id
stringlengths 13
15
| title
stringlengths 29
176
| description
stringlengths 8
32.1k
| cpes
listlengths 0
20
| cvss_v4_0
null | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
null |
---|---|---|---|---|---|---|---|
RHSA-2017:3086
|
Red Hat Security Advisory: Red Hat 'Stand-Alone' Proxy - End Of Life Notice
|
This is the final notification for the End Of Life (EOL) of Red Hat 'Stand-Alone' Proxy.
Red Hat Proxy ‘Stand-Alone’ (Proxy server directly connecting to the Red Hat Network): Systems registered as clients to RHN via a Red Hat Satellite Proxy server is no longer a Red Hat supported deployment, and will no longer function as required.
Access a set of instructions for moving from Proxy to Satellite 6: https://access.redhat.com/articles/2859521. This guide describes the process for a Proxy-only user to install and configure a Satellite 6 installation and migrate clients to it.
|
[
"cpe:/a:redhat:network_proxy:5.4::el5",
"cpe:/a:redhat:network_proxy:5.4::el6",
"cpe:/a:redhat:network_proxy:5.5::el5",
"cpe:/a:redhat:network_proxy:5.5::el6",
"cpe:/a:redhat:network_proxy:5.6::el5",
"cpe:/a:redhat:network_proxy:5.6::el6",
"cpe:/a:redhat:network_proxy:5.7::el6",
"cpe:/a:redhat:network_proxy:5.8::el6"
] | null | null | null | null |
RHSA-2018:2707
|
Red Hat Security Advisory: flash-plugin security update
|
flash-plugin: Information Disclosure vulnerability (APSB18-31)
|
[
"cpe:/a:redhat:rhel_extras:6"
] | null | null | 6.5 | null |
RHSA-2023:0945
|
Red Hat Security Advisory: kpatch-patch security update
|
kernel: stack overflow in do_proc_dointvec and proc_skip_spaces
|
[
"cpe:/o:redhat:rhel_e4s:7.7::server"
] | null | 7.8 | null | null |
RHSA-2020:1827
|
Red Hat Security Advisory: libxml2 security update
|
libxml2: infinite loop in xz_decomp function in xzlib.c libxml2: NULL pointer dereference in xmlXPathCompOpEval() function in xpath.c
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | null | 6.5 | null |
RHSA-2019:2720
|
Red Hat Security Advisory: pki-deps:10.6 security update
|
jackson-databind: failure to block the logback-core class from polymorphic deserialization leading to remote code execution
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | null | 8.1 | null |
RHSA-2024:4756
|
Red Hat Security Advisory: libuv security update
|
libuv: Improper Domain Lookup that potentially leads to SSRF attacks
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::crb"
] | null | 7.3 | null | null |
RHSA-2024:9371
|
Red Hat Security Advisory: python3.9 security update
|
python: cpython: Iterating over a malicious ZIP file may lead to Denial of Service
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::crb",
"cpe:/o:redhat:enterprise_linux:9::baseos"
] | null | 5.3 | null | null |
RHSA-2010:0558
|
Red Hat Security Advisory: firefox security update
|
Mozilla arbitrary free flaw
|
[
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2024:8127
|
Red Hat Security Advisory: java-21-openjdk security update
|
giflib: Heap-Buffer Overflow during Image Saving in DumpScreen2RGB Function JDK: HTTP client improper handling of maxHeaderSize (8328286) JDK: Array indexing integer overflow (8328544) JDK: Unbounded allocation leads to out-of-memory error (8331446) JDK: Integer conversion error leads to incorrect range check (8332644)
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb",
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::crb"
] | null | 4.8 | null | null |
RHSA-2022:0889
|
Red Hat Security Advisory: 389-ds:1.4 security and bug fix update
|
389-ds-base: double free of the virtual attribute context in persistent search
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 7.5 | null | null |
RHSA-2015:1628
|
Red Hat Security Advisory: mysql55-mysql security update
|
mysql: unspecified vulnerability related to Server:InnoDB:DML (CPU Jan 2015) mysql: unspecified vulnerability related to Server:Security:Privileges:Foreign Key (CPU Jan 2015) mysql: unspecified vulnerability related to Server:Replication (CPU Jan 2015) mysql: unspecified vulnerability related to Server:Replication (CPU Jan 2015) mysql: unspecified vulnerability related to Server:DDL (CPU Jan 2015) mysql: unspecified vulnerability related to Server:Security:Encryption (CPU Jan 2015) mysql: unspecified vulnerability related to Server:InnoDB:DDL:Foreign Key (CPU Jan 2015) mysql: unspecified vulnerability related to Server:InnoDB:DML (CPU April 2015) mysql: unspecified vulnerability related to Server:Security:Encryption (CPU April 2015) mysql: unspecified vulnerability related to Server:Federated (CPU April 2015) mysql: unspecified vulnerability related to Server:Compiling (CPU April 2015) mysql: unspecified vulnerability related to Server:DDL (CPU April 2015) mysql: unspecified vulnerability related to Server:Security:Privileges (CPU April 2015) mysql: unspecified vulnerability related to Server:Optimizer (CPU April 2015) mysql: unspecified vulnerability related to Server:DDL (CPU April 2015) mysql: unspecified vulnerability related to Server:GIS (CPU July 2015) mysql: unspecified vulnerability related to Server:Security:Privileges (CPU July 2015) mysql: unspecified vulnerability related to Server:Optimizer (CPU July 2015) mysql: unspecified vulnerability related to Server:DML (CPU July 2015) mysql: unspecified vulnerability related to Server:Pluggable Auth (CPU July 2015) mysql: unspecified vulnerability related to Server:I_S (CPU July 2015) mysql: unspecified vulnerability related to Server:Optimizer (CPU July 2015) mysql: unspecified vulnerability related to Server:InnoDB (CPU October 2015) mysql: unspecified vulnerability related to Client programs (CPU October 2015) mysql: unspecified vulnerability related to Server:Security:Privileges (CPU October 2015) mysql: unspecified vulnerability related to Server:DML (CPU October 2015)
