id
stringlengths 13
15
| title
stringlengths 29
176
| description
stringlengths 8
32.1k
| cpes
listlengths 0
20
| cvss_v4_0
null | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
null |
---|---|---|---|---|---|---|---|
RHSA-2022:5338
|
Red Hat Security Advisory: ruby:2.6 security, bug fix, and enhancement update
|
ruby: Buffer overrun in String-to-Float conversion
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 6.2 | null | null |
RHSA-2011:1244
|
Red Hat Security Advisory: seamonkey security update
|
Updated seamonkey packages that fix one security issue are now available
for Red Hat Enterprise Linux 4.
The Red Hat Security Response Team has rated this update as having
important security impact.
|
[
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2024:7207
|
Red Hat Security Advisory: osbuild-composer security update
|
encoding/gob: golang: Calling Decoder.Decode on a message which contains deeply nested structures can cause a panic due to stack exhaustion
|
[
"cpe:/a:redhat:rhel_eus:9.2::appstream"
] | null | 7.5 | null | null |
RHSA-2020:4115
|
Red Hat Security Advisory: redhat-release-virtualization-host and redhat-virtualization-host security update
|
grub2: Crafted grub.cfg file can lead to arbitrary code execution during boot process QEMU: usb: out-of-bounds r/w access issue while processing usb packets
|
[
"cpe:/o:redhat:enterprise_linux:7::hypervisor"
] | null | 5 | null | null |
RHSA-2008:1044
|
Red Hat Security Advisory: java-1.5.0-bea security update
|
java-1.5.0-bea as shipped in Red Hat Enterprise Linux 4 Extras and Red Hat
Enterprise Linux 5 Supplementary, contains security flaws and should not be
used.
This update has been rated as having important security impact by the Red
Hat Security Response Team.
|
[
"cpe:/a:redhat:rhel_extras:4",
"cpe:/a:redhat:rhel_extras:5::server"
] | null | null | null | null |
RHSA-2025:3772
|
Red Hat Security Advisory: go-toolset:rhel8 security update
|
golang: net/http: net/http: sensitive headers incorrectly sent after cross-domain redirect golang: crypto/x509: crypto/x509: usage of IPv6 zone IDs can bypass URI name constraints
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 4.2 | null | null |
RHSA-2024:1436
|
Red Hat Security Advisory: postgresql-jdbc security update
|
pgjdbc: PostgreSQL JDBC Driver allows attacker to inject SQL if using PreferQueryMode=SIMPLE
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 9.8 | null | null |
RHSA-2001:088
|
Red Hat Security Advisory: : New xloadimage packages available
|
security flaw
|
[
"cpe:/o:redhat:linux:6.2",
"cpe:/o:redhat:linux:7.0",
"cpe:/o:redhat:linux:7.1"
] | null | null | null | null |
RHSA-2024:0559
|
Red Hat Security Advisory: firefox security update
|
Mozilla: Out of bounds write in ANGLE Mozilla: Failure to update user input timestamp Mozilla: Crash when listing printers on Linux Mozilla: Bypass of Content Security Policy when directive unsafe-inline was set Mozilla: Phishing site popup could show local origin in address bar Mozilla: Potential permissions request bypass via clickjacking Mozilla: Privilege escalation through devtools Mozilla: HSTS policy on subdomain could bypass policy of upper domain Mozilla: Memory safety bugs fixed in Firefox 122, Firefox ESR 115.7, and Thunderbird 115.7
|
[
"cpe:/a:redhat:rhel_aus:8.4::appstream",
"cpe:/a:redhat:rhel_e4s:8.4::appstream",
"cpe:/a:redhat:rhel_tus:8.4::appstream"
] | null | 8.8 | null | null |
RHSA-2021:2763
|
Red Hat Security Advisory: OpenShift Container Platform 4.7.21 security and bug fix update
|
An update is now available for Red Hat OpenShift Container Platform 4.7.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
|
[
"cpe:/a:redhat:openshift:4.7::el7",
"cpe:/a:redhat:openshift:4.7::el8"
] | null | null | null | null |
RHSA-2021:1369
|
Red Hat Security Advisory: Red Hat Advanced Cluster Management 2.1.6 security and bug fix updates
|
golang.org/x/text: possibility to trigger an infinite loop in encoding/unicode could lead to crash mquery: Code injection via merge or clone operation
|
[
"cpe:/a:redhat:acm:2.1::el8"
] | null | 4.3 | null | null |
RHSA-2023:1896
|
Red Hat Security Advisory: Red Hat Advanced Cluster Management 2.5 hotfix security update for console
|
vm2: sandbox escape vm2: Sandbox Escape vm2: Sandbox Escape when exception sanitization
|
[
"cpe:/a:redhat:acm:2.5::el8"
] | null | 9.8 | null | null |
RHSA-2024:4415
|
Red Hat Security Advisory: kernel security and bug fix update
|
kernel: smb: client: fix potential OOBs in smb2_parse_contexts() kernel: netfilter: use-after-free in nft_trans_gc_catchall_sync leads to privilege escalation kernel: kvm: Avoid potential UAF in LPI translation cache kernel: netfilter: nft_ct: sanitize layer 3 and 4 protocol number in custom expectations kernel: gro: fix ownership transfer
|
[
"cpe:/a:redhat:rhel_e4s:9.0::appstream",
"cpe:/o:redhat:rhel_e4s:9.0::baseos"
] | null | 5.5 | null | null |
RHSA-2025:2784
|
Red Hat Security Advisory: grub2 security update
|
grub2: net: Out-of-bounds write in grub_net_search_config_file()
|
[
"cpe:/o:redhat:rhel_aus:8.2::baseos"
