id
stringlengths 13
15
| title
stringlengths 29
176
| description
stringlengths 8
31.7k
| cpes
sequencelengths 0
20
| cvss_v4_0
null | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
null |
---|---|---|---|---|---|---|---|
RHSA-2007:0169 | Red Hat Security Advisory: kernel security and bug fix update | Tracing execution of a threaded executable causes kernel BUG report security flaw security flaw | [
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2024:9525 | Red Hat Security Advisory: libsoup security update | libsoup: HTTP request smuggling via stripping null bytes from the ends of header names | [
"cpe:/a:redhat:rhel_aus:8.6::appstream",
"cpe:/a:redhat:rhel_e4s:8.6::appstream",
"cpe:/a:redhat:rhel_tus:8.6::appstream",
"cpe:/o:redhat:rhel_aus:8.6::baseos",
"cpe:/o:redhat:rhel_e4s:8.6::baseos",
"cpe:/o:redhat:rhel_tus:8.6::baseos"
] | null | 7.5 | null | null |
RHSA-2008:0972 | Red Hat Security Advisory: kernel security and bug fix update | kernel PWC driver DoS kernel: dio: zero struct dio with kzalloc instead of manually kernel: ptrace: Padding area write - unprivileged kernel crash kernel snd_seq_oss_synth_make_info leak Linux kernel ext[234] directory corruption denial of service kernel: open() call allows setgid bit when user is not in new file's group | [
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2024:5598 | Red Hat Security Advisory: libreoffice security update | libreoffice: Ability to trust not validated macro signatures removed in high security mode | [
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb"
] | null | 7.8 | null | null |
RHSA-2023:4166 | Red Hat Security Advisory: java-1.8.0-openjdk security and bug fix update | OpenJDK: array indexing integer overflow issue (8304468) OpenJDK: improper handling of slash characters in URI-to-path conversion (8305312) | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 3.7 | null | null |
RHSA-2018:0469 | Red Hat Security Advisory: dhcp security update | dhcp: Buffer overflow in dhclient possibly allowing code execution triggered by malicious server dhcp: Reference count overflow in dhcpd allows denial of service | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | 5.9 | null |
RHSA-2014:1781 | Red Hat Security Advisory: openstack-nova security, bug fix, and enhancement update | openstack-nova: incomplete fix for CVE-2014-2573, Nova VMware driver still leaks rescued images Trove: potential leak of passwords into log files Trove: potential leak of passwords into log files openstack-nova: Nova VMware driver may connect VNC to another tenant's console | [
"cpe:/a:redhat:openstack:5::el6"
] | null | null | null | null |
RHSA-2020:1268 | Red Hat Security Advisory: python security update | python: DOS via regular expression catastrophic backtracking in apop() method in pop3lib python: DOS via regular expression backtracking in difflib.IS_LINE_JUNK method in difflib python: Missing salt initialization in _elementtree.c module python: CRLF injection via the query part of the url passed to urlopen() python: CRLF injection via the path part of the url passed to urlopen() python: Undocumented local_file protocol allows remote attackers to bypass protection mechanisms | [
"cpe:/o:redhat:rhel_eus:7.5::computenode",
"cpe:/o:redhat:rhel_eus:7.5::server"
] | null | null | 7.4 | null |
RHSA-2003:238 | Red Hat Security Advisory: : : : Updated 2.4 kernel fixes vulnerabilities | security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw | [
"cpe:/o:redhat:linux:7.1",
"cpe:/o:redhat:linux:7.2",
"cpe:/o:redhat:linux:7.3",
"cpe:/o:redhat:linux:8.0",
"cpe:/o:redhat:linux:9"
] | null | null | null | null |
RHSA-2024:10988 | Red Hat Security Advisory: Logging for Red Hat OpenShift - 5.6.27 | dompurify: nesting-based mutation XSS vulnerability | [
"cpe:/a:redhat:logging:5.6::el8"
] | null | 8 | null | null |
RHSA-2019:1763 | Red Hat Security Advisory: firefox security update | Mozilla: Sandbox escape via installation of malicious language pack Mozilla: Memory safety bugs fixed in Firefox 68 and Firefox ESR 60.8 Mozilla: Script injection within domain through inner window reuse Mozilla: Cross-origin POST requests can be made with NPAPI plugins by following 308 redirects Mozilla: Use-after-free with HTTP/2 cached stream Mozilla: HTML parsing error can contribute to content XSS Mozilla: Caret character improperly escaped in origins Mozilla: Same-origin policy treats all files in a directory as having the same-origin | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 6.1 | null |
RHSA-2010:0037 | Red Hat Security Advisory: acroread security and bug fix update | acroread: multiple code execution flaws (APSB10-02) acroread: multiple code execution flaws (APSB10-02) acroread: multiple code execution flaws (APSB10-02) acroread: script injection vulnerability (APSB10-02) acroread: multiple code execution flaws (APSB10-02) acroread: media.newplayer JavaScript API code execution vulnerability (APSB10-02) | [
"cpe:/a:redhat:rhel_extras:5::client",
"cpe:/a:redhat:rhel_extras:5::server"
