id
stringlengths 13
15
| title
stringlengths 29
176
| description
stringlengths 8
32.1k
| cpes
listlengths 0
20
| cvss_v4_0
null | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
null |
---|---|---|---|---|---|---|---|
RHSA-2023:3644
|
Red Hat Security Advisory: Red Hat OpenShift Service Mesh Containers for 2.4.0
|
golang: html/template: improper handling of JavaScript whitespace
|
[
"cpe:/a:redhat:service_mesh:2.4::el8"
] | null | 8.1 | null | null |
RHSA-2024:0138
|
Red Hat Security Advisory: idm:DL1 security update
|
ipa: Invalid CSRF protection
|
[
"cpe:/a:redhat:rhel_aus:8.4::appstream",
"cpe:/a:redhat:rhel_e4s:8.4::appstream",
"cpe:/a:redhat:rhel_tus:8.4::appstream"
] | null | 6.5 | null | null |
RHSA-2022:7005
|
Red Hat Security Advisory: java-1.8.0-openjdk security update
|
OpenJDK: improper handling of long NTLM client hostnames (Security, 8286526) OpenJDK: insufficient randomization of JNDI DNS port numbers (JNDI, 8286910) OpenJDK: excessive memory allocation in X.509 certificate parsing (Security, 8286533) OpenJDK: HttpServer no connection count limit (Lightweight HTTP Server, 8286918)
|
[
"cpe:/a:redhat:rhel_eus:8.4::appstream",
"cpe:/a:redhat:rhel_eus:8.4::crb"
] | null | 5.3 | null | null |
RHSA-2019:3127
|
Red Hat Security Advisory: java-11-openjdk security update
|
OpenJDK: Missing restrictions on use of custom SocketImpl (Networking, 8218573) OpenJDK: Improper handling of Kerberos proxy credentials (Kerberos, 8220302) OpenJDK: NULL pointer dereference in DrawGlyphList (2D, 8222690) OpenJDK: Unexpected exception thrown by Pattern processing crafted regular expression (Concurrency, 8222684) OpenJDK: Unexpected exception thrown by XPathParser processing crafted XPath expression (JAXP, 8223505) OpenJDK: Unexpected exception thrown during regular expression processing in Nashorn (Scripting, 8223518) OpenJDK: Out of bounds access in optimized String indexof implementation (Hotspot, 8224062) OpenJDK: Incorrect handling of nested jar: URLs in Jar URL handler (Networking, 8223892) OpenJDK: Unexpected exception thrown by XPath processing crafted XPath expression (JAXP, 8224532) OpenJDK: Unexpected exception thrown during Font object deserialization (Serialization, 8224915) OpenJDK: Missing glyph bitmap image dimension check in FreetypeFontScaler (2D, 8225286) OpenJDK: Integer overflow in bounds check in SunGraphics2D (2D, 8225292) OpenJDK: Incorrect handling of HTTP proxy responses in HttpURLConnection (Networking, 8225298) OpenJDK: Excessive memory allocation in CMap when reading TrueType font (2D, 8225597) OpenJDK: Insufficient filtering of HTML event attributes in Javadoc (Javadoc, 8226765)
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 4.8 | 4.7 | null |
RHSA-2020:0179
|
Red Hat Security Advisory: kernel security and bug fix update
|
kernel: kvm: guest userspace to guest kernel write kernel: TLB flush happens too late on mremap kernel: fix race condition between mmget_not_zero()/get_task_mm() and core dumping
|
[
"cpe:/o:redhat:enterprise_linux:7::hypervisor",
"cpe:/o:redhat:rhel_eus:7.6::computenode",
"cpe:/o:redhat:rhel_eus:7.6::server"
] | null | null | 6.1 | null |
RHSA-2024:2302
|
Red Hat Security Advisory: gstreamer1-plugins-base security update
|
gstreamer-plugins-base: heap overwrite in subtitle parsing
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 5.5 | null | null |
RHSA-2020:5055
|
Red Hat Security Advisory: buildah security update
|
golang.org/x/text: possibility to trigger an infinite loop in encoding/unicode could lead to crash
|
[
"cpe:/a:redhat:rhel_extras_other:7"
] | null | 7.5 | null | null |
RHSA-2022:0819
|
Red Hat Security Advisory: kernel-rt security and bug fix update
|
kernel: Use After Free in unix_gc() which could result in a local privilege escalation kernel: local privilege escalation by exploiting the fsconfig syscall parameter leads to container breakout kernel: possible privileges escalation due to missing TLB flush kernel: remote stack overflow via kernel panic on systems using TIPC may lead to DoS kernel: cgroups v1 release_agent feature may allow privilege escalation kernel: improper initialization of the "flags" member of the new pipe_buffer kernel: failing usercopy allows for use-after-free exploitation
|
[
"cpe:/a:redhat:enterprise_linux:8::nfv",
"cpe:/a:redhat:enterprise_linux:8::realtime"
] | null | 7 | null | null |
RHSA-2016:0009
|
Red Hat Security Advisory: libldb security update
|
libldb: Remote DoS in Samba (AD) LDAP server libldb: remote memory read in the Samba LDAP server
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation",
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | null | null |
RHSA-2014:0354
|
Red Hat Security Advisory: libyaml security update
|
