id
stringlengths 13
15
| title
stringlengths 29
176
| description
stringlengths 8
32.1k
| cpes
listlengths 0
20
| cvss_v4_0
null | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
null |
---|---|---|---|---|---|---|---|
RHSA-2023:0290
|
Red Hat Security Advisory: firefox security update
|
Mozilla: libusrsctp library out of date Mozilla: Fullscreen notification bypass Mozilla: Arbitrary file read from GTK drag and drop on Linux Mozilla: Malicious command could be hidden in devtools output Mozilla: URL being dragged from cross-origin iframe into same tab triggers navigation Mozilla: Content Security Policy wasn't being correctly applied to WebSockets in WebWorkers Mozilla: Calls to <code>console.log</code> allowed bypasing Content Security Policy via format directive Mozilla: Memory safety bugs fixed in Firefox 109 and Firefox ESR 102.7
|
[
"cpe:/a:redhat:rhel_e4s:8.1::appstream"
] | null | 8.8 | null | null |
RHSA-2004:019
|
Red Hat Security Advisory: mailman security update
|
security flaw
|
[
"cpe:/o:redhat:enterprise_linux:2.1::as",
"cpe:/o:redhat:enterprise_linux:2.1::aw",
"cpe:/o:redhat:enterprise_linux:2.1::es"
] | null | null | null | null |
RHSA-2022:4721
|
Red Hat Security Advisory: kpatch-patch security update
|
kernel: cgroups v1 release_agent feature may allow privilege escalation
|
[
"cpe:/o:redhat:rhel_e4s:7.7::server"
] | null | 7 | null | null |
RHSA-2024:1265
|
Red Hat Security Advisory: OpenShift Container Platform 4.12.53 bug fix and security update
|
helm: getHostByName Function Information Disclosure
|
[
"cpe:/a:redhat:openshift:4.12::el8",
"cpe:/a:redhat:openshift:4.12::el9"
] | null | 4.3 | null | null |
RHSA-2023:1103
|
Red Hat Security Advisory: kpatch-patch security update
|
kernel: stack overflow in do_proc_dointvec and proc_skip_spaces
|
[
"cpe:/o:redhat:rhel_e4s:8.2::baseos"
] | null | 7.8 | null | null |
RHSA-2005:378
|
Red Hat Security Advisory: cpio security update
|
security flaw
|
[
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws",
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2020:2213
|
Red Hat Security Advisory: ipmitool security update
|
ipmitool: Buffer overflow in read_fru_area_section function in lib/ipmi_fru.c
|
[
"cpe:/o:redhat:rhel_aus:7.4::server",
"cpe:/o:redhat:rhel_e4s:7.4::server",
"cpe:/o:redhat:rhel_tus:7.4::server"
] | null | 8.1 | null | null |
RHSA-2023:7731
|
Red Hat Security Advisory: tracker-miners security update
|
tracker-miners: sandbox escape
|
[
"cpe:/a:redhat:rhel_aus:8.2::appstream",
"cpe:/a:redhat:rhel_e4s:8.2::appstream",
"cpe:/a:redhat:rhel_tus:8.2::appstream"
] | null | 7.5 | null | null |
RHSA-2020:5394
|
Red Hat Security Advisory: libexif security update
|
libexif: out of bounds write due to an integer overflow in exif-entry.c
|
[
"cpe:/a:redhat:rhel_eus:8.2::appstream",
"cpe:/a:redhat:rhel_eus:8.2::crb"
] | null | 9.8 | null | null |
RHSA-2022:6038
|
Red Hat Security Advisory: .NET 6.0 security, bug fix, and enhancement update
|
dotnet: External Entity Injection during XML signature verification
|
[
"cpe:/a:redhat:rhel_dotnet:6.0::el7"
] | null | 5.9 | null | null |
RHSA-2017:2972
|
Red Hat Security Advisory: httpd security update
|
httpd: Use-after-free by limiting unregistered HTTP method (Optionsbleed) httpd: # character matches all IPs
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | 6.5 | null |
RHSA-2020:1963
|
Red Hat Security Advisory: ruby security update
|
ruby: HTTP response splitting in WEBrick ruby: Buffer under-read in String#unpack
|
[
"cpe:/o:redhat:rhel_eus:7.5::computenode",
"cpe:/o:redhat:rhel_eus:7.5::server"
] | null | null | 4.8 | null |
RHSA-2010:0615
|
Red Hat Security Advisory: libvirt security and bug fix update
|
libvirt: not setting user defined backing store format when creating new image libvirt: improperly mapped source privileged ports may allow for obtaining privileged resources on the host
|
[
"cpe:/a:redhat:rhel_virtualization:5::client",
"cpe:/a:redhat:rhel_virtualization:5::server"
] | null | null | null | null |
RHSA-2024:10964
|
Red Hat Security Advisory: ruby security update
|
rexml: REXML ReDoS vulnerability
|
[
"cpe:/a:redhat:rhel_eus:9.2::appstream",
"cpe:/a:redhat:rhel_eus:9.2::crb"
] | null | 7.5 | null | null |
RHSA-2020:5441
|
Red Hat Security Advisory: kernel-rt security and bug fix update
|
kernel: The flow_dissector feature allows device tracking kernel: Buffer over-read in crypto_authenc_extractkeys() when a payload longer than 4 bytes is not aligned. kernel: buffer uses out of index in ext3/4 filesystem kernel: metadata validator in XFS may cause an inode with a valid, user-creatable extended attribute to be flagged as corrupt kernel: umask not applied on filesystem without ACL support kernel: TOCTOU mismatch in the NFS client code kernel: improper input validation in ppp_cp_parse_cr function leads to memory corruption and read overflow
|
[
"cpe:/a:redhat:rhel_extras_rt:7"
] | null | 7.2 | null | null |
RHSA-2024:2208
|
Red Hat Security Advisory: freerdp security update
|
freerdp: Incorrect offset calculation leading to DOS freerdp: Null Pointer Dereference leading DOS in RemoteFX freerdp: invalid offset validation leading to Out Of Bound Write freerdp: missing offset validation leading to Out Of Bound Read freerdp: Out-Of-Bounds Read in nsc_rle_decompress_data freerdp: missing offset validation leading to Out-of-Bounds Read in gdi_multi_opaque_rect freerdp: integer-Underflow leading to Out-Of-Bound Read in zgfx_decompress_segment freerdp: Integer overflow leading to out-of-bound write vulnerability in gdi_CreateSurface freerdp: Out-of-bounds read in general_LumaToYUV444 freerdp: Out-of-bounds write in clear_decompress_bands_data freerdp: Out-of-bounds write in the `progressive_decompress` function due to incorrect calculations freerdp: buffer overflow in ncrush_decompress causes crash with crafted input
