id
stringlengths 13
15
| title
stringlengths 29
176
| description
stringlengths 8
32.1k
| cpes
sequencelengths 0
20
| cvss_v4_0
null | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
null |
---|---|---|---|---|---|---|---|
RHSA-2018:2553 | Red Hat Security Advisory: Red Hat OpenShift Application Runtimes Node.js 10.9.0 security update | openssl: Malicious server can send large prime to client during DH(E) TLS handshake causing the client to hang nodejs: Unintentional exposure of uninitialized memory nodejs: Out of bounds (OOB) write via UCS-2 encoding | [
"cpe:/a:redhat:openshift_application_runtimes:1.0::el7"
] | null | null | 8.1 | null |
RHSA-2018:2384 | Red Hat Security Advisory: kernel security and bug fix update | kernel: crypto: privilege escalation in skcipher_recvmsg function Kernel: hw: cpu: L1 terminal fault (L1TF) Kernel: hw: cpu: L1 terminal fault (L1TF) Kernel: speculative bounds check bypass store kernel: TCP segments with random offsets allow a remote denial of service (SegmentSmack) kernel: race condition in snd_seq_write() may lead to UAF or OOB-access kernel: mm: use-after-free in do_get_mempolicy function allows local DoS or other unspecified impact | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 5.5 | null |
RHSA-2011:1111 | Red Hat Security Advisory: Red Hat Enterprise Linux Extended Update Support 5.4 - End Of Life | This is the End of Life notification for Red Hat Enterprise Linux Extended
Update Support Add-On (EUS) 5.4. | [
"cpe:/o:redhat:rhel_eus:5.4"
] | null | null | null | null |
RHSA-2007:0127 | Red Hat Security Advisory: xorg-x11-server security update | xserver XC-MISC integer overflow | [
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2023:5531 | Red Hat Security Advisory: python3 security update | python: TLS handshake bypass | [
"cpe:/a:redhat:rhel_eus:8.6::appstream",
"cpe:/o:redhat:rhel_eus:8.6::baseos"
] | null | 8.6 | null | null |
RHSA-2013:0272 | Red Hat Security Advisory: thunderbird security update | Mozilla: Use-after-free in nsImageLoadingContent (MFSA 2013-26) Mozilla: Phishing on HTTPS connection through malicious proxy (MFSA 2013-27) Mozilla: Use-after-free, out of bounds read, and buffer overflow issues found using Address Sanitizer (MFSA 2013-28) Mozilla: Use-after-free, out of bounds read, and buffer overflow issues found using Address Sanitizer (MFSA 2013-28) Mozilla: Miscellaneous memory safety hazards (rv:17.0.3) (MFSA 2013-21) | [
"cpe:/a:redhat:rhel_productivity:5",
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2023:0383 | Red Hat Security Advisory: libXpm security update | libXpm: compression commands depend on $PATH libXpm: Runaway loop on width of 0 and enormous height libXpm: Infinite loop on unclosed comments | [
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 7.5 | null | null |
RHSA-2021:3548 | Red Hat Security Advisory: kernel security, bug fix, and enhancement update | kernel: SVM nested virtualization issue in KVM (AVIC support) | [
"cpe:/a:redhat:enterprise_linux:8::crb",
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 8.8 | null | null |
RHSA-2019:0085 | Red Hat Security Advisory: pyOpenSSL security and bug fix update | pyOpenSSL: Use-after-free in X509 object handling pyOpenSSL: Failure to release memory before removing last reference in PKCS #12 Store | [
"cpe:/a:redhat:openstack:13::el7"
] | null | null | 3.7 | null |
RHSA-2015:1896 | Red Hat Security Advisory: qemu-kvm-rhev security update | qemu: Heap overflow vulnerability in ne2000_receive() function | [
"cpe:/a:redhat:openstack:5::el6"
] | null | null | null | null |
RHSA-2022:4856 | Red Hat Security Advisory: postgresql:12 security update | postgresql: Autovacuum, REINDEX, and others omit "security restricted operation" sandbox | [
"cpe:/a:redhat:rhel_eus:8.4::appstream"
] | null | 8.8 | null | null |
RHSA-2020:2619 | Red Hat Security Advisory: Red Hat Fuse 7.6.0 on EAP security update | apache-commons-beanutils: does not suppresses the class property in PropertyUtilsBean by default | [
"cpe:/a:redhat:jboss_fuse:7"
] | null | null | 7.3 | null |
RHSA-2020:1792 | Red Hat Security Advisory: curl security update | curl: TFTP receive heap buffer overflow in tftp_receive_packet() function curl: double free due to subsequent call of realloc() curl: heap buffer overflow in function tftp_receive_packet() | [
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 7 | 6.3 | null |
RHSA-2014:0211 | Red Hat Security Advisory: postgresql84 and postgresql security update | postgresql: SET ROLE without ADMIN OPTION allows adding and removing group members postgresql: privilege escalation via procedural language validator functions postgresql: CREATE INDEX race condition possibly leading to privilege escalation postgresql: stack-based buffer overflow in datetime input/output postgresql: integer overflows leading to buffer overflows postgresql: possible buffer overflow flaws postgresql: NULL pointer dereference | [
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server",
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2020:4274 | Red Hat Security Advisory: rh-maven35-apache-commons-collections4 security update | apache-commons-collections: InvokerTransformer code execution during deserialisation | [
"cpe:/a:redhat:rhel_software_collections:3::el7"
] | null | 7.5 | null | null |
