id
stringlengths 13
15
| title
stringlengths 29
176
| description
stringlengths 8
32.1k
| cpes
sequencelengths 0
20
| cvss_v4_0
null | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
null |
---|---|---|---|---|---|---|---|
RHSA-2006:0298 | Red Hat Security Advisory: openssh security update | security flaw local to local copy uses shell expansion twice | [
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws"
] | null | null | null | null |
RHSA-2022:5529 | Red Hat Security Advisory: squid:4 security update | squid: DoS when processing gopher server responses | [
"cpe:/a:redhat:rhel_eus:8.2::appstream"
] | null | 7.5 | null | null |
RHSA-2022:2031 | Red Hat Security Advisory: libssh security, bug fix, and enhancement update | libssh: possible heap-based buffer overflow when rekeying | [
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 3.5 | null | null |
RHSA-2021:2258 | Red Hat Security Advisory: rh-nginx118-nginx security update | nginx: Off-by-one in ngx_resolver_copy() when labels are followed by a pointer to a root domain name | [
"cpe:/a:redhat:rhel_software_collections:3::el7"
] | null | 8.1 | null | null |
RHSA-2023:6469 | Red Hat Security Advisory: wireshark security update | wireshark: RTPS dissector crash wireshark: IEEE C37.118 Synchrophasor dissector crash wireshark: Candump log file parser crash wireshark: VMS TCPIPtrace file parser crash wireshark: NetScaler file parser crash wireshark: XRA dissector infinite loop | [
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::crb"
] | null | 6.5 | null | null |
RHSA-2023:5851 | Red Hat Security Advisory: RHACS 4.1 enhancement and security update | golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487) HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack) | [
"cpe:/a:redhat:advanced_cluster_security:4.1::el8"
] | null | 7.5 | null | null |
RHSA-2020:4465 | Red Hat Security Advisory: binutils security update | binutils: denial of service via crafted ELF file | [
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | null | 5.5 | null |
RHSA-2024:3047 | Red Hat Security Advisory: 389-ds:1.4 security update | 389-ds-base: a heap overflow leading to denail-of-servce while writing a value larger than 256 chars (in log_entry_attr) | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 5.5 | null | null |
RHSA-2022:1402 | Red Hat Security Advisory: OpenShift Virtualization 2.6.10 RPMs security and bug fix update | golang: net: lookup functions may return invalid host names golang: net/http/httputil: ReverseProxy forwards connection headers if first one is empty golang: math/big.Rat: may cause a panic or an unrecoverable fatal error if passed inputs with very large exponents | [
"cpe:/a:redhat:container_native_virtualization:2.6::el7",
"cpe:/a:redhat:container_native_virtualization:2.6::el8"
] | null | 7.5 | null | null |
RHSA-2021:4844 | Red Hat Security Advisory: samba security update | samba: SMB1 client connections can be downgraded to plaintext authentication samba: Active Directory (AD) domain user could become root on domain members | [
"cpe:/a:redhat:storage:3.5:samba:el7"
] | null | 8.1 | null | null |
RHSA-2020:0134 | Red Hat Security Advisory: .NET Core on Red Hat Enterprise Linux security and bug fix update | dotnet: Denial of service via backpressure issue dotnet: Memory Corruption in SignalR | [
"cpe:/a:redhat:rhel_dotnet:3.0::el7",
"cpe:/a:redhat:rhel_dotnet:3.1::el7"
] | null | 8.1 | null | null |
RHSA-2011:0152 | Red Hat Security Advisory: java-1.4.2-ibm security update | krb5: null pointer dereference in GSS-API library leads to DoS (MITKRB5-SA-2010-005) OpenJDK HttpURLConnection incomplete TRACE permission check (6981426) | [
"cpe:/a:redhat:rhel_extras:4",
"cpe:/a:redhat:rhel_extras:5::client",
"cpe:/a:redhat:rhel_extras:5::server"
] | null | null | null | null |
RHSA-2021:3529 | Red Hat Security Advisory: Red Hat Single Sign-On 7.4.9 security update on RHEL 8 | jackson-dataformat-cbor: Unchecked allocation of byte buffer can cause a java.lang.OutOfMemoryError exception keycloak: X509 Direct Grant Auth does not verify certificate timestamp validity keycloak: Brute force attack is possible even after the account lockout keycloak: Anyone can register a new device when there is no device registered for passwordless login keycloak-model-infinispan: authenticationSessions map in RootAuthenticationSessionEntity grows boundlessly could lead to a DoS attack | [
"cpe:/a:redhat:red_hat_single_sign_on:7::el8"
] | null | 7.5 | null | null |
RHSA-2023:0838 | Red Hat Security Advisory: samba security update | samba: RC4/HMAC-MD5 NetLogon Secure Channel is weak and should be avoided | [
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb",
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 8.1 | null | null |
RHSA-2022:8126 | Red Hat Security Advisory: ignition security, bug fix, and enhancement update | ignition: configs are accessible from unprivileged containers in VMs running on VMware products | [
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 7.5 | null | null |
RHSA-2019:1819 | Red Hat Security Advisory: rh-redis5-redis security update | redis: Heap buffer overflow in HyperLogLog triggered by malicious client redis: Stack buffer overflow in HyperLogLog triggered by malicious client | [
