id
stringlengths 13
15
| title
stringlengths 29
176
| description
stringlengths 8
32.1k
| cpes
listlengths 0
20
| cvss_v4_0
null | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
null |
---|---|---|---|---|---|---|---|
RHSA-2022:8964
|
Red Hat Security Advisory: updated rh-sso-7/sso76-openshift-rhel8 container and operator related images
|
keycloak: path traversal via double URL encoding keycloak: Session takeover with OIDC offline refreshtokens
|
[
"cpe:/a:redhat:rhosemc:1.0::el8"
] | null | 6.8 | null | null |
RHSA-2024:2512
|
Red Hat Security Advisory: file security update
|
file: stack-based buffer over-read in file_copystr in funcs.c
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::crb",
"cpe:/o:redhat:enterprise_linux:9::baseos"
] | null | 5.5 | null | null |
RHSA-2024:3462
|
Red Hat Security Advisory: kernel security and bug fix update
|
kernel: net:emac/emac-mac: Fix a use after free in emac_mac_tx_buf_send RHEL: Add Spectre-BHB mitigation for AmpereOne kernel: net: bridge: data races indata-races in br_handle_frame_finish()
|
[
"cpe:/a:redhat:rhel_eus:8.6::crb",
"cpe:/o:redhat:rhel_eus:8.6::baseos",
"cpe:/o:redhat:rhev_hypervisor:4.4::el8"
] | null | 4.7 | null | null |
RHSA-2024:0237
|
Red Hat Security Advisory: java-11-openjdk security update
|
OpenJDK: array out-of-bounds access due to missing range check in C1 compiler (8314468) OpenJDK: JVM class file verifier flaw allows unverified bytecode execution (8314295) OpenJDK: range check loop optimization issue (8314307) OpenJDK: arbitrary Java code execution in Nashorn (8314284) OpenJDK: logging of digital signature private keys (8316976) OpenJDK: RSA padding issue and timing side-channel attack against TLS (8317547)
|
[
"cpe:/a:redhat:rhel_eus:9.0::appstream",
"cpe:/a:redhat:rhel_eus:9.0::crb"
] | null | 7.4 | null | null |
RHSA-2025:0300
|
Red Hat Security Advisory: Red Hat build of Keycloak 26.0.8 Update
|
org.keycloak:keycloak-quarkus-server: Denial of Service in Keycloak Server via Security Headers org.keycloak:keycloak-quarkus-server: Unrestricted admin use of system and environment variables
|
[
"cpe:/a:redhat:build_keycloak:26.0"
] | null | 4.9 | null | null |
RHSA-2007:0774
|
Red Hat Security Advisory: kernel security and bugfix update
|
ia64 crash Kernel: CAPI overflow
|
[
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2024:3323
|
Red Hat Security Advisory: pcp security update
|
pcp: exposure of the redis server backend allows remote command execution via pmproxy
|
[
"cpe:/a:redhat:rhel_aus:8.4::appstream",
"cpe:/a:redhat:rhel_e4s:8.4::appstream",
"cpe:/a:redhat:rhel_tus:8.4::appstream"
] | null | 8.8 | null | null |
RHSA-2020:1787
|
Red Hat Security Advisory: unzip security update
|
unzip: overlapping of files in ZIP container leads to denial of service
|
[
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | null | 4 | null |
RHSA-2019:2466
|
Red Hat Security Advisory: CloudForms 4.7.8 security, bug fix and enhancement update
|
cfme: Improper authorization in migration log controller allows any user to access VM migration logs
|
[
"cpe:/a:redhat:cloudforms_managementengine:5.10::el7"
] | null | null | 4.3 | null |
RHSA-2024:1386
|
Red Hat Security Advisory: ovn22.12 security update
|
ovn: insufficient validation of BFD packets may lead to denial of service
|
[
"cpe:/o:redhat:enterprise_linux:8::fastdatapath"
] | null | 6.5 | null | null |
RHSA-2020:5624
|
Red Hat Security Advisory: thunderbird security update
|
chromium-browser: Uninitialized Use in V8 Mozilla: Heap buffer overflow in WebGL Mozilla: CSS Sanitizer performed incorrect sanitization Mozilla: Incorrect cast of StyleGenericFlexBasis resulted in a heap use-after-free Mozilla: Internal network hosts could have been probed by a malicious webpage Mozilla: The proxy.onRequest API did not catch view-source URLs Mozilla: Memory safety bugs fixed in Firefox 84 and Firefox ESR 78.6
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 8.8 | 6.1 | null |
RHSA-2021:0110
|
Red Hat Security Advisory: Red Hat Integration Tech-Preview 2 Camel K security update
|
postgresql-jdbc: XML external entity (XXE) vulnerability in PgSQLXML
|
[
"cpe:/a:redhat:integration:1"
] | null | 7.7 | null | null |
RHSA-2022:1781
|
Red Hat Security Advisory: grafana security, bug fix, and enhancement update
|
grafana: directory traversal vulnerability
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 4.3 | null | null |
RHSA-2025:3880
|
Red Hat Security Advisory: kernel security update
|
kernel: ALSA: usb-audio: Fix out of bounds reads when finding clock sources
|
[
"cpe:/o:redhat:rhel_els:7"
] | null | 7.1 | null | null |
RHSA-2024:0641
|
Red Hat Security Advisory: OpenShift Container Platform 4.14.11 security and extras update
|
opentelemetry: DoS vulnerability in otelhttp go-git: Maliciously crafted Git server replies can cause DoS on go-git clients go-git: Maliciously crafted Git server replies can lead to path traversal and RCE on go-git clients
|
[
"cpe:/a:redhat:openshift:4.14::el8",
"cpe:/a:redhat:openshift:4.14::el9"
] | null | 8.1 | null | null |
RHSA-2019:1815
|
Red Hat Security Advisory: java-1.8.0-openjdk security update
|
OpenJDK: Side-channel attack risks in Elliptic Curve (EC) cryptography (Security, 8208698) OpenJDK: Insufficient checks of suppressed exceptions in deserialization (Utilities, 8212328) OpenJDK: Unbounded memory allocation during deserialization in Collections (Utilities, 8213432) OpenJDK: Insufficient restriction of privileges in AccessController (Security, 8216381) OpenJDK: Missing URL format validation (Networking, 8221518) OpenJDK: Missing array bounds check in crypto providers (JCE, 8223511)