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::crb"
] | null | 7.5 | null | null |
RHSA-2007:0158
|
Red Hat Security Advisory: evolution security update
|
evolution format string flaw
|
[
"cpe:/a:redhat:rhel_productivity:5",
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation"
] | null | null | null | null |
RHSA-2023:3949
|
Red Hat Security Advisory: open-vm-tools security update
|
open-vm-tools: authentication bypass vulnerability in the vgauth module
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 3.9 | null | null |
RHSA-2024:0435
|
Red Hat Security Advisory: rpm security update
|
rpm: TOCTOU race in checks for unsafe symlinks rpm: races with chown/chmod/capabilities calls during installation rpm: checks for unsafe symlinks are not performed for intermediary directories
|
[
"cpe:/a:redhat:rhel_eus:9.0::appstream",
"cpe:/o:redhat:rhel_eus:9.0::baseos"
] | null | 6.5 | null | null |
RHSA-2012:1139
|
Red Hat Security Advisory: bind-dyndb-ldap security update
|
bind-dyndb-ldap: named DoS via DNS query with $ in name
|
[
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2018:0504
|
Red Hat Security Advisory: mailman security update
|
mailman: Cross-site scripting (XSS) vulnerability in web UI
|
[
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | 6.1 | null |
RHSA-2019:3958
|
Red Hat Security Advisory: Red Hat Ansible Tower 3.6.1-1 - EL7 Container
|
Tower: RHSM username and password exposed after license application
|
[
"cpe:/a:redhat:ansible_tower:3.6::el7"
] | null | null | 8.4 | null |
RHSA-2019:1300
|
Red Hat Security Advisory: go-toolset-1.11-golang security update
|
golang: CRLF injection in net/http
|
[
"cpe:/a:redhat:devtools:2019"
] | null | null | 5.3 | null |
RHSA-2018:1809
|
Red Hat Security Advisory: Red Hat OpenShift Application Runtimes Spring Boot security and bug fix update
|
spring-framework: ReDoS Attack with spring-messaging spring-data-commons: XXE with Spring Data’s XMLBeam integration spring-security-oauth: remote code execution in the authorization process
|
[
"cpe:/a:redhat:openshift_application_runtimes:1.0"
] | null | null | 6.3 | null |
RHSA-2007:0993
|
Red Hat Security Advisory: kernel security update
|
ALSA memory disclosure flaw kernel ieee80211 off-by-two integer underflow open(O_ATOMICLOOKUP) leaks dentry
|
[
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2024:0755
|
Red Hat Security Advisory: runc security update
|
runc: file descriptor leak
|
[
"cpe:/a:redhat:rhel_eus:9.2::appstream"
] | null | 8.6 | null | null |
RHSA-2022:0958
|
Red Hat Security Advisory: kpatch-patch-4_18_0-147_58_1 security and bug fix update
|
kernel: Use After Free in unix_gc() which could result in a local privilege escalation kernel: use-after-free in RDMA listen() kernel: fget: check that the fd still exists after getting a ref to it kernel: xfs: raw block device data leak in XFS_IOC_ALLOCSP IOCTL kernel: possible privileges escalation due to missing TLB flush kernel: cgroups v1 release_agent feature may allow privilege escalation kernel: failing usercopy allows for use-after-free exploitation
|
[
"cpe:/o:redhat:rhel_e4s:8.1::baseos"
] | null | 7 | null | null |
RHSA-2022:8553
|
Red Hat Security Advisory: firefox security update
|
expat: use-after free caused by overeager destruction of a shared DTD in XML_ExternalEntityParserCreate Mozilla: Service Workers might have learned size of cross-origin media files Mozilla: Fullscreen notification bypass Mozilla: Use-after-free in InputStream implementation Mozilla: Use-after-free of a JavaScript Realm Mozilla: Fullscreen notification bypass via windowName Mozilla: Use-after-free in Garbage Collection Mozilla: ServiceWorker-intercepted requests bypassed SameSite cookie policy Mozilla: Cross-Site Tracing was possible via non-standard override headers Mozilla: Symlinks may resolve to partially uninitialized buffers Mozilla: Keystroke Side-Channel Leakage Mozilla: Custom mouse cursor could have been drawn over browser UI Mozilla: Iframe contents could be rendered outside the iframe Mozilla: Memory safety bugs fixed in Firefox 107 and Firefox ESR 102.5
|
[
"cpe:/a:redhat:rhel_e4s:8.1::appstream"
] | null | 8.8 | 6.1 | null |
RHSA-2024:0619
|
Red Hat Security Advisory: thunderbird security update
|
Mozilla: Out of bounds write in ANGLE Mozilla: Failure to update user input timestamp Mozilla: Crash when listing printers on Linux Mozilla: Bypass of Content Security Policy when directive unsafe-inline was set Mozilla: Phishing site popup could show local origin in address bar Mozilla: Potential permissions request bypass via clickjacking Mozilla: Privilege escalation through devtools Mozilla: HSTS policy on subdomain could bypass policy of upper domain Mozilla: Memory safety bugs fixed in Firefox 122, Firefox ESR 115.7, and Thunderbird 115.7
|
[
"cpe:/a:redhat:rhel_aus:8.2::appstream",
"cpe:/a:redhat:rhel_e4s:8.2::appstream",
"cpe:/a:redhat:rhel_tus:8.2::appstream"
] | null | 8.8 | null | null |
RHSA-2014:1326
|
Red Hat Security Advisory: php53 and php security update
|
gd: NULL pointer dereference in gdImageCreateFromXpm() file: incomplete fix for CVE-2012-1571 in cdf_read_property_info php: multiple buffer over-reads in php_parserr php: SPL Iterators use-after-free php: ArrayIterator use-after-free due to object change during sorting
|
[
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server",
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2003:134
|
Red Hat Security Advisory: man security update
|
security flaw
|
[
"cpe:/o:redhat:enterprise_linux:2.1::as",
"cpe:/o:redhat:enterprise_linux:2.1::aw",
"cpe:/o:redhat:enterprise_linux:2.1::es",
"cpe:/o:redhat:enterprise_linux:2.1::ws"
] | null | null | null | null |
RHSA-2023:2706
|
Red Hat Security Advisory: Red Hat Single Sign-On 7.6.3 security update on RHEL 8