"cpe:/a:redhat:rhel_software_collections:3::el7"
] | null | null | 7.2 | null |
RHSA-2014:1788 | Red Hat Security Advisory: openstack-cinder security and bug fix update | openstack-cinder: Cinder-volume host data leak to virtual machine instance Trove: potential leak of passwords into log files Trove: potential leak of passwords into log files | [
"cpe:/a:redhat:openstack:5::el7"
] | null | null | null | null |
RHSA-2023:5739 | Red Hat Security Advisory: java-11-openjdk security and bug fix update | OpenJDK: certificate path validation issue during client authentication (8309966) | [
"cpe:/a:redhat:rhel_aus:8.2::appstream",
"cpe:/a:redhat:rhel_e4s:8.2::appstream",
"cpe:/a:redhat:rhel_tus:8.2::appstream"
] | null | 5.3 | null | null |
RHSA-2021:1509 | Red Hat Security Advisory: rh-eclipse-jetty security update | jetty: Symlink directory exposes webapp directory contents jetty: Ambiguous paths can access WEB-INF jetty: Resource exhaustion when receiving an invalid large TLS frame | [
"cpe:/a:redhat:devtools:2021"
] | null | 7.5 | null | null |
RHSA-2020:4137 | Red Hat Security Advisory: security update - Red Hat Ansible Tower 3.6.6-1 - RHEL7 Container | django-rest-framework: XSS Vulnerability in API viewer | [
"cpe:/a:redhat:ansible_tower:3.6::el7"
] | null | 5.4 | null | null |
RHSA-2024:10984 | Red Hat Security Advisory: ruby:3.1 security update | rexml: REXML ReDoS vulnerability | [
"cpe:/a:redhat:rhel_eus:9.4::appstream"
] | null | 7.5 | null | null |
RHSA-2020:4847 | Red Hat Security Advisory: pki-core:10.6 and pki-deps:10.6 security, bug fix, and enhancement update | jquery: Cross-site scripting via cross-domain ajax requests bootstrap: XSS in the data-target attribute bootstrap: Cross-site Scripting (XSS) in the collapse data-parent attribute bootstrap: Cross-site Scripting (XSS) in the data-container property of tooltip bootstrap: XSS in the tooltip or popover data-template attribute pki-core: Reflected XSS in 'path length' constraint field in CA's Agent page pki-core/pki-kra: Reflected XSS in recoveryID search field at KRA's DRM agent page in authorize recovery tab pki-core: Reflected XSS in getcookies?url= endpoint in CA jquery: Prototype pollution in object's prototype leading to denial of service, remote code execution, or property injection pki-core: KRA vulnerable to reflected XSS via the getPk12 page tomcat: Mishandling of Transfer-Encoding header allows for HTTP request smuggling tomcat: Apache Tomcat AJP File Read/Inclusion Vulnerability jquery: Cross-site scripting due to improper injQuery.htmlPrefilter method jquery: Untrusted code execution via <option> tag in HTML passed to DOM manipulation methods pki: Dogtag's python client does not validate certificates pki-core: XSS in the certificate search results tomcat: request mixup | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 8.6 | 5.6 | null |
RHSA-2017:1201 | Red Hat Security Advisory: thunderbird security update | libevent: Stack-buffer overflow in the name_parse() function libevent: Stack-buffer overflow in evutil_parse_sockaddr_port() libevent: Out-of-bounds read in search_make_new() Mozilla: Memory safety bugs fixed in Firefox 53, Firefox ESR 45.9, and Firefox ESR 52.1 (MFSA 2017-11, MFSA 2017-12) Mozilla: Use-after-free in text input selection (MFSA 2017-11, MFSA 2017-12) Mozilla: Use-after-free in SMIL animation functions (MFSA 2017-11, MFSA 2017-12) Mozilla: Use-after-free during focus handling (MFSA 2017-11, MFSA 2017-12) Mozilla: Use-after-free during transaction processing in the editor (MFSA 2017-11, MFSA 2017-12) Mozilla: Out-of-bounds write with malicious font in Graphite 2 (MFSA 2017-11, MFSA 2017-12) Mozilla: Use-after-free in nsAutoPtr during XSLT processing (MFSA 2017-11, MFSA 2017-12) Mozilla: Use-after-free in nsTArray Length() during XSLT processing (MFSA 2017-11, MFSA 2017-12) Mozilla: Use-after-free in txExecutionState destructor during XSLT processing (MFSA 2017-11, MFSA 2017-12) Mozilla: Use-after-free with selection during scroll events (MFSA 2017-11, MFSA 2017-12) Mozilla: Use-after-free during style changes (MFSA 2017-11, MFSA 2017-12) Mozilla: Out-of-bounds write during BinHex decoding (MFSA 2017-11, MFSA 2017-12) Mozilla: Buffer overflow while parsing application/http-index-format content (MFSA 2017-11, MFSA 2017-12) Mozilla: Uninitialized values used while parsing application/http-index-format content (MFSA 2017-11, MFSA 2017-12) Mozilla: Out-of-bounds read when HTTP/2 DATA frames are sent with incorrect data (MFSA 2017-11, MFSA 2017-12) Mozilla: Out-of-bounds read during glyph processing (MFSA 2017-11, MFSA 2017-12) Mozilla: Crash during bidirectional unicode manipulation with animation (MFSA 2017-11, MFSA 2017-12) Mozilla: Addressbar spoofing with onblur event (MFSA 2017-12) Mozilla: Sandbox escape allowing file system read access through file picker (MFSA 2017-12) Mozilla: Buffer overflow in WebGL (MFSA 2017-11, MFSA 2017-12) Mozilla: Use-after-free in frame selection (MFSA 2017-11, MFSA 2017-12) Mozilla: Memory corruption with accessibility and DOM manipulation (MFSA 2017-11, MFSA 2017-12) Mozilla: Out-of-bounds read in ConvolvePixel (MFSA 2017-11, MFSA 2017-12) Mozilla: Origin confusion when reloading isolated data:text/html URL (MFSA 2017-12) Mozilla: Memory corruption when drawing Skia content (MFSA 2017-12) Mozilla: Potential Buffer overflow in flex-generated code (MFSA 2017-11, MFSA 2017-12) | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation",
