id
stringlengths 13
15
| title
stringlengths 29
176
| description
stringlengths 8
32.1k
| cpes
listlengths 0
20
| cvss_v4_0
null | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
null |
---|---|---|---|---|---|---|---|
RHSA-2020:2242
|
Red Hat Security Advisory: kernel-rt security and bug fix update
|
kernel: double free may be caused by the function allocate_trace_buffer in the file kernel/trace/trace.c kernel: use-after-free in __blk_add_trace in kernel/trace/blktrace.c Kernel: NetLabel: null pointer dereference while receiving CIPSO packet with null category may cause kernel panic
|
[
"cpe:/a:redhat:enterprise_mrg:2:server:el6"
] | null | 5.9 | null | null |
RHSA-2020:2242
|
Red Hat Security Advisory: kernel-rt security and bug fix update
|
kernel: double free may be caused by the function allocate_trace_buffer in the file kernel/trace/trace.c kernel: use-after-free in __blk_add_trace in kernel/trace/blktrace.c Kernel: NetLabel: null pointer dereference while receiving CIPSO packet with null category may cause kernel panic
|
[
"cpe:/a:redhat:enterprise_mrg:2:server:el6"
] | null | 5.9 | null | null |
RHSA-2005:498
|
Red Hat Security Advisory: spamassassin security update
|
security flaw
|
[
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2020:3143
|
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.3 security update
|
wildfly: unsafe deserialization in Wildfly Enterprise Java Beans wildfly: Some EJB transaction objects may get accumulated causing Denial of Service wildfly: EJB SessionOpenInvocations may not be removed properly after a response is received causing Denial of Service
|
[
"cpe:/a:redhat:jboss_enterprise_application_platform:7.3"
] | null | 6.5 | null | null |
RHSA-2022:7618
|
Red Hat Security Advisory: gstreamer1-plugins-good security update
|
gstreamer-plugins-good: Use-after-free in matroska demuxing
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 7.8 | null | null |
RHSA-2024:2980
|
Red Hat Security Advisory: harfbuzz security update
|
harfbuzz: allows attackers to trigger O(n^2) growth via consecutive marks
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 7.5 | null | null |
RHSA-2018:2242
|
Red Hat Security Advisory: java-1.8.0-openjdk security and bug fix update
|
OpenJDK: insufficient index validation in PatternSyntaxException getMessage() (Concurrency, 8199547)
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 3.7 | null |
RHSA-2024:2779
|
Red Hat Security Advisory: nodejs:18 security update
|
nodejs: using the fetch() function to retrieve content from an untrusted URL leads to denial of service c-ares: Out of bounds read in ares__read_line() nodejs: HTTP Request Smuggling via Content Length Obfuscation nodejs: CONTINUATION frames DoS nghttp2: CONTINUATION frames DoS
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 5.3 | null | null |
RHSA-2017:0192
|
Red Hat Security Advisory: Red Hat Satellite Proxy 5 - 60 day End Of Life Notice
|
This is the 60 day notification of the End Of Life (EOL) plans for the
following versions of Red Hat Satellite 5:
* Red Hat Satellite 5.6 on Red Hat Enterprise Linux 5
|
[
"cpe:/a:redhat:network_proxy:5.6::el5"
] | null | null | null | null |
RHSA-2018:1270
|
Red Hat Security Advisory: java-1.7.0-openjdk security update
|
OpenJDK: incorrect merging of sections in the JAR manifest (Security, 8189969) OpenJDK: unrestricted deserialization of data from JCEKS key stores (Security, 8189997) OpenJDK: insufficient consistency checks in deserialization of multiple classes (Security, 8189977) OpenJDK: unbounded memory allocation during deserialization in PriorityBlockingQueue (Concurrency, 8189981) OpenJDK: unbounded memory allocation during deserialization in TabularDataSupport (JMX, 8189985) OpenJDK: unbounded memory allocation during deserialization in Container (AWT, 8189989) OpenJDK: unbounded memory allocation during deserialization in NamedNodeMapImpl (JAXP, 8189993) OpenJDK: RMI HTTP transport enabled by default (RMI, 8193833) OpenJDK: incorrect handling of Reference clones can lead to sandbox bypass (Hotspot, 8192025) OpenJDK: unbounded memory allocation during deserialization in StubIORImpl (Serialization, 8192757)
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | 5.3 | null |
RHSA-2020:2050
|
Red Hat Security Advisory: thunderbird security update
|
usrsctp: Buffer overflow in AUTH chunk input validation Mozilla: Use-after-free during worker shutdown Mozilla: Arbitrary local file access with 'Copy as cURL' Mozilla: Memory safety bugs fixed in Firefox 76 and Firefox ESR 68.8 Mozilla: Sender Email Address Spoofing using encoded Unicode characters
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 4.3 | 6.1 | null |
RHSA-2024:6753
|
Red Hat Security Advisory: kernel security update
|
kernel: virtio-net: Add validation for used length kernel: mm, thp: bail out early in collapse_file for writeback page kernel: ipv6: sr: fix out-of-bounds read when setting HMAC data. kernel: ext4: fix double-free of blocks due to wrong extents moved_len kernel: ext4: avoid allocating blocks from corrupted group in ext4_mb_find_by_goal() kernel: ext4: avoid allocating blocks from corrupted group in ext4_mb_try_best_found() kernel: netfilter: nf_tables: Fix potential data-race in __nft_obj_type_get() kernel: netfilter: nf_tables: Fix potential data-race in __nft_expr_type_get() kernel: netfilter: nf_tables: Fix potential data-race in __nft_flowtable_type_get() kernel: bpf: Fix overrunning reservations in ringbuf
|
[
"cpe:/o:redhat:rhel_aus:8.6::baseos",
"cpe:/o:redhat:rhel_e4s:8.6::baseos",
"cpe:/o:redhat:rhel_tus:8.6::baseos"
] | null | 4.4 | null | null |
RHSA-2022:1158
|
Red Hat Security Advisory: OpenShift Container Platform 4.9.27 bug fix and security update
|
ovn-kubernetes: Ingress network policy can be overruled by egress network policy on another pod
|
[
"cpe:/a:redhat:openshift:4.9::el8"
] | null | 8.2 | null | null |
RHSA-2017:2561
|
Red Hat Security Advisory: Red Hat Enterprise Virtualization 3.x - 30 Day End Of Life Notice
|
This is the 30 day notification for the End of Production Phase 2 of
Red Hat Enterprise Virtualization 3.x.
