id
stringlengths 13
15
| title
stringlengths 29
176
| description
stringlengths 8
32.1k
| cpes
listlengths 0
20
| cvss_v4_0
null | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
null |
---|---|---|---|---|---|---|---|
RHSA-2024:9545
|
Red Hat Security Advisory: webkit2gtk3 security update
|
webkitgtk: webkit2gtk: Processing maliciously crafted web content may lead to an unexpected process crash webkitgtk: webkit2gtk: Processing maliciously crafted web content may prevent Content Security Policy from being enforced
|
[
"cpe:/a:redhat:rhel_eus:9.4::appstream"
] | null | 5.4 | null | null |
RHSA-2019:1862
|
Red Hat Security Advisory: Red Hat OpenShift Enterprise one-month end-of-life notice
|
This is the one-month notification for the end of the maintenance phase for Red Hat OpenShift Enterprise 3.6 and 3.7. This notification applies only to customers with subscriptions for Red Hat OpenShift Enterprise 3.6 and 3.7.
|
[
"cpe:/a:redhat:openshift:3.6::el7",
"cpe:/a:redhat:openshift:3.7::el7"
] | null | null | null | null |
RHSA-2024:2966
|
Red Hat Security Advisory: ghostscript security update
|
ghostscript: Divide by zero in eps_print_page in gdevepsn.c
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb"
] | null | 6.5 | null | null |
RHSA-2018:2732
|
Red Hat Security Advisory: spice-gtk and spice-server security update
|
spice: Missing check in demarshal.py:write_validate_array_item() allows for buffer overflow and denial of service
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | 8.3 | null |
RHSA-2010:0606
|
Red Hat Security Advisory: kernel security and bug fix update
|
kernel: cifs: Fix a kernel BUG with remote OS/2 server kernel: nfsd4: bug in read_buf
|
[
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2004:244
|
Red Hat Security Advisory: tripwire security update
|
security flaw
|
[
"cpe:/o:redhat:enterprise_linux:2.1::as",
"cpe:/o:redhat:enterprise_linux:2.1::es",
"cpe:/o:redhat:enterprise_linux:2.1::ws"
] | null | null | null | null |
RHSA-2019:3872
|
Red Hat Security Advisory: kernel security update
|
hw: Intel GPU blitter manipulation can allow for arbitrary kernel memory write
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 8.8 | null |
RHSA-2023:0114
|
Red Hat Security Advisory: kernel-rt security and bug fix update
|
kernel: memory corruption in AX88179_178A based USB ethernet device. kernel: i915: Incorrect GPU TLB flush can lead to random memory access
|
[
"cpe:/a:redhat:enterprise_linux:8::nfv",
"cpe:/a:redhat:enterprise_linux:8::realtime"
] | null | 7 | null | null |
RHSA-2022:6346
|
Red Hat Security Advisory: RHSA: Submariner 0.13 - security and enhancement update
|
golang: out-of-bounds read in golang.org/x/text/language leads to DoS golang: net/http: improper sanitization of Transfer-Encoding header golang: go/parser: stack exhaustion in all Parse* functions golang: encoding/xml: stack exhaustion in Decoder.Skip golang: crypto/tls: session tickets lack random ticket_age_add golang: io/fs: stack exhaustion in Glob golang: compress/gzip: stack exhaustion in Reader.Read golang: path/filepath: stack exhaustion in Glob golang: encoding/xml: stack exhaustion in Unmarshal golang: encoding/gob: stack exhaustion in Decoder.Decode golang: net/http/httputil: NewSingleHostReverseProxy - omit X-Forwarded-For not working
|
[
"cpe:/a:redhat:acm:2.6::el8"
] | null | 6.5 | null | null |
RHSA-2006:0719
|
Red Hat Security Advisory: nss_ldap security update
|
security flaw
|
[
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2013:0666
|
Red Hat Security Advisory: Oracle Java SE 6 - notification of end of public updates
|
Updates to the java-1.6.0-sun packages that disable the Java Web Browser
Plug-in and Web Start included in these packages. As a result, customers
who rely on Java-based browser applets may need to re-configure their
browser to use one of the Java implementations listed in the Solution
section below.
