id
stringlengths 13
15
| title
stringlengths 29
176
| description
stringlengths 8
32.1k
| cpes
sequencelengths 0
20
| cvss_v4_0
null | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
null |
---|---|---|---|---|---|---|---|
RHSA-2007:0349 | Red Hat Security Advisory: php security update | php libxmlrpc library overflow php CRLF injection | [
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2021:2116 | Red Hat Security Advisory: Red Hat OpenStack Platform 16.1.6 (python-httplib2) security update | python-httplib2: CRLF injection via an attacker controlled unescaped part of uri for httplib2.Http.request function python-httplib2: Regular expression denial of service via malicious header | [
"cpe:/a:redhat:openstack:16.1::el8"
] | null | 7.5 | null | null |
RHSA-2009:1125 | Red Hat Security Advisory: thunderbird security update | Firefox 2 and 3 Layout engine crash Firefox 2 and 3 JavaScript engine crash jar: scheme ignores the content-disposition: header on the inner URI view-source: protocol Firefox Same-origin violations in XMLHttpRequest and XPCNativeWrapper.toString Firefox browser engine crashes Firefox JavaScript engine crashes Firefox arbitrary code execution flaw Thunderbird mail crash | [
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2024:0495 | Red Hat Security Advisory: Red Hat build of Quarkus 3.2.9.SP1 release and security update | quarkus: Authorization flaw in Quarkus RestEasy Reactive and Classic when "quarkus.security.jaxrs.deny-unannotated-endpoints" or "quarkus.security.jaxrs.default-roles-allowed" properties are used. quarkus: json payload getting processed prior to security checks when rest resources are used with annotations. | [
"cpe:/a:redhat:quarkus:3.2::el8"
] | null | 8.6 | null | null |
RHSA-2016:2577 | Red Hat Security Advisory: libvirt security, bug fix, and enhancement update | libvirt: Ceph id/key leaked in the process list libvirt: filesystem storage volume names path traversal flaw libvirt: Setting empty VNC password allows access to unauthorized users | [
"cpe:/a:redhat:storage:3.1:server:el7",
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::hypervisor",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 5.6 | null |
RHSA-2020:2125 | Red Hat Security Advisory: kpatch-patch security update | Kernel: NetLabel: null pointer dereference while receiving CIPSO packet with null category may cause kernel panic | [
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 5.9 | null | null |
RHSA-2018:0292 | Red Hat Security Advisory: kernel security update | hw: cpu: speculative execution bounds-check bypass hw: cpu: speculative execution permission faults handling | [
"cpe:/o:redhat:rhel_els:5"
] | null | null | 5.5 | null |
RHSA-2016:2675 | Red Hat Security Advisory: pacemaker security update | pacemaker: Privilege escalation due to improper guarding of IPC communication | [
"cpe:/o:redhat:enterprise_linux:6::server"
] | null | null | 8.8 | null |
RHSA-2020:4846 | Red Hat Security Advisory: mingw-expat security update | expat: large number of colons in input makes parser consume high amount of resources, leading to DoS | [
"cpe:/a:redhat:enterprise_linux:8::crb"
] | null | 7.5 | null | null |
RHSA-2020:0824 | Red Hat Security Advisory: Open Liberty 20.0.0.3 Runtime security update | Open Liberty 20.0.0.3 Runtime is now available from the Customer Portal.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. | [
"cpe:/a:openliberty:20"
] | null | null | null | null |
RHSA-2011:0195 | Red Hat Security Advisory: php security update | php: XSS and SQL injection bypass via crafted overlong UTF-8 encoded string php: NULL pointer dereference in ZipArchive::getArchiveComment php: XSS mitigation bypass via utf8_decode() php: hang on numeric value 2.2250738585072011e-308 with x87 fpu | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2023:5733 | Red Hat Security Advisory: java-1.8.0-openjdk security update | OpenJDK: segmentation fault in ciMethodBlocks OpenJDK: IOR deserialization issue in CORBA (8303384) OpenJDK: certificate path validation issue during client authentication (8309966) | [
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::crb"
] | null | 5.3 | null | null |
RHSA-2018:0418 | Red Hat Security Advisory: libreoffice security update | libreoffice: Remote arbitrary file disclosure vulnerability via WEBSERVICE formula | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 4.7 | null |
RHSA-2019:1823 | Red Hat Security Advisory: Red Hat Process Automation Manager 7.4.0 Security Update | jackson-databind: Potential information exfiltration with default typing, serialization gadget from MyBatis jackson-databind: improper polymorphic deserialization of types from Jodd-db library jackson-databind: improper polymorphic deserialization of types from Oracle JDBC driver jackson-databind: arbitrary code execution in slf4j-ext class jackson-databind: arbitrary code execution in blaze-ds-opt and blaze-ds-core classes jackson-databind: exfiltration/XXE in some JDK classes jackson-databind: server-side request forgery (SSRF) in axis2-jaxws class jackson-databind: improper polymorphic deserialization in axis2-transport-jms class jackson-databind: improper polymorphic deserialization in openjpa class jackson-databind: improper polymorphic deserialization in jboss-common-core class xstream: remote code execution due to insecure XML deserialization (regression of CVE-2013-7285) | [
