id
stringlengths 13
15
| title
stringlengths 29
176
| description
stringlengths 8
32.1k
| cpes
sequencelengths 0
20
| cvss_v4_0
null | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
null |
---|---|---|---|---|---|---|---|
RHSA-2014:1306 | Red Hat Security Advisory: bash security update | bash: code execution via specially-crafted environment (Incomplete fix for CVE-2014-6271) bash: parser can allow out-of-bounds memory access while handling redir_stack bash: off-by-one error in deeply nested flow control constructs | [
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::server",
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation",
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | null | null |
RHSA-2011:0293 | Red Hat Security Advisory: Red Hat Directory Server security update | Server: crash with multiple simple paged result searches Server: insecure pid file directory permissions Server: use of insecure LD_LIBRARY_PATH settings | [
"cpe:/a:redhat:directory_server:8::el4",
"cpe:/a:redhat:directory_server:8::el5"
] | null | null | null | null |
RHSA-2019:0136 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.2.0 security update | keycloak: SAML request parser replaces special strings with system properties | [
"cpe:/a:redhat:jboss_enterprise_application_platform:7.2::el6"
] | null | null | 6.5 | null |
RHSA-2020:3102 | Red Hat Security Advisory: openstack-keystone security update | openstack-keystone: EC2 and credential endpoints are not protected from a scoped context openstack-keystone: OAuth1 request token authorize silently ignores roles parameter openstack-keystone: Credentials endpoint policy logic allows changing credential owner and target project ID openstack-keystone: failure to check signature TTL of the EC2 credential auth method | [
"cpe:/a:redhat:openstack:15::el8"
] | null | 5.4 | null | null |
RHSA-2019:2130 | Red Hat Security Advisory: libreoffice security and bug fix update | libreoffice: Arbitrary python functions in arbitrary modules on the filesystem can be executed without warning | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 7.8 | null |
RHSA-2019:3131 | Red Hat Security Advisory: OpenShift Container Platform 4.1.20 golang security update | HTTP/2: flood using PING frames results in unbounded memory growth HTTP/2: flood using HEADERS frames results in unbounded memory growth | [
"cpe:/a:redhat:openshift:4.1::el7",
"cpe:/a:redhat:openshift:4.1::el8"
] | null | null | 7.5 | null |
RHSA-2024:5695 | Red Hat Security Advisory: tomcat security update | tomcat: Improper Handling of Exceptional Conditions tomcat: Denial of Service in Tomcat | [
"cpe:/a:redhat:rhel_eus:8.8::appstream"
] | null | 7.5 | null | null |
RHSA-2024:1936 | Red Hat Security Advisory: thunderbird security update | Mozilla: Permission prompt input delay could expire when not in focus Mozilla: Denial of Service using HTTP/2 CONTINUATION frames Mozilla: GetBoundName in the JIT returned the wrong object Mozilla: Out-of-bounds-read after mis-optimized switch statement Mozilla: Incorrect JITting of arguments led to use-after-free during garbage collection Mozilla: Integer-overflow led to out-of-bounds-read in the OpenType sanitizer Mozilla: Potential use-after-free due to AlignedBuffer self-move Mozilla: Memory safety bug fixed in Firefox 125, Firefox ESR 115.10, and Thunderbird 115.10 | [
"cpe:/a:redhat:rhel_eus:8.6::appstream"
] | null | 7.5 | null | null |
RHSA-2024:9985 | Red Hat Security Advisory: RHOSP 17.1.4 (python-urllib3) security update | urllib3: proxy-authorization request header is not stripped during cross-origin redirects | [
"cpe:/a:redhat:openstack:17.1::el8"
] | null | 4.4 | null | null |
RHSA-2014:0674 | Red Hat Security Advisory: rhev-hypervisor6 3.4.0 security, bug fix, and enhancement update | qemu: virtio-net: buffer overflow on invalid state load qemu: virtio: out-of-bounds buffer write on invalid state load qemu: virtio: insufficient validation of num_sg when mapping qemu: virtio: insufficient validation of num_sg when mapping qemu: usb: insufficient sanity checking of setup_index+setup_len in post_load qemu: virtio-scsi: buffer overrun on invalid state load qemu: virtio: buffer overrun on incoming migration qemu: crash by possible division by zero Qemu: block: multiple integer overflow flaws Qemu: block: missing input validation Qemu: prevent possible buffer overflows Qemu: qcow2: NULL dereference in qcow2_open() error path Qemu: block: possible crash due signed types or logic error Qemu: vhdx: bounds checking for block_size and logical_sector_size qemu: virtio-net: buffer overflow in virtio_net_handle_mac() function qemu: virtio: out-of-bounds buffer write on state load with invalid config_len QEMU: out of bounds buffer accesses, guest triggerable via IDE SMART Qemu: usb: fix up post load checks | [
"cpe:/o:redhat:enterprise_linux:6::hypervisor"
] | null | null | null | null |
