id
stringlengths 13
15
| title
stringlengths 29
176
| description
stringlengths 8
31.7k
| cpes
sequencelengths 0
20
| cvss_v4_0
null | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
null |
---|---|---|---|---|---|---|---|
RHSA-2022:0543 | Red Hat Security Advisory: ruby:2.6 security update | rubygem-bundler: Dependencies of gems with explicit source may be installed from a different source rubygem-rdoc: Command injection vulnerability in RDoc ruby: FTP PASV command response can cause Net::FTP to connect to arbitrary host ruby: StartTLS stripping vulnerability in Net::IMAP ruby: Regular expression denial of service vulnerability of Date parsing methods ruby: Cookie prefix spoofing in CGI::Cookie.parse | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 7.5 | null | null |
RHSA-2024:0003 | Red Hat Security Advisory: thunderbird security update | Mozilla: Heap-buffer-overflow affecting WebGL <code>DrawElementsInstanced</code> method with Mesa VM driver Mozilla: Symlinks may resolve to smaller than expected buffers Mozilla: Heap buffer overflow in <code>nsTextFragment</code> Mozilla: Use-after-free in PR_GetIdentitiesLayer Mozilla: Potential sandbox escape due to <code>VideoBridge</code> lack of texture validation Mozilla: Heap buffer overflow affected <code>nsWindow::PickerOpen(void)</code> in headless mode Mozilla: Use-after-free in <code>nsDNSService</code> Mozilla: Undefined behavior in <code>ShutdownObserver()</code> Mozilla: Memory safety bugs fixed in Firefox 121, Firefox ESR 115.6, and Thunderbird 115.6 Mozilla: S/MIME signature accepted despite mismatching message date Mozilla: Truncated signed text was shown with a valid OpenPGP signature | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 7.5 | null | null |
RHSA-2014:1004 | Red Hat Security Advisory: yum-updatesd security update | yum: yum-cron installs unsigned packages | [
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2024:8455 | Red Hat Security Advisory: edk2 security update | edk2: Buffer overflow when handling Server ID option from a DHCPv6 proxy Advertise message | [
"cpe:/a:redhat:rhel_aus:8.6::appstream",
"cpe:/a:redhat:rhel_e4s:8.6::appstream",
"cpe:/a:redhat:rhel_tus:8.6::appstream"
] | null | 8.8 | null | null |
RHSA-2020:1113 | Red Hat Security Advisory: bash security update | bash: BASH_CMD is writable in restricted bash shells | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 7.8 | null | null |
RHSA-2017:0238 | Red Hat Security Advisory: thunderbird security update | Mozilla: Memory safety bugs fixed in Firefox 51 and Firefox ESR 45.7 (MFSA 2017-01) Mozilla: Excessive JIT code allocation allows bypass of ASLR and DEP (MFSA 2017-02) Mozilla: Use-after-free in XSL (MFSA 2017-02) Mozilla: Pointer and frame data leakage of Javascript objects (MFSA 2017-02) Mozilla: Potential use-after-free during DOM manipulations (MFSA 2017-02) Mozilla: Location bar spoofing with unicode characters (MFSA 2017-02) Mozilla: Insecure communication methods in Developer Tools JSON viewer (MFSA 2017-02) Mozilla: Use-after-free with Media Decoder (MFSA 2017-02) | [
"cpe:/a:redhat:rhel_productivity:5",
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation",
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 9.8 | null |
RHEA-2018:3584 | Red Hat Enhancement Advisory: new packages: rust-toolset-1.29 | rust: rustdoc loads plugins from world writable directory allowing for arbitrary code execution | [
"cpe:/a:redhat:devtools:2018"
] | null | null | 5.3 | null |
RHSA-2024:1004 | Red Hat Security Advisory: edk2 security update | edk2: Buffer overflow in the DHCPv6 client via a long Server ID option | [
"cpe:/a:redhat:rhel_aus:8.2::appstream",
"cpe:/a:redhat:rhel_e4s:8.2::appstream",
"cpe:/a:redhat:rhel_tus:8.2::appstream"
] | null | 8.8 | null | null |
RHSA-2023:3349 | Red Hat Security Advisory: kernel security and bug fix update | kernel: netfilter: use-after-free in nf_tables when processing batch requests can lead to privilege escalation | [
"cpe:/a:redhat:enterprise_linux:8::crb",
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 7.8 | null | null |
RHSA-2023:4494 | Red Hat Security Advisory: thunderbird security update | thunderbird: File Extension Spoofing using the Text Direction Override Character Mozilla: Offscreen Canvas could have bypassed cross-origin restrictions Mozilla: Incorrect value used during WASM compilation Mozilla: Potential permissions request bypass via clickjacking Mozilla: Crash in DOMParser due to out-of-memory conditions Mozilla: Fix potential race conditions when releasing platform objects Mozilla: Stack buffer overflow in StorageManager Mozilla: Cookie jar overflow caused unexpected cookie jar state Mozilla: Memory safety bugs fixed in Firefox 116, Firefox ESR 115.1, Firefox ESR 102.14, Thunderbird 115.1, and Thunderbird 102.14 Mozilla: Memory safety bugs fixed in Firefox ESR 115.1, and Thunderbird 115.1 | [
"cpe:/a:redhat:rhel_eus:9.0::appstream"
] | null | 9.8 | null | null |
