id
stringlengths 13
15
| title
stringlengths 29
176
| description
stringlengths 8
32.1k
| cpes
listlengths 0
20
| cvss_v4_0
null | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
null |
---|---|---|---|---|---|---|---|
RHSA-2021:4582
|
Red Hat Security Advisory: Release of components for Service Telemetry Framework 1.3.3 - Container Images
|
golang: crypto/tls: certificate of wrong type is causing TLS client to panic
|
[
"cpe:/a:redhat:service_telemetry_framework:1.3::el8"
] | null | 6.5 | null | null |
RHEA-2017:3138
|
Red Hat Enhancement Advisory: Red Hat Virtualization Manager (ovirt-engine) 4.1.7
|
ovirt-engine: DEBUG logging includes unmasked passwords
|
[
"cpe:/a:redhat:rhev_manager:4"
] | null | null | 7.2 | null |
RHSA-2022:6523
|
Red Hat Security Advisory: .NET Core 3.1 security and bugfix update
|
dotnet: DenialOfService - ASP.NET Core MVC vulnerable to stack overflow via ModelStateDictionary recursion.
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb"
] | null | 7.5 | null | null |
RHSA-2022:8626
|
Red Hat Security Advisory: OpenShift Container Platform 4.11.17 packages and security update
|
golang: net/http: improper sanitization of Transfer-Encoding header golang: net/http: handle server errors after sending GOAWAY golang: net/http/httputil: NewSingleHostReverseProxy - omit X-Forwarded-For not working golang: math/big: decoding big.Float and big.Rat types can panic if the encoded message is too short, potentially allowing a denial of service
|
[
"cpe:/a:redhat:openshift:4.11::el8",
"cpe:/a:redhat:openshift_ironic:4.11::el8"
] | null | 6.5 | null | null |
RHSA-2020:2104
|
Red Hat Security Advisory: kernel-alt security and bug fix update
|
kernel: out of bounds write in function i2c_smbus_xfer_emulated in drivers/i2c/i2c-core-smbus.c kernel: double free may be caused by the function allocate_trace_buffer in the file kernel/trace/trace.c kernel: out of bounds write in i2c driver leads to local escalation of privilege kernel: null pointer dereference in dlpar_parse_cc_property in arch/powerrc/platforms/pseries/dlpar.c causing denial of service kernel: denial of service in in xfs_setattr_nonsize in fs/xfs/xfs_iops.c kernel: mounting a crafted ext4 filesystem image, performing some operations, and unmounting can lead to a use-after-free in ext4_put_super in fs/ext4/super.c kernel: a malicious USB device in the drivers/input/ff-memless.c leads to use-after-free kernel: use-after-free in __blk_add_trace in kernel/trace/blktrace.c kernel: out-of-bounds read in set_fdc in drivers/block/floppy.c Kernel: NetLabel: null pointer dereference while receiving CIPSO packet with null category may cause kernel panic
|
[
"cpe:/o:redhat:enterprise_linux:7::server"
] | null | 5.9 | 4.6 | null |
RHSA-2015:0627
|
Red Hat Security Advisory: chromium-browser security update
|
chromium-browser: Out-of-bounds write in skia filters chromium-browser: Out-of-bounds write in skia filters chromium-browser: Out-of-bounds write in skia filters chromium-browser: Use-after-free in v8 bindings chromium-browser: Type confusion in v8 bindings chromium-browser: Use-after-free in dom chromium-browser: Integer overflow in webgl chromium-browser: Use-after-free in gif decoder chromium-browser: Use-after-free in web databases chromium-browser: Use-after-free in service workers chromium-browser: Use-after-free in dom chromium-browser: Out-of-bounds read in vpxdecoder chromium-browser: Out-of-bounds read in pdfium chromium-browser: Validation issue in debugger chromium-browser: Uninitialized value in blink chromium-browser: Uninitialized value in rendering chromium-browser: Cookie injection in proxies chromium-browser: Type confusion in v8 chromium-browser: Various fixes from internal audits, fuzzing and other initiatives. chromium-browser: Out-of-bounds write in media
|
[
"cpe:/a:redhat:rhel_extras:6"
] | null | null | null | null |
RHSA-2015:0535
|
Red Hat Security Advisory: GNOME Shell security, bug fix, and enhancement update
|
gnome-shell: lockscreen bypass with printscreen key
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | null | null |
RHSA-2011:0616
|
Red Hat Security Advisory: pidgin security and bug fix update
|
Pidgin: Multiple NULL pointer dereference flaws in Yahoo protocol plug-in Cipher API information disclosure in pidgin
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2007:0779
|
Red Hat Security Advisory: mailman security and bug fix update
|
mailman logfile CRLF injection
|
[
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2023:0197
|
Red Hat Security Advisory: java-11-openjdk security update
|
OpenJDK: handshake DoS attack against DTLS connections (JSSE, 8287411) OpenJDK: soundbank URL remote loading (Sound, 8293742)
|
[
"cpe:/a:redhat:rhel_aus:8.2::appstream",
"cpe:/a:redhat:rhel_e4s:8.2::appstream",
"cpe:/a:redhat:rhel_tus:8.2::appstream"
] | null | 3.7 | null | null |
RHSA-2013:0198
|
Red Hat Security Advisory: JBoss Enterprise Web Platform 5.2.0 update
|
