id
stringlengths 13
15
| title
stringlengths 29
176
| description
stringlengths 8
32.1k
| cpes
listlengths 0
20
| cvss_v4_0
null | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
null |
---|---|---|---|---|---|---|---|
RHSA-2008:0601
|
Red Hat Security Advisory: adminutil security update
|
Server: multiple XSS issues
|
[
"cpe:/a:redhat:directory_server:8::el4",
"cpe:/a:redhat:directory_server:8::el5"
] | null | null | null | null |
RHSA-2016:0125
|
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 6.4.6 update
|
jakarta-taglibs-standard: XXE and RCE via XSL extension in JSTL XML tags
|
[
"cpe:/a:redhat:jboss_enterprise_application_platform:6.4"
] | null | null | 7.6 | null |
RHSA-2017:0003
|
Red Hat Security Advisory: systemd security update
|
systemd: freeze when PID 1 receives a zero-length message over notify socket
|
[
"cpe:/o:redhat:rhel_eus:7.1::computenode",
"cpe:/o:redhat:rhel_eus:7.1::server"
] | null | null | 6.8 | null |
RHSA-2020:2298
|
Red Hat Security Advisory: openvswitch security, bug fix and enhancement update
|
dpdk: librte_vhost Integer overflow in vhost_user_set_log_base() dpdk: librte_vhost Integer truncation in vhost_user_check_and_alloc_queue_pair()
|
[
"cpe:/o:redhat:enterprise_linux:7::fastdatapath",
"cpe:/o:redhat:enterprise_linux:7::hypervisor"
] | null | 6.7 | null | null |
RHSA-2020:2407
|
Red Hat Security Advisory: freerdp security update
|
freerdp: Out-of-bounds write in crypto_rsa_common in libfreerdp/crypto/crypto.c
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb"
] | null | 8.3 | null | null |
RHSA-2024:7670
|
Red Hat Security Advisory: Red Hat build of Quarkus 3.8.6.SP1 Security Update
|
angus-mail: Enabling Secure Server Identity Checks for Safer SMTPS Communication protobuf: StackOverflow vulnerability in Protocol Buffers graphql-java: Allocation of Resources Without Limits or Throttling in GraphQL Java apache-avro: Schema parsing may trigger Remote Code Execution (RCE)
|
[
"cpe:/a:redhat:quarkus:3.8::el8"
] | null | 8.8 | null | null |
RHSA-2013:1779
|
Red Hat Security Advisory: mod_nss security update
|
mod_nss: incorrect handling of NSSVerifyClient in directory context
|
[
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::server",
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2008:0201
|
Red Hat Security Advisory: redhat-ds-admin security update
|
Server: shell command injection in CGI replication monitor Server: unrestricted access to CGI scripts
|
[
"cpe:/a:redhat:directory_server:8::el4",
"cpe:/a:redhat:directory_server:8::el5"
] | null | null | null | null |
RHSA-2017:2889
|
Red Hat Security Advisory: Red Hat JBoss BPM Suite 6.4.6 security update
|
log4j: Socket receiver deserialization vulnerability XStream: DoS when unmarshalling void type log4j: deserialization of untrusted data in SocketServer
|
[
"cpe:/a:redhat:jboss_bpms:6.4"
] | null | 9.8 | 5.9 | null |
RHSA-2002:120
|
Red Hat Security Advisory: LPRng security update
|
security flaw
|
[
"cpe:/o:redhat:enterprise_linux:2.1::as"
] | null | null | null | null |
RHSA-2019:0433
|
Red Hat Security Advisory: ansible security and bug fix update
|
Ansible: path traversal in the fetch module
|
[
"cpe:/a:redhat:ansible_engine:2.6::el7"
] | null | null | 4.2 | null |
RHSA-2022:5069
|
Red Hat Security Advisory: OpenShift Container Platform 4.11.0 bug fix and security update
|
nanoid: Information disclosure via valueOf() function sanitize-url: XSS due to improper sanitization in sanitizeUrl function opencontainers: OCI manifest and index parsing confusion golang.org/x/crypto: empty plaintext packet causes panic minimist: prototype pollution node-fetch: exposure of sensitive information to an unauthorized actor prometheus/client_golang: Denial of service using InstrumentHandlerCounter go-getter: command injection vulnerability golang: crash in a golang.org/x/crypto/ssh server go-getter: writes SSH credentials into logfile, exposing sensitive credentials to local uses go-getter: unsafe download (issue 1 of 3) go-getter: unsafe download (issue 2 of 3) go-getter: unsafe download (issue 3 of 3)
|
[
"cpe:/a:redhat:openshift:4.11::el8"
] | null | 8.6 | null | null |
RHSA-2015:0856
|
Red Hat Security Advisory: postgresql92-postgresql security update
|
postgresql: information leak through constraint violation errors postgresql: buffer overflow in the to_char() function postgresql: buffer overflow flaws in contrib/pgcrypto postgresql: loss of frontend/backend protocol synchronization after an error
|
[
"cpe:/a:redhat:network_satellite:5.7::el6",
"cpe:/a:redhat:network_satellite_managed_db:5.7::el6"
] | null | null | null | null |
RHSA-2005:059
|
Red Hat Security Advisory: xpdf security update
|
security flaw
|
[
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws"
] | null | null | null | null |
RHSA-2011:1444
|
Red Hat Security Advisory: nss security update
|
Updated nss packages that fix one security issue are now available for
Red Hat Enterprise Linux 4, 5, and 6.
