id
stringlengths 13
15
| title
stringlengths 29
176
| description
stringlengths 8
32.1k
| cpes
listlengths 0
20
| cvss_v4_0
null | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
null |
---|---|---|---|---|---|---|---|
RHSA-2022:6169
|
Red Hat Security Advisory: thunderbird security update
|
Mozilla: Address bar spoofing via XSLT error handling Mozilla: Cross-origin XSLT Documents would have inherited the parent's permissions Mozilla: Data race and potential use-after-free in PK11_ChangePW Mozilla: Memory safety bugs fixed in Firefox 104 and Firefox ESR 102.2 Mozilla: Memory safety bugs fixed in Firefox 104, Firefox ESR 102.2, and Firefox ESR 91.13
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 8.8 | 7.5 | null |
RHSA-2020:1912
|
Red Hat Security Advisory: bluez security update
|
bluez: failure in disabling Bluetooth discoverability in certain cases may lead to the unauthorized pairing of Bluetooth devices
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb",
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | null | 4.5 | null |
RHSA-2023:1588
|
Red Hat Security Advisory: kernel security update
|
ALSA: pcm: Move rwsem lock inside snd_ctl_elem_read to prevent UAF
|
[
"cpe:/o:redhat:rhel_e4s:8.1::baseos"
] | null | 7.8 | null | null |
RHSA-2019:0809
|
Red Hat Security Advisory: ovmf security update
|
edk2: Buffer Overflow in BlockIo service for RAM disk
|
[
"cpe:/o:redhat:enterprise_linux:7::server"
] | null | null | 8.3 | null |
RHSA-2022:5717
|
Red Hat Security Advisory: grafana security update
|
grafana: OAuth account takeover
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 7.1 | null | null |
RHSA-2024:11570
|
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 8.0.5 Security update
|
undertow: information leakage via HTTP/2 request header reuse hornetq-core-client: Arbitrarily overwrite files or access sensitive information
|
[
"cpe:/a:redhat:jboss_enterprise_application_platform:8.0"
] | null | 7.1 | null | null |
RHSA-2014:1037
|
Red Hat Security Advisory: cfme security and bug fix update
|
CFME: AgentController get/log application log forging
|
[
"cpe:/a:redhat:cloudforms_managementengine:5::el6"
] | null | null | null | null |
RHSA-2023:3556
|
Red Hat Security Advisory: python3 security update
|
python: urllib.parse url blocklisting bypass
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 7.5 | null | null |
RHSA-2004:041
|
Red Hat Security Advisory: slocate security update
|
security flaw security flaw
|
[
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws"
] | null | null | null | null |
RHSA-2018:3672
|
Red Hat Security Advisory: java-1.7.1-ibm security update
|
OpenJDK: Incorrect handling of unsigned attributes in signed Jar manifests (Security, 8194534) OpenJDK: Leak of sensitive header data via HTTP redirect (Networking, 8196902) OpenJDK: Incomplete enforcement of the trustURLCodebase restriction (JNDI, 8199177) OpenJDK: Improper field access checks (Hotspot, 8199226) OpenJDK: Missing endpoint identification algorithm check during TLS session resumption (JSSE, 8202613) OpenJDK: Infinite loop in RIFF format reader (Sound, 8205361) libpng: Integer overflow and resultant divide-by-zero in pngrutil.c:png_check_chunk_length() allows for denial of service
|
[
"cpe:/a:redhat:rhel_extras:7"
] | null | null | 6.5 | null |
RHSA-2019:3842
|
Red Hat Security Advisory: kernel security update
|
hw: Machine Check Error on Page Size Change (IFU) hw: TSX Transaction Asynchronous Abort (TAA)
|
[
"cpe:/o:redhat:rhel_aus:6.6::server"
] | null | null | 6.5 | null |
RHSA-2020:0631
|
Red Hat Security Advisory: ppp security update
|
ppp: Buffer overflow in the eap_request and eap_response functions in eap.c
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | 9.8 | null | null |
RHSA-2012:1255
|
Red Hat Security Advisory: libexif security update
|
libexif: "exif_entry_get_value()" heap-based out-of-bounds array read libexif: "exif_convert_utf16_to_utf8()" heap-based out-of-bounds array read libexif: "exif_entry_format_value()" buffer overflow libexif: "exif_data_load_data()" heap-based out-of-bounds array read libexif: "mnote_olympus_entry_get_value()" division by zero libexif: "exif_convert_utf16_to_utf8()" off-by-one libexif: "exif_entry_get_value()" integer underflow
|
[
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server",
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2020:3223
|
Red Hat Security Advisory: grub2 security update
|
grub2: Crafted grub.cfg file can lead to arbitrary code execution during boot process grub2: grub_malloc does not validate allocation size allowing for arithmetic overflow and subsequent heap-based buffer overflow grub2: Integer overflow in grub_squash_read_symlink may lead to heap-based buffer overflow grub2: Integer overflow read_section_as_string may lead to heap-based buffer overflow grub2: Integer overflow in grub_ext2_read_link leads to heap-based buffer overflow grub2: Fail kernel validation without shim protocol grub2: Use-after-free redefining a function whilst the same function is already executing grub2: Integer overflow in initrd size handling