] | null | 7.6 | null | null |
RHSA-2017:0347
|
Red Hat Security Advisory: kernel security and bug fix update
|
kernel: dccp: crash while sending ipv6 reset packet kernel: use after free in dccp protocol
|
[
"cpe:/o:redhat:rhel_mission_critical:5.6"
] | null | null | 7.8 | null |
RHSA-2023:4126
|
Red Hat Security Advisory: kernel-rt security and bug fix update
|
kernel: net/ulp: use-after-free in listening ULP sockets kernel: tcindex: use-after-free vulnerability in traffic control index filter allows privilege escalation kernel: remote DoS in TIPC kernel module kernel: netfilter: use-after-free in nf_tables when processing batch requests can lead to privilege escalation
|
[
"cpe:/a:redhat:rhel_tus:8.2::nfv",
"cpe:/a:redhat:rhel_tus:8.2::realtime"
] | null | 7.8 | null | null |
RHSA-2015:0791
|
Red Hat Security Advisory: Red Hat Enterprise Linux OpenStack Platform Installer update
|
openstack-puppet-modules: pacemaker configured with default password
|
[
"cpe:/a:redhat:openstack-installer:6::el7"
] | null | null | null | null |
RHSA-2025:0165
|
Red Hat Security Advisory: thunderbird security update
|
firefox: thunderbird: WebChannel APIs susceptible to confused deputy attack firefox: thunderbird: Use-after-free when breaking lines in text firefox: Alt-Svc ALPN validation failure when redirected firefox: Compartment mismatch when parsing JavaScript JSON module firefox: Memory corruption when using JavaScript Text Segmentation firefox: thunderbird: Memory safety bugs fixed in Firefox 134, Thunderbird 134, Firefox ESR 115.19, Firefox ESR 128.6, Thunderbird 115.19, and Thunderbird 128.6 firefox: thunderbird: Memory safety bugs fixed in Firefox 134, Thunderbird 134, Firefox ESR 128.6, and Thunderbird 128.6
|
[
"cpe:/a:redhat:rhel_e4s:9.0::appstream"
] | null | 7.5 | null | null |
RHSA-2004:349
|
Red Hat Security Advisory: httpd security update
|
security flaw
|
[
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws"
] | null | null | null | null |
RHSA-2022:0832
|
Red Hat Security Advisory: .NET 6.0 on RHEL 7 security and bugfix update
|
dotnet: ASP.NET Denial of Service via FormPipeReader dotnet: double parser stack buffer overrun
|
[
"cpe:/a:redhat:rhel_dotnet:6.0::el7"
] | null | 6.3 | null | null |
RHSA-2021:2261
|
Red Hat Security Advisory: thunderbird security update
|
Mozilla: Thunderbird stored OpenPGP secret keys without master password protection Mozilla: Partial protection of inline OpenPGP message not indicated Mozilla: Memory safety bugs fixed in Firefox 89 and Firefox ESR 78.11
|
[
"cpe:/a:redhat:rhel_eus:8.2::appstream"
] | null | 8.8 | null | null |
RHSA-2014:1392
|
Red Hat Security Advisory: kernel security, bug fix, and enhancement update
|
libmnl: incorrect validation of netlink message origin allows attackers to spoof netlink messages kernel: integer overflow in fb_mmap kernel: ipc: ipc_rcu_putref refcount races kernel: net: insufficient permision checks of netlink messages Kernel: mm: try_to_unmap_cluster() should lock_page() before mlocking kernel: kvm: invalid parameter passing in kvm_iommu_map_pages() kernel: lzo1x_decompress_safe() integer overflow Kernel: ALSA: control: do not access controls outside of protected regions Kernel: ALSA: control: use-after-free in replacing user controls Kernel: ALSA: control: use-after-free in replacing user controls kernel: vfs: refcount issues during unmount on symlink Kernel: net: SCTP: fix a NULL pointer dereference during INIT collisions
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2010:0360
|
Red Hat Security Advisory: wireshark security update
|
Wireshark: various flaws in a) RADIUS, b) Bluetooth L2CAP, c) MIOP dissectors (DoS) Wireshark: Integer overflow in the AFS dissector Wireshark: Null-ptr dereference in the InfiniBand dissector Wireshark: NULL pointer dereference in the DCERPC over SMB packet disassembly wireshark: unsigned integer wrap vulnerability in ERF reader (VU#676492) wireshark: invalid pointer dereference in SMB/SMB2 dissectors wireshark: crash in LWRES dissector
|
[
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws",
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws",
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2016:0072
|
Red Hat Security Advisory: chromium-browser security update
|
chromium-browser: Multiple unspecified vulnerabilities in HarfBuzz before 1.0.6 chromium-browser: bad cast in V8 chromium-browser: use-after-free in PDFium chromium-browser: information leak in Blink chromium-browser: origin confusion in Omnibox chromium-browser: various fixes from internal audits chromium-browser: various fixes from internal audits chromium-browser: weak random number generator in Blink chromium-browser: out-of-bounds read in PDFium chromium-browser: various fixes from internal audits chromium-browser: Multiple unspecified vulnerabilities in Google V8 before 4.8.271.17 chromium-browser: Multiple unspecified vulnerabilities in HarfBuzz before 1.0.6
|
[
"cpe:/a:redhat:rhel_extras:6"
] | null | null | null | null |
RHSA-2016:2963
|
Red Hat Security Advisory: xen security update
|