RHSA-2024:2146 | Red Hat Security Advisory: libXpm security update | libXpm: out of bounds read in XpmCreateXpmImageFromBuffer() libXpm: out of bounds read on XPM with corrupted colormap | [
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 5.5 | null | null |
RHSA-2007:1095 | Red Hat Security Advisory: htdig security update | htdig htsearch XSS vulnerability | [
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws",
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2024:0962 | Red Hat Security Advisory: thunderbird security update | Mozilla: Out-of-bounds memory read in networking channels Mozilla: Alert dialog could have been spoofed on another site Mozilla: Fullscreen Notification could have been hidden by select element Mozilla: Custom cursor could obscure the permission dialog Mozilla: Mouse cursor re-positioned unexpectedly could have led to unintended permission grants Mozilla: Multipart HTTP Responses would accept the Set-Cookie header in response parts Mozilla: Incorrect code generation on 32-bit ARM devices Mozilla: Memory safety bugs fixed in Firefox 123, Firefox ESR 115.8, and Thunderbird 115.8 | [
"cpe:/a:redhat:rhel_eus:9.0::appstream"
] | null | 7.5 | null | null |
RHSA-2009:1692 | Red Hat Security Advisory: rhev-hypervisor security and bug fix update | kernel: flood ping cause out-of-iommu error and panic when mtu larger than 1500 kernel: KVM: x86 emulator: limit instructions to 15 bytes | [
"cpe:/o:redhat:enterprise_linux:5::hypervisor"
] | null | null | null | null |
RHSA-2024:6160 | Red Hat Security Advisory: kernel-rt security update | kernel: perf: Fix list corruption in perf_cgroup_switch() kernel: net/sched: act_api: fix possible infinite loop in tcf_idr_check_alloc() kernel: virtio-net: tap: mlx5_core short frame denial of service kernel: virtio-net: tun: mlx5_core short frame denial of service | [
"cpe:/a:redhat:rhel_tus:8.4::nfv",
"cpe:/a:redhat:rhel_tus:8.4::realtime"
] | null | 7.1 | null | null |
RHSA-2023:0638 | Red Hat Security Advisory: samba security update | samba: RC4/HMAC-MD5 NetLogon Secure Channel is weak and should be avoided | [
"cpe:/o:redhat:rhel_aus:8.2::baseos",
"cpe:/o:redhat:rhel_e4s:8.2::baseos",
"cpe:/o:redhat:rhel_tus:8.2::baseos"
] | null | 8.1 | null | null |
RHSA-2020:3638 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.2.9 on RHEL 7 security update | hibernate: SQL injection issue in Hibernate ORM resteasy: Improper validation of response header in MediaTypeHeaderDelegate.java class EAP: field-name is not parsed in accordance to RFC7230 Wildfly: Improper authorization issue in WildFlySecurityManager when using alternative protection domain Mojarra: Path traversal via either the loc parameter or the con parameter, incomplete fix of CVE-2018-14371 jackson-databind: Lacks certain xbean-reflect/JNDI blocking jackson-databind: Serialization gadgets in shaded-hikari-config jackson-databind: Serialization gadgets in ibatis-sqlmap jackson-databind: Serialization gadgets in anteros-core jackson-databind: mishandles the interaction between serialization gadgets and typing which could result in remote command execution jackson-databind: mishandles the interaction between serialization gadgets and typing which could result in remote command execution dom4j: XML External Entity vulnerability in default SAX parser Undertow: Incomplete fix for CVE-2017-2666 due to permitting invalid characters in HTTP requests hibernate-validator: Improper input validation in the interpolation of constraint error messages wildfly-elytron: session fixation when using FORM authentication wildfly: exposed setting of TCCL via the EmbeddedManagedProcess API wildfly: unsafe deserialization in Wildfly Enterprise Java Beans wildfly: Some EJB transaction objects may get accumulated causing Denial of Service wildfly: EJB SessionOpenInvocations may not be removed properly after a response is received causing Denial of Service | [
"cpe:/a:redhat:jboss_enterprise_application_platform:7.2::el7"
] | null | 6.5 | 4.8 | null |
RHSA-2025:1322 | Red Hat Security Advisory: RHTAS 1.1.1 - Red Hat Trusted Artifact Signer Release | golang.org/x/crypto/ssh: Misuse of ServerConfig.PublicKeyCallback may cause authorization bypass in golang.org/x/crypto | [
"cpe:/a:redhat:trusted_artifact_signer:1.1::el9"
] | null | 8.2 | null | null |
RHSA-2024:1802 | Red Hat Security Advisory: unbound security update | unbound: unrestricted reconfiguration enabled to anyone that may lead to local privilege escalation | [
"cpe:/a:redhat:rhel_eus:8.8::appstream"
] | null | 8 | null | null |
RHSA-2015:1979 | Red Hat Security Advisory: libreswan security and enhancement update | openswan: denial of service via IKE daemon restart when receiving a bad DH gx value | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | null | null |
RHSA-2023:7557 | Red Hat Security Advisory: kernel security and bug fix update | kernel: use after free in nvmet_tcp_free_crypto in NVMe hw: amd: Cross-Process Information Leak | [
"cpe:/o:redhat:rhel_aus:8.4::baseos",
"cpe:/o:redhat:rhel_e4s:8.4::baseos",
"cpe:/o:redhat:rhel_tus:8.4::baseos"
] | null | 6.5 | null | null |
RHSA-2023:6793 | Red Hat Security Advisory: rh-python38-python security update | python: tarfile module directory traversal pypa-setuptools: Regular Expression Denial of Service (ReDoS) in package_index.py python-wheel: remote attackers can cause denial of service via attacker controlled input to wheel cli python: CPU denial of service via inefficient IDNA decoder python-cryptography: memory corruption via immutable objects python: urllib.parse url blocklisting bypass python-requests: Unintended leak of Proxy-Authorization header python: TLS handshake bypass | [
