id
stringlengths 13
15
| title
stringlengths 29
176
| description
stringlengths 8
32.1k
| cpes
listlengths 0
20
| cvss_v4_0
null | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
null |
---|---|---|---|---|---|---|---|
RHSA-2019:1235
|
Red Hat Security Advisory: ruby security update
|
rubygems: Escape sequence injection vulnerability in verbose rubygems: Escape sequence injection vulnerability in gem owner rubygems: Escape sequence injection vulnerability in API response handling rubygems: Installing a malicious gem may lead to arbitrary code execution rubygems: Escape sequence injection vulnerability in errors
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 5.3 | null |
RHSA-2014:0902
|
Red Hat Security Advisory: java-1.7.0-oracle security update
|
OpenJDK: Restrict use of privileged annotations (Libraries, 8034985) OpenJDK: Event logger format string vulnerability (Hotspot, 8037076) JDK: unspecified vulnerability fixed in 7u65 and 8u11 (Deployment) OpenJDK: SubjectDelegator protection insufficient (JMX, 8029755) OpenJDK: Incorrect generic signature attribute parsing (Hotspot, 8037076) OpenJDK: Clone interfaces passed to proxy methods (Libraries, 8035009) OpenJDK: Bytecode verification does not prevent ctor calls to this() and super() (Hotspot, 8035119) JDK: unspecified vulnerability fixed in 7u65 and 8u11 (Deployment) OpenJDK: MethodHandles.Lookup insufficient modifiers checks (Libraries, 8035788) OpenJDK: Incorrect handling of invocations with exhausted ranks (Libraries, 8035793) JDK: unspecified vulnerability fixed in 6u81, 7u65 and 8u11 (Deployment) OpenJDK: RSA blinding issues (Security, 8031346) OpenJDK: Prevent instantiation of service with non-public constructor (Security, 8035004) OpenJDK: AtomicReferenceFieldUpdater missing primitive type check (Libraries, 8039520) OpenJDK: insufficient Diffie-Hellman public key validation (Security, 8037162) OpenJDK: Incorrect TLS/EC management (Security, 8031340) JDK: unspecified vulnerability fixed in 6u81, 7u65 and 8u11 (Deployment) OpenJDK: InfoBuilder incorrect return values (Serviceability, 8033301)
|
[
"cpe:/a:redhat:rhel_extras_oracle_java:5",
"cpe:/a:redhat:rhel_extras_oracle_java:6",
"cpe:/a:redhat:rhel_extras_oracle_java:7"
] | null | null | null | null |
RHSA-2023:1200
|
Red Hat Security Advisory: gnutls security and bug fix update
|
gnutls: timing side-channel in the TLS RSA key exchange code
|
[
"cpe:/a:redhat:rhel_eus:9.0::appstream",
"cpe:/o:redhat:rhel_eus:9.0::baseos"
] | null | 7.4 | null | null |
RHSA-2021:2563
|
Red Hat Security Advisory: kpatch-patch security update
|
kernel: use-after-free in net/bluetooth/hci_event.c when destroying an hci_chan
|
[
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 7.8 | null | null |
RHSA-2024:0050
|
Red Hat Security Advisory: OpenShift Container Platform 4.14.8 bug fix and security update
|
golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487) opentelemetry: DoS vulnerability in otelhttp
|
[
"cpe:/a:redhat:openshift:4.14::el8",
"cpe:/a:redhat:openshift:4.14::el9"
] | null | 7.5 | null | null |
RHSA-2022:4887
|
Red Hat Security Advisory: thunderbird security update
|
Mozilla: Braille space character caused incorrect sender email to be shown for a digitally signed email Mozilla: Cross-Origin resource's length leaked Mozilla: Heap buffer overflow in WebGL Mozilla: Browser window spoof using fullscreen mode Mozilla: Register allocation problem in WASM on arm64 Mozilla: Uninitialized variable leads to invalid memory read Mozilla: Querying a WebAuthn token with a large number of allowCredential entries may have leaked cross-origin information Mozilla: Memory safety bugs fixed in Firefox 101 and Firefox ESR 91.10
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 9.8 | 6.1 | null |
RHSA-2020:1503
|
Red Hat Security Advisory: rh-git218-git security update
|
git: Crafted URL containing new lines can cause credential leak
|
[
"cpe:/a:redhat:rhel_software_collections:3::el7"
] | null | 7.5 | null | null |
RHSA-2016:2706
|
Red Hat Security Advisory: qemu-kvm-rhev security, bug fix, and enhancement update
|
Qemu: OOB access in address_space_rw leads to segmentation fault Qemu: OOB access in address_space_rw leads to segmentation fault Qemu: net: out of bounds read in net_checksum_calculate()
|
[
"cpe:/a:redhat:openstack:5::el7"
] | null | null | 4.7 | null |
RHSA-2004:139
|
Red Hat Security Advisory: apache, openssl security update for Stronghold
|
security flaw security flaw security flaw security flaw
|
[
"cpe:/a:redhat:stronghold:4"
] | null | null | null | null |
RHBA-2014:1630
|
Red Hat Bug Fix Advisory: Red Hat OpenShift Enterprise 2.1 jenkins-plugin-openshift bug fix update
|
