id
stringlengths 13
15
| title
stringlengths 29
176
| description
stringlengths 8
32.1k
| cpes
listlengths 0
20
| cvss_v4_0
null | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
null |
---|---|---|---|---|---|---|---|
RHBA-2020:5356
|
Red Hat Bug Fix Advisory: OpenShift Container Platform 4.5.23 packages update
|
golang: data race in certain net/http servers including ReverseProxy can lead to DoS golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs
|
[
"cpe:/a:redhat:openshift:4.5::el7",
"cpe:/a:redhat:openshift:4.5::el8"
] | null | 7.5 | null | null |
RHSA-2022:8977
|
Red Hat Security Advisory: dbus security update
|
dbus: dbus-daemon crashes when receiving message with incorrectly nested parentheses and curly brackets dbus: dbus-daemon can be crashed by messages with array length inconsistent with element type dbus: `_dbus_marshal_byteswap` doesn't process fds in messages with "foreign" endianness correctly
|
[
"cpe:/a:redhat:rhel_eus:9.0::appstream",
"cpe:/o:redhat:rhel_eus:9.0::baseos"
] | null | 6.5 | null | null |
RHSA-2011:0870
|
Red Hat Security Advisory: java-1.4.2-ibm-sap security update
|
JDK unspecified vulnerability in Deployment component OpenJDK DNS cache poisoning by untrusted applets (6981922) JDK unspecified vulnerability in Sound component JDK unspecified vulnerability in Sound component OpenJDK Swing timer-based security manager bypass (6907662) JDK unspecified vulnerability in Deployment component JDK unspecified vulnerability in Sound component JDK unspecified vulnerability in Deployment component
|
[
"cpe:/a:redhat:rhel_extras_sap:4",
"cpe:/a:redhat:rhel_extras_sap:5"
] | null | null | null | null |
RHSA-2018:1675
|
Red Hat Security Advisory: vdsm security update
|
hw: cpu: speculative store bypass
|
[
"cpe:/o:redhat:enterprise_linux:7::hypervisor"
] | null | null | 5.6 | null |
RHSA-2021:0308
|
Red Hat Security Advisory: OpenShift Container Platform 4.6.16 security and bug fix update
|
SSL/TLS: Birthday attack against 64-bit block ciphers (SWEET32) openshift/builder: privilege escalation during container image builds via mounted secrets openshift/installer: Bootstrap nodes allow anonymous authentication on kubelet port 10250
|
[
"cpe:/a:redhat:openshift:4.6::el8"
] | null | 8.1 | 7.5 | null |
RHSA-2022:6277
|
Red Hat Security Advisory: Red Hat OpenShift Service Mesh 2.1.5 security update
|
golang: encoding/pem: fix stack overflow in Decode Moment.js: Path traversal in moment.locale golang: regexp: stack exhaustion via a deeply nested expression golang: crypto/elliptic: panic caused by oversized scalar golang: syscall: faccessat checks wrong group golang: crypto/tls: session tickets lack random ticket_age_add moment: inefficient parsing algorithm resulting in DoS
|
[
"cpe:/a:redhat:service_mesh:2.1::el8"
] | null | 7.5 | null | null |
RHSA-2016:1781
|
Red Hat Security Advisory: rh-postgresql94-postgresql security update
|
postgresql: CASE/WHEN with inlining can cause untrusted pointer dereference postgresql: privilege escalation via crafted database and role names
|
[
"cpe:/a:redhat:rhel_software_collections:2::el6",
"cpe:/a:redhat:rhel_software_collections:2::el7"
] | null | null | 7.6 | null |
RHSA-2018:1452
|
Red Hat Security Advisory: ovirt-ansible-roles security update
|
ovirt-ansible-roles: passwords revealed in ansible log when provisioning new provider
|
[
"cpe:/a:redhat:rhev_manager:4"
] | null | null | 5 | null |
RHSA-2021:0940
|
Red Hat Security Advisory: kpatch-patch security update
|
kernel: locking issue in drivers/tty/tty_jobctrl.c can lead to an use-after-free
|
[
"cpe:/o:redhat:rhel_eus:7.6::server"
] | null | 7.8 | null | null |
RHSA-2005:410
|
Red Hat Security Advisory: gftp security update
|
security flaw
|
[
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws",
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2024:0417
|
Red Hat Security Advisory: shadow-utils security update
|
shadow-utils: possible password leak during passwd(1) change
|
[
"cpe:/a:redhat:rhel_eus:8.6::crb",
"cpe:/o:redhat:rhel_eus:8.6::baseos"
] | null | 4.7 | null | null |
RHSA-2023:2860
|
Red Hat Security Advisory: python27:2.7 security update
|
python: CPU denial of service via inefficient IDNA decoder
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 7.5 | null | null |
RHSA-2013:0695
|
Red Hat Security Advisory: kernel security update
|
kernel: race condition with PTRACE_SETREGS
|
[
"cpe:/o:redhat:rhel_eus:5.6"
] | null | null | null | null |
RHSA-2023:5528
|
Red Hat Security Advisory: python3 security update
|
python: TLS handshake bypass
|
[
"cpe:/a:redhat:rhel_aus:8.2::appstream",
"cpe:/a:redhat:rhel_e4s:8.2::appstream",
"cpe:/a:redhat:rhel_tus:8.2::appstream",
"cpe:/o:redhat:rhel_aus:8.2::baseos",
"cpe:/o:redhat:rhel_e4s:8.2::baseos",
"cpe:/o:redhat:rhel_tus:8.2::baseos"
] | null | 8.6 | null | null |
RHSA-2003:324
|
Red Hat Security Advisory: ethereal security update
|
security flaw security flaw security flaw
|
[
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws"
] | null | null | null | null |
RHSA-2024:4041
|
Red Hat Security Advisory: OpenShift Container Platform 4.15.19 bug fix and security update
|
golang: net/http, x/net/http2: unlimited number of CONTINUATION frames causes DoS jose-go: improper handling of highly compressed data
|
[
"cpe:/a:redhat:openshift:4.15::el8",
