id
stringlengths 13
15
| title
stringlengths 29
176
| description
stringlengths 8
32.1k
| cpes
listlengths 0
20
| cvss_v4_0
null | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
null |
---|---|---|---|---|---|---|---|
RHSA-2024:10784
|
Red Hat Security Advisory: rhc security update
|
go-yaml: Improve heuristics preventing CPU/memory abuse by parsing malicious or large YAML documents
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 7.5 | null | null |
RHSA-2020:4035
|
Red Hat Security Advisory: webkitgtk4 security, bug fix, and enhancement update
|
webkitgtk: Multiple memory corruption issues leading to arbitrary code execution webkitgtk: processing maliciously crafted web content lead to URI spoofing webkitgtk: malicous web content leads to arbitrary code execution webkitgtk: malicious web content leads to arbitrary code execution webkitgtk: malicious crafted web content leads to arbitrary code execution webkitgtk: malicious crafted web content leads to arbitrary code execution webkitgtk: malicious crafted web content leads to arbitrary we content webkitgtk: malicious web content leads to cross site scripting webkitgtk: malicious crafted web content leads to arbitrary code execution webkitgtk: malicious web content leads to arbitrary code execution webkitgtk: malicious web content leads to arbitrary code execution webkitgtk: Multiple memory corruption issues leading to arbitrary code execution webkitgtk: Multiple memory corruption issues leading to arbitrary code execution webkitgtk: Multiple memory corruption issues leading to arbitrary code execution webkitgtk: Multiple memory corruption issues leading to arbitrary code execution webkitgtk: Multiple memory corruption issues leading to arbitrary code execution webkitgtk: Multiple memory corruption issues leading to arbitrary code execution webkitgtk: Multiple memory corruption issues leading to arbitrary code execution webkitgtk: Multiple memory corruption issues leading to arbitrary code execution webkitgtk: Multiple memory corruption issues leading to arbitrary code execution webkitgtk: Multiple memory corruption issues leading to arbitrary code execution webkitgtk: Out-of-bounds read leading to memory disclosure webkitgtk: Multiple memory corruption issues leading to arbitrary code execution webkitgtk: Multiple memory corruption issues leading to arbitrary code execution webkitgtk: Multiple memory corruption issues leading to arbitrary code execution webkitgtk: Multiple memory corruption issues leading to arbitrary code execution webkitgtk: Multiple memory corruption issues leading to arbitrary code execution webkitgtk: Multiple memory corruption issues leading to arbitrary code execution webkitgtk: Multiple memory corruption issues leading to arbitrary code execution webkitgtk: Multiple memory corruption issues leading to arbitrary code execution webkitgtk: Incorrect state management leading to universal cross-site scripting webkitgtk: Multiple memory corruption issues leading to arbitrary code execution webkitgtk: Incorrect state management leading to universal cross-site scripting webkitgtk: Incorrect state management leading to universal cross-site scripting webkitgtk: Multiple memory corruption issues leading to arbitrary code execution webkitgtk: Multiple memory corruption issues leading to arbitrary code execution webkitgtk: Multiple memory corruption issues leading to arbitrary code execution webkitgtk: Multiple memory corruption issues leading to arbitrary code execution webkitgtk: Multiple memory corruption issues leading to arbitrary code execution webkitgtk: Incorrect state management leading to universal cross-site scripting webkitgtk: Multiple memory corruption issues leading to arbitrary code execution webkitgtk: Multiple memory corruption issues leading to arbitrary code execution webkitgtk: Multiple memory corruption issues leading to arbitrary code execution webkitgtk: Multiple memory corruption issues leading to arbitrary code execution webkitgtk: Multiple memory corruption issues leading to arbitrary code execution webkitgtk: Multiple memory corruption issues leading to arbitrary code execution webkitgtk: Multiple memory corruption issues leading to arbitrary code execution webkitgtk: Multiple memory corruption issues leading to arbitrary code execution webkitgtk: Multiple memory corruption issues leading to arbitrary code execution webkitgtk: Multiple memory corruption issues leading to arbitrary code execution webkitgtk: Multiple memory corruption issues leading to arbitrary code execution webkitgtk: Multiple memory corruption issues leading to arbitrary code execution webkitgtk: Incorrect state management leading to universal cross-site scripting webkitgtk: Multiple memory corruption issues leading to arbitrary code execution webkitgtk: Multiple memory corruption issues leading to arbitrary code execution webkitgtk: Incorrect state management leading to universal cross-site scripting webkitgtk: Multiple memory corruption issues leading to arbitrary code execution webkitgtk: Multiple memory corruption issues leading to arbitrary code execution webkitgtk: Multiple memory corruption issues leading to arbitrary code execution webkitgtk: Multiple memory corruption issues leading to arbitrary code execution webkitgtk: Multiple memory corruption issues leading to arbitrary code execution webkitgtk: Multiple memory corruption issues leading to arbitrary code execution webkitgtk: Incorrect state management leading to universal cross-site scripting webkitgtk: Multiple memory corruption issues leading to arbitrary code execution webkitgtk: Multiple memory corruption issues leading to arbitrary code execution webkitgtk: Browsing history could not be deleted webkitgtk: Websites could reveal browsing history webkitgtk: Violation of iframe sandboxing policy webkitgtk: Multiple memory corruption issues leading to arbitrary code execution webkitgtk: Multiple memory corruption issues leading to arbitrary code execution webkitgtk: Multiple memory corruption issues leading to arbitrary code execution webkitgtk: Multiple memory corruption issues leading to arbitrary code execution webkitgtk: Multiple memory corruption issues leading to arbitrary code execution webkitgtk: Incorrect state management leading to universal cross-site scripting webkitgtk: Multiple memory corruption issues leading to arbitrary code execution webkitgtk: Multiple memory corruption issues leading to arbitrary code execution webkitgtk: Multiple memory corruption issues leading to arbitrary code execution webkitgtk: Multiple memory corruption issues leading to arbitrary code execution webkitgtk: Multiple memory corruption issues leading to arbitrary code execution webkitgtk: Multiple memory corruption issues leading to arbitrary code execution webkitgtk: Multiple memory corruption issues leading to arbitrary code execution webkitgtk: Multiple memory corruption issues leading to arbitrary code execution webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution webkitgtk: Use after free issue may lead to remote code execution webkitgtk: HTTP proxy setting deanonymization information disclosure webkitgtk: Denial of service via incorrect memory handling webkitgtk: Non-unique security origin for DOM object contexts webkitgtk: Incorrect security check for a top-level DOM object context webkitgtk: Incorrect state management leading to universal cross-site scripting webkitgtk: Multiple memory corruption issues leading to arbitrary code execution webkitgtk: Incorrect processing of file URLs webkitgtk: Race condition allows reading of restricted memory webkitgtk: Memory corruption triggered by a malicious web content webkitgtk: Type confusion leading to arbitrary code execution webkitgtk: Memory consumption issue leading to arbitrary code execution webkitgtk: Memory corruption triggered by a malicious web content webkitgtk: Type confusion leading to arbitrary code execution webkitgtk: Input validation issue leading to cross-site script attack webkitgtk: Use-after-free issue in accessibility/AXObjectCache.cpp webkitgtk: use-after-free via crafted web content webkitgtk: Buffer overflow leading to arbitrary code execution webkitgtk: Memory corruption leading to arbitrary code execution webkitgtk: Use-after-free leading to arbitrary code execution