|
okhttp: information disclosure via improperly used cryptographic function undertow: Server identity in https connection is not checked by the undertow client snakeyaml: Uncaught exception in java.base/java.util.ArrayList.hashCode dev-java/snakeyaml: DoS via stack overflow codec-haproxy: HAProxyMessageDecoder Stack Exhaustion DoS apache-james-mime4j: Temporary File Information Disclosure in MIME4J TempFileStorageProvider RESTEasy: creation of insecure temp files
|
[
"cpe:/a:redhat:red_hat_single_sign_on:7.6::el8"
] | null | 5.3 | null | null |
RHSA-2019:3950
|
Red Hat Security Advisory: SDL security update
|
SDL: heap-based buffer overflow in SDL blit functions in video/SDL_blit*.c
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 8.1 | null |
RHSA-2019:0109
|
Red Hat Security Advisory: perl security update
|
perl: Integer overflow leading to buffer overflow in Perl_my_setenv()
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 8.1 | null |
RHSA-2013:0231
|
Red Hat Security Advisory: JBoss Enterprise Application Platform 6.0.1 security update
|
JBoss: allows empty password to authenticate against LDAP
|
[
"cpe:/a:redhat:jboss_enterprise_application_platform:6::el5",
"cpe:/a:redhat:jboss_enterprise_application_platform:6::el6"
] | null | null | null | null |
RHSA-2020:5351
|
Red Hat Security Advisory: ksh security update
|
ksh: certain environment variables interpreted as arithmetic expressions on startup, leading to code injection
|
[
"cpe:/o:redhat:rhel_aus:7.3::server"
] | null | 7.4 | null | null |
RHSA-2023:5973
|
Red Hat Security Advisory: Red Hat AMQ Streams 2.5.1 release and security update
|
HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack)
|
[
"cpe:/a:redhat:amq_streams:2"
] | null | 7.5 | null | null |
RHSA-2011:0600
|
Red Hat Security Advisory: dovecot security and enhancement update
|
Dovecot: Failed to properly update ACL cache, when multiple rules defined rights for one subject Dovecot: Busy master process, receiving a lot of SIGCHLD signals rapidly while logging, could die
|
[
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2024:0797
|
Red Hat Security Advisory: Satellite 6.14.2 Async Security Update
|
mosquitto: memory leak leads to unresponsive broker mosquitto: memory leak leads to unresponsive broker gRPC: file descriptor exhaustion leads to denial of service jetty-server: Cookie parsing of quoted values can exfiltrate values from other cookies sidekiq: DoS in dashboard-charts mosquitto: memory leak leads to unresponsive broker jetty: Improper addition of quotation marks to user inputs in CgiServlet curl: heap based buffer overflow in the SOCKS5 proxy handshake jetty: Improper validation of HTTP/1 content-length rubygem-puma: HTTP request smuggling when parsing chunked transfer encoding bodies and zero-length content-length headers
|
[
"cpe:/a:redhat:satellite:6.14::el8",
"cpe:/a:redhat:satellite_capsule:6.14::el8",
"cpe:/a:redhat:satellite_utils:6.14::el8"
] | null | 7.3 | null | null |
RHSA-2020:4846
|
Red Hat Security Advisory: mingw-expat security update
|
expat: large number of colons in input makes parser consume high amount of resources, leading to DoS
|
[
"cpe:/a:redhat:enterprise_linux:8::crb"
] | null | 7.5 | null | null |
RHSA-2016:2578
|
Red Hat Security Advisory: pacemaker security, bug fix, and enhancement update
|
pacemaker: pacemaker remote nodes vulnerable to hijacking, resulting in a DoS attack
|
[
"cpe:/o:redhat:enterprise_linux:7::server"
] | null | null | 8.6 | null |
RHSA-2023:7766
|
Red Hat Security Advisory: containernetworking-plugins security update
|
golang: crypto/tls: slow verification of certificate chains containing large RSA keys golang: html/template: improper handling of HTML-like comments within script contexts golang: html/template: improper handling of special tags within script contexts golang: crypto/tls: panic when processing post-handshake message on QUIC connections golang: crypto/tls: lack of a limit on buffered post-handshake
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 7.5 | null | null |
RHSA-2018:2645
|
Red Hat Security Advisory: kernel security update
|
kernel: TCP segments with random offsets allow a remote denial of service (SegmentSmack)
|
[
"cpe:/o:redhat:rhel_eus:6.7::computenode",
"cpe:/o:redhat:rhel_eus:6.7::server"
] | null | null | 7.5 | null |
RHSA-2013:1591
|
Red Hat Security Advisory: openssh security, bug fix, and enhancement update
|
openssh: Prevent connection slot exhaustion attacks
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2012:0902
|
Red Hat Security Advisory: cifs-utils security, bug fix, and enhancement update
|
cifs-utils: mount.cifs file existence disclosure vulnerability
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2018:2371
|
Red Hat Security Advisory: Red Hat OpenShift Application Runtimes security and bug fix update
|
vertx: Improper neutralization of CRLF sequences allows remote attackers to inject arbitrary HTTP response headers vertx-web: Incomplete CSRF validation by CSRFHandler
|
[
"cpe:/a:redhat:openshift_application_runtimes:1.0"
] | null | null | 6.8 | null |
RHSA-2024:9452
|
Red Hat Security Advisory: pcp security update
|
pcp: pmcd heap corruption through metric pmstore operations pcp: pmpost symlink attack allows escalating pcp to root user
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 4.4 | null | null |
RHSA-2024:10865
|
Red Hat Security Advisory: Red Hat Advanced Cluster Management 2.12.1 bug fixes and container updates
|
path-to-regexp: Backtracking regular expressions cause ReDoS find-my-way: ReDoS vulnerability in multiparametric routes
|
[
"cpe:/a:redhat:acm:2.12::el9"
] | null | 7.5 | null | null |
RHSA-2008:0864
|
Red Hat Security Advisory: tomcat security update
|
