id
stringlengths 13
15
| title
stringlengths 29
176
| description
stringlengths 8
32.1k
| cpes
sequencelengths 0
20
| cvss_v4_0
null | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
null |
---|---|---|---|---|---|---|---|
RHSA-2011:1166 | Red Hat Security Advisory: thunderbird security update | Mozilla: Crash in SVGTextElement.getCharNumAtPosition() Mozilla: Dangling pointer vulnerability in appendChild Mozilla: Miscellaneous memory safety hazards | [
"cpe:/o:redhat:enterprise_linux:6::server"
] | null | null | null | null |
RHSA-2019:2799 | Red Hat Security Advisory: nginx:1.14 security update | HTTP/2: large amount of data requests leads to denial of service HTTP/2: flood using PRIORITY frames results in excessive resource consumption HTTP/2: 0-length headers lead to denial of service | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | null | 6.5 | null |
RHSA-2023:2121 | Red Hat Security Advisory: libreswan security update | libreswan: Malicious IKEv1 Aggressive Mode packets can crash libreswan | [
"cpe:/a:redhat:rhel_eus:9.0::appstream"
] | null | 7.5 | null | null |
RHSA-2018:2405 | Red Hat Security Advisory: Red Hat FIS 2.0 on Fuse 6.3.0 R7 security and bug fix update | spring-boot: Malicious PATCH requests submitted to servers can use specially crafted JSON data to run arbitrary Java code undertow: Client can use bogus uri in Digest authentication spring-framework: Improper URL path validation allows for bypassing of security checks on static resources ignite: Possible Execution of Arbitrary Code Within Deserialization Endpoints spark: Absolute and relative pathnames allow for unintended static file disclosure | [
"cpe:/a:redhat:jboss_fuse:6.3"
] | null | null | 5.3 | null |
RHSA-2021:2714 | Red Hat Security Advisory: kernel security and bug fix update | kernel: race condition for removal of the HCI controller kernel: size_t-to-int conversion vulnerability in the filesystem layer | [
"cpe:/a:redhat:enterprise_linux:8::crb",
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 6.7 | null | null |
RHSA-2025:2868 | Red Hat Security Advisory: libreoffice security update | libreoffice: Macro URL arbitrary script execution | [
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb"
] | null | 7.6 | null | null |
RHSA-2012:0476 | Red Hat Security Advisory: Red Hat Enterprise MRG Management Console security update | cumin: multiple XSS flaws | [
"cpe:/a:redhat:enterprise_mrg:2::el5"
] | null | null | null | null |
RHSA-2007:0400 | Red Hat Security Advisory: firefox security update | Multiple Firefox flaws (CVE-2007-1562, CVE-2007-2867, CVE-2007-2868, CVE-2007-2869, CVE-2007-2870, CVE-2007-2871) security flaw Multiple Firefox flaws (CVE-2007-1562, CVE-2007-2867, CVE-2007-2868, CVE-2007-2869, CVE-2007-2870, CVE-2007-2871) security flaw Multiple Firefox flaws (CVE-2007-1562, CVE-2007-2867, CVE-2007-2868, CVE-2007-2869, CVE-2007-2870, CVE-2007-2871) security flaw Multiple Firefox flaws (CVE-2007-1562, CVE-2007-2867, CVE-2007-2868, CVE-2007-2869, CVE-2007-2870, CVE-2007-2871) | [
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws",
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2025:3931 | Red Hat Security Advisory: kernel security update | kernel: ALSA: usb-audio: Fix out of bounds reads when finding clock sources | [
"cpe:/o:redhat:rhel_els:6"
] | null | 7.1 | null | null |
RHSA-2020:2236 | Red Hat Security Advisory: java-1.7.1-ibm security update | OpenJDK: Excessive memory usage in OID processing in X.509 certificate parsing (Libraries, 8234037) OpenJDK: Incorrect handling of references to uninitialized class descriptors during deserialization (Serialization, 8224541) OpenJDK: Uncaught InstantiationError exception in ObjectStreamClass (Serialization, 8224549) OpenJDK: Re-use of single TLS session for new connections (JSSE, 8234408) OpenJDK: CRLF injection into HTTP headers in HttpServer (Lightweight HTTP Server, 8234825) OpenJDK: Incorrect bounds checks in NIO Buffers (Libraries, 8234841) OpenJDK: Incorrect type checks in MethodType.readObject() (Libraries, 8235274) OpenJDK: Regular expression DoS in Scanner (Concurrency, 8236201) | [
"cpe:/a:redhat:rhel_extras:6"
] | null | 5.3 | null | null |
RHSA-2024:7854 | Red Hat Security Advisory: thunderbird security update | firefox: thunderbird: Compromised content process can bypass site isolation firefox: thunderbird: Cross-origin access to PDF contents through multipart responses firefox: thunderbird: Cross-origin access to JSON contents through multipart responses firefox: thunderbird: Potential memory corruption may occur when cloning certain objects firefox: thunderbird: Potential directory upload bypass via clickjacking firefox: thunderbird: External protocol handlers could be enumerated via popups firefox: thunderbird: Specially crafted WebTransport requests could lead to denial of service firefox: thunderbird: Potential memory corruption during JIT compilation firefox: thunderbird: Memory safety bugs fixed in Firefox 131, Firefox ESR 115.16, Firefox ESR 128.3, Thunderbird 131, and Thunderbird 128.3 firefox: thunderbird: Memory safety bugs fixed in Firefox 131, Firefox ESR 128.3, Thunderbird 131, and Thunderbird 128.3 firefox: thunderbird: Memory safety bugs fixed in Firefox 131 and Thunderbird 131 | [
"cpe:/a:redhat:rhel_aus:8.4::appstream",
"cpe:/a:redhat:rhel_e4s:8.4::appstream",
"cpe:/a:redhat:rhel_tus:8.4::appstream"
] | null | 7.5 | null | null |
RHSA-2022:6351 | Red Hat Security Advisory: OpenShift Virtualization 4.10.5 Images security and bug fix update | kubeVirt: Arbitrary file read on the host from KubeVirt VMs go-restful: Authorization Bypass Through User-Controlled Key | [
"cpe:/a:redhat:container_native_virtualization:4.10::el8"
] | null | 9.1 | null | null |
RHSA-2024:11250 | Red Hat Security Advisory: pam security update | pam: libpam: Libpam vulnerable to read hashed password | [
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/o:redhat:enterprise_linux:9::baseos"
] | null | 4.7 | null | null |
