id
stringlengths 13
15
| title
stringlengths 29
176
| description
stringlengths 8
32.1k
| cpes
listlengths 0
20
| cvss_v4_0
null | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
null |
---|---|---|---|---|---|---|---|
RHSA-2021:4381
|
Red Hat Security Advisory: GNOME security, bug fix, and enhancement update
|
webkitgtk: Use-after-free in AudioSourceProviderGStreamer leading to arbitrary code execution LibRaw: Stack buffer overflow in LibRaw::identify_process_dng_fields() in identify.cpp webkitgtk: Use-after-free leading to arbitrary code execution webkitgtk: User may be unable to fully delete browsing history gnome-autoar: Directory traversal via directory symbolic links pointing outside of the destination directory webkitgtk: IFrame sandboxing policy violation webkitgtk: Use-after-free leading to arbitrary code execution webkitgtk: Type confusion issue leading to arbitrary code execution webkitgtk: Access to restricted ports on arbitrary servers via port redirection webkitgtk: IFrame sandboxing policy violation webkitgtk: Memory corruption issue leading to arbitrary code execution webkitgtk: Logic issue leading to arbitrary code execution webkitgtk: Logic issue leading to arbitrary code execution webkitgtk: Use-after-free in ImageLoader dispatchPendingErrorEvent leading to information leak and possibly code execution webkitgtk: Use-after-free in WebCore::GraphicsContext leading to information leak and possibly code execution webkitgtk: Use-after-free in fireEventListeners leading to arbitrary code execution gnome-autoar: Directory traversal via directory symbolic links pointing outside of the destination directory (incomplete CVE-2020-36241 fix) webkitgtk: Integer overflow leading to arbitrary code execution webkitgtk: Memory corruption leading to arbitrary code execution webkitgtk: Logic issue leading to leak of sensitive user information webkitgtk: Logic issue leading to universal cross site scripting attack webkitgtk: Logic issue allowing access to restricted ports on arbitrary servers webkitgtk: Memory corruptions leading to arbitrary code execution webkitgtk: Cross-origin issue with iframe elements leading to universal cross site scripting attack webkitgtk: Memory corruptions leading to arbitrary code execution webkitgtk: Type confusion leading to arbitrary code execution webkitgtk: Use-after-free leading to arbitrary code execution webkitgtk: Insufficient checks leading to arbitrary code execution webkitgtk: Memory corruptions leading to arbitrary code execution
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb",
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 8.8 | null | null |
RHSA-2002:165
|
Red Hat Security Advisory: pxe security update
|
security flaw
|
[
"cpe:/o:redhat:enterprise_linux:2.1::as"
] | null | null | null | null |
RHSA-2020:3731
|
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 6.4 security update
|
jbossweb: Incomplete fix of CVE-2020-13935 for WebSocket in JBossWeb could lead to DoS
|
[
"cpe:/a:redhat:jboss_enterprise_application_platform:6.4"
] | null | 7.5 | null | null |
RHSA-2023:0392
|
Red Hat Security Advisory: kernel-rt security and bug fix update
|
kernel: memory corruption in AX88179_178A based USB ethernet device.
|
[
"cpe:/a:redhat:rhel_tus:8.2::nfv",
"cpe:/a:redhat:rhel_tus:8.2::realtime"
] | null | 7.8 | null | null |
RHSA-2018:1188
|
Red Hat Security Advisory: java-1.8.0-openjdk security update
|
OpenJDK: incorrect merging of sections in the JAR manifest (Security, 8189969) OpenJDK: unrestricted deserialization of data from JCEKS key stores (Security, 8189997) OpenJDK: insufficient consistency checks in deserialization of multiple classes (Security, 8189977) OpenJDK: unbounded memory allocation during deserialization in PriorityBlockingQueue (Concurrency, 8189981) OpenJDK: unbounded memory allocation during deserialization in TabularDataSupport (JMX, 8189985) OpenJDK: unbounded memory allocation during deserialization in Container (AWT, 8189989) OpenJDK: unbounded memory allocation during deserialization in NamedNodeMapImpl (JAXP, 8189993) OpenJDK: RMI HTTP transport enabled by default (RMI, 8193833) OpenJDK: incorrect handling of Reference clones can lead to sandbox bypass (Hotspot, 8192025) OpenJDK: unbounded memory allocation during deserialization in StubIORImpl (Serialization, 8192757)
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | 5.3 | null |
RHSA-2021:3889
|
Red Hat Security Advisory: java-1.8.0-openjdk security and bug fix update
|
OpenJDK: Weak ciphers preferred over stronger ones for TLS (JSSE, 8264210) OpenJDK: Excessive memory allocation in RTFParser (Swing, 8265167) OpenJDK: Excessive memory allocation in RTFReader (Swing, 8265580) OpenJDK: Excessive memory allocation in HashMap and HashSet (Utility, 8266097) OpenJDK: Certificates with end dates too far in the future can corrupt keystore (Keytool, 8266137) OpenJDK: Loop in HttpsServer triggered during TLS session close (JSSE, 8254967) OpenJDK: Incorrect principal selection when using Kerberos Constrained Delegation (Libraries, 8266689) OpenJDK: Unexpected exception raised during TLS handshake (JSSE, 8267729) OpenJDK: Excessive memory allocation in BMPImageReader (ImageIO, 8267735) OpenJDK: Incomplete validation of inner class references in ClassFileParser (Hotspot, 8268071) OpenJDK: Non-constant comparison during TLS handshakes (JSSE, 8269618)
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 3.7 | null | null |
RHSA-2019:1209
|
Red Hat Security Advisory: redhat-virtualization-host security update
|
