id
stringlengths 13
15
| title
stringlengths 29
176
| description
stringlengths 8
32.1k
| cpes
listlengths 0
20
| cvss_v4_0
null | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
null |
---|---|---|---|---|---|---|---|
RHSA-2024:2097
|
Red Hat Security Advisory: container-tools:4.0 security update
|
buildah: full container escape at build time
|
[
"cpe:/a:redhat:rhel_eus:8.6::appstream"
] | null | 8.6 | null | null |
RHSA-2023:0806
|
Red Hat Security Advisory: Mozilla Firefox security update
|
Mozilla: Content security policy leak in violation reports using iframes Mozilla: Extensions could have opened external schemes without user knowledge Mozilla: Screen hijack via browser fullscreen mode Mozilla: Out of bounds memory write from EncodeInputStream Mozilla: Potential use-after-free from compartment mismatch in SpiderMonkey Mozilla: Invalid downcast in SVGUtils::SetupStrokeGeometry Mozilla: Use-after-free in mozilla::dom::ScriptLoadContext::~ScriptLoadContext Mozilla: Web Crypto ImportKey crashes tab Mozilla: Fullscreen notification not shown in Firefox Focus Mozilla: Memory safety bugs fixed in Firefox 110 and Firefox ESR 102.8 Mozilla: Memory safety bugs fixed in Firefox ESR 102.8
|
[
"cpe:/a:redhat:rhel_e4s:8.1::appstream"
] | null | 8.8 | null | null |
RHSA-2014:1294
|
Red Hat Security Advisory: bash security update
|
bash: specially-crafted environment variables can be used to inject shell commands
|
[
"cpe:/o:redhat:rhel_els:4::as",
"cpe:/o:redhat:rhel_els:4::es",
"cpe:/o:redhat:rhel_eus:5.9",
"cpe:/o:redhat:rhel_eus:6.4::computenode",
"cpe:/o:redhat:rhel_eus:6.4::server",
"cpe:/o:redhat:rhel_mission_critical:5.6",
"cpe:/o:redhat:rhel_mission_critical:6.2::server"
] | null | null | null | null |
RHSA-2019:4361
|
Red Hat Security Advisory: fribidi security update
|
fribidi: buffer overflow in fribidi_get_par_embedding_levels_ex() in lib/fribidi-bidi.c leading to denial of service and possible code execution
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | null | 7.8 | null |
RHSA-2016:0441
|
Red Hat Security Advisory: openstack-heat bug fix and security advisory
|
openstack-heat: Vulnerability in Heat template validation leading to DoS
|
[
"cpe:/a:redhat:openstack:5::el7"
] | null | null | null | null |
RHSA-2022:0440
|
Red Hat Security Advisory: aide security update
|
aide: heap-based buffer overflow on outputs larger than B64_BUF
|
[
"cpe:/a:redhat:rhel_eus:8.4::appstream"
] | null | 7.5 | null | null |
RHSA-2022:5719
|
Red Hat Security Advisory: grafana security update
|
grafana: OAuth account takeover
|
[
"cpe:/a:redhat:rhel_eus:8.2::appstream"
] | null | 7.1 | null | null |
RHSA-2022:8893
|
Red Hat Security Advisory: OpenShift Container Platform 4.11.20 security update
|
golang: crash in a golang.org/x/crypto/ssh server
|
[
"cpe:/a:redhat:openshift:4.11::el8"
] | null | 7.5 | null | null |
RHSA-2013:1209
|
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 6.1.1 update
|
httpd: multiple XSS flaws due to unescaped hostnames httpd: XSS flaw in mod_proxy_balancer manager interface httpd: mod_rewrite allows terminal escape sequences to be written to the log file httpd: mod_dav DoS (httpd child process crash) via a URI MERGE request with source URI not handled by mod_dav PicketBox: Insecure storage of masked passwords Java: XML signature spoofing JGroups: Authentication via cached credentials Bayeux: Reflected Cross-Site Scripting (XSS)
|
[
"cpe:/a:redhat:jboss_enterprise_application_platform:6.1.1"
] | null | null | null | null |
RHSA-2023:2780
|
Red Hat Security Advisory: Image Builder security, bug fix, and enhancement update
|
golang: archive/tar: github.com/vbatts/tar-split: unbounded memory consumption when reading headers golang: net/http/httputil: ReverseProxy should not forward unparseable query parameters golang: net/http: handle server errors after sending GOAWAY golang: regexp/syntax: limit memory used by parsing regexps golang: net/http: excessive memory growth in a Go server accepting HTTP/2 requests
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 5.3 | null | null |
RHSA-2008:0269
|
Red Hat Security Advisory: redhat-ds-base security update
|
Server: insufficient buffer size for search patterns
|
[
"cpe:/a:redhat:directory_server:8::el4",
"cpe:/a:redhat:directory_server:8::el5"
] | null | null | null | null |
RHSA-2018:1450
|
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 6.4.20 security update
|
Artemis: Deserialization of untrusted input vulnerability solr: Directory traversal via Index Replication HTTP API jackson-databind: Deserialization vulnerability via readValue method of ObjectMapper jackson-databind: Unsafe deserialization due to incomplete black list (incomplete fix for CVE-2017-7525) jackson-databind: Unsafe deserialization due to incomplete black list (incomplete fix for CVE-2017-15095) tomcat: Incorrect handling of empty string URL in security constraints can lead to unintended exposure of resources jackson-databind: incomplete fix for CVE-2017-7525 permits unsafe serialization via c3p0 libraries slf4j: Deserialisation vulnerability in EventData constructor can allow for arbitrary code execution
