id
stringlengths 13
15
| title
stringlengths 29
176
| description
stringlengths 8
32.1k
| cpes
listlengths 0
20
| cvss_v4_0
null | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
null |
---|---|---|---|---|---|---|---|
RHSA-2018:1933
|
Red Hat Security Advisory: chromium-browser security update
|
chromium-browser: Out of bounds write in V8
|
[
"cpe:/a:redhat:rhel_extras:6"
] | null | null | 8.8 | null |
RHSA-2023:7533
|
Red Hat Security Advisory: tigervnc security update
|
xorg-x11-server: Out-of-bounds write in XIChangeDeviceProperty/RRChangeOutputProperty
|
[
"cpe:/a:redhat:rhel_eus:8.8::appstream"
] | null | 7.8 | null | null |
RHSA-2015:1842
|
Red Hat Security Advisory: Red Hat Storage 2.1 - 30 Day Retirement Notice
|
This is the 30-day notification for the retirement of Red Hat Storage 2.1.
|
[] | null | null | null | null |
RHSA-2018:1203
|
Red Hat Security Advisory: java-1.6.0-sun security update
|
JDK: unspecified vulnerability fixed in 6u191, 7u171, and 8u161 (Security) OpenJDK: incorrect merging of sections in the JAR manifest (Security, 8189969) OpenJDK: unrestricted deserialization of data from JCEKS key stores (Security, 8189997) OpenJDK: insufficient consistency checks in deserialization of multiple classes (Security, 8189977) OpenJDK: unbounded memory allocation during deserialization in TabularDataSupport (JMX, 8189985) OpenJDK: unbounded memory allocation during deserialization in Container (AWT, 8189989) OpenJDK: RMI HTTP transport enabled by default (RMI, 8193833) OpenJDK: incorrect handling of Reference clones can lead to sandbox bypass (Hotspot, 8192025) OpenJDK: unbounded memory allocation during deserialization in StubIORImpl (Serialization, 8192757)
|
[
"cpe:/a:redhat:rhel_extras_oracle_java:6"
] | null | null | 5.3 | null |
RHSA-2015:1629
|
Red Hat Security Advisory: mysql55-mysql security update
|
mysql: unspecified vulnerability related to Server:InnoDB:DML (CPU April 2015) mysql: unspecified vulnerability related to Server:Security:Encryption (CPU April 2015) mysql: unspecified vulnerability related to Server:Federated (CPU April 2015) mysql: unspecified vulnerability related to Server:Compiling (CPU April 2015) mysql: unspecified vulnerability related to Server:DDL (CPU April 2015) mysql: unspecified vulnerability related to Server:Security:Privileges (CPU April 2015) mysql: unspecified vulnerability related to Server:Optimizer (CPU April 2015) mysql: unspecified vulnerability related to Server:DDL (CPU April 2015) mysql: unspecified vulnerability related to Server:GIS (CPU July 2015) mysql: unspecified vulnerability related to Server:Security:Privileges (CPU July 2015) mysql: unspecified vulnerability related to Server:Optimizer (CPU July 2015) mysql: unspecified vulnerability related to Server:DML (CPU July 2015) mysql: unspecified vulnerability related to Server:Pluggable Auth (CPU July 2015) mysql: unspecified vulnerability related to Server:I_S (CPU July 2015) mysql: unspecified vulnerability related to Server:Optimizer (CPU July 2015) mysql: unspecified vulnerability related to Server:InnoDB (CPU October 2015) mysql: unspecified vulnerability related to Client programs (CPU October 2015) mysql: unspecified vulnerability related to Server:Security:Privileges (CPU October 2015) mysql: unspecified vulnerability related to Server:DML (CPU October 2015)
|
[
"cpe:/a:redhat:rhel_software_collections:2::el6",
"cpe:/a:redhat:rhel_software_collections:2::el7"
] | null | null | null | null |
RHSA-2022:8957
|
Red Hat Security Advisory: Red Hat build of Quarkus Platform 2.7.6.SP3 and security update
|
quarkus_dev_ui: Dev UI Config Editor is vulnerable to drive-by localhost attacks leading to RCE quarkus-vertx-http: Security misconfiguration of CORS : OWASP A05_2021 level in Quarkus mina-sshd: Java unsafe deserialization vulnerability
|
[
"cpe:/a:redhat:quarkus:2.7"
] | null | 9.8 | null | null |
RHSA-2006:0156
|
Red Hat Security Advisory: ethereal security update
|
security flaw security flaw security flaw
|
[
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws"
] | null | null | null | null |
RHSA-2013:1823
|
Red Hat Security Advisory: thunderbird security update
|
Mozilla: Out-of-bounds read in image rendering (MFSA 2013-22) Mozilla: Miscellaneous memory safety hazards (rv:24.2) (MFSA 2013-104) Mozilla: Character encoding cross-origin XSS attack (MFSA 2013-106) Mozilla: Use-after-free in synthetic mouse movement (MFSA 2013-114) Mozilla: Sandbox restrictions not applied to nested object elements (MFSA 2013-107) Mozilla: Use-after-free in event listeners (MFSA 2013-108) Mozilla: Use-after-free during Table Editing (MFSA 2013-109) Mozilla: Segmentation violation when replacing ordered list elements (MFSA 2013-111) Mozilla: Script execution in HTML mail replies (MFSA 2014-14)
|
[
"cpe:/a:redhat:rhel_productivity:5",
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2023:7877
|
Red Hat Security Advisory: openssl security update
|
openssl: Excessive time spent checking DH keys and parameters OpenSSL: Excessive time spent checking DH q parameter value openssl: Generating excessively long X9.42 DH keys or checking excessively long X9.42 DH keys or parameters may be very slow php: potential exposure to Marvin attack via unsafe implementation of RSA decryption API
|
[
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 5.9 | null | null |
RHSA-2017:1868
|
Red Hat Security Advisory: python security and bug fix update
|
python: failure to validate certificates in the HTTP client with TLS (PEP 476)
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 4.7 | null |
RHSA-2022:0777
|
Red Hat Security Advisory: kernel security, bug fix, and enhancement update
|
