id
stringlengths 13
15
| title
stringlengths 29
176
| description
stringlengths 8
32.1k
| cpes
sequencelengths 0
20
| cvss_v4_0
null | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
null |
---|---|---|---|---|---|---|---|
RHSA-2020:2522 | Red Hat Security Advisory: kernel security and bug fix update | kernel: double free may be caused by the function allocate_trace_buffer in the file kernel/trace/trace.c kernel: denial of service via ioctl call in network tun handling kernel: usb: missing size check in the __usb_get_extra_descriptor() leading to DoS kernel: perf_event_open() and execve() race in setuid programs allows a data leak kernel: brcmfmac frame validation bypass Kernel: net: using kernel space address bits to derive IP ID may potentially break KASLR kernel: unchecked kstrdup of fwstr in drm_load_edid_firmware leads to denial of service kernel: use-after-free in arch/x86/lib/insn-eval.c kernel: integer overflow and OOB read in drivers/block/floppy.c kernel: memory leak in register_queue_kobjects() in net/core/net-sysfs.c leads to denial of service kernel: use-after-free in __blk_add_trace in kernel/trace/blktrace.c Kernel: NetLabel: null pointer dereference while receiving CIPSO packet with null category may cause kernel panic | [
"cpe:/o:redhat:rhel_eus:7.7::computenode",
"cpe:/o:redhat:rhel_eus:7.7::server"
] | null | 5.9 | 5.5 | null |
RHSA-2019:1419 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.2.2 on RHEL 6 security update | picketlink: reflected XSS in SAMLRequest via RelayState parameter picketlink: URL injection via xinclude parameter undertow: leak credentials to log files UndertowLogger.REQUEST_LOGGER.undertowRequestFailed | [
"cpe:/a:redhat:jboss_enterprise_application_platform:7.2::el6"
] | null | null | 5.3 | null |
RHSA-2003:281 | Red Hat Security Advisory: : Updated MySQL packages fix vulnerability | security flaw | [
"cpe:/o:redhat:linux:7.1",
"cpe:/o:redhat:linux:7.2",
"cpe:/o:redhat:linux:7.3",
"cpe:/o:redhat:linux:8.0",
"cpe:/o:redhat:linux:9"
] | null | null | null | null |
RHSA-2019:2737 | Red Hat Security Advisory: java-1.8.0-ibm security update | OpenJDK: Insufficient checks of suppressed exceptions in deserialization (Utilities, 8212328) OpenJDK: Unbounded memory allocation during deserialization in Collections (Utilities, 8213432) OpenJDK: Insufficient restriction of privileges in AccessController (Security, 8216381) OpenJDK: Missing URL format validation (Networking, 8221518) libpng: use-after-free in png_image_free in png.c JDK: Out-of-bounds access in the String.getBytes method JDK: Failure to privatize a value pulled out of the loop by versioning | [
"cpe:/a:redhat:network_satellite:5.8::el6"
] | null | 7.4 | 9.8 | null |
RHSA-2022:5528 | Red Hat Security Advisory: squid:4 security update | squid: DoS when processing gopher server responses | [
"cpe:/a:redhat:rhel_eus:8.4::appstream"
] | null | 7.5 | null | null |
RHSA-2011:1440 | Red Hat Security Advisory: seamonkey security update | Mozilla: Universal XSS likely with MultiByte charset (MFSA 2011-47) | [
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2022:5696 | Red Hat Security Advisory: java-1.8.0-openjdk security, bug fix, and enhancement update | OpenJDK: class compilation issue (Hotspot, 8281859) OpenJDK: improper restriction of MethodHandle.invokeBasic() (Hotspot, 8281866) OpenJDK: integer truncation issue in Xalan-J (JAXP, 8285407) | [
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb"
] | null | 7.5 | null | null |
RHSA-2022:6750 | Red Hat Security Advisory: Red Hat OpenStack Platform (openstack-barbican) security update | openstack-barbican: access policy bypass via query string injection | [
"cpe:/a:redhat:openstack:13::el7",
"cpe:/a:redhat:openstack:16.1::el8",
"cpe:/a:redhat:openstack:16.2::el8",
"cpe:/a:redhat:openstack:17.0::el9"
] | null | 7.1 | null | null |
RHSA-2024:0533 | Red Hat Security Advisory: gnutls security update | gnutls: timing side-channel in the RSA-PSK authentication gnutls: incomplete fix for CVE-2023-5981 gnutls: rejects certificate chain with distributed trust | [
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/o:redhat:enterprise_linux:9::baseos"
] | null | 7.5 | null | null |
RHSA-2021:2439 | Red Hat Security Advisory: Open Liberty 21.0.0.6 Runtime security update | Open Liberty 21.0.0.6 Runtime is now available from the Customer Portal.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. | [
"cpe:/a::openliberty:21"
] | null | null | null | null |
RHSA-2022:7013 | Red Hat Security Advisory: java-11-openjdk security and bug fix update | OpenJDK: improper MultiByte conversion can lead to buffer overflow (JGSS, 8286077) OpenJDK: improper handling of long NTLM client hostnames (Security, 8286526) OpenJDK: insufficient randomization of JNDI DNS port numbers (JNDI, 8286910) OpenJDK: excessive memory allocation in X.509 certificate parsing (Security, 8286533) OpenJDK: HttpServer no connection count limit (Lightweight HTTP Server, 8286918) harfbuzz: integer overflow in the component hb-ot-shape-fallback.cc OpenJDK: missing SNI caching in HTTP/2 (Networking, 8289366) | [
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::crb"
] | null | 3.7 | null | null |
RHSA-2022:1950 | Red Hat Security Advisory: dovecot security update | dovecot: plaintext commands injection | [
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb"
] | null | 4.2 | null | null |
RHSA-2007:0068 | Red Hat Security Advisory: postgresql security update | security flaw security flaw New version fixes three different crash vulnerabilities security flaw security flaw | [