hardware: Microarchitectural Store Buffer Data Sampling (MSBDS) hardware: Micro-architectural Load Port Data Sampling - Information Leak (MLPDS) hardware: Microarchitectural Fill Buffer Data Sampling (MFBDS) hardware: Microarchitectural Data Sampling Uncacheable Memory (MDSUM)
|
[
"cpe:/o:redhat:enterprise_linux:7::hypervisor"
] | null | null | 3.8 | null |
RHSA-2023:5749
|
Red Hat Security Advisory: .NET 7.0 security update
|
HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack)
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::crb"
] | null | 7.5 | null | null |
RHSA-2020:0653
|
Red Hat Security Advisory: kernel security and bug fix update
|
kernel: heap overflow in mwifiex_update_vs_ie() function of Marvell WiFi driver kernel: heap-based buffer overflow in mwifiex_process_country_ie() function in drivers/net/wireless/marvell/mwifiex/sta_ioctl.c kernel: buffer overflow in cfg80211_mgd_wext_giwessid in net/wireless/wext-sme.c
|
[
"cpe:/o:redhat:rhel_aus:7.3::server",
"cpe:/o:redhat:rhel_e4s:7.3::server",
"cpe:/o:redhat:rhel_tus:7.3::server"
] | null | 8 | 8 | null |
RHSA-2022:4717
|
Red Hat Security Advisory: kernel security update
|
kernel: cgroups v1 release_agent feature may allow privilege escalation
|
[
"cpe:/o:redhat:rhel_aus:7.7::server",
"cpe:/o:redhat:rhel_e4s:7.7::server",
"cpe:/o:redhat:rhel_tus:7.7::server"
] | null | 7 | null | null |
RHSA-2021:3181
|
Red Hat Security Advisory: kpatch-patch security update
|
kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c kernel: race condition for removal of the HCI controller
|
[
"cpe:/o:redhat:rhel_eus:8.1::baseos"
] | null | 7 | null | null |
RHSA-2024:10807
|
Red Hat Security Advisory: postgresql:15 security update
|
postgresql: PostgreSQL PL/Perl environment variable changes execute arbitrary code
|
[
"cpe:/a:redhat:rhel_eus:9.2::appstream"
] | null | 8.8 | null | null |
RHSA-2021:2965
|
Red Hat Security Advisory: Red Hat Single Sign-On 7.4.8 security update
|
wildfly: XSS via admin console when creating roles in domain mode netty: Request smuggling via content-length header
|
[
"cpe:/a:redhat:red_hat_single_sign_on:7"
] | null | 5.9 | null | null |
RHSA-2020:0339
|
Red Hat Security Advisory: kernel security and bug fix update
|
kernel: heap overflow in mwifiex_set_uap_rates() function of Marvell Wifi Driver leading to DoS kernel: heap-overflow in mwifiex_set_wmm_params() function of Marvell WiFi driver leading to DoS kernel: heap overflow in mwifiex_update_vs_ie() function of Marvell WiFi driver kernel: heap-based buffer overflow in mwifiex_process_country_ie() function in drivers/net/wireless/marvell/mwifiex/sta_ioctl.c kernel: incomplete fix for race condition between mmget_not_zero()/get_task_mm() and core dumping in CVE-2019-11599 kernel: heap overflow in marvell/mwifiex/tdls.c kernel: rtl_p2p_noa_ie in drivers/net/wireless/realtek/rtlwifi/ps.c in the Linux kernel lacks a certain upper-bound check, leading to a buffer overflow Kernel: KVM: export MSR_IA32_TSX_CTRL to guest - incomplete fix for TAA (CVE-2019-11135)
|
[
"cpe:/a:redhat:enterprise_linux:8::crb",
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | null | 5.5 | null |
RHSA-2022:0969
|
Red Hat Security Advisory: java-1.7.1-ibm security update
|
OpenJDK: Weak ciphers preferred over stronger ones for TLS (JSSE, 8264210) OpenJDK: Non-constant comparison during TLS handshakes (JSSE, 8269618) OpenJDK: Incomplete deserialization class filtering in ObjectInputStream (Serialization, 8264934) OpenJDK: Incomplete checks of StringBuffer and StringBuilder during deserialization (Libraries, 8270392) OpenJDK: Incorrect IdentityHashMap size checks during deserialization (Libraries, 8270416) OpenJDK: Excessive resource use when reading JAR manifest attributes (Libraries, 8272026) OpenJDK: Insufficient checks when deserializing exceptions in ObjectInputStream (Serialization, 8272236) OpenJDK: Excessive memory allocation in BMPImageReader (ImageIO, 8273756) OpenJDK: Integer overflow in BMPImageReader (ImageIO, 8273838)
|
[
"cpe:/a:redhat:rhel_extras:7"
] | null | 5.3 | null | null |
RHSA-2018:3527
|
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.1.5 security update
|
JBoss/WildFly: iiop does not honour strict transport confidentiality
|
[
"cpe:/a:redhat:jboss_enterprise_application_platform:7.1"
] | null | null | 5.3 | null |
RHSA-2013:1181
|
Red Hat Security Advisory: rhev-hypervisor6 security and bug fix update
|
Mozilla: Out-of-bounds array read in CERT_DecodeCertPackage (MFSA 2013-40) nss: TLS CBC padding timing attack vdsm: incomplete fix for CVE-2013-0167 issue
|
[
"cpe:/o:redhat:enterprise_linux:6::hypervisor"
] | null | null | null | null |
RHSA-2014:0132
|
Red Hat Security Advisory: firefox security update
|
Mozilla: Miscellaneous memory safety hazards (rv:24.3) (MFSA 2014-01) Mozilla: Clone protected content with XBL scopes (MFSA 2014-02) Mozilla: Inconsistent JavaScript handling of access to Window objects (MFSA 2014-13) Mozilla: Incorrect use of discarded images by RasterImage (MFSA 2014-04) Mozilla: Use-after-free with imgRequestProxy and image proccessing (MFSA 2014-08) Mozilla: Cross-origin information leak through web workers (MFSA 2014-09)
|
[
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::server",
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2025:1089
|
Red Hat Security Advisory: ovn22.03 security update
|
ovn: egress ACLs may be bypassed via specially crafted UDP packet
|
[
"cpe:/o:redhat:enterprise_linux:9::fastdatapath"
] | null | 8.1 | null | null |
RHSA-2010:0907
|
Red Hat Security Advisory: kernel security and bug fix update
|
kernel: nfsd4: bug in read_buf
|
[
"cpe:/o:redhat:rhel_eus:5.4"
] | null | null | null | null |
RHSA-2018:1967
