id
stringlengths 13
15
| title
stringlengths 29
176
| description
stringlengths 8
32.1k
| cpes
sequencelengths 0
20
| cvss_v4_0
null | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
null |
---|---|---|---|---|---|---|---|
RHSA-2017:1209 | Red Hat Security Advisory: rhev-hypervisor bug fix and enhancement update for RHEV 3.6.11 | kernel: use after free in dccp protocol | [
"cpe:/o:redhat:enterprise_linux:6::hypervisor",
"cpe:/o:redhat:enterprise_linux:7::hypervisor"
] | null | null | 7.8 | null |
RHSA-2024:3203 | Red Hat Security Advisory: systemd security update | systemd-resolved: Unsigned name response in signed zone is not refused when DNSSEC=yes | [
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 5.9 | null | null |
RHSA-2019:1140 | Red Hat Security Advisory: Red Hat Single Sign-On 7.3.1 security update | jackson-databind: Potential information exfiltration with default typing, serialization gadget from MyBatis jackson-databind: improper polymorphic deserialization of types from Jodd-db library jackson-databind: improper polymorphic deserialization of types from Oracle JDBC driver undertow: Infoleak in some circumstances where Undertow can serve data from a random buffer jackson-databind: exfiltration/XXE in some JDK classes jackson-databind: server-side request forgery (SSRF) in axis2-jaxws class wildfly: Race condition on PID file allows for termination of arbitrary processes by local users keycloak: session hijack using the user access token wildfly: wrong SecurityIdentity for EE concurrency threads that are reused | [
"cpe:/a:redhat:jboss_single_sign_on:7.3"
] | null | null | 5.4 | null |
RHSA-2021:2663 | Red Hat Security Advisory: Ansible security and bug fix update (2.9.23) | ansible: Template Injection through yaml multi-line strings with ansible facts used in template. | [
"cpe:/a:redhat:ansible_engine:2.9::el7",
"cpe:/a:redhat:ansible_engine:2.9::el8"
] | null | 6.6 | null | null |
RHSA-2024:2988 | Red Hat Security Advisory: container-tools:rhel8 security update | urllib3: urllib3 does not remove the authorization HTTP header when following a cross-origin redirect golang: math/big.Rat: may cause a panic or an unrecoverable fatal error if passed inputs with very large exponents golang: crypto/tls: certificate of wrong type is causing TLS client to panic golang: archive/tar: github.com/vbatts/tar-split: unbounded memory consumption when reading headers golang: net/http/httputil: ReverseProxy should not forward unparseable query parameters golang: regexp/syntax: limit memory used by parsing regexps golang: crypto/tls: slow verification of certificate chains containing large RSA keys golang: html/template: improper handling of HTML-like comments within script contexts golang: html/template: improper handling of special tags within script contexts golang: crypto/tls: panic when processing post-handshake message on QUIC connections golang: crypto/tls: lack of a limit on buffered post-handshake golang: net/http/internal: Denial of Service (DoS) via Resource Consumption via HTTP requests golang: crypto/tls: Timing Side Channel attack in RSA based TLS key exchanges. urllib3: Request body not stripped after redirect from 303 status changes request method to GET ssh: Prefix truncation attack on Binary Packet Protocol (BPP) moby/buildkit: Possible race condition with accessing subpaths from cache mounts | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 5.3 | null | null |
RHSA-2023:6209 | Red Hat Security Advisory: samba security update | samba: smbd allows client access to unix domain sockets on the file system as root samba: SMB clients can truncate files with read-only permissions samba: "rpcecho" development server allows denial of service via sleep() call on AD DC | [
"cpe:/a:redhat:rhel_eus:9.0::appstream",
"cpe:/a:redhat:rhel_eus:9.0::crb",
"cpe:/a:redhat:rhel_eus:9.0::resilientstorage",
"cpe:/o:redhat:rhel_eus:9.0::baseos"
] | null | 6.5 | null | null |
RHSA-2013:1813 | Red Hat Security Advisory: php53 and php security update | php: memory corruption in openssl_x509_parse() | [
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server",
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHBA-2023:2181 | Red Hat Bug Fix Advisory: delve, golang, and go-toolset bug fix and enhancement update | golang.org/x/net/http2: avoid quadratic complexity in HPACK decoding golang: crypto/tls: large handshake records may cause panics golang: net/http, mime/multipart: denial of service from excessive resource consumption | [
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 7.5 | null | null |
RHSA-2024:3426 | Red Hat Security Advisory: varnish:6 security update | varnish: HTTP/2 Broken Window Attack may result in denial of service | [
"cpe:/a:redhat:rhel_eus:8.6::appstream"
] | null | 7.5 | null | null |
RHSA-2003:309 | Red Hat Security Advisory: : Updated fileutils/coreutils package fix ls vulnerabilities | security flaw security flaw | [
"cpe:/o:redhat:linux:7.1",
"cpe:/o:redhat:linux:7.2",
"cpe:/o:redhat:linux:7.3",
"cpe:/o:redhat:linux:8.0",
"cpe:/o:redhat:linux:9"
] | null | null | null | null |
RHSA-2015:1978 | Red Hat Security Advisory: kernel security, bug fix, and enhancement update | kernel: fs: deadlock due to incorrect usage of rename_lock kernel: buffer overflow with fraglist larger than MAX_SKB_FRAGS + 2 in virtio-net | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | null | null |
