id
stringlengths 13
15
| title
stringlengths 29
176
| description
stringlengths 8
32.1k
| cpes
listlengths 0
20
| cvss_v4_0
null | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
null |
---|---|---|---|---|---|---|---|
RHSA-2010:0898
|
Red Hat Security Advisory: kvm security update
|
kvm: invalid selector in fs/gs causes kernel panic
|
[
"cpe:/a:redhat:rhel_virtualization:5::client",
"cpe:/a:redhat:rhel_virtualization:5::server"
] | null | null | null | null |
RHSA-2011:1250
|
Red Hat Security Advisory: Red Hat Enterprise MRG Grid 2.0 security, bug fix and enhancement update
|
cumin: broker username/password appears in the log file
|
[
"cpe:/a:redhat:enterprise_mrg:2:computenode:el6",
"cpe:/a:redhat:enterprise_mrg:2:server:el6"
] | null | null | null | null |
RHSA-2022:4924
|
Red Hat Security Advisory: kernel security and bug fix update
|
kernel: buffer overflow in IPsec ESP transformation code
|
[
"cpe:/o:redhat:rhel_e4s:8.1::baseos"
] | null | 7.8 | null | null |
RHSA-2020:1101
|
Red Hat Security Advisory: bluez security update
|
bluez: failure in disabling Bluetooth discoverability in certain cases may lead to the unauthorized pairing of Bluetooth devices
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 4.5 | null |
RHSA-2021:2025
|
Red Hat Security Advisory: squid:4 security update
|
squid: improper input validation may allow a trusted client to perform HTTP request smuggling
|
[
"cpe:/a:redhat:rhel_eus:8.1::appstream",
"cpe:/a:redhat:rhel_eus:8.2::appstream"
] | null | 8.6 | null | null |
RHSA-2022:8078
|
Red Hat Security Advisory: flac security update
|
flac: out of bound write in append_to_verify_fifo_interleaved_ of stream_encoder.c
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::crb"
] | null | 5.5 | null | null |
RHSA-2013:1171
|
Red Hat Security Advisory: condor security update
|
condor: condor_startd DoS when parsing policy definition that evaluates to ERROR or UNDEFINED
|
[
"cpe:/a:redhat:enterprise_mrg:2::el5"
] | null | null | null | null |
RHSA-2023:4462
|
Red Hat Security Advisory: firefox security update
|
Mozilla: Offscreen Canvas could have bypassed cross-origin restrictions Mozilla: Incorrect value used during WASM compilation Mozilla: Potential permissions request bypass via clickjacking Mozilla: Crash in DOMParser due to out-of-memory conditions Mozilla: Fix potential race conditions when releasing platform objects Mozilla: Stack buffer overflow in StorageManager Mozilla: Cookie jar overflow caused unexpected cookie jar state Mozilla: Memory safety bugs fixed in Firefox 116, Firefox ESR 115.1, Firefox ESR 102.14, Thunderbird 115.1, and Thunderbird 102.14 Mozilla: Memory safety bugs fixed in Firefox ESR 115.1, and Thunderbird 115.1
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 9.8 | null | null |
RHSA-2013:0886
|
Red Hat Security Advisory: rhev 3.2 - vdsm security and bug fix update
|
vdsm: unfiltered guestInfo dictionary DoS
|
[
"cpe:/a:redhat:enterprise_linux:6::hypervisor",
"cpe:/a:redhat:rhev_manager:3"
] | null | null | null | null |
RHSA-2021:1611
|
Red Hat Security Advisory: systemd security, bug fix, and enhancement update
|
systemd: Spoofing of XDG_SEAT allows for actions to be checked against "allow_active" instead of "allow_any" systemd: Mishandles numerical usernames beginning with decimal digits or 0x followed by hexadecimal digits
|
[
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 6.7 | 4.5 | null |
RHSA-2019:2543
|
Red Hat Security Advisory: Ansible security and bug fix update
|
Ansible: disclosure data when prompted for password and template characters are passed Ansible: gcp modules do not flag sensitive data fields properly
|
[
"cpe:/a:redhat:ansible_engine:2::el7",
"cpe:/a:redhat:ansible_engine:2::el8"
] | null | null | 5.7 | null |
RHSA-2012:1080
|
Red Hat Security Advisory: java-1.4.2-ibm-sap security update
|
OpenJDK: JavaSound incorrect bounds check (Sound, 7088367) JDK: unspecified vulnerability fixed in 6u31 and 7u3 (2D) OpenJDK: KeyboardFocusManager focus stealing (AWT, 7110683) OpenJDK: unrestricted use of TimeZone.setDefault() (i18n, 7110687) OpenJDK: incomplete info in the deserialization exception (Serialization, 7110700) OpenJDK: mutable repository identifiers (CORBA, 7110704)
|
[
"cpe:/a:redhat:rhel_extras_sap:5"
] | null | null | null | null |
RHSA-2017:1297
|
Red Hat Security Advisory: kernel-rt security and bug fix update
|
