id
stringlengths 13
15
| title
stringlengths 29
176
| description
stringlengths 8
32.1k
| cpes
listlengths 0
20
| cvss_v4_0
null | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
null |
---|---|---|---|---|---|---|---|
RHSA-2024:1856
|
Red Hat Security Advisory: opencryptoki security update
|
opencryptoki: timing side-channel in handling of RSA PKCS#1 v1.5 padded ciphertexts (Marvin)
|
[
"cpe:/a:redhat:rhel_eus:9.2::crb",
"cpe:/o:redhat:rhel_eus:9.2::baseos"
] | null | 5.9 | null | null |
RHBA-2020:3527
|
Red Hat Bug Fix Advisory: kernel-rt bug fix update
|
kernel: triggering AP to send IAPP location updates for stations before the required authentication process has completed can lead to DoS
|
[
"cpe:/a:redhat:rhel_extras_rt:7"
] | null | 6.5 | null | null |
RHSA-2013:0625
|
Red Hat Security Advisory: java-1.6.0-ibm security update
|
JDK: unspecified vulnerability fixed in 6u39 and 7u13 (Deployment) JDK: unspecified vulnerability fixed in 6u39 and 7u13 (Scripting) JDK: unspecified vulnerability fixed in 6u39 and 7u13 (Deployment) OpenJDK: disable Gopher support by default (Gopher, 7189567) JDK: unspecified vulnerability fixed in 6u39 and 7u13 (Deployment) JDK: unspecified vulnerability fixed in 6u39 and 7u13 (JMX) JDK: unspecified vulnerability fixed in 6u39 and 7u13 (Deployment) JDK: unspecified vulnerability fixed in 6u39 and 7u13 (Deployment) OpenJDK: RMI CGIHandler XSS issue (RMI, 6563318) OpenJDK: logging insufficient access control checks (Libraries, 6664509) OpenJDK: logging insufficient access control checks (Libraries, 6664528) OpenJDK: invalid threads subject to interrupts (Libraries, 6776941) OpenJDK: reflection API incorrect checks for proxy classes (Libraries, 7197546, SE-2012-01 Issue 29) OpenJDK: insufficient clipboard access premission checks (AWT, 7186952) OpenJDK: InetSocketAddress serialization issue (Networking, 7201071) OpenJDK: loadPropertyFile missing restrictions (JAXP, 8001235) OpenJDK: com.sun.xml.internal.* not restricted packages (JAX-WS, 7201068) JDK: unspecified vulnerability fixed in 6u39 and 7u13 (Deployment) OpenJDK: CPU consumption DoS via repeated SSL ClientHello packets (JSSE, 7192393) OpenJDK: missing serialization restriction (CORBA, 7201066) OpenJDK: insufficient privilege checking issue (AWT, 7192977) OpenJDK: insufficient Diffie-Hellman public key checks (JSSE, 7192392) OpenJDK: insufficient privilege checking issue (AWT, 8001057) JDK: unspecified vulnerability fixed in 6u39 and 7u13 (Deployment) OpenJDK: RequiredModelMBean missing access control context checks (JMX, 8000537) OpenJDK: Specially crafted sample model integer overflow (2D, 8007014) JDK: unspecified vulnerability fixed in 6u39 and 7u13 (Deployment) OpenJDK: missing ValueHandlerImpl class constructor access restriction (CORBA, 8000631) OpenJDK: image parser insufficient raster parameter checks (2D, 8001972) OpenJDK: image parser insufficient raster parameter checks (AWT, 8002325) JDK: unspecified vulnerability fixed in 6u39 (Sound) OpenJDK: MBeanServer insufficient privilege restrictions (JMX, 8006446) JDK: unspecified vulnerability fixed in 6u41 and 7u15 (Deployment) OpenJDK: CMM malformed raster memory corruption (2D, 8007675)
|
[
"cpe:/a:redhat:rhel_extras:5::server",
"cpe:/a:redhat:rhel_extras:6"
] | null | null | null | null |
RHSA-2016:1019
|
Red Hat Security Advisory: qemu-kvm-rhev security update
|
qemu: incorrect banked access bounds checking in vga module
|
[
"cpe:/a:redhat:openstack:5::el6"
] | null | null | 7.6 | null |
RHSA-2024:8831
|
Red Hat Security Advisory: bcc security update
|
bcc: unprivileged users can force loading of compromised linux headers
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb"
] | null | 2.8 | null | null |
RHSA-2021:2790
|
Red Hat Security Advisory: shim and fwupd security update
|
grub2: acpi command allows privileged user to load crafted ACPI tables when Secure Boot is enabled grub2: Use-after-free in rmmod command grub2: Out-of-bounds write in grub_usb_device_initialize() grub2: Stack buffer overflow in grub_parser_split_cmdline() grub2: cutmem command allows privileged user to remove memory regions when Secure Boot is enabled grub2: Heap out-of-bounds write in short form option parser grub2: Heap out-of-bounds write due to miscalculation of space required for quoting
|
[
"cpe:/a:redhat:rhel_eus:8.2::crb",
"cpe:/o:redhat:rhel_eus:8.2::baseos"
] | null | 7.5 | null | null |
RHSA-2020:3286
|
Red Hat Security Advisory: postgresql-jdbc security update
|
postgresql-jdbc: XML external entity (XXE) vulnerability in PgSQLXML
|
[
"cpe:/a:redhat:rhel_eus:8.1::appstream"
] | null | 7.7 | null | null |
RHSA-2024:1265
|
Red Hat Security Advisory: OpenShift Container Platform 4.12.53 bug fix and security update
|
helm: getHostByName Function Information Disclosure
|
[
"cpe:/a:redhat:openshift:4.12::el8",
"cpe:/a:redhat:openshift:4.12::el9"
] | null | 4.3 | null | null |
RHSA-2016:0455
|
Red Hat Security Advisory: ruby193 security update
|
rubygem-actionpack: Timing attack vulnerability in basic authentication in Action Controller rubygem-activerecord: Nested attributes rejection proc bypass in Active Record rubygem-actionpack: possible object leak and denial of service attack in Action Pack rubygem-actionpack: directory traversal flaw in Action View rubygem-actionpack: directory traversal in Action View, incomplete CVE-2016-0752 fix rubygem-actionpack: code injection vulnerability in Action View
|
[
"cpe:/a:redhat:rhel_software_collections:2::el6",
"cpe:/a:redhat:rhel_software_collections:2::el7"
] | null | null | null | null |
