Datasets:

Modalities:
Tabular
Text
Formats:
parquet
Libraries:
Datasets
pandas
Dataset Viewer
Auto-converted to Parquet
id
stringlengths
13
15
title
stringlengths
29
176
description
stringlengths
8
32.1k
cpes
sequencelengths
0
20
cvss_v4_0
null
cvss_v3_1
float64
0
10
cvss_v3_0
float64
0
10
cvss_v2_0
null
RHSA-2005:330
Red Hat Security Advisory: krb5 security update
security flaw security flaw
[ "cpe:/o:redhat:enterprise_linux:3::as", "cpe:/o:redhat:enterprise_linux:3::desktop", "cpe:/o:redhat:enterprise_linux:3::es", "cpe:/o:redhat:enterprise_linux:3::ws", "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws" ]
null
null
null
null
RHSA-2022:0823
Red Hat Security Advisory: kernel security update
kernel: Use After Free in unix_gc() which could result in a local privilege escalation kernel: use-after-free in RDMA listen() kernel: fget: check that the fd still exists after getting a ref to it kernel: possible privileges escalation due to missing TLB flush kernel: cgroups v1 release_agent feature may allow privilege escalation kernel: improper initialization of the "flags" member of the new pipe_buffer kernel: failing usercopy allows for use-after-free exploitation
[ "cpe:/o:redhat:rhel_e4s:8.1::baseos" ]
null
7
null
null
RHSA-2015:0020
Red Hat Security Advisory: python-keystoneclient security update
python-keystoneclient: TLS certificate verification disabled
[ "cpe:/a:redhat:openstack:4::el6" ]
null
null
null
null
RHSA-2016:1853
Red Hat Security Advisory: Red Hat OpenShift Enterprise 3.2 security update and bug fix update
libarchive: Archive Entry with type 1 (hardlink), but has a non-zero data size file overwrite
[ "cpe:/a:redhat:openshift:3.2::el7" ]
null
null
7.5
null
RHSA-2008:0629
Red Hat Security Advisory: Red Hat Network Satellite Server Solaris client security update
zlib DoS zlib DoS openssl mitm downgrade attack python buffer overflow openssl ASN.1 DoS openssl public key DoS openssl get_shared_ciphers overflow openssl signature forgery openssl sslv2 client code python repr unicode buffer overflow python off-by-one locale.strxfrm() (possible memory disclosure) python imageop module heap corruption
[ "cpe:/a:redhat:network_satellite:5.1::el4" ]
null
null
null
null
RHSA-2021:1678
Red Hat Security Advisory: perl security and bug fix update
perl: heap-based buffer overflow in regular expression compiler leads to DoS perl: corruption of intermediate language state of compiled regular expression due to integer overflow leads to DoS
[ "cpe:/a:redhat:enterprise_linux:8::appstream", "cpe:/o:redhat:enterprise_linux:8::baseos" ]
null
8.6
null
null
RHSA-2022:5813
Red Hat Security Advisory: vim security update
vim: Out-of-bounds Write vim: out-of-bounds write in vim_regsub_both() in regexp.c vim: buffer over-read in utf_ptr2char() in mbyte.c
[ "cpe:/a:redhat:enterprise_linux:8::appstream", "cpe:/o:redhat:enterprise_linux:8::baseos", "cpe:/o:redhat:rhev_hypervisor:4.4::el8" ]
null
7.8
null
null
RHSA-2020:5369
Red Hat Security Advisory: microcode_ctl security, bug fix and enhancement update
hw: Information disclosure issue in Intel SGX via RAPL interface hw: Vector Register Leakage-Active hw: Fast forward store predictor
[ "cpe:/o:redhat:rhel_eus:8.1::baseos" ]
null
5.5
null
null
RHSA-2011:1084
Red Hat Security Advisory: libsndfile security update
libsndfile: Application crash due integer overflow by processing certain PAF audio files
[ "cpe:/o:redhat:enterprise_linux:6::server" ]
null
null
null
null
RHSA-2023:0951
Red Hat Security Advisory: kernel security and bug fix update
kernel: an out-of-bounds vulnerability in i2c-ismt driver kernel: use-after-free caused by l2cap_reassemble_sdu() in net/bluetooth/l2cap_core.c kernel: stack overflow in do_proc_dointvec and proc_skip_spaces kernel: use-after-free in __nfs42_ssc_open() in fs/nfs/nfs4file.c leading to remote Denial of Service attack kernel: Netfilter integer overflow vulnerability in nft_payload_copy_vlan
[ "cpe:/a:redhat:enterprise_linux:9::appstream", "cpe:/a:redhat:enterprise_linux:9::crb", "cpe:/o:redhat:enterprise_linux:9::baseos" ]
null
7.8
null
null
RHSA-2016:0458
Red Hat Security Advisory: bind97 security update
bind: malformed packet sent to rndc can trigger assertion failure bind: malformed signature records for DNAME records can trigger assertion failure
[ "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
RHSA-2005:073
Red Hat Security Advisory: cpio security update
security flaw
[ "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws" ]
null
null
null
null
RHSA-2016:0296
Red Hat Security Advisory: rh-ror41 security update
rubygem-actionpack: Timing attack vulnerability in basic authentication in Action Controller rubygem-activerecord: Nested attributes rejection proc bypass in Active Record rubygem-actionpack: Object leak vulnerability for wildcard controller routes in Action Pack rubygem-actionpack: possible object leak and denial of service attack in Action Pack rubygem-actionpack: directory traversal flaw in Action View rubygem-activerecord: possible input validation circumvention in Active Model
