id
stringlengths 13
15
| title
stringlengths 29
176
| description
stringlengths 8
32.1k
| cpes
listlengths 0
20
| cvss_v4_0
null | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
null |
---|---|---|---|---|---|---|---|
RHSA-2023:6632
|
Red Hat Security Advisory: shadow-utils security and bug fix update
|
shadow-utils: possible password leak during passwd(1) change
|
[
"cpe:/a:redhat:enterprise_linux:9::crb",
"cpe:/o:redhat:enterprise_linux:9::baseos"
] | null | 4.7 | null | null |
RHSA-2013:1475
|
Red Hat Security Advisory: postgresql and postgresql84 security update
|
postgresql: array indexing error in enum_recv() postgresql: Improper randomization of pgcrypto functions (requiring random seed)
|
[
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server",
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2020:5316
|
Red Hat Security Advisory: rh-postgresql10-postgresql security update
|
postgresql: Reconnection can downgrade connection security settings postgresql: Multiple features escape "security restricted operation" sandbox postgresql: psql's \gset allows overwriting specially treated variables
|
[
"cpe:/a:redhat:rhel_software_collections:3::el7"
] | null | 7.5 | null | null |
RHSA-2023:3150
|
Red Hat Security Advisory: thunderbird security update
|
Mozilla: Browser prompts could have been obscured by popups Mozilla: Crash in RLBox Expat driver Mozilla: Potential permissions request bypass via clickjacking Mozilla: Content process crash due to invalid wasm code Mozilla: Potential spoof due to obscured address bar Mozilla: Potential memory corruption in FileReader::DoReadData() Mozilla: Memory safety bugs fixed in Firefox 113 and Firefox ESR 102.11
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 8.8 | null | null |
RHSA-2023:3263
|
Red Hat Security Advisory: git security update
|
git: by feeding specially crafted input to `git apply --reject`, a path outside the working tree can be overwritten with partially controlled contents git: arbitrary configuration injection when renaming or deleting a section from a configuration file
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 7.8 | null | null |
RHSA-2010:0586
|
Red Hat Security Advisory: java-1.4.2-ibm-sap security update
|
OpenJDK Policy/PolicyFile leak dynamic ProtectionDomains. (6633872) OpenJDK File TOCTOU deserialization vulnerability (6736390) JDK unspecified vulnerability in JWS/Plugin component OpenJDK Inflater/Deflater clone issues (6745393) JDK unspecified vulnerability in JavaWS/Plugin component OpenJDK Unsigned applet can retrieve the dragged information before drop action occurs(6887703) OpenJDK Subclasses of InetAddress may incorrectly interpret network addresses (6893954) JDK multiple unspecified vulnerabilities OpenJDK Applet Trusted Methods Chaining Privilege Escalation Vulnerability (6904691) OpenJDK JPEGImageReader stepX Integer Overflow Vulnerability (6909597) JDK multiple unspecified vulnerabilities JDK multiple unspecified vulnerabilities JDK multiple unspecified vulnerabilities JDK unspecified vulnerability in ImageIO component OpenJDK ImagingLib arbitrary code execution vulnerability (6914866) OpenJDK AWT Library Invalid Index Vulnerability (6914823) JDK unspecified vulnerability in Java2D component
|
[
"cpe:/a:redhat:rhel_extras_sap:4",
"cpe:/a:redhat:rhel_extras_sap:5"
] | null | null | null | null |
RHSA-2011:1167
|
Red Hat Security Advisory: seamonkey security update
|
Mozilla: Miscellaneous memory safety hazards Mozilla: Private data leakage using RegExp.input
|
[
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2022:1000
|
Red Hat Security Advisory: Red Hat OpenStack Platform 16.2 (numpy) security update
|
numpy: buffer overflow in the PyArray_NewFromDescr_int() in ctors.c numpy: buffer overflow in the array_from_pyobj() in fortranobject.c
|
[
"cpe:/a:redhat:openstack:16.2::el8"
] | null | 5.5 | null | null |
RHSA-2020:4751
|
Red Hat Security Advisory: httpd:2.4 security, bug fix, and enhancement update
|
httpd: mod_http2: DoS via slow, unneeded request bodies httpd: mod_http2: read-after-free on a string compare httpd: mod_http2: possible crash on late upgrade httpd: memory corruption on early pushes httpd: read-after-free in h2 connection shutdown httpd: limited cross-site scripting in mod_proxy error page httpd: null-pointer dereference in mod_remoteip httpd: mod_rewrite potential open redirect httpd: mod_rewrite configurations vulnerable to open redirect httpd: mod_proxy_ftp use of uninitialized value
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 3.7 | 3.7 | null |
RHSA-2020:5572
|
Red Hat Security Advisory: python-django-horizon security update
|
python-django-horizon: dashboard allows open redirect
|
[
"cpe:/a:redhat:openstack:13::el7"
] | null | 6.1 | null | null |
RHSA-2020:4000
|
Red Hat Security Advisory: libvirt security and bug fix update
|
libvirt: Potential DoS by holding a monitor job while querying QEMU guest-agent libvirt: Potential denial of service via active pool without target path
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 6.5 | null | null |
RHSA-2018:0022
|
Red Hat Security Advisory: kernel security update
|
hw: cpu: speculative execution branch target injection hw: cpu: speculative execution bounds-check bypass hw: cpu: speculative execution permission faults handling
|
[
"cpe:/o:redhat:rhel_aus:6.5::server"
] | null | null | 5.5 | null |
RHSA-2010:0567
|
Red Hat Security Advisory: lvm2-cluster security update
|
lvm2-cluster: insecurity when communicating between lvm2 and clvmd
|
[
"cpe:/a:redhat:rhel_cluster_storage:5"
] | null | null | null | null |
RHSA-2019:1294
|
Red Hat Security Advisory: bind security update
|
bind: Limiting simultaneous TCP clients is ineffective
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 8.6 | null |
RHSA-2018:1609
|
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform security update
|
jboss: jbossas: unsafe chown of server.log in jboss init script allows privilege escalation jboss: jbossas writable config files allow privilege escalation
|
[
"cpe:/a:redhat:jboss_enterprise_application_platform:5::el5",
"cpe:/a:redhat:jboss_enterprise_application_platform:5::el6"
] | null | null | 7.8 | null |
RHSA-2014:0367
|
