id
stringlengths 13
15
| title
stringlengths 29
176
| description
stringlengths 8
32.1k
| cpes
listlengths 0
20
| cvss_v4_0
null | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
null |
---|---|---|---|---|---|---|---|
RHBA-2021:0627
|
Red Hat Bug Fix Advisory: microcode_ctl bug fix and enhancement update
|
hw: Vector Register Leakage-Active
|
[
"cpe:/o:redhat:rhel_aus:7.2::server"
] | null | 2.8 | null | null |
RHSA-2015:1668
|
Red Hat Security Advisory: httpd security update
|
httpd: HTTP request smuggling attack against chunked request parser
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | 3.7 | null |
RHSA-2019:2925
|
Red Hat Security Advisory: nodejs:10 security update
|
nodejs: Insufficient Slowloris fix causing DoS via server.headersTimeout bypass HTTP/2: large amount of data requests leads to denial of service HTTP/2: flood using PING frames results in unbounded memory growth HTTP/2: flood using PRIORITY frames results in excessive resource consumption HTTP/2: flood using HEADERS frames results in unbounded memory growth HTTP/2: flood using SETTINGS frames results in unbounded memory growth HTTP/2: 0-length headers lead to denial of service HTTP/2: request for large response leads to denial of service HTTP/2: flood using empty frames results in excessive resource consumption
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | null | 7.5 | null |
RHSA-2024:9729
|
Red Hat Security Advisory: squid security update
|
squid: Denial of Service processing ESI response content
|
[
"cpe:/a:redhat:rhel_e4s:9.0::appstream"
] | null | 7.5 | null | null |
RHSA-2021:3207
|
Red Hat Security Advisory: Red Hat Integration Camel Quarkus Tech-Preview 2 security update
|
activemq: improper authentication allows MITM attack apache-flink: directory traversal attack allows remote file writing through the REST API groovy: OS temporary directory leads to information disclosure cron-utils: template injection allows attackers to inject arbitrary Java EL expressions leading to remote code execution californium-core: DTLS - DoS vulnerability for certificate based handshakes undertow: special character in query results in server errors kotlin: vulnerable Java API was used for temporary file and folder creation which could result in information disclosure fabric8-kubernetes-client: vulnerable to a path traversal leading to integrity and availability compromise
|
[
"cpe:/a:redhat:camel_quarkus:2"
] | null | 7.4 | null | null |
RHSA-2024:0820
|
Red Hat Security Advisory: Red Hat Advanced Cluster Management 2.8.5 security and bug fix container updates
|
go-git: Maliciously crafted Git server replies can cause DoS on go-git clients go-git: Maliciously crafted Git server replies can lead to path traversal and RCE on go-git clients
|
[
"cpe:/a:redhat:acm:2.8::el8"
] | null | 8.1 | null | null |
RHSA-2024:5422
|
Red Hat Security Advisory: OpenShift Container Platform 4.16.8 bug fix and security update
|
golang-protobuf: encoding/protojson, internal/encoding/json: infinite loop in protojson.Unmarshal when unmarshaling certain forms of invalid JSON kernel: net: kernel: UAF in network route management
|
[
"cpe:/a:redhat:openshift:4.16::el9"
] | null | 7.8 | null | null |
RHSA-2018:3113
|
Red Hat Security Advisory: libvirt security, bug fix, and enhancement update
|
libvirt: guest could inject executable code via libnss_dns.so loaded by libvirt_lxc before init
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 5 | null |
RHSA-2019:1179
|
Red Hat Security Advisory: qemu-kvm-rhev security update
|
hardware: Microarchitectural Store Buffer Data Sampling (MSBDS) hardware: Micro-architectural Load Port Data Sampling - Information Leak (MLPDS) hardware: Microarchitectural Fill Buffer Data Sampling (MFBDS) hardware: Microarchitectural Data Sampling Uncacheable Memory (MDSUM)
|
[
"cpe:/o:redhat:enterprise_linux:7::hypervisor"
] | null | null | 3.8 | null |
RHSA-2023:0692
|
Red Hat Security Advisory: OpenShift API for Data Protection (OADP) 1.0.7 security and bug fix update
|
golang: golang.org/x/text/language: ParseAcceptLanguage takes a long time to parse complex tags golang: net/http: excessive memory growth in a Go server accepting HTTP/2 requests
|
[
"cpe:/a:redhat:openshift_api_data_protection:1.0::el8"
] | null | 5.3 | null | null |
RHSA-2017:3110
|
Red Hat Security Advisory: samba security update
|
samba: Some code path don't enforce smb signing, when they should (incomplete fix of CVE-2017-12150) samba: SMB2 connections don't keep encryption across DFS redirects (incomplete fix of CVE-2017-12151) samba: Server memory information leak over SMB1 (incomplete fix for CVE-2017-12163)
|
[
"cpe:/a:redhat:storage:3.3:samba:el6"
] | null | null | 4.1 | null |
RHSA-2024:4336
|
Red Hat Security Advisory: security update Logging for Red Hat OpenShift - 5.6.21
|
golang: net/netip: Unexpected behavior from Is methods for IPv4-mapped IPv6 addresses
|
[
"cpe:/a:redhat:logging:5.6::el8"
] | null | 6.7 | null | null |
RHSA-2023:4639
|
Red Hat Security Advisory: .NET 6.0 security update
|