JBoss: twiddle.sh accepts credentials as command line arguments, exposing them to other local users via a process listing jbossws: Prone to character encoding pattern attack (XML Encryption flaw) jbossws: Prone to Bleichenbacher attack against to be distributed symmetric key Framework: Information (internal server information, classpath, local working directories, session IDs) disclosure CSRF on jmx-console allows invocation of operations on mbeans Console: XSS in invoke operation JBoss invoker servlets do not require authentication JGroups diagnostics service enabled by default with no authentication when a JGroups channel is started apache-cxf: Apache CXF does not verify that elements were signed / encrypted by a particular Supporting Token JBoss: CallerIdentityLoginModule retaining password from previous call if a null password is provided JBoss: SecurityAssociation.getCredential() will return the previous credential if no security context is provided Web: Bypass of security constraints JBoss: AuthorizationInterceptor allows JMX operation to proceed despite authorization failure
|
[
"cpe:/a:redhat:jboss_enterprise_web_platform:5.2"
] | null | null | null | null |
RHSA-2024:9572
|
Red Hat Security Advisory: libsoup security update
|
libsoup: HTTP request smuggling via stripping null bytes from the ends of header names
|
[
"cpe:/a:redhat:rhel_eus:9.4::appstream"
] | null | 7.5 | null | null |
RHSA-2025:1659
|
Red Hat Security Advisory: kernel security update
|
kernel: mm: migrate: fix getting incorrect page mapping during page migration
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::crb",
"cpe:/a:redhat:enterprise_linux:9::nfv",
"cpe:/a:redhat:enterprise_linux:9::realtime",
"cpe:/o:redhat:enterprise_linux:9::baseos"
] | null | 5.5 | null | null |
RHSA-2019:2977
|
Red Hat Security Advisory: bind security update
|
bind: Limiting simultaneous TCP clients is ineffective
|
[
"cpe:/o:redhat:rhel_eus:7.5::computenode",
"cpe:/o:redhat:rhel_eus:7.5::server"
] | null | null | 8.6 | null |
RHBA-2022:1352
|
Red Hat Bug Fix Advisory: .NET Core 3.1 on RHEL 7 bugfix update
|
urijs: Authorization Bypass Through User-Controlled Key
|
[
"cpe:/a:redhat:rhel_dotnet:3.1::el7"
] | null | 6.5 | null | null |
RHSA-2024:4247
|
Red Hat Security Advisory: libuv security update
|
libuv: Improper Domain Lookup that potentially leads to SSRF attacks
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb"
] | null | 7.3 | null | null |
RHSA-2005:405
|
Red Hat Security Advisory: PHP security update
|
security flaw security flaw security flaw security flaw security flaw
|
[
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws"
] | null | null | null | null |
RHBA-2019:0763
|
Red Hat Bug Fix Advisory: redhat-virtualization-host security update
|
python: Information Disclosure due to urlsplit improper NFKC normalization
|
[
"cpe:/o:redhat:enterprise_linux:7::hypervisor"
] | null | null | 9.8 | null |
RHSA-2023:7277
|
Red Hat Security Advisory: open-vm-tools security update
|
open-vm-tools: SAML token signature bypass open-vm-tools: file descriptor hijack vulnerability in the vmware-user-suid-wrapper
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 7.4 | null | null |
RHSA-2020:0005
|
Red Hat Security Advisory: chromium-browser security update
|
chromium-browser: Use after free in media picker
|
[
"cpe:/a:redhat:rhel_extras:6"
] | null | null | 8.8 | null |
RHSA-2022:5163
|
Red Hat Security Advisory: httpd:2.4 security update
|
httpd: mod_proxy NULL pointer dereference
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 7.5 | null | null |
RHSA-2020:0806
|
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.2.7 on RHEL 8 security update
|
thrift: Endless loop when feed with specific input data thrift: Out-of-bounds read related to TJSONProtocol or TSimpleJSONProtocol apache-commons-beanutils: does not suppresses the class property in PropertyUtilsBean by default xml-security: Apache Santuario potentially loads XML parsing code from an untrusted source wildfly: The 'enabled-protocols' value in legacy security is not respected if OpenSSL security provider is in use netty: HTTP request smuggling netty: HttpObjectDecoder.java allows Content-Length header to accompanied by second Content-Length header netty: HTTP Request Smuggling due to Transfer-Encoding whitespace mishandling
|
[
"cpe:/a:redhat:jboss_enterprise_application_platform:7.2::el8"
] | null | 7.5 | 7.4 | null |
RHSA-2008:0537
|
Red Hat Security Advisory: openoffice.org security update
|
OpenOffice.org overflow possible on allocation
|
[
"cpe:/a:redhat:rhel_productivity:5",
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws",
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation"
] | null | null | null | null |
RHSA-2019:3744
|
Red Hat Security Advisory: ansible security update
|
Ansible: path traversal in the fetch module ansible: unsafe template evaluation of returned module data can lead to information disclosure Ansible: disclosure data when prompted for password and template characters are passed
|
[
"cpe:/a:redhat:openstack:14::el7"
] | null | null | 6.4 | null |
RHSA-2020:1931
|
Red Hat Security Advisory: container-tools:2.0 security update
|
buildah: Crafted input tar file may lead to local file overwrite during image build process
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 8.8 | null | null |
RHSA-2023:0284
|
Red Hat Security Advisory: sudo security update
|
sudo: arbitrary file write with privileges of the RunAs user
|
[
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 7.8 | null | null |
RHSA-2018:3651
|
Red Hat Security Advisory: kernel security, bug fix, and enhancement update
|
kernel: stack-based buffer overflow in chap_server_compute_md5() in iscsi target kernel: NULL pointer dereference in af_netlink.c:__netlink_ns_capable() allows for denial of service