Red Hat Security Advisory: openstack-swift security update
|
Swift: TempURL timing attack
|
[
"cpe:/a:redhat:openstack:3::el6"
] | null | null | null | null |
RHSA-2024:1872
|
Red Hat Security Advisory: mod_http2 security update
|
httpd: CONTINUATION frames DoS
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 7.5 | null | null |
RHSA-2020:1511
|
Red Hat Security Advisory: git security update
|
git: Crafted URL containing new lines can cause credential leak
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 7.5 | null | null |
RHSA-2016:2938
|
Red Hat Security Advisory: Red Hat JBoss BRMS security update
|
Workbench: Path traversal vulnerability
|
[
"cpe:/a:redhat:jboss_enterprise_brms_platform:6.3"
] | null | null | 6.5 | null |
RHSA-2013:1302
|
Red Hat Security Advisory: xinetd security and bug fix update
|
xinetd: enables unintentional services over tcpmux port
|
[
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2019:2327
|
Red Hat Security Advisory: mariadb security and bug fix update
|
mysql: MyISAM unspecified vulnerability (CPU Jul 2018) mysql: Server: Security: Privileges unspecified vulnerability (CPU Jul 2018) mysql: Server: Options unspecified vulnerability (CPU Jul 2018) mysql: Client programs unspecified vulnerability (CPU Jul 2018) mysql: Server: Storage Engines unspecified vulnerability (CPU Oct 2018) mysql: Server: Connection Handling unspecified vulnerability (CPU Jan 2019) mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2019) mysql: Server: Replication unspecified vulnerability (CPU Apr 2019) mysql: Server: Security: Privileges unspecified vulnerability (CPU Apr 2019) mysql: C API unspecified vulnerability (CPU Jul 2020) mysql: C API unspecified vulnerability (CPU Jan 2021)
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 5.9 | 4.9 | null |
RHSA-2024:1492
|
Red Hat Security Advisory: thunderbird security update
|
nss: timing attack against RSA decryption Mozilla: Crash in NSS TLS method Mozilla: Leaking of encrypted email subjects to other conversations Mozilla: JIT code failed to save return registers on Armv7-A Mozilla: Integer overflow could have led to out of bounds write Mozilla: Improper handling of html and body tags enabled CSP nonce leakage Mozilla: Clickjacking vulnerability could have led to a user accidentally granting permissions Mozilla: Self referencing object could have potentially led to a use-after-free Mozilla: Memory safety bugs fixed in Firefox 124, Firefox ESR 115.9, and Thunderbird 115.9
|
[
"cpe:/a:redhat:rhel_eus:9.2::appstream"
] | null | 7.5 | null | null |
RHSA-2024:0786
|
Red Hat Security Advisory: nss security update
|
nss: vulnerable to Minerva side-channel information leak
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 4.3 | null | null |
RHSA-2023:5628
|
Red Hat Security Advisory: kernel security and bug fix update
|
kernel: netfilter: NULL pointer dereference in nf_tables due to zeroed list head kernel: save/restore speculative MSRs during S3 suspend/resume kernel: net/sched: cls_u32 component reference counter leak if tcf_change_indev() fails kernel: net/sched: cls_fw component can be exploited as result of failure in tcf_change_indev function kernel: net/sched: Use-after-free vulnerabilities in the net/sched classifiers: cls_fw, cls_u32 and cls_route
|
[
"cpe:/o:redhat:rhel_aus:8.4::baseos",
"cpe:/o:redhat:rhel_e4s:8.4::baseos",
"cpe:/o:redhat:rhel_tus:8.4::baseos"
] | null | 7.8 | null | null |
RHSA-2015:0093
|
Red Hat Security Advisory: chromium-browser security update
|
ICU: regexp engine missing look-behind expression range check chromium-browser: use-after-free in IndexedDB chromium-browser: use-after-free in WebAudio ICU: regexp engine incorrect handling of a zero length quantifier chromium-browser: memory corruption in V8 chromium-browser: memory corruption in V8 chromium-browser: use-after-free in DOM chromium-browser: use-after-free in DOM chromium-browser: memory corruption in V8 chromium-browser: use-after-free in DOM chromium-browser: use-after-free in FFmpeg chromium-browser: use-after-free in DOM chromium-browser: use-after-free in Speech chromium-browser: use-after-free in Views chromium-browser: use-after-free in FFmpeg chromium-browser: memory corruption in Fonts chromium-browser: same-origin-bypass in V8 ICU: uninitialized value use in the collation component chromium-browser: out-of-bounds read in UI chromium-browser: uninitialized-value in Fonts chromium-browser: out-of-bounds read in Skia chromium-browser: out-of-bounds read in PDFium chromium-browser: out-of-bounds read in PDFium chromium-browser: out-of-bounds read in Fonts chromium-browser: out-of-bounds read in PDFium chromium-browser: caching error in AppCache icu: insufficient size limit checks in regular expression compiler chromium-browser: multiple unspecified vulnerabilities chromium-browser: unspecified vulnerability in Google V8
|
[
"cpe:/a:redhat:rhel_extras:6"
] | null | null | null | null |
RHSA-2024:0950
|
Red Hat Security Advisory: postgresql:15 security update
|
postgresql: non-owner 'REFRESH MATERIALIZED VIEW CONCURRENTLY' executes arbitrary SQL
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 8 | null | null |
RHSA-2024:4848
|
Red Hat Security Advisory: OpenShift Container Platform 4.13.46 security update
|
gorilla/schema: Potential memory exhaustion attack due to sparse slice deserialization
|
[
"cpe:/a:redhat:openshift:4.13::el8",
"cpe:/a:redhat:openshift:4.13::el9"
] | null | 7.5 | null | null |
RHSA-2015:2509
|
Red Hat Security Advisory: java-1.8.0-ibm security update
|