"cpe:/a:redhat:rhel_software_collections:3::el7"
] | null | 8.6 | null | null |
RHSA-2016:0503 | Red Hat Security Advisory: python-django security update | python-django: Malicious redirect and possible XSS attack via user-supplied redirect URLs containing basic auth python-django: User enumeration through timing difference on password hasher work factor upgrade | [
"cpe:/a:redhat:openstack-optools:7::el7"
] | null | null | null | null |
RHSA-2017:3389 | Red Hat Security Advisory: Red Hat OpenShift Enterprise security, bug fix, and enhancement update | 3: authentication bypass for elasticsearch with external routes | [
"cpe:/a:redhat:openshift:3.4::el7",
"cpe:/a:redhat:openshift:3.5::el7",
"cpe:/a:redhat:openshift:3.6::el7"
] | null | null | 6.5 | null |
RHSA-2024:0024 | Red Hat Security Advisory: firefox security update | Mozilla: Heap-buffer-overflow affecting WebGL <code>DrawElementsInstanced</code> method with Mesa VM driver Mozilla: Symlinks may resolve to smaller than expected buffers Mozilla: Heap buffer overflow in <code>nsTextFragment</code> Mozilla: Use-after-free in PR_GetIdentitiesLayer Mozilla: Potential sandbox escape due to <code>VideoBridge</code> lack of texture validation Mozilla: Heap buffer overflow affected <code>nsWindow::PickerOpen(void)</code> in headless mode Mozilla: Use-after-free in <code>nsDNSService</code> Mozilla: Undefined behavior in <code>ShutdownObserver()</code> Mozilla: Memory safety bugs fixed in Firefox 121, Firefox ESR 115.6, and Thunderbird 115.6 Mozilla: Potential exposure of uninitialized data in <code>EncryptingOutputStream</code> Mozilla: Clickjacking permission prompts using the popup transition | [
"cpe:/a:redhat:rhel_eus:8.6::appstream"
] | null | 6.1 | null | null |
RHSA-2006:0617 | Red Hat Security Advisory: kernel security update | security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw | [
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2020:3501 | Red Hat Security Advisory: Red Hat Single Sign-On 7.4.2 security update | EAP: field-name is not parsed in accordance to RFC7230 keycloak: security headers missing on REST endpoints Wildfly: Improper authorization issue in WildFlySecurityManager when using alternative protection domain jackson-databind: mishandles the interaction between serialization gadgets and typing which could result in remote command execution jackson-databind: mishandles the interaction between serialization gadgets and typing which could result in remote command execution dom4j: XML External Entity vulnerability in default SAX parser Undertow: Incomplete fix for CVE-2017-2666 due to permitting invalid characters in HTTP requests hibernate-validator: Improper input validation in the interpolation of constraint error messages wildfly-elytron: session fixation when using FORM authentication wildfly: exposed setting of TCCL via the EmbeddedManagedProcess API wildfly: unsafe deserialization in Wildfly Enterprise Java Beans keycloak: DoS by sending multiple simultaneous requests with a Content-Length header value greater than actual byte count of request body netty: compression/decompression codecs don't enforce limits on buffer allocation sizes wildfly: Some EJB transaction objects may get accumulated causing Denial of Service wildfly: EJB SessionOpenInvocations may not be removed properly after a response is received causing Denial of Service | [
"cpe:/a:redhat:jboss_single_sign_on:7.4"
] | null | 6.5 | 4.8 | null |
RHSA-2025:1960 | Red Hat Security Advisory: webkit2gtk3 security update | webkitgtk: Processing maliciously crafted web content may lead to memory corruption webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash | [
"cpe:/a:redhat:rhel_aus:8.2::appstream"
] | null | 8.8 | null | null |
RHSA-2009:0421 | Red Hat Security Advisory: ghostscript security update | ghostscript: DoS (crash) in CCITTFax decoding filter ghostscript: Buffer overflow in BaseFont writer module for pdfwrite device ghostscript: Missing boundary check in Ghostscript's jbig2dec library argyllcms: Incomplete fix for CVE-2009-0583 | [
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2018:0108 | Red Hat Security Advisory: libvirt security update | An update for libvirt is now available for Red Hat Enterprise Linux 6.7 Extended Update Support.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. | [
"cpe:/o:redhat:rhel_eus:6.7::computenode",
"cpe:/o:redhat:rhel_eus:6.7::server"
] | null | null | null | null |
RHSA-2022:7006 | Red Hat Security Advisory: java-1.8.0-openjdk security update | OpenJDK: improper handling of long NTLM client hostnames (Security, 8286526) OpenJDK: insufficient randomization of JNDI DNS port numbers (JNDI, 8286910) OpenJDK: excessive memory allocation in X.509 certificate parsing (Security, 8286533) OpenJDK: HttpServer no connection count limit (Lightweight HTTP Server, 8286918) | [
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb"
] | null | 5.3 | null | null |
RHSA-2017:3372 | Red Hat Security Advisory: thunderbird security update | Mozilla: Memory safety bugs fixed in Firefox 57 and Firefox ESR 52.5 (MFSA 2017-25) Mozilla: Use-after-free of PressShell while restyling layout (MFSA 2017-25) Mozilla: Cross-origin URL information leak through Resource Timing API (MFSA 2017-25) | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation",