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 9.8 | null |
RHSA-2017:0170 | Red Hat Security Advisory: JBoss Enterprise Application Platform 7.0.4 on RHEL 6 | EAP: Sensitive data can be exposed at the server level in domain mode admin-cli: Potential EAP resource starvation DOS attack via GET requests for server log files | [
"cpe:/a:redhat:jboss_enterprise_application_platform:7::el6"
] | null | null | 4.3 | null |
RHSA-2025:1253 | Red Hat Security Advisory: kernel security update | kernel: media: uvcvideo: Skip parsing frames of type UVC_VS_UNDEFINED in uvc_parse_format kernel: mm: fix NULL pointer dereference in alloc_pages_bulk_noprof | [
"cpe:/a:redhat:rhel_e4s:9.0::appstream",
"cpe:/o:redhat:rhel_e4s:9.0::baseos"
] | null | 5.5 | null | null |
RHSA-2005:831 | Red Hat Security Advisory: php security update | security flaw security flaw security flaw security flaw | [
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws",
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2023:3318 | Red Hat Security Advisory: go-toolset and golang security update | golang: crypto/internal/nistec: specific unreduced P-256 scalars produce incorrect results golang: net/http, net/textproto: denial of service from excessive memory allocation golang: net/http, net/textproto, mime/multipart: denial of service from excessive resource consumption golang: go/parser: Infinite loop in parsing golang: html/template: backticks not treated as string delimiters golang: html/template: improper sanitization of CSS values golang: html/template: improper handling of JavaScript whitespace golang: html/template: improper handling of empty HTML attributes | [
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 7.3 | null | null |
RHSA-2012:1232 | Red Hat Security Advisory: JBoss Enterprise Portal Platform 5.2.2 update | JDK: XML parsing Denial-Of-Service (6845701) CSRF on jmx-console allows invocation of operations on mbeans JNDI: unauthenticated remote write access is permitted by default jakarta: JVM destabilization due to memory exhaustion when processing CDF/CFBF files JBoss: authentication bypass when running under JACC with ignoreBaseDecision on JBossWebRealm JGroups diagnostics service enabled by default with no authentication when a JGroups channel is started | [
"cpe:/a:redhat:jboss_enterprise_portal_platform:5.2"
] | null | null | null | null |
RHSA-2022:1860 | Red Hat Security Advisory: maven:3.6 security and enhancement update | apache-httpclient: incorrect handling of malformed authority component in request URIs | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 5.3 | null | null |
RHSA-2019:0237 | Red Hat Security Advisory: etcd security, bug fix, and enhancement update | An update for etcd is now available for Red Hat Enterprise Linux 7 Extras.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
[Updated 5th March 2019]
On 5th February 2019, the updated etcd packages previously included in this erratum were removed. For further details about this removal, refer to the Red Hat Knowledgebase article 3938261 linked in the References section. | [
"cpe:/a:redhat:rhel_extras_other:7"
] | null | null | null | null |
RHSA-2011:0427 | Red Hat Security Advisory: spice-xpi security update | spice-xpi: unitialized pointer writes possible when getting plugin properties | [
"cpe:/a:redhat:rhel_productivity:5"
] | null | null | null | null |
RHSA-2015:0884 | Red Hat Security Advisory: novnc security update | novnc: session hijack through insecurely set session token cookies | [
"cpe:/a:redhat:openstack:4::el6"
] | null | null | null | null |
RHSA-2017:3382 | Red Hat Security Advisory: firefox security update | Mozilla: Web worker in Private Browsing mode can write IndexedDB data | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation",
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 7.5 | null |
RHSA-2022:1823 | Red Hat Security Advisory: mod_auth_openidc:2.3 security update | mod_auth_openidc: open redirect in oidc_validate_redirect_url() mod_auth_openidc: hardcoded static IV and AAD with a reused key in AES GCM encryption mod_auth_openidc: XSS when using OIDCPreservePost On mod_auth_openidc: open redirect due to target_link_uri parameter not validated | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 6.1 | 6.1 | null |
RHSA-2020:4444 | Red Hat Security Advisory: glibc security, bug fix, and enhancement update | glibc: array overflow in backtrace functions for powerpc glibc: use-after-free in glob() function when expanding ~user glibc: stack corruption from crafted input in cosl, sinl, sincosl, and tanl functions | [
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb",
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 5.7 | null | null |
RHSA-2005:010 | Red Hat Security Advisory: vim security update | security flaw | [
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws"
] | null | null | null | null |
