id
stringlengths 13
15
| title
stringlengths 29
176
| description
stringlengths 8
32.1k
| cpes
listlengths 0
20
| cvss_v4_0
null | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
null |
---|---|---|---|---|---|---|---|
RHSA-2017:1208
|
Red Hat Security Advisory: jasper security update
|
jasper: integer overflow in jas_image_cmpt_create() jasper: use-after-free and double-free flaws in mif_process_cmpt() jasper: double free issue in jas_iccattrval_destroy() jasper: out-of-bounds read in jpc_pi_nextcprl() jasper: matrix rows_ NULL pointer dereference in jas_matrix_clip() jasper: memory leak in jas_iccprof_createfrombuf() jasper: heap-based buffer overflow in QMFB code in JPC codec jasper: missing jas_matrix_create() parameter checks jasper: missing SIZ marker segment XRsiz and YRsiz fields range check jasper: missing SIZ marker segment XRsiz and YRsiz fields range check jasper: incorrect handling of bufsize 0 in mem_resize() jasper: reachable asserts in jpc_dec_tiledecode() jasper: missing jas_matrix_create() parameter checks jasper: missing jas_matrix_create() parameter checks jasper: integer truncation in jas_image_cmpt_create() jasper: integer overflow in jpc_dec_process_siz() jasper: reachable assertions in RAS encoder/decoder jasper: reachable assertions caused by insufficient component domains checks in ICT/RCT in JPC codec jasper: insufficient SIZ marker tilexoff and tileyoff checks jasper: reachable assertions in the JPC bitstream code jasper: insufficient SIZ marker segment data sanity checks jasper: insufficient SIZ marker segment data sanity checks jasper: insufficient SIZ marker segment data sanity checks jasper: stack-based buffer overflow in jpc_dec_tileinit() jasper: integer overflows leading to out of bounds read in packet iterators in JPC decoder jasper: use-after-free / double-free in JPC encoder jasper: JP2 encoder NULL pointer dereference due to uninitialized cmprof_ jasper: NULL pointer dereference in jpc_tsfb_synthesize() jasper: integer overflow in jas_matrix_create() jasper: integer overflow in jpc_pi_nextcprl(), leading to out-of-bounds read
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation",
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 5.5 | null |
RHSA-2023:4072
|
Red Hat Security Advisory: firefox security update
|
Mozilla: Use-after-free in WebRTC certificate generation Mozilla: Potential use-after-free from compartment mismatch in SpiderMonkey Mozilla: Fullscreen notification obscured Mozilla: Lack of warning when opening Diagcab files Mozilla: Memory safety bugs fixed in Firefox 115, Firefox ESR 102.13, and Thunderbird 102.13
|
[
"cpe:/a:redhat:rhel_e4s:8.1::appstream"
] | null | 8.8 | null | null |
RHSA-2016:1435
|
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 6.4.9 update
|
tomcat: URL Normalization issue JGroups: Authorization bypass
|
[
"cpe:/a:redhat:jboss_enterprise_application_platform:6.4"
] | null | null | 9.8 | null |
RHSA-2024:3854
|
Red Hat Security Advisory: kernel-rt security and bug fix update
|
kernel: KVM: SVM: improper check in svm_set_x2apic_msr_interception allows direct access to host x2apic msrs kernel: bluetooth: bt_sock_ioctl race condition leads to use-after-free in bt_sock_recvmsg kernel: net/mlx5e: fix a potential double-free in fs_any_create_groups kernel: kvm: Avoid potential UAF in LPI translation cache
|
[
"cpe:/a:redhat:rhel_eus:9.2::nfv",
"cpe:/a:redhat:rhel_eus:9.2::realtime"
] | null | 7.8 | null | null |
RHSA-2022:7683
|
Red Hat Security Advisory: kernel security, bug fix, and enhancement update
|
kernel: off-path attacker may inject data or terminate victim's TCP session kernel: race condition in VT_RESIZEX ioctl when vc_cons[i].d is already NULL leading to NULL pointer dereference kernel: use-after-free vulnerability in function sco_sock_sendmsg() kernel: memory leak for large arguments in video_usercopy function in drivers/media/v4l2-core/v4l2-ioctl.c kernel: veth: ensure skb entering GRO are not cloned. kernel: NFSD: Fix READDIR buffer overflow kernel: NFSD: Fix exposure in nfsd4_decode_bitmap() kernel: scsi: scsi_debug: Fix type in min_t to avoid stack OOB kernel: drm/virtio: Ensure that objs is not NULL in virtio_gpu_array_put_free() kernel: smb2_ioctl_query_info NULL pointer dereference kernel: NULL pointer dereference in udf_expand_file_adinicbdue() during writeback kernel: swiotlb information leak with DMA_FROM_DEVICE kernel: uninitialized registers on stack in nft_do_chain can cause kernel pointer leakage to UM kernel: race condition in snd_pcm_hw_free leading to use-after-free kernel: use-after-free in tc_new_tfilter() in net/sched/cls_api.c kernel: KVM: cmpxchg_gpte can write to pfns outside the userspace region kernel: use-after-free and memory errors in ext4 when mounting and operating on a corrupted image kernel: KVM: NULL pointer dereference in kvm_dirty_ring_push in virt/kvm/dirty_ring.c kernel: concurrency use-after-free between drm_setmaster_ioctl and drm_mode_getresources kernel: NULL pointer dereference in x86_emulate_insn may lead to DoS kernel: buffer overflow in nft_set_desc_concat_parse() kernel: KVM: NULL pointer dereference in kvm_irq_delivery_to_apic_fast() kernel: LoadPin bypass via dm-verity table reload kernel: nf_tables cross-table potential use-after-free may lead to local privilege escalation kernel: openvswitch: integer underflow leads to out-of-bounds write in reserve_sfa_size() kernel: use-after-free when psi trigger is destroyed while being polled kernel: hv_netvsc: NULL pointer dereference in netvsc_get_ethtool_stats() kernel: net/packet: slab-out-of-bounds access in packet_recvmsg() kernel: missing DM_TARGET_IMMUTABLE feature flag in verity_target in drivers/md/dm-verity-target.c kernel: possible to use the debugger to write zero into a location of choice hw: cpu: arm64: Spectre-BHB kernel: nfs_atomic_open() returns uninitialized data instead of ENOTDIR hw: cpu: Intel: Post-barrier Return Stack Buffer Predictions kernel: memory leak in drivers/hid/hid-elo.c