OpenJDK: kerberos realm name leak (JGSS, 8048030) OpenJDK: inefficient use of hash tables and lists during XML parsing (JAXP, 8068842) OpenJDK: missing checks for proper initialization in ObjectStreamClass (Serialization, 8103671) OpenJDK: HttpURLConnection header restriction bypass (Libraries, 8130193) JDK: unspecified vulnerability fixed in 7u91 and 8u65 (Deployment) OpenJDK: insufficient permission checks in StubGenerator (CORBA, 8076383) OpenJDK: OOB access in CMS code (2D, 8086092) OpenJDK: leak of user.dir location (JAXP, 8078427) OpenJDK: java.nio Buffers integer overflow issues (Libraries, 8130891) ICU: missing boundary checks in layout engine (OpenJDK 2D, 8132042) OpenJDK: incorrect access control context used in DGCImpl (RMI, 8080688) OpenJDK: protected methods can be used as interface methods via DirectMethodHandle (Libraries) OpenJDK: incomplete constraints enforcement by AlgorithmChecker (Security, 8131291) OpenJDK: incorrect String object deserialization in IIOPInputStream (CORBA, 8076387) OpenJDK: incorrect access control context used in DGCClient (RMI, 8076413) OpenJDK: incomplete MaxXMLNameLimit enforcement (JAXP, 8086733) JDK: unspecified vulnerability fixed in 6u105, 7u91 and 8u65 (Deployment) OpenJDK: insufficient proxy class checks in RemoteObjectInvocationHandler (RMI, 8076339) JDK: local disclosure of kerberos credentials cache
|
[
"cpe:/a:redhat:rhel_extras:7"
] | null | null | null | null |
RHSA-2022:8067
|
Red Hat Security Advisory: httpd security, bug fix, and enhancement update
|
httpd: mod_lua: Use of uninitialized value of in r:parsebody httpd: core: Possible buffer overflow with very large or unlimited LimitXMLRequestBody httpd: mod_sed: Read/write beyond bounds httpd: mod_proxy_ajp: Possible request smuggling httpd: Out-of-bounds read via ap_rwrite() httpd: Out-of-bounds read in ap_strcmp_match() httpd: mod_lua: DoS in r:parsebody httpd: mod_sed: DoS vulnerability httpd: mod_lua: Information disclosure with websockets httpd: mod_proxy: X-Forwarded-For dropped by hop-by-hop mechanism
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 7.3 | null | null |
RHSA-2024:1681
|
Red Hat Security Advisory: OpenShift Container Platform 4.14.20 bug fix and security update
|
golang: net/http, x/net/http2: unlimited number of CONTINUATION frames causes DoS
|
[
"cpe:/a:redhat:openshift:4.14::el8",
"cpe:/a:redhat:openshift:4.14::el9"
] | null | 7.5 | null | null |
RHSA-2024:3352
|
Red Hat Security Advisory: Red Hat OpenStack Platform 16.2 (etcd) security update
|
golang: html/template: improper handling of HTML-like comments within script contexts golang: html/template: improper handling of special tags within script contexts golang: crypto/tls: panic when processing post-handshake message on QUIC connections golang: crypto/tls: lack of a limit on buffered post-handshake golang: net/http/internal: Denial of Service (DoS) via Resource Consumption via HTTP requests golang: net/http, x/net/http2: unlimited number of CONTINUATION frames causes DoS golang-fips/openssl: Memory leaks in code encrypting and decrypting RSA payloads etcd: Incomplete fix for CVE-2022-41723 in OpenStack Platform etcd: Incomplete fix for CVE-2021-44716 in OpenStack Platform etcd: Incomplete fix for CVE-2023-39325/CVE-2023-44487 in OpenStack Platform
|
[
"cpe:/a:redhat:openstack:16.2::el8"
] | null | 7.5 | null | null |
RHSA-2024:0957
|
Red Hat Security Advisory: thunderbird security update
|
Mozilla: Out-of-bounds memory read in networking channels Mozilla: Alert dialog could have been spoofed on another site Mozilla: Fullscreen Notification could have been hidden by select element Mozilla: Custom cursor could obscure the permission dialog Mozilla: Mouse cursor re-positioned unexpectedly could have led to unintended permission grants Mozilla: Multipart HTTP Responses would accept the Set-Cookie header in response parts Mozilla: Incorrect code generation on 32-bit ARM devices Mozilla: Memory safety bugs fixed in Firefox 123, Firefox ESR 115.8, and Thunderbird 115.8
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 7.5 | null | null |
RHSA-2024:6595
|
Red Hat Security Advisory: java-1.8.0-ibm security update
|
ibm-java: Race condition may cause Denial of Service
|
[
"cpe:/a:redhat:enterprise_linux:8::supplementary"
] | null | 5.9 | null | null |
RHSA-2025:0167
|
Red Hat Security Advisory: thunderbird security update
|
firefox: thunderbird: WebChannel APIs susceptible to confused deputy attack firefox: thunderbird: Use-after-free when breaking lines in text firefox: Alt-Svc ALPN validation failure when redirected firefox: Compartment mismatch when parsing JavaScript JSON module firefox: Memory corruption when using JavaScript Text Segmentation firefox: thunderbird: Memory safety bugs fixed in Firefox 134, Thunderbird 134, Firefox ESR 115.19, Firefox ESR 128.6, Thunderbird 115.19, and Thunderbird 128.6 firefox: thunderbird: Memory safety bugs fixed in Firefox 134, Thunderbird 134, Firefox ESR 128.6, and Thunderbird 128.6
|
[
"cpe:/a:redhat:rhel_eus:9.2::appstream"
] | null | 7.5 | null | null |
RHSA-2023:4384
|
Red Hat Security Advisory: openssh security update
|
openssh: Remote code execution in ssh-agent PKCS#11 support
|
[
"cpe:/a:redhat:rhel_aus:8.2::appstream",
"cpe:/a:redhat:rhel_e4s:8.2::appstream",
"cpe:/a:redhat:rhel_tus:8.2::appstream",
"cpe:/o:redhat:rhel_aus:8.2::baseos",
"cpe:/o:redhat:rhel_e4s:8.2::baseos",
"cpe:/o:redhat:rhel_tus:8.2::baseos"
] | null | 9.8 | null | null |
RHSA-2010:0565
|
Red Hat Security Advisory: w3m security update
|
w3m: doesn't handle NULL in Common Name properly
|
[
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2022:9111
|
Red Hat Security Advisory: OpenShift Container Platform 4.9.54 bug fix and security update
|
go-getter: command injection vulnerability go-getter: unsafe download (issue 1 of 3) go-getter: unsafe download (issue 2 of 3) go-getter: unsafe download (issue 3 of 3)
|
[
"cpe:/a:redhat:openshift:4.9::el8"
] | null | 8.6 | null | null |
RHSA-2016:1763
|
Red Hat Security Advisory: qemu-kvm-rhev security update
|
Qemu: block: iscsi: buffer overflow in iscsi_aio_ioctl Qemu: virtio: unbounded memory allocation on host via guest leading to DoS
|
[
"cpe:/a:redhat:openstack:9::el7"
] | null | null | 3.4 | null |
RHSA-2014:1032
|
Red Hat Security Advisory: redhat-ds-base security update
|
389-ds: unauthenticated information disclosure
|
[
"cpe:/a:redhat:directory_server:8::el5"
] | null | null | null | null |
RHSA-2019:3889
|
Red Hat Security Advisory: kernel security update
|
hw: Intel GPU blitter manipulation can allow for arbitrary kernel memory write
|
[
"cpe:/o:redhat:rhel_eus:7.5::computenode",
"cpe:/o:redhat:rhel_eus:7.5::server"
] | null | null | 8.8 | null |
RHSA-2024:4429
|
Red Hat Security Advisory: containernetworking-plugins security update
|
golang: crypto/tls: Timing Side Channel attack in RSA based TLS key exchanges.
