id
stringlengths 13
15
| title
stringlengths 29
176
| description
stringlengths 8
32.1k
| cpes
sequencelengths 0
20
| cvss_v4_0
null | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
null |
---|---|---|---|---|---|---|---|
RHSA-2021:1239 | Red Hat Security Advisory: dpdk security update | dpdk: librte_vhost Malicious guest could cause segfault by sending invalid Virtio descriptor | [
"cpe:/a:redhat:rhel_eus:8.2::appstream"
] | null | 7.7 | null | null |
RHSA-2014:0510 | Red Hat Security Advisory: ruby193-rubygem-actionpack security update | rubygem-actionpack: directory traversal issue | [
"cpe:/a:redhat:rhel_software_collections:1::el6"
] | null | null | null | null |
RHSA-2022:8873 | Red Hat Security Advisory: Red Hat OpenStack Platform 16.1.9 (python-oslo-utils) security update | python-oslo-utils: incorrect password masking in debug output | [
"cpe:/a:redhat:openstack:16.1::el8"
] | null | 6 | null | null |
RHSA-2017:1798 | Red Hat Security Advisory: kernel security update | kernel: NFSv3 server does not properly handle payload bounds checking of WRITE requests | [
"cpe:/o:redhat:rhel_aus:6.6::server",
"cpe:/o:redhat:rhel_tus:6.6::server"
] | null | null | 6.5 | null |
RHSA-2010:0807 | Red Hat Security Advisory: java-1.5.0-ibm security update | TLS: MITM attacks via session renegotiation krb5: null pointer dereference in GSS-API library leads to DoS (MITKRB5-SA-2010-005) OpenJDK HttpURLConnection allows arbitrary request headers (6961084,6980004) OpenJDK DNS server IP address information leak (6957564) OpenJDK HttpURLConnection request splitting (6952017) JDK unspecified vulnerability in Java Web Start component OpenJDK local network address disclosure (6952603) JDK unspecified vulnerability in 2D component JDK unspecified vulnerability in Sound component OpenJDK IndexColorModel double-free (6925710) OpenJDK JPEG writeImage remote code execution (6963023) OpenJDK ICC Profile remote code execution (6963489) OpenJDK Deserialization Race condition (6559775) OpenJDK Serialization inconsistencies (6966692) JDK unspecified vulnerability in Sound component OpenJDK HttpURLConnection allows arbitrary request headers (6961084,6980004) OpenJDK HttpURLConnection incomplete TRACE permission check (6981426) | [
"cpe:/a:redhat:rhel_extras:4",
"cpe:/a:redhat:rhel_extras:5::client",
"cpe:/a:redhat:rhel_extras:5::server"
] | null | null | null | null |
RHSA-2018:1304 | Red Hat Security Advisory: go-toolset-7 and go-toolset-7-golang security and bug fix update | golang: arbitrary code execution during "go get" via C compiler options | [
"cpe:/a:redhat:devtools:2018"
] | null | null | 5.8 | null |
RHSA-2009:1637 | Red Hat Security Advisory: JBoss Enterprise Application Platform 4.2.0.CP08 update | xml-security-1.3.0-1jpp.ep1.*: XMLDsig HMAC-based signatures spoofing and authentication bypass jbossas JMX-Console cross-site-scripting in filter parameter JBoss Application Server Web Console XSS JDK: XML parsing Denial-Of-Service (6845701) JBoss EAP Twiddle logs the JMX password | [
"cpe:/a:redhat:jboss_enterprise_application_platform:4.2.0::el4"
] | null | null | null | null |
RHSA-2024:9547 | Red Hat Security Advisory: krb5 security update | freeradius: forgery attack | [
"cpe:/a:redhat:rhel_eus:9.4::appstream",
"cpe:/o:redhat:rhel_eus:9.4::baseos"
] | null | 9 | null | null |
RHSA-2024:4613 | Red Hat Security Advisory: OpenShift Container Platform 4.16.4 bug fix and security update | ssh: Prefix truncation attack on Binary Packet Protocol (BPP) containers/image: digest type does not guarantee valid type go-retryablehttp: url might write sensitive information to log file openssh: Possible remote code execution due to a race condition in signal handling affecting Red Hat Enterprise Linux 9 golang: net: malformed DNS message can cause infinite loop golang: net/netip: Unexpected behavior from Is methods for IPv4-mapped IPv6 addresses | [
"cpe:/a:redhat:openshift:4.16::el9"
] | null | 6.7 | null | null |
RHSA-2020:5056 | Red Hat Security Advisory: podman security and bug fix update | golang.org/x/text: possibility to trigger an infinite loop in encoding/unicode could lead to crash podman: environment variables leak between containers when started via Varlink or Docker-compatible REST API | [
"cpe:/a:redhat:rhel_extras_other:7"
] | null | 5.3 | null | null |
RHSA-2024:2696 | Red Hat Security Advisory: unbound security update | bind9: KeyTrap - Extreme CPU consumption in DNSSEC validator bind9: Preparing an NSEC3 closest encloser proof can exhaust CPU resources unbound: unrestricted reconfiguration enabled to anyone that may lead to local privilege escalation | [
"cpe:/a:redhat:rhel_aus:8.2::appstream",
"cpe:/a:redhat:rhel_e4s:8.2::appstream",
"cpe:/a:redhat:rhel_tus:8.2::appstream"
] | null | 8 | null | null |
RHSA-2010:0534 | Red Hat Security Advisory: libpng security update | libpng: Interlaced Images Information Disclosure Vulnerability libpng: excessive memory consumption due to highly compressed huge ancillary chunk libpng: out-of-bounds memory write libpng: Memory leak when processing Physical Scale (sCAL) images | [
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws",
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws",
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2016:0084 | Red Hat Security Advisory: qemu-kvm-rhev security and bug fix update | Qemu: ide: ahci use-after-free vulnerability in aio port commands Qemu: nvram: OOB r/w access in processing firmware configurations | [
"cpe:/o:redhat:enterprise_linux:7::hypervisor",
"cpe:/o:redhat:enterprise_linux:7::hypervisor_power"
] | null | null | null | null |
RHSA-2023:5979 | Red Hat Security Advisory: Satellite 6.12.5.2 Async Security Update | openssl: c_rehash script allows command injection openssl: the c_rehash script allows command injection foreman: OS command injection via ct_command and fcct_command ruby-git: code injection vulnerability ruby-git: code injection vulnerability Foreman: Arbitrary code execution through templates Satellite/Foreman: Arbitrary code execution through yaml global parameters golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487) HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack) | [
"cpe:/a:redhat:satellite:6.12::el8",
"cpe:/a:redhat:satellite_capsule:6.12::el8",
"cpe:/a:redhat:satellite_utils:6.12::el8"
] | null | 7.5 | null | null |
RHSA-2012:0522 | Red Hat Security Advisory: openssl security update | openssl: asn1_d2i_read_bio integer errors leading to buffer overflow | [
"cpe:/o:redhat:rhel_els:3::as",
"cpe:/o:redhat:rhel_els:3::es",
"cpe:/o:redhat:rhel_els:4::as",
"cpe:/o:redhat:rhel_els:4::es",
"cpe:/o:redhat:rhel_eus:5.6",
"cpe:/o:redhat:rhel_eus:6.0",
"cpe:/o:redhat:rhel_eus:6.1",
"cpe:/o:redhat:rhel_mission_critical:5.3"
] | null | null | null | null |
