id
stringlengths 13
15
| title
stringlengths 29
176
| description
stringlengths 8
32.1k
| cpes
listlengths 0
20
| cvss_v4_0
null | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
null |
---|---|---|---|---|---|---|---|
RHSA-2023:6788
|
Red Hat Security Advisory: Red Hat OpenShift GitOps security update
|
golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487) HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack)
|
[
"cpe:/a:redhat:openshift_gitops:1.8::el8"
] | null | 7.5 | null | null |
RHSA-2019:1819
|
Red Hat Security Advisory: rh-redis5-redis security update
|
redis: Heap buffer overflow in HyperLogLog triggered by malicious client redis: Stack buffer overflow in HyperLogLog triggered by malicious client
|
[
"cpe:/a:redhat:rhel_software_collections:3::el7"
] | null | null | 7.2 | null |
RHSA-2008:0607
|
Red Hat Security Advisory: kernel security and bug fix update
|
kernel: sit memory leak
|
[
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2023:5224
|
Red Hat Security Advisory: thunderbird security update
|
libwebp: Heap buffer overflow in WebP Codec libwebp: out-of-bounds write with a specially crafted WebP lossless file
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 0 | null | null |
RHSA-2024:2734
|
Red Hat Security Advisory: Red Hat OpenStack Platform 17.1 (python-urllib3) security update
|
urllib3: Request body not stripped after redirect from 303 status changes request method to GET
|
[
"cpe:/a:redhat:openstack:17.1::el8"
] | null | 4.2 | null | null |
RHSA-2024:3528
|
Red Hat Security Advisory: kernel security update
|
kernel: NULL pointer dereference in can_rcv_filter kernel: Slab-out-of-bound read in compare_netdev_and_ip kernel: net: bridge: data races indata-races in br_handle_frame_finish() kernel: nf_tables: use-after-free vulnerability in the nft_verdict_init() function
|
[
"cpe:/o:redhat:rhel_aus:8.2::baseos"
] | null | 7.8 | null | null |
RHSA-2023:4178
|
Red Hat Security Advisory: java-1.8.0-openjdk security and bug fix update
|
OpenJDK: array indexing integer overflow issue (8304468) OpenJDK: improper handling of slash characters in URI-to-path conversion (8305312)
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::crb"
] | null | 3.7 | null | null |
RHSA-2011:0303
|
Red Hat Security Advisory: kernel security and bug fix update
|
kernel: unix socket local dos kernel: unlimited socket backlog DoS kernel: heap contents leak for CAP_NET_ADMIN via ethtool ioctl kernel: unlimited socket backlog DoS
|
[
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2016:0007
|
Red Hat Security Advisory: nss security update
|
TLS 1.2 Transcipt Collision attacks against MD5 in key exchange protocol (SLOTH)
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation",
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | null | null |
RHSA-2020:2592
|
Red Hat Security Advisory: OpenShift Container Platform 4.2.36 containernetworking-plugins security update
|
containernetworking/plugins: IPv6 router advertisements allow for MitM attacks on IPv4 clusters
|
[
"cpe:/a:redhat:openshift:4.2::el7",
"cpe:/a:redhat:openshift:4.2::el8"
] | null | 6 | null | null |
RHSA-2021:3363
|
Red Hat Security Advisory: kernel security, bug fix, and enhancement update
|
kernel: race condition in net/can/bcm.c leads to local privilege escalation kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c kernel: race condition for removal of the HCI controller
|
[
"cpe:/a:redhat:rhel_eus:8.2::crb",
"cpe:/o:redhat:rhel_eus:8.2::baseos"
] | null | 7 | null | null |
RHSA-2020:2419
|
Red Hat Security Advisory: unbound security update
|
unbound: amplification of an incoming query into a large number of queries directed to a target unbound: infinite loop via malformed DNS answers received from upstream servers
|
[
"cpe:/a:redhat:rhel_eus:8.1::appstream"
] | null | 7.5 | null | null |
RHSA-2003:021
|
Red Hat Security Advisory: krb5 security update
|
security flaw
|
[
"cpe:/o:redhat:enterprise_linux:2.1::as",
"cpe:/o:redhat:enterprise_linux:2.1::aw"
] | null | null | null | null |
RHSA-2023:7473
|
Red Hat Security Advisory: OpenShift Container Platform 4.14.4 packages and security update
|
python-werkzeug: high resource usage when parsing multipart form data with many fields haproxy: Proxy forwards malformed empty Content-Length headers python-werkzeug: high resource consumption leading to denial of service
|
[
"cpe:/a:redhat:openshift:4.14::el8",
"cpe:/a:redhat:openshift:4.14::el9",
"cpe:/a:redhat:openshift_ironic:4.14::el9"
] | null | 7.5 | null | null |
RHSA-2010:0890
|
Red Hat Security Advisory: pidgin security update
|
