id
stringlengths 13
15
| title
stringlengths 29
176
| description
stringlengths 8
32.1k
| cpes
listlengths 0
20
| cvss_v4_0
null | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
null |
---|---|---|---|---|---|---|---|
RHSA-2022:5526
|
Red Hat Security Advisory: squid:4 security update
|
squid: DoS when processing gopher server responses
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 7.5 | null | null |
RHSA-2024:8679
|
Red Hat Security Advisory: podman security update
|
buildah: Buildah allows arbitrary directory mount
|
[
"cpe:/a:redhat:rhel_eus:9.0::appstream"
] | null | 7.8 | null | null |
RHSA-2022:0232
|
Red Hat Security Advisory: kpatch-patch security update
|
kernel: xfs: raw block device data leak in XFS_IOC_ALLOCSP IOCTL kernel: fs_context: heap overflow in legacy parameter handling
|
[
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 7.8 | null | null |
RHSA-2023:7725
|
Red Hat Security Advisory: RHACS 4.3 enhancement and security update
|
dexidp: gaining access to applications accepting that token
|
[
"cpe:/a:redhat:advanced_cluster_security:4.3::el8"
] | null | 6.5 | null | null |
RHSA-2009:0021
|
Red Hat Security Advisory: kernel security update
|
kernel: Unix sockets kernel panic Linux Kernel 'atm module' Local Denial of Service kernel: fix inotify watch removal/umount races kernel: fix soft lockups/OOM issues with unix socket garbage collector
|
[
"cpe:/o:redhat:rhel_eus:5.2"
] | null | null | null | null |
RHSA-2013:1273
|
Red Hat Security Advisory: spice-gtk security update
|
spice-gtk: Insecure calling of polkit via polkit_unix_process_new()
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2023:0096
|
Red Hat Security Advisory: dbus security update
|
dbus: dbus-daemon crashes when receiving message with incorrectly nested parentheses and curly brackets dbus: dbus-daemon can be crashed by messages with array length inconsistent with element type dbus: `_dbus_marshal_byteswap` doesn't process fds in messages with "foreign" endianness correctly
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 6.5 | null | null |
RHSA-2021:1702
|
Red Hat Security Advisory: brotli security update
|
brotli: buffer overflow when input chunk is larger than 2GiB
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 6.5 | null | null |
RHSA-2020:3456
|
Red Hat Security Advisory: libvncserver security update
|
libvncserver: websocket decoding buffer overflow
|
[
"cpe:/a:redhat:rhel_eus:8.1::appstream",
"cpe:/a:redhat:rhel_eus:8.1::crb"
] | null | 9.8 | null | null |
RHBA-2019:3303
|
Red Hat Bug Fix Advisory: OpenShift Container Platform 4.2.4 images update
|
golang: HTTP/1.1 headers with a space before the colon leads to filter bypass or request smuggling
|
[
"cpe:/a:redhat:openshift:4.2::el7",
"cpe:/a:redhat:openshift:4.2::el8"
] | null | null | 6.5 | null |
RHSA-2019:0367
|
Red Hat Security Advisory: Red Hat JBoss Core Services Apache HTTP Server 2.4.29 security update
|
httpd: Out of bounds write in mod_authnz_ldap when using too small Accept-Language values httpd: <FilesMatch> bypass with a trailing newline in the file name openssl: Handling of crafted recursive ASN.1 structures can cause a stack overflow and resulting denial of service httpd: Improper handling of headers in mod_session can allow a remote user to modify session data for CGI applications httpd: Out of bounds access after failure in reading the HTTP request httpd: Use-after-free on HTTP/2 stream shutdown httpd: Out of bounds read in mod_cache_socache can allow a remote attacker to cause DoS httpd: Weak Digest auth nonce generation in mod_auth_digest httpd: mod_http2: Too much time allocated to workers, possibly leading to DoS mod_jk: connector path traversal due to mishandled HTTP requests in httpd httpd: DoS for HTTP/2 connections by continuous SETTINGS frames nghttp2: Null pointer dereference when too large ALTSVC frame is received
|
[
"cpe:/a:redhat:jboss_core_services:1::el6",
"cpe:/a:redhat:jboss_core_services:1::el7"
] | null | null | 5.9 | null |
RHSA-2022:6179
|
Red Hat Security Advisory: firefox security update
|
Mozilla: Address bar spoofing via XSLT error handling Mozilla: Cross-origin XSLT Documents would have inherited the parent's permissions Mozilla: Data race and potential use-after-free in PK11_ChangePW Mozilla: Memory safety bugs fixed in Firefox 104 and Firefox ESR 102.2 Mozilla: Memory safety bugs fixed in Firefox 104, Firefox ESR 102.2, and Firefox ESR 91.13
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 8.8 | 7.5 | null |
RHSA-2016:2061
|
Red Hat Security Advisory: mariadb-galera security and bug fix update
|
mysql: general_log can write to configuration files, leading to privilege escalation (CPU Oct 2016)
|
[
"cpe:/a:redhat:openstack:7::el7"