|
[
"cpe:/a:redhat:rhel_eus:8.1::crb",
"cpe:/o:redhat:rhel_eus:8.1::baseos"
] | null | 5.7 | null | null |
RHSA-2019:1529
|
Red Hat Security Advisory: pki-deps:10.6 security update
|
tomcat: Insecure defaults in CORS filter enable 'supportsCredentials' for all origins tomcat: Host name verification missing in WebSocket client tomcat: Due to a mishandling of close in NIO/NIO2 connectors user sessions can get mixed up tomcat: Open redirect in default servlet
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | null | 5.3 | null |
RHSA-2014:0889
|
Red Hat Security Advisory: java-1.7.0-openjdk security update
|
OpenJDK: Restrict use of privileged annotations (Libraries, 8034985) OpenJDK: Event logger format string vulnerability (Hotspot, 8037076) OpenJDK: SubjectDelegator protection insufficient (JMX, 8029755) OpenJDK: Incorrect generic signature attribute parsing (Hotspot, 8037076) OpenJDK: Clone interfaces passed to proxy methods (Libraries, 8035009) OpenJDK: Bytecode verification does not prevent ctor calls to this() and super() (Hotspot, 8035119) OpenJDK: MethodHandles.Lookup insufficient modifiers checks (Libraries, 8035788) OpenJDK: Incorrect handling of invocations with exhausted ranks (Libraries, 8035793) OpenJDK: RSA blinding issues (Security, 8031346) OpenJDK: Prevent instantiation of service with non-public constructor (Security, 8035004) OpenJDK: AtomicReferenceFieldUpdater missing primitive type check (Libraries, 8039520) OpenJDK: insufficient Diffie-Hellman public key validation (Security, 8037162) OpenJDK: InfoBuilder incorrect return values (Serviceability, 8033301)
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation",
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | null | null |
RHSA-2022:4799
|
Red Hat Security Advisory: rsyslog security update
|
rsyslog: Heap-based overflow in TCP syslog server
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 8.1 | null | null |
RHSA-2008:0566
|
Red Hat Security Advisory: rhpki-util, rhpki-common, and rhpki-ca security and bug fix update
|
rhcs CRL can get corrupted
|
[
"cpe:/a:redhat:certificate_system:7.3"
] | null | null | null | null |
RHSA-2019:0525
|
Red Hat Security Advisory: kernel-alt security and bug fix update
|
kernel: use-after-free in jbd2_journal_commit_transaction funtion kernel: out-of-bounds memcpy in fs/ext4/inline.c:ext4_read_inline_data() with crafted ext4 image
|
[
"cpe:/o:redhat:enterprise_linux:7::server"
] | null | null | 6.8 | null |
RHSA-2025:0316
|
Red Hat Security Advisory: raptor2 security update
|
raptor: integer underflow when normalizing a URI with the turtle parser
|
[
"cpe:/a:redhat:rhel_eus:9.4::appstream",
"cpe:/a:redhat:rhel_eus:9.4::crb"
] | null | 7.3 | null | null |
RHSA-2023:1364
|
Red Hat Security Advisory: firefox security update
|
Mozilla: Incorrect code generation during JIT compilation Mozilla: Potential out-of-bounds when accessing throttled streams Mozilla: Invalid downcast in Worklets Mozilla: URL being dragged from a removed cross-origin iframe into the same tab triggered navigation Mozilla: Memory safety bugs fixed in Firefox 111 and Firefox ESR 102.9
|
[
"cpe:/a:redhat:rhel_eus:9.0::appstream"
] | null | 8.8 | null | null |
RHSA-2012:1267
|
Red Hat Security Advisory: bind security and bug fix update
|
bind: specially crafted resource record causes named to exit
|
[
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2024:10800
|
Red Hat Security Advisory: postgresql:13 security update
|
postgresql: PostgreSQL PL/Perl environment variable changes execute arbitrary code
|
[
"cpe:/a:redhat:rhel_eus:8.8::appstream"
] | null | 8.8 | null | null |
RHSA-2020:1420
|
Red Hat Security Advisory: firefox security update
|
Mozilla: Uninitialized memory could be read when using the WebGL copyTexSubImage method Mozilla: Out of bounds write in GMPDecodeData when processing large images Mozilla: Memory safety bugs fixed in Firefox 75 and Firefox ESR 68.7
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 9.8 | null | null |
RHBA-2018:1219
|
Red Hat Bug Fix Advisory: Red Hat Virtualization Manager (ovirt-engine) 4.1.11
|
ovirt-engine: API exposes power management credentials to administrators
|
[
"cpe:/a:redhat:rhev_manager:4"
] | null | null | 7.7 | null |
RHSA-2021:3585
|
Red Hat Security Advisory: go-toolset:rhel8 security update
|
golang: net: incorrect parsing of extraneous zero characters at the beginning of an IP address octet
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 7.3 | null | null |
RHSA-2014:1161
|
Red Hat Security Advisory: Red Hat Enterprise Virtualization Manager 3.4.2 update
|
Engine: XML eXternal Entity (XXE) flaw in backend module
|
[
"cpe:/a:redhat:rhev_manager:3"
] | null | null | null | null |
RHSA-2005:331
|
Red Hat Security Advisory: XFree86 security update
|
libxpm buffer overflow
|
[
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws"