Xen: qemu ioport out-of-bounds array access (XSA-199)
|
[
"cpe:/a:redhat:rhel_virtualization:5::client",
"cpe:/a:redhat:rhel_virtualization:5::server",
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | 7.6 | null |
RHSA-2023:5574
|
Red Hat Security Advisory: kpatch-patch security update
|
kernel: net/sched: cls_u32 component reference counter leak if tcf_change_indev() fails kernel: netfilter: use-after-free in nf_tables when processing batch requests can lead to privilege escalation kernel: nf_tables: stack-out-of-bounds-read in nft_byteorder_eval()
|
[
"cpe:/o:redhat:enterprise_linux:7::server"
] | null | 7.8 | null | null |
RHSA-2023:0291
|
Red Hat Security Advisory: sudo security update
|
sudo: arbitrary file write with privileges of the RunAs user
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 7.8 | null | null |
RHSA-2022:8393
|
Red Hat Security Advisory: logrotate security update
|
logrotate: potential DoS from unprivileged users via the state file
|
[
"cpe:/o:redhat:enterprise_linux:9::baseos"
] | null | 6.2 | null | null |
RHSA-2020:0564
|
Red Hat Security Advisory: systemd security update
|
systemd: use-after-free when asynchronous polkit queries are performed
|
[
"cpe:/o:redhat:rhel_e4s:8.0::baseos"
] | null | 7.8 | null | null |
RHSA-2009:1136
|
Red Hat Security Advisory: dhcp security update
|
dhclient: stack overflow leads to arbitrary code execution as root
|
[
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws",
"cpe:/o:redhat:rhel_eus:4.7::as",
"cpe:/o:redhat:rhel_eus:4.7::es"
] | null | null | null | null |
RHSA-2022:0268
|
Red Hat Security Advisory: polkit security update
|
polkit: Local privilege escalation in pkexec due to incorrect handling of argument vector
|
[
"cpe:/o:redhat:rhel_e4s:8.1::baseos"
] | null | 7.8 | null | null |
RHSA-2020:0378
|
Red Hat Security Advisory: ipa security and bug fix update
|
ipa: Batch API logging user passwords to /var/log/httpd/error_log ipa: Denial of service in IPA server due to wrong use of ber_scanf()
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 8.8 | null |
RHSA-2025:4243
|
Red Hat Security Advisory: glibc security update
|
glibc: buffer overflow in the GNU C Library's assert()
|
[
"cpe:/a:redhat:rhel_eus:9.4::appstream",
"cpe:/a:redhat:rhel_eus:9.4::crb",
"cpe:/o:redhat:rhel_eus:9.4::baseos"
] | null | 5.5 | null | null |
RHSA-2024:0965
|
Red Hat Security Advisory: unbound security update
|
bind9: KeyTrap - Extreme CPU consumption in DNSSEC validator bind9: Preparing an NSEC3 closest encloser proof can exhaust CPU resources
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 7.5 | null | null |
RHSA-2023:1948
|
Red Hat Security Advisory: Red Hat OpenStack Platform 16.2 (openstack-nova) security update
|
openstack-nova: Compute service fails to restart if the vnic_type of a bound port changed from direct to macvtap
|
[
"cpe:/a:redhat:openstack:16.2::el8"
] | null | 3.3 | null | null |
RHSA-2024:4151
|
Red Hat Security Advisory: OpenShift Container Platform 4.15.20 security update
|
ssh: Prefix truncation attack on Binary Packet Protocol (BPP) openshift/telemeter: iss check during JWT authentication can be bypassed
|
[
"cpe:/a:redhat:openshift:4.15::el8",
"cpe:/a:redhat:openshift:4.15::el9"
] | null | 7.5 | null | null |
RHSA-2019:2828
|
Red Hat Security Advisory: kernel-rt security update
|
kernel: vhost-net: guest to host kernel escape during migration
|
[
"cpe:/a:redhat:enterprise_linux:8::nfv",
"cpe:/a:redhat:enterprise_linux:8::realtime"
] | null | null | 7.2 | null |
RHSA-2013:0898
|
Red Hat Security Advisory: mesa security update
|
Mesa: Multiple integer overflows leading to heap-based bufer overflows
|
[
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2019:1269
|
Red Hat Security Advisory: firefox security update
|
mozilla: Cross-origin theft of images with ImageBitmapRenderingContext chromium-browser: Out of bounds read in Skia libpng: use-after-free in png_image_free in png.c Mozilla: Cross-origin theft of images with createImageBitmap Mozilla: Memory safety bugs fixed in Firefox 67 and Firefox ESR 60.7 Mozilla: Type confusion with object groups and UnboxedObjects Mozilla: Stealing of cross-domain images using canvas Mozilla: Compartment mismatch with fetch API Mozilla: Use-after-free of ChromeEventHandler by DocShell Mozilla: Use-after-free in XMLHttpRequest Mozilla: Use-after-free removing listeners in the event listener manager Mozilla: Buffer overflow in WebGL bufferdata on Linux Mozilla: Theft of user history data through drag and drop of hyperlinks to and from bookmarks
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | null | 6.1 | null |
RHSA-2003:158
|
Red Hat Security Advisory: : : : Updated mm packages fix temporary file handling
|
security flaw
|
[
"cpe:/o:redhat:linux:7.1"
] | null | null | null | null |
RHSA-2023:4498
|
Red Hat Security Advisory: dbus security update
|
dbus: dbus-daemon: assertion failure when a monitor is active and a message from the driver cannot be delivered
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 6.2 | null | null |
RHSA-2015:0831
|
