id
stringlengths 13
15
| title
stringlengths 29
176
| description
stringlengths 8
32.1k
| cpes
listlengths 0
20
| cvss_v4_0
null | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
null |
---|---|---|---|---|---|---|---|
RHSA-2020:3669
|
Red Hat Security Advisory: postgresql:10 security and bug fix update
|
postgresql: Selectivity estimators bypass row security policies postgresql: Stack-based buffer overflow via setting a password postgresql: TYPE in pg_temp executes arbitrary SQL during SECURITY DEFINER execution postgresql: ALTER ... DEPENDS ON EXTENSION is missing authorization checks postgresql: Uncontrolled search path element in logical replication postgresql: Uncontrolled search path element in CREATE EXTENSION
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 7.1 | 7.5 | null |
RHSA-2025:4051
|
Red Hat Security Advisory: gnutls security update
|
gnutls: GnuTLS Impacted by Inefficient DER Decoding in libtasn1 Leading to Remote DoS
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 5.3 | null | null |
RHSA-2021:4918
|
Red Hat Security Advisory: Red Hat Integration Camel-K 1.6 release and security update
|
velocity: arbitrary code execution when attacker is able to modify templates RESTEasy: Caching routes in RootNode may result in DoS jackson-dataformat-cbor: Unchecked allocation of byte buffer can cause a java.lang.OutOfMemoryError exception mongo-java-driver: client-side field level encryption not verifying KMS host name XStream: allow a remote attacker to cause DoS only by manipulating the processed input stream XStream: SSRF via crafted input stream XStream: arbitrary file deletion on the local host via crafted input stream XStream: Unsafe deserizaliation of javax.sql.rowset.BaseRowSet XStream: Unsafe deserizaliation of com.sun.corba.se.impl.activation.ServerTableEntry XStream: Unsafe deserizaliation of sun.swing.SwingLazyValue XStream: Unsafe deserizaliation of com.sun.tools.javac.processing.JavacProcessingEnvironment NameProcessIterator XStream: ReDoS vulnerability XStream: Unsafe deserizaliation of com.sun.org.apache.bcel.internal.util.ClassLoader XStream: allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream spring-web: (re)creating the temporary storage directory could result in a privilege escalation within WebFlux application json-smart: uncaught exception may lead to crash or information disclosure XStream: remote command execution attack by manipulating the processed input stream pdfbox: infinite loop while loading a crafted PDF file xstream: Arbitrary code execution via unsafe deserialization of Xalan xsltc.trax.TemplatesImpl xstream: Infinite loop DoS via unsafe deserialization of sun.reflect.annotation.AnnotationInvocationHandler xstream: Arbitrary code execution via unsafe deserialization of com.sun.xml.internal.ws.client.sei.* xstream: Arbitrary code execution via unsafe deserialization of sun.tracing.* xstream: Arbitrary code execution via unsafe deserialization of com.sun.jndi.ldap.LdapBindingEnumeration xstream: Arbitrary code execution via unsafe deserialization of javax.swing.UIDefaults$ProxyLazyValue xstream: Arbitrary code execution via unsafe deserialization of com.sun.jndi.ldap.LdapSearchEnumeration xstream: Arbitrary code execution via unsafe deserialization of com.sun.jndi.toolkit.dir.ContextEnumerator xstream: Arbitrary code execution via unsafe deserialization of com.sun.corba.* xstream: Server-side request forgery (SSRF) via unsafe deserialization of com.sun.xml.internal.ws.client.sei.* xstream: Arbitrary code execution via unsafe deserialization of com.sun.jndi.ldap.LdapBindingEnumeration xstream: Server-side request forgery (SSRF) via unsafe deserialization of jdk.nashorn.internal.runtime.Source$URLData xstream: Arbitrary code execution via unsafe deserialization of Xalan xsltc.trax.TemplatesImpl xstream: Arbitrary code execution via unsafe deserialization of javax.swing.UIDefaults$ProxyLazyValue
|
[
"cpe:/a:redhat:integration:1"
] | null | 8.5 | null | null |
RHSA-2015:1634
|
Red Hat Security Advisory: sqlite security update
|
sqlite: stack buffer overflow in src/printf.c
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2021:2583
|
Red Hat Security Advisory: python38:3.8 and python38-devel:3.8 security update
|
PyYAML: incomplete fix for CVE-2020-1747
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb"
] | null | 9.8 | null | null |
RHSA-2015:1003
|
Red Hat Security Advisory: kvm security update
|
qemu: fdc: out-of-bounds fifo buffer memory access
|
[
"cpe:/a:redhat:rhel_virtualization:5::client",
"cpe:/a:redhat:rhel_virtualization:5::server"
] | null | null | null | null |
RHSA-2007:0065
|
Red Hat Security Advisory: bluez-utils security update
|
security flaw
|
[
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2009:1426
|
Red Hat Security Advisory: openoffice.org security update
|
OpenOffice.org Word document Integer Underflow OpenOffice.org Word document buffer overflow
|
[
"cpe:/a:redhat:rhel_productivity:5",
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws",
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws",
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation"
] | null | null | null | null |
RHSA-2024:4015
|
Red Hat Security Advisory: thunderbird security update
|