|
Red Hat Security Advisory: kernel-alt security and bug fix update
|
hw: cpu: speculative execution branch target injection hw: cpu: speculative store bypass
|
[
"cpe:/o:redhat:enterprise_linux:7::server"
] | null | null | 5.6 | null |
RHSA-2023:6275
|
Red Hat Security Advisory: OpenShift Container Platform 4.12.42 security and extras update
|
golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487)
|
[
"cpe:/a:redhat:openshift:4.12::el8"
] | null | 7.5 | null | null |
RHSA-2015:2502
|
Red Hat Security Advisory: Red Hat JBoss Data Grid 6.4.1 and 6.5.1 commons-collections security update
|
apache-commons-collections: InvokerTransformer code execution during deserialisation
|
[
"cpe:/a:redhat:jboss_data_grid:6.4.1",
"cpe:/a:redhat:jboss_data_grid:6.5.1"
] | null | null | null | null |
RHSA-2024:10882
|
Red Hat Security Advisory: postgresql security update
|
postgresql: PostgreSQL PL/Perl environment variable changes execute arbitrary code
|
[
"cpe:/o:redhat:rhel_els:7"
] | null | 8.8 | null | null |
RHSA-2010:0558
|
Red Hat Security Advisory: firefox security update
|
Mozilla arbitrary free flaw
|
[
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2024:1102
|
Red Hat Security Advisory: gmp security update
|
gmp: Integer overflow and resultant buffer overflow via crafted input
|
[
"cpe:/o:redhat:rhel_eus:8.6::baseos"
] | null | 6.2 | null | null |
RHSA-2025:1334
|
Red Hat Security Advisory: ACS 4.5 enhancement and security update
|
npm-serialize-javascript: Cross-site Scripting (XSS) in serialize-javascript golang.org/x/crypto/ssh: Misuse of ServerConfig.PublicKeyCallback may cause authorization bypass in golang.org/x/crypto golang.org/x/net/html: Non-linear parsing of case-insensitive content in golang.org/x/net/html go-git: argument injection via the URL field go-git: go-git clients vulnerable to DoS via maliciously crafted Git server replies
|
[
"cpe:/a:redhat:advanced_cluster_security:4.5::el8"
] | null | 7.5 | null | null |
RHSA-2013:1794
|
Red Hat Security Advisory: ruby193-rubygem-actionpack security update
|
rubygem-actionpack: i18n missing translation XSS rubygem-actionpack: Action View DoS rubygem-actionpack: number_to_currency XSS rubygem-actionpack: unsafe query generation risk (incomplete fix for CVE-2013- 0155)
|
[
"cpe:/a:redhat:rhel_software_collections:1::el6"
] | null | null | null | null |
RHSA-2023:3883
|
Red Hat Security Advisory: Red Hat Single Sign-On 7.6.4 security update on RHEL 7
|
RHSSO: XSS due to lax URI scheme validation Undertow: Infinite loop in SslConduit during close keycloak: Untrusted Certificate Validation keycloak: oauth client impersonation keycloak: client access via device auth request spoof
|
[
"cpe:/a:redhat:red_hat_single_sign_on:7.6::el7"
] | null | 3.5 | null | null |
RHSA-2023:7058
|
Red Hat Security Advisory: rhc security, bug fix, and enhancement update
|
golang.org/x/net/http2: avoid quadratic complexity in HPACK decoding
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 7.5 | null | null |
RHSA-2019:3979
|
Red Hat Security Advisory: kernel security and bug fix update
|
Kernel: KVM: OOB memory access via mmio ring buffer kernel: local attacker can trigger multiple use-after-free conditions results in privilege escalation
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 7.4 | null |
RHSA-2023:6282
|
Red Hat Security Advisory: insights-client security update
|
insights-client: unsafe handling of temporary files and directories
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 7.8 | null | null |
RHSA-2021:4107
|
Red Hat Security Advisory: flatpak security update
|
flatpak: Sandbox bypass via recent VFS-manipulating syscalls
|
[
"cpe:/a:redhat:rhel_eus:8.2::appstream"
] | null | 8.8 | null | null |
RHSA-2022:4951
|
Red Hat Security Advisory: OpenShift Container Platform 4.8.43 packages and security update
|
cri-o: memory exhaustion on the node when access to the kube api
|
[
"cpe:/a:redhat:openshift:4.8::el7",
"cpe:/a:redhat:openshift:4.8::el8"
] | null | 6.8 | null | null |
RHSA-2011:1807
|
Red Hat Security Advisory: jasper security update
|
jasper: heap buffer overflow flaws lead to arbitrary code execution (CERT VU#887409) jasper: heap buffer overflow flaws lead to arbitrary code execution (CERT VU#887409)
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2014:1765
|
Red Hat Security Advisory: php54-php security update
|
php: heap-based buffer over-read in DateInterval file: extensive backtracking in awk rule regular expression file: cdf_read_short_sector insufficient boundary check file: cdf_unpack_summary_info() excessive looping DoS file: CDF property info parsing nelements infinite loop file: unrestricted recursion in handling of indirect type rules file: out-of-bounds access in search rules with offsets from input file gd: NULL pointer dereference in gdImageCreateFromXpm() file: mconvert incorrect handling of truncated pascal string size file: cdf_check_stream_offset insufficient boundary check file: cdf_count_chain insufficient boundary check file: cdf_read_property_info insufficient boundary check php: unserialize() SPL ArrayObject / SPLObjectStorage type confusion flaw file: unrestricted regular expression matching file: incomplete fix for CVE-2012-1571 in cdf_read_property_info php: multiple buffer over-reads in php_parserr php: xmlrpc ISO8601 date format parsing out-of-bounds read in mkgmtime() php: integer overflow in unserialize() php: heap corruption issue in exif_thumbnail() file: out-of-bounds read in elf note headers php: heap-based buffer overflow in DNS TXT record parsing php: SPL Iterators use-after-free php: ArrayIterator use-after-free due to object change during sorting php: type confusion issue in phpinfo() leading to information leak php: gd extension NUL byte injection in file names
