id
stringlengths 13
15
| title
stringlengths 29
176
| description
stringlengths 8
32.1k
| cpes
listlengths 0
20
| cvss_v4_0
null | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
null |
---|---|---|---|---|---|---|---|
RHSA-2024:6188
|
Red Hat Security Advisory: runc security update
|
golang: crypto/x509: Verify panics on certificates with an unknown public key algorithm
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 5.9 | null | null |
RHSA-2002:128
|
Red Hat Security Advisory: Updated kernel with information security fixes, bug fixes, and updated drivers
|
security flaw
|
[
"cpe:/o:redhat:enterprise_linux:2.1::as"
] | null | null | null | null |
RHSA-2024:5231
|
Red Hat Security Advisory: bind and bind-dyndb-ldap security update
|
bind: bind9: BIND's database will be slow if a very large number of RRs exist at the same nam bind9: bind: SIG(0) can be used to exhaust CPU resources bind: bind9: Assertion failure when serving both stale cache data and authoritative zone content
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::crb"
] | null | 7.5 | null | null |
RHSA-2021:3392
|
Red Hat Security Advisory: kpatch-patch security update
|
kernel: race condition for removal of the HCI controller
|
[
"cpe:/o:redhat:rhel_e4s:7.6::server"
] | null | 7 | null | null |
RHSA-2015:0957
|
Red Hat Security Advisory: spacewalk-java security update
|
Satellite5: RPC API XML External Entities file disclosure
|
[
"cpe:/a:redhat:network_satellite:5.7::el6"
] | null | null | null | null |
RHSA-2019:0972
|
Red Hat Security Advisory: openwsman security update
|
openwsman: Disclosure of arbitrary files outside of the registered URIs
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb"
] | null | null | 7.5 | null |
RHSA-2015:1904
|
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 6.4.4 update
|
AS/WildFly: missing X-Frame-Options header leading to clickjacking EAP: CSRF vulnerability in EAP & WildFly Web Console OOME from EAP 6 http management console
|
[
"cpe:/a:redhat:jboss_enterprise_application_platform:6::el5"
] | null | null | null | null |
RHSA-2018:3831
|
Red Hat Security Advisory: firefox security update
|
Mozilla: Memory safety bugs fixed in Firefox 64 and Firefox ESR 60.4 firefox: Memory corruption in Angle Mozilla: Use-after-free with select element Mozilla: Buffer overflow in accelerated 2D canvas with Skia Mozilla: Same-origin policy violation using location attribute and performance.getEntries to steal cross-origin URLs Mozilla: Integer overflow when calculating buffer sizes for images
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | 9.8 | null |
RHSA-2024:0233
|
Red Hat Security Advisory: java-11-openjdk security update
|
OpenJDK: array out-of-bounds access due to missing range check in C1 compiler (8314468) OpenJDK: JVM class file verifier flaw allows unverified bytecode execution (8314295) OpenJDK: range check loop optimization issue (8314307) OpenJDK: arbitrary Java code execution in Nashorn (8314284) OpenJDK: logging of digital signature private keys (8316976) OpenJDK: RSA padding issue and timing side-channel attack against TLS (8317547)
|
[
"cpe:/a:redhat:rhel_aus:8.2::appstream",
"cpe:/a:redhat:rhel_e4s:8.2::appstream",
"cpe:/a:redhat:rhel_tus:8.2::appstream"
] | null | 7.4 | null | null |
RHSA-2023:3557
|
Red Hat Security Advisory: openshift-gitops-kam security update
|
go-restful: Authorization Bypass Through User-Controlled Key
|
[
"cpe:/a:redhat:openshift_gitops:1.9::el9"
] | null | 9.1 | null | null |
RHBA-2020:0547
|
Red Hat Bug Fix Advisory: Container Image Rebuild for Ansible Tower 3.4 Dependency
|
glibc: getaddrinfo should reject IP addresses with trailing characters ROHNP: Key Extraction Side Channel in Multiple Crypto Libraries openssl: timing side channel attack in the DSA signature algorithm procps: Local privilege escalation in top LibRaw: DoS in parse_rollei function in internal/dcraw_common.cpp LibRaw: DoS in parse_sinar_ia function in internal/dcraw_common.cpp nss: Cache side-channel variant of the Bleichenbacher attack binutils: Stack Exhaustion in the demangling functions provided by libiberty binutils: NULL pointer dereference in work_stuff_copy_to_from in cplus-dem.c. curl: NTLM password overflow via integer overflow python: Missing salt initialization in _elementtree.c module systemd: line splitting via fgets() allows for state injection during daemon-reexec elfutils: Heap-based buffer over-read in libdw/dwarf_getaranges.c:dwarf_getaranges() via crafted file elfutils: Double-free due to double decompression of sections in crafted ELF causes crash elfutils: Heap-based buffer over-read in libdw/dwarf_getabbrev.c and libwd/dwarf_hasattr.c causes crash curl: Heap-based buffer over-read in the curl tool warning formatting systemd: out-of-bounds read when parsing a crafted syslog message systemd: kills privileged process if unprivileged PIDFile was tampered elfutils: invalid memory address dereference was discovered in dwfl_segment_report_module.c in libdwfl elfutils: eu-size cannot handle recursive ar files elfutils: Divide-by-zero in arlib_add_symbols function in arlib.c krb5: Reachable assertion in the KDC using S4U2Self requests binutils: integer overflow leads to heap-based buffer overflow in objdump openssl: 0-byte record padding oracle libssh2: Zero-byte allocation with a specially crafted SFTP packed leading to an out-of-bounds read libssh2: Out-of-bounds reads with specially crafted SSH packets libssh2: Out-of-bounds memory comparison with specially crafted message channel request python: NULL pointer dereference using a specially crafted X509 certificate elfutils: heap-based buffer over-read