id
stringlengths 13
15
| title
stringlengths 29
176
| description
stringlengths 8
32.1k
| cpes
listlengths 0
20
| cvss_v4_0
null | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
null |
---|---|---|---|---|---|---|---|
RHSA-2022:8506
|
Red Hat Security Advisory: Satellite 6.12 Release
|
netty-codec: Bzip2Decoder doesn't allow setting size restrictions for decompressed data netty-codec: SnappyFrameDecoder doesn't restrict chunk length and may buffer skippable chunks in an unnecessary way django: Possible XSS via '{% debug %}' template tag nokogiri: ReDoS in HTML encoding detection ruby-git: package vulnerable to Command Injection via git argument injection rubygem-nokogiri: Improper Handling of Unexpected Data Type in Nokogiri sinatra: path traversal possible outside of public_dir when serving static files rubygem-rails-html-sanitizer: possible xss with certain configurations python-django: Potential SQL injection via Trunc(kind) and Extract(lookup_name) arguments foreman: foreman: OAuth secret exposure via unauthenticated access to the GraphQL API
|
[
"cpe:/a:redhat:satellite:6.12::el8",
"cpe:/a:redhat:satellite_capsule:6.12::el8",
"cpe:/a:redhat:satellite_maintenance:6.12::el8",
"cpe:/a:redhat:satellite_utils:6.12::el8"
] | null | 7.5 | null | null |
RHSA-2023:7734
|
Red Hat Security Advisory: kpatch-patch security update
|
kernel: use-after-free vulnerability in the smb client component kernel: IGB driver inadequate buffer size for frames larger than MTU
|
[
"cpe:/o:redhat:enterprise_linux:9::baseos"
] | null | 7.5 | null | null |
RHSA-2023:6813
|
Red Hat Security Advisory: kernel security and bug fix update
|
kernel: netfilter: NULL pointer dereference in nf_tables due to zeroed list head kernel: net/sched: cls_u32 component reference counter leak if tcf_change_indev() fails kernel: net/sched: cls_fw component can be exploited as result of failure in tcf_change_indev function kernel: tun: bugs for oversize packet when napi frags enabled in tun_napi_alloc_frags
|
[
"cpe:/o:redhat:rhel_e4s:8.1::baseos"
] | null | 7.8 | null | null |
RHSA-2023:7662
|
Red Hat Security Advisory: Red Hat OpenShift for Windows Containers 6.0.3 security update
|
kubernetes: Insufficient input sanitization in in-tree storage plugin leads to privilege escalation on Windows nodes golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487)
|
[
"cpe:/a:redhat:openshift:4.11::el8"
] | null | 7.5 | null | null |
RHSA-2023:1402
|
Red Hat Security Advisory: thunderbird security update
|
Mozilla: Incorrect code generation during JIT compilation Mozilla: Potential out-of-bounds when accessing throttled streams Mozilla: Invalid downcast in Worklets Mozilla: URL being dragged from a removed cross-origin iframe into the same tab triggered navigation Mozilla: Memory safety bugs fixed in Firefox 111 and Firefox ESR 102.9
|
[
"cpe:/a:redhat:rhel_eus:9.0::appstream"
] | null | 8.8 | null | null |
RHSA-2013:0981
|
Red Hat Security Advisory: firefox security update
|
Mozilla: Miscellaneous memory safety hazards (rv:17.0.7) (MFSA 2013-49) Mozilla: Memory corruption found using Address Sanitizer (MFSA 2013-50) Mozilla: Memory corruption found using Address Sanitizer (MFSA 2013-50) Mozilla: Memory corruption found using Address Sanitizer (MFSA 2013-50) Mozilla: Privileged content access and execution via XBL (MFSA 2013-51) Mozilla: Execution of unmapped memory through onreadystatechange event (MFSA 2013-53) Mozilla: Data in the body of XHR HEAD requests leads to CSRF attacks (MFSA 2013-54) Mozilla: SVG filters can lead to information disclosure (MFSA 2013-55) Mozilla: PreserveWrapper has inconsistent behavior (MFSA 2013-56) Mozilla: XrayWrappers can be bypassed to run user defined methods in a privileged context (MFSA 2013-59)
|
[
"cpe:/o:redhat:enterprise_linux:5::server",
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2012:1417
|
Red Hat Security Advisory: Red Hat Enterprise Linux Extended Update Support 6.0 1-Month EOL Notice
|
This is the 1-Month notification of the End Of Life plans for Red Hat
Enterprise Linux Extended Update Support Add-On (EUS) 6.0.
