Miscellaneous memory safety hazards (rv:17.0.9) (MFSA 2013-76) Mozilla: Use-after-free in Animation Manager during stylesheet cloning (MFSA 2013-79) Mozilla: Calling scope for new Javascript objects can lead to memory corruption (MFSA 2013-82) Mozilla: Compartment mismatch re-attaching XBL-backed nodes (MFSA 2013-88) Mozilla: Buffer overflow with multi-column, lists, and floats (MFSA 2013-89) Mozilla: Memory corruption involving scrolling (MFSA 2013-90) Mozilla: Memory corruption involving scrolling (MFSA 2013-90) Mozilla: User-defined properties on DOM proxies get the wrong "this" object (MFSA 2013-91) | [
"cpe:/a:redhat:rhel_productivity:5",
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2018:0092 | Red Hat Security Advisory: Red Hat CloudForms 4.0 security update | An update is now available for Red Hat CloudForms 4.0.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. | [
"cpe:/a:redhat:cloudforms_managementengine:5::el7"
] | null | null | null | null |
RHSA-2021:1297 | Red Hat Security Advisory: java-11-openjdk security and bug fix update | OpenJDK: Incomplete enforcement of JAR signing disabled algorithms (Libraries, 8249906) | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 5.3 | null | null |
RHSA-2022:8679 | Red Hat Security Advisory: usbguard security update | usbguard: Fix unauthorized access via D-Bus | [
"cpe:/a:redhat:rhel_eus:8.4::appstream"
] | null | 7.8 | null | null |
RHSA-2019:3908 | Red Hat Security Advisory: kernel-rt security update | hw: Intel GPU blitter manipulation can allow for arbitrary kernel memory write | [
"cpe:/a:redhat:enterprise_mrg:2:server:el6"
] | null | null | 8.8 | null |
RHSA-2024:4051 | Red Hat Security Advisory: pki-core security update | ca: token authentication bypass vulnerability | [
"cpe:/a:redhat:rhel_eus:9.2::appstream"
] | null | 7.5 | null | null |
RHSA-2022:0628 | Red Hat Security Advisory: 389-ds-base security and bug fix update | 389-ds-base: double free of the virtual attribute context in persistent search | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 7.5 | null | null |
RHSA-2023:7431 | Red Hat Security Advisory: kernel-rt security update | kernel: Use-after-free vulnerability in the Linux Kernel traffic control index filter kernel: net/sched: cls_u32 component reference counter leak if tcf_change_indev() fails kernel: net/sched: cls_fw component can be exploited as result of failure in tcf_change_indev function kernel: netfilter: use-after-free due to improper element removal in nft_pipapo_remove() | [
"cpe:/a:redhat:rhel_tus:8.2::nfv",
"cpe:/a:redhat:rhel_tus:8.2::realtime"
] | null | 7.8 | null | null |
RHSA-2023:6061 | Red Hat Security Advisory: Red Hat OpenShift Pipelines 1.12.1 release and security update | golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487) HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack) | [
"cpe:/a:redhat:openshift_pipelines:1.12::el8"
] | null | 7.5 | null | null |
RHSA-2024:7941 | Red Hat Security Advisory: OpenShift Container Platform 4.13.z security update | containers/image: digest type does not guarantee valid type webob: WebOb's location header normalization during redirect leads to open redirect openstack-ironic: Specially crafted image may allow authenticated users to gain access to potentially sensitive data | [
"cpe:/a:redhat:openshift:4.13::el8",
"cpe:/a:redhat:openshift:4.13::el9",
"cpe:/a:redhat:openshift_ironic:4.13::el9"
] | null | 6.8 | null | null |
RHBA-2018:3207 | Red Hat Bug Fix Advisory: NetworkManager bug fix and enhancement update | NetworkManager: Information exposure in DNS resolver | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 4.8 | null |
RHSA-2022:6522 | Red Hat Security Advisory: .NET Core 3.1 on RHEL 7 security and bugfix update | dotnet: DenialOfService - ASP.NET Core MVC vulnerable to stack overflow via ModelStateDictionary recursion. | [
"cpe:/a:redhat:rhel_dotnet:3.1::el7"
] | null | 7.5 | null | null |
RHSA-2017:0184 | Red Hat Security Advisory: mysql security update | mysql: race condition while setting stats during MyISAM table repair (CPU Oct 2016) mysql: general_log can write to configuration files, leading to privilege escalation (CPU Oct 2016) mysql: race condition while setting stats during MyISAM table repair (CPU Oct 2016) | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | 7 | null |
RHSA-2024:4677 | Red Hat Security Advisory: OpenShift Container Platform 4.12.61 bug fix and security update | golang.org/x/net/http2: avoid quadratic complexity in HPACK decoding golang: net/http, x/net/http2: unlimited number of CONTINUATION frames causes DoS | [