tomcat: Cross-Site-Scripting enabled by sendError call Tomcat host manager xss - name field tomcat RequestDispatcher information disclosure vulnerability tomcat Unicode directory traversal vulnerability
|
[
"cpe:/a:redhat:rhel_developer_suite:3"
] | null | null | null | null |
RHSA-2015:1486
|
Red Hat Security Advisory: java-1.6.0-ibm security update
|
JDK: plain text data stored in memory dumps OpenJDK: deserialization issue in ObjectInputStream.readSerialData() (Libraries, 8076401) OpenJDK: non-constant time comparisons in crypto code (JCE, 8074865) OpenJDK: incorrect code permission checks in RMIConnectionImpl (JMX, 8075853) OpenJDK: name for reverse DNS lookup used in certificate identity check (JSSE, 8067694) ICU: integer overflow in LETableReference verifyLength() (OpenJDK 2D, 8077520) JDK: unspecified vulnerability fixed in 6u101, 7u85 and 8u51 (2D) JDK: unspecified vulnerability fixed in 6u101, 7u85 and 8u51 (2D) JDK: unspecified vulnerability fixed in 6u101, 7u85 and 8u51 (Deployment) LOGJAM: TLS connections which support export grade DHE key-exchange are vulnerable to MITM attacks OpenJDK: improper permission checks in MBeanServerInvocationHandler (JMX, 8076397) OpenJDK: insufficient context checks during object deserialization (Libraries, 8076405) OpenJDK: RemoteObjectInvocationHandler allows calling finalize() (RMI, 8076409) OpenJDK: incorrect OCSP nextUpdate checking (Libraries, 8075374) OpenJDK: DnsClient fails to release request information after error (JNDI, 8075378) ICU: missing boundary checks in layout engine (OpenJDK 2D, 8071715)
|
[
"cpe:/a:redhat:rhel_extras:5::client",
"cpe:/a:redhat:rhel_extras:5::server",
"cpe:/a:redhat:rhel_extras:6"
] | null | null | 3.7 | null |
RHSA-2017:1297
|
Red Hat Security Advisory: kernel-rt security and bug fix update
|
kernel: Use after free in seq file kernel: Oops in shash_async_export() kernel: EXT4 memory corruption / SLAB out-of-bounds read kernel: net/packet: overflow in check for priv area size
|
[
"cpe:/a:redhat:enterprise_mrg:2:server:el6"
] | null | null | 7 | null |
RHSA-2022:6463
|
Red Hat Security Advisory: gnupg2 security update
|
gpg: Signature spoofing via status line injection
|
[
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 5.9 | null | null |
RHSA-2021:1313
|
Red Hat Security Advisory: Satellite 6.9 Release
|
rubygem-rest-client: session fixation vulnerability Set-Cookie headers present in an HTTP 30x redirection responses rubygem-rest-client: unsanitized application logging foreman: Managing repositories with their id via hammer does not respect the role filters rack-protection: Timing attack in authenticity_token.rb rubygem-rack: hijack sessions by using timing attacks targeting the session id python-psutil: Double free because of refcount mishandling rubygem-activestorage: circumvention of file size limits in ActiveStorage rubygem-actionpack: possible strong parameters bypass rubygem-activesupport: potentially unintended unmarshalling of user-provided objects in MemCacheStore and RedisCacheStore rubygem-actionpack: ability to forge per-form CSRF tokens given a global CSRF token rubygem-actionview: CSRF vulnerability in rails-ujs rubygem-rails: untrusted users able to run pending migrations in production django: potential SQL injection via "tolerance" parameter in GIS functions and aggregates on Oracle netty: compression/decompression codecs don't enforce limits on buffer allocation sizes foreman: world-readable OMAPI secret through the ISC DHCP server rubygem-activeview: Cross-site scripting in translation helpers resteasy-client: potential sensitive information leakage in JAX-RS RESTEasy Client's WebApplicationException handling
|
[
"cpe:/a:redhat:satellite:6.9::el7",
"cpe:/a:redhat:satellite_capsule:6.9::el7"
] | null | 5.3 | 7 | null |
RHSA-2021:2519
|
Red Hat Security Advisory: RHV-H security update (redhat-virtualization-host) 4.3.16
|
hw: vt-d related privilege escalation dhcp: stack-based buffer overflow when parsing statements with colon-separated hex digits in config or lease files in dhcpd and dhclient glib: integer overflow in g_bytes_new function on 64-bit platforms due to an implicit cast from 64 bits to 32 bits
|
[
"cpe:/o:redhat:enterprise_linux:7::hypervisor"
] | null | 9.8 | null | null |
RHSA-2021:1351
|
Red Hat Security Advisory: thunderbird security update
|
Mozilla: More internal network hosts could have been probed by a malicious webpage Mozilla: Out of bound write due to lazy initialization Mozilla: Use-after-free in Responsive Design Mode Mozilla: Secure Lock icon could have been spoofed Mozilla: Blob URLs may have been granted additional privileges Mozilla: Arbitrary FTP command execution on FTP servers using an encoded URL Mozilla: Incorrect size computation in WebAssembly JIT could lead to null-reads Mozilla: Port blocking could be bypassed Mozilla: Race condition when reading from disk while verifying signatures
|
[
"cpe:/a:redhat:rhel_eus:8.1::appstream"
] | null | 2.5 | 6.1 | null |
RHSA-2020:3911
|
Red Hat Security Advisory: python security update
|
python: XSS vulnerability in the documentation XML-RPC server in server_title field
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 6.1 | null | null |
RHSA-2022:6389
|
Red Hat Security Advisory: rh-nodejs14-nodejs and rh-nodejs14-nodejs-nodemon security and bug fix update
|
nodejs: DNS rebinding in --inspect via invalid IP addresses nodejs: HTTP request smuggling due to flawed parsing of Transfer-Encoding nodejs: HTTP request smuggling due to improper delimiting of header fields nodejs: HTTP request smuggling due to incorrect parsing of multi-line Transfer-Encoding nodejs-got: missing verification of requested URLs allows redirects to UNIX sockets
|
[
"cpe:/a:redhat:rhel_software_collections:3::el7"
] | null | 5.3 | null | null |
RHSA-2016:2606
|
Red Hat Security Advisory: postgresql security and bug fix update
|
