id
stringlengths 13
15
| title
stringlengths 29
176
| description
stringlengths 8
32.1k
| cpes
listlengths 0
20
| cvss_v4_0
null | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
null |
---|---|---|---|---|---|---|---|
RHSA-2024:3781
|
Red Hat Security Advisory: Red Hat Ansible Automation Platform 2.4 Product Security and Bug Fix Update
|
pip: Mercurial configuration injectable in repo revision when installing via pip golang: net/http, x/net/http2: unlimited number of CONTINUATION frames causes DoS golang: net/http: golang: mime/multipart: golang: net/textproto: memory exhaustion in Request.ParseMultipartForm python-cryptography: NULL-dereference when loading PKCS7 certificates pillow: Arbitrary Code Execution via the environment parameter python-gunicorn: HTTP Request Smuggling due to improper validation of Transfer-Encoding headers python-idna: potential DoS via resource consumption via specially crafted inputs to idna.encode() python-pydantic: regular expression denial of service via crafted email string sqlparse: parsing heavily nested list leads to denial of service psf/black: ReDoS via the lines_with_leading_tabs_expanded() function in strings.py file golang: crypto/x509: Verify panics on certificates with an unknown public key algorithm python-cryptography: NULL pointer dereference with pkcs12.serialize_key_and_certificates when called with a non-matching certificate and private key and an hmac_hash override aiohttp: XSS on index pages for static file handling python-django: Potential regular expression denial-of-service in django.utils.text.Truncator.words() python-pillow: buffer overflow in _imagingcms.c follow-redirects: Possible credential leak aiohttp: DoS when trying to parse malformed POST requests python-social-auth: Improper Handling of Case Sensitivity in social-auth-app-django jinja2: accepts keys containing non-attribute characters requests: subsequent requests to the same host ignore cert verification
|
[
"cpe:/a:redhat:ansible_automation_platform:2.4::el8",
"cpe:/a:redhat:ansible_automation_platform:2.4::el9",
"cpe:/a:redhat:ansible_automation_platform_developer:2.4::el8",
"cpe:/a:redhat:ansible_automation_platform_developer:2.4::el9",
"cpe:/a:redhat:ansible_automation_platform_inside:2.4::el8",
"cpe:/a:redhat:ansible_automation_platform_inside:2.4::el9"
] | null | 5.6 | 7.5 | null |
RHSA-2020:1264
|
Red Hat Security Advisory: systemd security and bug fix update
|
systemd: line splitting via fgets() allows for state injection during daemon-reexec systemd: out-of-bounds read when parsing a crafted syslog message
|
[
"cpe:/o:redhat:rhel_eus:7.5::computenode",
"cpe:/o:redhat:rhel_eus:7.5::server"
] | null | null | 4.3 | null |
RHSA-2019:3421
|
Red Hat Security Advisory: mod_auth_mellon security, bug fix, and enhancement update
|
mod_auth_mellon: open redirect in logout url when using URLs with backslashes
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | null | 6.1 | null |
RHSA-2023:7197
|
Red Hat Security Advisory: OpenShift Container Platform 4.15.0 security and extras update
|
golang.org/x/net/html: Cross site scripting opentelemetry: DoS vulnerability in otelhttp opentelemetry-go-contrib: DoS vulnerability in otelgrpc due to unbound cardinality metrics ssh: Prefix truncation attack on Binary Packet Protocol (BPP) go-git: Maliciously crafted Git server replies can lead to path traversal and RCE on go-git clients
|
[
"cpe:/a:redhat:openshift:4.15::el8",
"cpe:/a:redhat:openshift:4.15::el9"
] | null | 8.1 | null | null |
RHSA-2021:2419
|
Red Hat Security Advisory: dhcp security update
|
dhcp: stack-based buffer overflow when parsing statements with colon-separated hex digits in config or lease files in dhcpd and dhclient
|
[
"cpe:/o:redhat:rhel_els:6"
] | null | 8.8 | null | null |
RHSA-2003:187
|
Red Hat Security Advisory: : Updated 2.4 kernel fixes vulnerabilities and driver bugs
|
security flaw security flaw security flaw
|
[
"cpe:/o:redhat:linux:7.1",
"cpe:/o:redhat:linux:7.2",
"cpe:/o:redhat:linux:7.3",
"cpe:/o:redhat:linux:8.0",
"cpe:/o:redhat:linux:9"
] | null | null | null | null |
RHSA-2023:6185
|
Red Hat Security Advisory: firefox security update
|
Mozilla: Queued up rendering could have allowed websites to clickjack Mozilla: Large WebGL draw could have led to a crash Mozilla: WebExtensions could open arbitrary URLs Mozilla: Improper object tracking during GC in the JavaScript engine could have led to a crash. Mozilla: Memory safety bugs fixed in Firefox 119, Firefox ESR 115.4, and Thunderbird 115.4 Mozilla: Address bar spoofing via bidirectional characters libvpx: crash related to VP9 encoding in libvpx
|
[
"cpe:/a:redhat:rhel_aus:8.2::appstream",
"cpe:/a:redhat:rhel_e4s:8.2::appstream",
"cpe:/a:redhat:rhel_tus:8.2::appstream"
] | null | 7.5 | null | null |
RHSA-2010:0111
|
Red Hat Security Advisory: kernel security update
|
kernel: e1000 issue reported at 26c3 kernel: r8169 issue reported at 26c3 kernel: e1000e frame fragment issue
|
[
"cpe:/o:redhat:rhel_eus:4.7::as",
"cpe:/o:redhat:rhel_eus:4.7::es"
] | null | null | null | null |
RHSA-2005:828
|
Red Hat Security Advisory: libungif security update
|
giflib/libunfig: NULL pointer dereference crash giflib/libunfig: memory corruption via a crafted GIF
|
[
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws",
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2019:1790
|
Red Hat Security Advisory: perl security update
|
perl: Integer overflow leading to buffer overflow in Perl_my_setenv()
