id
stringlengths 13
15
| title
stringlengths 29
176
| description
stringlengths 8
31.7k
| cpes
sequencelengths 0
20
| cvss_v4_0
null | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
null |
---|---|---|---|---|---|---|---|
RHSA-2022:7182 | Red Hat Security Advisory: thunderbird security update | Mozilla: Matrix SDK bundled with Thunderbird vulnerable to a data corruption issue Mozilla: Matrix SDK bundled with Thunderbird vulnerable to an impersonation attack by malicious server administrators Mozilla: Matrix SDK bundled with Thunderbird vulnerable to a device verification attack Mozilla: Matrix SDK bundled with Thunderbird vulnerable to an impersonation attack Mozilla: Same-origin policy violation could have leaked cross-origin URLs Mozilla: Memory Corruption in JS Engine Mozilla: Denial of Service via window.print Mozilla: Memory safety bugs fixed in Firefox ESR 102.4 and Thunderbird 102.4 | [
"cpe:/a:redhat:rhel_eus:8.2::appstream"
] | null | 8.8 | 6.1 | null |
RHSA-2024:0750 | Red Hat Security Advisory: libmaxminddb security update | libmaxminddb: improper initialization in dump_entry_data_list() in maxminddb.c | [
"cpe:/a:redhat:rhel_eus:8.8::appstream"
] | null | 6.5 | null | null |
RHSA-2021:5086 | Red Hat Security Advisory: Red Hat OpenShift Data Foundation 4.9.0 enhancement, security, and bug fix update | kubernetes: Incomplete fix for CVE-2019-11250 allows for token leak in logs when logLevel >= 9 nodejs-tar: Insufficient symlink protection allowing arbitrary file creation and overwrite nodejs-tar: Insufficient absolute path sanitization allowing arbitrary file creation and overwrite golang: net: lookup functions may return invalid host names golang: net/http/httputil: ReverseProxy forwards connection headers if first one is empty golang: math/big.Rat: may cause a panic or an unrecoverable fatal error if passed inputs with very large exponents golang: crypto/tls: certificate of wrong type is causing TLS client to panic nodejs-tar: Insufficient symlink protection due to directory cache poisoning using symbolic links allowing arbitrary file creation and overwrite nodejs-tar: Insufficient symlink protection due to directory cache poisoning using symbolic links allowing arbitrary file creation and overwrite | [
"cpe:/a:redhat:openshift_data_foundation:4.9::el8"
] | null | 8.1 | null | null |
RHSA-2019:2471 | Red Hat Security Advisory: openssl security update | openssl: 0-byte record padding oracle | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | 5.9 | null | null |
RHSA-2014:1123 | Red Hat Security Advisory: devtoolset-2-axis security update | axis: missing connection hostname check against X.509 certificate name | [
"cpe:/a:redhat:developer_toolset:2.1::el6"
] | null | null | null | null |
RHSA-2013:0194 | Red Hat Security Advisory: JBoss Enterprise Application Platform 5.2.0 update | JBoss: twiddle.sh accepts credentials as command line arguments, exposing them to other local users via a process listing jbossws: Prone to character encoding pattern attack (XML Encryption flaw) jbossws: Prone to Bleichenbacher attack against to be distributed symmetric key Framework: Information (internal server information, classpath, local working directories, session IDs) disclosure CSRF on jmx-console allows invocation of operations on mbeans Console: XSS in invoke operation JBoss invoker servlets do not require authentication JGroups diagnostics service enabled by default with no authentication when a JGroups channel is started apache-cxf: Apache CXF does not verify that elements were signed / encrypted by a particular Supporting Token JBoss: CallerIdentityLoginModule retaining password from previous call if a null password is provided JBoss: SecurityAssociation.getCredential() will return the previous credential if no security context is provided Web: Bypass of security constraints JBoss: AuthorizationInterceptor allows JMX operation to proceed despite authorization failure | [
"cpe:/a:redhat:jboss_enterprise_application_platform:5.2"
] | null | null | null | null |
RHSA-2023:5465 | Red Hat Security Advisory: frr security update | frr: Incorrect handling of a error in parsing of an invalid section of a BGP update can de-peer a router | [
"cpe:/a:redhat:rhel_aus:8.2::appstream",
"cpe:/a:redhat:rhel_e4s:8.2::appstream",
"cpe:/a:redhat:rhel_tus:8.2::appstream"
] | null | 7.5 | null | null |
RHSA-2009:1512 | Red Hat Security Advisory: kdegraphics security update | xpdf: multiple integer overflows xpdf/poppler: SplashBitmap integer overflow xpdf/poppler: Splash:: drawImage integer overflow and missing allocation return value check xpdf/poppler: integer overflow in ObjectStream::ObjectStream (oCERT-2009-016) xpdf/poppler: ImageStream:: ImageStream integer overflow | [
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2024:1372 | Red Hat Security Advisory: redhat-ds:11 security, bug fix, and enhancement update | 389-ds-base: a heap overflow leading to denail-of-servce while writing a value larger than 256 chars (in log_entry_attr) | [
"cpe:/a:redhat:directory_server:11.7::el8"
] | null | 5.5 | null | null |
RHSA-2023:3566 | Red Hat Security Advisory: thunderbird security update | Mozilla: Click-jacking certificate exceptions through rendering lag Mozilla: Memory safety bugs fixed in Firefox 114 and Firefox ESR 102.12 | [
"cpe:/a:redhat:rhel_eus:8.6::appstream"
] | null | 9.8 | null | null |