postgresql: CASE/WHEN with inlining can cause untrusted pointer dereference postgresql: privilege escalation via crafted database and role names
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 7.6 | null |
RHSA-2010:0143
|
Red Hat Security Advisory: cpio security update
|
cpio: Heap-based buffer overflow by expanding a specially-crafted archive
|
[
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2019:3211
|
Red Hat Security Advisory: chromium-browser security update
|
chromium-browser: Use-after-free in media chromium-browser: Heap overflow in Skia chromium-browser: Use-after-free in Mojo chromium-browser: External URIs may trigger other browsers chromium-browser: URL bar spoof via download redirect chromium-browser: Use-after-free in media chromium-browser: Out-of-bounds access in V8 chromium-browser: Use-after-free in V8 chromium-browser: Extensions can read some local files chromium-browser: SameSite cookie bypass chromium-browser: Arbitrary read in SwiftShader chromium-browser: URL spoof chromium-browser: Full screen notification overlap chromium-browser: Full screen notification spoof chromium-browser: CSP bypass chromium-browser: IDN spoof chromium-browser: CSRF bypass chromium-browser: Multiple file download protection bypass chromium-browser: Side channel using storage size estimate chromium-browser: URI bar spoof when using external app URIs chromium-browser: Global window leak via console chromium-browser: HTTP authentication spoof chromium-browser: V8 memory corruption in regex chromium-browser: Dialog box fails to show origin chromium-browser: Cross-origin information leak using devtools chromium-browser: IDN spoofing chromium-browser: Extensions can be disabled by trailing slash chromium-browser: Google URI shown for certificate warning chromium-browser: Chrome web store origin needs to be isolated chromium-browser: Download dialog spoofing chromium-browser: User gesture needed for printing chromium-browser: IP address spoofing to servers chromium-browser: Bypass on download restrictions chromium-browser: Site isolation bypass chromium-browser: Exceptions leaked by devtools chromium-browser: Use-after-free in UI chromium-browser: Use-after-free in offline pages chromium-browser: Use-after-free in media chromium-browser: Use-after-free in media chromium-browser: Omnibox spoof chromium-browser: SOP bypass chromium-browser: Use-after-free in IndexedDB chromium-browser: Use-after-free in WebRTC chromium-browser: Use-after-free in audio chromium-browser: Use-after-free in V8 chromium-browser: Cross-origin size leak
|
[
"cpe:/a:redhat:rhel_extras:6"
] | null | null | 8.8 | null |
RHSA-2015:1135
|
Red Hat Security Advisory: php security and bug fix update
|
php: use after free vulnerability in unserialize() file: out of bounds read in mconvert() php: heap buffer overflow in enchant_broker_request_dict() gd: buffer read overflow in gd_gif_in.c php: use after free vulnerability in unserialize() (incomplete fix of CVE-2014-8142) php: Free called on unitialized pointer in exif.c php: use after free vulnerability in unserialize() with DateTimeZone php: use after free in phar_object.c php: move_uploaded_file() NUL byte injection in file name php: buffer over-read in Phar metadata parsing php: use-after-free vulnerability in the process_nested_data function in ext/standard/var_unserializer.re php: invalid pointer free() in phar_tar_process_metadata() php: buffer overflow in phar_set_inode() php: pipelined request executed in deinitialized interpreter under httpd 2.4 php: missing null byte checks for paths in various PHP extensions php: missing null byte checks for paths in various PHP extensions php: memory corruption in phar_parse_tarfile caused by empty entry file name php: integer overflow leading to heap overflow when reading FTP file listing php: multipart/form-data request parsing CPU usage DoS php: regressions in 5.4+ php: pcntl_exec() accepts paths with NUL character php: SoapClient's __call() type confusion through unserialize() php: SoapClient's do_soap_call() type confusion after unserialize() php: missing null byte checks for paths in DOM and GD extensions php: type confusion issue in unserialize() with various SOAP methods php: type confusion issue in unserialize() with various SOAP methods php: type confusion issue in unserialize() with various SOAP methods php: Incomplete Class unserialization type confusion php: exception:: getTraceAsString type confusion issue after unserialize php: denial of service when processing a crafted file with Fileinfo php: denial of service when processing a crafted file with Fileinfo php: integer overflow in ftp_genlist() resulting in heap overflow (improved fix for CVE-2015-4022)
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | null | null |
RHSA-2017:2931
|
Red Hat Security Advisory: kernel-rt security and bug fix update
|
kernel: net: Out of bounds stack read in memcpy_fromiovec kernel: Out-of-bounds heap access in xfrm kernel: Possible heap buffer overflow in brcmf_cfg80211_mgmt_tx() kernel: Integer overflow in ip6_find_1stfragopt() causes infinite loop kernel: Out of bounds read in inet_diag_msg_sctp{,l}addr_fill() and sctp_get_sctp_info() in SCTP stack kernel: Use-after-free in sys_mq_notify() kernel: Divide-by-zero in __tcp_select_window kernel: Heap out-of-bounds read in AF_PACKET sockets kernel: Exploitable memory corruption due to UFO to non-UFO path switch
|
[
"cpe:/a:redhat:rhel_extras_rt:7"
] | null | null | 7 | null |
RHSA-2023:3287
|
Red Hat Security Advisory: OpenShift Container Platform 4.12.19 bug fix and security update
|
dns: Denial of Service (DoS)
|
[
"cpe:/a:redhat:openshift:4.12::el8",
"cpe:/a:redhat:openshift:4.12::el9"
] | null | 7.5 | null | null |
RHSA-2021:1597
|
Red Hat Security Advisory: libxml2 security update
|
