id
stringlengths 13
15
| title
stringlengths 29
176
| description
stringlengths 8
32.1k
| cpes
sequencelengths 0
20
| cvss_v4_0
null | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
null |
---|---|---|---|---|---|---|---|
RHSA-2024:9601 | Red Hat Security Advisory: tigervnc security update | xorg-x11-server: tigervnc: heap-based buffer overflow privilege escalation vulnerability | [
"cpe:/a:redhat:rhel_e4s:9.0::appstream"
] | null | 7.8 | null | null |
RHSA-2013:1193 | Red Hat Security Advisory: jbossweb security update | Tomcat/JBossWeb: Arbitrary file upload via deserialization | [
"cpe:/a:redhat:jboss_enterprise_application_platform:6::el5",
"cpe:/a:redhat:jboss_enterprise_application_platform:6::el6"
] | null | null | null | null |
RHSA-2019:1150 | Red Hat Security Advisory: rh-ruby24-ruby security, bug fix, and enhancement update | rubygems: Delete directory using symlink when decompressing tar rubygems: Escape sequence injection vulnerability in verbose rubygems: Escape sequence injection vulnerability in gem owner rubygems: Escape sequence injection vulnerability in API response handling rubygems: Installing a malicious gem may lead to arbitrary code execution rubygems: Escape sequence injection vulnerability in errors | [
"cpe:/a:redhat:rhel_software_collections:3::el6",
"cpe:/a:redhat:rhel_software_collections:3::el7"
] | null | null | 5.3 | null |
RHSA-2025:3560 | Red Hat Security Advisory: RHODF-4.14-RHEL-9 security update | golang.org/x/crypto/ssh: Misuse of ServerConfig.PublicKeyCallback may cause authorization bypass in golang.org/x/crypto golang.org/x/net/html: Non-linear parsing of case-insensitive content in golang.org/x/net/html | [
"cpe:/a:redhat:openshift_data_foundation:4.14::el9"
] | null | 7.5 | null | null |
RHSA-2022:0537 | Red Hat Security Advisory: thunderbird security update | Mozilla: Extensions could have bypassed permission confirmation during update Mozilla: Drag and dropping an image could have resulted in the dropped object being an executable Mozilla: Sandboxed iframes could have executed script if the parent appended elements Mozilla: Cross-Origin responses could be distinguished between script and non-script content-types Mozilla: frame-ancestors Content Security Policy directive was not enforced for framed extension pages Mozilla: Script Execution during invalid object state Mozilla: Memory safety bugs fixed in Firefox 97 and Firefox ESR 91.6 | [
"cpe:/a:redhat:rhel_eus:8.2::appstream"
] | null | 8.8 | null | null |
RHSA-2012:1605 | Red Hat Security Advisory: Fuse MQ Enterprise 7.1.0 update | jetty: hash table collisions CPU usage DoS (oCERT-2011-003) | [
"cpe:/a:redhat:fuse_mq_enterprise:7.1.0"
] | null | null | null | null |
RHSA-2016:2659 | Red Hat Security Advisory: java-1.6.0-ibm security update | OpenJDK: missing algorithm restrictions for jar verification (Libraries, 8155973) OpenJDK: insufficient classloader consistency checks in ClassLoaderWithRepository (JMX, 8157739) JDK: unspecified vulnerability fixed in 6u131, 7u121, and 8u111 (2D) OpenJDK: insufficient checks of JDWP packets (Hotspot, 8159519) OpenJDK: exposure of server authentication credentials to proxy (Networking, 8160838) | [
"cpe:/a:redhat:rhel_extras:5::client",
"cpe:/a:redhat:rhel_extras:5::server",
"cpe:/a:redhat:rhel_extras:6"
] | null | null | 5.3 | null |
RHSA-2020:3102 | Red Hat Security Advisory: openstack-keystone security update | openstack-keystone: EC2 and credential endpoints are not protected from a scoped context openstack-keystone: OAuth1 request token authorize silently ignores roles parameter openstack-keystone: Credentials endpoint policy logic allows changing credential owner and target project ID openstack-keystone: failure to check signature TTL of the EC2 credential auth method | [
"cpe:/a:redhat:openstack:15::el8"
] | null | 5.4 | null | null |
RHSA-2016:0014 | Red Hat Security Advisory: libldb security update | libldb: Remote DoS in Samba (AD) LDAP server libldb: remote memory read in the Samba LDAP server | [
"cpe:/a:redhat:storage:3.1:samba:el7",
"cpe:/a:redhat:storage:3.1:server:el6"
] | null | null | null | null |
RHSA-2024:4271 | Red Hat Security Advisory: Red Hat AMQ Broker 7.12.1 release and security update | JSON-java: parser confusion leads to OOM org.bouncycastle: Importing an EC certificate with crafted F2m parameters may lead to Denial of Service bc-java: BouncyCastle vulnerable to a timing variant of Bleichenbacher (Marvin Attack) org.bouncycastle:bcprov-jdk18on: Infinite loop in ED25519 verification in the ScalarUtil class org.bouncycastle: Use of Incorrectly-Resolved Name or Reference | [
"cpe:/a:redhat:amq_broker:7.12"
] | null | 5.3 | null | null |
RHSA-2023:0832 | Red Hat Security Advisory: kernel security and bug fix update | kernel: an out-of-bounds vulnerability in i2c-ismt driver kernel: mm/mremap.c use-after-free vulnerability kernel: nfsd buffer overflow by RPC message over TCP with garbage data | [
"cpe:/a:redhat:enterprise_linux:8::crb",
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 7.5 | null | null |
RHSA-2020:3041 | Red Hat Security Advisory: kernel security and bug fix update | kernel: kernel: DAX hugepages not considered during mremap kernel: Rogue cross-process SSBD shutdown. Linux scheduler logical bug allows an attacker to turn off the SSBD protection. kernel: Indirect Branch Prediction Barrier is force-disabled when STIBP is unavailable or enhanced IBRS is available. kernel: Indirect branch speculation can be enabled after it was force-disabled by the PR_SPEC_FORCE_DISABLE prctl command. kernel: buffer overflow in mwifiex_cmd_append_vsie_tlv function in drivers/net/wireless/marvell/mwifiex/scan.c kernel: heap-based buffer overflow in mwifiex_ret_wmm_get_status function in drivers/net/wireless/marvell/mwifiex/wmm.c Kernel: vfio: access to disabled MMIO space of some devices may lead to DoS scenario | [
