id
stringlengths 13
15
| title
stringlengths 29
176
| description
stringlengths 8
32.1k
| cpes
listlengths 0
20
| cvss_v4_0
null | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
null |
---|---|---|---|---|---|---|---|
RHSA-2015:2508
|
Red Hat Security Advisory: java-1.6.0-ibm security update
|
OpenJDK: kerberos realm name leak (JGSS, 8048030) OpenJDK: inefficient use of hash tables and lists during XML parsing (JAXP, 8068842) OpenJDK: missing checks for proper initialization in ObjectStreamClass (Serialization, 8103671) OpenJDK: HttpURLConnection header restriction bypass (Libraries, 8130193) OpenJDK: insufficient permission checks in StubGenerator (CORBA, 8076383) OpenJDK: leak of user.dir location (JAXP, 8078427) OpenJDK: java.nio Buffers integer overflow issues (Libraries, 8130891) ICU: missing boundary checks in layout engine (OpenJDK 2D, 8132042) OpenJDK: incorrect access control context used in DGCImpl (RMI, 8080688) OpenJDK: incomplete constraints enforcement by AlgorithmChecker (Security, 8131291) OpenJDK: incorrect String object deserialization in IIOPInputStream (CORBA, 8076387) OpenJDK: incorrect access control context used in DGCClient (RMI, 8076413) OpenJDK: incomplete MaxXMLNameLimit enforcement (JAXP, 8086733) JDK: unspecified vulnerability fixed in 6u105, 7u91 and 8u65 (Deployment) OpenJDK: insufficient proxy class checks in RemoteObjectInvocationHandler (RMI, 8076339) JDK: local disclosure of kerberos credentials cache
|
[
"cpe:/a:redhat:rhel_extras:5::client",
"cpe:/a:redhat:rhel_extras:5::server",
"cpe:/a:redhat:rhel_extras:6"
] | null | null | null | null |
RHSA-2022:2013
|
Red Hat Security Advisory: openssh security, bug fix, and enhancement update
|
openssh: privilege escalation when AuthorizedKeysCommand or AuthorizedPrincipalsCommand are configured
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 7 | null | null |
RHSA-2024:4761
|
Red Hat Security Advisory: containernetworking-plugins security update
|
golang-fips/openssl: Memory leaks in code encrypting and decrypting RSA payloads
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 7.5 | null | null |
RHSA-2013:0141
|
Red Hat Security Advisory: JBoss Enterprise Portal Platform 5.2.2 security update
|
Portal: Reflected Cross-Site Scripting (XSS)
|
[
"cpe:/a:redhat:jboss_enterprise_portal_platform:5.2.2"
] | null | null | null | null |
RHSA-2024:1409
|
Red Hat Security Advisory: cups security update
|
cups: heap buffer overflow may lead to DoS cups: use-after-free in cupsdAcceptClient() in scheduler/client.c
|
[
"cpe:/a:redhat:rhel_eus:8.8::appstream",
"cpe:/o:redhat:rhel_eus:8.8::baseos"
] | null | 7.1 | null | null |
RHSA-2014:1724
|
Red Hat Security Advisory: kernel security and bug fix update
|
kernel: kvm: PIT timer race condition kernel: kvm: vmx: invept vm exit not handled kernel: kvm: vmx: invvpid vm exit not handled Kernel: ALSA: control: do not access controls outside of protected regions Kernel: net: SCTP: fix a NULL pointer dereference during INIT collisions
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | null | null |
RHSA-2023:6267
|
Red Hat Security Advisory: squid:4 security update
|
squid: Request/Response smuggling in HTTP/1.1 and ICAP squid: Denial of Service in HTTP Digest Authentication
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 8.6 | null | null |
RHSA-2007:1017
|
Red Hat Security Advisory: samba security update
|
samba incorrect primary group assignment for domain users using the rfc2307 or sfu winbind nss info plugin samba buffer overflow Samba "reply_netbios_packet()" Buffer Overflow Vulnerability
|
[
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2006:0163
|
Red Hat Security Advisory: cups security update
|
security flaw security flaw security flaw security flaw
|
[
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws",
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2018:2930
|
Red Hat Security Advisory: Red Hat JBoss Operations Network 3.3.11 security and bug fix update
|
jackson-databind: Unsafe deserialization due to incomplete black list (incomplete fix for CVE-2017-15095) tomcat: A bug in the UTF-8 decoder can lead to DoS slf4j: Deserialisation vulnerability in EventData constructor can allow for arbitrary code execution RichFaces: Injection of arbitrary EL expressions allows remote code execution via org.richfaces.renderkit.html.Paint2DResource
|
[
"cpe:/a:redhat:jboss_operations_network:3.3"
] | null | null | 9.8 | null |
RHSA-2024:1017
|
Red Hat Security Advisory: postgresql:15 security update
|
postgresql: non-owner 'REFRESH MATERIALIZED VIEW CONCURRENTLY' executes arbitrary SQL
|
[
"cpe:/a:redhat:rhel_eus:8.8::appstream"
] | null | 8 | null | null |
RHSA-2021:5048
|
Red Hat Security Advisory: thunderbird security update
|
Mozilla: Memory safety bugs fixed in Firefox 95 and Firefox ESR 91.4 Mozilla: JavaScript unexpectedly enabled for the composition area Mozilla: URL leakage when navigating while executing asynchronous function Mozilla: Heap buffer overflow when using structured clone Mozilla: Missing fullscreen and pointer lock notification when requesting both Mozilla: GC rooting failure when calling wasm instance methods Mozilla: External protocol handler parameters were unescaped Mozilla: XMLHttpRequest error codes could have leaked the existence of an external protocol handler Mozilla: Bypass of CSP sandbox directive when embedding Mozilla: Denial of Service when using the Location API in a loop Mozilla: Cursor spoofing could overlay user interface when native cursor is zoomed
|
[
"cpe:/a:redhat:rhel_eus:8.4::appstream"
] | null | 5.4 | 6.1 | null |
RHSA-2011:0328
|
Red Hat Security Advisory: subversion security update
|
(mod_dav_svn): DoS (NULL ptr deref) by a lock token sent from a not authenticated Subversion client
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2019:3197