RHSA-2022:1292
|
Red Hat Security Advisory: Release of OpenShift Serverless 1.21.1
|
spring-cloud-function: Remote code execution by malicious Spring Expression
|
[
"cpe:/a:redhat:serverless:1.21::el8"
] | null | 9.8 | null | null |
RHSA-2025:3550
|
Red Hat Security Advisory: libreoffice security update
|
libreoffice: Macro URL arbitrary script execution
|
[
"cpe:/a:redhat:rhel_e4s:9.0::appstream"
] | null | 7.6 | null | null |
RHSA-2020:2562
|
Red Hat Security Advisory: EAP Continuous Delivery Technical Preview Release 13 security update
|
undertow: Client can use bogus uri in Digest authentication undertow: HTTP header injection using CRLF with UTF-8 Encoding (incomplete fix of CVE-2016-4993) jackson-databind: incomplete fix for CVE-2017-7525 permits unsafe serialization via c3p0 libraries guava: Unbounded memory allocation in AtomicDoubleArray and CompoundOrdering classes allow remote attackers to cause a denial of service wildfly-core: Path traversal can allow the extraction of .war archives to write arbitrary files (Zip Slip)
|
[
"cpe:/a:redhat:jboss_enterprise_application_platform_cd:13"
] | null | null | 7.6 | null |
RHSA-2015:1583
|
Red Hat Security Advisory: kernel security and bug fix update
|
kernel: ping sockets: use-after-free leading to local privilege escalation
|
[
"cpe:/o:redhat:rhel_eus:6.5::computenode",
"cpe:/o:redhat:rhel_eus:6.5::server"
] | null | null | null | null |
RHSA-2012:0034
|
Red Hat Security Advisory: java-1.6.0-ibm security update
|
HTTPS: block-wise chosen-plaintext attack against SSL/TLS (BEAST) JDK: unspecified vulnerability fixed in 6u29 (Deployment) OpenJDK: IIOP deserialization code execution (Deserialization, 7055902) OpenJDK: missing SecurityManager checks in scripting engine (Scripting, 7046823) JDK: unspecified vulnerability fixed in 6u29 (Sound) JDK: unspecified vulnerability fixed in 6u29 (Deployment) OpenJDK: InputStream skip() information leak (Networking/IO, 7000600) OpenJDK: mutable static AWTKeyStroke.ctor (AWT, 7019773) JDK: unspecified vulnerability fixed in 6u29 (Swing) JDK: unspecified vulnerability fixed in 6u29 (AWT) OpenJDK: Java2D TransformHelper integer overflow (2D, 7023640) OpenJDK: excessive default UDP socket limit under SecurityManager (Networking, 7032417) OpenJDK: JAX-WS stack-traces information leak (JAX-WS, 7046794) OpenJDK: insufficient pack200 JAR files uncompress error checks (Runtime, 7057857) OpenJDK: RMI DGC server remote code execution (RMI, 7077466) OpenJDK: RMI registry privileged code execution (RMI, 7083012) OpenJDK: missing checkSetFactory calls in HttpsURLConnection (JSSE, 7096936) JDK: unspecified vulnerability fixed in 6u29 (Deployment)
|
[
"cpe:/a:redhat:rhel_extras:4",
"cpe:/a:redhat:rhel_extras:5::client",
"cpe:/a:redhat:rhel_extras:5::server",
"cpe:/a:redhat:rhel_extras:6"
] | null | null | null | null |
RHSA-2020:1765
|
Red Hat Security Advisory: cups security and bug fix update
|
cups: stack-buffer-overflow in libcups's asn1_get_type function cups: stack-buffer-overflow in libcups's asn1_get_packed function
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | null | 3.5 | null |
RHSA-2016:1041
|
Red Hat Security Advisory: thunderbird security update
|
Mozilla: Miscellaneous memory safety hazards (rv:38.8) (MFSA 2016-39) Mozilla: Miscellaneous memory safety hazards (rv:46.0 / rv:45.1 / rv:38.8) (MFSA 2016-39)
|
[
"cpe:/a:redhat:rhel_productivity:5",
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation",
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | null | null |
RHSA-2024:4051
|
Red Hat Security Advisory: pki-core security update
|
ca: token authentication bypass vulnerability
|
[
"cpe:/a:redhat:rhel_eus:9.2::appstream"
] | null | 7.5 | null | null |
RHSA-2022:1842
|
Red Hat Security Advisory: exiv2 security, bug fix, and enhancement update
|
exiv2: stack exhaustion issue in the printIFDStructure function may lead to DoS
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb"
] | null | 6.5 | null | null |
RHSA-2018:2569
|
Red Hat Security Advisory: java-1.7.1-ibm security update
|
JDK: DoS in the java.math component JDK: path traversal flaw in the Diagnostic Tooling Framework JDK: unspecified vulnerability fixed in 6u201, 7u191, 8u181, and 10.0.2 (Libraries) OpenJDK: insufficient index validation in PatternSyntaxException getMessage() (Concurrency, 8199547) JDK: unspecified vulnerability fixed in 6u201, 7u191, 8u181, and 10.0.2 (JSSE) JDK: privilege escalation via insufficiently restricted access to Attach API
|
[
"cpe:/a:redhat:rhel_extras:7"
] | null | null | 8.4 | null |
RHSA-2011:1341
|
Red Hat Security Advisory: firefox security update
|
Mozilla: Code installation through holding down Enter (MFSA 2011-40) Mozilla: Miscellaneous memory safety hazards (MFSA 2011-36) Mozilla: Integer underflow when using JavaScript RegExp (MFSA 2011-37) Mozilla: XSS via plugins and shadowed window.location object (MFSA 2011-38) Mozilla: Defense against multiple Location headers due to CRLF Injection (MFSA 2011-39)
|
[
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws",
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server",
"cpe:/o:redhat:enterprise_linux:6::server"
] | null | null | null | null |
RHSA-2024:0433
|
Red Hat Security Advisory: linux-firmware security update
|
amd: Return Address Predictor vulnerability leading to information disclosure
|
[
"cpe:/o:redhat:rhel_eus:9.0::baseos"
] | null | 5.6 | null | null |
RHSA-2021:1751
|
Red Hat Security Advisory: mailman:2.1 security update
|
mailman: arbitrary content injection via the options login page mailman: arbitrary content injection via the private archive login page
