id
stringlengths 13
15
| title
stringlengths 29
176
| description
stringlengths 8
32.1k
| cpes
listlengths 0
20
| cvss_v4_0
null | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
null |
---|---|---|---|---|---|---|---|
RHSA-2017:2810
|
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform security update
|
jasypt: Vulnerable to timing attack against the password hash comparison bouncycastle: Information disclosure in GCMBlockCipher keycloak: SAML request parser replaces special strings with system properties log4j: Socket receiver deserialization vulnerability hibernate-validator: Privilege escalation when running under the security manager log4j: deserialization of untrusted data in SocketServer
|
[
"cpe:/a:redhat:jboss_enterprise_application_platform:7"
] | null | 9.8 | 6.3 | null |
RHSA-2021:3142
|
Red Hat Security Advisory: .NET Core 3.1 security and bugfix update
|
dotnet: ASP.NET Core WebSocket frame processing DoS dotnet: Dump file created world-readable dotnet: ASP.NET Core JWT token logging
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 5.5 | null | null |
RHSA-2019:0791
|
Red Hat Security Advisory: java-1.7.0-openjdk security update
|
OpenJDK: Slow conversion of BigDecimal to long (Libraries, 8211936) OpenJDK: Incorrect skeleton selection in RMI registry server-side dispatch handling (RMI, 8218453) OpenJDK: Font layout engine out of bounds access setCurrGlyphID() (2D, 8219022)
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 7.5 | null |
RHSA-2014:1904
|
Red Hat Security Advisory: Red Hat JBoss Operations Network 3.3.0 update
|
CXF: SSL hostname verification bypass, incomplete CVE-2012-5783 fix HawtJNI: predictable temporary file name leading to local arbitrary code execution JBossSX/PicketBox: World readable audit.log file Tomcat/JBossWeb: request smuggling and limited DoS in ChunkedInputFilter JAX-RS: Information disclosure via XML eXternal Entity (XXE) RESTEasy: XXE via parameter entities CXF: SSL hostname verification bypass, incomplete CVE-2012-6153 fix
|
[
"cpe:/a:redhat:jboss_operations_network:3.3"
] | null | null | 4.8 | null |
RHSA-2014:1975
|
Red Hat Security Advisory: rpm security update
|
rpm: race condition during the installation process
|
[
"cpe:/o:redhat:rhel_eus:5.9",
"cpe:/o:redhat:rhel_eus:6.4::computenode",
"cpe:/o:redhat:rhel_eus:6.4::server",
"cpe:/o:redhat:rhel_eus:6.5::computenode",
"cpe:/o:redhat:rhel_eus:6.5::server",
"cpe:/o:redhat:rhel_mission_critical:5.6",
"cpe:/o:redhat:rhel_mission_critical:6.2::server"
] | null | null | null | null |
RHSA-2005:472
|
Red Hat Security Advisory: kernel security update
|
security flaw security flaw security flaw
|
[
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws"
] | null | null | null | null |
RHSA-2013:1474
|
Red Hat Security Advisory: qspice security update
|
spice: stack buffer overflow in reds_handle_ticket() function
|
[
"cpe:/a:redhat:rhel_virtualization:5::client",
"cpe:/a:redhat:rhel_virtualization:5::server",
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2021:0056
|
Red Hat Security Advisory: openssl security update
|
openssl: EDIPARTYNAME NULL pointer de-reference
|
[
"cpe:/o:redhat:rhel_els:6"
] | null | 5.9 | null | null |
RHSA-2022:5700
|
Red Hat Security Advisory: java-1.8.0-openjdk security update
|
OpenJDK: class compilation issue (Hotspot, 8281859) OpenJDK: improper restriction of MethodHandle.invokeBasic() (Hotspot, 8281866) OpenJDK: integer truncation issue in Xalan-J (JAXP, 8285407)
|
[
"cpe:/a:redhat:rhel_eus:8.2::appstream"
] | null | 7.5 | null | null |
RHSA-2013:0596
|
Red Hat Security Advisory: openstack-keystone security, bug fix, and enhancement update
|
Keystone: EC2-style authentication accepts disabled user/tenants bindings: Internal entity expansion in Python XML libraries inflicts DoS vulnerabilities bindings: External entity expansion in Python XML libraries inflicts potential security flaws and DoS vulnerabilities
|
[
"cpe:/a:redhat:openstack:2::el6"
] | null | null | null | null |
RHSA-2016:0152
|
Red Hat Security Advisory: sos security and bug fix update
|
sos: Usage of predictable temporary files allows privilege escalation
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2012:1485
|
Red Hat Security Advisory: java-1.4.2-ibm security update
|
JDK: unspecified vulnerability (2D) OpenJDK: java.io.FilePermission information leak (Libraries, 6631398) JDK: java.lang.reflect.Method invoke() code execution JDK: java.lang.class code execution OpenJDK: LogManager security bypass (Libraries, 7169884) OpenJDK: ServiceLoader reject not subtype classes without instantiating (Libraries, 7195919) OpenJDK: JSSE denial of service (JSSE, 7186286) JDK: unspecified vulnerability (2D) OpenJDK: DefaultFormatter insufficient data validation (Swing, 7195194) OpenJDK: IIOP type reuse sandbox bypass (CORBA, 8000540, SE-2012-01 Issue 50)
|
[
"cpe:/a:redhat:rhel_extras:5::client",
"cpe:/a:redhat:rhel_extras:5::server"
] | null | null | null | null |
RHSA-2003:137
|
Red Hat Security Advisory: : New samba packages fix security vulnerability
|
security flaw security flaw
|
[
"cpe:/o:redhat:linux:7.1",
"cpe:/o:redhat:linux:7.2",
"cpe:/o:redhat:linux:7.3",
"cpe:/o:redhat:linux:8.0",
"cpe:/o:redhat:linux:9"
] | null | null | null | null |
RHSA-2011:0290
|
Red Hat Security Advisory: java-1.6.0-ibm security update
|
JDK Double.parseDouble Denial-Of-Service
|
[
"cpe:/a:redhat:rhel_extras:4",
"cpe:/a:redhat:rhel_extras:5::client",
"cpe:/a:redhat:rhel_extras:5::server",
"cpe:/a:redhat:rhel_extras:6"
] | null | null | null | null |
RHSA-2023:7521
|
Red Hat Security Advisory: OpenShift Virtualization 4.13.6 RPMs security and bug fix update
|
golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487) HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack)
|
[
"cpe:/a:redhat:container_native_virtualization:4.13::el7",
"cpe:/a:redhat:container_native_virtualization:4.13::el8",
"cpe:/a:redhat:container_native_virtualization:4.13::el9"
] | null | 7.5 | null | null |
RHSA-2024:0614
|
Red Hat Security Advisory: tigervnc security update
|
xorg-x11-server: Heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer xorg-x11-server: reattaching to different master device may lead to out-of-bounds memory access xorg-x11-server: heap buffer overflow in XISendDeviceHierarchyEvent xorg-x11-server: heap buffer overflow in DisableDevice
|
[
"cpe:/a:redhat:rhel_eus:9.0::appstream"
] | null | 7.8 | null | null |
RHSA-2024:7486
|
Red Hat Security Advisory: kernel security update
|
kernel: af_unix: Fix garbage collector racing against connect() kernel: netfilter: tproxy: bail out if IP has been disabled on the device