RHBA-2020:2444 | Red Hat Bug Fix Advisory: OpenShift Container Platform 4.4.8 packages update | jenkins: CSRF protection bypass via crafted URLs jenkins: XSS in job configuration pages jenkins: Content-Security-Policy headers for files uploaded leads to XSS jenkins: improperly processes HTML content of list leads to XSS | [
"cpe:/a:redhat:openshift:4.4::el7",
"cpe:/a:redhat:openshift:4.4::el8"
] | null | 5.4 | null | null |
RHSA-2016:0068 | Red Hat Security Advisory: kernel-rt security update | kernel: crypto api unprivileged arbitrary module load via request_module() kernel: memcg: OOM handling DoS kernel: crypto api unprivileged arbitrary module load via request_module() Kernel: vfs: Do not allow escaping from bind mounts kernel: Possible use-after-free vulnerability in keyring facility | [
"cpe:/a:redhat:enterprise_mrg:2:server:el6"
] | null | null | null | null |
RHSA-2007:0336 | Red Hat Security Advisory: postgresql security update | PostgreSQL security-definer function privilege escalation | [
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws",
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws",
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2017:0248 | Red Hat Security Advisory: Red Hat JBoss BRMS security update | pdfbox: XML External Entity vulnerability tika: XML External Entity vulnerability JBoss bpms 6.3.x cookie does not set httponly | [
"cpe:/a:redhat:jboss_enterprise_brms_platform:6.4"
] | null | null | 4.3 | null |
RHSA-2008:0182 | Red Hat Security Advisory: krb5 security update | krb5: uninitialized pointer use in krb5kdc krb5: possible leak of sensitive data from krb5kdc using krb4 request | [
"cpe:/o:redhat:rhel_eus:4.5::as",
"cpe:/o:redhat:rhel_eus:4.5::es"
] | null | null | null | null |
RHSA-2022:1644 | Red Hat Security Advisory: xmlrpc-c security update | expat: Malformed 2- and 3-byte UTF-8 sequences can lead to arbitrary code execution | [
"cpe:/a:redhat:rhel_eus:8.4::crb",
"cpe:/o:redhat:rhel_eus:8.4::baseos"
] | null | 9.8 | null | null |
RHSA-2023:4030 | Red Hat Security Advisory: grafana security update | grafana: account takeover possible when using Azure AD OAuth | [
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 9.8 | null | null |
RHSA-2006:0710 | Red Hat Security Advisory: kernel security update | security flaw security flaw security flaw security flaw security flaw security flaw | [
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws"
] | null | null | null | null |
RHSA-2022:2196 | Red Hat Security Advisory: .NET 5.0 on RHEL 7 security and bugfix update | dotnet: excess memory allocation via HttpClient causes DoS dotnet: malicious content causes high CPU and memory usage dotnet: parsing HTML causes Denial of Service | [
"cpe:/a:redhat:rhel_dotnet:5.0::el7"
] | null | 7.5 | null | null |
RHSA-2024:4271 | Red Hat Security Advisory: Red Hat AMQ Broker 7.12.1 release and security update | JSON-java: parser confusion leads to OOM org.bouncycastle: Importing an EC certificate with crafted F2m parameters may lead to Denial of Service bc-java: BouncyCastle vulnerable to a timing variant of Bleichenbacher (Marvin Attack) org.bouncycastle:bcprov-jdk18on: Infinite loop in ED25519 verification in the ScalarUtil class org.bouncycastle: Use of Incorrectly-Resolved Name or Reference | [
"cpe:/a:redhat:amq_broker:7.12"
] | null | 5.3 | null | null |
RHSA-2009:0007 | Red Hat Security Advisory: rhpki security and bug fix update | System: insecure config file permissions System: plain text passwords stored in debug log System: missing public key challenge proof verification in the TPS component | [
"cpe:/a:redhat:certificate_system:7.3"
] | null | null | null | null |
RHBA-2015:1292 | Red Hat Bug Fix Advisory: openldap bug fix and enhancement update | openldap: crash in ldap_domain2hostlist when processing SRV records | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | 3.7 | null |
RHSA-2023:7469 | Red Hat Security Advisory: OpenShift Container Platform 4.14.4 security and extras update | golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487) opentelemetry: DoS vulnerability in otelhttp | [
"cpe:/a:redhat:openshift:4.14::el8",
"cpe:/a:redhat:openshift:4.14::el9"
] | null | 7.5 | null | null |
RHSA-2023:6249 | Red Hat Security Advisory: .NET 6.0 security, bug fix, and enhancement update | dotnet: Denial of Service with Client Certificates using .NET Kestrel | [
"cpe:/a:redhat:rhel_dotnet:6.0::el7"
] | null | 6.5 | null | null |
RHSA-2020:4514 | Red Hat Security Advisory: openssl security, bug fix, and enhancement update | openssl: Integer overflow in RSAZ modular exponentiation on x86_64 | [
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 4.8 | null | null |
RHSA-2025:2664 | Red Hat Security Advisory: Red Hat Ansible Automation Platform Execution Environments Container Release Update | jinja2: Jinja sandbox breakout through attr filter selecting format method | [
"cpe:/a:redhat:ansible_automation_platform:ee::el8",
"cpe:/a:redhat:ansible_automation_platform:ee::el9"
] | null | 7.3 | null | null |
