id
stringlengths 13
15
| title
stringlengths 29
176
| description
stringlengths 8
32.1k
| cpes
sequencelengths 0
20
| cvss_v4_0
null | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
null |
---|---|---|---|---|---|---|---|
RHSA-2024:4619 | Red Hat Security Advisory: libndp security update | libndp: buffer overflow in route information length field | [
"cpe:/o:redhat:rhel_e4s:9.0::baseos"
] | null | 8.1 | null | null |
RHSA-2002:161 | Red Hat Security Advisory: openssl security update | security flaw | [
"cpe:/o:redhat:enterprise_linux:2.1::as",
"cpe:/o:redhat:enterprise_linux:2.1::aw"
] | null | null | null | null |
RHSA-2023:3525 | Red Hat Security Advisory: python-flask security update | flask: Possible disclosure of permanent session cookie due to missing Vary: Cookie header | [
"cpe:/a:redhat:rhel_extras_other:7"
] | null | 7.5 | null | null |
RHSA-2022:7273 | Red Hat Security Advisory: Red Hat JBoss Web Server 5.7.0 release and security update | cxf: OAuth 2 authorization service vulnerable to DDos attacks CXF: Denial of service vulnerability in parsing JSON via JsonMapObjectReaderWriter Tomcat: Information disclosure tomcat: local privilege escalation vulnerability | [
"cpe:/a:redhat:jboss_enterprise_web_server:5.7"
] | null | 7 | null | null |
RHSA-2024:0116 | Red Hat Security Advisory: python-urllib3 security update | python-urllib3: Cookie request header isn't stripped during cross-origin redirects urllib3: Request body not stripped after redirect from 303 status changes request method to GET | [
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 4.2 | null | null |
RHSA-2017:1868 | Red Hat Security Advisory: python security and bug fix update | python: failure to validate certificates in the HTTP client with TLS (PEP 476) | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 4.7 | null |
RHSA-2018:0047 | Red Hat Security Advisory: redhat-virtualization-host security update | An update for redhat-virtualization-host is now available for RHEV 4.X, RHEV-H, and Agents for Red Hat Enterprise Linux 7.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. | [
"cpe:/o:redhat:enterprise_linux:7::hypervisor"
] | null | null | null | null |
RHSA-2019:1947 | Red Hat Security Advisory: vim security update | vim/neovim: ': source!' command allows arbitrary command execution via modelines | [
"cpe:/o:redhat:rhel_eus:7.4::computenode",
"cpe:/o:redhat:rhel_eus:7.4::server"
] | null | 5.3 | null | null |
RHSA-2017:1485 | Red Hat Security Advisory: kernel security update | kernel: heap/stack gap jumping via unbounded stack allocations kernel: Incorrectly mapped contents of PIE executable | [
"cpe:/o:redhat:rhel_eus:7.2::computenode",
"cpe:/o:redhat:rhel_eus:7.2::server"
] | null | null | 2.9 | null |
RHSA-2021:2715 | Red Hat Security Advisory: kernel-rt security and bug fix update | kernel: race condition for removal of the HCI controller kernel: size_t-to-int conversion vulnerability in the filesystem layer | [
"cpe:/a:redhat:enterprise_linux:8::nfv",
"cpe:/a:redhat:enterprise_linux:8::realtime"
] | null | 6.7 | null | null |
RHSA-2020:0575 | Red Hat Security Advisory: systemd security and bug fix update | systemd: use-after-free when asynchronous polkit queries are performed | [
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 7.8 | null | null |
RHSA-2001:126 | Red Hat Security Advisory: : Updated apache packages available | security flaw security flaw | [
"cpe:/o:redhat:linux:6.2",
"cpe:/o:redhat:linux:7.0",
"cpe:/o:redhat:linux:7.1",
"cpe:/o:redhat:linux:7.2"
] | null | null | null | null |
RHBA-2021:4684 | Red Hat Bug Fix Advisory: virt:av bug fix and enhancement update | libvirt: segmentation fault during VM shutdown can lead to vdsm hang | [
"cpe:/a:redhat:advanced_virtualization:8.5::el8"
] | null | 5.3 | null | null |
RHSA-2022:6753 | Red Hat Security Advisory: httpd24-httpd security and bug fix update | httpd: Request splitting via HTTP/2 method injection and mod_proxy httpd: NULL pointer dereference via malformed requests httpd: mod_proxy_uwsgi: out-of-bounds read via a crafted request uri-path httpd: Out-of-bounds write in ap_escape_quotes() via malicious input httpd: possible NULL dereference or SSRF in forward proxy configurations httpd: mod_lua: Use of uninitialized value of in r:parsebody httpd: core: Possible buffer overflow with very large or unlimited LimitXMLRequestBody httpd: mod_sed: Read/write beyond bounds httpd: mod_proxy_ajp: Possible request smuggling httpd: Out-of-bounds read via ap_rwrite() httpd: Out-of-bounds read in ap_strcmp_match() httpd: mod_lua: DoS in r:parsebody httpd: mod_sed: DoS vulnerability httpd: mod_lua: Information disclosure with websockets httpd: mod_proxy: X-Forwarded-For dropped by hop-by-hop mechanism | [
"cpe:/a:redhat:rhel_software_collections:3::el7"
