id
stringlengths 13
15
| title
stringlengths 29
176
| description
stringlengths 8
32.1k
| cpes
listlengths 0
20
| cvss_v4_0
null | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
null |
---|---|---|---|---|---|---|---|
RHSA-2021:4932
|
Red Hat Security Advisory: nss security update
|
nss: Memory corruption in decodeECorDsaSignature with DSA signatures (and RSA-PSS)
|
[
"cpe:/o:redhat:rhel_aus:7.4::server"
] | null | 9.8 | null | null |
RHSA-2012:0310
|
Red Hat Security Advisory: nfs-utils security, bug fix, and enhancement update
|
nfs-utils: mount.nfs fails to anticipate RLIMIT_FSIZE
|
[
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2015:0990
|
Red Hat Security Advisory: pcs security and bug fix update
|
pcs: improper web session variable signing pcs: improper web session variable signing
|
[
"cpe:/o:redhat:enterprise_linux:6::server"
] | null | null | null | null |
RHSA-2024:1946
|
Red Hat Security Advisory: Red Hat OpenShift Service Mesh Containers for 2.5.1 security update
|
follow-redirects: Improper Input Validation due to the improper handling of URLs by the url.parse() golang-protobuf: encoding/protojson, internal/encoding/json: infinite loop in protojson.Unmarshal when unmarshaling certain forms of invalid JSON jose-go: improper handling of highly compressed data follow-redirects: Possible credential leak
|
[
"cpe:/a:redhat:service_mesh:2.5::el8"
] | null | 6.5 | null | null |
RHSA-2023:6782
|
Red Hat Security Advisory: openshift-gitops-kam security update
|
golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487) HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack)
|
[
"cpe:/a:redhat:openshift_gitops:1.8::el8"
] | null | 7.5 | null | null |
RHSA-2018:1702
|
Red Hat Security Advisory: librelp security update
|
librelp: Stack-based buffer overflow in relpTcpChkPeerName function in src/tcp.c
|
[
"cpe:/o:redhat:rhel_eus:6.7::computenode",
"cpe:/o:redhat:rhel_eus:6.7::server"
] | null | null | 8.1 | null |
RHSA-2018:1665
|
Red Hat Security Advisory: libvirt security update
|
hw: cpu: speculative store bypass
|
[
"cpe:/o:redhat:rhel_aus:6.5::server"
] | null | null | 5.6 | null |
RHSA-2020:4079
|
Red Hat Security Advisory: qemu-kvm security update
|
QEMU: slirp: use-after-free in ip_reass() function in ip_input.c QEMU: usb: out-of-bounds r/w access issue while processing usb packets
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 5 | null | null |
RHSA-2010:0970
|
Red Hat Security Advisory: exim security update
|
exim: remote code execution flaw
|
[
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws",
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::server",
"cpe:/o:redhat:rhel_eus:4.7::as",
"cpe:/o:redhat:rhel_eus:4.7::es",
"cpe:/o:redhat:rhel_eus:5.3",
"cpe:/o:redhat:rhel_eus:5.4"
] | null | null | null | null |
RHSA-2023:1043
|
Red Hat Security Advisory: Red Hat Single Sign-On 7.6.2 security update on RHEL 7
|
bootstrap: Cross-site Scripting (XSS) in the collapse data-parent attribute bootstrap: Cross-site Scripting (XSS) in the data-container property of tooltip jquery: Prototype pollution in object's prototype leading to denial of service, remote code execution, or property injection jquery: Cross-site scripting due to improper injQuery.htmlPrefilter method jquery: Untrusted code execution via <option> tag in HTML passed to DOM manipulation methods glob-parent: Regular Expression Denial of Service minimist: prototype pollution keycloak: HTML injection in execute-actions-email Admin REST API keycloak: XSS on impersonation under specific circumstances SnakeYaml: Constructor Deserialization Remote Code Execution Undertow: DoS can be achieved as Undertow server waits for the LAST_CHUNK forever for EJB invocations keycloak: Session takeover with OIDC offline refreshtokens keycloak: reflected XSS attack Moment.js: Path traversal in moment.locale snakeyaml: Denial of Service due to missing nested depth limitation for collections moment: inefficient parsing algorithm resulting in DoS loader-utils: Regular expression denial of service snakeyaml: Uncaught exception in org.yaml.snakeyaml.composer.Composer.composeSequenceNode snakeyaml: Uncaught exception in org.yaml.snakeyaml.constructor.BaseConstructor.constructObject snakeyaml: Uncaught exception in java.base/java.util.regex.Pattern$Ques.match jettison: parser crash by stackoverflow jettison: memory exhaustion via user-supplied XML or JSON data jackson-databind: deep wrapper array nesting wrt UNWRAP_SINGLE_VALUE_ARRAYS jackson-databind: use of deeply nested arrays mina-sshd: Java unsafe deserialization vulnerability jettison: If the value in map is the map's self, the new new JSONObject(map) cause StackOverflowError which may lead to dos json5: Prototype Pollution in JSON5 via Parse Method CXF: directory listing / code exfiltration CXF: SSRF Vulnerability keycloak: Client Registration endpoint does not check token revocation keycloak: user impersonation via stolen uuid code
