id
stringlengths 13
15
| title
stringlengths 29
176
| description
stringlengths 8
32.1k
| cpes
listlengths 0
20
| cvss_v4_0
null | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
null |
---|---|---|---|---|---|---|---|
RHSA-2014:0770
|
Red Hat Security Advisory: foreman-proxy security update
|
foreman-proxy: smart-proxy remote command injection
|
[
"cpe:/a:redhat:openstack:3::el6",
"cpe:/a:redhat:openstack:4::el6"
] | null | null | null | null |
RHSA-2023:6194
|
Red Hat Security Advisory: thunderbird security update
|
Mozilla: Queued up rendering could have allowed websites to clickjack Mozilla: Large WebGL draw could have led to a crash Mozilla: WebExtensions could open arbitrary URLs Mozilla: Improper object tracking during GC in the JavaScript engine could have led to a crash. Mozilla: Memory safety bugs fixed in Firefox 119, Firefox ESR 115.4, and Thunderbird 115.4 Mozilla: Address bar spoofing via bidirectional characters libvpx: crash related to VP9 encoding in libvpx
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 7.5 | null | null |
RHSA-2024:4861
|
Red Hat Security Advisory: squid security update
|
squid: vulnerable to a Denial of Service attack against Cache Manager error responses squid: Out-of-bounds write error may lead to Denial of Service
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 6.3 | null | null |
RHSA-2019:3812
|
Red Hat Security Advisory: OpenShift Container Platform 3.9 cri-o security update
|
containers/image: not enforcing TLS when sending username+password credentials to token servers leading to credential disclosure
|
[
"cpe:/a:redhat:openshift:3.9::el7"
] | null | null | 6.4 | null |
RHSA-2016:1939
|
Red Hat Security Advisory: kernel security and bug fix update
|
kernel: challenge ACK counter information disclosure.
|
[
"cpe:/o:redhat:rhel_eus:6.6::computenode",
"cpe:/o:redhat:rhel_eus:6.6::server"
] | null | null | 4.8 | null |
RHSA-2020:4709
|
Red Hat Security Advisory: librsvg2 security update
|
librsvg: Resource exhaustion via crafted SVG file with nested patterns
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 6.5 | null | null |
RHSA-2025:0653
|
Red Hat Security Advisory: OpenShift Container Platform 4.17.14 security and extras update
|
golang.org/x/crypto/ssh: Misuse of ServerConfig.PublicKeyCallback may cause authorization bypass in golang.org/x/crypto golang.org/x/net/html: Non-linear parsing of case-insensitive content in golang.org/x/net/html
|
[
"cpe:/a:redhat:openshift:4.17::el9"
] | null | 7.5 | null | null |
RHSA-2005:803
|
Red Hat Security Advisory: lynx security update
|
CAN-2005-3120 lynx buffer overflow
|
[
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws",
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHBA-2019:2599
|
Red Hat Bug Fix Advisory: krb5 bug fix update
|
krb5: Reachable assertion in the KDC using S4U2Self requests
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 5.3 | null |
RHSA-2019:2029
|
Red Hat Security Advisory: kernel security, bug fix, and enhancement update
|
kernel: Information exposure in fd_locked_ioctl function in drivers/block/floppy.c kernel: Memory leak in drivers/net/wireless/mac80211_hwsim.c:hwsim_new_radio_nl() can lead to potential denial of service kernel: Buffer overflow in hidp_process_report kernel: HID: debug: Buffer overflow in hid_debug_events_read() in drivers/hid/hid-debug.c kernel: l2tp: Race condition between pppol2tp_session_create() and l2tp_eth_create() kernel: kvm: guest userspace to guest kernel write kernel: Integer overflow in the alarm_timer_nsleep function kernel: NULL pointer dereference in lookup_slow function kernel: NULL pointer dereference in xfs_da_shrink_inode function kernel: NULL pointer dereference in fs/xfs/libxfs/xfs_inode_buf.c kernel: use-after-free Read in vhost_transport_send_pkt kernel: use-after-free in ucma_leave_multicast in drivers/infiniband/core/ucma.c kernel: Mishandling of indirect calls weakens Spectre mitigation for paravirtual guests kernel: Information leak in cdrom_ioctl_drive_status kernel: out-of-bound read in memcpy_fromiovecend() kernel: TLB flush happens too late on mremap kernel: Use-after-free in sound/usb/card.c:usb_audio_probe() kernel: Heap address information leak while using L2CAP_GET_CONF_OPT kernel: Heap address information leak while using L2CAP_PARSE_CONF_RSP kernel: denial of service vector through vfio DMA mappings Kernel: vhost_net: infinite loop while receiving packets leads to DoS Kernel: page cache side channel attacks Kernel: KVM: leak of uninitialized stack contents to guest kernel: OOB write due to missing bounds check leads to local privilege escalation kernel: overlayfs: NULL pointer dereference in ovl_posix_acl_create function in fs/overlayfs/dir.c kernel: fix race condition between mmget_not_zero()/get_task_mm() and core dumping kernel: a NULL pointer dereference in drivers/scsi/megaraid/megaraid_sas_base.c leading to DoS kernel: fs/ext4/extents.c leads to information disclosure kernel: out-of-bounds in function build_audio_procunit in sound/usb/mixer.c
