id
stringlengths
13
15
title
stringlengths
29
176
description
stringlengths
8
32.1k
cpes
sequencelengths
0
20
cvss_v4_0
null
cvss_v3_1
float64
0
10
cvss_v3_0
float64
0
10
cvss_v2_0
null
RHSA-2024:4619
Red Hat Security Advisory: libndp security update
libndp: buffer overflow in route information length field
[ "cpe:/o:redhat:rhel_e4s:9.0::baseos" ]
null
8.1
null
null
RHSA-2002:161
Red Hat Security Advisory: openssl security update
security flaw
[ "cpe:/o:redhat:enterprise_linux:2.1::as", "cpe:/o:redhat:enterprise_linux:2.1::aw" ]
null
null
null
null
RHSA-2023:3525
Red Hat Security Advisory: python-flask security update
flask: Possible disclosure of permanent session cookie due to missing Vary: Cookie header
[ "cpe:/a:redhat:rhel_extras_other:7" ]
null
7.5
null
null
RHSA-2022:7273
Red Hat Security Advisory: Red Hat JBoss Web Server 5.7.0 release and security update
cxf: OAuth 2 authorization service vulnerable to DDos attacks CXF: Denial of service vulnerability in parsing JSON via JsonMapObjectReaderWriter Tomcat: Information disclosure tomcat: local privilege escalation vulnerability
[ "cpe:/a:redhat:jboss_enterprise_web_server:5.7" ]
null
7
null
null
RHSA-2024:0116
Red Hat Security Advisory: python-urllib3 security update
python-urllib3: Cookie request header isn't stripped during cross-origin redirects urllib3: Request body not stripped after redirect from 303 status changes request method to GET
[ "cpe:/o:redhat:enterprise_linux:8::baseos" ]
null
4.2
null
null
RHSA-2017:1868
Red Hat Security Advisory: python security and bug fix update
python: failure to validate certificates in the HTTP client with TLS (PEP 476)
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
4.7
null
RHSA-2018:0047
Red Hat Security Advisory: redhat-virtualization-host security update
An update for redhat-virtualization-host is now available for RHEV 4.X, RHEV-H, and Agents for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
[ "cpe:/o:redhat:enterprise_linux:7::hypervisor" ]
null
null
null
null
RHSA-2019:1947
Red Hat Security Advisory: vim security update
vim/neovim: ': source!' command allows arbitrary command execution via modelines
[ "cpe:/o:redhat:rhel_eus:7.4::computenode", "cpe:/o:redhat:rhel_eus:7.4::server" ]
null
5.3
null
null
RHSA-2017:1485
Red Hat Security Advisory: kernel security update
kernel: heap/stack gap jumping via unbounded stack allocations kernel: Incorrectly mapped contents of PIE executable
[ "cpe:/o:redhat:rhel_eus:7.2::computenode", "cpe:/o:redhat:rhel_eus:7.2::server" ]
null
null
2.9
null
RHSA-2021:2715
Red Hat Security Advisory: kernel-rt security and bug fix update
kernel: race condition for removal of the HCI controller kernel: size_t-to-int conversion vulnerability in the filesystem layer
[ "cpe:/a:redhat:enterprise_linux:8::nfv", "cpe:/a:redhat:enterprise_linux:8::realtime" ]
null
6.7
null
null
RHSA-2020:0575
Red Hat Security Advisory: systemd security and bug fix update
systemd: use-after-free when asynchronous polkit queries are performed
[ "cpe:/o:redhat:enterprise_linux:8::baseos" ]
null
7.8
null
null
RHSA-2001:126
Red Hat Security Advisory: : Updated apache packages available
security flaw security flaw
[ "cpe:/o:redhat:linux:6.2", "cpe:/o:redhat:linux:7.0", "cpe:/o:redhat:linux:7.1", "cpe:/o:redhat:linux:7.2" ]
null
null
null
null
RHBA-2021:4684
Red Hat Bug Fix Advisory: virt:av bug fix and enhancement update
libvirt: segmentation fault during VM shutdown can lead to vdsm hang
[ "cpe:/a:redhat:advanced_virtualization:8.5::el8" ]
null
5.3
null
null
RHSA-2022:6753
Red Hat Security Advisory: httpd24-httpd security and bug fix update
httpd: Request splitting via HTTP/2 method injection and mod_proxy httpd: NULL pointer dereference via malformed requests httpd: mod_proxy_uwsgi: out-of-bounds read via a crafted request uri-path httpd: Out-of-bounds write in ap_escape_quotes() via malicious input httpd: possible NULL dereference or SSRF in forward proxy configurations httpd: mod_lua: Use of uninitialized value of in r:parsebody httpd: core: Possible buffer overflow with very large or unlimited LimitXMLRequestBody httpd: mod_sed: Read/write beyond bounds httpd: mod_proxy_ajp: Possible request smuggling httpd: Out-of-bounds read via ap_rwrite() httpd: Out-of-bounds read in ap_strcmp_match() httpd: mod_lua: DoS in r:parsebody httpd: mod_sed: DoS vulnerability httpd: mod_lua: Information disclosure with websockets httpd: mod_proxy: X-Forwarded-For dropped by hop-by-hop mechanism
[ "cpe:/a:redhat:rhel_software_collections:3::el7" ]
null
7.3
null
null
RHSA-2019:3338
Red Hat Security Advisory: edk2 security, bug fix, and enhancement update
edk2: Stack buffer overflow with corrupted BMP edk2: Buffer overflows in PartitionDxe and UdfDxe with long file names and invalid UDF media edk2: stack overflow in XHCI causing denial of service
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
null
5.9
null
RHSA-2011:1801
Red Hat Security Advisory: qemu-kvm security update
qemu: ccid: buffer overflow in handling of VSC_ATR message
[ "cpe:/o:redhat:enterprise_linux:6::server" ]
null
null
null
null
