id
stringlengths 13
15
| title
stringlengths 29
176
| description
stringlengths 8
32.1k
| cpes
sequencelengths 0
20
| cvss_v4_0
null | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
null |
---|---|---|---|---|---|---|---|
RHSA-2024:9678 | Red Hat Security Advisory: squid security update | squid: Denial of Service processing ESI response content | [
"cpe:/a:redhat:rhel_eus:9.4::appstream"
] | null | 7.5 | null | null |
RHSA-2022:1599 | Red Hat Security Advisory: convert2rhel security update | convert2rhel: Red Hat account password passed via command line by code | [
"cpe:/a:redhat:convert2rhel::el8"
] | null | 6.5 | null | null |
RHSA-2017:1842 | Red Hat Security Advisory: kernel security, bug fix, and enhancement update | Kernel: fs: VFS denial of service Kernel: fs: umount denial of service kernel: ext4 filesystem page fault race condition with fallocate call. kernel: crypto: GPF in lrw_crypt caused by null-deref kernel: Overflowing kernel mount table using shared bind mount kernel: Stack corruption while reading /proc/keys when gcc stack protector is enabled kernel: Setting a POSIX ACL via setxattr doesn't clear the setgid bit kernel: a BUG() statement can be hit in net/ipv4/tcp_input.c kernel: Use after free in SCSI generic device interface Kernel: kvm: nVMX: uncaught software exceptions in L1 guest leads to DoS kernel: security: The built-in keyrings for security tokens can be joined as a session and then modified by the root user kernel: Memory leaks in xfs_attr_list.c error paths kernel: netlink: double-free in netlink_dump kernel: Use after free in SCSI generic device interface (CVE-2016-9576 regression) kernel: Kernel crash by spawning mcrypt(alg) with incompatible algorithm kernel: l2tp: Race condition in the L2TPv3 IP encapsulation feature kernel: race condition between direct and memory-mapped I/O in fs/xfs/xfs_aops.c Kernel: kvm: use after free in complete_emulated_mmio Kernel: kvm: page reference leakage in handle_vmon kernel: Null pointer dereference in search_keyring kernel: ping socket / AF_LLC connect() sin_family race kernel: S_ISGD is not cleared when setting posix ACLs in tmpfs (CVE-2016-7097 incomplete fix) kernel: ipv4: Invalid IP options could cause skb->dst drop kernel: Race condition between multiple sys_perf_event_open() calls kernel: NULL pointer dereference in keyring_search_aux function kernel: scsi: Stack-based buffer overflow in sg_ioctl function kernel: ext4: power failure during write(2) causes on-disk information leak kernel: Incorrect error handling in the set_mempolicy and mbind compat syscalls in mm/mempolicy.c kernel: mm subsystem does not properly enforce the CONFIG_STRICT_DEVMEM protection mechanism kernel: NFSv4 server does not properly validate layout type when processing NFSv4 pNFS LAYOUTGET operand kernel: Double free in the inet_csk_clone_lock function in net/ipv4/inet_connection_sock.c kernel: net: IPv6 fragmentation implementation of nexthdr field may be associated with an invalid option kernel: net: sctp_v6_create_accept_sk function mishandles inheritance kernel: net: IPv6 DCCP implementation mishandles inheritance kernel: net: tcp_v6_syn_recv_sock function mishandles inheritance kernel: Incorrect overwrite check in __ip6_append_data() kernel: load_elf_ binary() does not take account of the need to allocate sufficient space for the entire binary kernel: Incorrectly mapped contents of PIE executable | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 2.9 | null |
RHSA-2019:1487 | Red Hat Security Advisory: kernel-rt security and bug fix update | kernel: race condition in snd_seq_write() may lead to UAF or OOB-access kernel: Race condition in sound system can lead to denial of service Kernel: tcp: integer overflow while processing SACK blocks allows remote denial of service Kernel: tcp: excessive resource consumption while processing SACK blocks allows remote denial of service kernel: tcp: excessive resource consumption for TCP connections with low MSS allows remote denial of service | [
"cpe:/a:redhat:enterprise_mrg:2:server:el6"
] | null | null | 5.3 | null |
RHSA-2024:7421 | Red Hat Security Advisory: python-gevent security update | python-gevent: privilege escalation via a crafted script to the WSGIServer component | [
"cpe:/a:redhat:rhel_aus:8.6::appstream",
"cpe:/a:redhat:rhel_e4s:8.6::appstream",
"cpe:/a:redhat:rhel_tus:8.6::appstream"
] | null | 9.1 | null | null |
RHSA-2023:0932 | Red Hat Security Advisory: Logging Subsystem 5.6.3 - Red Hat OpenShift | express: "qs" prototype poisoning causes the hang of the node process golang: net/http: excessive memory growth in a Go server accepting HTTP/2 requests | [
"cpe:/a:redhat:logging:5.6::el8"
] | null | 5.3 | null | null |
RHSA-2022:0440 | Red Hat Security Advisory: aide security update | aide: heap-based buffer overflow on outputs larger than B64_BUF | [
"cpe:/a:redhat:rhel_eus:8.4::appstream"
] | null | 7.5 | null | null |
RHSA-2014:0842 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 6.2.4 security update | Tomcat/JBossWeb: Limited DoS in chunked transfer encoding input filter Tomcat/JBossWeb: XXE vulnerability via user supplied XSLTs Tomcat/JBossWeb: Request smuggling via malicious content length header Tomcat/JBossWeb: XML parser hijack by malicious web application | [
"cpe:/a:redhat:jboss_enterprise_application_platform:6.2.4"
] | null | null | null | null |
RHBA-2020:0390 | Red Hat Bug Fix Advisory: OpenShift Container Platform 4.3.1 packages update | golang: invalid public key causes panic in dsa.Verify QEMU: slirp: OOB buffer access while emulating tcp protocols in tcp_emu() QEMU: Slirp: potential directory traversal using relative paths via tftp server on Windows host | [
"cpe:/a:redhat:openshift:4.3::el7",
"cpe:/a:redhat:openshift:4.3::el8"
] | null | 3.8 | null | null |
RHSA-2023:7488 | Red Hat Security Advisory: Red Hat Single Sign-On 7.6.6 security update | keycloak: impersonation and lockout possible through incorrect handling of email trust bouncycastle: potential blind LDAP injection attack using a self-signed certificate HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack) | [