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 3.7 | null |
RHSA-2021:3811
|
Red Hat Security Advisory: rh-mysql80-mysql security, bug fix, and enhancement update
|
mysql: Server: Stored Procedure unspecified vulnerability (CPU Oct 2020) mysql: Server: FTS unspecified vulnerability (CPU Oct 2020) mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2020) mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2020) mysql: InnoDB unspecified vulnerability (CPU Oct 2020) mysql: InnoDB unspecified vulnerability (CPU Oct 2020) mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2020) mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2020) mysql: Server: PS unspecified vulnerability (CPU Oct 2020) mysql: Server: FTS unspecified vulnerability (CPU Oct 2020) mysql: Server: PS unspecified vulnerability (CPU Oct 2020) mysql: InnoDB unspecified vulnerability (CPU Oct 2020) mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2020) mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2020) mysql: Server: Security: Encryption unspecified vulnerability (CPU Oct 2020) mysql: Server: FTS unspecified vulnerability (CPU Oct 2020) mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2020) mysql: Server: Locking unspecified vulnerability (CPU Oct 2020) mysql: Server: DML unspecified vulnerability (CPU Oct 2020) mysql: InnoDB unspecified vulnerability (CPU Oct 2020) mysql: Server: DML unspecified vulnerability (CPU Oct 2020) mysql: InnoDB unspecified vulnerability (CPU Oct 2020) mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2020) mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2020) mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2020) mysql: Server: Security: Privileges unspecified vulnerability (CPU Oct 2020) mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2020) mysql: Server: PS unspecified vulnerability (CPU Oct 2020) mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2020) mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2020) mysql: InnoDB unspecified vulnerability (CPU Oct 2020) mysql: Server: Charsets unspecified vulnerability (CPU Oct 2020) mysql: Server: Security: Roles unspecified vulnerability (CPU Oct 2020) mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2020) mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2020) mysql: Server: DDL unspecified vulnerability (CPU Oct 2020) mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2020) mysql: Server: X Plugin unspecified vulnerability (CPU Oct 2020) mysql: Server: Logging unspecified vulnerability (CPU Oct 2020) mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2020) mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2020) mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2020) mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2021) mysql: Server: Replication unspecified vulnerability (CPU Jan 2021) mysql: C API unspecified vulnerability (CPU Jan 2021) mysql: C API unspecified vulnerability (CPU Jan 2021) mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2021) mysql: InnoDB unspecified vulnerability (CPU Jan 2021) mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2021) mysql: InnoDB unspecified vulnerability (CPU Jan 2021) mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2021) mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2021) mysql: Information Schema unspecified vulnerability (CPU Jan 2021) mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2021) mysql: Server: Components Services unspecified vulnerability (CPU Jan 2021) mysql: InnoDB unspecified vulnerability (CPU Jan 2021) mysql: Server: Stored Procedure unspecified vulnerability (CPU Jan 2021) mysql: InnoDB unspecified vulnerability (CPU Jan 2021) mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2021) mysql: Server: DML unspecified vulnerability (CPU Jan 2021) mysql: Server: Locking unspecified vulnerability (CPU Jan 2021) mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2021) mysql: Server: DDL unspecified vulnerability (CPU Jan 2021) mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2021) mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2021) mysql: Server: Stored Procedure unspecified vulnerability (CPU Jan 2021) mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2021) mysql: Server: Stored Procedure unspecified vulnerability (CPU Jan 2021) mysql: Server: DML unspecified vulnerability (CPU Jan 2021) mysql: Server: DML unspecified vulnerability (CPU Jan 2021) mysql: Server: DDL unspecified vulnerability (CPU Jan 2021) mysql: Server: Options unspecified vulnerability (CPU Apr 2021) mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2021) mysql: Server: DML unspecified vulnerability (CPU Apr 2021) mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2021) mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2021) mysql: Server: Replication unspecified vulnerability (CPU Apr 2021) mysql: Server: DML unspecified vulnerability (CPU Apr 2021) mysql: InnoDB unspecified vulnerability (CPU Apr 2021) mysql: Server: Replication unspecified vulnerability (CPU Apr 2021) mysql: Server: Group Replication Plugin unspecified vulnerability (CPU Apr 2021) mysql: InnoDB unspecified vulnerability (CPU Apr 