id
stringlengths 13
15
| title
stringlengths 29
176
| description
stringlengths 8
32.1k
| cpes
sequencelengths 0
20
| cvss_v4_0
null | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
null |
---|---|---|---|---|---|---|---|
RHSA-2015:0046 | Red Hat Security Advisory: firefox security and bug fix update | Mozilla: Miscellaneous memory safety hazards (rv:31.4) (MFSA 2015-01) Mozilla: sendBeacon requests lack an Origin header (MFSA 2015-03) Mozilla: Cookie injection through Proxy Authenticate responses (MFSA 2015-04) Mozilla: Read-after-free in WebRTC (MFSA 2015-06) | [
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::server",
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation",
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | null | null |
RHSA-2022:7329 | Red Hat Security Advisory: lua security update | lua: heap buffer overflow in luaG_errormsg() in ldebug.c due to uncontrolled recursion in error handling | [
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::crb",
"cpe:/o:redhat:enterprise_linux:9::baseos"
] | null | 6.5 | null | null |
RHSA-2014:1098 | Red Hat Security Advisory: devtoolset-2-httpcomponents-client security update | CXF: SSL hostname verification bypass, incomplete CVE-2012-5783 fix | [
"cpe:/a:redhat:developer_toolset:2.1::el6"
] | null | null | null | null |
RHSA-2024:4457 | Red Hat Security Advisory: openssh security update | openssh: Possible remote code execution due to a race condition in signal handling affecting Red Hat Enterprise Linux 9 | [
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/o:redhat:enterprise_linux:9::baseos"
] | null | 7 | null | null |
RHSA-2010:0862 | Red Hat Security Advisory: nss security update | firefox/nss: doesn't handle IP-based wildcards in X509 certificates safely | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2021:4325 | Red Hat Security Advisory: lasso security and enhancement update | lasso: XML signature wrapping vulnerability when parsing SAML responses | [
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb"
] | null | 8.8 | null | null |
RHSA-2023:4038 | Red Hat Security Advisory: python38:3.8 and python38-devel:3.8 security update | python: urllib.parse url blocklisting bypass | [
"cpe:/a:redhat:rhel_aus:8.2::appstream",
"cpe:/a:redhat:rhel_e4s:8.2::appstream",
"cpe:/a:redhat:rhel_tus:8.2::appstream"
] | null | 7.5 | null | null |
RHSA-2017:1488 | Red Hat Security Advisory: kernel security and bug fix update | kernel: Race condition access to n_hdlc.tbuf causes double free in n_hdlc_release() kernel: heap/stack gap jumping via unbounded stack allocations kernel: Incorrectly mapped contents of PIE executable | [
"cpe:/o:redhat:rhel_aus:6.6::server",
"cpe:/o:redhat:rhel_tus:6.6::server"
] | null | null | 2.9 | null |
RHSA-2021:2731 | Red Hat Security Advisory: kpatch-patch security update | kernel: Use after free via PI futex state kernel: use-after-free in net/bluetooth/hci_event.c when destroying an hci_chan kernel: size_t-to-int conversion vulnerability in the filesystem layer | [
"cpe:/o:redhat:rhel_e4s:7.6::server"
] | null | 7.8 | null | null |
RHSA-2021:4677 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.4.2 security update on RHEL 8 | undertow: potential security issue in flow control over HTTP/2 may lead to DOS wildfly: incorrect JBOSS_LOCAL_USER challenge location may lead to giving access to all the local users resteasy: Error message exposes endpoint class information mina-sshd-core: Memory leak denial of service in Apache Mina SSHD Server jsoup: Crafted input may cause the jsoup HTML and XML parser to get stuck | [
"cpe:/a:redhat:jboss_enterprise_application_platform:7.4::el8"
] | null | 7.5 | null | null |
RHSA-2020:4055 | Red Hat Security Advisory: qemu-kvm security update | QEMU: usb: out-of-bounds r/w access issue while processing usb packets | [
"cpe:/o:redhat:rhel_aus:6.6::server"
] | null | 5 | null | null |
RHSA-2012:1221 | Red Hat Security Advisory: java-1.6.0-openjdk security update | OpenJDK: AWT hardening fixes (AWT, 7163201) OpenJDK: beans ClassFinder insufficient permission checks (beans, 7162476) | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2020:2835 | Red Hat Security Advisory: php security update | php: underflow in env_path_info in fpm_main.c | [
"cpe:/o:redhat:rhel_eus:7.6::computenode",
"cpe:/o:redhat:rhel_eus:7.6::server"
] | null | null | 8.1 | null |
RHSA-2024:10133 | Red Hat Security Advisory: rhc-worker-script security update | golang-fips: Golang FIPS zeroed buffer net/http: Denial of service due to improper 100-continue handling in net/http | [
"cpe:/o:redhat:rhel_els:7"
] | null | 5.9 | null | null |
RHSA-2023:5259 | Red Hat Security Advisory: mariadb:10.3 security, bug fix, and enhancement update | mariadb: segmentation fault via the component sub_select mariadb: server crash in JOIN_CACHE::free or in copy_fields mariadb: compress_write() fails to release mutex on failure mariadb: NULL pointer dereference in spider_db_mbase::print_warnings() | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 6.5 | null | null |
RHSA-2024:9573 | Red Hat Security Advisory: libsoup security update | libsoup: HTTP request smuggling via stripping null bytes from the ends of header names libsoup: infinite loop while reading websocket data | [
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 7.5 | null | null |
