id
stringlengths 13
15
| title
stringlengths 29
176
| description
stringlengths 8
32.1k
| cpes
listlengths 0
20
| cvss_v4_0
null | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
null |
---|---|---|---|---|---|---|---|
RHSA-2011:1456
|
Red Hat Security Advisory: JBoss Enterprise SOA Platform 5.2.0 update
|
jruby: XSS in the regular expression engine when processing invalid UTF-8 byte sequences Invoker servlets authentication bypass (HTTP verb tampering)
|
[
"cpe:/a:redhat:jboss_soa_platform:5.1"
] | null | null | null | null |
RHSA-2024:4375
|
Red Hat Security Advisory: postgresql-jdbc security update
|
pgjdbc: PostgreSQL JDBC Driver allows attacker to inject SQL if using PreferQueryMode=SIMPLE
|
[
"cpe:/a:redhat:rhel_aus:8.4::appstream",
"cpe:/a:redhat:rhel_e4s:8.4::appstream",
"cpe:/a:redhat:rhel_tus:8.4::appstream"
] | null | 9.8 | null | null |
RHSA-2015:0087
|
Red Hat Security Advisory: kernel security and bug fix update
|
Kernel: ALSA: control: integer overflow in id.index & id.numid kernel: net: sctp: NULL pointer dereference in af->from_addr_param on malformed packet
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2009:1636
|
Red Hat Security Advisory: JBoss Enterprise Application Platform 4.3.0.CP07 update
|
xml-security-1.3.0-1jpp.ep1.*: XMLDsig HMAC-based signatures spoofing and authentication bypass jbossas JMX-Console cross-site-scripting in filter parameter JBoss Application Server Web Console XSS JDK: XML parsing Denial-Of-Service (6845701) JBoss EAP Twiddle logs the JMX password
|
[
"cpe:/a:redhat:jboss_enterprise_application_platform:4.3.0::el4"
] | null | null | null | null |
RHSA-2024:2982
|
Red Hat Security Advisory: webkit2gtk3 security update
|
webkitgtk: Processing a file may lead to a denial of service or potentially disclose memory contents webkitgtk: User password may be read aloud by a text-to-speech accessibility feature webkitgtk: use-after-free in the MediaRecorder API of the WebKit GStreamer-based ports webkitgtk: Processing web content may lead to arbitrary code execution webkitgtk: Processing web content may lead to a denial of service webkitgtk: Processing web content may lead to arbitrary code execution webkitgtk: processing a malicious image may lead to a denial of service webkitgtk: processing malicious web content may lead to arbitrary code execution webkitgtk: Arbitrary Remote Code Execution
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 8.8 | null | null |
RHSA-2019:2125
|
Red Hat Security Advisory: ovmf security and enhancement update
|
edk2: Privilege escalation via processing of malformed files in TianoCompress.c edk2: Privilege escalation via processing of malformed files in BaseUefiDecompressLib.c edk2: Privilege escalation via heap-based buffer overflow in MakeTable() function edk2: Privilege escalation via stack-based buffer overflow in MakeTable() function edk2: Privilege escalation via heap-based buffer overflow in Decode() function edk2: Logic error in MdeModulePkg in EDK II firmware allows for privilege escalation by authenticated users openssl: Side-channel vulnerability on SMT/Hyper-Threading architectures (PortSmash) edk2: Stack buffer overflow with corrupted BMP edk2: Buffer overflows in PartitionDxe and UdfDxe with long file names and invalid UDF media edk2: stack overflow in XHCI causing denial of service
|
[
"cpe:/o:redhat:enterprise_linux:7::server"
] | null | null | 5.9 | null |
RHSA-2022:9110
|
Red Hat Security Advisory: OpenShift Container Platform 4.9.54 packages and security update
|
jenkins-plugin: Arbitrary file write vulnerability in Pipeline Input Step Plugin
|
[
"cpe:/a:redhat:openshift:4.9::el7",
"cpe:/a:redhat:openshift:4.9::el8"
] | null | 7.5 | null | null |
RHSA-2024:0837
|
Red Hat Security Advisory: OpenShift Container Platform 4.14.13 security update
|
golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487)
|
[
"cpe:/a:redhat:openshift:4.14::el8",
"cpe:/a:redhat:openshift:4.14::el9"
] | null | 7.5 | null | null |
RHSA-2023:7715
|
Red Hat Security Advisory: webkit2gtk3 security update
|
webkitgtk: Arbitrary Remote Code Execution
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 8.8 | null | null |
RHSA-2021:1377
|
Red Hat Security Advisory: kpatch-patch security update
|
kernel: SCSI target (LIO) write to any block on ILO backstore kernel: out-of-bounds read in libiscsi module kernel: heap buffer overflow in the iSCSI subsystem
|
[
"cpe:/o:redhat:rhel_eus:7.6::server"
] | null | 7.8 | null | null |
RHSA-2022:7384
|
Red Hat Security Advisory: openssl-container security update
|
OpenSSL: X.509 Email Address Buffer Overflow OpenSSL: X.509 Email Address Variable Length Buffer Overflow
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 7.5 | null | null |
RHSA-2014:0339
|
Red Hat Security Advisory: rhev-hypervisor6 security update
|