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 5.5 | null |
RHSA-2024:0009
|
Red Hat Security Advisory: xorg-x11-server security update
|
xorg-x11-server: out-of-bounds memory reads/writes in XKB button actions xorg-x11-server: out-of-bounds memory read in RRChangeOutputProperty and RRChangeProviderProperty
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 7.6 | null | null |
RHSA-2009:1124
|
Red Hat Security Advisory: net-snmp security update
|
net-snmp: DoS (division by zero) via SNMP GetBulk requests
|
[
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws"
] | null | null | null | null |
RHSA-2024:1147
|
Red Hat Security Advisory: rear security update
|
rear: creates a world-readable initrd
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 5.5 | null | null |
RHSA-2006:0742
|
Red Hat Security Advisory: elinks security update
|
security flaw
|
[
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2023:6126
|
Red Hat Security Advisory: OpenShift Container Platform 4.12.41 bug fix and security update
|
golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487)
|
[
"cpe:/a:redhat:openshift:4.12::el8",
"cpe:/a:redhat:openshift:4.12::el9"
] | null | 7.5 | null | null |
RHSA-2023:5007
|
Red Hat Security Advisory: OpenShift Container Platform 4.14.0 security update
|
mongo-go-driver: specific cstrings input may not be properly validated golang.org/x/net/http2: avoid quadratic complexity in HPACK decoding golang.org/x/net/html: Cross site scripting goproxy: Denial of service (DoS) via unspecified vectors. golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487)
|
[
"cpe:/a:redhat:openshift:4.14::el8",
"cpe:/a:redhat:openshift:4.14::el9"
] | null | 7.5 | null | null |
RHSA-2025:0785
|
Red Hat Security Advisory: Red Hat Advanced Cluster Management 2.11.5 bug fixes and container updates
|
golang.org/x/crypto/ssh: Misuse of ServerConfig.PublicKeyCallback may cause authorization bypass in golang.org/x/crypto golang.org/x/net/html: Non-linear parsing of case-insensitive content in golang.org/x/net/html nanoid: nanoid mishandles non-integer values
|
[
"cpe:/a:redhat:acm:2.11::el9"
] | null | 6.5 | null | null |
RHSA-2007:0327
|
Red Hat Security Advisory: tomcat security update
|
tomcat multiple content-length header poisioning tomcat XSS in example webapps tomcat directory traversal tomcat accept-language xss flaw
|
[
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2008:0780
|
Red Hat Security Advisory: coreutils security update
|
/etc/pam.d/su is wrong in RHEL-4.6
|
[
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2015:2231
|
Red Hat Security Advisory: ntp security, bug fix, and enhancement update
|
ntp: vallen in extension fields are not validated ntp: drop packets with source address ::1 ntp: vallen in extension fields are not validated ntp: drop packets with source address ::1 ntp: ntpd accepts unauthenticated packets with symmetric key crypto ntp: authentication doesn't protect symmetric associations against DoS attacks ntp: ntp-keygen may generate non-random symmetric keys on big-endian systems
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | null | null |
RHSA-2023:6796
|
Red Hat Security Advisory: insights-client security update
|
insights-client: unsafe handling of temporary files and directories
|
[
"cpe:/a:redhat:rhel_eus:9.0::appstream"
] | null | 7.8 | null | null |
RHSA-2019:2938
|
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.2.4 security update
|
undertow: Information leak in requests for directories without trailing slashes codehaus: incomplete fix for unsafe deserialization in jackson-databind vulnerabilities undertow: DEBUG log for io.undertow.request.security if enabled leaks credentials to log files jackson-databind: polymorphic typing issue allows attacker to read arbitrary local files on the server. jackson-databind: failure to block the logback-core class from polymorphic deserialization leading to remote code execution jackson-databind: polymorphic typing issue allows attacker to read arbitrary local files on the server via crafted JSON message. jackson-databind: default typing mishandling leading to remote code execution Undertow: Memory Leak in Undertow HttpOpenListener due to holding remoting connections indefinitely
|
[
"cpe:/a:redhat:jboss_enterprise_application_platform:7.2"
] | null | null | 5.9 | null |
RHSA-2021:2175
|
Red Hat Security Advisory: glib2 security update
|
glib: integer overflow in g_bytes_new function on 64-bit platforms due to an implicit cast from 64 bits to 32 bits
|
[
"cpe:/o:redhat:rhel_eus:7.7::computenode",
"cpe:/o:redhat:rhel_eus:7.7::server"
] | null | 9.8 | null | null |
RHSA-2007:0082
|
Red Hat Security Advisory: php security update
|
security flaw security flaw security flaw security flaw security flaw security flaw security flaw php session extension information leak php session extension global variable clobber php imap_mail_compose() buffer overflow via type.parameters
|
[
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2022:8022
|
Red Hat Security Advisory: qt5 security and bug fix update
|
qt: QProcess could execute a binary from the current working directory when not found in the PATH
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::crb"
] | null | 7.8 | null | null |
RHSA-2011:1197
|
Red Hat Security Advisory: libvirt security and bug fix update
