id
stringlengths 13
15
| title
stringlengths 29
176
| description
stringlengths 8
32.1k
| cpes
sequencelengths 0
20
| cvss_v4_0
null | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
null |
---|---|---|---|---|---|---|---|
RHSA-2001:095 | Red Hat Security Advisory: : New util-linux packages available to fix vipw permissions problems | security flaw | [
"cpe:/o:redhat:linux:7.1"
] | null | null | null | null |
RHSA-2009:1335 | Red Hat Security Advisory: openssl security, bug fix, and enhancement update | openssl: mime_hdr_cmp NULL dereference crash openssl: ASN1 printing crash OpenSSL: DTLS epoch record buffer memory DoS OpenSSL: DTLS fragment handling memory DoS OpenSSL: DTLS pointer use-after-free flaw (DoS) openssl: DTLS NULL deref crash on early ChangeCipherSpec request openssl: DTLS out-of-sequence message handling NULL deref DoS | [
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2023:3540 | Red Hat Security Advisory: OpenShift Container Platform 4.13.3 bug fix and security update | golang: net/http, net/textproto: denial of service from excessive memory allocation golang: net/http, net/textproto, mime/multipart: denial of service from excessive resource consumption golang: go/parser: Infinite loop in parsing golang: html/template: backticks not treated as string delimiters golang: html/template: improper sanitization of CSS values golang: html/template: improper handling of empty HTML attributes | [
"cpe:/a:redhat:openshift:4.13::el9"
] | null | 7.3 | null | null |
RHSA-2015:0672 | Red Hat Security Advisory: bind security update | bind: issue in trust anchor management can cause named to crash | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation",
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | null | null |
RHSA-2015:2140 | Red Hat Security Advisory: libssh2 security and bug fix update | libssh2: Using SSH_MSG_KEXINIT data unbounded | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | null | null |
RHSA-2022:1185 | Red Hat Security Advisory: kpatch-patch security update | kernel: use-after-free in RDMA listen() kernel: fget: check that the fd still exists after getting a ref to it | [
"cpe:/o:redhat:enterprise_linux:7::server"
] | null | 7.4 | null | null |
RHSA-2025:1673 | Red Hat Security Advisory: mysql:8.0 security update | openssl: SSL_select_next_proto buffer overread curl: libcurl: ASN.1 date parser overread curl: curl netrc password leak mysql: PS unspecified vulnerability (CPU Oct 2024) mysql: InnoDB unspecified vulnerability (CPU Oct 2024) mysql: X Plugin unspecified vulnerability (CPU Oct 2024) mysql: Information Schema unspecified vulnerability (CPU Oct 2024) mysql: DDL unspecified vulnerability (CPU Oct 2024) mysql: InnoDB unspecified vulnerability (CPU Oct 2024) mysql: Optimizer unspecified vulnerability (CPU Oct 2024) mysql: FTS unspecified vulnerability (CPU Oct 2024) mysql: Health Monitor unspecified vulnerability (CPU Oct 2024) mysql: InnoDB unspecified vulnerability (CPU Oct 2024) mysql: InnoDB unspecified vulnerability (CPU Oct 2024) mysql: DML unspecified vulnerability (CPU Oct 2024) mysql: Optimizer unspecified vulnerability (CPU Oct 2024) mysql: Client programs unspecified vulnerability (CPU Oct 2024) mysql: InnoDB unspecified vulnerability (CPU Oct 2024) mysql: Group Replication GCS unspecified vulnerability (CPU Oct 2024) mysql: Thread Pooling unspecified vulnerability (CPU Oct 2024) mysql: InnoDB unspecified vulnerability (CPU Oct 2024) mysql: Optimizer unspecified vulnerability (CPU Oct 2024) mysql: mysqldump unspecified vulnerability (CPU Oct 2024) krb5: GSS message token handling mysql: High Privilege Denial of Service Vulnerability in MySQL Server mysql: MySQL Server InnoDB Denial of Service and Unauthorized Data Modification Vulnerability mysql: Privileges unspecified vulnerability (CPU Jan 2025) mysql: InnoDB unspecified vulnerability (CPU Jan 2025) mysql: Optimizer unspecified vulnerability (CPU Jan 2025) mysql: Optimizer unspecified vulnerability (CPU Jan 2025) mysql: InnoDB unspecified vulnerability (CPU Jan 2025) mysql: Optimizer unspecified vulnerability (CPU Jan 2025) mysql: Components Services unspecified vulnerability (CPU Jan 2025) mysql: Optimizer unspecified vulnerability (CPU Jan 2025) mysql: Privileges unspecified vulnerability (CPU Jan 2025) mysql: MySQL Server Options Vulnerability mysql: Thread Pooling unspecified vulnerability (CPU Jan 2025) mysql: Parser unspecified vulnerability (CPU Jan 2025) mysql: InnoDB unspecified vulnerability (CPU Jan 2025) mysql: DDL unspecified vulnerability (CPU Jan 2025) mysql: Information Schema unspecified vulnerability (CPU Jan 2025) mysql: InnoDB unspecified vulnerability (CPU Jan 2025) mysql: Performance Schema unspecified vulnerability (CPU Jan 2025) mysql: Optimizer unspecified vulnerability (CPU Jan 2025) mysql: Privileges unspecified vulnerability (CPU Jan 2025) mysql: Packaging unspecified vulnerability (CPU Jan 2025) mysql: Privilege Misuse in MySQL Server Security Component mysql: MySQL Server InnoDB Denial of Service and Unauthorized Data Modification Vulnerability mysql: MySQL Server InnoDB Denial of Service and Unauthorized Data Modification Vulnerability | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 5.5 | 5.9 | null |
RHSA-2022:8827 | Red Hat Security Advisory: RHACS 3.73 enhancement and security update | imgcrypt: Unauthorized access to encryted container image on a shared system due to missing check in CheckAuthorization() code path app-containers/cosign: false positive verification | [
"cpe:/a:redhat:advanced_cluster_security:3.73::el8"
] | null | 4.1 | null | null |
RHSA-2016:0065 | Red Hat Security Advisory: kernel-rt security update | kernel: Possible use-after-free vulnerability in keyring facility | [
"cpe:/a:redhat:rhel_extras_rt:7"
] | null | null | null | null |
RHSA-2017:0253 | Red Hat Security Advisory: spice-server security update | spice: Buffer overflow in main_channel_alloc_msg_rcv_buf when reading large messages spice: Remote DoS via crafted message | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | 7.5 | null |
