id
stringlengths 13
15
| title
stringlengths 29
176
| description
stringlengths 8
32.1k
| cpes
sequencelengths 0
20
| cvss_v4_0
null | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
null |
---|---|---|---|---|---|---|---|
RHSA-2023:0954 | Red Hat Security Advisory: systemd security update | systemd: local information leak due to systemd-coredump not respecting fs.suid_dumpable kernel setting systemd: deadlock in systemd-coredump via a crash with a long backtrace | [
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/o:redhat:enterprise_linux:9::baseos"
] | null | 5.5 | null | null |
RHSA-2021:2813 | Red Hat Security Advisory: glibc security update | glibc: stack-based buffer overflow if the input to any of the printf family of functions is an 80-bit long double with a non-canonical bit pattern | [
"cpe:/o:redhat:rhel_aus:7.4::server",
"cpe:/o:redhat:rhel_e4s:7.4::server",
"cpe:/o:redhat:rhel_tus:7.4::server"
] | null | 7.5 | null | null |
RHSA-2021:5219 | Red Hat Security Advisory: Red Hat Single Sign-On security update on RHEL 8 | Keycloak: Incorrect authorization allows unpriviledged users to create other users | [
"cpe:/a:redhat:red_hat_single_sign_on:7.5::el8"
] | null | 8.3 | null | null |
RHSA-2015:1923 | Red Hat Security Advisory: qemu-kvm-rhev security update | qemu: Heap overflow vulnerability in ne2000_receive() function | [
"cpe:/a:redhat:enterprise_linux:6::hypervisor"
] | null | null | null | null |
RHSA-2012:1413 | Red Hat Security Advisory: thunderbird security update | Mozilla: Fixes for Location object issues (MFSA 2012-90) Mozilla: Fixes for Location object issues (MFSA 2012-90) Mozilla: Fixes for Location object issues (MFSA 2012-90) | [
"cpe:/a:redhat:rhel_productivity:5",
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2025:3542 | Red Hat Security Advisory: RHODF-4.15-RHEL-9 security update | golang.org/x/crypto/ssh: Misuse of ServerConfig.PublicKeyCallback may cause authorization bypass in golang.org/x/crypto golang.org/x/net/html: Non-linear parsing of case-insensitive content in golang.org/x/net/html | [
"cpe:/a:redhat:openshift_data_foundation:4.15::el9"
] | null | 7.5 | null | null |
RHSA-2013:1542 | Red Hat Security Advisory: samba security, bug fix, and enhancement update | samba: clickjacking vulnerability in SWAT samba: cross-site request forgery vulnerability in SWAT samba: DoS via integer overflow when reading an EA list | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2024:0325 | Red Hat Security Advisory: Updated RHEL-7-based Middleware container images | SnakeYaml: Constructor Deserialization Remote Code Execution | [
"cpe:/a:redhat:rhosemc:1.0::el7"
] | null | 9.8 | null | null |
RHSA-2020:2289 | Red Hat Security Advisory: kernel security and bug fix update | kernel: double free may be caused by the function allocate_trace_buffer in the file kernel/trace/trace.c kernel: Heap overflow in mwifiex_update_bss_desc_with_ie function in marvell/mwifiex/scan.c kernel: Heap overflow in mwifiex_uap_parse_tail_ies function in drivers/net/wireless/marvell/mwifiex/ie.c kernel: use-after-free in __blk_add_trace in kernel/trace/blktrace.c Kernel: NetLabel: null pointer dereference while receiving CIPSO packet with null category may cause kernel panic | [
"cpe:/o:redhat:enterprise_linux:7::hypervisor",
"cpe:/o:redhat:rhel_eus:7.6::computenode",
"cpe:/o:redhat:rhel_eus:7.6::server"
] | null | 5.9 | 8 | null |
RHSA-2019:1455 | Red Hat Security Advisory: Advanced Virtualization security update | hardware: Microarchitectural Store Buffer Data Sampling (MSBDS) hardware: Micro-architectural Load Port Data Sampling - Information Leak (MLPDS) hardware: Microarchitectural Fill Buffer Data Sampling (MFBDS) libvirt: wrong permissions in systemd admin-sock due to missing SocketMode parameter hardware: Microarchitectural Data Sampling Uncacheable Memory (MDSUM) | [
"cpe:/a:redhat:advanced_virtualization:8::el8"
] | null | null | 3.8 | null |
RHSA-2018:2371 | Red Hat Security Advisory: Red Hat OpenShift Application Runtimes security and bug fix update | vertx: Improper neutralization of CRLF sequences allows remote attackers to inject arbitrary HTTP response headers vertx-web: Incomplete CSRF validation by CSRFHandler | [
"cpe:/a:redhat:openshift_application_runtimes:1.0"
] | null | null | 6.8 | null |
RHSA-2005:363 | Red Hat Security Advisory: RealPlayer security update | security flaw | [
"cpe:/a:redhat:rhel_extras:4"
] | null | null | null | null |
RHSA-2024:1386 | Red Hat Security Advisory: ovn22.12 security update | ovn: insufficient validation of BFD packets may lead to denial of service | [
"cpe:/o:redhat:enterprise_linux:8::fastdatapath"
] | null | 6.5 | null | null |
RHSA-2018:3650 | Red Hat Security Advisory: ghostscript security update | ghostscript: .tempfile file permission issues (699657) ghostscript: shading_param incomplete type checking (699660) ghostscript: missing type check in type checker (699659) ghostscript: incorrect access checking in temp file handling to disclose contents of files (699658) | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 5.3 | null |
RHSA-2010:0660 | Red Hat Security Advisory: kernel security and bug fix update | kernel: mm: keep a guard page below a grow-down stack segment kernel: gfs2: rename causes kernel panic | [
"cpe:/o:redhat:rhel_eus:5.3"
] | null | null | null | null |