RHSA-2021:3886 | Red Hat Security Advisory: java-11-openjdk security update | OpenJDK: Weak ciphers preferred over stronger ones for TLS (JSSE, 8264210) OpenJDK: Excessive memory allocation in RTFParser (Swing, 8265167) OpenJDK: Excessive memory allocation in RTFReader (Swing, 8265580) OpenJDK: Excessive memory allocation in HashMap and HashSet (Utility, 8266097) OpenJDK: Certificates with end dates too far in the future can corrupt keystore (Keytool, 8266137) OpenJDK: Loop in HttpsServer triggered during TLS session close (JSSE, 8254967) OpenJDK: Incorrect principal selection when using Kerberos Constrained Delegation (Libraries, 8266689) OpenJDK: Unexpected exception raised during TLS handshake (JSSE, 8267729) OpenJDK: Excessive memory allocation in BMPImageReader (ImageIO, 8267735) OpenJDK: Non-constant comparison during TLS handshakes (JSSE, 8269618) | [
"cpe:/a:redhat:rhel_eus:8.1::appstream"
] | null | 3.7 | null | null |
RHSA-2014:1321 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 5.2.0 security update | CXF: SSL hostname verification bypass, incomplete CVE-2012-5783 fix CXF: SSL hostname verification bypass, incomplete CVE-2012-6153 fix | [
"cpe:/a:redhat:jboss_enterprise_application_platform:5::el4",
"cpe:/a:redhat:jboss_enterprise_application_platform:5::el5",
"cpe:/a:redhat:jboss_enterprise_application_platform:5::el6"
] | null | null | 4.8 | null |
RHSA-2023:6207 | Red Hat Security Advisory: Red Hat JBoss Web Server 5.7.6 release and security update | tomcat: improper cleaning of recycled objects could lead to information leak tomcat: incorrectly parsed http trailer headers can cause request smuggling | [
"cpe:/a:redhat:jboss_enterprise_web_server:5.7"
] | null | 5.3 | null | null |
RHSA-2024:1787 | Red Hat Security Advisory: squid security update | squid: Denial of Service in SSL Certificate validation squid: NULL pointer dereference in the gopher protocol code squid: Buffer over-read in the HTTP Message processing feature squid: Incorrect Check of Function Return Value In Helper Process management squid: denial of service in HTTP request parsing squid: denial of service in HTTP header parser | [
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 8.6 | null | null |
RHSA-2010:0750 | Red Hat Security Advisory: xpdf security update | xpdf: uninitialized Gfx::parser pointer dereference | [
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws"
] | null | null | null | null |
RHSA-2023:3204 | Red Hat Security Advisory: OpenShift Virtualization 4.13.0 RPMs security and bug fix update | golang: net/http: handle server errors after sending GOAWAY golang: golang.org/x/text/language: ParseAcceptLanguage takes a long time to parse complex tags golang: math/big: decoding big.Float and big.Rat types can panic if the encoded message is too short, potentially allowing a denial of service golang: net/url: JoinPath does not strip relative path components in all circumstances golang: net/http: excessive memory growth in a Go server accepting HTTP/2 requests | [
"cpe:/a:redhat:container_native_virtualization:4.13::el7",
"cpe:/a:redhat:container_native_virtualization:4.13::el8",
"cpe:/a:redhat:container_native_virtualization:4.13::el9"
] | null | 5.3 | null | null |
RHSA-2024:4645 | Red Hat Security Advisory: qt5-qtbase security update | qtbase: qtbase: Delay any communication until encrypted() can be responded to | [
"cpe:/a:redhat:rhel_e4s:9.0::appstream"
] | null | 7.5 | null | null |
RHSA-2018:1860 | Red Hat Security Advisory: samba security and bug fix update | samba: NULL pointer dereference in printer server process | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | 4.3 | null |
RHSA-2024:3128 | Red Hat Security Advisory: perl:5.32 security update | perl: Write past buffer end via illegal user-defined Unicode property | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 7 | null | null |
RHSA-2011:0200 | Red Hat Security Advisory: krb5 security update | krb5: kpropd unexpected termination on invalid input (MITKRB5-SA-2011-001) krb5: KDC hang when using LDAP backend caused by special principal name (MITKRB5-SA-2011-002) krb5: KDC crash when using LDAP backend caused by a special principal name (MITKRB5-SA-2011-002) | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2023:1905 | Red Hat Security Advisory: java-1.8.0-openjdk security update | OpenJDK: improper connection handling during TLS handshake (8294474) OpenJDK: missing string checks for NULL characters (8296622) OpenJDK: incorrect handling of NULL characters in ProcessBuilder (8295304) OpenJDK: Swing HTML parsing issue (8296832) OpenJDK: incorrect enqueue of references in garbage collector (8298191) OpenJDK: certificate validation issue in TLS session negotiation (8298310) OpenJDK: missing check for slash characters in URI-to-path conversion (8298667) | [
"cpe:/a:redhat:rhel_aus:8.2::appstream",
"cpe:/a:redhat:rhel_e4s:8.2::appstream",
"cpe:/a:redhat:rhel_tus:8.2::appstream"
] | null | 3.7 | null | null |
RHSA-2011:0265 | Red Hat Security Advisory: ccs security update | rgmanager: multiple insecure temporary file use issues | [
"cpe:/a:redhat:rhel_cluster:4"
] | null | null | null | null |
RHSA-2022:0737 | Red Hat Security Advisory: Red Hat build of Eclipse Vert.x 4.2.5 security update | Kafka: Timing Attack Vulnerability for Apache Kafka Connect and Clients | [
"cpe:/a:redhat:openshift_application_runtimes:1.0"