|
[
"cpe:/o:redhat:rhel_eus:7.5::computenode",
"cpe:/o:redhat:rhel_eus:7.5::server"
] | null | null | 8.1 | null |
RHSA-2012:0075
|
Red Hat Security Advisory: jbossweb security update
|
tomcat: Multiple weaknesses in HTTP DIGEST authentication tomcat: security manager restrictions bypass JBoss Web remote denial of service when surrogate pair character is placed at buffer boundary tomcat: hash table collisions CPU usage DoS (oCERT-2011-003) tomcat: Multiple weaknesses in HTTP DIGEST authentication tomcat: Multiple weaknesses in HTTP DIGEST authentication tomcat: Multiple weaknesses in HTTP DIGEST authentication tomcat: large number of parameters DoS
|
[
"cpe:/a:redhat:jboss_enterprise_application_platform:5.1"
] | null | null | null | null |
RHSA-2003:116
|
Red Hat Security Advisory: apache, openssl security update for Stronghold
|
security flaw security flaw security flaw
|
[
"cpe:/a:redhat:stronghold:4"
] | null | null | null | null |
RHSA-2007:0701
|
Red Hat Security Advisory: xterm security update
|
(mesg: error: tty device is not owned by group `tty')
|
[
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2023:0463
|
Red Hat Security Advisory: thunderbird security update
|
Mozilla: libusrsctp library out of date Mozilla: Fullscreen notification bypass Mozilla: Arbitrary file read from GTK drag and drop on Linux Mozilla: Malicious command could be hidden in devtools output Mozilla: URL being dragged from cross-origin iframe into same tab triggers navigation Mozilla: Content Security Policy wasn't being correctly applied to WebSockets in WebWorkers Mozilla: Calls to <code>console.log</code> allowed bypasing Content Security Policy via format directive Mozilla: Memory safety bugs fixed in Firefox 109 and Firefox ESR 102.7
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 8.8 | null | null |
RHSA-2019:4201
|
Red Hat Security Advisory: CloudForms 5.0.1 security, bug fix and enhancement update
|
cfme: rubygem-rubyzip denial of service via crafted ZIP file
|
[
"cpe:/a:redhat:cloudforms_managementengine:5.11::el8"
] | null | null | 5.5 | null |
RHSA-2014:0421
|
Red Hat Security Advisory: qemu-kvm-rhev security update
|
qemu: crash by possible division by zero Qemu: block: multiple integer overflow flaws Qemu: block: missing input validation Qemu: prevent possible buffer overflows Qemu: qcow2: NULL dereference in qcow2_open() error path Qemu: block: possible crash due signed types or logic error Qemu: vhdx: bounds checking for block_size and logical_sector_size qemu: virtio-net: buffer overflow in virtio_net_handle_mac() function
|
[
"cpe:/a:redhat:enterprise_linux:6::hypervisor"
] | null | null | null | null |
RHSA-2013:1182
|
Red Hat Security Advisory: 389-ds-base security update
|
389-ds-base: ns-slapd crash due to bogus DN
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2024:3331
|
Red Hat Security Advisory: OpenShift Container Platform 4.14.27 bug fix and security update
|
golang: net/http, x/net/http2: unlimited number of CONTINUATION frames causes DoS python-gunicorn: HTTP Request Smuggling due to improper validation of Transfer-Encoding headers
|
[
"cpe:/a:redhat:openshift:4.14::el8",
"cpe:/a:redhat:openshift:4.14::el9"
] | null | 7.5 | 7.5 | null |
RHSA-2017:2180
|
Red Hat Security Advisory: ghostscript security and bug fix update
|
ghostscript: NULL pointer dereference in mem_get_bits_rectangle()
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 3.3 | null |
RHSA-2024:0022
|
Red Hat Security Advisory: firefox security update
|
Mozilla: Heap-buffer-overflow affecting WebGL <code>DrawElementsInstanced</code> method with Mesa VM driver Mozilla: Symlinks may resolve to smaller than expected buffers Mozilla: Heap buffer overflow in <code>nsTextFragment</code> Mozilla: Use-after-free in PR_GetIdentitiesLayer Mozilla: Potential sandbox escape due to <code>VideoBridge</code> lack of texture validation Mozilla: Heap buffer overflow affected <code>nsWindow::PickerOpen(void)</code> in headless mode Mozilla: Use-after-free in <code>nsDNSService</code> Mozilla: Undefined behavior in <code>ShutdownObserver()</code> Mozilla: Memory safety bugs fixed in Firefox 121, Firefox ESR 115.6, and Thunderbird 115.6 Mozilla: Potential exposure of uninitialized data in <code>EncryptingOutputStream</code> Mozilla: Clickjacking permission prompts using the popup transition
|
[
"cpe:/a:redhat:rhel_eus:9.0::appstream"
] | null | 6.1 | null | null |
RHSA-2014:1873
|
Red Hat Security Advisory: libvirt security and bug fix update
|
libvirt: qemu: out-of-bounds read access in qemuDomainGetBlockIoTune() due to invalid index libvirt: domain_conf: domain deadlock DoS libvirt: dumpxml: information leak with migratable flag
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2024:6986
|
Red Hat Security Advisory: nano security update
|
nano: running `chmod` and `chown` on the filename allows malicious user to replace the emergency file with a malicious symlink to a root-owned file
|
[
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 6.7 | null | null |
RHSA-2012:0514
|
Red Hat Security Advisory: java-1.6.0-ibm security update
|