libyaml: heap-based buffer overflow when parsing YAML tags libyaml: heap-based buffer overflow when parsing URLs
|
[
"cpe:/a:redhat:openstack:4::el6"
] | null | null | null | null |
RHSA-2024:0139
|
Red Hat Security Advisory: idm:DL1 security update
|
Kerberos: delegation constrain bypass in S4U2Proxy ipa: Invalid CSRF protection
|
[
"cpe:/a:redhat:rhel_eus:8.6::appstream"
] | null | 6.5 | null | null |
RHBA-2006:0294
|
Red Hat Bug Fix Advisory: perl bug fix update
|
leaks file existance information
|
[
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws"
] | null | null | null | null |
RHSA-2014:0041
|
Red Hat Security Advisory: rhev-hypervisor6 security update
|
openssl: client NULL dereference crash on malformed handshake packets nss: Null_Cipher() does not respect maxOutputLen (MFSA 2013-103) nss: CERT_VerifyCert returns SECSuccess (saying certificate is good) even for bad certificates (MFSA 2013-103) openssl: crash when using TLS 1.2 caused by use of incorrect hash algorithm
|
[
"cpe:/o:redhat:enterprise_linux:6::hypervisor"
] | null | null | null | null |
RHSA-2018:3528
|
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.1.5 on RHEL 7 security update
|
JBoss/WildFly: iiop does not honour strict transport confidentiality
|
[
"cpe:/a:redhat:jboss_enterprise_application_platform:7.1::el7"
] | null | null | 5.3 | null |
RHSA-2023:4330
|
Red Hat Security Advisory: nodejs:18 security, bug fix, and enhancement update
|
nodejs: mainModule.proto bypass experimental policy mechanism nodejs: process interuption due to invalid Public Key information in x509 certificates nodejs: HTTP Request Smuggling via Empty headers separated by CR nodejs: DiffieHellman do not generate keys after setting a private key
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 7.5 | null | null |
RHSA-2020:1975
|
Red Hat Security Advisory: rh-git218-git security update
|
git: Crafted URL containing new lines, empty host or lacks a scheme can cause credential leak
|
[
"cpe:/a:redhat:rhel_software_collections:3::el7"
] | null | 7.5 | null | null |
RHSA-2023:0979
|
Red Hat Security Advisory: kernel-rt security and bug fix update
|
kernel: an out-of-bounds vulnerability in i2c-ismt driver kernel: use-after-free caused by l2cap_reassemble_sdu() in net/bluetooth/l2cap_core.c kernel: stack overflow in do_proc_dointvec and proc_skip_spaces kernel: use-after-free in __nfs42_ssc_open() in fs/nfs/nfs4file.c leading to remote Denial of Service attack kernel: Netfilter integer overflow vulnerability in nft_payload_copy_vlan
|
[
"cpe:/a:redhat:enterprise_linux:9::nfv",
"cpe:/a:redhat:enterprise_linux:9::realtime"
] | null | 7.8 | null | null |
RHSA-2013:0707
|
Red Hat Security Advisory: openstack-glance security and bug fix update
|
Glance: Backend credentials leak in Glance v1 API
|
[
"cpe:/a:redhat:openstack:2::el6"
] | null | null | null | null |
RHSA-2024:0662
|
Red Hat Security Advisory: OpenShift Container Platform 4.13.32 packages and security update
|
runc: file descriptor leak
|
[
"cpe:/a:redhat:openshift:4.13::el8",
"cpe:/a:redhat:openshift:4.13::el9"
] | null | 8.6 | null | null |
RHSA-2013:0567
|
Red Hat Security Advisory: kernel security update
|
kernel: race condition with PTRACE_SETREGS
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2023:2523
|
Red Hat Security Advisory: openssl security and bug fix update
|
openssl: Using a Custom Cipher with NID_undef may lead to NULL encryption
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/o:redhat:enterprise_linux:9::baseos"
] | null | 7.5 | null | null |
RHSA-2020:3631
|
Red Hat Security Advisory: thunderbird security update
|
Mozilla: Attacker-induced prompt for extension installation Mozilla: Use-After-Free when aborting an operation
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 8.8 | null | null |
RHSA-2015:1214
|
Red Hat Security Advisory: flash-plugin security update
|
flash-plugin: information disclosure issues fixed in APSB15-16 flash-plugin: information disclosure issues fixed in APSB15-16 flash-plugin: information disclosure issues fixed in APSB15-16 flash-plugin: information disclosure issues fixed in APSB15-16 flash-plugin: multiple code execution issues fixed in APSB15-16 flash-plugin: multiple code execution issues fixed in APSB15-16 flash-plugin: multiple code execution issues fixed in APSB15-16 flash-plugin: multiple code execution issues fixed in APSB15-16 flash-plugin: multiple code execution issues fixed in APSB15-16 flash-plugin: multiple code execution issues fixed in APSB15-16 flash-plugin: multiple code execution issues fixed in APSB15-16 flash-plugin: multiple code execution issues fixed in APSB15-16 flash-plugin: information disclosure issues fixed in APSB15-16 flash-plugin: multiple code execution issues fixed in APSB15-16 flash-plugin: