id
stringlengths
13
15
title
stringlengths
29
176
description
stringlengths
8
32.1k
cpes
listlengths
0
20
cvss_v4_0
null
cvss_v3_1
float64
0
10
cvss_v3_0
float64
0
10
cvss_v2_0
null
RHBA-2023:6863
Red Hat Bug Fix Advisory: LVMS 4.14.z Bug Fix and Enhancement update
golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487) HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack)
[ "cpe:/a:redhat:lvms:4.14::el9" ]
null
7.5
null
null
RHSA-2017:0876
Red Hat Security Advisory: Red Hat Single Sign-On 7.1 update
keycloak: user deletion via incorrect permissions check wildfly: ParseState headerValuesCache can be exploited to fill heap with garbage keycloak: timing attack in JWS signature verification
[ "cpe:/a:redhat:jboss_single_sign_on:7.1" ]
null
null
3.7
null
RHSA-2015:2068
Red Hat Security Advisory: nss, nss-util, and nspr security update
nss: use-after-poison in sec_asn1d_parse_leaf() (MFSA 2015-133) nss: ASN.1 decoder heap overflow when decoding constructed OCTET STRING that mixes indefinite and definite length encodings (MFSA 2015-133) nspr: heap-buffer overflow in PL_ARENA_ALLOCATE (MFSA 2015-133)
[ "cpe:/o:redhat:rhel_aus:6.4::server", "cpe:/o:redhat:rhel_eus:6.5::computenode", "cpe:/o:redhat:rhel_eus:6.5::server", "cpe:/o:redhat:rhel_eus:6.6::computenode", "cpe:/o:redhat:rhel_eus:6.6::server", "cpe:/o:redhat:rhel_mission_critical:6.2::server" ]
null
null
null
null
RHSA-2022:0543
Red Hat Security Advisory: ruby:2.6 security update
rubygem-bundler: Dependencies of gems with explicit source may be installed from a different source rubygem-rdoc: Command injection vulnerability in RDoc ruby: FTP PASV command response can cause Net::FTP to connect to arbitrary host ruby: StartTLS stripping vulnerability in Net::IMAP ruby: Regular expression denial of service vulnerability of Date parsing methods ruby: Cookie prefix spoofing in CGI::Cookie.parse
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
7.5
null
null
RHSA-2025:0201
Red Hat Security Advisory: Red Hat OpenStack Platform 16.2 (python-waitress) security update
waitress: python-waitress: request processing race condition in HTTP pipelining with invalid first request waitress: Waitress has a denial of service leading to high CPU usage/resource exhaustion
[ "cpe:/a:redhat:openstack:16.2::el8" ]
null
7.5
null
null
RHSA-2023:4888
Red Hat Security Advisory: kpatch-patch security update
kernel: use-after-free in l2cap_connect and l2cap_le_connect_req in net/bluetooth/l2cap_core.c kernel: Use-after-free vulnerability in the Linux Kernel traffic control index filter kernel: UAF in nftables when nft_set_lookup_global triggered after handling named and anonymous sets in batch requests kernel: cls_flower: out-of-bounds write in fl_set_geneve_opt()
[ "cpe:/o:redhat:rhel_eus:8.6::baseos" ]
null
7.8
null
null
RHSA-2024:4863
Red Hat Security Advisory: httpd security update
httpd: Substitution encoding issue in mod_rewrite httpd: Improper escaping of output in mod_rewrite httpd: NULL pointer dereference in mod_proxy
[ "cpe:/a:redhat:rhel_e4s:9.0::appstream" ]
null
7.5
null
null
RHSA-2021:2260
Red Hat Security Advisory: libwebp security update
libwebp: heap-based buffer overflow in PutLE16() libwebp: heap-based buffer overflow in WebPDecode*Into functions libwebp: use-after-free in EmitFancyRGB() in dec/io_dec.c
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
9.8
null
null
RHSA-2019:1896
Red Hat Security Advisory: 389-ds-base security and bug fix update
389-ds-base: DoS via hanging secured connections
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
5.3
null
RHSA-2023:1923
Red Hat Security Advisory: kpatch-patch security update
kernel: net/ulp: use-after-free in listening ULP sockets
[ "cpe:/o:redhat:rhel_eus:8.6::baseos" ]
null
7.8
null
null
RHSA-2023:1159
Red Hat Security Advisory: OpenShift Container Platform 4.11.31 security and extras update
goutils: RandomAlphaNumeric and CryptoRandomAlphaNumeric are not as random as they should be
[ "cpe:/a:redhat:openshift:4.11::el8" ]
null
7
null
null
RHSA-2007:0873
Red Hat Security Advisory: star security update
star directory traversal vulnerability
[ "cpe:/o:redhat:enterprise_linux:3::as", "cpe:/o:redhat:enterprise_linux:3::desktop", "cpe:/o:redhat:enterprise_linux:3::es", "cpe:/o:redhat:enterprise_linux:3::ws", "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws", "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
RHSA-2013:1170
Red Hat Security Advisory: mongodb and pymongo security and enhancement update
MongoDB: Server Side JavaScript Includes allow Remote Code Execution pymongo: null pointer when decoding invalid DBRef
[ "cpe:/a:redhat:enterprise_mrg:2:server:el6" ]
null
null
null
null
RHSA-2023:4325
Red Hat Security Advisory: samba security and bug fix update
samba: SMB2 packet signing is not enforced when "server signing = required" is set
[ "cpe:/a:redhat:enterprise_linux:9::appstream", "cpe:/a:redhat:enterprise_linux:9::crb", "cpe:/a:redhat:enterprise_linux:9::resilientstorage", "cpe:/o:redhat:enterprise_linux:9::baseos" ]
null
5.9
null
null
RHSA-2011:1508