] | null | null | null | null |
RHSA-2007:0912 | Red Hat Security Advisory: libvorbis security update | libvorbis array boundary condition Multiple libvorbis flaws (CVE-2007-4066, CVE-2007-4029) Multiple libvorbis flaws (CVE-2007-4066, CVE-2007-4029) Multiple libvorbis flaws (CVE-2007-4066, CVE-2007-4029) | [
"cpe:/o:redhat:enterprise_linux:2.1::as",
"cpe:/o:redhat:enterprise_linux:2.1::aw",
"cpe:/o:redhat:enterprise_linux:2.1::es",
"cpe:/o:redhat:enterprise_linux:2.1::ws"
] | null | null | null | null |
RHSA-2024:5418 | Red Hat Security Advisory: bind9.16 security update | bind: bind9: BIND's database will be slow if a very large number of RRs exist at the same nam bind9: bind: SIG(0) can be used to exhaust CPU resources bind: bind9: Assertion failure when serving both stale cache data and authoritative zone content | [
"cpe:/a:redhat:rhel_aus:8.6::appstream",
"cpe:/a:redhat:rhel_e4s:8.6::appstream",
"cpe:/a:redhat:rhel_tus:8.6::appstream"
] | null | 7.5 | null | null |
RHSA-2019:0469 | Red Hat Security Advisory: java-1.8.0-ibm security update | libjpeg-turbo: Divide By Zero in alloc_sarray function in jmemmgr.c JDK: buffer overflow in jio_snprintf() and jio_vsnprintf() JDK: missing null check when accelerating Unsafe calls OpenJDK: memory disclosure in FileChannelImpl (Libraries, 8206290) JDK: unspecified vulnerability fixed in 8u201 (Deployment) | [
"cpe:/a:redhat:rhel_extras:6"
] | null | null | 3.1 | null |
RHSA-2022:5029 | Red Hat Security Advisory: Red Hat build of Eclipse Vert.x 4.2.7 security update | jackson-databind: denial of service via a large depth of nested objects com.google.code.gson-gson: Deserialization of Untrusted Data in com.google.code.gson-gson | [
"cpe:/a:redhat:openshift_application_runtimes:1.0"
] | null | 7.5 | null | null |
RHSA-2009:0451 | Red Hat Security Advisory: kernel-rt security and bug fix update | Kernel BUG() in locks_remove_flock Linux kernel minor signal handling vulnerability kernel: x86-64: syscall-audit: 32/64 syscall hole kernel: x86-64: seccomp: 32/64 syscall hole kernel: utf8 selection memory corruption kernel: exit_notify: kill the wrong capable(CAP_KILL) check | [
"cpe:/a:redhat:enterprise_mrg:1::el5"
] | null | null | null | null |
RHSA-2024:10779 | Red Hat Security Advisory: python3:3.6.8 security update | python: Virtual environment (venv) activation scripts don't quote paths python: Improper validation of IPv6 and IPvFuture addresses | [
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 3.7 | null | null |
RHSA-2008:0768 | Red Hat Security Advisory: mysql security, bug fix, and enhancement update | mysql server DoS MySQL improper permission revocation mysql DROP privilege not enforced when renaming tables mysql: privilege escalation via DATA/INDEX DIRECTORY directives | [
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2024:4636 | Red Hat Security Advisory: libndp security update | libndp: buffer overflow in route information length field | [
"cpe:/o:redhat:enterprise_linux:9::baseos"
] | null | 8.1 | null | null |
RHSA-2009:0010 | Red Hat Security Advisory: squirrelmail security update | squirrelmail: XSS issue caused by an insufficient html mail sanitation squirrelmail: session hijacking - secure flag not set for HTTPS-only cookies | [
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws",
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2021:3646 | Red Hat Security Advisory: OpenShift Container Platform 3.11.524 security and bug fix update | kubernetes: Symlink exchange can allow host filesystem access | [
"cpe:/a:redhat:openshift:3.11::el7"
] | null | 8.8 | null | null |
RHSA-2015:0800 | Red Hat Security Advisory: openssl security update | openssl: Fix various certificate fingerprint issues openssl: only allow ephemeral RSA keys in export ciphersuites (FREAK) openssl: ASN.1 structure reuse memory corruption openssl: X509_to_X509_REQ NULL pointer dereference openssl: PKCS7 NULL pointer dereference openssl: integer underflow leading to buffer overflow in base64 decoding openssl: assertion failure in SSLv2 servers openssl: Divide-and-conquer session key recovery in SSLv2 openssl: SSLv2 Bleichenbacher protection overwrites wrong bytes for export ciphers | [
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | 5.3 | null |
RHSA-2021:2521 | Red Hat Security Advisory: virt:8.2 and virt-devel:8.2 security update | QEMU: msix: OOB access during mmio operations may lead to DoS qemu: out-of-bound heap buffer access via an interrupt ID field | [
"cpe:/a:redhat:advanced_virtualization:8.2::el8"
] | null | 2.5 | null | null |
RHSA-2020:4052 | Red Hat Security Advisory: qemu-kvm security update | QEMU: usb: out-of-bounds r/w access issue while processing usb packets | [
"cpe:/o:redhat:rhel_eus:7.6::computenode",
"cpe:/o:redhat:rhel_eus:7.6::server"
] | null | 5 | null | null |
RHSA-2022:6155 | Red Hat Security Advisory: Red Hat OpenShift Data Foundation 4.11.0 security, enhancement & bugfix update | golang: math/big: uncontrolled memory consumption due to an unhandled overflow via Rat.SetString golang: encoding/pem: fix stack overflow in Decode golang: crypto/elliptic: panic caused by oversized scalar | [