] | null | 7.3 | null | null |
RHSA-2019:3338 | Red Hat Security Advisory: edk2 security, bug fix, and enhancement update | edk2: Stack buffer overflow with corrupted BMP edk2: Buffer overflows in PartitionDxe and UdfDxe with long file names and invalid UDF media edk2: stack overflow in XHCI causing denial of service | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | null | 5.9 | null |
RHSA-2011:1801 | Red Hat Security Advisory: qemu-kvm security update | qemu: ccid: buffer overflow in handling of VSC_ATR message | [
"cpe:/o:redhat:enterprise_linux:6::server"
] | null | null | null | null |
RHSA-2019:3172 | Red Hat Security Advisory: Red Hat Satellite 6 security, bug fix, and enhancement update | python-werkzeug: Cross-site scripting in render_full function in debug/tbtools.py python-jinja2: Sandbox escape due to information disclosure via str.format rubygem-rack: Buffer size in multipart parser allows for denial of service dom4j: XML Injection in Class: Element. Methods: addElement, addAttribute which can impact the integrity of XML documents foreman: Recover of plaintext password or token for the compute resources foreman: authorization bypasses in foreman-tasks leading to information disclosure python-jinja2: str.format_map allows sandbox escape python-twisted: Improper neutralization of CRLF characters in URIs and HTTP methods katello: registry credentials are captured in plain text during repository discovery | [
"cpe:/a:redhat:satellite:6.6::el7",
"cpe:/a:redhat:satellite_capsule:6.6::el7"
] | null | null | 4.1 | null |
RHSA-2021:1479 | Red Hat Security Advisory: bind security update | bind: An assertion check can fail while answering queries for DNAME records that require the DNAME to be processed to resolve itself | [
"cpe:/o:redhat:rhel_aus:7.4::server",
"cpe:/o:redhat:rhel_e4s:7.4::server",
"cpe:/o:redhat:rhel_tus:7.4::server"
] | null | 7.5 | null | null |
RHSA-2002:051 | Red Hat Security Advisory: : : : New Squid packages available | security flaw security flaw security flaw security flaw | [
"cpe:/o:redhat:linux:6.2",
"cpe:/o:redhat:linux:7.0",
"cpe:/o:redhat:linux:7.1",
"cpe:/o:redhat:linux:7.2",
"cpe:/o:redhat:linux:7.3"
] | null | null | null | null |
RHSA-2013:0657 | Red Hat Security Advisory: openstack-nova security, bug fix, and enhancement update | bindings: Internal entity expansion in Python XML libraries inflicts DoS vulnerabilities bindings: External entity expansion in Python XML libraries inflicts potential security flaws and DoS vulnerabilities | [
"cpe:/a:redhat:openstack:2::el6"
] | null | null | null | null |
RHSA-2024:6356 | Red Hat Security Advisory: bubblewrap and flatpak security update | flatpak: Access to files outside sandbox for apps using persistent= (--persist) | [
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::crb",
"cpe:/o:redhat:enterprise_linux:9::baseos"
] | null | 7.4 | null | null |
RHSA-2002:184 | Red Hat Security Advisory: openssl security update for Stronghold | security flaw | [
"cpe:/a:redhat:stronghold:3"
] | null | null | null | null |
RHSA-2021:0240 | Red Hat Security Advisory: dnsmasq security update | dnsmasq: loose address/port check in reply_query() makes forging replies easier for an off-path attacker dnsmasq: loose query name check in reply_query() makes forging replies easier for an off-path attacker dnsmasq: multiple queries forwarded for the same name makes forging replies easier for an off-path attacker | [
"cpe:/o:redhat:rhel_aus:7.2::server"
] | null | 4 | null | null |
RHSA-2022:8556 | Red Hat Security Advisory: thunderbird security update | Mozilla: Service Workers might have learned size of cross-origin media files Mozilla: Fullscreen notification bypass Mozilla: Use-after-free in InputStream implementation Mozilla: Use-after-free of a JavaScript Realm Mozilla: Fullscreen notification bypass via windowName Mozilla: Use-after-free in Garbage Collection Mozilla: ServiceWorker-intercepted requests bypassed SameSite cookie policy Mozilla: Cross-Site Tracing was possible via non-standard override headers Mozilla: Symlinks may resolve to partially uninitialized buffers Mozilla: Keystroke Side-Channel Leakage Mozilla: Custom mouse cursor could have been drawn over browser UI Mozilla: Iframe contents could be rendered outside the iframe Mozilla: Memory safety bugs fixed in Firefox 107 and Firefox ESR 102.5 | [
"cpe:/a:redhat:rhel_e4s:8.1::appstream"
] | null | 8.8 | 6.1 | null |
RHSA-2019:1296 | Red Hat Security Advisory: Red Hat JBoss Core Services Apache HTTP Server 2.4.29 SP2 security update | ROHNP: Key Extraction Side Channel in Multiple Crypto Libraries openssl: Malicious server can send large prime to client during DH(E) TLS handshake causing the client to hang httpd: privilege escalation from modules scripts | [
"cpe:/a:redhat:jboss_core_services:1"