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 8.8 | 6.5 | null |
RHSA-2024:10186
|
Red Hat Security Advisory: ACS 4.5 enhancement update
|
cross-spawn: regular expression denial of service golang: archive/zip: Incorrect handling of certain ZIP files golang: net/netip: Unexpected behavior from Is methods for IPv4-mapped IPv6 addresses encoding/gob: golang: Calling Decoder.Decode on a message which contains deeply nested structures can cause a panic due to stack exhaustion body-parser: Denial of Service Vulnerability in body-parser dompurify: DOMPurify vulnerable to tampering by prototype pollution
|
[
"cpe:/a:redhat:advanced_cluster_security:4.5::el8"
] | null | 8.2 | null | null |
RHSA-2024:4591
|
Red Hat Security Advisory: Red Hat OpenShift Data Foundation 4.16.0 security, enhancement & bug fix update
|
get-func-name: ReDoS in chai module opentelemetry-go-contrib: DoS vulnerability in otelgrpc due to unbound cardinality metrics golang-fips/openssl: Memory leaks in code encrypting and decrypting RSA payloads submariner-operator: RBAC permissions can allow for the spread of node compromises golang: crypto/x509: Verify panics on certificates with an unknown public key algorithm golang: html/template: errors returned from MarshalJSON methods may break template escaping golang-protobuf: encoding/protojson, internal/encoding/json: infinite loop in protojson.Unmarshal when unmarshaling certain forms of invalid JSON jose: resource exhaustion jose-go: improper handling of highly compressed data node-tar: denial of service while parsing a tar file due to lack of folders depth validation nodejs-ws: denial of service when handling a request with many HTTP headers
|
[
"cpe:/a:redhat:openshift_data_foundation:4.16::el9"
] | null | 5.9 | null | null |
RHBA-2011:0054
|
Red Hat Bug Fix Advisory: samba3x bug fix and enhancement update
|
samba: mount.cifs improper device name and mountpoint strings sanitization samba: Race condition by mount (mount.cifs) operations
|
[
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2005:766
|
Red Hat Security Advisory: squid security update
|
security flaw security flaw security flaw
|
[
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws",
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2022:8989
|
Red Hat Security Advisory: kpatch-patch security update
|
kernel: KVM: cmpxchg_gpte can write to pfns outside the userspace region kernel: openvswitch: integer underflow leads to out-of-bounds write in reserve_sfa_size()
|
[
"cpe:/o:redhat:rhel_e4s:8.2::baseos"
] | null | 7.8 | null | null |
RHSA-2024:5584
|
Red Hat Security Advisory: libreoffice security update
|
libreoffice: Ability to trust not validated macro signatures removed in high security mode
|
[
"cpe:/a:redhat:rhel_e4s:9.0::appstream"
] | null | 7.8 | null | null |
RHSA-2011:0791
|
Red Hat Security Advisory: tomcat6 security and bug fix update
|
tomcat: file permission bypass flaw tomcat: cross-site-scripting vulnerability in the manager application tomcat: XSS vulnerability in HTML Manager interface
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2021:2303
|
Red Hat Security Advisory: microcode_ctl security, bug fix and enhancement update
|
hw: vt-d related privilege escalation hw: improper isolation of shared resources in some Intel Processors hw: observable timing discrepancy in some Intel Processors hw: information disclosure on some Intel Atom processors
|
[
"cpe:/o:redhat:rhel_aus:7.6::server",
"cpe:/o:redhat:rhel_e4s:7.6::server",
"cpe:/o:redhat:rhel_tus:7.6::server"
] | null | 5.6 | null | null |
RHSA-2018:3771
|
Red Hat Security Advisory: ansible security and bug fix update
|
ansible: become password logged in plaintext when used with PowerShell on Windows
|
[
"cpe:/a:redhat:ansible_engine:2.6::el7"
] | null | null | 4.2 | null |
RHSA-2013:1553
|
Red Hat Security Advisory: qemu-kvm security, bug fix, and enhancement update
|
qemu: buffer overflow in scsi_target_emulate_report_luns
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2024:3999
|
Red Hat Security Advisory: ghostscript security update
|
ghostscript: OPVP device arbitrary code execution via custom Driver library
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::crb"
] | null | 8.8 | null | null |
RHSA-2015:1218
|
Red Hat Security Advisory: php security update
|
php: Double-free in zend_ts_hash_graceful_destroy() php: heap buffer overflow in enchant_broker_request_dict() gd: buffer read overflow in gd_gif_in.c php: Free called on unitialized pointer in exif.c php: use after free vulnerability in unserialize() with DateTimeZone php: use after free in phar_object.c php: buffer over-read in Phar metadata parsing php: use-after-free vulnerability in the process_nested_data function in ext/standard/var_unserializer.re php: invalid pointer free() in phar_tar_process_metadata() php: buffer overflow in phar_set_inode() php: missing null byte checks for paths in various PHP extensions php: missing null byte checks for paths in various PHP extensions php: memory corruption in phar_parse_tarfile caused by empty entry file name php: integer overflow leading to heap overflow when reading FTP file listing php: multipart/form-data request parsing CPU usage DoS php: pcntl_exec() accepts paths with NUL character php: SoapClient's __call() type confusion through unserialize() php: SoapClient's do_soap_call() type confusion after unserialize() php: missing null byte checks for paths in DOM and GD extensions php: type confusion issue in unserialize() with various SOAP methods php: type confusion issue in unserialize() with various SOAP methods php: type confusion issue in unserialize() with various SOAP methods php: Incomplete Class unserialization type confusion php: exception:: getTraceAsString type confusion issue after unserialize php: integer overflow in ftp_genlist() resulting in heap overflow (improved fix for CVE-2015-4022)
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2020:2298
|
Red Hat Security Advisory: openvswitch security, bug fix and enhancement update
|
dpdk: librte_vhost Integer overflow in vhost_user_set_log_base() dpdk: librte_vhost Integer truncation in vhost_user_check_and_alloc_queue_pair()
|
[
"cpe:/o:redhat:enterprise_linux:7::fastdatapath",
"cpe:/o:redhat:enterprise_linux:7::hypervisor"
] | null | 6.7 | null | null |
RHSA-2023:5269
|
Red Hat Security Advisory: postgresql:15 security update
|
postgresql: schema_element defeats protective search_path changes postgresql: row security policies disregard user ID changes after inlining.
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 4.2 | null | null |
RHSA-2024:5024
|
Red Hat Security Advisory: Red Hat JBoss Web Server 5.8.1 release and security update
|
tomcat: Improper Handling of Exceptional Conditions tomcat: Denial of Service in Tomcat
|
[
"cpe:/a:redhat:jboss_enterprise_web_server:5.8::el7",
"cpe:/a:redhat:jboss_enterprise_web_server:5.8::el8",
"cpe:/a:redhat:jboss_enterprise_web_server:5.8::el9"
] | null | 7.5 | null | null |
RHSA-2006:0612
|
Red Hat Security Advisory: krb5 security update
|
security flaw
|
[
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2016:2842
|
Red Hat Security Advisory: Red Hat OpenShift Enterprise 2.x - 30 Day End Of Life Notice
|
This is the 30 Day notification for the End of Production Phase 1 of Red Hat
OpenShift Enterprise 2.x (2.0, 2.1 and 2.2).
