id
stringlengths 13
15
| title
stringlengths 29
176
| description
stringlengths 8
31.7k
| cpes
sequencelengths 0
20
| cvss_v4_0
null | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
null |
---|---|---|---|---|---|---|---|
RHSA-2021:0526 | Red Hat Security Advisory: kernel security and bug fix update | kernel: umask not applied on filesystem without ACL support kernel: TOCTOU mismatch in the NFS client code | [
"cpe:/o:redhat:rhel_eus:7.7::computenode",
"cpe:/o:redhat:rhel_eus:7.7::server"
] | null | 7 | null | null |
RHSA-2021:2420 | Red Hat Security Advisory: dhcp security update | dhcp: stack-based buffer overflow when parsing statements with colon-separated hex digits in config or lease files in dhcpd and dhclient | [
"cpe:/o:redhat:rhel_eus:8.2::baseos"
] | null | 8.8 | null | null |
RHSA-2021:2741 | Red Hat Security Advisory: firefox security update | Mozilla: Use-after-free in accessibility features of a document Mozilla: Memory safety bugs fixed in Firefox 90 and Firefox ESR 78.12 chromium-browser: Out of bounds write in ANGLE | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 8.8 | null | null |
RHSA-2002:048 | Red Hat Security Advisory: : New imlib packages available | security flaw security flaw | [
"cpe:/o:redhat:linux:6.2",
"cpe:/o:redhat:linux:7.0",
"cpe:/o:redhat:linux:7.1",
"cpe:/o:redhat:linux:7.2"
] | null | null | null | null |
RHSA-2009:1681 | Red Hat Security Advisory: gpdf security update | xpdf: buffer overflow in FoFiType1::parse | [
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2023:6939 | Red Hat Security Advisory: container-tools:rhel8 security and bug fix update | go-yaml: Improve heuristics preventing CPU/memory abuse by parsing malicious or large YAML documents golang.org/x/net/http2: avoid quadratic complexity in HPACK decoding golang: crypto/tls: large handshake records may cause panics golang: net/http, mime/multipart: denial of service from excessive resource consumption golang.org/x/net/html: Cross site scripting golang: net/http, net/textproto: denial of service from excessive memory allocation golang: net/http, net/textproto, mime/multipart: denial of service from excessive resource consumption golang: go/parser: Infinite loop in parsing golang: html/template: backticks not treated as string delimiters golang: html/template: improper sanitization of CSS values golang: html/template: improper handling of JavaScript whitespace containerd: Supplementary groups are not set up properly runc: Rootless runc makes `/sys/fs/cgroup` writable runc: volume mount race condition (regression of CVE-2019-19921) runc: AppArmor can be bypassed when `/proc` inside the container is symlinked with a specific mount configuration golang: html/template: improper handling of empty HTML attributes golang: net/http: insufficient sanitization of Host header | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 6.5 | null | null |
RHSA-2021:0648 | Red Hat Security Advisory: virt:8.2 and virt-devel:8.2 security update | QEMU: heap buffer overflow in iscsi_aio_ioctl_cb() in block/iscsi.c may lead to information disclosure QEMU: assertion failure through usb_packet_unmap() in hw/usb/hcd-ehci.c | [
"cpe:/a:redhat:advanced_virtualization:8.2::el8"
] | null | 3.2 | null | null |
RHSA-2018:2331 | Red Hat Security Advisory: Red Hat OpenStack Platform 12.0 director security and bug fix update | memcached: UDP server support allows spoofed traffic amplification DoS | [
"cpe:/a:redhat:openstack:12::el7"
] | null | null | 5.3 | null |
RHSA-2021:2063 | Red Hat Security Advisory: Red Hat Single Sign-On 7.4.7 security update on RHEL 6 | keycloak: Internationalized domain name (IDN) homograph attack to impersonate users keycloak: Backchannel logout not working when Principal Type is set to Attribute Name for external SAML IDP | [
"cpe:/a:redhat:red_hat_single_sign_on:7::el6"
] | null | 7.1 | null | null |
RHSA-2020:3253 | Red Hat Security Advisory: firefox security update | chromium-browser: Use after free in ANGLE chromium-browser: Inappropriate implementation in WebRTC Mozilla: Potential leak of redirect targets when loading scripts in a worker Mozilla: Memory safety bugs fixed in Firefox 79 and Firefox ESR 68.11 | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 8.8 | 8.8 | null |
RHSA-2024:4081 | Red Hat Security Advisory: [23.0] Security update for the 23.0 release (RPMs) | graalvm: Unauthorized Read Access graalvm: unauthorized ability to cause a partial denial of service | [
"cpe:/a:redhat:quarkus:3.2::el8"
] | null | 3.7 | null | null |
RHSA-2017:2918 | Red Hat Security Advisory: kernel-rt security and bug fix update | kernel: Out-of-bounds heap access in xfrm kernel: Possible heap buffer overflow in brcmf_cfg80211_mgmt_tx() kernel: Integer overflow in ip6_find_1stfragopt() causes infinite loop kernel: Out of bounds read in inet_diag_msg_sctp{,l}addr_fill() and sctp_get_sctp_info() in SCTP stack kernel: Use-after-free in sys_mq_notify() kernel: Divide-by-zero in __tcp_select_window kernel: xfs: unprivileged user kernel oops kernel: Heap out-of-bounds read in AF_PACKET sockets kernel: Exploitable memory corruption due to UFO to non-UFO path switch | [
"cpe:/a:redhat:enterprise_mrg:2:server:el6"
] | null | null | 7 | null |
RHSA-2020:3588 | Red Hat Security Advisory: libvncserver security update | libvncserver: websocket decoding buffer overflow | [
"cpe:/a:redhat:rhel_e4s:8.0::appstream"
] | null | 9.8 | null | null |
RHSA-2006:0661 | Red Hat Security Advisory: openssl security update | openssl signature forgery | [
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws",
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2020:0666 | Red Hat Security Advisory: qemu-kvm security and enhancement update | hw: TSX Transaction Asynchronous Abort (TAA) | [