] | null | null | null | null |
RHSA-2024:0981
|
Red Hat Security Advisory: unbound security update
|
bind9: KeyTrap - Extreme CPU consumption in DNSSEC validator bind9: Preparing an NSEC3 closest encloser proof can exhaust CPU resources
|
[
"cpe:/a:redhat:rhel_eus:9.2::appstream",
"cpe:/a:redhat:rhel_eus:9.2::crb"
] | null | 7.5 | null | null |
RHSA-2020:4317
|
Red Hat Security Advisory: firefox security update
|
Mozilla: Memory safety bugs fixed in Firefox 82 and Firefox ESR 78.4 chromium-browser: Use after free in WebRTC
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 8.8 | null | null |
RHSA-2022:7885
|
Red Hat Security Advisory: kpatch-patch security update
|
kernel: a use-after-free in cls_route filter implementation may lead to privilege escalation
|
[
"cpe:/o:redhat:rhel_e4s:8.2::baseos"
] | null | 7.8 | null | null |
RHSA-2024:4070
|
Red Hat Security Advisory: Red Hat Certificate System 10.4 for RHEL 8 security and bug fix update
|
ca: token authentication bypass vulnerability
|
[
"cpe:/a:redhat:certificate_system_eus:10.4::el8"
] | null | 7.5 | null | null |
RHSA-2024:0410
|
Red Hat Security Advisory: tcpdump security update
|
tcpslice: use-after-free in extract_slice()
|
[
"cpe:/a:redhat:rhel_eus:8.6::appstream"
] | null | 5.5 | null | null |
RHSA-2018:1820
|
Red Hat Security Advisory: Red Hat Virtualization security, bug fix, and enhancement update
|
procps: Integer overflows leading to heap overflow in file2strvec procps: incorrect integer size in proc/alloc.* leading to truncation / integer overflow issues
|
[
"cpe:/o:redhat:enterprise_linux:7::hypervisor"
] | null | null | 4.8 | null |
RHSA-2020:2333
|
Red Hat Security Advisory: EAP Continuous Delivery Technical Preview Release 19 security update
|
thrift: Endless loop when feed with specific input data thrift: Out-of-bounds read related to TJSONProtocol or TSimpleJSONProtocol apache-commons-beanutils: does not suppresses the class property in PropertyUtilsBean by default infinispan: invokeAccessibly method from ReflectionUtil class allows to invoke private methods cxf: OpenId Connect token service does not properly validate the clientId cxf: OpenId Connect token service does not properly validate the clientId jackson-databind: Serialization gadgets in com.zaxxer.hikari.HikariConfig wildfly: The 'enabled-protocols' value in legacy security is not respected if OpenSSL security provider is in use undertow: possible Denial Of Service (DOS) in Undertow HTTP server listening on HTTPS jackson-databind: Serialization gadgets in classes of the commons-configuration package jackson-databind: Serialization gadgets in classes of the xalan package jackson-databind: Serialization gadgets in com.zaxxer.hikari.HikariDataSource netty: HTTP request smuggling by mishandled whitespace before the colon in HTTP headers jackson-databind: Serialization gadgets in org.apache.commons.dbcp.datasources.* jackson-databind: Serialization gadgets in com.p6spy.engine.spy.P6DataSource jackson-databind: Serialization gadgets in classes of the ehcache package jackson-databind: Serialization gadgets in org.apache.log4j.receivers.db.* cxf: reflected XSS in the services listing page jackson-databind: lacks certain net.sf.ehcache blocking netty: HTTP request smuggling netty: HttpObjectDecoder.java allows Content-Length header to accompanied by second Content-Length header resteasy: Improper validation of response header in MediaTypeHeaderDelegate.java class Soteria: security identity corruption across concurrent threads undertow: AJP File Read/Inclusion Vulnerability netty: HTTP Request Smuggling due to Transfer-Encoding whitespace mishandling jackson-databind: Serialization gadgets in ibatis-sqlmap jackson-databind: mishandles the interaction between serialization gadgets and typing which could result in remote command execution RESTEasy: RESTEASY003870 exception in RESTEasy can lead to a reflected XSS attack jackson-databind: Serialization gadgets in org.aoju.bus.proxy.provider.*.RmiProvider jackson-databind: Serialization gadgets in javax.swing.JEditorPane jackson-databind: Serialization gadgets in org.apache.activemq.jms.pool.XaPooledConnectionFactory jackson-databind: Serialization gadgets in org.apache.commons.proxy.provider.remoting.RmiProvider jackson-databind: Serialization gadgets in org.apache.openjpa.ee.WASRegistryManagedRuntime
|
[
"cpe:/a:redhat:jboss_enterprise_application_platform_cd:19"
] | null | 8.1 | 7.5 | null |
RHSA-2016:2809
|
Red Hat Security Advisory: ipsilon security update
|
ipsilon: DoS via logging out all open SAML2 sessions
|
[
"cpe:/o:redhat:enterprise_linux:7::server"
] | null | null | 8.2 | null |
RHSA-2022:2191
|
Red Hat Security Advisory: gzip security update
|
gzip: arbitrary-file-write vulnerability
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 8.8 | null | null |
RHSA-2024:3475
|
Red Hat Security Advisory: Errata Advisory for Red Hat OpenShift GitOps v1.11.5 security update
|
