id
stringlengths 13
15
| title
stringlengths 29
176
| description
stringlengths 8
32.1k
| cpes
listlengths 0
20
| cvss_v4_0
null | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
null |
---|---|---|---|---|---|---|---|
RHSA-2009:1096
|
Red Hat Security Advisory: seamonkey security update
|
Firefox browser engine crashes Firefox JavaScript engine crashes file: resources Firefox arbitrary code execution flaw Firefox JavaScript arbitrary code execution
|
[
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws",
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2011:0183
|
Red Hat Security Advisory: openoffice.org security and bug fix update
|
OpenOffice.org: directory traversal flaws in handling of XSLT jar filter descriptions and OXT extension files OpenOffice.org: Array index error by insecure parsing of broken rtf tables OpenOffice.org: Integer signedness error (crash) by processing certain RTF tags OpenOffice.org: Heap-based buffer overflow by processing *.doc files with WW8 list styles with specially-crafted count of list levels OpenOffice.org: Array index error by scanning document typography information of certain *.doc files OpenOffice.org: soffice insecure LD_LIBRARY_PATH setting OpenOffice.org: heap based buffer overflow in PPT import OpenOffice.org: heap based buffer overflow when parsing TGA files
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2024:0801
|
Red Hat Security Advisory: Red Hat Single Sign-On 7.6.7 for OpenShift image enhancement update
|
guava: insecure temporary directory creation keycloak: reflected XSS via wildcard in OIDC redirect_uri keycloak: redirect_uri validation bypass keycloak: Log Injection during WebAuthn authentication or registration keycloak: open redirect via "form_post.jwt" JARM response mode jetty-server: OutOfMemoryError for large multipart without filename read via request.getParameter() jetty-server: Cookie parsing of quoted values can exfiltrate values from other cookies santuario: Private Key disclosure in debug-log output
|
[
"cpe:/a:redhat:rhosemc:1.0::el8"
] | null | 6.5 | null | null |
RHSA-2013:0849
|
Red Hat Security Advisory: KVM image security update
|
livecd-tools: improper handling of passwords
|
[
"cpe:/o:redhat:enterprise_linux_common:6::server"
] | null | null | null | null |
RHSA-2019:1489
|
Red Hat Security Advisory: kernel security and bug fix update
|
kernel: Double free in lib/idr.c Kernel: tcp: integer overflow while processing SACK blocks allows remote denial of service Kernel: tcp: excessive resource consumption while processing SACK blocks allows remote denial of service kernel: tcp: excessive resource consumption for TCP connections with low MSS allows remote denial of service
|
[
"cpe:/o:redhat:rhel_aus:6.6::server"
] | null | null | 5.3 | null |
RHSA-2019:1490
|
Red Hat Security Advisory: kernel security and bug fix update
|
kernel: Double free in lib/idr.c Kernel: tcp: integer overflow while processing SACK blocks allows remote denial of service Kernel: tcp: excessive resource consumption while processing SACK blocks allows remote denial of service kernel: tcp: excessive resource consumption for TCP connections with low MSS allows remote denial of service
|
[
"cpe:/o:redhat:rhel_aus:6.5::server"
] | null | null | 5.3 | null |
RHSA-2024:3340
|
Red Hat Security Advisory: .NET 7.0 security update
|
dotnet: Denial of Service in SignalR server dotnet: Denial of Service in X509Certificate2 dotnet: stack buffer overrun in Double Parse dotnet: denial of service in ASP.NET Core due to deadlock in Http2OutputProducer.Stop()
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb"
] | null | 5.9 | null | null |
RHSA-2020:5099
|
Red Hat Security Advisory: firefox security update
|
Mozilla: Write side effects in MCallGetProperty opcode not accounted for
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 8.8 | null |
RHSA-2013:0943
|
Red Hat Security Advisory: Red Hat JBoss SOA Platform 5.3.1 update
|
apache-cxf: XML encryption backwards compatibility attacks
|
[
"cpe:/a:redhat:jboss_enterprise_soa_platform:5.3"
] | null | null | null | null |
RHSA-2020:0609
|
Red Hat Security Advisory: kernel-rt security and bug fix update
|
kernel: use-after-free in fs/xfs/xfs_super.c kernel: insufficient input validation in kernel mode driver in Intel i915 graphics leads to privilege escalation kernel: heap-based buffer overflow in mwifiex_process_country_ie() function in drivers/net/wireless/marvell/mwifiex/sta_ioctl.c kernel: buffer overflow in cfg80211_mgd_wext_giwessid in net/wireless/wext-sme.c
|
[
"cpe:/a:redhat:enterprise_mrg:2:server:el6"
] | null | 8 | 8 | null |
RHSA-2017:0250
|
Red Hat Security Advisory: jboss-ec2-eap security, bug fix, and enhancement update
|
tomcat: HTTP Request smuggling vulnerability due to permitting invalid character in HTTP requests EAP: Sensitive data can be exposed at the server level in domain mode admin-cli: Potential EAP resource starvation DOS attack via GET requests for server log files jboss: jbossas: unsafe chown of server.log in jboss init script allows privilege escalation
