id
stringlengths 13
15
| title
stringlengths 29
176
| description
stringlengths 8
32.1k
| cpes
listlengths 0
20
| cvss_v4_0
null | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
null |
---|---|---|---|---|---|---|---|
RHSA-2013:1049
|
Red Hat Security Advisory: php security update
|
php: xml_parse_into_struct buffer overflow when parsing deeply nested XML
|
[
"cpe:/o:redhat:enterprise_linux:5::server",
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2023:5535
|
Red Hat Security Advisory: libvpx security update
|
libvpx: Heap buffer overflow in vp8 encoding in libvpx libvpx: crash related to VP9 encoding in libvpx
|
[
"cpe:/a:redhat:rhel_e4s:8.1::appstream"
] | null | 7.5 | null | null |
RHSA-2020:0328
|
Red Hat Security Advisory: kernel-rt security and bug fix update
|
kernel: heap overflow in mwifiex_set_uap_rates() function of Marvell Wifi Driver leading to DoS kernel: heap-overflow in mwifiex_set_wmm_params() function of Marvell WiFi driver leading to DoS kernel: heap overflow in mwifiex_update_vs_ie() function of Marvell WiFi driver kernel: heap-based buffer overflow in mwifiex_process_country_ie() function in drivers/net/wireless/marvell/mwifiex/sta_ioctl.c kernel: incomplete fix for race condition between mmget_not_zero()/get_task_mm() and core dumping in CVE-2019-11599 kernel: heap overflow in marvell/mwifiex/tdls.c kernel: rtl_p2p_noa_ie in drivers/net/wireless/realtek/rtlwifi/ps.c in the Linux kernel lacks a certain upper-bound check, leading to a buffer overflow Kernel: KVM: export MSR_IA32_TSX_CTRL to guest - incomplete fix for TAA (CVE-2019-11135)
|
[
"cpe:/a:redhat:enterprise_linux:8::nfv",
"cpe:/a:redhat:enterprise_linux:8::realtime"
] | null | null | 5.5 | null |
RHSA-2023:7371
|
Red Hat Security Advisory: samba security update
|
samba: smbd allows client access to unix domain sockets on the file system as root samba: SMB clients can truncate files with read-only permissions samba: "rpcecho" development server allows denial of service via sleep() call on AD DC
|
[
"cpe:/a:redhat:rhel_eus:9.2::appstream",
"cpe:/a:redhat:rhel_eus:9.2::crb",
"cpe:/a:redhat:rhel_eus:9.2::resilientstorage",
"cpe:/o:redhat:rhel_eus:9.2::baseos"
] | null | 6.5 | null | null |
RHEA-2023:4636
|
Red Hat Enhancement Advisory: microcode_ctl bug fix and enhancement update
|
kernel: Intel firmware update for insufficient granularity of access control in out-of-band management in some Intel Atom and Intel Xeon Scalable Processors kernel: Intel firmware update for Incorrect default permissions in some memory controller configurations
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 7.2 | null | null |
RHSA-2021:0313
|
Red Hat Security Advisory: OpenShift Container Platform 4.5.31 bug fix and security update
|
openshift/installer: Bootstrap nodes allow anonymous authentication on kubelet port 10250
|
[
"cpe:/a:redhat:openshift:4.5::el7",
"cpe:/a:redhat:openshift:4.5::el8"
] | null | 8.1 | null | null |
RHEA-2022:5615
|
Red Hat Enhancement Advisory: nodejs:12 bug fix and enhancement update
|
nodejs-json-schema: Prototype pollution vulnerability llhttp: HTTP Request Smuggling due to spaces in headers llhttp: HTTP Request Smuggling when parsing the body of chunked requests nodejs-tar: Insufficient symlink protection due to directory cache poisoning using symbolic links allowing arbitrary file creation and overwrite nodejs-tar: Insufficient symlink protection due to directory cache poisoning using symbolic links allowing arbitrary file creation and overwrite nodejs: Improper handling of URI Subject Alternative Names nodejs: Certificate Verification Bypass via String Injection nodejs: Incorrect handling of certificate subject and issuer fields nodejs: Prototype pollution via console.table properties
|
[
"cpe:/a:redhat:rhel_eus:8.4::appstream"
] | null | 8.2 | null | null |
RHSA-2024:4755
|
Red Hat Security Advisory: libreoffice security update
|
libreoffice: create a document which without prompt will execute scripts built-into LibreOffice on clicking a graphic
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::crb"
] | null | 7.3 | null | null |
RHSA-2013:0209
|
Red Hat Security Advisory: openstack-glance security update
|
openstack-glance: Backend password leak in Glance error message
|
[
"cpe:/a:redhat:openstack:2::el6"
] | null | null | null | null |
RHSA-2005:417
|
Red Hat Security Advisory: tcpdump security update
|
security flaw security flaw security flaw
|
[
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2022:8100
|
Red Hat Security Advisory: swtpm security and bug fix update
|
swtpm: Unchecked header size indicator against expected size
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 5.5 | null | null |
RHSA-2023:1789
|
Red Hat Security Advisory: firefox security update
|
Mozilla: Memory Corruption in Safe Browsing Code Mozilla: libwebp: Double-free in libwebp Mozilla: Fullscreen notification obscured Mozilla: Potential Memory Corruption following Garbage Collector compaction Mozilla: Invalid free from JavaScript code Mozilla: Content-Disposition filename truncation leads to Reflected File Download Mozilla: Files with malicious extensions could have been downloaded unsafely on Linux Mozilla: Incorrect optimization result on ARM64 Mozilla: Memory safety bugs fixed in Firefox 112 and Firefox ESR 102.10
|
[
"cpe:/a:redhat:rhel_aus:8.2::appstream",
"cpe:/a:redhat:rhel_e4s:8.2::appstream",
"cpe:/a:redhat:rhel_tus:8.2::appstream"
] | null | 8.8 | null | null |
RHEA-2021:3941
|
Red Hat Enhancement Advisory: OpenShift Sandboxed Containers 1.1.0 update
|
golang: crypto/tls: certificate of wrong type is causing TLS client to panic
|
[
"cpe:/a:redhat:openshift_sandboxed_containers:1.1.0::el8"
