id
stringlengths 13
15
| title
stringlengths 29
176
| description
stringlengths 8
32.1k
| cpes
listlengths 0
20
| cvss_v4_0
null | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
null |
---|---|---|---|---|---|---|---|
RHSA-2016:0308
|
Red Hat Security Advisory: rabbitmq-server security and bugfix update
|
RabbitMQ: /api/... XSS vulnerability RabbitMQ: /api/definitions response splitting vulnerability
|
[
"cpe:/a:redhat:openstack:6::el7"
] | null | null | null | null |
RHSA-2023:5588
|
Red Hat Security Advisory: kernel-rt security and bug fix update
|
kernel: use-after-free in l2cap_connect and l2cap_le_connect_req in net/bluetooth/l2cap_core.c kernel: net/sched: Use-after-free vulnerabilities in the net/sched classifiers: cls_fw, cls_u32 and cls_route
|
[
"cpe:/a:redhat:rhel_tus:8.2::nfv",
"cpe:/a:redhat:rhel_tus:8.2::realtime"
] | null | 7.8 | null | null |
RHSA-2021:5046
|
Red Hat Security Advisory: thunderbird security update
|
Mozilla: Memory safety bugs fixed in Firefox 95 and Firefox ESR 91.4 Mozilla: JavaScript unexpectedly enabled for the composition area Mozilla: URL leakage when navigating while executing asynchronous function Mozilla: Heap buffer overflow when using structured clone Mozilla: Missing fullscreen and pointer lock notification when requesting both Mozilla: GC rooting failure when calling wasm instance methods Mozilla: External protocol handler parameters were unescaped Mozilla: XMLHttpRequest error codes could have leaked the existence of an external protocol handler Mozilla: Bypass of CSP sandbox directive when embedding Mozilla: Denial of Service when using the Location API in a loop Mozilla: Cursor spoofing could overlay user interface when native cursor is zoomed
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 5.4 | 6.1 | null |
RHSA-2001:115
|
Red Hat Security Advisory: : New Zope packages are available
|
security flaw
|
[
"cpe:/a:redhat:powertools:6.2",
"cpe:/a:redhat:powertools:7.0",
"cpe:/a:redhat:powertools:7.1"
] | null | null | null | null |
RHSA-2015:2695
|
Red Hat Security Advisory: qemu-kvm-rhev security update
|
Qemu: net: pcnet: heap overflow vulnerability in pcnet_receive Qemu: net: pcnet: buffer overflow in non-loopback mode
|
[
"cpe:/a:redhat:openstack:5::el6"
] | null | null | null | null |
RHSA-2024:1608
|
Red Hat Security Advisory: opencryptoki security update
|
opencryptoki: timing side-channel in handling of RSA PKCS#1 v1.5 padded ciphertexts (Marvin)
|
[
"cpe:/a:redhat:enterprise_linux:8::crb",
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 5.9 | null | null |
RHSA-2024:6786
|
Red Hat Security Advisory: firefox update
|
An update for firefox is now available for Red Hat Enterprise Linux 9.2 Extended Update Support.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
|
[
"cpe:/a:redhat:rhel_eus:9.2::appstream"
] | null | null | null | null |
RHSA-2024:2570
|
Red Hat Security Advisory: gnutls security update
|
gnutls: vulnerable to Minerva side-channel information leak gnutls: potential crash during chain building/verification
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/o:redhat:enterprise_linux:9::baseos"
] | null | 5 | null | null |
RHSA-2023:3596
|
Red Hat Security Advisory: thunderbird security update
|
Mozilla: Click-jacking certificate exceptions through rendering lag Mozilla: Memory safety bugs fixed in Firefox 114 and Firefox ESR 102.12
|
[
"cpe:/a:redhat:rhel_aus:8.4::appstream",
"cpe:/a:redhat:rhel_e4s:8.4::appstream",
"cpe:/a:redhat:rhel_tus:8.4::appstream"
] | null | 9.8 | null | null |
RHSA-2023:3360
|
Red Hat Security Advisory: apr-util security update
|
apr-util: out-of-bounds writes in the apr_base64
|
[
"cpe:/a:redhat:rhel_eus:8.4::appstream"
] | null | 6.5 | null | null |
RHSA-2020:0470
|
Red Hat Security Advisory: java-1.8.0-ibm security update
|
OpenJDK: Incorrect exception processing during deserialization in BeanContextSupport (Serialization, 8224909) OpenJDK: Incorrect isBuiltinStreamHandler check causing URL normalization issues (Networking, 8228548) OpenJDK: Serialization filter changes via jdk.serialFilter property modification (Serialization, 8231422) OpenJDK: Incomplete enforcement of maxDatagramSockets limit in DatagramChannelImpl (Networking, 8231795)
|
[
"cpe:/a:redhat:rhel_extras:7"
] | null | 3.7 | null | null |
RHSA-2022:0777
|
Red Hat Security Advisory: kernel security, bug fix, and enhancement update
|
kernel: Use After Free in unix_gc() which could result in a local privilege escalation kernel: use-after-free in RDMA listen() kernel: tcp: fix page frag corruption on page fault kernel: possible privileges escalation due to missing TLB flush kernel: remote stack overflow via kernel panic on systems using TIPC may lead to DoS kernel: missing check in ioctl allows kernel memory read/write kernel: failing usercopy allows for use-after-free exploitation
|
[
"cpe:/a:redhat:rhel_eus:8.4::crb",
"cpe:/o:redhat:rhel_eus:8.4::baseos"
] | null | 7 | null | null |
RHSA-2020:0942
|
Red Hat Security Advisory: runc security update
|
runc: volume mount race condition with shared mounts leads to information leak/integrity manipulation
|
[
"cpe:/a:redhat:rhel_extras_other:7"
] | null | 7 | null | null |
RHSA-2011:1100
|