Mozilla: Use-after-free in JavaScript object transplant Mozilla: External protocol handlers leaked by timing attack Mozilla: Sandboxed iframes were able to bypass sandbox restrictions to open a new window Mozilla: Cross-Origin Image leak via Offscreen Canvas Mozilla: Memory Corruption in Text Fragments Mozilla: Memory safety bugs fixed in Firefox 127, Firefox ESR 115.12, and Thunderbird 115.12 Mozilla: Use-after-free in networking
|
[
"cpe:/a:redhat:rhel_e4s:9.0::appstream"
] | null | 7.5 | null | null |
RHSA-2021:3968
|
Red Hat Security Advisory: OpenJDK 11.0.13 security update for Windows Builds
|
OpenJDK: Weak ciphers preferred over stronger ones for TLS (JSSE, 8264210) OpenJDK: Excessive memory allocation in RTFParser (Swing, 8265167) OpenJDK: Excessive memory allocation in RTFReader (Swing, 8265580) OpenJDK: Excessive memory allocation in HashMap and HashSet (Utility, 8266097) OpenJDK: Certificates with end dates too far in the future can corrupt keystore (Keytool, 8266137) OpenJDK: Loop in HttpsServer triggered during TLS session close (JSSE, 8254967) OpenJDK: Incorrect principal selection when using Kerberos Constrained Delegation (Libraries, 8266689) OpenJDK: Unexpected exception raised during TLS handshake (JSSE, 8267729) OpenJDK: Excessive memory allocation in BMPImageReader (ImageIO, 8267735) OpenJDK: Non-constant comparison during TLS handshakes (JSSE, 8269618)
|
[
"cpe:/a:redhat:openjdk:11::windows"
] | null | 3.7 | null | null |
RHSA-2020:4391
|
Red Hat Security Advisory: openstack-cinder security update
|
openstack-cinder: Improper handling of ScaleIO backend credentials
|
[
"cpe:/a:redhat:openstack:13::el7"
] | null | 6.5 | null | null |
RHSA-2004:136
|
Red Hat Security Advisory: ethereal security update
|
security flaw security flaw security flaw security flaw
|
[
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws"
] | null | null | null | null |
RHSA-2007:0107
|
Red Hat Security Advisory: gnupg security update
|
gnupg/gpgme signed message spoofing
|
[
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2013:1437
|
Red Hat Security Advisory: Red Hat JBoss Portal 6.1.0 update
|
Tomcat/JBoss Web - Bypass of CSRF prevention filter Web: jsessionid exposed via encoded url when using cookie based session tracking JBoss: custom authorization module implementations shared between applications apache-cxf: XML encryption backwards compatibility attacks PicketBox: Insecure storage of masked passwords tomcat: Session fixation in form authenticator Gatein: JGroups configurations enable diagnostics without authentication apache-cxf: Multiple denial of service flaws in the StAX parser Java: XML signature spoofing JGroups: Authentication via cached credentials remote-naming: Session fixation due improper connection caching ejb-client: Session fixation due improper connection caching Bayeux: Reflected Cross-Site Scripting (XSS)
|
[
"cpe:/a:redhat:jboss_enterprise_portal_platform:6.1.0"
] | null | null | null | null |
RHSA-2001:060
|
Red Hat Security Advisory: : Updated Kerberos 5 packages available
|
security flaw
|
[
"cpe:/o:redhat:linux:6.2",
"cpe:/o:redhat:linux:7.0",
"cpe:/o:redhat:linux:7.1"
] | null | null | null | null |
RHSA-2004:654
|
Red Hat Security Advisory: squirrelmail security update
|
security flaw
|
[
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws"
] | null | null | null | null |
RHSA-2021:4903
|
Red Hat Security Advisory: nss security update
|
nss: Memory corruption in decodeECorDsaSignature with DSA signatures (and RSA-PSS)
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 9.8 | null | null |
RHSA-2024:1327
|
Red Hat Security Advisory: gimp:2.8 security update
|
gimp: PSD buffer overflow RCE gimp: psp off-by-one RCE
|
[
"cpe:/a:redhat:rhel_aus:8.2::appstream",
"cpe:/a:redhat:rhel_e4s:8.2::appstream",
"cpe:/a:redhat:rhel_tus:8.2::appstream"
] | null | 7.8 | null | null |
RHSA-2012:1485
|
Red Hat Security Advisory: java-1.4.2-ibm security update
|
JDK: unspecified vulnerability (2D) OpenJDK: java.io.FilePermission information leak (Libraries, 6631398) JDK: java.lang.reflect.Method invoke() code execution JDK: java.lang.class code execution OpenJDK: LogManager security bypass (Libraries, 7169884) OpenJDK: ServiceLoader reject not subtype classes without instantiating (Libraries, 7195919) OpenJDK: JSSE denial of service (JSSE, 7186286) JDK: unspecified vulnerability (2D) OpenJDK: DefaultFormatter insufficient data validation (Swing, 7195194) OpenJDK: IIOP type reuse sandbox bypass (CORBA, 8000540, SE-2012-01 Issue 50)
|
[
"cpe:/a:redhat:rhel_extras:5::client",
"cpe:/a:redhat:rhel_extras:5::server"
] | null | null | null | null |
RHSA-2025:2700
|
Red Hat Security Advisory: OpenShift Container Platform 4.13.56 security update
|
golang.org/x/net/html: Non-linear parsing of case-insensitive content in golang.org/x/net/html jinja2: Jinja has a sandbox breakout through indirect reference to format method
|
[
"cpe:/a:redhat:openshift:4.13::el8",
"cpe:/a:redhat:openshift:4.13::el9"
] | null | 6.3 | null | null |
RHSA-2023:0338
|
Red Hat Security Advisory: libxml2 security update
|
libxml2: integer overflows with XML_PARSE_HUGE libxml2: dict corruption caused by entity reference cycles
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/o:redhat:enterprise_linux:9::baseos"
] | null | 7.8 | null | null |
RHSA-2017:2732
|
Red Hat Security Advisory: kernel security and bug fix update
|