RHSA-2022:5804 | Red Hat Security Advisory: kpatch-patch security update | kernel: a use-after-free write in the netfilter subsystem can lead to privilege escalation to root | [
"cpe:/o:redhat:rhel_e4s:7.6::server"
] | null | 7.8 | null | null |
RHSA-2025:4043 | Red Hat Security Advisory: bluez security update | BlueZ: Audio Profile AVRCP Improper Validation of Array Index Remote Code Execution Vulnerability bluez: audio profile avrcp parse_media_element out-of-bounds read information disclosure vulnerability | [
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb",
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | null | 5.4 | null |
RHSA-2022:0827 | Red Hat Security Advisory: .NET Core 3.1 security and bugfix update | brotli: buffer overflow when input chunk is larger than 2GiB dotnet: ASP.NET Denial of Service via FormPipeReader dotnet: double parser stack buffer overrun | [
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb"
] | null | 6.3 | null | null |
RHSA-2019:2166 | Red Hat Security Advisory: qemu-kvm-ma security and bug fix update | QEMU: net: ignore packets with large size QEMU: scsi-generic: possible OOB access while handling inquiry request | [
"cpe:/o:redhat:enterprise_linux:7::server"
] | null | null | 2.8 | null |
RHSA-2021:3871 | Red Hat Security Advisory: Ansible security and bug fix update (2.9.27) | Ansible: ansible-connection module discloses sensitive info in traceback error message | [
"cpe:/a:redhat:ansible_engine:2.9::el7",
"cpe:/a:redhat:ansible_engine:2.9::el8"
] | null | 5.5 | null | null |
RHSA-2013:0743 | Red Hat Security Advisory: JBoss Enterprise BRMS Platform 5.3.1 update | apache-cxf: SOAPAction spoofing on document literal web services apache-cxf: Bypass of security constraints on WS endpoints when using WSS4JInInterceptor | [
"cpe:/a:redhat:jboss_enterprise_brms_platform:5.3"
] | null | null | null | null |
RHSA-2024:5326 | Red Hat Security Advisory: firefox security update | mozilla: Fullscreen notification dialog can be obscured by document content mozilla: Out of bounds memory access in graphics shared memory handling mozilla: Type confusion in WebAssembly mozilla: Incomplete WebAssembly exception handing mozilla: Out of bounds read in editor component mozilla: CSP strict-dynamic bypass using web-compatibility shims mozilla: Missing permission check when creating a StreamFilter mozilla: Uninitialized memory used by WebGL mozilla: Use-after-free in JavaScript garbage collection mozilla: Use-after-free in IndexedDB mozilla: Document content could partially obscure security prompts | [
"cpe:/a:redhat:rhel_aus:8.6::appstream",
"cpe:/a:redhat:rhel_e4s:8.6::appstream",
"cpe:/a:redhat:rhel_tus:8.6::appstream"
] | null | 6.1 | null | null |
RHSA-2014:0913 | Red Hat Security Advisory: kernel-rt security update | kernel: net: insufficient permision checks of netlink messages kernel: aio: insufficient sanitization of head in aio_read_events_ring() Kernel: filter: prevent nla extensions to peek beyond the end of the message Kernel: filter: prevent nla extensions to peek beyond the end of the message kernel: futex: pi futexes requeue issue kernel: DoS with syscall auditing Kernel: missing check during hugepage migration Kernel: target/rd: imformation leakage kernel: sctp: sk_ack_backlog wrap-around problem kernel: x86_64: ptrace: sysret to non-canonical address | [
"cpe:/a:redhat:enterprise_mrg:2:server:el6"
] | null | null | null | null |
RHSA-2020:1916 | Red Hat Security Advisory: python-pip security update | python-requests: Redirect from HTTPS to HTTP does not remove Authorization header python-urllib3: Cross-host redirect does not remove Authorization header allow for credential exposure python-urllib3: CRLF injection due to not encoding the '\r\n' sequence leading to possible attack on internal service python-urllib3: Certification mishandle when error should be thrown | [
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | null | 7.5 | null |
RHSA-2024:10481 | Red Hat Security Advisory: webkit2gtk3 security update | webkit: malicious website may exfiltrate audio data cross-origin webkit: processing malicious web content prevents Content Security Policy from being enforced webkit: maliciously crafted webpage may be able to fingerprint the user webkit: processing maliciously crafted web content prevents Content Security Policy from being enforced webkitgtk: data isolation bypass vulnerability | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 6.1 | null | null |
RHSA-2016:1809 | Red Hat Security Advisory: thunderbird security update | Mozilla: Miscellaneous memory safety hazards (rv:45.3) (MFSA 2016-62) | [
"cpe:/a:redhat:rhel_productivity:5",
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation",
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 8.8 | null |
RHSA-2023:6745 | Red Hat Security Advisory: curl security update | curl: heap based buffer overflow in the SOCKS5 proxy handshake curl: cookie injection with none file | [
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/o:redhat:enterprise_linux:9::baseos"
] | null | 3.7 | null | null |
RHSA-2017:1103 | Red Hat Security Advisory: nss security update | nss: Write beyond bounds caused by bugs in Base64 de/encoding in nssb64d.c and nssb64e.c (MFSA 2017-10) | [