|
[
"cpe:/a:redhat:jboss_enterprise_application_platform:6::el5"
] | null | null | 8.1 | null |
RHSA-2010:0981
|
Red Hat Security Advisory: HelixPlayer removal
|
HelixPlayer multiple flaws (CVE-2010-2997, CVE-2010-4375, CVE-2010-4378, CVE-2010-4379, CVE-2010-4382, CVE-2010-4383, CVE-2010-4385, CVE-2010-4386, CVE-2010-4392, CVE-2010-4376) HelixPlayer multiple flaws (CVE-2010-2997, CVE-2010-4375, CVE-2010-4378, CVE-2010-4379, CVE-2010-4382, CVE-2010-4383, CVE-2010-4385, CVE-2010-4386, CVE-2010-4392, CVE-2010-4376) HelixPlayer multiple flaws (CVE-2010-2997, CVE-2010-4375, CVE-2010-4378, CVE-2010-4379, CVE-2010-4382, CVE-2010-4383, CVE-2010-4385, CVE-2010-4386, CVE-2010-4392, CVE-2010-4376) HelixPlayer multiple flaws (CVE-2010-2997, CVE-2010-4375, CVE-2010-4378, CVE-2010-4379, CVE-2010-4382, CVE-2010-4383, CVE-2010-4385, CVE-2010-4386, CVE-2010-4392, CVE-2010-4376) HelixPlayer multiple flaws (CVE-2010-2997, CVE-2010-4375, CVE-2010-4378, CVE-2010-4379, CVE-2010-4382, CVE-2010-4383, CVE-2010-4385, CVE-2010-4386, CVE-2010-4392, CVE-2010-4376) HelixPlayer multiple flaws (CVE-2010-2997, CVE-2010-4375, CVE-2010-4378, CVE-2010-4379, CVE-2010-4382, CVE-2010-4383, CVE-2010-4385, CVE-2010-4386, CVE-2010-4392, CVE-2010-4376) HelixPlayer multiple flaws (CVE-2010-2997, CVE-2010-4375, CVE-2010-4378, CVE-2010-4379, CVE-2010-4382, CVE-2010-4383, CVE-2010-4385, CVE-2010-4386, CVE-2010-4392, CVE-2010-4376) HelixPlayer multiple flaws (CVE-2010-2997, CVE-2010-4375, CVE-2010-4378, CVE-2010-4379, CVE-2010-4382, CVE-2010-4383, CVE-2010-4385, CVE-2010-4386, CVE-2010-4392, CVE-2010-4376) HelixPlayer multiple flaws (CVE-2010-2997, CVE-2010-4375, CVE-2010-4378, CVE-2010-4379, CVE-2010-4382, CVE-2010-4383, CVE-2010-4385, CVE-2010-4386, CVE-2010-4392, CVE-2010-4376) HelixPlayer multiple flaws (CVE-2010-2997, CVE-2010-4375, CVE-2010-4378, CVE-2010-4379, CVE-2010-4382, CVE-2010-4383, CVE-2010-4385, CVE-2010-4386, CVE-2010-4392, CVE-2010-4376)
|
[
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2023:2532
|
Red Hat Security Advisory: libarchive security update
|
libarchive: NULL pointer dereference in archive_write.c
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::crb",
"cpe:/o:redhat:enterprise_linux:9::baseos"
] | null | 5.9 | null | null |
RHSA-2017:3240
|
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 6.4.18 security update
|
SSL/TLS: Birthday attack against 64-bit block ciphers (SWEET32) httpd: Uninitialized memory reflection in mod_auth_digest httpd: Use-after-free by limiting unregistered HTTP method (Optionsbleed)
|
[
"cpe:/a:redhat:jboss_enterprise_application_platform:6::el6",
"cpe:/a:redhat:jboss_enterprise_application_platform:6::el7"
] | null | null | 5.9 | null |
RHSA-2022:1345
|
Red Hat Security Advisory: Red Hat AMQ Streams 2.1.0 release and security update
|
lz4: memory corruption due to an integer overflow bug caused by memmove argument netty: control chars in header names may lead to HTTP request smuggling
|
[
"cpe:/a:redhat:amq_streams:2"
] | null | 6.5 | null | null |
RHSA-2023:3380
|
Red Hat Security Advisory: apr-util security update
|
apr-util: out-of-bounds writes in the apr_base64
|
[
"cpe:/a:redhat:rhel_aus:8.2::appstream",
"cpe:/a:redhat:rhel_e4s:8.2::appstream",
"cpe:/a:redhat:rhel_tus:8.2::appstream"
] | null | 6.5 | null | null |
RHSA-2021:3259
|
Red Hat Security Advisory: OpenShift Virtualization 4.8.1 Images security and bug fix update
|
gogo/protobuf: plugin/unmarshal/unmarshal.go lacks certain index validation golang: crypto/tls: certificate of wrong type is causing TLS client to panic
|
[
"cpe:/a:redhat:container_native_virtualization:4.8::el8"
] | null | 6.5 | null | null |
RHBA-2016:2206
|
Red Hat Bug Fix Advisory: evolution-data-server bug fix update
|
evolution-data-server: IMAPx Component Information Disclosure
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 5.3 | null |
RHSA-2023:3195
|
Red Hat Security Advisory: jenkins and jenkins-2-plugins security update
|
apache-commons-text: variable interpolation RCE jenkins-2-plugins/script-security: Sandbox bypass vulnerability in Script Security Plugin jenkins-2-plugins/JUnit: Stored XSS vulnerability in JUnit Plugin jenkins-2-plugins/pipeline-build-step: Stored XSS vulnerability in Pipeline: Build Step Plugin Jenkins: Temporary file parameter created with insecure permissions Jenkins: Information disclosure through error stack traces related to agents
|
[
"cpe:/a:redhat:ocp_tools:4.12::el8"
] | null | 5.3 | null | null |
RHSA-2017:0156
|
Red Hat Security Advisory: openstack-cinder security update
|
openstack-nova/glance/cinder: Malicious image may exhaust resources
|
[
"cpe:/a:redhat:openstack:6::el7"
] | null | null | 5.3 | null |
RHEA-2015:1077
|
Red Hat Enhancement Advisory: Red Hat JBoss Enterprise Application Platform 6.4.1 update
|
EAP: LDAP bind password is being logged with TRACE log level
|
[
"cpe:/a:redhat:jboss_enterprise_application_platform:6.4"
] | null | null | null | null |
RHSA-2015:0728
|
Red Hat Security Advisory: ipa and slapi-nis security and bug fix update