|
[
"cpe:/a:redhat:jboss_enterprise_application_platform:6::el6"
] | null | null | 7 | null |
RHSA-2022:1283
|
Red Hat Security Advisory: firefox security update
|
Mozilla: Use-after-free in NSSToken objects Mozilla: Use-after-free after VR Process destruction Mozilla: Denial of Service via complex regular expressions Mozilla: Out of bounds write due to unexpected WebAuthN Extensions Mozilla: Use-after-free in DocumentL10n::TranslateDocument Mozilla: Incorrect AliasSet used in JIT Codegen Mozilla: iframe contents could be rendered outside the border Mozilla: Memory safety bugs fixed in Firefox 99 and Firefox ESR 91.8
|
[
"cpe:/a:redhat:rhel_e4s:8.1::appstream"
] | null | 8.8 | 6.1 | null |
RHSA-2005:033
|
Red Hat Security Advisory: alsa-lib security update
|
security flaw
|
[
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2014:1163
|
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 6.3.0 security update
|
CXF: SSL hostname verification bypass, incomplete CVE-2012-5783 fix CXF: SSL hostname verification bypass, incomplete CVE-2012-6153 fix
|
[
"cpe:/a:redhat:jboss_enterprise_application_platform:6.3"
] | null | null | 4.8 | null |
RHSA-2013:1490
|
Red Hat Security Advisory: kernel-rt security and bug fix update
|
kernel: handling of IPv6 temporary addresses Kernel: HID: memory corruption flaw Kernel: HID: pantherlord: heap overflow flaw Kernel: HID: LG: heap overflow flaw Kernel: HID: logitech-dj: heap overflow flaw Kernel: HID: ntrig: NULL pointer dereference kernel: dm: dm-snapshot data leak Kernel: net: use-after-free TUNSETIFF kernel: ansi_cprng: off by one error in non-block size request kernel: net: deadloop path in skb_flow_dissect() kernel: net: sctp: ipv6 ipsec encryption bug in sctp_v6_xmit Kernel: net: IPv6: panic when UFO=On for an interface
|
[
"cpe:/a:redhat:enterprise_mrg:2:server:el6"
] | null | null | null | null |
RHSA-2023:5223
|
Red Hat Security Advisory: thunderbird security update
|
libwebp: Heap buffer overflow in WebP Codec libwebp: out-of-bounds write with a specially crafted WebP lossless file
|
[
"cpe:/a:redhat:rhel_eus:9.0::appstream"
] | null | 0 | null | null |
RHSA-2020:1650
|
Red Hat Security Advisory: container-tools:rhel8 security, bug fix, and enhancement update
|
runc: volume mount race condition with shared mounts leads to information leak/integrity manipulation containers/image: Container images read entire image manifest into memory podman: incorrectly allows existing files in volumes to be overwritten by a container when it is created
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 5.9 | null | null |
RHSA-2024:8727
|
Red Hat Security Advisory: firefox security update
|
firefox: thunderbird: Permission leak via embed or object elements firefox: thunderbird: Use-after-free in layout with accessibility firefox: thunderbird: Confusing display of origin for external protocol handler prompt firefox: thunderbird: XSS due to Content-Disposition being ignored in multipart/x-mixed-replace response firefox: thunderbird: Origin of permission prompt could be spoofed by long URL firefox: thunderbird: Cross origin video frame leak firefox: thunderbird: History interface could have been used to cause a Denial of Service condition in the browser firefox: thunderbird: Clipboard "paste" button persisted across tabs firefox: DOM push subscription message could hang Firefox firefox: thunderbird: Memory safety bugs fixed in Firefox 132, Thunderbird 132, Firefox ESR 128.4, and Thunderbird 128.4
|
[
"cpe:/o:redhat:rhel_els:7"
] | null | 8.8 | null | null |
RHSA-2017:0448
|
Red Hat Security Advisory: ansible and openshift-ansible security and bug fix update
|
Ansible: Compromised remote hosts can lead to running commands on the Ansible controller
|
[
"cpe:/a:redhat:openshift:3.2::el7",
"cpe:/a:redhat:openshift:3.3::el7",
"cpe:/a:redhat:openshift:3.4::el7"
] | null | null | 6.6 | null |
RHSA-2023:4536
|
Red Hat Security Advisory: nodejs:18 security, bug fix, and enhancement update
|
nodejs: mainModule.proto bypass experimental policy mechanism nodejs: process interuption due to invalid Public Key information in x509 certificates nodejs: HTTP Request Smuggling via Empty headers separated by CR nodejs: DiffieHellman do not generate keys after setting a private key
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 7.5 | null | null |
RHSA-2023:0333
|
Red Hat Security Advisory: curl security update
|
curl: POST following PUT confusion
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/o:redhat:enterprise_linux:9::baseos"
] | null | 4.8 | null | null |
RHSA-2015:1194
|
Red Hat Security Advisory: postgresql security update
|
postgresql: double-free after authentication timeout postgresql: unanticipated errors from the standard library postgresql: pgcrypto has multiple error messages for decryption with an incorrect key.