|
[
"cpe:/o:redhat:rhel_aus:8.6::baseos",
"cpe:/o:redhat:rhel_e4s:8.6::baseos",
"cpe:/o:redhat:rhel_tus:8.6::baseos"
] | null | 5.5 | null | null |
RHSA-2009:1155
|
Red Hat Security Advisory: httpd security update
|
httpd: AllowOverride Options=IncludesNoExec allows Options Includes httpd: mod_proxy reverse proxy DoS (infinite loop) httpd: possible temporary DoS (CPU consumption) in mod_deflate
|
[
"cpe:/a:redhat:jboss_enterprise_web_server:1::el5"
] | null | null | null | null |
RHSA-2024:2906
|
Red Hat Security Advisory: firefox security update
|
Mozilla: Arbitrary JavaScript execution in PDF.js Mozilla: IndexedDB files retained in private browsing mode Mozilla: Potential permissions request bypass via clickjacking Mozilla: Cross-origin responses could be distinguished between script and non-script content-types Mozilla: Use-after-free could occur when printing to PDF Mozilla: Memory safety bugs fixed in Firefox 126, Firefox ESR 115.11, and Thunderbird 115.11
|
[
"cpe:/a:redhat:rhel_eus:9.2::appstream"
] | null | 6.1 | null | null |
RHSA-2014:2025
|
Red Hat Security Advisory: ntp security update
|
ntp: automatic generation of weak default key in config_auth() ntp: ntp-keygen uses weak random number generator and seed when generating MD5 keys ntp: Multiple buffer overflows via specially-crafted packets
|
[
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2024:0137
|
Red Hat Security Advisory: idm:DL1 security update
|
Kerberos: delegation constrain bypass in S4U2Proxy ipa: Invalid CSRF protection
|
[
"cpe:/a:redhat:rhel_eus:8.8::appstream"
] | null | 6.5 | null | null |
RHSA-2016:2705
|
Red Hat Security Advisory: qemu-kvm-rhev security, bug fix, and enhancement update
|
Qemu: OOB access in address_space_rw leads to segmentation fault Qemu: OOB access in address_space_rw leads to segmentation fault Qemu: net: out of bounds read in net_checksum_calculate()
|
[
"cpe:/a:redhat:openstack:6::el7"
] | null | null | 4.7 | null |
RHSA-2023:1154
|
Red Hat Security Advisory: OpenShift Container Platform 4.10.54 security update
|
goutils: RandomAlphaNumeric and CryptoRandomAlphaNumeric are not as random as they should be golang: net/http: excessive memory growth in a Go server accepting HTTP/2 requests
|
[
"cpe:/a:redhat:openshift:4.10::el8"
] | null | 5.3 | null | null |
RHSA-2007:1041
|
Red Hat Security Advisory: java-1.5.0-ibm security update
|
Security Vulnerability in Java Runtime Environment With Applet Caching Vulnerabilities in Java Web Start allow to determine the location of the Java Web Start cache Untrusted Application or Applet May Move or Copy Arbitrary Files Applets or Applications are allowed to display an oversized window Anti-DNS Pinning and Java Applets with HTTP proxy Anti-DNS Pinning and Java Applets with Opera and Firefox
|
[
"cpe:/a:redhat:rhel_extras:4",
"cpe:/a:redhat:rhel_extras:5::client",
"cpe:/a:redhat:rhel_extras:5::server"
] | null | null | null | null |
RHSA-2022:0682
|
Red Hat Security Advisory: Red Hat OpenShift GitOps security update
|
gitops: Path traversal and dereference of symlinks when passing Helm value files
|
[
"cpe:/a:redhat:openshift_gitops:1.3::el8"
] | null | 7.7 | null | null |
RHSA-2014:0896
|
Red Hat Security Advisory: Red Hat JBoss Web Framework Kit 2.6.0 update
|
bouncycastle: TLS CBC padding timing attack JSF: XSS due to insufficient escaping of user-supplied content in outputText tags and EL expressions
|
[
"cpe:/a:redhat:jboss_enterprise_web_framework:2.6.0"
] | null | null | null | null |
RHSA-2024:8800
|
Red Hat Security Advisory: openexr security update
|
OpenEXR: Heap Overflow in Scanline Deep Data Parsing
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::crb"
] | null | 9.1 | null | null |
RHSA-2024:8704
|
Red Hat Security Advisory: Kube Descheduler Operator for Red Hat OpenShift 5.0.2 for RHEL 9
|
golang-protobuf: encoding/protojson, internal/encoding/json: infinite loop in protojson.Unmarshal when unmarshaling certain forms of invalid JSON go/parser: golang: Calling any of the Parse functions containing deeply nested literals can cause a panic/stack exhaustion go/build/constraint: golang: Calling Parse on a "// +build" build tag line with deeply nested expressions can cause a panic due to stack exhaustion
|
[
"cpe:/a:redhat:kube_descheduler_operator:5.0::el9"
] | null | 5.9 | null | null |
RHSA-2023:0202
|
Red Hat Security Advisory: java-11-openjdk security and bug fix update
|
OpenJDK: handshake DoS attack against DTLS connections (JSSE, 8287411) OpenJDK: soundbank URL remote loading (Sound, 8293742)
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::crb"
] | null | 3.7 | null | null |
RHSA-2024:3431
|
Red Hat Security Advisory: pcs security update
|
rubygem-rack: Denial of Service Vulnerability in Rack Content-Type Parsing rubygem-rack: Possible DoS Vulnerability with Range Header in Rack rubygem-rack: Possible Denial of Service Vulnerability in Rack Header Parsing
|
[
"cpe:/a:redhat:rhel_eus:8.6::highavailability",
"cpe:/a:redhat:rhel_eus:8.6::resilientstorage"
] | null | 5.3 | null | null |
RHSA-2023:3415
|
Red Hat Security Advisory: ACS 4.0 enhancement and security update
|
golang: html/template: improper sanitization of CSS values golang: html/template: improper handling of JavaScript whitespace golang: html/template: improper handling of empty HTML attributes
|
[
"cpe:/a:redhat:advanced_cluster_security:4.0::el8"
] | null | 7.3 | null | null |
RHSA-2013:0758
|
Red Hat Security Advisory: java-1.6.0-sun security update
|
OpenJDK: sun.awt.datatransfer.ClassLoaderObjectInputStream class may incorrectly invoke the system class loader (CanSecWest 2013, AWT, 8009305) JDK: unspecified sanbox bypass (CanSecWest 2013, 2D) OpenJDK: JAXP missing security restrictions (JAXP, 6657673) OpenJDK: remote code loading enabled by default (RMI, 8001040) JDK: unspecified vulnerability fixed in 7u21 and 6u45 (Deployment) OpenJDK: LogStream.setDefaultStream() missing security restrictions (RMI, 8001329) OpenJDK: java.beans.ThreadGroupContext missing restrictions (Beans, 7200507) JDK: unspecified vulnerability fixed in 7u21 and 6u45 (Install) ICU: Layout Engine font layout and glyph table errors (JDK 2D, 8004994) ICU: Layout Engine font layout and glyph table errors (JDK 2D, 8004986) ICU: Layout Engine font layout and glyph table errors (JDK 2D, 8004987) JDK: unspecified vulnerability fixed in 7u21 and 6u45 (2D) OpenJDK: Network InetAddress serialization information disclosure (Networking, 8000724) JDK: unspecified vulnerability fixed in 7u21 and 6u45 (Deployment) ICU: Layout Engine font processing errors (JDK 2D, 8001031) OpenJDK: image processing vulnerability (2D, 8007617) OpenJDK: MethodUtil trampoline class incorrect restrictions (Libraries, 8009857) OpenJDK: MBeanInstantiator insufficient class access checks (JMX, 8006435) OpenJDK: JPEGImageWriter state corruption (ImageIO, 8007918) OpenJDK: JPEGImageReader state corruption (ImageIO, 8007667) JDK: unspecified vulnerability fixed in 7u21 and 6u45 (2D) JDK: unspecified vulnerability fixed in 7u21 and 6u45 (Deployment) JDK: unspecified vulnerability fixed in 7u21 and 6u45 (Deployment) JDK: unspecified vulnerability fixed in 7u21 and 6u45 (Install) JDK: unspecified vulnerability fixed in 7u21 and 6u45 (Deployment)