|
libvirt: integer overflow in VirDomainGetVcpus
|
[
"cpe:/o:redhat:enterprise_linux:6::server"
] | null | null | null | null |
RHSA-2024:5281
|
Red Hat Security Advisory: kernel security update
|
kernel: net: qcom/emac: fix UAF in emac_remove kernel: hwmon: (w83792d) Fix NULL pointer dereference by removing unnecessary structure field kernel: proc/vmcore: fix clearing user buffer by properly using clear_user() kernel: bnxt: prevent skb UAF after handing over to PTP worker kernel: NFSD: Fix the behavior of READ near OFFSET_MAX kernel: NFSD: Fix ia_size underflow kernel: NFSD: Fix NFSv3 SETATTR/CREATE's handling of large file sizes kernel: uio: Fix use-after-free in uio_open kernel: gfs2: Fix kernel NULL pointer dereference in gfs2_rgrp_dump kernel: TCP-spoofed ghost ACKs and leak leak initial sequence number kernel: SUNRPC: Fix UAF in svc_tcp_listen_data_ready() kernel: dmaengine/idxd: hardware erratum allows potential security problem with direct access by untrusted application kernel: mlxsw: spectrum_acl_tcam: Fix memory leak when canceling rehash work kernel: rtnetlink: Correct nested IFLA_VF_VLAN_LIST attribute validation kernel: net: kernel: UAF in network route management kernel: ionic: fix use after netif_napi_del() kernel: virtio-net: tap: mlx5_core short frame denial of service kernel: virtio-net: tun: mlx5_core short frame denial of service
|
[
"cpe:/o:redhat:rhel_aus:8.6::baseos",
"cpe:/o:redhat:rhel_e4s:8.6::baseos",
"cpe:/o:redhat:rhel_tus:8.6::baseos"
] | null | 7.1 | null | null |
RHSA-2021:5219
|
Red Hat Security Advisory: Red Hat Single Sign-On security update on RHEL 8
|
Keycloak: Incorrect authorization allows unpriviledged users to create other users
|
[
"cpe:/a:redhat:red_hat_single_sign_on:7.5::el8"
] | null | 8.3 | null | null |
RHSA-2015:2594
|
Red Hat Security Advisory: libpng security update
|
libpng: Out-of-bounds read in png_convert_to_rfc1123 libpng: Buffer overflow vulnerabilities in png_get_PLTE/png_set_PLTE functions libpng: Buffer overflow vulnerabilities in png_get_PLTE/png_set_PLTE functions
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2021:1783
|
Red Hat Security Advisory: tigervnc security, bug fix, and enhancement update
|
tigervnc: certificate exceptions stored as authorities
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 8.1 | null | null |
RHSA-2024:6186
|
Red Hat Security Advisory: containernetworking-plugins security update
|
golang: crypto/x509: Verify panics on certificates with an unknown public key algorithm
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 5.9 | null | null |
RHSA-2023:5732
|
Red Hat Security Advisory: java-1.8.0-openjdk security update
|
OpenJDK: segmentation fault in ciMethodBlocks OpenJDK: IOR deserialization issue in CORBA (8303384) OpenJDK: certificate path validation issue during client authentication (8309966)
|
[
"cpe:/a:redhat:rhel_eus:9.0::appstream",
"cpe:/a:redhat:rhel_eus:9.0::crb"
] | null | 5.3 | null | null |
RHSA-2024:4572
|
Red Hat Security Advisory: OpenJDK 21.0.4 Security Update for Portable Linux Builds
|
OpenJDK: potential UTF8 size overflow (8314794) OpenJDK: Excessive symbol length can lead to infinite loop (8319859) OpenJDK: Range Check Elimination (RCE) pre-loop limit overflow (8320548) OpenJDK: Out-of-bounds access in 2D image handling (8324559) OpenJDK: RangeCheckElimination array index overflow (8323231)
|
[
"cpe:/a:redhat:openjdk:21"
] | null | 7.4 | null | null |
RHBA-2019:0763
|
Red Hat Bug Fix Advisory: redhat-virtualization-host security update
|
python: Information Disclosure due to urlsplit improper NFKC normalization
|
[
"cpe:/o:redhat:enterprise_linux:7::hypervisor"
] | null | null | 9.8 | null |
RHSA-2023:7216
|
Red Hat Security Advisory: Red Hat OpenShift Service Mesh Containers for 2.4.5
|
golang.org/x/net/html: Cross site scripting
|
[
"cpe:/a:redhat:service_mesh:2.4::el8"
] | null | 6.1 | null | null |
RHSA-2023:0167
|
Red Hat Security Advisory: dpdk security update
|
dpdk: DoS when a Vhost header crosses more than two descriptors and exhausts all mbufs
|
[
"cpe:/a:redhat:rhel_extras_other:7"
] | null | 8.6 | null | null |
RHSA-2022:8841
|
Red Hat Security Advisory: Red Hat JBoss Core Services Apache HTTP Server 2.4.51 SP1 security update
|
openssl: c_rehash script allows command injection openssl: the c_rehash script allows command injection httpd: core: Possible buffer overflow with very large or unlimited LimitXMLRequestBody httpd: mod_sed: Read/write beyond bounds httpd: mod_proxy_ajp: Possible request smuggling curl: CERTINFO never-ending busy-loop httpd: mod_isapi: out-of-bounds read httpd: Out-of-bounds read via ap_rwrite() httpd: Out-of-bounds read in ap_strcmp_match() libxml2: integer overflows in xmlBuf and xmlBuffer lead to out-of-bounds write httpd: mod_sed: DoS vulnerability httpd: mod_proxy: X-Forwarded-For dropped by hop-by-hop mechanism curl: HTTP compression denial of service curl: Unpreserved file permissions curl: FTP-KRB bad message verification curl: POST following PUT confusion curl: Incorrect handling of control code characters in cookies zlib: heap-based buffer over-read and overflow in inflate() in inflate.c via a large gzip header extra field libxml2: integer overflows with XML_PARSE_HUGE libxml2: dict corruption caused by entity reference cycles expat: a use-after-free in the doContent function in xmlparse.c curl: HTTP proxy double-free curl: HSTS bypass via IDN
