id
stringlengths 13
15
| title
stringlengths 29
176
| description
stringlengths 8
32.1k
| cpes
listlengths 0
20
| cvss_v4_0
null | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
null |
---|---|---|---|---|---|---|---|
RHSA-2025:3169
|
Red Hat Security Advisory: libreoffice security update
|
libreoffice: Macro URL arbitrary script execution
|
[
"cpe:/a:redhat:rhel_eus:8.8::appstream",
"cpe:/a:redhat:rhel_eus:8.8::crb"
] | null | 7.6 | null | null |
RHSA-2019:3132
|
Red Hat Security Advisory: OpenShift Container Platform 4.1.20 openshift security update
|
kubernetes: YAML parsing vulnerable to "Billion Laughs" attack, allowing for remote denial of service
|
[
"cpe:/a:redhat:openshift:4.1::el7",
"cpe:/a:redhat:openshift:4.1::el8"
] | null | null | 7.5 | null |
RHSA-2023:1596
|
Red Hat Security Advisory: httpd:2.4 security update
|
httpd: HTTP request splitting with mod_rewrite and mod_proxy
|
[
"cpe:/a:redhat:rhel_eus:8.4::appstream"
] | null | 9.8 | null | null |
RHSA-2016:1034
|
Red Hat Security Advisory: docker security, bug fix, and enhancement update
|
docker: privilege escalation via confusion of usernames and UIDs
|
[
"cpe:/a:redhat:rhel_extras_other:7"
] | null | null | null | null |
RHSA-2007:0559
|
Red Hat Security Advisory: cman security update
|
possible buffer overflow could cause local DoS by crashing cman
|
[
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2004:418
|
Red Hat Security Advisory: kernel security update
|
security flaw security flaw security flaw
|
[
"cpe:/o:redhat:enterprise_linux:2.1::as",
"cpe:/o:redhat:enterprise_linux:2.1::es",
"cpe:/o:redhat:enterprise_linux:2.1::ws"
] | null | null | null | null |
RHSA-2024:0231
|
Red Hat Security Advisory: OpenJDK 11.0.22 security update
|
OpenJDK: array out-of-bounds access due to missing range check in C1 compiler (8314468) OpenJDK: JVM class file verifier flaw allows unverified bytecode execution (8314295) OpenJDK: range check loop optimization issue (8314307) OpenJDK: arbitrary Java code execution in Nashorn (8314284) OpenJDK: logging of digital signature private keys (8316976) OpenJDK: RSA padding issue and timing side-channel attack against TLS (8317547)
|
[
"cpe:/a:redhat:openjdk:11"
] | null | 7.4 | null | null |
RHSA-2018:1843
|
Red Hat Security Advisory: Red Hat JBoss Core Services Apache HTTP Server 2.4.23 security update
|
isapi_redirect: Mishandled HTTP request paths in jk_isapi_plugin.c can lead to unintended exposure of application resources via the reverse proxy
|
[
"cpe:/a:redhat:jboss_core_services:1"
] | null | null | 7.5 | null |
RHSA-2023:5239
|
Red Hat Security Advisory: virt:rhel and virt-devel:rhel security update
|
NTFS-3G: buffer overflow issue in NTFS-3G can cause code execution via crafted metadata in an NTFS image QEMU: VNC: improper I/O watch removal in TLS handshake can lead to remote unauthenticated denial of service
|
[
"cpe:/a:redhat:rhel_e4s:8.1::appstream"
] | null | 7.5 | null | null |
RHSA-2017:3368
|
Red Hat Security Advisory: qemu-kvm security update
|
Qemu: i386: multiboot OOB access while loading kernel image Qemu: cirrus: OOB access issue in mode4and5 write functions
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 4.4 | null |
RHSA-2017:1485
|
Red Hat Security Advisory: kernel security update
|
kernel: heap/stack gap jumping via unbounded stack allocations kernel: Incorrectly mapped contents of PIE executable
|
[
"cpe:/o:redhat:rhel_eus:7.2::computenode",
"cpe:/o:redhat:rhel_eus:7.2::server"
] | null | null | 2.9 | null |
RHSA-2018:1777
|
Red Hat Security Advisory: procps security update
|
procps: Integer overflows leading to heap overflow in file2strvec procps: incorrect integer size in proc/alloc.* leading to truncation / integer overflow issues
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | 4.8 | null |
RHEA-2024:11005
|
Red Hat Enhancement Advisory: Errata Advisory for Red Hat OpenShift GitOps v1.15.0
|
word-wrap: ReDoS
|
[
"cpe:/a:redhat:openshift_gitops:1.15::el8",
"cpe:/a:redhat:openshift_gitops:1.15::el9"
] | null | 7.5 | null | null |
RHSA-2024:8859
|
Red Hat Security Advisory: xmlrpc-c security update
|
libexpat: Integer Overflow or Wraparound
|
[
"cpe:/a:redhat:enterprise_linux:8::crb",
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 7.5 | null | null |
RHSA-2024:2193
|
Red Hat Security Advisory: podman security update
|
golang: net/http/internal: Denial of Service (DoS) via Resource Consumption via HTTP requests golang: crypto/tls: Timing Side Channel attack in RSA based TLS key exchanges.