kernel: Use After Free in unix_gc() which could result in a local privilege escalation kernel: use-after-free in RDMA listen() kernel: tcp: fix page frag corruption on page fault kernel: possible privileges escalation due to missing TLB flush kernel: remote stack overflow via kernel panic on systems using TIPC may lead to DoS kernel: missing check in ioctl allows kernel memory read/write kernel: failing usercopy allows for use-after-free exploitation
|
[
"cpe:/a:redhat:rhel_eus:8.4::crb",
"cpe:/o:redhat:rhel_eus:8.4::baseos"
] | null | 7 | null | null |
RHSA-2009:1180
|
Red Hat Security Advisory: bind security and bug fix update
|
bind: DoS (assertion failure) via nsupdate packets
|
[
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2007:0673
|
Red Hat Security Advisory: kernel security update
|
security flaw Kernel: CAPI overflow Bluetooth setsockopt() information leaks IPv6 oops triggerable by any user
|
[
"cpe:/o:redhat:enterprise_linux:2.1::as",
"cpe:/o:redhat:enterprise_linux:2.1::aw"
] | null | null | null | null |
RHSA-2024:3999
|
Red Hat Security Advisory: ghostscript security update
|
ghostscript: OPVP device arbitrary code execution via custom Driver library
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::crb"
] | null | 8.8 | null | null |
RHSA-2020:0559
|
Red Hat Security Advisory: ksh security update
|
ksh: certain environment variables interpreted as arithmetic expressions on startup, leading to code injection
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 7.4 | null | null |
RHSA-2005:261
|
Red Hat Security Advisory: glibc security update
|
security flaw security flaw security flaw
|
[
"cpe:/o:redhat:enterprise_linux:2.1::as",
"cpe:/o:redhat:enterprise_linux:2.1::aw",
"cpe:/o:redhat:enterprise_linux:2.1::es",
"cpe:/o:redhat:enterprise_linux:2.1::ws"
] | null | null | null | null |
RHSA-2024:0941
|
Red Hat Security Advisory: OpenShift Container Platform 4.14.14 bug fix and security update
|
golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487)
|
[
"cpe:/a:redhat:openshift:4.14::el8",
"cpe:/a:redhat:openshift:4.14::el9"
] | null | 7.5 | null | null |
RHSA-2022:2281
|
Red Hat Security Advisory: OpenShift Container Platform 3.11.705 security update
|
openshift/router: route hijacking attack via crafted HAProxy configuration file
|
[
"cpe:/a:redhat:openshift:3.11::el7"
] | null | 6.3 | null | null |
RHSA-2015:2557
|
Red Hat Security Advisory: Red Hat JBoss A-MQ 6.2.1 update
|
groovy: remote execution of untrusted code in class MethodClosure Console: script injection into queue name apache-commons-collections: InvokerTransformer code execution during deserialisation
|
[
"cpe:/a:redhat:jboss_amq:6.2"
] | null | null | 9.6 | null |
RHSA-2024:5192
|
Red Hat Security Advisory: 389-ds-base security update
|
389-ds-base: Malformed userPassword hash may cause Denial of Service 389-ds-base: unauthenticated user can trigger a DoS by sending a specific extended search request
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::crb"
] | null | 6.5 | null | null |
RHSA-2024:5077
|
Red Hat Security Advisory: go-toolset:rhel8 security update
|
golang: net/http: golang: mime/multipart: golang: net/textproto: memory exhaustion in Request.ParseMultipartForm golang: net/netip: Unexpected behavior from Is methods for IPv4-mapped IPv6 addresses
|
[
"cpe:/a:redhat:rhel_eus:8.8::appstream"
] | null | 6.7 | null | null |
RHSA-2024:6811
|
Red Hat Security Advisory: OpenShift Container Platform 4.13.51 bug fix and security update
|
opentelemetry: DoS vulnerability in otelhttp golang: net/http, x/net/http2: unlimited number of CONTINUATION frames causes DoS opentelemetry-go-contrib: DoS vulnerability in otelgrpc due to unbound cardinality metrics go-retryablehttp: url might write sensitive information to log file QEMU: Denial of Service via Improper Synchronization in QEMU NBD Server During Socket Closure
|
[
"cpe:/a:redhat:openshift:4.13::el8",
"cpe:/a:redhat:openshift:4.13::el9"
] | null | 6 | 7.5 | null |
RHSA-2024:1567
|
Red Hat Security Advisory: OpenShift Container Platform 4.14.19 security update
|
golang-fips/openssl: Memory leaks in code encrypting and decrypting RSA payloads jose-go: improper handling of highly compressed data
|
[
"cpe:/a:redhat:openshift:4.14::el8",
"cpe:/a:redhat:openshift:4.14::el9"
] | null | 4.3 | null | null |
RHSA-2023:1987
|
Red Hat Security Advisory: kernel security and bug fix update
|
kernel: memory corruption in usbmon driver
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 6.7 | null | null |
RHSA-2023:5926
|
Red Hat Security Advisory: php security update
|
php: Password_verify() always return true with some hash php: 1-byte array overrun in common path resolve code php: DoS vulnerability when parsing multipart request body php: Missing error check and insufficient random bytes in HTTP Digest authentication for SOAP php: XML loading external entity without being enabled php: phar Buffer mismanagement
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 7 | null | null |
RHSA-2019:2154
|
Red Hat Security Advisory: opensc security, bug fix, and enhancement update
|
opensc: Buffer overflows handling responses from Muscle Cards in card-muscle.c:muscle_list_files() opensc: Buffer overflows handling responses from TCOS Cards in card-tcos.c:tcos_select_file() opensc: Buffer overflows handling responses from Gemsafe V1 Smartcards in pkcs15-gemsafeV1.c:gemsafe_get_cert_len() opensc: Buffer overflow handling string concatention in tools/util.c:util_acl_to_str() opensc: Buffer overflow handling responses from Cryptoflex cards in cryptoflex-tool.c:read_public_key() opensc: Buffer overflows handling responses from ePass 2003 Cards in card-epass2003.c:decrypt_response() opensc: Buffer overflows handling responses from CAC Cards in card-cac.c:cac_get_serial_nr_from_CUID() opensc: Buffer overflow handling responses from esteid cards in pkcs15-esteid.c:sc_pkcs15emu_esteid_init() opensc: Double free handling responses from smartcards in libopensc/sc.c:sc_file_set_sec_attr() opensc: Infinite recusrion handling responses from IAS-ECC cards in card-iasecc.c:iasecc_select_file() opensc: Out of bounds reads handling responses from smartcards