kernel: Use after free in seq file kernel: Oops in shash_async_export() kernel: EXT4 memory corruption / SLAB out-of-bounds read kernel: net/packet: overflow in check for priv area size
|
[
"cpe:/a:redhat:enterprise_mrg:2:server:el6"
] | null | null | 7 | null |
RHSA-2022:5030
|
Red Hat Security Advisory: Red Hat Fuse Online 7.10.2.P1 security update
|
google-oauth-client: Token signature not verified eventsource: Exposure of Sensitive Information
|
[
"cpe:/a:redhat:jboss_fuse:7"
] | null | 9.3 | null | null |
RHSA-2003:310
|
Red Hat Security Advisory: fileutils security update
|
security flaw security flaw
|
[
"cpe:/o:redhat:enterprise_linux:2.1::as",
"cpe:/o:redhat:enterprise_linux:2.1::aw",
"cpe:/o:redhat:enterprise_linux:2.1::es",
"cpe:/o:redhat:enterprise_linux:2.1::ws"
] | null | null | null | null |
RHSA-2025:0765
|
Red Hat Security Advisory: git-lfs security update
|
git-lfs: Git LFS permits exfiltration of credentials via crafted HTTP URLs
|
[
"cpe:/a:redhat:rhel_aus:8.6::appstream",
"cpe:/a:redhat:rhel_e4s:8.6::appstream",
"cpe:/a:redhat:rhel_tus:8.6::appstream"
] | null | 8.1 | null | null |
RHSA-2008:0896
|
Red Hat Security Advisory: ruby security update
|
ruby: Memory allocation failure in Ruby regex engine (remotely exploitable DoS) ruby: multiple insufficient safe mode restrictions ruby: use of predictable source port and transaction id in DNS requests done by resolv.rb module
|
[
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws"
] | null | null | null | null |
RHSA-2002:180
|
Red Hat Security Advisory: nss_ldap ecurity update
|
security flaw security flaw
|
[
"cpe:/o:redhat:enterprise_linux:2.1::as",
"cpe:/o:redhat:enterprise_linux:2.1::aw"
] | null | null | null | null |
RHSA-2022:1550
|
Red Hat Security Advisory: kernel security and bug fix update
|
kernel: use-after-free in RDMA listen() kernel: heap out of bounds write in nf_dup_netdev.c
|
[
"cpe:/a:redhat:enterprise_linux:8::crb",
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 7.8 | null | null |
RHSA-2024:10865
|
Red Hat Security Advisory: Red Hat Advanced Cluster Management 2.12.1 bug fixes and container updates
|
path-to-regexp: Backtracking regular expressions cause ReDoS find-my-way: ReDoS vulnerability in multiparametric routes
|
[
"cpe:/a:redhat:acm:2.12::el9"
] | null | 7.5 | null | null |
RHSA-2013:0624
|
Red Hat Security Advisory: java-1.5.0-ibm security update
|
OpenJDK: disable Gopher support by default (Gopher, 7189567) JDK: unspecified vulnerability fixed in 6u39 and 7u13 (JMX) OpenJDK: RMI CGIHandler XSS issue (RMI, 6563318) OpenJDK: logging insufficient access control checks (Libraries, 6664509) OpenJDK: logging insufficient access control checks (Libraries, 6664528) OpenJDK: invalid threads subject to interrupts (Libraries, 6776941) OpenJDK: reflection API incorrect checks for proxy classes (Libraries, 7197546, SE-2012-01 Issue 29) OpenJDK: insufficient clipboard access premission checks (AWT, 7186952) OpenJDK: InetSocketAddress serialization issue (Networking, 7201071) OpenJDK: loadPropertyFile missing restrictions (JAXP, 8001235) OpenJDK: CPU consumption DoS via repeated SSL ClientHello packets (JSSE, 7192393) OpenJDK: insufficient privilege checking issue (AWT, 7192977) OpenJDK: insufficient Diffie-Hellman public key checks (JSSE, 7192392) OpenJDK: insufficient privilege checking issue (AWT, 8001057) OpenJDK: RequiredModelMBean missing access control context checks (JMX, 8000537) OpenJDK: Specially crafted sample model integer overflow (2D, 8007014) OpenJDK: missing ValueHandlerImpl class constructor access restriction (CORBA, 8000631) OpenJDK: image parser insufficient raster parameter checks (2D, 8001972) OpenJDK: image parser insufficient raster parameter checks (AWT, 8002325) JDK: unspecified vulnerability fixed in 6u39 (Sound) OpenJDK: MBeanServer insufficient privilege restrictions (JMX, 8006446) OpenJDK: CMM malformed raster memory corruption (2D, 8007675)
|
[
"cpe:/a:redhat:rhel_extras:5::server",
"cpe:/a:redhat:rhel_extras:6"
] | null | null | null | null |
RHSA-2014:0799
|
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 6.2.4 update
|
CXF: The SecurityTokenService accepts certain invalid SAML Tokens as valid CXF: UsernameTokens are sent in plaintext with a Symmetric EncryptBeforeSigning policy CXF: HTML content posted to SOAP endpoint could cause OOM errors CXF: Large invalid content could cause temporary space to fill JAX-RS: Information disclosure via XML eXternal Entity (XXE)