The Red Hat Security Response Team has rated this update as having
important security impact.
|
[
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws",
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server",
"cpe:/o:redhat:enterprise_linux:6::server"
] | null | null | null | null |
RHSA-2020:0839
|
Red Hat Security Advisory: kernel-rt security and bug fix update
|
kernel: Count overflow in FUSE request leading to use-after-free issues. kernel: rtl_p2p_noa_ie in drivers/net/wireless/realtek/rtlwifi/ps.c in the Linux kernel lacks a certain upper-bound check, leading to a buffer overflow Kernel: KVM: export MSR_IA32_TSX_CTRL to guest - incomplete fix for TAA (CVE-2019-11135)
|
[
"cpe:/a:redhat:rhel_extras_rt:7"
] | null | null | 5.5 | null |
RHSA-2005:420
|
Red Hat Security Advisory: Updated kernel packages available for Red Hat Enterprise Linux 4 Update 1
|
security flaw security flaw security flaw security flaw security flaw
|
[
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2024:6998
|
Red Hat Security Advisory: kernel security update
|
kernel: cgroup: cgroup_get_from_id() must check the looked-up kn is a directory kernel: nvme-tcp: fix UAF when detecting digest errors kernel: net: fix possible store tearing in neigh_periodic_work() kernel: fs/proc: do_task_stat: use sig->stats_lock to gather the threads/children stats kernel: mptcp: ensure snd_nxt is properly initialized on connect kernel: wifi: mac80211: Avoid address calculations via out of bounds array indexing
|
[
"cpe:/o:redhat:rhel_aus:8.6::baseos",
"cpe:/o:redhat:rhel_e4s:8.6::baseos",
"cpe:/o:redhat:rhel_tus:8.6::baseos"
] | null | 7.8 | null | null |
RHSA-2022:6713
|
Red Hat Security Advisory: thunderbird security update
|
Mozilla: Remote content specified in an HTML document that was nested inside an iframe's srcdoc attribute was not blocked Mozilla: Leaking of sensitive information when composing a response to an HTML email with a META refresh tag Mozilla: An iframe element in an HTML email could trigger a network request Mozilla: Out of bounds read when decoding H264 Mozilla: Matrix SDK bundled with Thunderbird vulnerable to denial-of-service attack Mozilla: Content-Security-Policy base-uri bypass Mozilla: Incoherent instruction cache when building WASM on ARM64 Mozilla: Bypassing Secure Context restriction for cookies with __Host and __Secure prefix Mozilla: Bypassing FeaturePolicy restrictions on transient pages Mozilla: Data-race when parsing non-UTF-8 URLs in threads Mozilla: Memory safety bugs fixed in Firefox 105 and Firefox ESR 102.3
|
[
"cpe:/a:redhat:rhel_eus:8.4::appstream"
] | null | 8.8 | 7.5 | null |
RHSA-2020:5620
|
Red Hat Security Advisory: postgresql:12 security update
|
postgresql: ALTER ... DEPENDS ON EXTENSION is missing authorization checks postgresql: Uncontrolled search path element in logical replication postgresql: Uncontrolled search path element in CREATE EXTENSION postgresql: Reconnection can downgrade connection security settings postgresql: Multiple features escape "security restricted operation" sandbox postgresql: psql's \gset allows overwriting specially treated variables
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 7.5 | null | null |
RHBA-2015:0386
|
Red Hat Bug Fix Advisory: cups bug fix and enhancement update
|
cups: cross-site scripting flaw fixed in the 1.7.2 release cups: insufficient checking leads to privilege escalation cups: Incomplete fix for CVE-2014-3537 cups: allows local users to read arbitrary files via a symlink attack cups: world-readable permissions
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | null | null |
RHSA-2005:072
|
Red Hat Security Advisory: perl-DBI security update
|
security flaw
|
[
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2022:4985
|
Red Hat Security Advisory: Cryostat 2.1.1: new Cryostat on RHEL 8 container images
|
com.google.code.gson-gson: Deserialization of Untrusted Data in com.google.code.gson-gson golang-gopkg-yaml: crash when attempting to deserialize invalid input
|
[
"cpe:/a:redhat:cryostat:2::el8"
] | null | 7.5 | null | null |
RHSA-2022:7013
|
Red Hat Security Advisory: java-11-openjdk security and bug fix update
|
OpenJDK: improper MultiByte conversion can lead to buffer overflow (JGSS, 8286077) OpenJDK: improper handling of long NTLM client hostnames (Security, 8286526) OpenJDK: insufficient randomization of JNDI DNS port numbers (JNDI, 8286910) OpenJDK: excessive memory allocation in X.509 certificate parsing (Security, 8286533) OpenJDK: HttpServer no connection count limit (Lightweight HTTP Server, 8286918) harfbuzz: integer overflow in the component hb-ot-shape-fallback.cc OpenJDK: missing SNI caching in HTTP/2 (Networking, 8289366)
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::crb"
] | null | 3.7 | null | null |
RHSA-2015:2519
|
Red Hat Security Advisory: thunderbird security update
|
Mozilla: Miscellaneous memory safety hazards (rv:38.4) (MFSA 2015-116) Mozilla: Buffer overflow during image interactions in canvas (MFSA 2015-123) Mozilla: CORS preflight is bypassed when non-standard Content-Type headers are received (MFSA 2015-127) Mozilla: Mixed content WebSocket policy bypass through workers (MFSA 2015-132) Mozilla: Vulnerabilities found through code inspection (MFSA 2015-131) Mozilla: Vulnerabilities found through code inspection (MFSA 2015-131) Mozilla: Vulnerabilities found through code inspection (MFSA 2015-131)
|
[
"cpe:/a:redhat:rhel_productivity:5",
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation",
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | null | null |
RHSA-2024:4730
|
Red Hat Security Advisory: fence-agents update
|