Red Hat Security Advisory: icedtea-web security update
|
icedtea-web: home directory path disclosure to untrusted applications icedtea-web: Java Web Start security warning dialog manipulation
|
[
"cpe:/o:redhat:enterprise_linux:6::server"
] | null | null | null | null |
RHSA-2019:2545
|
Red Hat Security Advisory: Ansible security update
|
Ansible: disclosure data when prompted for password and template characters are passed
|
[
"cpe:/a:redhat:ansible_engine:2.6::el7"
] | null | null | 6.4 | null |
RHSA-2015:0848
|
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 6.4.0 update
|
CLI: Insecure default permissions on history file mod_jk: information leak due to incorrect JkMount/JkUnmount directives processing wss4j: Apache WSS4J is vulnerable to Bleichenbacher's attack (incomplete fix for CVE-2011-2487) wss4j: Apache WSS4J doesn't correctly enforce the requireSignedEncryptedDataElements property PicketLink: SP does not take Audience condition of a SAML assertion into account mod_cluster: JavaScript code injection is possible via MCMP mod_manager messages PicketLink: Lack of validation for the Destination attribute in a Response element in a SAML assertion
|
[
"cpe:/a:redhat:jboss_enterprise_application_platform:6::el7"
] | null | 6.3 | null | null |
RHSA-2009:1680
|
Red Hat Security Advisory: xpdf security update
|
xpdf: buffer overflow in FoFiType1::parse
|
[
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2024:3575
|
Red Hat Security Advisory: Red Hat build of Keycloak 24.0.5 enhancement and security update
|
keycloak: Unguarded admin REST API endpoints allows low privilege users to use administrative functionalities keycloak: exposure of sensitive information in Pushed Authorization Requests (PAR) KC_RESTART cookie
|
[
"cpe:/a:redhat:build_keycloak:22"
] | null | 7.5 | null | null |
RHSA-2019:3955
|
Red Hat Security Advisory: chromium-browser security update
|
chromium-browser: use-after-free in bluetooth chromium-browser: out-of-bounds access in bluetooth
|
[
"cpe:/a:redhat:rhel_extras:6"
] | null | null | 6.3 | null |
RHSA-2020:0679
|
Red Hat Security Advisory: OpenShift Container Platform 4.3.5 skopeo security update
|
proglottis/gpgme: Use-after-free in GPGME bindings during container image pull
|
[
"cpe:/a:redhat:openshift:4.3::el8"
] | null | 7.5 | null | null |
RHSA-2015:0999
|
Red Hat Security Advisory: qemu-kvm security update
|
qemu: fdc: out-of-bounds fifo buffer memory access
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | null | null |
RHSA-2024:7925
|
Red Hat Security Advisory: OpenShift Container Platform 4.17.1 packages and security update
|
Podman: Buildah: cri-o: FIPS Crypto-Policy Directory Mounting Issue in containers/common Go Library
|
[
"cpe:/a:redhat:openshift:4.17::el8",
"cpe:/a:redhat:openshift:4.17::el9"
] | null | 5.4 | null | null |
RHSA-2024:4262
|
Red Hat Security Advisory: linux-firmware security update
|
kernel: Reserved fields in guest message responses may not be zero initialized
|
[
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 4.4 | null | null |
RHSA-2023:6694
|
Red Hat Security Advisory: python-pip security update
|
python: tarfile module directory traversal
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/o:redhat:enterprise_linux:9::baseos"
] | null | 5.5 | null | null |
RHSA-2023:3151
|
Red Hat Security Advisory: thunderbird security update
|
Mozilla: Browser prompts could have been obscured by popups Mozilla: Crash in RLBox Expat driver Mozilla: Potential permissions request bypass via clickjacking Mozilla: Content process crash due to invalid wasm code Mozilla: Potential spoof due to obscured address bar Mozilla: Potential memory corruption in FileReader::DoReadData() Mozilla: Memory safety bugs fixed in Firefox 113 and Firefox ESR 102.11
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 8.8 | null | null |
RHSA-2003:314
|
Red Hat Security Advisory: postgresql security update
|
security flaw
|
[
"cpe:/o:redhat:enterprise_linux:2.1::as",
"cpe:/o:redhat:enterprise_linux:2.1::aw",
"cpe:/o:redhat:enterprise_linux:2.1::es",
"cpe:/o:redhat:enterprise_linux:2.1::ws"
] | null | null | null | null |
RHSA-2006:0328
|
Red Hat Security Advisory: firefox security update
|
security flaw Firefox Tag Order Vulnerability security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw
|
[
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2014:1880
|
Red Hat Security Advisory: java-1.7.1-ibm security update
|
JDK: privilege escalation via shared class cache SSL/TLS: Padding Oracle On Downgraded Legacy Encryption attack JDK: unspecified vulnerability fixed in 6u85, 7u71 and 8u25 (Deployment) JDK: unspecified vulnerability fixed in 7u71 and 8u25 (Deployment) OpenJDK: Triple Handshake attack against TLS/SSL connections (JSSE, 8037066) JDK: unspecified vulnerability fixed in 6u85, 7u71 and 8u25 (Deployment) JDK: unspecified vulnerability fixed in 7u71 and 8u25 (Deployment) JDK: unspecified vulnerability fixed in 6u85, 7u71 and 8u25 (Deployment) JDK: unspecified vulnerability fixed in 6u85, 7u71 and 8u25 (Deployment) OpenJDK: LogRecord use of incorrect CL when loading ResourceBundle (Libraries, 8042797) JDK: unspecified vulnerability fixed in 6u85, 7u71 and 8u25 (Deployment) OpenJDK: insufficient permission checks when setting resource bundle on system logger (Libraries, 8041564) ICU: Layout Engine ContextualSubstitution missing boundary checks (JDK 2D, 8041540) OpenJDK: DatagramSocket connected socket missing source check (Libraries, 8039509) JDK: unspecified vulnerability fixed in 6u85, 7u71 and 8u25 (Deployment) JDK: unspecified vulnerability fixed in 7u71 and 8u25 (Deployment) OpenJDK: insufficient ResourceBundle name check (Libraries, 8044274) JDK: unspecified vulnerability fixed in 6u85, 7u71 and 8u25 (Deployment) OpenJDK: CipherInputStream incorrect exception handling (Security, 8037846)