|
[
"cpe:/a:redhat:jboss_enterprise_application_platform:6::el6"
] | null | null | null | null |
RHSA-2016:0442
|
Red Hat Security Advisory: openstack-heat security advisory
|
openstack-heat: Vulnerability in Heat template validation leading to DoS
|
[
"cpe:/a:redhat:openstack:6::el7"
] | null | null | null | null |
RHSA-2013:0834
|
Red Hat Security Advisory: JBoss Enterprise Application Platform 6.1.0 update
|
Web: jsessionid exposed via encoded url when using cookie based session tracking JBoss: custom authorization module implementations shared between applications apache-cxf: XML encryption backwards compatibility attacks tomcat: Session fixation in form authenticator
|
[
"cpe:/a:redhat:jboss_enterprise_application_platform:6::el6"
] | null | null | null | null |
RHSA-2023:0303
|
Red Hat Security Advisory: usbguard security update
|
usbguard: Fix unauthorized access via D-Bus
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 7.8 | null | null |
RHSA-2010:0125
|
Red Hat Security Advisory: systemtap security update
|
systemtap: Crash with systemtap script using __get_argv()
|
[
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2023:0895
|
Red Hat Security Advisory: OpenShift Container Platform 4.11.29 security update
|
golang: out-of-bounds read in golang.org/x/text/language leads to DoS
|
[
"cpe:/a:redhat:openshift:4.11::el8"
] | null | 7.5 | null | null |
RHSA-2021:3534
|
Red Hat Security Advisory: Red Hat Single Sign-On 7.4.9 security update
|
jackson-dataformat-cbor: Unchecked allocation of byte buffer can cause a java.lang.OutOfMemoryError exception keycloak: X509 Direct Grant Auth does not verify certificate timestamp validity keycloak: Brute force attack is possible even after the account lockout undertow: HTTP2SourceChannel fails to write final frame under some circumstances may lead to DoS keycloak: Anyone can register a new device when there is no device registered for passwordless login keycloak-model-infinispan: authenticationSessions map in RootAuthenticationSessionEntity grows boundlessly could lead to a DoS attack wildfly-core: Invalid Sensitivity Classification of Vault Expression undertow: buffer leak on incoming websocket PONG message may lead to DoS jakarta-el: ELParserTokenManager enables invalid EL expressions to be evaluate apache-commons-io: Limited path traversal in Apache Commons IO 2.2 to 2.6
|
[
"cpe:/a:redhat:red_hat_single_sign_on:7"
] | null | 4.8 | null | null |
RHSA-2022:1068
|
Red Hat Security Advisory: expat security update
|
expat: Malformed 2- and 3-byte UTF-8 sequences can lead to arbitrary code execution expat: Namespace-separator characters in "xmlns[:prefix]" attribute values can lead to arbitrary code execution expat: Integer overflow in storeRawNames()
|
[
"cpe:/o:redhat:rhel_e4s:8.1::baseos"
] | null | 9.8 | null | null |
RHSA-2004:634
|
Red Hat Security Advisory: zip security update
|
security flaw
|
[
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws"
] | null | null | null | null |
RHSA-2017:0253
|
Red Hat Security Advisory: spice-server security update
|
spice: Buffer overflow in main_channel_alloc_msg_rcv_buf when reading large messages spice: Remote DoS via crafted message
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | 7.5 | null |
RHSA-2016:0515
|
Red Hat Security Advisory: java-1.7.0-oracle security update
|
OpenJDK: missing type safety checks for MethodHandle calls across class loaders, incorrect CVE-2013-5838 fix (Hotspot, 8151666)
|
[
"cpe:/a:redhat:rhel_extras_oracle_java:5",
"cpe:/a:redhat:rhel_extras_oracle_java:6",
"cpe:/a:redhat:rhel_extras_oracle_java:7"
] | null | null | null | null |
RHSA-2017:2489
|
Red Hat Security Advisory: mercurial security update
|
Mercurial: pathaudit: path traversal via symlink mercurial: command injection on clients through malicious ssh URLs
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 6.3 | null |
RHSA-2019:3811
|
Red Hat Security Advisory: OpenShift Container Platform 3.9 atomic-openshift security update
|
atomic-openshift: OpenShift builds don't verify SSH Host Keys for the git repository kubernetes: Incomplete fixes for CVE-2019-1002101 and CVE-2019-11246, kubectl cp potential directory traversal kubernetes: `kubectl cp` allows for arbitrary file write via double symlinks kubernetes: YAML parsing vulnerable to "Billion Laughs" attack, allowing for remote denial of service
|
[