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 7.8 | 5.5 | null |
RHBA-2020:5307
|
Red Hat Bug Fix Advisory: openvswitch2.11 bug fix and enhancement update
|
lldpd: buffer overflow in the lldp_decode function in daemon/protocols/lldp.c
|
[
"cpe:/o:redhat:enterprise_linux:7::fastdatapath"
] | null | 9.8 | null | null |
RHSA-2025:1756
|
Red Hat Security Advisory: mysql security update
|
mysql: Thread Pooling unspecified vulnerability (CPU Jan 2025)
|
[
"cpe:/a:redhat:rhel_eus:9.4::appstream",
"cpe:/a:redhat:rhel_eus:9.4::crb"
] | null | 7.5 | null | null |
RHSA-2024:3268
|
Red Hat Security Advisory: krb5 security update
|
krb5: Memory leak at /krb5/src/lib/rpc/pmap_rmt.c krb5: Memory leak at /krb5/src/lib/gssapi/krb5/k5sealv3.c
|
[
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 5.9 | null | null |
RHSA-2014:1836
|
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 5.2.0 security update
|
CXF: SSL hostname verification bypass, incomplete CVE-2012-5783 fix CXF: SSL hostname verification bypass, incomplete CVE-2012-6153 fix
|
[
"cpe:/a:redhat:jboss_enterprise_application_platform:5.2.0"
] | null | null | 4.8 | null |
RHSA-2022:0818
|
Red Hat Security Advisory: firefox security update
|
expat: Malformed 2- and 3-byte UTF-8 sequences can lead to arbitrary code execution expat: Namespace-separator characters in "xmlns[:prefix]" attribute values can lead to arbitrary code execution expat: Integer overflow in storeRawNames() Mozilla: Use-after-free in text reflows Mozilla: Browser window spoof using fullscreen mode Mozilla: iframe allow-scripts sandbox bypass Mozilla: Temporary files downloaded to /tmp and accessible by other local users Mozilla: Time-of-check time-of-use bug when verifying add-on signatures Mozilla: Use-after-free in XSLT parameter processing Mozilla: Use-after-free in WebGPU IPC Framework
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 8.8 | 7.5 | null |
RHSA-2023:7845
|
Red Hat Security Advisory: Red Hat Integration Camel for Spring Boot 3.20.4 release and security update
|
JSON-java: parser confusion leads to OOM
|
[
"cpe:/a:redhat:camel_spring_boot:3.20.4"
] | null | 7.5 | null | null |
RHSA-2023:6200
|
Red Hat Security Advisory: Multicluster Engine for Kubernetes 2.1.9 security updates and bug fixes
|
golang: html/template: improper handling of HTML-like comments within script contexts golang: html/template: improper handling of special tags within script contexts golang: crypto/tls: panic when processing post-handshake message on QUIC connections golang: crypto/tls: lack of a limit on buffered post-handshake golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487) HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack)
|
[
"cpe:/a:redhat:multicluster_engine:2.1::el8"
] | null | 7.5 | null | null |
RHSA-2024:10858
|
Red Hat Security Advisory: ruby security update
|
rexml: REXML ReDoS vulnerability
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::crb"
] | null | 7.5 | null | null |
RHSA-2014:1689
|
Red Hat Security Advisory: openstack-nova security, bug fix, and enhancement update
|
openstack-nova: Nova VMware driver may connect VNC to another tenant's console
|
[
"cpe:/a:redhat:openstack:4::el6"
] | null | null | null | null |
RHSA-2013:1050
|
Red Hat Security Advisory: php53 security update
|
php: xml_parse_into_struct buffer overflow when parsing deeply nested XML
|
[
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2016:0074
|
Red Hat Security Advisory: bind97 security update
|
bind: specific APL data could trigger an INSIST in apl_42.c
|
[
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2024:6438
|
Red Hat Security Advisory: wget security update
|
wget: Misinterpretation of input may lead to improper behavior
|
[
"cpe:/a:redhat:rhel_eus:9.2::appstream"
] | null | 5.5 | null | null |
RHSA-2020:4464
|
Red Hat Security Advisory: libxslt security update
|
libxslt: xsltCheckRead and xsltCheckWrite routines security bypass by crafted URL libxslt: use after free in xsltCopyText in transform.c could lead to information disclosure
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 7.5 | 6.3 | null |
RHSA-2010:0556
|
Red Hat Security Advisory: firefox security update
|
Mozilla arbitrary free flaw
|
[
