id
stringlengths 13
15
| title
stringlengths 29
176
| description
stringlengths 8
32.1k
| cpes
listlengths 0
20
| cvss_v4_0
null | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
null |
---|---|---|---|---|---|---|---|
RHSA-2020:4453
|
Red Hat Security Advisory: vim security update
|
vim: users can execute arbitrary OS commands via scripting interfaces in the rvim restricted mode
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 5.3 | null | null |
RHSA-2022:1715
|
Red Hat Security Advisory: Red Hat Advanced Cluster Management 2.3.10 security updates and bug fixes
|
follow-redirects: Exposure of Private Personal Information to an Unauthorized Actor node-fetch: exposure of sensitive information to an unauthorized actor follow-redirects: Exposure of Sensitive Information via Authorization Header leak urijs: Authorization Bypass Through User-Controlled Key nconf: Prototype pollution in memory store urijs: Leading white space bypasses protocol validation Moment.js: Path traversal in moment.locale
|
[
"cpe:/a:redhat:acm:2.3::el7",
"cpe:/a:redhat:acm:2.3::el8"
] | null | 7.5 | null | null |
RHSA-2015:0134
|
Red Hat Security Advisory: java-1.7.0-ibm security update
|
OpenJDK: incorrect class loader permission check in ClassLoader getParent() (Libraries, 8055314) ICU: font parsing OOB read (OpenJDK 2D, 8055489) OpenJDK: MulticastSocket NULL pointer dereference (Libraries, 8056264) ICU: font parsing OOB read (OpenJDK 2D, 8056276) OpenJDK: incorrect tracking of ChangeCipherSpec during SSL/TLS handshake (JSSE, 8057555) JDK: unspecified full Java sandbox bypass fixed in Feb 2015 update JDK: unspecified partial Java sandbox bypass fixed in Feb 2015 update JDK: unspecified vulnerability fixed in 6u91, 7u75 and 8u31 (Deployment) JDK: unspecified vulnerability fixed in 6u91, 7u75 and 8u31 (Deployment) OpenJDK: directory information leak via file chooser (Swing, 8055304) OpenJDK: incorrect context class loader use in RMI transport (RMI, 8055309) OpenJDK: DER decoder infinite loop (Security, 8059485) OpenJDK: insufficient code privileges checks (JAX-WS, 8054367)
|
[
"cpe:/a:redhat:rhel_extras:5::client",
"cpe:/a:redhat:rhel_extras:5::server"
] | null | null | null | null |
RHSA-2024:5481
|
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 8.0.3 Security update
|
cxf-core: Apache CXF SSRF Vulnerability using the Aegis databinding netty-codec-http: Allocation of Resources Without Limits or Throttling org.bouncycastle: Importing an EC certificate with crafted F2m parameters may lead to Denial of Service bc-java: BouncyCastle vulnerable to a timing variant of Bleichenbacher (Marvin Attack) org.bouncycastle:bcprov-jdk18on: Infinite loop in ED25519 verification in the ScalarUtil class
|
[
"cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el9"
] | null | 7.5 | null | null |
RHSA-2012:0451
|
Red Hat Security Advisory: rpm security update
|
rpm: insufficient validation of region tags rpm: improper validation of header contents total size in headerLoad() rpm: incorrect handling of negated offsets in headerVerifyInfo()
|
[
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server",
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation",
"cpe:/o:redhat:rhel_els:3::as",
"cpe:/o:redhat:rhel_els:3::es",
"cpe:/o:redhat:rhel_els:4::as",
"cpe:/o:redhat:rhel_els:4::es",
"cpe:/o:redhat:rhel_eus:5.6",
"cpe:/o:redhat:rhel_eus:6.0",
"cpe:/o:redhat:rhel_eus:6.1",
"cpe:/o:redhat:rhel_mission_critical:5.3"
] | null | null | null | null |
