id
stringlengths 13
15
| title
stringlengths 29
176
| description
stringlengths 8
32.1k
| cpes
listlengths 0
20
| cvss_v4_0
null | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
null |
---|---|---|---|---|---|---|---|
RHSA-2023:5390
|
Red Hat Security Advisory: OpenShift Container Platform 4.12.36 bug fix and security update
|
distribution/distribution: DoS from malicious API request
|
[
"cpe:/a:redhat:openshift:4.12::el8"
] | null | 6.5 | null | null |
RHSA-2024:7000
|
Red Hat Security Advisory: kernel security update
|
kernel: kyber: fix out of bounds access when preempted kernel: Input: elantech - fix stack out of bound access in elantech_change_report_id() kernel: asix: fix uninit-value in asix_mdio_read() kernel: driver core: auxiliary bus: Fix memory leak when driver_register() fail kernel: ACPI: fix NULL pointer dereference kernel: watchdog: Fix possible use-after-free by calling del_timer_sync() kernel: fbmem: Do not delete the mode that is still in use kernel: virtio-net: Add validation for used length kernel: tty: Fix out-of-bound vmalloc access in imageblit kernel: hwmon: (w83793) Fix NULL pointer dereference by removing unnecessary structure field kernel: hwmon: (w83792d) Fix NULL pointer dereference by removing unnecessary structure field kernel: hwmon: (w83791d) Fix NULL pointer dereference by removing unnecessary structure field kernel: hwmon: (mlxreg-fan) Return non-zero value when fan current state is enforced from sysfs kernel: block: don't call rq_qos_ops->done_bio if the bio isn't tracked kernel: lib/generic-radix-tree.c: Don't overflow in peek() kernel: mlxsw: thermal: Fix out-of-bounds memory accesses kernel: ptp: Fix possible memory leak in ptp_clock_register() kernel: mm, slub: fix potential memoryleak in kmem_cache_open() kernel: nvmem: Fix shift-out-of-bound (UBSAN) with byte size cells kernel: serial: core: fix transmit-buffer reset and memleak kernel: mlxsw: spectrum: Protect driver from buggy firmware kernel: USB: core: Make do_proc_control() and do_proc_bulk() killable kernel: firmware: arm_scpi: Fix string overflow in SCPI genpd driver kernel: event code falling outside of a bitmap in input_set_capability() leads to panic kernel: phylib: fix potential use-after-free kernel: USB: core: Fix hang in usb_kill_urb by adding memory barriers kernel: vt_ioctl: fix array_index_nospec in vt_setactivate kernel: Input: aiptek - properly check endpoint type kernel: HID: hid-thrustmaster: fix OOB read in thrustmaster_interrupts kernel: NFSv4: Don't hold the layoutget locks across multiple RPC calls kernel: netfilter: nf_tables: out-of-bounds access in nf_tables_newtable() kernel: null-ptr-deref in alloc_workqueue kernel: perf/x86/lbr: Filter vsyscall addresses kernel: HID: logitech-hidpp: Fix kernel crash on receiver USB disconnect kernel: net: fix possible store tearing in neigh_periodic_work() kernel: ACPI: extlog: fix NULL pointer dereference check kernel: ACPI: LPIT: Avoid u32 multiplication overflow kernel: wifi: ath11k: fix dfs radar event locking kernel: wifi: ath11k: fix htt pktlog locking kernel: scsi: libfc: Fix potential NULL pointer dereference in fc_lport_ptp_setup() kernel: drm/amdgpu: Fix a null pointer access when the smc_rreg pointer is NULL kernel: Input: synaptics-rmi4 - fix use after free in rmi_unregister_function() kernel: use-after-free in cec_queue_msg_fh kernel: mlxsw: spectrum_acl_tcam: Fix NULL pointer dereference in error path kernel: phy: ti: phy-omap-usb2: Fix NULL pointer dereference for SRP kernel: nbd: always initialize struct msghdr completely kernel: tracing: Ensure visibility when inserting an element into tracing_map kernel: null pointer when load rlc firmware kernel: tunnels: fix out of bounds access when building IPv6 PMTU error kernel: HID: i2c-hid-of: fix NULL-deref on failed power up kernel: mm/writeback: fix possible divide-by-zero in wb_dirty_limits(), again kernel: nvmet-fc: avoid deadlock on delete association path kernel: nvme-fc: do not wait in vain when unloading module kernel: net: ice: Fix potential NULL pointer dereference in ice_bridge_setlink() kernel: dm: call the resume method on internal suspend kernel: ACPI: processor_idle: Fix memory leak in acpi_processor_power_exit() kernel: af_unix: Fix garbage collector racing against connect() kernel: drm/i915/vma: Fix UAF on destroy against retire race kernel: tun: limit printing rate when illegal packet received by tun dev kernel: drm/amdgpu: Fix potential out-of-bounds access in 'amdgpu_discovery_reg_base_init()' kernel: PCI/PM: Drain runtime-idle callbacks before driver removal kernel: x86/mm/pat: fix VM_PAT handling in COW mappings kernel: udp: do not accept non-tunnel GSO skbs landing in a tunnel kernel: VMCI: Fix memcpy() run-time warning in dg_dispatch_as_host() kernel: dmaengine: idxd: Fix oops during rmmod on single-CPU platforms kernel: net: fix out-of-bounds access in ops_init kernel: ipv6: prevent NULL dereference in ip6_output() kernel: ipv6: fib6_rules: avoid possible NULL dereference in fib6_rule_action() kernel: scsi: bnx2fc: Remove spin_lock_bh while releasing resources after upload kernel: scsi: mpi3mr: Avoid memcpy field-spanning write WARNING kernel: wifi: iwlwifi: read txq->read_ptr under lock kernel: nfs: Handle error of rpc_proc_register() in nfs_net_init(). kernel: KVM: arm64: vgic-v2: Check for non-NULL vCPU in vgic_v2_parse_attr() kernel: tcp: Fix shift-out-of-bounds in dctcp_update_alpha(). kernel: net: openvswitch: fix overwriting ct original tuple for ICMPv6 kernel: scsi: qedf: Ensure the copied buf is NUL terminated kernel: gfs2: Fix potential glock use-after-free on unmount kernel: crypto: bcm - Fix pointer arithmetic kernel: drm/amdgpu/mes: fix use-after-free issue kernel: usb-storage: alauda: Check whether the media is initialized kernel: drm/amdgpu: add error handle to avoid out-of-bounds kernel: vmci: prevent speculation leaks by sanitizing event in event_deliver() kernel: drivers: core: synchronize really_probe() and dev_uevent() kernel: liquidio: Adjust a NULL pointer handling path in lio_vf_rep_copy_packet kernel: scsi: mpt3sas: Avoid test/set_bit() operating in non-allocated memory kernel: USB: class: cdc-wdm: Fix CPU lockup caused by excessive log messages kernel: wifi: cfg80211: Lock wiphy in cfg80211_get_station kernel: wifi: mac80211: Fix deadlock in ieee80211_sta_ps_deliver_wakeup() kernel: wifi: iwlwifi: mvm: check n_ssids before accessing the ssids kernel: mptcp: ensure snd_una is properly initialized on connect kernel: wifi: iwlwifi: mvm: don't read past the mfuart notifcation kernel: net: do not leave a dangling sk pointer, when socket creation fails kernel: netns: Make get_net_ns() handle zero refcount net kernel: xfrm6: check ip6_dst_idev() return value in xfrm6_get_saddr() kernel: ipv6: prevent possible NULL dereference in rt6_probe() kernel: ext4: do not create EA inode under buffer lock kernel: wifi: mt76: mt7921s: fix potential hung tasks during chip recovery kernel: scsi: qedi: Fix crash while reading debugfs attribute kernel: drm/radeon: fix UBSAN warning in kv_dpm.c kernel: KVM: arm64: Disassociate vcpus from redistributor region on teardown kernel: net/sched: act_api: fix possible infinite loop in tcf_idr_check_alloc() kernel: cpufreq: amd-pstate: fix memory leak on CPU EPP exit kernel: ext4: fix uninitialized ratelimit_state->lock access in __ext4_fill_super() kernel: netpoll: Fix race condition in netpoll_owner_active kernel: tcp: avoid too many retransmit packets kernel: drm/amdgpu: change vm->task_info handling kernel: filelock: Remove locks reliably when fcntl/close race is detected kernel: xfs: don't walk off the end of a directory data block kernel: xfs: add bounds checking to xlog_recover_process_data kernel: sched/deadline: Fix task_struct reference leak kernel: USB: core: Fix duplicate endpoint bug by clearing reserved bits in the descriptor kernel: firmware: cs_dsp: Prevent buffer overrun when processing V2 alg headers kernel: firmware: cs_dsp: Fix overflow checking of wmfw header kernel: net/sched: Fix UAF when resolving a clash kernel: udp: Set SOCK_RCU_FREE earlier in udp_lib_get_port() kernel: ppp: reject claimed-as-LCP but actually malformed packets kernel: mm: prevent derefencing NULL ptr in pfn_section_valid() kernel: firmware: cs_dsp: Use strnlen() on name fields in V1 wmfw files kernel: drm/radeon: check bo_va->bo is non-NULL before using it kernel: powerpc/eeh: avoid possible crash when edev->pdev changes kernel: powerpc/pseries: Whitelist dtl slub object for copying to userspace kernel: wifi: mac80211: Avoid address calculations via out of bounds array indexing kernel: NFSv4: Fix memory leak in nfs4_set_security_label kernel: virtio-net: tap: mlx5_core short frame denial of service kernel: virtio-net: tun: mlx5_core short frame denial of service kernel: usb: atm: cxacru: fix endpoint checking in cxacru_bind() kernel: ftruncate: pass a signed offset kernel: pinctrl: fix deadlock in create_pinctrl() when handling -EPROBE_DEFER kernel: net/iucv: Avoid explicit cpumask var allocation on stack kernel: x86: stop playing stack games in profile_pc() kernel: wifi: cfg80211: restrict NL80211_ATTR_TXQ_QUANTUM values kernel: scsi: qedf: Make qedf_execute_tmf() non-preemptible kernel: mm: avoid overflows in dirty throttling logic kernel: nvmet: fix a possible leak when destroy a ctrl during qp establishment kernel: tcp_metrics: validate source addr length kernel: wifi: mt76: replace skb_put with skb_put_zero kernel: usb: xhci: prevent potential failure in handle_tx_event() for Transfer events without TRB kernel: drm/amdgpu: Using uninitialized value *size when calling amdgpu_vce_cs_reloc kernel: firmware: cs_dsp: Validate payload length before processing block kernel: firmware: cs_dsp: Return error if block header overflows file kernel: x86/bhi: Avoid warning in #DB handler due to BHI mitigation kernel: net, sunrpc: Remap EPERM in case of connection failure in xs_tcp_setup_socket kernel: protect the fetch of ->fd[fd] in do_dup2() from mispredictions kernel: ipvs: properly dereference pe in ip_vs_add_service kernel: leds: trigger: Unregister sysfs attributes before calling deactivate() kernel: devres: Fix memory leakage caused by driver API devm_free_percpu() kernel: s390/dasd: fix error recovery leading to data corruption on ESE devices
|
[
"cpe:/a:redhat:enterprise_linux:8::crb",
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 6.7 | null | null |
RHSA-2023:7823
|
Red Hat Security Advisory: OpenShift Container Platform 4.12.46 bug fix and security update
|
golang.org/x/net/http2: avoid quadratic complexity in HPACK decoding golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487)
|
[
"cpe:/a:redhat:openshift:4.12::el8",
"cpe:/a:redhat:openshift:4.12::el9"
] | null | 7.5 | null | null |
RHSA-2016:1546
|
Red Hat Security Advisory: libtiff security update
|
libtiff: out-of-bounds read with malformed TIFF image in multiple tools libtiff: out-of-bounds read/write with malformed TIFF image in tiff2pdf libtiff: divide by zero in the tiffdither tool libtiff: Out-of-bounds reads followed by a crash in bmp2tiff libtiff: use of uninitialized memory in putcontig8bitYCbCr21tile and NeXTDecode libtiff: use of uninitialized memory in NeXTDecode libtiff: Invalid-write in _TIFFVGetField() when parsing some extension tags libtiff: Out-of-bounds read in tif_getimage.c libtiff: OOB read in bmp2tiff libtiff: Out-of-bounds when reading CIE Lab image format files libtiff: invalid assertion libtiff: invalid assertion libtiff: invalid assertion libtiff: out-of-bound write in NeXTDecode() libtiff: out-of-bounds write in _TIFFVGetField function libtiff: out-of-bounds write in the tiff2rgba tool libtiff: out-of-bounds write in horizontalDifference8() libtiff: out-of-bounds write in loadImage() function libtiff: Out-of-bounds write in PixarLogDecode() function in tif_pixarlog.c
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 6.3 | null |
RHSA-2024:6136
|
Red Hat Security Advisory: httpd:2.4 security update
|
httpd: Security issues via backend applications whose response headers are malicious or exploitable
|
[
"cpe:/a:redhat:rhel_eus:8.8::appstream"
] | null | 9.1 | null | null |
RHSA-2020:0279
|
Red Hat Security Advisory: virt:rhel security update
|
hw: TSX Transaction Asynchronous Abort (TAA)
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb"
] | null | null | 6.5 | null |
RHSA-2021:4150
|
Red Hat Security Advisory: python36:3.6 security and bug fix update
|
python-pygments: Infinite loop in SML lexer may lead to DoS python-pygments: ReDoS in multiple lexers
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 7.5 | null | null |
RHSA-2020:0804
|
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.2.7 on RHEL 6 security update
|
thrift: Endless loop when feed with specific input data thrift: Out-of-bounds read related to TJSONProtocol or TSimpleJSONProtocol apache-commons-beanutils: does not suppresses the class property in PropertyUtilsBean by default xml-security: Apache Santuario potentially loads XML parsing code from an untrusted source wildfly: The 'enabled-protocols' value in legacy security is not respected if OpenSSL security provider is in use netty: HTTP request smuggling netty: HttpObjectDecoder.java allows Content-Length header to accompanied by second Content-Length header netty: HTTP Request Smuggling due to Transfer-Encoding whitespace mishandling
|
[
"cpe:/a:redhat:jboss_enterprise_application_platform:7.2::el6"
] | null | 7.5 | 7.4 | null |
RHSA-2018:2543
|
Red Hat Security Advisory: openstack-keystone security update
|
openstack-keystone: Information Exposure through /v3/OS-FEDERATION/projects
|
[
"cpe:/a:redhat:openstack:10::el7"
] | null | null | 5.3 | null |
RHSA-2021:1301
|
Red Hat Security Advisory: java-1.8.0-openjdk security update
|
OpenJDK: Incomplete enforcement of JAR signing disabled algorithms (Libraries, 8249906)
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 5.3 | null | null |
RHSA-2014:1882
|
Red Hat Security Advisory: java-1.7.0-ibm security update
|
JDK: privilege escalation via shared class cache SSL/TLS: Padding Oracle On Downgraded Legacy Encryption attack JDK: unspecified vulnerability fixed in 6u85, 7u71 and 8u25 (Deployment) JDK: unspecified vulnerability fixed in 7u71 and 8u25 (Deployment) OpenJDK: Triple Handshake attack against TLS/SSL connections (JSSE, 8037066) JDK: unspecified vulnerability fixed in 6u85, 7u71 and 8u25 (Deployment) JDK: unspecified vulnerability fixed in 7u71 and 8u25 (Deployment) JDK: unspecified vulnerability fixed in 6u85, 7u71 and 8u25 (Deployment) JDK: unspecified vulnerability fixed in 6u85, 7u71 and 8u25 (Deployment) OpenJDK: LogRecord use of incorrect CL when loading ResourceBundle (Libraries, 8042797) JDK: unspecified vulnerability fixed in 6u85, 7u71 and 8u25 (Deployment) OpenJDK: insufficient permission checks when setting resource bundle on system logger (Libraries, 8041564) ICU: Layout Engine ContextualSubstitution missing boundary checks (JDK 2D, 8041540) OpenJDK: DatagramSocket connected socket missing source check (Libraries, 8039509) JDK: unspecified vulnerability fixed in 6u85, 7u71 and 8u25 (Deployment) JDK: unspecified vulnerability fixed in 7u71 and 8u25 (Deployment) OpenJDK: insufficient ResourceBundle name check (Libraries, 8044274) JDK: unspecified vulnerability fixed in 6u85, 7u71 and 8u25 (Deployment) OpenJDK: CipherInputStream incorrect exception handling (Security, 8037846)
|
[
"cpe:/a:redhat:rhel_extras:6"
] | null | null | null | null |
RHSA-2023:1367
|
Red Hat Security Advisory: firefox security update
|
Mozilla: Incorrect code generation during JIT compilation Mozilla: Potential out-of-bounds when accessing throttled streams Mozilla: Invalid downcast in Worklets Mozilla: URL being dragged from a removed cross-origin iframe into the same tab triggered navigation Mozilla: Memory safety bugs fixed in Firefox 111 and Firefox ESR 102.9
|
[
"cpe:/a:redhat:rhel_eus:8.6::appstream"
] | null | 8.8 | null | null |
RHSA-2024:6536
|
Red Hat Security Advisory: Red Hat AMQ Streams 2.5.2 release and security update
|
Apache-ZooKeeper: Apache ZooKeeper: Information disclosure in persistent watcher handling
|
[
"cpe:/a:redhat:amq_streams:2"
] | null | 6.6 | null | null |
RHSA-2016:0708
|
Red Hat Security Advisory: java-1.6.0-ibm security update
|
