id
stringlengths
13
15
title
stringlengths
29
176
description
stringlengths
8
32.1k
cpes
sequencelengths
0
20
cvss_v4_0
null
cvss_v3_1
float64
0
10
cvss_v3_0
float64
0
10
cvss_v2_0
null
RHSA-2024:9601
Red Hat Security Advisory: tigervnc security update
xorg-x11-server: tigervnc: heap-based buffer overflow privilege escalation vulnerability
[ "cpe:/a:redhat:rhel_e4s:9.0::appstream" ]
null
7.8
null
null
RHSA-2013:1193
Red Hat Security Advisory: jbossweb security update
Tomcat/JBossWeb: Arbitrary file upload via deserialization
[ "cpe:/a:redhat:jboss_enterprise_application_platform:6::el5", "cpe:/a:redhat:jboss_enterprise_application_platform:6::el6" ]
null
null
null
null
RHSA-2019:1150
Red Hat Security Advisory: rh-ruby24-ruby security, bug fix, and enhancement update
rubygems: Delete directory using symlink when decompressing tar rubygems: Escape sequence injection vulnerability in verbose rubygems: Escape sequence injection vulnerability in gem owner rubygems: Escape sequence injection vulnerability in API response handling rubygems: Installing a malicious gem may lead to arbitrary code execution rubygems: Escape sequence injection vulnerability in errors
[ "cpe:/a:redhat:rhel_software_collections:3::el6", "cpe:/a:redhat:rhel_software_collections:3::el7" ]
null
null
5.3
null
RHSA-2025:3560
Red Hat Security Advisory: RHODF-4.14-RHEL-9 security update
golang.org/x/crypto/ssh: Misuse of ServerConfig.PublicKeyCallback may cause authorization bypass in golang.org/x/crypto golang.org/x/net/html: Non-linear parsing of case-insensitive content in golang.org/x/net/html
[ "cpe:/a:redhat:openshift_data_foundation:4.14::el9" ]
null
7.5
null
null
RHSA-2022:0537
Red Hat Security Advisory: thunderbird security update
Mozilla: Extensions could have bypassed permission confirmation during update Mozilla: Drag and dropping an image could have resulted in the dropped object being an executable Mozilla: Sandboxed iframes could have executed script if the parent appended elements Mozilla: Cross-Origin responses could be distinguished between script and non-script content-types Mozilla: frame-ancestors Content Security Policy directive was not enforced for framed extension pages Mozilla: Script Execution during invalid object state Mozilla: Memory safety bugs fixed in Firefox 97 and Firefox ESR 91.6
[ "cpe:/a:redhat:rhel_eus:8.2::appstream" ]
null
8.8
null
null
RHSA-2012:1605
Red Hat Security Advisory: Fuse MQ Enterprise 7.1.0 update
jetty: hash table collisions CPU usage DoS (oCERT-2011-003)
[ "cpe:/a:redhat:fuse_mq_enterprise:7.1.0" ]
null
null
null
null
RHSA-2016:2659
Red Hat Security Advisory: java-1.6.0-ibm security update
OpenJDK: missing algorithm restrictions for jar verification (Libraries, 8155973) OpenJDK: insufficient classloader consistency checks in ClassLoaderWithRepository (JMX, 8157739) JDK: unspecified vulnerability fixed in 6u131, 7u121, and 8u111 (2D) OpenJDK: insufficient checks of JDWP packets (Hotspot, 8159519) OpenJDK: exposure of server authentication credentials to proxy (Networking, 8160838)
[ "cpe:/a:redhat:rhel_extras:5::client", "cpe:/a:redhat:rhel_extras:5::server", "cpe:/a:redhat:rhel_extras:6" ]
null
null
5.3
null
RHSA-2020:3102
Red Hat Security Advisory: openstack-keystone security update
openstack-keystone: EC2 and credential endpoints are not protected from a scoped context openstack-keystone: OAuth1 request token authorize silently ignores roles parameter openstack-keystone: Credentials endpoint policy logic allows changing credential owner and target project ID openstack-keystone: failure to check signature TTL of the EC2 credential auth method
[ "cpe:/a:redhat:openstack:15::el8" ]
null
5.4
null
null
RHSA-2016:0014
Red Hat Security Advisory: libldb security update
libldb: Remote DoS in Samba (AD) LDAP server libldb: remote memory read in the Samba LDAP server
[ "cpe:/a:redhat:storage:3.1:samba:el7", "cpe:/a:redhat:storage:3.1:server:el6" ]
null
null
null
null
RHSA-2024:4271
Red Hat Security Advisory: Red Hat AMQ Broker 7.12.1 release and security update
JSON-java: parser confusion leads to OOM org.bouncycastle: Importing an EC certificate with crafted F2m parameters may lead to Denial of Service bc-java: BouncyCastle vulnerable to a timing variant of Bleichenbacher (Marvin Attack) org.bouncycastle:bcprov-jdk18on: Infinite loop in ED25519 verification in the ScalarUtil class org.bouncycastle: Use of Incorrectly-Resolved Name or Reference
[ "cpe:/a:redhat:amq_broker:7.12" ]
null
5.3
null
null
RHSA-2023:0832
Red Hat Security Advisory: kernel security and bug fix update
kernel: an out-of-bounds vulnerability in i2c-ismt driver kernel: mm/mremap.c use-after-free vulnerability kernel: nfsd buffer overflow by RPC message over TCP with garbage data
[ "cpe:/a:redhat:enterprise_linux:8::crb", "cpe:/o:redhat:enterprise_linux:8::baseos" ]
null
7.5
null
null
RHSA-2020:3041
Red Hat Security Advisory: kernel security and bug fix update
kernel: kernel: DAX hugepages not considered during mremap kernel: Rogue cross-process SSBD shutdown. Linux scheduler logical bug allows an attacker to turn off the SSBD protection. kernel: Indirect Branch Prediction Barrier is force-disabled when STIBP is unavailable or enhanced IBRS is available. kernel: Indirect branch speculation can be enabled after it was force-disabled by the PR_SPEC_FORCE_DISABLE prctl command. kernel: buffer overflow in mwifiex_cmd_append_vsie_tlv function in drivers/net/wireless/marvell/mwifiex/scan.c kernel: heap-based buffer overflow in mwifiex_ret_wmm_get_status function in drivers/net/wireless/marvell/mwifiex/wmm.c Kernel: vfio: access to disabled MMIO space of some devices may lead to DoS scenario