2021) mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2021) mysql: InnoDB unspecified vulnerability (CPU Apr 2021) mysql: Server: DML unspecified vulnerability (CPU Apr 2021) mysql: Server: Partition unspecified vulnerability (CPU Apr 2021) mysql: Server: Replication unspecified vulnerability (CPU Apr 2021) mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2021) mysql: Server: Partition unspecified vulnerability (CPU Apr 2021) mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2021) mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2021) mysql: Server: Stored Procedure unspecified vulnerability (CPU Apr 2021) mysql: Server: Stored Procedure unspecified vulnerability (CPU Apr 2021) mysql: Server: Information Schema unspecified vulnerability (CPU Apr 2021) mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2021) mysql: Server: Group Replication Plugin unspecified vulnerability (CPU Apr 2021) mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2021) mysql: Server: Stored Procedure unspecified vulnerability (CPU Apr 2021) mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2021) mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2021) mysql: Server: DML unspecified vulnerability (CPU Apr 2021) mysql: Server: Information Schema unspecified vulnerability (CPU Apr 2021) mysql: Server: Stored Procedure unspecified vulnerability (CPU Apr 2021) mysql: Server: DML unspecified vulnerability (CPU Apr 2021) mysql: Server: Packaging unspecified vulnerability (CPU Apr 2021) mysql: Server: Information Schema unspecified vulnerability (CPU Apr 2021) mysql: Server: DDL unspecified vulnerability (CPU Jul 2021) mysql: Server: Memcached unspecified vulnerability (CPU Jul 2021) mysql: Server: Optimizer unspecified vulnerability (CPU Jul 2021) mysql: Server: DDL unspecified vulnerability (CPU Jul 2021) mysql: Server: Federated unspecified vulnerability (CPU Jul 2021) mysql: Server: Replication unspecified vulnerability (CPU Jul 2021) mysql: Server: Optimizer unspecified vulnerability (CPU Jul 2021) mysql: Server: Optimizer unspecified vulnerability (CPU Jul 2021) mysql: Server: DML unspecified vulnerability (CPU Jul 2021) mysql: InnoDB unspecified vulnerability (CPU Jul 2021) mysql: InnoDB unspecified vulnerability (CPU Jul 2021) mysql: Server: Optimizer unspecified vulnerability (CPU Jul 2021) mysql: Server: Optimizer unspecified vulnerability (CPU Jul 2021) mysql: Server: Replication unspecified vulnerability (CPU Jul 2021) mysql: Server: Optimizer unspecified vulnerability (CPU Jul 2021) mysql: InnoDB unspecified vulnerability (CPU Jul 2021) mysql: InnoDB unspecified vulnerability (CPU Jul 2021) mysql: Server: DDL unspecified vulnerability (CPU Jul 2021) mysql: Server: Locking unspecified vulnerability (CPU Jul 2021) mysql: Server: Optimizer unspecified vulnerability (CPU Jul 2021) mysql: Server: Optimizer unspecified vulnerability (CPU Jul 2021) mysql: Server: GIS unspecified vulnerability (CPU Jul 2021) mysql: Server: Optimizer unspecified vulnerability (CPU Jul 2021) mysql: Server: PS unspecified vulnerability (CPU Jul 2021) mysql: Server: Stored Procedure unspecified vulnerability (CPU Jul 2021) mysql: Server: Optimizer unspecified vulnerability (CPU Jul 2021) mysql: Server: Optimizer unspecified vulnerability (CPU Jul 2021) mysql: Server: Optimizer unspecified vulnerability (CPU Jul 2021) mysql: InnoDB unspecified vulnerability (CPU Jul 2021) mysql: Server: Optimizer unspecified vulnerability (CPU Jul 2021) mysql: Server: DML unspecified vulnerability (CPU Jul 2021) mysql: Server: Optimizer unspecified vulnerability (CPU Jul 2021) mysql: Server: Optimizer unspecified vulnerability (CPU Jul 2021) mysql: Server: DML unspecified vulnerability (CPU Oct 2021) mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2021)
|
[
"cpe:/a:redhat:rhel_software_collections:3::el7"
] | null | 4.9 | null | null |
RHSA-2023:4924
|
Red Hat Security Advisory: Red Hat Single Sign-On 7.6.5 security update
|
jackson-databind: Possible DoS if using JDK serialization to serialize JsonNode jettison: Uncontrolled Recursion in JSONArray undertow: OutOfMemoryError due to @MultipartConfig handling
|
[
"cpe:/a:redhat:red_hat_single_sign_on:7.6.5"
] | null | 7.5 | null | null |
RHSA-2017:2560
|
Red Hat Security Advisory: Red Hat Certificate System 8 security, bug fix, and enhancement update
|
8: Enrolling certificate without certreq field causes CA to crash
|
[
"cpe:/a:redhat:certificate_system:8::el5"
] | null | null | 3.5 | null |
RHBA-2021:0628
|
Red Hat Bug Fix Advisory: microcode_ctl bug fix and enhancement update
|
hw: Vector Register Leakage-Active
|
[
"cpe:/o:redhat:rhel_aus:7.4::server",
"cpe:/o:redhat:rhel_e4s:7.4::server",
"cpe:/o:redhat:rhel_tus:7.4::server"
] | null | 2.8 | null | null |
RHSA-2006:0727
|
Red Hat Security Advisory: texinfo security update
|
security flaw security flaw
|
[
"cpe:/o:redhat:enterprise_linux:2.1::as",
"cpe:/o:redhat:enterprise_linux:2.1::aw",
"cpe:/o:redhat:enterprise_linux:2.1::es",
"cpe:/o:redhat:enterprise_linux:2.1::ws",
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws",
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2023:4384
|
Red Hat Security Advisory: openssh security update
|
openssh: Remote code execution in ssh-agent PKCS#11 support
|
[
"cpe:/a:redhat:rhel_aus:8.2::appstream",
"cpe:/a:redhat:rhel_e4s:8.2::appstream",
"cpe:/a:redhat:rhel_tus:8.2::appstream",
"cpe:/o:redhat:rhel_aus:8.2::baseos",
"cpe:/o:redhat:rhel_e4s:8.2::baseos",