jenkins: default markup formatter permits offsite-bound forms (SECURITY-88) Jenkins: insecure storage of passwords in Subversion plugin (SECURITY-58) jenkins: configure a project you do not have access to (SECURITY-55) jenkins: command line interface job creation directory traversal (SECURITY-108) jenkins: session hijacking issue in Winstone (SECURITY-106) jenkins: clear text password disclosure (SECURITY-93) jenkins: user tokens not invalidated correctly (SECURITY-89) jenkins: interface vulnerable to clickjacking attacks (SECURITY-80) jenkins: failed log in attemps revealing if a user is valid or not (SECURITY-79) jenkins: input validation issue (SECURITY-77) jenkins: session fixation issue (SECURITY-75) jenkins: stored cross-site scripting flaw (SECURITY-74) jenkins: information leak via system diagnostic functionalities (SECURITY-73) jenkins: denial of service (SECURITY-87) jenkins: username discovery (SECURITY-110) jenkins: job configuration issues (SECURITY-127, SECURITY-128) jenkins: directory traversal flaw (SECURITY-131) jenkins: remote code execution from slaves (SECURITY-144) jenkins: remote code execution flaw (SECURITY-150) jenkins: plug-in code can be downloaded by anyone with read access (SECURITY-155) jenkins: cross-site scripting flaws in the monitoring plug-in (SECURITY-113) jenkins: cross-site scripting flaw in Jenkins core (SECURITY-143)
|
[
"cpe:/a:redhat:openshift:2.0::el6"
] | null | null | null | null |
RHSA-2022:7978
|
Red Hat Security Advisory: gimp security and enhancement update
|
gimp: buffer overflow through a crafted XCF file gimp: unhandled exception via a crafted XCF file may lead to DoS
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 5.5 | null | null |
RHSA-2020:1084
|
Red Hat Security Advisory: samba security, bug fix, and enhancement update
|
samba: Combination of parameters and permissions can allow user to escape from the share path definition samba: smb client vulnerable to filenames containing path separators
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 5.3 | null |
RHSA-2022:8852
|
Red Hat Security Advisory: Red Hat OpenStack Platform 16.2.4 (numpy) security update
|
numpy: NULL pointer dereference in numpy.sort in in the PyArray_DescrNew() due to missing return-value validation
|
[
"cpe:/a:redhat:openstack:16.2::el8"
] | null | 7.5 | null | null |
RHSA-2024:1561
|
Red Hat Security Advisory: Red Hat build of MicroShift 4.15.6 security update
|
golang-fips/openssl: Memory leaks in code encrypting and decrypting RSA payloads
|
[
"cpe:/a:redhat:openshift:4.15::el9"
] | null | 7.5 | null | null |
RHSA-2024:4562
|
Red Hat Security Advisory: OpenJDK 8u422 Security Update for Portable Linux Builds
|
OpenJDK: potential UTF8 size overflow (8314794) OpenJDK: Excessive symbol length can lead to infinite loop (8319859) OpenJDK: Range Check Elimination (RCE) pre-loop limit overflow (8320548) OpenJDK: Pack200 increase loading time due to improper header validation (8322106) OpenJDK: Out-of-bounds access in 2D image handling (8324559) OpenJDK: RangeCheckElimination array index overflow (8323231)
|
[
"cpe:/a:redhat:openjdk:1.8"
] | null | 7.4 | null | null |
RHSA-2007:0245
|
Red Hat Security Advisory: cpio security and bug fix update
|
cpio large filesize buffer overflow
|
[
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2024:6493
|
Red Hat Security Advisory: Red Hat Single Sign-On 7.6.10 security update on RHEL 7
|
keycloak: potential bypass of brute force protection keycloak: Leak of configured LDAP bind credentials through the Keycloak admin console wildfly-elytron: org.keycloak/keycloak-services: session fixation in elytron saml adapters
|
[
"cpe:/a:redhat:red_hat_single_sign_on:7.6::el7"
] | null | 7.1 | null | null |
RHSA-2010:0893
|
Red Hat Security Advisory: kernel security and bug fix update
|
kernel: nfsd4: bug in read_buf
|
[
"cpe:/o:redhat:rhel_eus:5.3"
] | null | null | null | null |
RHSA-2024:9680
|
Red Hat Security Advisory: webkit2gtk3 security update
|
webkitgtk: Memory corruption issue when processing web content webkitgtk: arbitrary javascript code execution webkitgtk: Processing web content may lead to arbitrary code execution webkitgtk: Arbitrary Remote Code Execution chromium-browser: Use after free in ANGLE webkitgtk: type confusion may lead to arbitrary code execution webkitgtk: Processing web content may lead to arbitrary code execution webkitgtk: Processing web content may lead to arbitrary code execution webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution webkitgtk: webkit2gtk: Use after free may lead to Remote Code Execution webkitgtk: webkit2gtk: Out-of-bounds read was addressed with improved bounds checking webkitgtk: webkit2gtk: Out-of-bounds read was addressed with improved bounds checking webkitgtk: webkit2gtk: Use-after-free was addressed with improved memory management webkitgtk: webkit2gtk: Processing maliciously crafted web content may lead to an unexpected process crash webkitgtk: webkit2gtk: Processing maliciously crafted web content may lead to an unexpected process crash webkitgtk: webkit2gtk: Processing maliciously crafted web content may lead to an unexpected process crash webkit: Processing maliciously crafted web content may lead to memory corruption