RHSA-2020:5568 | Red Hat Security Advisory: Red Hat Fuse 7.8.0 release and security update | jackson-modules-java8: DoS due to an Improper Input Validation thrift: Endless loop when feed with specific input data thrift: Out-of-bounds read related to TJSONProtocol or TSimpleJSONProtocol mysql-connector-java: privilege escalation in MySQL connector spring-ws: XML External Entity Injection (XXE) when receiving XML data from untrusted sources spring-batch: XML External Entity Injection (XXE) when receiving XML data from untrusted sources codehaus: incomplete fix for unsafe deserialization in jackson-databind vulnerabilities hibernate-validator: safeHTML validator allows XSS AngularJS: Prototype pollution in merge function could result in code injection org.eclipse.paho.client.mqttv3: Improper hostname validation in the MQTT library cxf: does not restrict the number of message attachments cxf: OpenId Connect token service does not properly validate the clientId libquartz: XXE attacks via job description hibernate: SQL injection issue in Hibernate ORM batik: SSRF via "xlink:href" jetty: double release of resource can lead to information disclosure Undertow: Memory Leak in Undertow HttpOpenListener due to holding remoting connections indefinitely keycloak: Lack of checks in ObjectInputStream leading to Remote Code Execution Wildfly: EJBContext principal is not popped back after invoking another EJB using a different Security Domain tika: excessive memory usage in PSDParser apache-flink: JMX information disclosure vulnerability springframework: RFD attack via Content-Disposition Header sourced from request input by Spring MVC or Spring WebFlux Application spring-cloud-config-server: sending a request using a specially crafted URL can lead to a directory traversal attack cryptacular: excessive memory allocation during a decode operation nodejs-angular: XSS due to regex-based HTML replacement log4j: improper validation of certificate with host mismatch in SMTP appender tika-core: Denial of Service Vulnerabilities in Some of Apache Tika's Parsers dom4j: XML External Entity vulnerability in default SAX parser wildfly: unsafe deserialization in Wildfly Enterprise Java Beans netty: compression/decompression codecs don't enforce limits on buffer allocation sizes camel: DNS Rebinding in JMX Connector could result in remote command execution camel: RabbitMQ enables Java deserialization by default which could leed to remote code execution camel: Netty enables Java deserialization by default which could leed to remote code execution karaf: A remote client could create MBeans from arbitrary URLs shiro: spring dynamic controllers, a specially crafted request may cause an authentication bypass camel: server-side template injection and arbitrary file disclosure on templating components postgresql-jdbc: XML external entity (XXE) vulnerability in PgSQLXML shiro: specially crafted HTTP request may cause an authentication bypass RESTEasy: Caching routes in RootNode may result in DoS | [
"cpe:/a:redhat:jboss_fuse:7"
] | null | 7.5 | 7.4 | null |
RHSA-2023:4204 | Red Hat Security Advisory: VolSync 0.7.3 security fixes and enhancements | openshift: OCP & FIPS mode | [
"cpe:/a:redhat:acm:2.8::el8"
] | null | 6.5 | null | null |
RHSA-2022:6542 | Red Hat Security Advisory: php:7.4 security update | Archive_Tar: allows an unserialization attack because phar: is blocked but PHAR: is not blocked Archive_Tar: improper filename sanitization leads to file overwrites Archive_Tar: directory traversal due to inadequate checking of symbolic links | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 7.5 | null | null |
RHSA-2015:0062 | Red Hat Security Advisory: kernel security, bug fix, and enhancement update | kernel: sctp: skb_over_panic when receiving malformed ASCONF chunks kernel: net: sctp: fix panic on duplicate ASCONF chunks kernel: net: sctp: remote memory pressure from excessive queueing kernel: lzo1x_decompress_safe() integer overflow kernel: vfs: refcount issues during unmount on symlink | [
"cpe:/o:redhat:rhel_eus:6.5::computenode",
"cpe:/o:redhat:rhel_eus:6.5::server"
] | null | null | null | null |
RHSA-2019:3887 | Red Hat Security Advisory: kernel-rt security update | hw: Intel GPU blitter manipulation can allow for arbitrary kernel memory write | [
"cpe:/a:redhat:rhel_extras_rt:7"
] | null | null | 8.8 | null |
RHSA-2024:4278 | Red Hat Security Advisory: qemu-kvm security update | qemu-kvm: 'qemu-img info' leads to host file read/write | [
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 7.8 | null | null |
RHSA-2024:0499 | Red Hat Security Advisory: libssh security update | ssh: Prefix truncation attack on Binary Packet Protocol (BPP) | [
"cpe:/a:redhat:rhel_eus:9.2::appstream",
"cpe:/o:redhat:rhel_eus:9.2::baseos"
] | null | 5.9 | null | null |
RHSA-2019:0188 | Red Hat Security Advisory: kernel-rt security and bug fix update | kernel: Use-after-free due to race condition in AF_PACKET implementation | [
"cpe:/a:redhat:rhel_extras_rt:7"
] | null | null | 7 | null |
RHSA-2006:0195 | Red Hat Security Advisory: tar security update | tar archive path traversal issue | [
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws"
] | null | null | null | null |
RHSA-2024:4336 | Red Hat Security Advisory: security update Logging for Red Hat OpenShift - 5.6.21 | golang: net/netip: Unexpected behavior from Is methods for IPv4-mapped IPv6 addresses | [
"cpe:/a:redhat:logging:5.6::el8"
] | null | 6.7 | null | null |
RHSA-2021:3293 | Red Hat Security Advisory: java-1.7.1-ibm security update | OpenJDK: FTP PASV command response can cause FtpClient to connect to arbitrary host (Networking, 8258432) OpenJDK: Incorrect verification of JAR files with multiple MANIFEST.MF files (Library, 8260967) JDK: unspecified vulnerability fixed in 7u311 (JNDI) | [
"cpe:/a:redhat:rhel_extras:7"
] | null | 3.7 | null | null |
RHSA-2018:1711 | Red Hat Security Advisory: rhev-hypervisor7 security update | Kernel: KVM: error in exception handling leads to wrong debug stack value hw: cpu: speculative store bypass Kernel: error in exception handling leads to DoS | [
"cpe:/o:redhat:enterprise_linux:6::hypervisor",