RHSA-2019:3759 | Red Hat Security Advisory: chromium-browser security update | chromium-browser: Use-after-free in media chromium-browser: Buffer overrun in Blink chromium-browser: URL spoof in navigation chromium-browser: Privilege elevation in Installer chromium-browser: URL bar spoofing chromium-browser: CSP bypass chromium-browser: Extension permission bypass chromium-browser: Out-of-bounds read in PDFium chromium-browser: File storage disclosure chromium-browser: HTTP authentication spoof chromium-browser: File download protection bypass chromium-browser: File download protection bypass chromium-browser: Cross-context information leak chromium-browser: Cross-origin data leak chromium-browser: CSS injection chromium-browser: Address bar spoofing chromium-browser: Service worker state error chromium-browser: Notification obscured chromium-browser: IDN spoof chromium-browser: Notification obscured | [
"cpe:/a:redhat:rhel_extras:6"
] | null | null | 4.3 | null |
RHSA-2024:1332 | Red Hat Security Advisory: kernel-rt security update | kernel: use-after-free in l2cap_connect and l2cap_le_connect_req in net/bluetooth/l2cap_core.c kernel: use-after-free in sch_qfq network scheduler kernel: fbcon: out-of-sync arrays in fbcon_mode_deleted due to wrong con2fb_map assignment kernel: IGB driver inadequate buffer size for frames larger than MTU kernel: nf_tables: use-after-free vulnerability in the nft_verdict_init() function kernel: sched/membarrier: reduce the ability to hammer on sys_membarrier | [
"cpe:/a:redhat:rhel_extras_rt:7"
] | null | 4.7 | null | null |
RHSA-2024:5394 | Red Hat Security Advisory: thunderbird security update | mozilla: Fullscreen notification dialog can be obscured by document content mozilla: Out of bounds memory access in graphics shared memory handling mozilla: Type confusion in WebAssembly mozilla: Incomplete WebAssembly exception handing mozilla: Out of bounds read in editor component mozilla: Missing permission check when creating a StreamFilter mozilla: Uninitialized memory used by WebGL mozilla: Use-after-free in JavaScript garbage collection mozilla: Use-after-free in IndexedDB mozilla: Document content could partially obscure security prompts | [
"cpe:/a:redhat:rhel_eus:8.8::appstream"
] | null | 6.1 | null | null |
RHSA-2024:10090 | Red Hat Security Advisory: tigervnc security update | xorg-x11-server: tigervnc: heap-based buffer overflow privilege escalation vulnerability | [
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 7.8 | null | null |
RHSA-2024:4439 | Red Hat Security Advisory: dotnet6.0 security update | dotnet: DoS when parsing X.509 Content and ObjectIdentifiers | [
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::crb"
] | null | 5.3 | null | null |
RHSA-2012:0350 | Red Hat Security Advisory: kernel security and bug fix update | kernel: xfs: potential buffer overflow in xfs_readlink() kernel: crypto: ghash: null pointer deref if no key is set kernel: jbd/jbd2: invalid value of first log block leads to oops kernel: kvm: device assignment DoS kernel: send(m)msg: user pointer dereferences kernel: perf, powerpc: Handle events that raise an exception without overflowing kernel: kvm: pit timer with no irqchip crashes the system kernel: xfs heap overflow kernel: kvm: syscall instruction induced guest panic kernel: igmp: Avoid zero delay when receiving odd mixture of IGMP queries | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2024:3823 | Red Hat Security Advisory: rpm-ostree security update | rpm-ostree: world-readable /etc/shadow file | [
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 6.2 | null | null |
RHSA-2018:1640 | Red Hat Security Advisory: kernel security update | hw: cpu: speculative store bypass | [
"cpe:/o:redhat:rhel_aus:6.5::server"
] | null | null | 5.6 | null |
RHSA-2014:1653 | Red Hat Security Advisory: openssl security update | Updated openssl packages that contain a backported patch to mitigate the
CVE-2014-3566 issue are now available for Red Hat Enterprise Linux 5.
Red Hat Product Security has rated this update as having Moderate security
impact. | [
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2018:2286 | Red Hat Security Advisory: java-1.7.0-openjdk security update | OpenJDK: insufficient index validation in PatternSyntaxException getMessage() (Concurrency, 8199547) | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 3.7 | null |
RHSA-2020:0790 | Red Hat Security Advisory: kernel security and bug fix update | kernel: unprivileged users able to create RAW sockets in AF_ISDN network protocol kernel: buffer overflow in cfg80211_mgd_wext_giwessid in net/wireless/wext-sme.c | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | 8 | 4 | null |
RHSA-2022:1728 | Red Hat Security Advisory: java-11-openjdk security update | OpenJDK: Unbounded memory allocation when compiling crafted XPath expressions (JAXP, 8270504) OpenJDK: Improper object-to-string conversion in AnnotationInvocationHandler (Libraries, 8277672) OpenJDK: Missing check for negative ObjectIdentifier (Libraries, 8275151) OpenJDK: Defective secure validation in Apache Santuario (Libraries, 8278008) OpenJDK: URI parsing inconsistencies (JNDI, 8278972) | [
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::crb"
] | null | 5.3 | null | null |
RHSA-2022:8866 | Red Hat Security Advisory: Red Hat OpenStack Platform 16.1.9 (python-XStatic-Angular) security update | AngularJS: Prototype pollution in merge function could result in code injection | [
"cpe:/a:redhat:openstack:16.1::el8"
] | null | 7.5 | null | null |
RHSA-2022:9075 | Red Hat Security Advisory: thunderbird security update | Mozilla: Quoting from an HTML email with certain tags will trigger network requests and load remote content, regardless of a configuration to block remote content Mozilla: Arbitrary file read from a compromised content process Mozilla: Drag and Dropped Filenames could have been truncated to malicious extensions Mozilla: Memory safety bugs fixed in Firefox ESR 102.6 and Thunderbird 102.6 Mozilla: Use-after-free in WebGL Mozilla: Memory corruption in WebGL Mozilla: Use-after-free in WebGL | [
"cpe:/a:redhat:rhel_eus:8.4::appstream"
] | null | 8.1 | null | null |