|
[
"cpe:/a:redhat:rhel_aus:8.2::appstream"
] | null | 8.8 | null | null |
RHSA-2014:0678
|
Red Hat Security Advisory: kernel security update
|
kernel: pty layer race condition leading to memory corruption
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | null | null |
RHSA-2014:1947
|
Red Hat Security Advisory: rhevm-log-collector security update
|
ovirt-engine-log-collector: database password disclosed in process listing
|
[
"cpe:/a:redhat:rhev_manager:3"
] | null | null | null | null |
RHSA-2022:5244
|
Red Hat Security Advisory: expat security update
|
expat: Stack exhaustion in doctype parsing expat: Integer overflow in copyString()
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/o:redhat:enterprise_linux:9::baseos"
] | null | 7.5 | null | null |
RHSA-2019:1661
|
Red Hat Security Advisory: spacewalk-backend security update
|
spacewalk: Insecure computation of authentication signatures during user authentication
|
[
"cpe:/a:redhat:network_satellite:5.8::el6"
] | null | null | 4.3 | null |
RHSA-2024:3717
|
Red Hat Security Advisory: OpenShift Container Platform 4.17.0 security and extras update
|
golang-protobuf: encoding/protojson, internal/encoding/json: infinite loop in protojson.Unmarshal when unmarshaling certain forms of invalid JSON
|
[
"cpe:/a:redhat:openshift:4.17::el8",
"cpe:/a:redhat:openshift:4.17::el9"
] | null | 5.9 | null | null |
RHSA-2008:0577
|
Red Hat Security Advisory: rhpki-common security update
|
System: incorrect handling of Extensions in CSRs (cs71)
|
[
"cpe:/a:redhat:certificate_system:7.2"
] | null | null | null | null |
RHSA-2004:163
|
Red Hat Security Advisory: : Updated OpenOffice packages fix security vulnerability in neon
|
security flaw
|
[
"cpe:/o:redhat:linux:9"
] | null | null | null | null |
RHSA-2015:1694
|
Red Hat Security Advisory: gdk-pixbuf2 security update
|
Mozilla: Heap overflow in gdk-pixbuf when scaling bitmap images (MFSA 2015-88)
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation",
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | null | null |
RHSA-2024:8122
|
Red Hat Security Advisory: OpenJDK 11.0.25 Security Update for Portable Linux Builds
|
giflib: Heap-Buffer Overflow during Image Saving in DumpScreen2RGB Function JDK: HTTP client improper handling of maxHeaderSize (8328286) JDK: Array indexing integer overflow (8328544) JDK: Unbounded allocation leads to out-of-memory error (8331446) JDK: Integer conversion error leads to incorrect range check (8332644)
|
[
"cpe:/a:redhat:openjdk:11"
] | null | 4.8 | null | null |
RHSA-2021:0299
|
Red Hat Security Advisory: thunderbird security update
|
Mozilla: IMAP Response Injection when using STARTTLS Mozilla: HTTPS pages could have been intercepted by a registered service worker when they should not have been Mozilla: Cross-origin information leakage via redirected PDF requests Mozilla: Type confusion when using logical assignment operators in JavaScript switch statements Mozilla: Use-after-poison for incorrectly redeclared JavaScript variables during GC Mozilla: Memory safety bugs fixed in Firefox 85 and Firefox ESR 78.7
|
[
"cpe:/a:redhat:rhel_eus:8.2::appstream"
] | null | 8.8 | 6.1 | null |
RHSA-2004:045
|
Red Hat Security Advisory: gaim security update
|
security flaw security flaw
|
[
"cpe:/o:redhat:enterprise_linux:2.1::as",
"cpe:/o:redhat:enterprise_linux:2.1::aw",
"cpe:/o:redhat:enterprise_linux:2.1::es",
"cpe:/o:redhat:enterprise_linux:2.1::ws"
] | null | null | null | null |
RHSA-2023:6039
|
Red Hat Security Advisory: Node Maintenance Operator 5.0.1 security update
|
golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487) HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack)
|
[
"cpe:/a:redhat:workload_availability_nmo:5.0::el8"
] | null | 7.5 | null | null |
RHSA-2025:0650
|
Red Hat Security Advisory: OpenShift Container Platform 4.16.32 bug fix and security update
|
python: Path traversal on tempfile.TemporaryDirectory runc: file descriptor leak golang.org/x/net/html: Non-linear parsing of case-insensitive content in golang.org/x/net/html
|
[
"cpe:/a:redhat:openshift:4.16::el9"
] | null | 7.5 | null | null |
RHSA-2017:0864
|
Red Hat Security Advisory: Red Hat Enterprise Linux 7.1 Extended Update Support Retirement Notice
|
This is the final notification for the retirement of Red Hat Enterprise Linux 7.1 Extended Update Support (EUS). This notification applies only to those customers subscribed to the Extended Update Support (EUS) channel for Red Hat Enterprise Linux 7.1.