RHSA-2016:0081 | Red Hat Security Advisory: qemu-kvm-rhev security update | Qemu: nvram: OOB r/w access in processing firmware configurations | [
"cpe:/a:redhat:enterprise_linux:6::hypervisor"
] | null | null | null | null |
RHSA-2019:1884 | Red Hat Security Advisory: libssh2 security update | libssh2: Out-of-bounds memory comparison with specially crafted message channel request | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 7.3 | null |
RHSA-2023:0352 | Red Hat Security Advisory: OpenJDK 17.0.6 Security Update for Windows Builds | OpenJDK: handshake DoS attack against DTLS connections (JSSE, 8287411) OpenJDK: soundbank URL remote loading (Sound, 8293742) | [
"cpe:/a:redhat:openjdk:17::windows"
] | null | 3.7 | null | null |
RHSA-2019:1289 | Red Hat Security Advisory: CloudForms 4.6.9 security, bug fix and enhancement update | rubygem-actionpack: render file directory traversal in Action View rubygem-actionpack: denial of service vulnerability in Action View | [
"cpe:/a:redhat:cloudforms_managementengine:5.9::el7"
] | null | null | 5.9 | null |
RHSA-2021:1028 | Red Hat Security Advisory: kernel security and bug fix update | kernel: performance counters race condition use-after-free kernel: locking issue in drivers/tty/tty_jobctrl.c can lead to an use-after-free | [
"cpe:/o:redhat:rhel_eus:7.7::computenode",
"cpe:/o:redhat:rhel_eus:7.7::server"
] | null | 7.8 | null | null |
RHSA-2003:187 | Red Hat Security Advisory: : Updated 2.4 kernel fixes vulnerabilities and driver bugs | security flaw security flaw security flaw | [
"cpe:/o:redhat:linux:7.1",
"cpe:/o:redhat:linux:7.2",
"cpe:/o:redhat:linux:7.3",
"cpe:/o:redhat:linux:8.0",
"cpe:/o:redhat:linux:9"
] | null | null | null | null |
RHSA-2004:091 | Red Hat Security Advisory: : Updated libxml2 packages fix security vulnerability | libxml2 long URL causes SEGV | [
"cpe:/o:redhat:linux:9"
] | null | null | null | null |
RHSA-2021:0329 | Red Hat Security Advisory: Red Hat AMQ Broker 7.4.6 release and security update | jetty: local temporary directory hijacking vulnerability jetty: buffer not correctly recycled in Gzip Request inflation | [
"cpe:/a:redhat:amq_broker:7"
] | null | 4.8 | null | null |
RHSA-2024:4533 | Red Hat Security Advisory: kernel security update | kernel: ethernet: hisilicon: hns: hns_dsaf_misc: fix a possible array overflow in hns_dsaf_ge_srst_by_port() kernel: net: hns3: fix use-after-free bug in hclgevf_send_mbx_msg kernel: vt: fix memory overlapping when deleting chars in the buffer kernel: can: j1939: prevent deadlock by changing j1939_socks_lock to rwlock kernel: tls: race between async notify and socket close kernel: tls: race between tx work scheduling and socket close kernel: mm/writeback: fix possible divide-by-zero in wb_dirty_limits(), again kernel: mm/vmscan: fix a bug calling wakeup_kswapd() with a wrong zone index kernel: Bluetooth: Avoid potential use-after-free in hci_error_reset kernel: net/ipv6: avoid possible UAF in ip6_route_mpath_notify() kernel: icmp: prevent possible NULL dereferences from icmp_build_probe() kernel: netfilter: nf_tables: Fix potential data-race in __nft_flowtable_type_get() kernel: ipv6: fix race condition between ipv6_get_ifaddr and ipv6_del_addr kernel: netfilter: nf_tables: honor table dormant flag from netdev release event path kernel: tty: n_gsm: fix possible out-of-bounds in gsm0_receive() kernel: TIPC message reassembly use-after-free remote code execution vulnerability | [
"cpe:/a:redhat:rhel_eus:9.2::appstream",
"cpe:/a:redhat:rhel_eus:9.2::crb",
"cpe:/o:redhat:rhel_eus:9.2::baseos"
] | null | 7.1 | null | null |
RHSA-2024:4820 | Red Hat Security Advisory: httpd:2.4 security update | httpd: Substitution encoding issue in mod_rewrite httpd: Improper escaping of output in mod_rewrite httpd: NULL pointer dereference in mod_proxy | [
"cpe:/a:redhat:rhel_aus:8.2::appstream"
] | null | 7.5 | null | null |
RHSA-2017:2484 | Red Hat Security Advisory: git security update | git: Command injection via malicious ssh URLs | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 6.3 | null |
RHSA-2024:4831 | Red Hat Security Advisory: kernel-rt security update | kernel: can: j1939: j1939_netdev_start(): fix UAF for rx_kref of j1939_priv kernel: vmwgfx: integer overflow in vmwgfx_execbuf.c kernel: vmwgfx: use-after-free in vmw_cmd_res_check kernel: vmwgfx: use-after-free in vmw_execbuf_tie_context kernel: net: amd-xgbe: Fix skb data length underflow kernel: vmwgfx: reference count issue leads to use-after-free in surface handling kernel: vmwgfx: race condition leading to information disclosure vulnerability kernel: vmwgfx: double free within the handling of vmw_buffer_object objects kernel: smb: client: fix potential OOBs in smb2_parse_contexts() kernel: uio: Fix use-after-free in uio_open kernel: intel: Fix NULL pointer dereference issue in upi_fill_topology() kernel: Bluetooth: hci_codec: Fix leaking content of local_codecs kernel: net: bridge: data races indata-races in br_handle_frame_finish() kernel: sched/psi: Fix use-after-free in ep_remove_wait_queue() kernel: scsi: ibmvfc: Remove BUG_ON in the case of an empty event pool kernel: stack overflow problem in Open vSwitch kernel module leading to DoS kernel: nftables: nft_set_rbtree skip end interval element from gc kernel: netfilter: nft_limit: reject configurations that cause integer overflow kernel: hv_netvsc: Fix race condition between netvsc_probe and netvsc_remove kernel: ext4: fix double-free of blocks due to wrong extents moved_len kernel: net/sched: act_mirred: don't override retval if we already lost the skb kernel: ext4: avoid allocating blocks from corrupted group in ext4_mb_try_best_found() kernel: netfilter: nft_chain_filter: handle NETDEV_UNREGISTER for inet/ingress basechain kernel: vfio/pci: Lock external INTx masking ops kernel: dm: call the resume method on internal suspend kernel: af_unix: Fix garbage collector racing against connect() kernel: netfilter: nf_tables: release mutex after nft_gc_seq_end from abort path kernel: scsi: qla2xxx: Fix double