|
[
"cpe:/a:redhat:rhel_extras:6",
"cpe:/a:redhat:rhel_extras:7"
] | null | null | null | null |
RHSA-2019:2950
|
Red Hat Security Advisory: Red Hat JBoss Core Services Apache HTTP Server 2.4.29 SP3 security update
|
HTTP/2: 0-length headers lead to denial of service HTTP/2: request for large response leads to denial of service
|
[
"cpe:/a:redhat:jboss_core_services:1"
] | null | null | 7.5 | null |
RHSA-2012:0306
|
Red Hat Security Advisory: krb5 security and bug fix update
|
krb5-appl: ftpd incorrect group privilege dropping (MITKRB5-SA-2011-005)
|
[
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2020:1266
|
Red Hat Security Advisory: kernel security and bug fix update
|
kernel: heap overflow in mwifiex_update_vs_ie() function of Marvell WiFi driver
|
[
"cpe:/o:redhat:rhel_eus:7.5::computenode",
"cpe:/o:redhat:rhel_eus:7.5::server"
] | null | null | 8 | null |
RHSA-2014:0995
|
Red Hat Security Advisory: Red Hat Enterprise Linux OpenStack Platform 3.0 Retirement Notice
|
This is the final notification for the retirement of Red Hat Enterprise
Linux OpenStack Platform 3.0.
|
[] | null | null | null | null |
RHSA-2022:8971
|
Red Hat Security Advisory: usbguard security update
|
usbguard: Fix unauthorized access via D-Bus
|
[
"cpe:/a:redhat:rhel_eus:9.0::appstream"
] | null | 7.8 | null | null |
RHSA-2009:0013
|
Red Hat Security Advisory: avahi security update
|
avahi: avahi-daemon DoS (application abort) via packet with source port 0
|
[
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2022:0164
|
Red Hat Security Advisory: Red Hat Single Sign-On 7.5.1 for OpenShift image security and enhancement update
|
keycloak-server-spi-private: ECP SAML binding bypasses authentication flows Keycloak: Incorrect authorization allows unpriviledged users to create other users resteasy: Error message exposes endpoint class information xml-security: XPath Transform abuse allows for information disclosure
|
[
"cpe:/a:redhat:rhosemc:1.0::el8"
] | null | 7.5 | null | null |
RHSA-2016:0045
|
Red Hat Security Advisory: kernel security update
|
kernel: net: incorrect processing of checksums in UDP implementation kernel: net: incorrect processing of checksums in UDP implementation
|
[
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2013:1198
|
Red Hat Security Advisory: openstack-cinder security update
|
OpenStack: Cinder LVM volume driver does not support secure deletion OpenStack: Cinder Denial of Service using XML entities
|
[
"cpe:/a:redhat:openstack:3::el6"
] | null | null | null | null |
RHSA-2013:1514
|
Red Hat Security Advisory: spacewalk-java security update
|
Satellite: Interface to create the initial administrator user remains open after installation
|
[
"cpe:/a:redhat:network_satellite:5.3::el5",
"cpe:/a:redhat:network_satellite:5.4::el5",
"cpe:/a:redhat:network_satellite:5.4::el6",
"cpe:/a:redhat:network_satellite:5.5::el5",
"cpe:/a:redhat:network_satellite:5.5::el6",
"cpe:/a:redhat:network_satellite:5.6::el5",
"cpe:/a:redhat:network_satellite:5.6::el6"
] | null | null | null | null |
RHSA-2024:0851
|
Red Hat Security Advisory: kpatch-patch security update
|
kernel: use-after-free in sch_qfq network scheduler kernel: ktls overwrites readonly memory pages when using function splice with a ktls socket as destination
|
[
"cpe:/o:redhat:rhel_eus:8.6::baseos"
] | null | 7 | null | null |
RHSA-2020:5344
|
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.3.4 security update
|
hibernate-core: SQL injection vulnerability when both hibernate.use_sql_comments and JPQL String literals are used wildfly-openssl: memory leak per HTTP session creation in WildFly OpenSSL jackson-databind: FasterXML DOMDeserializer insecure entity expansion is vulnerable to XML external entity (XXE)
|
[
"cpe:/a:redhat:jboss_enterprise_application_platform:7.3"
] | null | 7.5 | null | null |
RHSA-2013:0506
|
Red Hat Security Advisory: samba4 security, bug fix and enhancement update
|
samba: Multiple heap-based buffer overflows in memory management based on NDR marshalling code output
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2017:0270
|
Red Hat Security Advisory: kernel security and bug fix update
|
kernel: Use-after-free in the recvmmsg exit path
|
[
"cpe:/o:redhat:rhel_eus:7.1::computenode",
"cpe:/o:redhat:rhel_eus:7.1::server"
] | null | null | 8.1 | null |
RHSA-2023:0353
|
Red Hat Security Advisory: OpenJDK 11.0.18 Security Update for Windows Builds
|
OpenJDK: handshake DoS attack against DTLS connections (JSSE, 8287411) OpenJDK: soundbank URL remote loading (Sound, 8293742)
|
[
"cpe:/a:redhat:openjdk:11::windows"