|
[
"cpe:/o:redhat:rhel_eus:7.1::computenode",
"cpe:/o:redhat:rhel_eus:7.1::server"
] | null | null | null | null |
RHSA-2014:1795
|
Red Hat Security Advisory: cups-filters security update
|
cups-filters: cups-browsed DoS via process_browse_data() OOB read cups-filters: unsupported BrowseAllow value lets cups-browsed accept from all hosts
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | null | null |
RHSA-2023:1102
|
Red Hat Security Advisory: rh-mysql80-mysql security update
|
mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2022) mysql: Server: Stored Procedure unspecified vulnerability (CPU Oct 2022) mysql: InnoDB unspecified vulnerability (CPU Oct 2022) mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2022) mysql: InnoDB unspecified vulnerability (CPU Oct 2022) mysql: Server: Connection Handling unspecified vulnerability (CPU Oct 2022) mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2022) mysql: Server: Security: Privileges unspecified vulnerability (CPU Oct 2022) mysql: Server: Replication unspecified vulnerability (CPU Oct 2022) mysql: InnoDB unspecified vulnerability (CPU Oct 2022) mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2022) mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2022) mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2022) mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2022) mysql: Server: DML unspecified vulnerability (CPU Jan 2023) mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2023) mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2023) mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2023) mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2023) mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2023) mysql: InnoDB unspecified vulnerability (CPU Jan 2023) mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2023) mysql: InnoDB unspecified vulnerability (CPU Jan 2023) mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2023) mysql: Server: Thread Pooling unspecified vulnerability (CPU Jan 2023) mysql: Server: Security: Encryption unspecified vulnerability (CPU Jan 2023) mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2023) mysql: InnoDB unspecified vulnerability (CPU Jan 2023) mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2023) mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2023) mysql: InnoDB unspecified vulnerability (CPU Jan 2023) mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2023) mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2023) mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2023) mysql: Server: GIS unspecified vulnerability (CPU Jan 2023) mysql: Server: Security: Privileges unspecified vulnerability (CPU Apr 2023) mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2023) mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2023) mysql: Server: Connection Handling unspecified vulnerability (CPU Apr 2023) mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2023) mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2023) mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2023)
|
[
"cpe:/a:redhat:rhel_software_collections:3::el7"
] | null | 4.9 | null | null |
RHSA-2020:4469
|
Red Hat Security Advisory: cups security and bug fix update
|
cups: heap based buffer overflow in libcups's ppdFindOption() in ppd-mark.c
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 4.5 | null | null |
RHSA-2004:591
|
Red Hat Security Advisory: squid security update
|
Squid SNMP DoS
|
[
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws"
] | null | null | null | null |
RHSA-2024:11559
|
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 8.0.5 Security update
|
undertow: information leakage via HTTP/2 request header reuse hornetq-core-client: Arbitrarily overwrite files or access sensitive information
|
[
"cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el8"
] | null | 7.1 | null | null |
RHSA-2021:1511
|
Red Hat Security Advisory: AMQ Clients 2.9.1 release and security update
|
netty: Information disclosure via the local system temporary directory netty: possible request smuggling in HTTP/2 due missing validation netty: Request smuggling via content-length header
|
[
"cpe:/a:redhat:a_mq_clients:2::el7",
"cpe:/a:redhat:a_mq_clients:2::el8"
] | null | 5.9 | null | null |
RHSA-2006:0194
|
Red Hat Security Advisory: gd security update
|
gd: additional overflows
|
[
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2014:0628
|
Red Hat Security Advisory: openssl security update
|
openssl: freelist misuse causing a possible use-after-free openssl: Buffer overflow via DTLS invalid fragment openssl: SSL_MODE_RELEASE_BUFFERS NULL pointer dereference in do_ssl3_write() openssl: DoS when sending invalid DTLS handshake openssl: SSL/TLS MITM vulnerability openssl: client-side denial of service when using anonymous ECDH
|
[
"cpe:/a:redhat:storage:2.1:server:el6"
] | null | null | null | null |
RHSA-2023:7260
|
Red Hat Security Advisory: open-vm-tools security update
|
open-vm-tools: SAML token signature bypass open-vm-tools: file descriptor hijack vulnerability in the vmware-user-suid-wrapper
|
[
"cpe:/a:redhat:rhel_e4s:8.1::appstream"
] | null | 7.4 | null | null |
RHSA-2022:6102
|
Red Hat Security Advisory: OpenShift Container Platform 4.11.1 packages and security update
|
golang: crypto/tls: session tickets lack random ticket_age_add
|
[
"cpe:/a:redhat:openshift:4.11::el8"
] | null | 3.1 | null | null |
RHSA-2024:4626
|
Red Hat Security Advisory: Errata Advisory for Red Hat OpenShift GitOps v1.11.6 security update
|
golang-protobuf: encoding/protojson, internal/encoding/json: infinite loop in protojson.Unmarshal when unmarshaling certain forms of invalid JSON helm: Dependency management path traversal helm: Missing YAML Content Leads To Panic
|
[
"cpe:/a:redhat:openshift_gitops:1.11::el8"
] | null | 7.5 | null | null |
RHSA-2017:0837
|
Red Hat Security Advisory: icoutils security update
|
icoutils: Check_offset overflow on 64-bit systems icoutils: Access to unallocated memory possible in extract.c icoutils: Integer overflow vulnerability in extract.c icoutils: Buffer overflow in the decode_ne_resource_id function icoutils: Buffer overflow in the extract_icons function icoutils: Buffer overflow in the simple_vec function
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 8.1 | null |
RHSA-2021:2666
|
Red Hat Security Advisory: kernel security and bug fix update
|
kernel: security bypass in certs/blacklist.c and certs/system_keyring.c kernel: use-after-free in net/bluetooth/hci_event.c when destroying an hci_chan
|
[
"cpe:/a:redhat:rhel_eus:8.1::crb",
"cpe:/o:redhat:rhel_eus:8.1::baseos"
] | null | 7.8 | null | null |
RHSA-2024:10977
|
Red Hat Security Advisory: ruby security update
|
rexml: REXML ReDoS vulnerability