] | null | null | 9.8 | null |
RHSA-2018:0109
|
Red Hat Security Advisory: libvirt security update
|
An update for libvirt is now available for Red Hat Enterprise Linux 6.6 Advanced Update Support and Red Hat Enterprise Linux 6.6 Telco Extended Update Support.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
|
[
"cpe:/o:redhat:rhel_aus:6.6::server",
"cpe:/o:redhat:rhel_tus:6.6::server"
] | null | null | null | null |
RHSA-2016:2136
|
Red Hat Security Advisory: java-1.8.0-ibm security update
|
OpenJDK: missing algorithm restrictions for jar verification (Libraries, 8155973) OpenJDK: insufficient classloader consistency checks in ClassLoaderWithRepository (JMX, 8157739) JDK: unspecified vulnerability fixed in 6u131, 7u121, and 8u111 (2D) OpenJDK: insufficient checks of JDWP packets (Hotspot, 8159519) OpenJDK: exposure of server authentication credentials to proxy (Networking, 8160838)
|
[
"cpe:/a:redhat:rhel_extras:6",
"cpe:/a:redhat:rhel_extras:7"
] | null | null | 5.3 | null |
RHSA-2004:178
|
Red Hat Security Advisory: lha security update
|
security flaw security flaw
|
[
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws"
] | null | null | null | null |
RHSA-2019:2308
|
Red Hat Security Advisory: libguestfs-winsupport security update
|
ntfs-3g: heap-based buffer overflow leads to local root privilege escalation
|
[
"cpe:/o:redhat:enterprise_linux:7::server"
] | null | null | 3.3 | null |
RHSA-2010:0628
|
Red Hat Security Advisory: vdsm22 security and bug fix update
|
vdsm: SSL accept() blocks on a non-blocking Connection
|
[
"cpe:/a:redhat:enterprise_linux:5::hypervisor"
] | null | null | null | null |
RHSA-2025:4019
|
Red Hat Security Advisory: OpenShift Container Platform 4.18.10 bug fix and security update
|
helm: shows secrets with --dry-run option in clear text dompurify: XSS vulnerability via prototype pollution kernel: ALSA: usb-audio: Fix out of bounds reads when finding clock sources golang-jwt/jwt: jwt-go allows excessive memory allocation during header parsing
|
[
"cpe:/a:redhat:openshift:4.18::el9"
] | null | 7.5 | null | null |
RHSA-2023:0450
|
Red Hat Security Advisory: OpenShift Container Platform 4.12.1 security update
|
aws-efs-utils: Race condition during concurrent TLS mounts in efs-utils and aws-efs-csi-driver
|
[
"cpe:/a:redhat:openshift:4.12::el8"
] | null | 5.6 | null | null |
RHSA-2004:234
|
Red Hat Security Advisory: ethereal security update
|
security flaw security flaw security flaw security flaw
|
[
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws"
] | null | null | null | null |
RHBA-2020:1628
|
Red Hat Bug Fix Advisory: pcp bug fix and enhancement update
|
pcp: Local privilege escalation in pcp spec file %post section pcp: Local privilege escalation in pcp spec file through migrate_tempdirs
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 7.3 | null | null |
RHSA-2024:3523
|
Red Hat Security Advisory: OpenShift Container Platform 4.14.28 bug fix and security update
|
golang: net/http, x/net/http2: unlimited number of CONTINUATION frames causes DoS jose-go: improper handling of highly compressed data
|
[
"cpe:/a:redhat:openshift:4.14::el8",
"cpe:/a:redhat:openshift:4.14::el9"
] | null | 4.3 | null | null |
RHSA-2022:7216
|
Red Hat Security Advisory: OpenShift Container Platform 4.9.51 bug fix and security update
|
go-getter: command injection vulnerability go-getter: unsafe download (issue 1 of 3) go-getter: unsafe download (issue 2 of 3) go-getter: unsafe download (issue 3 of 3)
|
[
"cpe:/a:redhat:openshift:4.9::el8"
] | null | 8.6 | null | null |
RHSA-2022:6821
|
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.4.7 Security update
|
undertow: potential security issue in flow control over HTTP/2 may lead to DOS(incomplete fix for CVE-2021-3629) undertow: Large AJP request may cause DoS snakeyaml: Denial of Service due to missing nested depth limitation for collections
|
[
"cpe:/a:redhat:jboss_enterprise_application_platform:7.4::el7"
] | null | 7.5 | null | null |
RHSA-2017:0725
|
Red Hat Security Advisory: bash security and bug fix update
|
bash: Arbitrary code execution via malicious hostname bash: Specially crafted SHELLOPTS+PS4 variables allows command substitution bash: popd controlled free
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | 3.3 | null |
RHSA-2024:5202
|
Red Hat Security Advisory: OpenShift Container Platform 4.12.63 packages and security update
|
golang: net/http: golang: mime/multipart: golang: net/textproto: memory exhaustion in Request.ParseMultipartForm golang: net/netip: Unexpected behavior from Is methods for IPv4-mapped IPv6 addresses gorilla/schema: Potential memory exhaustion attack due to sparse slice deserialization
|
[
"cpe:/a:redhat:openshift:4.12::el8",