[ "cpe:/a:redhat:rhel_software_collections:2::el6", "cpe:/a:redhat:rhel_software_collections:2::el7" ]
null
null
null
null
RHSA-2025:3586
Red Hat Security Advisory: python-jinja2 security update
jinja2: Jinja sandbox breakout through attr filter selecting format method
[ "cpe:/a:redhat:rhel_eus:9.4::appstream" ]
null
7.3
null
null
RHSA-2018:0181
Red Hat Security Advisory: kernel-rt security and bug fix update
kernel: local privesc in key management kernel: keyctl_set_reqkey_keyring() leaks thread keyrings kernel: NULL pointer dereference due to KEYCTL_READ on negative key kernel: Null pointer dereference due to incorrect node-splitting in assoc_array implementation kernel: Use-after-free in the af_packet.c
[ "cpe:/a:redhat:enterprise_mrg:2:server:el6" ]
null
null
7.8
null
RHSA-2014:1312
Red Hat Security Advisory: bash Shift_JIS security update
bash: code execution via specially-crafted environment (Incomplete fix for CVE-2014-6271) bash: parser can allow out-of-bounds memory access while handling redir_stack bash: off-by-one error in deeply nested flow control constructs
[ "cpe:/a:redhat:rhel_sjis:5", "cpe:/a:redhat:rhel_sjis:6" ]
null
null
null
null
RHSA-2020:2039
Red Hat Security Advisory: squid:4 security update
squid: improper check for new member in ESIExpression::Evaluate allows for stack buffer overflow squid: improper access restriction upon Digest Authentication nonce replay could lead to remote code execution
[ "cpe:/a:redhat:rhel_eus:8.1::appstream" ]
null
8.1
null
null
RHSA-2022:0445
Red Hat Security Advisory: Red Hat Single Sign-On 7.4.10 on OpenJ9 for OpenShift image security update
log4j: Remote code execution in Log4j 1.x when application is configured to use JMSAppender log4j: Remote code execution in Log4j 1.x when application is configured to use JMSSink log4j: SQL injection in Log4j 1.x when application is configured to use JDBCAppender log4j: Unsafe deserialization flaw in Chainsaw log viewer
[ "cpe:/a:redhat:rhosemc:1.0::el8" ]
null
8.8
null
null
RHSA-2019:1164
Red Hat Security Advisory: java-1.8.0-ibm security update
OpenJDK: Slow conversion of BigDecimal to long (Libraries, 8211936) OpenJDK: Incorrect skeleton selection in RMI registry server-side dispatch handling (RMI, 8218453) JDK: Unspecified vulnerability fixed in 7u221 and 8u211 (2D) OpenJDK: Font layout engine out of bounds access setCurrGlyphID() (2D, 8219022) JDK: Read beyond the end of bytecode array causing JVM crash
[ "cpe:/a:redhat:rhel_extras:7" ]
null
null
7.5
null
RHSA-2014:0858
Red Hat Security Advisory: Red Hat Enterprise MRG 2.5 Messaging and Grid security update
cumin: DoS via displayed link names containing non-ASCII characters cumin: session cookies lack httponly setting
[ "cpe:/a:redhat:enterprise_mrg:2:server:el6" ]
null
null
null
null
RHSA-2006:0727
Red Hat Security Advisory: texinfo security update
security flaw security flaw
[ "cpe:/o:redhat:enterprise_linux:2.1::as", "cpe:/o:redhat:enterprise_linux:2.1::aw", "cpe:/o:redhat:enterprise_linux:2.1::es", "cpe:/o:redhat:enterprise_linux:2.1::ws", "cpe:/o:redhat:enterprise_linux:3::as", "cpe:/o:redhat:enterprise_linux:3::desktop", "cpe:/o:redhat:enterprise_linux:3::es", "cpe:/o:redhat:enterprise_linux:3::ws", "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws" ]
null
null
null
null
RHSA-2023:1140
Red Hat Security Advisory: curl security update
curl: HTTP multi-header compression denial of service
[ "cpe:/o:redhat:enterprise_linux:8::baseos" ]
null
6.5
null
null
RHSA-2024:0973
Red Hat Security Advisory: postgresql:15 security update
postgresql: non-owner 'REFRESH MATERIALIZED VIEW CONCURRENTLY' executes arbitrary SQL
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
8
null
null
RHSA-2016:0623
Red Hat Security Advisory: samba security update
samba: Man-in-the-middle attacks possible with NTLMSSP authentication samba: Spoofing vulnerability when domain controller is configured samba: SAMR and LSA man in the middle attacks
[ "cpe:/o:redhat:rhel_aus:5.9", "cpe:/o:redhat:rhel_mission_critical:5.6" ]
null
null
null
null
RHSA-2023:4023
Red Hat Security Advisory: kpatch-patch security update
kernel: a use-after-free in cls_route filter implementation may lead to privilege escalation
[ "cpe:/o:redhat:rhel_e4s:7.7::server" ]
null
7.8
null
null
RHSA-2015:0250
Red Hat Security Advisory: samba4 security update
samba: talloc free on uninitialized stack pointer in netlogon server could lead to remote-code execution
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
null
null
RHSA-2006:0493
Red Hat Security Advisory: kernel security update
security flaw security flaw security flaw NFS client panic using O_DIRECT security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw
[ "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws" ]
null
null
null
null
RHSA-2020:5056
Red Hat Security Advisory: podman security and bug fix update
golang.org/x/text: possibility to trigger an infinite loop in encoding/unicode could lead to crash podman: environment variables leak between containers when started via Varlink or Docker-compatible REST API