RHSA-2019:3172
Red Hat Security Advisory: Red Hat Satellite 6 security, bug fix, and enhancement update
python-werkzeug: Cross-site scripting in render_full function in debug/tbtools.py python-jinja2: Sandbox escape due to information disclosure via str.format rubygem-rack: Buffer size in multipart parser allows for denial of service dom4j: XML Injection in Class: Element. Methods: addElement, addAttribute which can impact the integrity of XML documents foreman: Recover of plaintext password or token for the compute resources foreman: authorization bypasses in foreman-tasks leading to information disclosure python-jinja2: str.format_map allows sandbox escape python-twisted: Improper neutralization of CRLF characters in URIs and HTTP methods katello: registry credentials are captured in plain text during repository discovery
[ "cpe:/a:redhat:satellite:6.6::el7", "cpe:/a:redhat:satellite_capsule:6.6::el7" ]
null
null
4.1
null
RHSA-2021:1479
Red Hat Security Advisory: bind security update
bind: An assertion check can fail while answering queries for DNAME records that require the DNAME to be processed to resolve itself
[ "cpe:/o:redhat:rhel_aus:7.4::server", "cpe:/o:redhat:rhel_e4s:7.4::server", "cpe:/o:redhat:rhel_tus:7.4::server" ]
null
7.5
null
null
RHSA-2002:051
Red Hat Security Advisory: : : : New Squid packages available
security flaw security flaw security flaw security flaw
[ "cpe:/o:redhat:linux:6.2", "cpe:/o:redhat:linux:7.0", "cpe:/o:redhat:linux:7.1", "cpe:/o:redhat:linux:7.2", "cpe:/o:redhat:linux:7.3" ]
null
null
null
null
RHSA-2013:0657
Red Hat Security Advisory: openstack-nova security, bug fix, and enhancement update
bindings: Internal entity expansion in Python XML libraries inflicts DoS vulnerabilities bindings: External entity expansion in Python XML libraries inflicts potential security flaws and DoS vulnerabilities
[ "cpe:/a:redhat:openstack:2::el6" ]
null
null
null
null
RHSA-2024:6356
Red Hat Security Advisory: bubblewrap and flatpak security update
flatpak: Access to files outside sandbox for apps using persistent= (--persist)
[ "cpe:/a:redhat:enterprise_linux:9::appstream", "cpe:/a:redhat:enterprise_linux:9::crb", "cpe:/o:redhat:enterprise_linux:9::baseos" ]
null
7.4
null
null
RHSA-2002:184
Red Hat Security Advisory: openssl security update for Stronghold
security flaw
[ "cpe:/a:redhat:stronghold:3" ]
null
null
null
null
RHSA-2021:0240
Red Hat Security Advisory: dnsmasq security update
dnsmasq: loose address/port check in reply_query() makes forging replies easier for an off-path attacker dnsmasq: loose query name check in reply_query() makes forging replies easier for an off-path attacker dnsmasq: multiple queries forwarded for the same name makes forging replies easier for an off-path attacker
[ "cpe:/o:redhat:rhel_aus:7.2::server" ]
null
4
null
null
RHSA-2022:8556
Red Hat Security Advisory: thunderbird security update
Mozilla: Service Workers might have learned size of cross-origin media files Mozilla: Fullscreen notification bypass Mozilla: Use-after-free in InputStream implementation Mozilla: Use-after-free of a JavaScript Realm Mozilla: Fullscreen notification bypass via windowName Mozilla: Use-after-free in Garbage Collection Mozilla: ServiceWorker-intercepted requests bypassed SameSite cookie policy Mozilla: Cross-Site Tracing was possible via non-standard override headers Mozilla: Symlinks may resolve to partially uninitialized buffers Mozilla: Keystroke Side-Channel Leakage Mozilla: Custom mouse cursor could have been drawn over browser UI Mozilla: Iframe contents could be rendered outside the iframe Mozilla: Memory safety bugs fixed in Firefox 107 and Firefox ESR 102.5
[ "cpe:/a:redhat:rhel_e4s:8.1::appstream" ]
null
8.8
6.1
null
RHSA-2019:1296
Red Hat Security Advisory: Red Hat JBoss Core Services Apache HTTP Server 2.4.29 SP2 security update
ROHNP: Key Extraction Side Channel in Multiple Crypto Libraries openssl: Malicious server can send large prime to client during DH(E) TLS handshake causing the client to hang httpd: privilege escalation from modules scripts
[ "cpe:/a:redhat:jboss_core_services:1" ]
null
null
8.8
null
RHSA-2022:1056
Red Hat Security Advisory: Release of OpenShift Serverless Client kn 1.21.0
golang: net/http: limit growth of header canonicalization cache golang: syscall: don't close fd 0 on ForkExec error
[ "cpe:/a:redhat:serverless:1.0::el8" ]
null
4.8
null
null
RHSA-2002:197
Red Hat Security Advisory: : Updated glibc packages fix vulnerabilities in resolver
security flaw
[ "cpe:/o:redhat:linux:6.2", "cpe:/o:redhat:linux:7.0", "cpe:/o:redhat:linux:7.1", "cpe:/o:redhat:linux:7.2", "cpe:/o:redhat:linux:7.3" ]
null
null
null
null
RHSA-2021:4409
Red Hat Security Advisory: libgcrypt security and bug fix update
libgcrypt: mishandles ElGamal encryption because it lacks exponent blinding to address a side-channel attack against mpi_powm
[ "cpe:/o:redhat:enterprise_linux:8::baseos" ]
null
7.5
null
null
RHSA-2020:2669
Red Hat Security Advisory: kpatch-patch security update
kernel: use-after-free in block/bfq-iosched.c related to bfq_idle_slice_timer_body