RHSA-2024:5281 | Red Hat Security Advisory: kernel security update | kernel: net: qcom/emac: fix UAF in emac_remove kernel: hwmon: (w83792d) Fix NULL pointer dereference by removing unnecessary structure field kernel: proc/vmcore: fix clearing user buffer by properly using clear_user() kernel: bnxt: prevent skb UAF after handing over to PTP worker kernel: NFSD: Fix the behavior of READ near OFFSET_MAX kernel: NFSD: Fix ia_size underflow kernel: NFSD: Fix NFSv3 SETATTR/CREATE's handling of large file sizes kernel: uio: Fix use-after-free in uio_open kernel: gfs2: Fix kernel NULL pointer dereference in gfs2_rgrp_dump kernel: TCP-spoofed ghost ACKs and leak leak initial sequence number kernel: SUNRPC: Fix UAF in svc_tcp_listen_data_ready() kernel: dmaengine/idxd: hardware erratum allows potential security problem with direct access by untrusted application kernel: mlxsw: spectrum_acl_tcam: Fix memory leak when canceling rehash work kernel: rtnetlink: Correct nested IFLA_VF_VLAN_LIST attribute validation kernel: net: kernel: UAF in network route management kernel: ionic: fix use after netif_napi_del() kernel: virtio-net: tap: mlx5_core short frame denial of service kernel: virtio-net: tun: mlx5_core short frame denial of service | [
"cpe:/o:redhat:rhel_aus:8.6::baseos",
"cpe:/o:redhat:rhel_e4s:8.6::baseos",
"cpe:/o:redhat:rhel_tus:8.6::baseos"
] | null | 7.1 | null | null |
RHSA-2004:610 | Red Hat Security Advisory: XFree86 security update | openmotif21 stack overflows in libxpm | [
"cpe:/o:redhat:enterprise_linux:2.1::as",
"cpe:/o:redhat:enterprise_linux:2.1::aw",
"cpe:/o:redhat:enterprise_linux:2.1::es",
"cpe:/o:redhat:enterprise_linux:2.1::ws"
] | null | null | null | null |
RHSA-2024:11193 | Red Hat Security Advisory: mpg123 security update | mpg123: Buffer overflow when writing decoded PCM samples | [
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb"
] | null | 6.7 | null | null |
RHSA-2004:179 | Red Hat Security Advisory: : An updated LHA package fixes security vulnerabilities | security flaw security flaw | [
"cpe:/o:redhat:linux:9"
] | null | null | null | null |
RHSA-2013:1851 | Red Hat Security Advisory: Red Hat Enterprise MRG Grid 2.4 security update | cumin: missing authorization checks in forms, charts, and csv export widgets cumin: CSRF protection does not work cumin: non-persistent XSS possible due to not escaping set limit form input cumin: filtering table operator not checked, leads to potential SQLi | [
"cpe:/a:redhat:enterprise_mrg:2::el5"
] | null | null | null | null |
RHSA-2024:1485 | Red Hat Security Advisory: firefox security update | nss: timing attack against RSA decryption Mozilla: Crash in NSS TLS method Mozilla: JIT code failed to save return registers on Armv7-A Mozilla: Integer overflow could have led to out of bounds write Mozilla: Improper handling of html and body tags enabled CSP nonce leakage Mozilla: Clickjacking vulnerability could have led to a user accidentally granting permissions Mozilla: Self referencing object could have potentially led to a use-after-free Mozilla: Memory safety bugs fixed in Firefox 124, Firefox ESR 115.9, and Thunderbird 115.9 Mozilla: Improve handling of out-of-memory conditions in ICU Mozilla: Privileged JavaScript Execution via Event Handlers | [
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 8.8 | null | null |
RHSA-2019:1185 | Red Hat Security Advisory: qemu-kvm security update | hardware: Microarchitectural Store Buffer Data Sampling (MSBDS) hardware: Micro-architectural Load Port Data Sampling - Information Leak (MLPDS) hardware: Microarchitectural Fill Buffer Data Sampling (MFBDS) hardware: Microarchitectural Data Sampling Uncacheable Memory (MDSUM) | [
"cpe:/o:redhat:rhel_eus:7.4::computenode",
"cpe:/o:redhat:rhel_eus:7.4::server"
] | null | null | 3.8 | null |
RHSA-2016:0705 | Red Hat Security Advisory: rh-mysql56-mysql security update | mysql: unspecified vulnerability related to Server:Partition (CPU October 2015) mysql: unspecified vulnerability related to Server:Optimizer (CPU October 2015) mysql: unspecified vulnerability related to Server:Partition (CPU October 2015) mysql: unspecified vulnerability related to Server:DDL (CPU October 2015) mysql: unspecified vulnerability related to Server:Types (CPU October 2015) mysql: unspecified vulnerability related to Server:Security:Privileges (CPU October 2015) mysql: unspecified vulnerability related to Server:SP (CPU October 2015) mysql: unspecified vulnerability related to Server:DML (CPU October 2015) mysql: unspecified vulnerability related to Server:InnoDB (CPU October 2015) mysql: unspecified vulnerability related to Server:DML (CPU October 2015) mysql: unspecified vulnerability related to Server:Parser (CPU October 2015) mysql: unspecified vulnerability related to Server:Replication (CPU October 2015) mysql: unspecified vulnerability related to Server:Memcached (CPU October 2015) mysql: unspecified vulnerability related to Server:DML (CPU October 2015) mysql: unspecified vulnerability in subcomponent: Server: DML (CPU January 2016) mysql: unspecified vulnerability in subcomponent: Server: DML (CPU January 2016) mysql: unspecified vulnerability in subcomponent: Server: Options (CPU January 2016) mysql: unspecified vulnerability in subcomponent: Client (CPU January 2016) mysql: unspecified vulnerability in subcomponent: Server: DML (CPU January 2016) mysql: unspecified vulnerability in subcomponent: Server: DML (CPU January 2016) mysql: unspecified vulnerability in subcomponent: Server: Optimizer (CPU January 2016) mysql: unspecified vulnerability in subcomponent: Server: DML (CPU January 2016) mysql: unspecified vulnerability in subcomponent: Server: InnoDB (CPU January 2016) mysql: unspecified vulnerability in subcomponent: Server: General (CPU January 2016) mysql: unspecified vulnerability in subcomponent: Server: Security: Encryption (CPU January 2016) mysql: unspecified vulnerability in subcomponent: Server: Replication (CPU January 2016) mysql: unspecified vulnerability in subcomponent: Server: UDF (CPU January 2016) mysql: unspecified vulnerability in subcomponent: Server: Security: Privileges (CPU January 2016) mysql: unspecified vulnerability in subcomponent: Server: InnoDB (CPU January 2016) mysql: unspecified vulnerability in subcomponent: Server: Optimizer (CPU January 2016) mysql: unspecified vulnerability in subcomponent: Server: Pluggable Authentication (CPU April 2016) mysql: unspecified vulnerability in subcomponent: Server: DML (CPU April 2016) mysql: unspecified vulnerability in subcomponent: Server: MyISAM (CPU April 2016) mysql: unspecified vulnerability in subcomponent: Server: Federated (CPU April 2016) mysql: unspecified vulnerability in subcomponent: Server: DML (CPU April 2016) mysql: unspecified vulnerability in subcomponent: Server: DDL (CPU April 2016) mysql: unspecified vulnerability in subcomponent: Server: DML (CPU April 2016) mysql: unspecified vulnerability in subcomponent: Server: FTS (CPU April 2016) mysql: unspecified vulnerability in subcomponent: Server: PS (CPU April 2016) mysql: unspecified vulnerability in subcomponent: Server: PS (CPU April 2016) mysql: unspecified vulnerability in subcomponent: Server: Replication (CPU April 2016) mysql: unspecified vulnerability in subcomponent: Server: InnoDB (CPU April 2016) mysql: unspecified vulnerability in subcomponent: Server: Options (CPU April 2016) mysql: unspecified vulnerability in subcomponent: Server: Security: Encryption (CPU April 2016) mysql: unspecified vulnerability in subcomponent: Server: Security: Privileges (CPU April 2016) mysql: unspecified vulnerability in subcomponent: Server: InnoDB (CPU April 2016) mysql: ssl-validate-cert incorrect hostname check mysql: unspecified vulnerability in subcomponent: Server: Security: Encryption (CPU July 2016) mysql: unspecified vulnerability in subcomponent: Server: Option (CPU July 2016) mysql: unspecified vulnerability in subcomponent: Server: Connection (CPU July 2016) | [
"cpe:/a:redhat:rhel_software_collections:2::el6",
"cpe:/a:redhat:rhel_software_collections:2::el7"
] | null | null | 3.7 | null |
RHSA-2023:4103 | Red Hat Security Advisory: java-1.8.0-ibm security update | JDK: unsafe deserialization flaw in the Object Request Broker (ORB) OpenJDK: improper connection handling during TLS handshake (8294474) OpenJDK: missing string checks for NULL characters (8296622) OpenJDK: incorrect handling of NULL characters in ProcessBuilder (8295304) OpenJDK: Swing HTML parsing issue (8296832) OpenJDK: certificate validation issue in TLS session negotiation (8298310) OpenJDK: missing check for slash characters in URI-to-path conversion (8298667) | [
"cpe:/a:redhat:enterprise_linux:8::supplementary"
] | null | 3.7 | null | null |
RHSA-2021:2983 | Red Hat Security Advisory: OpenShift Container Platform 4.8.4 bug fix and security update | golang: net/http: panic in ReadRequest and ReadResponse when reading a very large header golang: net: lookup functions may return invalid host names golang: archive/zip: malformed archive may cause panic or memory exhaustion golang: net/http/httputil: ReverseProxy forwards connection headers if first one is empty golang: math/big.Rat: may cause a panic or an unrecoverable fatal error if passed inputs with very large exponents golang: crypto/tls: certificate of wrong type is causing TLS client to panic | [
"cpe:/a:redhat:openshift:4.8::el8"
] | null | 6.5 | null | null |
RHSA-2020:0544 | Red Hat Security Advisory: curl security update | curl: HTTP authentication leak in redirects curl: FTP path trickery leads to NIL byte out of bounds write curl: LDAP NULL pointer dereference curl: RTSP RTP buffer over-read curl: Out-of-bounds heap read when missing RTSP headers allows information leak or denial of service | [
"cpe:/o:redhat:rhel_eus:7.5::computenode",
"cpe:/o:redhat:rhel_eus:7.5::server"
] | null | null | 5.4 | null |
RHSA-2022:6384 | Red Hat Security Advisory: openvswitch2.13 security update | dpdk: DoS when a Vhost header crosses more than two descriptors and exhausts all mbufs | [
"cpe:/o:redhat:enterprise_linux:8::fastdatapath"
] | null | 8.6 | null | null |
RHSA-2022:8547 | Red Hat Security Advisory: thunderbird security update | Mozilla: Service Workers might have learned size of cross-origin media files Mozilla: Fullscreen notification bypass Mozilla: Use-after-free in InputStream implementation Mozilla: Use-after-free of a JavaScript Realm Mozilla: Fullscreen notification bypass via windowName Mozilla: Use-after-free in Garbage Collection Mozilla: ServiceWorker-intercepted requests bypassed SameSite cookie policy Mozilla: Cross-Site Tracing was possible via non-standard override headers Mozilla: Symlinks may resolve to partially uninitialized buffers Mozilla: Keystroke Side-Channel Leakage Mozilla: Custom mouse cursor could have been drawn over browser UI Mozilla: Iframe contents could be rendered outside the iframe Mozilla: Memory safety bugs fixed in Firefox 107 and Firefox ESR 102.5 | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 8.8 | 6.1 | null |
RHSA-2023:5683 | Red Hat Security Advisory: mariadb:10.5 security update | mariadb: use-after-poison in prepare_inplace_add_virtual in handler0alter.cc mariadb: assertion failure at table->get_ref_count() == 0 in dict0dict.cc mariadb: segmentation fault via the component sub_select mariadb: server crash in st_select_lex_unit::exclude_level mariadb: server crash in JOIN_CACHE::free or in copy_fields mariadb: compress_write() fails to release mutex on failure mariadb: NULL pointer dereference in spider_db_mbase::print_warnings() mariadb: node crashes with Transport endpoint is not connected mysqld got signal 6 | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 7.5 | null | null |
RHSA-2024:0684 | Red Hat Security Advisory: OpenShift Container Platform 4.11.58 packages and security update | runc: file descriptor leak | [
"cpe:/a:redhat:openshift:4.11::el8"
] | null | 8.6 | null | null |
RHSA-2023:1588 | Red Hat Security Advisory: kernel security update | ALSA: pcm: Move rwsem lock inside snd_ctl_elem_read to prevent UAF | [
"cpe:/o:redhat:rhel_e4s:8.1::baseos"
] | null | 7.8 | null | null |
RHSA-2017:1712 | Red Hat Security Advisory: Red Hat 3scale API Management Platform 2.0.0 security update | AMP: validation bypass in oauth | [
"cpe:/a:redhat:3scale_amp:2"
] | null | null | 6.5 | null |
RHSA-2008:0195 | Red Hat Security Advisory: tomcat security update | tomcat handling of cookies tomcat handling of cookie values Apache Tomcat's default security policy is too open Absolute path traversal Apache Tomcat WEBDAV | [
"cpe:/a:redhat:rhel_developer_suite:3"
] | null | null | null | null |
RHSA-2024:0990 | Red Hat Security Advisory: rh-postgresql12-postgresql security update | postgresql: non-owner 'REFRESH MATERIALIZED VIEW CONCURRENTLY' executes arbitrary SQL | [
"cpe:/a:redhat:rhel_software_collections:3::el7"
] | null | 8 | null | null |
RHSA-2021:0788 | Red Hat Security Advisory: dotnet security and bugfix update | dotnet: System.Text.Encodings.Web Remote Code Execution | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 8.1 | null | null |
RHSA-2013:0531 | Red Hat Security Advisory: java-1.6.0-sun security update | SSL/TLS: CBC padding timing attack (lucky-13) OpenJDK: MBeanServer insufficient privilege restrictions (JMX, 8006446) JDK: unspecified vulnerability fixed in 6u41 and 7u15 (Deployment) | [
"cpe:/a:redhat:rhel_extras:5::server",
"cpe:/a:redhat:rhel_extras:6"
] | null | null | null | null |