|
[
"cpe:/a:redhat:rhel_software_collections:1::el6",
"cpe:/a:redhat:rhel_software_collections:1::el7"
] | null | null | null | null |
RHSA-2024:0428
|
Red Hat Security Advisory: curl security and bug fix update
|
curl: Incorrect handling of control code characters in cookies curl: Use-after-free triggered by an HTTP proxy deny response curl: FTP too eager connection reuse curl: GSS delegation too eager connection re-use curl: more POST-after-PUT confusion curl: information disclosure by exploiting a mixed case flaw
|
[
"cpe:/o:redhat:rhel_eus:8.6::baseos"
] | null | 5.3 | null | null |
RHSA-2020:4041
|
Red Hat Security Advisory: openldap security update
|
openldap: denial of service via nested boolean expressions in LDAP search filters
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 7.5 | null | null |
RHSA-2022:6905
|
Red Hat Security Advisory: OpenShift Container Platform 4.9.50 bug fix and security update
|
go-getter: command injection vulnerability go-getter: unsafe download (issue 1 of 3) go-getter: unsafe download (issue 2 of 3) go-getter: unsafe download (issue 3 of 3)
|
[
"cpe:/a:redhat:openshift:4.9::el8"
] | null | 8.6 | null | null |
RHSA-2021:4251
|
Red Hat Security Advisory: openjpeg2 security update
|
openjpeg: integer overflow in opj_t1_encode_cblks in src/lib/openjp2/t1.c openjpeg: integer overflow in opj_j2k_setup_encoder function in openjp2/j2k.c openjpeg: division-by-zero in functions pi_next_pcrl, pi_next_cprl, and pi_next_rpcl in openmj2/pi.c openjpeg: integer overflow in function opj_get_encoding_parameters in openjp2/pi.c openjpeg: denial of service in function opj_t1_encode_cblks in openjp2/t1.c openjpeg: use-after-free and double-free via a mix of valid and invalid files in a directory operated on by the decompressor openjpeg: heap-buffer-overflow in lib/openjp2/mqc.c could result in DoS openjpeg: heap-buffer-overflow write in opj_tcd_dc_level_shift_encode() openjpeg: global-buffer-overflow read in opj_dwt_calc_explicit_stepsizes() openjpeg: null pointer dereference in opj_tgt_reset function in lib/openjp2/tgt.c openjpeg: out-of-bounds read in opj_t2_encode_packet function in openjp2/t2.c openjpeg: heap-based buffer overflow in functions opj_pi_next_rlcp, opj_pi_next_rpcl and opj_pi_next_lrcp in openjp2/pi.c openjpeg: heap-buffer-overflow in color.c may lead to DoS or arbitrary code execution openjpeg: out-of-bounds write due to an integer overflow in opj_compress.c
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb"
] | null | 6.2 | 3.3 | null |
RHSA-2013:0603
|
Red Hat Security Advisory: java-1.7.0-openjdk security update
|
OpenJDK: Specially crafted sample model integer overflow (2D, 8007014) OpenJDK: CMM malformed raster memory corruption (2D, 8007675)
|
[
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2011:0306
|
Red Hat Security Advisory: samba3x security update
|
Samba unsafe fd_set usage
|
[
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2022:8827
|
Red Hat Security Advisory: RHACS 3.73 enhancement and security update
|
imgcrypt: Unauthorized access to encryted container image on a shared system due to missing check in CheckAuthorization() code path app-containers/cosign: false positive verification
|
[
"cpe:/a:redhat:advanced_cluster_security:3.73::el8"
] | null | 4.1 | null | null |
RHSA-2023:5902
|
Red Hat Security Advisory: OpenShift Container Platform 4.13.18 security update
|
HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack)
|
[
"cpe:/a:redhat:openshift:4.13::el8",
"cpe:/a:redhat:openshift:4.13::el9"
] | null | 7.5 | null | null |
RHSA-2011:0871
|
Red Hat Security Advisory: tigervnc security update
|
tigervnc: vncviewer can send password to server without proper validation of the X.509 certificate
|
[
"cpe:/o:redhat:enterprise_linux:6::server"
] | null | null | null | null |
RHSA-2019:2551
|
Red Hat Security Advisory: OpenShift Container Platform 3.9 atomic-openshift-web-console security update
|
xterm.js: Mishandling of special characters allows for remote code execution
|
[
"cpe:/a:redhat:openshift:3.9::el7"
] | null | null | 7.5 | null |
RHSA-2007:0062
|
Red Hat Security Advisory: java-1.4.2-ibm security update
|
openssl signature forgery security flaw security flaw security flaw security flaw
|
[
"cpe:/a:redhat:rhel_extras:3",
"cpe:/a:redhat:rhel_extras:4"
] | null | null | null | null |
RHSA-2024:10841
|
Red Hat Security Advisory: OpenShift Container Platform 4.15.41 security update
|
runc: file descriptor leak
|
[
"cpe:/a:redhat:openshift:4.15::el9"
] | null | 8.6 | null | null |
RHSA-2022:8897
|
Red Hat Security Advisory: Red Hat OpenStack Platform 13.0 (instack-undercloud) security update
|
instack-undercloud: rsync leaks information to undercloud
|
[
"cpe:/a:redhat:openstack:13::el7"
] | null | 7.5 | null | null |
RHSA-2024:8028
|
Red Hat Security Advisory: thunderbird security update
|
firefox: Use-after-free in Animation timeline (128.3.1 ESR Chemspill)
|
[
"cpe:/a:redhat:rhel_aus:8.6::appstream",
"cpe:/a:redhat:rhel_e4s:8.6::appstream",
"cpe:/a:redhat:rhel_tus:8.6::appstream"
] | null | 9.8 | null | null |
RHSA-2020:2926
|
Red Hat Security Advisory: OpenShift Container Platform 4.4.13 openshift-enterprise-hyperkube-container security update
|
kubernetes: node localhost services reachable via martian packets
|
[
"cpe:/a:redhat:openshift:4.4::el7"
] | null | 5.4 | null | null |
RHSA-2025:4225
|
Red Hat Security Advisory: mod_auth_openidc security update
|