in read_srclines in dwarf_getsrclines.c in libdw elfutils: segmentation fault in elf64_xlatetom in libelf/elf32_xlatetom.c elfutils: out of bound write in elf_cvt_note in libelf/note_xlate.h elfutils: heap-based buffer over-read in function elf32_xlatetom in elf32_xlatetom.c python: CRLF injection via the query part of the url passed to urlopen() python: CRLF injection via the path part of the url passed to urlopen() python: Undocumented local_file protocol allows remote attackers to bypass protection mechanisms nss: Empty or malformed p256-ECDH public keys may trigger a segmentation fault nss: Out-of-bounds write when passing an output buffer smaller than the block size to NSC_EncryptUpdate sqlite: fts3: improve shadow table corruption detection ansible: shell enabled by default in a pipe lookup plugin subprocess ansible: path injection on dest parameter in fetch module ansible: atomic_move primitive sets permissive permissions ansible: Extract-Zip function in win_unzip module does not check extracted path ansible: module package can be selected by the ansible facts ansible: svn module leaks password when specified as a parameter ansible: secrets readable after ansible-vault edit ansible: Information disclosure issue in ldap_attr and ldap_entry modules Ansible: kubectl connection plugin leaks sensitive information Ansible: code injection when using ansible_facts as a subkey Ansible: modules which use files encrypted with vault are not properly cleaned up
|
[
"cpe:/a:redhat:ansible_tower:3.4::el7"
] | null | 5 | 8.1 | null |
RHSA-2024:0930
|
Red Hat Security Advisory: kernel security update
|
kernel: malicious data for FBIOPUT_VSCREENINFO ioctl may cause OOB write memory kernel: KVM: nVMX: missing IBPB when exiting from nested guest can lead to Spectre v2 attacks kernel: media: em28xx: initialize refcount before kref_get kernel: use-after-free after failed devlink reload in devlink_param_get kernel: net/packet: slab-out-of-bounds access in packet_recvmsg() hw: cpu: arm64: Spectre-BHB kernel: use-after-free due to improper update of reference count in net/sched/cls_u32.c kernel: vmwgfx: integer overflow in vmwgfx_execbuf.c kernel: vmwgfx: NULL pointer dereference in vmw_cmd_dx_define_query kernel: vmwgfx: use-after-free in vmw_cmd_res_check kernel: vmwgfx: use-after-free in vmw_execbuf_tie_context kernel: sctp: fail if no bound addresses can be used for a given scope kernel: GSM multiplexing race condition leads to privilege escalation kernel: Out of boundary write in perf_read_group() as result of overflow a perf_event's read_size kernel: KVM: nVMX: missing consistency checks for CR0 and CR4 kernel: blocking operation in dvb_frontend_get_event and wait_event_interruptible kernel: use-after-free in amdgpu_cs_wait_all_fences in drivers/gpu/drm/amd/amdgpu/amdgpu_cs.c kernel: nf_tables: use-after-free vulnerability in the nft_verdict_init() function
|
[
"cpe:/a:redhat:rhel_eus:8.6::crb",
"cpe:/o:redhat:rhel_eus:8.6::baseos",
"cpe:/o:redhat:rhev_hypervisor:4.4::el8"
] | null | 7.8 | null | null |
RHSA-2024:7785
|
Red Hat Security Advisory: python-gevent security update
|
python-gevent: privilege escalation via a crafted script to the WSGIServer component
|
[
"cpe:/a:redhat:rhel_aus:8.2::appstream"
] | null | 9.1 | null | null |
RHSA-2011:0329
|
Red Hat Security Advisory: kernel security update
|
kernel: deficiency in handling of invalid data packets in lockd
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2018:2321
|
Red Hat Security Advisory: Red Hat Virtualization security, bug fix, and enhancement update
|
ansible: Inventory variables are loaded from current working directory when running ad-hoc command that can lead to code execution ansible: ansible.cfg is being read from current working directory allowing possible code execution
|
[
"cpe:/o:redhat:enterprise_linux:7::hypervisor"
] | null | null | 7.8 | null |
RHSA-2008:0300
|
Red Hat Security Advisory: bind security, bug fix, and enhancement update
|
bind: /etc/rndc.key has 644 permissions by default libbind off-by-one buffer overflow
|
[
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2004:304
|
Red Hat Security Advisory: pam security update
|
security flaw
|
[
"cpe:/o:redhat:enterprise_linux:2.1::as",
"cpe:/o:redhat:enterprise_linux:2.1::aw",
"cpe:/o:redhat:enterprise_linux:2.1::es",
"cpe:/o:redhat:enterprise_linux:2.1::ws"
] | null | null | null | null |
RHEA-2021:2679
|
Red Hat Enhancement Advisory: ACS 3.62 enhancement update
|
golang: net/http: panic in ReadRequest and ReadResponse when reading a very large header
|
[
"cpe:/a:redhat:advanced_cluster_security:3.62::el8"
] | null | 5.9 | null | null |
RHSA-2007:0465
|
Red Hat Security Advisory: pam security and bug fix update
|
security flaw security flaw
|
[
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws"
] | null | null | null | null |
RHSA-2024:8104
|
Red Hat Security Advisory: edk2 security update
|
edk2: Infinite loop when parsing unknown options in the Destination Options header edk2: Infinite loop when parsing a PadN option in the Destination Options header
|
[
"cpe:/a:redhat:rhel_eus:8.8::appstream"
] | null | 7.5 | null | null |
RHBA-2019:3408
|
Red Hat Bug Fix Advisory: openjpeg2 bug fix and enhancement update
|
openjpeg2: Excessive iteration in openjp2/t1.c:opj_t1_encode_cblks can allow for denial of service via crafted BMP file
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb"
] | null | null | 3.3 | null |
RHSA-2015:1643
|
Red Hat Security Advisory: kernel security and bug fix update
|
kernel: ping sockets: use-after-free leading to local privilege escalation
|
[
"cpe:/o:redhat:rhel_aus:6.4::server"