OpenJDK: JavaSound incorrect bounds check (Sound, 7088367) GlassFish: hash table collisions CPU usage DoS (oCERT-2011-003) OpenJDK: insufficient checking of the graphics rendering object (2D, 7112642) JDK: unspecified vulnerability fixed in 6u31 and 7u3 (2D) JDK: unspecified vulnerability fixed in 6u31 and 7u3 (2D) JDK: unspecified vulnerability fixed in 6u31 and 7u3 (Deployment) OpenJDK: off-by-one bug in ZIP reading code (JRE, 7118283) OpenJDK: KeyboardFocusManager focus stealing (AWT, 7110683) OpenJDK: unrestricted use of TimeZone.setDefault() (i18n, 7110687) OpenJDK: incomplete info in the deserialization exception (Serialization, 7110700) OpenJDK: mutable repository identifiers (CORBA, 7110704) OpenJDK: AtomicReferenceArray insufficient array type check (Concurrency, 7082299)
|
[
"cpe:/a:redhat:rhel_extras:5::client",
"cpe:/a:redhat:rhel_extras:5::server",
"cpe:/a:redhat:rhel_extras:6"
] | null | null | null | null |
RHSA-2006:0544
|
Red Hat Security Advisory: mysql security update
|
Mysql log file obfuscation security flaw security flaw security flaw security flaw security flaw
|
[
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2024:6160
|
Red Hat Security Advisory: kernel-rt security update
|
kernel: perf: Fix list corruption in perf_cgroup_switch() kernel: net/sched: act_api: fix possible infinite loop in tcf_idr_check_alloc() kernel: virtio-net: tap: mlx5_core short frame denial of service kernel: virtio-net: tun: mlx5_core short frame denial of service
|
[
"cpe:/a:redhat:rhel_tus:8.4::nfv",
"cpe:/a:redhat:rhel_tus:8.4::realtime"
] | null | 7.1 | null | null |
RHSA-2019:3168
|
Red Hat Security Advisory: wget security update
|
wget: do_conversion() heap-based buffer overflow vulnerability
|
[
"cpe:/o:redhat:rhel_aus:7.4::server",
"cpe:/o:redhat:rhel_e4s:7.4::server",
"cpe:/o:redhat:rhel_tus:7.4::server"
] | null | null | 8.8 | null |
RHSA-2018:1099
|
Red Hat Security Advisory: firefox security update
|
firefox: Use-after-free in compositor potentially allows code execution
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 9.8 | null |
RHSA-2013:0005
|
Red Hat Security Advisory: tomcat6 security update
|
Web: Bypass of security constraints
|
[
"cpe:/a:redhat:jboss_enterprise_web_server:2::el5",
"cpe:/a:redhat:jboss_enterprise_web_server:2::el6"
] | null | null | null | null |
RHSA-2017:0245
|
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform security update
|
tomcat: HTTP Request smuggling vulnerability due to permitting invalid character in HTTP requests EAP: Sensitive data can be exposed at the server level in domain mode admin-cli: Potential EAP resource starvation DOS attack via GET requests for server log files jboss: jbossas: unsafe chown of server.log in jboss init script allows privilege escalation
|
[
"cpe:/a:redhat:jboss_enterprise_application_platform:6::el7"
] | null | null | 7 | null |
RHSA-2007:0912
|
Red Hat Security Advisory: libvorbis security update
|
libvorbis array boundary condition Multiple libvorbis flaws (CVE-2007-4066, CVE-2007-4029) Multiple libvorbis flaws (CVE-2007-4066, CVE-2007-4029) Multiple libvorbis flaws (CVE-2007-4066, CVE-2007-4029)
|
[
"cpe:/o:redhat:enterprise_linux:2.1::as",
"cpe:/o:redhat:enterprise_linux:2.1::aw",
"cpe:/o:redhat:enterprise_linux:2.1::es",
"cpe:/o:redhat:enterprise_linux:2.1::ws"
] | null | null | null | null |
RHSA-2008:0103
|
Red Hat Security Advisory: firefox security update
|
Mozilla layout engine crashes Mozilla javascript engine crashes Mozilla arbitrary code execution Mozilla arbitrary code execution Mozilla arbitrary code execution chrome: directory traversal Mozilla arbitrary code execution Mozilla information disclosure flaw Mozilla information disclosure flaw Mozilla text file mishandling Mozilla URL token stealing flaw
|
[
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws",
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2018:2789
|
Red Hat Security Advisory: kernel-rt security and bug fix update
|
kernel: TCP segments with random offsets allow a remote denial of service (SegmentSmack)
|
[
"cpe:/a:redhat:enterprise_mrg:2:server:el6"
] | null | null | 7.5 | null |
RHSA-2019:4245
|
Red Hat Security Advisory: kpatch-patch security update
|
kpatch: hw: incomplete fix for CVE-2018-12207
|
[
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | null | 6.5 | null |
RHSA-2020:1280
|
Red Hat Security Advisory: OpenShift Container Platform 4.2.z openshift-enterprise-ansible-operator-container security update
|
openshift/ocp-release-operator-sdk: /etc/passwd is given incorrect privileges
|
[
"cpe:/a:redhat:openshift:4.2::el7"
] | null | 7 | null | null |
RHSA-2020:1526
|
Red Hat Security Advisory: OpenShift Container Platform 4.2.29 openshift-enterprise-hyperkube-container security update
|
kubernetes: Use of unbounded 'client' label in apiserver_request_total allows for memory exhaustion
|
[
"cpe:/a:redhat:openshift:4.2::el7"
] | null | 4.3 | null | null |
RHSA-2021:2085
|
Red Hat Security Advisory: servicemesh security update
|
istio/istio: authorization bypass when using AUTO_PASSTHROUGH
|
[
"cpe:/a:redhat:service_mesh:1.1::el8"
] | null | 10 | null | null |
RHSA-2021:4588
|
Red Hat Security Advisory: gcc-toolset-10-binutils security update
|
environment: Unicode's bidirectional (BiDi) override characters can cause trojan source attacks
|
[
"cpe:/a:redhat:rhel_eus:8.4::appstream"
] | null | 8.5 | null | null |
RHSA-2023:2098
|
Red Hat Security Advisory: Multicluster Engine for Kubernetes 2.0.8 security updates and bug fixes
|
http-cache-semantics: Regular Expression Denial of Service (ReDoS) vulnerability
|
[
"cpe:/a:redhat:multicluster_engine:2.0::el8"
] | null | 7.5 | null | null |
RHSA-2023:1466
|
Red Hat Security Advisory: kpatch-patch security update
|
kernel: tun: avoid double free in tun_free_netdev