dotnet: RCE under dotnet commands dotnet: Kestrel vulnerability to slow read attacks leading to Denial of Service attack
|
[
"cpe:/a:redhat:rhel_eus:9.0::appstream",
"cpe:/a:redhat:rhel_eus:9.0::crb"
] | null | 7.5 | null | null |
RHSA-2021:1361
|
Red Hat Security Advisory: firefox security update
|
Mozilla: More internal network hosts could have been probed by a malicious webpage Mozilla: Out of bound write due to lazy initialization Mozilla: Use-after-free in Responsive Design Mode Mozilla: Secure Lock icon could have been spoofed Mozilla: Blob URLs may have been granted additional privileges Mozilla: Arbitrary FTP command execution on FTP servers using an encoded URL Mozilla: Incorrect size computation in WebAssembly JIT could lead to null-reads Mozilla: Port blocking could be bypassed
|
[
"cpe:/a:redhat:rhel_eus:8.2::appstream"
] | null | 8.8 | 6.1 | null |
RHSA-2024:5255
|
Red Hat Security Advisory: kernel security update
|
kernel: vt: fix memory overlapping when deleting chars in the buffer amd: Return Address Predictor vulnerability leading to information disclosure kernel: gfs2: Fix kernel NULL pointer dereference in gfs2_rgrp_dump kernel: net/sched: act_ct: fix skb leak and crash on ooo frags kernel: tls: race between async notify and socket close kernel: tls: handle backlogging of crypto requests kernel: tls: race between tx work scheduling and socket close kernel: tcp: add sanity checks to rx zerocopy kernel: fs/proc: do_task_stat: use sig->stats_lock to gather the threads/children stats kernel: ext4: fix double-free of blocks due to wrong extents moved_len kernel: arp: Prevent overflow in arp_req_get(). kernel: ext4: avoid allocating blocks from corrupted group in ext4_mb_try_best_found() kernel: NFSv4.2: fix nfs4_listxattr kernel BUG at mm/usercopy.c:102 kernel: Squashfs: check the inode number is not the invalid value of zero kernel: mlxsw: spectrum_acl_tcam: Fix memory leak when canceling rehash work kernel: tcp: properly terminate timers for kernel sockets kernel: mm/hugetlb: fix missing hugetlb_lock for resv uncharge kernel: i40e: fix vf may be used uninitialized in this function warning kernel: TIPC message reassembly use-after-free remote code execution vulnerability kernel: net: kernel: UAF in network route management kernel: net: bridge: xmit: make sure we have at least eth header len bytes kernel: net/mlx5: Discard command completions in internal error
|
[
"cpe:/a:redhat:rhel_eus:8.8::crb",
"cpe:/o:redhat:rhel_eus:8.8::baseos"
] | null | 4.4 | null | null |
RHSA-2011:1266
|
Red Hat Security Advisory: seamonkey security update
|
Updated seamonkey packages that fix one security issue are now available
for Red Hat Enterprise Linux 4.
The Red Hat Security Response Team has rated this update as having
important security impact.
|
[
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2013:0669
|
Red Hat Security Advisory: qt security update
|
qt: QSharedMemory class created shared memory segments with insecure permissions
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2023:5604
|
Red Hat Security Advisory: kernel security and bug fix update
|
kernel: hash collisions in the IPv6 connection lookup table kernel: Spectre v2 SMT mitigations problem kernel: fbcon: shift-out-of-bounds in fbcon_set_font() kernel: net/sched: Use-after-free vulnerabilities in the net/sched classifiers: cls_fw, cls_u32 and cls_route kernel: denial of service problem in net/unix/diag.c kernel: nf_tables: use-after-free in nft_chain_lookup_byid() kernel: nf_tables: stack-out-of-bounds-read in nft_byteorder_eval() kernel: cls_flower: out-of-bounds write in fl_set_geneve_opt()
|
[
"cpe:/a:redhat:rhel_eus:9.0::appstream",
"cpe:/a:redhat:rhel_eus:9.0::crb",
"cpe:/o:redhat:rhel_eus:9.0::baseos"
] | null | 7.8 | 5.6 | null |
RHSA-2023:5697
|
Red Hat Security Advisory: OpenShift Container Platform 4.11.52 bug fix and security update
|
distribution/distribution: DoS from malicious API request golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487)
|
[
"cpe:/a:redhat:openshift:4.11::el8"
] | null | 7.5 | null | null |
RHSA-2022:6592
|
Red Hat Security Advisory: kpatch-patch security update
|
kernel: heap overflow in nft_set_elem_init()
|
[
"cpe:/o:redhat:enterprise_linux:9::baseos"
] | null | 7.8 | null | null |
RHSA-2025:2512
|
Red Hat Security Advisory: kernel-rt security update
|
kernel: can: bcm: Fix UAF in bcm_proc_show() kernel: HID: core: zero-initialize the report buffer kernel: ALSA: usb-audio: Fix potential out-of-bound accesses for Extigy and Mbox devices
|
[
"cpe:/a:redhat:rhel_e4s:9.0::nfv",
"cpe:/a:redhat:rhel_e4s:9.0::realtime"
] | null | 5.8 | null | null |
RHBA-2021:3472
|
Red Hat Bug Fix Advisory: Red Hat Ansible Tower 3.8.4-1 - Container
|
nginx: Off-by-one in ngx_resolver_copy() when labels are followed by a pointer to a root domain name libX11: missing request length checks postgresql: Buffer overrun from integer overflow in array subscripting calculations postgresql: Memory disclosure in INSERT ... ON CONFLICT ... DO UPDATE
|
[
"cpe:/a:redhat:ansible_automation_platform:3.8::el7"
] | null | 6.5 | null | null |