] | null | null | null | null |
RHSA-2015:1081
|
Red Hat Security Advisory: kernel security, bug fix, and enhancement update
|
kernel: partial ASLR bypass through TLS base addresses leak Kernel: fs: isofs: infinite loop in CE record entries kernel: ASLR bruteforce possible for vdso library kernel: pipe: iovec overrun leading to memory corruption Kernel: crypto: buffer overruns in RFC4106 implementation using AESNI
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2024:4619
|
Red Hat Security Advisory: libndp security update
|
libndp: buffer overflow in route information length field
|
[
"cpe:/o:redhat:rhel_e4s:9.0::baseos"
] | null | 8.1 | null | null |
RHSA-2016:0358
|
Red Hat Security Advisory: openstack-glance security update
|
openstack-glance: Glance image status manipulation through locations
|
[
"cpe:/a:redhat:openstack:5::el6"
] | null | null | null | null |
RHSA-2002:302
|
Red Hat Security Advisory: vim security update
|
security flaw
|
[
"cpe:/o:redhat:enterprise_linux:2.1::as",
"cpe:/o:redhat:enterprise_linux:2.1::aw"
] | null | null | null | null |
RHSA-2020:5399
|
Red Hat Security Advisory: thunderbird security update
|
Mozilla: Stack overflow due to incorrect parsing of SMTP server response codes
|
[
"cpe:/a:redhat:rhel_eus:8.2::appstream"
] | null | 8.8 | null | null |
RHSA-2020:0513
|
Red Hat Security Advisory: flash-plugin security update
|
flash-plugin: Arbitrary Code Execution vulnerability (APSB20-06)
|
[
"cpe:/a:redhat:rhel_extras:6"
] | null | null | 8.8 | null |
RHSA-2016:0118
|
Red Hat Security Advisory: Red Hat JBoss Operations Network 3.3.5 update
|
groovy: remote execution of untrusted code in class MethodClosure apache-commons-collections: InvokerTransformer code execution during deserialisation
|
[
"cpe:/a:redhat:jboss_operations_network:3.3"
] | null | null | 9.6 | null |
RHSA-2024:2877
|
Red Hat Security Advisory: OpenShift Container Platform 4.13.42 packages and security update
|
buildah: full container escape at build time jose-go: improper handling of highly compressed data
|
[
"cpe:/a:redhat:openshift:4.13::el8",
"cpe:/a:redhat:openshift:4.13::el9"
] | null | 4.3 | null | null |
RHSA-2024:4003
|
Red Hat Security Advisory: thunderbird security update
|
Mozilla: Use-after-free in JavaScript object transplant Mozilla: External protocol handlers leaked by timing attack Mozilla: Sandboxed iframes were able to bypass sandbox restrictions to open a new window Mozilla: Cross-Origin Image leak via Offscreen Canvas Mozilla: Memory Corruption in Text Fragments Mozilla: Memory safety bugs fixed in Firefox 127, Firefox ESR 115.12, and Thunderbird 115.12 Mozilla: Use-after-free in networking
|
[
"cpe:/a:redhat:rhel_aus:8.4::appstream",
"cpe:/a:redhat:rhel_e4s:8.4::appstream",
"cpe:/a:redhat:rhel_tus:8.4::appstream"
] | null | 7.5 | null | null |
RHSA-2015:0806
|
Red Hat Security Advisory: java-1.7.0-openjdk security update
|
jar: directory traversal vulnerability OpenJDK: incorrect handling of phantom references (Hotspot, 8071931) ICU: layout engine glyphStorage off-by-one (OpenJDK 2D, 8067699) OpenJDK: incorrect permissions check in resource loading (Beans, 8068320) OpenJDK: insufficient hardening of RSA-CRT implementation (JCE, 8071726) OpenJDK: jar directory traversal issues (Tools, 8064601) OpenJDK: certificate options parsing uncaught exception (JSSE, 8068720)
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation",
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | null | null |
RHSA-2020:2506
|
Red Hat Security Advisory: Red Hat JBoss Web Server 5.3.1 security update
|
tomcat: deserialization flaw in session persistence storage leading to RCE
|
[
"cpe:/a:redhat:jboss_enterprise_web_server:5.3::el6",
"cpe:/a:redhat:jboss_enterprise_web_server:5.3::el7",
"cpe:/a:redhat:jboss_enterprise_web_server:5.3::el8"
] | null | 7 | null | null |
RHSA-2008:0616
|
Red Hat Security Advisory: thunderbird security update
|
mozilla: CSS reference counter overflow (ZDI-CAN-349) Firefox malformed web content flaws Firefox javascript arbitrary code execution Firefox XSS attacks Firefox arbitrary signed JAR code execution Firefox arbitrary JavaScript code execution Firefox javascript arbitrary code execution Firefox arbitrary file disclosure Firefox .properties memory leak Firefox file location escaping flaw Firefox self signed certificate flaw Firefox arbitrary file disclosure Firefox block reflow flaw
|
[
"cpe:/a:redhat:rhel_productivity:5",
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws",
"cpe:/o:redhat:enterprise_linux:5::client"
] | null | null | null | null |
RHSA-2011:1102
|
Red Hat Security Advisory: libsoup security update
|
libsoup: SoupServer directory traversal flaw
|
[
"cpe:/o:redhat:enterprise_linux:6::server"
] | null | null | null | null |
RHSA-2020:0903
|
Red Hat Security Advisory: zsh security update
|
zsh: insecure dropping of privileges when unsetting PRIVILEGED option
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 7.8 | null | null |
RHSA-2007:0155
|
Red Hat Security Advisory: php security update
|
gd: buffer overrun security flaw security flaw security flaw security flaw security flaw security flaw
|
[
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws",
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2003:307
|
Red Hat Security Advisory: : Updated zebra packages fix security vulnerabilities
|
security flaw security flaw
|
[
"cpe:/o:redhat:linux:7.2",
"cpe:/o:redhat:linux:7.3",
"cpe:/o:redhat:linux:8.0",
"cpe:/o:redhat:linux:9"
] | null | null | null | null |
RHSA-2021:1811
|
Red Hat Security Advisory: libvncserver security update
|