|
[
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2020:4605
|
Red Hat Security Advisory: resource-agents security and bug fix update
|
python-httplib2: CRLF injection via an attacker controlled unescaped part of uri for httplib2.Http.request function
|
[
"cpe:/a:redhat:enterprise_linux:8::highavailability",
"cpe:/a:redhat:enterprise_linux:8::resilientstorage"
] | null | 6.8 | null | null |
RHSA-2001:164
|
Red Hat Security Advisory: : Updated secureweb packages available
|
security flaw security flaw
|
[
"cpe:/a:redhat:secure_web_server:3.2"
] | null | null | null | null |
RHSA-2020:5599
|
Red Hat Security Advisory: web-admin-build security and bug fix update
|
grafana: SSRF incorrect access control vulnerability allows unauthenticated users to make grafana send HTTP requests to any URL
|
[
"cpe:/a:redhat:storage:3.5:na:el7",
"cpe:/a:redhat:storage:3.5:wa:el7"
] | null | 8.2 | null | null |
RHSA-2007:0898
|
Red Hat Security Advisory: xorg-x11 security update
|
X.org composite extension buffer overflow
|
[
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2019:2736
|
Red Hat Security Advisory: kernel security and bug fix update
|
kernel: Memory corruption due to incorrect socket cloning kernel: a NULL pointer dereference in drivers/scsi/megaraid/megaraid_sas_base.c leading to DoS
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | 6.2 | null |
RHSA-2024:7205
|
Red Hat Security Advisory: osbuild-composer security update
|
encoding/gob: golang: Calling Decoder.Decode on a message which contains deeply nested structures can cause a panic due to stack exhaustion
|
[
"cpe:/a:redhat:rhel_aus:8.4::appstream",
"cpe:/a:redhat:rhel_e4s:8.4::appstream",
"cpe:/a:redhat:rhel_tus:8.4::appstream"
] | null | 7.5 | null | null |
RHSA-2017:0246
|
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform security update
|
tomcat: HTTP Request smuggling vulnerability due to permitting invalid character in HTTP requests EAP: Sensitive data can be exposed at the server level in domain mode admin-cli: Potential EAP resource starvation DOS attack via GET requests for server log files jboss: jbossas: unsafe chown of server.log in jboss init script allows privilege escalation
|
[
"cpe:/a:redhat:jboss_enterprise_application_platform:6::el5"
] | null | null | 7 | null |
RHSA-2019:0202
|
Red Hat Security Advisory: kernel security and bug fix update
|
kernel: userfaultfd bypasses tmpfs file permissions
|
[
"cpe:/o:redhat:rhel_eus:7.5::computenode",
"cpe:/o:redhat:rhel_eus:7.5::server"
] | null | null | 6.1 | null |
RHSA-2024:6011
|
Red Hat Security Advisory: OpenShift Container Platform 4.13.49 packages and security update
|
jinja2: accepts keys containing non-attribute characters
|
[
"cpe:/a:redhat:openshift:4.13::el8",
"cpe:/a:redhat:openshift:4.13::el9",
"cpe:/a:redhat:openshift_ironic:4.13::el9"
] | null | 5.4 | null | null |
RHSA-2009:1126
|
Red Hat Security Advisory: thunderbird security update
|
Firefox 2 and 3 Layout engine crash Firefox 2 and 3 JavaScript engine crash jar: scheme ignores the content-disposition: header on the inner URI view-source: protocol Firefox XSS hazard using third-party stylesheets and XBL bindings Firefox Same-origin violations in XMLHttpRequest and XPCNativeWrapper.toString Firefox browser engine crashes Firefox JavaScript engine crashes Firefox SSL tampering via non-200 responses to proxy CONNECT requests Firefox arbitrary code execution flaw Thunderbird mail crash
|
[
"cpe:/a:redhat:rhel_productivity:5",
"cpe:/o:redhat:enterprise_linux:5::client"
] | null | null | null | null |
RHSA-2013:0243
|
Red Hat Security Advisory: flash-plugin security update
|
flash-plugin: multiple code execution flaws (APSB13-04) flash-plugin: multiple code execution flaws (APSB13-04)
|
[
"cpe:/a:redhat:rhel_extras:5::server",
"cpe:/a:redhat:rhel_extras:6"
] | null | null | null | null |
RHBA-2022:0794
|
Red Hat Bug Fix Advisory: OpenShift Container Platform 4.9.24 packages update
|
cri-o: pod with access to 'hostIPC' and 'hostNetwork' kernel namespace allows sysctl from the list of safe sysctls to be applied to the host
|
[
"cpe:/a:redhat:openshift:4.9::el7",
"cpe:/a:redhat:openshift:4.9::el8"
] | null | 4.2 | null | null |
RHSA-2021:4326
|
Red Hat Security Advisory: libX11 security update
|
libX11: missing request length checks
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 0 | null | null |
RHSA-2010:0488
|
Red Hat Security Advisory: samba and samba3x security update
|
samba: memory corruption vulnerability
|
[
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws",
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws",
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::server",
"cpe:/o:redhat:rhel_eus:4.7::as",
"cpe:/o:redhat:rhel_eus:4.7::es",
"cpe:/o:redhat:rhel_eus:5.3",
"cpe:/o:redhat:rhel_eus:5.4"
] | null | null | null | null |
RHSA-2023:0536
|
Red Hat Security Advisory: kpatch-patch security update
|
kernel: memory corruption in AX88179_178A based USB ethernet device. kernel: i915: Incorrect GPU TLB flush can lead to random memory access
|
[
"cpe:/o:redhat:rhel_eus:9.0::baseos"
] | null | 7 | null | null |
RHSA-2019:1762
|
Red Hat Security Advisory: virt:8.0.0 security update
|