kernel: usb: cdc-wdm buffer overflow triggered by device kernel: vhost-net: insufficient handling of error conditions in get_rx_bufs() gnutls: incorrect error handling in certificate verification (GNUTLS-SA-2014-2)
|
[
"cpe:/o:redhat:enterprise_linux:6::hypervisor"
] | null | null | null | null |
RHSA-2014:0800
|
Red Hat Security Advisory: kernel security update
|
kernel: block: floppy: privilege escalation via FDRAWCMD floppy ioctl command kernel: block: floppy: privilege escalation via FDRAWCMD floppy ioctl command kernel: futex: pi futexes requeue issue
|
[
"cpe:/o:redhat:rhel_mission_critical:6.2::server"
] | null | null | null | null |
RHSA-2005:812
|
Red Hat Security Advisory: wget security update
|
security flaw
|
[
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws",
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2024:5694
|
Red Hat Security Advisory: tomcat security update
|
tomcat: Improper Handling of Exceptional Conditions tomcat: Denial of Service in Tomcat
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 7.5 | null | null |
RHSA-2015:1538
|
Red Hat Security Advisory: Red Hat JBoss BRMS 6.1.2 update
|
Camel: XXE in via SAXSource expansion Camel: XXE via XPath expression evaluation
|
[
"cpe:/a:redhat:jboss_brms:6.0"
] | null | null | null | null |
RHSA-2020:2265
|
Red Hat Security Advisory: rh-haproxy18-haproxy security, bug fix, and enhancement update
|
haproxy: HTTP request smuggling issue with transfer-encoding header containing an obfuscated "chunked" value haproxy: HTTP/2 implementation vulnerable to intermediary encapsulation attacks
|
[
"cpe:/a:redhat:rhel_software_collections:3::el7"
] | null | null | 5.9 | null |
RHSA-2002:192
|
Red Hat Security Advisory: : Updated Mozilla packages fix security vulnerabilities
|
security flaw security flaw security flaw security flaw
|
[
"cpe:/o:redhat:linux:7.2",
"cpe:/o:redhat:linux:7.3",
"cpe:/o:redhat:linux:8.0"
] | null | null | null | null |
RHSA-2006:0600
|
Red Hat Security Advisory: mailman security update
|
security flaw security flaw
|
[
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws",
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2016:2573
|
Red Hat Security Advisory: glibc security, bug fix, and enhancement update
|
glibc: Stack overflow in nss_dns_getnetbyname_r
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 7 | null |
RHSA-2001:060
|
Red Hat Security Advisory: : Updated Kerberos 5 packages available
|
security flaw
|
[
"cpe:/o:redhat:linux:6.2",
"cpe:/o:redhat:linux:7.0",
"cpe:/o:redhat:linux:7.1"
] | null | null | null | null |
RHSA-2021:3836
|
Red Hat Security Advisory: httpd:2.4 security update
|
httpd: mod_proxy: SSRF via a crafted request uri-path containing "unix:"
|
[
"cpe:/a:redhat:rhel_eus:8.2::appstream"
] | null | 9 | null | null |
RHSA-2024:11531
|
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.4 security update
|
hornetq-core-client: Arbitrarily overwrite files or access sensitive information
|
[
"cpe:/a:redhat:jboss_enterprise_application_platform:7.4"
] | null | 7.1 | null | null |
RHSA-2009:1501
|
Red Hat Security Advisory: xpdf security update
|
xpdf: multiple integer overflows xpdf/poppler: SplashBitmap integer overflow xpdf/poppler: Splash:: drawImage integer overflow and missing allocation return value check xpdf/poppler: PSOutputDev:: doImageL1Sep integer overflow xpdf/poppler: integer overflow in ObjectStream::ObjectStream (oCERT-2009-016) xpdf/poppler: ImageStream:: ImageStream integer overflow
|
[
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2023:7716
|
Red Hat Security Advisory: webkit2gtk3 security update
|
webkitgtk: Arbitrary Remote Code Execution
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 8.8 | null | null |
RHSA-2024:1877
|
Red Hat Security Advisory: kernel security and bug fix update
|
hw: cpu: AMD CPUs may transiently execute beyond unconditional direct branch kernel: veth: ensure skb entering GRO are not cloned. kernel: use-after-free and memory errors in ext4 when mounting and operating on a corrupted image kernel: NULL pointer dereference in x86_emulate_insn may lead to DoS kernel: use after free flaw in l2cap_conn_del in net/bluetooth/l2cap_core.c kernel: Information leak in l2cap_parse_conf_req in net/bluetooth/l2cap_core.c
|
[
"cpe:/a:redhat:rhel_eus:8.6::crb",
"cpe:/o:redhat:rhel_eus:8.6::baseos",
"cpe:/o:redhat:rhev_hypervisor:4.4::el8"
] | null | 6.5 | null | null |
RHSA-2024:7489
|
Red Hat Security Advisory: kernel security update
|
kernel: netfilter: bridge: confirm multicast packets before passing them up the stack kernel: netfilter: tproxy: bail out if IP has been disabled on the device kernel: net: bridge: mst: fix vlan use-after-free kernel: net: openvswitch: fix overwriting ct original tuple for ICMPv6
|
[
"cpe:/a:redhat:rhel_eus:9.2::appstream",
"cpe:/a:redhat:rhel_eus:9.2::crb",
"cpe:/o:redhat:rhel_eus:9.2::baseos"
] | null | 5.5 | null | null |
RHSA-2017:1254
|