|
[
"cpe:/o:redhat:rhel_eus:6.0"
] | null | null | null | null |
RHSA-2018:2757
|
Red Hat Security Advisory: 389-ds-base security and bug fix update
|
389-ds-base: race condition on reference counter leads to DoS using persistent search 389-ds-base: ldapsearch with server side sort allows users to cause a crash 389-ds-base: Server crash through modify command with large DN 389-ds-base: Crash in delete_passwdPolicy when persistent search connections are terminated unexpectedly
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 7.5 | null |
RHSA-2024:3885
|
Red Hat Security Advisory: OpenShift Container Platform 4.13.44 bug fix and security update
|
graphql-go: Denial of service via stack overflow panics golang: net/http, x/net/http2: unlimited number of CONTINUATION frames causes DoS
|
[
"cpe:/a:redhat:openshift:4.13::el8",
"cpe:/a:redhat:openshift:4.13::el9"
] | null | 7.5 | null | null |
RHSA-2024:9442
|
Red Hat Security Advisory: mingw-glib2 security update
|
glib2: Signal subscription vulnerabilities
|
[
"cpe:/a:redhat:enterprise_linux:9::crb"
] | null | 3.8 | null | null |
RHSA-2023:0553
|
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.4.9 Security update
|
jquery: Cross-site scripting via cross-domain ajax requests bootstrap: XSS in the data-target attribute nodejs-moment: Regular expression denial of service bootstrap: Cross-site Scripting (XSS) in the collapse data-parent attribute bootstrap: Cross-site Scripting (XSS) in the data-target property of scrollspy bootstrap: Cross-site Scripting (XSS) in the data-container property of tooltip bootstrap: XSS in the tooltip or popover data-template attribute jquery: Prototype pollution in object's prototype leading to denial of service, remote code execution, or property injection jquery: Cross-site scripting due to improper injQuery.htmlPrefilter method jquery: Untrusted code execution via <option> tag in HTML passed to DOM manipulation methods wildfly-elytron: possible timing attacks via use of unsafe comparator jettison: parser crash by stackoverflow jettison: memory exhaustion via user-supplied XML or JSON data woodstox-core: woodstox to serialise XML data was vulnerable to Denial of Service attacks jackson-databind: deep wrapper array nesting wrt UNWRAP_SINGLE_VALUE_ARRAYS jackson-databind: use of deeply nested arrays mina-sshd: Java unsafe deserialization vulnerability jettison: If the value in map is the map's self, the new new JSONObject(map) cause StackOverflowError which may lead to dos CXF: SSRF Vulnerability
|
[
"cpe:/a:redhat:jboss_enterprise_application_platform:7.4::el8"
] | null | 9.8 | 5.6 | null |
RHSA-2009:1616
|
Red Hat Security Advisory: tomcat security update for Red Hat Network Satellite Server
|
Improve cookie parsing for tomcat5 tomcat request dispatcher information disclosure vulnerability tomcat6 Denial-Of-Service with AJP connection tomcat6 Information disclosure in authentication classes tomcat XML parser information disclosure
|
[
"cpe:/a:redhat:network_satellite:5.2::el4",
"cpe:/a:redhat:network_satellite:5.3::el4"
] | null | null | null | null |
RHSA-2021:3631
|
Red Hat Security Advisory: OpenShift Container Platform 4.8.13 security update
|
kubernetes: Symlink exchange can allow host filesystem access
|
[
"cpe:/a:redhat:openshift:4.8::el7",
"cpe:/a:redhat:openshift:4.8::el8"
] | null | 8.8 | null | null |
RHSA-2022:0817
|
Red Hat Security Advisory: firefox security update
|
expat: Malformed 2- and 3-byte UTF-8 sequences can lead to arbitrary code execution expat: Namespace-separator characters in "xmlns[:prefix]" attribute values can lead to arbitrary code execution expat: Integer overflow in storeRawNames() Mozilla: Use-after-free in text reflows Mozilla: Browser window spoof using fullscreen mode Mozilla: iframe allow-scripts sandbox bypass Mozilla: Temporary files downloaded to /tmp and accessible by other local users Mozilla: Time-of-check time-of-use bug when verifying add-on signatures Mozilla: Use-after-free in XSLT parameter processing Mozilla: Use-after-free in WebGPU IPC Framework
|
[
"cpe:/a:redhat:rhel_eus:8.4::appstream"
] | null | 8.8 | 7.5 | null |
RHSA-2024:3497
|
Red Hat Security Advisory: edk2 security update
|
edk2: Buffer overflow in the DHCPv6 client via a long Server ID option edk2: Buffer overflow when processing DNS Servers option in a DHCPv6 Advertise message
|
[
"cpe:/a:redhat:rhel_eus:8.6::appstream"
] | null | 8.8 | null | null |
RHSA-2024:4417
|
Red Hat Security Advisory: libreswan security update
|
libreswan: IKEv1 default AH/ESP responder can crash and restart
|
[
"cpe:/a:redhat:rhel_aus:8.6::appstream",
"cpe:/a:redhat:rhel_e4s:8.6::appstream",
"cpe:/a:redhat:rhel_tus:8.6::appstream"
] | null | 6.5 | null | null |
RHSA-2022:1439
|
Red Hat Security Advisory: OpenJDK 11.0.15 security update for Windows Builds
|
OpenJDK: Unbounded memory allocation when compiling crafted XPath expressions (JAXP, 8270504) OpenJDK: Improper object-to-string conversion in AnnotationInvocationHandler (Libraries, 8277672) OpenJDK: Missing check for negative ObjectIdentifier (Libraries, 8275151) OpenJDK: Defective secure validation in Apache Santuario (Libraries, 8278008) OpenJDK: URI parsing inconsistencies (JNDI, 8278972)
|
[
"cpe:/a:redhat:openjdk:11::windows"
] | null | 5.3 | null | null |
RHSA-2023:3325
|
Red Hat Security Advisory: Multicluster Engine for Kubernetes 2.1.7 security fixes and container updates
|
vm2: Inspect Manipulation vm2: Sandbox Escape
|
[
"cpe:/a:redhat:multicluster_engine:2.1::el8"
] | null | 9.8 | null | null |
RHSA-2015:0236
|
Red Hat Security Advisory: Red Hat JBoss Fuse/A-MQ 6.1.0 security and bug fix update
|
CXF: Improper security semantics enforcement of SAML SubjectConfirmation methods Framework: directory traversal flaw
|
[
"cpe:/a:redhat:jboss_amq:6.1.0",
"cpe:/a:redhat:jboss_fuse:6.1.0"