"cpe:/a:redhat:red_hat_single_sign_on:7.6.6"
] | null | 7.5 | null | null |
RHSA-2017:1216 | Red Hat Security Advisory: java-1.7.1-ibm security update | JDK: buffer overflow vulnerability in the IBM JVM JDK: insecure use of invoke method in CORBA component, incorrect CVE-2013-3009 fix JDK: insecure deserialization in CORBA, incorrect CVE-2013-5456 fix OpenJDK: insufficient thread consistency checks in ObjectInputStream (Serialization, 8129952) OpenJDK: insufficient byte type checks (Hotspot, 8132051) SSL/TLS: Birthday attack against 64-bit block ciphers (SWEET32) JDK: unspecified vulnerability fixed in 6u115, 7u101 and 8u91 (2D) OpenJDK: non-constant time GCM authentication tag comparison (JCE, 8143945) OpenJDK: unrestricted deserialization of authentication credentials (JMX, 8144430) JDK: unspecified vulnerability fixed in 6u115, 7u101 and 8u91 (2D) JDK: unspecified vulnerability fixed in 6u115, 7u101 and 8u91 (Deployment) JDK: unspecified vulnerability fixed in 7u111 and 8u101 (Deployment) OpenJDK: incorrect handling of MethodHandles.dropArguments() argument (Libraries, 8155985) OpenJDK: missing algorithm restrictions for jar verification (Libraries, 8155973) OpenJDK: incorrect ECDSA signature extraction from the DER input (Libraries, 8168714) OpenJDK: missing ObjectIdentifier length check (Libraries, 8168705) OpenJDK: DSA implementation timing attack (Libraries, 8168728) OpenJDK: ECDSA implementation timing attack (Libraries, 8168724) OpenJDK: incorrect URL parsing in URLStreamHandler (Networking, 8167223) OpenJDK: insufficient classloader consistency checks in ClassLoaderWithRepository (JMX, 8157739) JDK: unspecified vulnerability fixed in 6u131, 7u121, and 8u111 (2D) OpenJDK: insufficient checks of JDWP packets (Hotspot, 8159519) OpenJDK: exposure of server authentication credentials to proxy (Networking, 8160838) OpenJDK: URLClassLoader insufficient access control checks (Networking, 8151934) OpenJDK: untrusted input deserialization in RMI registry and DCG (RMI, 8156802) OpenJDK: LdapLoginModule incorrect userDN extraction (JAAS, 8161743) OpenJDK: imageio PNGImageReader failed to honor ignoreMetadata for iTXt and zTXt chunks (2D, 8166988) JDK: unspecified vulnerability fixed in 6u141, 7u131, and 8u121 (Deployment) OpenJDK: integer overflow in SocketOutputStream boundary check (Networking, 8164147) OpenJDK: insufficient protected field access checks in atomic field updaters (Libraries, 8165344) OpenJDK: insecure class construction (Hotspot, 8167104) | [
"cpe:/a:redhat:network_satellite:5.6::el6",
"cpe:/a:redhat:network_satellite:5.7::el6"
] | null | null | 8.8 | null |
RHSA-2018:3816 | Red Hat Security Advisory: CloudForms 4.6.6 security, bug fix and enhancement update | postgresql: pg_upgrade creates file of sensitive metadata under prevailing umask postgresql: Uncontrolled search path element in pg_dump and other client applications postgresql: Certain host connection parameters defeat client-side security defenses postgresql: Missing authorization and memory disclosure in INSERT ... ON CONFLICT DO UPDATE statements | [
"cpe:/a:redhat:cloudforms_managementengine:5.9::el7"
] | null | null | 7.1 | null |
RHSA-2018:1575 | Red Hat Security Advisory: Red Hat JBoss Data Grid 7.2 security update | slf4j: Deserialisation vulnerability in EventData constructor can allow for arbitrary code execution | [
"cpe:/a:redhat:jboss_data_grid:7.2"
] | null | null | 8.1 | null |
RHSA-2011:1422 | Red Hat Security Advisory: openswan security update | openswan: use-after-free vulnerability leads to DoS | [
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::server",
"cpe:/o:redhat:enterprise_linux:6::server"
] | null | null | null | null |
RHSA-2015:0249 | Red Hat Security Advisory: samba3x security update | samba: talloc free on uninitialized stack pointer in netlogon server could lead to remote-code execution | [
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2009:1101 | Red Hat Security Advisory: cscope security update | cscope: multiple buffer overflows cscope: multiple buffer overflows cscope: multiple buffer overflows cscope: putstring buffer overflow | [
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws",
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2020:4183 | Red Hat Security Advisory: bind security update | bind: truncated TSIG response can lead to an assertion failure | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | 6.5 | null | null |
RHSA-2010:0178 | Red Hat Security Advisory: Red Hat Enterprise Linux 5.5 kernel security and bug fix update | kernel: mac80211: fix spurious delBA handling kernel: ext4: avoid divide by zero when trying to mount a corrupted file system kernel: bug in GFS/GFS2 locking code leads to dos kernel: ipv6: skb is unexpectedly freed | [
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2022:8917 | Red Hat Security Advisory: Red Hat JBoss Web Server 5.7.1 release and security update | openssl: c_rehash script allows command injection openssl: the c_rehash script allows command injection | [
"cpe:/a:redhat:jboss_enterprise_web_server:5.7::el7",
"cpe:/a:redhat:jboss_enterprise_web_server:5.7::el8",
"cpe:/a:redhat:jboss_enterprise_web_server:5.7::el9"
] | null | 6.7 | null | null |
RHSA-2023:4072 | Red Hat Security Advisory: firefox security update | Mozilla: Use-after-free in WebRTC certificate generation Mozilla: Potential use-after-free from compartment mismatch in SpiderMonkey Mozilla: Fullscreen notification obscured Mozilla: Lack of warning when opening Diagcab files Mozilla: Memory safety bugs fixed in Firefox 115, Firefox ESR 102.13, and Thunderbird 102.13 | [
"cpe:/a:redhat:rhel_e4s:8.1::appstream"
] | null | 8.8 | null | null |
RHSA-2018:0057 | Red Hat Security Advisory: qemu-kvm-rhev security update | An update for qemu-kvm-rhev is now available for Red Hat OpenStack Platform 9.0 (Mitaka).