Red Hat Security Advisory: openstack-packstack and openstack-puppet-modules update
|
openstack-puppet-modules: pacemaker configured with default password
|
[
"cpe:/a:redhat:openstack:5::el7"
] | null | null | null | null |
RHSA-2007:0235
|
Red Hat Security Advisory: util-linux security and bug fix update
|
security flaw
|
[
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2015:1214
|
Red Hat Security Advisory: flash-plugin security update
|
flash-plugin: information disclosure issues fixed in APSB15-16 flash-plugin: information disclosure issues fixed in APSB15-16 flash-plugin: information disclosure issues fixed in APSB15-16 flash-plugin: information disclosure issues fixed in APSB15-16 flash-plugin: multiple code execution issues fixed in APSB15-16 flash-plugin: multiple code execution issues fixed in APSB15-16 flash-plugin: multiple code execution issues fixed in APSB15-16 flash-plugin: multiple code execution issues fixed in APSB15-16 flash-plugin: multiple code execution issues fixed in APSB15-16 flash-plugin: multiple code execution issues fixed in APSB15-16 flash-plugin: multiple code execution issues fixed in APSB15-16 flash-plugin: multiple code execution issues fixed in APSB15-16 flash-plugin: information disclosure issues fixed in APSB15-16 flash-plugin: multiple code execution issues fixed in APSB15-16 flash-plugin: multiple code execution issues fixed in APSB15-16 flash-plugin: multiple code execution issues fixed in APSB15-16 flash-plugin: multiple code execution issues fixed in APSB15-16 flash-plugin: multiple code execution issues fixed in APSB15-16 flash-plugin: multiple code execution issues fixed in APSB15-16 flash-plugin: multiple code execution issues fixed in APSB15-16 flash-plugin: multiple code execution issues fixed in APSB15-16 flash-plugin: multiple code execution issues fixed in APSB15-16 flash-plugin: multiple code execution issues fixed in APSB15-16 flash-plugin: multiple code execution issues fixed in APSB15-16 flash-plugin: multiple code execution issues fixed in APSB15-16 flash-plugin: multiple code execution issues fixed in APSB15-16 flash-plugin: multiple code execution issues fixed in APSB15-16 flash-plugin: multiple code execution issues fixed in APSB15-16 flash-plugin: multiple code execution issues fixed in APSB15-16 flash-plugin: multiple code execution issues fixed in APSB15-16 flash-plugin: multiple code execution issues fixed in APSB15-16 flash-plugin: information disclosure issues fixed in APSB15-16 flash-plugin: multiple code execution issues fixed in APSB15-16 flash-plugin: multiple code execution issues fixed in APSB15-16 flash-plugin: code execution issue in APSA15-03 / APSB15-16 flash-plugin: multiple code execution issues fixed in APSB15-16
|
[
"cpe:/a:redhat:rhel_extras:5::client",
"cpe:/a:redhat:rhel_extras:5::server",
"cpe:/a:redhat:rhel_extras:6"
] | null | null | null | null |
RHSA-2023:1664
|
Red Hat Security Advisory: Red Hat JBoss Web Server 5.7.2 release and security update
|
tomcat: request smuggling tomcat: JsonErrorReportValve injection
|
[
"cpe:/a:redhat:jboss_enterprise_web_server:5.7"
] | null | 7.5 | null | null |
RHSA-2021:4916
|
Red Hat Security Advisory: mailman:2.1 security update
|
mailman: CSRF token bypass allows to perform CSRF attacks and admin takeover
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 8 | null | null |
RHSA-2014:1974
|
Red Hat Security Advisory: rpm security update
|
rpm: race condition during the installation process
|
[
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server",
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2022:0820
|
Red Hat Security Advisory: kernel security, bug fix, and enhancement update
|
kernel: fget: check that the fd still exists after getting a ref to it kernel: possible privileges escalation due to missing TLB flush kernel: cgroups v1 release_agent feature may allow privilege escalation kernel: improper initialization of the "flags" member of the new pipe_buffer kernel: failing usercopy allows for use-after-free exploitation
|
[
"cpe:/a:redhat:rhel_eus:8.2::crb",
"cpe:/o:redhat:rhel_eus:8.2::baseos"
] | null | 7 | null | null |
RHSA-2024:8690
|
Red Hat Security Advisory: OpenShift Container Platform 4.13.53 packages and security update
|
Podman: Buildah: cri-o: FIPS Crypto-Policy Directory Mounting Issue in containers/common Go Library buildah: Buildah allows arbitrary directory mount Podman: Buildah: CRI-O: symlink traversal vulnerability in the containers/storage library can cause Denial of Service (DoS) go/parser: golang: Calling any of the Parse functions containing deeply nested literals can cause a panic/stack exhaustion encoding/gob: golang: Calling Decoder.Decode on a message which contains deeply nested structures can cause a panic due to stack exhaustion go/build/constraint: golang: Calling Parse on a "// +build" build tag line with deeply nested expressions can cause a panic due to stack exhaustion
|
[
"cpe:/a:redhat:openshift:4.13::el8",
"cpe:/a:redhat:openshift:4.13::el9"
] | null | 5.9 | null | null |
RHSA-2023:0697
|