RHSA-2005:066 | Red Hat Security Advisory: kdegraphics security update | security flaw security flaw security flaw | [
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2010:0583 | Red Hat Security Advisory: tomcat5 security update | tomcat: information leak vulnerability in the handling of 'Transfer-Encoding' header | [
"cpe:/a:redhat:rhel_developer_suite:3"
] | null | null | null | null |
RHSA-2024:11562 | Red Hat Security Advisory: OpenShift Container Platform 4.15.42 bug fix and security update | go-retryablehttp: url might write sensitive information to log file | [
"cpe:/a:redhat:openshift:4.15::el8",
"cpe:/a:redhat:openshift:4.15::el9"
] | null | 6 | null | null |
RHSA-2022:7144 | Red Hat Security Advisory: Red Hat JBoss Core Services Apache HTTP Server 2.4.51 security update | zlib: A flaw found in zlib when compressing (not decompressing) certain inputs httpd: Request splitting via HTTP/2 method injection and mod_proxy httpd: mod_proxy_uwsgi: out-of-bounds read via a crafted request uri-path httpd: Out-of-bounds write in ap_escape_quotes() via malicious input httpd: NULL pointer dereference via crafted request during HTTP/2 request processing httpd: possible NULL dereference or SSRF in forward proxy configurations expat: Large number of prefixed XML attributes on a single tag can crash libexpat expat: Integer overflow in doProlog in xmlparse.c expat: Integer overflow in addBinding in xmlparse.c expat: Integer overflow in build_model in xmlparse.c expat: Integer overflow in defineAttribute in xmlparse.c expat: Integer overflow in lookup in xmlparse.c expat: Integer overflow in nextScaffoldPart in xmlparse.c expat: Integer overflow in storeAtts in xmlparse.c expat: Integer overflow in function XML_GetBuffer expat: integer overflow in the doProlog function expat: Malformed 2- and 3-byte UTF-8 sequences can lead to arbitrary code execution expat: Namespace-separator characters in "xmlns[:prefix]" attribute values can lead to arbitrary code execution expat: Stack exhaustion in doctype parsing expat: Integer overflow in copyString() expat: Integer overflow in storeRawNames() | [
"cpe:/a:redhat:jboss_core_services:1"
] | null | 9.8 | null | null |
RHSA-2024:1841 | Red Hat Security Advisory: pcs security update | rubygem-rack: Denial of Service Vulnerability in Rack Content-Type Parsing rubygem-rack: Possible DoS Vulnerability with Range Header in Rack rubygem-rack: Possible Denial of Service Vulnerability in Rack Header Parsing | [
"cpe:/a:redhat:rhel_eus:9.0::highavailability",
"cpe:/a:redhat:rhel_eus:9.0::resilientstorage"
] | null | 5.3 | null | null |
RHSA-2024:6708 | Red Hat Security Advisory: ACS 4.5 enhancement and security update | containers/image: digest type does not guarantee valid type | [
"cpe:/a:redhat:advanced_cluster_security:4.5::el8"
] | null | 8.3 | null | null |
RHSA-2020:0057 | Red Hat Security Advisory: rh-java-common-apache-commons-beanutils security update | apache-commons-beanutils: does not suppresses the class property in PropertyUtilsBean by default | [
"cpe:/a:redhat:rhel_software_collections:3::el6",
"cpe:/a:redhat:rhel_software_collections:3::el7"
] | null | null | 7.3 | null |
RHBA-2024:6169 | Red Hat Bug Fix Advisory: linux-firmware bug fix update | hw: amd: SMM Lock Bypass | [
"cpe:/o:redhat:enterprise_linux:9::baseos"
] | null | 7.5 | null | null |
RHSA-2023:6799 | Red Hat Security Advisory: kpatch-patch security update | kernel: net/sched: cls_u32 component reference counter leak if tcf_change_indev() fails kernel: net/sched: cls_fw component can be exploited as result of failure in tcf_change_indev function kernel: tun: bugs for oversize packet when napi frags enabled in tun_napi_alloc_frags | [
"cpe:/o:redhat:rhel_e4s:8.1::baseos"
] | null | 7.8 | null | null |
RHSA-2016:2634 | Red Hat Security Advisory: docker security and bug fix update | docker: privilege escalation via confusion of usernames and UIDs | [
"cpe:/a:redhat:rhel_extras_other:7"
] | null | null | null | null |
RHSA-2025:3005 | Red Hat Security Advisory: webkit2gtk3 security update | webkitgtk: out-of-bounds write vulnerability | [
"cpe:/a:redhat:rhel_aus:8.4::appstream",
"cpe:/a:redhat:rhel_e4s:8.4::appstream",
"cpe:/a:redhat:rhel_tus:8.4::appstream"
] | null | 7.5 | null | null |
RHSA-2015:0803 | Red Hat Security Advisory: kernel security and bug fix update | kernel: integer overflow in fb_mmap kernel: isofs: unbound recursion when processing relocated directories kernel: isofs: unbound recursion when processing relocated directories kernel: infiniband: uverbs: unprotected physical memory access | [
"cpe:/o:redhat:rhel_aus:6.4::server"
] | null | null | null | null |
RHSA-2017:0931 | Red Hat Security Advisory: kernel-rt security and bug fix update | kernel: Null pointer dereference via keyctl kernel: Signed overflow for SO_{SND|RCV}BUFFORCE kernel: Off-by-one error in selinux_setprocattr (/proc/self/attr/fscreate) kernel: Race condition access to n_hdlc.tbuf causes double free in n_hdlc_release() | [