"cpe:/o:redhat:rhel_e4s:8.0::baseos"
] | null | 5.3 | null | null |
RHSA-2022:5477 | Red Hat Security Advisory: firefox security update | Mozilla: Undesired attributes could be set as part of prototype pollution Mozilla: CSP bypass enabling stylesheet injection Mozilla: CSP sandbox header without `allow-scripts` can be bypassed via retargeted javascript: URI Mozilla: Use-after-free in nsSHistory Mozilla: Unavailable PAC file resulted in OCSP requests being blocked Mozilla: A popup window could be resized in a way to overlay the address bar with web content Mozilla: Potential integer overflow in ReplaceElementsAt Mozilla: Memory safety bugs fixed in Firefox 102 and Firefox ESR 91.11 | [
"cpe:/a:redhat:rhel_e4s:8.1::appstream"
] | null | 8.8 | 7.5 | null |
RHSA-2020:4647 | Red Hat Security Advisory: freerdp and vinagre security, bug fix, and enhancement update | freerdp: Out of bound read in cliprdr_server_receive_capabilities freerdp: Out of bound read in update_recv could result in a crash freerdp: Integer overflow in VIDEO channel freerdp: Out of bound read/write in usb redirection channel freerdp: Out of bound access in clear_decompress_subcode_rlex freerdp: Unchecked read of array offset in rdpsnd_recv_wave2_pdu freerdp: out-of-bounds read in update_read_icon_info function freerdp: out of bound read in rfx_process_message_tileset freerdp: double free in update_read_cache_bitmap_v3_order function freerdp: out of bounds read in update_read_bitmap_data function freerdp: out of bounds seek in update_read_synchronize function could lead out of bounds read freerdp: out-of-bounds read in autodetect_recv_bandwidth_measure_results function freerdp: out-of-bounds read could result in aborting the session freerdp: out-of-bound read of client memory that is then passed on to the protocol parser freerdp: stream out-of-bounds seek in rdp_read_font_capability_set could lead to out-of-bounds read freerdp: out-of-bounds read in cliprdr_read_format_list function freerdp: out-of-bounds read in ntlm_read_ntlm_v2_client_challenge function freerdp: out-of-bounds read in ntlm_read_AuthenticateMessage freerdp: out-of-bounds read in ntlm_read_NegotiateMessage freerdp: out-of-bounds read in irp functions freerdp: out-of-bounds read in gdi.c freerdp: out-of-bounds read in bitmap.c freerdp: Stream pointer out of bounds in update_recv_secondary_order could lead out of bounds read later freerdp: Out-of-bounds read in ntlm_read_ChallengeMessage in winpr/libwinpr/sspi/NTLM/ntlm_message.c. freerdp: Out-of-bounds read in security_fips_decrypt in libfreerdp/core/security.c | [
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb"
] | null | 6.1 | null | null |
RHBA-2021:1167 | Red Hat Bug Fix Advisory: Openshift Logging Bug Fix Release (5.0.2) | golang: crypto/elliptic: incorrect operations on the P-224 curve | [
"cpe:/a:redhat:logging:5.0::el8"
] | null | 6.5 | null | null |
RHSA-2019:4352 | Red Hat Security Advisory: Red Hat JBoss Fuse/A-MQ 6.3 R14 security and bug fix update | zookeeper: Information disclosure in Apache ZooKeeper HTTP/2: flood using PING frames results in unbounded memory growth HTTP/2: flood using HEADERS frames results in unbounded memory growth HTTP/2: flood using SETTINGS frames results in unbounded memory growth HTTP/2: flood using empty frames results in excessive resource consumption xstream: remote code execution due to insecure XML deserialization (regression of CVE-2013-7285) jackson-databind: failure to block the logback-core class from polymorphic deserialization leading to remote code execution | [
"cpe:/a:redhat:jboss_amq:6.3"
] | null | null | 8.1 | null |
RHSA-2024:1722 | Red Hat Security Advisory: edk2 security update | edk2: Buffer overflow when processing DNS Servers option in a DHCPv6 Advertise message | [
"cpe:/a:redhat:rhel_aus:8.2::appstream",
"cpe:/a:redhat:rhel_e4s:8.2::appstream",
"cpe:/a:redhat:rhel_tus:8.2::appstream"
] | null | 8.8 | null | null |
RHSA-2019:2591 | Red Hat Security Advisory: ghostscript security update | ghostscript: Safer mode bypass by .forceput exposure in .pdf_hook_DSC_Creator (701445) ghostscript: Safer mode bypass by .forceput exposure in setuserparams (701444) ghostscript: Safer mode bypass by .forceput exposure in setsystemparams (701443) ghostscript: Safer mode bypass by .forceput exposure in .pdfexectoken and other procedures (701450) | [
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb"
] | null | null | 7.3 | null |
RHSA-2009:0020 | Red Hat Security Advisory: bind security update | bind: DSA_do_verify() returns check issue | [
"cpe:/o:redhat:enterprise_linux:2.1::as",
"cpe:/o:redhat:enterprise_linux:2.1::aw",
"cpe:/o:redhat:enterprise_linux:2.1::es",
"cpe:/o:redhat:enterprise_linux:2.1::ws",
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws",
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws",
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2024:3513 | Red Hat Security Advisory: less security update | less: OS command injection | [
"cpe:/o:redhat:enterprise_linux:9::baseos"
] | null | 8.6 | null | null |
RHSA-2022:0404 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.4.3 security update | undertow: client side invocation timeout raised when calling over HTTP2 7: Incomplete fix of CVE-2016-4978 in HornetQ library | [
"cpe:/a:redhat:jboss_enterprise_application_platform:7.4"