"cpe:/o:redhat:rhel_eus:7.6::computenode",
"cpe:/o:redhat:rhel_eus:7.6::server"
] | null | null | 6.5 | null |
RHSA-2024:6893 | Red Hat Security Advisory: Red Hat AMQ Broker 7.12.0 release and security update | snappy-java: Unchecked chunk length leads to DoS jackson-databind: denial of service via cylic dependencies | [
"cpe:/a:redhat:amq_broker:7.12"
] | null | 4.7 | null | null |
RHSA-2008:0146 | Red Hat Security Advisory: gd security update | gd: GIF handling buffer overflow gd: buffer overrun gd / php-gd ImageCreateFromPng infinite loop caused by truncated PNG libgd Integer overflow in TrueColor code libgd NULL pointer dereference when reading a corrupt X bitmap libgd Denial of service by GIF images without a global color map libgd Denial of service by corrupted GIF images | [
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws",
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2022:0860 | Red Hat Security Advisory: OpenShift Container Platform 4.9.25 security update | CRI-O: Arbitrary code execution in cri-o via abusing “kernel.core_pattern” kernel parameter | [
"cpe:/a:redhat:openshift:4.9::el7",
"cpe:/a:redhat:openshift:4.9::el8"
] | null | 8.8 | null | null |
RHSA-2024:5192 | Red Hat Security Advisory: 389-ds-base security update | 389-ds-base: Malformed userPassword hash may cause Denial of Service 389-ds-base: unauthenticated user can trigger a DoS by sending a specific extended search request | [
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::crb"
] | null | 6.5 | null | null |
RHSA-2010:0939 | Red Hat Security Advisory: JBoss Enterprise Application Platform 4.3.0.CP09 update | JBoss drools deserialization remote code execution JBoss Remoting Denial-Of-Service JBoss EAP jmx console FileDeployment CSRF | [
"cpe:/a:redhat:jboss_enterprise_application_platform:4.3"
] | null | null | null | null |
RHSA-2024:1841 | Red Hat Security Advisory: pcs security update | rubygem-rack: Denial of Service Vulnerability in Rack Content-Type Parsing rubygem-rack: Possible DoS Vulnerability with Range Header in Rack rubygem-rack: Possible Denial of Service Vulnerability in Rack Header Parsing | [
"cpe:/a:redhat:rhel_eus:9.0::highavailability",
"cpe:/a:redhat:rhel_eus:9.0::resilientstorage"
] | null | 5.3 | null | null |
RHSA-2022:0464 | Red Hat Security Advisory: aide security update | aide: heap-based buffer overflow on outputs larger than B64_BUF | [
"cpe:/a:redhat:rhel_e4s:8.1::appstream"
] | null | 7.5 | null | null |
RHSA-2021:1597 | Red Hat Security Advisory: libxml2 security update | libxml2: Buffer overflow vulnerability in xmlEncodeEntitiesInternal() in entities.c | [
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 6.5 | null | null |
RHSA-2024:1509 | Red Hat Security Advisory: Red Hat Data Grid 8.4.7 security update | commons-compress: Denial of service caused by an infinite loop for a corrupted DUMP file commons-compress: OutOfMemoryError unpacking broken Pack200 file | [
"cpe:/a:redhat:jboss_data_grid:8"
] | null | 5.5 | null | null |
RHSA-2014:0949 | Red Hat Security Advisory: kernel security update | kernel: x86_64: ptrace: sysret to non-canonical address | [
"cpe:/o:redhat:rhel_mission_critical:6.2::server"
] | null | null | null | null |
RHSA-2024:6028 | Red Hat Security Advisory: git security update | git: Recursive clones RCE git: RCE while cloning local repos | [
"cpe:/a:redhat:rhel_aus:8.4::appstream",
"cpe:/a:redhat:rhel_e4s:8.4::appstream",
"cpe:/a:redhat:rhel_tus:8.4::appstream"
] | null | 8.1 | null | null |
RHSA-2013:0246 | Red Hat Security Advisory: java-1.6.0-openjdk security update | OpenJDK: RMI CGIHandler XSS issue (RMI, 6563318) OpenJDK: logging insufficient access control checks (Libraries, 6664509) OpenJDK: logging insufficient access control checks (Libraries, 6664528) OpenJDK: invalid threads subject to interrupts (Libraries, 6776941) OpenJDK: reflection API incorrect checks for proxy classes (Libraries, 7197546, SE-2012-01 Issue 29) OpenJDK: PresentationManager incorrectly shared (CORBA, 7141694) OpenJDK: insufficient clipboard access premission checks (AWT, 7186952) OpenJDK: InetSocketAddress serialization issue (Networking, 7201071) OpenJDK: loadPropertyFile missing restrictions (JAXP, 8001235) OpenJDK: com.sun.xml.internal.* not restricted packages (JAX-WS, 7201068) OpenJDK: CPU consumption DoS via repeated SSL ClientHello packets (JSSE, 7192393) OpenJDK: missing serialization restriction (CORBA, 7201066) OpenJDK: insufficient privilege checking issue (AWT, 7192977) OpenJDK: insufficient Diffie-Hellman public key checks (JSSE, 7192392) OpenJDK: insufficient privilege checking issue (AWT, 8001057) OpenJDK: RequiredModelMBean missing access control context checks (JMX, 8000537) OpenJDK: IIOP type reuse sandbox bypass (CORBA, 8000540, SE-2012-01 Issue 50) OpenJDK: missing ValueHandlerImpl class constructor access restriction (CORBA, 8000631) OpenJDK: image parser insufficient raster parameter checks (2D, 8001972) OpenJDK: image parser insufficient raster parameter checks (AWT, 8002325) | [
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2022:0458 | Red Hat Security Advisory: samba security update | samba: Out-of-bounds heap read/write vulnerability in VFS module vfs_fruit allows code execution | [
"cpe:/a:redhat:storage:3.5:samba:el8"
] | null | 9.9 | null | null |
RHSA-2019:3132 | Red Hat Security Advisory: OpenShift Container Platform 4.1.20 openshift security update | kubernetes: YAML parsing vulnerable to "Billion Laughs" attack, allowing for remote denial of service | [
"cpe:/a:redhat:openshift:4.1::el7",
"cpe:/a:redhat:openshift:4.1::el8"
] | null | null | 7.5 | null |
RHSA-2005:410 | Red Hat Security Advisory: gftp security update | security flaw | [