"cpe:/a:redhat:openshift:4.12::el9"
] | null | 7.5 | null | null |
RHSA-2014:0527
|
Red Hat Security Advisory: Red Hat JBoss Web Server 2.0.1 tomcat7 security update
|
tomcat: multiple content-length header poisoning flaws tomcat: incomplete fix for CVE-2012-3544 apache-commons-fileupload: denial of service due to too-small buffer size used by MultipartStream
|
[
"cpe:/a:redhat:jboss_enterprise_web_server:2.0"
] | null | null | null | null |
RHSA-2018:3002
|
Red Hat Security Advisory: java-1.8.0-oracle security update
|
OpenJDK: Incorrect handling of unsigned attributes in signed Jar manifests (Security, 8194534) OpenJDK: Leak of sensitive header data via HTTP redirect (Networking, 8196902) OpenJDK: Incomplete enforcement of the trustURLCodebase restriction (JNDI, 8199177) OpenJDK: Improper field access checks (Hotspot, 8199226) OpenJDK: Missing endpoint identification algorithm check during TLS session resumption (JSSE, 8202613) OpenJDK: Unrestricted access to scripting engine (Scripting, 8202936) JDK: unspecified vulnerability fixed in 8u191 (JavaFX) JDK: unspecified vulnerability fixed in 8u191 and 11.0.1 (Serviceability) OpenJDK: Infinite loop in RIFF format reader (Sound, 8205361) libpng: Integer overflow and resultant divide-by-zero in pngrutil.c:png_check_chunk_length() allows for denial of service
|
[
"cpe:/a:redhat:rhel_extras_oracle_java:7"
] | null | null | 6.5 | null |
RHSA-2022:1356
|
Red Hat Security Advisory: OpenShift Container Platform 4.10.10 bug fix and security update
|
prometheus/client_golang: Denial of service using InstrumentHandlerCounter
|
[
"cpe:/a:redhat:openshift:4.10::el8"
] | null | 7.5 | null | null |
RHSA-2020:2239
|
Red Hat Security Advisory: java-1.8.0-ibm security update
|
OpenJDK: Improper handling of Kerberos proxy credentials (Kerberos, 8220302) OpenJDK: Excessive memory usage in OID processing in X.509 certificate parsing (Libraries, 8234037) OpenJDK: Misplaced regular expression syntax error check in RegExpScanner (Scripting, 8223898) OpenJDK: Incorrect handling of empty string nodes in regular expression Parser (Scripting, 8223904) OpenJDK: Incorrect handling of references to uninitialized class descriptors during deserialization (Serialization, 8224541) OpenJDK: Uncaught InstantiationError exception in ObjectStreamClass (Serialization, 8224549) OpenJDK: Re-use of single TLS session for new connections (JSSE, 8234408) OpenJDK: CRLF injection into HTTP headers in HttpServer (Lightweight HTTP Server, 8234825) OpenJDK: Incorrect bounds checks in NIO Buffers (Libraries, 8234841) OpenJDK: Incorrect type checks in MethodType.readObject() (Libraries, 8235274) OpenJDK: Regular expression DoS in Scanner (Concurrency, 8236201)
|
[
"cpe:/a:redhat:rhel_extras:6"
] | null | 5.3 | 6.8 | null |
RHSA-2023:6784
|
Red Hat Security Advisory: Node Health Check Operator 0.6.1 security update
|
golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487) HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack)
|
[
"cpe:/a:redhat:workload_availability_node_healthcheck:0.6::el8"
] | null | 7.5 | null | null |
RHSA-2020:5129
|
Red Hat Security Advisory: net-snmp security update
|
net-snmp: Improper Privilege Management in EXTEND MIB may lead to privileged commands execution
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | 8.8 | null | null |
RHBA-2019:1053
|
Red Hat Bug Fix Advisory: redhat-virtualization-host bug fix and enhancement update
|
openssl: Side-channel vulnerability on SMT/Hyper-Threading architectures (PortSmash)
|
[
"cpe:/o:redhat:enterprise_linux:7::hypervisor"
] | null | null | 4.8 | null |
RHSA-2024:0621
|
Red Hat Security Advisory: tigervnc security update
|
xorg-x11-server: Heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer xorg-x11-server: reattaching to different master device may lead to out-of-bounds memory access xorg-x11-server: heap buffer overflow in XISendDeviceHierarchyEvent xorg-x11-server: heap buffer overflow in DisableDevice
|
[
"cpe:/a:redhat:rhel_eus:8.6::appstream"
] | null | 7.8 | null | null |
RHSA-2012:0096
|
Red Hat Security Advisory: ghostscript security update
|
ghostscript: glyph data access improper input validation ghostscript: CWD included in the default library search path
|
[
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2024:0266
|
Red Hat Security Advisory: java-11-openjdk security update
|
OpenJDK: array out-of-bounds access due to missing range check in C1 compiler (8314468) OpenJDK: JVM class file verifier flaw allows unverified bytecode execution (8314295) OpenJDK: range check loop optimization issue (8314307) OpenJDK: arbitrary Java code execution in Nashorn (8314284) OpenJDK: logging of digital signature private keys (8316976) OpenJDK: RSA padding issue and timing side-channel attack against TLS (8317547)