] | null | null | null | null |
RHSA-2023:3278
|
Red Hat Security Advisory: kpatch-patch security update
|
kernel: use-after-free caused by l2cap_reassemble_sdu() in net/bluetooth/l2cap_core.c
|
[
"cpe:/o:redhat:rhel_e4s:7.7::server"
] | null | 7.1 | null | null |
RHSA-2020:2966
|
Red Hat Security Advisory: thunderbird security update
|
Mozilla: Information disclosure due to manipulated URL object Mozilla: Use-after-free in nsGlobalWindowInner Mozilla: Use-After-Free when trying to connect to a STUN server Mozilla: Add-On updates did not respect the same certificate trust rules as software updates Mozilla: Automatic account setup leaks Microsoft Exchange login credentials
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | 5.9 | 6.1 | null |
RHSA-2024:1464
|
Red Hat Security Advisory: OpenShift Container Platform 4.11.59 bug fix and security update
|
golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487)
|
[
"cpe:/a:redhat:openshift:4.11::el8"
] | null | 7.5 | null | null |
RHSA-2020:0574
|
Red Hat Security Advisory: thunderbird security update
|
Mozilla: Message ID calculation was based on uninitialized data Mozilla: Out-of-bounds read when processing certain email messages Mozilla: Setting a master password post-Thunderbird 52 does not delete unencrypted previously stored passwords Mozilla: Crash processing S/MIME messages with multiple signatures Mozilla: Incorrect parsing of template tag could result in JavaScript injection Mozilla: Memory safety bugs fixed in Firefox 73 and Firefox ESR 68.5
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | 8.8 | 6.1 | null |
RHSA-2013:0550
|
Red Hat Security Advisory: bind security and enhancement update
|
bind: denial of service when processing queries and with both DNS64 and RPZ enabled
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2018:3761
|
Red Hat Security Advisory: ghostscript security and bug fix update
|
ghostscript: incomplete fix for CVE-2018-16509
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 7.3 | null |
RHSA-2020:5388
|
Red Hat Security Advisory: Red Hat support for Spring Boot 2.2.11 security update
|
tomcat: specially crafted sequence of HTTP/2 requests can lead to DoS hibernate-core: SQL injection vulnerability when both hibernate.use_sql_comments and JPQL String literals are used
|
[
"cpe:/a:redhat:openshift_application_runtimes:1.0"
] | null | 7.4 | null | null |
RHSA-2023:4139
|
Red Hat Security Advisory: curl security update
|
curl: POST following PUT confusion curl: HTTP multi-header compression denial of service
|
[
"cpe:/a:redhat:rhel_eus:9.0::appstream",
"cpe:/o:redhat:rhel_eus:9.0::baseos"
] | null | 6.5 | null | null |
RHSA-2023:3269
|
Red Hat Security Advisory: devtoolset-12-binutils security update
|
libiberty: Heap/stack buffer overflow in the dlang_lname function in d-demangle.c binutils: NULL pointer dereference in _bfd_elf_get_symbol_version_string leads to segfault
|
[
"cpe:/a:redhat:rhel_software_collections:3::el7"
] | null | 5.5 | null | null |
RHSA-2016:0997
|
Red Hat Security Advisory: qemu-kvm security update
|
qemu: incorrect banked access bounds checking in vga module
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | 7.6 | null |
RHSA-2021:4088
|
Red Hat Security Advisory: kernel-rt security and bug fix update
|
kernel: use-after-free in drivers/infiniband/core/ucma.c ctx use-after-free kernel: out-of-bounds write due to a heap buffer overflow in __hidinput_change_resolution_multipliers() of hid-input.c kernel: SVM nested virtualization issue in KVM (VMLOAD/VMSAVE)
|
[
"cpe:/a:redhat:enterprise_linux:8::nfv",
"cpe:/a:redhat:enterprise_linux:8::realtime"
] | null | 8.8 | null | null |
RHSA-2011:0299
|
Red Hat Security Advisory: java-1.4.2-ibm-sap security update
|
JDK Double.parseDouble Denial-Of-Service
|
[
"cpe:/a:redhat:rhel_extras_sap:4",
"cpe:/a:redhat:rhel_extras_sap:5"
] | null | null | null | null |
RHSA-2013:1076
|
Red Hat Security Advisory: rhev-hypervisor6 security and bug fix update
|
gnutls: out of bounds read in _gnutls_ciphertext2compressed (GNUTLS-SA-2013-2)
|
[
"cpe:/o:redhat:enterprise_linux:6::hypervisor"
] | null | null | null | null |
RHSA-2010:0758
|
Red Hat Security Advisory: kernel-rt security and bug fix update
|
kernel: do_io_submit() infoleak kernel: 64-bit Compatibility Mode Stack Pointer Underflow
|
[
"cpe:/a:redhat:enterprise_mrg:1::el5"
] | null | null | null | null |
RHSA-2022:5564
|
Red Hat Security Advisory: kernel security, bug fix, and enhancement update
|
kernel: race condition in perf_event_open leads to privilege escalation
|
[
"cpe:/a:redhat:enterprise_linux:8::crb",
"cpe:/o:redhat:enterprise_linux:8::baseos",
"cpe:/o:redhat:rhev_hypervisor:4.4::el8"
] | null | 7.4 | null | null |
RHSA-2005:010
|
Red Hat Security Advisory: vim security update
|
security flaw
|
[
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws"
] | null | null | null | null |
RHSA-2020:5398
|
Red Hat Security Advisory: thunderbird security update
|
Mozilla: Stack overflow due to incorrect parsing of SMTP server response codes
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 8.8 | null | null |
RHSA-2023:6916
|
Red Hat Security Advisory: xorg-x11-server security and bug fix update
|
xorg-x11-server: X.Org Server Overlay Window Use-After-Free Local Privilege Escalation Vulnerability
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb"
] | null | 7.8 | null | null |
RHSA-2019:0566
|
Red Hat Security Advisory: openstack-ceilometer security and bug fix update
|
openstack-ceilometer: ceilometer-agent prints sensitive data from config files through log files
|
[
"cpe:/a:redhat:openstack:13::el7"
] | null | null | 4 | null |
RHSA-2014:1041
|
Red Hat Security Advisory: java-1.7.0-ibm security update
|
