id
stringlengths 13
15
| title
stringlengths 29
176
| description
stringlengths 8
32.1k
| cpes
sequencelengths 0
20
| cvss_v4_0
null | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
null |
---|---|---|---|---|---|---|---|
RHSA-2024:10949 | Red Hat Security Advisory: php:8.2 security update | php: host/secure cookie bypass due to partial CVE-2022-31629 fix php: password_verify can erroneously return true, opening ATO risk php: Filter bypass in filter_var (FILTER_VALIDATE_URL) php: Erroneous parsing of multipart form data php: cgi.force_redirect configuration is bypassable due to the environment variable collision php: PHP-FPM Log Manipulation Vulnerability | [
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 3.3 | null | null |
RHSA-2013:0691 | Red Hat Security Advisory: Red Hat Storage 2.0 security, bug fix, and enhancement update #4 | Openstack-Swift: insecure use of python pickle() GlusterFS: insecure temporary file creation sanlock world writable /var/log/sanlock.log | [
"cpe:/a:redhat:storage:2.0:console:el6",
"cpe:/a:redhat:storage:2.0:server:el6",
"cpe:/a:redhat:storage:2:client:el5",
"cpe:/a:redhat:storage:3:client:el6"
] | null | null | null | null |
RHSA-2023:1931 | Red Hat Security Advisory: emacs security update | emacs: command injection vulnerability in org-mode | [
"cpe:/a:redhat:rhel_eus:8.6::appstream",
"cpe:/o:redhat:rhel_eus:8.6::baseos"
] | null | 7.8 | null | null |
RHSA-2025:2652 | Red Hat Security Advisory: RHODF-4.18-RHEL-9 enhancement, bug fix and security update | PostCSS: Improper input validation in PostCSS node-gettext: Prototype Pollution cross-spawn: regular expression denial of service golang.org/x/crypto/ssh: Misuse of ServerConfig.PublicKeyCallback may cause authorization bypass in golang.org/x/crypto golang.org/x/net/html: Non-linear parsing of case-insensitive content in golang.org/x/net/html nanoid: nanoid mishandles non-integer values k8s.io/kubernetes: kubelet: node denial of service via kubelet checkpoint API | [
"cpe:/a:redhat:openshift_data_foundation:4.18::el9"
] | null | 6.2 | null | null |
RHSA-2007:0980 | Red Hat Security Advisory: seamonkey security update | security flaw security flaw security flaw about: blank windows security flaw security flaw security flaw security flaw security flaw | [
"cpe:/o:redhat:enterprise_linux:2.1::as",
"cpe:/o:redhat:enterprise_linux:2.1::aw",
"cpe:/o:redhat:enterprise_linux:2.1::es",
"cpe:/o:redhat:enterprise_linux:2.1::ws",
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws",
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2016:0490 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 6.4.6 OpenSSL security update | openssl: assertion failure in SSLv2 servers OpenSSL: SSLv2 doesn't block disabled ciphers SSL/TLS: Cross-protocol attack on TLS using SSLv2 (DROWN) | [
"cpe:/a:redhat:jboss_enterprise_application_platform:6.4"
] | null | null | null | null |
RHSA-2023:0172 | Red Hat Security Advisory: dpdk security update | dpdk: DoS when a Vhost header crosses more than two descriptors and exhausts all mbufs | [
"cpe:/a:redhat:rhel_eus:9.0::appstream"
] | null | 8.6 | null | null |
RHBA-2020:0522 | Red Hat Bug Fix Advisory: OpenShift Container Platform 4.2.20 packages update | jenkins-git-client-plugin: OS command injection via 'git ls-remote' | [
"cpe:/a:redhat:openshift:4.2::el7",
"cpe:/a:redhat:openshift:4.2::el8"
] | null | 8.8 | null | null |
RHSA-2020:3654 | Red Hat Security Advisory: libcroco security update | libcroco: Stack overflow in function cr_parser_parse_any_core in cr-parser.c | [
"cpe:/a:redhat:enterprise_linux:8::crb",
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 6.1 | null | null |
RHSA-2025:3855 | Red Hat Security Advisory: java-21-openjdk security update | openjdk: Better TLS connection support (Oracle CPU 2025-04) openjdk: Improve compiler transformations (Oracle CPU 2025-04) openjdk: Enhance Buffered Image handling (Oracle CPU 2025-04) | [
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb",
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::crb",
"cpe:/a:redhat:rhel_eus:9.4::appstream",
"cpe:/a:redhat:rhel_eus:9.4::crb"
] | null | 5.6 | null | null |
RHSA-2024:7846 | Red Hat Security Advisory: openssl security update | openssl: SSL_select_next_proto buffer overread | [
"cpe:/o:redhat:rhel_aus:8.6::baseos",
"cpe:/o:redhat:rhel_e4s:8.6::baseos",
"cpe:/o:redhat:rhel_tus:8.6::baseos"
] | null | null | 5.9 | null |
RHSA-2025:3063 | Red Hat Security Advisory: postgresql:12 security update | postgresql: PostgreSQL quoting APIs miss neutralizing quoting syntax in text that fails encoding validation | [
"cpe:/a:redhat:rhel_aus:8.2::appstream"
] | null | 8.1 | null | null |
RHSA-2019:0053 | Red Hat Security Advisory: openvswitch security and bug fix update | openvswitch: Mishandle of group mods in lib/ofp-util.c:parse_group_prop_ntr_selection_method() allows for assertion failure openvswitch: Error during bundle commit in ofproto/ofproto.c:ofproto_rule_insert__() allows for crash openvswitch: Buffer over-read in lib/ofp-actions.c:decode_bundle() | [
