id
stringlengths 13
15
| title
stringlengths 29
176
| description
stringlengths 8
32.1k
| cpes
listlengths 0
20
| cvss_v4_0
null | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
null |
---|---|---|---|---|---|---|---|
RHSA-2024:2935
|
Red Hat Security Advisory: go-toolset:rhel8 security update
|
golang: net/http, x/net/http2: unlimited number of CONTINUATION frames causes DoS
|
[
"cpe:/a:redhat:rhel_eus:8.6::appstream"
] | null | 7.5 | null | null |
RHSA-2023:3350
|
Red Hat Security Advisory: kernel-rt security and bug fix update
|
kernel: netfilter: use-after-free in nf_tables when processing batch requests can lead to privilege escalation
|
[
"cpe:/a:redhat:enterprise_linux:8::nfv",
"cpe:/a:redhat:enterprise_linux:8::realtime"
] | null | 7.8 | null | null |
RHSA-2019:3494
|
Red Hat Security Advisory: container-tools:1.0 security and bug fix update
|
containers/image: not enforcing TLS when sending username+password credentials to token servers leading to credential disclosure QEMU: slirp: heap buffer overflow during packet reassembly
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | null | 7 | null |
RHSA-2007:0064
|
Red Hat Security Advisory: postgresql security update
|
security flaw security flaw
|
[
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws",
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHBA-2023:1649
|
Red Hat Bug Fix Advisory: OpenShift Container Platform 4.11.35 packages and security update
|
golang: out-of-bounds read in golang.org/x/text/language leads to DoS haproxy: request smuggling attack in HTTP/1 header parsing
|
[
"cpe:/a:redhat:openshift:4.11::el8"
] | null | 8.2 | null | null |
RHSA-2024:4041
|
Red Hat Security Advisory: OpenShift Container Platform 4.15.19 bug fix and security update
|
golang: net/http, x/net/http2: unlimited number of CONTINUATION frames causes DoS jose-go: improper handling of highly compressed data
|
[
"cpe:/a:redhat:openshift:4.15::el8",
"cpe:/a:redhat:openshift:4.15::el9"
] | null | 4.3 | null | null |
RHSA-2018:1263
|
Red Hat Security Advisory: Red Hat Mobile Application Platform 4.6.0 release - RPMs
|
nodejs-tough-cookie: Regular expression denial of service hoek: Prototype pollution in utilities function
|
[
"cpe:/a:redhat:mobile_application_platform:4.6"
] | null | null | 2.9 | null |
RHSA-2016:0495
|
Red Hat Security Advisory: nss-util security update
|
nss: Heap buffer overflow vulnerability in ASN1 certificate parsing (MFSA 2016-35)
|
[
"cpe:/o:redhat:rhel_aus:6.4::server",
"cpe:/o:redhat:rhel_aus:6.5::server",
"cpe:/o:redhat:rhel_eus:6.6::computenode",
"cpe:/o:redhat:rhel_eus:6.6::server",
"cpe:/o:redhat:rhel_eus:7.1::computenode",
"cpe:/o:redhat:rhel_eus:7.1::server",
"cpe:/o:redhat:rhel_mission_critical:6.2::server"
] | null | null | null | null |
RHSA-2025:1225
|
Red Hat Security Advisory: Logging for Red Hat OpenShift - 5.8.17
|
rsync: Info Leak via Uninitialized Stack Contents
|
[
"cpe:/a:redhat:logging:5.8::el9"
] | null | 7.5 | null | null |
RHSA-2023:5200
|
Red Hat Security Advisory: firefox security update
|
libwebp: Heap buffer overflow in WebP Codec libwebp: out-of-bounds write with a specially crafted WebP lossless file
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 0 | null | null |
RHSA-2023:5407
|
Red Hat Security Advisory: openshift-gitops-kam security update
|
goproxy: Denial of service (DoS) via unspecified vectors.
|
[
"cpe:/a:redhat:openshift_gitops:1.10::el8"
] | null | 7.5 | null | null |
RHSA-2015:0012
|
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 6.3 openssl security update
|
SSL/TLS: Padding Oracle On Downgraded Legacy Encryption attack
|
[
"cpe:/a:redhat:jboss_enterprise_application_platform:6.3"
] | null | null | null | null |
RHSA-2024:8110
|
Red Hat Security Advisory: containernetworking-plugins security update
|
encoding/gob: golang: Calling Decoder.Decode on a message which contains deeply nested structures can cause a panic due to stack exhaustion
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 7.5 | null | null |
RHSA-2023:6938
|
Red Hat Security Advisory: container-tools:4.0 security and bug fix update
|
go-yaml: Improve heuristics preventing CPU/memory abuse by parsing malicious or large YAML documents golang.org/x/net/http2: avoid quadratic complexity in HPACK decoding golang: crypto/tls: large handshake records may cause panics golang: net/http, mime/multipart: denial of service from excessive resource consumption golang.org/x/net/html: Cross site scripting golang: net/http, net/textproto: denial of service from excessive memory allocation golang: net/http, net/textproto, mime/multipart: denial of service from excessive resource consumption golang: go/parser: Infinite loop in parsing golang: html/template: backticks not treated as string delimiters golang: html/template: improper sanitization of CSS values golang: html/template: improper handling of JavaScript whitespace runc: Rootless runc makes `/sys/fs/cgroup` writable runc: volume mount race condition (regression of CVE-2019-19921) runc: AppArmor can be bypassed when `/proc` inside the container is symlinked with a specific mount configuration golang: html/template: improper handling of empty HTML attributes golang: net/http: insufficient sanitization of Host header
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 6.5 | null | null |
RHSA-2023:5610
|
Red Hat Security Advisory: tar security update
|
tar: heap buffer overflow at from_header() in list.c via specially crafted checksum
|
[
"cpe:/o:redhat:rhel_eus:8.6::baseos"
] | null | 5.5 | null | null |
RHSA-2007:0402
|