"cpe:/a:redhat:openshift_data_foundation:4.11::el8"
] | null | 7.5 | null | null |
RHSA-2021:0145 | Red Hat Security Advisory: Red Hat OpenShift Serverless Client kn 1.12.0 | golang: default Content-Type setting in net/http/cgi and net/http/fcgi could cause XSS golang: math/big: panic during recursive division of very large numbers golang: malicious symbol names can lead to code execution at build time golang: improper validation of cgo flags can lead to code execution at build time | [
"cpe:/a:redhat:serverless:1.0::el8"
] | null | 7.5 | null | null |
RHSA-2020:5649 | Red Hat Security Advisory: Red Hat OpenShift Service Mesh 1.1.11 security update | golang: data race in certain net/http servers including ReverseProxy can lead to DoS golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs | [
"cpe:/a:redhat:service_mesh:1.1::el8"
] | null | 7.5 | null | null |
RHSA-2011:1103 | Red Hat Security Advisory: libpng security update | libpng: Invalid read when handling empty sCAL chunks | [
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2023:5183 | Red Hat Security Advisory: firefox security update | libwebp: Heap buffer overflow in WebP Codec libwebp: out-of-bounds write with a specially crafted WebP lossless file | [
"cpe:/a:redhat:rhel_e4s:8.1::appstream"
] | null | 0 | null | null |
RHSA-2024:10214 | Red Hat Security Advisory: Red Hat Data Grid 8.5.2 security update | webpack: DOM Clobbering vulnerability in AutoPublicPathRuntimeModule com.thoughtworks.xstream: XStream is vulnerable to a Denial of Service attack due to stack overflow from a manipulated binary input stream | [
"cpe:/a:redhat:jboss_data_grid:8"
] | null | 7.5 | null | null |
RHSA-2021:3248 | Red Hat Security Advisory: OpenShift Container Platform 4.8.9 packages and security update | golang: net/http: panic in ReadRequest and ReadResponse when reading a very large header golang: net: lookup functions may return invalid host names golang: net/http/httputil: ReverseProxy forwards connection headers if first one is empty golang: math/big.Rat: may cause a panic or an unrecoverable fatal error if passed inputs with very large exponents golang: crypto/tls: certificate of wrong type is causing TLS client to panic | [
"cpe:/a:redhat:openshift:4.8::el7",
"cpe:/a:redhat:openshift:4.8::el8"
] | null | 6.5 | null | null |
RHSA-2017:0832 | Red Hat Security Advisory: JBoss Enterprise Application Platform 7.0.5 on RHEL 7 | jboss: jbossas: unsafe chown of server.log in jboss init script allows privilege escalation wildfly: ParseState headerValuesCache can be exploited to fill heap with garbage | [
"cpe:/a:redhat:jboss_enterprise_application_platform:7::el7"
] | null | null | 7.5 | null |
RHSA-2019:2621 | Red Hat Security Advisory: redis security update | redis: Heap buffer overflow in HyperLogLog triggered by malicious client | [
"cpe:/a:redhat:openstack:14::el7"
] | null | null | 7.2 | null |
RHSA-2013:1135 | Red Hat Security Advisory: nss and nspr security, bug fix, and enhancement update | Mozilla: Out-of-bounds array read in CERT_DecodeCertPackage (MFSA 2013-40) nss: TLS CBC padding timing attack | [
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2020:2146 | Red Hat Security Advisory: .NET Core on Red Hat Enterprise Linux security and bug fix update | dotnet: Denial of service via untrusted input | [
"cpe:/a:redhat:rhel_dotnet:2.1::el7"
] | null | 7.5 | null | null |
RHSA-2017:0838 | Red Hat Security Advisory: openjpeg security update | openjpeg: Heap overflow in parsing of JPEG2000 precincts openjpeg: heap overflow due to unsafe use of opj_aligned_malloc openjpeg: heap overflow in parsing of JPEG2000 code blocks openjpeg: Integer overflow in opj_pi_create_decode openjpeg: heap out-of-bounds read due to insufficient check in imagetopnm() openjpeg: incorrect fix for CVE-2013-6045 | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 7.5 | null |
RHSA-2020:5184 | Red Hat Security Advisory: microcode_ctl security, bug fix and enhancement update | hw: Vector Register Leakage-Active hw: Fast forward store predictor | [
"cpe:/o:redhat:rhel_aus:6.6::server"
] | null | 5.5 | null | null |
RHSA-2015:0100 | Red Hat Security Advisory: libyaml security update | libyaml: assert failure when processing wrapped strings | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation",
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | null | null |
RHSA-2014:1306 | Red Hat Security Advisory: bash security update | bash: code execution via specially-crafted environment (Incomplete fix for CVE-2014-6271) bash: parser can allow out-of-bounds memory access while handling redir_stack bash: off-by-one error in deeply nested flow control constructs | [
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::server",
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation",
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | null | null |