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 6.5 | null |
RHSA-2022:0501 | Red Hat Security Advisory: Red Hat Integration - Service Registry release and security update [2.0.3.GA] | Kafka: Timing Attack Vulnerability for Apache Kafka Connect and Clients xml-security: XPath Transform abuse allows for information disclosure | [
"cpe:/a:redhat:service_registry:2.0.3"
] | null | 7.5 | null | null |
RHSA-2016:0332 | Red Hat Security Advisory: RHEL Atomic OSTree Update 7.2.2 | RHEL Atomic OSTree Update 7.2.2 | [] | null | null | null | null |
RHSA-2015:0287 | Red Hat Security Advisory: foreman-proxy security update | foreman-proxy: failure to verify SSL certificates | [
"cpe:/a:redhat:openstack-installer:5::el6"
] | null | null | null | null |
RHSA-2016:2581 | Red Hat Security Advisory: NetworkManager security, bug fix, and enhancement update | NetworkManager: Race condition allowing info leak | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | null | null |
RHBA-2022:5876 | Red Hat Bug Fix Advisory: OpenShift Container Platform 4.10.26 extras update | prometheus/client_golang: Denial of service using InstrumentHandlerCounter | [
"cpe:/a:redhat:openshift:4.10::el8"
] | null | 7.5 | null | null |
RHSA-2024:5627 | Red Hat Security Advisory: fence-agents security update | urllib3: proxy-authorization request header is not stripped during cross-origin redirects | [
"cpe:/a:redhat:rhel_e4s:9.0::appstream",
"cpe:/a:redhat:rhel_e4s:9.0::highavailability",
"cpe:/a:redhat:rhel_e4s:9.0::resilientstorage"
] | null | 4.4 | null | null |
RHSA-2022:5479 | Red Hat Security Advisory: firefox security update | Mozilla: Undesired attributes could be set as part of prototype pollution Mozilla: CSP bypass enabling stylesheet injection Mozilla: CSP sandbox header without `allow-scripts` can be bypassed via retargeted javascript: URI Mozilla: Use-after-free in nsSHistory Mozilla: Unavailable PAC file resulted in OCSP requests being blocked Mozilla: A popup window could be resized in a way to overlay the address bar with web content Mozilla: Potential integer overflow in ReplaceElementsAt Mozilla: Memory safety bugs fixed in Firefox 102 and Firefox ESR 91.11 | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 8.8 | 7.5 | null |
RHSA-2018:2387 | Red Hat Security Advisory: kernel security and bug fix update | Kernel: hw: cpu: L1 terminal fault (L1TF) hw: cpu: speculative store bypass Kernel: hw: cpu: L1 terminal fault (L1TF) | [
"cpe:/o:redhat:rhel_eus:7.4::computenode",
"cpe:/o:redhat:rhel_eus:7.4::server"
] | null | null | 5.6 | null |
RHSA-2015:0987 | Red Hat Security Advisory: kernel security and bug fix update | Kernel: crypto: buffer overruns in RFC4106 implementation using AESNI | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | null | null |
RHSA-2024:5432 | Red Hat Security Advisory: OpenShift Container Platform 4.14.35 security update | ssh: Prefix truncation attack on Binary Packet Protocol (BPP) | [
"cpe:/a:redhat:openshift:4.14::el8",
"cpe:/a:redhat:openshift:4.14::el9"
] | null | 5.9 | null | null |
RHSA-2024:7553 | Red Hat Security Advisory: cups-filters security update | cups-filters: libcupsfilters: `cfGetPrinterAttributes` API does not perform sanitization on returned IPP attributes cups: libppd: remote command injection via attacker controlled data in PPD file cups-browsed: cups-browsed binds on UDP INADDR_ANY:631 trusting any packet from any source cups-browsed: cups-filters: cups-browsed vulnerable to DDoS amplification attack | [
"cpe:/o:redhat:rhel_els:7"
] | null | 7.5 | null | null |
RHSA-2012:1046 | Red Hat Security Advisory: php security update | php: Format string flaw in phar extension via phar_stream_flush() (MOPS-2010-024) php: zend_strndup() NULL pointer dereference may cause DoS php: XSLT file writing vulnerability php: tidy_diagnose() NULL pointer dereference may cause DoS php: strtotime timezone memory leak php: $_FILES array indexes corruption crypt(): DES encrypted password weakness php: incomplete CVE-2012-1823 fix - missing filtering of -T and -h php: Integer overflow leading to heap-buffer overflow in the Phar extension | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2020:2530 | Red Hat Security Advisory: tomcat security update | tomcat: deserialization flaw in session persistence storage leading to RCE | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 7 | null | null |
RHSA-2024:6309 | Red Hat Security Advisory: fence-agents security update | pypa/setuptools: Remote code execution via download functions in the package_index module in pypa/setuptools urllib3: proxy-authorization request header is not stripped during cross-origin redirects | [
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::highavailability",
"cpe:/a:redhat:enterprise_linux:8::resilientstorage"
] | null | 4.4 | null | null |
RHSA-2021:4039 | Red Hat Security Advisory: devtoolset-10-gcc security update | environment: Unicode's bidirectional (BiDi) override characters can cause trojan source attacks | [
"cpe:/a:redhat:rhel_software_collections:3::el7"
] | null | 8.5 | null | null |
RHSA-2004:562 | Red Hat Security Advisory: httpd security update | mod_ssl SSLCipherSuite bypass security flaw security flaw | [
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws"
] | null | null | null | null |