"cpe:/o:redhat:enterprise_linux:7::hypervisor"
] | null | null | 6.5 | null |
RHSA-2020:4039 | Red Hat Security Advisory: OpenEXR security update | OpenEXR: out-of-bounds read during Huffman uncompression OpenEXR: std:: vector out-of-bounds read and write in ImfTileOffsets.cpp OpenEXR: out-of-bounds write in copyIntoFrameBuffer function in ImfMisc.cpp | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 5.5 | null | null |
RHSA-2018:1965 | Red Hat Security Advisory: kernel security and bug fix update | kernel: Out-of-bounds access via an XFRM_MSG_MIGRATE xfrm Netlink message hw: cpu: speculative store bypass | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 5.6 | null |
RHSA-2012:0522 | Red Hat Security Advisory: openssl security update | openssl: asn1_d2i_read_bio integer errors leading to buffer overflow | [
"cpe:/o:redhat:rhel_els:3::as",
"cpe:/o:redhat:rhel_els:3::es",
"cpe:/o:redhat:rhel_els:4::as",
"cpe:/o:redhat:rhel_els:4::es",
"cpe:/o:redhat:rhel_eus:5.6",
"cpe:/o:redhat:rhel_eus:6.0",
"cpe:/o:redhat:rhel_eus:6.1",
"cpe:/o:redhat:rhel_mission_critical:5.3"
] | null | null | null | null |
RHSA-2020:4659 | Red Hat Security Advisory: gd security update | gd: NULL pointer dereference in gdImageClone gd: Heap-based buffer overflow in gdImageColorMatch() in gd_color_match.c gd: Double free in the gdImage*Ptr in gd_gif_out.c, gd_jpeg.c, and gd_wbmp.c | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | null | 5.3 | null |
RHSA-2014:0423 | Red Hat Security Advisory: openshift-origin-broker security update | OpenShift: openshift-origin-broker plugin allows impersonation | [
"cpe:/a:redhat:openshift:2.0::el6"
] | null | null | null | null |
RHSA-2012:1148 | Red Hat Security Advisory: kernel security update | kernel: netfilter: null pointer dereference in nf_ct_frag6_reasm() | [
"cpe:/o:redhat:rhel_eus:6.1"
] | null | null | null | null |
RHSA-2007:0089 | Red Hat Security Advisory: php security update for Stronghold | security flaw security flaw security flaw security flaw security flaw security flaw php session extension information leak php session extension global variable clobber php imap_mail_compose() buffer overflow via type.parameters | [
"cpe:/a:redhat:rhel_stronghold:4.0"
] | null | null | null | null |
RHSA-2024:4333 | Red Hat Security Advisory: security update Logging for Red Hat OpenShift - 5.9.4 | golang: net/netip: Unexpected behavior from Is methods for IPv4-mapped IPv6 addresses | [
"cpe:/a:redhat:logging:5.9::el9"
] | null | 6.7 | null | null |
RHSA-2023:5768 | Red Hat Security Advisory: nghttp2 security update | HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack) | [
"cpe:/o:redhat:rhel_aus:8.4::baseos",
"cpe:/o:redhat:rhel_e4s:8.4::baseos",
"cpe:/o:redhat:rhel_tus:8.4::baseos"
] | null | 7.5 | null | null |
RHSA-2012:1559 | Red Hat Security Advisory: JBoss Enterprise BRMS Platform 5.3.0 security update | apache-cxf: Apache CXF does not verify that elements were signed / encrypted by a particular Supporting Token | [
"cpe:/a:redhat:jboss_enterprise_brms_platform:5.3"
] | null | null | null | null |
RHSA-2007:0386 | Red Hat Security Advisory: mutt security update | Multiple mutt tempfile race conditions fetchmail/mutt/evolution/...: APOP password disclosure vulnerability Buffer overflow in mutt's gecos structure handling | [
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws",
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws",
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2007:1165 | Red Hat Security Advisory: libexif security update | libexif infinite recursion flaw (DoS) libexif integer overflow | [
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2022:9032 | Red Hat Security Advisory: Red Hat build of Eclipse Vert.x 4.3.4 security update | SnakeYaml: Constructor Deserialization Remote Code Execution jackson-databind: deep wrapper array nesting wrt UNWRAP_SINGLE_VALUE_ARRAYS jackson-databind: use of deeply nested arrays | [
"cpe:/a:redhat:openshift_application_runtimes:1.0"
] | null | 7.5 | null | null |
RHSA-2018:3402 | Red Hat Security Advisory: libvirt security update | hw: cpu: speculative store bypass | [
"cpe:/o:redhat:rhel_eus:6.7::computenode",
"cpe:/o:redhat:rhel_eus:6.7::server"
] | null | null | 5.6 | null |
RHSA-2017:1412 | Red Hat Security Advisory: eap7-jboss-ec2-eap security update | Resteasy: Yaml unmarshalling vulnerable to RCE wildfly: Arbitrary file read via path traversal undertow: HTTP Request smuggling vulnerability due to permitting invalid characters in HTTP requests undertow: IO thread DoS via unclean Websocket closing | [
"cpe:/a:redhat:jboss_enterprise_application_platform:7::el6",
"cpe:/a:redhat:jboss_enterprise_application_platform:7::el7"
] | null | null | 7.5 | null |
RHSA-2023:0758 | Red Hat Security Advisory: Red Hat build of Quarkus 2.13.7 release and security update | SnakeYaml: Constructor Deserialization Remote Code Execution codec-haproxy: HAProxyMessageDecoder Stack Exhaustion DoS postgresql-jdbc: Information leak of prepared statement data due to insecure temporary file permissions mina-sshd: Java unsafe deserialization vulnerability quarkus-vertx-http: a cross-site attack may be initiated which might lead to the Information Disclosure | [
"cpe:/a:redhat:quarkus:2.13"
] | null | 5.3 | null | null |
RHSA-2009:1562 | Red Hat Security Advisory: tomcat security update | Improve cookie parsing for tomcat5 tomcat request dispatcher information disclosure vulnerability tomcat6 Denial-Of-Service with AJP connection tomcat6 Information disclosure in authentication classes tomcat: XSS in Apache Tomcat calendar application tomcat XML parser information disclosure | [
