id
stringlengths 13
15
| title
stringlengths 29
176
| description
stringlengths 8
32.1k
| cpes
sequencelengths 0
20
| cvss_v4_0
null | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
null |
---|---|---|---|---|---|---|---|
RHSA-2024:3427 | Red Hat Security Advisory: kpatch-patch security update | kernel: nf_tables: use-after-free vulnerability in the nft_verdict_init() function | [
"cpe:/o:redhat:rhel_eus:9.0::baseos"
] | null | 7.8 | null | null |
RHSA-2020:3940 | Red Hat Security Advisory: openwsman security update | openwsman: Infinite loop in process_connection() allows denial of service | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 7.5 | null |
RHSA-2023:6247 | Red Hat Security Advisory: .NET 7.0 security update | dotnet: Denial of Service with Client Certificates using .NET Kestrel | [
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb"
] | null | 6.5 | null | null |
RHSA-2020:5506 | Red Hat Security Advisory: kernel-rt security and bug fix update | kernel: information exposure in drivers/char/random.c and kernel/time/timer.c | [
"cpe:/a:redhat:enterprise_linux:8::nfv",
"cpe:/a:redhat:enterprise_linux:8::realtime"
] | null | 3.7 | null | null |
RHSA-2014:1985 | Red Hat Security Advisory: bind97 security update | bind: delegation handling denial of service | [
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2018:3059 | Red Hat Security Advisory: X.org X11 security, bug fix, and enhancement update | libxcursor: 1-byte heap-based overflow in _XcursorThemeInherits function in library.c | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 4.5 | null |
RHSA-2019:4254 | Red Hat Security Advisory: freetype security update | freetype: a heap-based buffer over-read in T1_Get_Private_Dict in type1/t1parse.c leading to crash freetype: mishandling ps_parser_skip_PS_token in an FT_New_Memory_Face operation in skip_comment, psaux/psobjs.c, leads to a buffer over-read | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | 4.3 | null |
RHSA-2023:3715 | Red Hat Security Advisory: libvirt security update | libvirt: Memory leak in virPCIVirtualFunctionList cleanup | [
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::crb"
] | null | 6.3 | null | null |
RHSA-2017:0182 | Red Hat Security Advisory: squid security update | squid: Information disclosure in HTTP request processing | [
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 5.3 | null |
RHSA-2020:1342 | Red Hat Security Advisory: telnet security update | telnet-server: no bounds checks in nextitem() function allows to remotely execute arbitrary code | [
"cpe:/a:redhat:rhel_e4s:8.0::appstream"
] | null | 9.8 | null | null |
RHSA-2024:7726 | Red Hat Security Advisory: Red Hat OpenShift Service Mesh Containers for 2.6.2 | curl: libcurl: ASN.1 date parser overread webpack: DOM Clobbering vulnerability in AutoPublicPathRuntimeModule express: Improper Input Handling in Express Redirects send: Code Execution Vulnerability in Send Library serve-static: Improper Sanitization in serve-static path-to-regexp: Backtracking regular expressions cause ReDoS body-parser: Denial of Service Vulnerability in body-parser envoy: Potential to manipulate `x-envoy` headers from external sources envoy: Malicious log injection via access logs envoy: Envoy crashes for `LocalReply` in HTTP async client | [
"cpe:/a:redhat:service_mesh:2.6::el8",
"cpe:/a:redhat:service_mesh:2.6::el9"
] | null | 7.5 | null | null |
RHSA-2022:7238 | Red Hat Security Advisory: Red Hat OpenStack Platform (puppet-mysql) security update | Puppetlabs-mysql: Command Injection in the puppetlabs-mysql module | [
"cpe:/a:redhat:openstack:13::el7",
"cpe:/a:redhat:openstack:16.1::el8",
"cpe:/a:redhat:openstack:16.2::el8",
"cpe:/a:redhat:openstack:17.0::el9"
] | null | 8.4 | null | null |
RHSA-2020:3464 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.3.2 security update | hibernate: SQL injection issue in Hibernate ORM EAP: field-name is not parsed in accordance to RFC7230 Wildfly: Improper authorization issue in WildFlySecurityManager when using alternative protection domain jackson-databind: mishandles the interaction between serialization gadgets and typing which could result in remote command execution jackson-databind: mishandles the interaction between serialization gadgets and typing which could result in remote command execution dom4j: XML External Entity vulnerability in default SAX parser Undertow: Incomplete fix for CVE-2017-2666 due to permitting invalid characters in HTTP requests hibernate-validator: Improper input validation in the interpolation of constraint error messages wildfly-elytron: session fixation when using FORM authentication wildfly: exposed setting of TCCL via the EmbeddedManagedProcess API wildfly: unsafe deserialization in Wildfly Enterprise Java Beans netty: compression/decompression codecs don't enforce limits on buffer allocation sizes wildfly: Some EJB transaction objects may get accumulated causing Denial of Service wildfly: EJB SessionOpenInvocations may not be removed properly after a response is received causing Denial of Service | [
"cpe:/a:redhat:jboss_enterprise_application_platform:7.3.0"
] | null | 6.5 | 4.8 | null |