[ "cpe:/o:redhat:rhel_e4s:8.0::baseos" ]
null
5.3
null
null
RHSA-2022:5477
Red Hat Security Advisory: firefox security update
Mozilla: Undesired attributes could be set as part of prototype pollution Mozilla: CSP bypass enabling stylesheet injection Mozilla: CSP sandbox header without `allow-scripts` can be bypassed via retargeted javascript: URI Mozilla: Use-after-free in nsSHistory Mozilla: Unavailable PAC file resulted in OCSP requests being blocked Mozilla: A popup window could be resized in a way to overlay the address bar with web content Mozilla: Potential integer overflow in ReplaceElementsAt Mozilla: Memory safety bugs fixed in Firefox 102 and Firefox ESR 91.11
[ "cpe:/a:redhat:rhel_e4s:8.1::appstream" ]
null
8.8
7.5
null
RHSA-2020:4647
Red Hat Security Advisory: freerdp and vinagre security, bug fix, and enhancement update
freerdp: Out of bound read in cliprdr_server_receive_capabilities freerdp: Out of bound read in update_recv could result in a crash freerdp: Integer overflow in VIDEO channel freerdp: Out of bound read/write in usb redirection channel freerdp: Out of bound access in clear_decompress_subcode_rlex freerdp: Unchecked read of array offset in rdpsnd_recv_wave2_pdu freerdp: out-of-bounds read in update_read_icon_info function freerdp: out of bound read in rfx_process_message_tileset freerdp: double free in update_read_cache_bitmap_v3_order function freerdp: out of bounds read in update_read_bitmap_data function freerdp: out of bounds seek in update_read_synchronize function could lead out of bounds read freerdp: out-of-bounds read in autodetect_recv_bandwidth_measure_results function freerdp: out-of-bounds read could result in aborting the session freerdp: out-of-bound read of client memory that is then passed on to the protocol parser freerdp: stream out-of-bounds seek in rdp_read_font_capability_set could lead to out-of-bounds read freerdp: out-of-bounds read in cliprdr_read_format_list function freerdp: out-of-bounds read in ntlm_read_ntlm_v2_client_challenge function freerdp: out-of-bounds read in ntlm_read_AuthenticateMessage freerdp: out-of-bounds read in ntlm_read_NegotiateMessage freerdp: out-of-bounds read in irp functions freerdp: out-of-bounds read in gdi.c freerdp: out-of-bounds read in bitmap.c freerdp: Stream pointer out of bounds in update_recv_secondary_order could lead out of bounds read later freerdp: Out-of-bounds read in ntlm_read_ChallengeMessage in winpr/libwinpr/sspi/NTLM/ntlm_message.c. freerdp: Out-of-bounds read in security_fips_decrypt in libfreerdp/core/security.c
[ "cpe:/a:redhat:enterprise_linux:8::appstream", "cpe:/a:redhat:enterprise_linux:8::crb" ]
null
6.1
null
null
RHBA-2021:1167
Red Hat Bug Fix Advisory: Openshift Logging Bug Fix Release (5.0.2)
golang: crypto/elliptic: incorrect operations on the P-224 curve
[ "cpe:/a:redhat:logging:5.0::el8" ]
null
6.5
null
null
RHSA-2019:4352
Red Hat Security Advisory: Red Hat JBoss Fuse/A-MQ 6.3 R14 security and bug fix update
zookeeper: Information disclosure in Apache ZooKeeper HTTP/2: flood using PING frames results in unbounded memory growth HTTP/2: flood using HEADERS frames results in unbounded memory growth HTTP/2: flood using SETTINGS frames results in unbounded memory growth HTTP/2: flood using empty frames results in excessive resource consumption xstream: remote code execution due to insecure XML deserialization (regression of CVE-2013-7285) jackson-databind: failure to block the logback-core class from polymorphic deserialization leading to remote code execution
[ "cpe:/a:redhat:jboss_amq:6.3" ]
null
null
8.1
null
RHSA-2024:1722
Red Hat Security Advisory: edk2 security update
edk2: Buffer overflow when processing DNS Servers option in a DHCPv6 Advertise message
[ "cpe:/a:redhat:rhel_aus:8.2::appstream", "cpe:/a:redhat:rhel_e4s:8.2::appstream", "cpe:/a:redhat:rhel_tus:8.2::appstream" ]
null
8.8
null
null
RHSA-2019:2591
Red Hat Security Advisory: ghostscript security update
ghostscript: Safer mode bypass by .forceput exposure in .pdf_hook_DSC_Creator (701445) ghostscript: Safer mode bypass by .forceput exposure in setuserparams (701444) ghostscript: Safer mode bypass by .forceput exposure in setsystemparams (701443) ghostscript: Safer mode bypass by .forceput exposure in .pdfexectoken and other procedures (701450)
[ "cpe:/a:redhat:enterprise_linux:8::appstream", "cpe:/a:redhat:enterprise_linux:8::crb" ]
null
null
7.3
null
RHSA-2009:0020
Red Hat Security Advisory: bind security update
bind: DSA_do_verify() returns check issue
[ "cpe:/o:redhat:enterprise_linux:2.1::as", "cpe:/o:redhat:enterprise_linux:2.1::aw", "cpe:/o:redhat:enterprise_linux:2.1::es", "cpe:/o:redhat:enterprise_linux:2.1::ws", "cpe:/o:redhat:enterprise_linux:3::as", "cpe:/o:redhat:enterprise_linux:3::desktop", "cpe:/o:redhat:enterprise_linux:3::es", "cpe:/o:redhat:enterprise_linux:3::ws", "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws", "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::client_workstation", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
RHSA-2024:3513
Red Hat Security Advisory: less security update
less: OS command injection
[ "cpe:/o:redhat:enterprise_linux:9::baseos" ]
null
8.6
null
null
RHSA-2022:0404
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.4.3 security update
undertow: client side invocation timeout raised when calling over HTTP2 7: Incomplete fix of CVE-2016-4978 in HornetQ library