RHSA-2021:2437
|
Red Hat Security Advisory: OpenShift Container Platform 4.8.2 packages and security update
|
golang: crypto/elliptic: incorrect operations on the P-224 curve gogo/protobuf: plugin/unmarshal/unmarshal.go lacks certain index validation openshift: Injected service-ca.crt incorrectly contains additional internal CAs python-eventlet: improper handling of highly compressed data and memory allocation with excessive size allows DoS jenkins-2-plugins/matrix-auth: Incorrect permission checks in Matrix Authorization Strategy Plugin jenkins: lack of type validation in agent related REST API jenkins: view name validation bypass jenkins-2-plugins/credentials: Reflected XSS vulnerability in Credentials Plugin kubernetes: Validating Admission Webhook does not observe some previous fields kubernetes: Holes in EndpointSlice Validation Enable Host Network Hijack
|
[
"cpe:/a:redhat:openshift:4.8::el7",
"cpe:/a:redhat:openshift:4.8::el8"
] | null | 2.7 | null | null |
RHSA-2017:1451
|
Red Hat Security Advisory: python-django security update
|
python-django: Open redirect and possible XSS attack via user-supplied numeric redirect URLs
|
[
"cpe:/a:redhat:openstack:7::el7"
] | null | null | 6.1 | null |
RHBA-2018:1816
|
Red Hat Bug Fix Advisory: OpenShift Container Platform 3.10 RPM Release Advisory
|
jenkins: CLI leaked existence of views and agents with attacker-specified names to users without Overall/Read permission (SECURITY-754)
|
[
"cpe:/a:redhat:openshift:3.10::el7"
] | null | null | 3.7 | null |
RHSA-2017:1162
|
Red Hat Security Advisory: python27 security, bug fix, and enhancement update
|
python: failure to validate certificates in the HTTP client with TLS (PEP 476)
|
[
"cpe:/a:redhat:rhel_software_collections:2::el6",
"cpe:/a:redhat:rhel_software_collections:2::el7"
] | null | null | 4.7 | null |
RHSA-2024:10879
|
Red Hat Security Advisory: postgresql:13 security update
|
postgresql: PostgreSQL PL/Perl environment variable changes execute arbitrary code
|
[
"cpe:/a:redhat:rhel_eus:9.2::appstream",
"cpe:/a:redhat:rhel_eus:9.2::crb"
] | null | 8.8 | null | null |
RHSA-2012:1438
|
Red Hat Security Advisory: Red Hat Enterprise Virtualization 2 End of Life Extension
|
This is the Red Hat Enterprise Virtualization 2 End Of Life Extension
notification.
|
[] | null | null | null | null |
RHSA-2025:2221
|
Red Hat Security Advisory: Red Hat Product OCP Tools 4.14 Openshift Jenkins security update
|
com.thoughtworks.xstream: XStream is vulnerable to a Denial of Service attack due to stack overflow from a manipulated binary input stream json-lib: Mishandling of an unbalanced comment string in json-lib jenkins-plugin/script-security: Jenkins Script Security Plugin File Disclosure Vulnerability jenkins-plugin/workflow-cps: Lack of Approval Check for Rebuilt Jenkins Pipelines jenkins-plugin/pipeline-model-definition: Jenkins Pipeline Declarative Plugin Allows Restart of Builds with Unapproved Jenkinsfile
|
[
"cpe:/a:redhat:ocp_tools:4.14::el8"
] | null | 8 | null | null |
RHSA-2019:3292
|
Red Hat Security Advisory: Red Hat Decision Manager 7.5.0 Security Update
|
jackson-databind: failure to block the logback-core class from polymorphic deserialization leading to remote code execution jackson-databind: polymorphic typing issue allows attacker to read arbitrary local files on the server via crafted JSON message. jackson-databind: default typing mishandling leading to remote code execution
|
[