RHSA-2024:6684 | Red Hat Security Advisory: thunderbird security update | mozilla: Type Confusion in Async Generators in Javascript Engine mozilla: Type confusion when looking up a property name in a "with" block mozilla: Internal event interfaces were exposed to web content when browser EventHandler listener callbacks ran mozilla: Garbage collection could mis-color cross-compartment objects in OOM conditions mozilla: WASM type confusion involving ArrayTypes mozilla: SelectElements could be shown over another site if popups are allowed mozilla: Memory safety bugs fixed in Firefox 130, Firefox ESR 128.2, and Thunderbird 128.2 thunderbird: Crash when aborting verification of OTR chat | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 6.5 | null | null |
RHSA-2013:1205 | Red Hat Security Advisory: Red Hat Storage 2.0 security, bug fix, and enhancement update #6 | 2.0: appliance-base / redhat-storage-server /tmp file creation vuln | [
"cpe:/a:redhat:storage:2.0:server:el6"
] | null | null | null | null |
RHSA-2023:1297 | Red Hat Security Advisory: OpenShift Container Platform 4.11.32 security and extras update | goutils: RandomAlphaNumeric and CryptoRandomAlphaNumeric are not as random as they should be | [
"cpe:/a:redhat:openshift:4.11::el8"
] | null | 7 | null | null |
RHSA-2017:1484 | Red Hat Security Advisory: kernel security update | kernel: heap/stack gap jumping via unbounded stack allocations kernel: Incorrectly mapped contents of PIE executable | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 2.9 | null |
RHSA-2023:7198 | Red Hat Security Advisory: OpenShift Container Platform 4.15.0 bug fix and security update | golang.org/x/net/html: Cross site scripting follow-redirects: Improper Input Validation due to the improper handling of URLs by the url.parse() rekor: compressed archives can result in OOM conditions goproxy: Denial of service (DoS) via unspecified vectors. golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487) golang: net/http/internal: Denial of Service (DoS) via Resource Consumption via HTTP requests prometheus-alertmanager: UI is vulnerable to stored XSS via the /api/v1/alerts endpoint HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack) opentelemetry: DoS vulnerability in otelhttp golang: cmd/go: Protocol Fallback when fetching modules opentelemetry-go-contrib: DoS vulnerability in otelgrpc due to unbound cardinality metrics ssh: Prefix truncation attack on Binary Packet Protocol (BPP) go-git: Maliciously crafted Git server replies can lead to path traversal and RCE on go-git clients | [
"cpe:/a:redhat:openshift:4.15::el8",
"cpe:/a:redhat:openshift:4.15::el9"
] | null | 8.1 | null | null |
RHSA-2018:2822 | Red Hat Security Advisory: qemu-kvm-rhev security update | QEMU: slirp: heap buffer overflow while reassembling fragmented datagrams | [
"cpe:/a:redhat:openstack:10::el7",
"cpe:/a:redhat:openstack:12::el7",
"cpe:/a:redhat:openstack:13::el7",
"cpe:/a:redhat:openstack:8::el7",
"cpe:/a:redhat:openstack:9::el7"
] | null | null | 5.1 | null |
RHSA-2024:7182 | Red Hat Security Advisory: OpenShift Container Platform 4.15.35 packages and security update | containers/image: digest type does not guarantee valid type webob: WebOb's location header normalization during redirect leads to open redirect | [
"cpe:/a:redhat:openshift:4.15::el8",
"cpe:/a:redhat:openshift:4.15::el9",
"cpe:/a:redhat:openshift_ironic:4.15::el9"
] | null | 6.1 | null | null |
RHSA-2020:4274 | Red Hat Security Advisory: rh-maven35-apache-commons-collections4 security update | apache-commons-collections: InvokerTransformer code execution during deserialisation | [
"cpe:/a:redhat:rhel_software_collections:3::el7"
] | null | 7.5 | null | null |
RHSA-2022:0007 | Red Hat Security Advisory: idm:DL1 security update | samba: Samba AD DC did not always rely on the SID and PAC in Kerberos tickets | [
"cpe:/a:redhat:rhel_eus:8.4::appstream"
] | null | 7.2 | null | null |
RHSA-2016:0513 | Red Hat Security Advisory: java-1.8.0-openjdk security update | OpenJDK: missing type safety checks for MethodHandle calls across class loaders, incorrect CVE-2013-5838 fix (Hotspot, 8151666) | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | null | null |
RHSA-2009:0261 | Red Hat Security Advisory: vnc security update | vnc: vncviewer insufficient encoding value validation in CMsgReader::readRect | [
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws",
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws",
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2022:0590 | Red Hat Security Advisory: kpatch-patch security update | kernel: Use After Free in unix_gc() which could result in a local privilege escalation kernel: use-after-free in RDMA listen() kernel: xfs: raw block device data leak in XFS_IOC_ALLOCSP IOCTL | [
"cpe:/o:redhat:rhel_eus:8.2::baseos"
] | null | 5.5 | null | null |