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 4.7 | null | null |
RHSA-2012:0683
|
Red Hat Security Advisory: bind-dyndb-ldap security update
|
bind-dyndb-ldap: Bind DoS (named hang) by processing DNS query for zone served by bind-dyndb-ldap
|
[
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2003:029
|
Red Hat Security Advisory: : : : Updated lynx packages fix CRLF injection vulnerability
|
security flaw
|
[
"cpe:/o:redhat:linux:6.2",
"cpe:/o:redhat:linux:7.0",
"cpe:/o:redhat:linux:7.1",
"cpe:/o:redhat:linux:7.2",
"cpe:/o:redhat:linux:7.3",
"cpe:/o:redhat:linux:8.0"
] | null | null | null | null |
RHSA-2007:0150
|
Red Hat Security Advisory: freetype security update
|
Multiple font integer overflows (CVE-2007-1352)
|
[
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws",
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws",
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2020:1349
|
Red Hat Security Advisory: krb5-appl security update
|
telnet-server: no bounds checks in nextitem() function allows to remotely execute arbitrary code
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | 9.8 | null | null |
RHSA-2018:0576
|
Red Hat Security Advisory: Red Hat JBoss BRMS 6.4.9 security update
|
jackson-databind: Unsafe deserialization due to incomplete black list (incomplete fix for CVE-2017-7525)
|
[
"cpe:/a:redhat:jboss_enterprise_brms_platform:6.4"
] | null | null | 8.1 | null |
RHSA-2023:0675
|
Red Hat Security Advisory: tigervnc and xorg-x11-server security update
|
xorg-x11-server: DeepCopyPointerClasses use-after-free leads to privilege elevation
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 7.8 | null | null |
RHSA-2024:0692
|
Red Hat Security Advisory: Errata Advisory for Red Hat OpenShift GitOps 1.10.2 security update
|
go-git: Maliciously crafted Git server replies can cause DoS on go-git clients go-git: Maliciously crafted Git server replies can lead to path traversal and RCE on go-git clients argo-cd: vulnerable to a cross-server request forgery (CSRF) attack
|
[
"cpe:/a:redhat:openshift_gitops:1.10::el8"
] | null | 8.3 | null | null |
RHSA-2014:0887
|
Red Hat Security Advisory: JBoss Remoting security update
|
5: Remote code execution via unauthenticated JMX/RMI connector
|
[
"cpe:/a:redhat:jboss_enterprise_application_platform:5.2",
"cpe:/a:redhat:jboss_enterprise_brms_platform:5.3.1",
"cpe:/a:redhat:jboss_enterprise_portal_platform:5.2.2",
"cpe:/a:redhat:jboss_enterprise_soa_platform:5.3.1"
] | null | null | null | null |
RHSA-2018:2666
|
Red Hat Security Advisory: chromium-browser security update
|
chromium-browser: Out of bounds write in V8 chromium-browser: Out of bounds read in Blink chromium-browser: Out of bounds read in WebAudio chromium-browser: Out of bounds write in Mojo chromium-browser: Out of bounds read in SwiftShader chromium-browser: Integer overflow in Skia chromium-browser: Use after free in WebRTC chromium-browser: Site Isolation bypass after tab restore chromium-browser: Site Isolation bypass using Blob URLS chromium-browser: Local file access in Blink chromium-browser: Out of bounds read in PDFium chromium-browser: Content security policy bypass in Blink chromium-browser: Credit card information leak in Autofill chromium-browser: URL spoof in permission dialogs chromium-browser: URL spoof in full screen mode chromium-browser: Local file access in DevTools chromium-browser: Stack buffer overflow in SwiftShader chromium-browser: Out of bounds read in WebRTC chromium-browser: User confirmation bypass in external protocol handling chromium-browser: Use after free in Memory Instrumentation chromium-browser: Script injection in New Tab Page chromium-browser: Multiple download restriction bypass chromium-browser: User gesture requirement bypass
|
[
"cpe:/a:redhat:rhel_extras:6"
] | null | null | 4.3 | null |
RHSA-2023:1251
|
Red Hat Security Advisory: kpatch-patch security update
|
kernel: use-after-free caused by l2cap_reassemble_sdu() in net/bluetooth/l2cap_core.c kernel: stack overflow in do_proc_dointvec and proc_skip_spaces
|
[
"cpe:/o:redhat:rhel_eus:8.4::baseos"
] | null | 7.8 | null | null |
RHSA-2023:0337
|
Red Hat Security Advisory: expat security update
|
expat: use-after free caused by overeager destruction of a shared DTD in XML_ExternalEntityParserCreate
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/o:redhat:enterprise_linux:9::baseos"
] | null | 7.5 | null | null |
RHSA-2021:0343
|
Red Hat Security Advisory: perl security update
|
perl: heap-based buffer overflow in regular expression compiler leads to DoS perl: corruption of intermediate language state of compiled regular expression due to integer overflow leads to DoS perl: corruption of intermediate language state of compiled regular expression due to recursive S_study_chunk() calls leads to DoS
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 7.5 | null | null |
RHSA-2024:6882
|
Red Hat Security Advisory: Red Hat Single Sign-On 7.6.11 for OpenShift image enhancement update
|
keycloak-saml-core: Improper Verification of SAML Responses Leading to Privilege Escalation in Keycloak Keycloak: Vulnerable Redirect URI Validation Results in Open Redirec
|
[
"cpe:/a:redhat:rhosemc:1.0::el8"
] | null | 6.1 | null | null |
RHSA-2013:0622
|
Red Hat Security Advisory: kernel-rt security and bug fix update
|
kernel: block: default SCSI command filter does not accomodate commands overlap across device classes kernel: x86/msr: /dev/cpu/*/msr local privilege escalation kernel: net: infinite loop in __skb_recv_datagram() kernel: race condition with PTRACE_SETREGS kernel: sock_diag: out-of-bounds access to sock_diag_handlers[]
