id
stringlengths 13
15
| title
stringlengths 29
176
| description
stringlengths 8
32.1k
| cpes
sequencelengths 0
20
| cvss_v4_0
null | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
null |
---|---|---|---|---|---|---|---|
RHSA-2011:1264 | Red Hat Security Advisory: gstreamer-plugins security update | libmodplug: multiple vulnerabilities reported in <= 0.8.8.3 libmodplug: multiple vulnerabilities reported in <= 0.8.8.3 libmodplug: multiple vulnerabilities reported in <= 0.8.8.3 libmodplug: multiple vulnerabilities reported in <= 0.8.8.3 libmodplug: multiple vulnerabilities reported in <= 0.8.8.3 | [
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2014:0254 | Red Hat Security Advisory: activemq security update | HawtJNI: predictable temporary file name leading to local arbitrary code execution Framework: XML External Entity (XXE) injection flaw Camel: remote code execution via header field manipulation Camel: remote code execution via XSL | [
"cpe:/a:redhat:openshift:1.2::el6"
] | null | null | null | null |
RHSA-2022:0499 | Red Hat Security Advisory: .NET 5.0 on RHEL 7 security and bugfix update | dotnet: ASP.NET Core Krestel HTTP headers pooling denial of service | [
"cpe:/a:redhat:rhel_dotnet:5.0::el7"
] | null | 7.5 | null | null |
RHSA-2022:0047 | Red Hat Security Advisory: Red Hat OpenShift Enterprise Logging security and bug fix update (5.0.11) | log4j-core: DoS in log4j 2.x with Thread Context Map (MDC) input data contains a recursive lookup and context lookup pattern | [
"cpe:/a:redhat:logging:5.0::el8"
] | null | 5.9 | null | null |
RHSA-2014:1281 | Red Hat Security Advisory: kernel security and bug fix update | kernel: DoS with syscall auditing | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | null | null |
RHSA-2014:1796 | Red Hat Security Advisory: Red Hat OpenShift Enterprise 2.2 Release Advisory | OpenShift: /proc/net/tcp information disclosure Enterprise: gears fail to properly isolate network traffic | [
"cpe:/a:redhat:openshift:2.0::el6"
] | null | null | null | null |
RHSA-2023:5970 | Red Hat Security Advisory: Red Hat OpenStack Platform 17.1.1 (collectd-libpod-stats) security update | golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487) HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack) | [
"cpe:/a:redhat:openstack:17.1::el8"
] | null | 7.5 | null | null |
RHSA-2013:0663 | Red Hat Security Advisory: sssd security and bug fix update | sssd: simple access provider flaw prevents intended ACL use when client to an AD provider | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2020:3654 | Red Hat Security Advisory: libcroco security update | libcroco: Stack overflow in function cr_parser_parse_any_core in cr-parser.c | [
"cpe:/a:redhat:enterprise_linux:8::crb",
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 6.1 | null | null |
RHSA-2018:0003 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.0.9 security update | RESTEasy: Abuse of GZIPInterceptor in RESTEasy can lead to denial of service attack undertow: HTTP Request smuggling vulnerability (incomplete fix of CVE-2017-2666) resteasy: Vary header not added by CORS filter leading to cache poisoning undertow: improper whitespace parsing leading to potential HTTP request smuggling EAP-7: Wrong privileges on multiple property files jboss: unsafe chown of server.log in jboss init script allows privilege escalation (Incomplete fix for CVE-2016-8656) Solr: Code execution via entity expansion | [
"cpe:/a:redhat:jboss_enterprise_application_platform:7"
] | null | null | 9.8 | null |
RHSA-2021:1243 | Red Hat Security Advisory: redhat-ds:11 security and bug fix update | 389-ds-base: information disclosure during the binding of a DN | [
"cpe:/a:redhat:directory_server:11.2::el8"
] | null | 5.3 | null | null |
RHBA-2024:0928 | Red Hat Bug Fix Advisory: MTV 2.5.5 Images | follow-redirects: Improper Input Validation due to the improper handling of URLs by the url.parse() jsrsasign: vulnerable to Observable Discrepancy via the RSA PKCS1.5 or RSAOAEP decryption process | [
"cpe:/a:redhat:migration_toolkit_virtualization:2.5::el8",
"cpe:/a:redhat:migration_toolkit_virtualization:2.5::el9"
] | null | 7.5 | null | null |
RHSA-2018:1929 | Red Hat Security Advisory: libvirt security update | libvirt: Incomplete fix for CVE-2018-5748 triggered by QEMU guest agent libvirt: Resource exhaustion via qemuMonitorIORead() method | [
"cpe:/a:redhat:storage:3:server:el6",
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | 3.3 | null |
RHSA-2024:8365 | Red Hat Security Advisory: python-idna security update | python-idna: potential DoS via resource consumption via specially crafted inputs to idna.encode() | [
"cpe:/o:redhat:rhel_els:7"
] | null | 6.5 | null | null |
RHSA-2013:1145 | Red Hat Security Advisory: Red Hat Enterprise Linux 5.6 Extended Update Support Retirement Notice | This is the final notification for the retirement of Red Hat Enterprise
Linux 5.6 Extended Update Support (EUS). | [
"cpe:/o:redhat:rhel_eus:5.6"
] | null | null | null | null |
RHSA-2024:4422 | Red Hat Security Advisory: fence-agents security update | urllib3: proxy-authorization request header is not stripped during cross-origin redirects | [
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::highavailability",
"cpe:/a:redhat:enterprise_linux:9::resilientstorage"
] | null | 4.4 | null | null |
RHSA-2019:1140 | Red Hat Security Advisory: Red Hat Single Sign-On 7.3.1 security update | jackson-databind: Potential information exfiltration with default typing, serialization gadget from MyBatis jackson-databind: improper polymorphic deserialization of types from Jodd-db library jackson-databind: improper polymorphic deserialization of types from Oracle JDBC driver undertow: Infoleak in some circumstances where Undertow can serve data from a random buffer jackson-databind: exfiltration/XXE in some JDK classes jackson-databind: server-side request forgery (SSRF) in axis2-jaxws class wildfly: Race condition on PID file allows for termination of arbitrary processes by local users keycloak: session hijack using the user access token wildfly: wrong SecurityIdentity for EE concurrency threads that are reused | [
"cpe:/a:redhat:jboss_single_sign_on:7.3"
] | null | null | 5.4 | null |
