id
stringlengths 13
15
| title
stringlengths 29
176
| description
stringlengths 8
32.1k
| cpes
sequencelengths 0
20
| cvss_v4_0
null | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
null |
---|---|---|---|---|---|---|---|
RHSA-2021:1983 | Red Hat Security Advisory: idm:DL1 security update | slapi-nis: NULL dereference (DoS) with specially crafted Binding DN | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 7.5 | null | null |
RHSA-2011:0007 | Red Hat Security Advisory: kernel security and bug fix update | kernel: ecryptfs_uid_hash() buffer overflow kernel: do_io_submit() infoleak kernel: xfs: XFS_IOC_FSGETXATTR ioctl memory leak kernel: /dev/sequencer open failure is not handled correctly kernel: drivers/net/usb/hso.c: prevent reading uninitialized memory kernel: net/sched/act_police.c infoleak kernel: heap contents leak from ETHTOOL_GRXCLSRLALL kernel: iovec integer overflow in net/rds/rdma.c kernel: CAN minor heap overflow kernel: net/packet/af_packet.c: reading uninitialized stack memory kernel: logic error in INET_DIAG bytecode auditing kernel: ipc/shm.c: reading uninitialized stack memory kernel: ipc/compat*.c: reading uninitialized stack memory kernel: drivers/usb/serial/mos*.c: reading uninitialized stack memory kernel: drivers/serial/serial_core.c: reading uninitialized stack memory kernel: drivers/char/nozomi.c: reading uninitialized stack memory kernel: drivers/video/ivtv/ivtvfb.c: reading uninitialized stack memory kernel: drivers/sound/pci/rme9652/hdsp.c: reading uninitialized stack memory kernel: drivers/sound/pci/rme9652/hdspm.c: reading uninitialized stack memory kernel: drivers/video/via/ioctl.c: reading uninitialized stack memory kernel: ipc/sem.c: reading uninitialized stack memory kernel: socket filters infoleak kernel: L2TP send buffer allocation size overflows kernel: bio: integer overflow page count when mapping/copying user data kernel: panic when submitting certain 0-length I/O requests kernel: missing tty ops write function presence check in hci_uart_tty_open() kernel: posix-cpu-timers: workaround to suppress the problems with mt exec kernel: unix socket local dos kernel: igb panics when receiving tag vlan packet kvm: x86: zero kvm_vcpu_events->interrupt.pad infoleak kernel: panic when submitting certain 0-length I/O requests | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2023:4201 | Red Hat Security Advisory: webkit2gtk3 security update | webkitgtk: Memory corruption issue when processing web content webkitgtk: use after free vulnerability webkitgtk: memory corruption issue leading to arbitrary code execution webkitgtk: type confusion issue leading to arbitrary code execution webkitgtk: processing web content may lead to arbitrary code execution webkitgtk: arbitrary code execution webkitgtk: arbitrary code execution webkitgtk: arbitrary code execution webkitgtk: processing web content may lead to arbitrary code execution webkitgtk: processing malicious web content may lead to arbitrary code execution webkitgtk: Out-of-bounds read leads to sensitive data leak webkitgtk: type confusion may lead to arbitrary code execution webkit: processing malicious web content may lead to denial-of-service webkitgtk: Processing web content may lead to arbitrary code execution webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution webkit: pointer authentication bypass webkitgtk: Processing web content may lead to a denial-of-service webkitgtk: Processing web content may lead to a denial-of-service webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash | [
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 8.8 | null | null |
RHSA-2020:3592 | Red Hat Security Advisory: bash security update | bash: BASH_CMD is writable in restricted bash shells | [
"cpe:/o:redhat:rhel_eus:7.7::computenode",
"cpe:/o:redhat:rhel_eus:7.7::server"
] | null | 7.8 | null | null |
RHSA-2017:3046 | Red Hat Security Advisory: java-1.7.0-oracle security update | zlib: Out-of-bounds pointer arithmetic in inftrees.c zlib: Out-of-bounds pointer arithmetic in inffast.c zlib: Undefined left shift of negative number zlib: Big-endian out-of-bounds pointer lcms2: Out-of-bounds read in Type_MLU_Read() OpenJDK: CardImpl incorrect state handling (Smart Card IO, 8169026) OpenJDK: multiple unbounded memory allocations in deserialization (Serialization, 8174109) OpenJDK: incorrect privilege use when handling unreferenced objects (RMI, 8174966) JDK: unspecified vulnerability fixed in 6u171, 7u161, 8u151, and 9.0.1 (Javadoc) OpenJDK: HTTP client insufficient check for newline in URLs (Networking, 8176751) OpenJDK: unbounded resource use in JceKeyStore deserialization (Serialization, 8181370) OpenJDK: insufficient loader constraints checks for invokespecial (Hotspot, 8180711) OpenJDK: unbounded memory allocation in SimpleTimeZone deserialization (Serialization, 8181323) OpenJDK: multiple unbounded memory allocations in deserialization (Libraries, 8181432) OpenJDK: unbounded memory allocation in PredicatedNodeTest deserialization (JAXP, 8181327) OpenJDK: unbounded memory allocation in JAXWSExceptionBase deserialization (JAX-WS, 8181100) OpenJDK: no default network operations timeouts in FtpClient (Networking, 8181612) OpenJDK: weak protection of key stores against brute forcing (Security, 8181692) OpenJDK: unbounded memory allocation in ObjectInputStream deserialization (Serialization, 8181597) OpenJDK: use of unprotected sname in Kerberos client (Libraries, 8178794) | [
"cpe:/a:redhat:rhel_extras_oracle_java:6",
"cpe:/a:redhat:rhel_extras_oracle_java:7"
] | null | null | 6.8 | null |
RHBA-2018:1816 | Red Hat Bug Fix Advisory: OpenShift Container Platform 3.10 RPM Release Advisory | jenkins: CLI leaked existence of views and agents with attacker-specified names to users without Overall/Read permission (SECURITY-754) | [
"cpe:/a:redhat:openshift:3.10::el7"
] | null | null | 3.7 | null |
RHSA-2024:3951 | Red Hat Security Advisory: firefox security update | Mozilla: Use-after-free in JavaScript object transplant Mozilla: External protocol handlers leaked by timing attack Mozilla: Sandboxed iframes were able to bypass sandbox restrictions to open a new window Mozilla: Cross-Origin Image leak via Offscreen Canvas Mozilla: Memory Corruption in Text Fragments Mozilla: Memory safety bugs fixed in Firefox 127, Firefox ESR 115.12, and Thunderbird 115.12 Mozilla: Use-after-free in networking | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 7.5 | null | null |
RHSA-2023:4730 | Red Hat Security Advisory: OpenShift Container Platform 4.13.10 security update | mongo-go-driver: specific cstrings input may not be properly validated | [
"cpe:/a:redhat:openshift:4.13::el8"
] | null | 6.5 | null | null |
RHSA-2023:3353 | Red Hat Security Advisory: Multicluster Engine for Kubernetes 2.0.9 security fixes and container updates | vm2: Inspect Manipulation vm2: Sandbox Escape | [
"cpe:/a:redhat:multicluster_engine:2.0::el8"
] | null | 9.8 | null | null |