"cpe:/a:redhat:jboss_bpms:7.4"
] | null | null | 7.3 | null |
RHSA-2020:2665 | Red Hat Security Advisory: kernel-rt security and bug fix update | Kernel: vfio: access to disabled MMIO space of some devices may lead to DoS scenario | [
"cpe:/a:redhat:rhel_extras_rt:7"
] | null | 5.3 | null | null |
RHSA-2020:3730 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 6.4 security update | jbossweb: Incomplete fix of CVE-2020-13935 for WebSocket in JBossWeb could lead to DoS | [
"cpe:/a:redhat:jboss_enterprise_application_platform:6::el5",
"cpe:/a:redhat:jboss_enterprise_application_platform:6::el6",
"cpe:/a:redhat:jboss_enterprise_application_platform:6::el7"
] | null | 7.5 | null | null |
RHSA-2020:5138 | Red Hat Security Advisory: firefox security update | Mozilla: Write side effects in MCallGetProperty opcode not accounted for | [
"cpe:/a:redhat:rhel_e4s:8.0::appstream"
] | null | null | 8.8 | null |
RHSA-2024:11485 | Red Hat Security Advisory: kernel security update | kernel: gro: fix ownership transfer | [
"cpe:/o:redhat:rhel_aus:8.6::baseos",
"cpe:/o:redhat:rhel_e4s:8.6::baseos",
"cpe:/o:redhat:rhel_tus:8.6::baseos"
] | null | 5.5 | null | null |
RHSA-2024:10742 | Red Hat Security Advisory: firefox security update | firefox: thunderbird: Select list elements could be shown over another site firefox: thunderbird: CSP Bypass and XSS Exposure via Web Compatibility Shims firefox: thunderbird: URL Bar Spoofing via Manipulated Punycode and Whitespace Characters firefox: thunderbird: Unhandled Exception in Add-on Signature Verification firefox: thunderbird: Improper Keypress Handling in Executable File Confirmation Dialog firefox: thunderbird: Memory safety bugs fixed in Firefox 133, Thunderbird 133, Firefox ESR 128.5, and Thunderbird 128.5 | [
"cpe:/a:redhat:rhel_eus:9.4::appstream"
] | null | 8.8 | null | null |
RHSA-2023:3612 | Red Hat Security Advisory: OpenShift Container Platform 4.13.4 packages and security update | golang: net/http: excessive memory growth in a Go server accepting HTTP/2 requests golang.org/x/net/http2: avoid quadratic complexity in HPACK decoding golang: crypto/tls: large handshake records may cause panics golang: net/http, mime/multipart: denial of service from excessive resource consumption golang: net/http, net/textproto: denial of service from excessive memory allocation golang: net/http, net/textproto, mime/multipart: denial of service from excessive resource consumption golang: go/parser: Infinite loop in parsing golang: html/template: backticks not treated as string delimiters golang: html/template: improper handling of JavaScript whitespace runc: volume mount race condition (regression of CVE-2019-19921) | [
"cpe:/a:redhat:openshift:4.13::el8",
"cpe:/a:redhat:openshift:4.13::el9"
] | null | 7 | null | null |
RHSA-2021:0094 | Red Hat Security Advisory: dotnet5.0 security and bugfix update | dotnet: ASP.NET Core Callbacks outside of locks cause Krestel deadlock when using HTTP2 | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 7.5 | null | null |
RHSA-2010:0998 | Red Hat Security Advisory: kvm security and bug fix update | kvm: arch/x86/kvm/x86.c: reading uninitialized stack memory | [
"cpe:/a:redhat:rhel_virtualization:5::client",
"cpe:/a:redhat:rhel_virtualization:5::server"
] | null | null | null | null |
RHBA-2023:6254 | Red Hat Bug Fix Advisory: OpenShift Container Platform Assisted Installer version 2.26.1 release | golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487) HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack) | [
"cpe:/a:redhat:assisted_installer:2.0::el8"
] | null | 7.5 | null | null |
RHSA-2024:0851 | Red Hat Security Advisory: kpatch-patch security update | kernel: use-after-free in sch_qfq network scheduler kernel: ktls overwrites readonly memory pages when using function splice with a ktls socket as destination | [
"cpe:/o:redhat:rhel_eus:8.6::baseos"
] | null | 7 | null | null |
RHSA-2024:5107 | Red Hat Security Advisory: OpenShift Container Platform 4.16.7 bug fix and security update | ncurses: NULL pointer dereference in tgetstr in tinfo/lib_termcap.c go-retryablehttp: url might write sensitive information to log file python-werkzeug: user may execute code on a developer's machine | [
"cpe:/a:redhat:openshift:4.16::el9"
] | null | 7.5 | null | null |
RHSA-2011:1267 | Red Hat Security Advisory: thunderbird security update | An updated thunderbird package that fixes one security issue is now
available for Red Hat Enterprise Linux 4, 5, and 6.