RHSA-2006:0045 | Red Hat Security Advisory: squid security update | security flaw | [
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws"
] | null | null | null | null |
RHSA-2022:7087 | Red Hat Security Advisory: 389-ds-base security and bug fix update | 389-ds-base: SIGSEGV in sync_repl | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 6.5 | null | null |
RHSA-2025:0078 | Red Hat Security Advisory: python3.11-urllib3 security update | urllib3: Request body not stripped after redirect from 303 status changes request method to GET | [
"cpe:/a:redhat:rhel_eus:8.8::appstream"
] | null | 4.2 | null | null |
RHSA-2024:2517 | Red Hat Security Advisory: wpa_supplicant security update | wpa_supplicant: potential authorization bypass | [
"cpe:/o:redhat:enterprise_linux:9::baseos"
] | null | 6.5 | null | null |
RHSA-2022:8957 | Red Hat Security Advisory: Red Hat build of Quarkus Platform 2.7.6.SP3 and security update | quarkus_dev_ui: Dev UI Config Editor is vulnerable to drive-by localhost attacks leading to RCE quarkus-vertx-http: Security misconfiguration of CORS : OWASP A05_2021 level in Quarkus mina-sshd: Java unsafe deserialization vulnerability | [
"cpe:/a:redhat:quarkus:2.7"
] | null | 9.8 | null | null |
RHSA-2025:1188 | Red Hat Security Advisory: buildah security update | podman: buildah: Container breakout by using --jobs=2 and a race condition when building a malicious Containerfile | [
"cpe:/a:redhat:rhel_eus:9.4::appstream"
] | null | 8.6 | null | null |
RHSA-2024:5808 | Red Hat Security Advisory: OpenShift Container Platform 4.12.64 security update | golang: net/http: golang: mime/multipart: golang: net/textproto: memory exhaustion in Request.ParseMultipartForm go-retryablehttp: url might write sensitive information to log file golang: net/netip: Unexpected behavior from Is methods for IPv4-mapped IPv6 addresses | [
"cpe:/a:redhat:openshift:4.12::el8",
"cpe:/a:redhat:openshift:4.12::el9"
] | null | 6.7 | null | null |
RHSA-2022:2143 | Red Hat Security Advisory: container-tools:3.0 security update | psgo: Privilege escalation in 'podman top' | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 8 | null | null |
RHSA-2022:1021 | Red Hat Security Advisory: OpenShift Container Platform 4.9.26 security update | haproxy: Denial of service via set-cookie2 header workflow-cps: OS command execution through crafted SCM contents workflow-cps-global-lib: OS command execution through crafted SCM contents workflow-multibranch: OS command execution through crafted SCM contents workflow-cps: Pipeline-related plugins follow symbolic links or do not limit path names workflow-cps-global-lib: Pipeline-related plugins follow symbolic links or do not limit path names workflow-cps-global-lib: Pipeline-related plugins follow symbolic links or do not limit path names workflow-multibranch: Pipeline-related plugins follow symbolic links or do not limit path names workflow-cps: Password parameters are included from the original build in replayed builds workflow-cps-global-lib: Sandbox bypass vulnerability workflow-cps-global-lib: Sandbox bypass vulnerability workflow-cps-global-lib: Sandbox bypass vulnerability pipeline-build-step: Password parameter default values exposed | [
"cpe:/a:redhat:openshift:4.9::el7",
"cpe:/a:redhat:openshift:4.9::el8"
] | null | 6.5 | null | null |
RHSA-2015:0980 | Red Hat Security Advisory: pcs security and bug fix update | pcs: improper web session variable signing pcs: improper web session variable signing | [
"cpe:/o:redhat:enterprise_linux:7::server"
] | null | null | null | null |
RHSA-2020:2064 | Red Hat Security Advisory: chromium-browser security update | chromium-browser: Type Confusion in Blink usrsctp: Buffer overflow in AUTH chunk input validation | [
"cpe:/a:redhat:rhel_extras:6"
] | null | 9.8 | 8.8 | null |
RHSA-2016:0724 | Red Hat Security Advisory: qemu-kvm security update | qemu: incorrect banked access bounds checking in vga module | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 7.6 | null |
RHSA-2017:0817 | Red Hat Security Advisory: kernel security, bug fix, and enhancement update | kernel: race condition in the TLB flush logic kernel: double-free in usb-audio triggered by invalid USB descriptor kernel: scsi: aacraid: double fetch in ioctl_send_fib() kernel: Stack corruption while reading /proc/keys when gcc stack protector is enabled kernel: Setting a POSIX ACL via setxattr doesn't clear the setgid bit kernel: net: Out of bounds stack read in memcpy_fromiovec kernel: Use after free in SCSI generic device interface kernel: Use after free in SCSI generic device interface (CVE-2016-9576 regression) kernel - IPV6 fragmentation flaw kernel: S_ISGD is not cleared when setting posix ACLs in tmpfs (CVE-2016-7097 incomplete fix) | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | 4.4 | null |