JDK: buffer overflow vulnerability in the IBM JVM JDK: insecure use of invoke method in CORBA component, incorrect CVE-2013-3009 fix JDK: insecure deserialization in CORBA, incorrect CVE-2013-5456 fix OpenJDK: insufficient thread consistency checks in ObjectInputStream (Serialization, 8129952) OpenJDK: insufficient byte type checks (Hotspot, 8132051) JDK: unspecified vulnerability fixed in 6u115, 7u101 and 8u91 (2D) OpenJDK: non-constant time GCM authentication tag comparison (JCE, 8143945) OpenJDK: unrestricted deserialization of authentication credentials (JMX, 8144430) JDK: unspecified vulnerability fixed in 6u115, 7u101 and 8u91 (2D) JDK: unspecified vulnerability fixed in 6u115, 7u101 and 8u91 (Deployment)
|
[
"cpe:/a:redhat:rhel_extras:5::client",
"cpe:/a:redhat:rhel_extras:5::server",
"cpe:/a:redhat:rhel_extras:6"
] | null | null | null | null |
RHSA-2024:7503
|
Red Hat Security Advisory: cups-filters security update
|
cups-filters: libcupsfilters: `cfGetPrinterAttributes` API does not perform sanitization on returned IPP attributes cups: libppd: remote command injection via attacker controlled data in PPD file cups-browsed: cups-browsed binds on UDP INADDR_ANY:631 trusting any packet from any source cups-browsed: cups-filters: cups-browsed vulnerable to DDoS amplification attack
|
[
"cpe:/a:redhat:rhel_eus:9.2::appstream",
"cpe:/a:redhat:rhel_eus:9.2::crb"
] | null | 7.5 | null | null |
RHSA-2008:0201
|
Red Hat Security Advisory: redhat-ds-admin security update
|
Server: shell command injection in CGI replication monitor Server: unrestricted access to CGI scripts
|
[
"cpe:/a:redhat:directory_server:8::el4",
"cpe:/a:redhat:directory_server:8::el5"
] | null | null | null | null |
RHSA-2022:0832
|
Red Hat Security Advisory: .NET 6.0 on RHEL 7 security and bugfix update
|
dotnet: ASP.NET Denial of Service via FormPipeReader dotnet: double parser stack buffer overrun
|
[
"cpe:/a:redhat:rhel_dotnet:6.0::el7"
] | null | 6.3 | null | null |
RHSA-2019:4101
|
Red Hat Security Advisory: OpenShift Container Platform 4.2 openshift-enterprise-builder-container security update
|
openshift: Container image TLS verification bypass
|
[
"cpe:/a:redhat:openshift:4.2::el7"
] | null | null | 5.7 | null |
RHSA-2008:0199
|
Red Hat Security Advisory: Red Hat Directory Server 7.1 Service Pack 5 security update
|
Server: shell command injection in CGI replication monitor
|
[
"cpe:/a:redhat:directory_server:7.1"
] | null | null | null | null |
RHSA-2013:1455
|
Red Hat Security Advisory: Red Hat Network Satellite server IBM Java Runtime security update
|
JDK: unspecified vulnerabilities fixed in 6u26 (Sound) JDK: unspecified vulnerabilities fixed in 6u26 (Sound) OpenJDK: integer overflows in JPEGImageReader and font SunLayoutEngine (2D, 7013519) JDK: unspecified vulnerability fixed in 6u26 (Deployment) OpenJDK: Deserialization allows creation of mutable SignedObject (Deserialization, 6618658) OpenJDK: NetworkInterface information leak (Networking, 7013969) OpenJDK: incorrect numeric type conversion in TransformHelper (2D, 7016495) OpenJDK: unprivileged proxy settings change via SOAPConnection (SAAJ, 7013971) OpenJDK: MediaTracker created Component instances with unnecessary privileges (Swing, 7020198) JDK: unspecified vulnerability fixed in 6u26 (2D) HTTPS: block-wise chosen-plaintext attack against SSL/TLS (BEAST) JDK: unspecified vulnerability fixed in 6u29 (Deployment) OpenJDK: IIOP deserialization code execution (Deserialization, 7055902) OpenJDK: missing SecurityManager checks in scripting engine (Scripting, 7046823) JDK: unspecified vulnerability fixed in 6u29 (Sound) JDK: unspecified vulnerability fixed in 6u29 (Deployment) OpenJDK: InputStream skip() information leak (Networking/IO, 7000600) OpenJDK: mutable static AWTKeyStroke.ctor (AWT, 7019773) JDK: unspecified vulnerability fixed in 6u29 (Swing) JDK: unspecified vulnerability fixed in 6u29 (AWT) OpenJDK: Java2D TransformHelper integer overflow (2D, 7023640) OpenJDK: excessive default UDP socket limit under SecurityManager (Networking, 7032417) OpenJDK: JAX-WS stack-traces information leak (JAX-WS, 7046794) OpenJDK: insufficient pack200 JAR files uncompress error checks (Runtime, 7057857) OpenJDK: RMI DGC server remote code execution (RMI, 7077466) OpenJDK: RMI registry privileged code execution (RMI, 7083012) OpenJDK: missing checkSetFactory calls in HttpsURLConnection (JSSE, 7096936) JDK: unspecified vulnerability fixed in 6u29 (Deployment) OpenJDK: JavaSound incorrect bounds check (Sound, 7088367) GlassFish: hash table collisions CPU usage DoS (oCERT-2011-003) OpenJDK: insufficient checking of the graphics rendering object (2D, 7112642) JDK: unspecified vulnerability fixed in 6u31 and 7u3 (2D) JDK: unspecified vulnerability fixed in 6u31 and 7u3 (2D) JDK: unspecified vulnerability fixed in 6u31 and 7u3 (Deployment) OpenJDK: off-by-one bug in ZIP reading code (JRE, 7118283) OpenJDK: KeyboardFocusManager focus stealing (AWT, 7110683) OpenJDK: unrestricted use of TimeZone.setDefault() (i18n, 7110687) OpenJDK: incomplete info in the deserialization exception (Serialization, 7110700) OpenJDK: mutable repository identifiers (CORBA, 7110704) OpenJDK: AtomicReferenceArray insufficient array type check (Concurrency, 7082299) OpenJDK: AWT hardening fixes (AWT, 7163201) JDK: unspecified vulnerability fixed in 6u33 and 7u5 (Deployment) JDK: unspecified vulnerability (2D) JDK: unspecified vulnerability (Deployment) JDK: unspecified vulnerability (Deployment) JDK: unspecified vulnerability fixed in 6u39 and 7u13 (Deployment) OpenJDK: beans ClassFinder insufficient permission checks (beans, 7162476) OpenJDK: fontmanager layout lookup code memory corruption (2D, 7143617) OpenJDK: SynthLookAndFeel application context bypass (Swing, 7143614) OpenJDK: insecure temporary file permissions (JRE, 7143606) OpenJDK: CRL and certificate extensions handling improvements (Security, 7143872) OpenJDK: mutable repository identifiers in generated stub code (CORBA, 7143851) JDK: unspecified vulnerability fixed in 6u33 and 7u5 (Deployment) JDK: unspecified vulnerability fixed in 6u33 and 7u5 (Deployment) OpenJDK: insufficient invokespecial <init> verification (HotSpot, 7160757) JDK: unspecified vulnerability (JMX) JDK: unspecified vulnerability (Deployment) JDK: unspecified vulnerability fixed in 6u39 and 7u13 (Scripting) OpenJDK: java.io.FilePermission information leak (Libraries, 6631398) JDK: unspecified vulnerability fixed in 6u39 and 7u13 (Deployment) JDK: java.lang.reflect.Method invoke() code execution JDK: java.lang.class code execution JDK: java.lang.ClassLoder defineClass() code execution OpenJDK: RhinoScriptEngine security bypass (Scripting, 7143535) OpenJDK: Executors state handling issues (Concurrency, 7189103) OpenJDK: DescriptorSupport insufficient package access checks (JMX, 7192975) OpenJDK: AccessController.doPrivilegedWithCombiner() information disclosure (Security, 7172522) OpenJDK: LogManager security bypass (Libraries, 7169884) OpenJDK: RMIConnectionImpl information disclosure (JMX, 7169888) OpenJDK: ServiceLoader reject not subtype classes without instantiating (Libraries, 7195919) OpenJDK: JSSE denial of service (JSSE, 7186286) JDK: unspecified vulnerability (2D) OpenJDK: DefaultFormatter insufficient data validation (Swing, 7195194) OpenJDK: RMIConnectionImpl insufficient access control checks (JMX, 7198296) SSL/TLS: CBC padding timing attack (lucky-13) JDK: unspecified vulnerability fixed in 6u39 and 7u13 (Deployment) OpenJDK: sun.awt.datatransfer.ClassLoaderObjectInputStream class may incorrectly invoke the system class loader (CanSecWest 2013, AWT, 8009305) JDK: unspecified vulnerability fixed in 6u39 and 7u13 (JMX) JDK: unspecified vulnerability fixed in 6u39 and 7u13 (Deployment) JDK: unspecified vulnerability fixed in 6u39 and 7u13 (Deployment) OpenJDK: RMI CGIHandler XSS issue (RMI, 6563318) OpenJDK: logging insufficient access control checks (Libraries, 6664509) OpenJDK: logging insufficient access control checks (Libraries, 6664528) OpenJDK: invalid threads subject to interrupts (Libraries, 6776941) OpenJDK: reflection API incorrect checks for proxy classes (Libraries, 7197546, SE-2012-01 Issue 29) OpenJDK: insufficient clipboard access premission checks (AWT, 7186952) OpenJDK: InetSocketAddress serialization issue (Networking, 7201071) OpenJDK: loadPropertyFile missing restrictions (JAXP, 8001235) OpenJDK: com.sun.xml.internal.