mod_auth_openidc: mod_auth_openidc allows OIDCProviderAuthRequestMethod POSTs to leak protected data
|
[
"cpe:/a:redhat:rhel_eus:9.2::appstream"
] | null | 7.5 | null | null |
RHSA-2014:2009
|
Red Hat Security Advisory: kernel security update
|
kernel: x86: local privesc due to bad_iret and paranoid entry incompatibility
|
[
"cpe:/o:redhat:rhel_eus:6.5::computenode",
"cpe:/o:redhat:rhel_eus:6.5::server"
] | null | null | 8.4 | null |
RHSA-2023:2366
|
Red Hat Security Advisory: emacs security and bug fix update
|
emacs: ctags local command execution vulnerability
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 7.8 | null | null |
RHSA-2020:2795
|
Red Hat Security Advisory: Red Hat OpenShift Service Mesh 1.1 servicemesh-operator security update
|
kubernetes: YAML parsing vulnerable to "Billion Laughs" attack, allowing for remote denial of service openshift-service-mesh/istio-rhel8-operator: control plane can deploy gateway image to any namespace
|
[
"cpe:/a:redhat:service_mesh:1.1::el8"
] | null | 8.8 | 7.5 | null |
RHSA-2023:4651
|
Red Hat Security Advisory: rust-toolset-1.66-rust security update
|
rust-cargo: cargo does not respect the umask when extracting dependencies
|
[
"cpe:/a:redhat:devtools:2023::el7"
] | null | 6.7 | null | null |
RHSA-2021:0862
|
Red Hat Security Advisory: kpatch-patch security update
|
kernel: SCSI target (LIO) write to any block on ILO backstore kernel: locking issue in drivers/tty/tty_jobctrl.c can lead to an use-after-free
|
[
"cpe:/o:redhat:enterprise_linux:7::server"
] | null | 7.8 | null | null |
RHSA-2022:8194
|
Red Hat Security Advisory: libtiff security update
|
libtiff: Denial of Service via crafted TIFF file libtiff: Null source pointer lead to Denial of Service via crafted TIFF file libtiff: reachable assertion libtiff: heap buffer overflow in extractImageSection tiff: Null source pointer passed as an argument to memcpy in TIFFFetchNormalTag() in tif_dirread.c tiff: Divide By Zero error in tiffcrop libtiff: Out-of-bounds Read error in tiffcp libtiff: heap-buffer-overflow in TIFFReadRawDataStriped() in tiffinfo.c libtiff: stack-buffer-overflow in tiffcp.c in main() libtiff: out-of-bounds read in _TIFFmemcpy() in tif_unix.c
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::crb"
] | null | 5.5 | null | null |
RHSA-2017:1411
|
Red Hat Security Advisory: JBoss Enterprise Application Platform 7.0.6 on Red Hat Enterprise Linux 7
|
Resteasy: Yaml unmarshalling vulnerable to RCE wildfly: Arbitrary file read via path traversal undertow: HTTP Request smuggling vulnerability due to permitting invalid characters in HTTP requests undertow: IO thread DoS via unclean Websocket closing
|
[
"cpe:/a:redhat:jboss_enterprise_application_platform:7::el7"
] | null | null | 7.5 | null |
RHSA-2016:0087
|
Red Hat Security Advisory: qemu-kvm-rhev security update
|
Qemu: ide: ahci use-after-free vulnerability in aio port commands Qemu: nvram: OOB r/w access in processing firmware configurations
|
[
"cpe:/a:redhat:openstack:6::el7"
] | null | null | null | null |
RHSA-2017:1490
|
Red Hat Security Advisory: kernel security update
|
kernel: heap/stack gap jumping via unbounded stack allocations kernel: Incorrectly mapped contents of PIE executable
|
[
"cpe:/o:redhat:rhel_aus:6.4::server"
] | null | null | 2.9 | null |
RHSA-2022:6714
|
Red Hat Security Advisory: RHACS 3.72 enhancement and security update
|
golang: encoding/pem: fix stack overflow in Decode golang: regexp: stack exhaustion via a deeply nested expression golang: crypto/elliptic: panic caused by oversized scalar golang: syscall: faccessat checks wrong group golang: compress/gzip: stack exhaustion in Reader.Read
|
[
"cpe:/a:redhat:advanced_cluster_security:3.72::el8"
] | null | 7.5 | null | null |
RHSA-2023:3167
|
Red Hat Security Advisory: Red Hat build of Cryostat 2.3.0: new RHEL 8 container images
|
golang.org/x/net/http2: avoid quadratic complexity in HPACK decoding golang: crypto/tls: large handshake records may cause panics golang: net/http, mime/multipart: denial of service from excessive resource consumption golang: net/http, net/textproto: denial of service from excessive memory allocation golang: net/http, net/textproto, mime/multipart: denial of service from excessive resource consumption golang: go/parser: Infinite loop in parsing
|
[
"cpe:/a:redhat:cryostat:2::el8"
] | null | 7.5 | null | null |
RHSA-2024:8686
|
Red Hat Security Advisory: OpenShift Container Platform 4.16.20 packages and security update
|
buildah: Buildah allows arbitrary directory mount Podman: Buildah: CRI-O: symlink traversal vulnerability in the containers/storage library can cause Denial of Service (DoS)
|
[
"cpe:/a:redhat:openshift:4.16::el8",
"cpe:/a:redhat:openshift:4.16::el9"
] | null | 6.5 | null | null |
RHSA-2023:2830
|
Red Hat Security Advisory: tigervnc security and bug fix update
|
xorg-x11-server: XkbGetKbdByName use-after-free xorg-x11-server: XTestSwapFakeInput stack overflow xorg-x11-server: XIPassiveUngrab out-of-bounds access xorg-x11-server: XvdiSelectVideoNotify use-after-free xorg-x11-server: ScreenSaverSetAttributes use-after-free xorg-x11-server: XIChangeProperty out-of-bounds access
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 8.8 | null | null |
RHSA-2014:0413
|
Red Hat Security Advisory: java-1.7.0-oracle security update
|