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 4.3 | null |
RHSA-2023:6596
|
Red Hat Security Advisory: cups security and bug fix update
|
cups: heap buffer overflow may lead to DoS cups: use-after-free in cupsdAcceptClient() in scheduler/client.c
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/o:redhat:enterprise_linux:9::baseos"
] | null | 7.1 | null | null |
RHSA-2024:2834
|
Red Hat Security Advisory: Red Hat Build of Apache Camel 4.4 for Quarkus 3.8 update is now available (RHBQ 3.8.4.SP1)
|
cxf-core: Apache CXF SSRF Vulnerability using the Aegis databinding
|
[
"cpe:/a:redhat:camel_quarkus:3"
] | null | 7.4 | null | null |
RHSA-2004:180
|
Red Hat Security Advisory: libpng security update
|
CAN-2004-0421 libpng can access out of bounds memory
|
[
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws"
] | null | null | null | null |
RHSA-2022:0209
|
Red Hat Security Advisory: java-11-openjdk security update
|
OpenJDK: Incomplete deserialization class filtering in ObjectInputStream (Serialization, 8264934) OpenJDK: Incorrect reading of TIFF files in TIFFNullDecompressor (ImageIO, 8270952) OpenJDK: Insufficient URI checks in the XSLT TransformerImpl (JAXP, 8270492) OpenJDK: Unexpected exception thrown in regex Pattern (Libraries, 8268813) OpenJDK: Incorrect marking of writeable fields (Hotspot, 8270386) OpenJDK: Incomplete checks of StringBuffer and StringBuilder during deserialization (Libraries, 8270392) OpenJDK: Incorrect IdentityHashMap size checks during deserialization (Libraries, 8270416) OpenJDK: Incorrect access checks in XMLEntityManager (JAXP, 8270498) OpenJDK: Infinite loop related to incorrect handling of newlines in XMLEntityScanner (JAXP, 8270646) OpenJDK: Array indexing issues in LIRGenerator (Hotspot, 8272014) OpenJDK: Excessive resource use when reading JAR manifest attributes (Libraries, 8272026) OpenJDK: Insufficient checks when deserializing exceptions in ObjectInputStream (Serialization, 8272236) OpenJDK: Excessive memory allocation in BMPImageReader (ImageIO, 8273756) OpenJDK: Integer overflow in BMPImageReader (ImageIO, 8273838) OpenJDK: Excessive memory allocation in TIFF*Decompressor (ImageIO, 8274096)
|
[
"cpe:/a:redhat:rhel_eus:8.2::appstream"
] | null | 5.3 | null | null |
RHSA-2017:2638
|
Red Hat Security Advisory: jboss-ec2-eap security, bug fix, and enhancement update
|
log4j: Socket receiver deserialization vulnerability tomcat: Security constrained bypass in error page mechanism jackson-databind: Deserialization vulnerability via readValue method of ObjectMapper log4j: deserialization of untrusted data in SocketServer
|
[
"cpe:/a:redhat:jboss_enterprise_application_platform:6::el6"
] | null | 9.8 | 8.1 | null |
RHSA-2019:1799
|
Red Hat Security Advisory: thunderbird security and bug fix update
|
Mozilla: Sandbox escape via installation of malicious language pack Mozilla: Memory safety bugs fixed in Firefox 68 and Firefox ESR 60.8 Mozilla: Script injection within domain through inner window reuse Mozilla: Cross-origin POST requests can be made with NPAPI plugins by following 308 redirects Mozilla: Use-after-free with HTTP/2 cached stream Mozilla: HTML parsing error can contribute to content XSS Mozilla: Caret character improperly escaped in origins Mozilla: Same-origin policy treats all files in a directory as having the same-origin
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | null | 6.1 | null |
RHSA-2011:0318
|
Red Hat Security Advisory: libtiff security update
|
libtiff: buffer overflow in Fax4Decode
|
[
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws",
"cpe:/o:redhat:enterprise_linux:5::server",
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2011:0182
|
Red Hat Security Advisory: openoffice.org security update
|
OpenOffice.org: directory traversal flaws in handling of XSLT jar filter descriptions and OXT extension files OpenOffice.org: Array index error by insecure parsing of broken rtf tables OpenOffice.org: Integer signedness error (crash) by processing certain RTF tags OpenOffice.org: Heap-based buffer overflow by processing *.doc files with WW8 list styles with specially-crafted count of list levels OpenOffice.org: Array index error by scanning document typography information of certain *.doc files OpenOffice.org: soffice insecure LD_LIBRARY_PATH setting OpenOffice.org: heap based buffer overflow in PPT import OpenOffice.org: heap based buffer overflow when parsing TGA files
|
[
"cpe:/a:redhat:rhel_productivity:5",
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation"
] | null | null | null | null |
RHSA-2024:10267
|
Red Hat Security Advisory: haproxy security update
|
haproxy: untrimmed URI fragments may lead to exposure of confidential data on static servers
|
[
"cpe:/a:redhat:rhel_eus:8.8::appstream"
] | null | 5.3 | null | null |
RHSA-2022:7958
|
Red Hat Security Advisory: libguestfs security, bug fix, and enhancement update
|
libguestfs: Buffer overflow in get_keys leads to DoS
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::crb"
] | null | 5.5 | null | null |
RHSA-2022:6250
|
Red Hat Security Advisory: booth security update
|
booth: authfile directive in booth config file is completely ignored.