libvirt: arbitrary file read/exec via virDomainSaveImageGetXMLDesc API libvirt: virDomainManagedSaveDefineXML API exposed to readonly clients libvirt: arbitrary command execution via virConnectGetDomainCapabilities API libvirt: arbitrary command execution via virConnectBaselineHypervisorCPU and virConnectCompareHypervisorCPU APIs
|
[
"cpe:/a:redhat:advanced_virtualization:8::el8"
] | null | null | 8.8 | null |
RHSA-2020:4650
|
Red Hat Security Advisory: cloud-init security, bug fix, and enhancement update
|
cloud-init: Use of random.choice when generating random password cloud-init: Too short random password length in cc_set_password in config/cc_set_passwords.py
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 8.1 | null | null |
RHSA-2010:0172
|
Red Hat Security Advisory: rhev-hypervisor security and bug fix update
|
KVM: Check cpl before emulating debug register access kernel: sctp remote denial of service kvm-userspace-rhel5: usb-linux.c: fix buffer overflow kvm: emulator privilege escalation segment selector check
|
[
"cpe:/o:redhat:enterprise_linux:5::hypervisor"
] | null | null | null | null |
RHSA-2016:2138
|
Red Hat Security Advisory: java-1.7.0-ibm security update
|
OpenJDK: missing algorithm restrictions for jar verification (Libraries, 8155973) OpenJDK: insufficient classloader consistency checks in ClassLoaderWithRepository (JMX, 8157739) JDK: unspecified vulnerability fixed in 6u131, 7u121, and 8u111 (2D) OpenJDK: insufficient checks of JDWP packets (Hotspot, 8159519) OpenJDK: exposure of server authentication credentials to proxy (Networking, 8160838)
|
[
"cpe:/a:redhat:rhel_extras:5::client",
"cpe:/a:redhat:rhel_extras:5::server"
] | null | null | 5.3 | null |
RHSA-2009:1528
|
Red Hat Security Advisory: samba security and bug fix update
|
samba: infinite loop flaw in smbd on unexpected oplock break notification reply
|
[
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws"
] | null | null | null | null |
RHSA-2025:1092
|
Red Hat Security Advisory: ovn22.12 security update
|
ovn: egress ACLs may be bypassed via specially crafted UDP packet
|
[
"cpe:/o:redhat:enterprise_linux:9::fastdatapath"
] | null | 8.1 | null | null |
RHSA-2018:2102
|
Red Hat Security Advisory: Red Hat OpenStack Platform 10 Security, Bug Fix, and Enhancement Advisory
|
dpdk: Information exposure in unchecked guest physical to host virtual address translations
|
[
"cpe:/a:redhat:openstack:10::el7"
] | null | null | 6.1 | null |
RHSA-2019:0457
|
Red Hat Security Advisory: redhat-virtualization-host security update
|
spice: Off-by-one error in array access in spice/server/memslot.c vdsm: privilege escalation to root via systemd_run systemd: Insufficient input validation in bus_process_object() resulting in PID 1 crash
|
[
"cpe:/o:redhat:enterprise_linux:7::hypervisor"
] | null | null | 7 | null |
RHSA-2024:0404
|
Red Hat Security Advisory: virt:rhel and virt-devel:rhel security update
|
QEMU: hcd-ehci: DMA reentrancy issue leads to use-after-free NTFS-3G: buffer overflow issue in NTFS-3G can cause code execution via crafted metadata in an NTFS image QEMU: e1000e: heap use-after-free in e1000e_write_packet_to_guest() QEMU: VNC: improper I/O watch removal in TLS handshake can lead to remote unauthenticated denial of service
|
[
"cpe:/a:redhat:rhel_eus:8.6::appstream",
"cpe:/a:redhat:rhel_eus:8.6::crb"
] | null | 7.5 | null | null |
RHSA-2023:3136
|
Red Hat Security Advisory: java-1.8.0-ibm security update
|
OpenJDK: Unbounded memory allocation when compiling crafted XPath expressions (JAXP, 8270504) OpenJDK: improper restrictions in CORBA deserialization (Serialization, 8285021) OpenJDK: soundbank URL remote loading (Sound, 8293742)
|
[
"cpe:/a:redhat:rhel_extras:7"
] | null | 3.7 | null | null |
RHSA-2024:1487
|
Red Hat Security Advisory: firefox security update
|
nss: timing attack against RSA decryption Mozilla: Crash in NSS TLS method Mozilla: JIT code failed to save return registers on Armv7-A Mozilla: Integer overflow could have led to out of bounds write Mozilla: Improper handling of html and body tags enabled CSP nonce leakage Mozilla: Clickjacking vulnerability could have led to a user accidentally granting permissions Mozilla: Self referencing object could have potentially led to a use-after-free Mozilla: Memory safety bugs fixed in Firefox 124, Firefox ESR 115.9, and Thunderbird 115.9 Mozilla: Improve handling of out-of-memory conditions in ICU Mozilla: Privileged JavaScript Execution via Event Handlers
|
[
"cpe:/a:redhat:rhel_eus:9.0::appstream"
] | null | 8.8 | null | null |
RHSA-2021:0310
|
Red Hat Security Advisory: OpenShift Container Platform 4.6.16 extras security update
|
openshift/elasticsearch-operator: arbitrary URL redirection of the cluster logging kibana console
|
[
"cpe:/a:redhat:openshift:4.6::el8"
] | null | 6.1 | null | null |
RHSA-2021:0878
|
Red Hat Security Advisory: kernel security, bug fix, and enhancement update
|
kernel: performance counters race condition use-after-free kernel: umask not applied on filesystem without ACL support kernel: TOCTOU mismatch in the NFS client code kernel: locking issue in drivers/tty/tty_jobctrl.c can lead to an use-after-free
|
[
"cpe:/o:redhat:enterprise_linux:7::hypervisor",
"cpe:/o:redhat:rhel_eus:7.6::computenode",
"cpe:/o:redhat:rhel_eus:7.6::server"
] | null | 7.8 | null | null |
RHSA-2023:1816
|
Red Hat Security Advisory: Red Hat OpenShift Data Foundation 4.12.2 Bug Fix and security update
|
golang: net/http: excessive memory growth in a Go server accepting HTTP/2 requests
|
[
"cpe:/a:redhat:openshift_data_foundation:4.12::el8"
] | null | 5.3 | null | null |
RHSA-2005:132
|
Red Hat Security Advisory: cups security update