JDK: Java CMS keystore provider potentially allows brute-force private key recovery JDK: Privilege escalation issue JDK: unspecified vulnerability fixed in 7u65 and 8u11 (Deployment) OpenJDK: SubjectDelegator protection insufficient (JMX, 8029755) OpenJDK: Clone interfaces passed to proxy methods (Libraries, 8035009) OpenJDK: Bytecode verification does not prevent ctor calls to this() and super() (Hotspot, 8035119) JDK: unspecified vulnerability fixed in 7u65 and 8u11 (Deployment) OpenJDK: MethodHandles.Lookup insufficient modifiers checks (Libraries, 8035788) JDK: unspecified vulnerability fixed in 6u81, 7u65 and 8u11 (Deployment) OpenJDK: RSA blinding issues (Security, 8031346) OpenJDK: Prevent instantiation of service with non-public constructor (Security, 8035004) OpenJDK: AtomicReferenceFieldUpdater missing primitive type check (Libraries, 8039520) OpenJDK: insufficient Diffie-Hellman public key validation (Security, 8037162) JDK: unspecified vulnerability fixed in 6u81, 7u65 and 8u11 (Deployment) OpenJDK: InfoBuilder incorrect return values (Serviceability, 8033301)
|
[
"cpe:/a:redhat:rhel_extras:5::client",
"cpe:/a:redhat:rhel_extras:5::server",
"cpe:/a:redhat:rhel_extras:6"
] | null | null | null | null |
RHSA-2025:2997
|
Red Hat Security Advisory: webkit2gtk3 security update
|
webkitgtk: out-of-bounds write vulnerability
|
[
"cpe:/a:redhat:rhel_eus:9.4::appstream"
] | null | 7.5 | null | null |
RHSA-2023:6570
|
Red Hat Security Advisory: tomcat security and bug fix update
|
FileUpload: FileUpload DoS with excessive parts tomcat: not including the secure attribute causes information disclosure tomcat: Fix for CVE-2023-24998 was incomplete
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 7.5 | null | null |
RHSA-2021:3837
|
Red Hat Security Advisory: httpd:2.4 security update
|
httpd: mod_proxy: SSRF via a crafted request uri-path containing "unix:"
|
[
"cpe:/a:redhat:rhel_eus:8.1::appstream"
] | null | 9 | null | null |
RHSA-2021:2064
|
Red Hat Security Advisory: Red Hat Single Sign-On 7.4.7 security update on RHEL 7
|
keycloak: Internationalized domain name (IDN) homograph attack to impersonate users keycloak: Backchannel logout not working when Principal Type is set to Attribute Name for external SAML IDP
|
[
"cpe:/a:redhat:red_hat_single_sign_on:7::el7"
] | null | 7.1 | null | null |
RHSA-2016:2575
|
Red Hat Security Advisory: curl security, bug fix, and enhancement update
|
curl: TLS session resumption client cert bypass curl: Re-using connection with wrong client cert curl: Incorrect reuse of client certificates
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 4.2 | null |
RHSA-2025:2481
|
Red Hat Security Advisory: firefox security update
|
firefox: AudioIPC StreamData could trigger a use-after-free in the Browser process firefox: Use-after-free in WebTransportChild firefox: Inconsistent comparator in XSLT sorting led to out-of-bounds access firefox: JIT corruption of WASM i32 return values on 64-bit CPUs firefox: Unexpected GC during RegExp bailout processing firefox: Clickjacking the registerProtocolHandler info-bar Reporter firefox: Adding %00 and a fake extension to a jar: URL changed the interpretation of the contents firefox: thunderbird: Memory safety bugs fixed in Firefox 136, Thunderbird 136, Firefox ESR 115.21, Firefox ESR 128.8, and Thunderbird 128.8 firefox: thunderbird: Memory safety bugs fixed in Firefox 136, Thunderbird 136, Firefox ESR 128.8, and Thunderbird 128.8
|
[
"cpe:/a:redhat:rhel_e4s:9.0::appstream"
] | null | 8.8 | null | null |
RHSA-2021:2693
|
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.3.8 on RHEL 7 security update
|
wildfly: XSS via admin console when creating roles in domain mode netty: Request smuggling via content-length header
|
[
"cpe:/a:redhat:jboss_enterprise_application_platform:7.3::el7"
] | null | 5.9 | null | null |
RHSA-2013:1778
|
Red Hat Security Advisory: gimp security update
|
plug-in): Stack-based buffer overflow when loading XWD file gimp: xwd plugin g_new() integer overflow gimp: XWD plugin color map heap-based buffer overflow
|
[
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server",
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2023:0552
|
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.4.9 Security update
|
jquery: Cross-site scripting via cross-domain ajax requests bootstrap: XSS in the data-target attribute nodejs-moment: Regular expression denial of service bootstrap: Cross-site Scripting (XSS) in the collapse data-parent attribute bootstrap: Cross-site Scripting (XSS) in the data-target property of scrollspy bootstrap: Cross-site Scripting (XSS) in the data-container property of tooltip bootstrap: XSS in the tooltip or popover data-template attribute jquery: Prototype pollution in object's prototype leading to denial of service, remote code execution, or property injection jquery: Cross-site scripting due to improper injQuery.htmlPrefilter method jquery: Untrusted code execution via <option> tag in HTML passed to DOM manipulation methods wildfly-elytron: possible timing attacks via use of unsafe comparator jettison: parser crash by stackoverflow jettison: memory exhaustion via user-supplied XML or JSON data woodstox-core: woodstox to serialise XML data was vulnerable to Denial of Service attacks jackson-databind: deep wrapper array nesting wrt UNWRAP_SINGLE_VALUE_ARRAYS jackson-databind: use of deeply nested arrays mina-sshd: Java unsafe deserialization vulnerability jettison: If the value in map is the map's self, the new new JSONObject(map) cause StackOverflowError which may lead to dos CXF: SSRF Vulnerability
|
[
"cpe:/a:redhat:jboss_enterprise_application_platform:7.4::el7"
] | null | 9.8 | 5.6 | null |
RHSA-2011:1815
|
Red Hat Security Advisory: icu security update
|
icu: Stack-based buffer overflow by canonicalizing the given localeID
|
[
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server",