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation",
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | null | null |
RHSA-2016:0596
|
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 6.4.7 update
|
tomcat: non-persistent DoS attack by feeding data by aborting an upload EAP: HTTPS NIO connector uses no timeout when reading SSL handshake from client
|
[
"cpe:/a:redhat:jboss_enterprise_application_platform:6::el6"
] | null | null | null | null |
RHSA-2024:0376
|
Red Hat Security Advisory: kpatch-patch security update
|
kernel: bpf: Incorrect verifier pruning leads to unsafe code paths being incorrectly marked as safe kernel: use after free in unix_stream_sendpage kernel: netfilter: potential slab-out-of-bound access due to integer underflow
|
[
"cpe:/o:redhat:rhel_e4s:8.2::baseos"
] | null | 7 | null | null |
RHSA-2022:6783
|
Red Hat Security Advisory: Red Hat Single Sign-On 7.5.3 security update on RHEL 8
|
jackson-databind: denial of service via a large depth of nested objects h2: Remote Code Execution in Console netty: control chars in header names may lead to HTTP request smuggling xnio: org.xnio.StreamConnection.notifyReadClosed log to debug instead of stderr keycloak: Stored XSS in groups dropdown wildfly: Wildfly management of EJB Session context returns wrong caller principal with Elytron Security enabled keycloak: improper input validation permits script injection keycloak: Uploading of SAML javascript protocol mapper scripts through the admin console
|
[
"cpe:/a:redhat:red_hat_single_sign_on:7.5::el8"
] | null | 6.4 | null | null |
RHSA-2011:1219
|
Red Hat Security Advisory: samba security update
|
samba: mount.cifs improper device name and mountpoint strings sanitization samba: Race condition by mount (mount.cifs) operations samba/cifs-utils: mount.cifs and umount.cifs fail to anticipate RLIMIT_FSIZE (SWAT): Absent CSRF protection in various Samba web configuration formulars (SWAT): XSS flaw in Change Password page Samba mtab lock file race condition
|
[
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws",
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2014:0783
|
Red Hat Security Advisory: Red Hat JBoss Web Server 2.0.1 httpd security and bug fix update
|
httpd: mod_dav denial of service via crafted DAV WRITE request httpd: mod_log_config does not properly handle logging certain cookies resulting in DoS
|
[
"cpe:/a:redhat:jboss_enterprise_web_server:2::el5",
"cpe:/a:redhat:jboss_enterprise_web_server:2::el6"
] | null | null | null | null |
RHSA-2016:1586
|
Red Hat Security Advisory: qemu-kvm-rhev security update
|
Qemu: virtio: unbounded memory allocation on host via guest leading to DoS
|
[
"cpe:/a:redhat:enterprise_linux:6::hypervisor"
] | null | null | 3.4 | null |
RHSA-2020:3099
|
Red Hat Security Advisory: java-11-openjdk security update
|
OpenJDK: Incorrect handling of access control context in ForkJoinPool (Libraries, 8237117) OpenJDK: Excessive memory usage in ImageIO TIFF plugin (ImageIO, 8233239) OpenJDK: Incomplete interface type checks in Graal compiler (Hotspot, 8236867) OpenJDK: HostnameChecker does not ensure X.509 certificate names are in normalized form (JSSE, 8237592) OpenJDK: Bypass of boundary checks in nio.Buffer via concurrent access (Libraries, 8238920) OpenJDK: Incomplete bounds checks in Affine Transformations (2D, 8240119) OpenJDK: XML validation manipulation due to incomplete application of the use-grammar-pool-only feature (JAXP, 8242136)
|
[
"cpe:/a:redhat:rhel_eus:8.1::appstream"
] | null | 5.3 | null | null |
RHSA-2011:0839
|
Red Hat Security Advisory: gimp security update
|
Gimp: Stack-based buffer overflow in Lighting plug-in Gimp: Stack-based buffer overflow in SphereDesigner plug-in Gimp: Stack-based buffer overflow in Gfig plug-in Gimp: Heap-based buffer overflow in Paint Shop Pro (PSP) plug-in
|
[
"cpe:/o:redhat:enterprise_linux:6::server"
] | null | null | null | null |
RHSA-2023:1403
|
Red Hat Security Advisory: thunderbird security update
|
Mozilla: Incorrect code generation during JIT compilation Mozilla: Potential out-of-bounds when accessing throttled streams Mozilla: Invalid downcast in Worklets Mozilla: URL being dragged from a removed cross-origin iframe into the same tab triggered navigation Mozilla: Memory safety bugs fixed in Firefox 111 and Firefox ESR 102.9
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 8.8 | null | null |
RHSA-2014:1998
|
Red Hat Security Advisory: kernel-rt security update
|
kernel: x86: local privesc due to bad_iret and paranoid entry incompatibility
|
[
"cpe:/a:redhat:enterprise_mrg:2:server:el6"
] | null | null | 8.4 | null |
RHSA-2020:4058
|
Red Hat Security Advisory: virt:rhel security update
|
QEMU: usb: out-of-bounds r/w access issue while processing usb packets
|
[
"cpe:/a:redhat:rhel_e4s:8.0::appstream"
] | null | 5 | null | null |
RHSA-2024:9989
|
Red Hat Security Advisory: RHOSP 17.1.4 (python-webob) security update
|