|
[
"cpe:/a:redhat:openshift:2.0::enterprise"
] | null | null | null | null |
RHSA-2023:0818
|
Red Hat Security Advisory: thunderbird security update
|
Mozilla: User Interface lockup with messages combining S/MIME and OpenPGP Mozilla: Content security policy leak in violation reports using iframes Mozilla: Extensions could have opened external schemes without user knowledge Mozilla: Screen hijack via browser fullscreen mode Mozilla: Out of bounds memory write from EncodeInputStream Mozilla: Potential use-after-free from compartment mismatch in SpiderMonkey Mozilla: Invalid downcast in SVGUtils::SetupStrokeGeometry Mozilla: Use-after-free in mozilla::dom::ScriptLoadContext::~ScriptLoadContext Mozilla: Web Crypto ImportKey crashes tab Mozilla: Fullscreen notification not shown in Firefox Focus Mozilla: Memory safety bugs fixed in Firefox 110 and Firefox ESR 102.8 Mozilla: Memory safety bugs fixed in Firefox ESR 102.8
|
[
"cpe:/a:redhat:rhel_e4s:8.1::appstream"
] | null | 8.8 | null | null |
RHSA-2009:1233
|
Red Hat Security Advisory: kernel security update
|
kernel: uninit op in SOCKOPS_WRAP() leads to privesc kernel: udp socket NULL ptr dereference
|
[
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws"
] | null | null | null | null |
RHSA-2020:5231
|
Red Hat Security Advisory: thunderbird security update
|
Mozilla: Variable time processing of cross-origin images during drawImage calls Mozilla: Parsing mismatches could confuse and bypass security sanitizer for chrome privileged code Mozilla: Fullscreen could be enabled without displaying the security UI Mozilla: XSS through paste (manual and clipboard API) Mozilla: Requests intercepted through ServiceWorkers lacked MIME type restrictions Mozilla: Use-after-free in WebRequestService Mozilla: Potential use-after-free in uses of nsTArray Mozilla: DoH did not filter IPv4 mapped IP Addresses Mozilla: Software keyboards may have remembered typed passwords Mozilla: Memory safety bugs fixed in Firefox 83 and Firefox ESR 78.5
|
[
"cpe:/a:redhat:rhel_eus:8.1::appstream"
] | null | 8.8 | 6.1 | null |
RHSA-2021:1600
|
Red Hat Security Advisory: opensc security, bug fix, and enhancement update
|
opensc: heap-based buffer overflow in sc_oberthur_read_file opensc: stack-based buffer overflow in sc_pkcs15emu_gemsafeGPK_init opensc: stack-based buffer overflow in tcos_decipher
|
[
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 6.4 | null | null |
RHSA-2019:2936
|
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.2.4 on RHEL 7 security update
|
undertow: Information leak in requests for directories without trailing slashes codehaus: incomplete fix for unsafe deserialization in jackson-databind vulnerabilities undertow: DEBUG log for io.undertow.request.security if enabled leaks credentials to log files jackson-databind: polymorphic typing issue allows attacker to read arbitrary local files on the server. jackson-databind: failure to block the logback-core class from polymorphic deserialization leading to remote code execution jackson-databind: polymorphic typing issue allows attacker to read arbitrary local files on the server via crafted JSON message. jackson-databind: default typing mishandling leading to remote code execution
|
[
"cpe:/a:redhat:jboss_enterprise_application_platform:7.2::el7"
] | null | null | 9.8 | null |
RHSA-2022:6978
|
Red Hat Security Advisory: kpatch-patch security update
|
kernel: a use-after-free in cls_route filter implementation may lead to privilege escalation
|
[
"cpe:/o:redhat:rhel_eus:8.4::baseos"
] | null | 7.8 | null | null |
RHSA-2020:2486
|
Red Hat Security Advisory: unzip security update
|
unzip: overlapping of files in ZIP container leads to denial of service
|
[
"cpe:/o:redhat:rhel_eus:7.7::computenode",
"cpe:/o:redhat:rhel_eus:7.7::server"
] | null | null | 4 | null |
RHSA-2022:7447
|
Red Hat Security Advisory: pcs security, bug fix, and enhancement update
|
pcs: improper authentication via PAM
|
[
"cpe:/a:redhat:enterprise_linux:8::highavailability",
"cpe:/a:redhat:enterprise_linux:8::resilientstorage"
] | null | 6.3 | null | null |
RHSA-2003:119
|
Red Hat Security Advisory: micq security update
|
security flaw
|
[
"cpe:/o:redhat:enterprise_linux:2.1::as",
"cpe:/o:redhat:enterprise_linux:2.1::aw",
"cpe:/o:redhat:enterprise_linux:2.1::es",
"cpe:/o:redhat:enterprise_linux:2.1::ws"
] | null | null | null | null |
RHSA-2023:6539
|
Red Hat Security Advisory: perl-CPAN security update
|
perl: CPAN.pm does not verify TLS certificates when downloading distributions over HTTPS
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 7.4 | null | null |
RHSA-2003:145
|
Red Hat Security Advisory: Updated kernel fixes security vulnerabilities and updates drivers
|
security flaw security flaw
|
[
"cpe:/o:redhat:enterprise_linux:2.1::as",
"cpe:/o:redhat:enterprise_linux:2.1::aw"
] | null | null | null | null |
RHSA-2023:0114
|
Red Hat Security Advisory: kernel-rt security and bug fix update
|
kernel: memory corruption in AX88179_178A based USB ethernet device. kernel: i915: Incorrect GPU TLB flush can lead to random memory access
|
[
"cpe:/a:redhat:enterprise_linux:8::nfv",
"cpe:/a:redhat:enterprise_linux:8::realtime"
] | null | 7 | null | null |
RHSA-2021:4730
|
Red Hat Security Advisory: devtoolset-11-binutils security update
|
environment: Unicode's bidirectional (BiDi) override characters can cause trojan source attacks
|
[
"cpe:/a:redhat:rhel_software_collections:3::el7"
] | null | 8.5 | null | null |
RHSA-2016:0304
|
Red Hat Security Advisory: openssl security update
|
openssl: assertion failure in SSLv2 servers OpenSSL: SSLv2 doesn't block disabled ciphers openssl: Divide-and-conquer session key recovery in SSLv2 openssl: SSLv2 Bleichenbacher protection overwrites wrong bytes for export ciphers SSL/TLS: Cross-protocol attack on TLS using SSLv2 (DROWN)
|
[
"cpe:/o:redhat:rhel_aus:5.9",
"cpe:/o:redhat:rhel_mission_critical:5.6"
] | null | null | null | null |
RHSA-2025:4188
|
Red Hat Security Advisory: Red Hat OpenShift Builds 1.2
|
golang.org/x/crypto/ssh: Denial of Service in the Key Exchange of golang.org/x/crypto/ssh golang-jwt/jwt: jwt-go allows excessive memory allocation during header parsing
|
[
"cpe:/a:redhat:openshift_builds:1.2::el9"
] | null | 7.5 | null | null |
RHSA-2024:7429
|
Red Hat Security Advisory: kpatch-patch-4_18_0-553 and kpatch-patch-4_18_0-553_16_1 security update
|
kernel: wifi: mac80211: Avoid address calculations via out of bounds array indexing kernel: virtio-net: tap: mlx5_core short frame denial of service kernel: virtio-net: tun: mlx5_core short frame denial of service
|
[
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 7.1 | null | null |
RHSA-2019:2125
|
Red Hat Security Advisory: ovmf security and enhancement update
|
edk2: Privilege escalation via processing of malformed files in TianoCompress.c edk2: Privilege escalation via processing of malformed files in BaseUefiDecompressLib.c edk2: Privilege escalation via heap-based buffer overflow in MakeTable() function edk2: Privilege escalation via stack-based buffer overflow in MakeTable() function edk2: Privilege escalation via heap-based buffer overflow in Decode() function edk2: Logic error in MdeModulePkg in EDK II firmware allows for privilege escalation by authenticated users openssl: Side-channel vulnerability on SMT/Hyper-Threading architectures (PortSmash) edk2: Stack buffer overflow with corrupted BMP edk2: Buffer overflows in PartitionDxe and UdfDxe with long file names and invalid UDF media edk2: stack overflow in XHCI causing denial of service