"cpe:/a:redhat:rhel_application_server:2"
] | null | null | null | null |
RHSA-2016:2006 | Red Hat Security Advisory: kernel security and bug fix update | kernel: Uninitialized variable in request_key handling causes kernel crash in error handling path kernel: Heap buffer overflow in hiddev driver | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | 7.8 | null |
RHSA-2022:0226 | Red Hat Security Advisory: Red Hat OpenShift Enterprise Logging bug fix and security update (5.1.7) | nodejs-ua-parser-js: ReDoS via malicious User-Agent header log4j-core: remote code execution via JDBC Appender | [
"cpe:/a:redhat:logging:5.1::el8"
] | null | 6.6 | null | null |
RHSA-2023:5719 | Red Hat Security Advisory: go-toolset-1.19 and go-toolset-1.19-golang security update | golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487) HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack) | [
"cpe:/a:redhat:devtools:2023::el7"
] | null | 7.5 | null | null |
RHSA-2008:0892 | Red Hat Security Advisory: xen security and bug fix update | qemu/kvm/xen: add image format options for USB storage and removable media qemu/xen/kvm: ioemu: Fix PVFB backend to limit frame buffer size | [
"cpe:/a:redhat:rhel_virtualization:5::client",
"cpe:/a:redhat:rhel_virtualization:5::server",
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2024:0045 | Red Hat Security Advisory: OpenShift Container Platform 4.16.0 security update | dnspython: denial of service in stub resolver golang: net/http/cookiejar: incorrect forwarding of sensitive headers and cookies on HTTP redirect golang: net/http: golang: mime/multipart: golang: net/textproto: memory exhaustion in Request.ParseMultipartForm containers/image: digest type does not guarantee valid type golang: crypto/x509: Verify panics on certificates with an unknown public key algorithm golang: net/mail: comments in display names are incorrectly handled golang: html/template: errors returned from MarshalJSON methods may break template escaping golang-protobuf: encoding/protojson, internal/encoding/json: infinite loop in protojson.Unmarshal when unmarshaling certain forms of invalid JSON jose: resource exhaustion | [
"cpe:/a:redhat:openshift:4.16::el8",
"cpe:/a:redhat:openshift:4.16::el9",
"cpe:/a:redhat:openshift_ironic:4.16::el9"
] | null | 5.3 | null | null |
RHSA-2021:0834 | Red Hat Security Advisory: openvswitch2.11 security update | lldp/openvswitch: denial of service via externally triggered memory leak openvswitch: limitation in the OVS packet parsing in userspace leads to DoS | [
"cpe:/o:redhat:enterprise_linux:7::fastdatapath"
] | null | 7.5 | null | null |
RHSA-2016:2068 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 6.4.11 update on RHEL 6 | tomcat: Usage of vulnerable FileUpload package can result in denial of service | [
"cpe:/a:redhat:jboss_enterprise_application_platform:6::el6"
] | null | null | 7.5 | null |
RHSA-2024:11185 | Red Hat Security Advisory: edk2:20220126gitbb1bba3d77 security update | edk2: Integer overflows in PeCoffLoaderRelocateImage | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 5.9 | null | null |
RHSA-2017:3194 | Red Hat Security Advisory: httpd security update | httpd: ap_get_basic_auth_pw() authentication bypass httpd: mod_ssl NULL pointer dereference httpd: ap_find_token() buffer overread httpd: mod_mime buffer overread httpd: Uninitialized memory reflection in mod_auth_digest httpd: Use-after-free by limiting unregistered HTTP method (Optionsbleed) | [
"cpe:/o:redhat:rhel_eus:7.3::computenode",
"cpe:/o:redhat:rhel_eus:7.3::server"
] | null | null | 5.9 | null |
RHSA-2021:4133 | Red Hat Security Advisory: thunderbird security update | Mozilla: iframe sandbox rules did not apply to XSLT stylesheets Mozilla: Use-after-free in file picker dialog Mozilla: Firefox could be coaxed into going into fullscreen mode without notification or warning Mozilla: Opportunistic Encryption in HTTP2 could be used to bypass the Same-Origin-Policy on services hosted on other ports Mozilla: Permission Prompt could be overlaid, resulting in user confusion and potential spoofing Mozilla: Javascript alert box could have been spoofed onto an arbitrary domain thunderbird: Memory corruption when processing S/MIME messages Mozilla: Memory safety bugs fixed in Firefox 94 and Firefox ESR 91.3 Mozilla: Use-after-free in HTTP2 Session object | [
"cpe:/a:redhat:rhel_eus:8.1::appstream"
] | null | 8.8 | 6.1 | null |
RHSA-2018:2308 | Red Hat Security Advisory: openslp security update | openslp: Heap memory corruption in slpd/slpd_process.c allows denial of service or potentially code execution | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | 7.5 | null |
RHSA-2023:6251 | Red Hat Security Advisory: OpenShift Virtualization 4.11.7 Images security and bug fix update | golang.org/x/net/http2: avoid quadratic complexity in HPACK decoding golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487) HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack) | [
"cpe:/a:redhat:container_native_virtualization:4.11::el8"
] | null | 7.5 | null | null |
RHSA-2022:5003 | Red Hat Security Advisory: Red Hat OpenShift Service Mesh 2.0.10 security update | envoy: Segfault in GrpcHealthCheckerImpl envoy: Decompressors can be zip bombed | [
"cpe:/a:redhat:service_mesh:2.0::el8"
] | null | 7.5 | null | null |