multiple code execution issues fixed in APSB15-16 flash-plugin: multiple code execution issues fixed in APSB15-16 flash-plugin: multiple code execution issues fixed in APSB15-16 flash-plugin: multiple code execution issues fixed in APSB15-16 flash-plugin: multiple code execution issues fixed in APSB15-16 flash-plugin: multiple code execution issues fixed in APSB15-16 flash-plugin: multiple code execution issues fixed in APSB15-16 flash-plugin: multiple code execution issues fixed in APSB15-16 flash-plugin: multiple code execution issues fixed in APSB15-16 flash-plugin: multiple code execution issues fixed in APSB15-16 flash-plugin: multiple code execution issues fixed in APSB15-16 flash-plugin: multiple code execution issues fixed in APSB15-16 flash-plugin: multiple code execution issues fixed in APSB15-16 flash-plugin: multiple code execution issues fixed in APSB15-16 flash-plugin: multiple code execution issues fixed in APSB15-16 flash-plugin: multiple code execution issues fixed in APSB15-16 flash-plugin: multiple code execution issues fixed in APSB15-16 flash-plugin: information disclosure issues fixed in APSB15-16 flash-plugin: multiple code execution issues fixed in APSB15-16 flash-plugin: multiple code execution issues fixed in APSB15-16 flash-plugin: code execution issue in APSA15-03 / APSB15-16 flash-plugin: multiple code execution issues fixed in APSB15-16
|
[
"cpe:/a:redhat:rhel_extras:5::client",
"cpe:/a:redhat:rhel_extras:5::server",
"cpe:/a:redhat:rhel_extras:6"
] | null | null | null | null |
RHSA-2011:0407
|
Red Hat Security Advisory: logrotate security update
|
logrotate: TOCTOU race condition by creation of new files (between opening the file and moment, final permissions have been applied) [information disclosure] logrotate: Shell command injection by using the shred configuration directive logrotate: DoS due improper escaping of file names within 'write state' action
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2011:1308
|
Red Hat Security Advisory: JBoss Communications Platform 1.2.11 and 5.1.1 security update
|
JBossWS remote Denial of Service
|
[
"cpe:/a:redhat:jboss_communications_platform:1.2",
"cpe:/a:redhat:jboss_communications_platform:5.1"
] | null | null | null | null |
RHSA-2023:0336
|
Red Hat Security Advisory: systemd security update
|
systemd: buffer overrun in format_timespan() function
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/o:redhat:enterprise_linux:9::baseos"
] | null | 5.5 | null | null |
RHSA-2002:096
|
Red Hat Security Advisory: : : : Updated unzip and tar packages fix vulnerabilities
|
security flaw security flaw security flaw security flaw security flaw
|
[
"cpe:/o:redhat:linux:6.2",
"cpe:/o:redhat:linux:7.0",
"cpe:/o:redhat:linux:7.1",
"cpe:/o:redhat:linux:7.2",
"cpe:/o:redhat:linux:7.3"
] | null | null | null | null |
RHSA-2024:7455
|
Red Hat Security Advisory: git-lfs security update
|
encoding/gob: golang: Calling Decoder.Decode on a message which contains deeply nested structures can cause a panic due to stack exhaustion
|
[
"cpe:/a:redhat:rhel_aus:8.6::appstream",
"cpe:/a:redhat:rhel_e4s:8.6::appstream",
"cpe:/a:redhat:rhel_tus:8.6::appstream"
] | null | 7.5 | null | null |
RHSA-2014:0740
|
Red Hat Security Advisory: kernel security and bug fix update
|
kernel: net: rds: dereference of a NULL device in rds_ib_laddr_check() kernel: block: floppy: privilege escalation via FDRAWCMD floppy ioctl command kernel: block: floppy: privilege escalation via FDRAWCMD floppy ioctl command
|
[
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2022:8870
|
Red Hat Security Advisory: Red Hat OpenStack Platform 16.1.9 (openstack-neutron) security update
|
openstack-neutron: unrestricted creation of security groups
|
[
"cpe:/a:redhat:openstack:16.1::el8"
] | null | 4.3 | null | null |
RHSA-2016:0118
|
Red Hat Security Advisory: Red Hat JBoss Operations Network 3.3.5 update
|
groovy: remote execution of untrusted code in class MethodClosure apache-commons-collections: InvokerTransformer code execution during deserialisation
|
[
"cpe:/a:redhat:jboss_operations_network:3.3"
] | null | null | 9.6 | null |
RHSA-2012:1136
|
Red Hat Security Advisory: openoffice.org security update
|
libreoffice: Multiple heap-based buffer overflows in the XML manifest encryption handling code
|
[
"cpe:/a:redhat:rhel_productivity:5",
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation"
] | null | null | null | null |
RHSA-2008:0156
|
Red Hat Security Advisory: java-1.5.0-bea security update
|
Security Vulnerability in Java Runtime Environment With Applet Caching Untrusted Application or Applet May Move or Copy Arbitrary Files Applets or Applications are allowed to display an oversized window Anti-DNS Pinning and Java Applets with HTTP proxy java-1.5.0 Privilege escalation via unstrusted applet and application