free of fcport kernel: scsi: qla2xxx: Fix command flush on cable pull kernel: Squashfs: check the inode number is not the invalid value of zero kernel: netfilter: flowtable: validate pppoe header kernel: netfilter: nf_tables: Fix potential data-race in __nft_obj_type_get() kernel: netfilter: nf_tables: Fix potential data-race in __nft_expr_type_get() kernel: netfilter: nf_tables: do not compare internal table flags on updates kernel: ipv6: fix potential "struct net" leak in inet6_rtm_getaddr() kernel: KVM: SVM: Flush pages under kvm->lock to fix UAF in svm_register_enc_region() kernel: netfilter: nf_tables: discard table flag update with pending basechain deletion kernel: netfilter: nf_tables: flush pending destroy work before exit_net release kernel: drm/client: Fully protect modes[] with dev->mode_config.mutex kernel: scsi: qla2xxx: Fix off by one in qla_edif_app_getstats() kernel: tls: fix missing memory barrier in tls_init kernel: tcp: Use refcount_inc_not_zero() in tcp_twsk_unique(). kernel: scsi: lpfc: Release hbalock before calling lpfc_worker_wake_up() kernel: scsi: lpfc: Move NPIV's transport unregistration to after resource clean up kernel: net: sched: sch_multiq: fix possible OOB write in multiq_tune() kernel: af_unix: Fix data races in unix_release_sock/unix_stream_sendmsg | [
"cpe:/a:redhat:rhel_eus:9.2::nfv",
"cpe:/a:redhat:rhel_eus:9.2::realtime"
] | null | 4.7 | null | null |
RHSA-2019:2590 | Red Hat Security Advisory: java-1.8.0-ibm security update | OpenJDK: Insufficient checks of suppressed exceptions in deserialization (Utilities, 8212328) OpenJDK: Unbounded memory allocation during deserialization in Collections (Utilities, 8213432) OpenJDK: Insufficient restriction of privileges in AccessController (Security, 8216381) OpenJDK: Missing URL format validation (Networking, 8221518) libpng: use-after-free in png_image_free in png.c JDK: Out-of-bounds access in the String.getBytes method JDK: Failure to privatize a value pulled out of the loop by versioning | [
"cpe:/a:redhat:enterprise_linux:8::supplementary"
] | null | 7.4 | 9.8 | null |
RHSA-2023:0945 | Red Hat Security Advisory: kpatch-patch security update | kernel: stack overflow in do_proc_dointvec and proc_skip_spaces | [
"cpe:/o:redhat:rhel_e4s:7.7::server"
] | null | 7.8 | null | null |
RHSA-2023:3811 | Red Hat Security Advisory: python39:3.9 and python39-devel:3.9 security update | python: urllib.parse url blocklisting bypass | [
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb"
] | null | 7.5 | null | null |
RHSA-2024:0014 | Red Hat Security Advisory: tigervnc security update | xorg-x11-server: out-of-bounds memory reads/writes in XKB button actions xorg-x11-server: out-of-bounds memory read in RRChangeOutputProperty and RRChangeProviderProperty | [
"cpe:/a:redhat:rhel_eus:8.8::appstream"
] | null | 7.6 | null | null |
RHSA-2020:0738 | Red Hat Security Advisory: chromium-browser security update | chromium-browser: Type confusion in V8 chromium-browser: Use after free in WebAudio chromium-browser: Use after free in speech chromium-browser: Out of bounds memory access in streams chromium-browser: Type confusion in V8 ICU: Integer overflow in UnicodeString::doAppend() | [
"cpe:/a:redhat:rhel_extras:6"
] | null | 8.8 | 8.8 | null |
RHSA-2024:0154 | Red Hat Security Advisory: openssl security update | openssl: Excessive time spent checking DH keys and parameters OpenSSL: Excessive time spent checking DH q parameter value openssl: Generating excessively long X9.42 DH keys or checking excessively long X9.42 DH keys or parameters may be very slow | [
"cpe:/o:redhat:rhel_eus:8.8::baseos"
] | null | 5.3 | null | null |
RHSA-2023:1220 | Red Hat Security Advisory: kernel-rt security and bug fix update | kernel: use-after-free caused by l2cap_reassemble_sdu() in net/bluetooth/l2cap_core.c kernel: net: CPU soft lockup in TC mirred egress-to-ingress action kernel: stack overflow in do_proc_dointvec and proc_skip_spaces | [
"cpe:/a:redhat:rhel_eus:8.4::nfv",
"cpe:/a:redhat:rhel_eus:8.4::realtime"
] | null | 7.8 | null | null |
RHSA-2020:2512 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.3.1 Security update | mojarra: Path traversal in ResourceManager.java:getLocalePrefix() via the loc parameter thrift: Endless loop when feed with specific input data thrift: Out-of-bounds read related to TJSONProtocol or TSimpleJSONProtocol jackson-mapper-asl: XML external entity similar to CVE-2016-3720 cxf: OpenId Connect token service does not properly validate the clientId wildfly: The 'enabled-protocols' value in legacy security is not respected if OpenSSL security provider is in use cxf: reflected XSS in the services listing page resteasy: Improper validation of response header in MediaTypeHeaderDelegate.java class Wildfly: EJBContext principal is not popped back after invoking another EJB using a different Security Domain SmallRye: SecuritySupport class is incorrectly public and contains a static method to access the current threads context class loader undertow: AJP File Read/Inclusion Vulnerability undertow: servletPath is normalized incorrectly leading to dangerous application mapping which could result in security bypass Mojarra: Path traversal via either the loc parameter or the con parameter, incomplete fix of CVE-2018-14371 cryptacular: excessive memory allocation during a decode operation jackson-databind: Lacks certain xbean-reflect/JNDI blocking jackson-databind: Serialization gadgets in shaded-hikari-config jackson-databind: Serialization gadgets in ibatis-sqlmap jackson-databind: Serialization gadgets in anteros-core RESTEasy: RESTEASY003870 exception in RESTEasy can lead to a reflected XSS attack undertow: Memory exhaustion issue in HttpReadListener via "Expect: 100-continue" header undertow: invalid HTTP request with large chunk size | [
"cpe:/a:redhat:jboss_enterprise_application_platform:7.3::el7"
] | null | 6.5 | 8.1 | null |
RHSA-2024:0254 | Red Hat Security Advisory: rsync security update | zlib: heap-based buffer over-read and overflow in inflate() in inflate.c via a large gzip header extra field | [