[ "cpe:/a:redhat:rhel_extras_other:7" ]
null
5.3
null
null
RHSA-2021:3874
Red Hat Security Advisory: Red Hat Ansible Automation Platform 2.0.1 Security and Bug fix Release
Ansible: ansible-connection module discloses sensitive info in traceback error message
[ "cpe:/a:redhat:ansible_automation_platform:2.0::el8" ]
null
5.5
null
null
RHSA-2022:0041
Red Hat Security Advisory: rh-nodejs14-nodejs and rh-nodejs14-nodejs-nodemon security update
nodejs-ansi-regex: Regular expression denial of service (ReDoS) matching ANSI escape codes nodejs-json-schema: Prototype pollution vulnerability llhttp: HTTP Request Smuggling due to spaces in headers llhttp: HTTP Request Smuggling when parsing the body of chunked requests nodejs-tar: Insufficient symlink protection due to directory cache poisoning using symbolic links allowing arbitrary file creation and overwrite nodejs-tar: Insufficient symlink protection due to directory cache poisoning using symbolic links allowing arbitrary file creation and overwrite
[ "cpe:/a:redhat:rhel_software_collections:3::el7" ]
null
8.1
null
null
RHSA-2001:058
Red Hat Security Advisory: : Updated mount package available
security flaw
[ "cpe:/o:redhat:linux:7.1" ]
null
null
null
null
RHSA-2024:8496
Red Hat Security Advisory: webkit2gtk3 security update
webkitgtk: Memory corruption issue when processing web content webkitgtk: arbitrary javascript code execution webkitgtk: Processing web content may lead to arbitrary code execution webkitgtk: Arbitrary Remote Code Execution chromium-browser: Use after free in ANGLE webkitgtk: type confusion may lead to arbitrary code execution webkitgtk: Processing web content may lead to arbitrary code execution webkitgtk: Processing web content may lead to arbitrary code execution webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution webkitgtk: webkit2gtk: Use after free may lead to Remote Code Execution webkitgtk: webkit2gtk: Out-of-bounds read was addressed with improved bounds checking webkitgtk: webkit2gtk: Out-of-bounds read was addressed with improved bounds checking webkitgtk: webkit2gtk: Use-after-free was addressed with improved memory management webkitgtk: webkit2gtk: Processing maliciously crafted web content may lead to an unexpected process crash webkit: Processing maliciously crafted web content may lead to memory corruption
[ "cpe:/a:redhat:rhel_e4s:9.0::appstream" ]
null
8.8
null
null
RHSA-2024:2885
Red Hat Security Advisory: firefox security update
Mozilla: Arbitrary JavaScript execution in PDF.js Mozilla: IndexedDB files retained in private browsing mode Mozilla: Potential permissions request bypass via clickjacking Mozilla: Cross-origin responses could be distinguished between script and non-script content-types Mozilla: Use-after-free could occur when printing to PDF Mozilla: Memory safety bugs fixed in Firefox 126, Firefox ESR 115.11, and Thunderbird 115.11
[ "cpe:/a:redhat:rhel_eus:8.8::appstream" ]
null
6.1
null
null
RHSA-2023:5741
Red Hat Security Advisory: java-11-openjdk security and bug fix update
OpenJDK: certificate path validation issue during client authentication (8309966)
[ "cpe:/a:redhat:rhel_eus:8.6::appstream", "cpe:/a:redhat:rhel_eus:8.6::crb" ]
null
5.3
null
null
RHSA-2005:035
Red Hat Security Advisory: libtiff security update
security flaw security flaw
[ "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws" ]
null
null
null
null
RHSA-2023:6631
Red Hat Security Advisory: glib2 security and bug fix update
glib: GVariant offset table entry size is not checked in is_normal() glib: g_variant_byteswap() can take a long time with some non-normal inputs glib: GVariant deserialisation does not match spec for non-normal data
[ "cpe:/a:redhat:enterprise_linux:9::appstream", "cpe:/a:redhat:enterprise_linux:9::crb", "cpe:/o:redhat:enterprise_linux:9::baseos" ]
null
6.5
null
null
RHSA-2024:9576
Red Hat Security Advisory: libsoup security update
libsoup: HTTP request smuggling via stripping null bytes from the ends of header names
[ "cpe:/a:redhat:rhel_e4s:9.0::appstream" ]
null
7.5
null
null
RHSA-2010:0711
Red Hat Security Advisory: kernel security update
kernel: 64-bit Compatibility Mode Stack Pointer Underflow
[ "cpe:/o:redhat:rhel_eus:5.3" ]
null
null
null
null
RHSA-2024:1129
Red Hat Security Advisory: curl security update
curl: information disclosure by exploiting a mixed case flaw
[ "cpe:/a:redhat:enterprise_linux:9::appstream", "cpe:/o:redhat:enterprise_linux:9::baseos" ]
null
5.3
null
null
RHSA-2023:2110
Red Hat Security Advisory: OpenShift Container Platform 4.12.16 security update
exporter-toolkit: authentication bypass via cache poisoning
[ "cpe:/a:redhat:openshift:4.12::el8", "cpe:/a:redhat:openshift:4.12::el9" ]
null
7.5
null
null
RHSA-2024:2625
Red Hat Security Advisory: rhc-worker-script security and enhancement update
golang: net/http, x/net/http2: unlimited number of CONTINUATION frames causes DoS
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
7.5
null
null
RHSA-2024:7449
Red Hat Security Advisory: git-lfs security update