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. | [
"cpe:/a:redhat:openstack:9::el7"
] | null | null | null | null |
RHSA-2024:11146 | Red Hat Security Advisory: Red Hat Ansible Automation Platform 2.5 Container Release Update | django: Potential denial-of-service in django.utils.html.strip_tags() django: Potential SQL injection in HasKey(lhs, rhs) on Oracle | [
"cpe:/a:redhat:ansible_automation_platform:2.5::el8",
"cpe:/a:redhat:ansible_automation_platform:2.5::el9",
"cpe:/a:redhat:ansible_automation_platform_cloud_billing:2.5::el8"
] | null | 9.1 | null | null |
RHSA-2016:2593 | Red Hat Security Advisory: sudo security, bug fix, and enhancement update | sudo: Possible info leak via INPUTRC | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | null | null |
RHSA-2024:5261 | Red Hat Security Advisory: kernel security update | kernel: use after free in unix_stream_sendpage kernel: net: kernel: UAF in network route management | [
"cpe:/o:redhat:rhel_aus:7.7::server"
] | null | 7.8 | null | null |
RHSA-2023:1816 | Red Hat Security Advisory: Red Hat OpenShift Data Foundation 4.12.2 Bug Fix and security update | golang: net/http: excessive memory growth in a Go server accepting HTTP/2 requests | [
"cpe:/a:redhat:openshift_data_foundation:4.12::el8"
] | null | 5.3 | null | null |
RHSA-2023:7263 | Red Hat Security Advisory: open-vm-tools security update | open-vm-tools: SAML token signature bypass open-vm-tools: file descriptor hijack vulnerability in the vmware-user-suid-wrapper | [
"cpe:/a:redhat:rhel_eus:8.6::appstream"
] | null | 7.4 | null | null |
RHSA-2013:1006 | Red Hat Security Advisory: Red Hat JBoss BRMS 5.3.1 update | apache-cxf: XML encryption backwards compatibility attacks jakarta-commons-httpclient: missing connection hostname check against X.509 certificate name tomcat: three DIGEST authentication implementation issues tomcat: three DIGEST authentication implementation issues tomcat: three DIGEST authentication implementation issues | [
"cpe:/a:redhat:jboss_enterprise_brms_platform:5.3"
] | null | null | 3.7 | null |
RHSA-2017:1802 | Red Hat Security Advisory: Red Hat JBoss Web Server Service Pack 1 security update | openssl: OCSP Status Request extension unbounded memory growth openssl: ECDSA P-256 timing attack key recovery SSL/TLS: Malformed plain-text ALERT packets could cause remote DoS log4j: Socket receiver deserialization vulnerability tomcat: Incorrect handling of pipelined requests when send file was used tomcat: Calls to application listeners did not use the appropriate facade object tomcat: Security constrained bypass in error page mechanism tomcat: Vary header not added by CORS filter leading to cache poisoning log4j: deserialization of untrusted data in SocketServer | [
"cpe:/a:redhat:jboss_enterprise_web_server:3.1"
] | null | 9.8 | 5.9 | null |
RHSA-2019:1946 | Red Hat Security Advisory: kernel security, bug fix, and enhancement update | Kernel: kvm: nVMX: L2 guest could access hardware(L0) CR8 register kernel: net: double-free and memory corruption in get_net_ns_by_id() kernel: dereferencing NULL payload with nonzero length Kernel: speculative bounds check bypass store kernel: stack-based buffer overflow in chap_server_compute_md5() in iscsi target | [
"cpe:/o:redhat:rhel_eus:7.4::computenode",
"cpe:/o:redhat:rhel_eus:7.4::server"
] | null | null | 7 | null |
RHSA-2024:0253 | Red Hat Security Advisory: sqlite security update | sqlite: heap-buffer-overflow at sessionfuzz | [
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 7.3 | null | null |
RHSA-2024:0043 | Red Hat Security Advisory: Red Hat build of MicroShift 4.16.0 security update | kubernetes: kube-apiserver: bypassing mountable secrets policy imposed by the ServiceAccount admission plugin golang-protobuf: encoding/protojson, internal/encoding/json: infinite loop in protojson.Unmarshal when unmarshaling certain forms of invalid JSON | [
"cpe:/a:redhat:openshift:4.16::el9"
] | null | 5.9 | null | null |
RHSA-2017:0484 | Red Hat Security Advisory: Red Hat Gluster Storage 3.2.0 security, bug fix, and enhancement update | glusterfs: glusterfs-server %pretrans rpm script temporary file issue | [
"cpe:/a:redhat:storage:3.2:server:el6",
"cpe:/a:redhat:storage:3:client:el6"
] | null | null | 4.8 | null |
RHSA-2024:6754 | Red Hat Security Advisory: expat security update | libexpat: Negative Length Parsing Vulnerability in libexpat libexpat: Integer Overflow or Wraparound libexpat: integer overflow | [
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/o:redhat:enterprise_linux:9::baseos"
] | null | 6.2 | null | null |
RHSA-2024:2727 | Red Hat Security Advisory: Red Hat OpenStack Platform 17.1 (python-gunicorn) security update | python-gunicorn: HTTP Request Smuggling due to improper validation of Transfer-Encoding headers | [
"cpe:/a:redhat:openstack:17.1::el9"
] | null | null | 7.5 | null |
RHSA-2024:2912 | Red Hat Security Advisory: thunderbird security update | Mozilla: Arbitrary JavaScript execution in PDF.js Mozilla: IndexedDB files retained in private browsing mode Mozilla: Potential permissions request bypass via clickjacking Mozilla: Cross-origin responses could be distinguished between script and non-script content-types Mozilla: Use-after-free could occur when printing to PDF Mozilla: Memory safety bugs fixed in Firefox 126, Firefox ESR 115.11, and Thunderbird 115.11 | [
"cpe:/a:redhat:rhel_eus:8.6::appstream"
] | null | 6.1 | null | null |
RHSA-2022:0310 | Red Hat Security Advisory: java-1.7.1-ibm security update | OpenJDK: Excessive memory allocation in RTFParser (Swing, 8265167) OpenJDK: Excessive memory allocation in RTFReader (Swing, 8265580) OpenJDK: Certificates with end dates too far in the future can corrupt keystore (Keytool, 8266137) OpenJDK: Loop in HttpsServer triggered during TLS session close (JSSE, 8254967) OpenJDK: Excessive memory allocation in BMPImageReader (ImageIO, 8267735) JDK: IllegalAccessError exception not thrown for MethodHandles that invoke inaccessible interface methods | [