] | null | 6.5 | null | null |
RHEA-2019:3851
|
Red Hat Enhancement Advisory: microcode_ctl bug fix and enhancement update
|
hw: Intel SGX information leak
|
[
"cpe:/o:redhat:rhel_aus:7.3::server",
"cpe:/o:redhat:rhel_e4s:7.3::server",
"cpe:/o:redhat:rhel_tus:7.3::server"
] | null | null | 6 | null |
RHSA-2017:1838
|
Red Hat Security Advisory: rh-postgresql95-postgresql security update
|
postgresql: Selectivity estimators bypass SELECT privilege checks postgresql: libpq ignores PGREQUIRESSL environment variable postgresql: pg_user_mappings view discloses foreign server passwords
|
[
"cpe:/a:redhat:network_satellite:5.8::el6",
"cpe:/a:redhat:network_satellite_managed_db:5.8::el6"
] | null | null | 6.3 | null |
RHSA-2021:1647
|
Red Hat Security Advisory: samba security, bug fix, and enhancement update
|
samba: Netlogon elevation of privilege vulnerability (Zerologon) samba: Missing handle permissions check in SMB1/2/3 ChangeNotify samba: Unprivileged user can crash winbind
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb",
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 5 | null | null |
RHSA-2004:536
|
Red Hat Security Advisory: ncompress security update
|
security flaw
|
[
"cpe:/o:redhat:enterprise_linux:2.1::as",
"cpe:/o:redhat:enterprise_linux:2.1::aw",
"cpe:/o:redhat:enterprise_linux:2.1::es",
"cpe:/o:redhat:enterprise_linux:2.1::ws"
] | null | null | null | null |
RHSA-2023:7716
|
Red Hat Security Advisory: webkit2gtk3 security update
|
webkitgtk: Arbitrary Remote Code Execution
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 8.8 | null | null |
RHSA-2013:0201
|
Red Hat Security Advisory: rubygem-activesupport security update
|
rubygem-activesupport: json to yaml parsing
|
[
"cpe:/a:rhel_sam:1.1::el6"
] | null | null | null | null |
RHSA-2024:7443
|
Red Hat Security Advisory: RHACS 4.5 enhancement and security update
|
nodejs-async: Regular expression denial of service while parsing function in autoinject
|
[
"cpe:/a:redhat:advanced_cluster_security:4.5::el8"
] | null | 5.3 | null | null |
RHSA-2015:0846
|
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 6.4.0 update
|
CLI: Insecure default permissions on history file mod_jk: information leak due to incorrect JkMount/JkUnmount directives processing wss4j: Apache WSS4J is vulnerable to Bleichenbacher's attack (incomplete fix for CVE-2011-2487) wss4j: Apache WSS4J doesn't correctly enforce the requireSignedEncryptedDataElements property PicketLink: SP does not take Audience condition of a SAML assertion into account mod_cluster: JavaScript code injection is possible via MCMP mod_manager messages PicketLink: Lack of validation for the Destination attribute in a Response element in a SAML assertion
|
[
"cpe:/a:redhat:jboss_enterprise_application_platform:6::el5"
] | null | 6.3 | null | null |
RHSA-2021:1307
|
Red Hat Security Advisory: java-11-openjdk security update
|
OpenJDK: Incomplete enforcement of JAR signing disabled algorithms (Libraries, 8249906)
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 5.3 | null | null |
RHSA-2009:0392
|
Red Hat Security Advisory: java-1.6.0-sun security update
|
Untrusted applet causes DoS by filling up disk space OpenJDK remote LDAP Denial-Of-Service (6717680) OpenJDK LDAP client remote code execution (6737315) OpenJDK Pack200 Buffer overflow vulnerability (6792554) OpenJDK Pack200 Buffer overflow vulnerability (6792554) OpenJDK: PNG and GIF processing buffer overflow vulnerabilities (6804996, 6804997) OpenJDK GIF processing buffer overflow vulnerability (6804998) OpenJDK: Type1 font processing buffer overflow vulnerability OpenJDK: DoS (disk consumption) via handling of temporary font files OpenJDK JAX-WS service endpoint remote Denial-of-Service (6630639) OpenJDK code generation vulnerability (6636360) OpenJDK: Files disclosure, arbitrary code execution via "deserializing applets" (6646860) OpenJDK: Intended access restrictions bypass via LiveConnect (6724331) OpenJDK: Possibility of trusted applet run in older, vulnerable version of JRE (6706490) OpenJDK: Improper parsing of crossdomain.xml files (intended access restriction bypass) (6798948) OpenJDK: Signed applet remote misuse possibility (6782871)
|
[
"cpe:/a:redhat:rhel_extras:4",
"cpe:/a:redhat:rhel_extras:5::client",
"cpe:/a:redhat:rhel_extras:5::server"
] | null | null | null | null |
RHSA-2024:0114
|
Red Hat Security Advisory: python3 security update
|
python: use after free in heappushpop() of heapq module python: DoS when processing malformed Apple Property List files in binary format
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 6.5 | null | null |
RHSA-2020:5637
|
Red Hat Security Advisory: openssl security update
|
openssl: EDIPARTYNAME NULL pointer de-reference
|
[
"cpe:/o:redhat:rhel_eus:8.1::baseos"
] | null | 5.9 | null | null |
RHSA-2004:072
|
Red Hat Security Advisory: nfs-utils security update
|
security flaw
|
[
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws"
] | null | null | null | null |
RHSA-2022:4876
|
Red Hat Security Advisory: firefox security update
|
Mozilla: Cross-Origin resource's length leaked Mozilla: Heap buffer overflow in WebGL Mozilla: Browser window spoof using fullscreen mode Mozilla: Register allocation problem in WASM on arm64 Mozilla: Uninitialized variable leads to invalid memory read Mozilla: Querying a WebAuthn token with a large number of allowCredential entries may have leaked cross-origin information Mozilla: Memory safety bugs fixed in Firefox 101 and Firefox ESR 91.10
|
[
"cpe:/a:redhat:rhel_eus:8.2::appstream"
] | null | 9.8 | 6.1 | null |
RHSA-2015:0718
|
Red Hat Security Advisory: firefox security update
|