libxml2: Buffer overflow vulnerability in xmlEncodeEntitiesInternal() in entities.c
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 6.5 | null | null |
RHSA-2021:4511
|
Red Hat Security Advisory: curl security and bug fix update
|
curl: Leak of authentication credentials in URL via automatic Referer curl: TELNET stack contents disclosure curl: Incorrect fix for CVE-2021-22898 TELNET stack contents disclosure
|
[
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 3.1 | null | null |
RHSA-2022:4699
|
Red Hat Security Advisory: maven:3.5 security update
|
maven-shared-utils: Command injection via Commandline class
|
[
"cpe:/a:redhat:rhel_e4s:8.1::appstream"
] | null | 9.8 | null | null |
RHSA-2021:1006
|
Red Hat Security Advisory: OpenShift Container Platform 4.7.5 security and bug fix update
|
golang: crypto/elliptic: incorrect operations on the P-224 curve gogo/protobuf: plugin/unmarshal/unmarshal.go lacks certain index validation fabric8-kubernetes-client: vulnerable to a path traversal leading to integrity and availability compromise
|
[
"cpe:/a:redhat:openshift:4.7::el7",
"cpe:/a:redhat:openshift:4.7::el8"
] | null | 7.4 | null | null |
RHSA-2015:1650
|
Red Hat Security Advisory: openshift security update
|
OpenShift3: Exec operations should be forbidden to privileged pods such as builder pods
|
[
"cpe:/a:redhat:openshift:3.0::el7"
] | null | null | null | null |
RHSA-2021:1073
|
Red Hat Security Advisory: flatpak security update
|
flatpak: "file forwarding" feature can be used to gain unprivileged access to files
|
[
"cpe:/a:redhat:rhel_eus:8.2::appstream"
] | null | 8.1 | null | null |
RHSA-2023:7201
|
Red Hat Security Advisory: OpenShift Container Platform 4.15.0 packages and security update
|
golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487) golang: net/http/internal: Denial of Service (DoS) via Resource Consumption via HTTP requests golang: crypto/tls: Timing Side Channel attack in RSA based TLS key exchanges. ssh: Prefix truncation attack on Binary Packet Protocol (BPP)
|
[
"cpe:/a:redhat:openshift:4.15::el8",
"cpe:/a:redhat:openshift:4.15::el9"
] | null | 5.9 | null | null |
RHEA-2025:2423
|
Red Hat Enhancement Advisory: microcode_ctl bug fix and enhancement update
|
microcode_ctl: Improper input validation in UEFI firmware microcode_ctl: Improper input validation in UEFI firmware microcode_ctl: Improper input validation in XmlCli feature for UEFI firmware microcode_ctl: Improper input validation in UEFI firmware microcode_ctl: Improper input validation in UEFI firmware CseVariableStorageSmm
|
[
"cpe:/o:redhat:rhel_aus:8.4::baseos",
"cpe:/o:redhat:rhel_e4s:8.4::baseos",
"cpe:/o:redhat:rhel_tus:8.4::baseos"
] | null | 7.5 | null | null |
RHSA-2022:5773
|
Red Hat Security Advisory: thunderbird security update
|
Mozilla: Memory safety bugs fixed in Firefox 103 and 102.1 Mozilla: Directory indexes for bundled resources reflected URL parameters Mozilla: Mouse Position spoofing with CSS transforms
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 7.5 | 6.1 | null |
RHSA-2016:1039
|
Red Hat Security Advisory: java-1.8.0-ibm security update
|
JDK: buffer overflow vulnerability in the IBM JVM JDK: insecure use of invoke method in CORBA component, incorrect CVE-2013-3009 fix JDK: insecure deserialization in CORBA, incorrect CVE-2013-5456 fix OpenJDK: insufficient thread consistency checks in ObjectInputStream (Serialization, 8129952) OpenJDK: insufficient byte type checks (Hotspot, 8132051) JDK: unspecified vulnerability fixed in 6u115, 7u101 and 8u91 (2D) OpenJDK: non-constant time GCM authentication tag comparison (JCE, 8143945) OpenJDK: unrestricted deserialization of authentication credentials (JMX, 8144430) JDK: unspecified vulnerability fixed in 6u115, 7u101 and 8u91 (2D) JDK: unspecified vulnerability fixed in 6u115, 7u101 and 8u91 (Deployment)
|
[
"cpe:/a:redhat:rhel_extras:6"
] | null | null | null | null |
RHSA-2020:4291
|
Red Hat Security Advisory: virt:8.2 and virt-devel:8.2 security and bug fix update
|
QEMU: usb: out-of-bounds r/w access issue while processing usb packets
|
[
"cpe:/a:redhat:advanced_virtualization:8.2::el8"
] | null | 5 | null | null |
RHSA-2023:1810
|
Red Hat Security Advisory: thunderbird security update
|
Thunderbird: Revocation status of S/Mime recipient certificates was not checked Mozilla: Memory Corruption in Safe Browsing Code Mozilla: libwebp: Double-free in libwebp Mozilla: Matrix SDK bundled with Thunderbird vulnerable to denial-of-service attack Thunderbird: Hang when processing certain OpenPGP messages Mozilla: Fullscreen notification obscured Mozilla: Potential Memory Corruption following Garbage Collector compaction Mozilla: Invalid free from JavaScript code Mozilla: Content-Disposition filename truncation leads to Reflected File Download Mozilla: Files with malicious extensions could have been downloaded unsafely on Linux Mozilla: Incorrect optimization result on ARM64 Mozilla: Memory safety bugs fixed in Firefox 112 and Firefox ESR 102.10
|
[
"cpe:/a:redhat:rhel_eus:9.0::appstream"
] | null | 8.8 | null | null |
RHSA-2009:1321
|
Red Hat Security Advisory: nfs-utils security and bug fix update
|
nfs-utils: incorrect use of tcp_wrappers, causing hostname-based rules to be ignored
|
[
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2025:2663
|
Red Hat Security Advisory: Red Hat Data Grid 8.5.3 security update
|
org.infinispan-infinispan-parent: Exposure of Sensitive Information in Application Logs io.netty:netty-handler: SslHandler doesn't correctly validate packets which can lead to native crash when using native SSLEngine
|
[
"cpe:/a:redhat:jboss_data_grid:8"
] | null | 7.5 | null | null |
RHSA-2013:1500
|
Red Hat Security Advisory: gc security update
|
gc: malloc() and calloc() overflows
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2021:2779
|