The Red Hat Security Response Team has rated this update as having
important security impact. | [
"cpe:/a:redhat:rhel_productivity:5",
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws",
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:6::server"
] | null | null | null | null |
RHSA-2012:1289 | Red Hat Security Advisory: java-1.7.0-ibm security update | OpenJDK: AWT hardening fixes (AWT, 7163201) JDK: unspecified vulnerability fixed in 6u33 and 7u5 (Deployment) OpenJDK: beans ClassFinder insufficient permission checks (beans, 7162476) OpenJDK: fontmanager layout lookup code memory corruption (2D, 7143617) OpenJDK: SynthLookAndFeel application context bypass (Swing, 7143614) OpenJDK: insecure temporary file permissions (JRE, 7143606) OpenJDK: mutable repository identifiers in generated stub code (CORBA, 7143851) JDK: unspecified vulnerability fixed in 6u33 and 7u5 (Deployment) JDK: unspecified vulnerability fixed in 6u33 and 7u5 (Deployment) OpenJDK: insufficient invokespecial <init> verification (HotSpot, 7160757) OpenJDK: java.lang.invoke.MethodHandles.Lookup does not honor access modes (Libraries, 7165628) OpenJDK: beans MethodElementHandler insufficient permission checks (beans, 7194567) OpenJDK: beans insufficient permission checks, Java 7 0day (beans, 7162473) | [
"cpe:/a:redhat:rhel_extras:6"
] | null | null | null | null |
RHSA-2017:0113 | Red Hat Security Advisory: kernel-rt security and bug fix update | kernel: Use after free in tcp_xmit_retransmit_queue kernel: Use-after-free in the recvmmsg exit path kernel: Slab out-of-bounds access in sctp_sf_ootb() kernel: sound: a race condition in the kernel sound timer in snd_timer_user_read() | [
"cpe:/a:redhat:enterprise_mrg:2:server:el6"
] | null | null | 3.6 | null |
RHSA-2024:1510 | Red Hat Security Advisory: nodejs:18 security update | nodejs: vulnerable to timing variant of the Bleichenbacher attack against PKCS#1 v1.5 padding (Marvin) nodejs: code injection and privilege escalation through Linux capabilities nodejs: reading unprocessed HTTP request with unbounded chunk extension allows DoS attacks | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 7.5 | null | null |
RHSA-2019:1234 | Red Hat Security Advisory: flash-plugin security update | flash-plugin: Arbitrary Code Execution vulnerability (APSB19-26) | [
"cpe:/a:redhat:rhel_extras:6"
] | null | null | 8.8 | null |
RHSA-2022:7585 | Red Hat Security Advisory: libtiff security update | libtiff: Denial of Service via crafted TIFF file libtiff: Null source pointer lead to Denial of Service via crafted TIFF file libtiff: reachable assertion libtiff: heap buffer overflow in extractImageSection tiff: Null source pointer passed as an argument to memcpy in TIFFFetchNormalTag() in tif_dirread.c tiff: Divide By Zero error in tiffcrop libtiff: Out-of-bounds Read error in tiffcp libtiff: stack-buffer-overflow in tiffcp.c in main() libtiff: out-of-bounds read in _TIFFmemcpy() in tif_unix.c | [
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb"
] | null | 5.5 | null | null |
RHSA-2023:6841 | Red Hat Security Advisory: Red Hat OpenShift Enterprise security update | golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487) | [
"cpe:/a:redhat:openshift:4.12::el8"
] | null | 7.5 | null | null |
RHSA-2019:0734 | Red Hat Security Advisory: katello-installer-base security and enhancement update | katello-installer-base: QMF methods exposed to goferd via qdrouterd | [
"cpe:/a:redhat:satellite:6.1::el6",
"cpe:/a:redhat:satellite:6.2::el7",
"cpe:/a:redhat:satellite_capsule:6.1::el6",
"cpe:/a:redhat:satellite_capsule:6.2::el7"
] | null | null | 8 | null |
RHSA-2021:4648 | Red Hat Security Advisory: kernel-rt security and bug fix update | kernel: timer tree corruption leads to missing wakeup and system freeze kernel: fuse: stall on CPU can occur because a retry loop continually finds the same bad inode kernel: Insufficient validation of user-supplied sizes for the MSG_CRYPTO message type | [
"cpe:/a:redhat:rhel_eus:8.4::nfv",
"cpe:/a:redhat:rhel_eus:8.4::realtime"
] | null | 8.8 | null | null |
RHBA-2018:3743 | Red Hat Bug Fix Advisory: OpenShift Container Platform 3.11 bug fix and enhancement update | kibana: Arbitrary file inclusion vulnerability in the Console plugin jenkins: Arbitrary file write vulnerability using file parameter definitions jenkins: Reflected XSS vulnerability jenkins: Ephemeral user record creation jenkins: Session fixation vulnerability on user signup jenkins: Failures to process form submission data could result in secrets being displayed or written to logs jenkins: Path traversal vulnerability in Stapler allowed accessing internal data jenkins: Ephemeral user record was created on some invalid authentication attempts | [
"cpe:/a:redhat:openshift:3.11::el7"
] | null | null | 6.5 | null |
RHSA-2009:1659 | Red Hat Security Advisory: kvm security and bug fix update | kernel: KVM: x86 emulator: limit instructions to 15 bytes | [
"cpe:/a:redhat:rhel_virtualization:5::client",
"cpe:/a:redhat:rhel_virtualization:5::server"
] | null | null | null | null |
RHSA-2020:0374 | Red Hat Security Advisory: kernel security and bug fix update | kernel: heap overflow in mwifiex_update_vs_ie() function of Marvell WiFi driver kernel: heap-based buffer overflow in mwifiex_process_country_ie() function in drivers/net/wireless/marvell/mwifiex/sta_ioctl.c kernel: incomplete fix for race condition between mmget_not_zero()/get_task_mm() and core dumping in CVE-2019-11599 kernel: heap overflow in marvell/mwifiex/tdls.c kernel: buffer overflow in cfg80211_mgd_wext_giwessid in net/wireless/wext-sme.c | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 8 | 8.8 | null |