RHSA-2020:0160 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.2.6 on RHEL 7 security update | hibernate-validator: safeHTML validator allows XSS jackson-databind: Serialization gadgets in com.zaxxer.hikari.HikariConfig EAP: Vault system property security attribute value is revealed on CLI 'reload' command undertow: possible Denial Of Service (DOS) in Undertow HTTP server listening on HTTPS jackson-databind: Serialization gadgets in classes of the commons-configuration package jackson-databind: Serialization gadgets in classes of the xalan package jackson-databind: Serialization gadgets in com.zaxxer.hikari.HikariDataSource netty: HTTP request smuggling by mishandled whitespace before the colon in HTTP headers jackson-databind: Serialization gadgets in org.apache.commons.dbcp.datasources.* jackson-databind: Serialization gadgets in com.p6spy.engine.spy.P6DataSource jackson-databind: Serialization gadgets in classes of the ehcache package jackson-databind: Serialization gadgets in org.apache.log4j.receivers.db.* | [
"cpe:/a:redhat:jboss_enterprise_application_platform:7.2::el7"
] | null | null | 8.1 | null |
RHSA-2006:0580 | Red Hat Security Advisory: kernel security update | security flaw security flaw security flaw security flaw security flaw security flaw security flaw | [
"cpe:/o:redhat:enterprise_linux:2.1::as",
"cpe:/o:redhat:enterprise_linux:2.1::aw"
] | null | null | null | null |
RHSA-2020:5608 | Red Hat Security Advisory: fapolicyd bug fix update | An update for fapolicyd is now available for Red Hat Enterprise Linux 8.2 Extended Update Support. | [
"cpe:/a:redhat:rhel_eus:8.2::appstream"
] | null | null | null | null |
RHSA-2024:1227 | Red Hat Security Advisory: openvswitch3.1 security update | openvswsitch: ovs-vswitch fails to recover after malformed geneve metadata packet openvswitch: openvswitch don't match packets on nd_target field | [
"cpe:/o:redhat:enterprise_linux:9::fastdatapath"
] | null | 5.5 | null | null |
RHSA-2005:878 | Red Hat Security Advisory: cups security update | security flaw security flaw security flaw security flaw | [
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws",
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2023:3247 | Red Hat Security Advisory: git security update | git: by feeding specially crafted input to `git apply --reject`, a path outside the working tree can be overwritten with partially controlled contents git: malicious placement of crafted messages when git was compiled with runtime prefix git: arbitrary configuration injection when renaming or deleting a section from a configuration file | [
"cpe:/a:redhat:rhel_eus:8.6::appstream"
] | null | 7.8 | null | null |
RHSA-2022:7648 | Red Hat Security Advisory: grafana-pcp security update | golang: net/http: improper sanitization of Transfer-Encoding header golang: io/fs: stack exhaustion in Glob golang: compress/gzip: stack exhaustion in Reader.Read golang: path/filepath: stack exhaustion in Glob golang: encoding/gob: stack exhaustion in Decoder.Decode golang: net/http/httputil: NewSingleHostReverseProxy - omit X-Forwarded-For not working | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 6.5 | null | null |
RHSA-2015:2540 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 6.4.5 update | EAP: missing authorization check for Monitor/Deployer/Auditor role when shutting down server apache-commons-collections: InvokerTransformer code execution during deserialisation | [
"cpe:/a:redhat:jboss_enterprise_application_platform:6::el7"
] | null | null | null | null |
RHSA-2019:3494 | Red Hat Security Advisory: container-tools:1.0 security and bug fix update | containers/image: not enforcing TLS when sending username+password credentials to token servers leading to credential disclosure QEMU: slirp: heap buffer overflow during packet reassembly | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | null | 7 | null |
RHSA-2023:3540 | Red Hat Security Advisory: OpenShift Container Platform 4.13.3 bug fix and security update | golang: net/http, net/textproto: denial of service from excessive memory allocation golang: net/http, net/textproto, mime/multipart: denial of service from excessive resource consumption golang: go/parser: Infinite loop in parsing golang: html/template: backticks not treated as string delimiters golang: html/template: improper sanitization of CSS values golang: html/template: improper handling of empty HTML attributes | [
"cpe:/a:redhat:openshift:4.13::el9"
] | null | 7.3 | null | null |
RHSA-2008:0090 | Red Hat Security Advisory: icu security update | libicu poor back reference validation libicu incomplete interval handling | [
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2016:0706 | Red Hat Security Advisory: mercurial security update | mercurial: command injection via git subrepository urls mercurial: convert extension command injection via git repository names | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | null | null |
RHSA-2021:3446 | Red Hat Security Advisory: kernel security and bug fix update | kernel: out-of-bounds write due to a heap buffer overflow in __hidinput_change_resolution_multipliers() of hid-input.c kernel: use-after-free in route4_change() in net/sched/cls_route.c kernel: powerpc: KVM guest OS users can cause host OS memory corruption | [
"cpe:/a:redhat:rhel_eus:8.2::crb",
"cpe:/o:redhat:rhel_eus:8.2::baseos"
] | null | 7.8 | null | null |
RHSA-2024:9481 | Red Hat Security Advisory: Red Hat OpenStack Platform 18.0.3 (python-django) security update | python-django: Potential denial-of-service in django.utils.html.urlize() python-django: Username enumeration through timing difference for users with unusable passwords python-django: Potential directory-traversal in django.core.files.storage.Storage.save() python-django: Potential denial-of-service in django.utils.translation.get_supported_language_variant() | [
"cpe:/a:redhat:openstack:18.0::el9"
] | null | 5.3 | null | null |
RHSA-2020:1332 | Red Hat Security Advisory: ksh security update | ksh: certain environment variables interpreted as arithmetic expressions on startup, leading to code injection | [
"cpe:/o:redhat:rhel_eus:7.5::computenode",
"cpe:/o:redhat:rhel_eus:7.5::server"
] | null | 7.4 | null | null |