[ "cpe:/a:redhat:jboss_enterprise_application_platform:7.4" ]
null
6.6
null
null
RHSA-2020:1636
Red Hat Security Advisory: libsndfile security update
libsndfile: stack-based buffer overflow in sndfile-deinterleave utility libsndfile: buffer over-read in the function i2alaw_array in alaw.c
[ "cpe:/a:redhat:enterprise_linux:8::appstream", "cpe:/a:redhat:enterprise_linux:8::crb" ]
null
null
3.3
null
RHSA-2013:0943
Red Hat Security Advisory: Red Hat JBoss SOA Platform 5.3.1 update
apache-cxf: XML encryption backwards compatibility attacks
[ "cpe:/a:redhat:jboss_enterprise_soa_platform:5.3" ]
null
null
null
null
RHSA-2008:0158
Red Hat Security Advisory: JBoss Enterprise Application Platform security update
OpenOffice.org-base allows Denial-of-Service and command injection Absolute path traversal Apache Tomcat WEBDAV JFreeChart: XSS vulnerabilities in the image map feature EJBQL injection via 'order' parameter Tomcat information disclosure vulnerability
[ "cpe:/a:redhat:rhel_application_stack:1", "cpe:/a:redhat:rhel_application_stack:2" ]
null
null
null
null
RHSA-2009:1615
Red Hat Security Advisory: xerces-j2 security update
JDK: XML parsing Denial-Of-Service (6845701)
[ "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::client_workstation", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
RHSA-2018:3537
Red Hat Security Advisory: OpenShift Container Platform 3.11 security update
kibana: Cross-site scripting via the source field formatter nodejs: Out of bounds (OOB) write via UCS-2 encoding kubernetes: authentication/authorization bypass in the handling of non-101 responses
[ "cpe:/a:redhat:openshift:3.11::el7" ]
null
null
8.8
null
RHSA-2012:1019
Red Hat Security Advisory: java-1.7.0-oracle security update
JDK: unspecified vulnerability fixed in 6u33 and 7u5 (Deployment) OpenJDK: improper protection of CORBA data models (CORBA, 7079902) OpenJDK: fontmanager layout lookup code memory corruption (2D, 7143617) OpenJDK: SynthLookAndFeel application context bypass (Swing, 7143614) OpenJDK: insecure temporary file permissions (JRE, 7143606) OpenJDK: CRL and certificate extensions handling improvements (Security, 7143872) OpenJDK: mutable repository identifiers in generated stub code (CORBA, 7143851) JDK: unspecified vulnerability fixed in 6u33 and 7u5 (Deployment) JDK: unspecified vulnerability fixed in 6u33 and 7u5 (Deployment) OpenJDK: insufficient field accessibility checks (HotSpot, 7152811) OpenJDK: XML parsing infinite loop (JAXP, 7157609) OpenJDK: insufficient invokespecial <init> verification (HotSpot, 7160757) OpenJDK: java.lang.invoke.MethodHandles.Lookup does not honor access modes (Libraries, 7165628)
[ "cpe:/a:redhat:rhel_extras:6" ]
null
null
null
null
RHSA-2024:2953
Red Hat Security Advisory: pcs security update
rubygem-rack: Denial of Service Vulnerability in Rack Content-Type Parsing rubygem-rack: Possible DoS Vulnerability with Range Header in Rack rubygem-rack: Possible Denial of Service Vulnerability in Rack Header Parsing
[ "cpe:/a:redhat:enterprise_linux:8::highavailability", "cpe:/a:redhat:enterprise_linux:8::resilientstorage" ]
null
5.3
null
null
RHSA-2020:5004
Red Hat Security Advisory: resource-agents security and bug fix update
python-httplib2: CRLF injection via an attacker controlled unescaped part of uri for httplib2.Http.request function
[ "cpe:/a:redhat:rhel_extras_sap:7", "cpe:/a:redhat:rhel_extras_sap_hana:7", "cpe:/o:redhat:enterprise_linux:7::server" ]
null
6.8
null
null
RHSA-2018:2892
Red Hat Security Advisory: glusterfs security, bug fix, and enhancement update
glusterfs: Improper deserialization in dict.c:dict_unserialize() can allow attackers to read arbitrary memory
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
6.5
null
RHSA-2024:8928
Red Hat Security Advisory: mod_jk security update
mod_jk: information Disclosure / DoS
[ "cpe:/a:redhat:rhel_e4s:9.0::appstream" ]
null
5.9
null
null
RHSA-2024:2068
Red Hat Security Advisory: OpenShift Container Platform 4.15.11 bug fix and security update
golang: net/http, x/net/http2: unlimited number of CONTINUATION frames causes DoS ironic-image: Unauthenticated local access to Ironic API
[ "cpe:/a:redhat:openshift:4.15::el8", "cpe:/a:redhat:openshift:4.15::el9" ]
null
4.7
null
null
RHSA-2020:4331
Red Hat Security Advisory: kpatch-patch security update
kernel: metadata validator in XFS may cause an inode with a valid, user-creatable extended attribute to be flagged as corrupt kernel: memory corruption in net/packet/af_packet.c leads to elevation of privilege
[ "cpe:/o:redhat:enterprise_linux:8::baseos" ]
null
7.8
null
null
RHSA-2009:1563
Red Hat Security Advisory: tomcat security update
Improve cookie parsing for tomcat5 tomcat request dispatcher information disclosure vulnerability tomcat6 Denial-Of-Service with AJP connection tomcat6 Information disclosure in authentication classes tomcat XML parser information disclosure
[ "cpe:/a:redhat:rhel_developer_suite:3" ]
null
null
null
null
RHSA-2008:0860
Red Hat Security Advisory: ipa security update
IPA Kerberos master password disclosure
[ "cpe:/a:redhat:enterprise_ipa:1.0" ]
null
null
null
null
RHSA-2022:8889
Red Hat Security Advisory: Openshift Logging 5.3.14 bug fix release and security update
jackson-databind: denial of service via a large depth of nested objects jackson-databind: deep wrapper array nesting wrt UNWRAP_SINGLE_VALUE_ARRAYS jackson-databind: use of deeply nested arrays
[ "cpe:/a:redhat:logging:5.3::el8" ]
null
7.5
null
null
RHSA-2019:1632