|
[
"cpe:/a:redhat:jboss_core_services:1"
] | null | 7.5 | null | null |
RHSA-2024:0292
|
Red Hat Security Advisory: OpenShift Container Platform 4.14.10 security update
|
golang: crypto/tls: slow verification of certificate chains containing large RSA keys
|
[
"cpe:/a:redhat:openshift:4.14::el9"
] | null | 5.3 | null | null |
RHSA-2021:2993
|
Red Hat Security Advisory: rh-varnish6-varnish security update
|
varnish: HTTP/2 request smuggling attack via a large Content-Length header for a POST request
|
[
"cpe:/a:redhat:rhel_software_collections:3::el7"
] | null | 8.1 | null | null |
RHSA-2005:330
|
Red Hat Security Advisory: krb5 security update
|
security flaw security flaw
|
[
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws",
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2020:1074
|
Red Hat Security Advisory: poppler and evince security update
|
poppler: integer overflow in Parser::makeStream in Parser.cc poppler: integer overflow in JPXStream::init function leading to memory consumption poppler: heap-based buffer over-read in function PSOutputDev::checkPageSlice in PSOutputDev.cc evince: uninitialized memory use in function tiff_document_render() and tiff_document_get_thumbnail() poppler: heap-based buffer over-read in JPXStream::init in JPEG2000Stream.cc
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 6.6 | null |
RHSA-2023:4625
|
Red Hat Security Advisory: Red Hat OpenShift Service Mesh Containers for 2.4.2 security update
|
envoy: OAuth2 credentials exploit with permanent validity envoy: CORS filter segfault when origin header is removed envoy: Incorrect handling of HTTP requests and responses with mixed case schemes envoy: HTTP/2 memory leak in nghttp2 codec
|
[
"cpe:/a:redhat:service_mesh:2.4::el8"
] | null | 7.5 | null | null |
RHSA-2001:116
|
Red Hat Security Advisory: : Updated diffutils packages available
|
security flaw
|
[
"cpe:/o:redhat:linux:5.2",
"cpe:/o:redhat:linux:6.2",
"cpe:/o:redhat:linux:7.0",
"cpe:/o:redhat:linux:7.1"
] | null | null | null | null |
RHSA-2020:2758
|
Red Hat Security Advisory: microcode_ctl security, bug fix and enhancement update
|
hw: Special Register Buffer Data Sampling (SRBDS) hw: Vector Register Data Sampling hw: L1D Cache Eviction Sampling
|
[
"cpe:/o:redhat:rhel_eus:7.7::computenode",
"cpe:/o:redhat:rhel_eus:7.7::server"
] | null | 6.5 | 6.5 | null |
RHSA-2022:8400
|
Red Hat Security Advisory: libtirpc security update
|
libtirpc: DoS vulnerability with lots of connections
|
[
"cpe:/a:redhat:enterprise_linux:9::crb",
"cpe:/o:redhat:enterprise_linux:9::baseos"
] | null | 7.5 | null | null |
RHSA-2023:4734
|
Red Hat Security Advisory: OpenShift Container Platform 4.13.10 security update
|
golang: net/http: handle server errors after sending GOAWAY
|
[
"cpe:/a:redhat:openshift:4.13::el8",
"cpe:/a:redhat:openshift:4.13::el9",
"cpe:/a:redhat:openshift_ironic:4.13::el9"
] | null | 6.5 | null | null |
RHSA-2022:0457
|
Red Hat Security Advisory: samba security update
|
samba: Out-of-bounds heap read/write vulnerability in VFS module vfs_fruit allows code execution
|
[
"cpe:/a:redhat:storage:3.5:samba:el7"
] | null | 9.9 | null | null |
RHSA-2020:0801
|
Red Hat Security Advisory: OpenShift Container Platform 3.11 openshift-enterprise-postgresql-apb security update
|
openshift/postgresql-apb: /etc/passwd is given incorrect privileges
|
[
"cpe:/a:redhat:openshift:3.11::el7"
] | null | 7 | null | null |
RHSA-2018:0527
|
Red Hat Security Advisory: firefox security update
|
Mozilla: Memory safety bugs fixed in Firefox 59 and Firefox ESR 52.7 (MFSA 2018-07) Mozilla: Buffer overflow manipulating SVG animatedPathSegList (MFSA 2018-07) Mozilla: Out-of-bounds write with malformed IPC messages (MFSA 2018-07) Mozilla: Mismatched RTP payload type can trigger memory corruption (MFSA 2018-07) Mozilla: Fetch API improperly returns cached copies of no-store/no-cache resources (MFSA 2018-07) Mozilla: Integer overflow during Unicode conversion (MFSA 2018-07) Mozilla: Memory safety bugs fixed in Firefox ESR 52.7 (MFSA 2018-07)
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 9.8 | null |
RHSA-2018:3852
|
Red Hat Security Advisory: java-1.8.0-ibm security update
|
OpenJDK: Incorrect handling of unsigned attributes in signed Jar manifests (Security, 8194534) OpenJDK: Leak of sensitive header data via HTTP redirect (Networking, 8196902) OpenJDK: Incomplete enforcement of the trustURLCodebase restriction (JNDI, 8199177) OpenJDK: Improper field access checks (Hotspot, 8199226) OpenJDK: Missing endpoint identification algorithm check during TLS session resumption (JSSE, 8202613) OpenJDK: Unrestricted access to scripting engine (Scripting, 8202936) OpenJDK: Infinite loop in RIFF format reader (Sound, 8205361) libpng: Integer overflow and resultant divide-by-zero in pngrutil.c:png_check_chunk_length() allows for denial of service
|
[
"cpe:/a:redhat:network_satellite:5.8::el6"
] | null | null | 6.5 | null |
RHSA-2017:2484
|
Red Hat Security Advisory: git security update
|
git: Command injection via malicious ssh URLs
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 6.3 | null |
RHSA-2024:10379
|
Red Hat Security Advisory: pam security update
|
pam: libpam: Libpam vulnerable to read hashed password pam: Improper Hostname Interpretation in pam_access Leads to Access Control Bypass
|
[