"cpe:/o:redhat:rhel_aus:5.9"
] | null | null | 9.8 | null |
RHSA-2018:2743 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 6.4.21 security update | keycloak: SAML request parser replaces special strings with system properties hibernate-validator: Privilege escalation when running under the security manager tomcat: A bug in the UTF-8 decoder can lead to DoS guava: Unbounded memory allocation in AtomicDoubleArray and CompoundOrdering classes allow remote attackers to cause a denial of service | [
"cpe:/a:redhat:jboss_enterprise_application_platform:6::el6"
] | null | null | 5.9 | null |
RHSA-2016:0611 | Red Hat Security Advisory: samba security update | samba: crash in dcesrv_auth_bind_ack due to missing error check samba: Man-in-the-middle attacks possible with NTLMSSP authentication samba: Spoofing vulnerability when domain controller is configured samba: Missing downgrade detection samba: Smb signing not required by default when smb client connection is used for ipc usage samba: SAMR and LSA man in the middle attacks | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2018:1701 | Red Hat Security Advisory: librelp security update | librelp: Stack-based buffer overflow in relpTcpChkPeerName function in src/tcp.c | [
"cpe:/o:redhat:rhel_aus:6.6::server",
"cpe:/o:redhat:rhel_tus:6.6::server"
] | null | null | 8.1 | null |
RHSA-2010:0888 | Red Hat Security Advisory: openssl security update | OpenSSL TLS extension parsing race condition | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2022:0818 | Red Hat Security Advisory: firefox security update | expat: Malformed 2- and 3-byte UTF-8 sequences can lead to arbitrary code execution expat: Namespace-separator characters in "xmlns[:prefix]" attribute values can lead to arbitrary code execution expat: Integer overflow in storeRawNames() Mozilla: Use-after-free in text reflows Mozilla: Browser window spoof using fullscreen mode Mozilla: iframe allow-scripts sandbox bypass Mozilla: Temporary files downloaded to /tmp and accessible by other local users Mozilla: Time-of-check time-of-use bug when verifying add-on signatures Mozilla: Use-after-free in XSLT parameter processing Mozilla: Use-after-free in WebGPU IPC Framework | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 8.8 | 7.5 | null |
RHSA-2024:8124 | Red Hat Security Advisory: java-17-openjdk security update | giflib: Heap-Buffer Overflow during Image Saving in DumpScreen2RGB Function JDK: HTTP client improper handling of maxHeaderSize (8328286) JDK: Array indexing integer overflow (8328544) JDK: Unbounded allocation leads to out-of-memory error (8331446) JDK: Integer conversion error leads to incorrect range check (8332644) | [
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb",
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::crb",
"cpe:/a:redhat:rhel_aus:8.4::appstream",
"cpe:/a:redhat:rhel_aus:8.6::appstream",
"cpe:/a:redhat:rhel_e4s:8.4::appstream",
"cpe:/a:redhat:rhel_e4s:8.6::appstream",
"cpe:/a:redhat:rhel_e4s:9.0::appstream",
"cpe:/a:redhat:rhel_eus:8.8::appstream",
"cpe:/a:redhat:rhel_eus:8.8::crb",
"cpe:/a:redhat:rhel_eus:9.2::appstream",
"cpe:/a:redhat:rhel_eus:9.2::crb",
"cpe:/a:redhat:rhel_tus:8.4::appstream",
"cpe:/a:redhat:rhel_tus:8.6::appstream"
] | null | 4.8 | null | null |
RHSA-2005:019 | Red Hat Security Advisory: libtiff security update | security flaw security flaw | [
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws"
] | null | null | null | null |
RHSA-2020:2839 | Red Hat Security Advisory: ruby security update | ruby: Tainted flags are not propagated in Array#pack and String#unpack with some directives | [
"cpe:/o:redhat:rhel_eus:7.6::computenode",
"cpe:/o:redhat:rhel_eus:7.6::server"
] | null | null | 5.9 | null |
RHSA-2020:0348 | Red Hat Security Advisory: container-tools:rhel8 security, bug fix, and enhancement update | QEMU: Slirp: use-after-free during packet reassembly QEMU: slirp: OOB buffer access while emulating tcp protocols in tcp_emu() | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 5.6 | 5.6 | null |
RHSA-2021:1531 | Red Hat Security Advisory: kernel security and bug fix update | kernel: malicious USB devices can lead to multiple out-of-bounds write kernel: Local buffer overflow in ctnetlink_parse_tuple_filter in net/netfilter/nf_conntrack_netlink.c kernel: ICMP rate limiting can be used for DNS poisoning attack kernel: SCSI target (LIO) write to any block on ILO backstore kernel: iscsi: unrestricted access to sessions and handles kernel: out-of-bounds read in libiscsi module kernel: heap buffer overflow in the iSCSI subsystem | [
"cpe:/o:redhat:rhel_eus:7.7::computenode",
"cpe:/o:redhat:rhel_eus:7.7::server"
] | null | 7.8 | 6.8 | null |
RHSA-2024:3759 | Red Hat Security Advisory: idm:DL1 security update | freeipa: delegation rules allow a proxy service to impersonate any user to access another target service freeipa: user can obtain a hash of the passwords of all domain users and perform offline brute force | [
"cpe:/a:redhat:rhel_eus:8.8::appstream"
] | null | 8.1 | null | null |
RHSA-2018:1836 | Red Hat Security Advisory: plexus-archiver security update | plexus-archiver: arbitrary file write vulnerability / arbitrary code execution using a specially crafted zip file | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 7.3 | null |