RHSA-2019:2866 | Red Hat Security Advisory: kernel security update | kernel: vhost-net: guest to host kernel escape during migration | [
"cpe:/o:redhat:rhel_eus:7.5::computenode",
"cpe:/o:redhat:rhel_eus:7.5::server"
] | null | null | 7.2 | null |
RHSA-2010:0113 | Red Hat Security Advisory: seamonkey security update | Mozilla incorrectly frees used memory (MFSA 2010-03) Mozilla crashes with evidence of memory corruption (MFSA 2010-01) firefox/thunderbird/seamonkey: browser chrome defacement via cached XUL stylesheets (MFSA 2010-14) firefox/thunderbird/seamonkey: XSS using addEventListener and setTimeout on a wrapped object (MFSA 2010-12) | [
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws",
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2023:4537 | Red Hat Security Advisory: nodejs:16 security, bug fix, and enhancement update | nodejs: mainModule.proto bypass experimental policy mechanism nodejs: process interuption due to invalid Public Key information in x509 certificates nodejs: HTTP Request Smuggling via Empty headers separated by CR nodejs: DiffieHellman do not generate keys after setting a private key | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 7.5 | null | null |
RHSA-2021:0607 | Red Hat Security Advisory: Red Hat Advanced Cluster Management 2.1.3 security and bug fix update | gogo/protobuf: plugin/unmarshal/unmarshal.go lacks certain index validation | [
"cpe:/a:redhat:acm:2.1::el8"
] | null | 8.6 | null | null |
RHSA-2022:0011 | Red Hat Security Advisory: telnet security update | telnet-server: no bounds checks in nextitem() function allows to remotely execute arbitrary code | [
"cpe:/o:redhat:rhel_aus:7.6::server",
"cpe:/o:redhat:rhel_e4s:7.6::server",
"cpe:/o:redhat:rhel_tus:7.6::server"
] | null | 9.8 | null | null |
RHSA-2023:7703 | Red Hat Security Advisory: Red Hat OpenShift Pipelines 1.10.6 release and security update | golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487) HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack) | [
"cpe:/a:redhat:openshift_pipelines:1.10::el8"
] | null | 7.5 | null | null |
RHSA-2019:2503 | Red Hat Security Advisory: OpenShift Container Platform 3.11 jenkins security update | jenkins: Arbitrary file write vulnerability using file parameter definitions (SECURITY-1424) jenkins: CSRF protection tokens did not expire (SECURITY-626) jenkins: Unauthorized view fragment access (SECURITY-534) | [
"cpe:/a:redhat:openshift:3.11::el7"
] | null | null | 4.3 | null |
RHSA-2003:214 | Red Hat Security Advisory: : : : Updated tcpdump packages fix various vulnerabilities | security flaw security flaw security flaw security flaw security flaw security flaw | [
"cpe:/o:redhat:linux:7.1"
] | null | null | null | null |
RHSA-2013:0728 | Red Hat Security Advisory: rubygem packages security update | rubygem-rdoc: Cross-site scripting in the documentation created by Darkfish Rdoc HTML generator / template | [
"cpe:/a:redhat:openshift:1::el6"
] | null | null | null | null |
RHSA-2024:6845 | Red Hat Security Advisory: edk2 security update | edk2: Buffer overflow when handling Server ID option from a DHCPv6 proxy Advertise message | [
"cpe:/a:redhat:rhel_eus:8.8::appstream"
] | null | 8.8 | null | null |
RHSA-2006:0161 | Red Hat Security Advisory: RHAPS security and enhancement update | tomcat DoS security flaw tomcat examples XSS | [
"cpe:/a:redhat:rhel_application_server:2"
] | null | null | null | null |
RHSA-2018:1223 | Red Hat Security Advisory: librelp security update | librelp: Stack-based buffer overflow in relpTcpChkPeerName function in src/tcp.c | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 8.1 | null |
RHSA-2019:3142 | Red Hat Security Advisory: OpenShift Container Platform 3.11 mediawiki security update | mediawiki: $wgRateLimits (rate limit / ping limiter) entry for 'user' overrides that for 'newbie' mediawiki: BotPassword can bypass CentralAuth's account lock | [
"cpe:/a:redhat:openshift:3.11::el7"
] | null | null | 5.3 | null |
RHBA-2023:1649 | Red Hat Bug Fix Advisory: OpenShift Container Platform 4.11.35 packages and security update | golang: out-of-bounds read in golang.org/x/text/language leads to DoS haproxy: request smuggling attack in HTTP/1 header parsing | [
"cpe:/a:redhat:openshift:4.11::el8"
] | null | 8.2 | null | null |
RHSA-2022:8400 | Red Hat Security Advisory: libtirpc security update | libtirpc: DoS vulnerability with lots of connections | [
"cpe:/a:redhat:enterprise_linux:9::crb",
"cpe:/o:redhat:enterprise_linux:9::baseos"
] | null | 7.5 | null | null |
RHSA-2024:3402 | Red Hat Security Advisory: mod_http2 security update | httpd: CONTINUATION frames DoS | [
"cpe:/a:redhat:rhel_eus:9.2::appstream"
] | null | 7.5 | null | null |
RHSA-2011:1111 | Red Hat Security Advisory: Red Hat Enterprise Linux Extended Update Support 5.4 - End Of Life | This is the End of Life notification for Red Hat Enterprise Linux Extended
Update Support Add-On (EUS) 5.4. | [
"cpe:/o:redhat:rhel_eus:5.4"
] | null | null | null | null |
RHBA-2015:0038 | Red Hat Bug Fix Advisory: Red Hat Storage 3.0 enhancement and bug fix update #3 | glusterfs: fragment header infinite loop DoS | [
"cpe:/a:redhat:storage:2:client:el5",
"cpe:/a:redhat:storage:3:client:el6",
"cpe:/a:redhat:storage:3:nagios:el6",
"cpe:/a:redhat:storage:3:server:el6"
] | null | null | null | null |