Red Hat Security Advisory: cyrus-imapd security update
cyrus-imapd: nntpd authentication bypass cyrus-imapd: NULL pointer dereference via crafted References header in email
[ "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws", "cpe:/o:redhat:enterprise_linux:5::client_workstation", "cpe:/o:redhat:enterprise_linux:5::server", "cpe:/o:redhat:enterprise_linux:6::server" ]
null
null
null
null
RHSA-2023:0592
Red Hat Security Advisory: libksba security update
libksba: integer overflow to code execution
[ "cpe:/o:redhat:rhel_aus:8.2::baseos", "cpe:/o:redhat:rhel_e4s:8.2::baseos", "cpe:/o:redhat:rhel_tus:8.2::baseos" ]
null
8.6
null
null
RHSA-2022:4855
Red Hat Security Advisory: postgresql:13 security update
postgresql: Autovacuum, REINDEX, and others omit "security restricted operation" sandbox
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
8.8
null
null
RHSA-2024:5406
Red Hat Security Advisory: Red Hat Product OCP Tools 4.13 OpenShift Jenkins security update
jenkins: Arbitrary file read vulnerability through agent connections can lead to RCE
[ "cpe:/a:redhat:ocp_tools:4.13::el8" ]
null
8.8
null
null
RHSA-2018:1253
Red Hat Security Advisory: apr security update
apr: Out-of-bounds array deref in apr_time_exp*() functions
[ "cpe:/o:redhat:rhel_aus:6.4::server", "cpe:/o:redhat:rhel_aus:6.5::server", "cpe:/o:redhat:rhel_aus:6.6::server", "cpe:/o:redhat:rhel_aus:7.2::server", "cpe:/o:redhat:rhel_e4s:7.2::server", "cpe:/o:redhat:rhel_eus:6.7::computenode", "cpe:/o:redhat:rhel_eus:6.7::server", "cpe:/o:redhat:rhel_eus:7.3::computenode", "cpe:/o:redhat:rhel_eus:7.3::server", "cpe:/o:redhat:rhel_tus:6.6::server", "cpe:/o:redhat:rhel_tus:7.2::server" ]
null
null
7.4
null
RHSA-2021:3481
Red Hat Security Advisory: Red Hat OpenStack Platform 16.1 (openstack-neutron) security update
openstack-neutron: arbitrary dnsmasq reconfiguration via extra_dhcp_opts
[ "cpe:/a:redhat:openstack:16.1::el8" ]
null
7.6
null
null
RHEA-2018:2188
Red Hat Enhancement Advisory: Red Hat JBoss Web Server 5.0.0 enhancement update
tomcat: A bug in the UTF-8 decoder can lead to DoS
[ "cpe:/a:redhat:jboss_enterprise_web_server:5.0::el7" ]
null
null
7.5
null
RHSA-2020:3779
Red Hat Security Advisory: Red Hat Data Grid 7.3.7 security update
jetty: HTTP request smuggling using the range header jetty: HTTP request smuggling jetty: Incorrect header handling jackson-mapper-asl: XML external entity similar to CVE-2016-3720 resteasy: Improper validation of response header in MediaTypeHeaderDelegate.java class EAP: field-name is not parsed in accordance to RFC7230 Wildfly: EJBContext principal is not popped back after invoking another EJB using a different Security Domain undertow: AJP File Read/Inclusion Vulnerability Wildfly: Improper authorization issue in WildFlySecurityManager when using alternative protection domain undertow: servletPath is normalized incorrectly leading to dangerous application mapping which could result in security bypass jackson-databind: Lacks certain xbean-reflect/JNDI blocking log4j: improper validation of certificate with host mismatch in SMTP appender jackson-databind: Serialization gadgets in shaded-hikari-config jackson-databind: Serialization gadgets in ibatis-sqlmap jackson-databind: Serialization gadgets in anteros-core jackson-databind: mishandles the interaction between serialization gadgets and typing which could result in remote command execution jackson-databind: mishandles the interaction between serialization gadgets and typing which could result in remote command execution wildfly-elytron: session fixation when using FORM authentication jackson-databind: Serialization gadgets in org.aoju.bus.proxy.provider.*.RmiProvider jackson-databind: Serialization gadgets in javax.swing.JEditorPane jackson-databind: Serialization gadgets in org.apache.activemq.jms.pool.XaPooledConnectionFactory jackson-databind: Serialization gadgets in org.apache.commons.proxy.provider.remoting.RmiProvider jackson-databind: Serialization gadgets in org.apache.openjpa.ee.WASRegistryManagedRuntime netty: compression/decompression codecs don't enforce limits on buffer allocation sizes jackson-databind: Serialization gadgets in org.springframework:spring-aop jackson-databind: Serialization gadgets in commons-jelly:commons-jelly
[ "cpe:/a:redhat:jboss_data_grid:7.3" ]
null
8.1
8.1
null
RHSA-2016:1617
Red Hat Security Advisory: kernel security update
kernel: infiniband: Unprivileged process can overwrite kernel memory using rdma_ucm.ko
[ "cpe:/o:redhat:rhel_mission_critical:6.2::server" ]
null
null
7.8
null
RHSA-2023:1439
Red Hat Security Advisory: openssl security update
openssl: X.400 address type confusion in X.509 GeneralName
[ "cpe:/o:redhat:rhel_aus:8.2::baseos", "cpe:/o:redhat:rhel_e4s:8.2::baseos", "cpe:/o:redhat:rhel_tus:8.2::baseos" ]
null
7.4
null
null
RHSA-2021:1791
Red Hat Security Advisory: spice-vdagent security and bug fix update
spice-vdagent: memory DoS via arbitrary entries in active_xfers hash table spice-vdagent: possible file transfer DoS and information leak via active_xfers hash map spice-vdagent: possibility to exhaust file descriptors in vdagentd spice-vdagent: UNIX domain socket peer PID retrieved via SO_PEERCRED is subject to race condition
