id
stringlengths 13
15
| title
stringlengths 29
176
| description
stringlengths 8
32.1k
| cpes
sequencelengths 0
20
| cvss_v4_0
null | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
null |
---|---|---|---|---|---|---|---|
RHSA-2004:467 | Red Hat Security Advisory: samba security update | security flaw security flaw | [
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws"
] | null | null | null | null |
RHSA-2018:2731 | Red Hat Security Advisory: spice and spice-gtk security update | spice: Missing check in demarshal.py:write_validate_array_item() allows for buffer overflow and denial of service | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 8.3 | null |
RHSA-2024:7137 | Red Hat Security Advisory: python39:3.9 security update | cpython: python: email module doesn't properly quotes newlines in email headers, allowing header injection | [
"cpe:/a:redhat:rhel_aus:8.4::appstream",
"cpe:/a:redhat:rhel_e4s:8.4::appstream",
"cpe:/a:redhat:rhel_tus:8.4::appstream"
] | null | 6.8 | null | null |
RHSA-2019:0269 | Red Hat Security Advisory: thunderbird security update | libical: Multiple use-after-free vulnerabilities Mozilla: Use-after-free parsing HTML5 stream Mozilla: Memory safety bugs fixed in Firefox 65 and Firefox ESR 60.5 Mozilla: Privilege escalation through IPC channel messages | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | 10 | null |
RHSA-2024:3998 | Red Hat Security Advisory: curl security update | curl: HTTP/2 push headers memory-leak | [
"cpe:/a:redhat:rhel_eus:9.2::appstream",
"cpe:/o:redhat:rhel_eus:9.2::baseos"
] | null | 7.5 | null | null |
RHSA-2013:1507 | Red Hat Security Advisory: java-1.7.0-ibm security update | OpenJDK: java.util.TimeZone does not restrict setting of default time zone (Libraries, 8001029) JDK: unspecified sandbox bypass (JVM) JDK: XML4J xml entity expansion excessive memory use (XML) JDK: unspecified sandbox bypass (XML) JDK: unspecified sandbox bypass (ORB) JDK: unspecified sandbox bypass (ORB) JDK: unspecified sandbox bypass (XML) OpenJDK: insufficient html escaping in jhat (jhat, 8011081) OpenJDK: Inet6Address class IPv6 address processing errors (Libraries, 8015743) JDK: unspecified vulnerability fixed in 7u45 (Deployment) OpenJDK: image conversion out of bounds read (2D, 8014102) OpenJDK: key data leak via toString() methods (Libraries, 8011071) OpenJDK: Incorrect awt_getPixelByte/awt_getPixelShort/awt_setPixelByte/awt_setPixelShort image raster checks (2D, 8014093) OpenJDK: JTable not properly performing certain access checks (Swing, 8013744) OpenJDK: insufficient InterfaceImplementor security checks (Scripting, 8017299) JDK: unspecified vulnerability fixed in 7u45 (Deployment) JDK: unspecified vulnerability fixed in 7u45 (Deployment) JDK: unspecified vulnerability fixed in 7u45 (Deployment) OpenJDK: insufficient security checks (Beans, 8012071) OpenJDK: insufficient escaping of window title string (Javadoc, 8016675) OpenJDK: default keytab path information leak (JGSS, 8022931) JDK: unspecified vulnerability fixed in 7u45 (2D) OpenJDK: javax.xml.transform.TransformerFactory does not properly honor XMLConstants.FEATURE_SECURE_PROCESSING (JAXP, 8012425) OpenJDK: insufficient checks of KDC replies (JGSS, 8014341) OpenJDK: javac does not ignore certain ignorable characters (Javadoc, 8016653) OpenJDK: JPEGImageReader and JPEGImageWriter missing band size checks (2D, 8013510) JDK: unspecified vulnerability fixed in 7u45 (Deployment) OpenJDK: RMIConnection stub missing permission check (CORBA, 8011157) OpenJDK: VersionHelper12 does not honor modifyThreadGroup restriction (JNDI, 8013739) JDK: unspecified vulnerability fixed in 7u45 (Deployment) JDK: unspecified vulnerability fixed in 7u45 (Deployment) OpenJDK: insufficient security checks (JAXWS, 8017505) OpenJDK: com.sun.org.apache.xml.internal.security.utils.UnsyncByteArrayOutputStream Denial of Service (Security, 8021290) JDK: unspecified vulnerability fixed in 7u45 (Deployment) OpenJDK: XML parsing Denial of Service (JAXP, 8014530) OpenJDK: Java2d Disposer security bypass (2D, 8017287) OpenJDK: checkPackageAccess missing security check (Libraries, 8017291) JDK: unspecified vulnerability fixed in 7u45 (Deployment) JDK: unspecified vulnerability fixed in 7u45 (Deployment) OpenJDK: Vulnerability in Libraries component (Libraries, 7023639) OpenJDK: getDeclaringClass() information leak (Libraries, 8014349) OpenJDK: ObjectInputStream/ObjectOutputStream missing checks (Libraries, 8014987) JDK: unspecified vulnerability fixed in 7u45 (2D) JDK: unspecified vulnerability fixed in 7u45 (Deployment) OpenJDK: insufficient DataFlavor security checks (AWT, 8012277) OpenJDK: Missing CORBA security checks (Libraries, 8017196) OpenJDK: XML stream factory finder information leak (JAXP, 8013502) | [
"cpe:/a:redhat:rhel_extras:5::client",
"cpe:/a:redhat:rhel_extras:5::server",
"cpe:/a:redhat:rhel_extras:6"
] | null | null | null | null |
RHSA-2014:1284 | Red Hat Security Advisory: Red Hat JBoss Data Virtualization 6.0.0 security update | Teiid: XML eXternal Entity (XXE) flaw in SQL/XML parsing | [
"cpe:/a:redhat:jboss_data_virtualization:6.0"
] | null | null | null | null |
RHSA-2020:1100 | Red Hat Security Advisory: mariadb security and bug fix update | mysql: Server: Pluggable Auth unspecified vulnerability (CPU Jul 2019) mysql: Server: Security: Privileges unspecified vulnerability (CPU Jul 2019) mysql: Server: XML unspecified vulnerability (CPU Jul 2019) mysql: Server: Parser unspecified vulnerability (CPU Jul 2019) mysql: C API unspecified vulnerability (CPU Apr 2020) mysql: C API unspecified vulnerability (CPU Jan 2021) | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 3.7 | 3.7 | null |