|
[
"cpe:/o:redhat:rhel_eus:9.0::baseos"
] | null | 7.8 | null | null |
RHSA-2020:2813
|
Red Hat Security Advisory: Red Hat Single Sign-On 7.4.1 security update
|
keycloak: verify-token-audience support is missing in the NodeJS adapter keycloak: Lack of checks in ObjectInputStream leading to Remote Code Execution jackson-databind: Lacks certain xbean-reflect/JNDI blocking jackson-databind: Serialization gadgets in shaded-hikari-config jackson-databind: Serialization gadgets in ibatis-sqlmap jackson-databind: Serialization gadgets in anteros-core undertow: invalid HTTP request with large chunk size keycloak: top-level navigations to data URLs resulting in XSS are possible (incomplete fix of CVE-2020-1697) jackson-databind: Serialization gadgets in javax.swing.JEditorPane jquery: Cross-site scripting due to improper injQuery.htmlPrefilter method jquery: Untrusted code execution via <option> tag in HTML passed to DOM manipulation methods
|
[
"cpe:/a:redhat:jboss_single_sign_on:7.4"
] | null | 6.1 | 7.5 | null |
RHSA-2016:0560
|
Red Hat Security Advisory: Red Hat Enterprise Linux 4 Extended Life Cycle Support One-year Notice
|
This is the one-year notification for the retirement of Red Hat Enterprise
Linux 4 Extended Life Cycle Support (ELS). This notice applies only to
those customers subscribed to the Extended Life Cycle Support (ELS) channel
for Red Hat Enterprise Linux 4 in the Customer Portal.
|
[
"cpe:/o:redhat:rhel_els:4::as",
"cpe:/o:redhat:rhel_els:4::es"
] | null | null | null | null |
RHSA-2022:5709
|
Red Hat Security Advisory: java-1.8.0-openjdk security, bug fix, and enhancement update
|
OpenJDK: class compilation issue (Hotspot, 8281859) OpenJDK: improper restriction of MethodHandle.invokeBasic() (Hotspot, 8281866) OpenJDK: integer truncation issue in Xalan-J (JAXP, 8285407)
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::crb"
] | null | 7.5 | null | null |
RHSA-2022:8793
|
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.4.8 security update
|
Undertow: DoS can be achieved as Undertow server waits for the LAST_CHUNK forever for EJB invocations
|
[
"cpe:/a:redhat:jboss_enterprise_application_platform:7.4"
] | null | 4.2 | null | null |
RHSA-2023:7139
|
Red Hat Security Advisory: samba security, bug fix, and enhancement update
|
samba: out-of-bounds read in winbind AUTH_CRAP samba: infinite loop in mdssvc RPC service for spotlight samba: type confusion in mdssvc RPC service for spotlight samba: spotlight server-side share path disclosure
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb",
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 5.3 | null | null |
RHSA-2005:839
|
Red Hat Security Advisory: lynx security update
|
lynx arbitrary command execution
|
[
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws",
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2022:6763
|
Red Hat Security Advisory: bind security update
|
bind: BIND 9 resolvers configured to answer from cache with zero stale-answer-timeout may terminate unexpectedly bind: memory leak in ECDSA DNSSEC verification code bind: memory leaks in EdDSA DNSSEC verification code
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::crb"
] | null | 7.5 | null | null |
RHSA-2009:1642
|
Red Hat Security Advisory: acpid security update
|
acpid: log file created with random permissions
|
[
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2020:0738
|
Red Hat Security Advisory: chromium-browser security update
|
chromium-browser: Type confusion in V8 chromium-browser: Use after free in WebAudio chromium-browser: Use after free in speech chromium-browser: Out of bounds memory access in streams chromium-browser: Type confusion in V8 ICU: Integer overflow in UnicodeString::doAppend()
|
[
"cpe:/a:redhat:rhel_extras:6"
] | null | 8.8 | 8.8 | null |
RHSA-2022:5232
|
Red Hat Security Advisory: kernel security and bug fix update
|
kernel: race condition in perf_event_open leads to privilege escalation kernel: netfilter: nf_tables: incorrect NFT_STATEFUL_EXPR check leads to a use-after-free (write) kernel: a use-after-free write in the netfilter subsystem can lead to privilege escalation to root
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 7.8 | null | null |
RHSA-2018:3549
|
Red Hat Security Advisory: OpenShift Container Platform 3.10 security update
|
kubernetes: authentication/authorization bypass in the handling of non-101 responses
|
[
"cpe:/a:redhat:openshift:3.10::el7"
] | null | null | 8.8 | null |
RHSA-2024:4647
|
Red Hat Security Advisory: qt5-qtbase security update
|
qtbase: qtbase: Delay any communication until encrypted() can be responded to
|
[
"cpe:/o:redhat:rhel_els:7"
] | null | 7.5 | null | null |
RHSA-2023:7038
|
Red Hat Security Advisory: flatpak security, bug fix, and enhancement update
|
flatpak: TIOCLINUX can send commands outside sandbox if running on a virtual console flatpak: Metadata with ANSI control codes can cause misleading terminal output
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb"
] | null | 6.2 | null | null |
RHSA-2022:8645
|
Red Hat Security Advisory: varnish:6 security update
|
varnish: Request Forgery Vulnerability
|
[
"cpe:/a:redhat:rhel_eus:8.4::appstream"
] | null | 7.5 | null | null |
RHSA-2022:0860
|
Red Hat Security Advisory: OpenShift Container Platform 4.9.25 security update
|
CRI-O: Arbitrary code execution in cri-o via abusing “kernel.core_pattern” kernel parameter
|
[