RHSA-2014:1894
|
Red Hat Security Advisory: chromium-browser security update
|
chromium-browser: Address bar spoofing chromium-browser: Buffer overflow in Skia chromium-browser: Use-after-free in pepper plugins chromium-browser: Use-after-free in blink chromium-browser: Integer overflow in media chromium-browser: Uninitialized memory read in Skia chromium-browser: Unspecified security issues
|
[
"cpe:/a:redhat:rhel_extras:6"
] | null | null | null | null |
RHSA-2019:0710
|
Red Hat Security Advisory: python security update
|
python: Information Disclosure due to urlsplit improper NFKC normalization
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 9.8 | null |
RHSA-2017:2683
|
Red Hat Security Advisory: kernel security update
|
kernel: stack buffer overflow in the native Bluetooth stack
|
[
"cpe:/o:redhat:rhel_aus:6.4::server"
] | null | null | 7.5 | null |
RHSA-2021:2472
|
Red Hat Security Advisory: Red Hat JBoss Core Services Apache HTTP Server 2.4.37 SP8 security update
|
libcurl: partial password leak over DNS on HTTP redirect curl: FTP PASV command response can cause curl to connect to arbitrary host curl: Malicious FTP server can trigger stack overflow when CURLOPT_CHUNK_BGN_FUNCTION is used curl: Inferior OCSP verification curl: Leak of authentication credentials in URL via automatic Referer curl: TLS 1.3 session ticket mix-up with HTTPS proxy host curl: Use-after-free in TLS session handling when using OpenSSL TLS backend
|
[
"cpe:/a:redhat:jboss_core_services:1::el7",
"cpe:/a:redhat:jboss_core_services:1::el8"
] | null | 8.1 | null | null |
RHSA-2015:1715
|
Red Hat Security Advisory: spice-server security update
|
spice: memory corruption in worker_update_monitors_config()
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2002:051
|
Red Hat Security Advisory: : : : New Squid packages available
|
security flaw security flaw security flaw security flaw
|
[
"cpe:/o:redhat:linux:6.2",
"cpe:/o:redhat:linux:7.0",
"cpe:/o:redhat:linux:7.1",
"cpe:/o:redhat:linux:7.2",
"cpe:/o:redhat:linux:7.3"
] | null | null | null | null |
RHSA-2021:4838
|
Red Hat Security Advisory: mailman:2.1 security update
|
mailman: CSRF token derived from admin password allows offline brute-force attack mailman: CSRF token bypass allows to perform CSRF attacks and account takeover
|
[
"cpe:/a:redhat:rhel_eus:8.1::appstream"
] | null | 8 | null | null |
RHSA-2022:9040
|
Red Hat Security Advisory: Red Hat Advanced Cluster Management 2.6.3 security update
|
nodejs-minimatch: ReDoS via the braceExpand function crewjam/saml: Authentication bypass when processing SAML responses containing multiple Assertion elements
|
[
"cpe:/a:redhat:acm:2.6::el8"
] | null | 9.1 | null | null |
RHSA-2023:6635
|
Red Hat Security Advisory: c-ares security, bug fix, and enhancement update
|
c-ares: buffer overflow in config_sortlist() due to missing string length check c-ares: AutoTools does not set CARES_RANDOM_FILE during cross compilation c-ares: Buffer Underwrite in ares_inet_net_pton() c-ares: Insufficient randomness in generation of DNS query IDs
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/o:redhat:enterprise_linux:9::baseos"
] | null | 5.9 | null | null |
RHSA-2016:2131
|
Red Hat Security Advisory: mariadb55-mariadb security update
|
mysql: unspecified vulnerability in subcomponent: Server: Optimizer (CPU October 2016) mysql: Incorrect input validation allowing code execution via mysqldump mysql: unspecified vulnerability in subcomponent: Server: DML (CPU October 2016) mysql: race condition while setting stats during MyISAM table repair (CPU Oct 2016) mysql: unspecified vulnerability in subcomponent: Server: DML (CPU October 2016) mysql: unspecified vulnerability in subcomponent: Server: GIS (CPU October 2016) mysql: unspecified vulnerability in subcomponent: Server: Federated (CPU October 2016) mysql: general_log can write to configuration files, leading to privilege escalation (CPU Oct 2016) mysql: race condition while setting stats during MyISAM table repair (CPU Oct 2016) mysql: unspecified vulnerability in subcomponent: Server: Types (CPU October 2016)
|
[
"cpe:/a:redhat:rhel_software_collections:2::el6",
"cpe:/a:redhat:rhel_software_collections:2::el7"
] | null | null | 4.3 | null |
RHSA-2023:1109
|
Red Hat Security Advisory: kernel security and bug fix update
|
kernel: stack overflow in do_proc_dointvec and proc_skip_spaces
|
[
"cpe:/o:redhat:rhel_aus:8.2::baseos",
"cpe:/o:redhat:rhel_e4s:8.2::baseos",
"cpe:/o:redhat:rhel_tus:8.2::baseos"
] | null | 7.8 | null | null |
RHSA-2024:5306
|
Red Hat Security Advisory: orc security update
|
orc: Stack-based buffer overflow vulnerability in ORC
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 6.7 | null | null |
RHSA-2024:0135
|
Red Hat Security Advisory: virt:rhel and virt-devel:rhel security update
|
QEMU: e1000e: heap use-after-free in e1000e_write_packet_to_guest()
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb"
] | null | 6 | null | null |
RHSA-2023:7625
|
Red Hat Security Advisory: Red Hat JBoss Core Services Apache HTTP Server 2.4.57 SP2 security update