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 7.4 | null | null |
RHSA-2015:1834
|
Red Hat Security Advisory: firefox security update
|
Mozilla: Miscellaneous memory safety hazards (MFSA 2015-96) Mozilla: Buffer overflow in libvpx while parsing vp9 format video (MFSA 2015-101) Mozilla: Use-after-free while manipulating HTML media content (MFSA 2015-106) Mozilla: Buffer overflow while decoding WebM video (MFSA 2015-105) Mozilla: Vulnerabilities found through code inspection (MFSA 2015-112) Mozilla: Dragging and dropping images exposes final URL after redirects (MFSA 2015-110) Mozilla: Errors in the handling of CORS preflight request headers (MFSA 2015-111) Mozilla: Vulnerabilities found through code inspection (MFSA 2015-112) Mozilla: Vulnerabilities found through code inspection (MFSA 2015-112) Mozilla: Vulnerabilities found through code inspection (MFSA 2015-112) Mozilla: Vulnerabilities found through code inspection (MFSA 2015-112) Mozilla: Vulnerabilities found through code inspection (MFSA 2015-112) Mozilla: Vulnerabilities found through code inspection (MFSA 2015-112) Mozilla: Vulnerabilities found through code inspection (MFSA 2015-112)
|
[
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::server",
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation",
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | null | null |
RHSA-2022:4972
|
Red Hat Security Advisory: OpenShift Container Platform 4.9.38 packages and security update
|
cri-o: memory exhaustion on the node when access to the kube api
|
[
"cpe:/a:redhat:openshift:4.9::el7",
"cpe:/a:redhat:openshift:4.9::el8"
] | null | 6.8 | null | null |
RHSA-2024:3575
|
Red Hat Security Advisory: Red Hat build of Keycloak 24.0.5 enhancement and security update
|
keycloak: Unguarded admin REST API endpoints allows low privilege users to use administrative functionalities keycloak: exposure of sensitive information in Pushed Authorization Requests (PAR) KC_RESTART cookie
|
[
"cpe:/a:redhat:build_keycloak:22"
] | null | 7.5 | null | null |
RHSA-2015:2411
|
Red Hat Security Advisory: kernel-rt security, bug fix, and enhancement update
|
kernel: crypto api unprivileged arbitrary module load via request_module() kernel: memcg: OOM handling DoS kernel: partial ASLR bypass through TLS base addresses leak kernel: crypto api unprivileged arbitrary module load via request_module() Kernel: vfs: Do not allow escaping from bind mounts kernel: race condition between chown() and execve() kernel: pty layer race condition on tty ldisc shutdown. kernel: Creating multiple sockets when SCTP module isn't loaded leads to kernel panic kernel: Unauthorized access to IPC objects with SysV shm kernel: securelevel disabled after kexec
|
[
"cpe:/a:redhat:rhel_extras_rt:7"
] | null | null | null | null |
RHSA-2021:1214
|
Red Hat Security Advisory: libldb security update
|
samba: Out of bounds read in AD DC LDAP server
|
[
"cpe:/o:redhat:rhel_eus:8.1::baseos"
] | null | 7.1 | null | null |
RHSA-2018:0480
|
Red Hat Security Advisory: JBoss Enterprise Application Platform 7.1.1 for RHEL 7
|
resteasy: Vary header not added by CORS filter leading to cache poisoning artemis/hornetq: memory exhaustion via UDP and JGroups discovery undertow: Client can use bogus uri in Digest authentication infinispan: Unsafe deserialization of malicious object injected into data cache jackson-databind: Unsafe deserialization due to incomplete black list (incomplete fix for CVE-2017-7525) jackson-databind: Unsafe deserialization due to incomplete black list (incomplete fix for CVE-2017-15095) undertow: ALLOW_ENCODED_SLASH option not taken into account in the AjpRequestParser jackson-databind: unsafe deserialization due to incomplete blacklist (incomplete fix for CVE-2017-7525 and CVE-2017-17485)
|
[
"cpe:/a:redhat:jboss_enterprise_application_platform:7.1::el7"
] | null | null | 8.1 | null |
RHSA-2012:1187
|
Red Hat Security Advisory: katello security update
|
Katello: Application.config.secret_token is not generated properly
|
[
"cpe:/a:rhel_sam:1.1::el6"
] | null | null | null | null |
RHSA-2016:0597
|
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 6.4.7 update
|
tomcat: non-persistent DoS attack by feeding data by aborting an upload EAP: HTTPS NIO connector uses no timeout when reading SSL handshake from client
|
[
"cpe:/a:redhat:jboss_enterprise_application_platform:6::el7"
] | null | null | null | null |
RHSA-2023:6125
|
Red Hat Security Advisory: OpenShift Container Platform 4.12.41 security and extras update
|
golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487)
|
[
"cpe:/a:redhat:openshift:4.12::el8"
] | null | 7.5 | null | null |
RHSA-2009:1204
|
Red Hat Security Advisory: apr and apr-util security update
|
apr-util: Integer overflows in memory pool (apr) and relocatable memory (apr-util) management
|
[
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws",
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2024:1846
|
Red Hat Security Advisory: pcs security update
|
rubygem-rack: Denial of Service Vulnerability in Rack Content-Type Parsing rubygem-rack: Possible DoS Vulnerability with Range Header in Rack rubygem-rack: Possible Denial of Service Vulnerability in Rack Header Parsing
|
[
"cpe:/a:redhat:rhel_eus:9.2::highavailability",
"cpe:/a:redhat:rhel_eus:9.2::resilientstorage"
] | null | 5.3 | null | null |
RHSA-2019:3234
|
Red Hat Security Advisory: pango security update