RHSA-2013:0154 | Red Hat Security Advisory: Ruby on Rails security update | rubygem-actionpack: Unsafe query generation rubygem-activerecord: SQL injection when processing nested query paramaters rubygem-actionpack: Unsafe query generation (a different flaw than CVE-2012-2660) rubygem-activerecord: SQL injection when processing nested query paramaters (a different flaw than CVE-2012-2661) rubygem-actionpack: DoS vulnerability in authenticate_or_request_with_http_digest rubygem-actionpack: potential XSS vulnerability in select_tag prompt rubygem-actionpack: potential XSS vulnerability rubygem-actionpack: XSS Vulnerability in strip_tags rubygem-activerecord: find_by_* SQL Injection rubygem-activerecord: Unsafe Query Generation Risk in Ruby on Rails rubygem-activesupport: Multiple vulnerabilities in parameter parsing in ActionPack | [
"cpe:/a:rhel_sam:1.1::el6"
] | null | null | null | null |
RHSA-2023:0954 | Red Hat Security Advisory: systemd security update | systemd: local information leak due to systemd-coredump not respecting fs.suid_dumpable kernel setting systemd: deadlock in systemd-coredump via a crash with a long backtrace | [
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/o:redhat:enterprise_linux:9::baseos"
] | null | 5.5 | null | null |
RHSA-2022:7111 | Red Hat Security Advisory: samba security and bug fix update | samba: server memory information leak via SMB1 | [
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb",
"cpe:/o:redhat:enterprise_linux:8::baseos",
"cpe:/o:redhat:rhev_hypervisor:4.4::el8"
] | null | 4.3 | null | null |
RHSA-2025:0950 | Red Hat Security Advisory: python-jinja2 security update | jinja2: Jinja has a sandbox breakout through indirect reference to format method | [
"cpe:/a:redhat:rhel_aus:8.6::appstream",
"cpe:/a:redhat:rhel_e4s:8.6::appstream",
"cpe:/a:redhat:rhel_tus:8.6::appstream"
] | null | 6.3 | null | null |
RHSA-2011:1317 | Red Hat Security Advisory: cyrus-imapd security update | cyrus-imapd: nntpd buffer overflow in split_wildmats() | [
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server",
"cpe:/o:redhat:enterprise_linux:6::server"
] | null | null | null | null |
RHSA-2020:1505 | Red Hat Security Advisory: qemu-kvm-ma security update | QEMU: block: iscsi: OOB heap access via an unexpected response of iSCSI Server | [
"cpe:/o:redhat:rhel_eus:7.5::server"
] | null | 6 | null | null |
RHSA-2022:5189 | Red Hat Security Advisory: RHACS 3.70 security update | stackrox: Improper sanitization allows users to retrieve Notifier secrets from GraphQL API in plaintext | [
"cpe:/a:redhat:advanced_cluster_security:3.70::el8"
] | null | 8.8 | null | null |
RHSA-2016:0516 | Red Hat Security Advisory: java-1.8.0-oracle security update | OpenJDK: missing type safety checks for MethodHandle calls across class loaders, incorrect CVE-2013-5838 fix (Hotspot, 8151666) | [
"cpe:/a:redhat:rhel_extras_oracle_java:6",
"cpe:/a:redhat:rhel_extras_oracle_java:7"
] | null | null | null | null |
RHSA-2015:2507 | Red Hat Security Advisory: java-1.7.0-ibm security update | OpenJDK: kerberos realm name leak (JGSS, 8048030) OpenJDK: inefficient use of hash tables and lists during XML parsing (JAXP, 8068842) OpenJDK: missing checks for proper initialization in ObjectStreamClass (Serialization, 8103671) OpenJDK: HttpURLConnection header restriction bypass (Libraries, 8130193) JDK: unspecified vulnerability fixed in 7u91 and 8u65 (Deployment) OpenJDK: insufficient permission checks in StubGenerator (CORBA, 8076383) OpenJDK: OOB access in CMS code (2D, 8086092) OpenJDK: leak of user.dir location (JAXP, 8078427) OpenJDK: java.nio Buffers integer overflow issues (Libraries, 8130891) ICU: missing boundary checks in layout engine (OpenJDK 2D, 8132042) OpenJDK: incorrect access control context used in DGCImpl (RMI, 8080688) OpenJDK: protected methods can be used as interface methods via DirectMethodHandle (Libraries) OpenJDK: incomplete constraints enforcement by AlgorithmChecker (Security, 8131291) OpenJDK: incorrect String object deserialization in IIOPInputStream (CORBA, 8076387) OpenJDK: incorrect access control context used in DGCClient (RMI, 8076413) OpenJDK: incomplete MaxXMLNameLimit enforcement (JAXP, 8086733) JDK: unspecified vulnerability fixed in 6u105, 7u91 and 8u65 (Deployment) OpenJDK: insufficient proxy class checks in RemoteObjectInvocationHandler (RMI, 8076339) JDK: local disclosure of kerberos credentials cache | [
"cpe:/a:redhat:rhel_extras:5::client",
"cpe:/a:redhat:rhel_extras:5::server"
] | null | null | null | null |
RHSA-2011:0028 | Red Hat Security Advisory: kvm security and bug fix update | kvm: x86: zero kvm_vcpu_events->interrupt.pad infoleak | [
"cpe:/a:redhat:rhel_virtualization:5::client",
"cpe:/a:redhat:rhel_virtualization:5::server"
] | null | null | null | null |
RHSA-2011:1289 | Red Hat Security Advisory: librsvg2 security update | librsvg: object type mismatch leading to invalid pointer dereference | [
"cpe:/o:redhat:enterprise_linux:6::server"
] | null | null | null | null |
RHSA-2011:1851 | Red Hat Security Advisory: krb5 security update | krb5: telnet client and server encrypt_keyid heap-based buffer overflow | [
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws",
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2021:0618 | Red Hat Security Advisory: stunnel security update | stunnel: client certificate not correctly verified when redirect and verifyChain options are used | [
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 7.5 | null | null |
RHSA-2020:0555 | Red Hat Security Advisory: virt:8.1 and virt-devel:8.1 security update | hw: TSX Transaction Asynchronous Abort (TAA) | [
"cpe:/a:redhat:advanced_virtualization:8.1::el8"
] | null | null | 6.5 | null |