|
Red Hat Security Advisory: sudo security update
|
sudo: Privilege escalation via 'Runas' specification with 'ALL' keyword
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 7 | null |
RHSA-2020:0731
|
Red Hat Security Advisory: virt:8.1 and virt-devel:8.1 security and enhancement update
|
QEMU: block: iscsi: OOB heap access via an unexpected response of iSCSI Server
|
[
"cpe:/a:redhat:advanced_virtualization:8.1::el8"
] | null | 6 | null | null |
RHSA-2024:7594
|
Red Hat Security Advisory: OpenShift Container Platform 4.15.36 security update
|
glibc: Out of bounds write in iconv may lead to remote code execution openstack-ironic: Specially crafted image may allow authenticated users to gain access to potentially sensitive data
|
[
"cpe:/a:redhat:openshift:4.15::el8",
"cpe:/a:redhat:openshift:4.15::el9"
] | null | 6.8 | null | null |
RHSA-2022:5471
|
Red Hat Security Advisory: php:7.4 security update
|
php: password of excessive length triggers buffer overflow leading to RCE
|
[
"cpe:/a:redhat:rhel_eus:8.4::appstream"
] | null | 8.8 | null | null |
RHSA-2007:0509
|
Red Hat Security Advisory: evolution security update
|
evolution malicious server arbitrary code execution
|
[
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws",
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2024:4547
|
Red Hat Security Advisory: kpatch-patch-4_18_0-372_91_1 security update
|
kernel: TIPC message reassembly use-after-free remote code execution vulnerability
|
[
"cpe:/o:redhat:rhel_e4s:8.6::baseos"
] | null | 7.1 | null | null |
RHSA-2015:1705
|
Red Hat Security Advisory: bind security update
|
bind: malformed DNSSEC key failed assertion denial of service
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation",
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | null | null |
RHSA-2011:0568
|
Red Hat Security Advisory: eclipse security, bug fix, and enhancement update
|
eclipse: Help Content web application vulnerable to multiple XSS
|
[
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2023:4523
|
Red Hat Security Advisory: curl security update
|
curl: GSS delegation too eager connection re-use curl: IDN wildcard match may lead to Improper Cerificate Validation
|
[
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 5.9 | null | null |
RHSA-2005:472
|
Red Hat Security Advisory: kernel security update
|
security flaw security flaw security flaw
|
[
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws"
] | null | null | null | null |
RHSA-2024:1820
|
Red Hat Security Advisory: OpenJDK 11.0.23 Security Update for Windows Builds
|
OpenJDK: long Exception message leading to crash (8319851) OpenJDK: HTTP/2 client improper reverse DNS lookup (8315708) OpenJDK: integer overflow in C1 compiler address generation (8322122) OpenJDK: Pack200 excessive memory allocation (8322114) OpenJDK: C2 compilation fails with "Exceeded _node_regs array" (8317507)
|
[
"cpe:/a:redhat:openjdk:11::windows"
] | null | 3.7 | null | null |
RHSA-2022:8900
|
Red Hat Security Advisory: grub2 security update
|
grub2: Integer underflow in grub_net_recv_ip4_packets
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 8.1 | null | null |
RHSA-2024:1153
|
Red Hat Security Advisory: squid security update
|
squid: DoS against HTTP and HTTPS squid: Denial of Service in SSL Certificate validation squid: NULL pointer dereference in the gopher protocol code squid: Buffer over-read in the HTTP Message processing feature squid: Incorrect Check of Function Return Value In Helper Process management squid: denial of service in HTTP request parsing
|
[
"cpe:/a:redhat:rhel_eus:9.0::appstream"
] | null | 7.5 | null | null |
RHBA-2021:1365
|
Red Hat Bug Fix Advisory: OpenShift Container Platform 4.7.9 bug fix update
|
gogo/protobuf: plugin/unmarshal/unmarshal.go lacks certain index validation
|
[
"cpe:/a:redhat:openshift:4.7::el8"
] | null | 8.6 | null | null |
RHSA-2023:3915
|
Red Hat Security Advisory: OpenShift Container Platform 4.11.44 bug fix and security update
|
openshift: OCP & FIPS mode golang: html/template: improper handling of JavaScript whitespace
|
[
"cpe:/a:redhat:openshift:4.11::el8"
] | null | 8.1 | null | null |
RHSA-2023:3409
|
Red Hat Security Advisory: OpenShift Container Platform 4.12.20 packages and security update
|
golang: html/template: improper handling of JavaScript whitespace
|
[
"cpe:/a:redhat:openshift:4.12::el8",
"cpe:/a:redhat:openshift:4.12::el9",
"cpe:/a:redhat:openshift_ironic:4.12::el9"
] | null | 8.1 | null | null |
RHSA-2024:0589
|
Red Hat Security Advisory: sqlite security update
|
sqlite: heap-buffer-overflow at sessionfuzz
|
[
"cpe:/a:redhat:rhel_eus:8.8::appstream",
"cpe:/o:redhat:rhel_eus:8.8::baseos"
] | null | 7.3 | null | null |
RHSA-2022:7933
|
Red Hat Security Advisory: kernel-rt security and bug fix update
|
kernel: off-path attacker may inject data or terminate victim's TCP session kernel: use-after-free vulnerability in function sco_sock_sendmsg() kernel: veth: ensure skb entering GRO are not cloned. kernel: ethtool: ioctl: fix potential NULL deref in ethtool_set_coalesce() kernel: scsi: scsi_debug: Fix type in min_t to avoid stack OOB kernel: smb2_ioctl_query_info NULL pointer dereference kernel: NULL pointer dereference in udf_expand_file_adinicbdue() during writeback kernel: swiotlb information leak with DMA_FROM_DEVICE kernel: uninitialized registers on stack in nft_do_chain can cause kernel pointer leakage to UM kernel: race condition in snd_pcm_hw_free leading to use-after-free kernel: KVM: cmpxchg_gpte can write to pfns outside the userspace region kernel: use-after-free and memory errors in ext4 when mounting and operating on a corrupted image kernel: KVM: NULL pointer dereference in kvm_dirty_ring_push in virt/kvm/dirty_ring.c kernel: concurrency use-after-free between