urllib3: proxy-authorization request header is not stripped during cross-origin redirects
|
[
"cpe:/a:redhat:rhel_aus:8.4::appstream",
"cpe:/a:redhat:rhel_e4s:8.4::appstream",
"cpe:/a:redhat:rhel_e4s:8.4::highavailability",
"cpe:/a:redhat:rhel_tus:8.4::appstream",
"cpe:/a:redhat:rhel_tus:8.4::highavailability"
] | null | 4.4 | null | null |
RHSA-2020:5412
|
Red Hat Security Advisory: python-XStatic-jQuery224 security update
|
jquery: Untrusted code execution via <option> tag in HTML passed to DOM manipulation methods
|
[
"cpe:/a:redhat:openstack:16.1::el8"
] | null | 6.1 | null | null |
RHSA-2024:6816
|
Red Hat Security Advisory: thunderbird security update
|
mozilla: Type Confusion in Async Generators in Javascript Engine mozilla: Type confusion when looking up a property name in a "with" block mozilla: Internal event interfaces were exposed to web content when browser EventHandler listener callbacks ran mozilla: Garbage collection could mis-color cross-compartment objects in OOM conditions mozilla: WASM type confusion involving ArrayTypes mozilla: SelectElements could be shown over another site if popups are allowed mozilla: Memory safety bugs fixed in Firefox 130, Firefox ESR 128.2, and Thunderbird 128.2 thunderbird: Crash when aborting verification of OTR chat
|
[
"cpe:/a:redhat:rhel_tus:8.6::appstream"
] | null | 6.5 | null | null |
RHSA-2015:2619
|
Red Hat Security Advisory: libreoffice security update
|
libreoffice: Arbitrary file disclosure in Calc and Writer libreoffice: Integer underflow in PrinterSetup length libreoffice: Integer overflow in DOC files libreoffice: Bookmarks in DOC documents are insufficiently checked causing memory corruption
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation",
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | null | null |
RHSA-2015:0384
|
Red Hat Security Advisory: powerpc-utils security, bug fix, and enhancement update
|
powerpc-utils: snap creates archives with fstab and yaboot.conf which may expose certain passwords
|
[
"cpe:/o:redhat:enterprise_linux:7::server"
] | null | null | null | null |
RHSA-2024:0424
|
Red Hat Security Advisory: rpm security update
|
rpm: TOCTOU race in checks for unsafe symlinks rpm: races with chown/chmod/capabilities calls during installation rpm: checks for unsafe symlinks are not performed for intermediary directories
|
[
"cpe:/a:redhat:rhel_eus:8.6::appstream",
"cpe:/o:redhat:rhel_eus:8.6::baseos"
] | null | 6.5 | null | null |
RHSA-2023:0078
|
Red Hat Security Advisory: .NET 6.0 security, bug fix, and enhancement update
|
dotnet: Parsing an empty HTTP response as a JSON.NET JObject causes a stack overflow and crashes a process
|
[
"cpe:/a:redhat:rhel_dotnet:6.0::el7"
] | null | 7.5 | null | null |
RHSA-2003:218
|
Red Hat Security Advisory: : : : Updated unzip and tar packages that fix vulnerabilities are now available
|
security flaw security flaw security flaw security flaw security flaw security flaw
|
[
"cpe:/o:redhat:linux:7.1"
] | null | null | null | null |
RHSA-2013:1645
|
Red Hat Security Advisory: Red Hat Enterprise Linux 6 kernel update
|
Kernel: llc: information leak via getsockname Kernel: Bluetooth: RFCOMM - information leak kernel: handling of IPv6 temporary addresses Kernel: information leak in fs/compat_ioctl.c VIDEO_SET_SPU_PALETTE Kernel: tg3: buffer overflow in VPD firmware parsing Kernel: information leak in cdrom driver Kernel: net: information leak in AF_KEY notify kernel: block: passing disk names as format strings Kernel: HID: memory corruption flaw Kernel: HID: zeroplus: heap overflow flaw Kernel: HID: pantherlord: heap overflow flaw Kernel: llc: Fix missing msg_namelen update in llc_ui_recvmsg kernel: ansi_cprng: off by one error in non-block size request Kernel: net: IPv6: panic when UFO=On for an interface kernel: nfs: missing check for buffer length in __nfs4_get_acl_uncached kernel: kvm: memory leak when memory slot is moved with assigned device
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2010:0788
|
Red Hat Security Advisory: pidgin security update
|
Pidgin: MSN SLP emoticon DoS (NULL pointer dereference) (libpurple): Multiple DoS (crash) flaws by processing of unsanitized Base64 decoder values
|
[
"cpe:/a:redhat:rhel_productivity:5",
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws",
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation"
] | null | null | null | null |
RHSA-2021:4221
|
Red Hat Security Advisory: container-tools:2.0 security update
|
buildah: Host environment variables leaked in build container when using chroot isolation
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 5.6 | null | null |
RHSA-2024:2887
|
Red Hat Security Advisory: firefox security update
|
Mozilla: Arbitrary JavaScript execution in PDF.js Mozilla: IndexedDB files retained in private browsing mode Mozilla: Potential permissions request bypass via clickjacking Mozilla: Cross-origin responses could be distinguished between script and non-script content-types Mozilla: Use-after-free could occur when printing to PDF Mozilla: Memory safety bugs fixed in Firefox 126, Firefox ESR 115.11, and Thunderbird 115.11
|
[
"cpe:/a:redhat:rhel_eus:8.6::appstream"
] | null | 6.1 | null | null |
RHSA-2019:1245
|
Red Hat Security Advisory: Red Hat Quay 3.0.2 security and bug fix update
|
SSL/TLS: Birthday attack against 64-bit block ciphers (SWEET32)
|
[
"cpe:/a:redhat:quay:3::el7"
] | null | null | 7.5 | null |
RHBA-2020:1310
|
Red Hat Bug Fix Advisory: Red Hat Virtualization Host (redhat-virtualization-host) 4.3.9 async
|
libxml2: NULL pointer dereference in xmlXPathCompOpEval() function in xpath.c
|
[
"cpe:/o:redhat:enterprise_linux:7::hypervisor"