|
[
"cpe:/a:redhat:rhel_extras:5::server",
"cpe:/a:redhat:rhel_extras:6"
] | null | null | null | null |
RHSA-2024:10762
|
Red Hat Security Advisory: Red Hat Ansible Automation Platform 2.4 Product Security and Bug Fix Update
|
ansible-core: Exposure of Sensitive Information in Ansible Vault Files Due to Improper Logging ansible-core: Ansible-core user may read/write unauthorized content path-to-regexp: Backtracking regular expressions cause ReDoS dompurify: XSS vulnerability via prototype pollution
|
[
"cpe:/a:redhat:ansible_automation_platform:2.4::el8",
"cpe:/a:redhat:ansible_automation_platform:2.4::el9",
"cpe:/a:redhat:ansible_automation_platform_developer:2.4::el8",
"cpe:/a:redhat:ansible_automation_platform_developer:2.4::el9",
"cpe:/a:redhat:ansible_automation_platform_inside:2.4::el8",
"cpe:/a:redhat:ansible_automation_platform_inside:2.4::el9"
] | null | 7 | null | null |
RHSA-2014:1297
|
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 6.3 openssl security update
|
openssl: DTLS packet processing double free openssl: DTLS memory exhaustion openssl: information leak in pretty printing functions openssl: DTLS anonymous (EC)DH denial of service
|
[
"cpe:/a:redhat:jboss_enterprise_application_platform:6.3"
] | null | null | null | null |
RHSA-2024:9442
|
Red Hat Security Advisory: mingw-glib2 security update
|
glib2: Signal subscription vulnerabilities
|
[
"cpe:/a:redhat:enterprise_linux:9::crb"
] | null | 3.8 | null | null |
RHSA-2011:0461
|
Red Hat Security Advisory: jboss-seam2 security update
|
JBoss Seam privilege escalation caused by EL interpolation in FacesMessages
|
[
"cpe:/a:redhat:jboss_enterprise_application_platform:5::el4",
"cpe:/a:redhat:jboss_enterprise_application_platform:5::el5"
] | null | null | null | null |
RHSA-2024:1545
|
Red Hat Security Advisory: dnsmasq security update
|
dnsmasq: Heap use after free in dhcp6_no_relay dnsmasq: default maximum EDNS.0 UDP packet size was set to 4096 but should be 1232 bind9: KeyTrap - Extreme CPU consumption in DNSSEC validator bind9: Preparing an NSEC3 closest encloser proof can exhaust CPU resources
|
[
"cpe:/a:redhat:rhel_eus:8.6::appstream"
] | null | 7.5 | null | null |
RHSA-2022:8853
|
Red Hat Security Advisory: Red Hat OpenStack Platform 16.2.4 (python-django20) security update
|
django: Possible XSS via '{% debug %}' template tag django: Denial-of-service possibility in file uploads
|
[
"cpe:/a:redhat:openstack:16.2::el8"
] | null | 7.5 | null | null |
RHSA-2018:3671
|
Red Hat Security Advisory: java-1.7.1-ibm security update
|
OpenJDK: Incorrect handling of unsigned attributes in signed Jar manifests (Security, 8194534) OpenJDK: Leak of sensitive header data via HTTP redirect (Networking, 8196902) OpenJDK: Incomplete enforcement of the trustURLCodebase restriction (JNDI, 8199177) OpenJDK: Improper field access checks (Hotspot, 8199226) OpenJDK: Missing endpoint identification algorithm check during TLS session resumption (JSSE, 8202613) OpenJDK: Infinite loop in RIFF format reader (Sound, 8205361) libpng: Integer overflow and resultant divide-by-zero in pngrutil.c:png_check_chunk_length() allows for denial of service
|
[
"cpe:/a:redhat:rhel_extras:6"
] | null | null | 6.5 | null |
RHSA-2005:489
|
Red Hat Security Advisory: squid security update
|
security flaw security flaw security flaw
|
[
"cpe:/o:redhat:enterprise_linux:2.1::as",
"cpe:/o:redhat:enterprise_linux:2.1::aw",
"cpe:/o:redhat:enterprise_linux:2.1::es"
] | null | null | null | null |
RHSA-2023:6402
|
Red Hat Security Advisory: containernetworking-plugins security and bug fix update
|
golang.org/x/net/http2: avoid quadratic complexity in HPACK decoding golang: crypto/tls: large handshake records may cause panics golang: net/http, mime/multipart: denial of service from excessive resource consumption golang: net/http, net/textproto: denial of service from excessive memory allocation golang: net/http, net/textproto, mime/multipart: denial of service from excessive resource consumption golang: html/template: backticks not treated as string delimiters golang: html/template: improper sanitization of CSS values golang: html/template: improper handling of JavaScript whitespace golang: html/template: improper handling of empty HTML attributes golang: net/http: insufficient sanitization of Host header
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 6.5 | null | null |
RHSA-2009:0269
|
Red Hat Security Advisory: gstreamer-plugins security update
|
gstreamer-plugins: Array index error while parsing malformed QuickTime media files
|
[
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws"
] | null | null | null | null |
RHSA-2023:6084
|
Red Hat Security Advisory: RHACS 3.74 enhancement and security update
|
golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487) HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack)
|
[
"cpe:/a:redhat:advanced_cluster_security:3.74::el8"
