id
stringlengths 13
15
| title
stringlengths 29
176
| description
stringlengths 8
32.1k
| cpes
listlengths 0
20
| cvss_v4_0
null | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
null |
---|---|---|---|---|---|---|---|
RHSA-2020:1544
|
Red Hat Security Advisory: Ansible security and bug fix update (2.7.17)
|
ansible: insecure temporary directory when running become_user from become directive ansible: path injection on dest parameter in fetch module ansible: Extract-Zip function in win_unzip module does not check extracted path ansible: svn module leaks password when specified as a parameter ansible: secrets readable after ansible-vault edit ansible: Information disclosure issue in ldap_attr and ldap_entry modules Ansible: code injection when using ansible_facts as a subkey Ansible: modules which use files encrypted with vault are not properly cleaned up
|
[
"cpe:/a:redhat:ansible_engine:2.7::el7"
] | null | 5 | null | null |
RHSA-2019:1792
|
Red Hat Security Advisory: keepalived security update
|
keepalived: Heap-based buffer overflow when parsing HTTP status codes allows for denial of service or possibly arbitrary code execution
|
[
"cpe:/o:redhat:rhel_eus:7.5::server"
] | null | null | 8.1 | null |
RHSA-2022:0790
|
Red Hat Security Advisory: Satellite 6.10.3 Async Bug Fix Update
|
Satellite: Allow unintended SCA certificate to authenticate Candlepin
|
[
"cpe:/a:redhat:satellite:6.10::el7",
"cpe:/a:redhat:satellite_capsule:6.10::el7"
] | null | 5.5 | null | null |
RHSA-2005:106
|
Red Hat Security Advisory: openssh security update
|
security flaw
|
[
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws"
] | null | null | null | null |
RHSA-2020:2593
|
Red Hat Security Advisory: OpenShift Container Platform 4.2.36 python-psutil security update
|
python-psutil: Double free because of refcount mishandling
|
[
"cpe:/a:redhat:openshift:4.2::el7"
] | null | null | 7 | null |
RHSA-2020:1636
|
Red Hat Security Advisory: libsndfile security update
|
libsndfile: stack-based buffer overflow in sndfile-deinterleave utility libsndfile: buffer over-read in the function i2alaw_array in alaw.c
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb"
] | null | null | 3.3 | null |
RHSA-2016:0525
|
Red Hat Security Advisory: chromium-browser security update
|
chromium-browser: out-of-bounds read in V8 chromium-browser: use-after-free in Navigation chromium-browser: use-after-free in Extensions chromium-browser: buffer overflow in libANGLE chromium-browser: various fixes from internal audits chromium-browser: multiple unspecified vulnerabilities
|
[
"cpe:/a:redhat:rhel_extras:6"
] | null | null | null | null |
RHSA-2011:0464
|
Red Hat Security Advisory: kdelibs security update
|
kdelibs: SSL certificate for IP address accepted as valid for hosts that resolve to the IP kdelibs: partially universal XSS in Konqueror error pages
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2009:1540
|
Red Hat Security Advisory: kernel-rt security, bug fix, and enhancement update
|
kernel: personality: fix PER_CLEAR_ON_SETID kernel: /proc/$pid/maps visible during initial setuid ELF loading kernel: SELinux and mmap_min_addr kernel: md: NULL pointer deref when accessing suspend_* sysfs attributes kernel: x86_64 32 bit process register leak kernel: numerous getname() infoleaks kernel: tc: uninitialised kernel memory leak kernel: fs: pipe.c null pointer dereference kernel: tcf_fill_node() infoleak due to typo in 9ef1d4c7 kernel: flood ping cause out-of-iommu error and panic when mtu larger than 1500 kernel: r128 IOCTL NULL pointer dereferences when CCE state is uninitialised kernel: AF_UNIX: Fix deadlock on connecting to shutdown socket
|
[
"cpe:/a:redhat:enterprise_mrg:1::el5"
] | null | null | null | null |
RHSA-2019:1518
|
Red Hat Security Advisory: java-11-openjdk security update
|
OpenJDK: Slow conversion of BigDecimal to long (Libraries, 8211936) OpenJDK: Incorrect skeleton selection in RMI registry server-side dispatch handling (RMI, 8218453)
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | null | 5.9 | null |
RHSA-2022:1939
|
Red Hat Security Advisory: squid:4 security and bug fix update
|
squid: out-of-bounds read in WCCP protocol data may lead to information disclosure
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 5.3 | null | null |
RHSA-2009:1278
|
Red Hat Security Advisory: lftp security and bug fix update
|
lftp mirror --script does not escape names and targets of symbolic links
|
[
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2024:1310
|
Red Hat Security Advisory: .NET 8.0 security update
|
dotnet: DoS in .NET Core / YARP HTTP / 2 WebSocket support
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::crb"
] | null | 7.5 | null | null |
RHSA-2017:2553
|
Red Hat Security Advisory: openvswitch security update
|
openvswitch: Integer underflow in the ofputil_pull_queue_get_config_reply10 function openvswitch: Invalid processing of a malicious OpenFlow role status message openvswitch: Buffer over-read while parsing the group mod OpenFlow message
|
[
"cpe:/a:redhat:openstack:9::el7"
] | null | null | 5.6 | null |
RHSA-2004:463
|
Red Hat Security Advisory: httpd security update
|
security flaw security flaw security flaw security flaw
|
[
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws"
] | null | null | null | null |
RHSA-2020:2432
|