Mozilla: Code execution through incorrect JavaScript bounds checking elimination (MFSA 2015-29) Mozilla: Privilege escalation through SVG navigation (MFSA 2015-28)
|
[
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::server",
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation",
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | null | null |
RHSA-2022:5759
|
Red Hat Security Advisory: rh-mariadb105-galera and rh-mariadb105-mariadb security and bugfix update
|
mariadb: Crash executing query with VIEW, aggregate and subquery mariadb: MariaDB allows an application crash in find_field_in_tables and find_order_in_list via an unused common table expression (CTE) mariadb: MariaDB through 10.5.13 allows a ha_maria::extra application crash via certain SELECT statements mariadb: MariaDB through 10.5.9 allows an application crash in sub_select_postjoin_aggr for a NULL value of aggr mariadb: MariaDB through 10.5.9 allows a sql_parse.cc application crash because of incorrect used_tables expectations mariadb: MariaDB through 10.5.9 allows an application crash via certain long SELECT DISTINCT statements mariadb: MariaDB through 10.5.9 allows attackers to trigger a convert_const_to_int use-after-free when the BIGINT data type is used mysql: C API unspecified vulnerability (CPU Oct 2022) mariadb: lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer mariadb: lack of validating the existence of an object prior to performing operations on the object mariadb: lack of proper validation of a user-supplied string before using it as a format specifier mariadb: CONNECT storage engine heap-based buffer overflow mariadb: assertion failure in Item_args::walk_arg mariadb: use-after-poison when complex conversion is involved in blob mariadb: server crash in create_tmp_table::finalize mariadb: server crash in component arg_comparator::compare_real_fixed mariadb: server crash at my_decimal::operator= mariadb: server crash at Field::set_default via specially crafted SQL statements mariadb: assertion failure via component Item_field::used_tables/update_depend_map_for_order mariadb: use-after-poison in my_strcasecmp_8bit() of ctype-simple.c mariadb: crash via component Item_subselect::init_expr_cache_tracker mariadb: server crashes in query_arena::set_query_arena upon SELECT from view mariadb: assertion failures in decimal_bin_size mariadb: crash when using HAVING with NOT EXIST predicate in an equality mariadb: assertion failure in compare_order_elements mariadb: crash when using HAVING with IS NULL predicate in an equality mariadb: use-after-poison in Binary_string::free_buffer mariadb: crash in multi-update and implicit grouping mariadb: assertion failure in sql/item_func.cc mariadb: crash via window function in expression in ORDER BY mariadb: assertion failure in sql/item_cmpfunc.cc mariadb: use-after-free when WHERE has subquery with an outer reference in HAVING mariadb: assertion failure in VDec::VDec at /sql/sql_type.cc mariadb: incorrect key in "dup value" error after long unique mariadb: use-after-poison in Binary_string::free_buffer mariadb: improper locking due to the unreleased lock in extra/mariabackup/ds_compress.cc mariadb: improper locking due to the unreleased lock in extra/mariabackup/ds_compress.cc mariadb: server crash at Item_subselect::init_expr_cache_tracker mariadb: server crash in Item_func_in::cleanup/Item::cleanup_processor mariadb: server crash in Item_field::fix_outer_field for INSERT SELECT mariadb: server crash in Item_args::walk_args mariadb: segmentation fault in Exec_time_tracker::get_loops/Filesort_tracker::report_use/filesort
|
[
"cpe:/a:redhat:rhel_software_collections:3::el7"
] | null | 6.5 | null | null |
RHSA-2022:2186
|
Red Hat Security Advisory: kernel security and bug fix update
|
kernel: use-after-free in RDMA listen() kernel: cgroups v1 release_agent feature may allow privilege escalation
|
[
"cpe:/o:redhat:rhel_aus:7.6::server",
"cpe:/o:redhat:rhel_e4s:7.6::server",
"cpe:/o:redhat:rhel_tus:7.6::server"
] | null | 7 | null | null |
RHSA-2010:0102
|
Red Hat Security Advisory: flash-plugin security update
|
flash-plugin: unauthorized cross-domain requests (APSB10-06) flash-plugin: possible player crash (APSB10-06)
|
[
"cpe:/a:redhat:rhel_extras:5::client",
"cpe:/a:redhat:rhel_extras:5::server"
] | null | null | null | null |
RHSA-2023:5264
|
Red Hat Security Advisory: virt:rhel and virt-devel:rhel security and bug fix update
|
NTFS-3G: buffer overflow issue in NTFS-3G can cause code execution via crafted metadata in an NTFS image QEMU: VNC: improper I/O watch removal in TLS handshake can lead to remote unauthenticated denial of service
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb"
] | null | 7.5 | null | null |
RHSA-2005:293
|
Red Hat Security Advisory: kernel security update
|
security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw
|
[
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws"
] | null | null | null | null |
RHSA-2024:6824
|
Red Hat Security Advisory: OpenShift Container Platform 4.16.14 security update
|
containers/image: digest type does not guarantee valid type golang-protobuf: encoding/protojson, internal/encoding/json: infinite loop in protojson.Unmarshal when unmarshaling certain forms of invalid JSON Bare Metal Operator: BMO can expose particularly named secrets from other namespaces via BMH CRD
|
[
"cpe:/a:redhat:openshift:4.16::el9"
] | null | 4.9 | null | null |
RHSA-2012:0139
|
Red Hat Security Advisory: java-1.6.0-sun security update
|