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws",
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2021:3638 | Red Hat Security Advisory: nodejs:12 security and bug fix update | c-ares: Missing input validation of host names may lead to domain hijacking libuv: out-of-bounds read in uv__idna_toascii() can lead to information disclosures or crashes nodejs: Use-after-free on close http2 on stream canceling nodejs: Improper handling of untypical characters in domain names nodejs: Incomplete validation of tls rejectUnauthorized parameter nodejs: Use-after-free on close http2 on stream canceling nodejs-path-parse: ReDoS via splitDeviceRe, splitTailRe and splitPathRe nodejs-hosted-git-info: Regular Expression denial of service via shortcutMatch in fromUrl() nodejs-ssri: Regular expression DoS (ReDoS) when parsing malicious SRI in strict mode nodejs-tar: Insufficient symlink protection allowing arbitrary file creation and overwrite nodejs-tar: Insufficient absolute path sanitization allowing arbitrary file creation and overwrite | [
"cpe:/a:redhat:rhel_eus:8.2::appstream"
] | null | 8.1 | null | null |
RHSA-2020:0328 | Red Hat Security Advisory: kernel-rt security and bug fix update | kernel: heap overflow in mwifiex_set_uap_rates() function of Marvell Wifi Driver leading to DoS kernel: heap-overflow in mwifiex_set_wmm_params() function of Marvell WiFi driver leading to DoS kernel: heap overflow in mwifiex_update_vs_ie() function of Marvell WiFi driver kernel: heap-based buffer overflow in mwifiex_process_country_ie() function in drivers/net/wireless/marvell/mwifiex/sta_ioctl.c kernel: incomplete fix for race condition between mmget_not_zero()/get_task_mm() and core dumping in CVE-2019-11599 kernel: heap overflow in marvell/mwifiex/tdls.c kernel: rtl_p2p_noa_ie in drivers/net/wireless/realtek/rtlwifi/ps.c in the Linux kernel lacks a certain upper-bound check, leading to a buffer overflow Kernel: KVM: export MSR_IA32_TSX_CTRL to guest - incomplete fix for TAA (CVE-2019-11135) | [
"cpe:/a:redhat:enterprise_linux:8::nfv",
"cpe:/a:redhat:enterprise_linux:8::realtime"
] | null | null | 5.5 | null |
RHSA-2024:2068 | Red Hat Security Advisory: OpenShift Container Platform 4.15.11 bug fix and security update | golang: net/http, x/net/http2: unlimited number of CONTINUATION frames causes DoS ironic-image: Unauthenticated local access to Ironic API | [
"cpe:/a:redhat:openshift:4.15::el8",
"cpe:/a:redhat:openshift:4.15::el9"
] | null | 4.7 | null | null |
RHSA-2022:6078 | Red Hat Security Advisory: Red Hat Ansible Automation Platform 2.1.3 security and bug fix update | Ansible: Logic flaw leads to privilage escalation | [
"cpe:/a:redhat:ansible_automation_platform:2.1::el8"
] | null | 7.2 | null | null |
RHSA-2004:634 | Red Hat Security Advisory: zip security update | security flaw | [
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws"
] | null | null | null | null |
RHSA-2023:1557 | Red Hat Security Advisory: kernel security and bug fix update | ALSA: pcm: Move rwsem lock inside snd_ctl_elem_read to prevent UAF kernel: net/ulp: use-after-free in listening ULP sockets | [
"cpe:/a:redhat:rhel_eus:8.4::crb",
"cpe:/o:redhat:rhel_eus:8.4::baseos"
] | null | 7.8 | null | null |
RHSA-2021:3820 | Red Hat Security Advisory: OpenShift Container Platform 4.8.15 packages and security update | jenkins: improper permission checks allow canceling queue items and aborting builds jenkins: session fixation vulnerability golang: net: lookup functions may return invalid host names golang: net/http/httputil: ReverseProxy forwards connection headers if first one is empty golang: math/big.Rat: may cause a panic or an unrecoverable fatal error if passed inputs with very large exponents golang: crypto/tls: certificate of wrong type is causing TLS client to panic | [
"cpe:/a:redhat:openshift:4.8::el7",
"cpe:/a:redhat:openshift:4.8::el8"
] | null | 6.5 | null | null |
RHSA-2020:0683 | Red Hat Security Advisory: OpenShift Container Platform 4.3.5 openshift-enterprise-ansible-operator-container security update | openshift/ocp-release-operator-sdk: /etc/passwd is given incorrect privileges | [
"cpe:/a:redhat:openshift:4.3::el7"
] | null | 7 | null | null |
RHSA-2023:3441 | Red Hat Security Advisory: Red Hat OpenStack Platform 17.0 (etcd) security update | etcd: Information discosure via debug function etcd: Key name can be accessed via LeaseTimeToLive API | [
"cpe:/a:redhat:openstack:17.0::el9"
] | null | 3.1 | null | null |
RHSA-2013:0599 | Red Hat Security Advisory: xen security update | qemu: e1000 driver buffer overflow when processing large packets when SBP and LPE flags are disabled | [
"cpe:/a:redhat:rhel_virtualization:5::server",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2017:1365 | Red Hat Security Advisory: nss security and bug fix update | nss: Null pointer dereference when handling empty SSLv2 messages | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 7.5 | null |
RHSA-2024:5322 | Red Hat Security Advisory: firefox security update | mozilla: Fullscreen notification dialog can be obscured by document content mozilla: Out of bounds memory access in graphics shared memory handling mozilla: Type confusion in WebAssembly mozilla: Incomplete WebAssembly exception handing mozilla: Out of bounds read in editor component mozilla: CSP strict-dynamic bypass using web-compatibility shims mozilla: Missing permission check when creating a StreamFilter mozilla: Uninitialized memory used by WebGL mozilla: Use-after-free in JavaScript garbage collection mozilla: Use-after-free in IndexedDB mozilla: Document content could partially obscure security prompts | [
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 6.1 | null | null |
RHSA-2007:0131 | Red Hat Security Advisory: squid security update | security flaw | [