|
openssl: Denial of service by excessive resource usage in verifying X509 policy constraints openssl: Invalid certificate policies in leaf certificates are silently ignored openssl: Certificate policy check not enabled openssl: Possible DoS translating ASN.1 object identifiers openssl: Excessive time spent checking DH keys and parameters OpenSSL: Excessive time spent checking DH q parameter value curl: out of heap memory issue due to missing limit on header quantity curl: heap based buffer overflow in the SOCKS5 proxy handshake curl: cookie injection with none file httpd: Apache Tomcat Connectors (mod_jk) Information Disclosure mod_http2: reset requests exhaust memory (incomplete fix of CVE-2023-44487)
|
[
"cpe:/a:redhat:jboss_core_services:1::el7",
"cpe:/a:redhat:jboss_core_services:1::el8"
] | null | 7.5 | null | null |
RHSA-2023:2898
|
Red Hat Security Advisory: libtar security update
|
libtar: out-of-bounds read in gnu_longlink libtar: out-of-bounds read in gnu_longname libtar: memory leak found in th_read() function libtar: memory leak found in th_read() function
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 7.5 | null | null |
RHSA-2024:0347
|
Red Hat Security Advisory: kernel-rt security and bug fix update
|
kernel: netfilter: potential slab-out-of-bound access due to integer underflow
|
[
"cpe:/a:redhat:rhel_extras_rt:7"
] | null | 7 | null | null |
RHSA-2020:2344
|
Red Hat Security Advisory: bind security update
|
bind: BIND does not sufficiently limit the number of fetches performed when processing referrals bind: A logic error in code which checks TSIG validity can be used to trigger an assertion failure in tsig.c
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 7.5 | null | null |
RHSA-2009:1083
|
Red Hat Security Advisory: cups security update
|
xpdf: multiple integer overflows cups: IPP_TAG_UNSUPPORTED handling NULL pointer dereference DoS cups: DoS (stop, crash) by renewing CUPS browse packets
|
[
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws",
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2017:3485
|
Red Hat Security Advisory: rh-ruby24-ruby security, bug fix, and enhancement update
|
ruby: Buffer underrun vulnerability in Kernel.sprintf rubygems: Escape sequence in the "summary" field of gemspec rubygems: No size limit in summary length of gem spec rubygems: Arbitrary file overwrite due to incorrect validation of specification name rubygems: DNS hijacking vulnerability rubygems: Unsafe object deserialization through YAML formatted gem specifications ruby: Escape sequence injection vulnerability in the Basic authentication of WEBrick ruby: Arbitrary heap exposure during a JSON.generate call
|
[
"cpe:/a:redhat:rhel_software_collections:3::el6",
"cpe:/a:redhat:rhel_software_collections:3::el7"
] | null | null | 5.9 | null |
RHSA-2022:0850
|
Red Hat Security Advisory: thunderbird security update
|
thunderbird: Crafted email could trigger an out-of-bounds write expat: Malformed 2- and 3-byte UTF-8 sequences can lead to arbitrary code execution expat: Namespace-separator characters in "xmlns[:prefix]" attribute values can lead to arbitrary code execution expat: Integer overflow in storeRawNames() Mozilla: Use-after-free in text reflows Mozilla: Browser window spoof using fullscreen mode Mozilla: iframe allow-scripts sandbox bypass Mozilla: Temporary files downloaded to /tmp and accessible by other local users Mozilla: Time-of-check time-of-use bug when verifying add-on signatures Mozilla: Use-after-free in XSLT parameter processing Mozilla: Use-after-free in WebGPU IPC Framework
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 8.8 | 7.5 | null |
RHSA-2024:9922
|
Red Hat Security Advisory: python3.11-urllib3 security update
|
urllib3: proxy-authorization request header is not stripped during cross-origin redirects
|
[
"cpe:/a:redhat:rhel_eus:9.4::appstream"
] | null | 4.4 | null | null |
RHSA-2020:2059
|
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.2.8 on RHEL 7 security update
|
jackson-mapper-asl: XML external entity similar to CVE-2016-3720 cxf: OpenId Connect token service does not properly validate the clientId cxf: reflected XSS in the services listing page Wildfly: EJBContext principal is not popped back after invoking another EJB using a different Security Domain SmallRye: SecuritySupport class is incorrectly public and contains a static method to access the current threads context class loader Soteria: security identity corruption across concurrent threads undertow: AJP File Read/Inclusion Vulnerability undertow: servletPath is normalized incorrectly leading to dangerous application mapping which could result in security bypass cryptacular: excessive memory allocation during a decode operation undertow: Memory exhaustion issue in HttpReadListener via "Expect: 100-continue" header undertow: invalid HTTP request with large chunk size
|
[
"cpe:/a:redhat:jboss_enterprise_application_platform:7.2::el7"
] | null | 6.5 | 8.1 | null |
RHSA-2017:2710
|
Red Hat Security Advisory: Red Hat JBoss Core Services security update
|