RHSA-2015:1207 | Red Hat Security Advisory: firefox security update | Mozilla: Use-after-free in workers while using XMLHttpRequest (MFSA 2015-65) Mozilla: Miscellaneous memory safety hazards (rv:31.8 / rv:38.1) (MFSA 2015-59) Mozilla: Miscellaneous memory safety hazards (rv:31.8 / rv:38.1) (MFSA 2015-59) Mozilla: Local files or privileged URLs in pages can be opened into new tabs (MFSA 2015-60) Mozilla: Type confusion in Indexed Database Manager (MFSA 2015-61) Mozilla: Out-of-bound read while computing an oscillator rendering range in Web Audio (MFSA 2015-62) Mozilla: Use-after-free in Content Policy due to microtask execution error (MFSA 2015-63) Mozilla: Use-after-free in workers while using XMLHttpRequest (MFSA 2015-65) Mozilla: Vulnerabilities found through code inspection (MFSA 2015-66) Mozilla: Vulnerabilities found through code inspection (MFSA 2015-66) Mozilla: Vulnerabilities found through code inspection (MFSA 2015-66) Mozilla: Vulnerabilities found through code inspection (MFSA 2015-66) Mozilla: Vulnerabilities found through code inspection (MFSA 2015-66) Mozilla: Vulnerabilities found through code inspection (MFSA 2015-66) Mozilla: Vulnerabilities found through code inspection (MFSA 2015-66) Mozilla: Key pinning is ignored when overridable errors are encountered (MFSA 2015-67) Mozilla: Privilege escalation through internal workers (MFSA 2015-69) | [
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::server",
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation",
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | null | null |
RHSA-2018:2949 | Red Hat Security Advisory: rh-nodejs8-nodejs security update | nodejs: HTTP parser allowed for spaces inside Content-Length header values nodejs: Inspector DNS rebinding vulnerability nodejs: denial of service (DoS) by causing a node server providing an http2 server to crash nodejs: Denial of Service by calling Buffer.fill() or Buffer.alloc() with specially crafted parameters nodejs: Out of bounds (OOB) write via UCS-2 encoding | [
"cpe:/a:redhat:rhel_software_collections:3::el7"
] | null | null | 8.1 | null |
RHSA-2022:6385 | Red Hat Security Advisory: openvswitch2.15 security update | dpdk: DoS when a Vhost header crosses more than two descriptors and exhausts all mbufs | [
"cpe:/o:redhat:enterprise_linux:8::fastdatapath"
] | null | 8.6 | null | null |
RHSA-2011:1323 | Red Hat Security Advisory: qt security update | qt/harfbuzz buffer overflow qt buffer overflow in greyscale images | [
"cpe:/o:redhat:enterprise_linux:6::server"
] | null | null | null | null |
RHSA-2018:1243 | Red Hat Security Advisory: OpenShift Container Platform 3.1 security update | source-to-image: Improper path sanitization in ExtractTarStreamFromTarReader in tar/tar.go | [
"cpe:/a:redhat:openshift:3.1::el7"
] | null | null | 9.9 | null |
RHSA-2018:2840 | Red Hat Security Advisory: Red Hat JBoss Fuse/A-MQ 6.3 R9 security and bug fix update | Console: HTTPOnly and Secure attributes not set on cookies in Red Hat AMQ | [
"cpe:/a:redhat:jboss_amq:6.3",
"cpe:/a:redhat:jboss_fuse:6.3"
] | null | null | null | null |
RHSA-2023:3837 | Red Hat Security Advisory: systemd security and bug fix update | systemd: privilege escalation via the less pager | [
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 7.1 | null | null |
RHSA-2004:349 | Red Hat Security Advisory: httpd security update | security flaw | [
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws"
] | null | null | null | null |
RHSA-2009:1648 | Red Hat Security Advisory: ntp security update | ntpd: DoS with mode 7 packets (VU#568372) | [
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws",
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2024:5083 | Red Hat Security Advisory: Red Hat OpenStack Platform 17.1.3 security update | openstack-nova: Regression VMDK/qcow arbitrary file access | [
"cpe:/a:redhat:openstack:17.1::el9"
] | null | 5.5 | null | null |
RHSA-2015:0158 | Red Hat Security Advisory: Red Hat Enterprise Virtualization Manager 3.5.0 | CXF: SSL hostname verification bypass, incomplete CVE-2012-5783 fix ovirt-engine: cross-site request forgery (CSRF) ovirt-engine-webadmin: HttpOnly flag is not included when the session ID is set CXF: SSL hostname verification bypass, incomplete CVE-2012-6153 fix | [
"cpe:/a:redhat:rhev_manager:3"
] | null | null | 4.8 | null |
RHSA-2024:5147 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.4.18 Security update | undertow: LearningPushHandler can lead to remote memory DoS attacks undertow: response write hangs in case of Java 17 TLSv1.3 NewSessionTicket httpd: CONTINUATION frames DoS netty-codec-http: Allocation of Resources Without Limits or Throttling org.bouncycastle: Importing an EC certificate with crafted F2m parameters may lead to Denial of Service bc-java: BouncyCastle vulnerable to a timing variant of Bleichenbacher (Marvin Attack) org.bouncycastle:bcprov-jdk18on: Infinite loop in ED25519 verification in the ScalarUtil class | [
"cpe:/a:redhat:jboss_enterprise_application_platform:7.4"
] | null | 7.5 | null | null |
RHSA-2008:0002 | Red Hat Security Advisory: tog-pegasus security update | tog-pegasus pam authentication buffer overflow | [
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws",
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server",
"cpe:/o:redhat:rhel_eus:4.5::as",
"cpe:/o:redhat:rhel_eus:4.5::es"
] | null | null | null | null |
RHSA-2024:4636 | Red Hat Security Advisory: libndp security update | libndp: buffer overflow in route information length field | [
