id
stringlengths
13
15
title
stringlengths
29
176
description
stringlengths
8
32.1k
cpes
listlengths
0
20
cvss_v4_0
null
cvss_v3_1
float64
0
10
cvss_v3_0
float64
0
10
cvss_v2_0
null
RHSA-2008:0601
Red Hat Security Advisory: adminutil security update
Server: multiple XSS issues
[ "cpe:/a:redhat:directory_server:8::el4", "cpe:/a:redhat:directory_server:8::el5" ]
null
null
null
null
RHSA-2016:0125
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 6.4.6 update
jakarta-taglibs-standard: XXE and RCE via XSL extension in JSTL XML tags
[ "cpe:/a:redhat:jboss_enterprise_application_platform:6.4" ]
null
null
7.6
null
RHSA-2017:0003
Red Hat Security Advisory: systemd security update
systemd: freeze when PID 1 receives a zero-length message over notify socket
[ "cpe:/o:redhat:rhel_eus:7.1::computenode", "cpe:/o:redhat:rhel_eus:7.1::server" ]
null
null
6.8
null
RHSA-2020:2298
Red Hat Security Advisory: openvswitch security, bug fix and enhancement update
dpdk: librte_vhost Integer overflow in vhost_user_set_log_base() dpdk: librte_vhost Integer truncation in vhost_user_check_and_alloc_queue_pair()
[ "cpe:/o:redhat:enterprise_linux:7::fastdatapath", "cpe:/o:redhat:enterprise_linux:7::hypervisor" ]
null
6.7
null
null
RHSA-2020:2407
Red Hat Security Advisory: freerdp security update
freerdp: Out-of-bounds write in crypto_rsa_common in libfreerdp/crypto/crypto.c
[ "cpe:/a:redhat:enterprise_linux:8::appstream", "cpe:/a:redhat:enterprise_linux:8::crb" ]
null
8.3
null
null
RHSA-2024:7670
Red Hat Security Advisory: Red Hat build of Quarkus 3.8.6.SP1 Security Update
angus-mail: Enabling Secure Server Identity Checks for Safer SMTPS Communication protobuf: StackOverflow vulnerability in Protocol Buffers graphql-java: Allocation of Resources Without Limits or Throttling in GraphQL Java apache-avro: Schema parsing may trigger Remote Code Execution (RCE)
[ "cpe:/a:redhat:quarkus:3.8::el8" ]
null
8.8
null
null
RHSA-2013:1779
Red Hat Security Advisory: mod_nss security update
mod_nss: incorrect handling of NSSVerifyClient in directory context
[ "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::server", "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
null
null
RHSA-2008:0201
Red Hat Security Advisory: redhat-ds-admin security update
Server: shell command injection in CGI replication monitor Server: unrestricted access to CGI scripts
[ "cpe:/a:redhat:directory_server:8::el4", "cpe:/a:redhat:directory_server:8::el5" ]
null
null
null
null
RHSA-2017:2889
Red Hat Security Advisory: Red Hat JBoss BPM Suite 6.4.6 security update
log4j: Socket receiver deserialization vulnerability XStream: DoS when unmarshalling void type log4j: deserialization of untrusted data in SocketServer
[ "cpe:/a:redhat:jboss_bpms:6.4" ]
null
9.8
5.9
null
RHSA-2002:120
Red Hat Security Advisory: LPRng security update
security flaw
[ "cpe:/o:redhat:enterprise_linux:2.1::as" ]
null
null
null
null
RHSA-2019:0433
Red Hat Security Advisory: ansible security and bug fix update
Ansible: path traversal in the fetch module
[ "cpe:/a:redhat:ansible_engine:2.6::el7" ]
null
null
4.2
null
RHSA-2022:5069
Red Hat Security Advisory: OpenShift Container Platform 4.11.0 bug fix and security update
nanoid: Information disclosure via valueOf() function sanitize-url: XSS due to improper sanitization in sanitizeUrl function opencontainers: OCI manifest and index parsing confusion golang.org/x/crypto: empty plaintext packet causes panic minimist: prototype pollution node-fetch: exposure of sensitive information to an unauthorized actor prometheus/client_golang: Denial of service using InstrumentHandlerCounter go-getter: command injection vulnerability golang: crash in a golang.org/x/crypto/ssh server go-getter: writes SSH credentials into logfile, exposing sensitive credentials to local uses go-getter: unsafe download (issue 1 of 3) go-getter: unsafe download (issue 2 of 3) go-getter: unsafe download (issue 3 of 3)
[ "cpe:/a:redhat:openshift:4.11::el8" ]
null
8.6
null
null
RHSA-2015:0856
Red Hat Security Advisory: postgresql92-postgresql security update
postgresql: information leak through constraint violation errors postgresql: buffer overflow in the to_char() function postgresql: buffer overflow flaws in contrib/pgcrypto postgresql: loss of frontend/backend protocol synchronization after an error
[ "cpe:/a:redhat:network_satellite:5.7::el6", "cpe:/a:redhat:network_satellite_managed_db:5.7::el6" ]
null
null
null
null
RHSA-2005:059
Red Hat Security Advisory: xpdf security update
security flaw
[ "cpe:/o:redhat:enterprise_linux:3::as", "cpe:/o:redhat:enterprise_linux:3::desktop", "cpe:/o:redhat:enterprise_linux:3::es", "cpe:/o:redhat:enterprise_linux:3::ws" ]
null
null
null
null
RHSA-2011:1444
Red Hat Security Advisory: nss security update
Updated nss packages that fix one security issue are now available for Red Hat Enterprise Linux 4, 5, and 6. The Red Hat Security Response Team has rated this update as having important security impact.