|
[
"cpe:/a:redhat:enterprise_mrg:2:server:el6"
] | null | null | null | null |
RHSA-2006:0157
|
Red Hat Security Advisory: struts security update for Red Hat Application Server
|
security flaw
|
[
"cpe:/a:redhat:rhel_application_server:1"
] | null | null | null | null |
RHSA-2018:1374
|
Red Hat Security Advisory: kernel-alt security and bug fix update
|
hw: cpu: speculative execution permission faults handling kernel: ptrace() incorrect error handling leads to corruption and DoS
|
[
"cpe:/o:redhat:enterprise_linux:7::server"
] | null | null | 7.8 | null |
RHSA-2010:0141
|
Red Hat Security Advisory: tar security update
|
tar/cpio stack crashing in safer_name_suffix cpio: Heap-based buffer overflow by expanding a specially-crafted archive
|
[
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws",
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2011:0871
|
Red Hat Security Advisory: tigervnc security update
|
tigervnc: vncviewer can send password to server without proper validation of the X.509 certificate
|
[
"cpe:/o:redhat:enterprise_linux:6::server"
] | null | null | null | null |
RHSA-2021:2521
|
Red Hat Security Advisory: virt:8.2 and virt-devel:8.2 security update
|
QEMU: msix: OOB access during mmio operations may lead to DoS qemu: out-of-bound heap buffer access via an interrupt ID field
|
[
"cpe:/a:redhat:advanced_virtualization:8.2::el8"
] | null | 2.5 | null | null |
RHSA-2013:0124
|
Red Hat Security Advisory: net-snmp security and bug fix update
|
net-snmp: Array index error, leading to out-of heap-based buffer read (snmpd crash)
|
[
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2023:3587
|
Red Hat Security Advisory: thunderbird security update
|
Mozilla: Click-jacking certificate exceptions through rendering lag Mozilla: Memory safety bugs fixed in Firefox 114 and Firefox ESR 102.12
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 9.8 | null | null |
RHSA-2024:9984
|
Red Hat Security Advisory: RHOSP 17.1.4 (python-sqlparse) security update
|
sqlparse: parsing heavily nested list leads to denial of service
|
[
"cpe:/a:redhat:openstack:17.1::el9"
] | null | 7.5 | null | null |
RHSA-2010:0167
|
Red Hat Security Advisory: gnutls security update
|
TLS: MITM attacks via session renegotiation gnutls: gnutls_x509_crt_get_serial incorrect serial decoding from ASN1 (BE64) [GNUTLS-SA-2010-1]
|
[
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2024:6661
|
Red Hat Security Advisory: python3-setuptools security update
|
pypa/setuptools: Remote code execution via download functions in the package_index module in pypa/setuptools
|
[
"cpe:/o:redhat:rhel_els:7"
] | null | 8.8 | null | null |
RHSA-2012:0469
|
Red Hat Security Advisory: acroread security update
|
acroread: multiple unspecified flaws (APSB12-08, APSB12-01) acroread: multiple unspecified flaws (APSB12-08, APSB12-01) acroread: multiple unspecified flaws (APSB12-08, APSB12-01) acroread: multiple unspecified flaws (APSB12-08, APSB12-01) acroread: multiple unspecified flaws (APSB12-08, APSB12-01) acroread: multiple unspecified flaws (APSB12-08, APSB12-01) acroread: multiple unspecified flaws (APSB12-08, APSB12-01)
|
[
"cpe:/a:redhat:rhel_extras:5::client",
"cpe:/a:redhat:rhel_extras:5::server",
"cpe:/a:redhat:rhel_extras:6"
] | null | null | null | null |
RHSA-2014:0090
|
Red Hat Security Advisory: openstack-heat security, bug fix, and enhancement update
|
Heat: CFN policy rules not all enforced Heat: ReST API doesn't respect tenant scoping
|
[
"cpe:/a:redhat:openstack:4::el6"
] | null | null | null | null |
RHSA-2004:093
|
Red Hat Security Advisory: : Updated sysstat packages fix security vulnerabilities
|
security flaw
|
[
"cpe:/o:redhat:linux:9"
] | null | null | null | null |
RHSA-2023:6635
|
Red Hat Security Advisory: c-ares security, bug fix, and enhancement update
|
c-ares: buffer overflow in config_sortlist() due to missing string length check c-ares: AutoTools does not set CARES_RANDOM_FILE during cross compilation c-ares: Buffer Underwrite in ares_inet_net_pton() c-ares: Insufficient randomness in generation of DNS query IDs
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/o:redhat:enterprise_linux:9::baseos"
] | null | 5.9 | null | null |
RHSA-2017:0057
|
Red Hat Security Advisory: flash-plugin security update
|
flash-plugin: multiple code execution issues fixed in APSB17-02 flash-plugin: multiple code execution issues fixed in APSB17-02 flash-plugin: multiple code execution issues fixed in APSB17-02 flash-plugin: multiple code execution issues fixed in APSB17-02 flash-plugin: multiple code execution issues fixed in APSB17-02 flash-plugin: multiple code execution issues fixed in APSB17-02 flash-plugin: multiple code execution issues fixed in APSB17-02 flash-plugin: multiple code execution issues fixed in APSB17-02 flash-plugin: multiple code execution issues fixed in APSB17-02 flash-plugin: multiple code execution issues fixed in APSB17-02 flash-plugin: multiple code execution issues fixed in APSB17-02 flash-plugin: multiple code execution issues fixed in APSB17-02 flash-plugin: multiple code execution issues fixed in APSB17-02
|
[
"cpe:/a:redhat:rhel_extras:6"
] | null | null | 8.8 | null |
RHSA-2019:2670
|
Red Hat Security Advisory: chromium-browser security update
|
chromium-browser: Use-after-free in Blink
|
[
"cpe:/a:redhat:rhel_extras:6"
] | null | null | 8.8 | null |
RHSA-2003:258
|
Red Hat Security Advisory: : GDM allows local user to read any file.