webob: WebOb's location header normalization during redirect leads to open redirect
|
[
"cpe:/a:redhat:openstack:17.1::el8"
] | null | 6.1 | null | null |
RHSA-2024:4366
|
Red Hat Security Advisory: less security update
|
less: OS command injection
|
[
"cpe:/o:redhat:rhel_aus:8.2::baseos"
] | null | 8.6 | null | null |
RHSA-2016:0328
|
Red Hat Security Advisory: openstack-swift security update
|
openstack-swift: Information leak via Swift tempurls openstack-swift: Client to proxy DoS through Large Objects openstack-swift: Proxy to server DoS through Large Objects
|
[
"cpe:/a:redhat:storage:3.1:server:el7"
] | null | null | null | null |
RHSA-2022:0306
|
Red Hat Security Advisory: java-1.8.0-openjdk security update
|
OpenJDK: Incomplete deserialization class filtering in ObjectInputStream (Serialization, 8264934) OpenJDK: Insufficient URI checks in the XSLT TransformerImpl (JAXP, 8270492) OpenJDK: Unexpected exception thrown in regex Pattern (Libraries, 8268813) OpenJDK: Incomplete checks of StringBuffer and StringBuilder during deserialization (Libraries, 8270392) OpenJDK: Incorrect IdentityHashMap size checks during deserialization (Libraries, 8270416) OpenJDK: Incorrect access checks in XMLEntityManager (JAXP, 8270498) OpenJDK: Infinite loop related to incorrect handling of newlines in XMLEntityScanner (JAXP, 8270646) OpenJDK: Array indexing issues in LIRGenerator (Hotspot, 8272014) OpenJDK: Excessive resource use when reading JAR manifest attributes (Libraries, 8272026) OpenJDK: Insufficient checks when deserializing exceptions in ObjectInputStream (Serialization, 8272236) OpenJDK: Excessive memory allocation in BMPImageReader (ImageIO, 8273756) OpenJDK: Integer overflow in BMPImageReader (ImageIO, 8273838)
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 5.3 | null | null |
RHSA-2020:2429
|
Red Hat Security Advisory: kernel security and bug fix update
|
kernel: powerpc: incomplete Spectre-RSB mitigation leads to information exposure Kernel: NetLabel: null pointer dereference while receiving CIPSO packet with null category may cause kernel panic Kernel: s390: page table upgrade in secondary address mode may lead to privilege escalation kernel: use-after-free in block/bfq-iosched.c related to bfq_idle_slice_timer_body
|
[
"cpe:/o:redhat:rhel_e4s:8.0::baseos"
] | null | 7 | null | null |
RHSA-2016:0724
|
Red Hat Security Advisory: qemu-kvm security update
|
qemu: incorrect banked access bounds checking in vga module
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 7.6 | null |
RHSA-2007:0089
|
Red Hat Security Advisory: php security update for Stronghold
|
security flaw security flaw security flaw security flaw security flaw security flaw php session extension information leak php session extension global variable clobber php imap_mail_compose() buffer overflow via type.parameters
|
[
"cpe:/a:redhat:rhel_stronghold:4.0"
] | null | null | null | null |
RHSA-2024:1802
|
Red Hat Security Advisory: unbound security update
|
unbound: unrestricted reconfiguration enabled to anyone that may lead to local privilege escalation
|
[
"cpe:/a:redhat:rhel_eus:8.8::appstream"
] | null | 8 | null | null |
RHSA-2022:8638
|
Red Hat Security Advisory: krb5 security update
|
krb5: integer overflow vulnerabilities in PAC parsing
|
[
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 8.8 | null | null |
RHSA-2024:6912
|
Red Hat Security Advisory: go-toolset:rhel8 security update
|
net/http: Denial of service due to improper 100-continue handling in net/http encoding/gob: golang: Calling Decoder.Decode on a message which contains deeply nested structures can cause a panic due to stack exhaustion
|
[
"cpe:/a:redhat:rhel_eus:8.8::appstream"
] | null | 7.5 | null | null |
RHSA-2023:4125
|
Red Hat Security Advisory: kernel security and bug fix update
|
kernel: net/ulp: use-after-free in listening ULP sockets kernel: tcindex: use-after-free vulnerability in traffic control index filter allows privilege escalation kernel: remote DoS in TIPC kernel module kernel: netfilter: use-after-free in nf_tables when processing batch requests can lead to privilege escalation
|
[
"cpe:/o:redhat:rhel_aus:8.2::baseos",
"cpe:/o:redhat:rhel_e4s:8.2::baseos",
"cpe:/o:redhat:rhel_tus:8.2::baseos"
] | null | 7.8 | null | null |
RHSA-2022:6268
|
Red Hat Security Advisory: convert2rhel security, bug fix, and enhancement update
|
convert2rhel: Activation key passed via command line by code
|
[
"cpe:/a:redhat:convert2rhel::el7"
] | null | 5.5 | null | null |
RHSA-2024:2160
|
Red Hat Security Advisory: toolbox security update
|
golang: html/template: improper handling of HTML-like comments within script contexts golang: html/template: improper handling of special tags within script contexts golang: net/http/internal: Denial of Service (DoS) via Resource Consumption via HTTP requests
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 5.3 | null | null |
RHSA-2007:0968
|
Red Hat Security Advisory: pcre security update