[ "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws", "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::client_workstation", "cpe:/o:redhat:enterprise_linux:5::server", "cpe:/o:redhat:enterprise_linux:6::server" ]
null
null
null
null
RHSA-2020:0839
Red Hat Security Advisory: kernel-rt security and bug fix update
kernel: Count overflow in FUSE request leading to use-after-free issues. kernel: rtl_p2p_noa_ie in drivers/net/wireless/realtek/rtlwifi/ps.c in the Linux kernel lacks a certain upper-bound check, leading to a buffer overflow Kernel: KVM: export MSR_IA32_TSX_CTRL to guest - incomplete fix for TAA (CVE-2019-11135)
[ "cpe:/a:redhat:rhel_extras_rt:7" ]
null
null
5.5
null
RHSA-2005:420
Red Hat Security Advisory: Updated kernel packages available for Red Hat Enterprise Linux 4 Update 1
security flaw security flaw security flaw security flaw security flaw
[ "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws" ]
null
null
null
null
RHSA-2024:6998
Red Hat Security Advisory: kernel security update
kernel: cgroup: cgroup_get_from_id() must check the looked-up kn is a directory kernel: nvme-tcp: fix UAF when detecting digest errors kernel: net: fix possible store tearing in neigh_periodic_work() kernel: fs/proc: do_task_stat: use sig->stats_lock to gather the threads/children stats kernel: mptcp: ensure snd_nxt is properly initialized on connect kernel: wifi: mac80211: Avoid address calculations via out of bounds array indexing
[ "cpe:/o:redhat:rhel_aus:8.6::baseos", "cpe:/o:redhat:rhel_e4s:8.6::baseos", "cpe:/o:redhat:rhel_tus:8.6::baseos" ]
null
7.8
null
null
RHSA-2022:6713
Red Hat Security Advisory: thunderbird security update
Mozilla: Remote content specified in an HTML document that was nested inside an iframe's srcdoc attribute was not blocked Mozilla: Leaking of sensitive information when composing a response to an HTML email with a META refresh tag Mozilla: An iframe element in an HTML email could trigger a network request Mozilla: Out of bounds read when decoding H264 Mozilla: Matrix SDK bundled with Thunderbird vulnerable to denial-of-service attack Mozilla: Content-Security-Policy base-uri bypass Mozilla: Incoherent instruction cache when building WASM on ARM64 Mozilla: Bypassing Secure Context restriction for cookies with __Host and __Secure prefix Mozilla: Bypassing FeaturePolicy restrictions on transient pages Mozilla: Data-race when parsing non-UTF-8 URLs in threads Mozilla: Memory safety bugs fixed in Firefox 105 and Firefox ESR 102.3
[ "cpe:/a:redhat:rhel_eus:8.4::appstream" ]
null
8.8
7.5
null
RHSA-2020:5620
Red Hat Security Advisory: postgresql:12 security update
postgresql: ALTER ... DEPENDS ON EXTENSION is missing authorization checks postgresql: Uncontrolled search path element in logical replication postgresql: Uncontrolled search path element in CREATE EXTENSION postgresql: Reconnection can downgrade connection security settings postgresql: Multiple features escape "security restricted operation" sandbox postgresql: psql's \gset allows overwriting specially treated variables
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
7.5
null
null
RHBA-2015:0386
Red Hat Bug Fix Advisory: cups bug fix and enhancement update
cups: cross-site scripting flaw fixed in the 1.7.2 release cups: insufficient checking leads to privilege escalation cups: Incomplete fix for CVE-2014-3537 cups: allows local users to read arbitrary files via a symlink attack cups: world-readable permissions
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
null
null
RHSA-2005:072
Red Hat Security Advisory: perl-DBI security update
security flaw
[ "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws" ]
null
null
null
null
RHSA-2022:4985
Red Hat Security Advisory: Cryostat 2.1.1: new Cryostat on RHEL 8 container images
com.google.code.gson-gson: Deserialization of Untrusted Data in com.google.code.gson-gson golang-gopkg-yaml: crash when attempting to deserialize invalid input
[ "cpe:/a:redhat:cryostat:2::el8" ]
null
7.5
null
null
RHSA-2022:7013
Red Hat Security Advisory: java-11-openjdk security and bug fix update
OpenJDK: improper MultiByte conversion can lead to buffer overflow (JGSS, 8286077) OpenJDK: improper handling of long NTLM client hostnames (Security, 8286526) OpenJDK: insufficient randomization of JNDI DNS port numbers (JNDI, 8286910) OpenJDK: excessive memory allocation in X.509 certificate parsing (Security, 8286533) OpenJDK: HttpServer no connection count limit (Lightweight HTTP Server, 8286918) harfbuzz: integer overflow in the component hb-ot-shape-fallback.cc OpenJDK: missing SNI caching in HTTP/2 (Networking, 8289366)
[ "cpe:/a:redhat:enterprise_linux:9::appstream", "cpe:/a:redhat:enterprise_linux:9::crb" ]
null
3.7
null
null
RHSA-2015:2519
Red Hat Security Advisory: thunderbird security update
Mozilla: Miscellaneous memory safety hazards (rv:38.4) (MFSA 2015-116) Mozilla: Buffer overflow during image interactions in canvas (MFSA 2015-123) Mozilla: CORS preflight is bypassed when non-standard Content-Type headers are received (MFSA 2015-127) Mozilla: Mixed content WebSocket policy bypass through workers (MFSA 2015-132) Mozilla: Vulnerabilities found through code inspection (MFSA 2015-131) Mozilla: Vulnerabilities found through code inspection (MFSA 2015-131) Mozilla: Vulnerabilities found through code inspection (MFSA 2015-131)
[ "cpe:/a:redhat:rhel_productivity:5", "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation", "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
null
null
RHSA-2024:4730
Red Hat Security Advisory: fence-agents update