kernel: double free in ems_usb_start_xmit in drivers/net/can/usb/ems_usb.c kernel: use after free in SUNRPC subsystem kernel: use-after-free due to improper update of reference count in net/sched/cls_u32.c kernel: DoS in nfqnl_mangle in net/netfilter/nfnetlink_queue.c kernel: ASoC: ops: Reject out of bounds values in snd_soc_put_volsw() kernel: KVM: LAPIC: Also cancel preemption timer during SET_LAPIC kernel: vsock: remove vsock from connected table when connect is interrupted by a signal kernel: netfilter: fix use-after-free in __nf_register_net_hook() kernel: thermal: core: Fix TZ_GET_TRIP NULL pointer dereference kernel: iwlwifi: mvm: check debugfs_dir ptr before use kernel: KVM: x86/mmu: make apf token non-zero to fix bug kernel: net/smc: Fix NULL pointer dereference in smc_pnet_find_ib() kernel: ath11k: Fix frames flush failure caused by deadlock kernel: ath11k: mhi: use mhi_sync_power_up() kernel: scsi: qla2xxx: Fix scheduling while atomic kernel: RDMA/nldev: Prevent underflow in nldev_stat_set_counter_dynamic_doit() kernel: ath9k_htc: fix uninit value bugs kernel: ext4: fix bug_on in ext4_writepages kernel: scsi: lpfc: Protect memory leak for NPIV ports sending PLOGI_RJT kernel: scsi: lpfc: Fix SCSI I/O completion and abort handler deadlock kernel: ALSA: jack: Access input_dev under mutex kernel: cifs: fix potential double free during failed mount kernel: ASoC: rt711-sdca: fix kernel NULL pointer dereference when IO error kernel: tipc: move bc link creation back to tipc_node_create kernel: RDMA/cm: Fix memory leak in ib_cm_insert_listen kernel: dm raid: fix KASAN warning in raid5_add_disks kernel: igb: fix a use-after-free issue in igb_clean_tx_ring kernel: netfilter: use get_random_u32 instead of prandom kernel: ext4: add reserved GDT blocks check
|
[
"cpe:/a:redhat:enterprise_linux:8::crb",
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 5.5 | null | null |
RHSA-2015:0349
|
Red Hat Security Advisory: qemu-kvm security, bug fix, and enhancement update
|
qemu: slirp: NULL pointer deref in sosendto() qemu: vnc: insufficient bits_per_pixel from the client sanitization qemu: insufficient parameter validation during ram load qemu: cirrus: insufficient blit region checks
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | null | null |
RHSA-2024:4938
|
Red Hat Security Advisory: httpd security update
|
httpd: Substitution encoding issue in mod_rewrite httpd: Improper escaping of output in mod_rewrite httpd: NULL pointer dereference in mod_proxy
|
[
"cpe:/o:redhat:rhel_aus:7.7::server"
] | null | 7.5 | null | null |
RHSA-2024:4276
|
Red Hat Security Advisory: qemu-kvm security update
|
qemu-kvm: 'qemu-img info' leads to host file read/write
|
[
"cpe:/a:redhat:rhel_e4s:9.0::appstream"
] | null | 7.8 | null | null |
RHSA-2024:2092
|
Red Hat Security Advisory: security update Logging for Red Hat OpenShift - 5.6.18
|
gmp: Integer overflow and resultant buffer overflow via crafted input less: missing quoting of shell metacharacters in LESSCLOSE handling curl: more POST-after-PUT confusion curl: cookie injection with none file curl: information disclosure by exploiting a mixed case flaw
|
[
"cpe:/a:redhat:logging:5.6::el8"
] | null | 5.3 | null | null |
RHSA-2023:7410
|
Red Hat Security Advisory: kpatch-patch security update
|
kernel: net/sched: cls_u32 component reference counter leak if tcf_change_indev() fails kernel: net/sched: cls_fw component can be exploited as result of failure in tcf_change_indev function
|
[
"cpe:/o:redhat:rhel_eus:8.6::baseos"
] | null | 7 | null | null |
RHSA-2024:1106
|
Red Hat Security Advisory: fwupd security update
|
fwupd: world readable password in /etc/fwupd/redfish.conf
|
[
"cpe:/a:redhat:rhel_eus:8.6::crb",
"cpe:/o:redhat:rhel_eus:8.6::baseos"
] | null | 5.5 | null | null |
RHSA-2017:0019
|
Red Hat Security Advisory: gstreamer-plugins-good security update
|
gstreamer-plugins-good: Heap buffer overflow in FLIC decoder gstreamer-plugins-good: Heap buffer overflow in FLIC decoder gstreamer-plugins-good: Heap buffer overflow in FLIC decoder gstreamer-plugins-good: Invalid memory read in flx_decode_chunks gstreamer-plugins-good: Heap buffer overflow in FLIC decoder
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 7.5 | null |
RHSA-2010:0968
|
Red Hat Security Advisory: thunderbird security update
|
Mozilla integer overflow vulnerability in NewIdArray (MFSA 2010-81) Mozilla crash and remote code execution using HTML tags inside a XUL tree (MFSA 2010-77) Mozilla miscellaneous memory safety hazards (MFSA 2010-74)
|
[
"cpe:/a:redhat:rhel_productivity:5",
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws",
"cpe:/o:redhat:enterprise_linux:5::client"
] | null | null | null | null |
RHSA-2023:3847
|
Red Hat Security Advisory: kernel security, bug fix, and enhancement update
|
kernel: tls: race condition in do_tls_getsockopt may lead to use-after-free or NULL pointer dereference
|
[
"cpe:/a:redhat:enterprise_linux:8::crb",
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 7 | null | null |
RHSA-2013:0511
|
Red Hat Security Advisory: pki-core security, bug fix and enhancement update
|
System: Multiple cross-site scripting flaws by displaying CRL or processing profile
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2015:0789
|
Red Hat Security Advisory: openstack-packstack and openstack-puppet-modules security and bug fix update
|
openstack-puppet-modules: pacemaker configured with default password
|
[
"cpe:/a:redhat:openstack:6::el7"
] | null | null | null | null |
RHSA-2015:2180
|
Red Hat Security Advisory: rubygem-bundler and rubygem-thor security, bug fix, and enhancement update
|
rubygem-bundler: 'bundle install' may install a gem from a source other than expected
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | null | null |
RHSA-2020:2863
|
Red Hat Security Advisory: Red Hat OpenShift Service Mesh 1.0 servicemesh-prometheus security update
|
kubernetes: YAML parsing vulnerable to "Billion Laughs" attack, allowing for remote denial of service