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2021:1562
|
Red Hat Security Advisory: OpenShift Container Platform 4.7.12 packages and security update
|
runc: vulnerable to symlink exchange attack
|
[
"cpe:/a:redhat:openshift:4.7::el7",
"cpe:/a:redhat:openshift:4.7::el8"
] | null | 7.5 | null | null |
RHSA-2024:6162
|
Red Hat Security Advisory: python-urllib3 security update
|
urllib3: proxy-authorization request header is not stripped during cross-origin redirects
|
[
"cpe:/o:redhat:enterprise_linux:9::baseos"
] | null | 4.4 | null | null |
RHSA-2022:7066
|
Red Hat Security Advisory: firefox security update
|
Mozilla: Same-origin policy violation could have leaked cross-origin URLs Mozilla: Memory Corruption in JS Engine Mozilla: Denial of Service via window.print Mozilla: Memory safety bugs fixed in Firefox ESR 102.4 and Thunderbird 102.4
|
[
"cpe:/a:redhat:rhel_e4s:8.1::appstream"
] | null | 8.8 | 6.1 | null |
RHSA-2011:1465
|
Red Hat Security Advisory: kernel security and bug fix update
|
kernel: tpm: infoleak kernel: corrupted GUID partition tables can cause kernel oops kernel: taskstats io infoleak kernel: ipv6: make fragment identifications less predictable kernel: perf tools: may parse user-controlled configuration file kernel: net: improve sequence number generation kernel: cifs: signedness issue in CIFSFindNext() kernel: fuse: check size of FUSE_NOTIFY_INVAL_ENTRY message kernel: b43: allocate receive buffers big enough for max frame len + offset kernel: cifs: always do is_path_accessible check in cifs_mount kernel: vlan: fix panic when handling priority tagged frames kernel: wrong headroom check in udp6_ufo_fragment()
|
[
"cpe:/o:redhat:enterprise_linux:6::server"
] | null | null | null | null |
RHSA-2011:1104
|
Red Hat Security Advisory: libpng security update
|
libpng: buffer overwrite in png_rgb_to_gray libpng: Invalid read when handling empty sCAL chunks
|
[
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2018:2557
|
Red Hat Security Advisory: postgresql security update
|
postgresql: Certain host connection parameters defeat client-side security defenses
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 8.5 | null |
RHSA-2021:1452
|
Red Hat Security Advisory: Red Hat Ceph Storage security, bug fix, and enhancement Update
|
ceph: mgr modules' passwords are in clear text in mgr logs tcmu-runner: SCSI target (LIO) write to any block on ILO backstore
|
[
"cpe:/a:redhat:ceph_storage:4::el7",
"cpe:/a:redhat:ceph_storage:4::el8"
] | null | 8.1 | null | null |
RHSA-2023:5094
|
Red Hat Security Advisory: qemu-kvm security and bug fix update
|
QEMU: VNC: improper I/O watch removal in TLS handshake can lead to remote unauthenticated denial of service
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 7.5 | null | null |
RHSA-2023:1639
|
Red Hat Security Advisory: OpenShift API for Data Protection (OADP) 1.1.3 security and bug fix update
|
golang: crypto/tls: large handshake records may cause panics golang: net/http, mime/multipart: denial of service from excessive resource consumption
|
[
"cpe:/a:redhat:openshift_api_data_protection:1.1::el8"
] | null | 7.5 | null | null |
RHSA-2018:2003
|
Red Hat Security Advisory: kernel-rt security and bug fix update
|
kernel: Out-of-bounds access via an XFRM_MSG_MIGRATE xfrm Netlink message hw: cpu: speculative store bypass
|
[
"cpe:/a:redhat:rhel_extras_rt:7"
] | null | null | 5.6 | null |
RHSA-2019:3575
|
Red Hat Security Advisory: elfutils security, bug fix, and enhancement update
|
elfutils: buffer over-read in the ebl_object_note function in eblobjnote.c in libebl elfutils: heap-based buffer over-read in read_srclines in dwarf_getsrclines.c in libdw elfutils: segmentation fault in elf64_xlatetom in libelf/elf32_xlatetom.c elfutils: out of bound write in elf_cvt_note in libelf/note_xlate.h elfutils: heap-based buffer over-read in function elf32_xlatetom in elf32_xlatetom.c
|
[
"cpe:/a:redhat:enterprise_linux:8::crb",
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | null | 3.3 | null |
RHSA-2019:1708
|
Red Hat Security Advisory: ansible security and bug fix update
|
ansible: unsafe template evaluation of returned module data can lead to information disclosure
|
[
"cpe:/a:redhat:ansible_engine:2.8::el7",
"cpe:/a:redhat:ansible_engine:2.8::el8"
] | null | null | 4.6 | null |
RHSA-2017:3379
|
Red Hat Security Advisory: sssd security and bug fix update
|
sssd: unsanitized input when searching in local cache database
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 4.3 | null |
RHSA-2025:3301
|
Red Hat Security Advisory: OpenShift Container Platform 4.16.38 bug fix and security update
|