Red Hat Security Advisory: microcode_ctl security, bug fix and enhancement update
|
hw: Special Register Buffer Data Sampling (SRBDS) hw: Vector Register Data Sampling hw: L1D Cache Eviction Sampling
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 6.5 | 6.5 | null |
RHSA-2024:1555
|
Red Hat Security Advisory: .NET 6.0 security update
|
dotnet: Denial of Service in X509Certificate2
|
[
"cpe:/a:redhat:rhel_eus:9.2::appstream",
"cpe:/a:redhat:rhel_eus:9.2::crb"
] | null | 7.5 | null | null |
RHSA-2022:0524
|
Red Hat Security Advisory: Red Hat JBoss Web Server 3.1 Service Pack 14 Security Update
|
log4j: Remote code execution in Log4j 1.x when application is configured to use JMSAppender log4j: Remote code execution in Log4j 1.x when application is configured to use JMSSink log4j: SQL injection in Log4j 1.x when application is configured to use JDBCAppender log4j: Unsafe deserialization flaw in Chainsaw log viewer
|
[
"cpe:/a:redhat:jboss_enterprise_web_server:3.1::el7"
] | null | 8.8 | null | null |
RHSA-2020:1037
|
Red Hat Security Advisory: advancecomp security update
|
advancecomp: integer overflow in png_compress in pngex.cc
|
[
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 5.3 | null |
RHSA-2025:3438
|
Red Hat Security Advisory: ACS 4.7 enhancement and security update
|
golang.org/x/crypto/ssh: Denial of Service in the Key Exchange of golang.org/x/crypto/ssh go-jose: Go JOSE's Parsing Vulnerable to Denial of Service
|
[
"cpe:/a:redhat:advanced_cluster_security:4.7::el8"
] | null | 7.5 | null | null |
RHSA-2024:5524
|
Red Hat Security Advisory: bind security update
|
bind: bind9: BIND's database will be slow if a very large number of RRs exist at the same nam bind9: bind: SIG(0) can be used to exhaust CPU resources
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 7.5 | null | null |
RHSA-2020:2827
|
Red Hat Security Advisory: firefox security update
|
Mozilla: Memory corruption due to missing sign-extension for ValueTags on ARM64 Mozilla: Information disclosure due to manipulated URL object Mozilla: Use-after-free in nsGlobalWindowInner Mozilla: Use-After-Free when trying to connect to a STUN server Mozilla: Add-On updates did not respect the same certificate trust rules as software updates
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 8.8 | 6.1 | null |
RHSA-2011:1338
|
Red Hat Security Advisory: NetworkManager security update
|
NetworkManager: Console user can escalate to root via newlines in ifcfg-rh connection name
|
[
"cpe:/o:redhat:enterprise_linux:6::server"
] | null | null | null | null |
RHSA-2014:0432
|
Red Hat Security Advisory: kernel security and bug fix update
|
kernel: net: sctp: null pointer dereference when processing authenticated cookie_echo chunk
|
[
"cpe:/o:redhat:rhel_eus:6.4::computenode",
"cpe:/o:redhat:rhel_eus:6.4::server"
] | null | null | null | null |
RHSA-2021:1540
|
Red Hat Security Advisory: Red Hat OpenShift Service Mesh 1.1.14 security update
|
envoyproxy/envoy: HTTP request with escaped slash characters can bypass Envoy's authorization mechanisms istio/istio: HTTP request with escaped slash characters can bypass authorization mechanisms
|
[
"cpe:/a:redhat:service_mesh:1.1::el8"
] | null | 8.1 | null | null |
RHSA-2024:1676
|
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.4.16 Security update
|
undertow: unrestricted request storage leads to memory exhaustion undertow: Cookie Smuggling/Spoofing ssh: Prefix truncation attack on Binary Packet Protocol (BPP) undertow: directory traversal vulnerability undertow: Out-of-memory Error after several closed connections with wildfly-http-client protocol
|
[
"cpe:/a:redhat:jboss_enterprise_application_platform:7.4::el9"
] | null | 7.5 | null | null |
RHSA-2021:1245
|
Red Hat Security Advisory: gnutls and nettle security update
|
nettle: Out of bounds memory access in signature verification
|
[
"cpe:/a:redhat:rhel_eus:8.1::appstream",
"cpe:/o:redhat:rhel_eus:8.1::baseos"
] | null | 8.1 | null | null |
RHSA-2015:0696
|
Red Hat Security Advisory: freetype security update
|
freetype: off-by-one buffer over-read in tt_face_load_hdmx() freetype: buffer over-read and integer underflow in tt_face_load_kern() freetype: missing ENDCHAR NULL pointer dereference in the _bdf_parse_glyphs() freetype: out of bounds read in Type42 font parser freetype: out-of-bounds read in tt_cmap4_validate() freetype: off-by-one buffer over-read in parse_charstrings() / t42_parse_charstrings() freetype: integer overflow in tt_face_load_font_dir() leading to out-of-bounds read freetype: multiple integer overflows leading to buffer over-reads in cmap handling freetype: integer overflow in pcf_get_encodings() leading to NULL pointer dereference freetype: integer overflow in pcf_get_properties() leading to NULL pointer dereference freetype: integer signedness error in Mac_Read_POST_Resource() leading to heap-based buffer overflow freetype: multiple integer overflows Mac_Read_POST_Resource() leading to heap-based buffer overflows freetype: information leak in _bdf_add_property()
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation",
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | null | null |
RHSA-2024:8723
|
Red Hat Security Advisory: firefox security update
|