RHSA-2023:0978 | Red Hat Security Advisory: git security update | git: gitattributes parsing integer overflow git: Heap overflow in `git archive`, `git log --format` leading to RCE | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 9.8 | null | null |
RHSA-2012:1152 | Red Hat Security Advisory: JBoss Enterprise SOA Platform 5.3.0 security update | CSRF on jmx-console allows invocation of operations on mbeans | [
"cpe:/a:redhat:jboss_soa_platform:5.3"
] | null | null | null | null |
RHSA-2022:5473 | Red Hat Security Advisory: thunderbird security update | Mozilla: Undesired attributes could be set as part of prototype pollution Mozilla: An email with a mismatching OpenPGP signature date was accepted as valid Mozilla: CSP bypass enabling stylesheet injection Mozilla: CSP sandbox header without `allow-scripts` can be bypassed via retargeted javascript: URI Mozilla: Use-after-free in nsSHistory Mozilla: Unavailable PAC file resulted in OCSP requests being blocked Mozilla: A popup window could be resized in a way to overlay the address bar with web content Mozilla: Potential integer overflow in ReplaceElementsAt Mozilla: Memory safety bugs fixed in Firefox 102 and Firefox ESR 91.11 | [
"cpe:/a:redhat:rhel_eus:8.4::appstream"
] | null | 8.8 | 7.5 | null |
RHSA-2023:1158 | Red Hat Security Advisory: OpenShift Container Platform 4.11.31 bug fix and security update | prometheus/client_golang: Denial of service using InstrumentHandlerCounter | [
"cpe:/a:redhat:openshift:4.11::el8"
] | null | 7.5 | null | null |
RHSA-2024:4165 | Red Hat Security Advisory: pki-core security update | ca: token authentication bypass vulnerability | [
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 7.5 | null | null |
RHSA-2024:8725 | Red Hat Security Advisory: firefox security update | firefox: thunderbird: Permission leak via embed or object elements firefox: thunderbird: Use-after-free in layout with accessibility firefox: thunderbird: Confusing display of origin for external protocol handler prompt firefox: thunderbird: XSS due to Content-Disposition being ignored in multipart/x-mixed-replace response firefox: thunderbird: Origin of permission prompt could be spoofed by long URL firefox: thunderbird: Cross origin video frame leak firefox: thunderbird: History interface could have been used to cause a Denial of Service condition in the browser firefox: thunderbird: Clipboard "paste" button persisted across tabs firefox: DOM push subscription message could hang Firefox firefox: thunderbird: Memory safety bugs fixed in Firefox 132, Thunderbird 132, Firefox ESR 128.4, and Thunderbird 128.4 | [
"cpe:/a:redhat:rhel_aus:8.6::appstream",
"cpe:/a:redhat:rhel_e4s:8.6::appstream",
"cpe:/a:redhat:rhel_tus:8.6::appstream"
] | null | 8.8 | null | null |
RHSA-2010:0330 | Red Hat Security Advisory: GFS security and bug fix update | kernel: bug in GFS/GFS2 locking code leads to dos | [
"cpe:/a:redhat:rhel_global_file_system:3"
] | null | null | null | null |
RHSA-2023:1915 | Red Hat Security Advisory: emacs security update | emacs: command injection vulnerability in org-mode | [
"cpe:/a:redhat:rhel_aus:8.2::appstream",
"cpe:/a:redhat:rhel_e4s:8.2::appstream",
"cpe:/a:redhat:rhel_tus:8.2::appstream",
"cpe:/o:redhat:rhel_aus:8.2::baseos",
"cpe:/o:redhat:rhel_e4s:8.2::baseos",
"cpe:/o:redhat:rhel_tus:8.2::baseos"
] | null | 7.8 | null | null |
RHSA-2020:0597 | Red Hat Security Advisory: rh-nodejs10-nodejs security update | nodejs: Remotely trigger an assertion on a TLS server with a malformed certificate string nodejs: HTTP request smuggling using malformed Transfer-Encoding header nodejs: HTTP header values do not have trailing optional whitespace trimmed npm: Symlink reference outside of node_modules folder through the bin field upon installation npm: Arbitrary file write via constructed entry in the package.json bin field npm: Global node_modules Binary Overwrite | [
"cpe:/a:redhat:rhel_software_collections:3::el7"
] | null | 4.8 | null | null |
RHBA-2022:8256 | Red Hat Bug Fix Advisory: qatzip bug fix and enhancement update | qatzip: local privilege escalation | [
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::crb"
] | null | 7.8 | null | null |
RHSA-2016:1607 | Red Hat Security Advisory: qemu-kvm-rhev security update | Qemu: block: iscsi: buffer overflow in iscsi_aio_ioctl Qemu: virtio: unbounded memory allocation on host via guest leading to DoS | [
"cpe:/o:redhat:enterprise_linux:7::hypervisor"
] | null | null | 3.4 | null |
RHSA-2021:1024 | Red Hat Security Advisory: openssl security update | openssl: NULL pointer dereference in signature_algorithms processing openssl: CA certificate check bypass with X509_V_FLAG_X509_STRICT | [
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 7.4 | null | null |
RHSA-2023:7483 | Red Hat Security Advisory: Red Hat Single Sign-On 7.6.6 security update on RHEL 8 | keycloak: impersonation and lockout possible through incorrect handling of email trust bouncycastle: potential blind LDAP injection attack using a self-signed certificate HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack) | [
"cpe:/a:redhat:red_hat_single_sign_on:7.6::el8"
] | null | 7.5 | null | null |
RHSA-2016:2659 | Red Hat Security Advisory: java-1.6.0-ibm security update | OpenJDK: missing algorithm restrictions for jar verification (Libraries, 8155973) OpenJDK: insufficient classloader consistency checks in ClassLoaderWithRepository (JMX, 8157739) JDK: unspecified vulnerability fixed in 6u131, 7u121, and 8u111 (2D) OpenJDK: insufficient checks of JDWP packets (Hotspot, 8159519) OpenJDK: exposure of server authentication credentials to proxy (Networking, 8160838) | [