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2021:2365 | Red Hat Security Advisory: libwebp security update | libwebp: heap-based buffer overflow in PutLE16() libwebp: heap-based buffer overflow in WebPDecode*Into functions libwebp: use-after-free in EmitFancyRGB() in dec/io_dec.c | [
"cpe:/a:redhat:rhel_eus:8.1::appstream"
] | null | 9.8 | null | null |
RHSA-2018:0399 | Red Hat Security Advisory: kernel security and bug fix update | kernel: Use-after-free vulnerability in DCCP socket | [
"cpe:/o:redhat:rhel_eus:7.3::computenode",
"cpe:/o:redhat:rhel_eus:7.3::server"
] | null | null | 7.8 | null |
RHSA-2017:1833 | Red Hat Security Advisory: chromium-browser security update | chromium-browser: use after free in indexeddb chromium-browser: use after free in ppapi chromium-browser: ui spoofing in blink chromium-browser: type confusion in extensions chromium-browser: out-of-bounds write in pdfium chromium-browser: user information leak via android intents chromium-browser: out-of-bounds read in skia chromium-browser: use after free in v8 chromium-browser: out-of-bounds write in ppapi chromium-browser: use after free in chrome apps chromium-browser: url spoofing in omnibox chromium-browser: uninitialized use in skia chromium-browser: uninitialized use in skia chromium-browser: ui spoofing in browser chromium-browser: url spoofing in omnibox chromium-browser: url spoofing in omnibox chromium-browser: user information leak via svg chromium-browser: type confusion in pdfium chromium-browser: ui spoofing in browser chromium-browser: ui spoofing in payments dialog chromium-browser: pointer disclosure in sqlite | [
"cpe:/a:redhat:rhel_extras:6"
] | null | null | 6.5 | null |
RHSA-2013:1059 | Red Hat Security Advisory: java-1.6.0-ibm security update | OpenJDK: Insecure shared memory permissions (2D, 8001034) OpenJDK: Frame injection in generated HTML (Javadoc, 8012375) OpenJDK: Integrate Apache Santuario, rework class loader (Libraries, 6741606, 8008744) OpenJDK: JConsole SSL support (Serviceability, 8003703) JDK: unspecified vulnerability fixed in 7u25 (Deployment) JDK: unspecified vulnerability fixed in 7u25 (Deployment) OpenJDK: AccessControlContext check order issue (Libraries, 8001330) OpenJDK: Resource denial of service (AWT, 8001038) OpenJDK: output stream access restrictions (CORBA, 8000642) OpenJDK: Prevent revealing the local address (Networking, 8001318) OpenJDK: Better access restrictions (Sound, 8006328) OpenJDK: ObjectStreamClass circular reference denial of service (Serialization, 8000638) OpenJDK: exclusive port binding (Networking, 7170730) OpenJDK: Unique VMIDs (Libraries, 8001033) OpenJDK: MBeanServer Introspector package access (JMX, 8008124) OpenJDK: SerialJavaObject package restriction (JDBC, 8009554) OpenJDK: getEnclosing* checks (Libraries, 8007812) OpenJDK: ObjectOutputStream access checks (Serialization, 8008132) OpenJDK: Proper class checking (JMX, 8008120) OpenJDK: Various AWT integer overflow checks (AWT, 8009071) OpenJDK: Incorrect image attribute verification (2D, 8012438) JDK: unspecified vulnerability fixed in 7u25 (2D) OpenJDK: Incorrect image channel verification (2D, 8012597) JDK: unspecified vulnerability fixed in 7u25 (Deployment) JDK: unspecified vulnerability fixed in 7u25 (Deployment) OpenJDK: Incorrect image layout verification (2D, 8012601) OpenJDK: ImagingLib byte lookup processing (2D, 8011243) OpenJDK: Incorrect IntegerComponentRaster size checks (2D, 8011248) OpenJDK: Incorrect ShortBandedRaster size checks (2D, 8011253) OpenJDK: Incorrect ByteBandedRaster size checks (2D, 8011257) JDK: Unspecified security fixes (July 2013) JDK: Unspecified security fixes (July 2013) JDK: Unspecified security fixes (July 2013) JDK: unspecified vulnerability fixed in 6u51 and 5u51 (AWT) OpenJDK: XML parsing Denial of Service (JAXP, 8017298) | [
"cpe:/a:redhat:rhel_extras:5::server",
"cpe:/a:redhat:rhel_extras:6"
] | null | null | null | null |
RHSA-2005:840 | Red Hat Security Advisory: xpdf security update | security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw | [
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws",
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2019:0935 | Red Hat Security Advisory: openstack-neutron security and bug fix update | openstack-neutron: incorrect validation of port settings in iptables security group driver openstack-neutron: DOS via broken port range merging in security group | [
"cpe:/a:redhat:openstack:13::el7"
] | null | null | 7.5 | null |
RHSA-2014:1265 | Red Hat Security Advisory: Red Hat OpenShift Enterprise 1.2 - 75 Day Retirement Notice | This is the 75 day notification for the retirement of Red Hat OpenShift
Enterprise 1.2. | [] | null | null | null | null |
RHSA-2011:0791 | Red Hat Security Advisory: tomcat6 security and bug fix update | tomcat: file permission bypass flaw tomcat: cross-site-scripting vulnerability in the manager application tomcat: XSS vulnerability in HTML Manager interface | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2007:0385 | Red Hat Security Advisory: fetchmail security update | fetchmail/mutt/evolution/...: APOP password disclosure vulnerability | [
"cpe:/o:redhat:enterprise_linux:2.1::as",
"cpe:/o:redhat:enterprise_linux:2.1::aw",
"cpe:/o:redhat:enterprise_linux:2.1::es",
"cpe:/o:redhat:enterprise_linux:2.1::ws",
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws",