RHSA-2017:0083 | Red Hat Security Advisory: qemu-kvm security and bug fix update | Qemu: net: out of bounds read in net_checksum_calculate() | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 4.7 | null |
RHSA-2022:6998 | Red Hat Security Advisory: thunderbird security update | expat: a use-after-free in the doContent function in xmlparse.c | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 8.1 | null | null |
RHSA-2020:2441 | Red Hat Security Advisory: OpenShift Container Platform 4.3.25 openshift-enterprise-hyperkube-container security update | kubernetes: Server side request forgery (SSRF) in kube-controller-manager allows users to leak secret information | [
"cpe:/a:redhat:openshift:4.3::el7"
] | null | 6.3 | null | null |
RHSA-2023:1885 | Red Hat Security Advisory: OpenJDK 17.0.7 Security Update for Windows Builds | OpenJDK: improper connection handling during TLS handshake (8294474) OpenJDK: missing string checks for NULL characters (8296622) OpenJDK: incorrect handling of NULL characters in ProcessBuilder (8295304) OpenJDK: Swing HTML parsing issue (8296832) OpenJDK: incorrect enqueue of references in garbage collector (8298191) OpenJDK: certificate validation issue in TLS session negotiation (8298310) OpenJDK: missing check for slash characters in URI-to-path conversion (8298667) | [
"cpe:/a:redhat:openjdk:17::windows"
] | null | 3.7 | null | null |
RHSA-2024:7812 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.4 security update | apache-avro: Schema parsing may trigger Remote Code Execution (RCE) | [
"cpe:/a:redhat:jboss_enterprise_application_platform:7.4"
] | null | 8.8 | null | null |
RHSA-2023:4505 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform security update | jackson-databind: Possible DoS if using JDK serialization to serialize JsonNode jettison: Uncontrolled Recursion in JSONArray undertow: OutOfMemoryError due to @MultipartConfig handling | [
"cpe:/a:redhat:jboss_enterprise_application_platform:7.4::el7"
] | null | 7.5 | null | null |
RHSA-2023:2177 | Red Hat Security Advisory: grafana-pcp security and enhancement update | golang: net/http: handle server errors after sending GOAWAY | [
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 6.5 | null | null |
RHSA-2016:2090 | Red Hat Security Advisory: java-1.6.0-sun security update | OpenJDK: missing algorithm restrictions for jar verification (Libraries, 8155973) OpenJDK: insufficient classloader consistency checks in ClassLoaderWithRepository (JMX, 8157739) JDK: unspecified vulnerability fixed in 6u131, 7u121, and 8u111 (2D) OpenJDK: insufficient checks of JDWP packets (Hotspot, 8159519) OpenJDK: incomplete type checks of System.arraycopy arguments (Hotspot, 8160591) OpenJDK: exposure of server authentication credentials to proxy (Networking, 8160838) | [
"cpe:/a:redhat:rhel_extras_oracle_java:5",
"cpe:/a:redhat:rhel_extras_oracle_java:6",
"cpe:/a:redhat:rhel_extras_oracle_java:7"
] | null | null | 5.3 | null |
RHSA-2023:0101 | Red Hat Security Advisory: kernel security and bug fix update | kernel: memory corruption in AX88179_178A based USB ethernet device. kernel: i915: Incorrect GPU TLB flush can lead to random memory access | [
"cpe:/a:redhat:enterprise_linux:8::crb",
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 7 | null | null |
RHSA-2009:0981 | Red Hat Security Advisory: util-linux security and bug fix update | util-linux: audit log injection via login | [
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2024:10834 | Red Hat Security Advisory: ruby:3.1 security update | rexml: REXML ReDoS vulnerability | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 7.5 | null | null |
RHSA-2017:2469 | Red Hat Security Advisory: java-1.8.0-ibm security update | JDK: class verifier allowing Security Manager bypass OpenJDK: reading of unprocessed image data in JPEGImageReader (2D, 8169209) OpenJDK: JAR verifier incorrect handling of missing digest (Security, 8169392) OpenJDK: Nashorn incompletely blocking access to Java APIs (Scripting, 8171539) OpenJDK: insufficient access control checks in ThreadPoolExecutor (Libraries, 8172204) OpenJDK: insufficient access control checks in ServiceRegistry (ImageIO, 8172461) OpenJDK: insufficient access control checks in AsynchronousChannelGroupImpl (8172465, Libraries) OpenJDK: insufficient access control checks in XML transformations (JAXP, 8172469) OpenJDK: unrestricted access to com.sun.org.apache.xml.internal.resolver (JAXP, 8173286) OpenJDK: incorrect handling of references in DGC (RMI, 8163958) JDK: unspecified vulnerability fixed in 6u161, 7u151, and 8u141 (Deployment) OpenJDK: insufficient access control checks in ActivationID (RMI, 8173697) OpenJDK: unbounded memory allocation in BasicAttribute deserialization (Serialization, 8174105) OpenJDK: unbounded memory allocation in CodeSource deserialization (Serialization, 8174113) OpenJDK: insufficient access control checks in ImageWatched (AWT, 8174098) OpenJDK: DSA implementation timing attack (JCE, 8175106) OpenJDK: LDAPCertStore following referrals to non-LDAP URLs (Security, 8176067) OpenJDK: insecure XML parsing in wsdlimport (JAX-WS, 8182054) | [
"cpe:/a:redhat:rhel_extras:6",
"cpe:/a:redhat:rhel_extras:7"
] | null | null | 6.5 | null |