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2021:3873 | Red Hat Security Advisory: Red Hat Advanced Cluster Management 2.2.9 security, bug, and container updates | semver-regex: inefficient regular expression complexity nginx: Off-by-one in ngx_resolver_copy() when labels are followed by a pointer to a root domain name object-path: Type confusion vulnerability can lead to a bypass of CVE-2020-15256 nodejs-set-value: type confusion allows bypass of CVE-2019-10747 redis: Lua scripts can overflow the heap-based Lua stack redis: Integer overflow issue with Streams redis: Integer overflow bug in the ziplist data structure redis: Out of bounds read in lua debugger protocol parser redis: Denial of service via Redis Standard Protocol (RESP) request redis: Integer overflow issue with intsets redis: Integer overflow issue with strings | [
"cpe:/a:redhat:acm:2.2::el7",
"cpe:/a:redhat:acm:2.2::el8"
] | null | 7.5 | null | null |
RHSA-2020:0509 | Red Hat Security Advisory: sudo security update | sudo: Stack based buffer overflow when pwfeedback is enabled | [
"cpe:/o:redhat:rhel_e4s:8.0::baseos"
] | null | 7.8 | null | null |
RHSA-2024:1856 | Red Hat Security Advisory: opencryptoki security update | opencryptoki: timing side-channel in handling of RSA PKCS#1 v1.5 padded ciphertexts (Marvin) | [
"cpe:/a:redhat:rhel_eus:9.2::crb",
"cpe:/o:redhat:rhel_eus:9.2::baseos"
] | null | 5.9 | null | null |
RHSA-2023:7434 | Red Hat Security Advisory: kernel security and bug fix update | kernel: Use-after-free vulnerability in the Linux Kernel traffic control index filter kernel: net/sched: cls_u32 component reference counter leak if tcf_change_indev() fails kernel: net/sched: cls_fw component can be exploited as result of failure in tcf_change_indev function kernel: netfilter: use-after-free due to improper element removal in nft_pipapo_remove() | [
"cpe:/o:redhat:rhel_aus:8.2::baseos",
"cpe:/o:redhat:rhel_e4s:8.2::baseos",
"cpe:/o:redhat:rhel_tus:8.2::baseos"
] | null | 7.8 | null | null |
RHSA-2023:1887 | Red Hat Security Advisory: Multicluster Engine for Kubernetes 2.2.3 security updates and bug fixes | http-cache-semantics: Regular Expression Denial of Service (ReDoS) vulnerability vm2: sandbox escape vm2: Sandbox Escape vm2: Sandbox Escape when exception sanitization | [
"cpe:/a:redhat:multicluster_engine:2.2::el8"
] | null | 9.8 | null | null |
RHSA-2008:0790 | Red Hat Security Advisory: java-1.5.0-ibm security update | Java RE allows Same Origin Policy to be Bypassed (6687932) security flaw Security Vulnerability with JRE fonts processing may allow Elevation of Privileges (6450319) Java Web Start Buffer overflow vulnerabilities (6557220) Java Web Start, arbitrary file creation (6703909) Java Web Start arbitrary file creation/deletion file with user permissions (6704077) Java Web Start, untrusted application may determine Cache Location (6704074) | [
"cpe:/a:redhat:rhel_extras:4",
"cpe:/a:redhat:rhel_extras:5::client",
"cpe:/a:redhat:rhel_extras:5::server"
] | null | null | null | null |
RHSA-2020:5086 | Red Hat Security Advisory: rh-nodejs12-nodejs security update | nodejs-dot-prop: prototype pollution nodejs: HTTP request smuggling due to CR-to-Hyphen conversion libuv: buffer overflow in realpath npm: sensitive information exposure through logs | [
"cpe:/a:redhat:rhel_software_collections:3::el7"
] | null | 4.4 | null | null |
RHSA-2022:6268 | Red Hat Security Advisory: convert2rhel security, bug fix, and enhancement update | convert2rhel: Activation key passed via command line by code | [
"cpe:/a:redhat:convert2rhel::el7"
] | null | 5.5 | null | null |
RHSA-2009:1141 | Red Hat Security Advisory: nagios security update | nagios: remote code execution via statuswml.cgi CGI script | [
"cpe:/a:redhat:hpc_solution:1.0"
] | null | null | null | null |
RHSA-2016:2115 | Red Hat Security Advisory: openstack-manila-ui security update | openstack-manila-ui: persistent XSS in metadata field | [
"cpe:/a:redhat:openstack:7::el7"
] | null | null | 4.1 | null |
RHSA-2024:3259 | Red Hat Security Advisory: go-toolset:rhel8 security update | golang: net/http, x/net/http2: unlimited number of CONTINUATION frames causes DoS golang: net/http/cookiejar: incorrect forwarding of sensitive headers and cookies on HTTP redirect golang: net/http: golang: mime/multipart: golang: net/textproto: memory exhaustion in Request.ParseMultipartForm golang: crypto/x509: Verify panics on certificates with an unknown public key algorithm golang: net/mail: comments in display names are incorrectly handled golang: html/template: errors returned from MarshalJSON methods may break template escaping | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 6.5 | null | null |
RHSA-2024:1817 | Red Hat Security Advisory: java-1.8.0-openjdk security update | OpenJDK: long Exception message leading to crash (8319851) OpenJDK: integer overflow in C1 compiler address generation (8322122) OpenJDK: Pack200 excessive memory allocation (8322114) OpenJDK: C2 compilation fails with "Exceeded _node_regs array" (8317507) | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 3.7 | null | null |
RHSA-2024:10219 | Red Hat Security Advisory: perl-App-cpanminus:1.7044 security update | perl-App-cpanminus: Insecure HTTP in App::cpanminus Allows Code Execution Vulnerability | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 8.1 | null | null |