"cpe:/a:redhat:openstack:10::el7"
] | null | null | 4.9 | null |
RHSA-2003:416 | Red Hat Security Advisory: kernel security update | security flaw | [
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws"
] | null | null | null | null |
RHSA-2016:1475 | Red Hat Security Advisory: java-1.8.0-oracle security update | OpenJDK: insufficient restrictions on the use of custom ValueHandler (CORBA, 8079718) JDK: unspecified vulnerability fixed in 7u111 and 8u101 (JavaFX) OpenJDK: maximum XML name limit not applied to namespace URIs (JAXP, 8148872) JDK: unspecified vulnerability fixed in 6u121, 7u111, and 8u101 (Install) OpenJDK: missing entity replacement limits (JAXP, 8149962) JDK: unspecified vulnerability fixed in 7u111 and 8u101 (Deployment) OpenJDK: integer overflows in bytecode streams (Hotspot, 8152479) JDK: unspecified vulnerability fixed in 8u101 (Install) OpenJDK: insufficient protection of MethodHandle.invokeBasic() (Hotspot, 8154475) OpenJDK: incorrect handling of MethodHandles.dropArguments() argument (Libraries, 8155985) OpenJDK: insufficient bytecode verification (Hotspot, 8155981) OpenJDK: insufficient value count check in MethodHandles.filterReturnValue() (Libraries, 8158571) | [
"cpe:/a:redhat:rhel_extras_oracle_java:6",
"cpe:/a:redhat:rhel_extras_oracle_java:7"
] | null | null | 8.8 | null |
RHSA-2007:0932 | Red Hat Security Advisory: pwlib security update | ekiga GetHostAddress remote DoS | [
"cpe:/a:redhat:rhel_productivity:5",
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation"
] | null | null | null | null |
RHSA-2018:2729 | Red Hat Security Advisory: Red Hat Enterprise Linux OpenStack Platform security update | openstack-rabbitmq-container: Insecure download of rabbitmq_clusterer during docker build | [
"cpe:/a:redhat:openstack:12::el7"
] | null | null | 4.7 | null |
RHSA-2024:2096 | Red Hat Security Advisory: security update Logging for Red Hat OpenShift - 5.9.1 | golang: net/http/cookiejar: incorrect forwarding of sensitive headers and cookies on HTTP redirect golang: net/http: golang: mime/multipart: golang: net/textproto: memory exhaustion in Request.ParseMultipartForm golang: crypto/x509: Verify panics on certificates with an unknown public key algorithm golang: html/template: errors returned from MarshalJSON methods may break template escaping golang-protobuf: encoding/protojson, internal/encoding/json: infinite loop in protojson.Unmarshal when unmarshaling certain forms of invalid JSON jose-go: improper handling of highly compressed data | [
"cpe:/a:redhat:logging:5.9::el9"
] | null | 4.3 | null | null |
RHSA-2024:4580 | Red Hat Security Advisory: cups security update | cups: Cupsd Listen arbitrary chmod 0140777 | [
"cpe:/a:redhat:rhel_eus:8.8::appstream",
"cpe:/o:redhat:rhel_eus:8.8::baseos"
] | null | 4.4 | null | null |
RHSA-2022:5934 | Red Hat Security Advisory: kernel-rt security and bug fix update | kernel: kernel info leak issue in pfkey_register | [
"cpe:/a:redhat:rhel_eus:8.2::nfv",
"cpe:/a:redhat:rhel_eus:8.2::realtime"
] | null | 7.1 | null | null |
RHSA-2016:2579 | Red Hat Security Advisory: libreoffice security, bug fix, and enhancement update | libreoffice: Multiple out-of-bounds overflows in lwp filter libreoffice: Multiple out-of-bounds overflows in lwp filter | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | null | null |
RHSA-2018:1703 | Red Hat Security Advisory: librelp security update | librelp: Stack-based buffer overflow in relpTcpChkPeerName function in src/tcp.c | [
"cpe:/o:redhat:rhel_aus:7.2::server",
"cpe:/o:redhat:rhel_e4s:7.2::server",
"cpe:/o:redhat:rhel_tus:7.2::server"
] | null | null | 8.1 | null |
RHSA-2017:2486 | Red Hat Security Advisory: groovy security update | groovy: remote execution of untrusted code in class MethodClosure Groovy: Remote code execution via deserialization | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 9.6 | null |
RHSA-2023:0952 | Red Hat Security Advisory: python-setuptools security update | pypa-setuptools: Regular Expression Denial of Service (ReDoS) in package_index.py | [
"cpe:/o:redhat:enterprise_linux:9::baseos"
] | null | 5.9 | null | null |
RHSA-2016:0496 | Red Hat Security Advisory: git security update | git: path_name() integer truncation and overflow leading to buffer overflow git: path_name() integer truncation and overflow leading to buffer overflow | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation",
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | null | null |
RHSA-2025:2866 | Red Hat Security Advisory: tigervnc security update | X.Org: Xwayland: Use-after-free of the root cursor Xorg: xwayland: Buffer overflow in XkbVModMaskText() xorg: xwayland: Heap overflow in XkbWriteKeySyms() xorg: xwayland: Buffer overflow in XkbChangeTypesOfKey() xorg: xwayland: Out-of-bounds write in CreatePointerBarrierClient() xorg: xwayland: Use of uninitialized pointer in compRedirectWindow() xorg: xwayland: Use-after-free in PlayReleasedEvents() xorg: xwayland: Use-after-free in SyncInitTrigger() | [