"cpe:/a:redhat:rhel_extras:5::client",
"cpe:/a:redhat:rhel_extras:5::server",
"cpe:/a:redhat:rhel_extras:6"
] | null | null | 5.3 | null |
RHSA-2019:4113 | Red Hat Security Advisory: java-1.8.0-ibm security update | OpenJDK: Missing restrictions on use of custom SocketImpl (Networking, 8218573) OpenJDK: NULL pointer dereference in DrawGlyphList (2D, 8222690) OpenJDK: Unexpected exception thrown by Pattern processing crafted regular expression (Concurrency, 8222684) OpenJDK: Unexpected exception thrown by XPathParser processing crafted XPath expression (JAXP, 8223505) OpenJDK: Unexpected exception thrown during regular expression processing in Nashorn (Scripting, 8223518) OpenJDK: Incorrect handling of nested jar: URLs in Jar URL handler (Networking, 8223892) OpenJDK: Unexpected exception thrown by XPath processing crafted XPath expression (JAXP, 8224532) OpenJDK: Unexpected exception thrown during Font object deserialization (Serialization, 8224915) OpenJDK: Integer overflow in bounds check in SunGraphics2D (2D, 8225292) OpenJDK: Incorrect handling of HTTP proxy responses in HttpURLConnection (Networking, 8225298) OpenJDK: Excessive memory allocation in CMap when reading TrueType font (2D, 8225597) JDK: unspecified vulnerability fixed in 8u221 (Deployment) OpenJDK: Insufficient filtering of HTML event attributes in Javadoc (Javadoc, 8226765) JDK: Unrestricted access to diagnostic operations | [
"cpe:/a:redhat:rhel_extras:6"
] | null | null | 8.4 | null |
RHSA-2013:1043 | Red Hat Security Advisory: richfaces security update | RichFaces: Remote code execution due to insecure deserialization | [
"cpe:/a:redhat:jboss_enterprise_web_platform:5::el4",
"cpe:/a:redhat:jboss_enterprise_web_platform:5::el5",
"cpe:/a:redhat:jboss_enterprise_web_platform:5::el6"
] | null | null | null | null |
RHSA-2013:0520 | Red Hat Security Advisory: dovecot security and bug fix update | dovecot: authenticated remote bypass of intended access restrictions dovecot: directory traversal due to not obeying chroot directive dovecot: proxy destination host name not checked against SSL certificate name | [
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2023:1044 | Red Hat Security Advisory: Red Hat Single Sign-On 7.6.2 security update on RHEL 8 | bootstrap: Cross-site Scripting (XSS) in the collapse data-parent attribute bootstrap: Cross-site Scripting (XSS) in the data-container property of tooltip jquery: Prototype pollution in object's prototype leading to denial of service, remote code execution, or property injection jquery: Cross-site scripting due to improper injQuery.htmlPrefilter method jquery: Untrusted code execution via <option> tag in HTML passed to DOM manipulation methods glob-parent: Regular Expression Denial of Service minimist: prototype pollution keycloak: HTML injection in execute-actions-email Admin REST API keycloak: XSS on impersonation under specific circumstances SnakeYaml: Constructor Deserialization Remote Code Execution Undertow: DoS can be achieved as Undertow server waits for the LAST_CHUNK forever for EJB invocations keycloak: Session takeover with OIDC offline refreshtokens keycloak: reflected XSS attack Moment.js: Path traversal in moment.locale snakeyaml: Denial of Service due to missing nested depth limitation for collections moment: inefficient parsing algorithm resulting in DoS loader-utils: Regular expression denial of service snakeyaml: Uncaught exception in org.yaml.snakeyaml.composer.Composer.composeSequenceNode snakeyaml: Uncaught exception in org.yaml.snakeyaml.constructor.BaseConstructor.constructObject snakeyaml: Uncaught exception in java.base/java.util.regex.Pattern$Ques.match jettison: parser crash by stackoverflow jettison: memory exhaustion via user-supplied XML or JSON data jackson-databind: deep wrapper array nesting wrt UNWRAP_SINGLE_VALUE_ARRAYS jackson-databind: use of deeply nested arrays mina-sshd: Java unsafe deserialization vulnerability jettison: If the value in map is the map's self, the new new JSONObject(map) cause StackOverflowError which may lead to dos json5: Prototype Pollution in JSON5 via Parse Method CXF: directory listing / code exfiltration CXF: SSRF Vulnerability keycloak: Client Registration endpoint does not check token revocation keycloak: user impersonation via stolen uuid code | [
"cpe:/a:redhat:red_hat_single_sign_on:7.6::el8"
] | null | 4.6 | 5.6 | null |
RHSA-2016:2915 | Red Hat Security Advisory: atomic-openshift security and bug fix update | 3: Pulling of any image is possible with it manifest | [
"cpe:/a:redhat:openshift:3.1::el7",
"cpe:/a:redhat:openshift:3.2::el7",
"cpe:/a:redhat:openshift:3.3::el7"
] | null | null | 3.1 | null |
RHSA-2020:4709 | Red Hat Security Advisory: librsvg2 security update | librsvg: Resource exhaustion via crafted SVG file with nested patterns | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 6.5 | null | null |
RHSA-2018:0061 | Red Hat Security Advisory: thunderbird security update | Mozilla: From address with encoded null character is cut off in message header display Mozilla: JavaScript Execution via RSS in mailbox:// origin Mozilla: Local path string can be leaked from RSS feed Mozilla: RSS Feed vulnerable to new line Injection | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation",