] | null | 6.6 | null | null |
RHSA-2020:1636 | Red Hat Security Advisory: libsndfile security update | libsndfile: stack-based buffer overflow in sndfile-deinterleave utility libsndfile: buffer over-read in the function i2alaw_array in alaw.c | [
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb"
] | null | null | 3.3 | null |
RHSA-2013:0943 | Red Hat Security Advisory: Red Hat JBoss SOA Platform 5.3.1 update | apache-cxf: XML encryption backwards compatibility attacks | [
"cpe:/a:redhat:jboss_enterprise_soa_platform:5.3"
] | null | null | null | null |
RHSA-2008:0158 | Red Hat Security Advisory: JBoss Enterprise Application Platform security update | OpenOffice.org-base allows Denial-of-Service and command injection Absolute path traversal Apache Tomcat WEBDAV JFreeChart: XSS vulnerabilities in the image map feature EJBQL injection via 'order' parameter Tomcat information disclosure vulnerability | [
"cpe:/a:redhat:rhel_application_stack:1",
"cpe:/a:redhat:rhel_application_stack:2"
] | null | null | null | null |
RHSA-2009:1615 | Red Hat Security Advisory: xerces-j2 security update | JDK: XML parsing Denial-Of-Service (6845701) | [
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2018:3537 | Red Hat Security Advisory: OpenShift Container Platform 3.11 security update | kibana: Cross-site scripting via the source field formatter nodejs: Out of bounds (OOB) write via UCS-2 encoding kubernetes: authentication/authorization bypass in the handling of non-101 responses | [
"cpe:/a:redhat:openshift:3.11::el7"
] | null | null | 8.8 | null |
RHSA-2012:1019 | Red Hat Security Advisory: java-1.7.0-oracle security update | JDK: unspecified vulnerability fixed in 6u33 and 7u5 (Deployment) OpenJDK: improper protection of CORBA data models (CORBA, 7079902) OpenJDK: fontmanager layout lookup code memory corruption (2D, 7143617) OpenJDK: SynthLookAndFeel application context bypass (Swing, 7143614) OpenJDK: insecure temporary file permissions (JRE, 7143606) OpenJDK: CRL and certificate extensions handling improvements (Security, 7143872) OpenJDK: mutable repository identifiers in generated stub code (CORBA, 7143851) JDK: unspecified vulnerability fixed in 6u33 and 7u5 (Deployment) JDK: unspecified vulnerability fixed in 6u33 and 7u5 (Deployment) OpenJDK: insufficient field accessibility checks (HotSpot, 7152811) OpenJDK: XML parsing infinite loop (JAXP, 7157609) OpenJDK: insufficient invokespecial <init> verification (HotSpot, 7160757) OpenJDK: java.lang.invoke.MethodHandles.Lookup does not honor access modes (Libraries, 7165628) | [
"cpe:/a:redhat:rhel_extras:6"
] | null | null | null | null |
RHSA-2024:2953 | Red Hat Security Advisory: pcs security update | rubygem-rack: Denial of Service Vulnerability in Rack Content-Type Parsing rubygem-rack: Possible DoS Vulnerability with Range Header in Rack rubygem-rack: Possible Denial of Service Vulnerability in Rack Header Parsing | [
"cpe:/a:redhat:enterprise_linux:8::highavailability",
"cpe:/a:redhat:enterprise_linux:8::resilientstorage"
] | null | 5.3 | null | null |
RHSA-2020:5004 | Red Hat Security Advisory: resource-agents security and bug fix update | python-httplib2: CRLF injection via an attacker controlled unescaped part of uri for httplib2.Http.request function | [
"cpe:/a:redhat:rhel_extras_sap:7",
"cpe:/a:redhat:rhel_extras_sap_hana:7",
"cpe:/o:redhat:enterprise_linux:7::server"
] | null | 6.8 | null | null |
RHSA-2018:2892 | Red Hat Security Advisory: glusterfs security, bug fix, and enhancement update | glusterfs: Improper deserialization in dict.c:dict_unserialize() can allow attackers to read arbitrary memory | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | 6.5 | null |
RHSA-2024:8928 | Red Hat Security Advisory: mod_jk security update | mod_jk: information Disclosure / DoS | [
"cpe:/a:redhat:rhel_e4s:9.0::appstream"
] | null | 5.9 | null | null |
RHSA-2024:2068 | Red Hat Security Advisory: OpenShift Container Platform 4.15.11 bug fix and security update | golang: net/http, x/net/http2: unlimited number of CONTINUATION frames causes DoS ironic-image: Unauthenticated local access to Ironic API | [
"cpe:/a:redhat:openshift:4.15::el8",
"cpe:/a:redhat:openshift:4.15::el9"
] | null | 4.7 | null | null |
RHSA-2020:4331 | Red Hat Security Advisory: kpatch-patch security update | kernel: metadata validator in XFS may cause an inode with a valid, user-creatable extended attribute to be flagged as corrupt kernel: memory corruption in net/packet/af_packet.c leads to elevation of privilege | [
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 7.8 | null | null |
RHSA-2009:1563 | Red Hat Security Advisory: tomcat security update | Improve cookie parsing for tomcat5 tomcat request dispatcher information disclosure vulnerability tomcat6 Denial-Of-Service with AJP connection tomcat6 Information disclosure in authentication classes tomcat XML parser information disclosure | [
"cpe:/a:redhat:rhel_developer_suite:3"
] | null | null | null | null |
RHSA-2008:0860 | Red Hat Security Advisory: ipa security update | IPA Kerberos master password disclosure | [
"cpe:/a:redhat:enterprise_ipa:1.0"
] | null | null | null | null |
RHSA-2022:8889 | Red Hat Security Advisory: Openshift Logging 5.3.14 bug fix release and security update | jackson-databind: denial of service via a large depth of nested objects jackson-databind: deep wrapper array nesting wrt UNWRAP_SINGLE_VALUE_ARRAYS jackson-databind: use of deeply nested arrays | [
"cpe:/a:redhat:logging:5.3::el8"
] | null | 7.5 | null | null |