] | null | null | 6.5 | null |
RHSA-2018:1206
|
Red Hat Security Advisory: java-1.7.0-oracle security update
|
OpenJDK: incorrect merging of sections in the JAR manifest (Security, 8189969) OpenJDK: unrestricted deserialization of data from JCEKS key stores (Security, 8189997) OpenJDK: insufficient consistency checks in deserialization of multiple classes (Security, 8189977) OpenJDK: unbounded memory allocation during deserialization in PriorityBlockingQueue (Concurrency, 8189981) OpenJDK: unbounded memory allocation during deserialization in TabularDataSupport (JMX, 8189985) OpenJDK: unbounded memory allocation during deserialization in Container (AWT, 8189989) OpenJDK: unbounded memory allocation during deserialization in NamedNodeMapImpl (JAXP, 8189993) OpenJDK: RMI HTTP transport enabled by default (RMI, 8193833) OpenJDK: incorrect handling of Reference clones can lead to sandbox bypass (Hotspot, 8192025) OpenJDK: unbounded memory allocation during deserialization in StubIORImpl (Serialization, 8192757)
|
[
"cpe:/a:redhat:rhel_extras_oracle_java:6"
] | null | null | 5.3 | null |
RHSA-2024:5955
|
Red Hat Security Advisory: Multicluster Engine for Kubernetes 2.6.2 security updates and bug fixes
|
nodejs-semver: Regular expression denial of service
|
[
"cpe:/a:redhat:multicluster_engine:2.6::el8",
"cpe:/a:redhat:multicluster_engine:2.6::el9"
] | null | 7.5 | null | null |
RHSA-2017:3047
|
Red Hat Security Advisory: java-1.6.0-sun security update
|
zlib: Out-of-bounds pointer arithmetic in inftrees.c zlib: Out-of-bounds pointer arithmetic in inffast.c zlib: Undefined left shift of negative number zlib: Big-endian out-of-bounds pointer OpenJDK: CardImpl incorrect state handling (Smart Card IO, 8169026) OpenJDK: multiple unbounded memory allocations in deserialization (Serialization, 8174109) OpenJDK: incorrect privilege use when handling unreferenced objects (RMI, 8174966) JDK: unspecified vulnerability fixed in 6u171, 7u161, 8u151, and 9.0.1 (Javadoc) OpenJDK: HTTP client insufficient check for newline in URLs (Networking, 8176751) OpenJDK: unbounded resource use in JceKeyStore deserialization (Serialization, 8181370) OpenJDK: insufficient loader constraints checks for invokespecial (Hotspot, 8180711) OpenJDK: unbounded memory allocation in SimpleTimeZone deserialization (Serialization, 8181323) OpenJDK: multiple unbounded memory allocations in deserialization (Libraries, 8181432) OpenJDK: unbounded memory allocation in PredicatedNodeTest deserialization (JAXP, 8181327) OpenJDK: no default network operations timeouts in FtpClient (Networking, 8181612) OpenJDK: weak protection of key stores against brute forcing (Security, 8181692) OpenJDK: unbounded memory allocation in ObjectInputStream deserialization (Serialization, 8181597) OpenJDK: use of unprotected sname in Kerberos client (Libraries, 8178794)
|
[
"cpe:/a:redhat:rhel_extras_oracle_java:6",
"cpe:/a:redhat:rhel_extras_oracle_java:7"
] | null | null | 6.8 | null |
RHSA-2022:5459
|
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 6.4.24 security update
|
tomcat: multiple requests with invalid payload length in a WebSocket frame could lead to DoS jbossweb: Incomplete fix of CVE-2020-13935 for WebSocket in JBossWeb could lead to DoS log4j: Remote code execution in Log4j 1.x when application is configured to use JMSAppender log4j: Remote code execution in Log4j 1.x when application is configured to use JMSSink log4j: SQL injection in Log4j 1.x when application is configured to use JDBCAppender log4j: Unsafe deserialization flaw in Chainsaw log viewer
|
[
"cpe:/a:redhat:jboss_enterprise_application_platform:6::el6"
] | null | 8.8 | null | null |
RHSA-2021:0811
|
Red Hat Security Advisory: Red Hat Integration Tech-Preview 3 Camel K security update
|
cassandra: allows manipulation of the RMI registry to perform a MITM attack and capture user names and passwords used to access the JMX interface apache-httpclient: incorrect handling of malformed authority component in request URIs jackson-databind: FasterXML DOMDeserializer insecure entity expansion is vulnerable to XML external entity (XXE)
|
[
"cpe:/a:redhat:integration:1"
] | null | 7.5 | null | null |
RHSA-2020:0703
|
Red Hat Security Advisory: http-parser security update
|
nodejs: HTTP request smuggling using malformed Transfer-Encoding header
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 7.1 | null | null |
RHSA-2020:5317
|
Red Hat Security Advisory: rh-postgresql12-postgresql security update
|
postgresql: Reconnection can downgrade connection security settings postgresql: Multiple features escape "security restricted operation" sandbox postgresql: psql's \gset allows overwriting specially treated variables
|
[
"cpe:/a:redhat:rhel_software_collections:3::el7"
] | null | 7.5 | null | null |
RHSA-2024:3005
|
Red Hat Security Advisory: python-pillow security update
|
python-pillow: uncontrolled resource consumption when textlength in an ImageDraw instance operates on a long text argument
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb"
] | null | 7.5 | null | null |
RHSA-2018:1784
|
Red Hat Security Advisory: rh-java-common-xmlrpc security update
|
xmlrpc: Deserialization of untrusted Java object through <ex:serializable> tag
|
[
"cpe:/a:redhat:rhel_software_collections:3::el6",
"cpe:/a:redhat:rhel_software_collections:3::el7"
] | null | null | 7.5 | null |
RHSA-2020:0464
|
Red Hat Security Advisory: 389-ds:1.4 security update
|
389-ds-base: Read permission check bypass via the deref plugin
|
[
"cpe:/a:redhat:rhel_e4s:8.0::appstream"
] | null | null | 6.5 | null |
RHSA-2021:4519
|
Red Hat Security Advisory: autotrace security update