|
[
"cpe:/a:redhat:rhel_extras:5::server"
] | null | null | null | null |
RHSA-2024:0128
|
Red Hat Security Advisory: tigervnc security update
|
xorg-x11-server: Out-of-bounds write in XIChangeDeviceProperty/RRChangeOutputProperty
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 7.8 | null | null |
RHSA-2024:1747
|
Red Hat Security Advisory: kernel security update
|
kernel: net/sched: sch_hfsc UAF
|
[
"cpe:/o:redhat:rhel_aus:7.6::server"
] | null | 7.8 | null | null |
RHSA-2024:1494
|
Red Hat Security Advisory: thunderbird security update
|
nss: timing attack against RSA decryption Mozilla: Crash in NSS TLS method Mozilla: Leaking of encrypted email subjects to other conversations Mozilla: JIT code failed to save return registers on Armv7-A Mozilla: Integer overflow could have led to out of bounds write Mozilla: Improper handling of html and body tags enabled CSP nonce leakage Mozilla: Clickjacking vulnerability could have led to a user accidentally granting permissions Mozilla: Self referencing object could have potentially led to a use-after-free Mozilla: Memory safety bugs fixed in Firefox 124, Firefox ESR 115.9, and Thunderbird 115.9
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 7.5 | null | null |
RHSA-2021:0713
|
Red Hat Security Advisory: OpenShift Container Platform 4.5.34 packages and security update
|
golang: data race in certain net/http servers including ReverseProxy can lead to DoS golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs
|
[
"cpe:/a:redhat:openshift:4.5::el7",
"cpe:/a:redhat:openshift:4.5::el8"
] | null | 7.5 | null | null |
RHSA-2020:1289
|
Red Hat Security Advisory: haproxy security update
|
haproxy: malformed HTTP/2 requests can lead to out-of-bounds writes
|
[
"cpe:/a:redhat:rhel_e4s:8.0::appstream"
] | null | 8.8 | null | null |
RHSA-2024:7418
|
Red Hat Security Advisory: linux-firmware security update
|
kernel: hw:amd:IOMMU improperly handles certain special address leading to a loss of guest integrity kernel: hw:amd: Incomplete system memory cleanup in SEV firmware corrupt guest private memory
|
[
"cpe:/o:redhat:rhel_aus:8.6::baseos",
"cpe:/o:redhat:rhel_e4s:8.6::baseos",
"cpe:/o:redhat:rhel_tus:8.6::baseos"
] | null | 4.4 | null | null |
RHSA-2025:3616
|
Red Hat Security Advisory: grafana security update
|
golang-jwt/jwt: jwt-go allows excessive memory allocation during header parsing
|
[
"cpe:/a:redhat:rhel_eus:9.2::appstream"
] | null | 7.5 | null | null |
RHSA-2021:0689
|
Red Hat Security Advisory: kpatch-patch security update
|
kernel: bad kfree in auditfilter.c may lead to escalation of privilege kernel: locking issue in drivers/tty/tty_jobctrl.c can lead to an use-after-free
|
[
"cpe:/o:redhat:rhel_eus:8.1::baseos"
] | null | 7.8 | null | null |
RHSA-2021:3325
|
Red Hat Security Advisory: bind security update
|
bind: Broken inbound incremental zone update (IXFR) can cause named to terminate unexpectedly
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 6.5 | null | null |
RHSA-2017:3115
|
Red Hat Security Advisory: Red Hat JBoss Fuse/A-MQ 6.3 R5 security and bug fix update
|
thrift: Infinite recursion via vectors involving the skip function jsch: ChannelSftp path traversal vulnerability Framework: Directory Traversal in the Spring Framework ResourceServlet
|
[
"cpe:/a:redhat:jboss_amq:6.3",
"cpe:/a:redhat:jboss_fuse:6.3"
] | null | null | 5.6 | null |
RHSA-2024:7506
|
Red Hat Security Advisory: cups-filters security update
|
cups-filters: libcupsfilters: `cfGetPrinterAttributes` API does not perform sanitization on returned IPP attributes cups: libppd: remote command injection via attacker controlled data in PPD file cups-browsed: cups-browsed binds on UDP INADDR_ANY:631 trusting any packet from any source cups-browsed: cups-filters: cups-browsed vulnerable to DDoS amplification attack
|
[
"cpe:/a:redhat:rhel_e4s:9.0::appstream"
] | null | 7.5 | null | null |
RHSA-2019:0380
|
Red Hat Security Advisory: Red Hat Single Sign-On 7.2.6 security update
|
wildfly-core: Cross-site scripting (XSS) in JBoss Management Console undertow: Infoleak in some circumstances where Undertow can serve data from a random buffer dom4j: XML Injection in Class: Element. Methods: addElement, addAttribute which can impact the integrity of XML documents
|
[
"cpe:/a:redhat:jboss_single_sign_on:7.2"
] | null | null | 5.3 | null |
RHSA-2021:3498
|
Red Hat Security Advisory: firefox security update
|
Mozilla: Memory safety bugs fixed in Firefox 92, Firefox ESR 78.14 and Firefox ESR 91.1
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 8.8 | null | null |
RHSA-2024:6508
|
Red Hat Security Advisory: Red Hat Build of Apache Camel 4.4.2 for Spring Boot security update.
