id
stringlengths 13
15
| title
stringlengths 29
176
| description
stringlengths 8
32.1k
| cpes
listlengths 0
20
| cvss_v4_0
null | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
null |
---|---|---|---|---|---|---|---|
RHSA-2022:6856
|
Red Hat Security Advisory: rh-ruby27-ruby security, bug fix, and enhancement update
|
ruby: buffer overflow in CGI.escape_html ruby: Regular expression denial of service vulnerability of Date parsing methods ruby: Cookie prefix spoofing in CGI::Cookie.parse ruby: Buffer overrun in String-to-Float conversion
|
[
"cpe:/a:redhat:rhel_software_collections:3::el7"
] | null | 6.2 | null | null |
RHSA-2024:10851
|
Red Hat Security Advisory: postgresql:15 security update
|
postgresql: PostgreSQL PL/Perl environment variable changes execute arbitrary code
|
[
"cpe:/a:redhat:rhel_eus:8.8::appstream"
] | null | 8.8 | null | null |
RHSA-2022:6272
|
Red Hat Security Advisory: Red Hat OpenShift Service Mesh 2.0.11 security update
|
Moment.js: Path traversal in moment.locale moment: inefficient parsing algorithm resulting in DoS
|
[
"cpe:/a:redhat:service_mesh:2.0::el8"
] | null | 7.5 | null | null |
RHSA-2009:1505
|
Red Hat Security Advisory: java-1.4.2-ibm security update
|
OpenJDK RSA public key length denial-of-service (6497740) JDK: XML parsing Denial-Of-Service (6845701)
|
[
"cpe:/a:redhat:rhel_extras:3",
"cpe:/a:redhat:rhel_extras:4",
"cpe:/a:redhat:rhel_extras:5::client",
"cpe:/a:redhat:rhel_extras:5::server"
] | null | null | null | null |
RHSA-2024:0158
|
Red Hat Security Advisory: .NET 6.0 security update
|
crypto-js: PBKDF2 1,000 times weaker than specified in 1993 and 1.3M times weaker than current standard dotnet: Information Disclosure: MD.SqlClient(MDS) & System.data.SQLClient (SDS) dotnet: X509 Certificates - Validation Bypass across Azure dotnet: .NET Denial of Service Vulnerability
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb"
] | null | 6.8 | null | null |
RHSA-2019:2519
|
Red Hat Security Advisory: rh-php71-php security, bug fix, and enhancement update
|
gd: Unsigned integer underflow _gdContributionsAlloc() php: Out of bounds access in php_pcre.c:php_pcre_replace_impl() php: Integer overflow in mysqli_api.c:mysqli_real_escape_string() php: Heap use after free in ext/standard/var_unserializer.re php: Out-of-bound read in timelib_meridian() gd: Infinite loop in gdImageCreateFromGifCtx() in gd_gif_in.c php: Reflected XSS on PHAR 404 page php: Stack-based buffer under-read in php_stream_url_wrap_http_ex() in http_fopen_wrapper.c when parsing HTTP response php: Dumpable FPM child processes allow bypassing opcache access controls php: Infinite loop in ext/iconv/iconv.c when using stream filter with convert.incov on invalid sequence leads to denial-of-service php: Reflected XSS vulnerability on PHAR 403 and 404 error pages php: NULL pointer dereference due to mishandling of ldap_get_dn return value allows DoS via malicious LDAP server reply php: Out-of-bounds read in ext/exif/exif.c:exif_read_data() when reading crafted JPEG data php: exif: Buffer over-read in exif_process_IFD_in_MAKERNOTE() php: Mishandled http_header_value in an atoi() call in http_fopen_wrapper.c php: Cross-site scripting (XSS) flaw in Apache2 component via body of 'Transfer-Encoding: chunked' request php: Buffer over-read in PHAR reading functions gd: Heap-based buffer overflow in gdImageColorMatch() in gd_color_match.c php: Invalid memory access in function xmlrpc_decode() php: Heap-based buffer over-read in PHAR reading functions php: memcpy with negative length via crafted DNS response php: Heap-based buffer over-read in mbstring regular expression functions php: Out-of-bounds read in base64_decode_xmlrpc in ext/xmlrpc/libxmlrpc/base64.c php: File rename across filesystems may allow unwanted access during processing php: Uninitialized read in exif_process_IFD_in_MAKERNOTE php: Uninitialized read in exif_process_IFD_in_MAKERNOTE php: Invalid read in exif_process_SOFn() php: Heap buffer overflow in function exif_process_IFD_TAG() php: Heap buffer overflow in function exif_iif_add_value() php: Buffer over-read in exif_process_IFD_TAG() leading to information disclosure gd: Information disclosure in gdImageCreateFromXbm() php: Out-of-bounds read due to integer overflow in iconv_mime_decode_headers() php: Buffer over-read in exif_read_data()
|
[
"cpe:/a:redhat:rhel_software_collections:3::el7"
] | null | null | 6.5 | null |
RHSA-2023:0209
|
Red Hat Security Advisory: java-1.8.0-openjdk security update
|
OpenJDK: improper restrictions in CORBA deserialization (Serialization, 8285021) OpenJDK: soundbank URL remote loading (Sound, 8293742)
|
[
"cpe:/a:redhat:rhel_eus:9.0::appstream",
"cpe:/a:redhat:rhel_eus:9.0::crb"
] | null | 3.7 | null | null |
RHSA-2009:1571
|
Red Hat Security Advisory: java-1.5.0-sun security update
|
deprecate MD2 in SSL cert validation (Kaminsky) OpenJDK ICC_Profile file existence detection information leak (6631533) java-1.6.0-sun: Stack-based buffer overflow via a long file: URL argument (6854303) java-1.6.0-sun: Privilege escalation via crafted image file due improper color profiles parsing (6862970) OpenJDK JRE AWT setDifflCM stack overflow (6872357) OpenJDK JRE AWT setBytePixels heap overflow (6872358) OpenJDK JPEG Image Writer quantization problem (6862968) OpenJDK ImageI/O JPEG heap overflow (6874643) OpenJDK MessageDigest.isEqual introduces timing attack vulnerabilities (6863503) OpenJDK ASN.1/DER input stream parser denial of service (6864911) CVE-2009-3877 OpenJDK ASN.1/DER input stream parser denial of service (6864911) CVE-2009-3877 OpenJDK GraphicsConfiguration information leak(6822057) OpenJDK UI logging information leakage(6664512) OpenJDK resurrected classloaders can still have children (6636650) OpenJDK information leaks in mutable variables (6657026,6657138) OpenJDK information leaks in mutable variables (6657026,6657138) OpenJDK zoneinfo file existence information leak (6824265)
|
[
"cpe:/a:redhat:rhel_extras:4",
"cpe:/a:redhat:rhel_extras:5::client",
"cpe:/a:redhat:rhel_extras:5::server"
] | null | null | null | null |
RHSA-2019:0202
|
Red Hat Security Advisory: kernel security and bug fix update
|