|
[
"cpe:/a:redhat:service_mesh:1.0::el8"
] | null | null | 7.5 | null |
RHSA-2020:3185
|
Red Hat Security Advisory: python-pillow security update
|
python-pillow: out-of-bounds read in ImagingFliDecode when loading FLI images python-pillow: out-of-bounds reads/writes in the parsing of SGI image files in expandrow/expandrow2
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 8.1 | null | null |
RHSA-2023:1368
|
Red Hat Security Advisory: nss security and bug fix update
|
nss: Arbitrary memory write via PKCS 12
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 8.8 | null | null |
RHSA-2017:2674
|
Red Hat Security Advisory: Red Hat Mobile Application Platform security update
|
RHMAP Millicore IDE allows RCE on SCM RHMAP: SSRF via external_request feature of App Studio RHMAP: Stored XSS in App Store git: Command injection via malicious ssh URLs
|
[
"cpe:/a:redhat:mobile_application_platform:4.5"
] | null | null | 6.3 | null |
RHSA-2024:6189
|
Red Hat Security Advisory: buildah security update
|
golang: crypto/x509: Verify panics on certificates with an unknown public key algorithm
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 5.9 | null | null |
RHSA-2016:2576
|
Red Hat Security Advisory: libguestfs and virt-p2v security, bug fix, and enhancement update
|
ocaml: sizes arguments are sign-extended from 32 to 64 bits
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | null | null |
RHSA-2016:0064
|
Red Hat Security Advisory: kernel security update
|
kernel: Possible use-after-free vulnerability in keyring facility
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | null | null |
RHSA-2014:0342
|
Red Hat Security Advisory: wireshark security update
|
wireshark: IEEE 802.15.4 dissector crash (wnpa-sec-2013-61) wireshark: NBAP dissector crash (wnpa-sec-2013-62) wireshark: SIP dissector crash (wnpa-sec-2013-63) wireshark: ActiveMQ OpenWire dissector large loop (wnpa-sec-2013-64) wireshark: TCP dissector crash (wnpa-sec-2013-65) wireshark: SIP dissector could go into an infinite loop (wnpa-sec-2013-66) wireshark: NTLMSSP v2 dissector could crash (wnpa-sec-2013-68) wireshark: NFS dissector crash (wnpa-sec-2014-01) wireshark: RLC dissector crash (wnpa-sec-2014-03) wireshark: buffer overflow in MPEG file parser (wnpa-sec-2014-04)
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2022:6521
|
Red Hat Security Advisory: .NET 6.0 security and bugfix update
|
dotnet: DenialOfService - ASP.NET Core MVC vulnerable to stack overflow via ModelStateDictionary recursion.
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::crb"
] | null | 7.5 | null | null |
RHSA-2004:003
|
Red Hat Security Advisory: : Updated CVS packages fix minor security issue
|
security flaw
|
[
"cpe:/o:redhat:linux:9"
] | null | null | null | null |
RHSA-2022:2272
|
Red Hat Security Advisory: OpenShift Container Platform 4.8.41 bug fix and security update
|
openshift/router: route hijacking attack via crafted HAProxy configuration file
|
[
"cpe:/a:redhat:openshift:4.8::el8"
] | null | 6.3 | null | null |
RHSA-2020:3218
|
Red Hat Security Advisory: kernel security and bug fix update
|
kernel: lockdown: bypass through ACPI write via efivar_ssdt kernel: lockdown: bypass through ACPI write via acpi_configfs
|
[
"cpe:/a:redhat:enterprise_linux:8::crb",
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 6.4 | null | null |
RHSA-2014:0763
|
Red Hat Security Advisory: rubygem-openshift-origin-node security update
|
Origin: Command execution as root via downloadable cartridge source-url
|
[
"cpe:/a:redhat:openshift:2.0::el6"
] | null | null | null | null |
RHSA-2019:3898
|
Red Hat Security Advisory: libcomps security update
|
libcomps: use after free when merging two objmrtrees
|
[
"cpe:/a:redhat:rhel_extras_other:7"
] | null | null | 7.5 | null |
RHSA-2023:3189
|
Red Hat Security Advisory: emacs security update
|
emacs: command injection vulnerability in org-mode
|
[
"cpe:/a:redhat:rhel_e4s:8.1::appstream",
"cpe:/o:redhat:rhel_e4s:8.1::baseos"
] | null | 7.8 | null | null |
RHSA-2015:0841
|
Red Hat Security Advisory: redhat-access-plugin security update
|
dashboard: log file arbitrary file retrieval
|
[
"cpe:/a:redhat:openstack:5::el6"
] | null | null | null | null |
RHSA-2018:0520
|
Red Hat Security Advisory: flash-plugin security update
|
flash-plugin: Use After Free - remote code execution vulnerability (APSB18-05) flash-plugin: Type Confusion - remote code execution vulnerability (APSB18-05)
|
[
"cpe:/a:redhat:rhel_extras:6"
] | null | null | 8.8 | null |
RHSA-2023:5491
|
Red Hat Security Advisory: Red Hat AMQ Broker 7.11.2 release and security update
|
keycloak: Untrusted Certificate Validation guava: insecure temporary directory creation apache-johnzon: Prevent inefficient internal conversion from BigDecimal at large scale
|
[
"cpe:/a:redhat:amq_broker:7"
] | null | 5.3 | null | null |
RHSA-2025:0851
|
Red Hat Security Advisory: Red Hat Advanced Cluster Management 2.12.2 security and bug fix updates
|
golang.org/x/crypto/ssh: Misuse of ServerConfig.PublicKeyCallback may cause authorization bypass in golang.org/x/crypto golang.org/x/net/html: Non-linear parsing of case-insensitive content in golang.org/x/net/html nanoid: nanoid mishandles non-integer values
|
[
"cpe:/a:redhat:acm:2.12::el9"
] | null | 6.5 | null | null |
RHSA-2017:1232
|
Red Hat Security Advisory: kernel security update
|
kernel: Race condition access to n_hdlc.tbuf causes double free in n_hdlc_release()
|
[
"cpe:/o:redhat:rhel_aus:6.5::server",
"cpe:/o:redhat:rhel_tus:6.5::server"
] | null | null | 7.8 | null |
RHSA-2023:6961
|
Red Hat Security Advisory: qt5-qtsvg security update
|
qt: Uninitialized variable usage in m_unitsPerEm
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 6.5 | null | null |
RHSA-2012:0745
|
Red Hat Security Advisory: python security update
|
python: potential XSS in SimpleHTTPServer's list_directory() python: distutils creates ~/.pypirc insecurely python: hash table collisions CPU usage DoS (oCERT-2011-003)