"cpe:/o:redhat:rhel_eus:8.6::baseos"
] | null | 7 | null | null |
RHSA-2022:5187 | Red Hat Security Advisory: Red Hat OpenShift GitOps security update | argocd: vulnerable to an uncontrolled memory consumption bug argocd: vulnerable to a variety of attacks when an SSO login is initiated from the Argo CD CLI or the UI. argocd: cross-site scripting (XSS) allow a malicious user to inject a javascript link in the UI argocd: vulnerable to a symlink following bug allowing a malicious user with repository write access | [
"cpe:/a:redhat:openshift_gitops:1.3::el8"
] | null | 4.3 | null | null |
RHSA-2019:1245 | Red Hat Security Advisory: Red Hat Quay 3.0.2 security and bug fix update | SSL/TLS: Birthday attack against 64-bit block ciphers (SWEET32) | [
"cpe:/a:redhat:quay:3::el7"
] | null | null | 7.5 | null |
RHSA-2019:3255 | Red Hat Security Advisory: heketi security, bug fix, and enhancement update | heketi: heketi can be installed using insecure defaults | [
"cpe:/a:redhat:storage:3.5:server:el7",
"cpe:/a:redhat:storage:3:client:el7"
] | null | null | 7.3 | null |
RHSA-2024:6188 | Red Hat Security Advisory: runc security update | golang: crypto/x509: Verify panics on certificates with an unknown public key algorithm | [
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 5.9 | null | null |
RHSA-2015:1768 | Red Hat Security Advisory: libunwind security update | libunwind: off-by-one in dwarf_to_unw_regnum() | [
"cpe:/a:redhat:openstack:5::el6"
] | null | null | null | null |
RHSA-2024:4118 | Red Hat Security Advisory: Red Hat Ceph Storage 5.3 security, bug fix, and enhancement update | golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487) opentelemetry: DoS vulnerability in otelhttp go-git: Maliciously crafted Git server replies can lead to path traversal and RCE on go-git clients | [
"cpe:/a:redhat:ceph_storage:5.3::el8",
"cpe:/a:redhat:ceph_storage:5.3::el9"
] | null | 8.1 | null | null |
RHSA-2019:2695 | Red Hat Security Advisory: kernel security and bug fix update | kernel: hw: Spectre SWAPGS gadget vulnerability | [
"cpe:/o:redhat:rhel_aus:6.5::server"
] | null | null | 5.9 | null |
RHSA-2017:1561 | Red Hat Security Advisory: thunderbird security update | Mozilla: Memory safety bugs fixed in Firefox 54 and Firefox ESR 52.2 (MFSA 2017-16) Mozilla: Use-after-free using destroyed node when regenerating trees (MFSA 2017-16) Mozilla: Use-after-free during docshell reloading (MFSA 2017-16) Mozilla: Use-after-free with track elements (MFSA 2017-16) Mozilla: Use-after-free with content viewer listeners (MFSA 2017-16) Mozilla: Use-after-free with IME input (MFSA 2017-16) Mozilla: Out-of-bounds read in WebGL with ImageInfo object (MFSA 2017-16) Mozilla: Use-after-free and use-after-scope logging XHR header errors (MFSA 2017-16) Mozilla: Use-after-free in IndexedDB (MFSA 2017-16) Mozilla: Out-of-bounds read in Opus encoder (MFSA 2017-16) Mozilla: Domain spoofing with combination of Canadian Syllabics and other unicode blocks (MFSA 2017-16) graphite2: out of bounds read in "graphite2::Pass::readPass" graphite2: heap-buffer-overflow write "lz4::decompress" (CVE-2017-7772) graphite2: heap-buffer-overflow write "lz4::decompress" (src/Decompressor) graphite2: out of bounds read "graphite2::Silf::readGraphite" graphite2: assertion error "size() > n" graphite2: heap-buffer-overflow read "graphite2::Silf::getClassGlyph" graphite2: use of uninitialized memory "graphite2::GlyphCache::Loader::read_glyph" Mozilla: Vulnerabilities in the Graphite 2 library (MFSA 2017-16) | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation",
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 9.8 | null |
RHSA-2023:1079 | Red Hat Security Advisory: Red Hat OpenStack Platform 16.2 (osp-director-downloader-container, osp-director-agent-container and osp-director-operator-container) security update | golang: archive/tar: github.com/vbatts/tar-split: unbounded memory consumption when reading headers golang: regexp/syntax: limit memory used by parsing regexps golang: net/http: excessive memory growth in a Go server accepting HTTP/2 requests | [
"cpe:/a:redhat:openstack:16.2::el8"
] | null | 5.3 | null | null |
RHSA-2012:1207 | Red Hat Security Advisory: glibc security and bug fix update | glibc: Integer overflows, leading to stack-based buffer overflows in strto* related routines | [
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2005:348 | Red Hat Security Advisory: mysql-server security update | security flaw security flaw security flaw | [
"cpe:/a:redhat:rhel_extras:3"
] | null | null | null | null |
RHSA-2021:5036 | Red Hat Security Advisory: virt:8.2 and virt-devel:8.2 security update | QEMU: virtio-net: heap use-after-free in virtio_net_receive_rcu | [
"cpe:/a:redhat:advanced_virtualization:8.2::el8"
] | null | 7.5 | null | null |
RHSA-2020:2041 | Red Hat Security Advisory: squid:4 security update | squid: improper check for new member in ESIExpression::Evaluate allows for stack buffer overflow squid: parsing of header Proxy-Authentication leads to memory corruption squid: improper access restriction upon Digest Authentication nonce replay could lead to remote code execution | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 8.1 | 4.3 | null |
RHSA-2023:4509 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.4.12 security update | jackson-databind: Possible DoS if using JDK serialization to serialize JsonNode jettison: Uncontrolled Recursion in JSONArray undertow: OutOfMemoryError due to @MultipartConfig handling undertow: AJP Request closes connection exceeding maxRequestSize | [
"cpe:/a:redhat:jboss_enterprise_application_platform:7.4"
] | null | 7.5 | null | null |
RHSA-2021:0816 | Red Hat Security Advisory: wpa_supplicant security update | wpa_supplicant: Use-after-free in P2P provision discovery processing | [
"cpe:/o:redhat:rhel_eus:8.2::baseos"
] | null | 7.5 | null | null |