RHSA-2018:0294 | Red Hat Security Advisory: Red Hat JBoss Data Grid 7.1.2 security update | jasypt: Vulnerable to timing attack against the password hash comparison jackson-databind: Deserialization vulnerability via readValue method of ObjectMapper infinispan: Unsafe deserialization of malicious object injected into data cache | [
"cpe:/a:redhat:jboss_data_grid:7.1"
] | null | null | 8 | null |
RHSA-2023:3292 | Red Hat Security Advisory: httpd24-httpd security update | httpd: HTTP request splitting with mod_rewrite and mod_proxy | [
"cpe:/a:redhat:rhel_software_collections:3::el7"
] | null | 9.8 | null | null |
RHSA-2024:7725 | Red Hat Security Advisory: Red Hat OpenShift Service Mesh Containers for 2.5.5 | envoy: Envoy incorrectly accepts HTTP 200 response for entering upgrade mode envoy: HTTP/2 CPU exhaustion due to CONTINUATION frame flood envoy: abnormal termination when using auto_sni with authority header longer than 255 characters envoy: Brotli decompressor infinite loop webpack: DOM Clobbering vulnerability in AutoPublicPathRuntimeModule send: Code Execution Vulnerability in Send Library serve-static: Improper Sanitization in serve-static body-parser: Denial of Service Vulnerability in body-parser envoy: Potential to manipulate `x-envoy` headers from external sources | [
"cpe:/a:redhat:service_mesh:2.5::el8"
] | null | 7.4 | null | null |
RHSA-2009:1563 | Red Hat Security Advisory: tomcat security update | Improve cookie parsing for tomcat5 tomcat request dispatcher information disclosure vulnerability tomcat6 Denial-Of-Service with AJP connection tomcat6 Information disclosure in authentication classes tomcat XML parser information disclosure | [
"cpe:/a:redhat:rhel_developer_suite:3"
] | null | null | null | null |
RHSA-2019:1022 | Red Hat Security Advisory: python-jinja2 security update | python-jinja2: Sandbox escape due to information disclosure via str.format | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 9 | null |
RHSA-2021:3590 | Red Hat Security Advisory: mysql:8.0 security, bug fix, and enhancement update | mysql: Server: Stored Procedure unspecified vulnerability (CPU Oct 2020) mysql: Server: FTS unspecified vulnerability (CPU Oct 2020) mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2020) mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2020) mysql: InnoDB unspecified vulnerability (CPU Oct 2020) mysql: InnoDB unspecified vulnerability (CPU Oct 2020) mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2020) mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2020) mysql: Server: PS unspecified vulnerability (CPU Oct 2020) mysql: Server: FTS unspecified vulnerability (CPU Oct 2020) mysql: Server: PS unspecified vulnerability (CPU Oct 2020) mysql: InnoDB unspecified vulnerability (CPU Oct 2020) mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2020) mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2020) mysql: Server: Security: Encryption unspecified vulnerability (CPU Oct 2020) mysql: Server: FTS unspecified vulnerability (CPU Oct 2020) mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2020) mysql: Server: Locking unspecified vulnerability (CPU Oct 2020) mysql: Server: DML unspecified vulnerability (CPU Oct 2020) mysql: InnoDB unspecified vulnerability (CPU Oct 2020) mysql: Server: DML unspecified vulnerability (CPU Oct 2020) mysql: InnoDB unspecified vulnerability (CPU Oct 2020) mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2020) mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2020) mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2020) mysql: Server: Security: Privileges unspecified vulnerability (CPU Oct 2020) mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2020) mysql: Server: PS unspecified vulnerability (CPU Oct 2020) mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2020) mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2020) mysql: InnoDB unspecified vulnerability (CPU Oct 2020) mysql: Server: Charsets unspecified vulnerability (CPU Oct 2020) mysql: Server: Security: Roles unspecified vulnerability (CPU Oct 2020) mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2020) mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2020) mysql: Server: DDL unspecified vulnerability (CPU Oct 2020) mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2020) mysql: Server: X Plugin unspecified vulnerability (CPU Oct 2020) mysql: Server: Logging unspecified vulnerability (CPU Oct 2020) mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2020) mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2020) mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2020) mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2021) mysql: Server: Replication unspecified vulnerability (CPU Jan 2021) mysql: C API unspecified vulnerability (CPU Jan 2021) mysql: C API unspecified vulnerability (CPU Jan 2021) mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2021) mysql: InnoDB unspecified vulnerability (CPU Jan 2021) mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2021) mysql: InnoDB unspecified vulnerability (CPU Jan 2021) mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2021) mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2021) mysql: Information Schema unspecified vulnerability (CPU Jan 2021) mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2021) mysql: Server: Components Services unspecified vulnerability (CPU Jan 2021) mysql: InnoDB unspecified vulnerability (CPU Jan 2021) mysql: Server: Stored Procedure unspecified vulnerability (CPU Jan 2021) mysql: InnoDB unspecified vulnerability (CPU Jan 2021) mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2021) mysql: Server: DML unspecified vulnerability (CPU Jan 2021) mysql: Server: Locking unspecified vulnerability (CPU Jan 2021) mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2021) mysql: Server: DDL unspecified vulnerability (CPU Jan 2021) mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2021) mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2021) mysql: Server: Stored Procedure unspecified vulnerability (CPU Jan 2021) mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2021) mysql: Server: Stored Procedure unspecified vulnerability (CPU Jan 2021) mysql: Server: DML unspecified vulnerability (CPU Jan 2021) mysql: Server: DML unspecified vulnerability (CPU Jan 2021) mysql: Server: DDL unspecified vulnerability (CPU Jan 2021) mysql: Server: Options unspecified vulnerability (CPU Apr 2021) mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2021) mysql: Server: DML unspecified vulnerability (CPU Apr 2021) mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2021) mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2021) mysql: Server: Replication unspecified vulnerability (CPU Apr 2021) mysql: Server: DML unspecified vulnerability (CPU Apr 2021) mysql: InnoDB unspecified vulnerability (CPU Apr 2021) mysql: Server: Replication unspecified vulnerability (CPU Apr 2021) mysql: Server: Group Replication Plugin unspecified vulnerability (CPU Apr 2021) mysql: InnoDB unspecified vulnerability (CPU Apr 2021) mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2021) mysql: InnoDB unspecified vulnerability (CPU Apr 