"cpe:/o:redhat:rhel_tus:8.2::baseos"
] | null | 9.8 | null | null |
RHSA-2003:395
|
Red Hat Security Advisory: gnupg security update
|
security flaw
|
[
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws"
] | null | null | null | null |
RHSA-2024:8093
|
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.4 security update
|
apache-avro: Schema parsing may trigger Remote Code Execution (RCE)
|
[
"cpe:/a:redhat:jboss_enterprise_application_platform:7.4"
] | null | 8.8 | null | null |
RHSA-2022:2194
|
Red Hat Security Advisory: .NET Core 3.1 on RHEL 7 security and bugfix update
|
dotnet: excess memory allocation via HttpClient causes DoS dotnet: malicious content causes high CPU and memory usage dotnet: parsing HTML causes Denial of Service
|
[
"cpe:/a:redhat:rhel_dotnet:3.1::el7"
] | null | 7.5 | null | null |
RHSA-2018:2402
|
Red Hat Security Advisory: rhvm-appliance security update
|
Kernel: hw: cpu: L1 terminal fault (L1TF) Kernel: hw: cpu: L1 terminal fault (L1TF) kernel: TCP segments with random offsets allow a remote denial of service (SegmentSmack)
|
[
"cpe:/o:redhat:enterprise_linux:7::hypervisor"
] | null | null | 7.5 | null |
RHSA-2023:6587
|
Red Hat Security Advisory: opensc security update
|
opensc: buffer overrun vulnerability in pkcs15 cardos_have_verifyrc_package
|
[
"cpe:/o:redhat:enterprise_linux:9::baseos"
] | null | 6.3 | null | null |
RHSA-2023:0888
|
Red Hat Security Advisory: Red Hat Integration Camel Extension For Quarkus 2.13.2-1 security update
|
codec-haproxy: HAProxyMessageDecoder Stack Exhaustion DoS postgresql-jdbc: Information leak of prepared statement data due to insecure temporary file permissions
|
[
"cpe:/a:redhat:camel_quarkus:2.13"
] | null | 5.5 | null | null |
RHSA-2023:4768
|
Red Hat Security Advisory: cups security update
|
cups: Information leak through Cups-Get-Document operation
|
[
"cpe:/a:redhat:rhel_aus:8.4::appstream",
"cpe:/a:redhat:rhel_e4s:8.4::appstream",
"cpe:/a:redhat:rhel_tus:8.4::appstream",
"cpe:/o:redhat:rhel_aus:8.4::baseos",
"cpe:/o:redhat:rhel_e4s:8.4::baseos",
"cpe:/o:redhat:rhel_tus:8.4::baseos"
] | null | 6.5 | null | null |
RHSA-2019:1202
|
Red Hat Security Advisory: qemu-kvm-rhev security update
|
hardware: Microarchitectural Store Buffer Data Sampling (MSBDS) hardware: Micro-architectural Load Port Data Sampling - Information Leak (MLPDS) hardware: Microarchitectural Fill Buffer Data Sampling (MFBDS) hardware: Microarchitectural Data Sampling Uncacheable Memory (MDSUM)
|
[
"cpe:/a:redhat:openstack:14::el7"
] | null | null | 3.8 | null |
RHSA-2023:4767
|
Red Hat Security Advisory: libxml2 security update
|
libxml2: Incorrect server side include parsing can lead to XSS
|
[
"cpe:/a:redhat:rhel_eus:8.6::appstream",
"cpe:/o:redhat:rhel_eus:8.6::baseos"
] | null | 6.1 | null | null |
RHSA-2009:0345
|
Red Hat Security Advisory: ghostscript security update
|
argyllcms: Multiple integer overflows in the International Color Consortium Format Library argyllcms: Multiple insufficient upper-bounds checks on certain sizes in the International Color Consortium Format Library
|
[
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws",
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws",
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2017:3216
|
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 6.4.18 security update
|
keycloak: SAML request parser replaces special strings with system properties
|
[
"cpe:/a:redhat:jboss_enterprise_application_platform:6::el5"
] | null | null | 6.5 | null |
RHSA-2016:2059
|
Red Hat Security Advisory: mariadb-galera security and bug fix update
|
mysql: general_log can write to configuration files, leading to privilege escalation (CPU Oct 2016)
|
[
"cpe:/a:redhat:openstack:5::el7"
] | null | null | 9.8 | null |
RHSA-2024:8616
|
Red Hat Security Advisory: kernel security update
|
kernel: xprtrdma: fix pointer derefs in error cases of rpcrdma_ep_create kernel: ext4: fix uninitialized ratelimit_state->lock access in __ext4_fill_super()
|
[
"cpe:/o:redhat:rhel_aus:8.6::baseos",
"cpe:/o:redhat:rhel_e4s:8.6::baseos",
"cpe:/o:redhat:rhel_tus:8.6::baseos"
] | null | 5.5 | null | null |
RHSA-2015:1081
|
Red Hat Security Advisory: kernel security, bug fix, and enhancement update
|
kernel: partial ASLR bypass through TLS base addresses leak Kernel: fs: isofs: infinite loop in CE record entries kernel: ASLR bruteforce possible for vdso library kernel: pipe: iovec overrun leading to memory corruption Kernel: crypto: buffer overruns in RFC4106 implementation using AESNI
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2020:3199
|
Red Hat Security Advisory: openstack-tripleo-heat-templates security update
|
openstack-tripleo-heat-templates: No sVirt protection for OSP16 VMs due to disabled SELinux
|
[
"cpe:/a:redhat:openstack:16.1::el8"
] | null | 9.9 | null | null |
RHSA-2019:3735
|
Red Hat Security Advisory: php:7.2 security update
|
php: underflow in env_path_info in fpm_main.c
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | null | 8.1 | null |
RHSA-2022:8860
|
Red Hat Security Advisory: Red Hat OpenStack Platform 16.1.9 (protobuf) security update
|
protobuf: Incorrect parsing of nullchar in the proto symbol leads to Nullptr dereference
|
[
"cpe:/a:redhat:openstack:16.1::el8"
] | null | 7.5 | null | null |
RHSA-2022:8637
|
Red Hat Security Advisory: krb5 security update
|
krb5: integer overflow vulnerabilities in PAC parsing