"cpe:/a:redhat:rhel_aus:8.2::appstream"
] | null | 7.8 | null | null |
RHSA-2011:0436 | Red Hat Security Advisory: avahi security update | avahi: daemon infinite loop triggered by an empty UDP packet (CVE-2010-2244 fix regression) | [
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2013:0163 | Red Hat Security Advisory: jbossweb security update | Web: Bypass of security constraints | [
"cpe:/a:redhat:jboss_enterprise_application_platform:6.0.1"
] | null | null | null | null |
RHSA-2024:0833 | Red Hat Security Advisory: OpenShift Container Platform 4.12.50 bug fix and security update | golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487) opentelemetry: DoS vulnerability in otelhttp go-git: Maliciously crafted Git server replies can cause DoS on go-git clients go-git: Maliciously crafted Git server replies can lead to path traversal and RCE on go-git clients | [
"cpe:/a:redhat:openshift:4.12::el8",
"cpe:/a:redhat:openshift:4.12::el9"
] | null | 8.1 | null | null |
RHSA-2025:2588 | Red Hat Security Advisory: RHOAI 2.18.0 - Red Hat OpenShift AI | bind: bind9: Many records in the additional section cause CPU exhaustion golang.org/x/crypto/ssh: Misuse of ServerConfig.PublicKeyCallback may cause authorization bypass in golang.org/x/crypto golang.org/x/net/html: Non-linear parsing of case-insensitive content in golang.org/x/net/html undici: Undici Uses Insufficiently Random Values io.netty:netty-handler: SslHandler doesn't correctly validate packets which can lead to native crash when using native SSLEngine | [
"cpe:/a:redhat:openshift_ai:2.18::el8"
] | null | 7.5 | null | null |
RHSA-2023:4158 | Red Hat Security Advisory: java-11-openjdk security and bug fix update | OpenJDK: HTTP client insufficient file name validation (8302475) OpenJDK: ZIP file parsing infinite loop (8302483) OpenJDK: weakness in AES implementation (8308682) OpenJDK: array indexing integer overflow issue (8304468) OpenJDK: improper handling of slash characters in URI-to-path conversion (8305312) harfbuzz: allows attackers to trigger O(n^2) growth via consecutive marks | [
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::crb"
] | null | 7.5 | null | null |
RHSA-2016:0514 | Red Hat Security Advisory: java-1.8.0-openjdk security update | OpenJDK: missing type safety checks for MethodHandle calls across class loaders, incorrect CVE-2013-5838 fix (Hotspot, 8151666) | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2013:0871 | Red Hat Security Advisory: tomcat6 and tomcat7 security update | tomcat: Improper TOMCAT_LOG management in init script (DoS, ACE) | [
"cpe:/a:redhat:jboss_enterprise_web_server:2::el5",
"cpe:/a:redhat:jboss_enterprise_web_server:2::el6"
] | null | null | null | null |
RHSA-2010:0542 | Red Hat Security Advisory: openldap security update | openldap: modrdn processing uninitialized pointer free openldap: modrdn processing IA5StringNormalize NULL pointer dereference | [
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2015:1647 | Red Hat Security Advisory: mariadb55-mariadb security update | mysql: unspecified vulnerability related to Server:InnoDB:DML (CPU April 2015) mysql: unspecified vulnerability related to Server:Security:Encryption (CPU April 2015) mysql: unspecified vulnerability related to Server:Federated (CPU April 2015) mysql: unspecified vulnerability related to Server:Compiling (CPU April 2015) mysql: unspecified vulnerability related to Server:DDL (CPU April 2015) mysql: unspecified vulnerability related to Server:Security:Privileges (CPU April 2015) mysql: unspecified vulnerability related to Server:Optimizer (CPU April 2015) mysql: unspecified vulnerability related to Server:DDL (CPU April 2015) mysql: unspecified vulnerability related to Server:GIS (CPU July 2015) mysql: unspecified vulnerability related to Server:Security:Privileges (CPU July 2015) mysql: unspecified vulnerability related to Server:Optimizer (CPU July 2015) mysql: unspecified vulnerability related to Server:DML (CPU July 2015) mysql: use of SSL/TLS can not be enforced in mysql client library (oCERT-2015-003, BACKRONYM) mysql: unspecified vulnerability related to Server:Pluggable Auth (CPU July 2015) mysql: unspecified vulnerability related to Server:I_S (CPU July 2015) mysql: unspecified vulnerability related to Server:Optimizer (CPU July 2015) mysql: unspecified vulnerability related to Server:Security:Privileges (CPU October 2015) | [
"cpe:/a:redhat:rhel_software_collections:2::el6",
"cpe:/a:redhat:rhel_software_collections:2::el7"
] | null | null | null | null |
RHSA-2022:1600 | Red Hat Security Advisory: OpenShift Container Platform 4.10.12 security update | cri-o: Default inheritable capabilities for linux container should be empty credentials: Stored XSS vulnerabilities in jenkins plugin Jira: Stored XSS vulnerabilities in Jenkins Jira plugin subversion: Stored XSS vulnerabilities in Jenkins subversion plugin | [