|
undertow: response write hangs in case of Java 17 TLSv1.3 NewSessionTicket undertow: Improper State Management in Proxy Protocol parsing causes information leakage spring-expression: Denial of service when processing a specially crafted Spring Expression Language expression
|
[
"cpe:/a:redhat:apache_camel_spring_boot:4.4.2"
] | null | 5.9 | null | null |
RHSA-2015:1845
|
Red Hat Security Advisory: Red Hat Gluster Storage 3.1 update
|
gluster-swift metadata constraints are not correctly enforced Swift: unauthorized deletion of versioned Swift object
|
[
"cpe:/a:redhat:storage:3.1:nagios:el6",
"cpe:/a:redhat:storage:3.1:nfs:el6",
"cpe:/a:redhat:storage:3.1:server:el6",
"cpe:/a:redhat:storage:3:client:el6"
] | null | null | null | null |
RHSA-2022:8434
|
Red Hat Security Advisory: dotnet7.0 security, bug fix, and enhancement update
|
dotnet: Nuget cache poisoning on Linux via world-writable cache directory
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::crb"
] | null | 7.8 | null | null |
RHSA-2023:1549
|
Red Hat Security Advisory: tigervnc security update
|
xorg-x11-server: X.Org Server Overlay Window Use-After-Free Local Privilege Escalation Vulnerability
|
[
"cpe:/a:redhat:rhel_aus:8.2::appstream",
"cpe:/a:redhat:rhel_e4s:8.2::appstream",
"cpe:/a:redhat:rhel_tus:8.2::appstream"
] | null | 7.8 | null | null |
RHSA-2023:6120
|
Red Hat Security Advisory: nginx:1.22 security update
|
HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack)
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 7.5 | null | null |
RHSA-2017:2838
|
Red Hat Security Advisory: dnsmasq security update
|
dnsmasq: heap overflow in the code responsible for building DNS replies
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | 9.8 | null |
RHSA-2025:3388
|
Red Hat Security Advisory: python-jinja2 security update
|
jinja2: Jinja sandbox breakout through attr filter selecting format method
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 7.3 | null | null |
RHSA-2015:0660
|
Red Hat Security Advisory: qpid-cpp security and bug fix update
|
qpid-cpp: 3 qpidd DoS issues in AMQP 0-10 protocol handling qpid-cpp: anonymous access to qpidd cannot be prevented qpid-cpp: AMQP 0-10 protocol sequence-set maximal range DoS (incomplete CVE-2015-0203 fix)
|
[
"cpe:/a:redhat:enterprise_mrg:2:server:el7"
] | null | null | null | null |
RHSA-2020:4930
|
Red Hat Security Advisory: Red Hat Single Sign-On 7.4.3 security update on RHEL 7
|
keycloak: OIDC redirect_uri allows dangerous schemes resulting in potential XSS keycloak: user can manage resources with just "view-profile" role using new Account Console
|
[
"cpe:/a:redhat:red_hat_single_sign_on:7::el7"
] | null | 8.1 | null | null |
RHSA-2009:0421
|
Red Hat Security Advisory: ghostscript security update
|
ghostscript: DoS (crash) in CCITTFax decoding filter ghostscript: Buffer overflow in BaseFont writer module for pdfwrite device ghostscript: Missing boundary check in Ghostscript's jbig2dec library argyllcms: Incomplete fix for CVE-2009-0583
|
[
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2024:1668
|
Red Hat Security Advisory: OpenShift Container Platform 4.15.8 bug fix and security update
|
golang: net/http, x/net/http2: unlimited number of CONTINUATION frames causes DoS
|
[
"cpe:/a:redhat:openshift:4.15::el9"
] | null | 7.5 | null | null |
RHSA-2024:2287
|
Red Hat Security Advisory: gstreamer1-plugins-bad-free security update
|
gstreamer-plugins-bad: Integer overflow leading to heap overwrite in MXF file handling with uncompressed video gstreamer-plugins-bad: Integer overflow leading to heap overwrite in MXF file handling with AES3 audio gstreamer-plugins-bad: Integer overflow in H.265 video parser leading to stack overwrite gstreamer-plugins-bad-free: buffer overflow vulnerability
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::crb"
] | null | 6.3 | null | null |
RHSA-2010:0922
|
Red Hat Security Advisory: Red Hat Enterprise MRG Messaging and Grid security update
|
plugin: enable QUEUE_ALL_USERS_TRUSTED for Submit/Hold/Release/Remove ops
|
[
"cpe:/a:redhat:enterprise_mrg:1.0::el4"
] | null | null | null | null |
RHSA-2022:0510
|
Red Hat Security Advisory: firefox security update
|
Mozilla: Extensions could have bypassed permission confirmation during update Mozilla: Drag and dropping an image could have resulted in the dropped object being an executable Mozilla: Sandboxed iframes could have executed script if the parent appended elements Mozilla: Cross-Origin responses could be distinguished between script and non-script content-types Mozilla: frame-ancestors Content Security Policy directive was not enforced for framed extension pages Mozilla: Script Execution during invalid object state Mozilla: Memory safety bugs fixed in Firefox 97 and Firefox ESR 91.6
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 8.8 | null | null |
RHSA-2017:2603
|
Red Hat Security Advisory: docker-distribution security, bug fix, and enhancement update
|
docker-distribution: Does not properly restrict the amount of content accepted from a user
|
[
"cpe:/a:redhat:rhel_extras_other:7"
] | null | null | 5.3 | null |
RHSA-2003:416
|
Red Hat Security Advisory: kernel security update
|
security flaw
|
[
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws"
] | null | null | null | null |