httpd: ap_some_auth_required() does not properly indicate authenticated request in 2.4 SSL/TLS: Birthday attack against 64-bit block ciphers (SWEET32) httpd: Uninitialized memory reflection in mod_auth_digest
|
[
"cpe:/a:redhat:jboss_core_services:1::el6"
] | null | null | 4.8 | null |
RHSA-2013:0614
|
Red Hat Security Advisory: xulrunner security update
|
Mozilla: Use-after-free in HTML Editor (MFSA 2013-29)
|
[
"cpe:/o:redhat:enterprise_linux:5::server",
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHBA-2015:0820
|
Red Hat Bug Fix Advisory: Red Hat Enterprise Linux OpenStack Platform Bug Fix and Enhancement Advisory
|
mysql: unspecified vulnerability related to Server:InnoDB:DML (CPU Jan 2015) mysql: unspecified vulnerability related to Server:Security:Privileges:Foreign Key (CPU Jan 2015) mysql: unspecified vulnerability related to Server:Replication (CPU Jan 2015) mysql: unspecified vulnerability related to Server:Replication (CPU Jan 2015) mysql: unspecified vulnerability related to Server:Security:Encryption (CPU Jan 2015) mysql: unspecified vulnerability related to Server:InnoDB:DDL:Foreign Key (CPU Jan 2015)
|
[
"cpe:/a:redhat:openstack:5::el6"
] | null | null | null | null |
RHSA-2025:2933
|
Red Hat Security Advisory: Red Hat OpenShift Pipelines Release 1.18.0
|
golang.org/x/crypto/ssh: Misuse of ServerConfig.PublicKeyCallback may cause authorization bypass in golang.org/x/crypto golang.org/x/net/html: Non-linear parsing of case-insensitive content in golang.org/x/net/html
|
[
"cpe:/a:redhat:openshift_pipelines:1.18::el9"
] | null | 7.5 | null | null |
RHSA-2023:1693
|
Red Hat Security Advisory: postgresql security update
|
postgresql: Extension scripts replace objects not belonging to the extension. postgresql: Client memory disclosure when connecting with Kerberos to modified server
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::crb"
] | null | 3.7 | null | null |
RHSA-2019:2670
|
Red Hat Security Advisory: chromium-browser security update
|
chromium-browser: Use-after-free in Blink
|
[
"cpe:/a:redhat:rhel_extras:6"
] | null | null | 8.8 | null |
RHSA-2023:1151
|
Red Hat Security Advisory: Satellite 6.11.5 Async Security Update
|
activerecord: Possible RCE escalation bug with Serialized Columns in Active Record jackson-databind: deep wrapper array nesting wrt UNWRAP_SINGLE_VALUE_ARRAYS
|
[
"cpe:/a:redhat:satellite:6.11::el7",
"cpe:/a:redhat:satellite:6.11::el8",
"cpe:/a:redhat:satellite_capsule:6.11::el7",
"cpe:/a:redhat:satellite_capsule:6.11::el8",
"cpe:/a:redhat:satellite_maintenance:6.11::el7",
"cpe:/a:redhat:satellite_maintenance:6.11::el8",
"cpe:/a:redhat:satellite_utils:6.11::el7",
"cpe:/a:redhat:satellite_utils:6.11::el8"
] | null | 7.5 | null | null |
RHSA-2025:1747
|
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.3.12 security update
|
velocity: arbitrary code execution when attacker is able to modify templates h2: Remote Code Execution in Console log4j-core: Remote code execution in Log4j 2.x when logs contain an attacker-controlled string value minimist: prototype pollution log4j-core: DoS in log4j 2.x with thread context message pattern and context lookup pattern (incomplete fix for CVE-2021-44228) SnakeYaml: Constructor Deserialization Remote Code Execution codec-haproxy: HAProxyMessageDecoder Stack Exhaustion DoS jackson-databind: deep wrapper array nesting wrt UNWRAP_SINGLE_VALUE_ARRAYS jackson-databind: use of deeply nested arrays apache-commons-text: variable interpolation RCE mina-sshd: Java unsafe deserialization vulnerability jettison: If the value in map is the map's self, the new new JSONObject(map) cause StackOverflowError which may lead to dos CXF: directory listing / code exfiltration
|
[
"cpe:/a:redhat:jboss_enterprise_application_platform_eus:7.3::el7"
] | null | 7.5 | null | null |
RHSA-2023:7386
|
Red Hat Security Advisory: pixman security update
|
pixman: Integer overflow in pixman_sample_floor_y leading to heap out-of-bounds write
|
[
"cpe:/a:redhat:rhel_eus:9.0::appstream"
] | null | 7 | null | null |
RHSA-2007:0358
|
Red Hat Security Advisory: squirrelmail security update
|
XSS through HTML message in squirrelmail CSRF through HTML message in squirrelmail
|
[
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws",
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2018:3590
|
Red Hat Security Advisory: kernel security and bug fix update
|
kernel: out-of-bounds access in the show_timer function in kernel/time/posix-timers.c kernel: IP fragments with random offsets allow a remote denial of service (FragmentSmack) kernel: mm: use-after-free in do_get_mempolicy function allows local DoS or other unspecified impact kernel: Integer overflow in Linux's create_elf_tables function
|
[
"cpe:/o:redhat:rhel_aus:7.2::server",
"cpe:/o:redhat:rhel_e4s:7.2::server",
"cpe:/o:redhat:rhel_tus:7.2::server"
] | null | null | 7.8 | null |
RHSA-2024:0304
|
Red Hat Security Advisory: RHACS 3.74 enhancement and security update
|