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2021:4222
|
Red Hat Security Advisory: container-tools:3.0 security and bug fix update
|
buildah: Host environment variables leaked in build container when using chroot isolation
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 5.6 | null | null |
RHSA-2024:0623
|
Red Hat Security Advisory: thunderbird security update
|
Mozilla: Out of bounds write in ANGLE Mozilla: Failure to update user input timestamp Mozilla: Crash when listing printers on Linux Mozilla: Bypass of Content Security Policy when directive unsafe-inline was set Mozilla: Phishing site popup could show local origin in address bar Mozilla: Potential permissions request bypass via clickjacking Mozilla: Privilege escalation through devtools Mozilla: HSTS policy on subdomain could bypass policy of upper domain Mozilla: Memory safety bugs fixed in Firefox 122, Firefox ESR 115.7, and Thunderbird 115.7
|
[
"cpe:/a:redhat:rhel_eus:8.6::appstream"
] | null | 8.8 | null | null |
RHSA-2021:3585
|
Red Hat Security Advisory: go-toolset:rhel8 security update
|
golang: net: incorrect parsing of extraneous zero characters at the beginning of an IP address octet
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 7.3 | null | null |
RHSA-2023:0397
|
Red Hat Security Advisory: sssd security update
|
sssd: libsss_certmap fails to sanitise certificate data used in LDAP filters
|
[
"cpe:/o:redhat:rhel_aus:8.2::baseos",
"cpe:/o:redhat:rhel_e4s:8.2::baseos",
"cpe:/o:redhat:rhel_tus:8.2::baseos"
] | null | 8.8 | null | null |
RHSA-2019:0774
|
Red Hat Security Advisory: java-1.8.0-openjdk security and bug fix update
|
OpenJDK: Slow conversion of BigDecimal to long (Libraries, 8211936) OpenJDK: Incorrect skeleton selection in RMI registry server-side dispatch handling (RMI, 8218453) OpenJDK: Font layout engine out of bounds access setCurrGlyphID() (2D, 8219022)
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | 7.5 | null |
RHSA-2017:2029
|
Red Hat Security Advisory: openssh security, bug fix, and enhancement update
|
openssh: User enumeration via covert timing channel openssh: Denial of service via very long passwords openssh: loading of untrusted PKCS#11 modules in ssh-agent openssh: Leak of host private key material to privilege-separated child process via realloc() openssh: Bounds check can be evaded in the shared memory manager used by pre-authentication compression support openssh: Out of sequence NEWKEYS message can allow remote attacker to cause denial of service
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 5.3 | null |
RHSA-2015:0217
|
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 6.3.3 update
|
Security: Wrong security context loaded when using SAML2 STS Login Module RESTeasy: External entities expanded by DocumentProvider Management: Limited RBAC authorization bypass Subsystem: Information disclosure via incorrect sensitivity classification of attribute Weld: Limited information disclosure via stale thread state
|
[
"cpe:/a:redhat:jboss_enterprise_application_platform:6::el6"
] | null | null | null | null |
RHSA-2023:4025
|
Red Hat Security Advisory: Red Hat OpenShift support for Windows Containers 7.1.0 [security update]
|
containerd: Supplementary groups are not set up properly
|
[
"cpe:/a:redhat:openshift:4.12::el8"
] | null | 7.3 | null | null |
RHSA-2024:6406
|
Red Hat Security Advisory: OpenShift Container Platform 4.14.36 security update
|
opentelemetry: DoS vulnerability in otelhttp golang: net/http, x/net/http2: unlimited number of CONTINUATION frames causes DoS opentelemetry-go-contrib: DoS vulnerability in otelgrpc due to unbound cardinality metrics ssh: Prefix truncation attack on Binary Packet Protocol (BPP) coredns: CD bit response is cached and served later bind: bind9: BIND's database will be slow if a very large number of RRs exist at the same nam bind9: bind: SIG(0) can be used to exhaust CPU resources bind: bind9: Assertion failure when serving both stale cache data and authoritative zone content go-retryablehttp: url might write sensitive information to log file python-werkzeug: user may execute code on a developer's machine
|
[
"cpe:/a:redhat:openshift:4.14::el8",
"cpe:/a:redhat:openshift:4.14::el9"
] | null | 7.5 | null | null |
RHSA-2019:3673
|
Red Hat Security Advisory: lldpad security and bug fix update
|
lldptool: improper sanitization of shell-escape codes
|
[
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | null | 4.3 | null |
RHSA-2023:1326
|
Red Hat Security Advisory: OpenShift Container Platform 4.13.0 security update
|
go-yaml: Denial of Service in go-yaml goutils: RandomAlphaNumeric and CryptoRandomAlphaNumeric are not as random as they should be mongo-go-driver: specific cstrings input may not be properly validated golang: out-of-bounds read in golang.org/x/text/language leads to DoS prometheus/client_golang: Denial of service using InstrumentHandlerCounter helm: Denial of service through through repository index file helm: Denial of service through schema file golang: crash in a golang.org/x/crypto/ssh server vault: insufficient certificate revocation list checking golang: net/http: excessive memory growth in a Go server accepting HTTP/2 requests x/net/http2/h2c: request smuggling golang.org/x/net/http2: avoid quadratic complexity in HPACK decoding golang: crypto/tls: large handshake records may cause panics golang: net/http, mime/multipart: denial of service from excessive resource consumption exporter-toolkit: authentication bypass via cache poisoning vault: Vault’s Microsoft SQL Database Storage Backend Vulnerable to SQL Injection Via Configuration File hashicorp/vault: Vault’s PKI Issuer Endpoint Did Not Correctly Authorize Access to Issuer Metadata hashicorp/vault: Cache-Timing Attacks During Seal and Unseal Operations helm: getHostByName Function Information Disclosure containerd: Supplementary groups are not set up properly runc: Rootless runc makes `/sys/fs/cgroup` writable runc: volume mount race condition (regression of CVE-2019-19921) runc: AppArmor can be bypassed when `/proc` inside the container is symlinked with a specific mount configuration baremetal-operator: plain-text username and hashed password readable by anyone having a cluster-wide read-access