encoding/gob: golang: Calling Decoder.Decode on a message which contains deeply nested structures can cause a panic due to stack exhaustion
[ "cpe:/a:redhat:rhel_aus:8.4::appstream", "cpe:/a:redhat:rhel_e4s:8.4::appstream", "cpe:/a:redhat:rhel_tus:8.4::appstream" ]
null
7.5
null
null
RHSA-2025:0532
Red Hat Security Advisory: .NET 8.0 security update
dotnet: .NET and Visual Studio Remote Code Execution Vulnerability dotnet: .NET Elevation of Privilege Vulnerability dotnet: .NET, .NET Framework, and Visual Studio Remote Code Execution Vulnerability
[ "cpe:/a:redhat:rhel_eus:9.4::appstream", "cpe:/a:redhat:rhel_eus:9.4::crb" ]
null
8.8
null
null
RHSA-2022:6954
Red Hat Security Advisory: Red Hat Advanced Cluster Management 2.5.3 security fixes and bug fixes
search-api: SQL injection leads to remote denial of service
[ "cpe:/a:redhat:acm:2.5::el8" ]
null
6.5
null
null
RHSA-2023:3000
Red Hat Security Advisory: dhcp security and bug fix update
dhcp: option refcount overflow when leasequery is enabled leading to dhcpd abort dhcp: DHCP memory leak
[ "cpe:/o:redhat:enterprise_linux:8::baseos" ]
null
6.5
null
null
RHSA-2024:5625
Red Hat Security Advisory: krb5 security update
krb5: GSS message token handling krb5: GSS message token handling
[ "cpe:/o:redhat:rhel_aus:8.6::baseos", "cpe:/o:redhat:rhel_e4s:8.6::baseos", "cpe:/o:redhat:rhel_tus:8.6::baseos" ]
null
6.5
null
null
RHSA-2016:0126
Red Hat Security Advisory: openstack-swift security update
openstack-swift: Client to proxy DoS through Large Objects openstack-swift: Proxy to server DoS through Large Objects
[ "cpe:/a:redhat:openstack:5::el6" ]
null
null
null
null
RHEA-2024:1870
Red Hat Enhancement Advisory: Advisory for publishing Helm 3.13.2 GA release
golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487) HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack)
[ "cpe:/a:redhat:ocp_tools:4.15::el9" ]
null
7.5
null
null
RHSA-2024:9646
Red Hat Security Advisory: webkit2gtk3 security update
webkitgtk: Memory corruption issue when processing web content webkitgtk: arbitrary javascript code execution webkitgtk: Processing web content may lead to arbitrary code execution webkitgtk: Arbitrary Remote Code Execution chromium-browser: Use after free in ANGLE webkitgtk: Processing web content may lead to arbitrary code execution webkitgtk: Processing web content may lead to arbitrary code execution webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution webkitgtk: webkit2gtk: Out-of-bounds read was addressed with improved bounds checking webkitgtk: webkit2gtk: Out-of-bounds read was addressed with improved bounds checking webkitgtk: webkit2gtk: Use-after-free was addressed with improved memory management webkitgtk: webkit2gtk: Processing maliciously crafted web content may lead to an unexpected process crash webkitgtk: webkit2gtk: Processing maliciously crafted web content may lead to an unexpected process crash webkitgtk: webkit2gtk: Processing maliciously crafted web content may lead to an unexpected process crash webkit: Processing maliciously crafted web content may lead to memory corruption
[ "cpe:/a:redhat:rhel_eus:8.8::appstream" ]
null
8.8
null
null
RHSA-2015:1924
Red Hat Security Advisory: qemu-kvm security update
qemu: Heap overflow vulnerability in ne2000_receive() function
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
null
null
RHSA-2021:0181
Red Hat Security Advisory: kernel security update
Kernel: x86_32: BUG in syscall auditing
[ "cpe:/o:redhat:rhel_els:6" ]
null
5.5
null
null
RHSA-2025:3901
Red Hat Security Advisory: kernel-rt security update
kernel: ALSA: usb-audio: Fix out of bounds reads when finding clock sources
[ "cpe:/a:redhat:rhel_extras_rt_els:7" ]
null
7.1
null
null
RHSA-2011:0833
Red Hat Security Advisory: kernel security and bug fix update
kernel: proc: protect mm start_code/end_code in /proc/pid/stat kernel: bt sco_conninfo infoleak kernel: bnep device field missing NULL terminator kernel: ebtables stack infoleak kernel: dccp: fix oops on Reset after close kernel: fs/partitions: Corrupted OSF partition table infoleak kernel: xen: x86_64: fix error checking in arch_set_info_guest() kernel: ipv4: netfilter: arp_tables: fix infoleak to userspace kernel: ipv4: netfilter: ip_tables: fix infoleak to userspace kernel: ipv6: netfilter: ip6_tables: fix infoleak to userspace kernel: drivers/scsi/mpt2sas: prevent heap overflows kernel: drivers/scsi/mpt2sas: prevent heap overflows kernel: corrupted GUID partition tables can cause kernel oops kernel: xen: improper upper boundary check in get_free_port() function
[ "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
RHSA-2024:8118
Red Hat Security Advisory: OpenJDK 8u432 Security Update for Portable Linux Builds
giflib: Heap-Buffer Overflow during Image Saving in DumpScreen2RGB Function JDK: HTTP client improper handling of maxHeaderSize (8328286) JDK: Array indexing integer overflow (8328544) JDK: Unbounded allocation leads to out-of-memory error (8331446) JDK: Integer conversion error leads to incorrect range check (8332644)