|
[
"cpe:/a:redhat:rhel_eus:9.2::appstream"
] | null | 7.5 | null | null |
RHSA-2024:0979
|
Red Hat Security Advisory: linux-firmware security update
|
hw: amd: INVD instruction may lead to a loss of SEV-ES guest machine memory integrity problem
|
[
"cpe:/o:redhat:rhel_aus:7.7::server"
] | null | 5.3 | null | null |
RHSA-2004:612
|
Red Hat Security Advisory: XFree86 security update
|
openmotif21 stack overflows in libxpm
|
[
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws"
] | null | null | null | null |
RHSA-2015:1230
|
Red Hat Security Advisory: java-1.7.0-openjdk security update
|
OpenJDK: deserialization issue in ObjectInputStream.readSerialData() (Libraries, 8076401) OpenJDK: non-constant time comparisons in crypto code (JCE, 8074865) OpenJDK: incorrect code permission checks in RMIConnectionImpl (JMX, 8075853) OpenJDK: name for reverse DNS lookup used in certificate identity check (JSSE, 8067694) OpenJDK: IIOPInputStream type confusion vulnerability (CORBA, 8076376) ICU: integer overflow in LETableReference verifyLength() (OpenJDK 2D, 8077520) SSL/TLS: "Invariance Weakness" vulnerability in RC4 stream cipher LOGJAM: TLS connections which support export grade DHE key-exchange are vulnerable to MITM attacks OpenJDK: improper permission checks in MBeanServerInvocationHandler (JMX, 8076397) OpenJDK: insufficient context checks during object deserialization (Libraries, 8076405) OpenJDK: RemoteObjectInvocationHandler allows calling finalize() (RMI, 8076409) OpenJDK: incorrect OCSP nextUpdate checking (Libraries, 8075374) OpenJDK: DnsClient fails to release request information after error (JNDI, 8075378) ICU: missing boundary checks in layout engine (OpenJDK 2D, 8071715)
|
[
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | 3.7 | null |
RHSA-2005:366
|
Red Hat Security Advisory: kernel security update
|
security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw
|
[
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2008:0980
|
Red Hat Security Advisory: flash-plugin security update
|
Flash movie can determine whether a TCP port is open Flash Player cross-domain and cross-site scripting flaws flash: clipboard hijack attack flash-plugin: upload/download user interaction Adobe Flash Player clickjacking Flash Player XSS Flash Player DNS rebind attack jar: protocol handler Flash Player policy file interpretation flaw Flash Player HTML injection flaw security flaw security flaw security flaw security flaw
|
[
"cpe:/a:redhat:rhel_extras:3",
"cpe:/a:redhat:rhel_extras:4"
] | null | null | null | null |
RHSA-2003:182
|
Red Hat Security Advisory: ghostscript security update
|
security flaw
|
[
"cpe:/o:redhat:enterprise_linux:2.1::as",
"cpe:/o:redhat:enterprise_linux:2.1::aw",
"cpe:/o:redhat:enterprise_linux:2.1::es",
"cpe:/o:redhat:enterprise_linux:2.1::ws"
] | null | null | null | null |
RHSA-2021:1225
|
Red Hat Security Advisory: OpenShift Container Platform 4.7.8 security and bug fix update
|
gogo/protobuf: plugin/unmarshal/unmarshal.go lacks certain index validation
|
[
"cpe:/a:redhat:openshift:4.7::el8"
] | null | 8.6 | null | null |
RHSA-2011:1794
|
Red Hat Security Advisory: Red Hat Network Satellite server security update
|
satellite: XSS flaw in custom system information key handling
|
[
"cpe:/a:redhat:network_satellite:5.4::el5",
"cpe:/a:redhat:network_satellite:5.4::el6"
] | null | null | null | null |
RHSA-2018:1658
|
Red Hat Security Advisory: qemu-kvm security update
|
hw: cpu: speculative store bypass
|
[
"cpe:/o:redhat:rhel_aus:6.6::server",
"cpe:/o:redhat:rhel_tus:6.6::server"
] | null | null | 5.6 | null |
RHSA-2024:4727
|
Red Hat Security Advisory: Advanced Virtualization 8.2.1z security update
|
qemu-kvm: 'qemu-img info' leads to host file read/write
|
[
"cpe:/a:redhat:advanced_virtualization:8.2::el8"
] | null | 7.8 | null | null |
RHSA-2023:1392
|
Red Hat Security Advisory: OpenShift Container Platform 4.10.55 security update
|
mongo-go-driver: specific cstrings input may not be properly validated
|
[
"cpe:/a:redhat:openshift:4.10::el8"
] | null | 6.5 | null | null |
RHSA-2021:2292
|
Red Hat Security Advisory: container-tools:2.0 security update
|
runc: vulnerable to symlink exchange attack
|
[
"cpe:/a:redhat:rhel_eus:8.2::appstream"
] | null | 7.5 | null | null |
RHSA-2005:017
|
Red Hat Security Advisory: kernel security update
|
security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw
|
[
"cpe:/o:redhat:enterprise_linux:2.1::as",
"cpe:/o:redhat:enterprise_linux:2.1::aw"
] | null | null | null | null |
RHSA-2024:1786
|
Red Hat Security Advisory: httpd:2.4/mod_http2 security update
|
httpd: CONTINUATION frames DoS
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 7.5 | null | null |
RHSA-2024:1515
|
Red Hat Security Advisory: squid security and bug fix update
|
squid: Denial of Service in HTTP Chunked Decoding
|
[
"cpe:/a:redhat:rhel_eus:9.2::appstream"
] | null | 8.6 | null | null |
RHSA-2008:0100
|
Red Hat Security Advisory: java-1.4.2-bea security update
|
Integer overflow in the embedded ICC profile image parser in Sun Java Development Kit BMP image parser vulnerability Java Secure Socket Extension Does Not Correctly Process SSL/TLS Handshake Requests Resulting in a Denial of Service (DoS) Condition java: Vulnerability in the font parsing code Security Vulnerability in Java Runtime Environment With Applet Caching Untrusted Application or Applet May Move or Copy Arbitrary Files Applets or Applications are allowed to display an oversized window Anti-DNS Pinning and Java Applets with HTTP proxy
|
[
"cpe:/a:redhat:rhel_extras:3",
"cpe:/a:redhat:rhel_extras:5::client",
"cpe:/a:redhat:rhel_extras:5::server"
] | null | null | null | null |
RHSA-2017:0217
|
Red Hat Security Advisory: kernel security and bug fix update
|
kernel: pipe: limit the per-user amount of pages allocated in pipes kernel: Use-after-free in the recvmmsg exit path
|
[
"cpe:/o:redhat:rhel_eus:7.2::computenode",
"cpe:/o:redhat:rhel_eus:7.2::server"
] | null | null | 8.1 | null |
RHSA-2015:1499
|
Red Hat Security Advisory: chromium-browser security update
|
ICU: Uninitialized memory read fixed in Chrome 44.0.2403.89 chromium-browser: Heap-buffer-overflow in pdfium chromium-browser: Use-after-free related to unexpected GPU process termination in unspecified chromium-browser: Heap-buffer-overflow in pdfium. chromium-browser: Settings allowed executable files to run immediately after download in unsepcified chromium-browser: Use-after-free in IndexedDB. chromium-browser: Use-after-free in accessibility. chromium-browser: URL spoofing using pdf files in unspecified chromium-browser: Heap-buffer-overflow in pdfium. chromium-browser: Memory corruption in skia chromium-browser: CSP bypass in unspecified component chromium-browser: Use-after-free in pdfium. chromium-browser: Heap-buffer-overflow in expat. chromium-browser: Use-after-free in blink. chromium-browser: Information leak in XSS auditor. chromium-browser: UXSS in blink. chromium-browser: SOP bypass with CSS in unspecified chromium-browser: Spell checking dictionaries fetched over HTTP in unspecified chromium-browser: Various fixes from internal audits, fuzzing and other initiatives chromium-browser: v8 denial of service