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2025:1154 | Red Hat Security Advisory: Red Hat Integration Camel K 1.10.9 release and security update. | bzip2: bzip2: Data integrity error when decompressing (with data integrity tests fail). graalvm: Unauthorized Read Access graalvm: unauthorized ability to cause a partial denial of service libsoup: buffer overflow via UTF-8 conversion in soup_header_parse_param_list_strict openjdk: Enhance array handling (Oracle CPU 2025-01) | [
"cpe:/a:redhat:camel_k:1.10.9"
] | null | 4.8 | null | null |
RHSA-2016:0611 | Red Hat Security Advisory: samba security update | samba: crash in dcesrv_auth_bind_ack due to missing error check samba: Man-in-the-middle attacks possible with NTLMSSP authentication samba: Spoofing vulnerability when domain controller is configured samba: Missing downgrade detection samba: Smb signing not required by default when smb client connection is used for ipc usage samba: SAMR and LSA man in the middle attacks | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2023:4706 | Red Hat Security Advisory: subscription-manager security update | subscription-manager: inadequate authorization of com.redhat.RHSM1 D-Bus interface allows local users to modify configuration | [
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 7.8 | null | null |
RHSA-2015:0851 | Red Hat Security Advisory: Red Hat JBoss BPM Suite 6.1.0 update | CXF: SSL hostname verification bypass, incomplete CVE-2012-5783 fix WS: EJB3 role restrictions are not applied to jaxws handlers Java: Java XML Signature DoS Attack async-http-client: SSL/TLS certificate verification is disabled under certain conditions async-http-client: missing hostname verification for SSL certificates CXF: The SecurityTokenService accepts certain invalid SAML Tokens as valid CXF: UsernameTokens are sent in plaintext with a Symmetric EncryptBeforeSigning policy JBossSX/PicketBox: World readable audit.log file CXF: HTML content posted to SOAP endpoint could cause OOM errors CXF: Large invalid content could cause temporary space to fill CXF: SSL hostname verification bypass, incomplete CVE-2012-6153 fix CXF: Improper security semantics enforcement of SAML SubjectConfirmation methods Security: Wrong security context loaded when using SAML2 STS Login Module RESTeasy: External entities expanded by DocumentProvider Weld: Limited information disclosure via stale thread state jBPM: BPMN2 file processing XXE in Process Execution | [
"cpe:/a:redhat:jboss_bpms:6.0"
] | null | null | 4.8 | null |
RHSA-2016:0074 | Red Hat Security Advisory: bind97 security update | bind: specific APL data could trigger an INSIST in apl_42.c | [
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2020:3378 | Red Hat Security Advisory: bind security update | bind: BIND does not sufficiently limit the number of fetches performed when processing referrals bind: A logic error in code which checks TSIG validity can be used to trigger an assertion failure in tsig.c | [
"cpe:/o:redhat:rhel_aus:6.6::server"
] | null | 7.5 | null | null |
RHSA-2012:1130 | Red Hat Security Advisory: xen security update | xen: pv bootloader doesn't check the size of the bzip2 or lzma compressed kernel | [
"cpe:/a:redhat:rhel_virtualization:5::client",
"cpe:/a:redhat:rhel_virtualization:5::server",
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2020:5239 | Red Hat Security Advisory: firefox security update | Mozilla: Variable time processing of cross-origin images during drawImage calls Mozilla: Parsing mismatches could confuse and bypass security sanitizer for chrome privileged code Mozilla: Fullscreen could be enabled without displaying the security UI Mozilla: XSS through paste (manual and clipboard API) Mozilla: Requests intercepted through ServiceWorkers lacked MIME type restrictions Mozilla: Use-after-free in WebRequestService Mozilla: Potential use-after-free in uses of nsTArray Mozilla: DoH did not filter IPv4 mapped IP Addresses Mozilla: Software keyboards may have remembered typed passwords Mozilla: Memory safety bugs fixed in Firefox 83 and Firefox ESR 78.5 | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 8.8 | 6.1 | null |
RHSA-2023:1470 | Red Hat Security Advisory: kernel security, bug fix, and enhancement update | kernel: net: CPU soft lockup in TC mirred egress-to-ingress action kernel: tun: avoid double free in tun_free_netdev ALSA: pcm: Move rwsem lock inside snd_ctl_elem_read to prevent UAF | [
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::crb",
"cpe:/o:redhat:enterprise_linux:9::baseos"
] | null | 7.8 | null | null |
RHSA-2017:2789 | Red Hat Security Advisory: samba security update | samba: symlink race permits opening files outside share directory samba: Some code path don't enforce smb signing, when they should Samba: Server memory information leak over SMB1 | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | 4.1 | null |
RHSA-2020:2336 | Red Hat Security Advisory: freerdp security update | freerdp: Out-of-bounds write in planar.c freerdp: Integer overflow in region.c freerdp: Out-of-bounds write in interleaved.c | [
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb"
] | null | 6.6 | null | null |
RHSA-2018:3407 | Red Hat Security Advisory: libvirt security update | hw: cpu: speculative store bypass | [
"cpe:/o:redhat:rhel_aus:7.2::server",
"cpe:/o:redhat:rhel_e4s:7.2::server",
"cpe:/o:redhat:rhel_tus:7.2::server"
] | null | null | 5.6 | null |