RHSA-2024:5941 | Red Hat Security Advisory: libvpx security update | libvpx: Heap buffer overflow related to VP9 encoding libvpx: Integer overflow in vpx_img_alloc() | [
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb"
] | null | 7.1 | null | null |
RHEA-2018:2189 | Red Hat Enhancement Advisory: Red Hat JBoss Web Server 5.0.0 enhancement update | tomcat: A bug in the UTF-8 decoder can lead to DoS | [
"cpe:/a:redhat:jboss_enterprise_web_server:5.0::el6"
] | null | null | 7.5 | null |
RHSA-2013:0697 | Red Hat Security Advisory: thunderbird security update | Mozilla: Miscellaneous memory safety hazards (rv:17.0.5) (MFSA 2013-30) Mozilla: Cross-site scripting (XSS) using timed history navigations (MFSA 2013-38) Mozilla: Bypass of SOW protections allows cloning of protected nodes (MFSA 2013-36) Mozilla: WebGL crash with Mesa graphics driver on Linux (MFSA 2013-35) Mozilla: Out-of-bounds write in Cairo library (MFSA 2013-31) | [
"cpe:/a:redhat:rhel_productivity:5",
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2021:2977 | Red Hat Security Advisory: OpenShift Container Platform 4.7.23 security update | gogo/protobuf: plugin/unmarshal/unmarshal.go lacks certain index validation | [
"cpe:/a:redhat:openshift:4.7::el8"
] | null | 8.6 | null | null |
RHSA-2018:0342 | Red Hat Security Advisory: rh-maven35-jackson-databind security update | jackson-databind: Deserialization vulnerability via readValue method of ObjectMapper jackson-databind: Unsafe deserialization due to incomplete black list (incomplete fix for CVE-2017-7525) jackson-databind: Unsafe deserialization due to incomplete black list (incomplete fix for CVE-2017-15095) | [
"cpe:/a:redhat:rhel_software_collections:3::el7"
] | null | null | 8.1 | null |
RHSA-2020:1353 | Red Hat Security Advisory: kernel-rt security and bug fix update | kernel: heap overflow in mwifiex_update_vs_ie() function of Marvell WiFi driver kernel: rtl_p2p_noa_ie in drivers/net/wireless/realtek/rtlwifi/ps.c in the Linux kernel lacks a certain upper-bound check, leading to a buffer overflow | [
"cpe:/a:redhat:enterprise_mrg:2:server:el6"
] | null | null | 6.3 | null |
RHSA-2020:1970 | Red Hat Security Advisory: chromium-browser security update | chromium-browser: Out of bounds read and write in PDFium chromium-browser: Use after free in payments chromium-browser: Insufficient data validation in URL formatting chromium-browser: Use after free in ANGLE | [
"cpe:/a:redhat:rhel_extras:6"
] | null | null | 8.8 | null |
RHSA-2015:1633 | Red Hat Security Advisory: subversion security update | subversion: (mod_dav_svn) remote denial of service with certain requests with dynamically evaluated revision numbers subversion: (mod_dav_svn) spoofing svn:author property values for new revisions subversion: svn_repos_trace_node_locations() reveals paths hidden by authz | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2013:0821 | Red Hat Security Advisory: thunderbird security update | Mozilla: Miscellaneous memory safety hazards (rv:17.0.6) (MFSA 2013-41) Mozilla: Privileged access for content level constructor (MFSA 2013-42) Mozilla: Use-after-free with video and onresize event (MFSA 2013-46) Mozilla: Uninitialized functions in DOMSVGZoomEvent (MFSA 2013-47) Mozilla: Memory corruption found using Address Sanitizer (MFSA 2013-48) Mozilla: Memory corruption found using Address Sanitizer (MFSA 2013-48) Mozilla: Memory corruption found using Address Sanitizer (MFSA 2013-48) Mozilla: Memory corruption found using Address Sanitizer (MFSA 2013-48) Mozilla: Memory corruption found using Address Sanitizer (MFSA 2013-48) Mozilla: Memory corruption found using Address Sanitizer (MFSA 2013-48) | [
"cpe:/a:redhat:rhel_productivity:5",
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2022:0024 | Red Hat Security Advisory: OpenShift Container Platform 4.6.53 security update | haproxy: an HTTP method name may contain a space followed by the name of a protected resource haproxy: request smuggling attack or response splitting via duplicate content-length header | [
"cpe:/a:redhat:openshift:4.6::el7",
"cpe:/a:redhat:openshift:4.6::el8"
] | null | 7.5 | null | null |
RHBA-2024:5691 | Red Hat Bug Fix Advisory: ca-certificates bug fix and enhancement update | python-certifi: Removal of e-Tugra root certificate | [
"cpe:/o:redhat:enterprise_linux:9::baseos"
] | null | 9.1 | null | null |
RHSA-2022:8854 | Red Hat Security Advisory: Red Hat OpenStack Platform 16.2.4 (python-scciclient) security update | python-scciclient: missing server certificate verification | [
"cpe:/a:redhat:openstack:16.2::el8"
] | null | 7.4 | null | null |
RHSA-2022:5697 | Red Hat Security Advisory: java-1.8.0-openjdk security and bug fix update | OpenJDK: class compilation issue (Hotspot, 8281859) OpenJDK: improper restriction of MethodHandle.invokeBasic() (Hotspot, 8281866) OpenJDK: integer truncation issue in Xalan-J (JAXP, 8285407) | [
"cpe:/a:redhat:rhel_eus:8.4::appstream",
"cpe:/a:redhat:rhel_eus:8.4::crb"
] | null | 7.5 | null | null |
RHSA-2021:1240 | Red Hat Security Advisory: mariadb:10.3 and mariadb-devel:10.3 security update | mariadb: writable system variables allows a database user with SUPER privilege to execute arbitrary code as the system mysql user | [
"cpe:/a:redhat:rhel_eus:8.2::appstream",
"cpe:/a:redhat:rhel_eus:8.2::crb"
] | null | 7.2 | null | null |