] | null | 7.5 | null | null |
RHSA-2018:2420
|
Red Hat Security Advisory: Red Hat JBoss BRMS 6.4.11 security update
|
slf4j: Deserialisation vulnerability in EventData constructor can allow for arbitrary code execution
|
[
"cpe:/a:redhat:jboss_enterprise_brms_platform:6.4"
] | null | null | 8.1 | null |
RHSA-2016:1617
|
Red Hat Security Advisory: kernel security update
|
kernel: infiniband: Unprivileged process can overwrite kernel memory using rdma_ucm.ko
|
[
"cpe:/o:redhat:rhel_mission_critical:6.2::server"
] | null | null | 7.8 | null |
RHSA-2020:2516
|
Red Hat Security Advisory: libexif security update
|
libexif: several buffer over-reads in EXIF MakerNote handling can lead to information disclosure and DoS
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | 9.1 | null | null |
RHBA-2023:6364
|
Red Hat Bug Fix Advisory: golang and delve bug fix and enhancement update
|
golang: html/template: improper handling of HTML-like comments within script contexts golang: html/template: improper handling of special tags within script contexts golang: crypto/tls: panic when processing post-handshake message on QUIC connections golang: crypto/tls: lack of a limit on buffered post-handshake
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 7.5 | null | null |
RHSA-2018:3410
|
Red Hat Security Advisory: xorg-x11-server security update
|
xorg-x11-server: Incorrect permission check in Xorg X server allows for privilege escalation
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 6.6 | null |
RHSA-2015:2233
|
Red Hat Security Advisory: tigervnc security, bug fix, and enhancement update
|
tigervnc: integer overflow flaw, leading to a heap-based buffer overflow in screen size handling tigervnc: NULL pointer dereference flaw in XRegion
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | null | null |
RHSA-2024:0587
|
Red Hat Security Advisory: python-pip security update
|
python: tarfile module directory traversal
|
[
"cpe:/a:redhat:rhel_eus:8.8::appstream",
"cpe:/o:redhat:rhel_eus:8.8::baseos"
] | null | 5.5 | null | null |
RHSA-2020:3525
|
Red Hat Security Advisory: Red Hat Quay v3.3.1 security update
|
quay: build triggers can disclose robot account names and existence of private repos within namespaces
|
[
"cpe:/a:redhat:quay:3::el8"
] | null | 4.3 | null | null |
RHSA-2022:4661
|
Red Hat Security Advisory: pcs security update
|
sinatra: path traversal possible outside of public_dir when serving static files
|
[
"cpe:/a:redhat:enterprise_linux:8::highavailability",
"cpe:/a:redhat:enterprise_linux:8::resilientstorage"
] | null | 7.5 | null | null |
RHSA-2018:3335
|
Red Hat Security Advisory: xerces-c security update
|
xerces-c: Stack overflow when parsing deeply nested DTD
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 4.7 | null |
RHSA-2022:8493
|
Red Hat Security Advisory: python3.9 security update
|
python: local privilege escalation via the multiprocessing forkserver start method
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::crb",
"cpe:/a:redhat:rhel_eus:9.0::appstream",
"cpe:/a:redhat:rhel_eus:9.0::crb",
"cpe:/o:redhat:enterprise_linux:9::baseos",
"cpe:/o:redhat:rhel_eus:9.0::baseos"
] | null | 7.8 | null | null |
RHSA-2010:0470
|
Red Hat Security Advisory: flash-plugin security update
|
flash-plugin: crash caused by SWF files with different SWF versions obtained from the same URL flash-plugin: multiple security flaws (APSB10-14) flash-plugin: Arbitrary code execution by opening a specially-crafted PDF file with malicious SWF content (APSA10-01) flash-plugin: multiple security flaws (APSB10-14) flash-plugin: multiple security flaws (APSB10-14) flash-plugin: multiple security flaws (APSB10-14) flash-plugin: multiple security flaws (APSB10-14) flash-plugin: multiple security flaws (APSB10-14) flash-plugin: multiple security flaws (APSB10-14) flash-plugin: multiple security flaws (APSB10-14) flash-plugin: multiple security flaws (APSB10-14) flash-plugin: multiple security flaws (APSB10-14) flash-plugin: multiple security flaws (APSB10-14) flash-plugin: multiple security flaws (APSB10-14) flash-plugin: "possible player crash" affects also v9.x versions of Adobe Flash Player flash-plugin: multiple security flaws (APSB10-14) flash-plugin: multiple security flaws (APSB10-14) flash-plugin: multiple security flaws (APSB10-14) flash-plugin: multiple security flaws (APSB10-14) flash-plugin: multiple security flaws (APSB10-14) flash-plugin: multiple security flaws (APSB10-14) flash-plugin: multiple security flaws (APSB10-14) flash-plugin: multiple security flaws (APSB10-14) flash-plugin: multiple security flaws (APSB10-14) flash-plugin: multiple security flaws (APSB10-14) flash-plugin: multiple security flaws (APSB10-14) flash-plugin: multiple security flaws (APSB10-14) flash-plugin: multiple security flaws (APSB10-14) flash-plugin: multiple security flaws (APSB10-14) flash-plugin: multiple security flaws (APSB10-14) flash-plugin: multiple security flaws (APSB10-14)