|
[
"cpe:/a:redhat:rhel_e4s:9.0::appstream"
] | null | 7.5 | null | null |
RHSA-2022:8139
|
Red Hat Security Advisory: wavpack security update
|
wavpack: Heap out-of-bounds read in WavpackPackSamples()
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::crb"
] | null | 3.5 | null | null |
RHSA-2020:4805
|
Red Hat Security Advisory: edk2 security, bug fix, and enhancement update
|
edk2: memory leak in ArpOnFrameRcvdDpc
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | null | 5.3 | null |
RHSA-2021:3254
|
Red Hat Security Advisory: rh-python38 security, bug fix, and enhancement update
|
python-cryptography: Bleichenbacher timing oracle attack against RSA decryption python: Unsafe use of eval() on data retrieved via HTTP in the test suite python-lxml: mXSS due to the use of improper parser python-jinja2: ReDoS vulnerability in the urlize filter python-cryptography: Large inputs for symmetric encryption can trigger integer overflow leading to buffer overflow python: Stack-based buffer overflow in PyCArg_repr in _ctypes/callproc.c python: Information disclosure via pydoc python-pip: Incorrect handling of unicode separators in git references python: urllib: Regular expression DoS in AbstractBasicAuthHandler python: ftplib should not use the host from the PASV response python-babel: Relative path traversal allows attacker to load arbitrary locale files and execute arbitrary code python: Web cache poisoning via urllib.parse.parse_qsl and urllib.parse.parse_qs by using a semicolon in query parameters python-lxml: Missing input sanitization for formaction HTML5 attributes may lead to XSS python-ipaddress: Improper input validation of octal strings python-urllib3: ReDoS in the parsing of authority part of URL python-babel: Relative path traversal allows attacker to load arbitrary locale files and execute arbitrary code python: urllib.parse does not sanitize URLs containing ASCII newline and tabs
|
[
"cpe:/a:redhat:rhel_software_collections:3::el7"
] | null | 5.3 | null | null |
RHSA-2014:1148
|
Red Hat Security Advisory: squid security update
|
squid: buffer overflow when processing overly long DNS names (SQUID-2013:2) squid: assertion failure in Range header processing (SQUID-2014:2)
|
[
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2019:1482
|
Red Hat Security Advisory: kernel security update
|
Kernel: tcp: integer overflow while processing SACK blocks allows remote denial of service Kernel: tcp: excessive resource consumption while processing SACK blocks allows remote denial of service kernel: tcp: excessive resource consumption for TCP connections with low MSS allows remote denial of service
|
[
"cpe:/o:redhat:rhel_eus:7.5::computenode",
"cpe:/o:redhat:rhel_eus:7.5::server"
] | null | null | 5.3 | null |
RHSA-2018:1643
|
Red Hat Security Advisory: qemu-kvm-rhev security update
|
hw: cpu: speculative store bypass QEMU: i386: multiboot OOB access while loading kernel image QEMU: cirrus: OOB access when updating VGA display
|
[
"cpe:/a:redhat:openstack:12::el7"
] | null | null | 5.5 | null |
RHSA-2022:5132
|
Red Hat Security Advisory: RHACS 3.68 security update
|
stackrox: Improper sanitization allows users to retrieve Notifier secrets from GraphQL API in plaintext
|
[
"cpe:/a:redhat:advanced_cluster_security:3.68::el8"
] | null | 8.8 | null | null |
RHSA-2014:1290
|
Red Hat Security Advisory: Red Hat JBoss BRMS 6.0.3 update
|
HawtJNI: predictable temporary file name leading to local arbitrary code execution Java: XML eXternal Entity (XXE) flaw in ParserPool and Decrypter jboss-as-server: Unchecked access to MSC Service Registry under JSM EAP6: Plain text password logging during security audit 6: JSM policy not respected by deployed applications Xalan-Java: insufficient constraints in secure processing feature
|
[
"cpe:/a:redhat:jboss_brms:6.0"
] | null | null | null | null |
RHSA-2024:3783
|
Red Hat Security Advisory: firefox security update
|
Mozilla: Arbitrary JavaScript execution in PDF.js Mozilla: IndexedDB files retained in private browsing mode Mozilla: Potential permissions request bypass via clickjacking Mozilla: Cross-origin responses could be distinguished between script and non-script content-types Mozilla: Use-after-free could occur when printing to PDF Mozilla: Memory safety bugs fixed in Firefox 126, Firefox ESR 115.11, and Thunderbird 115.11
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 6.1 | null | null |
RHSA-2025:4226
|
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.1.10 on RHEL 7 security update
|
undertow: buffer leak on incoming websocket PONG message may lead to DoS undertow: client side invocation timeout raised when calling over HTTP2 jsoup: Crafted input may cause the jsoup HTML and XML parser to get stuck xml-security: XPath Transform abuse allows for information disclosure xnio: org.xnio.StreamConnection.notifyReadClosed log to debug instead of stderr undertow: Double AJP response for 400 from EAP 7 results in CPING failures undertow: Large AJP request may cause DoS artemis-commons: Apache ActiveMQ Artemis DoS Moment.js: Path traversal in moment.locale com.google.code.gson-gson: Deserialization of Untrusted Data in com.google.code.gson-gson snakeyaml: Denial of Service due to missing nested depth limitation for collections jettison: parser crash by stackoverflow woodstox-core: woodstox to serialise XML data was vulnerable to Denial of Service attacks Undertow: Infinite loop in SslConduit during close undertow: unrestricted request storage leads to memory exhaustion undertow: OutOfMemoryError due to @MultipartConfig handling undertow: Out-of-memory Error after several closed connections with wildfly-http-client protocol
|
[
"cpe:/a:redhat:jboss_enterprise_application_platform_eus:7.1::el7"
] | null | 7.5 | null | null |
RHSA-2022:1329
|
Red Hat Security Advisory: OpenShift Virtualization 4.8.5 RPMs security update
|
golang: net: lookup functions may return invalid host names golang: net/http/httputil: ReverseProxy forwards connection headers if first one is empty golang: math/big.Rat: may cause a panic or an unrecoverable fatal error if passed inputs with very large exponents golang: crypto/tls: certificate of wrong type is causing TLS client to panic
|
[
"cpe:/a:redhat:container_native_virtualization:4.8::el7",
"cpe:/a:redhat:container_native_virtualization:4.8::el8"
] | null | 6.5 | null | null |
RHSA-2011:1161
|
Red Hat Security Advisory: freetype security update
|
BSD compress LZW decoder buffer overflow
|
[
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2013:1126
|
Red Hat Security Advisory: Red Hat Enterprise Linux 3 Extended Lifecycle Support 6-Month Notice
|
This is the 6-Month notification for the retirement of Red Hat Enterprise
Linux 3 Extended Lifecycle Support (ELS).