"cpe:/a:redhat:openshift:4.9::el7",
"cpe:/a:redhat:openshift:4.9::el8"
] | null | 8.8 | null | null |
RHSA-2022:7086
|
Red Hat Security Advisory: pki-core security update
|
pki-core: When using the caServerKeygen_DirUserCert profile, user can get certificates for other UIDs by entering name in Subject field
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 7.6 | null | null |
RHSA-2023:7395
|
Red Hat Security Advisory: python-setuptools security update
|
pypa-setuptools: Regular Expression Denial of Service (ReDoS) in package_index.py
|
[
"cpe:/o:redhat:rhel_eus:8.6::baseos"
] | null | 5.9 | null | null |
RHSA-2023:1804
|
Red Hat Security Advisory: thunderbird security update
|
Thunderbird: Revocation status of S/Mime recipient certificates was not checked Mozilla: Memory Corruption in Safe Browsing Code Mozilla: libwebp: Double-free in libwebp Mozilla: Matrix SDK bundled with Thunderbird vulnerable to denial-of-service attack Thunderbird: Hang when processing certain OpenPGP messages Mozilla: Fullscreen notification obscured Mozilla: Potential Memory Corruption following Garbage Collector compaction Mozilla: Invalid free from JavaScript code Mozilla: Content-Disposition filename truncation leads to Reflected File Download Mozilla: Files with malicious extensions could have been downloaded unsafely on Linux Mozilla: Incorrect optimization result on ARM64 Mozilla: Memory safety bugs fixed in Firefox 112 and Firefox ESR 102.10
|
[
"cpe:/a:redhat:rhel_eus:8.4::appstream"
] | null | 8.8 | null | null |
RHSA-2007:0003
|
Red Hat Security Advisory: xorg-x11 security update
|
security flaw security flaw security flaw
|
[
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2021:1581
|
Red Hat Security Advisory: sqlite security update
|
sqlite: integer overflow in sqlite3_str_vappendf function in printf.c sqlite: heap-based buffer overflow in multiSelectOrderBy due to mishandling of query-flattener optimization in select.c
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 5.5 | null | null |
RHSA-2008:0090
|
Red Hat Security Advisory: icu security update
|
libicu poor back reference validation libicu incomplete interval handling
|
[
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2024:1538
|
Red Hat Security Advisory: OpenShift Container Platform 4.12 low-latency extras security update
|
golang-protobuf: encoding/protojson, internal/encoding/json: infinite loop in protojson.Unmarshal when unmarshaling certain forms of invalid JSON
|
[
"cpe:/a:redhat:openshift:4.12::el8"
] | null | 5.9 | null | null |
RHSA-2008:0003
|
Red Hat Security Advisory: e2fsprogs security update
|
e2fsprogs multiple integer overflows
|
[
"cpe:/o:redhat:enterprise_linux:2.1::as",
"cpe:/o:redhat:enterprise_linux:2.1::aw",
"cpe:/o:redhat:enterprise_linux:2.1::es",
"cpe:/o:redhat:enterprise_linux:2.1::ws",
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws",
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws",
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2024:10957
|
Red Hat Security Advisory: Updated 8.0 container image is now available in the Red Hat Ecosystem Catalog.
|
ceph: rhceph-container: Authentication bypass in CEPH RadosGW
|
[
"cpe:/a:redhat:ceph_storage:8.0::el9"
] | null | 9.1 | null | null |
RHSA-2023:6129
|
Red Hat Security Advisory: OpenShift Container Platform 4.13.19 security and extras update
|
golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487) HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack)
|
[
"cpe:/a:redhat:openshift:4.13::el8",
"cpe:/a:redhat:openshift:4.13::el9"
] | null | 7.5 | null | null |
RHSA-2022:5252
|
Red Hat Security Advisory: libarchive security update
|
libarchive: an out-of-bounds read via the component zipx_lzma_alone_init
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::crb",
"cpe:/o:redhat:enterprise_linux:9::baseos"
] | null | 6.5 | null | null |
RHSA-2008:0558
|
Red Hat Security Advisory: freetype security update
|
FreeType PFB integer overflow FreeType invalid free() flaw FreeType off-by-one flaws
|
[
"cpe:/o:redhat:enterprise_linux:2.1::as",
"cpe:/o:redhat:enterprise_linux:2.1::aw",
"cpe:/o:redhat:enterprise_linux:2.1::es",
"cpe:/o:redhat:enterprise_linux:2.1::ws"
] | null | null | null | null |
RHSA-2020:3474
|
Red Hat Security Advisory: bash security update
|
bash: BASH_CMD is writable in restricted bash shells
|
[
"cpe:/o:redhat:rhel_eus:7.6::computenode",
"cpe:/o:redhat:rhel_eus:7.6::server"
] | null | 7.8 | null | null |
RHSA-2018:0081
|
Red Hat Security Advisory: flash-plugin security update
|
flash-plugin: unintended reset of global settings preference file vulnerability (APSB17-42) flash-plugin: out-of-bounds read causing information leak (APSB18-01)
|
[
"cpe:/a:redhat:rhel_extras:6"
] | null | null | 6.5 | null |
RHSA-2023:7764
|
Red Hat Security Advisory: buildah security update
|
golang: crypto/tls: slow verification of certificate chains containing large RSA keys golang: html/template: improper handling of HTML-like comments within script contexts golang: html/template: improper handling of special tags within script contexts golang: crypto/tls: panic when processing post-handshake message on QUIC connections golang: crypto/tls: lack of a limit on buffered post-handshake
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 7.5 | null | null |
RHSA-2024:0645
|
Red Hat Security Advisory: OpenShift Container Platform 4.14.11 packages and security update
|
runc: file descriptor leak
|
[
"cpe:/a:redhat:openshift:4.14::el8",