RHSA-2015:1667 | Red Hat Security Advisory: httpd security update | httpd: HTTP request smuggling attack against chunked request parser httpd: ap_some_auth_required() does not properly indicate authenticated request in 2.4 | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 3.7 | null |
RHSA-2024:8447 | Red Hat Security Advisory: python3.12 security update | python: cpython: tarfile: ReDos via excessive backtracking while parsing header values | [
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::crb"
] | null | 7.5 | null | null |
RHSA-2022:5056 | Red Hat Security Advisory: cups security and bug fix update | cups: authorization bypass when using "local" authorization | [
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 6.7 | null | null |
RHSA-2024:5529 | Red Hat Security Advisory: curl security update | curl: HTTP/2 push headers memory-leak | [
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/o:redhat:enterprise_linux:9::baseos"
] | null | 7.5 | null | null |
RHSA-2024:8026 | Red Hat Security Advisory: thunderbird security update | firefox: Use-after-free in Animation timeline (128.3.1 ESR Chemspill) | [
"cpe:/a:redhat:rhel_eus:9.2::appstream"
] | null | 9.8 | null | null |
RHBA-2021:0075 | Red Hat Bug Fix Advisory: Red Hat OpenShift Jaeger 1.17.8 Operator/Operand Containers | golang: data race in certain net/http servers including ReverseProxy can lead to DoS golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs | [
"cpe:/a:redhat:jaeger:1.17::el8"
] | null | 7.5 | null | null |
RHSA-2010:1003 | Red Hat Security Advisory: git security update | (gitweb): XSS due to missing escaping of HTML element attributes | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2016:1504 | Red Hat Security Advisory: java-1.7.0-openjdk security update | OpenJDK: insufficient restrictions on the use of custom ValueHandler (CORBA, 8079718) OpenJDK: maximum XML name limit not applied to namespace URIs (JAXP, 8148872) OpenJDK: missing entity replacement limits (JAXP, 8149962) OpenJDK: integer overflows in bytecode streams (Hotspot, 8152479) OpenJDK: incorrect handling of MethodHandles.dropArguments() argument (Libraries, 8155985) OpenJDK: insufficient bytecode verification (Hotspot, 8155981) OpenJDK: insufficient value count check in MethodHandles.filterReturnValue() (Libraries, 8158571) | [
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::server",
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation",
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 8.8 | null |
RHSA-2023:3204 | Red Hat Security Advisory: OpenShift Virtualization 4.13.0 RPMs security and bug fix update | golang: net/http: handle server errors after sending GOAWAY golang: golang.org/x/text/language: ParseAcceptLanguage takes a long time to parse complex tags golang: math/big: decoding big.Float and big.Rat types can panic if the encoded message is too short, potentially allowing a denial of service golang: net/url: JoinPath does not strip relative path components in all circumstances golang: net/http: excessive memory growth in a Go server accepting HTTP/2 requests | [
"cpe:/a:redhat:container_native_virtualization:4.13::el7",
"cpe:/a:redhat:container_native_virtualization:4.13::el8",
"cpe:/a:redhat:container_native_virtualization:4.13::el9"
] | null | 5.3 | null | null |
RHSA-2017:1759 | Red Hat Security Advisory: freeradius security update | freeradius: Out-of-bounds read/write due to improper output buffer size check in make_secret() freeradius: Out-of-bounds write in rad_coalesce() freeradius: Memory leak in decode_tlv() freeradius: Memory leak in fr_dhcp_decode() freeradius: Out-of-bounds read in fr_dhcp_decode_options() freeradius: Out-of-bounds read in fr_dhcp_decode() when decoding option 63 | [
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | 5.9 | null |
RHSA-2012:1417 | Red Hat Security Advisory: Red Hat Enterprise Linux Extended Update Support 6.0 1-Month EOL Notice | This is the 1-Month notification of the End Of Life plans for Red Hat
Enterprise Linux Extended Update Support Add-On (EUS) 6.0. | [
"cpe:/o:redhat:rhel_eus:6.0"
] | null | null | null | null |
RHSA-2011:0414 | Red Hat Security Advisory: policycoreutils security update | policycoreutils: insecure temporary directory handling in seunshare | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2024:5334 | Red Hat Security Advisory: .NET 8.0 security update | dotnet8.0: Information disclosure vulnerability in TlsStream | [
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::crb"
] | null | 6.5 | null | null |
RHSA-2024:0010 | Red Hat Security Advisory: tigervnc security update | xorg-x11-server: Out-of-bounds write in XIChangeDeviceProperty/RRChangeOutputProperty xorg-x11-server: out-of-bounds memory reads/writes in XKB button actions xorg-x11-server: out-of-bounds memory read in RRChangeOutputProperty and RRChangeProviderProperty | [
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 7.6 | null | null |
RHSA-2023:1805 | Red Hat Security Advisory: thunderbird security update | Thunderbird: Revocation status of S/Mime recipient certificates was not checked Mozilla: Memory Corruption in Safe Browsing Code Mozilla: libwebp: Double-free in libwebp Mozilla: Matrix SDK bundled with Thunderbird vulnerable to denial-of-service attack Thunderbird: Hang when processing certain OpenPGP messages Mozilla: Fullscreen notification obscured Mozilla: Potential Memory Corruption following Garbage Collector compaction Mozilla: Invalid free from JavaScript code Mozilla: Content-Disposition filename truncation leads to Reflected File Download Mozilla: Files with malicious extensions could have been downloaded unsafely on Linux Mozilla: Incorrect optimization result on ARM64 Mozilla: Memory safety bugs fixed in Firefox 112 and Firefox ESR 102.10 | [