RHSA-2025:2615 | Red Hat Security Advisory: java-1.8.0-ibm security update | openjdk: Enhance array handling (Oracle CPU 2025-01) | [
"cpe:/a:redhat:enterprise_linux:8::supplementary"
] | null | 4.8 | null | null |
RHSA-2021:4875 | Red Hat Security Advisory: kernel-rt security and bug fix update | kernel: use-after-free in drivers/infiniband/core/ucma.c ctx use-after-free kernel: timer tree corruption leads to missing wakeup and system freeze | [
"cpe:/a:redhat:rhel_eus:8.2::nfv",
"cpe:/a:redhat:rhel_eus:8.2::realtime"
] | null | 4.4 | null | null |
RHSA-2023:0630 | Red Hat Security Advisory: Red Hat Advanced Cluster Management 2.7.0 security and bug fix updates | nodejs-minimatch: ReDoS via the braceExpand function golang: crypto/tls: session tickets lack random ticket_age_add crewjam/saml: Authentication bypass when processing SAML responses containing multiple Assertion elements luxon: Inefficient regular expression complexity in luxon.js | [
"cpe:/a:redhat:acm:2.7::el8"
] | null | 7.5 | null | null |
RHSA-2020:4945 | Red Hat Security Advisory: thunderbird security update | Mozilla: Memory safety bugs fixed in Firefox 82 and Firefox ESR 78.4 chromium-browser: Use after free in WebRTC | [
"cpe:/a:redhat:rhel_eus:8.1::appstream"
] | null | 8.8 | null | null |
RHSA-2018:1448 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 6.4.20 security update | Artemis: Deserialization of untrusted input vulnerability solr: Directory traversal via Index Replication HTTP API jackson-databind: Unsafe deserialization due to incomplete black list (incomplete fix for CVE-2017-7525) jackson-databind: Unsafe deserialization due to incomplete black list (incomplete fix for CVE-2017-15095) tomcat: Incorrect handling of empty string URL in security constraints can lead to unintended exposure of resources jackson-databind: incomplete fix for CVE-2017-7525 permits unsafe serialization via c3p0 libraries slf4j: Deserialisation vulnerability in EventData constructor can allow for arbitrary code execution | [
"cpe:/a:redhat:jboss_enterprise_application_platform:6::el7"
] | null | null | 8.1 | null |
RHSA-2020:2814 | Red Hat Security Advisory: RH-SSO 7.4.1 adapters for Red Hat JBoss Enterprise Application Platform 7 | keycloak: Lack of checks in ObjectInputStream leading to Remote Code Execution | [
"cpe:/a:redhat:jboss_enterprise_application_platform:7.3::el6",
"cpe:/a:redhat:jboss_enterprise_application_platform:7.3::el7",
"cpe:/a:redhat:jboss_enterprise_application_platform:7.3::el8"
] | null | null | 7.5 | null |
RHSA-2020:4245 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.3.3 security update on RHEL 8 | cxf: JMX integration is vulnerable to a MITM attack picketbox: JBoss EAP reload to admin-only mode allows authentication bypass wildfly: XML validation manipulation due to incomplete application of use-grammar-pool-only in xercesImpl xnio: file descriptor leak caused by growing amounts of NIO Selector file handles may lead to DoS | [
"cpe:/a:redhat:jboss_enterprise_application_platform:7.3::el8"
] | null | 5.9 | null | null |
RHSA-2017:0882 | Red Hat Security Advisory: v8 security update | V8: integer overflow leading to buffer overflow in Zone::New | [
"cpe:/a:redhat:openstack:10::el7"
] | null | null | 5.6 | null |
RHSA-2025:3894 | Red Hat Security Advisory: kernel-rt security update | kernel: ALSA: usb-audio: Fix out of bounds reads when finding clock sources kernel: xen: Xen hypercall page unsafe against speculative attacks (Xen Security Advisory 466) | [
"cpe:/a:redhat:enterprise_linux:8::nfv",
"cpe:/a:redhat:enterprise_linux:8::realtime"
] | null | 5.7 | null | null |
RHSA-2012:0568 | Red Hat Security Advisory: php security update | php: command line arguments injection when run in CGI mode (VU#520827) | [
"cpe:/o:redhat:rhel_eus:5.6",
"cpe:/o:redhat:rhel_eus:6.0",
"cpe:/o:redhat:rhel_eus:6.1",
"cpe:/o:redhat:rhel_mission_critical:5.3"
] | null | null | null | null |
RHSA-2024:0477 | Red Hat Security Advisory: frr security update | ffr: Flowspec overflow in bgpd/bgp_flowspec.c ffr: Out of bounds read in bgpd/bgp_label.c frr: crash from specially crafted MP_UNREACH_NLRI-containing BGP UPDATE message frr: crash from malformed EOR-containing BGP UPDATE message | [
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 7.5 | null | null |
RHSA-2024:1574 | Red Hat Security Advisory: OpenShift Container Platform 4.12.54 packages and security update | golang-fips/openssl: Memory leaks in code encrypting and decrypting RSA payloads golang-protobuf: encoding/protojson, internal/encoding/json: infinite loop in protojson.Unmarshal when unmarshaling certain forms of invalid JSON jose-go: improper handling of highly compressed data | [
"cpe:/a:redhat:openshift:4.12::el8",
"cpe:/a:redhat:openshift:4.12::el9"
] | null | 4.3 | null | null |
RHSA-2021:2304 | Red Hat Security Advisory: microcode_ctl security, bug fix and enhancement update | hw: vt-d related privilege escalation hw: improper isolation of shared resources in some Intel Processors hw: observable timing discrepancy in some Intel Processors hw: information disclosure on some Intel Atom processors | [
"cpe:/o:redhat:rhel_eus:7.7::computenode",
"cpe:/o:redhat:rhel_eus:7.7::server"
] | null | 5.6 | null | null |
RHSA-2025:3935 | Red Hat Security Advisory: kernel security update | kernel: asix: fix uninit-value in asix_mdio_read() kernel: virtio-blk: fix implicit overflow on virtio_max_dma_size kernel: bonding: stop the device in bond_setup_by_slave() kernel: tcp: make sure init the accept_queue's spinlocks once kernel: wifi: mac80211: fix race condition on enabling fast-xmit kernel: wifi: brcm80211: handle pmk_op allocation failure kernel: netfilter: nf_tables: reject new basechain after table flag update kernel: wifi: ath11k: decrease MHI channel buffer length to 8KB kernel: igb: Fix string truncation warnings in igb_set_fw_version kernel: ipv6: fib6_rules: avoid possible NULL dereference in fib6_rule_action() kernel: nfs: Handle error of rpc_proc_register() in nfs_net_init(). kernel: irqchip/gic-v4: Don't allow a VMOVP on a dying VPE kernel: ALSA: usb-audio: Fix out of bounds reads when finding clock sources | [
"cpe:/a:redhat:rhel_eus:9.4::appstream",
"cpe:/a:redhat:rhel_eus:9.4::crb",
"cpe:/a:redhat:rhel_eus:9.4::nfv",
"cpe:/a:redhat:rhel_eus:9.4::realtime",