RHSA-2020:3877 | Red Hat Security Advisory: audiofile security update | audiofile: NULL pointer dereference in ModuleState::setup() in modules/ModuleState.cpp allows for denial of service via crafted file audiofile: Heap-based buffer overflow in Expand3To4Module::run() when running sfconvert | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 7 | null |
RHSA-2022:0829 | Red Hat Security Advisory: .NET Core 3.1 on RHEL 7 security and bugfix update | brotli: buffer overflow when input chunk is larger than 2GiB dotnet: ASP.NET Denial of Service via FormPipeReader dotnet: double parser stack buffer overrun | [
"cpe:/a:redhat:rhel_dotnet:3.1::el7"
] | null | 6.3 | null | null |
RHSA-2014:0127 | Red Hat Security Advisory: librsvg2 security update | librsvg2: local resource access vulnerability due to XML External Entity enablement | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2024:0728 | Red Hat Security Advisory: Logging Subsystem 5.8.3 - Red Hat OpenShift | golang: net/http/internal: Denial of Service (DoS) via Resource Consumption via HTTP requests | [
"cpe:/a:redhat:logging:5.8::el9"
] | null | 5.3 | null | null |
RHSA-2022:6370 | Red Hat Security Advisory: Red Hat Advanced Cluster Management 2.6.0 security updates and bug fixes | golang: net/http: improper sanitization of Transfer-Encoding header golang: go/parser: stack exhaustion in all Parse* functions golang: encoding/xml: stack exhaustion in Decoder.Skip golang: crypto/tls: session tickets lack random ticket_age_add golang: io/fs: stack exhaustion in Glob golang: compress/gzip: stack exhaustion in Reader.Read golang: path/filepath: stack exhaustion in Glob golang: encoding/xml: stack exhaustion in Unmarshal golang: encoding/gob: stack exhaustion in Decoder.Decode moment: inefficient parsing algorithm resulting in DoS golang: net/http/httputil: NewSingleHostReverseProxy - omit X-Forwarded-For not working | [
"cpe:/a:redhat:acm:2.6::el8"
] | null | 6.5 | null | null |
RHSA-2024:5041 | Red Hat Security Advisory: python-urllib3 security update | urllib3: proxy-authorization request header is not stripped during cross-origin redirects | [
"cpe:/o:redhat:rhel_aus:8.6::baseos",
"cpe:/o:redhat:rhel_e4s:8.6::baseos",
"cpe:/o:redhat:rhel_tus:8.6::baseos"
] | null | 4.4 | null | null |
RHSA-2024:4371 | Red Hat Security Advisory: buildah security update | golang-fips/openssl: Memory leaks in code encrypting and decrypting RSA payloads | [
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 7.5 | null | null |
RHSA-2022:5047 | Red Hat Security Advisory: .NET 6.0 on RHEL 7 security and bugfix update | dotnet: NuGet Credential leak due to loss of control of third party symbol server domain | [
"cpe:/a:redhat:rhel_dotnet:6.0::el7"
] | null | 5 | null | null |
RHSA-2016:1986 | Red Hat Security Advisory: Red Hat Enterprise Linux 4 Extended Life Cycle Support Six-Month Notice | This is the Six-Month notification for the retirement of Red Hat Enterprise Linux 4 Extended Life Cycle Support Add-On (ELS). This notification applies only to those customers subscribed to the Extended Life Cycle Support (ELS) channel for Red Hat Enterprise Linux 4. | [
"cpe:/o:redhat:rhel_els:4::as",
"cpe:/o:redhat:rhel_els:4::es"
] | null | null | null | null |
RHSA-2008:0828 | Red Hat Security Advisory: JBoss Enterprise Application Platform 4.3.0CP01 security update | Cross-site scripting (XSS) vulnerability in Sun Java Server Faces JBossEAP status servlet info leak | [
"cpe:/a:redhat:jboss_enterprise_application_platform:4.3.0::el5"
] | null | null | null | null |
RHSA-2020:3221 | Red Hat Security Advisory: kernel-rt security and bug fix update | kernel: use-after-free caused by a malicious USB device in the drivers/hid/usbhid/hiddev.c driver kernel: kernel: DAX hugepages not considered during mremap kernel: buffer overflow in mwifiex_cmd_append_vsie_tlv function in drivers/net/wireless/marvell/mwifiex/scan.c kernel: heap-based buffer overflow in mwifiex_ret_wmm_get_status function in drivers/net/wireless/marvell/mwifiex/wmm.c | [
"cpe:/a:redhat:rhel_extras_rt:7"
] | null | 7.1 | null | null |
RHSA-2023:0946 | Red Hat Security Advisory: openssl security and bug fix update | openssl: read buffer overflow in X.509 certificate verification openssl: timing attack in RSA Decryption implementation openssl: double free after calling PEM_read_bio_ex openssl: use-after-free following BIO_new_NDEF openssl: invalid pointer dereference in d2i_PKCS7 functions openssl: NULL dereference validating DSA public key openssl: X.400 address type confusion in X.509 GeneralName openssl: NULL dereference during PKCS7 data verification | [
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/o:redhat:enterprise_linux:9::baseos"
] | null | 7.5 | null | null |
RHSA-2024:3854 | Red Hat Security Advisory: kernel-rt security and bug fix update | kernel: KVM: SVM: improper check in svm_set_x2apic_msr_interception allows direct access to host x2apic msrs kernel: bluetooth: bt_sock_ioctl race condition leads to use-after-free in bt_sock_recvmsg kernel: net/mlx5e: fix a potential double-free in fs_any_create_groups kernel: kvm: Avoid potential UAF in LPI translation cache | [
"cpe:/a:redhat:rhel_eus:9.2::nfv",
"cpe:/a:redhat:rhel_eus:9.2::realtime"
] | null | 7.8 | null | null |
RHSA-2018:1346 | Red Hat Security Advisory: kernel security and bug fix update | hw: cpu: speculative execution branch target injection hw: cpu: speculative execution permission faults handling Kernel: error in exception handling leads to DoS | [
"cpe:/o:redhat:rhel_eus:6.7::computenode",
"cpe:/o:redhat:rhel_eus:6.7::server"
] | null | null | 6.5 | null |