urllib3: proxy-authorization request header is not stripped during cross-origin redirects
[ "cpe:/a:redhat:rhel_aus:8.4::appstream", "cpe:/a:redhat:rhel_e4s:8.4::appstream", "cpe:/a:redhat:rhel_e4s:8.4::highavailability", "cpe:/a:redhat:rhel_tus:8.4::appstream", "cpe:/a:redhat:rhel_tus:8.4::highavailability" ]
null
4.4
null
null
RHSA-2020:5412
Red Hat Security Advisory: python-XStatic-jQuery224 security update
jquery: Untrusted code execution via <option> tag in HTML passed to DOM manipulation methods
[ "cpe:/a:redhat:openstack:16.1::el8" ]
null
6.1
null
null
RHSA-2024:6816
Red Hat Security Advisory: thunderbird security update
mozilla: Type Confusion in Async Generators in Javascript Engine mozilla: Type confusion when looking up a property name in a &quot;with&quot; block mozilla: Internal event interfaces were exposed to web content when browser EventHandler listener callbacks ran mozilla: Garbage collection could mis-color cross-compartment objects in OOM conditions mozilla: WASM type confusion involving ArrayTypes mozilla: SelectElements could be shown over another site if popups are allowed mozilla: Memory safety bugs fixed in Firefox 130, Firefox ESR 128.2, and Thunderbird 128.2 thunderbird: Crash when aborting verification of OTR chat
[ "cpe:/a:redhat:rhel_tus:8.6::appstream" ]
null
6.5
null
null
RHSA-2015:2619
Red Hat Security Advisory: libreoffice security update
libreoffice: Arbitrary file disclosure in Calc and Writer libreoffice: Integer underflow in PrinterSetup length libreoffice: Integer overflow in DOC files libreoffice: Bookmarks in DOC documents are insufficiently checked causing memory corruption
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation", "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
null
null
RHSA-2015:0384
Red Hat Security Advisory: powerpc-utils security, bug fix, and enhancement update
powerpc-utils: snap creates archives with fstab and yaboot.conf which may expose certain passwords
[ "cpe:/o:redhat:enterprise_linux:7::server" ]
null
null
null
null
RHSA-2024:0424
Red Hat Security Advisory: rpm security update
rpm: TOCTOU race in checks for unsafe symlinks rpm: races with chown/chmod/capabilities calls during installation rpm: checks for unsafe symlinks are not performed for intermediary directories
[ "cpe:/a:redhat:rhel_eus:8.6::appstream", "cpe:/o:redhat:rhel_eus:8.6::baseos" ]
null
6.5
null
null
RHSA-2023:0078
Red Hat Security Advisory: .NET 6.0 security, bug fix, and enhancement update
dotnet: Parsing an empty HTTP response as a JSON.NET JObject causes a stack overflow and crashes a process
[ "cpe:/a:redhat:rhel_dotnet:6.0::el7" ]
null
7.5
null
null
RHSA-2003:218
Red Hat Security Advisory: : : : Updated unzip and tar packages that fix vulnerabilities are now available
security flaw security flaw security flaw security flaw security flaw security flaw
[ "cpe:/o:redhat:linux:7.1" ]
null
null
null
null
RHSA-2013:1645
Red Hat Security Advisory: Red Hat Enterprise Linux 6 kernel update
Kernel: llc: information leak via getsockname Kernel: Bluetooth: RFCOMM - information leak kernel: handling of IPv6 temporary addresses Kernel: information leak in fs/compat_ioctl.c VIDEO_SET_SPU_PALETTE Kernel: tg3: buffer overflow in VPD firmware parsing Kernel: information leak in cdrom driver Kernel: net: information leak in AF_KEY notify kernel: block: passing disk names as format strings Kernel: HID: memory corruption flaw Kernel: HID: zeroplus: heap overflow flaw Kernel: HID: pantherlord: heap overflow flaw Kernel: llc: Fix missing msg_namelen update in llc_ui_recvmsg kernel: ansi_cprng: off by one error in non-block size request Kernel: net: IPv6: panic when UFO=On for an interface kernel: nfs: missing check for buffer length in __nfs4_get_acl_uncached kernel: kvm: memory leak when memory slot is moved with assigned device
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
null
null
RHSA-2010:0788
Red Hat Security Advisory: pidgin security update
Pidgin: MSN SLP emoticon DoS (NULL pointer dereference) (libpurple): Multiple DoS (crash) flaws by processing of unsanitized Base64 decoder values
[ "cpe:/a:redhat:rhel_productivity:5", "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws", "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::client_workstation" ]
null
null
null
null
RHSA-2021:4221
Red Hat Security Advisory: container-tools:2.0 security update
buildah: Host environment variables leaked in build container when using chroot isolation
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
5.6
null
null
RHSA-2024:2887
Red Hat Security Advisory: firefox security update
Mozilla: Arbitrary JavaScript execution in PDF.js Mozilla: IndexedDB files retained in private browsing mode Mozilla: Potential permissions request bypass via clickjacking Mozilla: Cross-origin responses could be distinguished between script and non-script content-types Mozilla: Use-after-free could occur when printing to PDF Mozilla: Memory safety bugs fixed in Firefox 126, Firefox ESR 115.11, and Thunderbird 115.11
[ "cpe:/a:redhat:rhel_eus:8.6::appstream" ]
null
6.1
null
null
RHSA-2019:1245
Red Hat Security Advisory: Red Hat Quay 3.0.2 security and bug fix update
SSL/TLS: Birthday attack against 64-bit block ciphers (SWEET32)
[ "cpe:/a:redhat:quay:3::el7" ]
null
null
7.5
null
RHBA-2020:1310
Red Hat Bug Fix Advisory: Red Hat Virtualization Host (redhat-virtualization-host) 4.3.9 async
libxml2: NULL pointer dereference in xmlXPathCompOpEval() function in xpath.c
[ "cpe:/o:redhat:enterprise_linux:7::hypervisor" ]
null
null