RHSA-2023:3299 | Red Hat Security Advisory: jenkins and jenkins-2-plugins security update | google-oauth-client: missing PKCE support in accordance with the RFC for OAuth 2.0 for Native Apps can lead to improper authorization kubernetes-client: Insecure deserialization in unmarshalYaml method jackson-databind: Possible DoS if using JDK serialization to serialize JsonNode springframework: Authorization Bypass in RegexRequestMatcher com.google.code.gson-gson: Deserialization of Untrusted Data in com.google.code.gson-gson xstream: Xstream to serialise XML data was vulnerable to Denial of Service attacks woodstox-core: woodstox to serialise XML data was vulnerable to Denial of Service attacks apache-commons-text: variable interpolation RCE jenkins-2-plugins/script-security: Sandbox bypass vulnerability in Script Security Plugin FileUpload: FileUpload DoS with excessive parts jenkins-2-plugins/JUnit: Stored XSS vulnerability in JUnit Plugin jenkins-2-plugins/pipeline-build-step: Stored XSS vulnerability in Pipeline: Build Step Plugin Jenkins: Denial of Service attack Jenkins: Denial of Service attack Jenkins: Workspace temporary directories accessible through directory browser Jenkins: Information disclosure through error stack traces related to agents | [
"cpe:/a:redhat:ocp_tools:4.13::el8"
] | null | 5.3 | null | null |
RHSA-2017:3002 | Red Hat Security Advisory: rh-nodejs4-nodejs security and bug fix update | nodejs: Constant Hashtable Seeds vulnerability | [
"cpe:/a:redhat:rhel_software_collections:2::el6",
"cpe:/a:redhat:rhel_software_collections:2::el7"
] | null | null | 7.5 | null |
RHSA-2008:0003 | Red Hat Security Advisory: e2fsprogs security update | e2fsprogs multiple integer overflows | [
"cpe:/o:redhat:enterprise_linux:2.1::as",
"cpe:/o:redhat:enterprise_linux:2.1::aw",
"cpe:/o:redhat:enterprise_linux:2.1::es",
"cpe:/o:redhat:enterprise_linux:2.1::ws",
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws",
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws",
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2022:1796 | Red Hat Security Advisory: qt5-qtbase security update | qt: out-of-bounds write in QOutlineMapper::convertPath called from QRasterPaintEngine::fill and QPaintEngineEx::stroke | [
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb"
] | null | 7.5 | null | null |
RHSA-2022:6535 | Red Hat Security Advisory: OpenShift Container Platform 4.11.5 packages and security update | golang: crypto/tls: session tickets lack random ticket_age_add | [
"cpe:/a:redhat:openshift:4.11::el8",
"cpe:/a:redhat:openshift_ironic:4.11::el8"
] | null | 3.1 | null | null |
RHSA-2024:1303 | Red Hat Security Advisory: kernel-rt security and bug fix update | kernel: memcg does not limit the number of POSIX file locks allowing memory exhaustion | [
"cpe:/a:redhat:rhel_eus:9.2::nfv",
"cpe:/a:redhat:rhel_eus:9.2::realtime"
] | null | 5.5 | null | null |
RHSA-2024:1676 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.4.16 Security update | undertow: unrestricted request storage leads to memory exhaustion undertow: Cookie Smuggling/Spoofing ssh: Prefix truncation attack on Binary Packet Protocol (BPP) undertow: directory traversal vulnerability undertow: Out-of-memory Error after several closed connections with wildfly-http-client protocol | [
"cpe:/a:redhat:jboss_enterprise_application_platform:7.4::el9"
] | null | 7.5 | null | null |
RHSA-2020:3973 | Red Hat Security Advisory: spamassassin security update | spamassassin: crafted email message can lead to DoS | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 7.5 | null | null |
RHSA-2023:1328 | Red Hat Security Advisory: OpenShift Container Platform 4.13.0 security update | mongo-go-driver: specific cstrings input may not be properly validated golang: out-of-bounds read in golang.org/x/text/language leads to DoS golang: net/http: excessive memory growth in a Go server accepting HTTP/2 requests | [
"cpe:/a:redhat:openshift:4.13::el8"
] | null | 5.3 | null | null |
RHSA-2025:1813 | Red Hat Security Advisory: python3.11-urllib3 security update | urllib3: Request body not stripped after redirect from 303 status changes request method to GET | [
"cpe:/a:redhat:rhel_eus:9.2::appstream"
] | null | 4.2 | null | null |
RHSA-2020:1209 | Red Hat Security Advisory: qemu-kvm-ma security update | QEMU: Slirp: potential OOB access due to unsafe snprintf() usages | [
"cpe:/o:redhat:enterprise_linux:7::server"
] | null | 5.6 | null | null |
RHSA-2013:0600 | Red Hat Security Advisory: java-1.7.0-oracle security update | OpenJDK: Specially crafted sample model integer overflow (2D, 8007014) OpenJDK: CMM malformed raster memory corruption (2D, 8007675) | [
"cpe:/a:redhat:rhel_extras:5::server",
"cpe:/a:redhat:rhel_extras:6"
] | null | null | null | null |