Red Hat Security Advisory: Red Hat OpenShift Container Platform 3.10 atomic-openshift security update
kubernetes: Incomplete fix for CVE-2019-1002101 allows for arbitrary file write via `kubectl cp`
[ "cpe:/a:redhat:openshift:3.10::el7" ]
null
null
5.3
null
RHSA-2023:0336
Red Hat Security Advisory: systemd security update
systemd: buffer overrun in format_timespan() function
[ "cpe:/a:redhat:enterprise_linux:9::appstream", "cpe:/o:redhat:enterprise_linux:9::baseos" ]
null
5.5
null
null
RHSA-2013:0748
Red Hat Security Advisory: krb5 security update
krb5: NULL pointer dereference (DoS, KDC crash) by processing certain TGS requests
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
null
null
RHSA-2019:1107
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.2.1 on RHEL 6 security update
jackson-databind: Potential information exfiltration with default typing, serialization gadget from MyBatis jackson-databind: improper polymorphic deserialization of types from Jodd-db library jackson-databind: improper polymorphic deserialization of types from Oracle JDBC driver undertow: Infoleak in some circumstances where Undertow can serve data from a random buffer jackson-databind: exfiltration/XXE in some JDK classes jackson-databind: server-side request forgery (SSRF) in axis2-jaxws class wildfly: Race condition on PID file allows for termination of arbitrary processes by local users wildfly: wrong SecurityIdentity for EE concurrency threads that are reused
[ "cpe:/a:redhat:jboss_enterprise_application_platform:7.2::el6" ]
null
null
5.4
null
RHSA-2007:0701
Red Hat Security Advisory: xterm security update
(mesg: error: tty device is not owned by group `tty')
[ "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws" ]
null
null
null
null
RHSA-2023:1393
Red Hat Security Advisory: OpenShift Container Platform 4.10.55 security update
goutils: RandomAlphaNumeric and CryptoRandomAlphaNumeric are not as random as they should be
[ "cpe:/a:redhat:openshift:4.10::el8" ]
null
7
null
null
RHSA-2023:0665
Red Hat Security Advisory: tigervnc security update
xorg-x11-server: DeepCopyPointerClasses use-after-free leads to privilege elevation
[ "cpe:/a:redhat:rhel_e4s:8.1::appstream" ]
null
7.8
null
null
RHSA-2019:2998
Red Hat Security Advisory: Red Hat OpenShift Application Runtimes Thorntail 2.5.0 security & bug fix update
keycloak: session hijack using the user access token undertow: leak credentials to log files UndertowLogger.REQUEST_LOGGER.undertowRequestFailed undertow: Information leak in requests for directories without trailing slashes undertow: DEBUG log for io.undertow.request.security if enabled leaks credentials to log files jackson-databind: polymorphic typing issue allows attacker to read arbitrary local files on the server. jackson-databind: failure to block the logback-core class from polymorphic deserialization leading to remote code execution jackson-databind: default typing mishandling leading to remote code execution
[ "cpe:/a:redhat:openshift_application_runtimes:1.0" ]
null
null
9.8
null
RHSA-2024:6723
Red Hat Security Advisory: thunderbird security update
mozilla: Type Confusion in Async Generators in Javascript Engine mozilla: Type confusion when looking up a property name in a &quot;with&quot; block mozilla: Internal event interfaces were exposed to web content when browser EventHandler listener callbacks ran mozilla: Garbage collection could mis-color cross-compartment objects in OOM conditions mozilla: WASM type confusion involving ArrayTypes mozilla: SelectElements could be shown over another site if popups are allowed mozilla: Memory safety bugs fixed in Firefox 130, Firefox ESR 128.2, and Thunderbird 128.2 thunderbird: Crash when aborting verification of OTR chat
[ "cpe:/a:redhat:rhel_aus:8.2::appstream" ]
null
6.5
null
null
RHSA-2014:1335
Red Hat Security Advisory: python-django-horizon security and bug fix update
openstack-horizon: persistent XSS in Horizon Host Aggregates interface
[ "cpe:/a:redhat:openstack:5::el7" ]
null
null
null
null
RHSA-2017:3046
Red Hat Security Advisory: java-1.7.0-oracle security update
zlib: Out-of-bounds pointer arithmetic in inftrees.c zlib: Out-of-bounds pointer arithmetic in inffast.c zlib: Undefined left shift of negative number zlib: Big-endian out-of-bounds pointer lcms2: Out-of-bounds read in Type_MLU_Read() OpenJDK: CardImpl incorrect state handling (Smart Card IO, 8169026) OpenJDK: multiple unbounded memory allocations in deserialization (Serialization, 8174109) OpenJDK: incorrect privilege use when handling unreferenced objects (RMI, 8174966) JDK: unspecified vulnerability fixed in 6u171, 7u161, 8u151, and 9.0.1 (Javadoc) OpenJDK: HTTP client insufficient check for newline in URLs (Networking, 8176751) OpenJDK: unbounded resource use in JceKeyStore deserialization (Serialization, 8181370) OpenJDK: insufficient loader constraints checks for invokespecial (Hotspot, 8180711) OpenJDK: unbounded memory allocation in SimpleTimeZone deserialization (Serialization, 8181323) OpenJDK: multiple unbounded memory allocations in deserialization (Libraries, 8181432) OpenJDK: unbounded memory allocation in PredicatedNodeTest deserialization (JAXP, 8181327) OpenJDK: unbounded memory allocation in JAXWSExceptionBase deserialization (JAX-WS, 8181100) OpenJDK: no default network operations timeouts in FtpClient (Networking, 8181612) OpenJDK: weak protection of key stores against brute forcing (Security, 8181692) OpenJDK: unbounded memory allocation in ObjectInputStream deserialization (Serialization, 8181597) OpenJDK: use of unprotected sname in Kerberos client (Libraries, 8178794)