|
[
"cpe:/a:redhat:red_hat_single_sign_on:7.6::el7"
] | null | 4.6 | 5.6 | null |
RHSA-2023:3374
|
Red Hat Security Advisory: Migration Toolkit for Runtimes security update
|
loader-utils: Regular expression denial of service codec-haproxy: HAProxyMessageDecoder Stack Exhaustion DoS
|
[
"cpe:/a:redhat:migration_toolkit_runtimes:1.0::el8"
] | null | 7.5 | null | null |
RHSA-2019:2272
|
Red Hat Security Advisory: python-urllib3 security update
|
python-urllib3: Cross-host redirect does not remove Authorization header allow for credential exposure python-urllib3: CRLF injection due to not encoding the '\r\n' sequence leading to possible attack on internal service
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 6.5 | null |
RHSA-2017:1119
|
Red Hat Security Advisory: java-1.6.0-sun security update
|
OpenJDK: improper re-use of NTLM authenticated connections (Networking, 8163520) OpenJDK: incomplete XML parse tree size enforcement (JAXP, 8169011) OpenJDK: newline injection in the FTP client (Networking, 8170222) OpenJDK: MD5 allowed for jar verification (Security, 8171121) OpenJDK: newline injection in the SMTP client (Networking, 8171533)
|
[
"cpe:/a:redhat:rhel_extras_oracle_java:6",
"cpe:/a:redhat:rhel_extras_oracle_java:7"
] | null | null | 3.7 | null |
RHSA-2024:4484
|
Red Hat Security Advisory: OpenShift Container Platform 4.13.45 bug fix and security update
|
golang: net/http, x/net/http2: unlimited number of CONTINUATION frames causes DoS ssh: Prefix truncation attack on Binary Packet Protocol (BPP) openshift/telemeter: iss check during JWT authentication can be bypassed openssh: regreSSHion - race condition in SSH allows RCE/DoS jose-go: improper handling of highly compressed data
|
[
"cpe:/a:redhat:openshift:4.13::el8",
"cpe:/a:redhat:openshift:4.13::el9"
] | null | 4.3 | null | null |
RHSA-2007:0675
|
Red Hat Security Advisory: perl-Net-DNS security update
|
perl-Net-DNS security issue
|
[
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2017:2388
|
Red Hat Security Advisory: evince security update
|
evince: command injection via filename in tar-compressed comics archive
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 7.1 | null |
RHSA-2022:7003
|
Red Hat Security Advisory: java-1.8.0-openjdk security update
|
OpenJDK: improper handling of long NTLM client hostnames (Security, 8286526) OpenJDK: insufficient randomization of JNDI DNS port numbers (JNDI, 8286910) OpenJDK: excessive memory allocation in X.509 certificate parsing (Security, 8286533) OpenJDK: HttpServer no connection count limit (Lightweight HTTP Server, 8286918)
|
[
"cpe:/a:redhat:rhel_e4s:8.1::appstream"
] | null | 5.3 | null | null |
RHSA-2023:1681
|
Red Hat Security Advisory: kpatch-patch security update
|
kernel: FUSE filesystem low-privileged user privileges escalation
|
[
"cpe:/o:redhat:enterprise_linux:9::baseos"
] | null | 7 | null | null |
RHSA-2024:6488
|
Red Hat Security Advisory: python39:3.9 security update
|
pypa/setuptools: Remote code execution via download functions in the package_index module in pypa/setuptools
|
[
"cpe:/a:redhat:rhel_aus:8.4::appstream",
"cpe:/a:redhat:rhel_e4s:8.4::appstream",
"cpe:/a:redhat:rhel_tus:8.4::appstream"
] | null | 8.8 | null | null |
RHSA-2020:1880
|
Red Hat Security Advisory: ibus and glib2 security and bug fix update
|
ibus: missing authorization allows local attacker to access the input bus of another user
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb",
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | null | 6.1 | null |
RHSA-2023:5930
|
Red Hat Security Advisory: varnish security update
|
HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack)
|
[
"cpe:/a:redhat:rhel_eus:9.0::appstream",
"cpe:/a:redhat:rhel_eus:9.0::crb"
] | null | 7.5 | null | null |
RHSA-2008:0510
|
Red Hat Security Advisory: Red Hat Application Stack v1.3 security and enhancement update
|
mysql: privilege escalation via DATA/INDEX DIRECTORY directives
|
[
"cpe:/a:redhat:rhel_application_stack:1"
] | null | null | null | null |
RHSA-2017:0245
|
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform security update
|
tomcat: HTTP Request smuggling vulnerability due to permitting invalid character in HTTP requests EAP: Sensitive data can be exposed at the server level in domain mode admin-cli: Potential EAP resource starvation DOS attack via GET requests for server log files jboss: jbossas: unsafe chown of server.log in jboss init script allows privilege escalation
|
[
"cpe:/a:redhat:jboss_enterprise_application_platform:6::el7"
] | null | null | 7 | null |
RHSA-2022:6162
|
Red Hat Security Advisory: systemd security update
|
systemd-resolved: use-after-free when dealing with DnsStream in resolved-dns-stream.c
|
[
"cpe:/o:redhat:rhel_eus:8.2::baseos"
] | null | 9.8 | null | null |