"cpe:/a:redhat:openshift:4.10::el7",
"cpe:/a:redhat:openshift:4.10::el8"
] | null | 5.4 | null | null |
RHSA-2011:1821 | Red Hat Security Advisory: pidgin security update | (libpurple): Invalid UTF-8 string handling in OSCAR messages pidgin: Multiple NULL pointer deference flaws by processing certain Jingle stanzas in the XMPP protocol plug-in | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2020:0476 | Red Hat Security Advisory: OpenShift Container Platform 4.2.18 ose-baremetal-installer-container and ose-cli-artifacts-container security update | openshift/installer: kubeconfig and kubeadmin-password are created with word-readable permissions | [
"cpe:/a:redhat:openshift:4.2::el7"
] | null | null | 4.4 | null |
RHSA-2013:1142 | Red Hat Security Advisory: thunderbird security update | Mozilla: Miscellaneous memory safety hazards (rv:17.0.8) (MFSA 2013-63) Mozilla: Document URI misrepresentation and masquerading (MFSA 2013-68) Mozilla: CRMF requests allow for code execution and XSS attacks (MFSA 2013-69) Mozilla: Wrong principal used for validating URI for some Javascript components (MFSA 2013-72) Mozilla: Same-origin bypass with web workers and XMLHttpRequest (MFSA 2013-73) Mozilla: Local Java applets may read contents of local file system (MFSA 2013-75) | [
"cpe:/a:redhat:rhel_productivity:5",
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2017:2788 | Red Hat Security Advisory: augeas security update | augeas: Improper handling of escaped strings leading to memory corruption | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 7.8 | null |
RHSA-2012:1332 | Red Hat Security Advisory: java-1.4.2-ibm-sap security update | OpenJDK: fontmanager layout lookup code memory corruption (2D, 7143617) OpenJDK: insecure temporary file permissions (JRE, 7143606) OpenJDK: CRL and certificate extensions handling improvements (Security, 7143872) OpenJDK: mutable repository identifiers in generated stub code (CORBA, 7143851) | [
"cpe:/a:redhat:rhel_extras_sap:5"
] | null | null | null | null |
RHSA-2023:1981 | Red Hat Security Advisory: pcs security and bug fix update | rubygem-rack: Denial of service in Multipart MIME parsing rubygem-rack: denial of service in header parsing | [
"cpe:/a:redhat:rhel_eus:9.0::highavailability",
"cpe:/a:redhat:rhel_eus:9.0::resilientstorage"
] | null | 5.3 | null | null |
RHSA-2007:1034 | Red Hat Security Advisory: samba security update | Samba "reply_netbios_packet()" Buffer Overflow Vulnerability | [
"cpe:/o:redhat:rhel_eus:4.5::as",
"cpe:/o:redhat:rhel_eus:4.5::es"
] | null | null | null | null |
RHSA-2020:2844 | Red Hat Security Advisory: qemu-kvm security update | QEMU: Slirp: potential OOB access due to unsafe snprintf() usages | [
"cpe:/o:redhat:rhel_eus:7.6::computenode",
"cpe:/o:redhat:rhel_eus:7.6::server"
] | null | 5.6 | null | null |
RHSA-2025:0783 | Red Hat Security Advisory: Red Hat OpenShift Data Foundation 4.16.6 Bug fix update | golang.org/x/net/html: Non-linear parsing of case-insensitive content in golang.org/x/net/html path-to-regexp: path-to-regexp Unpatched `path-to-regexp` ReDoS in 0.1.x | [
"cpe:/a:redhat:openshift_data_foundation:4.16::el9"
] | null | 5.3 | null | null |
RHSA-2021:3903 | Red Hat Security Advisory: curl security update | curl: Content not matching hash in Metalink is not being discarded curl: Metalink download sends credentials | [
"cpe:/o:redhat:rhel_eus:8.2::baseos"
] | null | 5.7 | null | null |
RHSA-2010:0153 | Red Hat Security Advisory: thunderbird security update | array index error in dtoa implementation of many products Mozilla incorrectly frees used memory (MFSA 2010-03) Mozilla Browser engine crashes Mozilla Base64 decoding crash Mozilla JavaScript engine crashes Mozilla data corruption with SOCKS5 reply Firefox 3.5.3 3.0.14 browser engine crashes Firefox 3.5.2 3.0.14 JavaScript engine crashes Firefox 3.0.14 Insufficient warning for PKCS11 module installation and removal Firefox 3.5.3 3.0.14 TreeColumns dangling pointer vulnerability Firefox: Predictable /tmp pathname use Firefox download filename spoofing with RTL override Firefox crashes with evidence of memory corruption Firefox integer underflow in FTP directory list parser Mozilla crash with evidence of memory corruption Mozilla crashes with evidence of memory corruption (MFSA 2010-01) seamonkey/thunderbird: crash when indexing certain messages with attachments firefox/thunderbird/seamonkey: browser chrome defacement via cached XUL stylesheets (MFSA 2010-14) firefox/thunderbird/seamonkey: XSS using addEventListener and setTimeout on a wrapped object (MFSA 2010-12) | [
"cpe:/a:redhat:rhel_productivity:5",
"cpe:/o:redhat:enterprise_linux:5::client"
] | null | null | null | null |
RHSA-2012:1130 | Red Hat Security Advisory: xen security update | xen: pv bootloader doesn't check the size of the bzip2 or lzma compressed kernel | [