RHSA-2024:3627 | Red Hat Security Advisory: kernel-rt security and bug fix update | kernel: use after free in i2c kernel: media: dvbdev: Fix memory leak in dvb_media_device_free() kernel: i2c: validate user data in compat ioctl kernel: net:emac/emac-mac: Fix a use after free in emac_mac_tx_buf_send kernel: mtd: require write permissions for locking and badblock ioctls kernel: pid: take a reference when initializing `cad_pid` kernel: i2c: i801: Don't generate an interrupt on bus reset kernel: net: usb: fix memory leak in smsc75xx_bind kernel: tty: tty_buffer: Fix the softlockup issue in flush_to_ldisc kernel: vt: fix memory overlapping when deleting chars in the buffer kernel: Marvin vulnerability side-channel leakage in the RSA decryption operation kernel: uio: Fix use-after-free in uio_open kernel: pvrusb2: fix use after free on context disconnection kernel: usb: hub: Guard against accesses to uninitialized BOS descriptors kernel: RDMA/siw: Fix connection failure handling kernel: platform/x86: think-lmi: Fix reference leak kernel: net: usb: smsc75xx: Fix uninit-value access in __smsc75xx_read_reg kernel: media: uvcvideo: out-of-bounds read in uvc_query_v4l2_menu() kernel: net: bridge: data races indata-races in br_handle_frame_finish() kernel: wifi: ath9k: Fix potential array-index-out-of-bounds read in ath9k_htc_txstatus() kernel: wifi: rt2x00: restart beacon queue when hardware reset kernel: net/sched: act_ct: fix skb leak and crash on ooo frags kernel: Information disclosure in vhost/vhost.c:vhost_new_msg() kernel: Integer Overflow in raid5_cache_count kernel: untrusted VMM can trigger int80 syscall handling kernel: i2c: i801: Fix block process call transactions kernel: x86/fpu: Stop relying on userspace for info to fault in xsave buffer that cause loop forever kernel: wifi: iwlwifi: fix a memory corruption kernel: net/smc: fix illegal rmb_desc access in SMC-D connection dump kernel: netfilter: nf_tables: disallow anonymous set with timeout flag kernel: netfilter: nf_tables: mark set as dead when unbinding anonymous set with timeout kernel: xhci: handle isoc Babble and Buffer Overrun events properly kernel: hwmon: (coretemp) Fix out-of-bounds memory access kernel: wifi: iwlwifi: mvm: fix a crash when we run out of stations kernel: wifi: iwlwifi: fix double-free bug kernel: RDMA/qedr: Fix qedr_create_user_qp error flow kernel: RDMA/srpt: Support specifying the srpt_service_guid parameter kernel: wifi: mac80211: fix race condition on enabling fast-xmit kernel: RDMA/srpt: Do not register event handler until srpt device is fully setup kernel: wifi: mt76: mt7921e: fix use-after-free in free_irq() kernel: wifi: ath9k: delay all of ath9k_wmi_event_tasklet() until init is complete kernel: do_sys_name_to_handle(): use kzalloc() to fix kernel-infoleak kernel: usb: ulpi: Fix debugfs directory leak kernel: USB: core: Fix deadlock in port "disable" sysfs attribute kernel: USB: core: Fix deadlock in usb_deauthorize_interface() kernel: usb: xhci: Add error handling in xhci_map_urb_for_dma kernel: fat: fix uninitialized field in nostale filehandles kernel: fs: sysfs: Fix reference leak in sysfs_break_active_protection() kernel: net/mlx5e: Prevent deadlock while disabling aRFS kernel: wifi: brcm80211: handle pmk_op allocation failure kernel: wifi: rtl8xxxu: add cancel_work_sync() for c2hcmd_work kernel: wifi: iwlwifi: mvm: ensure offloading TID queue exists kernel: USB: usb-storage: Prevent divide-by-0 error in isd200_ata_command | [
"cpe:/a:redhat:enterprise_linux:8::nfv",
"cpe:/a:redhat:enterprise_linux:8::realtime"
] | null | 5.5 | null | null |
RHSA-2012:1543 | Red Hat Security Advisory: CloudForms System Engine 1.1 update | katello: pulp admin password logged in plaintext in world-readable katello/production.log pulp /etc/pulp/pulp.conf world readable, contains default admin password Katello: lack of authorization in proxies_controller.rb grinder: /var/lib/pulp/cache/grinder directory is world-writeable | [
"cpe:/a:cloudforms_systemengine:1::el6",
"cpe:/a:cloudforms_tools:1::el5",
"cpe:/a:cloudforms_tools:1::el6"
] | null | null | null | null |
RHSA-2023:5214 | Red Hat Security Advisory: libwebp security update | libwebp: Heap buffer overflow in WebP Codec libwebp: out-of-bounds write with a specially crafted WebP lossless file | [
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::crb"
] | null | 0 | null | null |
RHSA-2012:0309 | Red Hat Security Advisory: sudo security and bug fix update | sudo: does not ask for password on GID changes | [
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2024:8127 | Red Hat Security Advisory: java-21-openjdk security update | giflib: Heap-Buffer Overflow during Image Saving in DumpScreen2RGB Function JDK: HTTP client improper handling of maxHeaderSize (8328286) JDK: Array indexing integer overflow (8328544) JDK: Unbounded allocation leads to out-of-memory error (8331446) JDK: Integer conversion error leads to incorrect range check (8332644) | [
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb",
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::crb"
] | null | 4.8 | null | null |
RHSA-2011:0506 | Red Hat Security Advisory: rdesktop security update | rdesktop remote file access | [
"cpe:/o:redhat:enterprise_linux:5::server",
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2024:5322 | Red Hat Security Advisory: firefox security update | mozilla: Fullscreen notification dialog can be obscured by document content mozilla: Out of bounds memory access in graphics shared memory handling mozilla: Type confusion in WebAssembly mozilla: Incomplete WebAssembly exception handing mozilla: Out of bounds read in editor component mozilla: CSP strict-dynamic bypass using web-compatibility shims mozilla: Missing permission check when creating a StreamFilter mozilla: Uninitialized memory used by WebGL mozilla: Use-after-free in JavaScript garbage collection mozilla: Use-after-free in IndexedDB mozilla: Document content could partially obscure security prompts | [