"cpe:/a:redhat:rhel_aus:8.2::appstream",
"cpe:/a:redhat:rhel_e4s:8.2::appstream",
"cpe:/a:redhat:rhel_tus:8.2::appstream"
] | null | 8.8 | null | null |
RHSA-2018:2405 | Red Hat Security Advisory: Red Hat FIS 2.0 on Fuse 6.3.0 R7 security and bug fix update | spring-boot: Malicious PATCH requests submitted to servers can use specially crafted JSON data to run arbitrary Java code undertow: Client can use bogus uri in Digest authentication spring-framework: Improper URL path validation allows for bypassing of security checks on static resources ignite: Possible Execution of Arbitrary Code Within Deserialization Endpoints spark: Absolute and relative pathnames allow for unintended static file disclosure | [
"cpe:/a:redhat:jboss_fuse:6.3"
] | null | null | 5.3 | null |
RHSA-2020:4949 | Red Hat Security Advisory: freetype security update | freetype: Heap-based buffer overflow due to integer truncation in Load_SBit_Png | [
"cpe:/o:redhat:rhel_e4s:8.0::baseos"
] | null | 8.6 | null | null |
RHSA-2011:0953 | Red Hat Security Advisory: system-config-firewall security update | system-config-firewall: privilege escalation flaw via use of python pickle | [
"cpe:/o:redhat:enterprise_linux:6::server"
] | null | null | null | null |
RHSA-2021:1551 | Red Hat Security Advisory: OpenShift Container Platform 4.7.11 security and bug fix update | golang: math/big: panic during recursive division of very large numbers golang: crypto/elliptic: incorrect operations on the P-224 curve jenkins: lack of type validation in agent related REST API jenkins: view name validation bypass jetty: Symlink directory exposes webapp directory contents jetty: Resource exhaustion when receiving an invalid large TLS frame | [
"cpe:/a:redhat:openshift:4.7::el7",
"cpe:/a:redhat:openshift:4.7::el8"
] | null | 7.5 | null | null |
RHSA-2023:0276 | Red Hat Security Advisory: Red Hat OpenStack Platform 17.0 (python-scciclient) security update | python-scciclient: missing server certificate verification | [
"cpe:/a:redhat:openstack:17.0::el9"
] | null | 7.4 | null | null |
RHSA-2012:0349 | Red Hat Security Advisory: Red Hat Enterprise Linux 4 - Transition to Extended Life Phase Notice | Red Hat Enterprise Linux 4 reaches end of Production Phase and transitions
to Extended Life Phase. | [
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2025:1746 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.1.9 on RHEL 7 security update | jackson-databind: Lacks certain xbean-reflect/JNDI blocking jackson-databind: Serialization gadgets in shaded-hikari-config jackson-databind: Serialization gadgets in ibatis-sqlmap jackson-databind: Serialization gadgets in anteros-core jackson-databind: mishandles the interaction between serialization gadgets and typing which could result in remote command execution jackson-databind: mishandles the interaction between serialization gadgets and typing which could result in remote command execution velocity: arbitrary code execution when attacker is able to modify templates wildfly: incorrect JBOSS_LOCAL_USER challenge location may lead to giving access to all the local users log4j-core: Remote code execution in Log4j 2.x when logs contain an attacker-controlled string value log4j-core: DoS in log4j 2.x with thread context message pattern and context lookup pattern (incomplete fix for CVE-2021-44228) SnakeYaml: Constructor Deserialization Remote Code Execution codec-haproxy: HAProxyMessageDecoder Stack Exhaustion DoS jackson-databind: deep wrapper array nesting wrt UNWRAP_SINGLE_VALUE_ARRAYS jackson-databind: use of deeply nested arrays apache-commons-text: variable interpolation RCE mina-sshd: Java unsafe deserialization vulnerability jettison: If the value in map is the map's self, the new new JSONObject(map) cause StackOverflowError which may lead to dos CXF: directory listing / code exfiltration | [
"cpe:/a:redhat:jboss_enterprise_application_platform_eus:7.1::el7"
] | null | 7.5 | null | null |
RHSA-2009:0360 | Red Hat Security Advisory: kernel-rt security and bug fix update | kernel: local denial of service in keyctl_join_session_keyring kernel: ecryptfs readlink flaw kernel: dell_rbu local oops kernel: skfp_ioctl inverted logic flaw kernel: memory disclosure in SO_BSDCOMPAT gsopt | [
"cpe:/a:redhat:enterprise_mrg:1::el5"
] | null | null | null | null |
RHSA-2022:8194 | Red Hat Security Advisory: libtiff security update | libtiff: Denial of Service via crafted TIFF file libtiff: Null source pointer lead to Denial of Service via crafted TIFF file libtiff: reachable assertion libtiff: heap buffer overflow in extractImageSection tiff: Null source pointer passed as an argument to memcpy in TIFFFetchNormalTag() in tif_dirread.c tiff: Divide By Zero error in tiffcrop libtiff: Out-of-bounds Read error in tiffcp libtiff: heap-buffer-overflow in TIFFReadRawDataStriped() in tiffinfo.c libtiff: stack-buffer-overflow in tiffcp.c in main() libtiff: out-of-bounds read in _TIFFmemcpy() in tif_unix.c | [