"cpe:/a:redhat:rhel_extras_rt:7"
] | null | null | 7.8 | null |
RHSA-2011:1304 | Red Hat Security Advisory: jbossws-common security update | JBossWS remote Denial of Service | [
"cpe:/a:redhat:jboss_enterprise_web_platform:5.1"
] | null | null | null | null |
RHSA-2014:0436 | Red Hat Security Advisory: Red Hat Storage 2.0 — 60 Day Retirement Notice | This is the 60 day notification for the retirement of Red Hat Storage 2.0. | [] | null | null | null | null |
RHSA-2016:2117 | Red Hat Security Advisory: openstack-manila-ui security update | openstack-manila-ui: persistent XSS in metadata field | [
"cpe:/a:redhat:openstack:9::el7"
] | null | null | 4.1 | null |
RHSA-2019:4090 | Red Hat Security Advisory: OpenShift Container Platform 4.1 libseccomp-golang security update | libseccomp-golang: mishandling of multiple argument rules leading to a bypass of intended access restrictions | [
"cpe:/a:redhat:openshift:4.1::el7"
] | null | null | 6.5 | null |
RHSA-2016:1377 | Red Hat Security Advisory: openstack-ironic security update | openstack-ironic: Ironic Node information including credentials exposed to unauthenticated users | [
"cpe:/a:redhat:openstack:7::el7"
] | null | null | 5.9 | null |
RHSA-2024:0660 | Red Hat Security Advisory: OpenShift Container Platform 4.13.32 bug fix and security update | golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487) opentelemetry: DoS vulnerability in otelhttp | [
"cpe:/a:redhat:openshift:4.13::el8",
"cpe:/a:redhat:openshift:4.13::el9"
] | null | 7.5 | null | null |
RHSA-2025:2666 | Red Hat Security Advisory: .NET 8.0 security, bug fix, and enhancement update | dotnet: Privilege Escalation Vulnerability in .NET SignInManager.RefreshSignInAsync Method | [
"cpe:/a:redhat:rhel_eus:9.4::appstream",
"cpe:/a:redhat:rhel_eus:9.4::crb"
] | null | 7.8 | null | null |
RHSA-2022:6775 | Red Hat Security Advisory: squid:4 security update | squid: buffer-over-read in SSPI and SMB authentication | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 8.6 | null | null |
RHSA-2018:2939 | Red Hat Security Advisory: Red Hat FIS 2.0 on Fuse 6.3.0 R8 security and bug fix update | tomcat: Remote Code Execution bypass for CVE-2017-12615 spring-security-oauth: remote code execution in the authorization process spring-framework: Possible RCE via spring messaging spring-framework: Directory traversal vulnerability with static resources on Windows filesystems spring-framework: Address partial fix for CVE-2018-1270 tomcat: Incorrect handling of empty string URL in security constraints can lead to unintended exposure of resources tomcat: Late application of security constraints can lead to resource exposure for unauthorised users tomcat: A bug in the UTF-8 decoder can lead to DoS jackson-databind: incomplete fix for CVE-2017-7525 permits unsafe serialization via c3p0 libraries | [
"cpe:/a:redhat:jboss_fuse:6.3"
] | null | null | 8.1 | null |
RHSA-2019:3055 | Red Hat Security Advisory: kernel security and bug fix update | kernel: Use-after-free in __blk_drain_queue() function in block/blk-core.c kernel: Heap overflow in mwifiex_update_bss_desc_with_ie function in marvell/mwifiex/scan.c hardware: bluetooth: BR/EDR encryption key negotiation attacks (KNOB) kernel: Heap overflow in mwifiex_uap_parse_tail_ies function in drivers/net/wireless/marvell/mwifiex/ie.c | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 8 | null |
RHSA-2009:1670 | Red Hat Security Advisory: kernel security and bug fix update | kernel: tcf_fill_node() infoleak due to typo in 9ef1d4c7 kernel: r128 IOCTL NULL pointer dereferences when CCE state is uninitialised kernel: AF_UNIX: Fix deadlock on connecting to shutdown socket kernel: nfsv4: kernel panic in nfs4_proc_lock() | [
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2023:6197 | Red Hat Security Advisory: thunderbird security update | Mozilla: Queued up rendering could have allowed websites to clickjack Mozilla: Large WebGL draw could have led to a crash Mozilla: WebExtensions could open arbitrary URLs Mozilla: Improper object tracking during GC in the JavaScript engine could have led to a crash. Mozilla: Memory safety bugs fixed in Firefox 119, Firefox ESR 115.4, and Thunderbird 115.4 Mozilla: Address bar spoofing via bidirectional characters libvpx: crash related to VP9 encoding in libvpx | [
"cpe:/a:redhat:rhel_aus:8.2::appstream",
"cpe:/a:redhat:rhel_e4s:8.2::appstream",
"cpe:/a:redhat:rhel_tus:8.2::appstream"
] | null | 7.5 | null | null |
RHSA-2011:0336 | Red Hat Security Advisory: tomcat5 security update | JDK Double.parseDouble Denial-Of-Service | [
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2024:0187 | Red Hat Security Advisory: Red Hat OpenStack Platform 17.1 (python-urllib3) security update | python-urllib3: Cookie request header isn't stripped during cross-origin redirects | [
"cpe:/a:redhat:openstack:17.1::el8"
] | null | 5.9 | null | null |