"cpe:/a:redhat:openshift:4.15::el9"
] | null | 4.3 | null | null |
RHSA-2016:1201
|
Red Hat Security Advisory: chromium-browser security update
|
chromium-browser: cross-origin bypass in extension bindings chromium-browser: cross-origin bypass in blink chromium-browser: information leak in extension bindings chromium-browser: parameter sanitization failure in devtools chromium-browser: use-after-free in extensions chromium-browser: use-after-free in autofill chromium-browser: out-of-bounds read in skia chromium-browser: various fixes from internal audits
|
[
"cpe:/a:redhat:rhel_extras:6"
] | null | null | null | null |
RHSA-2015:1347
|
Red Hat Security Advisory: pki-core security and bug fix update
|
System: multiple XSS flaws
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2024:3561
|
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.4.17 Security update
|
datatables.net: contents of array not escaped by HTML escape entities function EAP: wildfly-elytron has a SSRF security issue cxf-core: Apache CXF SSRF Vulnerability using the Aegis databinding
|
[
"cpe:/a:redhat:jboss_enterprise_application_platform:7.4::el9"
] | null | 7.4 | null | null |
RHSA-2003:290
|
Red Hat Security Advisory: mod_ssl, openssl security update for Stronghold
|
security flaw CAN-2003-0543/0544 OpenSSL ASN.1 protocol crashes CAN-2003-0543/0544 OpenSSL ASN.1 protocol crashes
|
[
"cpe:/a:redhat:stronghold:4"
] | null | null | null | null |
RHSA-2020:5234
|
Red Hat Security Advisory: firefox security update
|
Mozilla: Variable time processing of cross-origin images during drawImage calls Mozilla: Parsing mismatches could confuse and bypass security sanitizer for chrome privileged code Mozilla: Fullscreen could be enabled without displaying the security UI Mozilla: XSS through paste (manual and clipboard API) Mozilla: Requests intercepted through ServiceWorkers lacked MIME type restrictions Mozilla: Use-after-free in WebRequestService Mozilla: Potential use-after-free in uses of nsTArray Mozilla: DoH did not filter IPv4 mapped IP Addresses Mozilla: Software keyboards may have remembered typed passwords Mozilla: Memory safety bugs fixed in Firefox 83 and Firefox ESR 78.5
|
[
"cpe:/a:redhat:rhel_eus:8.2::appstream"
] | null | 8.8 | 6.1 | null |
RHSA-2005:114
|
Red Hat Security Advisory: imap security update
|
security flaw
|
[
"cpe:/o:redhat:enterprise_linux:2.1::as",
"cpe:/o:redhat:enterprise_linux:2.1::aw",
"cpe:/o:redhat:enterprise_linux:2.1::es"
] | null | null | null | null |
RHSA-2023:3645
|
Red Hat Security Advisory: Red Hat OpenShift Service Mesh 2.2.7 security update
|
mongo-go-driver: specific cstrings input may not be properly validated async: Prototype Pollution in async express: "qs" prototype poisoning causes the hang of the node process terser: insecure use of regular expressions leads to ReDoS
|
[
"cpe:/a:redhat:service_mesh:2.2::el8"
] | null | 7.5 | null | null |
RHSA-2020:2893
|
Red Hat Security Advisory: bind security update
|
bind: A logic error in code which checks TSIG validity can be used to trigger an assertion failure in tsig.c
|
[
"cpe:/o:redhat:rhel_eus:7.7::computenode",
"cpe:/o:redhat:rhel_eus:7.7::server"
] | null | 7.5 | null | null |
RHSA-2021:4358
|
Red Hat Security Advisory: glibc security, bug fix, and enhancement update
|
glibc: Use-after-free in addgetnetgrentX function in netgroupcache.c glibc: mq_notify does not handle separately allocated thread attributes glibc: Arbitrary read in wordexp()
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb",
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 9.1 | null | null |
RHSA-2023:4145
|
Red Hat Security Advisory: kpatch-patch security update
|
kernel: tcindex: use-after-free vulnerability in traffic control index filter allows privilege escalation kernel: netfilter: use-after-free in nf_tables when processing batch requests can lead to privilege escalation
|
[
"cpe:/o:redhat:rhel_eus:8.6::baseos"
] | null | 7.8 | null | null |
RHSA-2020:1353
|
Red Hat Security Advisory: kernel-rt security and bug fix update
|
kernel: heap overflow in mwifiex_update_vs_ie() function of Marvell WiFi driver kernel: rtl_p2p_noa_ie in drivers/net/wireless/realtek/rtlwifi/ps.c in the Linux kernel lacks a certain upper-bound check, leading to a buffer overflow
|
[
"cpe:/a:redhat:enterprise_mrg:2:server:el6"
] | null | null | 6.3 | null |
RHSA-2024:7794
|
Red Hat Security Advisory: skopeo security update
|
encoding/gob: golang: Calling Decoder.Decode on a message which contains deeply nested structures can cause a panic due to stack exhaustion
|
[
"cpe:/a:redhat:rhel_e4s:9.0::appstream"
] | null | 7.5 | null | null |
RHSA-2004:063
|
Red Hat Security Advisory: : Updated mod_python packages fix denial of service vulnerability
|
security flaw mod_python remote DoS
|
[
"cpe:/o:redhat:linux:9"
] | null | null | null | null |
RHSA-2022:7049
|
Red Hat Security Advisory: OpenJDK 8u352 Windows Security Update
|
OpenJDK: improper handling of long NTLM client hostnames (Security, 8286526) OpenJDK: insufficient randomization of JNDI DNS port numbers (JNDI, 8286910) OpenJDK: excessive memory allocation in X.509 certificate parsing (Security, 8286533) OpenJDK: HttpServer no connection count limit (Lightweight HTTP Server, 8286918)
|
[
"cpe:/a:redhat:openjdk:1.8::windows"
] | null | 5.3 | null | null |