|
security flaw
|
[
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws"
] | null | null | null | null |
RHSA-2012:0874
|
Red Hat Security Advisory: mysql security and enhancement update
|
mysql: Server crash on HANDLER READ NEXT after DELETE
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2012:0126
|
Red Hat Security Advisory: glibc security update
|
glibc: __tzfile_read integer overflow to buffer overflow glibc: ldd unexpected code execution issue glibc: ld.so d_tag signedness error in elf_get_dynamic_info glibc: Suid mount helpers fail to anticipate RLIMIT_FSIZE glibc: svc_run() produces high cpu usage when accept() fails with EMFILE error
|
[
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2012:0477
|
Red Hat Security Advisory: Red Hat Enterprise MRG Management Console security update
|
cumin: multiple XSS flaws
|
[
"cpe:/a:redhat:enterprise_mrg:2:server:el6"
] | null | null | null | null |
RHSA-2023:6621
|
Red Hat Security Advisory: protobuf-c security update
|
protobuf-c: unsigned integer overflow in parse_required_member
|
[
"cpe:/a:redhat:enterprise_linux:9::crb",
"cpe:/o:redhat:enterprise_linux:9::baseos"
] | null | 6.2 | null | null |
RHSA-2024:5393
|
Red Hat Security Advisory: thunderbird security update
|
mozilla: Fullscreen notification dialog can be obscured by document content mozilla: Out of bounds memory access in graphics shared memory handling mozilla: Type confusion in WebAssembly mozilla: Incomplete WebAssembly exception handing mozilla: Out of bounds read in editor component mozilla: Missing permission check when creating a StreamFilter mozilla: Uninitialized memory used by WebGL mozilla: Use-after-free in JavaScript garbage collection mozilla: Use-after-free in IndexedDB mozilla: Document content could partially obscure security prompts
|
[
"cpe:/a:redhat:rhel_aus:8.2::appstream"
] | null | 6.1 | null | null |
RHSA-2001:084
|
Red Hat Security Advisory: Kernel
|
security flaw
|
[
"cpe:/o:redhat:linux:7.1"
] | null | null | null | null |
RHSA-2011:0887
|
Red Hat Security Advisory: thunderbird security update
|
Mozilla Multiple dangling pointer vulnerabilities (MFSA 2011-23) Mozilla Multiple dangling pointer vulnerabilities (MFSA 2011-23) Mozilla Cookie isolation error (MFSA 2011-24) Mozilla Multiple dangling pointer vulnerabilities (MFSA 2011-23) Mozilla Miscellaneous memory safety hazards (MFSA 2011-19) Mozilla Miscellaneous memory safety hazards (MFSA 2011-19) Mozilla Integer overflow and arbitrary code execution (MFSA 2011-22) Mozilla Use-after-free vulnerability when viewing XUL document with script disabled (MFSA 2011-20) Mozilla Miscellaneous memory safety hazards (MFSA 2011-19) Mozilla Miscellaneous memory safety hazards (MFSA 2011-19) Mozilla Miscellaneous memory safety hazards (MFSA 2011-19) Mozilla Crash caused by corrupted JPEG image (MFSA 2011-21) Mozilla Miscellaneous memory safety hazards (MFSA 2011-19)
|
[
"cpe:/a:redhat:rhel_productivity:5",
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws",
"cpe:/o:redhat:enterprise_linux:5::client"
] | null | null | null | null |
RHSA-2018:0501
|
Red Hat Security Advisory: Red Hat Single Sign-On 7.2.1 security update
|
client: unchecked deserialization in marshaller util undertow: IO thread DoS via unclean Websocket closing infinispan: Unsafe deserialization of malicious object injected into data cache js-jquery: XSS in responses from cross-origin ajax requests
|
[
"cpe:/a:redhat:jboss_single_sign_on:7.2"
] | null | null | 6.8 | null |
RHSA-2018:0037
|
Red Hat Security Advisory: microcode_ctl security update
|
An update for microcode_ctl is now available for Red Hat Enterprise Linux 6.6 Advanced Update Support and Red Hat Enterprise Linux 6.6 Telco Extended Update Support.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
|
[
"cpe:/o:redhat:rhel_aus:6.6::server",
"cpe:/o:redhat:rhel_tus:6.6::server"
] | null | null | null | null |
RHSA-2015:2101
|
Red Hat Security Advisory: python security, bug fix, and enhancement update
|
python: multiple unbound readline() DoS flaws in python stdlib python: XMLRPC library unrestricted decompression of HTTP responses using gzip enconding python: missing boundary check in JSON module python: CGIHTTPServer module does not properly handle URL-encoded path separators in URLs python: buffer() integer overflow leading to out of bounds read
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | null | null |
RHSA-2017:1265
|
Red Hat Security Advisory: samba security and bug fix update
|
samba: Unconditional privilege delegation to Kerberos servers in trusted realms samba: Flaws in Kerberos PAC validation can trigger privilege elevation samba: symlink race permits opening files outside share directory
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 5.9 | null |
RHSA-2007:0469
|
Red Hat Security Advisory: gdb security and bug fix update
|
GDB buffer overflow
|
[
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws"
] | null | null | null | null |
RHSA-2022:1699
|
Red Hat Security Advisory: OpenShift Container Platform 4.7.50 security update
|
moby: Default inheritable capabilities for linux container should be empty
|
[
"cpe:/a:redhat:openshift:4.7::el8"
] | null | 4.8 | null | null |
RHSA-2015:1091
|
Red Hat Security Advisory: Red Hat Satellite IBM Java Runtime security update
|