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
6.4
null
null
RHSA-2020:0134
Red Hat Security Advisory: .NET Core on Red Hat Enterprise Linux security and bug fix update
dotnet: Denial of service via backpressure issue dotnet: Memory Corruption in SignalR
[ "cpe:/a:redhat:rhel_dotnet:3.0::el7", "cpe:/a:redhat:rhel_dotnet:3.1::el7" ]
null
8.1
null
null
RHSA-2024:3022
Red Hat Security Advisory: motif security update
libXpm: out of bounds read in XpmCreateXpmImageFromBuffer() libXpm: out of bounds read on XPM with corrupted colormap
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
5.5
null
null
RHSA-2007:1034
Red Hat Security Advisory: samba security update
Samba "reply_netbios_packet()" Buffer Overflow Vulnerability
[ "cpe:/o:redhat:rhel_eus:4.5::as", "cpe:/o:redhat:rhel_eus:4.5::es" ]
null
null
null
null
RHSA-2018:1575
Red Hat Security Advisory: Red Hat JBoss Data Grid 7.2 security update
slf4j: Deserialisation vulnerability in EventData constructor can allow for arbitrary code execution
[ "cpe:/a:redhat:jboss_data_grid:7.2" ]
null
null
8.1
null
RHSA-2019:1948
Red Hat Security Advisory: ruby security update
ruby: OpenSSL::X509:: Name equality check does not work correctly
[ "cpe:/o:redhat:rhel_eus:7.4::computenode", "cpe:/o:redhat:rhel_eus:7.4::server" ]
null
null
7.5
null
RHSA-2009:1637
Red Hat Security Advisory: JBoss Enterprise Application Platform 4.2.0.CP08 update
xml-security-1.3.0-1jpp.ep1.*: XMLDsig HMAC-based signatures spoofing and authentication bypass jbossas JMX-Console cross-site-scripting in filter parameter JBoss Application Server Web Console XSS JDK: XML parsing Denial-Of-Service (6845701) JBoss EAP Twiddle logs the JMX password
[ "cpe:/a:redhat:jboss_enterprise_application_platform:4.2.0::el4" ]
null
null
null
null
RHSA-2025:4241
Red Hat Security Advisory: glibc security update
glibc: buffer overflow in the GNU C Library's assert()
[ "cpe:/a:redhat:rhel_eus:9.2::appstream", "cpe:/a:redhat:rhel_eus:9.2::crb", "cpe:/o:redhat:rhel_eus:9.2::baseos" ]
null
5.5
null
null
RHSA-2023:0671
Red Hat Security Advisory: tigervnc security update
xorg-x11-server: DeepCopyPointerClasses use-after-free leads to privilege elevation
[ "cpe:/a:redhat:rhel_aus:8.2::appstream", "cpe:/a:redhat:rhel_e4s:8.2::appstream", "cpe:/a:redhat:rhel_tus:8.2::appstream" ]
null
7.8
null
null
RHSA-2012:0105
Red Hat Security Advisory: mysql security update
mysql: Unspecified vulnerability allows remote attackers to affect availability mysql: Unspecified vulnerability allows remote authenticated users to affect integrity mysql: Unspecified vulnerability allows remote authenticated users to affect availability mysql: Unspecified vulnerability allows remote authenticated users to affect availability mysql: Unspecified vulnerability allows remote authenticated users to affect availability mysql: Unspecified vulnerability allows remote authenticated users to affect availability mysql: Unspecified vulnerability allows remote authenticated users to affect confidentiality and availability mysql: Unspecified vulnerability allows local users to affect confidentiality and integrity mysql: Unspecified vulnerability allows remote authenticated users to affect availability mysql: Unspecified vulnerability allows remote authenticated users to affect confidentiality and integrity mysql: Unspecified vulnerability allows remote authenticated users to affect confidentiality and availability mysql: Unspecified vulnerability allows remote authenticated users to affect availability mysql: Unspecified vulnerability allows remote authenticated users to affect availability mysql: Unspecified vulnerability allows remote authenticated users to affect confidentiality mysql: Unspecified vulnerability allows remote authenticated users to affect availability mysql: Unspecified vulnerability allows remote authenticated users to affect availability mysql: Unspecified vulnerability allows remote authenticated users to affect availability mysql: unspecified DoS vulnerability in MyISAM (Oracle CPU April 2012)
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
null
null
RHSA-2015:2079
Red Hat Security Advisory: binutils security, bug fix, and enhancement update
binutils: invalid read flaw in libbfd binutils: lack of range checking leading to controlled write in _bfd_elf_setup_sections() binutils: out-of-bounds write when parsing specially crafted PE executable binutils: heap overflow in objdump when parsing a crafted ELF/PE binary file (incomplete fix for CVE-2014-8485) binutils: stack overflow in objdump when parsing specially crafted ihex file binutils: stack overflow in the SREC parser binutils: directory traversal vulnerability binutils: out of bounds memory write
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
null
null
RHSA-2018:3754
Red Hat Security Advisory: OpenShift Container Platform 3.3 security update
kubernetes: authentication/authorization bypass in the handling of non-101 responses