2021) mysql: Server: DML unspecified vulnerability (CPU Apr 2021) mysql: Server: Partition unspecified vulnerability (CPU Apr 2021) mysql: Server: Replication unspecified vulnerability (CPU Apr 2021) mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2021) mysql: Server: Partition unspecified vulnerability (CPU Apr 2021) mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2021) mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2021) mysql: Server: Stored Procedure unspecified vulnerability (CPU Apr 2021) mysql: Server: Stored Procedure unspecified vulnerability (CPU Apr 2021) mysql: Server: Information Schema unspecified vulnerability (CPU Apr 2021) mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2021) mysql: Server: Group Replication Plugin unspecified vulnerability (CPU Apr 2021) mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2021) mysql: Server: Stored Procedure unspecified vulnerability (CPU Apr 2021) mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2021) mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2021) mysql: Server: DML unspecified vulnerability (CPU Apr 2021) mysql: Server: Information Schema unspecified vulnerability (CPU Apr 2021) mysql: Server: Stored Procedure unspecified vulnerability (CPU Apr 2021) mysql: Server: DML unspecified vulnerability (CPU Apr 2021) mysql: Server: Packaging unspecified vulnerability (CPU Apr 2021) mysql: Server: Information Schema unspecified vulnerability (CPU Apr 2021) mysql: Server: DDL unspecified vulnerability (CPU Jul 2021) mysql: Server: Memcached unspecified vulnerability (CPU Jul 2021) mysql: Server: Optimizer unspecified vulnerability (CPU Jul 2021) mysql: Server: DDL unspecified vulnerability (CPU Jul 2021) mysql: Server: Federated unspecified vulnerability (CPU Jul 2021) mysql: Server: Replication unspecified vulnerability (CPU Jul 2021) mysql: Server: Optimizer unspecified vulnerability (CPU Jul 2021) mysql: Server: Optimizer unspecified vulnerability (CPU Jul 2021) mysql: Server: DML unspecified vulnerability (CPU Jul 2021) mysql: InnoDB unspecified vulnerability (CPU Jul 2021) mysql: InnoDB unspecified vulnerability (CPU Jul 2021) mysql: Server: Optimizer unspecified vulnerability (CPU Jul 2021) mysql: Server: Optimizer unspecified vulnerability (CPU Jul 2021) mysql: Server: Replication unspecified vulnerability (CPU Jul 2021) mysql: Server: Optimizer unspecified vulnerability (CPU Jul 2021) mysql: InnoDB unspecified vulnerability (CPU Jul 2021) mysql: InnoDB unspecified vulnerability (CPU Jul 2021) mysql: Server: DDL unspecified vulnerability (CPU Jul 2021) mysql: Server: Locking unspecified vulnerability (CPU Jul 2021) mysql: Server: Optimizer unspecified vulnerability (CPU Jul 2021) mysql: Server: Optimizer unspecified vulnerability (CPU Jul 2021) mysql: Server: GIS unspecified vulnerability (CPU Jul 2021) mysql: Server: Optimizer unspecified vulnerability (CPU Jul 2021) mysql: Server: PS unspecified vulnerability (CPU Jul 2021) mysql: Server: Stored Procedure unspecified vulnerability (CPU Jul 2021) mysql: Server: Optimizer unspecified vulnerability (CPU Jul 2021) mysql: Server: Optimizer unspecified vulnerability (CPU Jul 2021) mysql: Server: Optimizer unspecified vulnerability (CPU Jul 2021) mysql: InnoDB unspecified vulnerability (CPU Jul 2021) mysql: Server: Optimizer unspecified vulnerability (CPU Jul 2021) mysql: Server: DML unspecified vulnerability (CPU Jul 2021) mysql: Server: Optimizer unspecified vulnerability (CPU Jul 2021) mysql: Server: Optimizer unspecified vulnerability (CPU Jul 2021) mysql: Server: DML unspecified vulnerability (CPU Oct 2021) mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2021) | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 4.9 | null | null |
RHSA-2017:1108 | Red Hat Security Advisory: java-1.8.0-openjdk security and bug fix update | OpenJDK: improper re-use of NTLM authenticated connections (Networking, 8163520) OpenJDK: untrusted extension directories search path in Launcher (JCE, 8163528) OpenJDK: incomplete XML parse tree size enforcement (JAXP, 8169011) OpenJDK: newline injection in the FTP client (Networking, 8170222) OpenJDK: MD5 allowed for jar verification (Security, 8171121) OpenJDK: newline injection in the SMTP client (Networking, 8171533) | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 3.7 | null |
RHSA-2024:6993 | Red Hat Security Advisory: kernel security update | kernel: virtio-net: Add validation for used length kernel: mISDN: fix possible use-after-free in HFC_cleanup() kernel: hwmon: (w83793) Fix NULL pointer dereference by removing unnecessary structure field kernel: isdn: mISDN: Fix sleeping function called from invalid context kernel: proc/vmcore: fix clearing user buffer by properly using clear_user() kernel: cgroup: cgroup_get_from_id() must check the looked-up kn is a directory kernel: smb: client: fix potential OOBs in smb2_parse_contexts() kernel: uio: Fix use-after-free in uio_open kernel: net: fix possible store tearing in neigh_periodic_work() kernel: bonding: stop the device in bond_setup_by_slave() kernel: scsi: ibmvfc: Remove BUG_ON in the case of an empty event pool kernel: platform/x86: wmi: Fix opening of char device kernel: tunnels: fix out of bounds access when building IPv6 PMTU error kernel: hv_netvsc: Fix race condition between netvsc_probe and netvsc_remove kernel: ext4: avoid allocating blocks from corrupted group in ext4_mb_find_by_goal() kernel: mptcp: fix data re-injection from stale subflow kernel: netfilter: nf_conntrack_h323: Add protection for bmp length out of range kernel: x86/xen: Add some null pointer checking to smp.c kernel: af_unix: Fix garbage collector racing against connect() kernel: netfilter: nf_tables: Fix potential data-race in __nft_obj_type_get() kernel: netfilter: nf_tables: Fix potential data-race in __nft_expr_type_get() kernel: Bluetooth: l2cap: fix null-ptr-deref in l2cap_chan_timeout kernel: netfilter: nf_tables: Fix potential data-race in __nft_flowtable_type_get() kernel: ipv6: fix race condition between ipv6_get_ifaddr and ipv6_del_addr kernel: netfilter: nf_tables: honor table dormant flag from netdev release event path kernel: tty: n_gsm: fix possible out-of-bounds in gsm0_receive() kernel: netfilter: tproxy: bail out if IP has been disabled on the device kernel: net: core: reject skb_copy(_expand) for fraglist GSO skbs kernel: net: sched: sch_multiq: fix possible OOB write in multiq_tune() kernel: cppc_cpufreq: Fix possible null pointer dereference kernel: md: fix resync softlockup when bitmap size is less than array size kernel: cpufreq: exit() callback is optional kernel: net/sched: act_api: fix possible infinite loop in tcf_idr_check_alloc() kernel: udp: Set SOCK_RCU_FREE earlier in udp_lib_get_port() kernel: ppp: reject claimed-as-LCP but actually malformed packets kernel: wifi: mac80211: Avoid address calculations via out of bounds array indexing kernel: drm/amdgpu: avoid using null object of framebuffer kernel: tcp_metrics: validate source addr length | [
"cpe:/a:redhat:rhel_eus:8.8::crb",
"cpe:/o:redhat:rhel_eus:8.8::baseos"