RHSA-2008:0058 | Red Hat Security Advisory: wireshark security update | wireshark mp3 and ncp flaws wireshark ppp flaws wireshark DNP3 flaws wireshark SSL and OS/400 trace flaws wireshark ANSI MAP flaws wireshark firebird/interbase flaws wireshark HTTP dissector flaws wireshark MEGACO dissector flaws wireshark DCP ETSI dissector flaws wireshark Bluetooth SDP dissector flaws wireshark RPC Portmap flaws wireshark SMB dissector crash wireshark IPv6 and USB dissector crash wireshark WiMAX dissector possible crash wireshark RPL dissector crash wireshark CIP dissector crash | [
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws",
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2023:4164 | Red Hat Security Advisory: java-11-openjdk security and bug fix update | OpenJDK: HTTP client insufficient file name validation (8302475) OpenJDK: ZIP file parsing infinite loop (8302483) OpenJDK: weakness in AES implementation (8308682) OpenJDK: array indexing integer overflow issue (8304468) OpenJDK: improper handling of slash characters in URI-to-path conversion (8305312) harfbuzz: allows attackers to trigger O(n^2) growth via consecutive marks | [
"cpe:/a:redhat:rhel_eus:8.6::appstream",
"cpe:/a:redhat:rhel_eus:8.6::crb"
] | null | 7.5 | null | null |
RHSA-2008:0516 | Red Hat Security Advisory: evolution security update | evolution: iCalendar buffer overflow via large timezone specification | [
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws",
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2024:0990 | Red Hat Security Advisory: rh-postgresql12-postgresql security update | postgresql: non-owner 'REFRESH MATERIALIZED VIEW CONCURRENTLY' executes arbitrary SQL | [
"cpe:/a:redhat:rhel_software_collections:3::el7"
] | null | 8 | null | null |
RHSA-2025:2668 | Red Hat Security Advisory: .NET 9.0 security, bug fix, and enhancement update | dotnet: Privilege Escalation Vulnerability in .NET SignInManager.RefreshSignInAsync Method | [
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::crb"
] | null | 7.8 | null | null |
RHSA-2011:1317 | Red Hat Security Advisory: cyrus-imapd security update | cyrus-imapd: nntpd buffer overflow in split_wildmats() | [
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server",
"cpe:/o:redhat:enterprise_linux:6::server"
] | null | null | null | null |
RHSA-2020:0924 | Red Hat Security Advisory: devtoolset-8-gcc security update | gcc: POWER9 "DARN" RNG intrinsic produces repeated output | [
"cpe:/a:redhat:rhel_software_collections:3::el6",
"cpe:/a:redhat:rhel_software_collections:3::el7"
] | null | null | 7.5 | null |
RHSA-2020:1493 | Red Hat Security Advisory: kernel-alt security and bug fix update | kernel: triggering AP to send IAPP location updates for stations before the required authentication process has completed can lead to DoS kernel: heap-based buffer overflow in mwifiex_process_country_ie() function in drivers/net/wireless/marvell/mwifiex/sta_ioctl.c kernel: heap overflow in marvell/mwifiex/tdls.c kernel: powerpc: local user can read vector registers of other users' processes via an interrupt kernel: a NULL pointer dereference in drivers/net/wireless/ath/ath10k/usb.c leads to a crash kernel: out-of-bounds array access in __xfrm_policy_unlink kernel: when cpu.cfs_quota_us is used allows attackers to cause a denial of service against non-cpu-bound applications kernel: Null pointer dereference in drop_sysctl_table() in fs/proc/proc_sysctl.c kernel: memory leak in mwifiex_tm_cmd in drivers/net/wireless/marvell/mwifiex/cfg80211.c | [
"cpe:/o:redhat:enterprise_linux:7::server"
] | null | 5.2 | 4.3 | null |
RHSA-2009:0421 | Red Hat Security Advisory: ghostscript security update | ghostscript: DoS (crash) in CCITTFax decoding filter ghostscript: Buffer overflow in BaseFont writer module for pdfwrite device ghostscript: Missing boundary check in Ghostscript's jbig2dec library argyllcms: Incomplete fix for CVE-2009-0583 | [
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2018:0011 | Red Hat Security Advisory: kernel security update | An update for kernel is now available for Red Hat Enterprise Linux 6.7 Extended Update Support.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
[Updated 23rd January 2019]
The text has been updated to correct the list of architectures addressed by the CVE-2017-5753 mitigation. No changes have been made to the packages. | [
"cpe:/o:redhat:rhel_eus:6.7::computenode",
"cpe:/o:redhat:rhel_eus:6.7::server"
] | null | null | null | null |
RHSA-2003:190 | Red Hat Security Advisory: : : : Updated 2.4 kernel for pSeries and iSeries fixes vulnerabilities | cisco: information leak in ethernet frames. security flaw security flaw security flaw security flaw | [
"cpe:/o:redhat:linux:7.1"
] | null | 5.3 | null | null |
RHSA-2022:5026 | Red Hat Security Advisory: OpenShift Virtualization 4.10.2 Images security and bug fix update | prometheus/client_golang: Denial of service using InstrumentHandlerCounter | [
"cpe:/a:redhat:container_native_virtualization:4.10::el8"
] | null | 7.5 | null | null |
RHSA-2019:3335 | Red Hat Security Advisory: python27:2.7 security and bug fix update | numpy: crafted serialized object passed in numpy.load() in pickle python module allows arbitrary code execution python: CRLF injection via the query part of the url passed to urlopen() python: CRLF injection via the path part of the url passed to urlopen() python: Undocumented local_file protocol allows remote attackers to bypass protection mechanisms python-urllib3: CRLF injection due to not encoding the '\r\n' sequence leading to possible attack on internal service python-urllib3: Certification mishandle when error should be thrown | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | null | 7.5 | null |