[ "cpe:/a:redhat:openshift:3.3::el7" ]
null
null
8.8
null
RHSA-2023:1880
Red Hat Security Advisory: java-11-openjdk security update
OpenJDK: improper connection handling during TLS handshake (8294474) OpenJDK: missing string checks for NULL characters (8296622) OpenJDK: incorrect handling of NULL characters in ProcessBuilder (8295304) OpenJDK: Swing HTML parsing issue (8296832) OpenJDK: incorrect enqueue of references in garbage collector (8298191) OpenJDK: certificate validation issue in TLS session negotiation (8298310) OpenJDK: missing check for slash characters in URI-to-path conversion (8298667)
[ "cpe:/a:redhat:enterprise_linux:9::appstream", "cpe:/a:redhat:enterprise_linux:9::crb" ]
null
3.7
null
null
RHBA-2020:2435
Red Hat Bug Fix Advisory: OpenShift Container Platform 4.3.25 packages update
jenkins: CSRF protection bypass via crafted URLs jenkins: XSS in job configuration pages jenkins: Content-Security-Policy headers for files uploaded leads to XSS jenkins: improperly processes HTML content of list leads to XSS
[ "cpe:/a:redhat:openshift:4.3::el7", "cpe:/a:redhat:openshift:4.3::el8" ]
null
5.4
null
null
RHSA-2016:0379
Red Hat Security Advisory: rhev-hypervisor security, bug fix and enhancement update
OpenSSL: SSLv2 doesn't block disabled ciphers OpenSSL: Side channel attack on modular exponentiation OpenSSL: Double-free in DSA code OpenSSL: BN_hex2bn/BN_dec2bn NULL pointer deref/heap corruption SSL/TLS: Cross-protocol attack on TLS using SSLv2 (DROWN)
[ "cpe:/o:redhat:enterprise_linux:6::hypervisor", "cpe:/o:redhat:enterprise_linux:7::hypervisor" ]
null
null
null
null
RHSA-2021:4910
Red Hat Security Advisory: OpenShift Virtualization 4.8.3 RPMs security and bug fix update
golang: net: incorrect parsing of extraneous zero characters at the beginning of an IP address octet
[ "cpe:/a:redhat:container_native_virtualization:4.8::el7", "cpe:/a:redhat:container_native_virtualization:4.8::el8" ]
null
7.3
null
null
RHSA-2023:0284
Red Hat Security Advisory: sudo security update
sudo: arbitrary file write with privileges of the RunAs user
[ "cpe:/o:redhat:enterprise_linux:8::baseos" ]
null
7.8
null
null
RHSA-2020:1287
Red Hat Security Advisory: OpenShift Container Platform 3.11 security update
haproxy: HTTP request smuggling issue with transfer-encoding header containing an obfuscated "chunked" value haproxy: HTTP/2 implementation vulnerable to intermediary encapsulation attacks haproxy: malformed HTTP/2 requests can lead to out-of-bounds writes
[ "cpe:/a:redhat:openshift:3.11::el7" ]
null
8.8
5.9
null
RHSA-2010:0787
Red Hat Security Advisory: glibc security update
glibc: ld.so insecure handling of $ORIGIN in LD_AUDIT for setuid/setgid programs
[ "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
RHSA-2021:0525
Red Hat Security Advisory: net-snmp security update
net-snmp: Improper Privilege Management in EXTEND MIB may lead to privileged commands execution
[ "cpe:/o:redhat:rhel_eus:7.7::computenode", "cpe:/o:redhat:rhel_eus:7.7::server" ]
null
8.8
null
null
RHSA-2014:1942
Red Hat Security Advisory: openstack-neutron security and bug fix update
openstack-neutron: DoS via maliciously crafted dns_nameservers
[ "cpe:/a:redhat:openstack:5::el7" ]
null
null
null
null
RHSA-2009:1432
Red Hat Security Advisory: seamonkey security update
firefox/nss: doesn't handle NULL in Common Name properly deprecate MD2 in SSL cert validation (Kaminsky) firefox: URL bar spoofing vulnerability Firefox 3.5.3 3.0.14 browser engine crashes Firefox 3.5.2 3.0.14 JavaScript engine crashes Firefox 3.0.14 Insufficient warning for PKCS11 module installation and removal Firefox 3.5.3 3.0.14 TreeColumns dangling pointer vulnerability
[ "cpe:/o:redhat:enterprise_linux:3::as", "cpe:/o:redhat:enterprise_linux:3::desktop", "cpe:/o:redhat:enterprise_linux:3::es", "cpe:/o:redhat:enterprise_linux:3::ws" ]
null
null
null
null
RHSA-2024:4874
Red Hat Security Advisory: freeradius:3.0 security update
freeradius: forgery attack
[ "cpe:/a:redhat:rhel_aus:8.4::appstream", "cpe:/a:redhat:rhel_e4s:8.4::appstream", "cpe:/a:redhat:rhel_tus:8.4::appstream" ]
null
9
null
null
RHSA-2010:0126
Red Hat Security Advisory: kvm security and bug fix update
KVM: Check cpl before emulating debug register access kvm: emulator privilege escalation segment selector check
[ "cpe:/a:redhat:rhel_virtualization:5::client", "cpe:/a:redhat:rhel_virtualization:5::server" ]
null
null
null
null
RHSA-2020:1712
Red Hat Security Advisory: edk2 security, bug fix, and enhancement update
edk2: numeric truncation in MdeModulePkg/PiDxeS3BootScriptLib
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
null
6.4
null
RHSA-2015:1186
Red Hat Security Advisory: php55-php security update