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 6.1 | null | null |
RHSA-2014:1891 | Red Hat Security Advisory: Red Hat JBoss BRMS 6.0.3 security update | CXF: SSL hostname verification bypass, incomplete CVE-2012-5783 fix CXF: SSL hostname verification bypass, incomplete CVE-2012-6153 fix | [
"cpe:/a:redhat:jboss_brms:6.0"
] | null | null | 4.8 | null |
RHSA-2023:5165 | Red Hat Security Advisory: Red Hat AMQ Streams 2.5.0 release and security update | netty-codec: Bzip2Decoder doesn't allow setting size restrictions for decompressed data netty-codec: SnappyFrameDecoder doesn't restrict chunk length and may buffer skippable chunks in an unnecessary way SnakeYaml: Constructor Deserialization Remote Code Execution netty: world readable temporary file containing sensitive data scala: deserialization gadget chain RESTEasy: creation of insecure temp files guava: insecure temporary directory creation okio: GzipSource class improper exception handling jetty-server: OutOfMemoryError for large multipart without filename read via request.getParameter() jetty-server: Cookie parsing of quoted values can exfiltrate values from other cookies bouncycastle: potential blind LDAP injection attack using a self-signed certificate snappy-java: Integer overflow in shuffle leads to DoS snappy-java: Integer overflow in compress leads to DoS snappy-java: Unchecked chunk length leads to DoS netty: SniHandler 16MB allocation leads to OOM | [
"cpe:/a:redhat:amq_streams:2"
] | null | 6.5 | null | null |
RHSA-2025:3368 | Red Hat Security Advisory: RHOAI 2.16.0 - Red Hat OpenShift AI | cross-spawn: regular expression denial of service path-to-regexp: Backtracking regular expressions cause ReDoS golang.org/x/net/html: Non-linear parsing of case-insensitive content in golang.org/x/net/html github.com/golang/glog: Vulnerability when creating log files in github.com/golang/glog path-to-regexp: path-to-regexp Unpatched `path-to-regexp` ReDoS in 0.1.x nanoid: nanoid mishandles non-integer values libxml2: Use-After-Free in libxml2 jinja2: Jinja has a sandbox breakout through malicious filenames undici: Undici Uses Insufficiently Random Values libxml2: Stack-based buffer overflow in xmlSnprintfElements of libxml2 dompurify: Mutation XSS in DOMPurify Due to Improper Template Literal Handling | [
"cpe:/a:redhat:openshift_ai:2.16::el8"
] | null | 4.5 | 7.1 | null |
RHBA-2015:1307 | Red Hat Bug Fix Advisory: netcf bug fix update | netcf: augeas path expression injection via interface name | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2010:0360 | Red Hat Security Advisory: wireshark security update | Wireshark: various flaws in a) RADIUS, b) Bluetooth L2CAP, c) MIOP dissectors (DoS) Wireshark: Integer overflow in the AFS dissector Wireshark: Null-ptr dereference in the InfiniBand dissector Wireshark: NULL pointer dereference in the DCERPC over SMB packet disassembly wireshark: unsigned integer wrap vulnerability in ERF reader (VU#676492) wireshark: invalid pointer dereference in SMB/SMB2 dissectors wireshark: crash in LWRES dissector | [
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws",
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws",
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2009:0008 | Red Hat Security Advisory: dbus security update | dbus denial of service | [
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2024:1388 | Red Hat Security Advisory: ovn23.03 security update | ovn: insufficient validation of BFD packets may lead to denial of service | [
"cpe:/o:redhat:enterprise_linux:8::fastdatapath"
] | null | 6.5 | null | null |
RHSA-2016:1653 | Red Hat Security Advisory: qemu-kvm-rhev security update | Qemu: block: iscsi: buffer overflow in iscsi_aio_ioctl Qemu: virtio: unbounded memory allocation on host via guest leading to DoS | [
"cpe:/a:redhat:openstack:7::el7"
] | null | null | 3.4 | null |
RHSA-2024:1608 | Red Hat Security Advisory: opencryptoki security update | opencryptoki: timing side-channel in handling of RSA PKCS#1 v1.5 padded ciphertexts (Marvin) | [
"cpe:/a:redhat:enterprise_linux:8::crb",
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 5.9 | null | null |
RHSA-2023:0727 | Red Hat Security Advisory: OpenShift Container Platform 4.12.3 security update | golang: archive/tar: github.com/vbatts/tar-split: unbounded memory consumption when reading headers golang: net/http/httputil: ReverseProxy should not forward unparseable query parameters golang: compress/gzip: stack exhaustion in Reader.Read golang: regexp/syntax: limit memory used by parsing regexps haproxy: segfault DoS | [
"cpe:/a:redhat:openshift:4.12::el8",
"cpe:/a:redhat:openshift:4.12::el9"
] | null | 4.3 | null | null |
RHSA-2024:7262 | Red Hat Security Advisory: osbuild-composer security update | golang-fips/openssl: Memory leaks in code encrypting and decrypting RSA payloads encoding/gob: golang: Calling Decoder.Decode on a message which contains deeply nested structures can cause a panic due to stack exhaustion | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 7.5 | null | null |
RHSA-2013:0924 | Red Hat Security Advisory: spice-vdagent-win security and bug fix update | rhevm: spice service unquoted search path | [
"cpe:/a:redhat:rhev_manager:3"
] | null | null | null | null |
RHSA-2024:2968 | Red Hat Security Advisory: fence-agents security and bug fix update | urllib3: Request body not stripped after redirect from 303 status changes request method to GET pycryptodome: side-channel leakage for OAEP decryption in PyCryptodome and pycryptodomex jinja2: HTML attribute injection when passing user input as keys to xmlattr filter | [