RHSA-2011:0368
|
Red Hat Security Advisory: flash-plugin - End Of Life
|
flash-plugin: multiple code execution flaws (APSB11-02) flash-plugin: multiple code execution flaws (APSB11-02) flash-plugin: multiple code execution flaws (APSB11-02) flash-plugin: multiple code execution flaws (APSB11-02) flash-plugin: multiple code execution flaws (APSB11-02) flash-plugin: multiple code execution flaws (APSB11-02) flash-plugin: multiple code execution flaws (APSB11-02) flash-plugin: multiple code execution flaws (APSB11-02) flash-plugin: multiple code execution flaws (APSB11-02) flash-plugin: multiple code execution flaws (APSB11-02) flash-plugin: multiple code execution flaws (APSB11-02) flash-plugin: multiple code execution flaws (APSB11-02) flash-plugin: multiple code execution flaws (APSB11-02)
|
[
"cpe:/a:redhat:rhel_extras:4"
] | null | null | null | null |
RHSA-2011:0292
|
Red Hat Security Advisory: java-1.4.2-ibm security update
|
JDK Double.parseDouble Denial-Of-Service
|
[
"cpe:/a:redhat:rhel_extras:4",
"cpe:/a:redhat:rhel_extras:5::client",
"cpe:/a:redhat:rhel_extras:5::server"
] | null | null | null | null |
RHSA-2002:131
|
Red Hat Security Advisory: openssh security update
|
security flaw
|
[
"cpe:/o:redhat:enterprise_linux:2.1::as"
] | null | null | null | null |
RHSA-2010:0545
|
Red Hat Security Advisory: thunderbird security update
|
Mozilla crashes with evidence of memory corruption Mozilla remote code execution with use-after-free in nsTreeSelection Mozilla Dangling pointer vulnerability in nsTreeContentView Mozilla Dangling pointer vulnerability in nsPluginArray Content-Disposition: attachment ignored if Content-Type: multipart also present Mozilla Freed object reuse across plugin instances Mozilla Integer Overflow in XSLT Node Sorting Mozilla Crashes with evidence of memory corruption libpng: out-of-bounds memory write Mozilla miscellaneous memory safety hazards Mozilla Plugin parameter EnsureCachedAttrParamArrays remote code execution vulnerability Mozilla nsTreeSelection dangling pointer remote code execution vulnerability Mozilla Cross-origin data leakage from script filename in error messages
|
[
"cpe:/a:redhat:rhel_productivity:5",
"cpe:/o:redhat:enterprise_linux:5::client"
] | null | null | null | null |
RHSA-2024:8860
|
Red Hat Security Advisory: krb5 security update
|
freeradius: forgery attack
|
[
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 9 | null | null |
RHSA-2023:7189
|
Red Hat Security Advisory: fwupd security update
|
fwupd: world readable password in /etc/fwupd/redfish.conf
|
[
"cpe:/a:redhat:enterprise_linux:8::crb",
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 5.5 | null | null |
RHSA-2009:0016
|
Red Hat Security Advisory: java-1.5.0-ibm security update
|
Java Web Start File Inclusion via System Properties Override JavaWebStart allows unauthorized network connections Java WebStart privilege escalation Java Web Start exposes username and the pathname of the JWS cache Java Web Start BasicService displays local files in the browser Java WebStart allows hidden code privilege escalation Java WebStart unprivileged local file and network access JRE allows unauthorized file access and connections to localhost JRE allows unauthorized memory read access via a crafted ZIP file OpenJDK Denial-Of-Service in kerberos authentication (6588160) OpenJDK RSA public key length denial-of-service (6497740) OpenJDK allows to list files within the user home directory (6484091) OpenJDK UTF-8 decoder accepts non-shortest form sequences (4486841) OpenJDK Jar200 Decompression buffer overflow (6755943) OpenJDK calendar object deserialization allows privilege escalation (6734167) OpenJDK Privilege escalation in command line applications (6733959) OpenJDK Font processing vulnerability (6733336) OpenJDK Truetype Font processing vulnerability (6751322) OpenJDK Buffer overflow in image processing (6726779) OpenJDK temporary files have guessable file names (6721753)
|
[
"cpe:/a:redhat:rhel_extras:4",
"cpe:/a:redhat:rhel_extras:5::client",
"cpe:/a:redhat:rhel_extras:5::server"
] | null | null | null | null |
RHSA-2014:1783
|
Red Hat Security Advisory: python-keystoneclient security and bug fix update
|
python-keystoneclient: TLS certificate verification disabled
|
[
"cpe:/a:redhat:openstack:5::el6"
] | null | null | null | null |
RHSA-2014:1122
|
Red Hat Security Advisory: openstack-keystone security and bug fix update
|
openstack-keystone: revocation events are broken with mysql openstack-keystone: token expiration date stored incorrectly openstack-keystone: domain-scoped tokens don't get revoked
|
[
"cpe:/a:redhat:openstack:5::el6"
] | null | null | null | null |
RHSA-2022:5840
|
Red Hat Security Advisory: Migration Toolkit for Containers (MTC) 1.7.3 security and bug fix update
|
cross-fetch: Exposure of Private Personal Information to an Unauthorized Actor golang: encoding/pem: fix stack overflow in Decode golang: crypto/elliptic: panic caused by oversized scalar golang: syscall: faccessat checks wrong group
|
[
"cpe:/a:redhat:rhmt:1.7::el8"
] | null | 6.2 | null | null |
RHSA-2024:3121
|
Red Hat Security Advisory: httpd:2.4 security update
|
httpd: mod_macro: out-of-bounds read vulnerability mod_http2: reset requests exhaust memory (incomplete fix of CVE-2023-44487)
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 7.5 | null | null |