"cpe:/a:redhat:openshift:4.12::el8",
"cpe:/a:redhat:openshift:4.12::el9"
] | null | 7.5 | null | null |
RHSA-2020:5020 | Red Hat Security Advisory: tomcat security update | tomcat: Mishandling of Transfer-Encoding header allows for HTTP request smuggling | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 4.3 | null | null |
RHSA-2024:0041 | Red Hat Security Advisory: OpenShift Container Platform 4.16.0 bug fix and security update | helm: shows secrets with --dry-run option in clear text opentelemetry: DoS vulnerability in otelhttp golang: net/http/cookiejar: incorrect forwarding of sensitive headers and cookies on HTTP redirect opentelemetry-go-contrib: DoS vulnerability in otelgrpc due to unbound cardinality metrics ssh: Prefix truncation attack on Binary Packet Protocol (BPP) go-git: Maliciously crafted Git server replies can lead to path traversal and RCE on go-git clients coredns: CD bit response is cached and served later quic-go: memory exhaustion attack against QUIC's connection ID mechanism golang: crypto/x509: Verify panics on certificates with an unknown public key algorithm golang: net/mail: comments in display names are incorrectly handled golang: html/template: errors returned from MarshalJSON methods may break template escaping golang-protobuf: encoding/protojson, internal/encoding/json: infinite loop in protojson.Unmarshal when unmarshaling certain forms of invalid JSON cloudevents/sdk-go: usage of WithRoundTripper to create a Client leaks credentials jose: resource exhaustion jose-go: improper handling of highly compressed data follow-redirects: Possible credential leak webpack-dev-middleware: lack of URL validation may lead to file leak | [
"cpe:/a:redhat:openshift:4.16::el9"
] | null | 7.4 | null | null |
RHSA-2021:0395 | Red Hat Security Advisory: RHV-H security, bug fix, enhancement update (redhat-virtualization-host) 4.3.13 | dnsmasq: loose address/port check in reply_query() makes forging replies easier for an off-path attacker dnsmasq: loose query name check in reply_query() makes forging replies easier for an off-path attacker dnsmasq: multiple queries forwarded for the same name makes forging replies easier for an off-path attacker sudo: Heap buffer overflow in argument parsing | [
"cpe:/o:redhat:enterprise_linux:7::hypervisor"
] | null | 7.8 | null | null |
RHSA-2023:0638 | Red Hat Security Advisory: samba security update | samba: RC4/HMAC-MD5 NetLogon Secure Channel is weak and should be avoided | [
"cpe:/o:redhat:rhel_aus:8.2::baseos",
"cpe:/o:redhat:rhel_e4s:8.2::baseos",
"cpe:/o:redhat:rhel_tus:8.2::baseos"
] | null | 8.1 | null | null |
RHSA-2019:2283 | Red Hat Security Advisory: sox security update | sox: NULL pointer dereference in startread function in xa.c | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 3.3 | null |
RHSA-2003:224 | Red Hat Security Advisory: openssh security update | security flaw | [
"cpe:/o:redhat:enterprise_linux:2.1::as",
"cpe:/o:redhat:enterprise_linux:2.1::aw",
"cpe:/o:redhat:enterprise_linux:2.1::es",
"cpe:/o:redhat:enterprise_linux:2.1::ws"
] | null | null | null | null |
RHSA-2022:0866 | Red Hat Security Advisory: OpenShift Container Platform 4.6.56 packages and security update | cri-o: pod with access to 'hostIPC' and 'hostNetwork' kernel namespace allows sysctl from the list of safe sysctls to be applied to the host CRI-O: Arbitrary code execution in cri-o via abusing “kernel.core_pattern” kernel parameter | [
"cpe:/a:redhat:openshift:4.6::el7",
"cpe:/a:redhat:openshift:4.6::el8"
] | null | 8.8 | null | null |
RHSA-2021:2716 | Red Hat Security Advisory: kpatch-patch security update | kernel: race condition for removal of the HCI controller kernel: size_t-to-int conversion vulnerability in the filesystem layer | [
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 7.8 | null | null |
RHSA-2015:0166 | Red Hat Security Advisory: subversion security update | subversion: credentials leak via MD5 collision subversion: NULL pointer dereference flaw in mod_dav_svn when handling REPORT requests subversion: NULL pointer dereference flaw in mod_dav_svn when handling URIs for virtual transaction names | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | null | null |