RHSA-2023:7666 | Red Hat Security Advisory: postgresql:12 security update | postgresql: Client memory disclosure when connecting with Kerberos to modified server postgresql: schema_element defeats protective search_path changes postgresql: row security policies disregard user ID changes after inlining. postgresql: Memory disclosure in aggregate function calls postgresql: Buffer overrun from integer overflow in array modification postgresql: Role pg_signal_backend can signal certain superuser processes. postgresql: extension script @substitutions@ within quoting allow SQL injection | [
"cpe:/a:redhat:rhel_eus:8.6::appstream"
] | null | 7.5 | null | null |
RHSA-2025:0203 | Red Hat Security Advisory: Red Hat OpenStack Platform 16.2 (etcd) security update | encoding/gob: golang: Calling Decoder.Decode on a message which contains deeply nested structures can cause a panic due to stack exhaustion | [
"cpe:/a:redhat:openstack:16.2::el8"
] | null | 7.5 | null | null |
RHSA-2010:0046 | Red Hat Security Advisory: kernel security and bug fix update | kernel: use flag in do_coredump() kernel: x86_64 32 bit process register leak kernel: gdth: Prevent negative offsets in ioctl kernel: qla2xxx NPIV vport management pseudofiles are world writable kernel: megaraid_sas permissions in sysfs kernel: megaraid_sas permissions in sysfs kernel: hfs buffer overflow kernel: fuse: prevent fuse_put_request on invalid pointer kernel: firewire: ohci: handle receive packets with a data length of zero kernel: create_elf_tables can leave urandom in a bad state kernel: emergency route cache flushing leads to node deadlock | [
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2021:2658 | Red Hat Security Advisory: linuxptp security update | linuxptp: missing length check of forwarded messages | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 8.8 | null | null |
RHSA-2021:1846 | Red Hat Security Advisory: idm:DL1 and idm:client security, bug fix, and enhancement update | jquery: Untrusted code execution via <option> tag in HTML passed to DOM manipulation methods | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 6.1 | null | null |
RHSA-2024:4425 | Red Hat Security Advisory: Red Hat OpenStack Platform 16.1.9 security update | OpenStack: malicious qcow2/vmdk images | [
"cpe:/a:redhat:openstack:16.1::el8"
] | null | 8.8 | null | null |
RHBA-2020:4139 | Red Hat Bug Fix Advisory: Red Hat OpenShift Service Mesh 3scale-istio-adapter-rhel8-container update | golang: data race in certain net/http servers including ReverseProxy can lead to DoS golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs | [
"cpe:/a:redhat:service_mesh:1.0::el8"
] | null | 7.5 | null | null |
RHSA-2022:1819 | Red Hat Security Advisory: go-toolset:rhel8 security and bug fix update | golang: Command-line arguments may overwrite global data golang: archive/zip: malformed archive may cause panic or memory exhaustion (incomplete fix of CVE-2021-33196) golang: debug/macho: invalid dynamic symbol table command can cause panic golang: archive/zip: Reader.Open panics on empty string golang: math/big: uncontrolled memory consumption due to an unhandled overflow via Rat.SetString golang: cmd/go: misinterpretation of branch names can lead to incorrect access control golang: crypto/elliptic: IsOnCurve returns true for invalid field elements | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 7.1 | null | null |
RHSA-2024:10844 | Red Hat Security Advisory: firefox security update | firefox: thunderbird: Select list elements could be shown over another site firefox: thunderbird: CSP Bypass and XSS Exposure via Web Compatibility Shims firefox: thunderbird: URL Bar Spoofing via Manipulated Punycode and Whitespace Characters firefox: thunderbird: Unhandled Exception in Add-on Signature Verification firefox: thunderbird: Improper Keypress Handling in Executable File Confirmation Dialog firefox: thunderbird: Memory safety bugs fixed in Firefox 133, Thunderbird 133, Firefox ESR 128.5, and Thunderbird 128.5 | [
"cpe:/a:redhat:rhel_aus:8.2::appstream"
] | null | 8.8 | null | null |
RHBA-2019:2922 | Red Hat Bug Fix Advisory: OpenShift Container Platform 4.2 Image Release Advisory | atomic-openshift: CSRF tokens not refreshing while user is logged in and are exposed in the URL | [
"cpe:/a:redhat:openshift:4.2::el7",
"cpe:/a:redhat:openshift:4.2::el8"
] | null | null | 4.2 | null |
RHSA-2012:0811 | Red Hat Security Advisory: php-pecl-apc security, bug fix, and enhancement update | php-pecl-apc: potential XSS in apc.php | [
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2020:0945 | Red Hat Security Advisory: Red Hat Single Sign-On 7.3.7 security update on RHEL 6 | keycloak: failedLogin Event not sent to BruteForceProtector when using Post Login Flow with Conditional-OTP | [
"cpe:/a:redhat:red_hat_single_sign_on:7::el6"
] | null | 5.6 | null | null |
RHSA-2024:1545 | Red Hat Security Advisory: dnsmasq security update | dnsmasq: Heap use after free in dhcp6_no_relay dnsmasq: default maximum EDNS.0 UDP packet size was set to 4096 but should be 1232 bind9: KeyTrap - Extreme CPU consumption in DNSSEC validator bind9: Preparing an NSEC3 closest encloser proof can exhaust CPU resources | [
"cpe:/a:redhat:rhel_eus:8.6::appstream"
] | null | 7.5 | null | null |