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb",
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::crb",
"cpe:/a:redhat:rhel_eus:8.8::appstream",
"cpe:/a:redhat:rhel_eus:8.8::crb",
"cpe:/a:redhat:rhel_eus:9.2::appstream",
"cpe:/a:redhat:rhel_eus:9.2::crb"
] | null | 7.4 | null | null |
RHSA-2015:1636
|
Red Hat Security Advisory: net-snmp security update
|
net-snmp: snmp_pdu_parse() incompletely parsed varBinds left in list of variables net-snmp: Heap corruption in snmp_pdu_parse function in snmplib/snmp_api.c
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation",
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 6.5 | null |
RHSA-2019:2136
|
Red Hat Security Advisory: libssh2 security, bug fix, and enhancement update
|
libssh2: Zero-byte allocation with a specially crafted SFTP packed leading to an out-of-bounds read libssh2: Out-of-bounds reads with specially crafted SSH packets
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 5 | null |
RHSA-2024:1437
|
Red Hat Security Advisory: postgresql security update
|
postgresql: non-owner 'REFRESH MATERIALIZED VIEW CONCURRENTLY' executes arbitrary SQL
|
[
"cpe:/a:redhat:rhel_aus:8.4::appstream",
"cpe:/a:redhat:rhel_e4s:8.4::appstream",
"cpe:/a:redhat:rhel_tus:8.4::appstream"
] | null | 8 | null | null |
RHSA-2024:10265
|
Red Hat Security Advisory: kernel security update
|
kernel: xprtrdma: fix pointer derefs in error cases of rpcrdma_ep_create kernel: mptcp: pm: Fix uaf in __timer_delete_sync
|
[
"cpe:/o:redhat:rhel_aus:8.4::baseos",
"cpe:/o:redhat:rhel_e4s:8.4::baseos",
"cpe:/o:redhat:rhel_tus:8.4::baseos"
] | null | 7 | null | null |
RHSA-2024:1377
|
Red Hat Security Advisory: kpatch-patch security update
|
kernel: net/sched: sch_qfq component can be exploited if in qfq_change_agg function happens qfq_enqueue overhead kernel: out-of-bounds write in qfq_change_class function kernel: ktls overwrites readonly memory pages when using function splice with a ktls socket as destination
|
[
"cpe:/o:redhat:rhel_e4s:8.4::baseos"
] | null | 7 | null | null |
RHBA-2018:2796
|
Red Hat Bug Fix Advisory: podman bug fix update
|
docker: container breakout without selinux in enforcing mode
|
[
"cpe:/a:redhat:rhel_extras_other:7"
] | null | null | 6.3 | null |
RHSA-2023:4694
|
Red Hat Security Advisory: Release of containers for OSP 16.2.z (Train) director Operator
|
github.com/Masterminds/vcs: Command Injection via argument injection
|
[
"cpe:/a:redhat:openstack:16.2::el8"
] | null | 9.8 | null | null |
RHSA-2017:2908
|
Red Hat Security Advisory: rh-nodejs6-nodejs security update
|
nodejs: Constant Hashtable Seeds vulnerability c-ares: NAPTR parser out of bounds access
|
[
"cpe:/a:redhat:rhel_software_collections:2::el6",
"cpe:/a:redhat:rhel_software_collections:2::el7"
] | null | null | 6.5 | null |
RHSA-2018:3008
|
Red Hat Security Advisory: java-1.6.0-sun security update
|
JDK: unspecified vulnerability fixed in 6u201, 7u191, 8u181, and 10.0.2 (Libraries) OpenJDK: insufficient index validation in PatternSyntaxException getMessage() (Concurrency, 8199547) JDK: unspecified vulnerability fixed in 6u201, 7u191, 8u181, and 10.0.2 (JSSE) OpenJDK: Incorrect handling of unsigned attributes in signed Jar manifests (Security, 8194534) OpenJDK: Leak of sensitive header data via HTTP redirect (Networking, 8196902) OpenJDK: Incomplete enforcement of the trustURLCodebase restriction (JNDI, 8199177) OpenJDK: Missing endpoint identification algorithm check during TLS session resumption (JSSE, 8202613) OpenJDK: Infinite loop in RIFF format reader (Sound, 8205361) libpng: Integer overflow and resultant divide-by-zero in pngrutil.c:png_check_chunk_length() allows for denial of service
|
[
"cpe:/a:redhat:rhel_extras_oracle_java:6"
] | null | null | 6.5 | null |
RHSA-2005:025
|
Red Hat Security Advisory: exim security update
|
security flaw security flaw
|
[
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2021:2660
|
Red Hat Security Advisory: linuxptp security update
|
linuxptp: missing length check of forwarded messages
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 8.8 | null | null |
RHSA-2024:10268
|
Red Hat Security Advisory: edk2 security update
|
edk2: Integer overflows in PeCoffLoaderRelocateImage
|
[
"cpe:/a:redhat:rhel_eus:8.8::appstream"
] | null | 5.9 | null | null |
RHSA-2024:1192
|
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 8.0.1 security update
|
parsson: Denial of Service due to large number parsing jgit: arbitrary file overwrite apache-mina-sshd: information exposure in SFTP server implementations ssh: Prefix truncation attack on Binary Packet Protocol (BPP)
|
[
"cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el8"