kernel: NFSv3 server does not properly handle payload bounds checking of WRITE requests kernel: stack buffer overflow in the native Bluetooth stack
|
[
"cpe:/o:redhat:rhel_mission_critical:6.2::server"
] | null | null | 7.5 | null |
RHSA-2023:4064
|
Red Hat Security Advisory: thunderbird security update
|
Mozilla: Use-after-free in WebRTC certificate generation Mozilla: Potential use-after-free from compartment mismatch in SpiderMonkey Mozilla: Fullscreen notification obscured Mozilla: Lack of warning when opening Diagcab files Mozilla: Memory safety bugs fixed in Firefox 115, Firefox ESR 102.13, and Thunderbird 102.13
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 8.8 | null | null |
RHSA-2023:7667
|
Red Hat Security Advisory: postgresql:12 security update
|
postgresql: Extension scripts replace objects not belonging to the extension. postgresql: Client memory disclosure when connecting with Kerberos to modified server postgresql: schema_element defeats protective search_path changes postgresql: row security policies disregard user ID changes after inlining. postgresql: Memory disclosure in aggregate function calls postgresql: Buffer overrun from integer overflow in array modification postgresql: Role pg_signal_backend can signal certain superuser processes. postgresql: extension script @substitutions@ within quoting allow SQL injection
|
[
"cpe:/a:redhat:rhel_aus:8.2::appstream",
"cpe:/a:redhat:rhel_e4s:8.2::appstream",
"cpe:/a:redhat:rhel_tus:8.2::appstream"
] | null | 7.5 | null | null |
RHSA-2022:7326
|
Red Hat Security Advisory: pki-core security update
|
pki-core: access to external entities when parsing XML can lead to XXE
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 7.5 | null | null |
RHSA-2010:0682
|
Red Hat Security Advisory: thunderbird security update
|
Mozilla Dangling pointer vulnerability in nsTreeSelection (MFSA 2010-54) Mozilla Frameset integer overflow vulnerability (MFSA 2010-50) Mozilla Dangling pointer vulnerability using DOM plugin array (MFSA 2010-51) Mozilla UTF-7 XSS by overriding document charset using <object> type attribute (MFSA 2010-61) Mozilla Dangling pointer vulnerability in nsTreeContentView (MFSA 2010-56) Mozilla XUL tree removal crash and remote code execution (MFSA 2010-55) Mozilla Miscellaneous memory safety hazards
|
[
"cpe:/a:redhat:rhel_productivity:5",
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws",
"cpe:/o:redhat:enterprise_linux:5::client"
] | null | null | null | null |
RHSA-2022:0370
|
Red Hat Security Advisory: cryptsetup security update
|
cryptsetup: disable encryption via header rewrite
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 5.9 | null | null |
RHSA-2024:4779
|
Red Hat Security Advisory: python3 security update
|
python: incorrect IPv4 and IPv6 private ranges
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::crb",
"cpe:/o:redhat:enterprise_linux:9::baseos"
] | null | 3.7 | null | null |
RHSA-2014:0011
|
Red Hat Security Advisory: ruby193-ruby security update
|
ruby: heap overflow in floating point parsing
|
[
"cpe:/a:redhat:openstack:3::el6"
] | null | null | null | null |
RHSA-2019:1669
|
Red Hat Security Advisory: openstack-ironic-inspector security update
|
openstack-ironic-inspector: SQL Injection vulnerability when receiving introspection data
|
[
"cpe:/a:redhat:openstack:14::el7"
] | null | null | 8.3 | null |
RHSA-2023:3276
|
Red Hat Security Advisory: sudo security update
|
sudo: arbitrary file write with privileges of the RunAs user
|
[
"cpe:/o:redhat:rhel_aus:7.7::server",
"cpe:/o:redhat:rhel_e4s:7.7::server",
"cpe:/o:redhat:rhel_tus:7.7::server"
] | null | 7.8 | null | null |
RHSA-2020:3600
|
Red Hat Security Advisory: Ansible security and bug fix update (2.8.15)
|
ansible: atomic_move primitive sets permissive permissions Ansible: masked keys for uri module are exposed into content and json output Ansible: module_args does not censor properly in --check mode ansible: dnf module install packages with no GPG signature
|
[
"cpe:/a:redhat:ansible_engine:2.8::el7",
"cpe:/a:redhat:ansible_engine:2.8::el8"
] | null | 6.3 | null | null |
RHSA-2021:5126
|
Red Hat Security Advisory: Red Hat Integration Camel Extensions for Quarkus GA security update
|
log4j-core: Remote code execution in Log4j 2.x when logs contain an attacker-controlled string value
|
[
"cpe:/a:redhat:camel_quarkus:2.2"
] | null | 9.8 | null | null |
RHSA-2017:2557
|
Red Hat Security Advisory: instack-undercloud security update
|
instack-undercloud: uses hardcoded /tmp paths
|
[
"cpe:/a:redhat:openstack-director:9::el7"
] | null | null | 6.1 | null |
RHSA-2024:0984
|
Red Hat Security Advisory: thunderbird security update
|
Mozilla: Out-of-bounds memory read in networking channels Mozilla: Alert dialog could have been spoofed on another site Mozilla: Fullscreen Notification could have been hidden by select element Mozilla: Custom cursor could obscure the permission dialog Mozilla: Mouse cursor re-positioned unexpectedly could have led to unintended permission grants Mozilla: Multipart HTTP Responses would accept the Set-Cookie header in response parts Mozilla: Incorrect code generation on 32-bit ARM devices Mozilla: Memory safety bugs fixed in Firefox 123, Firefox ESR 115.8, and Thunderbird 115.8
|
[
"cpe:/a:redhat:rhel_eus:9.2::appstream"
] | null | 7.5 | null | null |
RHSA-2023:5459