6.5
null
RHSA-2018:1206
Red Hat Security Advisory: java-1.7.0-oracle security update
OpenJDK: incorrect merging of sections in the JAR manifest (Security, 8189969) OpenJDK: unrestricted deserialization of data from JCEKS key stores (Security, 8189997) OpenJDK: insufficient consistency checks in deserialization of multiple classes (Security, 8189977) OpenJDK: unbounded memory allocation during deserialization in PriorityBlockingQueue (Concurrency, 8189981) OpenJDK: unbounded memory allocation during deserialization in TabularDataSupport (JMX, 8189985) OpenJDK: unbounded memory allocation during deserialization in Container (AWT, 8189989) OpenJDK: unbounded memory allocation during deserialization in NamedNodeMapImpl (JAXP, 8189993) OpenJDK: RMI HTTP transport enabled by default (RMI, 8193833) OpenJDK: incorrect handling of Reference clones can lead to sandbox bypass (Hotspot, 8192025) OpenJDK: unbounded memory allocation during deserialization in StubIORImpl (Serialization, 8192757)
[ "cpe:/a:redhat:rhel_extras_oracle_java:6" ]
null
null
5.3
null
RHSA-2024:5955
Red Hat Security Advisory: Multicluster Engine for Kubernetes 2.6.2 security updates and bug fixes
nodejs-semver: Regular expression denial of service
[ "cpe:/a:redhat:multicluster_engine:2.6::el8", "cpe:/a:redhat:multicluster_engine:2.6::el9" ]
null
7.5
null
null
RHSA-2017:3047
Red Hat Security Advisory: java-1.6.0-sun security update
zlib: Out-of-bounds pointer arithmetic in inftrees.c zlib: Out-of-bounds pointer arithmetic in inffast.c zlib: Undefined left shift of negative number zlib: Big-endian out-of-bounds pointer OpenJDK: CardImpl incorrect state handling (Smart Card IO, 8169026) OpenJDK: multiple unbounded memory allocations in deserialization (Serialization, 8174109) OpenJDK: incorrect privilege use when handling unreferenced objects (RMI, 8174966) JDK: unspecified vulnerability fixed in 6u171, 7u161, 8u151, and 9.0.1 (Javadoc) OpenJDK: HTTP client insufficient check for newline in URLs (Networking, 8176751) OpenJDK: unbounded resource use in JceKeyStore deserialization (Serialization, 8181370) OpenJDK: insufficient loader constraints checks for invokespecial (Hotspot, 8180711) OpenJDK: unbounded memory allocation in SimpleTimeZone deserialization (Serialization, 8181323) OpenJDK: multiple unbounded memory allocations in deserialization (Libraries, 8181432) OpenJDK: unbounded memory allocation in PredicatedNodeTest deserialization (JAXP, 8181327) OpenJDK: no default network operations timeouts in FtpClient (Networking, 8181612) OpenJDK: weak protection of key stores against brute forcing (Security, 8181692) OpenJDK: unbounded memory allocation in ObjectInputStream deserialization (Serialization, 8181597) OpenJDK: use of unprotected sname in Kerberos client (Libraries, 8178794)
[ "cpe:/a:redhat:rhel_extras_oracle_java:6", "cpe:/a:redhat:rhel_extras_oracle_java:7" ]
null
null
6.8
null
RHSA-2022:5459
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 6.4.24 security update
tomcat: multiple requests with invalid payload length in a WebSocket frame could lead to DoS jbossweb: Incomplete fix of CVE-2020-13935 for WebSocket in JBossWeb could lead to DoS log4j: Remote code execution in Log4j 1.x when application is configured to use JMSAppender log4j: Remote code execution in Log4j 1.x when application is configured to use JMSSink log4j: SQL injection in Log4j 1.x when application is configured to use JDBCAppender log4j: Unsafe deserialization flaw in Chainsaw log viewer
[ "cpe:/a:redhat:jboss_enterprise_application_platform:6::el6" ]
null
8.8
null
null
RHSA-2021:0811
Red Hat Security Advisory: Red Hat Integration Tech-Preview 3 Camel K security update
cassandra: allows manipulation of the RMI registry to perform a MITM attack and capture user names and passwords used to access the JMX interface apache-httpclient: incorrect handling of malformed authority component in request URIs jackson-databind: FasterXML DOMDeserializer insecure entity expansion is vulnerable to XML external entity (XXE)
[ "cpe:/a:redhat:integration:1" ]
null
7.5
null
null
RHSA-2020:0703
Red Hat Security Advisory: http-parser security update
nodejs: HTTP request smuggling using malformed Transfer-Encoding header
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
7.1
null
null
RHSA-2020:5317
Red Hat Security Advisory: rh-postgresql12-postgresql security update
postgresql: Reconnection can downgrade connection security settings postgresql: Multiple features escape "security restricted operation" sandbox postgresql: psql's \gset allows overwriting specially treated variables
[ "cpe:/a:redhat:rhel_software_collections:3::el7" ]
null
7.5
null
null
RHSA-2024:3005
Red Hat Security Advisory: python-pillow security update
python-pillow: uncontrolled resource consumption when textlength in an ImageDraw instance operates on a long text argument
[ "cpe:/a:redhat:enterprise_linux:8::appstream", "cpe:/a:redhat:enterprise_linux:8::crb" ]
null
7.5
null
null
RHSA-2018:1784
Red Hat Security Advisory: rh-java-common-xmlrpc security update
xmlrpc: Deserialization of untrusted Java object through <ex:serializable> tag
[ "cpe:/a:redhat:rhel_software_collections:3::el6", "cpe:/a:redhat:rhel_software_collections:3::el7" ]
null
null
7.5
null
RHSA-2020:0464
Red Hat Security Advisory: 389-ds:1.4 security update
389-ds-base: Read permission check bypass via the deref plugin
[ "cpe:/a:redhat:rhel_e4s:8.0::appstream" ]
null
null
6.5
null
RHSA-2021:4519
Red Hat Security Advisory: autotrace security update