RHSA-2018:0038
|
Red Hat Security Advisory: microcode_ctl security update
|
An update for microcode_ctl is now available for Red Hat Enterprise Linux 6.4 Advanced Update Support.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
|
[
"cpe:/o:redhat:rhel_aus:6.4::server"
] | null | null | null | null |
RHSA-2017:2676
|
Red Hat Security Advisory: chromium-browser security update
|
chromium-browser: use after free in pdfium chromium-browser: heap buffer overflow in webgl chromium-browser: heap buffer overflow in skia chromium-browser: memory lifecycle issue in pdfium chromium-browser: type confusion in v8 chromium-browser: type confusion in v8 chromium-browser: use of uninitialized value in skia chromium-browser: bypass of content security policy in blink chromium-browser: use of uninitialized value in skia chromium-browser: potential https downgrade during redirect navigation
|
[
"cpe:/a:redhat:rhel_extras:6"
] | null | null | 4.3 | null |
RHSA-2023:0343
|
Red Hat Security Advisory: libtasn1 security update
|
libtasn1: Out-of-bound access in ETYPE_OK
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/o:redhat:enterprise_linux:9::baseos"
] | null | 5.9 | null | null |
RHSA-2025:2710
|
Red Hat Security Advisory: OpenShift Container Platform 4.14.49 bug fix and security update
|
buildah: Buildah allows arbitrary directory mount Podman: Buildah: CRI-O: symlink traversal vulnerability in the containers/storage library can cause Denial of Service (DoS) bind: bind9: Many records in the additional section cause CPU exhaustion podman: buildah: Container breakout by using --jobs=2 and a race condition when building a malicious Containerfile runc: file descriptor leak golang.org/x/net/html: Non-linear parsing of case-insensitive content in golang.org/x/net/html kernel: HID: core: zero-initialize the report buffer kernel: ALSA: usb-audio: Fix potential out-of-bound accesses for Extigy and Mbox devices
|
[
"cpe:/a:redhat:openshift:4.14::el8",
"cpe:/a:redhat:openshift:4.14::el9"
] | null | 5.8 | null | null |
RHSA-2023:5789
|
Red Hat Security Advisory: python-reportlab security update
|
python-reportlab: code injection in paraparser.py allows code execution
|
[
"cpe:/a:redhat:rhel_e4s:8.1::appstream"
] | null | 9.8 | null | null |
RHSA-2010:0578
|
Red Hat Security Advisory: freetype security update
|
freetype: invalid free vulnerability with possible heap corruption freetype: buffer overflow vulnerability freetype: integer overflow vulnerability in smooth/ftgrays.c freetype: heap buffer overflow vulnerability when processing certain font files Freetype demos multiple buffer overflows Freetype ftmulti buffer overflow
|
[
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws",
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2023:2805
|
Red Hat Security Advisory: xorg-x11-server-Xwayland security update
|
xorg-x11-server: buffer overflow in _GetCountedString() in xkb/xkb.c xorg-x11-server: memory leak in ProcXkbGetKbdByName() in xkb/xkb.c xorg-x11-server: XkbGetKbdByName use-after-free xorg-x11-server: XTestSwapFakeInput stack overflow xorg-x11-server: XIPassiveUngrab out-of-bounds access xorg-x11-server: XvdiSelectVideoNotify use-after-free xorg-x11-server: ScreenSaverSetAttributes use-after-free xorg-x11-server: XIChangeProperty out-of-bounds access xorg-x11-server: DeepCopyPointerClasses use-after-free leads to privilege elevation
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 7.8 | null | null |
RHSA-2019:2737
|
Red Hat Security Advisory: java-1.8.0-ibm security update
|
OpenJDK: Insufficient checks of suppressed exceptions in deserialization (Utilities, 8212328) OpenJDK: Unbounded memory allocation during deserialization in Collections (Utilities, 8213432) OpenJDK: Insufficient restriction of privileges in AccessController (Security, 8216381) OpenJDK: Missing URL format validation (Networking, 8221518) libpng: use-after-free in png_image_free in png.c JDK: Out-of-bounds access in the String.getBytes method JDK: Failure to privatize a value pulled out of the loop by versioning
|
[
"cpe:/a:redhat:network_satellite:5.8::el6"
] | null | 7.4 | 9.8 | null |
RHSA-2024:6720
|
Red Hat Security Advisory: thunderbird security update
|
mozilla: Type Confusion in Async Generators in Javascript Engine mozilla: Type confusion when looking up a property name in a "with" block mozilla: Internal event interfaces were exposed to web content when browser EventHandler listener callbacks ran mozilla: Garbage collection could mis-color cross-compartment objects in OOM conditions mozilla: WASM type confusion involving ArrayTypes mozilla: SelectElements could be shown over another site if popups are allowed mozilla: Memory safety bugs fixed in Firefox 130, Firefox ESR 128.2, and Thunderbird 128.2 thunderbird: Crash when aborting verification of OTR chat
|
[
"cpe:/a:redhat:rhel_eus:9.2::appstream"
] | null | 6.5 | null | null |
RHSA-2018:2022
|
Red Hat Security Advisory: ansible security and bug fix update
|
ansible: Failed tasks do not honour no_log option allowing for secrets to be disclosed in logs
|
[
"cpe:/a:redhat:ansible_engine:2.4::el7"
] | null | null | 5.9 | null |
RHSA-2012:0350
|
Red Hat Security Advisory: kernel security and bug fix update
|