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 6.4.15 update on RHEL 6
|
Resteasy: Yaml unmarshalling vulnerable to RCE
|
[
"cpe:/a:redhat:jboss_enterprise_application_platform:6::el6"
] | null | null | 8.1 | null |
RHSA-2023:2987
|
Red Hat Security Advisory: samba security, bug fix, and enhancement update
|
samba: GnuTLS gnutls_rnd() can fail and give predictable random values
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb",
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 5.1 | null | null |
RHSA-2015:0252
|
Red Hat Security Advisory: samba security update
|
samba: talloc free on uninitialized stack pointer in netlogon server could lead to remote-code execution
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | null | null |
RHSA-2014:1634
|
Red Hat Security Advisory: java-1.6.0-openjdk security and bug fix update
|
OpenJDK: Triple Handshake attack against TLS/SSL connections (JSSE, 8037066) OpenJDK: LogRecord use of incorrect CL when loading ResourceBundle (Libraries, 8042797) OpenJDK: incorrect optimization of range checks in C2 compiler (Hotspot, 8022783) OpenJDK: insufficient permission checks when setting resource bundle on system logger (Libraries, 8041564) ICU: Layout Engine ContextualSubstitution missing boundary checks (JDK 2D, 8041540) OpenJDK: DatagramSocket connected socket missing source check (Libraries, 8039509) OpenJDK: StAX parser parameter entity XXE (JAXP, 8039533) OpenJDK: missing BootstrapMethods bounds check (Hotspot, 8041717) OpenJDK: insufficient ResourceBundle name check (Libraries, 8044274) OpenJDK: CipherInputStream incorrect exception handling (Security, 8037846)
|
[
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::server",
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation",
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | null | null |
RHSA-2020:0689
|
Red Hat Security Advisory: OpenShift Container Platform 4.2.22 skopeo security update
|
proglottis/gpgme: Use-after-free in GPGME bindings during container image pull
|
[
"cpe:/a:redhat:openshift:4.2::el8"
] | null | 7.5 | null | null |
RHSA-2015:0062
|
Red Hat Security Advisory: kernel security, bug fix, and enhancement update
|
kernel: sctp: skb_over_panic when receiving malformed ASCONF chunks kernel: net: sctp: fix panic on duplicate ASCONF chunks kernel: net: sctp: remote memory pressure from excessive queueing kernel: lzo1x_decompress_safe() integer overflow kernel: vfs: refcount issues during unmount on symlink
|
[
"cpe:/o:redhat:rhel_eus:6.5::computenode",
"cpe:/o:redhat:rhel_eus:6.5::server"
] | null | null | null | null |
RHSA-2014:0747
|
Red Hat Security Advisory: python-jinja2 security update
|
python-jinja2: FileSystemBytecodeCache insecure cache temporary file use
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2022:2234
|
Red Hat Security Advisory: subversion:1.10 security update
|
subversion: Subversion's mod_dav_svn is vulnerable to memory corruption
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 7.5 | null | null |
RHSA-2023:5895
|
Red Hat Security Advisory: OpenShift Container Platform 4.12.40 security and extras update
|
golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487)
|
[
"cpe:/a:redhat:openshift:4.12::el8"
] | null | 7.5 | null | null |
RHSA-2007:1065
|
Red Hat Security Advisory: pcre security update
|
pcre integer overflow pcre regular expression flaws
|
[
"cpe:/o:redhat:enterprise_linux:2.1::as",
"cpe:/o:redhat:enterprise_linux:2.1::aw",
"cpe:/o:redhat:enterprise_linux:2.1::es",
"cpe:/o:redhat:enterprise_linux:2.1::ws"
] | null | null | null | null |
RHSA-2020:5363
|
Red Hat Security Advisory: OpenShift Container Platform 3.11.346 security and bug fix update
|
kubernetes: improper validation of URL redirection in the Kubernetes API server allows an attacker-controlled Kubelet to redirect API server requests from streaming endpoints kubernetes: compromised node could escalate to cluster level privileges
|
[
"cpe:/a:redhat:openshift:3.11::el7"
] | null | 6.4 | 2.6 | null |
RHSA-2016:0440
|
Red Hat Security Advisory: openstack-heat bug fix and security advisory
|
openstack-heat: Vulnerability in Heat template validation leading to DoS
|
[
"cpe:/a:redhat:openstack:5::el6"
] | null | null | null | null |
RHSA-2016:0996
|
Red Hat Security Advisory: openssl security update
|
OpenSSL: Fix memory issues in BIO_*printf functions openssl: EVP_EncodeUpdate overflow openssl: EVP_EncryptUpdate overflow openssl: Padding oracle in AES-NI CBC MAC check openssl: Memory corruption in the ASN.1 encoder openssl: ASN.1 BIO handling of large amounts of data openssl: doapr_outch function does not verify that certain memory allocation succeeds
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | 4 | null |
RHSA-2020:5568
|
Red Hat Security Advisory: Red Hat Fuse 7.8.0 release and security update
|