RHSA-2016:1865 | Red Hat Security Advisory: flash-plugin security update | flash-plugin: multiple code execution issues fixed in APSB16-29 flash-plugin: multiple code execution issues fixed in APSB16-29 flash-plugin: multiple code execution issues fixed in APSB16-29 flash-plugin: multiple code execution issues fixed in APSB16-29 flash-plugin: multiple code execution issues fixed in APSB16-29 flash-plugin: multiple code execution issues fixed in APSB16-29 flash-plugin: multiple code execution issues fixed in APSB16-29 flash-plugin: multiple code execution issues fixed in APSB16-29 flash-plugin: multiple code execution issues fixed in APSB16-29 flash-plugin: multiple code execution issues fixed in APSB16-29 flash-plugin: multiple code execution issues fixed in APSB16-29 flash-plugin: multiple code execution issues fixed in APSB16-29 flash-plugin: multiple code execution issues fixed in APSB16-29 flash-plugin: multiple code execution issues fixed in APSB16-29 flash-plugin: multiple code execution issues fixed in APSB16-29 flash-plugin: multiple code execution issues fixed in APSB16-29 flash-plugin: multiple code execution issues fixed in APSB16-29 flash-plugin: multiple code execution issues fixed in APSB16-29 flash-plugin: multiple code execution issues fixed in APSB16-29 flash-plugin: multiple code execution issues fixed in APSB16-29 flash-plugin: multiple code execution issues fixed in APSB16-29 flash-plugin: multiple code execution issues fixed in APSB16-29 flash-plugin: multiple code execution issues fixed in APSB16-29 flash-plugin: multiple code execution issues fixed in APSB16-29 flash-plugin: multiple code execution issues fixed in APSB16-29 flash-plugin: multiple code execution issues fixed in APSB16-29 | [
"cpe:/a:redhat:rhel_extras:5::client",
"cpe:/a:redhat:rhel_extras:5::server",
"cpe:/a:redhat:rhel_extras:6"
] | null | null | 8.8 | null |
RHSA-2020:1926 | Red Hat Security Advisory: container-tools:1.0 security and bug fix update | buildah: Crafted input tar file may lead to local file overwrite during image build process | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 8.8 | null | null |
RHSA-2010:0698 | Red Hat Security Advisory: samba3x security update | Samba: Stack-based buffer overflow by processing specially-crafted SID records | [
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2004:413 | Red Hat Security Advisory: kernel security update | security flaw security flaw security flaw security flaw security flaw | [
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws"
] | null | null | null | null |
RHSA-2013:0944 | Red Hat Security Advisory: python-keystoneclient security and bug fix update | Keystone: Missing expiration check in Keystone PKI token validation | [
"cpe:/a:redhat:openstack:3::el6"
] | null | null | null | null |
RHSA-2019:3218 | Red Hat Security Advisory: kernel security and bug fix update | hardware: bluetooth: BR/EDR encryption key negotiation attacks (KNOB) | [
"cpe:/o:redhat:rhel_aus:7.3::server",
"cpe:/o:redhat:rhel_e4s:7.3::server",
"cpe:/o:redhat:rhel_tus:7.3::server"
] | null | null | 7 | null |
RHSA-2012:0429 | Red Hat Security Advisory: gnutls security update | gnutls: buffer overflow in gnutls_session_get_data() (GNUTLS-SA-2011-2) gnutls: TLS record handling issue (GNUTLS-SA-2012-2, MU-201202-01) | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2018:0122 | Red Hat Security Advisory: firefox security update | Mozilla: Memory safety bugs fixed in Firefox 58 and Firefox ESR 52.6 (MFSA 2018-03) Mozilla: Use-after-free with DTMF timers (MFSA 2018-03) Mozilla: Integer overflow in Skia library during edge builder allocation (MFSA 2018-03) Mozilla: Use-after-free while editing form elements (MFSA 2018-03) Mozilla: Use-after-free when source document is manipulated during XSLT (MFSA 2018-03) Mozilla: Use-after-free while manipulating form input elements (MFSA 2018-03) Mozilla: Use-after-free with widget listener (MFSA 2018-03) Mozilla: Use-after-free in HTML media elements (MFSA 2018-03) Mozilla: Use-after-free during mouse event handling (MFSA 2018-03) Mozilla: Use-after-free during font face manipulation (MFSA 2018-03) Mozilla: URL spoofing with right-to-left text aligned left-to-right (MFSA 2018-03) | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation",
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 6.1 | null |
RHSA-2018:0047 | Red Hat Security Advisory: redhat-virtualization-host security update | An update for redhat-virtualization-host is now available for RHEV 4.X, RHEV-H, and Agents for Red Hat Enterprise Linux 7.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. | [
"cpe:/o:redhat:enterprise_linux:7::hypervisor"
] | null | null | null | null |
RHSA-2020:4760 | Red Hat Security Advisory: tcpdump security, bug fix, and enhancement update | tcpdump: SMB data printing mishandled tcpdump: SMB data printing mishandled tcpdump: Buffer over-read in ldp_tlv_print() function in print-ldp.c tcpdump: Buffer over-read in icmp_print() function in print-icmp.c tcpdump: Buffer over-read in vrrp_print() function in print-vrrp.c tcpdump: Buffer over-read in lmp_print_data_link_subobjs() function in print-lmp.c tcpdump: Buffer over-read in rsvp_obj_print() function in print-rsvp.c tcpdump: Buffer over-read in print-icmp6.c tcpdump: Buffer over-read in bgp_capabilities_print() in print-bgp.c tcpdump: Buffer over-read in mfr_print() function in print-fr.c tcpdump: Buffer over-read in ikev1_n_print() function in print-isakmp.c tcpdump: Buffer over-read in babel_print_v2() in print-babel.c tcpdump: Out of bounds read/write in in get_next_file() in tcpdump.c tcpdump: Buffer over-read in ospf6_print_lshdr() function in print-ospf6.c tcpdump: Buffer over-read in bgp_capabilities_print() function in print-bgp.c tcpdump: Buffer over-read in function rpl_dio_printopt in print-icmp6.c tcpdump: Buffer over-read in print-802_11.c tcpdump: Access to uninitialized buffer in print_prefix() function in print-hncp.c tcpdump: Buffer over-read in dccp_print_option() function in print-dccp.c tcpdump: Buffer over-read in bgp_attr_print() function in print-bgp.c tcpdump: Resource exhaustion in bgp_attr_print() function in print-bgp.c tcpdump: Buffer over-read in print_trans() function in print-smb.c tcpdump: Resource exhaustion in smb_fdata() funtion in smbutil.c tcpdump: Buffer overflow in lmp_print_data_link_subobjs() in print-lmp.c | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 7.5 | null | null |