"cpe:/a:redhat:rhel_virtualization:5::client",
"cpe:/a:redhat:rhel_virtualization:5::server",
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2024:2180 | Red Hat Security Advisory: runc security update | golang: io/fs: stack exhaustion in Glob golang: compress/gzip: stack exhaustion in Reader.Read golang: path/filepath: stack exhaustion in Glob golang: crypto/tls: Timing Side Channel attack in RSA based TLS key exchanges. | [
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 7.5 | null | null |
RHSA-2016:2606 | Red Hat Security Advisory: postgresql security and bug fix update | postgresql: CASE/WHEN with inlining can cause untrusted pointer dereference postgresql: privilege escalation via crafted database and role names | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 7.6 | null |
RHSA-2023:0407 | Red Hat Security Advisory: OpenShift Virtualization 4.12.0 RPMs security update | golang: out-of-bounds read in golang.org/x/text/language leads to DoS golang: net/http: limit growth of header canonicalization cache golang: syscall: don't close fd 0 on ForkExec error golang: net/http: improper sanitization of Transfer-Encoding header golang: go/parser: stack exhaustion in all Parse* functions golang: regexp: stack exhaustion via a deeply nested expression golang: encoding/xml: stack exhaustion in Decoder.Skip golang: crypto/tls: session tickets lack random ticket_age_add golang: io/fs: stack exhaustion in Glob golang: compress/gzip: stack exhaustion in Reader.Read golang: path/filepath: stack exhaustion in Glob golang: encoding/xml: stack exhaustion in Unmarshal golang: encoding/gob: stack exhaustion in Decoder.Decode golang: net/http/httputil: NewSingleHostReverseProxy - omit X-Forwarded-For not working | [
"cpe:/a:redhat:container_native_virtualization:4.12::el7",
"cpe:/a:redhat:container_native_virtualization:4.12::el8"
] | null | 6.5 | null | null |
RHSA-2015:2345 | Red Hat Security Advisory: net-snmp security and bug fix update | net-snmp: snmptrapd crash when handling an SNMP trap containing a ifMtu with a NULL type | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | null | null |
RHSA-2010:0811 | Red Hat Security Advisory: cups security update | cups: latent privilege escalation vulnerability cups: cupsd memory corruption vulnerability | [
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2018:1320 | Red Hat Security Advisory: Red Hat OpenShift Application Runtimes security and bug fix update | spring-framework: Directory traversal vulnerability with static resources on Windows filesystems spring-framework: Multipart content pollution spring-framework: Address partial fix for CVE-2018-1270 tomcat: Incorrect handling of empty string URL in security constraints can lead to unintended exposure of resources tomcat: Late application of security constraints can lead to resource exposure for unauthorised users | [
"cpe:/a:redhat:openshift_application_runtimes:1.0"
] | null | null | 4.8 | null |
RHSA-2020:1334 | Red Hat Security Advisory: telnet security update | telnet-server: no bounds checks in nextitem() function allows to remotely execute arbitrary code | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 9.8 | null | null |
RHSA-2024:10705 | Red Hat Security Advisory: postgresql:12 security update | postgresql: PostgreSQL PL/Perl environment variable changes execute arbitrary code | [
"cpe:/a:redhat:rhel_aus:8.6::appstream",
"cpe:/a:redhat:rhel_e4s:8.6::appstream",
"cpe:/a:redhat:rhel_tus:8.6::appstream"
] | null | 8.8 | null | null |
RHSA-2021:2046 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.3.7 security update on RHEL 6 | velocity: arbitrary code execution when attacker is able to modify templates netty: Information disclosure via the local system temporary directory netty: possible request smuggling in HTTP/2 due missing validation | [
"cpe:/a:redhat:jboss_enterprise_application_platform:7.3::el6"
] | null | 5.9 | null | null |
RHSA-2022:7257 | Red Hat Security Advisory: Red Hat Integration Camel-K 1.8.1 security update | jetty: requests to the ConcatServlet and WelcomeFilter are able to access protected resources within the WEB-INF directory tika-core: incomplete fix for CVE-2022-30126 | [
"cpe:/a:redhat:integration:1"
] | null | 3.1 | null | null |
RHSA-2022:5234 | Red Hat Security Advisory: python-virtualenv security update | python-pip: directory traversal in _download_http_url() function in src/pip/_internal/download.py | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 8 | null | null |
RHSA-2024:5521 | Red Hat Security Advisory: kpatch-patch-5_14_0-284_48_1 and kpatch-patch-5_14_0-284_52_1 security update | kernel: net: kernel: UAF in network route management | [
"cpe:/o:redhat:rhel_eus:9.2::baseos"
] | null | 7.8 | null | null |