|
slapi-nis: infinite loop in getgrnam_r() and getgrgid_r() ipa: memory corruption when using get_user_grouplist()
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | null | null |
RHSA-2011:0307
|
Red Hat Security Advisory: mailman security update
|
mailman: XSS triggerable by list administrator mailman: Multiple security flaws leading to cross-site scripting (XSS) attacks Mailman: Three XSS flaws due improper escaping of the full name of the member
|
[
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2013:1428
|
Red Hat Security Advisory: jakarta-commons-fileupload security update
|
commons-fileupload: Arbitrary file upload via deserialization
|
[
"cpe:/a:redhat:jboss_enterprise_web_server:1::el5",
"cpe:/a:redhat:jboss_enterprise_web_server:1::el6"
] | null | null | null | null |
RHSA-2020:2870
|
Red Hat Security Advisory: Red Hat OpenShift Service Mesh 1.0 servicemesh-cni security update
|
kubernetes: YAML parsing vulnerable to "Billion Laughs" attack, allowing for remote denial of service
|
[
"cpe:/a:redhat:service_mesh:1.0::el8"
] | null | null | 7.5 | null |
RHSA-2023:5866
|
Red Hat Security Advisory: grafana security update
|
golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487) HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack)
|
[
"cpe:/a:redhat:rhel_eus:9.0::appstream"
] | null | 7.5 | null | null |
RHSA-2018:1227
|
Red Hat Security Advisory: OpenShift Container Platform 3.9 security update
|
source-to-image: Improper path sanitization in ExtractTarStreamFromTarReader in tar/tar.go
|
[
"cpe:/a:redhat:openshift:3.9::el7"
] | null | null | 9.9 | null |
RHSA-2024:0247
|
Red Hat Security Advisory: OpenJDK 21.0.2 security update
|
OpenJDK: array out-of-bounds access due to missing range check in C1 compiler (8314468) OpenJDK: JVM class file verifier flaw allows unverified bytecode execution (8314295) OpenJDK: range check loop optimization issue (8314307) OpenJDK: logging of digital signature private keys (8316976) OpenJDK: RSA padding issue and timing side-channel attack against TLS (8317547)
|
[
"cpe:/a:redhat:openjdk:21"
] | null | 7.4 | null | null |
RHSA-2009:1218
|
Red Hat Security Advisory: pidgin security update
|
pidgin: insufficient input validation in msn_slplink_process_msg()
|
[
"cpe:/a:redhat:rhel_productivity:5",
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws",
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws",
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation"
] | null | null | null | null |
RHSA-2020:0707
|
Red Hat Security Advisory: http-parser security update
|
nodejs: HTTP request smuggling using malformed Transfer-Encoding header
|
[
"cpe:/a:redhat:rhel_e4s:8.0::appstream"
] | null | 7.1 | null | null |
RHSA-2020:1510
|
Red Hat Security Advisory: http-parser security update
|
nodejs: HTTP request smuggling using malformed Transfer-Encoding header
|
[
"cpe:/o:redhat:rhel_eus:7.6::computenode",
"cpe:/o:redhat:rhel_eus:7.6::server"
] | null | 7.1 | null | null |
RHSA-2008:0497
|
Red Hat Security Advisory: sblim security update
|
sblim: libraries built with insecure RPATH
|
[
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws",
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2024:6702
|
Red Hat Security Advisory: pcs security update
|
rexml: rubygem-rexml: DoS when parsing an XML having many specific characters such as whitespace character, >] and ]> rexml: DoS vulnerability in REXML rexml: DoS vulnerability in REXML
|
[
"cpe:/a:redhat:rhel_e4s:8.6::highavailability",
"cpe:/a:redhat:rhel_tus:8.6::highavailability"
] | null | 5.9 | null | null |
RHSA-2005:294
|
Red Hat Security Advisory: Updated kernel packages available for Red Hat Enterprise Linux 3 Update 5
|
security flaw
|
[
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws"
] | null | null | null | null |
RHSA-2017:2728
|
Red Hat Security Advisory: postgresql security update
|
postgresql: Empty password accepted in some authentication methods postgresql: pg_user_mappings view discloses passwords to users lacking server privileges
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 7.5 | null |
RHSA-2022:5099
|
Red Hat Security Advisory: grub2, mokutil, shim, and shim-unsigned-x64 security update
|
grub2: Crafted PNG grayscale images may lead to out-of-bounds write in heap grub2: Crafted PNG image may lead to out-of-bound write during huffman table handling grub2: Crafted JPEG image can lead to buffer underflow write in the heap grub2: Integer underflow in grub_net_recv_ip4_packets grub2: Out-of-bound write when handling split HTTP headers grub2: shim_lock verifier allows non-kernel files to be loaded grub2: use-after-free in grub_cmd_chainloader() shim: Buffer overflow when loading crafted EFI images
|
[
"cpe:/a:redhat:enterprise_linux:9::crb",
"cpe:/o:redhat:enterprise_linux:9::baseos"
] | null | 7.3 | null | null |
RHSA-2024:1058
|
Red Hat Security Advisory: python-pillow security update
|
pillow: Arbitrary Code Execution via the environment parameter
|
[
"cpe:/a:redhat:rhel_eus:8.6::appstream",
"cpe:/a:redhat:rhel_eus:8.6::crb"