] | null | null | 8.8 | null |
RHSA-2022:1056 | Red Hat Security Advisory: Release of OpenShift Serverless Client kn 1.21.0 | golang: net/http: limit growth of header canonicalization cache golang: syscall: don't close fd 0 on ForkExec error | [
"cpe:/a:redhat:serverless:1.0::el8"
] | null | 4.8 | null | null |
RHSA-2002:197 | Red Hat Security Advisory: : Updated glibc packages fix vulnerabilities in resolver | security flaw | [
"cpe:/o:redhat:linux:6.2",
"cpe:/o:redhat:linux:7.0",
"cpe:/o:redhat:linux:7.1",
"cpe:/o:redhat:linux:7.2",
"cpe:/o:redhat:linux:7.3"
] | null | null | null | null |
RHSA-2021:4409 | Red Hat Security Advisory: libgcrypt security and bug fix update | libgcrypt: mishandles ElGamal encryption because it lacks exponent blinding to address a side-channel attack against mpi_powm | [
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 7.5 | null | null |
RHSA-2020:2669 | Red Hat Security Advisory: kpatch-patch security update | kernel: use-after-free in block/bfq-iosched.c related to bfq_idle_slice_timer_body | [
"cpe:/o:redhat:rhel_eus:8.1::baseos"
] | null | 7 | null | null |
RHSA-2019:4098 | Red Hat Security Advisory: OpenShift Container Platform 4.2 ose-cluster-kube-controller-manager-operator-container security update | library-go: Secret data written to static pod logs when operator set at Debug level or higher | [
"cpe:/a:redhat:openshift:4.2::el7"
] | null | null | 5.3 | null |
RHSA-2024:6274 | Red Hat Security Advisory: Red Hat OpenShift distributed tracing 3.3.0 operator/operand containers | Red Hat OpenShift distributed tracing 3.3.0 | [
"cpe:/a:redhat:openshift_distributed_tracing:3.3::el8"
] | null | null | null | null |
RHSA-2021:0531 | Red Hat Security Advisory: container-tools:rhel8 security, bug fix, and enhancement update | podman: environment variables leak between containers when started via Varlink or Docker-compatible REST API | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 5.3 | null | null |
RHSA-2012:0092 | Red Hat Security Advisory: php53 security update | php: remote code exec flaw introduced in the CVE-2011-4885 hashdos fix | [
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2019:0375 | Red Hat Security Advisory: flatpak security update | flatpak: potential /proc based sandbox escape | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 7.7 | null |
RHSA-2020:1518 | Red Hat Security Advisory: git security update | git: Crafted URL containing new lines can cause credential leak | [
"cpe:/a:redhat:rhel_e4s:8.0::appstream"
] | null | 7.5 | null | null |
RHSA-2024:8425 | Red Hat Security Advisory: OpenShift Container Platform 4.15.37 bug fix and security update | golang: net/http, x/net/http2: unlimited number of CONTINUATION frames causes DoS go-git: Maliciously crafted Git server replies can lead to path traversal and RCE on go-git clients containers/image: digest type does not guarantee valid type net/http: Denial of service due to improper 100-continue handling in net/http cloudevents/sdk-go: usage of WithRoundTripper to create a Client leaks credentials jose-go: improper handling of highly compressed data go/parser: golang: Calling any of the Parse functions containing deeply nested literals can cause a panic/stack exhaustion encoding/gob: golang: Calling Decoder.Decode on a message which contains deeply nested structures can cause a panic due to stack exhaustion go/build/constraint: golang: Calling Parse on a "// +build" build tag line with deeply nested expressions can cause a panic due to stack exhaustion | [
"cpe:/a:redhat:openshift:4.15::el8",
"cpe:/a:redhat:openshift:4.15::el9"
] | null | 5.9 | null | null |
RHSA-2021:2237 | Red Hat Security Advisory: polkit security update | polkit: local privilege escalation using polkit_system_bus_name_get_creds_sync() | [
"cpe:/o:redhat:rhel_eus:8.2::baseos"
] | null | 7.8 | null | null |
RHSA-2023:7509 | Red Hat Security Advisory: firefox security update | Mozilla: Out-of-bound memory access in WebGL2 blitFramebuffer Mozilla: Use-after-free in MessagePort::Entangled Mozilla: Clickjacking permission prompts using the fullscreen transition Mozilla: Use-after-free in ReadableByteStreamQueueEntry::Buffer Mozilla: Using Selection API would copy contents into X11 primary selection. Mozilla: Incorrect parsing of relative URLs starting with "///" Mozilla: Memory safety bugs fixed in Firefox 120, Firefox ESR 115.5, and Thunderbird 115.5 | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 8.8 | null | null |
RHSA-2024:9818 | Red Hat Security Advisory: tigervnc security update | xorg-x11-server: tigervnc: heap-based buffer overflow privilege escalation vulnerability | [
"cpe:/a:redhat:rhel_aus:8.2::appstream"
] | null | 7.8 | null | null |