"cpe:/o:redhat:rhel_eus:9.4::baseos"
] | null | 7.1 | null | null |
RHSA-2014:0376 | Red Hat Security Advisory: openssl security update | openssl: information disclosure in handling of TLS heartbeat extension packets | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2023:0318 | Red Hat Security Advisory: postgresql-jdbc security update | postgresql: SQL Injection in ResultSet.refreshRow() with malicious column names | [
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 8 | null | null |
RHSA-2019:0364 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.1.6 on RHEL 6 security update | wildfly-core: Cross-site scripting (XSS) in JBoss Management Console undertow: Infoleak in some circumstances where Undertow can serve data from a random buffer dom4j: XML Injection in Class: Element. Methods: addElement, addAttribute which can impact the integrity of XML documents | [
"cpe:/a:redhat:jboss_enterprise_application_platform:7::el6"
] | null | null | 5.3 | null |
RHSA-2020:2663 | Red Hat Security Advisory: ntp security update | ntp: DoS on client ntpd using server mode packet ntp: ntpd using highly predictable transmit timestamps could result in time change or DoS | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 7.4 | 3.7 | null |
RHSA-2015:1894 | Red Hat Security Advisory: python-django security update | python-django: Denial-of-service possibility in logout() view by filling session store python-django: Denial-of-service possibility in logout() view by filling session store | [
"cpe:/a:redhat:openstack:6::el7"
] | null | null | null | null |
RHSA-2022:6318 | Red Hat Security Advisory: OpenShift Container Platform 4.9.48 extras security update | golang: out-of-bounds read in golang.org/x/text/language leads to DoS | [
"cpe:/a:redhat:openshift:4.9::el8"
] | null | 7.5 | null | null |
RHSA-2016:0441 | Red Hat Security Advisory: openstack-heat bug fix and security advisory | openstack-heat: Vulnerability in Heat template validation leading to DoS | [
"cpe:/a:redhat:openstack:5::el7"
] | null | null | null | null |
RHSA-2014:1019 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 6.3.0 update | httpd: mod_deflate denial of service netty: DoS via memory exhaustion during data aggregation httpd: mod_status heap-based buffer overflow Tomcat/JBossWeb: request smuggling and limited DoS in ChunkedInputFilter httpd: mod_cgid denial of service WS: Incomplete fix for CVE-2013-2133 Security: Invalid EJB caller role check implementation | [
"cpe:/a:redhat:jboss_enterprise_application_platform:6::el5"
] | null | null | null | null |
RHSA-2020:5235 | Red Hat Security Advisory: thunderbird security update | Mozilla: Variable time processing of cross-origin images during drawImage calls Mozilla: Parsing mismatches could confuse and bypass security sanitizer for chrome privileged code Mozilla: Fullscreen could be enabled without displaying the security UI Mozilla: XSS through paste (manual and clipboard API) Mozilla: Requests intercepted through ServiceWorkers lacked MIME type restrictions Mozilla: Use-after-free in WebRequestService Mozilla: Potential use-after-free in uses of nsTArray Mozilla: DoH did not filter IPv4 mapped IP Addresses Mozilla: Software keyboards may have remembered typed passwords Mozilla: Memory safety bugs fixed in Firefox 83 and Firefox ESR 78.5 | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 8.8 | 6.1 | null |
RHSA-2024:6816 | Red Hat Security Advisory: thunderbird security update | mozilla: Type Confusion in Async Generators in Javascript Engine mozilla: Type confusion when looking up a property name in a "with" block mozilla: Internal event interfaces were exposed to web content when browser EventHandler listener callbacks ran mozilla: Garbage collection could mis-color cross-compartment objects in OOM conditions mozilla: WASM type confusion involving ArrayTypes mozilla: SelectElements could be shown over another site if popups are allowed mozilla: Memory safety bugs fixed in Firefox 130, Firefox ESR 128.2, and Thunderbird 128.2 thunderbird: Crash when aborting verification of OTR chat | [
"cpe:/a:redhat:rhel_tus:8.6::appstream"
] | null | 6.5 | null | null |
RHSA-2015:2665 | Red Hat Security Advisory: chromium-browser security update | chromium-browser: Fixes from internal audits and fuzzing chromium-browser: Use-After-free in MidiHost | [
"cpe:/a:redhat:rhel_extras:6"
] | null | null | null | null |
RHSA-2007:0157 | Red Hat Security Advisory: xorg-x11-apps and libX11 security update | XGetPixel() integer overflow | [
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2024:3754 | Red Hat Security Advisory: ipa security update | freeipa: delegation rules allow a proxy service to impersonate any user to access another target service freeipa: user can obtain a hash of the passwords of all domain users and perform offline brute force | [
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::crb"
] | null | 8.1 | null | null |
RHSA-2019:3964 | Red Hat Security Advisory: python-jinja2 security update | python-jinja2: Sandbox escape due to information disclosure via str.format | [
"cpe:/o:redhat:rhel_eus:7.5::computenode",
"cpe:/o:redhat:rhel_eus:7.5::server"
] | null | null | 9 | null |
RHSA-2013:1455 | Red Hat Security Advisory: Red Hat Network Satellite server IBM Java Runtime security update | JDK: unspecified vulnerabilities fixed in 6u26 (Sound) JDK: unspecified vulnerabilities fixed in 6u26 (Sound) OpenJDK: integer overflows in JPEGImageReader and font SunLayoutEngine (2D, 7013519) JDK: unspecified vulnerability fixed in 6u26 (Deployment) OpenJDK: Deserialization allows creation of mutable SignedObject (Deserialization, 6618658) OpenJDK: NetworkInterface information leak (Networking, 7013969) OpenJDK: incorrect numeric type conversion in TransformHelper (2D, 7016495) OpenJDK: unprivileged proxy settings change via SOAPConnection (SAAJ, 7013971) OpenJDK: MediaTracker created Component instances with unnecessary privileges (Swing, 7020198) JDK: unspecified vulnerability fixed in 6u26 (2D) HTTPS: block-wise chosen-plaintext attack against SSL/TLS (BEAST) JDK: unspecified vulnerability fixed in 6u29 (Deployment) OpenJDK: IIOP deserialization code execution (Deserialization, 7055902) OpenJDK: missing SecurityManager