] | null | 3.7 | null | null |
RHSA-2024:3762
|
Red Hat Security Advisory: Red Hat AMQ Broker 7.11.7 release and security update
|
JSON-java: parser confusion leads to OOM keycloak: path transversal in redirection validation
|
[
"cpe:/a:redhat:amq_broker:7.11"
] | null | 8.1 | null | null |
RHSA-2003:212
|
Red Hat Security Advisory: : : : Updated glibc packages fix vulnerabilities
|
security flaw security flaw security flaw security flaw
|
[
"cpe:/o:redhat:linux:7.1"
] | null | null | null | null |
RHSA-2020:5437
|
Red Hat Security Advisory: kernel security and bug fix update
|
kernel: The flow_dissector feature allows device tracking kernel: Buffer over-read in crypto_authenc_extractkeys() when a payload longer than 4 bytes is not aligned. kernel: buffer uses out of index in ext3/4 filesystem kernel: metadata validator in XFS may cause an inode with a valid, user-creatable extended attribute to be flagged as corrupt kernel: umask not applied on filesystem without ACL support kernel: TOCTOU mismatch in the NFS client code kernel: improper input validation in ppp_cp_parse_cr function leads to memory corruption and read overflow
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 7.2 | null | null |
RHSA-2020:3808
|
Red Hat Security Advisory: OpenShift Container Platform 4.3.38 jenkins and openshift security update
|
jetty: double release of resource can lead to information disclosure jenkins: Stored XSS vulnerability in job build time trend jenkins: Stored XSS vulnerability in upstream cause jenkins: Stored XSS vulnerability in 'keep forever' badge icons jenkins: Stored XSS vulnerability in console links jenkins: user-specified tooltip values leads to stored cross-site scripting jenkins: stored XSS vulnerability in project naming strategy jenkins: stored XSS vulnerability in 'trigger builds remotely' kubernetes: Node disk DOS by writing to container /etc/hosts
|
[
"cpe:/a:redhat:openshift:4.3::el7",
"cpe:/a:redhat:openshift:4.3::el8"
] | null | 5.5 | null | null |
RHSA-2020:1653
|
Red Hat Security Advisory: zziplib security update
|
zziplib: directory traversal in unzzip_cat in the bins/unzzipcat-mem.c
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb"
] | null | null | 5.5 | null |
RHSA-2010:0054
|
Red Hat Security Advisory: openssl security update
|
deprecate MD2 in SSL cert validation (Kaminsky) openssl significant memory leak in certain SSLv3 requests (DoS)
|
[
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2018:0025
|
Red Hat Security Advisory: qemu-kvm-rhev security update
|
An update for qemu-kvm-rhev is now available for RHEV 4.X, RHEV-H, and Agents for Red Hat Enterprise Linux 7.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
|
[
"cpe:/o:redhat:enterprise_linux:7::hypervisor"
] | null | null | null | null |
RHSA-2023:3840
|
Red Hat Security Advisory: sqlite security update
|
sqlite: Crash due to misuse of window functions.
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 6.2 | null | null |
RHSA-2013:0499
|
Red Hat Security Advisory: xinetd security and bug fix update
|
xinetd: enables unintentional services over tcpmux port
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2013:1218
|
Red Hat Security Advisory: xml-security security update
|
Java: XML signature spoofing
|
[
"cpe:/a:redhat:jboss_enterprise_application_platform:5.2.0"
] | null | null | null | null |
RHSA-2017:0935
|
Red Hat Security Advisory: tomcat security update
|
tomcat: HTTP Request smuggling vulnerability due to permitting invalid character in HTTP requests tomcat: information disclosure due to incorrect Processor sharing
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 7.5 | null |
RHSA-2020:3382
|
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 6.4 security update
|
tomcat: multiple requests with invalid payload length in a WebSocket frame could lead to DoS
|
[
"cpe:/a:redhat:jboss_enterprise_application_platform:6.4"
] | null | 7.5 | null | null |
RHSA-2024:4252
|
Red Hat Security Advisory: nghttp2 security update
|
nghttp2: CONTINUATION frames DoS
|
[
"cpe:/a:redhat:enterprise_linux:8::crb",
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 5.3 | null | null |
RHSA-2017:1791
|
Red Hat Security Advisory: java-1.7.0-oracle security update
|
OpenJDK: reading of unprocessed image data in JPEGImageReader (2D, 8169209) OpenJDK: JAR verifier incorrect handling of missing digest (Security, 8169392) OpenJDK: integer overflows in range check loop predicates (Hotspot, 8173770) OpenJDK: incorrect bracket processing in function signature handling (Hotspot, 8170966) JDK: unspecified vulnerability fixed in 7u151 and 8u141 (JavaFX) OpenJDK: insufficient access control checks in ThreadPoolExecutor (Libraries, 8172204) OpenJDK: insufficient access control checks in ServiceRegistry (ImageIO, 8172461) OpenJDK: insufficient access control checks in AsynchronousChannelGroupImpl (8172465, Libraries) OpenJDK: insufficient access control checks in XML transformations (JAXP, 8172469) OpenJDK: unrestricted access to com.sun.org.apache.xml.internal.resolver (JAXP, 8173286) OpenJDK: incorrect handling of references in DGC (RMI, 8163958) JDK: unspecified vulnerability fixed in 6u161, 7u151, and 8u141 (Deployment) OpenJDK: insufficient access control checks in ActivationID (RMI, 8173697) OpenJDK: unbounded memory allocation in BasicAttribute deserialization (Serialization, 8174105) OpenJDK: unbounded memory allocation in CodeSource deserialization (Serialization, 8174113) OpenJDK: insufficient access control checks in ImageWatched (AWT, 8174098) JDK: unspecified vulnerability fixed in 7u151 and 8u141 (JavaFX) OpenJDK: DSA implementation timing attack (JCE, 8175106) OpenJDK: LDAPCertStore following referrals to non-LDAP URLs (Security, 8176067) OpenJDK: ECDSA implementation timing attack (JCE, 8175110) OpenJDK: PKCS#8 implementation timing attack (JCE, 8176760) OpenJDK: incorrect handling of certain EC points (Security, 8178135) OpenJDK: incorrect key size constraint check (Security, 8179101) OpenJDK: incorrect enforcement of certificate path restrictions (Security, 8179998) OpenJDK: insecure XML parsing in wsdlimport (JAX-WS, 8182054)
|
[
"cpe:/a:redhat:rhel_extras_oracle_java:6",
"cpe:/a:redhat:rhel_extras_oracle_java:7"
] | null | null | 6.5 | null |
RHSA-2021:2532
|
Red Hat Security Advisory: Red Hat OpenShift Jaeger 1.17.9 security update
|
golang: math/big: panic during recursive division of very large numbers golang: crypto/elliptic: incorrect operations on the P-224 curve
|
[
"cpe:/a:redhat:jaeger:1.17::el8"
] | null | 6.5 | null | null |
RHSA-2022:0622
|
Red Hat Security Advisory: kernel-rt security and bug fix update
|
kernel: out of bounds write in hid-multitouch.c may lead to escalation of privilege kernel: use after free in eventpoll.c may lead to escalation of privilege kernel: Use After Free in unix_gc() which could result in a local privilege escalation kernel: double free in bluetooth subsystem when the HCI device initialization fails kernel: use-after-free in function hci_sock_bound_ioctl() kernel: possible use-after-free in bluetooth module kernel: xfs: raw block device data leak in XFS_IOC_ALLOCSP IOCTL kernel: possible privileges escalation due to missing TLB flush kernel: failing usercopy allows for use-after-free exploitation
|
[
"cpe:/a:redhat:rhel_extras_rt:7"
] | null | 7 | null | null |
RHSA-2024:3305
|
Red Hat Security Advisory: varnish:6 security update
|
varnish: HTTP/2 Broken Window Attack may result in denial of service
|
[
"cpe:/a:redhat:rhel_eus:8.8::appstream"
] | null | 7.5 | null | null |
RHSA-2023:2951
|
Red Hat Security Advisory: kernel security, bug fix, and enhancement update
|
hw: cpu: AMD CPUs may transiently execute beyond unconditional direct branch kernel: malicious data for FBIOPUT_VSCREENINFO ioctl may cause OOB write memory kernel: when setting font with malicious data by ioctl PIO_FONT, kernel will write memory out of bounds kernel: mm/slub: actually fix freelist pointer vs redzoning kernel: net: stmmac: fix tc flower deletion for VLAN priority Rx steering kernel: possible race condition in drivers/tty/tty_buffers.c kernel: use-after-free in ath9k_htc_probe_device() could cause an escalation of privileges kernel: KVM: NULL pointer dereference in kvm_mmu_invpcid_gva kernel: KVM: nVMX: missing IBPB when exiting from nested guest can lead to Spectre v2 attacks kernel: netfilter: nf_conntrack_irc message handling issue kernel: race condition in xfrm_probe_algs can lead to OOB read/write kernel: media: em28xx: initialize refcount before kref_get kernel: race condition in hugetlb_no_page() in mm/hugetlb.c kernel: memory leak in ipv6_renew_options() kernel: use-after-free caused by l2cap_reassemble_sdu() in net/bluetooth/l2cap_core.c kernel: data races around icsk->icsk_af_ops in do_ipv6_setsockopt kernel: data races around sk->sk_prot kernel: memory leak in l2cap_recv_acldata of the file net/bluetooth/l2cap_core.c kernel: denial of service in follow_page_pte in mm/gup.c due to poisoned pte entry kernel: use-after-free after failed devlink reload in devlink_param_get kernel: USB-accessible buffer overflow in brcmfmac kernel: Double-free in split_2MB_gtt_entry when function intel_gvt_dma_map_guest_page failed kernel: l2tp: missing lock when clearing sk_user_data can lead to NULL pointer dereference kernel: Recursive locking violation in usb-storage that can cause the kernel to deadlock kernel: igmp: use-after-free in ip_check_mc_rcu when opening and closing inet sockets kernel: Executable Space Protection Bypass kernel: Unprivileged users may use PTRACE_SEIZE to set PTRACE_O_SUSPEND_SECCOMP option kernel: xfrm_expand_policies() in net/xfrm/xfrm_policy.c can cause a refcount to be dropped twice kernel: unmap_mapping_range() race with munmap() on VM_PFNMAP mappings leads to stale TLB entry kernel: TLB flush operations are mishandled in certain KVM_VCPU_PREEMPTED leading to guest malfunctioning kernel: Report vmalloc UAF in dvb-core/dmxdev kernel: u8 overflow problem in cfg80211_update_notlisted_nontrans() kernel: use-after-free related to leaf anon_vma double reuse kernel: use-after-free in bss_ref_get in net/wireless/scan.c kernel: BSS list corruption in cfg80211_add_nontrans_list in net/wireless/scan.c kernel: Denial of service in beacon protection for P2P-device kernel: memory corruption in usbmon driver kernel: NULL pointer dereference in traffic control subsystem kernel: scsi: mpt3sas: Fix use-after-free