(libpurple): Multiple DoS (crash) flaws by processing of unsanitized Base64 decoder values
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2017:2437
|
Red Hat Security Advisory: kernel security and bug fix update
|
kernel: crypto: GPF in lrw_crypt caused by null-deref kernel: l2tp: Race condition in the L2TPv3 IP encapsulation feature kernel: Null pointer dereference in search_keyring kernel: NFSv4 server does not properly validate layout type when processing NFSv4 pNFS LAYOUTGET operand
|
[
"cpe:/o:redhat:rhel_eus:7.3::computenode",
"cpe:/o:redhat:rhel_eus:7.3::server"
] | null | null | 8.6 | null |
RHSA-2023:6796
|
Red Hat Security Advisory: insights-client security update
|
insights-client: unsafe handling of temporary files and directories
|
[
"cpe:/a:redhat:rhel_eus:9.0::appstream"
] | null | 7.8 | null | null |
RHSA-2017:2672
|
Red Hat Security Advisory: rh-nodejs6-nodejs-qs security update
|
nodejs-qs: Prototype override protection bypass
|
[
"cpe:/a:redhat:rhel_software_collections:2::el6",
"cpe:/a:redhat:rhel_software_collections:2::el7"
] | null | null | 5.3 | null |
RHSA-2020:3042
|
Red Hat Security Advisory: nodejs:10 security update
|
nodejs-minimist: prototype pollution allows adding or modifying properties of Object.prototype using a constructor or __proto__ payload nodejs: memory corruption in napi_get_value_string_* functions nghttp2: overly large SETTINGS frames can lead to DoS
|
[
"cpe:/a:redhat:rhel_e4s:8.0::appstream"
] | null | 7.5 | null | null |
RHSA-2025:2514
|
Red Hat Security Advisory: kernel security update
|
kernel: can: bcm: Fix UAF in bcm_proc_show() kernel: HID: core: zero-initialize the report buffer kernel: ALSA: usb-audio: Fix potential out-of-bound accesses for Extigy and Mbox devices
|
[
"cpe:/o:redhat:rhel_aus:7.7::server"
] | null | 5.8 | null | null |
RHSA-2021:1069
|
Red Hat Security Advisory: kpatch-patch security update
|
kernel: out-of-bounds read in libiscsi module kernel: heap buffer overflow in the iSCSI subsystem
|
[
"cpe:/o:redhat:enterprise_linux:7::server"
] | null | 7.8 | null | null |
RHSA-2024:8842
|
Red Hat Security Advisory: python3.12-urllib3 security update
|
urllib3: proxy-authorization request header is not stripped during cross-origin redirects
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 4.4 | null | null |
RHSA-2020:3817
|
Red Hat Security Advisory: AMQ Clients 2.8.0 Release
|
log4j: improper validation of certificate with host mismatch in SMTP appender jackson-databind: Serialization gadgets in org.apache.openjpa.ee.WASRegistryManagedRuntime wildfly: Some EJB transaction objects may get accumulated causing Denial of Service wildfly: EJB SessionOpenInvocations may not be removed properly after a response is received causing Denial of Service
|
[
"cpe:/a:redhat:a_mq_clients:2::el6",
"cpe:/a:redhat:a_mq_clients:2::el7",
"cpe:/a:redhat:a_mq_clients:2::el8"
] | null | 6.5 | null | null |
RHSA-2023:6264
|
Red Hat Security Advisory: insights-client security update
|
insights-client: unsafe handling of temporary files and directories
|
[
"cpe:/a:redhat:rhel_aus:8.2::appstream",
"cpe:/a:redhat:rhel_e4s:8.2::appstream",
"cpe:/a:redhat:rhel_tus:8.2::appstream"
] | null | 7.8 | null | null |
RHSA-2007:0936
|
Red Hat Security Advisory: kernel security update
|
x86_64 syscall vulnerability
|
[
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2021:3431
|
Red Hat Security Advisory: go-toolset-1.15-golang security update
|
golang: net: incorrect parsing of extraneous zero characters at the beginning of an IP address octet golang: net: lookup functions may return invalid host names golang: net/http/httputil: ReverseProxy forwards connection headers if first one is empty
|
[
"cpe:/a:redhat:devtools:2021"
] | null | 5.3 | null | null |
RHSA-2024:8700
|
Red Hat Security Advisory: OpenShift Container Platform 4.14.40 packages and security update
|
buildah: Buildah allows arbitrary directory mount Podman: Buildah: CRI-O: symlink traversal vulnerability in the containers/storage library can cause Denial of Service (DoS) go/parser: golang: Calling any of the Parse functions containing deeply nested literals can cause a panic/stack exhaustion encoding/gob: golang: Calling Decoder.Decode on a message which contains deeply nested structures can cause a panic due to stack exhaustion go/build/constraint: golang: Calling Parse on a "// +build" build tag line with deeply nested expressions can cause a panic due to stack exhaustion
|
[
"cpe:/a:redhat:openshift:4.14::el8",
"cpe:/a:redhat:openshift:4.14::el9"
] | null | 5.9 | null | null |
RHSA-2004:007
|
Red Hat Security Advisory: : : : Updated tcpdump packages fix various vulnerabilities
|