|
[
"cpe:/a:redhat:rhel_extras:5::server",
"cpe:/a:redhat:rhel_extras:6"
] | null | null | null | null |
RHSA-2022:6133
|
Red Hat Security Advisory: OpenShift Container Platform 4.10.30 bug fix and security update
|
go-getter: command injection vulnerability go-getter: unsafe download (issue 1 of 3) go-getter: unsafe download (issue 2 of 3) go-getter: unsafe download (issue 3 of 3)
|
[
"cpe:/a:redhat:openshift:4.10::el8"
] | null | 8.6 | null | null |
RHSA-2021:1627
|
Red Hat Security Advisory: trousers security, bug fix, and enhancement update
|
trousers: fails to drop the root gid privilege when no longer needed trousers: tss user still has read and write access to the /etc/tcsd.conf file if tcsd is started as root trousers: tss user can be used to create or corrupt existing files, this could lead to DoS
|
[
"cpe:/a:redhat:enterprise_linux:8::crb",
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 5.5 | null | null |
RHSA-2024:5394
|
Red Hat Security Advisory: thunderbird security update
|
mozilla: Fullscreen notification dialog can be obscured by document content mozilla: Out of bounds memory access in graphics shared memory handling mozilla: Type confusion in WebAssembly mozilla: Incomplete WebAssembly exception handing mozilla: Out of bounds read in editor component mozilla: Missing permission check when creating a StreamFilter mozilla: Uninitialized memory used by WebGL mozilla: Use-after-free in JavaScript garbage collection mozilla: Use-after-free in IndexedDB mozilla: Document content could partially obscure security prompts
|
[
"cpe:/a:redhat:rhel_eus:8.8::appstream"
] | null | 6.1 | null | null |
RHSA-2025:1920
|
Red Hat Security Advisory: pki-servlet-engine security update
|
tomcat: RCE due to TOCTOU issue in JSP compilation
|
[
"cpe:/a:redhat:rhel_eus:9.2::appstream"
] | null | 8.1 | null | null |
RHSA-2024:0071
|
Red Hat Security Advisory: squid security update
|
squid: Denial of Service in SSL Certificate validation squid: NULL pointer dereference in the gopher protocol code squid: Buffer over-read in the HTTP Message processing feature squid: Incorrect Check of Function Return Value In Helper Process management
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 7.5 | null | null |
RHSA-2006:0498
|
Red Hat Security Advisory: xscreensaver security update
|
security flaw security flaw
|
[
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws"
] | null | null | null | null |
RHSA-2018:1843
|
Red Hat Security Advisory: Red Hat JBoss Core Services Apache HTTP Server 2.4.23 security update
|
isapi_redirect: Mishandled HTTP request paths in jk_isapi_plugin.c can lead to unintended exposure of application resources via the reverse proxy
|
[
"cpe:/a:redhat:jboss_core_services:1"
] | null | null | 7.5 | null |
RHSA-2007:0162
|
Red Hat Security Advisory: php security update
|
gd: buffer overrun security flaw security flaw security flaw security flaw
|
[
"cpe:/a:redhat:rhel_application_stack:1"
] | null | null | null | null |
RHSA-2023:3264
|
Red Hat Security Advisory: sudo security update
|
sudo: arbitrary file write with privileges of the RunAs user
|
[
"cpe:/o:redhat:rhel_aus:7.4::server"
] | null | 7.8 | null | null |
RHSA-2022:8548
|
Red Hat Security Advisory: firefox security update
|
expat: use-after free caused by overeager destruction of a shared DTD in XML_ExternalEntityParserCreate Mozilla: Service Workers might have learned size of cross-origin media files Mozilla: Fullscreen notification bypass Mozilla: Use-after-free in InputStream implementation Mozilla: Use-after-free of a JavaScript Realm Mozilla: Fullscreen notification bypass via windowName Mozilla: Use-after-free in Garbage Collection Mozilla: ServiceWorker-intercepted requests bypassed SameSite cookie policy Mozilla: Cross-Site Tracing was possible via non-standard override headers Mozilla: Symlinks may resolve to partially uninitialized buffers Mozilla: Keystroke Side-Channel Leakage Mozilla: Custom mouse cursor could have been drawn over browser UI Mozilla: Iframe contents could be rendered outside the iframe Mozilla: Memory safety bugs fixed in Firefox 107 and Firefox ESR 102.5
|
[
"cpe:/a:redhat:rhel_eus:8.6::appstream"
] | null | 8.8 | 6.1 | null |
RHSA-2024:2793
|
Red Hat Security Advisory: nodejs:16 security update
|
nodejs: reading unprocessed HTTP request with unbounded chunk extension allows DoS attacks
|
[
"cpe:/a:redhat:rhel_eus:8.6::appstream"
] | null | 7.5 | null | null |
RHSA-2024:8797
|
Red Hat Security Advisory: python39:3.9 security update
|
python: cpython: tarfile: ReDos via excessive backtracking while parsing header values
|
[
"cpe:/a:redhat:rhel_aus:8.6::appstream",
"cpe:/a:redhat:rhel_e4s:8.6::appstream",
"cpe:/a:redhat:rhel_tus:8.6::appstream"
] | null | 7.5 | null | null |
RHSA-2019:2137
|
Red Hat Security Advisory: keycloak-httpd-client-install security, bug fix, and enhancement update
|
keycloak-httpd-client-install: unsafe /tmp log file in --log-file option in keycloak_cli.py keycloak-httpd-client-install: unsafe use of -p/--admin-password on command line
|
[
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 2.8 | null |
RHSA-2013:1842
|
Red Hat Security Advisory: nodejs010-nodejs security update
|
NodeJS: HTTP Pipelining DoS
|
[
"cpe:/a:redhat:rhel_software_collections:1::el6"
] | null | null | null | null |
RHSA-2003:036
|
Red Hat Security Advisory: : : : Updated mgetty packages available
|
security flaw security flaw
|
[
"cpe:/o:redhat:linux:7.1",
"cpe:/o:redhat:linux:7.2",
"cpe:/o:redhat:linux:7.3",
"cpe:/o:redhat:linux:8.0"
] | null | null | null | null |
RHSA-2017:0339
|
Red Hat Security Advisory: Red Hat Enterprise Linux 4 Extended Life Cycle Support One-Month Notice
|
This is the One-Month notification for the retirement of Red Hat Enterprise Linux 4 Extended Life Cycle Support Add-On (ELS). This notification applies only to those customers subscribed to the Extended Life Cycle Support (ELS) channel for Red Hat Enterprise Linux 4.