|
pcre regular expression flaws
|
[
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2003:316
|
Red Hat Security Advisory: : Updated iproute packages fix local security vulnerability
|
security flaw
|
[
"cpe:/o:redhat:linux:7.1",
"cpe:/o:redhat:linux:7.2",
"cpe:/o:redhat:linux:7.3",
"cpe:/o:redhat:linux:8.0",
"cpe:/o:redhat:linux:9"
] | null | null | null | null |
RHSA-2024:4670
|
Red Hat Security Advisory: thunderbird security update
|
Mozilla: Race condition in permission assignment Mozilla: Memory corruption in NSS Mozilla: Memory corruption in thread creation Mozilla: Memory safety bugs fixed in Firefox 128, Firefox ESR 115.13, and Thunderbird 115.13
|
[
"cpe:/a:redhat:rhel_eus:9.2::appstream"
] | null | 7.5 | null | null |
RHSA-2011:0842
|
Red Hat Security Advisory: systemtap security update
|
systemtap: does not guard against DWARF operations div-by-zero errors, which can cause a kernel panic systemtap: divide by zero stack unwinding flaw
|
[
"cpe:/o:redhat:enterprise_linux:6::server"
] | null | null | null | null |
RHSA-2018:0342
|
Red Hat Security Advisory: rh-maven35-jackson-databind security update
|
jackson-databind: Deserialization vulnerability via readValue method of ObjectMapper jackson-databind: Unsafe deserialization due to incomplete black list (incomplete fix for CVE-2017-7525) jackson-databind: Unsafe deserialization due to incomplete black list (incomplete fix for CVE-2017-15095)
|
[
"cpe:/a:redhat:rhel_software_collections:3::el7"
] | null | null | 8.1 | null |
RHSA-2022:0075
|
Red Hat Security Advisory: webkit2gtk3 security update
|
webkitgtk: Use-after-free leading to arbitrary code execution
|
[
"cpe:/a:redhat:rhel_eus:8.2::appstream"
] | null | 8.8 | null | null |
RHSA-2024:0766
|
Red Hat Security Advisory: OpenShift Container Platform 4.15.0 security update
|
golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487) opentelemetry: DoS vulnerability in otelhttp opentelemetry-go-contrib: DoS vulnerability in otelgrpc due to unbound cardinality metrics ssh: Prefix truncation attack on Binary Packet Protocol (BPP)
|
[
"cpe:/a:redhat:openshift:4.15::el8",
"cpe:/a:redhat:openshift:4.15::el9"
] | null | 5.9 | null | null |
RHSA-2017:3400
|
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 5.2 security update
|
log4j: Socket receiver deserialization vulnerability log4j: deserialization of untrusted data in SocketServer
|
[
"cpe:/a:redhat:jboss_enterprise_application_platform:5"
] | null | 9.8 | 8.1 | null |
RHSA-2010:0860
|
Red Hat Security Advisory: samba security update
|
Samba: Stack-based buffer overflow by processing specially-crafted SID records
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2023:0612
|
Red Hat Security Advisory: rh-nodejs14-nodejs and rh-nodejs14-nodejs-nodemon security update
|
glob-parent: Regular Expression Denial of Service minimist: prototype pollution node-fetch: exposure of sensitive information to an unauthorized actor nodejs-minimatch: ReDoS via the braceExpand function express: "qs" prototype poisoning causes the hang of the node process nodejs: DNS rebinding in inspect via invalid octal IP address
|
[
"cpe:/a:redhat:rhel_software_collections:3::el7"
] | null | 7.5 | null | null |
RHSA-2024:4249
|
Red Hat Security Advisory: c-ares security update
|
c-ares: Out of bounds read in ares__read_line()
|
[
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 4.4 | null | null |
RHSA-2022:1439
|
Red Hat Security Advisory: OpenJDK 11.0.15 security update for Windows Builds
|
OpenJDK: Unbounded memory allocation when compiling crafted XPath expressions (JAXP, 8270504) OpenJDK: Improper object-to-string conversion in AnnotationInvocationHandler (Libraries, 8277672) OpenJDK: Missing check for negative ObjectIdentifier (Libraries, 8275151) OpenJDK: Defective secure validation in Apache Santuario (Libraries, 8278008) OpenJDK: URI parsing inconsistencies (JNDI, 8278972)
|
[
"cpe:/a:redhat:openjdk:11::windows"
] | null | 5.3 | null | null |
RHSA-2005:068
|
Red Hat Security Advisory: less security update
|
security flaw
|
[
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws"
] | null | null | null | null |
RHSA-2023:3586
|
Red Hat Security Advisory: nodejs security update
|
c-ares: AutoTools does not set CARES_RANDOM_FILE during cross compilation c-ares: Buffer Underwrite in ares_inet_net_pton() c-ares: Insufficient randomness in generation of DNS query IDs c-ares: 0-byte UDP payload Denial of Service
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 7.5 | null | null |
RHSA-2018:1235
|
Red Hat Security Advisory: OpenShift Container Platform 3.5 security, bug fix, and enhancement update
|
source-to-image: Improper path sanitization in ExtractTarStreamFromTarReader in tar/tar.go
|
[
"cpe:/a:redhat:openshift:3.5::el7"
] | null | null | 9.9 | null |
RHSA-2007:1086
|
Red Hat Security Advisory: java-1.4.2-bea security update
|