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::highavailability",
"cpe:/a:redhat:enterprise_linux:8::resilientstorage"
] | null | 5.4 | null | null |
RHSA-2022:4875 | Red Hat Security Advisory: firefox security update | Mozilla: Cross-Origin resource's length leaked Mozilla: Heap buffer overflow in WebGL Mozilla: Browser window spoof using fullscreen mode Mozilla: Register allocation problem in WASM on arm64 Mozilla: Uninitialized variable leads to invalid memory read Mozilla: Querying a WebAuthn token with a large number of allowCredential entries may have leaked cross-origin information Mozilla: Memory safety bugs fixed in Firefox 101 and Firefox ESR 91.10 | [
"cpe:/a:redhat:rhel_eus:8.4::appstream"
] | null | 9.8 | 6.1 | null |
RHBA-2023:1037 | Red Hat Bug Fix Advisory: Red Hat build of MicroShift 4.12.6 bug fix and enhancement update | openshift/apiserver-library-go: Bypass of SCC seccomp profile restrictions | [
"cpe:/a:redhat:openshift:4.12::el8"
] | null | 6.3 | null | null |
RHSA-2021:3473 | Red Hat Security Advisory: Red Hat Automation Platform 1.2.5 security and bugfixes update | python-urllib3: ReDoS in the parsing of authority part of URL | [
"cpe:/a:redhat:ansible_automation_platform:4.2::el7",
"cpe:/a:redhat:ansible_automation_platform:4.2::el8"
] | null | 7.5 | null | null |
RHSA-2022:1712 | Red Hat Security Advisory: Red Hat Single Sign-On 7.5.2 security update on RHEL 8 | keycloak: Privilege escalation vulnerability on Token Exchange | [
"cpe:/a:redhat:red_hat_single_sign_on:7.5::el8"
] | null | 8 | null | null |
RHSA-2024:8533 | Red Hat Security Advisory: Multicluster Engine for Kubernetes 2.4.6 security updates and bug fixes | elliptic: nodejs/elliptic: EDDSA signature malleability due to missing signature length check elliptic: nodejs/elliptic: ECDSA signature malleability due to missing checks elliptic: nodejs/elliptic: ECDSA implementation malleability due to BER-enconded signatures being allowed elliptic: Missing Validation in Elliptic's EDDSA Signature Verification | [
"cpe:/a:redhat:multicluster_engine:2.4::el8"
] | null | 8.2 | null | null |
RHSA-2020:0964 | Red Hat Security Advisory: OpenShift Container Platform 3.11 jenkins-2-plugins security update | openshift/jenkins-plugin: Deserialization in snakeyaml YAML() objects allows for remote code execution | [
"cpe:/a:redhat:openshift:3.11::el7"
] | null | 8.8 | null | null |
RHSA-2022:0435 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.4 security update | log4j: Remote code execution in Log4j 1.x when application is configured to use JMSAppender log4j: Remote code execution in Log4j 1.x when application is configured to use JMSSink log4j: SQL injection in Log4j 1.x when application is configured to use JDBCAppender log4j: Unsafe deserialization flaw in Chainsaw log viewer | [
"cpe:/a:redhat:jboss_enterprise_application_platform:7.4"
] | null | 8.8 | null | null |
RHSA-2020:4638 | Red Hat Security Advisory: sysstat security update | sysstat: memory corruption due to an integer overflow in remap_struct in sa_common.c | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 5.5 | null | null |
RHSA-2023:7418 | Red Hat Security Advisory: kpatch-patch security update | kernel: net/sched: cls_u32 component reference counter leak if tcf_change_indev() fails kernel: tun: bugs for oversize packet when napi frags enabled in tun_napi_alloc_frags kernel: net/sched: Use-after-free vulnerabilities in the net/sched classifiers: cls_fw, cls_u32 and cls_route kernel: net/sched: Use-after-free vulnerabilities in the net/sched classifiers: cls_fw, cls_u32 and cls_route kernel: net/sched: Use-after-free vulnerabilities in the net/sched classifiers: cls_fw, cls_u32 and cls_route kernel: net/sched: Use-after-free vulnerabilities in the net/sched classifiers: cls_fw, cls_u32 and cls_route kernel: use after free in nvmet_tcp_free_crypto in NVMe kernel: netfilter: potential slab-out-of-bound access due to integer underflow | [
"cpe:/o:redhat:rhel_eus:9.2::baseos"
] | null | 7 | null | null |
RHSA-2006:0330 | Red Hat Security Advisory: thunderbird security update | security flaw security flaw security flaw Firefox Tag Order Vulnerability security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw | [
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2007:0746 | Red Hat Security Advisory: httpd security, bug fix, and enhancement update | httpd: out of bounds read | [
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2021:2322 | Red Hat Security Advisory: qemu-kvm security update | QEMU: ide: atapi: OOB access while processing read commands | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 3.9 | null | null |
RHSA-2019:1821 | Red Hat Security Advisory: rh-nodejs8-nodejs security update | nodejs: HTTP request splitting nodejs: Denial of Service with large HTTP headers nodejs: Slowloris HTTP Denial of Service nodejs: Hostname spoofing in URL parser for javascript protocol nodejs-tar: Arbitrary file overwrites when extracting tarballs containing a hard-link nodejs: Insufficient Slowloris fix causing DoS via server.headersTimeout bypass | [
"cpe:/a:redhat:rhel_software_collections:3::el7"
] | null | null | 5.3 | null |
RHSA-2024:1937 | Red Hat Security Advisory: thunderbird security update | Mozilla: Permission prompt input delay could expire when not in focus Mozilla: Denial of Service using HTTP/2 CONTINUATION frames Mozilla: GetBoundName in the JIT returned the wrong object Mozilla: Out-of-bounds-read after mis-optimized switch statement Mozilla: Incorrect JITting of arguments led to use-after-free during garbage collection Mozilla: Integer-overflow led to out-of-bounds-read in the OpenType sanitizer Mozilla: Potential use-after-free due to AlignedBuffer self-move Mozilla: Memory safety bug fixed in Firefox 125, Firefox ESR 115.10, and Thunderbird 115.10 | [