postgresql: Memory disclosure in aggregate function calls postgresql: Buffer overrun from integer overflow in array modification postgresql: Role pg_signal_backend can signal certain superuser processes. postgresql: extension script @substitutions@ within quoting allow SQL injection
|
[
"cpe:/a:redhat:advanced_cluster_security:3.74::el8"
] | null | 7.5 | null | null |
RHSA-2015:0138
|
Red Hat Security Advisory: Fuse ESB Enterprise/Fuse MQ Enterprise 7.1.0 security update
|
ActiveMQ: XXE via XPath expression evaluation JAAS: LDAPLoginModule allows empty password authentication
|
[
"cpe:/a:redhat:fuse_esb_enterprise:7.1.0",
"cpe:/a:redhat:fuse_management_console:7.1.0",
"cpe:/a:redhat:fuse_mq_enterprise:7.1.0"
] | null | null | null | null |
RHSA-2023:5746
|
Red Hat Security Advisory: OpenJDK 17.0.9 Security Update for Windows Builds
|
OpenJDK: memory corruption issue on x86_64 with AVX-512 (8317121) OpenJDK: certificate path validation issue during client authentication (8309966)
|
[
"cpe:/a:redhat:openjdk:17::windows"
] | null | 5.3 | null | null |
RHSA-2018:0045
|
Red Hat Security Advisory: rhvm-appliance security update
|
An update for rhvm-appliance is now available for RHEV 4.X, RHEV-H, and Agents for Red Hat Enterprise Linux 7.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
|
[
"cpe:/o:redhat:enterprise_linux:7::hypervisor"
] | null | null | null | null |
RHSA-2005:346
|
Red Hat Security Advisory: slocate security update
|
security flaw
|
[
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2023:2282
|
Red Hat Security Advisory: podman security and bug fix update
|
golang: crypto/tls: session tickets lack random ticket_age_add golang: net/http: excessive memory growth in a Go server accepting HTTP/2 requests
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 5.3 | null | null |
RHSA-2013:1519
|
Red Hat Security Advisory: kernel security and bug fix update
|
kernel: ext4: AIO vs fallocate stale data exposure kernel: dm: dm-snapshot data leak
|
[
"cpe:/o:redhat:rhel_eus:6.2::computenode",
"cpe:/o:redhat:rhel_eus:6.2::server"
] | null | null | null | null |
RHSA-2024:10133
|
Red Hat Security Advisory: rhc-worker-script security update
|
golang-fips: Golang FIPS zeroed buffer net/http: Denial of service due to improper 100-continue handling in net/http
|
[
"cpe:/o:redhat:rhel_els:7"
] | null | 5.9 | null | null |
RHSA-2023:7788
|
Red Hat Security Advisory: postgresql:10 security update
|
postgresql: Buffer overrun from integer overflow in array modification
|
[
"cpe:/a:redhat:rhel_aus:8.2::appstream",
"cpe:/a:redhat:rhel_e4s:8.2::appstream",
"cpe:/a:redhat:rhel_tus:8.2::appstream"
] | null | 8.8 | null | null |
RHSA-2025:1802
|
Red Hat Security Advisory: tuned security update
|
tuned: improper sanitization of `instance_name` parameter of the `instance_create()` method
|
[
"cpe:/a:redhat:rhel_eus:9.2::appstream",
"cpe:/a:redhat:rhel_eus:9.2::nfv",
"cpe:/a:redhat:rhel_eus:9.2::realtime",
"cpe:/a:redhat:rhel_eus:9.2::sap",
"cpe:/a:redhat:rhel_eus:9.2::sap_hana",
"cpe:/o:redhat:rhel_eus:9.2::baseos"
] | null | 5.5 | null | null |
RHSA-2008:0828
|
Red Hat Security Advisory: JBoss Enterprise Application Platform 4.3.0CP01 security update
|
Cross-site scripting (XSS) vulnerability in Sun Java Server Faces JBossEAP status servlet info leak
|
[
"cpe:/a:redhat:jboss_enterprise_application_platform:4.3.0::el5"
] | null | null | null | null |
RHSA-2024:3881
|
Red Hat Security Advisory: OpenShift Container Platform 4.14.30 bug fix and security update
|
cluster-image-registry-operator: Exposes a secret via env variable in pod definition on Azure
|
[
"cpe:/a:redhat:openshift:4.14::el8",
"cpe:/a:redhat:openshift:4.14::el9"
] | null | 6.8 | null | null |
RHEA-2023:6562
|
Red Hat Enhancement Advisory: nginx:1.22 bug fix and enhancement update
|
HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack)
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 7.5 | null | null |
RHSA-2025:0421
|
Red Hat Security Advisory: java-17-openjdk security update for RHEL 8.4
|
openjdk: Enhance array handling (Oracle CPU 2025-01)
|
[
"cpe:/a:redhat:rhel_aus:8.4::appstream",
"cpe:/a:redhat:rhel_e4s:8.4::appstream",
"cpe:/a:redhat:rhel_tus:8.4::appstream"
] | null | 4.8 | null | null |
RHSA-2024:4858
|
Red Hat Security Advisory: OpenShift Container Platform 4.16.5 packages and security update
|
go-retryablehttp: url might write sensitive information to log file gorilla/schema: Potential memory exhaustion attack due to sparse slice deserialization
|
[
"cpe:/a:redhat:openshift:4.16::el8",
"cpe:/a:redhat:openshift:4.16::el9"
] | null | 7.5 | null | null |
RHSA-2024:0474
|
Red Hat Security Advisory: tomcat security update
|
tomcat: Open Redirect vulnerability in FORM authentication tomcat: FileUpload: DoS due to accumulation of temporary files on Windows tomcat: improper cleaning of recycled objects could lead to information leak tomcat: incorrectly parsed http trailer headers can cause request smuggling
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 5.3 | null | null |
RHSA-2019:1420
|
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.2.2 on RHEL 7 security update
|