RHSA-2023:1090 | Red Hat Security Advisory: samba security update | samba: RC4/HMAC-MD5 NetLogon Secure Channel is weak and should be avoided | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 8.1 | null | null |
RHSA-2022:8781 | Red Hat Security Advisory: Logging Subsystem 5.5.5 - Red Hat OpenShift security update | jackson-databind: denial of service via a large depth of nested objects golang: archive/tar: github.com/vbatts/tar-split: unbounded memory consumption when reading headers golang: net/http/httputil: ReverseProxy should not forward unparseable query parameters golang: net/http: handle server errors after sending GOAWAY golang: math/big: decoding big.Float and big.Rat types can panic if the encoded message is too short, potentially allowing a denial of service loader-utils: Regular expression denial of service golang: regexp/syntax: limit memory used by parsing regexps jackson-databind: deep wrapper array nesting wrt UNWRAP_SINGLE_VALUE_ARRAYS jackson-databind: use of deeply nested arrays | [
"cpe:/a:redhat:logging:5.5::el8"
] | null | 7.5 | null | null |
RHSA-2013:0162 | Red Hat Security Advisory: JBoss Enterprise SOA Platform 4.2.0.CP05 and 4.3.0.CP05 update | Web: Bypass of security constraints | [
"cpe:/a:redhat:jboss_enterprise_soa_platform:4.3.0:update5"
] | null | null | null | null |
RHSA-2014:0784 | Red Hat Security Advisory: Red Hat JBoss Web Server 2.0.1 httpd security and bug fix update | httpd: mod_dav denial of service via crafted DAV WRITE request httpd: mod_log_config does not properly handle logging certain cookies resulting in DoS | [
"cpe:/a:redhat:jboss_enterprise_web_server:2.0.1"
] | null | null | null | null |
RHSA-2023:0958 | Red Hat Security Advisory: vim security update | vim: no check if the return value of XChangeGC() is NULL | [
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/o:redhat:enterprise_linux:9::baseos"
] | null | 7.8 | null | null |
RHSA-2013:0582 | Red Hat Security Advisory: Red Hat OpenShift Enterprise 1.1.1 update | rubygem-actionpack: Unsafe query generation rubygem-activerecord: SQL injection when processing nested query paramaters rubygem-actionpack: Unsafe query generation (a different flaw than CVE-2012-2660) rubygem-activerecord: SQL injection when processing nested query paramaters (a different flaw than CVE-2012-2661) rubygem-actionpack: DoS vulnerability in authenticate_or_request_with_http_digest rubygem-actionpack: potential XSS vulnerability in select_tag prompt rubygem-actionpack: potential XSS vulnerability rubygem-actionpack: XSS Vulnerability in strip_tags 1.9.3: Possibility to bypass Ruby's $SAFE (level 4) semantics ruby: safe level bypass via name_err_mesg_to_str() ruby: unintentional file creation caused by inserting an illegal NUL character ruby: Murmur hash-flooding DoS flaw in ruby 1.9 (oCERT-2012-001) rubygem-activerecord: Unsafe Query Generation Risk in Ruby on Rails rubygem-ruby_parser: incorrect temporary file usage rubygem-activerecord/rubygem-activemodel: circumvention of attr_protected | [
"cpe:/a:redhat:openshift:1::el6"
] | null | null | null | null |
RHSA-2024:4010 | Red Hat Security Advisory: OpenShift Container Platform 4.14.31 security update | golang: net/http, x/net/http2: unlimited number of CONTINUATION frames causes DoS ssh: Prefix truncation attack on Binary Packet Protocol (BPP) go-git: Maliciously crafted Git server replies can cause DoS on go-git clients jose-go: improper handling of highly compressed data | [
"cpe:/a:redhat:openshift:4.14::el8",
"cpe:/a:redhat:openshift:4.14::el9"
] | null | 4.3 | null | null |
RHBA-2024:10760 | Red Hat Bug Fix Advisory: Red Hat Developer Hub 1.3.3 bugfix release | cross-spawn: regular expression denial of service | [
"cpe:/a:redhat:rhdh:1.3::el9"
] | null | 4.4 | null | null |
RHSA-2013:0562 | Red Hat Security Advisory: Red Hat Enterprise MRG Messaging 2.3 security update | qpid-cpp: qpid authentication bypass qpid-cpp: long arrays of zero-width types cause a denial of service qpid-cpp: crash due to qpid::framing::Buffer::checkAvailable() wraparound | [
"cpe:/a:redhat:enterprise_mrg:2:computenode:el6",
"cpe:/a:redhat:enterprise_mrg:2:server:el6"
] | null | null | null | null |
RHSA-2023:3325 | Red Hat Security Advisory: Multicluster Engine for Kubernetes 2.1.7 security fixes and container updates | vm2: Inspect Manipulation vm2: Sandbox Escape | [
"cpe:/a:redhat:multicluster_engine:2.1::el8"
] | null | 9.8 | null | null |
RHSA-2024:6462 | Red Hat Security Advisory: Cost Management enhancement and security update | golang: net: malformed DNS message can cause infinite loop golang: net/netip: Unexpected behavior from Is methods for IPv4-mapped IPv6 addresses net/http: Denial of service due to improper 100-continue handling in net/http | [
"cpe:/a:redhat:cost_management:1::el8"
] | null | 5.9 | null | null |
RHSA-2008:1001 | Red Hat Security Advisory: tog-pegasus security update | tog-pegasus: WBEM services access not restricted to dedicated user after 2.7.0 rebase tog-pegasus: failed authentication attempts not logged via PAM | [
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2019:2413 | Red Hat Security Advisory: Red Hat Fuse 7.4.0 security update | hazelcast: java deserialization in join cluster procedure leading to remote code execution spring-security-core: Unauthorized Access with Spring Security Method Security thrift: SASL negotiation isComplete validation bypass in the org.apache.thrift.transport.TSaslTransport class slf4j: Deserialisation vulnerability in EventData constructor can allow for arbitrary code execution jolokia: system-wide CSRF that could lead to Remote Code Execution spring-security-oauth: Privilege escalation by manipulating saved authorization request solr: remote code execution due to unsafe deserialization wildfly: Race condition on PID file allows for termination of arbitrary processes by local users | [