libjpeg: information leak (read of uninitialized memory) libpng: unhandled zero-length PLTE chunk or NULL palette OpenJDK: Incorrect mlib/raster image validation (2D, 8027841) JDK: unspecified vulnerability fixed in 7u55 and 8u5 (Libraries) OpenJDK: Protect logger handlers (Libraries, 8029740) JDK: unspecified vulnerability fixed in 7u55 and 8u5 (Deployment) JDK: unspecified vulnerability fixed in 6u75, 7u55 and 8u5 (Deployment) OpenJDK: AWT incorrect FlavorMap seperation (AWT, 8026797) OpenJDK: incorrect caching of data initialized via TCCL (JAXWS, 8026801) OpenJDK: RSA unpadding timing issues (Security, 8027766) OpenJDK: Prevent SIGNATURE_PRIMITIVE_SET from being modified (Security, 8029745) OpenJDK: MethodHandle variable argument lists handling (Libraries, 8029844) OpenJDK: System.arraycopy() element race condition (Hotspot, 8029858) OpenJDK: ServiceLoader Exception handling security bypass (Libraries, 8031394) OpenJDK: Activation framework default command map caching (JAX-WS, 8025152) lcms: insufficient ICC profile version validation (OpenJDK 2D, 8031335) OpenJDK: missing randomization of JNDI DNS client query IDs (JNDI, 8030731) OpenJDK: Better ScriptEngineManager ScriptEngine management (Libraries, 8036794) OpenJDK: insecure temporary file use in unpack200 (Libraries, 8033618) OpenJDK: classfile parser invalid BootstrapMethods attribute length (Hotspot, 8034926) OpenJDK: insufficient escaping of window title string (Javadoc, 8026736) JDK: unspecified vulnerability fixed in 5.0u75, 6u75, 7u55 and 8u5 (2D) OpenJDK: Incorrect NIO channel separation (Libraries, 8026716) OpenJDK: JAXP CharInfo file access restriction (JAXP, 8029282) JDK: unspecified vulnerability fixed in 6u75, 7u55 and 8u5 (Deployment) OpenJDK: AWT thread context handling (AWT, 8025010) OpenJDK: method handle call hierachy bypass (Libraries, 8032686) OpenJDK: incorrect caching of data initialized via TCCL (JAXB, 8025030) JDK: unspecified vulnerability fixed in 6u75, 7u55 and 8u5 (Deployment) OpenJDK: JPEG decoder input stream handling (2D, 8029854) JDK: unspecified vulnerability fixed in 7u55 and 8u5 (JavaFX) OpenJDK: incorrect caching of data initialized via TCCL (JAXWS, 8026188) OpenJDK: remove insecure Java Sound provider caching (Sound, 8026163) JDK: unspecified vulnerability fixed in 6u75, 7u55 and 8u5 (Deployment)
|
[
"cpe:/a:redhat:rhel_extras_oracle_java:5",
"cpe:/a:redhat:rhel_extras_oracle_java:6"
] | null | null | null | null |
RHSA-2020:3358
|
Red Hat Security Advisory: CloudForms 5.0.7 bug fix and enhancement update
|
CloudForms: Cross Site Scripting in report menu title / HTML Code Injection CloudForms: Business logic bypass through widgets CloudForms: Missing functional level access control & IDOR lead to compromise CloudForms: CSV Injection in Orchestration Templates CloudForms: Missing access control leads to escalation of admin group privileges CloudForms: Server-Side Request Forgery (SSRF) in Ansible Tower Provider CloudForms: Out-of-band OS Command Injection through conversion host CloudForms: User Impersonation in the API for OIDC and SAML
|
[
"cpe:/a:redhat:cloudforms_managementengine:5.11::el8"
] | null | 9.9 | null | null |
RHSA-2018:3425
|
Red Hat Security Advisory: qemu-kvm security update
|
hw: cpu: speculative store bypass
|
[
"cpe:/o:redhat:rhel_aus:6.6::server",
"cpe:/o:redhat:rhel_tus:6.6::server"
] | null | null | 5.6 | null |
RHSA-2022:4880
|
Red Hat Security Advisory: ACS 3.70 enhancement and security update
|
json-pointer: type confusion vulnerability can lead to a bypass of CVE-2020-7709 when the pointer components are arrays opencontainers: OCI manifest and index parsing confusion
|
[
"cpe:/a:redhat:advanced_cluster_security:3.70::el8"
] | null | 5 | null | null |
RHSA-2017:0914
|
Red Hat Security Advisory: libreoffice security and bug fix update
|
libreoffice: Arbitrary file disclosure in Calc and Writer
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 4.7 | null |
RHSA-2023:6059
|
Red Hat Security Advisory: Red Hat OpenShift Pipelines Client tkn for 1.12.1 release and security update
|
golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487) HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack)
|
[
"cpe:/a:redhat:openshift_pipelines:1.12::el8"
] | null | 7.5 | null | null |
RHSA-2021:0711
|
Red Hat Security Advisory: virt:rhel and virt-devel:rhel security update
|
QEMU: virtiofsd: potential privileged host device access from guest
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb"
] | null | 7.5 | null | null |
RHSA-2004:156
|
Red Hat Security Advisory: mailman security update
|
security flaw
|
[
"cpe:/o:redhat:enterprise_linux:2.1::as",
"cpe:/o:redhat:enterprise_linux:2.1::aw",
"cpe:/o:redhat:enterprise_linux:2.1::es"
] | null | null | null | null |
RHSA-2021:4843
|
Red Hat Security Advisory: samba security update
|
samba: SMB1 client connections can be downgraded to plaintext authentication samba: Active Directory (AD) domain user could become root on domain members samba: Subsequent DCE/RPC fragment injection vulnerability
|
[
"cpe:/a:redhat:storage:3.5:samba:el8"
] | null | 4.8 | null | null |
RHSA-2020:2169
|
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 6.4 security update
|
EAP: Vault system property security attribute value is revealed on CLI 'reload' command
|
[
"cpe:/a:redhat:jboss_enterprise_application_platform:6::el5",
"cpe:/a:redhat:jboss_enterprise_application_platform:6::el6",
"cpe:/a:redhat:jboss_enterprise_application_platform:6::el7"
] | null | null | 5.4 | null |
RHSA-2015:2172
|
Red Hat Security Advisory: glibc security update
|
glibc: data corruption while reading the NSS files database
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | null | null |
RHSA-2021:3942
|
Red Hat Security Advisory: openvswitch2.11 security update
|
openvswitch: use-after-free in decode_NXAST_RAW_ENCAP during the decoding of a RAW_ENCAP action
|
[
"cpe:/o:redhat:enterprise_linux:7::hypervisor"
] | null | 7.5 | null | null |