RHSA-2025:1317 | Red Hat Security Advisory: thunderbird security update | thunderbird: Address of e-mail sender can be spoofed by malicious email firefox: thunderbird: Use-after-free in XSLT firefox: thunderbird: Use-after-free in Custom Highlight firefox: thunderbird: A bug in WebAssembly code generation could result in a crash firefox: thunderbird: Use-after-free during concurrent delazification firefox: thunderbird: Potential opening of private browsing tabs in normal browsing windows firefox: thunderbird: Certificate length was not properly checked thunderbird: Unsanitized address book fields firefox: thunderbird: Memory safety bugs fixed in Firefox 135, Thunderbird 135, Firefox ESR 115.20, Firefox ESR 128.7, Thunderbird 115.20, and Thunderbird 128.7 firefox: thunderbird: Memory safety bugs fixed in Firefox 135, Thunderbird 135, Firefox ESR 128.7, and Thunderbird 128.7 | [
"cpe:/a:redhat:rhel_eus:9.2::appstream"
] | null | 8.8 | null | null |
RHSA-2020:3046 | Red Hat Security Advisory: thunderbird security update | Mozilla: Memory corruption due to missing sign-extension for ValueTags on ARM64 Mozilla: Information disclosure due to manipulated URL object Mozilla: Use-after-free in nsGlobalWindowInner Mozilla: Use-After-Free when trying to connect to a STUN server Mozilla: Add-On updates did not respect the same certificate trust rules as software updates Mozilla: Automatic account setup leaks Microsoft Exchange login credentials | [
"cpe:/a:redhat:rhel_e4s:8.0::appstream"
] | null | 5.9 | 6.1 | null |
RHSA-2021:0250 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.3.5 security update | apache-httpclient: incorrect handling of malformed authority component in request URIs resteasy-client: potential sensitive information leakage in JAX-RS RESTEasy Client's WebApplicationException handling wildfly: resource adapter logs plaintext JMS password at warning level on connection error wildfly-core: memory leak in WildFly host-controller in domain mode while not able to reconnect to domain-controller undertow: special character in query results in server errors wildfly: Potential Memory leak in Wildfly when using OpenTracing | [
"cpe:/a:redhat:jboss_enterprise_application_platform:7.3"
] | null | 5.9 | null | null |
RHSA-2024:5692 | Red Hat Security Advisory: kernel security update | kernel: ipc/mqueue, msg, sem: avoid relying on a stack reference past its expiry kernel: mISDN: fix possible use-after-free in HFC_cleanup() kernel: isdn: mISDN: Fix sleeping function called from invalid context kernel: KVM: x86: nSVM: fix potential NULL derefernce on nested migration kernel: perf: Fix list corruption in perf_cgroup_switch() kernel: smb: client: fix potential OOBs in smb2_parse_contexts() kernel: net/sched: act_ct: fix skb leak and crash on ooo frags kernel: platform/x86: wmi: Fix opening of char device kernel: wifi: iwlwifi: dbg-tlv: ensure NUL termination kernel: tty: n_gsm: fix possible out-of-bounds in gsm0_receive() kernel: tcp: Use refcount_inc_not_zero() in tcp_twsk_unique(). kernel: wifi: nl80211: don't free NULL coalescing rule kernel: gfs2: Fix potential glock use-after-free on unmount | [
"cpe:/o:redhat:rhel_aus:8.6::baseos",
"cpe:/o:redhat:rhel_e4s:8.6::baseos",
"cpe:/o:redhat:rhel_tus:8.6::baseos"
] | null | 5.8 | null | null |
RHSA-2024:4560 | Red Hat Security Advisory: java-1.8.0-openjdk security update | OpenJDK: potential UTF8 size overflow (8314794) OpenJDK: Excessive symbol length can lead to infinite loop (8319859) OpenJDK: Range Check Elimination (RCE) pre-loop limit overflow (8320548) OpenJDK: Pack200 increase loading time due to improper header validation (8322106) OpenJDK: Out-of-bounds access in 2D image handling (8324559) OpenJDK: RangeCheckElimination array index overflow (8323231) | [
"cpe:/o:redhat:rhel_els:7"
] | null | 7.4 | null | null |
RHSA-2023:5526 | Red Hat Security Advisory: bind security update | bind: stack exhaustion in control channel code may lead to DoS | [
"cpe:/a:redhat:rhel_e4s:8.1::appstream",
"cpe:/o:redhat:rhel_e4s:8.1::baseos"
] | null | 7.5 | null | null |
RHSA-2023:5952 | Red Hat Security Advisory: Red Hat OpenShift Service Mesh for 2.4.4 security update | containerd: pulling and extracting crafted container image may result in Unix file permission changes buildkit: Data disclosure in provenance attestation describing a build golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487) | [
"cpe:/a:redhat:service_mesh:2.4::el8"
] | null | 7.5 | null | null |
RHSA-2015:0235 | Red Hat Security Advisory: Red Hat JBoss BRMS 6.0.3 security update | CXF: SSL hostname verification bypass, incomplete CVE-2012-5783 fix OpenJDK: XML parsing Denial of Service (JAXP, 8017298) JSF: XSS due to insufficient escaping of user-supplied content in outputText tags and EL expressions PicketBox/JBossSX: Unauthorized access to and modification of application server configuration and state by application Tomcat/JBossWeb: Limited DoS in chunked transfer encoding input filter Tomcat/JBossWeb: XXE vulnerability via user supplied XSLTs Tomcat/JBossWeb: Request smuggling via malicious content length header Tomcat/JBossWeb: XML parser hijack by malicious web application netty: DoS via memory exhaustion during data aggregation Tomcat/JBossWeb: request smuggling and limited DoS in ChunkedInputFilter Security: Invalid EJB caller role check implementation RESTEasy: XXE via parameter entities PicketLink: XXE via insecure DocumentBuilderFactory usage Validator: JSM bypass via ReflectionHelper CXF: SSL hostname verification bypass, incomplete CVE-2012-6153 fix Framework: Directory traversal Framework: directory traversal flaw jbpm-designer: XXE in BPMN2 import UberFire: Information disclosure and RCE via insecure file upload/download servlets Workbench: Insufficient authorization constraints | [