kernel: xfs: potential buffer overflow in xfs_readlink() kernel: crypto: ghash: null pointer deref if no key is set kernel: jbd/jbd2: invalid value of first log block leads to oops kernel: kvm: device assignment DoS kernel: send(m)msg: user pointer dereferences kernel: perf, powerpc: Handle events that raise an exception without overflowing kernel: kvm: pit timer with no irqchip crashes the system kernel: xfs heap overflow kernel: kvm: syscall instruction induced guest panic kernel: igmp: Avoid zero delay when receiving odd mixture of IGMP queries
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2024:8906
|
Red Hat Security Advisory: Satellite 6.16.0 release
|
micromatch: vulnerable to Regular Expression Denial of Service github.com/jaraco/zipp: Denial of Service (infinite loop) via crafted zip file in jaraco/zipp puppet-foreman: An authentication bypass vulnerability exists in Foreman grpc: client communicating with a HTTP/2 proxy can poison the HPACK table between the proxy and the backend puppet-pulpcore: An authentication bypass vulnerability exists in pulpcore mosquitto: sending specific sequences of packets may trigger memory leak foreman: Read-only access to entire DB from templates node-tar: denial of service while parsing a tar file due to lack of folders depth validation urllib3: proxy-authorization request header is not stripped during cross-origin redirects python-django: Potential denial-of-service in django.utils.html.urlize() python-django: Username enumeration through timing difference for users with unusable passwords python-django: Potential directory-traversal in django.core.files.storage.Storage.save() python-django: Potential denial-of-service in django.utils.translation.get_supported_language_variant() python-django: Potential SQL injection in QuerySet.values() and values_list()
|
[
"cpe:/a:redhat:satellite:6.16::el8",
"cpe:/a:redhat:satellite:6.16::el9",
"cpe:/a:redhat:satellite_capsule:6.16::el8",
"cpe:/a:redhat:satellite_capsule:6.16::el9",
"cpe:/a:redhat:satellite_maintenance:6.16::el8",
"cpe:/a:redhat:satellite_maintenance:6.16::el9",
"cpe:/a:redhat:satellite_utils:6.16::el8",
"cpe:/a:redhat:satellite_utils:6.16::el9"
] | null | 7.3 | 9.8 | null |
RHSA-2020:5249
|
Red Hat Security Advisory: security update - Red Hat Ansible Tower 3.7.4-1 - RHEL7 Container
|
python-psutil: Double free because of refcount mishandling nodejs-angular: XSS due to regex-based HTML replacement nodejs-node-forge: prototype pollution via the util.setPath function mathjs: prototype pollution via the deepExtend function that runs upon configuration updates jquery: Cross-site scripting due to improper injQuery.htmlPrefilter method jquery: Untrusted code execution via <option> tag in HTML passed to DOM manipulation methods
|
[
"cpe:/a:redhat:ansible_tower:3.7::el7"
] | null | 6.1 | 7 | null |
RHSA-2013:1292
|
Red Hat Security Advisory: kernel security and bug fix update
|
kernel: mm: use-after-free in madvise_remove() Kernel: signal: information leak in tkill/tgkill Kernel: net: panic while pushing pending data out of a IPv6 socket with UDP_CORK enabled
|
[
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2020:1050
|
Red Hat Security Advisory: cups security and bug fix update
|
cups: Local privilege escalation to root due to insecure environment variable handling cups: Manipulation of cupsd.conf by a local attacker resulting in limited reads of arbitrary files as root cups: Session cookie generated by the CUPS web interface is easy to guess cups: Predictable session cookie breaks CSRF protection
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 7.3 | null |
RHSA-2023:4167
|
Red Hat Security Advisory: java-1.8.0-openjdk security update
|
OpenJDK: array indexing integer overflow issue (8304468) OpenJDK: improper handling of slash characters in URI-to-path conversion (8305312)
|
[
"cpe:/a:redhat:rhel_e4s:8.1::appstream"
] | null | 3.7 | null | null |
RHSA-2020:3581
|
Red Hat Security Advisory: git security update
|
git: Crafted URL containing new lines can cause credential leak git: Crafted URL containing new lines, empty host or lacks a scheme can cause credential leak
|
[
"cpe:/o:redhat:rhel_eus:7.7::computenode",
"cpe:/o:redhat:rhel_eus:7.7::server"
] | null | 7.5 | null | null |
RHSA-2020:0469
|
Red Hat Security Advisory: java-1.8.0-ibm security update
|
OpenJDK: Incorrect exception processing during deserialization in BeanContextSupport (Serialization, 8224909) OpenJDK: Incorrect isBuiltinStreamHandler check causing URL normalization issues (Networking, 8228548) OpenJDK: Serialization filter changes via jdk.serialFilter property modification (Serialization, 8231422) OpenJDK: Incomplete enforcement of maxDatagramSockets limit in DatagramChannelImpl (Networking, 8231795)
|
[
"cpe:/a:redhat:rhel_extras:6"
] | null | 3.7 | null | null |
RHSA-2024:9636
|
Red Hat Security Advisory: webkit2gtk3 security update
|