] | null | 4.4 | null | null |
RHSA-2015:1650 | Red Hat Security Advisory: openshift security update | OpenShift3: Exec operations should be forbidden to privileged pods such as builder pods | [
"cpe:/a:redhat:openshift:3.0::el7"
] | null | null | null | null |
RHSA-2007:0155 | Red Hat Security Advisory: php security update | gd: buffer overrun security flaw security flaw security flaw security flaw security flaw security flaw | [
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws",
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2019:3756 | Red Hat Security Advisory: thunderbird security update | Mozilla: Use-after-free when creating index updates in IndexedDB Mozilla: Potentially exploitable crash due to 360 Total Security Mozilla: Stack buffer overflow in HKDF output Mozilla: Stack buffer overflow in WebRTC networking Mozilla: Unintended access to a privileged JSONView object Mozilla: document.domain-based origin isolation has same-origin-property violation Mozilla: Incorrect HTML parsing results in XSS bypass technique Mozilla: Memory safety bugs fixed in Firefox 70 and Firefox ESR 68.2 expat: heap-based buffer over-read via crafted XML input | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | 6.1 | 7.5 | null |
RHSA-2018:3752 | Red Hat Security Advisory: OpenShift Container Platform 3.4 security update | kubernetes: authentication/authorization bypass in the handling of non-101 responses | [
"cpe:/a:redhat:openshift:3.4::el7"
] | null | null | 8.8 | null |
RHSA-2010:1002 | Red Hat Security Advisory: mod_auth_mysql security update | mod_auth_mysql: character encoding SQL injection flaw | [
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2014:0633 | Red Hat Security Advisory: Red Hat JBoss Enterprise Web Platform 5.2.0 security update | openssl: SSL/TLS MITM vulnerability | [
"cpe:/a:redhat:jboss_enterprise_web_platform:5.2.0"
] | null | null | null | null |
RHSA-2016:0045 | Red Hat Security Advisory: kernel security update | kernel: net: incorrect processing of checksums in UDP implementation kernel: net: incorrect processing of checksums in UDP implementation | [
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2024:1423 | Red Hat Security Advisory: libreoffice security update | libreoffice: Improper Input Validation leading to arbitrary gstreamer plugin execution libreoffice: Insufficient macro permission validation leading to macro execution | [
"cpe:/a:redhat:rhel_eus:9.0::appstream",
"cpe:/a:redhat:rhel_eus:9.0::crb"
] | null | 8.3 | null | null |
RHSA-2025:1266 | Red Hat Security Advisory: kernel security update | kernel: media: uvcvideo: Skip parsing frames of type UVC_VS_UNDEFINED in uvc_parse_format | [
"cpe:/a:redhat:enterprise_linux:8::crb",
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 7.3 | null | null |
RHSA-2015:1221 | Red Hat Security Advisory: kernel security, bug fix, and enhancement update | Kernel: tty: driver reference leakage in tty_open kernel: Linux stack ASLR implementation Integer overflow kernel: int80 fork from 64-bit tasks mishandling kernel: denial of service (DoS) attack against IPv6 network stacks due to improper handling of Router Advertisements. kernel: ping sockets: use-after-free leading to local privilege escalation | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2012:0007 | Red Hat Security Advisory: kernel security, bug fix, and enhancement update | kernel: no access restrictions of /proc/pid/* after setuid program exec kernel: proc: fix oops on invalid /proc/<pid>/maps access kernel: xfs: potential buffer overflow in xfs_readlink() kernel: jbd/jbd2: invalid value of first log block leads to oops kernel: nfsv4: mknod(2) DoS kernel: nfs: diotest4 from LTP crash client null pointer deref kernel: hfs: add sanity check for file name length kernel: incomplete fix for CVE-2011-2482 | [
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2024:4210 | Red Hat Security Advisory: redhat-ds:11 security update | 389-ds-base: Malformed userPassword may cause crash at do_modify in slapd/modify.c 389-ds-base: potential denial of service via specially crafted kerberos AS-REQ request | [
"cpe:/a:redhat:directory_server:11.9::el8"
] | null | 7.5 | null | null |
RHSA-2022:8502 | Red Hat Security Advisory: RHV Manager (ovirt-engine) [ovirt-4.5.3] bug fix and security update | follow-redirects: Exposure of Private Personal Information to an Unauthorized Actor ovirt-engine: RHVM admin password is logged unfiltered when using otopi-style | [
"cpe:/a:redhat:rhev_manager:4.4:el8"
] | null | 5.1 | null | null |
RHSA-2010:0148 | Red Hat Security Advisory: kernel security and bug fix update | kernel: sctp remote denial of service kernel: ipv6: fix ip6_dst_lookup_tail() NULL pointer dereference | [
"cpe:/o:redhat:rhel_eus:5.2"
] | null | null | null | null |
RHSA-2011:1300 | Red Hat Security Advisory: httpd security update | httpd: multiple ranges DoS | [
"cpe:/o:redhat:rhel_els:3::as",
"cpe:/o:redhat:rhel_els:3::es"
] | null | null | null | null |
RHSA-2017:2791 | Red Hat Security Advisory: samba4 security update | samba: Some code path don't enforce smb signing, when they should Samba: Server memory information leak over SMB1 | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | 4.1 | null |
RHSA-2023:7419 | Red Hat Security Advisory: kpatch-patch security update | kernel: net/sched: sch_qfq component can be exploited if in qfq_change_agg function happens qfq_enqueue overhead kernel: net/sched: cls_fw component can be exploited as result of failure in tcf_change_indev function kernel: net/sched: Use-after-free vulnerabilities in the net/sched classifiers: cls_fw, cls_u32 and cls_route kernel: net/sched: Use-after-free vulnerabilities in the net/sched classifiers: cls_fw, cls_u32 and cls_route kernel: net/sched: Use-after-free vulnerabilities in the net/sched classifiers: cls_fw, cls_u32 and cls_route kernel: net/sched: Use-after-free vulnerabilities in the net/sched classifiers: cls_fw, cls_u32 and cls_route | [
"cpe:/o:redhat:enterprise_linux:7::server"
] | null | 7.8 | null | null |
RHSA-2023:4071 | Red Hat Security Advisory: firefox security update | Mozilla: Use-after-free in WebRTC certificate generation Mozilla: Potential use-after-free from compartment mismatch in SpiderMonkey Mozilla: Fullscreen notification obscured Mozilla: Lack of warning when opening Diagcab files Mozilla: Memory safety bugs fixed in Firefox 115, Firefox ESR 102.13, and Thunderbird 102.13 | [
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 8.8 | null | null |
RHSA-2020:1878 | Red Hat Security Advisory: samba security, bug fix, and enhancement update | samba: Combination of parameters and permissions can allow user to escape from the share path definition samba: smb client vulnerable to filenames containing path separators samba: Crash after failed character conversion at log level 3 or above | [
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb",
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 6.5 | 5.3 | null |