firefox: thunderbird: Permission leak via embed or object elements firefox: thunderbird: Use-after-free in layout with accessibility firefox: thunderbird: Confusing display of origin for external protocol handler prompt firefox: thunderbird: XSS due to Content-Disposition being ignored in multipart/x-mixed-replace response firefox: thunderbird: Origin of permission prompt could be spoofed by long URL firefox: thunderbird: Cross origin video frame leak firefox: thunderbird: History interface could have been used to cause a Denial of Service condition in the browser firefox: thunderbird: Clipboard "paste" button persisted across tabs firefox: DOM push subscription message could hang Firefox firefox: thunderbird: Memory safety bugs fixed in Firefox 132, Thunderbird 132, Firefox ESR 128.4, and Thunderbird 128.4
|
[
"cpe:/a:redhat:rhel_aus:8.4::appstream",
"cpe:/a:redhat:rhel_e4s:8.4::appstream",
"cpe:/a:redhat:rhel_tus:8.4::appstream"
] | null | 8.8 | null | null |
RHSA-2002:119
|
Red Hat Security Advisory: bind security update
|
security flaw security flaw
|
[
"cpe:/o:redhat:enterprise_linux:2.1::as"
] | null | null | null | null |
RHSA-2016:0707
|
Red Hat Security Advisory: chromium-browser security update
|
chromium-browser: out-of-bounds write in blink chromium-browser: memory corruption in cross-process frames chromium-browser: use-after-free in extensions chromium-browser: use-after-free in blink's v8 bindings chromium-browser: address bar spoofing chromium-browser: information leak in v8 chromium-browser: various fixes from internal audits
|
[
"cpe:/a:redhat:rhel_extras:6"
] | null | null | null | null |
RHSA-2023:3821
|
Red Hat Security Advisory: ruby:2.7 security, bug fix, and enhancement update
|
ruby/cgi-gem: HTTP response splitting in CGI ruby: ReDoS vulnerability in URI ruby: ReDoS vulnerability in Time
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 5.3 | null | null |
RHSA-2008:0164
|
Red Hat Security Advisory: krb5 security and bugfix update
|
krb5: use-after-free in gssapi lib krb5: double free in gssapi lib krb5: uninitialized pointer use in krb5kdc krb5: possible leak of sensitive data from krb5kdc using krb4 request krb5: file descriptor array overflow in RPC library
|
[
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2008:0607
|
Red Hat Security Advisory: kernel security and bug fix update
|
kernel: sit memory leak
|
[
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2024:4894
|
Red Hat Security Advisory: thunderbird security update
|
Mozilla: Race condition in permission assignment Mozilla: Memory corruption in NSS Mozilla: Memory corruption in thread creation Mozilla: Memory safety bugs fixed in Firefox 128, Firefox ESR 115.13, and Thunderbird 115.13
|
[
"cpe:/a:redhat:rhel_aus:8.6::appstream",
"cpe:/a:redhat:rhel_e4s:8.6::appstream",
"cpe:/a:redhat:rhel_tus:8.6::appstream"
] | null | 7.5 | null | null |
RHSA-2019:0985
|
Red Hat Security Advisory: mod_auth_mellon security update
|
mod_auth_mellon: authentication bypass in ECP flow
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | null | 8.1 | null |
RHSA-2021:5137
|
Red Hat Security Advisory: Openshift Logging Security Release (5.0.10)
|
log4j-core: Remote code execution in Log4j 2.x when logs contain an attacker-controlled string value log4j-core: DoS in log4j 2.x with thread context message pattern and context lookup pattern (incomplete fix for CVE-2021-44228)
|
[
"cpe:/a:redhat:logging:5.0::el8"
] | null | 8.1 | null | null |
RHBA-2023:2451
|
Red Hat Bug Fix Advisory: virtio-win bug fix and enhancement update
|
QEMU: local privilege escalation via the QEMU Guest Agent on Windows
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 7.8 | null | null |
RHSA-2024:5482
|
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 8.0.3 Security update
|
cxf-core: Apache CXF SSRF Vulnerability using the Aegis databinding netty-codec-http: Allocation of Resources Without Limits or Throttling org.bouncycastle: Importing an EC certificate with crafted F2m parameters may lead to Denial of Service bc-java: BouncyCastle vulnerable to a timing variant of Bleichenbacher (Marvin Attack) org.bouncycastle:bcprov-jdk18on: Infinite loop in ED25519 verification in the ScalarUtil class
|
[
"cpe:/a:redhat:jboss_enterprise_application_platform:8.0"
] | null | 7.5 | null | null |
RHSA-2015:0163
|
Red Hat Security Advisory: chromium-browser security update
|
chromium-browser: use-after-free in DOM chromium-browser: cross-origin-bypass in V8 bindings chromium-browser: privilege escalation in service workers chromium-browser: various security fixes in Chrome 40.0.2214.111
|
[
"cpe:/a:redhat:rhel_extras:6"
] | null | null | null | null |
RHSA-2010:0872
|
Red Hat Security Advisory: glibc security and bug fix update
|
glibc: ld.so insecure handling of $ORIGIN in LD_AUDIT for setuid/setgid programs glibc: ld.so arbitrary DSO loading via LD_AUDIT in setuid/setgid programs
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2018:1627
|
Red Hat Security Advisory: Red Hat OpenStack Platform director security update
|
openstack-tripleo-heat-templates: Ceph client keyring is world-readable when deployed by director memcached: UDP server support allows spoofed traffic amplification DoS
|
[
"cpe:/a:redhat:openstack:11::el7"
] | null | null | 5.3 | null |
RHSA-2022:6505
|
Red Hat Security Advisory: openvswitch2.15 security update
|
dpdk: error recovery in mlx5 driver not handled properly, allowing for denial of service
|
[
"cpe:/o:redhat:enterprise_linux:8::fastdatapath"
] | null | 6.5 | null | null |