RHSA-2014:0815 | Red Hat Security Advisory: rhev-hypervisor6 security update | gnutls: insufficient session id length check in _gnutls_read_server_hello (GNUTLS-SA-2014-3) libtasn1: multiple boundary check issues libtasn1: asn1_get_bit_der() can return negative bit length libtasn1: asn1_read_value_type() NULL pointer dereference | [
"cpe:/o:redhat:enterprise_linux:6::hypervisor"
] | null | null | null | null |
RHSA-2024:7351 | Red Hat Security Advisory: git-lfs security update | encoding/gob: golang: Calling Decoder.Decode on a message which contains deeply nested structures can cause a panic due to stack exhaustion | [
"cpe:/a:redhat:rhel_e4s:9.0::appstream"
] | null | 7.5 | null | null |
RHSA-2024:4413 | Red Hat Security Advisory: pki-core security update | ca: token authentication bypass vulnerability | [
"cpe:/a:redhat:rhel_e4s:9.0::appstream"
] | null | 7.5 | null | null |
RHSA-2022:0589 | Red Hat Security Advisory: Red Hat build of Quarkus 2.2.5 release and security update | mysql-connector-java: unauthorized access to critical kubernetes-client: Insecure deserialization in unmarshalYaml method jakarta-el: ELParserTokenManager enables invalid EL expressions to be evaluate netty-codec: Bzip2Decoder doesn't allow setting size restrictions for decompressed data netty-codec: SnappyFrameDecoder doesn't restrict chunk length and may buffer skippable chunks in an unnecessary way jsoup: Crafted input may cause the jsoup HTML and XML parser to get stuck Kafka: Timing Attack Vulnerability for Apache Kafka Connect and Clients cron-utils: template Injection leading to unauthenticated Remote Code Execution | [
"cpe:/a:redhat:openshift_application_runtimes:1.0"
] | null | 9.8 | null | null |
RHSA-2024:11023 | Red Hat Security Advisory: HawtIO 4.1.0 for Red Hat build of Apache Camel 4 Release and security update. | quarkus-core: Leak of local configuration properties into Quarkus applications braces: fails to limit the number of characters it can handle undertow: Improper State Management in Proxy Protocol parsing causes information leakage org.eclipse.jetty:jetty-server: jetty: Jetty ThreadLimitHandler.getRemote() vulnerable to remote DoS attacks spring-webmvc: Path Traversal Vulnerability in Spring Applications Using RouterFunctions and FileSystemResource express: Improper Input Handling in Express Redirects send: Code Execution Vulnerability in Send Library serve-static: Improper Sanitization in serve-static path-to-regexp: Backtracking regular expressions cause ReDoS | [
"cpe:/a:redhat:rhboac_hawtio:4.0.0"
] | null | 5.3 | null | null |
RHSA-2023:1408 | Red Hat Security Advisory: OpenShift Container Platform 4.12.9 packages and security update | capnproto: out of bounds read when handling a list of lists. | [
"cpe:/a:redhat:openshift:4.12::el8",
"cpe:/a:redhat:openshift:4.12::el9"
] | null | 5.4 | null | null |
RHSA-2017:2906 | Red Hat Security Advisory: Red Hat Single Sign-On security update | jasypt: Vulnerable to timing attack against the password hash comparison keycloak: reflected XSS using HOST header keycloak: CSRF token fixation keycloak: resource privilege extension via access token in oauth libpam4j: Account check bypass | [
"cpe:/a:redhat:jboss_single_sign_on:7.1"
] | null | null | 4.3 | null |
RHSA-2015:0136 | Red Hat Security Advisory: java-1.5.0-ibm security update | ICU: font parsing OOB read (OpenJDK 2D, 8055489) ICU: font parsing OOB read (OpenJDK 2D, 8056276) OpenJDK: incorrect tracking of ChangeCipherSpec during SSL/TLS handshake (JSSE, 8057555) JDK: unspecified full Java sandbox bypass fixed in Feb 2015 update JDK: unspecified partial Java sandbox bypass fixed in Feb 2015 update OpenJDK: phantom references handling issue in garbage collector (Hotspot, 8047125) OpenJDK: directory information leak via file chooser (Swing, 8055304) OpenJDK: incorrect context class loader use in RMI transport (RMI, 8055309) OpenJDK: DER decoder infinite loop (Security, 8059485) | [
"cpe:/a:redhat:rhel_extras:5::client",
"cpe:/a:redhat:rhel_extras:5::server",
"cpe:/a:redhat:rhel_extras:6"
] | null | null | null | null |
RHSA-2024:10595 | Red Hat Security Advisory: postgresql security update | postgresql: PostgreSQL PL/Perl environment variable changes execute arbitrary code | [
"cpe:/a:redhat:rhel_eus:9.4::appstream",
"cpe:/a:redhat:rhel_eus:9.4::crb"
] | null | 8.8 | null | null |
RHSA-2006:0547 | Red Hat Security Advisory: squirrelmail security update | security flaw | [
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws",
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2007:0722 | Red Hat Security Advisory: seamonkey security update | security flaw security flaw security flaw security flaw security flaw security flaw security flaw | [
"cpe:/o:redhat:enterprise_linux:2.1::as",
"cpe:/o:redhat:enterprise_linux:2.1::aw",
"cpe:/o:redhat:enterprise_linux:2.1::es",
"cpe:/o:redhat:enterprise_linux:2.1::ws",
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws",
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2013:1440 | Red Hat Security Advisory: java-1.7.0-oracle security update | OpenJDK: java.util.TimeZone does not restrict setting of default time zone (Libraries, 8001029) OpenJDK: XML parsing Denial of Service (JAXP, 8017298) OpenJDK: insufficient html escaping in jhat (jhat, 8011081) OpenJDK: Inet6Address class IPv6 address processing errors (Libraries, 8015743) JDK: multiple unspecified vulnerabilities fixed in 7u45 (JavaFX) JDK: unspecified vulnerability fixed in 7u45 (Deployment) JDK: multiple unspecified vulnerabilities fixed in 7u45 (JavaFX) OpenJDK: image conversion out of bounds read (2D, 8014102) OpenJDK: key data leak via toString() methods (Libraries, 8011071) OpenJDK: Incorrect awt_getPixelByte/awt_getPixelShort/awt_setPixelByte/awt_setPixelShort image raster checks (2D, 8014093) OpenJDK: JTable not properly performing certain access checks (Swing, 8013744) OpenJDK: insufficient InterfaceImplementor security checks (Scripting, 8017299) JDK: unspecified vulnerability fixed in 7u45 (Deployment) JDK: unspecified vulnerability fixed in 7u45 (Deployment) JDK: unspecified vulnerability fixed in 7u45 (Deployment) OpenJDK: insufficient security checks (Beans, 8012071) OpenJDK: insufficient escaping of window title string (Javadoc, 8016675) OpenJDK: default keytab path information leak (JGSS, 8022931) JDK: unspecified vulnerability fixed in 7u45 (2D) OpenJDK: javax.xml.transform.TransformerFactory does not properly honor XMLConstants.FEATURE_SECURE_PROCESSING (JAXP, 8012425) OpenJDK: insufficient checks of KDC replies (JGSS, 8014341) OpenJDK: javac does not ignore certain ignorable characters (Javadoc, 8016653) OpenJDK: JPEGImageReader and JPEGImageWriter missing band size checks (2D, 8013510) JDK: multiple unspecified vulnerabilities fixed in 7u45 (JavaFX) JDK: unspecified