|
autotrace: integer overflow in input-bmp.c autotrace: bitmap double free in main.c allows attackers to cause an unspecified impact
|
[
"cpe:/a:redhat:enterprise_linux:8::crb"
] | null | 7.8 | null | null |
RHSA-2020:3580
|
Red Hat Security Advisory: OpenShift Container Platform 4.4.19 openshift-enterprise-hyperkube-container security update
|
kubernetes: Node disk DOS by writing to container /etc/hosts
|
[
"cpe:/a:redhat:openshift:4.4::el7"
] | null | 5.5 | null | null |
RHSA-2014:1846
|
Red Hat Security Advisory: gnutls security update
|
gnutls: Heap corruption when generating key ID for ECC (GNUTLS-SA-2014-5)
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | null | null |
RHSA-2016:2580
|
Red Hat Security Advisory: poppler security and bug fix update
|
poppler: heap buffer overflow in ExponentialFunction
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | null | null |
RHSA-2020:5079
|
Red Hat Security Advisory: kernel-alt security and bug fix update
|
kernel: soft-lockups in iov_iter_copy_from_user_atomic() could result in DoS
|
[
"cpe:/o:redhat:enterprise_linux:7::server"
] | null | 5.5 | null | null |
RHSA-2012:1559
|
Red Hat Security Advisory: JBoss Enterprise BRMS Platform 5.3.0 security update
|
apache-cxf: Apache CXF does not verify that elements were signed / encrypted by a particular Supporting Token
|
[
"cpe:/a:redhat:jboss_enterprise_brms_platform:5.3"
] | null | null | null | null |
RHSA-2015:2673
|
Red Hat Security Advisory: openstack-nova security and bug fix advisory
|
openstack-nova: network security group changes are not applied to running instances
|
[
"cpe:/a:redhat:openstack:7::el7"
] | null | null | null | null |
RHSA-2023:0128
|
Red Hat Security Advisory: java-1.8.0-ibm security update
|
OpenJDK: improper handling of long NTLM client hostnames (Security, 8286526) OpenJDK: insufficient randomization of JNDI DNS port numbers (JNDI, 8286910) OpenJDK: excessive memory allocation in X.509 certificate parsing (Security, 8286533) OpenJDK: HttpServer no connection count limit (Lightweight HTTP Server, 8286918)
|
[
"cpe:/a:redhat:enterprise_linux:8::supplementary"
] | null | 5.3 | null | null |
RHSA-2011:0881
|
Red Hat Security Advisory: Red Hat Network Proxy server jabberd security update
|
jabberd: DoS via the XML "billion laughs attack"
|
[
"cpe:/a:redhat:network_proxy:5.4::el5"
] | null | null | null | null |
RHSA-2024:7489
|
Red Hat Security Advisory: kernel security update
|
kernel: netfilter: bridge: confirm multicast packets before passing them up the stack kernel: netfilter: tproxy: bail out if IP has been disabled on the device kernel: net: bridge: mst: fix vlan use-after-free kernel: net: openvswitch: fix overwriting ct original tuple for ICMPv6
|
[
"cpe:/a:redhat:rhel_eus:9.2::appstream",
"cpe:/a:redhat:rhel_eus:9.2::crb",
"cpe:/o:redhat:rhel_eus:9.2::baseos"
] | null | 5.5 | null | null |
RHSA-2017:3188
|
Red Hat Security Advisory: Red Hat OpenShift Container Platform 3.7 security, bug, and enhancement update
|
3: authentication bypass for elasticsearch with external routes
|
[
"cpe:/a:redhat:openshift:3.7::el7"
] | null | null | 6.5 | null |
RHSA-2005:433
|
Red Hat Security Advisory: postgresql security update
|
security flaw security flaw
|
[
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws",
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2015:1787
|
Red Hat Security Advisory: kernel-rt security, bug fix, and enhancement update
|
kernel: ASLR bruteforce possible for vdso library kernel: fs: ext4: fallocate zero range page size > block size BUG() kernel: denial of service due to memory leak in add_key() kernel: SCTP race condition allows list corruption and panic from userlevel kernel: net: incorrect processing of checksums in UDP implementation kernel: net: incorrect processing of checksums in UDP implementation
|
[
"cpe:/a:redhat:enterprise_mrg:2:server:el6"
] | null | null | null | null |
RHSA-2009:0053
|
Red Hat Security Advisory: kernel-rt security and bug fix update
|
Linux Kernel 'atm module' Local Denial of Service kernel: libertas: fix buffer overrun kernel: fix inotify watch removal/umount races kernel: fix soft lockups/OOM issues with unix socket garbage collector kernel: enforce a minimum SG_IO timeout kernel: sctp: memory overflow when FWD-TSN chunk is received with bad stream ID
|
[
"cpe:/a:redhat:enterprise_mrg:1::el5"
] | null | null | null | null |
RHSA-2015:1510
|
Red Hat Security Advisory: clutter security update
|
clutter: screenlock bypass by performing certain mouse gestures
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | null | null |
RHSA-2023:5533
|
Red Hat Security Advisory: nodejs security, bug fix, and enhancement update
|
c-ares: buffer overflow in config_sortlist() due to missing string length check http-cache-semantics: Regular Expression Denial of Service (ReDoS) vulnerability Node.js: insecure loading of ICU data through ICU_DATA environment variable Node.js: Fetch API did not protect against CRLF injection in host headers Node.js: Regular Expression Denial of Service in Headers fetch API nodejs: mainModule.proto bypass experimental policy mechanism nodejs: process interuption due to invalid Public Key information in x509 certificates nodejs: HTTP Request Smuggling via Empty headers separated by CR nodejs: DiffieHellman do not generate keys after setting a private key nodejs: Permissions policies can be bypassed via Module._load nodejs: Permissions policies can impersonate other modules in using module.constructor.createRequire() nodejs: Permissions policies can be bypassed via process.binding
|
[
"cpe:/a:redhat:rhel_eus:9.0::appstream"
] | null | 7.5 | null | null |