[ "cpe:/a:redhat:rhel_extras_oracle_java:6", "cpe:/a:redhat:rhel_extras_oracle_java:7" ]
null
null
6.8
null
RHSA-2004:634
Red Hat Security Advisory: zip security update
security flaw
[ "cpe:/o:redhat:enterprise_linux:3::as", "cpe:/o:redhat:enterprise_linux:3::desktop", "cpe:/o:redhat:enterprise_linux:3::es", "cpe:/o:redhat:enterprise_linux:3::ws" ]
null
null
null
null
RHSA-2018:0616
Red Hat Security Advisory: sensu security update
sensu: Password exposure in warn level log when configured for multiple rabbitMQ connections
[ "cpe:/a:redhat:openstack-optools:12::el7" ]
null
null
5.5
null
RHSA-2024:4561
Red Hat Security Advisory: OpenJDK 8u422 Windows Security Update
OpenJDK: potential UTF8 size overflow (8314794) OpenJDK: Excessive symbol length can lead to infinite loop (8319859) OpenJDK: Range Check Elimination (RCE) pre-loop limit overflow (8320548) OpenJDK: Pack200 increase loading time due to improper header validation (8322106) OpenJDK: Out-of-bounds access in 2D image handling (8324559) OpenJDK: RangeCheckElimination array index overflow (8323231)
[ "cpe:/a:redhat:openjdk:1.8::windows" ]
null
7.4
null
null
RHSA-2020:2683
Red Hat Security Advisory: dpdk security, bug fix, and enhancement update
dpdk: librte_vhost Integer overflow in vhost_user_set_log_base() dpdk: librte_vhost Integer truncation in vhost_user_check_and_alloc_queue_pair()
[ "cpe:/a:redhat:rhel_extras_other:7" ]
null
6.7
null
null
RHSA-2024:5520
Red Hat Security Advisory: kpatch-patch-4_18_0-477_43_1 security update
kernel: TIPC message reassembly use-after-free remote code execution vulnerability kernel: net: kernel: UAF in network route management
[ "cpe:/o:redhat:rhel_eus:8.8::baseos" ]
null
7.8
null
null
RHBA-2022:1352
Red Hat Bug Fix Advisory: .NET Core 3.1 on RHEL 7 bugfix update
urijs: Authorization Bypass Through User-Controlled Key
[ "cpe:/a:redhat:rhel_dotnet:3.1::el7" ]
null
6.5
null
null
RHSA-2007:0097
Red Hat Security Advisory: firefox security update
security flaw NSS: SSLv2 protocol buffer overflows NSS: SSLv2 protocol buffer overflows security flaw security flaw security flaw security flaw security flaw security flaw : seamonkey cookie setting / same-domain bypass vulnerability security flaw security flaw security flaw
[ "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::client_workstation", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
RHSA-2013:1369
Red Hat Security Advisory: jboss-remoting security update
Remoting: DoS by file descriptor exhaustion
[ "cpe:/a:redhat:jboss_enterprise_application_platform:5::el4", "cpe:/a:redhat:jboss_enterprise_application_platform:5::el5", "cpe:/a:redhat:jboss_enterprise_application_platform:5::el6" ]
null
null
null
null
RHSA-2013:1652
Red Hat Security Advisory: coreutils security, bug fix, and enhancement update
coreutils: segfault in "sort -d" and "sort -M" with long line input coreutils: segfault in uniq with long line input coreutils: segfault in "join -i" with long line input
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
null
null
RHSA-2020:3496
Red Hat Security Advisory: Red Hat Single Sign-On 7.4.2 security update on RHEL 7
keycloak: security headers missing on REST endpoints keycloak: DoS by sending multiple simultaneous requests with a Content-Length header value greater than actual byte count of request body
[ "cpe:/a:redhat:red_hat_single_sign_on:7::el7" ]
null
7.5
null
null
RHSA-2023:5337
Red Hat Security Advisory: Red Hat Integration Camel K 1.10.2 release security update
quarkus: HTTP security policy bypass
[ "cpe:/a:redhat:camel_k:1" ]
null
8.1
null
null
RHSA-2022:1478
Red Hat Security Advisory: Satellite 6.9.9 Async Bug Fix Update
puppet: unsafe HTTP redirect
[ "cpe:/a:redhat:satellite:6.9::el7", "cpe:/a:redhat:satellite_capsule:6.9::el7" ]
null
9.8
null
null
RHSA-2023:0191
Red Hat Security Advisory: java-17-openjdk security and bug fix update
OpenJDK: handshake DoS attack against DTLS connections (JSSE, 8287411) OpenJDK: soundbank URL remote loading (Sound, 8293742)
[ "cpe:/a:redhat:rhel_eus:8.4::appstream", "cpe:/a:redhat:rhel_eus:8.4::crb" ]
null
3.7
null
null
RHSA-2020:2404
Red Hat Security Advisory: bind security update
bind: BIND does not sufficiently limit the number of fetches performed when processing referrals bind: A logic error in code which checks TSIG validity can be used to trigger an assertion failure in tsig.c
[ "cpe:/a:redhat:rhel_e4s:8.0::appstream", "cpe:/o:redhat:rhel_e4s:8.0::baseos" ]
null
7.5
null
null
RHSA-2014:1318
Red Hat Security Advisory: Red Hat Enterprise MRG Realtime 2.5 security and enhancement update
Kernel: HID: OOB write in magicmouse driver Kernel: HID: logitech-dj OOB array access Kernel: HID: off by one error in various _report_fixup routines Kernel: USB serial: memory corruption flaw Kernel: mm/shmem: denial of service kernel: isofs: unbound recursion when processing relocated directories kernel: isofs: unbound recursion when processing relocated directories kernel: udf: Avoid infinite loop when processing indirect ICBs
[ "cpe:/a:redhat:enterprise_mrg:2:server:el6" ]
null
null
null
null
RHSA-2006:0731
Red Hat Security Advisory: php security update
PHP buffer overflow
[ "cpe:/a:redhat:rhel_application_stack:1" ]
null
null
null
null
RHSA-2004:504
Red Hat Security Advisory: Updated Itanium kernel packages resolve security issues
security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw
[ "cpe:/o:redhat:enterprise_linux:2.1::as", "cpe:/o:redhat:enterprise_linux:2.1::aw" ]