RHSA-2006:0427
|
Red Hat Security Advisory: ruby security update
|
security flaw
|
[
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2015:1684
|
Red Hat Security Advisory: openstack-swift security update
|
Swift: unauthorized deletion of versioned Swift object
|
[
"cpe:/a:redhat:openstack:5::el6",
"cpe:/a:redhat:openstack:5::el7"
] | null | null | null | null |
RHSA-2017:2811
|
Red Hat Security Advisory: eap7-jboss-ec2-eap security update
|
jasypt: Vulnerable to timing attack against the password hash comparison bouncycastle: Information disclosure in GCMBlockCipher keycloak: SAML request parser replaces special strings with system properties log4j: Socket receiver deserialization vulnerability hibernate-validator: Privilege escalation when running under the security manager log4j: deserialization of untrusted data in SocketServer
|
[
"cpe:/a:redhat:jboss_enterprise_application_platform:7::el6",
"cpe:/a:redhat:jboss_enterprise_application_platform:7::el7"
] | null | 9.8 | 6.3 | null |
RHSA-2020:3283
|
Red Hat Security Advisory: postgresql-jdbc security update
|
postgresql-jdbc: XML external entity (XXE) vulnerability in PgSQLXML
|
[
"cpe:/a:redhat:rhel_e4s:8.0::appstream"
] | null | 7.7 | null | null |
RHSA-2021:1074
|
Red Hat Security Advisory: flatpak security update
|
flatpak: "file forwarding" feature can be used to gain unprivileged access to files
|
[
"cpe:/a:redhat:rhel_eus:8.1::appstream"
] | null | 8.1 | null | null |
RHSA-2010:0103
|
Red Hat Security Advisory: flash-plugin security update
|
flash-plugin: unauthorized cross-domain requests (APSB10-06)
|
[
"cpe:/a:redhat:rhel_extras:3",
"cpe:/a:redhat:rhel_extras:4"
] | null | null | null | null |
RHSA-2024:11049
|
Red Hat Security Advisory: squid security update
|
squid: Request/Response smuggling in HTTP/1.1 and ICAP
|
[
"cpe:/o:redhat:rhel_els:7"
] | null | 9.3 | null | null |
RHSA-2014:0226
|
Red Hat Security Advisory: Red Hat Enterprise Linux 4 Extended Life Cycle Support 1-year Notice
|
This is the one-year notification for the retirement of Red Hat Enterprise
Linux 4 Extended Life Cycle Support (ELS). This notice applies only to
those customers subscribed to the Extended Life Cycle Support (ELS) channel
for Red Hat Enterprise Linux 4 in the Customer Portal.
|
[
"cpe:/o:redhat:rhel_els:4::as",
"cpe:/o:redhat:rhel_els:4::es"
] | null | null | null | null |
RHSA-2020:1288
|
Red Hat Security Advisory: haproxy security update
|
haproxy: malformed HTTP/2 requests can lead to out-of-bounds writes
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 8.8 | null | null |
RHSA-2020:4078
|
Red Hat Security Advisory: qemu-kvm-ma security update
|
QEMU: usb: out-of-bounds r/w access issue while processing usb packets
|
[
"cpe:/o:redhat:enterprise_linux:7::server"
] | null | 5 | null | null |
RHSA-2014:1082
|
Red Hat Security Advisory: thermostat1-httpcomponents-client security update
|
CXF: SSL hostname verification bypass, incomplete CVE-2012-6153 fix
|
[
"cpe:/a:redhat:rhel_software_collections:1::el6"
] | null | null | 4.8 | null |
RHSA-2017:3226
|
Red Hat Security Advisory: redis security update
|
redis: weak permissions on sensitive files
|
[
"cpe:/a:redhat:openstack:10::el7"
] | null | null | 4 | null |
RHSA-2007:0950
|
Red Hat Security Advisory: JBoss Enterprise Application Platform security update
|
tomcat handling of cookies tomcat handling of cookie values
|
[
"cpe:/a:redhat:rhel_application_stack:1",
"cpe:/a:redhat:rhel_application_stack:2"
] | null | null | null | null |
RHSA-2023:4571
|
Red Hat Security Advisory: iperf3 security update
|
iperf3: memory allocation hazard and crash
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 7.5 | null | null |
RHSA-2021:3440
|
Red Hat Security Advisory: kernel-rt security and bug fix update
|
kernel: slab-out-of-bounds access in xdr_set_page_base() in net/sunrpc/xdr.c
|
[
"cpe:/a:redhat:enterprise_linux:8::nfv",
"cpe:/a:redhat:enterprise_linux:8::realtime"
] | null | 7.5 | null | null |
RHSA-2018:0480
|
Red Hat Security Advisory: JBoss Enterprise Application Platform 7.1.1 for RHEL 7
|
resteasy: Vary header not added by CORS filter leading to cache poisoning artemis/hornetq: memory exhaustion via UDP and JGroups discovery undertow: Client can use bogus uri in Digest authentication infinispan: Unsafe deserialization of malicious object injected into data cache jackson-databind: Unsafe deserialization due to incomplete black list (incomplete fix for CVE-2017-7525) jackson-databind: Unsafe deserialization due to incomplete black list (incomplete fix for CVE-2017-15095) undertow: ALLOW_ENCODED_SLASH option not taken into account in the AjpRequestParser jackson-databind: unsafe deserialization due to incomplete blacklist (incomplete fix for CVE-2017-7525 and CVE-2017-17485)
|
[
"cpe:/a:redhat:jboss_enterprise_application_platform:7.1::el7"
] | null | null | 8.1 | null |
RHSA-2023:6330
|
Red Hat Security Advisory: edk2 security, bug fix, and enhancement update
|
edk2: Function GetEfiGlobalVariable2() return value not checked in DxeImageVerificationHandler() openssl: Possible DoS translating ASN.1 object identifiers
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::crb"
] | null | 6.5 | null | null |
RHSA-2009:1076
|
Red Hat Security Advisory: Red Hat Enterprise Linux 2.1 - End Of Life
|
This is the End Of Life notification for Red Hat Enterprise Linux 2.1.