RHSA-2019:3892 | Red Hat Security Advisory: Red Hat Fuse 7.5.0 security update | jackson-databind: Unsafe deserialization due to incomplete black list (incomplete fix for CVE-2017-7525) jackson-databind: Unsafe deserialization due to incomplete black list (incomplete fix for CVE-2017-15095) infinispan: deserialization of data in XML and JSON transcoders hadoop: arbitrary file write vulnerability / arbitrary code execution using a specially crafted zip file tomcat: Host name verification missing in WebSocket client jackson-databind: Potential information exfiltration with default typing, serialization gadget from MyBatis activemq: ActiveMQ Client Missing TLS Hostname Verification tika: Incomplete fix allows for XML entity expansion resulting in denial of service jackson-databind: improper polymorphic deserialization of types from Jodd-db library jackson-databind: improper polymorphic deserialization of types from Oracle JDBC driver jackson-databind: arbitrary code execution in slf4j-ext class jackson-databind: arbitrary code execution in blaze-ds-opt and blaze-ds-core classes jackson-databind: exfiltration/XXE in some JDK classes jackson-databind: server-side request forgery (SSRF) in axis2-jaxws class jackson-databind: improper polymorphic deserialization in axis2-transport-jms class jackson-databind: improper polymorphic deserialization in openjpa class jackson-databind: improper polymorphic deserialization in jboss-common-core class retrofit: Directory traversal in RequestBuilder allows manipulation of resources zookeeper: Information disclosure in Apache ZooKeeper mesos: docker image code execution HTTP/2: flood using PING frames results in unbounded memory growth HTTP/2: flood using HEADERS frames results in unbounded memory growth HTTP/2: flood using SETTINGS frames results in unbounded memory growth HTTP/2: flood using empty frames results in excessive resource consumption xstream: remote code execution due to insecure XML deserialization (regression of CVE-2013-7285) syndesis: default CORS configuration is allow all netty: HTTP request smuggling by mishandled whitespace before the colon in HTTP headers | [
"cpe:/a:redhat:jboss_fuse:7"
] | null | null | 7.5 | null |
RHSA-2020:4944 | Red Hat Security Advisory: thunderbird security update | Mozilla: Memory safety bugs fixed in Firefox 82 and Firefox ESR 78.4 chromium-browser: Use after free in WebRTC | [
"cpe:/a:redhat:rhel_e4s:8.0::appstream"
] | null | 8.8 | null | null |
RHSA-2024:7312 | Red Hat Security Advisory: Red Hat Ansible Automation Platform 2.4 Product Security and Bug Fix Update | djangorestframework: Cross-site Scripting (XSS) via break_long_headers urllib3: proxy-authorization request header is not stripped during cross-origin redirects python-twisted: Reflected XSS via HTML Injection in Redirect Response | [
"cpe:/a:redhat:ansible_automation_platform:2.4::el8",
"cpe:/a:redhat:ansible_automation_platform:2.4::el9",
"cpe:/a:redhat:ansible_automation_platform_developer:2.4::el8",
"cpe:/a:redhat:ansible_automation_platform_developer:2.4::el9"
] | null | 4.2 | null | null |
RHSA-2022:5556 | Red Hat Security Advisory: Logging Subsystem 5.4.3 - Red Hat OpenShift security update | golang: out-of-bounds read in golang.org/x/text/language leads to DoS | [
"cpe:/a:redhat:logging:5.4::el8"
] | null | 7.5 | null | null |
RHSA-2015:2560 | Red Hat Security Advisory: Red Hat JBoss BPM Suite 6.2.0 update | batik: XML External Entity (XXE) injection in SVG parsing jsoup: XSS vulnerability related to incomplete tags at EOF apache-commons-collections: InvokerTransformer code execution during deserialisation | [
"cpe:/a:redhat:jboss_bpms:6.2"
] | null | null | null | null |
RHSA-2024:4326 | Red Hat Security Advisory: Red Hat build of Quarkus 3.8.5 release and security update | org.bouncycastle: Importing an EC certificate with crafted F2m parameters may lead to Denial of Service bc-java: BouncyCastle vulnerable to a timing variant of Bleichenbacher (Marvin Attack) org.bouncycastle:bcprov-jdk18on: Infinite loop in ED25519 verification in the ScalarUtil class org.bouncycastle: Use of Incorrectly-Resolved Name or Reference | [
"cpe:/a:redhat:quarkus:3.8::el8"
] | null | 5.3 | null | null |
RHSA-2012:0517 | Red Hat Security Advisory: kernel security and bug fix update | kernel: ext4: ext4_ext_insert_extent() kernel oops | [
"cpe:/o:redhat:rhel_eus:5.6"
] | null | null | null | null |
RHSA-2013:0709 | Red Hat Security Advisory: openstack-nova security and bug fix update | nova: VNC proxy can connect to the wrong VM Nova: DoS by allocating all Fixed IPs | [
"cpe:/a:redhat:openstack:2::el6"
] | null | null | null | null |
RHSA-2024:10219 | Red Hat Security Advisory: perl-App-cpanminus:1.7044 security update | perl-App-cpanminus: Insecure HTTP in App::cpanminus Allows Code Execution Vulnerability | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 8.1 | null | null |
RHSA-2017:2997 | Red Hat Security Advisory: chromium-browser security update | chromium-browser: uxss with mhtml chromium-browser: heap overflow in skia chromium-browser: use after free in pdfium chromium-browser: use after free in pdfium chromium-browser: heap overflow in webgl chromium-browser: use after free in webaudio chromium-browser: heap overflow in libxml2 chromium-browser: out of bounds write in skia chromium-browser: incorrect stack manipulation in webassembly chromium-browser: out of bounds write in skia chromium-browser: ui spoofing in blink chromium-browser: content security bypass chromium-browser: out of bounds read in skia chromium-browser: url spoofing in omnibox chromium-browser: url spoofing in omnibox chromium-browser: extension limitation bypass in extensions chromium-browser: incorrect registry key handling in platformintegration chromium-browser: referrer leak in devtools chromium-browser: url spoofing in extensions ui chromium-browser: null pointer dereference in imagecapture | [
"cpe:/a:redhat:rhel_extras:6"
] | null | null | 4.3 | null |
RHSA-2005:105 | Red Hat Security Advisory: perl security update | security flaw security flaw security flaw | [
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws"
] | null | null | null | null |
RHSA-2007:0132 | Red Hat Security Advisory: libXfont security update | Multiple font integer overflows (CVE-2007-1352) Multiple font integer overflows (CVE-2007-1352) | [