|
[
"cpe:/a:redhat:rhel_eus:8.4::highavailability",
"cpe:/a:redhat:rhel_eus:8.4::resilientstorage"
] | null | 6.5 | null | null |
RHSA-2019:0364
|
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.1.6 on RHEL 6 security update
|
wildfly-core: Cross-site scripting (XSS) in JBoss Management Console undertow: Infoleak in some circumstances where Undertow can serve data from a random buffer dom4j: XML Injection in Class: Element. Methods: addElement, addAttribute which can impact the integrity of XML documents
|
[
"cpe:/a:redhat:jboss_enterprise_application_platform:7::el6"
] | null | null | 5.3 | null |
RHSA-2020:1050
|
Red Hat Security Advisory: cups security and bug fix update
|
cups: Local privilege escalation to root due to insecure environment variable handling cups: Manipulation of cupsd.conf by a local attacker resulting in limited reads of arbitrary files as root cups: Session cookie generated by the CUPS web interface is easy to guess cups: Predictable session cookie breaks CSRF protection
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 7.3 | null |
RHSA-2024:8434
|
Red Hat Security Advisory: OpenShift Container Platform 4.17.3 security update
|
golang-protobuf: encoding/protojson, internal/encoding/json: infinite loop in protojson.Unmarshal when unmarshaling certain forms of invalid JSON
|
[
"cpe:/a:redhat:openshift:4.17::el9"
] | null | 5.9 | null | null |
RHSA-2005:099
|
Red Hat Security Advisory: squirrelmail security update
|
security flaw security flaw security flaw
|
[
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2024:5644
|
Red Hat Security Advisory: cups security update
|
cups: Cupsd Listen arbitrary chmod 0140777
|
[
"cpe:/a:redhat:rhel_eus:9.2::appstream",
"cpe:/o:redhat:rhel_eus:9.2::baseos"
] | null | 4.4 | null | null |
RHSA-2016:0460
|
Red Hat Security Advisory: thunderbird security update
|
Mozilla: Miscellaneous memory safety hazards (rv:38.7) (MFSA 2016-16) Mozilla: Local file overwriting and potential privilege escalation through CSP reports (MFSA 2016-17) Mozilla: Memory leak in libstagefright when deleting an array during MP4 processing (MFSA 2016-20) Mozilla: Use-after-free in HTML5 string parser (MFSA 2016-23) Mozilla: Use-after-free in SetBody (MFSA 2016-24) Mozilla: Use-after-free during XML transformations (MFSA 2016-27) Mozilla: Memory corruption with malicious NPAPI plugin (MFSA 2016-31) Mozilla: Out-of-bounds read in HTML parser following a failed allocation (MFSA 2016-34) graphite2: multiple font parsing vulnerabilities (Mozilla MFSA 2016-37) graphite2: multiple font parsing vulnerabilities (Mozilla MFSA 2016-37) graphite2: multiple font parsing vulnerabilities (Mozilla MFSA 2016-37) graphite2: multiple font parsing vulnerabilities (Mozilla MFSA 2016-37) graphite2: multiple font parsing vulnerabilities (Mozilla MFSA 2016-37) graphite2: multiple font parsing vulnerabilities (Mozilla MFSA 2016-37) graphite2: multiple font parsing vulnerabilities (Mozilla MFSA 2016-37) graphite2: multiple font parsing vulnerabilities (Mozilla MFSA 2016-37) graphite2: multiple font parsing vulnerabilities (Mozilla MFSA 2016-37) graphite2: multiple font parsing vulnerabilities (Mozilla MFSA 2016-37) graphite2: multiple font parsing vulnerabilities (Mozilla MFSA 2016-37) graphite2: multiple font parsing vulnerabilities (Mozilla MFSA 2016-37) graphite2: multiple font parsing vulnerabilities (Mozilla MFSA 2016-37) graphite2: multiple font parsing vulnerabilities (Mozilla MFSA 2016-37)
|
[
"cpe:/a:redhat:rhel_productivity:5",
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation",
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | null | null |
RHSA-2014:1145
|
Red Hat Security Advisory: thunderbird security update
|
Mozilla: Miscellaneous memory safety hazards (rv:rv:24.8) (MFSA 2014-67) Mozilla: Use-after-free setting text directionality (MFSA 2014-72)
|
[
"cpe:/a:redhat:rhel_productivity:5",
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2022:7000
|
Red Hat Security Advisory: java-17-openjdk security and bug fix update
|
OpenJDK: improper MultiByte conversion can lead to buffer overflow (JGSS, 8286077) OpenJDK: improper handling of long NTLM client hostnames (Security, 8286526) OpenJDK: insufficient randomization of JNDI DNS port numbers (JNDI, 8286910) OpenJDK: excessive memory allocation in X.509 certificate parsing (Security, 8286533) OpenJDK: HttpServer no connection count limit (Lightweight HTTP Server, 8286918) harfbuzz: integer overflow in the component hb-ot-shape-fallback.cc OpenJDK: missing SNI caching in HTTP/2 (Networking, 8289366)
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb"
] | null | 3.7 | null | null |
RHSA-2013:0997
|
Red Hat Security Advisory: Red Hat SSA 3.2 and VSA 3.2 5-Month EOL Notice
|
This is the 5-Month notification of the End Of Life plans for Red Hat
Storage Software Appliance (SSA) 3.2 and Red Hat Virtual Storage Software
Appliance 3.2 (VSA).