|
[
"cpe:/a:redhat:rhel_extras:6"
] | null | null | null | null |
RHSA-2015:0661
|
Red Hat Security Advisory: qpid-cpp security and bug fix update
|
qpid-cpp: 3 qpidd DoS issues in AMQP 0-10 protocol handling qpid-cpp: anonymous access to qpidd cannot be prevented qpid-cpp: AMQP 0-10 protocol sequence-set maximal range DoS (incomplete CVE-2015-0203 fix)
|
[
"cpe:/a:redhat:enterprise_mrg:2:computenode:el6",
"cpe:/a:redhat:enterprise_mrg:2:server:el6"
] | null | null | null | null |
RHSA-2025:1135
|
Red Hat Security Advisory: firefox security update
|
firefox: thunderbird: Use-after-free in XSLT firefox: thunderbird: Use-after-free in Custom Highlight firefox: thunderbird: A bug in WebAssembly code generation could result in a crash firefox: thunderbird: Use-after-free during concurrent delazification firefox: thunderbird: Potential opening of private browsing tabs in normal browsing windows firefox: thunderbird: Certificate length was not properly checked firefox: thunderbird: Memory safety bugs fixed in Firefox 135, Thunderbird 135, Firefox ESR 115.20, Firefox ESR 128.7, Thunderbird 115.20, and Thunderbird 128.7 firefox: thunderbird: Memory safety bugs fixed in Firefox 135, Thunderbird 135, Firefox ESR 128.7, and Thunderbird 128.7
|
[
"cpe:/a:redhat:rhel_aus:8.4::appstream",
"cpe:/a:redhat:rhel_e4s:8.4::appstream",
"cpe:/a:redhat:rhel_tus:8.4::appstream"
] | null | 8.8 | null | null |
RHSA-2020:3461
|
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.3.2 security update
|
hibernate: SQL injection issue in Hibernate ORM EAP: field-name is not parsed in accordance to RFC7230 Wildfly: Improper authorization issue in WildFlySecurityManager when using alternative protection domain jackson-databind: mishandles the interaction between serialization gadgets and typing which could result in remote command execution jackson-databind: mishandles the interaction between serialization gadgets and typing which could result in remote command execution dom4j: XML External Entity vulnerability in default SAX parser Undertow: Incomplete fix for CVE-2017-2666 due to permitting invalid characters in HTTP requests hibernate-validator: Improper input validation in the interpolation of constraint error messages wildfly-elytron: session fixation when using FORM authentication wildfly: exposed setting of TCCL via the EmbeddedManagedProcess API wildfly: unsafe deserialization in Wildfly Enterprise Java Beans netty: compression/decompression codecs don't enforce limits on buffer allocation sizes wildfly: Some EJB transaction objects may get accumulated causing Denial of Service wildfly: EJB SessionOpenInvocations may not be removed properly after a response is received causing Denial of Service
|
[
"cpe:/a:redhat:jboss_enterprise_application_platform:7.3::el6"
] | null | 6.5 | 4.8 | null |
RHSA-2024:3625
|
Red Hat Security Advisory: libxml2 security update
|
libxml2: use-after-free in XMLReader
|
[
"cpe:/a:redhat:rhel_eus:9.2::appstream",
"cpe:/o:redhat:rhel_eus:9.2::baseos"
] | null | 7.5 | null | null |
RHSA-2020:1324
|
Red Hat Security Advisory: python-django security update
|
Django: Incorrect HTTP detection with reverse-proxy connecting via HTTPS Django: backtracking in a regular expression in django.utils.text.Truncator leads to DoS Django: the behavior of the underlying HTMLParser leading to DoS Django: SQL injection possibility in key and index lookups for JSONField/HStoreField Django: Potential memory exhaustion in django.utils.encoding.uri_to_iri()
|
[
"cpe:/a:redhat:openstack:15::el8"
] | null | null | 5.3 | null |
RHSA-2024:3385
|
Red Hat Security Advisory: Red Hat JBoss EAP 7.4.14 XP 4.0.2.GA security release
|
okio: GzipSource class improper exception handling jetty-server: OutOfMemoryError for large multipart without filename read via request.getParameter() jetty-server: Cookie parsing of quoted values can exfiltrate values from other cookies
|
[
"cpe:/a:redhat:jbosseapxp"
] | null | 5.3 | null | null |
RHSA-2022:6370
|
Red Hat Security Advisory: Red Hat Advanced Cluster Management 2.6.0 security updates and bug fixes
|
golang: net/http: improper sanitization of Transfer-Encoding header golang: go/parser: stack exhaustion in all Parse* functions golang: encoding/xml: stack exhaustion in Decoder.Skip golang: crypto/tls: session tickets lack random ticket_age_add golang: io/fs: stack exhaustion in Glob golang: compress/gzip: stack exhaustion in Reader.Read golang: path/filepath: stack exhaustion in Glob golang: encoding/xml: stack exhaustion in Unmarshal golang: encoding/gob: stack exhaustion in Decoder.Decode moment: inefficient parsing algorithm resulting in DoS golang: net/http/httputil: NewSingleHostReverseProxy - omit X-Forwarded-For not working
|
[
"cpe:/a:redhat:acm:2.6::el8"
] | null | 6.5 | null | null |
RHSA-2004:651
|
Red Hat Security Advisory: imlib security update
|
security flaw security flaw
|
[
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws"
] | null | null | null | null |
RHSA-2013:1137
|
Red Hat Security Advisory: ruby193-ruby security update
|
ruby: hostname check bypassing vulnerability in SSL client
|
[
"cpe:/a:redhat:openshift:1.2::el6"
] | null | null | null | null |
RHSA-2024:2169
|
Red Hat Security Advisory: xorg-x11-server security update
|
xorg-x11-server: Out-of-bounds write in XIChangeDeviceProperty/RRChangeOutputProperty xorg-x11-server: Use-after-free bug in DestroyWindow xorg-x11-server: out-of-bounds memory reads/writes in XKB button actions xorg-x11-server: out-of-bounds memory read in RRChangeOutputProperty and RRChangeProviderProperty xorg-x11-server: Heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer xorg-x11-server: reattaching to different master device may lead to out-of-bounds memory access xorg-x11-server: SELinux unlabeled GLX PBuffer xorg-x11-server: SELinux context corruption xorg-x11-server: heap buffer overflow in XISendDeviceHierarchyEvent xorg-x11-server: heap buffer overflow in DisableDevice
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::crb"
] | null | 7.8 | null | null |
RHSA-2017:0286
|
Red Hat Security Advisory: openssl security update
|
SSL/TLS: Malformed plain-text ALERT packets could cause remote DoS openssl: Truncated packet could crash via OOB read
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation",
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 5.9 | null |
RHSA-2018:3410
|
Red Hat Security Advisory: xorg-x11-server security update
|
xorg-x11-server: Incorrect permission check in Xorg X server allows for privilege escalation
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 6.6 | null |
RHSA-2004:448
|
Red Hat Security Advisory: krb5 security update
|
security flaw security flaw security flaw
|
[
"cpe:/o:redhat:enterprise_linux:2.1::as",