"cpe:/a:redhat:rhel_eus:8.8::appstream"
] | null | 7.5 | null | null |
RHSA-2022:8833 | Red Hat Security Advisory: nodejs:18 security, bug fix, and enhancement update | nodejs-minimatch: ReDoS via the braceExpand function nodejs: DNS rebinding in inspect via invalid octal IP address | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 7.5 | null | null |
RHSA-2011:1317 | Red Hat Security Advisory: cyrus-imapd security update | cyrus-imapd: nntpd buffer overflow in split_wildmats() | [
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server",
"cpe:/o:redhat:enterprise_linux:6::server"
] | null | null | null | null |
RHSA-2016:0063 | Red Hat Security Advisory: ntp security update | ntp: missing check for zero originate timestamp | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation",
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | null | null |
RHSA-2023:3461 | Red Hat Security Advisory: kernel security and bug fix update | kernel: use-after-free in l2cap_connect and l2cap_le_connect_req in net/bluetooth/l2cap_core.c | [
"cpe:/o:redhat:rhel_aus:8.4::baseos",
"cpe:/o:redhat:rhel_e4s:8.4::baseos",
"cpe:/o:redhat:rhel_tus:8.4::baseos"
] | null | 8.1 | null | null |
RHBA-2017:2117 | Red Hat Bug Fix Advisory: dnsmasq bug fix and enhancement update | dnsmasq: Improper bounds checking leads to a buffer overread | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 5.3 | null |
RHSA-2024:1846 | Red Hat Security Advisory: pcs security update | rubygem-rack: Denial of Service Vulnerability in Rack Content-Type Parsing rubygem-rack: Possible DoS Vulnerability with Range Header in Rack rubygem-rack: Possible Denial of Service Vulnerability in Rack Header Parsing | [
"cpe:/a:redhat:rhel_eus:9.2::highavailability",
"cpe:/a:redhat:rhel_eus:9.2::resilientstorage"
] | null | 5.3 | null | null |
RHSA-2022:4588 | Red Hat Security Advisory: .NET 6.0 security, bug fix, and enhancement update | dotnet: excess memory allocation via HttpClient causes DoS dotnet: malicious content causes high CPU and memory usage dotnet: parsing HTML causes Denial of Service | [
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::crb"
] | null | 7.5 | null | null |
RHSA-2015:1788 | Red Hat Security Advisory: kernel-rt security, bug fix, and enhancement update | kernel: ASLR bruteforce possible for vdso library kernel: fs: ext4: fallocate zero range page size > block size BUG() kernel: denial of service due to memory leak in add_key() kernel: SCTP race condition allows list corruption and panic from userlevel kernel: Crafted BPF filters may crash kernel during JIT optimisation kernel: net: incorrect processing of checksums in UDP implementation kernel: net: incorrect processing of checksums in UDP implementation | [
"cpe:/a:redhat:rhel_extras_rt:7"
] | null | null | null | null |
RHSA-2024:4766 | Red Hat Security Advisory: python3 security update | python: incorrect IPv4 and IPv6 private ranges | [
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::crb"
] | null | 3.7 | null | null |
RHSA-2025:1326 | Red Hat Security Advisory: RHTAS 1.1.1 - Red Hat Trusted Artifact Signer Release | golang.org/x/crypto/ssh: Misuse of ServerConfig.PublicKeyCallback may cause authorization bypass in golang.org/x/crypto | [
"cpe:/a:redhat:trusted_artifact_signer:1.1::el9"
] | null | 8.2 | null | null |
RHSA-2021:5108 | Red Hat Security Advisory: OpenShift Container Platform 4.8.z security update | log4j-core: Remote code execution in Log4j 2.x when logs contain an attacker-controlled string value log4j-core: DoS in log4j 2.x with thread context message pattern and context lookup pattern (incomplete fix for CVE-2021-44228) | [
"cpe:/a:redhat:openshift:4.8::el8"
] | null | 8.1 | null | null |
RHSA-2023:5684 | Red Hat Security Advisory: galera and mariadb security update | mariadb: use-after-poison in prepare_inplace_add_virtual in handler0alter.cc mariadb: assertion failure at table->get_ref_count() == 0 in dict0dict.cc mariadb: segmentation fault via the component sub_select mariadb: server crash in st_select_lex_unit::exclude_level mariadb: server crash in JOIN_CACHE::free or in copy_fields mariadb: compress_write() fails to release mutex on failure mariadb: NULL pointer dereference in spider_db_mbase::print_warnings() mariadb: node crashes with Transport endpoint is not connected mysqld got signal 6 | [
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::crb"
] | null | 7.5 | null | null |
RHSA-2019:2741 | Red Hat Security Advisory: kernel-rt security and bug fix update | kernel: Use-after-free in sound/usb/card.c:usb_audio_probe() kernel: Heap overflow in mwifiex_update_bss_desc_with_ie function in marvell/mwifiex/scan.c Kernel: KVM: nVMX: guest accesses L0 MSR causes potential DoS kernel: brcmfmac heap buffer overflow in brcmf_wowl_nd_results kernel: brcmfmac frame validation bypass kernel: Count overflow in FUSE request leading to use-after-free issues. | [
"cpe:/a:redhat:enterprise_linux:8::nfv",
"cpe:/a:redhat:enterprise_linux:8::realtime"
] | null | null | 7.8 | null |
RHSA-2024:2705 | Red Hat Security Advisory: Red Hat build of Quarkus 3.2.12 release and security update | quarkus-core: Leak of local configuration properties into Quarkus applications netty-codec-http: Allocation of Resources Without Limits or Throttling | [
"cpe:/a:redhat:quarkus:3.2::el8"
] | null | 5.3 | null | null |