|
[] | null | null | null | null |
RHSA-2015:0052
|
Red Hat Security Advisory: flash-plugin security update
|
flash-plugin: Information disclosure via various methods (APSB15-01) flash-plugin: Information disclosure via various methods (APSB15-01) flash-plugin: Multiple code-execution flaws (APSB15-01) flash-plugin: Multiple code-execution flaws (APSB15-01) flash-plugin: Multiple code-execution flaws (APSB15-01) flash-plugin: Multiple code-execution flaws (APSB15-01) flash-plugin: Information disclosure via various methods (APSB15-01) flash-plugin: Multiple code-execution flaws (APSB15-01) flash-plugin: Multiple code-execution flaws (APSB15-01)
|
[
"cpe:/a:redhat:rhel_extras:5::client",
"cpe:/a:redhat:rhel_extras:5::server",
"cpe:/a:redhat:rhel_extras:6"
] | null | null | null | null |
RHSA-2022:4930
|
Red Hat Security Advisory: python-twisted-web security update
|
python-twisted: possible http request smuggling
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 8.1 | null | null |
RHSA-2021:1195
|
Red Hat Security Advisory: Red Hat JBoss Web Server 5.4.2 Security Update
|
openssl: NULL pointer dereference in signature_algorithms processing openssl: CA certificate check bypass with X509_V_FLAG_X509_STRICT
|
[
"cpe:/a:redhat:jboss_enterprise_web_server:5.4::el7",
"cpe:/a:redhat:jboss_enterprise_web_server:5.4::el8"
] | null | 7.4 | null | null |
RHSA-2025:0832
|
Red Hat Security Advisory: OpenShift Container Platform 4.12.72 bug fix and security update
|
python: Path traversal on tempfile.TemporaryDirectory golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487) golang: net/http, x/net/http2: unlimited number of CONTINUATION frames causes DoS golang.org/x/net/html: Non-linear parsing of case-insensitive content in golang.org/x/net/html
|
[
"cpe:/a:redhat:openshift:4.12::el8",
"cpe:/a:redhat:openshift:4.12::el9"
] | null | 7.5 | null | null |
RHSA-2025:0645
|
Red Hat Security Advisory: OpenShift Container Platform 4.15.44 security update
|
golang.org/x/crypto/ssh: Misuse of ServerConfig.PublicKeyCallback may cause authorization bypass in golang.org/x/crypto golang.org/x/net/html: Non-linear parsing of case-insensitive content in golang.org/x/net/html
|
[
"cpe:/a:redhat:openshift:4.15::el8",
"cpe:/a:redhat:openshift:4.15::el9"
] | null | 7.5 | null | null |
RHSA-2023:2786
|
Red Hat Security Advisory: wayland security, bug fix, and enhancement update
|
wayland: libwayland-server wl_shm reference-count overflow
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 6.6 | null | null |
RHSA-2020:1852
|
Red Hat Security Advisory: patch security and bug fix update
|
patch: the following of symlinks in inp.c and util.c is mishandled in cases other than input files
|
[
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | null | 5.9 | null |
RHSA-2015:2538
|
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 6.4.5 update
|
EAP: missing authorization check for Monitor/Deployer/Auditor role when shutting down server apache-commons-collections: InvokerTransformer code execution during deserialisation
|
[
"cpe:/a:redhat:jboss_enterprise_application_platform:6::el5"
] | null | null | null | null |
RHSA-2008:0498
|
Red Hat Security Advisory: cups security update
|
cups: integer overflow in the image filter
|
[
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws",
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws",
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2015:1544
|
Red Hat Security Advisory: java-1.5.0-ibm security update
|
JDK: plain text data stored in memory dumps OpenJDK: deserialization issue in ObjectInputStream.readSerialData() (Libraries, 8076401) OpenJDK: non-constant time comparisons in crypto code (JCE, 8074865) OpenJDK: incorrect code permission checks in RMIConnectionImpl (JMX, 8075853) ICU: integer overflow in LETableReference verifyLength() (OpenJDK 2D, 8077520) JDK: unspecified vulnerability fixed in 6u101, 7u85 and 8u51 (2D) JDK: unspecified vulnerability fixed in 6u101, 7u85 and 8u51 (2D) JDK: unspecified vulnerability fixed in 6u101, 7u85 and 8u51 (Deployment) LOGJAM: TLS connections which support export grade DHE key-exchange are vulnerable to MITM attacks OpenJDK: improper permission checks in MBeanServerInvocationHandler (JMX, 8076397) OpenJDK: insufficient context checks during object deserialization (Libraries, 8076405) OpenJDK: RemoteObjectInvocationHandler allows calling finalize() (RMI, 8076409) OpenJDK: incorrect OCSP nextUpdate checking (Libraries, 8075374) OpenJDK: DnsClient fails to release request information after error (JNDI, 8075378) ICU: missing boundary checks in layout engine (OpenJDK 2D, 8071715)
|
[
"cpe:/a:redhat:rhel_extras:5::client",
"cpe:/a:redhat:rhel_extras:5::server",
"cpe:/a:redhat:rhel_extras:6"
] | null | null | 3.7 | null |
RHSA-2010:0867
|
Red Hat Security Advisory: flash-plugin security update
|