RHBA-2024:4589
|
Red Hat Bug Fix Advisory: Satellite 6.15.2 Async Update
|
foreman: Host ssh key not being checked in remote execution
|
[
"cpe:/a:redhat:satellite:6.15::el8",
"cpe:/a:redhat:satellite_capsule:6.15::el8",
"cpe:/a:redhat:satellite_utils:6.15::el8"
] | null | 6.8 | null | null |
RHSA-2007:0360
|
Red Hat Security Advisory: jbossas security update
|
tomcat multiple content-length header poisioning tomcat directory traversal tomcat accept-language xss flaw
|
[
"cpe:/a:redhat:rhel_application_stack:1"
] | null | null | null | null |
RHSA-2023:0544
|
Red Hat Security Advisory: Red Hat Camel for Spring Boot 3.14.5 Patch 1 release and security update
|
jettison: parser crash by stackoverflow jettison: If the value in map is the map's self, the new new JSONObject(map) cause StackOverflowError which may lead to dos CXF: directory listing / code exfiltration CXF: SSRF Vulnerability
|
[
"cpe:/a:redhat:camel_spring_boot:3.14.5"
] | null | 9.8 | null | null |
RHSA-2024:1488
|
Red Hat Security Advisory: firefox security update
|
nss: timing attack against RSA decryption Mozilla: Crash in NSS TLS method Mozilla: JIT code failed to save return registers on Armv7-A Mozilla: Integer overflow could have led to out of bounds write Mozilla: Improper handling of html and body tags enabled CSP nonce leakage Mozilla: Clickjacking vulnerability could have led to a user accidentally granting permissions Mozilla: Self referencing object could have potentially led to a use-after-free Mozilla: Memory safety bugs fixed in Firefox 124, Firefox ESR 115.9, and Thunderbird 115.9 Mozilla: Improve handling of out-of-memory conditions in ICU Mozilla: Privileged JavaScript Execution via Event Handlers
|
[
"cpe:/a:redhat:rhel_eus:8.8::appstream"
] | null | 8.8 | null | null |
RHSA-2003:082
|
Red Hat Security Advisory: apache, openssl, php, tomcat security update for Stronghold
|
security flaw security flaw security flaw security flaw
|
[
"cpe:/a:redhat:stronghold:4"
] | null | null | null | null |
RHSA-2017:0347
|
Red Hat Security Advisory: kernel security and bug fix update
|
kernel: dccp: crash while sending ipv6 reset packet kernel: use after free in dccp protocol
|
[
"cpe:/o:redhat:rhel_mission_critical:5.6"
] | null | null | 7.8 | null |
RHSA-2024:10472
|
Red Hat Security Advisory: webkit2gtk3 security update
|
webkitgtk: data isolation bypass vulnerability
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 6.1 | null | null |
RHSA-2023:2076
|
Red Hat Security Advisory: libwebp security update
|
Mozilla: libwebp: Double-free in libwebp
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 7.5 | null | null |
RHSA-2025:2500
|
Red Hat Security Advisory: tigervnc security update
|
X.Org: Xwayland: Use-after-free of the root cursor Xorg: xwayland: Buffer overflow in XkbVModMaskText() xorg: xwayland: Heap overflow in XkbWriteKeySyms() xorg: xwayland: Buffer overflow in XkbChangeTypesOfKey() xorg: xwayland: Out-of-bounds write in CreatePointerBarrierClient() xorg: xwayland: Use of uninitialized pointer in compRedirectWindow() xorg: xwayland: Use-after-free in PlayReleasedEvents() xorg: xwayland: Use-after-free in SyncInitTrigger()
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 7.8 | null | null |
RHSA-2013:0834
|
Red Hat Security Advisory: JBoss Enterprise Application Platform 6.1.0 update
|
Web: jsessionid exposed via encoded url when using cookie based session tracking JBoss: custom authorization module implementations shared between applications apache-cxf: XML encryption backwards compatibility attacks tomcat: Session fixation in form authenticator
|
[
"cpe:/a:redhat:jboss_enterprise_application_platform:6::el6"
] | null | null | null | null |
RHSA-2007:0346
|
Red Hat Security Advisory: vim security update
|
vim-7 modeline security issue
|
[
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2011:1196
|
Red Hat Security Advisory: system-config-printer security update
|
system-config-printer: possible arbitrary code execution in pysmb.py due to improper escaping of hostnames
|
[
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws",
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2024:0974
|
Red Hat Security Advisory: postgresql:12 security update
|
postgresql: non-owner 'REFRESH MATERIALIZED VIEW CONCURRENTLY' executes arbitrary SQL
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 8 | null | null |
RHSA-2022:5201
|
Red Hat Security Advisory: Red Hat Advanced Cluster Management 2.4.5 security updates and bug fixes
|
golang.org/x/crypto: empty plaintext packet causes panic nconf: Prototype pollution in memory store golang: crypto/elliptic: IsOnCurve returns true for invalid field elements nats-server: misusing the "dynamically provisioned sandbox accounts" feature authenticated user can obtain the privileges of the System account Moment.js: Path traversal in moment.locale dset: Prototype Pollution in dset golang: syscall: faccessat checks wrong group go-getter: writes SSH credentials into logfile, exposing sensitive credentials to local uses
|
[
"cpe:/a:redhat:acm:2.4::el8"
] | null | 5.1 | null | null |
RHSA-2016:1858
|
Red Hat Security Advisory: ruby193-rubygem-actionpack security update
|
rubygem-actionview: cross-site scripting flaw in Action View
|
[
"cpe:/a:redhat:rhel_software_collections:2::el6",