Red Hat Security Advisory: seamonkey security update
|
Multiple Firefox flaws (CVE-2007-1562, CVE-2007-2867, CVE-2007-2868, CVE-2007-2869, CVE-2007-2870, CVE-2007-2871) fetchmail/mutt/evolution/...: APOP password disclosure vulnerability security flaw Multiple Firefox flaws (CVE-2007-1562, CVE-2007-2867, CVE-2007-2868, CVE-2007-2869, CVE-2007-2870, CVE-2007-2871) security flaw Multiple Firefox flaws (CVE-2007-1562, CVE-2007-2867, CVE-2007-2868, CVE-2007-2869, CVE-2007-2870, CVE-2007-2871) security flaw Multiple Firefox flaws (CVE-2007-1562, CVE-2007-2867, CVE-2007-2868, CVE-2007-2869, CVE-2007-2870, CVE-2007-2871)
|
[
"cpe:/o:redhat:enterprise_linux:2.1::as",
"cpe:/o:redhat:enterprise_linux:2.1::aw",
"cpe:/o:redhat:enterprise_linux:2.1::es",
"cpe:/o:redhat:enterprise_linux:2.1::ws",
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws",
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2005:300
|
Red Hat Security Advisory: libexif security update
|
security flaw
|
[
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2021:3235
|
Red Hat Security Advisory: Red Hat Virtualization Host security and bug fix update [ovirt-4.4.7]
|
kernel: race condition in net/can/bcm.c leads to local privilege escalation sssd: shell command injection in sssctl kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c edk2: remote buffer overflow in IScsiHexToBin function in NetworkPkg/IScsiDxe
|
[
"cpe:/o:redhat:rhev_hypervisor:4.4::el8"
] | null | 8.1 | null | null |
RHSA-2004:405
|
Red Hat Security Advisory: apache, mod_ssl, php security update for Stronghold
|
security flaw mod_ssl ssl_util_uuencode_binary CA issue security flaw security flaw mod_proxy hook format string
|
[
"cpe:/a:redhat:stronghold:4"
] | null | null | null | null |
RHSA-2020:5566
|
Red Hat Security Advisory: openssl security update
|
openssl: EDIPARTYNAME NULL pointer de-reference
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 5.9 | null | null |
RHSA-2024:9983
|
Red Hat Security Advisory: RHOSP 17.1.4 (python-webob) security update
|
webob: WebOb's location header normalization during redirect leads to open redirect
|
[
"cpe:/a:redhat:openstack:17.1::el9"
] | null | 6.1 | null | null |
RHSA-2021:5217
|
Red Hat Security Advisory: Red Hat Single Sign-On 7.5.0 security update
|
Keycloak: Incorrect authorization allows unpriviledged users to create other users
|
[
"cpe:/a:redhat:red_hat_single_sign_on:7"
] | null | 8.3 | null | null |
RHSA-2013:0148
|
Red Hat Security Advisory: openshift-origin-node-util security update
|
openshift-origin-node-util: restorer.php preg_match shell code injection openshift-origin-node-util: restorer.php arbitrary URL redirection
|
[
"cpe:/a:redhat:openshift:1::el6"
] | null | null | null | null |
RHSA-2024:3998
|
Red Hat Security Advisory: curl security update
|
curl: HTTP/2 push headers memory-leak
|
[
"cpe:/a:redhat:rhel_eus:9.2::appstream",
"cpe:/o:redhat:rhel_eus:9.2::baseos"
] | null | 7.5 | null | null |
RHSA-2025:1338
|
Red Hat Security Advisory: gcc-toolset-14-gcc security update
|
jquery: Untrusted code execution via <option> tag in HTML passed to DOM manipulation methods
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 6.1 | null | null |
RHSA-2024:3354
|
Red Hat Security Advisory: Red Hat Fuse 7.13.0 release and security update
|
ActiveMQ: Deserialization vulnerability on Jolokia that allows authenticated users to perform RCE undertow: OutOfMemoryError due to @MultipartConfig handling JSON-java: parser confusion leads to OOM logback: serialization vulnerability in logback receiver logback: A serialization vulnerability in logback receiver spring-boot: org.springframework.boot: spring-boot-actuator class vulnerable to denial of service jetty: hpack header values cause denial of service in http/2 jetty: Improper addition of quotation marks to user inputs in CgiServlet apache-avro: Apache Avro Java SDK: Memory when deserializing untrusted data in Avro Java SDK jetty: Improper validation of HTTP/1 content-length tomcat: HTTP request smuggling via malformed trailer headers shiro: path traversal attack may lead to authentication bypass Solr: Host environment variables are published via the Metrics API undertow: Out-of-memory Error after several closed connections with wildfly-http-client protocol tomcat: Leaking of unrelated request bodies in default error page springframework: URL Parsing with Host Validation cxf-core: Apache CXF SSRF Vulnerability using the Aegis databinding
|
[
"cpe:/a:redhat:jboss_fuse:7"
] | null | 7.4 | null | null |
RHSA-2023:7842
|
Red Hat Security Advisory: Red Hat Integration Camel for Spring Boot 4.0.2 release security update
|
JSON-java: parser confusion leads to OOM
|
[
"cpe:/a:redhat:camel_spring_boot:4.0.2"
] | null | 7.5 | null | null |
RHSA-2024:1074
|
Red Hat Security Advisory: 389-ds:1.4 security update
|
389-ds-base: a heap overflow leading to denail-of-servce while writing a value larger than 256 chars (in log_entry_attr)
|
[
"cpe:/a:redhat:rhel_eus:8.6::appstream"
] | null | 5.5 | null | null |
RHSA-2018:2942
|
Red Hat Security Advisory: java-1.8.0-openjdk security update
|
OpenJDK: Incorrect handling of unsigned attributes in signed Jar manifests (Security, 8194534) OpenJDK: Leak of sensitive header data via HTTP redirect (Networking, 8196902) OpenJDK: Incomplete enforcement of the trustURLCodebase restriction (JNDI, 8199177) OpenJDK: Improper field access checks (Hotspot, 8199226) OpenJDK: Missing endpoint identification algorithm check during TLS session resumption (JSSE, 8202613) OpenJDK: Unrestricted access to scripting engine (Scripting, 8202936) OpenJDK: Infinite loop in RIFF format reader (Sound, 8205361)