[ "cpe:/a:redhat:openjdk:1.8" ]
null
4.8
null
null
RHBA-2020:0496
Red Hat Bug Fix Advisory: Satellite 6.6.2 Async Bug Fix Update
apache-commons-beanutils: does not suppresses the class property in PropertyUtilsBean by default
[ "cpe:/a:redhat:satellite:6.6::el7", "cpe:/a:redhat:satellite_capsule:6.6::el7" ]
null
null
7.3
null
RHSA-2022:8494
Red Hat Security Advisory: grub2 security update
grub2: Buffer overflow in grub_font_construct_glyph() can lead to out-of-bound write and possible secure boot bypass grub2: Heap based out-of-bounds write when redering certain unicode sequences
[ "cpe:/o:redhat:rhel_e4s:8.1::baseos" ]
null
7.1
null
null
RHSA-2025:3467
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.4 .21 security update
netty: Denial of Service attack on windows app using Netty org.wildfly.core:wildfly-server: Wildfly improper RBAC permission io.netty:netty-handler: SslHandler doesn't correctly validate packets which can lead to native crash when using native SSLEngine netty: Denial of Service attack on windows app using Netty
[ "cpe:/a:redhat:jboss_enterprise_application_platform:7.4" ]
null
5.5
null
null
RHSA-2014:1284
Red Hat Security Advisory: Red Hat JBoss Data Virtualization 6.0.0 security update
Teiid: XML eXternal Entity (XXE) flaw in SQL/XML parsing
[ "cpe:/a:redhat:jboss_data_virtualization:6.0" ]
null
null
null
null
RHSA-2005:527
Red Hat Security Advisory: openssh security update
security flaw openssh may set DISPLAY even if it's unable to listen on respective port
[ "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws" ]
null
null
null
null
RHSA-2020:2291
Red Hat Security Advisory: kpatch-patch security update
kernel: use-after-free in __blk_add_trace in kernel/trace/blktrace.c Kernel: NetLabel: null pointer dereference while receiving CIPSO packet with null category may cause kernel panic
[ "cpe:/o:redhat:rhel_eus:7.6::server" ]
null
5.9
null
null
RHSA-2020:1507
Red Hat Security Advisory: java-1.7.0-openjdk security update
OpenJDK: Incorrect handling of references to uninitialized class descriptors during deserialization (Serialization, 8224541) OpenJDK: Uncaught InstantiationError exception in ObjectStreamClass (Serialization, 8224549) OpenJDK: Unexpected exceptions raised by DOMKeyInfoFactory and DOMXMLSignatureFactory (Security, 8231415) OpenJDK: Re-use of single TLS session for new connections (JSSE, 8234408) OpenJDK: CRLF injection into HTTP headers in HttpServer (Lightweight HTTP Server, 8234825) OpenJDK: Incorrect bounds checks in NIO Buffers (Libraries, 8234841) OpenJDK: Incorrect type checks in MethodType.readObject() (Libraries, 8235274) OpenJDK: Regular expression DoS in Scanner (Concurrency, 8236201)
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
5.3
null
null
RHBA-2015:2258
Red Hat Bug Fix Advisory: samba bug fix and enhancement update
samba: DoS to AD-DC due to insufficient checking of asn1 memory allocation
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
null
null
RHSA-2023:1900
Red Hat Security Advisory: java-17-openjdk security and bug fix update
OpenJDK: improper connection handling during TLS handshake (8294474) OpenJDK: missing string checks for NULL characters (8296622) OpenJDK: incorrect handling of NULL characters in ProcessBuilder (8295304) OpenJDK: Swing HTML parsing issue (8296832) OpenJDK: incorrect enqueue of references in garbage collector (8298191) OpenJDK: certificate validation issue in TLS session negotiation (8298310) OpenJDK: missing check for slash characters in URI-to-path conversion (8298667)
[ "cpe:/a:redhat:rhel_eus:9.0::appstream", "cpe:/a:redhat:rhel_eus:9.0::crb" ]
null
3.7
null
null
RHSA-2009:1238
Red Hat Security Advisory: dnsmasq security update
dnsmasq: multiple vulnerabilities in TFTP server dnsmasq: multiple vulnerabilities in TFTP server
[ "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
RHSA-2023:1809
Red Hat Security Advisory: thunderbird security update
Thunderbird: Revocation status of S/Mime recipient certificates was not checked Mozilla: Memory Corruption in Safe Browsing Code Mozilla: libwebp: Double-free in libwebp Mozilla: Matrix SDK bundled with Thunderbird vulnerable to denial-of-service attack Thunderbird: Hang when processing certain OpenPGP messages Mozilla: Fullscreen notification obscured Mozilla: Potential Memory Corruption following Garbage Collector compaction Mozilla: Invalid free from JavaScript code Mozilla: Content-Disposition filename truncation leads to Reflected File Download Mozilla: Files with malicious extensions could have been downloaded unsafely on Linux Mozilla: Incorrect optimization result on ARM64 Mozilla: Memory safety bugs fixed in Firefox 112 and Firefox ESR 102.10
[ "cpe:/a:redhat:enterprise_linux:9::appstream" ]
null
8.8
null
null
RHSA-2020:2462
Red Hat Security Advisory: pcs security and bug fix update
rubygem-json: Unsafe object creation vulnerability in JSON
[ "cpe:/a:redhat:enterprise_linux:8::highavailability", "cpe:/a:redhat:enterprise_linux:8::resilientstorage" ]
null
7.3
null
null
RHSA-2019:2837
Red Hat Security Advisory: kernel security and bug fix update