RHSA-2018:0035 | Red Hat Security Advisory: microcode_ctl security update | An update for microcode_ctl is now available for Red Hat Enterprise Linux 7.2 Advanced Update Support, Red Hat Enterprise Linux 7.2 Telco Extended Update Support, and Red Hat Enterprise Linux 7.2 Update Services for SAP Solutions.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. | [
"cpe:/o:redhat:rhel_aus:7.2::server",
"cpe:/o:redhat:rhel_e4s:7.2::server",
"cpe:/o:redhat:rhel_tus:7.2::server"
] | null | null | null | null |
RHSA-2011:1308 | Red Hat Security Advisory: JBoss Communications Platform 1.2.11 and 5.1.1 security update | JBossWS remote Denial of Service | [
"cpe:/a:redhat:jboss_communications_platform:1.2",
"cpe:/a:redhat:jboss_communications_platform:5.1"
] | null | null | null | null |
RHSA-2023:0173 | Red Hat Security Advisory: libxml2 security update | libxml2: integer overflows with XML_PARSE_HUGE libxml2: dict corruption caused by entity reference cycles | [
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 7.8 | null | null |
RHSA-2022:5153 | Red Hat Security Advisory: Red Hat OpenShift GitOps security update | argocd: vulnerable to an uncontrolled memory consumption bug argocd: vulnerable to a variety of attacks when an SSO login is initiated from the Argo CD CLI or the UI. argocd: cross-site scripting (XSS) allow a malicious user to inject a javascript link in the UI argocd: vulnerable to a symlink following bug allowing a malicious user with repository write access | [
"cpe:/a:redhat:openshift_gitops:1.4::el8"
] | null | 4.3 | null | null |
RHSA-2023:0166 | Red Hat Security Advisory: dpdk security update | dpdk: DoS when a Vhost header crosses more than two descriptors and exhausts all mbufs | [
"cpe:/a:redhat:rhel_aus:8.2::appstream",
"cpe:/a:redhat:rhel_e4s:8.2::appstream",
"cpe:/a:redhat:rhel_tus:8.2::appstream"
] | null | 8.6 | null | null |
RHSA-2005:782 | Red Hat Security Advisory: util-linux and mount security update | security flaw security flaw | [
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws",
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2017:3190 | Red Hat Security Advisory: rh-eclipse46-jackson-databind security update | jackson-databind: Unsafe deserialization due to incomplete black list (incomplete fix for CVE-2017-7525) | [
"cpe:/a:redhat:rhel_software_collections:3::el7"
] | null | null | 8.1 | null |
RHSA-2007:1117 | Red Hat Security Advisory: samba security update | samba: send_mailslot() buffer overflow | [
"cpe:/o:redhat:rhel_eus:4.5::as",
"cpe:/o:redhat:rhel_eus:4.5::es"
] | null | null | null | null |
RHSA-2016:0301 | Red Hat Security Advisory: openssl security update | OpenSSL: SSLv2 doesn't block disabled ciphers OpenSSL: Side channel attack on modular exponentiation OpenSSL: Double-free in DSA code OpenSSL: BN_hex2bn/BN_dec2bn NULL pointer deref/heap corruption SSL/TLS: Cross-protocol attack on TLS using SSLv2 (DROWN) | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation",
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | null | null |
RHSA-2006:0204 | Red Hat Security Advisory: mailman security update | security flaw security flaw | [
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws",
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2023:1691 | Red Hat Security Advisory: kernel-rt security and bug fix update | kernel: FUSE filesystem low-privileged user privileges escalation | [
"cpe:/a:redhat:enterprise_linux:9::nfv",
"cpe:/a:redhat:enterprise_linux:9::realtime"
] | null | 7 | null | null |
RHSA-2021:0285 | Red Hat Security Advisory: firefox security update | Mozilla: HTTPS pages could have been intercepted by a registered service worker when they should not have been Mozilla: Cross-origin information leakage via redirected PDF requests Mozilla: Type confusion when using logical assignment operators in JavaScript switch statements Mozilla: Use-after-poison for incorrectly redeclared JavaScript variables during GC Mozilla: Memory safety bugs fixed in Firefox 85 and Firefox ESR 78.7 | [
"cpe:/a:redhat:rhel_eus:8.1::appstream"
] | null | 8.8 | 6.1 | null |
RHSA-2005:789 | Red Hat Security Advisory: mozilla security update | security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw | [
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2022:2201 | Red Hat Security Advisory: rsync security update | zlib: A flaw found in zlib when compressing (not decompressing) certain inputs | [
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 8.2 | null | null |
RHSA-2024:0150 | Red Hat Security Advisory: .NET 8.0 security update | dotnet: Information Disclosure: MD.SqlClient(MDS) & System.data.SQLClient (SDS) dotnet: X509 Certificates - Validation Bypass across Azure dotnet: .NET Denial of Service Vulnerability | [
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb"
] | null | 6.8 | null | null |
RHSA-2023:0210 | Red Hat Security Advisory: java-1.8.0-openjdk security and bug fix update | OpenJDK: improper restrictions in CORBA deserialization (Serialization, 8285021) OpenJDK: soundbank URL remote loading (Sound, 8293742) | [