libvncserver: uninitialized memory contents are vulnerable to Information Leak libvncserver: buffer overflow in ConnectClientToUnixSock() libvncserver: libvncserver/rfbregion.c has a NULL pointer dereference libvncserver: libvncclient/rfbproto.c does not limit TextChat size libvncserver: libvncserver/rfbserver.c has a divide by zero which could result in DoS
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb"
] | null | 7.5 | null | null |
RHSA-2011:0013
|
Red Hat Security Advisory: wireshark security update
|
Wireshark: Stack-based array index error in ENTTEC dissector (upstream bug #5539)
|
[
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws",
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server",
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2009:1560
|
Red Hat Security Advisory: java-1.6.0-sun security update
|
deprecate MD2 in SSL cert validation (Kaminsky) OpenJDK ICC_Profile file existence detection information leak (6631533) JRE TrueType font parsing crash (6815780) java-1.6.0-sun: ACE in JRE Deployment Toolkit (6869752) java-1.6.0-sun: Privilege escalation in the Java Web Start Installer (6872824) java-1.6.0-sun: Stack-based buffer overflow via a long file: URL argument (6854303) java-1.6.0-sun: Privilege escalation via crafted image file due improper color profiles parsing (6862970) OpenJDK JRE AWT setDifflCM stack overflow (6872357) OpenJDK JRE AWT setBytePixels heap overflow (6872358) JRE JPEG JFIF Decoder issue (6862969) OpenJDK JPEG Image Writer quantization problem (6862968) OpenJDK ImageI/O JPEG heap overflow (6874643) OpenJDK MessageDigest.isEqual introduces timing attack vulnerabilities (6863503) OpenJDK ASN.1/DER input stream parser denial of service (6864911) CVE-2009-3877 OpenJDK ASN.1/DER input stream parser denial of service (6864911) CVE-2009-3877 OpenJDK GraphicsConfiguration information leak(6822057) OpenJDK UI logging information leakage(6664512) OpenJDK resurrected classloaders can still have children (6636650) OpenJDK information leaks in mutable variables (6657026,6657138) OpenJDK information leaks in mutable variables (6657026,6657138) OpenJDK zoneinfo file existence information leak (6824265) REGRESSION: have problem to run JNLP app and applets with signed Jar files (6870531)
|
[
"cpe:/a:redhat:rhel_extras:4",
"cpe:/a:redhat:rhel_extras:5::client",
"cpe:/a:redhat:rhel_extras:5::server"
] | null | null | null | null |
RHSA-2024:0975
|
Red Hat Security Advisory: postgresql:13 security update
|
postgresql: non-owner 'REFRESH MATERIALIZED VIEW CONCURRENTLY' executes arbitrary SQL
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 8 | null | null |
RHSA-2023:5048
|
Red Hat Security Advisory: flac security update
|
flac: Remote Code Execution (RCE) via the bitwriter_grow_ function, by supplying crafted input to the encoder
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::crb"
] | null | 7.8 | null | null |
RHSA-2012:0137
|
Red Hat Security Advisory: texlive security update
|
t1lib: Heap based buffer overflow in DVI file AFM font parser t1lib: Heap-based buffer overflow DVI file AFM font parser t1lib: Invalid pointer dereference via crafted Type 1 font t1lib: invalid read crash via crafted Type 1 font t1lib: Use-after-free via crafted Type 1 font t1lib: Off-by-one via crafted Type 1 font
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2011:1087
|
Red Hat Security Advisory: java-1.5.0-ibm security update
|
JDK: unspecified vulnerabilities fixed in 6u26 (Sound) JDK: unspecified vulnerabilities fixed in 6u26 (Sound) OpenJDK: integer overflows in JPEGImageReader and font SunLayoutEngine (2D, 7013519) OpenJDK: Deserialization allows creation of mutable SignedObject (Deserialization, 6618658) OpenJDK: NetworkInterface information leak (Networking, 7013969) OpenJDK: MediaTracker created Component instances with unnecessary privileges (Swing, 7020198) JDK: unspecified vulnerability fixed in 6u26 (2D)
|
[
"cpe:/a:redhat:rhel_extras:4",
"cpe:/a:redhat:rhel_extras:5::client",
"cpe:/a:redhat:rhel_extras:5::server",
"cpe:/a:redhat:rhel_extras:6"
] | null | null | null | null |
RHSA-2023:0777
|
Red Hat Security Advisory: OpenShift Container Platform 4.9.56 security update
|
google-oauth-client: missing PKCE support in accordance with the RFC for OAuth 2.0 for Native Apps can lead to improper authorization SnakeYaml: Constructor Deserialization Remote Code Execution http2-server: Invalid HTTP/2 requests cause DoS snakeyaml: Denial of Service due to missing nested depth limitation for collections plugin: CSRF vulnerability in Script Security Plugin plugin: User-scoped credentials exposed to other users by Pipeline SCM API for Blue Ocean Plugin plugin: CSRF vulnerability in Blue Ocean Plugin plugin: missing permission checks in Blue Ocean Plugin jenkins: Observable timing discrepancy allows determining username validity jenkins-plugin: Cross-site Request Forgery (CSRF) in org.jenkins-ci.plugins:git plugin: Lack of authentication mechanism in Git Plugin webhook plugin: Lack of authentication mechanism in Git Plugin webhook plugin: Non-constant time webhook signature comparison in GitHub Plugin jenkins-plugin/script-security: Sandbox bypass vulnerabilities in Jenkins Script Security Plugin jenkins-plugin/workflow-cps: Sandbox bypass vulnerabilities in Pipeline: Groovy Plugin jenkins-plugin/script-security: Sandbox bypass vulnerabilities in Jenkins Script Security Plugin jenkins-plugin/script-security: Sandbox bypass vulnerabilities in Jenkins Script Security Plugin jenkins-plugin/pipeline-groovy-lib: Sandbox bypass vulnerability in Pipeline: Groovy Libraries Plugin jenkins-plugin/workflow-cps-global-lib: Sandbox bypass vulnerability in Pipeline: Deprecated Groovy Libraries Plugin jenkins-plugin/pipeline-input-step: CSRF protection for any URL can be bypassed in Pipeline: Input Step Plugin jenkins-plugin/pipeline-stage-view: CSRF protection for any URL can be bypassed in Pipeline: Stage View Plugin jenkins-plugin/workflow-support: Stored XSS vulnerability in Pipeline: Supporting APIs Plugin mina-sshd: Java unsafe deserialization vulnerability jenkins-plugin/script-security: Whole-script approval in Script Security Plugin vulnerable to SHA-1 collisions jenkins-plugin/JUnit: Stored XSS vulnerability in JUnit Plugin jenkins-plugin/pipeline-utility-steps: Arbitrary file read vulnerability in Pipeline Utility Steps Plugin