checks in scripting engine (Scripting, 7046823) JDK: unspecified vulnerability fixed in 6u29 (Sound) JDK: unspecified vulnerability fixed in 6u29 (Deployment) OpenJDK: InputStream skip() information leak (Networking/IO, 7000600) OpenJDK: mutable static AWTKeyStroke.ctor (AWT, 7019773) JDK: unspecified vulnerability fixed in 6u29 (Swing) JDK: unspecified vulnerability fixed in 6u29 (AWT) OpenJDK: Java2D TransformHelper integer overflow (2D, 7023640) OpenJDK: excessive default UDP socket limit under SecurityManager (Networking, 7032417) OpenJDK: JAX-WS stack-traces information leak (JAX-WS, 7046794) OpenJDK: insufficient pack200 JAR files uncompress error checks (Runtime, 7057857) OpenJDK: RMI DGC server remote code execution (RMI, 7077466) OpenJDK: RMI registry privileged code execution (RMI, 7083012) OpenJDK: missing checkSetFactory calls in HttpsURLConnection (JSSE, 7096936) JDK: unspecified vulnerability fixed in 6u29 (Deployment) OpenJDK: JavaSound incorrect bounds check (Sound, 7088367) GlassFish: hash table collisions CPU usage DoS (oCERT-2011-003) OpenJDK: insufficient checking of the graphics rendering object (2D, 7112642) JDK: unspecified vulnerability fixed in 6u31 and 7u3 (2D) JDK: unspecified vulnerability fixed in 6u31 and 7u3 (2D) JDK: unspecified vulnerability fixed in 6u31 and 7u3 (Deployment) OpenJDK: off-by-one bug in ZIP reading code (JRE, 7118283) OpenJDK: KeyboardFocusManager focus stealing (AWT, 7110683) OpenJDK: unrestricted use of TimeZone.setDefault() (i18n, 7110687) OpenJDK: incomplete info in the deserialization exception (Serialization, 7110700) OpenJDK: mutable repository identifiers (CORBA, 7110704) OpenJDK: AtomicReferenceArray insufficient array type check (Concurrency, 7082299) OpenJDK: AWT hardening fixes (AWT, 7163201) JDK: unspecified vulnerability fixed in 6u33 and 7u5 (Deployment) JDK: unspecified vulnerability (2D) JDK: unspecified vulnerability (Deployment) JDK: unspecified vulnerability (Deployment) JDK: unspecified vulnerability fixed in 6u39 and 7u13 (Deployment) OpenJDK: beans ClassFinder insufficient permission checks (beans, 7162476) OpenJDK: fontmanager layout lookup code memory corruption (2D, 7143617) OpenJDK: SynthLookAndFeel application context bypass (Swing, 7143614) OpenJDK: insecure temporary file permissions (JRE, 7143606) OpenJDK: CRL and certificate extensions handling improvements (Security, 7143872) OpenJDK: mutable repository identifiers in generated stub code (CORBA, 7143851) JDK: unspecified vulnerability fixed in 6u33 and 7u5 (Deployment) JDK: unspecified vulnerability fixed in 6u33 and 7u5 (Deployment) OpenJDK: insufficient invokespecial <init> verification (HotSpot, 7160757) JDK: unspecified vulnerability (JMX) JDK: unspecified vulnerability (Deployment) JDK: unspecified vulnerability fixed in 6u39 and 7u13 (Scripting) OpenJDK: java.io.FilePermission information leak (Libraries, 6631398) JDK: unspecified vulnerability fixed in 6u39 and 7u13 (Deployment) JDK: java.lang.reflect.Method invoke() code execution JDK: java.lang.class code execution JDK: java.lang.ClassLoder defineClass() code execution OpenJDK: RhinoScriptEngine security bypass (Scripting, 7143535) OpenJDK: Executors state handling issues (Concurrency, 7189103) OpenJDK: DescriptorSupport insufficient package access checks (JMX, 7192975) OpenJDK: AccessController.doPrivilegedWithCombiner() information disclosure (Security, 7172522) OpenJDK: LogManager security bypass (Libraries, 7169884) OpenJDK: RMIConnectionImpl information disclosure (JMX, 7169888) OpenJDK: ServiceLoader reject not subtype classes without instantiating (Libraries, 7195919) OpenJDK: JSSE denial of service (JSSE, 7186286) JDK: unspecified vulnerability (2D) OpenJDK: DefaultFormatter insufficient data validation (Swing, 7195194) OpenJDK: RMIConnectionImpl insufficient access control checks (JMX, 7198296) SSL/TLS: CBC padding timing attack (lucky-13) JDK: unspecified vulnerability fixed in 6u39 and 7u13 (Deployment) OpenJDK: sun.awt.datatransfer.ClassLoaderObjectInputStream class may incorrectly invoke the system class loader (CanSecWest 2013, AWT, 8009305) JDK: unspecified vulnerability fixed in 6u39 and 7u13 (JMX) JDK: unspecified vulnerability fixed in 6u39 and 7u13 (Deployment) JDK: unspecified vulnerability fixed in 6u39 and 7u13 (Deployment) OpenJDK: RMI CGIHandler XSS issue (RMI, 6563318) OpenJDK: logging insufficient access control checks (Libraries, 6664509) OpenJDK: logging insufficient access control checks (Libraries, 6664528) OpenJDK: invalid threads subject to interrupts (Libraries, 6776941) OpenJDK: reflection API incorrect checks for proxy classes (Libraries, 7197546, SE-2012-01 Issue 29) OpenJDK: insufficient clipboard access premission checks (AWT, 7186952) OpenJDK: InetSocketAddress serialization issue (Networking, 7201071) OpenJDK: loadPropertyFile missing restrictions (JAXP, 8001235) OpenJDK: com.sun.xml.internal.* not restricted packages (JAX-WS, 7201068) JDK: unspecified vulnerability fixed in 6u39 and 7u13 (Deployment) OpenJDK: CPU consumption DoS via repeated SSL ClientHello packets (JSSE, 7192393) OpenJDK: missing serialization restriction (CORBA, 7201066) OpenJDK: insufficient privilege checking issue (AWT, 7192977) OpenJDK: insufficient Diffie-Hellman public key checks (JSSE, 7192392) OpenJDK: insufficient privilege checking issue (AWT, 8001057) JDK: unspecified vulnerability fixed in 6u39 and 7u13 (Deployment) OpenJDK: RequiredModelMBean missing access control context checks (JMX, 8000537) OpenJDK: Specially crafted sample model integer overflow (2D, 8007014) JDK: unspecified vulnerability fixed in 6u39 and 7u13 (Deployment) OpenJDK: missing ValueHandlerImpl class constructor access restriction (CORBA, 8000631) OpenJDK: image parser insufficient raster parameter checks (2D, 8001972) OpenJDK: image parser insufficient raster parameter checks (AWT, 8002325) JDK: unspecified vulnerability fixed in 6u39 (Sound) OpenJDK: MBeanServer insufficient privilege restrictions (JMX, 8006446) JDK: unspecified vulnerability fixed in 6u41 and 7u15 (Deployment) JDK: unspecified sanbox bypass (CanSecWest 2013, 2D) OpenJDK: CMM malformed raster memory corruption (2D, 8007675) OpenJDK: Insecure shared memory permissions (2D, 8001034) OpenJDK: remote code