Kernel: page cache side channel attacks kernel: a NULL pointer dereference in drivers/scsi/megaraid/megaraid_sas_base.c leading to DoS
[ "cpe:/o:redhat:enterprise_linux:7::hypervisor", "cpe:/o:redhat:rhel_eus:7.6::computenode", "cpe:/o:redhat:rhel_eus:7.6::server" ]
null
null
6.2
null
RHSA-2025:0341
Red Hat Security Advisory: Red Hat Ansible Automation Platform 2.5 Container Release Update
grpc: Denial of Service through Data corruption in gRPC-C++ aiohttp: aiohttp vulnerable to request smuggling due to incorrect parsing of chunk extensions jinja2: Jinja has a sandbox breakout through malicious filenames jinja2: Jinja has a sandbox breakout through indirect reference to format method
[ "cpe:/a:redhat:ansible_automation_platform:2.5::el8", "cpe:/a:redhat:ansible_automation_platform:2.5::el9", "cpe:/a:redhat:ansible_automation_platform_cloud_billing:2.5::el8" ]
null
6.3
null
null
RHSA-2017:2638
Red Hat Security Advisory: jboss-ec2-eap security, bug fix, and enhancement update
log4j: Socket receiver deserialization vulnerability tomcat: Security constrained bypass in error page mechanism jackson-databind: Deserialization vulnerability via readValue method of ObjectMapper log4j: deserialization of untrusted data in SocketServer
[ "cpe:/a:redhat:jboss_enterprise_application_platform:6::el6" ]
null
9.8
8.1
null
RHSA-2022:9067
Red Hat Security Advisory: firefox security update
Mozilla: Arbitrary file read from a compromised content process Mozilla: Drag and Dropped Filenames could have been truncated to malicious extensions Mozilla: Memory safety bugs fixed in Firefox ESR 102.6 and Thunderbird 102.6 Mozilla: Use-after-free in WebGL Mozilla: Memory corruption in WebGL Mozilla: Use-after-free in WebGL
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
8.1
null
null
RHSA-2017:2905
Red Hat Security Advisory: rh-sso7-keycloak security update
jasypt: Vulnerable to timing attack against the password hash comparison keycloak: reflected XSS using HOST header keycloak: CSRF token fixation keycloak: resource privilege extension via access token in oauth libpam4j: Account check bypass
[ "cpe:/a:redhat:red_hat_single_sign_on:7::el7" ]
null
null
4.3
null
RHSA-2024:9088
Red Hat Security Advisory: edk2 security update
openssl: POLY1305 MAC implementation corrupts vector registers on PowerPC openssl: Excessive time spent checking invalid RSA public keys openssl: denial of service via null dereference edk2: Temporary DoS vulnerability
[ "cpe:/a:redhat:enterprise_linux:9::appstream", "cpe:/a:redhat:enterprise_linux:9::crb" ]
null
6
null
null
RHSA-2021:5086
Red Hat Security Advisory: Red Hat OpenShift Data Foundation 4.9.0 enhancement, security, and bug fix update
kubernetes: Incomplete fix for CVE-2019-11250 allows for token leak in logs when logLevel >= 9 nodejs-tar: Insufficient symlink protection allowing arbitrary file creation and overwrite nodejs-tar: Insufficient absolute path sanitization allowing arbitrary file creation and overwrite golang: net: lookup functions may return invalid host names golang: net/http/httputil: ReverseProxy forwards connection headers if first one is empty golang: math/big.Rat: may cause a panic or an unrecoverable fatal error if passed inputs with very large exponents golang: crypto/tls: certificate of wrong type is causing TLS client to panic nodejs-tar: Insufficient symlink protection due to directory cache poisoning using symbolic links allowing arbitrary file creation and overwrite nodejs-tar: Insufficient symlink protection due to directory cache poisoning using symbolic links allowing arbitrary file creation and overwrite
[ "cpe:/a:redhat:openshift_data_foundation:4.9::el8" ]
null
8.1
null
null
RHSA-2023:6705
Red Hat Security Advisory: procps-ng security and bug fix update
procps: ps buffer overflow
[ "cpe:/a:redhat:enterprise_linux:9::crb", "cpe:/o:redhat:enterprise_linux:9::baseos" ]
null
3.3
null
null
RHSA-2022:0527
Red Hat Security Advisory: Red Hat JBoss Web Server 3.1 Service Pack 14 security update
log4j: Remote code execution in Log4j 1.x when application is configured to use JMSAppender log4j: Remote code execution in Log4j 1.x when application is configured to use JMSSink log4j: SQL injection in Log4j 1.x when application is configured to use JDBCAppender log4j: Unsafe deserialization flaw in Chainsaw log viewer
[ "cpe:/a:redhat:jboss_enterprise_web_server:3.1" ]
null
8.8
null
null
RHSA-2016:0351
Red Hat Security Advisory: kubernetes security update
server: patch operation should use patched object to check admission control server: build config to a strategy that isn't allowed by policy
[ "cpe:/a:redhat:openshift:3.0::el7" ]
null
null
null
null
RHSA-2015:1035
Red Hat Security Advisory: Red Hat Enterprise Linux 6.5 Extended Update Support 6-Month Notice
This is the Six-Month notification for the retirement of Red Hat Enterprise Linux 6.5 Extended Update Support (EUS). This notification applies only to those customers subscribed to the Extended Update Support (EUS) channel for Red Hat Enterprise Linux 6.5.