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::crb"
] | null | 5.5 | null | null |
RHSA-2011:0897 | Red Hat Security Advisory: JBoss Enterprise Web Server 1.0.2 update | tomcat: information disclosure in authentication headers mod_dav: DoS (httpd child process crash) by parsing URI structure with missing path segments apr-util: high memory consumption in apr_brigade_split_line() tomcat: file permission bypass flaw tomcat: cross-site-scripting vulnerability in the manager application tomcat: XSS vulnerability in HTML Manager interface apr: unconstrained recursion in apr_fnmatch httpd: mod_proxy_ajp worker moved to error state when timeout exceeded | [
"cpe:/a:redhat:jboss_enterprise_web_server:1::el4",
"cpe:/a:redhat:jboss_enterprise_web_server:1::el5",
"cpe:/a:redhat:jboss_enterprise_web_server:1::el6"
] | null | null | null | null |
RHSA-2017:1975 | Red Hat Security Advisory: libreoffice security and bug fix update | libreoffice: Heap-buffer-overflow in tools::Polygon::Insert | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 5.3 | null |
RHSA-2023:4036 | Red Hat Security Advisory: nodejs security update | c-ares: AutoTools does not set CARES_RANDOM_FILE during cross compilation c-ares: Buffer Underwrite in ares_inet_net_pton() c-ares: Insufficient randomness in generation of DNS query IDs c-ares: 0-byte UDP payload Denial of Service | [
"cpe:/a:redhat:rhel_eus:9.0::appstream"
] | null | 7.5 | null | null |
RHSA-2024:10492 | Red Hat Security Advisory: webkit2gtk3 security update | webkitgtk: data isolation bypass vulnerability | [
"cpe:/a:redhat:rhel_eus:8.8::appstream"
] | null | 6.1 | null | null |
RHSA-2013:0515 | Red Hat Security Advisory: openchange security, bug fix and enhancement update | samba: Multiple heap-based buffer overflows in memory management based on NDR marshalling code output | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2014:0748 | Red Hat Security Advisory: python33-python-jinja2 and python27-python-jinja2 security update | python-jinja2: FileSystemBytecodeCache insecure cache temporary file use | [
"cpe:/a:redhat:rhel_software_collections:1::el6",
"cpe:/a:redhat:rhel_software_collections:1::el7"
] | null | null | null | null |
RHSA-2011:1798 | Red Hat Security Advisory: JBoss Enterprise Application Platform 5.1.2 update | Invoker servlets authentication bypass (HTTP verb tampering) extension): MITM due to improper validation of AX attribute signatures | [
"cpe:/a:redhat:jboss_enterprise_application_platform:5::el6"
] | null | null | null | null |
RHSA-2017:1203 | Red Hat Security Advisory: Red Hat Single Sign-On Node.js adapter security update | keycloak-connect: auth token validity check ignored | [
"cpe:/a:redhat:jboss_single_sign_on:7.1"
] | null | null | 8.1 | null |
RHSA-2021:0945 | Red Hat Security Advisory: Red Hat Build of OpenJDK 11 (container images) release and security update | containers/openjdk: /etc/passwd is given incorrect privileges | [
"cpe:/a:redhat:openjdk:11"
] | null | 7 | null | null |
RHSA-2017:3427 | Red Hat Security Advisory: org.ovirt.engine-root security, bug fix, and enhancement update | ovirt-engine: webadmin log out must logout all sessions | [
"cpe:/a:redhat:rhev_manager:4"
] | null | null | 3.8 | null |
RHSA-2009:1077 | Red Hat Security Advisory: kernel security and bug fix update | kernel: nfsv4 client can be crashed by stating a long filename kernel: exit_notify: kill the wrong capable(CAP_KILL) check | [
"cpe:/o:redhat:rhel_eus:4.7::as",
"cpe:/o:redhat:rhel_eus:4.7::es"
] | null | null | null | null |
RHSA-2022:0128 | Red Hat Security Advisory: thunderbird security update | Mozilla: Iframe sandbox bypass with XSLT Mozilla: Race condition when playing audio files Mozilla: Heap-buffer-overflow in blendGaussianBlur Mozilla: Missing throttling on external protocol launch dialog Mozilla: Use-after-free of ChannelEventQueue::mOwner Mozilla: Browser window spoof using fullscreen mode Mozilla: Out-of-bounds memory access when inserting text in edit mode Mozilla: Browser window spoof using fullscreen mode Mozilla: Leaking cross-origin URLs through securitypolicyviolation event Mozilla: Crash when handling empty pkcs7 sequence Mozilla: Spoofed origin on external protocol launch dialog Mozilla: Memory safety bugs fixed in Firefox 96 and Firefox ESR 91.5 | [
"cpe:/a:redhat:rhel_eus:8.4::appstream"
] | null | 8.8 | 6.1 | null |
RHSA-2024:9618 | Red Hat Security Advisory: OpenShift Container Platform 4.16.23 packages and security update | waitress: python-waitress: request processing race condition in HTTP pipelining with invalid first request waitress: Waitress has a denial of service leading to high CPU usage/resource exhaustion | [
"cpe:/a:redhat:openshift:4.16::el8",
"cpe:/a:redhat:openshift:4.16::el9",
"cpe:/a:redhat:openshift_ironic:4.16::el9"
] | null | 7.5 | null | null |
RHSA-2021:5094 | Red Hat Security Advisory: OpenShift Container Platform 3.11.z security update | log4j-core: Remote code execution in Log4j 2.x when logs contain an attacker-controlled string value log4j-core: DoS in log4j 2.x with thread context message pattern and context lookup pattern (incomplete fix for CVE-2021-44228) | [
"cpe:/a:redhat:openshift:3.11::el7"
] | null | 8.1 | null | null |
RHSA-2019:3082 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.2 security update | wildfly-core: Incorrect privileges for 'Monitor', 'Auditor' and 'Deployer' user by default | [