|
[
"cpe:/o:redhat:enterprise_linux:7::server"
] | null | null | 5.9 | null |
RHSA-2020:3453
|
Red Hat Security Advisory: OpenShift Container Platform 4.5.6 security update
|
jenkins-credentials-binding-plugin: information disclosure in build log when build contains no build steps jenkins-credentials-binding-plugin: improper masking of secrets jenkins-2-plugins/matrix-project: Stored XSS vulnerability in single axis builds tooltips jenkins-2-plugins/matrix-project: Stored XSS vulnerability in multiple axis builds tooltips jenkins-2-plugins/matrix-auth: Stored XSS vulnerability in Matrix Authorization Strategy Plugin python-rsa: decryption of ciphertext leads to DoS
|
[
"cpe:/a:redhat:openshift:4.5::el7"
] | null | 7.5 | null | null |
RHSA-2023:0462
|
Red Hat Security Advisory: thunderbird security update
|
Mozilla: libusrsctp library out of date Mozilla: Fullscreen notification bypass Mozilla: Arbitrary file read from GTK drag and drop on Linux Mozilla: Malicious command could be hidden in devtools output Mozilla: URL being dragged from cross-origin iframe into same tab triggers navigation Mozilla: Content Security Policy wasn't being correctly applied to WebSockets in WebWorkers Mozilla: Calls to <code>console.log</code> allowed bypasing Content Security Policy via format directive Mozilla: Memory safety bugs fixed in Firefox 109 and Firefox ESR 102.7
|
[
"cpe:/a:redhat:rhel_eus:8.6::appstream"
] | null | 8.8 | null | null |
RHSA-2021:0508
|
Red Hat Security Advisory: subversion:1.10 security update
|
subversion: Remote unauthenticated denial of service in mod_authz_svn
|
[
"cpe:/a:redhat:rhel_eus:8.2::appstream"
] | null | 7.5 | null | null |
RHSA-2023:2127
|
Red Hat Security Advisory: samba security update
|
samba: RC4/HMAC-MD5 NetLogon Secure Channel is weak and should be avoided
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::crb",
"cpe:/a:redhat:enterprise_linux:9::resilientstorage",
"cpe:/o:redhat:enterprise_linux:9::baseos"
] | null | 8.1 | null | null |
RHSA-2011:1380
|
Red Hat Security Advisory: java-1.6.0-openjdk security update
|
HTTPS: block-wise chosen-plaintext attack against SSL/TLS (BEAST) OpenJDK: IIOP deserialization code execution (Deserialization, 7055902) OpenJDK: missing SecurityManager checks in scripting engine (Scripting, 7046823) OpenJDK: InputStream skip() information leak (Networking/IO, 7000600) OpenJDK: mutable static AWTKeyStroke.ctor (AWT, 7019773) OpenJDK: Java2D TransformHelper integer overflow (2D, 7023640) OpenJDK: excessive default UDP socket limit under SecurityManager (Networking, 7032417) OpenJDK: JAX-WS stack-traces information leak (JAX-WS, 7046794) OpenJDK: insufficient pack200 JAR files uncompress error checks (Runtime, 7057857) OpenJDK: RMI DGC server remote code execution (RMI, 7077466) OpenJDK: RMI registry privileged code execution (RMI, 7083012) OpenJDK: Hotspot unspecified issue (Hotspot, 7070134) OpenJDK: missing checkSetFactory calls in HttpsURLConnection (JSSE, 7096936)
|
[
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::server",
"cpe:/o:redhat:enterprise_linux:6::server"
] | null | null | null | null |
RHSA-2023:1896
|
Red Hat Security Advisory: Red Hat Advanced Cluster Management 2.5 hotfix security update for console
|
vm2: sandbox escape vm2: Sandbox Escape vm2: Sandbox Escape when exception sanitization
|
[
"cpe:/a:redhat:acm:2.5::el8"
] | null | 9.8 | null | null |
RHSA-2018:0152
|
Red Hat Security Advisory: kernel-rt security and bug fix update
|
kernel: local privesc in key management kernel: keyctl_set_reqkey_keyring() leaks thread keyrings kernel: NULL pointer dereference due to KEYCTL_READ on negative key kernel: Null pointer dereference due to incorrect node-splitting in assoc_array implementation kernel: Use-after-free in the af_packet.c
|
[
"cpe:/a:redhat:rhel_extras_rt:7"
] | null | null | 7.8 | null |
RHSA-2021:4356
|
Red Hat Security Advisory: kernel security, bug fix, and enhancement update
|
kernel: Intel graphics card information leak. kernel: Overlayfs in the Linux kernel and shiftfs not restoring original value on error leading to a refcount underflow kernel: out-of-bounds reads in pinctrl subsystem. kernel: Improper input validation in some Intel(R) Ethernet E810 Adapter drivers kernel: Insufficient access control in some Intel(R) Ethernet E810 Adapter drivers kernel: Uncontrolled resource consumption in some Intel(R) Ethernet E810 Adapter drivers kernel: Fragmentation cache not cleared on reconnection kernel: Reassembling fragments encrypted under different keys kernel: wifi frame payload being parsed incorrectly as an L2 frame kernel: Forwarding EAPOL from unauthenticated wifi client kernel: accepting plaintext data frames in protected networks kernel: not verifying TKIP MIC of fragmented frames kernel: accepting fragmented plaintext frames in protected networks kernel: accepting unencrypted A-MSDU frames that start with RFC1042 header kernel: accepting plaintext broadcast fragments as full frames kernel: reassembling encrypted fragments with non-consecutive packet numbers kernel: reassembling mixed encrypted/plaintext fragments kernel: powerpc: RTAS calls can be used to compromise kernel integrity kernel: the copy-on-write implementation can grant unintended write access because of a race condition in a THP mapcount check kernel: locking inconsistency in drivers/tty/tty_io.c and drivers/tty/tty_jobctrl.c can lead to a read-after-free kernel: buffer overflow in mwifiex_cmd_802_11_ad_hoc_start function in drivers/net/wireless/marvell/mwifiex/join.c via a long SSID value kernel: memory leak upon a kmalloc failure in kvm_io_bus_unregister_dev function in virt/kvm/kvm_main.c kernel: slab out-of-bounds read in hci_extended_inquiry_result_evt() in net/bluetooth/hci_event.c kernel: Improper access control in BlueZ may allow information disclosure vulnerability. kernel: Use-after-free in ndb_queue_rq() in drivers/block/nbd.c kernel: Linux kernel eBPF RINGBUF map oversized allocation kernel: double free in bluetooth subsystem when the HCI device initialization fails kernel: use-after-free in function hci_sock_bound_ioctl() kernel: eBPF 32-bit source register truncation on div/mod kernel: flowtable list del corruption with kernel BUG at lib/list_debug.c:50 kernel: NULL pointer dereference in llsec_key_alloc() in net/mac802154/llsec.c kernel: DoS in rb_per_cpu_empty() kernel: overlayfs: Mounting overlayfs inside an unprivileged user namespace can reveal files kernel: tcp: add sanity tests to TCP_QUEUE_SEQ kernel: heap overflow in __cgroup_bpf_run_filter_getsockopt() kernel: setsockopt System Call Untrusted Pointer Dereference Information Disclosure kernel: Race condition in sctp_destroy_sock list_del kernel: fuse: stall on CPU can occur because a retry loop continually finds the same bad inode kernel: System crash in intel_pmu_drain_pebs_nhm in arch/x86/events/intel/ds.c kernel: protection for sequences of pointer arithmetic operations against speculatively out-of-bounds loads can be bypassed to leak content of kernel memory kernel: improper input validation in tipc_nl_retrieve_key function in net/tipc/node.c kernel: lack a full memory barrier upon the assignment of a new table value in net/netfilter/x_tables.c and include/linux/netfilter/x_tables.h may lead to DoS kernel: local escalation of privileges in handling of eBPF programs kernel: protection of stack pointer against speculative pointer arithmetic can be bypassed to leak content of kernel memory kernel: out of bounds array access in drivers/md/dm-ioctl.c kernel: use-after-free in cipso_v4_genopt in net/ipv4/cipso_ipv4.c kernel: Improper input validation in the Intel(R) Ethernet ixgbe driver may allow an authenticated user to potentially enable DoS via local access kernel: out-of-bounds reads and writes due to enforcing incorrect limits for pointer arithmetic operations by BPF verifier kernel: NULL-deref on disconnect regression kernel: nvmet-rdma: Fix NULL deref when SEND is completed with error kernel: RDMA/core: Prevent divide-by-zero error triggered by the user kernel: possible buffer overflow in sysfs reading