"cpe:/a:redhat:rhel_extras:7"
] | null | 5.3 | null | null |
RHSA-2023:6268 | Red Hat Security Advisory: squid security update | squid: Request/Response smuggling in HTTP/1.1 and ICAP squid: Denial of Service in HTTP Digest Authentication squid: denial of Service in FTP | [
"cpe:/a:redhat:rhel_eus:9.0::appstream"
] | null | 8.6 | null | null |
RHSA-2021:0637 | Red Hat Security Advisory: OpenShift Container Platform 3.11.394 bug fix and security update | ant: insecure temporary file vulnerability jenkins-2-plugins/subversion: XML parser is not preventing XML external entity (XXE) attacks jenkins-2-plugins/mercurial: XML parser is not preventing XML external entity (XXE) attacks jenkins-2-plugins/mercurial: Missing permission check in an HTTP endpoint could result in information disclosure jenkins-2-plugins/kubernetes: Jenkins controller environment variables are accessible in Kubernetes Plugin jenkins-2-plugins/kubernetes: Missing permission check in Kubernetes Plugin allows listing pod templates jenkins-2-plugins/kubernetes: Missing permission check in Kubernetes Plugin allows enumerating credentials IDs ant: insecure temporary file python-rsa: bleichenbacher timing oracle attack against RSA decryption jenkins: Arbitrary file read vulnerability in workspace browsers jenkins: XSS vulnerability in notification bar jenkins: Improper handling of REST API XML deserialization errors jenkins: Path traversal vulnerability in agent names jenkins: Arbitrary file existence check in file fingerprints jenkins: Excessive memory allocation in graph URLs leads to denial of service jenkins: Stored XSS vulnerability in button labels jenkins: Missing permission check for paths with specific prefix jenkins: Reflected XSS vulnerability in markup formatter preview jenkins: Stored XSS vulnerability on new item page | [
"cpe:/a:redhat:openshift:3.11::el7"
] | null | 5.4 | null | null |
RHSA-2016:2064 | Red Hat Security Advisory: atomic-openshift security update | 3: API server does not validate client-provided intermediate certificates correctly | [
"cpe:/a:redhat:openshift:3.1::el7",
"cpe:/a:redhat:openshift:3.2::el7",
"cpe:/a:redhat:openshift:3.3::el7"
] | null | null | 7.5 | null |
RHSA-2017:3141 | Red Hat Security Advisory: rhvm-appliance security, bug fix, and enhancement update | jasypt: Vulnerable to timing attack against the password hash comparison jackson-databind: Deserialization vulnerability via readValue method of ObjectMapper hibernate-validator: Privilege escalation when running under the security manager | [
"cpe:/o:redhat:enterprise_linux:7::hypervisor"
] | null | null | 6.3 | null |
RHSA-2021:0428 | Red Hat Security Advisory: OpenShift Container Platform 4.5.33 bug fix and security update | openshift/builder: privilege escalation during container image builds via mounted secrets | [
"cpe:/a:redhat:openshift:4.5::el7",
"cpe:/a:redhat:openshift:4.5::el8"
] | null | 8.8 | null | null |
RHSA-2020:1766 | Red Hat Security Advisory: GNOME security, bug fix, and enhancement update | LibRaw: stack-based buffer overflow in the parse_makernote function of dcraw_common.cpp gdm: lock screen bypass when timed login is enabled gvfs: mishandling of file ownership in daemon/gvfsbackendadmin.c gvfs: race condition in daemon/gvfsbackendadmin.c due to admin backend not implementing query_info_on_read/write gvfs: mishandling of file's user and group ownership in daemon/gvfsbackendadmin.c due to unavailability of root privileges | [
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb",
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | null | 4.8 | null |
RHSA-2015:1488 | Red Hat Security Advisory: java-1.7.0-ibm security update | JDK: plain text data stored in memory dumps OpenJDK: deserialization issue in ObjectInputStream.readSerialData() (Libraries, 8076401) OpenJDK: non-constant time comparisons in crypto code (JCE, 8074865) JCE: missing EC parameter validation in ECDH_Derive() (OpenJDK JCE, 8075833) JDK: unspecified vulnerability fixed in 7u85 and 8u51 (2D) OpenJDK: incorrect code permission checks in RMIConnectionImpl (JMX, 8075853) OpenJDK: name for reverse DNS lookup used in certificate identity check (JSSE, 8067694) ICU: integer overflow in LETableReference verifyLength() (OpenJDK 2D, 8077520) JDK: unspecified vulnerability fixed in 6u101, 7u85 and 8u51 (2D) JDK: unspecified vulnerability fixed in 6u101, 7u85 and 8u51 (2D) JDK: unspecified vulnerability fixed in 6u101, 7u85 and 8u51 (Deployment) LOGJAM: TLS connections which support export grade DHE key-exchange are vulnerable to MITM attacks JDK: unspecified vulnerability fixed in 7u85 and 8u51 (Deployment) OpenJDK: improper permission checks in MBeanServerInvocationHandler (JMX, 8076397) OpenJDK: insufficient context checks during object deserialization (Libraries, 8076405) OpenJDK: RemoteObjectInvocationHandler allows calling finalize() (RMI, 8076409) JDK: unspecified vulnerability fixed in 7u85 and 8u51 (Deployment) OpenJDK: incorrect OCSP nextUpdate checking (Libraries, 8075374) OpenJDK: DnsClient fails to release request information after error (JNDI, 8075378) ICU: missing boundary checks in layout engine (OpenJDK 2D, 8071715) | [
"cpe:/a:redhat:rhel_extras:5::client",
"cpe:/a:redhat:rhel_extras:5::server"
] | null | null | 3.7 | null |
RHSA-2020:3241 | Red Hat Security Advisory: firefox security update | chromium-browser: Use after free in ANGLE chromium-browser: Inappropriate implementation in WebRTC Mozilla: Potential leak of redirect targets when loading scripts in a worker Mozilla: Memory safety bugs fixed in Firefox 79 and Firefox ESR 68.11 | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 8.8 | 8.8 | null |