OpenJDK: JavaSound incorrect bounds check (Sound, 7088367) OpenJDK: AtomicReferenceArray insufficient array type check (Concurrency, 7082299) GlassFish: hash table collisions CPU usage DoS (oCERT-2011-003) JDK: unspecified vulnerability fixed in 6u31 and 7u3 (2D) JDK: unspecified vulnerability fixed in 6u31 and 7u3 (2D) JDK: unspecified vulnerability fixed in 6u31 and 7u3 (Deployment) OpenJDK: off-by-one bug in ZIP reading code (JRE, 7118283) OpenJDK: KeyboardFocusManager focus stealing (AWT, 7110683) OpenJDK: unrestricted use of TimeZone.setDefault() (i18n, 7110687) OpenJDK: incomplete info in the deserialization exception (Serialization, 7110700) OpenJDK: mutable repository identifiers (CORBA, 7110704) OpenJDK: AtomicReferenceArray insufficient array type check (Concurrency, 7082299)
|
[
"cpe:/a:redhat:rhel_extras:4",
"cpe:/a:redhat:rhel_extras:5::client",
"cpe:/a:redhat:rhel_extras:5::server",
"cpe:/a:redhat:rhel_extras:6"
] | null | null | null | null |
RHSA-2018:0036
|
Red Hat Security Advisory: microcode_ctl security update
|
An update for microcode_ctl is now available for Red Hat Enterprise Linux 6.7 Extended Update Support.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
|
[
"cpe:/o:redhat:rhel_eus:6.7::computenode",
"cpe:/o:redhat:rhel_eus:6.7::server"
] | null | null | null | null |
RHSA-2019:1632
|
Red Hat Security Advisory: Red Hat OpenShift Container Platform 3.10 atomic-openshift security update
|
kubernetes: Incomplete fix for CVE-2019-1002101 allows for arbitrary file write via `kubectl cp`
|
[
"cpe:/a:redhat:openshift:3.10::el7"
] | null | null | 5.3 | null |
RHSA-2012:0676
|
Red Hat Security Advisory: kvm security and bug fix update
|
kernel: kvm: irqchip_in_kernel() and vcpu->arch.apic inconsistency kvm: device assignment page leak
|
[
"cpe:/a:redhat:rhel_virtualization:5::client",
"cpe:/a:redhat:rhel_virtualization:5::server"
] | null | null | null | null |
RHSA-2019:0831
|
Red Hat Security Advisory: kernel-alt security and bug fix update
|
kernel: Integer overflow in the alarm_timer_nsleep function kernel: NULL pointer dereference in xfs_da_shrink_inode function kernel: use-after-free in ucma_leave_multicast in drivers/infiniband/core/ucma.c kernel: Unprivileged users able to inspect kernel stacks of arbitrary tasks kernel: TLB flush happens too late on mremap kernel: Type confusion in drivers/tty/n_tty.c allows for a denial of service kernel: userfaultfd bypasses tmpfs file permissions kernel: lack of check for mmap minimum address in expand_downwards in mm/mmap.c leads to NULL pointer dereferences exploit on non-SMAP platforms
|
[
"cpe:/o:redhat:enterprise_linux:7::server"
] | null | null | 5.5 | null |
RHSA-2025:1088
|
Red Hat Security Advisory: ovn23.06 security update
|
ovn: egress ACLs may be bypassed via specially crafted UDP packet
|
[
"cpe:/o:redhat:enterprise_linux:8::fastdatapath"
] | null | 8.1 | null | null |
RHSA-2024:7427
|
Red Hat Security Advisory: kpatch-patch-4_18_0-305_120_1 and kpatch-patch-4_18_0-305_138_1 security update
|
kernel: TIPC message reassembly use-after-free remote code execution vulnerability kernel: wifi: mac80211: Avoid address calculations via out of bounds array indexing
|
[
"cpe:/o:redhat:rhel_e4s:8.4::baseos"
] | null | 7.8 | null | null |
RHSA-2020:3558
|
Red Hat Security Advisory: firefox security update
|
Mozilla: Attacker-induced prompt for extension installation Mozilla: Use-After-Free when aborting an operation
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | 8.8 | null | null |
RHSA-2024:0212
|
Red Hat Security Advisory: Red Hat OpenStack Platform 17.1 (python-django) security update
|
python-django: Potential regular expression denial of service vulnerability in EmailValidator/URLValidator
|
[
"cpe:/a:redhat:openstack:17.1::el9"
] | null | 7.5 | null | null |
RHSA-2016:2054
|
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 6.4.10 natives update on RHEL 7
|
httpd: HTTP request smuggling attack against chunked request parser mod_cluster: remotely Segfault Apache http server mod_cluster: Buffer overflow in mod_manager when sending request with long JVMRoute
|
[
"cpe:/a:redhat:jboss_enterprise_application_platform:6::el7"
] | null | null | 4.8 | null |
RHSA-2017:1479
|
Red Hat Security Advisory: glibc security update
|
glibc: heap/stack gap jumping via unbounded stack allocations
|
[
"cpe:/o:redhat:rhel_aus:5.9",
"cpe:/o:redhat:rhel_aus:6.4::server",
"cpe:/o:redhat:rhel_aus:6.5::server",
"cpe:/o:redhat:rhel_aus:6.6::server",
"cpe:/o:redhat:rhel_els:5",
"cpe:/o:redhat:rhel_eus:6.7::computenode",
"cpe:/o:redhat:rhel_eus:6.7::server",
"cpe:/o:redhat:rhel_eus:7.2::computenode",
"cpe:/o:redhat:rhel_eus:7.2::server",
"cpe:/o:redhat:rhel_mission_critical:6.2::server",
"cpe:/o:redhat:rhel_tus:6.5::server",
"cpe:/o:redhat:rhel_tus:6.6::server"
] | null | null | 7.4 | null |
RHSA-2023:6817
|
Red Hat Security Advisory: OpenShift Virtualization 4.14.0 Images security and bug fix update
|
mongo-go-driver: specific cstrings input may not be properly validated golang: crypto/tls: large handshake records may cause panics golang: net/http, mime/multipart: denial of service from excessive resource consumption containerd: OCI image importer memory exhaustion containerd: Supplementary groups are not set up properly golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487) HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack)
|
[
"cpe:/a:redhat:container_native_virtualization:4.14::el9"
] | null | 7.5 | null | null |
RHSA-2024:0193
|
Red Hat Security Advisory: OpenShift Container Platform 4.13.29 bug fix and security update
|
mongo-go-driver: specific cstrings input may not be properly validated golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487)
|
[
"cpe:/a:redhat:openshift:4.13::el8",
"cpe:/a:redhat:openshift:4.13::el9"
] | null | 7.5 | null | null |
RHSA-2013:0216
|
Red Hat Security Advisory: freetype security update
|