[ "cpe:/o:redhat:rhel_eus:6.5::computenode", "cpe:/o:redhat:rhel_eus:6.5::server" ]
null
null
null
null
RHSA-2017:0127
Red Hat Security Advisory: runc security and bug fix update
docker: insecure opening of file-descriptor allows privilege escalation
[ "cpe:/a:redhat:rhel_extras_other:7" ]
null
7.5
null
null
RHSA-2012:1064
Red Hat Security Advisory: kernel security and bug fix update
kernel: netfilter: null pointer dereference in nf_ct_frag6_reasm() kernel: cred: copy_process() should clear child->replacement_session_keyring
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
null
null
RHSA-2024:6779
Red Hat Security Advisory: Red Hat Advanced Cluster Management 2.10.6 bug fixes and container updates
elliptic: nodejs/elliptic: EDDSA signature malleability due to missing signature length check elliptic: nodejs/elliptic: ECDSA signature malleability due to missing checks elliptic: nodejs/elliptic: ECDSA implementation malleability due to BER-enconded signatures being allowed elliptic: Missing Validation in Elliptic's EDDSA Signature Verification
[ "cpe:/a:redhat:acm:2.10::el9" ]
null
8.2
null
null
RHSA-2022:5805
Red Hat Security Advisory: kernel security update
kernel: a use-after-free write in the netfilter subsystem can lead to privilege escalation to root
[ "cpe:/o:redhat:rhel_aus:7.4::server" ]
null
7.8
null
null
RHSA-2017:1759
Red Hat Security Advisory: freeradius security update
freeradius: Out-of-bounds read/write due to improper output buffer size check in make_secret() freeradius: Out-of-bounds write in rad_coalesce() freeradius: Memory leak in decode_tlv() freeradius: Memory leak in fr_dhcp_decode() freeradius: Out-of-bounds read in fr_dhcp_decode_options() freeradius: Out-of-bounds read in fr_dhcp_decode() when decoding option 63
[ "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
5.9
null
RHSA-2023:6811
Red Hat Security Advisory: insights-client security update
insights-client: unsafe handling of temporary files and directories
[ "cpe:/a:redhat:rhel_e4s:8.1::appstream" ]
null
7.8
null
null
RHSA-2024:0752
Red Hat Security Advisory: container-tools:rhel8 security update
runc: file descriptor leak
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
8.6
null
null
RHSA-2021:2390
Red Hat Security Advisory: postgresql:10 security update
postgresql: Buffer overrun from integer overflow in array subscripting calculations postgresql: Memory disclosure in INSERT ... ON CONFLICT ... DO UPDATE
[ "cpe:/a:redhat:rhel_eus:8.2::appstream" ]
null
6.5
null
null
RHSA-2016:1539
Red Hat Security Advisory: kernel security and bug fix update
kernel: Permission bypass on overlayfs during copy_up kernel: Fork of large process causes memory corruption kernel: Uninitialized variable in request_key handling causes kernel crash in error handling path
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
7.8
null
RHSA-2012:1056
Red Hat Security Advisory: resteasy security update
RESTEasy: XML eXternal Entity (XXE) flaw RESTEasy: XML eXternal Entity (XXE) flaw
[ "cpe:/a:redhat:jboss_enterprise_application_platform:5.1" ]
null
null
null
null
RHSA-2019:2862
Red Hat Security Advisory: kernel-alt security update
kernel: vhost-net: guest to host kernel escape during migration
[ "cpe:/o:redhat:enterprise_linux:7::server" ]
null
null
7.2
null
RHSA-2022:0078
Red Hat Security Advisory: kernel-rt security and bug fix update
kernel: fuse: fuse_do_getattr() calls make_bad_inode() in inappropriate situations
[ "cpe:/a:redhat:rhel_eus:8.2::nfv", "cpe:/a:redhat:rhel_eus:8.2::realtime" ]
null
5.5
null
null
RHSA-2024:4335
Red Hat Security Advisory: security update Logging for Red Hat OpenShift - 5.8.9
golang: net/netip: Unexpected behavior from Is methods for IPv4-mapped IPv6 addresses
[ "cpe:/a:redhat:logging:5.8::el9" ]
null
6.7
null
null
RHSA-2022:1642
Red Hat Security Advisory: zlib security update
zlib: A flaw found in zlib when compressing (not decompressing) certain inputs
[ "cpe:/a:redhat:enterprise_linux:8::crb", "cpe:/o:redhat:enterprise_linux:8::baseos" ]
null
8.2
null
null
RHSA-2020:2861