drm_setmaster_ioctl and drm_mode_getresources kernel: kernel info leak issue in pfkey_register kernel: use-after-free in ath9k_htc_probe_device() could cause an escalation of privileges kernel: NULL pointer dereference in x86_emulate_insn may lead to DoS kernel: fanotify misuses fd_install() which could lead to use-after-free kernel: KVM: NULL pointer dereference in kvm_irq_delivery_to_apic_fast() kernel: LoadPin bypass via dm-verity table reload kernel: nf_tables cross-table potential use-after-free may lead to local privilege escalation kernel: openvswitch: integer underflow leads to out-of-bounds write in reserve_sfa_size() kernel: hv_netvsc: NULL pointer dereference in netvsc_get_ethtool_stats() kernel: drm/amdkfd: NULL pointer dereference in kfd_parse_subtype_iolink() kernel: media: em28xx: initialize refcount before kref_get kernel: net/packet: slab-out-of-bounds access in packet_recvmsg() kernel: missing DM_TARGET_IMMUTABLE feature flag in verity_target in drivers/md/dm-verity-target.c hw: cpu: incomplete clean-up of multi-core shared buffers (aka SBDR) hw: cpu: incomplete clean-up of microarchitectural fill buffers (aka SBDS) hw: cpu: incomplete clean-up in specific special register write operations (aka DRPW) kernel: possible to use the debugger to write zero into a location of choice hw: cpu: AMD: RetBleed Arbitrary Speculative Code Execution with Return Instructions hw: cpu: AMD: Branch Type Confusion (non-retbleed) kernel: nfs_atomic_open() returns uninitialized data instead of ENOTDIR hw: cpu: Intel: Post-barrier Return Stack Buffer Predictions kernel: double free in ems_usb_start_xmit in drivers/net/can/usb/ems_usb.c hw: cpu: Intel: information disclosure via local access kernel: use after free in SUNRPC subsystem kernel: use-after-free due to improper update of reference count in net/sched/cls_u32.c hw: cpu: AMD: RetBleed Arbitrary Speculative Code Execution with Return Instructions hw: cpu: Intel: RetBleed Arbitrary Speculative Code Execution with Return Instructions kernel: DoS in nfqnl_mangle in net/netfilter/nfnetlink_queue.c kernel: nf_tables disallow binding to already bound chain kernel: netfilter: nfnetlink_osf: uninitialized variable information disclosure vulnerability kernel: ibmvnic: free reset-work-item when flushing kernel: iwlwifi: mvm: check debugfs_dir ptr before use kernel: gso: do not skip outer ip header in case of ipip and net_failover kernel: netfilter: NULL pointer dereference in nf_tables due to zeroed list head kernel: udmabuf: improper validation of array index leading to local privilege escalation
|
[
"cpe:/a:redhat:enterprise_linux:9::nfv",
"cpe:/a:redhat:enterprise_linux:9::realtime"
] | null | 8.2 | null | null |
RHSA-2008:0522
|
Red Hat Security Advisory: perl security update
|
perl: heap corruption by regular expressions with utf8 characters
|
[
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws",
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws",
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2019:0348
|
Red Hat Security Advisory: flash-plugin security update
|
flash-plugin: Information Disclosure vulnerability (APSB19-06)
|
[
"cpe:/a:redhat:rhel_extras:6"
] | null | null | 6.5 | null |
RHSA-2020:4058
|
Red Hat Security Advisory: virt:rhel security update
|
QEMU: usb: out-of-bounds r/w access issue while processing usb packets
|
[
"cpe:/a:redhat:rhel_e4s:8.0::appstream"
] | null | 5 | null | null |
RHSA-2020:3496
|
Red Hat Security Advisory: Red Hat Single Sign-On 7.4.2 security update on RHEL 7
|
keycloak: security headers missing on REST endpoints keycloak: DoS by sending multiple simultaneous requests with a Content-Length header value greater than actual byte count of request body
|
[
"cpe:/a:redhat:red_hat_single_sign_on:7::el7"
] | null | 7.5 | null | null |
RHSA-2011:1087
|
Red Hat Security Advisory: java-1.5.0-ibm security update
|
JDK: unspecified vulnerabilities fixed in 6u26 (Sound) JDK: unspecified vulnerabilities fixed in 6u26 (Sound) OpenJDK: integer overflows in JPEGImageReader and font SunLayoutEngine (2D, 7013519) OpenJDK: Deserialization allows creation of mutable SignedObject (Deserialization, 6618658) OpenJDK: NetworkInterface information leak (Networking, 7013969) OpenJDK: MediaTracker created Component instances with unnecessary privileges (Swing, 7020198) JDK: unspecified vulnerability fixed in 6u26 (2D)
|
[
"cpe:/a:redhat:rhel_extras:4",
"cpe:/a:redhat:rhel_extras:5::client",
"cpe:/a:redhat:rhel_extras:5::server",
"cpe:/a:redhat:rhel_extras:6"
] | null | null | null | null |
RHSA-2013:1294
|
Red Hat Security Advisory: Red Hat Enterprise MRG Grid 2.4 security update
|
cumin: Denial of service due to improper handling of certain Ajax requests
|
[
"cpe:/a:redhat:enterprise_mrg:2:computenode:el6",
"cpe:/a:redhat:enterprise_mrg:2:server:el6"
] | null | null | null | null |
RHSA-2024:3340
|
Red Hat Security Advisory: .NET 7.0 security update
|
dotnet: Denial of Service in SignalR server dotnet: Denial of Service in X509Certificate2 dotnet: stack buffer overrun in Double Parse dotnet: denial of service in ASP.NET Core due to deadlock in Http2OutputProducer.Stop()
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb"
] | null | 5.9 | null | null |
RHSA-2013:0827
|
Red Hat Security Advisory: openswan security update
|
Openswan: remote buffer overflow in atodn()
|
[
"cpe:/o:redhat:enterprise_linux:5::server",
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHEA-2015:1302
|
Red Hat Enhancement Advisory: elfutils bug fix and enhancement update
|
elfutils: directory traversal in read_long_names()
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2016:2837
|
Red Hat Security Advisory: Red Hat CloudForms 3.x - 90 day End Of Life Notice
|
This is the 90 day notification for the End of Production Phase 2 of
Red Hat CloudForms 3.x.