buildah: Buildah allows arbitrary directory mount Podman: Buildah: CRI-O: symlink traversal vulnerability in the containers/storage library can cause Denial of Service (DoS) github.com/moby/moby: NULL Pointer Dereference in Moby kernel: HID: core: zero-initialize the report buffer kernel: ALSA: usb-audio: Fix potential out-of-bound accesses for Extigy and Mbox devices libxml2: Use-After-Free in libxml2 grub2: net: Out-of-bounds write in grub_net_search_config_file() libxml2: Stack-based buffer overflow in xmlSnprintfElements of libxml2 go-jose: Go JOSE's Parsing Vulnerable to Denial of Service
|
[
"cpe:/a:redhat:openshift:4.16::el9"
] | null | 7.5 | null | null |
RHSA-2017:1219
|
Red Hat Security Advisory: flash-plugin security update
|
flash-plugin: multiple code execution issues fixed in APSB17-15 flash-plugin: multiple code execution issues fixed in APSB17-15 flash-plugin: multiple code execution issues fixed in APSB17-15 flash-plugin: multiple code execution issues fixed in APSB17-15 flash-plugin: multiple code execution issues fixed in APSB17-15 flash-plugin: multiple code execution issues fixed in APSB17-15 flash-plugin: multiple code execution issues fixed in APSB17-15
|
[
"cpe:/a:redhat:rhel_extras:6"
] | null | null | 8.8 | null |
RHSA-2024:1072
|
Red Hat Security Advisory: Red Hat Ansible Automation Platform 2.4 Container Release Security and Bug Fix Update
|
pygments: ReDoS in pygments
|
[
"cpe:/a:redhat:ansible_automation_platform:2.4::el8",
"cpe:/a:redhat:ansible_automation_platform:2.4::el9",
"cpe:/a:redhat:ansible_automation_platform_cloud_billing:2.4::el8"
] | null | 5.5 | null | null |
RHSA-2020:1264
|
Red Hat Security Advisory: systemd security and bug fix update
|
systemd: line splitting via fgets() allows for state injection during daemon-reexec systemd: out-of-bounds read when parsing a crafted syslog message
|
[
"cpe:/o:redhat:rhel_eus:7.5::computenode",
"cpe:/o:redhat:rhel_eus:7.5::server"
] | null | null | 4.3 | null |
RHSA-2017:0272
|
Red Hat Security Advisory: Red Hat JBoss Data Virtualization security and bug fix update
|
pdfbox: XML External Entity vulnerability tika: XML External Entity vulnerability Groovy: Remote code execution via deserialization
|
[
"cpe:/a:redhat:jboss_data_virtualization:6.3"
] | null | null | 8.3 | null |
RHSA-2023:1788
|
Red Hat Security Advisory: firefox security update
|
Mozilla: Memory Corruption in Safe Browsing Code Mozilla: libwebp: Double-free in libwebp Mozilla: Fullscreen notification obscured Mozilla: Potential Memory Corruption following Garbage Collector compaction Mozilla: Invalid free from JavaScript code Mozilla: Content-Disposition filename truncation leads to Reflected File Download Mozilla: Files with malicious extensions could have been downloaded unsafely on Linux Mozilla: Incorrect optimization result on ARM64 Mozilla: Memory safety bugs fixed in Firefox 112 and Firefox ESR 102.10
|
[
"cpe:/a:redhat:rhel_eus:8.6::appstream"
] | null | 8.8 | null | null |
RHSA-2024:1483
|
Red Hat Security Advisory: firefox security update
|
nss: timing attack against RSA decryption Mozilla: Crash in NSS TLS method Mozilla: JIT code failed to save return registers on Armv7-A Mozilla: Integer overflow could have led to out of bounds write Mozilla: Improper handling of html and body tags enabled CSP nonce leakage Mozilla: Clickjacking vulnerability could have led to a user accidentally granting permissions Mozilla: Self referencing object could have potentially led to a use-after-free Mozilla: Memory safety bugs fixed in Firefox 124, Firefox ESR 115.9, and Thunderbird 115.9 Mozilla: Improve handling of out-of-memory conditions in ICU Mozilla: Privileged JavaScript Execution via Event Handlers
|
[
"cpe:/a:redhat:rhel_eus:9.2::appstream"
] | null | 8.8 | null | null |
RHSA-2017:1384
|
Red Hat Security Advisory: Red Hat Enterprise Linux 7.2 Extended Update Support Six-Month Notice
|
This is the Six-Month notification for the retirement of Red Hat Enterprise Linux 7.2 Extended Update Support (EUS). This notification applies only to those customers subscribed to the Extended Update Support (EUS) channel for Red Hat Enterprise Linux 7.2.
|
[
"cpe:/o:redhat:rhel_eus:7.2::computenode",
"cpe:/o:redhat:rhel_eus:7.2::server"
] | null | null | null | null |
RHSA-2016:2998
|
Red Hat Security Advisory: Red Hat Enterprise Linux 6.2 Advanced Mission Critical (AMC) One-Year Notice
|
This is the One-Year notification for the retirement of Red Hat Enterprise Linux 6.2 Advanced Mission Critical (AMC). This notification applies only to those customers subscribed to the Advanced Mission Critical (AMC) channel for Red Hat Enterprise Linux 6.2.