"cpe:/a:redhat:jboss_enterprise_application_platform:7.2::el6",
"cpe:/a:redhat:jboss_enterprise_application_platform:7.2::el7",
"cpe:/a:redhat:jboss_enterprise_application_platform:7.2::el8"
] | null | null | 5.2 | null |
RHSA-2011:0833 | Red Hat Security Advisory: kernel security and bug fix update | kernel: proc: protect mm start_code/end_code in /proc/pid/stat kernel: bt sco_conninfo infoleak kernel: bnep device field missing NULL terminator kernel: ebtables stack infoleak kernel: dccp: fix oops on Reset after close kernel: fs/partitions: Corrupted OSF partition table infoleak kernel: xen: x86_64: fix error checking in arch_set_info_guest() kernel: ipv4: netfilter: arp_tables: fix infoleak to userspace kernel: ipv4: netfilter: ip_tables: fix infoleak to userspace kernel: ipv6: netfilter: ip6_tables: fix infoleak to userspace kernel: drivers/scsi/mpt2sas: prevent heap overflows kernel: drivers/scsi/mpt2sas: prevent heap overflows kernel: corrupted GUID partition tables can cause kernel oops kernel: xen: improper upper boundary check in get_free_port() function | [
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2022:8384 | Red Hat Security Advisory: harfbuzz security update | harfbuzz: integer overflow in the component hb-ot-shape-fallback.cc | [
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/o:redhat:enterprise_linux:9::baseos"
] | null | 5.5 | null | null |
RHSA-2024:2245 | Red Hat Security Advisory: buildah security update | golang: net/http/internal: Denial of Service (DoS) via Resource Consumption via HTTP requests golang: crypto/tls: Timing Side Channel attack in RSA based TLS key exchanges. | [
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 7.5 | null | null |
RHSA-2004:133 | Red Hat Security Advisory: squid security update | security flaw | [
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws"
] | null | null | null | null |
RHSA-2017:0847 | Red Hat Security Advisory: curl security update | curl: negotiate not treated as connection-oriented (incomplete fix for CVE-2015-3148) | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | 4.8 | null |
RHSA-2023:3421 | Red Hat Security Advisory: Red Hat JBoss Web Server 5.7.3 release and security update | openssl: timing attack in RSA Decryption implementation openssl: double free after calling PEM_read_bio_ex openssl: use-after-free following BIO_new_NDEF openssl: X.400 address type confusion in X.509 GeneralName | [
"cpe:/a:redhat:jboss_enterprise_web_server:5.7"
] | null | 7.4 | null | null |
RHSA-2008:0558 | Red Hat Security Advisory: freetype security update | FreeType PFB integer overflow FreeType invalid free() flaw FreeType off-by-one flaws | [
"cpe:/o:redhat:enterprise_linux:2.1::as",
"cpe:/o:redhat:enterprise_linux:2.1::aw",
"cpe:/o:redhat:enterprise_linux:2.1::es",
"cpe:/o:redhat:enterprise_linux:2.1::ws"
] | null | null | null | null |
RHSA-2014:2009 | Red Hat Security Advisory: kernel security update | kernel: x86: local privesc due to bad_iret and paranoid entry incompatibility | [
"cpe:/o:redhat:rhel_eus:6.5::computenode",
"cpe:/o:redhat:rhel_eus:6.5::server"
] | null | null | 8.4 | null |
RHSA-2014:1727 | Red Hat Security Advisory: Red Hat JBoss Enterprise Web Platform 5.2.0 security update | Java: Java XML Signature DoS Attack | [
"cpe:/a:redhat:jboss_enterprise_web_platform:5.2.0"
] | null | null | null | null |
RHSA-2025:0882 | Red Hat Security Advisory: libsoup security update | libsoup: buffer overflow via UTF-8 conversion in soup_header_parse_param_list_strict | [
"cpe:/a:redhat:rhel_e4s:9.0::appstream"
] | null | 9 | null | null |
RHSA-2021:0100 | Red Hat Security Advisory: OpenShift Container Platform 4.7 file-integrity-operator image security update | golang-github-gorilla-websocket: integer overflow leads to denial of service | [
"cpe:/a:redhat:openshift:4.7::el8"
] | null | 7.5 | null | null |
RHSA-2018:0647 | Red Hat Security Advisory: thunderbird security update | Mozilla: Memory safety bugs fixed in Firefox 59 and Firefox ESR 52.7 (MFSA 2018-07) Mozilla: Buffer overflow manipulating SVG animatedPathSegList (MFSA 2018-07) Mozilla: Out-of-bounds write with malformed IPC messages (MFSA 2018-07) Mozilla: Integer overflow during Unicode conversion (MFSA 2018-07) Mozilla: Memory safety bugs fixed in Firefox ESR 52.7 (MFSA 2018-07) Mozilla: Vorbis audio processing out of bounds write (MFSA 2018-08) | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | 8.8 | null |
RHSA-2020:0579 | Red Hat Security Advisory: nodejs:10 security update | nodejs: Remotely trigger an assertion on a TLS server with a malformed certificate string nodejs: HTTP request smuggling using malformed Transfer-Encoding header nodejs: HTTP header values do not have trailing optional whitespace trimmed npm: Symlink reference outside of node_modules folder through the bin field upon installation npm: Arbitrary file write via constructed entry in the package.json bin field npm: Global node_modules Binary Overwrite | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 4.8 | null | null |
RHSA-2021:4600 | Red Hat Security Advisory: annobin security update | environment: Unicode's bidirectional (BiDi) override characters can cause trojan source attacks | [
"cpe:/a:redhat:rhel_eus:8.2::appstream"
] | null | 8.5 | null | null |