|
[
"cpe:/a:redhat:cloudforms:3.0"
] | null | null | null | null |
RHSA-2020:0201
|
Red Hat Security Advisory: python-reportlab security update
|
python-reportlab: code injection in colors.py allows attacker to execute code
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | null | 9.8 | null |
RHSA-2017:1100
|
Red Hat Security Advisory: nss and nss-util security update
|
nss: Write beyond bounds caused by bugs in Base64 de/encoding in nssb64d.c and nssb64e.c (MFSA 2017-10)
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation",
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 9.8 | null |
RHSA-2003:166
|
Red Hat Security Advisory: : : : Updated MySQL packages fix vulnerabilities
|
security flaw security flaw security flaw security flaw security flaw security flaw
|
[
"cpe:/o:redhat:linux:7.1"
] | null | null | null | null |
RHSA-2018:3768
|
Red Hat Security Advisory: Red Hat Fuse 7.2 security update
|
xmlrpc: XML external entity vulnerability SSRF via a crafted DTD xmlrpc: Deserialization of untrusted Java object through <ex:serializable> tag undertow: Client can use bogus uri in Digest authentication spring-framework: ReDoS Attack with spring-messaging spring-data-commons: XXE with Spring Data’s XMLBeam integration kafka: Users can perform Broker actions via crafted fetch requests, interfering with data replication and causing data lass tomcat: A bug in the UTF-8 decoder can lead to DoS tomcat: Insecure defaults in CORS filter enable 'supportsCredentials' for all origins ignite: Improper deserialization allows for code execution via GridClientJdkMarshaller endpoint apache-cxf: TLS hostname verification does not work correctly with com.sun.net.ssl.* camel-mail: path traversal vulnerability vertx: Improper neutralization of CRLF sequences allows remote attackers to inject arbitrary HTTP response headers
|
[
"cpe:/a:redhat:jboss_fuse:7"
] | null | null | 5.3 | null |
RHSA-2024:7646
|
Red Hat Security Advisory: firefox security update
|
firefox: Clipboard write permission bypass firefox: thunderbird: Compromised content process can bypass site isolation firefox: thunderbird: Cross-origin access to PDF contents through multipart responses firefox: thunderbird: Cross-origin access to JSON contents through multipart responses firefox: thunderbird: Potential memory corruption may occur when cloning certain objects firefox: thunderbird: Potential directory upload bypass via clickjacking firefox: thunderbird: External protocol handlers could be enumerated via popups firefox: thunderbird: Specially crafted WebTransport requests could lead to denial of service firefox: thunderbird: Potential memory corruption during JIT compilation firefox: thunderbird: Memory safety bugs fixed in Firefox 131, Firefox ESR 115.16, Firefox ESR 128.3, Thunderbird 131, and Thunderbird 128.3 firefox: thunderbird: Memory safety bugs fixed in Firefox 131, Firefox ESR 128.3, Thunderbird 131, and Thunderbird 128.3 firefox: thunderbird: Memory safety bugs fixed in Firefox 131 and Thunderbird 131
|
[
"cpe:/a:redhat:rhel_aus:8.2::appstream"
] | null | 7.5 | null | null |
RHSA-2007:0722
|
Red Hat Security Advisory: seamonkey security update
|
security flaw security flaw security flaw security flaw security flaw security flaw security flaw
|
[
"cpe:/o:redhat:enterprise_linux:2.1::as",
"cpe:/o:redhat:enterprise_linux:2.1::aw",
"cpe:/o:redhat:enterprise_linux:2.1::es",
"cpe:/o:redhat:enterprise_linux:2.1::ws",
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws",
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2022:8973
|
Red Hat Security Advisory: kernel security and bug fix update
|
kernel: KVM: cmpxchg_gpte can write to pfns outside the userspace region kernel: openvswitch: integer underflow leads to out-of-bounds write in reserve_sfa_size() kernel: watch queue race condition can lead to privilege escalation hw: cpu: incomplete clean-up of multi-core shared buffers (aka SBDR) hw: cpu: incomplete clean-up of microarchitectural fill buffers (aka SBDS) hw: cpu: incomplete clean-up in specific special register write operations (aka DRPW) hw: cpu: AMD: RetBleed Arbitrary Speculative Code Execution with Return Instructions hw: cpu: AMD: Branch Type Confusion (non-retbleed) hw: cpu: Intel: Post-barrier Return Stack Buffer Predictions hw: cpu: Intel: information disclosure via local access hw: cpu: AMD: RetBleed Arbitrary Speculative Code Execution with Return Instructions hw: cpu: Intel: RetBleed Arbitrary Speculative Code Execution with Return Instructions kernel: nfsd buffer overflow by RPC message over TCP with garbage data
|
[
"cpe:/a:redhat:rhel_eus:9.0::appstream",
"cpe:/a:redhat:rhel_eus:9.0::crb",
"cpe:/o:redhat:rhel_eus:9.0::baseos"
] | null | 7.5 | null | null |
RHSA-2014:1744
|
Red Hat Security Advisory: v8314-v8 security update
|
v8: DoS (out-of-bounds write) in DehoistArrayIndex function in hydrogen.cc v8: DoS (out-of-bounds read) in DehoistArrayIndex function in hydrogen.cc v8: incorrect handling of popular pages v8: multiple vulnerabilities fixed in Google Chrome version 33.0.1750.146 v8: multiple vulnerabilities fixed in Google Chrome version 33.0.1750.149 V8: Memory Corruption and Stack Overflow
|
[
"cpe:/a:redhat:rhel_software_collections:1::el6",
"cpe:/a:redhat:rhel_software_collections:1::el7"
] | null | null | null | null |
RHSA-2015:0010
|
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 5.2.0 security update
|
SSL/TLS: Padding Oracle On Downgraded Legacy Encryption attack
|
[
"cpe:/a:redhat:jboss_enterprise_application_platform:5.2.0"
] | null | null | null | null |
RHSA-2018:2175
|
Red Hat Security Advisory: flash-plugin security update
|
flash-plugin: Arbitrary Code Execution vulnerability (APSB18-24) flash-plugin: Information Disclosure vulnerability (APSB18-24)
|
[
"cpe:/a:redhat:rhel_extras:6"
] | null | null | 6.5 | null |
RHSA-2005:586
|
Red Hat Security Advisory: firefox security update
|
security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw
|
[
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2009:0010
|
Red Hat Security Advisory: squirrelmail security update
|
squirrelmail: XSS issue caused by an insufficient html mail sanitation squirrelmail: session hijacking - secure flag not set for HTTPS-only cookies
|
[
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws",
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2020:3545
|
Red Hat Security Advisory: kernel-alt security and bug fix update