|
[
"cpe:/o:redhat:enterprise_linux:2.1::as",
"cpe:/o:redhat:enterprise_linux:2.1::aw",
"cpe:/o:redhat:enterprise_linux:2.1::es",
"cpe:/o:redhat:enterprise_linux:2.1::ws"
] | null | null | null | null |
RHSA-2009:1512
|
Red Hat Security Advisory: kdegraphics security update
|
xpdf: multiple integer overflows xpdf/poppler: SplashBitmap integer overflow xpdf/poppler: Splash:: drawImage integer overflow and missing allocation return value check xpdf/poppler: integer overflow in ObjectStream::ObjectStream (oCERT-2009-016) xpdf/poppler: ImageStream:: ImageStream integer overflow
|
[
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2018:2684
|
Red Hat Security Advisory: .NET Core Runtime 2.1.4 and SDK 2.1.402 for Red Hat Enterprise Linux
|
Updates for rh-dotnet21 and rh-dotnet21-dotnet are now available for .NET Core on Red Hat Enterprise Linux.
Red Hat Product Security has rated this update as having a security impact of Low.
|
[
"cpe:/a:redhat:rhel_dotnet:2.1::el7"
] | null | null | null | null |
RHSA-2024:6907
|
Red Hat Security Advisory: python-setuptools security update
|
pypa/setuptools: Remote code execution via download functions in the package_index module in pypa/setuptools
|
[
"cpe:/o:redhat:rhel_aus:8.2::baseos"
] | null | 8.8 | null | null |
RHSA-2020:5625
|
Red Hat Security Advisory: Red Hat Single Sign-On 7.4.0 security update
|
keycloak: Password leak by logged exception in HttpMethod class keycloak: missing input validation in IDP authorization URLs jackson-databind: Serialization gadgets in org.aoju.bus.proxy.provider.*.RmiProvider jackson-databind: Serialization gadgets in org.apache.activemq.jms.pool.XaPooledConnectionFactory jackson-databind: Serialization gadgets in org.apache.commons.proxy.provider.remoting.RmiProvider jackson-databind: Serialization gadgets in org.apache.openjpa.ee.WASRegistryManagedRuntime jackson-databind: Serialization gadgets in org.springframework:spring-aop jackson-databind: Serialization gadgets in commons-jelly:commons-jelly
|
[
"cpe:/a:redhat:red_hat_single_sign_on:7"
] | null | 8.1 | null | null |
RHSA-2023:0079
|
Red Hat Security Advisory: .NET 6.0 security, bug fix, and enhancement update
|
dotnet: Parsing an empty HTTP response as a JSON.NET JObject causes a stack overflow and crashes a process
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb"
] | null | 7.5 | null | null |
RHSA-2023:7517
|
Red Hat Security Advisory: Red Hat Ansible Automation Platform 2.4 Product Security and Bug Fix Update
|
golang: crypto/tls: panic when processing post-handshake message on QUIC connections golang: crypto/tls: lack of a limit on buffered post-handshake
|
[
"cpe:/a:redhat:ansible_automation_platform:2.4::el8",
"cpe:/a:redhat:ansible_automation_platform:2.4::el9",
"cpe:/a:redhat:ansible_automation_platform_developer:2.4::el8",
"cpe:/a:redhat:ansible_automation_platform_developer:2.4::el9",
"cpe:/a:redhat:ansible_automation_platform_inside:2.4::el8",
"cpe:/a:redhat:ansible_automation_platform_inside:2.4::el9"
] | null | 7.5 | null | null |
RHSA-2022:2199
|
Red Hat Security Advisory: .NET 6.0 security, bug fix, and enhancement update
|
dotnet: excess memory allocation via HttpClient causes DoS dotnet: malicious content causes high CPU and memory usage dotnet: parsing HTML causes Denial of Service
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb"
] | null | 7.5 | null | null |
RHSA-2023:1472
|
Red Hat Security Advisory: thunderbird security update
|
nss: Arbitrary memory write via PKCS 12 Mozilla: Incorrect code generation during JIT compilation Mozilla: Potential out-of-bounds when accessing throttled streams Mozilla: Invalid downcast in Worklets Mozilla: URL being dragged from a removed cross-origin iframe into the same tab triggered navigation Mozilla: Memory safety bugs fixed in Firefox 111 and Firefox ESR 102.9
|
[
"cpe:/a:redhat:rhel_eus:8.4::appstream"
] | null | 8.8 | null | null |
RHSA-2009:1471
|
Red Hat Security Advisory: elinks security update
|
elinks tries to load .po files from a non-absolute path elinks: entity_cache static array buffer overflow (off-by-one)
|
[
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws",
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2015:2661
|
Red Hat Security Advisory: Red Hat JBoss Web Server 3.0.2 security update
|
httpd: bypass of mod_headers rules via chunked requests tomcat: non-persistent DoS attack by feeding data by aborting an upload httpd: NULL pointer dereference in mod_cache if Content-Type has empty value httpd: HTTP request smuggling attack against chunked request parser tomcat: URL Normalization issue
|
[
"cpe:/a:redhat:jboss_enterprise_web_server:3.0"
] | null | null | 4.3 | null |
RHSA-2024:8122
|
Red Hat Security Advisory: OpenJDK 11.0.25 Security Update for Portable Linux Builds
|
giflib: Heap-Buffer Overflow during Image Saving in DumpScreen2RGB Function JDK: HTTP client improper handling of maxHeaderSize (8328286) JDK: Array indexing integer overflow (8328544) JDK: Unbounded allocation leads to out-of-memory error (8331446) JDK: Integer conversion error leads to incorrect range check (8332644)
|
[
"cpe:/a:redhat:openjdk:11"
] | null | 4.8 | null | null |
RHSA-2024:3058
|
Red Hat Security Advisory: mutt security update