RHSA-2022:8549 | Red Hat Security Advisory: firefox security update | expat: use-after free caused by overeager destruction of a shared DTD in XML_ExternalEntityParserCreate Mozilla: Service Workers might have learned size of cross-origin media files Mozilla: Fullscreen notification bypass Mozilla: Use-after-free in InputStream implementation Mozilla: Use-after-free of a JavaScript Realm Mozilla: Fullscreen notification bypass via windowName Mozilla: Use-after-free in Garbage Collection Mozilla: ServiceWorker-intercepted requests bypassed SameSite cookie policy Mozilla: Cross-Site Tracing was possible via non-standard override headers Mozilla: Symlinks may resolve to partially uninitialized buffers Mozilla: Keystroke Side-Channel Leakage Mozilla: Custom mouse cursor could have been drawn over browser UI Mozilla: Iframe contents could be rendered outside the iframe Mozilla: Memory safety bugs fixed in Firefox 107 and Firefox ESR 102.5 | [
"cpe:/a:redhat:rhel_eus:8.4::appstream"
] | null | 8.8 | 6.1 | null |
RHSA-2021:1478 | Red Hat Security Advisory: bind security update | bind: An assertion check can fail while answering queries for DNAME records that require the DNAME to be processed to resolve itself | [
"cpe:/o:redhat:rhel_eus:7.6::computenode",
"cpe:/o:redhat:rhel_eus:7.6::server"
] | null | 7.5 | null | null |
RHSA-2023:3185 | Red Hat Security Advisory: Red Hat AMQ Broker 7.10.3 release and security update | keycloak: path traversal via double URL encoding springframework: DoS via data binding to multipartFile or servlet part springframework: DoS with STOMP over WebSocket RESTEasy: creation of insecure temp files springframework: Security Bypass With Un-Prefixed Double Wildcard Pattern springframework: Spring Expression DoS Vulnerability | [
"cpe:/a:redhat:amq_broker:7"
] | null | 5.3 | null | null |
RHSA-2013:0207 | Red Hat Security Advisory: JBoss Enterprise Web Platform 5.2.0 security update | Installer: Generated auto-install xml is world readable | [
"cpe:/a:redhat:jboss_enterprise_web_platform:5.2"
] | null | null | null | null |
RHSA-2023:6786 | Red Hat Security Advisory: Fence Agents Remediation Operator 0.2.1 security update | golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487) HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack) | [
"cpe:/a:redhat:workload_availability_fence_agents_remediation:0.2::el8"
] | null | 7.5 | null | null |
RHSA-2014:0949 | Red Hat Security Advisory: kernel security update | kernel: x86_64: ptrace: sysret to non-canonical address | [
"cpe:/o:redhat:rhel_mission_critical:6.2::server"
] | null | null | null | null |
RHSA-2013:0992 | Red Hat Security Advisory: python-keystoneclient security, bug fix, and enhancement update | python-keystoneclient: middleware memcache encryption and signing bypass python-keystoneclient: middleware memcache encryption and signing bypass | [
"cpe:/a:redhat:openstack:3::el6"
] | null | null | null | null |
RHSA-2022:1083 | Red Hat Security Advisory: Red Hat Advanced Cluster Management 2.3.8 security and container updates | cached-path-relative: Prototype Pollution via the cache variable nanoid: Information disclosure via valueOf() function nodejs-shelljs: improper privilege management follow-redirects: Exposure of Private Personal Information to an Unauthorized Actor node-fetch: exposure of sensitive information to an unauthorized actor follow-redirects: Exposure of Sensitive Information via Authorization Header leak | [
"cpe:/a:redhat:acm:2.3::el7",
"cpe:/a:redhat:acm:2.3::el8"
] | null | 5.9 | null | null |
RHSA-2021:2422 | Red Hat Security Advisory: gupnp security update | gupnp: allows DNS rebinding which could result in tricking browser into triggering actions against local UPnP services | [
"cpe:/a:redhat:rhel_eus:8.2::appstream",
"cpe:/a:redhat:rhel_eus:8.2::crb"
] | null | 8.3 | null | null |
RHSA-2024:1250 | Red Hat Security Advisory: kernel security and bug fix update | kernel: memcg does not limit the number of POSIX file locks allowing memory exhaustion kernel: nfp: use-after-free in area_cache_get() kernel: vmwgfx: NULL pointer dereference in vmw_cmd_dx_define_query hw: Intel: Gather Data Sampling (GDS) side channel vulnerability kernel: use-after-free in smb2_is_status_io_timeout() kernel: bpf: Incorrect verifier pruning leads to unsafe code paths being incorrectly marked as safe kernel: NULL pointer dereference in can_rcv_filter kernel: Slab-out-of-bound read in compare_netdev_and_ip kernel: out-of-bounds access in relay_file_read kernel: UAF in nftables when nft_set_lookup_global triggered after handling named and anonymous sets in batch requests kernel: net/sched: cls_u32 component reference counter leak if tcf_change_indev() fails kernel: vmxnet3: NULL pointer dereference in vmxnet3_rq_cleanup() kernel: use after free in unix_stream_sendpage kernel: A heap out-of-bounds write when function perf_read_group is called and sibling_list is smaller than its child's sibling_list kernel: GSM multiplexing race condition leads to privilege escalation kernel: use-after-free in IPv4 IGMP kernel: refcount leak in ctnetlink_create_conntrack() kernel: fbcon: out-of-sync arrays in fbcon_mode_deleted due to wrong con2fb_map assignment kernel: use-after-free in l2cap_sock_release in net/bluetooth/l2cap_sock.c kernel: ktls overwrites readonly memory pages when using function splice with a ktls socket as destination kernel: sched/membarrier: reduce the ability to hammer on sys_membarrier | [