picketlink: reflected XSS in SAMLRequest via RelayState parameter picketlink: URL injection via xinclude parameter undertow: leak credentials to log files UndertowLogger.REQUEST_LOGGER.undertowRequestFailed
|
[
"cpe:/a:redhat:jboss_enterprise_application_platform:7.2::el7"
] | null | null | 5.3 | null |
RHSA-2021:2370
|
Red Hat Security Advisory: container-tools:3.0 security update
|
runc: vulnerable to symlink exchange attack
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 7.5 | null | null |
RHSA-2024:0345
|
Red Hat Security Advisory: python-pillow security update
|
python-pillow: uncontrolled resource consumption when textlength in an ImageDraw instance operates on a long text argument
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 7.5 | null | null |
RHEA-2023:6741
|
Red Hat Enhancement Advisory: .NET 8.0 bugfix update
|
HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack)
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 7.5 | null | null |
RHSA-2009:1059
|
Red Hat Security Advisory: pidgin security update
|
pidgin file transfer buffer overflow pidgin incomplete fix for CVE-2008-2927
|
[
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws"
] | null | null | null | null |
RHSA-2017:2456
|
Red Hat Security Advisory: firefox security update
|
Mozilla: Out-of-bounds read with cached style data and pseudo-elements (MFSA 2017-19) Mozilla: Memory safety bugs fixed in Firefox 55 and Firefox ESR 52.3 (MFSA 2017-19) Mozilla: Use-after-free with image observers (MFSA 2017-19) Mozilla: Buffer overflow manipulating ARIA elements in DOM (MFSA 2017-19) Mozilla: Buffer overflow while painting non-displayable SVG (MFSA 2017-19) Mozilla: Same-origin policy bypass with iframes through page reloads (MFSA 2017-19) Mozilla: Spoofing following page navigation with data: protocol and modal alerts (MFSA 2017-19) Mozilla: Buffer overflow viewing certificates with long OID (MFSA 2017-19) Mozilla: XUL injection in the style editor in devtools (MFSA 2017-19) Mozilla: Use-after-free in WebSockets during disconnection (MFSA 2017-19) Mozilla: Use-after-free with marquee during window resizing Mozilla: Use-after-free resizing image elements (MFSA 2017-19) Mozilla: CSP directives improperly applied with sandbox flag in iframes (MFSA 2017-19) Mozilla: Domain hijacking through appcache fallback (MFSA 2017-19) Mozilla: Use-after-free while deleting attached editor DOM node (MFSA 2017-19)
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation",
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 9.8 | null |
RHSA-2021:1756
|
Red Hat Security Advisory: qt5-qtbase security and bug fix update
|
qt: buffer over-read in read_xbm_body in gui/image/qxbmhandler.cpp
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb"
] | null | 5.3 | null | null |
RHSA-2023:3934
|
Red Hat Security Advisory: python3 security update
|
python: urllib.parse url blocklisting bypass
|
[
"cpe:/a:redhat:rhel_aus:8.4::appstream",
"cpe:/a:redhat:rhel_e4s:8.4::appstream",
"cpe:/a:redhat:rhel_tus:8.4::appstream",
"cpe:/o:redhat:rhel_aus:8.4::baseos",
"cpe:/o:redhat:rhel_e4s:8.4::baseos",
"cpe:/o:redhat:rhel_tus:8.4::baseos"
] | null | 7.5 | null | null |
RHSA-2024:3321
|
Red Hat Security Advisory: pcp security update
|
pcp: exposure of the redis server backend allows remote command execution via pmproxy
|
[
"cpe:/a:redhat:rhel_eus:9.2::appstream"
] | null | 8.8 | null | null |
RHSA-2020:3207
|
Red Hat Security Advisory: OpenShift Container Platform 4.5.4 jenkins-2-plugins security update
|
jenkins-script-security-plugin: cross-site scripting vulnerability due to configure sandboxed scripts
|
[
"cpe:/a:redhat:openshift:4.5::el7"
] | null | 5.4 | null | null |
RHSA-2023:4834
|
Red Hat Security Advisory: kpatch-patch security update
|
kernel: cls_flower: out-of-bounds write in fl_set_geneve_opt()
|
[
"cpe:/o:redhat:enterprise_linux:7::server"
] | null | 7.8 | null | null |
RHSA-2012:1009
|
Red Hat Security Advisory: java-1.7.0-openjdk security and bug fix update
|
OpenJDK: improper protection of CORBA data models (CORBA, 7079902) OpenJDK: fontmanager layout lookup code memory corruption (2D, 7143617) OpenJDK: SynthLookAndFeel application context bypass (Swing, 7143614) OpenJDK: insecure temporary file permissions (JRE, 7143606) OpenJDK: CRL and certificate extensions handling improvements (Security, 7143872) OpenJDK: mutable repository identifiers in generated stub code (CORBA, 7143851) OpenJDK: insufficient field accessibility checks (HotSpot, 7152811) OpenJDK: XML parsing infinite loop (JAXP, 7157609) OpenJDK: insufficient invokespecial <init> verification (HotSpot, 7160757) OpenJDK: java.lang.invoke.MethodHandles.Lookup does not honor access modes (Libraries, 7165628)
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2014:1066
|
Red Hat Security Advisory: Transition Red Hat Network Classic Hosted to Red Hat Subscription Management
|
This is the 3-year notification of the target date to migrate systems from
Red Hat Network Classic Hosted to Red Hat Subscription Management. All
systems using Red Hat Network Classic Hosted must be migrated to Red Hat
Subscription Management.