|
[
"cpe:/a:redhat:enterprise_linux:8::crb",
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 6.4 | 5.5 | null |
RHSA-2018:2693
|
Red Hat Security Advisory: firefox security update
|
Mozilla: Proxy bypass using automount and autofs Mozilla: Memory safety bugs fixed in Firefox 62 and Firefox ESR 60.2 Mozilla: Use-after-free in driver timers Mozilla: Use-after-free in IndexedDB Mozilla: Out-of-bounds write with malicious MAR file Mozilla: Same-origin policy violation using meta refresh and performance.getEntries to steal cross-origin URLs
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | 6.5 | null |
RHSA-2024:0533
|
Red Hat Security Advisory: gnutls security update
|
gnutls: timing side-channel in the RSA-PSK authentication gnutls: incomplete fix for CVE-2023-5981 gnutls: rejects certificate chain with distributed trust
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/o:redhat:enterprise_linux:9::baseos"
] | null | 7.5 | null | null |
RHSA-2021:1746
|
Red Hat Security Advisory: go-toolset:rhel8 security, bug fix, and enhancement update
|
golang: crypto/elliptic: incorrect operations on the P-224 curve golang: cmd/go: packages using cgo can cause arbitrary code execution at build time
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 7.5 | null | null |
RHSA-2004:160
|
Red Hat Security Advisory: openoffice.org security update
|
security flaw
|
[
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws"
] | null | null | null | null |
RHSA-2024:8024
|
Red Hat Security Advisory: thunderbird security update
|
firefox: Use-after-free in Animation timeline (128.3.1 ESR Chemspill)
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 9.8 | null | null |
RHSA-2023:0835
|
Red Hat Security Advisory: python-setuptools security update
|
pypa-setuptools: Regular Expression Denial of Service (ReDoS) in package_index.py
|
[
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 5.9 | null | null |
RHSA-2019:4171
|
Red Hat Security Advisory: kpatch-patch security update
|
kernel: brcmfmac heap buffer overflow in brcmf_wowl_nd_results
|
[
"cpe:/o:redhat:rhel_eus:7.6::server"
] | null | null | 6.5 | null |
RHSA-2017:0662
|
Red Hat Security Advisory: samba security and bug fix update
|
samba: Unconditional privilege delegation to Kerberos servers in trusted realms samba: Flaws in Kerberos PAC validation can trigger privilege elevation
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | 3.5 | null |
RHSA-2018:0469
|
Red Hat Security Advisory: dhcp security update
|
dhcp: Buffer overflow in dhclient possibly allowing code execution triggered by malicious server dhcp: Reference count overflow in dhcpd allows denial of service
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | 5.9 | null |
RHSA-2023:4429
|
Red Hat Security Advisory: mod_auth_openidc:2.3 security update
|
cjose: AES GCM decryption uses the Tag length from the actual Authentication Tag provided in the JWE
|
[
"cpe:/a:redhat:rhel_e4s:8.1::appstream"
] | null | 7.5 | null | null |
RHSA-2022:5622
|
Red Hat Security Advisory: container-tools:rhel8 security and bug fix update
|
psgo: Privilege escalation in 'podman top'
|
[
"cpe:/a:redhat:rhel_eus:8.4::appstream"
] | null | 8 | null | null |
RHSA-2020:4312
|
Red Hat Security Advisory: rh-maven35-jackson-databind security update
|
jackson-databind: FasterXML DOMDeserializer insecure entity expansion is vulnerable to XML external entity (XXE)
|
[
"cpe:/a:redhat:rhel_software_collections:3::el7"
] | null | 7.5 | null | null |
RHSA-2019:3870
|
Red Hat Security Advisory: kernel-rt security update
|
hw: Intel GPU blitter manipulation can allow for arbitrary kernel memory write
|
[
"cpe:/a:redhat:enterprise_linux:8::nfv",
"cpe:/a:redhat:enterprise_linux:8::realtime"
] | null | null | 8.8 | null |
RHSA-2024:1868
|
Red Hat Security Advisory: Red Hat build of Keycloak security update
|
keycloak: impersonation via logout token exchange keycloak: secondary factor bypass in step-up authentication keycloak: Log Injection during WebAuthn authentication or registration keycloak: Authorization Bypass keycloak: XSS via assertion consumer service URL in SAML POST-binding flow keycloak: session hijacking via re-authentication keycloak: path transversal in redirection validation keycloak: org.keycloak.protocol.oidc: unvalidated cross-origin messages in checkLoginIframe leads to DDoS
|
[
"cpe:/a:redhat:build_keycloak:22"
] | null | 7.4 | null | null |
RHSA-2024:1197
|
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.4 security update
|
ssh: Prefix truncation attack on Binary Packet Protocol (BPP)
|
[
"cpe:/a:redhat:jboss_enterprise_application_platform:7.4"
] | null | 5.9 | null | null |
RHSA-2017:2060
|
Red Hat Security Advisory: GStreamer security, bug fix, and enhancement update
|
gstreamer-plugins-bad-free: Missing initialization of allocated heap memory leads to information leak gstreamer: Invalid memory read in g_type_check_instance_is_fundamentally_a gstreamer: Out of bounds heap read in windows_icon_typefind gstreamer-plugins-good: Invalid memory read in gst_aac_parse_sink_setcaps gstreamer-plugins-good: Out of bounds read in qtdemux_tag_add_str_full gstreamer-plugins-base: Floating point exception in gst_riff_create_audio_caps gstreamer: Out-of-bounds read in gst_date_time_new_from_iso8601_string() gstreamer-plugins-base: Stack overflow in gst_riff_create_audio_caps gstreamer-plugins-good: Out of bounds heap read in qtdemux_parse_samples gstreamer-plugins-good: Heap out-of-bounds read in gst_avi_demux_parse_ncdt gstreamer-plugins-base: Out-of-bounds heap read in html_context_handle_element gstreamer-plugins-bad-free: Use after free in gst_mini_object_unref / gst_tag_list_unref / gst_mxf_demux_update_essence_tracks gstreamer-plugins-base: Floating point exception in gst_riff_create_audio_caps gstreamer-plugins-good: Invalid memory read in gst_avi_demux_parse_ncdt gstreamer-plugins-bad-free: Invalid memory read in gst_ps_demux_parse_psm
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 5.5 | null |
RHSA-2024:0600
|
Red Hat Security Advisory: firefox security update
|
Mozilla: Out of bounds write in ANGLE Mozilla: Failure to update user input timestamp Mozilla: Crash when listing printers on Linux Mozilla: Bypass of Content Security Policy when directive unsafe-inline was set Mozilla: Phishing site popup could show local origin in address bar Mozilla: Potential permissions request bypass via clickjacking Mozilla: Privilege escalation through devtools Mozilla: HSTS policy on subdomain could bypass policy of upper domain Mozilla: Memory safety bugs fixed in Firefox 122, Firefox ESR 115.7, and Thunderbird 115.7