"cpe:/o:redhat:enterprise_linux:9::baseos"
] | null | 8.1 | null | null |
RHSA-2012:1327 | Red Hat Security Advisory: freeradius2 security update | freeradius: stack-based buffer overflow via long expiration date fields in client X509 certificates | [
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2024:0758 | Red Hat Security Advisory: container-tools:2.0 security update | runc: file descriptor leak | [
"cpe:/a:redhat:rhel_aus:8.2::appstream",
"cpe:/a:redhat:rhel_e4s:8.2::appstream",
"cpe:/a:redhat:rhel_tus:8.2::appstream"
] | null | 8.6 | null | null |
RHSA-2023:0285 | Red Hat Security Advisory: firefox security update | Mozilla: libusrsctp library out of date Mozilla: Fullscreen notification bypass Mozilla: Arbitrary file read from GTK drag and drop on Linux Mozilla: Malicious command could be hidden in devtools output Mozilla: URL being dragged from cross-origin iframe into same tab triggers navigation Mozilla: Content Security Policy wasn't being correctly applied to WebSockets in WebWorkers Mozilla: Calls to <code>console.log</code> allowed bypasing Content Security Policy via format directive Mozilla: Memory safety bugs fixed in Firefox 109 and Firefox ESR 102.7 | [
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 8.8 | null | null |
RHSA-2006:0667 | Red Hat Security Advisory: gzip security update | security flaw multiple vulnerabilities in lha multiple vulnerabilities in lha multiple vulnerabilities in lha security flaw | [
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws",
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2023:6805 | Red Hat Security Advisory: squid security update | squid: Denial of Service in HTTP Digest Authentication | [
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 8.6 | null | null |
RHSA-2023:5245 | Red Hat Security Advisory: linux-firmware security update | hw: amd: Cross-Process Information Leak | [
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 6.5 | null | null |
RHSA-2023:5009 | Red Hat Security Advisory: OpenShift Container Platform 4.14.0 security update | golang: net/http: handle server errors after sending GOAWAY kube-apiserver: Bypassing policies imposed by the ImagePolicyWebhook admission plugin kube-apiserver: Bypassing enforce mountable secrets policy imposed by the ServiceAccount admission plugin openshift: OCP & FIPS mode ovn: service monitor MAC flow is not rate limited golang.org/x/net/html: Cross site scripting golang: crypto/tls: slow verification of certificate chains containing large RSA keys scipy: use-after-free in Py_FindObjects() function goproxy: Denial of service (DoS) via unspecified vectors. golang: html/template: improper handling of HTML-like comments within script contexts golang: html/template: improper handling of special tags within script contexts golang: crypto/tls: panic when processing post-handshake message on QUIC connections golang: crypto/tls: lack of a limit on buffered post-handshake golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487) HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack) | [
"cpe:/a:redhat:openshift:4.14::el8",
"cpe:/a:redhat:openshift:4.14::el9",
"cpe:/a:redhat:openshift_ironic:4.14::el9"
] | null | 7.5 | null | null |
RHSA-2018:2424 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.1.4 on RHEL7 security update | cxf: Improper size validation in message attachment header for JAX-WS and JAX-RS services apache-cxf: TLS hostname verification does not work correctly with com.sun.net.ssl.* guava: Unbounded memory allocation in AtomicDoubleArray and CompoundOrdering classes allow remote attackers to cause a denial of service wildfly-core: Path traversal can allow the extraction of .war archives to write arbitrary files (Zip Slip) bouncycastle: flaw in the low-level interface to RSA key pair generator | [
"cpe:/a:redhat:jboss_enterprise_application_platform:7.1::el7"
] | null | null | 4.8 | null |
RHBA-2020:0062 | Red Hat Bug Fix Advisory: OpenShift Container Platform 4.3 image release advisory | golang.org/x/crypto: Keystream loop in amd64 assembly when overflowing 32-bit counter golang: HTTP/1.1 headers with a space before the colon leads to filter bypass or request smuggling | [
"cpe:/a:redhat:openshift:4.3::el7",
"cpe:/a:redhat:openshift:4.3::el8"
] | null | 5.9 | 6.5 | null |
RHSA-2018:2470 | Red Hat Security Advisory: Red Hat JBoss Web Server 3.1.0 Service Pack 4 security and bug fix update | tomcat: Insecure defaults in CORS filter enable 'supportsCredentials' for all origins tomcat-native: Mishandled OCSP invalid response tomcat-native: Mishandled OCSP responses can allow clients to authenticate with revoked certificates | [
"cpe:/a:redhat:jboss_enterprise_web_server:3.1"
] | null | null | 7.1 | null |
RHSA-2022:4769 | Red Hat Security Advisory: thunderbird security update | Mozilla: Untrusted input used in JavaScript object indexing, leading to prototype pollution Mozilla: Prototype pollution in Top-Level Await implementation | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | null | 8.8 | null |