] | null | 8.1 | null | null |
RHSA-2022:2143
|
Red Hat Security Advisory: container-tools:3.0 security update
|
psgo: Privilege escalation in 'podman top'
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 8 | null | null |
RHSA-2012:1045
|
Red Hat Security Advisory: php security update
|
php: zend_strndup() NULL pointer dereference may cause DoS php: XSLT file writing vulnerability php: strtotime timezone memory leak php: $_FILES array indexes corruption php: incomplete CVE-2012-1823 fix - missing filtering of -T and -h
|
[
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2020:3043
|
Red Hat Security Advisory: jbig2dec security update
|
jbig2dec: heap-based buffer overflow in jbig2_image_compose in jbig2_image.c
|
[
"cpe:/a:redhat:rhel_e4s:8.0::appstream"
] | null | 9.8 | null | null |
RHBA-2019:1053
|
Red Hat Bug Fix Advisory: redhat-virtualization-host bug fix and enhancement update
|
openssl: Side-channel vulnerability on SMT/Hyper-Threading architectures (PortSmash)
|
[
"cpe:/o:redhat:enterprise_linux:7::hypervisor"
] | null | null | 4.8 | null |
RHSA-2023:3590
|
Red Hat Security Advisory: firefox security update
|
Mozilla: Click-jacking certificate exceptions through rendering lag Mozilla: Memory safety bugs fixed in Firefox 114 and Firefox ESR 102.12
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 9.8 | null | null |
RHSA-2023:4495
|
Red Hat Security Advisory: thunderbird security update
|
thunderbird: File Extension Spoofing using the Text Direction Override Character Mozilla: Offscreen Canvas could have bypassed cross-origin restrictions Mozilla: Incorrect value used during WASM compilation Mozilla: Potential permissions request bypass via clickjacking Mozilla: Crash in DOMParser due to out-of-memory conditions Mozilla: Fix potential race conditions when releasing platform objects Mozilla: Stack buffer overflow in StorageManager Mozilla: Cookie jar overflow caused unexpected cookie jar state Mozilla: Memory safety bugs fixed in Firefox 116, Firefox ESR 115.1, Firefox ESR 102.14, Thunderbird 115.1, and Thunderbird 102.14 Mozilla: Memory safety bugs fixed in Firefox ESR 115.1, and Thunderbird 115.1
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 9.8 | null | null |
RHSA-2021:0497
|
Red Hat Security Advisory: openvswitch2.13 security and bug fix update
|
lldp/openvswitch: denial of service via externally triggered memory leak openvswitch: limitation in the OVS packet parsing in userspace leads to DoS
|
[
"cpe:/o:redhat:enterprise_linux:8::fastdatapath"
] | null | 7.5 | null | null |
RHSA-2022:5772
|
Red Hat Security Advisory: thunderbird security update
|
Mozilla: Memory safety bugs fixed in Firefox 103 and 102.1 Mozilla: Directory indexes for bundled resources reflected URL parameters Mozilla: Mouse Position spoofing with CSS transforms
|
[
"cpe:/a:redhat:rhel_eus:8.4::appstream"
] | null | 7.5 | 6.1 | null |
RHSA-2021:3946
|
Red Hat Security Advisory: redis:5 security update
|
redis: Lua scripts can overflow the heap-based Lua stack redis: Integer overflow issue with Streams redis: Integer overflow bug in the ziplist data structure redis: Denial of service via Redis Standard Protocol (RESP) request redis: Integer overflow issue with intsets redis: Integer overflow issue with strings
|
[
"cpe:/a:redhat:rhel_eus:8.1::appstream"
] | null | 7.5 | null | null |
RHSA-2022:0331
|
Red Hat Security Advisory: samba security and bug fix update
|
samba: Out-of-bounds heap read/write vulnerability in VFS module vfs_fruit allows code execution
|
[
"cpe:/a:redhat:rhel_eus:8.4::crb",
"cpe:/o:redhat:rhel_eus:8.4::baseos"
] | null | 9.9 | null | null |
RHSA-2011:0491
|
Red Hat Security Advisory: python security update
|
expat: buffer over-read and crash on XML with malformed UTF-8 sequences python: audioop: incorrect integer overflow checks Python: Memory corruption in audioop module Python: SMTP proxy RFC 2821 module DoS (uncaught exception) (Issue #9129) (CGIHTTPServer): CGI script source code disclosure urllib2): Improper management of ftp:// and file:// URL schemes (Issue #11662)
|
[
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2016:2038
|
Red Hat Security Advisory: python-django security update
|
python-django: CSRF protection bypass on a site with Google Analytics
|
[
"cpe:/a:redhat:openstack:5::el6"
] | null | null | 6.1 | null |
RHSA-2020:4011
|
Red Hat Security Advisory: e2fsprogs security and bug fix update
|
e2fsprogs: Crafted ext4 partition leads to out-of-bounds write e2fsprogs: Out-of-bounds write in e2fsck/rehash.c
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 7.5 | 6.4 | null |
RHSA-2016:1190
|
Red Hat Security Advisory: chromium-browser security update
|