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 8.8 | null | null |
RHSA-2013:0580
|
Red Hat Security Advisory: cups security update
|
cups: privilege escalation for users of the CUPS SystemGroup group
|
[
"cpe:/o:redhat:enterprise_linux:5::server",
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2024:1468
|
Red Hat Security Advisory: go-toolset-1.19-golang security update
|
golang-fips/openssl: Memory leaks in code encrypting and decrypting RSA payloads
|
[
"cpe:/a:redhat:devtools:2023::el7"
] | null | 7.5 | null | null |
RHBA-2018:3788
|
Red Hat Bug Fix Advisory: Red Hat OpenStack Platform 12 Bug Fix and Enhancement Advisory
|
ansible: Failed tasks do not honour no_log option allowing for secrets to be disclosed in logs ansible: Inventory variables are loaded from current working directory when running ad-hoc command that can lead to code execution ansible: ansible.cfg is being read from current working directory allowing possible code execution
|
[
"cpe:/a:redhat:openstack:12::el7"
] | null | null | 7.8 | null |
RHSA-2018:3229
|
Red Hat Security Advisory: zziplib security update
|
zziplib: out of bound read in mmapped.c:zzip_disk_fread() causes crash zziplib: Bus error in zip.c:__zzip_parse_root_directory() cause crash via crafted zip file zziplib: Memory leak in memdisk.c:zzip_mem_disk_new() can lead to denial of service via crafted zip
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 3.3 | null |
RHSA-2003:075
|
Red Hat Security Advisory: tomcat security update for Stronghold
|
security flaw
|
[
"cpe:/a:redhat:rhel_stronghold:4"
] | null | null | null | null |
RHSA-2021:2173
|
Red Hat Security Advisory: glib2 security update
|
glib: integer overflow in g_bytes_new function on 64-bit platforms due to an implicit cast from 64 bits to 32 bits
|
[
"cpe:/o:redhat:rhel_aus:7.3::server"
] | null | 9.8 | null | null |
RHSA-2018:3655
|
Red Hat Security Advisory: rh-mysql57-mysql security update
|
mysql: Server: Replication unspecified vulnerability (CPU Apr 2018) mysql: Server: Security: Privileges unspecified vulnerability (CPU Apr 2018) mysql: InnoDB unspecified vulnerability (CPU Apr 2018) mysql: Client programs unspecified vulnerability (CPU Apr 2018) mysql: Server: Connection unspecified vulnerability (CPU Apr 2018) mysql: InnoDB unspecified vulnerability (CPU Apr 2018) mysql: Server: Pluggable Auth unspecified vulnerability (CPU Apr 2018) mysql: Server: Locking unspecified vulnerability (CPU Apr 2018) mysql: pid file can be created in a world-writeable directory (CPU Apr 2018) mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2018) mysql: Group Replication GCS unspecified vulnerability (CPU Apr 2018) mysql: InnoDB unspecified vulnerability (CPU Apr 2018) mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2018) mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2018) mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2018) mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2018) mysql: InnoDB unspecified vulnerability (CPU Apr 2018) mysql: InnoDB unspecified vulnerability (CPU Apr 2018) mysql: InnoDB unspecified vulnerability (CPU Apr 2018) mysql: InnoDB unspecified vulnerability (CPU Apr 2018) mysql: InnoDB unspecified vulnerability (CPU Apr 2018) mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2018) mysql: Server: DDL unspecified vulnerability (CPU Apr 2018) mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2018) mysql: Server: DDL unspecified vulnerability (CPU Apr 2018) mysql: Server: Security: Privileges unspecified vulnerability (CPU Apr 2018) mysql: InnoDB unspecified vulnerability (CPU Apr 2018) mysql: Server: DML unspecified vulnerability (CPU Apr 2018) mysql: Server: Performance Schema unspecified vulnerability (CPU Apr 2018) mysql: Server: DDL unspecified vulnerability (CPU Jul 2018) mysql: Server: Security: Privileges unspecified vulnerability (CPU Jul 2018) mysql: MyISAM unspecified vulnerability (CPU Jul 2018) mysql: InnoDB unspecified vulnerability (CPU Jul 2018) mysql: Server: DML unspecified vulnerability (CPU Jul 2018) mysql: Server: Memcached unspecified vulnerability (CPU Jul 2018) mysql: InnoDB unspecified vulnerability (CPU Jul 2018) mysql: Server: DML unspecified vulnerability (CPU Jul 2018) mysql: Server: Options unspecified vulnerability (CPU Jul 2018) mysql: Client mysqldump unspecified vulnerability (CPU Jul 2018) mysql: Audit Log unspecified vulnerability (CPU Jul 2018) mysql: Server: DDL unspecified vulnerability (CPU Jul 2018) mysql: Client programs unspecified vulnerability (CPU Jul 2018) mysql: Server: Parser unspecified vulnerability (CPU Oct 2018) mysql: InnoDB unspecified vulnerability (CPU Oct 2018) mysql: Server: Security: Audit unspecified vulnerability (CPU Oct 2018) mysql: Server: Parser unspecified vulnerability (CPU Oct 2018) mysql: InnoDB unspecified vulnerability (CPU Oct 2018) mysql: Server: Partition unspecified vulnerability (CPU Oct 2018) mysql: InnoDB unspecified vulnerability (CPU Oct 2018) mysql: Server: Partition unspecified vulnerability (CPU Oct 2018) mysql: InnoDB unspecified vulnerability (CPU Oct 2018) mysql: Init script calling kill with root privileges using pid from pidfile owned by mysql user (CPU Oct 2018) mysql: InnoDB unspecified vulnerability (CPU Oct 2018) mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2018) mysql: InnoDB unspecified vulnerability (CPU Oct 2018) mysql: Server: Merge unspecified vulnerability (CPU Oct 2018) mysql: InnoDB unspecified vulnerability (CPU Oct 2018) mysql: Server: Memcached unspecified vulnerability (CPU Oct 2018) mysql: InnoDB unspecified vulnerability (CPU Oct 2018) mysql: Server: RBR unspecified vulnerability (CPU Oct 2018) mysql: Server: Storage Engines unspecified vulnerability (CPU Oct 2018) mysql: Server: Logging unspecified vulnerability (CPU Oct 2018) mysql: InnoDB unspecified vulnerability (CPU Oct 2018) mysql: Server: Replication unspecified vulnerability (CPU Jul 2019)
|
[
"cpe:/a:redhat:rhel_software_collections:3::el6",
"cpe:/a:redhat:rhel_software_collections:3::el7"
] | null | null | 5.4 | null |
RHSA-2018:0223
|
Red Hat Security Advisory: nautilus security update
|
nautilus: Insufficient validation of trust of .desktop files with execute permission
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 4.8 | null |
RHSA-2019:0232
|
Red Hat Security Advisory: spice-server security update
|
spice: Off-by-one error in array access in spice/server/memslot.c
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | 8 | null |
RHSA-2016:0562
|
Red Hat Security Advisory: bind security update
|
bind: malformed packet sent to rndc can trigger assertion failure bind: malformed signature records for DNAME records can trigger assertion failure
|
[
"cpe:/o:redhat:rhel_aus:6.4::server",
"cpe:/o:redhat:rhel_aus:6.5::server",
"cpe:/o:redhat:rhel_eus:6.6::computenode",
"cpe:/o:redhat:rhel_eus:6.6::server"
] | null | null | null | null |
RHSA-2023:7705
|
Red Hat Security Advisory: Red Hat Build of Apache Camel for Quarkus 2.13.3 security update (RHBQ 2.13.9.Final)
|
Red Hat Build of Apache Camel for Quarkus 2.13.3 release and security update is now available (updates to RHBQ 2.13.9.Final). The purpose of this text-only errata is to inform you about the security issues fixed.