[ "cpe:/o:redhat:rhel_eus:8.1::baseos" ]
null
7
null
null
RHSA-2019:4098
Red Hat Security Advisory: OpenShift Container Platform 4.2 ose-cluster-kube-controller-manager-operator-container security update
library-go: Secret data written to static pod logs when operator set at Debug level or higher
[ "cpe:/a:redhat:openshift:4.2::el7" ]
null
null
5.3
null
RHSA-2024:6274
Red Hat Security Advisory: Red Hat OpenShift distributed tracing 3.3.0 operator/operand containers
Red Hat OpenShift distributed tracing 3.3.0
[ "cpe:/a:redhat:openshift_distributed_tracing:3.3::el8" ]
null
null
null
null
RHSA-2021:0531
Red Hat Security Advisory: container-tools:rhel8 security, bug fix, and enhancement update
podman: environment variables leak between containers when started via Varlink or Docker-compatible REST API
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
5.3
null
null
RHSA-2012:0092
Red Hat Security Advisory: php53 security update
php: remote code exec flaw introduced in the CVE-2011-4885 hashdos fix
[ "cpe:/o:redhat:enterprise_linux:5::client_workstation", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
RHSA-2019:0375
Red Hat Security Advisory: flatpak security update
flatpak: potential /proc based sandbox escape
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
7.7
null
RHSA-2020:1518
Red Hat Security Advisory: git security update
git: Crafted URL containing new lines can cause credential leak
[ "cpe:/a:redhat:rhel_e4s:8.0::appstream" ]
null
7.5
null
null
RHSA-2024:8425
Red Hat Security Advisory: OpenShift Container Platform 4.15.37 bug fix and security update
golang: net/http, x/net/http2: unlimited number of CONTINUATION frames causes DoS go-git: Maliciously crafted Git server replies can lead to path traversal and RCE on go-git clients containers/image: digest type does not guarantee valid type net/http: Denial of service due to improper 100-continue handling in net/http cloudevents/sdk-go: usage of WithRoundTripper to create a Client leaks credentials jose-go: improper handling of highly compressed data go/parser: golang: Calling any of the Parse functions containing deeply nested literals can cause a panic/stack exhaustion encoding/gob: golang: Calling Decoder.Decode on a message which contains deeply nested structures can cause a panic due to stack exhaustion go/build/constraint: golang: Calling Parse on a "// +build" build tag line with deeply nested expressions can cause a panic due to stack exhaustion
[ "cpe:/a:redhat:openshift:4.15::el8", "cpe:/a:redhat:openshift:4.15::el9" ]
null
5.9
null
null
RHSA-2021:2237
Red Hat Security Advisory: polkit security update
polkit: local privilege escalation using polkit_system_bus_name_get_creds_sync()
[ "cpe:/o:redhat:rhel_eus:8.2::baseos" ]
null
7.8
null
null
RHSA-2023:7509
Red Hat Security Advisory: firefox security update
Mozilla: Out-of-bound memory access in WebGL2 blitFramebuffer Mozilla: Use-after-free in MessagePort::Entangled Mozilla: Clickjacking permission prompts using the fullscreen transition Mozilla: Use-after-free in ReadableByteStreamQueueEntry::Buffer Mozilla: Using Selection API would copy contents into X11 primary selection. Mozilla: Incorrect parsing of relative URLs starting with "///" Mozilla: Memory safety bugs fixed in Firefox 120, Firefox ESR 115.5, and Thunderbird 115.5
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
8.8
null
null
RHSA-2024:9818
Red Hat Security Advisory: tigervnc security update
xorg-x11-server: tigervnc: heap-based buffer overflow privilege escalation vulnerability
[ "cpe:/a:redhat:rhel_aus:8.2::appstream" ]
null
7.8
null
null
RHSA-2022:8549
Red Hat Security Advisory: firefox security update
expat: use-after free caused by overeager destruction of a shared DTD in XML_ExternalEntityParserCreate Mozilla: Service Workers might have learned size of cross-origin media files Mozilla: Fullscreen notification bypass Mozilla: Use-after-free in InputStream implementation Mozilla: Use-after-free of a JavaScript Realm Mozilla: Fullscreen notification bypass via windowName Mozilla: Use-after-free in Garbage Collection Mozilla: ServiceWorker-intercepted requests bypassed SameSite cookie policy Mozilla: Cross-Site Tracing was possible via non-standard override headers Mozilla: Symlinks may resolve to partially uninitialized buffers Mozilla: Keystroke Side-Channel Leakage Mozilla: Custom mouse cursor could have been drawn over browser UI Mozilla: Iframe contents could be rendered outside the iframe Mozilla: Memory safety bugs fixed in Firefox 107 and Firefox ESR 102.5
[ "cpe:/a:redhat:rhel_eus:8.4::appstream" ]
null
8.8
6.1
null
RHSA-2021:1478
Red Hat Security Advisory: bind security update
bind: An assertion check can fail while answering queries for DNAME records that require the DNAME to be processed to resolve itself
[ "cpe:/o:redhat:rhel_eus:7.6::computenode", "cpe:/o:redhat:rhel_eus:7.6::server" ]
null
7.5
null
null
RHSA-2023:3185
Red Hat Security Advisory: Red Hat AMQ Broker 7.10.3 release and security update