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 7.5 | null | null |
RHSA-2024:8846
|
Red Hat Security Advisory: container-tools:rhel8 security update
|
Podman: Buildah: cri-o: FIPS Crypto-Policy Directory Mounting Issue in containers/common Go Library Buildah: Podman: Improper Input Validation in bind-propagation Option of Dockerfile RUN --mount Instruction buildah: Buildah allows arbitrary directory mount
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 7.8 | null | null |
RHSA-2022:1711
|
Red Hat Security Advisory: Red Hat Single Sign-On 7.5.2 security update on RHEL 7
|
keycloak: Privilege escalation vulnerability on Token Exchange
|
[
"cpe:/a:redhat:red_hat_single_sign_on:7.5::el7"
] | null | 8 | null | null |
RHSA-2016:0078
|
Red Hat Security Advisory: bind security update
|
bind: delegation handling denial of service bind: TKEY query handling flaw leading to denial of service bind: malformed DNSSEC key failed assertion denial of service bind: responses with a malformed class attribute can trigger an assertion failure in db.c
|
[
"cpe:/o:redhat:rhel_aus:6.4::server",
"cpe:/o:redhat:rhel_aus:6.5::server"
] | null | null | null | null |
RHSA-2015:1858
|
Red Hat Security Advisory: mod_proxy_fcgi and ceph security and bug fix update
|
httpd: mod_proxy_fcgi handle_headers() buffer over read
|
[
"cpe:/a:redhat:ceph_storage:1.2::centos:6"
] | null | null | null | null |
RHSA-2024:11345
|
Red Hat Security Advisory: gstreamer1-plugins-base security update
|
gstreamer1-plugins-base: GStreamer has a stack-buffer overflow in vorbis_handle_identification_packet gstreamer1-plugins-base: stack-buffer overflow in gst_opus_dec_parse_header gstreamer1-plugins-base: out-of-bounds write in Ogg demuxer
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 9.8 | null | null |
RHSA-2021:0474
|
Red Hat Security Advisory: dotnet security and bugfix update
|
dotnet: certificate chain building recursion Denial of Service
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 6.5 | null | null |
RHSA-2018:2921
|
Red Hat Security Advisory: tomcat security update
|
tomcat: A bug in the UTF-8 decoder can lead to DoS
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 7.5 | null |
RHSA-2020:3634
|
Red Hat Security Advisory: thunderbird security update
|
Mozilla: Attacker-induced prompt for extension installation Mozilla: Use-After-Free when aborting an operation
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 8.8 | null | null |
RHSA-2012:1351
|
Red Hat Security Advisory: thunderbird security update
|
Mozilla: Location object can be shadowed using Object.defineProperty (MFSA 2012-59) Mozilla: Miscellaneous memory safety hazards (rv:10.0.8) (MFSA 2012-74) Mozilla: Some DOMWindowUtils methods bypass security checks (MFSA 2012-77) Mozilla: DOS and crash with full screen and history navigation (MFSA 2012-79) Mozilla: Use-after-free in the IME State Manager (MFSA 2012-87) Mozilla: GetProperty function can bypass security checks (MFSA 2012-81) Mozilla: Spoofing and script injection through location.hash (MFSA 2012-84) Mozilla: Chrome Object Wrapper (COW) does not disallow acces to privileged functions or properties (MFSA 2012-83) Mozilla: top object and location property accessible by plugins (MFSA 2012-82) Mozilla: Use-after-free, buffer overflow, and out of bounds read issues found using Address Sanitizer (MFSA 2012-85) Mozilla: Use-after-free, buffer overflow, and out of bounds read issues found using Address Sanitizer (MFSA 2012-85) Mozilla: Use-after-free, buffer overflow, and out of bounds read issues found using Address Sanitizer (MFSA 2012-85) Mozilla: Use-after-free, buffer overflow, and out of bounds read issues found using Address Sanitizer (MFSA 2012-85) Mozilla: Use-after-free, buffer overflow, and out of bounds read issues found using Address Sanitizer (MFSA 2012-85) Mozilla: Use-after-free, buffer overflow, and out of bounds read issues found using Address Sanitizer (MFSA 2012-85) Mozilla: Chrome Object Wrapper (COW) does not disallow acces to privileged functions or properties (MFSA 2012-83) Mozilla: Heap memory corruption issues found using Address Sanitizer (MFSA 2012-86) Mozilla: Heap memory corruption issues found using Address Sanitizer (MFSA 2012-86) Mozilla: Heap memory corruption issues found using Address Sanitizer (MFSA 2012-86) Mozilla: Heap memory corruption issues found using Address Sanitizer (MFSA 2012-86)
|
[
"cpe:/a:redhat:rhel_productivity:5",
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2024:4635
|
Red Hat Security Advisory: thunderbird security update
|
Mozilla: Race condition in permission assignment Mozilla: Memory corruption in thread creation Mozilla: Memory safety bugs fixed in Firefox 128, Firefox ESR 115.13, and Thunderbird 115.13
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 7.5 | null | null |
RHSA-2021:3723
|
Red Hat Security Advisory: samba security, bug fix and enhancement update
|
samba: Netlogon elevation of privilege vulnerability (Zerologon) samba: Missing handle permissions check in SMB1/2/3 ChangeNotify samba: Unprivileged user can crash winbind samba: Negative idmap cache entries can cause incorrect group entries in the Samba file server process token
|
[
"cpe:/a:redhat:storage:3.5:samba:el7"
] | null | 6.8 | null | null |