vulnerability fixed in 7u45 (Deployment) OpenJDK: RMIConnection stub missing permission check (CORBA, 8011157) OpenJDK: VersionHelper12 does not honor modifyThreadGroup restriction (JNDI, 8013739) JDK: unspecified vulnerability fixed in 7u45 (Deployment) JDK: unspecified vulnerability fixed in 7u45 (Deployment) OpenJDK: insufficient security checks (JAXWS, 8017505) OpenJDK: com.sun.org.apache.xml.internal.security.utils.UnsyncByteArrayOutputStream Denial of Service (Security, 8021290) JDK: unspecified vulnerability fixed in 7u45 (Deployment) OpenJDK: XML parsing Denial of Service (JAXP, 8014530) OpenJDK: Java2d Disposer security bypass (2D, 8017287) OpenJDK: checkPackageAccess missing security check (Libraries, 8017291) JDK: unspecified vulnerability fixed in 7u45 (Deployment) JDK: unspecified vulnerability fixed in 7u45 (Deployment) OpenJDK: Vulnerability in Libraries component (Libraries, 7023639) OpenJDK: getDeclaringClass() information leak (Libraries, 8014349) OpenJDK: ObjectInputStream/ObjectOutputStream missing checks (Libraries, 8014987) JDK: unspecified vulnerability fixed in 7u45 (2D) JDK: multiple unspecified vulnerabilities fixed in 7u45 (JavaFX) JDK: multiple unspecified vulnerabilities fixed in 7u45 (JavaFX) JDK: unspecified vulnerability fixed in 7u45 (Deployment) OpenJDK: insufficient DataFlavor security checks (AWT, 8012277) OpenJDK: Missing CORBA security checks (Libraries, 8017196) OpenJDK: XML stream factory finder information leak (JAXP, 8013502) JDK: unspecified vulnerability fixed in 7u45 (Deployment) JDK: multiple unspecified vulnerabilities fixed in 7u45 (JavaFX) | [
"cpe:/a:redhat:rhel_extras:5::server",
"cpe:/a:redhat:rhel_extras:6"
] | null | null | null | null |
RHSA-2013:1060 | Red Hat Security Advisory: java-1.7.0-ibm security update | OpenJDK: Insecure shared memory permissions (2D, 8001034) OpenJDK: Frame injection in generated HTML (Javadoc, 8012375) JDK: unspecified vulnerability fixed in 7u25 (Deployment) OpenJDK: Integrate Apache Santuario, rework class loader (Libraries, 6741606, 8008744) OpenJDK: JConsole SSL support (Serviceability, 8003703) JDK: unspecified vulnerability fixed in 7u25 (Deployment) JDK: unspecified vulnerability fixed in 7u25 (Deployment) OpenJDK: Resource denial of service (AWT, 8001038) OpenJDK: output stream access restrictions (CORBA, 8000642) OpenJDK: Prevent revealing the local address (Networking, 8001318) OpenJDK: Better access restrictions (Sound, 8006328) OpenJDK: GnomeFileTypeDetector path access check (Libraries, 8004288) OpenJDK: ObjectStreamClass circular reference denial of service (Serialization, 8000638) OpenJDK: exclusive port binding (Networking, 7170730) OpenJDK: Unique VMIDs (Libraries, 8001033) OpenJDK: MBeanServer Introspector package access (JMX, 8008124) OpenJDK: SerialJavaObject package restriction (JDBC, 8009554) OpenJDK: getEnclosing* checks (Libraries, 8007812) OpenJDK: ObjectOutputStream access checks (Serialization, 8008132) OpenJDK: Proper class checking (JMX, 8008120) OpenJDK: Method handles (Libraries, 8009424) OpenJDK: Various AWT integer overflow checks (AWT, 8009071) OpenJDK: tracing insufficient access checks (Serviceability, 8010209) JDK: unspecified vulnerability fixed in 7u25 (Deployment) OpenJDK: Incorrect image attribute verification (2D, 8012438) JDK: unspecified vulnerability fixed in 7u25 (2D) OpenJDK: Incorrect image channel verification (2D, 8012597) JDK: unspecified vulnerability fixed in 7u25 (Deployment) JDK: unspecified vulnerability fixed in 7u25 (Deployment) OpenJDK: Incorrect image layout verification (2D, 8012601) OpenJDK: ImagingLib byte lookup processing (2D, 8011243) OpenJDK: Incorrect IntegerComponentRaster size checks (2D, 8011248) OpenJDK: Incorrect ShortBandedRaster size checks (2D, 8011253) OpenJDK: Incorrect ByteBandedRaster size checks (2D, 8011257) JDK: Unspecified security fixes (July 2013) JDK: Unspecified security fixes (July 2013) JDK: Unspecified security fixes (July 2013) JDK: Unspecified security fixes (July 2013) JDK: Unspecified security fixes (July 2013) JDK: Unspecified security fixes (July 2013) JDK: Unspecified security fixes (July 2013) JDK: unspecified vulnerability fixed in 7u25 (Deployment) OpenJDK: XML parsing Denial of Service (JAXP, 8017298) | [
"cpe:/a:redhat:rhel_extras:5::server",
"cpe:/a:redhat:rhel_extras:6"
] | null | null | null | null |
RHSA-2004:179 | Red Hat Security Advisory: : An updated LHA package fixes security vulnerabilities | security flaw security flaw | [
"cpe:/o:redhat:linux:9"
] | null | null | null | null |
RHSA-2020:5663 | Red Hat Security Advisory: mariadb:10.3 security, bug fix, and enhancement update | mysql: InnoDB unspecified vulnerability (CPU Jan 2019) mysql: Server: DDL unspecified vulnerability (CPU Jan 2019) mysql: Server: Replication unspecified vulnerability (CPU Apr 2019) mysql: Server: Security: Privileges unspecified vulnerability (CPU Apr 2019) mysql: InnoDB unspecified vulnerability (CPU Apr 2019) mysql: Server: Pluggable Auth unspecified vulnerability (CPU Jul 2019) mysql: Server: Security: Privileges unspecified vulnerability (CPU Jul 2019) mysql: Server: XML unspecified vulnerability (CPU Jul 2019) mysql: InnoDB unspecified vulnerability (CPU Jul 2019) mysql: Server: Parser unspecified vulnerability (CPU Jul 2019) mysql: InnoDB unspecified vulnerability (CPU Oct 2019) mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2019) mysql: C API unspecified vulnerability (CPU Jan 2020) mysql: C API unspecified vulnerability (CPU Apr 2020) mysql: InnoDB unspecified vulnerability (CPU Apr 2020) mysql: Server: DML unspecified vulnerability (CPU Apr 2020) mysql: Server: Stored Procedure unspecified vulnerability (CPU Apr 2020) mysql: InnoDB unspecified vulnerability (CPU Apr 2020) mysql: C API unspecified vulnerability (CPU Apr 2020) mariadb-connector-c: Improper validation of content in a OK packet received from server mysql: Server: FTS unspecified vulnerability (CPU Oct 2020) mysql: InnoDB unspecified vulnerability (CPU Oct 2020) mysql: Server: FTS unspecified vulnerability (CPU Oct 2020) mysql: Server: Locking unspecified vulnerability (CPU Oct 2020) mariadb: Insufficient SST method name check leading to code injection in mysql-wsrep mysql: C API unspecified vulnerability (CPU Jan 2021) mysql: InnoDB unspecified vulnerability (CPU Jan 2021) mysql: Server: Parser unspecified vulnerability (CPU Apr 2021) mysql: InnoDB unspecified vulnerability (CPU Apr 2021) | [
"cpe:/a:redhat:rhel_e4s:8.0::appstream"
] | null | 4.9 | 3.7 | null |
RHSA-2009:0478 | Red Hat Security Advisory: acroread security update | acroread: multiple vulnerabilities in Adobe Reader 8.1.4 acroread: multiple vulnerabilities in Adobe Reader 8.1.4 | [
"cpe:/a:redhat:rhel_extras:3",
"cpe:/a:redhat:rhel_extras:4",