Red Hat Security Advisory: OpenShift Container Platform 4.10.52 security update
|
SnakeYaml: Constructor Deserialization Remote Code Execution jenkins: Observable timing discrepancy allows determining username validity
|
[
"cpe:/a:redhat:openshift:4.10::el7",
"cpe:/a:redhat:openshift:4.10::el8"
] | null | 7.5 | null | null |
RHSA-2024:7793
|
Red Hat Security Advisory: buildah security update
|
encoding/gob: golang: Calling Decoder.Decode on a message which contains deeply nested structures can cause a panic due to stack exhaustion
|
[
"cpe:/a:redhat:rhel_e4s:9.0::appstream"
] | null | 7.5 | null | null |
RHSA-2020:3949
|
Red Hat Security Advisory: librabbitmq security update
|
librabbitmq: integer overflow in amqp_handle_input in amqp_connection.c leads to heap-based buffer overflow
|
[
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 8.6 | null | null |
RHSA-2022:0233
|
Red Hat Security Advisory: java-11-openjdk security update
|
OpenJDK: Incomplete deserialization class filtering in ObjectInputStream (Serialization, 8264934) OpenJDK: Incorrect reading of TIFF files in TIFFNullDecompressor (ImageIO, 8270952) OpenJDK: Insufficient URI checks in the XSLT TransformerImpl (JAXP, 8270492) OpenJDK: Unexpected exception thrown in regex Pattern (Libraries, 8268813) OpenJDK: Incorrect marking of writeable fields (Hotspot, 8270386) OpenJDK: Incomplete checks of StringBuffer and StringBuilder during deserialization (Libraries, 8270392) OpenJDK: Incorrect IdentityHashMap size checks during deserialization (Libraries, 8270416) OpenJDK: Incorrect access checks in XMLEntityManager (JAXP, 8270498) OpenJDK: Infinite loop related to incorrect handling of newlines in XMLEntityScanner (JAXP, 8270646) OpenJDK: Array indexing issues in LIRGenerator (Hotspot, 8272014) OpenJDK: Excessive resource use when reading JAR manifest attributes (Libraries, 8272026) OpenJDK: Insufficient checks when deserializing exceptions in ObjectInputStream (Serialization, 8272236) OpenJDK: Excessive memory allocation in BMPImageReader (ImageIO, 8273756) OpenJDK: Integer overflow in BMPImageReader (ImageIO, 8273838) OpenJDK: Excessive memory allocation in TIFF*Decompressor (ImageIO, 8274096)
|
[
"cpe:/a:redhat:rhel_e4s:8.1::appstream"
] | null | 5.3 | null | null |
RHSA-2020:0296
|
Red Hat Security Advisory: openjpeg2 security update
|
openjpeg: Heap-based buffer overflow in opj_t1_clbl_decode_processor()
|
[
"cpe:/a:redhat:rhel_e4s:8.0::appstream"
] | null | 8.1 | null | null |
RHSA-2012:0547
|
Red Hat Security Advisory: php53 security update
|
php: command line arguments injection when run in CGI mode (VU#520827)
|
[
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2009:0001
|
Red Hat Security Advisory: kernel security update
|
kernel Race condition in mincore can cause "ps -ef" to hang fib_semantics.c out of bounds access vulnerability Privilege escalation via PR_SET_PDEATHSIG kernel: Missing ioctl() permission checks in aacraid driver Linux Kernel isdn_net_setcfg buffer overflow I4L: fix isdn_ioctl memory issue Issue with core dump owner kernel: insufficient range checks in fault handlers with mremap kernel: sit memory leak Linux kernel local filesystem DoS kernel: missing capability checks in sbni_ioctl() kernel: open() call allows setgid bit when user is not in new file's group
|
[
"cpe:/o:redhat:enterprise_linux:2.1::as",
"cpe:/o:redhat:enterprise_linux:2.1::es",
"cpe:/o:redhat:enterprise_linux:2.1::ws"
] | null | null | null | null |
RHSA-2023:0593
|
Red Hat Security Advisory: libksba security update
|
libksba: integer overflow to code execution
|
[
"cpe:/o:redhat:rhel_e4s:8.1::baseos"
] | null | 8.6 | null | null |
RHSA-2022:0074
|
Red Hat Security Advisory: samba security update
|
samba: SMB1 client connections can be downgraded to plaintext authentication samba: Active Directory (AD) domain user could become root on domain members
|
[
"cpe:/a:redhat:rhel_eus:8.2::crb",
"cpe:/o:redhat:rhel_eus:8.2::baseos"
] | null | 8.1 | null | null |
RHSA-2023:2257
|
Red Hat Security Advisory: tigervnc security and bug fix update
|
xorg-x11-server: XkbGetKbdByName use-after-free xorg-x11-server: XTestSwapFakeInput stack overflow xorg-x11-server: XIPassiveUngrab out-of-bounds access xorg-x11-server: XvdiSelectVideoNotify use-after-free xorg-x11-server: ScreenSaverSetAttributes use-after-free xorg-x11-server: XIChangeProperty out-of-bounds access
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 8.8 | null | null |
RHSA-2024:1411
|
Red Hat Security Advisory: opencryptoki security update
|
opencryptoki: timing side-channel in handling of RSA PKCS#1 v1.5 padded ciphertexts (Marvin)
|
[
"cpe:/a:redhat:rhel_eus:8.8::crb",
"cpe:/o:redhat:rhel_eus:8.8::baseos"
] | null | 5.9 | null | null |
RHSA-2019:2690
|
Red Hat Security Advisory: OpenShift Container Platform 3.10 security update
|
HTTP/2: flood using PING frames results in unbounded memory growth HTTP/2: flood using HEADERS frames results in unbounded memory growth kubernetes: API server allows access to cluster-scoped custom resources as if resources were namespaced
|
[
"cpe:/a:redhat:openshift:3.10::el7"