* not restricted packages (JAX-WS, 7201068) JDK: unspecified vulnerability fixed in 6u39 and 7u13 (Deployment) OpenJDK: CPU consumption DoS via repeated SSL ClientHello packets (JSSE, 7192393) OpenJDK: missing serialization restriction (CORBA, 7201066) OpenJDK: insufficient privilege checking issue (AWT, 7192977) OpenJDK: insufficient Diffie-Hellman public key checks (JSSE, 7192392) OpenJDK: insufficient privilege checking issue (AWT, 8001057) JDK: unspecified vulnerability fixed in 6u39 and 7u13 (Deployment) OpenJDK: RequiredModelMBean missing access control context checks (JMX, 8000537) OpenJDK: Specially crafted sample model integer overflow (2D, 8007014) JDK: unspecified vulnerability fixed in 6u39 and 7u13 (Deployment) OpenJDK: missing ValueHandlerImpl class constructor access restriction (CORBA, 8000631) OpenJDK: image parser insufficient raster parameter checks (2D, 8001972) OpenJDK: image parser insufficient raster parameter checks (AWT, 8002325) JDK: unspecified vulnerability fixed in 6u39 (Sound) OpenJDK: MBeanServer insufficient privilege restrictions (JMX, 8006446) JDK: unspecified vulnerability fixed in 6u41 and 7u15 (Deployment) JDK: unspecified sanbox bypass (CanSecWest 2013, 2D) OpenJDK: CMM malformed raster memory corruption (2D, 8007675) OpenJDK: Insecure shared memory permissions (2D, 8001034) OpenJDK: remote code loading enabled by default (RMI, 8001040) JDK: unspecified vulnerability fixed in 7u21 and 6u45 (Deployment) OpenJDK: LogStream.setDefaultStream() missing security restrictions (RMI, 8001329) JDK: unspecified vulnerability fixed in 7u21 and 6u45 (Install) ICU: Layout Engine font layout and glyph table errors (JDK 2D, 8004994) OpenJDK: Frame injection in generated HTML (Javadoc, 8012375) ICU: Layout Engine font layout and glyph table errors (JDK 2D, 8004986) ICU: Layout Engine font layout and glyph table errors (JDK 2D, 8004987) JDK: unspecified vulnerability fixed in 7u21 and 6u45 (2D) OpenJDK: Integrate Apache Santuario, rework class loader (Libraries, 6741606, 8008744) OpenJDK: JConsole SSL support (Serviceability, 8003703) OpenJDK: Network InetAddress serialization information disclosure (Networking, 8000724) JDK: unspecified vulnerability fixed in 7u21 and 6u45 (Deployment) ICU: Layout Engine font processing errors (JDK 2D, 8001031) OpenJDK: image processing vulnerability (2D, 8007617) OpenJDK: MethodUtil trampoline class incorrect restrictions (Libraries, 8009857) OpenJDK: MBeanInstantiator insufficient class access checks (JMX, 8006435) OpenJDK: JPEGImageWriter state corruption (ImageIO, 8007918) OpenJDK: JPEGImageReader state corruption (ImageIO, 8007667) JDK: unspecified vulnerability fixed in 7u21 and 6u45 (2D) JDK: unspecified vulnerability fixed in 7u21 and 6u45 (Deployment) JDK: unspecified vulnerability fixed in 7u21 and 6u45 (Deployment) JDK: unspecified vulnerability fixed in 7u25 (Deployment) JDK: unspecified vulnerability fixed in 7u21 and 6u45 (Deployment) JDK: unspecified vulnerability fixed in 7u25 (Deployment) OpenJDK: AccessControlContext check order issue (Libraries, 8001330) OpenJDK: Resource denial of service (AWT, 8001038) OpenJDK: output stream access restrictions (CORBA, 8000642) OpenJDK: Prevent revealing the local address (Networking, 8001318) OpenJDK: Better access restrictions (Sound, 8006328) OpenJDK: ObjectStreamClass circular reference denial of service (Serialization, 8000638) OpenJDK: exclusive port binding (Networking, 7170730) OpenJDK: Unique VMIDs (Libraries, 8001033) OpenJDK: MBeanServer Introspector package access (JMX, 8008124) OpenJDK: SerialJavaObject package restriction (JDBC, 8009554) OpenJDK: getEnclosing* checks (Libraries, 8007812) OpenJDK: ObjectOutputStream access checks (Serialization, 8008132) OpenJDK: Proper class checking (JMX, 8008120) OpenJDK: Various AWT integer overflow checks (AWT, 8009071) OpenJDK: Incorrect image attribute verification (2D, 8012438) JDK: unspecified vulnerability fixed in 7u25 (2D) OpenJDK: Incorrect image channel verification (2D, 8012597) JDK: unspecified vulnerability fixed in 7u25 (Deployment) JDK: unspecified vulnerability fixed in 7u25 (Deployment) OpenJDK: Incorrect image layout verification (2D, 8012601) OpenJDK: ImagingLib byte lookup processing (2D, 8011243) OpenJDK: Incorrect IntegerComponentRaster size checks (2D, 8011248) OpenJDK: Incorrect ShortBandedRaster size checks (2D, 8011253) OpenJDK: Incorrect ByteBandedRaster size checks (2D, 8011257) JDK: unspecified vulnerability fixed in 6u51 and 5u51 (AWT)
|
[
"cpe:/a:redhat:network_satellite:5.4::el5",
"cpe:/a:redhat:network_satellite:5.4::el6"
] | null | null | null | null |
RHSA-2024:3950
|
Red Hat Security Advisory: firefox security update
|
Mozilla: Use-after-free in JavaScript object transplant Mozilla: External protocol handlers leaked by timing attack Mozilla: Sandboxed iframes were able to bypass sandbox restrictions to open a new window Mozilla: Cross-Origin Image leak via Offscreen Canvas Mozilla: Memory Corruption in Text Fragments Mozilla: Memory safety bugs fixed in Firefox 127, Firefox ESR 115.12, and Thunderbird 115.12 Mozilla: Use-after-free in networking
|
[
"cpe:/a:redhat:rhel_eus:8.8::appstream"
] | null | 7.5 | null | null |
RHSA-2024:1063
|
Red Hat Security Advisory: edk2 security update
|
edk2: Buffer overflow in the DHCPv6 client via a long Server ID option edk2: Buffer overflow when processing DNS Servers option in a DHCPv6 Advertise message
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 8.8 | null | null |
RHSA-2023:7610
|
Red Hat Security Advisory: OpenShift Container Platform 4.12.45 packages and security update
|
HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack) python-werkzeug: high resource consumption leading to denial of service
|
[
"cpe:/a:redhat:openshift:4.12::el8",
"cpe:/a:redhat:openshift:4.12::el9",
"cpe:/a:redhat:openshift_ironic:4.12::el9"
] | null | 7.5 | null | null |
RHSA-2019:4168
|
Red Hat Security Advisory: kernel security and bug fix update
|
kernel: brcmfmac heap buffer overflow in brcmf_wowl_nd_results
|
[
"cpe:/o:redhat:enterprise_linux:7::hypervisor",
"cpe:/o:redhat:rhel_eus:7.6::computenode",
"cpe:/o:redhat:rhel_eus:7.6::server"
] | null | null | 6.5 | null |
RHSA-2023:3589
|
Red Hat Security Advisory: firefox security update
|
Mozilla: Click-jacking certificate exceptions through rendering lag Mozilla: Memory safety bugs fixed in Firefox 114 and Firefox ESR 102.12
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 9.8 | null | null |
RHSA-2023:0818
|
Red Hat Security Advisory: thunderbird security update
|
Mozilla: User Interface lockup with messages combining S/MIME and OpenPGP Mozilla: Content security policy leak in violation reports using iframes Mozilla: Extensions could have opened external schemes without user knowledge Mozilla: Screen hijack via browser fullscreen mode Mozilla: Out of bounds memory write from EncodeInputStream Mozilla: Potential use-after-free from compartment mismatch in SpiderMonkey Mozilla: Invalid downcast in SVGUtils::SetupStrokeGeometry Mozilla: Use-after-free in mozilla::dom::ScriptLoadContext::~ScriptLoadContext Mozilla: Web Crypto ImportKey crashes tab Mozilla: Fullscreen notification not shown in Firefox Focus Mozilla: Memory safety bugs fixed in Firefox 110 and Firefox ESR 102.8 Mozilla: Memory safety bugs fixed in Firefox ESR 102.8
|
[
"cpe:/a:redhat:rhel_e4s:8.1::appstream"
] | null | 8.8 | null | null |
RHSA-2019:0717
|
Red Hat Security Advisory: kernel security and bug fix update
|
kernel: Missing check in fs/inode.c:inode_init_owner() does not clear SGID bit on non-directories for non-members
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | 4.4 | null |
RHSA-2022:6038
|
Red Hat Security Advisory: .NET 6.0 security, bug fix, and enhancement update
|
dotnet: External Entity Injection during XML signature verification
|
[
"cpe:/a:redhat:rhel_dotnet:6.0::el7"
] | null | 5.9 | null | null |
RHSA-2015:1539
|
Red Hat Security Advisory: Red Hat JBoss BPM Suite 6.1.2 update
|
Camel: XXE in via SAXSource expansion Camel: XXE via XPath expression evaluation dashbuilder: XXE/SSRF vulnerability
|
[
"cpe:/a:redhat:jboss_bpms:6.0"
] | null | null | null | null |
RHSA-2015:0260
|
Red Hat Security Advisory: libyaml security update
|