|
[
"cpe:/o:redhat:rhel_els:3::as",
"cpe:/o:redhat:rhel_els:3::es"
] | null | null | null | null |
RHSA-2024:4776
|
Red Hat Security Advisory: cups security update
|
cups: Cupsd Listen arbitrary chmod 0140777
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/o:redhat:enterprise_linux:9::baseos"
] | null | 4.4 | null | null |
RHSA-2023:4708
|
Red Hat Security Advisory: subscription-manager security update
|
subscription-manager: inadequate authorization of com.redhat.RHSM1 D-Bus interface allows local users to modify configuration
|
[
"cpe:/o:redhat:enterprise_linux:9::baseos"
] | null | 7.8 | null | null |
RHSA-2005:377
|
Red Hat Security Advisory: sharutils security update
|
security flaw security flaw security flaw
|
[
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws",
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2024:8359
|
Red Hat Security Advisory: python39:3.9 and python39-devel:3.9 security update
|
python: cpython: tarfile: ReDos via excessive backtracking while parsing header values
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb"
] | null | 7.5 | null | null |
RHSA-2013:0168
|
Red Hat Security Advisory: kernel security and bug fix update
|
kernel: execshield: predictable ascii armour base address kernel: net: acceptation of overlapping ipv6 fragments kernel: xen: Several memory hypercall operations allow invalid extent order values
|
[
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2023:5802
|
Red Hat Security Advisory: Migration Toolkit for Runtimes security update
|
HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack)
|
[
"cpe:/a:redhat:migration_toolkit_runtimes:1.0::el8"
] | null | 7.5 | null | null |
RHSA-2021:0993
|
Red Hat Security Advisory: thunderbird security update
|
Mozilla: Angle graphics library out of date Mozilla: Texture upload into an unbound backing buffer resulted in an out-of-bound read Mozilla: Internal network hosts could have been probed by a malicious webpage Mozilla: Malicious extensions could have spoofed popup information Mozilla: Memory safety bugs fixed in Firefox 87 and Firefox ESR 78.9
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 8.8 | 6.1 | null |
RHSA-2024:6468
|
Red Hat Security Advisory: httpd:2.4 security update
|
httpd: Security issues via backend applications whose response headers are malicious or exploitable
|
[
"cpe:/a:redhat:rhel_aus:8.6::appstream",
"cpe:/a:redhat:rhel_e4s:8.6::appstream",
"cpe:/a:redhat:rhel_tus:8.6::appstream"
] | null | 9.1 | null | null |
RHSA-2024:6567
|
Red Hat Security Advisory: kernel security update
|
kernel: efivarfs: force RO when remounting if SetVariable is not supported kernel: iommufd: Fix missing update of domains_itree after splitting iopt_area kernel: nfsd: fix RELEASE_LOCKOWNER kernel: mm: cachestat: fix folio read-after-free in cache walk kernel: mm/writeback: fix possible divide-by-zero in wb_dirty_limits(), again kernel: Bluetooth: af_bluetooth: Fix deadlock kernel: kprobes/x86: Use copy_from_kernel_nofault() to read from unsafe address kernel: KVM: SVM: Flush pages under kvm->lock to fix UAF in svm_register_enc_region() kernel: mm: cachestat: fix two shmem bugs kernel: x86/coco: Require seeding RNG with RDRAND on CoCo systems kernel: mm/hugetlb: fix missing hugetlb_lock for resv uncharge kernel: regmap: maple: Fix cache corruption in regcache_maple_drop() kernel: net: fix out-of-bounds access in ops_init kernel: net: bridge: mst: fix vlan use-after-free kernel: scsi: qedf: Ensure the copied buf is NUL terminated kernel: usb-storage: alauda: Check whether the media is initialized kernel: xhci: Handle TD clearing for multiple streams case kernel: cxl/region: Fix memregion leaks in devm_cxl_add_region() kernel: net/sched: Fix UAF when resolving a clash kernel: ppp: reject claimed-as-LCP but actually malformed packets kernel: mm: prevent derefencing NULL ptr in pfn_section_valid() kernel: nvme: avoid double free special payload kernel: PCI/MSI: Fix UAF in msi_capability_init kernel: xdp: Remove WARN() from __xdp_reg_mem_model() kernel: x86: stop playing stack games in profile_pc() kernel: Revert "mm/writeback: fix possible divide-by-zero in wb_dirty_limits(), again" kernel: mm: avoid overflows in dirty throttling logic
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::crb",
"cpe:/a:redhat:enterprise_linux:9::nfv",
"cpe:/a:redhat:enterprise_linux:9::realtime",
"cpe:/o:redhat:enterprise_linux:9::baseos"
] | null | 4.4 | null | null |
RHSA-2014:1688
|
Red Hat Security Advisory: openstack-keystone security and bug fix update
|
openstack-keystone: denial of service via V3 API authentication chaining openstack-keystone: configuration data information leak through Keystone catalog