loading enabled by default (RMI, 8001040) JDK: unspecified vulnerability fixed in 7u21 and 6u45 (Deployment) OpenJDK: LogStream.setDefaultStream() missing security restrictions (RMI, 8001329) JDK: unspecified vulnerability fixed in 7u21 and 6u45 (Install) ICU: Layout Engine font layout and glyph table errors (JDK 2D, 8004994) OpenJDK: Frame injection in generated HTML (Javadoc, 8012375) ICU: Layout Engine font layout and glyph table errors (JDK 2D, 8004986) ICU: Layout Engine font layout and glyph table errors (JDK 2D, 8004987) JDK: unspecified vulnerability fixed in 7u21 and 6u45 (2D) OpenJDK: Integrate Apache Santuario, rework class loader (Libraries, 6741606, 8008744) OpenJDK: JConsole SSL support (Serviceability, 8003703) OpenJDK: Network InetAddress serialization information disclosure (Networking, 8000724) JDK: unspecified vulnerability fixed in 7u21 and 6u45 (Deployment) ICU: Layout Engine font processing errors (JDK 2D, 8001031) OpenJDK: image processing vulnerability (2D, 8007617) OpenJDK: MethodUtil trampoline class incorrect restrictions (Libraries, 8009857) OpenJDK: MBeanInstantiator insufficient class access checks (JMX, 8006435) OpenJDK: JPEGImageWriter state corruption (ImageIO, 8007918) OpenJDK: JPEGImageReader state corruption (ImageIO, 8007667) JDK: unspecified vulnerability fixed in 7u21 and 6u45 (2D) JDK: unspecified vulnerability fixed in 7u21 and 6u45 (Deployment) JDK: unspecified vulnerability fixed in 7u21 and 6u45 (Deployment) JDK: unspecified vulnerability fixed in 7u25 (Deployment) JDK: unspecified vulnerability fixed in 7u21 and 6u45 (Deployment) JDK: unspecified vulnerability fixed in 7u25 (Deployment) OpenJDK: AccessControlContext check order issue (Libraries, 8001330) OpenJDK: Resource denial of service (AWT, 8001038) OpenJDK: output stream access restrictions (CORBA, 8000642) OpenJDK: Prevent revealing the local address (Networking, 8001318) OpenJDK: Better access restrictions (Sound, 8006328) OpenJDK: ObjectStreamClass circular reference denial of service (Serialization, 8000638) OpenJDK: exclusive port binding (Networking, 7170730) OpenJDK: Unique VMIDs (Libraries, 8001033) OpenJDK: MBeanServer Introspector package access (JMX, 8008124) OpenJDK: SerialJavaObject package restriction (JDBC, 8009554) OpenJDK: getEnclosing* checks (Libraries, 8007812) OpenJDK: ObjectOutputStream access checks (Serialization, 8008132) OpenJDK: Proper class checking (JMX, 8008120) OpenJDK: Various AWT integer overflow checks (AWT, 8009071) OpenJDK: Incorrect image attribute verification (2D, 8012438) JDK: unspecified vulnerability fixed in 7u25 (2D) OpenJDK: Incorrect image channel verification (2D, 8012597) JDK: unspecified vulnerability fixed in 7u25 (Deployment) JDK: unspecified vulnerability fixed in 7u25 (Deployment) OpenJDK: Incorrect image layout verification (2D, 8012601) OpenJDK: ImagingLib byte lookup processing (2D, 8011243) OpenJDK: Incorrect IntegerComponentRaster size checks (2D, 8011248) OpenJDK: Incorrect ShortBandedRaster size checks (2D, 8011253) OpenJDK: Incorrect ByteBandedRaster size checks (2D, 8011257) JDK: unspecified vulnerability fixed in 6u51 and 5u51 (AWT) | [
"cpe:/a:redhat:network_satellite:5.4::el5",
"cpe:/a:redhat:network_satellite:5.4::el6"
] | null | null | null | null |
RHSA-2024:0386 | Red Hat Security Advisory: kpatch-patch security update | kernel: net/sched: sch_hfsc UAF kernel: use after free in nvmet_tcp_free_crypto in NVMe kernel: IGB driver inadequate buffer size for frames larger than MTU | [
"cpe:/o:redhat:rhel_eus:9.0::baseos"
] | null | 7.5 | null | null |
RHSA-2022:0237 | Red Hat Security Advisory: Red Hat OpenStack Platform 16.2 (etcd) security update | golang: net: incorrect parsing of extraneous zero characters at the beginning of an IP address octet golang: crypto/tls: certificate of wrong type is causing TLS client to panic golang: net/http: limit growth of header canonicalization cache | [
"cpe:/a:redhat:openstack:16.2::el8"
] | null | 7.5 | null | null |
RHSA-2016:2055 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 6.4.10 natives update on RHEL 6 | httpd: HTTP request smuggling attack against chunked request parser mod_cluster: remotely Segfault Apache http server mod_cluster: Buffer overflow in mod_manager when sending request with long JVMRoute | [
"cpe:/a:redhat:jboss_enterprise_application_platform:6::el6"
] | null | null | 4.8 | null |
RHSA-2012:0100 | Red Hat Security Advisory: MRG Grid security, bug fix, and enhancement update | Condor: Multiple format string flaws | [
"cpe:/a:redhat:enterprise_mrg:2::el5"
] | null | null | null | null |
RHSA-2022:5526 | Red Hat Security Advisory: squid:4 security update | squid: DoS when processing gopher server responses | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 7.5 | null | null |
RHSA-2004:051 | Red Hat Security Advisory: : Updated mutt packages fix remotely-triggerable crash | security flaw | [
"cpe:/o:redhat:linux:9"
] | null | null | null | null |
RHBA-2023:5988 | Red Hat Bug Fix Advisory: Updated rhel9/firefox-flatpak container image | libwebp: Heap buffer overflow in WebP Codec | [
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 9.6 | null | null |
RHSA-2023:2166 | Red Hat Security Advisory: freeradius security and bug fix update | freeradius: Information leakage in EAP-PWD freeradius: Crash on unknown option in EAP-SIM freeradius: Crash on invalid abinary data | [
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::crb"
] | null | 7.5 | null | null |
RHSA-2024:5858 | Red Hat Security Advisory: kpatch-patch-5_14_0-70_85_1 security update | kernel: TIPC message reassembly use-after-free remote code execution vulnerability kernel: net: kernel: UAF in network route management kernel: virtio-net: tap: mlx5_core short frame denial of service kernel: virtio-net: tun: mlx5_core short frame denial of service | [
"cpe:/o:redhat:rhel_e4s:9.0::baseos"
] | null | 7.1 | null | null |
RHSA-2022:6838 | Red Hat Security Advisory: expat security update | expat: a use-after-free in the doContent function in xmlparse.c | [
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/o:redhat:enterprise_linux:9::baseos"
] | null | 8.1 | null | null |