|
kernel: Denial Of Service in the __ipmi_bmc_register() function in drivers/char/ipmi/ipmi_msghandler.c kernel: Buffer over-read in crypto_authenc_extractkeys() when a payload longer than 4 bytes is not aligned. kernel: sync of excessive duration via an XFS v5 image with crafted metadata
|
[
"cpe:/o:redhat:enterprise_linux:7::server"
] | null | 5.5 | null | null |
RHSA-2020:3981
|
Red Hat Security Advisory: samba security, bug fix, and enhancement update
|
samba: Crash after failed character conversion at log level 3 or above
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 6.5 | null | null |
RHSA-2008:0612
|
Red Hat Security Advisory: kernel security and bug fix update
|
kernel: setrlimit(RLIMIT_CPUINFO) with zero value doesn't inherit properly across children kernel: sit memory leak kernel: NULL ptr dereference in multiple network drivers due to missing checks in tty code
|
[
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2016:1262
|
Red Hat Security Advisory: chromium-browser security update
|
chromium-browser: various fixes from internal audits
|
[
"cpe:/a:redhat:rhel_extras:6"
] | null | null | null | null |
RHSA-2024:4762
|
Red Hat Security Advisory: runc security update
|
golang-fips/openssl: Memory leaks in code encrypting and decrypting RSA payloads
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 7.5 | null | null |
RHSA-2003:161
|
Red Hat Security Advisory: xinetd security update
|
security flaw
|
[
"cpe:/o:redhat:enterprise_linux:2.1::as",
"cpe:/o:redhat:enterprise_linux:2.1::aw",
"cpe:/o:redhat:enterprise_linux:2.1::es",
"cpe:/o:redhat:enterprise_linux:2.1::ws"
] | null | null | null | null |
RHSA-2003:310
|
Red Hat Security Advisory: fileutils security update
|
security flaw security flaw
|
[
"cpe:/o:redhat:enterprise_linux:2.1::as",
"cpe:/o:redhat:enterprise_linux:2.1::aw",
"cpe:/o:redhat:enterprise_linux:2.1::es",
"cpe:/o:redhat:enterprise_linux:2.1::ws"
] | null | null | null | null |
RHSA-2007:0992
|
Red Hat Security Advisory: libpng security update
|
libpng DoS via multiple out-of-bounds reads
|
[
"cpe:/o:redhat:enterprise_linux:2.1::as",
"cpe:/o:redhat:enterprise_linux:2.1::aw",
"cpe:/o:redhat:enterprise_linux:2.1::es",
"cpe:/o:redhat:enterprise_linux:2.1::ws",
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws",
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws",
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2016:1345
|
Red Hat Security Advisory: Red Hat JBoss BRMS security update
|
JGroups: Authorization bypass
|
[
"cpe:/a:redhat:jboss_enterprise_brms_platform:5.3",
"cpe:/a:redhat:jboss_enterprise_brms_platform:6.3"
] | null | null | 9.8 | null |
RHSA-2017:0192
|
Red Hat Security Advisory: Red Hat Satellite Proxy 5 - 60 day End Of Life Notice
|
This is the 60 day notification of the End Of Life (EOL) plans for the
following versions of Red Hat Satellite 5:
* Red Hat Satellite 5.6 on Red Hat Enterprise Linux 5
|
[
"cpe:/a:redhat:network_proxy:5.6::el5"
] | null | null | null | null |
RHSA-2015:2548
|
Red Hat Security Advisory: Red Hat JBoss Web Server 3.0.1 commons-collections security update
|
apache-commons-collections: InvokerTransformer code execution during deserialisation
|
[
"cpe:/a:redhat:jboss_enterprise_web_server:3.0"
] | null | null | null | null |
RHSA-2016:1334
|
Red Hat Security Advisory: Red Hat JBoss Data Grid 6.6 security update
|
JGroups: Authorization bypass
|
[
"cpe:/a:redhat:jboss_data_grid:6.6"
] | null | null | 9.8 | null |
RHSA-2024:3855
|
Red Hat Security Advisory: kernel security update
|
kernel: KVM: SVM: improper check in svm_set_x2apic_msr_interception allows direct access to host x2apic msrs kernel: bluetooth: bt_sock_ioctl race condition leads to use-after-free in bt_sock_recvmsg kernel: KVM: s390: vsie: fix race during shadow creation kernel: net/mlx5e: fix a potential double-free in fs_any_create_groups kernel: kvm: Avoid potential UAF in LPI translation cache
|
[
"cpe:/a:redhat:rhel_eus:9.2::appstream",
"cpe:/a:redhat:rhel_eus:9.2::crb",
"cpe:/o:redhat:rhel_eus:9.2::baseos"
] | null | 7.8 | null | null |
RHEA-2021:1906
|
Red Hat Enhancement Advisory: libyang bug fix and enhancement update
|
libyang: invalid memory access in resolve_feature_value() when a if-feature is used inside a bit libyang: invalid memory access when if-feature statement is used inside a list key node libyang: double-free in function yyparse() when empty description is used libyang: double-free in yyparse() when a type statement is used in a notification statement libyang: stack-overflow when parsing yang files with self-referential union types libyang: heap-based buffer over-read in function lys_type_free() due to malformed pattern libyang: double-free in yyparse() when organization field is not terminated libyang: NULL pointer dereference in function lys_extension_instances_free()
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 5.5 | null | null |
RHSA-2015:1814
|
Red Hat Security Advisory: flash-plugin security update
|
flash-plugin: multiple code execution issues fixed in APSB15-23 flash-plugin: information leaks and hardening bypass fixed in APSB15-23 flash-plugin: multiple code execution issues fixed in APSB15-23 flash-plugin: information leaks and hardening bypass fixed in APSB15-23 flash-plugin: information leaks and hardening bypass fixed in APSB15-23 flash-plugin: multiple code execution issues fixed in APSB15-23 flash-plugin: multiple code execution issues fixed in APSB15-23 flash-plugin: multiple code execution issues fixed in APSB15-23 flash-plugin: information leaks and hardening bypass fixed in APSB15-23 flash-plugin: multiple code execution issues fixed in APSB15-23 flash-plugin: multiple code execution issues fixed in APSB15-23 flash-plugin: multiple code execution issues fixed in APSB15-23 flash-plugin: multiple code execution issues fixed in APSB15-23 flash-plugin: multiple code execution issues fixed in APSB15-23 flash-plugin: multiple code execution issues fixed in APSB15-23 flash-plugin: multiple code execution issues fixed in APSB15-23 flash-plugin: multiple code execution issues fixed in APSB15-23 flash-plugin: multiple code execution issues fixed in APSB15-23 flash-plugin: multiple code execution issues fixed in APSB15-23 flash-plugin: multiple code execution issues fixed in APSB15-23 flash-plugin: multiple code execution issues fixed in APSB15-23 flash-plugin: information leaks and hardening bypass fixed in APSB15-23 flash-plugin: multiple code execution issues fixed in APSB15-23