RHSA-2024:3955 | Red Hat Security Advisory: firefox security update | Mozilla: Use-after-free in JavaScript object transplant Mozilla: External protocol handlers leaked by timing attack Mozilla: Sandboxed iframes were able to bypass sandbox restrictions to open a new window Mozilla: Cross-Origin Image leak via Offscreen Canvas Mozilla: Memory Corruption in Text Fragments Mozilla: Memory safety bugs fixed in Firefox 127, Firefox ESR 115.12, and Thunderbird 115.12 Mozilla: Use-after-free in networking | [
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 7.5 | null | null |
RHSA-2011:0427 | Red Hat Security Advisory: spice-xpi security update | spice-xpi: unitialized pointer writes possible when getting plugin properties | [
"cpe:/a:redhat:rhel_productivity:5"
] | null | null | null | null |
RHSA-2023:7790 | Red Hat Security Advisory: postgresql:10 security update | postgresql: Buffer overrun from integer overflow in array modification | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 8.8 | null | null |
RHSA-2013:0208 | Red Hat Security Advisory: openstack-nova security and bug fix update | Nova: Information leak in libvirt LVM-backed instances openstack-nova: Boot from volume allows access to random volumes | [
"cpe:/a:redhat:openstack:2::el6"
] | null | null | null | null |
RHSA-2024:0572 | Red Hat Security Advisory: oniguruma security update | oniguruma: Use-after-free in onig_new_deluxe() in regext.c oniguruma: Stack exhaustion in regcomp.c because of recursion in regparse.c oniguruma: integer overflow in search_in_range function in regexec.c leads to out-of-bounds read oniguruma: Heap-based buffer over-read in function gb18030_mbc_enc_len in file gb18030.c oniguruma: Heap-based buffer over-read in function fetch_interval_quantifier in regparse.c | [
"cpe:/a:redhat:rhel_eus:8.8::appstream",
"cpe:/a:redhat:rhel_eus:8.8::crb"
] | null | 7.5 | 6.5 | null |
RHSA-2023:7334 | Red Hat Security Advisory: rh-varnish6-varnish security update | HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack) | [
"cpe:/a:redhat:rhel_software_collections:3::el7"
] | null | 7.5 | null | null |
RHSA-2005:375 | Red Hat Security Advisory: openoffice.org security update | security flaw | [
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws",
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2018:1605 | Red Hat Security Advisory: collectd security update | collectd: double free in csnmp_read_table function in snmp.c | [
"cpe:/a:redhat:openstack-optools:10::el7"
] | null | null | 5.6 | null |
RHSA-2022:7077 | Red Hat Security Advisory: Red Hat Certificate System 9.7 CVE bug fix update | pki-core: When using the caServerKeygen_DirUserCert profile, user can get certificates for other UIDs by entering name in Subject field | [
"cpe:/a:redhat:certificate_system:9.7::el7"
] | null | 7.6 | null | null |
RHSA-2018:0299 | Red Hat Security Advisory: collectd security update | collectd: double free in csnmp_read_table function in snmp.c | [
"cpe:/a:redhat:openstack-optools:11::el7"
] | null | null | 5.6 | null |
RHSA-2020:2757 | Red Hat Security Advisory: microcode_ctl security, bug fix and enhancement update | hw: Special Register Buffer Data Sampling (SRBDS) hw: Vector Register Data Sampling hw: L1D Cache Eviction Sampling | [
"cpe:/o:redhat:rhel_e4s:8.0::baseos"
] | null | 6.5 | 6.5 | null |
RHSA-2013:0514 | Red Hat Security Advisory: php security, bug fix and enhancement update | PHP: sapi_header_op() %0D sequence handling security bypass php: PG(magic_quote_gpc) was not restored on shutdown php: Integer Signedness issues in _php_stream_scandir | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2023:7579 | Red Hat Security Advisory: postgresql:13 security update | postgresql: Memory disclosure in aggregate function calls postgresql: Buffer overrun from integer overflow in array modification postgresql: Role pg_signal_backend can signal certain superuser processes. postgresql: extension script @substitutions@ within quoting allow SQL injection | [
"cpe:/a:redhat:rhel_eus:8.8::appstream"
] | null | 7.5 | null | null |
RHSA-2024:6009 | Red Hat Security Advisory: OpenShift Container Platform 4.13.49 bug fix and security update | golang: net/http, x/net/http2: unlimited number of CONTINUATION frames causes DoS coredns: CD bit response is cached and served later bind: bind9: BIND's database will be slow if a very large number of RRs exist at the same nam bind9: bind: SIG(0) can be used to exhaust CPU resources bind: bind9: Assertion failure when serving both stale cache data and authoritative zone content go-retryablehttp: url might write sensitive information to log file | [
"cpe:/a:redhat:openshift:4.13::el8",
"cpe:/a:redhat:openshift:4.13::el9"
] | null | 6 | null | null |