chromium-browser: cross-origin bypass in extension bindings chromium-browser: cross-origin bypass in blink chromium-browser: cross-origin bypass in extensions chromium-browser: cross-origin bypass in blink chromium-browser: cross-origin bypass in extension bindings chromium-browser: type confusion in v8 chromium-browser: heap overflow in v8 chromium-browser: heap use-after-free in v8 bindings chromium-browser: heap use-after-free in skia chromium-browser: heap overflow in pdfium chromium-browser: csp bypass for serviceworker chromium-browser: out-of-bounds access in libxslt chromium-browser: integer overflow in libxslt chromium-browser: out-of-bounds read in pdfium chromium-browser: out-of-bounds read in pdfium chromium-browser: information leak in extensions chromium-browser: out-of-bounds read in v8 chromium-browser: heap buffer overflow in media chromium-browser: heap use-after-free in autofill chromium-browser: heap buffer-overflow in skia chromium-browser: limited cross-origin bypass in serviceworker chromium-browser: http download of software removal tool chromium-browser: hpkp pins removed on cache clearance chromium-browser: various fixes from internal audits
|
[
"cpe:/a:redhat:rhel_extras:6"
] | null | null | null | null |
RHSA-2025:1848
|
Red Hat Security Advisory: RHTAS 1.1.1 - Red Hat Trusted Artifact Signer Release
|
golang.org/x/crypto/ssh: Misuse of ServerConfig.PublicKeyCallback may cause authorization bypass in golang.org/x/crypto
|
[
"cpe:/a:redhat:trusted_artifact_signer:1.1::el9"
] | null | 8.2 | null | null |
RHSA-2024:8455
|
Red Hat Security Advisory: edk2 security update
|
edk2: Buffer overflow when handling Server ID option from a DHCPv6 proxy Advertise message
|
[
"cpe:/a:redhat:rhel_aus:8.6::appstream",
"cpe:/a:redhat:rhel_e4s:8.6::appstream",
"cpe:/a:redhat:rhel_tus:8.6::appstream"
] | null | 8.8 | null | null |
RHSA-2019:2553
|
Red Hat Security Advisory: qemu-kvm-rhev security, bug fix, and enhancement update
|
hardware: Microarchitectural Store Buffer Data Sampling (MSBDS) hardware: Micro-architectural Load Port Data Sampling - Information Leak (MLPDS) hardware: Microarchitectural Fill Buffer Data Sampling (MFBDS) QEMU: rtl8139: integer overflow leads to buffer overflow QEMU: net: ignore packets with large size QEMU: device_tree: heap buffer overflow while loading device tree blob QEMU: scsi-generic: possible OOB access while handling inquiry request QEMU: slirp: information leakage in tcp_emu() due to uninitialized stack variables hardware: Microarchitectural Data Sampling Uncacheable Memory (MDSUM)
|
[
"cpe:/a:redhat:rhev_manager:4.3",
"cpe:/o:redhat:enterprise_linux:7::hypervisor"
] | null | null | 3.8 | null |
RHSA-2010:0476
|
Red Hat Security Advisory: rhev-hypervisor security, bug fix, and enhancement update
|
libspice: Insufficient guest provided memory mappings boundaries validations qemu: Improper handling of erroneous data provided by Linux virtio-net driver vdsm: missing VM post-zeroing after removal
|
[
"cpe:/o:redhat:enterprise_linux:5::hypervisor"
] | null | null | null | null |
RHSA-2024:4420
|
Red Hat Security Advisory: virt:rhel and virt-devel:rhel security update
|
qemu-kvm: 'qemu-img info' leads to host file read/write
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb"
] | null | 7.8 | null | null |
RHSA-2015:0776
|
Red Hat Security Advisory: docker security update
|
docker: regression of CVE-2014-5277
|
[
"cpe:/a:redhat:rhel_extras_other:7"
] | null | null | null | null |
RHSA-2013:1427
|
Red Hat Security Advisory: ruby193-ruby security update
|
rubygems: version regex algorithmic complexity vulnerability
|
[
"cpe:/a:redhat:rhel_software_collections:1::el6"
] | null | null | null | null |
RHSA-2014:1835
|
Red Hat Security Advisory: Red Hat JBoss Enterprise Web Platform 5.2.0 security update
|
CXF: SSL hostname verification bypass, incomplete CVE-2012-5783 fix CXF: SSL hostname verification bypass, incomplete CVE-2012-6153 fix
|
[
"cpe:/a:redhat:jboss_enterprise_web_platform:5.2.0"
] | null | null | 4.8 | null |
RHSA-2016:2991
|
Red Hat Security Advisory: openstack-cinder, openstack-glance, and openstack-nova update
|
openstack-nova/glance/cinder: Malicious image may exhaust resources
|
[
"cpe:/a:redhat:openstack:8::el7"
] | null | null | 5.3 | null |
RHSA-2023:5838
|
Red Hat Security Advisory: nghttp2 security update
|
HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack)
|
[
"cpe:/a:redhat:enterprise_linux:9::crb",
"cpe:/o:redhat:enterprise_linux:9::baseos"
] | null | 7.5 | null | null |
RHSA-2021:4779
|
Red Hat Security Advisory: kernel-rt security and bug fix update
|
kernel: use-after-free in drivers/infiniband/core/ucma.c ctx use-after-free
|
[
"cpe:/a:redhat:rhel_extras_rt:7"
] | null | 7.8 | null | null |
RHSA-2019:3203
|
Red Hat Security Advisory: Ansible security and bug fix update
|
ansible: secrets disclosed on logs when no_log enabled ansible: Incomplete fix for CVE-2019-10206 ansible: sub parameters marked as no_log are not masked in certain failure scenarios
|
[
"cpe:/a:redhat:ansible_engine:2.8::el7",
"cpe:/a:redhat:ansible_engine:2.8::el8"
] | null | 5 | 6.4 | null |
RHSA-2024:0775
|
Red Hat Security Advisory: jenkins and jenkins-2-plugins security update
|