|
[
"cpe:/a:redhat:rhel_extras:3",
"cpe:/a:redhat:rhel_extras:4"
] | null | null | null | null |
RHSA-2015:1681
|
Red Hat Security Advisory: openstack-swift security update
|
Swift: unauthorized deletion of versioned Swift object
|
[
"cpe:/a:redhat:openstack:6::el7"
] | null | null | null | null |
RHSA-2023:7053
|
Red Hat Security Advisory: ghostscript security and bug fix update
|
ghostscript: Incomplete fix for CVE-2020-16305 ghostscript: buffer overflow in base/sbcp.c leading to data corruption ghostscript: Out-of-bound read in base/gdevdevn.c:1973 in devn_pcx_write_rle could result in DoS
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb"
] | null | 5.5 | null | null |
RHSA-2023:6885
|
Red Hat Security Advisory: python security update
|
python: TLS handshake bypass
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 8.6 | null | null |
RHSA-2021:3444
|
Red Hat Security Advisory: kernel security and bug fix update
|
kernel: race condition in net/can/bcm.c leads to local privilege escalation kernel: use-after-free in route4_change() in net/sched/cls_route.c kernel: powerpc: KVM guest OS users can cause host OS memory corruption
|
[
"cpe:/a:redhat:rhel_eus:8.1::crb",
"cpe:/o:redhat:rhel_eus:8.1::baseos"
] | null | 7.8 | null | null |
RHSA-2023:1524
|
Red Hat Security Advisory: OpenShift Container Platform 4.9.59 security update
|
apache-commons-text: variable interpolation RCE
|
[
"cpe:/a:redhat:openshift:4.9::el7",
"cpe:/a:redhat:openshift:4.9::el8"
] | null | 9.8 | null | null |
RHSA-2021:3371
|
Red Hat Security Advisory: cloud-init security update
|
cloud-init: randomly generated passwords logged in clear-text to world-readable file
|
[
"cpe:/a:redhat:rhel_eus:8.2::appstream"
] | null | 5.5 | null | null |
RHSA-2013:1156
|
Red Hat Security Advisory: httpd security update
|
httpd: mod_dav DoS (httpd child process crash) via a URI MERGE request with source URI not handled by mod_dav
|
[
"cpe:/o:redhat:enterprise_linux:5::server",
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2022:5482
|
Red Hat Security Advisory: thunderbird security update
|
Mozilla: Undesired attributes could be set as part of prototype pollution Mozilla: An email with a mismatching OpenPGP signature date was accepted as valid Mozilla: CSP bypass enabling stylesheet injection Mozilla: CSP sandbox header without `allow-scripts` can be bypassed via retargeted javascript: URI Mozilla: Use-after-free in nsSHistory Mozilla: Unavailable PAC file resulted in OCSP requests being blocked Mozilla: A popup window could be resized in a way to overlay the address bar with web content Mozilla: Potential integer overflow in ReplaceElementsAt Mozilla: Memory safety bugs fixed in Firefox 102 and Firefox ESR 91.11
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 8.8 | 7.5 | null |
RHSA-2022:4951
|
Red Hat Security Advisory: OpenShift Container Platform 4.8.43 packages and security update
|
cri-o: memory exhaustion on the node when access to the kube api
|
[
"cpe:/a:redhat:openshift:4.8::el7",
"cpe:/a:redhat:openshift:4.8::el8"
] | null | 6.8 | null | null |
RHSA-2023:3292
|
Red Hat Security Advisory: httpd24-httpd security update
|
httpd: HTTP request splitting with mod_rewrite and mod_proxy
|
[
"cpe:/a:redhat:rhel_software_collections:3::el7"
] | null | 9.8 | null | null |
RHSA-2008:0196
|
Red Hat Security Advisory: unzip security update
|
unzip: free() called for uninitialized or already freed pointer
|
[
"cpe:/o:redhat:enterprise_linux:2.1::as",
"cpe:/o:redhat:enterprise_linux:2.1::aw",
"cpe:/o:redhat:enterprise_linux:2.1::es",
"cpe:/o:redhat:enterprise_linux:2.1::ws",
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws"
] | null | null | null | null |
RHSA-2022:7201
|
Red Hat Security Advisory: OpenShift Container Platform 4.11.12 security update
|
go-getter: command injection vulnerability go-getter: unsafe download (issue 1 of 3) go-getter: unsafe download (issue 2 of 3) go-getter: unsafe download (issue 3 of 3)
|
[
"cpe:/a:redhat:openshift:4.11::el8"
] | null | 8.6 | null | null |
RHSA-2020:1488
|
Red Hat Security Advisory: thunderbird security update
|
Mozilla: Use-after-free while running the nsDocShell destructor Mozilla: Use-after-free when handling a ReadableStream Mozilla: Uninitialized memory could be read when using the WebGL copyTexSubImage method Mozilla: Out of bounds write in GMPDecodeData when processing large images Mozilla: Memory safety bugs fixed in Firefox 75 and Firefox ESR 68.7
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | 9.8 | null | null |
RHBA-2019:3416
|
Red Hat Bug Fix Advisory: pki-core:10.6 and pki-deps:10:6 bug fix and enhancement update
|
jackson-databind: polymorphic typing issue allows attacker to read arbitrary local files on the server. jackson-databind: polymorphic typing issue allows attacker to read arbitrary local files on the server via crafted JSON message.