"cpe:/a:redhat:jboss_fuse:7"
] | null | null | 5.5 | null |
RHSA-2023:1079 | Red Hat Security Advisory: Red Hat OpenStack Platform 16.2 (osp-director-downloader-container, osp-director-agent-container and osp-director-operator-container) security update | golang: archive/tar: github.com/vbatts/tar-split: unbounded memory consumption when reading headers golang: regexp/syntax: limit memory used by parsing regexps golang: net/http: excessive memory growth in a Go server accepting HTTP/2 requests | [
"cpe:/a:redhat:openstack:16.2::el8"
] | null | 5.3 | null | null |
RHSA-2024:6187 | Red Hat Security Advisory: gvisor-tap-vsock security update | golang: crypto/x509: Verify panics on certificates with an unknown public key algorithm | [
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 5.9 | null | null |
RHBA-2024:3840 | Red Hat Bug Fix Advisory: golang bug fix update | golang: net: malformed DNS message can cause infinite loop | [
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 7.5 | null | null |
RHSA-2025:0012 | Red Hat Security Advisory: python-requests security update | requests: subsequent requests to the same host ignore cert verification | [
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 5.6 | null | null |
RHSA-2007:0932 | Red Hat Security Advisory: pwlib security update | ekiga GetHostAddress remote DoS | [
"cpe:/a:redhat:rhel_productivity:5",
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation"
] | null | null | null | null |
RHSA-2015:2550 | Red Hat Security Advisory: libxml2 security update | libxml2: denial of service processing a crafted XML document libxml2: CPU exhaustion when processing specially crafted XML input libxml2: Heap-based buffer overflow in xmlDictComputeFastQKey libxml2: Heap-based buffer overflow in xmlParseXmlDecl libxml2: Heap-based buffer overflow in xmlGROW libxml2: Heap buffer overflow in xmlParseMisc libxml2: Out-of-bounds memory access libxml2: heap-based buffer overflow in xmlParseConditionalSections() libxml2: Buffer overread with XML parser in xmlNextChar libxml2: Buffer overread with HTML parser in push mode in xmlSAX2TextNode libxml2: Out-of-bounds heap read when parsing file with unfinished xml declaration libxml2: out-of-bounds memory access when parsing an unclosed HTML comment | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | null | null |
RHSA-2024:4971 | Red Hat Security Advisory: emacs security update | emacs: org-link-expand-abbrev: Do not evaluate arbitrary unsafe Elisp code | [
"cpe:/a:redhat:rhel_aus:8.6::appstream",
"cpe:/a:redhat:rhel_e4s:8.6::appstream",
"cpe:/a:redhat:rhel_tus:8.6::appstream",
"cpe:/o:redhat:rhel_aus:8.6::baseos",
"cpe:/o:redhat:rhel_e4s:8.6::baseos",
"cpe:/o:redhat:rhel_tus:8.6::baseos"
] | null | 7.8 | null | null |
RHSA-2018:2482 | Red Hat Security Advisory: docker security and bug fix update | docker: container breakout without selinux in enforcing mode | [
"cpe:/a:redhat:rhel_extras_other:7"
] | null | null | 6.3 | null |
RHSA-2020:2474 | Red Hat Security Advisory: libexif security update | libexif: several buffer over-reads in EXIF MakerNote handling can lead to information disclosure and DoS | [
"cpe:/a:redhat:rhel_e4s:8.0::appstream"
] | null | 9.1 | null | null |
RHSA-2021:0073 | Red Hat Security Advisory: kernel security and bug fix update | kernel: soft-lockups in iov_iter_copy_from_user_atomic() could result in DoS | [
"cpe:/a:redhat:rhel_eus:8.2::crb",
"cpe:/o:redhat:rhel_eus:8.2::baseos"
] | null | 5.5 | null | null |
RHSA-2020:5479 | Red Hat Security Advisory: linux-firmware security and enhancement update | hardware: buffer overflow in bluetooth firmware | [
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 8.8 | null | null |
RHSA-2024:4500 | Red Hat Security Advisory: firefox security update | Mozilla: Race condition in permission assignment Mozilla: Memory corruption in thread creation Mozilla: Memory safety bugs fixed in Firefox 128, Firefox ESR 115.13, and Thunderbird 115.13 | [
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 7.5 | null | null |
RHSA-2024:6236 | Red Hat Security Advisory: Red Hat Advanced Cluster Management 2.10.5 security and bug fix update | opentelemetry: DoS vulnerability in otelhttp opentelemetry-go-contrib: DoS vulnerability in otelgrpc due to unbound cardinality metrics | [
"cpe:/a:redhat:acm:2.10::el9"
] | null | 7.5 | null | null |
RHSA-2025:0221 | Red Hat Security Advisory: dpdk security update | dpdk: Denial Of Service from malicious guest on hypervisors using DPDK Vhost library | [
"cpe:/a:redhat:rhel_aus:8.6::appstream",
"cpe:/a:redhat:rhel_e4s:8.6::appstream",
"cpe:/a:redhat:rhel_tus:8.6::appstream"
] | null | null | 7.4 | null |
RHSA-2022:1599 | Red Hat Security Advisory: convert2rhel security update | convert2rhel: Red Hat account password passed via command line by code | [
"cpe:/a:redhat:convert2rhel::el8"
] | null | 6.5 | null | null |
RHSA-2011:0261 | Red Hat Security Advisory: bash security and bug fix update | bash: Insecure temporary file use in aliasconv.sh, aliasconv.bash, cshtobash (symlink attack) | [
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2021:4039 | Red Hat Security Advisory: devtoolset-10-gcc security update | environment: Unicode's bidirectional (BiDi) override characters can cause trojan source attacks | [
"cpe:/a:redhat:rhel_software_collections:3::el7"
] | null | 8.5 | null | null |
RHSA-2012:1407 | Red Hat Security Advisory: firefox security update | Mozilla: Fixes for Location object issues (MFSA 2012-90) Mozilla: Fixes for Location object issues (MFSA 2012-90) Mozilla: Fixes for Location object issues (MFSA 2012-90) | [
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server",
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2013:0784 | Red Hat Security Advisory: Red Hat Enterprise Linux 6.1 Extended Update Support 1-Month Notice | This is the 1-Month notification for the retirement of Red Hat Enterprise
Linux 6.1 Extended Update Support (EUS). | [
"cpe:/o:redhat:rhel_eus:6.1"