] | null | null | 5 | null |
RHSA-2009:1562
|
Red Hat Security Advisory: tomcat security update
|
Improve cookie parsing for tomcat5 tomcat request dispatcher information disclosure vulnerability tomcat6 Denial-Of-Service with AJP connection tomcat6 Information disclosure in authentication classes tomcat: XSS in Apache Tomcat calendar application tomcat XML parser information disclosure
|
[
"cpe:/a:redhat:rhel_application_server:2"
] | null | null | null | null |
RHSA-2019:3694
|
Red Hat Security Advisory: sudo security update
|
sudo: Privilege escalation via 'Runas' specification with 'ALL' keyword
|
[
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | null | 7 | null |
RHSA-2018:3833
|
Red Hat Security Advisory: firefox security update
|
Mozilla: Memory safety bugs fixed in Firefox 64 and Firefox ESR 60.4 firefox: Memory corruption in Angle Mozilla: Use-after-free with select element Mozilla: Buffer overflow in accelerated 2D canvas with Skia Mozilla: Same-origin policy violation using location attribute and performance.getEntries to steal cross-origin URLs Mozilla: Integer overflow when calculating buffer sizes for images
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 9.8 | null |
RHSA-2024:7101
|
Red Hat Security Advisory: httpd security update
|
httpd: Security issues via backend applications whose response headers are malicious or exploitable
|
[
"cpe:/o:redhat:rhel_els:7"
] | null | 9.1 | null | null |
RHSA-2007:0469
|
Red Hat Security Advisory: gdb security and bug fix update
|
GDB buffer overflow
|
[
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws"
] | null | null | null | null |
RHSA-2021:2731
|
Red Hat Security Advisory: kpatch-patch security update
|
kernel: Use after free via PI futex state kernel: use-after-free in net/bluetooth/hci_event.c when destroying an hci_chan kernel: size_t-to-int conversion vulnerability in the filesystem layer
|
[
"cpe:/o:redhat:rhel_e4s:7.6::server"
] | null | 7.8 | null | null |
RHSA-2014:1861
|
Red Hat Security Advisory: mariadb security update
|
mysql: Remote Preauth User Enumeration flaw mysql: unspecified vulnerability related to ENARC (CPU July 2014) mysql: unspecified vulnerability related to SROPTZR (CPU July 2014) mysql: unspecified vulnerability related to ENFED (CPU July 2014) mysql: unspecified vulnerability related to SRINFOSC (CPU July 2014) mysql: unspecified vulnerability related to SRCHAR (CPU July 2014) mysql: unspecified MyISAM temporary file issue fixed in 5.5.39 and 5.6.20 mysql: unspecified vulnerability related to SERVER:CHARACTER SETS (CPU October 2014) mysql: unspecified vulnerability related to SERVER:REPLICATION ROW FORMAT BINARY LOG DML (CPU October 2014) mysql: unspecified vulnerability related to SERVER:INNODB DML FOREIGN KEYS (CPU October 2014) mysql: unspecified vulnerability related to SERVER:OPTIMIZER (CPU October 2014) mysql: unspecified vulnerability related to SERVER:DML (CPU October 2014) mysql: unspecified vulnerability related to SERVER:MEMORY STORAGE ENGINE (CPU October 2014) mysql: unspecified vulnerability related to SERVER:DML (CPU October 2014) mysql: unspecified vulnerability related to SERVER:DDL (CPU October 2014) mysql: unspecified vulnerability related to CLIENT:MYSQLDUMP (CPU October 2014) mysql: unspecified vulnerability related to CLIENT:MYSQLADMIN (CPU October 2014) mysql: unspecified vulnerability related to SERVER:DML (CPU October 2014) mysql: unspecified vulnerability related to C API SSL CERTIFICATE HANDLING (CPU October 2014)
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | null | null |
RHSA-2013:0533
|
Red Hat Security Advisory: JBoss Enterprise SOA Platform 5.3.1 update
|
JBoss: twiddle.sh accepts credentials as command line arguments, exposing them to other local users via a process listing jbossws: Prone to Bleichenbacher attack against to be distributed symmetric key Framework: Information (internal server information, classpath, local working directories, session IDs) disclosure Console: XSS in invoke operation Cache: NonManagedConnectionFactory will log password in clear text when an exception occurs JBoss invoker servlets do not require authentication JBoss: CallerIdentityLoginModule retaining password from previous call if a null password is provided JBoss: SecurityAssociation.getCredential() will return the previous credential if no security context is provided jruby: Murmur hash function collisions (oCERT-2012-001) JBoss: AuthorizationInterceptor allows JMX operation to proceed despite authorization failure JBoss: allows empty password to authenticate against LDAP
|
[
"cpe:/a:redhat:jboss_enterprise_soa_platform:5.3"
] | null | null | null | null |
RHSA-2023:1409
|
Red Hat Security Advisory: OpenShift Container Platform 4.12.9 security update
|
mongo-go-driver: specific cstrings input may not be properly validated golang: out-of-bounds read in golang.org/x/text/language leads to DoS
|
[
"cpe:/a:redhat:openshift:4.12::el8"
] | null | 7.5 | null | null |
RHSA-2017:0307
|
Red Hat Security Advisory: kernel security and bug fix update
|