|
[
"cpe:/o:redhat:rhel_mission_critical:6.2::server"
] | null | null | null | null |
RHSA-2004:350
|
Red Hat Security Advisory: krb5 security update
|
security flaw security flaw security flaw
|
[
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws"
] | null | null | null | null |
RHSA-2019:2505
|
Red Hat Security Advisory: openstack-ironic-inspector security update
|
openstack-ironic-inspector: SQL Injection vulnerability when receiving introspection data
|
[
"cpe:/a:redhat:openstack-director:9::el7"
] | null | null | 8.3 | null |
RHSA-2007:1003
|
Red Hat Security Advisory: openssl security and bug fix update
|
openssl: RSA side-channel attack openssl: SSL_get_shared_ciphers() off-by-one
|
[
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2020:0005
|
Red Hat Security Advisory: chromium-browser security update
|
chromium-browser: Use after free in media picker
|
[
"cpe:/a:redhat:rhel_extras:6"
] | null | null | 8.8 | null |
RHSA-2011:1815
|
Red Hat Security Advisory: icu security update
|
icu: Stack-based buffer overflow by canonicalizing the given localeID
|
[
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server",
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2024:8567
|
Red Hat Security Advisory: pki-deps:10.6 security update
|
tomcat: Denial of Service in Tomcat
|
[
"cpe:/a:redhat:rhel_aus:8.2::appstream"
] | null | 7.5 | null | null |
RHSA-2024:0495
|
Red Hat Security Advisory: Red Hat build of Quarkus 3.2.9.SP1 release and security update
|
quarkus: Authorization flaw in Quarkus RestEasy Reactive and Classic when "quarkus.security.jaxrs.deny-unannotated-endpoints" or "quarkus.security.jaxrs.default-roles-allowed" properties are used. quarkus: json payload getting processed prior to security checks when rest resources are used with annotations.
|
[
"cpe:/a:redhat:quarkus:3.2::el8"
] | null | 8.6 | null | null |
RHSA-2008:0510
|
Red Hat Security Advisory: Red Hat Application Stack v1.3 security and enhancement update
|
mysql: privilege escalation via DATA/INDEX DIRECTORY directives
|
[
"cpe:/a:redhat:rhel_application_stack:1"
] | null | null | null | null |
RHSA-2024:2548
|
Red Hat Security Advisory: podman security and bug fix update
|
buildah: full container escape at build time golang-protobuf: encoding/protojson, internal/encoding/json: infinite loop in protojson.Unmarshal when unmarshaling certain forms of invalid JSON
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 5.9 | null | null |
RHSA-2011:0180
|
Red Hat Security Advisory: pango security update
|
pango: Heap-based buffer overflow by rendering glyph box for certain FT_Bitmap objects
|
[
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws",
"cpe:/o:redhat:enterprise_linux:5::server",
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2021:1853
|
Red Hat Security Advisory: unbound security, bug fix, and enhancement update
|
unbound: integer overflow in the regional allocator via regional_alloc unbound: integer overflow in sldns_str2wire_dname_buf_origin can lead to an out-of-bounds write unbound: out-of-bounds write in sldns_bget_token_par unbound: assertion failure and denial of service in synth_cname unbound: assertion failure and denial of service in dname_pkt_copy via an invalid packet unbound: integer overflow in a size calculation in dnscrypt/dnscrypt.c unbound: integer overflow in a size calculation in respip/respip.c unbound: infinite loop via a compressed name in dname_pkt_copy unbound: assertion failure via a compressed name in dname_pkt_copy unbound: out-of-bounds write via a compressed name in rdata_copy unbound: symbolic link traversal when writing PID file
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 4.4 | null | null |
RHSA-2024:9990
|
Red Hat Security Advisory: RHOSP 17.1.4 (openstack-tripleo-common and python-tripleoclient) security update
|
openstack-tripleo-common: RHOSP Director Disables TLS Verification for Registry Mirrors
|
[
"cpe:/a:redhat:openstack:17.1::el9"
] | null | 8.1 | null | null |
RHSA-2018:2214
|
Red Hat Security Advisory: openstack-tripleo-heat-templates security update
|
openstack-tripleo-heat-templates: Default ODL deployment uses hard coded administrative credentials
|
[
"cpe:/a:redhat:openstack:13::el7"
] | null | null | 8.8 | null |
RHSA-2014:1764
|
Red Hat Security Advisory: wget security update
|
wget: FTP symlink arbitrary filesystem access
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation",
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | null | null |
RHSA-2020:2513
|
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.3.1 Security update
|