Red Hat Product Security has rated this update as having an impact of Important.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
|
[
"cpe:/a:redhat:camel_quarkus:2.13.3"
] | null | null | null | null |
RHSA-2017:0564
|
Red Hat Security Advisory: libguestfs security and bug fix update
|
ocaml: sizes arguments are sign-extended from 32 to 64 bits
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2020:2026
|
Red Hat Security Advisory: OpenShift Container Platform 4.2.33 security update
|
openshift/cluster-image-registry-operator: secrets disclosed in logs
|
[
"cpe:/a:redhat:openshift:4.2::el7"
] | null | 7 | null | null |
RHSA-2024:8495
|
Red Hat Security Advisory: postgresql security update
|
postgresql: PostgreSQL relation replacement during pg_dump executes arbitrary SQL
|
[
"cpe:/o:redhat:rhel_els:7"
] | null | 7.5 | null | null |
RHSA-2022:7411
|
Red Hat Security Advisory: Red Hat Single Sign-On 7.6.1 security update on RHEL 9
|
jackson-databind: denial of service via a large depth of nested objects h2: Remote Code Execution in Console owasp-java-html-sanitizer: improper policies enforcement may lead to remote code execution netty: control chars in header names may lead to HTTP request smuggling xnio: org.xnio.StreamConnection.notifyReadClosed log to debug instead of stderr keycloak: Stored XSS in groups dropdown jboss-client: memory leakage in remote client transaction wildfly: Wildfly management of EJB Session context returns wrong caller principal with Elytron Security enabled undertow: Double AJP response for 400 from EAP 7 results in CPING failures keycloak: Uploading of SAML javascript protocol mapper scripts through the admin console artemis-commons: Apache ActiveMQ Artemis DoS
|
[
"cpe:/a:redhat:red_hat_single_sign_on:7.6::el9"
] | null | 7.5 | null | null |
RHSA-2022:2194
|
Red Hat Security Advisory: .NET Core 3.1 on RHEL 7 security and bugfix update
|
dotnet: excess memory allocation via HttpClient causes DoS dotnet: malicious content causes high CPU and memory usage dotnet: parsing HTML causes Denial of Service
|
[
"cpe:/a:redhat:rhel_dotnet:3.1::el7"
] | null | 7.5 | null | null |
RHSA-2025:3068
|
Red Hat Security Advisory: OpenShift Container Platform 4.18.6 packages and security update
|
go-jose: Go JOSE's Parsing Vulnerable to Denial of Service
|
[
"cpe:/a:redhat:openshift:4.18::el9"
] | null | 7.5 | null | null |
RHSA-2022:0458
|
Red Hat Security Advisory: samba security update
|
samba: Out-of-bounds heap read/write vulnerability in VFS module vfs_fruit allows code execution
|
[
"cpe:/a:redhat:storage:3.5:samba:el8"
] | null | 9.9 | null | null |
RHSA-2024:6611
|
Red Hat Security Advisory: fence-agents security update
|
pypa/setuptools: Remote code execution via download functions in the package_index module in pypa/setuptools
|
[
"cpe:/a:redhat:rhel_eus:9.2::appstream",
"cpe:/a:redhat:rhel_eus:9.2::highavailability",
"cpe:/a:redhat:rhel_eus:9.2::resilientstorage"
] | null | 8.8 | null | null |
RHSA-2023:6748
|
Red Hat Security Advisory: squid security update
|
squid: Request/Response smuggling in HTTP/1.1 and ICAP squid: Denial of Service in HTTP Digest Authentication squid: denial of Service in FTP
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 8.6 | null | null |
RHSA-2019:1148
|
Red Hat Security Advisory: rh-ruby25-ruby security, bug fix, and enhancement update
|
rubygems: Delete directory using symlink when decompressing tar rubygems: Escape sequence injection vulnerability in verbose rubygems: Escape sequence injection vulnerability in gem owner rubygems: Escape sequence injection vulnerability in API response handling rubygems: Installing a malicious gem may lead to arbitrary code execution rubygems: Escape sequence injection vulnerability in errors
|
[
"cpe:/a:redhat:rhel_software_collections:3::el7"
] | null | null | 5.3 | null |
RHSA-2016:1141
|
Red Hat Security Advisory: ntp security update
|
ntp: off-path denial of service on authenticated broadcast mode ntp: crypto-NAK preemptable association denial of service ntp: ntpd switching to interleaved mode with spoofed packets ntp: libntp message digest disclosure ntp: out-of-bounds references on crafted packet
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation",
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | null | null |
RHSA-2017:3442
|
Red Hat Security Advisory: rh-mysql57-mysql security update
|
mysql: Server: Pluggable Auth unspecified vulnerability (CPU Oct 2017) mysql: Server: Replication unspecified vulnerability (CPU Oct 2017) mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2017) mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2017) mysql: Server: Replication unspecified vulnerability (CPU Oct 2017) mysql: Server: FTS unspecified vulnerability (CPU Oct 2017) mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2017) mysql: Server: Performance Schema unspecified vulnerability (CPU Oct 2017) mysql: Server: Stored Procedure unspecified vulnerability (CPU Oct 2017) mysql: Server: InnoDB unspecified vulnerability (CPU Oct 2017) mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2017) mysql: Server: DML unspecified vulnerability (CPU Oct 2017) mysql: Server: FTS unspecified vulnerability (CPU Oct 2017) mysql: Group Replication GCS unspecified vulnerability (CPU Oct 2017) mysql: Server: Memcached unspecified vulnerability (CPU Oct 2017) mysql: Server: InnoDB unspecified vulnerability (CPU Oct 2017) mysql: Server: InnoDB unspecified vulnerability (CPU Oct 2017) mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2017) mysql: Client programs unspecified vulnerability (CPU Oct 2017) mysql: Server: DDL unspecified vulnerability (CPU Oct 2017) mysql: Server: Partition unspecified vulnerability (CPU Jan 2018) mysql: Server : Partition unspecified vulnerability (CPU Jan 2018)
|
[
"cpe:/a:redhat:rhel_software_collections:3::el6",
"cpe:/a:redhat:rhel_software_collections:3::el7"
] | null | null | 4.9 | null |
RHBA-2023:3611
|
Red Hat Bug Fix Advisory: Release of Bug Advisories for the OpenShift Jenkins and Jenkins agent base image
|
golang.org/x/net/http2: avoid quadratic complexity in HPACK decoding
|
[
"cpe:/a:redhat:ocp_tools:4.12::el8"
] | null | 7.5 | null | null |
RHSA-2023:6324
|
Red Hat Security Advisory: python3.11-pip security update
|
python: tarfile module directory traversal
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 5.5 | null | null |
RHSA-2017:2530
|
Red Hat Security Advisory: java-1.6.0-ibm security update
|
OpenJDK: reading of unprocessed image data in JPEGImageReader (2D, 8169209) OpenJDK: JAR verifier incorrect handling of missing digest (Security, 8169392) OpenJDK: insufficient access control checks in ThreadPoolExecutor (Libraries, 8172204) OpenJDK: insufficient access control checks in ServiceRegistry (ImageIO, 8172461) OpenJDK: insufficient access control checks in XML transformations (JAXP, 8172469) OpenJDK: unrestricted access to com.sun.org.apache.xml.internal.resolver (JAXP, 8173286) OpenJDK: incorrect handling of references in DGC (RMI, 8163958) JDK: unspecified vulnerability fixed in 6u161, 7u151, and 8u141 (Deployment) OpenJDK: insufficient access control checks in ActivationID (RMI, 8173697) OpenJDK: unbounded memory allocation in BasicAttribute deserialization (Serialization, 8174105) OpenJDK: unbounded memory allocation in CodeSource deserialization (Serialization, 8174113) OpenJDK: insufficient access control checks in ImageWatched (AWT, 8174098) OpenJDK: DSA implementation timing attack (JCE, 8175106) OpenJDK: LDAPCertStore following referrals to non-LDAP URLs (Security, 8176067) OpenJDK: insecure XML parsing in wsdlimport (JAX-WS, 8182054)