|
[] | null | null | null | null |
RHSA-2024:4673
|
Red Hat Security Advisory: firefox security update
|
Mozilla: Race condition in permission assignment Mozilla: Memory corruption in thread creation Mozilla: Memory safety bugs fixed in Firefox 128, Firefox ESR 115.13, and Thunderbird 115.13
|
[
"cpe:/a:redhat:rhel_eus:9.2::appstream"
] | null | 7.5 | null | null |
RHSA-2024:6274
|
Red Hat Security Advisory: Red Hat OpenShift distributed tracing 3.3.0 operator/operand containers
|
Red Hat OpenShift distributed tracing 3.3.0
|
[
"cpe:/a:redhat:openshift_distributed_tracing:3.3::el8"
] | null | null | null | null |
RHSA-2023:6883
|
Red Hat Security Advisory: galera and mariadb security update
|
mariadb: node crashes with Transport endpoint is not connected mysqld got signal 6
|
[
"cpe:/a:redhat:rhel_eus:9.0::appstream",
"cpe:/a:redhat:rhel_eus:9.0::crb"
] | null | 7.5 | null | null |
RHSA-2022:8662
|
Red Hat Security Advisory: krb5 security update
|
krb5: integer overflow vulnerabilities in PAC parsing
|
[
"cpe:/o:redhat:rhel_eus:8.6::baseos"
] | null | 8.8 | null | null |
RHSA-2024:2147
|
Red Hat Security Advisory: ipa security update
|
freeipa: specially crafted HTTP requests potentially lead to denial of service
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::crb"
] | null | 5.3 | null | null |
RHSA-2022:6432
|
Red Hat Security Advisory: kernel security and bug fix update
|
kernel: race condition in perf_event_open leads to privilege escalation
|
[
"cpe:/o:redhat:rhel_aus:7.6::server",
"cpe:/o:redhat:rhel_e4s:7.6::server",
"cpe:/o:redhat:rhel_tus:7.6::server"
] | null | 7.4 | null | null |
RHSA-2018:2161
|
Red Hat Security Advisory: kernel security and bug fix update
|
hw: cpu: speculative store bypass
|
[
"cpe:/o:redhat:rhel_eus:7.3::computenode",
"cpe:/o:redhat:rhel_eus:7.3::server"
] | null | null | 5.6 | null |
RHSA-2021:0319
|
Red Hat Security Advisory: Red Hat Single Sign-On 7.4.5 security update on RHEL 7
|
keycloak: Default Client configuration is vulnerable to SSRF using "request_uri" parameter
|
[
"cpe:/a:redhat:red_hat_single_sign_on:7::el7"
] | null | 5.8 | null | null |
RHSA-2014:1246
|
Red Hat Security Advisory: nss and nspr security, bug fix, and enhancement update
|
nss: false start PR_Recv information disclosure security issue nss: TOCTOU, potential use-after-free in libssl's session ticket processing (MFSA 2014-12) nss: Do not allow p-1 as a public DH value (MFSA 2014-12) nss: IDNA hostname matching code does not follow RFC 6125 recommendation (MFSA 2014-45) Mozilla: Out of bounds write in NSPR (MFSA 2014-55)
|
[
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2013:0196
|
Red Hat Security Advisory: JBoss Enterprise Web Platform 5.2.0 update
|
JBoss: twiddle.sh accepts credentials as command line arguments, exposing them to other local users via a process listing jbossws: Prone to character encoding pattern attack (XML Encryption flaw) jbossws: Prone to Bleichenbacher attack against to be distributed symmetric key Framework: Information (internal server information, classpath, local working directories, session IDs) disclosure CSRF on jmx-console allows invocation of operations on mbeans Console: XSS in invoke operation Cache: NonManagedConnectionFactory will log password in clear text when an exception occurs JBoss invoker servlets do not require authentication JGroups diagnostics service enabled by default with no authentication when a JGroups channel is started apache-cxf: Apache CXF does not verify that elements were signed / encrypted by a particular Supporting Token JBoss: CallerIdentityLoginModule retaining password from previous call if a null password is provided JBoss: SecurityAssociation.getCredential() will return the previous credential if no security context is provided Web: Bypass of security constraints JBoss: AuthorizationInterceptor allows JMX operation to proceed despite authorization failure
|
[
"cpe:/a:redhat:jboss_enterprise_web_platform:5::el5"
] | null | null | null | null |
RHSA-2024:4935
|
Red Hat Security Advisory: freeradius security update
|
freeradius: forgery attack
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::crb"
] | null | 9 | null | null |
RHSA-2023:1980
|
Red Hat Security Advisory: kernel-rt security and bug fix update
|
kernel: FUSE filesystem low-privileged user privileges escalation
|
[
"cpe:/a:redhat:rhel_eus:9.0::nfv",
"cpe:/a:redhat:rhel_eus:9.0::realtime"
] | null | 7 | null | null |
RHEA-2019:3853
|
Red Hat Enhancement Advisory: microcode_ctl bug fix and enhancement update
|
hw: Intel SGX information leak
|
[
"cpe:/o:redhat:rhel_aus:6.6::server"
] | null | null | 6 | null |
RHSA-2018:1646
|
Red Hat Security Advisory: qemu-kvm-rhev security update
|
hw: cpu: speculative store bypass QEMU: i386: multiboot OOB access while loading kernel image QEMU: cirrus: OOB access when updating VGA display
|
[
"cpe:/a:redhat:openstack:8::el7"
] | null | null | 5.5 | null |
RHSA-2019:1881
|
Red Hat Security Advisory: qemu-kvm-ma security and bug fix update
|
QEMU: device_tree: heap buffer overflow while loading device tree blob
|
[
"cpe:/o:redhat:enterprise_linux:7::server"
] | null | null | 7 | null |
RHSA-2008:0262
|
Red Hat Security Advisory: gpdf security update
|
xpdf: embedded font vulnerability
|
[
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.