mojarra: Path traversal in ResourceManager.java:getLocalePrefix() via the loc parameter thrift: Endless loop when feed with specific input data thrift: Out-of-bounds read related to TJSONProtocol or TSimpleJSONProtocol jackson-mapper-asl: XML external entity similar to CVE-2016-3720 cxf: OpenId Connect token service does not properly validate the clientId wildfly: The 'enabled-protocols' value in legacy security is not respected if OpenSSL security provider is in use cxf: reflected XSS in the services listing page resteasy: Improper validation of response header in MediaTypeHeaderDelegate.java class Wildfly: EJBContext principal is not popped back after invoking another EJB using a different Security Domain SmallRye: SecuritySupport class is incorrectly public and contains a static method to access the current threads context class loader undertow: AJP File Read/Inclusion Vulnerability undertow: servletPath is normalized incorrectly leading to dangerous application mapping which could result in security bypass Mojarra: Path traversal via either the loc parameter or the con parameter, incomplete fix of CVE-2018-14371 cryptacular: excessive memory allocation during a decode operation jackson-databind: Lacks certain xbean-reflect/JNDI blocking jackson-databind: Serialization gadgets in shaded-hikari-config jackson-databind: Serialization gadgets in ibatis-sqlmap jackson-databind: Serialization gadgets in anteros-core RESTEasy: RESTEASY003870 exception in RESTEasy can lead to a reflected XSS attack undertow: Memory exhaustion issue in HttpReadListener via "Expect: 100-continue" header undertow: invalid HTTP request with large chunk size
|
[
"cpe:/a:redhat:jboss_enterprise_application_platform:7.3::el8"
] | null | 6.5 | 8.1 | null |
RHSA-2021:4201
|
Red Hat Security Advisory: babel security and bug fix update
|
python-babel: Relative path traversal allows attacker to load arbitrary locale files and execute arbitrary code python-babel: Relative path traversal allows attacker to load arbitrary locale files and execute arbitrary code
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 7.8 | null | null |
RHSA-2020:4054
|
Red Hat Security Advisory: qemu-kvm security update
|
QEMU: usb: out-of-bounds r/w access issue while processing usb packets
|
[
"cpe:/o:redhat:rhel_aus:6.5::server"
] | null | 5 | null | null |
RHSA-2024:0845
|
Red Hat Security Advisory: OpenShift Container Platform 4.13.34 security update
|
go-git: Maliciously crafted Git server replies can cause DoS on go-git clients go-git: Maliciously crafted Git server replies can lead to path traversal and RCE on go-git clients
|
[
"cpe:/a:redhat:openshift:4.13::el8",
"cpe:/a:redhat:openshift:4.13::el9"
] | null | 8.1 | null | null |
RHSA-2022:5004
|
Red Hat Security Advisory: Red Hat OpenShift Service Mesh 2.1.3 security update
|
golang: math/big: uncontrolled memory consumption due to an unhandled overflow via Rat.SetString golang: cmd/go: misinterpretation of branch names can lead to incorrect access control golang: crypto/elliptic: IsOnCurve returns true for invalid field elements envoy: Segfault in GrpcHealthCheckerImpl envoy: Decompressors can be zip bombed envoy: oauth filter allows trivial bypass envoy: oauth filter calls continueDecoding() from within decodeHeaders() Istio: Unsafe memory access in metadata exchange.
|
[
"cpe:/a:redhat:service_mesh:2.1::el8"
] | null | 9.8 | null | null |
RHSA-2019:0868
|
Red Hat Security Advisory: Red Hat Single Sign-On 7.2.7 security update
|
keycloak: session hijack using the user access token
|
[
"cpe:/a:redhat:jboss_single_sign_on:7.2"
] | null | null | 3.8 | null |
RHSA-2025:3963
|
Red Hat Security Advisory: openvswitch3.1 security update
|
dpdk: Denial Of Service from malicious guest on hypervisors using DPDK Vhost library
|
[
"cpe:/o:redhat:enterprise_linux:9::fastdatapath"
] | null | null | 7.4 | null |
RHSA-2014:1652
|
Red Hat Security Advisory: openssl security update
|
openssl: SRTP memory leak causes crash when using specially-crafted handshake message openssl: Invalid TLS/SSL session tickets could cause memory leak leading to server crash
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation",
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | null | null |
RHSA-2024:3214
|
Red Hat Security Advisory: gmp security update
|
gmp: Integer overflow and resultant buffer overflow via crafted input
|
[
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 6.2 | null | null |
RHSA-2011:1459
|
Red Hat Security Advisory: bind97 security update
|
bind: Remote denial of service against recursive servers via logging negative cache entry
|
[
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2024:0601
|
Red Hat Security Advisory: thunderbird security update
|
Mozilla: Out of bounds write in ANGLE Mozilla: Failure to update user input timestamp Mozilla: Crash when listing printers on Linux Mozilla: Bypass of Content Security Policy when directive unsafe-inline was set Mozilla: Phishing site popup could show local origin in address bar Mozilla: Potential permissions request bypass via clickjacking Mozilla: Privilege escalation through devtools Mozilla: HSTS policy on subdomain could bypass policy of upper domain Mozilla: Memory safety bugs fixed in Firefox 122, Firefox ESR 115.7, and Thunderbird 115.7
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 8.8 | null | null |
RHBA-2023:1037
|
Red Hat Bug Fix Advisory: Red Hat build of MicroShift 4.12.6 bug fix and enhancement update
|
openshift/apiserver-library-go: Bypass of SCC seccomp profile restrictions
|
[
"cpe:/a:redhat:openshift:4.12::el8"
] | null | 6.3 | null | null |
RHSA-2013:0700
|
Red Hat Security Advisory: jenkins security update
|
maven-wagon: all SSL certificate checking is disabled by default
|
[
"cpe:/a:redhat:openshift:1::el6"
] | null | null | null | null |
RHSA-2002:128
|
Red Hat Security Advisory: Updated kernel with information security fixes, bug fixes, and updated drivers
|
security flaw
|
[