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 5.3 | null |
RHSA-2023:7398
|
Red Hat Security Advisory: kernel security and bug fix update
|
kernel: use-after-free due to race condition occurring in dvb_register_device() kernel: use-after-free due to race condition occurring in dvb_net.c kernel: use-after-free due to race condition occurring in dvb_ca_en50221.c Kernel: NULL pointer dereference problem in sctp_sched_dequeue_common kernel: net/sched: cls_u32 component reference counter leak if tcf_change_indev() fails kernel: net/sched: cls_fw component can be exploited as result of failure in tcf_change_indev function
|
[
"cpe:/a:redhat:rhel_eus:8.6::crb",
"cpe:/o:redhat:rhel_eus:8.6::baseos",
"cpe:/o:redhat:rhev_hypervisor:4.4::el8"
] | null | 7 | null | null |
RHSA-2018:2143
|
Red Hat Security Advisory: Red Hat Decision Manager 7.0.1 bug fix and security update
|
RESTEasy: Abuse of GZIPInterceptor in RESTEasy can lead to denial of service attack slf4j: Deserialisation vulnerability in EventData constructor can allow for arbitrary code execution
|
[
"cpe:/a:redhat:jboss_enterprise_brms_platform:7.0"
] | null | null | 8.1 | null |
RHSA-2021:4321
|
Red Hat Security Advisory: linuxptp security, bug fix, and enhancement update
|
linuxptp: wrong length of one-step follow-up in transparent clock
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 7.1 | null | null |
RHSA-2009:1036
|
Red Hat Security Advisory: ipsec-tools security update
|
ipsec-tools: racoon NULL dereference in fragmentation code ipsec-tools: multiple memory leaks fixed in 0.7.2
|
[
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHBA-2018:1796
|
Red Hat Bug Fix Advisory: OpenShift Container Platform 3.9 bug fix and enhancement update
|
cri-o: capabilities are not dropped when switching to a non-root user kubernetes: Kubectl copy doesn't check for paths outside of it's destination directory
|
[
"cpe:/a:redhat:openshift:3.9::el7"
] | null | null | 6.1 | null |
RHSA-2023:3204
|
Red Hat Security Advisory: OpenShift Virtualization 4.13.0 RPMs security and bug fix update
|
golang: net/http: handle server errors after sending GOAWAY golang: golang.org/x/text/language: ParseAcceptLanguage takes a long time to parse complex tags golang: math/big: decoding big.Float and big.Rat types can panic if the encoded message is too short, potentially allowing a denial of service golang: net/url: JoinPath does not strip relative path components in all circumstances golang: net/http: excessive memory growth in a Go server accepting HTTP/2 requests
|
[
"cpe:/a:redhat:container_native_virtualization:4.13::el7",
"cpe:/a:redhat:container_native_virtualization:4.13::el8",
"cpe:/a:redhat:container_native_virtualization:4.13::el9"
] | null | 5.3 | null | null |
RHSA-2019:1168
|
Red Hat Security Advisory: kernel security update
|
hardware: Microarchitectural Store Buffer Data Sampling (MSBDS) hardware: Micro-architectural Load Port Data Sampling - Information Leak (MLPDS) hardware: Microarchitectural Fill Buffer Data Sampling (MFBDS) hardware: Microarchitectural Data Sampling Uncacheable Memory (MDSUM)
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 3.8 | null |
RHSA-2021:2026
|
Red Hat Security Advisory: ipa security update
|
slapi-nis: NULL dereference (DoS) with specially crafted Binding DN
|
[
"cpe:/a:redhat:rhel_eus:8.2::appstream"
] | null | 7.5 | null | null |
RHSA-2024:6745
|
Red Hat Security Advisory: kernel-rt security update
|
kernel: tty: n_gsm: require CAP_NET_ADMIN to attach N_GSM0710 ldisc kernel: Bluetooth: af_bluetooth: Fix deadlock kernel: crypto: qat - resolve race condition during AER recovery kernel: scsi: qedf: Ensure the copied buf is NUL terminated kernel: cppc_cpufreq: Fix possible null pointer dereference kernel: cpufreq: exit() callback is optional kernel: ACPICA: Revert "ACPICA: avoid Info: mapping multiple BARs. Your kernel is fine." kernel: sched/deadline: Fix task_struct reference leak kernel: mm/filemap: skip to create PMD-sized page cache if needed kernel: mm/shmem: disable PMD-sized page cache if needed kernel: mm/filemap: make MAX_PAGECACHE_ORDER acceptable to xarray kernel: net, sunrpc: Remap EPERM in case of connection failure in xs_tcp_setup_socket
|
[
"cpe:/a:redhat:rhel_eus:9.2::nfv",
"cpe:/a:redhat:rhel_eus:9.2::realtime"
] | null | 5.5 | null | null |
RHSA-2009:1222
|
Red Hat Security Advisory: kernel security and bug fix update
|
kernel: uninit op in SOCKOPS_WRAP() leads to privesc kernel: udp socket NULL ptr dereference
|
[
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2021:2415
|
Red Hat Security Advisory: dhcp security update
|
dhcp: stack-based buffer overflow when parsing statements with colon-separated hex digits in config or lease files in dhcpd and dhclient
|
[
"cpe:/o:redhat:rhel_aus:7.3::server"
] | null | 8.8 | null | null |
RHSA-2015:1672
|
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform security update
|
PicketLink: PicketLink IDP ignores role based authorization
|
[
"cpe:/a:redhat:jboss_enterprise_application_platform:6.4"
] | null | null | null | null |
RHSA-2024:1917
|
Red Hat Security Advisory: Red Hat JBoss Web Server 6.0.2 release and security update
|
Tomcat: WebSocket DoS with incomplete closing handshake
|
[
"cpe:/a:redhat:jboss_enterprise_web_server:6.0"
] | null | 7.5 | null | null |
RHSA-2023:4801
|
Red Hat Security Advisory: kernel security and bug fix update
|