security flaw security flaw security flaw
|
[
"cpe:/o:redhat:linux:9"
] | null | null | null | null |
RHSA-2019:4071
|
Red Hat Security Advisory: Red Hat Process Automation Manager 7.5.1 Security Update
|
knockout: Cross-site Scripting (XSS) attacks due to not escaping the name attribute. angular: Cross-site Scripting (XSS) due to no proper sanitization of xlink:href attributes
|
[
"cpe:/a:redhat:jboss_enterprise_bpms_platform:7.5"
] | null | null | 7.1 | null |
RHSA-2015:0846
|
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 6.4.0 update
|
CLI: Insecure default permissions on history file mod_jk: information leak due to incorrect JkMount/JkUnmount directives processing wss4j: Apache WSS4J is vulnerable to Bleichenbacher's attack (incomplete fix for CVE-2011-2487) wss4j: Apache WSS4J doesn't correctly enforce the requireSignedEncryptedDataElements property PicketLink: SP does not take Audience condition of a SAML assertion into account mod_cluster: JavaScript code injection is possible via MCMP mod_manager messages PicketLink: Lack of validation for the Destination attribute in a Response element in a SAML assertion
|
[
"cpe:/a:redhat:jboss_enterprise_application_platform:6::el5"
] | null | 6.3 | null | null |
RHSA-2015:0795
|
Red Hat Security Advisory: qemu-kvm-rhev security update
|
qemu: cirrus: insufficient blit region checks
|
[
"cpe:/a:redhat:openstack:5::el7"
] | null | null | null | null |
RHSA-2020:3421
|
Red Hat Security Advisory: .NET Core 3.1 security and bugfix update for Red Hat Enterprise Linux
|
dotnet: ASP.NET Core Resource Consumption Denial of Service
|
[
"cpe:/a:redhat:rhel_dotnet:3.1::el7"
] | null | 7.5 | null | null |
RHSA-2022:0318
|
Red Hat Security Advisory: Red Hat OpenShift distributed tracing 2.1.0 security update
|
golang: net: incorrect parsing of extraneous zero characters at the beginning of an IP address octet golang: net/http/httputil: panic due to racy read of persistConn after handler panic
|
[
"cpe:/a:redhat:openshift_distributed_tracing:2.1::el8"
] | null | 5.9 | null | null |
RHSA-2013:0128
|
Red Hat Security Advisory: conga security, bug fix, and enhancement update
|
conga: insecure handling of luci web interface sessions
|
[
"cpe:/a:redhat:rhel_cluster:5"
] | null | null | null | null |
RHSA-2015:0643
|
Red Hat Security Advisory: qemu-kvm-rhev security update
|
qemu: cirrus: insufficient blit region checks
|
[
"cpe:/a:redhat:openstack:6::el7"
] | null | null | null | null |
RHBA-2023:0452
|
Red Hat Bug Fix Advisory: rpm
|
kubernetes: node address isn't always verified when proxying
|
[
"cpe:/a:redhat:openshift:4.12::el8"
] | null | 8.8 | null | null |
RHSA-2013:1844
|
Red Hat Security Advisory: Red Hat JBoss Web Framework Kit 2.4.0 update
|
Solr: XML eXternal Entity (XXE) flaw in XML and XSLT UpdateRequestHandler Solr: directory traversal when loading XSL stylesheets and Velocity templates Solr: XML eXternal Entity (XXE) flaw in XML and XSLT UpdateRequestHandler Solr: XML eXternal Entity (XXE) flaw in DocumentAnalysisRequestHandler
|
[
"cpe:/a:redhat:jboss_enterprise_web_framework:2.4.0"
] | null | null | null | null |
RHSA-2020:2761
|
Red Hat Security Advisory: chromium-browser security update
|
chromium-browser: Use after free in extensions
|
[
"cpe:/a:redhat:rhel_extras:6"
] | null | 8.8 | null | null |
RHSA-2023:3914
|
Red Hat Security Advisory: Red Hat OpenShift Enterprise security update
|
golang: math/big: uncontrolled memory consumption due to an unhandled overflow via Rat.SetString golang: encoding/pem: fix stack overflow in Decode golang: crypto/elliptic: panic caused by oversized scalar golang: crypto/tls: session tickets lack random ticket_age_add golang: net/http: excessive memory growth in a Go server accepting HTTP/2 requests openshift: OCP & FIPS mode golang: html/template: improper handling of JavaScript whitespace
|
[
"cpe:/a:redhat:openshift:4.11::el8"
] | null | 8.1 | null | null |
RHSA-2024:0474
|
Red Hat Security Advisory: tomcat security update
|
tomcat: Open Redirect vulnerability in FORM authentication tomcat: FileUpload: DoS due to accumulation of temporary files on Windows tomcat: improper cleaning of recycled objects could lead to information leak tomcat: incorrectly parsed http trailer headers can cause request smuggling
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 5.3 | null | null |
RHSA-2011:0374
|
Red Hat Security Advisory: thunderbird security and bug fix update
|
An updated thunderbird package that fixes one security issue and one bug is
now available for Red Hat Enterprise Linux 4, 5, and 6.
The Red Hat Security Response Team has rated this update as having
important security impact.