|
mutt: null pointer dereference mutt: null pointer dereference
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 5.7 | null | null |
RHSA-2024:2645
|
Red Hat Security Advisory: podman security update
|
buildah: full container escape at build time
|
[
"cpe:/a:redhat:rhel_eus:9.2::appstream"
] | null | 8.6 | null | null |
RHSA-2020:2828
|
Red Hat Security Advisory: firefox security update
|
Mozilla: Memory corruption due to missing sign-extension for ValueTags on ARM64 Mozilla: Information disclosure due to manipulated URL object Mozilla: Use-after-free in nsGlobalWindowInner Mozilla: Use-After-Free when trying to connect to a STUN server Mozilla: Add-On updates did not respect the same certificate trust rules as software updates
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 8.8 | 6.1 | null |
RHSA-2024:8415
|
Red Hat Security Advisory: OpenShift Container Platform 4.16.19 bug fix and security update
|
openshift-console: OAuth2 insufficient state parameter entropy golang-protobuf: encoding/protojson, internal/encoding/json: infinite loop in protojson.Unmarshal when unmarshaling certain forms of invalid JSON openstack-ironic: Lack of checksum validation on images
|
[
"cpe:/a:redhat:openshift:4.16::el9"
] | null | 6.3 | null | null |
RHSA-2023:6171
|
Red Hat Security Advisory: Red Hat Product OCP Tools 4.11 Openshift Jenkins security update
|
SnakeYaml: Constructor Deserialization Remote Code Execution maven-shared-utils: Command injection via Commandline class apache-commons-text: variable interpolation RCE jenkins-2-plugins/script-security: Sandbox bypass vulnerability in Script Security Plugin jenkins-2-plugins/JUnit: Stored XSS vulnerability in JUnit Plugin jenkins-2-plugins/pipeline-build-step: Stored XSS vulnerability in Pipeline: Build Step Plugin Jenkins: Temporary file parameter created with insecure permissions Jenkins: Information disclosure through error stack traces related to agents golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487)
|
[
"cpe:/a:redhat:ocp_tools:4.11::el8"
] | null | 7.5 | null | null |
RHSA-2024:2621
|
Red Hat Security Advisory: kernel security, bug fix, and enhancement update
|
kernel: ext4: kernel bug in ext4_write_inline_data_end() kernel: use after free flaw in l2cap_conn_del in net/bluetooth/l2cap_core.c kernel: Information leak in l2cap_parse_conf_req in net/bluetooth/l2cap_core.c kernel: GSM multiplexing race condition leads to privilege escalation kernel: untrusted VMM can trigger int80 syscall handling
|
[
"cpe:/a:redhat:rhel_eus:8.8::crb",
"cpe:/o:redhat:rhel_eus:8.8::baseos"
] | null | 5.6 | null | null |
RHSA-2022:0181
|
Red Hat Security Advisory: OpenShift Container Platform 4.6.54 extras and security update
|
log4j-core: remote code execution via JDBC Appender
|
[
"cpe:/a:redhat:openshift:4.6::el8"
] | null | 6.6 | null | null |
RHSA-2021:5148
|
Red Hat Security Advisory: OpenShift Container Platform 4.8.24 extras security update
|
log4j: Remote code execution in Log4j 1.x when application is configured to use JMSAppender log4j-core: Remote code execution in Log4j 2.x when logs contain an attacker-controlled string value log4j-core: DoS in log4j 2.x with thread context message pattern and context lookup pattern (incomplete fix for CVE-2021-44228)
|
[
"cpe:/a:redhat:openshift:4.8::el8"
] | null | 8.1 | null | null |
RHSA-2019:2946
|
Red Hat Security Advisory: Red Hat JBoss Core Services Apache HTTP Server 2.4.29 SP3 security update
|
HTTP/2: large amount of data requests leads to denial of service HTTP/2: flood using PRIORITY frames results in excessive resource consumption HTTP/2: 0-length headers lead to denial of service HTTP/2: request for large response leads to denial of service
|
[
"cpe:/a:redhat:jboss_core_services:1::el6",
"cpe:/a:redhat:jboss_core_services:1::el7"
] | null | null | 7.5 | null |
RHSA-2023:1044
|
Red Hat Security Advisory: Red Hat Single Sign-On 7.6.2 security update on RHEL 8
|
bootstrap: Cross-site Scripting (XSS) in the collapse data-parent attribute bootstrap: Cross-site Scripting (XSS) in the data-container property of tooltip jquery: Prototype pollution in object's prototype leading to denial of service, remote code execution, or property injection jquery: Cross-site scripting due to improper injQuery.htmlPrefilter method jquery: Untrusted code execution via <option> tag in HTML passed to DOM manipulation methods glob-parent: Regular Expression Denial of Service minimist: prototype pollution keycloak: HTML injection in execute-actions-email Admin REST API keycloak: XSS on impersonation under specific circumstances SnakeYaml: Constructor Deserialization Remote Code Execution Undertow: DoS can be achieved as Undertow server waits for the LAST_CHUNK forever for EJB invocations keycloak: Session takeover with OIDC offline refreshtokens keycloak: reflected XSS attack Moment.js: Path traversal in moment.locale snakeyaml: Denial of Service due to missing nested depth limitation for collections moment: inefficient parsing algorithm resulting in DoS loader-utils: Regular expression denial of service snakeyaml: Uncaught exception in org.yaml.snakeyaml.composer.Composer.composeSequenceNode snakeyaml: Uncaught exception in org.yaml.snakeyaml.constructor.BaseConstructor.constructObject snakeyaml: Uncaught exception in java.base/java.util.regex.Pattern$Ques.match jettison: parser crash by stackoverflow jettison: memory exhaustion via user-supplied XML or JSON data jackson-databind: deep wrapper array nesting wrt UNWRAP_SINGLE_VALUE_ARRAYS jackson-databind: use of deeply nested arrays mina-sshd: Java unsafe deserialization vulnerability jettison: If the value in map is the map's self, the new new JSONObject(map) cause StackOverflowError which may lead to dos json5: Prototype Pollution in JSON5 via Parse Method CXF: directory listing / code exfiltration CXF: SSRF Vulnerability keycloak: Client Registration endpoint does not check token revocation keycloak: user impersonation via stolen uuid code