kernel: kernel info leak issue in pfkey_register kernel: unmap_mapping_range() race with munmap() on VM_PFNMAP mappings leads to stale TLB entry kernel: speculative pointer dereference in do_prlimit() in kernel/sys.c kernel: ipvlan: out-of-bounds write caused by unclear skb->cb kernel: tls: race condition in do_tls_getsockopt may lead to use-after-free or NULL pointer dereference kernel: buffer overflow in ceph file net/ceph/messenger_v2.c
|
[
"cpe:/a:redhat:rhel_eus:9.0::appstream",
"cpe:/a:redhat:rhel_eus:9.0::crb",
"cpe:/o:redhat:rhel_eus:9.0::baseos"
] | null | 8.8 | null | null |
RHSA-2024:4425
|
Red Hat Security Advisory: Red Hat OpenStack Platform 16.1.9 security update
|
OpenStack: malicious qcow2/vmdk images
|
[
"cpe:/a:redhat:openstack:16.1::el8"
] | null | 8.8 | null | null |
RHSA-2021:0568
|
Red Hat Security Advisory: OpenShift Container Platform 4.6 file-integrity-operator image security update
|
golang: math/big: panic during recursive division of very large numbers
|
[
"cpe:/a:redhat:openshift:4.6::el8"
] | null | 7.5 | null | null |
RHBA-2020:4197
|
Red Hat Bug Fix Advisory: OpenShift Container Platform 4.6 GA RPMs
|
kubernetes: compromised node could escalate to cluster level privileges golang: data race in certain net/http servers including ReverseProxy can lead to DoS golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs
|
[
"cpe:/a:redhat:openshift:4.6::el7",
"cpe:/a:redhat:openshift:4.6::el8"
] | null | 7.5 | null | null |
RHSA-2015:0235
|
Red Hat Security Advisory: Red Hat JBoss BRMS 6.0.3 security update
|
CXF: SSL hostname verification bypass, incomplete CVE-2012-5783 fix OpenJDK: XML parsing Denial of Service (JAXP, 8017298) JSF: XSS due to insufficient escaping of user-supplied content in outputText tags and EL expressions PicketBox/JBossSX: Unauthorized access to and modification of application server configuration and state by application Tomcat/JBossWeb: Limited DoS in chunked transfer encoding input filter Tomcat/JBossWeb: XXE vulnerability via user supplied XSLTs Tomcat/JBossWeb: Request smuggling via malicious content length header Tomcat/JBossWeb: XML parser hijack by malicious web application netty: DoS via memory exhaustion during data aggregation Tomcat/JBossWeb: request smuggling and limited DoS in ChunkedInputFilter Security: Invalid EJB caller role check implementation RESTEasy: XXE via parameter entities PicketLink: XXE via insecure DocumentBuilderFactory usage Validator: JSM bypass via ReflectionHelper CXF: SSL hostname verification bypass, incomplete CVE-2012-6153 fix Framework: Directory traversal Framework: directory traversal flaw jbpm-designer: XXE in BPMN2 import UberFire: Information disclosure and RCE via insecure file upload/download servlets Workbench: Insufficient authorization constraints
|
[
"cpe:/a:redhat:jboss_brms:6.0"
] | null | null | 4.8 | null |
RHSA-2023:3109
|
Red Hat Security Advisory: apr-util security update
|
apr-util: out-of-bounds writes in the apr_base64
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 6.5 | null | null |
RHSA-2021:1968
|
Red Hat Security Advisory: mingw packages security and bug fix update
|
sqlite: Division by zero in whereLoopAddBtreeIndex in sqlite3.c sqlite: integer overflow in sqlite3_str_vappendf function in printf.c sqlite: Use-after-free in fts3EvalNextRow in ext/fts3/fts3.c sqlite: Virtual table can be renamed into the name of one of its shadow tables sqlite: NULL pointer dereference in ext/fts3/fts3_snippet.c via a crafted matchinfo() query
|
[
"cpe:/a:redhat:enterprise_linux:8::crb"
] | null | 5.5 | 6.5 | null |
RHSA-2024:3680
|
Red Hat Security Advisory: Red Hat OpenShift Service Mesh Containers for 2.4.8 security update
|
golang: net/http, x/net/http2: unlimited number of CONTINUATION frames causes DoS
|
[
"cpe:/a:redhat:service_mesh:2.4::el8"
] | null | 7.5 | null | null |
RHSA-2019:1743
|
Red Hat Security Advisory: qemu-kvm-rhev security update
|
QEMU: device_tree: heap buffer overflow while loading device tree blob
|
[
"cpe:/a:redhat:openstack:13::el7"
] | null | null | 7 | null |
RHSA-2020:1504
|
Red Hat Security Advisory: chromium-browser security update
|
chromium-browser: Use after free in speech recognizer
|
[
"cpe:/a:redhat:rhel_extras:6"
] | null | null | 9.6 | null |
RHSA-2024:9930
|
Red Hat Security Advisory: edk2 security update
|
edk2: Integer overflows in PeCoffLoaderRelocateImage
|
[
"cpe:/a:redhat:rhel_e4s:9.0::appstream"
] | null | 5.9 | null | null |
RHSA-2023:1824
|
Red Hat Security Advisory: openvswitch2.15 security update
|
openvswitch: ip proto 0 triggers incorrect handling
|
[
"cpe:/o:redhat:enterprise_linux:8::fastdatapath"
] | null | 8.2 | null | null |
RHSA-2015:0133
|
Red Hat Security Advisory: java-1.7.1-ibm security update
|
OpenJDK: incorrect class loader permission check in ClassLoader getParent() (Libraries, 8055314) ICU: font parsing OOB read (OpenJDK 2D, 8055489) OpenJDK: MulticastSocket NULL pointer dereference (Libraries, 8056264) ICU: font parsing OOB read (OpenJDK 2D, 8056276) OpenJDK: incorrect tracking of ChangeCipherSpec during SSL/TLS handshake (JSSE, 8057555) JDK: unspecified full Java sandbox bypass fixed in Feb 2015 update JDK: unspecified partial Java sandbox bypass fixed in Feb 2015 update JDK: unspecified vulnerability fixed in 6u91, 7u75 and 8u31 (Deployment) JDK: unspecified vulnerability fixed in 6u91, 7u75 and 8u31 (Deployment) OpenJDK: directory information leak via file chooser (Swing, 8055304) OpenJDK: incorrect context class loader use in RMI transport (RMI, 8055309) OpenJDK: DER decoder infinite loop (Security, 8059485) OpenJDK: insufficient code privileges checks (JAX-WS, 8054367)
|
[
"cpe:/a:redhat:rhel_extras:6",
"cpe:/a:redhat:rhel_extras:7"