|
[
"cpe:/o:redhat:rhel_els:4::as",
"cpe:/o:redhat:rhel_els:4::es"
] | null | null | null | null |
RHSA-2022:1541
|
Red Hat Security Advisory: maven-shared-utils security update
|
maven-shared-utils: Command injection via Commandline class
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 9.8 | null | null |
RHSA-2022:1066
|
Red Hat Security Advisory: openssl security update
|
openssl: Infinite loop in BN_mod_sqrt() reachable when parsing certificates
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 7.5 | null | null |
RHSA-2020:4799
|
Red Hat Security Advisory: freeradius:3.0 security and bug fix update
|
freeradius: eap-pwd: DoS issues due to multithreaded BN_CTX access
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 7.5 | null | null |
RHSA-2023:5867
|
Red Hat Security Advisory: grafana security update
|
golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487) HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack)
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 7.5 | null | null |
RHSA-2024:0015
|
Red Hat Security Advisory: tigervnc security update
|
xorg-x11-server: out-of-bounds memory reads/writes in XKB button actions xorg-x11-server: out-of-bounds memory read in RRChangeOutputProperty and RRChangeProviderProperty
|
[
"cpe:/a:redhat:rhel_eus:8.6::appstream"
] | null | 7.6 | null | null |
RHSA-2022:0001
|
Red Hat Security Advisory: grafana security update
|
golang: net/http: limit growth of header canonicalization cache
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 7.5 | null | null |
RHSA-2025:3395
|
Red Hat Security Advisory: freetype security update
|
freetype: OOB write when attempting to parse font subglyph structures related to TrueType GX and variable font files
|
[
"cpe:/o:redhat:rhel_els:7"
] | null | 8.1 | null | null |
RHSA-2024:6683
|
Red Hat Security Advisory: thunderbird security update
|
mozilla: Type Confusion in Async Generators in Javascript Engine mozilla: Type confusion when looking up a property name in a "with" block mozilla: Internal event interfaces were exposed to web content when browser EventHandler listener callbacks ran mozilla: Garbage collection could mis-color cross-compartment objects in OOM conditions mozilla: WASM type confusion involving ArrayTypes mozilla: SelectElements could be shown over another site if popups are allowed mozilla: Memory safety bugs fixed in Firefox 130, Firefox ESR 128.2, and Thunderbird 128.2 thunderbird: Crash when aborting verification of OTR chat
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 6.5 | null | null |
RHSA-2010:0859
|
Red Hat Security Advisory: poppler security update
|
xpdf: uninitialized Gfx::parser pointer dereference poppler: use of initialized pointer in PostScriptFunction xpdf: array indexing error in FoFiType1::parse()
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2009:1526
|
Red Hat Security Advisory: Red Hat Enterprise Linux 3 - 1-Year End Of Life Notice
|
This is the 1-year notification of the End Of Life plans for Red Hat
Enterprise Linux 3.
|
[
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws"
] | null | null | null | null |
RHSA-2022:8549
|
Red Hat Security Advisory: firefox security update
|
expat: use-after free caused by overeager destruction of a shared DTD in XML_ExternalEntityParserCreate Mozilla: Service Workers might have learned size of cross-origin media files Mozilla: Fullscreen notification bypass Mozilla: Use-after-free in InputStream implementation Mozilla: Use-after-free of a JavaScript Realm Mozilla: Fullscreen notification bypass via windowName Mozilla: Use-after-free in Garbage Collection Mozilla: ServiceWorker-intercepted requests bypassed SameSite cookie policy Mozilla: Cross-Site Tracing was possible via non-standard override headers Mozilla: Symlinks may resolve to partially uninitialized buffers Mozilla: Keystroke Side-Channel Leakage Mozilla: Custom mouse cursor could have been drawn over browser UI Mozilla: Iframe contents could be rendered outside the iframe Mozilla: Memory safety bugs fixed in Firefox 107 and Firefox ESR 102.5
|
[
"cpe:/a:redhat:rhel_eus:8.4::appstream"
] | null | 8.8 | 6.1 | null |
RHSA-2020:3835
|
Red Hat Security Advisory: firefox security update
|
Mozilla: Memory safety bugs fixed in Firefox 81 and Firefox ESR 78.3 Mozilla: XSS when pasting attacker-controlled data into a contenteditable element Mozilla: Download origin spoofing via redirect Mozilla: When recursing through layers while scrolling, an iterator may have become invalid, resulting in a potential use-after-free scenario
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | 8.8 | 6.1 | null |
RHSA-2019:0315
|
Red Hat Security Advisory: CloudForms 4.6.8 security, bug fix and enhancement update
|
rubygem-sinatra: XSS in the 400 Bad Request page
|
[
"cpe:/a:redhat:cloudforms_managementengine:5.9::el7"
] | null | null | 6.1 | null |
RHSA-2024:1607
|
Red Hat Security Advisory: kernel security, bug fix, and enhancement update
|
kernel: ext4: kernel bug in ext4_write_inline_data_end() kernel: vmwgfx: NULL pointer dereference in vmw_cmd_dx_define_query kernel: GSM multiplexing race condition leads to privilege escalation kernel: Out of boundary write in perf_read_group() as result of overflow a perf_event's read_size kernel: use-after-free in amdgpu_cs_wait_all_fences in drivers/gpu/drm/amd/amdgpu/amdgpu_cs.c kernel: CIFS Filesystem Decryption Improper Input Validation Remote Code Execution Vulnerability in function receive_encrypted_standard of client kernel: nf_tables: use-after-free vulnerability in the nft_verdict_init() function
|
[
"cpe:/a:redhat:enterprise_linux:8::crb",
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 7.8 | null | null |
RHSA-2017:1440
|
Red Hat Security Advisory: firefox security update
|