RHSA-2019:1632 | Red Hat Security Advisory: Red Hat OpenShift Container Platform 3.10 atomic-openshift security update | kubernetes: Incomplete fix for CVE-2019-1002101 allows for arbitrary file write via `kubectl cp` | [
"cpe:/a:redhat:openshift:3.10::el7"
] | null | null | 5.3 | null |
RHSA-2023:0336 | Red Hat Security Advisory: systemd security update | systemd: buffer overrun in format_timespan() function | [
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/o:redhat:enterprise_linux:9::baseos"
] | null | 5.5 | null | null |
RHSA-2013:0748 | Red Hat Security Advisory: krb5 security update | krb5: NULL pointer dereference (DoS, KDC crash) by processing certain TGS requests | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2019:1107 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.2.1 on RHEL 6 security update | jackson-databind: Potential information exfiltration with default typing, serialization gadget from MyBatis jackson-databind: improper polymorphic deserialization of types from Jodd-db library jackson-databind: improper polymorphic deserialization of types from Oracle JDBC driver undertow: Infoleak in some circumstances where Undertow can serve data from a random buffer jackson-databind: exfiltration/XXE in some JDK classes jackson-databind: server-side request forgery (SSRF) in axis2-jaxws class wildfly: Race condition on PID file allows for termination of arbitrary processes by local users wildfly: wrong SecurityIdentity for EE concurrency threads that are reused | [
"cpe:/a:redhat:jboss_enterprise_application_platform:7.2::el6"
] | null | null | 5.4 | null |
RHSA-2007:0701 | Red Hat Security Advisory: xterm security update | (mesg: error: tty device is not owned by group `tty') | [
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2023:1393 | Red Hat Security Advisory: OpenShift Container Platform 4.10.55 security update | goutils: RandomAlphaNumeric and CryptoRandomAlphaNumeric are not as random as they should be | [
"cpe:/a:redhat:openshift:4.10::el8"
] | null | 7 | null | null |
RHSA-2023:0665 | Red Hat Security Advisory: tigervnc security update | xorg-x11-server: DeepCopyPointerClasses use-after-free leads to privilege elevation | [
"cpe:/a:redhat:rhel_e4s:8.1::appstream"
] | null | 7.8 | null | null |
RHSA-2019:2998 | Red Hat Security Advisory: Red Hat OpenShift Application Runtimes Thorntail 2.5.0 security & bug fix update | keycloak: session hijack using the user access token undertow: leak credentials to log files UndertowLogger.REQUEST_LOGGER.undertowRequestFailed undertow: Information leak in requests for directories without trailing slashes undertow: DEBUG log for io.undertow.request.security if enabled leaks credentials to log files jackson-databind: polymorphic typing issue allows attacker to read arbitrary local files on the server. jackson-databind: failure to block the logback-core class from polymorphic deserialization leading to remote code execution jackson-databind: default typing mishandling leading to remote code execution | [
"cpe:/a:redhat:openshift_application_runtimes:1.0"
] | null | null | 9.8 | null |
RHSA-2024:6723 | Red Hat Security Advisory: thunderbird security update | mozilla: Type Confusion in Async Generators in Javascript Engine mozilla: Type confusion when looking up a property name in a "with" block mozilla: Internal event interfaces were exposed to web content when browser EventHandler listener callbacks ran mozilla: Garbage collection could mis-color cross-compartment objects in OOM conditions mozilla: WASM type confusion involving ArrayTypes mozilla: SelectElements could be shown over another site if popups are allowed mozilla: Memory safety bugs fixed in Firefox 130, Firefox ESR 128.2, and Thunderbird 128.2 thunderbird: Crash when aborting verification of OTR chat | [
"cpe:/a:redhat:rhel_aus:8.2::appstream"
] | null | 6.5 | null | null |
RHSA-2014:1335 | Red Hat Security Advisory: python-django-horizon security and bug fix update | openstack-horizon: persistent XSS in Horizon Host Aggregates interface | [
"cpe:/a:redhat:openstack:5::el7"
] | null | null | null | null |
RHSA-2017:3046 | Red Hat Security Advisory: java-1.7.0-oracle security update | zlib: Out-of-bounds pointer arithmetic in inftrees.c zlib: Out-of-bounds pointer arithmetic in inffast.c zlib: Undefined left shift of negative number zlib: Big-endian out-of-bounds pointer lcms2: Out-of-bounds read in Type_MLU_Read() OpenJDK: CardImpl incorrect state handling (Smart Card IO, 8169026) OpenJDK: multiple unbounded memory allocations in deserialization (Serialization, 8174109) OpenJDK: incorrect privilege use when handling unreferenced objects (RMI, 8174966) JDK: unspecified vulnerability fixed in 6u171, 7u161, 8u151, and 9.0.1 (Javadoc) OpenJDK: HTTP client insufficient check for newline in URLs (Networking, 8176751) OpenJDK: unbounded resource use in JceKeyStore deserialization (Serialization, 8181370) OpenJDK: insufficient loader constraints checks for invokespecial (Hotspot, 8180711) OpenJDK: unbounded memory allocation in SimpleTimeZone deserialization (Serialization, 8181323) OpenJDK: multiple unbounded memory allocations in deserialization (Libraries, 8181432) OpenJDK: unbounded memory allocation in PredicatedNodeTest deserialization (JAXP, 8181327) OpenJDK: unbounded memory allocation in JAXWSExceptionBase deserialization (JAX-WS, 8181100) OpenJDK: no default network operations timeouts in FtpClient (Networking, 8181612) OpenJDK: weak protection of key stores against brute forcing (Security, 8181692) OpenJDK: unbounded memory allocation in ObjectInputStream deserialization (Serialization, 8181597) OpenJDK: use of unprotected sname in Kerberos client (Libraries, 8178794) | [