RHSA-2019:3345
|
Red Hat Security Advisory: virt:rhel security, bug fix, and enhancement update
|
ntfs-3g: heap-based buffer overflow leads to local root privilege escalation QEMU: slirp: information leakage in tcp_emu() due to uninitialized stack variables QEMU: qxl: null pointer dereference while releasing spice resources
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb"
] | null | null | 3.8 | null |
RHSA-2017:1552
|
Red Hat Security Advisory: jboss-ec2-eap security, bug fix, and enhancement update
|
tomcat: security manager bypass via IntrospectHelper utility function tomcat: security manager bypass via JSP Servlet config parameters wildfly: Arbitrary file read via path traversal
|
[
"cpe:/a:redhat:jboss_enterprise_application_platform:6::el6"
] | null | null | 7.7 | null |
RHSA-2023:7667
|
Red Hat Security Advisory: postgresql:12 security update
|
postgresql: Extension scripts replace objects not belonging to the extension. postgresql: Client memory disclosure when connecting with Kerberos to modified server postgresql: schema_element defeats protective search_path changes postgresql: row security policies disregard user ID changes after inlining. postgresql: Memory disclosure in aggregate function calls postgresql: Buffer overrun from integer overflow in array modification postgresql: Role pg_signal_backend can signal certain superuser processes. postgresql: extension script @substitutions@ within quoting allow SQL injection
|
[
"cpe:/a:redhat:rhel_aus:8.2::appstream",
"cpe:/a:redhat:rhel_e4s:8.2::appstream",
"cpe:/a:redhat:rhel_tus:8.2::appstream"
] | null | 7.5 | null | null |
RHSA-2024:10520
|
Red Hat Security Advisory: OpenShift Container Platform 4.17.7 security update
|
runc: file descriptor leak
|
[
"cpe:/a:redhat:openshift:4.17::el9"
] | null | 8.6 | null | null |
RHSA-2010:0770
|
Red Hat Security Advisory: java-1.6.0-sun security update
|
TLS: MITM attacks via session renegotiation krb5: null pointer dereference in GSS-API library leads to DoS (MITKRB5-SA-2010-005) OpenJDK HttpURLConnection allows arbitrary request headers (6961084,6980004) OpenJDK DNS server IP address information leak (6957564) OpenJDK HttpURLConnection request splitting (6952017) JDK unspecified vulnerability in Java Web Start component OpenJDK local network address disclosure (6952603) JDK unspecified vulnerability in New Java Plugin component OpenJDK Swing unsafe reflection usage (6622002) OpenJDK corba reflection vulnerabilities (6891766,6925672) JDK unspecified vulnerability in Deployment component JDK unspecified vulnerability in 2D component OpenJDK Swing mutable static (6938813) JDK unspecified vulnerability in Java Web Start component JDK unspecified vulnerability in Sound component JDK unspecified vulnerability in Networking component OpenJDK corba reflection vulnerabilities (6891766,6925672) OpenJDK IndexColorModel double-free (6925710) OpenJDK: unspecified vulnerability in Deployment component OpenJDK JPEG writeImage remote code execution (6963023) OpenJDK ICC Profile remote code execution (6963489) OpenJDK ICU Opentype layout engine crash (6963285) OpenJDK Deserialization Race condition (6559775) OpenJDK Serialization inconsistencies (6966692) JDK unspecified vulnerability in Deployment Toolkit JDK unspecified vulnerability in 2D component JDK unspecified vulnerability in Sound component OpenJDK HttpURLConnection allows arbitrary request headers (6961084,6980004) OpenJDK HttpURLConnection incomplete TRACE permission check (6981426)
|
[
"cpe:/a:redhat:rhel_extras:4",
"cpe:/a:redhat:rhel_extras:5::client",
"cpe:/a:redhat:rhel_extras:5::server"
] | null | null | null | null |
RHEA-2020:0635
|
Red Hat Enhancement Advisory: microcode_ctl bug fix and enhancement update
|
hw: Intel SGX information leak
|
[
"cpe:/o:redhat:rhel_e4s:8.0::baseos"
] | null | null | 6 | null |
RHSA-2018:2943
|
Red Hat Security Advisory: java-1.8.0-openjdk security update
|
OpenJDK: Incorrect handling of unsigned attributes in signed Jar manifests (Security, 8194534) OpenJDK: Leak of sensitive header data via HTTP redirect (Networking, 8196902) OpenJDK: Incomplete enforcement of the trustURLCodebase restriction (JNDI, 8199177) OpenJDK: Improper field access checks (Hotspot, 8199226) OpenJDK: Missing endpoint identification algorithm check during TLS session resumption (JSSE, 8202613) OpenJDK: Unrestricted access to scripting engine (Scripting, 8202936) OpenJDK: Infinite loop in RIFF format reader (Sound, 8205361)
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | 5.3 | null |
RHSA-2023:6122
|
Red Hat Security Advisory: Red Hat Advanced Cluster Management 2.8.3 security and bug fix updates
|
golang: html/template: improper handling of HTML-like comments within script contexts golang: html/template: improper handling of special tags within script contexts golang: crypto/tls: panic when processing post-handshake message on QUIC connections golang: crypto/tls: lack of a limit on buffered post-handshake golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487) HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack)
|
[
"cpe:/a:redhat:acm:2.8::el8"
] | null | 7.5 | null | null |
RHSA-2024:1746
|
Red Hat Security Advisory: kernel security update
|
kernel: use-after-free in l2cap_connect and l2cap_le_connect_req in net/bluetooth/l2cap_core.c Kernel: bluetooth: Unauthorized management command execution kernel: net/sched: sch_hfsc UAF
|
[
"cpe:/o:redhat:rhel_aus:7.7::server"
] | null | 7.8 | null | null |
RHSA-2022:6165
|
Red Hat Security Advisory: thunderbird security update
|