Red Hat Security Advisory: OpenJDK 11.0.12 Security Update for Windows Builds
|
OpenJDK: FTP PASV command response can cause FtpClient to connect to arbitrary host (Networking, 8258432) OpenJDK: Incorrect verification of JAR files with multiple MANIFEST.MF files (Library, 8260967) OpenJDK: Incorrect comparison during range check elimination (Hotspot, 8264066)
|
[
"cpe:/a:redhat:openjdk:11.0.12::windows"
] | null | 7.5 | null | null |
RHSA-2018:1463
|
Red Hat Security Advisory: java-1.8.0-ibm security update
|
JDK: J9 JVM allows untrusted code running under a security manager to elevate its privileges OpenJDK: unsynchronized access to encryption key data (Libraries, 8172525) JDK: unspecified vulnerability fixed in 7u171, 8u161, and 9.0.4 (JavaFX) OpenJDK: insufficient validation of the invokeinterface instruction (Hotspot, 8174962) OpenJDK: LdapLoginModule insufficient username encoding in LDAP query (LDAP, 8178449) OpenJDK: DnsClient missing source port randomization (JNDI, 8182125) OpenJDK: loading of classes from untrusted locations (I18n, 8182601) OpenJDK: DerValue unbounded memory allocation (Libraries, 8182387) OpenJDK: insufficient strength of key agreement (JCE, 8185292) JDK: unspecified vulnerability fixed in 8u161 and 9.0.4 (Installer) OpenJDK: GSS context use-after-free (JGSS, 8186212) OpenJDK: LDAPCertStore insecure handling of LDAP referrals (JNDI, 8186606) OpenJDK: use of global credentials for HTTP/SPNEGO (JGSS, 8186600) OpenJDK: SingleEntryRegistry incorrect setup of deserialization filter (JMX, 8186998) JDK: unspecified vulnerability fixed in 8u161 and 9.0.4 (Deployment) JDK: unspecified vulnerability fixed in 8u161 and 9.0.4 (Deployment) OpenJDK: GTK library loading use-after-free (AWT, 8185325) JDK: unspecified vulnerability fixed in 6u181 and 7u171 (Serialization) OpenJDK: ArrayBlockingQueue deserialization to an inconsistent state (Libraries, 8189284) OpenJDK: unbounded memory allocation during deserialization (AWT, 8190289) OpenJDK: unbounded memory allocation in BasicAttributes deserialization (JNDI, 8191142)
|
[
"cpe:/a:redhat:network_satellite:5.8::el6"
] | null | null | 4.3 | null |
RHSA-2010:0155
|
Red Hat Security Advisory: java-1.4.2-ibm security and bug fix update
|
TLS: MITM attacks via session renegotiation
|
[
"cpe:/a:redhat:rhel_extras:3",
"cpe:/a:redhat:rhel_extras:4",
"cpe:/a:redhat:rhel_extras:5::client",
"cpe:/a:redhat:rhel_extras:5::server"
] | null | null | null | null |
RHSA-2023:7681
|
Red Hat Security Advisory: OpenShift Container Platform 4.14.6 security and extras update
|
word-wrap: ReDoS opentelemetry: DoS vulnerability in otelhttp opentelemetry-go-contrib: DoS vulnerability in otelgrpc due to unbound cardinality metrics
|
[
"cpe:/a:redhat:openshift:4.14::el8",
"cpe:/a:redhat:openshift:4.14::el9"
] | null | 7.5 | null | null |
RHSA-2012:0093
|
Red Hat Security Advisory: php security update
|
php: remote code exec flaw introduced in the CVE-2011-4885 hashdos fix
|
[
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server",
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2023:5924
|
Red Hat Security Advisory: varnish security update
|
HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack)
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::crb"
] | null | 7.5 | null | null |
RHSA-2023:0807
|
Red Hat Security Advisory: Mozilla Firefox security update
|
Mozilla: Content security policy leak in violation reports using iframes Mozilla: Extensions could have opened external schemes without user knowledge Mozilla: Screen hijack via browser fullscreen mode Mozilla: Out of bounds memory write from EncodeInputStream Mozilla: Potential use-after-free from compartment mismatch in SpiderMonkey Mozilla: Invalid downcast in SVGUtils::SetupStrokeGeometry Mozilla: Use-after-free in mozilla::dom::ScriptLoadContext::~ScriptLoadContext Mozilla: Web Crypto ImportKey crashes tab Mozilla: Fullscreen notification not shown in Firefox Focus Mozilla: Memory safety bugs fixed in Firefox 110 and Firefox ESR 102.8 Mozilla: Memory safety bugs fixed in Firefox ESR 102.8
|
[
"cpe:/a:redhat:rhel_eus:8.6::appstream"
] | null | 8.8 | null | null |
RHSA-2020:4490
|
Red Hat Security Advisory: gnupg2 security, bug fix, and enhancement update
|
gnupg2: Cross site request forgery in dirmngr resulting in an information disclosure or denial of service GnuPG: interaction between the sks-keyserver code and GnuPG allows for a Certificate Spamming Attack which leads to persistent DoS
|
[
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | null | 6.5 | null |
RHSA-2017:2424
|
Red Hat Security Advisory: java-1.7.0-openjdk security update
|
OpenJDK: reading of unprocessed image data in JPEGImageReader (2D, 8169209) OpenJDK: JAR verifier incorrect handling of missing digest (Security, 8169392) OpenJDK: integer overflows in range check loop predicates (Hotspot, 8173770) OpenJDK: incorrect bracket processing in function signature handling (Hotspot, 8170966) OpenJDK: insufficient access control checks in ThreadPoolExecutor (Libraries, 8172204) OpenJDK: insufficient access control checks in ServiceRegistry (ImageIO, 8172461) OpenJDK: insufficient access control checks in AsynchronousChannelGroupImpl (8172465, Libraries) OpenJDK: insufficient access control checks in XML transformations (JAXP, 8172469) OpenJDK: unrestricted access to com.sun.org.apache.xml.internal.resolver (JAXP, 8173286) OpenJDK: incorrect handling of references in DGC (RMI, 8163958) OpenJDK: insufficient access control checks in ActivationID (RMI, 8173697) OpenJDK: unbounded memory allocation in BasicAttribute deserialization (Serialization, 8174105) OpenJDK: unbounded memory allocation in CodeSource deserialization (Serialization, 8174113) OpenJDK: insufficient access control checks in ImageWatched (AWT, 8174098) OpenJDK: DSA implementation timing attack (JCE, 8175106) OpenJDK: LDAPCertStore following referrals to non-LDAP URLs (Security, 8176067) OpenJDK: PKCS#8 implementation timing attack (JCE, 8176760) OpenJDK: insecure XML parsing in wsdlimport (JAX-WS, 8182054)