RHSA-2024:7430 | Red Hat Security Advisory: kpatch-patch-4_18_0-477_43_1 and kpatch-patch-4_18_0-477_67_1 security update | kernel: wifi: mac80211: Avoid address calculations via out of bounds array indexing | [
"cpe:/o:redhat:rhel_eus:8.8::baseos"
] | null | 7.8 | null | null |
RHSA-2022:5924 | Red Hat Security Advisory: Service Telemetry Framework 1.4 security update | golang: compress/gzip: stack exhaustion in Reader.Read | [
"cpe:/a:redhat:service_telemetry_framework:1.4::el8"
] | null | 7.5 | null | null |
RHSA-2017:0980 | Red Hat Security Advisory: qemu-kvm-rhev security update | Qemu: cirrus: heap buffer overflow via vnc connection Qemu: display: cirrus: OOB read access issue Qemu: display: cirrus: OOB r/w access issues in bitblt routines | [
"cpe:/a:redhat:openstack:5::el7"
] | null | null | 5.5 | null |
RHSA-2022:6268 | Red Hat Security Advisory: convert2rhel security, bug fix, and enhancement update | convert2rhel: Activation key passed via command line by code | [
"cpe:/a:redhat:convert2rhel::el7"
] | null | 5.5 | null | null |
RHSA-2024:10759 | Red Hat Security Advisory: rhc security update | go-yaml: Improve heuristics preventing CPU/memory abuse by parsing malicious or large YAML documents | [
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::crb"
] | null | 7.5 | null | null |
RHSA-2013:0145 | Red Hat Security Advisory: thunderbird security update | Mozilla: Use-after-free when displaying table with many columns and column groups (MFSA 2013-05) Mozilla: Compartment mismatch with quickstubs returned values (MFSA 2013-09) Mozilla: Address space layout leaked in XBL objects (MFSA 2013-11) Mozilla: Buffer overflow in Javascript string concatenation (MFSA 2013-12) Mozilla: Use-after-free in serializeToStream (MFSA 2013-16) Mozilla: Use-after-free in ListenerManager (MFSA 2013-17) Mozilla: Chrome Object Wrapper (COW) bypass through plugin objects (MFSA 2013-15) Mozilla: URL spoofing in addressbar during page loads (MFSA 2013-04) Mozilla: Use-after-free and buffer overflow issues found using Address Sanitizer (MFSA 2013-02) Mozilla: Use-after-free and buffer overflow issues found using Address Sanitizer (MFSA 2013-02) Mozilla: Use-after-free and buffer overflow issues found using Address Sanitizer (MFSA 2013-02) Mozilla: Miscellaneous memory safety hazards (rv:10.0.12) (MFSA 2013-01) | [
"cpe:/a:redhat:rhel_productivity:5",
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2022:7519 | Red Hat Security Advisory: grafana security, bug fix, and enhancement update | sanitize-url: XSS due to improper sanitization in sanitizeUrl function golang: net/http: improper sanitization of Transfer-Encoding header golang: go/parser: stack exhaustion in all Parse* functions grafana: Forward OAuth Identity Token can allow users to access some data sources prometheus/client_golang: Denial of service using InstrumentHandlerCounter grafana: XSS vulnerability in data source handling grafana: CSRF vulnerability can lead to privilege escalation grafana: IDOR vulnerability can lead to information disclosure golang: encoding/xml: stack exhaustion in Decoder.Skip golang: io/fs: stack exhaustion in Glob golang: compress/gzip: stack exhaustion in Reader.Read golang: path/filepath: stack exhaustion in Glob golang: encoding/xml: stack exhaustion in Unmarshal golang: encoding/gob: stack exhaustion in Decoder.Decode golang: net/http/httputil: NewSingleHostReverseProxy - omit X-Forwarded-For not working | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 6.5 | null | null |
RHSA-2023:1406 | Red Hat Security Advisory: nss security update | nss: Arbitrary memory write via PKCS 12 | [
"cpe:/a:redhat:rhel_aus:8.2::appstream",
"cpe:/a:redhat:rhel_e4s:8.2::appstream",
"cpe:/a:redhat:rhel_tus:8.2::appstream"
] | null | 8.8 | null | null |
RHSA-2022:0655 | Red Hat Security Advisory: OpenShift Container Platform 4.9.23 bug fix and security update | golang: archive/zip: malformed archive may cause panic or memory exhaustion (incomplete fix of CVE-2021-33196) | [
"cpe:/a:redhat:openshift:4.9::el8"
] | null | 7.5 | null | null |
RHSA-2020:4947 | Red Hat Security Advisory: thunderbird security update | Mozilla: Memory safety bugs fixed in Firefox 82 and Firefox ESR 78.4 chromium-browser: Use after free in WebRTC | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | 8.8 | null | null |
RHSA-2010:0162 | Red Hat Security Advisory: openssl security update | openssl: missing bn_wexpand return value checks TLS: MITM attacks via session renegotiation openssl: crash caused by a missing krb5_sname_to_principal() return value check | [
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2018:0270 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 6.4.19 security update | artemis/hornetq: memory exhaustion via UDP and JGroups discovery tomcat: Remote Code Execution bypass for CVE-2017-12615 jboss-remoting: High CPU Denial of Service | [
"cpe:/a:redhat:jboss_enterprise_application_platform:6::el6"
] | null | null | 4.3 | null |