kernel: userfaultfd bypasses tmpfs file permissions
|
[
"cpe:/o:redhat:rhel_eus:7.5::computenode",
"cpe:/o:redhat:rhel_eus:7.5::server"
] | null | null | 6.1 | null |
RHSA-2018:3558
|
Red Hat Security Advisory: httpd24 security, bug fix, and enhancement update
|
curl: TLS session resumption client cert bypass curl: Re-using connection with wrong client cert curl: Use of connection struct after free curl: Incorrect reuse of client certificates curl: escape and unescape integer overflows curl: Cookie injection for other servers curl: Case insensitive password comparison curl: Out-of-bounds write via unchecked multiplication curl: Double-free in curl_maprintf curl: Double-free in krb5 code curl: Glob parser write/read out of bounds curl: curl_getdate out-of-bounds read curl: URL unescape heap overflow via integer truncation curl: Use-after-free via shared cookies curl: Invalid URL parsing with '#' curl: IDNA 2003 makes curl use wrong host curl: printf floating point buffer overflow curl: --write-out out of bounds read curl: NTLM buffer overflow via integer overflow curl: FTP wildcard out of bounds read httpd: Out of bounds write in mod_authnz_ldap when using too small Accept-Language values httpd: <FilesMatch> bypass with a trailing newline in the file name curl: TFTP sends more than buffer size curl: URL globbing out of bounds read curl: FTP PWD response parser out of bounds read curl: IMAP FETCH response out of bounds read httpd: Improper handling of headers in mod_session can allow a remote user to modify session data for CGI applications httpd: Out of bounds access after failure in reading the HTTP request httpd: Out of bounds read in mod_cache_socache can allow a remote attacker to cause DoS httpd: Weak Digest auth nonce generation in mod_auth_digest httpd: mod_http2: Too much time allocated to workers, possibly leading to DoS httpd: DoS for HTTP/2 connections by continuous SETTINGS frames curl: NTLM password overflow via integer overflow curl: HTTP authentication leak in redirects curl: FTP path trickery leads to NIL byte out of bounds write curl: LDAP NULL pointer dereference curl: RTSP RTP buffer over-read curl: Out-of-bounds heap read when missing RTSP headers allows information leak or denial of service
|
[
"cpe:/a:redhat:rhel_software_collections:3::el6",
"cpe:/a:redhat:rhel_software_collections:3::el7"
] | null | 2.4 | 5.4 | null |
RHSA-2008:0855
|
Red Hat Security Advisory: openssh security update
|
openssh falls back to the trusted x11 cookie if generation of an untrusted cookie fails security flaw
|
[
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws",
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::server",
"cpe:/o:redhat:rhel_eus:4.5::as",
"cpe:/o:redhat:rhel_eus:4.5::es"
] | null | null | null | null |
RHSA-2020:4127
|
Red Hat Security Advisory: Satellite 6.7.4 Async Bug Fix Update
|
foreman: unauthorized cache read on RPM-based installations through local user
|
[
"cpe:/a:redhat:satellite:6.7::el7",
"cpe:/a:redhat:satellite_capsule:6.7::el7"
] | null | 8.8 | null | null |
RHSA-2020:4545
|
Red Hat Security Advisory: libssh security, bug fix, and enhancement update
|
libssh: unsanitized location in scp could lead to unwanted command execution libssh: denial of service when handling AES-CTR (or DES) ciphers
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 5.3 | 7.1 | null |
RHSA-2013:0194
|
Red Hat Security Advisory: JBoss Enterprise Application Platform 5.2.0 update
|
JBoss: twiddle.sh accepts credentials as command line arguments, exposing them to other local users via a process listing jbossws: Prone to character encoding pattern attack (XML Encryption flaw) jbossws: Prone to Bleichenbacher attack against to be distributed symmetric key Framework: Information (internal server information, classpath, local working directories, session IDs) disclosure CSRF on jmx-console allows invocation of operations on mbeans Console: XSS in invoke operation JBoss invoker servlets do not require authentication JGroups diagnostics service enabled by default with no authentication when a JGroups channel is started apache-cxf: Apache CXF does not verify that elements were signed / encrypted by a particular Supporting Token JBoss: CallerIdentityLoginModule retaining password from previous call if a null password is provided JBoss: SecurityAssociation.getCredential() will return the previous credential if no security context is provided Web: Bypass of security constraints JBoss: AuthorizationInterceptor allows JMX operation to proceed despite authorization failure
|
[
"cpe:/a:redhat:jboss_enterprise_application_platform:5.2"
] | null | null | null | null |
RHSA-2017:0621
|
Red Hat Security Advisory: qemu-kvm security and bug fix update
|
qemu-kvm: Out-of-bounds read when creating weird vga screen surface
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2019:3266
|
Red Hat Security Advisory: OpenShift Container Platform 4.1 openshift security update
|
kubernetes: `kubectl cp` allows for arbitrary file write via double symlinks
|
[
"cpe:/a:redhat:openshift:4.1::el7",
"cpe:/a:redhat:openshift:4.1::el8"
] | null | null | 5.3 | null |
RHSA-2024:1861
|
Red Hat Security Advisory: Red Hat Single Sign-On 7.6.8 security update on RHEL 8
|
keycloak: Log Injection during WebAuthn authentication or registration keycloak: Authorization Bypass keycloak: path transversal in redirection validation keycloak: org.keycloak.protocol.oidc: unvalidated cross-origin messages in checkLoginIframe leads to DDoS undertow: Out-of-memory Error after several closed connections with wildfly-http-client protocol
|
[
"cpe:/a:redhat:red_hat_single_sign_on:7.6::el8"
] | null | 7.5 | null | null |
RHSA-2025:0427
|
Red Hat Security Advisory: OpenJDK 21.0.6 Security Update for Portable Linux Builds
|
openjdk: Enhance array handling (Oracle CPU 2025-01)
|
[
"cpe:/a:redhat:openjdk:21"
] | null | 4.8 | null | null |
RHSA-2011:0926
|
Red Hat Security Advisory: bind security update
|
bind: Specially constructed packet will cause named to exit
|
[
"cpe:/o:redhat:enterprise_linux:5::server",
"cpe:/o:redhat:enterprise_linux:6::server"
] | null | null | null | null |
RHSA-2020:1454
|
Red Hat Security Advisory: Satellite 6.7 release.