RHSA-2023:5770
|
Red Hat Security Advisory: nghttp2 security update
|
HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack)
|
[
"cpe:/a:redhat:rhel_eus:9.0::crb",
"cpe:/o:redhat:rhel_eus:9.0::baseos"
] | null | 7.5 | null | null |
RHSA-2022:7053
|
Red Hat Security Advisory: OpenJDK 17.0.5 Security Update for Portable Linux Builds
|
OpenJDK: improper MultiByte conversion can lead to buffer overflow (JGSS, 8286077) OpenJDK: improper handling of long NTLM client hostnames (Security, 8286526) OpenJDK: insufficient randomization of JNDI DNS port numbers (JNDI, 8286910) OpenJDK: excessive memory allocation in X.509 certificate parsing (Security, 8286533) OpenJDK: HttpServer no connection count limit (Lightweight HTTP Server, 8286918) OpenJDK: missing SNI caching in HTTP/2 (Networking, 8289366)
|
[
"cpe:/a:redhat:openjdk:17"
] | null | 3.7 | null | null |
RHSA-2010:0838
|
Red Hat Security Advisory: pki security and enhancement update
|
MD5: MD5 Message-Digest Algorithm is not collision resistant System: unauthenticated user can request SCEP one-time PIN decryption System: SCEP one-time PIN reuse
|
[
"cpe:/a:redhat:certificate_system:8::el5"
] | null | null | null | null |
RHSA-2014:1727
|
Red Hat Security Advisory: Red Hat JBoss Enterprise Web Platform 5.2.0 security update
|
Java: Java XML Signature DoS Attack
|
[
"cpe:/a:redhat:jboss_enterprise_web_platform:5.2.0"
] | null | null | null | null |
RHSA-2022:5866
|
Red Hat Security Advisory: go-toolset-1.17 and go-toolset-1.17-golang security and bug fix update
|
golang: net/http: improper sanitization of Transfer-Encoding header golang: go/parser: stack exhaustion in all Parse* functions golang: encoding/xml: stack exhaustion in Decoder.Skip golang: crypto/tls: session tickets lack random ticket_age_add golang: io/fs: stack exhaustion in Glob golang: compress/gzip: stack exhaustion in Reader.Read golang: path/filepath: stack exhaustion in Glob golang: encoding/xml: stack exhaustion in Unmarshal golang: encoding/gob: stack exhaustion in Decoder.Decode golang: net/http/httputil: NewSingleHostReverseProxy - omit X-Forwarded-For not working
|
[
"cpe:/a:redhat:devtools:2022"
] | null | 6.5 | null | null |
RHSA-2017:1582
|
Red Hat Security Advisory: bind security and bug fix update
|
bind: assertion failure while handling a query response containing inconsistent DNSSEC information bind: Processing a response containing CNAME or DNAME with unusual order can crash resolver bind: assertion failure in DNSSEC validation
|
[
"cpe:/o:redhat:rhel_aus:6.4::server",
"cpe:/o:redhat:rhel_aus:6.5::server",
"cpe:/o:redhat:rhel_aus:6.6::server",
"cpe:/o:redhat:rhel_eus:6.7::computenode",
"cpe:/o:redhat:rhel_eus:6.7::server",
"cpe:/o:redhat:rhel_mission_critical:6.2::server",
"cpe:/o:redhat:rhel_tus:6.5::server",
"cpe:/o:redhat:rhel_tus:6.6::server"
] | null | null | 7.5 | null |
RHSA-2021:0986
|
Red Hat Security Advisory: AMQ Online 1.7.0 release and security update
|
fabric8-kubernetes-client: vulnerable to a path traversal leading to integrity and availability compromise netty: Information disclosure via the local system temporary directory netty: possible request smuggling in HTTP/2 due missing validation
|
[
"cpe:/a:redhat:amq_online:1.7"
] | null | 5.9 | null | null |
RHSA-2025:2034
|
Red Hat Security Advisory: webkit2gtk3 security update
|
webkitgtk: Processing maliciously crafted web content may lead to memory corruption webkitgtk: A maliciously crafted webpage may be able to fingerprint the user webkitgtk: Copying a URL from Web Inspector may lead to command injection webkitgtk: Processing web content may lead to a denial-of-service webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 8.8 | null | null |
RHSA-2016:1839
|
Red Hat Security Advisory: JBoss Enterprise Application Platform 7.0.2 for RHEL 7
|
jakarta-taglibs-standard: XXE and RCE via XSL extension in JSTL XML tags eap: HTTP header injection / response splitting EAP7 Privilege escalation when managing domain including earlier version slaves
|
[
"cpe:/a:redhat:jboss_enterprise_application_platform:7::el7"
] | null | null | 7.5 | null |
RHSA-2024:3066
|
Red Hat Security Advisory: exempi security update
|
exempi: denial of service via opening of crafted audio file with ID3V2 frame exempi: denial of service via opening of crafted webp file
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb"
] | null | 6.5 | null | null |
RHSA-2013:1591
|
Red Hat Security Advisory: openssh security, bug fix, and enhancement update
|
openssh: Prevent connection slot exhaustion attacks
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2018:0112
|
Red Hat Security Advisory: libvirt security update
|
An update for libvirt is now available for Red Hat Enterprise Linux 6.2 Advanced Update Support.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
|
[
"cpe:/o:redhat:rhel_mission_critical:6.2::server"