"cpe:/a:redhat:openshift:3.9::el7"
] | null | null | 7.5 | null |
RHSA-2016:1487
|
Red Hat Security Advisory: samba4 security update
|
samba: Client side SMB2/3 required signing can be downgraded
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | 7.5 | null |
RHSA-2024:0420
|
Red Hat Security Advisory: freetype security update
|
FreeType: Buffer overflow in sfnt_init_face FreeType: Segmentation violation via FNT_Size_Request Freetype: Segmentation violation via FT_Request_Size
|
[
"cpe:/o:redhat:rhel_eus:8.6::baseos"
] | null | 7.1 | null | null |
RHSA-2003:296
|
Red Hat Security Advisory: : Updated stunnel packages available
|
security flaw security flaw
|
[
"cpe:/o:redhat:linux:7.1",
"cpe:/o:redhat:linux:7.2",
"cpe:/o:redhat:linux:7.3",
"cpe:/o:redhat:linux:8.0"
] | null | null | null | null |
RHSA-2012:0140
|
Red Hat Security Advisory: thunderbird security update
|
libpng: Heap buffer overflow in png_decompress_chunk (MFSA 2012-11)
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2022:5695
|
Red Hat Security Advisory: java-11-openjdk security, bug fix, and enhancement update
|
OpenJDK: class compilation issue (Hotspot, 8281859) OpenJDK: improper restriction of MethodHandle.invokeBasic() (Hotspot, 8281866) OpenJDK: integer truncation issue in Xalan-J (JAXP, 8285407)
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::crb"
] | null | 7.5 | null | null |
RHSA-2024:7724
|
Red Hat Security Advisory: Red Hat OpenShift Service Mesh Containers for 2.4.11
|
envoy: abnormal termination when using auto_sni with authority header longer than 255 characters envoy: Brotli decompressor infinite loop webpack: DOM Clobbering vulnerability in AutoPublicPathRuntimeModule send: Code Execution Vulnerability in Send Library serve-static: Improper Sanitization in serve-static
|
[
"cpe:/a:redhat:service_mesh:2.4::el8"
] | null | 5 | null | null |
RHSA-2024:3583
|
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 8.0.2 Security update
|
eap-galleon: custom provisioning creates unsecured http-invoker EAP: OIDC app attempting to access the second tenant, the user should be prompted to log jberet: jberet-core logging database credentials EAP: wildfly-elytron has a SSRF security issue
|
[
"cpe:/a:redhat:jboss_enterprise_application_platform:8.0"
] | null | 7.3 | null | null |
RHSA-2009:1620
|
Red Hat Security Advisory: bind security update
|
bind: cache poisoning using not validated DNSSEC responses
|
[
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2021:3338
|
Red Hat Security Advisory: hivex security update
|
hivex: stack overflow due to recursive call of _get_children()
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 4.3 | null | null |
RHSA-2023:1887
|
Red Hat Security Advisory: Multicluster Engine for Kubernetes 2.2.3 security updates and bug fixes
|
http-cache-semantics: Regular Expression Denial of Service (ReDoS) vulnerability vm2: sandbox escape vm2: Sandbox Escape vm2: Sandbox Escape when exception sanitization
|
[
"cpe:/a:redhat:multicluster_engine:2.2::el8"
] | null | 9.8 | null | null |
RHSA-2021:0218
|
Red Hat Security Advisory: sudo security update
|
sudo: Heap buffer overflow in argument parsing
|
[
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 7.8 | null | null |
RHSA-2024:0694
|
Red Hat Security Advisory: Logging Subsystem 5.7.11 - Red Hat OpenShift
|
golang: net/http/internal: Denial of Service (DoS) via Resource Consumption via HTTP requests
|
[
"cpe:/a:redhat:logging:5.7::el8"
] | null | 5.3 | null | null |
RHSA-2020:4288
|
Red Hat Security Advisory: kernel security update
|
kernel: net: bluetooth: type confusion while processing AMP packets kernel: net: bluetooth: information leak when processing certain AMP packets
|
[
"cpe:/o:redhat:rhel_e4s:8.0::baseos"
] | null | 5.3 | null | null |
RHSA-2023:4004
|
Red Hat Security Advisory: python39:3.9 and python39-devel:3.9 security update
|
python: urllib.parse url blocklisting bypass
|
[
"cpe:/a:redhat:rhel_aus:8.4::appstream",
"cpe:/a:redhat:rhel_e4s:8.4::appstream",
"cpe:/a:redhat:rhel_tus:8.4::appstream"
] | null | 7.5 | null | null |
RHSA-2025:3886
|
Red Hat Security Advisory: RHOAI 2.19.0 - Red Hat OpenShift AI
|
golang.org/x/oauth2/jws: Unexpected memory consumption during token parsing in golang.org/x/oauth2/jws dompurify: Mutation XSS in DOMPurify Due to Improper Template Literal Handling
|
[
"cpe:/a:redhat:openshift_ai:2.19::el8"
] | null | 4.5 | null | null |