Mozilla: Address bar spoofing via XSLT error handling Mozilla: Cross-origin XSLT Documents would have inherited the parent's permissions Mozilla: Data race and potential use-after-free in PK11_ChangePW Mozilla: Memory safety bugs fixed in Firefox 104 and Firefox ESR 102.2 Mozilla: Memory safety bugs fixed in Firefox 104, Firefox ESR 102.2, and Firefox ESR 91.13
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 8.8 | 7.5 | null |
RHSA-2020:4290
|
Red Hat Security Advisory: virt:8.1 and virt-devel:8.1 security update
|
QEMU: slirp: use-after-free in ip_reass() function in ip_input.c QEMU: usb: out-of-bounds r/w access issue while processing usb packets
|
[
"cpe:/a:redhat:advanced_virtualization:8.1::el8"
] | null | 5 | null | null |
RHSA-2004:373
|
Red Hat Security Advisory: gnome-vfs security update
|
security flaw
|
[
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws"
] | null | null | null | null |
RHSA-2020:5004
|
Red Hat Security Advisory: resource-agents security and bug fix update
|
python-httplib2: CRLF injection via an attacker controlled unescaped part of uri for httplib2.Http.request function
|
[
"cpe:/a:redhat:rhel_extras_sap:7",
"cpe:/a:redhat:rhel_extras_sap_hana:7",
"cpe:/o:redhat:enterprise_linux:7::server"
] | null | 6.8 | null | null |
RHSA-2023:5043
|
Red Hat Security Advisory: flac security update
|
flac: Remote Code Execution (RCE) via the bitwriter_grow_ function, by supplying crafted input to the encoder
|
[
"cpe:/a:redhat:rhel_aus:8.2::appstream",
"cpe:/a:redhat:rhel_e4s:8.2::appstream",
"cpe:/a:redhat:rhel_tus:8.2::appstream"
] | null | 7.8 | null | null |
RHSA-2020:5198
|
Red Hat Security Advisory: Red Hat OpenShift Jaeger security update
|
golang-github-miekg-dns: predictable TXID can lead to response forgeries golang.org/x/text: possibility to trigger an infinite loop in encoding/unicode could lead to crash
|
[
"cpe:/a:redhat:jaeger:1.20::el8"
] | null | 7.5 | null | null |
RHSA-2010:0679
|
Red Hat Security Advisory: rpm security and bug fix update
|
rpm: fails to drop SUID/SGID bits on package upgrade
|
[
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2022:5415
|
Red Hat Security Advisory: go-toolset-1.17 and go-toolset-1.17-golang security and bug fix update
|
golang: encoding/pem: fix stack overflow in Decode golang: regexp: stack exhaustion via a deeply nested expression golang: crypto/elliptic: panic caused by oversized scalar
|
[
"cpe:/a:redhat:devtools:2022"
] | null | 7.5 | null | null |
RHSA-2025:2130
|
Red Hat Security Advisory: emacs security update
|
emacs: Shell Injection Vulnerability in GNU Emacs via Custom "man" URI Scheme
|
[
"cpe:/o:redhat:rhel_els:7"
] | null | 8.8 | null | null |
RHBA-2022:0793
|
Red Hat Bug Fix Advisory: OpenShift Container Platform 4.8.34 packages update
|
cri-o: pod with access to 'hostIPC' and 'hostNetwork' kernel namespace allows sysctl from the list of safe sysctls to be applied to the host
|
[
"cpe:/a:redhat:openshift:4.8::el7",
"cpe:/a:redhat:openshift:4.8::el8"
] | null | 4.2 | null | null |
RHSA-2021:0282
|
Red Hat Security Advisory: OpenShift Container Platform 4.4.33 packages and security update
|
jenkins-2-plugins/subversion: XML parser is not preventing XML external entity (XXE) attacks jenkins-2-plugins/mercurial: XML parser is not preventing XML external entity (XXE) attacks
|
[
"cpe:/a:redhat:openshift:4.4::el7",
"cpe:/a:redhat:openshift:4.4::el8"
] | null | 6.5 | null | null |
RHSA-2020:1644
|
Red Hat Security Advisory: pki-core:10.6 and pki-deps:10.6 security, bug fix, and enhancement update
|
jackson-databind: Serialization gadgets in com.zaxxer.hikari.HikariConfig jackson-databind: Serialization gadgets in com.zaxxer.hikari.HikariDataSource jackson-databind: Serialization gadgets in org.apache.commons.dbcp.datasources.* jackson-databind: Serialization gadgets in com.p6spy.engine.spy.P6DataSource jackson-databind: Serialization gadgets in org.apache.log4j.receivers.db.* jackson-databind: lacks certain net.sf.ehcache blocking jackson-databind: Lacks certain xbean-reflect/JNDI blocking jackson-databind: Serialization gadgets in shaded-hikari-config jackson-databind: Serialization gadgets in ibatis-sqlmap jackson-databind: Serialization gadgets in anteros-core jackson-databind: mishandles the interaction between serialization gadgets and typing which could result in remote command execution jackson-databind: mishandles the interaction between serialization gadgets and typing which could result in remote command execution
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 8.1 | 8.1 | null |
RHSA-2024:1387
|
Red Hat Security Advisory: ovn22.03 security update
|
ovn: insufficient validation of BFD packets may lead to denial of service
|
[
"cpe:/o:redhat:enterprise_linux:8::fastdatapath"
] | null | 6.5 | null | null |
RHSA-2015:1741
|
Red Hat Security Advisory: haproxy security update
|
haproxy: information leak in buffer_slow_realign()
|
[
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | null | null |
RHSA-2024:7461
|
Red Hat Security Advisory: cups-filters security update
|
cups-filters: libcupsfilters: `cfGetPrinterAttributes` API does not perform sanitization on returned IPP attributes cups: libppd: remote command injection via attacker controlled data in PPD file cups-browsed: cups-browsed binds on UDP INADDR_ANY:631 trusting any packet from any source cups-browsed: cups-filters: cups-browsed vulnerable to DDoS amplification attack
|
[
"cpe:/a:redhat:rhel_aus:8.2::appstream"
] | null | 7.5 | null | null |
RHSA-2020:0729
|
Red Hat Security Advisory: Red Hat Data Grid 7.3.5 security update
|