flash-plugin: security bulletin APSB10-26 flash-plugin: security bulletin APSB10-26 flash-plugin: security bulletin APSB10-26 flash-plugin: security bulletin APSB10-26 flash-plugin: security bulletin APSB10-26 flash-plugin: security bulletin APSB10-26 flash-plugin: security bulletin APSB10-26 flash-plugin: security bulletin APSB10-26 flash-plugin: security bulletin APSB10-26 flash-plugin: security bulletin APSB10-26 flash-plugin: security bulletin APSB10-26 flash-plugin: security bulletin APSB10-26 flash-plugin: security bulletin APSB10-26 flash-plugin: security bulletin APSB10-26 acroread/flash-plugin: critical vulnerablility (APSA10-05, APSB10-26)
|
[
"cpe:/a:redhat:rhel_extras:6"
] | null | null | null | null |
RHSA-2017:2471
|
Red Hat Security Advisory: spice security update
|
spice: Possible buffer overflow via invalid monitor configurations
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 9.1 | null |
RHSA-2020:3176
|
Red Hat Security Advisory: postgresql-jdbc security update
|
postgresql-jdbc: XML external entity (XXE) vulnerability in PgSQLXML
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 7.7 | null | null |
RHSA-2003:305
|
Red Hat Security Advisory: zebra security update
|
security flaw security flaw
|
[
"cpe:/o:redhat:enterprise_linux:2.1::as",
"cpe:/o:redhat:enterprise_linux:2.1::aw"
] | null | null | null | null |
RHSA-2017:0063
|
Red Hat Security Advisory: bind security update
|
bind: assertion failure while handling a query response containing inconsistent DNSSEC information
|
[
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server",
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | 7.5 | null |
RHSA-2023:1566
|
Red Hat Security Advisory: kernel security, bug fix, and enhancement update
|
kernel: net: CPU soft lockup in TC mirred egress-to-ingress action kernel: stack overflow in do_proc_dointvec and proc_skip_spaces ALSA: pcm: Move rwsem lock inside snd_ctl_elem_read to prevent UAF kernel: FUSE filesystem low-privileged user privileges escalation
|
[
"cpe:/a:redhat:enterprise_linux:8::crb",
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 7 | null | null |
RHSA-2014:1920
|
Red Hat Security Advisory: Red Hat JBoss Web Server 2.1.0 openssl security update
|
SSL/TLS: Padding Oracle On Downgraded Legacy Encryption attack
|
[
"cpe:/a:redhat:jboss_enterprise_web_server:2.1"
] | null | null | null | null |
RHSA-2009:0459
|
Red Hat Security Advisory: kernel security and bug fix update
|
Kernel BUG() in locks_remove_flock Linux kernel minor signal handling vulnerability kernel: memory disclosure in SO_BSDCOMPAT gsopt kernel: x86-64: syscall-audit: 32/64 syscall hole
|
[
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2012:1386
|
Red Hat Security Advisory: java-1.7.0-openjdk security update
|
OpenJDK: java.io.FilePermission information leak (Libraries, 6631398) OpenJDK: uninitialized Array JVM memory disclosure (Hotspot, 7198606) OpenJDK: RhinoScriptEngine security bypass (Scripting, 7143535) OpenJDK: Executors state handling issues (Concurrency, 7189103) OpenJDK: EnvHelp information disclosure (JMX, 7158796) OpenJDK: DescriptorSupport insufficient package access checks (JMX, 7192975) OpenJDK: AccessController.doPrivilegedWithCombiner() information disclosure (Security, 7172522) OpenJDK: LogManager security bypass (Libraries, 7169884) OpenJDK: com.sun.org.glassfish.* not restricted packages (JAX-WS, 7169887) OpenJDK: RMIConnectionImpl information disclosure (JMX, 7169888) OpenJDK: com.sun.org.glassfish.* not restricted packages (JAX-WS, 7163198) OpenJDK: SecureRandom mulitple seeders information disclosure (Security, 7167656) OpenJDK: ServiceLoader reject not subtype classes without instantiating (Libraries, 7195919) OpenJDK: JSSE denial of service (JSSE, 7186286) OpenJDK: DefaultFormatter insufficient data validation (Swing, 7195194) OpenJDK: disable Gopher support by default (Gopher, 7189567) OpenJDK: XMLDecoder sandbox restriction bypass (Beans, 7195917) OpenJDK: PropertyElementHandler insufficient access checks (Beans, 7195549) OpenJDK: MethodHandle insufficient access control checks (Libraries, 7196190) OpenJDK: RMIConnectionImpl insufficient access control checks (JMX, 7198296)
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2020:1350
|
Red Hat Security Advisory: chromium-browser security update
|
chromium-browser: Use after free in WebAudio chromium-browser: Use after free in WebAudio chromium-browser: Heap buffer overflow in media chromium-browser: Inappropriate implementation in V8
|
[
"cpe:/a:redhat:rhel_extras:6"
] | null | null | 8.8 | null |
RHSA-2018:3065
|
Red Hat Security Advisory: libkdcraw security update
|
LibRaw: Heap-based buffer overflow in LibRaw::kodak_ycbcr_load_raw function in internal/dcraw_common.cpp LibRaw: NULL pointer dereference in LibRaw::unpack function src/libraw_cxx.cpp LibRaw: Out-of-bounds read in kodak_radc_load_raw function internal/dcraw_common.cpp LibRaw: Stack-based buffer overflow in quicktake_100_load_raw() function in internal/dcraw_common.cpp LibRaw: NULL pointer dereference in leaf_hdr_load_raw() function in internal/dcraw_common.cpp
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 3.3 | null |
RHSA-2024:4505