webkit: heap use-after-free may lead to arbitrary code execution chromium-browser: Use after free in ANGLE webkitgtk: A malicious website may cause unexpected cross-origin behavior webkitgtk: Processing web content may lead to arbitrary code execution webkit: pointer authentication bypass webkitgtk: A maliciously crafted webpage may be able to fingerprint the user webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution webkitgtk: Processing a file may lead to unexpected app termination or arbitrary code execution webkitgtk: webkit2gtk: Out-of-bounds read was addressed with improved bounds checking webkitgtk: webkit2gtk: Out-of-bounds read was addressed with improved bounds checking webkitgtk: webkit2gtk: Use-after-free was addressed with improved memory management webkitgtk: webkit2gtk: Processing maliciously crafted web content may lead to an unexpected process crash webkitgtk: Visiting a malicious website may lead to address bar spoofing webkitgtk: webkit2gtk: Processing maliciously crafted web content may lead to an unexpected process crash webkitgtk: A malicious website may exfiltrate data cross-origin webkitgtk: webkit2gtk: Processing maliciously crafted web content may lead to an unexpected process crash webkitgtk: webkit2gtk: Processing maliciously crafted web content may prevent Content Security Policy from being enforced webkit: Processing maliciously crafted web content may lead to memory corruption webkitgtk: Processing web content may lead to a denial-of-service
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 6.5 | null | null |
RHSA-2014:1034
|
Red Hat Security Advisory: tomcat security update
|
Tomcat/JBossWeb: XML parser hijack by malicious web application
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | null | null |
RHSA-2017:2645
|
Red Hat Security Advisory: satellite and spacewalk security and bug fix update
|
5: organization name allows XSS
|
[
"cpe:/a:redhat:network_satellite:5.8::el6"
] | null | null | 3.5 | null |
RHSA-2020:2796
|
Red Hat Security Advisory: Red Hat OpenShift Service Mesh servicemesh-grafana security update
|
kubernetes: YAML parsing vulnerable to "Billion Laughs" attack, allowing for remote denial of service npm-serialize-javascript: XSS via unsafe characters in serialized regular expressions npm-serialize-javascript: allows remote attackers to inject arbitrary code via the function deleteFunctions within index.js npmjs-websocket-extensions: ReDoS vulnerability in Sec-WebSocket-Extensions parser grafana: XSS annotation popup vulnerability grafana: XSS via column.title or cellLinkTooltip grafana: SSRF incorrect access control vulnerability allows unauthenticated users to make grafana send HTTP requests to any URL grafana: XSS via the OpenTSDB datasource
|
[
"cpe:/a:redhat:service_mesh:1.1::el8"
] | null | 6.1 | 7.5 | null |
RHSA-2020:3019
|
Red Hat Security Advisory: kernel security, bug fix, and enhancement update
|
kernel: denial of service in arch/powerpc/kernel/signal_32.c and arch/powerpc/kernel/signal_64.c via sigreturn() system call Kernel: vfio: access to disabled MMIO space of some devices may lead to DoS scenario
|
[
"cpe:/o:redhat:rhel_eus:7.7::computenode",
"cpe:/o:redhat:rhel_eus:7.7::server"
] | null | 5.3 | null | null |
RHSA-2024:1674
|
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.4.16 Security update
|
undertow: unrestricted request storage leads to memory exhaustion undertow: Cookie Smuggling/Spoofing ssh: Prefix truncation attack on Binary Packet Protocol (BPP) undertow: directory traversal vulnerability undertow: Out-of-memory Error after several closed connections with wildfly-http-client protocol
|
[
"cpe:/a:redhat:jboss_enterprise_application_platform:7.4::el7"
] | null | 7.5 | null | null |
RHSA-2023:4354
|
Red Hat Security Advisory: curl security update
|
curl: IDN wildcard match may lead to Improper Cerificate Validation curl: more POST-after-PUT confusion
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/o:redhat:enterprise_linux:9::baseos"
] | null | 3.7 | null | null |
RHSA-2023:3068
|
Red Hat Security Advisory: mingw-expat security update
|
expat: a use-after-free in the doContent function in xmlparse.c
|
[
"cpe:/a:redhat:enterprise_linux:8::crb"
] | null | 8.1 | null | null |
RHSA-2022:6763
|
Red Hat Security Advisory: bind security update
|
bind: BIND 9 resolvers configured to answer from cache with zero stale-answer-timeout may terminate unexpectedly bind: memory leak in ECDSA DNSSEC verification code bind: memory leaks in EdDSA DNSSEC verification code
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::crb"
] | null | 7.5 | null | null |
RHSA-2019:2079
|
Red Hat Security Advisory: Xorg security and bug fix update
|
libX11: Crash on invalid reply in XListExtensions in ListExt.c libX11: Off-by-one error in XListExtensions in ListExt.c libX11: Out of Bounds write in XListExtensions in ListExt.c libxkbcommon: Endless recursion in xkbcomp/expr.c resulting in a crash libxkbcommon: NULL pointer dereference resulting in a crash libxkbcommon: NULL pointer dereference when handling xkb_geometry libxkbcommon: Infinite loop when reaching EOL unexpectedly resulting in a crash libxkbcommon: Invalid free in ExprAppendMultiKeysymList resulting in a crash libxkbcommon: NULL pointer dereference when parsing invalid atoms in ExprResolveLhs resulting in a crash libxkbcommon: NULL pointer dereference in ExprResolveLhs resulting in a crash libxkbcommon: NULL pointer dereference in LookupModMask resulting in a crash libxkbcommon: NULL pointer dereference in ResolveStateAndPredicate resulting in a crash libxkbcommon: NULL pointer dereference in resolve_keysym resulting in a crash
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 8.1 | 3.3 | null |
RHSA-2020:5606
|