RHSA-2024:0018 | Red Hat Security Advisory: tigervnc security update | xorg-x11-server: out-of-bounds memory reads/writes in XKB button actions xorg-x11-server: out-of-bounds memory read in RRChangeOutputProperty and RRChangeProviderProperty | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 7.6 | null | null |
RHSA-2024:0746 | Red Hat Security Advisory: new container image: rhceph-5.3 | grafana: Use of Cache Containing Sensitive Information golang: net/http: excessive memory growth in a Go server accepting HTTP/2 requests haproxy: segfault DoS grafana: cross site scripting grafana: cross site scripting grafana: JWT token leak to data source grafana: stored XSS vulnerability affecting the core plugin "Text" golang: html/template: backticks not treated as string delimiters haproxy: request smuggling attack in HTTP/1 header parsing | [
"cpe:/a:redhat:ceph_storage:5.3::el8"
] | null | 8.2 | null | null |
RHSA-2023:5725 | Red Hat Security Advisory: OpenJDK 8u392 Security Update for Portable Linux Builds | OpenJDK: segmentation fault in ciMethodBlocks OpenJDK: IOR deserialization issue in CORBA (8303384) OpenJDK: certificate path validation issue during client authentication (8309966) | [
"cpe:/a:redhat:openjdk:1.8"
] | null | 5.3 | null | null |
RHSA-2024:1831 | Red Hat Security Advisory: kernel security update | kernel: net/sched: sch_qfq component can be exploited if in qfq_change_agg function happens qfq_enqueue overhead kernel: net/sched: cls_fw component can be exploited as result of failure in tcf_change_indev function kernel: use-after-free in sch_qfq network scheduler kernel: out-of-bounds write in qfq_change_class function | [
"cpe:/o:redhat:rhel_els:6"
] | null | 7 | null | null |
RHSA-2024:4443 | Red Hat Security Advisory: toolbox security update | go-yaml: Improve heuristics preventing CPU/memory abuse by parsing malicious or large YAML documents | [
"cpe:/a:redhat:rhel_eus:9.2::appstream"
] | null | 7.5 | null | null |
RHSA-2025:1684 | Red Hat Security Advisory: bind security update | bind: bind9: Many records in the additional section cause CPU exhaustion | [
"cpe:/a:redhat:rhel_aus:8.6::appstream",
"cpe:/a:redhat:rhel_e4s:8.6::appstream",
"cpe:/a:redhat:rhel_tus:8.6::appstream",
"cpe:/o:redhat:rhel_aus:8.6::baseos",
"cpe:/o:redhat:rhel_e4s:8.6::baseos",
"cpe:/o:redhat:rhel_tus:8.6::baseos"
] | null | 7.5 | null | null |
RHSA-2020:0192 | Red Hat Security Advisory: Open Liberty 20.0.0.1 Runtime security update | A security update is now available for Open Liberty 20.0.0.1 from the Customer Portal.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the originating Security Bulletin link(s) in the References section. | [
"cpe:/a::openliberty:20"
] | null | null | null | null |
RHSA-2024:4641 | Red Hat Security Advisory: libndp security update | libndp: buffer overflow in route information length field | [
"cpe:/o:redhat:rhel_eus:8.8::baseos"
] | null | 8.1 | null | null |
RHSA-2024:9167 | Red Hat Security Advisory: poppler security update | poppler: pdfinfo: crash in broken documents when using -dests parameter | [
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::crb"
] | null | 7.5 | null | null |
RHSA-2020:3470 | Red Hat Security Advisory: bind security update | bind: BIND does not sufficiently limit the number of fetches performed when processing referrals bind: A logic error in code which checks TSIG validity can be used to trigger an assertion failure in tsig.c | [
"cpe:/o:redhat:rhel_aus:7.3::server",
"cpe:/o:redhat:rhel_e4s:7.3::server",
"cpe:/o:redhat:rhel_tus:7.3::server"
] | null | 7.5 | null | null |
RHSA-2023:4252 | Red Hat Security Advisory: edk2 security update | openssl: X.400 address type confusion in X.509 GeneralName | [
"cpe:/a:redhat:rhel_aus:8.4::appstream",
"cpe:/a:redhat:rhel_e4s:8.4::appstream",
"cpe:/a:redhat:rhel_tus:8.4::appstream"
] | null | 7.4 | null | null |
RHSA-2023:5096 | Red Hat Security Advisory: Logging Subsystem 5.5.16 - Red Hat OpenShift security update | openshift-logging: LokiStack authorisation is cached too broadly | [
"cpe:/a:redhat:logging:5.5::el8"
] | null | 5.7 | null | null |
RHSA-2023:3915 | Red Hat Security Advisory: OpenShift Container Platform 4.11.44 bug fix and security update | openshift: OCP & FIPS mode golang: html/template: improper handling of JavaScript whitespace | [
"cpe:/a:redhat:openshift:4.11::el8"
] | null | 8.1 | null | null |
RHSA-2004:035 | Red Hat Security Advisory: mc security update | security flaw | [
"cpe:/o:redhat:enterprise_linux:2.1::as",
"cpe:/o:redhat:enterprise_linux:2.1::aw",
"cpe:/o:redhat:enterprise_linux:2.1::ws"
] | null | null | null | null |
RHBA-2007:0861 | Red Hat Bug Fix Advisory: dlm-kernel bug fix update | security flaw | [
"cpe:/a:redhat:rhel_cluster:4"
] | null | null | null | null |
RHSA-2024:3763 | Red Hat Security Advisory: nghttp2 security update | nghttp2: CONTINUATION frames DoS | [
"cpe:/o:redhat:rhel_aus:8.6::baseos",
"cpe:/o:redhat:rhel_e4s:8.6::baseos",
"cpe:/o:redhat:rhel_tus:8.6::baseos"
] | null | 5.3 | null | null |
RHSA-2024:1310 | Red Hat Security Advisory: .NET 8.0 security update | dotnet: DoS in .NET Core / YARP HTTP / 2 WebSocket support | [
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::crb"
] | null | 7.5 | null | null |
RHSA-2022:8022 | Red Hat Security Advisory: qt5 security and bug fix update | qt: QProcess could execute a binary from the current working directory when not found in the PATH | [
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::crb"
] | null | 7.8 | null | null |
RHSA-2014:1941 | Red Hat Security Advisory: qemu-kvm-rhev security update | Qemu: information leakage when guest sets high resolution | [