libyaml: assert failure when processing wrapped strings
|
[
"cpe:/a:redhat:openstack:4::el6",
"cpe:/a:redhat:openstack:5::el6"
] | null | null | null | null |
RHSA-2005:283
|
Red Hat Security Advisory: kernel security update
|
security flaw security flaw security flaw security flaw
|
[
"cpe:/o:redhat:enterprise_linux:2.1::as",
"cpe:/o:redhat:enterprise_linux:2.1::es",
"cpe:/o:redhat:enterprise_linux:2.1::ws"
] | null | null | null | null |
RHSA-2016:1267
|
Red Hat Security Advisory: setroubleshoot and setroubleshoot-plugins security update
|
setroubleshoot-plugins: insecure commands.getstatusoutput use in the allow_execmod plugin setroubleshoot: insecure use of commands.getstatusoutput in sealert setroubleshoot-plugins: insecure commands.getoutput use in the allow_execstack plugin setroubleshoot: command injection issues
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2018:2741
|
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 6.4.21 security update
|
keycloak: SAML request parser replaces special strings with system properties hibernate-validator: Privilege escalation when running under the security manager tomcat: A bug in the UTF-8 decoder can lead to DoS guava: Unbounded memory allocation in AtomicDoubleArray and CompoundOrdering classes allow remote attackers to cause a denial of service
|
[
"cpe:/a:redhat:jboss_enterprise_application_platform:6::el7"
] | null | null | 5.9 | null |
RHSA-2019:1106
|
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.2.1 security update
|
jackson-databind: Potential information exfiltration with default typing, serialization gadget from MyBatis jackson-databind: improper polymorphic deserialization of types from Jodd-db library jackson-databind: improper polymorphic deserialization of types from Oracle JDBC driver undertow: Infoleak in some circumstances where Undertow can serve data from a random buffer jackson-databind: exfiltration/XXE in some JDK classes jackson-databind: server-side request forgery (SSRF) in axis2-jaxws class wildfly: Race condition on PID file allows for termination of arbitrary processes by local users wildfly: wrong SecurityIdentity for EE concurrency threads that are reused
|
[
"cpe:/a:redhat:jboss_enterprise_application_platform:7.2"
] | null | null | 5.4 | null |
RHSA-2022:1263
|
Red Hat Security Advisory: RHV-H security update (redhat-virtualization-host) 4.3.22
|
kernel: Use After Free in unix_gc() which could result in a local privilege escalation kernel: use-after-free in RDMA listen() kernel: fget: check that the fd still exists after getting a ref to it kernel: xfs: raw block device data leak in XFS_IOC_ALLOCSP IOCTL aide: heap-based buffer overflow on outputs larger than B64_BUF kernel: possible privileges escalation due to missing TLB flush openssl: Infinite loop in BN_mod_sqrt() reachable when parsing certificates kernel: failing usercopy allows for use-after-free exploitation cyrus-sasl: failure to properly escape SQL input allows an attacker to execute arbitrary SQL commands expat: Malformed 2- and 3-byte UTF-8 sequences can lead to arbitrary code execution expat: Namespace-separator characters in "xmlns[:prefix]" attribute values can lead to arbitrary code execution expat: Integer overflow in storeRawNames()
|
[
"cpe:/o:redhat:enterprise_linux:7::hypervisor"
] | null | 9.8 | null | null |
RHSA-2021:5080
|
Red Hat Security Advisory: mailman:2.1 security update
|
mailman: CSRF token bypass allows to perform CSRF attacks and admin takeover
|
[
"cpe:/a:redhat:rhel_eus:8.2::appstream"
] | null | 8 | null | null |
RHSA-2013:0699
|
Red Hat Security Advisory: ruby193-rubygem-activerecord security update
|
rubygem-activerecord: attribute_dos Symbol DoS vulnerability
|
[
"cpe:/a:redhat:openshift:1::el6"
] | null | null | null | null |
RHSA-2024:4936
|
Red Hat Security Advisory: freeradius:3.0 security update
|
freeradius: forgery attack
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 9 | null | null |
RHSA-2021:2099
|
Red Hat Security Advisory: kpatch-patch security update
|
kernel: use after free in eventpoll.c may lead to escalation of privilege kernel: SCSI target (LIO) write to any block on ILO backstore kernel: Use after free via PI futex state
|
[
"cpe:/o:redhat:rhel_eus:8.1::baseos"
] | null | 7 | null | null |
RHSA-2012:1445
|
Red Hat Security Advisory: kernel security and bug fix update
|
kernel: ext4: fix inconsistency in ext4_fill_flex_info()
|
[
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2011:1084
|
Red Hat Security Advisory: libsndfile security update
|
libsndfile: Application crash due integer overflow by processing certain PAF audio files
|
[
"cpe:/o:redhat:enterprise_linux:6::server"
] | null | null | null | null |
RHSA-2010:0584
|
Red Hat Security Advisory: jbossweb security update
|
tomcat: information disclosure in authentication headers tomcat: information leak vulnerability in the handling of 'Transfer-Encoding' header
|
[
"cpe:/a:redhat:jboss_enterprise_application_platform:4.2.0::el4",
"cpe:/a:redhat:jboss_enterprise_application_platform:4.2.0::el5",
"cpe:/a:redhat:jboss_enterprise_application_platform:4.3.0::el4",
"cpe:/a:redhat:jboss_enterprise_application_platform:4.3.0::el5"
] | null | null | null | null |
RHSA-2022:1039
|
Red Hat Security Advisory: Red Hat OpenShift GitOps security update
|
Openshift-Gitops: Improper access control allows admin privilege escalation argocd: path traversal and improper access control allows leaking out-of-bound files argocd: path traversal allows leaking out-of-bound files
|
[
"cpe:/a:redhat:openshift_gitops:1.2::el8"
] | null | 6.8 | null | null |
RHSA-2020:3183
|
Red Hat Security Advisory: OpenShift Container Platform 4.3.31 openshift security update
|
kubernetes: node localhost services reachable via martian packets
|
[
"cpe:/a:redhat:openshift:4.3::el7",
"cpe:/a:redhat:openshift:4.3::el8"
] | null | 5.4 | null | null |
RHSA-2013:1319
|
Red Hat Security Advisory: sssd security and bug fix update
|
sssd: TOCTOU race conditions by copying and removing directory trees
|
[
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2024:5327
|
Red Hat Security Advisory: firefox security update
|
mozilla: Fullscreen notification dialog can be obscured by document content mozilla: Out of bounds memory access in graphics shared memory handling mozilla: Type confusion in WebAssembly mozilla: Incomplete WebAssembly exception handing mozilla: Out of bounds read in editor component mozilla: CSP strict-dynamic bypass using web-compatibility shims mozilla: Missing permission check when creating a StreamFilter mozilla: Uninitialized memory used by WebGL mozilla: Use-after-free in JavaScript garbage collection mozilla: Use-after-free in IndexedDB mozilla: Document content could partially obscure security prompts
|
[
"cpe:/a:redhat:rhel_e4s:9.0::appstream"
] | null | 6.1 | null | null |
RHSA-2022:1626
|
Red Hat Security Advisory: Red Hat AMQ Broker 7.8.6 release and security update
|
spring-framework: RCE via Data Binding on JDK 9+
|
[
"cpe:/a:redhat:amq_broker:7"
] | null | 8.1 | null | null |
RHSA-2003:013
|
Red Hat Security Advisory: cvs security update
|
security flaw
|
[
"cpe:/o:redhat:enterprise_linux:2.1::as",
"cpe:/o:redhat:enterprise_linux:2.1::aw"
] | null | null | null | null |
RHSA-2015:1512
|
Red Hat Security Advisory: qemu-kvm-rhev security update
|
qemu/kvm: i8254: out-of-bounds memory access in pit_ioport_read function qemu: ide: atapi: heap overflow during I/O buffer memory access
|
[
"cpe:/a:redhat:openstack:5::el7",
"cpe:/a:redhat:openstack:6::el7"
] | null | null | null | null |
RHSA-2009:1681
|
Red Hat Security Advisory: gpdf security update
|
xpdf: buffer overflow in FoFiType1::parse
|
[
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2024:0466
|
Red Hat Security Advisory: python3.9 security update
|
python: Parsing errors in email/_parseaddr.py lead to incorrect value in email address part of tuple
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::crb",
"cpe:/o:redhat:enterprise_linux:9::baseos"
] | null | 5.3 | null | null |
RHSA-2017:3493
|
Red Hat Security Advisory: Red Hat Enterprise MRG for Red Hat Enterprise Linux 6 6-month Notice
|
This is the 6-month notification for the retirement of Red Hat Enterprise MRG Version 2 for Red Hat Enterprise Linux 6.