jackson-modules-java8: DoS due to an Improper Input Validation thrift: Endless loop when feed with specific input data thrift: Out-of-bounds read related to TJSONProtocol or TSimpleJSONProtocol mysql-connector-java: privilege escalation in MySQL connector spring-ws: XML External Entity Injection (XXE) when receiving XML data from untrusted sources spring-batch: XML External Entity Injection (XXE) when receiving XML data from untrusted sources codehaus: incomplete fix for unsafe deserialization in jackson-databind vulnerabilities hibernate-validator: safeHTML validator allows XSS AngularJS: Prototype pollution in merge function could result in code injection org.eclipse.paho.client.mqttv3: Improper hostname validation in the MQTT library cxf: does not restrict the number of message attachments cxf: OpenId Connect token service does not properly validate the clientId libquartz: XXE attacks via job description hibernate: SQL injection issue in Hibernate ORM batik: SSRF via "xlink:href" jetty: double release of resource can lead to information disclosure Undertow: Memory Leak in Undertow HttpOpenListener due to holding remoting connections indefinitely keycloak: Lack of checks in ObjectInputStream leading to Remote Code Execution Wildfly: EJBContext principal is not popped back after invoking another EJB using a different Security Domain tika: excessive memory usage in PSDParser apache-flink: JMX information disclosure vulnerability springframework: RFD attack via Content-Disposition Header sourced from request input by Spring MVC or Spring WebFlux Application spring-cloud-config-server: sending a request using a specially crafted URL can lead to a directory traversal attack cryptacular: excessive memory allocation during a decode operation nodejs-angular: XSS due to regex-based HTML replacement log4j: improper validation of certificate with host mismatch in SMTP appender tika-core: Denial of Service Vulnerabilities in Some of Apache Tika's Parsers dom4j: XML External Entity vulnerability in default SAX parser wildfly: unsafe deserialization in Wildfly Enterprise Java Beans netty: compression/decompression codecs don't enforce limits on buffer allocation sizes camel: DNS Rebinding in JMX Connector could result in remote command execution camel: RabbitMQ enables Java deserialization by default which could leed to remote code execution camel: Netty enables Java deserialization by default which could leed to remote code execution karaf: A remote client could create MBeans from arbitrary URLs shiro: spring dynamic controllers, a specially crafted request may cause an authentication bypass camel: server-side template injection and arbitrary file disclosure on templating components postgresql-jdbc: XML external entity (XXE) vulnerability in PgSQLXML shiro: specially crafted HTTP request may cause an authentication bypass RESTEasy: Caching routes in RootNode may result in DoS
|
[
"cpe:/a:redhat:jboss_fuse:7"
] | null | 7.5 | 7.4 | null |
RHSA-2015:0046
|
Red Hat Security Advisory: firefox security and bug fix update
|
Mozilla: Miscellaneous memory safety hazards (rv:31.4) (MFSA 2015-01) Mozilla: sendBeacon requests lack an Origin header (MFSA 2015-03) Mozilla: Cookie injection through Proxy Authenticate responses (MFSA 2015-04) Mozilla: Read-after-free in WebRTC (MFSA 2015-06)
|
[
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::server",
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation",
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | null | null |
RHSA-2015:0100
|
Red Hat Security Advisory: libyaml security update
|
libyaml: assert failure when processing wrapped strings
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation",
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | null | null |
RHSA-2024:3784
|
Red Hat Security Advisory: thunderbird security update
|
Mozilla: Arbitrary JavaScript execution in PDF.js Mozilla: IndexedDB files retained in private browsing mode Mozilla: Potential permissions request bypass via clickjacking Mozilla: Cross-origin responses could be distinguished between script and non-script content-types Mozilla: Use-after-free could occur when printing to PDF Mozilla: Memory safety bugs fixed in Firefox 126, Firefox ESR 115.11, and Thunderbird 115.11
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 6.1 | null | null |
RHSA-2019:3928
|
Red Hat Security Advisory: ansible security and bug fix update
|
Ansible: Splunk and Sumologic callback plugins leak sensitive data in logs
|
[
"cpe:/a:redhat:ansible_engine:2::el7",
"cpe:/a:redhat:ansible_engine:2::el8"
] | null | null | 5.7 | null |
RHSA-2024:2062
|
Red Hat Security Advisory: Service Telemetry Framework 1.5.4 security update
|
golang: net/http, x/net/http2: unlimited number of CONTINUATION frames causes DoS
|
[
"cpe:/a:redhat:service_telemetry_framework:1.5::el8"
] | null | 7.5 | null | null |
RHSA-2020:4931
|
Red Hat Security Advisory: Red Hat Single Sign-On 7.4.3 security update
|