jar: directory traversal vulnerability JDK: ephemeral RSA keys accepted for non-export SSL/TLS cipher suites (FREAK) JDK: unspecified Java sandbox restrictions bypass JDK: unspecified vulnerability fixed in 6u95, 7u79 and 8u45 (Deployment) JDK: unspecified vulnerability fixed in 5.0u85, 6u95, 7u79 and 8u45 (2D) ICU: layout engine glyphStorage off-by-one (OpenJDK 2D, 8067699) OpenJDK: incorrect permissions check in resource loading (Beans, 8068320) OpenJDK: insufficient hardening of RSA-CRT implementation (JCE, 8071726) OpenJDK: jar directory traversal issues (Tools, 8064601) OpenJDK: certificate options parsing uncaught exception (JSSE, 8068720) JDK: unspecified vulnerability fixed in 5.0u85, 6u95, 7u79 and 8u45 (2D) JDK: unspecified partial Java sandbox restrictions bypass SSL/TLS: "Invariance Weakness" vulnerability in RC4 stream cipher
|
[
"cpe:/a:redhat:network_satellite:5.6::el5",
"cpe:/a:redhat:network_satellite:5.6::el6",
"cpe:/a:redhat:network_satellite:5.7::el6"
] | null | null | null | null |
RHSA-2024:3461
|
Red Hat Security Advisory: kernel security and bug fix update
|
kernel: netfilter: nf_tables: disallow anonymous set with timeout flag kernel: netfilter: nf_tables: mark set as dead when unbinding anonymous set with timeout kernel: netfilter: nft_ct: sanitize layer 3 and 4 protocol number in custom expectations kernel: ipv6: sr: fix possible use-after-free and null-ptr-deref kernel: net: ip_tunnel: prevent perpetual headroom growth kernel: cifs: fix underflow in parse_server_interfaces() kernel: fs: sysfs: Fix reference leak in sysfs_break_active_protection()
|
[
"cpe:/a:redhat:rhel_eus:9.2::appstream",
"cpe:/a:redhat:rhel_eus:9.2::crb",
"cpe:/o:redhat:rhel_eus:9.2::baseos"
] | null | 5.5 | null | null |
RHSA-2023:5935
|
Red Hat Security Advisory: Red Hat OpenStack Platform 16.2.5 security update
|
golang: crypto/tls: large handshake records may cause panics golang: net/http, mime/multipart: denial of service from excessive resource consumption golang: crypto/internal/nistec: specific unreduced P-256 scalars produce incorrect results golang: net/http: insufficient sanitization of Host header golang: crypto/tls: slow verification of certificate chains containing large RSA keys golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487) HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack)
|
[
"cpe:/a:redhat:openstack:16.2::el8"
] | null | 7.5 | null | null |
RHSA-2024:2047
|
Red Hat Security Advisory: OpenShift Container Platform 4.13.41 bug fix and security update
|
osin: manipulation of the argument secret leads to observable timing discrepancy go-git: Maliciously crafted Git server replies can cause DoS on go-git clients go-git: Maliciously crafted Git server replies can lead to path traversal and RCE on go-git clients cluster-monitoring-operator: credentials leak kubevirt-csi: PersistentVolume allows access to HCP's root node
|
[
"cpe:/a:redhat:openshift:4.13::el8",
"cpe:/a:redhat:openshift:4.13::el9"
] | null | 6.5 | null | null |
RHSA-2023:5441
|
Red Hat Security Advisory: Red Hat Integration Camel for Spring Boot 4.0.0 release and security update
|
batik: Server-Side Request Forgery vulnerability batik: Server-Side Request Forgery vulnerability apache-ivy: XML External Entity vulnerability jetty-server: OutOfMemoryError for large multipart without filename read via request.getParameter() jetty-server: Cookie parsing of quoted values can exfiltrate values from other cookies apache-johnzon: Prevent inefficient internal conversion from BigDecimal at large scale netty: SniHandler 16MB allocation leads to OOM jetty: Improper validation of HTTP/1 content-length
|
[
"cpe:/a:redhat:camel_spring_boot:4.0.0"
] | null | 5.3 | null | null |
RHSA-2019:1898
|
Red Hat Security Advisory: httpd security update
|
httpd: Weak Digest auth nonce generation in mod_auth_digest
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 4.2 | null |
RHSA-2019:2822
|
Red Hat Security Advisory: dovecot security update
|
dovecot: improper NULL byte handling in IMAP and ManageSieve protocol parsers leads to out of bounds writes
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb"
] | null | null | 8.1 | null |
RHSA-2023:5396
|
Red Hat Security Advisory: Red Hat Data Grid 8.4.4 security update
|
mina-sshd: Java unsafe deserialization vulnerability infispan: REST bulk ops don't check permissions infinispan: Non-admins should not be able to get cache config via REST API infinispan: circular reference on marshalling leads to DoS netty: SniHandler 16MB allocation leads to OOM jackson-databind: denial of service via cylic dependencies apache-mina-sshd: information exposure in SFTP server implementations
|
[
"cpe:/a:redhat:jboss_data_grid:8"
] | null | 4.3 | null | null |
RHSA-2024:1963
|
Red Hat Security Advisory: golang security update
|
golang: net/http, x/net/http2: unlimited number of CONTINUATION frames causes DoS
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 7.5 | null | null |
RHSA-2009:1561
|
Red Hat Security Advisory: libvorbis security update
|
libvorbis: security fixes mentioned in MFSA 2009-63
|
[
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws",
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws",
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2023:6823
|
Red Hat Security Advisory: python3 security update
|
python: TLS handshake bypass
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 8.6 | null | null |
RHSA-2025:0381
|
Red Hat Security Advisory: .NET 8.0 security update
|
dotnet: .NET and Visual Studio Remote Code Execution Vulnerability dotnet: .NET Elevation of Privilege Vulnerability dotnet: .NET, .NET Framework, and Visual Studio Remote Code Execution Vulnerability
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb"
] | null | 8.8 | null | null |