RHSA-2024:3497 | Red Hat Security Advisory: edk2 security update | edk2: Buffer overflow in the DHCPv6 client via a long Server ID option edk2: Buffer overflow when processing DNS Servers option in a DHCPv6 Advertise message | [
"cpe:/a:redhat:rhel_eus:8.6::appstream"
] | null | 8.8 | null | null |
RHSA-2023:2222 | Red Hat Security Advisory: conmon security and bug fix update | golang: net/http: excessive memory growth in a Go server accepting HTTP/2 requests | [
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 5.3 | null | null |
RHSA-2023:5810 | Red Hat Security Advisory: Red Hat Ansible Automation Platform 2.3 Product Security and Bug Fix Update | golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487) | [
"cpe:/a:redhat:ansible_automation_platform:2.3::el8",
"cpe:/a:redhat:ansible_automation_platform:2.3::el9",
"cpe:/a:redhat:ansible_automation_platform_developer:2.3::el8",
"cpe:/a:redhat:ansible_automation_platform_developer:2.3::el9",
"cpe:/a:redhat:ansible_automation_platform_inside:2.3::el8",
"cpe:/a:redhat:ansible_automation_platform_inside:2.3::el9"
] | null | 7.5 | null | null |
RHSA-2024:9915 | Red Hat Security Advisory: gnome-shell security update | gnome-shell: code execution in portal helper | [
"cpe:/a:redhat:rhel_eus:9.4::appstream"
] | null | 7.5 | null | null |
RHSA-2011:0262 | Red Hat Security Advisory: sendmail security and bug fix update | sendmail: incorrect verification of SSL certificate with NUL in name | [
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2015:2506 | Red Hat Security Advisory: java-1.7.1-ibm security update | OpenJDK: kerberos realm name leak (JGSS, 8048030) OpenJDK: inefficient use of hash tables and lists during XML parsing (JAXP, 8068842) OpenJDK: missing checks for proper initialization in ObjectStreamClass (Serialization, 8103671) OpenJDK: HttpURLConnection header restriction bypass (Libraries, 8130193) JDK: unspecified vulnerability fixed in 7u91 and 8u65 (Deployment) OpenJDK: insufficient permission checks in StubGenerator (CORBA, 8076383) OpenJDK: OOB access in CMS code (2D, 8086092) OpenJDK: leak of user.dir location (JAXP, 8078427) OpenJDK: java.nio Buffers integer overflow issues (Libraries, 8130891) ICU: missing boundary checks in layout engine (OpenJDK 2D, 8132042) OpenJDK: incorrect access control context used in DGCImpl (RMI, 8080688) OpenJDK: protected methods can be used as interface methods via DirectMethodHandle (Libraries) OpenJDK: incomplete constraints enforcement by AlgorithmChecker (Security, 8131291) OpenJDK: incorrect String object deserialization in IIOPInputStream (CORBA, 8076387) OpenJDK: incorrect access control context used in DGCClient (RMI, 8076413) OpenJDK: incomplete MaxXMLNameLimit enforcement (JAXP, 8086733) JDK: unspecified vulnerability fixed in 6u105, 7u91 and 8u65 (Deployment) OpenJDK: insufficient proxy class checks in RemoteObjectInvocationHandler (RMI, 8076339) JDK: local disclosure of kerberos credentials cache | [
"cpe:/a:redhat:rhel_extras:6",
"cpe:/a:redhat:rhel_extras:7"
] | null | null | null | null |
RHSA-2024:0954 | Red Hat Security Advisory: Red Hat OpenShift for Windows Containers 10.15.0 security update | kubernetes: Insufficient input sanitization in in-tree storage plugin leads to privilege escalation on Windows nodes golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487) ssh: Prefix truncation attack on Binary Packet Protocol (BPP) | [
"cpe:/a:redhat:openshift:4.15::el9"
] | null | 5.9 | null | null |
RHBA-2019:0620 | Red Hat Bug Fix Advisory: OpenShift Container Platform 3.10 bug fix update | kubernetes: Mishandling of symlinks allows for arbitrary file write via `kubectl cp` | [
"cpe:/a:redhat:openshift:3.10::el7"
] | null | null | 5.3 | null |
RHSA-2023:6615 | Red Hat Security Advisory: python-cryptography security update | python-cryptography: memory corruption via immutable objects | [
"cpe:/o:redhat:enterprise_linux:9::baseos"
] | null | 6.5 | null | null |
RHSA-2023:2866 | Red Hat Security Advisory: git-lfs security and bug fix update | golang: net/http/httputil: ReverseProxy should not forward unparseable query parameters golang: regexp/syntax: limit memory used by parsing regexps golang: net/http: excessive memory growth in a Go server accepting HTTP/2 requests | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 5.3 | null | null |
RHSA-2016:0448 | Red Hat Security Advisory: samba security update | samba: Incorrect ACL get/set allowed on symlink path | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation",
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | null | null |
RHSA-2022:8068 | Red Hat Security Advisory: bind security update | bind: DNS forwarders - cache poisoning vulnerability bind: DoS from specifically crafted TCP packets | [
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::crb"
] | null | 5.3 | null | null |
RHSA-2015:2596 | Red Hat Security Advisory: libpng security update | libpng: Buffer overflow vulnerabilities in png_get_PLTE/png_set_PLTE functions libpng: Buffer overflow vulnerabilities in png_get_PLTE/png_set_PLTE functions | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | null | null |
RHSA-2023:7510 | Red Hat Security Advisory: firefox security update | Mozilla: Out-of-bound memory access in WebGL2 blitFramebuffer Mozilla: Use-after-free in MessagePort::Entangled Mozilla: Clickjacking permission prompts using the fullscreen transition Mozilla: Use-after-free in ReadableByteStreamQueueEntry::Buffer Mozilla: Using Selection API would copy contents into X11 primary selection. Mozilla: Incorrect parsing of relative URLs starting with "///" Mozilla: Memory safety bugs fixed in Firefox 120, Firefox ESR 115.5, and Thunderbird 115.5 | [
"cpe:/a:redhat:rhel_eus:9.0::appstream"
] | null | 8.8 | null | null |
RHSA-2010:0657 | Red Hat Security Advisory: gdm security and bug fix update | gdm with xdmcp ignoring tcp_wrappers on x86_64 | [