jquery: Cross-site scripting via cross-domain ajax requests undertow: possible Denial Of Service (DOS) in Undertow HTTP server listening on HTTPS jackson-databind: Serialization gadgets in classes of the commons-configuration package jackson-databind: Serialization gadgets in classes of the xalan package jackson-databind: Serialization gadgets in com.zaxxer.hikari.HikariDataSource
|
[
"cpe:/a:redhat:jboss_data_grid:7.3"
] | null | null | 7.5 | null |
RHSA-2022:4711
|
Red Hat Security Advisory: RHV Manager (ovirt-engine) [ovirt-4.5.0] security update
|
nodejs-ansi-regex: Regular expression denial of service (ReDoS) matching ANSI escape codes nodejs-trim-off-newlines: ReDoS via string processing nodejs-normalize-url: ReDoS for data URLs jquery-ui: XSS in the altField option of the datepicker widget jquery-ui: XSS in *Text options of the datepicker widget jquery-ui: XSS in the 'of' option of the .position() util
|
[
"cpe:/a:redhat:rhev_manager:4.4:el8"
] | null | 6.5 | null | null |
RHSA-2023:0553
|
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.4.9 Security update
|
jquery: Cross-site scripting via cross-domain ajax requests bootstrap: XSS in the data-target attribute nodejs-moment: Regular expression denial of service bootstrap: Cross-site Scripting (XSS) in the collapse data-parent attribute bootstrap: Cross-site Scripting (XSS) in the data-target property of scrollspy bootstrap: Cross-site Scripting (XSS) in the data-container property of tooltip bootstrap: XSS in the tooltip or popover data-template attribute jquery: Prototype pollution in object's prototype leading to denial of service, remote code execution, or property injection jquery: Cross-site scripting due to improper injQuery.htmlPrefilter method jquery: Untrusted code execution via <option> tag in HTML passed to DOM manipulation methods wildfly-elytron: possible timing attacks via use of unsafe comparator jettison: parser crash by stackoverflow jettison: memory exhaustion via user-supplied XML or JSON data woodstox-core: woodstox to serialise XML data was vulnerable to Denial of Service attacks jackson-databind: deep wrapper array nesting wrt UNWRAP_SINGLE_VALUE_ARRAYS jackson-databind: use of deeply nested arrays mina-sshd: Java unsafe deserialization vulnerability jettison: If the value in map is the map's self, the new new JSONObject(map) cause StackOverflowError which may lead to dos CXF: SSRF Vulnerability
|
[
"cpe:/a:redhat:jboss_enterprise_application_platform:7.4::el8"
] | null | 9.8 | 5.6 | null |
RHSA-2018:1414
|
Red Hat Security Advisory: firefox security update
|
Mozilla: Memory safety bugs fixed in Firefox 60 and Firefox ESR 52.8 Mozilla: Use-after-free with SVG animations and clip paths Mozilla: Use-after-free with SVG animations and text paths Mozilla: Same-origin bypass of PDF Viewer to view protected PDF files Mozilla: Malicious PDF can inject JavaScript into PDF Viewer Mozilla: Integer overflow and out-of-bounds write in Skia Mozilla: Lightweight themes can be installed without user interaction Mozilla: Buffer overflow during UTF-8 to Unicode string conversion through legacy extension Mozilla: Backport critical security fixes in Skia
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | 9.8 | null |
RHSA-2023:0395
|
Red Hat Security Advisory: kernel security and bug fix update
|
kernel: tcp: fix page frag corruption on page fault kernel: memory corruption in AX88179_178A based USB ethernet device.
|
[
"cpe:/o:redhat:rhel_aus:8.2::baseos",
"cpe:/o:redhat:rhel_e4s:8.2::baseos",
"cpe:/o:redhat:rhel_tus:8.2::baseos"
] | null | 7.8 | null | null |
RHSA-2024:6211
|
Red Hat Security Advisory: Red Hat OpenShift Service Mesh Containers for 2.6.1 security update
|
micromatch: vulnerable to Regular Expression Denial of Service braces: fails to limit the number of characters it can handle express: cause malformed URLs to be evaluated axios: axios: Server-Side Request Forgery
|
[
"cpe:/a:redhat:service_mesh:2.6::el8",
"cpe:/a:redhat:service_mesh:2.6::el9"
] | null | 7.5 | null | null |
RHSA-2013:1480
|
Red Hat Security Advisory: thunderbird security update
|
Mozilla: Miscellaneous memory safety hazards (rv:17.0.10) (MFSA 2013-93) Mozilla: Improperly initialized memory and overflows in some JavaScript functions (MFSA 2013-96) Mozilla: Use-after-free when updating offline cache (MFSA 2013-98) Mozilla: Miscellaneous use-after-free issues found through ASAN fuzzing (MFSA 2013-100) Mozilla: Miscellaneous use-after-free issues found through ASAN fuzzing (MFSA 2013-100) Mozilla: Miscellaneous use-after-free issues found through ASAN fuzzing (MFSA 2013-100) Mozilla: Memory corruption in workers (MFSA 2013-101) Mozilla: Access violation with XSLT and uninitialized data (MFSA 2013-95)
|
[
"cpe:/a:redhat:rhel_productivity:5",
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2014:1008
|
Red Hat Security Advisory: samba security and bug fix update
|
samba: remote code execution in nmbd
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | null | null |
RHSA-2022:0072
|
Red Hat Security Advisory: kernel security update
|
kernel: fuse: fuse_do_getattr() calls make_bad_inode() in inappropriate situations
|
[
"cpe:/a:redhat:rhel_eus:8.2::crb",
"cpe:/o:redhat:rhel_eus:8.2::baseos"
] | null | 5.5 | null | null |
RHSA-2014:0355
|
Red Hat Security Advisory: ruby193-libyaml security update
|
libyaml: heap-based buffer overflow when parsing YAML tags libyaml: heap-based buffer overflow when parsing URLs
|
[
"cpe:/a:redhat:rhel_software_collections:1::el6"
] | null | null | null | null |
RHSA-2024:10979
|
Red Hat Security Advisory: python3.11 security update
|
python: Virtual environment (venv) activation scripts don't quote paths
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb"
] | null | 6.3 | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.