keycloak: path traversal via double URL encoding springframework: DoS via data binding to multipartFile or servlet part springframework: DoS with STOMP over WebSocket RESTEasy: creation of insecure temp files springframework: Security Bypass With Un-Prefixed Double Wildcard Pattern springframework: Spring Expression DoS Vulnerability
[ "cpe:/a:redhat:amq_broker:7" ]
null
5.3
null
null
RHSA-2013:0207
Red Hat Security Advisory: JBoss Enterprise Web Platform 5.2.0 security update
Installer: Generated auto-install xml is world readable
[ "cpe:/a:redhat:jboss_enterprise_web_platform:5.2" ]
null
null
null
null
RHSA-2023:6786
Red Hat Security Advisory: Fence Agents Remediation Operator 0.2.1 security update
golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487) HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack)
[ "cpe:/a:redhat:workload_availability_fence_agents_remediation:0.2::el8" ]
null
7.5
null
null
RHSA-2014:0949
Red Hat Security Advisory: kernel security update
kernel: x86_64: ptrace: sysret to non-canonical address
[ "cpe:/o:redhat:rhel_mission_critical:6.2::server" ]
null
null
null
null
RHSA-2013:0992
Red Hat Security Advisory: python-keystoneclient security, bug fix, and enhancement update
python-keystoneclient: middleware memcache encryption and signing bypass python-keystoneclient: middleware memcache encryption and signing bypass
[ "cpe:/a:redhat:openstack:3::el6" ]
null
null
null
null
RHSA-2022:1083
Red Hat Security Advisory: Red Hat Advanced Cluster Management 2.3.8 security and container updates
cached-path-relative: Prototype Pollution via the cache variable nanoid: Information disclosure via valueOf() function nodejs-shelljs: improper privilege management follow-redirects: Exposure of Private Personal Information to an Unauthorized Actor node-fetch: exposure of sensitive information to an unauthorized actor follow-redirects: Exposure of Sensitive Information via Authorization Header leak
[ "cpe:/a:redhat:acm:2.3::el7", "cpe:/a:redhat:acm:2.3::el8" ]
null
5.9
null
null
RHSA-2021:2422
Red Hat Security Advisory: gupnp security update
gupnp: allows DNS rebinding which could result in tricking browser into triggering actions against local UPnP services
[ "cpe:/a:redhat:rhel_eus:8.2::appstream", "cpe:/a:redhat:rhel_eus:8.2::crb" ]
null
8.3
null
null
RHSA-2024:1250
Red Hat Security Advisory: kernel security and bug fix update
kernel: memcg does not limit the number of POSIX file locks allowing memory exhaustion kernel: nfp: use-after-free in area_cache_get() kernel: vmwgfx: NULL pointer dereference in vmw_cmd_dx_define_query hw: Intel: Gather Data Sampling (GDS) side channel vulnerability kernel: use-after-free in smb2_is_status_io_timeout() kernel: bpf: Incorrect verifier pruning leads to unsafe code paths being incorrectly marked as safe kernel: NULL pointer dereference in can_rcv_filter kernel: Slab-out-of-bound read in compare_netdev_and_ip kernel: out-of-bounds access in relay_file_read kernel: UAF in nftables when nft_set_lookup_global triggered after handling named and anonymous sets in batch requests kernel: net/sched: cls_u32 component reference counter leak if tcf_change_indev() fails kernel: vmxnet3: NULL pointer dereference in vmxnet3_rq_cleanup() kernel: use after free in unix_stream_sendpage kernel: A heap out-of-bounds write when function perf_read_group is called and sibling_list is smaller than its child's sibling_list kernel: GSM multiplexing race condition leads to privilege escalation kernel: use-after-free in IPv4 IGMP kernel: refcount leak in ctnetlink_create_conntrack() kernel: fbcon: out-of-sync arrays in fbcon_mode_deleted due to wrong con2fb_map assignment kernel: use-after-free in l2cap_sock_release in net/bluetooth/l2cap_sock.c kernel: ktls overwrites readonly memory pages when using function splice with a ktls socket as destination kernel: sched/membarrier: reduce the ability to hammer on sys_membarrier
[ "cpe:/a:redhat:rhel_eus:9.0::appstream", "cpe:/a:redhat:rhel_eus:9.0::crb", "cpe:/o:redhat:rhel_eus:9.0::baseos" ]
null
4.7
null
null
RHSA-2003:081
Red Hat Security Advisory: zlib security update
security flaw
[ "cpe:/o:redhat:enterprise_linux:2.1::as", "cpe:/o:redhat:enterprise_linux:2.1::aw", "cpe:/o:redhat:enterprise_linux:2.1::es", "cpe:/o:redhat:enterprise_linux:2.1::ws" ]
null
null
null
null
RHSA-2023:7166
Red Hat Security Advisory: tpm2-tss security and enhancement update
tpm2-tss: Buffer Overlow in TSS2_RC_Decode
[ "cpe:/o:redhat:enterprise_linux:8::baseos" ]
null
6.4
null
null
RHSA-2013:0683
Red Hat Security Advisory: axis security update
axis: missing connection hostname check against X.509 certificate name
[ "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
RHSA-2019:0237
Red Hat Security Advisory: etcd security, bug fix, and enhancement update
An update for etcd is now available for Red Hat Enterprise Linux 7 Extras. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. [Updated 5th March 2019] On 5th February 2019, the updated etcd packages previously included in this erratum were removed. For further details about this removal, refer to the Red Hat Knowledgebase article 3938261 linked in the References section.