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2015:1210 | Red Hat Security Advisory: abrt security update | abrt: default event scripts follow symbolic links abrt: default abrt event scripts lead to information disclosure abrt: abrt-hook-ccpp writes core dumps to existing files owned by others abrt: does not validate contents of uploaded problem reports abrt: missing process environment sanitizaton in abrt-action-install-debuginfo-to-abrt-cache abrt: Various race-conditions and symlink issues found in abrt | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2020:3637 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.2.9 on RHEL 6 security update | hibernate: SQL injection issue in Hibernate ORM resteasy: Improper validation of response header in MediaTypeHeaderDelegate.java class EAP: field-name is not parsed in accordance to RFC7230 Wildfly: Improper authorization issue in WildFlySecurityManager when using alternative protection domain Mojarra: Path traversal via either the loc parameter or the con parameter, incomplete fix of CVE-2018-14371 jackson-databind: Lacks certain xbean-reflect/JNDI blocking jackson-databind: Serialization gadgets in shaded-hikari-config jackson-databind: Serialization gadgets in ibatis-sqlmap jackson-databind: Serialization gadgets in anteros-core jackson-databind: mishandles the interaction between serialization gadgets and typing which could result in remote command execution jackson-databind: mishandles the interaction between serialization gadgets and typing which could result in remote command execution dom4j: XML External Entity vulnerability in default SAX parser Undertow: Incomplete fix for CVE-2017-2666 due to permitting invalid characters in HTTP requests hibernate-validator: Improper input validation in the interpolation of constraint error messages wildfly-elytron: session fixation when using FORM authentication wildfly: exposed setting of TCCL via the EmbeddedManagedProcess API wildfly: unsafe deserialization in Wildfly Enterprise Java Beans wildfly: Some EJB transaction objects may get accumulated causing Denial of Service wildfly: EJB SessionOpenInvocations may not be removed properly after a response is received causing Denial of Service | [
"cpe:/a:redhat:jboss_enterprise_application_platform:7.2::el6"
] | null | 6.5 | 4.8 | null |
RHSA-2020:1230 | Red Hat Security Advisory: skopeo security and bug fix update | proglottis/gpgme: Use-after-free in GPGME bindings during container image pull | [
"cpe:/a:redhat:rhel_extras_other:7"
] | null | 7.5 | null | null |
RHSA-2018:3671 | Red Hat Security Advisory: java-1.7.1-ibm security update | OpenJDK: Incorrect handling of unsigned attributes in signed Jar manifests (Security, 8194534) OpenJDK: Leak of sensitive header data via HTTP redirect (Networking, 8196902) OpenJDK: Incomplete enforcement of the trustURLCodebase restriction (JNDI, 8199177) OpenJDK: Improper field access checks (Hotspot, 8199226) OpenJDK: Missing endpoint identification algorithm check during TLS session resumption (JSSE, 8202613) OpenJDK: Infinite loop in RIFF format reader (Sound, 8205361) libpng: Integer overflow and resultant divide-by-zero in pngrutil.c:png_check_chunk_length() allows for denial of service | [
"cpe:/a:redhat:rhel_extras:6"
] | null | null | 6.5 | null |
RHSA-2024:10135 | Red Hat Security Advisory: Updated service-interconnect rhel9 container images for 1.4 LTS | curl: HTTP/2 push headers memory-leak openssl: Possible denial of service in X.509 name checks pypa/setuptools: Remote code execution via download functions in the package_index module in pypa/setuptools cpython: python: email module doesn't properly quotes newlines in email headers, allowing header injection glib2: Signal subscription vulnerabilities krb5: GSS message token handling krb5: GSS message token handling libexpat: Negative Length Parsing Vulnerability in libexpat libexpat: Integer Overflow or Wraparound libexpat: integer overflow | [
"cpe:/a:redhat:service_interconnect:1.4::el9"
] | null | 6.2 | null | null |
RHSA-2024:6642 | Red Hat Security Advisory: OpenShift Container Platform 4.12.65 bug fix and security update | golang: net/http, x/net/http2: unlimited number of CONTINUATION frames causes DoS bind: bind9: BIND's database will be slow if a very large number of RRs exist at the same nam bind9: bind: SIG(0) can be used to exhaust CPU resources go-retryablehttp: url might write sensitive information to log file | [
"cpe:/a:redhat:openshift:4.12::el8",
"cpe:/a:redhat:openshift:4.12::el9"
] | null | 6 | null | null |
RHSA-2020:2295 | Red Hat Security Advisory: openvswitch2.13 security, bug fix and enhancement update | dpdk: librte_vhost Integer overflow in vhost_user_set_log_base() dpdk: librte_vhost Integer truncation in vhost_user_check_and_alloc_queue_pair() dpdk: librte_vhost Missing inputs validation in Vhost-crypto dpdk: librte_vhost Malicious guest could cause segfault by sending invalid Virtio descriptor dpdk: librte_vhost VHOST_USER_GET_INFLIGHT_FD message flooding to result in a DoS | [
"cpe:/o:redhat:enterprise_linux:8::fastdatapath"
] | null | 4.4 | null | null |
RHSA-2023:6107 | Red Hat Security Advisory: Updated Kogito for Red Hat Process Automation Manager 7.13.4 SP1 Images | quarkus: HTTP security policy bypass | [
"cpe:/a:redhat:rhosemc:1.0::el8"
] | null | 8.1 | null | null |
RHSA-2023:7335 | Red Hat Security Advisory: Updated Red Hat Process Automation Manager 7.13.4 SP2 Images | HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack) | [
"cpe:/a:redhat:rhosemc:1.0::el8"
] | null | 7.5 | null | null |
RHSA-2009:0449 | Red Hat Security Advisory: firefox security update | nsTextFrame:: ClearTextRun() | [
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws",