|
[
"cpe:/a:redhat:openshift:4.9::el8"
] | null | 8.1 | null | null |
RHSA-2004:505
|
Red Hat Security Advisory: Updated kernel packages fix security vulnerability
|
security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw
|
[
"cpe:/o:redhat:enterprise_linux:2.1::as",
"cpe:/o:redhat:enterprise_linux:2.1::es",
"cpe:/o:redhat:enterprise_linux:2.1::ws"
] | null | null | null | null |
RHSA-2025:0308
|
Red Hat Security Advisory: fence-agents security update
|
jinja2: Jinja has a sandbox breakout through malicious filenames jinja2: Jinja has a sandbox breakout through indirect reference to format method
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::highavailability",
"cpe:/a:redhat:enterprise_linux:9::resilientstorage"
] | null | 6.3 | null | null |
RHSA-2010:0470
|
Red Hat Security Advisory: flash-plugin security update
|
flash-plugin: crash caused by SWF files with different SWF versions obtained from the same URL flash-plugin: multiple security flaws (APSB10-14) flash-plugin: Arbitrary code execution by opening a specially-crafted PDF file with malicious SWF content (APSA10-01) flash-plugin: multiple security flaws (APSB10-14) flash-plugin: multiple security flaws (APSB10-14) flash-plugin: multiple security flaws (APSB10-14) flash-plugin: multiple security flaws (APSB10-14) flash-plugin: multiple security flaws (APSB10-14) flash-plugin: multiple security flaws (APSB10-14) flash-plugin: multiple security flaws (APSB10-14) flash-plugin: multiple security flaws (APSB10-14) flash-plugin: multiple security flaws (APSB10-14) flash-plugin: multiple security flaws (APSB10-14) flash-plugin: multiple security flaws (APSB10-14) flash-plugin: "possible player crash" affects also v9.x versions of Adobe Flash Player flash-plugin: multiple security flaws (APSB10-14) flash-plugin: multiple security flaws (APSB10-14) flash-plugin: multiple security flaws (APSB10-14) flash-plugin: multiple security flaws (APSB10-14) flash-plugin: multiple security flaws (APSB10-14) flash-plugin: multiple security flaws (APSB10-14) flash-plugin: multiple security flaws (APSB10-14) flash-plugin: multiple security flaws (APSB10-14) flash-plugin: multiple security flaws (APSB10-14) flash-plugin: multiple security flaws (APSB10-14) flash-plugin: multiple security flaws (APSB10-14) flash-plugin: multiple security flaws (APSB10-14) flash-plugin: multiple security flaws (APSB10-14) flash-plugin: multiple security flaws (APSB10-14) flash-plugin: multiple security flaws (APSB10-14) flash-plugin: multiple security flaws (APSB10-14)
|
[
"cpe:/a:redhat:rhel_extras:3",
"cpe:/a:redhat:rhel_extras:4"
] | null | null | null | null |
RHSA-2025:4240
|
Red Hat Security Advisory: Updated 6.1 container image is now available in the Red Hat Ecosystem Catalog.
|
golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487) golang: net/http, x/net/http2: unlimited number of CONTINUATION frames causes DoS golang: archive/zip: Incorrect handling of certain ZIP files golang: net/netip: Unexpected behavior from Is methods for IPv4-mapped IPv6 addresses encoding/gob: golang: Calling Decoder.Decode on a message which contains deeply nested structures can cause a panic due to stack exhaustion
|
[
"cpe:/a:redhat:ceph_storage:6.1::el9"
] | null | 7.5 | null | null |
RHSA-2022:1703
|
Red Hat Security Advisory: firefox security update
|
Mozilla: Bypassing permission prompt in nested browsing contexts Mozilla: iframe Sandbox bypass Mozilla: Reader mode bypassed SameSite cookies Mozilla: Fullscreen notification bypass using popups Mozilla: Leaking browser history with CSS variables Mozilla: Memory safety bugs fixed in Firefox 100 and Firefox ESR 91.9
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 9.8 | 7.5 | null |
RHSA-2024:2039
|
Red Hat Security Advisory: tigervnc security update
|
xorg-x11-server: Heap buffer overread/data leakage in ProcXIGetSelectedEvents xorg-x11-server: Heap buffer overread/data leakage in ProcXIPassiveGrabDevice xorg-x11-server: Use-after-free in ProcRenderAddGlyphs
|
[
"cpe:/a:redhat:rhel_eus:8.6::appstream"
] | null | 7.8 | null | null |
RHSA-2024:0100
|
Red Hat Security Advisory: Red Hat build of Keycloak 22.0.8 images enhancement and security update
|
keycloak: open redirect via "form_post.jwt" JARM response mode
|
[
"cpe:/a:redhat:build_keycloak:22::el9"
] | null | 4.6 | null | null |
RHSA-2003:109
|
Red Hat Security Advisory: : Updated balsa and mutt packages fix vulnerabilities
|
security flaw security flaw
|
[
"cpe:/o:redhat:linux:7.2",
"cpe:/o:redhat:linux:7.3",
"cpe:/o:redhat:linux:8.0",
"cpe:/o:redhat:linux:9"
] | null | null | null | null |
RHSA-2022:6113
|
Red Hat Security Advisory: Red Hat Application Interconnect 1.0 Release (rpms)
|
golang: net/http: improper sanitization of Transfer-Encoding header golang: go/parser: stack exhaustion in all Parse* functions golang: encoding/xml: stack exhaustion in Decoder.Skip golang: io/fs: stack exhaustion in Glob golang: compress/gzip: stack exhaustion in Reader.Read golang: path/filepath: stack exhaustion in Glob golang: encoding/xml: stack exhaustion in Unmarshal golang: net/http/httputil: NewSingleHostReverseProxy - omit X-Forwarded-For not working