RHSA-2021:2301 | Red Hat Security Advisory: microcode_ctl security, bug fix and enhancement update | hw: vt-d related privilege escalation hw: improper isolation of shared resources in some Intel Processors hw: observable timing discrepancy in some Intel Processors hw: information disclosure on some Intel Atom processors | [
"cpe:/o:redhat:rhel_aus:7.4::server",
"cpe:/o:redhat:rhel_e4s:7.4::server",
"cpe:/o:redhat:rhel_tus:7.4::server"
] | null | 5.6 | null | null |
RHSA-2024:4406 | Red Hat Security Advisory: python3 security update | python: Path traversal on tempfile.TemporaryDirectory python: The zipfile module is vulnerable to zip-bombs leading to denial of service | [
"cpe:/a:redhat:rhel_aus:8.6::appstream",
"cpe:/a:redhat:rhel_e4s:8.6::appstream",
"cpe:/a:redhat:rhel_tus:8.6::appstream",
"cpe:/o:redhat:rhel_aus:8.6::baseos",
"cpe:/o:redhat:rhel_e4s:8.6::baseos",
"cpe:/o:redhat:rhel_tus:8.6::baseos"
] | null | 6.2 | null | null |
RHSA-2013:0526 | Red Hat Security Advisory: automake security update | automake: locally exploitable "make distcheck" bug | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2021:2191 | Red Hat Security Advisory: tcpdump security update | tcpdump: SMB data printing mishandled tcpdump: SMB data printing mishandled | [
"cpe:/a:redhat:rhel_eus:8.2::appstream"
] | null | 9.8 | null | null |
RHSA-2020:1962 | Red Hat Security Advisory: python-twisted-web security update | python-twisted: HTTP request smuggling when presented with two Content-Length headers | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | 7.3 | null | null |
RHSA-2015:1622 | Red Hat Security Advisory: Red Hat JBoss Web Server 2.1.0 tomcat security update | tomcat: non-persistent DoS attack by feeding data by aborting an upload Tomcat/JbossWeb: security manager bypass via EL expressions | [
"cpe:/a:redhat:jboss_enterprise_web_server:2::el5",
"cpe:/a:redhat:jboss_enterprise_web_server:2::el6",
"cpe:/a:redhat:jboss_enterprise_web_server:2::el7"
] | null | null | null | null |
RHSA-2022:1418 | Red Hat Security Advisory: kpatch-patch security update | kernel: fget: check that the fd still exists after getting a ref to it kernel: cgroups v1 release_agent feature may allow privilege escalation kernel: heap out of bounds write in nf_dup_netdev.c | [
"cpe:/o:redhat:rhel_eus:8.4::baseos"
] | null | 7.8 | null | null |
RHSA-2010:0925 | Red Hat Security Advisory: krb5 security and bug fix update | krb5: incorrect acceptance of certain checksums (MITKRB5-SA-2010-007) krb5: multiple checksum handling vulnerabilities (MITKRB5-SA-2010-007) krb5: krb5 may accept authdata checksums with low-entropy derived keys (MITKRB5-SA-2010-007) | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2020:5175 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.3 security update | hibernate-core: SQL injection vulnerability when both hibernate.use_sql_comments and JPQL String literals are used | [
"cpe:/a:redhat:jboss_enterprise_application_platform:7.3::el6",
"cpe:/a:redhat:jboss_enterprise_application_platform:7.3::el7",
"cpe:/a:redhat:jboss_enterprise_application_platform:7.3::el8"
] | null | 7.4 | null | null |
RHSA-2013:0277 | Red Hat Security Advisory: dnsmasq security, bug fix and enhancement update | libvirt+dnsmasq: DNS configured to answer DNS queries from non-virtual networks | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2021:2375 | Red Hat Security Advisory: postgresql:13 security update | postgresql: Buffer overrun from integer overflow in array subscripting calculations postgresql: Memory disclosure in INSERT ... ON CONFLICT ... DO UPDATE postgresql: Memory disclosure in partitioned-table UPDATE ... RETURNING | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 6.5 | null | null |
RHSA-2014:1285 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 6.3.1 update | Validator: JSM bypass via ReflectionHelper | [
"cpe:/a:redhat:jboss_enterprise_application_platform:6::el6"
] | null | null | null | null |
RHSA-2004:020 | Red Hat Security Advisory: : Updated mailman packages close cross-site scripting vulnerabilities | security flaw security flaw | [
"cpe:/o:redhat:linux:9"
] | null | null | null | null |
RHSA-2022:0561 | Red Hat Security Advisory: OpenShift Container Platform 4.9.22 security update | golang: net: incorrect parsing of extraneous zero characters at the beginning of an IP address octet golang: net/http/httputil: panic due to racy read of persistConn after handler panic | [
"cpe:/a:redhat:openshift:4.9::el8"
] | null | 5.9 | null | null |
RHSA-2020:2342 | Red Hat Security Advisory: qemu-kvm-rhev bug fix update | QEMU: slirp: heap buffer overflow during packet reassembly QEMU: slirp: OOB buffer access while emulating tcp protocols in tcp_emu() QEMU: Slirp: potential OOB access due to unsafe snprintf() usages | [
"cpe:/a:redhat:rhev_manager:4.2"
] | null | 5.6 | 7 | null |
RHSA-2024:0189 | Red Hat Security Advisory: Red Hat OpenStack Platform 17.1 (python-werkzeug) security update | python-werkzeug: high resource consumption leading to denial of service | [
"cpe:/a:redhat:openstack:17.1::el8"
] | null | 7.5 | null | null |
RHSA-2020:5664 | Red Hat Security Advisory: postgresql:10 security update | postgresql: Selectivity estimators bypass row security policies postgresql: Stack-based buffer overflow via setting a password postgresql: TYPE in pg_temp executes arbitrary SQL during SECURITY DEFINER execution postgresql: ALTER ... DEPENDS ON EXTENSION is missing authorization checks postgresql: Uncontrolled search path element in logical replication postgresql: Uncontrolled search path element in CREATE EXTENSION postgresql: Reconnection can downgrade connection security settings postgresql: Multiple features escape "security restricted operation" sandbox postgresql: psql's \gset allows overwriting specially treated variables | [
"cpe:/a:redhat:rhel_e4s:8.0::appstream"
] | null | 7.5 | 7.5 | null |
RHSA-2002:139 | Red Hat Security Advisory: : Updated glibc packages fix vulnerabilities in resolver | security flaw security flaw | [
"cpe:/o:redhat:linux:6.2",
"cpe:/o:redhat:linux:7.0",
"cpe:/o:redhat:linux:7.1",
"cpe:/o:redhat:linux:7.2",
"cpe:/o:redhat:linux:7.3"
] | null | null | null | null |
RHSA-2023:4201 | Red Hat Security Advisory: webkit2gtk3 security update | webkitgtk: Memory corruption issue when processing web content webkitgtk: use after free vulnerability webkitgtk: memory corruption issue leading to arbitrary code execution webkitgtk: type confusion issue leading to arbitrary code execution webkitgtk: processing web content may lead to arbitrary code execution webkitgtk: arbitrary code execution webkitgtk: arbitrary code execution webkitgtk: arbitrary code execution webkitgtk: processing web content may lead to arbitrary code execution webkitgtk: processing malicious web content may lead to arbitrary code execution webkitgtk: Out-of-bounds read leads to sensitive data leak webkitgtk: type confusion may lead to arbitrary code execution webkit: processing malicious web content may lead to denial-of-service webkitgtk: Processing web content may lead to arbitrary code execution webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution webkit: pointer authentication bypass webkitgtk: Processing web content may lead to a denial-of-service webkitgtk: Processing web content may lead to a denial-of-service webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash | [
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 8.8 | null | null |
RHSA-2019:4091 | Red Hat Security Advisory: OpenShift Container Platform 4.1 library-go security update | library-go: Secret data written to static pod logs when operator set at Debug level or higher | [
"cpe:/a:redhat:openshift:4.1::el7"
] | null | null | 5.3 | null |
RHSA-2021:4677 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.4.2 security update on RHEL 8 | undertow: potential security issue in flow control over HTTP/2 may lead to DOS wildfly: incorrect JBOSS_LOCAL_USER challenge location may lead to giving access to all the local users resteasy: Error message exposes endpoint class information mina-sshd-core: Memory leak denial of service in Apache Mina SSHD Server jsoup: Crafted input may cause the jsoup HTML and XML parser to get stuck | [
"cpe:/a:redhat:jboss_enterprise_application_platform:7.4::el8"
] | null | 7.5 | null | null |
RHSA-2021:0882 | Red Hat Security Advisory: tomcat security update | tomcat: Session fixation when using FORM authentication tomcat: Mishandling of Transfer-Encoding header allows for HTTP request smuggling | [
"cpe:/o:redhat:rhel_eus:7.6::computenode",
"cpe:/o:redhat:rhel_eus:7.6::server"
] | null | 4.3 | null | null |
RHSA-2010:0464 | Red Hat Security Advisory: flash-plugin security update | flash-plugin: crash caused by SWF files with different SWF versions obtained from the same URL flash-plugin: multiple security flaws (APSB10-14) flash-plugin: Arbitrary code execution by opening a specially-crafted PDF file with malicious SWF content (APSA10-01) flash-plugin: multiple security flaws (APSB10-14) flash-plugin: multiple security flaws (APSB10-14) flash-plugin: multiple security flaws (APSB10-14) flash-plugin: multiple security flaws (APSB10-14) flash-plugin: multiple security flaws (APSB10-14) flash-plugin: multiple security flaws (APSB10-14) flash-plugin: multiple security flaws (APSB10-14) flash-plugin: multiple security flaws (APSB10-14) flash-plugin: multiple security flaws (APSB10-14) flash-plugin: multiple security flaws (APSB10-14) flash-plugin: multiple security flaws (APSB10-14) flash-plugin: multiple security flaws (APSB10-14) flash-plugin: multiple security flaws (APSB10-14) flash-plugin: multiple security flaws (APSB10-14) flash-plugin: multiple security flaws (APSB10-14) flash-plugin: multiple security flaws (APSB10-14) flash-plugin: multiple security flaws (APSB10-14) flash-plugin: multiple security flaws (APSB10-14) flash-plugin: multiple security flaws (APSB10-14) flash-plugin: multiple security flaws (APSB10-14) flash-plugin: multiple security flaws (APSB10-14) flash-plugin: multiple security flaws (APSB10-14) flash-plugin: multiple security flaws (APSB10-14) flash-plugin: multiple security flaws (APSB10-14) flash-plugin: multiple security flaws (APSB10-14) flash-plugin: multiple security flaws (APSB10-14) flash-plugin: multiple security flaws (APSB10-14) | [
"cpe:/a:redhat:rhel_extras:5::client",
"cpe:/a:redhat:rhel_extras:5::server"
] | null | null | null | null |
RHSA-2002:217 | Red Hat Security Advisory: tomcat security update for Stronghold | security flaw | [
"cpe:/a:redhat:stronghold:4"
] | null | null | null | null |
RHSA-2020:2665 | Red Hat Security Advisory: kernel-rt security and bug fix update | Kernel: vfio: access to disabled MMIO space of some devices may lead to DoS scenario | [
"cpe:/a:redhat:rhel_extras_rt:7"
] | null | 5.3 | null | null |
RHSA-2024:2674 | Red Hat Security Advisory: kernel security and bug fix update | kernel: off-path attacker may inject data or terminate victim's TCP session kernel: mlxsw: spectrum_acl_tcam: Fix stack corruption | [
"cpe:/a:redhat:rhel_eus:8.6::crb",
"cpe:/o:redhat:rhel_eus:8.6::baseos",
"cpe:/o:redhat:rhev_hypervisor:4.4::el8"
] | null | 6.7 | null | null |
RHSA-2015:1565 | Red Hat Security Advisory: kernel-rt security, bug fix, and enhancement update | kernel: netfilter connection tracking extensions denial of service kernel: execution in the early microcode loader kernel: denial of service (DoS) attack against IPv6 network stacks due to improper handling of Router Advertisements. kernel: ping sockets: use-after-free leading to local privilege escalation | [
"cpe:/a:redhat:rhel_extras_rt:7"
] | null | null | null | null |
RHSA-2017:3264 | Red Hat Security Advisory: java-1.8.0-ibm security update | lcms2: Out-of-bounds read in Type_MLU_Read() OpenJDK: multiple unbounded memory allocations in deserialization (Serialization, 8174109) OpenJDK: incorrect privilege use when handling unreferenced objects (RMI, 8174966) OpenJDK: HTTP client insufficient check for newline in URLs (Networking, 8176751) JDK: unspecified vulnerability fixed in 8u151 and 9.0.1 (Deployment) OpenJDK: unbounded resource use in JceKeyStore deserialization (Serialization, 8181370) OpenJDK: insufficient loader constraints checks for invokespecial (Hotspot, 8180711) OpenJDK: unbounded memory allocation in SimpleTimeZone deserialization (Serialization, 8181323) OpenJDK: multiple unbounded memory allocations in deserialization (Libraries, 8181432) OpenJDK: unbounded memory allocation in PredicatedNodeTest deserialization (JAXP, 8181327) OpenJDK: unbounded memory allocation in JAXWSExceptionBase deserialization (JAX-WS, 8181100) OpenJDK: no default network operations timeouts in FtpClient (Networking, 8181612) OpenJDK: weak protection of key stores against brute forcing (Security, 8181692) OpenJDK: unbounded memory allocation in ObjectInputStream deserialization (Serialization, 8181597) OpenJDK: use of unprotected sname in Kerberos client (Libraries, 8178794) | [
"cpe:/a:redhat:rhel_extras:7"
] | null | null | 6.8 | null |
RHBA-2022:8582 | Red Hat Bug Fix Advisory: OpenShift Container Platform 4.9.52 packages update | jenkins-plugin/junit: Stored XSS vulnerability in JUnit Plugin jenkins-plugin: Man-in-the-Middle (MitM) in org.jenkins-ci.plugins:git-client | [
"cpe:/a:redhat:openshift:4.9::el7",
"cpe:/a:redhat:openshift:4.9::el8"
] | null | 8.1 | null | null |
RHSA-2024:1880 | Red Hat Security Advisory: nodejs:18 security update | nodejs: vulnerable to timing variant of the Bleichenbacher attack against PKCS#1 v1.5 padding (Marvin) nodejs: code injection and privilege escalation through Linux capabilities nodejs: reading unprocessed HTTP request with unbounded chunk extension allows DoS attacks | [
"cpe:/a:redhat:rhel_eus:8.8::appstream"
] | null | 7.5 | null | null |
RHSA-2022:1679 | Red Hat Security Advisory: Cryostat 2.1.0: new Cryostat on RHEL 8 container images | gogo/protobuf: plugin/unmarshal/unmarshal.go lacks certain index validation | [
"cpe:/a:redhat:cryostat:2::el8"
] | null | 8.6 | null | null |
RHSA-2010:0705 | Red Hat Security Advisory: kernel security update | kernel: 64-bit Compatibility Mode Stack Pointer Underflow | [
"cpe:/o:redhat:rhel_eus:5.4"
] | null | null | null | null |