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2014:0595 | Red Hat Security Advisory: gnutls security update | gnutls: insufficient session id length check in _gnutls_read_server_hello (GNUTLS-SA-2014-3) | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2021:1203 | Red Hat Security Advisory: Red Hat JBoss Web Server 3.1 Service Pack 12 security update | openssl: NULL pointer dereference in signature_algorithms processing openssl: CA certificate check bypass with X509_V_FLAG_X509_STRICT | [
"cpe:/a:redhat:jboss_enterprise_web_server:3.1"
] | null | 7.4 | null | null |
RHSA-2022:0236 | Red Hat Security Advisory: OpenShift Container Platform 3.11.570 security update | log4j-core: remote code execution via JDBC Appender | [
"cpe:/a:redhat:openshift:3.11::el7"
] | null | 6.6 | null | null |
RHSA-2011:0953 | Red Hat Security Advisory: system-config-firewall security update | system-config-firewall: privilege escalation flaw via use of python pickle | [
"cpe:/o:redhat:enterprise_linux:6::server"
] | null | null | null | null |
RHSA-2024:4646 | Red Hat Security Advisory: qt5-qtbase security update | qtbase: qtbase: Delay any communication until encrypted() can be responded to | [
"cpe:/a:redhat:rhel_aus:8.2::appstream"
] | null | 7.5 | null | null |
RHSA-2024:7462 | Red Hat Security Advisory: cups-filters security update | cups-filters: libcupsfilters: `cfGetPrinterAttributes` API does not perform sanitization on returned IPP attributes cups: libppd: remote command injection via attacker controlled data in PPD file cups-browsed: cups-browsed binds on UDP INADDR_ANY:631 trusting any packet from any source cups-browsed: cups-filters: cups-browsed vulnerable to DDoS amplification attack | [
"cpe:/a:redhat:rhel_eus:8.8::appstream",
"cpe:/a:redhat:rhel_eus:8.8::crb"
] | null | 7.5 | null | null |
RHSA-2021:0495 | Red Hat Security Advisory: Red Hat JBoss Web Server 5.4.1 Security Update | openssl: EDIPARTYNAME NULL pointer de-reference tomcat: Apache Tomcat HTTP/2 Request mix-up tomcat: HTTP/2 request header mix-up tomcat: Information disclosure when using NTFS file system | [
"cpe:/a:redhat:jboss_enterprise_web_server:5.4"
] | null | 5.9 | null | null |
RHSA-2024:6987 | Red Hat Security Advisory: emacs security update | emacs: Gnus treats inline MIME contents as trusted emacs: Org mode considers contents of remote files to be trusted emacs: org-link-expand-abbrev: Do not evaluate arbitrary unsafe Elisp code | [
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 7.8 | null | null |
RHBA-2022:7667 | Red Hat Bug Fix Advisory: qatzip bug fix and enhancement update | qatzip: local privilege escalation | [
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb"
] | null | 7.8 | null | null |
RHSA-2015:1681 | Red Hat Security Advisory: openstack-swift security update | Swift: unauthorized deletion of versioned Swift object | [
"cpe:/a:redhat:openstack:6::el7"
] | null | null | null | null |
RHSA-2015:2290 | Red Hat Security Advisory: pcs security, bug fix, and enhancement update | rubygem-rack: Potential Denial of Service Vulnerability in Rack normalize_params() | [
"cpe:/o:redhat:enterprise_linux:7::server"
] | null | null | null | null |
RHSA-2024:5692 | Red Hat Security Advisory: kernel security update | kernel: ipc/mqueue, msg, sem: avoid relying on a stack reference past its expiry kernel: mISDN: fix possible use-after-free in HFC_cleanup() kernel: isdn: mISDN: Fix sleeping function called from invalid context kernel: KVM: x86: nSVM: fix potential NULL derefernce on nested migration kernel: perf: Fix list corruption in perf_cgroup_switch() kernel: smb: client: fix potential OOBs in smb2_parse_contexts() kernel: net/sched: act_ct: fix skb leak and crash on ooo frags kernel: platform/x86: wmi: Fix opening of char device kernel: wifi: iwlwifi: dbg-tlv: ensure NUL termination kernel: tty: n_gsm: fix possible out-of-bounds in gsm0_receive() kernel: tcp: Use refcount_inc_not_zero() in tcp_twsk_unique(). kernel: wifi: nl80211: don't free NULL coalescing rule kernel: gfs2: Fix potential glock use-after-free on unmount | [
"cpe:/o:redhat:rhel_aus:8.6::baseos",
"cpe:/o:redhat:rhel_e4s:8.6::baseos",
"cpe:/o:redhat:rhel_tus:8.6::baseos"
] | null | 5.8 | null | null |
RHSA-2021:2360 | Red Hat Security Advisory: postgresql:9.6 security update | postgresql: Buffer overrun from integer overflow in array subscripting calculations postgresql: Memory disclosure in INSERT ... ON CONFLICT ... DO UPDATE | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 6.5 | null | null |
RHSA-2024:5160 | Red Hat Security Advisory: OpenShift Container Platform 4.15.27 security update | go-retryablehttp: url might write sensitive information to log file | [
"cpe:/a:redhat:openshift:4.15::el8",
"cpe:/a:redhat:openshift:4.15::el9"
] | null | 6 | null | null |
RHSA-2015:1579 | Red Hat Security Advisory: ceph-deploy security update | ceph-deploy: keyring permissions are world readable in ~ceph ceph-deploy admin command copies keyring file to /etc/ceph which is world readable | [
"cpe:/a:redhat:ceph_storage:1.2::ubuntu:14.04"
] | null | null | null | null |
RHSA-2012:1052 | Red Hat Security Advisory: mod_cluster security update | mod_cluster registers and exposes the root context of a server by default, despite ROOT being in the excluded-contexts list | [
"cpe:/a:redhat:jboss_enterprise_application_platform:5::el4",
"cpe:/a:redhat:jboss_enterprise_application_platform:5::el5",
"cpe:/a:redhat:jboss_enterprise_application_platform:5::el6"
] | null | null | null | null |
RHSA-2023:6837 | Red Hat Security Advisory: OpenShift Container Platform 4.14.2 bug fix and security update | golang.org/x/net/html: Cross site scripting golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487) HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack) | [
"cpe:/a:redhat:openshift:4.14::el8",
"cpe:/a:redhat:openshift:4.14::el9"
] | null | 7.5 | null | null |
RHSA-2018:0395 | Red Hat Security Advisory: kernel security and bug fix update | Kernel: KVM: debug exception via syscall emulation Kernel: KVM: MMU potential stack buffer overrun during page walks | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 7.6 | null |