RHSA-2022:6308 | Red Hat Security Advisory: OpenShift Container Platform 4.8.49 security update | grafana: Snapshot authentication bypass go-getter: command injection vulnerability go-getter: unsafe download (issue 1 of 3) go-getter: unsafe download (issue 2 of 3) go-getter: unsafe download (issue 3 of 3) golang: compress/gzip: stack exhaustion in Reader.Read | [
"cpe:/a:redhat:openshift:4.8::el8"
] | null | 7.5 | null | null |
RHSA-2022:0239 | Red Hat Security Advisory: libreswan security update | libreswan: Malicious IKEv1 packet can cause libreswan to restart | [
"cpe:/a:redhat:rhel_eus:8.4::appstream"
] | null | 7.5 | null | null |
RHSA-2023:6276 | Red Hat Security Advisory: OpenShift Container Platform 4.12.42 bug fix and security update | golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487) | [
"cpe:/a:redhat:openshift:4.12::el8",
"cpe:/a:redhat:openshift:4.12::el9"
] | null | 7.5 | null | null |
RHSA-2010:0161 | Red Hat Security Advisory: kernel-rt security and bug fix update | kernel: create_elf_tables can leave urandom in a bad state kernel: tty->pgrp races kernel: infoleak if print-fatal-signals=1 kernel: netfilter: ebtables: enforce CAP_NET_ADMIN kernel: untangle the do_mremap() kernel: OOM/crash in drivers/connector kernel: sys_move_pages infoleak kernel: ipv6: fix ip6_dst_lookup_tail() NULL pointer dereference kernel: futex: Handle user space corruption gracefully | [
"cpe:/a:redhat:enterprise_mrg:1::el5"
] | null | null | null | null |
RHSA-2024:4785 | Red Hat Security Advisory: Network Observability 1.6.1 for OpenShift | golang: archive/zip: Incorrect handling of certain ZIP files golang: net/netip: Unexpected behavior from Is methods for IPv4-mapped IPv6 addresses | [
"cpe:/a:redhat:network_observ_optr:1.6.0::el9"
] | null | 6.7 | null | null |
RHSA-2023:2459 | Red Hat Security Advisory: device-mapper-multipath security and bug fix update | device-mapper-multipath: multipathd: insecure handling of files in /dev/shm leading to symlink attack | [
"cpe:/a:redhat:enterprise_linux:9::crb",
"cpe:/o:redhat:enterprise_linux:9::baseos"
] | null | 7 | null | null |
RHSA-2025:3097 | Red Hat Security Advisory: kpatch-patch-5_14_0-427_13_1, kpatch-patch-5_14_0-427_31_1, kpatch-patch-5_14_0-427_44_1, and kpatch-patch-5_14_0-427_55_1 security update | kernel: can: bcm: Fix UAF in bcm_proc_show() | [
"cpe:/o:redhat:rhel_eus:9.4::baseos"
] | null | 7.8 | null | null |
RHSA-2020:4950 | Red Hat Security Advisory: freetype security update | freetype: Heap-based buffer overflow due to integer truncation in Load_SBit_Png | [
"cpe:/o:redhat:rhel_eus:8.1::baseos"
] | null | 8.6 | null | null |
RHSA-2023:1268 | Red Hat Security Advisory: OpenShift Container Platform 4.12.8 security update | golang: net/http: excessive memory growth in a Go server accepting HTTP/2 requests haproxy: request smuggling attack in HTTP/1 header parsing | [
"cpe:/a:redhat:openshift:4.12::el8",
"cpe:/a:redhat:openshift:4.12::el9"
] | null | 8.2 | null | null |
RHSA-2024:2799 | Red Hat Security Advisory: glibc security update | glibc: Out of bounds write in iconv may lead to remote code execution glibc: stack-based buffer overflow in netgroup cache glibc: null pointer dereferences after failed netgroup cache insertion glibc: netgroup cache may terminate daemon on memory allocation failure glibc: netgroup cache assumes NSS callback uses in-buffer strings | [
"cpe:/a:redhat:rhel_eus:8.6::appstream",
"cpe:/a:redhat:rhel_eus:8.6::crb",
"cpe:/o:redhat:rhel_eus:8.6::baseos",
"cpe:/o:redhat:rhev_hypervisor:4.4::el8"
] | null | 4 | null | null |
RHSA-2019:3049 | Red Hat Security Advisory: RH-SSO 7.3.4 adapters for Enterprise Application Platform 7.2 security update | keycloak: adapter endpoints are exposed via arbitrary URLs | [
"cpe:/a:redhat:jboss_enterprise_application_platform:7.2::el6",
"cpe:/a:redhat:jboss_enterprise_application_platform:7.2::el7",
"cpe:/a:redhat:jboss_enterprise_application_platform:7.2::el8"
] | null | null | 4.3 | null |
RHSA-2023:6274 | Red Hat Security Advisory: OpenShift Container Platform 4.11.53 packages and security update | ovn: service monitor MAC flow is not rate limited | [
"cpe:/a:redhat:openshift:4.11::el8",
"cpe:/a:redhat:openshift_ironic:4.11::el8"
] | null | 5.3 | null | null |
RHSA-2016:2062 | Red Hat Security Advisory: mariadb-galera security update | mysql: general_log can write to configuration files, leading to privilege escalation (CPU Oct 2016) | [
"cpe:/a:redhat:openstack:9::el7"
] | null | null | 9.8 | null |
RHSA-2024:0346 | Red Hat Security Advisory: kernel security and bug fix update | kernel: netfilter: potential slab-out-of-bound access due to integer underflow | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 7 | null | null |