|
[
"cpe:/a:redhat:application_interconnect:1::el8"
] | null | 6.5 | null | null |
RHSA-2015:1082
|
Red Hat Security Advisory: kernel security update
|
kernel: net: slab corruption from use after free on INIT collisions kernel: pipe: iovec overrun leading to memory corruption
|
[
"cpe:/o:redhat:rhel_mission_critical:6.2::server"
] | null | null | null | null |
RHSA-2022:6358
|
Red Hat Security Advisory: open-vm-tools security update
|
open-vm-tools: local root privilege escalation in the virtual machine
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 7 | null | null |
RHSA-2017:2679
|
Red Hat Security Advisory: kernel security update
|
kernel: stack buffer overflow in the native Bluetooth stack
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 7.5 | null |
RHSA-2022:1627
|
Red Hat Security Advisory: Red Hat AMQ Broker 7.9.4 release and security update
|
spring-framework: RCE via Data Binding on JDK 9+
|
[
"cpe:/a:redhat:amq_broker:7"
] | null | 8.1 | null | null |
RHSA-2002:195
|
Red Hat Security Advisory: tetex security update
|
security flaw
|
[
"cpe:/o:redhat:enterprise_linux:2.1::as"
] | null | null | null | null |
RHSA-2024:4050
|
Red Hat Security Advisory: libreswan security update
|
libreswan: IKEv1 default AH/ESP responder can crash and restart
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 6.5 | null | null |
RHSA-2004:414
|
Red Hat Security Advisory: qt security update
|
security flaw security flaw security flaw
|
[
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws"
] | null | null | null | null |
RHSA-2023:7544
|
Red Hat Security Advisory: libxml2 security update
|
libxml2: crafted xml can cause global buffer overflow
|
[
"cpe:/a:redhat:rhel_eus:8.8::appstream",
"cpe:/o:redhat:rhel_eus:8.8::baseos"
] | null | 6.5 | null | null |
RHSA-2016:1538
|
Red Hat Security Advisory: golang security, bug fix, and enhancement update
|
golang: HTTP request smuggling in net/http library golang: HTTP request smuggling in net/http library golang: HTTP request smuggling in net/http library golang: infinite loop in several big integer routines Go: sets environmental variable based on user supplied Proxy request header
|
[
"cpe:/o:redhat:enterprise_linux:7::server"
] | null | null | 5 | null |
RHSA-2023:7540
|
Red Hat Security Advisory: curl security and bug fix update
|
curl: cookie injection with none file
|
[
"cpe:/o:redhat:rhel_eus:8.8::baseos"
] | null | 3.7 | null | null |
RHSA-2010:0873
|
Red Hat Security Advisory: java-1.5.0-ibm security update
|
krb5: null pointer dereference in GSS-API library leads to DoS (MITKRB5-SA-2010-005) OpenJDK HttpURLConnection allows arbitrary request headers (6961084,6980004) OpenJDK DNS server IP address information leak (6957564) OpenJDK HttpURLConnection request splitting (6952017) JDK unspecified vulnerability in Java Web Start component OpenJDK local network address disclosure (6952603) JDK unspecified vulnerability in 2D component JDK unspecified vulnerability in Sound component OpenJDK IndexColorModel double-free (6925710) OpenJDK JPEG writeImage remote code execution (6963023) OpenJDK ICC Profile remote code execution (6963489) OpenJDK Deserialization Race condition (6559775) OpenJDK Serialization inconsistencies (6966692) JDK unspecified vulnerability in Sound component OpenJDK HttpURLConnection allows arbitrary request headers (6961084,6980004) OpenJDK HttpURLConnection incomplete TRACE permission check (6981426)
|
[
"cpe:/a:redhat:rhel_extras:6"
] | null | null | null | null |
RHSA-2020:2792
|
Red Hat Security Advisory: OpenShift Container Platform 4.4.11 grafana-container security update
|
grafana: SSRF incorrect access control vulnerability allows unauthenticated users to make grafana send HTTP requests to any URL
|
[
"cpe:/a:redhat:openshift:4.4::el7"
] | null | 8.2 | null | null |
RHSA-2021:5151
|
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.3.10 security update on RHEL 8
|
undertow: potential security issue in flow control over HTTP/2 may lead to DOS wildfly-elytron: possible timing attack in ScramServer wildfly: incorrect JBOSS_LOCAL_USER challenge location may lead to giving access to all the local users resteasy: Error message exposes endpoint class information jsoup: Crafted input may cause the jsoup HTML and XML parser to get stuck xml-security: XPath Transform abuse allows for information disclosure
|
[
"cpe:/a:redhat:jboss_enterprise_application_platform:7.3::el8"
] | null | 7.5 | null | null |
RHSA-2023:6894
|
Red Hat Security Advisory: OpenShift Container Platform 4.12.44 bug fix and security update
|
golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487)
|
[
"cpe:/a:redhat:openshift:4.12::el8",
"cpe:/a:redhat:openshift:4.12::el9"
] | null | 7.5 | null | null |
RHSA-2014:1335
|
Red Hat Security Advisory: python-django-horizon security and bug fix update
|
openstack-horizon: persistent XSS in Horizon Host Aggregates interface
|
[
"cpe:/a:redhat:openstack:5::el7"
] | null | null | null | null |
RHSA-2021:3956
|
Red Hat Security Advisory: xstream security update
|