|
[
"cpe:/a:redhat:rhel_productivity:5",
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws",
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2024:8034
|
Red Hat Security Advisory: firefox security update
|
firefox: Use-after-free in Animation timeline (128.3.1 ESR Chemspill)
|
[
"cpe:/o:redhat:rhel_els:7"
] | null | 9.8 | null | null |
RHSA-2012:1060
|
Red Hat Security Advisory: cobbler security update
|
cobbler: command injection flaw in the power management XML-RPC API
|
[
"cpe:/a:redhat:network_satellite:5.4::el5",
"cpe:/a:redhat:network_satellite:5.4::el6"
] | null | null | null | null |
RHSA-2011:1384
|
Red Hat Security Advisory: java-1.6.0-sun security update
|
HTTPS: block-wise chosen-plaintext attack against SSL/TLS (BEAST) JDK: unspecified vulnerability fixed in 6u29 (Deployment) OpenJDK: IIOP deserialization code execution (Deserialization, 7055902) OpenJDK: missing SecurityManager checks in scripting engine (Scripting, 7046823) JDK: unspecified vulnerability fixed in 6u29 (Sound) JDK: unspecified vulnerability fixed in 6u29 (Deployment) OpenJDK: InputStream skip() information leak (Networking/IO, 7000600) OpenJDK: mutable static AWTKeyStroke.ctor (AWT, 7019773) JDK: unspecified vulnerability fixed in 6u29 (Swing) JDK: unspecified vulnerability fixed in 6u29 (AWT) OpenJDK: Java2D TransformHelper integer overflow (2D, 7023640) OpenJDK: excessive default UDP socket limit under SecurityManager (Networking, 7032417) OpenJDK: JAX-WS stack-traces information leak (JAX-WS, 7046794) OpenJDK: insufficient pack200 JAR files uncompress error checks (Runtime, 7057857) OpenJDK: RMI DGC server remote code execution (RMI, 7077466) OpenJDK: RMI registry privileged code execution (RMI, 7083012) OpenJDK: Hotspot unspecified issue (Hotspot, 7070134) OpenJDK: missing checkSetFactory calls in HttpsURLConnection (JSSE, 7096936) JDK: unspecified vulnerability fixed in 6u29 (Deployment)
|
[
"cpe:/a:redhat:rhel_extras:4",
"cpe:/a:redhat:rhel_extras:5::client",
"cpe:/a:redhat:rhel_extras:5::server",
"cpe:/a:redhat:rhel_extras:6"
] | null | null | null | null |
RHSA-2023:4058
|
Red Hat Security Advisory: .NET 7.0 security, bug fix, and enhancement update
|
dotnet: race condition in Core SignInManager<TUser> PasswordSignInAsync method
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb"
] | null | 8.1 | null | null |
RHSA-2021:0295
|
Red Hat Security Advisory: Red Hat build of Thorntail 2.7.3 security and bug fix update
|
resteasy-client: potential sensitive information leakage in JAX-RS RESTEasy Client's WebApplicationException handling wildfly: resource adapter logs plaintext JMS password at warning level on connection error wildfly-core: memory leak in WildFly host-controller in domain mode while not able to reconnect to domain-controller undertow: special character in query results in server errors wildfly: Potential Memory leak in Wildfly when using OpenTracing
|
[
"cpe:/a:redhat:openshift_application_runtimes:1.0"
] | null | 5.9 | null | null |
RHSA-2022:6322
|
Red Hat Security Advisory: OpenShift Container Platform 4.7.59 bug fix and security update
|
grafana: Snapshot authentication bypass
|
[
"cpe:/a:redhat:openshift:4.7::el8"
] | null | 7.3 | null | null |
RHSA-2016:2938
|
Red Hat Security Advisory: Red Hat JBoss BRMS security update
|
Workbench: Path traversal vulnerability
|
[
"cpe:/a:redhat:jboss_enterprise_brms_platform:6.3"
] | null | null | 6.5 | null |
RHSA-2022:4773
|
Red Hat Security Advisory: thunderbird security update
|
Mozilla: Untrusted input used in JavaScript object indexing, leading to prototype pollution Mozilla: Prototype pollution in Top-Level Await implementation
|
[
"cpe:/a:redhat:rhel_eus:8.2::appstream"
] | null | null | 8.8 | null |
RHSA-2020:0101
|
Red Hat Security Advisory: go-toolset-1.12-golang security update
|
golang: HTTP/1.1 headers with a space before the colon leads to filter bypass or request smuggling golang: invalid public key causes panic in dsa.Verify
|
[
"cpe:/a:redhat:devtools:2019"
] | null | 7.5 | 6.5 | null |
RHSA-2013:0782
|
Red Hat Security Advisory: openssl security update
|
openssl: DoS due to improper handling of OCSP response verification SSL/TLS: CBC padding timing attack (lucky-13)
|
[
"cpe:/a:redhat:jboss_enterprise_web_platform:5.2.0"
] | null | null | null | null |
RHSA-2024:4079
|
Red Hat Security Advisory: [23.1] Security update for the 23.1 release (RPMs)
|
graalvm: Unauthorized Read Access graalvm: unauthorized ability to cause a partial denial of service
|
[
"cpe:/a:redhat:quarkus:3.8::el8"
] | null | 3.7 | null | null |
RHSA-2023:1912
|
Red Hat Security Advisory: OpenJDK 8u372 Windows Security Update
|
OpenJDK: improper connection handling during TLS handshake (8294474) OpenJDK: missing string checks for NULL characters (8296622) OpenJDK: incorrect handling of NULL characters in ProcessBuilder (8295304) OpenJDK: Swing HTML parsing issue (8296832) OpenJDK: incorrect enqueue of references in garbage collector (8298191) OpenJDK: certificate validation issue in TLS session negotiation (8298310) OpenJDK: missing check for slash characters in URI-to-path conversion (8298667)
|
[
"cpe:/a:redhat:openjdk:1.8::windows"
] | null | 3.7 | null | null |
RHSA-2022:0842
|
Red Hat Security Advisory: Release of containers for OSP 16.2 director operator tech preview