Mozilla: Memory safety bugs fixed in Firefox 54 and Firefox ESR 52.2 (MFSA 2017-16) Mozilla: Use-after-free using destroyed node when regenerating trees (MFSA 2017-16) Mozilla: Use-after-free during docshell reloading (MFSA 2017-16) Mozilla: Use-after-free with track elements (MFSA 2017-16) Mozilla: Use-after-free with content viewer listeners (MFSA 2017-16) Mozilla: Use-after-free with IME input (MFSA 2017-16) Mozilla: Out-of-bounds read in WebGL with ImageInfo object (MFSA 2017-16) Mozilla: Use-after-free and use-after-scope logging XHR header errors (MFSA 2017-16) Mozilla: Use-after-free in IndexedDB (MFSA 2017-16) Mozilla: Out-of-bounds read in Opus encoder (MFSA 2017-16) Mozilla: Domain spoofing with combination of Canadian Syllabics and other unicode blocks (MFSA 2017-16) graphite2: out of bounds read in "graphite2::Pass::readPass" graphite2: heap-buffer-overflow write "lz4::decompress" (CVE-2017-7772) graphite2: heap-buffer-overflow write "lz4::decompress" (src/Decompressor) graphite2: out of bounds read "graphite2::Silf::readGraphite" graphite2: assertion error "size() > n" graphite2: heap-buffer-overflow read "graphite2::Silf::getClassGlyph" graphite2: use of uninitialized memory "graphite2::GlyphCache::Loader::read_glyph" Mozilla: Vulnerabilities in the Graphite 2 library (MFSA 2017-16)
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation",
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 9.8 | null |
RHSA-2007:0969
|
Red Hat Security Advisory: util-linux security update
|
util-linux (u)mount doesn't drop privileges properly when calling helpers
|
[
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws",
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws",
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2022:5648
|
Red Hat Security Advisory: kpatch-patch security update
|
kernel: a use-after-free write in the netfilter subsystem can lead to privilege escalation to root
|
[
"cpe:/o:redhat:rhel_e4s:8.1::baseos"
] | null | 7.8 | null | null |
RHSA-2020:1966
|
Red Hat Security Advisory: kernel security update
|
kernel: use-after-free in __blk_add_trace in kernel/trace/blktrace.c
|
[
"cpe:/o:redhat:rhel_e4s:8.0::baseos"
] | null | 6.7 | null | null |
RHSA-2016:0373
|
Red Hat Security Advisory: firefox security update
|
Mozilla: Miscellaneous memory safety hazards (rv:38.7) (MFSA 2016-16) Mozilla: Local file overwriting and potential privilege escalation through CSP reports (MFSA 2016-17) Mozilla: Memory leak in libstagefright when deleting an array during MP4 processing (MFSA 2016-20) Mozilla: Displayed page address can be overridden (MFSA 2016-21) Mozilla: Use-after-free in HTML5 string parser (MFSA 2016-23) Mozilla: Use-after-free in SetBody (MFSA 2016-24) Mozilla: Use-after-free when using multiple WebRTC data channels (MFSA 2016-25) Mozilla: Use-after-free during XML transformations (MFSA 2016-27) Mozilla: Addressbar spoofing though history navigation and Location protocol property (MFSA 2016-28) Mozilla: Memory corruption with malicious NPAPI plugin (MFSA 2016-31) Mozilla: Use-after-free in GetStaticInstance in WebRTC (MFSA 2016-33) Mozilla: Out-of-bounds read in HTML parser following a failed allocation (MFSA 2016-34) graphite2: multiple font parsing vulnerabilities (Mozilla MFSA 2016-37) graphite2: multiple font parsing vulnerabilities (Mozilla MFSA 2016-37) graphite2: multiple font parsing vulnerabilities (Mozilla MFSA 2016-37) graphite2: multiple font parsing vulnerabilities (Mozilla MFSA 2016-37) graphite2: multiple font parsing vulnerabilities (Mozilla MFSA 2016-37) graphite2: multiple font parsing vulnerabilities (Mozilla MFSA 2016-37) graphite2: multiple font parsing vulnerabilities (Mozilla MFSA 2016-37) graphite2: multiple font parsing vulnerabilities (Mozilla MFSA 2016-37) graphite2: multiple font parsing vulnerabilities (Mozilla MFSA 2016-37) graphite2: multiple font parsing vulnerabilities (Mozilla MFSA 2016-37) graphite2: multiple font parsing vulnerabilities (Mozilla MFSA 2016-37) graphite2: multiple font parsing vulnerabilities (Mozilla MFSA 2016-37) graphite2: multiple font parsing vulnerabilities (Mozilla MFSA 2016-37) graphite2: multiple font parsing vulnerabilities (Mozilla MFSA 2016-37)
|
[
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::server",
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation",
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | null | null |
RHSA-2016:1840
|
Red Hat Security Advisory: eap7-jboss-ec2-eap security, bug fix, and enhancement update
|
jakarta-taglibs-standard: XXE and RCE via XSL extension in JSTL XML tags eap: HTTP header injection / response splitting EAP7 Privilege escalation when managing domain including earlier version slaves
|
[
"cpe:/a:redhat:jboss_enterprise_application_platform:7::el6",
"cpe:/a:redhat:jboss_enterprise_application_platform:7::el7"
] | null | null | 7.5 | null |
RHSA-2005:014
|
Red Hat Security Advisory: nfs-utils security update
|
security flaw security flaw
|
[
"cpe:/o:redhat:enterprise_linux:2.1::as",
"cpe:/o:redhat:enterprise_linux:2.1::aw",
"cpe:/o:redhat:enterprise_linux:2.1::es",
"cpe:/o:redhat:enterprise_linux:2.1::ws"
] | null | null | null | null |
RHSA-2021:3884
|
Red Hat Security Advisory: java-1.8.0-openjdk security update
|
OpenJDK: Weak ciphers preferred over stronger ones for TLS (JSSE, 8264210) OpenJDK: Excessive memory allocation in RTFParser (Swing, 8265167) OpenJDK: Excessive memory allocation in RTFReader (Swing, 8265580) OpenJDK: Excessive memory allocation in HashMap and HashSet (Utility, 8266097) OpenJDK: Certificates with end dates too far in the future can corrupt keystore (Keytool, 8266137) OpenJDK: Loop in HttpsServer triggered during TLS session close (JSSE, 8254967) OpenJDK: Incorrect principal selection when using Kerberos Constrained Delegation (Libraries, 8266689) OpenJDK: Unexpected exception raised during TLS handshake (JSSE, 8267729) OpenJDK: Excessive memory allocation in BMPImageReader (ImageIO, 8267735) OpenJDK: Incomplete validation of inner class references in ClassFileParser (Hotspot, 8268071) OpenJDK: Non-constant comparison during TLS handshakes (JSSE, 8269618)
|
[
"cpe:/a:redhat:rhel_eus:8.1::appstream"
] | null | 3.7 | null | null |
RHSA-2024:6310
|
Red Hat Security Advisory: resource-agents security update