RHSA-2020:2478 | Red Hat Security Advisory: OpenShift Container Platform 3.11 jenkins-2-plugins security update | jenkins-git-client-plugin: OS command injection via 'git ls-remote' jenkins-script-security-plugin: sandbox protection bypass leads to execute arbitrary code in sandboxed scripts jenkins-pipeline-groovy-plugin: sandbox protection bypass through default parameter expressions in CPS-transformed methods jenkins-script-security-plugin: sandbox protection bypass during script compilation phase by applying AST transforming annotations jenkins-subversion-plugin: XSS in project repository base url jenkins-script-security-plugin: sandbox protection bypass via crafted constructor calls and crafted constructor bodies jenkins-script-security-plugin: sandbox protection bypass leads to arbitrary code execution jenkins-git-plugin: stored cross-site scripting | [
"cpe:/a:redhat:openshift:3.11::el7"
] | null | 5.4 | null | null |
RHSA-2010:0703 | Red Hat Security Advisory: bzip2 security update | bzip2: integer overflow flaw in BZ2_decompress | [
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws",
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws",
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2013:0701 | Red Hat Security Advisory: ruby193-ruby, rubygem-json and rubygem-rdoc security update | rubygem-rdoc: Cross-site scripting in the documentation created by Darkfish Rdoc HTML generator / template rubygem-json: Denial of Service and SQL Injection | [
"cpe:/a:redhat:openshift:1::el6"
] | null | null | null | null |
RHSA-2024:3951 | Red Hat Security Advisory: firefox security update | Mozilla: Use-after-free in JavaScript object transplant Mozilla: External protocol handlers leaked by timing attack Mozilla: Sandboxed iframes were able to bypass sandbox restrictions to open a new window Mozilla: Cross-Origin Image leak via Offscreen Canvas Mozilla: Memory Corruption in Text Fragments Mozilla: Memory safety bugs fixed in Firefox 127, Firefox ESR 115.12, and Thunderbird 115.12 Mozilla: Use-after-free in networking | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 7.5 | null | null |
RHSA-2017:2912 | Red Hat Security Advisory: rh-nodejs4-nodejs-tough-cookie security update | nodejs-tough-cookie: regular expression DoS via Cookie header with many semicolons nodejs-tough-cookie: Regular expression denial of service | [
"cpe:/a:redhat:rhel_software_collections:2::el6",
"cpe:/a:redhat:rhel_software_collections:2::el7"
] | null | null | 5.3 | null |
RHSA-2024:9813 | Red Hat Security Advisory: squid:4 security update | squid: Denial of Service processing ESI response content | [
"cpe:/a:redhat:rhel_eus:8.8::appstream"
] | null | 7.5 | null | null |
RHSA-2015:0235 | Red Hat Security Advisory: Red Hat JBoss BRMS 6.0.3 security update | CXF: SSL hostname verification bypass, incomplete CVE-2012-5783 fix OpenJDK: XML parsing Denial of Service (JAXP, 8017298) JSF: XSS due to insufficient escaping of user-supplied content in outputText tags and EL expressions PicketBox/JBossSX: Unauthorized access to and modification of application server configuration and state by application Tomcat/JBossWeb: Limited DoS in chunked transfer encoding input filter Tomcat/JBossWeb: XXE vulnerability via user supplied XSLTs Tomcat/JBossWeb: Request smuggling via malicious content length header Tomcat/JBossWeb: XML parser hijack by malicious web application netty: DoS via memory exhaustion during data aggregation Tomcat/JBossWeb: request smuggling and limited DoS in ChunkedInputFilter Security: Invalid EJB caller role check implementation RESTEasy: XXE via parameter entities PicketLink: XXE via insecure DocumentBuilderFactory usage Validator: JSM bypass via ReflectionHelper CXF: SSL hostname verification bypass, incomplete CVE-2012-6153 fix Framework: Directory traversal Framework: directory traversal flaw jbpm-designer: XXE in BPMN2 import UberFire: Information disclosure and RCE via insecure file upload/download servlets Workbench: Insufficient authorization constraints | [
"cpe:/a:redhat:jboss_brms:6.0"
] | null | null | 4.8 | null |
RHSA-2017:3427 | Red Hat Security Advisory: org.ovirt.engine-root security, bug fix, and enhancement update | ovirt-engine: webadmin log out must logout all sessions | [
"cpe:/a:redhat:rhev_manager:4"
] | null | null | 3.8 | null |
RHSA-2022:2074 | Red Hat Security Advisory: samba security, bug fix, and enhancement update | samba: Symlink race error can allow metadata read and modify outside of the exported share samba: Information leak via symlinks of existance of files or directories outside of the exported share | [
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb",
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 6.5 | null | null |
RHSA-2017:2603 | Red Hat Security Advisory: docker-distribution security, bug fix, and enhancement update | docker-distribution: Does not properly restrict the amount of content accepted from a user | [
"cpe:/a:redhat:rhel_extras_other:7"
] | null | null | 5.3 | null |
RHSA-2023:3342 | Red Hat Security Advisory: OpenShift Container Platform 4.13.4 CNF vRAN extras security update | vault: Hashicorp Vault AWS IAM Integration Authentication Bypass | [
"cpe:/a:redhat:openshift:4.13::el8"
] | null | 8.2 | null | null |
RHSA-2019:1967 | Red Hat Security Advisory: samba security, bug fix and enhancement update | samba: save registry file outside share as unprivileged user | [
"cpe:/a:redhat:storage:3.4:samba:el6"
] | null | null | 4.2 | null |
RHSA-2023:6042 | Red Hat Security Advisory: Self Node Remediation Operator 0.5.1 security update | golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487) HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack) | [
"cpe:/a:redhat:workload_availability_self_node_remediation:0.5::el8"
] | null | 7.5 | null | null |