RHSA-2024:0990 | Red Hat Security Advisory: rh-postgresql12-postgresql security update | postgresql: non-owner 'REFRESH MATERIALIZED VIEW CONCURRENTLY' executes arbitrary SQL | [
"cpe:/a:redhat:rhel_software_collections:3::el7"
] | null | 8 | null | null |
RHSA-2022:6152 | Red Hat Security Advisory: Secondary Scheduler Operator for Red Hat OpenShift 1.1.0 security update | golang: net/http: improper sanitization of Transfer-Encoding header golang: go/parser: stack exhaustion in all Parse* functions golang: encoding/pem: fix stack overflow in Decode golang: encoding/xml: stack exhaustion in Decoder.Skip golang: crypto/elliptic: panic caused by oversized scalar golang: crypto/tls: session tickets lack random ticket_age_add golang: io/fs: stack exhaustion in Glob golang: compress/gzip: stack exhaustion in Reader.Read golang: path/filepath: stack exhaustion in Glob golang: encoding/xml: stack exhaustion in Unmarshal golang: encoding/gob: stack exhaustion in Decoder.Decode golang: net/http/httputil: NewSingleHostReverseProxy - omit X-Forwarded-For not working | [
"cpe:/a:redhat:openshift_secondary_scheduler:1.1::el8"
] | null | 6.5 | null | null |
RHSA-2018:2439 | Red Hat Security Advisory: mariadb security and bug fix update | mysql: Client programs unspecified vulnerability (CPU Jul 2017) mysql: Server: DML unspecified vulnerability (CPU Jul 2017) mysql: Client mysqldump unspecified vulnerability (CPU Jul 2017) mysql: Server: DDL unspecified vulnerability (CPU Jul 2017) mysql: Server: Replication unspecified vulnerability (CPU Oct 2017) mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2017) mysql: Client programs unspecified vulnerability (CPU Oct 2017) mysql: Server: DDL unspecified vulnerability (CPU Oct 2017) mysql: Server: Partition unspecified vulnerability (CPU Jan 2018) mysql: Server: DDL unspecified vulnerability (CPU Jan 2018) mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2018) mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2018) mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2018) mysql: Server: Replication unspecified vulnerability (CPU Apr 2018) mysql: Client programs unspecified vulnerability (CPU Apr 2018) mysql: use of SSL/TLS not enforced in libmysqld (Return of BACKRONYM) mysql: Server: Locking unspecified vulnerability (CPU Apr 2018) mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2018) mysql: Server: DDL unspecified vulnerability (CPU Apr 2018) mysql: Server: DDL unspecified vulnerability (CPU Apr 2018) mysql: InnoDB unspecified vulnerability (CPU Apr 2018) mysql: Server: Parser unspecified vulnerability (CPU Oct 2018) mysql: Server: Parser unspecified vulnerability (CPU Jan 2019) | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 6.5 | null |
RHBA-2018:0135 | Red Hat Bug Fix Advisory: org.ovirt.engine-root bug fix and enhancement update | ovirt-engine: When Wipe After Delete (WAD) and Enable Discard are both enabled for a VM disk, discarded data might not be wiped after the disk is removed. | [
"cpe:/a:redhat:rhev_manager:4"
] | null | null | 4.2 | null |
RHSA-2023:1554 | Red Hat Security Advisory: kernel security, bug fix, and enhancement update | ALSA: pcm: Move rwsem lock inside snd_ctl_elem_read to prevent UAF kernel: FUSE filesystem low-privileged user privileges escalation | [
"cpe:/a:redhat:rhel_eus:8.6::crb",
"cpe:/o:redhat:rhel_eus:8.6::baseos",
"cpe:/o:redhat:rhev_hypervisor:4.4::el8"
] | null | 7 | null | null |
RHSA-2017:0680 | Red Hat Security Advisory: glibc security and bug fix update | glibc: Unbounded stack allocation in nan* functions glibc: Segmentation fault caused by passing out-of-range data to strftime() glibc: Integer overflow in hcreate and hcreate_r glibc: Unbounded stack allocation in catopen function | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | 8.1 | null |
RHSA-2020:4040 | Red Hat Security Advisory: libexif security, bug fix, and enhancement update | libexif: out of bounds write in exif-data.c libexif: out of bounds read due to a missing bounds check in exif_data_save_data_entry function in exif-data.c libexif: out of bounds read due to a missing bounds check in exif_entry_get_value function in exif-entry.c libexif: divide-by-zero in exif_entry_get_value function in exif-entry.c libexif: use of uninitialized memory in EXIF Makernote handling can lead to crashes and use-after-free libexif: unrestricted size in handling Canon EXIF MakerNote data can lead to consumption of large amounts of compute time | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 7.5 | null | null |
RHSA-2007:1063 | Red Hat Security Advisory: pcre security update | pcre integer overflow pcre regular expression flaws | [
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws"
] | null | null | null | null |
RHSA-2024:4414 | Red Hat Security Advisory: fence-agents security update | jinja2: accepts keys containing non-attribute characters | [
"cpe:/a:redhat:rhel_e4s:9.0::appstream",
"cpe:/a:redhat:rhel_e4s:9.0::highavailability",
"cpe:/a:redhat:rhel_e4s:9.0::resilientstorage"
] | null | 5.4 | null | null |
RHSA-2012:0325 | Red Hat Security Advisory: jbossweb security update | tomcat: Multiple weaknesses in HTTP DIGEST authentication tomcat: security manager restrictions bypass JBoss Web remote denial of service when surrogate pair character is placed at buffer boundary tomcat: hash table collisions CPU usage DoS (oCERT-2011-003) tomcat: Multiple weaknesses in HTTP DIGEST authentication tomcat: Multiple weaknesses in HTTP DIGEST authentication tomcat: Multiple weaknesses in HTTP DIGEST authentication tomcat: large number of parameters DoS | [
"cpe:/a:redhat:jboss_enterprise_brms_platform:5.1",
"cpe:/a:redhat:jboss_enterprise_portal_platform:5.2",
"cpe:/a:redhat:jboss_soa_platform:5.2"
] | null | null | null | null |
RHSA-2023:7851 | Red Hat Security Advisory: Satellite 6.14.1 Async Security Update | foreman: World readable file containing secrets actionpack: Possible XSS via User Supplied Values to redirect_to GitPython: Blind local file inclusion python-urllib3: Cookie request header isn't stripped during cross-origin redirects urllib3: Request body not stripped after redirect from 303 status changes request method to GET | [