"cpe:/a:redhat:rhel_extras:5::client",
"cpe:/a:redhat:rhel_extras:5::server"
] | null | null | null | null |
RHSA-2023:1961 | Red Hat Security Advisory: pcs security and bug fix update | rubygem-rack: Denial of service in Multipart MIME parsing rubygem-rack: denial of service in header parsing | [
"cpe:/a:redhat:rhel_eus:8.4::highavailability",
"cpe:/a:redhat:rhel_eus:8.4::resilientstorage"
] | null | 5.3 | null | null |
RHSA-2024:9114 | Red Hat Security Advisory: gnome-shell and gnome-shell-extensions security update | gnome-shell: code execution in portal helper | [
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 7.5 | null | null |
RHSA-2017:0063 | Red Hat Security Advisory: bind security update | bind: assertion failure while handling a query response containing inconsistent DNSSEC information | [
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server",
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | 7.5 | null |
RHSA-2018:1446 | Red Hat Security Advisory: chromium-browser security update | chromium-browser: Heap buffer overflow in PDFium chromium-browser: Privilege Escalation in extensions chromium-browser: Type confusion in V8 | [
"cpe:/a:redhat:rhel_extras:6"
] | null | null | 8.8 | null |
RHSA-2021:2021 | Red Hat Security Advisory: Release of OpenShift Serverless 1.10.2 security update | golang: crypto/elliptic: incorrect operations on the P-224 curve golang: cmd/go: packages using cgo can cause arbitrary code execution at build time | [
"cpe:/a:redhat:serverless:1.10::el8"
] | null | 7.5 | null | null |
RHSA-2015:1767 | Red Hat Security Advisory: python-django security update | python-django: Denial-of-service possibility in logout() view by filling session store python-django: Denial-of-service possibility in logout() view by filling session store | [
"cpe:/a:redhat:openstack:5::el7"
] | null | null | null | null |
RHSA-2012:1295 | Red Hat Security Advisory: JBoss Enterprise SOA Platform 4.2.0.CP05 and 4.3.0.CP05 update | JNDI: unauthenticated remote write access is permitted by default | [
"cpe:/a:redhat:jboss_soa_platform:4.2"
] | null | null | null | null |
RHSA-2020:3984 | Red Hat Security Advisory: freeradius security and bug fix update | freeradius: privilege escalation due to insecure logrotate configuration freeradius: eap-pwd: Information leak due to aborting when needing more than 10 iterations freeradius: eap-pwd: DoS issues due to multithreaded BN_CTX access | [
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 7.5 | 5.3 | null |
RHSA-2023:3455 | Red Hat Security Advisory: Release of OpenShift Serverless 1.29.0 | golang.org/x/net/http2: avoid quadratic complexity in HPACK decoding golang: crypto/tls: large handshake records may cause panics golang: net/http, mime/multipart: denial of service from excessive resource consumption golang: net/http, net/textproto: denial of service from excessive memory allocation golang: net/http, net/textproto, mime/multipart: denial of service from excessive resource consumption golang: go/parser: Infinite loop in parsing golang: html/template: backticks not treated as string delimiters containerd: Supplementary groups are not set up properly | [
"cpe:/a:redhat:openshift_serverless:1.29::el8"
] | null | 7.3 | null | null |
RHSA-2018:1711 | Red Hat Security Advisory: rhev-hypervisor7 security update | Kernel: KVM: error in exception handling leads to wrong debug stack value hw: cpu: speculative store bypass Kernel: error in exception handling leads to DoS | [
"cpe:/o:redhat:enterprise_linux:6::hypervisor",
"cpe:/o:redhat:enterprise_linux:7::hypervisor"
] | null | null | 6.5 | null |
RHSA-2020:3422 | Red Hat Security Advisory: .NET Core 3.1 security and bugfix update | dotnet: ASP.NET Core Resource Consumption Denial of Service | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 7.5 | null | null |
RHSA-2016:0017 | Red Hat Security Advisory: openstack-nova security advisory | openstack-nova: Unprivileged API user can access host data using instance snapshot openstack-nova: network security group changes are not applied to running instances | [
"cpe:/a:redhat:openstack:5::el6"
] | null | null | null | null |
RHSA-2017:1272 | Red Hat Security Advisory: samba3x security update | samba: Loading shared modules from any path in the system leading to RCE (SambaCry) | [
"cpe:/o:redhat:rhel_els:5"
] | null | null | 7.5 | null |
RHSA-2018:2022 | Red Hat Security Advisory: ansible security and bug fix update | ansible: Failed tasks do not honour no_log option allowing for secrets to be disclosed in logs | [
"cpe:/a:redhat:ansible_engine:2.4::el7"
] | null | null | 5.9 | null |
RHSA-2004:056 | Red Hat Security Advisory: util-linux security update | security flaw | [
"cpe:/o:redhat:enterprise_linux:2.1::as",
"cpe:/o:redhat:enterprise_linux:2.1::aw",
"cpe:/o:redhat:enterprise_linux:2.1::es",
"cpe:/o:redhat:enterprise_linux:2.1::ws"
] | null | null | null | null |
RHSA-2023:0965 | Red Hat Security Advisory: php security update | php: phar: infinite loop when decompressing quine gzip file php: standard insecure cookie could be treated as a '__Host-' or '__Secure-' cookie by PHP applications php: OOB read due to insufficient input validation in imageloadfont() php: PDO:: quote() may return unquoted string due to an integer overflow XKCP: buffer overflow in the SHA-3 reference implementation | [
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 8.1 | null | null |
RHSA-2024:0879 | Red Hat Security Advisory: java-1.8.0-ibm security update | JDK: Eclipse OpenJ9 JVM denial of service OpenJDK: IOR deserialization issue in CORBA (8303384) OpenJDK: certificate path validation issue during client authentication (8309966) | [
"cpe:/a:redhat:rhel_extras:7"
] | null | 5.3 | null | null |
RHSA-2015:0803 | Red Hat Security Advisory: kernel security and bug fix update | kernel: integer overflow in fb_mmap kernel: isofs: unbound recursion when processing relocated directories kernel: isofs: unbound recursion when processing relocated directories kernel: infiniband: uverbs: unprotected physical memory access | [
"cpe:/o:redhat:rhel_aus:6.4::server"
] | null | null | null | null |
RHSA-2020:2142 | Red Hat Security Advisory: Ansible security and bug fix update (2.7.18) | Ansible: kubectl connection plugin leaks sensitive information | [
"cpe:/a:redhat:ansible_engine:2.7::el7"
] | null | 5 | null | null |
RHSA-2014:1295 | Red Hat Security Advisory: bash Shift_JIS security update | bash: specially-crafted environment variables can be used to inject shell commands | [
"cpe:/a:redhat:rhel_sjis:5",
"cpe:/a:redhat:rhel_sjis:6"
] | null | null | null | null |
RHSA-2020:0074 | Red Hat Security Advisory: OpenShift Container Platform 4.1 openshift-enterprise-cli-container security update | kubernetes: Schema info written with world-writeable permissions when cached | [