"cpe:/o:redhat:enterprise_linux:2.1::aw",
"cpe:/o:redhat:enterprise_linux:2.1::es",
"cpe:/o:redhat:enterprise_linux:2.1::ws"
] | null | null | null | null |
RHSA-2020:2345
|
Red Hat Security Advisory: bind security update
|
bind: BIND does not sufficiently limit the number of fetches performed when processing referrals bind: A logic error in code which checks TSIG validity can be used to trigger an assertion failure in tsig.c
|
[
"cpe:/a:redhat:rhel_eus:8.1::appstream",
"cpe:/o:redhat:rhel_eus:8.1::baseos"
] | null | 7.5 | null | null |
RHSA-2018:1353
|
Red Hat Security Advisory: kernel security update
|
Kernel: error in exception handling leads to DoS
|
[
"cpe:/o:redhat:rhel_els:5"
] | null | null | 6.5 | null |
RHSA-2021:1468
|
Red Hat Security Advisory: bind security update
|
bind: An assertion check can fail while answering queries for DNAME records that require the DNAME to be processed to resolve itself
|
[
"cpe:/o:redhat:rhel_els:6"
] | null | 7.5 | null | null |
RHSA-2020:2813
|
Red Hat Security Advisory: Red Hat Single Sign-On 7.4.1 security update
|
keycloak: verify-token-audience support is missing in the NodeJS adapter keycloak: Lack of checks in ObjectInputStream leading to Remote Code Execution jackson-databind: Lacks certain xbean-reflect/JNDI blocking jackson-databind: Serialization gadgets in shaded-hikari-config jackson-databind: Serialization gadgets in ibatis-sqlmap jackson-databind: Serialization gadgets in anteros-core undertow: invalid HTTP request with large chunk size keycloak: top-level navigations to data URLs resulting in XSS are possible (incomplete fix of CVE-2020-1697) jackson-databind: Serialization gadgets in javax.swing.JEditorPane jquery: Cross-site scripting due to improper injQuery.htmlPrefilter method jquery: Untrusted code execution via <option> tag in HTML passed to DOM manipulation methods
|
[
"cpe:/a:redhat:jboss_single_sign_on:7.4"
] | null | 6.1 | 7.5 | null |
RHSA-2022:4667
|
Red Hat Security Advisory: OpenShift Virtualization 4.10.1 RPMs security and bug fix update
|
prometheus/client_golang: Denial of service using InstrumentHandlerCounter
|
[
"cpe:/a:redhat:container_native_virtualization:4.10::el7",
"cpe:/a:redhat:container_native_virtualization:4.10::el8"
] | null | 7.5 | null | null |
RHSA-2012:1166
|
Red Hat Security Advisory: mod_cluster security update
|
mod_cluster registers and exposes the root context of a server by default, despite ROOT being in the excluded-contexts list
|
[
"cpe:/a:redhat:jboss_enterprise_web_server:1::el5",
"cpe:/a:redhat:jboss_enterprise_web_server:1::el6"
] | null | null | null | null |
RHSA-2021:2461
|
Red Hat Security Advisory: Red Hat Advanced Cluster Management 2.2.4 security and bug fix update
|
redis: integer overflow when configurable limit for maximum supported bulk input size is too big on 32-bit platforms nodejs-is-svg: ReDoS via malicious string nodejs-netmask: improper input validation of octal input data
|
[
"cpe:/a:redhat:acm:2.2::el7",
"cpe:/a:redhat:acm:2.2::el8"
] | null | 9.1 | null | null |
RHSA-2024:5258
|
Red Hat Security Advisory: container-tools:rhel8 security update
|
golang: net/http: golang: mime/multipart: golang: net/textproto: memory exhaustion in Request.ParseMultipartForm golang-fips/openssl: Memory leaks in code encrypting and decrypting RSA payloads containers/image: digest type does not guarantee valid type go-retryablehttp: url might write sensitive information to log file golang: crypto/x509: Verify panics on certificates with an unknown public key algorithm golang: net/mail: comments in display names are incorrectly handled golang: archive/zip: Incorrect handling of certain ZIP files gorilla/schema: Potential memory exhaustion attack due to sparse slice deserialization
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 7.5 | null | null |
RHSA-2023:4506
|
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform security update
|
jackson-databind: Possible DoS if using JDK serialization to serialize JsonNode jettison: Uncontrolled Recursion in JSONArray undertow: OutOfMemoryError due to @MultipartConfig handling
|
[
"cpe:/a:redhat:jboss_enterprise_application_platform:7.4::el8"
] | null | 7.5 | null | null |
RHSA-2024:10984
|
Red Hat Security Advisory: ruby:3.1 security update
|
rexml: REXML ReDoS vulnerability
|
[
"cpe:/a:redhat:rhel_eus:9.4::appstream"
] | null | 7.5 | null | null |
RHSA-2015:1154
|
Red Hat Security Advisory: libreswan security, bug fix and enhancement update
|
libreswan: crafted IKE packet causes daemon restart
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | null | null |
RHSA-2020:1180
|
Red Hat Security Advisory: ImageMagick security, bug fix, and enhancement update
|
ImageMagick: memory leak vulnerability in ReadXWDImage function in coders/xwd.c ImageMagick: memory exhaustion in function ReadTIFFImage causing denial of service ImageMagick: memory exhaustion in function format8BIM causing denial of service ImageMagick: memory leak in ReadPCDImage function in coders/pcd.c ImageMagick: assertion failure in MogrifyImageList function in MagickWand/mogrify.c ImageMagick: memory leak in WriteGIFImage function in coders/gif.c ImageMagick: infinite loop in ReadMIFFImage function in coders/miff.c ImageMagick: infinite loop ReadTXTImage in function in coders/txt.c ImageMagick: CPU exhaustion vulnerability in function ReadDDSInfo in coders/dds.c ImageMagick: double free in WriteEPTImage function in coders/ept.c ImageMagick: excessive iteration in the DecodeLabImage and EncodeLabImage functions in coders/tiff.c ImageMagick: Infinite loop in coders/png.c:ReadOneMNGImage() allows attackers to cause a denial of service via crafted MNG file ImageMagick: Memory leak in WriteTIFFImage ImageMagick: Memory leak in ReadYCBCRImage ImageMagick: memory leak in ReadDCMImage function in coders/dcm.c ImageMagick: out of bounds write in ReadBMPImage and WriteBMPImage in coders/bmp.c ImageMagick: out of bounds write ReadDIBImage and WriteDIBImage in coders/dib.c ImageMagick: memory leak in the XMagickCommand function in MagickCore/animate.c ImageMagick: memory leak for a colormap in WriteMPCImage in coders/mpc.c ImageMagick: memory leak in DecodeImage in coders/pcd.c ImageMagick: memory leak in ReadMIFFImage in coders/miff.c ImageMagick: memory leak in parse8BIM in coders/meta.c ImageMagick: CPU Exhaustion via crafted input file ImageMagick: NULL pointer dereference in CheckEventLogging function in MagickCore/log.c ImageMagick: memory leak in ReadOneJNGImage function in coders/png.c ImageMagick: out-of-bounds write in InsertRow function in coders/cut.c ImageMagick: missing check for fputc function in multiple files ImageMagick: improper check for length in ReadDCMImage of coders/dcm.c and ReadPICTImage of coders/pict.c ImageMagick: Out-of-memory ReadBMPImage of coders/bmp.c and ReadDIBImage of codes/dib.c ImageMagick: reachable assertion in ReadOneJNGImage in coders/png.c ImageMagick: Memory leak in the formatIPTCfromBuffer