RHSA-2007:0939 | Red Hat Security Advisory: kernel security update | kernel: denial of service with wedged processes VFAT compat ioctls DoS on 64-bit Bound check ordering issue in random driver LTC36188-Don't allow the stack to grow into hugetlb reserved regions CIFS should honor umask CIFS signing sec= mount options don't work correctly Privilege escalation via PR_SET_PDEATHSIG kernel: Missing ioctl() permission checks in aacraid driver ALSA memory disclosure flaw | [
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2022:6560 | Red Hat Security Advisory: Openshift Logging Bug Fix Release and Security Update (5.3.12) | golang: compress/gzip: stack exhaustion in Reader.Read | [
"cpe:/a:redhat:logging:5.3::el8"
] | null | 7.5 | null | null |
RHSA-2024:4235 | Red Hat Security Advisory: 389-ds security update | 389-ds-base: Malformed userPassword may cause crash at do_modify in slapd/modify.c 389-ds-base: potential denial of service via specially crafted kerberos AS-REQ request | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 7.5 | null | null |
RHSA-2022:7070 | Red Hat Security Advisory: firefox security update | Mozilla: Same-origin policy violation could have leaked cross-origin URLs Mozilla: Memory Corruption in JS Engine Mozilla: Denial of Service via window.print Mozilla: Memory safety bugs fixed in Firefox ESR 102.4 and Thunderbird 102.4 | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 8.8 | 6.1 | null |
RHSA-2009:0354 | Red Hat Security Advisory: evolution-data-server security update | evolution-data-server: S/MIME signatures are considered to be valid even for modified messages (MITM) evolution-data-server: insufficient checking of NTLM authentication challenge packets evolution-data-server: integer overflow in base64 encoding functions | [
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws",
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2024:2877 | Red Hat Security Advisory: OpenShift Container Platform 4.13.42 packages and security update | buildah: full container escape at build time jose-go: improper handling of highly compressed data | [
"cpe:/a:redhat:openshift:4.13::el8",
"cpe:/a:redhat:openshift:4.13::el9"
] | null | 4.3 | null | null |
RHSA-2024:0399 | Red Hat Security Advisory: gnutls security update | gnutls: timing side-channel in the RSA-PSK authentication | [
"cpe:/a:redhat:rhel_eus:8.8::appstream",
"cpe:/o:redhat:rhel_eus:8.8::baseos"
] | null | 5.9 | null | null |
RHSA-2025:2359 | Red Hat Security Advisory: firefox security update | firefox: AudioIPC StreamData could trigger a use-after-free in the Browser process firefox: Use-after-free in WebTransportChild firefox: Inconsistent comparator in XSLT sorting led to out-of-bounds access firefox: JIT corruption of WASM i32 return values on 64-bit CPUs firefox: Unexpected GC during RegExp bailout processing firefox: Clickjacking the registerProtocolHandler info-bar Reporter firefox: Adding %00 and a fake extension to a jar: URL changed the interpretation of the contents firefox: thunderbird: Memory safety bugs fixed in Firefox 136, Thunderbird 136, Firefox ESR 115.21, Firefox ESR 128.8, and Thunderbird 128.8 firefox: thunderbird: Memory safety bugs fixed in Firefox 136, Thunderbird 136, Firefox ESR 128.8, and Thunderbird 128.8 | [
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 8.8 | null | null |
RHSA-2024:10987 | Red Hat Security Advisory: pcs security update | sinatra: Open Redirect Vulnerability in Sinatra via X-Forwarded-Host Header | [
"cpe:/a:redhat:enterprise_linux:8::highavailability",
"cpe:/a:redhat:enterprise_linux:8::resilientstorage"
] | null | 5.4 | null | null |
RHSA-2023:0400 | Red Hat Security Advisory: kernel-rt security and bug fix update | hw: cpu: LFENCE/JMP Mitigation Update for CVE-2017-5715 kernel: memory corruption in AX88179_178A based USB ethernet device. | [
"cpe:/a:redhat:rhel_extras_rt:7"
] | null | 7.8 | null | null |
RHSA-2005:044 | Red Hat Security Advisory: XFree86 security update | libxpm buffer overflow | [
"cpe:/o:redhat:enterprise_linux:2.1::as",
"cpe:/o:redhat:enterprise_linux:2.1::aw",
"cpe:/o:redhat:enterprise_linux:2.1::es",
"cpe:/o:redhat:enterprise_linux:2.1::ws"
] | null | null | null | null |
RHSA-2024:0740 | Red Hat Security Advisory: OpenShift Container Platform 4.13.33 security and extras update | go-git: Maliciously crafted Git server replies can cause DoS on go-git clients go-git: Maliciously crafted Git server replies can lead to path traversal and RCE on go-git clients | [
"cpe:/a:redhat:openshift:4.13::el8",
"cpe:/a:redhat:openshift:4.13::el9"
] | null | 8.1 | null | null |