] | null | null | null | null |
RHSA-2023:7617 | Red Hat Security Advisory: Red Hat Build of Apache Camel for Quarkus 3.2.0 release (RHBQ 3.2.9.Final) | JSON-java: parser confusion leads to OOM apache-avro: Apache Avro Java SDK: Memory when deserializing untrusted data in Avro Java SDK | [
"cpe:/a:redhat:camel_quarkus:3.2.0"
] | null | 7.5 | null | null |
RHSA-2004:600 | Red Hat Security Advisory: apache, mod_ssl security update | httpd mod_digest nonce not verified mod_ssl SSLCipherSuite bypass httpd mod_include SSI overflow | [
"cpe:/o:redhat:enterprise_linux:2.1::as",
"cpe:/o:redhat:enterprise_linux:2.1::aw",
"cpe:/o:redhat:enterprise_linux:2.1::es",
"cpe:/o:redhat:enterprise_linux:2.1::ws"
] | null | null | null | null |
RHSA-2024:4372 | Red Hat Security Advisory: virt:rhel and virt-devel:rhel security update | qemu-kvm: 'qemu-img info' leads to host file read/write | [
"cpe:/a:redhat:rhel_eus:8.8::appstream",
"cpe:/a:redhat:rhel_eus:8.8::crb"
] | null | 7.8 | null | null |
RHSA-2005:875 | Red Hat Security Advisory: curl security update | security flaw | [
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2012:0343 | Red Hat Security Advisory: java-1.4.2-ibm-sap security update | HTTPS: block-wise chosen-plaintext attack against SSL/TLS (BEAST) JDK: unspecified vulnerability fixed in 6u29 (Sound) OpenJDK: InputStream skip() information leak (Networking/IO, 7000600) OpenJDK: mutable static AWTKeyStroke.ctor (AWT, 7019773) JDK: unspecified vulnerability fixed in 6u29 (Swing) OpenJDK: excessive default UDP socket limit under SecurityManager (Networking, 7032417) OpenJDK: RMI DGC server remote code execution (RMI, 7077466) OpenJDK: RMI registry privileged code execution (RMI, 7083012) OpenJDK: missing checkSetFactory calls in HttpsURLConnection (JSSE, 7096936) | [
"cpe:/a:redhat:rhel_extras_sap:4",
"cpe:/a:redhat:rhel_extras_sap:5"
] | null | null | null | null |
RHSA-2019:1147 | Red Hat Security Advisory: rh-ror50-rubygem-actionpack security update | rubygem-actionpack: render file directory traversal in Action View rubygem-actionpack: denial of service vulnerability in Action View | [
"cpe:/a:redhat:rhel_software_collections:3::el6",
"cpe:/a:redhat:rhel_software_collections:3::el7"
] | null | null | 5.9 | null |
RHSA-2019:3978 | Red Hat Security Advisory: kernel-rt security and bug fix update | Kernel: KVM: OOB memory access via mmio ring buffer kernel: local attacker can trigger multiple use-after-free conditions results in privilege escalation | [
"cpe:/a:redhat:rhel_extras_rt:7"
] | null | null | 7.4 | null |
RHSA-2011:1243 | Red Hat Security Advisory: thunderbird security update | An updated thunderbird package that fixes one security issue is now
available for Red Hat Enterprise Linux 4, 5, and 6.
The Red Hat Security Response Team has rated this update as having
important security impact. | [
"cpe:/a:redhat:rhel_productivity:5",
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws",
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:6::server"
] | null | null | null | null |
RHSA-2020:2277 | Red Hat Security Advisory: kernel security update | kernel: double free may be caused by the function allocate_trace_buffer in the file kernel/trace/trace.c kernel: use-after-free in __blk_add_trace in kernel/trace/blktrace.c Kernel: NetLabel: null pointer dereference while receiving CIPSO packet with null category may cause kernel panic | [
"cpe:/o:redhat:rhel_aus:7.3::server",
"cpe:/o:redhat:rhel_e4s:7.3::server",
"cpe:/o:redhat:rhel_tus:7.3::server"
] | null | 5.9 | null | null |
RHSA-2024:10147 | Red Hat Security Advisory: OpenShift Container Platform 4.16.24 security update | Podman: Buildah: cri-o: FIPS Crypto-Policy Directory Mounting Issue in containers/common Go Library Buildah: Podman: Improper Input Validation in bind-propagation Option of Dockerfile RUN --mount Instruction golang-protobuf: encoding/protojson, internal/encoding/json: infinite loop in protojson.Unmarshal when unmarshaling certain forms of invalid JSON | [
"cpe:/a:redhat:openshift:4.16::el9"
] | null | 5.9 | null | null |
RHSA-2018:2576 | Red Hat Security Advisory: java-1.7.1-ibm security update | JDK: DoS in the java.math component JDK: path traversal flaw in the Diagnostic Tooling Framework JDK: unspecified vulnerability fixed in 6u201, 7u191, 8u181, and 10.0.2 (Libraries) OpenJDK: insufficient index validation in PatternSyntaxException getMessage() (Concurrency, 8199547) JDK: unspecified vulnerability fixed in 6u201, 7u191, 8u181, and 10.0.2 (JSSE) JDK: privilege escalation via insufficiently restricted access to Attach API | [
"cpe:/a:redhat:rhel_extras:6"
] | null | null | 8.4 | null |
RHSA-2020:3658 | Red Hat Security Advisory: librepo security update | librepo: missing path validation in repomd.xml may lead to directory traversal | [
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 8 | null | null |
RHSA-2007:0337 | Red Hat Security Advisory: postgresql security update | PostgreSQL security-definer function privilege escalation | [
"cpe:/a:redhat:rhel_application_stack:1"
] | null | null | null | null |
RHSA-2011:0027 | Red Hat Security Advisory: python security, bug fix, and enhancement update | python: untrusted python modules search path python: rgbimg: multiple security issues python: rgbimg: multiple security issues python: rgbimg: multiple security issues python: audioop: incorrect integer overflow checks Python: Memory corruption in audioop module | [
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2022:0265 | Red Hat Security Advisory: polkit security update | polkit: Local privilege escalation in pkexec due to incorrect handling of argument vector | [
"cpe:/o:redhat:rhel_eus:8.2::baseos"
] | null | 7.8 | null | null |
RHSA-2013:0234 | Red Hat Security Advisory: JBoss Enterprise Application Platform 6.0.1 security update | JBoss: allows empty password to authenticate against LDAP | [
"cpe:/a:redhat:jboss_enterprise_application_platform:6.0.1"
] | null | null | null | null |