|
golang: net/http: limit growth of header canonicalization cache
|
[
"cpe:/a:redhat:openstack:16.2::el8"
] | null | 7.5 | null | null |
RHSA-2023:6290
|
Red Hat Security Advisory: python security update
|
python: TLS handshake bypass
|
[
"cpe:/o:redhat:rhel_els:6"
] | null | 8.6 | null | null |
RHSA-2024:3919
|
Red Hat Security Advisory: Migration Toolkit for Runtimes security, bug fix and enhancement update
|
undertow: Cookie Smuggling/Spoofing css-tools: Improper Input Validation causes Denial of Service via Regular Expression jetty: Improper addition of quotation marks to user inputs in CgiServlet css-tools: regular expression denial of service (ReDoS) when parsing CSS keycloak: path transversal in redirection validation
|
[
"cpe:/a:redhat:migration_toolkit_runtimes:1.0::el8"
] | null | 8.1 | null | null |
RHSA-2024:5630
|
Red Hat Security Advisory: krb5 security update
|
krb5: GSS message token handling krb5: GSS message token handling
|
[
"cpe:/a:redhat:rhel_e4s:9.0::appstream",
"cpe:/o:redhat:rhel_e4s:9.0::baseos"
] | null | 6.5 | null | null |
RHSA-2007:0486
|
Red Hat Security Advisory: mod_perl security update
|
mod_perl PerlRun denial of service
|
[
"cpe:/o:redhat:enterprise_linux:2.1::as",
"cpe:/o:redhat:enterprise_linux:2.1::aw",
"cpe:/o:redhat:enterprise_linux:2.1::es",
"cpe:/o:redhat:enterprise_linux:2.1::ws"
] | null | null | null | null |
RHBA-2020:0769
|
Red Hat Bug Fix Advisory: Red Hat OpenStack Platform 13 bug fix and enhancement advisory
|
dpdk: possible memory leak leads to denial of service
|
[
"cpe:/a:redhat:openstack:13::el7"
] | null | null | 7.5 | null |
RHSA-2018:0003
|
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.0.9 security update
|
RESTEasy: Abuse of GZIPInterceptor in RESTEasy can lead to denial of service attack undertow: HTTP Request smuggling vulnerability (incomplete fix of CVE-2017-2666) resteasy: Vary header not added by CORS filter leading to cache poisoning undertow: improper whitespace parsing leading to potential HTTP request smuggling EAP-7: Wrong privileges on multiple property files jboss: unsafe chown of server.log in jboss init script allows privilege escalation (Incomplete fix for CVE-2016-8656) Solr: Code execution via entity expansion
|
[
"cpe:/a:redhat:jboss_enterprise_application_platform:7"
] | null | null | 9.8 | null |
RHSA-2003:236
|
Red Hat Security Advisory: kdelibs security update
|
security flaw
|
[
"cpe:/o:redhat:enterprise_linux:2.1::as",
"cpe:/o:redhat:enterprise_linux:2.1::aw",
"cpe:/o:redhat:enterprise_linux:2.1::es",
"cpe:/o:redhat:enterprise_linux:2.1::ws"
] | null | null | null | null |
RHSA-2023:7344
|
Red Hat Security Advisory: openshift-gitops-kam security update
|
golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487) HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack)
|
[
"cpe:/a:redhat:openshift_gitops:1.9::el9"
] | null | 7.5 | null | null |
RHSA-2020:4751
|
Red Hat Security Advisory: httpd:2.4 security, bug fix, and enhancement update
|
httpd: mod_http2: DoS via slow, unneeded request bodies httpd: mod_http2: read-after-free on a string compare httpd: mod_http2: possible crash on late upgrade httpd: memory corruption on early pushes httpd: read-after-free in h2 connection shutdown httpd: limited cross-site scripting in mod_proxy error page httpd: null-pointer dereference in mod_remoteip httpd: mod_rewrite potential open redirect httpd: mod_rewrite configurations vulnerable to open redirect httpd: mod_proxy_ftp use of uninitialized value
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 3.7 | 3.7 | null |
RHSA-2023:7783
|
Red Hat Security Advisory: postgresql security update
|
postgresql: Buffer overrun from integer overflow in array modification
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 8.8 | null | null |
RHSA-2015:1666
|
Red Hat Security Advisory: httpd24-httpd security update
|
httpd: Possible mod_lua crash due to websocket bug httpd: NULL pointer dereference crash with ErrorDocument 400 pointing to a local URL-path httpd: HTTP request smuggling attack against chunked request parser httpd: ap_some_auth_required() does not properly indicate authenticated request in 2.4
|
[
"cpe:/a:redhat:rhel_software_collections:2::el6",
"cpe:/a:redhat:rhel_software_collections:2::el7"
] | null | null | 3.7 | null |
RHSA-2013:0253
|
Red Hat Security Advisory: openstack-keystone security and bug fix update
|
Keystone: denial of service through invalid token requests
|
[
"cpe:/a:redhat:openstack:2::el6"
] | null | null | null | null |
RHSA-2024:2066
|
Red Hat Security Advisory: buildah security update
|
buildah: full container escape at build time
|
[
"cpe:/a:redhat:rhel_eus:9.0::appstream"
] | null | 8.6 | null | null |
RHSA-2022:6820
|
Red Hat Security Advisory: prometheus-jmx-exporter security update
|
snakeyaml: Denial of Service due to missing nested depth limitation for collections
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 7.5 | null | null |
RHSA-2016:1838
|
Red Hat Security Advisory: JBoss Enterprise Application Platform 7.0.2 on RHEL 6
|
jakarta-taglibs-standard: XXE and RCE via XSL extension in JSTL XML tags eap: HTTP header injection / response splitting EAP7 Privilege escalation when managing domain including earlier version slaves