RHSA-2024:1867 | Red Hat Security Advisory: Red Hat build of Keycloak 22.0.10 enhancement and security update | keycloak: impersonation via logout token exchange keycloak: secondary factor bypass in step-up authentication keycloak: Log Injection during WebAuthn authentication or registration keycloak: Authorization Bypass keycloak: XSS via assertion consumer service URL in SAML POST-binding flow keycloak: session hijacking via re-authentication keycloak: path transversal in redirection validation keycloak: org.keycloak.protocol.oidc: unvalidated cross-origin messages in checkLoginIframe leads to DDoS keycloak: path traversal in the redirect validation | [
"cpe:/a:redhat:build_keycloak:22::el9"
] | null | 7.1 | null | null |
RHSA-2025:4171 | Red Hat Security Advisory: Red Hat OpenShift Builds 1.3 | golang.org/x/crypto/ssh: Denial of Service in the Key Exchange of golang.org/x/crypto/ssh golang-jwt/jwt: jwt-go allows excessive memory allocation during header parsing | [
"cpe:/a:redhat:openshift_builds:1.3::el9"
] | null | 7.5 | null | null |
RHSA-2022:2214 | Red Hat Security Advisory: zlib security update | zlib: A flaw found in zlib when compressing (not decompressing) certain inputs | [
"cpe:/o:redhat:rhel_els:6"
] | null | 8.2 | null | null |
RHSA-2017:3470 | Red Hat Security Advisory: qemu-kvm-rhev security and bug fix update | Qemu: qemu-nbd crashes due to undefined I/O coroutine Qemu: qemu-nbd: server breaks with SIGPIPE upon client abort Qemu: exec: oob access during dma operation Qemu: i386: multiboot OOB access while loading kernel image Qemu: cirrus: OOB access issue in mode4and5 write functions | [
"cpe:/a:redhat:openstack:9::el7"
] | null | null | 4.4 | null |
RHSA-2015:1667 | Red Hat Security Advisory: httpd security update | httpd: HTTP request smuggling attack against chunked request parser httpd: ap_some_auth_required() does not properly indicate authenticated request in 2.4 | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 3.7 | null |
RHBA-2021:0305 | Red Hat Bug Fix Advisory: Red Hat OpenShift Container Storage 4.6.2 container bug fix update | ceph: CEPHX_V2 replay attack protection lost ceph-ansible: insecure ownership on /etc/ceph/iscsi-gateway.conf configuration file ceph: User credentials can be manipulated and stolen by Native CephFS consumers of OpenStack Manila golang: math/big: panic during recursive division of very large numbers | [
"cpe:/a:redhat:openshift_container_storage:4.6::el8"
] | null | 7.5 | null | null |
RHSA-2025:2544 | Red Hat Security Advisory: Red Hat build of Keycloak 26.0.10 Images Update | keycloak-ldap-federation: Authentication Bypass Due to Missing LDAP Bind After Password Reset in Keycloak keycloak-services: Improper Authorization in Keycloak Organization Mapper Allows Unauthorized Organization Claims | [
"cpe:/a:redhat:build_keycloak:26.0::el9"
] | null | 5.4 | null | null |
RHSA-2023:0819 | Red Hat Security Advisory: thunderbird security update | Mozilla: User Interface lockup with messages combining S/MIME and OpenPGP Mozilla: Content security policy leak in violation reports using iframes Mozilla: Extensions could have opened external schemes without user knowledge Mozilla: Screen hijack via browser fullscreen mode Mozilla: Out of bounds memory write from EncodeInputStream Mozilla: Potential use-after-free from compartment mismatch in SpiderMonkey Mozilla: Invalid downcast in SVGUtils::SetupStrokeGeometry Mozilla: Use-after-free in mozilla::dom::ScriptLoadContext::~ScriptLoadContext Mozilla: Web Crypto ImportKey crashes tab Mozilla: Fullscreen notification not shown in Firefox Focus Mozilla: Memory safety bugs fixed in Firefox 110 and Firefox ESR 102.8 Mozilla: Memory safety bugs fixed in Firefox ESR 102.8 | [
"cpe:/a:redhat:rhel_aus:8.2::appstream",
"cpe:/a:redhat:rhel_e4s:8.2::appstream",
"cpe:/a:redhat:rhel_tus:8.2::appstream"
] | null | 8.8 | null | null |
RHSA-2023:6042 | Red Hat Security Advisory: Self Node Remediation Operator 0.5.1 security update | golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487) HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack) | [
"cpe:/a:redhat:workload_availability_self_node_remediation:0.5::el8"
] | null | 7.5 | null | null |
RHSA-2021:3229 | Red Hat Security Advisory: Red Hat OpenShift Jaeger 1.20.5 security update | golang: net: lookup functions may return invalid host names golang: archive/zip: malformed archive may cause panic or memory exhaustion golang: net/http/httputil: ReverseProxy forwards connection headers if first one is empty golang: math/big.Rat: may cause a panic or an unrecoverable fatal error if passed inputs with very large exponents golang: crypto/tls: certificate of wrong type is causing TLS client to panic | [
"cpe:/a:redhat:jaeger:1.20::el8"
] | null | 6.5 | null | null |
RHSA-2024:0843 | Red Hat Security Advisory: Release of OpenShift Serverless 1.31.1 | logback: A serialization vulnerability in logback receiver golang: net/http/internal: Denial of Service (DoS) via Resource Consumption via HTTP requests ssh: Prefix truncation attack on Binary Packet Protocol (BPP) go-git: Maliciously crafted Git server replies can cause DoS on go-git clients go-git: Maliciously crafted Git server replies can lead to path traversal and RCE on go-git clients | [