RHSA-2013:0855 | Red Hat Security Advisory: java-1.5.0-ibm security update | SSL/TLS: CBC padding timing attack (lucky-13) OpenJDK: sun.awt.datatransfer.ClassLoaderObjectInputStream class may incorrectly invoke the system class loader (CanSecWest 2013, AWT, 8009305) JDK: unspecified sanbox bypass (CanSecWest 2013, 2D) OpenJDK: remote code loading enabled by default (RMI, 8001040) OpenJDK: LogStream.setDefaultStream() missing security restrictions (RMI, 8001329) ICU: Layout Engine font layout and glyph table errors (JDK 2D, 8004994) ICU: Layout Engine font layout and glyph table errors (JDK 2D, 8004986) ICU: Layout Engine font layout and glyph table errors (JDK 2D, 8004987) JDK: unspecified vulnerability fixed in 7u21 and 6u45 (2D) OpenJDK: Network InetAddress serialization information disclosure (Networking, 8000724) ICU: Layout Engine font processing errors (JDK 2D, 8001031) OpenJDK: image processing vulnerability (2D, 8007617) OpenJDK: MBeanInstantiator insufficient class access checks (JMX, 8006435) OpenJDK: JPEGImageWriter state corruption (ImageIO, 8007918) OpenJDK: JPEGImageReader state corruption (ImageIO, 8007667) JDK: unspecified vulnerability fixed in 7u21 and 6u45 (2D) | [
"cpe:/a:redhat:rhel_extras:5::server",
"cpe:/a:redhat:rhel_extras:6"
] | null | null | null | null |
RHSA-2017:0564 | Red Hat Security Advisory: libguestfs security and bug fix update | ocaml: sizes arguments are sign-extended from 32 to 64 bits | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2022:8669 | Red Hat Security Advisory: krb5 security update | krb5: integer overflow vulnerabilities in PAC parsing | [
"cpe:/a:redhat:rhel_eus:9.0::appstream",
"cpe:/o:redhat:rhel_eus:9.0::baseos"
] | null | 8.8 | null | null |
RHSA-2020:2113 | Red Hat Security Advisory: Red Hat Single Sign-On 7.3.8 security update | mojarra: Path traversal in ResourceManager.java:getLocalePrefix() via the loc parameter infinispan: invokeAccessibly method from ReflectionUtil class allows to invoke private methods Mojarra: Path traversal via either the loc parameter or the con parameter, incomplete fix of CVE-2018-14371 | [
"cpe:/a:redhat:jboss_single_sign_on:7.3"
] | null | 6.5 | 7.5 | null |
RHSA-2022:0034 | Red Hat Security Advisory: security update of rh-sso-7/sso75 container images for IBM P/Z | Keycloak: Incorrect authorization allows unpriviledged users to create other users | [
"cpe:/a:redhat:rhosemc:1.0::el8"
] | null | 8.3 | null | null |
RHSA-2021:4725 | Red Hat Security Advisory: OpenShift Virtualization 2.6.8 Images security and bug fix update | golang: net: incorrect parsing of extraneous zero characters at the beginning of an IP address octet golang: crypto/tls: certificate of wrong type is causing TLS client to panic | [
"cpe:/a:redhat:container_native_virtualization:2.6::el8"
] | null | 6.5 | null | null |
RHSA-2009:0334 | Red Hat Security Advisory: flash-plugin security update | flash-plugin: Input validation flaw (DoS) flash-plugin: Buffer overflow (arbitrary code execution) via crafted SWF file. | [
"cpe:/a:redhat:rhel_extras:3",
"cpe:/a:redhat:rhel_extras:4"
] | null | null | null | null |
RHSA-2014:0038 | Red Hat Security Advisory: Red Hat Enterprise Virtualization Manager 3.3.0 update | rhev: remote-viewer spice tls-stripping issue | [
"cpe:/a:redhat:rhev_manager:3"
] | null | null | null | null |
RHSA-2024:10848 | Red Hat Security Advisory: firefox security update | firefox: thunderbird: Select list elements could be shown over another site firefox: thunderbird: CSP Bypass and XSS Exposure via Web Compatibility Shims firefox: thunderbird: URL Bar Spoofing via Manipulated Punycode and Whitespace Characters firefox: thunderbird: Unhandled Exception in Add-on Signature Verification firefox: thunderbird: Improper Keypress Handling in Executable File Confirmation Dialog firefox: thunderbird: Memory safety bugs fixed in Firefox 133, Thunderbird 133, Firefox ESR 128.5, and Thunderbird 128.5 | [
"cpe:/a:redhat:rhel_eus:8.8::appstream"
] | null | 8.8 | null | null |
RHSA-2022:1709 | Red Hat Security Advisory: Red Hat Single Sign-On 7.5.2 security update | keycloak: Privilege escalation vulnerability on Token Exchange | [
"cpe:/a:redhat:red_hat_single_sign_on:7"
] | null | 8 | null | null |
RHSA-2012:0528 | Red Hat Security Advisory: Red Hat Enterprise MRG Messaging 2.1 security and enhancement update | qpid-cpp: cluster authentication ignores cluster-* settings | [
"cpe:/a:redhat:enterprise_mrg:2:computenode:el6",
"cpe:/a:redhat:enterprise_mrg:2:server:el6"
] | null | null | null | null |
RHSA-2017:1484 | Red Hat Security Advisory: kernel security update | kernel: heap/stack gap jumping via unbounded stack allocations kernel: Incorrectly mapped contents of PIE executable | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 2.9 | null |
RHSA-2021:3675 | Red Hat Security Advisory: shim and fwupd security update | grub2: acpi command allows privileged user to load crafted ACPI tables when Secure Boot is enabled grub2: Use-after-free in rmmod command grub2: Out-of-bounds write in grub_usb_device_initialize() grub2: Stack buffer overflow in grub_parser_split_cmdline() grub2: cutmem command allows privileged user to remove memory regions when Secure Boot is enabled grub2: Heap out-of-bounds write in short form option parser grub2: Heap out-of-bounds write due to miscalculation of space required for quoting | [
"cpe:/a:redhat:rhel_eus:8.1::crb",
"cpe:/o:redhat:rhel_eus:8.1::baseos"
] | null | 7.5 | null | null |
RHSA-2025:0576 | Red Hat Security Advisory: Red Hat Advanced Cluster Management 2.9.6 bug fixes and container updates | golang.org/x/crypto/ssh: Misuse of ServerConfig.PublicKeyCallback may cause authorization bypass in golang.org/x/crypto golang.org/x/net/html: Non-linear parsing of case-insensitive content in golang.org/x/net/html | [