php: buffer over-read in Phar metadata parsing php: invalid pointer free() in phar_tar_process_metadata() php: buffer overflow in phar_set_inode() php: pipelined request executed in deinitialized interpreter under httpd 2.4 php: missing null byte checks for paths in various PHP extensions php: missing null byte checks for paths in various PHP extensions php: memory corruption in phar_parse_tarfile caused by empty entry file name php: integer overflow leading to heap overflow when reading FTP file listing php: multipart/form-data request parsing CPU usage DoS php: regressions in 5.4+ php: pcntl_exec() accepts paths with NUL character php: missing null byte checks for paths in DOM and GD extensions php: Incomplete Class unserialization type confusion php: exception:: getTraceAsString type confusion issue after unserialize php: denial of service when processing a crafted file with Fileinfo php: denial of service when processing a crafted file with Fileinfo php: integer overflow in ftp_genlist() resulting in heap overflow (improved fix for CVE-2015-4022) php: NULL pointer dereference in php_pgsql_meta_data()
[ "cpe:/a:redhat:rhel_software_collections:2::el6", "cpe:/a:redhat:rhel_software_collections:2::el7" ]
null
null
null
null
RHSA-2018:2626
Red Hat Security Advisory: Red Hat Virtualization security, bug fix, and enhancement update
yum-utils: reposync: improper path validation may lead to directory traversal
[ "cpe:/o:redhat:enterprise_linux:7::hypervisor" ]
null
null
8.8
null
RHSA-2011:1822
Red Hat Security Advisory: JBoss Enterprise Portal Platform 5.2.0 update
Platform: open URL redirect Invoker servlets authentication bypass (HTTP verb tampering) Platform: Multiple XSS flaws
[ "cpe:/a:redhat:jboss_enterprise_portal_platform:5" ]
null
null
null
null
RHSA-2019:2955
Red Hat Security Advisory: rh-nodejs8-nodejs security update
HTTP/2: large amount of data requests leads to denial of service HTTP/2: flood using PING frames results in unbounded memory growth HTTP/2: flood using PRIORITY frames results in excessive resource consumption HTTP/2: flood using HEADERS frames results in unbounded memory growth HTTP/2: flood using SETTINGS frames results in unbounded memory growth HTTP/2: 0-length headers lead to denial of service HTTP/2: request for large response leads to denial of service HTTP/2: flood using empty frames results in excessive resource consumption
[ "cpe:/a:redhat:rhel_software_collections:3::el7" ]
null
null
7.5
null
RHSA-2024:8577
Red Hat Security Advisory: krb5 security update
freeradius: forgery attack
[ "cpe:/a:redhat:rhel_e4s:9.0::appstream", "cpe:/o:redhat:rhel_e4s:9.0::baseos" ]
null
9
null
null
RHSA-2012:0688
Red Hat Security Advisory: flash-plugin security update
flash-plugin: arbitrary code execution via object confusion (APSB12-09)
[ "cpe:/a:redhat:rhel_extras:5::client", "cpe:/a:redhat:rhel_extras:5::server", "cpe:/a:redhat:rhel_extras:6" ]
null
null
null
null
RHSA-2024:10806
Red Hat Security Advisory: Satellite 6.15.5 Async Update
python-ecdsa: vulnerable to the Minerva attack rubygem-rack: Denial of Service Vulnerability in Rack Content-Type Parsing rubygem-rack: Possible DoS Vulnerability with Range Header in Rack rubygem-activestorage: Possible Sensitive Session Information Leak in Active Storage rubygem-rack: Possible Denial of Service Vulnerability in Rack Header Parsing
[ "cpe:/a:redhat:satellite:6.15::el8", "cpe:/a:redhat:satellite_capsule:6.15::el8", "cpe:/a:redhat:satellite_utils:6.15::el8" ]
null
5.3
null
null
RHSA-2023:2367
Red Hat Security Advisory: containernetworking-plugins security and bug fix update
golang: crypto/tls: session tickets lack random ticket_age_add golang: net/http: excessive memory growth in a Go server accepting HTTP/2 requests
[ "cpe:/a:redhat:enterprise_linux:9::appstream" ]
null
5.3
null
null
RHSA-2023:3722
Red Hat Security Advisory: openssl security and bug fix update
openssl: Denial of service by excessive resource usage in verifying X509 policy constraints openssl: Invalid certificate policies in leaf certificates are silently ignored openssl: Certificate policy check not enabled openssl: Input buffer over-read in AES-XTS implementation on 64 bit ARM openssl: Possible DoS translating ASN.1 object identifiers
[ "cpe:/a:redhat:enterprise_linux:9::appstream", "cpe:/o:redhat:enterprise_linux:9::baseos" ]
null
6.5
null
null
RHSA-2016:2999
Red Hat Security Advisory: Red Hat OpenShift Enterprise 2.x - End Of Life Notice
This is the Final notification for the End of Production Phase 1 of Red Hat OpenShift Enterprise 2.x (2.0, 2.1 and 2.2).
[ "cpe:/a:redhat:openshift:2.0::enterprise" ]
null
null
null
null
RHSA-2023:0456
Red Hat Security Advisory: thunderbird security update
Mozilla: libusrsctp library out of date Mozilla: Fullscreen notification bypass Mozilla: Arbitrary file read from GTK drag and drop on Linux Mozilla: Malicious command could be hidden in devtools output Mozilla: URL being dragged from cross-origin iframe into same tab triggers navigation Mozilla: Content Security Policy wasn't being correctly applied to WebSockets in WebWorkers Mozilla: Calls to <code>console.log</code> allowed bypasing Content Security Policy via format directive Mozilla: Memory safety bugs fixed in Firefox 109 and Firefox ESR 102.7
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
8.8
null
null
RHSA-2025:0542
Red Hat Security Advisory: JBoss EAP XP 5.0 Update 1.0 release. See references for release notes.