Integer overflow in the embedded ICC profile image parser in Sun Java Development Kit BMP image parser vulnerability Java Secure Socket Extension Does Not Correctly Process SSL/TLS Handshake Requests Resulting in a Denial of Service (DoS) Condition java: Vulnerability in the font parsing code
|
[
"cpe:/a:redhat:rhel_extras:4"
] | null | null | null | null |
RHSA-2024:3354
|
Red Hat Security Advisory: Red Hat Fuse 7.13.0 release and security update
|
ActiveMQ: Deserialization vulnerability on Jolokia that allows authenticated users to perform RCE undertow: OutOfMemoryError due to @MultipartConfig handling JSON-java: parser confusion leads to OOM logback: serialization vulnerability in logback receiver logback: A serialization vulnerability in logback receiver spring-boot: org.springframework.boot: spring-boot-actuator class vulnerable to denial of service jetty: hpack header values cause denial of service in http/2 jetty: Improper addition of quotation marks to user inputs in CgiServlet apache-avro: Apache Avro Java SDK: Memory when deserializing untrusted data in Avro Java SDK jetty: Improper validation of HTTP/1 content-length tomcat: HTTP request smuggling via malformed trailer headers shiro: path traversal attack may lead to authentication bypass Solr: Host environment variables are published via the Metrics API undertow: Out-of-memory Error after several closed connections with wildfly-http-client protocol tomcat: Leaking of unrelated request bodies in default error page springframework: URL Parsing with Host Validation cxf-core: Apache CXF SSRF Vulnerability using the Aegis databinding
|
[
"cpe:/a:redhat:jboss_fuse:7"
] | null | 7.4 | null | null |
RHSA-2015:2077
|
Red Hat Security Advisory: rh-postgresql94-postgresql security update
|
postgresql: limited memory disclosure flaw in crypt() postgresql: stack overflow DoS when parsing json or jsonb inputs
|
[
"cpe:/a:redhat:rhel_software_collections:2::el6",
"cpe:/a:redhat:rhel_software_collections:2::el7"
] | null | null | null | null |
RHSA-2019:1518
|
Red Hat Security Advisory: java-11-openjdk security update
|
OpenJDK: Slow conversion of BigDecimal to long (Libraries, 8211936) OpenJDK: Incorrect skeleton selection in RMI registry server-side dispatch handling (RMI, 8218453)
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | null | 5.9 | null |
RHSA-2017:3195
|
Red Hat Security Advisory: httpd security update
|
httpd: ap_get_basic_auth_pw() authentication bypass httpd: mod_ssl NULL pointer dereference httpd: mod_mime buffer overread httpd: Uninitialized memory reflection in mod_auth_digest httpd: Use-after-free by limiting unregistered HTTP method (Optionsbleed)
|
[
"cpe:/o:redhat:rhel_eus:6.7::computenode",
"cpe:/o:redhat:rhel_eus:6.7::server"
] | null | null | 5.9 | null |
RHSA-2024:7184
|
Red Hat Security Advisory: OpenShift Container Platform 4.14.38 security update
|
goproxy: Denial of service (DoS) via unspecified vectors. opentelemetry-go-contrib: DoS vulnerability in otelgrpc due to unbound cardinality metrics go-retryablehttp: url might write sensitive information to log file golang-protobuf: encoding/protojson, internal/encoding/json: infinite loop in protojson.Unmarshal when unmarshaling certain forms of invalid JSON
|
[
"cpe:/a:redhat:openshift:4.14::el8",
"cpe:/a:redhat:openshift:4.14::el9"
] | null | 5.9 | null | null |
RHSA-2024:9450
|
Red Hat Security Advisory: python3.11 security update
|
python: cpython: tarfile: ReDos via excessive backtracking while parsing header values
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::crb"
] | null | 7.5 | null | null |
RHSA-2022:0548
|
Red Hat Security Advisory: ruby:2.5 security update
|
rubygem-bundler: Dependencies of gems with explicit source may be installed from a different source
|
[
"cpe:/a:redhat:rhel_e4s:8.1::appstream"
] | null | 8.8 | null | null |
RHSA-2020:5408
|
Red Hat Security Advisory: xorg-x11-server security update
|
xorg-x11-server: Leak of uninitialized heap memory from the X server to clients in AllocatePixmap of dix/pixmap.c xorg-x11-server: Out-of-bounds access in XkbSetMap function xorg-x11-server: XkbSetDeviceInfo heap-based buffer overflow privilege escalation vulnerability
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 7.8 | null | null |
RHSA-2020:0542
|
Red Hat Security Advisory: ruby security update
|
ruby: DoS by large request in WEBrick ruby: Unintentional directory traversal by poisoned NULL byte in Dir rubygems: Path traversal when writing to a symlinked basedir outside of the root rubygems: Unsafe Object Deserialization Vulnerability in gem owner allowing arbitrary code execution on specially crafted YAML rubygems: Infinite loop vulnerability due to negative size in tar header causes Denial of Service rubygems: Improper verification of signatures in tarball allows to install mis-signed gem rubygems: Missing URL validation on spec home attribute allows malicious gem to set an invalid homepage URL rubygems: XSS vulnerability in homepage attribute when displayed via gem server rubygems: Path traversal issue during gem installation allows to write to arbitrary filesystem locations