RHSA-2022:9029
|
Red Hat Security Advisory: Red Hat Virtualization Host security update [ovirt-4.5.3-3]
|
krb5: integer overflow vulnerabilities in PAC parsing
|
[
"cpe:/o:redhat:rhev_hypervisor:4.4::el8"
] | null | 8.8 | null | null |
RHSA-2005:589
|
Red Hat Security Advisory: gaim security update
|
security flaw
|
[
"cpe:/o:redhat:enterprise_linux:2.1::as",
"cpe:/o:redhat:enterprise_linux:2.1::aw",
"cpe:/o:redhat:enterprise_linux:2.1::es",
"cpe:/o:redhat:enterprise_linux:2.1::ws"
] | null | null | null | null |
RHSA-2014:0113
|
Red Hat Security Advisory: openstack-keystone security update
|
openstack-keystone: unintentional role granting with Keystone LDAP backend
|
[
"cpe:/a:redhat:openstack:3::el6"
] | null | null | null | null |
RHSA-2024:8703
|
Red Hat Security Advisory: container-tools:rhel8 security update
|
buildah: Buildah allows arbitrary directory mount
|
[
"cpe:/a:redhat:rhel_aus:8.6::appstream",
"cpe:/a:redhat:rhel_e4s:8.6::appstream",
"cpe:/a:redhat:rhel_tus:8.6::appstream"
] | null | 7.8 | null | null |
RHSA-2020:0697
|
Red Hat Security Advisory: OpenShift Container Platform 4.1.38 skopeo security update
|
proglottis/gpgme: Use-after-free in GPGME bindings during container image pull
|
[
"cpe:/a:redhat:openshift:4.1::el8"
] | null | 7.5 | null | null |
RHSA-2010:0950
|
Red Hat Security Advisory: apr-util security update
|
apr-util: high memory consumption in apr_brigade_split_line()
|
[
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws",
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server",
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2024:6993
|
Red Hat Security Advisory: kernel security update
|
kernel: virtio-net: Add validation for used length kernel: mISDN: fix possible use-after-free in HFC_cleanup() kernel: hwmon: (w83793) Fix NULL pointer dereference by removing unnecessary structure field kernel: isdn: mISDN: Fix sleeping function called from invalid context kernel: proc/vmcore: fix clearing user buffer by properly using clear_user() kernel: cgroup: cgroup_get_from_id() must check the looked-up kn is a directory kernel: smb: client: fix potential OOBs in smb2_parse_contexts() kernel: uio: Fix use-after-free in uio_open kernel: net: fix possible store tearing in neigh_periodic_work() kernel: bonding: stop the device in bond_setup_by_slave() kernel: scsi: ibmvfc: Remove BUG_ON in the case of an empty event pool kernel: platform/x86: wmi: Fix opening of char device kernel: tunnels: fix out of bounds access when building IPv6 PMTU error kernel: hv_netvsc: Fix race condition between netvsc_probe and netvsc_remove kernel: ext4: avoid allocating blocks from corrupted group in ext4_mb_find_by_goal() kernel: mptcp: fix data re-injection from stale subflow kernel: netfilter: nf_conntrack_h323: Add protection for bmp length out of range kernel: x86/xen: Add some null pointer checking to smp.c kernel: af_unix: Fix garbage collector racing against connect() kernel: netfilter: nf_tables: Fix potential data-race in __nft_obj_type_get() kernel: netfilter: nf_tables: Fix potential data-race in __nft_expr_type_get() kernel: Bluetooth: l2cap: fix null-ptr-deref in l2cap_chan_timeout kernel: netfilter: nf_tables: Fix potential data-race in __nft_flowtable_type_get() kernel: ipv6: fix race condition between ipv6_get_ifaddr and ipv6_del_addr kernel: netfilter: nf_tables: honor table dormant flag from netdev release event path kernel: tty: n_gsm: fix possible out-of-bounds in gsm0_receive() kernel: netfilter: tproxy: bail out if IP has been disabled on the device kernel: net: core: reject skb_copy(_expand) for fraglist GSO skbs kernel: net: sched: sch_multiq: fix possible OOB write in multiq_tune() kernel: cppc_cpufreq: Fix possible null pointer dereference kernel: md: fix resync softlockup when bitmap size is less than array size kernel: cpufreq: exit() callback is optional kernel: net/sched: act_api: fix possible infinite loop in tcf_idr_check_alloc() kernel: udp: Set SOCK_RCU_FREE earlier in udp_lib_get_port() kernel: ppp: reject claimed-as-LCP but actually malformed packets kernel: wifi: mac80211: Avoid address calculations via out of bounds array indexing kernel: drm/amdgpu: avoid using null object of framebuffer kernel: tcp_metrics: validate source addr length
|
[
"cpe:/a:redhat:rhel_eus:8.8::crb",
"cpe:/o:redhat:rhel_eus:8.8::baseos"
] | null | 4.4 | null | null |
RHSA-2023:7712
|
Red Hat Security Advisory: tracker-miners security update
|
tracker-miners: sandbox escape
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 7.5 | null | null |
RHSA-2021:2174
|
Red Hat Security Advisory: glib2 security update
|
glib: integer overflow in g_bytes_new function on 64-bit platforms due to an implicit cast from 64 bits to 32 bits
|
[
"cpe:/o:redhat:rhel_aus:7.4::server",
"cpe:/o:redhat:rhel_e4s:7.4::server",
"cpe:/o:redhat:rhel_tus:7.4::server"
] | null | 9.8 | null | null |
RHSA-2024:5143
|
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.4.18 Security update
|
undertow: LearningPushHandler can lead to remote memory DoS attacks undertow: response write hangs in case of Java 17 TLSv1.3 NewSessionTicket httpd: CONTINUATION frames DoS netty-codec-http: Allocation of Resources Without Limits or Throttling org.bouncycastle: Importing an EC certificate with crafted F2m parameters may lead to Denial of Service bc-java: BouncyCastle vulnerable to a timing variant of Bleichenbacher (Marvin Attack) org.bouncycastle:bcprov-jdk18on: Infinite loop in ED25519 verification in the ScalarUtil class