RHSA-2009:0338 | Red Hat Security Advisory: php security update | php: buffer overflow in the imageloadfont function in gd extension php: FastCGI module DoS via multiple dots preceding the extension php: libgd imagerotate() array index error memory disclosure php: Heap-based buffer overflow in the mbstring extension via crafted string containing a HTML entity (arb code execution) php: XSS via PHP error messages PHP mbstring.func_overload web server denial of service | [
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2024:0645 | Red Hat Security Advisory: OpenShift Container Platform 4.14.11 packages and security update | runc: file descriptor leak | [
"cpe:/a:redhat:openshift:4.14::el8",
"cpe:/a:redhat:openshift:4.14::el9",
"cpe:/a:redhat:openshift_ironic:4.14::el9"
] | null | 8.6 | null | null |
RHSA-2020:4251 | Red Hat Security Advisory: flash-plugin security update | flash-plugin: Arbitrary Code Execution vulnerability (APSB20-58) | [
"cpe:/a:redhat:rhel_extras:6"
] | null | null | 8.8 | null |
RHSA-2006:0257 | Red Hat Security Advisory: RealPlayer security update | security flaw | [
"cpe:/a:redhat:rhel_extras:3",
"cpe:/a:redhat:rhel_extras:4"
] | null | null | null | null |
RHSA-2018:0027 | Red Hat Security Advisory: qemu-kvm security update | An update for qemu-kvm is now available for Red Hat Enterprise Linux 7.3 Extended Update Support.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. | [
"cpe:/o:redhat:rhel_eus:7.3::computenode",
"cpe:/o:redhat:rhel_eus:7.3::server"
] | null | null | null | null |
RHSA-2021:2405 | Red Hat Security Advisory: dhcp security update | dhcp: stack-based buffer overflow when parsing statements with colon-separated hex digits in config or lease files in dhcpd and dhclient | [
"cpe:/o:redhat:rhel_eus:7.7::computenode",
"cpe:/o:redhat:rhel_eus:7.7::server"
] | null | 8.8 | null | null |
RHSA-2020:1449 | Red Hat Security Advisory: OpenShift Container Platform 4.1.41 security update | buildah: Crafted input tar file may lead to local file overwrite during image build process | [
"cpe:/a:redhat:openshift:4.1::el8"
] | null | 8.8 | null | null |
RHSA-2009:0361 | Red Hat Security Advisory: NetworkManager security update | NetworkManager: GetSecrets disclosure NetworkManager: local users can modify the connection settings | [
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2024:7769 | Red Hat Security Advisory: container-tools:rhel8 security update | encoding/gob: golang: Calling Decoder.Decode on a message which contains deeply nested structures can cause a panic due to stack exhaustion | [
"cpe:/a:redhat:rhel_eus:8.8::appstream"
] | null | 7.5 | null | null |
RHSA-2015:0377 | Red Hat Security Advisory: libreoffice security, bug fix, and enhancement update | libreoffice: VBA macros executed unconditionally openoffice: Arbitrary file disclosure via crafted OLE objects libreoffice: Use-After-Free in socket manager of Impress Remote | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | null | null |
RHSA-2021:4135 | Red Hat Security Advisory: java-17-openjdk security update | OpenJDK: Excessive memory allocation in RTFParser (Swing, 8265167) OpenJDK: Excessive memory allocation in RTFReader (Swing, 8265580) OpenJDK: Excessive memory allocation in HashMap and HashSet (Utility, 8266097) OpenJDK: Certificates with end dates too far in the future can corrupt keystore (Keytool, 8266137) OpenJDK: Incorrect principal selection when using Kerberos Constrained Delegation (Libraries, 8266689) OpenJDK: Unexpected exception raised during TLS handshake (JSSE, 8267729) OpenJDK: Excessive memory allocation in BMPImageReader (ImageIO, 8267735) OpenJDK: Non-constant comparison during TLS handshakes (JSSE, 8269618) | [
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb"
] | null | 3.7 | null | null |
RHSA-2024:1456 | Red Hat Security Advisory: OpenShift Container Platform 4.13.38 packages and security update | golang-protobuf: encoding/protojson, internal/encoding/json: infinite loop in protojson.Unmarshal when unmarshaling certain forms of invalid JSON jose-go: improper handling of highly compressed data | [
"cpe:/a:redhat:openshift:4.13::el8",
"cpe:/a:redhat:openshift:4.13::el9"
] | null | 4.3 | null | null |
RHSA-2020:2641 | Red Hat Security Advisory: grafana security update | grafana: SSRF incorrect access control vulnerability allows unauthenticated users to make grafana send HTTP requests to any URL | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 8.2 | null | null |