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2024:0386 | Red Hat Security Advisory: kpatch-patch security update | kernel: net/sched: sch_hfsc UAF kernel: use after free in nvmet_tcp_free_crypto in NVMe kernel: IGB driver inadequate buffer size for frames larger than MTU | [
"cpe:/o:redhat:rhel_eus:9.0::baseos"
] | null | 7.5 | null | null |
RHSA-2022:8090 | Red Hat Security Advisory: runc security update | runc: incorrect handling of inheritable capabilities | [
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 5.6 | null | null |
RHSA-2016:1002 | Red Hat Security Advisory: qemu-kvm-rhev security update | qemu: incorrect banked access bounds checking in vga module | [
"cpe:/a:redhat:openstack:8::el7"
] | null | null | 7.6 | null |
RHBA-2021:3396 | Red Hat Bug Fix Advisory: OpenShift Container Platform 4.6.44 packages update | jenkins: improper permission checks allow canceling queue items and aborting builds jenkins: session fixation vulnerability | [
"cpe:/a:redhat:openshift:4.6::el7",
"cpe:/a:redhat:openshift:4.6::el8"
] | null | 7.5 | null | null |
RHSA-2003:249 | Red Hat Security Advisory: glibc security update | security flaw | [
"cpe:/o:redhat:enterprise_linux:2.1::as",
"cpe:/o:redhat:enterprise_linux:2.1::aw",
"cpe:/o:redhat:enterprise_linux:2.1::es",
"cpe:/o:redhat:enterprise_linux:2.1::ws"
] | null | null | null | null |
RHSA-2007:0732 | Red Hat Security Advisory: poppler security update | xpdf integer overflow | [
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2023:2867 | Red Hat Security Advisory: postgresql-jdbc security update | postgresql-jdbc: Information leak of prepared statement data due to insecure temporary file permissions | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 5.5 | null | null |
RHSA-2014:1913 | Red Hat Security Advisory: ruby193-ruby security update | ruby: off-by-one stack-based buffer overflow in the encodes() function ruby: REXML billion laughs attack via parameter entity expansion ruby: REXML incomplete fix for CVE-2014-8080 | [
"cpe:/a:redhat:rhel_software_collections:1::el6",
"cpe:/a:redhat:rhel_software_collections:1::el7"
] | null | null | null | null |
RHSA-2013:0643 | Red Hat Security Advisory: flash-plugin security update | flash-plugin: multiple code execution flaws (APSB13-09) flash-plugin: multiple code execution flaws (APSB13-09) flash-plugin: multiple code execution flaws (APSB13-09) flash-plugin: multiple code execution flaws (APSB13-09) | [
"cpe:/a:redhat:rhel_extras:5::server",
"cpe:/a:redhat:rhel_extras:6"
] | null | null | null | null |
RHSA-2016:1346 | Red Hat Security Advisory: Red Hat JBoss Data Virtualization security and bug fix update | JGroups: Authorization bypass | [
"cpe:/a:redhat:jboss_data_virtualization:6.2"
] | null | null | 9.8 | null |
RHSA-2022:6024 | Red Hat Security Advisory: New container image for Red Hat Ceph Storage 5.2 Security update | grafana: directory traversal vulnerability grafana: Forward OAuth Identity Token can allow users to access some data sources | [
"cpe:/a:redhat:ceph_storage:5.2::el8"
] | null | 4.3 | null | null |
RHSA-2021:1125 | Red Hat Security Advisory: virt:8.3 and virt-devel:8.3 security and bug fix update | qemu: out-of-bound heap buffer access via an interrupt ID field | [
"cpe:/a:redhat:advanced_virtualization:8.3::el8"
] | null | 2.5 | null | null |
RHSA-2017:0172 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.0.4 | EAP: Sensitive data can be exposed at the server level in domain mode admin-cli: Potential EAP resource starvation DOS attack via GET requests for server log files | [
"cpe:/a:redhat:jboss_enterprise_application_platform:7"
] | null | null | 4.3 | null |
RHSA-2010:0109 | Red Hat Security Advisory: mysql security update | mysql: DoS (crash) when comparing GIS items from subquery and when handling subqueires in WHERE and assigning a SELECT result to a @variable mysql: client SSL certificate verification flaw mysql: Incomplete fix for CVE-2008-2079 / CVE-2008-4098 | [
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2017:3369 | Red Hat Security Advisory: qemu-kvm-rhev security and bug fix update | Qemu: exec: oob access during dma operation Qemu: i386: multiboot OOB access while loading kernel image Qemu: cirrus: OOB access issue in mode4and5 write functions | [
"cpe:/o:redhat:enterprise_linux:7::hypervisor"
] | null | null | 4.4 | null |
RHSA-2017:1209 | Red Hat Security Advisory: rhev-hypervisor bug fix and enhancement update for RHEV 3.6.11 | kernel: use after free in dccp protocol | [
"cpe:/o:redhat:enterprise_linux:6::hypervisor",
"cpe:/o:redhat:enterprise_linux:7::hypervisor"
] | null | null | 7.8 | null |
RHSA-2017:2818 | Red Hat Security Advisory: Red Hat Enterprise Virtualization 3.x - End Of Life Notice | This is the final notification for the End of Production Phase 2 of
Red Hat Enterprise Virtualization 3.x. | [
"cpe:/a:redhat:rhev_manager:3"
] | null | null | null | null |
RHSA-2006:0015 | Red Hat Security Advisory: initscripts security update | security flaw | [
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws"
] | null | null | null | null |
RHSA-2023:4498 | Red Hat Security Advisory: dbus security update | dbus: dbus-daemon: assertion failure when a monitor is active and a message from the driver cannot be delivered | [
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 6.2 | null | null |
RHSA-2009:0225 | Red Hat Security Advisory: Red Hat Enterprise Linux 5.3 kernel security and bug fix update | kernel: Unix sockets kernel panic Linux Kernel 'atm module' Local Denial of Service kernel: fix inotify watch removal/umount races kernel: fix soft lockups/OOM issues with unix socket garbage collector | [