This notification applies only to those customers subscribed to Red Hat Enterprise MRG Version 2 for Red Hat Enterprise Linux 6.
|
[
"cpe:/a:redhat:enterprise_mrg:2:computenode:el6",
"cpe:/a:redhat:enterprise_mrg:2:server:el6"
] | null | null | null | null |
RHSA-2023:2655
|
Red Hat Security Advisory: nodejs and nodejs-nodemon security, bug fix, and enhancement update
|
glob-parent: Regular Expression Denial of Service c-ares: buffer overflow in config_sortlist() due to missing string length check http-cache-semantics: Regular Expression Denial of Service (ReDoS) vulnerability Node.js: Permissions policies can be bypassed via process.mainModule Node.js: insecure loading of ICU data through ICU_DATA environment variable Node.js: Fetch API did not protect against CRLF injection in host headers Node.js: Regular Expression Denial of Service in Headers fetch API
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 7.5 | null | null |
RHSA-2013:0679
|
Red Hat Security Advisory: jakarta-commons-httpclient security update
|
jakarta-commons-httpclient: missing connection hostname check against X.509 certificate name
|
[
"cpe:/a:redhat:jboss_enterprise_application_platform:5.2.0"
] | null | null | 3.7 | null |
RHSA-2024:1877
|
Red Hat Security Advisory: kernel security and bug fix update
|
hw: cpu: AMD CPUs may transiently execute beyond unconditional direct branch kernel: veth: ensure skb entering GRO are not cloned. kernel: use-after-free and memory errors in ext4 when mounting and operating on a corrupted image kernel: NULL pointer dereference in x86_emulate_insn may lead to DoS kernel: use after free flaw in l2cap_conn_del in net/bluetooth/l2cap_core.c kernel: Information leak in l2cap_parse_conf_req in net/bluetooth/l2cap_core.c
|
[
"cpe:/a:redhat:rhel_eus:8.6::crb",
"cpe:/o:redhat:rhel_eus:8.6::baseos",
"cpe:/o:redhat:rhev_hypervisor:4.4::el8"
] | null | 6.5 | null | null |
RHSA-2024:1346
|
Red Hat Security Advisory: Red Hat OpenShift GitOps security update
|
argo-cd: XSS vulnerability in application summary component
|
[
"cpe:/a:redhat:openshift_gitops:1.11::el8"
] | null | 8.9 | null | null |
RHSA-2012:0426
|
Red Hat Security Advisory: openssl security and bug fix update
|
openssl: CMS and PKCS#7 Bleichenbacher attack openssl: mime_param_cmp NULL dereference crash
|
[
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server",
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2005:103
|
Red Hat Security Advisory: perl security update
|
security flaw security flaw security flaw
|
[
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHBA-2016:1343
|
Red Hat Bug Fix Advisory: Red Hat OpenShift Enterprise 3.2.1.1 bug fix and enhancement update
|
nodejs-node-uuid: insecure entropy source - Math.random()
|
[
"cpe:/a:redhat:openshift:3.2::el7"
] | null | null | null | null |
RHSA-2022:4940
|
Red Hat Security Advisory: xz security update
|
gzip: arbitrary-file-write vulnerability
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/o:redhat:enterprise_linux:9::baseos"
] | null | 8.8 | null | null |
RHSA-2020:4236
|
Red Hat Security Advisory: kernel security and bug fix update
|
kernel: use-after-free caused by a malicious USB device in the drivers/hid/usbhid/hiddev.c driver
|
[
"cpe:/o:redhat:rhel_eus:7.7::computenode",
"cpe:/o:redhat:rhel_eus:7.7::server"
] | null | 6.8 | null | null |
RHSA-2021:2467
|
Red Hat Security Advisory: glib2 security update
|
glib: integer overflow in g_bytes_new function on 64-bit platforms due to an implicit cast from 64 bits to 32 bits
|
[
"cpe:/o:redhat:rhel_els:6"
] | null | 9.8 | null | null |
RHSA-2010:0119
|
Red Hat Security Advisory: JBoss Enterprise Web Server 1.0.1 update
|
tomcat: unexpected file deletion and/or alteration tomcat: unexpected file deletion in work directory TLS: MITM attacks via session renegotiation MyFaces: XSS via state view
|
[
"cpe:/a:redhat:jboss_enterprise_web_server:1::el4",
"cpe:/a:redhat:jboss_enterprise_web_server:1::el5"
] | null | null | null | null |
RHSA-2025:0522
|
Red Hat Security Advisory: Red Hat OpenShift distributed tracing platform (Jaeger) 3.4 release
|
golang.org/x/crypto/ssh: Misuse of ServerConfig.PublicKeyCallback may cause authorization bypass in golang.org/x/crypto golang.org/x/net/html: Non-linear parsing of case-insensitive content in golang.org/x/net/html
|
[
"cpe:/a:redhat:openshift_distributed_tracing:3.4::el8"
] | null | 7.5 | null | null |
RHSA-2024:5000
|
Red Hat Security Advisory: python-setuptools security update
|
pypa/setuptools: Remote code execution via download functions in the package_index module in pypa/setuptools
|
[
"cpe:/o:redhat:rhel_eus:8.8::baseos"
] | null | 8.8 | null | null |
RHSA-2024:10733
|
Red Hat Security Advisory: thunderbird security update
|
thunderbird: Potential disclosure of plaintext in OpenPGP encrypted message firefox: thunderbird: Select list elements could be shown over another site firefox: thunderbird: CSP Bypass and XSS Exposure via Web Compatibility Shims firefox: thunderbird: URL Bar Spoofing via Manipulated Punycode and Whitespace Characters firefox: thunderbird: Unhandled Exception in Add-on Signature Verification firefox: thunderbird: Improper Keypress Handling in Executable File Confirmation Dialog firefox: thunderbird: Memory safety bugs fixed in Firefox 133, Thunderbird 133, Firefox ESR 128.5, and Thunderbird 128.5
|
[
"cpe:/a:redhat:rhel_aus:8.4::appstream",
"cpe:/a:redhat:rhel_e4s:8.4::appstream",
"cpe:/a:redhat:rhel_tus:8.4::appstream"
] | null | 8.8 | null | null |
RHSA-2016:0702
|
Red Hat Security Advisory: java-1.7.0-ibm security update
|
JDK: buffer overflow vulnerability in the IBM JVM JDK: insecure use of invoke method in CORBA component, incorrect CVE-2013-3009 fix JDK: insecure deserialization in CORBA, incorrect CVE-2013-5456 fix OpenJDK: insufficient thread consistency checks in ObjectInputStream (Serialization, 8129952) OpenJDK: insufficient byte type checks (Hotspot, 8132051) JDK: unspecified vulnerability fixed in 6u115, 7u101 and 8u91 (2D) OpenJDK: non-constant time GCM authentication tag comparison (JCE, 8143945) OpenJDK: unrestricted deserialization of authentication credentials (JMX, 8144430) JDK: unspecified vulnerability fixed in 6u115, 7u101 and 8u91 (2D) JDK: unspecified vulnerability fixed in 6u115, 7u101 and 8u91 (Deployment)
|
[
"cpe:/a:redhat:rhel_extras:5::client",
"cpe:/a:redhat:rhel_extras:5::server"
] | null | null | null | null |
RHSA-2018:1427
|
Red Hat Security Advisory: docker-latest in the Extras channel - deprecation notice
|
The docker-latest package has been deprecated in the Red Hat Enterprise Linux 7 Extras channel.