SnakeYaml: Constructor Deserialization Remote Code Execution maven-shared-utils: Command injection via Commandline class apache-commons-text: variable interpolation RCE jenkins-2-plugins/script-security: Sandbox bypass vulnerability in Script Security Plugin jenkins-2-plugins/JUnit: Stored XSS vulnerability in JUnit Plugin jenkins-2-plugins/pipeline-build-step: Stored XSS vulnerability in Pipeline: Build Step Plugin Jenkins: Temporary file parameter created with insecure permissions Jenkins: Information disclosure through error stack traces related to agents Jenkins: Session fixation vulnerability in OpenShift Login Plugin jenkins: Arbitrary file read vulnerability through the CLI can lead to RCE jenkins: cross-site WebSocket hijacking
|
[
"cpe:/a:redhat:ocp_tools:4.11::el8"
] | null | 8.8 | null | null |
RHSA-2024:9404
|
Red Hat Security Advisory: libgcrypt security update
|
libgcrypt: vulnerable to Marvin Attack
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/o:redhat:enterprise_linux:9::baseos"
] | null | 5.9 | null | null |
RHSA-2021:2529
|
Red Hat Security Advisory: qemu-kvm-rhev security update
|
QEMU: ide: atapi: OOB access while processing read commands
|
[
"cpe:/a:redhat:rhev_manager:4.3",
"cpe:/o:redhat:enterprise_linux:7::hypervisor"
] | null | 3.9 | null | null |
RHSA-2023:5438
|
Red Hat Security Advisory: thunderbird security update
|
firefox: use-after-free in workers Mozilla: Out-of-bounds write in PathOps Mozilla: Use-after-free in Ion Compiler Mozilla: Memory safety bugs fixed in Firefox 118, Firefox ESR 115.3, and Thunderbird 115.3 libvpx: Heap buffer overflow in vp8 encoding in libvpx
|
[
"cpe:/a:redhat:rhel_e4s:8.1::appstream"
] | null | 8.8 | null | null |
RHSA-2020:4763
|
Red Hat Security Advisory: dovecot security update
|
dovecot: command followed by sufficient number of newlines leads to use-after-free dovecot: sending mail with empty quoted localpart leads to DoS
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb"
] | null | 5.3 | null | null |
RHSA-2023:4208
|
Red Hat Security Advisory: OpenJDK security update
|
OpenJDK: HTTP client insufficient file name validation (8302475) OpenJDK: ZIP file parsing infinite loop (8302483) OpenJDK: weakness in AES implementation (8308682) OpenJDK: array indexing integer overflow issue (8304468) OpenJDK: improper handling of slash characters in URI-to-path conversion (8305312) harfbuzz: allows attackers to trigger O(n^2) growth via consecutive marks
|
[
"cpe:/a:redhat:openjdk:11"
] | null | 7.5 | null | null |
RHSA-2008:0638
|
Red Hat Security Advisory: Red Hat Network Satellite Server IBM Java Runtime security update
|
java-1.5.0 Privilege escalation via unstrusted applet and application Untrusted applet and application XSLT processing privilege escalation Buffer overflow security vulnerabilities in Java Web Start (CVE-2008-1189, CVE-2008-1190) Buffer overflow security vulnerabilities in Java Web Start (CVE-2008-1189, CVE-2008-1190) Buffer overflow security vulnerabilities in Java Web Start (CVE-2008-1189, CVE-2008-1190) Java Plugin same-origin-policy bypass JRE image parsing library allows privilege escalation (CVE-2008-1194) JRE image parsing library allows privilege escalation (CVE-2008-1194) Java-API calls in untrusted Javascript allow network privilege escalation Buffer overflow security vulnerabilities in Java Web Start Java RE allows Same Origin Policy to be Bypassed (6687932) security flaw Security Vulnerability with JRE fonts processing may allow Elevation of Privileges (6450319) Java Web Start Buffer overflow vulnerabilities (6557220) Java Web Start, arbitrary file creation (6703909) Java Web Start arbitrary file creation/deletion file with user permissions (6704077) Java Web Start, untrusted application may determine Cache Location (6704074)
|
[
"cpe:/a:redhat:network_satellite:5.1::el4"
] | null | null | null | null |
RHSA-2010:0041
|
Red Hat Security Advisory: kernel-rt security and bug fix update
|
kernel: gdth: Prevent negative offsets in ioctl kernel: fuse: prevent fuse_put_request on invalid pointer kernel: e1000 issue reported at 26c3 kernel: r8169 issue reported at 26c3 kernel: e1000e frame fragment issue
|
[
"cpe:/a:redhat:enterprise_mrg:1::el5"
] | null | null | null | null |
RHSA-2013:0709
|
Red Hat Security Advisory: openstack-nova security and bug fix update
|
nova: VNC proxy can connect to the wrong VM Nova: DoS by allocating all Fixed IPs
|
[
"cpe:/a:redhat:openstack:2::el6"
] | null | null | null | null |
RHSA-2022:4947
|
Red Hat Security Advisory: OpenShift Container Platform 4.6.59 security update
|
cri-o: memory exhaustion on the node when access to the kube api credentials: Stored XSS vulnerabilities in jenkins plugin subversion: Stored XSS vulnerabilities in Jenkins subversion plugin
|
[
"cpe:/a:redhat:openshift:4.6::el7",
"cpe:/a:redhat:openshift:4.6::el8"
] | null | 5.4 | null | null |
RHSA-2021:4587
|
Red Hat Security Advisory: gcc security update
|
environment: Unicode's bidirectional (BiDi) override characters can cause trojan source attacks
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb",
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 8.5 | null | null |
RHSA-2018:2666
|
Red Hat Security Advisory: chromium-browser security update
|