RHSA-2017:3476 | Red Hat Security Advisory: Red Hat JBoss Core Services Apache HTTP Server 2.4.23 security update | httpd: ap_get_basic_auth_pw() authentication bypass httpd: mod_ssl NULL pointer dereference httpd: mod_mime buffer overread httpd: Use-after-free by limiting unregistered HTTP method (Optionsbleed) apr: Out-of-bounds array deref in apr_time_exp*() functions | [
"cpe:/a:redhat:jboss_core_services:1::el7"
] | null | null | 7.4 | null |
RHSA-2024:5082 | Red Hat Security Advisory: Red Hat OpenStack Platform 17.1.3 security update | openstack-nova: Regression VMDK/qcow arbitrary file access | [
"cpe:/a:redhat:openstack:17.1::el8"
] | null | 5.5 | null | null |
RHSA-2024:0300 | Red Hat Security Advisory: python-urllib3 security update | python-urllib3: Cookie request header isn't stripped during cross-origin redirects urllib3: Request body not stripped after redirect from 303 status changes request method to GET | [
"cpe:/o:redhat:rhel_eus:8.6::baseos"
] | null | 4.2 | null | null |
RHSA-2025:1888 | Red Hat Security Advisory: Errata Advisory for Red Hat OpenShift GitOps v1.15.1 security update | go-git: argument injection via the URL field go-git: go-git clients vulnerable to DoS via maliciously crafted Git server replies argocd: Argo CD does not scrub secret values from patch errors | [
"cpe:/a:redhat:openshift_gitops:1.15::el8",
"cpe:/a:redhat:openshift_gitops:1.15::el9"
] | null | 6.8 | null | null |
RHSA-2017:1230 | Red Hat Security Advisory: ghostscript security update | ghostscript: corruption of operand stack | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation",
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 7.3 | null |
RHSA-2014:1168 | Red Hat Security Advisory: rhev-hypervisor6 security and bug fix update | Qemu: qcow1: validate L2 table size to avoid integer overflows Qemu: qcow1: validate image size to avoid out-of-bounds memory access Kernel: netdevice.h: NULL pointer dereference over VxLAN | [
"cpe:/o:redhat:enterprise_linux:6::hypervisor"
] | null | null | null | null |
RHEA-2020:0283 | Red Hat Enhancement Advisory: Red Hat OpenStack Platform 16.0 GA | openstack-mistral: information disclosure in mistral log openstack-keystone: Credentials API allows non-admin to list and retrieve all users credentials | [
"cpe:/a:redhat:openstack:16::el8"
] | null | null | 8.1 | null |
RHSA-2024:6153 | Red Hat Security Advisory: 389-ds-base security update | 389-ds-base: Malformed userPassword hash may cause Denial of Service | [
"cpe:/o:redhat:rhel_els:7"
] | null | 5.7 | null | null |
RHSA-2019:1790 | Red Hat Security Advisory: perl security update | perl: Integer overflow leading to buffer overflow in Perl_my_setenv() | [
"cpe:/o:redhat:rhel_eus:7.5::computenode",
"cpe:/o:redhat:rhel_eus:7.5::server"
] | null | null | 8.1 | null |
RHSA-2023:3943 | Red Hat Security Advisory: ACS 4.1 enhancement and security update | golang: crash in a golang.org/x/crypto/ssh server golang.org/x/net/http2: avoid quadratic complexity in HPACK decoding golang: net/http, net/textproto: denial of service from excessive memory allocation golang: net/http, net/textproto, mime/multipart: denial of service from excessive resource consumption golang: go/parser: Infinite loop in parsing golang: html/template: backticks not treated as string delimiters | [
"cpe:/a:redhat:advanced_cluster_security:4.1::el8"
] | null | 9.8 | null | null |
RHSA-2018:2147 | Red Hat Security Advisory: rh-git29-git security update | git: path sanity check in is_ntfs_dotgit() can read arbitrary memory git: arbitrary code execution when recursively cloning a malicious repository | [
"cpe:/a:redhat:rhel_software_collections:3::el6",
"cpe:/a:redhat:rhel_software_collections:3::el7"
] | null | null | 8.8 | null |
RHSA-2024:8166 | Red Hat Security Advisory: thunderbird security update | firefox: thunderbird: Compromised content process can bypass site isolation firefox: thunderbird: Cross-origin access to PDF contents through multipart responses firefox: thunderbird: Cross-origin access to JSON contents through multipart responses firefox: thunderbird: Potential memory corruption may occur when cloning certain objects firefox: thunderbird: Potential directory upload bypass via clickjacking firefox: thunderbird: External protocol handlers could be enumerated via popups firefox: thunderbird: Specially crafted WebTransport requests could lead to denial of service firefox: thunderbird: Potential memory corruption during JIT compilation firefox: thunderbird: Memory safety bugs fixed in Firefox 131, Firefox ESR 115.16, Firefox ESR 128.3, Thunderbird 131, and Thunderbird 128.3 firefox: thunderbird: Memory safety bugs fixed in Firefox 131, Firefox ESR 128.3, Thunderbird 131, and Thunderbird 128.3 firefox: thunderbird: Memory safety bugs fixed in Firefox 131 and Thunderbird 131 firefox: Use-after-free in Animation timeline (128.3.1 ESR Chemspill) | [