] | null | 5.9 | null | null |
RHSA-2020:4445
|
Red Hat Security Advisory: librabbitmq security update
|
librabbitmq: integer overflow in amqp_handle_input in amqp_connection.c leads to heap-based buffer overflow
|
[
"cpe:/a:redhat:enterprise_linux:8::crb",
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 8.6 | null | null |
RHSA-2024:1086
|
Red Hat Security Advisory: libfastjson security update
|
libfastjson: integer overflow and out-of-bounds write via a large JSON file
|
[
"cpe:/a:redhat:rhel_eus:9.2::appstream"
] | null | 7.8 | null | null |
RHSA-2024:9401
|
Red Hat Security Advisory: microcode_ctl security update
|
kernel: local privilege escalation on Intel microcode on Intel(R) Xeon(R) kernel: Local information disclosure on Intel(R) Atom(R) processors kernel: Local information disclosure in some Intel(R) processors kernel: Possible Denial of Service on Intel(R) Processors kernel: Local information disclosure on Intel(R) Xeon(R) D processors with Intel(R) SGX due to incorrect calculation in microcode intel-microcode: Race conditions in some Intel(R) Processors intel-microcode: Unexpected behavior in Intel(R) Core(TM) Ultra Processors
|
[
"cpe:/o:redhat:enterprise_linux:9::baseos"
] | null | 4.7 | null | null |
RHSA-2007:1084
|
Red Hat Security Advisory: seamonkey security update
|
jar: protocol XSS Multiple flaws in Firefox Mozilla Cross-site Request Forgery flaw
|
[
"cpe:/o:redhat:enterprise_linux:2.1::as",
"cpe:/o:redhat:enterprise_linux:2.1::aw",
"cpe:/o:redhat:enterprise_linux:2.1::es",
"cpe:/o:redhat:enterprise_linux:2.1::ws",
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws",
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws",
"cpe:/o:redhat:rhel_eus:4.5::as",
"cpe:/o:redhat:rhel_eus:4.5::es"
] | null | null | null | null |
RHSA-2024:2952
|
Red Hat Security Advisory: resource-agents security and bug fix update
|
urllib3: Request body not stripped after redirect from 303 status changes request method to GET pycryptodome: side-channel leakage for OAEP decryption in PyCryptodome and pycryptodomex
|
[
"cpe:/a:redhat:enterprise_linux:8::highavailability",
"cpe:/a:redhat:enterprise_linux:8::resilientstorage"
] | null | 5.9 | null | null |
RHSA-2022:1154
|
Red Hat Security Advisory: OpenShift Container Platform 4.8.36 security update
|
ovn-kubernetes: Ingress network policy can be overruled by egress network policy on another pod
|
[
"cpe:/a:redhat:openshift:4.8::el8"
] | null | 8.2 | null | null |
RHSA-2024:3304
|
Red Hat Security Advisory: libreoffice security fix update
|
libreoffice: Improper Input Validation leading to arbitrary gstreamer plugin execution
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 8.3 | null | null |
RHSA-2009:0325
|
Red Hat Security Advisory: seamonkey security update
|
libpng arbitrary free() flaw Firefox 2 and 3 - Layout engine crashes Firefox 2 and 3 crashes in the JavaScript engine Firefox XUL Linked Clones Double Free Vulnerability Firefox XML data theft via RDFXMLDataSource and cross-domain redirect
|
[
"cpe:/o:redhat:enterprise_linux:2.1::as",
"cpe:/o:redhat:enterprise_linux:2.1::aw",
"cpe:/o:redhat:enterprise_linux:2.1::es",
"cpe:/o:redhat:enterprise_linux:2.1::ws",
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws",
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2021:4833
|
Red Hat Security Advisory: OpenShift Container Platform 4.9.9 security update
|
jenkins: FilePath#mkdirs does not check permission to create parent directories jenkins: File path filters do not canonicalize paths, allowing operations to follow symbolic links to outside allowed directories jenkins: FilePath#untar does not check permission to create symbolic links when unarchiving a symbolic link jenkins: FilePath#reading(FileVisitor) does not reject any operations allowing users to have unrestricted read access jenkins: FilePath#unzip and FilePath#untar were not subject to any access control jenkins: Agent processes are able to completely bypass file path filtering by wrapping the file operation in an agent file path jenkins: Creating symbolic links is possible without the symlink permission jenkins: The operations FilePath#renameTo and FilePath#moveAllChildrenTo only check read permission on the source path jenkins: When creating temporary files, permission to create files is only checked after they’ve been created. jenkins: FilePath#toURI, FilePath#hasSymlink, FilePath#absolutize, FilePath#isDescendant, and FilePath#get*DiskSpace do not check any permissions jenkins: FilePath#listFiles lists files outside directories with agent read access when following symbolic links. jenkins: Agent-to-controller access control allowed writing to sensitive directory used by Pipeline: Shared Groovy Libraries Plugin jenkins: Agent-to-controller access control allows reading/writing most content of build directories jenkins-2-plugins/subversion: does not restrict the name of a file when looking up a subversion key