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 5.3 | null |
RHSA-2014:0680 | Red Hat Security Advisory: openssl098e security update | openssl: SSL/TLS MITM vulnerability | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | null | null |
RHSA-2024:5584 | Red Hat Security Advisory: libreoffice security update | libreoffice: Ability to trust not validated macro signatures removed in high security mode | [
"cpe:/a:redhat:rhel_e4s:9.0::appstream"
] | null | 7.8 | null | null |
RHSA-2023:5737 | Red Hat Security Advisory: java-11-openjdk security update | OpenJDK: certificate path validation issue during client authentication (8309966) | [
"cpe:/a:redhat:rhel_e4s:8.1::appstream"
] | null | 5.3 | null | null |
RHSA-2023:4918 | Red Hat Security Advisory: Red Hat Single Sign-On 7.6.5 security update on RHEL 7 | jackson-databind: Possible DoS if using JDK serialization to serialize JsonNode jettison: Uncontrolled Recursion in JSONArray undertow: OutOfMemoryError due to @MultipartConfig handling | [
"cpe:/a:redhat:red_hat_single_sign_on:7.6::el7"
] | null | 7.5 | null | null |
RHSA-2021:1069 | Red Hat Security Advisory: kpatch-patch security update | kernel: out-of-bounds read in libiscsi module kernel: heap buffer overflow in the iSCSI subsystem | [
"cpe:/o:redhat:enterprise_linux:7::server"
] | null | 7.8 | null | null |
RHSA-2019:2162 | Red Hat Security Advisory: blktrace security update | blktrace: buffer overflow in the dev_map_read function in btt/devmap.c | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 4.8 | null |
RHSA-2021:2396 | Red Hat Security Advisory: rh-postgresql13-postgresql security update | postgresql: Buffer overrun from integer overflow in array subscripting calculations postgresql: Memory disclosure in INSERT ... ON CONFLICT ... DO UPDATE postgresql: Memory disclosure in partitioned-table UPDATE ... RETURNING | [
"cpe:/a:redhat:rhel_software_collections:3::el7"
] | null | 6.5 | null | null |
RHSA-2024:3309 | Red Hat Security Advisory: glibc security update | glibc: Out of bounds write in iconv may lead to remote code execution glibc: stack-based buffer overflow in netgroup cache glibc: null pointer dereferences after failed netgroup cache insertion glibc: netgroup cache may terminate daemon on memory allocation failure glibc: netgroup cache assumes NSS callback uses in-buffer strings | [
"cpe:/a:redhat:rhel_aus:8.4::appstream",
"cpe:/a:redhat:rhel_e4s:8.4::appstream",
"cpe:/a:redhat:rhel_tus:8.4::appstream",
"cpe:/o:redhat:rhel_aus:8.4::baseos",
"cpe:/o:redhat:rhel_e4s:8.4::baseos",
"cpe:/o:redhat:rhel_tus:8.4::baseos"
] | null | 4 | null | null |
RHSA-2008:0042 | Red Hat Security Advisory: tomcat security update | Apache Tomcat's default security policy is too open Absolute path traversal Apache Tomcat WEBDAV | [
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHBA-2013:0571 | Red Hat Bug Fix Advisory: Red Hat Update Infrastructure 2.1.1 bug fix update | pulp /etc/pulp/pulp.conf world readable, contains default admin password | [
"cpe:/a:redhat:rhui:2::el6"
] | null | null | null | null |
RHSA-2020:0202 | Red Hat Security Advisory: java-1.8.0-openjdk security update | OpenJDK: Incorrect exception processing during deserialization in BeanContextSupport (Serialization, 8224909) OpenJDK: Improper checks of SASL message properties in GssKrb5Base (Security, 8226352) OpenJDK: Incorrect isBuiltinStreamHandler check causing URL normalization issues (Networking, 8228548) OpenJDK: Use of unsafe RSA-MD5 checksum in Kerberos TGS (Security, 8229951) OpenJDK: Serialization filter changes via jdk.serialFilter property modification (Serialization, 8231422) OpenJDK: Excessive memory usage in OID processing in X.509 certificate parsing (Libraries, 8234037) OpenJDK: Incomplete enforcement of maxDatagramSockets limit in DatagramChannelImpl (Networking, 8231795) | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 3.7 | null | null |
RHSA-2024:3316 | Red Hat Security Advisory: Migration Toolkit for Applications security and bug fix update | follow-redirects: Improper Input Validation due to the improper handling of URLs by the url.parse() css-tools: Improper Input Validation causes Denial of Service via Regular Expression golang: net/http/internal: Denial of Service (DoS) via Resource Consumption via HTTP requests go-resty: HTTP request body disclosure in github.com/go-resty/resty/v2 golang: crypto/tls: Timing Side Channel attack in RSA based TLS key exchanges. golang: net/http, x/net/http2: unlimited number of CONTINUATION frames causes DoS axios: exposure of confidential data stored in cookies css-tools: regular expression denial of service (ReDoS) when parsing CSS golang-protobuf: encoding/protojson, internal/encoding/json: infinite loop in protojson.Unmarshal when unmarshaling certain forms of invalid JSON follow-redirects: Possible credential leak webpack-dev-middleware: lack of URL validation may lead to file leak | [
"cpe:/a:redhat:migration_toolkit_applications:7.0::el8",
"cpe:/a:redhat:migration_toolkit_applications:7.0::el9"
] | null | 7.4 | null | null |
RHSA-2022:0291 | Red Hat Security Advisory: parfait:0.5 security update | log4j: Remote code execution in Log4j 1.x when application is configured to use JMSAppender log4j: Remote code execution in Log4j 1.x when application is configured to use JMSSink log4j: SQL injection in Log4j 1.x when application is configured to use JDBCAppender log4j: Unsafe deserialization flaw in Chainsaw log viewer | [