"cpe:/a:redhat:openshift_serverless:1.31::el8"
] | null | 8.1 | null | null |
RHSA-2010:0632 | Red Hat Security Advisory: qspice-client security update | spice-xpi/qspice-client unix socket race | [
"cpe:/a:redhat:rhel_productivity:5",
"cpe:/o:redhat:enterprise_linux:5::client"
] | null | null | null | null |
RHSA-2020:1318 | Red Hat Security Advisory: telnet security update | telnet-server: no bounds checks in nextitem() function allows to remotely execute arbitrary code | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 9.8 | null | null |
RHSA-2007:0631 | Red Hat Security Advisory: coolkey security and bug fix update | coolkey file and directory permission flaw | [
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2020:0617 | Red Hat Security Advisory: OpenShift Container Platform 4.2.21 security update | openshift/mediawiki-apb: /etc/passwd is given incorrect privileges openshift/mariadb-apb: /etc/passwd is given incorrect privileges openshift/apb-base: /etc/passwd is given incorrect privileges openshift/postgresql-apb: /etc/passwd is given incorrect privileges openshift/mysql-apb: /etc/passwd is given incorrect privileges | [
"cpe:/a:redhat:openshift:4.2::el7"
] | null | 7 | null | null |
RHSA-2020:0084 | Red Hat Security Advisory: chromium-browser security update | chromium-browser: Use after free in audio | [
"cpe:/a:redhat:rhel_extras:6"
] | null | 8.8 | null | null |
RHSA-2022:0199 | Red Hat Security Advisory: libreswan security update | libreswan: Malicious IKEv1 packet can cause libreswan to restart | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 7.5 | null | null |
RHSA-2015:0009 | Red Hat Security Advisory: kernel security update | kernel: x86: local privesc due to bad_iret and paranoid entry incompatibility | [
"cpe:/o:redhat:rhel_els:4::as",
"cpe:/o:redhat:rhel_els:4::es"
] | null | null | 8.4 | null |
RHSA-2024:10481 | Red Hat Security Advisory: webkit2gtk3 security update | webkit: malicious website may exfiltrate audio data cross-origin webkit: processing malicious web content prevents Content Security Policy from being enforced webkit: maliciously crafted webpage may be able to fingerprint the user webkit: processing maliciously crafted web content prevents Content Security Policy from being enforced webkitgtk: data isolation bypass vulnerability | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 6.1 | null | null |
RHSA-2023:4475 | Red Hat Security Advisory: Gatekeeper Operator v0.2 security fixes and enhancements | openshift: OCP & FIPS mode | [
"cpe:/a:redhat:acm:2.7::el8"
] | null | 6.5 | null | null |
RHSA-2019:1151 | Red Hat Security Advisory: rh-ruby23-ruby security update | rubygems: Installing a malicious gem may lead to arbitrary code execution | [
"cpe:/a:redhat:rhel_software_collections:3::el6",
"cpe:/a:redhat:rhel_software_collections:3::el7"
] | null | null | 7.2 | null |
RHSA-2024:0200 | Red Hat Security Advisory: OpenShift Container Platform 4.12.47 security update | haproxy: Proxy forwards malformed empty Content-Length headers | [
"cpe:/a:redhat:openshift:4.12::el8",
"cpe:/a:redhat:openshift:4.12::el9"
] | null | 7.5 | null | null |
RHSA-2020:2231 | Red Hat Security Advisory: Red Hat Ceph Storage 4.1 security, bug fix, and enhancement update | ceph-ansible: hard coded credential in ceph-ansible playbook | [
"cpe:/a:redhat:ceph_storage:4::el7",
"cpe:/a:redhat:ceph_storage:4::el8"
] | null | 8.8 | null | null |
RHSA-2020:0122 | Red Hat Security Advisory: java-11-openjdk security update | OpenJDK: Incorrect exception processing during deserialization in BeanContextSupport (Serialization, 8224909) OpenJDK: Improper checks of SASL message properties in GssKrb5Base (Security, 8226352) OpenJDK: Incorrect isBuiltinStreamHandler check causing URL normalization issues (Networking, 8228548) OpenJDK: Use of unsafe RSA-MD5 checksum in Kerberos TGS (Security, 8229951) OpenJDK: Serialization filter changes via jdk.serialFilter property modification (Serialization, 8231422) OpenJDK: Excessive memory usage in OID processing in X.509 certificate parsing (Libraries, 8234037) OpenJDK: Incorrect handling of unexpected CertificateVerify TLS handshake messages (JSSE, 8231780) | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 4.8 | null | null |
RHSA-2024:7548 | Red Hat Security Advisory: Run Once Duration Override Operator for Red Hat OpenShift 1.2.0 for RHEL 9 | golang: net/http: golang: mime/multipart: golang: net/textproto: memory exhaustion in Request.ParseMultipartForm golang-protobuf: encoding/protojson, internal/encoding/json: infinite loop in protojson.Unmarshal when unmarshaling certain forms of invalid JSON golang: net: malformed DNS message can cause infinite loop golang: net/netip: Unexpected behavior from Is methods for IPv4-mapped IPv6 addresses net/http: Denial of service due to improper 100-continue handling in net/http | [