"cpe:/a:redhat:rhel_eus:8.8::appstream"
] | null | 9.8 | null | null |
RHSA-2024:7925 | Red Hat Security Advisory: OpenShift Container Platform 4.17.1 packages and security update | Podman: Buildah: cri-o: FIPS Crypto-Policy Directory Mounting Issue in containers/common Go Library | [
"cpe:/a:redhat:openshift:4.17::el8",
"cpe:/a:redhat:openshift:4.17::el9"
] | null | 5.4 | null | null |
RHSA-2024:3560 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.4.17 Security update | datatables.net: contents of array not escaped by HTML escape entities function EAP: wildfly-elytron has a SSRF security issue cxf-core: Apache CXF SSRF Vulnerability using the Aegis databinding | [
"cpe:/a:redhat:jboss_enterprise_application_platform:7.4::el8"
] | null | 7.4 | null | null |
RHSA-2023:2951 | Red Hat Security Advisory: kernel security, bug fix, and enhancement update | hw: cpu: AMD CPUs may transiently execute beyond unconditional direct branch kernel: malicious data for FBIOPUT_VSCREENINFO ioctl may cause OOB write memory kernel: when setting font with malicious data by ioctl PIO_FONT, kernel will write memory out of bounds kernel: mm/slub: actually fix freelist pointer vs redzoning kernel: net: stmmac: fix tc flower deletion for VLAN priority Rx steering kernel: possible race condition in drivers/tty/tty_buffers.c kernel: use-after-free in ath9k_htc_probe_device() could cause an escalation of privileges kernel: KVM: NULL pointer dereference in kvm_mmu_invpcid_gva kernel: KVM: nVMX: missing IBPB when exiting from nested guest can lead to Spectre v2 attacks kernel: netfilter: nf_conntrack_irc message handling issue kernel: race condition in xfrm_probe_algs can lead to OOB read/write kernel: media: em28xx: initialize refcount before kref_get kernel: race condition in hugetlb_no_page() in mm/hugetlb.c kernel: memory leak in ipv6_renew_options() kernel: use-after-free caused by l2cap_reassemble_sdu() in net/bluetooth/l2cap_core.c kernel: data races around icsk->icsk_af_ops in do_ipv6_setsockopt kernel: data races around sk->sk_prot kernel: memory leak in l2cap_recv_acldata of the file net/bluetooth/l2cap_core.c kernel: denial of service in follow_page_pte in mm/gup.c due to poisoned pte entry kernel: use-after-free after failed devlink reload in devlink_param_get kernel: USB-accessible buffer overflow in brcmfmac kernel: Double-free in split_2MB_gtt_entry when function intel_gvt_dma_map_guest_page failed kernel: l2tp: missing lock when clearing sk_user_data can lead to NULL pointer dereference kernel: Recursive locking violation in usb-storage that can cause the kernel to deadlock kernel: igmp: use-after-free in ip_check_mc_rcu when opening and closing inet sockets kernel: Executable Space Protection Bypass kernel: Unprivileged users may use PTRACE_SEIZE to set PTRACE_O_SUSPEND_SECCOMP option kernel: xfrm_expand_policies() in net/xfrm/xfrm_policy.c can cause a refcount to be dropped twice kernel: unmap_mapping_range() race with munmap() on VM_PFNMAP mappings leads to stale TLB entry kernel: TLB flush operations are mishandled in certain KVM_VCPU_PREEMPTED leading to guest malfunctioning kernel: Report vmalloc UAF in dvb-core/dmxdev kernel: u8 overflow problem in cfg80211_update_notlisted_nontrans() kernel: use-after-free related to leaf anon_vma double reuse kernel: use-after-free in bss_ref_get in net/wireless/scan.c kernel: BSS list corruption in cfg80211_add_nontrans_list in net/wireless/scan.c kernel: Denial of service in beacon protection for P2P-device kernel: memory corruption in usbmon driver kernel: NULL pointer dereference in traffic control subsystem kernel: scsi: mpt3sas: Fix use-after-free warning kernel: regmap: spi: Reserve space for register address/padding kernel: net/mlx5e: IPoIB, Block PKEY interfaces with less rx queues than parent kernel: net/mlx5: Fix command stats access after free kernel: ASoC: soc-pcm: Add NULL check in BE reparenting kernel: hwmon: (coretemp) Check for null before removing sysfs attrs kernel: iommu/arm-smmu-v3: check return value after calling platform_get_resource() kernel: iommu/arm-smmu: fix possible null-ptr-deref in arm_smmu_device_probe() kernel: rtw89: cfo: check mac_id to avoid out-of-bounds kernel: udp: Fix a