|
[
"cpe:/a:redhat:openshift:4.13::el8",
"cpe:/a:redhat:openshift:4.13::el9"
] | null | 6 | null | null |
RHSA-2023:6195
|
Red Hat Security Advisory: thunderbird security update
|
Mozilla: Queued up rendering could have allowed websites to clickjack Mozilla: Large WebGL draw could have led to a crash Mozilla: WebExtensions could open arbitrary URLs Mozilla: Improper object tracking during GC in the JavaScript engine could have led to a crash. Mozilla: Memory safety bugs fixed in Firefox 119, Firefox ESR 115.4, and Thunderbird 115.4 Mozilla: Address bar spoofing via bidirectional characters libvpx: crash related to VP9 encoding in libvpx
|
[
"cpe:/a:redhat:rhel_eus:8.6::appstream"
] | null | 7.5 | null | null |
RHBA-2023:6109
|
Red Hat Bug Fix Advisory: MTV 2.4.3 Images
|
golang: net/url: JoinPath does not strip relative path components in all circumstances golang.org/x/net/http2: avoid quadratic complexity in HPACK decoding golang: crypto/tls: large handshake records may cause panics golang: net/http, mime/multipart: denial of service from excessive resource consumption golang.org/x/net/html: Cross site scripting golang: net/http, net/textproto: denial of service from excessive memory allocation golang: net/http, net/textproto, mime/multipart: denial of service from excessive resource consumption golang: go/parser: Infinite loop in parsing golang: html/template: backticks not treated as string delimiters golang: html/template: improper sanitization of CSS values golang: html/template: improper handling of empty HTML attributes golang: crypto/tls: slow verification of certificate chains containing large RSA keys golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487) HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack)
|
[
"cpe:/a:redhat:migration_toolkit_virtualization:2.4::el8",
"cpe:/a:redhat:migration_toolkit_virtualization:2.4::el9"
] | null | 7.5 | null | null |
RHSA-2015:0164
|
Red Hat Security Advisory: kernel security and bug fix update
|
kernel: splice: lack of generic write checks
|
[
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2023:4076
|
Red Hat Security Advisory: firefox security update
|
Mozilla: Use-after-free in WebRTC certificate generation Mozilla: Potential use-after-free from compartment mismatch in SpiderMonkey Mozilla: Fullscreen notification obscured Mozilla: Lack of warning when opening Diagcab files Mozilla: Memory safety bugs fixed in Firefox 115, Firefox ESR 102.13, and Thunderbird 102.13
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 8.8 | null | null |
RHSA-2016:1612
|
Red Hat Security Advisory: rh-php56-php security update
|
PHP: sets environmental variable based on user supplied Proxy request header
|
[
"cpe:/a:redhat:rhel_software_collections:2::el6",
"cpe:/a:redhat:rhel_software_collections:2::el7"
] | null | null | 5 | null |
RHSA-2013:1861
|
Red Hat Security Advisory: nss security update
|
Updated nss packages that fix one security issue are now available for
Red Hat Enterprise Linux 5 and 6.
The Red Hat Security Response Team has rated this update as having moderate
security impact.
|
[
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server",
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2022:6357
|
Red Hat Security Advisory: open-vm-tools security update
|
open-vm-tools: local root privilege escalation in the virtual machine
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 7 | null | null |
RHSA-2020:4847
|
Red Hat Security Advisory: pki-core:10.6 and pki-deps:10.6 security, bug fix, and enhancement update
|
jquery: Cross-site scripting via cross-domain ajax requests bootstrap: XSS in the data-target attribute bootstrap: Cross-site Scripting (XSS) in the collapse data-parent attribute bootstrap: Cross-site Scripting (XSS) in the data-container property of tooltip bootstrap: XSS in the tooltip or popover data-template attribute pki-core: Reflected XSS in 'path length' constraint field in CA's Agent page pki-core/pki-kra: Reflected XSS in recoveryID search field at KRA's DRM agent page in authorize recovery tab pki-core: Reflected XSS in getcookies?url= endpoint in CA jquery: Prototype pollution in object's prototype leading to denial of service, remote code execution, or property injection pki-core: KRA vulnerable to reflected XSS via the getPk12 page tomcat: Mishandling of Transfer-Encoding header allows for HTTP request smuggling tomcat: Apache Tomcat AJP File Read/Inclusion Vulnerability jquery: Cross-site scripting due to improper injQuery.htmlPrefilter method jquery: Untrusted code execution via <option> tag in HTML passed to DOM manipulation methods pki: Dogtag's python client does not validate certificates pki-core: XSS in the certificate search results tomcat: request mixup
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 8.6 | 5.6 | null |
RHSA-2023:6492
|
Red Hat Security Advisory: tang security update
|
tang: Race condition exists in the key generation and rotation functionality
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 5.3 | null | null |
RHSA-2016:2615
|
Red Hat Security Advisory: bind security update
|
bind: assertion failure while handling responses containing a DNAME answer
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 7.5 | null |
RHSA-2023:4624
|
Red Hat Security Advisory: Red Hat OpenShift Service Mesh Containers for 2.3.6 security update
|