RHSA-2022:1040 | Red Hat Security Advisory: Red Hat OpenShift GitOps security update | Openshift-Gitops: Improper access control allows admin privilege escalation argocd: path traversal and improper access control allows leaking out-of-bound files argocd: path traversal allows leaking out-of-bound files | [
"cpe:/a:redhat:openshift_gitops:1.3::el8"
] | null | 6.8 | null | null |
RHSA-2014:1942 | Red Hat Security Advisory: openstack-neutron security and bug fix update | openstack-neutron: DoS via maliciously crafted dns_nameservers | [
"cpe:/a:redhat:openstack:5::el7"
] | null | null | null | null |
RHSA-2019:1476 | Red Hat Security Advisory: flash-plugin security update | flash-plugin: Arbitrary Code Execution vulnerability (APSB19-30) flash-plugin: Same origin policy bypass leading to information disclosure | [
"cpe:/a:redhat:rhel_extras:6"
] | null | 7.5 | 8.8 | null |
RHSA-2016:0684 | Red Hat Security Advisory: nss and nspr security, bug fix, and enhancement update | nss: Use-after-free in NSS during SSL connections in low memory (MFSA 2016-15) nss: Use-after-free during processing of DER encoded keys in NSS (MFSA 2016-36) | [
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHBA-2013:0386 | Red Hat Bug Fix Advisory: tuned bug fix update | tuned: insecure permissions of tuned.pid | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2022:8561 | Red Hat Security Advisory: thunderbird security update | Mozilla: Service Workers might have learned size of cross-origin media files Mozilla: Fullscreen notification bypass Mozilla: Use-after-free in InputStream implementation Mozilla: Use-after-free of a JavaScript Realm Mozilla: Fullscreen notification bypass via windowName Mozilla: Use-after-free in Garbage Collection Mozilla: ServiceWorker-intercepted requests bypassed SameSite cookie policy Mozilla: Cross-Site Tracing was possible via non-standard override headers Mozilla: Symlinks may resolve to partially uninitialized buffers Mozilla: Keystroke Side-Channel Leakage Mozilla: Custom mouse cursor could have been drawn over browser UI Mozilla: Iframe contents could be rendered outside the iframe Mozilla: Memory safety bugs fixed in Firefox 107 and Firefox ESR 102.5 | [
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 8.8 | 6.1 | null |
RHSA-2025:3128 | Red Hat Security Advisory: kernel security update | kernel: arm64: cacheinfo: Avoid out-of-bounds write to cacheinfo array | [
"cpe:/a:redhat:rhel_e4s:9.0::appstream",
"cpe:/o:redhat:rhel_e4s:9.0::baseos"
] | null | 7 | null | null |
RHSA-2022:8868 | Red Hat Security Advisory: Red Hat OpenStack Platform 16.1.9 (python-scciclient) security update | python-scciclient: missing server certificate verification | [
"cpe:/a:redhat:openstack:16.1::el8"
] | null | 7.4 | null | null |
RHSA-2012:0322 | Red Hat Security Advisory: java-1.6.0-openjdk security update | OpenJDK: JavaSound incorrect bounds check (Sound, 7088367) OpenJDK: AtomicReferenceArray insufficient array type check (Concurrency, 7082299) GlassFish: hash table collisions CPU usage DoS (oCERT-2011-003) OpenJDK: insufficient checking of the graphics rendering object (2D, 7112642) OpenJDK: off-by-one bug in ZIP reading code (JRE, 7118283) OpenJDK: KeyboardFocusManager focus stealing (AWT, 7110683) OpenJDK: unrestricted use of TimeZone.setDefault() (i18n, 7110687) OpenJDK: incomplete info in the deserialization exception (Serialization, 7110700) OpenJDK: mutable repository identifiers (CORBA, 7110704) OpenJDK: AtomicReferenceArray insufficient array type check (Concurrency, 7082299) | [
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2018:1689 | Red Hat Security Advisory: rhevm-setup-plugins security update | hw: cpu: speculative store bypass | [
"cpe:/a:redhat:rhev_manager:3"
] | null | null | 5.6 | null |
RHSA-2024:7922 | Red Hat Security Advisory: OpenShift Container Platform 4.17.1 bug fix and security update | Hashicorp/vault: Vault’s LDAP Auth Method Allows for User Enumeration golang: net/http: golang: mime/multipart: golang: net/textproto: memory exhaustion in Request.ParseMultipartForm containers/image: digest type does not guarantee valid type pypa/setuptools: Remote code execution via download functions in the package_index module in pypa/setuptools openshift-console: OAuth2 insufficient state parameter entropy golang-protobuf: encoding/protojson, internal/encoding/json: infinite loop in protojson.Unmarshal when unmarshaling certain forms of invalid JSON net/http: Denial of service due to improper 100-continue handling in net/http pgx: SQL Injection via Line Comment Creation path-to-regexp: Backtracking regular expressions cause ReDoS | [
"cpe:/a:redhat:openshift:4.17::el9"
] | null | 5.3 | null | null |
RHSA-2013:0869 | Red Hat Security Advisory: tomcat6 security update | tomcat: Improper TOMCAT_LOG management in init script (DoS, ACE) tomcat: DIGEST authentication vulnerable to replay attacks | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2023:4529 | Red Hat Security Advisory: libxml2 security update | libxml2: NULL dereference in xmlSchemaFixupComplexType libxml2: Hashing of empty dict strings isn't deterministic | [
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 5.9 | null | null |
RHSA-2024:5696 | Red Hat Security Advisory: tomcat security update | tomcat: Improper Handling of Exceptional Conditions tomcat: Denial of Service in Tomcat | [
"cpe:/a:redhat:rhel_eus:9.2::appstream"
] | null | 7.5 | null | null |
RHSA-2018:2097 | Red Hat Security Advisory: patch security update | patch: Malicious patch files cause ed to execute arbitrary commands | [