cxf: JMX integration is vulnerable to a MITM attack keycloak: OIDC redirect_uri allows dangerous schemes resulting in potential XSS picketbox: JBoss EAP reload to admin-only mode allows authentication bypass wildfly: XML validation manipulation due to incomplete application of use-grammar-pool-only in xercesImpl xnio: file descriptor leak caused by growing amounts of NIO Selector file handles may lead to DoS keycloak: path traversal in resources keycloak: user can manage resources with just "view-profile" role using new Account Console
|
[
"cpe:/a:redhat:jboss_single_sign_on:7.4"
] | null | 8.1 | null | null |
RHSA-2022:5188
|
Red Hat Security Advisory: RHACS 3.69 security update
|
golang.org/x/crypto: empty plaintext packet causes panic stackrox: Improper sanitization allows users to retrieve Notifier secrets from GraphQL API in plaintext
|
[
"cpe:/a:redhat:advanced_cluster_security:3.69::el8"
] | null | 8.8 | null | null |
RHSA-2004:001
|
Red Hat Security Advisory: : Updated Ethereal packages fix security issues
|
security flaw security flaw
|
[
"cpe:/o:redhat:linux:9"
] | null | null | null | null |
RHSA-2023:5732
|
Red Hat Security Advisory: java-1.8.0-openjdk security update
|
OpenJDK: segmentation fault in ciMethodBlocks OpenJDK: IOR deserialization issue in CORBA (8303384) OpenJDK: certificate path validation issue during client authentication (8309966)
|
[
"cpe:/a:redhat:rhel_eus:9.0::appstream",
"cpe:/a:redhat:rhel_eus:9.0::crb"
] | null | 5.3 | null | null |
RHSA-2018:0089
|
Red Hat Security Advisory: Red Hat CloudForms 4.1 security update
|
An update is now available for Red Hat CloudForms 4.1.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
|
[
"cpe:/a:redhat:cloudforms_managementengine:5.6::el7"
] | null | null | null | null |
RHSA-2023:0856
|
Red Hat Security Advisory: kernel security update
|
kernel: memory corruption in AX88179_178A based USB ethernet device. kernel: use-after-free caused by l2cap_reassemble_sdu() in net/bluetooth/l2cap_core.c kernel: stack overflow in do_proc_dointvec and proc_skip_spaces
|
[
"cpe:/o:redhat:rhel_e4s:8.1::baseos"
] | null | 7.8 | null | null |
RHSA-2022:5904
|
Red Hat Security Advisory: php security update
|
php: password of excessive length triggers buffer overflow leading to RCE
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 8.8 | null | null |
RHSA-2017:0536
|
Red Hat Security Advisory: policycoreutils security update
|
policycoreutils: SELinux sandbox escape via TIOCSTI ioctl
|
[
"cpe:/o:redhat:rhel_eus:7.1::computenode",
"cpe:/o:redhat:rhel_eus:7.1::server"
] | null | null | 8.6 | null |
RHSA-2011:0429
|
Red Hat Security Advisory: kernel security and bug fix update
|
kernel: install_special_mapping skips security_file_mmap check kernel: av7110 negative array offset kernel: s390 task_show_regs infoleak kernel: fs/partitions: Validate map_count in Mac partition tables kernel: nfs4: Ensure that ACL pages sent over NFS were not allocated from the slab kernel: gro: reset dev and skb_iff on skb reuse
|
[
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2005:364
|
Red Hat Security Advisory: logwatch security update
|
security flaw
|
[
"cpe:/o:redhat:enterprise_linux:2.1::as",
"cpe:/o:redhat:enterprise_linux:2.1::aw",
"cpe:/o:redhat:enterprise_linux:2.1::es",
"cpe:/o:redhat:enterprise_linux:2.1::ws"
] | null | null | null | null |
RHSA-2024:3889
|
Red Hat Security Advisory: OpenShift Container Platform 4.15.18 security update
|
golang: net/http, x/net/http2: unlimited number of CONTINUATION frames causes DoS go-git: Maliciously crafted Git server replies can cause DoS on go-git clients cluster-image-registry-operator: Exposes a secret via env variable in pod definition on Azure
|
[
"cpe:/a:redhat:openshift:4.15::el8",
"cpe:/a:redhat:openshift:4.15::el9"
] | null | 6.8 | null | null |
RHBA-2017:0651
|
Red Hat Bug Fix Advisory: bind bug fix update
|
bind: Too long query name causes segmentation fault in lwresd
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | 5.9 | null |
RHSA-2025:3408
|
Red Hat Security Advisory: libreoffice security update
|
libreoffice: Macro URL arbitrary script execution
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::crb"
] | null | 7.6 | null | null |
RHSA-2023:7744
|
Red Hat Security Advisory: tracker-miners security update
|
tracker-miners: sandbox escape
|
[
"cpe:/a:redhat:rhel_eus:9.2::appstream"
] | null | 7.5 | null | null |
RHSA-2007:0746
|
Red Hat Security Advisory: httpd security, bug fix, and enhancement update
|
httpd: out of bounds read
|
[
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHBA-2022:5433
|
Red Hat Bug Fix Advisory: OpenShift Container Platform 4.9.41 packages update
|
cri-o: Default inheritable capabilities for linux container should be empty
|
[
"cpe:/a:redhat:openshift:4.9::el7",
"cpe:/a:redhat:openshift:4.9::el8"
] | null | 4.8 | null | null |
RHSA-2021:2692
|