|
[
"cpe:/a:redhat:openstack:4::el6"
] | null | null | null | null |
RHSA-2020:3343
|
Red Hat Security Advisory: thunderbird security update
|
chromium-browser: Use after free in ANGLE chromium-browser: Inappropriate implementation in WebRTC Mozilla: Potential leak of redirect targets when loading scripts in a worker Mozilla: Memory safety bugs fixed in Firefox 79 and Firefox ESR 68.11
|
[
"cpe:/a:redhat:rhel_e4s:8.0::appstream"
] | null | 8.8 | 8.8 | null |
RHSA-2022:6356
|
Red Hat Security Advisory: open-vm-tools security update
|
open-vm-tools: local root privilege escalation in the virtual machine
|
[
"cpe:/a:redhat:rhel_eus:8.4::appstream"
] | null | 7 | null | null |
RHSA-2023:1159
|
Red Hat Security Advisory: OpenShift Container Platform 4.11.31 security and extras update
|
goutils: RandomAlphaNumeric and CryptoRandomAlphaNumeric are not as random as they should be
|
[
"cpe:/a:redhat:openshift:4.11::el8"
] | null | 7 | null | null |
RHSA-2019:1946
|
Red Hat Security Advisory: kernel security, bug fix, and enhancement update
|
Kernel: kvm: nVMX: L2 guest could access hardware(L0) CR8 register kernel: net: double-free and memory corruption in get_net_ns_by_id() kernel: dereferencing NULL payload with nonzero length Kernel: speculative bounds check bypass store kernel: stack-based buffer overflow in chap_server_compute_md5() in iscsi target
|
[
"cpe:/o:redhat:rhel_eus:7.4::computenode",
"cpe:/o:redhat:rhel_eus:7.4::server"
] | null | null | 7 | null |
RHSA-2021:3646
|
Red Hat Security Advisory: OpenShift Container Platform 3.11.524 security and bug fix update
|
kubernetes: Symlink exchange can allow host filesystem access
|
[
"cpe:/a:redhat:openshift:3.11::el7"
] | null | 8.8 | null | null |
RHSA-2017:1365
|
Red Hat Security Advisory: nss security and bug fix update
|
nss: Null pointer dereference when handling empty SSLv2 messages
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 7.5 | null |
RHSA-2024:10528
|
Red Hat Security Advisory: OpenShift Container Platform 4.16.25 bug fix and security update
|
QEMU: Denial of Service via Improper Synchronization in QEMU NBD Server During Socket Closure pam: Improper Hostname Interpretation in pam_access Leads to Access Control Bypass microcode_ctl: Denial of Service
|
[
"cpe:/a:redhat:openshift:4.16::el9"
] | null | 5.3 | 7.5 | null |
RHSA-2022:5162
|
Red Hat Security Advisory: postgresql security update
|
postgresql: Autovacuum, REINDEX, and others omit "security restricted operation" sandbox
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 8.8 | null | null |
RHSA-2018:2253
|
Red Hat Security Advisory: java-1.8.0-oracle security update
|
JDK: unspecified vulnerability fixed in 6u201, 7u191, 8u181, and 10.0.2 (Libraries) JDK: unspecified vulnerability fixed in 7u191, 8u181, and 10.0.2 (JavaFX) OpenJDK: insufficient index validation in PatternSyntaxException getMessage() (Concurrency, 8199547) JDK: unspecified vulnerability fixed in 8u181 and 10.0.2 (Deployment) JDK: unspecified vulnerability fixed in 6u201, 7u191, 8u181, and 10.0.2 (JSSE)
|
[
"cpe:/a:redhat:rhel_extras_oracle_java:7"
] | null | null | 5.9 | null |
RHSA-2008:0180
|
Red Hat Security Advisory: krb5 security update
|
krb5: double free in gssapi lib krb5: uninitialized pointer use in krb5kdc krb5: possible leak of sensitive data from krb5kdc using krb4 request
|
[
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2023:1303
|
Red Hat Security Advisory: Red Hat Data Grid 7.3.10 security update
|
xstream: Arbitrary code execution via unsafe deserialization of sun.tracing.*
|
[
"cpe:/a:redhat:jboss_data_grid:7.3"
] | null | 8.5 | null | null |
RHSA-2007:1029
|
Red Hat Security Advisory: xpdf security update
|
DCTStream:: readProgressiveDataUnit() DCTStream:: reset() CCITTFaxStream:: lookChar()
|
[
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2014:1654
|
Red Hat Security Advisory: rsyslog7 security update
|
rsyslog: remote syslog PRI vulnerability
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2013:0769
|
Red Hat Security Advisory: glibc security and bug fix update
|
glibc: Buffer overrun (DoS) in regexp matcher by processing multibyte characters glibc: Stack (frame) overflow in getaddrinfo() when processing entry mapping to long list of address structures
|
[
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2021:0088
|
Red Hat Security Advisory: thunderbird security update
|
Mozilla: Use-after-free write when handling a malicious COOKIE-ECHO SCTP chunk
|
[
"cpe:/a:redhat:rhel_eus:8.2::appstream"
] | null | null | 8.8 | null |
RHSA-2016:2932
|
Red Hat Security Advisory: python-XStatic-jquery-ui security update