|
[
"cpe:/a:redhat:jboss_enterprise_application_platform:7::el6"
] | null | null | 7.5 | null |
RHSA-2024:8728
|
Red Hat Security Advisory: thunderbird security update
|
firefox: thunderbird: Permission leak via embed or object elements firefox: thunderbird: Use-after-free in layout with accessibility firefox: thunderbird: Confusing display of origin for external protocol handler prompt firefox: thunderbird: XSS due to Content-Disposition being ignored in multipart/x-mixed-replace response firefox: thunderbird: Origin of permission prompt could be spoofed by long URL firefox: thunderbird: Cross origin video frame leak firefox: thunderbird: History interface could have been used to cause a Denial of Service condition in the browser firefox: thunderbird: Clipboard "paste" button persisted across tabs firefox: DOM push subscription message could hang Firefox firefox: thunderbird: Memory safety bugs fixed in Firefox 132, Thunderbird 132, Firefox ESR 128.4, and Thunderbird 128.4
|
[
"cpe:/a:redhat:rhel_eus:9.2::appstream"
] | null | 8.8 | null | null |
RHBA-2019:4047
|
Red Hat Bug Fix Advisory: CloudForms 4.7.13 bug fix and enhancement update
|
cfme: rubygem-rubyzip denial of service via crafted ZIP file
|
[
"cpe:/a:redhat:cloudforms_managementengine:5.10::el7"
] | null | null | 5.5 | null |
RHSA-2020:4992
|
Red Hat Security Advisory: bind security update
|
bind: truncated TSIG response can lead to an assertion failure bind: remotely triggerable assertion failure in pk11.c
|
[
"cpe:/o:redhat:rhel_eus:7.6::computenode",
"cpe:/o:redhat:rhel_eus:7.6::server"
] | null | 7.5 | null | null |
RHSA-2015:0043
|
Red Hat Security Advisory: kernel security and bug fix update
|
kernel: sctp: skb_over_panic when receiving malformed ASCONF chunks kernel: net: sctp: fix panic on duplicate ASCONF chunks kernel: net: sctp: remote memory pressure from excessive queueing
|
[
"cpe:/o:redhat:rhel_eus:6.4::computenode",
"cpe:/o:redhat:rhel_eus:6.4::server"
] | null | null | null | null |
RHSA-2024:0416
|
Red Hat Security Advisory: ncurses security update
|
ncurses: Local users can trigger security-relevant memory corruption via malformed data
|
[
"cpe:/o:redhat:rhel_eus:8.6::baseos"
] | null | 7.8 | null | null |
RHSA-2019:1259
|
Red Hat Security Advisory: dotnet security, bug fix, and enhancement update
|
dotnet: NuGet Tampering Vulnerability dotnet: timeouts for regular expressions are not enforced dotnet: infinite loop in Uri.TryCreate leading to ASP.Net Core Denial of Service dotnet: crash in IPAddress.TryCreate leading to ASP.Net Core Denial of Service
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | null | 7.5 | null |
RHSA-2017:0180
|
Red Hat Security Advisory: java-1.8.0-openjdk security update
|
OpenJDK: incorrect ECDSA signature extraction from the DER input (Libraries, 8168714) OpenJDK: missing ObjectIdentifier length check (Libraries, 8168705) OpenJDK: DSA implementation timing attack (Libraries, 8168728) OpenJDK: incorrect URL parsing in URLStreamHandler (Networking, 8167223) OpenJDK: URLClassLoader insufficient access control checks (Networking, 8151934) OpenJDK: untrusted input deserialization in RMI registry and DCG (RMI, 8156802) OpenJDK: LdapLoginModule incorrect userDN extraction (JAAS, 8161743) OpenJDK: imageio PNGImageReader failed to honor ignoreMetadata for iTXt and zTXt chunks (2D, 8166988) OpenJDK: integer overflow in SocketOutputStream boundary check (Networking, 8164147) OpenJDK: insufficient protected field access checks in atomic field updaters (Libraries, 8165344) OpenJDK: insecure class construction (Hotspot, 8167104)
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation",
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 8.8 | null |
RHSA-2005:306
|
Red Hat Security Advisory: ethereal security update
|
security flaw security flaw security flaw security flaw security flaw security flaw
|
[
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws"
] | null | null | null | null |
RHSA-2022:5224
|
Red Hat Security Advisory: kernel-rt security and bug fix update
|
kernel: the copy-on-write implementation can grant unintended write access because of a race condition in a THP mapcount check kernel: Small table perturb size in the TCP source port generation algorithm can lead to information leak kernel: race condition in perf_event_open leads to privilege escalation kernel: netfilter: nf_tables: incorrect NFT_STATEFUL_EXPR check leads to a use-after-free (write) kernel: buffer overflow in IPsec ESP transformation code kernel: a use-after-free write in the netfilter subsystem can lead to privilege escalation to root
|
[
"cpe:/a:redhat:rhel_eus:8.2::nfv",
"cpe:/a:redhat:rhel_eus:8.2::realtime"
] | null | 7.8 | null | null |
RHSA-2024:5094
|
Red Hat Security Advisory: Red Hat OpenShift Service Mesh Containers for 2.6.0 security update
|
moby: cert signing bypass quic-go: memory exhaustion attack against QUIC's connection ID mechanism golang: archive/zip: Incorrect handling of certain ZIP files jose: resource exhaustion
|
[
"cpe:/a:redhat:service_mesh:2.6::el8",
"cpe:/a:redhat:service_mesh:2.6::el9"
] | null | 5.3 | null | null |
RHSA-2022:1136
|
Red Hat Security Advisory: httpd security update
|