null
null
null
null
RHSA-2021:5015
Red Hat Security Advisory: firefox security update
Mozilla: Memory safety bugs fixed in Firefox 95 and Firefox ESR 91.4 Mozilla: URL leakage when navigating while executing asynchronous function Mozilla: Heap buffer overflow when using structured clone Mozilla: Missing fullscreen and pointer lock notification when requesting both Mozilla: GC rooting failure when calling wasm instance methods Mozilla: External protocol handler parameters were unescaped Mozilla: XMLHttpRequest error codes could have leaked the existence of an external protocol handler Mozilla: Bypass of CSP sandbox directive when embedding Mozilla: Denial of Service when using the Location API in a loop Mozilla: Cursor spoofing could overlay user interface when native cursor is zoomed
[ "cpe:/a:redhat:rhel_eus:8.4::appstream" ]
null
5.4
6.1
null
RHSA-2023:1329
Red Hat Security Advisory: OpenShift Container Platform 4.13.0 bug fix and security update
golang: net/http: excessive memory growth in a Go server accepting HTTP/2 requests golang: crypto/tls: large handshake records may cause panics
[ "cpe:/a:redhat:openshift:4.13::el9" ]
null
7.5
null
null
RHSA-2018:1352
Red Hat Security Advisory: kernel security update
Kernel: error in exception handling leads to DoS
[ "cpe:/o:redhat:rhel_aus:5.9" ]
null
null
6.5
null
RHSA-2021:2122
Red Hat Security Advisory: OpenShift Container Platform 4.7.13 packages and security update
golang: data race in certain net/http servers including ReverseProxy can lead to DoS golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs jenkins-2-plugins/config-file-provider: Does not configure its XML parser to prevent XML external entity (XXE) attacks. jenkins-2-plugins/config-file-provider: Does not correctly perform permission checks in several HTTP endpoints. jenkins-2-plugins/config-file-provider: does not require POST requests for an HTTP endpoint, resulting in a cross-site request forgery (CSRF) vulnerability. jenkins-2-plugins/config-file-provider: Does not perform permission checks in several HTTP endpoints.
[ "cpe:/a:redhat:openshift:4.7::el7", "cpe:/a:redhat:openshift:4.7::el8" ]
null
4.3
null
null
RHSA-2021:0024
Red Hat Security Advisory: ImageMagick security update
ImageMagick: Shell injection via PDF password could result in arbitrary code execution
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
7.3
null
null
RHSA-2014:1648
Red Hat Security Advisory: flash-plugin security update
flash-plugin: multiple code execution flaws (APSB14-22) flash-plugin: multiple code execution flaws (APSB14-22) flash-plugin: multiple code execution flaws (APSB14-22)
[ "cpe:/a:redhat:rhel_extras:5::client", "cpe:/a:redhat:rhel_extras:5::server", "cpe:/a:redhat:rhel_extras:6" ]
null
null
null
null
RHSA-2017:2524
Red Hat Security Advisory: ansible security, bug fix, and enhancement update
ansible: Security issue with lookup return not tainting the jinja2 environment
[ "cpe:/a:redhat:rhev_manager:4" ]
null
null
5.3
null
RHSA-2021:0459
Red Hat Security Advisory: qemu-kvm-rhev security update
QEMU: slirp: use-after-free in ip_reass() function in ip_input.c QEMU: reachable assertion failure in net_tx_pkt_add_raw_fragment() in hw/net/net_tx_pkt.c
[ "cpe:/a:redhat:rhev_manager:4.3", "cpe:/o:redhat:enterprise_linux:7::hypervisor" ]
null
3.8
null
null
RHSA-2022:8790
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.4.8 Security update
Undertow: DoS can be achieved as Undertow server waits for the LAST_CHUNK forever for EJB invocations
[ "cpe:/a:redhat:jboss_enterprise_application_platform:7.4::el7" ]
null
4.2
null
null
RHSA-2012:1091
Red Hat Security Advisory: nss, nspr, and nss-util security, bug fix, and enhancement update
nss: NSS parsing errors with zero length items
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
null
null
RHSA-2009:1457
Red Hat Security Advisory: kernel security update
kernel: r8169: fix crash when large packets are received kernel: uninit op in SOCKOPS_WRAP() leads to privesc kernel: udp socket NULL ptr dereference
[ "cpe:/o:redhat:rhel_eus:5.2" ]
null
null
null
null
RHSA-2013:0515
Red Hat Security Advisory: openchange security, bug fix and enhancement update
samba: Multiple heap-based buffer overflows in memory management based on NDR marshalling code output
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
null
null
RHSA-2018:3531
Red Hat Security Advisory: thunderbird security update
Mozilla: Memory safety bugs fixed in Firefox ESR 60.3 Mozilla: Memory safety bugs fixed in Firefox 63 and Firefox ESR 60.3 Mozilla: Crash with nested event loops Mozilla: Integer overflow during Unicode conversion while loading JavaScript
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
7.5
null
RHSA-2021:0702
Red Hat Security Advisory: grub2 security update
grub2: acpi command allows privileged user to load crafted ACPI tables when Secure Boot is enabled grub2: Use-after-free in rmmod command grub2: Out-of-bounds write in grub_usb_device_initialize() grub2: Stack buffer overflow in grub_parser_split_cmdline() grub2: cutmem command allows privileged user to remove memory regions when Secure Boot is enabled grub2: Heap out-of-bounds write in short form option parser grub2: Heap out-of-bounds write due to miscalculation of space required for quoting
[ "cpe:/o:redhat:rhel_aus:7.4::server", "cpe:/o:redhat:rhel_e4s:7.4::server", "cpe:/o:redhat:rhel_tus:7.4::server" ]
null
7.5
null
null
RHSA-2019:1791
Red Hat Security Advisory: libssh2 security update