[ "cpe:/a:redhat:rhel_extras_other:7" ]
null
null
null
null
RHSA-2015:1706
Red Hat Security Advisory: bind security update
bind: malformed DNSSEC key failed assertion denial of service
[ "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::client_workstation", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
RHSA-2004:023
Red Hat Security Advisory: net-snmp security update
security flaw
[ "cpe:/o:redhat:enterprise_linux:3::as", "cpe:/o:redhat:enterprise_linux:3::desktop", "cpe:/o:redhat:enterprise_linux:3::es", "cpe:/o:redhat:enterprise_linux:3::ws" ]
null
null
null
null
RHSA-2020:5333
Red Hat Security Advisory: go-toolset-1.14-golang security update
golang: math/big: panic during recursive division of very large numbers golang: malicious symbol names can lead to code execution at build time golang: improper validation of cgo flags can lead to code execution at build time
[ "cpe:/a:redhat:devtools:2020" ]
null
7.5
null
null
RHSA-2025:1262
Red Hat Security Advisory: kernel security update
kernel: media: uvcvideo: Skip parsing frames of type UVC_VS_UNDEFINED in uvc_parse_format
[ "cpe:/a:redhat:enterprise_linux:9::appstream", "cpe:/a:redhat:enterprise_linux:9::crb", "cpe:/a:redhat:enterprise_linux:9::nfv", "cpe:/a:redhat:enterprise_linux:9::realtime", "cpe:/o:redhat:enterprise_linux:9::baseos" ]
null
7.3
null
null
RHSA-2011:1083
Red Hat Security Advisory: fuse security update
fuse: unprivileged user can unmount arbitrary locations via symlink attack fuse: unprivileged user can unmount arbitrary locations via symlink attack fuse: unprivileged user can unmount arbitrary locations via symlink attack fuse: unprivileged user can unmount arbitrary locations via symlink attack
[ "cpe:/o:redhat:enterprise_linux:6::server" ]
null
null
null
null
RHSA-2023:6199
Red Hat Security Advisory: firefox security update
Mozilla: Queued up rendering could have allowed websites to clickjack Mozilla: Large WebGL draw could have led to a crash Mozilla: WebExtensions could open arbitrary URLs Mozilla: Improper object tracking during GC in the JavaScript engine could have led to a crash. Mozilla: Memory safety bugs fixed in Firefox 119, Firefox ESR 115.4, and Thunderbird 115.4 Mozilla: Address bar spoofing via bidirectional characters libvpx: crash related to VP9 encoding in libvpx
[ "cpe:/a:redhat:rhel_eus:9.0::appstream" ]
null
7.5
null
null
RHSA-2014:0477
Red Hat Security Advisory: Oracle Java SE - Notification of Removal from Supplementary Channel
Oracle Java SE packages will be moved from the Red Hat Enterprise Linux 5 and 6 Supplementary Red Hat Network (RHN) channels to the Oracle Java for Red Hat Enterprise Linux 5 and 6 RHN channels.