"cpe:/a:redhat:openshift:4.14::el9",
"cpe:/a:redhat:openshift_ironic:4.14::el9"
] | null | 8.6 | null | null |
RHSA-2020:4184
|
Red Hat Security Advisory: spice and spice-gtk security update
|
spice: multiple buffer overflow vulnerabilities in QUIC decoding code
|
[
"cpe:/a:redhat:rhel_e4s:8.0::appstream"
] | null | 6.6 | null | null |
RHSA-2013:0163
|
Red Hat Security Advisory: jbossweb security update
|
Web: Bypass of security constraints
|
[
"cpe:/a:redhat:jboss_enterprise_application_platform:6.0.1"
] | null | null | null | null |
RHSA-2021:5241
|
Red Hat Security Advisory: kernel-rt security and bug fix update
|
kernel: In Overlayfs missing a check for a negative dentry before calling vfs_rename()
|
[
"cpe:/a:redhat:enterprise_linux:8::nfv",
"cpe:/a:redhat:enterprise_linux:8::realtime"
] | null | 5.5 | null | null |
RHSA-2016:1096
|
Red Hat Security Advisory: kernel security and bug fix update
|
kernel: net: incorrect processing of checksums in UDP implementation kernel: net: incorrect processing of checksums in UDP implementation
|
[
"cpe:/o:redhat:rhel_aus:6.4::server"
] | null | null | null | null |
RHBA-2019:1605
|
Red Hat Bug Fix Advisory: OpenShift Container Platform 3.11 bug fix and enhancement update
|
jenkins-credentials-plugin: Certificate file read vulnerability in Credentials Plugin (SECURITY-1322) jenkins-plugin-workflow-remote-loader: Unsafe Script Security whitelist entry in Pipeline Remote Loader Plugin (SECURITY-921) jenkins: Jenkins accepted cached legacy CLI authentication jenkins: Improper escaping of job URLs in f:validateButton leads to cross-site scripting vulnerability.
|
[
"cpe:/a:redhat:openshift:3.11::el7"
] | null | null | 5.4 | null |
RHSA-2008:0503
|
Red Hat Security Advisory: xorg-x11 security update
|
X.org Record and Security extensions memory corruption X.org MIT-SHM extension arbitrary memory read X.org Render extension AllocateGlyph() heap buffer overflow X.org Render extension ProcRenderCreateCursor() crash
|
[
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2018:1667
|
Red Hat Security Advisory: libvirt security update
|
hw: cpu: speculative store bypass
|
[
"cpe:/o:redhat:rhel_eus:6.7::computenode",
"cpe:/o:redhat:rhel_eus:6.7::server"
] | null | null | 5.6 | null |
RHSA-2008:1025
|
Red Hat Security Advisory: java-1.5.0-sun security update
|
Java Web Start File Inclusion via System Properties Override JavaWebStart allows unauthorized network connections Java WebStart privilege escalation Java Web Start exposes username and the pathname of the JWS cache Java Web Start BasicService displays local files in the browser Java WebStart allows hidden code privilege escalation Java WebStart unprivileged local file and network access JRE allows unauthorized file access and connections to localhost JRE allows unauthorized memory read access via a crafted ZIP file OpenJDK Denial-Of-Service in kerberos authentication (6588160) OpenJDK RSA public key length denial-of-service (6497740) OpenJDK allows to list files within the user home directory (6484091) OpenJDK UTF-8 decoder accepts non-shortest form sequences (4486841) OpenJDK Jar200 Decompression buffer overflow (6755943) OpenJDK calendar object deserialization allows privilege escalation (6734167) OpenJDK Privilege escalation in command line applications (6733959) OpenJDK Font processing vulnerability (6733336) OpenJDK Truetype Font processing vulnerability (6751322) OpenJDK Buffer overflow in image processing (6726779) OpenJDK temporary files have guessable file names (6721753)
|
[
"cpe:/a:redhat:rhel_extras:4",
"cpe:/a:redhat:rhel_extras:5::client",
"cpe:/a:redhat:rhel_extras:5::server"
] | null | null | null | null |
RHSA-2020:4048
|
Red Hat Security Advisory: qemu-kvm security update
|
QEMU: usb: out-of-bounds r/w access issue while processing usb packets
|
[
"cpe:/o:redhat:rhel_aus:7.2::server"
] | null | 5 | null | null |
RHSA-2019:1144
|
Red Hat Security Advisory: thunderbird security update
|
mozilla: Use after free in Skia Mozilla: Proxy Auto-Configuration file can define localhost access to be proxied thunderbird: flaw in verification of S/MIME signature resulting in signature spoofing mozilla: Integer overflow in Skia Mozilla: Memory safety bugs fixed in Firefox 66 and Firefox ESR 60.6 Mozilla: Use-after-free when removing in-use DOM elements Mozilla: Type inference is incorrect for constructors entered through on-stack replacement with IonMonkey Mozilla: IonMonkey leaks JS_OPTIMIZED_OUT magic value to script Mozilla: Improper bounds checks when Spectre mitigations are disabled Mozilla: Type-confusion in IonMonkey JIT compiler Mozilla: Use-after-free with SMIL animation controller Mozilla: IonMonkey MArraySlice has incorrect alias information Mozilla: Ionmonkey type confusion with __proto__ mutations
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | null | 8.8 | null |
RHBA-2013:0363
|
Red Hat Bug Fix Advisory: sudo bug fix and enhancement update
|
sudo: bypass of tty_tickets constraints
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2016:2954
|
Red Hat Security Advisory: Red Hat Ceph Storage 2.1 security and bug fix update
|
ceph: Object Gateway server DoS by sending invalid cross-origin HTTP request
|
[
"cpe:/a:redhat:ceph_storage:2::el7"
] | null | null | 6.5 | null |
RHSA-2016:0715
|
Red Hat Security Advisory: kernel security, bug fix, and enhancement update
|
kernel: x86-64: IRET faults during NMIs processing kernel: SCTP denial of service during timeout