"cpe:/a:redhat:acm:2.9::el8"
] | null | 7.5 | null | null |
RHSA-2020:5565 | Red Hat Security Advisory: firefox security update | chromium-browser: Uninitialized Use in V8 Mozilla: Heap buffer overflow in WebGL Mozilla: CSS Sanitizer performed incorrect sanitization Mozilla: Incorrect cast of StyleGenericFlexBasis resulted in a heap use-after-free Mozilla: Internal network hosts could have been probed by a malicious webpage Mozilla: The proxy.onRequest API did not catch view-source URLs Mozilla: Memory safety bugs fixed in Firefox 84 and Firefox ESR 78.6 | [
"cpe:/a:redhat:rhel_e4s:8.0::appstream"
] | null | 8.8 | 6.1 | null |
RHSA-2024:3254 | Red Hat Security Advisory: container-tools:rhel8 security update | golang: net/http/httputil: ReverseProxy should not forward unparseable query parameters golang: regexp/syntax: limit memory used by parsing regexps buildah: full container escape at build time golang-protobuf: encoding/protojson, internal/encoding/json: infinite loop in protojson.Unmarshal when unmarshaling certain forms of invalid JSON jose-go: improper handling of highly compressed data | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 4.3 | null | null |
RHSA-2006:0117 | Red Hat Security Advisory: vixie-cron security update | security flaw | [
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws"
] | null | null | null | null |
RHSA-2020:4287 | Red Hat Security Advisory: kernel security and bug fix update | kernel: net: bluetooth: type confusion while processing AMP packets kernel: net: bluetooth: information leak when processing certain AMP packets kernel: metadata validator in XFS may cause an inode with a valid, user-creatable extended attribute to be flagged as corrupt kernel: memory corruption in net/packet/af_packet.c leads to elevation of privilege | [
"cpe:/a:redhat:rhel_eus:8.1::crb",
"cpe:/o:redhat:rhel_eus:8.1::baseos"
] | null | 7.8 | null | null |
RHSA-2006:0734 | Red Hat Security Advisory: seamonkey security update | security flaw security flaw security flaw security flaw seamonkey < 1.0.6 multiple vulnerabilities | [
"cpe:/o:redhat:enterprise_linux:2.1::as",
"cpe:/o:redhat:enterprise_linux:2.1::aw",
"cpe:/o:redhat:enterprise_linux:2.1::es",
"cpe:/o:redhat:enterprise_linux:2.1::ws",
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws",
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2018:2180 | Red Hat Security Advisory: gnupg2 security update | gnupg2: Improper sanitization of filenames allows for the display of fake status messages and the bypass of signature verification | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | 7.5 | null |
RHSA-2023:4492 | Red Hat Security Advisory: thunderbird security update | thunderbird: File Extension Spoofing using the Text Direction Override Character Mozilla: Offscreen Canvas could have bypassed cross-origin restrictions Mozilla: Incorrect value used during WASM compilation Mozilla: Potential permissions request bypass via clickjacking Mozilla: Crash in DOMParser due to out-of-memory conditions Mozilla: Fix potential race conditions when releasing platform objects Mozilla: Stack buffer overflow in StorageManager Mozilla: Cookie jar overflow caused unexpected cookie jar state Mozilla: Memory safety bugs fixed in Firefox 116, Firefox ESR 115.1, Firefox ESR 102.14, Thunderbird 115.1, and Thunderbird 102.14 Mozilla: Memory safety bugs fixed in Firefox ESR 115.1, and Thunderbird 115.1 | [
"cpe:/a:redhat:rhel_e4s:8.1::appstream"
] | null | 9.8 | null | null |
RHSA-2023:5147 | Red Hat Security Advisory: Red Hat Integration Camel for Spring Boot 3.18.3.2 release and security update | jackson-databind: Possible DoS if using JDK serialization to serialize JsonNode spring-boot: Security Bypass With Wildcard Pattern Matching on Cloud Foundry bouncycastle: potential blind LDAP injection attack using a self-signed certificate snappy-java: Unchecked chunk length leads to DoS | [
"cpe:/a:redhat:camel_spring_boot:3.18"
] | null | 5.9 | null | null |
RHSA-2005:603 | Red Hat Security Advisory: dhcpcd security update | security flaw | [
"cpe:/o:redhat:enterprise_linux:2.1::as",
"cpe:/o:redhat:enterprise_linux:2.1::aw",
"cpe:/o:redhat:enterprise_linux:2.1::es",
"cpe:/o:redhat:enterprise_linux:2.1::ws"
] | null | null | null | null |
RHSA-2019:1483 | Red Hat Security Advisory: kernel security, bug fix, and enhancement update | kernel: race condition in snd_seq_write() may lead to UAF or OOB-access kernel: Race condition in sound system can lead to denial of service Kernel: tcp: integer overflow while processing SACK blocks allows remote denial of service Kernel: tcp: excessive resource consumption while processing SACK blocks allows remote denial of service kernel: tcp: excessive resource consumption for TCP connections with low MSS allows remote denial of service | [
"cpe:/o:redhat:rhel_eus:7.4::computenode",
"cpe:/o:redhat:rhel_eus:7.4::server"
] | null | null | 5.3 | null |
RHSA-2019:1742 | Red Hat Security Advisory: openstack-tripleo-common security and bug fix update | openstack-tripleo-common: Allows running new amphorae based on arbitrary images | [
"cpe:/a:redhat:openstack:13::el7"