autotrace: integer overflow in input-bmp.c autotrace: bitmap double free in main.c allows attackers to cause an unspecified impact
[ "cpe:/a:redhat:enterprise_linux:8::crb" ]
null
7.8
null
null
RHSA-2020:3580
Red Hat Security Advisory: OpenShift Container Platform 4.4.19 openshift-enterprise-hyperkube-container security update
kubernetes: Node disk DOS by writing to container /etc/hosts
[ "cpe:/a:redhat:openshift:4.4::el7" ]
null
5.5
null
null
RHSA-2014:1846
Red Hat Security Advisory: gnutls security update
gnutls: Heap corruption when generating key ID for ECC (GNUTLS-SA-2014-5)
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
null
null
RHSA-2016:2580
Red Hat Security Advisory: poppler security and bug fix update
poppler: heap buffer overflow in ExponentialFunction
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
null
null
RHSA-2020:5079
Red Hat Security Advisory: kernel-alt security and bug fix update
kernel: soft-lockups in iov_iter_copy_from_user_atomic() could result in DoS
[ "cpe:/o:redhat:enterprise_linux:7::server" ]
null
5.5
null
null
RHSA-2012:1559
Red Hat Security Advisory: JBoss Enterprise BRMS Platform 5.3.0 security update
apache-cxf: Apache CXF does not verify that elements were signed / encrypted by a particular Supporting Token
[ "cpe:/a:redhat:jboss_enterprise_brms_platform:5.3" ]
null
null
null
null
RHSA-2015:2673
Red Hat Security Advisory: openstack-nova security and bug fix advisory
openstack-nova: network security group changes are not applied to running instances
[ "cpe:/a:redhat:openstack:7::el7" ]
null
null
null
null
RHSA-2023:0128
Red Hat Security Advisory: java-1.8.0-ibm security update
OpenJDK: improper handling of long NTLM client hostnames (Security, 8286526) OpenJDK: insufficient randomization of JNDI DNS port numbers (JNDI, 8286910) OpenJDK: excessive memory allocation in X.509 certificate parsing (Security, 8286533) OpenJDK: HttpServer no connection count limit (Lightweight HTTP Server, 8286918)
[ "cpe:/a:redhat:enterprise_linux:8::supplementary" ]
null
5.3
null
null
RHSA-2011:0881
Red Hat Security Advisory: Red Hat Network Proxy server jabberd security update
jabberd: DoS via the XML "billion laughs attack"
[ "cpe:/a:redhat:network_proxy:5.4::el5" ]
null
null
null
null
RHSA-2024:7489
Red Hat Security Advisory: kernel security update
kernel: netfilter: bridge: confirm multicast packets before passing them up the stack kernel: netfilter: tproxy: bail out if IP has been disabled on the device kernel: net: bridge: mst: fix vlan use-after-free kernel: net: openvswitch: fix overwriting ct original tuple for ICMPv6
[ "cpe:/a:redhat:rhel_eus:9.2::appstream", "cpe:/a:redhat:rhel_eus:9.2::crb", "cpe:/o:redhat:rhel_eus:9.2::baseos" ]
null
5.5
null
null
RHSA-2017:3188
Red Hat Security Advisory: Red Hat OpenShift Container Platform 3.7 security, bug, and enhancement update
3: authentication bypass for elasticsearch with external routes
[ "cpe:/a:redhat:openshift:3.7::el7" ]
null
null
6.5
null
RHSA-2005:433
Red Hat Security Advisory: postgresql security update
security flaw security flaw
[ "cpe:/o:redhat:enterprise_linux:3::as", "cpe:/o:redhat:enterprise_linux:3::desktop", "cpe:/o:redhat:enterprise_linux:3::es", "cpe:/o:redhat:enterprise_linux:3::ws", "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws" ]
null
null
null
null
RHSA-2015:1787
Red Hat Security Advisory: kernel-rt security, bug fix, and enhancement update
kernel: ASLR bruteforce possible for vdso library kernel: fs: ext4: fallocate zero range page size > block size BUG() kernel: denial of service due to memory leak in add_key() kernel: SCTP race condition allows list corruption and panic from userlevel kernel: net: incorrect processing of checksums in UDP implementation kernel: net: incorrect processing of checksums in UDP implementation
[ "cpe:/a:redhat:enterprise_mrg:2:server:el6" ]
null
null
null
null
RHSA-2009:0053
Red Hat Security Advisory: kernel-rt security and bug fix update
Linux Kernel 'atm module' Local Denial of Service kernel: libertas: fix buffer overrun kernel: fix inotify watch removal/umount races kernel: fix soft lockups/OOM issues with unix socket garbage collector kernel: enforce a minimum SG_IO timeout kernel: sctp: memory overflow when FWD-TSN chunk is received with bad stream ID
[ "cpe:/a:redhat:enterprise_mrg:1::el5" ]
null
null
null
null
RHSA-2015:1510
Red Hat Security Advisory: clutter security update
clutter: screenlock bypass by performing certain mouse gestures
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
null
null
RHSA-2023:5533
Red Hat Security Advisory: nodejs security, bug fix, and enhancement update
c-ares: buffer overflow in config_sortlist() due to missing string length check http-cache-semantics: Regular Expression Denial of Service (ReDoS) vulnerability Node.js: insecure loading of ICU data through ICU_DATA environment variable Node.js: Fetch API did not protect against CRLF injection in host headers Node.js: Regular Expression Denial of Service in Headers fetch API nodejs: mainModule.proto bypass experimental policy mechanism nodejs: process interuption due to invalid Public Key information in x509 certificates nodejs: HTTP Request Smuggling via Empty headers separated by CR nodejs: DiffieHellman do not generate keys after setting a private key nodejs: Permissions policies can be bypassed via Module._load nodejs: Permissions policies can impersonate other modules in using module.constructor.createRequire() nodejs: Permissions policies can be bypassed via process.binding
[ "cpe:/a:redhat:rhel_eus:9.0::appstream" ]
null
7.5
null
null
RHSA-2019:3345