|
rubygem-net-ldap: Missing SSL Certificate Validation mina-core: Retaining an open socket in close_notify SSL-TLS leading to Information disclosure. apache-commons-beanutils: does not suppresses the class property in PropertyUtilsBean by default jackson-databind: polymorphic typing issue allows attacker to read arbitrary local files on the server. rubygem-foreman_ansible: "User input" entry from Job Invocation may contain sensitive data
|
[
"cpe:/a:redhat:satellite:6.7::el7",
"cpe:/a:redhat:satellite_capsule:6.7::el7"
] | null | 4.3 | 0 | null |
RHSA-2016:1850
|
Red Hat Security Advisory: libarchive security update
|
libarchive: Stack out of bounds read in ar parser libarchive: Global out of bounds read in mtree parser libarchive: Undefined behavior / invalid shiftleft in TAR parser libarchive: Memory allocate error with symbolic links in cpio archives libarchive: Archive Entry with type 1 (hardlink), but has a non-zero data size file overwrite libarchive: undefined behaviour (integer overflow) in iso parser libarchive: Denial of service using a crafted gzip file
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | 3.5 | null |
RHSA-2006:0668
|
Red Hat Security Advisory: squirrelmail security update
|
security flaw
|
[
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws",
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2019:1652
|
Red Hat Security Advisory: libssh2 security update
|
libssh2: Integer overflow in transport read resulting in out of bounds write libssh2: Integer overflow in keyboard interactive handling resulting in out of bounds write libssh2: Integer overflow in SSH packet processing channel resulting in out of bounds write libssh2: Integer overflow in user authenticate keyboard interactive allows out-of-bounds writes
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | 7.5 | null |
RHSA-2023:1333
|
Red Hat Security Advisory: firefox security update
|
Mozilla: Incorrect code generation during JIT compilation Mozilla: Potential out-of-bounds when accessing throttled streams Mozilla: Invalid downcast in Worklets Mozilla: URL being dragged from a removed cross-origin iframe into the same tab triggered navigation Mozilla: Memory safety bugs fixed in Firefox 111 and Firefox ESR 102.9
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 8.8 | null | null |
RHSA-2011:0259
|
Red Hat Security Advisory: flash-plugin - 1-Month End Of Life Notice
|
The flash-plugin package on Red Hat Enterprise Linux 4 contains multiple
security flaws and should no longer be used. This is the 1-month
notification of Red Hat's plans to disable Adobe Flash Player 9 on Red Hat
Enterprise Linux 4.
The Red Hat Security Response Team has rated this update as having critical
security impact.
|
[
"cpe:/a:redhat:rhel_extras:4"
] | null | null | null | null |
RHSA-2020:4806
|
Red Hat Security Advisory: dpdk security, bug fix, and enhancement update
|
dpdk: librte_vhost Integer overflow in vhost_user_set_log_base() dpdk: librte_vhost Integer truncation in vhost_user_check_and_alloc_queue_pair() dpdk: librte_vhost Malicious guest could cause segfault by sending invalid Virtio descriptor dpdk: librte_vhost VHOST_USER_GET_INFLIGHT_FD message flooding to result in a DoS
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 4.4 | null | null |
RHSA-2025:2517
|
Red Hat Security Advisory: kernel security update
|
kernel: can: bcm: Fix UAF in bcm_proc_show() kernel: HID: core: zero-initialize the report buffer kernel: ALSA: usb-audio: Fix potential out-of-bound accesses for Extigy and Mbox devices
|
[
"cpe:/o:redhat:rhel_els:6"
] | null | 5.8 | null | null |
RHSA-2022:7592
|
Red Hat Security Advisory: python39:3.9 and python39-devel:3.9 security update
|
python: mailcap: findmatch() function does not sanitize the second argument
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb"
] | null | 7.6 | null | null |
RHSA-2004:635
|
Red Hat Security Advisory: ruby security update
|
security flaw
|
[
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws"
] | null | null | null | null |
RHSA-2024:1393
|
Red Hat Security Advisory: ovn22.03 security update
|
ovn: insufficient validation of BFD packets may lead to denial of service
|
[
"cpe:/o:redhat:enterprise_linux:9::fastdatapath"
] | null | 6.5 | null | null |
RHSA-2021:0738
|
Red Hat Security Advisory: nodejs:10 security update
|
nodejs: HTTP2 'unknownProtocol' cause DoS by resource exhaustion nodejs: DNS rebinding in --inspect
|
[
"cpe:/a:redhat:rhel_eus:8.2::appstream"
] | null | 7.5 | null | null |
RHSA-2018:3507
|
Red Hat Security Advisory: 389-ds-base security and bug fix update
|
389-ds-base: Mishandled search requests in servers/slapd/search.c:do_search() allows for denial of service
|
[
"cpe:/o:redhat:rhel_eus:7.5::computenode",
"cpe:/o:redhat:rhel_eus:7.5::server"
] | null | null | 7.5 | null |
RHSA-2024:9572
|
Red Hat Security Advisory: libsoup security update
|
libsoup: HTTP request smuggling via stripping null bytes from the ends of header names
|
[
"cpe:/a:redhat:rhel_eus:9.4::appstream"
] | null | 7.5 | null | null |
RHSA-2008:0599
|
Red Hat Security Advisory: seamonkey security update
|
mozilla: CSS reference counter overflow (ZDI-CAN-349)
|
[
"cpe:/o:redhat:enterprise_linux:2.1::as",
"cpe:/o:redhat:enterprise_linux:2.1::aw",
"cpe:/o:redhat:enterprise_linux:2.1::es",
"cpe:/o:redhat:enterprise_linux:2.1::ws",
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws",
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2024:2245
|
Red Hat Security Advisory: buildah security update
|
golang: net/http/internal: Denial of Service (DoS) via Resource Consumption via HTTP requests golang: crypto/tls: Timing Side Channel attack in RSA based TLS key exchanges.