|
[
"cpe:/a:redhat:rhev_manager:3"
] | null | null | null | null |
RHSA-2005:122
|
Red Hat Security Advisory: vim security update
|
security flaw
|
[
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws"
] | null | null | null | null |
RHSA-2019:2631
|
Red Hat Security Advisory: openstack-nova security and bug fix update
|
openstack-nova: Nova server resource faults leak external exception details
|
[
"cpe:/a:redhat:openstack:10::el7"
] | null | null | 6.5 | null |
RHSA-2022:1920
|
Red Hat Security Advisory: qt5-qtsvg security update
|
qt: out-of-bounds write may lead to DoS
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 7.5 | null | null |
RHSA-2017:0828
|
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 6.4.14 update on RHEL 7
|
RESTEasy: Abuse of GZIPInterceptor in RESTEasy can lead to denial of service attack jboss: jbossas writable config files allow privilege escalation tomcat: Infinite loop in the processing of https requests
|
[
"cpe:/a:redhat:jboss_enterprise_application_platform:6::el7"
] | null | null | 7.5 | null |
RHSA-2024:1150
|
Red Hat Security Advisory: buildah security update
|
ssh: Prefix truncation attack on Binary Packet Protocol (BPP)
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 5.9 | null | null |
RHSA-2008:0489
|
Red Hat Security Advisory: gnutls security update
|
GNUTLS-SA-2008-1-1 GnuTLS buffer overflow GNUTLS-SA-2008-1-2 GnuTLS null-pointer dereference GNUTLS-SA-2008-1-3 GnuTLS memory overread flaw
|
[
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2020:3032
|
Red Hat Security Advisory: mod_auth_openidc:2.3 security and bug fix update
|
mod_auth_openidc: Open redirect in logout url when using URLs with leading slashes mod_auth_openidc: Open redirect issue exists in URLs with slash and backslash
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 6.1 | null | null |
RHSA-2023:4408
|
Red Hat Security Advisory: mod_auth_openidc:2.3 security update
|
cjose: AES GCM decryption uses the Tag length from the actual Authentication Tag provided in the JWE
|
[
"cpe:/a:redhat:rhel_eus:8.6::appstream"
] | null | 7.5 | null | null |
RHSA-2018:0049
|
Red Hat Security Advisory: ovirt-guest-agent-docker security and bug fix update
|
An update for ovirt-guest-agent-docker is now available for RHEV 4.X, RHEV-H, and Agents for Red Hat Enterprise Linux 7.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
|
[
"cpe:/o:redhat:enterprise_linux:7::hypervisor"
] | null | null | null | null |
RHSA-2009:1682
|
Red Hat Security Advisory: kdegraphics security update
|
xpdf: buffer overflow in FoFiType1::parse
|
[
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2023:0462
|
Red Hat Security Advisory: thunderbird security update
|
Mozilla: libusrsctp library out of date Mozilla: Fullscreen notification bypass Mozilla: Arbitrary file read from GTK drag and drop on Linux Mozilla: Malicious command could be hidden in devtools output Mozilla: URL being dragged from cross-origin iframe into same tab triggers navigation Mozilla: Content Security Policy wasn't being correctly applied to WebSockets in WebWorkers Mozilla: Calls to <code>console.log</code> allowed bypasing Content Security Policy via format directive Mozilla: Memory safety bugs fixed in Firefox 109 and Firefox ESR 102.7
|
[
"cpe:/a:redhat:rhel_eus:8.6::appstream"
] | null | 8.8 | null | null |
RHSA-2006:0634
|
Red Hat Security Advisory: xorg-x11 security update
|
freetype: integer overflow vulnerability due to incomplete fix for CVE-2006-1861
|
[
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2016:2839
|
Red Hat Security Advisory: CFME 5.6.3 security, bug fix, and enhancement update
|
cfme: RCE via Capacity & Utilization feature
|
[
"cpe:/a:redhat:cloudforms_managementengine:5.6::el7"
] | null | null | 8.8 | null |
RHSA-2019:4057
|
Red Hat Security Advisory: kernel-rt security and bug fix update
|
kernel: Handling of might_cancel queueing is not properly pretected against race kernel: Inifinite loop vulnerability in mm/madvise.c:madvise_willneed() function allows local denial of service Kernel: page cache side channel attacks kernel: use-after-free in drivers/char/ipmi/ipmi_si_intf.c, ipmi_si_mem_io.c, ipmi_si_port_io.c
|
[
"cpe:/a:redhat:enterprise_mrg:2:server:el6"
] | null | 7 | 7.1 | null |
RHSA-2010:0752
|
Red Hat Security Advisory: gpdf security update
|
xpdf: uninitialized Gfx::parser pointer dereference xpdf: array indexing error in FoFiType1::parse()
|
[
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2024:9680
|
Red Hat Security Advisory: webkit2gtk3 security update
|