RHSA-2023:5952 | Red Hat Security Advisory: Red Hat OpenShift Service Mesh for 2.4.4 security update | containerd: pulling and extracting crafted container image may result in Unix file permission changes buildkit: Data disclosure in provenance attestation describing a build golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487) | [
"cpe:/a:redhat:service_mesh:2.4::el8"
] | null | 7.5 | null | null |
RHSA-2023:7015 | Red Hat Security Advisory: wireshark security update | wireshark: RTPS dissector crash wireshark: VMS TCPIPtrace file parser crash wireshark: NetScaler file parser crash wireshark: XRA dissector infinite loop | [
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb"
] | null | 6.5 | null | null |
RHSA-2024:1961 | Red Hat Security Advisory: kpatch-patch security update | kernel: tun: bugs for oversize packet when napi frags enabled in tun_napi_alloc_frags | [
"cpe:/o:redhat:rhel_e4s:8.2::baseos"
] | null | 7.8 | null | null |
RHSA-2023:6061 | Red Hat Security Advisory: Red Hat OpenShift Pipelines 1.12.1 release and security update | golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487) HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack) | [
"cpe:/a:redhat:openshift_pipelines:1.12::el8"
] | null | 7.5 | null | null |
RHSA-2018:1877 | Red Hat Security Advisory: sssd and ding-libs security and bug fix update | sssd: unsanitized input when searching in local cache database | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | 4.3 | null |
RHSA-2016:1607 | Red Hat Security Advisory: qemu-kvm-rhev security update | Qemu: block: iscsi: buffer overflow in iscsi_aio_ioctl Qemu: virtio: unbounded memory allocation on host via guest leading to DoS | [
"cpe:/o:redhat:enterprise_linux:7::hypervisor"
] | null | null | 3.4 | null |
RHSA-2021:1343 | Red Hat Security Advisory: Ansible security update (2.9.20) | ansible: multiple modules expose secured values | [
"cpe:/a:redhat:ansible_engine:2.9::el7",
"cpe:/a:redhat:ansible_engine:2.9::el8"
] | null | 5 | null | null |
RHSA-2019:3832 | Red Hat Security Advisory: kernel security update | hw: Machine Check Error on Page Size Change (IFU) hw: Intel GPU Denial Of Service while accessing MMIO in lower power state hw: TSX Transaction Asynchronous Abort (TAA) | [
"cpe:/a:redhat:enterprise_linux:8::crb",
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | null | 6.5 | null |
RHSA-2013:1284 | Red Hat Security Advisory: ruby193-puppet security update | puppet: remote code execution on master from unauthenticated clients Puppet: resource_type service code execution Puppet: Local Privilege Escalation/Arbitrary Code Execution | [
"cpe:/a:redhat:openstack:3::el6"
] | null | null | null | null |
RHSA-2003:223 | Red Hat Security Advisory: stunnel security update | security flaw | [
"cpe:/o:redhat:enterprise_linux:2.1::as",
"cpe:/o:redhat:enterprise_linux:2.1::aw",
"cpe:/o:redhat:enterprise_linux:2.1::es",
"cpe:/o:redhat:enterprise_linux:2.1::ws"
] | null | null | null | null |
RHSA-2009:1657 | Red Hat Security Advisory: flash-plugin security update | flash-plugin: multiple code execution flaws (APSB09-19) (CVE-2009-3794, CVE-2009-3796, CVE-2009-3797, CVE-2009-3798, CVE-2009-3799, CVE-2009-3800) flash-plugin: multiple code execution flaws (APSB09-19) (CVE-2009-3794, CVE-2009-3796, CVE-2009-3797, CVE-2009-3798, CVE-2009-3799, CVE-2009-3800) flash-plugin: multiple code execution flaws (APSB09-19) (CVE-2009-3794, CVE-2009-3796, CVE-2009-3797, CVE-2009-3798, CVE-2009-3799, CVE-2009-3800) flash-plugin: multiple code execution flaws (APSB09-19) (CVE-2009-3794, CVE-2009-3796, CVE-2009-3797, CVE-2009-3798, CVE-2009-3799, CVE-2009-3800) flash-plugin: multiple code execution flaws (APSB09-19) (CVE-2009-3794, CVE-2009-3796, CVE-2009-3797, CVE-2009-3798, CVE-2009-3799, CVE-2009-3800) flash-plugin: multiple code execution flaws (APSB09-19) (CVE-2009-3794, CVE-2009-3796, CVE-2009-3797, CVE-2009-3798, CVE-2009-3799, CVE-2009-3800) | [
"cpe:/a:redhat:rhel_extras:5::client",
"cpe:/a:redhat:rhel_extras:5::server"
] | null | null | null | null |
RHSA-2020:4514 | Red Hat Security Advisory: openssl security, bug fix, and enhancement update | openssl: Integer overflow in RSAZ modular exponentiation on x86_64 | [
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 4.8 | null | null |
RHSA-2018:0548 | Red Hat Security Advisory: ceph security update | ceph: Unauthenticated malformed HTTP requests handled by rgw_civetweb.cc:RGW::init_env() can lead to denial of service | [
"cpe:/a:redhat:ceph_storage:3::ubuntu16.04"
] | null | null | 7.3 | null |
RHSA-2020:4245 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.3.3 security update on RHEL 8 | cxf: JMX integration is vulnerable to a MITM attack picketbox: JBoss EAP reload to admin-only mode allows authentication bypass wildfly: XML validation manipulation due to incomplete application of use-grammar-pool-only in xercesImpl xnio: file descriptor leak caused by growing amounts of NIO Selector file handles may lead to DoS | [
"cpe:/a:redhat:jboss_enterprise_application_platform:7.3::el8"
] | null | 5.9 | null | null |