RHSA-2009:1587
|
Red Hat Security Advisory: kernel security and bug fix update
|
kernel: SELinux and mmap_min_addr kernel: fs: pipe.c null pointer dereference
|
[
"cpe:/o:redhat:rhel_eus:5.3"
] | null | null | null | null |
RHSA-2024:6844
|
Red Hat Security Advisory: pcp security update
|
pcp: pmcd heap corruption through metric pmstore operations pcp: pmpost symlink attack allows escalating pcp to root user
|
[
"cpe:/a:redhat:rhel_eus:8.8::appstream"
] | null | 4.4 | null | null |
RHSA-2014:0790
|
Red Hat Security Advisory: dovecot security update
|
dovecot: denial of service through maxxing out SSL connections
|
[
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | null | null |
RHSA-2022:5597
|
Red Hat Security Advisory: pandoc security update
|
cmark-gfm: possible RCE due to integer overflow
|
[
"cpe:/a:redhat:enterprise_linux:8::crb"
] | null | 8.8 | null | null |
RHSA-2022:8765
|
Red Hat Security Advisory: kernel-rt security and bug fix update
|
kernel: openvswitch: integer underflow leads to out-of-bounds write in reserve_sfa_size()
|
[
"cpe:/a:redhat:rhel_eus:8.4::nfv",
"cpe:/a:redhat:rhel_eus:8.4::realtime"
] | null | 7.8 | null | null |
RHSA-2015:0021
|
Red Hat Security Advisory: php security update
|
php: integer overflow in unserialize() php: heap corruption issue in exif_thumbnail()
|
[
"cpe:/o:redhat:rhel_eus:6.5::computenode",
"cpe:/o:redhat:rhel_eus:6.5::server"
] | null | null | null | null |
RHSA-2012:1430
|
Red Hat Security Advisory: kernel security and bug fix update
|
kernel: sfc: potential remote denial of service through TCP MSS option
|
[
"cpe:/o:redhat:rhel_eus:6.1"
] | null | null | null | null |
RHSA-2015:0158
|
Red Hat Security Advisory: Red Hat Enterprise Virtualization Manager 3.5.0
|
CXF: SSL hostname verification bypass, incomplete CVE-2012-5783 fix ovirt-engine: cross-site request forgery (CSRF) ovirt-engine-webadmin: HttpOnly flag is not included when the session ID is set CXF: SSL hostname verification bypass, incomplete CVE-2012-6153 fix
|
[
"cpe:/a:redhat:rhev_manager:3"
] | null | null | 4.8 | null |
RHSA-2024:3304
|
Red Hat Security Advisory: libreoffice security fix update
|
libreoffice: Improper Input Validation leading to arbitrary gstreamer plugin execution
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 8.3 | null | null |
RHSA-2019:2796
|
Red Hat Security Advisory: skydive security update
|
HTTP/2: flood using PING frames results in unbounded memory growth HTTP/2: flood using HEADERS frames results in unbounded memory growth HTTP/2: flood using SETTINGS frames results in unbounded memory growth
|
[
"cpe:/a:redhat:openstack:14::el7"
] | null | null | 7.5 | null |
RHSA-2003:287
|
Red Hat Security Advisory: : Updated XFree86 packages provide security and bug fixes
|
security flaw security flaw
|
[
"cpe:/o:redhat:linux:7.3",
"cpe:/o:redhat:linux:8.0"
] | null | null | null | null |
RHSA-2025:1350
|
Red Hat Security Advisory: libxml2 security update
|
libxml: use-after-free in xmlXIncludeAddNode
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/o:redhat:enterprise_linux:9::baseos"
] | null | 5.9 | null | null |
RHSA-2023:5439
|
Red Hat Security Advisory: thunderbird security update
|
firefox: use-after-free in workers Mozilla: Out-of-bounds write in PathOps Mozilla: Use-after-free in Ion Compiler Mozilla: Memory safety bugs fixed in Firefox 118, Firefox ESR 115.3, and Thunderbird 115.3 libvpx: Heap buffer overflow in vp8 encoding in libvpx
|
[
"cpe:/a:redhat:rhel_eus:9.0::appstream"
] | null | 8.8 | null | null |
RHSA-2006:0493
|
Red Hat Security Advisory: kernel security update
|
security flaw security flaw security flaw NFS client panic using O_DIRECT security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw
|
[
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2006:0611
|
Red Hat Security Advisory: thunderbird security update
|
security flaw security flaw security flaw security flaw (seamonkey): DOS/arbitrary code execution vuln with vcards security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw
|
[
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2021:0401
|
Red Hat Security Advisory: Red Hat Virtualization Host security bug fix and enhancement update [ovirt-4.4.4]
|
dnsmasq: loose address/port check in reply_query() makes forging replies easier for an off-path attacker dnsmasq: loose query name check in reply_query() makes forging replies easier for an off-path attacker dnsmasq: multiple queries forwarded for the same name makes forging replies easier for an off-path attacker sudo: Heap buffer overflow in argument parsing