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 7.5 | null | null |
RHSA-2023:0812
|
Red Hat Security Advisory: firefox security update
|
Mozilla: Content security policy leak in violation reports using iframes Mozilla: Extensions could have opened external schemes without user knowledge Mozilla: Screen hijack via browser fullscreen mode Mozilla: Out of bounds memory write from EncodeInputStream Mozilla: Potential use-after-free from compartment mismatch in SpiderMonkey Mozilla: Invalid downcast in SVGUtils::SetupStrokeGeometry Mozilla: Use-after-free in mozilla::dom::ScriptLoadContext::~ScriptLoadContext Mozilla: Web Crypto ImportKey crashes tab Mozilla: Fullscreen notification not shown in Firefox Focus Mozilla: Memory safety bugs fixed in Firefox 110 and Firefox ESR 102.8 Mozilla: Memory safety bugs fixed in Firefox ESR 102.8
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 8.8 | null | null |
RHSA-2010:0451
|
Red Hat Security Advisory: Red Hat Certificate System 7.1 - End of Life Notice
|
This is the notification of the End of Life plans for Red Hat Certificate
System 7.1.
|
[] | null | null | null | null |
RHSA-2015:0870
|
Red Hat Security Advisory: kernel security update
|
kernel: infiniband: uverbs: unprotected physical memory access
|
[
"cpe:/o:redhat:rhel_eus:5.9"
] | null | null | null | null |
RHSA-2017:3071
|
Red Hat Security Advisory: ntp security update
|
ntp: Buffer Overflow in DPTS Clock ntp: Authenticated DoS via Malicious Config Option ntp: Denial of Service via Malformed Config
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | 5.3 | null |
RHSA-2015:0773
|
Red Hat Security Advisory: Red Hat JBoss Data Grid 6.4.1 update
|
OpenJDK: XML parsing Denial of Service (JAXP, 8017298) RESTeasy: External entities expanded by DocumentProvider Weld: Limited information disclosure via stale thread state wss4j: Apache WSS4J is vulnerable to Bleichenbacher's attack (incomplete fix for CVE-2011-2487) wss4j: Apache WSS4J doesn't correctly enforce the requireSignedEncryptedDataElements property
|
[
"cpe:/a:redhat:jboss_data_grid:6.4.1"
] | null | null | null | null |
RHSA-2017:3264
|
Red Hat Security Advisory: java-1.8.0-ibm security update
|
lcms2: Out-of-bounds read in Type_MLU_Read() OpenJDK: multiple unbounded memory allocations in deserialization (Serialization, 8174109) OpenJDK: incorrect privilege use when handling unreferenced objects (RMI, 8174966) OpenJDK: HTTP client insufficient check for newline in URLs (Networking, 8176751) JDK: unspecified vulnerability fixed in 8u151 and 9.0.1 (Deployment) OpenJDK: unbounded resource use in JceKeyStore deserialization (Serialization, 8181370) OpenJDK: insufficient loader constraints checks for invokespecial (Hotspot, 8180711) OpenJDK: unbounded memory allocation in SimpleTimeZone deserialization (Serialization, 8181323) OpenJDK: multiple unbounded memory allocations in deserialization (Libraries, 8181432) OpenJDK: unbounded memory allocation in PredicatedNodeTest deserialization (JAXP, 8181327) OpenJDK: unbounded memory allocation in JAXWSExceptionBase deserialization (JAX-WS, 8181100) OpenJDK: no default network operations timeouts in FtpClient (Networking, 8181612) OpenJDK: weak protection of key stores against brute forcing (Security, 8181692) OpenJDK: unbounded memory allocation in ObjectInputStream deserialization (Serialization, 8181597) OpenJDK: use of unprotected sname in Kerberos client (Libraries, 8178794)
|
[
"cpe:/a:redhat:rhel_extras:7"
] | null | null | 6.8 | null |
RHSA-2024:0190
|
Red Hat Security Advisory: Red Hat OpenStack Platform 17.1 (GitPython) security update
|
GitPython: Blind local file inclusion
|
[
"cpe:/a:redhat:openstack:17.1::el8"
] | null | 5.1 | null | null |
RHSA-2025:2454
|
Red Hat Security Advisory: OpenShift Container Platform 4.15.47 bug fix and security update
|
buildah: Buildah allows arbitrary directory mount Podman: Buildah: CRI-O: symlink traversal vulnerability in the containers/storage library can cause Denial of Service (DoS) bind: bind9: Many records in the additional section cause CPU exhaustion podman: buildah: Container breakout by using --jobs=2 and a race condition when building a malicious Containerfile kernel: HID: core: zero-initialize the report buffer
|
[
"cpe:/a:redhat:openshift:4.15::el8",
"cpe:/a:redhat:openshift:4.15::el9"
] | null | 6.1 | null | null |
RHBA-2019:0959
|
Red Hat Bug Fix Advisory: OpenShift Container Platform 3.11 images update
|
xterm.js: Mishandling of special characters allows for remote code execution
|
[
"cpe:/a:redhat:openshift:3.11::el7"
] | null | null | 7.5 | null |
RHSA-2009:0355
|
Red Hat Security Advisory: evolution and evolution-data-server security update
|
evolution-data-server: S/MIME signatures are considered to be valid even for modified messages (MITM) evolution-data-server: insufficient checking of NTLM authentication challenge packets evolution-data-server: integer overflow in base64 encoding functions
|
[
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2020:1635
|
Red Hat Security Advisory: gdb security and bug fix update
|
gdb: buffer overflow while opening an ELF for debugging leads to Dos, information dislosure and code execution
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | null | 6.1 | null |
RHSA-2022:6176
|
Red Hat Security Advisory: firefox security update
|