RHSA-2023:4523 | Red Hat Security Advisory: curl security update | curl: GSS delegation too eager connection re-use curl: IDN wildcard match may lead to Improper Cerificate Validation | [
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 5.9 | null | null |
RHSA-2024:5882 | Red Hat Security Advisory: orc:0.4.28 security update | orc: Stack-based buffer overflow vulnerability in ORC | [
"cpe:/a:redhat:rhel_aus:8.2::appstream"
] | null | 6.7 | null | null |
RHSA-2003:083 | Red Hat Security Advisory: apache security update for Stronghold | security flaw security flaw | [
"cpe:/a:redhat:rhel_stronghold:4"
] | null | null | null | null |
RHSA-2023:2061 | Red Hat Security Advisory: Multicluster Engine for Kubernetes 2.1.6 security updates and bug fixes | http-cache-semantics: Regular Expression Denial of Service (ReDoS) vulnerability | [
"cpe:/a:redhat:multicluster_engine:2.1::el8"
] | null | 7.5 | null | null |
RHSA-2023:7612 | Red Hat Security Advisory: Red Hat build of Quarkus 3.2.9 release and security update | quarkus: GraphQL operations over WebSockets bypass apache-avro: Apache Avro Java SDK: Memory when deserializing untrusted data in Avro Java SDK snappy-java: Missing upper bound check on chunk length in snappy-java can lead to Denial of Service (DoS) impact | [
"cpe:/a:redhat:quarkus:3.2::el8"
] | null | 7.5 | null | null |
RHSA-2018:2930 | Red Hat Security Advisory: Red Hat JBoss Operations Network 3.3.11 security and bug fix update | jackson-databind: Unsafe deserialization due to incomplete black list (incomplete fix for CVE-2017-15095) tomcat: A bug in the UTF-8 decoder can lead to DoS slf4j: Deserialisation vulnerability in EventData constructor can allow for arbitrary code execution RichFaces: Injection of arbitrary EL expressions allows remote code execution via org.richfaces.renderkit.html.Paint2DResource | [
"cpe:/a:redhat:jboss_operations_network:3.3"
] | null | null | 9.8 | null |
RHSA-2011:1249 | Red Hat Security Advisory: Red Hat Enterprise MRG Grid 2.0 security, bug fix and enhancement update | cumin: broker username/password appears in the log file | [
"cpe:/a:redhat:enterprise_mrg:2::el5"
] | null | null | null | null |
RHSA-2004:181 | Red Hat Security Advisory: : Updated libpng packages fix crash | CAN-2004-0421 libpng can access out of bounds memory | [
"cpe:/o:redhat:linux:9"
] | null | null | null | null |
RHSA-2024:7202 | Red Hat Security Advisory: grafana security update | encoding/gob: golang: Calling Decoder.Decode on a message which contains deeply nested structures can cause a panic due to stack exhaustion | [
"cpe:/a:redhat:rhel_eus:9.2::appstream"
] | null | 7.5 | null | null |
RHSA-2023:5771 | Red Hat Security Advisory: bind9.16 security update | bind: stack exhaustion in control channel code may lead to DoS | [
"cpe:/a:redhat:rhel_eus:8.6::appstream",
"cpe:/a:redhat:rhel_eus:8.6::crb"
] | null | 7.5 | null | null |
RHSA-2022:5904 | Red Hat Security Advisory: php security update | php: password of excessive length triggers buffer overflow leading to RCE | [
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 8.8 | null | null |
RHSA-2006:0158 | Red Hat Security Advisory: apache security update | httpd cross-site scripting flaw in mod_imap | [
"cpe:/o:redhat:enterprise_linux:2.1::as",
"cpe:/o:redhat:enterprise_linux:2.1::aw",
"cpe:/o:redhat:enterprise_linux:2.1::es",
"cpe:/o:redhat:enterprise_linux:2.1::ws"
] | null | null | null | null |
RHSA-2024:10734 | Red Hat Security Advisory: thunderbird security update | thunderbird: Potential disclosure of plaintext in OpenPGP encrypted message firefox: thunderbird: Select list elements could be shown over another site firefox: thunderbird: CSP Bypass and XSS Exposure via Web Compatibility Shims firefox: thunderbird: URL Bar Spoofing via Manipulated Punycode and Whitespace Characters firefox: thunderbird: Unhandled Exception in Add-on Signature Verification firefox: thunderbird: Improper Keypress Handling in Executable File Confirmation Dialog firefox: thunderbird: Memory safety bugs fixed in Firefox 133, Thunderbird 133, Firefox ESR 128.5, and Thunderbird 128.5 | [
"cpe:/a:redhat:rhel_aus:8.6::appstream",
"cpe:/a:redhat:rhel_e4s:8.6::appstream",
"cpe:/a:redhat:rhel_tus:8.6::appstream"
] | null | 8.8 | null | null |
RHSA-2019:3843 | Red Hat Security Advisory: kernel security update | hw: Machine Check Error on Page Size Change (IFU) hw: TSX Transaction Asynchronous Abort (TAA) | [
"cpe:/o:redhat:rhel_aus:6.5::server"
] | null | null | 6.5 | null |
RHSA-2022:5337 | Red Hat Security Advisory: go-toolset:rhel8 security and bug fix update | golang: encoding/pem: fix stack overflow in Decode golang: regexp: stack exhaustion via a deeply nested expression golang: crypto/elliptic: panic caused by oversized scalar golang: syscall: faccessat checks wrong group | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 6.2 | null | null |
RHSA-2002:169 | Red Hat Security Advisory: : Updated ethereal packages are available | security flaw security flaw security flaw | [
"cpe:/o:redhat:linux:7.2",
"cpe:/o:redhat:linux:7.3"
] | null | null | null | null |