RHSA-2018:2184 | Red Hat Security Advisory: CloudForms 4.6.3 bug fix and enhancement update | ansible: Failed tasks do not honour no_log option allowing for secrets to be disclosed in logs | [
"cpe:/a:redhat:cloudforms_managementengine:5.9::el7"
] | null | null | 5.9 | null |
RHSA-2020:4479 | Red Hat Security Advisory: libxml2 security update | libxml2: memory leak in xmlParseBalancedChunkMemoryRecover in parser.c libxml2: memory leak in xmlSchemaPreRun in xmlschemas.c libxml2: infinite loop in xmlStringLenDecodeEntities in some end-of-file situations | [
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 7.5 | null | null |
RHSA-2022:5529 | Red Hat Security Advisory: squid:4 security update | squid: DoS when processing gopher server responses | [
"cpe:/a:redhat:rhel_eus:8.2::appstream"
] | null | 7.5 | null | null |
RHSA-2017:0175 | Red Hat Security Advisory: java-1.8.0-oracle security update | OpenJDK: incorrect ECDSA signature extraction from the DER input (Libraries, 8168714) OpenJDK: missing ObjectIdentifier length check (Libraries, 8168705) OpenJDK: DSA implementation timing attack (Libraries, 8168728) OpenJDK: ECDSA implementation timing attack (Libraries, 8168724) OpenJDK: incorrect URL parsing in URLStreamHandler (Networking, 8167223) JDK: unspecified vulnerability fixed in 8u121 (Java Mission Control) OpenJDK: URLClassLoader insufficient access control checks (Networking, 8151934) OpenJDK: untrusted input deserialization in RMI registry and DCG (RMI, 8156802) OpenJDK: LdapLoginModule incorrect userDN extraction (JAAS, 8161743) OpenJDK: imageio PNGImageReader failed to honor ignoreMetadata for iTXt and zTXt chunks (2D, 8166988) JDK: unspecified vulnerability fixed in 6u141, 7u131, and 8u121 (Deployment) OpenJDK: integer overflow in SocketOutputStream boundary check (Networking, 8164147) JDK: unspecified vulnerability fixed in 8u121 (Java Mission Control) OpenJDK: insufficient protected field access checks in atomic field updaters (Libraries, 8165344) OpenJDK: insecure class construction (Hotspot, 8167104) | [
"cpe:/a:redhat:rhel_extras_oracle_java:6",
"cpe:/a:redhat:rhel_extras_oracle_java:7"
] | null | null | 8.8 | null |
RHSA-2021:2300 | Red Hat Security Advisory: microcode_ctl security, bug fix and enhancement update | hw: vt-d related privilege escalation hw: improper isolation of shared resources in some Intel Processors hw: observable timing discrepancy in some Intel Processors hw: information disclosure on some Intel Atom processors | [
"cpe:/o:redhat:rhel_aus:7.2::server"
] | null | 5.6 | null | null |
RHSA-2014:1880 | Red Hat Security Advisory: java-1.7.1-ibm security update | JDK: privilege escalation via shared class cache SSL/TLS: Padding Oracle On Downgraded Legacy Encryption attack JDK: unspecified vulnerability fixed in 6u85, 7u71 and 8u25 (Deployment) JDK: unspecified vulnerability fixed in 7u71 and 8u25 (Deployment) OpenJDK: Triple Handshake attack against TLS/SSL connections (JSSE, 8037066) JDK: unspecified vulnerability fixed in 6u85, 7u71 and 8u25 (Deployment) JDK: unspecified vulnerability fixed in 7u71 and 8u25 (Deployment) JDK: unspecified vulnerability fixed in 6u85, 7u71 and 8u25 (Deployment) JDK: unspecified vulnerability fixed in 6u85, 7u71 and 8u25 (Deployment) OpenJDK: LogRecord use of incorrect CL when loading ResourceBundle (Libraries, 8042797) JDK: unspecified vulnerability fixed in 6u85, 7u71 and 8u25 (Deployment) OpenJDK: insufficient permission checks when setting resource bundle on system logger (Libraries, 8041564) ICU: Layout Engine ContextualSubstitution missing boundary checks (JDK 2D, 8041540) OpenJDK: DatagramSocket connected socket missing source check (Libraries, 8039509) JDK: unspecified vulnerability fixed in 6u85, 7u71 and 8u25 (Deployment) JDK: unspecified vulnerability fixed in 7u71 and 8u25 (Deployment) OpenJDK: insufficient ResourceBundle name check (Libraries, 8044274) JDK: unspecified vulnerability fixed in 6u85, 7u71 and 8u25 (Deployment) OpenJDK: CipherInputStream incorrect exception handling (Security, 8037846) | [
"cpe:/a:redhat:rhel_extras:6",
"cpe:/a:redhat:rhel_extras:7"
] | null | null | null | null |
RHSA-2006:0604 | Red Hat Security Advisory: ruby security update | security flaw | [
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws",
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2021:0931 | Red Hat Security Advisory: openvswitch2.11 and ovn2.11 security update | lldpd: buffer overflow in the lldp_decode function in daemon/protocols/lldp.c dpdk: librte_vhost Integer overflow in vhost_user_set_log_base() dpdk: librte_vhost Integer truncation in vhost_user_check_and_alloc_queue_pair() dpdk: librte_vhost Missing inputs validation in Vhost-crypto | [
"cpe:/a:redhat:openstack:13::el7"
] | null | 5.1 | null | null |
RHSA-2024:0589 | Red Hat Security Advisory: sqlite security update | sqlite: heap-buffer-overflow at sessionfuzz | [
"cpe:/a:redhat:rhel_eus:8.8::appstream",
"cpe:/o:redhat:rhel_eus:8.8::baseos"
] | null | 7.3 | null | null |