|
jquery-ui: cross-site scripting in dialog closeText
|
[
"cpe:/a:redhat:openstack:8::el7"
] | null | null | 6.1 | null |
RHSA-2012:1181
|
Red Hat Security Advisory: gimp security update
|
Gimp: Integer overflow in the PSD image file plugin David Koblas' GIF decoder LZW decoder buffer overflow plug-in): Heap-buffer overflow by decoding certain PSD headers plug-in): heap buffer overflow when loading external palette files plug-in): Heap-based buffer overflow by loading certain GIF images
|
[
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2018:3829
|
Red Hat Security Advisory: RHGS WA security and bug fix update
|
grafana: authentication bypass knowing only a username of an LDAP or OAuth user
|
[
"cpe:/a:redhat:storage:3.4:na:el7",
"cpe:/a:redhat:storage:3.4:wa:el7"
] | null | null | 5.5 | null |
RHSA-2023:4102
|
Red Hat Security Advisory: bind security update
|
bind: named's configured cache size limit can be significantly exceeded
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 7.5 | null | null |
RHSA-2023:7669
|
Red Hat Security Advisory: Red Hat build of Cryostat 2.4.0: new RHEL 8 container images
|
vertx-web: StaticHandler disclosure of classpath resources on Windows when mounted on a wildcard route bouncycastle: potential blind LDAP injection attack using a self-signed certificate netty: SniHandler 16MB allocation leads to OOM
|
[
"cpe:/a:redhat:cryostat:2::el8"
] | null | 6.5 | null | null |
RHSA-2014:1287
|
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 6.3.1 update
|
Validator: JSM bypass via ReflectionHelper
|
[
"cpe:/a:redhat:jboss_enterprise_application_platform:6::el7"
] | null | null | null | null |
RHSA-2009:0362
|
Red Hat Security Advisory: NetworkManager security update
|
NetworkManager: GetSecrets disclosure
|
[
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2016:1609
|
Red Hat Security Advisory: php security update
|
PHP: sets environmental variable based on user supplied Proxy request header
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | 5 | null |
RHSA-2019:1024
|
Red Hat Security Advisory: flatpak security update
|
flatpak: Sandbox bypass via IOCSTI (incomplete fix for CVE-2017-5226)
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 8.8 | null |
RHSA-2024:10869
|
Red Hat Security Advisory: redis:7 security update
|
redis: Redis SORT_RO may bypass ACL configuration redis: possible bypass of Unix socket permissions on startup redis: Denial-of-service due to malformed ACL selectors in Redis redis: Denial-of-service due to unbounded pattern matching in Redis redis: Lua library commands may lead to stack overflow and RCE in Redis
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 7 | null | null |
RHSA-2015:1139
|
Red Hat Security Advisory: kernel-rt security, bug fix, and enhancement update
|
Kernel: fs: isofs: infinite loop in CE record entries kernel: use-after-free during key garbage collection kernel: isofs: unchecked printing of ER records kernel: panic while flushing nftables rules that reference deleted chains. kernel: Linux stack ASLR implementation Integer overflow kernel: pipe: iovec overrun leading to memory corruption kernel: int80 fork from 64-bit tasks mishandling
|
[
"cpe:/a:redhat:rhel_extras_rt:7"
] | null | null | null | null |
RHSA-2023:5750
|
Red Hat Security Advisory: java-17-openjdk security and bug fix update
|
OpenJDK: memory corruption issue on x86_64 with AVX-512 (8317121) OpenJDK: certificate path validation issue during client authentication (8309966)
|
[
"cpe:/a:redhat:rhel_eus:8.6::appstream",
"cpe:/a:redhat:rhel_eus:8.6::crb"
] | null | 5.3 | null | null |
RHSA-2014:1031
|
Red Hat Security Advisory: 389-ds-base security update
|
389-ds: unauthenticated information disclosure
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation",
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | null | null |
RHSA-2022:5192
|
Red Hat Security Advisory: Red Hat OpenShift GitOps security update
|
argocd: vulnerable to an uncontrolled memory consumption bug argocd: vulnerable to a variety of attacks when an SSO login is initiated from the Argo CD CLI or the UI. argocd: cross-site scripting (XSS) allow a malicious user to inject a javascript link in the UI argocd: vulnerable to a symlink following bug allowing a malicious user with repository write access
|
[
"cpe:/a:redhat:openshift_gitops:1.3::el8"
] | null | 4.3 | null | null |
RHSA-2024:10953
|
Red Hat Security Advisory: python36:3.6 security update
|
virtualenv: potential command injection via virtual environment activation scripts
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 7.8 | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.