data-race around sysctl_udp_l3mdev_accept. kernel: iavf: Fix handling of dummy receive descriptors kernel: vlan: fix memory leak in vlan_newlink() kernel: drm/i915: fix a possible refcount leak in intel_dp_add_mst_connector() kernel: i2c: piix4: Fix a memory leak in the EFCH MMIO support kernel: NULL pointer dereference in rawv6_push_pending_frames kernel: net/ulp: use-after-free in listening ULP sockets kernel: netfilter: NULL pointer dereference in nf_tables due to zeroed list head kernel: use-after-free caused by invalid pointer hostname in fs/cifs/connect.c kernel: Soft lockup occurred during __page_mapcount Kernel: NULL pointer dereference problem in sctp_sched_dequeue_common kernel: drm/virtio: improper return value check in virtio_gpu_object_shmem_init() kernel: slab-out-of-bounds read vulnerabilities in cbq_classify | [
"cpe:/a:redhat:enterprise_linux:8::crb",
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 4.2 | null | null |
RHSA-2019:0365 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.1.6 for RHEL 7 security update | wildfly-core: Cross-site scripting (XSS) in JBoss Management Console undertow: Infoleak in some circumstances where Undertow can serve data from a random buffer dom4j: XML Injection in Class: Element. Methods: addElement, addAttribute which can impact the integrity of XML documents | [
"cpe:/a:redhat:jboss_enterprise_application_platform:7.1::el7"
] | null | null | 5.3 | null |
RHSA-2023:6434 | Red Hat Security Advisory: frr security and bug fix update | frr: Reachable assertion in peek_for_as4_capability function frr: denial of service by crafting a BGP OPEN message with an option of type 0xff frr: denial of service by crafting a BGP OPEN message with an option of type in bgp_open_option_parse in the bgp_open.c 0xff frr: out-of-bounds read exists in the BGP daemon of FRRouting | [
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 6.5 | null | null |
RHSA-2013:1081 | Red Hat Security Advisory: java-1.5.0-ibm security update | OpenJDK: Insecure shared memory permissions (2D, 8001034) OpenJDK: Frame injection in generated HTML (Javadoc, 8012375) OpenJDK: AccessControlContext check order issue (Libraries, 8001330) OpenJDK: Resource denial of service (AWT, 8001038) OpenJDK: output stream access restrictions (CORBA, 8000642) OpenJDK: Prevent revealing the local address (Networking, 8001318) OpenJDK: Better access restrictions (Sound, 8006328) OpenJDK: ObjectStreamClass circular reference denial of service (Serialization, 8000638) OpenJDK: Unique VMIDs (Libraries, 8001033) OpenJDK: SerialJavaObject package restriction (JDBC, 8009554) OpenJDK: getEnclosing* checks (Libraries, 8007812) OpenJDK: ObjectOutputStream access checks (Serialization, 8008132) OpenJDK: Proper class checking (JMX, 8008120) OpenJDK: Various AWT integer overflow checks (AWT, 8009071) OpenJDK: Incorrect image attribute verification (2D, 8012438) JDK: unspecified vulnerability fixed in 7u25 (2D) OpenJDK: Incorrect image channel verification (2D, 8012597) OpenJDK: Incorrect image layout verification (2D, 8012601) OpenJDK: ImagingLib byte lookup processing (2D, 8011243) OpenJDK: Incorrect IntegerComponentRaster size checks (2D, 8011248) OpenJDK: Incorrect ShortBandedRaster size checks (2D, 8011253) OpenJDK: Incorrect ByteBandedRaster size checks (2D, 8011257) JDK: Unspecified security fixes (July 2013) JDK: Unspecified security fixes (July 2013) JDK: Unspecified security fixes (July 2013) JDK: unspecified vulnerability fixed in 6u51 and 5u51 (AWT) OpenJDK: XML parsing Denial of Service (JAXP, 8017298) | [
"cpe:/a:redhat:rhel_extras:5::server",
"cpe:/a:redhat:rhel_extras:6"
] | null | null | null | null |
RHSA-2024:0023 | Red Hat Security Advisory: firefox security update | Mozilla: Heap-buffer-overflow affecting WebGL <code>DrawElementsInstanced</code> method with Mesa VM driver Mozilla: Symlinks may resolve to smaller than expected buffers Mozilla: Heap buffer overflow in <code>nsTextFragment</code> Mozilla: Use-after-free in PR_GetIdentitiesLayer Mozilla: Potential sandbox escape due to <code>VideoBridge</code> lack of texture validation Mozilla: Heap buffer overflow affected <code>nsWindow::PickerOpen(void)</code> in headless mode Mozilla: Use-after-free in <code>nsDNSService</code> Mozilla: Undefined behavior in <code>ShutdownObserver()</code> Mozilla: Memory safety bugs fixed in Firefox 121, Firefox ESR 115.6, and Thunderbird 115.6 Mozilla: Potential exposure of uninitialized data in <code>EncryptingOutputStream</code> Mozilla: Clickjacking permission prompts using the popup transition | [