RHSA-2024:5438 | Red Hat Security Advisory: OpenShift Container Platform 4.15.28 packages and security update | ssh: Prefix truncation attack on Binary Packet Protocol (BPP) | [
"cpe:/a:redhat:openshift:4.15::el8",
"cpe:/a:redhat:openshift:4.15::el9"
] | null | 5.9 | null | null |
RHSA-2015:2616 | Red Hat Security Advisory: openssl security update | OpenSSL: X509_ATTRIBUTE memory leak | [
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | 5.3 | null |
RHSA-2003:103 | Red Hat Security Advisory: kernel security update | security flaw | [
"cpe:/o:redhat:enterprise_linux:2.1::as",
"cpe:/o:redhat:enterprise_linux:2.1::es",
"cpe:/o:redhat:enterprise_linux:2.1::ws"
] | null | null | null | null |
RHSA-2021:2562 | Red Hat Security Advisory: Red Hat JBoss Web Server 5.5.0 security release | hibernate-core: SQL injection vulnerability when both hibernate.use_sql_comments and JPQL String literals are used tomcat: Request mix-up with h2c tomcat: Incomplete fix for CVE-2020-9484 (RCE via session persistence) | [
"cpe:/a:redhat:jboss_enterprise_web_server:5.5"
] | null | 7 | null | null |
RHEA-2022:5139 | Red Hat Enhancement Advisory: nodejs:12 bug fix and enhancement update | nodejs-json-schema: Prototype pollution vulnerability llhttp: HTTP Request Smuggling due to spaces in headers llhttp: HTTP Request Smuggling when parsing the body of chunked requests nodejs-tar: Insufficient symlink protection due to directory cache poisoning using symbolic links allowing arbitrary file creation and overwrite nodejs-tar: Insufficient symlink protection due to directory cache poisoning using symbolic links allowing arbitrary file creation and overwrite nodejs: Improper handling of URI Subject Alternative Names nodejs: Certificate Verification Bypass via String Injection nodejs: Incorrect handling of certificate subject and issuer fields nodejs: Prototype pollution via console.table properties | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 8.2 | null | null |
RHSA-2020:4289 | Red Hat Security Advisory: kernel-rt security and bug fix update | kernel: net: bluetooth: type confusion while processing AMP packets kernel: net: bluetooth: information leak when processing certain AMP packets kernel: kernel: buffer over write in vgacon_scroll kernel: metadata validator in XFS may cause an inode with a valid, user-creatable extended attribute to be flagged as corrupt kernel: memory corruption in net/packet/af_packet.c leads to elevation of privilege | [
"cpe:/a:redhat:enterprise_linux:8::nfv",
"cpe:/a:redhat:enterprise_linux:8::realtime"
] | null | 7.8 | null | null |
RHSA-2024:2272 | Red Hat Security Advisory: containernetworking-plugins security update | golang: net/http/internal: Denial of Service (DoS) via Resource Consumption via HTTP requests golang: crypto/tls: Timing Side Channel attack in RSA based TLS key exchanges. | [
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 7.5 | null | null |
RHSA-2015:0349 | Red Hat Security Advisory: qemu-kvm security, bug fix, and enhancement update | qemu: slirp: NULL pointer deref in sosendto() qemu: vnc: insufficient bits_per_pixel from the client sanitization qemu: insufficient parameter validation during ram load qemu: cirrus: insufficient blit region checks | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | null | null |
RHSA-2015:1855 | Red Hat Security Advisory: mod_proxy_fcgi security update | httpd: mod_proxy_fcgi handle_headers() buffer over read | [
"cpe:/a:redhat:rhel_common:6::el6"
] | null | null | null | null |
RHSA-2024:7590 | Red Hat Security Advisory: OpenShift Container Platform 4.12.67 bug fix and security update | glibc: Out of bounds write in iconv may lead to remote code execution webob: WebOb's location header normalization during redirect leads to open redirect | [
"cpe:/a:redhat:openshift:4.12::el8",
"cpe:/a:redhat:openshift:4.12::el9"
] | null | 6.1 | null | null |
RHSA-2023:5810 | Red Hat Security Advisory: Red Hat Ansible Automation Platform 2.3 Product Security and Bug Fix Update | golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487) | [
"cpe:/a:redhat:ansible_automation_platform:2.3::el8",
"cpe:/a:redhat:ansible_automation_platform:2.3::el9",
"cpe:/a:redhat:ansible_automation_platform_developer:2.3::el8",
"cpe:/a:redhat:ansible_automation_platform_developer:2.3::el9",
"cpe:/a:redhat:ansible_automation_platform_inside:2.3::el8",
"cpe:/a:redhat:ansible_automation_platform_inside:2.3::el9"
] | null | 7.5 | null | null |
RHSA-2021:0319 | Red Hat Security Advisory: Red Hat Single Sign-On 7.4.5 security update on RHEL 7 | keycloak: Default Client configuration is vulnerable to SSRF using "request_uri" parameter | [
"cpe:/a:redhat:red_hat_single_sign_on:7::el7"
] | null | 5.8 | null | null |