warning kernel: regmap: spi: Reserve space for register address/padding kernel: net/mlx5e: IPoIB, Block PKEY interfaces with less rx queues than parent kernel: net/mlx5: Fix command stats access after free kernel: ASoC: soc-pcm: Add NULL check in BE reparenting kernel: hwmon: (coretemp) Check for null before removing sysfs attrs kernel: iommu/arm-smmu-v3: check return value after calling platform_get_resource() kernel: iommu/arm-smmu: fix possible null-ptr-deref in arm_smmu_device_probe() kernel: rtw89: cfo: check mac_id to avoid out-of-bounds kernel: udp: Fix a data-race around sysctl_udp_l3mdev_accept. kernel: iavf: Fix handling of dummy receive descriptors kernel: vlan: fix memory leak in vlan_newlink() kernel: drm/i915: fix a possible refcount leak in intel_dp_add_mst_connector() kernel: i2c: piix4: Fix a memory leak in the EFCH MMIO support kernel: NULL pointer dereference in rawv6_push_pending_frames kernel: net/ulp: use-after-free in listening ULP sockets kernel: netfilter: NULL pointer dereference in nf_tables due to zeroed list head kernel: use-after-free caused by invalid pointer hostname in fs/cifs/connect.c kernel: Soft lockup occurred during __page_mapcount Kernel: NULL pointer dereference problem in sctp_sched_dequeue_common kernel: drm/virtio: improper return value check in virtio_gpu_object_shmem_init() kernel: slab-out-of-bounds read vulnerabilities in cbq_classify
|
[
"cpe:/a:redhat:enterprise_linux:8::crb",
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 4.2 | null | null |
RHSA-2004:638
|
Red Hat Security Advisory: gd security update
|
gd: additional overflows security flaw
|
[
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws"
] | null | null | null | null |
RHSA-2019:3011
|
Red Hat Security Advisory: Red Hat Virtualization security, bug fix, and enhancement update
|
kernel: hw: Spectre SWAPGS gadget vulnerability
|
[
"cpe:/o:redhat:enterprise_linux:7::hypervisor"
] | null | null | 5.9 | null |
RHSA-2023:0671
|
Red Hat Security Advisory: tigervnc security update
|
xorg-x11-server: DeepCopyPointerClasses use-after-free leads to privilege elevation
|
[
"cpe:/a:redhat:rhel_aus:8.2::appstream",
"cpe:/a:redhat:rhel_e4s:8.2::appstream",
"cpe:/a:redhat:rhel_tus:8.2::appstream"
] | null | 7.8 | null | null |
RHSA-2023:0601
|
Red Hat Security Advisory: thunderbird security update
|
Mozilla: Revocation status of S/Mime signature certificates was not checked
|
[
"cpe:/a:redhat:rhel_e4s:8.1::appstream"
] | null | 7.5 | null | null |
RHSA-2024:10700
|
Red Hat Security Advisory: Red Hat Build of Apache Camel 4.8 for Spring Boot security update.
|
kafka-clients: privilege escalation to filesystem read-access via automatic ConfigProvider org.springframework:spring-webmvc: Path traversal vulnerability in functional web frameworks
|
[
"cpe:/a:redhat:apache_camel_spring_boot:4.8"
] | null | 7.5 | null | null |
RHSA-2020:3876
|
Red Hat Security Advisory: libvpx security update
|
libvpx: Denial of service in mediaserver libvpx: Out of bounds read in vp8_norm table libvpx: Use-after-free in vp8_deblock() in vp8/common/postproc.c libvpx: Out of bounds read in vp8_decode_frame in decodeframe.c
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 7.5 | 5.5 | null |
RHSA-2023:5432
|
Red Hat Security Advisory: thunderbird security update
|
firefox: use-after-free in workers Mozilla: Out-of-bounds write in PathOps Mozilla: Use-after-free in Ion Compiler Mozilla: Memory safety bugs fixed in Firefox 118, Firefox ESR 115.3, and Thunderbird 115.3 libvpx: Heap buffer overflow in vp8 encoding in libvpx
|
[
"cpe:/a:redhat:rhel_aus:8.2::appstream",
"cpe:/a:redhat:rhel_e4s:8.2::appstream",
"cpe:/a:redhat:rhel_tus:8.2::appstream"
] | null | 8.8 | null | null |
RHSA-2024:3307
|
Red Hat Security Advisory: tomcat security and bug fix update
|
Tomcat: WebSocket DoS with incomplete closing handshake Tomcat: HTTP/2 header handling DoS
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 7.5 | null | null |
RHSA-2003:199
|
Red Hat Security Advisory: : Updated unzip packages fix trojan vulnerability
|
security flaw
|
[
"cpe:/o:redhat:linux:7.1",
"cpe:/o:redhat:linux:7.2",
"cpe:/o:redhat:linux:7.3",
"cpe:/o:redhat:linux:8.0",
"cpe:/o:redhat:linux:9"
] | null | null | null | null |
RHSA-2024:2973
|
Red Hat Security Advisory: libX11 security update
|
libX11: out-of-bounds memory access in _XkbReadKeySyms() libX11: stack exhaustion from infinite recursion in PutSubImage() libX11: integer overflow in XCreateImage() leading to a heap overflow
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 7.8 | null | null |
RHSA-2022:6269
|
Red Hat Security Advisory: convert2rhel security, bug fix, and enhancement update
|
convert2rhel: Activation key passed via command line by code
|
[
"cpe:/a:redhat:convert2rhel::el8"
] | null | 5.5 | null | null |
RHSA-2008:0131
|
Red Hat Security Advisory: netpbm security update
|
netpbm: GIF handling buffer overflow in giftopnm
|
[
"cpe:/o:redhat:enterprise_linux:2.1::as",
"cpe:/o:redhat:enterprise_linux:2.1::aw",
"cpe:/o:redhat:enterprise_linux:2.1::es",
"cpe:/o:redhat:enterprise_linux:2.1::ws",
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws",
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2022:5664