xstream: Arbitrary code execution via unsafe deserialization of Xalan xsltc.trax.TemplatesImpl xstream: Infinite loop DoS via unsafe deserialization of sun.reflect.annotation.AnnotationInvocationHandler xstream: Arbitrary code execution via unsafe deserialization of com.sun.xml.internal.ws.client.sei.* xstream: Arbitrary code execution via unsafe deserialization of sun.tracing.* xstream: Arbitrary code execution via unsafe deserialization of com.sun.jndi.ldap.LdapBindingEnumeration xstream: Arbitrary code execution via unsafe deserialization of javax.swing.UIDefaults$ProxyLazyValue xstream: Arbitrary code execution via unsafe deserialization of com.sun.jndi.ldap.LdapSearchEnumeration xstream: Arbitrary code execution via unsafe deserialization of com.sun.jndi.toolkit.dir.ContextEnumerator xstream: Arbitrary code execution via unsafe deserialization of com.sun.corba.* xstream: Server-side request forgery (SSRF) via unsafe deserialization of com.sun.xml.internal.ws.client.sei.* xstream: Arbitrary code execution via unsafe deserialization of com.sun.jndi.ldap.LdapBindingEnumeration xstream: Server-side request forgery (SSRF) via unsafe deserialization of jdk.nashorn.internal.runtime.Source$URLData xstream: Arbitrary code execution via unsafe deserialization of Xalan xsltc.trax.TemplatesImpl xstream: Arbitrary code execution via unsafe deserialization of javax.swing.UIDefaults$ProxyLazyValue
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 8.5 | null | null |
RHSA-2020:1176
|
Red Hat Security Advisory: avahi security update
|
avahi: Multicast DNS responds to unicast queries outside of local network
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 5.8 | null |
RHSA-2015:1909
|
Red Hat Security Advisory: openstack-neutron security and bug fix update
|
openstack-neutron: Firewall rules bypass through port update
|
[
"cpe:/a:redhat:openstack:5::el6",
"cpe:/a:redhat:openstack:5::el7",
"cpe:/a:redhat:openstack:6::el7",
"cpe:/a:redhat:openstack:7::el7"
] | null | null | null | null |
RHSA-2025:1386
|
Red Hat Security Advisory: OpenShift Container Platform 4.16.35 security update
|
golang.org/x/net/html: Non-linear parsing of case-insensitive content in golang.org/x/net/html kernel: media: uvcvideo: Skip parsing frames of type UVC_VS_UNDEFINED in uvc_parse_format
|
[
"cpe:/a:redhat:openshift:4.16::el9"
] | null | 7.3 | null | null |
RHSA-2024:10525
|
Red Hat Security Advisory: Red Hat build of MicroShift 4.14.42 security update
|
runc: file descriptor leak
|
[
"cpe:/a:redhat:openshift:4.14::el9"
] | null | 8.6 | null | null |
RHSA-2015:0327
|
Red Hat Security Advisory: glibc security and bug fix update
|
glibc: crash in code page decoding functions (IBM933, IBM935, IBM937, IBM939, IBM1364) glibc: Unexpected closing of nss_files databases after lookups causes denial of service
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | null | null |
RHSA-2023:5946
|
Red Hat Security Advisory: Red Hat AMQ Broker 7.11.3 release and security update
|
netty: SniHandler 16MB allocation leads to OOM jetty: Improper validation of HTTP/1 content-length tomcat: Open Redirect vulnerability in FORM authentication HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack)
|
[
"cpe:/a:redhat:amq_broker:7"
] | null | 7.5 | null | null |
RHSA-2024:1544
|
Red Hat Security Advisory: dnsmasq security and bug fix update
|
dnsmasq: default maximum EDNS.0 UDP packet size was set to 4096 but should be 1232 bind9: KeyTrap - Extreme CPU consumption in DNSSEC validator bind9: Preparing an NSEC3 closest encloser proof can exhaust CPU resources
|
[
"cpe:/a:redhat:rhel_eus:8.8::appstream"
] | null | 7.5 | null | null |
RHSA-2024:7735
|
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.4 security update
|
undertow: Improper State Management in Proxy Protocol parsing causes information leakage
|
[
"cpe:/a:redhat:jboss_enterprise_application_platform:7.4"
] | null | 7.5 | null | null |
RHSA-2024:9884
|
Red Hat Security Advisory: Red Hat Trusted Profile Analyzer 1.2.0
|
path-to-regexp: Backtracking regular expressions cause ReDoS body-parser: Denial of Service Vulnerability in body-parser
|
[
"cpe:/a:redhat:trusted_profile_analyzer:1.2::el9"
] | null | 7.5 | null | null |
RHSA-2020:1342
|
Red Hat Security Advisory: telnet security update
|
telnet-server: no bounds checks in nextitem() function allows to remotely execute arbitrary code
|
[
"cpe:/a:redhat:rhel_e4s:8.0::appstream"
] | null | 9.8 | null | null |
RHSA-2022:2190
|
Red Hat Security Advisory: podman security update
|
psgo: Privilege escalation in 'podman top'
|
[
"cpe:/a:redhat:rhel_extras_other:7"
] | null | 8 | null | null |
RHSA-2016:2600
|
Red Hat Security Advisory: squid security, bug fix, and enhancement update
|
squid: some code paths fail to check bounds in string object squid: some code paths fail to check bounds in string object squid: wrong error handling for malformed HTTP responses squid: wrong error handling for malformed HTTP responses squid: denial of service issue in HTTP response processing
|
[
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | null | null |
RHSA-2019:1777
|
Red Hat Security Advisory: thunderbird security update
|
Mozilla: Sandbox escape via installation of malicious language pack Mozilla: Memory safety bugs fixed in Firefox 68 and Firefox ESR 60.8 Mozilla: Script injection within domain through inner window reuse Mozilla: Cross-origin POST requests can be made with NPAPI plugins by following 308 redirects Mozilla: Use-after-free with HTTP/2 cached stream Mozilla: HTML parsing error can contribute to content XSS Mozilla: Caret character improperly escaped in origins Mozilla: Same-origin policy treats all files in a directory as having the same-origin
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | 6.1 | null |
RHSA-2013:1134
|
Red Hat Security Advisory: httpd security update
|
httpd: mod_rewrite allows terminal escape sequences to be written to the log file httpd: mod_dav DoS (httpd child process crash) via a URI MERGE request with source URI not handled by mod_dav
|
[