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2013:1370
|
Red Hat Security Advisory: jboss-remoting security update
|
Remoting: DoS by file descriptor exhaustion
|
[
"cpe:/a:redhat:jboss_enterprise_web_platform:5::el4",
"cpe:/a:redhat:jboss_enterprise_web_platform:5::el5",
"cpe:/a:redhat:jboss_enterprise_web_platform:5::el6"
] | null | null | null | null |
RHSA-2020:3639
|
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.2.9 on RHEL 8 security update
|
hibernate: SQL injection issue in Hibernate ORM resteasy: Improper validation of response header in MediaTypeHeaderDelegate.java class EAP: field-name is not parsed in accordance to RFC7230 Wildfly: Improper authorization issue in WildFlySecurityManager when using alternative protection domain Mojarra: Path traversal via either the loc parameter or the con parameter, incomplete fix of CVE-2018-14371 jackson-databind: Lacks certain xbean-reflect/JNDI blocking jackson-databind: Serialization gadgets in shaded-hikari-config jackson-databind: Serialization gadgets in ibatis-sqlmap jackson-databind: Serialization gadgets in anteros-core jackson-databind: mishandles the interaction between serialization gadgets and typing which could result in remote command execution jackson-databind: mishandles the interaction between serialization gadgets and typing which could result in remote command execution dom4j: XML External Entity vulnerability in default SAX parser Undertow: Incomplete fix for CVE-2017-2666 due to permitting invalid characters in HTTP requests hibernate-validator: Improper input validation in the interpolation of constraint error messages wildfly-elytron: session fixation when using FORM authentication wildfly: exposed setting of TCCL via the EmbeddedManagedProcess API wildfly: unsafe deserialization in Wildfly Enterprise Java Beans wildfly: Some EJB transaction objects may get accumulated causing Denial of Service wildfly: EJB SessionOpenInvocations may not be removed properly after a response is received causing Denial of Service
|
[
"cpe:/a:redhat:jboss_enterprise_application_platform:7.2::el8"
] | null | 6.5 | 4.8 | null |
RHSA-2022:0849
|
Red Hat Security Advisory: kpatch-patch security update
|
kernel: Use After Free in unix_gc() which could result in a local privilege escalation kernel: local privilege escalation by exploiting the fsconfig syscall parameter leads to container breakout kernel: possible privileges escalation due to missing TLB flush kernel: remote stack overflow via kernel panic on systems using TIPC may lead to DoS kernel: cgroups v1 release_agent feature may allow privilege escalation kernel: failing usercopy allows for use-after-free exploitation
|
[
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 7 | null | null |
RHSA-2013:0517
|
Red Hat Security Advisory: util-linux-ng security, bug fix and enhancement update
|
util-linux: mount folder existence information disclosure
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2021:1288
|
Red Hat Security Advisory: kernel security and bug fix update
|
kernel: locking issue in drivers/tty/tty_jobctrl.c can lead to an use-after-free kernel: increase slab leak leads to DoS kernel: out-of-bounds read in libiscsi module kernel: heap buffer overflow in the iSCSI subsystem
|
[
"cpe:/o:redhat:rhel_els:6"
] | null | 7.8 | null | null |
RHSA-2019:1422
|
Red Hat Security Advisory: OpenShift Container Platform 3.11 atomic-openshift-web-console security update
|
xterm.js: Mishandling of special characters allows for remote code execution
|
[
"cpe:/a:redhat:openshift:3.11::el7"
] | null | null | 7.5 | null |
RHSA-2019:0054
|
Red Hat Security Advisory: ansible security update
|
ansible: Failed tasks do not honour no_log option allowing for secrets to be disclosed in logs ansible: Inventory variables are loaded from current working directory when running ad-hoc command that can lead to code execution ansible: ansible.cfg is being read from current working directory allowing possible code execution
|
[
"cpe:/a:redhat:openstack:10::el7"
] | null | null | 7.8 | null |
RHSA-2023:5615
|
Red Hat Security Advisory: libssh2 security update
|
libssh2: use-of-uninitialized-value in _libssh2_transport_read
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 7.5 | null | null |
RHSA-2020:4432
|
Red Hat Security Advisory: python-pip security update
|
python-pip: directory traversal in _download_http_url() function in src/pip/_internal/download.py
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 8 | null | null |
RHSA-2019:2519
|
Red Hat Security Advisory: rh-php71-php security, bug fix, and enhancement update
|