|
Red Hat Security Advisory: Red Hat Build of Apache Camel 4.4 for Quarkus 3.8 update (RHBQ 3.8.5.GA)
|
org.bouncycastle: Importing an EC certificate with crafted F2m parameters may lead to Denial of Service bc-java: BouncyCastle vulnerable to a timing variant of Bleichenbacher (Marvin Attack) org.bouncycastle:bcprov-jdk18on: Infinite loop in ED25519 verification in the ScalarUtil class
|
[
"cpe:/a:redhat:camel_quarkus:3"
] | null | 7.5 | null | null |
RHSA-2016:2115
|
Red Hat Security Advisory: openstack-manila-ui security update
|
openstack-manila-ui: persistent XSS in metadata field
|
[
"cpe:/a:redhat:openstack:7::el7"
] | null | null | 4.1 | null |
RHSA-2007:0396
|
Red Hat Security Advisory: mod_perl security update
|
mod_perl PerlRun denial of service
|
[
"cpe:/a:redhat:rhel_application_stack:1"
] | null | null | null | null |
RHSA-2023:2478
|
Red Hat Security Advisory: curl security update
|
curl: Incorrect handling of control code characters in cookies curl: Use-after-free triggered by an HTTP proxy deny response
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/o:redhat:enterprise_linux:9::baseos"
] | null | 5.9 | null | null |
RHSA-2022:6995
|
Red Hat Security Advisory: thunderbird security update
|
expat: a use-after-free in the doContent function in xmlparse.c
|
[
"cpe:/a:redhat:rhel_eus:8.4::appstream"
] | null | 8.1 | null | null |
RHSA-2014:1306
|
Red Hat Security Advisory: bash security update
|
bash: code execution via specially-crafted environment (Incomplete fix for CVE-2014-6271) bash: parser can allow out-of-bounds memory access while handling redir_stack bash: off-by-one error in deeply nested flow control constructs
|
[
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::server",
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation",
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | null | null |
RHSA-2014:1287
|
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 6.3.1 update
|
Validator: JSM bypass via ReflectionHelper
|
[
"cpe:/a:redhat:jboss_enterprise_application_platform:6::el7"
] | null | null | null | null |
RHSA-2014:1690
|
Red Hat Security Advisory: python-backports-ssl_match_hostname security update
|
python: ssl.match_hostname() DoS via certificates with specially crafted hostname wildcard patterns
|
[
"cpe:/a:redhat:openstack:4::el6"
] | null | null | null | null |
RHSA-2006:0580
|
Red Hat Security Advisory: kernel security update
|
security flaw security flaw security flaw security flaw security flaw security flaw security flaw
|
[
"cpe:/o:redhat:enterprise_linux:2.1::as",
"cpe:/o:redhat:enterprise_linux:2.1::aw"
] | null | null | null | null |
RHSA-2016:1655
|
Red Hat Security Advisory: qemu-kvm-rhev security update
|
Qemu: block: iscsi: buffer overflow in iscsi_aio_ioctl Qemu: virtio: unbounded memory allocation on host via guest leading to DoS
|
[
"cpe:/a:redhat:openstack:5::el7"
] | null | null | 3.4 | null |
RHSA-2019:3837
|
Red Hat Security Advisory: kernel security update
|
hw: Machine Check Error on Page Size Change (IFU) hw: Intel GPU Denial Of Service while accessing MMIO in lower power state hw: TSX Transaction Asynchronous Abort (TAA)
|
[
"cpe:/o:redhat:enterprise_linux:7::hypervisor",
"cpe:/o:redhat:rhel_eus:7.6::computenode",
"cpe:/o:redhat:rhel_eus:7.6::server"
] | null | null | 6.5 | null |
RHSA-2024:8969
|
Red Hat Security Advisory: Red Hat Ansible Automation Platform Execution Environments Container Release Update
|
ansible-core: Exposure of Sensitive Information in Ansible Vault Files Due to Improper Logging ansible-core: Ansible-core user may read/write unauthorized content
|
[
"cpe:/a:redhat:ansible_automation_platform:ee::el8",
"cpe:/a:redhat:ansible_automation_platform:ee::el9"
] | null | 6.3 | null | null |
RHSA-2022:7830
|
Red Hat Security Advisory: nodejs:14 security update
|
nodejs: Improper handling of URI Subject Alternative Names nodejs: Certificate Verification Bypass via String Injection nodejs: Incorrect handling of certificate subject and issuer fields nodejs: Prototype pollution via console.table properties nodejs: HTTP Request Smuggling due to incorrect parsing of header fields
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 6.5 | null | null |
RHSA-2019:3352
|
Red Hat Security Advisory: gdb security, bug fix, and enhancement update
|
libiberty: Memory leak in demangle_template function resulting in a denial of service
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | null | 3.3 | null |
RHSA-2024:5814
|
Red Hat Security Advisory: nodejs:20 security update
|
nodejs: fs.lstat bypasses permission model nodejs: Bypass network import restriction via data URL node-tar: denial of service while parsing a tar file due to lack of folders depth validation nodejs: fs.fchown/fchmod bypasses permission model
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 3.9 | 2.9 | null |
RHSA-2024:0756
|
Red Hat Security Advisory: runc security update
|
runc: file descriptor leak
|
[
"cpe:/a:redhat:rhel_eus:9.0::appstream"
] | null | 8.6 | null | null |