|
[
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2020:1276
|
Red Hat Security Advisory: OpenShift Container Platform 4.3.10 openshift security update
|
kubernetes: crafted requests to kubelet API allow for memory exhaustion
|
[
"cpe:/a:redhat:openshift:4.3::el7",
"cpe:/a:redhat:openshift:4.3::el8"
] | null | 4.3 | null | null |
RHSA-2010:1002
|
Red Hat Security Advisory: mod_auth_mysql security update
|
mod_auth_mysql: character encoding SQL injection flaw
|
[
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2017:3472
|
Red Hat Security Advisory: qemu-kvm-rhev security update
|
Qemu: qemu-nbd crashes due to undefined I/O coroutine Qemu: qemu-nbd: server breaks with SIGPIPE upon client abort Qemu: exec: oob access during dma operation Qemu: i386: multiboot OOB access while loading kernel image Qemu: cirrus: OOB access issue in mode4and5 write functions
|
[
"cpe:/a:redhat:openstack:7::el7"
] | null | null | 4.4 | null |
RHSA-2019:2818
|
Red Hat Security Advisory: OpenShift Container Platform 3.11 security update
|
openshift-ansible: dockergc service account incorrectly associated with namespace during upgrade
|
[
"cpe:/a:redhat:openshift:3.11::el7"
] | null | null | 7.5 | null |
RHSA-2019:2938
|
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.2.4 security update
|
undertow: Information leak in requests for directories without trailing slashes codehaus: incomplete fix for unsafe deserialization in jackson-databind vulnerabilities undertow: DEBUG log for io.undertow.request.security if enabled leaks credentials to log files jackson-databind: polymorphic typing issue allows attacker to read arbitrary local files on the server. jackson-databind: failure to block the logback-core class from polymorphic deserialization leading to remote code execution jackson-databind: polymorphic typing issue allows attacker to read arbitrary local files on the server via crafted JSON message. jackson-databind: default typing mishandling leading to remote code execution Undertow: Memory Leak in Undertow HttpOpenListener due to holding remoting connections indefinitely
|
[
"cpe:/a:redhat:jboss_enterprise_application_platform:7.2"
] | null | null | 5.9 | null |
RHSA-2023:4038
|
Red Hat Security Advisory: python38:3.8 and python38-devel:3.8 security update
|
python: urllib.parse url blocklisting bypass
|
[
"cpe:/a:redhat:rhel_aus:8.2::appstream",
"cpe:/a:redhat:rhel_e4s:8.2::appstream",
"cpe:/a:redhat:rhel_tus:8.2::appstream"
] | null | 7.5 | null | null |
RHSA-2017:1658
|
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 6.4.16 natives update
|
openssl: Possible integer overflow vulnerabilities in codebase openssl: Non-constant time codepath followed for certain operations in DSA implementation openssl: OCSP Status Request extension unbounded memory growth SSL/TLS: Malformed plain-text ALERT packets could cause remote DoS
|
[
"cpe:/a:redhat:jboss_enterprise_application_platform:6::el6",
"cpe:/a:redhat:jboss_enterprise_application_platform:6::el7"
] | null | null | 7.5 | null |
RHSA-2010:0839
|
Red Hat Security Advisory: kernel security and bug fix update
|
kernel: io_submit_one() NULL ptr deref kernel: do_io_submit() infoleak kernel: xfs: XFS_IOC_FSGETXATTR ioctl memory leak kernel panic via futex kernel: thinkpad-acpi: lock down video output state access kernel: net/sched/act_police.c infoleak
|
[
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2022:6119
|
Red Hat Security Advisory: podman security and bug fix update
|
podman: Security regression of CVE-2020-8945 due to source code management issue podman: Security regression of CVE-2020-14370 due to source code management issue
|
[
"cpe:/a:redhat:rhel_extras_other:7"
] | null | 5.3 | null | null |
RHSA-2006:0157
|
Red Hat Security Advisory: struts security update for Red Hat Application Server
|
security flaw
|
[
"cpe:/a:redhat:rhel_application_server:1"
] | null | null | null | null |
RHSA-2008:1023
|
Red Hat Security Advisory: pidgin security and bug fix update
|
pidgin: remote DoS via MSN message with crafted file name pidgin: unrestricted download of arbitrary files triggered via UPnP pidgin: NSS plugin doesn't verify SSL certificates
|
[
"cpe:/a:redhat:rhel_productivity:5",
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws",
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation"
] | null | null | null | null |
RHSA-2023:2124
|
Red Hat Security Advisory: libreswan security update
|
libreswan: Malicious IKEv1 Aggressive Mode packets can crash libreswan
|
[
"cpe:/a:redhat:rhel_aus:8.2::appstream",
"cpe:/a:redhat:rhel_e4s:8.2::appstream",
"cpe:/a:redhat:rhel_tus:8.2::appstream"
] | null | 7.5 | null | null |
RHBA-2004:164
|
Red Hat Bug Fix Advisory: Updated vsftpd package fixes signal handling bug
|
security flaw
|
[
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::es"
] | null | null | null | null |
RHSA-2024:1677
|
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.4.16 Security update
|
undertow: unrestricted request storage leads to memory exhaustion undertow: Cookie Smuggling/Spoofing ssh: Prefix truncation attack on Binary Packet Protocol (BPP) undertow: directory traversal vulnerability undertow: Out-of-memory Error after several closed connections with wildfly-http-client protocol
|
[
"cpe:/a:redhat:jboss_enterprise_application_platform:7.4"
] | null | 7.5 | null | null |
RHSA-2021:3492
|
Red Hat Security Advisory: cyrus-imapd security update
|
cyrus-imapd: Denial of service via string hashing algorithm collisions
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 7.5 | null | null |
RHSA-2018:2001
|
Red Hat Security Advisory: qemu-kvm security update
|
hw: cpu: speculative store bypass
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 5.6 | null |
RHSA-2020:2816
|
Red Hat Security Advisory: RH-SSO 7.4.1 adapters for Red Hat JBoss Enterprise Application Platform 6
|
keycloak: Lack of checks in ObjectInputStream leading to Remote Code Execution
|
[
"cpe:/a:redhat:jboss_enterprise_application_platform:6::el6",