] | null | 5.9 | null | null |
RHSA-2023:3581 | Red Hat Security Advisory: .NET 6.0 security, bug fix, and enhancement update | dotnet: Bypass restrictions when deserializing a DataSet or DataTable from XML dotnet: .NET Kestrel: Denial of Service processing X509 Certificates dotnet: vulnerability exists in NuGet where a potential race condition can lead to a symlink attack dotnet: Remote Code Execution - Source generators issue can lead to a crash due to unmanaged heap corruption | [
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::crb"
] | null | 7.3 | null | null |
RHSA-2015:2547 | Red Hat Security Advisory: Red Hat JBoss Operations Network 3.2.3 security update | apache-commons-collections: InvokerTransformer code execution during deserialisation | [
"cpe:/a:redhat:jboss_operations_network:3.2.3"
] | null | null | null | null |
RHSA-2019:1968 | Red Hat Security Advisory: qemu-kvm-rhev security and bug fix update | QEMU: device_tree: heap buffer overflow while loading device tree blob QEMU: slirp: heap buffer overflow in tcp_emu() | [
"cpe:/a:redhat:rhev_manager:4.2",
"cpe:/a:redhat:rhev_manager:4.3",
"cpe:/o:redhat:enterprise_linux:7::hypervisor"
] | null | null | 7.8 | null |
RHSA-2023:1900 | Red Hat Security Advisory: java-17-openjdk security and bug fix update | OpenJDK: improper connection handling during TLS handshake (8294474) OpenJDK: missing string checks for NULL characters (8296622) OpenJDK: incorrect handling of NULL characters in ProcessBuilder (8295304) OpenJDK: Swing HTML parsing issue (8296832) OpenJDK: incorrect enqueue of references in garbage collector (8298191) OpenJDK: certificate validation issue in TLS session negotiation (8298310) OpenJDK: missing check for slash characters in URI-to-path conversion (8298667) | [
"cpe:/a:redhat:rhel_eus:9.0::appstream",
"cpe:/a:redhat:rhel_eus:9.0::crb"
] | null | 3.7 | null | null |
RHSA-2023:5313 | Red Hat Security Advisory: open-vm-tools security update | open-vm-tools: SAML token signature bypass | [
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 7.1 | null | null |
RHSA-2022:5542 | Red Hat Security Advisory: squid security update | squid: DoS when processing gopher server responses | [
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 7.5 | null | null |
RHSA-2023:0823 | Red Hat Security Advisory: thunderbird security update | Mozilla: User Interface lockup with messages combining S/MIME and OpenPGP Mozilla: Content security policy leak in violation reports using iframes Mozilla: Extensions could have opened external schemes without user knowledge Mozilla: Screen hijack via browser fullscreen mode Mozilla: Out of bounds memory write from EncodeInputStream Mozilla: Potential use-after-free from compartment mismatch in SpiderMonkey Mozilla: Invalid downcast in SVGUtils::SetupStrokeGeometry Mozilla: Use-after-free in mozilla::dom::ScriptLoadContext::~ScriptLoadContext Mozilla: Web Crypto ImportKey crashes tab Mozilla: Fullscreen notification not shown in Firefox Focus Mozilla: Memory safety bugs fixed in Firefox 110 and Firefox ESR 102.8 Mozilla: Memory safety bugs fixed in Firefox ESR 102.8 | [
"cpe:/a:redhat:rhel_eus:9.0::appstream"
] | null | 8.8 | null | null |
RHSA-2021:1299 | Red Hat Security Advisory: java-1.8.0-openjdk security update | OpenJDK: Incomplete enforcement of JAR signing disabled algorithms (Libraries, 8249906) | [
"cpe:/a:redhat:rhel_eus:8.2::appstream"
] | null | 5.3 | null | null |
RHSA-2024:3347 | Red Hat Security Advisory: python3 security update | python: Path traversal on tempfile.TemporaryDirectory python: The zipfile module is vulnerable to zip-bombs leading to denial of service | [
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 6.2 | null | null |
RHSA-2021:5226 | Red Hat Security Advisory: openssl security update | openssl: Read buffer overruns processing ASN.1 strings | [
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 7.4 | null | null |
RHSA-2024:6663 | Red Hat Security Advisory: kpatch-patch-4_18_0-305_120_1 and kpatch-patch-4_18_0-305_138_1 security update | kernel: virtio-net: tap: mlx5_core short frame denial of service kernel: virtio-net: tun: mlx5_core short frame denial of service | [
"cpe:/o:redhat:rhel_e4s:8.4::baseos"
] | null | 7.1 | null | null |
RHSA-2009:1146 | Red Hat Security Advisory: JBoss Enterprise Application Platform 4.3.0.CP05 update | tomcat request dispatcher information disclosure vulnerability tomcat6 Information disclosure in authentication classes tomcat XML parser information disclosure | [
"cpe:/a:redhat:jboss_enterprise_application_platform:4.3.0::el4"
] | null | null | null | null |
RHSA-2024:9017 | Red Hat Security Advisory: thunderbird security update | firefox: thunderbird: Permission leak via embed or object elements firefox: thunderbird: Use-after-free in layout with accessibility firefox: thunderbird: Confusing display of origin for external protocol handler prompt firefox: thunderbird: XSS due to Content-Disposition being ignored in multipart/x-mixed-replace response firefox: thunderbird: Origin of permission prompt could be spoofed by long URL firefox: thunderbird: Cross origin video frame leak firefox: thunderbird: History interface could have been used to cause a Denial of Service condition in the browser firefox: thunderbird: Clipboard "paste" button persisted across tabs firefox: DOM push subscription message could hang Firefox firefox: thunderbird: Memory safety bugs fixed in Firefox 132, Thunderbird 132, Firefox ESR 128.4, and Thunderbird 128.4 | [