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2022:1679 | Red Hat Security Advisory: Cryostat 2.1.0: new Cryostat on RHEL 8 container images | gogo/protobuf: plugin/unmarshal/unmarshal.go lacks certain index validation | [
"cpe:/a:redhat:cryostat:2::el8"
] | null | 8.6 | null | null |
RHSA-2003:289 | Red Hat Security Advisory: XFree86 security update | security flaw security flaw | [
"cpe:/o:redhat:enterprise_linux:2.1::as",
"cpe:/o:redhat:enterprise_linux:2.1::aw",
"cpe:/o:redhat:enterprise_linux:2.1::es",
"cpe:/o:redhat:enterprise_linux:2.1::ws"
] | null | null | null | null |
RHSA-2003:398 | Red Hat Security Advisory: : : : New rsync packages fix remote security vulnerability | security flaw | [
"cpe:/o:redhat:linux:7.1",
"cpe:/o:redhat:linux:7.2",
"cpe:/o:redhat:linux:7.3",
"cpe:/o:redhat:linux:8.0",
"cpe:/o:redhat:linux:9"
] | null | null | null | null |
RHSA-2024:6016 | Red Hat Security Advisory: OpenShift Container Platform 4.15.30 packages and security update | python-werkzeug: user may execute code on a developer's machine | [
"cpe:/a:redhat:openshift:4.15::el8",
"cpe:/a:redhat:openshift:4.15::el9",
"cpe:/a:redhat:openshift_ironic:4.15::el9"
] | null | 7.5 | null | null |
RHSA-2024:6657 | Red Hat Security Advisory: Migration Toolkit for Runtimes security, bug fix and enhancement update | netty-codec-http: Allocation of Resources Without Limits or Throttling | [
"cpe:/a:redhat:migration_toolkit_runtimes:1.0::el8"
] | null | 5.3 | null | null |
RHSA-2018:0044 | Red Hat Security Advisory: redhat-virtualization-host security update | An update for redhat-virtualization-host is now available for RHEV 3.X Hypervisor and Agents for RHEL-7.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. | [
"cpe:/o:redhat:enterprise_linux:7::hypervisor"
] | null | null | null | null |
RHSA-2016:0780 | Red Hat Security Advisory: ntp security and bug fix update | ntp: crash with crafted logconfig configuration command ntp: ntpd crash when processing config commands with statistics type ntp: infinite loop in sntp processing crafted packet ntp: incomplete checks in ntp_crypto.c ntp: incomplete checks in ntp_crypto.c ntp: slow memory leak in CRYPTO_ASSOC ntp: incomplete checks in ntp_crypto.c ntp: config command can be used to set the pidfile and drift file paths ntp: ntpq atoascii memory corruption vulnerability ntp: restriction list NULL pointer dereference ntp: stack exhaustion in recursive traversal of restriction list | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2022:6168 | Red Hat Security Advisory: thunderbird security update | Mozilla: Address bar spoofing via XSLT error handling Mozilla: Cross-origin XSLT Documents would have inherited the parent's permissions Mozilla: Data race and potential use-after-free in PK11_ChangePW Mozilla: Memory safety bugs fixed in Firefox 104 and Firefox ESR 102.2 Mozilla: Memory safety bugs fixed in Firefox 104, Firefox ESR 102.2, and Firefox ESR 91.13 | [
"cpe:/a:redhat:rhel_eus:8.2::appstream"
] | null | 8.8 | 7.5 | null |
RHSA-2017:0190 | Red Hat Security Advisory: firefox security update | Mozilla: Memory safety bugs fixed in Firefox 51 and Firefox ESR 45.7 (MFSA 2017-01) Mozilla: Excessive JIT code allocation allows bypass of ASLR and DEP (MFSA 2017-02) Mozilla: Use-after-free in XSL (MFSA 2017-02) Mozilla: Pointer and frame data leakage of Javascript objects (MFSA 2017-02) Mozilla: Potential use-after-free during DOM manipulations (MFSA 2017-02) Mozilla: Location bar spoofing with unicode characters (MFSA 2017-02) Mozilla: WebExtensions can use data: protocol to affect other extensions (MFSA 2017-02) Mozilla: Insecure communication methods in Developer Tools JSON viewer (MFSA 2017-02) Mozilla: Use-after-free with Media Decoder (MFSA 2017-02) | [
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::server",
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation",
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 9.8 | null |
RHSA-2024:5438 | Red Hat Security Advisory: OpenShift Container Platform 4.15.28 packages and security update | ssh: Prefix truncation attack on Binary Packet Protocol (BPP) | [
"cpe:/a:redhat:openshift:4.15::el8",
"cpe:/a:redhat:openshift:4.15::el9"
] | null | 5.9 | null | null |
RHSA-2016:1814 | Red Hat Security Advisory: kernel security and bug fix update | kernel: infiniband: Unprivileged process can overwrite kernel memory using rdma_ucm.ko kernel: challenge ACK counter information disclosure. | [
"cpe:/o:redhat:rhel_aus:6.5::server"
] | null | null | 4.8 | null |
RHSA-2013:0552 | Red Hat Security Advisory: Red Hat Enterprise Virtualization 2 1-week EOL Notice | This is the 1-week notification of the End Of Life plans for Red Hat
Enterprise Virtualization 2. | [] | null | null | null | null |
RHSA-2020:1016 | Red Hat Security Advisory: kernel security, bug fix, and enhancement update | kernel: out of bound read in DVB connexant driver. kernel: Missing permissions check for request_key() destination allows local attackers to add keys to keyring without Write permission kernel: denial of service via ioctl call in network tun handling kernel: oob memory read in hso_probe in drivers/net/usb/hso.c kernel: usb: missing size check in the __usb_get_extra_descriptor() leading to DoS kernel: perf_event_open() and execve() race in setuid programs allows a data leak kernel: triggering AP to send IAPP location updates for stations before the required authentication process has completed can lead to DoS kernel: brcmfmac frame validation bypass kernel: null-pointer dereference in hci_uart_set_flow_control Kernel: net: weak IP ID generation leads to remote device tracking Kernel: net: using kernel space address bits to derive IP ID may potentially break KASLR kernel: ASLR bypass for setuid binaries due to late install_exec_creds() kernel: sensitive information disclosure from kernel stack memory via