|
Red Hat Security Advisory: OpenShift Container Platform 4.10.24 bug fix and security update
|
openshift: oauth-serving-cert configmap contains cluster certificate private key
|
[
"cpe:/a:redhat:openshift:4.10::el8"
] | null | 7.7 | null | null |
RHSA-2019:1152
|
Red Hat Security Advisory: python-jinja2 security update
|
python-jinja2: str.format_map allows sandbox escape
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | null | 9 | null |
RHSA-2020:4348
|
Red Hat Security Advisory: java-1.8.0-openjdk security update
|
OpenJDK: High memory usage during deserialization of Proxy class with many interfaces (Serialization, 8236862) OpenJDK: Credentials sent over unencrypted LDAP connection (JNDI, 8237990) OpenJDK: Certificate blacklist bypass via alternate certificate encodings (Libraries, 8237995) OpenJDK: Integer overflow leading to out-of-bounds access (Hotspot, 8241114) OpenJDK: Missing permission check in path to URI conversion (Libraries, 8242680) OpenJDK: Incomplete check for invalid characters in URI to path conversion (Libraries, 8242685) OpenJDK: Race condition in NIO Buffer boundary checks (Libraries, 8244136)
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | 5.3 | null | null |
RHSA-2020:2639
|
Red Hat Security Advisory: gnutls security update
|
gnutls: session resumption works without master key allowing MITM
|
[
"cpe:/a:redhat:rhel_e4s:8.0::appstream",
"cpe:/o:redhat:rhel_e4s:8.0::baseos"
] | null | 7.4 | null | null |
RHSA-2010:0839
|
Red Hat Security Advisory: kernel security and bug fix update
|
kernel: io_submit_one() NULL ptr deref kernel: do_io_submit() infoleak kernel: xfs: XFS_IOC_FSGETXATTR ioctl memory leak kernel panic via futex kernel: thinkpad-acpi: lock down video output state access kernel: net/sched/act_police.c infoleak
|
[
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2024:1423
|
Red Hat Security Advisory: libreoffice security update
|
libreoffice: Improper Input Validation leading to arbitrary gstreamer plugin execution libreoffice: Insufficient macro permission validation leading to macro execution
|
[
"cpe:/a:redhat:rhel_eus:9.0::appstream",
"cpe:/a:redhat:rhel_eus:9.0::crb"
] | null | 8.3 | null | null |
RHSA-2019:3754
|
Red Hat Security Advisory: sudo security update
|
sudo: Privilege escalation via 'Runas' specification with 'ALL' keyword
|
[
"cpe:/o:redhat:rhel_aus:6.6::server"
] | null | null | 7 | null |
RHSA-2014:0433
|
Red Hat Security Advisory: kernel security, bug fix, and enhancement update
|
Kernel: net: tcp: potential DoS via SYN+FIN messages Kernel: HID: memory corruption flaw
|
[
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2014:2020
|
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 6.3.2 security update
|
CXF: SSL hostname verification bypass, incomplete CVE-2012-5783 fix CXF: SSL hostname verification bypass, incomplete CVE-2012-6153 fix CXF: Improper security semantics enforcement of SAML SubjectConfirmation methods
|
[
"cpe:/a:redhat:jboss_enterprise_application_platform:6.3"
] | null | null | 4.8 | null |
RHSA-2022:1540
|
Red Hat Security Advisory: xmlrpc-c security update
|
expat: Malformed 2- and 3-byte UTF-8 sequences can lead to arbitrary code execution
|
[
"cpe:/a:redhat:rhel_eus:8.2::crb",
"cpe:/o:redhat:rhel_eus:8.2::baseos"
] | null | 9.8 | null | null |
RHSA-2016:0087
|
Red Hat Security Advisory: qemu-kvm-rhev security update
|
Qemu: ide: ahci use-after-free vulnerability in aio port commands Qemu: nvram: OOB r/w access in processing firmware configurations
|
[
"cpe:/a:redhat:openstack:6::el7"
] | null | null | null | null |
RHSA-2018:3795
|
Red Hat Security Advisory: flash-plugin security update
|
flash-plugin: Arbitrary Code Execution vulnerability (APSB18-42)
|
[
"cpe:/a:redhat:rhel_extras:6"
] | null | null | 8.8 | null |
RHSA-2024:2063
|
Red Hat Security Advisory: yajl security update
|
yajl: heap-based buffer overflow when handling large inputs due to an integer overflow yajl: Memory leak in yajl_tree_parse function
|
[
"cpe:/a:redhat:rhel_eus:8.6::appstream",
"cpe:/a:redhat:rhel_eus:8.6::crb"
] | null | 6.5 | null | null |
RHSA-2014:0380
|
Red Hat Security Advisory: flash-plugin security update
|
flash-plugin: two flaws leading to code execution (APSB14-09) flash-plugin: two flaws leading to code execution (APSB14-09) flash-plugin: information disclosure flaw (APSB14-09) flash-plugin: cross-site scripting flaw (APSB14-09)
|
[
"cpe:/a:redhat:rhel_extras:5::client",
"cpe:/a:redhat:rhel_extras:5::server",
"cpe:/a:redhat:rhel_extras:6"
] | null | null | null | null |
RHSA-2021:0298
|
Red Hat Security Advisory: thunderbird security update
|
Mozilla: IMAP Response Injection when using STARTTLS Mozilla: HTTPS pages could have been intercepted by a registered service worker when they should not have been Mozilla: Cross-origin information leakage via redirected PDF requests Mozilla: Type confusion when using logical assignment operators in JavaScript switch statements Mozilla: Use-after-poison for incorrectly redeclared JavaScript variables during GC Mozilla: Memory safety bugs fixed in Firefox 85 and Firefox ESR 78.7
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 8.8 | 6.1 | null |
RHSA-2025:3863
|