Red Hat Security Advisory: Red Hat OpenShift Container Storage 4.6 bug fix and enhancement update
|
golang.org/x/text: possibility to trigger an infinite loop in encoding/unicode could lead to crash golang: data race in certain net/http servers including ReverseProxy can lead to DoS golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs
|
[
"cpe:/a:redhat:openshift_container_storage:4.6::el8"
] | null | 7.5 | null | null |
RHSA-2016:1625
|
Red Hat Security Advisory: Red Hat JBoss Core Services Apache HTTP 2.4.6 Service Pack 1 security update
|
HTTPD: sets environmental variable based on user supplied Proxy request header
|
[
"cpe:/a:redhat:jboss_core_services:1"
] | null | null | 5 | null |
RHSA-2015:0645
|
Red Hat Security Advisory: redhat-access-plugin-openstack security update
|
dashboard: log file arbitrary file retrieval
|
[
"cpe:/a:redhat:openstack:6::el7"
] | null | null | null | null |
RHSA-2023:5214
|
Red Hat Security Advisory: libwebp security update
|
libwebp: Heap buffer overflow in WebP Codec libwebp: out-of-bounds write with a specially crafted WebP lossless file
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::crb"
] | null | 0 | null | null |
RHSA-2013:1500
|
Red Hat Security Advisory: gc security update
|
gc: malloc() and calloc() overflows
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2019:0671
|
Red Hat Security Advisory: firefox security update
|
Mozilla: IonMonkey MArraySlice has incorrect alias information Mozilla: Ionmonkey type confusion with __proto__ mutations
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 8.8 | null |
RHSA-2024:9978
|
Red Hat Security Advisory: RHOSP 17.1.4 (openstack-tripleo-heat-templates) security update
|
rhosp-director: cleartext passwords exposed in logs
|
[
"cpe:/a:redhat:openstack:17.1::el9"
] | null | 5.5 | null | null |
RHSA-2024:5199
|
Red Hat Security Advisory: OpenShift Container Platform 4.12.63 security and extras update
|
go-retryablehttp: url might write sensitive information to log file
|
[
"cpe:/a:redhat:openshift:4.12::el8"
] | null | 6 | null | null |
RHSA-2023:1894
|
Red Hat Security Advisory: Multicluster Engine for Kubernetes 2.1 hotfix security update for console
|
vm2: sandbox escape vm2: Sandbox Escape vm2: Sandbox Escape when exception sanitization
|
[
"cpe:/a:redhat:multicluster_engine:2.1::el8"
] | null | 9.8 | null | null |
RHSA-2014:0124
|
Red Hat Security Advisory: Apache Camel security update
|
Camel: remote code execution via header field manipulation
|
[
"cpe:/a:redhat:jboss_fuse_service_works:6.0"
] | null | null | null | null |
RHSA-2024:6612
|
Red Hat Security Advisory: fence-agents security update
|
pypa/setuptools: Remote code execution via download functions in the package_index module in pypa/setuptools
|
[
"cpe:/a:redhat:rhel_e4s:9.0::appstream",
"cpe:/a:redhat:rhel_e4s:9.0::highavailability",
"cpe:/a:redhat:rhel_e4s:9.0::resilientstorage"
] | null | 8.8 | null | null |
RHSA-2022:0073
|
Red Hat Security Advisory: cpio security update
|
cpio: improper input validation when writing tar header fields leads to unexpected tar generation
|
[
"cpe:/o:redhat:rhel_eus:8.2::baseos"
] | null | null | 6.7 | null |
RHSA-2020:4007
|
Red Hat Security Advisory: systemd security and bug fix update
|
systemd: memory leak in button_open() in login/logind-button.c when udev events are received
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 2.4 | null | null |
RHSA-2021:0968
|
Red Hat Security Advisory: Red Hat Single Sign-On 7.4.6 security update on RHEL 7
|
nodejs-angular: XSS due to regex-based HTML replacement keycloak: reusable "state" parameter at redirect_uri endpoint enables possibility of replay attacks
|
[
"cpe:/a:redhat:red_hat_single_sign_on:7::el7"
] | null | 3.5 | null | null |
RHSA-2018:1348
|
Red Hat Security Advisory: kernel security update
|
Kernel: KVM: error in exception handling leads to wrong debug stack value Kernel: error in exception handling leads to DoS kernel: ptrace() incorrect error handling leads to corruption and DoS
|
[
"cpe:/o:redhat:rhel_eus:7.3::computenode",
"cpe:/o:redhat:rhel_eus:7.3::server"
] | null | null | 7.8 | null |
RHSA-2003:275
|
Red Hat Security Advisory: : Updated CUPS packages fix denial of service
|
security flaw
|
[
"cpe:/o:redhat:linux:8.0",
"cpe:/o:redhat:linux:9"
] | null | null | null | null |
RHSA-2022:5641
|
Red Hat Security Advisory: kpatch-patch security update
|
kernel: a use-after-free write in the netfilter subsystem can lead to privilege escalation to root
|
[
"cpe:/o:redhat:rhel_eus:8.4::baseos"
] | null | 7.8 | null | null |
RHSA-2011:1615
|
Red Hat Security Advisory: virt-v2v security and bug fix update
|
virt-v2v: vnc password protection is missing after vm conversion
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2016:1773
|
Red Hat Security Advisory: Red Hat OpenShift Enterprise 2.2.10 security, bug fix, and enhancement update
|