argocd: Use of Risky or Missing Cryptographic Algorithms in Redis Cache
|
[
"cpe:/a:redhat:openshift_gitops:1.11::el8"
] | null | 9.6 | null | null |
RHSA-2018:1060
|
Red Hat Security Advisory: pcs security update
|
pcs: Privilege escalation via authorized user malicious REST call pcs: Debug parameter removal bypass, allowing information disclosure rack-protection: Timing attack in authenticity_token.rb
|
[
"cpe:/o:redhat:enterprise_linux:7::server"
] | null | null | 3.7 | null |
RHBA-2015:1100
|
Red Hat Bug Fix Advisory: CFME 5.4.0 bug fixes, and enhancement update
|
rubygem-actionmailer: email address processing DoS rubygem-i18n: cross-site scripting flaw in exception handling rubygem-sprockets: arbitrary file existence disclosure rubygem-rest-client: session fixation vulnerability Set-Cookie headers present in an HTTP 30x redirection responses rubygem-rest-client: unsanitized application logging
|
[
"cpe:/a:redhat:cloudforms_managementengine:5::el6"
] | null | null | null | null |
RHSA-2021:1189
|
Red Hat Security Advisory: Red Hat Virtualization security, bug fix, and enhancement update
|
openssl: NULL pointer dereference in signature_algorithms processing openssl: CA certificate check bypass with X509_V_FLAG_X509_STRICT
|
[
"cpe:/o:redhat:rhev_hypervisor:4.4::el8"
] | null | 7.4 | null | null |
RHSA-2008:0110
|
Red Hat Security Advisory: openldap security update
|
openldap: slapd crash on NOOP control operation on entry in bdb storage openldap: slapd crash on modrdn operation with NOOP control on entry in bdb storage
|
[
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws",
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2014:1803
|
Red Hat Security Advisory: mod_auth_mellon security update
|
mod_auth_mellon: remote memory disclosure flaw mod_auth_mellon: logout processing leads to denial of service
|
[
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2024:2586
|
Red Hat Security Advisory: container-tools:3.0 security update
|
golang: math/big.Rat: may cause a panic or an unrecoverable fatal error if passed inputs with very large exponents golang: regexp/syntax: limit memory used by parsing regexps
|
[
"cpe:/a:redhat:rhel_aus:8.4::appstream",
"cpe:/a:redhat:rhel_e4s:8.4::appstream",
"cpe:/a:redhat:rhel_tus:8.4::appstream"
] | null | 6.5 | null | null |
RHSA-2022:0344
|
Red Hat Security Advisory: kernel security update
|
kernel: xfs: raw block device data leak in XFS_IOC_ALLOCSP IOCTL
|
[
"cpe:/o:redhat:rhel_e4s:8.1::baseos"
] | null | 5.5 | null | null |
RHSA-2023:4541
|
Red Hat Security Advisory: kernel-rt security and bug fix update
|
kernel: use-after-free in l2cap_connect and l2cap_le_connect_req in net/bluetooth/l2cap_core.c kernel: tcindex: use-after-free vulnerability in traffic control index filter allows privilege escalation kernel: Use-after-free vulnerability in the Linux Kernel traffic control index filter kernel: OOB access in the Linux kernel's XFS subsystem kernel: i2c: out-of-bounds write in xgene_slimpro_i2c_xfer() kernel: use-after-free vulnerability in the perf_group_detach function of the Linux Kernel Performance Events
|
[
"cpe:/a:redhat:enterprise_linux:8::nfv",
"cpe:/a:redhat:enterprise_linux:8::realtime"
] | null | 7.8 | null | null |
RHSA-2013:1843
|
Red Hat Security Advisory: Red Hat JBoss Portal 6.1.0 security update
|
GateIn: XSS due to improper url escaping
|
[
"cpe:/a:redhat:jboss_enterprise_portal_platform:6.1.0"
] | null | null | null | null |
RHSA-2022:4888
|
Red Hat Security Advisory: thunderbird security update
|
Mozilla: Braille space character caused incorrect sender email to be shown for a digitally signed email Mozilla: Cross-Origin resource's length leaked Mozilla: Heap buffer overflow in WebGL Mozilla: Browser window spoof using fullscreen mode Mozilla: Register allocation problem in WASM on arm64 Mozilla: Uninitialized variable leads to invalid memory read Mozilla: Querying a WebAuthn token with a large number of allowCredential entries may have leaked cross-origin information Mozilla: Memory safety bugs fixed in Firefox 101 and Firefox ESR 91.10
|
[
"cpe:/a:redhat:rhel_e4s:8.1::appstream"
] | null | 9.8 | 6.1 | null |
RHSA-2017:1095
|
Red Hat Security Advisory: bind security update
|
bind: Incorrect error handling causes assertion failure when using DNS64 with "break-dnssec yes;" bind: Processing a response containing CNAME or DNAME with unusual order can crash resolver
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 7.5 | null |
RHSA-2015:1507
|
Red Hat Security Advisory: qemu-kvm security and bug fix update
|
qemu/kvm: i8254: out-of-bounds memory access in pit_ioport_read function qemu: ide: atapi: heap overflow during I/O buffer memory access
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | null | null |
RHSA-2008:0267
|
Red Hat Security Advisory: java-1.6.0-ibm security update
|