RHSA-2010:0343 | Red Hat Security Advisory: krb5 security and bug fix update | krb5: kadmind use-after-free remote crash (MITKRB5-SA-2010-003) | [
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2018:2255 | Red Hat Security Advisory: java-1.7.0-oracle security update | JDK: unspecified vulnerability fixed in 6u201, 7u191, 8u181, and 10.0.2 (Libraries) JDK: unspecified vulnerability fixed in 7u191, 8u181, and 10.0.2 (JavaFX) OpenJDK: insufficient index validation in PatternSyntaxException getMessage() (Concurrency, 8199547) JDK: unspecified vulnerability fixed in 6u201, 7u191, 8u181, and 10.0.2 (JSSE) | [
"cpe:/a:redhat:rhel_extras_oracle_java:6"
] | null | null | 5.9 | null |
RHSA-2025:3989 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 8.0.7 security update | elytron-oidc-client: OIDC Authorization Code Injection org.wildfly.core:wildfly-server: Wildfly improper RBAC permission | [
"cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el8"
] | null | 6.5 | null | null |
RHSA-2016:0073 | Red Hat Security Advisory: bind security update | bind: specific APL data could trigger an INSIST in apl_42.c | [
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server",
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation",
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | null | null |
RHSA-2024:9583 | Red Hat Security Advisory: ACS 4.4 enhancement update | golang: archive/zip: Incorrect handling of certain ZIP files golang: net/netip: Unexpected behavior from Is methods for IPv4-mapped IPv6 addresses encoding/gob: golang: Calling Decoder.Decode on a message which contains deeply nested structures can cause a panic due to stack exhaustion body-parser: Denial of Service Vulnerability in body-parser dompurify: DOMPurify vulnerable to tampering by prototype pollution | [
"cpe:/a:redhat:advanced_cluster_security:4.4::el8"
] | null | 8.2 | null | null |
RHSA-2023:1008 | Red Hat Security Advisory: kpatch-patch security update | kernel: use-after-free caused by l2cap_reassemble_sdu() in net/bluetooth/l2cap_core.c kernel: stack overflow in do_proc_dointvec and proc_skip_spaces kernel: use-after-free in __nfs42_ssc_open() in fs/nfs/nfs4file.c leading to remote Denial of Service attack kernel: Netfilter integer overflow vulnerability in nft_payload_copy_vlan | [
"cpe:/o:redhat:enterprise_linux:9::baseos"
] | null | 7.8 | null | null |
RHSA-2024:6883 | Red Hat Security Advisory: Red Hat Build of Apache Camel 3.20.7 for Spring Boot security update. | nimbus-jose-jwt: large JWE p2c header value causes Denial of Service undertow: response write hangs in case of Java 17 TLSv1.3 NewSessionTicket undertow: Improper State Management in Proxy Protocol parsing causes information leakage apache: cxf: org.apache.cxf:cxf-rt-rs-service-description: SSRF via WADL stylesheet parameter apache: cxf: org.apache.cxf:cxf-rt-rs-security-jose: Denial of Service vulnerability in JOSE org.hl7.fhir.core: org.hl7.fhir.dstu3: org.hl7.fhir.r4: org.hl7.fhir.r4b: org.hl7.fhir.r5: org.hl7.fhir.utilities: XXE vulnerability in XSLT transforms in `org.hl7.fhir.core` | [
"cpe:/a:redhat:apache_camel_spring_boot:3.20.7"
] | null | 8.6 | null | null |
RHSA-2018:1321 | Red Hat Security Advisory: chromium-browser security update | chromium-browser: Use after free in Media Cache | [
"cpe:/a:redhat:rhel_extras:6"
] | null | null | 9.6 | null |
RHSA-2024:1925 | Red Hat Security Advisory: Migration Toolkit for Containers (MTC) 1.8.3 security and bug fix update | axios: exposure of confidential data stored in cookies golang-protobuf: encoding/protojson, internal/encoding/json: infinite loop in protojson.Unmarshal when unmarshaling certain forms of invalid JSON | [
"cpe:/a:redhat:rhmt:1.8::el8"
] | null | 5.9 | null | null |
RHSA-2024:0030 | Red Hat Security Advisory: thunderbird security update | Mozilla: Heap-buffer-overflow affecting WebGL <code>DrawElementsInstanced</code> method with Mesa VM driver Mozilla: Symlinks may resolve to smaller than expected buffers Mozilla: Heap buffer overflow in <code>nsTextFragment</code> Mozilla: Use-after-free in PR_GetIdentitiesLayer Mozilla: Potential sandbox escape due to <code>VideoBridge</code> lack of texture validation Mozilla: Heap buffer overflow affected <code>nsWindow::PickerOpen(void)</code> in headless mode Mozilla: Use-after-free in <code>nsDNSService</code> Mozilla: Undefined behavior in <code>ShutdownObserver()</code> Mozilla: Memory safety bugs fixed in Firefox 121, Firefox ESR 115.6, and Thunderbird 115.6 Mozilla: S/MIME signature accepted despite mismatching message date Mozilla: Truncated signed text was shown with a valid OpenPGP signature | [
"cpe:/a:redhat:rhel_aus:8.2::appstream",
"cpe:/a:redhat:rhel_e4s:8.2::appstream",
"cpe:/a:redhat:rhel_tus:8.2::appstream"
] | null | 7.5 | null | null |
RHSA-2019:1545 | Red Hat Security Advisory: Red Hat Fuse 7.3.1 security update | bsh2: remote code execution via deserialization log4j: Socket receiver deserialization vulnerability uima: XML external entity expansion (XXE) can allow attackers to execute arbitrary code mysql-connector-java: Connector/J unspecified vulnerability (CPU October 2018) thrift: Improper Access Control grants access to files outside the webservers docroot path log4j: deserialization of untrusted data in SocketServer | [
"cpe:/a:redhat:jboss_fuse:7"
] | null | 9.8 | 7.5 | null |
RHSA-2017:0116 | Red Hat Security Advisory: docker security, bug fix, and enhancement update | docker: insecure opening of file-descriptor allows privilege escalation | [
"cpe:/a:redhat:rhel_extras_other:7"
] | null | 7.5 | null | null |
RHSA-2021:0818 | Red Hat Security Advisory: wpa_supplicant security update | wpa_supplicant: Use-after-free in P2P provision discovery processing | [
"cpe:/o:redhat:rhel_eus:8.1::baseos"
] | null | 7.5 | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.