|
[
"cpe:/a:redhat:openshift:4.9::el7",
"cpe:/a:redhat:openshift:4.9::el8"
] | null | 7.5 | null | null |
RHSA-2015:1417
|
Red Hat Security Advisory: mailman security and bug fix update
|
mailman: Local users able to read private mailing list archives mailman: directory traversal in MTA transports that deliver programmatically
|
[
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2022:0339
|
Red Hat Security Advisory: OpenShift Container Platform 4.9.19 security update
|
jenkins: no POST request is required for the endpoint handling manual build requests which could result in CSRF jenkins-2-plugins/docker-commons: does not sanitize the name of an image or a tag which could result in an OS command execution
|
[
"cpe:/a:redhat:openshift:4.9::el7",
"cpe:/a:redhat:openshift:4.9::el8"
] | null | 8.8 | null | null |
RHSA-2013:0206
|
Red Hat Security Advisory: JBoss Enterprise Application Platform 5.2.0 security update
|
Installer: Generated auto-install xml is world readable
|
[
"cpe:/a:redhat:jboss_enterprise_application_platform:5.2"
] | null | null | null | null |
RHSA-2016:2872
|
Red Hat Security Advisory: sudo security update
|
sudo: noexec bypass via system() and popen() sudo: noexec bypass via wordexp()
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation",
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 6.4 | null |
RHSA-2016:2766
|
Red Hat Security Advisory: kernel security and bug fix update
|
kernel: Stack overflow via ecryptfs and /proc/$pid/environ kernel: Fork of large process causes memory corruption
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | 7.8 | null |
RHSA-2023:4130
|
Red Hat Security Advisory: kernel security and bug fix update
|
kernel: tcindex: use-after-free vulnerability in traffic control index filter allows privilege escalation kernel: netfilter: use-after-free in nf_tables when processing batch requests can lead to privilege escalation
|
[
"cpe:/a:redhat:rhel_eus:8.6::crb",
"cpe:/o:redhat:rhel_eus:8.6::baseos",
"cpe:/o:redhat:rhev_hypervisor:4.4::el8"
] | null | 7.8 | null | null |
RHSA-2012:0451
|
Red Hat Security Advisory: rpm security update
|
rpm: insufficient validation of region tags rpm: improper validation of header contents total size in headerLoad() rpm: incorrect handling of negated offsets in headerVerifyInfo()
|
[
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server",
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation",
"cpe:/o:redhat:rhel_els:3::as",
"cpe:/o:redhat:rhel_els:3::es",
"cpe:/o:redhat:rhel_els:4::as",
"cpe:/o:redhat:rhel_els:4::es",
"cpe:/o:redhat:rhel_eus:5.6",
"cpe:/o:redhat:rhel_eus:6.0",
"cpe:/o:redhat:rhel_eus:6.1",
"cpe:/o:redhat:rhel_mission_critical:5.3"
] | null | null | null | null |
RHSA-2023:7160
|
Red Hat Security Advisory: opensc security and bug fix update
|
opensc: buffer overrun vulnerability in pkcs15 cardos_have_verifyrc_package
|
[
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 6.3 | null | null |
RHSA-2008:0492
|
Red Hat Security Advisory: gnutls security update
|
GNUTLS-SA-2008-1-1 GnuTLS buffer overflow GNUTLS-SA-2008-1-2 GnuTLS null-pointer dereference GNUTLS-SA-2008-1-3 GnuTLS memory overread flaw
|
[
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2002:193
|
Red Hat Security Advisory: openssl security update for Stronghold
|
security flaw
|
[
"cpe:/a:redhat:stronghold:4"
] | null | null | null | null |
RHSA-2022:0325
|
Red Hat Security Advisory: virt:av and virt-devel:av security and bug fix update
|
QEMU: block: fdc: null pointer dereference may lead to guest crash
|
[
"cpe:/a:redhat:advanced_virtualization:8.4::el8"
] | null | 3.2 | null | null |
RHSA-2018:1927
|
Red Hat Security Advisory: pcs security update
|
pcs: Debug parameter removal bypass, allowing information disclosure
|
[
"cpe:/o:redhat:enterprise_linux:6::server"
] | null | null | 4.3 | null |
RHSA-2016:0360
|
Red Hat Security Advisory: python-django security update
|
python-django: Information leak through date template filter
|
[
"cpe:/a:redhat:openstack-optools:7::el7"
] | null | null | null | null |
RHSA-2014:1326
|
Red Hat Security Advisory: php53 and php security update
|
gd: NULL pointer dereference in gdImageCreateFromXpm() file: incomplete fix for CVE-2012-1571 in cdf_read_property_info php: multiple buffer over-reads in php_parserr php: SPL Iterators use-after-free php: ArrayIterator use-after-free due to object change during sorting
|
[
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server",
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2014:0917