|
[
"cpe:/a:redhat:jboss_enterprise_application_platform:7.4::el7"
] | null | 7.5 | null | null |
RHSA-2022:6787
|
Red Hat Security Advisory: Red Hat Single Sign-On 7.5.3 security update
|
jackson-databind: denial of service via a large depth of nested objects h2: Remote Code Execution in Console netty: control chars in header names may lead to HTTP request smuggling xnio: org.xnio.StreamConnection.notifyReadClosed log to debug instead of stderr keycloak: Stored XSS in groups dropdown wildfly: Wildfly management of EJB Session context returns wrong caller principal with Elytron Security enabled keycloak: improper input validation permits script injection keycloak: Uploading of SAML javascript protocol mapper scripts through the admin console
|
[
"cpe:/a:redhat:red_hat_single_sign_on:7"
] | null | 6.4 | null | null |
RHSA-2022:8197
|
Red Hat Security Advisory: php security, bug fix, and enhancement update
|
php: Use after free due to php_filter_float() failing for ints php: Uninitialized array in pg_query_params() leading to RCE
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 7 | null | null |
RHSA-2019:1623
|
Red Hat Security Advisory: thunderbird security update
|
libical: Heap buffer over read in icalparser.c parser_get_next_char libical: Heap buffer overflow in icalmemory_strdup_and_dequote function in icalvalue.c libical: Stack buffer overflow in icalrecur_add_bydayrules in icalrecur.c libical: Type confusion in icaltimezone_get_vtimezone_properties function in icalproperty.c Mozilla: Type confusion in Array.pop Mozilla: Sandbox escape using Prompt:Open
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | null | 10 | null |
RHEA-2018:2188
|
Red Hat Enhancement Advisory: Red Hat JBoss Web Server 5.0.0 enhancement update
|
tomcat: A bug in the UTF-8 decoder can lead to DoS
|
[
"cpe:/a:redhat:jboss_enterprise_web_server:5.0::el7"
] | null | null | 7.5 | null |
RHSA-2003:182
|
Red Hat Security Advisory: ghostscript security update
|
security flaw
|
[
"cpe:/o:redhat:enterprise_linux:2.1::as",
"cpe:/o:redhat:enterprise_linux:2.1::aw",
"cpe:/o:redhat:enterprise_linux:2.1::es",
"cpe:/o:redhat:enterprise_linux:2.1::ws"
] | null | null | null | null |
RHSA-2013:0249
|
Red Hat Security Advisory: JBoss Enterprise Application Platform 4.3.0 CP10 security update
|
JBoss: allows empty password to authenticate against LDAP
|
[
"cpe:/a:redhat:jboss_enterprise_application_platform:4.3.0::el4",
"cpe:/a:redhat:jboss_enterprise_application_platform:4.3.0::el5"
] | null | null | null | null |
RHSA-2025:3000
|
Red Hat Security Advisory: webkit2gtk3 security update
|
webkitgtk: out-of-bounds write vulnerability
|
[
"cpe:/a:redhat:rhel_e4s:9.0::appstream"
] | null | 7.5 | null | null |
RHSA-2021:0705
|
Red Hat Security Advisory: container-tools:1.0 security update
|
podman: container users permissions are not respected in privileged containers
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 7 | null | null |
RHSA-2024:4125
|
Red Hat Security Advisory: Red Hat Service Interconnect 1.4.5 Release security update
|
golang: net/http, x/net/http2: unlimited number of CONTINUATION frames causes DoS golang: crypto/x509: Verify panics on certificates with an unknown public key algorithm
|
[
"cpe:/a:redhat:service_interconnect:1.4::el8",
"cpe:/a:redhat:service_interconnect:1.4::el9"
] | null | 5.9 | null | null |
RHSA-2023:0554
|
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.4.9 Security update
|
jquery: Cross-site scripting via cross-domain ajax requests bootstrap: XSS in the data-target attribute nodejs-moment: Regular expression denial of service bootstrap: Cross-site Scripting (XSS) in the collapse data-parent attribute bootstrap: Cross-site Scripting (XSS) in the data-target property of scrollspy bootstrap: Cross-site Scripting (XSS) in the data-container property of tooltip bootstrap: XSS in the tooltip or popover data-template attribute jquery: Prototype pollution in object's prototype leading to denial of service, remote code execution, or property injection jquery: Cross-site scripting due to improper injQuery.htmlPrefilter method jquery: Untrusted code execution via <option> tag in HTML passed to DOM manipulation methods wildfly-elytron: possible timing attacks via use of unsafe comparator jettison: parser crash by stackoverflow jettison: memory exhaustion via user-supplied XML or JSON data woodstox-core: woodstox to serialise XML data was vulnerable to Denial of Service attacks jackson-databind: deep wrapper array nesting wrt UNWRAP_SINGLE_VALUE_ARRAYS jackson-databind: use of deeply nested arrays mina-sshd: Java unsafe deserialization vulnerability jettison: If the value in map is the map's self, the new new JSONObject(map) cause StackOverflowError which may lead to dos CXF: SSRF Vulnerability
|
[
"cpe:/a:redhat:jboss_enterprise_application_platform:7.4::el9"
] | null | 9.8 | 5.6 | null |
RHSA-2017:0462
|
Red Hat Security Advisory: java-1.8.0-ibm security update
|
SSL/TLS: Birthday attack against 64-bit block ciphers (SWEET32)