RHSA-2018:1723 | Red Hat Security Advisory: java-1.7.1-ibm security update | JDK: unspecified vulnerability fixed in 6u191, 7u171, and 8u161 (Security) OpenJDK: incorrect merging of sections in the JAR manifest (Security, 8189969) OpenJDK: unrestricted deserialization of data from JCEKS key stores (Security, 8189997) OpenJDK: insufficient consistency checks in deserialization of multiple classes (Security, 8189977) OpenJDK: unbounded memory allocation during deserialization in PriorityBlockingQueue (Concurrency, 8189981) OpenJDK: unbounded memory allocation during deserialization in TabularDataSupport (JMX, 8189985) OpenJDK: unbounded memory allocation during deserialization in Container (AWT, 8189989) OpenJDK: unbounded memory allocation during deserialization in NamedNodeMapImpl (JAXP, 8189993) OpenJDK: RMI HTTP transport enabled by default (RMI, 8193833) | [
"cpe:/a:redhat:rhel_extras:7"
] | null | null | 4.2 | null |
RHSA-2014:1295 | Red Hat Security Advisory: bash Shift_JIS security update | bash: specially-crafted environment variables can be used to inject shell commands | [
"cpe:/a:redhat:rhel_sjis:5",
"cpe:/a:redhat:rhel_sjis:6"
] | null | null | null | null |
RHSA-2024:4867 | Red Hat Security Advisory: Release of openshift-serverless-clients kn 1.33.1 security update and bug fixes | golang: archive/zip: Incorrect handling of certain ZIP files | [
"cpe:/a:redhat:serverless:1.0::el8"
] | null | 7.5 | null | null |
RHSA-2020:3637 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.2.9 on RHEL 6 security update | hibernate: SQL injection issue in Hibernate ORM resteasy: Improper validation of response header in MediaTypeHeaderDelegate.java class EAP: field-name is not parsed in accordance to RFC7230 Wildfly: Improper authorization issue in WildFlySecurityManager when using alternative protection domain Mojarra: Path traversal via either the loc parameter or the con parameter, incomplete fix of CVE-2018-14371 jackson-databind: Lacks certain xbean-reflect/JNDI blocking jackson-databind: Serialization gadgets in shaded-hikari-config jackson-databind: Serialization gadgets in ibatis-sqlmap jackson-databind: Serialization gadgets in anteros-core jackson-databind: mishandles the interaction between serialization gadgets and typing which could result in remote command execution jackson-databind: mishandles the interaction between serialization gadgets and typing which could result in remote command execution dom4j: XML External Entity vulnerability in default SAX parser Undertow: Incomplete fix for CVE-2017-2666 due to permitting invalid characters in HTTP requests hibernate-validator: Improper input validation in the interpolation of constraint error messages wildfly-elytron: session fixation when using FORM authentication wildfly: exposed setting of TCCL via the EmbeddedManagedProcess API wildfly: unsafe deserialization in Wildfly Enterprise Java Beans wildfly: Some EJB transaction objects may get accumulated causing Denial of Service wildfly: EJB SessionOpenInvocations may not be removed properly after a response is received causing Denial of Service | [
"cpe:/a:redhat:jboss_enterprise_application_platform:7.2::el6"
] | null | 6.5 | 4.8 | null |
RHSA-2021:4913 | Red Hat Security Advisory: mailman security update | mailman: CSRF protection missing in the user options page mailman: CSRF token bypass allows to perform CSRF attacks and account takeover mailman: CSRF token bypass allows to perform CSRF attacks and admin takeover | [
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 8 | 6.5 | null |
RHSA-2019:3873 | Red Hat Security Advisory: kernel security update | hw: Intel GPU blitter manipulation can allow for arbitrary kernel memory write | [
"cpe:/o:redhat:enterprise_linux:7::hypervisor",
"cpe:/o:redhat:rhel_eus:7.6::computenode",
"cpe:/o:redhat:rhel_eus:7.6::server"
] | null | null | 8.8 | null |
RHSA-2021:1241 | Red Hat Security Advisory: mariadb:10.3 and mariadb-devel:10.3 security update | mariadb: writable system variables allows a database user with SUPER privilege to execute arbitrary code as the system mysql user | [
"cpe:/a:redhat:rhel_eus:8.1::appstream",
"cpe:/a:redhat:rhel_eus:8.1::crb"
] | null | 7.2 | null | null |
RHSA-2023:5528 | Red Hat Security Advisory: python3 security update | python: TLS handshake bypass | [
"cpe:/a:redhat:rhel_aus:8.2::appstream",
"cpe:/a:redhat:rhel_e4s:8.2::appstream",
"cpe:/a:redhat:rhel_tus:8.2::appstream",
"cpe:/o:redhat:rhel_aus:8.2::baseos",
"cpe:/o:redhat:rhel_e4s:8.2::baseos",
"cpe:/o:redhat:rhel_tus:8.2::baseos"
] | null | 8.6 | null | null |
RHSA-2009:1540 | Red Hat Security Advisory: kernel-rt security, bug fix, and enhancement update | kernel: personality: fix PER_CLEAR_ON_SETID kernel: /proc/$pid/maps visible during initial setuid ELF loading kernel: SELinux and mmap_min_addr kernel: md: NULL pointer deref when accessing suspend_* sysfs attributes kernel: x86_64 32 bit process register leak kernel: numerous getname() infoleaks kernel: tc: uninitialised kernel memory leak kernel: fs: pipe.c null pointer dereference kernel: tcf_fill_node() infoleak due to typo in 9ef1d4c7 kernel: flood ping cause out-of-iommu error and panic when mtu larger than 1500 kernel: r128 IOCTL NULL pointer dereferences when CCE state is uninitialised kernel: AF_UNIX: Fix deadlock on connecting to shutdown socket | [
"cpe:/a:redhat:enterprise_mrg:1::el5"
] | null | null | null | null |
RHSA-2013:0125 | Red Hat Security Advisory: wireshark security, bug fix, and enhancement update | (64bit): NULL pointer dereference by processing of a corrupted Diameter dictionary file wireshark: Stack-based buffer over-read from tvbuff buffer when reading snoop capture files wireshark: Heap-based buffer over-read in Visual Networks dissector wireshark: Infinite loop in the ANSI A Interface (IS-634/IOS) dissector wireshark: buffer overflow in the ERF file reader wireshark: multiple file parser vulnerabilities (wnpa-sec-2012-01) wireshark: NULL pointer vulnerabilities (wnpa-sec-2012-02) Wireshark: Dos via large buffer allocation request Wireshark: Dos due to integer overflow in IPTrace capture format parser wireshark: crash due to zero division in DCP ETSI dissector (wnpa-sec-2012-13) wireshark: DoS via excessive CPU consumption in AFP dissector (wnpa-sec-2012-17) wireshark: DoS via excessive CPU consumption in CTDB dissector (wnpa-sec-2012-23) wireshark: DoS via excessive system resource consumption in CIP dissector (wnpa-sec-2012-20) | [