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/o:redhat:enterprise_linux:9::baseos"
] | null | 8.8 | null | null |
RHSA-2020:1226
|
Red Hat Security Advisory: dpdk security, bug fix, and enhancement update
|
dpdk: possible memory leak leads to denial of service
|
[
"cpe:/a:redhat:rhel_extras_other:7"
] | null | null | 7.5 | null |
RHSA-2022:1823
|
Red Hat Security Advisory: mod_auth_openidc:2.3 security update
|
mod_auth_openidc: open redirect in oidc_validate_redirect_url() mod_auth_openidc: hardcoded static IV and AAD with a reused key in AES GCM encryption mod_auth_openidc: XSS when using OIDCPreservePost On mod_auth_openidc: open redirect due to target_link_uri parameter not validated
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 6.1 | 6.1 | null |
RHSA-2024:8219
|
Red Hat Security Advisory: Secondary Scheduler Operator for Red Hat OpenShift 1.2.2 for RHEL 9
|
net/http: Denial of service due to improper 100-continue handling in net/http go/parser: golang: Calling any of the Parse functions containing deeply nested literals can cause a panic/stack exhaustion go/build/constraint: golang: Calling Parse on a "// +build" build tag line with deeply nested expressions can cause a panic due to stack exhaustion
|
[
"cpe:/a:redhat:openshift_secondary_scheduler:1.2::el9"
] | null | 5.9 | null | null |
RHSA-2019:3624
|
Red Hat Security Advisory: libseccomp security, bug fix, and enhancement update
|
libseccomp: incorrect generation of syscall filters in libseccomp
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb",
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | null | 7.3 | null |
RHSA-2022:1410
|
Red Hat Security Advisory: 389-ds:1.4 security and bug fix update
|
389-ds-base: double free of the virtual attribute context in persistent search
|
[
"cpe:/a:redhat:rhel_eus:8.4::appstream"
] | null | 7.5 | null | null |
RHSA-2024:3811
|
Red Hat Security Advisory: fence-agents security update
|
jinja2: accepts keys containing non-attribute characters
|
[
"cpe:/a:redhat:rhel_eus:8.8::appstream",
"cpe:/a:redhat:rhel_eus:8.8::highavailability",
"cpe:/a:redhat:rhel_eus:8.8::resilientstorage"
] | null | 5.4 | null | null |
RHSA-2023:4910
|
Red Hat Security Advisory: Red Hat JBoss Web Server 5.7.4 release and security update
|
apr: integer overflow/wraparound in apr_encode apr: Windows out-of-bounds write in apr_socket_sendv function FileUpload: FileUpload DoS with excessive parts tomcat: not including the secure attribute causes information disclosure tomcat: Fix for CVE-2023-24998 was incomplete
|
[
"cpe:/a:redhat:jboss_enterprise_web_server:5.7"
] | null | 7.5 | null | null |
RHSA-2005:773
|
Red Hat Security Advisory: mod_ssl security update
|
security flaw
|
[
"cpe:/o:redhat:enterprise_linux:2.1::as",
"cpe:/o:redhat:enterprise_linux:2.1::aw",
"cpe:/o:redhat:enterprise_linux:2.1::es",
"cpe:/o:redhat:enterprise_linux:2.1::ws"
] | null | null | null | null |
RHSA-2023:6578
|
Red Hat Security Advisory: libqb security update
|
libqb: Buffer overflow in log_blackbox.c
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::highavailability",
"cpe:/a:redhat:enterprise_linux:9::resilientstorage"
] | null | 7.2 | null | null |
RHSA-2024:4580
|
Red Hat Security Advisory: cups security update
|
cups: Cupsd Listen arbitrary chmod 0140777
|
[
"cpe:/a:redhat:rhel_eus:8.8::appstream",
"cpe:/o:redhat:rhel_eus:8.8::baseos"
] | null | 4.4 | null | null |
RHSA-2024:5315
|
Red Hat Security Advisory: open-vm-tools security update
|
open-vm-tools: SAML token signature bypass
|
[
"cpe:/o:redhat:rhel_aus:7.7::server"
] | null | 7.1 | null | null |
RHSA-2024:6341
|
Red Hat Security Advisory: Kube Descheduler Operator for Red Hat OpenShift 5.1.0 for RHEL 9
|
golang: net: malformed DNS message can cause infinite loop golang: net/netip: Unexpected behavior from Is methods for IPv4-mapped IPv6 addresses net/http: Denial of service due to improper 100-continue handling in net/http
|
[
"cpe:/a:redhat:kube_descheduler_operator:5.1::el9"
] | null | 5.9 | null | null |
RHSA-2025:0147
|
Red Hat Security Advisory: thunderbird security update
|
firefox: thunderbird: WebChannel APIs susceptible to confused deputy attack firefox: thunderbird: Use-after-free when breaking lines in text firefox: Alt-Svc ALPN validation failure when redirected firefox: Compartment mismatch when parsing JavaScript JSON module firefox: Memory corruption when using JavaScript Text Segmentation firefox: thunderbird: Memory safety bugs fixed in Firefox 134, Thunderbird 134, Firefox ESR 115.19, Firefox ESR 128.6, Thunderbird 115.19, and Thunderbird 128.6 firefox: thunderbird: Memory safety bugs fixed in Firefox 134, Thunderbird 134, Firefox ESR 128.6, and Thunderbird 128.6
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 7.5 | null | null |
RHSA-2013:0832
|
Red Hat Security Advisory: kernel security update
|
kernel: perf_swevent_enabled array out-of-bound access
|
[
"cpe:/o:redhat:rhel_eus:6.3::server"
] | null | null | null | null |
RHBA-2024:3840
|
Red Hat Bug Fix Advisory: golang bug fix update
|
golang: net: malformed DNS message can cause infinite loop
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 7.5 | null | null |
RHSA-2019:1765
|
Red Hat Security Advisory: firefox security update
|