"cpe:/a:redhat:rhel_aus:8.6::appstream",
"cpe:/a:redhat:rhel_e4s:8.6::appstream",
"cpe:/a:redhat:rhel_tus:8.6::appstream"
] | null | 8.8 | null | null |
RHSA-2022:0026 | Red Hat Security Advisory: OpenShift Container Platform 4.6.53 security update | log4j-core: DoS in log4j 2.x with Thread Context Map (MDC) input data contains a recursive lookup and context lookup pattern | [
"cpe:/a:redhat:openshift:4.6::el8"
] | null | 5.9 | null | null |
RHSA-2011:0841 | Red Hat Security Advisory: systemtap security update | systemtap: does not guard against DWARF operations div-by-zero errors, which can cause a kernel panic | [
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2023:4488 | Red Hat Security Advisory: Red Hat OpenShift support for Windows Containers 6.0.1[security update] | golang: crash in a golang.org/x/crypto/ssh server golang: crypto/tls: session tickets lack random ticket_age_add containerd: Supplementary groups are not set up properly | [
"cpe:/a:redhat:openshift:4.11::el8"
] | null | 7.3 | null | null |
RHSA-2022:5100 | Red Hat Security Advisory: grub2, mokutil, shim, and shim-unsigned-x64 security update | grub2: Crafted PNG grayscale images may lead to out-of-bounds write in heap grub2: Crafted PNG image may lead to out-of-bound write during huffman table handling grub2: Crafted JPEG image can lead to buffer underflow write in the heap grub2: Integer underflow in grub_net_recv_ip4_packets grub2: Out-of-bound write when handling split HTTP headers grub2: shim_lock verifier allows non-kernel files to be loaded grub2: use-after-free in grub_cmd_chainloader() shim: Buffer overflow when loading crafted EFI images | [
"cpe:/a:redhat:rhel_eus:8.2::crb",
"cpe:/o:redhat:rhel_eus:8.2::baseos"
] | null | 7.3 | null | null |
RHSA-2020:5661 | Red Hat Security Advisory: postgresql:9.6 security update | postgresql: Selectivity estimators bypass row security policies postgresql: TYPE in pg_temp executes arbitrary SQL during SECURITY DEFINER execution postgresql: ALTER ... DEPENDS ON EXTENSION is missing authorization checks postgresql: Uncontrolled search path element in CREATE EXTENSION postgresql: Reconnection can downgrade connection security settings postgresql: Multiple features escape "security restricted operation" sandbox postgresql: psql's \gset allows overwriting specially treated variables | [
"cpe:/a:redhat:rhel_e4s:8.0::appstream"
] | null | 7.5 | 7.5 | null |
RHSA-2024:0278 | Red Hat Security Advisory: Red Hat AMQ Broker 7.11.5 release and security update | bouncycastle: potential blind LDAP injection attack using a self-signed certificate | [
"cpe:/a:redhat:amq_broker:7.11"
] | null | 5.3 | null | null |
RHSA-2018:1688 | Red Hat Security Advisory: org.ovirt.engine-root security update | hw: cpu: speculative store bypass | [
"cpe:/a:redhat:rhev_manager:3"
] | null | null | 5.6 | null |
RHSA-2007:0355 | Red Hat Security Advisory: php security update | php libxmlrpc library overflow php CRLF injection php make_http_soap_request flaw | [
"cpe:/a:redhat:rhel_application_stack:1"
] | null | null | null | null |
RHSA-2022:6782 | Red Hat Security Advisory: Red Hat Single Sign-On 7.5.3 security update on RHEL 7 | jackson-databind: denial of service via a large depth of nested objects h2: Remote Code Execution in Console netty: control chars in header names may lead to HTTP request smuggling xnio: org.xnio.StreamConnection.notifyReadClosed log to debug instead of stderr keycloak: Stored XSS in groups dropdown wildfly: Wildfly management of EJB Session context returns wrong caller principal with Elytron Security enabled keycloak: improper input validation permits script injection keycloak: Uploading of SAML javascript protocol mapper scripts through the admin console | [
"cpe:/a:redhat:red_hat_single_sign_on:7.5::el7"
] | null | 6.4 | null | null |
RHSA-2007:0153 | Red Hat Security Advisory: php security update | gd: buffer overrun security flaw security flaw security flaw | [
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2014:0830 | Red Hat Security Advisory: Red Hat Enterprise Linux 6.3 Extended Update Support Retirement Notice | This is the final notification for the retirement of Red Hat Enterprise
Linux 6.3 Extended Update Support (EUS). This notification applies only to
those customers subscribed to the Extended Update Support (EUS) channel for
Red Hat Enterprise Linux 6.3. | [
"cpe:/o:redhat:rhel_eus:6.3::server"
] | null | null | null | null |
RHSA-2023:1325 | Red Hat Security Advisory: OpenShift Container Platform 4.13.0 security update | buildah: possible information disclosure and modification OpenShift: Missing HTTP Strict Transport Security golang: crash in a golang.org/x/crypto/ssh server golang: net/http: excessive memory growth in a Go server accepting HTTP/2 requests golang: path/filepath: path-filepath filepath.Clean path traversal golang.org/x/net/http2: avoid quadratic complexity in HPACK decoding golang: crypto/tls: large handshake records may cause panics golang: net/http, mime/multipart: denial of service from excessive resource consumption haproxy: segfault DoS openshift/apiserver-library-go: Bypass of SCC seccomp profile restrictions podman: symlink exchange attack in podman export volume python-werkzeug: high resource usage when parsing multipart form data with many fields haproxy: request smuggling attack in HTTP/1 header parsing | [