"cpe:/a:redhat:rhel_eus:9.0::appstream",
"cpe:/a:redhat:rhel_eus:9.0::crb",
"cpe:/o:redhat:rhel_eus:9.0::baseos"
] | null | 4.7 | null | null |
RHSA-2003:081 | Red Hat Security Advisory: zlib security update | security flaw | [
"cpe:/o:redhat:enterprise_linux:2.1::as",
"cpe:/o:redhat:enterprise_linux:2.1::aw",
"cpe:/o:redhat:enterprise_linux:2.1::es",
"cpe:/o:redhat:enterprise_linux:2.1::ws"
] | null | null | null | null |
RHSA-2023:7166 | Red Hat Security Advisory: tpm2-tss security and enhancement update | tpm2-tss: Buffer Overlow in TSS2_RC_Decode | [
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 6.4 | null | null |
RHSA-2013:0683 | Red Hat Security Advisory: axis security update | axis: missing connection hostname check against X.509 certificate name | [
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2019:0237 | Red Hat Security Advisory: etcd security, bug fix, and enhancement update | An update for etcd is now available for Red Hat Enterprise Linux 7 Extras.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
[Updated 5th March 2019]
On 5th February 2019, the updated etcd packages previously included in this erratum were removed. For further details about this removal, refer to the Red Hat Knowledgebase article 3938261 linked in the References section. | [
"cpe:/a:redhat:rhel_extras_other:7"
] | null | null | null | null |
RHSA-2015:1706 | Red Hat Security Advisory: bind security update | bind: malformed DNSSEC key failed assertion denial of service | [
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2004:023 | Red Hat Security Advisory: net-snmp security update | security flaw | [
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws"
] | null | null | null | null |
RHSA-2020:5333 | Red Hat Security Advisory: go-toolset-1.14-golang security update | golang: math/big: panic during recursive division of very large numbers golang: malicious symbol names can lead to code execution at build time golang: improper validation of cgo flags can lead to code execution at build time | [
"cpe:/a:redhat:devtools:2020"
] | null | 7.5 | null | null |
RHSA-2025:1262 | Red Hat Security Advisory: kernel security update | kernel: media: uvcvideo: Skip parsing frames of type UVC_VS_UNDEFINED in uvc_parse_format | [
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::crb",
"cpe:/a:redhat:enterprise_linux:9::nfv",
"cpe:/a:redhat:enterprise_linux:9::realtime",
"cpe:/o:redhat:enterprise_linux:9::baseos"
] | null | 7.3 | null | null |
RHSA-2011:1083 | Red Hat Security Advisory: fuse security update | fuse: unprivileged user can unmount arbitrary locations via symlink attack fuse: unprivileged user can unmount arbitrary locations via symlink attack fuse: unprivileged user can unmount arbitrary locations via symlink attack fuse: unprivileged user can unmount arbitrary locations via symlink attack | [
"cpe:/o:redhat:enterprise_linux:6::server"
] | null | null | null | null |
RHSA-2023:6199 | Red Hat Security Advisory: firefox security update | Mozilla: Queued up rendering could have allowed websites to clickjack Mozilla: Large WebGL draw could have led to a crash Mozilla: WebExtensions could open arbitrary URLs Mozilla: Improper object tracking during GC in the JavaScript engine could have led to a crash. Mozilla: Memory safety bugs fixed in Firefox 119, Firefox ESR 115.4, and Thunderbird 115.4 Mozilla: Address bar spoofing via bidirectional characters libvpx: crash related to VP9 encoding in libvpx | [
"cpe:/a:redhat:rhel_eus:9.0::appstream"
] | null | 7.5 | null | null |
RHSA-2014:0477 | Red Hat Security Advisory: Oracle Java SE - Notification of Removal from Supplementary Channel | Oracle Java SE packages will be moved from the Red Hat Enterprise Linux 5
and 6 Supplementary Red Hat Network (RHN) channels to the Oracle Java for
Red Hat Enterprise Linux 5 and 6 RHN channels. | [] | null | null | null | null |
RHSA-2014:1398 | Red Hat Security Advisory: Apache POI security update | apache-poi: XML eXternal Entity (XXE) flaw apache-poi: entity expansion (billion laughs) flaw | [
"cpe:/a:redhat:jboss_data_virtualization:6.0"
] | null | null | null | null |
RHSA-2025:0210 | Red Hat Security Advisory: dpdk security update | dpdk: Denial Of Service from malicious guest on hypervisors using DPDK Vhost library | [