gd: Unsigned integer underflow _gdContributionsAlloc() php: Out of bounds access in php_pcre.c:php_pcre_replace_impl() php: Integer overflow in mysqli_api.c:mysqli_real_escape_string() php: Heap use after free in ext/standard/var_unserializer.re php: Out-of-bound read in timelib_meridian() gd: Infinite loop in gdImageCreateFromGifCtx() in gd_gif_in.c php: Reflected XSS on PHAR 404 page php: Stack-based buffer under-read in php_stream_url_wrap_http_ex() in http_fopen_wrapper.c when parsing HTTP response php: Dumpable FPM child processes allow bypassing opcache access controls php: Infinite loop in ext/iconv/iconv.c when using stream filter with convert.incov on invalid sequence leads to denial-of-service php: Reflected XSS vulnerability on PHAR 403 and 404 error pages php: NULL pointer dereference due to mishandling of ldap_get_dn return value allows DoS via malicious LDAP server reply php: Out-of-bounds read in ext/exif/exif.c:exif_read_data() when reading crafted JPEG data php: exif: Buffer over-read in exif_process_IFD_in_MAKERNOTE() php: Mishandled http_header_value in an atoi() call in http_fopen_wrapper.c php: Cross-site scripting (XSS) flaw in Apache2 component via body of 'Transfer-Encoding: chunked' request php: Buffer over-read in PHAR reading functions gd: Heap-based buffer overflow in gdImageColorMatch() in gd_color_match.c php: Invalid memory access in function xmlrpc_decode() php: Heap-based buffer over-read in PHAR reading functions php: memcpy with negative length via crafted DNS response php: Heap-based buffer over-read in mbstring regular expression functions php: Out-of-bounds read in base64_decode_xmlrpc in ext/xmlrpc/libxmlrpc/base64.c php: File rename across filesystems may allow unwanted access during processing php: Uninitialized read in exif_process_IFD_in_MAKERNOTE php: Uninitialized read in exif_process_IFD_in_MAKERNOTE php: Invalid read in exif_process_SOFn() php: Heap buffer overflow in function exif_process_IFD_TAG() php: Heap buffer overflow in function exif_iif_add_value() php: Buffer over-read in exif_process_IFD_TAG() leading to information disclosure gd: Information disclosure in gdImageCreateFromXbm() php: Out-of-bounds read due to integer overflow in iconv_mime_decode_headers() php: Buffer over-read in exif_read_data()
|
[
"cpe:/a:redhat:rhel_software_collections:3::el7"
] | null | null | 6.5 | null |
RHSA-2009:1136
|
Red Hat Security Advisory: dhcp security update
|
dhclient: stack overflow leads to arbitrary code execution as root
|
[
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws",
"cpe:/o:redhat:rhel_eus:4.7::as",
"cpe:/o:redhat:rhel_eus:4.7::es"
] | null | null | null | null |
RHSA-2011:1342
|
Red Hat Security Advisory: thunderbird security update
|
Mozilla: Code installation through holding down Enter (MFSA 2011-40) Mozilla: Miscellaneous memory safety hazards (MFSA 2011-36) Mozilla: Integer underflow when using JavaScript RegExp (MFSA 2011-37) Mozilla: XSS via plugins and shadowed window.location object (MFSA 2011-38) Mozilla: Defense against multiple Location headers due to CRLF Injection (MFSA 2011-39)
|
[
"cpe:/o:redhat:enterprise_linux:6::server"
] | null | null | null | null |
RHSA-2018:1055
|
Red Hat Security Advisory: libvncserver security update
|
libvncserver: Improper input sanitization in rfbProcessClientNormalMessage in rfbserver.c
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 5.4 | null |
RHSA-2022:6716
|
Red Hat Security Advisory: thunderbird security update
|
Mozilla: Remote content specified in an HTML document that was nested inside an iframe's srcdoc attribute was not blocked Mozilla: Leaking of sensitive information when composing a response to an HTML email with a META refresh tag Mozilla: An iframe element in an HTML email could trigger a network request Mozilla: Out of bounds read when decoding H264 Mozilla: Matrix SDK bundled with Thunderbird vulnerable to denial-of-service attack Mozilla: Content-Security-Policy base-uri bypass Mozilla: Incoherent instruction cache when building WASM on ARM64 Mozilla: Bypassing Secure Context restriction for cookies with __Host and __Secure prefix Mozilla: Bypassing FeaturePolicy restrictions on transient pages Mozilla: Data-race when parsing non-UTF-8 URLs in threads Mozilla: Memory safety bugs fixed in Firefox 105 and Firefox ESR 102.3
|
[
"cpe:/a:redhat:rhel_e4s:8.1::appstream"
] | null | 8.8 | 7.5 | null |
RHSA-2025:1132
|
Red Hat Security Advisory: firefox security update
|
firefox: thunderbird: Use-after-free in XSLT firefox: thunderbird: Use-after-free in Custom Highlight firefox: thunderbird: A bug in WebAssembly code generation could result in a crash firefox: thunderbird: Use-after-free during concurrent delazification firefox: thunderbird: Potential opening of private browsing tabs in normal browsing windows firefox: thunderbird: Certificate length was not properly checked firefox: thunderbird: Memory safety bugs fixed in Firefox 135, Thunderbird 135, Firefox ESR 115.20, Firefox ESR 128.7, Thunderbird 115.20, and Thunderbird 128.7 firefox: thunderbird: Memory safety bugs fixed in Firefox 135, Thunderbird 135, Firefox ESR 128.7, and Thunderbird 128.7
|
[
"cpe:/o:redhat:rhel_els:7"
] | null | 8.8 | null | null |
RHSA-2025:3382
|
Red Hat Security Advisory: freetype security update
|
freetype: OOB write when attempting to parse font subglyph structures related to TrueType GX and variable font files
|
[
"cpe:/o:redhat:rhel_aus:8.4::baseos",
"cpe:/o:redhat:rhel_e4s:8.4::baseos",
"cpe:/o:redhat:rhel_tus:8.4::baseos"
] | null | 8.1 | null | null |
RHSA-2024:1648
|
Red Hat Security Advisory: bind9.16 security update
|
bind9: Parsing large DNS messages may cause excessive CPU load bind9: Querying RFC 1918 reverse zones may cause an assertion failure when “nxdomain-redirect” is enabled bind9: Enabling both DNS64 and serve-stale may cause an assertion failure during recursive resolution bind9: Specific recursive query patterns may lead to an out-of-memory condition bind9: KeyTrap - Extreme CPU consumption in DNSSEC validator bind9: Preparing an NSEC3 closest encloser proof can exhaust CPU resources
|
[
"cpe:/a:redhat:rhel_eus:8.8::appstream",
"cpe:/a:redhat:rhel_eus:8.8::crb"
] | null | 7.5 | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.