io.vertx:vertx-grpc-client: io.vertx:vertx-grpc-server: Vertx gRPC server does not limit the maximum message size
[ "cpe:/a:redhat:jboss_enterprise_application_platform:8.0" ]
null
7.5
null
null
RHSA-2024:5136
Red Hat Security Advisory: openssl security update
openssl: X.400 address type confusion in X.509 GeneralName
[ "cpe:/o:redhat:rhel_aus:7.7::server" ]
null
7.4
null
null
RHSA-2021:4592
Red Hat Security Advisory: gcc-toolset-10-annobin security update
environment: Unicode's bidirectional (BiDi) override characters can cause trojan source attacks
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
8.5
null
null
RHSA-2024:4732
Red Hat Security Advisory: nghttp2 security update
nghttp2: CONTINUATION frames DoS
[ "cpe:/o:redhat:rhel_aus:8.4::baseos", "cpe:/o:redhat:rhel_e4s:8.4::baseos", "cpe:/o:redhat:rhel_tus:8.4::baseos" ]
null
5.3
null
null
RHSA-2017:1723
Red Hat Security Advisory: kernel security and bug fix update
kernel: NFSv3 server does not properly handle payload bounds checking of WRITE requests
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
6.5
null
RHSA-2018:3401
Red Hat Security Advisory: qemu-kvm security update
hw: cpu: speculative store bypass
[ "cpe:/o:redhat:rhel_aus:6.4::server" ]
null
null
5.6
null
RHSA-2010:0342
Red Hat Security Advisory: kernel security and bug fix update
kernel: sctp remote denial of service
[ "cpe:/o:redhat:rhel_eus:4.7::as", "cpe:/o:redhat:rhel_eus:4.7::es" ]
null
null
null
null
RHSA-2016:0505
Red Hat Security Advisory: python-django security update
python-django: Malicious redirect and possible XSS attack via user-supplied redirect URLs containing basic auth python-django: User enumeration through timing difference on password hasher work factor upgrade
[ "cpe:/a:redhat:openstack:6::el7" ]
null
null
null
null
RHSA-2023:5788
Red Hat Security Advisory: python-reportlab security update
python-reportlab: code injection in paraparser.py allows code execution
[ "cpe:/a:redhat:rhel_aus:8.2::appstream", "cpe:/a:redhat:rhel_e4s:8.2::appstream", "cpe:/a:redhat:rhel_tus:8.2::appstream" ]
null
9.8
null
null
RHSA-2018:2254
Red Hat Security Advisory: java-1.7.0-oracle security update
JDK: unspecified vulnerability fixed in 6u201, 7u191, 8u181, and 10.0.2 (Libraries) JDK: unspecified vulnerability fixed in 7u191, 8u181, and 10.0.2 (JavaFX) OpenJDK: insufficient index validation in PatternSyntaxException getMessage() (Concurrency, 8199547) JDK: unspecified vulnerability fixed in 6u201, 7u191, 8u181, and 10.0.2 (JSSE)
[ "cpe:/a:redhat:rhel_extras_oracle_java:7" ]
null
null
5.9
null
RHSA-2015:1526
Red Hat Security Advisory: java-1.6.0-openjdk security update
OpenJDK: deserialization issue in ObjectInputStream.readSerialData() (Libraries, 8076401) OpenJDK: non-constant time comparisons in crypto code (JCE, 8074865) OpenJDK: incorrect code permission checks in RMIConnectionImpl (JMX, 8075853) OpenJDK: name for reverse DNS lookup used in certificate identity check (JSSE, 8067694) OpenJDK: IIOPInputStream type confusion vulnerability (CORBA, 8076376) ICU: integer overflow in LETableReference verifyLength() (OpenJDK 2D, 8077520) SSL/TLS: "Invariance Weakness" vulnerability in RC4 stream cipher LOGJAM: TLS connections which support export grade DHE key-exchange are vulnerable to MITM attacks OpenJDK: improper permission checks in MBeanServerInvocationHandler (JMX, 8076397) OpenJDK: insufficient context checks during object deserialization (Libraries, 8076405) OpenJDK: RemoteObjectInvocationHandler allows calling finalize() (RMI, 8076409) OpenJDK: incorrect OCSP nextUpdate checking (Libraries, 8075374) OpenJDK: DnsClient fails to release request information after error (JNDI, 8075378) ICU: missing boundary checks in layout engine (OpenJDK 2D, 8071715)
[ "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::server", "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation", "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
3.7
null
RHSA-2015:0250
Red Hat Security Advisory: samba4 security update
samba: talloc free on uninitialized stack pointer in netlogon server could lead to remote-code execution
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
null
null
RHSA-2023:7704
Red Hat Security Advisory: OpenShift Virtualization 4.14.1 security and bug fix update
golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487) HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack)
[ "cpe:/a:redhat:container_native_virtualization:4.14::el9" ]
null
7.5
null
null
RHSA-2018:2825
Red Hat Security Advisory: rh-perl526-mod_perl security update
mod_perl: arbitrary Perl code execution in the context of the user account via a user-owned .htaccess
[ "cpe:/a:redhat:rhel_software_collections:3::el7" ]
null
null
6.3
null
RHSA-2013:0258
Red Hat Security Advisory: JBoss Enterprise Web Platform 5.2.0 security update
apache-cxf: SOAPAction spoofing on document literal web services apache-cxf: Bypass of security constraints on WS endpoints when using WSS4JInInterceptor
[ "cpe:/a:redhat:jboss_enterprise_web_platform:5.2.0" ]
null
null
null
null
RHSA-2010:0677
Red Hat Security Advisory: kernel security update