|
Red Hat Security Advisory: ghostscript security update
|
ghostscript: vulnerable to OS command injection due to mishandles permission validation for pipe devices
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::crb"
] | null | 8.4 | null | null |
RHSA-2022:8958
|
Red Hat Security Advisory: bcel security update
|
Apache-Commons-BCEL: arbitrary bytecode produced via out-of-bounds writing
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 8.1 | null | null |
RHSA-2019:4164
|
Red Hat Security Advisory: kernel security and bug fix update
|
kernel: Memory corruption due to incorrect socket cloning kernel: Missing check in fs/inode.c:inode_init_owner() does not clear SGID bit on non-directories for non-members Kernel: page cache side channel attacks
|
[
"cpe:/o:redhat:rhel_aus:7.2::server",
"cpe:/o:redhat:rhel_e4s:7.2::server",
"cpe:/o:redhat:rhel_tus:7.2::server"
] | null | null | 7.1 | null |
RHSA-2023:5145
|
Red Hat Security Advisory: .NET 7.0 security update
|
dotnet: Denial of Service with Client Certificates using .NET Kestrel
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb"
] | null | 6.5 | null | null |
RHSA-2023:6434
|
Red Hat Security Advisory: frr security and bug fix update
|
frr: Reachable assertion in peek_for_as4_capability function frr: denial of service by crafting a BGP OPEN message with an option of type 0xff frr: denial of service by crafting a BGP OPEN message with an option of type in bgp_open_option_parse in the bgp_open.c 0xff frr: out-of-bounds read exists in the BGP daemon of FRRouting
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 6.5 | null | null |
RHSA-2021:1324
|
Red Hat Security Advisory: Red Hat OpenShift Service Mesh 2.0.3 security update
|
envoyproxy/envoy: integer overflow handling large grpc-timeouts envoyproxy/envoy: NULL pointer dereference in TLS alert code handling envoyproxy/envoy: crash with empty HTTP/2 metadata map
|
[
"cpe:/a:redhat:service_mesh:2.0::el8"
] | null | 7.5 | null | null |
RHSA-2025:4063
|
Red Hat Security Advisory: ruby:3.1 security update
|
rexml: DoS vulnerability in REXML rexml: rubygem-rexml: DoS when parsing an XML having many specific characters such as whitespace character, >] and ]> rexml: DoS vulnerability in REXML rexml: DoS vulnerability in REXML CGI: Denial of Service in CGI::Cookie.parse CGI: ReDoS in CGI::Util#escapeElement uri: userinfo leakage in URI#join, URI#merge and URI#+
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 3.2 | null | null |
RHSA-2024:5927
|
Red Hat Security Advisory: postgresql:16 security update
|
postgresql: PostgreSQL pg_stats_ext and pg_stats_ext_exprs lack authorization checks postgresql: PostgreSQL relation replacement during pg_dump executes arbitrary SQL
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 7.5 | null | null |
RHSA-2022:0621
|
Red Hat Security Advisory: openldap security update
|
openldap: assertion failure in Certificate List syntax validation openldap: assertion failure in CSN normalization with invalid input
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 6.5 | null | null |
RHSA-2021:0079
|
Red Hat Security Advisory: OpenShift Container Platform 3.11.374 bug fix and security update
|
golang.org/x/crypto: Keystream loop in amd64 assembly when overflowing 32-bit counter kubernetes: MITM using LoadBalancer or ExternalIPs python-urllib3: CRLF injection via HTTP request method
|
[
"cpe:/a:redhat:openshift:3.11::el7"
] | null | 6.5 | null | null |
RHSA-2025:1333
|
Red Hat Security Advisory: Gatekeeper v3.14.3
|
golang.org/x/crypto/ssh: Misuse of ServerConfig.PublicKeyCallback may cause authorization bypass in golang.org/x/crypto golang.org/x/net/html: Non-linear parsing of case-insensitive content in golang.org/x/net/html
|
[
"cpe:/a:redhat:gatekeeper:3.14::el9"
] | null | 7.5 | null | null |
RHSA-2023:4036
|
Red Hat Security Advisory: nodejs security update
|
c-ares: AutoTools does not set CARES_RANDOM_FILE during cross compilation c-ares: Buffer Underwrite in ares_inet_net_pton() c-ares: Insufficient randomness in generation of DNS query IDs c-ares: 0-byte UDP payload Denial of Service
|
[
"cpe:/a:redhat:rhel_eus:9.0::appstream"
] | null | 7.5 | null | null |
RHSA-2021:3328
|
Red Hat Security Advisory: kernel-rt security and bug fix update
|
kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c kernel: Local privilege escalation due to incorrect BPF JIT branch displacement computation kernel: lack a full memory barrier upon the assignment of a new table value in net/netfilter/x_tables.c and include/linux/netfilter/x_tables.h may lead to DoS kernel: race condition for removal of the HCI controller
|
[
"cpe:/a:redhat:rhel_extras_rt:7"
] | null | 7 | null | null |
RHSA-2024:3314
|
Red Hat Security Advisory: OpenShift Virtualization 4.15.2 Images security update
|
follow-redirects: Improper Input Validation due to the improper handling of URLs by the url.parse() golang: net/http, x/net/http2: unlimited number of CONTINUATION frames causes DoS axios: exposure of confidential data stored in cookies
|
[
"cpe:/a:redhat:container_native_virtualization:4.15::el9"
] | null | 6.5 | null | null |
RHBA-2013:0363
|
Red Hat Bug Fix Advisory: sudo bug fix and enhancement update
|
sudo: bypass of tty_tickets constraints
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2023:2771
|