|
[
"cpe:/o:redhat:rhel_eus:7.5::computenode",
"cpe:/o:redhat:rhel_eus:7.5::server"
] | null | null | 5.5 | null |
RHSA-2012:1431
|
Red Hat Security Advisory: flash-plugin security update
|
flash-plugin: multiple code-execution flaws (APSB12-24) flash-plugin: multiple code-execution flaws (APSB12-24) flash-plugin: multiple code-execution flaws (APSB12-24) flash-plugin: multiple code-execution flaws (APSB12-24) flash-plugin: multiple code-execution flaws (APSB12-24) flash-plugin: multiple code-execution flaws (APSB12-24) flash-plugin: multiple code-execution flaws (APSB12-24)
|
[
"cpe:/a:redhat:rhel_extras:5::client",
"cpe:/a:redhat:rhel_extras:5::server",
"cpe:/a:redhat:rhel_extras:6"
] | null | null | null | null |
RHSA-2016:1474
|
Red Hat Security Advisory: openstack-neutron security, bug fix, and enhancement update
|
openstack-neutron: ICMPv6 source address spoofing vulnerability openstack-neutron: DHCP spoofing vulnerability openstack-neutron: MAC source address spoofing vulnerability
|
[
"cpe:/a:redhat:openstack:7::el7"
] | null | null | 6.3 | null |
RHSA-2025:1250
|
Red Hat Security Advisory: python-jinja2 security update
|
jinja2: Jinja has a sandbox breakout through indirect reference to format method
|
[
"cpe:/o:redhat:rhel_els:7"
] | null | 6.3 | null | null |
RHSA-2024:9738
|
Red Hat Security Advisory: squid security update
|
squid: Denial of Service processing ESI response content
|
[
"cpe:/o:redhat:rhel_els:7"
] | null | 7.5 | null | null |
RHSA-2017:2456
|
Red Hat Security Advisory: firefox security update
|
Mozilla: Out-of-bounds read with cached style data and pseudo-elements (MFSA 2017-19) Mozilla: Memory safety bugs fixed in Firefox 55 and Firefox ESR 52.3 (MFSA 2017-19) Mozilla: Use-after-free with image observers (MFSA 2017-19) Mozilla: Buffer overflow manipulating ARIA elements in DOM (MFSA 2017-19) Mozilla: Buffer overflow while painting non-displayable SVG (MFSA 2017-19) Mozilla: Same-origin policy bypass with iframes through page reloads (MFSA 2017-19) Mozilla: Spoofing following page navigation with data: protocol and modal alerts (MFSA 2017-19) Mozilla: Buffer overflow viewing certificates with long OID (MFSA 2017-19) Mozilla: XUL injection in the style editor in devtools (MFSA 2017-19) Mozilla: Use-after-free in WebSockets during disconnection (MFSA 2017-19) Mozilla: Use-after-free with marquee during window resizing Mozilla: Use-after-free resizing image elements (MFSA 2017-19) Mozilla: CSP directives improperly applied with sandbox flag in iframes (MFSA 2017-19) Mozilla: Domain hijacking through appcache fallback (MFSA 2017-19) Mozilla: Use-after-free while deleting attached editor DOM node (MFSA 2017-19)
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation",
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 9.8 | null |
RHSA-2008:0924
|
Red Hat Security Advisory: condor security, bug fix and enhancement update
|
condor: users can run jobs with arbitrary owners condor: buffer overflow in lookup_macro condor: denial of service attack on Schedd via corrupt logfile condor: allow or deny with overlapping netmasks may be ignored
|
[
"cpe:/a:redhat:enterprise_mrg:1.0::el4"
] | null | null | null | null |
RHSA-2020:0773
|
Red Hat Security Advisory: qemu-kvm-rhev security update
|
QEMU: block: iscsi: OOB heap access via an unexpected response of iSCSI Server
|
[
"cpe:/a:redhat:openstack:13::el7"
] | null | 6 | null | null |
RHSA-2024:1368
|
Red Hat Security Advisory: kpatch-patch security update
|
kernel: use-after-free in sch_qfq network scheduler kernel: ktls overwrites readonly memory pages when using function splice with a ktls socket as destination
|
[
"cpe:/o:redhat:rhel_eus:8.8::baseos"
] | null | 7 | null | null |
RHSA-2017:1203
|
Red Hat Security Advisory: Red Hat Single Sign-On Node.js adapter security update
|
keycloak-connect: auth token validity check ignored
|
[
"cpe:/a:redhat:jboss_single_sign_on:7.1"
] | null | null | 8.1 | null |
RHSA-2021:3768
|
Red Hat Security Advisory: kpatch-patch security update
|
kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks kernel: powerpc: KVM guest OS users can cause host OS memory corruption
|
[
"cpe:/o:redhat:enterprise_linux:7::server"
] | null | 7.8 | null | null |
RHSA-2024:7488
|
Red Hat Security Advisory: go-toolset:rhel8 security update
|
encoding/gob: golang: Calling Decoder.Decode on a message which contains deeply nested structures can cause a panic due to stack exhaustion
|
[
"cpe:/a:redhat:rhel_aus:8.4::appstream",
"cpe:/a:redhat:rhel_e4s:8.4::appstream",
"cpe:/a:redhat:rhel_tus:8.4::appstream"
] | null | 7.5 | null | null |
RHSA-2023:0399
|
Red Hat Security Advisory: kernel security and bug fix update
|
hw: cpu: LFENCE/JMP Mitigation Update for CVE-2017-5715 kernel: memory corruption in AX88179_178A based USB ethernet device.