webkitgtk: Memory corruption issue when processing web content webkitgtk: arbitrary javascript code execution webkitgtk: Processing web content may lead to arbitrary code execution webkitgtk: Arbitrary Remote Code Execution chromium-browser: Use after free in ANGLE webkitgtk: type confusion may lead to arbitrary code execution webkitgtk: Processing web content may lead to arbitrary code execution webkitgtk: Processing web content may lead to arbitrary code execution webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution webkitgtk: webkit2gtk: Use after free may lead to Remote Code Execution webkitgtk: webkit2gtk: Out-of-bounds read was addressed with improved bounds checking webkitgtk: webkit2gtk: Out-of-bounds read was addressed with improved bounds checking webkitgtk: webkit2gtk: Use-after-free was addressed with improved memory management webkitgtk: webkit2gtk: Processing maliciously crafted web content may lead to an unexpected process crash webkitgtk: webkit2gtk: Processing maliciously crafted web content may lead to an unexpected process crash webkitgtk: webkit2gtk: Processing maliciously crafted web content may lead to an unexpected process crash webkit: Processing maliciously crafted web content may lead to memory corruption
|
[
"cpe:/a:redhat:rhel_aus:8.2::appstream"
] | null | 8.8 | null | null |
RHSA-2022:8963
|
Red Hat Security Advisory: Red Hat Single Sign-On 7.6.1 security update on RHEL 9
|
keycloak: path traversal via double URL encoding keycloak: Session takeover with OIDC offline refreshtokens
|
[
"cpe:/a:redhat:red_hat_single_sign_on:7.6::el9"
] | null | 6.8 | null | null |
RHSA-2012:0103
|
Red Hat Security Advisory: squirrelmail security update
|
SquirrelMail: Mail Fetch plugin -- port-scans via non-standard POP3 server ports SquirrelMail: DoS (disk space consumption) by random IMAP login attempts with 8-bit characters in the password SquirrelMail: Prone to clickjacking attacks SquirrelMail: Multiple XSS flaws SquirrelMail: XSS in <style> tag handling SquirrelMail: CRLF injection vulnerability SquirrelMail: CSRF in the empty trash feature and in Index Order page
|
[
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2017:1832
|
Red Hat Security Advisory: Red Hat JBoss Fuse/A-MQ 6.3 R4 security and bug fix update
|
bouncycastle: Information disclosure in GCMBlockCipher camel-jacksonxml: Unmarshalling operation are vulnerable to RCE Security: Improper handling of path parameters allows bypassing the security constraint hawtio: Proxy is sharing cookies among all the clients hawtio: information Disclosure flaws due to unsafe path traversal cxf: CXF OAuth2 Hawk and JOSE MAC Validation code are vulnerable to timing attacks camel-core: Validation component vulnerable to SSRF via remote DTDs and XXE cxf: CXF JAX-RS XML Security streaming clients do not validate that the service response was signed or encrypted cxf: CXF's STSClient uses a flawed way of caching tokens that are associated with delegation tokens logback: Serialization vulnerability in SocketServer and ServerSocketReceiver XStream: DoS when unmarshalling void type
|
[
"cpe:/a:redhat:jboss_amq:6.3",
"cpe:/a:redhat:jboss_fuse:6.3"
] | null | null | 5.9 | null |
RHSA-2015:1855
|
Red Hat Security Advisory: mod_proxy_fcgi security update
|
httpd: mod_proxy_fcgi handle_headers() buffer over read
|
[
"cpe:/a:redhat:rhel_common:6::el6"
] | null | null | null | null |
RHSA-2023:5708
|
Red Hat Security Advisory: dotnet6.0 security update
|
HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack)
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::crb"
] | null | 7.5 | null | null |
RHSA-2017:2675
|
Red Hat Security Advisory: Red Hat Mobile Application Platform security update
|
RHMAP Millicore IDE allows RCE on SCM RHMAP: SSRF via external_request feature of App Studio RHMAP: Stored XSS in App Store git: Command injection via malicious ssh URLs
|
[
"cpe:/a:redhat:mobile_application_platform:4.5"
] | null | null | 6.3 | null |
RHSA-2023:6280
|
Red Hat Security Advisory: Migration Toolkit for Applications security and bug fix update
|
golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487) HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack)
|
[
"cpe:/a:redhat:migration_toolkit_applications:6.2::el8",
"cpe:/a:redhat:migration_toolkit_applications:6.2::el9"
] | null | 7.5 | null | null |
RHSA-2022:7106
|
Red Hat Security Advisory: zlib security update
|
zlib: heap-based buffer over-read and overflow in inflate() in inflate.c via a large gzip header extra field
|
[
"cpe:/a:redhat:enterprise_linux:8::crb",
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 7 | null | null |
RHSA-2024:2732
|
Red Hat Security Advisory: Red Hat OpenStack Platform 17.1 (python-glance-store) security update
|
glance-store: Glance Store access key logged in DEBUG log level
|
[
"cpe:/a:redhat:openstack:17.1::el9"
] | null | 5.5 | null | null |
RHSA-2022:0024
|