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.3.8 on RHEL 6 security update
|
wildfly: XSS via admin console when creating roles in domain mode netty: Request smuggling via content-length header
|
[
"cpe:/a:redhat:jboss_enterprise_application_platform:7.3::el6"
] | null | 5.9 | null | null |
RHSA-2022:0404
|
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.4.3 security update
|
undertow: client side invocation timeout raised when calling over HTTP2 7: Incomplete fix of CVE-2016-4978 in HornetQ library
|
[
"cpe:/a:redhat:jboss_enterprise_application_platform:7.4"
] | null | 6.6 | null | null |
RHSA-2019:2035
|
Red Hat Security Advisory: python-requests security update
|
python-requests: Redirect from HTTPS to HTTP does not remove Authorization header
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 2.6 | null |
RHSA-2024:0597
|
Red Hat Security Advisory: tigervnc security update
|
xorg-x11-server: Heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer xorg-x11-server: reattaching to different master device may lead to out-of-bounds memory access xorg-x11-server: heap buffer overflow in XISendDeviceHierarchyEvent xorg-x11-server: heap buffer overflow in DisableDevice
|
[
"cpe:/a:redhat:rhel_eus:8.8::appstream"
] | null | 7.8 | null | null |
RHSA-2017:0552
|
Red Hat Security Advisory: rhevm-appliance security and bug fix update
|
spice: Buffer overflow in main_channel_alloc_msg_rcv_buf when reading large messages spice: Remote DoS via crafted message
|
[
"cpe:/o:redhat:enterprise_linux:7::hypervisor"
] | null | null | 7.5 | null |
RHSA-2002:118
|
Red Hat Security Advisory: apache security update for Stronghold
|
security flaw
|
[
"cpe:/a:redhat:stronghold:3",
"cpe:/a:redhat:stronghold:4"
] | null | null | null | null |
RHSA-2016:1434
|
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform update
|
tomcat: URL Normalization issue JGroups: Authorization bypass
|
[
"cpe:/a:redhat:jboss_enterprise_application_platform:6::el7"
] | null | null | 9.8 | null |
RHSA-2015:1190
|
Red Hat Security Advisory: kernel security and bug fix update
|
kernel: pipe: iovec overrun leading to memory corruption
|
[
"cpe:/o:redhat:rhel_mission_critical:5.6"
] | null | null | null | null |
RHSA-2025:1300
|
Red Hat Security Advisory: gcc-toolset-14-gcc security update
|
jquery: Untrusted code execution via <option> tag in HTML passed to DOM manipulation methods
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 6.1 | null | null |
RHSA-2013:0992
|
Red Hat Security Advisory: python-keystoneclient security, bug fix, and enhancement update
|
python-keystoneclient: middleware memcache encryption and signing bypass python-keystoneclient: middleware memcache encryption and signing bypass
|
[
"cpe:/a:redhat:openstack:3::el6"
] | null | null | null | null |
RHSA-2024:2667
|
Red Hat Security Advisory: Red Hat build of MicroShift 4.15.12 security update
|
golang: net/http, x/net/http2: unlimited number of CONTINUATION frames causes DoS
|
[
"cpe:/a:redhat:openshift:4.15::el9"
] | null | 7.5 | null | null |
RHSA-2016:1814
|
Red Hat Security Advisory: kernel security and bug fix update
|
kernel: infiniband: Unprivileged process can overwrite kernel memory using rdma_ucm.ko kernel: challenge ACK counter information disclosure.
|
[
"cpe:/o:redhat:rhel_aus:6.5::server"
] | null | null | 4.8 | null |
RHSA-2021:4586
|
Red Hat Security Advisory: gcc-toolset-11-gcc security update
|
environment: Unicode's bidirectional (BiDi) override characters can cause trojan source attacks
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 8.5 | null | null |
RHSA-2018:0351
|
Red Hat Security Advisory: java-1.8.0-ibm security update
|
JDK: J9 JVM allows untrusted code running under a security manager to elevate its privileges OpenJDK: unsynchronized access to encryption key data (Libraries, 8172525) OpenJDK: insufficient validation of the invokeinterface instruction (Hotspot, 8174962) OpenJDK: LdapLoginModule insufficient username encoding in LDAP query (LDAP, 8178449) OpenJDK: DnsClient missing source port randomization (JNDI, 8182125) OpenJDK: loading of classes from untrusted locations (I18n, 8182601) OpenJDK: DerValue unbounded memory allocation (Libraries, 8182387) OpenJDK: insufficient strength of key agreement (JCE, 8185292) OpenJDK: LDAPCertStore insecure handling of LDAP referrals (JNDI, 8186606) OpenJDK: use of global credentials for HTTP/SPNEGO (JGSS, 8186600) OpenJDK: SingleEntryRegistry incorrect setup of deserialization filter (JMX, 8186998) JDK: unspecified vulnerability fixed in 8u161 and 9.0.4 (Deployment) JDK: unspecified vulnerability fixed in 8u161 and 9.0.4 (Deployment) OpenJDK: GTK library loading use-after-free (AWT, 8185325) OpenJDK: ArrayBlockingQueue deserialization to an inconsistent state (Libraries, 8189284) OpenJDK: unbounded memory allocation during deserialization (AWT, 8190289) OpenJDK: unbounded memory allocation in BasicAttributes deserialization (JNDI, 8191142)