httpd: mod_lua: Possible buffer overflow when parsing multipart content httpd: Errors encountered during the discarding of request body lead to HTTP request smuggling
|
[
"cpe:/o:redhat:rhel_aus:7.6::server",
"cpe:/o:redhat:rhel_e4s:7.6::server",
"cpe:/o:redhat:rhel_tus:7.6::server"
] | null | 8.3 | null | null |
RHSA-2024:2159
|
Red Hat Security Advisory: python3.11-urllib3 security update
|
python-urllib3: Cookie request header isn't stripped during cross-origin redirects
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 5.9 | null | null |
RHSA-2004:577
|
Red Hat Security Advisory: libtiff security update
|
security flaw security flaw security flaw security flaw
|
[
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws"
] | null | null | null | null |
RHSA-2017:1854
|
Red Hat Security Advisory: pidgin security, bug fix, and enhancement update
|
pidgin: SSL/TLS plug-ins failed to check Basic Constraints pidgin: crash in Mxit protocol plug-in pidgin: denial of service parsing Groupwise server message pidgin: remote information leak via crafted XMPP message pidgin: Out-of-bounds write in purple_markup_unescape_entity triggered by invalid XML
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 7.5 | null |
RHSA-2009:1472
|
Red Hat Security Advisory: xen security and bug fix update
|
Xen: PyGrub missing support for password configuration command
|
[
"cpe:/a:redhat:rhel_virtualization:5::client",
"cpe:/a:redhat:rhel_virtualization:5::server",
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2022:2198
|
Red Hat Security Advisory: rsync security update
|
zlib: A flaw found in zlib when compressing (not decompressing) certain inputs
|
[
"cpe:/o:redhat:rhel_eus:8.4::baseos"
] | null | 8.2 | null | null |
RHSA-2023:0769
|
Red Hat Security Advisory: OpenShift Container Platform 4.12.4 security update
|
golang: net/http: excessive memory growth in a Go server accepting HTTP/2 requests
|
[
"cpe:/a:redhat:openshift:4.12::el8"
] | null | 5.3 | null | null |
RHSA-2017:3270
|
Red Hat Security Advisory: apr security update
|
apr: Out-of-bounds array deref in apr_time_exp*() functions
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation",
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 7.4 | null |
RHSA-2023:4953
|
Red Hat Security Advisory: thunderbird security update
|
An update for thunderbird is now available for Red Hat Enterprise Linux 8.6 Extended Update Support.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
|
[
"cpe:/a:redhat:rhel_eus:8.6::appstream"
] | null | null | null | null |
RHSA-2018:3837
|
Red Hat Security Advisory: ansible security and bug fix update
|
ansible: Information disclosure in vvv+ mode with no_log on
|
[
"cpe:/a:redhat:ansible_engine:2.7::el7"
] | null | 5.3 | null | null |
RHSA-2012:0325
|
Red Hat Security Advisory: jbossweb security update
|
tomcat: Multiple weaknesses in HTTP DIGEST authentication tomcat: security manager restrictions bypass JBoss Web remote denial of service when surrogate pair character is placed at buffer boundary tomcat: hash table collisions CPU usage DoS (oCERT-2011-003) tomcat: Multiple weaknesses in HTTP DIGEST authentication tomcat: Multiple weaknesses in HTTP DIGEST authentication tomcat: Multiple weaknesses in HTTP DIGEST authentication tomcat: large number of parameters DoS
|
[
"cpe:/a:redhat:jboss_enterprise_brms_platform:5.1",
"cpe:/a:redhat:jboss_enterprise_portal_platform:5.2",
"cpe:/a:redhat:jboss_soa_platform:5.2"
] | null | null | null | null |
RHSA-2025:2957
|
Red Hat Security Advisory: thunderbird security update
|
firefox: thunderbird: Memory safety bugs fixed in Firefox 136, Thunderbird 136, Firefox ESR 115.21, Firefox ESR 128.8, and Thunderbird 128.8 firefox: thunderbird: Memory safety bugs fixed in Firefox 136, Thunderbird 136, Firefox ESR 128.8, and Thunderbird 128.8
|
[
"cpe:/a:redhat:rhel_eus:9.4::appstream"
] | null | 8.8 | null | null |
RHSA-2016:1094
|
Red Hat Security Advisory: Red Hat OpenShift Enterprise 3.2 security update
|
3: Untrusted content loaded via the API proxy can access web console credentials on the same domain 3: s2i builds implicitly perform docker builds origin: pod update allows docker socket access via build-pod
|
[
"cpe:/a:redhat:openshift:3.2::el7"
] | null | null | null | null |
RHSA-2021:3635
|
Red Hat Security Advisory: OpenShift Container Platform 4.7.32 packages and security update
|
kubernetes: Symlink exchange can allow host filesystem access
|
[
"cpe:/a:redhat:openshift:4.7::el7",
"cpe:/a:redhat:openshift:4.7::el8"
] | null | 8.8 | null | null |
RHSA-2016:2089
|
Red Hat Security Advisory: java-1.7.0-oracle security update
|
OpenJDK: missing algorithm restrictions for jar verification (Libraries, 8155973) OpenJDK: insufficient classloader consistency checks in ClassLoaderWithRepository (JMX, 8157739) JDK: unspecified vulnerability fixed in 6u131, 7u121, and 8u111 (2D) OpenJDK: insufficient checks of JDWP packets (Hotspot, 8159519) OpenJDK: incomplete type checks of System.arraycopy arguments (Hotspot, 8160591) OpenJDK: exposure of server authentication credentials to proxy (Networking, 8160838)
|
[
"cpe:/a:redhat:rhel_extras_oracle_java:5",
"cpe:/a:redhat:rhel_extras_oracle_java:6",
"cpe:/a:redhat:rhel_extras_oracle_java:7"
] | null | null | 5.3 | null |
RHSA-2011:1791
|
Red Hat Security Advisory: squid security update