envoy: OAuth2 credentials exploit with permanent validity envoy: gRPC access log crash caused by the listener draining envoy: CORS filter segfault when origin header is removed envoy: Incorrect handling of HTTP requests and responses with mixed case schemes envoy: HTTP/2 memory leak in nghttp2 codec
|
[
"cpe:/a:redhat:service_mesh:2.3::el8"
] | null | 7.5 | null | null |
RHSA-2023:7265
|
Red Hat Security Advisory: open-vm-tools security update
|
open-vm-tools: SAML token signature bypass open-vm-tools: file descriptor hijack vulnerability in the vmware-user-suid-wrapper
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 7.4 | null | null |
RHSA-2020:0512
|
Red Hat Security Advisory: firefox security update
|
Mozilla: Missing bounds check on shared memory read in the parent process Mozilla: Incorrect parsing of template tag could result in JavaScript injection Mozilla: Memory safety bugs fixed in Firefox 73 and Firefox ESR 68.5
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 8.8 | 6.1 | null |
RHSA-2020:3901
|
Red Hat Security Advisory: libpng security update
|
libpng: does not check length of chunks against user limit
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 3.7 | null |
RHSA-2016:1595
|
Red Hat Security Advisory: python-django security update
|
django: XSS in admin's add/change related popup
|
[
"cpe:/a:redhat:openstack:7::el7"
] | null | null | 6.1 | null |
RHSA-2018:3650
|
Red Hat Security Advisory: ghostscript security update
|
ghostscript: .tempfile file permission issues (699657) ghostscript: shading_param incomplete type checking (699660) ghostscript: missing type check in type checker (699659) ghostscript: incorrect access checking in temp file handling to disclose contents of files (699658)
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 5.3 | null |
RHSA-2021:0976
|
Red Hat Security Advisory: Red Hat Virtualization Host security, bug fix and enhancement update (4.4.4-2)
|
lldp/openvswitch: denial of service via externally triggered memory leak
|
[
"cpe:/o:redhat:rhev_hypervisor:4.4::el8"
] | null | 7.5 | null | null |
RHSA-2018:3586
|
Red Hat Security Advisory: kernel-rt security and bug fix update
|
kernel: out-of-bounds access in the show_timer function in kernel/time/posix-timers.c kernel: IP fragments with random offsets allow a remote denial of service (FragmentSmack) kernel: mm: use-after-free in do_get_mempolicy function allows local DoS or other unspecified impact kernel: Integer overflow in Linux's create_elf_tables function
|
[
"cpe:/a:redhat:enterprise_mrg:2:server:el6"
] | null | null | 7.8 | null |
RHSA-2021:3336
|
Red Hat Security Advisory: sssd security and bug fix update
|
sssd: shell command injection in sssctl
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 6.7 | null | null |
RHSA-2015:2522
|
Red Hat Security Advisory: apache-commons-collections security update
|
apache-commons-collections: InvokerTransformer code execution during deserialisation
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | null | null |
RHSA-2024:1484
|
Red Hat Security Advisory: firefox security update
|
nss: timing attack against RSA decryption Mozilla: Crash in NSS TLS method Mozilla: JIT code failed to save return registers on Armv7-A Mozilla: Integer overflow could have led to out of bounds write Mozilla: Improper handling of html and body tags enabled CSP nonce leakage Mozilla: Clickjacking vulnerability could have led to a user accidentally granting permissions Mozilla: Self referencing object could have potentially led to a use-after-free Mozilla: Memory safety bugs fixed in Firefox 124, Firefox ESR 115.9, and Thunderbird 115.9 Mozilla: Improve handling of out-of-memory conditions in ICU Mozilla: Privileged JavaScript Execution via Event Handlers
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 8.8 | null | null |
RHSA-2023:4464
|
Red Hat Security Advisory: firefox security update
|
Mozilla: Offscreen Canvas could have bypassed cross-origin restrictions Mozilla: Incorrect value used during WASM compilation Mozilla: Potential permissions request bypass via clickjacking Mozilla: Crash in DOMParser due to out-of-memory conditions Mozilla: Fix potential race conditions when releasing platform objects Mozilla: Stack buffer overflow in StorageManager Mozilla: Cookie jar overflow caused unexpected cookie jar state Mozilla: Memory safety bugs fixed in Firefox 116, Firefox ESR 115.1, Firefox ESR 102.14, Thunderbird 115.1, and Thunderbird 102.14 Mozilla: Memory safety bugs fixed in Firefox ESR 115.1, and Thunderbird 115.1
|
[
"cpe:/a:redhat:rhel_e4s:8.1::appstream"
] | null | 9.8 | null | null |
RHSA-2009:0347
|
Red Hat Security Advisory: JBoss Enterprise Application Platform 4.3.0CP04 update
|
JBoss EAP unprivileged local xml file access
|
[
"cpe:/a:redhat:jboss_enterprise_application_platform:4.3.0::el4"
] | null | null | null | null |
RHSA-2015:1005
|
Red Hat Security Advisory: flash-plugin security update
|
flash-plugin: multiple code execution issues fixed in APSB15-09 flash-plugin: multiple code execution issues fixed in APSB15-09 flash-plugin: security bypass leading to information disclosure (APSB15-09) flash-plugin: multiple code execution issues fixed in APSB15-09 flash-plugin: multiple code execution issues fixed in APSB15-09 flash-plugin: multiple code execution issues fixed in APSB15-09 flash-plugin: multiple code execution issues fixed in APSB15-09 flash-plugin: multiple code execution issues fixed in APSB15-09 flash-plugin: multiple code execution issues fixed in APSB15-09 flash-plugin: multiple code execution issues fixed in APSB15-09 flash-plugin: multiple code execution issues fixed in APSB15-09 flash-plugin: multiple code execution issues fixed in APSB15-09 flash-plugin: multiple code execution issues fixed in APSB15-09 flash-plugin: information leaks leading to ASLR bypass (APSB15-09) flash-plugin: information leaks leading to ASLR bypass (APSB15-09) flash-plugin: multiple code execution issues fixed in APSB15-09