Mozilla: Address bar spoofing via XSLT error handling Mozilla: Cross-origin XSLT Documents would have inherited the parent's permissions Mozilla: Data race and potential use-after-free in PK11_ChangePW Mozilla: Memory safety bugs fixed in Firefox 104 and Firefox ESR 102.2 Mozilla: Memory safety bugs fixed in Firefox 104, Firefox ESR 102.2, and Firefox ESR 91.13
|
[
"cpe:/a:redhat:rhel_eus:8.4::appstream"
] | null | 8.8 | 7.5 | null |
RHSA-2020:2732
|
Red Hat Security Advisory: openstack-keystone security update
|
openstack-keystone: EC2 and credential endpoints are not protected from a scoped context openstack-keystone: Credentials endpoint policy logic allows changing credential owner and target project ID openstack-keystone: failure to check signature TTL of the EC2 credential auth method
|
[
"cpe:/a:redhat:openstack:13::el7"
] | null | 5.4 | null | null |
RHSA-2020:3118
|
Red Hat Security Advisory: samba security update
|
samba: NULL pointer de-reference and use-after-free in Samba AD DC LDAP Server with ASQ, VLV and paged_results
|
[
"cpe:/a:redhat:storage:3.5:samba:el7"
] | null | 0 | null | null |
RHSA-2022:5236
|
Red Hat Security Advisory: kernel-rt security and bug fix update
|
kernel: race condition in perf_event_open leads to privilege escalation kernel: netfilter: nf_tables: incorrect NFT_STATEFUL_EXPR check leads to a use-after-free (write) kernel: a use-after-free write in the netfilter subsystem can lead to privilege escalation to root
|
[
"cpe:/a:redhat:rhel_extras_rt:7"
] | null | 7.8 | null | null |
RHSA-2021:0994
|
Red Hat Security Advisory: thunderbird security update
|
Mozilla: Angle graphics library out of date Mozilla: Texture upload into an unbound backing buffer resulted in an out-of-bound read Mozilla: Internal network hosts could have been probed by a malicious webpage Mozilla: Malicious extensions could have spoofed popup information Mozilla: Memory safety bugs fixed in Firefox 87 and Firefox ESR 78.9
|
[
"cpe:/a:redhat:rhel_eus:8.2::appstream"
] | null | 8.8 | 6.1 | null |
RHSA-2014:1876
|
Red Hat Security Advisory: java-1.7.0-ibm security update
|
JDK: privilege escalation via shared class cache SSL/TLS: Padding Oracle On Downgraded Legacy Encryption attack JDK: unspecified vulnerability fixed in 6u85, 7u71 and 8u25 (Deployment) JDK: unspecified vulnerability fixed in 7u71 and 8u25 (Deployment) OpenJDK: Triple Handshake attack against TLS/SSL connections (JSSE, 8037066) JDK: unspecified vulnerability fixed in 6u85, 7u71 and 8u25 (Deployment) JDK: unspecified vulnerability fixed in 7u71 and 8u25 (Deployment) JDK: unspecified vulnerability fixed in 6u85, 7u71 and 8u25 (Deployment) JDK: unspecified vulnerability fixed in 6u85, 7u71 and 8u25 (Deployment) OpenJDK: LogRecord use of incorrect CL when loading ResourceBundle (Libraries, 8042797) JDK: unspecified vulnerability fixed in 6u85, 7u71 and 8u25 (Deployment) OpenJDK: insufficient permission checks when setting resource bundle on system logger (Libraries, 8041564) ICU: Layout Engine ContextualSubstitution missing boundary checks (JDK 2D, 8041540) OpenJDK: DatagramSocket connected socket missing source check (Libraries, 8039509) JDK: unspecified vulnerability fixed in 6u85, 7u71 and 8u25 (Deployment) JDK: unspecified vulnerability fixed in 7u71 and 8u25 (Deployment) OpenJDK: insufficient ResourceBundle name check (Libraries, 8044274) JDK: unspecified vulnerability fixed in 6u85, 7u71 and 8u25 (Deployment) OpenJDK: CipherInputStream incorrect exception handling (Security, 8037846)
|
[
"cpe:/a:redhat:rhel_extras:5::client",
"cpe:/a:redhat:rhel_extras:5::server"
] | null | null | null | null |
RHSA-2020:2594
|
Red Hat Security Advisory: OpenShift Container Platform 4.2.36 openshift security update
|
kubernetes: Server side request forgery (SSRF) in kube-controller-manager allows users to leak secret information
|
[
"cpe:/a:redhat:openshift:4.2::el7",
"cpe:/a:redhat:openshift:4.2::el8"
] | null | 6.3 | null | null |
RHSA-2024:8876
|
Red Hat Security Advisory: go-toolset:rhel8 security update
|
golang: net/netip: Unexpected behavior from Is methods for IPv4-mapped IPv6 addresses
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 6.7 | null | null |
RHSA-2013:0202
|
Red Hat Security Advisory: rubygem-activesupport security update
|
rubygem-activesupport: json to yaml parsing
|
[
"cpe:/a:redhat:openshift:1::el6"
] | null | null | null | null |
RHSA-2023:1594
|
Red Hat Security Advisory: tigervnc and xorg-x11-server security update
|
xorg-x11-server: X.Org Server Overlay Window Use-After-Free Local Privilege Escalation Vulnerability
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 7.8 | null | null |
RHSA-2013:1605
|
Red Hat Security Advisory: glibc security, bug fix, and enhancement update
|
glibc: Buffer overrun (DoS) in regexp matcher by processing multibyte characters glibc: Stack (frame) overflow in getaddrinfo() when processing entry mapping to long list of address structures glibc: three integer overflows in memory allocator
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2022:1199
|
Red Hat Security Advisory: kernel-rt security and bug fix update
|
kernel: use-after-free in RDMA listen() kernel: fget: check that the fd still exists after getting a ref to it
|
[
"cpe:/a:redhat:rhel_extras_rt:7"
] | null | 7.4 | null | null |
RHSA-2022:5527
|
Red Hat Security Advisory: squid security update
|
squid: DoS when processing gopher server responses
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 7.5 | null | null |