"cpe:/a:redhat:rhel_extras_oracle_java:6",
"cpe:/a:redhat:rhel_extras_oracle_java:7"
] | null | null | 6.8 | null |
RHSA-2004:634 | Red Hat Security Advisory: zip security update | security flaw | [
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws"
] | null | null | null | null |
RHSA-2018:0616 | Red Hat Security Advisory: sensu security update | sensu: Password exposure in warn level log when configured for multiple rabbitMQ connections | [
"cpe:/a:redhat:openstack-optools:12::el7"
] | null | null | 5.5 | null |
RHSA-2024:4561 | Red Hat Security Advisory: OpenJDK 8u422 Windows Security Update | OpenJDK: potential UTF8 size overflow (8314794) OpenJDK: Excessive symbol length can lead to infinite loop (8319859) OpenJDK: Range Check Elimination (RCE) pre-loop limit overflow (8320548) OpenJDK: Pack200 increase loading time due to improper header validation (8322106) OpenJDK: Out-of-bounds access in 2D image handling (8324559) OpenJDK: RangeCheckElimination array index overflow (8323231) | [
"cpe:/a:redhat:openjdk:1.8::windows"
] | null | 7.4 | null | null |
RHSA-2020:2683 | Red Hat Security Advisory: dpdk security, bug fix, and enhancement update | dpdk: librte_vhost Integer overflow in vhost_user_set_log_base() dpdk: librte_vhost Integer truncation in vhost_user_check_and_alloc_queue_pair() | [
"cpe:/a:redhat:rhel_extras_other:7"
] | null | 6.7 | null | null |
RHSA-2024:5520 | Red Hat Security Advisory: kpatch-patch-4_18_0-477_43_1 security update | kernel: TIPC message reassembly use-after-free remote code execution vulnerability kernel: net: kernel: UAF in network route management | [
"cpe:/o:redhat:rhel_eus:8.8::baseos"
] | null | 7.8 | null | null |
RHBA-2022:1352 | Red Hat Bug Fix Advisory: .NET Core 3.1 on RHEL 7 bugfix update | urijs: Authorization Bypass Through User-Controlled Key | [
"cpe:/a:redhat:rhel_dotnet:3.1::el7"
] | null | 6.5 | null | null |
RHSA-2007:0097 | Red Hat Security Advisory: firefox security update | security flaw NSS: SSLv2 protocol buffer overflows NSS: SSLv2 protocol buffer overflows security flaw security flaw security flaw security flaw security flaw security flaw : seamonkey cookie setting / same-domain bypass vulnerability security flaw security flaw security flaw | [
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2013:1369 | Red Hat Security Advisory: jboss-remoting security update | Remoting: DoS by file descriptor exhaustion | [
"cpe:/a:redhat:jboss_enterprise_application_platform:5::el4",
"cpe:/a:redhat:jboss_enterprise_application_platform:5::el5",
"cpe:/a:redhat:jboss_enterprise_application_platform:5::el6"
] | null | null | null | null |
RHSA-2013:1652 | Red Hat Security Advisory: coreutils security, bug fix, and enhancement update | coreutils: segfault in "sort -d" and "sort -M" with long line input coreutils: segfault in uniq with long line input coreutils: segfault in "join -i" with long line input | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2020:3496 | Red Hat Security Advisory: Red Hat Single Sign-On 7.4.2 security update on RHEL 7 | keycloak: security headers missing on REST endpoints keycloak: DoS by sending multiple simultaneous requests with a Content-Length header value greater than actual byte count of request body | [
"cpe:/a:redhat:red_hat_single_sign_on:7::el7"
] | null | 7.5 | null | null |
RHSA-2023:5337 | Red Hat Security Advisory: Red Hat Integration Camel K 1.10.2 release security update | quarkus: HTTP security policy bypass | [
"cpe:/a:redhat:camel_k:1"
] | null | 8.1 | null | null |
RHSA-2022:1478 | Red Hat Security Advisory: Satellite 6.9.9 Async Bug Fix Update | puppet: unsafe HTTP redirect | [
"cpe:/a:redhat:satellite:6.9::el7",
"cpe:/a:redhat:satellite_capsule:6.9::el7"
] | null | 9.8 | null | null |
RHSA-2023:0191 | Red Hat Security Advisory: java-17-openjdk security and bug fix update | OpenJDK: handshake DoS attack against DTLS connections (JSSE, 8287411) OpenJDK: soundbank URL remote loading (Sound, 8293742) | [
"cpe:/a:redhat:rhel_eus:8.4::appstream",
"cpe:/a:redhat:rhel_eus:8.4::crb"
] | null | 3.7 | null | null |
RHSA-2020:2404 | Red Hat Security Advisory: bind security update | bind: BIND does not sufficiently limit the number of fetches performed when processing referrals bind: A logic error in code which checks TSIG validity can be used to trigger an assertion failure in tsig.c | [
"cpe:/a:redhat:rhel_e4s:8.0::appstream",
"cpe:/o:redhat:rhel_e4s:8.0::baseos"
] | null | 7.5 | null | null |
RHSA-2014:1318 | Red Hat Security Advisory: Red Hat Enterprise MRG Realtime 2.5 security and enhancement update | Kernel: HID: OOB write in magicmouse driver Kernel: HID: logitech-dj OOB array access Kernel: HID: off by one error in various _report_fixup routines Kernel: USB serial: memory corruption flaw Kernel: mm/shmem: denial of service kernel: isofs: unbound recursion when processing relocated directories kernel: isofs: unbound recursion when processing relocated directories kernel: udf: Avoid infinite loop when processing indirect ICBs | [
"cpe:/a:redhat:enterprise_mrg:2:server:el6"
] | null | null | null | null |
RHSA-2006:0731 | Red Hat Security Advisory: php security update | PHP buffer overflow | [
"cpe:/a:redhat:rhel_application_stack:1"
] | null | null | null | null |
RHSA-2004:504 | Red Hat Security Advisory: Updated Itanium kernel packages resolve security issues | security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw | [
"cpe:/o:redhat:enterprise_linux:2.1::as",
"cpe:/o:redhat:enterprise_linux:2.1::aw"
] | null | null | null | null |