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | null | 7.4 | null |
RHSA-2024:4741 | Red Hat Security Advisory: linux-firmware security update | kernel: Reserved fields in guest message responses may not be zero initialized | [
"cpe:/o:redhat:rhel_eus:8.8::baseos"
] | null | 4.4 | null | null |
RHSA-2024:4824 | Red Hat Security Advisory: nodejs:18 security update | nodejs: CONTINUATION frames DoS nghttp2: CONTINUATION frames DoS | [
"cpe:/a:redhat:rhel_eus:8.8::appstream"
] | null | 5.3 | null | null |
RHSA-2020:1167 | Red Hat Security Advisory: nbdkit security and bug fix update | nbdkit: denial of service due to premature opening of back-end connection | [
"cpe:/o:redhat:enterprise_linux:7::server"
] | null | null | 3.7 | null |
RHSA-2024:9678 | Red Hat Security Advisory: squid security update | squid: Denial of Service processing ESI response content | [
"cpe:/a:redhat:rhel_eus:9.4::appstream"
] | null | 7.5 | null | null |
RHSA-2020:0475 | Red Hat Security Advisory: Red Hat Quay v3.2.1 security update | nodejs-yarn: Install functionality can be abused to generate arbitrary symlinks | [
"cpe:/a:redhat:quay:3::el7"
] | null | 7.8 | null | null |
RHSA-2024:2979 | Red Hat Security Advisory: poppler security update | poppler: NULL pointer dereference in `FoFiType1C::convertToType1` | [
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb"
] | null | 5.5 | null | null |
RHSA-2012:1549 | Red Hat Security Advisory: bind security update | bind: DoS on servers using DNS64 | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2003:052 | Red Hat Security Advisory: krb5 security update | security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw | [
"cpe:/o:redhat:enterprise_linux:2.1::as",
"cpe:/o:redhat:enterprise_linux:2.1::aw",
"cpe:/o:redhat:enterprise_linux:2.1::es",
"cpe:/o:redhat:enterprise_linux:2.1::ws"
] | null | null | null | null |
RHSA-2006:0159 | Red Hat Security Advisory: httpd security update | security flaw httpd cross-site scripting flaw in mod_imap security flaw | [
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws",
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2017:3442 | Red Hat Security Advisory: rh-mysql57-mysql security update | mysql: Server: Pluggable Auth unspecified vulnerability (CPU Oct 2017) mysql: Server: Replication unspecified vulnerability (CPU Oct 2017) mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2017) mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2017) mysql: Server: Replication unspecified vulnerability (CPU Oct 2017) mysql: Server: FTS unspecified vulnerability (CPU Oct 2017) mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2017) mysql: Server: Performance Schema unspecified vulnerability (CPU Oct 2017) mysql: Server: Stored Procedure unspecified vulnerability (CPU Oct 2017) mysql: Server: InnoDB unspecified vulnerability (CPU Oct 2017) mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2017) mysql: Server: DML unspecified vulnerability (CPU Oct 2017) mysql: Server: FTS unspecified vulnerability (CPU Oct 2017) mysql: Group Replication GCS unspecified vulnerability (CPU Oct 2017) mysql: Server: Memcached unspecified vulnerability (CPU Oct 2017) mysql: Server: InnoDB unspecified vulnerability (CPU Oct 2017) mysql: Server: InnoDB unspecified vulnerability (CPU Oct 2017) mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2017) mysql: Client programs unspecified vulnerability (CPU Oct 2017) mysql: Server: DDL unspecified vulnerability (CPU Oct 2017) mysql: Server: Partition unspecified vulnerability (CPU Jan 2018) mysql: Server : Partition unspecified vulnerability (CPU Jan 2018) | [
"cpe:/a:redhat:rhel_software_collections:3::el6",
"cpe:/a:redhat:rhel_software_collections:3::el7"
] | null | null | 4.9 | null |
RHSA-2021:3946 | Red Hat Security Advisory: redis:5 security update | redis: Lua scripts can overflow the heap-based Lua stack redis: Integer overflow issue with Streams redis: Integer overflow bug in the ziplist data structure redis: Denial of service via Redis Standard Protocol (RESP) request redis: Integer overflow issue with intsets redis: Integer overflow issue with strings | [
"cpe:/a:redhat:rhel_eus:8.1::appstream"
] | null | 7.5 | null | null |
RHSA-2023:5189 | Red Hat Security Advisory: libwebp security update | libwebp: Heap buffer overflow in WebP Codec libwebp: out-of-bounds write with a specially crafted WebP lossless file | [
"cpe:/a:redhat:rhel_eus:8.6::appstream"
] | null | 0 | null | null |
RHSA-2010:0959 | Red Hat Security Advisory: JBoss Enterprise Application Platform 5.1.0 security and bug fix update | JBoss Remoting Denial-Of-Service | [
"cpe:/a:redhat:jboss_enterprise_application_platform:5::el4"
] | null | null | null | null |