|
[
"cpe:/a:redhat:rhel_extras:5::client",
"cpe:/a:redhat:rhel_extras:5::server",
"cpe:/a:redhat:rhel_extras:6"
] | null | null | null | null |
RHSA-2012:1466
|
Red Hat Security Advisory: java-1.6.0-ibm security update
|
OpenJDK: AWT hardening fixes (AWT, 7163201) JDK: unspecified vulnerability (2D) JDK: unspecified vulnerability (Deployment) JDK: unspecified vulnerability (Deployment) OpenJDK: beans ClassFinder insufficient permission checks (beans, 7162476) JDK: unspecified vulnerability (JMX) JDK: unspecified vulnerability (Deployment) OpenJDK: java.io.FilePermission information leak (Libraries, 6631398) JDK: java.lang.reflect.Method invoke() code execution JDK: java.lang.class code execution JDK: java.lang.ClassLoder defineClass() code execution OpenJDK: RhinoScriptEngine security bypass (Scripting, 7143535) OpenJDK: Executors state handling issues (Concurrency, 7189103) OpenJDK: DescriptorSupport insufficient package access checks (JMX, 7192975) OpenJDK: AccessController.doPrivilegedWithCombiner() information disclosure (Security, 7172522) OpenJDK: LogManager security bypass (Libraries, 7169884) OpenJDK: RMIConnectionImpl information disclosure (JMX, 7169888) OpenJDK: ServiceLoader reject not subtype classes without instantiating (Libraries, 7195919) OpenJDK: JSSE denial of service (JSSE, 7186286) JDK: unspecified vulnerability (2D) OpenJDK: DefaultFormatter insufficient data validation (Swing, 7195194) OpenJDK: RMIConnectionImpl insufficient access control checks (JMX, 7198296) OpenJDK: IIOP type reuse sandbox bypass (CORBA, 8000540, SE-2012-01 Issue 50)
|
[
"cpe:/a:redhat:rhel_extras:5::client",
"cpe:/a:redhat:rhel_extras:5::server",
"cpe:/a:redhat:rhel_extras:6"
] | null | null | null | null |
RHSA-2022:6422
|
Red Hat Security Advisory: Multicluster Engine for Kubernetes 2.0.2 security and bug fixes
|
moment: inefficient parsing algorithm resulting in DoS vm2: Sandbox Escape in vm2
|
[
"cpe:/a:redhat:multicluster_engine:2.0::el8"
] | null | 10 | null | null |
RHSA-2002:271
|
Red Hat Security Advisory: pine security update
|
security flaw
|
[
"cpe:/o:redhat:enterprise_linux:2.1::as",
"cpe:/o:redhat:enterprise_linux:2.1::aw"
] | null | null | null | null |
RHSA-2008:0211
|
Red Hat Security Advisory: kernel security and bug fix update
|
kernel Race condition in mincore can cause "ps -ef" to hang kernel asynchronous IO on a FIFO kernel panic I4L: fix isdn_ioctl memory issue Issue with core dump owner kernel: insufficient range checks in fault handlers with mremap Kernel doesn't clear DF for signal handlers kernel: race condition in dnotify (local DoS, local roothole possible) kernel: add rcu_read_lock() to fcheck() in both dnotify, locks.c and fix fcntl store/load race in locks.c
|
[
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws"
] | null | null | null | null |
RHBA-2020:0675
|
Red Hat Bug Fix Advisory: OpenShift Container Platform 4.3.5 packages update
|
jenkins: Inbound TCP Agent Protocol/3 authentication bypass jenkins: UDP multicast/broadcast service amplification reflection attack jenkins: Non-constant time comparison of inbound TCP agent connection secret jenkins: Non-constant time HMAC comparison jenkins: Exposed session identifiers on user detail object in the whoAmI diagnostic page jenkins: Memory usage graphs accessible to anyone with Overall/Read jenkins: REST APIs vulnerable to clickjacking
|
[
"cpe:/a:redhat:openshift:4.3::el7",
"cpe:/a:redhat:openshift:4.3::el8"
] | null | 3.1 | null | null |
RHSA-2021:3906
|
Red Hat Security Advisory: 389-ds:1.4 security and bug fix update
|
389-ds-base: CRYPT password hash with asterisk allows any bind attempt to succeed
|
[
"cpe:/a:redhat:rhel_eus:8.2::appstream"
] | null | 6.5 | null | null |
RHSA-2015:1945
|
Red Hat Security Advisory: kubernetes security update
|
Kubernetes: Missing name validation allows path traversal in etcd
|
[
"cpe:/a:redhat:openshift:3.0::el7"
] | null | null | null | null |
RHSA-2021:0347
|
Red Hat Security Advisory: qemu-kvm security and bug fix update
|
QEMU: loader: OOB access while loading registered ROM may lead to code execution QEMU: reachable assertion failure in net_tx_pkt_add_raw_fragment() in hw/net/net_tx_pkt.c
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 3.8 | null | null |
RHSA-2011:0423
|
Red Hat Security Advisory: postfix security update
|
postfix: SMTP commands injection during plaintext to TLS session switch
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2023:4437
|
Red Hat Security Advisory: Red Hat OpenShift Data Foundation 4.13.1 security and bug fix update
|
openshift: OCP & FIPS mode
|
[
"cpe:/a:redhat:openshift_data_foundation:4.13::el9"
] | null | 6.5 | null | null |
RHSA-2024:0151
|
Red Hat Security Advisory: .NET 7.0 security update
|
crypto-js: PBKDF2 1,000 times weaker than specified in 1993 and 1.3M times weaker than current standard dotnet: Information Disclosure: MD.SqlClient(MDS) & System.data.SQLClient (SDS) dotnet: X509 Certificates - Validation Bypass across Azure dotnet: .NET Denial of Service Vulnerability
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::crb"
] | null | 6.8 | null | null |
RHSA-2020:0591
|
Red Hat Security Advisory: ruby security update
|
ruby: DoS by large request in WEBrick ruby: Unintentional directory traversal by poisoned NULL byte in Dir rubygems: Path traversal when writing to a symlinked basedir outside of the root rubygems: Unsafe Object Deserialization Vulnerability in gem owner allowing arbitrary code execution on specially crafted YAML rubygems: Infinite loop vulnerability due to negative size in tar header causes Denial of Service rubygems: Improper verification of signatures in tarball allows to install mis-signed gem rubygems: Missing URL validation on spec home attribute allows malicious gem to set an invalid homepage URL rubygems: XSS vulnerability in homepage attribute when displayed via gem server rubygems: Path traversal issue during gem installation allows to write to arbitrary filesystem locations
|
[
"cpe:/o:redhat:rhel_aus:7.4::server",
"cpe:/o:redhat:rhel_e4s:7.4::server",
"cpe:/o:redhat:rhel_tus:7.4::server"
] | null | null | 5.5 | null |
RHSA-2020:1487
|
Red Hat Security Advisory: chromium-browser security update
|