chromium-browser: Out of bounds write in V8 chromium-browser: Out of bounds read in Blink chromium-browser: Out of bounds read in WebAudio chromium-browser: Out of bounds write in Mojo chromium-browser: Out of bounds read in SwiftShader chromium-browser: Integer overflow in Skia chromium-browser: Use after free in WebRTC chromium-browser: Site Isolation bypass after tab restore chromium-browser: Site Isolation bypass using Blob URLS chromium-browser: Local file access in Blink chromium-browser: Out of bounds read in PDFium chromium-browser: Content security policy bypass in Blink chromium-browser: Credit card information leak in Autofill chromium-browser: URL spoof in permission dialogs chromium-browser: URL spoof in full screen mode chromium-browser: Local file access in DevTools chromium-browser: Stack buffer overflow in SwiftShader chromium-browser: Out of bounds read in WebRTC chromium-browser: User confirmation bypass in external protocol handling chromium-browser: Use after free in Memory Instrumentation chromium-browser: Script injection in New Tab Page chromium-browser: Multiple download restriction bypass chromium-browser: User gesture requirement bypass
|
[
"cpe:/a:redhat:rhel_extras:6"
] | null | null | 4.3 | null |
RHSA-2023:4059
|
Red Hat Security Advisory: .NET 6.0 security, bug fix, and enhancement update
|
dotnet: race condition in Core SignInManager<TUser> PasswordSignInAsync method
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb"
] | null | 8.1 | null | null |
RHSA-2018:2930
|
Red Hat Security Advisory: Red Hat JBoss Operations Network 3.3.11 security and bug fix update
|
jackson-databind: Unsafe deserialization due to incomplete black list (incomplete fix for CVE-2017-15095) tomcat: A bug in the UTF-8 decoder can lead to DoS slf4j: Deserialisation vulnerability in EventData constructor can allow for arbitrary code execution RichFaces: Injection of arbitrary EL expressions allows remote code execution via org.richfaces.renderkit.html.Paint2DResource
|
[
"cpe:/a:redhat:jboss_operations_network:3.3"
] | null | null | 9.8 | null |
RHSA-2021:0701
|
Red Hat Security Advisory: grub2 security update
|
grub2: acpi command allows privileged user to load crafted ACPI tables when Secure Boot is enabled grub2: Use-after-free in rmmod command grub2: Out-of-bounds write in grub_usb_device_initialize() grub2: Stack buffer overflow in grub_parser_split_cmdline() grub2: cutmem command allows privileged user to remove memory regions when Secure Boot is enabled grub2: Heap out-of-bounds write in short form option parser grub2: Heap out-of-bounds write due to miscalculation of space required for quoting
|
[
"cpe:/o:redhat:rhel_eus:7.6::computenode",
"cpe:/o:redhat:rhel_eus:7.6::server"
] | null | 7.5 | null | null |
RHSA-2003:246
|
Red Hat Security Advisory: wu-ftpd security update
|
security flaw
|
[
"cpe:/o:redhat:enterprise_linux:2.1::as",
"cpe:/o:redhat:enterprise_linux:2.1::aw",
"cpe:/o:redhat:enterprise_linux:2.1::es"
] | null | null | null | null |
RHSA-2019:3812
|
Red Hat Security Advisory: OpenShift Container Platform 3.9 cri-o security update
|
containers/image: not enforcing TLS when sending username+password credentials to token servers leading to credential disclosure
|
[
"cpe:/a:redhat:openshift:3.9::el7"
] | null | null | 6.4 | null |
RHSA-2024:1319
|
Red Hat Security Advisory: Red Hat JBoss Web Server 5.7.8 release and security update
|
openssl: Generating excessively long X9.42 DH keys or checking excessively long X9.42 DH keys or parameters may be very slow tomcat: HTTP request smuggling via malformed trailer headers Tomcat: HTTP/2 header handling DoS
|
[
"cpe:/a:redhat:jboss_enterprise_web_server:5.7"
] | null | 7.5 | null | null |
RHSA-2019:2731
|
Red Hat Security Advisory: .NET Core on Red Hat Enterprise Linux security and bug fix update
|
dotnet: System.Net.Sockets.dll Socket.ConnectAsync Denial of Service
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | null | 5.9 | null |
RHSA-2020:3044
|
Red Hat Security Advisory: dbus security update
|
dbus: denial of service via file descriptor leak
|
[
"cpe:/a:redhat:rhel_e4s:8.0::appstream",
"cpe:/o:redhat:rhel_e4s:8.0::baseos"
] | null | 6.5 | null | null |
RHSA-2025:0279
|
Red Hat Security Advisory: webkit2gtk3 security update
|
WebKitGTK: Processing maliciously crafted web content may lead to an unexpected process crash webkit: Processing maliciously crafted web content may lead to an unexpected process crash webkit: Processing maliciously crafted web content may lead to memory corruption webkit: Processing maliciously crafted web content may lead to an unexpected process crash
|
[
"cpe:/a:redhat:rhel_eus:8.8::appstream"
] | null | 6.5 | null | null |
RHSA-2018:3600
|
Red Hat Security Advisory: python-cryptography security update
|
python-cryptography: GCM tag forgery via truncated tag in finalize_with_tag API
|
[
"cpe:/a:redhat:openstack:13::el7"
] | null | null | 7.5 | null |
RHSA-2023:4674
|
Red Hat Security Advisory: OpenShift Container Platform 4.12.30 packages and security update
|
golang: net/http: handle server errors after sending GOAWAY
|
[
"cpe:/a:redhat:openshift:4.12::el8",
"cpe:/a:redhat:openshift:4.12::el9"