] | null | null | null | null |
RHBA-2019:0448
|
Red Hat Bug Fix Advisory: Red Hat OpenStack Platform 13.0 director Bug Fix Advisory
|
openstack-mistral: std.ssh action may disclose presence of arbitrary files
|
[
"cpe:/a:redhat:openstack:13::el7"
] | null | null | 4.3 | null |
RHSA-2021:2356
|
Red Hat Security Advisory: nettle security update
|
nettle: Out of bounds memory access in signature verification
|
[
"cpe:/o:redhat:rhel_aus:7.6::server",
"cpe:/o:redhat:rhel_e4s:7.6::server",
"cpe:/o:redhat:rhel_tus:7.6::server"
] | null | 8.1 | null | null |
RHSA-2024:6989
|
Red Hat Security Advisory: expat security update
|
libexpat: Negative Length Parsing Vulnerability in libexpat libexpat: Integer Overflow or Wraparound libexpat: integer overflow
|
[
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 6.2 | null | null |
RHSA-2016:1206
|
Red Hat Security Advisory: jenkins security update
|
jenkins: Arbitrary build parameters are passed to build scripts as environment variables (SECURITY-170) jenkins: Malicious users with multiple user accounts can prevent other users from logging in (SECURITY-243) jenkins: Information on installed plugins exposed via API (SECURITY-250) jenkins: Encrypted secrets (e.g. passwords) were leaked to users with permission to read configuration (SECURITY-266) jenkins: Regular users can trigger download of update site metadata (SECURITY-273) jenkins: Open redirect to scheme-relative URLs (SECURITY-276) jenkins: Granting the permission to read node configurations allows access to overall system configuration (SECURITY-281)
|
[
"cpe:/a:redhat:openshift:3.1::el7",
"cpe:/a:redhat:openshift:3.2::el7"
] | null | null | null | null |
RHSA-2024:6837
|
Red Hat Security Advisory: pcp security update
|
pcp: pmcd heap corruption through metric pmstore operations pcp: pmpost symlink attack allows escalating pcp to root user
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 4.4 | null | null |
RHSA-2022:8078
|
Red Hat Security Advisory: flac security update
|
flac: out of bound write in append_to_verify_fifo_interleaved_ of stream_encoder.c
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::crb"
] | null | 5.5 | null | null |
RHSA-2022:0233
|
Red Hat Security Advisory: java-11-openjdk security update
|
OpenJDK: Incomplete deserialization class filtering in ObjectInputStream (Serialization, 8264934) OpenJDK: Incorrect reading of TIFF files in TIFFNullDecompressor (ImageIO, 8270952) OpenJDK: Insufficient URI checks in the XSLT TransformerImpl (JAXP, 8270492) OpenJDK: Unexpected exception thrown in regex Pattern (Libraries, 8268813) OpenJDK: Incorrect marking of writeable fields (Hotspot, 8270386) OpenJDK: Incomplete checks of StringBuffer and StringBuilder during deserialization (Libraries, 8270392) OpenJDK: Incorrect IdentityHashMap size checks during deserialization (Libraries, 8270416) OpenJDK: Incorrect access checks in XMLEntityManager (JAXP, 8270498) OpenJDK: Infinite loop related to incorrect handling of newlines in XMLEntityScanner (JAXP, 8270646) OpenJDK: Array indexing issues in LIRGenerator (Hotspot, 8272014) OpenJDK: Excessive resource use when reading JAR manifest attributes (Libraries, 8272026) OpenJDK: Insufficient checks when deserializing exceptions in ObjectInputStream (Serialization, 8272236) OpenJDK: Excessive memory allocation in BMPImageReader (ImageIO, 8273756) OpenJDK: Integer overflow in BMPImageReader (ImageIO, 8273838) OpenJDK: Excessive memory allocation in TIFF*Decompressor (ImageIO, 8274096)
|
[
"cpe:/a:redhat:rhel_e4s:8.1::appstream"
] | null | 5.3 | null | null |
RHSA-2024:9976
|
Red Hat Security Advisory: RHOSP 17.1.4 (python-werkzeug) security update
|
python-werkzeug: user may execute code on a developer's machine
|
[
"cpe:/a:redhat:openstack:17.1::el9"
] | null | 7.5 | null | null |
RHSA-2025:3615
|
Red Hat Security Advisory: libxslt security update
|
libxslt: Use-After-Free in libxslt (xsltGetInheritedNsList) libxslt: Use-After-Free in libxslt numbers.c
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 7.8 | null | null |
RHSA-2021:2882
|
Red Hat Security Advisory: thunderbird security update
|
Mozilla: IMAP server responses sent by a MITM prior to STARTTLS could be processed Mozilla: Use-after-free in accessibility features of a document Mozilla: Memory safety bugs fixed in Firefox 90 and Firefox ESR 78.12 chromium-browser: Out of bounds write in ANGLE
|
[
"cpe:/a:redhat:rhel_eus:8.1::appstream"
] | null | 8.8 | null | null |
RHSA-2007:0014
|
Red Hat Security Advisory: kernel security update
|
kernel: Local DoS with corrupted ELF security flaw kernel Race condition in mincore can cause "ps -ef" to hang security flaw security flaw Linux kernel get_fdb_entries() integer overflow kernel listxattr syscall can corrupt user space programs security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw
|
[
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2024:4522