Mozilla: Sandbox escape via installation of malicious language pack Mozilla: Memory safety bugs fixed in Firefox 68 and Firefox ESR 60.8 Mozilla: Script injection within domain through inner window reuse Mozilla: Cross-origin POST requests can be made with NPAPI plugins by following 308 redirects Mozilla: Use-after-free with HTTP/2 cached stream Mozilla: HTML parsing error can contribute to content XSS Mozilla: Caret character improperly escaped in origins Mozilla: Same-origin policy treats all files in a directory as having the same-origin
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | 6.1 | null |
RHSA-2020:1151
|
Red Hat Security Advisory: libreoffice security and bug fix update
|
libreoffice: LibreLogo script can be manipulated into executing arbitrary python commands libreoffice: Remote resources protection module not applied to bullet graphics libreoffice: Insufficient URL validation allowing LibreLogo script execution libreoffice: LibreLogo global-event script execution libreoffice: Insufficient URL encoding flaw in allowed script location check libreoffice: Insufficient URL decoding flaw in categorizing macro location libreoffice: Unsafe URL assembly flaw in allowed script location check
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 7.8 | 7.8 | null |
RHSA-2024:5533
|
Red Hat Security Advisory: python3.12-setuptools security update
|
pypa/setuptools: Remote code execution via download functions in the package_index module in pypa/setuptools
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::crb"
] | null | 8.8 | null | null |
RHSA-2004:402
|
Red Hat Security Advisory: libpng security update
|
security flaw security flaw security flaw security flaw
|
[
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws"
] | null | null | null | null |
RHSA-2019:1155
|
Red Hat Security Advisory: kernel security update
|
hardware: Microarchitectural Store Buffer Data Sampling (MSBDS) hardware: Micro-architectural Load Port Data Sampling - Information Leak (MLPDS) hardware: Microarchitectural Fill Buffer Data Sampling (MFBDS) hardware: Microarchitectural Data Sampling Uncacheable Memory (MDSUM)
|
[
"cpe:/o:redhat:rhel_eus:7.5::computenode",
"cpe:/o:redhat:rhel_eus:7.5::server"
] | null | null | 3.8 | null |
RHSA-2022:6283
|
Red Hat Security Advisory: Red Hat OpenShift Service Mesh 2.2.2 Containers security update
|
golang: net/http: improper sanitization of Transfer-Encoding header golang: go/parser: stack exhaustion in all Parse* functions golang: encoding/xml: stack exhaustion in Decoder.Skip golang: io/fs: stack exhaustion in Glob golang: path/filepath: stack exhaustion in Glob golang: encoding/xml: stack exhaustion in Unmarshal golang: encoding/gob: stack exhaustion in Decoder.Decode golang: net/http/httputil: NewSingleHostReverseProxy - omit X-Forwarded-For not working
|
[
"cpe:/a:redhat:service_mesh:2.2::el8"
] | null | 6.5 | null | null |
RHSA-2011:1159
|
Red Hat Security Advisory: java-1.4.2-ibm security update
|
IBM JDK Class file parsing denial-of-service JDK: unspecified vulnerabilities fixed in 6u26 (Sound) JDK: unspecified vulnerabilities fixed in 6u26 (Sound) OpenJDK: integer overflows in JPEGImageReader and font SunLayoutEngine (2D, 7013519) OpenJDK: Deserialization allows creation of mutable SignedObject (Deserialization, 6618658) OpenJDK: NetworkInterface information leak (Networking, 7013969) OpenJDK: MediaTracker created Component instances with unnecessary privileges (Swing, 7020198) java-1.4.2-ibm: DoS via class file parser in IBM Java 1.4.2.SR13.FP9
|
[
"cpe:/a:redhat:rhel_extras:4",
"cpe:/a:redhat:rhel_extras:5::client",
"cpe:/a:redhat:rhel_extras:5::server"
] | null | null | null | null |
RHSA-2021:1241
|
Red Hat Security Advisory: mariadb:10.3 and mariadb-devel:10.3 security update
|
mariadb: writable system variables allows a database user with SUPER privilege to execute arbitrary code as the system mysql user
|
[
"cpe:/a:redhat:rhel_eus:8.1::appstream",
"cpe:/a:redhat:rhel_eus:8.1::crb"
] | null | 7.2 | null | null |
RHSA-2023:4664
|
Red Hat Security Advisory: OpenShift Virtualization 4.13.3 Images security and bug fix update
|
golang.org/x/net/http2: avoid quadratic complexity in HPACK decoding openshift: OCP & FIPS mode golang: net/http, net/textproto: denial of service from excessive memory allocation golang: net/http, net/textproto, mime/multipart: denial of service from excessive resource consumption golang: go/parser: Infinite loop in parsing golang: html/template: backticks not treated as string delimiters golang: html/template: improper sanitization of CSS values golang: html/template: improper handling of JavaScript whitespace golang: html/template: improper handling of empty HTML attributes
|
[
"cpe:/a:redhat:container_native_virtualization:4.13::el9"
] | null | 7.3 | null | null |
RHSA-2002:287
|
Red Hat Security Advisory: vnc security update
|
security flaw
|
[
"cpe:/o:redhat:enterprise_linux:2.1::as"
] | null | null | null | null |
RHSA-2017:0662
|
Red Hat Security Advisory: samba security and bug fix update
|
samba: Unconditional privilege delegation to Kerberos servers in trusted realms samba: Flaws in Kerberos PAC validation can trigger privilege elevation
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | 3.5 | null |
RHSA-2017:0863
|
Red Hat Security Advisory: Red Hat Enterprise Linux 4 Extended Life Cycle Support Final Notice
|
This is the final notification for the retirement of Red Hat Enterprise Linux 4 Extended Life Cycle Support Add-On (ELS). This notification applies only to those customers subscribed to the Extended Life Cycle Support (ELS) channel for Red Hat Enterprise Linux 4.