Red Hat Security Advisory: OpenShift Container Platform 4.6.53 security update
|
haproxy: an HTTP method name may contain a space followed by the name of a protected resource haproxy: request smuggling attack or response splitting via duplicate content-length header
|
[
"cpe:/a:redhat:openshift:4.6::el7",
"cpe:/a:redhat:openshift:4.6::el8"
] | null | 7.5 | null | null |
RHSA-2012:0515
|
Red Hat Security Advisory: firefox security update
|
Mozilla: Off-by-one error in OpenType Sanitizer (MFSA 2012-31) Mozilla: Miscellaneous memory safety hazards (rv:12.0/ rv:10.0.4) (MFSA 2012-20) Mozilla: Miscellaneous memory safety hazards (rv:12.0/ rv:10.0.4) (MFSA 2012-20) Mozilla: use-after-free in IDBKeyRange (MFSA 2012-22) Mozilla: Invalid frees causes heap corruption in gfxImageSurface (MFSA 2012-23) Mozilla: Potential XSS via multibyte content processing errors (MFSA 2012-24) Mozilla: Potential memory corruption during font rendering using cairo-dwrite (MFSA 2012-25) Mozilla: WebGL.drawElements may read illegal video memory due to FindMaxUshortElement error (MFSA 2012-26) Mozilla: Page load short-circuit can lead to XSS (MFSA 2012-27) Mozilla: Potential XSS through ISO-2022-KR/ISO-2022-CN decoding issues (MFSA 2012-29) Mozilla: Crash with WebGL content using textImage2D (MFSA 2012-30) Mozilla: Potential site identity spoofing when loading RSS and Atom feeds (MFSA 2012-33)
|
[
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server",
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2022:8532
|
Red Hat Security Advisory: Satellite 6.9.10 Async Security Update
|
puma-5.6.4: http request smuggling vulnerabilities
|
[
"cpe:/a:redhat:satellite:6.9::el7",
"cpe:/a:redhat:satellite_capsule:6.9::el7"
] | null | 7.5 | null | null |
RHSA-2020:3286
|
Red Hat Security Advisory: postgresql-jdbc security update
|
postgresql-jdbc: XML external entity (XXE) vulnerability in PgSQLXML
|
[
"cpe:/a:redhat:rhel_eus:8.1::appstream"
] | null | 7.7 | null | null |
RHSA-2020:0962
|
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.3 security update
|
thrift: Endless loop when feed with specific input data thrift: Out-of-bounds read related to TJSONProtocol or TSimpleJSONProtocol wildfly: The 'enabled-protocols' value in legacy security is not respected if OpenSSL security provider is in use undertow: AJP File Read/Inclusion Vulnerability
|
[
"cpe:/a:redhat:jboss_enterprise_application_platform:7.3::el6",
"cpe:/a:redhat:jboss_enterprise_application_platform:7.3::el7",
"cpe:/a:redhat:jboss_enterprise_application_platform:7.3::el8"
] | null | 7.6 | 7.4 | null |
RHSA-2015:0125
|
Red Hat Security Advisory: Red Hat JBoss Web Framework Kit 2.7.0 update
|
CXF: SSL hostname verification bypass, incomplete CVE-2012-5783 fix RESTEasy: XXE via parameter entities Validator: JSM bypass via ReflectionHelper CXF: SSL hostname verification bypass, incomplete CVE-2012-6153 fix
|
[
"cpe:/a:redhat:jboss_enterprise_web_framework:2.7.0"
] | null | null | 4.8 | null |
RHSA-2018:3779
|
Red Hat Security Advisory: java-1.7.1-ibm security update
|
OpenJDK: Incorrect handling of unsigned attributes in signed Jar manifests (Security, 8194534) OpenJDK: Leak of sensitive header data via HTTP redirect (Networking, 8196902) OpenJDK: Incomplete enforcement of the trustURLCodebase restriction (JNDI, 8199177) OpenJDK: Improper field access checks (Hotspot, 8199226) OpenJDK: Missing endpoint identification algorithm check during TLS session resumption (JSSE, 8202613) OpenJDK: Infinite loop in RIFF format reader (Sound, 8205361) libpng: Integer overflow and resultant divide-by-zero in pngrutil.c:png_check_chunk_length() allows for denial of service
|
[
"cpe:/a:redhat:network_satellite:5.6::el6",
"cpe:/a:redhat:network_satellite:5.7::el6"
] | null | null | 6.5 | null |
RHSA-2023:4972
|
Red Hat Security Advisory: Multicluster Engine for Kubernetes 2.1.8 security updates and bug fixes
|
openshift: OCP & FIPS mode vm2: Promise handler sanitization can be bypassed allowing attackers to escape the sandbox and run arbitrary code vm2: custom inspect function allows attackers to escape the sandbox and run arbitrary code
|
[
"cpe:/a:redhat:multicluster_engine:2.1::el8"
] | null | 9.8 | null | null |
RHSA-2017:2760
|
Red Hat Security Advisory: kernel security and bug fix update
|
kernel: Stack overflow via ecryptfs and /proc/$pid/environ
|
[
"cpe:/o:redhat:rhel_eus:6.7::computenode",
"cpe:/o:redhat:rhel_eus:6.7::server"
] | null | null | 8.1 | null |
RHSA-2020:4143
|
Red Hat Security Advisory: OCS 3.11.z async security, bug fix, and enhancement update
|
gluster-block: information disclosure through world-readable gluster-block log files heketi: gluster-block volume password details available in logs
|
[
"cpe:/a:redhat:storage:3.5:server:el7",