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 7.8 | null | null |
RHSA-2021:0537
|
Red Hat Security Advisory: kernel-rt security and bug fix update
|
kernel: performance counters race condition use-after-free kernel: ICMP rate limiting can be used for DNS poisoning attack kernel: locking issue in drivers/tty/tty_jobctrl.c can lead to an use-after-free
|
[
"cpe:/a:redhat:enterprise_linux:8::nfv",
"cpe:/a:redhat:enterprise_linux:8::realtime"
] | null | 7.8 | null | null |
RHSA-2023:3379
|
Red Hat Security Advisory: Red Hat Advanced Cluster Security for Kubernetes 3.73 security update
|
golang: html/template: improper handling of JavaScript whitespace
|
[
"cpe:/a:redhat:advanced_cluster_security:3.73::el8"
] | null | 8.1 | null | null |
RHSA-2016:0638
|
Red Hat Security Advisory: chromium-browser security update
|
chromium-browser: out-of-bounds read in Pdfium JPEG2000 decoding chromium-browser: universal XSS in extension bindings chromium-browser: out-of-bounds write in V8 chromium-browser: uninitialized memory read in media chromium-browser: use-after-free related to extensions chromium-browser: android downloaded file path restriction bypass chromium-browser: address bar spoofing chromium-browser: potential leak of sensitive information to malicious extensions chromium-browser: various fixes from internal audits
|
[
"cpe:/a:redhat:rhel_extras:6"
] | null | null | null | null |
RHSA-2025:3755
|
Red Hat Security Advisory: webkit2gtk3 security update
|
webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash webkitgtk: A malicious website may exfiltrate data cross-origin webkitgtk: Processing web content may lead to a denial-of-service webkitgtk: Loading a malicious iframe may lead to a cross-site scripting attack webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash
|
[
"cpe:/a:redhat:rhel_eus:9.4::appstream"
] | null | 8.8 | null | null |
RHSA-2011:0219
|
Red Hat Security Advisory: Red Hat Enterprise Linux 4 - 1-Year End Of Life Notice
|
This is the 1-year notification of the End Of Life plans for Red Hat
Enterprise Linux 4.
|
[
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2011:0859
|
Red Hat Security Advisory: cyrus-imapd security update
|
cyrus-imapd: STARTTLS plaintext command injection
|
[
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws",
"cpe:/o:redhat:enterprise_linux:5::server",
"cpe:/o:redhat:enterprise_linux:6::server"
] | null | null | null | null |
RHSA-2024:8800
|
Red Hat Security Advisory: openexr security update
|
OpenEXR: Heap Overflow in Scanline Deep Data Parsing
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::crb"
] | null | 9.1 | null | null |
RHSA-2024:0893
|
Red Hat Security Advisory: python-pillow security update
|
pillow: Arbitrary Code Execution via the environment parameter
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb"
] | null | 8.1 | null | null |
RHSA-2014:0025
|
Red Hat Security Advisory: cfme security, bug fix, and enhancement update
|
CFME: GET request CSRF vulnerability
|
[
"cpe:/a:redhat:cloudforms_managementengine:5::el6"
] | null | null | null | null |
RHSA-2002:312
|
Red Hat Security Advisory: openldap security update
|
security flaw security flaw security flaw
|
[
"cpe:/o:redhat:enterprise_linux:2.1::as",
"cpe:/o:redhat:enterprise_linux:2.1::aw"
] | null | null | null | null |
RHSA-2017:3261
|
Red Hat Security Advisory: samba security update
|
samba: Use-after-free in processing SMB1 requests samba: Server heap-memory disclosure
|
[
"cpe:/a:redhat:storage:3.3:samba:el6",
"cpe:/a:redhat:storage:3.3:samba:el7"
] | null | null | 4.3 | null |
RHSA-2024:1434
|
Red Hat Security Advisory: Red Hat OpenShift distributed tracing 3.1.1 operator/operand containers
|
golang: net/http/internal: Denial of Service (DoS) via Resource Consumption via HTTP requests
|
[
"cpe:/a:redhat:openshift_distributed_tracing:3.1::el8"
] | null | 5.3 | null | null |
RHSA-2009:1551
|
Red Hat Security Advisory: java-1.4.2-ibm security update
|
OpenJDK RSA public key length denial-of-service (6497740) OpenJDK: DoS (disk consumption) via handling of temporary font files JDK: XML parsing Denial-Of-Service (6845701) java-1.6.0-sun: Privilege escalation via crafted image file due improper color profiles parsing (6862970) JRE JPEG JFIF Decoder issue (6862969) OpenJDK JPEG Image Writer quantization problem (6862968) OpenJDK ASN.1/DER input stream parser denial of service (6864911) CVE-2009-3877 OpenJDK ASN.1/DER input stream parser denial of service (6864911) CVE-2009-3877
|
[
"cpe:/a:redhat:rhel_extras_sap:4",
"cpe:/a:redhat:rhel_extras_sap:5"
] | null | null | null | null |
RHSA-2024:2560
|
Red Hat Security Advisory: libvirt security and bug fix update
|
libvirt: off-by-one error in udevListInterfacesByStatus() libvirt: negative g_new0 length can lead to unbounded memory allocation
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::crb"
] | null | 6.2 | null | null |
RHSA-2013:0165
|
Red Hat Security Advisory: java-1.7.0-openjdk security update
|
OpenJDK: MethodHandles incorrect permission checks (Libraries, 8004933) OpenJDK: MethodHandles.Lookup incorrect permission checks, Java 7 0day (Libraries, 8006017)
|
[
"cpe:/o:redhat:enterprise_linux:5::server",
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2005:670
|
Red Hat Security Advisory: xpdf security update
|
security flaw
|
[
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2013:1171
|
Red Hat Security Advisory: condor security update
|
condor: condor_startd DoS when parsing policy definition that evaluates to ERROR or UNDEFINED
|
[
"cpe:/a:redhat:enterprise_mrg:2::el5"
] | null | null | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.