|
squid: Invalid free by processing CNAME DNS record pointing to another CNAME record pointing to an empty A-record
|
[
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2020:4609
|
Red Hat Security Advisory: kernel-rt security and bug fix update
|
kernel: kernel pointer leak due to WARN_ON statement in video driver leads to local information disclosure kernel: use after free due to race condition in the video driver leads to local privilege escalation kernel: use-after-free in drivers/bluetooth/hci_ldisc.c kernel: out-of-bounds access in function hclge_tm_schd_mode_vnet_base_cfg kernel: null-pointer dereference in drivers/net/fjes/fjes_main.c kernel: null pointer dereference in drivers/scsi/qla2xxx/qla_os.c kernel: memory leak in ccp_run_sha_cmd() function in drivers/crypto/ccp/ccp-ops.c kernel: memory leak in af9005_identify_state() function in drivers/media/usb/dvb-usb/af9005.c kernel: Denial Of Service in the __ipmi_bmc_register() function in drivers/char/ipmi/ipmi_msghandler.c kernel: A memory leak in the mwifiex_pcie_alloc_cmdrsp_buf() function in drivers/net/wireless/marvell/mwifiex/pcie.c allows to cause DoS kernel: memory leak in the crypto_report() function in crypto/crypto_user_base.c allows for DoS kernel: Two memory leaks in the rtl_usb_probe() function in drivers/net/wireless/realtek/rtlwifi/usb.c allow for a DoS kernel: A memory leak in the rtl8xxxu_submit_int_urb() function in drivers/net/wireless/realtek/rtl8xxxu/rtl8xxxu_core.c allows for a DoS kernel: A memory leak in the predicate_parse() function in kernel/trace/trace_events_filter.c allows for a DoS kernel: out-of-bounds write in ext4_xattr_set_entry in fs/ext4/xattr.c Kernel: kvm: OOB memory write via kvm_dev_ioctl_get_cpuid kernel: mounting a crafted ext4 filesystem image, performing some operations, and unmounting can lead to a use-after-free in ext4_put_super in fs/ext4/super.c kernel: a malicious USB device in the drivers/input/ff-memless.c leads to use-after-free kernel: information leak bug caused by a malicious USB device in the drivers/media/usb/ttusb-dec/ttusb_dec.c kernel: race condition caused by a malicious USB device in the USB character device driver layer kernel: use-after-free in serial_ir_init_module() in drivers/media/rc/serial_ir.c kernel: use-after-free in __ext4_expand_extra_isize and ext4_xattr_set_entry related to fs/ext4/inode.c and fs/ext4/super.c kernel: use-after-free in debugfs_remove in fs/debugfs/inode.c kernel: Null pointer dereference in drop_sysctl_table() in fs/proc/proc_sysctl.c kernel: out-of-bounds write via crafted keycode table kernel: possible use-after-free due to a race condition in cdev_get of char_dev.c kernel: out-of-bounds read in in vc_do_resize function in drivers/tty/vt/vt.c kernel: use-after-free in n_tty_receive_buf_common function in drivers/tty/n_tty.c kernel: invalid read location in vgacon_invert_region function in drivers/video/console/vgacon.c kernel: uninitialized kernel data leak in userspace coredumps kernel: SELinux netlink permission check bypass kernel: possibility of memory disclosure when reading the file /proc/sys/kernel/rh_features kernel: vhost-net: stack overflow in get_raw_socket while checking sk_family field kernel: out-of-bounds write in mpol_parse_str function in mm/mempolicy.c kernel: mishandles invalid descriptors in drivers/media/usb/gspca/xirlink_cit.c kernel: sync of excessive duration via an XFS v5 image with crafted metadata kernel: xdp_umem_reg in net/xdp/xdp_umem.c has an out-of-bounds write which could result in crash and data coruption kernel: sg_write function lacks an sg_remove_request call in a certain failure case kernel: possible to send arbitrary signals to a privileged (suidroot) parent process kernel: referencing inode of removed superblock in get_futex_key() causes UAF kernel: soft-lockups in iov_iter_copy_from_user_atomic() could result in DoS kernel: use-after-free in route4_change() in net/sched/cls_route.c
|
[
"cpe:/a:redhat:enterprise_linux:8::nfv",
"cpe:/a:redhat:enterprise_linux:8::realtime"
] | null | 7.8 | 4.6 | null |
RHSA-2021:0381
|
Red Hat Security Advisory: RHV-M(ovirt-engine) 4.4.z security, bug fix, enhancement update [ovirt-4.4.4]
|
jackson-databind: FasterXML DOMDeserializer insecure entity expansion is vulnerable to XML external entity (XXE)
|
[
"cpe:/a:redhat:rhev_manager:4.4:el8"
] | null | 7.5 | null | null |
RHSA-2021:0689
|
Red Hat Security Advisory: kpatch-patch security update
|
kernel: bad kfree in auditfilter.c may lead to escalation of privilege kernel: locking issue in drivers/tty/tty_jobctrl.c can lead to an use-after-free
|
[
"cpe:/o:redhat:rhel_eus:8.1::baseos"
] | null | 7.8 | null | null |
RHSA-2024:4321
|
Red Hat Security Advisory: OpenShift Container Platform 4.15.21 bug fix and security update
|
go-retryablehttp: url might write sensitive information to log file
|
[
"cpe:/a:redhat:openshift:4.15::el8",
"cpe:/a:redhat:openshift:4.15::el9"
] | null | 6 | null | null |
RHSA-2007:0067
|
Red Hat Security Advisory: postgresql security update
|
security flaw security flaw New version fixes three different crash vulnerabilities security flaw security flaw
|
[
"cpe:/a:redhat:rhel_application_stack:1"
] | null | null | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.