"cpe:/a:redhat:satellite:6.14::el8",
"cpe:/a:redhat:satellite_capsule:6.14::el8",
"cpe:/a:redhat:satellite_utils:6.14::el8"
] | null | 4.2 | null | null |
RHSA-2024:5147 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.4.18 Security update | undertow: LearningPushHandler can lead to remote memory DoS attacks undertow: response write hangs in case of Java 17 TLSv1.3 NewSessionTicket httpd: CONTINUATION frames DoS netty-codec-http: Allocation of Resources Without Limits or Throttling org.bouncycastle: Importing an EC certificate with crafted F2m parameters may lead to Denial of Service bc-java: BouncyCastle vulnerable to a timing variant of Bleichenbacher (Marvin Attack) org.bouncycastle:bcprov-jdk18on: Infinite loop in ED25519 verification in the ScalarUtil class | [
"cpe:/a:redhat:jboss_enterprise_application_platform:7.4"
] | null | 7.5 | null | null |
RHSA-2011:1106 | Red Hat Security Advisory: kernel security, bug fix, and enhancement update | kernel: net: Fix memory leak/corruption on VLAN GRO_DROP | [
"cpe:/o:redhat:rhel_eus:6.0"
] | null | null | null | null |
RHSA-2025:2653 | Red Hat Security Advisory: grub2 security update | grub2: net: Out-of-bounds write in grub_net_search_config_file() | [
"cpe:/o:redhat:rhel_aus:8.6::baseos",
"cpe:/o:redhat:rhel_e4s:8.6::baseos",
"cpe:/o:redhat:rhel_tus:8.6::baseos"
] | null | 7.6 | null | null |
RHSA-2007:0747 | Red Hat Security Advisory: httpd security, bug fix, and enhancement update | httpd: out of bounds read | [
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2021:2760 | Red Hat Security Advisory: nettle security update | nettle: Out of bounds memory access in signature verification | [
"cpe:/o:redhat:rhel_aus:7.3::server"
] | null | 8.1 | null | null |
RHSA-2017:0062 | Red Hat Security Advisory: bind security update | bind: assertion failure while processing response to an ANY query bind: assertion failure while handling a query response containing inconsistent DNSSEC information bind: assertion failure while handling an unusually-formed DS record response | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 7.5 | null |
RHSA-2023:7055 | Red Hat Security Advisory: webkit2gtk3 security, bug fix, and enhancement update | webkitgtk: Memory corruption issue when processing web content webkitgtk: Visiting a website that frames malicious content may lead to UI spoofing. webkitgtk: A website may able to track visited websites in private browsing webkitgtk: Visiting a malicious website may lead to address bar spoofing webkitgtk: Visiting a malicious website may lead to address bar spoofing. webkitgtk: Same Origin Policy bypass via crafted web content webkitgtk: Website may be able to track sensitive user information webkitgtk: use after free vulnerability webkitgtk: content security policy blacklist failure webkitgtk: arbitrary code execution webkitgtk: disclose sensitive information webkitgtk: bypass Same Origin Policy webkitgtk: Processing web content may lead to arbitrary code execution webkitgtk: arbitrary code execution webkitgtk: arbitrary code execution webkitgtk: arbitrary code execution webkitgtk: track sensitive user information webkitgtk: arbitrary code execution webkitgtk: arbitrary code execution webkitgtk: arbitrary javascript code execution webkitgtk: attacker with JavaScript execution may be able to execute arbitrary code webkitgtk: Processing web content may lead to arbitrary code execution | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 8.8 | null | null |
RHSA-2024:2410 | Red Hat Security Advisory: harfbuzz security update | harfbuzz: allows attackers to trigger O(n^2) growth via consecutive marks | [
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/o:redhat:enterprise_linux:9::baseos"
] | null | 7.5 | null | null |
RHSA-2023:2078 | Red Hat Security Advisory: libwebp security update | Mozilla: libwebp: Double-free in libwebp | [
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 7.5 | null | null |
RHSA-2019:3217 | Red Hat Security Advisory: kernel-alt security and bug fix update | kernel: MIDI driver race condition leads to a double-free kernel: Use-after-free in __blk_drain_queue() function in block/blk-core.c kernel: brcmfmac heap buffer overflow in brcmf_wowl_nd_results hardware: bluetooth: BR/EDR encryption key negotiation attacks (KNOB) kernel: a NULL pointer dereference in drivers/scsi/megaraid/megaraid_sas_base.c leading to DoS | [
"cpe:/o:redhat:enterprise_linux:7::server"
] | null | null | 6.2 | null |
RHSA-2022:6834 | Red Hat Security Advisory: expat security update | expat: a use-after-free in the doContent function in xmlparse.c | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 8.1 | null | null |
RHSA-2023:5001 | Red Hat Security Advisory: OpenShift Container Platform 4.11.49 bug fix and security update | exporter-toolkit: authentication bypass via cache poisoning | [
"cpe:/a:redhat:openshift:4.11::el8"
] | null | 7.5 | null | null |
RHSA-2018:2255 | Red Hat Security Advisory: java-1.7.0-oracle security update | JDK: unspecified vulnerability fixed in 6u201, 7u191, 8u181, and 10.0.2 (Libraries) JDK: unspecified vulnerability fixed in 7u191, 8u181, and 10.0.2 (JavaFX) OpenJDK: insufficient index validation in PatternSyntaxException getMessage() (Concurrency, 8199547) JDK: unspecified vulnerability fixed in 6u201, 7u191, 8u181, and 10.0.2 (JSSE) | [
"cpe:/a:redhat:rhel_extras_oracle_java:6"
] | null | null | 5.9 | null |
RHSA-2025:3932 | Red Hat Security Advisory: Red Hat OpenShift Dev Spaces 3.20.0 release | tar-fs: link following and path traversal via maliciously crafted tar file golang.org/x/oauth2/jws: Unexpected memory consumption during token parsing in golang.org/x/oauth2/jws golang.org/x/crypto/ssh: Denial of Service in the Key Exchange of golang.org/x/crypto/ssh | [
"cpe:/a:redhat:openshift_devspaces:3::el9"
] | null | 7.5 | null | null |