Red Hat Security Advisory: Red Hat multicluster global hub 1.3.3 bug fixes and container update
|
golang.org/x/oauth2/jws: Unexpected memory consumption during token parsing in golang.org/x/oauth2/jws golang.org/x/crypto/ssh: Denial of Service in the Key Exchange of golang.org/x/crypto/ssh
|
[
"cpe:/a:redhat:multicluster_globalhub:1.3::el9"
] | null | 7.5 | null | null |
RHSA-2002:288
|
Red Hat Security Advisory: : Updated MySQL packages fix various security issues
|
security flaw security flaw security flaw security flaw
|
[
"cpe:/o:redhat:linux:7.0",
"cpe:/o:redhat:linux:7.1",
"cpe:/o:redhat:linux:7.2",
"cpe:/o:redhat:linux:7.3",
"cpe:/o:redhat:linux:8.0"
] | null | null | null | null |
RHSA-2022:5263
|
Red Hat Security Advisory: qemu-kvm security and bug fix update
|
QEMU: virtio-net: map leaking on error during receive QEMU: vhost-vsock: missing virtqueue detach on error can lead to memory leak
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 2.5 | null | null |
RHSA-2014:0289
|
Red Hat Security Advisory: flash-plugin security update
|
flash-plugin: same origin policy bypass (APSB14-08) flash-plugin: exposure of clipboard contents (APSB14-08)
|
[
"cpe:/a:redhat:rhel_extras:5::client",
"cpe:/a:redhat:rhel_extras:5::server",
"cpe:/a:redhat:rhel_extras:6"
] | null | null | null | null |
RHSA-2001:084
|
Red Hat Security Advisory: Kernel
|
security flaw
|
[
"cpe:/o:redhat:linux:7.1"
] | null | null | null | null |
RHSA-2024:7374
|
Red Hat Security Advisory: Security update for service-interconnect rhel9 container images
|
curl: HTTP/2 push headers memory-leak pypa/setuptools: Remote code execution via download functions in the package_index module in pypa/setuptools cpython: python: email module doesn't properly quotes newlines in email headers, allowing header injection glib2: Signal subscription vulnerabilities krb5: GSS message token handling krb5: GSS message token handling
|
[
"cpe:/a:redhat:service_interconnect:1::el9"
] | null | 6.5 | null | null |
RHSA-2018:0104
|
Red Hat Security Advisory: qemu-kvm security update
|
An update for qemu-kvm is now available for Red Hat Enterprise Linux 6.6 Advanced Update Support and Red Hat Enterprise Linux 6.6 Telco Extended Update Support.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
|
[
"cpe:/o:redhat:rhel_aus:6.6::server",
"cpe:/o:redhat:rhel_tus:6.6::server"
] | null | null | null | null |
RHSA-2010:0812
|
Red Hat Security Advisory: thunderbird security update
|
Firefox race condition flaw (MFSA 2010-73)
|
[
"cpe:/a:redhat:rhel_productivity:5",
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws",
"cpe:/o:redhat:enterprise_linux:5::client"
] | null | null | null | null |
RHSA-2022:5053
|
Red Hat Security Advisory: log4j security update
|
log4j: deserialization of untrusted data in SocketServer
|
[
"cpe:/o:redhat:rhel_els:6"
] | null | 9.8 | null | null |
RHSA-2020:3662
|
Red Hat Security Advisory: php:7.3 security, bug fix, and enhancement update
|
php: Out-of-bounds read due to integer overflow in iconv_mime_decode_headers() php: Buffer over-read in exif_read_data() php: Heap buffer over-read in exif_scan_thumbnail() php: Heap buffer over-read in exif_process_user_comment() php: DirectoryIterator class accepts filenames with embedded \0 byte and treats them as terminating at that byte php: Information disclosure in exif_read_data() php: Integer wraparounds when receiving multipart forms php: Out of bounds read when parsing EXIF information oniguruma: Use-after-free in onig_new_deluxe() in regext.c oniguruma: NULL pointer dereference in match_at() in regexec.c oniguruma: Stack exhaustion in regcomp.c because of recursion in regparse.c oniguruma: Heap-based buffer over-read in function gb18030_mbc_enc_len in file gb18030.c oniguruma: Heap-based buffer over-read in function fetch_interval_quantifier in regparse.c oniguruma: Heap-based buffer overflow in str_lower_case_match in regexec.c pcre: Out of bounds read in JIT mode when \X is used in non-UTF mode php: Out of bounds read in php_strip_tags_ex php: Global buffer-overflow in mbfl_filt_conv_big5_wchar function php: NULL pointer dereference in PHP session upload progress php: Files added to tar with Phar::buildFromIterator have all-access permissions php: Information disclosure in exif_read_data() function php: Using mb_strtolower() function with UTF-32LE encoding leads to potential code execution php: Information disclosure in function get_headers
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 4.3 | 6.5 | null |
RHSA-2024:1456
|
Red Hat Security Advisory: OpenShift Container Platform 4.13.38 packages and security update
|
golang-protobuf: encoding/protojson, internal/encoding/json: infinite loop in protojson.Unmarshal when unmarshaling certain forms of invalid JSON jose-go: improper handling of highly compressed data
|
[
"cpe:/a:redhat:openshift:4.13::el8",
"cpe:/a:redhat:openshift:4.13::el9"
] | null | 4.3 | null | null |
RHSA-2018:3423
|
Red Hat Security Advisory: qemu-kvm security update
|
hw: cpu: speculative store bypass
|
[
"cpe:/o:redhat:rhel_aus:7.2::server",
"cpe:/o:redhat:rhel_e4s:7.2::server",
"cpe:/o:redhat:rhel_tus:7.2::server"
] | null | null | 5.6 | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.