] | null | null | null | null |
RHSA-2002:164
|
Red Hat Security Advisory: openssl, mm, mod_ssl security update for Stronghold
|
security flaw security flaw security flaw security flaw security flaw
|
[
"cpe:/a:redhat:stronghold:3"
] | null | null | null | null |
RHSA-2017:0517
|
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform security update
|
RESTEasy: Abuse of GZIPInterceptor in RESTEasy can lead to denial of service attack tomcat: Infinite loop in the processing of https requests
|
[
"cpe:/a:redhat:jboss_enterprise_application_platform:6.4"
] | null | null | 7.5 | null |
RHSA-2005:880
|
Red Hat Security Advisory: perl security update
|
security flaw
|
[
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2011:0258
|
Red Hat Security Advisory: subversion security update
|
Subversion: Access restriction bypass by checkout of the root of the repository (mod_dav_svn): DoS (crash) by processing certain requests to display all available repositories to a web browser Subversion: DoS (memory consumption) by processing blame or log -g requests on certain files
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2024:0416
|
Red Hat Security Advisory: ncurses security update
|
ncurses: Local users can trigger security-relevant memory corruption via malformed data
|
[
"cpe:/o:redhat:rhel_eus:8.6::baseos"
] | null | 7.8 | null | null |
RHSA-2020:3461
|
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.3.2 security update
|
hibernate: SQL injection issue in Hibernate ORM EAP: field-name is not parsed in accordance to RFC7230 Wildfly: Improper authorization issue in WildFlySecurityManager when using alternative protection domain jackson-databind: mishandles the interaction between serialization gadgets and typing which could result in remote command execution jackson-databind: mishandles the interaction between serialization gadgets and typing which could result in remote command execution dom4j: XML External Entity vulnerability in default SAX parser Undertow: Incomplete fix for CVE-2017-2666 due to permitting invalid characters in HTTP requests hibernate-validator: Improper input validation in the interpolation of constraint error messages wildfly-elytron: session fixation when using FORM authentication wildfly: exposed setting of TCCL via the EmbeddedManagedProcess API wildfly: unsafe deserialization in Wildfly Enterprise Java Beans netty: compression/decompression codecs don't enforce limits on buffer allocation sizes wildfly: Some EJB transaction objects may get accumulated causing Denial of Service wildfly: EJB SessionOpenInvocations may not be removed properly after a response is received causing Denial of Service
|
[
"cpe:/a:redhat:jboss_enterprise_application_platform:7.3::el6"
] | null | 6.5 | 4.8 | null |
RHSA-2017:2494
|
Red Hat Security Advisory: Red Hat JBoss Web Server 2 security update
|
openssl: OCSP Status Request extension unbounded memory growth SSL/TLS: Malformed plain-text ALERT packets could cause remote DoS tomcat: Incorrect handling of pipelined requests when send file was used tomcat: Security constrained bypass in error page mechanism
|
[
"cpe:/a:redhat:jboss_enterprise_web_server:2.1"
] | null | null | 7.5 | null |
RHSA-2025:3964
|
Red Hat Security Advisory: openvswitch3.3 security update
|
dpdk: Denial Of Service from malicious guest on hypervisors using DPDK Vhost library
|
[
"cpe:/o:redhat:enterprise_linux:9::fastdatapath"
] | null | null | 7.4 | null |
RHSA-2023:3667
|
Red Hat Security Advisory: Red Hat Integration Camel Extensions for Quarkus 2.13.3 security update
|
apache-commons-net: FTP client trusts the host from PASV response by default jettison: Uncontrolled Recursion in JSONArray
|
[
"cpe:/a:redhat:camel_quarkus:2.13"
] | null | 7.5 | null | null |
RHSA-2014:0223
|
Red Hat Security Advisory: libtiff security update
|
(tiff2pdf): Heap-based buffer overflow in t2_process_jpeg_strip() (tiff2pdf): Stack-based buffer overflow with malformed image-length and resolution (gif2tiff): GIF LZW decoder missing datasize value check (tiff2pdf): use-after-free in t2p_readwrite_pdf_image() (gif2tiff): possible heap-based buffer overflow in readgifimage() (gif2tiff): OOB Write in LZW decompressor
|
[
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2021:0171
|
Red Hat Security Advisory: OpenShift Container Platform 4.6.13 bug fix and security update
|
kubernetes: Docker config secrets leaked when file is malformed and loglevel >= 4
|
[
"cpe:/a:redhat:openshift:4.6::el8"
] | null | 5.3 | null | null |
RHSA-2023:3351
|
Red Hat Security Advisory: kpatch-patch security update
|
kernel: netfilter: use-after-free in nf_tables when processing batch requests can lead to privilege escalation
|
[
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 7.8 | null | null |
RHSA-2005:421
|
Red Hat Security Advisory: tcpdump security update
|
security flaw security flaw security flaw
|
[
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws"
] | null | null | null | null |
RHSA-2024:9135
|
Red Hat Security Advisory: toolbox security update
|
golang: net/http: golang: mime/multipart: golang: net/textproto: memory exhaustion in Request.ParseMultipartForm golang: html/template: errors returned from MarshalJSON methods may break template escaping golang: net: malformed DNS message can cause infinite loop net/http: Denial of service due to improper 100-continue handling in net/http
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 5.9 | null | null |
RHSA-2009:1193
|
Red Hat Security Advisory: kernel security and bug fix update
|