|
[
"cpe:/a:redhat:red_hat_single_sign_on:7.6::el8"
] | null | 4.6 | 5.6 | null |
RHSA-2014:1846
|
Red Hat Security Advisory: gnutls security update
|
gnutls: Heap corruption when generating key ID for ECC (GNUTLS-SA-2014-5)
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | null | null |
RHSA-2016:0613
|
Red Hat Security Advisory: samba3x security update
|
samba: crash in dcesrv_auth_bind_ack due to missing error check samba: Man-in-the-middle attacks possible with NTLMSSP authentication samba: Spoofing vulnerability when domain controller is configured samba: Missing downgrade detection samba: Smb signing not required by default when smb client connection is used for ipc usage samba: SAMR and LSA man in the middle attacks
|
[
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2021:3675
|
Red Hat Security Advisory: shim and fwupd security update
|
grub2: acpi command allows privileged user to load crafted ACPI tables when Secure Boot is enabled grub2: Use-after-free in rmmod command grub2: Out-of-bounds write in grub_usb_device_initialize() grub2: Stack buffer overflow in grub_parser_split_cmdline() grub2: cutmem command allows privileged user to remove memory regions when Secure Boot is enabled grub2: Heap out-of-bounds write in short form option parser grub2: Heap out-of-bounds write due to miscalculation of space required for quoting
|
[
"cpe:/a:redhat:rhel_eus:8.1::crb",
"cpe:/o:redhat:rhel_eus:8.1::baseos"
] | null | 7.5 | null | null |
RHSA-2008:0965
|
Red Hat Security Advisory: lynx security update
|
lynx: .mailcap and .mime.types files read from CWD lynx: remote arbitrary command execution via a crafted lynxcgi: URL
|
[
"cpe:/o:redhat:enterprise_linux:2.1::as",
"cpe:/o:redhat:enterprise_linux:2.1::aw",
"cpe:/o:redhat:enterprise_linux:2.1::es",
"cpe:/o:redhat:enterprise_linux:2.1::ws",
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws",
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws",
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2023:3642
|
Red Hat Security Advisory: Red Hat Ceph Storage 6.1 Container security and bug fix update
|
ramda: prototype poisoning eventsource: Exposure of Sensitive Information golang: net/http: improper sanitization of Transfer-Encoding header golang: net/http/httputil: ReverseProxy should not forward unparseable query parameters marked: regular expression block.def may lead Denial of Service marked: regular expression inline.reflinkSearch may lead Denial of Service grafana: Use of Cache Containing Sensitive Information golang: encoding/pem: fix stack overflow in Decode Moment.js: Path traversal in moment.locale grafana: An information leak issue was discovered in Grafana through 7.3.4, when integrated with Zabbix golang: net/http: handle server errors after sending GOAWAY golang: encoding/xml: stack exhaustion in Decoder.Skip golang: crypto/elliptic: panic caused by oversized scalar golang: syscall: faccessat checks wrong group golang: crypto/tls: session tickets lack random ticket_age_add golang: io/fs: stack exhaustion in Glob golang: compress/gzip: stack exhaustion in Reader.Read golang: path/filepath: stack exhaustion in Glob golang: encoding/xml: stack exhaustion in Unmarshal golang: encoding/gob: stack exhaustion in Decoder.Decode grafana: stored XSS vulnerability grafana: OAuth account takeover grafana: plugin signature bypass grafana: data source and plugin proxy endpoints leaking authentication tokens to some destination plugins golang: net/http/httputil: NewSingleHostReverseProxy - omit X-Forwarded-For not working golang: math/big: decoding big.Float and big.Rat types can panic if the encoded message is too short, potentially allowing a denial of service golang: net/url: JoinPath does not strip relative path components in all circumstances grafana: Escalation from admin to server admin when auth proxy is used grafana: Data source and plugin proxy endpoints could leak the authentication cookie to some destination plugins grafana: using email as a username can block other users from signing in grafana: email addresses and usernames cannot be trusted grafana: User enumeration via forget password grafana: Spoofing of the originalUrl parameter of snapshots golang: regexp/syntax: limit memory used by parsing regexps crewjam/saml: Authentication bypass when processing SAML responses containing multiple Assertion elements
|
[
"cpe:/a:redhat:ceph_storage:6.1::el9"
] | null | 9.1 | null | null |
RHSA-2009:0004
|
Red Hat Security Advisory: openssl security update