|
[
"cpe:/o:redhat:rhev_hypervisor:4.4::el8"
] | null | 7.8 | null | null |
RHSA-2017:3141
|
Red Hat Security Advisory: rhvm-appliance security, bug fix, and enhancement update
|
jasypt: Vulnerable to timing attack against the password hash comparison jackson-databind: Deserialization vulnerability via readValue method of ObjectMapper hibernate-validator: Privilege escalation when running under the security manager
|
[
"cpe:/o:redhat:enterprise_linux:7::hypervisor"
] | null | null | 6.3 | null |
RHSA-2024:0893
|
Red Hat Security Advisory: python-pillow security update
|
pillow: Arbitrary Code Execution via the environment parameter
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb"
] | null | 8.1 | null | null |
RHBA-2023:5949
|
Red Hat Bug Fix Advisory: Red Hat Integration - Service Registry 2.4.4 SP1 OpenShift images
|
HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack)
|
[
"cpe:/a:redhat:rhosemc:1.0::el8"
] | null | 7.5 | null | null |
RHSA-2005:405
|
Red Hat Security Advisory: PHP security update
|
security flaw security flaw security flaw security flaw security flaw
|
[
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws"
] | null | null | null | null |
RHSA-2021:0436
|
Red Hat Security Advisory: OpenShift Container Platform 4.6 compliance-operator security and bug fix update
|
golang: math/big: panic during recursive division of very large numbers
|
[
"cpe:/a:redhat:openshift:4.6::el8"
] | null | 7.5 | null | null |
RHSA-2024:1948
|
Red Hat Security Advisory: Red Hat Build of Apache Camel 3.18 for Quarkus 2.13 is now available (updates to RHBQ 2.13.9.SP2)
|
An update for Red Hat Build of Apache Camel 3.18 for Quarkus 2.13 is now available (updates to RHBQ 2.13.9.SP2).
The purpose of this text-only errata is to inform you about the enhancements that improve your developer experience and ensure the security and stability of your products.
Red Hat Product Security has rated this update as having a security impact of Important.
|
[
"cpe:/a:redhat:camel_quarkus:2.13"
] | null | null | null | null |
RHSA-2017:0869
|
Red Hat Security Advisory: kernel security and enhancement update
|
kernel: net: Out of bounds stack read in memcpy_fromiovec
|
[
"cpe:/o:redhat:rhel_eus:6.7::computenode",
"cpe:/o:redhat:rhel_eus:6.7::server"
] | null | null | 7.8 | null |
RHSA-2022:2210
|
Red Hat Security Advisory: redhat-ds:11 security and bug fix update
|
389-ds-base: sending crafted message could result in DoS
|
[
"cpe:/a:redhat:directory_server:11.5::el8"
] | null | 7.5 | null | null |
RHBA-2015:2194
|
Red Hat Bug Fix Advisory: httpd bug fix and enhancement update
|
httpd: IP address spoofing when proxying using mod_remoteip and mod_rewrite
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 5.3 | null | null |
RHSA-2022:0853
|
Red Hat Security Advisory: thunderbird security update
|
thunderbird: Crafted email could trigger an out-of-bounds write expat: Malformed 2- and 3-byte UTF-8 sequences can lead to arbitrary code execution expat: Namespace-separator characters in "xmlns[:prefix]" attribute values can lead to arbitrary code execution expat: Integer overflow in storeRawNames() Mozilla: Use-after-free in text reflows Mozilla: Browser window spoof using fullscreen mode Mozilla: iframe allow-scripts sandbox bypass Mozilla: Temporary files downloaded to /tmp and accessible by other local users Mozilla: Time-of-check time-of-use bug when verifying add-on signatures Mozilla: Use-after-free in XSLT parameter processing Mozilla: Use-after-free in WebGPU IPC Framework
|
[
"cpe:/a:redhat:rhel_eus:8.4::appstream"
] | null | 8.8 | 7.5 | null |
RHSA-2023:0689
|
Red Hat Security Advisory: openvswitch2.16 security, bug fix and enhancement update
|
openvswitch: Out-of-Bounds Read in Organization Specific TLV openvswitch: Integer Underflow in Organization Specific TLV
|
[
"cpe:/o:redhat:enterprise_linux:8::fastdatapath"
] | null | 9.8 | null | null |
RHSA-2021:1758
|
Red Hat Security Advisory: exiv2 security, bug fix, and enhancement update
|
exiv2: out-of-bounds read in CiffDirectory::readDirectory due to lack of size check
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb"
] | null | null | 6.5 | null |
RHSA-2025:3374
|
Red Hat Security Advisory: Red Hat Developer Hub 1.5.1 release.