Red Hat Security Advisory: virt:rhel security, bug fix, and enhancement update
ntfs-3g: heap-based buffer overflow leads to local root privilege escalation QEMU: slirp: information leakage in tcp_emu() due to uninitialized stack variables QEMU: qxl: null pointer dereference while releasing spice resources
[ "cpe:/a:redhat:enterprise_linux:8::appstream", "cpe:/a:redhat:enterprise_linux:8::crb" ]
null
null
3.8
null
RHSA-2017:1552
Red Hat Security Advisory: jboss-ec2-eap security, bug fix, and enhancement update
tomcat: security manager bypass via IntrospectHelper utility function tomcat: security manager bypass via JSP Servlet config parameters wildfly: Arbitrary file read via path traversal
[ "cpe:/a:redhat:jboss_enterprise_application_platform:6::el6" ]
null
null
7.7
null
RHSA-2023:7667
Red Hat Security Advisory: postgresql:12 security update
postgresql: Extension scripts replace objects not belonging to the extension. postgresql: Client memory disclosure when connecting with Kerberos to modified server postgresql: schema_element defeats protective search_path changes postgresql: row security policies disregard user ID changes after inlining. postgresql: Memory disclosure in aggregate function calls postgresql: Buffer overrun from integer overflow in array modification postgresql: Role pg_signal_backend can signal certain superuser processes. postgresql: extension script @substitutions@ within quoting allow SQL injection
[ "cpe:/a:redhat:rhel_aus:8.2::appstream", "cpe:/a:redhat:rhel_e4s:8.2::appstream", "cpe:/a:redhat:rhel_tus:8.2::appstream" ]
null
7.5
null
null
RHSA-2024:10520
Red Hat Security Advisory: OpenShift Container Platform 4.17.7 security update
runc: file descriptor leak
[ "cpe:/a:redhat:openshift:4.17::el9" ]
null
8.6
null
null
RHSA-2010:0770
Red Hat Security Advisory: java-1.6.0-sun security update
TLS: MITM attacks via session renegotiation krb5: null pointer dereference in GSS-API library leads to DoS (MITKRB5-SA-2010-005) OpenJDK HttpURLConnection allows arbitrary request headers (6961084,6980004) OpenJDK DNS server IP address information leak (6957564) OpenJDK HttpURLConnection request splitting (6952017) JDK unspecified vulnerability in Java Web Start component OpenJDK local network address disclosure (6952603) JDK unspecified vulnerability in New Java Plugin component OpenJDK Swing unsafe reflection usage (6622002) OpenJDK corba reflection vulnerabilities (6891766,6925672) JDK unspecified vulnerability in Deployment component JDK unspecified vulnerability in 2D component OpenJDK Swing mutable static (6938813) JDK unspecified vulnerability in Java Web Start component JDK unspecified vulnerability in Sound component JDK unspecified vulnerability in Networking component OpenJDK corba reflection vulnerabilities (6891766,6925672) OpenJDK IndexColorModel double-free (6925710) OpenJDK: unspecified vulnerability in Deployment component OpenJDK JPEG writeImage remote code execution (6963023) OpenJDK ICC Profile remote code execution (6963489) OpenJDK ICU Opentype layout engine crash (6963285) OpenJDK Deserialization Race condition (6559775) OpenJDK Serialization inconsistencies (6966692) JDK unspecified vulnerability in Deployment Toolkit JDK unspecified vulnerability in 2D component JDK unspecified vulnerability in Sound component OpenJDK HttpURLConnection allows arbitrary request headers (6961084,6980004) OpenJDK HttpURLConnection incomplete TRACE permission check (6981426)
[ "cpe:/a:redhat:rhel_extras:4", "cpe:/a:redhat:rhel_extras:5::client", "cpe:/a:redhat:rhel_extras:5::server" ]
null
null
null
null
RHEA-2020:0635
Red Hat Enhancement Advisory: microcode_ctl bug fix and enhancement update
hw: Intel SGX information leak
[ "cpe:/o:redhat:rhel_e4s:8.0::baseos" ]
null
null
6
null
RHSA-2018:2943
Red Hat Security Advisory: java-1.8.0-openjdk security update
OpenJDK: Incorrect handling of unsigned attributes in signed Jar manifests (Security, 8194534) OpenJDK: Leak of sensitive header data via HTTP redirect (Networking, 8196902) OpenJDK: Incomplete enforcement of the trustURLCodebase restriction (JNDI, 8199177) OpenJDK: Improper field access checks (Hotspot, 8199226) OpenJDK: Missing endpoint identification algorithm check during TLS session resumption (JSSE, 8202613) OpenJDK: Unrestricted access to scripting engine (Scripting, 8202936) OpenJDK: Infinite loop in RIFF format reader (Sound, 8205361)
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
5.3
null
RHSA-2023:6122
Red Hat Security Advisory: Red Hat Advanced Cluster Management 2.8.3 security and bug fix updates
golang: html/template: improper handling of HTML-like comments within script contexts golang: html/template: improper handling of special tags within script contexts golang: crypto/tls: panic when processing post-handshake message on QUIC connections golang: crypto/tls: lack of a limit on buffered post-handshake golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487) HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack)
[ "cpe:/a:redhat:acm:2.8::el8" ]
null
7.5
null
null
RHSA-2024:1746
Red Hat Security Advisory: kernel security update
kernel: use-after-free in l2cap_connect and l2cap_le_connect_req in net/bluetooth/l2cap_core.c Kernel: bluetooth: Unauthorized management command execution kernel: net/sched: sch_hfsc UAF
[ "cpe:/o:redhat:rhel_aus:7.7::server" ]
null
7.8
null
null
RHSA-2022:6165
Red Hat Security Advisory: thunderbird security update