[]
null
null
null
null
RHSA-2014:1398
Red Hat Security Advisory: Apache POI security update
apache-poi: XML eXternal Entity (XXE) flaw apache-poi: entity expansion (billion laughs) flaw
[ "cpe:/a:redhat:jboss_data_virtualization:6.0" ]
null
null
null
null
RHSA-2025:0210
Red Hat Security Advisory: dpdk security update
dpdk: Denial Of Service from malicious guest on hypervisors using DPDK Vhost library
[ "cpe:/a:redhat:enterprise_linux:9::appstream" ]
null
null
7.4
null
RHSA-2024:4741
Red Hat Security Advisory: linux-firmware security update
kernel: Reserved fields in guest message responses may not be zero initialized
[ "cpe:/o:redhat:rhel_eus:8.8::baseos" ]
null
4.4
null
null
RHSA-2024:4824
Red Hat Security Advisory: nodejs:18 security update
nodejs: CONTINUATION frames DoS nghttp2: CONTINUATION frames DoS
[ "cpe:/a:redhat:rhel_eus:8.8::appstream" ]
null
5.3
null
null
RHSA-2020:1167
Red Hat Security Advisory: nbdkit security and bug fix update
nbdkit: denial of service due to premature opening of back-end connection
[ "cpe:/o:redhat:enterprise_linux:7::server" ]
null
null
3.7
null
RHSA-2024:9678
Red Hat Security Advisory: squid security update
squid: Denial of Service processing ESI response content
[ "cpe:/a:redhat:rhel_eus:9.4::appstream" ]
null
7.5
null
null
RHSA-2020:0475
Red Hat Security Advisory: Red Hat Quay v3.2.1 security update
nodejs-yarn: Install functionality can be abused to generate arbitrary symlinks
[ "cpe:/a:redhat:quay:3::el7" ]
null
7.8
null
null
RHSA-2024:2979
Red Hat Security Advisory: poppler security update
poppler: NULL pointer dereference in `FoFiType1C::convertToType1`
[ "cpe:/a:redhat:enterprise_linux:8::appstream", "cpe:/a:redhat:enterprise_linux:8::crb" ]
null
5.5
null
null
RHSA-2012:1549
Red Hat Security Advisory: bind security update
bind: DoS on servers using DNS64
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
null
null
RHSA-2003:052
Red Hat Security Advisory: krb5 security update
security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw
[ "cpe:/o:redhat:enterprise_linux:2.1::as", "cpe:/o:redhat:enterprise_linux:2.1::aw", "cpe:/o:redhat:enterprise_linux:2.1::es", "cpe:/o:redhat:enterprise_linux:2.1::ws" ]
null
null
null
null
RHSA-2006:0159
Red Hat Security Advisory: httpd security update
security flaw httpd cross-site scripting flaw in mod_imap security flaw
[ "cpe:/o:redhat:enterprise_linux:3::as", "cpe:/o:redhat:enterprise_linux:3::desktop", "cpe:/o:redhat:enterprise_linux:3::es", "cpe:/o:redhat:enterprise_linux:3::ws", "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws" ]
null
null
null
null
RHSA-2017:3442
Red Hat Security Advisory: rh-mysql57-mysql security update
mysql: Server: Pluggable Auth unspecified vulnerability (CPU Oct 2017) mysql: Server: Replication unspecified vulnerability (CPU Oct 2017) mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2017) mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2017) mysql: Server: Replication unspecified vulnerability (CPU Oct 2017) mysql: Server: FTS unspecified vulnerability (CPU Oct 2017) mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2017) mysql: Server: Performance Schema unspecified vulnerability (CPU Oct 2017) mysql: Server: Stored Procedure unspecified vulnerability (CPU Oct 2017) mysql: Server: InnoDB unspecified vulnerability (CPU Oct 2017) mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2017) mysql: Server: DML unspecified vulnerability (CPU Oct 2017) mysql: Server: FTS unspecified vulnerability (CPU Oct 2017) mysql: Group Replication GCS unspecified vulnerability (CPU Oct 2017) mysql: Server: Memcached unspecified vulnerability (CPU Oct 2017) mysql: Server: InnoDB unspecified vulnerability (CPU Oct 2017) mysql: Server: InnoDB unspecified vulnerability (CPU Oct 2017) mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2017) mysql: Client programs unspecified vulnerability (CPU Oct 2017) mysql: Server: DDL unspecified vulnerability (CPU Oct 2017) mysql: Server: Partition unspecified vulnerability (CPU Jan 2018) mysql: Server : Partition unspecified vulnerability (CPU Jan 2018)
[ "cpe:/a:redhat:rhel_software_collections:3::el6", "cpe:/a:redhat:rhel_software_collections:3::el7" ]
null
null
4.9
null
RHSA-2021:3946
Red Hat Security Advisory: redis:5 security update
redis: Lua scripts can overflow the heap-based Lua stack redis: Integer overflow issue with Streams redis: Integer overflow bug in the ziplist data structure redis: Denial of service via Redis Standard Protocol (RESP) request redis: Integer overflow issue with intsets redis: Integer overflow issue with strings
[ "cpe:/a:redhat:rhel_eus:8.1::appstream" ]
null
7.5
null
null
RHSA-2023:5189
Red Hat Security Advisory: libwebp security update
libwebp: Heap buffer overflow in WebP Codec libwebp: out-of-bounds write with a specially crafted WebP lossless file