HIDPCONNADD command kernel: unchecked kstrdup of fwstr in drm_load_edid_firmware leads to denial of service kernel: use-after-free in arch/x86/lib/insn-eval.c kernel: denial of service in arch/powerpc/kernel/signal_32.c and arch/powerpc/kernel/signal_64.c via sigreturn() system call kernel: integer overflow and OOB read in drivers/block/floppy.c kernel: heap overflow in mwifiex_set_uap_rates() function of Marvell Wifi Driver leading to DoS kernel: heap-overflow in mwifiex_set_wmm_params() function of Marvell WiFi driver leading to DoS kernel: An out-of-bounds read in drivers/scsi/qedi/qedi_dbg.c leading to crash or information disclosure kernel: use-after-free in sound/core/init.c and sound/core/info.c kernel: Null pointer dereference in the sound/usb/line6/pcm.c kernel: memory leak in register_queue_kobjects() in net/core/net-sysfs.c leads to denial of service kernel: buffer-overflow hardening in WiFi beacon validation code. kernel: powerpc: incomplete Spectre-RSB mitigation leads to information exposure | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 4.7 | 5.5 | null |
RHSA-2023:3087 | Red Hat Security Advisory: mysql:8.0 security, bug fix, and enhancement update | mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2022) mysql: Server: Stored Procedure unspecified vulnerability (CPU Oct 2022) mysql: InnoDB unspecified vulnerability (CPU Oct 2022) mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2022) mysql: InnoDB unspecified vulnerability (CPU Oct 2022) mysql: Server: Connection Handling unspecified vulnerability (CPU Oct 2022) mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2022) mysql: Server: Security: Privileges unspecified vulnerability (CPU Oct 2022) mysql: Server: Replication unspecified vulnerability (CPU Oct 2022) mysql: InnoDB unspecified vulnerability (CPU Oct 2022) mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2022) mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2022) mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2022) mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2022) mysql: Server: DML unspecified vulnerability (CPU Jan 2023) mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2023) mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2023) mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2023) mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2023) mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2023) mysql: InnoDB unspecified vulnerability (CPU Jan 2023) mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2023) mysql: InnoDB unspecified vulnerability (CPU Jan 2023) mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2023) mysql: Server: Thread Pooling unspecified vulnerability (CPU Jan 2023) mysql: Server: Security: Encryption unspecified vulnerability (CPU Jan 2023) mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2023) mysql: InnoDB unspecified vulnerability (CPU Jan 2023) mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2023) mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2023) mysql: InnoDB unspecified vulnerability (CPU Jan 2023) mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2023) mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2023) mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2023) mysql: Server: GIS unspecified vulnerability (CPU Jan 2023) mysql: Server: Security: Privileges unspecified vulnerability (CPU Apr 2023) mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2023) mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2023) mysql: Server: Connection Handling unspecified vulnerability (CPU Apr 2023) mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2023) mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2023) mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2023) | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 4.9 | null | null |
RHSA-2007:0731 | Red Hat Security Advisory: tetex security update | xpdf integer overflow | [
"cpe:/o:redhat:enterprise_linux:2.1::as",
"cpe:/o:redhat:enterprise_linux:2.1::aw",
"cpe:/o:redhat:enterprise_linux:2.1::es",
"cpe:/o:redhat:enterprise_linux:2.1::ws",
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws",
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws",
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2022:4914 | Red Hat Security Advisory: rh-nodejs12-nodejs security, bug fix, and enhancement update | nodejs-json-schema: Prototype pollution vulnerability llhttp: HTTP Request Smuggling due to spaces in headers llhttp: HTTP Request Smuggling when parsing the body of chunked requests nodejs-tar: Insufficient symlink protection due to directory cache poisoning using symbolic links allowing arbitrary file creation and overwrite nodejs-tar: Insufficient symlink protection due to directory cache poisoning using symbolic links allowing arbitrary file creation and overwrite nodejs: Improper handling of URI Subject Alternative Names nodejs: Certificate Verification Bypass via String Injection nodejs: Incorrect handling of certificate subject and issuer fields minimist: prototype pollution nodejs: Prototype pollution via console.table properties | [
"cpe:/a:redhat:rhel_software_collections:3::el7"
] | null | 8.2 | null | null |
RHSA-2024:4871 | Red Hat Security Advisory: Red Hat Service Interconnect security update | python: Path traversal on tempfile.TemporaryDirectory python: The zipfile module is vulnerable to zip-bombs leading to denial of service skupper: potential authentication bypass to skupper console via forged cookies | [
"cpe:/a:redhat:service_interconnect:1::el9"
] | null | 5.3 | null | null |
RHSA-2013:0570 | Red Hat Security Advisory: Oracle Java SE 6 - notification of end of public updates | Oracle Java SE 6 will no longer receive updates after February 28, 2013.