"cpe:/o:redhat:enterprise_linux:2.1::as"
] | null | null | null | null |
RHSA-2020:4923
|
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.3.3 security update
|
wildfly-openssl: memory leak per HTTP session creation in WildFly OpenSSL
|
[
"cpe:/a:redhat:jboss_enterprise_application_platform:7.3"
] | null | 7.5 | null | null |
RHSA-2010:0221
|
Red Hat Security Advisory: squid security and bug fix update
|
squid: DoS (100% CPU use) while processing certain external ACL helper HTTP headers squid: temporary DoS (assertion failure) triggered by truncated DNS packet (SQUID-2010:1)
|
[
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2021:3088
|
Red Hat Security Advisory: kernel-rt security and bug fix update
|
kernel: race condition in net/can/bcm.c leads to local privilege escalation kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c
|
[
"cpe:/a:redhat:enterprise_linux:8::nfv",
"cpe:/a:redhat:enterprise_linux:8::realtime"
] | null | 7.8 | null | null |
RHSA-2017:1676
|
Red Hat Security Advisory: Red Hat JBoss BRMS security update
|
RESTEasy: Abuse of GZIPInterceptor in RESTEasy can lead to denial of service attack Resteasy: Yaml unmarshalling vulnerable to RCE logback: Serialization vulnerability in SocketServer and ServerSocketReceiver
|
[
"cpe:/a:redhat:jboss_enterprise_brms_platform:6.4"
] | null | null | 5.5 | null |
RHSA-2023:6145
|
Red Hat Security Advisory: Multicluster Engine for Kubernetes 2.2.9 security updates and bug fixes
|
golang: html/template: improper handling of HTML-like comments within script contexts golang: html/template: improper handling of special tags within script contexts golang: crypto/tls: panic when processing post-handshake message on QUIC connections golang: crypto/tls: lack of a limit on buffered post-handshake golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487) HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack)
|
[
"cpe:/a:redhat:multicluster_engine:2.2::el8"
] | null | 7.5 | null | null |
RHSA-2020:2680
|
Red Hat Security Advisory: microcode_ctl security, bug fix and enhancement update
|
hw: Special Register Buffer Data Sampling (SRBDS) hw: Vector Register Data Sampling hw: L1D Cache Eviction Sampling
|
[
"cpe:/o:redhat:rhel_aus:7.3::server",
"cpe:/o:redhat:rhel_e4s:7.3::server",
"cpe:/o:redhat:rhel_tus:7.3::server"
] | null | 6.5 | 6.5 | null |
RHSA-2023:5071
|
Red Hat Security Advisory: libcap security update
|
libcap: Memory Leak on pthread_create() Error libcap: Integer Overflow in _libcap_strdup()
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/o:redhat:enterprise_linux:9::baseos"
] | null | 7.8 | null | null |
RHSA-2019:2343
|
Red Hat Security Advisory: httpd security and bug fix update
|
httpd: mod_auth_digest: access control bypass due to race condition httpd: URL normalization inconsistency
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 3.3 | null |
RHSA-2017:0269
|
Red Hat Security Advisory: java-1.7.0-openjdk security update
|
OpenJDK: incorrect ECDSA signature extraction from the DER input (Libraries, 8168714) OpenJDK: missing ObjectIdentifier length check (Libraries, 8168705) OpenJDK: DSA implementation timing attack (Libraries, 8168728) OpenJDK: incorrect URL parsing in URLStreamHandler (Networking, 8167223) OpenJDK: URLClassLoader insufficient access control checks (Networking, 8151934) OpenJDK: untrusted input deserialization in RMI registry and DCG (RMI, 8156802) OpenJDK: LdapLoginModule incorrect userDN extraction (JAAS, 8161743) OpenJDK: imageio PNGImageReader failed to honor ignoreMetadata for iTXt and zTXt chunks (2D, 8166988) OpenJDK: integer overflow in SocketOutputStream boundary check (Networking, 8164147) OpenJDK: insufficient protected field access checks in atomic field updaters (Libraries, 8165344) OpenJDK: insecure class construction (Hotspot, 8167104)
|
[
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::server",
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation",
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 8.8 | null |
RHSA-2024:0145
|
Red Hat Security Advisory: ipa security update
|
ipa: Invalid CSRF protection
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 6.5 | null | null |
RHSA-2020:2828
|
Red Hat Security Advisory: firefox security update
|
Mozilla: Memory corruption due to missing sign-extension for ValueTags on ARM64 Mozilla: Information disclosure due to manipulated URL object Mozilla: Use-after-free in nsGlobalWindowInner Mozilla: Use-After-Free when trying to connect to a STUN server Mozilla: Add-On updates did not respect the same certificate trust rules as software updates
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 8.8 | 6.1 | null |
RHSA-2019:3232
|
Red Hat Security Advisory: polkit security update
|
polkit: Improper handling of user with uid > INT_MAX leading to authentication bypass
|
[
"cpe:/o:redhat:rhel_eus:7.6::computenode",
"cpe:/o:redhat:rhel_eus:7.6::server"
] | null | null | 7 | null |
RHSA-2014:1647
|
Red Hat Security Advisory: thunderbird security update
|
Mozilla: Miscellaneous memory safety hazards (rv:31.2) (MFSA 2014-74) Mozilla: Web Audio memory corruption issues with custom waveforms (MFSA 2014-76) Mozilla: Out-of-bounds write with WebM video (MFSA 2014-77) Mozilla: Use-after-free interacting with text directionality (MFSA 2014-79)