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::crb"
] | null | 3.7 | null | null |
RHSA-2008:0946 | Red Hat Security Advisory: ed security update | ed: Heap-based buffer overflow (arb. code execution) | [
"cpe:/o:redhat:enterprise_linux:2.1::as",
"cpe:/o:redhat:enterprise_linux:2.1::aw",
"cpe:/o:redhat:enterprise_linux:2.1::es",
"cpe:/o:redhat:enterprise_linux:2.1::ws",
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws",
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws",
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2022:1110 | Red Hat Security Advisory: Red Hat Decision Manager 7.12.1 security update | netty: Information disclosure via the local system temporary directory springframework: malicious input leads to insertion of additional log entries apache-commons-io: Limited path traversal in Apache Commons IO 2.2 to 2.6 jdom: XXE allows attackers to cause a DoS via a crafted HTTP request logback: remote code execution through JNDI call from within its configuration file | [
"cpe:/a:redhat:jboss_enterprise_brms_platform:7.12"
] | null | 6.6 | null | null |
RHSA-2024:6422 | Red Hat Security Advisory: bubblewrap and flatpak security update | flatpak: Access to files outside sandbox for apps using persistent= (--persist) | [
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb",
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 7.4 | null | null |
RHSA-2022:8609 | Red Hat Security Advisory: OpenShift Virtualization 4.9.7 Images security update | go-restful: Authorization Bypass Through User-Controlled Key | [
"cpe:/a:redhat:container_native_virtualization:4.9::el8"
] | null | 9.1 | null | null |
RHSA-2014:0842 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 6.2.4 security update | Tomcat/JBossWeb: Limited DoS in chunked transfer encoding input filter Tomcat/JBossWeb: XXE vulnerability via user supplied XSLTs Tomcat/JBossWeb: Request smuggling via malicious content length header Tomcat/JBossWeb: XML parser hijack by malicious web application | [
"cpe:/a:redhat:jboss_enterprise_application_platform:6.2.4"
] | null | null | null | null |
RHBA-2020:4197 | Red Hat Bug Fix Advisory: OpenShift Container Platform 4.6 GA RPMs | kubernetes: compromised node could escalate to cluster level privileges golang: data race in certain net/http servers including ReverseProxy can lead to DoS golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs | [
"cpe:/a:redhat:openshift:4.6::el7",
"cpe:/a:redhat:openshift:4.6::el8"
] | null | 7.5 | null | null |
RHSA-2024:9554 | Red Hat Security Advisory: firefox security update | firefox: Use-after-free in Animation timeline (128.3.1 ESR Chemspill) firefox: thunderbird: Permission leak via embed or object elements firefox: thunderbird: Use-after-free in layout with accessibility firefox: thunderbird: Confusing display of origin for external protocol handler prompt firefox: thunderbird: XSS due to Content-Disposition being ignored in multipart/x-mixed-replace response firefox: thunderbird: Origin of permission prompt could be spoofed by long URL firefox: thunderbird: Cross origin video frame leak firefox: thunderbird: History interface could have been used to cause a Denial of Service condition in the browser firefox: thunderbird: Clipboard "paste" button persisted across tabs firefox: DOM push subscription message could hang Firefox firefox: thunderbird: Memory safety bugs fixed in Firefox 132, Thunderbird 132, Firefox ESR 128.4, and Thunderbird 128.4 | [
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 8.8 | null | null |
RHSA-2023:4354 | Red Hat Security Advisory: curl security update | curl: IDN wildcard match may lead to Improper Cerificate Validation curl: more POST-after-PUT confusion | [
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/o:redhat:enterprise_linux:9::baseos"
] | null | 3.7 | null | null |
RHSA-2022:2188 | Red Hat Security Advisory: kernel security update | kernel: use-after-free in RDMA listen() | [
"cpe:/o:redhat:rhel_aus:7.4::server"
] | null | 7 | null | null |
RHSA-2007:0957 | Red Hat Security Advisory: opal security update | ekiga remote crash caused by insufficient input validation | [
"cpe:/a:redhat:rhel_productivity:5",
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation"
] | null | null | null | null |
RHSA-2023:3229 | Red Hat Security Advisory: openshift-gitops-kam security update | go-restful: Authorization Bypass Through User-Controlled Key | [
"cpe:/a:redhat:openshift_gitops:1.8::el8"
] | null | 9.1 | null | null |
RHSA-2022:4824 | Red Hat Security Advisory: fapolicyd security and bug fix update | fapolicyd: fapolicyd wrongly prepares ld.so path | [
"cpe:/a:redhat:rhel_eus:8.4::appstream"
] | null | 8.4 | null | null |
RHSA-2014:1653 | Red Hat Security Advisory: openssl security update | Updated openssl packages that contain a backported patch to mitigate the
CVE-2014-3566 issue are now available for Red Hat Enterprise Linux 5.