"cpe:/a:redhat:jboss_brms:6.0"
] | null | null | 4.8 | null |
RHSA-2022:1082 | Red Hat Security Advisory: openssl security update | openssl: Infinite loop in BN_mod_sqrt() reachable when parsing certificates | [
"cpe:/o:redhat:rhel_aus:7.3::server"
] | null | 7.5 | null | null |
RHSA-2024:3775 | Red Hat Security Advisory: idm:DL1 security update | freeipa: user can obtain a hash of the passwords of all domain users and perform offline brute force | [
"cpe:/a:redhat:rhel_aus:8.6::appstream",
"cpe:/a:redhat:rhel_e4s:8.6::appstream",
"cpe:/a:redhat:rhel_tus:8.6::appstream"
] | null | 8.1 | null | null |
RHSA-2015:1700 | Red Hat Security Advisory: pcs security update | pcs: Incorrect authorization when using pcs web UI pcs: Command injection with root privileges. | [
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:7::server"
] | null | null | null | null |
RHSA-2020:4286 | Red Hat Security Advisory: kernel security and bug fix update | kernel: net: bluetooth: type confusion while processing AMP packets kernel: net: bluetooth: information leak when processing certain AMP packets kernel: kernel: buffer over write in vgacon_scroll kernel: metadata validator in XFS may cause an inode with a valid, user-creatable extended attribute to be flagged as corrupt kernel: memory corruption in net/packet/af_packet.c leads to elevation of privilege | [
"cpe:/a:redhat:enterprise_linux:8::crb",
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 7.8 | null | null |
RHSA-2008:0295 | Red Hat Security Advisory: vsftpd security and bug fix update | vsftpd: memory leak when deny_file option is set | [
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2022:6914 | Red Hat Security Advisory: .NET Core 3.1 on RHEL 7 security and bugfix update | dotnet: Nuget cache poisoning on Linux via world-writable cache directory | [
"cpe:/a:redhat:rhel_dotnet:3.1::el7"
] | null | 7.8 | null | null |
RHSA-2024:4430 | Red Hat Security Advisory: perl-HTTP-Tiny security update | http-tiny: insecure TLS cert default | [
"cpe:/a:redhat:rhel_eus:9.2::appstream"
] | null | 6.8 | null | null |
RHSA-2020:0293 | Red Hat Security Advisory: SDL security update | SDL: heap-based buffer overflow in SDL blit functions in video/SDL_blit*.c | [
"cpe:/a:redhat:rhel_e4s:8.0::appstream"
] | null | null | 8.1 | null |
RHSA-2014:0748 | Red Hat Security Advisory: python33-python-jinja2 and python27-python-jinja2 security update | python-jinja2: FileSystemBytecodeCache insecure cache temporary file use | [
"cpe:/a:redhat:rhel_software_collections:1::el6",
"cpe:/a:redhat:rhel_software_collections:1::el7"
] | null | null | null | null |
RHSA-2014:2019 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 6.3.2 security update | CXF: SSL hostname verification bypass, incomplete CVE-2012-5783 fix CXF: SSL hostname verification bypass, incomplete CVE-2012-6153 fix CXF: Improper security semantics enforcement of SAML SubjectConfirmation methods | [
"cpe:/a:redhat:jboss_enterprise_application_platform:6::el5",
"cpe:/a:redhat:jboss_enterprise_application_platform:6::el6",
"cpe:/a:redhat:jboss_enterprise_application_platform:6::el7"
] | null | null | 4.8 | null |
RHSA-2004:066 | Red Hat Security Advisory: kernel security update | security flaw | [
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws"
] | null | null | null | null |
RHSA-2024:3138 | Red Hat Security Advisory: kernel security, bug fix, and enhancement update | kernel: OOB writes in parse_hid_report_descriptor in drivers/input/tablet/gtco.c kernel: out of bounds read in drivers/media/usb/dvb-usb/technisat-usb2.c kernel: use-after-free in read in vt_do_kdgkb_ioctl kernel: a race out-of-bound read in vt kernel: improper input validation may lead to privilege escalation kernel: Linux ebpf logic vulnerability leads to critical memory read and write gaining root privileges kernel: use-after-free in l1oip timer handlers kernel: local privileges escalation in kernel/bpf/verifier.c kernel: integer overflow in l2cap_config_req() in net/bluetooth/l2cap_core.c kernel: Bluetooth: L2CAP: Fix u8 overflow kernel: VMCI: Use threaded irqs instead of tasklets kernel: KVM: information leak in KVM_GET_DEBUGREGS ioctl on 32-bit systems kernel: use after free in vcs_read in drivers/tty/vt/vc_screen.c due to race kernel: cxgb4: use-after-free in ch_flower_stats_cb() kernel: Use-after-free in nft_verdict_dump due to a race between set GC and transaction kernel: NVMe: info leak due to out-of-bounds read in nvmet_ctrl_find_get kernel: local dos vulnerability in scatterwalk_copychunks kernel: null pointer dereference vulnerability in nft_dynset_init() kernel: Null Pointer Dereference vulnerability in ida_free in lib/idr.c kernel: use-after-free in IPv4 IGMP kernel: Bluetooth Forward and Future Secrecy Attacks and Defenses kernel: irdma: Improper access control Kernel: double free in hci_conn_cleanup of the bluetooth subsystem kernel: race condition between HCIUARTSETPROTO and HCIUARTGETPROTO in hci_uart_tty_ioctl kernel: usb: out-of-bounds read in read_descriptors kernel: fbcon: out-of-sync arrays in fbcon_mode_deleted due to wrong con2fb_map assignment kernel: netfilter: nftables out-of-bounds read in nf_osf_match_one() kernel: netfilter: xtables out-of-bounds read in u32_match_it() kernel: netfilter: xtables sctp out-of-bounds read in match_flags() kernel: xfrm: out-of-bounds read in __xfrm_state_filter_match() kernel: QXL: race condition leading to use-after-free in qxl_mode_dumb_create() kernel: ipv4: NULL pointer