RHSA-2022:0317 | Red Hat Security Advisory: OpenJDK 8u322 security update for Portable Linux Builds | OpenJDK: Incomplete deserialization class filtering in ObjectInputStream (Serialization, 8264934) OpenJDK: Insufficient URI checks in the XSLT TransformerImpl (JAXP, 8270492) OpenJDK: Unexpected exception thrown in regex Pattern (Libraries, 8268813) OpenJDK: Incomplete checks of StringBuffer and StringBuilder during deserialization (Libraries, 8270392) OpenJDK: Incorrect IdentityHashMap size checks during deserialization (Libraries, 8270416) OpenJDK: Incorrect access checks in XMLEntityManager (JAXP, 8270498) OpenJDK: Infinite loop related to incorrect handling of newlines in XMLEntityScanner (JAXP, 8270646) OpenJDK: Array indexing issues in LIRGenerator (Hotspot, 8272014) OpenJDK: Excessive resource use when reading JAR manifest attributes (Libraries, 8272026) OpenJDK: Insufficient checks when deserializing exceptions in ObjectInputStream (Serialization, 8272236) OpenJDK: Excessive memory allocation in BMPImageReader (ImageIO, 8273756) OpenJDK: Integer overflow in BMPImageReader (ImageIO, 8273838) | [
"cpe:/a:redhat:openjdk:1.8"
] | null | 5.3 | null | null |
RHSA-2022:6823 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.4.7 Security update | undertow: potential security issue in flow control over HTTP/2 may lead to DOS(incomplete fix for CVE-2021-3629) undertow: Large AJP request may cause DoS snakeyaml: Denial of Service due to missing nested depth limitation for collections | [
"cpe:/a:redhat:jboss_enterprise_application_platform:7.4::el9"
] | null | 7.5 | null | null |
RHSA-2023:5376 | Red Hat Security Advisory: Red Hat OpenShift Data Foundation 4.13.3 security and bug fix update | golang: html/template: improper handling of JavaScript whitespace word-wrap: ReDoS | [
"cpe:/a:redhat:openshift_data_foundation:4.13::el9"
] | null | 7.5 | null | null |
RHSA-2020:4464 | Red Hat Security Advisory: libxslt security update | libxslt: xsltCheckRead and xsltCheckWrite routines security bypass by crafted URL libxslt: use after free in xsltCopyText in transform.c could lead to information disclosure | [
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 7.5 | 6.3 | null |
RHSA-2024:1317 | Red Hat Security Advisory: Red Hat JBoss Core Services Apache HTTP Server 2.4.57 SP3 security update | openssl: Generating excessively long X9.42 DH keys or checking excessively long X9.42 DH keys or parameters may be very slow mod_cluster/mod_proxy_cluster: Stored Cross site Scripting httpd: mod_macro: out-of-bounds read vulnerability libxml2: crafted xml can cause global buffer overflow curl: information disclosure by exploiting a mixed case flaw curl: excessively long file name may lead to unknown HSTS status libxml2: use-after-free in XMLReader | [
"cpe:/a:redhat:jboss_core_services:1"
] | null | 7.5 | null | null |
RHSA-2011:0372 | Red Hat Security Advisory: flash-plugin security update | flash-plugin: crash and potential arbitrary code execution (APSB11-05) | [
"cpe:/a:redhat:rhel_extras:5::client",
"cpe:/a:redhat:rhel_extras:5::server",
"cpe:/a:redhat:rhel_extras:6"
] | null | null | null | null |
RHSA-2007:0513 | Red Hat Security Advisory: gimp security update | GIMP multiple image loader integer overflows Gimp PSD integer overflow Gimp image loader multiple input validation flaws | [
"cpe:/o:redhat:enterprise_linux:2.1::as",
"cpe:/o:redhat:enterprise_linux:2.1::aw",
"cpe:/o:redhat:enterprise_linux:2.1::es",
"cpe:/o:redhat:enterprise_linux:2.1::ws",
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws",
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws",
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2023:1393 | Red Hat Security Advisory: OpenShift Container Platform 4.10.55 security update | goutils: RandomAlphaNumeric and CryptoRandomAlphaNumeric are not as random as they should be | [
"cpe:/a:redhat:openshift:4.10::el8"
] | null | 7 | null | null |
RHSA-2016:1485 | Red Hat Security Advisory: chromium-browser security update | chromium-browser: various fixes from internal audits chromium-browser: sandbox escape in ppapi chromium-browser: use-after-free in extensions chromium-browser: heap-buffer-overflow in sfntly chromium-browser: same-origin bypass in blink chromium-browser: same-origin bypass in blink chromium-browser: use-after-free in blink chromium-browser: same-origin bypass in v8 chromium-browser: memory corruption in v8 chromium-browser: url spoofing libxml2: Use after free triggered by XPointer paths beginning with range-to chromium-browser: limited same-origin bypass in service workers chromium-browser: origin confusion in proxy authentication chromium-browser: url leakage via pac script chromium-browser: content-security-policy bypass chromium-browser: use after free in extensions chromium-browser: history sniffing with hsts and csp | [
"cpe:/a:redhat:rhel_extras:6"
] | null | null | 6.5 | null |
RHSA-2017:2886 | Red Hat Security Advisory: rh-mysql57-mysql security and bug fix update | mysql: Incorrect input validation allowing code execution via mysqldump mysql: Server: Replication unspecified vulnerability (CPU Jan 2017) mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2017) mysql: Server: DML unspecified vulnerability (CPU Jan 2017) mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2017) mysql: Server: Replication unspecified vulnerability (CPU Jan 2017) mysql: Server: InnoDB unspecified vulnerability (CPU Jan 2017) mysql: Server: DDL unspecified vulnerability (CPU Jan 2017) mysql: Server: DDL unspecified vulnerability (CPU Jan 2017) mysql: unrestricted mysqld_safe's ledir (CPU Jan 2017) mysql: Server: DML unspecified vulnerability (CPU Apr 2017) mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2017) mysql: insecure error log file handling in mysqld_safe, incomplete CVE-2016-6664 fix (CPU Jan 2017) mysql: Server: MyISAM unspecified vulnerability (CPU Jan 2017) mysql: Logging unspecified vulnerability (CPU Jan 2017) mysql: Server: Error Handling unspecified vulnerability (CPU Jan 2017) mysql: Server: X Plugin unspecified vulnerability (CPU Jan 2017) mysql: Server: Security: Encryption unspecified vulnerability (CPU Jan 2017) mysql: Server: DML unspecified vulnerability (CPU Apr 2017) mysql: Server: Memcached unspecified vulnerability (CPU Apr 2017) mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2017) mysql: Server: InnoDB unspecified vulnerability (CPU Apr 2017) mysql: Server: Security: Privileges unspecified vulnerability (CPU Apr 2017) mysql: Server: DML unspecified vulnerability (CPU Apr 2017) mysql: Server: DML unspecified vulnerability (CPU Apr 2017) mysql: Server: DML unspecified vulnerability (CPU Apr 2017) mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2017) mysql: Server: Audit Plug-in unspecified vulnerability (CPU Apr 2017) mysql: Server: Security: Privileges unspecified vulnerability (CPU Apr 2017) mysql: Server: Security: Privileges unspecified vulnerability (CPU Apr 2017) mysql: Server: Security: Privileges unspecified vulnerability (CPU Apr 2017) mysql: Server: DDL unspecified vulnerability (CPU Apr 2017) mysql: Server: Security: Privileges unspecified vulnerability (CPU Apr 2017) mysql: Server: C API unspecified vulnerability (CPU Apr 2017) mysql: Server: Security: Encryption unspecified vulnerability (CPU Apr 2017) mysql: Server: UDF unspecified vulnerability (CPU Jul 2017) mysql: integer underflow in get_56_lenc_string() leading to DoS (CPU Apr 2017) mysql: Incorrect input validation allowing code execution via mysqldump mysql: Server: Memcached unspecified vulnerability (CPU Jul 2017) mysql: Server: DML unspecified vulnerability (CPU Jul 2017) mysql: X Plugin unspecified vulnerability (CPU Jul 2017) mysql: Server: Optimizer unspecified vulnerability (CPU Jul 2017) mysql: Server: DML unspecified vulnerability (CPU Jul 2017) mysql: Server: DML unspecified vulnerability (CPU Jul 2017) mysql: Server: DML unspecified vulnerability (CPU Jul 2017) mysql: Server: Optimizer unspecified vulnerability (CPU Jul 2017) mysql: Server: DML unspecified vulnerability (CPU Jul 2017) mysql: Server: DML unspecified vulnerability (CPU Jul 2017) mysql: Server: Optimizer unspecified vulnerability (CPU Jul 2017) mysql: X Plugin unspecified vulnerability (CPU Jul 2017) mysql: Server: Replication unspecified vulnerability (CPU Jul 2017) mysql: Server: Charsets unspecified vulnerability (CPU Jul 2017) mysql: Server: Replication unspecified vulnerability (CPU Jul 2017) mysql: C API unspecified vulnerability (CPU Jul 2017) mysql: Client mysqldump unspecified vulnerability (CPU Jul 2017) mysql: Server: DDL unspecified vulnerability (CPU Jul 2017) mysql: Server: DDL unspecified vulnerability (CPU Jul 2017) mysql: Server: Security: Privileges unspecified vulnerability (CPU Jul 2019) | [
"cpe:/a:redhat:rhel_software_collections:2::el6",
"cpe:/a:redhat:rhel_software_collections:2::el7"
] | null | null | 2.7 | null |
RHSA-2007:0710 | Red Hat Security Advisory: wireshark security update | Wireshark crashes when inspecting HTTP traffic Wireshark crashes when inspecting iSeries traffic Wireshark loops infinitely when inspecting DCP ETSI traffic Wireshark crashes when inspecting MMS traffic Wireshark corrupts the stack when inspecting BOOTP traffic | [
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2003:068 | Red Hat Security Advisory: vnc security update | security flaw | [
"cpe:/o:redhat:enterprise_linux:2.1::as"
] | null | null | null | null |
RHSA-2024:4450 | Red Hat Security Advisory: dotnet8.0 security update | dotnet: DoS in System.Text.Json dotnet: DoS in ASP.NET Core 8 dotnet: DoS when parsing X.509 Content and ObjectIdentifiers | [
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::crb"
] | null | 5.3 | null | null |
RHSA-2005:366 | Red Hat Security Advisory: kernel security update | security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw | [
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2024:4562 | Red Hat Security Advisory: OpenJDK 8u422 Security Update for Portable Linux Builds | OpenJDK: potential UTF8 size overflow (8314794) OpenJDK: Excessive symbol length can lead to infinite loop (8319859) OpenJDK: Range Check Elimination (RCE) pre-loop limit overflow (8320548) OpenJDK: Pack200 increase loading time due to improper header validation (8322106) OpenJDK: Out-of-bounds access in 2D image handling (8324559) OpenJDK: RangeCheckElimination array index overflow (8323231) | [
"cpe:/a:redhat:openjdk:1.8"
] | null | 7.4 | null | null |
RHSA-2021:1214 | Red Hat Security Advisory: libldb security update | samba: Out of bounds read in AD DC LDAP server | [
"cpe:/o:redhat:rhel_eus:8.1::baseos"
] | null | 7.1 | null | null |
RHSA-2021:1030 | Red Hat Security Advisory: tomcat security update | tomcat: Session fixation when using FORM authentication tomcat: Mishandling of Transfer-Encoding header allows for HTTP request smuggling | [
"cpe:/o:redhat:rhel_eus:7.7::computenode",
"cpe:/o:redhat:rhel_eus:7.7::server"
] | null | 4.3 | null | null |
RHSA-2020:1828 | Red Hat Security Advisory: glibc security, bug fix, and enhancement update | glibc: LD_PREFER_MAP_32BIT_EXEC not ignored in setuid binaries | [
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb",
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | null | 2.9 | null |
RHSA-2019:2551 | Red Hat Security Advisory: OpenShift Container Platform 3.9 atomic-openshift-web-console security update | xterm.js: Mishandling of special characters allows for remote code execution | [
"cpe:/a:redhat:openshift:3.9::el7"
] | null | null | 7.5 | null |
Subsets and Splits