RHSA-2024:2906 | Red Hat Security Advisory: firefox security update | Mozilla: Arbitrary JavaScript execution in PDF.js Mozilla: IndexedDB files retained in private browsing mode Mozilla: Potential permissions request bypass via clickjacking Mozilla: Cross-origin responses could be distinguished between script and non-script content-types Mozilla: Use-after-free could occur when printing to PDF Mozilla: Memory safety bugs fixed in Firefox 126, Firefox ESR 115.11, and Thunderbird 115.11 | [
"cpe:/a:redhat:rhel_eus:9.2::appstream"
] | null | 6.1 | null | null |
RHSA-2021:5195 | Red Hat Security Advisory: ipa security and bug fix update | samba: Samba AD DC did not always rely on the SID and PAC in Kerberos tickets | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 7.2 | null | null |
RHSA-2008:0937 | Red Hat Security Advisory: cups security update | CUPS: SGI image parser heap-based buffer overflow CUPS: texttops integer overflow CUPS: HP/GL reader insufficient bounds checking | [
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws",
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws",
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHBA-2023:6109 | Red Hat Bug Fix Advisory: MTV 2.4.3 Images | golang: net/url: JoinPath does not strip relative path components in all circumstances golang.org/x/net/http2: avoid quadratic complexity in HPACK decoding golang: crypto/tls: large handshake records may cause panics golang: net/http, mime/multipart: denial of service from excessive resource consumption golang.org/x/net/html: Cross site scripting golang: net/http, net/textproto: denial of service from excessive memory allocation golang: net/http, net/textproto, mime/multipart: denial of service from excessive resource consumption golang: go/parser: Infinite loop in parsing golang: html/template: backticks not treated as string delimiters golang: html/template: improper sanitization of CSS values golang: html/template: improper handling of empty HTML attributes golang: crypto/tls: slow verification of certificate chains containing large RSA keys golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487) HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack) | [
"cpe:/a:redhat:migration_toolkit_virtualization:2.4::el8",
"cpe:/a:redhat:migration_toolkit_virtualization:2.4::el9"
] | null | 7.5 | null | null |
RHSA-2022:9029 | Red Hat Security Advisory: Red Hat Virtualization Host security update [ovirt-4.5.3-3] | krb5: integer overflow vulnerabilities in PAC parsing | [
"cpe:/o:redhat:rhev_hypervisor:4.4::el8"
] | null | 8.8 | null | null |
RHSA-2021:2024 | Red Hat Security Advisory: bind security update | bind: An assertion check can fail while answering queries for DNAME records that require the DNAME to be processed to resolve itself | [
"cpe:/a:redhat:rhel_eus:8.2::appstream",
"cpe:/o:redhat:rhel_eus:8.2::baseos"
] | null | 7.5 | null | null |
RHSA-2019:3309 | Red Hat Security Advisory: kernel-rt security and bug fix update | kernel: nfs: use-after-free in svc_process_common() kernel: Information Disclosure in crypto_report_one in crypto/crypto_user.c kernel: oob memory read in hso_probe in drivers/net/usb/hso.c kernel: usb: missing size check in the __usb_get_extra_descriptor() leading to DoS kernel: Heap address information leak while using L2CAP_GET_CONF_OPT kernel: Heap address information leak while using L2CAP_PARSE_CONF_RSP kernel: SCTP socket buffer memory leak leading to denial of service kernel: denial of service vector through vfio DMA mappings Kernel: vhost_net: infinite loop while receiving packets leads to DoS Kernel: page cache side channel attacks Kernel: KVM: leak of uninitialized stack contents to guest hardware: bluetooth: BR/EDR encryption key negotiation attacks (KNOB) kernel: Heap overflow in mwifiex_uap_parse_tail_ies function in drivers/net/wireless/marvell/mwifiex/ie.c kernel: null-pointer dereference in hci_uart_set_flow_control Kernel: net: weak IP ID generation leads to remote device tracking kernel: fix race condition between mmget_not_zero()/get_task_mm() and core dumping kernel: fs/ext4/extents.c leads to information disclosure kernel: sensitive information disclosure from kernel stack memory via HIDPCONNADD command kernel: use-after-free in arch/x86/lib/insn-eval.c Kernel: KVM: OOB memory access via mmio ring buffer kernel: out-of-bounds array access in __xfrm_policy_unlink kernel: memory leak in register_queue_kobjects() in net/core/net-sysfs.c leads to denial of service kernel: memory leak in genl_register_family() in net/netlink/genetlink.c kernel: null pointer dereference in drivers/net/ethernet/intel/fm10k/fm10k_main.c kernel: Memory leak in sit_init_net() in net/ipv6/sit.c kernel: use-after-free read in napi_gro_frags() in the Linux kernel | [
"cpe:/a:redhat:enterprise_linux:8::nfv",
"cpe:/a:redhat:enterprise_linux:8::realtime"
] | null | 5.3 | 5.5 | null |
RHSA-2018:3590 | Red Hat Security Advisory: kernel security and bug fix update | kernel: out-of-bounds access in the show_timer function in kernel/time/posix-timers.c kernel: IP fragments with random offsets allow a remote denial of service (FragmentSmack) kernel: mm: use-after-free in do_get_mempolicy function allows local DoS or other unspecified impact kernel: Integer overflow in Linux's create_elf_tables function | [
"cpe:/o:redhat:rhel_aus:7.2::server",
"cpe:/o:redhat:rhel_e4s:7.2::server",
"cpe:/o:redhat:rhel_tus:7.2::server"
] | null | null | 7.8 | null |
RHSA-2024:0403 | Red Hat Security Advisory: kernel security update | kernel: UAF during login when accessing the shost ipaddress kernel: bpf: Incorrect verifier pruning leads to unsafe code paths being incorrectly marked as safe kernel: use after free in unix_stream_sendpage hw: amd: Cross-Process Information Leak kernel: netfilter: potential slab-out-of-bound access due to integer underflow | [
"cpe:/o:redhat:rhel_aus:8.2::baseos",
"cpe:/o:redhat:rhel_e4s:8.2::baseos",
"cpe:/o:redhat:rhel_tus:8.2::baseos"
] | null | 7 | null | null |
RHSA-2024:7431 | Red Hat Security Advisory: kpatch-patch-5_14_0-284_52_1 and kpatch-patch-5_14_0-284_79_1 security update | kernel: wifi: mac80211: Avoid address calculations via out of bounds array indexing | [
"cpe:/o:redhat:rhel_eus:9.2::baseos"
] | null | 7.8 | null | null |
RHSA-2007:0229 | Red Hat Security Advisory: gdb security and bug fix update | GDB buffer overflow | [
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2012:0071 | Red Hat Security Advisory: php security update | php: buffer over-read in Exif extension php: Crash by converting serial day numbers (SDN) into Julian calendar php: file path injection vulnerability in RFC1867 file upload filename php: integer overflow in exif_process_IFD_TAG() may lead to DoS or arbitrary memory disclosure php: hash table collisions CPU usage DoS (oCERT-2011-003) | [
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2021:1044 | Red Hat Security Advisory: Red Hat Process Automation Manager 7.10.1 security update | log4j: improper validation of certificate with host mismatch in SMTP appender apache-httpclient: incorrect handling of malformed authority component in request URIs | [