Untrusted applet and application XSLT processing privilege escalation Buffer overflow security vulnerabilities in Java Web Start (CVE-2008-1189, CVE-2008-1190) Buffer overflow security vulnerabilities in Java Web Start (CVE-2008-1189, CVE-2008-1190) Buffer overflow security vulnerabilities in Java Web Start (CVE-2008-1189, CVE-2008-1190) Untrusted Java Web Start arbitrary file creation Java Plugin same-origin-policy bypass JRE image parsing library allows privilege escalation (CVE-2008-1194) JRE image parsing library allows privilege escalation (CVE-2008-1194) Java-API calls in untrusted Javascript allow network privilege escalation Buffer overflow security vulnerabilities in Java Web Start
|
[
"cpe:/a:redhat:rhel_extras:5::client",
"cpe:/a:redhat:rhel_extras:5::server"
] | null | null | null | null |
RHSA-2017:0259
|
Red Hat Security Advisory: nagios security update
|
nagios: Command injection via curl in MagpieRSS nagios: Privilege escalation issue
|
[
"cpe:/a:redhat:storage:3.1:nagios:el6",
"cpe:/a:redhat:storage:3.1:server:el6"
] | null | null | 7.3 | null |
RHSA-2007:1165
|
Red Hat Security Advisory: libexif security update
|
libexif infinite recursion flaw (DoS) libexif integer overflow
|
[
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2024:4392
|
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 8.0.2 Security update
|
jose4j: denial of service via specially crafted JWE undertow: LearningPushHandler can lead to remote memory DoS attacks undertow: response write hangs in case of Java 17 TLSv1.3 NewSessionTicket httpd: CONTINUATION frames DoS
|
[
"cpe:/a:redhat:jboss_enterprise_application_platform:8.0"
] | null | 7.5 | null | null |
RHSA-2024:0190
|
Red Hat Security Advisory: Red Hat OpenStack Platform 17.1 (GitPython) security update
|
GitPython: Blind local file inclusion
|
[
"cpe:/a:redhat:openstack:17.1::el8"
] | null | 5.1 | null | null |
RHSA-2005:346
|
Red Hat Security Advisory: slocate security update
|
security flaw
|
[
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2024:1458
|
Red Hat Security Advisory: OpenShift Container Platform 4.14.18 bug fix and security update
|
golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487) opentelemetry-go-contrib: DoS vulnerability in otelgrpc due to unbound cardinality metrics
|
[
"cpe:/a:redhat:openshift:4.14::el8",
"cpe:/a:redhat:openshift:4.14::el9"
] | null | 7.5 | null | null |
RHSA-2023:6810
|
Red Hat Security Advisory: squid:4 security update
|
squid: Request/Response smuggling in HTTP/1.1 and ICAP squid: Denial of Service in HTTP Digest Authentication
|
[
"cpe:/a:redhat:rhel_e4s:8.1::appstream"
] | null | 8.6 | null | null |
RHSA-2024:0407
|
Red Hat Security Advisory: git security update
|
git: On multi-user machines Git users might find themselves unexpectedly in a Git worktree git: Bypass of safe.directory protections git: exposure of sensitive information to a malicious actor git: git shell function that splits command arguments can lead to arbitrary heap writes. git: data exfiltration with maliciously crafted repository git: git apply: a path outside the working tree can be overwritten with crafted input
|
[
"cpe:/a:redhat:rhel_eus:8.6::appstream"
] | null | 7.5 | null | null |
RHSA-2023:5771
|
Red Hat Security Advisory: bind9.16 security update
|
bind: stack exhaustion in control channel code may lead to DoS
|
[
"cpe:/a:redhat:rhel_eus:8.6::appstream",
"cpe:/a:redhat:rhel_eus:8.6::crb"
] | null | 7.5 | null | null |
RHSA-2022:6507
|
Red Hat Security Advisory: Red Hat Advanced Cluster Management 2.5.2 security fixes and bug fixes
|
moment: inefficient parsing algorithm resulting in DoS vm2: Sandbox Escape in vm2
|
[
"cpe:/a:redhat:acm:2.5::el8"
] | null | 10 | null | null |
RHSA-2025:3828
|
Red Hat Security Advisory: glibc security update
|
glibc: buffer overflow in the GNU C Library's assert()
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb",
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 5.5 | null | null |
RHSA-2005:011
|
Red Hat Security Advisory: ethereal security update
|
security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw
|
[
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws"
] | null | null | null | null |
RHSA-2013:1674
|
Red Hat Security Advisory: dracut security, bug fix, and enhancement update
|
dracut: Creates initramfs images with world-readable permissions (information disclosure)
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2024:8722
|
Red Hat Security Advisory: firefox security update
|
firefox: thunderbird: Permission leak via embed or object elements firefox: thunderbird: Use-after-free in layout with accessibility firefox: thunderbird: Confusing display of origin for external protocol handler prompt firefox: thunderbird: XSS due to Content-Disposition being ignored in multipart/x-mixed-replace response firefox: thunderbird: Origin of permission prompt could be spoofed by long URL firefox: thunderbird: Cross origin video frame leak firefox: thunderbird: History interface could have been used to cause a Denial of Service condition in the browser firefox: thunderbird: Clipboard "paste" button persisted across tabs firefox: DOM push subscription message could hang Firefox firefox: thunderbird: Memory safety bugs fixed in Firefox 132, Thunderbird 132, Firefox ESR 128.4, and Thunderbird 128.4