"cpe:/a:redhat:jboss_enterprise_application_platform:6::el7"
] | null | null | 7.5 | null |
RHSA-2024:3820
|
Red Hat Security Advisory: fence-agents security update
|
jinja2: accepts keys containing non-attribute characters
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::highavailability",
"cpe:/a:redhat:enterprise_linux:9::resilientstorage"
] | null | 5.4 | null | null |
RHSA-2008:1016
|
Red Hat Security Advisory: enscript security update
|
enscript: "setfilename" special escape buffer overflow enscript: "font" special escape buffer overflows
|
[
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2021:2028
|
Red Hat Security Advisory: bind security update
|
bind: An assertion check can fail while answering queries for DNAME records that require the DNAME to be processed to resolve itself
|
[
"cpe:/a:redhat:rhel_eus:8.1::appstream",
"cpe:/o:redhat:rhel_eus:8.1::baseos"
] | null | 7.5 | null | null |
RHSA-2019:3157
|
Red Hat Security Advisory: java-1.7.0-openjdk security update
|
OpenJDK: Missing restrictions on use of custom SocketImpl (Networking, 8218573) OpenJDK: NULL pointer dereference in DrawGlyphList (2D, 8222690) OpenJDK: Unexpected exception thrown by Pattern processing crafted regular expression (Concurrency, 8222684) OpenJDK: Unexpected exception thrown by XPathParser processing crafted XPath expression (JAXP, 8223505) OpenJDK: Incorrect handling of nested jar: URLs in Jar URL handler (Networking, 8223892) OpenJDK: Unexpected exception thrown by XPath processing crafted XPath expression (JAXP, 8224532) OpenJDK: Unexpected exception thrown during Font object deserialization (Serialization, 8224915) OpenJDK: Missing glyph bitmap image dimension check in FreetypeFontScaler (2D, 8225286) OpenJDK: Integer overflow in bounds check in SunGraphics2D (2D, 8225292) OpenJDK: Incorrect handling of HTTP proxy responses in HttpURLConnection (Networking, 8225298) OpenJDK: Excessive memory allocation in CMap when reading TrueType font (2D, 8225597) OpenJDK: Insufficient filtering of HTML event attributes in Javadoc (Javadoc, 8226765)
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 4.7 | null |
RHSA-2022:0446
|
Red Hat Security Advisory: Red Hat Single Sign-On 7.4.10 security update
|
log4j: Remote code execution in Log4j 1.x when application is configured to use JMSAppender log4j: Remote code execution in Log4j 1.x when application is configured to use JMSSink log4j: SQL injection in Log4j 1.x when application is configured to use JDBCAppender log4j: Unsafe deserialization flaw in Chainsaw log viewer
|
[
"cpe:/a:redhat:red_hat_single_sign_on:7"
] | null | 8.8 | null | null |
RHSA-2020:1349
|
Red Hat Security Advisory: krb5-appl security update
|
telnet-server: no bounds checks in nextitem() function allows to remotely execute arbitrary code
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | 9.8 | null | null |
RHSA-2022:5893
|
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.4.6 Security update
|
minimist: prototype pollution netty: world readable temporary file containing sensitive data com.google.code.gson-gson: Deserialization of Untrusted Data in com.google.code.gson-gson
|
[
"cpe:/a:redhat:jboss_enterprise_application_platform:7.4::el8"
] | null | 7.5 | null | null |
RHSA-2023:7857
|
Red Hat Security Advisory: Red Hat Single Sign-On 7.6.6 for OpenShift image enhancement and security update
|
keycloak: reflected XSS via wildcard in OIDC redirect_uri keycloak: redirect_uri validation bypass keycloak: offline session token DoS
|
[
"cpe:/a:redhat:rhosemc:1.0::el8"
] | null | 7.7 | null | null |
RHSA-2024:11091
|
Red Hat Security Advisory: python36:3.6 security update
|
virtualenv: potential command injection via virtual environment activation scripts
|
[
"cpe:/a:redhat:rhel_aus:8.2::appstream"
] | null | 7.8 | null | null |
RHSA-2019:3467
|
Red Hat Security Advisory: dovecot security and bug fix update
|
dovecot: Improper certificate validation
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb"
] | null | null | 7.7 | null |
RHSA-2020:1933
|
Red Hat Security Advisory: targetcli security update
|
targetcli: world writable /var/run/targetclid.sock allows unprivileged user to execute commands
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 7.8 | null | null |
RHSA-2024:1914
|
Red Hat Security Advisory: Red Hat JBoss Web Server 5.8.0 release and security update
|
Tomcat: WebSocket DoS with incomplete closing handshake
|
[
"cpe:/a:redhat:jboss_enterprise_web_server:5.8"
] | null | 7.5 | null | null |
RHSA-2015:2455
|
Red Hat Security Advisory: unbound security and bug fix update
|
unbound: specially crafted request can lead to denial of service
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | null | null |
RHSA-2024:0451
|
Red Hat Security Advisory: gnutls security update
|
gnutls: timing side-channel in the RSA-PSK authentication
|
[
"cpe:/a:redhat:rhel_eus:9.2::appstream",
"cpe:/o:redhat:rhel_eus:9.2::baseos"
] | null | 5.9 | null | null |
RHSA-2024:1746
|
Red Hat Security Advisory: kernel security update
|
kernel: use-after-free in l2cap_connect and l2cap_le_connect_req in net/bluetooth/l2cap_core.c Kernel: bluetooth: Unauthorized management command execution kernel: net/sched: sch_hfsc UAF
|
[
"cpe:/o:redhat:rhel_aus:7.7::server"
] | null | 7.8 | null | null |
RHSA-2021:1184
|
Red Hat Security Advisory: RHV RHEL Host (ovirt-host) 4.4.z [ovirt-4.4.5] security, bug fix, enhancement
|
datatables.net: prototype pollution if 'constructor' were used in a data property name
|
[
"cpe:/o:redhat:rhev_hypervisor:4.4::el8"
] | null | 7.3 | null | null |
RHSA-2009:1222
|
Red Hat Security Advisory: kernel security and bug fix update
|
kernel: uninit op in SOCKOPS_WRAP() leads to privesc kernel: udp socket NULL ptr dereference
|
[
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2024:2842
|
Red Hat Security Advisory: .NET 8.0 security update
|
dotnet: stack buffer overrun in Double Parse dotnet: denial of service in ASP.NET Core due to deadlock in Http2OutputProducer.Stop()