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | null | 7.5 | null |
RHSA-2015:1207
|
Red Hat Security Advisory: firefox security update
|
Mozilla: Use-after-free in workers while using XMLHttpRequest (MFSA 2015-65) Mozilla: Miscellaneous memory safety hazards (rv:31.8 / rv:38.1) (MFSA 2015-59) Mozilla: Miscellaneous memory safety hazards (rv:31.8 / rv:38.1) (MFSA 2015-59) Mozilla: Local files or privileged URLs in pages can be opened into new tabs (MFSA 2015-60) Mozilla: Type confusion in Indexed Database Manager (MFSA 2015-61) Mozilla: Out-of-bound read while computing an oscillator rendering range in Web Audio (MFSA 2015-62) Mozilla: Use-after-free in Content Policy due to microtask execution error (MFSA 2015-63) Mozilla: Use-after-free in workers while using XMLHttpRequest (MFSA 2015-65) Mozilla: Vulnerabilities found through code inspection (MFSA 2015-66) Mozilla: Vulnerabilities found through code inspection (MFSA 2015-66) Mozilla: Vulnerabilities found through code inspection (MFSA 2015-66) Mozilla: Vulnerabilities found through code inspection (MFSA 2015-66) Mozilla: Vulnerabilities found through code inspection (MFSA 2015-66) Mozilla: Vulnerabilities found through code inspection (MFSA 2015-66) Mozilla: Vulnerabilities found through code inspection (MFSA 2015-66) Mozilla: Key pinning is ignored when overridable errors are encountered (MFSA 2015-67) Mozilla: Privilege escalation through internal workers (MFSA 2015-69)
|
[
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::server",
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation",
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | null | null |
RHSA-2018:2243
|
Red Hat Security Advisory: Red Hat JBoss Data Virtualization 6.4 Update 3 security update
|
Dashbuilder: Lack of clickjacking protection on the login page
|
[
"cpe:/a:redhat:jboss_data_virtualization:6.4"
] | null | null | 2.6 | null |
RHSA-2023:1666
|
Red Hat Security Advisory: kpatch-patch security update
|
kernel: use-after-free caused by l2cap_reassemble_sdu() in net/bluetooth/l2cap_core.c ALSA: pcm: Move rwsem lock inside snd_ctl_elem_read to prevent UAF
|
[
"cpe:/o:redhat:rhel_e4s:8.2::baseos"
] | null | 7.8 | null | null |
RHSA-2016:2596
|
Red Hat Security Advisory: pcs security, bug fix, and enhancement update
|
pcs: Cross-Site Request Forgery in web UI pcs: cookies are not invalidated upon logout
|
[
"cpe:/o:redhat:enterprise_linux:7::server"
] | null | null | null | null |
RHSA-2022:8112
|
Red Hat Security Advisory: frr security, bug fix, and enhancement update
|
frrouting: overflow bugs in unpack_tlv_router_cap
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 7.8 | null | null |
RHSA-2015:1007
|
Red Hat Security Advisory: java-1.7.0-ibm security update
|
jar: directory traversal vulnerability JDK: ephemeral RSA keys accepted for non-export SSL/TLS cipher suites (FREAK) JDK: unspecified Java sandbox restrictions bypass JDK: unspecified vulnerability fixed in 6u95, 7u79 and 8u45 (Deployment) JDK: unspecified vulnerability fixed in 5.0u85, 6u95, 7u79 and 8u45 (2D) ICU: layout engine glyphStorage off-by-one (OpenJDK 2D, 8067699) OpenJDK: incorrect permissions check in resource loading (Beans, 8068320) OpenJDK: insufficient hardening of RSA-CRT implementation (JCE, 8071726) OpenJDK: jar directory traversal issues (Tools, 8064601) OpenJDK: certificate options parsing uncaught exception (JSSE, 8068720) JDK: unspecified vulnerability fixed in 5.0u85, 6u95, 7u79 and 8u45 (2D) JDK: unspecified partial Java sandbox restrictions bypass SSL/TLS: "Invariance Weakness" vulnerability in RC4 stream cipher
|
[
"cpe:/a:redhat:rhel_extras:5::client",
"cpe:/a:redhat:rhel_extras:5::server"
] | null | null | null | null |
RHSA-2023:3947
|
Red Hat Security Advisory: open-vm-tools security update
|
open-vm-tools: authentication bypass vulnerability in the vgauth module
|
[
"cpe:/a:redhat:rhel_eus:9.0::appstream"
] | null | 3.9 | null | null |
RHSA-2006:0634
|
Red Hat Security Advisory: xorg-x11 security update
|
freetype: integer overflow vulnerability due to incomplete fix for CVE-2006-1861
|
[
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2022:0443
|
Red Hat Security Advisory: RHV-H security update (redhat-virtualization-host) 4.3.21
|
samba: Active Directory (AD) domain user could become root on domain members polkit: Local privilege escalation in pkexec due to incorrect handling of argument vector
|
[
"cpe:/o:redhat:enterprise_linux:7::hypervisor"
] | null | 7.8 | null | null |
RHSA-2020:5503
|
Red Hat Security Advisory: mariadb-connector-c security, bug fix, and enhancement update
|
mysql: C API unspecified vulnerability (CPU Jan 2020) mysql: C API unspecified vulnerability (CPU Apr 2020) mysql: C API unspecified vulnerability (CPU Apr 2020) mariadb-connector-c: Improper validation of content in a OK packet received from server mysql: C API unspecified vulnerability (CPU Jan 2021)
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 3.7 | 3.7 | null |
RHSA-2022:7639
|
Red Hat Security Advisory: openblas security update
|
lapack: Out-of-bounds read in *larrv
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb"
] | null | 5.9 | null | null |
RHSA-2021:2664
|
Red Hat Security Advisory: Ansible security and bug fix update (2.9.23)
|
ansible: Template Injection through yaml multi-line strings with ansible facts used in template.