[ "cpe:/a:redhat:rhel_eus:8.6::appstream" ]
null
0
null
null
RHSA-2010:0959
Red Hat Security Advisory: JBoss Enterprise Application Platform 5.1.0 security and bug fix update
JBoss Remoting Denial-Of-Service
[ "cpe:/a:redhat:jboss_enterprise_application_platform:5::el4" ]
null
null
null
null
RHSA-2017:0254
Red Hat Security Advisory: spice security update
spice: Buffer overflow in main_channel_alloc_msg_rcv_buf when reading large messages spice: Remote DoS via crafted message
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
7.5
null
RHSA-2014:0454
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 6.2.2 security update
Xalan-Java: insufficient constraints in secure processing feature
[ "cpe:/a:redhat:jboss_enterprise_application_platform:6.2" ]
null
null
null
null
RHSA-2024:4197
Red Hat Security Advisory: httpd:2.4/httpd security update
httpd: HTTP response splitting
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
6.8
null
null
RHSA-2025:3837
Red Hat Security Advisory: openssh security update
openssh: Machine-in-the-middle attack if VerifyHostKeyDNS is enabled
[ "cpe:/a:redhat:rhel_eus:9.4::appstream", "cpe:/o:redhat:rhel_eus:9.4::baseos" ]
null
6.8
null
null
RHSA-2022:0401
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.4.3 security update
undertow: client side invocation timeout raised when calling over HTTP2 7: Incomplete fix of CVE-2016-4978 in HornetQ library
[ "cpe:/a:redhat:jboss_enterprise_application_platform:7.4::el8" ]
null
6.6
null
null
RHSA-2023:7511
Red Hat Security Advisory: firefox security update
Mozilla: Out-of-bound memory access in WebGL2 blitFramebuffer Mozilla: Use-after-free in MessagePort::Entangled Mozilla: Clickjacking permission prompts using the fullscreen transition Mozilla: Use-after-free in ReadableByteStreamQueueEntry::Buffer Mozilla: Using Selection API would copy contents into X11 primary selection. Mozilla: Incorrect parsing of relative URLs starting with "///" Mozilla: Memory safety bugs fixed in Firefox 120, Firefox ESR 115.5, and Thunderbird 115.5
[ "cpe:/a:redhat:rhel_eus:8.8::appstream" ]
null
8.8
null
null
RHSA-2019:3202
Red Hat Security Advisory: Ansible security and bug fix update
ansible: secrets disclosed on logs when no_log enabled ansible: Incomplete fix for CVE-2019-10206 ansible: sub parameters marked as no_log are not masked in certain failure scenarios
[ "cpe:/a:redhat:ansible_engine:2.7::el7" ]
null
5
6.4
null
RHSA-2025:1664
Red Hat Security Advisory: bind security update
bind: bind9: Many records in the additional section cause CPU exhaustion
[ "cpe:/a:redhat:rhel_e4s:9.0::appstream" ]
null
7.5
null
null
RHSA-2011:0930
Red Hat Security Advisory: NetworkManager security update
NetworkManager: Did not honour PolicyKit auth_admin action element by creation of Ad-Hoc wireless networks
[ "cpe:/o:redhat:enterprise_linux:6::server" ]
null
null
null
null
RHSA-2018:0377
Red Hat Security Advisory: quagga security update
quagga: Double free vulnerability in bgpd when processing certain forms of UPDATE message allowing to crash or potentially execute arbitrary code
[ "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
8.1
null
RHSA-2018:1637
Red Hat Security Advisory: kernel security update
hw: cpu: speculative store bypass
[ "cpe:/o:redhat:rhel_aus:7.2::server", "cpe:/o:redhat:rhel_e4s:7.2::server", "cpe:/o:redhat:rhel_tus:7.2::server" ]
null
null
5.6
null
RHSA-2009:0018
Red Hat Security Advisory: xterm security update
xterm: arbitrary command injection
[ "cpe:/o:redhat:enterprise_linux:3::as", "cpe:/o:redhat:enterprise_linux:3::desktop", "cpe:/o:redhat:enterprise_linux:3::es", "cpe:/o:redhat:enterprise_linux:3::ws", "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws", "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
RHSA-2015:1907
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 6.4.4 jboss-ec2-eap update
AS/WildFly: missing X-Frame-Options header leading to clickjacking EAP: CSRF vulnerability in EAP & WildFly Web Console OOME from EAP 6 http management console
[ "cpe:/a:redhat:jboss_enterprise_application_platform:6::el6" ]
null
null
null
null
RHEA-2018:2624
Red Hat Enhancement Advisory: VDSM bug fix and enhancement update 4.2
vdsm: calls to qemu-img are not protected by prlimit/ulimit
[ "cpe:/o:redhat:enterprise_linux:7::hypervisor" ]
null
null
6.5
null
RHSA-2009:0377
Red Hat Security Advisory: java-1.6.0-openjdk security update
Untrusted applet causes DoS by filling up disk space LittleCms memory leak LittleCms integer overflow LittleCms lack of upper-bounds check on sizes lcms: Null pointer dereference (DoS) by handling transformations of monochrome profiles OpenJDK remote LDAP Denial-Of-Service (6717680) OpenJDK LDAP client remote code execution (6737315) OpenJDK Pack200 Buffer overflow vulnerability (6792554) OpenJDK Pack200 Buffer overflow vulnerability (6792554) OpenJDK: PNG and GIF processing buffer overflow vulnerabilities (6804996, 6804997) OpenJDK GIF processing buffer overflow vulnerability (6804998) OpenJDK JAX-WS service endpoint remote Denial-of-Service (6630639) OpenJDK code generation vulnerability (6636360)