Red Hat Security Advisory: unbound security and bug fix update
|
unbound: NRDelegation attack leads to uncontrolled resource consumption (Non-Responsive Delegation Attack)
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 7.5 | null | null |
RHSA-2018:2470
|
Red Hat Security Advisory: Red Hat JBoss Web Server 3.1.0 Service Pack 4 security and bug fix update
|
tomcat: Insecure defaults in CORS filter enable 'supportsCredentials' for all origins tomcat-native: Mishandled OCSP invalid response tomcat-native: Mishandled OCSP responses can allow clients to authenticate with revoked certificates
|
[
"cpe:/a:redhat:jboss_enterprise_web_server:3.1"
] | null | null | 7.1 | null |
RHSA-2021:3153
|
Red Hat Security Advisory: compat-exiv2-026 security update
|
exiv2: Heap-based buffer overflow vulnerability in jp2image.cpp
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 8.1 | null | null |
RHSA-2015:2155
|
Red Hat Security Advisory: file security and bug fix update
|
file: cdf_read_short_sector insufficient boundary check file: cdf_unpack_summary_info() excessive looping DoS file: CDF property info parsing nelements infinite loop file: mconvert incorrect handling of truncated pascal string size file: cdf_check_stream_offset insufficient boundary check file: cdf_count_chain insufficient boundary check file: cdf_read_property_info insufficient boundary check file: unrestricted regular expression matching file: incomplete fix for CVE-2012-1571 in cdf_read_property_info file: out-of-bounds read in elf note headers file: multiple denial of service issues (resource consumption) file: denial of service issue (resource consumption) file: out of bounds read in mconvert() file: malformed elf file causes access to uninitialized memory
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | null | null |
RHSA-2022:7401
|
Red Hat Security Advisory: OpenShift Container Platform 4.12 security update
|
golang: out-of-bounds read in golang.org/x/text/language leads to DoS golang: crash in a golang.org/x/crypto/ssh server
|
[
"cpe:/a:redhat:openshift:4.12::el8"
] | null | 7.5 | null | null |
RHSA-2024:10142
|
Red Hat Security Advisory: OpenShift Container Platform 4.15.39 bug fix and security update
|
golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487)
|
[
"cpe:/a:redhat:openshift:4.15::el8",
"cpe:/a:redhat:openshift:4.15::el9"
] | null | 7.5 | null | null |
RHSA-2024:5537
|
Red Hat Security Advisory: Red Hat build of Cryostat security update
|
net/http: Denial of service due to improper 100-continue handling in net/http
|
[
"cpe:/a:redhat:cryostat:3::el8"
] | null | 5.9 | null | null |
RHSA-2021:3001
|
Red Hat Security Advisory: Red Hat OpenShift Container Platform for Windows Containers 3.0.0 security and bug fix update
|
containernetworking-cni: Arbitrary path injection via type field in CNI configuration
|
[
"cpe:/a:redhat:openshift:4.8::el8"
] | null | 7.2 | null | null |
RHSA-2023:1440
|
Red Hat Security Advisory: openssl security update
|
openssl: X.400 address type confusion in X.509 GeneralName
|
[
"cpe:/o:redhat:rhel_eus:8.4::baseos"
] | null | 7.4 | null | null |
RHSA-2022:6539
|
Red Hat Security Advisory: .NET 6.0 security and bugfix update
|
dotnet: DenialOfService - ASP.NET Core MVC vulnerable to stack overflow via ModelStateDictionary recursion.
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb"
] | null | 7.5 | null | null |
RHSA-2023:5206
|
Red Hat Security Advisory: RHACS 4.2 enhancement and security update
|
stackrox: Missing HTTP security headers allows for clickjacking in web UI
|
[
"cpe:/a:redhat:advanced_cluster_security:4.2::el8"
] | null | 6.1 | null | null |
RHSA-2023:3661
|
Red Hat Security Advisory: texlive security update
|
texlive: arbitrary code execution allows document complied with older version
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb",
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::crb",
"cpe:/a:redhat:rhel_aus:8.2::appstream",
"cpe:/a:redhat:rhel_aus:8.4::appstream",
"cpe:/a:redhat:rhel_e4s:8.1::appstream",
"cpe:/a:redhat:rhel_e4s:8.2::appstream",
"cpe:/a:redhat:rhel_e4s:8.4::appstream",
"cpe:/a:redhat:rhel_eus:8.6::appstream",
"cpe:/a:redhat:rhel_eus:8.6::crb",
"cpe:/a:redhat:rhel_eus:9.0::appstream",
"cpe:/a:redhat:rhel_eus:9.0::crb",
"cpe:/a:redhat:rhel_tus:8.2::appstream",
"cpe:/a:redhat:rhel_tus:8.4::appstream"
] | null | 7.8 | null | null |
RHSA-2020:5237
|
Red Hat Security Advisory: firefox security update
|
Mozilla: Variable time processing of cross-origin images during drawImage calls Mozilla: Parsing mismatches could confuse and bypass security sanitizer for chrome privileged code Mozilla: Fullscreen could be enabled without displaying the security UI Mozilla: XSS through paste (manual and clipboard API) Mozilla: Requests intercepted through ServiceWorkers lacked MIME type restrictions Mozilla: Use-after-free in WebRequestService Mozilla: Potential use-after-free in uses of nsTArray Mozilla: DoH did not filter IPv4 mapped IP Addresses Mozilla: Software keyboards may have remembered typed passwords Mozilla: Memory safety bugs fixed in Firefox 83 and Firefox ESR 78.5
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 8.8 | 6.1 | null |
RHSA-2007:0069
|
Red Hat Security Advisory: openoffice.org security update
|
security flaw security flaw
|
[
"cpe:/a:redhat:rhel_productivity:5",
"cpe:/o:redhat:enterprise_linux:5::client"