|
[
"cpe:/o:redhat:rhel_els:4::as",
"cpe:/o:redhat:rhel_els:4::es"
] | null | null | null | null |
RHSA-2015:0788
|
Red Hat Security Advisory: novnc security update
|
novnc: session hijack through insecurely set session token cookies
|
[
"cpe:/a:redhat:openstack:6::el7"
] | null | null | null | null |
RHSA-2002:190
|
Red Hat Security Advisory: : Updated gaim client fixes URL vulnerability
|
security flaw
|
[
"cpe:/a:redhat:powertools:7.0"
] | null | null | null | null |
RHSA-2021:2790
|
Red Hat Security Advisory: shim and fwupd security update
|
grub2: acpi command allows privileged user to load crafted ACPI tables when Secure Boot is enabled grub2: Use-after-free in rmmod command grub2: Out-of-bounds write in grub_usb_device_initialize() grub2: Stack buffer overflow in grub_parser_split_cmdline() grub2: cutmem command allows privileged user to remove memory regions when Secure Boot is enabled grub2: Heap out-of-bounds write in short form option parser grub2: Heap out-of-bounds write due to miscalculation of space required for quoting
|
[
"cpe:/a:redhat:rhel_eus:8.2::crb",
"cpe:/o:redhat:rhel_eus:8.2::baseos"
] | null | 7.5 | null | null |
RHSA-2006:0158
|
Red Hat Security Advisory: apache security update
|
httpd cross-site scripting flaw in mod_imap
|
[
"cpe:/o:redhat:enterprise_linux:2.1::as",
"cpe:/o:redhat:enterprise_linux:2.1::aw",
"cpe:/o:redhat:enterprise_linux:2.1::es",
"cpe:/o:redhat:enterprise_linux:2.1::ws"
] | null | null | null | null |
RHBA-2022:3893
|
Red Hat Bug Fix Advisory: new packages: redhat-release
|
kernel: RDMA/rxe: Return CQE error if invalid lkey was supplied
|
[
"cpe:/a:redhat:enterprise_linux:9::crb",
"cpe:/o:redhat:enterprise_linux:9::baseos"
] | null | 4.4 | null | null |
RHSA-2009:1672
|
Red Hat Security Advisory: kernel security and bug fix update
|
kernel: SELinux and mmap_min_addr kernel: fs: pipe.c null pointer dereference
|
[
"cpe:/o:redhat:rhel_eus:5.2"
] | null | null | null | null |
RHSA-2012:1304
|
Red Hat Security Advisory: kernel security and bug fix update
|
kernel: unfiltered netdev rio_ioctl access by users kernel: drm/i915: integer overflow in i915_gem_do_execbuffer() kernel: huge pages: memory leak on mmap failure kernel: recv{from,msg}() on an rds socket can leak kernel memory kernel: net: slab corruption due to improper synchronization around inet->opt
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2024:9281
|
Red Hat Security Advisory: python-jwcrypto security update
|
JWCrypto: denail of service Via specifically crafted JWE
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 5.3 | null | null |
RHSA-2014:1726
|
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 5.2.0 security update
|
Java: Java XML Signature DoS Attack
|
[
"cpe:/a:redhat:jboss_enterprise_application_platform:5::el4",
"cpe:/a:redhat:jboss_enterprise_application_platform:5::el5",
"cpe:/a:redhat:jboss_enterprise_application_platform:5::el6"
] | null | null | null | null |
RHSA-2017:0286
|
Red Hat Security Advisory: openssl security update
|
SSL/TLS: Malformed plain-text ALERT packets could cause remote DoS openssl: Truncated packet could crash via OOB read
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation",
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 5.9 | null |
RHSA-2022:1045
|
Red Hat Security Advisory: httpd security update
|
httpd: Errors encountered during the discarding of request body lead to HTTP request smuggling
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 8.3 | null | null |
RHSA-2014:0831
|
Red Hat Security Advisory: Red Hat Developer Toolset Version 1 Retirement Notice
|
This is the final notification for the retirement of Red Hat Developer
Toolset Version 1. This notification applies only to those customers with
subscriptions for Red Hat Developer Toolset Version 1.
|
[] | null | null | null | null |
RHSA-2003:028
|
Red Hat Security Advisory: pam security update
|
security flaw
|
[
"cpe:/o:redhat:enterprise_linux:2.1::as",
"cpe:/o:redhat:enterprise_linux:2.1::aw",
"cpe:/o:redhat:enterprise_linux:2.1::es",
"cpe:/o:redhat:enterprise_linux:2.1::ws"
] | null | null | null | null |
RHSA-2017:0744
|
Red Hat Security Advisory: samba4 security and bug fix update
|
samba: Unconditional privilege delegation to Kerberos servers in trusted realms samba: Flaws in Kerberos PAC validation can trigger privilege elevation
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | 3.5 | null |
RHSA-2019:1172
|
Red Hat Security Advisory: kernel security and bug fix update
|
hardware: Microarchitectural Store Buffer Data Sampling (MSBDS) hardware: Micro-architectural Load Port Data Sampling - Information Leak (MLPDS) hardware: Microarchitectural Fill Buffer Data Sampling (MFBDS) hardware: Microarchitectural Data Sampling Uncacheable Memory (MDSUM)
|
[
"cpe:/o:redhat:rhel_aus:7.2::server",
"cpe:/o:redhat:rhel_e4s:7.2::server",
"cpe:/o:redhat:rhel_tus:7.2::server"
] | null | null | 3.8 | null |
RHSA-2012:1150
|
Red Hat Security Advisory: kernel-rt security and bug fix update
|
kernel: huge pages: memory leak on mmap failure kernel: epoll: can leak file descriptors when returning -ELOOP
|
[
"cpe:/a:redhat:enterprise_mrg:2:server:el6"
] | null | null | null | null |
RHSA-2021:2777
|
Red Hat Security Advisory: OpenJDK 8u302 Windows Builds release and security update
|
OpenJDK: FTP PASV command response can cause FtpClient to connect to arbitrary host (Networking, 8258432) OpenJDK: Incorrect verification of JAR files with multiple MANIFEST.MF files (Library, 8260967) OpenJDK: Incorrect comparison during range check elimination (Hotspot, 8264066)
|
[
"cpe:/a:redhat:openjdk:1.8::windows"
] | null | 7.5 | null | null |
RHSA-2014:1685
|
Red Hat Security Advisory: openstack-glance security and bug fix update
|
openstack-glance: Glance store disk space exhaustion
|
[
"cpe:/a:redhat:openstack:4::el6"
] | null | null | null | null |
RHSA-2017:0165
|
Red Hat Security Advisory: openstack-cinder security update
|
openstack-nova/glance/cinder: Malicious image may exhaust resources