"cpe:/o:redhat:rhel_aus:6.4::server"
] | null | null | 7.8 | null |
RHSA-2013:0748 | Red Hat Security Advisory: krb5 security update | krb5: NULL pointer dereference (DoS, KDC crash) by processing certain TGS requests | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2007:0166 | Red Hat Security Advisory: java-1.4.2-ibm security update | java-jre: GIF buffer overflow | [
"cpe:/a:redhat:rhel_extras:3",
"cpe:/a:redhat:rhel_extras:4",
"cpe:/a:redhat:rhel_extras:5::client",
"cpe:/a:redhat:rhel_extras:5::server"
] | null | null | null | null |
RHSA-2007:1048 | Red Hat Security Advisory: openoffice.org, hsqldb security update | JBoss HSQLDB component remote command injection OpenOffice.org-base allows Denial-of-Service and command injection | [
"cpe:/a:redhat:rhel_productivity:5",
"cpe:/o:redhat:enterprise_linux:5::client"
] | null | null | null | null |
RHSA-2024:6004 | Red Hat Security Advisory: OpenShift Container Platform 4.16.10 bug fix and security update | golang: net/http, x/net/http2: unlimited number of CONTINUATION frames causes DoS bind: bind9: BIND's database will be slow if a very large number of RRs exist at the same nam bind9: bind: SIG(0) can be used to exhaust CPU resources bind: bind9: Assertion failure when serving both stale cache data and authoritative zone content go-retryablehttp: url might write sensitive information to log file golang-protobuf: encoding/protojson, internal/encoding/json: infinite loop in protojson.Unmarshal when unmarshaling certain forms of invalid JSON golang: archive/zip: Incorrect handling of certain ZIP files | [
"cpe:/a:redhat:openshift:4.16::el9"
] | null | 7.5 | null | null |
RHSA-2024:1493 | Red Hat Security Advisory: thunderbird security update | nss: timing attack against RSA decryption Mozilla: Crash in NSS TLS method Mozilla: Leaking of encrypted email subjects to other conversations Mozilla: JIT code failed to save return registers on Armv7-A Mozilla: Integer overflow could have led to out of bounds write Mozilla: Improper handling of html and body tags enabled CSP nonce leakage Mozilla: Clickjacking vulnerability could have led to a user accidentally granting permissions Mozilla: Self referencing object could have potentially led to a use-after-free Mozilla: Memory safety bugs fixed in Firefox 124, Firefox ESR 115.9, and Thunderbird 115.9 | [
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 7.5 | null | null |
RHSA-2021:0162 | Red Hat Security Advisory: xstream security update | XStream: remote code execution due to insecure XML deserialization when relying on blocklists | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 9 | null | null |
RHSA-2020:2382 | Red Hat Security Advisory: firefox security update | Mozilla: Use-after-free in SharedWorkerService Mozilla: JavaScript Type confusion with NativeTypes Mozilla: Memory safety bugs fixed in Firefox 77 and Firefox ESR 68.9 | [
"cpe:/a:redhat:rhel_e4s:8.0::appstream"
] | null | 8.8 | null | null |
RHSA-2020:0637 | Red Hat Security Advisory: Red Hat Satellite 5 - 90 day End Of Life Notice | This is the 90 day notification of the End Of Life (EOL) plans for the
following versions of Red Hat Satellite 5:
* Red Hat Satellite 5.8 on Red Hat Enterprise Linux 6 | [
"cpe:/a:redhat:network_satellite:5.8::el6"
] | null | null | null | null |
RHSA-2015:2534 | Red Hat Security Advisory: Red Hat JBoss Data Virtualization 6.0.0, 6.1.0, and 6.2.0 security update | apache-commons-collections: InvokerTransformer code execution during deserialisation | [
"cpe:/a:redhat:jboss_data_virtualization:6.0",
"cpe:/a:redhat:jboss_data_virtualization:6.1",
"cpe:/a:redhat:jboss_data_virtualization:6.2"
] | null | null | null | null |
RHSA-2016:1632 | Red Hat Security Advisory: kernel-rt security and bug fix update | kernel: challenge ACK counter information disclosure. | [
"cpe:/a:redhat:rhel_extras_rt:7"
] | null | null | 4.8 | null |
RHSA-2024:4073 | Red Hat Security Advisory: kpatch-patch security update | kernel: nf_tables: use-after-free vulnerability in the nft_verdict_init() function | [
"cpe:/o:redhat:enterprise_linux:7::server"
] | null | 7.8 | null | null |
RHSA-2022:0265 | Red Hat Security Advisory: polkit security update | polkit: Local privilege escalation in pkexec due to incorrect handling of argument vector | [
"cpe:/o:redhat:rhel_eus:8.2::baseos"
] | null | 7.8 | null | null |
RHSA-2008:0893 | Red Hat Security Advisory: bzip2 security update | bzip2: crash on malformed archive file | [
"cpe:/o:redhat:enterprise_linux:2.1::as",
"cpe:/o:redhat:enterprise_linux:2.1::aw",
"cpe:/o:redhat:enterprise_linux:2.1::es",
"cpe:/o:redhat:enterprise_linux:2.1::ws",
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws",
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws",
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2021:4034 | Red Hat Security Advisory: binutils security update | environment: Unicode's bidirectional (BiDi) override characters can cause trojan source attacks | [
"cpe:/o:redhat:rhel_aus:7.7::server",
"cpe:/o:redhat:rhel_e4s:7.7::server",
"cpe:/o:redhat:rhel_tus:7.7::server"
] | null | 8.5 | null | null |
RHSA-2024:9977 | Red Hat Security Advisory: RHOSP 17.1.4 (python-zipp) security update | github.com/jaraco/zipp: Denial of Service (infinite loop) via crafted zip file in jaraco/zipp | [
"cpe:/a:redhat:openstack:17.1::el9"
] | null | 6.2 | null | null |
RHSA-2024:0191 | Red Hat Security Advisory: Red Hat OpenStack Platform 17.1 (openstack-tripleo-common) security update | openstack/kolla: sudo privilege escalation vulnerability | [