"cpe:/a:redhat:storage:3:client:el7"
] | null | 5.5 | null | null |
RHSA-2025:0723
|
Red Hat Security Advisory: Multicluster Engine for Kubernetes 2.7.3 security updates and bug fixes
|
golang.org/x/crypto/ssh: Misuse of ServerConfig.PublicKeyCallback may cause authorization bypass in golang.org/x/crypto nanoid: nanoid mishandles non-integer values
|
[
"cpe:/a:redhat:multicluster_engine:2.7::el8",
"cpe:/a:redhat:multicluster_engine:2.7::el9"
] | null | 6.5 | null | null |
RHSA-2018:0378
|
Red Hat Security Advisory: ruby security update
|
ruby: Buffer underrun vulnerability in Kernel.sprintf rubygems: Escape sequence in the "summary" field of gemspec rubygems: No size limit in summary length of gem spec rubygems: Arbitrary file overwrite due to incorrect validation of specification name rubygems: DNS hijacking vulnerability rubygems: Unsafe object deserialization through YAML formatted gem specifications ruby: Escape sequence injection vulnerability in the Basic authentication of WEBrick ruby: Buffer underrun in OpenSSL ASN1 decode ruby: Arbitrary heap exposure during a JSON.generate call ruby: Command injection vulnerability in Net::FTP ruby: Command injection in lib/resolv.rb:lazy_initialize() allows arbitrary code execution
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 8.1 | null |
RHSA-2009:1548
|
Red Hat Security Advisory: kernel security and bug fix update
|
kernel: SELinux and mmap_min_addr kernel ecryptfs NULL pointer dereference kernel: tc: uninitialised kernel memory leak kernel: O_EXCL creates on NFSv4 are broken kernel: fs: pipe.c null pointer dereference kernel: flood ping cause out-of-iommu error and panic when mtu larger than 1500
|
[
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2019:1959
|
Red Hat Security Advisory: kernel security, bug fix, and enhancement update
|
kernel: infinite loop in update_blocked_averages() in kernel/sched/fair.c leading to denial of service kernel: insufficient input validation in kernel mode driver in Intel i915 graphics leads to privilege escalation kernel: a NULL pointer dereference in drivers/scsi/megaraid/megaraid_sas_base.c leading to DoS kernel: use-after-free in drivers/char/ipmi/ipmi_si_intf.c, ipmi_si_mem_io.c, ipmi_si_port_io.c
|
[
"cpe:/a:redhat:enterprise_linux:8::crb",
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 7 | 6.2 | null |
RHSA-2023:4469
|
Red Hat Security Advisory: firefox security update
|
Mozilla: Offscreen Canvas could have bypassed cross-origin restrictions Mozilla: Incorrect value used during WASM compilation Mozilla: Potential permissions request bypass via clickjacking Mozilla: Crash in DOMParser due to out-of-memory conditions Mozilla: Fix potential race conditions when releasing platform objects Mozilla: Stack buffer overflow in StorageManager Mozilla: Cookie jar overflow caused unexpected cookie jar state Mozilla: Memory safety bugs fixed in Firefox 116, Firefox ESR 115.1, Firefox ESR 102.14, Thunderbird 115.1, and Thunderbird 102.14 Mozilla: Memory safety bugs fixed in Firefox ESR 115.1, and Thunderbird 115.1
|
[
"cpe:/a:redhat:rhel_aus:8.4::appstream",
"cpe:/a:redhat:rhel_e4s:8.4::appstream",
"cpe:/a:redhat:rhel_tus:8.4::appstream"
] | null | 9.8 | null | null |
RHSA-2008:0238
|
Red Hat Security Advisory: kdegraphics security update
|
xpdf: embedded font vulnerability
|
[
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2023:7506
|
Red Hat Security Advisory: thunderbird security update
|
Mozilla: Out-of-bound memory access in WebGL2 blitFramebuffer Mozilla: Use-after-free in MessagePort::Entangled Mozilla: Clickjacking permission prompts using the fullscreen transition Mozilla: Use-after-free in ReadableByteStreamQueueEntry::Buffer Mozilla: Using Selection API would copy contents into X11 primary selection. Mozilla: Incorrect parsing of relative URLs starting with "///" Mozilla: Memory safety bugs fixed in Firefox 120, Firefox ESR 115.5, and Thunderbird 115.5
|
[
"cpe:/a:redhat:rhel_eus:9.0::appstream"
] | null | 8.8 | null | null |
RHSA-2021:1072
|
Red Hat Security Advisory: libldb security update
|
samba: Out of bounds read in AD DC LDAP server
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 7.1 | null | null |
RHSA-2012:1129
|
Red Hat Security Advisory: kernel security and bug fix update
|
kernel: excessive in kernel CPU consumption when creating large nested epoll structures kernel: netfilter: null pointer dereference in nf_ct_frag6_reasm()
|
[
"cpe:/o:redhat:rhel_eus:6.2::server"
] | null | null | null | null |
RHSA-2024:1787
|
Red Hat Security Advisory: squid security update
|