|
Red Hat Security Advisory: nss and nspr security, bug fix, and enhancement update
|
nss: false start PR_Recv information disclosure security issue nss: TOCTOU, potential use-after-free in libssl's session ticket processing (MFSA 2014-12) nss: Do not allow p-1 as a public DH value (MFSA 2014-12) nss: IDNA hostname matching code does not follow RFC 6125 recommendation (MFSA 2014-45) nss: Race-condition in certificate verification can lead to Remote code execution (MFSA 2014-63) Mozilla: Out of bounds write in NSPR (MFSA 2014-55)
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2009:1108
|
Red Hat Security Advisory: httpd security update
|
apr-util heap buffer underwrite apr-util billion laughs attack apr-util single NULL byte buffer overflow
|
[
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws"
] | null | null | null | null |
RHSA-2003:290
|
Red Hat Security Advisory: mod_ssl, openssl security update for Stronghold
|
security flaw CAN-2003-0543/0544 OpenSSL ASN.1 protocol crashes CAN-2003-0543/0544 OpenSSL ASN.1 protocol crashes
|
[
"cpe:/a:redhat:stronghold:4"
] | null | null | null | null |
RHSA-2020:5185
|
Red Hat Security Advisory: microcode_ctl security, bug fix and enhancement update
|
hw: Information disclosure issue in Intel SGX via RAPL interface hw: Vector Register Leakage-Active hw: Fast forward store predictor
|
[
"cpe:/o:redhat:rhel_eus:8.2::baseos"
] | null | 5.5 | null | null |
RHSA-2007:0108
|
Red Hat Security Advisory: thunderbird security update
|
security flaw NSS: SSLv2 protocol buffer overflows NSS: SSLv2 protocol buffer overflows security flaw security flaw security flaw security flaw security flaw security flaw : seamonkey cookie setting / same-domain bypass vulnerability security flaw security flaw security flaw
|
[
"cpe:/o:redhat:enterprise_linux:5::client"
] | null | null | null | null |
RHSA-2021:3918
|
Red Hat Security Advisory: redis:5 security update
|
redis: Lua scripts can overflow the heap-based Lua stack redis: Integer overflow issue with Streams redis: Integer overflow bug in the ziplist data structure redis: Denial of service via Redis Standard Protocol (RESP) request redis: Integer overflow issue with intsets redis: Integer overflow issue with strings
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 7.5 | null | null |
RHSA-2021:3445
|
Red Hat Security Advisory: kernel-rt security and bug fix update
|
kernel: out-of-bounds write due to a heap buffer overflow in __hidinput_change_resolution_multipliers() of hid-input.c kernel: use-after-free in route4_change() in net/sched/cls_route.c
|
[
"cpe:/a:redhat:rhel_eus:8.2::nfv",
"cpe:/a:redhat:rhel_eus:8.2::realtime"
] | null | 7.8 | null | null |
RHSA-2009:1189
|
Red Hat Security Advisory: flash-plugin security update
|
flash-plugin: Remote code execution vulnerability via malicious SWF (Shockwave Flash) content flash-plugin: multiple code execution flaws (APSB09-10) flash-plugin: multiple code execution flaws (APSB09-10) flash-plugin: multiple code execution flaws (APSB09-10) flash-plugin: multiple code execution flaws (APSB09-10) flash-plugin: multiple information disclosure flaws (APSB09-10) flash-plugin: multiple code execution flaws (APSB09-10) flash-plugin: multiple code execution flaws (APSB09-10) flash-plugin: multiple information disclosure flaws (APSB09-10)
|
[
"cpe:/a:redhat:rhel_extras:3",
"cpe:/a:redhat:rhel_extras:4"
] | null | null | null | null |
RHSA-2019:2177
|
Red Hat Security Advisory: sssd security, bug fix, and enhancement update
|
sssd: improper implementation of GPOs due to too restrictive permissions sssd: fallback_homedir returns '/' for empty home directories in passwd file
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 4.1 | null |
RHSA-2018:0496
|
Red Hat Security Advisory: kernel security and bug fix update
|
hw: cpu: speculative execution bounds-check bypass
|
[
"cpe:/o:redhat:rhel_eus:6.7::computenode",
"cpe:/o:redhat:rhel_eus:6.7::server"
] | null | null | 5.5 | null |
RHSA-2022:8856
|
Red Hat Security Advisory: Red Hat OpenStack Platform 16.2.4 (python-django-horizon) security update
|
OpenStack: Horizon session cookies are not flagged HttpOnly
|
[
"cpe:/a:redhat:openstack:16.2::el8"
] | null | 4.2 | null | null |
RHSA-2020:2509
|
Red Hat Security Advisory: Red Hat JBoss Web Server 5.3.1 security update
|
tomcat: deserialization flaw in session persistence storage leading to RCE
|
[
"cpe:/a:redhat:jboss_enterprise_web_server:5.3"
] | null | 7 | null | null |
RHSA-2022:6159
|
Red Hat Security Advisory: curl security update
|
curl: HTTP compression denial of service curl: FTP-KRB bad message verification
|
[
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 5.3 | null | null |
RHSA-2020:4050
|