kernel: non-root can trigger cpu_idle soft lockup kernel: e1000_clean_rx_irq() denial of service kernel: do_coredump() vs ptrace_start() deadlock kernel: r8169: fix crash when large packets are received kernel: personality: fix PER_CLEAR_ON_SETID kernel: ecryptfs stack overflow in parse_tag_11_packet() kernel: ecryptfs heap overflow in parse_tag_3_packet()
|
[
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::server",
"cpe:/o:redhat:rhel_eus:5.3"
] | null | null | null | null |
RHSA-2015:0163
|
Red Hat Security Advisory: chromium-browser security update
|
chromium-browser: use-after-free in DOM chromium-browser: cross-origin-bypass in V8 bindings chromium-browser: privilege escalation in service workers chromium-browser: various security fixes in Chrome 40.0.2214.111
|
[
"cpe:/a:redhat:rhel_extras:6"
] | null | null | null | null |
RHSA-2004:412
|
Red Hat Security Advisory: kdelibs, kdebase security update
|
security flaw security flaw security flaw
|
[
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws"
] | null | null | null | null |
RHSA-2025:3018
|
Red Hat Security Advisory: Red Hat build of Cryostat 4.0.0: new RHEL 9 container image security update
|
io.quarkus.http/quarkus-http-core: Quarkus HTTP Cookie Smuggling
|
[
"cpe:/a:redhat:cryostat:4::el9"
] | null | 7.4 | null | null |
RHSA-2021:0507
|
Red Hat Security Advisory: subversion:1.10 security update
|
subversion: Remote unauthenticated denial of service in mod_authz_svn
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 7.5 | null | null |
RHSA-2021:0735
|
Red Hat Security Advisory: nodejs:10 security update
|
nodejs: HTTP2 'unknownProtocol' cause DoS by resource exhaustion nodejs: DNS rebinding in --inspect
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 7.5 | null | null |
RHSA-2015:1092
|
Red Hat Security Advisory: ceph-deploy security update
|
ceph-deploy: keyring permissions are world readable in ~ceph ceph-deploy admin command copies keyring file to /etc/ceph which is world readable
|
[
"cpe:/a:redhat:ceph_storage:1.2::el6",
"cpe:/a:redhat:ceph_storage:1.2::el7"
] | null | null | null | null |
RHSA-2017:0205
|
Red Hat Security Advisory: Red Hat CloudForms 3.x - 30 day End Of Life Notice
|
This is the 30 day notification for the End of Production Phase 2 of
Red Hat CloudForms 3.x.
|
[
"cpe:/a:redhat:cloudforms:3.0"
] | null | null | null | null |
RHSA-2018:3655
|
Red Hat Security Advisory: rh-mysql57-mysql security update
|
mysql: Server: Replication unspecified vulnerability (CPU Apr 2018) mysql: Server: Security: Privileges unspecified vulnerability (CPU Apr 2018) mysql: InnoDB unspecified vulnerability (CPU Apr 2018) mysql: Client programs unspecified vulnerability (CPU Apr 2018) mysql: Server: Connection unspecified vulnerability (CPU Apr 2018) mysql: InnoDB unspecified vulnerability (CPU Apr 2018) mysql: Server: Pluggable Auth unspecified vulnerability (CPU Apr 2018) mysql: Server: Locking unspecified vulnerability (CPU Apr 2018) mysql: pid file can be created in a world-writeable directory (CPU Apr 2018) mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2018) mysql: Group Replication GCS unspecified vulnerability (CPU Apr 2018) mysql: InnoDB unspecified vulnerability (CPU Apr 2018) mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2018) mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2018) mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2018) mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2018) mysql: InnoDB unspecified vulnerability (CPU Apr 2018) mysql: InnoDB unspecified vulnerability (CPU Apr 2018) mysql: InnoDB unspecified vulnerability (CPU Apr 2018) mysql: InnoDB unspecified vulnerability (CPU Apr 2018) mysql: InnoDB unspecified vulnerability (CPU Apr 2018) mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2018) mysql: Server: DDL unspecified vulnerability (CPU Apr 2018) mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2018) mysql: Server: DDL unspecified vulnerability (CPU Apr 2018) mysql: Server: Security: Privileges unspecified vulnerability (CPU Apr 2018) mysql: InnoDB unspecified vulnerability (CPU Apr 2018) mysql: Server: DML unspecified vulnerability (CPU Apr 2018) mysql: Server: Performance Schema unspecified vulnerability (CPU Apr 2018) mysql: Server: DDL unspecified vulnerability (CPU Jul 2018) mysql: Server: Security: Privileges unspecified vulnerability (CPU Jul 2018) mysql: MyISAM unspecified vulnerability (CPU Jul 2018) mysql: InnoDB unspecified vulnerability (CPU Jul 2018) mysql: Server: DML unspecified vulnerability (CPU Jul 2018) mysql: Server: Memcached unspecified vulnerability (CPU Jul 2018) mysql: InnoDB unspecified vulnerability (CPU Jul 2018) mysql: Server: DML unspecified vulnerability (CPU Jul 2018) mysql: Server: Options unspecified vulnerability (CPU Jul 2018) mysql: Client mysqldump unspecified vulnerability (CPU Jul 2018) mysql: Audit Log unspecified vulnerability (CPU Jul 2018) mysql: Server: DDL unspecified vulnerability (CPU Jul 2018) mysql: Client programs unspecified vulnerability (CPU Jul 2018) mysql: Server: Parser unspecified vulnerability (CPU Oct 2018) mysql: InnoDB unspecified vulnerability (CPU Oct 2018) mysql: Server: Security: Audit unspecified vulnerability (CPU Oct 2018) mysql: Server: Parser unspecified vulnerability (CPU Oct 2018) mysql: InnoDB unspecified vulnerability (CPU Oct 2018) mysql: Server: Partition unspecified vulnerability (CPU Oct 2018) mysql: InnoDB unspecified vulnerability (CPU Oct 2018) mysql: Server: Partition unspecified vulnerability (CPU Oct 2018) mysql: InnoDB unspecified vulnerability (CPU Oct 2018) mysql: Init script calling kill with root privileges using pid from pidfile owned by mysql user (CPU Oct 2018) mysql: InnoDB unspecified vulnerability (CPU Oct 2018) mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2018) mysql: InnoDB unspecified vulnerability (CPU Oct 2018) mysql: Server: Merge unspecified vulnerability (CPU Oct 2018) mysql: InnoDB unspecified vulnerability (CPU Oct 2018) mysql: Server: Memcached unspecified vulnerability (CPU Oct 2018) mysql: InnoDB unspecified vulnerability (CPU Oct 2018) mysql: Server: RBR unspecified vulnerability (CPU Oct 2018) mysql: Server: Storage Engines unspecified vulnerability (CPU Oct 2018) mysql: Server: Logging unspecified vulnerability (CPU Oct 2018) mysql: InnoDB unspecified vulnerability (CPU Oct 2018) mysql: Server: Replication unspecified vulnerability (CPU Jul 2019)