] | null | null | null | null |
RHSA-2007:0845
|
Red Hat Security Advisory: libvorbis security update
|
libvorbis array boundary condition Multiple libvorbis flaws (CVE-2007-4066, CVE-2007-4029) Multiple libvorbis flaws (CVE-2007-4066, CVE-2007-4029) Multiple libvorbis flaws (CVE-2007-4066, CVE-2007-4029)
|
[
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws",
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws",
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2016:0723
|
Red Hat Security Advisory: java-1.6.0-openjdk security update
|
OpenJDK: insufficient thread consistency checks in ObjectInputStream (Serialization, 8129952) OpenJDK: insufficient byte type checks (Hotspot, 8132051) OpenJDK: insufficient DSA key parameters checks (Security, 8138593) OpenJDK: incorrect handling of surrogate pairs in XML attribute values (JAXP, 8143167) OpenJDK: unrestricted deserialization of authentication credentials (JMX, 8144430)
|
[
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::server",
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation",
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | null | null |
RHSA-2021:0988
|
Red Hat Security Advisory: rhvm-appliance security, bug fix, and enhancement update
|
lldpd: buffer overflow in the lldp_decode function in daemon/protocols/lldp.c postgresql: Uncontrolled search path element in logical replication postgresql: Uncontrolled search path element in CREATE EXTENSION
|
[
"cpe:/o:redhat:rhev_hypervisor:4.4::el8"
] | null | 7.1 | null | null |
RHSA-2020:0588
|
Red Hat Security Advisory: CloudForms 5.0.3 security update
|
CloudForms: RCE vulnerability in NFS schedule backup
|
[
"cpe:/a:redhat:cloudforms_managementengine:5.11::el8"
] | null | 8 | null | null |
RHSA-2010:0396
|
Red Hat Security Advisory: httpd and httpd22 security and enhancement update
|
httpd: mod_proxy_ajp remote temporary DoS httpd: request header information leak
|
[
"cpe:/a:redhat:jboss_enterprise_web_server:1::el4",
"cpe:/a:redhat:jboss_enterprise_web_server:1::el5"
] | null | null | null | null |
RHSA-2024:5643
|
Red Hat Security Advisory: krb5 security update
|
krb5: GSS message token handling krb5: GSS message token handling
|
[
"cpe:/a:redhat:rhel_eus:9.2::appstream",
"cpe:/o:redhat:rhel_eus:9.2::baseos"
] | null | 6.5 | null | null |
RHSA-2024:2147
|
Red Hat Security Advisory: ipa security update
|
freeipa: specially crafted HTTP requests potentially lead to denial of service
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::crb"
] | null | 5.3 | null | null |
RHSA-2023:6084
|
Red Hat Security Advisory: RHACS 3.74 enhancement and security update
|
golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487) HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack)
|
[
"cpe:/a:redhat:advanced_cluster_security:3.74::el8"
] | null | 7.5 | null | null |
RHSA-2010:0349
|
Red Hat Security Advisory: acroread security update
|
Acroread: Multiple code execution flaws (APSB10-09) Acroread: Multiple code execution flaws (APSB10-09) Acroread: Multiple code execution flaws (APSB10-09) Acroread: Multiple code execution flaws (APSB10-09) Acroread: Multiple code execution flaws (APSB10-09) Acroread: Multiple code execution flaws (APSB10-09) Acroread: Multiple code execution flaws (APSB10-09) Acroread: Multiple code execution flaws (APSB10-09) Acroread: Multiple code execution flaws (APSB10-09) Acroread: Multiple code execution flaws (APSB10-09) Acroread: Multiple code execution flaws (APSB10-09) Acroread: Multiple code execution flaws (APSB10-09) Acroread: Multiple code execution flaws (APSB10-09) Acroread: Multiple code execution flaws (APSB10-09) Acroread: Heap-based overflow by opening a specially-crafted PDF file (FG-VD-10-005)
|
[
"cpe:/a:redhat:rhel_extras:4",
"cpe:/a:redhat:rhel_extras:5::client",
"cpe:/a:redhat:rhel_extras:5::server"
] | null | null | null | null |
RHSA-2024:1801
|
Red Hat Security Advisory: unbound security update
|
bind9: KeyTrap - Extreme CPU consumption in DNSSEC validator bind9: Preparing an NSEC3 closest encloser proof can exhaust CPU resources unbound: unrestricted reconfiguration enabled to anyone that may lead to local privilege escalation
|
[
"cpe:/a:redhat:rhel_eus:9.0::appstream"
] | null | 8 | null | null |
RHSA-2023:6187
|
Red Hat Security Advisory: firefox security update
|
Mozilla: Queued up rendering could have allowed websites to clickjack Mozilla: Large WebGL draw could have led to a crash Mozilla: WebExtensions could open arbitrary URLs Mozilla: Improper object tracking during GC in the JavaScript engine could have led to a crash. Mozilla: Memory safety bugs fixed in Firefox 119, Firefox ESR 115.4, and Thunderbird 115.4 Mozilla: Address bar spoofing via bidirectional characters libvpx: crash related to VP9 encoding in libvpx
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 7.5 | null | null |
RHSA-2008:0038
|
Red Hat Security Advisory: postgresql security update
|
dblink allows proxying of database connections via 127.0.0.1 postgresql integer overflow in regex code postgresql DoS via infinite loop in regex NFA optimization code postgresql: tempory DoS caused by slow regex NFA cleanup PostgreSQL privilege escalation PostgreSQL privilege escalation via dblink
|
[
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws",