Mozilla: Address bar spoofing via XSLT error handling Mozilla: Cross-origin XSLT Documents would have inherited the parent's permissions Mozilla: Data race and potential use-after-free in PK11_ChangePW Mozilla: Memory safety bugs fixed in Firefox 104 and Firefox ESR 102.2 Mozilla: Memory safety bugs fixed in Firefox 104, Firefox ESR 102.2, and Firefox ESR 91.13
[ "cpe:/a:redhat:enterprise_linux:9::appstream" ]
null
8.8
7.5
null
RHSA-2020:4290
Red Hat Security Advisory: virt:8.1 and virt-devel:8.1 security update
QEMU: slirp: use-after-free in ip_reass() function in ip_input.c QEMU: usb: out-of-bounds r/w access issue while processing usb packets
[ "cpe:/a:redhat:advanced_virtualization:8.1::el8" ]
null
5
null
null
RHSA-2004:373
Red Hat Security Advisory: gnome-vfs security update
security flaw
[ "cpe:/o:redhat:enterprise_linux:3::as", "cpe:/o:redhat:enterprise_linux:3::desktop", "cpe:/o:redhat:enterprise_linux:3::es", "cpe:/o:redhat:enterprise_linux:3::ws" ]
null
null
null
null
RHSA-2020:5004
Red Hat Security Advisory: resource-agents security and bug fix update
python-httplib2: CRLF injection via an attacker controlled unescaped part of uri for httplib2.Http.request function
[ "cpe:/a:redhat:rhel_extras_sap:7", "cpe:/a:redhat:rhel_extras_sap_hana:7", "cpe:/o:redhat:enterprise_linux:7::server" ]
null
6.8
null
null
RHSA-2023:5043
Red Hat Security Advisory: flac security update
flac: Remote Code Execution (RCE) via the bitwriter_grow_ function, by supplying crafted input to the encoder
[ "cpe:/a:redhat:rhel_aus:8.2::appstream", "cpe:/a:redhat:rhel_e4s:8.2::appstream", "cpe:/a:redhat:rhel_tus:8.2::appstream" ]
null
7.8
null
null
RHSA-2020:5198
Red Hat Security Advisory: Red Hat OpenShift Jaeger security update
golang-github-miekg-dns: predictable TXID can lead to response forgeries golang.org/x/text: possibility to trigger an infinite loop in encoding/unicode could lead to crash
[ "cpe:/a:redhat:jaeger:1.20::el8" ]
null
7.5
null
null
RHSA-2010:0679
Red Hat Security Advisory: rpm security and bug fix update
rpm: fails to drop SUID/SGID bits on package upgrade
[ "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::client_workstation", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
RHSA-2022:5415
Red Hat Security Advisory: go-toolset-1.17 and go-toolset-1.17-golang security and bug fix update
golang: encoding/pem: fix stack overflow in Decode golang: regexp: stack exhaustion via a deeply nested expression golang: crypto/elliptic: panic caused by oversized scalar
[ "cpe:/a:redhat:devtools:2022" ]
null
7.5
null
null
RHSA-2025:2130
Red Hat Security Advisory: emacs security update
emacs: Shell Injection Vulnerability in GNU Emacs via Custom "man" URI Scheme
[ "cpe:/o:redhat:rhel_els:7" ]
null
8.8
null
null
RHBA-2022:0793
Red Hat Bug Fix Advisory: OpenShift Container Platform 4.8.34 packages update
cri-o: pod with access to 'hostIPC' and 'hostNetwork' kernel namespace allows sysctl from the list of safe sysctls to be applied to the host
[ "cpe:/a:redhat:openshift:4.8::el7", "cpe:/a:redhat:openshift:4.8::el8" ]
null
4.2
null
null
RHSA-2021:0282
Red Hat Security Advisory: OpenShift Container Platform 4.4.33 packages and security update
jenkins-2-plugins/subversion: XML parser is not preventing XML external entity (XXE) attacks jenkins-2-plugins/mercurial: XML parser is not preventing XML external entity (XXE) attacks
[ "cpe:/a:redhat:openshift:4.4::el7", "cpe:/a:redhat:openshift:4.4::el8" ]
null
6.5
null
null
RHSA-2020:1644
Red Hat Security Advisory: pki-core:10.6 and pki-deps:10.6 security, bug fix, and enhancement update
jackson-databind: Serialization gadgets in com.zaxxer.hikari.HikariConfig jackson-databind: Serialization gadgets in com.zaxxer.hikari.HikariDataSource jackson-databind: Serialization gadgets in org.apache.commons.dbcp.datasources.* jackson-databind: Serialization gadgets in com.p6spy.engine.spy.P6DataSource jackson-databind: Serialization gadgets in org.apache.log4j.receivers.db.* jackson-databind: lacks certain net.sf.ehcache blocking jackson-databind: Lacks certain xbean-reflect/JNDI blocking jackson-databind: Serialization gadgets in shaded-hikari-config jackson-databind: Serialization gadgets in ibatis-sqlmap jackson-databind: Serialization gadgets in anteros-core jackson-databind: mishandles the interaction between serialization gadgets and typing which could result in remote command execution jackson-databind: mishandles the interaction between serialization gadgets and typing which could result in remote command execution
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
8.1
8.1
null
RHSA-2024:1387
Red Hat Security Advisory: ovn22.03 security update
ovn: insufficient validation of BFD packets may lead to denial of service
[ "cpe:/o:redhat:enterprise_linux:8::fastdatapath" ]
null
6.5
null
null
RHSA-2015:1741
Red Hat Security Advisory: haproxy security update
haproxy: information leak in buffer_slow_realign()
[ "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
null
null
RHSA-2024:7461
Red Hat Security Advisory: cups-filters security update
cups-filters: libcupsfilters: `cfGetPrinterAttributes` API does not perform sanitization on returned IPP attributes cups: libppd: remote command injection via attacker controlled data in PPD file cups-browsed: cups-browsed binds on UDP INADDR_ANY:631 trusting any packet from any source cups-browsed: cups-filters: cups-browsed vulnerable to DDoS amplification attack
[ "cpe:/a:redhat:rhel_aus:8.2::appstream" ]
null
7.5
null
null
RHSA-2020:0729
Red Hat Security Advisory: Red Hat Data Grid 7.3.5 security update