|
[
"cpe:/a:redhat:rhel_software_collections:3::el6",
"cpe:/a:redhat:rhel_software_collections:3::el7"
] | null | null | 5.4 | null |
RHSA-2025:2195
|
Red Hat Security Advisory: emacs security update
|
emacs: Shell Injection Vulnerability in GNU Emacs via Custom "man" URI Scheme
|
[
"cpe:/a:redhat:rhel_eus:9.4::appstream"
] | null | 8.8 | null | null |
RHSA-2022:4956
|
Red Hat Security Advisory: Red Hat Advanced Cluster Management 2.5 security updates, images, and bug fixes
|
nodejs-json-schema: Prototype pollution vulnerability opencontainers: OCI manifest and index parsing confusion golang.org/x/crypto: empty plaintext packet causes panic containerd: Unprivileged pod may bind mount any privileged regular file on disk minio: user privilege escalation in AddUser() admin API node-fetch: exposure of sensitive information to an unauthorized actor openssl: Infinite loop in BN_mod_sqrt() reachable when parsing certificates nconf: Prototype pollution in memory store golang: crypto/elliptic: IsOnCurve returns true for invalid field elements nats-server: misusing the "dynamically provisioned sandbox accounts" feature authenticated user can obtain the privileges of the System account imgcrypt: Unauthorized access to encryted container image on a shared system due to missing check in CheckAuthorization() code path Moment.js: Path traversal in moment.locale golang: crash in a golang.org/x/crypto/ssh server go-getter: writes SSH credentials into logfile, exposing sensitive credentials to local uses
|
[
"cpe:/a:redhat:acm:2.5::el8"
] | null | 5.1 | null | null |
RHSA-2020:2231
|
Red Hat Security Advisory: Red Hat Ceph Storage 4.1 security, bug fix, and enhancement update
|
ceph-ansible: hard coded credential in ceph-ansible playbook
|
[
"cpe:/a:redhat:ceph_storage:4::el7",
"cpe:/a:redhat:ceph_storage:4::el8"
] | null | 8.8 | null | null |
RHSA-2018:1525
|
Red Hat Security Advisory: rhvm-appliance security and enhancement update
|
undertow: Client can use bogus uri in Digest authentication ovirt-engine: account enumeration through login to web console dhcp: Command injection vulnerability in the DHCP client NetworkManager integration script jackson-databind: unsafe deserialization due to incomplete blacklist (incomplete fix for CVE-2017-7525 and CVE-2017-17485) python-paramiko: Authentication bypass in transport.py slf4j: Deserialisation vulnerability in EventData constructor can allow for arbitrary code execution
|
[
"cpe:/o:redhat:enterprise_linux:7::hypervisor"
] | null | null | 8.1 | null |
RHSA-2005:357
|
Red Hat Security Advisory: gzip security update
|
security flaw security flaw security flaw
|
[
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws",
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2024:6888
|
Red Hat Security Advisory: Red Hat build of Keycloak 22.0.13 Update
|
keycloak-saml-core: Improper Verification of SAML Responses Leading to Privilege Escalation in Keycloak Keycloak: Vulnerable Redirect URI Validation Results in Open Redirec
|
[
"cpe:/a:redhat:build_keycloak:22"
] | null | 6.1 | null | null |
RHSA-2021:5080
|
Red Hat Security Advisory: mailman:2.1 security update
|
mailman: CSRF token bypass allows to perform CSRF attacks and admin takeover
|
[
"cpe:/a:redhat:rhel_eus:8.2::appstream"
] | null | 8 | null | null |
RHSA-2022:9069
|
Red Hat Security Advisory: firefox security update
|
Mozilla: Arbitrary file read from a compromised content process Mozilla: Drag and Dropped Filenames could have been truncated to malicious extensions Mozilla: Memory safety bugs fixed in Firefox ESR 102.6 and Thunderbird 102.6 Mozilla: Use-after-free in WebGL Mozilla: Memory corruption in WebGL Mozilla: Use-after-free in WebGL
|
[
"cpe:/a:redhat:rhel_eus:8.4::appstream"
] | null | 8.1 | null | null |
RHSA-2007:0124
|
Red Hat Security Advisory: file security update
|
file 4.20 fixes a heap overflow in that can result in arbitrary code execution
|
[
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws",
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2018:1098
|
Red Hat Security Advisory: firefox security update
|
firefox: Use-after-free in compositor potentially allows code execution
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | 9.8 | null |
RHSA-2020:2781
|
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 6.4.23 security update
|
EAP: Vault system property security attribute value is revealed on CLI 'reload' command tomcat: Apache Tomcat AJP File Read/Inclusion Vulnerability
|
[
"cpe:/a:redhat:jboss_enterprise_application_platform:6::el5"
] | null | 7.6 | 5.4 | null |
RHSA-2024:1071
|
Red Hat Security Advisory: postgresql:12 security update
|
postgresql: non-owner 'REFRESH MATERIALIZED VIEW CONCURRENTLY' executes arbitrary SQL
|
[
"cpe:/a:redhat:rhel_aus:8.2::appstream",