RHSA-2019:1942 | Red Hat Security Advisory: perl security update | perl: Integer overflow leading to buffer overflow in Perl_my_setenv() | [
"cpe:/o:redhat:rhel_eus:7.4::computenode",
"cpe:/o:redhat:rhel_eus:7.4::server"
] | null | null | 8.1 | null |
RHSA-2025:3052 | Red Hat Security Advisory: Gatekeeper v3.18.0 | golang.org/x/crypto/ssh: Denial of Service in the Key Exchange of golang.org/x/crypto/ssh | [
"cpe:/a:redhat:gatekeeper:3.18::el9"
] | null | 7.5 | null | null |
RHSA-2016:0999 | Red Hat Security Advisory: qemu-kvm-rhev security update | qemu: incorrect banked access bounds checking in vga module | [
"cpe:/a:redhat:openstack:5::el7"
] | null | null | 7.6 | null |
RHSA-2009:0360 | Red Hat Security Advisory: kernel-rt security and bug fix update | kernel: local denial of service in keyctl_join_session_keyring kernel: ecryptfs readlink flaw kernel: dell_rbu local oops kernel: skfp_ioctl inverted logic flaw kernel: memory disclosure in SO_BSDCOMPAT gsopt | [
"cpe:/a:redhat:enterprise_mrg:1::el5"
] | null | null | null | null |
RHSA-2021:4123 | Red Hat Security Advisory: firefox security update | Mozilla: iframe sandbox rules did not apply to XSLT stylesheets Mozilla: Use-after-free in file picker dialog Mozilla: Firefox could be coaxed into going into fullscreen mode without notification or warning Mozilla: Opportunistic Encryption in HTTP2 could be used to bypass the Same-Origin-Policy on services hosted on other ports Mozilla: Permission Prompt could be overlaid, resulting in user confusion and potential spoofing Mozilla: Javascript alert box could have been spoofed onto an arbitrary domain Mozilla: Memory safety bugs fixed in Firefox 94 and Firefox ESR 91.3 Mozilla: Use-after-free in HTTP2 Session object | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 8.8 | 6.1 | null |
RHSA-2024:9472 | Red Hat Security Advisory: grafana-pcp security update | encoding/gob: golang: Calling Decoder.Decode on a message which contains deeply nested structures can cause a panic due to stack exhaustion | [
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 7.5 | null | null |
RHSA-2020:5162 | Red Hat Security Advisory: thunderbird security update | Mozilla: Write side effects in MCallGetProperty opcode not accounted for | [
"cpe:/a:redhat:rhel_eus:8.2::appstream"
] | null | null | 8.8 | null |
RHSA-2024:5930 | Red Hat Security Advisory: bind security update | bind: bind9: BIND's database will be slow if a very large number of RRs exist at the same nam bind9: bind: SIG(0) can be used to exhaust CPU resources | [
"cpe:/o:redhat:rhel_els:7"
] | null | 7.5 | null | null |
RHSA-2012:0345 | Red Hat Security Advisory: jbossweb security and bug fix update | tomcat: large number of parameters DoS | [
"cpe:/a:redhat:jboss_enterprise_portal_platform:4.3"
] | null | null | null | null |
RHSA-2022:6206 | Red Hat Security Advisory: systemd security update | systemd-resolved: use-after-free when dealing with DnsStream in resolved-dns-stream.c | [
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 9.8 | null | null |
RHSA-2012:0509 | Red Hat Security Advisory: wireshark security update | Wireshark: Null pointer dereference causing application crash when reading malformed pcap file Wireshark: Use-after-free causes heap-based buffer overflow in X.509if dissector wireshark: Infinite loop in the DICOM dissector (64bit): NULL pointer dereference by processing of a corrupted Diameter dictionary file wireshark: Stack-based buffer over-read from tvbuff buffer when reading snoop capture files wireshark: Double-free flaw by uncompressing of a zlib compressed packet wireshark: Heap-based buffer over-read in Visual Networks dissector wireshark: infinite loop DoS in lucent/ascend file parser wireshark: Infinite loop in the ANSI A Interface (IS-634/IOS) dissector wireshark: buffer overflow in the ERF file reader wireshark: multiple file parser vulnerabilities (wnpa-sec-2012-01) wireshark: NULL pointer vulnerabilities (wnpa-sec-2012-02) Wireshark: Dos via large buffer allocation request Wireshark: Dos due to integer overflow in IPTrace capture format parser wireshark: Heap-based buffer overflow when reading ERF packets from pcap/pcap-ng trace files | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2018:0560 | Red Hat Security Advisory: collectd security, bug fix, and enhancement update | collectd: double free in csnmp_read_table function in snmp.c | [
"cpe:/a:redhat:rhev_manager:4",
"cpe:/o:redhat:enterprise_linux:7::hypervisor"
] | null | null | 5.6 | null |
RHSA-2020:2478 | Red Hat Security Advisory: OpenShift Container Platform 3.11 jenkins-2-plugins security update | jenkins-git-client-plugin: OS command injection via 'git ls-remote' jenkins-script-security-plugin: sandbox protection bypass leads to execute arbitrary code in sandboxed scripts jenkins-pipeline-groovy-plugin: sandbox protection bypass through default parameter expressions in CPS-transformed methods jenkins-script-security-plugin: sandbox protection bypass during script compilation phase by applying AST transforming annotations jenkins-subversion-plugin: XSS in project repository base url jenkins-script-security-plugin: sandbox protection bypass via crafted constructor calls and crafted constructor bodies jenkins-script-security-plugin: sandbox protection bypass leads to arbitrary code execution jenkins-git-plugin: stored cross-site scripting | [
"cpe:/a:redhat:openshift:3.11::el7"
] | null | 5.4 | null | null |