] | null | 6.5 | null | null |
RHSA-2023:6566
|
Red Hat Security Advisory: libmicrohttpd security update
|
libmicrohttpd: remote DoS
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::crb"
] | null | 5.9 | null | null |
RHSA-2019:4097
|
Red Hat Security Advisory: OpenShift Container Platform 4.2 jenkins-2-plugins security update
|
jenkins-script-security-plugin: handling of method names in method call expressions allowed attackers to execute arbitrary code in sandboxed scripts jenkins-script-security-plugin: handling of property names in property expressions on the left-hand side of assignment expression leads to execute arbitrary code in sandboxed scripts jenkins-script-security-plugin: handling of property names in property expressions in increment and decrement expressions allowed attackers to execute arbitrary code in sandboxed scripts jenkins-script-security-plugin: handling of subexpressions in increment and decrement expressions not involving actual assignment allowed attackers to execute arbitrary code in sandboxed scripts jenkins-script-security: Sandbox bypass vulnerability in Script Security Plugin jenkins-2-plugins: Stored XSS vulnerability in HTML Publisher Plugin
|
[
"cpe:/a:redhat:openshift:4.2::el7"
] | null | 4.2 | 5.4 | null |
RHSA-2024:2193
|
Red Hat Security Advisory: podman security update
|
golang: net/http/internal: Denial of Service (DoS) via Resource Consumption via HTTP requests golang: crypto/tls: Timing Side Channel attack in RSA based TLS key exchanges.
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 7.5 | null | null |
RHSA-2018:1638
|
Red Hat Security Advisory: kernel security update
|
hw: cpu: speculative store bypass
|
[
"cpe:/o:redhat:rhel_eus:6.7::computenode",
"cpe:/o:redhat:rhel_eus:6.7::server"
] | null | null | 5.6 | null |
RHSA-2024:1503
|
Red Hat Security Advisory: nodejs:18 security update
|
nodejs: vulnerable to timing variant of the Bleichenbacher attack against PKCS#1 v1.5 padding (Marvin) nodejs: code injection and privilege escalation through Linux capabilities nodejs: reading unprocessed HTTP request with unbounded chunk extension allows DoS attacks
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 7.5 | null | null |
RHSA-2020:2238
|
Red Hat Security Advisory: java-1.7.1-ibm security update
|
OpenJDK: Excessive memory usage in OID processing in X.509 certificate parsing (Libraries, 8234037) OpenJDK: Incorrect handling of references to uninitialized class descriptors during deserialization (Serialization, 8224541) OpenJDK: Uncaught InstantiationError exception in ObjectStreamClass (Serialization, 8224549) OpenJDK: Re-use of single TLS session for new connections (JSSE, 8234408) OpenJDK: CRLF injection into HTTP headers in HttpServer (Lightweight HTTP Server, 8234825) OpenJDK: Incorrect bounds checks in NIO Buffers (Libraries, 8234841) OpenJDK: Incorrect type checks in MethodType.readObject() (Libraries, 8235274) OpenJDK: Regular expression DoS in Scanner (Concurrency, 8236201)
|
[
"cpe:/a:redhat:rhel_extras:7"
] | null | 5.3 | null | null |
RHSA-2025:0425
|
Red Hat Security Advisory: OpenJDK 17.0.14 Security Update for Windows Builds
|
openjdk: Enhance array handling (Oracle CPU 2025-01)
|
[
"cpe:/a:redhat:openjdk:17::windows"
] | null | 4.8 | null | null |
RHSA-2023:5697
|
Red Hat Security Advisory: OpenShift Container Platform 4.11.52 bug fix and security update
|
distribution/distribution: DoS from malicious API request golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487)
|
[
"cpe:/a:redhat:openshift:4.11::el8"
] | null | 7.5 | null | null |
RHSA-2024:6558
|
Red Hat Security Advisory: postgresql:13 security update
|
postgresql: PostgreSQL relation replacement during pg_dump executes arbitrary SQL
|
[
"cpe:/a:redhat:rhel_aus:8.6::appstream",
"cpe:/a:redhat:rhel_e4s:8.6::appstream",
"cpe:/a:redhat:rhel_tus:8.6::appstream"
] | null | 7.5 | null | null |
RHSA-2022:4730
|
Red Hat Security Advisory: thunderbird security update
|
Mozilla: Untrusted input used in JavaScript object indexing, leading to prototype pollution Mozilla: Prototype pollution in Top-Level Await implementation
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 8.8 | null |
RHSA-2023:7610
|
Red Hat Security Advisory: OpenShift Container Platform 4.12.45 packages and security update
|
HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack) python-werkzeug: high resource consumption leading to denial of service
|
[
"cpe:/a:redhat:openshift:4.12::el8",
"cpe:/a:redhat:openshift:4.12::el9",
"cpe:/a:redhat:openshift_ironic:4.12::el9"
] | null | 7.5 | null | null |
RHSA-2006:0608
|
Red Hat Security Advisory: seamonkey security update
|
security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw vulnerabilities: CVE-2006-{3113,3677,3801-3812}
|
[
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws"
] | null | null | null | null |
RHSA-2004:030
|
Red Hat Security Advisory: : Updated NetPBM packages fix multiple temporary file vulnerabilities
|
security flaw
|
[
"cpe:/o:redhat:linux:9"
] | null | null | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.