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::crb"
] | null | 5.9 | null | null |
RHSA-2007:0348
|
Red Hat Security Advisory: php security update
|
php libxmlrpc library overflow php CRLF injection php make_http_soap_request flaw
|
[
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2013:1101
|
Red Hat Security Advisory: virtio-win security update
|
qemu: qemu-ga win32 service unquoted search path
|
[
"cpe:/a:redhat:rhel_extras:6"
] | null | null | null | null |
RHSA-2013:0683
|
Red Hat Security Advisory: axis security update
|
axis: missing connection hostname check against X.509 certificate name
|
[
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2023:2736
|
Red Hat Security Advisory: kernel-rt security and bug fix update
|
hw: cpu: AMD CPUs may transiently execute beyond unconditional direct branch kernel: malicious data for FBIOPUT_VSCREENINFO ioctl may cause OOB write memory kernel: when setting font with malicious data by ioctl PIO_FONT, kernel will write memory out of bounds kernel: net: stmmac: fix tc flower deletion for VLAN priority Rx steering kernel: possible race condition in drivers/tty/tty_buffers.c kernel: use-after-free in ath9k_htc_probe_device() could cause an escalation of privileges kernel: KVM: NULL pointer dereference in kvm_mmu_invpcid_gva kernel: KVM: nVMX: missing IBPB when exiting from nested guest can lead to Spectre v2 attacks kernel: netfilter: nf_conntrack_irc message handling issue kernel: race condition in xfrm_probe_algs can lead to OOB read/write kernel: media: em28xx: initialize refcount before kref_get kernel: race condition in hugetlb_no_page() in mm/hugetlb.c kernel: memory leak in ipv6_renew_options() kernel: use-after-free caused by l2cap_reassemble_sdu() in net/bluetooth/l2cap_core.c kernel: data races around icsk->icsk_af_ops in do_ipv6_setsockopt kernel: data races around sk->sk_prot kernel: memory leak in l2cap_recv_acldata of the file net/bluetooth/l2cap_core.c kernel: denial of service in follow_page_pte in mm/gup.c due to poisoned pte entry kernel: use-after-free after failed devlink reload in devlink_param_get kernel: USB-accessible buffer overflow in brcmfmac kernel: Double-free in split_2MB_gtt_entry when function intel_gvt_dma_map_guest_page failed kernel: l2tp: missing lock when clearing sk_user_data can lead to NULL pointer dereference kernel: Recursive locking violation in usb-storage that can cause the kernel to deadlock kernel: igmp: use-after-free in ip_check_mc_rcu when opening and closing inet sockets kernel: Executable Space Protection Bypass kernel: Unprivileged users may use PTRACE_SEIZE to set PTRACE_O_SUSPEND_SECCOMP option kernel: xfrm_expand_policies() in net/xfrm/xfrm_policy.c can cause a refcount to be dropped twice kernel: unmap_mapping_range() race with munmap() on VM_PFNMAP mappings leads to stale TLB entry kernel: TLB flush operations are mishandled in certain KVM_VCPU_PREEMPTED leading to guest malfunctioning kernel: Report vmalloc UAF in dvb-core/dmxdev kernel: u8 overflow problem in cfg80211_update_notlisted_nontrans() kernel: use-after-free related to leaf anon_vma double reuse kernel: use-after-free in bss_ref_get in net/wireless/scan.c kernel: BSS list corruption in cfg80211_add_nontrans_list in net/wireless/scan.c kernel: Denial of service in beacon protection for P2P-device kernel: memory corruption in usbmon driver kernel: NULL pointer dereference in traffic control subsystem kernel: scsi: mpt3sas: Fix use-after-free warning kernel: NULL pointer dereference in rawv6_push_pending_frames kernel: net/ulp: use-after-free in listening ULP sockets kernel: netfilter: NULL pointer dereference in nf_tables due to zeroed list head kernel: use-after-free caused by invalid pointer hostname in fs/cifs/connect.c kernel: Soft lockup occurred during __page_mapcount Kernel: NULL pointer dereference problem in sctp_sched_dequeue_common kernel: drm/virtio: improper return value check in virtio_gpu_object_shmem_init() kernel: slab-out-of-bounds read vulnerabilities in cbq_classify
|
[
"cpe:/a:redhat:enterprise_linux:8::nfv",
"cpe:/a:redhat:enterprise_linux:8::realtime"
] | null | 4.2 | null | null |
RHSA-2023:0625
|
Red Hat Security Advisory: libksba security update
|
libksba: integer overflow to code execution
|
[
"cpe:/a:redhat:enterprise_linux:8::crb",
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 8.6 | null | null |
RHSA-2019:2043
|
Red Hat Security Advisory: kernel-rt security and bug fix update
|
kernel: Information exposure in fd_locked_ioctl function in drivers/block/floppy.c kernel: Memory leak in drivers/net/wireless/mac80211_hwsim.c:hwsim_new_radio_nl() can lead to potential denial of service kernel: Buffer overflow in hidp_process_report kernel: HID: debug: Buffer overflow in hid_debug_events_read() in drivers/hid/hid-debug.c kernel: l2tp: Race condition between pppol2tp_session_create() and l2tp_eth_create() kernel: kvm: guest userspace to guest kernel write kernel: Integer overflow in the alarm_timer_nsleep function kernel: NULL pointer dereference in lookup_slow function kernel: NULL pointer dereference in xfs_da_shrink_inode function kernel: NULL pointer dereference in fs/xfs/libxfs/xfs_inode_buf.c kernel: use-after-free Read in vhost_transport_send_pkt kernel: use-after-free in ucma_leave_multicast in drivers/infiniband/core/ucma.c kernel: Mishandling of indirect calls weakens Spectre mitigation for paravirtual guests kernel: Information leak in cdrom_ioctl_drive_status kernel: out-of-bound read in memcpy_fromiovecend() kernel: TLB flush happens too late on mremap kernel: Heap address information leak while using L2CAP_GET_CONF_OPT kernel: Heap address information leak while using L2CAP_PARSE_CONF_RSP kernel: denial of service vector through vfio DMA mappings Kernel: vhost_net: infinite loop while receiving packets leads to DoS Kernel: page cache side channel attacks Kernel: KVM: leak of uninitialized stack contents to guest kernel: OOB write due to missing bounds check leads to local privilege escalation kernel: overlayfs: NULL pointer dereference in ovl_posix_acl_create function in fs/overlayfs/dir.c kernel: fix race condition between mmget_not_zero()/get_task_mm() and core dumping kernel: a NULL pointer dereference in drivers/scsi/megaraid/megaraid_sas_base.c leading to DoS kernel: fs/ext4/extents.c leads to information disclosure