RHSA-2021:5015 | Red Hat Security Advisory: firefox security update | Mozilla: Memory safety bugs fixed in Firefox 95 and Firefox ESR 91.4 Mozilla: URL leakage when navigating while executing asynchronous function Mozilla: Heap buffer overflow when using structured clone Mozilla: Missing fullscreen and pointer lock notification when requesting both Mozilla: GC rooting failure when calling wasm instance methods Mozilla: External protocol handler parameters were unescaped Mozilla: XMLHttpRequest error codes could have leaked the existence of an external protocol handler Mozilla: Bypass of CSP sandbox directive when embedding Mozilla: Denial of Service when using the Location API in a loop Mozilla: Cursor spoofing could overlay user interface when native cursor is zoomed | [
"cpe:/a:redhat:rhel_eus:8.4::appstream"
] | null | 5.4 | 6.1 | null |
RHSA-2023:1329 | Red Hat Security Advisory: OpenShift Container Platform 4.13.0 bug fix and security update | golang: net/http: excessive memory growth in a Go server accepting HTTP/2 requests golang: crypto/tls: large handshake records may cause panics | [
"cpe:/a:redhat:openshift:4.13::el9"
] | null | 7.5 | null | null |
RHSA-2018:1352 | Red Hat Security Advisory: kernel security update | Kernel: error in exception handling leads to DoS | [
"cpe:/o:redhat:rhel_aus:5.9"
] | null | null | 6.5 | null |
RHSA-2021:2122 | Red Hat Security Advisory: OpenShift Container Platform 4.7.13 packages and security update | golang: data race in certain net/http servers including ReverseProxy can lead to DoS golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs jenkins-2-plugins/config-file-provider: Does not configure its XML parser to prevent XML external entity (XXE) attacks. jenkins-2-plugins/config-file-provider: Does not correctly perform permission checks in several HTTP endpoints. jenkins-2-plugins/config-file-provider: does not require POST requests for an HTTP endpoint, resulting in a cross-site request forgery (CSRF) vulnerability. jenkins-2-plugins/config-file-provider: Does not perform permission checks in several HTTP endpoints. | [
"cpe:/a:redhat:openshift:4.7::el7",
"cpe:/a:redhat:openshift:4.7::el8"
] | null | 4.3 | null | null |
RHSA-2021:0024 | Red Hat Security Advisory: ImageMagick security update | ImageMagick: Shell injection via PDF password could result in arbitrary code execution | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 7.3 | null | null |
RHSA-2014:1648 | Red Hat Security Advisory: flash-plugin security update | flash-plugin: multiple code execution flaws (APSB14-22) flash-plugin: multiple code execution flaws (APSB14-22) flash-plugin: multiple code execution flaws (APSB14-22) | [
"cpe:/a:redhat:rhel_extras:5::client",
"cpe:/a:redhat:rhel_extras:5::server",
"cpe:/a:redhat:rhel_extras:6"
] | null | null | null | null |
RHSA-2017:2524 | Red Hat Security Advisory: ansible security, bug fix, and enhancement update | ansible: Security issue with lookup return not tainting the jinja2 environment | [
"cpe:/a:redhat:rhev_manager:4"
] | null | null | 5.3 | null |
RHSA-2021:0459 | Red Hat Security Advisory: qemu-kvm-rhev security update | QEMU: slirp: use-after-free in ip_reass() function in ip_input.c QEMU: reachable assertion failure in net_tx_pkt_add_raw_fragment() in hw/net/net_tx_pkt.c | [
"cpe:/a:redhat:rhev_manager:4.3",
"cpe:/o:redhat:enterprise_linux:7::hypervisor"
] | null | 3.8 | null | null |
RHSA-2022:8790 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.4.8 Security update | Undertow: DoS can be achieved as Undertow server waits for the LAST_CHUNK forever for EJB invocations | [
"cpe:/a:redhat:jboss_enterprise_application_platform:7.4::el7"
] | null | 4.2 | null | null |
RHSA-2012:1091 | Red Hat Security Advisory: nss, nspr, and nss-util security, bug fix, and enhancement update | nss: NSS parsing errors with zero length items | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2009:1457 | Red Hat Security Advisory: kernel security update | kernel: r8169: fix crash when large packets are received kernel: uninit op in SOCKOPS_WRAP() leads to privesc kernel: udp socket NULL ptr dereference | [
"cpe:/o:redhat:rhel_eus:5.2"
] | null | null | null | null |
RHSA-2013:0515 | Red Hat Security Advisory: openchange security, bug fix and enhancement update | samba: Multiple heap-based buffer overflows in memory management based on NDR marshalling code output | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2018:3531 | Red Hat Security Advisory: thunderbird security update | Mozilla: Memory safety bugs fixed in Firefox ESR 60.3 Mozilla: Memory safety bugs fixed in Firefox 63 and Firefox ESR 60.3 Mozilla: Crash with nested event loops Mozilla: Integer overflow during Unicode conversion while loading JavaScript | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | 7.5 | null |
RHSA-2021:0702 | Red Hat Security Advisory: grub2 security update | grub2: acpi command allows privileged user to load crafted ACPI tables when Secure Boot is enabled grub2: Use-after-free in rmmod command grub2: Out-of-bounds write in grub_usb_device_initialize() grub2: Stack buffer overflow in grub_parser_split_cmdline() grub2: cutmem command allows privileged user to remove memory regions when Secure Boot is enabled grub2: Heap out-of-bounds write in short form option parser grub2: Heap out-of-bounds write due to miscalculation of space required for quoting | [
"cpe:/o:redhat:rhel_aus:7.4::server",
"cpe:/o:redhat:rhel_e4s:7.4::server",
"cpe:/o:redhat:rhel_tus:7.4::server"
] | null | 7.5 | null | null |