|
[
"cpe:/a:redhat:rhel_extras:6"
] | null | null | 6.5 | null |
RHSA-2012:1258
|
Red Hat Security Advisory: quagga security update
|
quagga: DoS (crash) by processing malformed extended community attribute in a route (ospf6d): Stack-based buffer overflow while decoding Link State Update packet with malformed Inter Area Prefix LSA (ospf6d): Denial of service by decoding malformed Database Description packet headers (ospfd): Denial of service by decoding too short Hello packet or Hello packet with invalid OSPFv2 header type (ospfd): Denial of service by decoding Link State Update LSAs of unknown type (bgpd): Heap-based buffer overflow by decoding BGP UPDATE message with unknown AS_PATH attributes (ospfd): Assertion failure due improper length check for a received LS-Update OSPF packet (ospfd): Crash by processing LS-Update OSPF packet due improper length check of the Network-LSA structures
|
[
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2023:4058
|
Red Hat Security Advisory: .NET 7.0 security, bug fix, and enhancement update
|
dotnet: race condition in Core SignInManager<TUser> PasswordSignInAsync method
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb"
] | null | 8.1 | null | null |
RHSA-2018:1726
|
Red Hat Security Advisory: thunderbird security update
|
Mozilla: Memory safety bugs fixed in Firefox 60 and Firefox ESR 52.8 Mozilla: Use-after-free with SVG animations and clip paths Mozilla: Use-after-free with SVG animations and text paths Mozilla: Integer overflow and out-of-bounds write in Skia Mozilla: Hang via malformed headers Mozilla: Encrypted mail leaks plaintext through src attribute Mozilla: Lightweight themes can be installed without user interaction Mozilla: Filename spoofing for external attachments Mozilla: Buffer overflow during UTF-8 to Unicode string conversion through legacy extension Mozilla: Backport critical security fixes in Skia Mozilla: Full plaintext recovery in S/MIME via chosen-ciphertext attack Mozilla: Leaking plaintext through HTML forms
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | 6.5 | null |
RHSA-2021:3534
|
Red Hat Security Advisory: Red Hat Single Sign-On 7.4.9 security update
|
jackson-dataformat-cbor: Unchecked allocation of byte buffer can cause a java.lang.OutOfMemoryError exception keycloak: X509 Direct Grant Auth does not verify certificate timestamp validity keycloak: Brute force attack is possible even after the account lockout undertow: HTTP2SourceChannel fails to write final frame under some circumstances may lead to DoS keycloak: Anyone can register a new device when there is no device registered for passwordless login keycloak-model-infinispan: authenticationSessions map in RootAuthenticationSessionEntity grows boundlessly could lead to a DoS attack wildfly-core: Invalid Sensitivity Classification of Vault Expression undertow: buffer leak on incoming websocket PONG message may lead to DoS jakarta-el: ELParserTokenManager enables invalid EL expressions to be evaluate apache-commons-io: Limited path traversal in Apache Commons IO 2.2 to 2.6
|
[
"cpe:/a:redhat:red_hat_single_sign_on:7"
] | null | 4.8 | null | null |
RHSA-2019:1626
|
Red Hat Security Advisory: thunderbird security update
|
libical: Heap buffer over read in icalparser.c parser_get_next_char libical: Heap buffer overflow in icalmemory_strdup_and_dequote function in icalvalue.c libical: Stack buffer overflow in icalrecur_add_bydayrules in icalrecur.c libical: Type confusion in icaltimezone_get_vtimezone_properties function in icalproperty.c Mozilla: Type confusion in Array.pop Mozilla: Sandbox escape using Prompt:Open
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 10 | null |
RHBA-2020:1494
|
Red Hat Bug Fix Advisory: Satellite 6.6.3 Async Bug Fix Update
|
jackson-databind: polymorphic typing issue allows attacker to read arbitrary local files on the server. jackson-databind: lacks certain net.sf.ehcache blocking jackson-databind: Lacks certain xbean-reflect/JNDI blocking jackson-databind: Serialization gadgets in shaded-hikari-config jackson-databind: Serialization gadgets in ibatis-sqlmap jackson-databind: Serialization gadgets in anteros-core jackson-databind: Serialization gadgets in org.aoju.bus.proxy.provider.*.RmiProvider jackson-databind: Serialization gadgets in javax.swing.JEditorPane jackson-databind: Serialization gadgets in org.springframework:spring-aop jackson-databind: serialization in oadd.org.apache.xalan.lib.sql.JNDIConnectionPool jackson-databind: serialization in weblogic/oracle-aqjms jackson-databind: serialization in com.sun.org.apache.xalan.internal.lib.sql.JNDIConnectionPool jackson-databind: serialization in org.jsecurity.realm.jndi.JndiRealmFactory
|
[
"cpe:/a:redhat:satellite:6.6::el7",
"cpe:/a:redhat:satellite_capsule:6.6::el7"
] | null | 8.1 | 0 | null |
RHSA-2024:9926
|
Red Hat Security Advisory: buildah security update
|
Buildah: Podman: Improper Input Validation in bind-propagation Option of Dockerfile RUN --mount Instruction Podman: Buildah: CRI-O: symlink traversal vulnerability in the containers/storage library can cause Denial of Service (DoS)
|
[
"cpe:/a:redhat:rhel_eus:9.4::appstream"
] | null | 6.5 | null | null |
RHBA-2015:0584
|
Red Hat Bug Fix Advisory: tboot bug fix and enhancement update
|
tboot: argument measurement vulnerability for GRUB2+ELF kernels
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | null | null |
RHSA-2020:2901
|
Red Hat Security Advisory: dovecot security update
|
dovecot: malformed NOOP commands leads to DoS
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb"
] | null | 7.5 | null | null |
RHSA-2024:0735
|
Red Hat Security Advisory: OpenShift Container Platform 4.14.12 bug fix and security update
|
graphql-go: Denial of service via stack overflow panics go-git: Maliciously crafted Git server replies can cause DoS on go-git clients go-git: Maliciously crafted Git server replies can lead to path traversal and RCE on go-git clients
|
[
"cpe:/a:redhat:openshift:4.14::el8",
"cpe:/a:redhat:openshift:4.14::el9"
] | null | 8.1 | null | null |
RHSA-2005:639
|
Red Hat Security Advisory: kdenetwork security update
|
security flaw security flaw security flaw security flaw
|
[
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2003:297
|
Red Hat Security Advisory: stunnel security update
|
security flaw
|
[
"cpe:/o:redhat:enterprise_linux:2.1::as",
"cpe:/o:redhat:enterprise_linux:2.1::aw",
"cpe:/o:redhat:enterprise_linux:2.1::es",
"cpe:/o:redhat:enterprise_linux:2.1::ws"
] | null | null | null | null |
RHSA-2010:0768
|
Red Hat Security Advisory: java-1.6.0-openjdk security and bug fix update
|
TLS: MITM attacks via session renegotiation OpenJDK HttpURLConnection allows arbitrary request headers (6961084,6980004) OpenJDK DNS server IP address information leak (6957564) OpenJDK HttpURLConnection request splitting (6952017) OpenJDK local network address disclosure (6952603) OpenJDK Swing unsafe reflection usage (6622002) OpenJDK corba reflection vulnerabilities (6891766,6925672) OpenJDK Swing mutable static (6938813) OpenJDK corba reflection vulnerabilities (6891766,6925672) OpenJDK IndexColorModel double-free (6925710) OpenJDK kerberos vulnerability (6958060) OpenJDK JPEG writeImage remote code execution (6963023) OpenJDK ICU Opentype layout engine crash (6963285) OpenJDK Deserialization Race condition (6559775) OpenJDK Serialization inconsistencies (6966692) OpenJDK HttpURLConnection allows arbitrary request headers (6961084,6980004) OpenJDK HttpURLConnection incomplete TRACE permission check (6981426)
|
[
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.