function in coders/meta.c ImageMagick: memory leak in WritePDBImage in coders/pdb.c ImageMagick: memory leak in ReadBGRImage in coders/bgr.c. ImageMagick: memory leak in WritePCXImage in coders/pcx.c ImageMagick: infinite loop in the ReadBMPImage function of the coders/bmp.c ImageMagick: memory leak in WriteMSLImage of coders/msl.c ImageMagick: infinite loop in coders/bmp.c imagemagick: memory leak in function DecodeImage in coders/pcd.c ImageMagick: Memory leak in the WritePDFImage function in coders/pdf.c ImageMagick: Memory leak in the WriteDIBImage function in coders/dib.c imagemagick: stack-based buffer overflow in function PopHexPixel in coders/ps.c ImageMagick: off-by-one read in formatIPTCfromBuffer function in coders/meta.c ImageMagick: heap-based buffer over-read in WriteTIFFImage of coders/tiff.c leads to denial of service or information disclosure via crafted image file ImageMagick: denial of service in cineon parsing component ImageMagick: denial of service in ReadXWDImage in coders/xwd.c in the XWD image parsing component ImageMagick: heap-based buffer over-read in the function WriteTIFFImage of coders/tiff.c leading to DoS or information disclosure ImageMagick: heap-based buffer over-read in the function WritePNMImage of coders/pnm.c leading to DoS or information disclosure imagemagick: null-pointer dereference in function ReadPANGOImage in coders/pango.c and ReadVIDImage in coders/vid.c causing denial of service imagemagick: memory leak vulnerability in function WriteDPXImage in coders/dpx.c imagemagick: memory leak vulnerability in function ReadPCLImage in coders/pcl.c imagemagick: use of uninitialized value in function ReadPANGOImage in coders/pango.c imagemagick: use of uninitialized value in functionSyncImageSettings in MagickCore/image.c ImageMagick: a memory leak vulnerability in the function ReadBMPImage in coders/bmp.c ImageMagick: a memory leak vulnerability in the function ReadVIFFImage in coders/viff.c ImageMagick: a "use of uninitialized value" vulnerability in the function ReadCUTImage leading to a crash and DoS ImageMagick: heap-based buffer over-read at MagickCore/threshold.c in AdaptiveThresholdImage because a width of zero is mishandled ImageMagick: heap-based buffer over-read at MagickCore/threshold.c in AdaptiveThresholdImage because a height of zero is mishandled ImageMagick: heap-based buffer overflow at MagickCore/statistic.c in EvaluateImages because of mishandling columns ImageMagick: memory leaks in AcquireMagickMemory ImageMagick: stack-based buffer overflow at coders/pnm.c in WritePNMImage because of a misplaced assignment ImageMagick: stack-based buffer overflow at coders/pnm.c in WritePNMImage because of a misplaced strncpy and an off-by-one error ImageMagick: stack-based buffer overflow at coders/pnm.c in WritePNMImage because of off-by-one errors ImageMagick: heap-based buffer overflow at MagickCore/statistic.c in EvaluateImages because of mishandling rows ImageMagick: memory leaks at AcquireMagickMemory due to mishandling the NoSuchImage error in CLIListOperatorImages ImageMagick: memory leaks at AcquireMagickMemory because of an error in MagickWand/mogrify.c ImageMagick: memory leaks at AcquireMagickMemory because of a wand/mogrify.c error ImageMagick: division by zero in RemoveDuplicateLayers in MagickCore/layer.c ImageMagick: use-after-free in magick/blob.c resulting in a denial of service ImageMagick: division by zero in MeanShiftImage in MagickCore/feature.c ImageMagick: out-of-bounds read in ReadXWDImage in coders/xwd.c ImageMagick: Use after free in ReadMATImage in coders/mat.c ImageMagick: heap-based buffer overflow in WriteTIFFImage in coders/tiff.c ImageMagick: memory leak in magick/xwindow.c ImageMagick: memory leak in coders/dps.c ImageMagick: memory leak in coders/dot.c ImageMagick: memory leak in Huffman2DEncodeImage in coders/ps2.c ImageMagick: memory leak in Huffman2DEncodeImage in coders/ps3.c ImageMagick: memory leak in coders/dot.c ImageMagick: heap-based buffer overflow in ReadPSInfo in coders/ps.c ImageMagick: Use after free in ReadICCProfile function in coders/jpeg.c ImageMagick: heap-based buffer overflow in WriteSGIImage in coders/sgi.c ImageMagick: heap-based buffer over-read in WritePNGImage in coders/png.c
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 3.3 | 7.8 | null |
RHSA-2018:2887
|
Red Hat Security Advisory: qemu-kvm-rhev security update
|
QEMU: slirp: heap buffer overflow while reassembling fragmented datagrams
|
[
"cpe:/o:redhat:enterprise_linux:7::hypervisor"
] | null | null | 5.1 | null |
RHSA-2017:0352
|
Red Hat Security Advisory: qemu-kvm security update
|
Qemu: display: cirrus: potential arbitrary code execution via cirrus_bitblt_cputovideo
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | 5.5 | null |
RHSA-2019:1209
|
Red Hat Security Advisory: redhat-virtualization-host security update
|
hardware: Microarchitectural Store Buffer Data Sampling (MSBDS) hardware: Micro-architectural Load Port Data Sampling - Information Leak (MLPDS) hardware: Microarchitectural Fill Buffer Data Sampling (MFBDS) hardware: Microarchitectural Data Sampling Uncacheable Memory (MDSUM)
|
[
"cpe:/o:redhat:enterprise_linux:7::hypervisor"
] | null | null | 3.8 | null |
RHSA-2022:7090
|
Red Hat Security Advisory: libksba security update
|
libksba: integer overflow may lead to remote code execution
|
[
"cpe:/a:redhat:enterprise_linux:9::crb",
"cpe:/o:redhat:enterprise_linux:9::baseos"
] | null | 8.6 | null | null |
RHSA-2024:4411
|
Red Hat Security Advisory: booth security update
|
booth: specially crafted hash can lead to invalid HMAC being accepted by Booth server
|
[
"cpe:/a:redhat:rhel_e4s:9.0::highavailability",
"cpe:/a:redhat:rhel_e4s:9.0::resilientstorage"
] | null | 5.9 | null | null |
RHSA-2017:0495
|
Red Hat Security Advisory: Red Hat Gluster Storage 3.2.0 samba security, bug fixes and enhancement update
|
samba: Unconditional privilege delegation to Kerberos servers in trusted realms samba: Flaws in Kerberos PAC validation can trigger privilege elevation
|
[
"cpe:/a:redhat:storage:3.2:samba:el7"
] | null | null | 3.5 | null |
RHSA-2023:0049
|
Red Hat Security Advisory: grub2 security update
|
grub2: Buffer overflow in grub_font_construct_glyph() can lead to out-of-bound write and possible secure boot bypass grub2: Heap based out-of-bounds write when redering certain unicode sequences
|
[
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 7.1 | null | null |
RHBA-2019:1076
|
Red Hat Bug Fix Advisory: ovirt-engine-api-explorer bug fix and enhancement update for RHV 4.3
|
bootstrap: XSS in the data-target attribute bootstrap: XSS in the tooltip data-viewport attribute bootstrap: XSS in the affix configuration target property
|
[
"cpe:/a:redhat:rhev_manager:4.3"
] | null | null | 6.1 | null |
RHSA-2017:3193
|
Red Hat Security Advisory: httpd security update
|