|
golang.org/x/net/html: Non-linear parsing of case-insensitive content in golang.org/x/net/html rollup: DOM Clobbering Gadget found in rollup bundled scripts that leads to XSS path-to-regexp: path-to-regexp Unpatched `path-to-regexp` ReDoS in 0.1.x nanoid: nanoid mishandles non-integer values jinja2: Jinja has a sandbox breakout through malicious filenames jinja2: Jinja has a sandbox breakout through indirect reference to format method systeminformation: Command injection vulnerability in getWindowsIEEE8021x (SSID) function in systeminformation undici: Undici Uses Insufficiently Random Values jinja2: Jinja sandbox breakout through attr filter selecting format method xml-crypto: xml-crypto Vulnerable to XML Signature Verification Bypass via Multiple SignedInfo References xml-crypto: xml-crypto Vulnerable to XML Signature Verification Bypass via DigestValue Comment
|
[
"cpe:/a:redhat:rhdh:1.5::el9"
] | null | 9.1 | null | null |
RHSA-2016:2610
|
Red Hat Security Advisory: systemd security and bug fix update
|
systemd: Assertion failure when PID 1 receives a zero-length message over notify socket
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 6.8 | null |
RHSA-2022:6502
|
Red Hat Security Advisory: openvswitch2.13 security update
|
dpdk: error recovery in mlx5 driver not handled properly, allowing for denial of service
|
[
"cpe:/o:redhat:enterprise_linux:8::fastdatapath"
] | null | 6.5 | null | null |
RHSA-2023:5414
|
Red Hat Security Advisory: kernel security update
|
kernel: nf_tables: stack-out-of-bounds-read in nft_byteorder_eval()
|
[
"cpe:/o:redhat:rhel_aus:7.6::server"
] | null | 7.8 | null | null |
RHSA-2024:3925
|
Red Hat Security Advisory: Red Hat Ceph Storage 7.1 security, enhancements, and bug fix update
|
grafana: account takeover possible when using Azure AD OAuth grafana: incorrect assessment of permissions across organizations go-git: Maliciously crafted Git server replies can cause DoS on go-git clients go-git: Maliciously crafted Git server replies can lead to path traversal and RCE on go-git clients
|
[
"cpe:/a:redhat:ceph_storage:7.1::el8",
"cpe:/a:redhat:ceph_storage:7.1::el9"
] | null | 8.1 | null | null |
RHSA-2016:1519
|
Red Hat Security Advisory: Red Hat JBoss Operations Network 3.3.6 update
|
OOME from EAP 6 http management console SSL/TLS: Cross-protocol attack on TLS using SSLv2 (DROWN)
|
[
"cpe:/a:redhat:jboss_operations_network:3.3"
] | null | null | null | null |
RHSA-2008:1029
|
Red Hat Security Advisory: cups security update
|
cups: DoS (daemon crash) caused by the large number of subscriptions
|
[
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2019:1823
|
Red Hat Security Advisory: Red Hat Process Automation Manager 7.4.0 Security Update
|
jackson-databind: Potential information exfiltration with default typing, serialization gadget from MyBatis jackson-databind: improper polymorphic deserialization of types from Jodd-db library jackson-databind: improper polymorphic deserialization of types from Oracle JDBC driver jackson-databind: arbitrary code execution in slf4j-ext class jackson-databind: arbitrary code execution in blaze-ds-opt and blaze-ds-core classes jackson-databind: exfiltration/XXE in some JDK classes jackson-databind: server-side request forgery (SSRF) in axis2-jaxws class jackson-databind: improper polymorphic deserialization in axis2-transport-jms class jackson-databind: improper polymorphic deserialization in openjpa class jackson-databind: improper polymorphic deserialization in jboss-common-core class xstream: remote code execution due to insecure XML deserialization (regression of CVE-2013-7285)
|
[
"cpe:/a:redhat:jboss_bpms:7.4"
] | null | null | 7.3 | null |
RHSA-2022:6741
|
Red Hat Security Advisory: kernel security and bug fix update
|
kernel: race condition in perf_event_open leads to privilege escalation
|
[
"cpe:/o:redhat:rhel_aus:7.7::server",
"cpe:/o:redhat:rhel_e4s:7.7::server",
"cpe:/o:redhat:rhel_tus:7.7::server"
] | null | 7.4 | null | null |
RHSA-2019:2836
|
Red Hat Security Advisory: dovecot security update
|
dovecot: improper NULL byte handling in IMAP and ManageSieve protocol parsers leads to out of bounds writes
|
[
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 8.1 | null |
RHSA-2020:2418
|
Red Hat Security Advisory: unbound security update
|
unbound: amplification of an incoming query into a large number of queries directed to a target unbound: infinite loop via malformed DNS answers received from upstream servers