RHSA-2024:7854 | Red Hat Security Advisory: thunderbird security update | firefox: thunderbird: Compromised content process can bypass site isolation firefox: thunderbird: Cross-origin access to PDF contents through multipart responses firefox: thunderbird: Cross-origin access to JSON contents through multipart responses firefox: thunderbird: Potential memory corruption may occur when cloning certain objects firefox: thunderbird: Potential directory upload bypass via clickjacking firefox: thunderbird: External protocol handlers could be enumerated via popups firefox: thunderbird: Specially crafted WebTransport requests could lead to denial of service firefox: thunderbird: Potential memory corruption during JIT compilation firefox: thunderbird: Memory safety bugs fixed in Firefox 131, Firefox ESR 115.16, Firefox ESR 128.3, Thunderbird 131, and Thunderbird 128.3 firefox: thunderbird: Memory safety bugs fixed in Firefox 131, Firefox ESR 128.3, Thunderbird 131, and Thunderbird 128.3 firefox: thunderbird: Memory safety bugs fixed in Firefox 131 and Thunderbird 131 | [
"cpe:/a:redhat:rhel_aus:8.4::appstream",
"cpe:/a:redhat:rhel_e4s:8.4::appstream",
"cpe:/a:redhat:rhel_tus:8.4::appstream"
] | null | 7.5 | null | null |
RHSA-2020:3248 | Red Hat Security Advisory: Red Hat build of Quarkus 1.3.4 SP1 release and security update | postgresql-jdbc: XML external entity (XXE) vulnerability in PgSQLXML RESTEasy: Caching routes in RootNode may result in DoS | [
"cpe:/a:redhat:openshift_application_runtimes:1.0"
] | null | 7.5 | null | null |
RHSA-2023:1930 | Red Hat Security Advisory: emacs security update | emacs: command injection vulnerability in org-mode | [
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 7.8 | null | null |
RHSA-2020:5369 | Red Hat Security Advisory: microcode_ctl security, bug fix and enhancement update | hw: Information disclosure issue in Intel SGX via RAPL interface hw: Vector Register Leakage-Active hw: Fast forward store predictor | [
"cpe:/o:redhat:rhel_eus:8.1::baseos"
] | null | 5.5 | null | null |
RHSA-2023:5761 | Red Hat Security Advisory: java-1.8.0-openjdk security update | OpenJDK: IOR deserialization issue in CORBA (8303384) OpenJDK: certificate path validation issue during client authentication (8309966) | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 5.3 | null | null |
RHSA-2011:0357 | Red Hat Security Advisory: java-1.6.0-ibm security update | JDK unspecified vulnerability in Deployment component JDK unspecified vulnerability in Deployment component OpenJDK DNS cache poisoning by untrusted applets (6981922) JDK unspecified vulnerability in Deployment component JDK unspecified vulnerability in Sound component JDK unspecified vulnerability in Sound component JDK unspecified vulnerability in Deployment component OpenJDK Swing timer-based security manager bypass (6907662) JDK unspecified vulnerability in Deployment component JDK unspecified vulnerability in Deployment component JDK unspecified vulnerability in JDBC component OpenJDK Java2D font-related system property leak (6985453) JDK unspecified vulnerability in Sound component JDK unspecified vulnerability in Deployment component | [
"cpe:/a:redhat:rhel_extras:4",
"cpe:/a:redhat:rhel_extras:5::client",
"cpe:/a:redhat:rhel_extras:5::server",
"cpe:/a:redhat:rhel_extras:6"
] | null | null | null | null |
RHSA-2023:4163 | Red Hat Security Advisory: java-11-openjdk security and bug fix update | OpenJDK: HTTP client insufficient file name validation (8302475) OpenJDK: ZIP file parsing infinite loop (8302483) OpenJDK: weakness in AES implementation (8308682) OpenJDK: array indexing integer overflow issue (8304468) OpenJDK: improper handling of slash characters in URI-to-path conversion (8305312) harfbuzz: allows attackers to trigger O(n^2) growth via consecutive marks | [
"cpe:/a:redhat:rhel_aus:8.4::appstream",
"cpe:/a:redhat:rhel_e4s:8.4::appstream",
"cpe:/a:redhat:rhel_tus:8.4::appstream"
] | null | 7.5 | null | null |
RHSA-2006:0329 | Red Hat Security Advisory: mozilla security update | security flaw Firefox Tag Order Vulnerability security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw | [
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2024:1840 | Red Hat Security Advisory: kernel-rt security update | kernel: ext4: kernel bug in ext4_write_inline_data_end() kernel: Out of boundary write in perf_read_group() as result of overflow a perf_event's read_size | [
"cpe:/a:redhat:rhel_eus:9.0::nfv",
"cpe:/a:redhat:rhel_eus:9.0::realtime"
] | null | 7 | null | null |
RHSA-2021:3623 | Red Hat Security Advisory: nodejs:12 security and bug fix update | c-ares: Missing input validation of host names may lead to domain hijacking nodejs: Use-after-free on close http2 on stream canceling nodejs: Improper handling of untypical characters in domain names nodejs: Incomplete validation of tls rejectUnauthorized parameter nodejs: Use-after-free on close http2 on stream canceling nodejs-path-parse: ReDoS via splitDeviceRe, splitTailRe and splitPathRe nodejs-tar: Insufficient symlink protection allowing arbitrary file creation and overwrite nodejs-tar: Insufficient absolute path sanitization allowing arbitrary file creation and overwrite | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 8.1 | null | null |
RHSA-2020:3833 | Red Hat Security Advisory: firefox security update | Mozilla: Memory safety bugs fixed in Firefox 81 and Firefox ESR 78.3 Mozilla: XSS when pasting attacker-controlled data into a contenteditable element Mozilla: Download origin spoofing via redirect Mozilla: When recursing through layers while scrolling, an iterator may have become invalid, resulting in a potential use-after-free scenario | [