|
Red Hat Security Advisory: Red Hat Ansible Automation Platform 2.4 Product Security and Bug Fix Update
|
python-jwcrypto: malicious JWE token can cause denial of service jinja2: accepts keys containing non-attribute characters requests: subsequent requests to the same host ignore cert verification
|
[
"cpe:/a:redhat:ansible_automation_platform:2.4::el8",
"cpe:/a:redhat:ansible_automation_platform:2.4::el9",
"cpe:/a:redhat:ansible_automation_platform_developer:2.4::el8",
"cpe:/a:redhat:ansible_automation_platform_developer:2.4::el9",
"cpe:/a:redhat:ansible_automation_platform_inside:2.4::el8",
"cpe:/a:redhat:ansible_automation_platform_inside:2.4::el9"
] | null | 5.6 | null | null |
RHSA-2013:1196
|
Red Hat Security Advisory: Foreman security update
|
Foreman: hosts_controller.rb power/ipmi_boot Symbol creation DoS foreman: app/controllers/api/v1/hosts_controller.rb API privilege escalation
|
[
"cpe:/a:redhat:openstack:3::el6"
] | null | null | null | null |
RHSA-2018:3052
|
Red Hat Security Advisory: wget security and bug fix update
|
wget: Cookie injection allows malicious website to write arbitrary cookie entries into cookie jar
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 7.1 | null |
RHSA-2021:0758
|
Red Hat Security Advisory: nss-softokn security update
|
nss: Use-after-free in sftk_FreeSession due to improper refcounting nss: Check length of inputs for cryptographic primitives nss: CHACHA20-POLY1305 decryption with undersized tag leads to out-of-bounds read
|
[
"cpe:/o:redhat:rhel_aus:7.4::server",
"cpe:/o:redhat:rhel_e4s:7.4::server",
"cpe:/o:redhat:rhel_tus:7.4::server"
] | null | 7.4 | 8.1 | null |
RHSA-2022:8070
|
Red Hat Security Advisory: dnsmasq security and bug fix update
|
dnsmasq: Heap use after free in dhcp6_no_relay
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 7.5 | null | null |
RHSA-2014:0429
|
Red Hat Security Advisory: tomcat6 security update
|
tomcat: multiple content-length header poisoning flaws tomcat: incomplete fix for CVE-2012-3544 apache-commons-fileupload: denial of service due to too-small buffer size used by MultipartStream
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHBA-2024:7523
|
Red Hat Bug Fix Advisory: Red Hat Developer Hub 1.3.0 release
|
golang: net/netip: Unexpected behavior from Is methods for IPv4-mapped IPv6 addresses net/http: Denial of service due to improper 100-continue handling in net/http azure-identity: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/Azure/azure-sdk-for-go/sdk/azidentity urllib3: proxy-authorization request header is not stripped during cross-origin redirects fast-loops: prototype pollution via objectMergeDeep nodejs-async: Regular expression denial of service while parsing function in autoinject
|
[
"cpe:/a:redhat:rhdh:1.3::el9"
] | null | 5.3 | null | null |
RHSA-2008:0288
|
Red Hat Security Advisory: samba security update
|
Samba client buffer overflow
|
[
"cpe:/o:redhat:enterprise_linux:2.1::as",
"cpe:/o:redhat:enterprise_linux:2.1::aw",
"cpe:/o:redhat:enterprise_linux:2.1::es",
"cpe:/o:redhat:enterprise_linux:2.1::ws",
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws",
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2014:1390
|
Red Hat Security Advisory: luci security, bug fix, and enhancement update
|
luci: privilege escalation through cluster with specially crafted configuration
|
[
"cpe:/o:redhat:enterprise_linux:6::server"
] | null | null | null | null |
RHSA-2024:1309
|
Red Hat Security Advisory: .NET 7.0 security update
|
dotnet: DoS in .NET Core / YARP HTTP / 2 WebSocket support
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::crb"
] | null | 7.5 | null | null |
RHSA-2016:0346
|
Red Hat Security Advisory: postgresql security update
|
postgresql: case insensitive range handling integer overflow leading to buffer overflow
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | null | null |
RHSA-2004:260
|
Red Hat Security Advisory: kernel security update
|
security flaw security flaw
|
[
"cpe:/o:redhat:enterprise_linux:2.1::as",
"cpe:/o:redhat:enterprise_linux:2.1::es",
"cpe:/o:redhat:enterprise_linux:2.1::ws"
] | null | null | null | null |
RHSA-2023:3809
|
Red Hat Security Advisory: Red Hat build of Quarkus 2.13.8 release and security update
|
apache-james-mime4j: Temporary File Information Disclosure in MIME4J TempFileStorageProvider quarkus: insecure permissions on temp files quarkus-oidc: ID and access tokens leak via the authorization code flow quarkus-core: TLS protocol configured with quarkus.http.ssl.protocols is not enforced, client can enforce weaker supported TLS protocol graphql-java: crafted GraphQL query causes stack consumption
|
[
"cpe:/a:redhat:quarkus:2.13::el8"
] | null | 7.5 | null | null |
RHSA-2005:165
|
Red Hat Security Advisory: rsh security update
|
security flaw
|
[
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2024:2961