kernel: mm: keep a guard page below a grow-down stack segment
[ "cpe:/o:redhat:rhel_eus:4.7::as", "cpe:/o:redhat:rhel_eus:4.7::es" ]
null
null
null
null
RHSA-2005:306
Red Hat Security Advisory: ethereal security update
security flaw security flaw security flaw security flaw security flaw security flaw
[ "cpe:/o:redhat:enterprise_linux:3::as", "cpe:/o:redhat:enterprise_linux:3::desktop", "cpe:/o:redhat:enterprise_linux:3::es", "cpe:/o:redhat:enterprise_linux:3::ws" ]
null
null
null
null
RHSA-2024:4464
Red Hat Security Advisory: Red Hat Advanced Cluster Management 2.10.4 security updates and bug fixes
golang: net/http, x/net/http2: unlimited number of CONTINUATION frames causes DoS braces: fails to limit the number of characters it can handle
[ "cpe:/a:redhat:acm:2.10::el9" ]
null
7.5
null
null
RHSA-2021:0922
Red Hat Security Advisory: bind security update
bind: Buffer overflow in the SPNEGO implementation affecting GSSAPI security policy negotiation
[ "cpe:/a:redhat:rhel_eus:8.2::appstream", "cpe:/o:redhat:rhel_eus:8.2::baseos" ]
null
8.1
null
null
RHSA-2020:4320
Red Hat Security Advisory: OpenShift Container Platform 4.5.16 security update
openshift: restricted SCC allows pods to craft custom network packets
[ "cpe:/a:redhat:openshift:4.5::el7" ]
null
3.1
null
null
RHSA-2023:7789
Red Hat Security Advisory: postgresql:10 security update
postgresql: Buffer overrun from integer overflow in array modification
[ "cpe:/a:redhat:rhel_eus:8.6::appstream" ]
null
8.8
null
null
RHSA-2015:0920
Red Hat Security Advisory: Red Hat JBoss Operations Network 3.3.2 update
Management: Limited RBAC authorization bypass Subsystem: Information disclosure via incorrect sensitivity classification of attribute Weld: Limited information disclosure via stale thread state
[ "cpe:/a:redhat:jboss_operations_network:3.3" ]
null
null
null
null
RHSA-2021:1353
Red Hat Security Advisory: thunderbird security update
Mozilla: More internal network hosts could have been probed by a malicious webpage Mozilla: Out of bound write due to lazy initialization Mozilla: Use-after-free in Responsive Design Mode Mozilla: Secure Lock icon could have been spoofed Mozilla: Blob URLs may have been granted additional privileges Mozilla: Arbitrary FTP command execution on FTP servers using an encoded URL Mozilla: Incorrect size computation in WebAssembly JIT could lead to null-reads Mozilla: Port blocking could be bypassed Mozilla: Race condition when reading from disk while verifying signatures
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
2.5
6.1
null
RHSA-2024:3275
Red Hat Security Advisory: python-dns security update
dnspython: denial of service in stub resolver
[ "cpe:/o:redhat:enterprise_linux:8::baseos" ]
null
5.9
null
null
RHSA-2025:3048
Red Hat Security Advisory: kpatch-patch-5_14_0-503_15_1 and kpatch-patch-5_14_0-503_26_1 security update
kernel: can: bcm: Fix UAF in bcm_proc_show()
[ "cpe:/o:redhat:enterprise_linux:9::baseos" ]
null
7.8
null
null
RHSA-2018:0018
Red Hat Security Advisory: kernel security update
hw: cpu: speculative execution branch target injection hw: cpu: speculative execution bounds-check bypass hw: cpu: speculative execution permission faults handling
[ "cpe:/o:redhat:rhel_aus:6.4::server" ]
null
null
5.5
null
RHSA-2023:1047
Red Hat Security Advisory: Red Hat Single Sign-On 7.6.2 for OpenShift image security and enhancement update
bootstrap: Cross-site Scripting (XSS) in the collapse data-parent attribute bootstrap: Cross-site Scripting (XSS) in the data-container property of tooltip jquery: Prototype pollution in object's prototype leading to denial of service, remote code execution, or property injection jquery: Cross-site scripting due to improper injQuery.htmlPrefilter method glob-parent: Regular Expression Denial of Service minimist: prototype pollution keycloak: HTML injection in execute-actions-email Admin REST API keycloak: XSS on impersonation under specific circumstances SnakeYaml: Constructor Deserialization Remote Code Execution Undertow: DoS can be achieved as Undertow server waits for the LAST_CHUNK forever for EJB invocations keycloak: path traversal via double URL encoding keycloak: Session takeover with OIDC offline refreshtokens rhsso-container-image: unsecured management interface exposed to adjecent network Moment.js: Path traversal in moment.locale snakeyaml: Denial of Service due to missing nested depth limitation for collections moment: inefficient parsing algorithm resulting in DoS loader-utils: Regular expression denial of service snakeyaml: Uncaught exception in org.yaml.snakeyaml.composer.Composer.composeSequenceNode snakeyaml: Uncaught exception in org.yaml.snakeyaml.constructor.BaseConstructor.constructObject snakeyaml: Uncaught exception in java.base/java.util.regex.Pattern$Ques.match jettison: parser crash by stackoverflow jettison: memory exhaustion via user-supplied XML or JSON data jackson-databind: deep wrapper array nesting wrt UNWRAP_SINGLE_VALUE_ARRAYS jackson-databind: use of deeply nested arrays mina-sshd: Java unsafe deserialization vulnerability jettison: If the value in map is the map's self, the new new JSONObject(map) cause StackOverflowError which may lead to dos json5: Prototype Pollution in JSON5 via Parse Method CXF: directory listing / code exfiltration CXF: SSRF Vulnerability keycloak: Client Registration endpoint does not check token revocation keycloak: user impersonation via stolen uuid code