RHSA-2024:3067
|
Red Hat Security Advisory: tigervnc security update
|
xorg-x11-server: Use-after-free bug in DestroyWindow
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 4.7 | null | null |
RHSA-2023:1441
|
Red Hat Security Advisory: openssl security update
|
openssl: X.400 address type confusion in X.509 GeneralName
|
[
"cpe:/o:redhat:rhel_eus:8.6::baseos"
] | null | 7.4 | null | null |
RHSA-2011:0263
|
Red Hat Security Advisory: Red Hat Enterprise Linux 4.9 kernel security and bug fix update
|
kernel: buffer overflow in OSS load_mixer_volumes kernel: heap contents leak for CAP_NET_ADMIN via ethtool ioctl kernel: av7110 negative array offset
|
[
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2017:0320
|
Red Hat Security Advisory: CFME 5.7.1 bug fixes and enhancement update
|
rubygem-i18n: cross-site scripting flaw in exception handling cfme: tenant administrator can create a group with higher permissions
|
[
"cpe:/a:redhat:cloudforms_managementengine:5.7::el7"
] | null | null | 4.9 | null |
RHSA-2023:5191
|
Red Hat Security Advisory: thunderbird security update
|
libwebp: Heap buffer overflow in WebP Codec libwebp: out-of-bounds write with a specially crafted WebP lossless file
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 0 | null | null |
RHSA-2022:4711
|
Red Hat Security Advisory: RHV Manager (ovirt-engine) [ovirt-4.5.0] security update
|
nodejs-ansi-regex: Regular expression denial of service (ReDoS) matching ANSI escape codes nodejs-trim-off-newlines: ReDoS via string processing nodejs-normalize-url: ReDoS for data URLs jquery-ui: XSS in the altField option of the datepicker widget jquery-ui: XSS in *Text options of the datepicker widget jquery-ui: XSS in the 'of' option of the .position() util
|
[
"cpe:/a:redhat:rhev_manager:4.4:el8"
] | null | 6.5 | null | null |
RHSA-2024:4548
|
Red Hat Security Advisory: kpatch-patch-5_14_0-284_48_1 security update
|
kernel: TIPC message reassembly use-after-free remote code execution vulnerability
|
[
"cpe:/o:redhat:rhel_eus:9.2::baseos"
] | null | 7.1 | null | null |
RHSA-2012:1365
|
Red Hat Security Advisory: bind security update
|
bind: specially crafted resource record causes named to exit bind: Specially crafted DNS data can cause a lockup in named
|
[
"cpe:/o:redhat:rhel_els:4::as",
"cpe:/o:redhat:rhel_els:4::es"
] | null | null | null | null |
RHSA-2023:3589
|
Red Hat Security Advisory: firefox security update
|
Mozilla: Click-jacking certificate exceptions through rendering lag Mozilla: Memory safety bugs fixed in Firefox 114 and Firefox ESR 102.12
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 9.8 | null | null |
RHSA-2004:583
|
Red Hat Security Advisory: nfs-utils security update
|
security flaw security flaw
|
[
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws"
] | null | null | null | null |
RHSA-2015:1978
|
Red Hat Security Advisory: kernel security, bug fix, and enhancement update
|
kernel: fs: deadlock due to incorrect usage of rename_lock kernel: buffer overflow with fraglist larger than MAX_SKB_FRAGS + 2 in virtio-net
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | null | null |
RHSA-2012:1392
|
Red Hat Security Advisory: java-1.6.0-sun security update
|
OpenJDK: AWT hardening fixes (AWT, 7163201) JDK: unspecified vulnerability (2D) JDK: unspecified vulnerability (Deployment) JDK: unspecified vulnerability (Deployment) JDK: unspecified vulnerability (JMX) JDK: unspecified vulnerability (Deployment) OpenJDK: java.io.FilePermission information leak (Libraries, 6631398) OpenJDK: uninitialized Array JVM memory disclosure (Hotspot, 7198606) OpenJDK: RhinoScriptEngine security bypass (Scripting, 7143535) OpenJDK: Executors state handling issues (Concurrency, 7189103) OpenJDK: DescriptorSupport insufficient package access checks (JMX, 7192975) OpenJDK: AccessController.doPrivilegedWithCombiner() information disclosure (Security, 7172522) OpenJDK: LogManager security bypass (Libraries, 7169884) OpenJDK: RMIConnectionImpl information disclosure (JMX, 7169888) OpenJDK: SecureRandom mulitple seeders information disclosure (Security, 7167656) OpenJDK: ServiceLoader reject not subtype classes without instantiating (Libraries, 7195919) OpenJDK: JSSE denial of service (JSSE, 7186286) JDK: unspecified vulnerability (2D) OpenJDK: DefaultFormatter insufficient data validation (Swing, 7195194) OpenJDK: disable Gopher support by default (Gopher, 7189567) OpenJDK: XMLDecoder sandbox restriction bypass (Beans, 7195917) OpenJDK: RMIConnectionImpl insufficient access control checks (JMX, 7198296)
|
[
"cpe:/a:redhat:rhel_extras:5::client",
"cpe:/a:redhat:rhel_extras:5::server",
"cpe:/a:redhat:rhel_extras:6"
] | null | null | null | null |
RHSA-2020:2476
|
Red Hat Security Advisory: .NET Core on Red Hat Enterprise Linux 7 security update
|
dotnet: Denial of service via untrusted input
|
[
"cpe:/a:redhat:rhel_dotnet:2.1::el7"
] | null | 7.5 | null | null |
RHSA-2023:0633
|
Red Hat Security Advisory: Red Hat OpenShift (Logging Subsystem) security update
|
Logging Subsystem 5.5.7 - Red Hat OpenShift
|
[
"cpe:/a:redhat:logging:5.5::el8"
] | null | null | null | null |
RHSA-2024:2935
|
Red Hat Security Advisory: go-toolset:rhel8 security update
|
golang: net/http, x/net/http2: unlimited number of CONTINUATION frames causes DoS
|
[
"cpe:/a:redhat:rhel_eus:8.6::appstream"
] | null | 7.5 | null | null |
RHSA-2013:0577
|
Red Hat Security Advisory: Red Hat Enterprise Virtualization 2 - End Of Life
|
This is the End of Life notification for Red Hat Enterprise
Virtualization 2.