RHSA-2024:0968
|
Red Hat Security Advisory: firefox security update
|
Mozilla: Out-of-bounds memory read in networking channels Mozilla: Alert dialog could have been spoofed on another site Mozilla: Fullscreen Notification could have been hidden by select element Mozilla: Custom cursor could obscure the permission dialog Mozilla: Mouse cursor re-positioned unexpectedly could have led to unintended permission grants Mozilla: Multipart HTTP Responses would accept the Set-Cookie header in response parts Mozilla: Incorrect code generation on 32-bit ARM devices Mozilla: Memory safety bugs fixed in Firefox 123, Firefox ESR 115.8, and Thunderbird 115.8
|
[
"cpe:/a:redhat:rhel_eus:9.0::appstream"
] | null | 7.5 | null | null |
RHSA-2025:3452
|
Red Hat Security Advisory: Red Hat JBoss Core Services Apache HTTP Server 2.4.62 security update
|
openssl: SSL_select_next_proto buffer overread mod_http2: DoS by null pointer in websocket over HTTP/2
|
[
"cpe:/a:redhat:jboss_core_services:1::el7",
"cpe:/a:redhat:jboss_core_services:1::el8"
] | null | 3.7 | 5.9 | null |
RHSA-2024:1303
|
Red Hat Security Advisory: kernel-rt security and bug fix update
|
kernel: memcg does not limit the number of POSIX file locks allowing memory exhaustion
|
[
"cpe:/a:redhat:rhel_eus:9.2::nfv",
"cpe:/a:redhat:rhel_eus:9.2::realtime"
] | null | 5.5 | null | null |
RHSA-2017:2808
|
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform security update
|
jasypt: Vulnerable to timing attack against the password hash comparison bouncycastle: Information disclosure in GCMBlockCipher keycloak: SAML request parser replaces special strings with system properties log4j: Socket receiver deserialization vulnerability hibernate-validator: Privilege escalation when running under the security manager
|
[
"cpe:/a:redhat:jboss_enterprise_application_platform:7::el7"
] | null | null | 6.3 | null |
RHSA-2021:4241
|
Red Hat Security Advisory: libtiff security and bug fix update
|
libtiff: Memory allocation failure in tiff2rgba libtiff: Memory allocation failure in tiff2rgba libtiff: Integer overflow in tif_getimage.c libtiff: Heap-based buffer overflow in TIFF2PDF tool
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb"
] | null | 7.8 | null | null |
RHSA-2018:1264
|
Red Hat Security Advisory: Red Hat Mobile Application Platform 4.6.0 Release - Container Images
|
nodejs-tough-cookie: Regular expression denial of service hoek: Prototype pollution in utilities function
|
[
"cpe:/a:redhat:mobile_application_platform:4.6"
] | null | null | 2.9 | null |
RHSA-2024:1109
|
Red Hat Security Advisory: libmicrohttpd security update
|
libmicrohttpd: remote DoS
|
[
"cpe:/a:redhat:rhel_eus:8.6::crb",
"cpe:/o:redhat:rhel_eus:8.6::baseos"
] | null | 5.9 | null | null |
RHSA-2015:2657
|
Red Hat Security Advisory: firefox security update
|
Mozilla: Miscellaneous memory safety hazards (rv:38.5) (MFSA 2015-134) Mozilla: Underflow through code inspection (MFSA 2015-145) Mozilla: Use-after-free in WebRTC when datachannel is used after being destroyed (MFSA 2015-138) Mozilla: Integer overflow allocating extremely large textures (MFSA 2015-139) Mozilla: Integer overflow in MP4 playback in 64-bit versions (MFSA 2015-146) Mozilla: Cross-site reading attack through data: and view-source: URIs (MFSA 2015-149) Mozilla: Integer underflow and buffer overflow processing MP4 metadata in libstagefright (MFSA 2015-147)
|
[
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::server",
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation",
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | null | null |
RHSA-2021:0789
|
Red Hat Security Advisory: .NET Core 3.1 on Red Hat Enterprise Linux security and bugfix update
|
dotnet: System.Text.Encodings.Web Remote Code Execution
|
[
"cpe:/a:redhat:rhel_dotnet:3.1::el7"
] | null | 8.1 | null | null |
RHSA-2022:0529
|
Red Hat Security Advisory: kernel security update
|
kernel: use after free in eventpoll.c may lead to escalation of privilege kernel: xfs: raw block device data leak in XFS_IOC_ALLOCSP IOCTL
|
[
"cpe:/o:redhat:rhel_aus:7.3::server"
] | null | 5.5 | null | null |
RHSA-2023:2736
|
Red Hat Security Advisory: kernel-rt security and bug fix update
|
hw: cpu: AMD CPUs may transiently execute beyond unconditional direct branch kernel: malicious data for FBIOPUT_VSCREENINFO ioctl may cause OOB write memory kernel: when setting font with malicious data by ioctl PIO_FONT, kernel will write memory out of bounds kernel: net: stmmac: fix tc flower deletion for VLAN priority Rx steering kernel: possible race condition in drivers/tty/tty_buffers.c kernel: use-after-free in ath9k_htc_probe_device() could cause an escalation of privileges kernel: KVM: NULL pointer dereference in kvm_mmu_invpcid_gva kernel: KVM: nVMX: missing IBPB when exiting from nested guest can lead to Spectre v2 attacks kernel: netfilter: nf_conntrack_irc message handling issue kernel: race condition in xfrm_probe_algs can lead to OOB read/write kernel: media: em28xx: initialize refcount before kref_get kernel: race condition in hugetlb_no_page() in mm/hugetlb.c kernel: memory leak in ipv6_renew_options() kernel: use-after-free caused by l2cap_reassemble_sdu() in net/bluetooth/l2cap_core.c kernel: data races around icsk->icsk_af_ops in do_ipv6_setsockopt kernel: data races around sk->sk_prot kernel: memory leak in l2cap_recv_acldata of the file net/bluetooth/l2cap_core.c kernel: denial of service in follow_page_pte in mm/gup.c due to poisoned pte entry kernel: use-after-free after failed devlink reload in devlink_param_get kernel: USB-accessible buffer overflow in brcmfmac