libssh2: Integer overflow in transport read resulting in out of bounds write libssh2: Integer overflow in keyboard interactive handling resulting in out of bounds write libssh2: Integer overflow in SSH packet processing channel resulting in out of bounds write libssh2: Integer overflow in user authenticate keyboard interactive allows out-of-bounds writes
[ "cpe:/o:redhat:rhel_eus:7.5::computenode", "cpe:/o:redhat:rhel_eus:7.5::server" ]
null
null
7.5
null
RHSA-2020:4155
Red Hat Security Advisory: thunderbird security update
Mozilla: Memory safety bugs fixed in Firefox 81 and Firefox ESR 78.3 Mozilla: XSS when pasting attacker-controlled data into a contenteditable element Mozilla: Download origin spoofing via redirect Mozilla: When recursing through layers while scrolling, an iterator may have become invalid, resulting in a potential use-after-free scenario
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
8.8
6.1
null
RHSA-2023:3106
Red Hat Security Advisory: curl security and bug fix update
curl: FTP too eager connection reuse
[ "cpe:/o:redhat:enterprise_linux:8::baseos" ]
null
5.9
null
null
RHSA-2014:0458
Red Hat Security Advisory: Red Hat JBoss Data Virtualization 6.0.0 security update
tomcat: multiple content-length header poisoning flaws
[ "cpe:/a:redhat:jboss_data_virtualization:6.0" ]
null
null
null
null
RHSA-2023:7607
Red Hat Security Advisory: OpenShift Container Platform 4.12.45 security and extras update
golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487)
[ "cpe:/a:redhat:openshift:4.12::el8" ]
null
7.5
null
null
RHSA-2024:11242
Red Hat Security Advisory: mpg123:1.32.9 security update
mpg123: Buffer overflow when writing decoded PCM samples
[ "cpe:/a:redhat:enterprise_linux:9::appstream", "cpe:/a:redhat:enterprise_linux:9::crb" ]
null
6.7
null
null
RHSA-2025:0649
Red Hat Security Advisory: OpenShift Container Platform 4.16.32 security and extras update
golang.org/x/crypto/ssh: Misuse of ServerConfig.PublicKeyCallback may cause authorization bypass in golang.org/x/crypto golang.org/x/net/html: Non-linear parsing of case-insensitive content in golang.org/x/net/html
[ "cpe:/a:redhat:openshift:4.16::el9" ]
null
7.5
null
null
RHSA-2024:6465
Red Hat Security Advisory: dovecot security update
dovecot: using a large number of address headers may trigger a denial of service dovecot: very large headers can cause resource exhaustion when parsing message
[ "cpe:/a:redhat:rhel_eus:9.2::appstream", "cpe:/a:redhat:rhel_eus:9.2::crb" ]
null
6.8
null
null
RHSA-2024:7621
Red Hat Security Advisory: firefox security update
firefox: Clipboard write permission bypass firefox: thunderbird: Compromised content process can bypass site isolation firefox: thunderbird: Cross-origin access to PDF contents through multipart responses firefox: thunderbird: Cross-origin access to JSON contents through multipart responses firefox: thunderbird: Potential memory corruption may occur when cloning certain objects firefox: thunderbird: Potential directory upload bypass via clickjacking firefox: thunderbird: External protocol handlers could be enumerated via popups firefox: thunderbird: Specially crafted WebTransport requests could lead to denial of service firefox: thunderbird: Potential memory corruption during JIT compilation firefox: thunderbird: Memory safety bugs fixed in Firefox 131, Firefox ESR 115.16, Firefox ESR 128.3, Thunderbird 131, and Thunderbird 128.3 firefox: thunderbird: Memory safety bugs fixed in Firefox 131, Firefox ESR 128.3, Thunderbird 131, and Thunderbird 128.3 firefox: thunderbird: Memory safety bugs fixed in Firefox 131 and Thunderbird 131
[ "cpe:/a:redhat:rhel_e4s:9.0::appstream" ]
null
7.5
null
null
RHSA-2023:1516
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.4.10 security update
SnakeYaml: Constructor Deserialization Remote Code Execution undertow: Server identity in https connection is not checked by the undertow client snakeyaml: Uncaught exception in java.base/java.util.ArrayList.hashCode hsqldb: Untrusted input may lead to RCE attack dev-java/snakeyaml: DoS via stack overflow codec-haproxy: HAProxyMessageDecoder Stack Exhaustion DoS apache-james-mime4j: Temporary File Information Disclosure in MIME4J TempFileStorageProvider RESTEasy: creation of insecure temp files Undertow: Infinite loop in SslConduit during close
[ "cpe:/a:redhat:jboss_enterprise_application_platform:7.4" ]
null
7.5
null
null
RHSA-2022:0123
Red Hat Security Advisory: thunderbird security update
Mozilla: Iframe sandbox bypass with XSLT Mozilla: Race condition when playing audio files Mozilla: Heap-buffer-overflow in blendGaussianBlur Mozilla: Missing throttling on external protocol launch dialog Mozilla: Use-after-free of ChannelEventQueue::mOwner Mozilla: Browser window spoof using fullscreen mode Mozilla: Out-of-bounds memory access when inserting text in edit mode Mozilla: Browser window spoof using fullscreen mode Mozilla: Leaking cross-origin URLs through securitypolicyviolation event Mozilla: Crash when handling empty pkcs7 sequence Mozilla: Spoofed origin on external protocol launch dialog Mozilla: Memory safety bugs fixed in Firefox 96 and Firefox ESR 91.5
[ "cpe:/a:redhat:rhel_eus:8.2::appstream" ]
null
8.8
6.1
null
RHSA-2007:1177
Red Hat Security Advisory: autofs5 security update
autofs default doesn't set nodev in /net
[ "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws" ]
null
null
null
null
RHSA-2024:2886
Red Hat Security Advisory: firefox security update