Red Hat Security Advisory: Red Hat OpenShift Service Mesh 1.0 servicemesh-grafana security update
kubernetes: YAML parsing vulnerable to "Billion Laughs" attack, allowing for remote denial of service npm-serialize-javascript: allows remote attackers to inject arbitrary code via the function deleteFunctions within index.js npmjs-websocket-extensions: ReDoS vulnerability in Sec-WebSocket-Extensions parser grafana: XSS annotation popup vulnerability grafana: XSS via column.title or cellLinkTooltip grafana: SSRF incorrect access control vulnerability allows unauthenticated users to make grafana send HTTP requests to any URL grafana: XSS via the OpenTSDB datasource
[ "cpe:/a:redhat:service_mesh:1.0::el8" ]
null
6.1
7.5
null
RHSA-2021:4605
Red Hat Security Advisory: firefox security update
Mozilla: iframe sandbox rules did not apply to XSLT stylesheets Mozilla: Use-after-free in file picker dialog Mozilla: Firefox could be coaxed into going into fullscreen mode without notification or warning Mozilla: Opportunistic Encryption in HTTP2 could be used to bypass the Same-Origin-Policy on services hosted on other ports Mozilla: Permission Prompt could be overlaid, resulting in user confusion and potential spoofing Mozilla: Javascript alert box could have been spoofed onto an arbitrary domain Mozilla: Memory safety bugs fixed in Firefox 94 and Firefox ESR 91.3 Mozilla: Use-after-free in HTTP2 Session object
[ "cpe:/a:redhat:rhel_eus:8.2::appstream" ]
null
8.8
6.1
null
RHSA-2012:1109
Red Hat Security Advisory: jbossas security update
JNDI: unauthenticated remote write access is permitted by default
[ "cpe:/a:redhat:jboss_enterprise_portal_platform:4.3" ]
null
null
null
null
RHSA-2002:175
Red Hat Security Advisory: : Updated nss_ldap packages fix buffer overflow
security flaw security flaw
[ "cpe:/o:redhat:linux:6.2", "cpe:/o:redhat:linux:7.0", "cpe:/o:redhat:linux:7.1", "cpe:/o:redhat:linux:7.2", "cpe:/o:redhat:linux:7.3" ]
null
null
null
null
RHSA-2020:0157
Red Hat Security Advisory: java-1.8.0-openjdk security update
OpenJDK: Incorrect exception processing during deserialization in BeanContextSupport (Serialization, 8224909) OpenJDK: Improper checks of SASL message properties in GssKrb5Base (Security, 8226352) OpenJDK: Incorrect isBuiltinStreamHandler check causing URL normalization issues (Networking, 8228548) OpenJDK: Use of unsafe RSA-MD5 checksum in Kerberos TGS (Security, 8229951) OpenJDK: Serialization filter changes via jdk.serialFilter property modification (Serialization, 8231422) OpenJDK: Excessive memory usage in OID processing in X.509 certificate parsing (Libraries, 8234037) OpenJDK: Incomplete enforcement of maxDatagramSockets limit in DatagramChannelImpl (Networking, 8231795)
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
3.7
null
null
RHSA-2024:0820
Red Hat Security Advisory: Red Hat Advanced Cluster Management 2.8.5 security and bug fix container updates
go-git: Maliciously crafted Git server replies can cause DoS on go-git clients go-git: Maliciously crafted Git server replies can lead to path traversal and RCE on go-git clients
[ "cpe:/a:redhat:acm:2.8::el8" ]
null
8.1
null
null
RHSA-2018:0046
Red Hat Security Advisory: rhev-hypervisor7 security update
An update for rhev-hypervisor7 is now available for RHEV 3.X Hypervisor and Agents for Red Hat Enterprise Linux 6 and RHEV 3.X Hypervisor and Agents for Red Hat Enterprise Linux 7 ELS. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
[ "cpe:/o:redhat:enterprise_linux:6::hypervisor", "cpe:/o:redhat:enterprise_linux:7::hypervisor" ]
null
null
null
null
RHSA-2002:028
Red Hat Security Advisory: : Updated 2.4 kernel available
security flaw
[ "cpe:/o:redhat:linux:7.1", "cpe:/o:redhat:linux:7.2" ]
null
null
null
null
RHSA-2023:6805
Red Hat Security Advisory: squid security update
squid: Denial of Service in HTTP Digest Authentication
[ "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
8.6
null
null
End of preview. Expand in Data Studio
README.md exists but content is empty.
Downloads last month
76