RHSA-2024:2758 | Red Hat Security Advisory: kernel security and bug fix update | kernel: KVM: SVM: improper check in svm_set_x2apic_msr_interception allows direct access to host x2apic msrs kernel: Marvin vulnerability side-channel leakage in the RSA decryption operation hw: amd: Instruction raise #VC exception at exit hw: amd: Instruction raise #VC exception at exit | [
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::crb",
"cpe:/a:redhat:enterprise_linux:9::nfv",
"cpe:/a:redhat:enterprise_linux:9::realtime",
"cpe:/o:redhat:enterprise_linux:9::baseos"
] | null | 7.1 | null | null |
RHSA-2005:598 | Red Hat Security Advisory: sysreport security update | security flaw | [
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws"
] | null | null | null | null |
RHSA-2017:0021 | Red Hat Security Advisory: gstreamer1-plugins-bad-free security update | gstreamer-plugins-bad-free: Integer overflow when allocating render buffer in VMnc decoder gstreamer-plugins-bad-free: Off-by-one read in gst_h264_parse_set_caps gstreamer1-plugins-bad-free: Out-of-bounds read in gst_mpegts_section_new gstreamer-plugins-bad-free: NULL pointer dereference in mpegts parser | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 4.3 | null |
RHSA-2007:1176 | Red Hat Security Advisory: autofs security update | autofs default doesn't set nodev in /net | [
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2015:2501 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform security update | apache-commons-collections: InvokerTransformer code execution during deserialisation | [
"cpe:/a:redhat:jboss_enterprise_application_platform:6.1",
"cpe:/a:redhat:jboss_enterprise_application_platform:6.2",
"cpe:/a:redhat:jboss_enterprise_application_platform:6.3",
"cpe:/a:redhat:jboss_enterprise_application_platform:6.4"
] | null | null | null | null |
RHSA-2025:0552 | Red Hat Security Advisory: Multicluster Engine for Kubernetes 2.4.7 security updates and bug fixes | golang.org/x/crypto/ssh: Misuse of ServerConfig.PublicKeyCallback may cause authorization bypass in golang.org/x/crypto golang.org/x/net/html: Non-linear parsing of case-insensitive content in golang.org/x/net/html | [
"cpe:/a:redhat:multicluster_engine:2.4::el8"
] | null | 7.5 | null | null |
RHSA-2003:221 | Red Hat Security Advisory: : Updated stunnel packages fix signal vulnerability | security flaw | [
"cpe:/o:redhat:linux:7.1",
"cpe:/o:redhat:linux:7.2",
"cpe:/o:redhat:linux:7.3",
"cpe:/o:redhat:linux:8.0"
] | null | null | null | null |
RHSA-2022:0450 | Red Hat Security Advisory: Red Hat Single Sign-On 7.5.1 for OpenShift image security and enhancement update | log4j: Remote code execution in Log4j 1.x when application is configured to use JMSAppender log4j: Remote code execution in Log4j 1.x when application is configured to use JMSSink log4j: SQL injection in Log4j 1.x when application is configured to use JDBCAppender log4j: Unsafe deserialization flaw in Chainsaw log viewer | [
"cpe:/a:redhat:rhosemc:1.0::el8"
] | null | 8.8 | null | null |
RHSA-2019:4269 | Red Hat Security Advisory: container-tools:rhel8 security and bug fix update | HTTP/2: flood using PING frames results in unbounded memory growth HTTP/2: flood using HEADERS frames results in unbounded memory growth runc: AppArmor/SELinux bypass with malicious image that specifies a volume at /proc podman: resolving symlink in host filesystem leads to unexpected results of copy operation | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | null | 2.5 | null |
RHSA-2024:10750 | Red Hat Security Advisory: postgresql:12 security update | postgresql: PostgreSQL PL/Perl environment variable changes execute arbitrary code | [
"cpe:/a:redhat:rhel_eus:8.8::appstream"
] | null | 8.8 | null | null |
RHSA-2014:0629 | Red Hat Security Advisory: rhev-hypervisor6 security update | kernel: vhost-net: insufficiency in handling of big packets in handle_rx() openssl: SSL/TLS MITM vulnerability | [
"cpe:/o:redhat:enterprise_linux:6::hypervisor"
] | null | null | null | null |
RHSA-2013:1862 | Red Hat Security Advisory: Fuse ESB Enterprise/Fuse MQ Enterprise 7.1.0 update | openjpa: Remote arbitrary code execution by creating a serialized object and leveraging improperly secured server programs Restlet: remote code execution due to insecure XML deserialization Restlet: remote code execution due to insecure deserialization Camel: remote code execution via header field manipulation Console: Stored cross-site scripting (XSS) | [
"cpe:/a:redhat:fuse_esb_enterprise:7.1.0",
"cpe:/a:redhat:fuse_management_console:7.1.0",
"cpe:/a:redhat:fuse_mq_enterprise:7.1.0"
] | null | null | null | null |
RHSA-2018:3676 | Red Hat Security Advisory: .NET Core on Red Hat Enterprise Linux security update | Core: Arbitrary file and directory creation | [
"cpe:/a:redhat:rhel_dotnet:2.1::el7"
] | null | null | 5.5 | null |