|
[
"cpe:/a:redhat:rhel_extras_other:7"
] | null | null | null | null |
RHSA-2020:2505
|
Red Hat Security Advisory: curl security update
|
curl: TFTP receive heap buffer overflow in tftp_receive_packet() function
|
[
"cpe:/o:redhat:rhel_eus:7.7::computenode",
"cpe:/o:redhat:rhel_eus:7.7::server"
] | null | 7 | null | null |
RHSA-2019:0462
|
Red Hat Security Advisory: java-1.7.0-openjdk security update
|
OpenJDK: memory disclosure in FileChannelImpl (Libraries, 8206290)
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | 3.1 | null |
RHSA-2022:4774
|
Red Hat Security Advisory: thunderbird security update
|
Mozilla: Untrusted input used in JavaScript object indexing, leading to prototype pollution Mozilla: Prototype pollution in Top-Level Await implementation
|
[
"cpe:/a:redhat:rhel_eus:8.4::appstream"
] | null | null | 8.8 | null |
RHSA-2022:0266
|
Red Hat Security Advisory: polkit security update
|
polkit: Local privilege escalation in pkexec due to incorrect handling of argument vector
|
[
"cpe:/o:redhat:rhel_eus:8.4::baseos"
] | null | 7.8 | null | null |
RHSA-2022:1646
|
Red Hat Security Advisory: Red Hat OpenStack Platform 16.1 (python-twisted) security update
|
python-twisted: possible http request smuggling
|
[
"cpe:/a:redhat:openstack:16.1::el8"
] | null | 8.1 | null | null |
RHSA-2023:3354
|
Red Hat Security Advisory: Red Hat JBoss Core Services Apache HTTP Server 2.4.51 SP2 security update
|
httpd: mod_dav: out-of-bounds read/write of zero byte openssl: timing attack in RSA Decryption implementation openssl: double free after calling PEM_read_bio_ex apr-util: out-of-bounds writes in the apr_base64 curl: HSTS bypass via IDN curl: Use-after-free triggered by an HTTP proxy deny response openssl: use-after-free following BIO_new_NDEF openssl: X.400 address type confusion in X.509 GeneralName curl: HSTS ignored on multiple requests curl: HSTS amnesia with --parallel curl: HTTP multi-header compression denial of service httpd: HTTP request splitting with mod_rewrite and mod_proxy curl: TELNET option IAC injection curl: SFTP path ~ resolving discrepancy
|
[
"cpe:/a:redhat:jboss_core_services:1::el7",
"cpe:/a:redhat:jboss_core_services:1::el8"
] | null | 3.7 | null | null |
RHSA-2022:0815
|
Red Hat Security Advisory: firefox security update
|
expat: Malformed 2- and 3-byte UTF-8 sequences can lead to arbitrary code execution expat: Namespace-separator characters in "xmlns[:prefix]" attribute values can lead to arbitrary code execution expat: Integer overflow in storeRawNames() Mozilla: Use-after-free in text reflows Mozilla: Browser window spoof using fullscreen mode Mozilla: iframe allow-scripts sandbox bypass Mozilla: Temporary files downloaded to /tmp and accessible by other local users Mozilla: Time-of-check time-of-use bug when verifying add-on signatures Mozilla: Use-after-free in XSLT parameter processing Mozilla: Use-after-free in WebGPU IPC Framework
|
[
"cpe:/a:redhat:rhel_e4s:8.1::appstream"
] | null | 8.8 | 7.5 | null |
RHSA-2016:0506
|
Red Hat Security Advisory: python-django security update
|
python-django: Malicious redirect and possible XSS attack via user-supplied redirect URLs containing basic auth python-django: User enumeration through timing difference on password hasher work factor upgrade
|
[
"cpe:/a:redhat:openstack:5::el7"
] | null | null | null | null |
RHSA-2020:0577
|
Red Hat Security Advisory: thunderbird security update
|
Mozilla: Message ID calculation was based on uninitialized data Mozilla: Out-of-bounds read when processing certain email messages Mozilla: Setting a master password post-Thunderbird 52 does not delete unencrypted previously stored passwords Mozilla: Crash processing S/MIME messages with multiple signatures Mozilla: Incorrect parsing of template tag could result in JavaScript injection Mozilla: Memory safety bugs fixed in Firefox 73 and Firefox ESR 68.5
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 8.8 | 6.1 | null |
RHSA-2021:3207
|
Red Hat Security Advisory: Red Hat Integration Camel Quarkus Tech-Preview 2 security update
|
activemq: improper authentication allows MITM attack apache-flink: directory traversal attack allows remote file writing through the REST API groovy: OS temporary directory leads to information disclosure cron-utils: template injection allows attackers to inject arbitrary Java EL expressions leading to remote code execution californium-core: DTLS - DoS vulnerability for certificate based handshakes undertow: special character in query results in server errors kotlin: vulnerable Java API was used for temporary file and folder creation which could result in information disclosure fabric8-kubernetes-client: vulnerable to a path traversal leading to integrity and availability compromise
|
[
"cpe:/a:redhat:camel_quarkus:2"
] | null | 7.4 | null | null |
RHSA-2024:0320
|
Red Hat Security Advisory: xorg-x11-server security update
|
xorg-x11-server: Heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer xorg-x11-server: reattaching to different master device may lead to out-of-bounds memory access xorg-x11-server: SELinux unlabeled GLX PBuffer xorg-x11-server: SELinux context corruption xorg-x11-server: heap buffer overflow in XISendDeviceHierarchyEvent xorg-x11-server: heap buffer overflow in DisableDevice
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 7.8 | null | null |
RHSA-2024:4101
|
Red Hat Security Advisory: samba security update
|
samba: infinite loop in mdssvc RPC service for spotlight
|
[
"cpe:/a:redhat:rhel_eus:9.2::appstream",
"cpe:/a:redhat:rhel_eus:9.2::crb",
"cpe:/a:redhat:rhel_eus:9.2::resilientstorage",
"cpe:/o:redhat:rhel_eus:9.2::baseos"
] | null | 7.5 | null | null |
RHSA-2020:3329
|
Red Hat Security Advisory: Red Hat Ansible Tower 3.6.5-1 - RHEL7 Container
|
Tower: SSRF: Server Side Request Forgery on Credential
|
[
"cpe:/a:redhat:ansible_tower:3.6::el7"
] | null | 5.5 | null | null |
RHSA-2015:0323
|
Red Hat Security Advisory: libvirt security, bug fix, and enhancement update
|
libvirt: local denial of service in qemu/qemu_driver.c libvirt: missing ACL check for the VIR_DOMAIN_XML_SECURE flag in save images and snapshots objects
|
[
"cpe:/a:redhat:storage:3.1:server:el7",
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::hypervisor",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | null | null |
RHSA-2014:1997
|
Red Hat Security Advisory: kernel security and bug fix update
|
Kernel: net: guard tcp_set_keepalive against crash kernel: sctp: skb_over_panic when receiving malformed ASCONF chunks kernel: net: sctp: fix panic on duplicate ASCONF chunks kernel: net: sctp: remote memory pressure from excessive queueing kernel: isofs: unbound recursion when processing relocated directories kernel: isofs: unbound recursion when processing relocated directories kernel: udf: Avoid infinite loop when processing indirect ICBs kernel: x86: local privesc due to bad_iret and paranoid entry incompatibility
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | 8.4 | null |
RHSA-2022:8750
|
Red Hat Security Advisory: OpenShift Virtualization 4.11.1 security and bug fix update
|
golang: out-of-bounds read in golang.org/x/text/language leads to DoS golang: encoding/pem: fix stack overflow in Decode golang: regexp: stack exhaustion via a deeply nested expression golang: crypto/elliptic: panic caused by oversized scalar golang: crypto/tls: session tickets lack random ticket_age_add
|
[
"cpe:/a:redhat:container_native_virtualization:4.11::el8"
] | null | 3.1 | null | null |
RHSA-2021:4614
|
Red Hat Security Advisory: Red Hat JBoss Core Services Apache HTTP Server 2.4.37 SP10 security update
|
httpd: mod_proxy_wstunnel tunneling of non Upgraded connection pcre: Buffer over-read in JIT when UTF is disabled and \X or \R has fixed quantifier greater than 1 httpd: mod_proxy NULL pointer dereference pcre: Integer overflow when parsing callout numeric arguments httpd: Single zero byte stack overflow in mod_auth_digest JBCS: URL normalization issue with dot-dot-semicolon(s) leads to information disclosure openssl: Read buffer overruns processing ASN.1 strings openssl: integer overflow in CipherUpdate openssl: NULL pointer dereference in X509_issuer_and_serial_hash() httpd: mod_session: NULL pointer dereference when parsing Cookie header httpd: mod_session: Heap overflow via a crafted SessionHeader value httpd: Unexpected URL matching with 'MergeSlashes OFF' httpd: NULL pointer dereference via malformed requests