"cpe:/a:redhat:rhel_software_collections:2::el7"
] | null | null | 6.1 | null |
RHSA-2025:2600
|
Red Hat Security Advisory: rsync security update
|
rsync: Path traversal vulnerability in rsync rsync: --safe-links option bypass leads to path traversal rsync: Race Condition in rsync Handling Symbolic Links
|
[
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 5.6 | null | null |
RHSA-2021:1546
|
Red Hat Security Advisory: .NET 5.0 on Red Hat Enterprise Linux security and bugfix update
|
dotnet: .NET Core single-file application privilege escalation
|
[
"cpe:/a:redhat:rhel_dotnet:5.0::el7"
] | null | 7.3 | null | null |
RHSA-2021:0617
|
Red Hat Security Advisory: xterm security update
|
xterm: crash when processing combining characters
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 9.6 | null | null |
RHSA-2017:3263
|
Red Hat Security Advisory: curl security update
|
curl: IMAP FETCH response out of bounds read
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 4.8 | null |
RHSA-2018:3083
|
Red Hat Security Advisory: kernel security, bug fix, and enhancement update
|
kernel: AIO write triggers integer overflow in some protocols kernel: Information leak when handling NM entries containing NUL kernel: Use-after-free in snd_pcm_info function in ALSA subsystem potentially leads to privilege escalation kernel: Handling of might_cancel queueing is not properly pretected against race kernel: Salsa20 encryption algorithm does not correctly handle zero-length inputs allowing local attackers to cause denial-of-service kernel: Inifinite loop vulnerability in mm/madvise.c:madvise_willneed() function allows local denial of service kernel: Mishandling mutex within libsas allowing local Denial of Service kernel: out-of-bounds access in the show_timer function in kernel/time/posix-timers.c kernel: Division by zero in change_port_settings in drivers/usb/serial/io_ti.c resulting in a denial of service kernel: NULL pointer dereference in ext4/mballoc.c:ext4_process_freed_data() when mounting crafted ext4 image kernel: NULL pointer dereference in ext4/xattr.c:ext4_xattr_inode_hash() causes crash with crafted ext4 image kernel: vhost: Information disclosure in vhost/vhost.c:vhost_new_msg() kernel: fuse-backed file mmap-ed onto process cmdline arguments causes denial of service kernel: a null pointer dereference in net/dccp/output.c:dccp_write_xmit() leads to a system crash kernel: drivers/block/loop.c mishandles lo_release serialization allowing denial-of-service kernel: IP fragments with random offsets allow a remote denial of service (FragmentSmack) kernel: Missing length check of payload in net/sctp/sm_make_chunk.c:_sctp_make_chunk() function allows denial of service kernel: buffer overflow in drivers/net/wireless/ath/wil6210/wmi.c:wmi_set_ie() may lead to memory corruption kernel: Denial of service in resv_map_release function in mm/hugetlb.c kernel: Memory leak in the sas_smp_get_phy_events function in drivers/scsi/libsas/sas_expander.c kernel: Integer overflow in drivers/gpu/drm/udl/udl_fb.c:udl_fb_mmap() can allow attackers to execute code in kernel space kernel: Invalid pointer dereference in xfs_ilock_attr_map_shared() when mounting crafted xfs image allowing denial of service kernel: out-of-bound write in ext4_init_block_bitmap function with a crafted ext4 image kernel: use-after-free detected in ext4_xattr_set_entry with a crafted file kernel: out-of-bound access in ext4_get_group_info() when mounting and operating a crafted ext4 image kernel: stack-out-of-bounds write in jbd2_journal_dirty_metadata function kernel: MIDI driver race condition leads to a double-free kernel: incorrect memory bounds check in drivers/cdrom/cdrom.c kernel: Missing check in fs/inode.c:inode_init_owner() does not clear SGID bit on non-directories for non-members kernel: filesystem corruption due to an unchecked error condition during an xfs attribute change kernel: Improper validation in bnx2x network card driver can allow for denial of service attacks via crafted packet
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 5.8 | null |
RHSA-2019:0671
|
Red Hat Security Advisory: firefox security update
|
Mozilla: IonMonkey MArraySlice has incorrect alias information Mozilla: Ionmonkey type confusion with __proto__ mutations
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 8.8 | null |
RHSA-2020:3623
|
Red Hat Security Advisory: squid:4 security update
|
squid: HTTP Request Smuggling could result in cache poisoning squid: HTTP Request Splitting could result in cache poisoning
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:rhel_e4s:8.0::appstream",
"cpe:/a:redhat:rhel_eus:8.1::appstream"
] | null | 9.6 | null | null |
RHSA-2015:0645
|
Red Hat Security Advisory: redhat-access-plugin-openstack security update
|
dashboard: log file arbitrary file retrieval
|
[
"cpe:/a:redhat:openstack:6::el7"
] | null | null | null | null |
RHSA-2024:6947
|
Red Hat Security Advisory: grafana security update
|
encoding/gob: golang: Calling Decoder.Decode on a message which contains deeply nested structures can cause a panic due to stack exhaustion
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 7.5 | null | null |
RHSA-2012:1604
|
Red Hat Security Advisory: Fuse ESB Enterprise 7.1.0 update
|