|
security flaw security flaw security flaw
|
[
"cpe:/o:redhat:linux:7.1",
"cpe:/o:redhat:linux:7.2",
"cpe:/o:redhat:linux:7.3",
"cpe:/o:redhat:linux:8.0",
"cpe:/o:redhat:linux:9"
] | null | null | null | null |
RHSA-2019:3200
|
Red Hat Security Advisory: Red Hat AMQ Streams 1.3.0 release and security update
|
jackson-databind: polymorphic typing issue allows attacker to read arbitrary local files on the server. jackson-databind: failure to block the logback-core class from polymorphic deserialization leading to remote code execution jackson-databind: polymorphic typing issue allows attacker to read arbitrary local files on the server via crafted JSON message. jackson-databind: default typing mishandling leading to remote code execution jackson-databind: Polymorphic typing issue related to logback/JNDI jackson-databind: Serialization gadgets in com.zaxxer.hikari.HikariConfig jackson-databind: Serialization gadgets in com.zaxxer.hikari.HikariDataSource jackson-databind: Serialization gadgets in classes of the ehcache package
|
[
"cpe:/a:redhat:amq_streams:1"
] | null | null | 7.5 | null |
RHSA-2020:3141
|
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.3 security update
|
wildfly: unsafe deserialization in Wildfly Enterprise Java Beans wildfly: Some EJB transaction objects may get accumulated causing Denial of Service wildfly: EJB SessionOpenInvocations may not be removed properly after a response is received causing Denial of Service
|
[
"cpe:/a:redhat:jboss_enterprise_application_platform:7.3::el6",
"cpe:/a:redhat:jboss_enterprise_application_platform:7.3::el7",
"cpe:/a:redhat:jboss_enterprise_application_platform:7.3::el8"
] | null | 6.5 | null | null |
RHSA-2017:2692
|
Red Hat Security Advisory: openvswitch security update
|
openvswitch: Integer underflow in the ofputil_pull_queue_get_config_reply10 function openvswitch: Invalid processing of a malicious OpenFlow role status message openvswitch: Buffer over-read while parsing the group mod OpenFlow message
|
[
"cpe:/a:redhat:openstack:8::el7"
] | null | null | 5.6 | null |
RHSA-2005:284
|
Red Hat Security Advisory: kernel security update
|
security flaw security flaw security flaw security flaw security flaw
|
[
"cpe:/o:redhat:enterprise_linux:2.1::as",
"cpe:/o:redhat:enterprise_linux:2.1::aw"
] | null | null | null | null |
RHSA-2023:2104
|
Red Hat Security Advisory: Red Hat Advanced Cluster Management 2.5.8 security updates and bug fixes
|
http-cache-semantics: Regular Expression Denial of Service (ReDoS) vulnerability
|
[
"cpe:/a:redhat:acm:2.5::el8"
] | null | 7.5 | null | null |
RHSA-2022:1490
|
Red Hat Security Advisory: java-1.8.0-openjdk security update
|
OpenJDK: Unbounded memory allocation when compiling crafted XPath expressions (JAXP, 8270504) OpenJDK: Improper object-to-string conversion in AnnotationInvocationHandler (Libraries, 8277672) OpenJDK: Missing check for negative ObjectIdentifier (Libraries, 8275151) OpenJDK: Defective secure validation in Apache Santuario (Libraries, 8278008) OpenJDK: URI parsing inconsistencies (JNDI, 8278972)
|
[
"cpe:/a:redhat:rhel_eus:8.4::appstream",
"cpe:/a:redhat:rhel_eus:8.4::crb"
] | null | 5.3 | null | null |
RHSA-2015:0090
|
Red Hat Security Advisory: glibc security update
|
glibc: __nss_hostname_digits_dots() heap-based buffer overflow
|
[
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2020:1567
|
Red Hat Security Advisory: kernel-rt security, bug fix, and enhancement update
|
kernel: nfs: NULL pointer dereference due to an anomalized NFS message sequence kernel: triggering AP to send IAPP location updates for stations before the required authentication process has completed can lead to DoS kernel: memory leak in the kernel_read_file function in fs/exec.c allows to cause a denial of service Kernel: net: using kernel space address bits to derive IP ID may potentially break KASLR kernel: use-after-free in function __mdiobus_register() in drivers/net/phy/mdio_bus.c kernel: An out-of-bounds read in drivers/scsi/qedi/qedi_dbg.c leading to crash or information disclosure kernel: a NULL pointer dereference in drivers/net/wireless/ath/ath10k/usb.c leads to a crash kernel: Null pointer dereference in the sound/usb/line6/pcm.c kernel: Null pointer dereference in the sound/usb/line6/driver.c kernel: null pointer dereference in drivers/net/wireless/intel/iwlwifi/pcie/trans.c kernel: unprivileged users able to create RAW sockets in AF_IEEE802154 network protocol kernel: unprivileged users able to create RAW sockets in AF_ISDN network protocol kernel: The flow_dissector feature allows device tracking kernel: integer overflow in tcp_ack_update_rtt in net/ipv4/tcp_input.c kernel: dos in mlx5_fpga_conn_create_cq() function in drivers/net/ethernet/mellanox/mlx5/core/fpga/conn.c kernel: dos in mlx5_fw_fatal_reporter_dump() function in drivers/net/ethernet/mellanox/mlx5/core/health.c kernel: memory leak in the nl80211_get_ftm_responder_stats() function in net/wireless/nl80211.c allows DoS kernel: Two memory leaks in the mwifiex_pcie_init_evt_ring() function in drivers/net/wireless/marvell/mwifiex/pcie.c allows for a DoS kernel: A memory leak in the alloc_sgtable() function in drivers/net/wireless/intel/iwlwifi/fw/dbg.c allows for a DoS kernel: Multiple memory leaks in the iwl_pcie_ctxt_info_gen3_init() function in drivers/net/wireless/intel/iwlwifi/pcie/ctxt-info-gen3.c allows for a DoS kernel: A memory leak in the sdma_init() function in drivers/infiniband/hw/hfi1/sdma.c allows for a DoS kernel: Four memory leaks in the acp_hw_init() function in drivers/gpu/drm/amd/amdgpu/amdgpu_acp.c allow for a DoS kernel: Memory leaks in drivers/net/wireless/ath/ath9k/htc_hst.c in the Linux kernel (DOS) kernel: a memory leak in the ath9k management function in allows local DoS kernel: memory leak in bnxt_re_create_srq function in drivers/infiniband/hw/bnxt_re/ib_verbs.c kernel: malicious USB devices can lead to multiple out-of-bounds write kernel: information leak bug caused by a malicious USB device in the drivers/net/can/usb/peak_usb/pcan_usb_core.c driver kernel: use-after-free in __blk_add_trace in kernel/trace/blktrace.c kernel: when cpu.cfs_quota_us is used allows attackers to cause a denial of service against non-cpu-bound applications kernel: some ipv6 protocols not encrypted over ipsec tunnel kernel: use-after-free in i915_ppgtt_close in drivers/gpu/drm/i915/i915_gem_gtt.c kernel: use-after-free in cdev_put() when a PTP device is removed while it's chardev is open kernel: net/sched: cbs NULL pointer dereference when offloading is enabled