RHSA-2019:1791 | Red Hat Security Advisory: libssh2 security update | libssh2: Integer overflow in transport read resulting in out of bounds write libssh2: Integer overflow in keyboard interactive handling resulting in out of bounds write libssh2: Integer overflow in SSH packet processing channel resulting in out of bounds write libssh2: Integer overflow in user authenticate keyboard interactive allows out-of-bounds writes | [
"cpe:/o:redhat:rhel_eus:7.5::computenode",
"cpe:/o:redhat:rhel_eus:7.5::server"
] | null | null | 7.5 | null |
RHSA-2020:4155 | Red Hat Security Advisory: thunderbird security update | Mozilla: Memory safety bugs fixed in Firefox 81 and Firefox ESR 78.3 Mozilla: XSS when pasting attacker-controlled data into a contenteditable element Mozilla: Download origin spoofing via redirect Mozilla: When recursing through layers while scrolling, an iterator may have become invalid, resulting in a potential use-after-free scenario | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 8.8 | 6.1 | null |
RHSA-2023:3106 | Red Hat Security Advisory: curl security and bug fix update | curl: FTP too eager connection reuse | [
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 5.9 | null | null |
RHSA-2014:0458 | Red Hat Security Advisory: Red Hat JBoss Data Virtualization 6.0.0 security update | tomcat: multiple content-length header poisoning flaws | [
"cpe:/a:redhat:jboss_data_virtualization:6.0"
] | null | null | null | null |
RHSA-2023:7607 | Red Hat Security Advisory: OpenShift Container Platform 4.12.45 security and extras update | golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487) | [
"cpe:/a:redhat:openshift:4.12::el8"
] | null | 7.5 | null | null |
RHSA-2024:11242 | Red Hat Security Advisory: mpg123:1.32.9 security update | mpg123: Buffer overflow when writing decoded PCM samples | [
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::crb"
] | null | 6.7 | null | null |
RHSA-2025:0649 | Red Hat Security Advisory: OpenShift Container Platform 4.16.32 security and extras update | golang.org/x/crypto/ssh: Misuse of ServerConfig.PublicKeyCallback may cause authorization bypass in golang.org/x/crypto golang.org/x/net/html: Non-linear parsing of case-insensitive content in golang.org/x/net/html | [
"cpe:/a:redhat:openshift:4.16::el9"
] | null | 7.5 | null | null |
RHSA-2024:6465 | Red Hat Security Advisory: dovecot security update | dovecot: using a large number of address headers may trigger a denial of service dovecot: very large headers can cause resource exhaustion when parsing message | [
"cpe:/a:redhat:rhel_eus:9.2::appstream",
"cpe:/a:redhat:rhel_eus:9.2::crb"
] | null | 6.8 | null | null |
RHSA-2024:7621 | Red Hat Security Advisory: firefox security update | firefox: Clipboard write permission bypass firefox: thunderbird: Compromised content process can bypass site isolation firefox: thunderbird: Cross-origin access to PDF contents through multipart responses firefox: thunderbird: Cross-origin access to JSON contents through multipart responses firefox: thunderbird: Potential memory corruption may occur when cloning certain objects firefox: thunderbird: Potential directory upload bypass via clickjacking firefox: thunderbird: External protocol handlers could be enumerated via popups firefox: thunderbird: Specially crafted WebTransport requests could lead to denial of service firefox: thunderbird: Potential memory corruption during JIT compilation firefox: thunderbird: Memory safety bugs fixed in Firefox 131, Firefox ESR 115.16, Firefox ESR 128.3, Thunderbird 131, and Thunderbird 128.3 firefox: thunderbird: Memory safety bugs fixed in Firefox 131, Firefox ESR 128.3, Thunderbird 131, and Thunderbird 128.3 firefox: thunderbird: Memory safety bugs fixed in Firefox 131 and Thunderbird 131 | [
"cpe:/a:redhat:rhel_e4s:9.0::appstream"
] | null | 7.5 | null | null |
RHSA-2023:1516 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.4.10 security update | SnakeYaml: Constructor Deserialization Remote Code Execution undertow: Server identity in https connection is not checked by the undertow client snakeyaml: Uncaught exception in java.base/java.util.ArrayList.hashCode hsqldb: Untrusted input may lead to RCE attack dev-java/snakeyaml: DoS via stack overflow codec-haproxy: HAProxyMessageDecoder Stack Exhaustion DoS apache-james-mime4j: Temporary File Information Disclosure in MIME4J TempFileStorageProvider RESTEasy: creation of insecure temp files Undertow: Infinite loop in SslConduit during close | [
"cpe:/a:redhat:jboss_enterprise_application_platform:7.4"
] | null | 7.5 | null | null |
RHSA-2022:0123 | Red Hat Security Advisory: thunderbird security update | Mozilla: Iframe sandbox bypass with XSLT Mozilla: Race condition when playing audio files Mozilla: Heap-buffer-overflow in blendGaussianBlur Mozilla: Missing throttling on external protocol launch dialog Mozilla: Use-after-free of ChannelEventQueue::mOwner Mozilla: Browser window spoof using fullscreen mode Mozilla: Out-of-bounds memory access when inserting text in edit mode Mozilla: Browser window spoof using fullscreen mode Mozilla: Leaking cross-origin URLs through securitypolicyviolation event Mozilla: Crash when handling empty pkcs7 sequence Mozilla: Spoofed origin on external protocol launch dialog Mozilla: Memory safety bugs fixed in Firefox 96 and Firefox ESR 91.5 | [
"cpe:/a:redhat:rhel_eus:8.2::appstream"
] | null | 8.8 | 6.1 | null |
RHSA-2007:1177 | Red Hat Security Advisory: autofs5 security update | autofs default doesn't set nodev in /net | [