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation",
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 6.5 | null |
RHBA-2016:0090
|
Red Hat Bug Fix Advisory: Red Hat JBoss Web Server 2.1.0 tomcat7 update
|
tomcat: URL Normalization issue
|
[
"cpe:/a:redhat:jboss_enterprise_web_server:2::el5",
"cpe:/a:redhat:jboss_enterprise_web_server:2::el6",
"cpe:/a:redhat:jboss_enterprise_web_server:2::el7"
] | null | null | 4.3 | null |
RHSA-2020:2334
|
Red Hat Security Advisory: freerdp security update
|
freerdp: Out-of-bounds write in planar.c freerdp: Integer overflow in region.c freerdp: Out-of-bounds write in interleaved.c
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 6.6 | null | null |
RHSA-2016:1968
|
Red Hat Security Advisory: Red Hat JBoss BRMS security update
|
stored XSS in JBoss BPM suite business process editor
|
[
"cpe:/a:redhat:jboss_enterprise_brms_platform:6.3"
] | null | null | 5.4 | null |
RHSA-2010:0753
|
Red Hat Security Advisory: kdegraphics security update
|
xpdf: uninitialized Gfx::parser pointer dereference xpdf: array indexing error in FoFiType1::parse()
|
[
"cpe:/a:redhat:rhel_productivity:5",
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws",
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation"
] | null | null | null | null |
RHSA-2014:0261
|
Red Hat Security Advisory: Red Hat Enterprise MRG for Red Hat Enterprise Linux 5 1-month Notice
|
This is the one-month notification for the retirement of Red Hat Enterprise
MRG Version 1 for Red Hat Enterprise Linux 5. This notification applies
only to those customers with subscriptions for Red Hat Enterprise MRG
Version 1 for Red Hat Enterprise Linux 5.
|
[
"cpe:/a:redhat:enterprise_mrg:1::el5",
"cpe:/a:redhat:enterprise_mrg:2::el5"
] | null | null | null | null |
RHSA-2015:0845
|
Red Hat Security Advisory: python-django-horizon and python-django-openstack-auth update
|
python-django-horizon: denial of service via login page requests
|
[
"cpe:/a:redhat:openstack:5::el6"
] | null | null | null | null |
RHSA-2020:3580
|
Red Hat Security Advisory: OpenShift Container Platform 4.4.19 openshift-enterprise-hyperkube-container security update
|
kubernetes: Node disk DOS by writing to container /etc/hosts
|
[
"cpe:/a:redhat:openshift:4.4::el7"
] | null | 5.5 | null | null |
RHSA-2008:0009
|
Red Hat Security Advisory: httpd security update
|
httpd: mod_imagemap XSS apache mod_status cross-site scripting httpd mod_proxy_balancer cross-site scripting httpd mod_proxy_balancer crash mod_proxy_ftp XSS
|
[
"cpe:/a:redhat:rhel_application_stack:2"
] | null | null | null | null |
RHSA-2018:1854
|
Red Hat Security Advisory: kernel security and bug fix update
|
kernel: AIO interface didn't use rw_verify_area() for checking mandatory locking on files and size of access kernel: AIO write triggers integer overflow in some protocols kernel: Null pointer dereference via keyctl kernel: ping socket / AF_LLC connect() sin_family race kernel: Race condition between multiple sys_perf_event_open() calls kernel: net/packet: overflow in check for priv area size kernel: Incorrect error handling in the set_mempolicy and mbind compat syscalls in mm/mempolicy.c kernel: mm subsystem does not properly enforce the CONFIG_STRICT_DEVMEM protection mechanism kernel: Double free in the inet_csk_clone_lock function in net/ipv4/inet_connection_sock.c kernel: net: sctp_v6_create_accept_sk function mishandles inheritance kernel: net: IPv6 DCCP implementation mishandles inheritance kernel: net: tcp_v6_syn_recv_sock function mishandles inheritance kernel: memory leak when merging buffers in SCSI IO vectors kernel: vfs: BUG in truncate_inode_pages_range() and fuse client kernel: Race condition in drivers/md/dm.c:dm_get_from_kobject() allows local users to cause a denial of service kernel: a null pointer dereference in net/dccp/output.c:dccp_write_xmit() leads to a system crash hw: cpu: speculative store bypass kernel: Missing length check of payload in net/sctp/sm_make_chunk.c:_sctp_make_chunk() function allows denial of service
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | 5.5 | null |
RHSA-2024:8874
|
Red Hat Security Advisory: haproxy security update
|
haproxy: untrimmed URI fragments may lead to exposure of confidential data on static servers
|
[
"cpe:/a:redhat:rhel_aus:8.6::appstream",
"cpe:/a:redhat:rhel_e4s:8.6::appstream",
"cpe:/a:redhat:rhel_tus:8.6::appstream"
] | null | 5.3 | null | null |
RHSA-2015:2315
|
Red Hat Security Advisory: NetworkManager security, bug fix, and enhancement update
|
NetworkManager: remote DoS using IPv6 RA with bogus MTU NetworkManager: denial of service (DoS) attack against IPv6 network stacks due to improper handling of Router Advertisements
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | null | null |
RHSA-2024:3708
|
Red Hat Security Advisory: Red Hat Build of Apache Camel 3.20.6 for Spring Boot security update.
|
OpenJDK: integer truncation issue in Xalan-J (JAXP, 8285407) jettison: stack overflow in JSONObject() allows attackers to cause a Denial of Service (DoS) via crafted JSON data santuario: Private Key disclosure in debug-log output springframework: URL Parsing with Host Validation cxf-core: Apache CXF SSRF Vulnerability using the Aegis databinding
|
[
"cpe:/a:redhat:apache_camel_spring_boot:3.20.6"
] | null | 7.4 | null | null |
RHSA-2022:2213
|
Red Hat Security Advisory: zlib security update
|
zlib: A flaw found in zlib when compressing (not decompressing) certain inputs
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 8.2 | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.