|
[
"cpe:/a:redhat:ansible_engine:2::el7",
"cpe:/a:redhat:ansible_engine:2::el8"
] | null | 6.6 | null | null |
RHSA-2022:1162
|
Red Hat Security Advisory: OpenShift Container Platform 4.10.8 bug fix and security update
|
ovn-kubernetes: Ingress network policy can be overruled by egress network policy on another pod
|
[
"cpe:/a:redhat:openshift:4.10::el8"
] | null | 8.2 | null | null |
RHSA-2020:2523
|
Red Hat Security Advisory: Red Hat OpenShift Service Mesh 1.1.2 servicemesh-proxy security update
|
nghttp2: overly large SETTINGS frames can lead to DoS
|
[
"cpe:/a:redhat:service_mesh:1.1::el8"
] | null | 7.5 | null | null |
RHSA-2021:4723
|
Red Hat Security Advisory: devtoolset-10-binutils security update
|
environment: Unicode's bidirectional (BiDi) override characters can cause trojan source attacks
|
[
"cpe:/a:redhat:rhel_software_collections:3::el7"
] | null | 8.5 | null | null |
RHSA-2010:0810
|
Red Hat Security Advisory: seamonkey security update
|
Firefox race condition flaw (MFSA 2010-73)
|
[
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws",
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2016:1475
|
Red Hat Security Advisory: java-1.8.0-oracle security update
|
OpenJDK: insufficient restrictions on the use of custom ValueHandler (CORBA, 8079718) JDK: unspecified vulnerability fixed in 7u111 and 8u101 (JavaFX) OpenJDK: maximum XML name limit not applied to namespace URIs (JAXP, 8148872) JDK: unspecified vulnerability fixed in 6u121, 7u111, and 8u101 (Install) OpenJDK: missing entity replacement limits (JAXP, 8149962) JDK: unspecified vulnerability fixed in 7u111 and 8u101 (Deployment) OpenJDK: integer overflows in bytecode streams (Hotspot, 8152479) JDK: unspecified vulnerability fixed in 8u101 (Install) OpenJDK: insufficient protection of MethodHandle.invokeBasic() (Hotspot, 8154475) OpenJDK: incorrect handling of MethodHandles.dropArguments() argument (Libraries, 8155985) OpenJDK: insufficient bytecode verification (Hotspot, 8155981) OpenJDK: insufficient value count check in MethodHandles.filterReturnValue() (Libraries, 8158571)
|
[
"cpe:/a:redhat:rhel_extras_oracle_java:6",
"cpe:/a:redhat:rhel_extras_oracle_java:7"
] | null | null | 8.8 | null |
RHSA-2022:4690
|
Red Hat Security Advisory: Red Hat OpenShift GitOps security update
|
argocd: Symlink following allows leaking out-of-bound manifests and JSON files from Argo CD repo-server argocd: Login screen allows message spoofing if SSO is enabled argocd: ArgoCD will blindly trust JWT claims if anonymous access is enabled
|
[
"cpe:/a:redhat:openshift_gitops:1.5::el8"
] | null | 10 | null | null |
RHSA-2023:3495
|
Red Hat Security Advisory: Logging Subsystem 5.7.2 - Red Hat OpenShift security update
|
golang.org/x/net/http2: avoid quadratic complexity in HPACK decoding rubygem-rack: denial of service in header parsing rubygem-activesupport: Possible XSS in SafeBuffer#bytesplice
|
[
"cpe:/a:redhat:logging:5.7::el8"
] | null | 6.1 | null | null |
RHSA-2012:0109
|
Red Hat Security Advisory: rhev-hypervisor6 security and bug fix update
|
openssl: uninitialized SSL 3.0 padding openssl: malformed RFC 3779 data can cause assertion failures openssl: SGC restart DoS attack qemu: e1000: process_tx_desc legacy mode packets heap overflow
|
[
"cpe:/o:redhat:enterprise_linux:6::hypervisor"
] | null | null | null | null |
RHSA-2023:5768
|
Red Hat Security Advisory: nghttp2 security update
|
HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack)
|
[
"cpe:/o:redhat:rhel_aus:8.4::baseos",
"cpe:/o:redhat:rhel_e4s:8.4::baseos",
"cpe:/o:redhat:rhel_tus:8.4::baseos"
] | null | 7.5 | null | null |
RHSA-2011:1310
|
Red Hat Security Advisory: jbossws security update
|
JBossWS remote Denial of Service
|
[
"cpe:/a:redhat:jboss_enterprise_application_platform:4.2"
] | null | null | null | null |
RHSA-2023:3354
|
Red Hat Security Advisory: Red Hat JBoss Core Services Apache HTTP Server 2.4.51 SP2 security update
|
httpd: mod_dav: out-of-bounds read/write of zero byte openssl: timing attack in RSA Decryption implementation openssl: double free after calling PEM_read_bio_ex apr-util: out-of-bounds writes in the apr_base64 curl: HSTS bypass via IDN curl: Use-after-free triggered by an HTTP proxy deny response openssl: use-after-free following BIO_new_NDEF openssl: X.400 address type confusion in X.509 GeneralName curl: HSTS ignored on multiple requests curl: HSTS amnesia with --parallel curl: HTTP multi-header compression denial of service httpd: HTTP request splitting with mod_rewrite and mod_proxy curl: TELNET option IAC injection curl: SFTP path ~ resolving discrepancy
|
[
"cpe:/a:redhat:jboss_core_services:1::el7",
"cpe:/a:redhat:jboss_core_services:1::el8"
] | null | 3.7 | null | null |
RHSA-2023:4809
|
Red Hat Security Advisory: librsvg2 security update
|
librsvg: Arbitrary file read when xinclude href has special characters
|
[
"cpe:/a:redhat:rhel_eus:9.0::appstream"
] | null | 5.5 | null | null |