RHSA-2019:3300 | Red Hat Security Advisory: rh-php71-php security update | php: underflow in env_path_info in fpm_main.c | [
"cpe:/a:redhat:rhel_software_collections:3::el7"
] | null | null | 8.1 | null |
RHSA-2023:5192 | Red Hat Security Advisory: firefox security update | libwebp: Heap buffer overflow in WebP Codec libwebp: out-of-bounds write with a specially crafted WebP lossless file | [
"cpe:/a:redhat:rhel_aus:8.4::appstream",
"cpe:/a:redhat:rhel_e4s:8.4::appstream",
"cpe:/a:redhat:rhel_tus:8.4::appstream"
] | null | 0 | null | null |
RHSA-2017:3471 | Red Hat Security Advisory: qemu-kvm-rhev security and bug fix update | Qemu: qemu-nbd crashes due to undefined I/O coroutine Qemu: qemu-nbd: server breaks with SIGPIPE upon client abort Qemu: exec: oob access during dma operation Qemu: i386: multiboot OOB access while loading kernel image Qemu: cirrus: OOB access issue in mode4and5 write functions | [
"cpe:/a:redhat:openstack:8::el7"
] | null | null | 4.4 | null |
RHSA-2015:1676 | Red Hat Security Advisory: redis security advisory | redis: Lua sandbox escape and arbitrary code execution | [
"cpe:/a:redhat:openstack:6::el7"
] | null | null | null | null |
RHSA-2019:3843 | Red Hat Security Advisory: kernel security update | hw: Machine Check Error on Page Size Change (IFU) hw: TSX Transaction Asynchronous Abort (TAA) | [
"cpe:/o:redhat:rhel_aus:6.5::server"
] | null | null | 6.5 | null |
RHSA-2024:5535 | Red Hat Security Advisory: python3.9 security update | python: Path traversal on tempfile.TemporaryDirectory | [
"cpe:/a:redhat:rhel_eus:9.2::appstream",
"cpe:/a:redhat:rhel_eus:9.2::crb",
"cpe:/o:redhat:rhel_eus:9.2::baseos"
] | null | 7.8 | null | null |
RHSA-2016:1137 | Red Hat Security Advisory: openssl security update | openssl: Memory corruption in the ASN.1 encoder | [
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | 5.6 | null |
RHSA-2024:2666 | Red Hat Security Advisory: OpenShift Container Platform 4.14.24 security and extras update | golang-protobuf: encoding/protojson, internal/encoding/json: infinite loop in protojson.Unmarshal when unmarshaling certain forms of invalid JSON | [
"cpe:/a:redhat:openshift:4.14::el8",
"cpe:/a:redhat:openshift:4.14::el9"
] | null | 5.9 | null | null |
RHSA-2020:2040 | Red Hat Security Advisory: squid security update | squid: improper check for new member in ESIExpression::Evaluate allows for stack buffer overflow squid: parsing of header Proxy-Authentication leads to memory corruption squid: improper access restriction upon Digest Authentication nonce replay could lead to remote code execution | [
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 8.1 | 4.3 | null |
RHSA-2020:5372 | Red Hat Security Advisory: net-snmp security update | net-snmp: Improper Privilege Management in EXTEND MIB may lead to privileged commands execution | [
"cpe:/a:redhat:rhel_eus:8.1::appstream",
"cpe:/o:redhat:rhel_eus:8.1::baseos"
] | null | 8.8 | null | null |
RHSA-2022:8317 | Red Hat Security Advisory: samba security, bug fix, and enhancement update | samba: server memory information leak via SMB1 | [
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::crb",
"cpe:/a:redhat:enterprise_linux:9::resilientstorage",
"cpe:/o:redhat:enterprise_linux:9::baseos"
] | null | 4.3 | null | null |
RHSA-2016:1135 | Red Hat Security Advisory: Red Hat JBoss Data Virtualization security and bug fix update | apache-poi: denial of service in HSLFSlideShow via corrupted PPT file bsh2: remote code execution via deserialization | [
"cpe:/a:redhat:jboss_data_virtualization:6.2"
] | null | null | 7.4 | null |
RHSA-2020:4290 | Red Hat Security Advisory: virt:8.1 and virt-devel:8.1 security update | QEMU: slirp: use-after-free in ip_reass() function in ip_input.c QEMU: usb: out-of-bounds r/w access issue while processing usb packets | [
"cpe:/a:redhat:advanced_virtualization:8.1::el8"
] | null | 5 | null | null |
RHSA-2024:4028 | Red Hat Security Advisory: Release of OpenShift Serverless 1.33.0 security update & enhancements | golang: net/http/cookiejar: incorrect forwarding of sensitive headers and cookies on HTTP redirect quarkus-core: Leak of local configuration properties into Quarkus applications golang: crypto/x509: Verify panics on certificates with an unknown public key algorithm golang: net/mail: comments in display names are incorrectly handled golang: html/template: errors returned from MarshalJSON methods may break template escaping golang-protobuf: encoding/protojson, internal/encoding/json: infinite loop in protojson.Unmarshal when unmarshaling certain forms of invalid JSON jose-go: improper handling of highly compressed data netty-codec-http: Allocation of Resources Without Limits or Throttling | [
"cpe:/a:redhat:openshift_serverless:1.33::el8"
] | null | 5.3 | null | null |
RHSA-2012:1392 | Red Hat Security Advisory: java-1.6.0-sun security update | OpenJDK: AWT hardening fixes (AWT, 7163201) JDK: unspecified vulnerability (2D) JDK: unspecified vulnerability (Deployment) JDK: unspecified vulnerability (Deployment) JDK: unspecified vulnerability (JMX) JDK: unspecified vulnerability (Deployment) OpenJDK: java.io.FilePermission information leak (Libraries, 6631398) OpenJDK: uninitialized Array JVM memory disclosure (Hotspot, 7198606) OpenJDK: RhinoScriptEngine security bypass (Scripting, 7143535) OpenJDK: Executors state handling issues (Concurrency, 7189103) OpenJDK: DescriptorSupport insufficient package access checks (JMX, 7192975) OpenJDK: AccessController.doPrivilegedWithCombiner() information disclosure (Security, 7172522) OpenJDK: LogManager security bypass (Libraries, 7169884) OpenJDK: RMIConnectionImpl information disclosure (JMX, 7169888) OpenJDK: SecureRandom mulitple seeders information disclosure (Security, 7167656) OpenJDK: ServiceLoader reject not subtype classes without instantiating (Libraries, 7195919) OpenJDK: JSSE denial of service (JSSE, 7186286) JDK: unspecified vulnerability (2D) OpenJDK: DefaultFormatter insufficient data validation (Swing, 7195194) OpenJDK: disable Gopher support by default (Gopher, 7189567) OpenJDK: XMLDecoder sandbox restriction bypass (Beans, 7195917) OpenJDK: RMIConnectionImpl insufficient access control checks (JMX, 7198296) | [