|
[
"cpe:/a:redhat:enterprise_linux:8::nfv",
"cpe:/a:redhat:enterprise_linux:8::realtime"
] | null | 5.5 | 4.6 | null |
RHSA-2022:4590
|
Red Hat Security Advisory: firefox security update
|
Mozilla: Bypassing permission prompt in nested browsing contexts Mozilla: iframe Sandbox bypass Mozilla: Reader mode bypassed SameSite cookies Mozilla: Fullscreen notification bypass using popups Mozilla: Leaking browser history with CSS variables Mozilla: Memory safety bugs fixed in Firefox 100 and Firefox ESR 91.9
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 9.8 | 7.5 | null |
RHSA-2020:2479
|
Red Hat Security Advisory: OpenShift Container Platform 3.11 atomic-openshift security update
|
libseccomp-golang: mishandling of multiple argument rules leading to a bypass of intended access restrictions kubernetes: Denial of service in API server via crafted YAML payloads by authorized users kubernetes: Server side request forgery (SSRF) in kube-controller-manager allows users to leak secret information
|
[
"cpe:/a:redhat:openshift:3.11::el7"
] | null | 6.3 | 6.5 | null |
RHSA-2018:1642
|
Red Hat Security Advisory: kernel-rt security update
|
hw: cpu: speculative store bypass
|
[
"cpe:/a:redhat:enterprise_mrg:2:server:el6"
] | null | null | 5.6 | null |
RHSA-2018:0842
|
Red Hat Security Advisory: xdg-user-dirs security and bug fix update
|
gnome-session: Xsession creation of XDG user directories does not honor system umask policy
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 3.3 | null |
RHSA-2017:1441
|
Red Hat Security Advisory: qemu-kvm-rhev security and bug fix update
|
Qemu: cirrus: heap buffer overflow via vnc connection Qemu: VNC: memory corruption due to unchecked resolution limit Qemu: display: cirrus: OOB read access issue Qemu: display: cirrus: OOB r/w access issues in bitblt routines
|
[
"cpe:/a:redhat:openstack:5::el6"
] | null | null | 5.5 | null |
RHSA-2008:0029
|
Red Hat Security Advisory: XFree86 security update
|
xfs integer overflow in the build_range function xfs heap overflow in the swap_char2b function Xorg / XFree86 file existence disclosure vulnerability xfree86: memory corruption via XInput extension xfree86: information disclosure via TOG-CUP extension xfree86: integer overflow in EVI extension Xorg / XFree86 PCF font parser buffer overflow
|
[
"cpe:/o:redhat:enterprise_linux:2.1::as",
"cpe:/o:redhat:enterprise_linux:2.1::aw",
"cpe:/o:redhat:enterprise_linux:2.1::es",
"cpe:/o:redhat:enterprise_linux:2.1::ws",
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws"
] | null | null | null | null |
RHSA-2021:4532
|
Red Hat Security Advisory: OpenJDK 17.0.1 security update for Portable Linux Builds
|
OpenJDK: Excessive memory allocation in RTFParser (Swing, 8265167) OpenJDK: Excessive memory allocation in RTFReader (Swing, 8265580) OpenJDK: Excessive memory allocation in HashMap and HashSet (Utility, 8266097) OpenJDK: Certificates with end dates too far in the future can corrupt keystore (Keytool, 8266137) OpenJDK: Incorrect principal selection when using Kerberos Constrained Delegation (Libraries, 8266689) OpenJDK: Unexpected exception raised during TLS handshake (JSSE, 8267729) OpenJDK: Excessive memory allocation in BMPImageReader (ImageIO, 8267735) OpenJDK: Non-constant comparison during TLS handshakes (JSSE, 8269618)
|
[
"cpe:/a:redhat:openjdk:17"
] | null | 3.7 | null | null |
RHSA-2021:0734
|
Red Hat Security Advisory: nodejs:12 security update
|
nodejs: HTTP2 'unknownProtocol' cause DoS by resource exhaustion nodejs: DNS rebinding in --inspect
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 7.5 | null | null |
RHSA-2023:3408
|
Red Hat Security Advisory: openssl security update
|
openssl: timing attack in RSA Decryption implementation openssl: double free after calling PEM_read_bio_ex openssl: use-after-free following BIO_new_NDEF
|
[
"cpe:/o:redhat:rhel_eus:8.6::baseos"
] | null | 7.5 | null | null |
RHSA-2018:3397
|
Red Hat Security Advisory: qemu-kvm security update
|
hw: cpu: speculative store bypass
|
[
"cpe:/o:redhat:rhel_aus:6.5::server"
] | null | null | 5.6 | null |
RHSA-2013:0517
|
Red Hat Security Advisory: util-linux-ng security, bug fix and enhancement update
|
util-linux: mount folder existence information disclosure
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2016:2816
|
Red Hat Security Advisory: Red Hat Ceph Storage security, bug fix, and enhancement update
|
Ceph: RGW Denial of Service by sending null or specially crafted POST object requests
|
[
"cpe:/a:redhat:ceph_storage:2::ubuntu16.04"
] | null | null | 6.5 | null |
RHSA-2014:1065
|
Red Hat Security Advisory: Transition Red Hat Network Classic Hosted to Red Hat Subscription Management
|
This is the 3-year notification of the target date to migrate systems from
Red Hat Network Classic Hosted to Red Hat Subscription Management. All
systems using Red Hat Network Classic Hosted must be migrated to Red Hat
Subscription Management.