"cpe:/a:redhat:run_once_duration_override_operator:1.2::el9"
] | null | 5.9 | null | null |
RHSA-2019:0201 | Red Hat Security Advisory: systemd security update | systemd: memory leak in journald-server.c introduced by fix for CVE-2018-16864 | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 3.3 | null |
RHSA-2020:3779 | Red Hat Security Advisory: Red Hat Data Grid 7.3.7 security update | jetty: HTTP request smuggling using the range header jetty: HTTP request smuggling jetty: Incorrect header handling jackson-mapper-asl: XML external entity similar to CVE-2016-3720 resteasy: Improper validation of response header in MediaTypeHeaderDelegate.java class EAP: field-name is not parsed in accordance to RFC7230 Wildfly: EJBContext principal is not popped back after invoking another EJB using a different Security Domain undertow: AJP File Read/Inclusion Vulnerability Wildfly: Improper authorization issue in WildFlySecurityManager when using alternative protection domain undertow: servletPath is normalized incorrectly leading to dangerous application mapping which could result in security bypass jackson-databind: Lacks certain xbean-reflect/JNDI blocking log4j: improper validation of certificate with host mismatch in SMTP appender jackson-databind: Serialization gadgets in shaded-hikari-config jackson-databind: Serialization gadgets in ibatis-sqlmap jackson-databind: Serialization gadgets in anteros-core jackson-databind: mishandles the interaction between serialization gadgets and typing which could result in remote command execution jackson-databind: mishandles the interaction between serialization gadgets and typing which could result in remote command execution wildfly-elytron: session fixation when using FORM authentication jackson-databind: Serialization gadgets in org.aoju.bus.proxy.provider.*.RmiProvider jackson-databind: Serialization gadgets in javax.swing.JEditorPane jackson-databind: Serialization gadgets in org.apache.activemq.jms.pool.XaPooledConnectionFactory jackson-databind: Serialization gadgets in org.apache.commons.proxy.provider.remoting.RmiProvider jackson-databind: Serialization gadgets in org.apache.openjpa.ee.WASRegistryManagedRuntime netty: compression/decompression codecs don't enforce limits on buffer allocation sizes jackson-databind: Serialization gadgets in org.springframework:spring-aop jackson-databind: Serialization gadgets in commons-jelly:commons-jelly | [
"cpe:/a:redhat:jboss_data_grid:7.3"
] | null | 8.1 | 8.1 | null |
RHSA-2021:3496 | Red Hat Security Advisory: firefox security update | Mozilla: Memory safety bugs fixed in Firefox 92, Firefox ESR 78.14 and Firefox ESR 91.1 | [
"cpe:/a:redhat:rhel_eus:8.2::appstream"
] | null | 8.8 | null | null |
RHSA-2020:4299 | Red Hat Security Advisory: rh-python38 security, bug fix, and enhancement update | python-psutil: Double free because of refcount mishandling python: infinite loop in the tarfile module via crafted TAR archive python: DoS via inefficiency in IPv{4,6}Interface classes python: CRLF injection via HTTP request method in httplib/http.client python-urllib3: CRLF injection via HTTP request method | [
"cpe:/a:redhat:rhel_software_collections:3::el7"
] | null | 6.5 | 7 | null |
RHSA-2024:6464 | Red Hat Security Advisory: glib2 security update | glib2: Signal subscription vulnerabilities | [
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::crb",
"cpe:/o:redhat:enterprise_linux:9::baseos"
] | null | 3.8 | null | null |
RHSA-2023:7578 | Red Hat Security Advisory: squid security update | squid: Denial of Service in HTTP Digest Authentication | [
"cpe:/o:redhat:rhel_aus:7.6::server"
] | null | 8.6 | null | null |
RHSA-2018:2276 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.1 security update | apache-cxf: TLS hostname verification does not work correctly with com.sun.net.ssl.* wildfly-core: Path traversal can allow the extraction of .war archives to write arbitrary files (Zip Slip) | [
"cpe:/a:redhat:jboss_enterprise_application_platform:7.1::el7",
"cpe:/a:redhat:jboss_enterprise_application_platform:7::el6"
] | null | null | 7.6 | null |
RHSA-2013:1144 | Red Hat Security Advisory: nss, nss-util, nss-softokn, and nspr security update | Mozilla: Out-of-bounds array read in CERT_DecodeCertPackage (MFSA 2013-40) nss: TLS CBC padding timing attack | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2023:6030 | Red Hat Security Advisory: Red Hat AMQ Streams 2.2.2 release and security update | HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack) | [
"cpe:/a:redhat:amq_streams:2"
] | null | 7.5 | null | null |
RHSA-2022:7645 | Red Hat Security Advisory: openjpeg2 security update | openjpeg: segmentation fault in opj2_decompress due to uninitialized pointer | [
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb"
] | null | 5.1 | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.