"cpe:/a:redhat:openstack:17.1::el8"
] | null | 7.8 | null | null |
RHSA-2022:1792 | Red Hat Security Advisory: flatpak security and bug fix update | flatpak: Permissions granted to applications can be hidden from the user at install time | [
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb"
] | null | 8.2 | null | null |
RHSA-2019:2713 | Red Hat Security Advisory: poppler security update | poppler: memory leak in GfxColorSpace::setDisplayProfile in GfxState.cc poppler: NULL pointer dereference in the XRef::getEntry in XRef.cc poppler: reachable Object::getString assertion in AnnotRichMedia class in Annot.c poppler: reachable Object::dictLookup assertion in FileSpec class in FileSpec.cc poppler: SIGABRT PDFDoc::setup class in PDFDoc.cc poppler: heap-based buffer over-read in XRef::getEntry in XRef.cc poppler: heap-based buffer overflow in function ImageStream::getLine() in Stream.cc poppler: heap-based buffer over-read in function downsample_row_box_filter in CairoRescaleBox.cc poppler: stack consumption in function Dict::find() in Dict.cc poppler: integer overflow in JPXStream::init function leading to memory consumption poppler: heap-based buffer over-read in function PSOutputDev::checkPageSlice in PSOutputDev.cc poppler: heap-based buffer over-read in JPXStream::init in JPEG2000Stream.cc | [
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb"
] | null | null | 6.6 | null |
RHSA-2018:2743 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 6.4.21 security update | keycloak: SAML request parser replaces special strings with system properties hibernate-validator: Privilege escalation when running under the security manager tomcat: A bug in the UTF-8 decoder can lead to DoS guava: Unbounded memory allocation in AtomicDoubleArray and CompoundOrdering classes allow remote attackers to cause a denial of service | [
"cpe:/a:redhat:jboss_enterprise_application_platform:6::el6"
] | null | null | 5.9 | null |
RHSA-2018:1707 | Red Hat Security Advisory: librelp security update | librelp: Stack-based buffer overflow in relpTcpChkPeerName function in src/tcp.c | [
"cpe:/o:redhat:rhel_eus:7.3::computenode",
"cpe:/o:redhat:rhel_eus:7.3::server"
] | null | null | 8.1 | null |
RHSA-2016:0685 | Red Hat Security Advisory: nss, nspr, nss-softokn, and nss-util security, bug fix, and enhancement update | nss: Use-after-free in NSS during SSL connections in low memory (MFSA 2016-15) nss: Use-after-free during processing of DER encoded keys in NSS (MFSA 2016-36) | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | null | null |
RHSA-2024:0320 | Red Hat Security Advisory: xorg-x11-server security update | xorg-x11-server: Heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer xorg-x11-server: reattaching to different master device may lead to out-of-bounds memory access xorg-x11-server: SELinux unlabeled GLX PBuffer xorg-x11-server: SELinux context corruption xorg-x11-server: heap buffer overflow in XISendDeviceHierarchyEvent xorg-x11-server: heap buffer overflow in DisableDevice | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 7.8 | null | null |
RHSA-2012:0397 | Red Hat Security Advisory: glibc security update | glibc: FORTIFY_SOURCE format string protection bypass via "nargs" integer overflow | [
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2022:4773 | Red Hat Security Advisory: thunderbird security update | Mozilla: Untrusted input used in JavaScript object indexing, leading to prototype pollution Mozilla: Prototype pollution in Top-Level Await implementation | [
"cpe:/a:redhat:rhel_eus:8.2::appstream"
] | null | null | 8.8 | null |
RHSA-2020:3276 | Red Hat Security Advisory: grub2 security and bug fix update | grub2: Crafted grub.cfg file can lead to arbitrary code execution during boot process grub2: grub_malloc does not validate allocation size allowing for arithmetic overflow and subsequent heap-based buffer overflow grub2: Integer overflow in grub_squash_read_symlink may lead to heap-based buffer overflow grub2: Integer overflow read_section_as_string may lead to heap-based buffer overflow grub2: Integer overflow in grub_ext2_read_link leads to heap-based buffer overflow grub2: Fail kernel validation without shim protocol grub2: Use-after-free redefining a function whilst the same function is already executing grub2: Integer overflow in initrd size handling | [
"cpe:/o:redhat:rhel_aus:7.3::server",
"cpe:/o:redhat:rhel_e4s:7.3::server",
"cpe:/o:redhat:rhel_tus:7.3::server"
] | null | 5.7 | null | null |
RHSA-2022:1106 | Red Hat Security Advisory: kernel security update | kernel: Use After Free in unix_gc() which could result in a local privilege escalation kernel: possible privileges escalation due to missing TLB flush | [
"cpe:/o:redhat:rhel_aus:7.3::server"
] | null | 7 | null | null |
RHSA-2008:0555 | Red Hat Security Advisory: java-1.4.2-ibm security update | Untrusted applet and application XSLT processing privilege escalation Buffer overflow security vulnerabilities in Java Web Start | [
"cpe:/a:redhat:rhel_extras:3",
"cpe:/a:redhat:rhel_extras:4",
"cpe:/a:redhat:rhel_extras:5::client",
"cpe:/a:redhat:rhel_extras:5::server"
] | null | null | null | null |
RHSA-2024:1324 | Red Hat Security Advisory: Red Hat JBoss Web Server 6.0.1 release and security update | tomcat: Open Redirect vulnerability in FORM authentication tomcat: HTTP request smuggling via malformed trailer headers Tomcat: HTTP/2 header handling DoS | [
"cpe:/a:redhat:jboss_enterprise_web_server:6.0::el8",