RHSA-2017:2860 | Red Hat Security Advisory: postgresql security update | postgresql: Empty password accepted in some authentication methods | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | 5.6 | null |
RHSA-2019:2947 | Red Hat Security Advisory: Red Hat Enterprise Linux 5.9 Advanced Mission Critical (AMC) Six-Month Notice | This is the Six-Month notification for the retirement of Red Hat Enterprise Linux 5.9 Advanced Mission Critical (AMC). This notification applies only to those customers subscribed to the Advanced Mission Critical (AMC) channel for Red Hat Enterprise Linux 5.9. | [
"cpe:/o:redhat:rhel_aus:5.9"
] | null | null | null | null |
RHSA-2022:6176 | Red Hat Security Advisory: firefox security update | Mozilla: Address bar spoofing via XSLT error handling Mozilla: Cross-origin XSLT Documents would have inherited the parent's permissions Mozilla: Data race and potential use-after-free in PK11_ChangePW Mozilla: Memory safety bugs fixed in Firefox 104 and Firefox ESR 102.2 Mozilla: Memory safety bugs fixed in Firefox 104, Firefox ESR 102.2, and Firefox ESR 91.13 | [
"cpe:/a:redhat:rhel_eus:8.4::appstream"
] | null | 8.8 | 7.5 | null |
RHSA-2015:2524 | Red Hat Security Advisory: Red Hat JBoss Operations Network 3.3.4 security update | apache-commons-collections: InvokerTransformer code execution during deserialisation | [
"cpe:/a:redhat:jboss_operations_network:3.3"
] | null | null | null | null |
RHSA-2018:1660 | Red Hat Security Advisory: qemu-kvm security update | hw: cpu: speculative store bypass | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | 5.6 | null |
RHSA-2024:4559 | Red Hat Security Advisory: nodejs security update | nodejs: using the fetch() function to retrieve content from an untrusted URL leads to denial of service c-ares: Out of bounds read in ares__read_line() nodejs: HTTP Request Smuggling via Content Length Obfuscation | [
"cpe:/a:redhat:rhel_eus:9.2::appstream"
] | null | 6.1 | null | null |
RHSA-2021:1563 | Red Hat Security Advisory: OpenShift Container Platform 4.7.12 extras and security update | gogo/protobuf: plugin/unmarshal/unmarshal.go lacks certain index validation | [
"cpe:/a:redhat:openshift:4.7::el8"
] | null | 8.6 | null | null |
RHSA-2024:9185 | Red Hat Security Advisory: iperf3 security update | iperf3: possible denial of service iperf3: vulnerable to marvin attack if the authentication option is used | [
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 5.9 | null | null |
RHSA-2011:0279 | Red Hat Security Advisory: Red Hat Enterprise Linux Extended Update Support 4.7 6-Month EOL Notice | This is the 6-month notification of the End Of Life plans for Red Hat
Enterprise Linux Extended Update Support Add-On (EUS) 4.7. | [
"cpe:/o:redhat:rhel_eus:4.7::as",
"cpe:/o:redhat:rhel_eus:4.7::es"
] | null | null | null | null |
RHSA-2009:1287 | Red Hat Security Advisory: openssh security, bug fix, and enhancement update | OpenSSH: Plaintext Recovery Attack against CBC ciphers | [
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2022:1991 | Red Hat Security Advisory: cpio security update | cpio: integer overflow in ds_fgetstr() in dstring.c can lead to an out-of-bounds write via a crafted pattern file | [
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 7 | null | null |
RHSA-2024:1234 | Red Hat Security Advisory: openvswitch2.17 security update | openvswsitch: ovs-vswitch fails to recover after malformed geneve metadata packet openvswitch: openvswitch don't match packets on nd_target field | [
"cpe:/o:redhat:enterprise_linux:8::fastdatapath"
] | null | 5.5 | null | null |
RHSA-2018:1809 | Red Hat Security Advisory: Red Hat OpenShift Application Runtimes Spring Boot security and bug fix update | spring-framework: ReDoS Attack with spring-messaging spring-data-commons: XXE with Spring Data’s XMLBeam integration spring-security-oauth: remote code execution in the authorization process | [
"cpe:/a:redhat:openshift_application_runtimes:1.0"
] | null | null | 6.3 | null |
RHSA-2021:3723 | Red Hat Security Advisory: samba security, bug fix and enhancement update | samba: Netlogon elevation of privilege vulnerability (Zerologon) samba: Missing handle permissions check in SMB1/2/3 ChangeNotify samba: Unprivileged user can crash winbind samba: Negative idmap cache entries can cause incorrect group entries in the Samba file server process token | [
"cpe:/a:redhat:storage:3.5:samba:el7"
] | null | 6.8 | null | null |
RHSA-2021:3903 | Red Hat Security Advisory: curl security update | curl: Content not matching hash in Metalink is not being discarded curl: Metalink download sends credentials | [
"cpe:/o:redhat:rhel_eus:8.2::baseos"
] | null | 5.7 | null | null |
RHSA-2023:0198 | Red Hat Security Advisory: java-11-openjdk security update | OpenJDK: handshake DoS attack against DTLS connections (JSSE, 8287411) OpenJDK: soundbank URL remote loading (Sound, 8293742) | [
"cpe:/a:redhat:rhel_eus:8.4::appstream",
"cpe:/a:redhat:rhel_eus:8.4::crb"
] | null | 3.7 | null | null |
RHSA-2023:2802 | Red Hat Security Advisory: container-tools:4.0 security and bug fix update | golang: net/http: improper sanitization of Transfer-Encoding header golang: go/parser: stack exhaustion in all Parse* functions podman: possible information disclosure and modification golang: net/http: handle server errors after sending GOAWAY golang: encoding/xml: stack exhaustion in Decoder.Skip golang: io/fs: stack exhaustion in Glob golang: compress/gzip: stack exhaustion in Reader.Read golang: path/filepath: stack exhaustion in Glob golang: encoding/xml: stack exhaustion in Unmarshal golang: encoding/gob: stack exhaustion in Decoder.Decode golang: net/http/httputil: NewSingleHostReverseProxy - omit X-Forwarded-For not working golang: math/big: decoding big.Float and big.Rat types can panic if the encoded message is too short, potentially allowing a denial of service golang: net/http: excessive memory growth in a Go server accepting HTTP/2 requests podman: symlink exchange attack in podman export volume | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 6.8 | null | null |