kernel: Race condition vulnerability in execve argv arguments kernel: Slab out-of-bounds access in sctp_sf_ootb()
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | 5.9 | null |
RHSA-2022:1764
|
Red Hat Security Advisory: python38:3.8 and python38-devel:3.8 security update
|
python: urllib: Regular expression DoS in AbstractBasicAuthHandler python: urllib: HTTP client possible infinite loop on a 100 Continue response python-lxml: HTML Cleaner allows crafted and SVG embedded scripts to pass through python: urllib.parse does not sanitize URLs containing ASCII newline and tabs
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb"
] | null | 5.3 | null | null |
RHSA-2006:0598
|
Red Hat Security Advisory: gimp security update
|
security flaw
|
[
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2023:7165
|
Red Hat Security Advisory: cups security and bug fix update
|
cups: heap buffer overflow may lead to DoS cups: use-after-free in cupsdAcceptClient() in scheduler/client.c
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 7.1 | null | null |
RHSA-2024:11024
|
Red Hat Security Advisory: python3.9:3.9.18 security update
|
python: Virtual environment (venv) activation scripts don't quote paths
|
[
"cpe:/a:redhat:rhel_eus:9.4::appstream",
"cpe:/a:redhat:rhel_eus:9.4::crb",
"cpe:/o:redhat:rhel_eus:9.4::baseos"
] | null | 6.3 | null | null |
RHSA-2019:4075
|
Red Hat Security Advisory: OpenShift Container Platform 4.2 library-go security update
|
library-go: Secret data written to static pod logs when operator set at Debug level or higher
|
[
"cpe:/a:redhat:openshift:4.2::el7"
] | null | null | 5.3 | null |
RHSA-2009:0267
|
Red Hat Security Advisory: sudo security update
|
sudo: incorrect handling of groups in Runas_User
|
[
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2013:1204
|
Red Hat Security Advisory: haproxy security update
|
haproxy: http_get_hdr()/get_ip_from_hdr2() MAX_HDR_HISTORY handling denial of service
|
[
"cpe:/a:redhat:openshift:1.2::el6"
] | null | null | null | null |
RHSA-2020:4026
|
Red Hat Security Advisory: mariadb security and bug fix update
|
mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2019) mysql: C API unspecified vulnerability (CPU Jan 2020) mysql: C API unspecified vulnerability (CPU Apr 2020) mysql: Server: DML unspecified vulnerability (CPU Apr 2020) mysql: Server: Stored Procedure unspecified vulnerability (CPU Apr 2020) mysql: Server: Parser unspecified vulnerability (CPU Apr 2021)
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 7.2 | 4.9 | null |
RHSA-2023:0343
|
Red Hat Security Advisory: libtasn1 security update
|
libtasn1: Out-of-bound access in ETYPE_OK
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/o:redhat:enterprise_linux:9::baseos"
] | null | 5.9 | null | null |
RHSA-2022:7628
|
Red Hat Security Advisory: php:7.4 security, bug fix, and enhancement update
|
php: Special character breaks path in xml parsing php: Use after free due to php_filter_float() failing for ints php-pear: Directory traversal vulnerability
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 7.4 | null | null |
RHSA-2019:3832
|
Red Hat Security Advisory: kernel security update
|
hw: Machine Check Error on Page Size Change (IFU) hw: Intel GPU Denial Of Service while accessing MMIO in lower power state hw: TSX Transaction Asynchronous Abort (TAA)
|
[
"cpe:/a:redhat:enterprise_linux:8::crb",
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | null | 6.5 | null |
RHSA-2025:3455
|
Red Hat Security Advisory: Red Hat JBoss Web Server 5.8.3 release and security update
|
tomcat: Potential RCE and/or information disclosure and/or information corruption with partial PUT
|
[
"cpe:/a:redhat:jboss_enterprise_web_server:5.8"
] | null | 8.6 | null | null |
RHSA-2024:8801
|
Red Hat Security Advisory: openexr security update
|
OpenEXR: Heap Overflow in Scanline Deep Data Parsing
|
[
"cpe:/a:redhat:rhel_eus:9.2::appstream",
"cpe:/a:redhat:rhel_eus:9.2::crb"
] | null | 9.1 | null | null |
RHSA-2024:2693
|
Red Hat Security Advisory: Red Hat JBoss Core Services Apache HTTP Server 2.4.57 SP4 security update
|
curl: Usage of disabled protocol curl: QUIC certificate check bypass with wolfSSL curl: HTTP/2 push headers memory-leak curl: TLS certificate check bypass with mbedTLS httpd: CONTINUATION frames DoS nghttp2: CONTINUATION frames DoS
|
[
"cpe:/a:redhat:jboss_core_services:1::el7",
"cpe:/a:redhat:jboss_core_services:1::el8"
] | null | 5.3 | null | null |
RHSA-2025:0759
|
Red Hat Security Advisory: git-lfs security update
|
git-lfs: Git LFS permits exfiltration of credentials via crafted HTTP URLs
|
[
"cpe:/a:redhat:rhel_eus:9.4::appstream"
] | null | 8.1 | null | null |
RHSA-2022:6449
|
Red Hat Security Advisory: nodejs:16 security and bug fix update
|
nodejs-ansi-regex: Regular expression denial of service (ReDoS) matching ANSI escape codes nodejs: DNS rebinding in --inspect via invalid IP addresses nodejs: HTTP request smuggling due to flawed parsing of Transfer-Encoding nodejs: HTTP request smuggling due to improper delimiting of header fields nodejs: HTTP request smuggling due to incorrect parsing of multi-line Transfer-Encoding nodejs-got: missing verification of requested URLs allows redirects to UNIX sockets