|
urllib3: proxy-authorization request header is not stripped during cross-origin redirects
|
[
"cpe:/a:redhat:rhel_e4s:8.6::highavailability",
"cpe:/a:redhat:rhel_tus:8.6::highavailability"
] | null | 4.4 | null | null |
RHSA-2024:0397
|
Red Hat Security Advisory: squid:4 security update
|
squid: DoS against HTTP and HTTPS squid: Denial of Service in SSL Certificate validation squid: NULL pointer dereference in the gopher protocol code squid: Buffer over-read in the HTTP Message processing feature squid: Incorrect Check of Function Return Value In Helper Process management squid: denial of service in HTTP request parsing
|
[
"cpe:/a:redhat:rhel_eus:8.8::appstream"
] | null | 7.5 | null | null |
RHSA-2020:2539
|
Red Hat Security Advisory: net-snmp security and bug fix update
|
net-snmp: NULL pointer exception in snmp_oid_compare in snmplib/snmp_api.c resulting in a denial of service
|
[
"cpe:/o:redhat:rhel_eus:7.7::computenode",
"cpe:/o:redhat:rhel_eus:7.7::server"
] | null | null | 7.5 | null |
RHSA-2020:1465
|
Red Hat Security Advisory: kernel security, bug fix, and enhancement update
|
kernel: rtl_p2p_noa_ie in drivers/net/wireless/realtek/rtlwifi/ps.c in the Linux kernel lacks a certain upper-bound check, leading to a buffer overflow Kernel: KVM: export MSR_IA32_TSX_CTRL to guest - incomplete fix for TAA (CVE-2019-11135)
|
[
"cpe:/o:redhat:enterprise_linux:7::hypervisor",
"cpe:/o:redhat:rhel_eus:7.6::computenode",
"cpe:/o:redhat:rhel_eus:7.6::server"
] | null | null | 5.5 | null |
RHBA-2021:2407
|
Red Hat Bug Fix Advisory: OpenShift Container Platform 4.6.35 packages update
|
jenkins-2-plugins/config-file-provider: Does not configure its XML parser to prevent XML external entity (XXE) attacks. jenkins-2-plugins/config-file-provider: Does not correctly perform permission checks in several HTTP endpoints. jenkins-2-plugins/config-file-provider: does not require POST requests for an HTTP endpoint, resulting in a cross-site request forgery (CSRF) vulnerability. jenkins-2-plugins/config-file-provider: Does not perform permission checks in several HTTP endpoints.
|
[
"cpe:/a:redhat:openshift:4.6::el7",
"cpe:/a:redhat:openshift:4.6::el8"
] | null | 4.3 | null | null |
RHSA-2024:4544
|
Red Hat Security Advisory: ghostscript security update
|
ghostscript: OPVP device arbitrary code execution via custom Driver library
|
[
"cpe:/a:redhat:rhel_aus:8.4::appstream",
"cpe:/a:redhat:rhel_e4s:8.4::appstream",
"cpe:/a:redhat:rhel_tus:8.4::appstream"
] | null | 8.8 | null | null |
RHSA-2024:2583
|
Red Hat Security Advisory: linux-firmware security update
|
hw: intel: Protection mechanism failure for some Intel(R) PROSet/Wireless WiFi
|
[
"cpe:/o:redhat:rhel_aus:8.4::baseos",
"cpe:/o:redhat:rhel_e4s:8.4::baseos",
"cpe:/o:redhat:rhel_tus:8.4::baseos"
] | null | 8.2 | null | null |
RHSA-2013:1059
|
Red Hat Security Advisory: java-1.6.0-ibm security update
|
OpenJDK: Insecure shared memory permissions (2D, 8001034) OpenJDK: Frame injection in generated HTML (Javadoc, 8012375) OpenJDK: Integrate Apache Santuario, rework class loader (Libraries, 6741606, 8008744) OpenJDK: JConsole SSL support (Serviceability, 8003703) JDK: unspecified vulnerability fixed in 7u25 (Deployment) JDK: unspecified vulnerability fixed in 7u25 (Deployment) OpenJDK: AccessControlContext check order issue (Libraries, 8001330) OpenJDK: Resource denial of service (AWT, 8001038) OpenJDK: output stream access restrictions (CORBA, 8000642) OpenJDK: Prevent revealing the local address (Networking, 8001318) OpenJDK: Better access restrictions (Sound, 8006328) OpenJDK: ObjectStreamClass circular reference denial of service (Serialization, 8000638) OpenJDK: exclusive port binding (Networking, 7170730) OpenJDK: Unique VMIDs (Libraries, 8001033) OpenJDK: MBeanServer Introspector package access (JMX, 8008124) OpenJDK: SerialJavaObject package restriction (JDBC, 8009554) OpenJDK: getEnclosing* checks (Libraries, 8007812) OpenJDK: ObjectOutputStream access checks (Serialization, 8008132) OpenJDK: Proper class checking (JMX, 8008120) OpenJDK: Various AWT integer overflow checks (AWT, 8009071) OpenJDK: Incorrect image attribute verification (2D, 8012438) JDK: unspecified vulnerability fixed in 7u25 (2D) OpenJDK: Incorrect image channel verification (2D, 8012597) JDK: unspecified vulnerability fixed in 7u25 (Deployment) JDK: unspecified vulnerability fixed in 7u25 (Deployment) OpenJDK: Incorrect image layout verification (2D, 8012601) OpenJDK: ImagingLib byte lookup processing (2D, 8011243) OpenJDK: Incorrect IntegerComponentRaster size checks (2D, 8011248) OpenJDK: Incorrect ShortBandedRaster size checks (2D, 8011253) OpenJDK: Incorrect ByteBandedRaster size checks (2D, 8011257) JDK: Unspecified security fixes (July 2013) JDK: Unspecified security fixes (July 2013) JDK: Unspecified security fixes (July 2013) JDK: unspecified vulnerability fixed in 6u51 and 5u51 (AWT) OpenJDK: XML parsing Denial of Service (JAXP, 8017298)
|
[
"cpe:/a:redhat:rhel_extras:5::server",
"cpe:/a:redhat:rhel_extras:6"
] | null | null | null | null |
RHSA-2021:0081
|
Red Hat Security Advisory: Red Hat Ceph Storage 4.2 Security and Bug Fix update
|
ceph: CEPHX_V2 replay attack protection lost ceph-ansible: insecure ownership on /etc/ceph/iscsi-gateway.conf configuration file ceph: User credentials can be manipulated and stolen by Native CephFS consumers of OpenStack Manila
|
[
"cpe:/a:redhat:ceph_storage:4::el7",
"cpe:/a:redhat:ceph_storage:4::el8"
] | null | 7.1 | null | null |
RHSA-2021:3361
|
Red Hat Security Advisory: Migration Toolkit for Containers (MTC) 1.5.1 security and bug fix update
|
golang: net: lookup functions may return invalid host names golang: archive/zip: malformed archive may cause panic or memory exhaustion golang: net/http/httputil: ReverseProxy forwards connection headers if first one is empty golang: math/big.Rat: may cause a panic or an unrecoverable fatal error if passed inputs with very large exponents golang: crypto/tls: certificate of wrong type is causing TLS client to panic