RHSA-2015:1485 | Red Hat Security Advisory: java-1.7.1-ibm security update | JDK: plain text data stored in memory dumps OpenJDK: deserialization issue in ObjectInputStream.readSerialData() (Libraries, 8076401) OpenJDK: non-constant time comparisons in crypto code (JCE, 8074865) JCE: missing EC parameter validation in ECDH_Derive() (OpenJDK JCE, 8075833) JDK: unspecified vulnerability fixed in 7u85 and 8u51 (2D) OpenJDK: incorrect code permission checks in RMIConnectionImpl (JMX, 8075853) OpenJDK: name for reverse DNS lookup used in certificate identity check (JSSE, 8067694) ICU: integer overflow in LETableReference verifyLength() (OpenJDK 2D, 8077520) JDK: unspecified vulnerability fixed in 6u101, 7u85 and 8u51 (2D) JDK: unspecified vulnerability fixed in 6u101, 7u85 and 8u51 (2D) JDK: unspecified vulnerability fixed in 6u101, 7u85 and 8u51 (Deployment) LOGJAM: TLS connections which support export grade DHE key-exchange are vulnerable to MITM attacks JDK: unspecified vulnerability fixed in 7u85 and 8u51 (Deployment) OpenJDK: improper permission checks in MBeanServerInvocationHandler (JMX, 8076397) OpenJDK: insufficient context checks during object deserialization (Libraries, 8076405) OpenJDK: RemoteObjectInvocationHandler allows calling finalize() (RMI, 8076409) JDK: unspecified vulnerability fixed in 7u85 and 8u51 (Deployment) OpenJDK: incorrect OCSP nextUpdate checking (Libraries, 8075374) OpenJDK: DnsClient fails to release request information after error (JNDI, 8075378) ICU: missing boundary checks in layout engine (OpenJDK 2D, 8071715) | [
"cpe:/a:redhat:rhel_extras:6",
"cpe:/a:redhat:rhel_extras:7"
] | null | null | 3.7 | null |
RHSA-2024:4559 | Red Hat Security Advisory: nodejs security update | nodejs: using the fetch() function to retrieve content from an untrusted URL leads to denial of service c-ares: Out of bounds read in ares__read_line() nodejs: HTTP Request Smuggling via Content Length Obfuscation | [
"cpe:/a:redhat:rhel_eus:9.2::appstream"
] | null | 6.1 | null | null |
RHSA-2004:008 | Red Hat Security Advisory: tcpdump security update | security flaw security flaw security flaw | [
"cpe:/o:redhat:enterprise_linux:2.1::as",
"cpe:/o:redhat:enterprise_linux:2.1::aw",
"cpe:/o:redhat:enterprise_linux:2.1::es",
"cpe:/o:redhat:enterprise_linux:2.1::ws",
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws"
] | null | null | null | null |
RHSA-2018:0649 | Red Hat Security Advisory: libvorbis security update | Mozilla: Vorbis audio processing out of bounds write (MFSA 2018-08) | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | 7.8 | null |
RHSA-2022:4589 | Red Hat Security Advisory: thunderbird security update | Mozilla: Incorrect security status shown after viewing an attached email Mozilla: Bypassing permission prompt in nested browsing contexts Mozilla: iframe Sandbox bypass Mozilla: Reader mode bypassed SameSite cookies Mozilla: Speech Synthesis feature not properly disabled Mozilla: Fullscreen notification bypass using popups Mozilla: Leaking browser history with CSS variables Mozilla: Memory safety bugs fixed in Firefox 100 and Firefox ESR 91.9 | [
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 9.8 | 7.5 | null |
RHSA-2018:2772 | Red Hat Security Advisory: kernel-alt security and bug fix update | kernel: Infoleak/use-after-free in __oom_reap_task_mm function in mm/oom_kill.c | [
"cpe:/o:redhat:enterprise_linux:7::server"
] | null | null | 6.7 | null |
RHSA-2015:1769 | Red Hat Security Advisory: libunwind security update | libunwind: off-by-one in dwarf_to_unw_regnum() | [
"cpe:/a:redhat:openstack:5::el7"
] | null | null | null | null |
RHSA-2006:0232 | Red Hat Security Advisory: tar security update | security flaw | [
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2024:4726 | Red Hat Security Advisory: httpd security update | httpd: Encoding problem in mod_proxy httpd: Substitution encoding issue in mod_rewrite httpd: Improper escaping of output in mod_rewrite httpd: NULL pointer dereference in mod_proxy httpd: Potential SSRF in mod_rewrite | [
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 7.4 | null | null |
RHSA-2008:0890 | Red Hat Security Advisory: wireshark security update | wireshark: SCTP dissector crash wireshark: SNMP dissector crash wireshark: TFTP dissector crash wireshark: crash in X.509sat and Roofnet dissectors wireshark: crash in LDAP dissector wireshark: crash in SCCP dissector wireshark: crash in the GSM SMS dissector wireshark: unexpected exit in the PANA and KISMET dissectors wireshark: memory disclosure in the RMI dissector wireshark: crash in the packet reassembling wireshark: multiple buffer overflows in NCP dissector wireshark: infinite loop in the NCP dissector wireshark: crash triggered by zlib-compressed packet data wireshark: crash via crafted Tektronix .rf5 file | [
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws",
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws",
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2023:5221 | Red Hat Security Advisory: kpatch-patch security update | kernel: ipvlan: out-of-bounds write caused by unclear skb->cb kernel: UAF in nftables when nft_set_lookup_global triggered after handling named and anonymous sets in batch requests kernel: net/sched: cls_fw component can be exploited as result of failure in tcf_change_indev function kernel: netfilter: use-after-free due to improper element removal in nft_pipapo_remove() kernel: nf_tables: stack-out-of-bounds-read in nft_byteorder_eval() kernel: cls_flower: out-of-bounds write in fl_set_geneve_opt() | [
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 7.8 | null | null |
RHSA-2013:0256 | Red Hat Security Advisory: JBoss Enterprise Application Platform 5.2.0 security update | apache-cxf: SOAPAction spoofing on document literal web services apache-cxf: Bypass of security constraints on WS endpoints when using WSS4JInInterceptor | [
"cpe:/a:redhat:jboss_enterprise_application_platform:5.2.0"
] | null | null | null | null |