|
Red Hat Security Advisory: Image builder components bug fix, enhancement and security update
|
osbuild-composer: race condition may disable GPG verification for package repositories
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 6.1 | null | null |
RHSA-2021:0663
|
Red Hat Security Advisory: Ansible security and bug fix update (2.9.18)
|
ansible: user data leak in snmp_facts module module: bitbucket_pipeline_variable exposes secured values ansible: multiple modules expose secured values ansible: basic.py no_log with fallback option
|
[
"cpe:/a:redhat:ansible_engine:2::el7",
"cpe:/a:redhat:ansible_engine:2::el8"
] | null | 5 | null | null |
RHSA-2016:2098
|
Red Hat Security Advisory: kernel security update
|
kernel: mm: privilege escalation via MAP_PRIVATE COW breakage
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 7.8 | null |
RHSA-2023:7623
|
Red Hat Security Advisory: Red Hat JBoss Web Server 5.7.7 release and security update
|
openssl: Denial of service by excessive resource usage in verifying X509 policy constraints openssl: Invalid certificate policies in leaf certificates are silently ignored openssl: Certificate policy check not enabled openssl: Possible DoS translating ASN.1 object identifiers openssl: Excessive time spent checking DH keys and parameters OpenSSL: Excessive time spent checking DH q parameter value tomcat: Open Redirect vulnerability in FORM authentication tomcat: FileUpload: DoS due to accumulation of temporary files on Windows
|
[
"cpe:/a:redhat:jboss_enterprise_web_server:5.7"
] | null | 5.9 | null | null |
RHSA-2014:1654
|
Red Hat Security Advisory: rsyslog7 security update
|
rsyslog: remote syslog PRI vulnerability
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2024:2776
|
Red Hat Security Advisory: OpenShift Container Platform 4.15.13 packages and security update
|
jose-go: improper handling of highly compressed data
|
[
"cpe:/a:redhat:openshift:4.15::el8",
"cpe:/a:redhat:openshift:4.15::el9"
] | null | 4.3 | null | null |
RHSA-2004:009
|
Red Hat Security Advisory: elm security update
|
security flaw
|
[
"cpe:/o:redhat:enterprise_linux:2.1::as",
"cpe:/o:redhat:enterprise_linux:2.1::aw"
] | null | null | null | null |
RHSA-2023:0016
|
Red Hat Security Advisory: webkit2gtk3 security update
|
webkitgtk: processing maliciously crafted web content may lead to an arbitrary code execution
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 8.8 | null | null |
RHSA-2014:1914
|
Red Hat Security Advisory: ruby200-ruby security update
|
ruby: off-by-one stack-based buffer overflow in the encodes() function ruby: REXML billion laughs attack via parameter entity expansion ruby: REXML incomplete fix for CVE-2014-8080
|
[
"cpe:/a:redhat:rhel_software_collections:1::el6",
"cpe:/a:redhat:rhel_software_collections:1::el7"
] | null | null | null | null |
RHSA-2008:0110
|
Red Hat Security Advisory: openldap security update
|
openldap: slapd crash on NOOP control operation on entry in bdb storage openldap: slapd crash on modrdn operation with NOOP control on entry in bdb storage
|
[
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws",
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2023:6343
|
Red Hat Security Advisory: LibRaw security update
|
LibRaw: stack buffer overflow in LibRaw_buffer_datastream::gets() in src/libraw_datastream.cpp
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::crb"
] | null | 5.3 | null | null |
RHSA-2023:4777
|
Red Hat Security Advisory: Red Hat OpenShift support for Windows Containers 7.1.1 security update
|
kubernetes: Insufficient input sanitization on Windows nodes leads to privilege escalation kubernetes: Insufficient input sanitization on Windows nodes leads to privilege escalation
|
[
"cpe:/a:redhat:openshift:4.12::el8"
] | null | 8.8 | null | null |
RHSA-2024:0876
|
Red Hat Security Advisory: kpatch-patch security update
|
kernel: net/sched: sch_hfsc UAF kernel: use-after-free in sch_qfq network scheduler kernel: IGB driver inadequate buffer size for frames larger than MTU kernel: ktls overwrites readonly memory pages when using function splice with a ktls socket as destination
|
[
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 7 | null | null |
RHSA-2017:2796
|
Red Hat Security Advisory: kernel security update
|
kernel: load_elf_ binary() does not take account of the need to allocate sufficient space for the entire binary
|
[
"cpe:/o:redhat:rhel_eus:6.7::computenode",
"cpe:/o:redhat:rhel_eus:6.7::server"
] | null | null | 7.8 | null |
RHSA-2021:3961
|
Red Hat Security Advisory: OpenJDK 8u312 Windows Builds release and security update
|