RHSA-2017:0254 | Red Hat Security Advisory: spice security update | spice: Buffer overflow in main_channel_alloc_msg_rcv_buf when reading large messages spice: Remote DoS via crafted message | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 7.5 | null |
RHSA-2014:0454 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 6.2.2 security update | Xalan-Java: insufficient constraints in secure processing feature | [
"cpe:/a:redhat:jboss_enterprise_application_platform:6.2"
] | null | null | null | null |
RHSA-2024:4197 | Red Hat Security Advisory: httpd:2.4/httpd security update | httpd: HTTP response splitting | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 6.8 | null | null |
RHSA-2025:3837 | Red Hat Security Advisory: openssh security update | openssh: Machine-in-the-middle attack if VerifyHostKeyDNS is enabled | [
"cpe:/a:redhat:rhel_eus:9.4::appstream",
"cpe:/o:redhat:rhel_eus:9.4::baseos"
] | null | 6.8 | null | null |
RHSA-2022:0401 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.4.3 security update | undertow: client side invocation timeout raised when calling over HTTP2 7: Incomplete fix of CVE-2016-4978 in HornetQ library | [
"cpe:/a:redhat:jboss_enterprise_application_platform:7.4::el8"
] | null | 6.6 | null | null |
RHSA-2023:7511 | Red Hat Security Advisory: firefox security update | Mozilla: Out-of-bound memory access in WebGL2 blitFramebuffer Mozilla: Use-after-free in MessagePort::Entangled Mozilla: Clickjacking permission prompts using the fullscreen transition Mozilla: Use-after-free in ReadableByteStreamQueueEntry::Buffer Mozilla: Using Selection API would copy contents into X11 primary selection. Mozilla: Incorrect parsing of relative URLs starting with "///" Mozilla: Memory safety bugs fixed in Firefox 120, Firefox ESR 115.5, and Thunderbird 115.5 | [
"cpe:/a:redhat:rhel_eus:8.8::appstream"
] | null | 8.8 | null | null |
RHSA-2019:3202 | Red Hat Security Advisory: Ansible security and bug fix update | ansible: secrets disclosed on logs when no_log enabled ansible: Incomplete fix for CVE-2019-10206 ansible: sub parameters marked as no_log are not masked in certain failure scenarios | [
"cpe:/a:redhat:ansible_engine:2.7::el7"
] | null | 5 | 6.4 | null |
RHSA-2025:1664 | Red Hat Security Advisory: bind security update | bind: bind9: Many records in the additional section cause CPU exhaustion | [
"cpe:/a:redhat:rhel_e4s:9.0::appstream"
] | null | 7.5 | null | null |
RHSA-2011:0930 | Red Hat Security Advisory: NetworkManager security update | NetworkManager: Did not honour PolicyKit auth_admin action element by creation of Ad-Hoc wireless networks | [
"cpe:/o:redhat:enterprise_linux:6::server"
] | null | null | null | null |
RHSA-2018:0377 | Red Hat Security Advisory: quagga security update | quagga: Double free vulnerability in bgpd when processing certain forms of UPDATE message allowing to crash or potentially execute arbitrary code | [
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 8.1 | null |
RHSA-2018:1637 | Red Hat Security Advisory: kernel security update | hw: cpu: speculative store bypass | [
"cpe:/o:redhat:rhel_aus:7.2::server",
"cpe:/o:redhat:rhel_e4s:7.2::server",
"cpe:/o:redhat:rhel_tus:7.2::server"
] | null | null | 5.6 | null |
RHSA-2009:0018 | Red Hat Security Advisory: xterm security update | xterm: arbitrary command injection | [
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws",
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws",
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2015:1907 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 6.4.4 jboss-ec2-eap update | AS/WildFly: missing X-Frame-Options header leading to clickjacking EAP: CSRF vulnerability in EAP & WildFly Web Console OOME from EAP 6 http management console | [
"cpe:/a:redhat:jboss_enterprise_application_platform:6::el6"
] | null | null | null | null |
RHEA-2018:2624 | Red Hat Enhancement Advisory: VDSM bug fix and enhancement update 4.2 | vdsm: calls to qemu-img are not protected by prlimit/ulimit | [
"cpe:/o:redhat:enterprise_linux:7::hypervisor"
] | null | null | 6.5 | null |
RHSA-2009:0377 | Red Hat Security Advisory: java-1.6.0-openjdk security update | Untrusted applet causes DoS by filling up disk space LittleCms memory leak LittleCms integer overflow LittleCms lack of upper-bounds check on sizes lcms: Null pointer dereference (DoS) by handling transformations of monochrome profiles OpenJDK remote LDAP Denial-Of-Service (6717680) OpenJDK LDAP client remote code execution (6737315) OpenJDK Pack200 Buffer overflow vulnerability (6792554) OpenJDK Pack200 Buffer overflow vulnerability (6792554) OpenJDK: PNG and GIF processing buffer overflow vulnerabilities (6804996, 6804997) OpenJDK GIF processing buffer overflow vulnerability (6804998) OpenJDK JAX-WS service endpoint remote Denial-of-Service (6630639) OpenJDK code generation vulnerability (6636360) | [