|
[
"cpe:/a:redhat:rhel_e4s:8.0::appstream"
] | null | 7.5 | null | null |
RHSA-2015:0766
|
Red Hat Security Advisory: firefox security update
|
Mozilla: Same-origin bypass through anchor navigation (MFSA 2015-40) Mozilla: CORS requests should not follow 30x redirections after preflight (MFSA 2015-37) Mozilla: Use-after-free when using the Fluendo MP3 GStreamer plugin (MFSA 2015-31) Mozilla: Miscellaneous memory safety hazards (rv:31.6) (MFSA 2015-30) Mozilla: resource: // documents can load privileged pages (MFSA 2015-33)
|
[
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::server",
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation",
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | null | null |
RHSA-2019:2118
|
Red Hat Security Advisory: glibc security and bug fix update
|
glibc: getaddrinfo should reject IP addresses with trailing characters
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | null | null |
RHSA-2024:8838
|
Red Hat Security Advisory: python3.11 security update
|
python: cpython: tarfile: ReDos via excessive backtracking while parsing header values
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb"
] | null | 7.5 | null | null |
RHSA-2023:0194
|
Red Hat Security Advisory: java-17-openjdk security and bug fix update
|
OpenJDK: handshake DoS attack against DTLS connections (JSSE, 8287411) OpenJDK: soundbank URL remote loading (Sound, 8293742)
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::crb"
] | null | 3.7 | null | null |
RHSA-2024:0157
|
Red Hat Security Advisory: .NET 7.0 security update
|
crypto-js: PBKDF2 1,000 times weaker than specified in 1993 and 1.3M times weaker than current standard dotnet: Information Disclosure: MD.SqlClient(MDS) & System.data.SQLClient (SDS) dotnet: X509 Certificates - Validation Bypass across Azure dotnet: .NET Denial of Service Vulnerability
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb"
] | null | 6.8 | null | null |
RHSA-2014:0866
|
Red Hat Security Advisory: samba and samba3x security update
|
samba: nmbd denial of service samba: smbd unicode path names denial of service
|
[
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server",
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2014:0994
|
Red Hat Security Advisory: openstack-keystone security update
|
openstack-keystone: privilege escalation through trust chained delegation openstack-keystone: Keystone V2 trusts privilege escalation through user supplied project id
|
[
"cpe:/a:redhat:openstack:3::el6",
"cpe:/a:redhat:openstack:4::el6"
] | null | null | null | null |
RHSA-2017:3114
|
Red Hat Security Advisory: Red Hat JBoss Web Server security and bug fix update
|
SSL/TLS: Birthday attack against 64-bit block ciphers (SWEET32) httpd: Uninitialized memory reflection in mod_auth_digest httpd: Use-after-free by limiting unregistered HTTP method (Optionsbleed) tomcat: Remote Code Execution via JSP Upload tomcat: Remote Code Execution bypass for CVE-2017-12615
|
[
"cpe:/a:redhat:jboss_enterprise_web_server:2.1"
] | null | null | 8.1 | null |
RHSA-2023:4705
|
Red Hat Security Advisory: subscription-manager security update
|
subscription-manager: inadequate authorization of com.redhat.RHSM1 D-Bus interface allows local users to modify configuration
|
[
"cpe:/a:redhat:rhel_eus:8.6::appstream",
"cpe:/o:redhat:rhel_eus:8.6::baseos"
] | null | 7.8 | null | null |
RHSA-2008:0972
|
Red Hat Security Advisory: kernel security and bug fix update
|
kernel PWC driver DoS kernel: dio: zero struct dio with kzalloc instead of manually kernel: ptrace: Padding area write - unprivileged kernel crash kernel snd_seq_oss_synth_make_info leak Linux kernel ext[234] directory corruption denial of service kernel: open() call allows setgid bit when user is not in new file's group
|
[
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2014:0474
|
Red Hat Security Advisory: struts security update
|
1: Class Loader manipulation via request parameters
|
[
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHBA-2016:1615
|
Red Hat Bug Fix Advisory: Satellite 6.2.1 bug fix update
|
foreman: API and UI actions/URLs not limited to the orgs/locations assigned
|
[
"cpe:/a:redhat:satellite:6.1::el6",
"cpe:/a:redhat:satellite:6.2::el7",
"cpe:/a:redhat:satellite_capsule:6.1::el6",
"cpe:/a:redhat:satellite_capsule:6.2::el7"
] | null | null | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.