OpenJDK: Weak ciphers preferred over stronger ones for TLS (JSSE, 8264210) OpenJDK: Excessive memory allocation in RTFParser (Swing, 8265167) OpenJDK: Excessive memory allocation in RTFReader (Swing, 8265580) OpenJDK: Excessive memory allocation in HashMap and HashSet (Utility, 8266097) OpenJDK: Certificates with end dates too far in the future can corrupt keystore (Keytool, 8266137) OpenJDK: Loop in HttpsServer triggered during TLS session close (JSSE, 8254967) OpenJDK: Incorrect principal selection when using Kerberos Constrained Delegation (Libraries, 8266689) OpenJDK: Unexpected exception raised during TLS handshake (JSSE, 8267729) OpenJDK: Excessive memory allocation in BMPImageReader (ImageIO, 8267735) OpenJDK: Incomplete validation of inner class references in ClassFileParser (Hotspot, 8268071) OpenJDK: Non-constant comparison during TLS handshakes (JSSE, 8269618)
|
[
"cpe:/a:redhat:openjdk:1.8::windows"
] | null | 3.7 | null | null |
RHSA-2022:8961
|
Red Hat Security Advisory: Red Hat Single Sign-On 7.6.1 security update on RHEL 7
|
keycloak: path traversal via double URL encoding keycloak: Session takeover with OIDC offline refreshtokens
|
[
"cpe:/a:redhat:red_hat_single_sign_on:7.6::el7"
] | null | 6.8 | null | null |
RHSA-2024:8314
|
Red Hat Security Advisory: Logging for Red Hat OpenShift - 6.0.1
|
go-retryablehttp: url might write sensitive information to log file net/http: Denial of service due to improper 100-continue handling in net/http go/parser: golang: Calling any of the Parse functions containing deeply nested literals can cause a panic/stack exhaustion encoding/gob: golang: Calling Decoder.Decode on a message which contains deeply nested structures can cause a panic due to stack exhaustion go/build/constraint: golang: Calling Parse on a "// +build" build tag line with deeply nested expressions can cause a panic due to stack exhaustion
|
[
"cpe:/a:redhat:logging:6.0::el9"
] | null | 5.9 | null | null |
RHSA-2021:2034
|
Red Hat Security Advisory: redis:6 security update
|
redis: Integer overflow via STRALGO LCS command
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 8.8 | null | null |
RHSA-2014:0195
|
Red Hat Security Advisory: Red Hat JBoss Portal 6.1.1 update
|
Java: Java XML Signature DoS Attack Java: XML eXternal Entity (XXE) flaw in ParserPool and Decrypter
|
[
"cpe:/a:redhat:jboss_enterprise_portal_platform:6.1.1"
] | null | null | null | null |
RHSA-2023:0078
|
Red Hat Security Advisory: .NET 6.0 security, bug fix, and enhancement update
|
dotnet: Parsing an empty HTTP response as a JSON.NET JObject causes a stack overflow and crashes a process
|
[
"cpe:/a:redhat:rhel_dotnet:6.0::el7"
] | null | 7.5 | null | null |
RHSA-2024:0627
|
Red Hat Security Advisory: gnutls security update
|
gnutls: incomplete fix for CVE-2023-5981
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 7.5 | null | null |
RHSA-2009:1190
|
Red Hat Security Advisory: nspr and nss security and bug fix update
|
nss regexp heap overflow firefox/nss: doesn't handle NULL in Common Name properly deprecate MD2 in SSL cert validation (Kaminsky)
|
[
"cpe:/o:redhat:rhel_eus:4.7::as",
"cpe:/o:redhat:rhel_eus:4.7::es"
] | null | null | null | null |
RHSA-2006:0698
|
Red Hat Security Advisory: openssh security update
|
security flaw local to local copy uses shell expansion twice openssh DoS unsafe GSSAPI signal handler
|
[
"cpe:/o:redhat:enterprise_linux:2.1::as",
"cpe:/o:redhat:enterprise_linux:2.1::aw",
"cpe:/o:redhat:enterprise_linux:2.1::es",
"cpe:/o:redhat:enterprise_linux:2.1::ws"
] | null | null | null | null |
RHSA-2011:0474
|
Red Hat Security Advisory: thunderbird security update
|
Mozilla dangling pointer flaw (MFSA 2011-13) Mozilla crash from several marquee elements (MFSA 2011-12) Mozilla crash from bad iframe source (MFSA 2011-12) Mozilla integer overflow in frameset spec (MFSA 2011-12) Mozilla OOM condition arbitrary memory write (MFSA 2011-12) Mozilla memory safety issue (MFSA 2011-12)
|
[
"cpe:/a:redhat:rhel_productivity:5",
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws",
"cpe:/o:redhat:enterprise_linux:5::client"
] | null | null | null | null |
RHSA-2025:3534
|
Red Hat Security Advisory: libgcrypt security update
|
libgcrypt: vulnerable to Marvin Attack
|
[
"cpe:/a:redhat:rhel_eus:9.2::appstream",
"cpe:/o:redhat:rhel_eus:9.2::baseos"
] | null | 5.9 | null | null |
RHSA-2019:1235
|
Red Hat Security Advisory: ruby security update
|
rubygems: Escape sequence injection vulnerability in verbose rubygems: Escape sequence injection vulnerability in gem owner rubygems: Escape sequence injection vulnerability in API response handling rubygems: Installing a malicious gem may lead to arbitrary code execution rubygems: Escape sequence injection vulnerability in errors
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 5.3 | null |
RHSA-2023:5689
|
Red Hat Security Advisory: bind security update
|
bind: stack exhaustion in control channel code may lead to DoS
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::crb"
] | null | 7.5 | null | null |
RHSA-2011:0413
|
Red Hat Security Advisory: glibc security update