|
pango: pango_log2vis_get_embedding_levels() heap-based buffer overflow
|
[
"cpe:/o:redhat:rhel_eus:7.6::computenode",
"cpe:/o:redhat:rhel_eus:7.6::server"
] | null | null | 9.8 | null |
RHSA-2021:4645
|
Red Hat Security Advisory: kpatch-patch security update
|
kernel: Insufficient validation of user-supplied sizes for the MSG_CRYPTO message type
|
[
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 8.8 | null | null |
RHSA-2023:1529
|
Red Hat Security Advisory: Service Telemetry Framework 1.5 security update
|
golang: net/http: improper sanitization of Transfer-Encoding header golang: math/big: uncontrolled memory consumption due to an unhandled overflow via Rat.SetString golang: cmd/go: misinterpretation of branch names can lead to incorrect access control golang: crypto/elliptic: IsOnCurve returns true for invalid field elements golang: encoding/pem: fix stack overflow in Decode golang: net/http: handle server errors after sending GOAWAY golang: crypto/elliptic: panic caused by oversized scalar golang: syscall: faccessat checks wrong group golang: crypto/tls: session tickets lack random ticket_age_add golang: io/fs: stack exhaustion in Glob golang: compress/gzip: stack exhaustion in Reader.Read golang: path/filepath: stack exhaustion in Glob golang: math/big: decoding big.Float and big.Rat types can panic if the encoded message is too short, potentially allowing a denial of service golang: regexp/syntax: limit memory used by parsing regexps golang: net/http: excessive memory growth in a Go server accepting HTTP/2 requests
|
[
"cpe:/a:redhat:service_telemetry_framework:1.5::el8"
] | null | 5.3 | null | null |
RHSA-2024:8789
|
Red Hat Security Advisory: krb5 security update
|
freeradius: forgery attack
|
[
"cpe:/o:redhat:rhel_aus:8.2::baseos"
] | null | 9 | null | null |
RHSA-2023:6119
|
Red Hat Security Advisory: Multicluster Engine for Kubernetes 2.3.3 security updates and bug fixes
|
golang: html/template: improper handling of HTML-like comments within script contexts golang: html/template: improper handling of special tags within script contexts golang: crypto/tls: panic when processing post-handshake message on QUIC connections golang: crypto/tls: lack of a limit on buffered post-handshake golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487) HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack)
|
[
"cpe:/a:redhat:multicluster_engine:2.3::el8"
] | null | 7.5 | null | null |
RHSA-2022:6174
|
Red Hat Security Advisory: firefox security update
|
Mozilla: Address bar spoofing via XSLT error handling Mozilla: Cross-origin XSLT Documents would have inherited the parent's permissions Mozilla: Data race and potential use-after-free in PK11_ChangePW Mozilla: Memory safety bugs fixed in Firefox 104 and Firefox ESR 102.2 Mozilla: Memory safety bugs fixed in Firefox 104, Firefox ESR 102.2, and Firefox ESR 91.13
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 8.8 | 7.5 | null |
RHSA-2025:1724
|
Red Hat Security Advisory: postgresql:13 security update
|
postgresql: PostgreSQL quoting APIs miss neutralizing quoting syntax in text that fails encoding validation
|
[
"cpe:/a:redhat:rhel_aus:8.4::appstream",
"cpe:/a:redhat:rhel_e4s:8.4::appstream",
"cpe:/a:redhat:rhel_tus:8.4::appstream"
] | null | 8.1 | null | null |
RHSA-2020:2063
|
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.2 security update
|
mojarra: Path traversal in ResourceManager.java:getLocalePrefix() via the loc parameter infinispan: invokeAccessibly method from ReflectionUtil class allows to invoke private methods
|
[
"cpe:/a:redhat:jboss_enterprise_application_platform:7.2::el6",
"cpe:/a:redhat:jboss_enterprise_application_platform:7.2::el7",
"cpe:/a:redhat:jboss_enterprise_application_platform:7.2::el8"
] | null | null | 7.5 | null |
RHSA-2013:1204
|
Red Hat Security Advisory: haproxy security update
|
haproxy: http_get_hdr()/get_ip_from_hdr2() MAX_HDR_HISTORY handling denial of service
|
[
"cpe:/a:redhat:openshift:1.2::el6"
] | null | null | null | null |
RHEA-2022:1596
|
Red Hat Enhancement Advisory: OpenShift Virtualization 4.9.4 Images
|
golang: net/http/httputil: panic due to racy read of persistConn after handler panic golang: net/http: limit growth of header canonicalization cache golang: syscall: don't close fd 0 on ForkExec error
|
[
"cpe:/a:redhat:container_native_virtualization:4.9::el8"
] | null | 4.8 | null | null |
RHSA-2012:0465
|
Red Hat Security Advisory: samba security update
|
samba: Multiple heap-based buffer overflows in memory management based on NDR marshalling code output
|
[
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server",
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation",
"cpe:/o:redhat:rhel_eus:5.6",
"cpe:/o:redhat:rhel_eus:6.0",
"cpe:/o:redhat:rhel_eus:6.1",
"cpe:/o:redhat:rhel_mission_critical:5.3"
] | null | null | null | null |
RHSA-2023:7109
|
Red Hat Security Advisory: linux-firmware security, bug fix, and enhancement update
|
amd: Return Address Predictor vulnerability leading to information disclosure
|
[
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 5.6 | null | null |
RHSA-2025:2485
|
Red Hat Security Advisory: firefox security update
|