|
[
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2023:5446
|
Red Hat Security Advisory: Red Hat Build of OptaPlanner 8.38.0 SP1
|
quarkus: HTTP security policy bypass
|
[
"cpe:/a:redhat:optaplanner:::el6"
] | null | 8.1 | null | null |
RHSA-2019:3267
|
Red Hat Security Advisory: OpenShift Container Platform 4.1 openshift-enterprise-cli-container security update
|
kubernetes: `kubectl cp` allows for arbitrary file write via double symlinks
|
[
"cpe:/a:redhat:openshift:4.1::el7"
] | null | null | 5.3 | null |
RHSA-2011:0896
|
Red Hat Security Advisory: JBoss Enterprise Web Server 1.0.2 update
|
openssl: NETSCAPE_REUSE_CIPHER_CHANGE_BUG downgrade-to-disabled ciphersuite attack openssl: missing bn_wexpand return value checks expat: buffer over-read and crash in big2_toUtf8() on XML with malformed UTF-8 sequences expat: buffer over-read and crash on XML with malformed UTF-8 sequences OpenLDAP: Doesn't properly handle NULL character in subject Common Name tomcat: information disclosure in authentication headers mod_dav: DoS (httpd child process crash) by parsing URI structure with missing path segments apr-util: high memory consumption in apr_brigade_split_line() (mod_proxy): Sensitive response disclosure due improper handling of timeouts tomcat: file permission bypass flaw tomcat: cross-site-scripting vulnerability in the manager application openssl: NETSCAPE_REUSE_CIPHER_CHANGE_BUG ciphersuite downgrade attack tomcat: XSS vulnerability in HTML Manager interface apr: unconstrained recursion in apr_fnmatch httpd: mod_proxy_ajp worker moved to error state when timeout exceeded
|
[
"cpe:/a:redhat:jboss_enterprise_web_server:1.0"
] | null | null | null | null |
RHSA-2023:4771
|
Red Hat Security Advisory: cups security update
|
cups: Information leak through Cups-Get-Document operation
|
[
"cpe:/a:redhat:rhel_aus:8.2::appstream",
"cpe:/a:redhat:rhel_e4s:8.2::appstream",
"cpe:/a:redhat:rhel_tus:8.2::appstream",
"cpe:/o:redhat:rhel_aus:8.2::baseos",
"cpe:/o:redhat:rhel_e4s:8.2::baseos",
"cpe:/o:redhat:rhel_tus:8.2::baseos"
] | null | 6.5 | null | null |
RHSA-2022:5003
|
Red Hat Security Advisory: Red Hat OpenShift Service Mesh 2.0.10 security update
|
envoy: Segfault in GrpcHealthCheckerImpl envoy: Decompressors can be zip bombed
|
[
"cpe:/a:redhat:service_mesh:2.0::el8"
] | null | 7.5 | null | null |
RHSA-2013:1192
|
Red Hat Security Advisory: spice-server security update
|
spice: unsafe clients ring access abort
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2023:4416
|
Red Hat Security Advisory: iperf3 security update
|
iperf3: memory allocation hazard and crash
|
[
"cpe:/a:redhat:rhel_e4s:8.1::appstream"
] | null | 7.5 | null | null |
RHSA-2024:3067
|
Red Hat Security Advisory: tigervnc security update
|
xorg-x11-server: Use-after-free bug in DestroyWindow
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 4.7 | null | null |
RHSA-2018:1112
|
Red Hat Security Advisory: sensu security update
|
sensu: Password exposure in warn level log when configured for multiple rabbitMQ connections
|
[
"cpe:/a:redhat:openstack-optools:11::el7"
] | null | null | 5.5 | null |
RHSA-2013:0612
|
Red Hat Security Advisory: ruby security update
|
ruby: Incomplete fix for CVE-2011-1005 for NameError#to_s method when used on objects ruby: entity expansion DoS vulnerability in REXML
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2018:1815
|
Red Hat Security Advisory: chromium-browser security update
|
chromium-browser: Use after free in Blink chromium-browser: Type confusion in Blink chromium-browser: Overly permissive policy in WebUSB Skia: Heap buffer overflow rasterizing paths in SVG chromium-browser: Use after free in indexedDB chromium-browser: Out of bounds memory access in WebRTC chromium-browser: Out of bounds memory access in WebRTC chromium-browser: Incorrect mutability protection in WebAssembly chromium-browser: Use of uninitialized memory in WebRTC chromium-browser: URL spoof in Omnibox chromium-browser: Referrer Policy bypass in Blink chromium-browser: UI spoofing in Blink chromium-browser: Out of bounds memory access in V8 chromium-browser: Leak of visited status of page in Blink chromium-browser: Overly permissive policy in Extensions chromium-browser: Restrictions bypass in the debugger extension API chromium-browser: Restrictions bypass in the debugger extension API chromium-browser: Heap buffer overflow in Skia chromium-browser: Out of bounds memory access in V8 chromium-browser: Out of bounds memory access in V8 chromium-browser: Out of bounds memory access in PDFium chromium-browser: Incorrect escaping of MathML in Blink chromium-browser: Password fields not taking advantage of OS protections in Views
|
[
"cpe:/a:redhat:rhel_extras:6"
] | null | null | 4.3 | null |
RHSA-2006:0132
|
Red Hat Security Advisory: Updated kernel packages available for Red Hat Enterprise Linux 4 Update 3
|
security flaw
|
[
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHBA-2020:3527
|
Red Hat Bug Fix Advisory: kernel-rt bug fix update
|
kernel: triggering AP to send IAPP location updates for stations before the required authentication process has completed can lead to DoS
|
[
"cpe:/a:redhat:rhel_extras_rt:7"
] | null | 6.5 | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.