"cpe:/a:redhat:openstack:5::el7"
] | null | null | null | null |
RHSA-2024:0125 | Red Hat Security Advisory: tomcat security update | tomcat: Open Redirect vulnerability in FORM authentication tomcat: FileUpload: DoS due to accumulation of temporary files on Windows tomcat: improper cleaning of recycled objects could lead to information leak tomcat: incorrectly parsed http trailer headers can cause request smuggling | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 5.3 | null | null |
RHSA-2017:0456 | Red Hat Security Advisory: Red Hat JBoss Web Server 3.1.0 security and enhancement update | tomcat: timing attack in Realm implementation tomcat: unsafe chown of catalina.log in tomcat init script allows privilege escalation tomcat: Usage of vulnerable FileUpload package can result in denial of service tomcat: security manager bypass via IntrospectHelper utility function tomcat: tomcat writable config files allow privilege escalation tomcat: system property disclosure tomcat: security manager bypass via JSP Servlet config parameters tomcat: unrestricted access to global resources tomcat: HTTP Request smuggling vulnerability due to permitting invalid character in HTTP requests tomcat: Remote code execution vulnerability in JmxRemoteLifecycleListener tomcat: information disclosure due to incorrect Processor sharing | [
"cpe:/a:redhat:jboss_enterprise_web_server:3.1::el7"
] | null | null | 7.5 | null |
RHSA-2021:2286 | Red Hat Security Advisory: OpenShift Container Platform 4.7.16 security and bug fix update | gogo/protobuf: plugin/unmarshal/unmarshal.go lacks certain index validation | [
"cpe:/a:redhat:openshift:4.7::el8"
] | null | 8.6 | null | null |
RHSA-2021:4319 | Red Hat Security Advisory: compat-exiv2-026 security update | exiv2: Integer overflow in CrwMap:encode0x1810 leading to heap-based buffer overflow and DoS exiv2: Out-of-bounds read in Exiv2::Jp2Image::printStructure exiv2: Out-of-bounds read in Exiv2::Jp2Image::encodeJp2Header | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 4.7 | null | null |
RHSA-2022:1619 | Red Hat Security Advisory: kpatch-patch security update | kernel: remote stack overflow via kernel panic on systems using TIPC may lead to DoS | [
"cpe:/o:redhat:rhel_e4s:8.1::baseos"
] | null | 7.1 | null | null |
RHSA-2009:0420 | Red Hat Security Advisory: ghostscript security update | ghostscript: DoS (crash) in CCITTFax decoding filter argyllcms: Incomplete fix for CVE-2009-0583 | [
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws",
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2020:0860 | Red Hat Security Advisory: Red Hat JBoss Web Server 3.1 Service Pack 8 security update | tomcat: XSS in SSI printenv tomcat: local privilege escalation tomcat: Session fixation when using FORM authentication tomcat: Apache Tomcat AJP File Read/Inclusion Vulnerability | [
"cpe:/a:redhat:jboss_enterprise_web_server:3.1"
] | null | 7.6 | 5 | null |
RHSA-2019:0708 | Red Hat Security Advisory: chromium-browser security update | chromium-browser: Use after free in Canvas chromium-browser: Use after free in FileAPI chromium-browser: Use after free in WebMIDI chromium-browser: Heap buffer overflow in V8 chromium-browser: Type confusion in V8 chromium-browser: Integer overflow in PDFium chromium-browser: Excessive permissions for private API in Extensions chromium-browser: Security UI spoofing chromium-browser: Integer overflow in PDFium chromium-browser: Race condition in Extensions chromium-browser: Race condition in DOMStorage chromium-browser: Out of bounds read in Skia chromium-browser: CSP bypass with blob URL chromium-browser: CSP bypass with blob URL chromium-browser: Security UI spoofing chromium-browser: CSP bypass with Javascript URLs | [
"cpe:/a:redhat:rhel_extras:6"
] | null | null | 4.3 | null |
RHSA-2015:2502 | Red Hat Security Advisory: Red Hat JBoss Data Grid 6.4.1 and 6.5.1 commons-collections security update | apache-commons-collections: InvokerTransformer code execution during deserialisation | [
"cpe:/a:redhat:jboss_data_grid:6.4.1",
"cpe:/a:redhat:jboss_data_grid:6.5.1"
] | null | null | null | null |
RHSA-2005:134 | Red Hat Security Advisory: xemacs security update | security flaw | [
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws"
] | null | null | null | null |
RHSA-2022:0124 | Red Hat Security Advisory: firefox security update | Mozilla: Iframe sandbox bypass with XSLT Mozilla: Race condition when playing audio files Mozilla: Heap-buffer-overflow in blendGaussianBlur Mozilla: Missing throttling on external protocol launch dialog Mozilla: Use-after-free of ChannelEventQueue::mOwner Mozilla: Browser window spoof using fullscreen mode Mozilla: Out-of-bounds memory access when inserting text in edit mode Mozilla: Browser window spoof using fullscreen mode Mozilla: Leaking cross-origin URLs through securitypolicyviolation event Mozilla: Crash when handling empty pkcs7 sequence Mozilla: Spoofed origin on external protocol launch dialog Mozilla: Memory safety bugs fixed in Firefox 96 and Firefox ESR 91.5 | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 8.8 | 6.1 | null |
RHSA-2019:2868 | Red Hat Security Advisory: dbus security update | dbus: DBusServer DBUS_COOKIE_SHA1 authentication bypass | [
"cpe:/o:redhat:rhel_aus:6.6::server"
] | null | null | 7 | null |
RHSA-2011:0266 | Red Hat Security Advisory: fence security, bug fix, and enhancement update | cman/fence: insecure temporary file usage in the egenera fence agent cman/fence: insecure temporary file usage in the apc fence agents | [
"cpe:/a:redhat:rhel_cluster:4"
] | null | null | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.