firefox: AudioIPC StreamData could trigger a use-after-free in the Browser process firefox: Use-after-free in WebTransportChild firefox: Inconsistent comparator in XSLT sorting led to out-of-bounds access firefox: JIT corruption of WASM i32 return values on 64-bit CPUs firefox: Unexpected GC during RegExp bailout processing firefox: Clickjacking the registerProtocolHandler info-bar Reporter firefox: Adding %00 and a fake extension to a jar: URL changed the interpretation of the contents firefox: thunderbird: Memory safety bugs fixed in Firefox 136, Thunderbird 136, Firefox ESR 115.21, Firefox ESR 128.8, and Thunderbird 128.8 firefox: thunderbird: Memory safety bugs fixed in Firefox 136, Thunderbird 136, Firefox ESR 128.8, and Thunderbird 128.8
|
[
"cpe:/a:redhat:rhel_aus:8.6::appstream",
"cpe:/a:redhat:rhel_e4s:8.6::appstream",
"cpe:/a:redhat:rhel_tus:8.6::appstream"
] | null | 8.8 | null | null |
RHSA-2008:0533
|
Red Hat Security Advisory: bind security update
|
bind: implement source UDP port randomization (CERT VU#800113)
|
[
"cpe:/o:redhat:enterprise_linux:2.1::as",
"cpe:/o:redhat:enterprise_linux:2.1::aw",
"cpe:/o:redhat:enterprise_linux:2.1::es",
"cpe:/o:redhat:enterprise_linux:2.1::ws",
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws",
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws",
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2021:3623
|
Red Hat Security Advisory: nodejs:12 security and bug fix update
|
c-ares: Missing input validation of host names may lead to domain hijacking nodejs: Use-after-free on close http2 on stream canceling nodejs: Improper handling of untypical characters in domain names nodejs: Incomplete validation of tls rejectUnauthorized parameter nodejs: Use-after-free on close http2 on stream canceling nodejs-path-parse: ReDoS via splitDeviceRe, splitTailRe and splitPathRe nodejs-tar: Insufficient symlink protection allowing arbitrary file creation and overwrite nodejs-tar: Insufficient absolute path sanitization allowing arbitrary file creation and overwrite
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 8.1 | null | null |
RHSA-2017:0531
|
Red Hat Security Advisory: rabbitmq-server security and bug fix update
|
rabbitmq-server: DoS via lengths_age or lengths_incr parameter in the management plugin
|
[
"cpe:/a:redhat:openstack:6::el7"
] | null | null | 6.5 | null |
RHSA-2024:0603
|
Red Hat Security Advisory: firefox security update
|
Mozilla: Out of bounds write in ANGLE Mozilla: Failure to update user input timestamp Mozilla: Crash when listing printers on Linux Mozilla: Bypass of Content Security Policy when directive unsafe-inline was set Mozilla: Phishing site popup could show local origin in address bar Mozilla: Potential permissions request bypass via clickjacking Mozilla: Privilege escalation through devtools Mozilla: HSTS policy on subdomain could bypass policy of upper domain Mozilla: Memory safety bugs fixed in Firefox 122, Firefox ESR 115.7, and Thunderbird 115.7
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 8.8 | null | null |
RHSA-2023:1006
|
Red Hat Security Advisory: Red Hat build of Quarkus 2.7.7 release and security update
|
SnakeYaml: Constructor Deserialization Remote Code Execution protobuf-java: timeout in parser leads to DoS postgresql: SQL Injection in ResultSet.refreshRow() with malicious column names postgresql-jdbc: Information leak of prepared statement data due to insecure temporary file permissions xstream: Denial of Service by injecting recursive collections or maps based on element's hash values raising a stack overflow jackson-databind: deep wrapper array nesting wrt UNWRAP_SINGLE_VALUE_ARRAYS jackson-databind: use of deeply nested arrays apache-commons-text: variable interpolation RCE quarkus-vertx-http: a cross-site attack may be initiated which might lead to the Information Disclosure
|
[
"cpe:/a:redhat:quarkus:2.7"
] | null | 5.3 | null | null |
RHSA-2015:1586
|
Red Hat Security Advisory: firefox security update
|
Mozilla: Miscellaneous memory safety hazards (rv:38.2) (MFSA 2015-79) Mozilla: Out-of-bounds read with malformed MP3 file (MFSA 2015-80) Mozilla: Redefinition of non-configurable JavaScript object properties (MFSA 2015-82) Mozilla: Overflow issues in libstagefright (MFSA 2015-83) Mozilla: Overflow issues in libstagefright (MFSA 2015-83) Mozilla: Crash when using shared memory in JavaScript (MFSA 2015-87) Mozilla: Buffer overflows on Libvpx when decoding WebM video (MFSA 2015-89) Mozilla: Buffer overflows on Libvpx when decoding WebM video (MFSA 2015-89) Mozilla: Vulnerabilities found through code inspection (MFSA 2015-90) Mozilla: Vulnerabilities found through code inspection (MFSA 2015-90) Mozilla: Vulnerabilities found through code inspection (MFSA 2015-90) Mozilla: Heap overflow in gdk-pixbuf when scaling bitmap images (MFSA 2015-88) Mozilla: Use-after-free in XMLHttpRequest with shared workers (MFSA 2015-92) Mozilla: Overflow issues in libstagefright (MFSA 2015-83)
|
[
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::server",
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation",
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | null | null |
RHSA-2023:5175
|
Red Hat Security Advisory: Red Hat OpenShift Service Mesh 2.2.10 security update
|
envoy: OAuth2 credentials exploit with permanent validity envoy: Incorrect handling of HTTP requests and responses with mixed case schemes envoy: HTTP/2 memory leak in nghttp2 codec
|
[
"cpe:/a:redhat:service_mesh:2.2::el8"
] | null | 7.5 | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.