RHSA-2020:3639 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.2.9 on RHEL 8 security update | hibernate: SQL injection issue in Hibernate ORM resteasy: Improper validation of response header in MediaTypeHeaderDelegate.java class EAP: field-name is not parsed in accordance to RFC7230 Wildfly: Improper authorization issue in WildFlySecurityManager when using alternative protection domain Mojarra: Path traversal via either the loc parameter or the con parameter, incomplete fix of CVE-2018-14371 jackson-databind: Lacks certain xbean-reflect/JNDI blocking jackson-databind: Serialization gadgets in shaded-hikari-config jackson-databind: Serialization gadgets in ibatis-sqlmap jackson-databind: Serialization gadgets in anteros-core jackson-databind: mishandles the interaction between serialization gadgets and typing which could result in remote command execution jackson-databind: mishandles the interaction between serialization gadgets and typing which could result in remote command execution dom4j: XML External Entity vulnerability in default SAX parser Undertow: Incomplete fix for CVE-2017-2666 due to permitting invalid characters in HTTP requests hibernate-validator: Improper input validation in the interpolation of constraint error messages wildfly-elytron: session fixation when using FORM authentication wildfly: exposed setting of TCCL via the EmbeddedManagedProcess API wildfly: unsafe deserialization in Wildfly Enterprise Java Beans wildfly: Some EJB transaction objects may get accumulated causing Denial of Service wildfly: EJB SessionOpenInvocations may not be removed properly after a response is received causing Denial of Service | [
"cpe:/a:redhat:jboss_enterprise_application_platform:7.2::el8"
] | null | 6.5 | 4.8 | null |
RHSA-2008:0895 | Red Hat Security Advisory: ruby security update | ruby: Memory allocation failure in Ruby regex engine (remotely exploitable DoS) ruby: multiple insufficient safe mode restrictions | [
"cpe:/o:redhat:enterprise_linux:2.1::as",
"cpe:/o:redhat:enterprise_linux:2.1::es",
"cpe:/o:redhat:enterprise_linux:2.1::ws"
] | null | null | null | null |
RHSA-2012:1125 | Red Hat Security Advisory: JBoss Enterprise SOA Platform 5.3.0 update | OpenSSO: unspecified vulnerability in the authentication component OpenSSO: unspecified vulnerability in the authentication component JNDI: unauthenticated remote write access is permitted by default jruby: hash table collisions DoS (oCERT-2011-003) RESTEasy: XML eXternal Entity (XXE) flaw OpenSSO: Unspecified vulnerability allows remote attackers to affect integrity via unknown vectors RESTEasy: XML eXternal Entity (XXE) flaw JBoss: authentication bypass when running under JACC with ignoreBaseDecision on JBossWebRealm JGroups diagnostics service enabled by default with no authentication when a JGroups channel is started | [
"cpe:/a:redhat:jboss_soa_platform:5.3"
] | null | null | null | null |
RHSA-2023:1368 | Red Hat Security Advisory: nss security and bug fix update | nss: Arbitrary memory write via PKCS 12 | [
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 8.8 | null | null |
RHSA-2024:11529 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.4 security update | hornetq-core-client: Arbitrarily overwrite files or access sensitive information | [
"cpe:/a:redhat:jboss_enterprise_application_platform:7.4::el7",
"cpe:/a:redhat:jboss_enterprise_application_platform:7.4::el8",
"cpe:/a:redhat:jboss_enterprise_application_platform:7.4::el9"
] | null | 7.1 | null | null |
RHSA-2020:1189 | Red Hat Security Advisory: libqb security update | libqb: Insecure treatment of IPC (temporary) files | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 6.5 | null |
RHSA-2019:2548 | Red Hat Security Advisory: OpenShift Container Platform 4.1 jenkins security update | jenkins: Arbitrary file write vulnerability using file parameter definitions (SECURITY-1424) jenkins: CSRF protection tokens did not expire (SECURITY-626) jenkins: Unauthorized view fragment access (SECURITY-534) | [
"cpe:/a:redhat:openshift:4.1::el7"
] | null | null | 4.3 | null |
RHSA-2024:3401 | Red Hat Security Advisory: rpm-ostree security update | rpm-ostree: world-readable /etc/shadow file | [
"cpe:/a:redhat:rhel_eus:9.2::appstream"
] | null | 6.2 | null | null |
RHSA-2024:10946 | Red Hat Security Advisory: kernel-rt security update | kernel: bpf: Add BPF_PROG_TYPE_CGROUP_SKB attach type enforcement in BPF_LINK_CREATE | [
"cpe:/a:redhat:rhel_eus:9.2::nfv",
"cpe:/a:redhat:rhel_eus:9.2::realtime"
] | null | 4.4 | null | null |
RHSA-2017:0177 | Red Hat Security Advisory: java-1.6.0-sun security update | OpenJDK: incorrect ECDSA signature extraction from the DER input (Libraries, 8168714) OpenJDK: DSA implementation timing attack (Libraries, 8168728) OpenJDK: incorrect URL parsing in URLStreamHandler (Networking, 8167223) OpenJDK: URLClassLoader insufficient access control checks (Networking, 8151934) OpenJDK: untrusted input deserialization in RMI registry and DCG (RMI, 8156802) OpenJDK: LdapLoginModule incorrect userDN extraction (JAAS, 8161743) OpenJDK: imageio PNGImageReader failed to honor ignoreMetadata for iTXt and zTXt chunks (2D, 8166988) JDK: unspecified vulnerability fixed in 6u141, 7u131, and 8u121 (Deployment) OpenJDK: integer overflow in SocketOutputStream boundary check (Networking, 8164147) OpenJDK: insufficient protected field access checks in atomic field updaters (Libraries, 8165344) | [
"cpe:/a:redhat:rhel_extras_oracle_java:5",
"cpe:/a:redhat:rhel_extras_oracle_java:6",
"cpe:/a:redhat:rhel_extras_oracle_java:7"
] | null | null | 8.8 | null |
RHSA-2016:0511 | Red Hat Security Advisory: java-1.7.0-openjdk security update | OpenJDK: missing type safety checks for MethodHandle calls across class loaders, incorrect CVE-2013-5838 fix (Hotspot, 8151666) | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHBA-2012:0496 | Red Hat Bug Fix Advisory: Red Hat Enterprise MRG Realtime 2.1 kernel bug fix update | kernel: excessive in kernel CPU consumption when creating large nested epoll structures | [
"cpe:/a:redhat:enterprise_mrg:2:server:el6"
] | null | null | null | null |
RHSA-2024:7869 | Red Hat Security Advisory: .NET 8.0 security update | dotnet: kestrel: closing an HTTP/3 stream can cause a race condition and lead to remote code execution dotnet: Multiple .NET components susceptible to hash flooding dotnet: System.IO.Packaging - Multiple DoS vectors in use of SortedList dotnet: Denial of Service in System.Text.Json | [
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::crb"
] | null | 7.5 | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.