"cpe:/a:redhat:jboss_enterprise_web_server:6.0::el9"
] | null | 7.5 | null | null |
RHSA-2024:4014 | Red Hat Security Advisory: ghostscript security update | ghostscript: OPVP device arbitrary code execution via custom Driver library | [
"cpe:/a:redhat:rhel_e4s:9.0::appstream"
] | null | 8.8 | null | null |
RHSA-2014:1976 | Red Hat Security Advisory: rpm security update | rpm: race condition during the installation process rpm: integer overflow and stack overflow in CPIO header parsing | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | null | null |
RHSA-2005:799 | Red Hat Security Advisory: ruby security update | security flaw | [
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws",
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2023:5421 | Red Hat Security Advisory: Multicluster Engine for Kubernetes 2.3.2 security updates and bug fixes | x/net/http2/h2c: request smuggling golang: html/template: improper sanitization of CSS values golang: html/template: improper handling of JavaScript whitespace tough-cookie: prototype pollution in cookie memstore golang: html/template: improper handling of empty HTML attributes | [
"cpe:/a:redhat:multicluster_engine:2.3::el8"
] | null | 7.3 | null | null |
RHEA-2019:3854 | Red Hat Enhancement Advisory: microcode_ctl bug fix and enhancement update | hw: Intel SGX information leak | [
"cpe:/o:redhat:rhel_aus:6.5::server"
] | null | null | 6 | null |
RHSA-2024:0148 | Red Hat Security Advisory: Red Hat Integration Camel K 1.10.5 release and security update | JSON-java: parser confusion leads to OOM snappy-java: Unchecked chunk length leads to DoS netty: SniHandler 16MB allocation leads to OOM | [
"cpe:/a:redhat:camel_k:1.10.5"
] | null | 6.5 | null | null |
RHSA-2014:1862 | Red Hat Security Advisory: mariadb55-mariadb security update | mysql: Remote Preauth User Enumeration flaw mysql: unspecified vulnerability related to ENARC (CPU July 2014) mysql: unspecified vulnerability related to SROPTZR (CPU July 2014) mysql: unspecified vulnerability related to ENFED (CPU July 2014) mysql: unspecified vulnerability related to SRINFOSC (CPU July 2014) mysql: unspecified vulnerability related to SRCHAR (CPU July 2014) mysql: unspecified MyISAM temporary file issue fixed in 5.5.39 and 5.6.20 mysql: unspecified vulnerability related to SERVER:CHARACTER SETS (CPU October 2014) mysql: unspecified vulnerability related to SERVER:REPLICATION ROW FORMAT BINARY LOG DML (CPU October 2014) mysql: unspecified vulnerability related to SERVER:INNODB DML FOREIGN KEYS (CPU October 2014) mysql: unspecified vulnerability related to SERVER:OPTIMIZER (CPU October 2014) mysql: unspecified vulnerability related to SERVER:DML (CPU October 2014) mysql: unspecified vulnerability related to SERVER:MEMORY STORAGE ENGINE (CPU October 2014) mysql: unspecified vulnerability related to SERVER:DML (CPU October 2014) mysql: unspecified vulnerability related to SERVER:DDL (CPU October 2014) mysql: unspecified vulnerability related to CLIENT:MYSQLDUMP (CPU October 2014) mysql: unspecified vulnerability related to CLIENT:MYSQLADMIN (CPU October 2014) mysql: unspecified vulnerability related to SERVER:DML (CPU October 2014) mysql: unspecified vulnerability related to C API SSL CERTIFICATE HANDLING (CPU October 2014) | [
"cpe:/a:redhat:rhel_software_collections:1::el6",
"cpe:/a:redhat:rhel_software_collections:1::el7"
] | null | null | null | null |
RHSA-2025:1249 | Red Hat Security Advisory: updated discovery container images | jquery: Untrusted code execution via <option> tag in HTML passed to DOM manipulation methods PostCSS: Improper input validation in PostCSS bootstrap: Cross-Site Scripting via button plugin on bootstrap ansible-core: Exposure of Sensitive Information in Ansible Vault Files Due to Improper Logging http-proxy-middleware: Denial of Service cross-spawn: regular expression denial of service redis: Denial-of-service due to unbounded pattern matching in Redis redis: Lua library commands may lead to stack overflow and RCE in Redis axios: axios: Server-Side Request Forgery python-django: Memory exhaustion in django.utils.numberformat.floatformat() python-django: Potential denial-of-service vulnerability in django.utils.html.urlize() and AdminURLFieldWidget python-django: Potential SQL injection in QuerySet.values() and values_list() webpack: DOM Clobbering vulnerability in AutoPublicPathRuntimeModule express: Improper Input Handling in Express Redirects send: Code Execution Vulnerability in Send Library serve-static: Improper Sanitization in serve-static path-to-regexp: Backtracking regular expressions cause ReDoS body-parser: Denial of Service Vulnerability in body-parser redis: Redis' Lua library commands may lead to remote code execution path-to-regexp: path-to-regexp Unpatched `path-to-regexp` ReDoS in 0.1.x django: Potential denial-of-service in django.utils.html.strip_tags() nanoid: nanoid mishandles non-integer values jinja2: Jinja has a sandbox breakout through malicious filenames jinja2: Jinja has a sandbox breakout through indirect reference to format method django: potential denial-of-service vulnerability in IPv6 validation | [
"cpe:/o:redhat:discovery:1.0::el9"
] | null | 5.8 | null | null |
RHSA-2021:4600 | Red Hat Security Advisory: annobin security update | environment: Unicode's bidirectional (BiDi) override characters can cause trojan source attacks | [
"cpe:/a:redhat:rhel_eus:8.2::appstream"
] | null | 8.5 | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.