|
[
"cpe:/a:redhat:rhel_extras_rt:7"
] | null | 6.7 | 5.5 | null |
RHSA-2018:1815
|
Red Hat Security Advisory: chromium-browser security update
|
chromium-browser: Use after free in Blink chromium-browser: Type confusion in Blink chromium-browser: Overly permissive policy in WebUSB Skia: Heap buffer overflow rasterizing paths in SVG chromium-browser: Use after free in indexedDB chromium-browser: Out of bounds memory access in WebRTC chromium-browser: Out of bounds memory access in WebRTC chromium-browser: Incorrect mutability protection in WebAssembly chromium-browser: Use of uninitialized memory in WebRTC chromium-browser: URL spoof in Omnibox chromium-browser: Referrer Policy bypass in Blink chromium-browser: UI spoofing in Blink chromium-browser: Out of bounds memory access in V8 chromium-browser: Leak of visited status of page in Blink chromium-browser: Overly permissive policy in Extensions chromium-browser: Restrictions bypass in the debugger extension API chromium-browser: Restrictions bypass in the debugger extension API chromium-browser: Heap buffer overflow in Skia chromium-browser: Out of bounds memory access in V8 chromium-browser: Out of bounds memory access in V8 chromium-browser: Out of bounds memory access in PDFium chromium-browser: Incorrect escaping of MathML in Blink chromium-browser: Password fields not taking advantage of OS protections in Views
|
[
"cpe:/a:redhat:rhel_extras:6"
] | null | null | 4.3 | null |
RHSA-2021:1352
|
Red Hat Security Advisory: thunderbird security update
|
Mozilla: More internal network hosts could have been probed by a malicious webpage Mozilla: Out of bound write due to lazy initialization Mozilla: Use-after-free in Responsive Design Mode Mozilla: Secure Lock icon could have been spoofed Mozilla: Blob URLs may have been granted additional privileges Mozilla: Arbitrary FTP command execution on FTP servers using an encoded URL Mozilla: Incorrect size computation in WebAssembly JIT could lead to null-reads Mozilla: Port blocking could be bypassed Mozilla: Race condition when reading from disk while verifying signatures
|
[
"cpe:/a:redhat:rhel_eus:8.2::appstream"
] | null | 2.5 | 6.1 | null |
RHSA-2019:2661
|
Red Hat Security Advisory: Red Hat OpenShift Container Platform 4.1 openshift RPM security update
|
HTTP/2: flood using PING frames results in unbounded memory growth HTTP/2: flood using HEADERS frames results in unbounded memory growth
|
[
"cpe:/a:redhat:openshift:4.1::el7",
"cpe:/a:redhat:openshift:4.1::el8"
] | null | null | 7.5 | null |
RHSA-2024:11028
|
Red Hat Security Advisory: ruby:2.5 security update
|
rexml: REXML ReDoS vulnerability
|
[
"cpe:/a:redhat:rhel_aus:8.4::appstream",
"cpe:/a:redhat:rhel_e4s:8.4::appstream",
"cpe:/a:redhat:rhel_tus:8.4::appstream"
] | null | 7.5 | null | null |
RHSA-2015:1187
|
Red Hat Security Advisory: rh-php56-php security update
|
php: buffer over-read in Phar metadata parsing php: invalid pointer free() in phar_tar_process_metadata() php: buffer overflow in phar_set_inode() php: pipelined request executed in deinitialized interpreter under httpd 2.4 php: missing null byte checks for paths in various PHP extensions php: missing null byte checks for paths in various PHP extensions php: memory corruption in phar_parse_tarfile caused by empty entry file name php: integer overflow leading to heap overflow when reading FTP file listing php: multipart/form-data request parsing CPU usage DoS php: regressions in 5.4+ php: pcntl_exec() accepts paths with NUL character php: missing null byte checks for paths in DOM and GD extensions php: Incomplete Class unserialization type confusion php: exception:: getTraceAsString type confusion issue after unserialize php: denial of service when processing a crafted file with Fileinfo php: denial of service when processing a crafted file with Fileinfo php: integer overflow in ftp_genlist() resulting in heap overflow (improved fix for CVE-2015-4022) php: NULL pointer dereference in php_pgsql_meta_data()
|
[
"cpe:/a:redhat:rhel_software_collections:2::el6",
"cpe:/a:redhat:rhel_software_collections:2::el7"
] | null | null | null | null |
RHSA-2006:0549
|
Red Hat Security Advisory: php security update for Stronghold
|
security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw
|
[
"cpe:/a:redhat:rhel_stronghold:4.0"
] | null | null | null | null |
RHSA-2022:1777
|
Red Hat Security Advisory: webkit2gtk3 security, bug fix, and enhancement update
|
webkitgtk: Use-after-free leading to arbitrary code execution webkitgtk: Type confusion issue leading to arbitrary code execution webkitgtk: Logic issue leading to HSTS bypass webkitgtk: Out-of-bounds read leading to memory disclosure webkitgtk: Memory corruption issue leading to arbitrary code execution webkitgtk: Memory corruption issue leading to arbitrary code execution webkitgtk: Multiple memory corruption issue leading to arbitrary code execution webkitgtk: Memory corruption issue leading to arbitrary code execution webkitgtk: CSS compositing issue leading to revealing of the browsing history webkitgtk: Logic issue leading to Content Security Policy bypass webkitgtk: Information leak via Content Security Policy reports webkitgtk: Buffer overflow leading to arbitrary code execution webkitgtk: Logic issue leading to universal cross-site scripting webkitgtk: Cross-origin data exfiltration via resource timing API webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution webkitgtk: Incorrect memory allocation in WebCore::ImageBufferCairoImageSurfaceBackend::create webkitgtk: use-after-free in WebCore::ContainerNode::firstChild webkitgtk: use-after-free in WebCore::Frame::page webkitgtk: Processing a maliciously crafted mail message may lead to running arbitrary javascript webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution webkitgtk: Processing maliciously crafted web content may prevent Content Security Policy from being enforced webkitgtk: A malicious website may exfiltrate data cross-origin webkitgtk: maliciously crafted web content may lead to arbitrary code execution due to use after free webkitgtk: logic issue was addressed with improved state management