] | null | null | 5.5 | null |
RHSA-2015:2152 | Red Hat Security Advisory: kernel security, bug fix, and enhancement update | kernel: kvm: reporting emulation failures to userspace kernel: crypto api unprivileged arbitrary module load via request_module() kernel: kvm: noncanonical rip after emulation kernel: kvm: reporting emulation failures to userspace kernel: memcg: OOM handling DoS kernel: partial ASLR bypass through TLS base addresses leak kernel: crypto api unprivileged arbitrary module load via request_module() kernel: kvm: insufficient sysenter emulation when invoked from 16-bit code Kernel: vfs: Do not allow escaping from bind mounts kernel: zero page memory arbitrary modification kernel: race condition between chown() and execve() kernel: pty layer race condition on tty ldisc shutdown. kernel: Creating multiple sockets when SCTP module isn't loaded leads to kernel panic kernel: perf on ppc64 can loop forever getting userlevel stacktraces kernel: nfnetlink race in NETLINK_NFLOG socket creation kernel: Unauthorized access to IPC objects with SysV shm kernel: securelevel disabled after kexec kernel: MTU value is not validated in IPv6 stack causing packet loss kernel: pipe buffer state corruption after unsuccessful atomic read from pipe | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | null | null |
RHSA-2016:0347 | Red Hat Security Advisory: postgresql security update | postgresql: case insensitive range handling integer overflow leading to buffer overflow | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2022:8841 | Red Hat Security Advisory: Red Hat JBoss Core Services Apache HTTP Server 2.4.51 SP1 security update | openssl: c_rehash script allows command injection openssl: the c_rehash script allows command injection httpd: core: Possible buffer overflow with very large or unlimited LimitXMLRequestBody httpd: mod_sed: Read/write beyond bounds httpd: mod_proxy_ajp: Possible request smuggling curl: CERTINFO never-ending busy-loop httpd: mod_isapi: out-of-bounds read httpd: Out-of-bounds read via ap_rwrite() httpd: Out-of-bounds read in ap_strcmp_match() libxml2: integer overflows in xmlBuf and xmlBuffer lead to out-of-bounds write httpd: mod_sed: DoS vulnerability httpd: mod_proxy: X-Forwarded-For dropped by hop-by-hop mechanism curl: HTTP compression denial of service curl: Unpreserved file permissions curl: FTP-KRB bad message verification curl: POST following PUT confusion curl: Incorrect handling of control code characters in cookies zlib: heap-based buffer over-read and overflow in inflate() in inflate.c via a large gzip header extra field libxml2: integer overflows with XML_PARSE_HUGE libxml2: dict corruption caused by entity reference cycles expat: a use-after-free in the doContent function in xmlparse.c curl: HTTP proxy double-free curl: HSTS bypass via IDN | [
"cpe:/a:redhat:jboss_core_services:1"
] | null | 7.5 | null | null |
RHSA-2024:1375 | Red Hat Security Advisory: squid:4 security update | squid: denial of service in HTTP request parsing squid: Denial of Service in HTTP Chunked Decoding squid: denial of service in HTTP header parser | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 8.6 | null | null |
RHSA-2023:7046 | Red Hat Security Advisory: dnsmasq security and bug fix update | dnsmasq: default maximum EDNS.0 UDP packet size was set to 4096 but should be 1232 | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 7.5 | null | null |
RHSA-2023:3934 | Red Hat Security Advisory: python3 security update | python: urllib.parse url blocklisting bypass | [
"cpe:/a:redhat:rhel_aus:8.4::appstream",
"cpe:/a:redhat:rhel_e4s:8.4::appstream",
"cpe:/a:redhat:rhel_tus:8.4::appstream",
"cpe:/o:redhat:rhel_aus:8.4::baseos",
"cpe:/o:redhat:rhel_e4s:8.4::baseos",
"cpe:/o:redhat:rhel_tus:8.4::baseos"
] | null | 7.5 | null | null |
RHSA-2003:311 | Red Hat Security Advisory: : Updated Pan packages fix denial of service vulnerability | security flaw | [
"cpe:/o:redhat:linux:7.1",
"cpe:/o:redhat:linux:7.2",
"cpe:/o:redhat:linux:7.3",
"cpe:/o:redhat:linux:8.0",
"cpe:/o:redhat:linux:9"
] | null | null | null | null |
RHSA-2018:0268 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 6.4.19 security update | artemis/hornetq: memory exhaustion via UDP and JGroups discovery tomcat: Remote Code Execution bypass for CVE-2017-12615 jboss-remoting: High CPU Denial of Service | [
"cpe:/a:redhat:jboss_enterprise_application_platform:6::el7"
] | null | null | 4.3 | null |
RHSA-2008:0528 | Red Hat Security Advisory: ucd-snmp security update | net-snmp SNMPv3 authentication bypass (VU#877044) | [
"cpe:/o:redhat:enterprise_linux:2.1::as",
"cpe:/o:redhat:enterprise_linux:2.1::aw",
"cpe:/o:redhat:enterprise_linux:2.1::es",
"cpe:/o:redhat:enterprise_linux:2.1::ws"
] | null | null | null | null |
RHSA-2013:0531 | Red Hat Security Advisory: java-1.6.0-sun security update | SSL/TLS: CBC padding timing attack (lucky-13) OpenJDK: MBeanServer insufficient privilege restrictions (JMX, 8006446) JDK: unspecified vulnerability fixed in 6u41 and 7u15 (Deployment) | [
"cpe:/a:redhat:rhel_extras:5::server",
"cpe:/a:redhat:rhel_extras:6"
] | null | null | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.