"cpe:/a:redhat:rhel_e4s:8.2::appstream",
"cpe:/a:redhat:rhel_tus:8.2::appstream"
] | null | 8 | null | null |
RHSA-2022:4807
|
Red Hat Security Advisory: postgresql:12 security update
|
postgresql: Autovacuum, REINDEX, and others omit "security restricted operation" sandbox
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 8.8 | null | null |
RHSA-2019:1017
|
Red Hat Security Advisory: ghostscript security update
|
ghostscript: missing attack vector protections for CVE-2019-6116
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 7.3 | null |
RHSA-2023:3742
|
Red Hat Security Advisory: Red Hat OpenShift Data Foundation 4.13.0 security and bug fix update
|
vault: Hashicorp Vault AWS IAM Integration Authentication Bypass vault: GCP Auth Method Allows Authentication Bypass validator: Inefficient Regular Expression Complexity in Validator.js nodejs-ansi-regex: Regular expression denial of service (ReDoS) matching ANSI escape codes go-yaml: Denial of Service in go-yaml goutils: RandomAlphaNumeric and CryptoRandomAlphaNumeric are not as random as they should be vault: incorrect policy enforcement nodejs: Improper handling of URI Subject Alternative Names nodejs: Certificate Verification Bypass via String Injection nodejs: Incorrect handling of certificate subject and issuer fields golang: archive/tar: github.com/vbatts/tar-split: unbounded memory consumption when reading headers golang: net/http/httputil: ReverseProxy should not forward unparseable query parameters nodejs-minimatch: ReDoS via the braceExpand function nodejs: Prototype pollution via console.table properties jsonwebtoken: Insecure default algorithm in jwt.verify() could lead to signature validation bypass jsonwebtoken: Insecure implementation of key retrieval function could lead to Forgeable Public/Private Tokens from RSA to HMAC golang: net/http: handle server errors after sending GOAWAY golang: encoding/gob: stack exhaustion in Decoder.Decode golang: math/big: decoding big.Float and big.Rat types can panic if the encoded message is too short, potentially allowing a denial of service golang: net/url: JoinPath does not strip relative path components in all circumstances consul: Consul Template May Expose Vault Secrets When Processing Invalid Input decode-uri-component: improper input validation resulting in DoS vault: insufficient certificate revocation list checking golang: regexp/syntax: limit memory used by parsing regexps golang: net/http: excessive memory growth in a Go server accepting HTTP/2 requests golang.org/x/net/http2: avoid quadratic complexity in HPACK decoding golang: crypto/tls: large handshake records may cause panics golang: net/http, mime/multipart: denial of service from excessive resource consumption json5: Prototype Pollution in JSON5 via Parse Method vault: Vault’s Microsoft SQL Database Storage Backend Vulnerable to SQL Injection Via Configuration File hashicorp/vault: Vault’s PKI Issuer Endpoint Did Not Correctly Authorize Access to Issuer Metadata Hashicorp/vault: Vault Fails to Verify if Approle SecretID Belongs to Role During a Destroy Operation hashicorp/vault: Cache-Timing Attacks During Seal and Unseal Operations
|
[
"cpe:/a:redhat:openshift_data_foundation:4.13::el9"
] | null | 5 | null | null |
RHSA-2023:1091
|
Red Hat Security Advisory: kernel security and bug fix update
|
kernel: stack overflow in do_proc_dointvec and proc_skip_spaces kernel: use-after-free related to leaf anon_vma double reuse
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 5.5 | null | null |
RHSA-2013:1219
|
Red Hat Security Advisory: xml-security security update
|
Java: XML signature spoofing
|
[
"cpe:/a:redhat:jboss_enterprise_web_platform:5::el4",
"cpe:/a:redhat:jboss_enterprise_web_platform:5::el5",
"cpe:/a:redhat:jboss_enterprise_web_platform:5::el6"
] | null | null | null | null |
RHSA-2021:0055
|
Red Hat Security Advisory: firefox security update
|
Mozilla: Use-after-free write when handling a malicious COOKIE-ECHO SCTP chunk
|
[
"cpe:/a:redhat:rhel_eus:8.2::appstream"
] | null | null | 8.8 | null |
RHSA-2016:1237
|
Red Hat Security Advisory: ImageMagick security update
|
ImageMagick: Integer and buffer overflow in coders/icon.c ImageMagick: Integer truncation vulnerability in coders/pict.c ImageMagick: Crash due to out of bounds error in SpliceImage ImageMagick: Prevent NULL pointer access in magick/constitute.c ImageMagick: Remote code execution via filename ImageMagick,GraphicsMagick: Gnuplot delegate vulnerability allowing command injection ImageMagick: SVG converting issue resulting in DoS
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation",
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | null | null |
RHSA-2023:1701
|
Red Hat Security Advisory: curl security update
|
curl: HTTP multi-header compression denial of service
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/o:redhat:enterprise_linux:9::baseos"
] | null | 6.5 | null | null |
RHSA-2025:0060
|
Red Hat Security Advisory: kernel-rt security update
|
kernel: mptcp: cope racing subflow creation in mptcp_rcv_space_adjust
|
[
"cpe:/a:redhat:rhel_tus:8.4::nfv",
"cpe:/a:redhat:rhel_tus:8.4::realtime"
] | null | 5.9 | null | null |
RHSA-2024:4830
|
Red Hat Security Advisory: httpd:2.4 security update
|
httpd: Substitution encoding issue in mod_rewrite httpd: Improper escaping of output in mod_rewrite httpd: NULL pointer dereference in mod_proxy
|
[
"cpe:/a:redhat:rhel_aus:8.4::appstream",
"cpe:/a:redhat:rhel_e4s:8.4::appstream",
"cpe:/a:redhat:rhel_tus:8.4::appstream"
] | null | 7.5 | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.