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2024:2886 | Red Hat Security Advisory: firefox security update | Mozilla: Arbitrary JavaScript execution in PDF.js Mozilla: IndexedDB files retained in private browsing mode Mozilla: Potential permissions request bypass via clickjacking Mozilla: Cross-origin responses could be distinguished between script and non-script content-types Mozilla: Use-after-free could occur when printing to PDF Mozilla: Memory safety bugs fixed in Firefox 126, Firefox ESR 115.11, and Thunderbird 115.11 | [
"cpe:/a:redhat:rhel_aus:8.4::appstream",
"cpe:/a:redhat:rhel_e4s:8.4::appstream",
"cpe:/a:redhat:rhel_tus:8.4::appstream"
] | null | 6.1 | null | null |
RHSA-2023:7379 | Red Hat Security Advisory: kernel-rt security update | kernel: AMD: Cross-Thread Return Address Predictions hw: Intel: Gather Data Sampling (GDS) side channel vulnerability kernel: net/sched: cls_u32 component reference counter leak if tcf_change_indev() fails kernel: tun: bugs for oversize packet when napi frags enabled in tun_napi_alloc_frags kernel: net/sched: Use-after-free vulnerabilities in the net/sched classifiers: cls_fw, cls_u32 and cls_route kernel: net/sched: Use-after-free vulnerabilities in the net/sched classifiers: cls_fw, cls_u32 and cls_route kernel: net/sched: Use-after-free vulnerabilities in the net/sched classifiers: cls_fw, cls_u32 and cls_route kernel: net/sched: Use-after-free vulnerabilities in the net/sched classifiers: cls_fw, cls_u32 and cls_route kernel: use after free in nvmet_tcp_free_crypto in NVMe kernel: netfilter: potential slab-out-of-bound access due to integer underflow | [
"cpe:/a:redhat:rhel_eus:9.2::nfv",
"cpe:/a:redhat:rhel_eus:9.2::realtime"
] | null | 7 | null | null |
RHSA-2022:5636 | Red Hat Security Advisory: kernel security and bug fix update | kernel: Small table perturb size in the TCP source port generation algorithm can lead to information leak kernel: race condition in perf_event_open leads to privilege escalation kernel: a use-after-free write in the netfilter subsystem can lead to privilege escalation to root | [
"cpe:/o:redhat:rhel_e4s:8.1::baseos"
] | null | 7.8 | null | null |
RHSA-2016:1384 | Red Hat Security Advisory: ceph security update | crash: mon_command crashes ceph monitors on receiving empty prefix | [
"cpe:/a:redhat:ceph_storage:1.3::el7"
] | null | null | 4.9 | null |
RHSA-2021:3745 | Red Hat Security Advisory: Red Hat JBoss Core Services Apache HTTP Server 2.4.37 SP9 security update | httpd: mod_proxy: SSRF via a crafted request uri-path containing "unix:" | [
"cpe:/a:redhat:jboss_core_services:1"
] | null | 9 | null | null |
RHSA-2024:4729 | Red Hat Security Advisory: kernel-rt security update | kernel: GSM multiplexing race condition leads to privilege escalation kernel: dmaengine/idxd: hardware erratum allows potential security problem with direct access by untrusted application | [
"cpe:/a:redhat:rhel_tus:8.4::nfv",
"cpe:/a:redhat:rhel_tus:8.4::realtime"
] | null | 6.4 | null | null |
RHSA-2024:3715 | Red Hat Security Advisory: OpenShift Container Platform 4.12.59 packages and security update | golang-protobuf: encoding/protojson, internal/encoding/json: infinite loop in protojson.Unmarshal when unmarshaling certain forms of invalid JSON | [
"cpe:/a:redhat:openshift:4.12::el8",
"cpe:/a:redhat:openshift:4.12::el9"
] | null | 5.9 | null | null |
RHSA-2020:1605 | Red Hat Security Advisory: python27:2.7 security, bug fix, and enhancement update | python-requests: Redirect from HTTPS to HTTP does not remove Authorization header python-urllib3: Cross-host redirect does not remove Authorization header allow for credential exposure python: Cookie domain check returns incorrect results python-urllib3: CRLF injection due to not encoding the '\r\n' sequence leading to possible attack on internal service python-urllib3: Certification mishandle when error should be thrown python: email.utils.parseaddr wrongly parses email addresses python: XSS vulnerability in the documentation XML-RPC server in server_title field | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 6.1 | 7.3 | null |
RHSA-2015:2393 | Red Hat Security Advisory: wireshark security, bug fix, and enhancement update | wireshark: SigComp dissector crash (wnpa-sec-2014-20) wireshark: AMQP dissector crash (wnpa-sec-2014-21) wireshark: NCP dissector crashes (wnpa-sec-2014-22) wireshark: NCP dissector crashes (wnpa-sec-2014-22) wireshark: TN5250 infinite loop (wnpa-sec-2014-23) wireshark: DEC DNA Routing Protocol dissector crash (wnpa-sec-2015-03) wireshark: SMTP dissector crash (wnpa-sec-2015-04) wireshark: TLS/SSL decryption crash (wnpa-sec-2015-05) wireshark: The WCP dissector could crash while decompressing data (wnpa-sec-2015-07) wireshark: The pcapng file parser could crash (wnpa-sec-2015-08) wireshark: The TNEF dissector could go into an infinite loop on 32-bit architectures (wnpa-sec-2015-10) wireshark: crash on sample file genbroad.snoop wireshark: WebSocket DoS (wnpa-sec-2015-13) wireshark: WCP dissector crash (wnpa-sec-2015-14) wireshark: X11 memory leak (wnpa-sec-2015-15) wireshark: Reassembly memory leak (wnpa-sec-2015-16) wireshark: Dissector table crash (wnpa-sec-2015-23) wireshark: ZigBee dissector crash (wnpa-sec-2015-24) wireshark: GSM RLC/MAC dissector infinite loop (wnpa-sec-2015-25) wireshark: WaveAgent dissector crash (wnpa-sec-2015-26) wireshark: Ptvcursor crash (wnpa-sec-2015-28) | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | null | null |
RHSA-2023:4645 | Red Hat Security Advisory: .NET 6.0 security, bug fix, and enhancement update | dotnet: RCE under dotnet commands dotnet: Kestrel vulnerability to slow read attacks leading to Denial of Service attack | [
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb"
] | null | 7.5 | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.