"cpe:/a:redhat:openshift:4.13::el8",
"cpe:/a:redhat:openshift:4.13::el9",
"cpe:/a:redhat:openshift_ironic:4.13::el9"
] | null | 8.2 | null | null |
RHBA-2013:0009 | Red Hat Bug Fix Advisory: mod_nss bug fix update | mod_nss: FakeBasicAuth authentication bypass | [
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2005:232 | Red Hat Security Advisory: ipsec-tools security update | security flaw | [
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws",
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2022:5767 | Red Hat Security Advisory: firefox security update | Mozilla: Memory safety bugs fixed in Firefox 103 and 102.1 Mozilla: Directory indexes for bundled resources reflected URL parameters Mozilla: Mouse Position spoofing with CSS transforms | [
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 7.5 | 6.1 | null |
RHSA-2023:0209 | Red Hat Security Advisory: java-1.8.0-openjdk security update | OpenJDK: improper restrictions in CORBA deserialization (Serialization, 8285021) OpenJDK: soundbank URL remote loading (Sound, 8293742) | [
"cpe:/a:redhat:rhel_eus:9.0::appstream",
"cpe:/a:redhat:rhel_eus:9.0::crb"
] | null | 3.7 | null | null |
RHSA-2015:1646 | Red Hat Security Advisory: rh-mariadb100-mariadb security update | mysql: unspecified vulnerability related to Server:Federated (CPU April 2015) mysql: unspecified vulnerability related to Server:Compiling (CPU April 2015) mysql: unspecified vulnerability related to Server:DDL (CPU April 2015) mysql: unspecified vulnerability related to Server:Optimizer (CPU April 2015) mysql: unspecified vulnerability related to Server:GIS (CPU July 2015) mysql: unspecified vulnerability related to Server:DML (CPU July 2015) mysql: unspecified vulnerability related to Server:Partition (CPU July 2015) mysql: unspecified vulnerability related to Server:Security:Privileges (CPU July 2015) mysql: unspecified vulnerability related to Server:Security:Firewall (CPU July 2015) mysql: unspecified vulnerability related to Server:Security:Privileges (CPU July 2015) mysql: unspecified vulnerability related to Server:Optimizer (CPU July 2015) mysql: unspecified vulnerability related to Server:DML (CPU July 2015) mysql: unspecified vulnerability related to Client (CPU July 2015) mysql: use of SSL/TLS can not be enforced in mysql client library (oCERT-2015-003, BACKRONYM) mysql: unspecified vulnerability related to Server:Pluggable Auth (CPU July 2015) mysql: unspecified vulnerability related to Server:I_S (CPU July 2015) mysql: unspecified vulnerability related to Server:InnoDB (CPU July 2015) mysql: unspecified vulnerability related to Server:Optimizer (CPU July 2015) mysql: unspecified vulnerability related to Server:Memcached (CPU July 2015) mysql: unspecified vulnerability related to Server:Security:Firewall (CPU July 2015) mysql: unspecified vulnerability related to Server:Security:Firewall (CPU July 2015) mysql: unspecified vulnerability related to Server:RBR (CPU July 2015) mysql: unspecified vulnerability related to Server:Partition (CPU July 2015) mysql: unspecified vulnerability related to Server:Security:Privileges (CPU October 2015) mysql: unspecified vulnerability related to Server:InnoDB (CPU October 2015) | [
"cpe:/a:redhat:rhel_software_collections:2::el6",
"cpe:/a:redhat:rhel_software_collections:2::el7"
] | null | null | null | null |
RHSA-2024:4744 | Red Hat Security Advisory: resource-agents update | urllib3: proxy-authorization request header is not stripped during cross-origin redirects | [
"cpe:/a:redhat:rhel_eus:8.8::highavailability",
"cpe:/a:redhat:rhel_eus:8.8::resilientstorage"
] | null | 4.4 | null | null |
RHSA-2022:8226 | Red Hat Security Advisory: python-lxml security update | lxml: NULL Pointer Dereference in lxml | [
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 7.5 | null | null |
RHSA-2023:0728 | Red Hat Security Advisory: OpenShift Container Platform 4.12.3 security update | goutils: RandomAlphaNumeric and CryptoRandomAlphaNumeric are not as random as they should be golang: net/http: excessive memory growth in a Go server accepting HTTP/2 requests | [
"cpe:/a:redhat:openshift:4.12::el8",
"cpe:/a:redhat:openshift:4.12::el9"
] | null | 5.3 | null | null |
RHSA-2023:0772 | Red Hat Security Advisory: OpenShift Container Platform 4.12.4 security update | kubernetes: Unauthorized read of Custom Resources | [
"cpe:/a:redhat:openshift:4.12::el8"
] | null | 6.5 | null | null |
RHSA-2021:3081 | Red Hat Security Advisory: cloud-init security update | cloud-init: randomly generated passwords logged in clear-text to world-readable file | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 5.5 | null | null |
RHSA-2021:3143 | Red Hat Security Advisory: .NET Core 3.1 on RHEL 7 security and bugfix update | dotnet: ASP.NET Core WebSocket frame processing DoS dotnet: Dump file created world-readable dotnet: ASP.NET Core JWT token logging | [