RHSA-2022:5157 | Red Hat Security Advisory: kernel security and bug fix update | kernel: cgroups v1 release_agent feature may allow privilege escalation kernel: race condition in perf_event_open leads to privilege escalation | [
"cpe:/o:redhat:rhel_aus:7.4::server"
] | null | 7.4 | null | null |
RHSA-2022:5477 | Red Hat Security Advisory: firefox security update | Mozilla: Undesired attributes could be set as part of prototype pollution Mozilla: CSP bypass enabling stylesheet injection Mozilla: CSP sandbox header without `allow-scripts` can be bypassed via retargeted javascript: URI Mozilla: Use-after-free in nsSHistory Mozilla: Unavailable PAC file resulted in OCSP requests being blocked Mozilla: A popup window could be resized in a way to overlay the address bar with web content Mozilla: Potential integer overflow in ReplaceElementsAt Mozilla: Memory safety bugs fixed in Firefox 102 and Firefox ESR 91.11 | [
"cpe:/a:redhat:rhel_e4s:8.1::appstream"
] | null | 8.8 | 7.5 | null |
RHSA-2021:2998 | Red Hat Security Advisory: glibc security update | glibc: stack corruption from crafted input in cosl, sinl, sincosl, and tanl functions glibc: stack-based buffer overflow if the input to any of the printf family of functions is an 80-bit long double with a non-canonical bit pattern | [
"cpe:/o:redhat:rhel_eus:7.7::computenode",
"cpe:/o:redhat:rhel_eus:7.7::server"
] | null | 7.5 | null | null |
RHSA-2022:7051 | Red Hat Security Advisory: OpenJDK 17.0.5 Security Update for Windows Builds | OpenJDK: improper MultiByte conversion can lead to buffer overflow (JGSS, 8286077) OpenJDK: improper handling of long NTLM client hostnames (Security, 8286526) OpenJDK: insufficient randomization of JNDI DNS port numbers (JNDI, 8286910) OpenJDK: excessive memory allocation in X.509 certificate parsing (Security, 8286533) OpenJDK: HttpServer no connection count limit (Lightweight HTTP Server, 8286918) OpenJDK: missing SNI caching in HTTP/2 (Networking, 8289366) | [
"cpe:/a:redhat:openjdk:17::windows"
] | null | 3.7 | null | null |
RHSA-2014:1789 | Red Hat Security Advisory: openstack-keystone security and bug fix update | openstack-keystone: configuration data information leak through Keystone catalog | [
"cpe:/a:redhat:openstack:5::el6"
] | null | null | null | null |
RHBA-2012:0881 | Red Hat Bug Fix Advisory: freeradius bug fix and enhancement update | freeradius: does not respect expired passwords when using the unix module | [
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2024:11144 | Red Hat Security Advisory: Red Hat Ansible Automation Platform 2.4 Container Release Update | django: Potential denial-of-service in django.utils.html.strip_tags() django: Potential SQL injection in HasKey(lhs, rhs) on Oracle | [
"cpe:/a:redhat:ansible_automation_platform:2.4::el8",
"cpe:/a:redhat:ansible_automation_platform:2.4::el9",
"cpe:/a:redhat:ansible_automation_platform_cloud_billing:2.4::el8"
] | null | 9.1 | null | null |
RHSA-2018:3643 | Red Hat Security Advisory: kernel security update | kernel: Integer overflow in Linux's create_elf_tables function | [
"cpe:/o:redhat:rhel_aus:6.4::server"
] | null | null | 7.8 | null |
RHSA-2025:0402 | Red Hat Security Advisory: iperf3 security update | iperf: Denial of Service in iperf Due to Improper JSON Handling | [
"cpe:/o:redhat:rhel_els:7"
] | null | 7.5 | null | null |
RHSA-2023:0980 | Red Hat Security Advisory: Red Hat Ceph Storage 5.3 Bug fix and security update | Ceph: ceph-crash.service allows local ceph user to root exploit | [
"cpe:/a:redhat:ceph_storage:5.3::el8",
"cpe:/a:redhat:ceph_storage:5.3::el9"
] | null | 8.8 | null | null |
RHSA-2024:1912 | Red Hat Security Advisory: firefox security update | Mozilla: Permission prompt input delay could expire when not in focus Mozilla: Denial of Service using HTTP/2 CONTINUATION frames Mozilla: GetBoundName in the JIT returned the wrong object Mozilla: Out-of-bounds-read after mis-optimized switch statement Mozilla: Incorrect JITting of arguments led to use-after-free during garbage collection Mozilla: Integer-overflow led to out-of-bounds-read in the OpenType sanitizer Mozilla: Potential use-after-free due to AlignedBuffer self-move Mozilla: Memory safety bug fixed in Firefox 125, Firefox ESR 115.10, and Thunderbird 115.10 | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 7.5 | null | null |
RHSA-2004:480 | Red Hat Security Advisory: ImageMagick security update | security flaw | [
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws"
] | null | null | null | null |
RHSA-2024:5608 | Red Hat Security Advisory: libreoffice security update | libreoffice: Ability to trust not validated macro signatures removed in high security mode | [
"cpe:/a:redhat:rhel_eus:8.8::appstream",
"cpe:/a:redhat:rhel_eus:8.8::crb"
] | null | 7.8 | null | null |
RHSA-2003:066 | Red Hat Security Advisory: : Updated XFree86 packages provide security and bug fixes | security flaw security flaw security flaw security flaw security flaw | [
"cpe:/o:redhat:linux:7.3"
] | null | null | null | null |
RHSA-2012:1307 | Red Hat Security Advisory: openssl security update | openssl: DTLS plaintext recovery attack openssl: double-free in policy checks openssl: uninitialized SSL 3.0 padding openssl: SGC restart DoS attack openssl: CMS and PKCS#7 Bleichenbacher attack openssl: mime_param_cmp NULL dereference crash openssl: asn1_d2i_read_bio integer errors leading to buffer overflow openssl: record length handling integer underflow | [