|
[] | null | null | null | null |
RHSA-2023:1970
|
Red Hat Security Advisory: kernel security and bug fix update
|
kernel: FUSE filesystem low-privileged user privileges escalation
|
[
"cpe:/a:redhat:rhel_eus:9.0::appstream",
"cpe:/a:redhat:rhel_eus:9.0::crb",
"cpe:/o:redhat:rhel_eus:9.0::baseos"
] | null | 7 | null | null |
RHSA-2019:2048
|
Red Hat Security Advisory: exempi security update
|
exempi: Infinite Loop in Chunk class in XMPFiles/source/FormatSupport/RIFF.cpp exempi: Use after free via a PDF file containing JPEG data exempi: Infinite loop in ASF_Support::ReadHeaderObject function in XMPFiles/source/FormatSupport/ASF_Support.cpp exempi: Infinite loop in TradQT_Manager::ParseCachedBoxes function in XMPFiles/source/FormatSupport/QuickTime_Support.cpp exempi: Heap-based buffer overflow in PSD_MetaHandler::CacheFileData function in XMPFiles/source/FormatSupport/PSIR_FileWriter.cpp allows for denial of service via crafted XLS file
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 3.3 | null |
RHSA-2018:1723
|
Red Hat Security Advisory: java-1.7.1-ibm security update
|
JDK: unspecified vulnerability fixed in 6u191, 7u171, and 8u161 (Security) OpenJDK: incorrect merging of sections in the JAR manifest (Security, 8189969) OpenJDK: unrestricted deserialization of data from JCEKS key stores (Security, 8189997) OpenJDK: insufficient consistency checks in deserialization of multiple classes (Security, 8189977) OpenJDK: unbounded memory allocation during deserialization in PriorityBlockingQueue (Concurrency, 8189981) OpenJDK: unbounded memory allocation during deserialization in TabularDataSupport (JMX, 8189985) OpenJDK: unbounded memory allocation during deserialization in Container (AWT, 8189989) OpenJDK: unbounded memory allocation during deserialization in NamedNodeMapImpl (JAXP, 8189993) OpenJDK: RMI HTTP transport enabled by default (RMI, 8193833)
|
[
"cpe:/a:redhat:rhel_extras:7"
] | null | null | 4.2 | null |
RHSA-2020:2605
|
Red Hat Security Advisory: AMQ Clients 2.7.0 Release
|
netty: compression/decompression codecs don't enforce limits on buffer allocation sizes
|
[
"cpe:/a:redhat:a_mq_clients:2::el6",
"cpe:/a:redhat:a_mq_clients:2::el7",
"cpe:/a:redhat:a_mq_clients:2::el8"
] | null | 7.5 | null | null |
RHSA-2020:2354
|
Red Hat Security Advisory: freerdp security update
|
freerdp: Out-of-bounds write in planar.c freerdp: Integer overflow in region.c freerdp: Out-of-bounds write in interleaved.c
|
[
"cpe:/a:redhat:rhel_eus:8.1::appstream",
"cpe:/a:redhat:rhel_eus:8.1::crb"
] | null | 6.6 | null | null |
RHSA-2018:0574
|
Red Hat Security Advisory: rh-mariadb101-mariadb and rh-mariadb101-galera security and bug fix update
|
mysql: insecure error log file handling in mysqld_safe (CPU Oct 2016) mysql: insecure error log file handling in mysqld_safe (CPU Oct 2016) mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2017) mysql: Server: Charsets unspecified vulnerability (CPU Jan 2017) mysql: Server: DML unspecified vulnerability (CPU Jan 2017) mysql: Server: InnoDB unspecified vulnerability (CPU Jan 2017) mysql: Server: DDL unspecified vulnerability (CPU Jan 2017) mysql: unsafe chmod/chown use in init script (CPU Jan 2017) mysql: unrestricted mysqld_safe's ledir (CPU Jan 2017) mysql: prepared statement handle use-after-free after disconnect mysql: Server: DML unspecified vulnerability (CPU Apr 2017) mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2017) mysql: insecure error log file handling in mysqld_safe, incomplete CVE-2016-6664 fix (CPU Jan 2017) mysql: Server: MyISAM unspecified vulnerability (CPU Jan 2017) mysql: Logging unspecified vulnerability (CPU Jan 2017) mysql: Server: Error Handling unspecified vulnerability (CPU Jan 2017) mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2017) mysql: Server: DML unspecified vulnerability (CPU Apr 2017) mysql: Server: DDL unspecified vulnerability (CPU Apr 2017) mysql: Client programs unspecified vulnerability (CPU Jul 2017) mysql: Server: DML unspecified vulnerability (CPU Jul 2017) mysql: Server: DDL unspecified vulnerability (CPU Jul 2017) mysql: Server: Replication unspecified vulnerability (CPU Oct 2017) mysql: Server: InnoDB unspecified vulnerability (CPU Oct 2017) mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2017) mysql: Client programs unspecified vulnerability (CPU Oct 2017) mysql: Server: DDL unspecified vulnerability (CPU Oct 2017)
|
[
"cpe:/a:redhat:rhel_software_collections:3::el6",
"cpe:/a:redhat:rhel_software_collections:3::el7"
] | null | null | 6.5 | null |
RHSA-2023:3167
|
Red Hat Security Advisory: Red Hat build of Cryostat 2.3.0: new RHEL 8 container images
|
golang.org/x/net/http2: avoid quadratic complexity in HPACK decoding golang: crypto/tls: large handshake records may cause panics golang: net/http, mime/multipart: denial of service from excessive resource consumption golang: net/http, net/textproto: denial of service from excessive memory allocation golang: net/http, net/textproto, mime/multipart: denial of service from excessive resource consumption golang: go/parser: Infinite loop in parsing