httpd: ap_get_basic_auth_pw() authentication bypass httpd: mod_ssl NULL pointer dereference httpd: ap_find_token() buffer overread httpd: mod_mime buffer overread httpd: Uninitialized memory reflection in mod_auth_digest httpd: Use-after-free by limiting unregistered HTTP method (Optionsbleed)
|
[
"cpe:/o:redhat:rhel_eus:7.2::computenode",
"cpe:/o:redhat:rhel_eus:7.2::server"
] | null | null | 5.9 | null |
RHSA-2019:3193
|
Red Hat Security Advisory: firefox security update
|
Mozilla: Use-after-free when creating index updates in IndexedDB Mozilla: Potentially exploitable crash due to 360 Total Security Mozilla: Stack buffer overflow in HKDF output Mozilla: Stack buffer overflow in WebRTC networking Mozilla: Unintended access to a privileged JSONView object Mozilla: document.domain-based origin isolation has same-origin-property violation Mozilla: Incorrect HTML parsing results in XSS bypass technique Mozilla: Memory safety bugs fixed in Firefox 70 and Firefox ESR 68.2 expat: heap-based buffer over-read via crafted XML input
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 6.1 | 7.5 | null |
RHSA-2020:1300
|
Red Hat Security Advisory: qemu-kvm-rhev security update
|
QEMU: block: iscsi: OOB heap access via an unexpected response of iSCSI Server QEMU: slirp: OOB buffer access while emulating tcp protocols in tcp_emu() QEMU: Slirp: potential OOB access due to unsafe snprintf() usages
|
[
"cpe:/a:redhat:openstack:10::el7"
] | null | 5.6 | null | null |
RHSA-2022:7185
|
Red Hat Security Advisory: device-mapper-multipath security update
|
device-mapper-multipath: Authorization bypass, multipathd daemon listens for client connections on an abstract Unix socket
|
[
"cpe:/a:redhat:enterprise_linux:9::crb",
"cpe:/o:redhat:enterprise_linux:9::baseos"
] | null | 7.8 | null | null |
RHSA-2005:806
|
Red Hat Security Advisory: cpio security update
|
security flaw security flaw
|
[
"cpe:/o:redhat:enterprise_linux:2.1::as",
"cpe:/o:redhat:enterprise_linux:2.1::aw",
"cpe:/o:redhat:enterprise_linux:2.1::es",
"cpe:/o:redhat:enterprise_linux:2.1::ws"
] | null | null | null | null |
RHSA-2024:7164
|
Red Hat Security Advisory: Migration Toolkit for Containers (MTC) 1.8.4 security and bug fix update
|
github.com/gin-contrib/cors: Gin mishandles a wildcard in the origin string in github.com/gin-contrib/cors golang: net/http, x/net/http2: unlimited number of CONTINUATION frames causes DoS golang: net/http/cookiejar: incorrect forwarding of sensitive headers and cookies on HTTP redirect containers/image: digest type does not guarantee valid type braces: fails to limit the number of characters it can handle golang: net: malformed DNS message can cause infinite loop jose-go: improper handling of highly compressed data follow-redirects: Possible credential leak node-tar: denial of service while parsing a tar file due to lack of folders depth validation moby: external DNS requests from 'internal' networks could lead to data exfiltration express: cause malformed URLs to be evaluated webpack-dev-middleware: lack of URL validation may lead to file leak axios: axios: Server-Side Request Forgery
|
[
"cpe:/a:redhat:rhmt:1.8::el8"
] | null | 7.5 | null | null |
RHSA-2025:3623
|
Red Hat Security Advisory: firefox security update
|
firefox: thunderbird: Use-after-free triggered by XSLTProcessor firefox: thunderbird: URL Bar Spoofing via non-BMP Unicode characters firefox: thunderbird: Memory safety bugs fixed in Firefox 137, Thunderbird 137, Firefox ESR 128.9, and Thunderbird 128.9
|
[
"cpe:/a:redhat:rhel_aus:8.2::appstream"
] | null | 8.8 | null | null |
RHSA-2022:1975
|
Red Hat Security Advisory: kernel-rt security and bug fix update
|
kernel: avoid cyclic entity chains due to malformed USB descriptors kernel: integer overflow in k_ascii() in drivers/tty/vt/keyboard.c kernel: use-after-free in nouveau kernel module kernel: out-of-bounds read in bpf_skb_change_head() of filter.c due to a use-after-free kernel: joydev: zero size passed to joydev_handle_JSIOCSBTNMAP() kernel: reading /proc/sysvipc/shm does not scale with large shared memory segment counts kernel: out-of-bound Read in qrtr_endpoint_post in net/qrtr/qrtr.c kernel: crypto: ccp - fix resource leaks in ccp_run_aes_gcm_cmd() kernel: possible use-after-free in bluetooth module kernel: unaccounted ipc objects in Linux kernel lead to breaking memcg limits and DoS attacks kernel: DoS in ccp_run_aes_gcm_cmd() function kernel: sctp: Invalid chunks may be used to remotely remove existing associations kernel: lack of port sanity checking in natd and netfilter leads to exploit of OpenVPN clients kernel: stack information leak in infiniband RDMA kernel: possible leak or coruption of data residing on hugetlbfs kernel: security regression for CVE-2018-13405 kernel: fget: check that the fd still exists after getting a ref to it kernel: KVM: SVM: out-of-bounds read/write in sev_es_string_io kernel: Buffer overwrite in decode_nfs_fh function kernel: cgroup: Use open-time creds and namespace for migration perm checks kernel: Race condition in races in sk_peer_pid and sk_peer_cred accesses kernel: new DNS Cache Poisoning Attack based on ICMP fragment needed packets replies hw: cpu: LFENCE/JMP Mitigation Update for CVE-2017-5715 kernel: Local privilege escalation due to incorrect BPF JIT branch displacement computation kernel: use-after-free in hso_free_net_device() in drivers/net/usb/hso.c kernel: eBPF multiplication integer overflow in prealloc_elems_and_freelist() in kernel/bpf/stackmap.c leads to out-of-bounds write kernel: Heap buffer overflow in firedtv driver kernel: an array-index-out-bounds in detach_capi_ctr in drivers/isdn/capi/kcapi.c kernel: mwifiex_usb_recv() in drivers/net/wireless/marvell/mwifiex/usb.c allows an attacker to cause DoS via crafted USB device kernel: use-after-free in the TEE subsystem kernel: information leak in the IPv6 implementation kernel: information leak in the IPv4 implementation kernel: dm: fix mempool NULL pointer race when completing IO kernel: tcp: fix page frag corruption on page fault kernel: ethtool: ioctl: fix potential NULL deref in ethtool_set_coalesce() kernel: mptcp: fix deadlock in __mptcp_push_pending() kernel: RDMA/irdma: Fix a user-after-free in add_pble_prm hw: cpu: intel: Branch History Injection (BHI) hw: cpu: intel: Intra-Mode BTI kernel: Local denial of service in bond_ipsec_add_sa kernel: DoS in sctp_addto_chunk in net/sctp/sm_make_chunk.c kernel: information leak in copy_page_to_iter() in iov_iter.c kernel: FUSE allows UAF reads of write() buffers, allowing theft of (partial) /etc/shadow hashes kernel: RDMA/uverbs: NULL pointer dereference in uapi_finalize() kernel: sfc_ef100: NULL pointer dereference in ef100_update_stats() kernel: drm/amdkfd: NULL pointer dereference in kfd_parse_subtype_iolink() kernel: Copy_from_user on 64-bit versions may leak kernel information kernel: IPv6: panic in fib6_rule_suppress when fib6_rule_lookup fails
|
[
"cpe:/a:redhat:enterprise_linux:8::nfv",
"cpe:/a:redhat:enterprise_linux:8::realtime"
] | null | 5.9 | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.