RHSA-2011:1409 | Red Hat Security Advisory: openssl security update | openssl: CRL verification vulnerability | [
"cpe:/o:redhat:enterprise_linux:6::server"
] | null | null | null | null |
RHSA-2021:4153 | Red Hat Security Advisory: dnsmasq security and bug fix update | dnsmasq: fixed outgoing port used when --server is used with an interface name | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 4 | null | null |
RHSA-2017:0206 | Red Hat Security Advisory: chromium-browser security update | chromium-browser: universal xss in blink chromium-browser: universal xss in blink chromium-browser: universal xss in blink chromium-browser: out of bounds memory access in webrtc chromium-browser: universal xss in blink chromium-browser: unauthorised file access in devtools chromium-browser: heap overflow in v8 chromium-browser: address spoofing in omnibox chromium-browser: heap overflow in skia chromium-browser: address spoofing in omnibox chromium-browser: ui spoofing in blink chromium-browser: uninitialised memory access in webm video chromium-browser: universal xss in chrome://apps chromium-browser: use after free in renderer chromium-browser: universal xss in chrome://downloads chromium-browser: use after free in extensions chromium-browser: bypass of content security policy in blink chromium-browser: type confusion in metrics chromium-browser: heap overflow in ffmpeg chromium-browser: heap overflow in ffmpeg chromium-browser: ui spoofing | [
"cpe:/a:redhat:rhel_extras:6"
] | null | null | 4.3 | null |
RHSA-2021:2106 | Red Hat Security Advisory: kernel security and bug fix update | kernel: use after free in eventpoll.c may lead to escalation of privilege kernel: Integer overflow in Intel(R) Graphics Drivers kernel: SCSI target (LIO) write to any block on ILO backstore kernel: Use after free via PI futex state | [
"cpe:/a:redhat:rhel_eus:8.1::crb",
"cpe:/o:redhat:rhel_eus:8.1::baseos"
] | null | 7 | null | null |
RHSA-2024:0422 | Red Hat Security Advisory: perl-HTTP-Tiny security update | http-tiny: insecure TLS cert default | [
"cpe:/o:redhat:rhel_eus:8.6::baseos"
] | null | 6.8 | null | null |
RHSA-2016:1033 | Red Hat Security Advisory: kernel security and bug fix update | kernel: tags with indefinite length can corrupt pointers in asn1_find_indefinite_length() kernel: Infinite loop vulnerability in KVM | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 5.4 | null |
RHSA-2020:0470 | Red Hat Security Advisory: java-1.8.0-ibm security update | OpenJDK: Incorrect exception processing during deserialization in BeanContextSupport (Serialization, 8224909) OpenJDK: Incorrect isBuiltinStreamHandler check causing URL normalization issues (Networking, 8228548) OpenJDK: Serialization filter changes via jdk.serialFilter property modification (Serialization, 8231422) OpenJDK: Incomplete enforcement of maxDatagramSockets limit in DatagramChannelImpl (Networking, 8231795) | [
"cpe:/a:redhat:rhel_extras:7"
] | null | 3.7 | null | null |
RHSA-2009:1618 | Red Hat Security Advisory: mod_jk security update for Red Hat Network Satellite Server | mod_jk: session information leak | [
"cpe:/a:redhat:network_satellite:5.1::el4",
"cpe:/a:redhat:network_satellite:5.2::el4"
] | null | null | null | null |
RHSA-2020:4285 | Red Hat Security Advisory: rh-python36 security, bug fix, and enhancement update | python: XSS vulnerability in the documentation XML-RPC server in server_title field python: CRLF injection via the host part of the url passed to urlopen() python: infinite loop in the tarfile module via crafted TAR archive python-pip: directory traversal in _download_http_url() function in src/pip/_internal/download.py python: wrong backtracking in urllib.request.AbstractBasicAuthHandler allows for a ReDoS python: DoS via inefficiency in IPv{4,6}Interface classes python: CRLF injection via HTTP request method in httplib/http.client | [
"cpe:/a:redhat:rhel_software_collections:3::el6",
"cpe:/a:redhat:rhel_software_collections:3::el7"
] | null | 6.5 | 6.5 | null |
RHSA-2023:0200 | Red Hat Security Advisory: java-11-openjdk security and bug fix update | OpenJDK: handshake DoS attack against DTLS connections (JSSE, 8287411) OpenJDK: soundbank URL remote loading (Sound, 8293742) | [
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb"
] | null | 3.7 | null | null |
RHSA-2024:3428 | Red Hat Security Advisory: rust-toolset:rhel8 security update | rust-cargo: cargo does not respect the umask when extracting dependencies | [
"cpe:/a:redhat:rhel_eus:8.6::appstream"
] | null | 6.7 | null | null |
RHSA-2022:8222 | Red Hat Security Advisory: xorg-x11-server-Xwayland security update | xorg-x11-server: X.Org Server ProcXkbSetGeometry out-of-bounds access xorg-x11-server: out-of-bounds access in ProcXkbSetDeviceInfo request handler of the Xkb extension | [
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 7.8 | null | null |
RHSA-2024:0569 | Red Hat Security Advisory: virt:rhel and virt-devel:rhel security update | QEMU: hcd-ehci: DMA reentrancy issue leads to use-after-free QEMU: e1000e: heap use-after-free in e1000e_write_packet_to_guest() | [
"cpe:/a:redhat:rhel_eus:8.8::appstream",
"cpe:/a:redhat:rhel_eus:8.8::crb"
] | null | 6 | null | null |