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2011:1301 | Red Hat Security Advisory: jbossws-common security update | JBossWS remote Denial of Service | [
"cpe:/a:redhat:jboss_enterprise_application_platform:5::el4",
"cpe:/a:redhat:jboss_enterprise_application_platform:5::el5",
"cpe:/a:redhat:jboss_enterprise_application_platform:5::el6"
] | null | null | null | null |
RHSA-2017:2972 | Red Hat Security Advisory: httpd security update | httpd: Use-after-free by limiting unregistered HTTP method (Optionsbleed) httpd: # character matches all IPs | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | 6.5 | null |
RHSA-2020:3284 | Red Hat Security Advisory: postgresql-jdbc security update | postgresql-jdbc: XML external entity (XXE) vulnerability in PgSQLXML | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | 7.7 | null | null |
RHSA-2003:212 | Red Hat Security Advisory: : : : Updated glibc packages fix vulnerabilities | security flaw security flaw security flaw security flaw | [
"cpe:/o:redhat:linux:7.1"
] | null | null | null | null |
RHSA-2013:1024 | Red Hat Security Advisory: Red Hat Enterprise MRG Messaging 2.3.3 security update | python-qpid: client does not validate qpid server TLS/SSL certificate | [
"cpe:/a:redhat:enterprise_mrg:2:computenode:el6",
"cpe:/a:redhat:enterprise_mrg:2:server:el6"
] | null | null | null | null |
RHSA-2020:1308 | Red Hat Security Advisory: Red Hat Virtualization Engine security, bug fix 4.3.9 | apache-commons-beanutils: does not suppresses the class property in PropertyUtilsBean by default nimbus-jose-jwt: Uncaught exceptions while parsing a JWT | [
"cpe:/a:redhat:rhev_manager:4.3",
"cpe:/o:redhat:enterprise_linux:7::hypervisor"
] | null | null | 6.5 | null |
RHSA-2014:0374 | Red Hat Security Advisory: Red Hat JBoss Data Grid 6.2.1 update | tomcat: multiple content-length header poisoning flaws XStream: remote code execution due to insecure XML deserialization | [
"cpe:/a:redhat:jboss_data_grid:6.2.1"
] | null | null | null | null |
RHSA-2019:1258 | Red Hat Security Advisory: rh-mariadb102-mariadb and rh-mariadb102-galera security and bug fix update | mysql: Server: Replication unspecified vulnerability (CPU Oct 2017) mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2017) mariadb: Replication in sql/event_data_objects.cc occurs before ACL checks mysql: Server: Partition unspecified vulnerability (CPU Jan 2018) mysql: InnoDB unspecified vulnerability (CPU Jan 2018) mysql: Server: DDL unspecified vulnerability (CPU Jan 2018) mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2018) mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2018) mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2018) mysql: Server: Replication unspecified vulnerability (CPU Apr 2018) mysql: InnoDB unspecified vulnerability (CPU Apr 2018) mysql: Client programs unspecified vulnerability (CPU Apr 2018) mysql: InnoDB unspecified vulnerability (CPU Apr 2018) mysql: Server: Locking unspecified vulnerability (CPU Apr 2018) mysql: InnoDB unspecified vulnerability (CPU Apr 2018) mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2018) mysql: InnoDB unspecified vulnerability (CPU Apr 2018) mysql: InnoDB unspecified vulnerability (CPU Apr 2018) mysql: InnoDB unspecified vulnerability (CPU Apr 2018) mysql: InnoDB unspecified vulnerability (CPU Apr 2018) mysql: InnoDB unspecified vulnerability (CPU Apr 2018) mysql: Server: DDL unspecified vulnerability (CPU Apr 2018) mysql: Server: DDL unspecified vulnerability (CPU Apr 2018) mysql: InnoDB unspecified vulnerability (CPU Apr 2018) mysql: MyISAM unspecified vulnerability (CPU Jul 2018) mysql: InnoDB unspecified vulnerability (CPU Jul 2018) mysql: Server: Security: Privileges unspecified vulnerability (CPU Jul 2018) mysql: InnoDB unspecified vulnerability (CPU Jul 2018) mysql: Server: Options unspecified vulnerability (CPU Jul 2018) mysql: Client programs unspecified vulnerability (CPU Jul 2018) mysql: Server: Parser unspecified vulnerability (CPU Oct 2018) mysql: InnoDB unspecified vulnerability (CPU Oct 2018) mysql: InnoDB unspecified vulnerability (CPU Oct 2018) mysql: InnoDB unspecified vulnerability (CPU Oct 2018) mysql: InnoDB unspecified vulnerability (CPU Oct 2018) mysql: Init script calling kill with root privileges using pid from pidfile owned by mysql user (CPU Oct 2018) mysql: InnoDB unspecified vulnerability (CPU Oct 2018) mysql: InnoDB unspecified vulnerability (CPU Oct 2018) mysql: InnoDB unspecified vulnerability (CPU Oct 2018) mysql: InnoDB unspecified vulnerability (CPU Oct 2018) mysql: Server: Storage Engines unspecified vulnerability (CPU Oct 2018) mysql: InnoDB unspecified vulnerability (CPU Oct 2018) mysql: Server: Parser unspecified vulnerability (CPU Jan 2019) mysql: Server: Connection Handling unspecified vulnerability (CPU Jan 2019) mysql: InnoDB unspecified vulnerability (CPU Jan 2019) mysql: Server: DDL unspecified vulnerability (CPU Jan 2019) mysql: C API unspecified vulnerability (CPU Jul 2020) | [
"cpe:/a:redhat:rhel_software_collections:3::el6",
"cpe:/a:redhat:rhel_software_collections:3::el7"
] | null | 5.3 | 4.9 | null |