squid: Denial of Service in SSL Certificate validation squid: NULL pointer dereference in the gopher protocol code squid: Buffer over-read in the HTTP Message processing feature squid: Incorrect Check of Function Return Value In Helper Process management squid: denial of service in HTTP request parsing squid: denial of service in HTTP header parser
|
[
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 8.6 | null | null |
RHSA-2022:7088
|
Red Hat Security Advisory: libksba security update
|
libksba: integer overflow may lead to remote code execution
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 8.6 | null | null |
RHSA-2015:1837
|
Red Hat Security Advisory: qemu-kvm-rhev security update
|
Qemu: ui: vnc: heap memory corruption in vnc_refresh_server_surface
|
[
"cpe:/o:redhat:enterprise_linux:7::hypervisor"
] | null | null | null | null |
RHSA-2023:7382
|
Red Hat Security Advisory: kernel security and bug fix update
|
kernel: use-after-free due to race condition in qdisc_graft() kernel: net/sched: cls_fw component can be exploited as result of failure in tcf_change_indev function kernel: tun: bugs for oversize packet when napi frags enabled in tun_napi_alloc_frags kernel: netfilter: use-after-free due to improper element removal in nft_pipapo_remove() kernel: netfilter: nf_tables_newrule when adding a rule with NFTA_RULE_CHAIN_ID leads to use-after-free hw: amd: Cross-Process Information Leak kernel: netfilter: potential slab-out-of-bound access due to integer underflow
|
[
"cpe:/a:redhat:rhel_eus:9.0::appstream",
"cpe:/a:redhat:rhel_eus:9.0::crb",
"cpe:/o:redhat:rhel_eus:9.0::baseos"
] | null | 7 | null | null |
RHSA-2024:0774
|
Red Hat Security Advisory: Red Hat Certificate System 10.4 for RHEL 8 security and bug fix update
|
JSS: memory leak in TLS connection leads to OOM
|
[
"cpe:/a:redhat:certificate_system:10.4::el8"
] | null | 7.5 | null | null |
RHSA-2020:1317
|
Red Hat Security Advisory: nodejs:10 security update
|
ICU: Integer overflow in UnicodeString::doAppend()
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 8.8 | null | null |
RHSA-2014:0594
|
Red Hat Security Advisory: gnutls security update
|
gnutls: insufficient session id length check in _gnutls_read_server_hello (GNUTLS-SA-2014-3) libtasn1: multiple boundary check issues libtasn1: asn1_get_bit_der() can return negative bit length libtasn1: asn1_read_value_type() NULL pointer dereference
|
[
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2020:1175
|
Red Hat Security Advisory: taglib security update
|
taglib: heap-based buffer over-read via a crafted audio file
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 3.3 | null |
RHSA-2003:241
|
Red Hat Security Advisory: : Updated ddskk packages fix temporary file vulnerability
|
security flaw
|
[
"cpe:/o:redhat:linux:7.1",
"cpe:/o:redhat:linux:7.2",
"cpe:/o:redhat:linux:7.3",
"cpe:/o:redhat:linux:8.0",
"cpe:/o:redhat:linux:9"
] | null | null | null | null |
RHSA-2023:3142
|
Red Hat Security Advisory: firefox security update
|
Mozilla: Browser prompts could have been obscured by popups Mozilla: Crash in RLBox Expat driver Mozilla: Potential permissions request bypass via clickjacking Mozilla: Content process crash due to invalid wasm code Mozilla: Potential spoof due to obscured address bar Mozilla: Potential memory corruption in FileReader::DoReadData() Mozilla: Memory safety bugs fixed in Firefox 113 and Firefox ESR 102.11
|
[
"cpe:/a:redhat:rhel_eus:9.0::appstream"
] | null | 8.8 | null | null |
RHSA-2023:1572
|
Red Hat Security Advisory: pesign security update
|
pesign: Local privilege escalation on pesign systemd service
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 7.8 | null | null |
RHSA-2024:0436
|
Red Hat Security Advisory: libcap security update
|
libcap: Integer Overflow in _libcap_strdup()
|
[
"cpe:/a:redhat:rhel_eus:9.0::appstream",
"cpe:/o:redhat:rhel_eus:9.0::baseos"
] | null | 7.8 | null | null |
RHSA-2022:6815
|
Red Hat Security Advisory: squid security update
|
squid: buffer-over-read in SSPI and SMB authentication
|
[
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 8.6 | null | null |
RHSA-2012:0018
|
Red Hat Security Advisory: libxml2 security update
|
libxml2 out of bounds read libxml2: Heap-based buffer overflow when decoding an entity reference with a long name
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2023:1670
|
Red Hat Security Advisory: httpd and mod_http2 security update
|
httpd: HTTP request splitting with mod_rewrite and mod_proxy
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 9.8 | null | null |
RHSA-2024:2004
|
Red Hat Security Advisory: kernel security and bug fix update
|
kernel: race condition in VT_RESIZEX ioctl when vc_cons[i].d is already NULL leading to NULL pointer dereference Kernel: bluetooth: Unauthorized management command execution kernel: use after free in unix_stream_sendpage kernel: net/sched: sch_hfsc UAF kernel: irdma: Improper access control