RHSA-2018:2216
|
Red Hat Security Advisory: kernel security and bug fix update
|
hw: cpu: speculative store bypass
|
[
"cpe:/o:redhat:rhel_aus:7.2::server",
"cpe:/o:redhat:rhel_e4s:7.2::server",
"cpe:/o:redhat:rhel_tus:7.2::server"
] | null | null | 5.6 | null |
RHSA-2014:1818
|
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 6.3.2 update
|
OpenJDK: XML parsing Denial of Service (JAXP, 8017298)
|
[
"cpe:/a:redhat:jboss_enterprise_application_platform:6::el6"
] | null | null | null | null |
RHSA-2022:4990
|
Red Hat Security Advisory: cups security update
|
cups: authorization bypass when using "local" authorization
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/o:redhat:enterprise_linux:9::baseos"
] | null | 6.7 | null | null |
RHSA-2021:1547
|
Red Hat Security Advisory: .NET Core 3.1 on Red Hat Enterprise Linux security and bugfix update
|
dotnet: .NET Core single-file application privilege escalation
|
[
"cpe:/a:redhat:rhel_dotnet:3.1::el7"
] | null | 7.3 | null | null |
RHSA-2023:6138
|
Red Hat Security Advisory: Migration Toolkit for Runtimes security update
|
plexus-archiver: Arbitrary File Creation in AbstractUnArchiver
|
[
"cpe:/a:redhat:migration_toolkit_runtimes:1.0::el8"
] | null | 8.1 | null | null |
RHSA-2021:0154
|
Red Hat Security Advisory: dnsmasq security update
|
dnsmasq: loose address/port check in reply_query() makes forging replies easier for an off-path attacker dnsmasq: loose query name check in reply_query() makes forging replies easier for an off-path attacker dnsmasq: multiple queries forwarded for the same name makes forging replies easier for an off-path attacker
|
[
"cpe:/o:redhat:rhel_eus:7.7::computenode",
"cpe:/o:redhat:rhel_eus:7.7::server"
] | null | 4 | null | null |
RHSA-2018:1252
|
Red Hat Security Advisory: kernel security and bug fix update
|
kernel: exec/ptrace: get_dumpable() incorrect tests hw: cpu: speculative execution branch target injection
|
[
"cpe:/o:redhat:rhel_aus:5.9"
] | null | null | 5.6 | null |
RHSA-2022:6386
|
Red Hat Security Advisory: openvswitch2.17 security update
|
dpdk: DoS when a Vhost header crosses more than two descriptors and exhausts all mbufs
|
[
"cpe:/o:redhat:enterprise_linux:9::fastdatapath"
] | null | 8.6 | null | null |
RHSA-2020:3598
|
Red Hat Security Advisory: kernel security and bug fix update
|
kernel: kernel: DAX hugepages not considered during mremap
|
[
"cpe:/o:redhat:rhel_eus:7.7::computenode",
"cpe:/o:redhat:rhel_eus:7.7::server"
] | null | 7 | null | null |
RHSA-2014:1338
|
Red Hat Security Advisory: openstack-glance security and bug fix update
|
openstack-glance: Glance store disk space exhaustion
|
[
"cpe:/a:redhat:openstack:5::el6"
] | null | null | null | null |
RHSA-2012:1208
|
Red Hat Security Advisory: glibc security update
|
glibc: Integer overflows, leading to stack-based buffer overflows in strto* related routines
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2014:1870
|
Red Hat Security Advisory: libXfont security update
|
libXfont: integer overflow of allocations in font metadata file parsing libXfont: unvalidated length fields when parsing xfs protocol replies libXfont: integer overflows calculating memory needs for xfs replies
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation",
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | null | null |
RHSA-2024:0675
|
Red Hat Security Advisory: gimp security update
|
gimp: dds buffer overflow RCE gimp: PSD buffer overflow RCE gimp: psp integer overflow RCE gimp: psp off-by-one RCE
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 7.8 | null | null |
RHSA-2022:1179
|
Red Hat Security Advisory: Red Hat support for Spring Boot 2.5.10 update
|
undertow: HTTP2SourceChannel fails to write final frame under some circumstances may lead to DoS undertow: potential security issue in flow control over HTTP/2 may lead to DOS wildfly-elytron: possible timing attack in ScramServer undertow: client side invocation timeout raised when calling over HTTP2 resteasy: Error message exposes endpoint class information tomcat: JNDI realm authentication weakness tomcat: HTTP request smuggling when used with a reverse proxy tomcat: Infinite loop while reading an unexpected TLS packet when using OpenSSL JSSE engine tomcat: OutOfMemoryError caused by HTTP upgrade connection leak could lead to DoS
|
[
"cpe:/a:redhat:openshift_application_runtimes:1.0"
] | null | 7.5 | null | null |
RHSA-2019:2285
|
Red Hat Security Advisory: keepalived security and bug fix update
|
keepalived: Improper pathname validation allows for overwrite of arbitrary filenames via symlinks
|
[
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 7 | null |
RHSA-2019:4023
|
Red Hat Security Advisory: samba security and bug fix update
|
samba: Combination of parameters and permissions can allow user to escape from the share path definition
|
[
"cpe:/a:redhat:storage:3.5:samba:el6"
] | null | null | 6.5 | null |
RHSA-2014:1606
|
Red Hat Security Advisory: file security and bug fix update
|
file: out of bounds read in CDF parser file: cdf_unpack_summary_info() excessive looping DoS file: CDF property info parsing nelements infinite loop file: unrestricted recursion in handling of indirect type rules file: out-of-bounds access in search rules with offsets from input file file: cdf_check_stream_offset insufficient boundary check file: cdf_count_chain insufficient boundary check