"cpe:/a:redhat:jboss_enterprise_bpms_platform:7.10"
] | null | 5.3 | null | null |
RHSA-2020:0132 | Red Hat Security Advisory: Red Hat Process Automation Manager 7.6.0 Security Update | bootstrap: XSS in the data-target attribute bootstrap: XSS in the tooltip data-viewport attribute bootstrap: XSS in the affix configuration target property Business-central: Encrypted password shown under Object id 7 of errai_security_context | [
"cpe:/a:redhat:jboss_enterprise_bpms_platform:7.6"
] | null | null | 4.6 | null |
RHSA-2021:3443 | Red Hat Security Advisory: kpatch-patch security update | kernel: out-of-bounds write due to a heap buffer overflow in __hidinput_change_resolution_multipliers() of hid-input.c kernel: use-after-free in route4_change() in net/sched/cls_route.c kernel: powerpc: KVM guest OS users can cause host OS memory corruption | [
"cpe:/o:redhat:rhel_eus:8.2::baseos"
] | null | 7.8 | null | null |
RHSA-2018:3059 | Red Hat Security Advisory: X.org X11 security, bug fix, and enhancement update | libxcursor: 1-byte heap-based overflow in _XcursorThemeInherits function in library.c | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 4.5 | null |
RHSA-2011:0332 | Red Hat Security Advisory: scsi-target-utils security update | scsi-target-utils: double-free vulnerability leads to pre-authenticated crash | [
"cpe:/a:redhat:rhel_cluster_storage:5",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2020:3888 | Red Hat Security Advisory: python3 security update | python: XSS vulnerability in the documentation XML-RPC server in server_title field python: wrong backtracking in urllib.request.AbstractBasicAuthHandler allows for a ReDoS | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 6.5 | null | null |
RHSA-2024:3391 | Red Hat Security Advisory: python3 security update | python: Path traversal on tempfile.TemporaryDirectory python: The zipfile module is vulnerable to zip-bombs leading to denial of service | [
"cpe:/a:redhat:rhel_eus:8.8::appstream",
"cpe:/o:redhat:rhel_eus:8.8::baseos"
] | null | 6.2 | null | null |
RHSA-2015:1845 | Red Hat Security Advisory: Red Hat Gluster Storage 3.1 update | gluster-swift metadata constraints are not correctly enforced Swift: unauthorized deletion of versioned Swift object | [
"cpe:/a:redhat:storage:3.1:nagios:el6",
"cpe:/a:redhat:storage:3.1:nfs:el6",
"cpe:/a:redhat:storage:3.1:server:el6",
"cpe:/a:redhat:storage:3:client:el6"
] | null | null | null | null |
RHSA-2021:4597 | Red Hat Security Advisory: kpatch-patch security update | kernel: use-after-free in drivers/infiniband/core/ucma.c ctx use-after-free | [
"cpe:/o:redhat:rhel_eus:8.1::baseos"
] | null | 7.8 | null | null |
RHSA-2023:1664 | Red Hat Security Advisory: Red Hat JBoss Web Server 5.7.2 release and security update | tomcat: request smuggling tomcat: JsonErrorReportValve injection | [
"cpe:/a:redhat:jboss_enterprise_web_server:5.7"
] | null | 7.5 | null | null |
RHSA-2023:0048 | Red Hat Security Advisory: grub2 security and bug fix update | grub2: Buffer overflow in grub_font_construct_glyph() can lead to out-of-bound write and possible secure boot bypass grub2: Heap based out-of-bounds write when redering certain unicode sequences | [
"cpe:/o:redhat:rhel_eus:8.6::baseos"
] | null | 7.1 | null | null |
RHSA-2020:5183 | Red Hat Security Advisory: microcode_ctl security, bug fix and enhancement update | hw: Information disclosure issue in Intel SGX via RAPL interface hw: Vector Register Leakage-Active hw: Fast forward store predictor | [
"cpe:/o:redhat:rhel_aus:7.3::server",
"cpe:/o:redhat:rhel_e4s:7.3::server",
"cpe:/o:redhat:rhel_tus:7.3::server"
] | null | 5.5 | null | null |
RHSA-2011:1507 | Red Hat Security Advisory: libarchive security update | Libarchive multiple security issues Libarchive multiple security issues | [
"cpe:/o:redhat:enterprise_linux:6::server"
] | null | null | null | null |
RHSA-2024:3303 | Red Hat Security Advisory: libxml2 security update | libxml2: use-after-free in XMLReader | [
"cpe:/a:redhat:rhel_eus:8.8::appstream",
"cpe:/o:redhat:rhel_eus:8.8::baseos"
] | null | 7.5 | null | null |
RHSA-2022:4787 | Red Hat Security Advisory: openvswitch2.15 security update | DPDK: out-of-bounds read/write in vhost_user_set_inflight_fd() may lead to crash dpdk: sending vhost-user-inflight type messages could lead to DoS | [
"cpe:/o:redhat:enterprise_linux:8::fastdatapath"
] | null | 6.5 | null | null |
RHSA-2023:6158 | Red Hat Security Advisory: Red Hat Ansible Automation Platform 2.4 Product Security and Bug Fix Update | python-django: Denial-of-service possibility in django.utils.text.Truncator python-urllib3: Cookie request header isn't stripped during cross-origin redirects | [
"cpe:/a:redhat:ansible_automation_platform:2.4::el8",
"cpe:/a:redhat:ansible_automation_platform:2.4::el9"
] | null | 5.9 | null | null |
RHSA-2014:0215 | Red Hat Security Advisory: cfme security, bug fix, and enhancement update | EVM: Stored XSS ruby: heap overflow in floating point parsing CFME: Dangerous send in ServiceController rubygem-actionpack: number_to_currency, number_to_percentage and number_to_human XSS vulnerability rubygem-actionpack: Action View string handling denial of service | [
"cpe:/a:redhat:cloudforms_managementengine:5::el6"
] | null | null | null | null |
RHSA-2023:3489 | Red Hat Security Advisory: redhat-ds:12 security, bug fix, and enhancement update | RHDS: LDAP browser tries to decode userPassword instead of userCertificate attribute | [
"cpe:/a:redhat:directory_server:12.1::el9"
] | null | 5.5 | null | null |
RHSA-2024:0267 | Red Hat Security Advisory: java-17-openjdk security and bug fix update | OpenJDK: array out-of-bounds access due to missing range check in C1 compiler (8314468) OpenJDK: JVM class file verifier flaw allows unverified bytecode execution (8314295) OpenJDK: range check loop optimization issue (8314307) OpenJDK: incorrect handling of ZIP files with duplicate entries (8276123) OpenJDK: logging of digital signature private keys (8316976) OpenJDK: RSA padding issue and timing side-channel attack against TLS (8317547) | [
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb",
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::crb",
"cpe:/a:redhat:rhel_eus:8.8::appstream",
"cpe:/a:redhat:rhel_eus:8.8::crb",
"cpe:/a:redhat:rhel_eus:9.2::appstream",
"cpe:/a:redhat:rhel_eus:9.2::crb"
] | null | 7.4 | null | null |
RHSA-2024:2799 | Red Hat Security Advisory: glibc security update | glibc: Out of bounds write in iconv may lead to remote code execution glibc: stack-based buffer overflow in netgroup cache glibc: null pointer dereferences after failed netgroup cache insertion glibc: netgroup cache may terminate daemon on memory allocation failure glibc: netgroup cache assumes NSS callback uses in-buffer strings | [
"cpe:/a:redhat:rhel_eus:8.6::appstream",
"cpe:/a:redhat:rhel_eus:8.6::crb",
"cpe:/o:redhat:rhel_eus:8.6::baseos",
"cpe:/o:redhat:rhev_hypervisor:4.4::el8"
] | null | 4 | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.