RHSA-2023:0806 | Red Hat Security Advisory: Mozilla Firefox security update | Mozilla: Content security policy leak in violation reports using iframes Mozilla: Extensions could have opened external schemes without user knowledge Mozilla: Screen hijack via browser fullscreen mode Mozilla: Out of bounds memory write from EncodeInputStream Mozilla: Potential use-after-free from compartment mismatch in SpiderMonkey Mozilla: Invalid downcast in SVGUtils::SetupStrokeGeometry Mozilla: Use-after-free in mozilla::dom::ScriptLoadContext::~ScriptLoadContext Mozilla: Web Crypto ImportKey crashes tab Mozilla: Fullscreen notification not shown in Firefox Focus Mozilla: Memory safety bugs fixed in Firefox 110 and Firefox ESR 102.8 Mozilla: Memory safety bugs fixed in Firefox ESR 102.8 | [
"cpe:/a:redhat:rhel_e4s:8.1::appstream"
] | null | 8.8 | null | null |
RHSA-2009:0392 | Red Hat Security Advisory: java-1.6.0-sun security update | Untrusted applet causes DoS by filling up disk space OpenJDK remote LDAP Denial-Of-Service (6717680) OpenJDK LDAP client remote code execution (6737315) OpenJDK Pack200 Buffer overflow vulnerability (6792554) OpenJDK Pack200 Buffer overflow vulnerability (6792554) OpenJDK: PNG and GIF processing buffer overflow vulnerabilities (6804996, 6804997) OpenJDK GIF processing buffer overflow vulnerability (6804998) OpenJDK: Type1 font processing buffer overflow vulnerability OpenJDK: DoS (disk consumption) via handling of temporary font files OpenJDK JAX-WS service endpoint remote Denial-of-Service (6630639) OpenJDK code generation vulnerability (6636360) OpenJDK: Files disclosure, arbitrary code execution via "deserializing applets" (6646860) OpenJDK: Intended access restrictions bypass via LiveConnect (6724331) OpenJDK: Possibility of trusted applet run in older, vulnerable version of JRE (6706490) OpenJDK: Improper parsing of crossdomain.xml files (intended access restriction bypass) (6798948) OpenJDK: Signed applet remote misuse possibility (6782871) | [
"cpe:/a:redhat:rhel_extras:4",
"cpe:/a:redhat:rhel_extras:5::client",
"cpe:/a:redhat:rhel_extras:5::server"
] | null | null | null | null |
RHSA-2024:3561 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.4.17 Security update | datatables.net: contents of array not escaped by HTML escape entities function EAP: wildfly-elytron has a SSRF security issue cxf-core: Apache CXF SSRF Vulnerability using the Aegis databinding | [
"cpe:/a:redhat:jboss_enterprise_application_platform:7.4::el9"
] | null | 7.4 | null | null |
RHSA-2023:0047 | Red Hat Security Advisory: grub2 security update | grub2: Buffer overflow in grub_font_construct_glyph() can lead to out-of-bound write and possible secure boot bypass grub2: Heap based out-of-bounds write when redering certain unicode sequences | [
"cpe:/o:redhat:rhel_eus:8.4::baseos"
] | null | 7.1 | null | null |
RHSA-2022:6422 | Red Hat Security Advisory: Multicluster Engine for Kubernetes 2.0.2 security and bug fixes | moment: inefficient parsing algorithm resulting in DoS vm2: Sandbox Escape in vm2 | [
"cpe:/a:redhat:multicluster_engine:2.0::el8"
] | null | 10 | null | null |
RHSA-2021:1192 | Red Hat Security Advisory: thunderbird security update | Mozilla: An attacker may use Thunderbird's OpenPGP key refresh mechanism to poison an existing key Mozilla: A crafted OpenPGP key with an invalid user ID could be used to confuse the user Mozilla: Inability to send encrypted OpenPGP email after importing a crafted OpenPGP key Mozilla: Thunderbird might execute an alternative OTR library Mozilla: Logic issue potentially leaves key material unlocked | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 7.5 | null | null |
RHSA-2010:0749 | Red Hat Security Advisory: poppler security update | xpdf: uninitialized Gfx::parser pointer dereference xpdf: array indexing error in FoFiType1::parse() | [
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2024:11119 | Red Hat Security Advisory: gstreamer1-plugins-good security update | gstreamer1-plugins-good: OOB-write in isomp4/qtdemux.c gstreamer1-plugins-good: OOB-write in convert_to_s334_1a gstreamer1-plugins-good: uninitialized stack memory in Matroska/WebM demuxer gstreamer1-plugins-good: integer overflows in MP4/MOV demuxer and memory allocator that can lead to out-of-bounds writes gstreamer1-plugins-good: null pointer dereference in gst_gdk_pixbuf_dec_flush | [
"cpe:/a:redhat:rhel_eus:9.2::appstream"
] | null | 6.5 | null | null |
RHSA-2022:4863 | Red Hat Security Advisory: Release of OpenShift Serverless Version 1.22.1 | golang: math/big: uncontrolled memory consumption due to an unhandled overflow via Rat.SetString golang: cmd/go: misinterpretation of branch names can lead to incorrect access control golang: crypto/elliptic: IsOnCurve returns true for invalid field elements | [
"cpe:/a:redhat:serverless:1.22::el8"
] | null | 7.1 | null | null |
RHSA-2014:0043 | Red Hat Security Advisory: bind security update | bind: named crash when handling malformed NSEC3-signed zones | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHBA-2023:3300 | Red Hat Bug Fix Advisory: Release of Bug Advisories for the Jenkins image and Jenkins agent base image | dev-java/snakeyaml: DoS via stack overflow | [
"cpe:/a:redhat:ocp_tools:4.12::el8"
] | null | 6.5 | null | null |
RHSA-2023:4325 | Red Hat Security Advisory: samba security and bug fix update | samba: SMB2 packet signing is not enforced when "server signing = required" is set | [
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::crb",
"cpe:/a:redhat:enterprise_linux:9::resilientstorage",
"cpe:/o:redhat:enterprise_linux:9::baseos"
] | null | 5.9 | null | null |
RHSA-2022:6061 | Red Hat Security Advisory: Red Hat OpenStack Platform 16.2 (etcd) security update | prometheus/client_golang: Denial of service using InstrumentHandlerCounter golang: compress/gzip: stack exhaustion in Reader.Read | [
"cpe:/a:redhat:openstack:16.2::el8"
] | null | 7.5 | null | null |
Subsets and Splits