|
[
"cpe:/a:redhat:rhel_extras:5::client",
"cpe:/a:redhat:rhel_extras:5::server",
"cpe:/a:redhat:rhel_extras:6"
] | null | null | null | null |
RHSA-2022:1360
|
Red Hat Security Advisory: Red Hat Fuse 7.10.2 release and security update
|
spring-framework: RCE via Data Binding on JDK 9+
|
[
"cpe:/a:redhat:jboss_fuse:7"
] | null | 8.1 | null | null |
RHSA-2005:498
|
Red Hat Security Advisory: spamassassin security update
|
security flaw
|
[
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2018:3221
|
Red Hat Security Advisory: openssl security, bug fix, and enhancement update
|
openssl: Malformed X.509 IPAdressFamily could cause OOB read ROHNP: Key Extraction Side Channel in Multiple Crypto Libraries openssl: Malicious server can send large prime to client during DH(E) TLS handshake causing the client to hang openssl: RSA key generation cache timing vulnerability in crypto/rsa/rsa_gen.c allows attackers to recover private keys openssl: Handling of crafted recursive ASN.1 structures can cause a stack overflow and resulting denial of service
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 6.5 | null |
RHSA-2024:10953
|
Red Hat Security Advisory: python36:3.6 security update
|
virtualenv: potential command injection via virtual environment activation scripts
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 7.8 | null | null |
RHSA-2021:4198
|
Red Hat Security Advisory: edk2 security, bug fix, and enhancement update
|
edk2: NULL pointer dereference in AuthenticodeVerify() openssl: integer overflow in CipherUpdate openssl: NULL pointer dereference in X509_issuer_and_serial_hash() edk2: unlimited FV recursion, round 2
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 7.8 | null | null |
RHSA-2024:1559
|
Red Hat Security Advisory: OpenShift Container Platform 4.15.6 bug fix and security update
|
kubevirt-csi: PersistentVolume allows access to HCP's root node golang-protobuf: encoding/protojson, internal/encoding/json: infinite loop in protojson.Unmarshal when unmarshaling certain forms of invalid JSON
|
[
"cpe:/a:redhat:openshift:4.15::el8",
"cpe:/a:redhat:openshift:4.15::el9"
] | null | 5.9 | null | null |
RHSA-2024:3312
|
Red Hat Security Advisory: glibc security update
|
glibc: Out of bounds write in iconv may lead to remote code execution glibc: stack-based buffer overflow in netgroup cache glibc: null pointer dereferences after failed netgroup cache insertion glibc: netgroup cache may terminate daemon on memory allocation failure glibc: netgroup cache assumes NSS callback uses in-buffer strings
|
[
"cpe:/a:redhat:rhel_eus:8.8::appstream",
"cpe:/a:redhat:rhel_eus:8.8::crb",
"cpe:/o:redhat:rhel_eus:8.8::baseos"
] | null | 4 | null | null |
RHSA-2023:0859
|
Red Hat Security Advisory: Red Hat Virtualization Host 4.4.z SP 1 security update batch#4 (oVirt-4.5.3-4)
|
kernel: i915: Incorrect GPU TLB flush can lead to random memory access libksba: integer overflow to code execution sudo: arbitrary file write with privileges of the RunAs user
|
[
"cpe:/o:redhat:rhev_hypervisor:4.4::el8"
] | null | 7.8 | null | null |
RHSA-2003:317
|
Red Hat Security Advisory: iproute security update
|
security flaw
|
[
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws"
] | null | null | null | null |
RHSA-2024:4972
|
Red Hat Security Advisory: Errata Advisory for Red Hat OpenShift GitOps v1.11.7 security update
|
argo-cd: Argo CD web terminal session doesn't expire argocd: Unauthenticated Denial of Service (DoS) Vulnerability via /api/webhook Endpoint in Argo CD
|
[
"cpe:/a:redhat:openshift_gitops:1.11::el8"
] | null | 7.5 | null | null |
RHSA-2015:2684
|
Red Hat Security Advisory: openstack-nova secuity and bug fix advisory
|
openstack-nova: network security group changes are not applied to running instances
|
[
"cpe:/a:redhat:openstack:5::el7"
] | null | null | null | null |
RHSA-2024:3120
|
Red Hat Security Advisory: freeglut security update
|
freeglut: memory leak via glutAddSubMenu() function freeglut: memory leak via glutAddMenuEntry() function
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 5.3 | null | null |
RHSA-2024:5601
|
Red Hat Security Advisory: libreoffice security update
|
libreoffice: Ability to trust not validated macro signatures removed in high security mode
|
[
"cpe:/a:redhat:rhel_aus:8.4::appstream",
"cpe:/a:redhat:rhel_e4s:8.4::appstream",
"cpe:/a:redhat:rhel_tus:8.4::appstream"
] | null | 7.8 | null | null |
RHSA-2020:1308
|
Red Hat Security Advisory: Red Hat Virtualization Engine security, bug fix 4.3.9
|
apache-commons-beanutils: does not suppresses the class property in PropertyUtilsBean by default nimbus-jose-jwt: Uncaught exceptions while parsing a JWT
|
[
"cpe:/a:redhat:rhev_manager:4.3",
"cpe:/o:redhat:enterprise_linux:7::hypervisor"
] | null | null | 6.5 | null |
RHSA-2018:3458
|
Red Hat Security Advisory: thunderbird security update
|
Mozilla: Proxy bypass using automount and autofs Mozilla: Memory safety bugs fixed in Firefox 62 and Firefox ESR 60.2 Mozilla: Use-after-free in driver timers Mozilla: Use-after-free in IndexedDB Mozilla: Out-of-bounds write with malicious MAR file Mozilla: Setting a master password post-Firefox 58 does not delete unencrypted previously stored passwords Mozilla: Crash in TransportSecurityInfo due to cached data Mozilla: Same-origin policy violation using meta refresh and performance.getEntries to steal cross-origin URLs
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 6.5 | null |
RHSA-2003:044
|
Red Hat Security Advisory: : Updated w3m packages fix cross-site scripting issues
|
security flaw security flaw
|
[
"cpe:/o:redhat:linux:7.0j",
"cpe:/o:redhat:linux:7.2",
"cpe:/o:redhat:linux:7.3",
"cpe:/o:redhat:linux:8.0"
] | null | null | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.