dereference in ipv4_send_dest_unreach() kernel: rsvp: out-of-bounds read in rsvp_classify() kernel: lib/kobject.c vulnerable to fill_kobj_path out-of-bounds write kernel: bluetooth: bt_sock_ioctl race condition leads to use-after-free in bt_sock_recvmsg kernel: use-after-free in net/atm/ioctl.c kernel: ICMPv6 “Packet Too Big” packets force a DoS of the Linux kernel by forcing 100% CPU kernel: smb: client: fix potential OOBs in smb2_parse_contexts() kernel: gfs2: Fix kernel NULL pointer dereference in gfs2_rgrp_dump kernel: mm/sparsemem: fix race in accessing memory_section->usage kernel: team: NULL pointer dereference when team device type is changed kernel: net/core: kernel crash in ETH_P_1588 flow dissector kernel: netfilter: nf_tables: memory leak when more than 255 elements expired kernel: KVM: s390: fix setting of fpc register kernel: netfilter: nf_tables: disallow timeout for anonymous sets kernel: hugetlbfs: Null pointer dereference in hugetlbfs_fill_super function hw: amd: Instruction raise #VC exception at exit hw: amd: Instruction raise #VC exception at exit kernel: sched/membarrier: reduce the ability to hammer on sys_membarrier kernel: netfilter: nf_tables: reject QUEUE/DROP verdict parameters kernel: blk-mq: fix IO hang from sbitmap wakeup race kernel: i40e: Do not allow untrusted VF to remove administratively set MAC | [
"cpe:/a:redhat:enterprise_linux:8::crb",
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 4.4 | 5.3 | null |
RHSA-2020:2485 | Red Hat Security Advisory: gettext security update | gettext: double free in default_add_message in read-catalog.c | [
"cpe:/o:redhat:rhel_eus:7.7::computenode",
"cpe:/o:redhat:rhel_eus:7.7::server"
] | null | null | 4 | null |
RHSA-2024:4015 | Red Hat Security Advisory: thunderbird security update | Mozilla: Use-after-free in JavaScript object transplant Mozilla: External protocol handlers leaked by timing attack Mozilla: Sandboxed iframes were able to bypass sandbox restrictions to open a new window Mozilla: Cross-Origin Image leak via Offscreen Canvas Mozilla: Memory Corruption in Text Fragments Mozilla: Memory safety bugs fixed in Firefox 127, Firefox ESR 115.12, and Thunderbird 115.12 Mozilla: Use-after-free in networking | [
"cpe:/a:redhat:rhel_e4s:9.0::appstream"
] | null | 7.5 | null | null |
RHSA-2022:0151 | Red Hat Security Advisory: Red Hat Single Sign-On 7.5.1 security update on RHEL 7 | keycloak-server-spi-private: ECP SAML binding bypasses authentication flows Keycloak: Incorrect authorization allows unpriviledged users to create other users resteasy: Error message exposes endpoint class information xml-security: XPath Transform abuse allows for information disclosure | [
"cpe:/a:redhat:red_hat_single_sign_on:7.5::el7"
] | null | 7.5 | null | null |
RHSA-2020:4307 | Red Hat Security Advisory: java-11-openjdk security update | OpenJDK: High memory usage during deserialization of Proxy class with many interfaces (Serialization, 8236862) OpenJDK: Credentials sent over unencrypted LDAP connection (JNDI, 8237990) OpenJDK: Certificate blacklist bypass via alternate certificate encodings (Libraries, 8237995) OpenJDK: Integer overflow leading to out-of-bounds access (Hotspot, 8241114) OpenJDK: Missing permission check in path to URI conversion (Libraries, 8242680) OpenJDK: Incomplete check for invalid characters in URI to path conversion (Libraries, 8242685) OpenJDK: Race condition in NIO Buffer boundary checks (Libraries, 8244136) | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 5.3 | null | null |
RHSA-2024:11148 | Red Hat Security Advisory: gstreamer1-plugins-good security update | gstreamer1-plugins-good: OOB-write in isomp4/qtdemux.c gstreamer1-plugins-good: OOB-write in convert_to_s334_1a gstreamer1-plugins-good: uninitialized stack memory in Matroska/WebM demuxer gstreamer1-plugins-good: integer overflows in MP4/MOV demuxer and memory allocator that can lead to out-of-bounds writes gstreamer1-plugins-good: null pointer dereference in gst_gdk_pixbuf_dec_flush | [
"cpe:/a:redhat:rhel_aus:8.2::appstream"
] | null | 6.5 | null | null |
RHBA-2013:0571 | Red Hat Bug Fix Advisory: Red Hat Update Infrastructure 2.1.1 bug fix update | pulp /etc/pulp/pulp.conf world readable, contains default admin password | [
"cpe:/a:redhat:rhui:2::el6"
] | null | null | null | null |
RHSA-2021:3233 | Red Hat Security Advisory: compat-exiv2-026 security update | exiv2: Heap-based buffer overflow vulnerability in jp2image.cpp | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 8.1 | null | null |
RHSA-2022:5701 | Red Hat Security Advisory: java-1.8.0-openjdk security update | OpenJDK: class compilation issue (Hotspot, 8281859) OpenJDK: improper restriction of MethodHandle.invokeBasic() (Hotspot, 8281866) OpenJDK: integer truncation issue in Xalan-J (JAXP, 8285407) | [
"cpe:/a:redhat:rhel_e4s:8.1::appstream"
] | null | 7.5 | null | null |
RHSA-2005:061 | Red Hat Security Advisory: squid security update | security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw | [
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws"
] | null | null | null | null |
RHSA-2023:6694 | Red Hat Security Advisory: python-pip security update | python: tarfile module directory traversal | [
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/o:redhat:enterprise_linux:9::baseos"
] | null | 5.5 | null | null |
RHSA-2024:9128 | Red Hat Security Advisory: libvirt security update | libvirt: Crash of virtinterfaced via virConnectListInterfaces() | [
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::crb"
] | null | 6.2 | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.