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 8.8 | null | null |
RHSA-2023:7166
|
Red Hat Security Advisory: tpm2-tss security and enhancement update
|
tpm2-tss: Buffer Overlow in TSS2_RC_Decode
|
[
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 6.4 | null | null |
RHSA-2021:2992
|
Red Hat Security Advisory: rh-php73-php security, bug fix, and enhancement update
|
php: Use of freed hash key in the phar_parse_zipfile function php: Wrong ciphertext/tag in AES-CCM encryption for a 12 bytes IV php: URL decoding of cookie names can lead to different interpretation of cookies between browser and server php: FILTER_VALIDATE_URL accepts URLs with invalid userinfo php: NULL pointer dereference in SoapClient php: SSRF bypass in FILTER_VALIDATE_URL
|
[
"cpe:/a:redhat:rhel_software_collections:3::el7"
] | null | 5.3 | null | null |
RHSA-2024:0811
|
Red Hat Security Advisory: sudo security update
|
sudo: Sudo does not escape control characters in log messages sudo: Sudo does not escape control characters in sudoreplay output sudo: Targeted Corruption of Register and Stack Variables
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:rhel_eus:9.0::appstream",
"cpe:/a:redhat:rhel_eus:9.2::appstream",
"cpe:/o:redhat:enterprise_linux:8::baseos",
"cpe:/o:redhat:enterprise_linux:9::baseos",
"cpe:/o:redhat:rhel_eus:8.6::baseos",
"cpe:/o:redhat:rhel_eus:8.8::baseos",
"cpe:/o:redhat:rhel_eus:9.0::baseos",
"cpe:/o:redhat:rhel_eus:9.2::baseos"
] | null | 7 | null | null |
RHSA-2016:2130
|
Red Hat Security Advisory: mysql55-mysql security update
|
mysql: unspecified vulnerability in subcomponent: Server: Optimizer (CPU October 2016) mysql: unspecified vulnerability in subcomponent: Server: DML (CPU October 2016) mysql: race condition while setting stats during MyISAM table repair (CPU Oct 2016) mysql: insecure error log file handling in mysqld_safe (CPU Oct 2016) mysql: unspecified vulnerability in subcomponent: Server: DML (CPU October 2016) mysql: unspecified vulnerability in subcomponent: Server: GIS (CPU October 2016) mysql: unspecified vulnerability in subcomponent: Server: Federated (CPU October 2016) mysql: general_log can write to configuration files, leading to privilege escalation (CPU Oct 2016) mysql: race condition while setting stats during MyISAM table repair (CPU Oct 2016) mysql: insecure error log file handling in mysqld_safe (CPU Oct 2016) mysql: unspecified vulnerability in subcomponent: Server: Types (CPU October 2016)
|
[
"cpe:/a:redhat:rhel_software_collections:2::el6",
"cpe:/a:redhat:rhel_software_collections:2::el7"
] | null | null | 4.3 | null |
RHSA-2009:1526
|
Red Hat Security Advisory: Red Hat Enterprise Linux 3 - 1-Year End Of Life Notice
|
This is the 1-year notification of the End Of Life plans for Red Hat
Enterprise Linux 3.
|
[
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws"
] | null | null | null | null |
RHSA-2017:3451
|
Red Hat Security Advisory: rh-java-common-lucene security update
|
Solr: Code execution via entity expansion
|
[
"cpe:/a:redhat:rhel_software_collections:3::el6",
"cpe:/a:redhat:rhel_software_collections:3::el7"
] | null | null | 9.8 | null |
RHSA-2016:2119
|
Red Hat Security Advisory: flash-plugin security update
|
flash-plugin: use-after-free issue fixed in APSB16-36
|
[
"cpe:/a:redhat:rhel_extras:5::client",
"cpe:/a:redhat:rhel_extras:5::server",
"cpe:/a:redhat:rhel_extras:6"
] | null | null | 8.8 | null |
RHSA-2018:1949
|
Red Hat Security Advisory: ansible security and bug fix update
|
ansible: Failed tasks do not honour no_log option allowing for secrets to be disclosed in logs
|
[
"cpe:/a:redhat:ansible_engine:2.5::el7"
] | null | null | 5.9 | null |
RHSA-2019:1143
|
Red Hat Security Advisory: flatpak security update
|
flatpak: Sandbox bypass via IOCSTI (incomplete fix for CVE-2017-5226)
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | null | 8.8 | null |
RHSA-2023:1893
|
Red Hat Security Advisory: Multicluster Engine for Kubernetes 2.0 hotfix security update for console
|
vm2: sandbox escape vm2: Sandbox Escape vm2: Sandbox Escape when exception sanitization
|
[
"cpe:/a:redhat:multicluster_engine:2.0::el8"
] | null | 9.8 | null | null |
RHSA-2014:0981
|
Red Hat Security Advisory: kernel security, bug fix, and enhancement update
|
Kernel: futex: forbid uaddr == uaddr2 in futex_wait_requeue_pi() kernel: net: rds: dereference of a NULL device in rds_ib_laddr_check() kernel: ath9k: tid->sched race in ath_tx_aggr_sleep() kernel: net: rds: dereference of a NULL device in rds_iw_laddr_check() Kernel: net: mac80211: crash dues to AP powersave TX vs. wakeup race kernel: net: ping: refcount issue in ping_init_sock() function Kernel: filter: prevent nla extensions to peek beyond the end of the message Kernel: filter: prevent nla extensions to peek beyond the end of the message
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHBA-2019:0636
|
Red Hat Bug Fix Advisory: OpenShift Container Platform 3.11 bug fix and enhancement update
|
kubernetes: Mishandling of symlinks allows for arbitrary file write via `kubectl cp`
|
[
"cpe:/a:redhat:openshift:3.11::el7"
] | null | null | 5.3 | null |
RHSA-2024:7207
|
Red Hat Security Advisory: osbuild-composer security update
|
encoding/gob: golang: Calling Decoder.Decode on a message which contains deeply nested structures can cause a panic due to stack exhaustion
|
[
"cpe:/a:redhat:rhel_eus:9.2::appstream"
] | null | 7.5 | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.