|
[
"cpe:/a:redhat:rhmt:1.5::el7",
"cpe:/a:redhat:rhmt:1.5::el8"
] | null | 6.5 | null | null |
RHSA-2022:0225
|
Red Hat Security Advisory: Red Hat OpenShift Enterprise Logging bug fix and security update (5.0.12)
|
log4j-core: remote code execution via JDBC Appender
|
[
"cpe:/a:redhat:logging:5.0::el8"
] | null | 6.6 | null | null |
RHSA-2009:1122
|
Red Hat Security Advisory: icu security update
|
icu: XSS vulnerability due to improper invalid byte sequence handling
|
[
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | 6.1 | null |
RHSA-2018:0582
|
Red Hat Security Advisory: rh-maven35-slf4j security update
|
slf4j: Deserialisation vulnerability in EventData constructor can allow for arbitrary code execution
|
[
"cpe:/a:redhat:rhel_software_collections:3::el7"
] | null | null | 8.1 | null |
RHSA-2022:7001
|
Red Hat Security Advisory: java-17-openjdk security update
|
OpenJDK: improper MultiByte conversion can lead to buffer overflow (JGSS, 8286077) OpenJDK: improper handling of long NTLM client hostnames (Security, 8286526) OpenJDK: insufficient randomization of JNDI DNS port numbers (JNDI, 8286910) OpenJDK: excessive memory allocation in X.509 certificate parsing (Security, 8286533) OpenJDK: HttpServer no connection count limit (Lightweight HTTP Server, 8286918) OpenJDK: missing SNI caching in HTTP/2 (Networking, 8289366)
|
[
"cpe:/a:redhat:rhel_eus:8.4::appstream",
"cpe:/a:redhat:rhel_eus:8.4::crb"
] | null | 3.7 | null | null |
RHSA-2022:5532
|
Red Hat Security Advisory: Red Hat Fuse 7.11.0 release and security update
|
elasticsearch: not properly preserving security permissions when executing complex queries may lead to information disclosure tomcat: deserialization flaw in session persistence storage leading to RCE junit4: TemporaryFolder is shared between all users across system which could result in information disclosure wildfly-core: memory leak in WildFly host-controller in domain mode while not able to reconnect to domain-controller kotlin: vulnerable Java API was used for temporary file and folder creation which could result in information disclosure jackson-databind: denial of service via a large depth of nested objects mysql-connector-java: unauthorized access to critical undertow: potential security issue in flow control over HTTP/2 may lead to DOS wildfly-elytron: possible timing attack in ScramServer wildfly-core: Invalid Sensitivity Classification of Vault Expression nodejs-ansi-regex: Regular expression denial of service (ReDoS) matching ANSI escape codes undertow: client side invocation timeout raised when calling over HTTP2 kubernetes-client: Insecure deserialization in unmarshalYaml method springframework: Additional Log Injection in Spring Framework (follow-up to CVE-2021-22096) springframework: malicious input leads to insertion of additional log entries spring-security: Denial-of-Service (DoS) attack via initiation of Authorization Request protobuf-java: potential DoS in the parsing procedure for binary data google-oauth-client: Token signature not verified tomcat: Information disclosure when using NTFS file system tomcat: Request mix-up with h2c tomcat: Incomplete fix for CVE-2020-9484 (RCE via session persistence) XStream: remote command execution attack by manipulating the processed input stream tomcat: JNDI realm authentication weakness tomcat: HTTP request smuggling when used with a reverse proxy jdom: XXE allows attackers to cause a DoS via a crafted HTTP request apache-commons-compress: infinite loop when reading a specially crafted 7Z archive apache-commons-compress: excessive memory allocation when reading a specially crafted 7Z archive apache-commons-compress: excessive memory allocation when reading a specially crafted TAR archive apache-commons-compress: excessive memory allocation when reading a specially crafted ZIP archive Kafka: Timing Attack Vulnerability for Apache Kafka Connect and Clients xml-security: XPath Transform abuse allows for information disclosure tomcat: Infinite loop while reading an unexpected TLS packet when using OpenSSL JSSE engine karaf: insecure java deserialization tomcat: OutOfMemoryError caused by HTTP upgrade connection leak could lead to DoS logback: remote code execution through JNDI call from within its configuration file netty: control chars in header names may lead to HTTP request smuggling xstream: Injecting highly recursive collections or maps can cause a DoS xnio: org.xnio.StreamConnection.notifyReadClosed log to debug instead of stderr undertow: potential security issue in flow control over HTTP/2 may lead to DOS(incomplete fix for CVE-2021-3629) undertow: Double AJP response for 400 from EAP 7 results in CPING failures mysql-connector-java: Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Connectors jdbc-postgresql: Unchecked Class Instantiation when providing Plugin Classes karaf: path traversal flaws spring-expression: Denial of service via specially crafted SpEL expression Framework: Data Binding Rules Vulnerability springframework: DoS via data binding to multipartFile or servlet part springframework: DoS with STOMP over WebSocket springframework: BCrypt skips salt rounds for work factor of 31 springframework: Authorization Bypass in RegexRequestMatcher tomcat: local privilege escalation vulnerability h2: Loading of custom classes from remote servers through JNDI junrar: A carefully crafted RAR archive can trigger an infinite loop while extracting artemis-commons: Apache ActiveMQ Artemis DoS metadata-extractor: Out-of-memory when reading a specially crafted JPEG file fastjson: autoType shutdown restriction bypass leads to deserialization poi-scratchpad: A carefully crafted TNEF file can cause an out of memory exception postgresql-jdbc: Arbitrary File Write Vulnerability tika-core: Regular Expression Denial of Service in standards extractor
|
[
"cpe:/a:redhat:jboss_fuse:7"
] | null | 3.1 | null | null |
RHSA-2003:037
|
Red Hat Security Advisory: : : : Updated Xpdf packages fix security vulnerability
|
security flaw
|
[