"cpe:/a:redhat:jboss_enterprise_application_platform:5.1"
] | null | null | null | null |
RHSA-2018:1975 | Red Hat Security Advisory: java-1.8.0-ibm security update | JDK: unspecified vulnerability fixed in 6u191, 7u171, and 8u161 (Security) OpenJDK: incorrect merging of sections in the JAR manifest (Security, 8189969) OpenJDK: unrestricted deserialization of data from JCEKS key stores (Security, 8189997) OpenJDK: insufficient consistency checks in deserialization of multiple classes (Security, 8189977) OpenJDK: unbounded memory allocation during deserialization in PriorityBlockingQueue (Concurrency, 8189981) OpenJDK: unbounded memory allocation during deserialization in TabularDataSupport (JMX, 8189985) OpenJDK: unbounded memory allocation during deserialization in Container (AWT, 8189989) OpenJDK: unbounded memory allocation during deserialization in NamedNodeMapImpl (JAXP, 8189993) OpenJDK: RMI HTTP transport enabled by default (RMI, 8193833) | [
"cpe:/a:redhat:network_satellite:5.8::el6"
] | null | null | 4.2 | null |
RHSA-2023:5786 | Red Hat Security Advisory: python-reportlab security update | python-reportlab: code injection in paraparser.py allows code execution | [
"cpe:/a:redhat:rhel_eus:8.6::appstream"
] | null | 9.8 | null | null |
RHSA-2019:1489 | Red Hat Security Advisory: kernel security and bug fix update | kernel: Double free in lib/idr.c Kernel: tcp: integer overflow while processing SACK blocks allows remote denial of service Kernel: tcp: excessive resource consumption while processing SACK blocks allows remote denial of service kernel: tcp: excessive resource consumption for TCP connections with low MSS allows remote denial of service | [
"cpe:/o:redhat:rhel_aus:6.6::server"
] | null | null | 5.3 | null |
RHSA-2024:5523 | Red Hat Security Advisory: kpatch-patch-5_14_0-427_13_1 security update | kernel: net: kernel: UAF in network route management | [
"cpe:/o:redhat:enterprise_linux:9::baseos"
] | null | 7.8 | null | null |
RHSA-2023:0809 | Red Hat Security Advisory: firefox security update | Mozilla: Content security policy leak in violation reports using iframes Mozilla: Extensions could have opened external schemes without user knowledge Mozilla: Screen hijack via browser fullscreen mode Mozilla: Out of bounds memory write from EncodeInputStream Mozilla: Potential use-after-free from compartment mismatch in SpiderMonkey Mozilla: Invalid downcast in SVGUtils::SetupStrokeGeometry Mozilla: Use-after-free in mozilla::dom::ScriptLoadContext::~ScriptLoadContext Mozilla: Web Crypto ImportKey crashes tab Mozilla: Fullscreen notification not shown in Firefox Focus Mozilla: Memory safety bugs fixed in Firefox 110 and Firefox ESR 102.8 Mozilla: Memory safety bugs fixed in Firefox ESR 102.8 | [
"cpe:/a:redhat:rhel_eus:9.0::appstream"
] | null | 8.8 | null | null |
RHSA-2024:9637 | Red Hat Security Advisory: webkit2gtk3 security update | webkitgtk: webkit2gtk: Processing maliciously crafted web content may lead to an unexpected process crash webkitgtk: webkit2gtk: Processing maliciously crafted web content may lead to an unexpected process crash | [
"cpe:/a:redhat:rhel_e4s:9.0::appstream"
] | null | 4.3 | null | null |
RHSA-2020:0168 | Red Hat Security Advisory: openvswitch2.12 security and bug fix update | dpdk: possible memory leak leads to denial of service | [
"cpe:/o:redhat:enterprise_linux:7::fastdatapath"
] | null | null | 7.5 | null |
RHSA-2023:6659 | Red Hat Security Advisory: python3.9 security update | python: tarfile module directory traversal | [
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::crb",
"cpe:/o:redhat:enterprise_linux:9::baseos"
] | null | 5.5 | null | null |
RHSA-2024:3814 | Red Hat Security Advisory: tomcat security and bug fix update | Tomcat: WebSocket DoS with incomplete closing handshake Tomcat: HTTP/2 header handling DoS | [
"cpe:/a:redhat:rhel_eus:8.8::appstream"
] | null | 7.5 | null | null |
RHSA-2020:3835 | Red Hat Security Advisory: firefox security update | Mozilla: Memory safety bugs fixed in Firefox 81 and Firefox ESR 78.3 Mozilla: XSS when pasting attacker-controlled data into a contenteditable element Mozilla: Download origin spoofing via redirect Mozilla: When recursing through layers while scrolling, an iterator may have become invalid, resulting in a potential use-after-free scenario | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | 8.8 | 6.1 | null |
RHSA-2017:0331 | Red Hat Security Advisory: qemu-kvm-rhev security update | Qemu: display: cirrus: oob access while doing bitblt copy backward mode Qemu: display: cirrus: potential arbitrary code execution via cirrus_bitblt_cputovideo | [
"cpe:/a:redhat:openstack:7::el7"
] | null | null | 5.5 | null |
RHSA-2024:9192 | Red Hat Security Advisory: python3.11 security update | python: The zipfile module is vulnerable to zip-bombs leading to denial of service python: cpython: Iterating over a malicious ZIP file may lead to Denial of Service | [
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::crb"
] | null | 5.3 | null | null |
RHSA-2021:3234 | Red Hat Security Advisory: compat-exiv2-023 security update | exiv2: Heap-based buffer overflow vulnerability in jp2image.cpp | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 8.1 | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.