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 5.6 | null | null |
RHSA-2019:2682
|
Red Hat Security Advisory: go-toolset-1.11 and go-toolset-1.11-golang security update
|
HTTP/2: flood using PING frames results in unbounded memory growth HTTP/2: flood using HEADERS frames results in unbounded memory growth
|
[
"cpe:/a:redhat:devtools:2019"
] | null | null | 7.5 | null |
RHSA-2016:2815
|
Red Hat Security Advisory: Red Hat Ceph Storage security, bug fix, and enhancement update
|
Ceph: RGW Denial of Service by sending null or specially crafted POST object requests
|
[
"cpe:/a:redhat:ceph_storage:2::el7"
] | null | null | 6.5 | null |
RHSA-2007:0276
|
Red Hat Security Advisory: shadow-utils security and bug fix update
|
security flaw
|
[
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2018:0418
|
Red Hat Security Advisory: libreoffice security update
|
libreoffice: Remote arbitrary file disclosure vulnerability via WEBSERVICE formula
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 4.7 | null |
RHSA-2009:1619
|
Red Hat Security Advisory: dstat security update
|
dstat insecure module search path
|
[
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2014:0316
|
Red Hat Security Advisory: thunderbird security update
|
Mozilla: Miscellaneous memory safety hazards (rv:24.4) (MFSA 2014-15) Mozilla: Out of bounds read during WAV file decoding (MFSA 2014-17) Mozilla: SVG filters information disclosure through feDisplacementMap (MFSA 2014-28) Mozilla: Information disclosure through polygon rendering in MathML (MFSA 2014-26) Mozilla: Memory corruption in Cairo during PDF font rendering (MFSA 2014-27) Mozilla: Privilege escalation using WebIDL-implemented APIs (MFSA 2014-29) Mozilla: Privilege escalation using WebIDL-implemented APIs (MFSA 2014-29) Mozilla: Use-after-free in TypeObject (MFSA 2014-30) Mozilla: Out-of-bounds read/write through neutering ArrayBuffer objects (MFSA 2014-31) Mozilla: Out-of-bounds write through TypedArrayObject after neutering (MFSA 2014-32)
|
[
"cpe:/a:redhat:rhel_productivity:5",
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2015:1708
|
Red Hat Security Advisory: libXfont security update
|
libXfont: missing range check in bdfReadProperties libXfont: crash on invalid read in bdfReadCharacters libXfont: out-of-bounds memory access in bdfReadCharacters
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation",
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | null | null |
RHBA-2013:1647
|
Red Hat Bug Fix Advisory: mysql bug fix update
|
mysql: geometry query crashes mysqld (CPU July 2013) mysql: unspecified DoS related to Full Text Search (CPU July 2013) mysql: unspecified DoS related to Server Optimizer (CPU July 2013) mysql: unspecified DoS related to Optimizer (CPU October 2013)
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2025:0372
|
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 8.0 security update
|
hornetq-core-client: Arbitrarily overwrite files or access sensitive information
|
[
"cpe:/a:redhat:jboss_enterprise_application_platform:8.0"
] | null | 7.1 | null | null |
RHSA-2020:4542
|
Red Hat Security Advisory: cryptsetup security, bug fix, and enhancement update
|
cryptsetup: Out-of-bounds write when validating segments
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 7.8 | null | null |
RHSA-2013:1373
|
Red Hat Security Advisory: jboss-remoting security update
|
Remoting: DoS by file descriptor exhaustion
|
[
"cpe:/a:redhat:jboss_enterprise_brms_platform:5.3.1"
] | null | null | null | null |
RHSA-2023:3561
|
Red Hat Security Advisory: firefox security update
|
Mozilla: Click-jacking certificate exceptions through rendering lag Mozilla: Memory safety bugs fixed in Firefox 114 and Firefox ESR 102.12
|
[
"cpe:/a:redhat:rhel_e4s:8.1::appstream"
] | null | 9.8 | null | null |
RHSA-2021:2361
|
Red Hat Security Advisory: postgresql:10 security update
|
postgresql: Buffer overrun from integer overflow in array subscripting calculations postgresql: Memory disclosure in INSERT ... ON CONFLICT ... DO UPDATE
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 6.5 | null | null |
RHSA-2017:0829
|
Red Hat Security Advisory: jboss-ec2-eap security, bug fix, and enhancement update
|
RESTEasy: Abuse of GZIPInterceptor in RESTEasy can lead to denial of service attack jboss: jbossas writable config files allow privilege escalation tomcat: Infinite loop in the processing of https requests
|
[
"cpe:/a:redhat:jboss_enterprise_application_platform:6::el6"
] | null | null | 7.5 | null |
RHSA-2004:537
|
Red Hat Security Advisory: openmotif security update
|
openmotif21 stack overflows in libxpm openmotif21 stack overflows in libxpm openmotif21 stack overflows in libxpm
|