|
glibc: fix causes linker to search CWD when running privileged program with $ORIGIN in R*PATH glibc: fnmatch() alloca()-based memory corruption flaw glibc: insufficient quoting in the locale command output glibc: ld.so insecure handling of privileged programs' RPATHs with $ORIGIN glibc: fnmatch() alloca()-based memory corruption flaw
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2024:1665
|
Red Hat Security Advisory: Red Hat Advanced Cluster Management 2.8.6 security and bug fix updates
|
golang-protobuf: encoding/protojson, internal/encoding/json: infinite loop in protojson.Unmarshal when unmarshaling certain forms of invalid JSON
|
[
"cpe:/a:redhat:acm:2.8::el8"
] | null | 5.9 | null | null |
RHSA-2023:3149
|
Red Hat Security Advisory: thunderbird security update
|
Mozilla: Browser prompts could have been obscured by popups Mozilla: Crash in RLBox Expat driver Mozilla: Potential permissions request bypass via clickjacking Mozilla: Content process crash due to invalid wasm code Mozilla: Potential spoof due to obscured address bar Mozilla: Potential memory corruption in FileReader::DoReadData() Mozilla: Memory safety bugs fixed in Firefox 113 and Firefox ESR 102.11
|
[
"cpe:/a:redhat:rhel_eus:9.0::appstream"
] | null | 8.8 | null | null |
RHSA-2023:4335
|
Red Hat Security Advisory: Security Update for cert-manager Operator for Red Hat OpenShift 1.10.3
|
golang.org/x/net/http2: avoid quadratic complexity in HPACK decoding golang: crypto/tls: large handshake records may cause panics golang: net/http, mime/multipart: denial of service from excessive resource consumption golang: net/http, net/textproto: denial of service from excessive memory allocation golang: net/http, net/textproto, mime/multipart: denial of service from excessive resource consumption golang: go/parser: Infinite loop in parsing golang: html/template: backticks not treated as string delimiters golang: html/template: improper sanitization of CSS values golang: html/template: improper handling of JavaScript whitespace golang: html/template: improper handling of empty HTML attributes
|
[
"cpe:/a:redhat:cert_manager:1.10::el9"
] | null | 7.3 | null | null |
RHSA-2013:0203
|
Red Hat Security Advisory: rubygem-activesupport security update
|
rubygem-activesupport: json to yaml parsing
|
[
"cpe:/a:cloudforms_cloudengine:1::el6",
"cpe:/a:cloudforms_systemengine:1::el6"
] | null | null | null | null |
RHSA-2023:0171
|
Red Hat Security Advisory: dpdk security update
|
dpdk: DoS when a Vhost header crosses more than two descriptors and exhausts all mbufs
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 8.6 | null | null |
RHSA-2021:2290
|
Red Hat Security Advisory: nginx:1.16 security update
|
nginx: Off-by-one in ngx_resolver_copy() when labels are followed by a pointer to a root domain name
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:rhel_eus:8.1::appstream",
"cpe:/a:redhat:rhel_eus:8.2::appstream"
] | null | 8.1 | null | null |
RHSA-2021:4044
|
Red Hat Security Advisory: flatpak security update
|
flatpak: Sandbox bypass via recent VFS-manipulating syscalls
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 8.8 | null | null |
RHSA-2023:7678
|
Red Hat Security Advisory: Red Hat AMQ Streams 2.6.0 release and security update
|
apache-ivy: XML External Entity vulnerability guava: insecure temporary directory creation JSON-java: parser confusion leads to OOM spring-boot: Security Bypass With Wildcard Pattern Matching on Cloud Foundry jose4j: Insecure iteration count setting bouncycastle: potential blind LDAP injection attack using a self-signed certificate jetty: Improper validation of HTTP/1 content-length tomcat: Open Redirect vulnerability in FORM authentication gradle: Possible local text file exfiltration by XML External entity injection gradle: Incorrect permission assignment for symlinked files used in copy or archiving operations zookeeper: Authorization Bypass in Apache ZooKeeper
|
[
"cpe:/a:redhat:amq_streams:2"
] | null | 9.1 | null | null |
RHSA-2003:386
|
Red Hat Security Advisory: freeradius security update
|
security flaw
|
[
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::es"
] | null | null | null | null |
RHSA-2009:1160
|
Red Hat Security Advisory: httpd22 security update
|
apr-util heap buffer underwrite httpd: AllowOverride Options=IncludesNoExec allows Options Includes httpd: mod_proxy reverse proxy DoS (infinite loop) httpd: possible temporary DoS (CPU consumption) in mod_deflate apr-util billion laughs attack
|
[
"cpe:/a:redhat:jboss_enterprise_web_server:1::el4"
] | null | null | null | null |
RHSA-2015:0831
|
Red Hat Security Advisory: openstack-packstack and openstack-puppet-modules update
|
openstack-puppet-modules: pacemaker configured with default password
|
[
"cpe:/a:redhat:openstack:5::el7"
] | null | null | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.