"cpe:/a:redhat:rhel_aus:8.2::appstream",
"cpe:/a:redhat:rhel_e4s:8.2::appstream",
"cpe:/a:redhat:rhel_tus:8.2::appstream"
] | null | 6.1 | null | null |
RHSA-2014:1007 | Red Hat Security Advisory: Red Hat JBoss BRMS 5.3.1 update | XStream: remote code execution due to insecure XML deserialization Xalan-Java: insufficient constraints in secure processing feature | [
"cpe:/a:redhat:jboss_enterprise_brms_platform:5.3"
] | null | null | null | null |
RHSA-2021:5160 | Red Hat Security Advisory: go-toolset:rhel8 security and bug fix update | golang: net/http: limit growth of header canonicalization cache golang: syscall: don't close fd 0 on ForkExec error | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 4.8 | null | null |
RHSA-2013:0696 | Red Hat Security Advisory: firefox security update | Mozilla: Miscellaneous memory safety hazards (rv:17.0.5) (MFSA 2013-30) Mozilla: Cross-site scripting (XSS) using timed history navigations (MFSA 2013-38) Mozilla: Bypass of SOW protections allows cloning of protected nodes (MFSA 2013-36) Mozilla: WebGL crash with Mesa graphics driver on Linux (MFSA 2013-35) Mozilla: Out-of-bounds write in Cairo library (MFSA 2013-31) | [
"cpe:/o:redhat:enterprise_linux:5::server",
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2022:4582 | Red Hat Security Advisory: gzip security update | gzip: arbitrary-file-write vulnerability | [
"cpe:/o:redhat:enterprise_linux:9::baseos"
] | null | 8.8 | null | null |
RHSA-2024:4824 | Red Hat Security Advisory: nodejs:18 security update | nodejs: CONTINUATION frames DoS nghttp2: CONTINUATION frames DoS | [
"cpe:/a:redhat:rhel_eus:8.8::appstream"
] | null | 5.3 | null | null |
RHSA-2017:1243 | Red Hat Security Advisory: openstack-heat security, bug fix, and enhancement update | openstack-heat: /var/log/heat/ is world readable | [
"cpe:/a:redhat:openstack:10::el7"
] | null | null | 5.9 | null |
RHSA-2024:2815 | Red Hat Security Advisory: Errata Advisory for Red Hat OpenShift GitOps v1.11.4 security update | webpack-dev-middleware: lack of URL validation may lead to file leak | [
"cpe:/a:redhat:openshift_gitops:1.11::el8"
] | null | 7.4 | null | null |
RHSA-2024:3528 | Red Hat Security Advisory: kernel security update | kernel: NULL pointer dereference in can_rcv_filter kernel: Slab-out-of-bound read in compare_netdev_and_ip kernel: net: bridge: data races indata-races in br_handle_frame_finish() kernel: nf_tables: use-after-free vulnerability in the nft_verdict_init() function | [
"cpe:/o:redhat:rhel_aus:8.2::baseos"
] | null | 7.8 | null | null |
RHSA-2008:0195 | Red Hat Security Advisory: tomcat security update | tomcat handling of cookies tomcat handling of cookie values Apache Tomcat's default security policy is too open Absolute path traversal Apache Tomcat WEBDAV | [
"cpe:/a:redhat:rhel_developer_suite:3"
] | null | null | null | null |
RHSA-2014:0230 | Red Hat Security Advisory: mongodb security update | mongodb: memory over-read via incorrect BSON object length | [
"cpe:/a:redhat:openstack:4::el6"
] | null | null | null | null |
RHSA-2020:1289 | Red Hat Security Advisory: haproxy security update | haproxy: malformed HTTP/2 requests can lead to out-of-bounds writes | [
"cpe:/a:redhat:rhel_e4s:8.0::appstream"
] | null | 8.8 | null | null |
RHSA-2024:0845 | Red Hat Security Advisory: OpenShift Container Platform 4.13.34 security update | go-git: Maliciously crafted Git server replies can cause DoS on go-git clients go-git: Maliciously crafted Git server replies can lead to path traversal and RCE on go-git clients | [
"cpe:/a:redhat:openshift:4.13::el8",
"cpe:/a:redhat:openshift:4.13::el9"
] | null | 8.1 | null | null |
RHSA-2015:1000 | Red Hat Security Advisory: qemu-kvm-rhev security update | qemu: fdc: out-of-bounds fifo buffer memory access | [
"cpe:/o:redhat:enterprise_linux:7::hypervisor"
] | null | null | null | null |
RHSA-2020:2473 | Red Hat Security Advisory: pcs security and bug fix update | rubygem-json: Unsafe object creation vulnerability in JSON | [
"cpe:/a:redhat:rhel_e4s:8.0::highavailability"
] | null | 7.3 | null | null |
RHSA-2024:6576 | Red Hat Security Advisory: redhat-ds:11 security and bug fix update | 389-ds-base: potential denial of service via specially crafted kerberos AS-REQ request 389-ds-base: Malformed userPassword hash may cause Denial of Service | [
"cpe:/a:redhat:directory_server:11.7::el8"
] | null | 5.7 | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.