freetype: heap buffer over-read in BDF parsing _bdf_parse_glyphs() (#37906)
|
[
"cpe:/o:redhat:enterprise_linux:5::server",
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2021:4766
|
Red Hat Security Advisory: Release of OpenShift Serverless 1.19.0
|
golang: net/http/httputil: panic due to racy read of persistConn after handler panic
|
[
"cpe:/a:redhat:serverless:1.19::el8"
] | null | 5.9 | null | null |
RHSA-2022:6040
|
Red Hat Security Advisory: Release of OpenShift Serverless 1.24.0
|
golang: net/http: improper sanitization of Transfer-Encoding header golang: go/parser: stack exhaustion in all Parse* functions go-restful: Authorization Bypass Through User-Controlled Key prometheus/client_golang: Denial of service using InstrumentHandlerCounter golang: encoding/pem: fix stack overflow in Decode golang: regexp: stack exhaustion via a deeply nested expression golang: encoding/xml: stack exhaustion in Decoder.Skip golang: crypto/elliptic: panic caused by oversized scalar golang: crypto/tls: session tickets lack random ticket_age_add golang: io/fs: stack exhaustion in Glob golang: compress/gzip: stack exhaustion in Reader.Read golang: path/filepath: stack exhaustion in Glob golang: encoding/xml: stack exhaustion in Unmarshal golang: encoding/gob: stack exhaustion in Decoder.Decode golang: net/http/httputil: NewSingleHostReverseProxy - omit X-Forwarded-For not working
|
[
"cpe:/a:redhat:serverless:1.24::el8"
] | null | 6.5 | null | null |
RHSA-2024:8490
|
Red Hat Security Advisory: python3 security update
|
python: cpython: tarfile: ReDos via excessive backtracking while parsing header values
|
[
"cpe:/o:redhat:rhel_aus:7.7::server"
] | null | 7.5 | null | null |
RHSA-2016:1296
|
Red Hat Security Advisory: ocaml security update
|
ocaml: sizes arguments are sign-extended from 32 to 64 bits
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | null | null |
RHSA-2005:032
|
Red Hat Security Advisory: php security update
|
security flaw security flaw security flaw
|
[
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2024:1412
|
Red Hat Security Advisory: gmp update
|
gmp: Integer overflow and resultant buffer overflow via crafted input
|
[
"cpe:/o:redhat:rhel_eus:8.8::baseos"
] | null | 6.2 | null | null |
RHSA-2008:0210
|
Red Hat Security Advisory: java-1.5.0-ibm security update
|
java-1.5.0 Privilege escalation via unstrusted applet and application Untrusted applet and application XSLT processing privilege escalation Buffer overflow security vulnerabilities in Java Web Start (CVE-2008-1189, CVE-2008-1190) Buffer overflow security vulnerabilities in Java Web Start (CVE-2008-1189, CVE-2008-1190) Buffer overflow security vulnerabilities in Java Web Start (CVE-2008-1189, CVE-2008-1190) Java Plugin same-origin-policy bypass JRE image parsing library allows privilege escalation (CVE-2008-1194) JRE image parsing library allows privilege escalation (CVE-2008-1194) Java-API calls in untrusted Javascript allow network privilege escalation Buffer overflow security vulnerabilities in Java Web Start
|
[
"cpe:/a:redhat:rhel_extras:4",
"cpe:/a:redhat:rhel_extras:5::client",
"cpe:/a:redhat:rhel_extras:5::server"
] | null | null | null | null |
RHSA-2022:8974
|
Red Hat Security Advisory: kernel-rt security and bug fix update
|
kernel: KVM: cmpxchg_gpte can write to pfns outside the userspace region kernel: openvswitch: integer underflow leads to out-of-bounds write in reserve_sfa_size() kernel: watch queue race condition can lead to privilege escalation hw: cpu: incomplete clean-up of multi-core shared buffers (aka SBDR) hw: cpu: incomplete clean-up of microarchitectural fill buffers (aka SBDS) hw: cpu: incomplete clean-up in specific special register write operations (aka DRPW) hw: cpu: AMD: RetBleed Arbitrary Speculative Code Execution with Return Instructions hw: cpu: AMD: Branch Type Confusion (non-retbleed) hw: cpu: Intel: Post-barrier Return Stack Buffer Predictions hw: cpu: Intel: information disclosure via local access hw: cpu: AMD: RetBleed Arbitrary Speculative Code Execution with Return Instructions hw: cpu: Intel: RetBleed Arbitrary Speculative Code Execution with Return Instructions kernel: nfsd buffer overflow by RPC message over TCP with garbage data
|
[
"cpe:/a:redhat:rhel_eus:9.0::nfv",
"cpe:/a:redhat:rhel_eus:9.0::realtime"
] | null | 7.5 | null | null |
RHSA-2020:3090
|
Red Hat Security Advisory: Red Hat OpenShift Service Mesh 1.1 servicemesh-proxy security update
|
envoyproxy/envoy: incorrectly validates TLS certificates when using wildcards for DNS SAN's
|
[
"cpe:/a:redhat:service_mesh:1.1::el8"
] | null | 6.6 | null | null |
RHSA-2009:0479
|
Red Hat Security Advisory: perl-DBD-Pg security update
|
perl-DBD-Pg: pg_getline buffer overflow perl-DBD-Pg: dequote_bytea memory leak
|
[
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2005:720
|
Red Hat Security Advisory: ucd-snmp security update
|
security flaw
|
[
"cpe:/o:redhat:enterprise_linux:2.1::as",
"cpe:/o:redhat:enterprise_linux:2.1::aw",
"cpe:/o:redhat:enterprise_linux:2.1::es",
"cpe:/o:redhat:enterprise_linux:2.1::ws"
] | null | null | null | null |
RHSA-2017:2869
|
Red Hat Security Advisory: kernel security and bug fix update
|
kernel: a race between inotify_handle_event() and sys_rename()
|
[
"cpe:/o:redhat:rhel_eus:7.2::computenode",
"cpe:/o:redhat:rhel_eus:7.2::server"
] | null | null | 7.8 | null |
RHSA-2024:0716
|
Red Hat Security Advisory: gimp security update
|
gimp: dds buffer overflow RCE gimp: PSD buffer overflow RCE gimp: psp integer overflow RCE gimp: psp off-by-one RCE
|
[
"cpe:/a:redhat:rhel_eus:9.0::appstream"
] | null | 7.8 | null | null |
RHSA-2014:1110
|
Red Hat Security Advisory: glibc security update
|