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2020:4154
|
Red Hat Security Advisory: Red Hat AMQ Broker 7.4.5 release and security update
|
Console: HTTPOnly and Secure attributes not set on cookies in Red Hat AMQ hawtio: server side request forgery via initial /proxy/ substring of a URI activemq: LDAP authentication bypass with anonymous bind
|
[
"cpe:/a:redhat:amq_broker:7"
] | null | 8.1 | 5.5 | null |
RHSA-2023:5244
|
Red Hat Security Advisory: kernel security, bug fix, and enhancement update
|
kernel: save/restore speculative MSRs during S3 suspend/resume Kernel: bluetooth: Unauthorized management command execution kernel: ipvlan: out-of-bounds write caused by unclear skb->cb kernel: UAF in nftables when nft_set_lookup_global triggered after handling named and anonymous sets in batch requests kernel: net/sched: cls_fw component can be exploited as result of failure in tcf_change_indev function kernel: netfilter: use-after-free due to improper element removal in nft_pipapo_remove() hw: amd: Cross-Process Information Leak kernel: nf_tables: stack-out-of-bounds-read in nft_byteorder_eval() kernel: cls_flower: out-of-bounds write in fl_set_geneve_opt() kernel: buffer overflow in ceph file net/ceph/messenger_v2.c
|
[
"cpe:/a:redhat:enterprise_linux:8::crb",
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 8.8 | null | null |
RHSA-2024:2888
|
Red Hat Security Advisory: thunderbird security update
|
Mozilla: Arbitrary JavaScript execution in PDF.js Mozilla: IndexedDB files retained in private browsing mode Mozilla: Potential permissions request bypass via clickjacking Mozilla: Cross-origin responses could be distinguished between script and non-script content-types Mozilla: Use-after-free could occur when printing to PDF Mozilla: Memory safety bugs fixed in Firefox 126, Firefox ESR 115.11, and Thunderbird 115.11
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 6.1 | null | null |
RHSA-2012:1174
|
Red Hat Security Advisory: kernel security and bug fix update
|
kernel: unfiltered netdev rio_ioctl access by users
|
[
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2013:1860
|
Red Hat Security Advisory: kernel security and bug fix update
|
kernel: dm: dm-snapshot data leak
|
[
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2020:1358
|
Red Hat Security Advisory: virt:rhel security and bug fix update
|
QEMU: block: iscsi: OOB heap access via an unexpected response of iSCSI Server QEMU: slirp: OOB buffer access while emulating tcp protocols in tcp_emu()
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb"
] | null | 5.6 | null | null |
RHSA-2021:4646
|
Red Hat Security Advisory: kernel-rt security and bug fix update
|
kernel: timer tree corruption leads to missing wakeup and system freeze kernel: Insufficient validation of user-supplied sizes for the MSG_CRYPTO message type
|
[
"cpe:/a:redhat:enterprise_linux:8::nfv",
"cpe:/a:redhat:enterprise_linux:8::realtime"
] | null | 8.8 | null | null |
RHSA-2022:4875
|
Red Hat Security Advisory: firefox security update
|
Mozilla: Cross-Origin resource's length leaked Mozilla: Heap buffer overflow in WebGL Mozilla: Browser window spoof using fullscreen mode Mozilla: Register allocation problem in WASM on arm64 Mozilla: Uninitialized variable leads to invalid memory read Mozilla: Querying a WebAuthn token with a large number of allowCredential entries may have leaked cross-origin information Mozilla: Memory safety bugs fixed in Firefox 101 and Firefox ESR 91.10
|
[
"cpe:/a:redhat:rhel_eus:8.4::appstream"
] | null | 9.8 | 6.1 | null |
RHSA-2016:1640
|
Red Hat Security Advisory: kernel security and bug fix update
|
kernel: infiniband: Unprivileged process can overwrite kernel memory using rdma_ucm.ko
|
[
"cpe:/o:redhat:rhel_eus:6.6::computenode",
"cpe:/o:redhat:rhel_eus:6.6::server"
] | null | null | 7.8 | null |
RHSA-2013:1193
|
Red Hat Security Advisory: jbossweb security update
|
Tomcat/JBossWeb: Arbitrary file upload via deserialization
|
[
"cpe:/a:redhat:jboss_enterprise_application_platform:6::el5",
"cpe:/a:redhat:jboss_enterprise_application_platform:6::el6"
] | null | null | null | null |
RHSA-2021:0975
|
Red Hat Security Advisory: pki-core security update
|
pki-core: Reflected XSS in 'path length' constraint field in CA's Agent page pki-core/pki-kra: Reflected XSS in recoveryID search field at KRA's DRM agent page in authorize recovery tab pki-core: Reflected XSS in getcookies?url= endpoint in CA pki-core: KRA vulnerable to reflected XSS via the getPk12 page pki-core: XSS in the certificate search results pki-core: Unprivileged users can renew any certificate
|
[
"cpe:/o:redhat:rhel_eus:7.7::computenode",
"cpe:/o:redhat:rhel_eus:7.7::server"
] | null | 8.1 | 4.7 | null |
RHSA-2017:0698
|
Red Hat Security Advisory: subscription-manager security, bug fix, and enhancement update
|
subscription-manager: sensitive world readable files in /var/lib/rhsm/
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | 3.3 | null |
RHSA-2021:1246
|
Red Hat Security Advisory: gnutls and nettle security update
|
nettle: Out of bounds memory access in signature verification
|
[
"cpe:/a:redhat:rhel_eus:8.2::appstream",
"cpe:/o:redhat:rhel_eus:8.2::baseos"
] | null | 8.1 | null | null |
RHSA-2012:0796
|
Red Hat Security Advisory: rsyslog security, bug fix, and enhancement update
|
rsyslog: DoS due integer signedness error while extending rsyslog counted string buffer