"cpe:/a:redhat:rhel_dotnet:3.1::el7"
] | null | 5.5 | null | null |
RHSA-2003:368 | Red Hat Security Advisory: Updated IA64 kernel packages address security vulnerabilities, bugfixes | security flaw security flaw | [
"cpe:/o:redhat:enterprise_linux:2.1::as",
"cpe:/o:redhat:enterprise_linux:2.1::aw"
] | null | null | null | null |
RHSA-2015:2417 | Red Hat Security Advisory: autofs security, bug fix and enhancement update | autofs: priv escalation via interpreter load path for program based automount maps | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | null | null |
RHSA-2022:8963 | Red Hat Security Advisory: Red Hat Single Sign-On 7.6.1 security update on RHEL 9 | keycloak: path traversal via double URL encoding keycloak: Session takeover with OIDC offline refreshtokens | [
"cpe:/a:redhat:red_hat_single_sign_on:7.6::el9"
] | null | 6.8 | null | null |
RHSA-2004:304 | Red Hat Security Advisory: pam security update | security flaw | [
"cpe:/o:redhat:enterprise_linux:2.1::as",
"cpe:/o:redhat:enterprise_linux:2.1::aw",
"cpe:/o:redhat:enterprise_linux:2.1::es",
"cpe:/o:redhat:enterprise_linux:2.1::ws"
] | null | null | null | null |
RHSA-2021:1989 | Red Hat Security Advisory: bind security update | bind: An assertion check can fail while answering queries for DNAME records that require the DNAME to be processed to resolve itself | [
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 7.5 | null | null |
RHSA-2008:0581 | Red Hat Security Advisory: bluez-libs and bluez-utils security update | bluez-libs: SDP payload processing vulnerability | [
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws",
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2022:0855 | Red Hat Security Advisory: OpenShift sandboxed containers 1.2.0 security update | golang: net/http/httputil: panic due to racy read of persistConn after handler panic golang: net/http: limit growth of header canonicalization cache | [
"cpe:/a:redhat:openshift_sandboxed_containers:1.2.0::el8"
] | null | 7.5 | null | null |
RHSA-2022:9070 | Red Hat Security Advisory: firefox security update | Mozilla: Arbitrary file read from a compromised content process Mozilla: Drag and Dropped Filenames could have been truncated to malicious extensions Mozilla: Memory safety bugs fixed in Firefox ESR 102.6 and Thunderbird 102.6 Mozilla: Use-after-free in WebGL Mozilla: Memory corruption in WebGL Mozilla: Use-after-free in WebGL | [
"cpe:/a:redhat:rhel_aus:8.2::appstream",
"cpe:/a:redhat:rhel_e4s:8.2::appstream",
"cpe:/a:redhat:rhel_tus:8.2::appstream"
] | null | 8.1 | null | null |
RHSA-2021:3436 | Red Hat Security Advisory: kpatch-patch security update | kernel: powerpc: KVM guest OS users can cause host OS memory corruption | [
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 7.8 | null | null |
RHSA-2023:6257 | Red Hat Security Advisory: OpenShift Container Platform 4.13.21 bug fix and security update | golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487) | [
"cpe:/a:redhat:openshift:4.13::el8",
"cpe:/a:redhat:openshift:4.13::el9"
] | null | 7.5 | null | null |
RHSA-2022:6073 | Red Hat Security Advisory: kernel security update | kernel: a use-after-free write in the netfilter subsystem can lead to privilege escalation to root | [
"cpe:/o:redhat:rhel_aus:7.7::server",
"cpe:/o:redhat:rhel_e4s:7.7::server",
"cpe:/o:redhat:rhel_tus:7.7::server"
] | null | 7.8 | null | null |
RHSA-2015:0749 | Red Hat Security Advisory: libxml2 security update | libxml2: external parameter entity loaded when entity substitution is disabled | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | null | null |
RHSA-2023:1805 | Red Hat Security Advisory: thunderbird security update | Thunderbird: Revocation status of S/Mime recipient certificates was not checked Mozilla: Memory Corruption in Safe Browsing Code Mozilla: libwebp: Double-free in libwebp Mozilla: Matrix SDK bundled with Thunderbird vulnerable to denial-of-service attack Thunderbird: Hang when processing certain OpenPGP messages Mozilla: Fullscreen notification obscured Mozilla: Potential Memory Corruption following Garbage Collector compaction Mozilla: Invalid free from JavaScript code Mozilla: Content-Disposition filename truncation leads to Reflected File Download Mozilla: Files with malicious extensions could have been downloaded unsafely on Linux Mozilla: Incorrect optimization result on ARM64 Mozilla: Memory safety bugs fixed in Firefox 112 and Firefox ESR 102.10 | [
"cpe:/a:redhat:rhel_aus:8.2::appstream",
"cpe:/a:redhat:rhel_e4s:8.2::appstream",
"cpe:/a:redhat:rhel_tus:8.2::appstream"
] | null | 8.8 | null | null |
RHSA-2020:0606 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.2 security update | netty: HTTP request smuggling netty: HttpObjectDecoder.java allows Content-Length header to accompanied by second Content-Length header netty: HTTP Request Smuggling due to Transfer-Encoding whitespace mishandling | [
"cpe:/a:redhat:jboss_enterprise_application_platform:7.2"
] | null | 7.5 | null | null |
RHSA-2023:6802 | Red Hat Security Advisory: xorg-x11-server security update | xorg-x11-server: Out-of-bounds write in XIChangeDeviceProperty/RRChangeOutputProperty | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 7.8 | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.