glibc: directory traversal in LC_* locale handling glibc: off-by-one error leading to a heap-based buffer overflow flaw in __gconv_translit_find()
|
[
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::server",
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation",
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | null | null |
RHSA-2005:793
|
Red Hat Security Advisory: netpbm security update
|
security flaw
|
[
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2020:4974
|
Red Hat Security Advisory: chromium-browser security update
|
chromium-browser: Use after free in user interface chromium-browser: Insufficient policy enforcement in ANGLE chromium-browser: Inappropriate implementation in V8 chromium-browser: Stack buffer overflow in WebRTC chromium-browser: Inappropriate implementation in V8
|
[
"cpe:/a:redhat:rhel_extras:6"
] | null | 8.8 | null | null |
RHSA-2024:8492
|
Red Hat Security Advisory: webkit2gtk3 security update
|
webkitgtk: Memory corruption issue when processing web content webkitgtk: arbitrary javascript code execution webkitgtk: Processing web content may lead to arbitrary code execution webkitgtk: Arbitrary Remote Code Execution chromium-browser: Use after free in ANGLE webkitgtk: Processing web content may lead to arbitrary code execution webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution webkitgtk: webkit2gtk: Use after free may lead to Remote Code Execution webkitgtk: webkit2gtk: Out-of-bounds read was addressed with improved bounds checking webkitgtk: webkit2gtk: Out-of-bounds read was addressed with improved bounds checking webkitgtk: webkit2gtk: Use-after-free was addressed with improved memory management webkitgtk: webkit2gtk: Processing maliciously crafted web content may lead to an unexpected process crash webkit: Processing maliciously crafted web content may lead to memory corruption
|
[
"cpe:/a:redhat:rhel_eus:9.2::appstream"
] | null | 8.8 | null | null |
RHSA-2012:1386
|
Red Hat Security Advisory: java-1.7.0-openjdk security update
|
OpenJDK: java.io.FilePermission information leak (Libraries, 6631398) OpenJDK: uninitialized Array JVM memory disclosure (Hotspot, 7198606) OpenJDK: RhinoScriptEngine security bypass (Scripting, 7143535) OpenJDK: Executors state handling issues (Concurrency, 7189103) OpenJDK: EnvHelp information disclosure (JMX, 7158796) OpenJDK: DescriptorSupport insufficient package access checks (JMX, 7192975) OpenJDK: AccessController.doPrivilegedWithCombiner() information disclosure (Security, 7172522) OpenJDK: LogManager security bypass (Libraries, 7169884) OpenJDK: com.sun.org.glassfish.* not restricted packages (JAX-WS, 7169887) OpenJDK: RMIConnectionImpl information disclosure (JMX, 7169888) OpenJDK: com.sun.org.glassfish.* not restricted packages (JAX-WS, 7163198) OpenJDK: SecureRandom mulitple seeders information disclosure (Security, 7167656) OpenJDK: ServiceLoader reject not subtype classes without instantiating (Libraries, 7195919) OpenJDK: JSSE denial of service (JSSE, 7186286) OpenJDK: DefaultFormatter insufficient data validation (Swing, 7195194) OpenJDK: disable Gopher support by default (Gopher, 7189567) OpenJDK: XMLDecoder sandbox restriction bypass (Beans, 7195917) OpenJDK: PropertyElementHandler insufficient access checks (Beans, 7195549) OpenJDK: MethodHandle insufficient access control checks (Libraries, 7196190) OpenJDK: RMIConnectionImpl insufficient access control checks (JMX, 7198296)
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2017:0336
|
Red Hat Security Advisory: java-1.7.1-ibm security update
|
SSL/TLS: Birthday attack against 64-bit block ciphers (SWEET32) OpenJDK: incorrect ECDSA signature extraction from the DER input (Libraries, 8168714) OpenJDK: missing ObjectIdentifier length check (Libraries, 8168705) OpenJDK: DSA implementation timing attack (Libraries, 8168728) OpenJDK: ECDSA implementation timing attack (Libraries, 8168724) OpenJDK: incorrect URL parsing in URLStreamHandler (Networking, 8167223) OpenJDK: URLClassLoader insufficient access control checks (Networking, 8151934) OpenJDK: untrusted input deserialization in RMI registry and DCG (RMI, 8156802) OpenJDK: LdapLoginModule incorrect userDN extraction (JAAS, 8161743) OpenJDK: imageio PNGImageReader failed to honor ignoreMetadata for iTXt and zTXt chunks (2D, 8166988) JDK: unspecified vulnerability fixed in 6u141, 7u131, and 8u121 (Deployment) OpenJDK: integer overflow in SocketOutputStream boundary check (Networking, 8164147) OpenJDK: insufficient protected field access checks in atomic field updaters (Libraries, 8165344) OpenJDK: insecure class construction (Hotspot, 8167104)
|
[
"cpe:/a:redhat:rhel_extras:6",
"cpe:/a:redhat:rhel_extras:7"
] | null | null | 8.8 | null |
RHSA-2013:0641
|
Red Hat Security Advisory: tomcat5 security update
|
Web: Bypass of security constraints
|
[
"cpe:/a:redhat:jboss_enterprise_web_server:1::el5",
"cpe:/a:redhat:jboss_enterprise_web_server:1::el6"
] | null | null | null | null |
RHSA-2024:7260
|
Red Hat Security Advisory: net-snmp security update
|
net-snmp: A buffer overflow in the handling of the INDEX of NET-SNMP-VACM-MIB can cause an out-of-bounds memory access. net-snmp: Improper Input Validation when SETing malformed OIDs in master agent and subagent simultaneously net-snmp: A malformed OID in a SET request to SNMP-VIEW-BASED-ACM-MIB::vacmAccessTable can cause an out-of-bounds memory access net-snmp: A malformed OID in a SET request to NET-SNMP-AGENT-MIB::nsLogTable can cause a NULL pointer dereference net-snmp: A malformed OID in a GET-NEXT to the nsVacmAccessTable can cause a NULL pointer dereference. net-snmp: A malformed OID in a SET to the nsVacmAccessTable can cause a NULL pointer dereference.