|
[] | null | null | null | null |
RHSA-2017:2628
|
Red Hat Security Advisory: qemu-kvm-rhev security and bug fix update
|
Qemu: qemu-nbd crashes due to undefined I/O coroutine
|
[
"cpe:/o:redhat:enterprise_linux:7::hypervisor"
] | null | null | 5.3 | null |
RHSA-2012:1122
|
Red Hat Security Advisory: bind97 security update
|
bind: heavy DNSSEC validation load can cause assertion failure
|
[
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2010:0161
|
Red Hat Security Advisory: kernel-rt security and bug fix update
|
kernel: create_elf_tables can leave urandom in a bad state kernel: tty->pgrp races kernel: infoleak if print-fatal-signals=1 kernel: netfilter: ebtables: enforce CAP_NET_ADMIN kernel: untangle the do_mremap() kernel: OOM/crash in drivers/connector kernel: sys_move_pages infoleak kernel: ipv6: fix ip6_dst_lookup_tail() NULL pointer dereference kernel: futex: Handle user space corruption gracefully
|
[
"cpe:/a:redhat:enterprise_mrg:1::el5"
] | null | null | null | null |
RHSA-2022:6066
|
Red Hat Security Advisory: Red Hat OpenStack Platform 16.1 (etcd) security update
|
prometheus/client_golang: Denial of service using InstrumentHandlerCounter golang: compress/gzip: stack exhaustion in Reader.Read
|
[
"cpe:/a:redhat:openstack:16.1::el8"
] | null | 7.5 | null | null |
RHSA-2023:1948
|
Red Hat Security Advisory: Red Hat OpenStack Platform 16.2 (openstack-nova) security update
|
openstack-nova: Compute service fails to restart if the vnic_type of a bound port changed from direct to macvtap
|
[
"cpe:/a:redhat:openstack:16.2::el8"
] | null | 3.3 | null | null |
RHSA-2023:3481
|
Red Hat Security Advisory: emacs security update
|
emacs: command injection vulnerability in htmlfontify.el
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 7.8 | null | null |
RHSA-2015:1087
|
Red Hat Security Advisory: qemu-kvm security update
|
qemu: pcnet: multi-tmd buffer overflow in the tx path
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2024:1481
|
Red Hat Security Advisory: java-1.8.0-ibm security update
|
OpenJDK: array out-of-bounds access due to missing range check in C1 compiler (8314468) OpenJDK: range check loop optimization issue (8314307) OpenJDK: arbitrary Java code execution in Nashorn (8314284) OpenJDK: logging of digital signature private keys (8316976) OpenJDK: RSA padding issue and timing side-channel attack against TLS (8317547)
|
[
"cpe:/a:redhat:enterprise_linux:8::supplementary"
] | null | 7.4 | null | null |
RHSA-2024:1911
|
Red Hat Security Advisory: firefox security update
|
Mozilla: Permission prompt input delay could expire when not in focus Mozilla: Denial of Service using HTTP/2 CONTINUATION frames Mozilla: GetBoundName in the JIT returned the wrong object Mozilla: Out-of-bounds-read after mis-optimized switch statement Mozilla: Incorrect JITting of arguments led to use-after-free during garbage collection Mozilla: Integer-overflow led to out-of-bounds-read in the OpenType sanitizer Mozilla: Potential use-after-free due to AlignedBuffer self-move Mozilla: Memory safety bug fixed in Firefox 125, Firefox ESR 115.10, and Thunderbird 115.10
|
[
"cpe:/a:redhat:rhel_aus:8.4::appstream",
"cpe:/a:redhat:rhel_e4s:8.4::appstream",
"cpe:/a:redhat:rhel_tus:8.4::appstream"
] | null | 7.5 | null | null |
RHSA-2011:0952
|
Red Hat Security Advisory: JBoss Enterprise SOA Platform 4.3.0.CP05 and 5.1.0 security update
|
JBoss Seam EL interpolation in exception handling
|
[
"cpe:/a:redhat:jboss_soa_platform:4.3",
"cpe:/a:redhat:jboss_soa_platform:5.1"
] | null | null | null | null |
RHSA-2023:5727
|
Red Hat Security Advisory: java-1.8.0-openjdk security update
|
OpenJDK: segmentation fault in ciMethodBlocks OpenJDK: IOR deserialization issue in CORBA (8303384) OpenJDK: certificate path validation issue during client authentication (8309966)
|
[
"cpe:/a:redhat:rhel_e4s:8.1::appstream"
] | null | 5.3 | null | null |
RHSA-2018:1125
|
Red Hat Security Advisory: python-paramiko security update
|
python-paramiko: Authentication bypass in transport.py
|
[
"cpe:/o:redhat:rhel_aus:6.4::server",
"cpe:/o:redhat:rhel_aus:6.5::server",
"cpe:/o:redhat:rhel_aus:6.6::server",
"cpe:/o:redhat:rhel_eus:6.7::computenode",
"cpe:/o:redhat:rhel_eus:6.7::server",
"cpe:/o:redhat:rhel_tus:6.6::server"
] | null | null | 9.8 | null |
RHBA-2018:0489
|
Red Hat Bug Fix Advisory: Red Hat OpenShift Container Platform 3.9 RPM Release Advisory
|
atomic-openshift: image import whitelist can be bypassed by creating an imagestream or using oc tag atomic-openshift: cluster-reader can escalate to creating builds via webhooks in any project
|
[
"cpe:/a:redhat:openshift:3.9::el7"
] | null | null | 5 | null |
RHSA-2018:2090
|
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform security update