|
[
"cpe:/a:redhat:rhel_extras:6",
"cpe:/a:redhat:rhel_extras:7"
] | null | null | 7.5 | null |
RHSA-2016:0302
|
Red Hat Security Advisory: openssl security update
|
OpenSSL: SSLv2 doesn't block disabled ciphers OpenSSL: BN_hex2bn/BN_dec2bn NULL pointer deref/heap corruption SSL/TLS: Cross-protocol attack on TLS using SSLv2 (DROWN)
|
[
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2024:4922
|
Red Hat Security Advisory: Red Hat Advanced Cluster Management 2.8.7 bug fixes and security updates
|
golang: net/http, x/net/http2: unlimited number of CONTINUATION frames causes DoS
|
[
"cpe:/a:redhat:acm:2.8::el8"
] | null | 7.5 | null | null |
RHBA-2019:1992
|
Red Hat Bug Fix Advisory: cloud-init bug fix and enhancement update
|
cloud-init: extra ssh keys added to authorized_keys on the Azure platform
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | null | 5.4 | null |
RHSA-2024:7484
|
Red Hat Security Advisory: linux-firmware security update
|
kernel: hw:amd:IOMMU improperly handles certain special address leading to a loss of guest integrity kernel: hw:amd: Incomplete system memory cleanup in SEV firmware corrupt guest private memory
|
[
"cpe:/o:redhat:enterprise_linux:9::baseos"
] | null | 4.4 | null | null |
RHSA-2014:1893
|
Red Hat Security Advisory: libXfont security update
|
libXfont: integer overflow of allocations in font metadata file parsing libXfont: unvalidated length fields when parsing xfs protocol replies libXfont: integer overflows calculating memory needs for xfs replies
|
[
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2022:5755
|
Red Hat Security Advisory: OpenJDK 11.0.16 Security Update for Portable Linux Builds
|
OpenJDK: class compilation issue (Hotspot, 8281859) OpenJDK: improper restriction of MethodHandle.invokeBasic() (Hotspot, 8281866) OpenJDK: integer truncation issue in Xalan-J (JAXP, 8285407)
|
[
"cpe:/a:redhat:openjdk:11"
] | null | 7.5 | null | null |
RHSA-2008:0297
|
Red Hat Security Advisory: dovecot security and bug fix update
|
Directory traversal in dovecot with zlib plugin Dovecot possible privilege ascalation in ACL plugin dovecot LDAP+auth cache user login mixup dovecot: insecure mail_extra_groups option
|
[
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2018:2612
|
Red Hat Security Advisory: samba security, bug fix and enhancement update
|
samba: NULL pointer dereference in printer server process samba: Weak authentication protocol regression samba: Insufficient input validation in libsmbclient
|
[
"cpe:/a:redhat:storage:3.4:samba:el6"
] | null | null | 4.3 | null |
RHSA-2023:5245
|
Red Hat Security Advisory: linux-firmware security update
|
hw: amd: Cross-Process Information Leak
|
[
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 6.5 | null | null |
RHSA-2021:0599
|
Red Hat Security Advisory: redhat-ds:11 security and bug fix update
|
389-ds-base: information disclosure during the binding of a DN
|
[
"cpe:/a:redhat:directory_server:11.1::el8"
] | null | 5.3 | null | null |
RHSA-2020:0638
|
Red Hat Security Advisory: Red Hat Satellite Proxy 5 - 90 day End Of Life Notice
|
This is the 90 day notification of the End Of Life (EOL) plans for the following versions of Red Hat Satellite Proxy 5:
* Red Hat Satellite Proxy 5.8
|
[
"cpe:/a:redhat:network_proxy:5.8::el6"
] | null | null | null | null |
RHSA-2009:1178
|
Red Hat Security Advisory: python security update
|
python: imageop module integer overflows python: PyString_FromStringAndSize does not check for negative size values python: Multiple integer overflows in python core python: Multiple buffer overflows in unicode processing python: Multiple integer overflows discovered by Google python: Potential integer underflow and overflow in the PyOS_vsnprintf C API function python: imageop module multiple integer overflows python: stringobject, unicodeobject integer overflows
|
[
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws"
] | null | null | null | null |
RHSA-2024:7941
|
Red Hat Security Advisory: OpenShift Container Platform 4.13.z security update
|
containers/image: digest type does not guarantee valid type webob: WebOb's location header normalization during redirect leads to open redirect openstack-ironic: Specially crafted image may allow authenticated users to gain access to potentially sensitive data
|
[
"cpe:/a:redhat:openshift:4.13::el8",
"cpe:/a:redhat:openshift:4.13::el9",
"cpe:/a:redhat:openshift_ironic:4.13::el9"
] | null | 6.8 | null | null |
RHSA-2021:2570
|
Red Hat Security Advisory: kernel security and bug fix update
|
kernel: security bypass in certs/blacklist.c and certs/system_keyring.c kernel: use-after-free in net/bluetooth/hci_event.c when destroying an hci_chan
|
[
"cpe:/a:redhat:enterprise_linux:8::crb",
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 7.8 | null | null |
RHSA-2023:7473
|
Red Hat Security Advisory: OpenShift Container Platform 4.14.4 packages and security update
|
python-werkzeug: high resource usage when parsing multipart form data with many fields haproxy: Proxy forwards malformed empty Content-Length headers python-werkzeug: high resource consumption leading to denial of service
|
[
"cpe:/a:redhat:openshift:4.14::el8",
"cpe:/a:redhat:openshift:4.14::el9",
"cpe:/a:redhat:openshift_ironic:4.14::el9"