[ "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
RHSA-2021:2475
Red Hat Security Advisory: Red Hat Process Automation Manager 7.11.0 security update
xmlgraphics-commons: SSRF due to improper input validation by the XMPParser jackson-databind: FasterXML DOMDeserializer insecure entity expansion is vulnerable to XML external entity (XXE) XStream: Server-Side Forgery Request vulnerability can be activated when unmarshalling XStream: arbitrary file deletion on the local host when unmarshalling XStream: allow a remote attacker to cause DoS only by manipulating the processed input stream XStream: SSRF via crafted input stream XStream: arbitrary file deletion on the local host via crafted input stream XStream: Unsafe deserizaliation of javax.sql.rowset.BaseRowSet XStream: Unsafe deserizaliation of com.sun.corba.se.impl.activation.ServerTableEntry XStream: Unsafe deserizaliation of sun.swing.SwingLazyValue XStream: Unsafe deserizaliation of com.sun.tools.javac.processing.JavacProcessingEnvironment NameProcessIterator XStream: ReDoS vulnerability XStream: SSRF can be activated unmarshalling with XStream to access data streams from an arbitrary URL referencing a resource in an intranet or the local host XStream: Unsafe deserizaliation of com.sun.org.apache.bcel.internal.util.ClassLoader XStream: allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream
[ "cpe:/a:redhat:jboss_enterprise_bpms_platform:7.11" ]
null
8
null
null
RHSA-2015:0857
Red Hat Security Advisory: java-1.7.0-oracle security update
jar: directory traversal vulnerability JDK: unspecified vulnerability fixed in 6u95, 7u79 and 8u45 (Deployment) JDK: unspecified vulnerability fixed in 5.0u85, 6u95, 7u79 and 8u45 (2D) OpenJDK: incorrect handling of phantom references (Hotspot, 8071931) ICU: layout engine glyphStorage off-by-one (OpenJDK 2D, 8067699) OpenJDK: incorrect permissions check in resource loading (Beans, 8068320) OpenJDK: insufficient hardening of RSA-CRT implementation (JCE, 8071726) OpenJDK: jar directory traversal issues (Tools, 8064601) JDK: unspecified vulnerability fixed in 7u79 and 8u45 (JavaFX) OpenJDK: certificate options parsing uncaught exception (JSSE, 8068720) JDK: unspecified vulnerability fixed in 5.0u85, 6u95, 7u79 and 8u45 (2D) JDK: unspecified vulnerability fixed in 7u79 and 8u45 (JavaFX)
[ "cpe:/a:redhat:rhel_extras_oracle_java:5", "cpe:/a:redhat:rhel_extras_oracle_java:6", "cpe:/a:redhat:rhel_extras_oracle_java:7" ]
null
null
null
null
RHSA-2025:3050
Red Hat Security Advisory: postgresql:12 security update
postgresql: PostgreSQL quoting APIs miss neutralizing quoting syntax in text that fails encoding validation
[ "cpe:/a:redhat:rhel_eus:8.8::appstream" ]
null
8.1
null
null
RHSA-2023:1915
Red Hat Security Advisory: emacs security update
emacs: command injection vulnerability in org-mode
[ "cpe:/a:redhat:rhel_aus:8.2::appstream", "cpe:/a:redhat:rhel_e4s:8.2::appstream", "cpe:/a:redhat:rhel_tus:8.2::appstream", "cpe:/o:redhat:rhel_aus:8.2::baseos", "cpe:/o:redhat:rhel_e4s:8.2::baseos", "cpe:/o:redhat:rhel_tus:8.2::baseos" ]
null
7.8
null
null
RHSA-2024:0792
Red Hat Security Advisory: Red Hat Integration Camel for Spring Boot 3.20.5 release and security update
json-path: stack-based buffer overflow in Criteria.parse method
[ "cpe:/a:redhat:camel_spring_boot:3.20.5" ]
null
5.3
null
null
RHSA-2024:4867
Red Hat Security Advisory: Release of openshift-serverless-clients kn 1.33.1 security update and bug fixes
golang: archive/zip: Incorrect handling of certain ZIP files
[ "cpe:/a:redhat:serverless:1.0::el8" ]
null
7.5
null
null
RHSA-2023:5456
Red Hat Security Advisory: python3.11 security update
python: TLS handshake bypass
[ "cpe:/a:redhat:enterprise_linux:9::appstream", "cpe:/a:redhat:enterprise_linux:9::crb" ]
null
8.6
null
null
RHSA-2013:1043
Red Hat Security Advisory: richfaces security update
RichFaces: Remote code execution due to insecure deserialization
[ "cpe:/a:redhat:jboss_enterprise_web_platform:5::el4", "cpe:/a:redhat:jboss_enterprise_web_platform:5::el5", "cpe:/a:redhat:jboss_enterprise_web_platform:5::el6" ]
null
null
null
null
RHSA-2021:2208
Red Hat Security Advisory: firefox security update
Mozilla: Memory safety bugs fixed in Firefox 89 and Firefox ESR 78.11
[ "cpe:/a:redhat:rhel_eus:8.2::appstream" ]
null
8.8
null
null
RHSA-2022:7624
Red Hat Security Advisory: php:8.0 security, bug fix, and enhancement update
php: Use after free due to php_filter_float() failing for ints php: Uninitialized array in pg_query_params() leading to RCE
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
7
null
null