"cpe:/a:redhat:rhel_extras:5::client",
"cpe:/a:redhat:rhel_extras:5::server",
"cpe:/a:redhat:rhel_extras:6"
] | null | null | null | null |
RHSA-2023:5216 | Red Hat Security Advisory: open-vm-tools security update | open-vm-tools: SAML token signature bypass | [
"cpe:/a:redhat:rhel_aus:8.4::appstream",
"cpe:/a:redhat:rhel_e4s:8.4::appstream",
"cpe:/a:redhat:rhel_tus:8.4::appstream"
] | null | 7.1 | null | null |
RHSA-2024:6406 | Red Hat Security Advisory: OpenShift Container Platform 4.14.36 security update | opentelemetry: DoS vulnerability in otelhttp golang: net/http, x/net/http2: unlimited number of CONTINUATION frames causes DoS opentelemetry-go-contrib: DoS vulnerability in otelgrpc due to unbound cardinality metrics ssh: Prefix truncation attack on Binary Packet Protocol (BPP) coredns: CD bit response is cached and served later bind: bind9: BIND's database will be slow if a very large number of RRs exist at the same nam bind9: bind: SIG(0) can be used to exhaust CPU resources bind: bind9: Assertion failure when serving both stale cache data and authoritative zone content go-retryablehttp: url might write sensitive information to log file python-werkzeug: user may execute code on a developer's machine | [
"cpe:/a:redhat:openshift:4.14::el8",
"cpe:/a:redhat:openshift:4.14::el9"
] | null | 7.5 | null | null |
RHSA-2018:2181 | Red Hat Security Advisory: gnupg2 security update | gnupg2: Improper sanitization of filenames allows for the display of fake status messages and the bypass of signature verification | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 7.5 | null |
RHSA-2023:0192 | Red Hat Security Advisory: java-17-openjdk security and bug fix update | OpenJDK: handshake DoS attack against DTLS connections (JSSE, 8287411) OpenJDK: soundbank URL remote loading (Sound, 8293742) | [
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb"
] | null | 3.7 | null | null |
RHSA-2020:1518 | Red Hat Security Advisory: git security update | git: Crafted URL containing new lines can cause credential leak | [
"cpe:/a:redhat:rhel_e4s:8.0::appstream"
] | null | 7.5 | null | null |
RHSA-2022:5766 | Red Hat Security Advisory: firefox security update | Mozilla: Memory safety bugs fixed in Firefox 103 and 102.1 Mozilla: Directory indexes for bundled resources reflected URL parameters Mozilla: Mouse Position spoofing with CSS transforms | [
"cpe:/a:redhat:rhel_e4s:8.1::appstream"
] | null | 7.5 | 6.1 | null |
RHSA-2016:1086 | Red Hat Security Advisory: libndp security update | libndp: denial of service due to insufficient validation of source of NDP messages | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | null | null |
RHSA-2024:1482 | Red Hat Security Advisory: java-1.8.0-ibm security update | OpenJDK: array out-of-bounds access due to missing range check in C1 compiler (8314468) OpenJDK: range check loop optimization issue (8314307) OpenJDK: arbitrary Java code execution in Nashorn (8314284) OpenJDK: logging of digital signature private keys (8316976) OpenJDK: RSA padding issue and timing side-channel attack against TLS (8317547) | [
"cpe:/a:redhat:rhel_extras:7"
] | null | 7.4 | null | null |
RHSA-2021:2065 | Red Hat Security Advisory: Red Hat Single Sign-On 7.4.7 security update on RHEL 8 | keycloak: Internationalized domain name (IDN) homograph attack to impersonate users keycloak: Backchannel logout not working when Principal Type is set to Attribute Name for external SAML IDP | [
"cpe:/a:redhat:red_hat_single_sign_on:7::el8"
] | null | 7.1 | null | null |
RHSA-2024:3254 | Red Hat Security Advisory: container-tools:rhel8 security update | golang: net/http/httputil: ReverseProxy should not forward unparseable query parameters golang: regexp/syntax: limit memory used by parsing regexps buildah: full container escape at build time golang-protobuf: encoding/protojson, internal/encoding/json: infinite loop in protojson.Unmarshal when unmarshaling certain forms of invalid JSON jose-go: improper handling of highly compressed data | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 4.3 | null | null |
RHSA-2018:3656 | Red Hat Security Advisory: kernel-alt security and bug fix update | kernel: Use-after-free in the vmacache_flush_all function resulting in a possible privilege escalation kernel: Privilege escalation on arm64 via KVM hypervisor | [
"cpe:/o:redhat:enterprise_linux:7::server"
] | null | null | 6.7 | null |
RHSA-2022:8194 | Red Hat Security Advisory: libtiff security update | libtiff: Denial of Service via crafted TIFF file libtiff: Null source pointer lead to Denial of Service via crafted TIFF file libtiff: reachable assertion libtiff: heap buffer overflow in extractImageSection tiff: Null source pointer passed as an argument to memcpy in TIFFFetchNormalTag() in tif_dirread.c tiff: Divide By Zero error in tiffcrop libtiff: Out-of-bounds Read error in tiffcp libtiff: heap-buffer-overflow in TIFFReadRawDataStriped() in tiffinfo.c libtiff: stack-buffer-overflow in tiffcp.c in main() libtiff: out-of-bounds read in _TIFFmemcpy() in tif_unix.c | [
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::crb"
] | null | 5.5 | null | null |
RHSA-2016:1633 | Red Hat Security Advisory: kernel security and bug fix update | kernel: challenge ACK counter information disclosure. | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 4.8 | null |
RHSA-2007:1024 | Red Hat Security Advisory: kdegraphics security update | DCTStream:: readProgressiveDataUnit() DCTStream:: reset() CCITTFaxStream:: lookChar() | [