RHSA-2023:0294 | Red Hat Security Advisory: firefox security update | Mozilla: libusrsctp library out of date Mozilla: Fullscreen notification bypass Mozilla: Arbitrary file read from GTK drag and drop on Linux Mozilla: Malicious command could be hidden in devtools output Mozilla: URL being dragged from cross-origin iframe into same tab triggers navigation Mozilla: Content Security Policy wasn't being correctly applied to WebSockets in WebWorkers Mozilla: Calls to <code>console.log</code> allowed bypasing Content Security Policy via format directive Mozilla: Memory safety bugs fixed in Firefox 109 and Firefox ESR 102.7 | [
"cpe:/a:redhat:rhel_aus:8.2::appstream",
"cpe:/a:redhat:rhel_e4s:8.2::appstream",
"cpe:/a:redhat:rhel_tus:8.2::appstream"
] | null | 8.8 | null | null |
RHSA-2023:5869 | Red Hat Security Advisory: nodejs:18 security update | nodejs: integrity checks according to policies can be circumvented nodejs: code injection via WebAssembly export names HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack) node-undici: cookie leakage | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 3.9 | null | null |
RHSA-2023:2097 | Red Hat Security Advisory: Satellite 6.13 Release | jackson-databind: Possible DoS if using JDK serialization to serialize JsonNode SnakeYaml: Constructor Deserialization Remote Code Execution rubygem-actionpack: Possible cross-site scripting vulnerability in Action Pack rubygem-loofah: inefficient regular expression leading to denial of service rubygem-loofah: Improper neutralization of data URIs leading to Cross Site Scripting rubygem-loofah: Uncontrolled Recursion leading to denial of service rubygem-rails-html-sanitizer: Inefficient Regular Expression leading to denial of service rubygem-rails-html-sanitizer: Improper neutralization of data URIs leading to Cross site scripting rubygem-rails-html-sanitizer: Cross site scripting vulnerability with certain configurations rubygem-rails-html-sanitizer: Cross site scripting vulnerability with certain configurations snakeyaml: Denial of Service due to missing nested depth limitation for collections tfm-rubygem-actionview: Possible cross-site scripting vulnerability in Action View tag helpers rubygem-tzinfo: arbitrary code execution activerecord: Possible RCE escalation bug with Serialized Columns in Active Record apache-commons-configuration: Apache Commons Configuration insecure interpolation defaults snakeyaml: Uncaught exception in org.yaml.snakeyaml.composer.Composer.composeSequenceNode snakeyaml: Uncaught exception in org.yaml.snakeyaml.constructor.BaseConstructor.constructObject snakeyaml: Uncaught exception in java.base/java.util.regex.Pattern$Ques.match snakeyaml: Uncaught exception in java.base/java.util.ArrayList.hashCode python-django: Potential denial-of-service vulnerability in internationalized URLs postgresql-jdbc: Information leak of prepared statement data due to insecure temporary file permissions jackson-databind: deep wrapper array nesting wrt UNWRAP_SINGLE_VALUE_ARRAYS jackson-databind: use of deeply nested arrays apache-commons-text: variable interpolation RCE python-django: Potential denial-of-service via Accept-Language headers python-django: Potential denial-of-service vulnerability in file uploads | [
"cpe:/a:redhat:satellite:6.13::el8",
"cpe:/a:redhat:satellite_capsule:6.13::el8",
"cpe:/a:redhat:satellite_maintenance:6.13::el8",
"cpe:/a:redhat:satellite_utils:6.13::el8"
] | null | 7.5 | null | null |
RHSA-2003:249 | Red Hat Security Advisory: glibc security update | security flaw | [
"cpe:/o:redhat:enterprise_linux:2.1::as",
"cpe:/o:redhat:enterprise_linux:2.1::aw",
"cpe:/o:redhat:enterprise_linux:2.1::es",
"cpe:/o:redhat:enterprise_linux:2.1::ws"
] | null | null | null | null |
RHBA-2024:3983 | Red Hat Bug Fix Advisory: kernel bug fix update | kernel: hwmon: (coretemp) Fix out-of-bounds memory access | [
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::crb",
"cpe:/a:redhat:enterprise_linux:9::nfv",
"cpe:/a:redhat:enterprise_linux:9::realtime",
"cpe:/o:redhat:enterprise_linux:9::baseos"
] | null | 6 | null | null |
RHBA-2024:2274 | Red Hat Bug Fix Advisory: git-lfs bug fix and enhancement update | golang: net/http: insufficient sanitization of Host header | [
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 6.5 | null | null |
RHSA-2023:2444 | Red Hat Security Advisory: net-snmp security and bug fix update | net-snmp: NULL Pointer Exception when handling ipDefaultTTL net-snmp: NULL Pointer Exception when handling pv6IpForwarding | [
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 6.5 | null | null |
RHSA-2009:1650 | Red Hat Security Advisory: JBoss Enterprise Application Platform 4.2.0.CP08 update | xml-security-1.3.0-1jpp.ep1.*: XMLDsig HMAC-based signatures spoofing and authentication bypass jbossas JMX-Console cross-site-scripting in filter parameter JBoss Application Server Web Console XSS JDK: XML parsing Denial-Of-Service (6845701) JBoss EAP Twiddle logs the JMX password | [
"cpe:/a:redhat:jboss_enterprise_application_platform:4.2.0::el5"
] | null | null | null | null |
RHSA-2009:1462 | Red Hat Security Advisory: httpd22 security update | apr-util: Integer overflows in memory pool (apr) and relocatable memory (apr-util) management | [
"cpe:/a:redhat:jboss_enterprise_web_server:1::el4"
] | null | null | null | null |
RHSA-2004:106 | Red Hat Security Advisory: kernel security update | security flaw security flaw security flaw security flaw security flaw security flaw | [
"cpe:/o:redhat:enterprise_linux:2.1::as",
"cpe:/o:redhat:enterprise_linux:2.1::aw"
] | null | null | null | null |