"cpe:/a:redhat:rhel_eus:8.1::appstream"
] | null | 8.8 | 6.1 | null |
RHSA-2024:2930 | Red Hat Security Advisory: logging for Red Hat OpenShift security update | golang: net/http, x/net/http2: unlimited number of CONTINUATION frames causes DoS | [
"cpe:/a:redhat:logging:5.7::el8"
] | null | 7.5 | null | null |
RHSA-2024:4144 | Red Hat Security Advisory: VolSync 0.9.2 for RHEL 9 | quic-go: memory exhaustion attack against QUIC's connection ID mechanism | [
"cpe:/a:redhat:acm:2.10::el9"
] | null | 7.5 | null | null |
RHSA-2015:0218 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 6.3.3 update | Security: Wrong security context loaded when using SAML2 STS Login Module RESTeasy: External entities expanded by DocumentProvider Management: Limited RBAC authorization bypass Subsystem: Information disclosure via incorrect sensitivity classification of attribute Weld: Limited information disclosure via stale thread state | [
"cpe:/a:redhat:jboss_enterprise_application_platform:6::el7"
] | null | null | null | null |
RHSA-2024:1109 | Red Hat Security Advisory: libmicrohttpd security update | libmicrohttpd: remote DoS | [
"cpe:/a:redhat:rhel_eus:8.6::crb",
"cpe:/o:redhat:rhel_eus:8.6::baseos"
] | null | 5.9 | null | null |
RHSA-2024:5810 | Red Hat Security Advisory: OpenShift Container Platform 4.12.64 security update | golang: net/http: golang: mime/multipart: golang: net/textproto: memory exhaustion in Request.ParseMultipartForm jinja2: accepts keys containing non-attribute characters python-werkzeug: user may execute code on a developer's machine | [
"cpe:/a:redhat:openshift:4.12::el8",
"cpe:/a:redhat:openshift:4.12::el9",
"cpe:/a:redhat:openshift_ironic:4.12::el9"
] | null | 7.5 | null | null |
RHSA-2017:3226 | Red Hat Security Advisory: redis security update | redis: weak permissions on sensitive files | [
"cpe:/a:redhat:openstack:10::el7"
] | null | null | 4 | null |
RHSA-2023:0058 | Red Hat Security Advisory: kernel security update | kernel: openvswitch: integer underflow leads to out-of-bounds write in reserve_sfa_size() | [
"cpe:/o:redhat:rhel_e4s:8.1::baseos"
] | null | 7.8 | null | null |
RHSA-2024:2705 | Red Hat Security Advisory: Red Hat build of Quarkus 3.2.12 release and security update | quarkus-core: Leak of local configuration properties into Quarkus applications netty-codec-http: Allocation of Resources Without Limits or Throttling | [
"cpe:/a:redhat:quarkus:3.2::el8"
] | null | 5.3 | null | null |
RHSA-2024:5261 | Red Hat Security Advisory: kernel security update | kernel: use after free in unix_stream_sendpage kernel: net: kernel: UAF in network route management | [
"cpe:/o:redhat:rhel_aus:7.7::server"
] | null | 7.8 | null | null |
RHSA-2021:3156 | Red Hat Security Advisory: firefox security update | Mozilla: Uninitialized memory in a canvas object could have led to memory corruption Mozilla: Incorrect instruction reordering during JIT optimization Mozilla: Use-after-free media channels Mozilla: Race condition when resolving DNS names could have led to memory corruption Mozilla: Memory corruption as a result of incorrect style treatment Mozilla: Memory safety bugs fixed in Thunderbird 78.13 | [
"cpe:/a:redhat:rhel_eus:8.2::appstream"
] | null | 8.8 | 7.5 | null |
RHSA-2013:1045 | Red Hat Security Advisory: RichFaces security update | RichFaces: Remote code execution due to insecure deserialization | [
"cpe:/a:redhat:jboss_enterprise_application_platform:4.3.0:update10",
"cpe:/a:redhat:jboss_enterprise_application_platform:5.2.0",
"cpe:/a:redhat:jboss_enterprise_brms_platform:5.3",
"cpe:/a:redhat:jboss_enterprise_portal_platform:4.3.0:update7",
"cpe:/a:redhat:jboss_enterprise_portal_platform:5.2.2",
"cpe:/a:redhat:jboss_enterprise_soa_platform:4.3.0:update5",
"cpe:/a:redhat:jboss_enterprise_soa_platform:5.3",
"cpe:/a:redhat:jboss_enterprise_web_platform:5.2.0",
"cpe:/a:redhat:jboss_operations_network:2.4.2",
"cpe:/a:redhat:jboss_operations_network:3.1.2"
] | null | null | null | null |
RHSA-2023:4177 | Red Hat Security Advisory: java-17-openjdk security and bug fix update | OpenJDK: HTTP client insufficient file name validation (8302475) OpenJDK: ZIP file parsing infinite loop (8302483) OpenJDK: weakness in AES implementation (8308682) OpenJDK: modulo operator array indexing issue (8304460) OpenJDK: array indexing integer overflow issue (8304468) OpenJDK: improper handling of slash characters in URI-to-path conversion (8305312) harfbuzz: allows attackers to trigger O(n^2) growth via consecutive marks | [
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::crb"
] | null | 7.5 | null | null |
RHSA-2024:4340 | Red Hat Security Advisory: openssh security update | openssh: regreSSHion - race condition in SSH allows RCE/DoS | [
"cpe:/a:redhat:rhel_eus:9.2::appstream",
"cpe:/o:redhat:rhel_eus:9.2::baseos"
] | null | 8.1 | null | null |
RHSA-2024:10844 | Red Hat Security Advisory: firefox security update | firefox: thunderbird: Select list elements could be shown over another site firefox: thunderbird: CSP Bypass and XSS Exposure via Web Compatibility Shims firefox: thunderbird: URL Bar Spoofing via Manipulated Punycode and Whitespace Characters firefox: thunderbird: Unhandled Exception in Add-on Signature Verification firefox: thunderbird: Improper Keypress Handling in Executable File Confirmation Dialog firefox: thunderbird: Memory safety bugs fixed in Firefox 133, Thunderbird 133, Firefox ESR 128.5, and Thunderbird 128.5 | [