Red Hat Product Security has rated this update as having Moderate security
impact. | [
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2020:4264 | Red Hat Security Advisory: OpenShift Container Platform 4.3.40 security and bug fix update | golang.org/x/crypto: Processing of crafted ssh-ed25519 public keys allows for panic | [
"cpe:/a:redhat:openshift:4.3::el7",
"cpe:/a:redhat:openshift:4.3::el8"
] | null | 7.5 | null | null |
RHSA-2022:5699 | Red Hat Security Advisory: Secondary Scheduler Operator for Red Hat OpenShift 1.0.1 security update | golang: syscall: faccessat checks wrong group | [
"cpe:/a:redhat:openshift_secondary_scheduler:1.0::el8"
] | null | 6.2 | null | null |
RHSA-2024:11121 | Red Hat Security Advisory: gstreamer1-plugins-good security update | gstreamer1-plugins-good: OOB-write in isomp4/qtdemux.c gstreamer1-plugins-good: OOB-write in convert_to_s334_1a gstreamer1-plugins-good: uninitialized stack memory in Matroska/WebM demuxer gstreamer1-plugins-good: integer overflows in MP4/MOV demuxer and memory allocator that can lead to out-of-bounds writes gstreamer1-plugins-good: null pointer dereference in gst_gdk_pixbuf_dec_flush | [
"cpe:/a:redhat:rhel_eus:9.4::appstream"
] | null | 6.5 | null | null |
RHSA-2013:0236 | Red Hat Security Advisory: java-1.6.0-sun security update | JDK: unspecified vulnerability fixed in 6u39 and 7u13 (Deployment) JDK: unspecified vulnerability fixed in 6u39 and 7u13 (Scripting) JDK: unspecified vulnerability fixed in 6u39 and 7u13 (Deployment) JDK: unspecified vulnerability fixed in 6u39 and 7u13 (Deployment) JDK: unspecified vulnerability fixed in 6u39 and 7u13 (JMX) JDK: unspecified vulnerability fixed in 6u39 and 7u13 (Deployment) JDK: unspecified vulnerability fixed in 6u39 and 7u13 (Deployment) OpenJDK: RMI CGIHandler XSS issue (RMI, 6563318) OpenJDK: logging insufficient access control checks (Libraries, 6664509) OpenJDK: logging insufficient access control checks (Libraries, 6664528) OpenJDK: invalid threads subject to interrupts (Libraries, 6776941) OpenJDK: reflection API incorrect checks for proxy classes (Libraries, 7197546, SE-2012-01 Issue 29) OpenJDK: PresentationManager incorrectly shared (CORBA, 7141694) JDK: unspecified vulnerability fixed in 6u39 and 7u13 (Install) OpenJDK: insufficient clipboard access premission checks (AWT, 7186952) OpenJDK: InetSocketAddress serialization issue (Networking, 7201071) OpenJDK: loadPropertyFile missing restrictions (JAXP, 8001235) OpenJDK: com.sun.xml.internal.* not restricted packages (JAX-WS, 7201068) JDK: unspecified vulnerability fixed in 6u39 and 7u13 (Deployment) OpenJDK: CPU consumption DoS via repeated SSL ClientHello packets (JSSE, 7192393) OpenJDK: missing serialization restriction (CORBA, 7201066) OpenJDK: insufficient privilege checking issue (AWT, 7192977) OpenJDK: insufficient Diffie-Hellman public key checks (JSSE, 7192392) OpenJDK: insufficient privilege checking issue (AWT, 8001057) JDK: unspecified vulnerability fixed in 6u39 and 7u13 (Deployment) OpenJDK: RequiredModelMBean missing access control context checks (JMX, 8000537) JDK: unspecified vulnerability fixed in 6u39 and 7u13 (Deployment) OpenJDK: IIOP type reuse sandbox bypass (CORBA, 8000540, SE-2012-01 Issue 50) OpenJDK: missing ValueHandlerImpl class constructor access restriction (CORBA, 8000631) OpenJDK: image parser insufficient raster parameter checks (2D, 8001972) OpenJDK: image parser insufficient raster parameter checks (AWT, 8002325) JDK: unspecified vulnerability fixed in 6u39 (Sound) | [
"cpe:/a:redhat:rhel_extras:5::server",
"cpe:/a:redhat:rhel_extras:6"
] | null | null | null | null |
RHSA-2016:0188 | Red Hat Security Advisory: sos security and bug fix update | sos: Usage of predictable temporary files allows privilege escalation | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | null | null |
RHSA-2023:1576 | Red Hat Security Advisory: postgresql:13 security update | postgresql: Extension scripts replace objects not belonging to the extension. postgresql: Client memory disclosure when connecting with Kerberos to modified server | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 3.7 | null | null |
RHSA-2013:1771 | Red Hat Security Advisory: Red Hat JBoss Web Framework Kit 2.4.0 update | JGroups: Authentication via cached credentials | [
"cpe:/a:redhat:jboss_enterprise_web_framework:2.4.0"
] | null | null | null | null |
RHSA-2022:7022 | Red Hat Security Advisory: firefox security update | expat: a use-after-free in the doContent function in xmlparse.c | [
"cpe:/a:redhat:rhel_eus:8.2::appstream"
] | null | 8.1 | null | null |
RHSA-2023:3624 | Red Hat Security Advisory: Migration Toolkit for Containers (MTC) 1.7.10 security and bug fix update | golang: net/http, net/textproto: denial of service from excessive memory allocation golang: net/http, net/textproto, mime/multipart: denial of service from excessive resource consumption golang: go/parser: Infinite loop in parsing golang: html/template: backticks not treated as string delimiters golang: html/template: improper handling of JavaScript whitespace | [
"cpe:/a:redhat:rhmt:1.7::el8"
] | null | 8.1 | null | null |
RHSA-2016:0506 | Red Hat Security Advisory: python-django security update | python-django: Malicious redirect and possible XSS attack via user-supplied redirect URLs containing basic auth python-django: User enumeration through timing difference on password hasher work factor upgrade | [
"cpe:/a:redhat:openstack:5::el7"
] | null | null | null | null |
RHSA-2014:0344 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 6.2.2 update | tomcat: multiple content-length header poisoning flaws PicketBox/JBossSX: Unauthorized access to and modification of application server configuration and state by application 6: JSM policy not respected by deployed applications | [
"cpe:/a:redhat:jboss_enterprise_application_platform:6::el6"
] | null | null | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.