The java-1.6.0-sun packages on the Red Hat Enterprise Linux 5 and 6
Supplementary media and Supplementary Red Hat Network (RHN) channels are
affected. | [] | null | null | null | null |
RHSA-2015:0256 | Red Hat Security Advisory: samba security update | samba: talloc free on uninitialized stack pointer in netlogon server could lead to remote-code execution | [
"cpe:/a:redhat:storage:3:server:el6"
] | null | null | null | null |
RHSA-2011:0390 | Red Hat Security Advisory: rsync security update | rsync: Incremental file-list corruption due to temporary file_extra_cnt increments | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2024:8358 | Red Hat Security Advisory: NetworkManager-libreswan security update | NetworkManager-libreswan: Local privilege escalation via leftupdown | [
"cpe:/a:redhat:rhel_aus:8.2::appstream"
] | null | 7.8 | null | null |
RHSA-2013:1569 | Red Hat Security Advisory: wireshark security, bug fix, and enhancement update | wireshark: Infinite and large loops in ANSI MAP, ASF, IEEE 802.11, IEEE 802.3, and LTP dissectors (wnpa-sec-2012-08) wireshark: Integer overflows in BACapp and Bluetooth HCI dissectors, leading to DoS (wnpa-sec-2012-08) wireshark: crash due to zero division in DCP ETSI dissector (wnpa-sec-2012-13) wireshark: DoS via excessive resource consumption in XTP dissector (wnpa-sec-2012-15) wireshark: DoS via excessive CPU consumption in AFP dissector (wnpa-sec-2012-17) wireshark: DoS via excessive CPU consumption in CTDB dissector (wnpa-sec-2012-23) wireshark: DoS via excessive system resource consumption in CIP dissector (wnpa-sec-2012-20) wireshark: crash in STUN dissector (wnpa-sec-2012-21) wireshark: DoS (infinite loop) in the SCTP dissector (wnpa-sec-2012-33) wireshark: DoS (crash) in the ISAKMP dissector (wnpa-sec-2012-35) wireshark: DoS (infinite loop) in the iSCSI dissector (wnpa-sec-2012-36) wireshark: DoS (infinite loop) in the WTP dissector (wnpa-sec-2012-37) wireshark: DoS (infinite loop) in the RTCP dissector (wnpa-sec-2012-38) wireshark: DoS (infinite loop) in the SCTP dissector (wnpa-sec-2012-33) wireshark: DoS (crash) in the ISAKMP dissector (wnpa-sec-2012-35) wireshark: DoS (infinite loop) in the iSCSI dissector (wnpa-sec-2012-36) wireshark: DoS (infinite loop) in the WTP dissector (wnpa-sec-2012-37) wireshark: DoS (infinite loop) in the RTCP dissector (wnpa-sec-2012-38) wireshark: DoS (crash) in the ASN.1 BER dissector (wnpa-sec-2013-25, upstream #8599) wireshark: DoS (crash) in the DCP ETSI dissector (wnpa-sec-2013-27, upstream #8231, #8540, #8541) wireshark: Multiple Denial of Service flaws wireshark: DoS (infinite loop) in the HTTP dissector (wnpa-sec-2013-39) wireshark: Invalid free in the DCP ETSI dissector (wnpa-sec-2013-41) wireshark: Integer signedness error in the Bluetooth SDP dissector (wnpa-sec-2013-45) wireshark: DoS (infinite loop) in the GSM RR dissector (wnpa-sec-2013-49) wireshark: Multiple array index errors in the GSM A Common dissector (wnpa-sec-2013-50) wireshark: DoS (application crash) in the Netmon file parser (wnpa-sec-2013-51) wireshark: DoS (application crash) in the Netmon file parser (wnpa-sec-2013-51) (A different flaw than CVE-2013-4933) wireshark: DoS (application crash) in the ASN.1 PER dissector (wnpa-sec-2013-52) wireshark: DoS (NULL pointer dereference, crash) in the PROFINET Real-Time dissector (wnpa-sec-2013-53) wireshark: MQ dissector crash (wnpa-sec-2013-58, upstream bug 9079) | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2009:0271 | Red Hat Security Advisory: gstreamer-plugins-good security update | gstreamer-plugins-good: heap-based buffer overflow while parsing malformed QuickTime media files via crafted Composition Time To Sample (aka ctts) atom data gstreamer-plugins-good: Array index error while parsing malformed QuickTime media files via crafted Sync Sample (aka stss) atom data gstreamer-plugins-good: heap-based buffer overflow while parsing malformed QuickTime media files via crafted Time-to-sample (stss) atom data | [
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2019:2141 | Red Hat Security Advisory: kde-workspace security and bug fix update | kde-workspace: Missing sanitization of notifications allows to leak client IP address via IMG element | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 4.3 | null |
RHBA-2015:0965 | Red Hat Bug Fix Advisory: nss, nss-util, and nspr bug fix and enhancement update | nss: QuickDER decoder length issue | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.