"cpe:/a:redhat:rhel_aus:8.2::appstream"
] | null | 8.8 | null | null |
RHSA-2017:2560 | Red Hat Security Advisory: Red Hat Certificate System 8 security, bug fix, and enhancement update | 8: Enrolling certificate without certreq field causes CA to crash | [
"cpe:/a:redhat:certificate_system:8::el5"
] | null | null | 3.5 | null |
RHSA-2020:5231 | Red Hat Security Advisory: thunderbird security update | Mozilla: Variable time processing of cross-origin images during drawImage calls Mozilla: Parsing mismatches could confuse and bypass security sanitizer for chrome privileged code Mozilla: Fullscreen could be enabled without displaying the security UI Mozilla: XSS through paste (manual and clipboard API) Mozilla: Requests intercepted through ServiceWorkers lacked MIME type restrictions Mozilla: Use-after-free in WebRequestService Mozilla: Potential use-after-free in uses of nsTArray Mozilla: DoH did not filter IPv4 mapped IP Addresses Mozilla: Software keyboards may have remembered typed passwords Mozilla: Memory safety bugs fixed in Firefox 83 and Firefox ESR 78.5 | [
"cpe:/a:redhat:rhel_eus:8.1::appstream"
] | null | 8.8 | 6.1 | null |
RHSA-2009:1062 | Red Hat Security Advisory: freetype security update | freetype: multiple integer overflow vulnerabilities freetype integer overflow freetype: multiple integer overflows | [
"cpe:/o:redhat:enterprise_linux:2.1::as",
"cpe:/o:redhat:enterprise_linux:2.1::aw",
"cpe:/o:redhat:enterprise_linux:2.1::es",
"cpe:/o:redhat:enterprise_linux:2.1::ws"
] | null | null | null | null |
RHSA-2024:1501 | Red Hat Security Advisory: grafana security update | golang-fips/openssl: Memory leaks in code encrypting and decrypting RSA payloads | [
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 7.5 | null | null |
RHSA-2022:1108 | Red Hat Security Advisory: Red Hat Process Automation Manager 7.12.1 security update | netty: Information disclosure via the local system temporary directory springframework: malicious input leads to insertion of additional log entries apache-commons-io: Limited path traversal in Apache Commons IO 2.2 to 2.6 jdom: XXE allows attackers to cause a DoS via a crafted HTTP request logback: remote code execution through JNDI call from within its configuration file | [
"cpe:/a:redhat:jboss_enterprise_bpms_platform:7.12"
] | null | 6.6 | null | null |
RHSA-2007:0126 | Red Hat Security Advisory: xorg-x11 security update | xserver XC-MISC integer overflow Multiple font integer overflows (CVE-2007-1352) Multiple font integer overflows (CVE-2007-1352) XGetPixel() integer overflow | [
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2022:0157 | Red Hat Security Advisory: kernel security update | kernel: use-after-free in drivers/infiniband/core/ucma.c ctx use-after-free kernel: race condition for removal of the HCI controller | [
"cpe:/o:redhat:rhel_els:6"
] | null | 7 | null | null |
RHSA-2007:0731 | Red Hat Security Advisory: tetex security update | xpdf integer overflow | [
"cpe:/o:redhat:enterprise_linux:2.1::as",
"cpe:/o:redhat:enterprise_linux:2.1::aw",
"cpe:/o:redhat:enterprise_linux:2.1::es",
"cpe:/o:redhat:enterprise_linux:2.1::ws",
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws",
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws",
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2022:1491 | Red Hat Security Advisory: java-1.8.0-openjdk security update | OpenJDK: Unbounded memory allocation when compiling crafted XPath expressions (JAXP, 8270504) OpenJDK: Improper object-to-string conversion in AnnotationInvocationHandler (Libraries, 8277672) OpenJDK: Missing check for negative ObjectIdentifier (Libraries, 8275151) OpenJDK: Defective secure validation in Apache Santuario (Libraries, 8278008) OpenJDK: URI parsing inconsistencies (JNDI, 8278972) | [
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb"
] | null | 5.3 | null | null |
RHSA-2017:2840 | Red Hat Security Advisory: dnsmasq security update | dnsmasq: heap overflow in the code responsible for building DNS replies | [
"cpe:/o:redhat:rhel_els:5"
] | null | null | 9.8 | null |
RHSA-2016:1389 | Red Hat Security Advisory: Red Hat JBoss Fuse Service Works security update | JGroups: Authorization bypass | [
"cpe:/a:redhat:jboss_fuse_service_works:6.0"
] | null | null | 9.8 | null |
RHSA-2021:3207 | Red Hat Security Advisory: Red Hat Integration Camel Quarkus Tech-Preview 2 security update | activemq: improper authentication allows MITM attack apache-flink: directory traversal attack allows remote file writing through the REST API groovy: OS temporary directory leads to information disclosure cron-utils: template injection allows attackers to inject arbitrary Java EL expressions leading to remote code execution californium-core: DTLS - DoS vulnerability for certificate based handshakes undertow: special character in query results in server errors kotlin: vulnerable Java API was used for temporary file and folder creation which could result in information disclosure fabric8-kubernetes-client: vulnerable to a path traversal leading to integrity and availability compromise | [
"cpe:/a:redhat:camel_quarkus:2"
] | null | 7.4 | null | null |
Subsets and Splits