] | null | 7.5 | null | null |
RHSA-2019:0483
|
Red Hat Security Advisory: openssl security and bug fix update
|
openssl: timing side channel attack in the ECDSA signature generation openssl: Side-channel vulnerability on SMT/Hyper-Threading architectures (PortSmash)
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 4.8 | null |
RHSA-2025:2655
|
Red Hat Security Advisory: grub2 security update
|
grub2: net: Out-of-bounds write in grub_net_search_config_file()
|
[
"cpe:/o:redhat:rhel_aus:8.4::baseos",
"cpe:/o:redhat:rhel_e4s:8.4::baseos",
"cpe:/o:redhat:rhel_tus:8.4::baseos"
] | null | 7.6 | null | null |
RHSA-2012:1351
|
Red Hat Security Advisory: thunderbird security update
|
Mozilla: Location object can be shadowed using Object.defineProperty (MFSA 2012-59) Mozilla: Miscellaneous memory safety hazards (rv:10.0.8) (MFSA 2012-74) Mozilla: Some DOMWindowUtils methods bypass security checks (MFSA 2012-77) Mozilla: DOS and crash with full screen and history navigation (MFSA 2012-79) Mozilla: Use-after-free in the IME State Manager (MFSA 2012-87) Mozilla: GetProperty function can bypass security checks (MFSA 2012-81) Mozilla: Spoofing and script injection through location.hash (MFSA 2012-84) Mozilla: Chrome Object Wrapper (COW) does not disallow acces to privileged functions or properties (MFSA 2012-83) Mozilla: top object and location property accessible by plugins (MFSA 2012-82) Mozilla: Use-after-free, buffer overflow, and out of bounds read issues found using Address Sanitizer (MFSA 2012-85) Mozilla: Use-after-free, buffer overflow, and out of bounds read issues found using Address Sanitizer (MFSA 2012-85) Mozilla: Use-after-free, buffer overflow, and out of bounds read issues found using Address Sanitizer (MFSA 2012-85) Mozilla: Use-after-free, buffer overflow, and out of bounds read issues found using Address Sanitizer (MFSA 2012-85) Mozilla: Use-after-free, buffer overflow, and out of bounds read issues found using Address Sanitizer (MFSA 2012-85) Mozilla: Use-after-free, buffer overflow, and out of bounds read issues found using Address Sanitizer (MFSA 2012-85) Mozilla: Chrome Object Wrapper (COW) does not disallow acces to privileged functions or properties (MFSA 2012-83) Mozilla: Heap memory corruption issues found using Address Sanitizer (MFSA 2012-86) Mozilla: Heap memory corruption issues found using Address Sanitizer (MFSA 2012-86) Mozilla: Heap memory corruption issues found using Address Sanitizer (MFSA 2012-86) Mozilla: Heap memory corruption issues found using Address Sanitizer (MFSA 2012-86)
|
[
"cpe:/a:redhat:rhel_productivity:5",
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2023:0606
|
Red Hat Security Advisory: thunderbird security update
|
Mozilla: Revocation status of S/Mime signature certificates was not checked
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 7.5 | null | null |
RHSA-2008:0131
|
Red Hat Security Advisory: netpbm security update
|
netpbm: GIF handling buffer overflow in giftopnm
|
[
"cpe:/o:redhat:enterprise_linux:2.1::as",
"cpe:/o:redhat:enterprise_linux:2.1::aw",
"cpe:/o:redhat:enterprise_linux:2.1::es",
"cpe:/o:redhat:enterprise_linux:2.1::ws",
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws",
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2021:3152
|
Red Hat Security Advisory: exiv2 security update
|
exiv2: Heap-based buffer overflow vulnerability in jp2image.cpp
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb"
] | null | 8.1 | null | null |
RHSA-2010:0528
|
Red Hat Security Advisory: avahi security update
|
avahi: remote DoS via legacy unicast mDNS queries avahi: assertion failure after receiving a packet with corrupted checksum
|
[
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2012:1556
|
Red Hat Security Advisory: openstack-keystone security, bug fix, and enhancement update
|
OpenStack: Keystone /etc/keystone/ec2rc secret key exposure OpenStack: Keystone EC2-style credentials invalidation issue
|
[
"cpe:/a:redhat:openstack:1::el6"
] | null | null | null | null |
RHSA-2020:4003
|
Red Hat Security Advisory: NetworkManager security and bug fix update
|
NetworkManager: user configuration not honoured leaving the connection unauthenticated via insecure defaults
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 4.3 | null | null |
RHSA-2023:0402
|
Red Hat Security Advisory: bind security update
|
bind: DNS forwarders - cache poisoning vulnerability bind: processing large delegations may severely degrade resolver performance
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 5.3 | null | null |
RHSA-2020:2039
|
Red Hat Security Advisory: squid:4 security update
|
squid: improper check for new member in ESIExpression::Evaluate allows for stack buffer overflow squid: improper access restriction upon Digest Authentication nonce replay could lead to remote code execution
|
[
"cpe:/a:redhat:rhel_eus:8.1::appstream"
] | null | 8.1 | null | null |
RHSA-2024:5525
|
Red Hat Security Advisory: bind9.16 security update
|
bind: bind9: BIND's database will be slow if a very large number of RRs exist at the same nam bind9: bind: SIG(0) can be used to exhaust CPU resources bind: bind9: Assertion failure when serving both stale cache data and authoritative zone content
|
[
"cpe:/a:redhat:rhel_eus:8.8::appstream",