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2024:10593
|
Red Hat Security Advisory: postgresql:16 security update
|
postgresql: PostgreSQL PL/Perl environment variable changes execute arbitrary code
|
[
"cpe:/a:redhat:rhel_eus:9.4::appstream"
] | null | 8.8 | null | null |
RHSA-2024:6412
|
Red Hat Security Advisory: OpenShift Container Platform 4.14.36 security update
|
golang: math/big: uncontrolled memory consumption due to an unhandled overflow via Rat.SetString haproxy: untrimmed URI fragments may lead to exposure of confidential data on static servers
|
[
"cpe:/a:redhat:openshift:4.14::el8",
"cpe:/a:redhat:openshift:4.14::el9"
] | null | 5.3 | null | null |
RHSA-2013:1537
|
Red Hat Security Advisory: augeas security, bug fix, and enhancement update
|
augeas: susceptible to symlink attack augeas: susceptible to mountpoint attack
|
[
"cpe:/a:redhat:enterprise_linux:6::hypervisor",
"cpe:/a:redhat:storage:3:server:el6",
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2020:0914
|
Red Hat Security Advisory: thunderbird security update
|
usrsctp: Out of bounds reads in sctp_load_addresses_from_init() Mozilla: Use-after-free when removing data about origins Mozilla: BodyStream:: OnInputStreamReady was missing protections against state confusion Mozilla: Use-after-free in cubeb during stream destruction Mozilla: Devtools' 'Copy as cURL' feature did not fully escape website-controlled data, potentially leading to command injection Mozilla: The names of AirPods with personally identifiable information were exposed to websites with camera or microphone permission Mozilla: Memory safety bugs fixed in Firefox 74 and Firefox ESR 68.6
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | 9.8 | 6.1 | null |
RHSA-2018:1195
|
Red Hat Security Advisory: chromium-browser security update
|
chromium-browser: Use after free in Disk Cache chromium-browser: Use after free in Disk Cache chromium-browser: Use after free in WebAssembly chromium-browser: Use after free in PDFium chromium-browser: Same origin policy bypass in Service Worker chromium-browser: Heap buffer overflow in Skia chromium-browser: Incorrect handling of plug-ins by Service Worker chromium-browser: Integer overflow in WebAssembly chromium-browser: Same origin bypass in Service Worker chromium-browser: Exploit hardening regression in Oilpan chromium-browser: Lack of meaningful user interaction requirement before file upload chromium-browser: Fullscreen UI spoof chromium-browser: Fullscreen UI spoof chromium-browser: URL spoof in Omnibox chromium-browser: CORS bypass in ServiceWorker chromium-browser: URL spoof in Omnibox chromium-browser: Insufficient protection of remote debugging prototol in DevTools chromium-browser: URL spoof in Omnibox chromium-browser: UI spoof in Permissions chromium-browser: URL spoof in Omnibox chromium-browser: URL spoof in Omnibox chromium-browser: Incorrect handling of promises in V8 chromium-browser: URL spoof in Omnibox chromium-browser: URL spoof in Omnibox chromium-browser: Incorrect handling of files by FileAPI chromium-browser: Incorrect handling of plaintext files via file:// chromium-browser: Heap-use-after-free in DevTools chromium-browser: Incorrect URL handling in DevTools chromium-browser: URL spoof in Navigation chromium-browser: CSP bypass chromium-browser: Incorrect low memory handling in WebAssembly chromium-browser: Confusing autofill settings
|
[
"cpe:/a:redhat:rhel_extras:6"
] | null | null | 4.3 | null |
RHSA-2002:223
|
Red Hat Security Advisory: : Updated ypserv packages fixes memory leak
|
security flaw
|
[
"cpe:/o:redhat:linux:6.2",
"cpe:/o:redhat:linux:7.0",
"cpe:/o:redhat:linux:7.1",
"cpe:/o:redhat:linux:7.2",
"cpe:/o:redhat:linux:7.3"
] | null | null | null | null |
RHSA-2017:2560
|
Red Hat Security Advisory: Red Hat Certificate System 8 security, bug fix, and enhancement update
|
8: Enrolling certificate without certreq field causes CA to crash
|
[
"cpe:/a:redhat:certificate_system:8::el5"
] | null | null | 3.5 | null |
RHSA-2025:0907
|
Red Hat Security Advisory: ACS 4.6.2 enhancement and security update
|
golang.org/x/net/html: Non-linear parsing of case-insensitive content in golang.org/x/net/html go-git: argument injection via the URL field go-git: go-git clients vulnerable to DoS via maliciously crafted Git server replies
|
[
"cpe:/a:redhat:advanced_cluster_security:4.6::el8"
] | null | 7.5 | null | null |
RHSA-2024:1905
|
Red Hat Security Advisory: firefox security update
|
Mozilla: Permission prompt input delay could expire when not in focus Mozilla: Denial of Service using HTTP/2 CONTINUATION frames Mozilla: GetBoundName in the JIT returned the wrong object Mozilla: Out-of-bounds-read after mis-optimized switch statement Mozilla: Incorrect JITting of arguments led to use-after-free during garbage collection Mozilla: Integer-overflow led to out-of-bounds-read in the OpenType sanitizer Mozilla: Potential use-after-free due to AlignedBuffer self-move Mozilla: Memory safety bug fixed in Firefox 125, Firefox ESR 115.10, and Thunderbird 115.10
|
[
"cpe:/a:redhat:rhel_eus:9.2::appstream"
] | null | 7.5 | null | null |
RHSA-2018:2284
|
Red Hat Security Advisory: yum-utils security update
|
yum-utils: reposync: improper path validation may lead to directory traversal
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | 8.8 | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.