|
[
"cpe:/a:redhat:jboss_core_services:1::el7",
"cpe:/a:redhat:jboss_core_services:1::el8"
] | null | 7.5 | null | null |
RHSA-2021:4848
|
Red Hat Security Advisory: Migration Toolkit for Containers (MTC) 1.5.2 security update and bugfix advisory
|
nodejs-immer: prototype pollution may lead to DoS or remote code execution mig-controller: incorrect namespaces handling may lead to not authorized usage of Migration Toolkit for Containers (MTC)
|
[
"cpe:/a:redhat:rhmt:1.5::el7",
"cpe:/a:redhat:rhmt:1.5::el8"
] | null | 6.3 | null | null |
RHSA-2024:0955
|
Red Hat Security Advisory: firefox security update
|
Mozilla: Out-of-bounds memory read in networking channels Mozilla: Alert dialog could have been spoofed on another site Mozilla: Fullscreen Notification could have been hidden by select element Mozilla: Custom cursor could obscure the permission dialog Mozilla: Mouse cursor re-positioned unexpectedly could have led to unintended permission grants Mozilla: Multipart HTTP Responses would accept the Set-Cookie header in response parts Mozilla: Incorrect code generation on 32-bit ARM devices Mozilla: Memory safety bugs fixed in Firefox 123, Firefox ESR 115.8, and Thunderbird 115.8
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 7.5 | null | null |
RHSA-2023:3622
|
Red Hat Security Advisory: jenkins and jenkins-2-plugins security update
|
maven-shared-utils: Command injection via Commandline class plugin: CSRF vulnerability in Blue Ocean Plugin plugin: missing permission checks in Blue Ocean Plugin json-smart: Uncontrolled Resource Consumption vulnerability in json-smart (Resource Exhaustion) jettison: Uncontrolled Recursion in JSONArray springframework: Security Bypass With Un-Prefixed Double Wildcard Pattern springframework: Spring Expression DoS Vulnerability Jenkins: Temporary file parameter created with insecure permissions Jenkins: Information disclosure through error stack traces related to agents
|
[
"cpe:/a:redhat:ocp_tools:4.13::el8"
] | null | 5.3 | null | null |
RHSA-2021:0996
|
Red Hat Security Advisory: thunderbird security update
|
Mozilla: Angle graphics library out of date Mozilla: Texture upload into an unbound backing buffer resulted in an out-of-bound read Mozilla: Internal network hosts could have been probed by a malicious webpage Mozilla: Malicious extensions could have spoofed popup information Mozilla: Memory safety bugs fixed in Firefox 87 and Firefox ESR 78.9
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 8.8 | 6.1 | null |
RHSA-2023:0408
|
Red Hat Security Advisory: OpenShift Virtualization 4.12.0 Images security update
|
golang: out-of-bounds read in golang.org/x/text/language leads to DoS golang: net/http: limit growth of header canonicalization cache golang: syscall: don't close fd 0 on ForkExec error golang: net/http: improper sanitization of Transfer-Encoding header kubeVirt: Arbitrary file read on the host from KubeVirt VMs golang: go/parser: stack exhaustion in all Parse* functions golang: math/big: uncontrolled memory consumption due to an unhandled overflow via Rat.SetString golang: cmd/go: misinterpretation of branch names can lead to incorrect access control golang: crypto/elliptic: IsOnCurve returns true for invalid field elements golang: encoding/xml: stack exhaustion in Decoder.Skip golang: syscall: faccessat checks wrong group golang: crypto/tls: session tickets lack random ticket_age_add golang: io/fs: stack exhaustion in Glob golang: compress/gzip: stack exhaustion in Reader.Read golang: path/filepath: stack exhaustion in Glob golang: encoding/xml: stack exhaustion in Unmarshal golang: encoding/gob: stack exhaustion in Decoder.Decode golang: net/http/httputil: NewSingleHostReverseProxy - omit X-Forwarded-For not working
|
[
"cpe:/a:redhat:container_native_virtualization:4.12::el8"
] | null | 6.5 | null | null |
RHSA-2007:0406
|
Red Hat Security Advisory: openoffice.org security update
|
openoffice.org rtf filter buffer overflow
|
[
"cpe:/a:redhat:rhel_productivity:5",
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws",
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws",
"cpe:/o:redhat:enterprise_linux:5::client"
] | null | null | null | null |
RHSA-2013:0215
|
Red Hat Security Advisory: abrt and libreport security update
|
abrt: Arbitrary Python code execution due improper sanitization of the PYTHONPATH environment variable by installing debuginfo packages into cache abrt: Race condition in abrt-action-install-debuginfo
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2013:1752
|
Red Hat Security Advisory: 389-ds-base security update
|
389-ds-base: DoS due to improper handling of ger attr searches
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2024:0217
|
Red Hat Security Advisory: Red Hat OpenStack Platform 17.1 (rabbitmq-server) security update
|
rabbitmq-server: DoS by publishing large messages over the HTTP API
|
[
"cpe:/a:redhat:openstack:17.1::el9"
] | null | 4.9 | null | null |
RHSA-2003:168
|
Red Hat Security Advisory: : : : Updated kerberos packages fix various vulnerabilities
|
security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw
|
[
"cpe:/o:redhat:linux:7.1"
] | null | null | null | null |
RHSA-2010:0029
|
Red Hat Security Advisory: krb5 security update
|
krb: KDC integer overflows in AES and RC4 decryption routines (MITKRB5-SA-2009-004)
|
[
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws",
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws",
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server",
"cpe:/o:redhat:rhel_eus:4.7::as",
"cpe:/o:redhat:rhel_eus:4.7::es",
"cpe:/o:redhat:rhel_eus:5.2",
"cpe:/o:redhat:rhel_eus:5.3"
] | null | null | null | null |
RHSA-2009:0436
|
Red Hat Security Advisory: firefox security update
|
firefox: does not properly prevent the literal rendering of homoglyph characters in IDN domain names (spoof URLs and conduct phishing attacks) Firefox 3 Layout engine crashes Firefox 2 and 3 Layout engine crash Firefox 3 JavaScript engine crashes Firefox 2 and 3 JavaScript engine crash jar: scheme ignores the content-disposition: header on the inner URI view-source: protocol Firefox XSS hazard using third-party stylesheets and XBL bindings Firefox Same-origin violations in XMLHttpRequest and XPCNativeWrapper.toString Firefox Malicious search plugins can inject code into arbitrary sites Firefox POST data sent to wrong site when saving web page with embedded frame javascript: URIs
|
[
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws",
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2009:1126
|
Red Hat Security Advisory: thunderbird security update
|
Firefox 2 and 3 Layout engine crash Firefox 2 and 3 JavaScript engine crash jar: scheme ignores the content-disposition: header on the inner URI view-source: protocol Firefox XSS hazard using third-party stylesheets and XBL bindings Firefox Same-origin violations in XMLHttpRequest and XPCNativeWrapper.toString Firefox browser engine crashes Firefox JavaScript engine crashes Firefox SSL tampering via non-200 responses to proxy CONNECT requests Firefox arbitrary code execution flaw Thunderbird mail crash
|
[
"cpe:/a:redhat:rhel_productivity:5",
"cpe:/o:redhat:enterprise_linux:5::client"
] | null | null | null | null |
RHSA-2013:1826
|
Red Hat Security Advisory: php security update
|
php: memory corruption in openssl_x509_parse()
|
[
"cpe:/o:redhat:rhel_els:3::as",
"cpe:/o:redhat:rhel_els:3::es",
"cpe:/o:redhat:rhel_els:4::as",
"cpe:/o:redhat:rhel_els:4::es"
] | null | null | null | null |
RHSA-2007:1130
|
Red Hat Security Advisory: squid security update
|
squid: DoS in cache updates
|
[
"cpe:/o:redhat:enterprise_linux:2.1::as",
"cpe:/o:redhat:enterprise_linux:2.1::aw",
"cpe:/o:redhat:enterprise_linux:2.1::es",
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws",
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.