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 5.9 | null | null |
RHSA-2024:0789
|
Red Hat Security Advisory: Red Hat Build of Apache Camel 4.0 for Quarkus 3.2 release (RHBQ 3.2.10.Final)
|
parsson: Denial of Service due to large number parsing santuario: Private Key disclosure in debug-log output ssh: Prefix truncation attack on Binary Packet Protocol (BPP) json-path: stack-based buffer overflow in Criteria.parse method
|
[
"cpe:/a:redhat:camel_quarkus:3"
] | null | 5.3 | null | null |
RHSA-2022:5472
|
Red Hat Security Advisory: firefox security update
|
Mozilla: Undesired attributes could be set as part of prototype pollution Mozilla: CSP bypass enabling stylesheet injection Mozilla: CSP sandbox header without `allow-scripts` can be bypassed via retargeted javascript: URI Mozilla: Use-after-free in nsSHistory Mozilla: Unavailable PAC file resulted in OCSP requests being blocked Mozilla: A popup window could be resized in a way to overlay the address bar with web content Mozilla: Potential integer overflow in ReplaceElementsAt Mozilla: Memory safety bugs fixed in Firefox 102 and Firefox ESR 91.11
|
[
"cpe:/a:redhat:rhel_eus:8.4::appstream"
] | null | 8.8 | 7.5 | null |
RHSA-2020:3219
|
Red Hat Security Advisory: kernel-rt security and bug fix update
|
kernel: lockdown: bypass through ACPI write via efivar_ssdt kernel: lockdown: bypass through ACPI write via acpi_configfs
|
[
"cpe:/a:redhat:enterprise_linux:8::nfv",
"cpe:/a:redhat:enterprise_linux:8::realtime"
] | null | 6.4 | null | null |
RHSA-2021:1476
|
Red Hat Security Advisory: bind security update
|
bind: An assertion check can fail while answering queries for DNAME records that require the DNAME to be processed to resolve itself
|
[
"cpe:/o:redhat:rhel_aus:7.2::server"
] | null | 7.5 | null | null |
RHSA-2022:5214
|
Red Hat Security Advisory: kpatch-patch security update
|
kernel: Small table perturb size in the TCP source port generation algorithm can lead to information leak kernel: netfilter: nf_tables: incorrect NFT_STATEFUL_EXPR check leads to a use-after-free (write) kernel: buffer overflow in IPsec ESP transformation code kernel: a use-after-free write in the netfilter subsystem can lead to privilege escalation to root
|
[
"cpe:/o:redhat:enterprise_linux:9::baseos"
] | null | 7.8 | null | null |
RHSA-2010:0044
|
Red Hat Security Advisory: pidgin security update
|
pidgin/libpurple: MSN custom smiley request directory traversal file disclosure
|
[
"cpe:/a:redhat:rhel_productivity:5",
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws",
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation"
] | null | null | null | null |
RHSA-2013:1369
|
Red Hat Security Advisory: jboss-remoting security update
|
Remoting: DoS by file descriptor exhaustion
|
[
"cpe:/a:redhat:jboss_enterprise_application_platform:5::el4",
"cpe:/a:redhat:jboss_enterprise_application_platform:5::el5",
"cpe:/a:redhat:jboss_enterprise_application_platform:5::el6"
] | null | null | null | null |
RHSA-2023:1811
|
Red Hat Security Advisory: thunderbird security update
|
Thunderbird: Revocation status of S/Mime recipient certificates was not checked Mozilla: Memory Corruption in Safe Browsing Code Mozilla: libwebp: Double-free in libwebp Mozilla: Matrix SDK bundled with Thunderbird vulnerable to denial-of-service attack Thunderbird: Hang when processing certain OpenPGP messages Mozilla: Fullscreen notification obscured Mozilla: Potential Memory Corruption following Garbage Collector compaction Mozilla: Invalid free from JavaScript code Mozilla: Content-Disposition filename truncation leads to Reflected File Download Mozilla: Files with malicious extensions could have been downloaded unsafely on Linux Mozilla: Incorrect optimization result on ARM64 Mozilla: Memory safety bugs fixed in Firefox 112 and Firefox ESR 102.10
|
[
"cpe:/a:redhat:rhel_eus:8.6::appstream"
] | null | 8.8 | null | null |
RHSA-2019:3201
|
Red Hat Security Advisory: Ansible security update
|
ansible: secrets disclosed on logs when no_log enabled ansible: Incomplete fix for CVE-2019-10206 ansible: sub parameters marked as no_log are not masked in certain failure scenarios
|
[
"cpe:/a:redhat:ansible_engine:2.6::el7"
] | null | 5 | 6.4 | null |
RHSA-2024:6913
|
Red Hat Security Advisory: golang security update
|
net/http: Denial of service due to improper 100-continue handling in net/http go/parser: golang: Calling any of the Parse functions containing deeply nested literals can cause a panic/stack exhaustion encoding/gob: golang: Calling Decoder.Decode on a message which contains deeply nested structures can cause a panic due to stack exhaustion go/build/constraint: golang: Calling Parse on a "// +build" build tag line with deeply nested expressions can cause a panic due to stack exhaustion
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 5.9 | null | null |
RHSA-2014:1087
|
Red Hat Security Advisory: Red Hat JBoss Web Server 2.1.0 update
|
tomcat: information disclosure via XXE when running untrusted web applications httpd: mod_deflate denial of service Tomcat/JBossWeb: XML parser hijack by malicious web application httpd: mod_status heap-based buffer overflow Tomcat/JBossWeb: request smuggling and limited DoS in ChunkedInputFilter httpd: mod_cgid denial of service
|
[
"cpe:/a:redhat:jboss_enterprise_web_server:2::el6"
] | null | null | null | null |
RHSA-2018:1663
|
Red Hat Security Advisory: qemu-kvm security update
|
hw: cpu: speculative store bypass
|
[
"cpe:/o:redhat:rhel_eus:7.4::computenode",
"cpe:/o:redhat:rhel_eus:7.4::server"
] | null | null | 5.6 | null |
RHSA-2023:1277
|
Red Hat Security Advisory: Red Hat OpenStack Platform (openstack-swift) security update
|
openstack-swift: Arbitrary file access through custom S3 XML entities
|
[
"cpe:/a:redhat:openstack:13::el7",
"cpe:/a:redhat:openstack:16.1::el8",
"cpe:/a:redhat:openstack:16.2::el8"
] | null | 7.7 | null | null |
RHSA-2022:0544
|
Red Hat Security Advisory: ruby:2.6 security update
|
rubygem-bundler: Dependencies of gems with explicit source may be installed from a different source rubygem-rdoc: Command injection vulnerability in RDoc ruby: FTP PASV command response can cause Net::FTP to connect to arbitrary host ruby: StartTLS stripping vulnerability in Net::IMAP ruby: Regular expression denial of service vulnerability of Date parsing methods ruby: Cookie prefix spoofing in CGI::Cookie.parse
|
[
"cpe:/a:redhat:rhel_eus:8.4::appstream"
] | null | 7.5 | null | null |
RHSA-2011:0375
|
Red Hat Security Advisory: seamonkey security update
|
Updated seamonkey packages that fix one security issue are now available
for Red Hat Enterprise Linux 4.