chromium-browser: Out of bounds read and write in V8 chromium-browser: Use after free in audio chromium-browser: Type Confusion in V8 chromium-browser: Insufficient policy enforcement in full screen chromium-browser: Insufficient policy enforcement in navigations chromium-browser: Insufficient policy enforcement in extensions chromium-browser: Use after free in devtools chromium-browser: Insufficient policy enforcement in extensions chromium-browser: Use after free in window management chromium-browser: Inappropriate implementation in WebView chromium-browser: Insufficient policy enforcement in extensions chromium-browser: Insufficient policy enforcement in navigations chromium-browser: Inappropriate implementation in extensions chromium-browser: Insufficient policy enforcement in omnibox chromium-browser: Inappropriate implementation in cache chromium-browser: Insufficient data validation in developer tools chromium-browser: Uninitialized use in WebRTC chromium-browser: Insufficient policy enforcement in trusted types chromium-browser: Insufficient policy enforcement in trusted types chromium-browser: Inappropriate implementation in developer tools chromium-browser: Use after free in V8 chromium-browser: Use after free in extensions chromium-browser: Out of bounds read in WebSQL chromium-browser: Insufficient validation of untrusted input in clipboard
|
[
"cpe:/a:redhat:rhel_extras:6"
] | null | 8.8 | 6.5 | null |
RHSA-2025:3448
|
Red Hat Security Advisory: Logging for Red Hat OpenShift - 5.8.19
|
rack: rubygem-rack: Local File Inclusion in Rack::Static
|
[
"cpe:/a:redhat:logging:5.8::el9"
] | null | 7.5 | null | null |
RHSA-2024:4554
|
Red Hat Security Advisory: kernel-rt security update
|
kernel: ethernet: hisilicon: hns: hns_dsaf_misc: fix a possible array overflow in hns_dsaf_ge_srst_by_port() kernel: net: hns3: fix use-after-free bug in hclgevf_send_mbx_msg kernel: vt: fix memory overlapping when deleting chars in the buffer kernel: can: j1939: prevent deadlock by changing j1939_socks_lock to rwlock kernel: tls: race between async notify and socket close kernel: tls: race between tx work scheduling and socket close kernel: mm/writeback: fix possible divide-by-zero in wb_dirty_limits(), again kernel: mm/vmscan: fix a bug calling wakeup_kswapd() with a wrong zone index kernel: Bluetooth: Avoid potential use-after-free in hci_error_reset kernel: net/ipv6: avoid possible UAF in ip6_route_mpath_notify() kernel: icmp: prevent possible NULL dereferences from icmp_build_probe() kernel: netfilter: nf_tables: Fix potential data-race in __nft_flowtable_type_get() kernel: ipv6: fix race condition between ipv6_get_ifaddr and ipv6_del_addr kernel: netfilter: nf_tables: honor table dormant flag from netdev release event path kernel: tty: n_gsm: fix possible out-of-bounds in gsm0_receive() kernel: TIPC message reassembly use-after-free remote code execution vulnerability
|
[
"cpe:/a:redhat:rhel_eus:9.2::nfv",
"cpe:/a:redhat:rhel_eus:9.2::realtime"
] | null | 7.1 | null | null |
RHSA-2022:6913
|
Red Hat Security Advisory: .NET 6.0 security and bugfix update
|
dotnet: Nuget cache poisoning on Linux via world-writable cache directory
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::crb"
] | null | 7.8 | null | null |
RHSA-2017:2802
|
Red Hat Security Advisory: kernel security update
|
kernel: load_elf_ binary() does not take account of the need to allocate sufficient space for the entire binary
|
[
"cpe:/o:redhat:rhel_aus:5.9"
] | null | null | 7.8 | null |
RHSA-2024:9016
|
Red Hat Security Advisory: thunderbird security update
|
firefox: thunderbird: Permission leak via embed or object elements firefox: thunderbird: Use-after-free in layout with accessibility firefox: thunderbird: Confusing display of origin for external protocol handler prompt firefox: thunderbird: XSS due to Content-Disposition being ignored in multipart/x-mixed-replace response firefox: thunderbird: Origin of permission prompt could be spoofed by long URL firefox: thunderbird: Cross origin video frame leak firefox: thunderbird: History interface could have been used to cause a Denial of Service condition in the browser firefox: thunderbird: Clipboard "paste" button persisted across tabs firefox: DOM push subscription message could hang Firefox firefox: thunderbird: Memory safety bugs fixed in Firefox 132, Thunderbird 132, Firefox ESR 128.4, and Thunderbird 128.4
|
[
"cpe:/a:redhat:rhel_aus:8.2::appstream"
] | null | 8.8 | null | null |
RHSA-2006:0610
|
Red Hat Security Advisory: firefox security update
|
security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw vulnerabilities: CVE-2006-{3113,3677,3801-3812}
|
[
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2020:5625
|
Red Hat Security Advisory: Red Hat Single Sign-On 7.4.0 security update
|
keycloak: Password leak by logged exception in HttpMethod class keycloak: missing input validation in IDP authorization URLs jackson-databind: Serialization gadgets in org.aoju.bus.proxy.provider.*.RmiProvider jackson-databind: Serialization gadgets in org.apache.activemq.jms.pool.XaPooledConnectionFactory jackson-databind: Serialization gadgets in org.apache.commons.proxy.provider.remoting.RmiProvider jackson-databind: Serialization gadgets in org.apache.openjpa.ee.WASRegistryManagedRuntime jackson-databind: Serialization gadgets in org.springframework:spring-aop jackson-databind: Serialization gadgets in commons-jelly:commons-jelly
|
[
"cpe:/a:redhat:red_hat_single_sign_on:7"
] | null | 8.1 | null | null |
RHSA-2020:1978
|
Red Hat Security Advisory: git security update
|
git: Crafted URL containing new lines, empty host or lacks a scheme can cause credential leak
|
[
"cpe:/a:redhat:rhel_e4s:8.0::appstream"
] | null | 7.5 | null | null |
RHSA-2018:3083
|
Red Hat Security Advisory: kernel security, bug fix, and enhancement update
|