jquery: Cross-site scripting via cross-domain ajax requests undertow: possible Denial Of Service (DOS) in Undertow HTTP server listening on HTTPS jackson-databind: Serialization gadgets in classes of the commons-configuration package jackson-databind: Serialization gadgets in classes of the xalan package jackson-databind: Serialization gadgets in com.zaxxer.hikari.HikariDataSource
[ "cpe:/a:redhat:jboss_data_grid:7.3" ]
null
null
7.5
null
RHSA-2022:4711
Red Hat Security Advisory: RHV Manager (ovirt-engine) [ovirt-4.5.0] security update
nodejs-ansi-regex: Regular expression denial of service (ReDoS) matching ANSI escape codes nodejs-trim-off-newlines: ReDoS via string processing nodejs-normalize-url: ReDoS for data URLs jquery-ui: XSS in the altField option of the datepicker widget jquery-ui: XSS in *Text options of the datepicker widget jquery-ui: XSS in the 'of' option of the .position() util
[ "cpe:/a:redhat:rhev_manager:4.4:el8" ]
null
6.5
null
null
RHSA-2023:0553
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.4.9 Security update
jquery: Cross-site scripting via cross-domain ajax requests bootstrap: XSS in the data-target attribute nodejs-moment: Regular expression denial of service bootstrap: Cross-site Scripting (XSS) in the collapse data-parent attribute bootstrap: Cross-site Scripting (XSS) in the data-target property of scrollspy bootstrap: Cross-site Scripting (XSS) in the data-container property of tooltip bootstrap: XSS in the tooltip or popover data-template attribute jquery: Prototype pollution in object's prototype leading to denial of service, remote code execution, or property injection jquery: Cross-site scripting due to improper injQuery.htmlPrefilter method jquery: Untrusted code execution via <option> tag in HTML passed to DOM manipulation methods wildfly-elytron: possible timing attacks via use of unsafe comparator jettison: parser crash by stackoverflow jettison: memory exhaustion via user-supplied XML or JSON data woodstox-core: woodstox to serialise XML data was vulnerable to Denial of Service attacks jackson-databind: deep wrapper array nesting wrt UNWRAP_SINGLE_VALUE_ARRAYS jackson-databind: use of deeply nested arrays mina-sshd: Java unsafe deserialization vulnerability jettison: If the value in map is the map's self, the new new JSONObject(map) cause StackOverflowError which may lead to dos CXF: SSRF Vulnerability
[ "cpe:/a:redhat:jboss_enterprise_application_platform:7.4::el8" ]
null
9.8
5.6
null
RHSA-2018:1414
Red Hat Security Advisory: firefox security update
Mozilla: Memory safety bugs fixed in Firefox 60 and Firefox ESR 52.8 Mozilla: Use-after-free with SVG animations and clip paths Mozilla: Use-after-free with SVG animations and text paths Mozilla: Same-origin bypass of PDF Viewer to view protected PDF files Mozilla: Malicious PDF can inject JavaScript into PDF Viewer Mozilla: Integer overflow and out-of-bounds write in Skia Mozilla: Lightweight themes can be installed without user interaction Mozilla: Buffer overflow during UTF-8 to Unicode string conversion through legacy extension Mozilla: Backport critical security fixes in Skia
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
9.8
null
RHSA-2023:0395
Red Hat Security Advisory: kernel security and bug fix update
kernel: tcp: fix page frag corruption on page fault kernel: memory corruption in AX88179_178A based USB ethernet device.
[ "cpe:/o:redhat:rhel_aus:8.2::baseos", "cpe:/o:redhat:rhel_e4s:8.2::baseos", "cpe:/o:redhat:rhel_tus:8.2::baseos" ]
null
7.8
null
null
RHSA-2024:6211
Red Hat Security Advisory: Red Hat OpenShift Service Mesh Containers for 2.6.1 security update
micromatch: vulnerable to Regular Expression Denial of Service braces: fails to limit the number of characters it can handle express: cause malformed URLs to be evaluated axios: axios: Server-Side Request Forgery
[ "cpe:/a:redhat:service_mesh:2.6::el8", "cpe:/a:redhat:service_mesh:2.6::el9" ]
null
7.5
null
null
RHSA-2013:1480
Red Hat Security Advisory: thunderbird security update
Mozilla: Miscellaneous memory safety hazards (rv:17.0.10) (MFSA 2013-93) Mozilla: Improperly initialized memory and overflows in some JavaScript functions (MFSA 2013-96) Mozilla: Use-after-free when updating offline cache (MFSA 2013-98) Mozilla: Miscellaneous use-after-free issues found through ASAN fuzzing (MFSA 2013-100) Mozilla: Miscellaneous use-after-free issues found through ASAN fuzzing (MFSA 2013-100) Mozilla: Miscellaneous use-after-free issues found through ASAN fuzzing (MFSA 2013-100) Mozilla: Memory corruption in workers (MFSA 2013-101) Mozilla: Access violation with XSLT and uninitialized data (MFSA 2013-95)
[ "cpe:/a:redhat:rhel_productivity:5", "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
null
null
RHSA-2014:1008
Red Hat Security Advisory: samba security and bug fix update
samba: remote code execution in nmbd
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
null
null
RHSA-2022:0072
Red Hat Security Advisory: kernel security update
kernel: fuse: fuse_do_getattr() calls make_bad_inode() in inappropriate situations
[ "cpe:/a:redhat:rhel_eus:8.2::crb", "cpe:/o:redhat:rhel_eus:8.2::baseos" ]
null
5.5
null
null
RHSA-2014:0355
Red Hat Security Advisory: ruby193-libyaml security update
libyaml: heap-based buffer overflow when parsing YAML tags libyaml: heap-based buffer overflow when parsing URLs
[ "cpe:/a:redhat:rhel_software_collections:1::el6" ]
null
null
null
null
RHSA-2024:10979
Red Hat Security Advisory: python3.11 security update
python: Virtual environment (venv) activation scripts don't quote paths
[ "cpe:/a:redhat:enterprise_linux:8::appstream", "cpe:/a:redhat:enterprise_linux:8::crb" ]
null
6.3
null
null