|
OpenSSL Incorrect checks for malformed signatures
|
[
"cpe:/o:redhat:enterprise_linux:2.1::as",
"cpe:/o:redhat:enterprise_linux:2.1::aw",
"cpe:/o:redhat:enterprise_linux:2.1::es",
"cpe:/o:redhat:enterprise_linux:2.1::ws",
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws",
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws",
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHEA-2024:4866
|
Red Hat Enhancement Advisory: Red Hat Service Interconnect 1.4.7 Release rpms
|
encoding/gob: golang: Calling Decoder.Decode on a message which contains deeply nested structures can cause a panic due to stack exhaustion
|
[
"cpe:/a:redhat:service_interconnect:1.4::el8",
"cpe:/a:redhat:service_interconnect:1.4::el9"
] | null | 7.5 | null | null |
RHSA-2017:0873
|
Red Hat Security Advisory: Red Hat Single Sign-On 7.1 update on RHEL 7
|
keycloak: user deletion via incorrect permissions check wildfly: ParseState headerValuesCache can be exploited to fill heap with garbage keycloak: timing attack in JWS signature verification
|
[
"cpe:/a:redhat:red_hat_single_sign_on:7::el7"
] | null | null | 3.7 | null |
RHSA-2017:1679
|
Red Hat Security Advisory: bind security and bug fix update
|
bind: An error in TSIG authentication can permit unauthorized zone transfers bind: An error in TSIG authentication can permit unauthorized dynamic updates
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | 7.5 | null |
RHSA-2024:7260
|
Red Hat Security Advisory: net-snmp security update
|
net-snmp: A buffer overflow in the handling of the INDEX of NET-SNMP-VACM-MIB can cause an out-of-bounds memory access. net-snmp: Improper Input Validation when SETing malformed OIDs in master agent and subagent simultaneously net-snmp: A malformed OID in a SET request to SNMP-VIEW-BASED-ACM-MIB::vacmAccessTable can cause an out-of-bounds memory access net-snmp: A malformed OID in a SET request to NET-SNMP-AGENT-MIB::nsLogTable can cause a NULL pointer dereference net-snmp: A malformed OID in a GET-NEXT to the nsVacmAccessTable can cause a NULL pointer dereference. net-snmp: A malformed OID in a SET to the nsVacmAccessTable can cause a NULL pointer dereference.
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 5.9 | null | null |
RHSA-2024:4150
|
Red Hat Security Advisory: OpenShift Container Platform 4.15.20 security update
|
golang-protobuf: encoding/protojson, internal/encoding/json: infinite loop in protojson.Unmarshal when unmarshaling certain forms of invalid JSON
|
[
"cpe:/a:redhat:openshift:4.15::el8",
"cpe:/a:redhat:openshift:4.15::el9"
] | null | 5.9 | null | null |
RHSA-2015:2108
|
Red Hat Security Advisory: cpio security and bug fix update
|
cpio: heap-based buffer overflow flaw in list_file()
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | null | null |
RHSA-2020:1230
|
Red Hat Security Advisory: skopeo security and bug fix update
|
proglottis/gpgme: Use-after-free in GPGME bindings during container image pull
|
[
"cpe:/a:redhat:rhel_extras_other:7"
] | null | 7.5 | null | null |
RHSA-2023:4102
|
Red Hat Security Advisory: bind security update
|
bind: named's configured cache size limit can be significantly exceeded
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 7.5 | null | null |
RHSA-2015:1669
|
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform security update
|
PicketLink: PicketLink IDP ignores role based authorization
|
[
"cpe:/a:redhat:jboss_enterprise_application_platform:6::el5"
] | null | null | null | null |
RHSA-2024:1092
|
Red Hat Security Advisory: tomcat security update
|
tomcat: HTTP request smuggling via malformed trailer headers
|
[
"cpe:/a:redhat:rhel_eus:9.2::appstream"
] | null | 7.5 | null | null |
RHSA-2022:9080
|
Red Hat Security Advisory: thunderbird security update
|
Mozilla: Quoting from an HTML email with certain tags will trigger network requests and load remote content, regardless of a configuration to block remote content Mozilla: Arbitrary file read from a compromised content process Mozilla: Drag and Dropped Filenames could have been truncated to malicious extensions Mozilla: Memory safety bugs fixed in Firefox ESR 102.6 and Thunderbird 102.6 Mozilla: Use-after-free in WebGL Mozilla: Memory corruption in WebGL Mozilla: Use-after-free in WebGL
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 8.1 | null | null |
RHSA-2020:0231
|
Red Hat Security Advisory: java-1.8.0-openjdk security update
|
OpenJDK: Incorrect exception processing during deserialization in BeanContextSupport (Serialization, 8224909) OpenJDK: Improper checks of SASL message properties in GssKrb5Base (Security, 8226352) OpenJDK: Incorrect isBuiltinStreamHandler check causing URL normalization issues (Networking, 8228548) OpenJDK: Use of unsafe RSA-MD5 checksum in Kerberos TGS (Security, 8229951) OpenJDK: Serialization filter changes via jdk.serialFilter property modification (Serialization, 8231422) OpenJDK: Excessive memory usage in OID processing in X.509 certificate parsing (Libraries, 8234037) OpenJDK: Incomplete enforcement of maxDatagramSockets limit in DatagramChannelImpl (Networking, 8231795)
|
[
"cpe:/a:redhat:rhel_e4s:8.0::appstream"
] | null | 3.7 | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.