"cpe:/a:redhat:jboss_enterprise_web_server:2.0.1"
] | null | null | null | null |
RHSA-2022:8648
|
Red Hat Security Advisory: krb5 security update
|
krb5: integer overflow vulnerabilities in PAC parsing
|
[
"cpe:/o:redhat:rhel_aus:8.2::baseos",
"cpe:/o:redhat:rhel_e4s:8.2::baseos",
"cpe:/o:redhat:rhel_tus:8.2::baseos"
] | null | 8.8 | null | null |
RHSA-2021:3488
|
Red Hat Security Advisory: Red Hat OpenStack Platform 16.2 (openstack-neutron) security update
|
openstack-neutron: arbitrary dnsmasq reconfiguration via extra_dhcp_opts
|
[
"cpe:/a:redhat:openstack:16.2::el8"
] | null | 7.6 | null | null |
RHSA-2020:3247
|
Red Hat Security Advisory: RHV Manager (ovirt-engine) 4.4 security, bug fix, and enhancement update
|
novnc: XSS vulnerability via the messages propagated to the status field bootstrap: XSS in the tooltip or popover data-template attribute libquartz: XXE attacks via job description ovirt-engine: response_type parameter allows reflected XSS nodejs-minimist: prototype pollution allows adding or modifying properties of Object.prototype using a constructor or __proto__ payload ovirt-engine: Redirect to arbitrary URL allows for phishing jquery: Cross-site scripting due to improper injQuery.htmlPrefilter method jquery: Untrusted code execution via <option> tag in HTML passed to DOM manipulation methods
|
[
"cpe:/a:redhat:rhev_manager:4.4:el8"
] | null | 6.1 | 5.4 | null |
RHSA-2011:1691
|
Red Hat Security Advisory: util-linux-ng security, bug fix, and enhancement update
|
util-linux: mount fails to anticipate RLIMIT_FSIZE util-linux: umount may fail to remove /etc/mtab~ lock file
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2020:3555
|
Red Hat Security Advisory: firefox security update
|
Mozilla: Integer overflow in nsJPEGEncoder::emptyOutputBuffer Mozilla: WebRTC permission prompt could have been bypassed by a compromised content process Mozilla: Out of bound read in Date.parse() Mozilla: X-Frame-Options bypass using object or embed tags Mozilla: Bypassing iframe sandbox when allowing popups Mozilla: Custom cursor can overlay user interface Mozilla: Type confusion for special arguments in IonMonkey Mozilla: Overriding file type when saving to disk Mozilla: Attacker-induced prompt for extension installation Mozilla: Use-After-Free when aborting an operation
|
[
"cpe:/a:redhat:rhel_e4s:8.0::appstream"
] | null | 8.8 | 6.1 | null |
RHSA-2024:4826
|
Red Hat Security Advisory: freeradius:3.0 security update
|
freeradius: forgery attack
|
[
"cpe:/a:redhat:rhel_aus:8.6::appstream",
"cpe:/a:redhat:rhel_e4s:8.6::appstream",
"cpe:/a:redhat:rhel_tus:8.6::appstream"
] | null | 9 | null | null |
RHSA-2020:0853
|
Red Hat Security Advisory: zsh security update
|
zsh: insecure dropping of privileges when unsetting PRIVILEGED option
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 7.8 | null | null |
RHSA-2024:1316
|
Red Hat Security Advisory: Red Hat JBoss Core Services Apache HTTP Server 2.4.57 SP3 security update
|
openssl: Generating excessively long X9.42 DH keys or checking excessively long X9.42 DH keys or parameters may be very slow mod_cluster/mod_proxy_cluster: Stored Cross site Scripting httpd: mod_macro: out-of-bounds read vulnerability curl: information disclosure by exploiting a mixed case flaw curl: excessively long file name may lead to unknown HSTS status
|
[
"cpe:/a:redhat:jboss_core_services:1::el7",
"cpe:/a:redhat:jboss_core_services:1::el8"
] | null | 5.3 | null | null |
RHSA-2016:1593
|
Red Hat Security Advisory: Red Hat JBoss BPM Suite 6.3.2 security and bug fix update
|
Framework: denial-of-service attack with XML input
|
[
"cpe:/a:redhat:jboss_bpms:6.3"
] | null | null | 5.3 | null |
RHSA-2024:6946
|
Red Hat Security Advisory: grafana-pcp security update
|
encoding/gob: golang: Calling Decoder.Decode on a message which contains deeply nested structures can cause a panic due to stack exhaustion
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 7.5 | null | null |
RHSA-2017:2799
|
Red Hat Security Advisory: kernel security update
|
kernel: load_elf_ binary() does not take account of the need to allocate sufficient space for the entire binary
|
[
"cpe:/o:redhat:rhel_aus:6.4::server"
] | null | null | 7.8 | null |
RHSA-2020:2027
|
Red Hat Security Advisory: OpenShift Container Platform 4.2.33 openshift-clients security update
|
proglottis/gpgme: Use-after-free in GPGME bindings during container image pull
|
[
"cpe:/a:redhat:openshift:4.2::el8"
] | null | 7.5 | null | null |
RHSA-2020:1708
|
Red Hat Security Advisory: liblouis security and bug fix update
|
liblouis: Segmentation fault in logging.c:lou_logPrint() liblouis: Stack-based buffer overflow in function includeFile in compileTranslationTable.c liblouis: Stack-based buffer overflow in function compileHyphenation in compileTranslationTable.c liblouis: Stack-based buffer overflow in compileTranslationTable.c
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | null | 3.3 | null |
RHSA-2017:0862
|
Red Hat Security Advisory: Red Hat Enterprise Linux 5 Retirement Notice
|
This is the final notification for the retirement of Red Hat Enterprise Linux 5. This notification applies only to those customers subscribed to the channel for Red Hat Enterprise Linux 5.
|
[
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2014:0939
|
Red Hat Security Advisory: python-django-horizon security, bug fix, and enhancement update
|
openstack-horizon: multiple XSS flaws openstack-horizon: multiple XSS flaws openstack-horizon: multiple XSS flaws openstack-horizon: multiple XSS flaws
|
[
"cpe:/a:redhat:openstack:5::el7"
] | null | null | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.