Red Hat Security Advisory: qemu-kvm security update
|
QEMU: usb: out-of-bounds r/w access issue while processing usb packets
|
[
"cpe:/o:redhat:rhel_aus:7.3::server",
"cpe:/o:redhat:rhel_e4s:7.3::server",
"cpe:/o:redhat:rhel_tus:7.3::server"
] | null | 5 | null | null |
RHSA-2021:0837
|
Red Hat Security Advisory: openvswitch2.11 security update
|
lldp/openvswitch: denial of service via externally triggered memory leak openvswitch: limitation in the OVS packet parsing in userspace leads to DoS
|
[
"cpe:/o:redhat:enterprise_linux:8::fastdatapath"
] | null | 7.5 | null | null |
RHSA-2019:3932
|
Red Hat Security Advisory: Red Hat JBoss Core Services Apache HTTP Server 2.4.37 Security Release on RHEL 6
|
openssl: timing side channel attack in the DSA signature algorithm openssl: RSA key generation cache timing vulnerability in crypto/rsa/rsa_gen.c allows attackers to recover private keys openssl: Side-channel vulnerability on SMT/Hyper-Threading architectures (PortSmash) httpd: mod_http2: DoS via slow, unneeded request bodies httpd: mod_session_cookie does not respect expiry time httpd: mod_http2: read-after-free on a string compare httpd: mod_http2: possible crash on late upgrade httpd: mod_auth_digest: access control bypass due to race condition HTTP/2: large amount of data requests leads to denial of service HTTP/2: flood using PRIORITY frames results in excessive resource consumption HTTP/2: 0-length headers lead to denial of service HTTP/2: request for large response leads to denial of service
|
[
"cpe:/a:redhat:jboss_core_services:1::el6"
] | null | null | 7.5 | null |
RHSA-2007:0967
|
Red Hat Security Advisory: pcre security update
|
pcre regular expression flaws pcre regular expression flaws
|
[
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2018:1779
|
Red Hat Security Advisory: xmlrpc3 security update
|
xmlrpc: Deserialization of untrusted Java object through <ex:serializable> tag
|
[
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | 7.5 | null |
RHSA-2020:4676
|
Red Hat Security Advisory: virt:rhel and virt-devel:rhel security, bug fix, and enhancement update
|
QEMU: Slirp: use-after-free during packet reassembly libvirt: Potential DoS by holding a monitor job while querying QEMU guest-agent QEMU: slirp: use-after-free in ip_reass() function in ip_input.c libvirt: Potential denial of service via active pool without target path libvirt: leak of sensitive cookie information via dumpxml libvirt: leak of /dev/mapper/control into QEMU guests
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb"
] | null | 8.8 | 5.6 | null |
RHSA-2024:7921
|
Red Hat Security Advisory: OpenShift Container Platform 4.17.1 security and extras update
|
opentelemetry: DoS vulnerability in otelhttp
|
[
"cpe:/a:redhat:openshift:4.17::el9"
] | null | 7.5 | null | null |
RHSA-2019:2582
|
Red Hat Security Advisory: pango security update
|
pango: pango_log2vis_get_embedding_levels() heap-based buffer overflow
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | null | 9.8 | null |
RHSA-2023:5189
|
Red Hat Security Advisory: libwebp security update
|
libwebp: Heap buffer overflow in WebP Codec libwebp: out-of-bounds write with a specially crafted WebP lossless file
|
[
"cpe:/a:redhat:rhel_eus:8.6::appstream"
] | null | 0 | null | null |
RHSA-2011:1800
|
Red Hat Security Advisory: JBoss Enterprise Application Platform 5.1.2 update
|
Invoker servlets authentication bypass (HTTP verb tampering) extension): MITM due to improper validation of AX attribute signatures
|
[
"cpe:/a:redhat:jboss_enterprise_application_platform:5::el4"
] | null | null | null | null |
RHSA-2020:3733
|
Red Hat Security Advisory: httpd24-httpd security update
|
httpd: Push diary crash on specifically crafted HTTP/2 header
|
[
"cpe:/a:redhat:rhel_software_collections:3::el6",
"cpe:/a:redhat:rhel_software_collections:3::el7"
] | null | 7.5 | null | null |
RHSA-2014:0949
|
Red Hat Security Advisory: kernel security update
|
kernel: x86_64: ptrace: sysret to non-canonical address
|
[
"cpe:/o:redhat:rhel_mission_critical:6.2::server"
] | null | null | null | null |
RHSA-2024:2038
|
Red Hat Security Advisory: tigervnc security update
|
xorg-x11-server: Heap buffer overread/data leakage in ProcXIGetSelectedEvents xorg-x11-server: Heap buffer overread/data leakage in ProcXIPassiveGrabDevice xorg-x11-server: Use-after-free in ProcRenderAddGlyphs
|
[
"cpe:/a:redhat:rhel_eus:8.8::appstream"
] | null | 7.8 | null | null |
RHSA-2022:8845
|
Red Hat Security Advisory: Red Hat OpenStack Platform 16.2.4 (python-paramiko) security update
|
python-paramiko: Race condition in the write_private_key_file function
|
[
"cpe:/a:redhat:openstack:16.2::el8"
] | null | 5.1 | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.