kernel: AIO write triggers integer overflow in some protocols kernel: Information leak when handling NM entries containing NUL kernel: Use-after-free in snd_pcm_info function in ALSA subsystem potentially leads to privilege escalation kernel: Handling of might_cancel queueing is not properly pretected against race kernel: Salsa20 encryption algorithm does not correctly handle zero-length inputs allowing local attackers to cause denial-of-service kernel: Inifinite loop vulnerability in mm/madvise.c:madvise_willneed() function allows local denial of service kernel: Mishandling mutex within libsas allowing local Denial of Service kernel: out-of-bounds access in the show_timer function in kernel/time/posix-timers.c kernel: Division by zero in change_port_settings in drivers/usb/serial/io_ti.c resulting in a denial of service kernel: NULL pointer dereference in ext4/mballoc.c:ext4_process_freed_data() when mounting crafted ext4 image kernel: NULL pointer dereference in ext4/xattr.c:ext4_xattr_inode_hash() causes crash with crafted ext4 image kernel: vhost: Information disclosure in vhost/vhost.c:vhost_new_msg() kernel: fuse-backed file mmap-ed onto process cmdline arguments causes denial of service kernel: a null pointer dereference in net/dccp/output.c:dccp_write_xmit() leads to a system crash kernel: drivers/block/loop.c mishandles lo_release serialization allowing denial-of-service kernel: IP fragments with random offsets allow a remote denial of service (FragmentSmack) kernel: Missing length check of payload in net/sctp/sm_make_chunk.c:_sctp_make_chunk() function allows denial of service kernel: buffer overflow in drivers/net/wireless/ath/wil6210/wmi.c:wmi_set_ie() may lead to memory corruption kernel: Denial of service in resv_map_release function in mm/hugetlb.c kernel: Memory leak in the sas_smp_get_phy_events function in drivers/scsi/libsas/sas_expander.c kernel: Integer overflow in drivers/gpu/drm/udl/udl_fb.c:udl_fb_mmap() can allow attackers to execute code in kernel space kernel: Invalid pointer dereference in xfs_ilock_attr_map_shared() when mounting crafted xfs image allowing denial of service kernel: out-of-bound write in ext4_init_block_bitmap function with a crafted ext4 image kernel: use-after-free detected in ext4_xattr_set_entry with a crafted file kernel: out-of-bound access in ext4_get_group_info() when mounting and operating a crafted ext4 image kernel: stack-out-of-bounds write in jbd2_journal_dirty_metadata function kernel: MIDI driver race condition leads to a double-free kernel: incorrect memory bounds check in drivers/cdrom/cdrom.c kernel: Missing check in fs/inode.c:inode_init_owner() does not clear SGID bit on non-directories for non-members kernel: filesystem corruption due to an unchecked error condition during an xfs attribute change kernel: Improper validation in bnx2x network card driver can allow for denial of service attacks via crafted packet
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 5.8 | null |
RHSA-2005:070
|
Red Hat Security Advisory: ImageMagick security update
|
security flaw security flaw security flaw security flaw security flaw security flaw
|
[
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws"
] | null | null | null | null |
RHSA-2019:0886
|
Red Hat Security Advisory: AMQ Clients 2.3.1 release and security update
|
qpid-proton: TLS Man in the Middle Vulnerability
|
[
"cpe:/a:redhat:a_mq_clients:2::el6",
"cpe:/a:redhat:a_mq_clients:2::el7"
] | null | null | 7.4 | null |
RHSA-2023:0817
|
Red Hat Security Advisory: thunderbird security update
|
Mozilla: User Interface lockup with messages combining S/MIME and OpenPGP Mozilla: Content security policy leak in violation reports using iframes Mozilla: Extensions could have opened external schemes without user knowledge Mozilla: Screen hijack via browser fullscreen mode Mozilla: Out of bounds memory write from EncodeInputStream Mozilla: Potential use-after-free from compartment mismatch in SpiderMonkey Mozilla: Invalid downcast in SVGUtils::SetupStrokeGeometry Mozilla: Use-after-free in mozilla::dom::ScriptLoadContext::~ScriptLoadContext Mozilla: Web Crypto ImportKey crashes tab Mozilla: Fullscreen notification not shown in Firefox Focus Mozilla: Memory safety bugs fixed in Firefox 110 and Firefox ESR 102.8 Mozilla: Memory safety bugs fixed in Firefox ESR 102.8
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 8.8 | null | null |
RHSA-2024:10232
|
Red Hat Security Advisory: pam security update
|
pam: Improper Hostname Interpretation in pam_access Leads to Access Control Bypass
|
[
"cpe:/a:redhat:rhel_eus:9.4::appstream",
"cpe:/o:redhat:rhel_eus:9.4::baseos"
] | null | 7.4 | null | null |
RHSA-2020:4402
|
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.3 security update
|
jackson-databind: FasterXML DOMDeserializer insecure entity expansion is vulnerable to XML external entity (XXE)
|
[
"cpe:/a:redhat:jboss_enterprise_application_platform:7.3"
] | null | 7.5 | null | null |
RHSA-2005:035
|
Red Hat Security Advisory: libtiff security update
|
security flaw security flaw
|
[
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2009:1154
|
Red Hat Security Advisory: dhcp security update
|
dhclient: stack overflow leads to arbitrary code execution as root dhcp: insecure temporary file use in the dhcpd init script
|
[
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws"
] | null | null | null | null |
RHSA-2023:3326
|
Red Hat Security Advisory: Red Hat Advanced Cluster Management 2.6.6 security fixes and container updates
|
redis: Insufficient validation of HINCRBYFLOAT command vm2: Inspect Manipulation vm2: Sandbox Escape
|
[
"cpe:/a:redhat:acm:2.6::el8"
] | null | 9.8 | null | null |
RHSA-2020:2640
|
Red Hat Security Advisory: unbound security update
|
unbound: amplification of an incoming query into a large number of queries directed to a target unbound: infinite loop via malformed DNS answers received from upstream servers
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | 7.5 | null | null |
RHSA-2011:0357
|
Red Hat Security Advisory: java-1.6.0-ibm security update
|
JDK unspecified vulnerability in Deployment component JDK unspecified vulnerability in Deployment component OpenJDK DNS cache poisoning by untrusted applets (6981922) JDK unspecified vulnerability in Deployment component JDK unspecified vulnerability in Sound component JDK unspecified vulnerability in Sound component JDK unspecified vulnerability in Deployment component OpenJDK Swing timer-based security manager bypass (6907662) JDK unspecified vulnerability in Deployment component JDK unspecified vulnerability in Deployment component JDK unspecified vulnerability in JDBC component OpenJDK Java2D font-related system property leak (6985453) JDK unspecified vulnerability in Sound component JDK unspecified vulnerability in Deployment component
|
[
"cpe:/a:redhat:rhel_extras:4",
"cpe:/a:redhat:rhel_extras:5::client",
"cpe:/a:redhat:rhel_extras:5::server",
"cpe:/a:redhat:rhel_extras:6"
] | null | null | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.