|
[
"cpe:/a:redhat:openstack:5::el6"
] | null | null | 5.3 | null |
RHSA-2020:3803
|
Red Hat Security Advisory: bash security update
|
bash: BASH_CMD is writable in restricted bash shells
|
[
"cpe:/o:redhat:rhel_aus:7.4::server",
"cpe:/o:redhat:rhel_e4s:7.4::server",
"cpe:/o:redhat:rhel_tus:7.4::server"
] | null | 7.8 | null | null |
RHSA-2020:3557
|
Red Hat Security Advisory: firefox security update
|
Mozilla: Integer overflow in nsJPEGEncoder::emptyOutputBuffer Mozilla: WebRTC permission prompt could have been bypassed by a compromised content process Mozilla: Out of bound read in Date.parse() Mozilla: X-Frame-Options bypass using object or embed tags Mozilla: Bypassing iframe sandbox when allowing popups Mozilla: Custom cursor can overlay user interface Mozilla: Type confusion for special arguments in IonMonkey Mozilla: Overriding file type when saving to disk Mozilla: Attacker-induced prompt for extension installation Mozilla: Use-After-Free when aborting an operation
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 8.8 | 6.1 | null |
RHSA-2008:0177
|
Red Hat Security Advisory: evolution security update
|
Evolution format string flaw
|
[
"cpe:/a:redhat:rhel_productivity:5",
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws",
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation"
] | null | null | null | null |
RHSA-2017:0982
|
Red Hat Security Advisory: qemu-kvm-rhev security update
|
Qemu: cirrus: heap buffer overflow via vnc connection Qemu: display: cirrus: OOB read access issue Qemu: display: cirrus: OOB r/w access issues in bitblt routines
|
[
"cpe:/a:redhat:openstack:7::el7"
] | null | null | 5.5 | null |
RHSA-2024:0097
|
Red Hat Security Advisory: Red Hat Single Sign-On 7.6.6 for OpenShift image enhancement and security update
|
keycloak: open redirect via "form_post.jwt" JARM response mode
|
[
"cpe:/a:redhat:rhosemc:1.0::el8"
] | null | 4.6 | null | null |
RHSA-2013:1014
|
Red Hat Security Advisory: java-1.6.0-openjdk security update
|
OpenJDK: Insecure shared memory permissions (2D, 8001034) OpenJDK: Frame injection in generated HTML (Javadoc, 8012375) OpenJDK: Integrate Apache Santuario, rework class loader (Libraries, 6741606, 8008744) OpenJDK: JConsole SSL support (Serviceability, 8003703) OpenJDK: AccessControlContext check order issue (Libraries, 8001330) OpenJDK: Resource denial of service (AWT, 8001038) OpenJDK: Better handling of memory allocation errors (Hotspot, 7158805) OpenJDK: output stream access restrictions (CORBA, 8000642) OpenJDK: Prevent revealing the local address (Networking, 8001318) OpenJDK: Better access restrictions (Sound, 8006328) OpenJDK: ObjectStreamClass circular reference denial of service (Serialization, 8000638) OpenJDK: Unique VMIDs (Libraries, 8001033) OpenJDK: MBeanServer Introspector package access (JMX, 8008124) OpenJDK: getEnclosing* checks (Libraries, 8007812) OpenJDK: ObjectOutputStream access checks (Serialization, 8008132) OpenJDK: Proper class checking (JMX, 8008120) OpenJDK: Various AWT integer overflow checks (AWT, 8009071) OpenJDK: Missing check for valid DOMCanonicalizationMethod canonicalization algorithm (Libraries, 8014281) OpenJDK: Incorrect image attribute verification (2D, 8012438) OpenJDK: Incorrect image channel verification (2D, 8012597) OpenJDK: Incorrect image layout verification (2D, 8012601) OpenJDK: ImagingLib byte lookup processing (2D, 8011243) OpenJDK: Incorrect IntegerComponentRaster size checks (2D, 8011248) OpenJDK: Incorrect ShortBandedRaster size checks (2D, 8011253) OpenJDK: Incorrect ByteBandedRaster size checks (2D, 8011257)
|
[
"cpe:/o:redhat:enterprise_linux:5::server",
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2014:0442
|
Red Hat Security Advisory: python-keystoneclient security update
|
python-keystoneclient: Potential context confusion in Keystone middleware
|
[
"cpe:/a:redhat:openstack:3::el6"
] | null | null | null | null |
RHSA-2023:0074
|
Red Hat Security Advisory: RHV 4.4 SP1 [ovirt-4.5.3-3] security update
|
isomorphic-git: Directory traversal via a crafted repository mina-sshd: Java unsafe deserialization vulnerability
|
[
"cpe:/a:redhat:rhev_manager:4.4:el8",
"cpe:/o:redhat:rhev_hypervisor:4.4::el8"
] | null | 9.8 | null | null |
RHSA-2014:1911
|
Red Hat Security Advisory: ruby security update
|
ruby: REXML billion laughs attack via parameter entity expansion ruby: REXML incomplete fix for CVE-2014-8080
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2018:0036
|
Red Hat Security Advisory: microcode_ctl security update
|
An update for microcode_ctl is now available for Red Hat Enterprise Linux 6.7 Extended Update Support.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
|
[
"cpe:/o:redhat:rhel_eus:6.7::computenode",
"cpe:/o:redhat:rhel_eus:6.7::server"
] | null | null | null | null |
RHSA-2021:5217
|
Red Hat Security Advisory: Red Hat Single Sign-On 7.5.0 security update
|
Keycloak: Incorrect authorization allows unpriviledged users to create other users
|
[
"cpe:/a:redhat:red_hat_single_sign_on:7"
] | null | 8.3 | null | null |
RHSA-2013:0733
|
Red Hat Security Advisory: JBoss Enterprise Portal Platform 5.2.2 security update
|
Portal: Cross Site Request Forgery
|
[
"cpe:/a:redhat:jboss_enterprise_portal_platform:5.2.2"
] | null | null | null | null |
RHSA-2024:10926
|
Red Hat Security Advisory: java-1.8.0-ibm security update
|
JDK: HTTP client improper handling of maxHeaderSize (8328286) JDK: Array indexing integer overflow (8328544) JDK: Unbounded allocation leads to out-of-memory error (8331446) JDK: Integer conversion error leads to incorrect range check (8332644)
|
[
"cpe:/a:redhat:enterprise_linux:8::supplementary"
] | null | 4.8 | null | null |
RHSA-2017:1584
|
Red Hat Security Advisory: openstack-mistral security, bug fix, and enhancement update
|
openstack-mistral: /var/log/mistral/ is world readable
|
[
"cpe:/a:redhat:openstack:10::el7"
] | null | null | 5.9 | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.