|
[
"cpe:/a:redhat:rhel_extras:7"
] | null | null | 4.3 | null |
RHSA-2024:7136
|
Red Hat Security Advisory: git-lfs security update
|
encoding/gob: golang: Calling Decoder.Decode on a message which contains deeply nested structures can cause a panic due to stack exhaustion
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 7.5 | null | null |
RHSA-2007:0389
|
Red Hat Security Advisory: quagga security update
|
Quagga bgpd DoS
|
[
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws",
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2022:0133
|
Red Hat Security Advisory: Red Hat Virtualization Host security and bug fix update [ovirt-4.4.9] Async #2
|
samba: Active Directory (AD) domain user could become root on domain members
|
[
"cpe:/o:redhat:rhev_hypervisor:4.4::el8"
] | null | 8.1 | null | null |
RHSA-2024:8131
|
Red Hat Security Advisory: firefox security update
|
firefox: Use-after-free in Animation timeline (128.3.1 ESR Chemspill)
|
[
"cpe:/a:redhat:rhel_aus:8.6::appstream",
"cpe:/a:redhat:rhel_e4s:8.6::appstream",
"cpe:/a:redhat:rhel_tus:8.6::appstream"
] | null | 9.8 | null | null |
RHSA-2013:0188
|
Red Hat Security Advisory: ipa security update
|
ipa: weakness when initiating join from IPA client can potentially compromise IPA domain
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2021:3399
|
Red Hat Security Advisory: kernel security and bug fix update
|
kernel: Use after free via PI futex state kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c kernel: race condition for removal of the HCI controller
|
[
"cpe:/o:redhat:rhel_aus:7.2::server"
] | null | 7 | null | null |
RHBA-2020:3179
|
Red Hat Bug Fix Advisory: OpenShift Container Platform 4.3.31 packages update
|
golang.org/x/crypto: Processing of crafted ssh-ed25519 public keys allows for panic
|
[
"cpe:/a:redhat:openshift:4.3::el7",
"cpe:/a:redhat:openshift:4.3::el8"
] | null | 5.3 | null | null |
RHSA-2021:3481
|
Red Hat Security Advisory: Red Hat OpenStack Platform 16.1 (openstack-neutron) security update
|
openstack-neutron: arbitrary dnsmasq reconfiguration via extra_dhcp_opts
|
[
"cpe:/a:redhat:openstack:16.1::el8"
] | null | 7.6 | null | null |
RHSA-2021:0885
|
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.3.6 security update
|
guava: local information disclosure via temporary directory created with unsafe permissions Undertow: Incomplete fix for CVE-2017-2666 due to permitting invalid characters in HTTP requests bouncycastle: password bypass in OpenBSDBCrypt.checkPassword utility possible jboss-remoting: Threads hold up forever in the EJB server by suppressing the ack from an EJB client undertow: Possible regression in fix for CVE-2020-10687 wildfly: Information disclosure due to publicly accessible privileged actions in JBoss EJB Client
|
[
"cpe:/a:redhat:jboss_enterprise_application_platform:7.3"
] | null | 4.3 | 4.8 | null |
RHSA-2019:3297
|
Red Hat Security Advisory: Red Hat Process Automation Manager 7.5.0 Security Update
|
jackson-databind: failure to block the logback-core class from polymorphic deserialization leading to remote code execution jackson-databind: polymorphic typing issue allows attacker to read arbitrary local files on the server via crafted JSON message. jackson-databind: default typing mishandling leading to remote code execution
|
[
"cpe:/a:redhat:jboss_enterprise_bpms_platform:7.5"
] | null | null | 9.8 | null |
RHSA-2024:3414
|
Red Hat Security Advisory: kernel-rt security and bug fix update
|
kernel: Use-after-free in nft_verdict_dump due to a race between set GC and transaction kernel: Marvin vulnerability side-channel leakage in the RSA decryption operation kernel: inactive elements in nft_pipapo_walk kernel: netfilter: nftables: exthdr: fix 4-byte stack OOB write kernel: nf_tables: use-after-free vulnerability in the nft_verdict_init() function kernel: mlxsw: spectrum_acl_tcam: Fix stack corruption
|
[
"cpe:/a:redhat:rhel_eus:9.0::nfv",
"cpe:/a:redhat:rhel_eus:9.0::realtime"
] | null | 6.7 | null | null |
RHSA-2024:7237
|
Red Hat Security Advisory: Logging for Red Hat OpenShift - 5.8.13
|
go-retryablehttp: url might write sensitive information to log file
|
[
"cpe:/a:redhat:logging:5.8::el9"
] | null | 6 | null | null |
RHSA-2017:0838
|
Red Hat Security Advisory: openjpeg security update
|
openjpeg: Heap overflow in parsing of JPEG2000 precincts openjpeg: heap overflow due to unsafe use of opj_aligned_malloc openjpeg: heap overflow in parsing of JPEG2000 code blocks openjpeg: Integer overflow in opj_pi_create_decode openjpeg: heap out-of-bounds read due to insufficient check in imagetopnm() openjpeg: incorrect fix for CVE-2013-6045
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 7.5 | null |
RHSA-2024:1752
|
Red Hat Security Advisory: GitOps 1.12.1- Argo CD CLI and MicroShift GitOps security update
|