"cpe:/a:redhat:rhel_eus:8.8::crb"
] | null | 7.5 | null | null |
RHSA-2018:1883
|
Red Hat Security Advisory: samba4 security and bug fix update
|
samba: NULL pointer dereference in printer server process
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | 4.3 | null |
RHSA-2021:5107
|
Red Hat Security Advisory: OpenShift Container Platform 4.7.40 security update
|
log4j: Remote code execution in Log4j 1.x when application is configured to use JMSAppender log4j-core: Remote code execution in Log4j 2.x when logs contain an attacker-controlled string value log4j-core: DoS in log4j 2.x with thread context message pattern and context lookup pattern (incomplete fix for CVE-2021-44228)
|
[
"cpe:/a:redhat:openshift:4.7::el8"
] | null | 8.1 | null | null |
RHSA-2022:0312
|
Red Hat Security Advisory: java-1.8.0-openjdk security update
|
OpenJDK: Incomplete deserialization class filtering in ObjectInputStream (Serialization, 8264934) OpenJDK: Insufficient URI checks in the XSLT TransformerImpl (JAXP, 8270492) OpenJDK: Unexpected exception thrown in regex Pattern (Libraries, 8268813) OpenJDK: Incomplete checks of StringBuffer and StringBuilder during deserialization (Libraries, 8270392) OpenJDK: Incorrect IdentityHashMap size checks during deserialization (Libraries, 8270416) OpenJDK: Incorrect access checks in XMLEntityManager (JAXP, 8270498) OpenJDK: Infinite loop related to incorrect handling of newlines in XMLEntityScanner (JAXP, 8270646) OpenJDK: Array indexing issues in LIRGenerator (Hotspot, 8272014) OpenJDK: Excessive resource use when reading JAR manifest attributes (Libraries, 8272026) OpenJDK: Insufficient checks when deserializing exceptions in ObjectInputStream (Serialization, 8272236) OpenJDK: Excessive memory allocation in BMPImageReader (ImageIO, 8273756) OpenJDK: Integer overflow in BMPImageReader (ImageIO, 8273838)
|
[
"cpe:/a:redhat:rhel_eus:8.4::appstream",
"cpe:/a:redhat:rhel_eus:8.4::crb"
] | null | 5.3 | null | null |
RHSA-2016:1944
|
Red Hat Security Advisory: bind security update
|
bind: assertion failure in buffer.c while building responses to a specifically constructed request
|
[
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server",
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation",
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 7.5 | null |
RHSA-2015:1188
|
Red Hat Security Advisory: chromium-browser security update
|
chromium-browser: Scheme validation error in WebUI chromium-browser: Cross-origin bypass in Blink chromium-browser: Cross-origin bypass in Blink chromium-browser: Normalization error in HSTS/HPKP preload list
|
[
"cpe:/a:redhat:rhel_extras:6"
] | null | null | null | null |
RHSA-2022:9082
|
Red Hat Security Advisory: kpatch-patch security update
|
kernel: KVM: cmpxchg_gpte can write to pfns outside the userspace region kernel: openvswitch: integer underflow leads to out-of-bounds write in reserve_sfa_size() kernel: watch queue race condition can lead to privilege escalation kernel: nfsd buffer overflow by RPC message over TCP with garbage data
|
[
"cpe:/o:redhat:rhel_eus:9.0::baseos"
] | null | 7.5 | null | null |
RHSA-2023:1877
|
Red Hat Security Advisory: java-11-openjdk security update
|
OpenJDK: improper connection handling during TLS handshake (8294474) OpenJDK: missing string checks for NULL characters (8296622) OpenJDK: incorrect handling of NULL characters in ProcessBuilder (8295304) OpenJDK: Swing HTML parsing issue (8296832) OpenJDK: incorrect enqueue of references in garbage collector (8298191) OpenJDK: certificate validation issue in TLS session negotiation (8298310) OpenJDK: missing check for slash characters in URI-to-path conversion (8298667)
|
[
"cpe:/a:redhat:rhel_aus:8.2::appstream",
"cpe:/a:redhat:rhel_e4s:8.2::appstream",
"cpe:/a:redhat:rhel_tus:8.2::appstream"
] | null | 3.7 | null | null |
RHSA-2024:1408
|
Red Hat Security Advisory: emacs security update
|
emacs: command execution via shell metacharacters emacs: command injection vulnerability in htmlfontify.el
|
[
"cpe:/a:redhat:rhel_eus:8.8::appstream",
"cpe:/o:redhat:rhel_eus:8.8::baseos"
] | null | 7.8 | null | null |
RHSA-2023:6115
|
Red Hat Security Advisory: OpenShift API for Data Protection security update
|
golang: net/http: insufficient sanitization of Host header golang: crypto/tls: slow verification of certificate chains containing large RSA keys golang: html/template: improper handling of HTML-like comments within script contexts golang: html/template: improper handling of special tags within script contexts golang: crypto/tls: panic when processing post-handshake message on QUIC connections golang: crypto/tls: lack of a limit on buffered post-handshake golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487) HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack)
|
[
"cpe:/a:redhat:openshift_api_data_protection:1.1::el8"
] | null | 7.5 | null | null |
RHSA-2023:4466
|
Red Hat Security Advisory: Satellite 6.13.3 Async Security Update
|
python-future: remote attackers can cause denial of service via crafted Set-Cookie header from malicious web server Foreman: Arbitrary code execution through templates
|
[
"cpe:/a:redhat:satellite:6.13::el8",
"cpe:/a:redhat:satellite_capsule:6.13::el8",