RHSA-2022:6113
|
Red Hat Security Advisory: Red Hat Application Interconnect 1.0 Release (rpms)
|
golang: net/http: improper sanitization of Transfer-Encoding header golang: go/parser: stack exhaustion in all Parse* functions golang: encoding/xml: stack exhaustion in Decoder.Skip golang: io/fs: stack exhaustion in Glob golang: compress/gzip: stack exhaustion in Reader.Read golang: path/filepath: stack exhaustion in Glob golang: encoding/xml: stack exhaustion in Unmarshal golang: net/http/httputil: NewSingleHostReverseProxy - omit X-Forwarded-For not working
|
[
"cpe:/a:redhat:application_interconnect:1::el8"
] | null | 6.5 | null | null |
RHSA-2006:0720
|
Red Hat Security Advisory: kdelibs security update
|
security flaw
|
[
"cpe:/o:redhat:enterprise_linux:2.1::as",
"cpe:/o:redhat:enterprise_linux:2.1::aw",
"cpe:/o:redhat:enterprise_linux:2.1::es",
"cpe:/o:redhat:enterprise_linux:2.1::ws",
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws",
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2019:2512
|
Red Hat Security Advisory: subversion:1.10 security update
|
subversion: NULL pointer dereference in svnserve leading to an unauthenticated remote DoS
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | null | 7.5 | null |
RHSA-2024:6685
|
Red Hat Security Advisory: OpenShift Container Platform 4.15.33 bug fix and security update
|
openshift/builder: Path traversal allows command injection in privileged BuildContainer using docker build strategy openshift-controller-manager: Elevated Build Pods Can Lead to Node Compromise in OpenShift
|
[
"cpe:/a:redhat:openshift:4.15::el8",
"cpe:/a:redhat:openshift:4.15::el9"
] | null | 9.9 | null | null |
RHSA-2025:3186
|
Red Hat Security Advisory: podman security update
|
golang.org/x/crypto/ssh: Denial of Service in the Key Exchange of golang.org/x/crypto/ssh
|
[
"cpe:/a:redhat:rhel_eus:9.4::appstream"
] | null | 7.5 | null | null |
RHSA-2010:0889
|
Red Hat Security Advisory: freetype security update
|
Freetype : Heap based buffer overflow in ft_var_readpackedpoints()
|
[
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws",
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server",
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2023:1270
|
Red Hat Security Advisory: OpenShift Container Platform 4.12.8 security update
|
goutils: RandomAlphaNumeric and CryptoRandomAlphaNumeric are not as random as they should be
|
[
"cpe:/a:redhat:openshift:4.12::el8"
] | null | 7 | null | null |
RHSA-2010:0451
|
Red Hat Security Advisory: Red Hat Certificate System 7.1 - End of Life Notice
|
This is the notification of the End of Life plans for Red Hat Certificate
System 7.1.
|
[] | null | null | null | null |
RHSA-2006:0437
|
Red Hat Security Advisory: Updated kernel packages for Red Hat Enterprise Linux 3 Update 8
|
security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw
|
[
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws"
] | null | null | null | null |
RHSA-2020:3996
|
Red Hat Security Advisory: libxml2 security and bug fix update
|
libxml2: memory leak in xmlParseBalancedChunkMemoryRecover in parser.c libxml2: memory leak in xmlSchemaPreRun in xmlschemas.c libxml2: infinite loop in xmlStringLenDecodeEntities in some end-of-file situations
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 7.5 | null | null |
RHSA-2024:5754
|
Red Hat Security Advisory: OpenShift Container Platform 4.15.29 packages and security update
|
golang: math/big: uncontrolled memory consumption due to an unhandled overflow via Rat.SetString
|
[
"cpe:/a:redhat:openshift:4.15::el8",
"cpe:/a:redhat:openshift:4.15::el9"
] | null | 7.5 | null | null |
RHSA-2021:0223
|
Red Hat Security Advisory: sudo security update
|
sudo: Heap buffer overflow in argument parsing
|
[
"cpe:/o:redhat:rhel_eus:7.6::computenode",
"cpe:/o:redhat:rhel_eus:7.6::server"
] | null | 7.8 | null | null |
RHSA-2022:0718
|
Red Hat Security Advisory: kpatch-patch security update
|
kernel: use after free in eventpoll.c may lead to escalation of privilege kernel: xfs: raw block device data leak in XFS_IOC_ALLOCSP IOCTL kernel: possible privileges escalation due to missing TLB flush
|
[
"cpe:/o:redhat:rhel_e4s:7.7::server"
] | null | 7 | null | null |
RHSA-2013:1200
|
Red Hat Security Advisory: python-glanceclient security update
|
OpenStack: python-glanceclient failing SSL certificate check
|
[
"cpe:/a:redhat:openstack:3::el6"
] | null | null | null | null |
RHSA-2019:2030
|
Red Hat Security Advisory: python security and bug fix update
|
python: Missing salt initialization in _elementtree.c module python: NULL pointer dereference using a specially crafted X509 certificate python: CRLF injection via the query part of the url passed to urlopen() python: CRLF injection via the path part of the url passed to urlopen() python: Undocumented local_file protocol allows remote attackers to bypass protection mechanisms