RHSA-2012:0515 | Red Hat Security Advisory: firefox security update | Mozilla: Off-by-one error in OpenType Sanitizer (MFSA 2012-31) Mozilla: Miscellaneous memory safety hazards (rv:12.0/ rv:10.0.4) (MFSA 2012-20) Mozilla: Miscellaneous memory safety hazards (rv:12.0/ rv:10.0.4) (MFSA 2012-20) Mozilla: use-after-free in IDBKeyRange (MFSA 2012-22) Mozilla: Invalid frees causes heap corruption in gfxImageSurface (MFSA 2012-23) Mozilla: Potential XSS via multibyte content processing errors (MFSA 2012-24) Mozilla: Potential memory corruption during font rendering using cairo-dwrite (MFSA 2012-25) Mozilla: WebGL.drawElements may read illegal video memory due to FindMaxUshortElement error (MFSA 2012-26) Mozilla: Page load short-circuit can lead to XSS (MFSA 2012-27) Mozilla: Potential XSS through ISO-2022-KR/ISO-2022-CN decoding issues (MFSA 2012-29) Mozilla: Crash with WebGL content using textImage2D (MFSA 2012-30) Mozilla: Potential site identity spoofing when loading RSS and Atom feeds (MFSA 2012-33) | [
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server",
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2016:2705 | Red Hat Security Advisory: qemu-kvm-rhev security, bug fix, and enhancement update | Qemu: OOB access in address_space_rw leads to segmentation fault Qemu: OOB access in address_space_rw leads to segmentation fault Qemu: net: out of bounds read in net_checksum_calculate() | [
"cpe:/a:redhat:openstack:6::el7"
] | null | null | 4.7 | null |
RHSA-2015:0104 | Red Hat Security Advisory: ntp security update | ntp: automatic generation of weak default key in config_auth() ntp: ntp-keygen uses weak random number generator and seed when generating MD5 keys ntp: Multiple buffer overflows via specially-crafted packets ntp: receive() missing return on error | [
"cpe:/o:redhat:rhel_eus:6.5::computenode",
"cpe:/o:redhat:rhel_eus:6.5::server"
] | null | null | null | null |
RHSA-2021:3468 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.3.9 security update on RHEL 8 | undertow: HTTP2SourceChannel fails to write final frame under some circumstances may lead to DoS wildfly-core: Invalid Sensitivity Classification of Vault Expression undertow: buffer leak on incoming websocket PONG message may lead to DoS jakarta-el: ELParserTokenManager enables invalid EL expressions to be evaluate apache-commons-io: Limited path traversal in Apache Commons IO 2.2 to 2.6 | [
"cpe:/a:redhat:jboss_enterprise_application_platform:7.3::el8"
] | null | 4.8 | null | null |
RHSA-2021:1566 | Red Hat Security Advisory: OpenShift Container Platform 4.6.30 packages and security update | runc: vulnerable to symlink exchange attack | [
"cpe:/a:redhat:openshift:4.6::el7",
"cpe:/a:redhat:openshift:4.6::el8"
] | null | 7.5 | null | null |
RHSA-2024:4570 | Red Hat Security Advisory: OpenJDK 17.0.12 Security Update for Portable Linux Builds | OpenJDK: potential UTF8 size overflow (8314794) OpenJDK: Excessive symbol length can lead to infinite loop (8319859) OpenJDK: Range Check Elimination (RCE) pre-loop limit overflow (8320548) OpenJDK: Out-of-bounds access in 2D image handling (8324559) OpenJDK: RangeCheckElimination array index overflow (8323231) | [
"cpe:/a:redhat:openjdk:17"
] | null | 7.4 | null | null |
RHSA-2011:0928 | Red Hat Security Advisory: kernel security and bug fix update | kernel: netns vs proto registration ordering kernel: netns vs proto registration ordering kernel: thp: madvise on top of /dev/zero private mapping can lead to panic | [
"cpe:/o:redhat:enterprise_linux:6::server"
] | null | null | null | null |
RHSA-2023:5457 | Red Hat Security Advisory: frr security update | frr: Incorrect handling of a error in parsing of an invalid section of a BGP update can de-peer a router | [
"cpe:/a:redhat:rhel_eus:9.0::appstream"
] | null | 7.5 | null | null |
RHSA-2022:7648 | Red Hat Security Advisory: grafana-pcp security update | golang: net/http: improper sanitization of Transfer-Encoding header golang: io/fs: stack exhaustion in Glob golang: compress/gzip: stack exhaustion in Reader.Read golang: path/filepath: stack exhaustion in Glob golang: encoding/gob: stack exhaustion in Decoder.Decode golang: net/http/httputil: NewSingleHostReverseProxy - omit X-Forwarded-For not working | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 6.5 | null | null |
RHSA-2020:5165 | Red Hat Security Advisory: chromium-browser security update | chromium-browser: Inappropriate implementation in V8 chromium-browser: Inappropriate implementation in base chromium-browser: Use after free in site isolation | [
"cpe:/a:redhat:rhel_extras:6"
] | null | 8.8 | null | null |
RHSA-2024:3473 | Red Hat Security Advisory: OpenShift Virtualization 4.14.6 Images security update | axios: exposure of confidential data stored in cookies | [
"cpe:/a:redhat:container_native_virtualization:4.14::el9"
] | null | 6.5 | null | null |
RHSA-2006:0658 | Red Hat Security Advisory: wireshark security update | security flaw security flaw security flaw | [
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws",
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2024:7706 | Red Hat Security Advisory: Red Hat build of Cryostat security update | webpack: DOM Clobbering vulnerability in AutoPublicPathRuntimeModule dompurify: XSS vulnerability via prototype pollution | [
"cpe:/a:redhat:cryostat:3::el8"
] | null | 7 | null | null |
Subsets and Splits