kernel: Double-free in split_2MB_gtt_entry when function intel_gvt_dma_map_guest_page failed kernel: l2tp: missing lock when clearing sk_user_data can lead to NULL pointer dereference kernel: Recursive locking violation in usb-storage that can cause the kernel to deadlock kernel: igmp: use-after-free in ip_check_mc_rcu when opening and closing inet sockets kernel: Executable Space Protection Bypass kernel: Unprivileged users may use PTRACE_SEIZE to set PTRACE_O_SUSPEND_SECCOMP option kernel: xfrm_expand_policies() in net/xfrm/xfrm_policy.c can cause a refcount to be dropped twice kernel: unmap_mapping_range() race with munmap() on VM_PFNMAP mappings leads to stale TLB entry kernel: TLB flush operations are mishandled in certain KVM_VCPU_PREEMPTED leading to guest malfunctioning kernel: Report vmalloc UAF in dvb-core/dmxdev kernel: u8 overflow problem in cfg80211_update_notlisted_nontrans() kernel: use-after-free related to leaf anon_vma double reuse kernel: use-after-free in bss_ref_get in net/wireless/scan.c kernel: BSS list corruption in cfg80211_add_nontrans_list in net/wireless/scan.c kernel: Denial of service in beacon protection for P2P-device kernel: memory corruption in usbmon driver kernel: NULL pointer dereference in traffic control subsystem kernel: scsi: mpt3sas: Fix use-after-free warning kernel: NULL pointer dereference in rawv6_push_pending_frames kernel: net/ulp: use-after-free in listening ULP sockets kernel: netfilter: NULL pointer dereference in nf_tables due to zeroed list head kernel: use-after-free caused by invalid pointer hostname in fs/cifs/connect.c kernel: Soft lockup occurred during __page_mapcount Kernel: NULL pointer dereference problem in sctp_sched_dequeue_common kernel: drm/virtio: improper return value check in virtio_gpu_object_shmem_init() kernel: slab-out-of-bounds read vulnerabilities in cbq_classify
|
[
"cpe:/a:redhat:enterprise_linux:8::nfv",
"cpe:/a:redhat:enterprise_linux:8::realtime"
] | null | 4.2 | null | null |
RHSA-2023:0837
|
Red Hat Security Advisory: systemd security and bug fix update
|
systemd: local information leak due to systemd-coredump not respecting fs.suid_dumpable kernel setting
|
[
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 5.5 | null | null |
RHSA-2023:3141
|
Red Hat Security Advisory: firefox security update
|
Mozilla: Browser prompts could have been obscured by popups Mozilla: Crash in RLBox Expat driver Mozilla: Potential permissions request bypass via clickjacking Mozilla: Content process crash due to invalid wasm code Mozilla: Potential spoof due to obscured address bar Mozilla: Potential memory corruption in FileReader::DoReadData() Mozilla: Memory safety bugs fixed in Firefox 113 and Firefox ESR 102.11
|
[
"cpe:/a:redhat:rhel_eus:8.6::appstream"
] | null | 8.8 | null | null |
RHSA-2024:3758
|
Red Hat Security Advisory: idm:DL1 security update
|
freeipa: user can obtain a hash of the passwords of all domain users and perform offline brute force
|
[
"cpe:/a:redhat:rhel_aus:8.2::appstream"
] | null | 8.1 | null | null |
RHSA-2023:0597
|
Red Hat Security Advisory: rh-git227-git security update
|
git: gitattributes parsing integer overflow git: Heap overflow in `git archive`, `git log --format` leading to RCE
|
[
"cpe:/a:redhat:rhel_software_collections:3::el7"
] | null | 9.8 | null | null |
RHSA-2021:1448
|
Red Hat Security Advisory: Red Hat Advanced Cluster Management 2.0.10 security and bug fix updates
|
nodejs-underscore: Arbitrary code execution via the template function
|
[
"cpe:/a:redhat:acm:2.0::el8"
] | null | 7.2 | null | null |
RHSA-2023:2259
|
Red Hat Security Advisory: poppler security and bug fix update
|
poppler: integer overflow in JBIG2 decoder using malformed files
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::crb"
] | null | 7.8 | null | null |
RHSA-2004:096
|
Red Hat Security Advisory: wu-ftpd security update
|
security flaw security flaw security flaw
|
[
"cpe:/o:redhat:enterprise_linux:2.1::as",
"cpe:/o:redhat:enterprise_linux:2.1::aw",
"cpe:/o:redhat:enterprise_linux:2.1::es"
] | null | null | null | null |
RHSA-2018:0169
|
Red Hat Security Advisory: kernel security and bug fix update
|
kernel: Integer overflow in ip6_find_1stfragopt() causes infinite loop kernel: net: IPv6 fragmentation implementation of nexthdr field may be associated with an invalid option kernel: Use-after-free in sys_mq_notify()
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | 7.8 | null |
RHSA-2018:1666
|
Red Hat Security Advisory: libvirt security update
|
hw: cpu: speculative store bypass
|
[
"cpe:/o:redhat:rhel_aus:6.6::server",
"cpe:/o:redhat:rhel_tus:6.6::server"
] | null | null | 5.6 | null |
RHSA-2024:10281
|
Red Hat Security Advisory: kernel:4.18.0 security update
|
kernel: media: edia: dvbdev: fix a use-after-free kernel: Bluetooth: l2cap: fix null-ptr-deref in l2cap_chan_timeout kernel: bpf: Add BPF_PROG_TYPE_CGROUP_SKB attach type enforcement in BPF_LINK_CREATE kernel: mptcp: pm: Fix uaf in __timer_delete_sync
|
[
"cpe:/a:redhat:enterprise_linux:8::crb",
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 7 | null | null |
RHSA-2003:117
|
Red Hat Security Advisory: openssl security update for Stronghold
|
security flaw security flaw
|
[
"cpe:/a:redhat:stronghold:3"
] | null | null | null | null |
RHSA-2020:2679
|
Red Hat Security Advisory: microcode_ctl security, bug fix and enhancement update
|
hw: Special Register Buffer Data Sampling (SRBDS) hw: Vector Register Data Sampling hw: L1D Cache Eviction Sampling
|
[
"cpe:/o:redhat:rhel_aus:7.2::server"
] | null | 6.5 | 6.5 | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.