"cpe:/a:redhat:openshift:4.1::el7"
] | null | null | 3.3 | null |
RHSA-2019:4353 | Red Hat Security Advisory: Red Hat Ceph Storage security, bug fix, and enhancement update | ceph: denial of service in RGW daemon | [
"cpe:/a:redhat:ceph_storage:3::el7"
] | null | null | 6.5 | null |
RHSA-2022:9032 | Red Hat Security Advisory: Red Hat build of Eclipse Vert.x 4.3.4 security update | SnakeYaml: Constructor Deserialization Remote Code Execution jackson-databind: deep wrapper array nesting wrt UNWRAP_SINGLE_VALUE_ARRAYS jackson-databind: use of deeply nested arrays | [
"cpe:/a:redhat:openshift_application_runtimes:1.0"
] | null | 7.5 | null | null |
RHSA-2018:1777 | Red Hat Security Advisory: procps security update | procps: Integer overflows leading to heap overflow in file2strvec procps: incorrect integer size in proc/alloc.* leading to truncation / integer overflow issues | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | 4.8 | null |
RHSA-2023:7053 | Red Hat Security Advisory: ghostscript security and bug fix update | ghostscript: Incomplete fix for CVE-2020-16305 ghostscript: buffer overflow in base/sbcp.c leading to data corruption ghostscript: Out-of-bound read in base/gdevdevn.c:1973 in devn_pcx_write_rle could result in DoS | [
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb"
] | null | 5.5 | null | null |
RHSA-2021:4686 | Red Hat Security Advisory: webkit2gtk3 security update | webkitgtk: Use-after-free leading to arbitrary code execution | [
"cpe:/a:redhat:rhel_eus:8.1::appstream"
] | null | 8.8 | null | null |
RHSA-2023:4225 | Red Hat Security Advisory: OpenShift Container Platform 4.13.6 security and extras update | golang.org/x/net/http2: avoid quadratic complexity in HPACK decoding | [
"cpe:/a:redhat:openshift:4.13::el8"
] | null | 7.5 | null | null |
RHSA-2022:8638 | Red Hat Security Advisory: krb5 security update | krb5: integer overflow vulnerabilities in PAC parsing | [
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 8.8 | null | null |
RHSA-2007:0841 | Red Hat Security Advisory: RealPlayer security update | realplayer swf file (flash media) heap overflow realplayer ram file heap overflow RealPlayer/HelixPlayer buffer overflow realplayer rm file heap overflow | [
"cpe:/a:redhat:rhel_extras:3",
"cpe:/a:redhat:rhel_extras:5::client"
] | null | null | null | null |
RHSA-2022:6585 | Red Hat Security Advisory: ruby security, bug fix, and enhancement update | Ruby: Double free in Regexp compilation ruby: Buffer overrun in String-to-Float conversion | [
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::crb"
] | null | 6.2 | null | null |
RHSA-2008:0192 | Red Hat Security Advisory: cups security update | cups: heap based buffer overflow in cgiCompileSearch() cups: buffer overflows in HP-GL/2 filter cups: overflow in gif image filter | [
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2021:3140 | Red Hat Security Advisory: Red Hat Fuse 7.9.0 release and security update | log4j: Socket receiver deserialization vulnerability snakeyaml: Billion laughs attack via alias feature apache-commons-compress: Infinite loop in name encoding algorithm wildfly: The 'enabled-protocols' value in legacy security is not respected if OpenSSL security provider is in use netty: HTTP request smuggling by mishandled whitespace before the colon in HTTP headers netty: HttpObjectDecoder.java allows Content-Length header to accompanied by second Content-Length header resteasy: Improper validation of response header in MediaTypeHeaderDelegate.java class olingo-odata: Server side request forgery in AsyncResponseWrapperImpl tomcat: Mishandling of Transfer-Encoding header allows for HTTP request smuggling tomcat: Apache Tomcat AJP File Read/Inclusion Vulnerability spring-cloud-config-server: sending a request using a specially crafted URL can lead to a directory traversal attack springframework: RFD protection bypass via jsessionid Mojarra: Path traversal via either the loc parameter or the con parameter, incomplete fix of CVE-2018-14371 tomcat: deserialization flaw in session persistence storage leading to RCE RESTEasy: RESTEASY003870 exception in RESTEasy can lead to a reflected XSS attack hibernate-validator: Improper input validation in the interpolation of constraint error messages wildfly-elytron: session fixation when using FORM authentication undertow: invalid HTTP request with large chunk size tomcat: specially crafted sequence of HTTP/2 requests can lead to DoS activemq: improper authentication allows MITM attack tomcat: OutOfMemoryException caused by HTTP/2 connection leak could lead to DoS tomcat: multiple requests with invalid payload length in a WebSocket frame could lead to DoS velocity: arbitrary code execution when attacker is able to modify templates cxf: XSS via the styleSheetPath apache-httpclient: incorrect handling of malformed authority component in request URIs golang.org/x/text: possibility to trigger an infinite loop in encoding/unicode could lead to crash wildfly: Some EJB transaction objects may get accumulated causing Denial of Service wildfly: XML validation manipulation due to incomplete application of use-grammar-pool-only in xercesImpl xnio: file descriptor leak caused by growing amounts of NIO Selector file handles may lead to DoS shiro: specially crafted HTTP request may cause an authentication bypass apache-flink: directory traversal attack allows remote file writing through the REST API resteasy-client: potential sensitive information leakage in JAX-RS RESTEasy Client's WebApplicationException handling hibernate-core: SQL injection vulnerability when both hibernate.use_sql_comments and JPQL String literals are used wildfly: resource adapter logs plaintext JMS password at warning level on connection error wildfly-openssl: memory leak per HTTP session creation in WildFly OpenSSL XStream: Server-Side Forgery Request vulnerability can be activated when unmarshalling mybatis: mishandles deserialization of object streams which could result in remote code execution jetty: local temporary directory hijacking vulnerability bouncycastle: password bypass in OpenBSDBCrypt.checkPassword utility possible json-smart: uncaught exception may lead to crash or information disclosure pdfbox: infinite loop while loading a crafted PDF file pdfbox: OutOfMemory-Exception while loading a crafted PDF file jetty: Resource exhaustion when receiving an invalid large TLS frame | [
"cpe:/a:redhat:jboss_fuse:7"
] | null | 7.5 | 7.5 | null |
RHSA-2007:0386 | Red Hat Security Advisory: mutt security update | Multiple mutt tempfile race conditions fetchmail/mutt/evolution/...: APOP password disclosure vulnerability Buffer overflow in mutt's gecos structure handling | [
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws",