|
undertow: File descriptor leak caused by JarURLConnection.getLastModified() allows attacker to cause a denial of service jackson-databind: incomplete fix for CVE-2017-7525 permits unsafe serialization via c3p0 libraries
|
[
"cpe:/a:redhat:jboss_enterprise_application_platform:7::el6"
] | null | null | 8.1 | null |
RHSA-2024:0970
|
Red Hat Security Advisory: firefox security update
|
Mozilla: Out-of-bounds memory read in networking channels Mozilla: Alert dialog could have been spoofed on another site Mozilla: Fullscreen Notification could have been hidden by select element Mozilla: Custom cursor could obscure the permission dialog Mozilla: Mouse cursor re-positioned unexpectedly could have led to unintended permission grants Mozilla: Multipart HTTP Responses would accept the Set-Cookie header in response parts Mozilla: Incorrect code generation on 32-bit ARM devices Mozilla: Memory safety bugs fixed in Firefox 123, Firefox ESR 115.8, and Thunderbird 115.8
|
[
"cpe:/a:redhat:rhel_eus:8.6::appstream"
] | null | 7.5 | null | null |
RHSA-2024:7705
|
Red Hat Security Advisory: systemd security update
|
systemd: privilege escalation via the less pager
|
[
"cpe:/o:redhat:rhel_els:7"
] | null | 7.1 | null | null |
RHSA-2020:2751
|
Red Hat Security Advisory: Red Hat AMQ Broker 7.7 release and security update
|
apache-commons-configuration: uncontrolled class instantiation when loading YAML files broker: resetUsers operation stores password in plain text netty: compression/decompression codecs don't enforce limits on buffer allocation sizes
|
[
"cpe:/a:redhat:amq_broker:7"
] | null | 7.5 | null | null |
RHSA-2024:2816
|
Red Hat Security Advisory: Errata Advisory for Red Hat OpenShift GitOps v1.12.2 security update
|
webpack-dev-middleware: lack of URL validation may lead to file leak argo-cd: API server does not enforce project sourceNamespaces
|
[
"cpe:/a:redhat:openshift_gitops:1.12::el8"
] | null | 4.8 | null | null |
RHSA-2024:0712
|
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.4.15 security update
|
jgit: arbitrary file overwrite santuario: Private Key disclosure in debug-log output
|
[
"cpe:/a:redhat:jboss_enterprise_application_platform:7.4::el9"
] | null | 6.5 | null | null |
RHSA-2024:0241
|
Red Hat Security Advisory: java-17-openjdk security and bug fix update
|
OpenJDK: array out-of-bounds access due to missing range check in C1 compiler (8314468) OpenJDK: JVM class file verifier flaw allows unverified bytecode execution (8314295) OpenJDK: range check loop optimization issue (8314307) OpenJDK: incorrect handling of ZIP files with duplicate entries (8276123) OpenJDK: logging of digital signature private keys (8316976) OpenJDK: RSA padding issue and timing side-channel attack against TLS (8317547)
|
[
"cpe:/a:redhat:rhel_aus:8.4::appstream",
"cpe:/a:redhat:rhel_e4s:8.4::appstream",
"cpe:/a:redhat:rhel_tus:8.4::appstream"
] | null | 7.4 | null | null |
RHBA-2019:3248
|
Red Hat Bug Fix Advisory: redhat-virtualization-host security update
|
kernel: hw: Spectre SWAPGS gadget vulnerability sudo: Privilege escalation via 'Runas' specification with 'ALL' keyword
|
[
"cpe:/o:redhat:enterprise_linux:7::hypervisor"
] | null | null | 6.4 | null |
RHBA-2019:2339
|
Red Hat Bug Fix Advisory: lldpad bug fix and enhancement update
|
lldptool: improper sanitization of shell-escape codes
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 4.3 | null |
RHSA-2024:2145
|
Red Hat Security Advisory: libX11 security update
|
libX11: out-of-bounds memory access in _XkbReadKeySyms() libX11: stack exhaustion from infinite recursion in PutSubImage() libX11: integer overflow in XCreateImage() leading to a heap overflow
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 7.8 | null | null |
RHSA-2008:0297
|
Red Hat Security Advisory: dovecot security and bug fix update
|
Directory traversal in dovecot with zlib plugin Dovecot possible privilege ascalation in ACL plugin dovecot LDAP+auth cache user login mixup dovecot: insecure mail_extra_groups option
|
[
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2024:5442
|
Red Hat Security Advisory: OpenShift Container Platform 4.15.28 packages and security update
|
golang: net/http: golang: mime/multipart: golang: net/textproto: memory exhaustion in Request.ParseMultipartForm golang: net/netip: Unexpected behavior from Is methods for IPv4-mapped IPv6 addresses
|
[
"cpe:/a:redhat:openshift:4.15::el8",
"cpe:/a:redhat:openshift:4.15::el9"
] | null | 6.7 | null | null |
RHSA-2015:2417
|
Red Hat Security Advisory: autofs security, bug fix and enhancement update
|
autofs: priv escalation via interpreter load path for program based automount maps
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.