jetty: hash table collisions CPU usage DoS (oCERT-2011-003) jruby: Murmur hash function collisions (oCERT-2012-001)
|
[
"cpe:/a:redhat:fuse_esb_enterprise:7.1.0"
] | null | null | null | null |
RHSA-2023:2764
|
Red Hat Security Advisory: python39:3.9 and python39-devel:3.9 security update
|
python: int() type in PyLong_FromString() does not limit amount of digits converting text to int leading to DoS python: open redirection vulnerability in lib/http/server.py may lead to information disclosure python: CPU denial of service via inefficient IDNA decoder
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb"
] | null | 7.5 | null | null |
RHSA-2015:2369
|
Red Hat Security Advisory: openhpi security, bug fix, and enhancement update
|
openhpi: world writable /var/lib/openhpi directory
|
[
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | null | null |
RHBA-2022:7200
|
Red Hat Bug Fix Advisory: OpenShift Container Platform 4.11.12 packages update
|
kube-apiserver: Aggregated API server can cause clients to be redirected (SSRF)
|
[
"cpe:/a:redhat:openshift:4.11::el8",
"cpe:/a:redhat:openshift_ironic:4.11::el8"
] | null | 5.1 | null | null |
RHSA-2018:0108
|
Red Hat Security Advisory: libvirt security update
|
An update for libvirt is now available for Red Hat Enterprise Linux 6.7 Extended Update Support.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
|
[
"cpe:/o:redhat:rhel_eus:6.7::computenode",
"cpe:/o:redhat:rhel_eus:6.7::server"
] | null | null | null | null |
RHSA-2019:3076
|
Red Hat Security Advisory: kpatch-patch security update
|
kernel: Use-after-free in __blk_drain_queue() function in block/blk-core.c kernel: Heap overflow in mwifiex_update_bss_desc_with_ie function in marvell/mwifiex/scan.c hardware: bluetooth: BR/EDR encryption key negotiation attacks (KNOB) kernel: Heap overflow in mwifiex_uap_parse_tail_ies function in drivers/net/wireless/marvell/mwifiex/ie.c
|
[
"cpe:/o:redhat:enterprise_linux:7::server"
] | null | null | 8 | null |
RHSA-2010:0819
|
Red Hat Security Advisory: pam security update
|
pam: pam_xauth missing return value checks from setuid() and similar calls pam: pam_env and pam_mail accessing users' file with root privileges pam: pam_namespace executes namespace.init with service's environment pam: pam_xauth: Does not check if certain ACL file is a regular file
|
[
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2003:101
|
Red Hat Security Advisory: : Updated OpenSSL packages fix vulnerabilities
|
security flaw security flaw
|
[
"cpe:/o:redhat:linux:6.2",
"cpe:/o:redhat:linux:7.0",
"cpe:/o:redhat:linux:7.1",
"cpe:/o:redhat:linux:7.2",
"cpe:/o:redhat:linux:7.3",
"cpe:/o:redhat:linux:8.0",
"cpe:/o:redhat:linux:9"
] | null | null | null | null |
RHSA-2007:0073
|
Red Hat Security Advisory: java-1.5.0-ibm security update
|
openssl signature forgery security flaw security flaw security flaw security flaw
|
[
"cpe:/a:redhat:rhel_extras:4"
] | null | null | null | null |
RHSA-2022:6287
|
Red Hat Security Advisory: OpenShift Container Platform 4.11.3 packages and security update
|
golang: out-of-bounds read in golang.org/x/text/language leads to DoS
|
[
"cpe:/a:redhat:openshift:4.11::el8"
] | null | 7.5 | null | null |
RHSA-2024:1827
|
Red Hat Security Advisory: OpenJDK 21.0.3 Security Update for Windows Builds
|
OpenJDK: long Exception message leading to crash (8319851) OpenJDK: HTTP/2 client improper reverse DNS lookup (8315708) OpenJDK: integer overflow in C1 compiler address generation (8322122)
|
[
"cpe:/a:redhat:openjdk:21::windows"
] | null | 3.7 | null | null |
RHSA-2024:7622
|
Red Hat Security Advisory: firefox security update
|
firefox: Clipboard write permission bypass firefox: thunderbird: Compromised content process can bypass site isolation firefox: thunderbird: Cross-origin access to PDF contents through multipart responses firefox: thunderbird: Cross-origin access to JSON contents through multipart responses firefox: thunderbird: Potential memory corruption may occur when cloning certain objects firefox: thunderbird: Potential directory upload bypass via clickjacking firefox: thunderbird: External protocol handlers could be enumerated via popups firefox: thunderbird: Specially crafted WebTransport requests could lead to denial of service firefox: thunderbird: Potential memory corruption during JIT compilation firefox: thunderbird: Memory safety bugs fixed in Firefox 131, Firefox ESR 115.16, Firefox ESR 128.3, Thunderbird 131, and Thunderbird 128.3 firefox: thunderbird: Memory safety bugs fixed in Firefox 131, Firefox ESR 128.3, Thunderbird 131, and Thunderbird 128.3 firefox: thunderbird: Memory safety bugs fixed in Firefox 131 and Thunderbird 131
|
[
"cpe:/a:redhat:rhel_eus:9.2::appstream"
] | null | 7.5 | null | null |
RHSA-2014:0590
|
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 5.2.0 security update
|
Xalan-Java: insufficient constraints in secure processing feature
|
[
"cpe:/a:redhat:jboss_enterprise_application_platform:5.2.0"
] | null | null | null | null |
RHSA-2024:0977
|
Red Hat Security Advisory: unbound security update
|
bind9: KeyTrap - Extreme CPU consumption in DNSSEC validator bind9: Preparing an NSEC3 closest encloser proof can exhaust CPU resources
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::crb"
] | null | 7.5 | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.