CD: Users with `create` but not `override` privileges can perform local sync argo-cd: Bypassing Brute Force Protection via Application Crash and In-Memory Data Loss argo-cd: Denial of Service Due to Unsafe Array Modification in Multi-threaded Environment argo-cd: Bypassing Rate Limit and Brute Force Protection Using Cache Overflow argo-cd: uncontrolled memory allocation vulnerability
|
[
"cpe:/a:redhat:openshift_gitops:1.12::el8",
"cpe:/a:redhat:openshift_gitops:1.12::el9"
] | null | 6.5 | null | null |
RHSA-2012:0103
|
Red Hat Security Advisory: squirrelmail security update
|
SquirrelMail: Mail Fetch plugin -- port-scans via non-standard POP3 server ports SquirrelMail: DoS (disk space consumption) by random IMAP login attempts with 8-bit characters in the password SquirrelMail: Prone to clickjacking attacks SquirrelMail: Multiple XSS flaws SquirrelMail: XSS in <style> tag handling SquirrelMail: CRLF injection vulnerability SquirrelMail: CSRF in the empty trash feature and in Index Order page
|
[
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2021:1384
|
Red Hat Security Advisory: nss security and bug fix update
|
nss: TLS 1.3 CCS flood remote DoS Attack
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 7.5 | null | null |
RHSA-2023:5835
|
Red Hat Security Advisory: rhc-worker-script enhancement and security update
|
golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487) HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack)
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 7.5 | null | null |
RHSA-2013:1062
|
Red Hat Security Advisory: php53 security update
|
php: xml_parse_into_struct buffer overflow when parsing deeply nested XML
|
[
"cpe:/o:redhat:rhel_eus:5.6"
] | null | null | null | null |
RHSA-2018:0032
|
Red Hat Security Advisory: libvirt security update
|
An update for libvirt is now available for Red Hat Enterprise Linux 7.2 Advanced Update Support, Red Hat Enterprise Linux 7.2 Telco Extended Update Support, and Red Hat Enterprise Linux 7.2 Update Services for SAP Solutions.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
|
[
"cpe:/o:redhat:rhel_aus:7.2::server",
"cpe:/o:redhat:rhel_e4s:7.2::server",
"cpe:/o:redhat:rhel_tus:7.2::server"
] | null | null | null | null |
RHSA-2022:1158
|
Red Hat Security Advisory: OpenShift Container Platform 4.9.27 bug fix and security update
|
ovn-kubernetes: Ingress network policy can be overruled by egress network policy on another pod
|
[
"cpe:/a:redhat:openshift:4.9::el8"
] | null | 8.2 | null | null |
RHSA-2023:1252
|
Red Hat Security Advisory: nss security update
|
nss: Arbitrary memory write via PKCS 12
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 8.8 | null | null |
RHSA-2017:1792
|
Red Hat Security Advisory: java-1.6.0-sun security update
|
OpenJDK: reading of unprocessed image data in JPEGImageReader (2D, 8169209) OpenJDK: JAR verifier incorrect handling of missing digest (Security, 8169392) OpenJDK: integer overflows in range check loop predicates (Hotspot, 8173770) OpenJDK: incorrect bracket processing in function signature handling (Hotspot, 8170966) OpenJDK: insufficient access control checks in ThreadPoolExecutor (Libraries, 8172204) OpenJDK: insufficient access control checks in ServiceRegistry (ImageIO, 8172461) OpenJDK: insufficient access control checks in XML transformations (JAXP, 8172469) OpenJDK: unrestricted access to com.sun.org.apache.xml.internal.resolver (JAXP, 8173286) OpenJDK: incorrect handling of references in DGC (RMI, 8163958) JDK: unspecified vulnerability fixed in 6u161, 7u151, and 8u141 (Deployment) OpenJDK: insufficient access control checks in ActivationID (RMI, 8173697) OpenJDK: unbounded memory allocation in BasicAttribute deserialization (Serialization, 8174105) OpenJDK: unbounded memory allocation in CodeSource deserialization (Serialization, 8174113) OpenJDK: insufficient access control checks in ImageWatched (AWT, 8174098) OpenJDK: DSA implementation timing attack (JCE, 8175106) OpenJDK: LDAPCertStore following referrals to non-LDAP URLs (Security, 8176067) OpenJDK: PKCS#8 implementation timing attack (JCE, 8176760) OpenJDK: incorrect key size constraint check (Security, 8179101) OpenJDK: incorrect enforcement of certificate path restrictions (Security, 8179998) OpenJDK: insecure XML parsing in wsdlimport (JAX-WS, 8182054)
|
[
"cpe:/a:redhat:rhel_extras_oracle_java:6",
"cpe:/a:redhat:rhel_extras_oracle_java:7"
] | null | null | 6.5 | null |
RHSA-2019:1945
|
Red Hat Security Advisory: keepalived security update
|
keepalived: Heap-based buffer overflow when parsing HTTP status codes allows for denial of service or possibly arbitrary code execution
|
[
"cpe:/o:redhat:rhel_eus:7.4::server"
] | null | null | 8.1 | null |
RHSA-2012:0086
|
Red Hat Security Advisory: openssl security update
|
openssl: uninitialized SSL 3.0 padding openssl: SGC restart DoS attack
|
[
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.