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws",
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2020:0521 | Red Hat Security Advisory: firefox security update | Mozilla: Missing bounds check on shared memory read in the parent process Mozilla: Incorrect parsing of template tag could result in JavaScript injection Mozilla: Memory safety bugs fixed in Firefox 73 and Firefox ESR 68.5 | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | 8.8 | 6.1 | null |
RHSA-2011:1301 | Red Hat Security Advisory: jbossws-common security update | JBossWS remote Denial of Service | [
"cpe:/a:redhat:jboss_enterprise_application_platform:5::el4",
"cpe:/a:redhat:jboss_enterprise_application_platform:5::el5",
"cpe:/a:redhat:jboss_enterprise_application_platform:5::el6"
] | null | null | null | null |
RHSA-2024:8167 | Red Hat Security Advisory: firefox security update | firefox: Use-after-free in Animation timeline (128.3.1 ESR Chemspill) | [
"cpe:/a:redhat:rhel_aus:8.4::appstream",
"cpe:/a:redhat:rhel_e4s:8.4::appstream",
"cpe:/a:redhat:rhel_tus:8.4::appstream"
] | null | 9.8 | null | null |
RHSA-2022:4787 | Red Hat Security Advisory: openvswitch2.15 security update | DPDK: out-of-bounds read/write in vhost_user_set_inflight_fd() may lead to crash dpdk: sending vhost-user-inflight type messages could lead to DoS | [
"cpe:/o:redhat:enterprise_linux:8::fastdatapath"
] | null | 6.5 | null | null |
RHSA-2024:8729 | Red Hat Security Advisory: firefox security update | firefox: thunderbird: Permission leak via embed or object elements firefox: thunderbird: Use-after-free in layout with accessibility firefox: thunderbird: Confusing display of origin for external protocol handler prompt firefox: thunderbird: XSS due to Content-Disposition being ignored in multipart/x-mixed-replace response firefox: thunderbird: Origin of permission prompt could be spoofed by long URL firefox: thunderbird: Cross origin video frame leak firefox: thunderbird: History interface could have been used to cause a Denial of Service condition in the browser firefox: thunderbird: Clipboard "paste" button persisted across tabs firefox: DOM push subscription message could hang Firefox firefox: thunderbird: Memory safety bugs fixed in Firefox 132, Thunderbird 132, Firefox ESR 128.4, and Thunderbird 128.4 | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 8.8 | null | null |
RHSA-2020:0477 | Red Hat Security Advisory: Red Hat OpenShift Service Mesh 1.0.7 servicemesh-proxy security update | istio: unauthorised access to JWT protected HTTP path | [
"cpe:/a:redhat:service_mesh:1.0::el8"
] | null | 7.3 | null | null |
RHSA-2019:0472 | Red Hat Security Advisory: java-1.8.0-ibm security update | libjpeg-turbo: Divide By Zero in alloc_sarray function in jmemmgr.c JDK: buffer overflow in jio_snprintf() and jio_vsnprintf() JDK: missing null check when accelerating Unsafe calls OpenJDK: memory disclosure in FileChannelImpl (Libraries, 8206290) JDK: unspecified vulnerability fixed in 8u201 (Deployment) | [
"cpe:/a:redhat:rhel_extras:7"
] | null | null | 3.1 | null |
RHSA-2022:1661 | Red Hat Security Advisory: zlib security update | zlib: A flaw found in zlib when compressing (not decompressing) certain inputs | [
"cpe:/a:redhat:rhel_eus:8.2::crb",
"cpe:/o:redhat:rhel_eus:8.2::baseos"
] | null | 8.2 | null | null |
RHSA-2017:2408 | Red Hat Security Advisory: qemu-kvm-rhev security and bug fix update | Qemu: i386: leakage of stack memory to guest in kvmvapic.c Qemu: net: vmxnet: integer overflow in packet initialisation Qemu: virtio: null pointer dereference in virtqueu_map_desc Qemu: usb: xhci memory leakage during device unplug Qemu: usb: xHCI: infinite loop vulnerability in xhci_ring_fetch Qemu: char: divide by zero error in serial_update_parameters Qemu: audio: intel-hda: infinite loop in processing dma buffer stream Qemu: net: rtl8139: infinite loop while transmit in C+ mode Qemu: usb: redirector: memory leakage when destroying redirector Qemu: usb: ehci: memory leakage in ehci_init_transfer Qemu: display: cirrus_vga: a divide by zero in cirrus_do_copy Qemu: display: cirrus_vga: a divide by zero in cirrus_do_copy Qemu: watchdog: memory leakage in virtual hardware watchdog wdt_i6300esb Qemu: serial: host memory leakage 16550A UART emulation Qemu: usb: infinite loop while doing control transfer in xhci_kick_epctx Qemu: libcacard: host memory leakage while creating new APDU Qemu: audio: host memory leakage via capture buffer Qemu: input: host memory lekage via keyboard events Qemu: net: infinite loop in e1000e NIC emulation Qemu: ide: ahci host memory leakage during hotunplug Qemu: usb: ehci host memory leakage during hotunplug Qemu: usb: xhci infinite recursive call via xhci_kick_ep Qemu: nbd: segmentation fault due to client non-negotiation | [
"cpe:/a:redhat:openstack:10::el7",
"cpe:/a:redhat:openstack:11::el7",
"cpe:/a:redhat:openstack:6::el7",
"cpe:/a:redhat:openstack:7::el7",
"cpe:/a:redhat:openstack:8::el7",
"cpe:/a:redhat:openstack:9::el7"
] | null | null | 5.3 | null |
RHSA-2023:6846 | Red Hat Security Advisory: OpenShift Container Platform 4.13.22 bug fix and security update | golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487) | [
"cpe:/a:redhat:openshift:4.13::el8",
"cpe:/a:redhat:openshift:4.13::el9"
] | null | 7.5 | null | null |
RHSA-2010:0145 | Red Hat Security Advisory: cpio security update | cpio large filesize buffer overflow cpio: Heap-based buffer overflow by expanding a specially-crafted archive | [
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws"
] | null | null | null | null |
RHSA-2020:1403 | Red Hat Security Advisory: qemu-kvm security and bug fix update | QEMU: Slirp: potential OOB access due to unsafe snprintf() usages | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | 5.6 | null | null |
RHSA-2023:3446 | Red Hat Security Advisory: Red Hat OpenStack Platform 16.1 (python-flask) security update | flask: Possible disclosure of permanent session cookie due to missing Vary: Cookie header | [
"cpe:/a:redhat:openstack:16.1::el8"
] | null | 7.5 | null | null |
RHSA-2011:0534 | Red Hat Security Advisory: qemu-kvm security, bug fix, and enhancement update | virtio-blk: heap buffer overflow caused by unaligned requests qemu: acpi_piix4: missing hotplug check during device removal | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2014:1063 | Red Hat Security Advisory: Transition Red Hat Network Classic Hosted to Red Hat Subscription Management | This is the 3-year notification of the target date to migrate systems from
Red Hat Network Classic Hosted to Red Hat Subscription Management. All
systems using Red Hat Network Classic Hosted must be migrated to Red Hat
Subscription Management. | [] | null | null | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.