[ "cpe:/a:redhat:rhosemc:1.0::el8" ]
null
4.6
5.6
null
RHSA-2012:0302
Red Hat Security Advisory: cups security and bug fix update
David Koblas' GIF decoder LZW decoder buffer overflow
[ "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::client_workstation", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
RHSA-2021:3074
Red Hat Security Advisory: nodejs:14 security, bug fix, and enhancement update
libuv: out-of-bounds read in uv__idna_toascii() can lead to information disclosures or crashes nodejs-hosted-git-info: Regular Expression denial of service via shortcutMatch in fromUrl() nodejs-ssri: Regular expression DoS (ReDoS) when parsing malicious SRI in strict mode
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
7.5
5.3
null
RHSA-2024:7483
Red Hat Security Advisory: linux-firmware security update
kernel: hw:amd:IOMMU improperly handles certain special address leading to a loss of guest integrity kernel: hw:amd: Incomplete system memory cleanup in SEV firmware corrupt guest private memory
[ "cpe:/o:redhat:rhel_eus:9.2::baseos" ]
null
4.4
null
null
RHBA-2016:1500
Red Hat Bug Fix Advisory: Red Hat Satellite 6.2 Base Libraries
python: ssl.match_hostname() DoS via certificates with specially crafted hostname wildcard patterns qpid-cpp: 3 qpidd DoS issues in AMQP 0-10 protocol handling qpid-cpp: anonymous access to qpidd cannot be prevented qpid-cpp: AMQP 0-10 protocol sequence-set maximal range DoS (incomplete CVE-2015-0203 fix) mongodb: DoS due to improper BSON validation foreman: Unprivileged user can access private bookmarks of other users
[ "cpe:/a:redhat:satellite:6.1::el6", "cpe:/a:redhat:satellite:6.2::el7", "cpe:/a:redhat:satellite_capsule:6.1::el6", "cpe:/a:redhat:satellite_capsule:6.2::el7" ]
null
null
null
null
RHSA-2019:2048
Red Hat Security Advisory: exempi security update
exempi: Infinite Loop in Chunk class in XMPFiles/source/FormatSupport/RIFF.cpp exempi: Use after free via a PDF file containing JPEG data exempi: Infinite loop in ASF_Support::ReadHeaderObject function in XMPFiles/source/FormatSupport/ASF_Support.cpp exempi: Infinite loop in TradQT_Manager::ParseCachedBoxes function in XMPFiles/source/FormatSupport/QuickTime_Support.cpp exempi: Heap-based buffer overflow in PSD_MetaHandler::CacheFileData function in XMPFiles/source/FormatSupport/PSIR_FileWriter.cpp allows for denial of service via crafted XLS file
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
3.3
null
RHSA-2024:8359
Red Hat Security Advisory: python39:3.9 and python39-devel:3.9 security update
python: cpython: tarfile: ReDos via excessive backtracking while parsing header values
[ "cpe:/a:redhat:enterprise_linux:8::appstream", "cpe:/a:redhat:enterprise_linux:8::crb" ]
null
7.5
null
null
RHSA-2019:2283
Red Hat Security Advisory: sox security update
sox: NULL pointer dereference in startread function in xa.c
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
3.3
null
RHSA-2012:1072
Red Hat Security Advisory: jbosscache security update
Cache: NonManagedConnectionFactory will log password in clear text when an exception occurs
[ "cpe:/a:redhat:jboss_enterprise_web_platform:5.1" ]
null
null
null
null
RHSA-2008:0039
Red Hat Security Advisory: postgresql security update
dblink allows proxying of database connections via 127.0.0.1 PostgreSQL privilege escalation PostgreSQL privilege escalation via dblink
[ "cpe:/o:redhat:enterprise_linux:3::as", "cpe:/o:redhat:enterprise_linux:3::desktop", "cpe:/o:redhat:enterprise_linux:3::es", "cpe:/o:redhat:enterprise_linux:3::ws" ]
null
null
null
null
RHSA-2024:2904
Red Hat Security Advisory: thunderbird security update
Mozilla: Arbitrary JavaScript execution in PDF.js Mozilla: IndexedDB files retained in private browsing mode Mozilla: Potential permissions request bypass via clickjacking Mozilla: Cross-origin responses could be distinguished between script and non-script content-types Mozilla: Use-after-free could occur when printing to PDF Mozilla: Memory safety bugs fixed in Firefox 126, Firefox ESR 115.11, and Thunderbird 115.11
[ "cpe:/a:redhat:rhel_eus:9.0::appstream" ]
null
6.1
null
null
RHSA-2024:0455
Red Hat Security Advisory: openssh security update
ssh: Prefix truncation attack on Binary Packet Protocol (BPP) openssh: potential command injection via shell metacharacters
[ "cpe:/a:redhat:rhel_eus:9.2::appstream", "cpe:/o:redhat:rhel_eus:9.2::baseos" ]
null
6.5
null
null
RHSA-2022:1345
Red Hat Security Advisory: Red Hat AMQ Streams 2.1.0 release and security update
lz4: memory corruption due to an integer overflow bug caused by memmove argument netty: control chars in header names may lead to HTTP request smuggling
[ "cpe:/a:redhat:amq_streams:2" ]
null
6.5
null
null
RHSA-2019:2628
Red Hat Security Advisory: redis security update
redis: Heap buffer overflow in HyperLogLog triggered by malicious client
[ "cpe:/a:redhat:openstack:13::el7" ]
null
null
7.2
null