"cpe:/a:redhat:satellite_maintenance:6.13::el8",
"cpe:/a:redhat:satellite_utils:6.13::el8"
] | null | 9.1 | null | null |
RHSA-2015:0197
|
Red Hat Security Advisory: rhevm-spice-client security and bug fix update
|
openssl: race condition in ssl_parse_serverhello_tlsext openssl: TLS protocol downgrade attack
|
[
"cpe:/a:redhat:rhev_manager:3"
] | null | null | null | null |
RHSA-2022:1664
|
Red Hat Security Advisory: Red Hat Software Collections security update
|
python-lxml: HTML Cleaner allows crafted and SVG embedded scripts to pass through
|
[
"cpe:/a:redhat:rhel_software_collections:3::el7"
] | null | 8.8 | null | null |
RHSA-2021:2363
|
Red Hat Security Advisory: gupnp security update
|
gupnp: allows DNS rebinding which could result in tricking browser into triggering actions against local UPnP services
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb"
] | null | 8.3 | null | null |
RHSA-2016:1809
|
Red Hat Security Advisory: thunderbird security update
|
Mozilla: Miscellaneous memory safety hazards (rv:45.3) (MFSA 2016-62)
|
[
"cpe:/a:redhat:rhel_productivity:5",
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation",
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 8.8 | null |
RHSA-2019:1880
|
Red Hat Security Advisory: curl security and bug fix update
|
curl: NTLM password overflow via integer overflow
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 7.5 | null |
RHSA-2021:5127
|
Red Hat Security Advisory: Openshift Logging security and bug update (5.2.4)
|
netty: Request smuggling via content-length header netty-codec: Bzip2Decoder doesn't allow setting size restrictions for decompressed data netty-codec: SnappyFrameDecoder doesn't restrict chunk length and may buffer skippable chunks in an unnecessary way log4j-core: Remote code execution in Log4j 2.x when logs contain an attacker-controlled string value log4j-core: DoS in log4j 2.x with thread context message pattern and context lookup pattern (incomplete fix for CVE-2021-44228)
|
[
"cpe:/a:redhat:logging:5.2::el8"
] | null | 8.1 | null | null |
RHSA-2007:0557
|
Red Hat Security Advisory: httpd security update
|
httpd mod_status XSS httpd mod_cache segfault httpd scoreboard lack of PID protection
|
[
"cpe:/a:redhat:rhel_application_stack:1"
] | null | null | null | null |
RHSA-2013:1866
|
Red Hat Security Advisory: ca-certificates security update
|
An updated ca-certificates package that fixes one security issue is now
available for Red Hat Enterprise Linux 6.
The Red Hat Security Response Team has rated this update as having moderate
security impact.
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2023:5414
|
Red Hat Security Advisory: kernel security update
|
kernel: nf_tables: stack-out-of-bounds-read in nft_byteorder_eval()
|
[
"cpe:/o:redhat:rhel_aus:7.6::server"
] | null | 7.8 | null | null |
RHSA-2023:5971
|
Red Hat Security Advisory: Red Hat OpenStack Platform 17.1.1 (director-operator) security update
|
golang: crypto/tls: slow verification of certificate chains containing large RSA keys golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487) HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack)
|
[
"cpe:/a:redhat:openstack:17.1::el9"
] | null | 7.5 | null | null |
RHSA-2016:2067
|
Red Hat Security Advisory: chromium-browser security update
|
chromium-browser: universal xss in blink chromium-browser: heap overflow in blink chromium-browser: use after free in pdfium chromium-browser: use after free in pdfium chromium-browser: use after free in blink chromium-browser: out of bounds read in devtools chromium-browser: url spoofing chromium-browser: ui spoofing chromium-browser: url spoofing chromium-browser: use after free in internals chromium-browser: universal xss in bookmarks chromium-browser: cross-origin bypass in blink chromium-browser: scheme bypass chromium-browser: various fixes from internal audits
|
[
"cpe:/a:redhat:rhel_extras:6"
] | null | null | 8.8 | null |
RHSA-2016:0156
|
Red Hat Security Advisory: python-django security update
|
python-django: Information leak through date template filter
|
[
"cpe:/a:redhat:openstack:7::el7"
] | null | null | null | null |
RHSA-2022:5840
|
Red Hat Security Advisory: Migration Toolkit for Containers (MTC) 1.7.3 security and bug fix update
|
cross-fetch: Exposure of Private Personal Information to an Unauthorized Actor golang: encoding/pem: fix stack overflow in Decode golang: crypto/elliptic: panic caused by oversized scalar golang: syscall: faccessat checks wrong group
|
[
"cpe:/a:redhat:rhmt:1.7::el8"
] | null | 6.2 | null | null |
RHSA-2002:036
|
Red Hat Security Advisory: : Updated ethereal packages available
|
security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw
|
[
"cpe:/a:redhat:powertools:6.2",
"cpe:/a:redhat:powertools:7.0",
"cpe:/a:redhat:powertools:7.1"
] | null | null | null | null |
RHSA-2021:4826
|
Red Hat Security Advisory: mailman:2.1 security update
|
mailman: CSRF token derived from admin password allows offline brute-force attack mailman: CSRF token bypass allows to perform CSRF attacks and account takeover
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 8 | null | null |
RHSA-2005:165
|
Red Hat Security Advisory: rsh security update
|
security flaw
|
[
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.