[
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws"
] | null | null | null | null |
RHSA-2020:2636
|
Red Hat Security Advisory: Red Hat OpenShift Jaeger 1.17.3 container images security update
|
jaegertracing/jaeger: credentials leaked to container logs
|
[
"cpe:/a:redhat:jaeger:1.17::el7"
] | null | 7.1 | null | null |
RHSA-2024:0374
|
Red Hat Security Advisory: python-pip security update
|
python: tarfile module directory traversal
|
[
"cpe:/a:redhat:rhel_eus:8.6::appstream",
"cpe:/o:redhat:rhel_eus:8.6::baseos"
] | null | 5.5 | null | null |
RHSA-2025:0842
|
Red Hat Security Advisory: OpenShift Container Platform 4.14.46 security update
|
jinja2: Jinja has a sandbox breakout through malicious filenames jinja2: Jinja has a sandbox breakout through indirect reference to format method
|
[
"cpe:/a:redhat:openshift:4.14::el8",
"cpe:/a:redhat:openshift:4.14::el9",
"cpe:/a:redhat:openshift_ironic:4.14::el9"
] | null | 6.3 | null | null |
RHSA-2020:2321
|
Red Hat Security Advisory: Red Hat Data Grid 7.3.6 security update
|
wildfly-core: Path traversal can allow the extraction of .war archives to write arbitrary files (Zip Slip) thrift: Endless loop when feed with specific input data thrift: Out-of-bounds read related to TJSONProtocol or TSimpleJSONProtocol apache-commons-beanutils: does not suppresses the class property in PropertyUtilsBean by default hibernate-validator: safeHTML validator allows XSS jackson-databind: Serialization gadgets in com.zaxxer.hikari.HikariConfig netty: HTTP request smuggling by mishandled whitespace before the colon in HTTP headers jackson-databind: Serialization gadgets in org.apache.commons.dbcp.datasources.* jackson-databind: Serialization gadgets in com.p6spy.engine.spy.P6DataSource jackson-databind: Serialization gadgets in classes of the ehcache package netty: HTTP request smuggling netty: HttpObjectDecoder.java allows Content-Length header to accompanied by second Content-Length header netty: HTTP Request Smuggling due to Transfer-Encoding whitespace mishandling
|
[
"cpe:/a:redhat:jboss_data_grid:7.3"
] | null | 7.5 | 7.5 | null |
RHSA-2021:0151
|
Red Hat Security Advisory: dnsmasq security update
|
dnsmasq: heap-based buffer overflow in sort_rrset() when DNSSEC is enabled dnsmasq: buffer overflow in extract_name() due to missing length check when DNSSEC is enabled dnsmasq: heap-based buffer overflow with large memcpy in get_rdata() when DNSSEC is enabled dnsmasq: loose address/port check in reply_query() makes forging replies easier for an off-path attacker dnsmasq: loose query name check in reply_query() makes forging replies easier for an off-path attacker dnsmasq: multiple queries forwarded for the same name makes forging replies easier for an off-path attacker dnsmasq: heap-based buffer overflow with large memcpy in sort_rrset() when DNSSEC is enabled
|
[
"cpe:/a:redhat:rhel_eus:8.2::appstream"
] | null | 5.9 | null | null |
RHSA-2022:5678
|
Red Hat Security Advisory: Red Hat Virtualization security, bug fix, and enhancement update [ovirt-4.5.1]
|
kernel: buffer overflow in IPsec ESP transformation code grub2: Integer underflow in grub_net_recv_ip4_packets
|
[
"cpe:/o:redhat:rhev_hypervisor:4.4::el8"
] | null | 8.1 | null | null |
RHSA-2022:0230
|
Red Hat Security Advisory: Red Hat OpenShift Enterprise Logging bug fix and security update (5.2.6)
|
nodejs-ua-parser-js: ReDoS via malicious User-Agent header log4j-core: remote code execution via JDBC Appender
|
[
"cpe:/a:redhat:logging:5.2::el8"
] | null | 6.6 | null | null |
RHBA-2014:1376
|
Red Hat Bug Fix Advisory: xcb-util, xorg-x11-drivers, and mesa bug fix and enhancement update
|
openchrome: Multiple integer overflows leading to heap-based bufer overflows
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2005:473
|
Red Hat Security Advisory: lesstif security update
|
libxpm buffer overflow
|
[
"cpe:/o:redhat:enterprise_linux:2.1::as",
"cpe:/o:redhat:enterprise_linux:2.1::aw",
"cpe:/o:redhat:enterprise_linux:2.1::es",
"cpe:/o:redhat:enterprise_linux:2.1::ws"
] | null | null | null | null |
RHSA-2024:0866
|
Red Hat Security Advisory: java-1.8.0-ibm security update
|
JDK: Eclipse OpenJ9 JVM denial of service OpenJDK: IOR deserialization issue in CORBA (8303384) OpenJDK: certificate path validation issue during client authentication (8309966)
|
[
"cpe:/a:redhat:enterprise_linux:8::supplementary"
] | null | 5.3 | null | null |
RHSA-2012:1456
|
Red Hat Security Advisory: Red Hat Storage 2.0 security, bug fix, and enhancement update #3
|
GlusterFS: insecure temporary file creation
|
[
"cpe:/a:redhat:storage:2.0:server:el6",
"cpe:/a:redhat:storage:2:client:el5",
"cpe:/a:redhat:storage:3:client:el6"
] | null | null | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.