RHSA-2022:0513 | Red Hat Security Advisory: firefox security update | Mozilla: Extensions could have bypassed permission confirmation during update Mozilla: Drag and dropping an image could have resulted in the dropped object being an executable Mozilla: Sandboxed iframes could have executed script if the parent appended elements Mozilla: Cross-Origin responses could be distinguished between script and non-script content-types Mozilla: frame-ancestors Content Security Policy directive was not enforced for framed extension pages Mozilla: Script Execution during invalid object state Mozilla: Memory safety bugs fixed in Firefox 97 and Firefox ESR 91.6 | [
"cpe:/a:redhat:rhel_e4s:8.1::appstream"
] | null | 8.8 | null | null |
RHSA-2017:1865 | Red Hat Security Advisory: X.org X11 libraries security, bug fix and enhancement update | libXpm: Out-of-bounds write in XPM extension parsing libXdmcp: weak entropy usage for session keys libICE: weak entropy usage in session keys | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 5.2 | null |
RHSA-2022:8431 | Red Hat Security Advisory: podman security, bug fix, and enhancement update | podman: possible information disclosure and modification buildah: possible information disclosure and modification | [
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 7.1 | null | null |
RHSA-2018:1347 | Red Hat Security Advisory: kernel security update | Kernel: KVM: error in exception handling leads to wrong debug stack value Kernel: error in exception handling leads to DoS kernel: ptrace() incorrect error handling leads to corruption and DoS | [
"cpe:/o:redhat:rhel_aus:7.2::server",
"cpe:/o:redhat:rhel_e4s:7.2::server",
"cpe:/o:redhat:rhel_tus:7.2::server"
] | null | null | 7.8 | null |
RHSA-2020:1208 | Red Hat Security Advisory: qemu-kvm security update | QEMU: Slirp: potential OOB access due to unsafe snprintf() usages | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 5.6 | null | null |
RHSA-2018:0350 | Red Hat Security Advisory: gcab security update | gcab: Extracting malformed .cab files causes stack smashing potentially leading to arbitrary code execution | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 5.3 | null |
RHSA-2024:6220 | Red Hat Security Advisory: python39:3.9 security update | pypa/setuptools: Remote code execution via download functions in the package_index module in pypa/setuptools | [
"cpe:/a:redhat:rhel_aus:8.6::appstream",
"cpe:/a:redhat:rhel_e4s:8.6::appstream",
"cpe:/a:redhat:rhel_tus:8.6::appstream"
] | null | 8.8 | null | null |
RHSA-2010:0427 | Red Hat Security Advisory: postgresql security update | postgresql: SQL privilege escalation via modifications to session-local state postgresql: substring() negative length argument buffer overflow postgresql: Integer overflow in hash table size calculation PostgreSQL: PL/Perl Intended restriction bypass PostgreSQL: PL/Tcl Intended restriction bypass | [
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws"
] | null | null | null | null |
RHSA-2024:0436 | Red Hat Security Advisory: libcap security update | libcap: Integer Overflow in _libcap_strdup() | [
"cpe:/a:redhat:rhel_eus:9.0::appstream",
"cpe:/o:redhat:rhel_eus:9.0::baseos"
] | null | 7.8 | null | null |
RHSA-2024:8031 | Red Hat Security Advisory: firefox security update | firefox: Use-after-free in Animation timeline (128.3.1 ESR Chemspill) | [
"cpe:/a:redhat:rhel_eus:9.2::appstream"
] | null | 9.8 | null | null |
RHSA-2024:11027 | Red Hat Security Advisory: ruby:2.5 security update | rexml: REXML ReDoS vulnerability | [
"cpe:/a:redhat:rhel_aus:8.2::appstream"
] | null | 7.5 | null | null |
RHSA-2011:1439 | Red Hat Security Advisory: thunderbird security update | Mozilla: Security problem with loadSubScript on 1.9.2 branch (MFSA 2011-46) Mozilla: Universal XSS likely with MultiByte charset (MFSA 2011-47) Mozilla: crash while profiling page with many functions (MFSA 2011-49) | [
"cpe:/o:redhat:enterprise_linux:6::server"
] | null | null | null | null |
RHSA-2023:4331 | Red Hat Security Advisory: nodejs security, bug fix, and enhancement update | nodejs: mainModule.proto bypass experimental policy mechanism nodejs: process interuption due to invalid Public Key information in x509 certificates nodejs: HTTP Request Smuggling via Empty headers separated by CR nodejs: DiffieHellman do not generate keys after setting a private key | [
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 7.5 | null | null |
RHSA-2024:0941 | Red Hat Security Advisory: OpenShift Container Platform 4.14.14 bug fix and security update | golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487) | [
"cpe:/a:redhat:openshift:4.14::el8",
"cpe:/a:redhat:openshift:4.14::el9"
] | null | 7.5 | null | null |
RHBA-2019:0885 | Red Hat Bug Fix Advisory: Red Hat Ansible Tower 3.4.3-4 - Container | Tower: credentials leaked through environment variables | [
"cpe:/a:redhat:ansible_tower:3.4::el7"
] | null | null | 7.2 | null |