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2020:0918 | Red Hat Security Advisory: thunderbird security update | usrsctp: Out of bounds reads in sctp_load_addresses_from_init() Mozilla: Use-after-free when removing data about origins Mozilla: BodyStream:: OnInputStreamReady was missing protections against state confusion Mozilla: Use-after-free in cubeb during stream destruction Mozilla: Devtools' 'Copy as cURL' feature did not fully escape website-controlled data, potentially leading to command injection Mozilla: The names of AirPods with personally identifiable information were exposed to websites with camera or microphone permission Mozilla: Memory safety bugs fixed in Firefox 74 and Firefox ESR 68.6 | [
"cpe:/a:redhat:rhel_e4s:8.0::appstream"
] | null | 9.8 | 6.1 | null |
RHSA-2016:1041 | Red Hat Security Advisory: thunderbird security update | Mozilla: Miscellaneous memory safety hazards (rv:38.8) (MFSA 2016-39) Mozilla: Miscellaneous memory safety hazards (rv:46.0 / rv:45.1 / rv:38.8) (MFSA 2016-39) | [
"cpe:/a:redhat:rhel_productivity:5",
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation",
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | null | null |
RHSA-2007:0981 | Red Hat Security Advisory: thunderbird security update | security flaw security flaw security flaw about: blank windows security flaw security flaw security flaw security flaw security flaw | [
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws",
"cpe:/o:redhat:enterprise_linux:5::client"
] | null | null | null | null |
RHSA-2013:1850 | Red Hat Security Advisory: openjpeg security update | openjpeg: multiple denial of service flaws openjpeg: heap-based buffer overflows openjpeg: out-of-bounds memory read flaws openjpeg: heap-based buffer overflows in version 1.3 | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | 7.5 | null |
RHSA-2020:3032 | Red Hat Security Advisory: mod_auth_openidc:2.3 security and bug fix update | mod_auth_openidc: Open redirect in logout url when using URLs with leading slashes mod_auth_openidc: Open redirect issue exists in URLs with slash and backslash | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 6.1 | null | null |
RHSA-2019:0349 | Red Hat Security Advisory: .NET Core on Red Hat Enterprise Linux security update for February 2019 | dotnet: Domain-spoofing attack in System.Uri | [
"cpe:/a:redhat:rhel_dotnet:1.0::el7",
"cpe:/a:redhat:rhel_dotnet:1.1::el7",
"cpe:/a:redhat:rhel_dotnet:2.1::el7",
"cpe:/a:redhat:rhel_dotnet:2.2::el7"
] | null | null | 7.5 | null |
RHSA-2019:0580 | Red Hat Security Advisory: openstack-ceilometer security and bug fix update | openstack-ceilometer: ceilometer-agent prints sensitive data from config files through log files | [
"cpe:/a:redhat:openstack:14::el7"
] | null | null | 4 | null |
RHSA-2008:0641 | Red Hat Security Advisory: acroread security update | acroread: insecure handling of temporary files acroread: input validation issue in a JavaScript method | [
"cpe:/a:redhat:rhel_extras:3",
"cpe:/a:redhat:rhel_extras:4",
"cpe:/a:redhat:rhel_extras:5::client",
"cpe:/a:redhat:rhel_extras:5::server"
] | null | null | null | null |
RHSA-2021:5072 | Red Hat Security Advisory: Red Hat OpenStack Platform 16.1 (etcd) security update | golang: net/http: panic in ReadRequest and ReadResponse when reading a very large header golang: net: lookup functions may return invalid host names golang: net/http/httputil: ReverseProxy forwards connection headers if first one is empty golang: math/big.Rat: may cause a panic or an unrecoverable fatal error if passed inputs with very large exponents | [
"cpe:/a:redhat:openstack:16.1::el8"
] | null | 7.5 | null | null |
RHSA-2024:9187 | Red Hat Security Advisory: bcc security update | bcc: unprivileged users can force loading of compromised linux headers | [
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::crb"
] | null | 2.8 | null | null |
RHSA-2016:2137 | Red Hat Security Advisory: java-1.7.1-ibm security update | OpenJDK: missing algorithm restrictions for jar verification (Libraries, 8155973) OpenJDK: insufficient classloader consistency checks in ClassLoaderWithRepository (JMX, 8157739) JDK: unspecified vulnerability fixed in 6u131, 7u121, and 8u111 (2D) OpenJDK: insufficient checks of JDWP packets (Hotspot, 8159519) OpenJDK: exposure of server authentication credentials to proxy (Networking, 8160838) | [
"cpe:/a:redhat:rhel_extras:6",
"cpe:/a:redhat:rhel_extras:7"
] | null | null | 5.3 | null |
RHEA-2018:0705 | Red Hat Enhancement Advisory: tcpdump bug fix and enhancement update | tcpdump: Heap buffer overflow in the EXTRACT_16BITS function tcpdump: heap-based buffer over-read in the lldp_print tcpdump: heap-based buffer over-read in the pimv1_print tcpdump: buffer overflow in the sliplink_print function tcpdump: Segmentation Violation in the compressed_sl_print tcpdump: Buffer over-read in smbutil.c:name_len() in SMB/CIFS parser tcpdump: Buffer over-read in addrtoname.c:lookup_bytestring() tcpdump: Buffer over-read in print-icmp.c:icmp_print() in ICMP parser tcpdump: Buffer over-read in print-isakmp.c:isakmp_rfc3948_print() in ISAKMP parser tcpdump: Buffer over-read in print-isoclns.c:isoclns_print() in ISO CLNS parser tcpdump: Buffer over-read in print-nfs.c:interp_reply() in NFS parser tcpdump: Buffer over-read in print-decnet.c:decnet_print() in DECnet parser tcpdump: Buffer over-read in util-print.c:tok2strbuf() tcpdump: Buffer over-read in print-eigrp.c:eigrp_print() in EIGRP parser tcpdump: Buffer over-read in print-zephyr.c, several functions in Zephyr parser tcpdump: Buffer over-read in print-ip6.c:ip6_print() in IPv6 parser tcpdump: Buffer over-read in print-rt6.c:rt6_print() in IPv6 routing header parser tcpdump: Buffer over-read in print-802_11.c:parse_elements() in IEEE 802.11 parser tcpdump: Buffer over-read in print-telnet.c:telnet_parse() in telnet parser tcpdump: Infinite loop due to a bug in print-resp.c:resp_get_length() in RESP parser tcpdump: Infinite loop due to bugs in print-isakmp.c, several functions in ISAKMP parser tcpdump: Buffer over-read in print-bgp.c:bgp_attr_print() in BGP parser tcpdump: Buffer over-read in print-ripng.c:ripng_print() in RIPng parser tcpdump: Buffer over-read