"cpe:/o:redhat:linux:6.2",
"cpe:/o:redhat:linux:7.0",
"cpe:/o:redhat:linux:7.1",
"cpe:/o:redhat:linux:7.2",
"cpe:/o:redhat:linux:7.3",
"cpe:/o:redhat:linux:8.0"
] | null | null | null | null |
RHSA-2024:6719
|
Red Hat Security Advisory: thunderbird security update
|
mozilla: Type Confusion in Async Generators in Javascript Engine mozilla: Type confusion when looking up a property name in a "with" block mozilla: Internal event interfaces were exposed to web content when browser EventHandler listener callbacks ran mozilla: Garbage collection could mis-color cross-compartment objects in OOM conditions mozilla: WASM type confusion involving ArrayTypes mozilla: SelectElements could be shown over another site if popups are allowed mozilla: Memory safety bugs fixed in Firefox 130, Firefox ESR 128.2, and Thunderbird 128.2 thunderbird: Crash when aborting verification of OTR chat
|
[
"cpe:/a:redhat:rhel_eus:8.8::appstream"
] | null | 6.5 | null | null |
RHSA-2020:0468
|
Red Hat Security Advisory: java-1.7.1-ibm security update
|
OpenJDK: Incorrect exception processing during deserialization in BeanContextSupport (Serialization, 8224909) OpenJDK: Incorrect isBuiltinStreamHandler check causing URL normalization issues (Networking, 8228548) OpenJDK: Serialization filter changes via jdk.serialFilter property modification (Serialization, 8231422) OpenJDK: Incomplete enforcement of maxDatagramSockets limit in DatagramChannelImpl (Networking, 8231795)
|
[
"cpe:/a:redhat:rhel_extras:7"
] | null | 3.7 | null | null |
RHSA-2024:0114
|
Red Hat Security Advisory: python3 security update
|
python: use after free in heappushpop() of heapq module python: DoS when processing malformed Apple Property List files in binary format
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 6.5 | null | null |
RHSA-2023:7409
|
Red Hat Security Advisory: glibc security update
|
glibc: potential use-after-free in getaddrinfo() glibc: potential use-after-free in gaih_inet()
|
[
"cpe:/a:redhat:rhel_eus:8.6::appstream",
"cpe:/a:redhat:rhel_eus:8.6::crb",
"cpe:/o:redhat:rhel_eus:8.6::baseos",
"cpe:/o:redhat:rhev_hypervisor:4.4::el8"
] | null | 5.9 | null | null |
RHSA-2023:3374
|
Red Hat Security Advisory: Migration Toolkit for Runtimes security update
|
loader-utils: Regular expression denial of service codec-haproxy: HAProxyMessageDecoder Stack Exhaustion DoS
|
[
"cpe:/a:redhat:migration_toolkit_runtimes:1.0::el8"
] | null | 7.5 | null | null |
RHSA-2021:0937
|
Red Hat Security Advisory: rubygem-em-http-request security update
|
rubygem-em-http-request: missing SSL hostname validation allows MITM
|
[
"cpe:/a:redhat:openstack-optools:13::el7"
] | null | 7.4 | null | null |
RHSA-2023:3517
|
Red Hat Security Advisory: kpatch-patch security update
|
kernel: use-after-free in l2cap_connect and l2cap_le_connect_req in net/bluetooth/l2cap_core.c
|
[
"cpe:/o:redhat:rhel_e4s:8.4::baseos"
] | null | 8.1 | null | null |
RHSA-2022:6224
|
Red Hat Security Advisory: openssl security and bug fix update
|
openssl: c_rehash script allows command injection openssl: Signer certificate verification returns inaccurate response when using OCSP_NOCHECKS openssl: OPENSSL_LH_flush() breaks reuse of memory openssl: the c_rehash script allows command injection openssl: AES OCB fails to encrypt some bytes
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/o:redhat:enterprise_linux:9::baseos"
] | null | 5.3 | null | null |
RHSA-2020:3996
|
Red Hat Security Advisory: libxml2 security and bug fix update
|
libxml2: memory leak in xmlParseBalancedChunkMemoryRecover in parser.c libxml2: memory leak in xmlSchemaPreRun in xmlschemas.c libxml2: infinite loop in xmlStringLenDecodeEntities in some end-of-file situations
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 7.5 | null | null |
RHSA-2017:2728
|
Red Hat Security Advisory: postgresql security update
|
postgresql: Empty password accepted in some authentication methods postgresql: pg_user_mappings view discloses passwords to users lacking server privileges
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 7.5 | null |
RHSA-2017:1759
|
Red Hat Security Advisory: freeradius security update
|
freeradius: Out-of-bounds read/write due to improper output buffer size check in make_secret() freeradius: Out-of-bounds write in rad_coalesce() freeradius: Memory leak in decode_tlv() freeradius: Memory leak in fr_dhcp_decode() freeradius: Out-of-bounds read in fr_dhcp_decode_options() freeradius: Out-of-bounds read in fr_dhcp_decode() when decoding option 63
|
[
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | 5.9 | null |
RHSA-2023:7467
|
Red Hat Security Advisory: samba security update
|
samba: smbd allows client access to unix domain sockets on the file system as root samba: SMB clients can truncate files with read-only permissions samba: "rpcecho" development server allows denial of service via sleep() call on AD DC
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb",
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 6.5 | null | null |
RHSA-2008:0287
|
Red Hat Security Advisory: libxslt security update
|
libxslt: fixed-sized steps array overflow via "template match" condition in XSL file
|
[
"cpe:/o:redhat:enterprise_linux:2.1::as",
"cpe:/o:redhat:enterprise_linux:2.1::aw",
"cpe:/o:redhat:enterprise_linux:2.1::es",
"cpe:/o:redhat:enterprise_linux:2.1::ws",
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws",
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws",
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2015:1713
|
Red Hat Security Advisory: rhev-hypervisor security, bug fix, and enhancement update
|
jasper: double-free in in jas_iccattrval_destroy() (oCERT-2014-012) jasper: heap overflow in jp2_decode() (oCERT-2014-012) RHEV-M: webadmin automatic logout fails if VM is selected spice: memory corruption in worker_update_monitors_config()
|
[
"cpe:/o:redhat:enterprise_linux:6::hypervisor",
"cpe:/o:redhat:enterprise_linux:7::hypervisor"
] | null | null | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.