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2013:0871
|
Red Hat Security Advisory: tomcat6 and tomcat7 security update
|
tomcat: Improper TOMCAT_LOG management in init script (DoS, ACE)
|
[
"cpe:/a:redhat:jboss_enterprise_web_server:2::el5",
"cpe:/a:redhat:jboss_enterprise_web_server:2::el6"
] | null | null | null | null |
RHSA-2016:0006
|
Red Hat Security Advisory: samba security update
|
samba: Insufficient symlink verification in smbd samba: client requesting encryption vulnerable to downgrade attack Samba: Missing access control check in shadow copy code libldb: remote memory read in the Samba LDAP server
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | null | null |
RHSA-2021:4156
|
Red Hat Security Advisory: go-toolset:rhel8 security, bug fix, and enhancement update
|
golang: net: lookup functions may return invalid host names golang: net/http/httputil: ReverseProxy forwards connection headers if first one is empty golang: math/big.Rat: may cause a panic or an unrecoverable fatal error if passed inputs with very large exponents golang: net/http/httputil: panic due to racy read of persistConn after handler panic
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 5.9 | null | null |
RHSA-2022:1986
|
Red Hat Security Advisory: python3 security update
|
python: urllib: HTTP client possible infinite loop on a 100 Continue response python: ftplib should not use the host from the PASV response
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 5.3 | null | null |
RHSA-2007:0795
|
Red Hat Security Advisory: cyrus-sasl security and bug fix update
|
cyrus-sasl digest-md5 DoS
|
[
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2023:0476
|
Red Hat Security Advisory: thunderbird security update
|
Mozilla: libusrsctp library out of date Mozilla: Fullscreen notification bypass Mozilla: Arbitrary file read from GTK drag and drop on Linux Mozilla: Malicious command could be hidden in devtools output Mozilla: URL being dragged from cross-origin iframe into same tab triggers navigation Mozilla: Content Security Policy wasn't being correctly applied to WebSockets in WebWorkers Mozilla: Calls to <code>console.log</code> allowed bypasing Content Security Policy via format directive Mozilla: Memory safety bugs fixed in Firefox 109 and Firefox ESR 102.7
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 8.8 | null | null |
RHSA-2019:4041
|
Red Hat Security Advisory: Red Hat Single Sign-On 7.3.5 security update on RHEL 7
|
HTTP/2: flood using PING frames results in unbounded memory growth HTTP/2: flood using HEADERS frames results in unbounded memory growth HTTP/2: flood using SETTINGS frames results in unbounded memory growth keycloak: keycloak uses hardcoded open dummy domain for new accounts enabling information disclosure wildfly-core: Incorrect privileges for 'Monitor', 'Auditor' and 'Deployer' user by default wildfly-security-manager: security manager authorization bypass
|
[
"cpe:/a:redhat:red_hat_single_sign_on:7::el7"
] | null | null | 7.5 | null |
RHSA-2015:2079
|
Red Hat Security Advisory: binutils security, bug fix, and enhancement update
|
binutils: invalid read flaw in libbfd binutils: lack of range checking leading to controlled write in _bfd_elf_setup_sections() binutils: out-of-bounds write when parsing specially crafted PE executable binutils: heap overflow in objdump when parsing a crafted ELF/PE binary file (incomplete fix for CVE-2014-8485) binutils: stack overflow in objdump when parsing specially crafted ihex file binutils: stack overflow in the SREC parser binutils: directory traversal vulnerability binutils: out of bounds memory write
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | null | null |
RHSA-2014:0215
|
Red Hat Security Advisory: cfme security, bug fix, and enhancement update
|
EVM: Stored XSS ruby: heap overflow in floating point parsing CFME: Dangerous send in ServiceController rubygem-actionpack: number_to_currency, number_to_percentage and number_to_human XSS vulnerability rubygem-actionpack: Action View string handling denial of service
|
[
"cpe:/a:redhat:cloudforms_managementengine:5::el6"
] | null | null | null | null |
RHSA-2023:5536
|
Red Hat Security Advisory: libvpx security update
|
libvpx: Heap buffer overflow in vp8 encoding in libvpx libvpx: crash related to VP9 encoding in libvpx
|
[
"cpe:/a:redhat:rhel_aus:8.4::appstream",
"cpe:/a:redhat:rhel_e4s:8.4::appstream",
"cpe:/a:redhat:rhel_tus:8.4::appstream"
] | null | 7.5 | null | null |
RHSA-2023:0565
|
Red Hat Security Advisory: OpenShift Container Platform 4.11.26 security update
|
goutils: RandomAlphaNumeric and CryptoRandomAlphaNumeric are not as random as they should be
|
[
"cpe:/a:redhat:openshift:4.11::el8"
] | null | 7 | null | null |
RHSA-2006:0591
|
Red Hat Security Advisory: samba security update
|
security flaw
|
[
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws",
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2024:0279
|
Red Hat Security Advisory: gstreamer-plugins-bad-free security update
|
gstreamer: MXF demuxer use-after-free vulnerability
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 8.8 | null | null |
RHSA-2018:1251
|
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.1.2 security update
|