CXF: SSL hostname verification bypass, incomplete CVE-2012-6153 fix apache-commons-collections: InvokerTransformer code execution during deserialisation jenkins: Remote code execution vulnerability in remoting module (SECURITY-232) jenkins: HTTP response splitting vulnerability (SECURITY-238) jenkins: Non-constant time comparison of API token (SECURITY-241) jenkins: Non-constant time comparison of CSRF crumbs (SECURITY-245) jenkins: Remote code execution through remote API (SECURITY-247) jenkins: Arbitrary build parameters are passed to build scripts as environment variables (SECURITY-170) jenkins: Malicious users with multiple user accounts can prevent other users from logging in (SECURITY-243) jenkins: Information on installed plugins exposed via API (SECURITY-250) jenkins: Encrypted secrets (e.g. passwords) were leaked to users with permission to read configuration (SECURITY-266) jenkins: Regular users can trigger download of update site metadata (SECURITY-273) jenkins: Open redirect to scheme-relative URLs (SECURITY-276) jenkins: Granting the permission to read node configurations allows access to overall system configuration (SECURITY-281)
|
[
"cpe:/a:redhat:openshift:2.0::el6"
] | null | null | 4.8 | null |
RHSA-2023:4885
|
Red Hat Security Advisory: Red Hat OpenShift support for Windows Containers 8.0.2 security update
|
kubernetes: Insufficient input sanitization on Windows nodes leads to privilege escalation kubernetes: Insufficient input sanitization on Windows nodes leads to privilege escalation
|
[
"cpe:/a:redhat:openshift:4.13::el9"
] | null | 8.8 | null | null |
RHSA-2013:1050
|
Red Hat Security Advisory: php53 security update
|
php: xml_parse_into_struct buffer overflow when parsing deeply nested XML
|
[
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2024:10236
|
Red Hat Security Advisory: Red Hat OpenShift Dev Spaces 3.17.0 release
|
nodejs-ip: arbitrary code execution via the isPublic() function jsonpath-plus: Remote Code Execution in jsonpath-plus via Improper Input Sanitization node-ip: Incomplete fix for CVE-2023-42282 go/parser: golang: Calling any of the Parse functions containing deeply nested literals can cause a panic/stack exhaustion encoding/gob: golang: Calling Decoder.Decode on a message which contains deeply nested structures can cause a panic due to stack exhaustion path-to-regexp: Backtracking regular expressions cause ReDoS find-my-way: ReDoS vulnerability in multiparametric routes dompurify: nesting-based mutation XSS vulnerability elliptic: Missing Validation in Elliptic's EDDSA Signature Verification
|
[
"cpe:/a:redhat:openshift_devspaces:3::el8"
] | null | 8.2 | null | null |
RHSA-2014:0884
|
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 6.2.4 security update
|
PicketLink: XXE via insecure DocumentBuilderFactory usage
|
[
"cpe:/a:redhat:jboss_enterprise_application_platform:6.2.4"
] | null | null | null | null |
RHSA-2019:0633
|
Red Hat Security Advisory: ghostscript security and bug fix update
|
ghostscript: superexec operator is available (700585) ghostscript: forceput in DefineResource is still accessible (700576)
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 7.3 | null |
RHSA-2018:2274
|
Red Hat Security Advisory: Red Hat Ceph Storage 2.5 security, enhancement, and bug fix update
|
ceph: cephx protocol is vulnerable to replay attack ceph: cephx uses weak signatures ceph: ceph-mon does not perform authorization on OSD pool ops
|
[
"cpe:/a:redhat:ceph_storage:2::ubuntu16.04"
] | null | null | 4.6 | null |
RHSA-2011:0897
|
Red Hat Security Advisory: JBoss Enterprise Web Server 1.0.2 update
|
tomcat: information disclosure in authentication headers mod_dav: DoS (httpd child process crash) by parsing URI structure with missing path segments apr-util: high memory consumption in apr_brigade_split_line() tomcat: file permission bypass flaw tomcat: cross-site-scripting vulnerability in the manager application tomcat: XSS vulnerability in HTML Manager interface apr: unconstrained recursion in apr_fnmatch httpd: mod_proxy_ajp worker moved to error state when timeout exceeded
|
[
"cpe:/a:redhat:jboss_enterprise_web_server:1::el4",
"cpe:/a:redhat:jboss_enterprise_web_server:1::el5",
"cpe:/a:redhat:jboss_enterprise_web_server:1::el6"
] | null | null | null | null |
RHSA-2012:0143
|
Red Hat Security Advisory: xulrunner security update
|
libpng: Heap buffer overflow in png_decompress_chunk (MFSA 2012-11)
|
[
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server",
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHBA-2019:3304
|
Red Hat Bug Fix Advisory: OpenShift Container Platform 4.2.4 bug fix update
|
golang: HTTP/1.1 headers with a space before the colon leads to filter bypass or request smuggling
|
[
"cpe:/a:redhat:openshift:4.2::el7",
"cpe:/a:redhat:openshift:4.2::el8"
] | null | null | 6.5 | null |
RHSA-2024:1501
|
Red Hat Security Advisory: grafana security update
|
golang-fips/openssl: Memory leaks in code encrypting and decrypting RSA payloads
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 7.5 | null | null |
RHSA-2024:1823
|
Red Hat Security Advisory: OpenJDK 17.0.11 Security Update for Portable Linux Builds
|
OpenJDK: long Exception message leading to crash (8319851) OpenJDK: HTTP/2 client improper reverse DNS lookup (8315708) OpenJDK: integer overflow in C1 compiler address generation (8322122) OpenJDK: C2 compilation fails with "Exceeded _node_regs array" (8317507)
|
[
"cpe:/a:redhat:openjdk:17"
] | null | 3.7 | null | null |
RHSA-2022:4845
|
Red Hat Security Advisory: zlib security update
|
zlib: A flaw found in zlib when compressing (not decompressing) certain inputs
|
[
"cpe:/a:redhat:rhel_eus:8.4::crb",
"cpe:/o:redhat:rhel_eus:8.4::baseos"
] | null | 8.2 | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.