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 7.4 | null |
RHSA-2016:0502
|
Red Hat Security Advisory: python-django security update
|
python-django: Malicious redirect and possible XSS attack via user-supplied redirect URLs containing basic auth python-django: User enumeration through timing difference on password hasher work factor upgrade
|
[
"cpe:/a:redhat:openstack:5::el6"
] | null | null | null | null |
RHSA-2023:3998
|
Red Hat Security Advisory: Logging Subsystem 5.7.3 - Red Hat OpenShift security update
|
word-wrap: ReDoS tough-cookie: prototype pollution in cookie memstore
|
[
"cpe:/a:redhat:logging:5.7::el8"
] | null | 6.5 | null | null |
RHSA-2021:5150
|
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.3.10 security update on RHEL 7
|
undertow: potential security issue in flow control over HTTP/2 may lead to DOS wildfly-elytron: possible timing attack in ScramServer wildfly: incorrect JBOSS_LOCAL_USER challenge location may lead to giving access to all the local users resteasy: Error message exposes endpoint class information jsoup: Crafted input may cause the jsoup HTML and XML parser to get stuck xml-security: XPath Transform abuse allows for information disclosure
|
[
"cpe:/a:redhat:jboss_enterprise_application_platform:7.3::el7"
] | null | 7.5 | null | null |
RHSA-2020:1605
|
Red Hat Security Advisory: python27:2.7 security, bug fix, and enhancement update
|
python-requests: Redirect from HTTPS to HTTP does not remove Authorization header python-urllib3: Cross-host redirect does not remove Authorization header allow for credential exposure python: Cookie domain check returns incorrect results python-urllib3: CRLF injection due to not encoding the '\r\n' sequence leading to possible attack on internal service python-urllib3: Certification mishandle when error should be thrown python: email.utils.parseaddr wrongly parses email addresses python: XSS vulnerability in the documentation XML-RPC server in server_title field
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 6.1 | 7.3 | null |
RHSA-2020:1216
|
Red Hat Security Advisory: qemu-kvm-rhev security, bug fix, and enhancement update
|
QEMU: qxl: null pointer dereference while releasing spice resources QEMU: slirp: heap buffer overflow during packet reassembly QEMU: block: iscsi: OOB heap access via an unexpected response of iSCSI Server
|
[
"cpe:/a:redhat:rhev_manager:4.3",
"cpe:/o:redhat:enterprise_linux:7::hypervisor"
] | null | 6 | 7 | null |
RHSA-2015:0794
|
Red Hat Security Advisory: krb5 security update
|
krb5: gss_process_context_token() incorrectly frees context (MITKRB5-SA-2015-001) krb5: NULL pointer dereference when using a ticket policy name as a password policy name krb5: unauthenticated denial of service in recvauth_common() and others krb5: kadmind doubly frees partial deserialization results (MITKRB5-SA-2015-001) krb5: kadmind incorrectly validates server principal name (MITKRB5-SA-2015-001)
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2020:0798
|
Red Hat Security Advisory: OpenShift Container Platform 3.11 openshift-enterprise-mediawiki-apb security update
|
openshift/mediawiki-apb: /etc/passwd is given incorrect privileges
|
[
"cpe:/a:redhat:openshift:3.11::el7"
] | null | 7 | null | null |
RHSA-2022:0668
|
Red Hat Security Advisory: cyrus-sasl security update
|
cyrus-sasl: failure to properly escape SQL input allows an attacker to execute arbitrary SQL commands
|
[
"cpe:/a:redhat:rhel_eus:8.4::appstream",
"cpe:/o:redhat:rhel_eus:8.4::baseos"
] | null | 8.8 | null | null |
RHSA-2023:6523
|
Red Hat Security Advisory: python-tornado security update
|
python-tornado: open redirect vulnerability in StaticFileHandler under certain configurations
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 7.4 | null | null |
RHSA-2024:2272
|
Red Hat Security Advisory: containernetworking-plugins security update
|
golang: net/http/internal: Denial of Service (DoS) via Resource Consumption via HTTP requests golang: crypto/tls: Timing Side Channel attack in RSA based TLS key exchanges.
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 7.5 | null | null |
RHSA-2021:2359
|
Red Hat Security Advisory: dhcp security update
|
dhcp: stack-based buffer overflow when parsing statements with colon-separated hex digits in config or lease files in dhcpd and dhclient
|
[
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 8.8 | null | null |
RHSA-2022:2181
|
Red Hat Security Advisory: virt:av and virt-devel:av security update
|
libnbd: nbdcopy: missing error handling may create corrupted destination image
|
[
"cpe:/a:redhat:advanced_virtualization:8.6::el8"
] | null | 4.8 | null | null |
RHBA-2025:1599
|
Red Hat Bug Fix Advisory: Red Hat Quay v3.11.9 bug fix release
|
jquery: Untrusted code execution via <option> tag in HTML passed to DOM manipulation methods
|
[
"cpe:/a:redhat:quay:3::el8"
] | null | 6.1 | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.