RHSA-2013:1060 | Red Hat Security Advisory: java-1.7.0-ibm security update | OpenJDK: Insecure shared memory permissions (2D, 8001034) OpenJDK: Frame injection in generated HTML (Javadoc, 8012375) JDK: unspecified vulnerability fixed in 7u25 (Deployment) OpenJDK: Integrate Apache Santuario, rework class loader (Libraries, 6741606, 8008744) OpenJDK: JConsole SSL support (Serviceability, 8003703) JDK: unspecified vulnerability fixed in 7u25 (Deployment) JDK: unspecified vulnerability fixed in 7u25 (Deployment) OpenJDK: Resource denial of service (AWT, 8001038) OpenJDK: output stream access restrictions (CORBA, 8000642) OpenJDK: Prevent revealing the local address (Networking, 8001318) OpenJDK: Better access restrictions (Sound, 8006328) OpenJDK: GnomeFileTypeDetector path access check (Libraries, 8004288) OpenJDK: ObjectStreamClass circular reference denial of service (Serialization, 8000638) OpenJDK: exclusive port binding (Networking, 7170730) OpenJDK: Unique VMIDs (Libraries, 8001033) OpenJDK: MBeanServer Introspector package access (JMX, 8008124) OpenJDK: SerialJavaObject package restriction (JDBC, 8009554) OpenJDK: getEnclosing* checks (Libraries, 8007812) OpenJDK: ObjectOutputStream access checks (Serialization, 8008132) OpenJDK: Proper class checking (JMX, 8008120) OpenJDK: Method handles (Libraries, 8009424) OpenJDK: Various AWT integer overflow checks (AWT, 8009071) OpenJDK: tracing insufficient access checks (Serviceability, 8010209) JDK: unspecified vulnerability fixed in 7u25 (Deployment) OpenJDK: Incorrect image attribute verification (2D, 8012438) JDK: unspecified vulnerability fixed in 7u25 (2D) OpenJDK: Incorrect image channel verification (2D, 8012597) JDK: unspecified vulnerability fixed in 7u25 (Deployment) JDK: unspecified vulnerability fixed in 7u25 (Deployment) OpenJDK: Incorrect image layout verification (2D, 8012601) OpenJDK: ImagingLib byte lookup processing (2D, 8011243) OpenJDK: Incorrect IntegerComponentRaster size checks (2D, 8011248) OpenJDK: Incorrect ShortBandedRaster size checks (2D, 8011253) OpenJDK: Incorrect ByteBandedRaster size checks (2D, 8011257) JDK: Unspecified security fixes (July 2013) JDK: Unspecified security fixes (July 2013) JDK: Unspecified security fixes (July 2013) JDK: Unspecified security fixes (July 2013) JDK: Unspecified security fixes (July 2013) JDK: Unspecified security fixes (July 2013) JDK: Unspecified security fixes (July 2013) JDK: unspecified vulnerability fixed in 7u25 (Deployment) OpenJDK: XML parsing Denial of Service (JAXP, 8017298) | [
"cpe:/a:redhat:rhel_extras:5::server",
"cpe:/a:redhat:rhel_extras:6"
] | null | null | null | null |
RHSA-2024:0290 | Red Hat Security Advisory: OpenShift Container Platform 4.14.10 bug fix and security update | golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487) | [
"cpe:/a:redhat:openshift:4.14::el8",
"cpe:/a:redhat:openshift:4.14::el9"
] | null | 7.5 | null | null |
RHSA-2012:0811 | Red Hat Security Advisory: php-pecl-apc security, bug fix, and enhancement update | php-pecl-apc: potential XSS in apc.php | [
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2024:0144 | Red Hat Security Advisory: idm:DL1 security update | ipa: Invalid CSRF protection | [
"cpe:/a:redhat:rhel_aus:8.2::appstream",
"cpe:/a:redhat:rhel_e4s:8.2::appstream",
"cpe:/a:redhat:rhel_tus:8.2::appstream"
] | null | 6.5 | null | null |
RHSA-2020:2619 | Red Hat Security Advisory: Red Hat Fuse 7.6.0 on EAP security update | apache-commons-beanutils: does not suppresses the class property in PropertyUtilsBean by default | [
"cpe:/a:redhat:jboss_fuse:7"
] | null | null | 7.3 | null |
RHSA-2020:5170 | Red Hat Security Advisory: Red Hat JBoss Web Server 5.4 security release | tomcat: specially crafted sequence of HTTP/2 requests can lead to DoS | [
"cpe:/a:redhat:jboss_enterprise_web_server:5.4::el6",
"cpe:/a:redhat:jboss_enterprise_web_server:5.4::el7",
"cpe:/a:redhat:jboss_enterprise_web_server:5.4::el8"
] | null | 7.5 | null | null |
RHSA-2004:007 | Red Hat Security Advisory: : : : Updated tcpdump packages fix various vulnerabilities | security flaw security flaw security flaw | [
"cpe:/o:redhat:linux:9"
] | null | null | null | null |
RHSA-2023:2903 | Red Hat Security Advisory: php:7.4 security update | php: phar: infinite loop when decompressing quine gzip file php: standard insecure cookie could be treated as a '__Host-' or '__Secure-' cookie by PHP applications php: OOB read due to insufficient input validation in imageloadfont() php: PDO:: quote() may return unquoted string due to an integer overflow XKCP: buffer overflow in the SHA-3 reference implementation | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 8.1 | null | null |
RHBA-2020:2785 | Red Hat Bug Fix Advisory: OpenShift Container Platform 4.4.11 packages update | python-urllib3: CRLF injection due to not encoding the '\r\n' sequence leading to possible attack on internal service python-urllib3: Certification mishandle when error should be thrown | [
"cpe:/a:redhat:openshift:4.4::el7",
"cpe:/a:redhat:openshift:4.4::el8"
] | null | null | 7.5 | null |
RHSA-2024:10952 | Red Hat Security Advisory: php:7.4 security update | php: Password_verify() always return true with some hash php: 1-byte array overrun in common path resolve code php: Missing error check and insufficient random bytes in HTTP Digest authentication for SOAP php: XML loading external entity without being enabled php: phar Buffer mismanagement php: host/secure cookie bypass due to partial CVE-2022-31629 fix php: password_verify can erroneously return true, opening ATO risk php: Filter bypass in filter_var (FILTER_VALIDATE_URL) php: Erroneous parsing of multipart form data php: cgi.force_redirect configuration is bypassable due to the environment variable collision php: PHP-FPM Log Manipulation Vulnerability | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 3.3 | null | null |
RHSA-2021:3365 | Red Hat Security Advisory: sssd security update | sssd: shell command injection in sssctl | [
"cpe:/a:redhat:rhel_eus:8.2::crb",
"cpe:/o:redhat:rhel_eus:8.2::baseos"
] | null | 6.7 | null | null |
RHSA-2024:7624 | Red Hat Security Advisory: Red Hat OpenShift Data Foundation 4.14.11 security and bug fix update | go-retryablehttp: url might write sensitive information to log file express: cause malformed URLs to be evaluated fast-xml-parser: ReDOS at currency parsing in currency.js | [
"cpe:/a:redhat:openshift_data_foundation:4.14::el9"
] | null | 7.5 | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.