RHSA-2017:0025
|
Red Hat Security Advisory: puppet-tripleo security update
|
puppet-tripleo: if ssl is enabled, traffic is open on both undercloud and overcloud
|
[
"cpe:/a:redhat:openstack:10::el7"
] | null | null | 7.1 | null |
RHSA-2023:0805
|
Red Hat Security Advisory: firefox security update
|
Mozilla: Content security policy leak in violation reports using iframes Mozilla: Extensions could have opened external schemes without user knowledge Mozilla: Screen hijack via browser fullscreen mode Mozilla: Out of bounds memory write from EncodeInputStream Mozilla: Potential use-after-free from compartment mismatch in SpiderMonkey Mozilla: Invalid downcast in SVGUtils::SetupStrokeGeometry Mozilla: Use-after-free in mozilla::dom::ScriptLoadContext::~ScriptLoadContext Mozilla: Web Crypto ImportKey crashes tab Mozilla: Fullscreen notification not shown in Firefox Focus Mozilla: Memory safety bugs fixed in Firefox 110 and Firefox ESR 102.8 Mozilla: Memory safety bugs fixed in Firefox ESR 102.8
|
[
"cpe:/a:redhat:rhel_eus:8.4::appstream"
] | null | 8.8 | null | null |
RHSA-2017:0517
|
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform security update
|
RESTEasy: Abuse of GZIPInterceptor in RESTEasy can lead to denial of service attack tomcat: Infinite loop in the processing of https requests
|
[
"cpe:/a:redhat:jboss_enterprise_application_platform:6.4"
] | null | null | 7.5 | null |
RHSA-2024:2735
|
Red Hat Security Advisory: Red Hat OpenStack Platform 17.1 (python-paramiko) security update
|
ssh: Prefix truncation attack on Binary Packet Protocol (BPP)
|
[
"cpe:/a:redhat:openstack:17.1::el9"
] | null | 5.9 | null | null |
RHSA-2020:2641
|
Red Hat Security Advisory: grafana security update
|
grafana: SSRF incorrect access control vulnerability allows unauthenticated users to make grafana send HTTP requests to any URL
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 8.2 | null | null |
RHSA-2024:1112
|
Red Hat Security Advisory: linux-firmware security update
|
hw: intel: Protection mechanism failure for some Intel(R) PROSet/Wireless WiFi hw: amd: INVD instruction may lead to a loss of SEV-ES guest machine memory integrity problem
|
[
"cpe:/o:redhat:rhel_eus:8.6::baseos"
] | null | 5.3 | null | null |
RHSA-2023:5995
|
Red Hat Security Advisory: python3 security update
|
python: TLS handshake bypass
|
[
"cpe:/a:redhat:rhel_e4s:8.1::appstream",
"cpe:/o:redhat:rhel_e4s:8.1::baseos"
] | null | 8.6 | null | null |
RHSA-2023:7778
|
Red Hat Security Advisory: postgresql:10 security update
|
postgresql: Buffer overrun from integer overflow in array modification
|
[
"cpe:/a:redhat:rhel_e4s:8.1::appstream"
] | null | 8.8 | null | null |
RHSA-2016:0321
|
Red Hat Security Advisory: Red Hat JBoss Fuse 6.2.1 update
|
apache-cxf: SAML SSO processing is vulnerable to wrapping attack
|
[
"cpe:/a:redhat:jboss_fuse:6.2"
] | null | null | null | null |
RHSA-2024:7818
|
Red Hat Security Advisory: containernetworking-plugins security update
|
encoding/gob: golang: Calling Decoder.Decode on a message which contains deeply nested structures can cause a panic due to stack exhaustion
|
[
"cpe:/a:redhat:rhel_eus:9.2::appstream"
] | null | 7.5 | null | null |
RHSA-2022:4992
|
Red Hat Security Advisory: xz security update
|
gzip: arbitrary-file-write vulnerability
|
[
"cpe:/a:redhat:rhel_eus:8.2::crb",
"cpe:/o:redhat:rhel_eus:8.2::baseos"
] | null | 8.8 | null | null |
RHSA-2007:0557
|
Red Hat Security Advisory: httpd security update
|
httpd mod_status XSS httpd mod_cache segfault httpd scoreboard lack of PID protection
|
[
"cpe:/a:redhat:rhel_application_stack:1"
] | null | null | null | null |
RHSA-2023:1179
|
Red Hat Security Advisory: Release of OpenShift Serverless Client kn 1.27.1
|
golang: net/http: excessive memory growth in a Go server accepting HTTP/2 requests
|
[
"cpe:/a:redhat:serverless:1.0::el8"
] | null | 5.3 | null | null |
RHSA-2024:7204
|
Red Hat Security Advisory: osbuild-composer security update
|
encoding/gob: golang: Calling Decoder.Decode on a message which contains deeply nested structures can cause a panic due to stack exhaustion
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 7.5 | null | null |
RHSA-2021:1679
|
Red Hat Security Advisory: bash security and bug fix update
|
bash: when effective UID is not equal to its real UID the saved UID is not dropped
|
[
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 7.8 | null | null |
RHSA-2017:3248
|
Red Hat Security Advisory: .NET Core security update
|
Core: DoS via invalid culture Core: DoS via bad certificate
|
[
"cpe:/a:redhat:rhel_dotnet:1.0::el7",
"cpe:/a:redhat:rhel_dotnet:1.1::el7",
"cpe:/a:redhat:rhel_dotnet:2.0::el7"
] | null | null | 5.9 | null |
RHSA-2019:0163
|
Red Hat Security Advisory: kernel security, bug fix, and enhancement update
|
kernel: userfaultfd bypasses tmpfs file permissions kernel: Use-after-free due to race condition in AF_PACKET implementation
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 7 | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.