|
[
"cpe:/a:redhat:rhel_eus:8.8::appstream"
] | null | 8.8 | null | null |
RHSA-2013:1427
|
Red Hat Security Advisory: ruby193-ruby security update
|
rubygems: version regex algorithmic complexity vulnerability
|
[
"cpe:/a:redhat:rhel_software_collections:1::el6"
] | null | null | null | null |
RHSA-2007:0346
|
Red Hat Security Advisory: vim security update
|
vim-7 modeline security issue
|
[
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2022:4914
|
Red Hat Security Advisory: rh-nodejs12-nodejs security, bug fix, and enhancement update
|
nodejs-json-schema: Prototype pollution vulnerability llhttp: HTTP Request Smuggling due to spaces in headers llhttp: HTTP Request Smuggling when parsing the body of chunked requests nodejs-tar: Insufficient symlink protection due to directory cache poisoning using symbolic links allowing arbitrary file creation and overwrite nodejs-tar: Insufficient symlink protection due to directory cache poisoning using symbolic links allowing arbitrary file creation and overwrite nodejs: Improper handling of URI Subject Alternative Names nodejs: Certificate Verification Bypass via String Injection nodejs: Incorrect handling of certificate subject and issuer fields minimist: prototype pollution nodejs: Prototype pollution via console.table properties
|
[
"cpe:/a:redhat:rhel_software_collections:3::el7"
] | null | 8.2 | null | null |
RHSA-2024:10289
|
Red Hat Security Advisory: container-tools:rhel8 security update
|
podman: podman machine spawns gvproxy with port bound to all IPs golang: math/big.Rat: may cause a panic or an unrecoverable fatal error if passed inputs with very large exponents Podman: Buildah: CRI-O: symlink traversal vulnerability in the containers/storage library can cause Denial of Service (DoS)
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 6.5 | null | null |
RHSA-2017:0828
|
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 6.4.14 update on RHEL 7
|
RESTEasy: Abuse of GZIPInterceptor in RESTEasy can lead to denial of service attack jboss: jbossas writable config files allow privilege escalation tomcat: Infinite loop in the processing of https requests
|
[
"cpe:/a:redhat:jboss_enterprise_application_platform:6::el7"
] | null | null | 7.5 | null |
RHSA-2017:3335
|
Red Hat Security Advisory: Red Hat Enterprise Linux 6.2 AMC One-Month Notice
|
This is the one-month notification for the retirement of Red Hat Enterprise Linux 6.2 Advanced Mission Critical (AMC). This notification applies only to those customers subscribed to the Advanced Mission Critical (AMC) channel for Red Hat Enterprise Linux 6.2.
|
[
"cpe:/o:redhat:rhel_mission_critical:6.2::server"
] | null | null | null | null |
RHSA-2013:0581
|
Red Hat Security Advisory: libxml2 security update
|
libxml2: CPU consumption DoS when performing string substitutions during entities expansion
|
[
"cpe:/o:redhat:enterprise_linux:5::server",
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2005:112
|
Red Hat Security Advisory: emacs security update
|
security flaw
|
[
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws"
] | null | null | null | null |
RHSA-2016:0595
|
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 6.4.7 update
|
tomcat: non-persistent DoS attack by feeding data by aborting an upload EAP: HTTPS NIO connector uses no timeout when reading SSL handshake from client
|
[
"cpe:/a:redhat:jboss_enterprise_application_platform:6::el5"
] | null | null | null | null |
RHSA-2021:2306
|
Red Hat Security Advisory: microcode_ctl security, bug fix and enhancement update
|
hw: vt-d related privilege escalation hw: improper isolation of shared resources in some Intel Processors hw: observable timing discrepancy in some Intel Processors hw: information disclosure on some Intel Atom processors
|
[
"cpe:/o:redhat:rhel_eus:8.1::baseos"
] | null | 5.6 | null | null |
RHSA-2020:2441
|
Red Hat Security Advisory: OpenShift Container Platform 4.3.25 openshift-enterprise-hyperkube-container security update
|
kubernetes: Server side request forgery (SSRF) in kube-controller-manager allows users to leak secret information
|
[
"cpe:/a:redhat:openshift:4.3::el7"
] | null | 6.3 | null | null |
RHSA-2020:0027
|
Red Hat Security Advisory: kpatch-patch security update
|
Kernel: KVM: OOB memory access via mmio ring buffer kernel: local attacker can trigger multiple use-after-free conditions results in privilege escalation
|
[
"cpe:/o:redhat:enterprise_linux:7::server"
] | null | null | 7.4 | null |
RHSA-2016:0098
|
Red Hat Security Advisory: java-1.8.0-ibm security update
|