undertow: Path traversal in ServletResourceManager class undertow: HTTP header injection using CRLF with UTF-8 Encoding (incomplete fix of CVE-2016-4993) slf4j: Deserialisation vulnerability in EventData constructor can allow for arbitrary code execution
|
[
"cpe:/a:redhat:jboss_enterprise_application_platform:7.1"
] | null | null | 8.1 | null |
RHSA-2015:0102
|
Red Hat Security Advisory: kernel security and bug fix update
|
Kernel: mm/shmem: denial of service kernel: isofs: unbound recursion when processing relocated directories kernel: isofs: unbound recursion when processing relocated directories Kernel: cifs: NULL pointer dereference in SMB2_tcon kernel: splice: lack of generic write checks kernel: net: sctp: NULL pointer dereference in af->from_addr_param on malformed packet
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | null | null |
RHSA-2022:0927
|
Red Hat Security Advisory: OpenShift Container Platform 4.10.5 packages and security update
|
golang: net/http: limit growth of header canonicalization cache golang: syscall: don't close fd 0 on ForkExec error
|
[
"cpe:/a:redhat:openshift:4.10::el7",
"cpe:/a:redhat:openshift:4.10::el8"
] | null | 4.8 | null | null |
RHSA-2021:4000
|
Red Hat Security Advisory: kpatch-patch security update
|
kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks kernel: powerpc: KVM guest OS users can cause host OS memory corruption
|
[
"cpe:/o:redhat:rhel_e4s:7.7::server"
] | null | 7.8 | null | null |
RHSA-2021:4151
|
Red Hat Security Advisory: python27:2.7 security update
|
python: Unsafe use of eval() on data retrieved via HTTP in the test suite python-jinja2: ReDoS vulnerability in the urlize filter python-babel: Relative path traversal allows attacker to load arbitrary locale files and execute arbitrary code python-pygments: Infinite loop in SML lexer may lead to DoS python: Web cache poisoning via urllib.parse.parse_qsl and urllib.parse.parse_qs by using a semicolon in query parameters python-pygments: ReDoS in multiple lexers python-lxml: Missing input sanitization for formaction HTML5 attributes may lead to XSS python-babel: Relative path traversal allows attacker to load arbitrary locale files and execute arbitrary code
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 7.8 | null | null |
RHSA-2013:1185
|
Red Hat Security Advisory: Red Hat JBoss Fuse 6.0.0 patch 2
|
rubygem-json: Denial of Service and SQL Injection openjpa: Remote arbitrary code execution by creating a serialized object and leveraging improperly secured server programs ruby: entity expansion DoS vulnerability in REXML apache-cxf: Multiple denial of service flaws in the StAX parser
|
[
"cpe:/a:redhat:jboss_fuse:6.0.0"
] | null | null | null | null |
RHSA-2006:0719
|
Red Hat Security Advisory: nss_ldap security update
|
security flaw
|
[
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2010:0734
|
Red Hat Security Advisory: Red Hat Enterprise Linux 3 - 1-Month End Of Life Notice
|
This is the 1-month notification of the End Of Life plans for Red Hat
Enterprise Linux 3.
|
[
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws"
] | null | null | null | null |
RHSA-2014:1860
|
Red Hat Security Advisory: mysql55-mysql security update
|
mysql: Remote Preauth User Enumeration flaw mysql: unspecified vulnerability related to ENARC (CPU July 2014) mysql: unspecified vulnerability related to SROPTZR (CPU July 2014) mysql: unspecified vulnerability related to ENFED (CPU July 2014) mysql: unspecified vulnerability related to SRINFOSC (CPU July 2014) mysql: unspecified vulnerability related to SRCHAR (CPU July 2014) mysql: unspecified MyISAM temporary file issue fixed in 5.5.39 and 5.6.20 mysql: unspecified vulnerability related to SERVER:CHARACTER SETS (CPU October 2014) mysql: unspecified vulnerability related to SERVER:REPLICATION ROW FORMAT BINARY LOG DML (CPU October 2014) mysql: unspecified vulnerability related to SERVER:INNODB DML FOREIGN KEYS (CPU October 2014) mysql: unspecified vulnerability related to SERVER:OPTIMIZER (CPU October 2014) mysql: unspecified vulnerability related to SERVER:DML (CPU October 2014) mysql: unspecified vulnerability related to SERVER:MEMORY STORAGE ENGINE (CPU October 2014) mysql: unspecified vulnerability related to SERVER:DML (CPU October 2014) mysql: unspecified vulnerability related to SERVER:DDL (CPU October 2014) mysql: unspecified vulnerability related to CLIENT:MYSQLDUMP (CPU October 2014) mysql: unspecified vulnerability related to CLIENT:MYSQLADMIN (CPU October 2014) mysql: unspecified vulnerability related to SERVER:DML (CPU October 2014) mysql: unspecified vulnerability related to C API SSL CERTIFICATE HANDLING (CPU October 2014)
|
[
"cpe:/a:redhat:rhel_software_collections:1::el6",
"cpe:/a:redhat:rhel_software_collections:1::el7"
] | null | null | null | null |
RHSA-2023:7845
|
Red Hat Security Advisory: Red Hat Integration Camel for Spring Boot 3.20.4 release and security update
|
JSON-java: parser confusion leads to OOM
|
[
"cpe:/a:redhat:camel_spring_boot:3.20.4"
] | null | 7.5 | null | null |
RHSA-2022:8872
|
Red Hat Security Advisory: Red Hat OpenStack Platform 16.1.9 (python-django20) security update
|
django: Possible XSS via '{% debug %}' template tag django: Denial-of-service possibility in file uploads Django: SQL injection in QuerySet.annotate(),aggregate() and extra()
|
[
"cpe:/a:redhat:openstack:16.1::el8"
] | null | 9.4 | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.