The Red Hat Security Response Team has rated this update as having
important security impact.
|
[
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2024:1959
|
Red Hat Security Advisory: shim security update
|
shim: Out-of-bounds read printing error messages shim: RCE in http boot support may lead to Secure Boot bypass shim: Interger overflow leads to heap buffer overflow in verify_sbat_section on 32-bits systems shim: Out-of-bounds read in verify_buffer_authenticode() malformed PE file shim: Out-of-bound read in verify_buffer_sbat() shim: out of bounds read when parsing MZ binaries
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 5.1 | null | null |
RHSA-2024:4747
|
Red Hat Security Advisory: edk2 security update
|
edk2: Temporary DoS vulnerability
|
[
"cpe:/a:redhat:rhel_eus:8.8::appstream"
] | null | 6 | null | null |
RHSA-2013:0243
|
Red Hat Security Advisory: flash-plugin security update
|
flash-plugin: multiple code execution flaws (APSB13-04) flash-plugin: multiple code execution flaws (APSB13-04)
|
[
"cpe:/a:redhat:rhel_extras:5::server",
"cpe:/a:redhat:rhel_extras:6"
] | null | null | null | null |
RHSA-2019:0230
|
Red Hat Security Advisory: polkit security update
|
polkit: Temporary auth hijacking via PID reuse and non-atomic fork
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 7.3 | null |
RHSA-2017:1264
|
Red Hat Security Advisory: kdelibs security update
|
kauth: service invoking dbus is not properly checked and allows local privilege escalation
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 7.8 | null |
RHSA-2013:1100
|
Red Hat Security Advisory: qemu-kvm security update
|
qemu: qemu-ga win32 service unquoted search path
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2003:206
|
Red Hat Security Advisory: : : : Updated nfs-utils packages fix denial of service vulnerability
|
security flaw
|
[
"cpe:/o:redhat:linux:7.1",
"cpe:/o:redhat:linux:7.2",
"cpe:/o:redhat:linux:7.3",
"cpe:/o:redhat:linux:8.0",
"cpe:/o:redhat:linux:9"
] | null | null | null | null |
RHSA-2014:0784
|
Red Hat Security Advisory: Red Hat JBoss Web Server 2.0.1 httpd security and bug fix update
|
httpd: mod_dav denial of service via crafted DAV WRITE request httpd: mod_log_config does not properly handle logging certain cookies resulting in DoS
|
[
"cpe:/a:redhat:jboss_enterprise_web_server:2.0.1"
] | null | null | null | null |
RHSA-2023:0288
|
Red Hat Security Advisory: firefox security update
|
Mozilla: libusrsctp library out of date Mozilla: Fullscreen notification bypass Mozilla: Arbitrary file read from GTK drag and drop on Linux Mozilla: Malicious command could be hidden in devtools output Mozilla: URL being dragged from cross-origin iframe into same tab triggers navigation Mozilla: Content Security Policy wasn't being correctly applied to WebSockets in WebWorkers Mozilla: Calls to <code>console.log</code> allowed bypasing Content Security Policy via format directive Mozilla: Memory safety bugs fixed in Firefox 109 and Firefox ESR 102.7
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 8.8 | null | null |
RHSA-2024:9945
|
Red Hat Security Advisory: haproxy security update
|
haproxy: untrimmed URI fragments may lead to exposure of confidential data on static servers
|
[
"cpe:/a:redhat:rhel_aus:8.2::appstream"
] | null | 5.3 | null | null |
RHSA-2019:1183
|
Red Hat Security Advisory: qemu-kvm security update
|
hardware: Microarchitectural Store Buffer Data Sampling (MSBDS) hardware: Micro-architectural Load Port Data Sampling - Information Leak (MLPDS) hardware: Microarchitectural Fill Buffer Data Sampling (MFBDS) hardware: Microarchitectural Data Sampling Uncacheable Memory (MDSUM)
|
[
"cpe:/o:redhat:rhel_eus:7.5::computenode",
"cpe:/o:redhat:rhel_eus:7.5::server"
] | null | null | 3.8 | null |
RHSA-2024:4421
|
Red Hat Security Advisory: python39:3.9 and python39-devel:3.9 security update
|
pypa-setuptools: Regular Expression Denial of Service (ReDoS) in package_index.py
|
[
"cpe:/a:redhat:rhel_eus:8.8::appstream",
"cpe:/a:redhat:rhel_eus:8.8::crb"
] | null | 5.9 | null | null |
RHSA-2024:9885
|
Red Hat Security Advisory: Red Hat Trusted Profile Analyzer 1.2.0
|
path-to-regexp: Backtracking regular expressions cause ReDoS body-parser: Denial of Service Vulnerability in body-parser
|
[
"cpe:/a:redhat:trusted_profile_analyzer:1.2::el9"
] | null | 7.5 | null | null |
RHSA-2020:4206
|
Red Hat Security Advisory: chromium-browser security update
|
chromium-browser: Out of bounds read in storage chromium-browser: Insufficient policy enforcement in extensions chromium-browser: Insufficient policy enforcement in serial chromium-browser: Insufficient policy enforcement in extensions chromium-browser: Insufficient data validation in media chromium-browser: Out of bounds write in V8 chromium-browser: Insufficient policy enforcement in extensions
|
[
"cpe:/a:redhat:rhel_extras:6"
] | null | 6.5 | null | null |
RHSA-2012:1401
|
Red Hat Security Advisory: kernel security and bug fix update
|
kernel: sfc: potential remote denial of service through TCP MSS option
|
[
"cpe:/o:redhat:rhel_eus:6.2::server"
] | null | null | null | null |
RHSA-2023:7715
|
Red Hat Security Advisory: webkit2gtk3 security update
|
webkitgtk: Arbitrary Remote Code Execution
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 8.8 | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.