in print-juniper.c, several functions in Juniper protocols parser tcpdump: Buffer over-read in print-bgp.c:bgp_attr_print() in BGP parser tcpdump: Infinite loop due to a bug in print-domain.c:ns_print() in DNS parser tcpdump: Buffer over-read in print-pim.c:pimv2_print() in PIMv2 parser tcpdump: Infinite loop due to a bug in print-lldp.c:lldp_private_8021_print() in LLDP parser tcpdump: Buffer over-read in print-isoclns.c:isis_print_extd_ip_reach() in IS-IS parser tcpdump: Buffer over-read in print-isoclns.c:isis_print() in IS-IS parser tcpdump: Buffer over-read in print-802_15_4.c:ieee802_15_4_if_print() in IEEE 802.15.4 parser tcpdump: Buffer over-read in print-nfs.c:nfs_printfh() in NFS parser tcpdump: Buffer over-read in print-aodv.c:aodv_extension() in AODV parser tcpdump: Buffer over-read in print-lmp.c:lmp_print() in LMP parser tcpdump: Buffer over-read in print-juniper.c:juniper_parse_header() in Juniper protocols parser tcpdump: Buffer over-read in print-nfs.c:xid_map_enter() in NFS parser tcpdump: Buffer over-read in print-l2tp.c, several functions in L2TP parser tcpdump: Buffer over-read in print-pktap.c:pktap_if_print() in Apple PKTAP parser tcpdump: Buffer over-read in print-802_11.c:parse_elements() in IEEE 802.11 parser tcpdump: Buffer over-read in print-mobility.c:mobility_print() in IPv6 mobility parser tcpdump: Buffer over-read in print-beep.c:l_strnstart() in BEEP parser tcpdump: Buffer overflow in util-print.c:bittok2str_internal() tcpdump: Buffer over-read in print-icmp.c:icmp_print() in ICMP parser tcpdump: Buffer over-read in print-arp.c, several functions in ARP parser tcpdump: Buffer over-read in print-wb.c:wb_prep(), several functions in White Board protocol parser tcpdump: Buffer over-read in print-eap.c:eap_print() in EAP parser tcpdump: Buffer over-read in print-isoclns.c:esis_print() in ISO ES-IS parser tcpdump: Buffer over-read in print-dhcp6.c:dhcp6opt_print() in DHCPv6 parser tcpdump: Buffer over-read in print-pgm.c:pgm_print() in PGM parser tcpdump: Buffer over-read in print-pgm.c:pgm_print() in PGM parser tcpdump: Buffer over-read in print-vtp.c:vtp_print() in VTP parser tcpdump: Buffer over-read in print-icmp6.c:icmp6_print() in ICMPv6 parser tcpdump: Buffer over-read in print-ip.c:ip_printroute() in IP parser tcpdump: Buffer over-read in print-mobility.c:mobility_opt_print() in IPv6 mobility parser tcpdump: Buffer over-read in print-mobility.c:mobility_opt_print() in IPv6 mobility parser tcpdump: Buffer over-read in print-mobility.c:mobility_opt_print() in IPv6 mobility parser tcpdump: Buffer over-read in print-isoclns.c, several functions in ISO IS-IS parser tcpdump: Buffer over-read in print-lldp.c:lldp_mgmt_addr_tlv_print() in LLDP parser tcpdump: Buffer over-read in print-bootp.c:bootp_print() in BOOTP parser tcpdump: Buffer over-read in print-ppp.c:print_ccp_config_options() in PPP parser tcpdump: Buffer over-read in print-pim.c, several functions in PIM parser tcpdump: Buffer over-read in print-frag6.c:frag6_print() in IPv6 fragmentation header parser tcpdump: Buffer over-read in print-radius.c:print_attr_string() in RADIUS parser tcpdump: Buffer over-read in print-vtp.c:vtp_print() in VTP parser tcpdump: Buffer over-read in print-pgm.c:pgm_print() in PGM parser tcpdump: Buffer over-read in print-isoclns.c:isis_print_id() in ISO IS-IS parser tcpdump: Buffer over-read in print-ospf6.c:ospf6_decode_v3() in OSPFv3 parser tcpdump: Buffer over-read in print-ip.c:ip_printts() in IP parser tcpdump: Buffer over-read in print-ppp.c:handle_mlppp() in PPP parser tcpdump: Buffer over-read in print-isakmp.c, several functions in ISAKMP parser tcpdump: Buffer over-read in print-mptcp.c, several functions in MPTCP parser tcpdump: Buffer over-read in print-icmp6.c:icmp6_nodeinfo_print() in ICMPv6 parser tcpdump: Buffer over-read in print-hncp.c:dhcpv6_print() in HNCP parser tcpdump: Buffer over-read in print-bgp.c:decode_multicast_vpn() in BGP parser tcpdump: Buffer over-read in print-hncp.c:dhcpv4_print() in HNCP parser tcpdump: Buffer over-read in print-vqp.c:vqp_print() in VQP parser tcpdump: Buffer over-read in print-bgp.c:bgp_attr_print() in BGP parser tcpdump: Buffer over-read in print-isoclns.c:esis_print() in ISO ES-IS parser tcpdump: Buffer over-read in print-rsvp.c:rsvp_obj_print() in RSVP parser tcpdump: Buffer over-read in print-rx.c:ubik_print() in Rx protocol parser tcpdump: Buffer over-read in print-rpki-rtr.c:rpki_rtr_pdu_print() in RPKI-Router parser tcpdump: Buffer over-read in print-rsvp.c:rsvp_obj_print() in RSVP parser tcpdump: Buffer over-read in print-cfm.c:cfm_print() in CFM parser tcpdump: Buffer over-read in print-bgp.c:decode_rt_routing_info() in BGP parser tcpdump: Buffer over-read in print-lldp.c:lldp_private_8023_print() in LLDP parser tcpdump: Buffer over-read in print-isoclns.c:isis_print_is_reach_subtlv() in ISO IS-IS parser tcpdump: Buffer over-read in print-chdlc.c:chdlc_print() in Cisco HDLC parser tcpdump: Buffer over-read in print-olsr.c:olsr_print() in OLSR parser tcpdump: Buffer over-read in print-isakmp.c:ikev1_id_print() in IKEv1 parser tcpdump: Buffer over-read in print-isakmp.c, several functions in IKEv2 parser tcpdump: Buffer over-read in print-rt6.c:rt6_print() in IPv6 routing header parser | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 6.5 | null |
RHSA-2019:4021 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.2.5 security update | HTTP/2: large amount of data requests leads to denial of service HTTP/2: flood using PING frames results in unbounded memory growth HTTP/2: flood using HEADERS frames results in unbounded memory growth HTTP/2: flood using SETTINGS frames results in unbounded memory growth wildfly-core: Incorrect privileges for 'Monitor', 'Auditor' and 'Deployer' user by default wildfly-security-manager: security manager authorization bypass | [
"cpe:/a:redhat:jboss_enterprise_application_platform:7.2"
] | null | null | 7.5 | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.