JDK: J9 JVM allows code to invoke non-public interface methods TLS 1.2 Transcipt Collision attacks against MD5 in key exchange protocol (SLOTH) libpng: Buffer overflow vulnerabilities in png_get_PLTE/png_set_PLTE functions libpng: Buffer overflow vulnerabilities in png_get_PLTE/png_set_PLTE functions OpenJDK: URL deserialization inconsistencies (Networking, 8059054) OpenJDK: logging of RMI connection secrets (JMX, 8130710) OpenJDK: insufficient enforcement of totalEntitySizeLimit (JAXP, 8133962) OpenJDK: PBE incorrect key lengths (Libraries, 8138589) OpenJDK: incorrect boundary check in JPEG decoder (AWT, 8139017) ICU: integer signedness issue in IndicRearrangementProcessor (OpenJDK 2D, 8140543)
|
[
"cpe:/a:redhat:rhel_extras:7"
] | null | null | null | null |
RHSA-2024:0601
|
Red Hat Security Advisory: thunderbird security update
|
Mozilla: Out of bounds write in ANGLE Mozilla: Failure to update user input timestamp Mozilla: Crash when listing printers on Linux Mozilla: Bypass of Content Security Policy when directive unsafe-inline was set Mozilla: Phishing site popup could show local origin in address bar Mozilla: Potential permissions request bypass via clickjacking Mozilla: Privilege escalation through devtools Mozilla: HSTS policy on subdomain could bypass policy of upper domain Mozilla: Memory safety bugs fixed in Firefox 122, Firefox ESR 115.7, and Thunderbird 115.7
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 8.8 | null | null |
RHSA-2016:1856
|
Red Hat Security Advisory: rh-ror41-rubygem-actionview security update
|
rubygem-actionview: cross-site scripting flaw in Action View
|
[
"cpe:/a:redhat:rhel_software_collections:2::el6",
"cpe:/a:redhat:rhel_software_collections:2::el7"
] | null | null | 6.1 | null |
RHSA-2003:273
|
Red Hat Security Advisory: : Updated pine packages fix vulnerabilities
|
security flaw security flaw
|
[
"cpe:/o:redhat:linux:7.1",
"cpe:/o:redhat:linux:7.2",
"cpe:/o:redhat:linux:7.3",
"cpe:/o:redhat:linux:8.0",
"cpe:/o:redhat:linux:9"
] | null | null | null | null |
RHSA-2022:7187
|
Red Hat Security Advisory: device-mapper-multipath security update
|
device-mapper-multipath: Authorization bypass, multipathd daemon listens for client connections on an abstract Unix socket
|
[
"cpe:/o:redhat:rhel_e4s:8.1::baseos"
] | null | 7.8 | null | null |
RHSA-2005:747
|
Red Hat Security Advisory: slocate security update
|
security flaw
|
[
"cpe:/o:redhat:enterprise_linux:2.1::as",
"cpe:/o:redhat:enterprise_linux:2.1::aw",
"cpe:/o:redhat:enterprise_linux:2.1::es",
"cpe:/o:redhat:enterprise_linux:2.1::ws"
] | null | null | null | null |
RHSA-2015:2552
|
Red Hat Security Advisory: kernel security and bug fix update
|
virt: guest to host DoS by triggering an infinite loop in microcode via #AC exception virt: guest to host DoS by triggering an infinite loop in microcode via #DB exception
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | null | null |
RHSA-2009:0270
|
Red Hat Security Advisory: gstreamer-plugins security update
|
gstreamer-plugins-good: heap-based buffer overflow while parsing malformed QuickTime media files via crafted Time-to-sample (stss) atom data
|
[
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2003:156
|
Red Hat Security Advisory: : : : Updated gaim client fixes vulnerabilities
|
security flaw security flaw
|
[
"cpe:/o:redhat:linux:7.1"
] | null | null | null | null |
RHSA-2024:5255
|
Red Hat Security Advisory: kernel security update
|
kernel: vt: fix memory overlapping when deleting chars in the buffer amd: Return Address Predictor vulnerability leading to information disclosure kernel: gfs2: Fix kernel NULL pointer dereference in gfs2_rgrp_dump kernel: net/sched: act_ct: fix skb leak and crash on ooo frags kernel: tls: race between async notify and socket close kernel: tls: handle backlogging of crypto requests kernel: tls: race between tx work scheduling and socket close kernel: tcp: add sanity checks to rx zerocopy kernel: fs/proc: do_task_stat: use sig->stats_lock to gather the threads/children stats kernel: ext4: fix double-free of blocks due to wrong extents moved_len kernel: arp: Prevent overflow in arp_req_get(). kernel: ext4: avoid allocating blocks from corrupted group in ext4_mb_try_best_found() kernel: NFSv4.2: fix nfs4_listxattr kernel BUG at mm/usercopy.c:102 kernel: Squashfs: check the inode number is not the invalid value of zero kernel: mlxsw: spectrum_acl_tcam: Fix memory leak when canceling rehash work kernel: tcp: properly terminate timers for kernel sockets kernel: mm/hugetlb: fix missing hugetlb_lock for resv uncharge kernel: i40e: fix vf may be used uninitialized in this function warning kernel: TIPC message reassembly use-after-free remote code execution vulnerability kernel: net: kernel: UAF in network route management kernel: net: bridge: xmit: make sure we have at least eth header len bytes kernel: net/mlx5: Discard command completions in internal error
|
[
"cpe:/a:redhat:rhel_eus:8.8::crb",
"cpe:/o:redhat:rhel_eus:8.8::baseos"
] | null | 4.4 | null | null |
RHSA-2016:0490
|
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 6.4.6 OpenSSL security update
|
openssl: assertion failure in SSLv2 servers OpenSSL: SSLv2 doesn't block disabled ciphers SSL/TLS: Cross-protocol attack on TLS using SSLv2 (DROWN)