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2021:2475 | Red Hat Security Advisory: Red Hat Process Automation Manager 7.11.0 security update | xmlgraphics-commons: SSRF due to improper input validation by the XMPParser jackson-databind: FasterXML DOMDeserializer insecure entity expansion is vulnerable to XML external entity (XXE) XStream: Server-Side Forgery Request vulnerability can be activated when unmarshalling XStream: arbitrary file deletion on the local host when unmarshalling XStream: allow a remote attacker to cause DoS only by manipulating the processed input stream XStream: SSRF via crafted input stream XStream: arbitrary file deletion on the local host via crafted input stream XStream: Unsafe deserizaliation of javax.sql.rowset.BaseRowSet XStream: Unsafe deserizaliation of com.sun.corba.se.impl.activation.ServerTableEntry XStream: Unsafe deserizaliation of sun.swing.SwingLazyValue XStream: Unsafe deserizaliation of com.sun.tools.javac.processing.JavacProcessingEnvironment NameProcessIterator XStream: ReDoS vulnerability XStream: SSRF can be activated unmarshalling with XStream to access data streams from an arbitrary URL referencing a resource in an intranet or the local host XStream: Unsafe deserizaliation of com.sun.org.apache.bcel.internal.util.ClassLoader XStream: allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream | [
"cpe:/a:redhat:jboss_enterprise_bpms_platform:7.11"
] | null | 8 | null | null |
RHSA-2015:0857 | Red Hat Security Advisory: java-1.7.0-oracle security update | jar: directory traversal vulnerability JDK: unspecified vulnerability fixed in 6u95, 7u79 and 8u45 (Deployment) JDK: unspecified vulnerability fixed in 5.0u85, 6u95, 7u79 and 8u45 (2D) OpenJDK: incorrect handling of phantom references (Hotspot, 8071931) ICU: layout engine glyphStorage off-by-one (OpenJDK 2D, 8067699) OpenJDK: incorrect permissions check in resource loading (Beans, 8068320) OpenJDK: insufficient hardening of RSA-CRT implementation (JCE, 8071726) OpenJDK: jar directory traversal issues (Tools, 8064601) JDK: unspecified vulnerability fixed in 7u79 and 8u45 (JavaFX) OpenJDK: certificate options parsing uncaught exception (JSSE, 8068720) JDK: unspecified vulnerability fixed in 5.0u85, 6u95, 7u79 and 8u45 (2D) JDK: unspecified vulnerability fixed in 7u79 and 8u45 (JavaFX) | [
"cpe:/a:redhat:rhel_extras_oracle_java:5",
"cpe:/a:redhat:rhel_extras_oracle_java:6",
"cpe:/a:redhat:rhel_extras_oracle_java:7"
] | null | null | null | null |
RHSA-2025:3050 | Red Hat Security Advisory: postgresql:12 security update | postgresql: PostgreSQL quoting APIs miss neutralizing quoting syntax in text that fails encoding validation | [
"cpe:/a:redhat:rhel_eus:8.8::appstream"
] | null | 8.1 | null | null |
RHSA-2023:1915 | Red Hat Security Advisory: emacs security update | emacs: command injection vulnerability in org-mode | [
"cpe:/a:redhat:rhel_aus:8.2::appstream",
"cpe:/a:redhat:rhel_e4s:8.2::appstream",
"cpe:/a:redhat:rhel_tus:8.2::appstream",
"cpe:/o:redhat:rhel_aus:8.2::baseos",
"cpe:/o:redhat:rhel_e4s:8.2::baseos",
"cpe:/o:redhat:rhel_tus:8.2::baseos"
] | null | 7.8 | null | null |
RHSA-2024:0792 | Red Hat Security Advisory: Red Hat Integration Camel for Spring Boot 3.20.5 release and security update | json-path: stack-based buffer overflow in Criteria.parse method | [
"cpe:/a:redhat:camel_spring_boot:3.20.5"
] | null | 5.3 | null | null |
RHSA-2024:4867 | Red Hat Security Advisory: Release of openshift-serverless-clients kn 1.33.1 security update and bug fixes | golang: archive/zip: Incorrect handling of certain ZIP files | [
"cpe:/a:redhat:serverless:1.0::el8"
] | null | 7.5 | null | null |
RHSA-2023:5456 | Red Hat Security Advisory: python3.11 security update | python: TLS handshake bypass | [
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::crb"
] | null | 8.6 | null | null |
RHSA-2013:1043 | Red Hat Security Advisory: richfaces security update | RichFaces: Remote code execution due to insecure deserialization | [
"cpe:/a:redhat:jboss_enterprise_web_platform:5::el4",
"cpe:/a:redhat:jboss_enterprise_web_platform:5::el5",
"cpe:/a:redhat:jboss_enterprise_web_platform:5::el6"
] | null | null | null | null |
RHSA-2021:2208 | Red Hat Security Advisory: firefox security update | Mozilla: Memory safety bugs fixed in Firefox 89 and Firefox ESR 78.11 | [
"cpe:/a:redhat:rhel_eus:8.2::appstream"
] | null | 8.8 | null | null |
RHSA-2022:7624 | Red Hat Security Advisory: php:8.0 security, bug fix, and enhancement update | php: Use after free due to php_filter_float() failing for ints php: Uninitialized array in pg_query_params() leading to RCE | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 7 | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.