Mozilla: Arbitrary JavaScript execution in PDF.js Mozilla: IndexedDB files retained in private browsing mode Mozilla: Potential permissions request bypass via clickjacking Mozilla: Cross-origin responses could be distinguished between script and non-script content-types Mozilla: Use-after-free could occur when printing to PDF Mozilla: Memory safety bugs fixed in Firefox 126, Firefox ESR 115.11, and Thunderbird 115.11
[ "cpe:/a:redhat:rhel_aus:8.4::appstream", "cpe:/a:redhat:rhel_e4s:8.4::appstream", "cpe:/a:redhat:rhel_tus:8.4::appstream" ]
null
6.1
null
null
RHSA-2023:7379
Red Hat Security Advisory: kernel-rt security update
kernel: AMD: Cross-Thread Return Address Predictions hw: Intel: Gather Data Sampling (GDS) side channel vulnerability kernel: net/sched: cls_u32 component reference counter leak if tcf_change_indev() fails kernel: tun: bugs for oversize packet when napi frags enabled in tun_napi_alloc_frags kernel: net/sched: Use-after-free vulnerabilities in the net/sched classifiers: cls_fw, cls_u32 and cls_route kernel: net/sched: Use-after-free vulnerabilities in the net/sched classifiers: cls_fw, cls_u32 and cls_route kernel: net/sched: Use-after-free vulnerabilities in the net/sched classifiers: cls_fw, cls_u32 and cls_route kernel: net/sched: Use-after-free vulnerabilities in the net/sched classifiers: cls_fw, cls_u32 and cls_route kernel: use after free in nvmet_tcp_free_crypto in NVMe kernel: netfilter: potential slab-out-of-bound access due to integer underflow
[ "cpe:/a:redhat:rhel_eus:9.2::nfv", "cpe:/a:redhat:rhel_eus:9.2::realtime" ]
null
7
null
null
RHSA-2022:5636
Red Hat Security Advisory: kernel security and bug fix update
kernel: Small table perturb size in the TCP source port generation algorithm can lead to information leak kernel: race condition in perf_event_open leads to privilege escalation kernel: a use-after-free write in the netfilter subsystem can lead to privilege escalation to root
[ "cpe:/o:redhat:rhel_e4s:8.1::baseos" ]
null
7.8
null
null
RHSA-2016:1384
Red Hat Security Advisory: ceph security update
crash: mon_command crashes ceph monitors on receiving empty prefix
[ "cpe:/a:redhat:ceph_storage:1.3::el7" ]
null
null
4.9
null
RHSA-2021:3745
Red Hat Security Advisory: Red Hat JBoss Core Services Apache HTTP Server 2.4.37 SP9 security update
httpd: mod_proxy: SSRF via a crafted request uri-path containing "unix:"
[ "cpe:/a:redhat:jboss_core_services:1" ]
null
9
null
null
RHSA-2024:4729
Red Hat Security Advisory: kernel-rt security update
kernel: GSM multiplexing race condition leads to privilege escalation kernel: dmaengine/idxd: hardware erratum allows potential security problem with direct access by untrusted application
[ "cpe:/a:redhat:rhel_tus:8.4::nfv", "cpe:/a:redhat:rhel_tus:8.4::realtime" ]
null
6.4
null
null
RHSA-2024:3715
Red Hat Security Advisory: OpenShift Container Platform 4.12.59 packages and security update
golang-protobuf: encoding/protojson, internal/encoding/json: infinite loop in protojson.Unmarshal when unmarshaling certain forms of invalid JSON
[ "cpe:/a:redhat:openshift:4.12::el8", "cpe:/a:redhat:openshift:4.12::el9" ]
null
5.9
null
null
RHSA-2020:1605
Red Hat Security Advisory: python27:2.7 security, bug fix, and enhancement update
python-requests: Redirect from HTTPS to HTTP does not remove Authorization header python-urllib3: Cross-host redirect does not remove Authorization header allow for credential exposure python: Cookie domain check returns incorrect results python-urllib3: CRLF injection due to not encoding the '\r\n' sequence leading to possible attack on internal service python-urllib3: Certification mishandle when error should be thrown python: email.utils.parseaddr wrongly parses email addresses python: XSS vulnerability in the documentation XML-RPC server in server_title field
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
6.1
7.3
null
RHSA-2015:2393
Red Hat Security Advisory: wireshark security, bug fix, and enhancement update
wireshark: SigComp dissector crash (wnpa-sec-2014-20) wireshark: AMQP dissector crash (wnpa-sec-2014-21) wireshark: NCP dissector crashes (wnpa-sec-2014-22) wireshark: NCP dissector crashes (wnpa-sec-2014-22) wireshark: TN5250 infinite loop (wnpa-sec-2014-23) wireshark: DEC DNA Routing Protocol dissector crash (wnpa-sec-2015-03) wireshark: SMTP dissector crash (wnpa-sec-2015-04) wireshark: TLS/SSL decryption crash (wnpa-sec-2015-05) wireshark: The WCP dissector could crash while decompressing data (wnpa-sec-2015-07) wireshark: The pcapng file parser could crash (wnpa-sec-2015-08) wireshark: The TNEF dissector could go into an infinite loop on 32-bit architectures (wnpa-sec-2015-10) wireshark: crash on sample file genbroad.snoop wireshark: WebSocket DoS (wnpa-sec-2015-13) wireshark: WCP dissector crash (wnpa-sec-2015-14) wireshark: X11 memory leak (wnpa-sec-2015-15) wireshark: Reassembly memory leak (wnpa-sec-2015-16) wireshark: Dissector table crash (wnpa-sec-2015-23) wireshark: ZigBee dissector crash (wnpa-sec-2015-24) wireshark: GSM RLC/MAC dissector infinite loop (wnpa-sec-2015-25) wireshark: WaveAgent dissector crash (wnpa-sec-2015-26) wireshark: Ptvcursor crash (wnpa-sec-2015-28)
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
null
null
RHSA-2023:4645
Red Hat Security Advisory: .NET 6.0 security, bug fix, and enhancement update
dotnet: RCE under dotnet commands dotnet: Kestrel vulnerability to slow read attacks leading to Denial of Service attack
[ "cpe:/a:redhat:enterprise_linux:8::appstream", "cpe:/a:redhat:enterprise_linux:8::crb" ]
null
7.5
null
null