|
[
"cpe:/a:redhat:jboss_enterprise_application_platform:6.4"
] | null | null | null | null |
RHSA-2021:4686
|
Red Hat Security Advisory: webkit2gtk3 security update
|
webkitgtk: Use-after-free leading to arbitrary code execution
|
[
"cpe:/a:redhat:rhel_eus:8.1::appstream"
] | null | 8.8 | null | null |
RHSA-2015:0251
|
Red Hat Security Advisory: samba security update
|
samba: talloc free on uninitialized stack pointer in netlogon server could lead to remote-code execution
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2005:435
|
Red Hat Security Advisory: mozilla security update
|
security flaw security flaw security flaw security flaw
|
[
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHEA-2013:1032
|
Red Hat Enhancement Advisory: Red Hat OpenShift Enterprise 1.2 Node Release Advisory
|
stapler-adjunct-zeroclipboard: XSS via copying XSS payload into buffer Jenkins: Build Description XSS Jenkins: Multiple CSRF in MavenAbstractArtifactRecord.doRedeploy and Jenkins.doEval
|
[
"cpe:/a:redhat:openshift:1.2::el6"
] | null | null | null | null |
RHSA-2023:4382
|
Red Hat Security Advisory: openssh security update
|
openssh: Remote code execution in ssh-agent PKCS#11 support
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 9.8 | null | null |
RHSA-2024:3062
|
Red Hat Security Advisory: python3.11 security update
|
python: Parsing errors in email/_parseaddr.py lead to incorrect value in email address part of tuple
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb"
] | null | 5.3 | null | null |
RHSA-2024:0800
|
Red Hat Security Advisory: Red Hat Single Sign-On 7.6.7 security update on RHEL 9
|
guava: insecure temporary directory creation keycloak: reflected XSS via wildcard in OIDC redirect_uri keycloak: redirect_uri validation bypass keycloak: Log Injection during WebAuthn authentication or registration keycloak: open redirect via "form_post.jwt" JARM response mode jetty-server: OutOfMemoryError for large multipart without filename read via request.getParameter() jetty-server: Cookie parsing of quoted values can exfiltrate values from other cookies santuario: Private Key disclosure in debug-log output
|
[
"cpe:/a:redhat:red_hat_single_sign_on:7.6::el9"
] | null | 6.5 | null | null |
RHSA-2024:0025
|
Red Hat Security Advisory: firefox security update
|
Mozilla: Heap-buffer-overflow affecting WebGL <code>DrawElementsInstanced</code> method with Mesa VM driver Mozilla: Symlinks may resolve to smaller than expected buffers Mozilla: Heap buffer overflow in <code>nsTextFragment</code> Mozilla: Use-after-free in PR_GetIdentitiesLayer Mozilla: Potential sandbox escape due to <code>VideoBridge</code> lack of texture validation Mozilla: Heap buffer overflow affected <code>nsWindow::PickerOpen(void)</code> in headless mode Mozilla: Use-after-free in <code>nsDNSService</code> Mozilla: Undefined behavior in <code>ShutdownObserver()</code> Mozilla: Memory safety bugs fixed in Firefox 121, Firefox ESR 115.6, and Thunderbird 115.6 Mozilla: Potential exposure of uninitialized data in <code>EncryptingOutputStream</code> Mozilla: Clickjacking permission prompts using the popup transition
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 6.1 | null | null |
RHSA-2023:6469
|
Red Hat Security Advisory: wireshark security update
|
wireshark: RTPS dissector crash wireshark: IEEE C37.118 Synchrophasor dissector crash wireshark: Candump log file parser crash wireshark: VMS TCPIPtrace file parser crash wireshark: NetScaler file parser crash wireshark: XRA dissector infinite loop
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::crb"
] | null | 6.5 | null | null |
RHSA-2025:0224
|
Red Hat Security Advisory: Red Hat build of Cryostat security update
|
golang.org/x/net/html: Non-linear parsing of case-insensitive content in golang.org/x/net/html
|
[
"cpe:/a:redhat:cryostat:3::el8"
] | null | 7.5 | null | null |
RHSA-2022:0722
|
Red Hat Security Advisory: rh-maven36-httpcomponents-client security update
|
apache-httpclient: incorrect handling of malformed authority component in request URIs
|
[
"cpe:/a:redhat:rhel_software_collections:3::el7"
] | null | 5.3 | null | null |
RHSA-2022:0816
|
Red Hat Security Advisory: firefox security update
|
expat: Malformed 2- and 3-byte UTF-8 sequences can lead to arbitrary code execution expat: Namespace-separator characters in "xmlns[:prefix]" attribute values can lead to arbitrary code execution expat: Integer overflow in storeRawNames() Mozilla: Use-after-free in text reflows Mozilla: Browser window spoof using fullscreen mode Mozilla: iframe allow-scripts sandbox bypass Mozilla: Temporary files downloaded to /tmp and accessible by other local users Mozilla: Time-of-check time-of-use bug when verifying add-on signatures Mozilla: Use-after-free in XSLT parameter processing Mozilla: Use-after-free in WebGPU IPC Framework
|
[
"cpe:/a:redhat:rhel_eus:8.2::appstream"
] | null | 8.8 | 7.5 | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.