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 5.3 | null | null |
RHSA-2020:0243
|
Red Hat Security Advisory: nss security update
|
nss: Out-of-bounds write when passing an output buffer smaller than the block size to NSC_EncryptUpdate
|
[
"cpe:/a:redhat:rhel_e4s:8.0::appstream"
] | null | null | 8.1 | null |
RHSA-2003:372
|
Red Hat Security Advisory: wget security update
|
security flaw
|
[
"cpe:/o:redhat:enterprise_linux:2.1::as",
"cpe:/o:redhat:enterprise_linux:2.1::aw",
"cpe:/o:redhat:enterprise_linux:2.1::es",
"cpe:/o:redhat:enterprise_linux:2.1::ws"
] | null | null | null | null |
RHSA-2020:2486
|
Red Hat Security Advisory: unzip security update
|
unzip: overlapping of files in ZIP container leads to denial of service
|
[
"cpe:/o:redhat:rhel_eus:7.7::computenode",
"cpe:/o:redhat:rhel_eus:7.7::server"
] | null | null | 4 | null |
RHSA-2024:7103
|
Red Hat Security Advisory: grafana-pcp security update
|
encoding/gob: golang: Calling Decoder.Decode on a message which contains deeply nested structures can cause a panic due to stack exhaustion
|
[
"cpe:/a:redhat:rhel_e4s:9.0::appstream"
] | null | 7.5 | null | null |
RHSA-2024:6744
|
Red Hat Security Advisory: kernel security update
|
kernel: tty: n_gsm: require CAP_NET_ADMIN to attach N_GSM0710 ldisc kernel: Bluetooth: af_bluetooth: Fix deadlock kernel: crypto: qat - resolve race condition during AER recovery kernel: scsi: qedf: Ensure the copied buf is NUL terminated kernel: cppc_cpufreq: Fix possible null pointer dereference kernel: cpufreq: exit() callback is optional kernel: ACPICA: Revert "ACPICA: avoid Info: mapping multiple BARs. Your kernel is fine." kernel: sched/deadline: Fix task_struct reference leak kernel: mm/filemap: skip to create PMD-sized page cache if needed kernel: mm/shmem: disable PMD-sized page cache if needed kernel: mm/filemap: make MAX_PAGECACHE_ORDER acceptable to xarray kernel: net, sunrpc: Remap EPERM in case of connection failure in xs_tcp_setup_socket
|
[
"cpe:/a:redhat:rhel_eus:9.2::appstream",
"cpe:/a:redhat:rhel_eus:9.2::crb",
"cpe:/o:redhat:rhel_eus:9.2::baseos"
] | null | 5.5 | null | null |
RHSA-2020:0984
|
Red Hat Security Advisory: ipmitool security update
|
ipmitool: Buffer overflow in read_fru_area_section function in lib/ipmi_fru.c
|
[
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 8.1 | null | null |
RHSA-2020:3616
|
Red Hat Security Advisory: OpenShift Container Platform 4.3.35 jenkins-2-plugins security update
|
jenkins-script-security-plugin: sandbox protection bypass leads to execute arbitrary code in sandboxed scripts jenkins-pipeline-groovy-plugin: sandbox protection bypass through default parameter expressions in CPS-transformed methods jenkins-script-security-plugin: sandbox protection bypass during script compilation phase by applying AST transforming annotations jenkins-subversion-plugin: XSS in project repository base url jenkins-script-security-plugin: sandbox protection bypass via crafted constructor calls and crafted constructor bodies jenkins-script-security-plugin: sandbox protection bypass leads to arbitrary code execution jenkins-git-plugin: stored cross-site scripting
|
[
"cpe:/a:redhat:openshift:4.3::el7"
] | null | 5.4 | null | null |
RHSA-2022:5704
|
Red Hat Security Advisory: ACS 3.71 enhancement and security update
|
go-tuf: No protection against rollback attacks for roles other than root
|
[
"cpe:/a:redhat:advanced_cluster_security:3.71::el8"
] | null | 8 | null | null |
RHSA-2025:0578
|
Red Hat Security Advisory: kernel security update
|
kernel: tcp/dccp: Don't use timer_pending() in reqsk_queue_unlink(). kernel: arm64/sve: Discard stale CPU state when handling SVE traps kernel: i40e: fix race condition by adding filter's intermediate sync state
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::crb",
"cpe:/a:redhat:enterprise_linux:9::nfv",
"cpe:/a:redhat:enterprise_linux:9::realtime",
"cpe:/o:redhat:enterprise_linux:9::baseos"
] | null | 4.7 | null | null |
RHSA-2015:1673
|
Red Hat Security Advisory: jboss-ec2-eap bug fix security update
|
PicketLink: PicketLink IDP ignores role based authorization
|
[
"cpe:/a:redhat:jboss_enterprise_application_platform:6::el6"
] | null | null | null | null |
RHSA-2003:173
|
Red Hat Security Advisory: : Updated ypserv packages fix a denial of service vulnerability
|
security flaw
|
[
"cpe:/o:redhat:linux:7.1",
"cpe:/o:redhat:linux:7.2",
"cpe:/o:redhat:linux:7.3",
"cpe:/o:redhat:linux:8.0",
"cpe:/o:redhat:linux:9"
] | null | null | null | null |
RHSA-2014:0565
|
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 6.2.3 update
|
JBossSX/PicketBox: World readable audit.log file
|
[
"cpe:/a:redhat:jboss_enterprise_application_platform:6.2.3"
] | null | null | null | null |
RHSA-2021:3769
|
Red Hat Security Advisory: grafana security update
|
grafana: Snapshot authentication bypass
|
[
"cpe:/a:redhat:rhel_eus:8.1::appstream"
] | null | 7.3 | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.