RHSA-2015:1242 | Red Hat Security Advisory: java-1.7.0-oracle security update | OpenJDK: deserialization issue in ObjectInputStream.readSerialData() (Libraries, 8076401) JDK: unspecified vulnerability fixed in 7u85 (Hotspot) OpenJDK: non-constant time comparisons in crypto code (JCE, 8074865) JCE: missing EC parameter validation in ECDH_Derive() (OpenJDK JCE, 8075833) JDK: unspecified vulnerability fixed in 7u85 and 8u51 (2D) OpenJDK: incorrect code permission checks in RMIConnectionImpl (JMX, 8075853) OpenJDK: name for reverse DNS lookup used in certificate identity check (JSSE, 8067694) JDK: unspecified vulnerability fixed in 6u101, 7u85 and 8u51 (Install) OpenJDK: IIOPInputStream type confusion vulnerability (CORBA, 8076376) ICU: integer overflow in LETableReference verifyLength() (OpenJDK 2D, 8077520) JDK: unspecified vulnerability fixed in 6u101, 7u85 and 8u51 (2D) JDK: unspecified vulnerability fixed in 6u101, 7u85 and 8u51 (2D) JDK: unspecified vulnerability fixed in 6u101, 7u85 and 8u51 (Deployment) SSL/TLS: "Invariance Weakness" vulnerability in RC4 stream cipher LOGJAM: TLS connections which support export grade DHE key-exchange are vulnerable to MITM attacks JDK: unspecified vulnerability fixed in 7u85 and 8u51 (Deployment) OpenJDK: improper permission checks in MBeanServerInvocationHandler (JMX, 8076397) OpenJDK: insufficient context checks during object deserialization (Libraries, 8076405) OpenJDK: RemoteObjectInvocationHandler allows calling finalize() (RMI, 8076409) JDK: unspecified vulnerability fixed in 7u85 and 8u51 (Deployment) OpenJDK: incorrect OCSP nextUpdate checking (Libraries, 8075374) OpenJDK: DnsClient fails to release request information after error (JNDI, 8075378) ICU: missing boundary checks in layout engine (OpenJDK 2D, 8071715) | [
"cpe:/a:redhat:rhel_extras_oracle_java:5",
"cpe:/a:redhat:rhel_extras_oracle_java:6",
"cpe:/a:redhat:rhel_extras_oracle_java:7"
] | null | null | 3.7 | null |
RHSA-2022:0308 | Red Hat Security Advisory: OpenShift Container Storage 3.11.z security and bug fix update | golang: crypto/elliptic: incorrect operations on the P-224 curve golang: net/http: panic in ReadRequest and ReadResponse when reading a very large header | [
"cpe:/a:redhat:storage:3.5:server:el7",
"cpe:/a:redhat:storage:3:client:el7"
] | null | 5.9 | null | null |
RHSA-2008:0364 | Red Hat Security Advisory: mysql security and bug fix update | Mysql log file obfuscation MySQL improper permission revocation mysql improper suid argument evaluation mysql: daemon crash via EXPLAIN on queries on information schema Single MySQL worker can be crashed (NULL deref) with certain SELECT statements mysql: DoS via statement with crafted IF clause mysql DROP privilege not enforced when renaming tables mysql SECURITY INVOKER functions do not drop privileges New release of MySQL fixes security bugs New release of MySQL fixes security bugs | [
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2023:1809 | Red Hat Security Advisory: thunderbird security update | Thunderbird: Revocation status of S/Mime recipient certificates was not checked Mozilla: Memory Corruption in Safe Browsing Code Mozilla: libwebp: Double-free in libwebp Mozilla: Matrix SDK bundled with Thunderbird vulnerable to denial-of-service attack Thunderbird: Hang when processing certain OpenPGP messages Mozilla: Fullscreen notification obscured Mozilla: Potential Memory Corruption following Garbage Collector compaction Mozilla: Invalid free from JavaScript code Mozilla: Content-Disposition filename truncation leads to Reflected File Download Mozilla: Files with malicious extensions could have been downloaded unsafely on Linux Mozilla: Incorrect optimization result on ARM64 Mozilla: Memory safety bugs fixed in Firefox 112 and Firefox ESR 102.10 | [
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 8.8 | null | null |
RHSA-2023:3491 | Red Hat Security Advisory: Red Hat Virtualization Host 4.4.z SP 1 security update | kernel: use-after-free caused by l2cap_reassemble_sdu() in net/bluetooth/l2cap_core.c kernel: stack overflow in do_proc_dointvec and proc_skip_spaces samba: RC4/HMAC-MD5 NetLogon Secure Channel is weak and should be avoided kernel: mm/mremap.c use-after-free vulnerability kernel: net/ulp: use-after-free in listening ULP sockets openvswitch: ip proto 0 triggers incorrect handling | [
"cpe:/o:redhat:rhev_hypervisor:4.4::el8"
] | null | 8.2 | null | null |
RHSA-2023:4780 | Red Hat Security Advisory: Red Hat OpenShift support for Windows Containers 6.0.2 security update | kubernetes: Insufficient input sanitization on Windows nodes leads to privilege escalation kubernetes: Insufficient input sanitization on Windows nodes leads to privilege escalation | [
"cpe:/a:redhat:openshift:4.11::el8"
] | null | 8.8 | null | null |
RHSA-2024:3581 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 8.0.2 Security update | eap-galleon: custom provisioning creates unsecured http-invoker EAP: OIDC app attempting to access the second tenant, the user should be prompted to log jberet: jberet-core logging database credentials EAP: wildfly-elytron has a SSRF security issue | [
"cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el9"
] | null | 7.3 | null | null |
RHSA-2021:4364 | Red Hat Security Advisory: binutils security update | binutils: Heap-based buffer overflow in bfd_getl_signed_32() in libbfd.c because sh_entsize is not validated in _bfd_elf_slurp_secondary_reloc_section() in elf.c binutils: Excessive debug section size can cause excessive memory consumption in bfd's dwarf2.c read_section() binutils: Race window allows users to own arbitrary files binutils: Heap-based buffer overflow in _bfd_elf_slurp_secondary_reloc_section in elf.c | [
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 4.7 | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.