"cpe:/a:redhat:rhel_eus:8.2::appstream"
] | null | 8.8 | null | null |
RHSA-2018:3738 | Red Hat Security Advisory: ruby security update | ruby: OpenSSL::X509:: Name equality check does not work correctly | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 7.5 | null |
RHSA-2022:7623 | Red Hat Security Advisory: dovecot security update | dovecot: Privilege escalation when similar master and non-master passdbs are used | [
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb"
] | null | 6.8 | null | null |
RHSA-2007:0065 | Red Hat Security Advisory: bluez-utils security update | security flaw | [
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2007:1083 | Red Hat Security Advisory: thunderbird security update | jar: protocol XSS Multiple flaws in Firefox Mozilla Cross-site Request Forgery flaw | [
"cpe:/a:redhat:rhel_productivity:5",
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws",
"cpe:/o:redhat:enterprise_linux:5::client"
] | null | null | null | null |
RHSA-2024:0322 | Red Hat Security Advisory: Red Hat Ansible Automation Platform 2.4 Product Security and Bug Fix Update | GitPython: Blind local file inclusion python-twisted: disordered HTTP pipeline response in twisted.web | [
"cpe:/a:redhat:ansible_automation_platform:2.4::el8",
"cpe:/a:redhat:ansible_automation_platform:2.4::el9"
] | null | 5.3 | null | null |
RHSA-2014:0285 | Red Hat Security Advisory: kernel security, bug fix, and enhancement update | kernel: exec/ptrace: get_dumpable() incorrect tests kernel: ipc: ipc_rcu_putref refcount races kernel: xen: hypercalls exposed to privilege rings 1 and 2 of HVM guests Kernel: qeth: buffer overflow in snmp ioctl Kernel: AACRAID Driver compat IOCTL missing capability check hw: AMD CPU erratum may cause core hang Kernel: net: leakage of uninitialized memory to user-space via recv syscalls | [
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2017:1222 | Red Hat Security Advisory: java-1.6.0-ibm security update | zlib: Out-of-bounds pointer arithmetic in inftrees.c zlib: Out-of-bounds pointer arithmetic in inffast.c zlib: Undefined left shift of negative number zlib: Big-endian out-of-bounds pointer JDK: XML External Entity Injection (XXE) error when processing XML data OpenJDK: improper re-use of NTLM authenticated connections (Networking, 8163520) OpenJDK: newline injection in the FTP client (Networking, 8170222) OpenJDK: MD5 allowed for jar verification (Security, 8171121) OpenJDK: newline injection in the SMTP client (Networking, 8171533) | [
"cpe:/a:redhat:rhel_extras:6"
] | null | null | 3.7 | null |
RHSA-2015:0854 | Red Hat Security Advisory: java-1.8.0-oracle security update | jar: directory traversal vulnerability JDK: unspecified vulnerability fixed in 6u95, 7u79 and 8u45 (Deployment) JDK: unspecified vulnerability fixed in 5.0u85, 6u95, 7u79 and 8u45 (2D) OpenJDK: incorrect handling of phantom references (Hotspot, 8071931) ICU: layout engine glyphStorage off-by-one (OpenJDK 2D, 8067699) OpenJDK: incorrect handling of default methods (Hotspot, 8065366) OpenJDK: incorrect permissions check in resource loading (Beans, 8068320) OpenJDK: insufficient hardening of RSA-CRT implementation (JCE, 8071726) OpenJDK: jar directory traversal issues (Tools, 8064601) JDK: unspecified vulnerability fixed in 7u79 and 8u45 (JavaFX) JDK: unspecified vulnerability fixed in 8u45 (Deployment) OpenJDK: certificate options parsing uncaught exception (JSSE, 8068720) JDK: unspecified vulnerability fixed in 5.0u85, 6u95, 7u79 and 8u45 (2D) JDK: unspecified vulnerability fixed in 7u79 and 8u45 (JavaFX) | [
"cpe:/a:redhat:rhel_extras_oracle_java:6",
"cpe:/a:redhat:rhel_extras_oracle_java:7"
] | null | null | null | null |
RHSA-2022:0415 | Red Hat Security Advisory: Red Hat Single Sign-On 7.5.1 for OpenShift image security and enhancement update | undertow: client side invocation timeout raised when calling over HTTP2 | [
"cpe:/a:redhat:rhosemc:1.0::el8"
] | null | 7.5 | null | null |
RHSA-2016:2069 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 6.4.11 update on RHEL 7 | tomcat: Usage of vulnerable FileUpload package can result in denial of service | [
"cpe:/a:redhat:jboss_enterprise_application_platform:6::el7"
] | null | null | 7.5 | null |
RHSA-2024:3319 | Red Hat Security Advisory: kernel security update | hw: Intel: Gather Data Sampling (GDS) side channel vulnerability kernel: nf_tables: use-after-free vulnerability in the nft_verdict_init() function | [
"cpe:/o:redhat:rhel_aus:7.7::server"
] | null | 7.8 | null | null |
RHSA-2020:5527 | Red Hat Security Advisory: Red Hat Single Sign-On 7.4.4 security update on RHEL 7 | keycloak: Account REST API can update user metadata attributes | [
"cpe:/a:redhat:red_hat_single_sign_on:7::el7"
] | null | 4.2 | null | null |
RHSA-2023:7883 | Red Hat Security Advisory: postgresql:15 security update | postgresql: Memory disclosure in aggregate function calls postgresql: Buffer overrun from integer overflow in array modification postgresql: Role pg_signal_backend can signal certain superuser processes. postgresql: extension script @substitutions@ within quoting allow SQL injection postgresql: MERGE fails to enforce UPDATE or SELECT row security policies | [
"cpe:/a:redhat:rhel_eus:8.8::appstream"
] | null | 3.1 | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.