|
[
"cpe:/a:redhat:cryostat:2::el8"
] | null | 7.5 | null | null |
RHSA-2020:2646
|
Red Hat Security Advisory: Red Hat JBoss Core Services Apache HTTP Server 2.4.37 SP3 security update
|
expat: large number of colons in input makes parser consume high amount of resources, leading to DoS httpd: mod_http2: read-after-free on a string compare httpd: mod_http2: possible crash on late upgrade expat: heap-based buffer over-read via crafted XML input libxml2: memory leak in xmlParseBalancedChunkMemoryRecover in parser.c libxml2: memory leak in xmlSchemaPreRun in xmlschemas.c httpd: mod_proxy_ftp use of uninitialized value libxml2: infinite loop in xmlStringLenDecodeEntities in some end-of-file situations nghttp2: overly large SETTINGS frames can lead to DoS
|
[
"cpe:/a:redhat:jboss_core_services:1"
] | null | 7.5 | 7.5 | null |
RHSA-2012:1307
|
Red Hat Security Advisory: openssl security update
|
openssl: DTLS plaintext recovery attack openssl: double-free in policy checks openssl: uninitialized SSL 3.0 padding openssl: SGC restart DoS attack openssl: CMS and PKCS#7 Bleichenbacher attack openssl: mime_param_cmp NULL dereference crash openssl: asn1_d2i_read_bio integer errors leading to buffer overflow openssl: record length handling integer underflow
|
[
"cpe:/a:redhat:jboss_enterprise_application_platform:5.1"
] | null | null | null | null |
RHSA-2016:0309
|
Red Hat Security Advisory: openstack-glance security update
|
openstack-glance: Glance image status manipulation through locations
|
[
"cpe:/a:redhat:openstack:6::el7"
] | null | null | null | null |
RHSA-2022:7268
|
Red Hat Security Advisory: Red Hat OpenStack Platform 13.0 (openvswitch2.11) security update
|
dpdk: DoS when a Vhost header crosses more than two descriptors and exhausts all mbufs
|
[
"cpe:/a:redhat:openstack:13::el7"
] | null | 8.6 | null | null |
RHSA-2024:6192
|
Red Hat Security Advisory: wget security update
|
wget: Misinterpretation of input may lead to improper behavior
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 5.5 | null | null |
RHSA-2012:1068
|
Red Hat Security Advisory: openjpeg security update
|
openjpeg: Heap memory corruption leading to invalid free by processing certain Gray16 TIFF images openjpeg: heap-based buffer overflow when processing JPEG2000 image files
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2017:0631
|
Red Hat Security Advisory: wireshark security and bug fix update
|
wireshark: DoS (crash) in the GMR-1 BCCH dissector (wnpa-sec-2013-33) wireshark: WCP dissector crash (wnpa-sec-2015-14) wireshark: X11 memory leak (wnpa-sec-2015-15) wireshark: Reassembly memory leak (wnpa-sec-2015-16)
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2020:0204
|
Red Hat Security Advisory: kernel security and bug fix update
|
hw: Machine Check Error on Page Size Change (IFU) kernel: nfs: use-after-free in svc_process_common() hw: Intel GPU Denial Of Service while accessing MMIO in lower power state hw: Intel GPU blitter manipulation can allow for arbitrary kernel memory write Kernel: vhost_net: infinite loop while receiving packets leads to DoS Kernel: page cache side channel attacks hardware: bluetooth: BR/EDR encryption key negotiation attacks (KNOB) kernel: Heap overflow in mwifiex_uap_parse_tail_ies function in drivers/net/wireless/marvell/mwifiex/ie.c hw: TSX Transaction Asynchronous Abort (TAA) kernel: heap overflow in mwifiex_update_vs_ie() function of Marvell WiFi driver Kernel: KVM: OOB memory access via mmio ring buffer kernel: heap overflow in marvell/mwifiex/tdls.c
|
[
"cpe:/o:redhat:rhel_e4s:8.0::baseos"
] | null | null | 8.8 | null |
RHSA-2023:4933
|
Red Hat Security Advisory: Logging Subsystem 5.7.6 - Red Hat OpenShift security update
|
openshift-logging: LokiStack authorisation is cached too broadly
|
[
"cpe:/a:redhat:logging:5.7::el8"
] | null | 5.7 | null | null |
RHSA-2023:7394
|
Red Hat Security Advisory: binutils security update
|
binutils: NULL pointer dereference in _bfd_elf_get_symbol_version_string leads to segfault
|
[
"cpe:/a:redhat:rhel_eus:8.6::appstream",
"cpe:/o:redhat:rhel_eus:8.6::baseos"
] | null | 5.5 | null | null |
RHSA-2020:0905
|
Red Hat Security Advisory: thunderbird security update
|
usrsctp: Out of bounds reads in sctp_load_addresses_from_init() Mozilla: Use-after-free when removing data about origins Mozilla: BodyStream:: OnInputStreamReady was missing protections against state confusion Mozilla: Use-after-free in cubeb during stream destruction Mozilla: Devtools' 'Copy as cURL' feature did not fully escape website-controlled data, potentially leading to command injection Mozilla: The names of AirPods with personally identifiable information were exposed to websites with camera or microphone permission Mozilla: Memory safety bugs fixed in Firefox 74 and Firefox ESR 68.6
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 9.8 | 6.1 | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.