"cpe:/a:redhat:jboss_enterprise_brms_platform:7.5"
] | null | null | 9.8 | null |
RHSA-2024:1108
|
Red Hat Security Advisory: gnutls security update
|
gnutls: incomplete fix for CVE-2023-5981
|
[
"cpe:/a:redhat:rhel_eus:8.6::appstream",
"cpe:/o:redhat:rhel_eus:8.6::baseos"
] | null | 7.5 | null | null |
RHSA-2024:5633
|
Red Hat Security Advisory: fence-agents security update
|
urllib3: proxy-authorization request header is not stripped during cross-origin redirects
|
[
"cpe:/a:redhat:rhel_eus:9.2::appstream",
"cpe:/a:redhat:rhel_eus:9.2::highavailability",
"cpe:/a:redhat:rhel_eus:9.2::resilientstorage"
] | null | 4.4 | null | null |
RHSA-2023:7626
|
Red Hat Security Advisory: Red Hat JBoss Core Services Apache HTTP Server 2.4.57 SP2 security update
|
openssl: Denial of service by excessive resource usage in verifying X509 policy constraints openssl: Invalid certificate policies in leaf certificates are silently ignored openssl: Certificate policy check not enabled openssl: Possible DoS translating ASN.1 object identifiers openssl: Excessive time spent checking DH keys and parameters OpenSSL: Excessive time spent checking DH q parameter value curl: out of heap memory issue due to missing limit on header quantity curl: heap based buffer overflow in the SOCKS5 proxy handshake curl: cookie injection with none file libxml2: crafted xml can cause global buffer overflow httpd: Apache Tomcat Connectors (mod_jk) Information Disclosure mod_http2: reset requests exhaust memory (incomplete fix of CVE-2023-44487) zlib: integer overflow and resultant heap-based buffer overflow in zipOpenNewFileInZip4_6
|
[
"cpe:/a:redhat:jboss_core_services:1"
] | null | 5.3 | null | null |
RHSA-2004:546
|
Red Hat Security Advisory: cyrus-sasl security update
|
security flaw
|
[
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws"
] | null | null | null | null |
RHSA-2012:0142
|
Red Hat Security Advisory: firefox security update
|
libpng: Heap buffer overflow in png_decompress_chunk (MFSA 2012-11)
|
[
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2010:0110
|
Red Hat Security Advisory: mysql security update
|
mysql: incomplete upstream fix for CVE-2008-2079 mysql: mysql command line client XSS flaw MySQL: Format string vulnerability by manipulation with database instances (crash) mysql: Incomplete fix for CVE-2008-2079 / CVE-2008-4098
|
[
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2018:1200
|
Red Hat Security Advisory: patch security update
|
patch: Malicious patch files cause ed to execute arbitrary commands
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 7.8 | null |
RHSA-2024:0427
|
Red Hat Security Advisory: libtasn1 security update
|
libtasn1: Out-of-bound access in ETYPE_OK
|
[
"cpe:/a:redhat:rhel_eus:8.6::appstream",
"cpe:/o:redhat:rhel_eus:8.6::baseos"
] | null | 5.9 | null | null |
RHSA-2003:003
|
Red Hat Security Advisory: kdelibs security update
|
security flaw
|
[
"cpe:/o:redhat:enterprise_linux:2.1::as",
"cpe:/o:redhat:enterprise_linux:2.1::aw"
] | null | null | null | null |
RHSA-2005:583
|
Red Hat Security Advisory: dump security update
|
security flaw
|
[
"cpe:/o:redhat:enterprise_linux:2.1::as",
"cpe:/o:redhat:enterprise_linux:2.1::aw",
"cpe:/o:redhat:enterprise_linux:2.1::es",
"cpe:/o:redhat:enterprise_linux:2.1::ws"
] | null | null | null | null |
RHSA-2009:1144
|
Red Hat Security Advisory: JBoss Enterprise Application Platform 4.2.0.CP07 update
|
tomcat request dispatcher information disclosure vulnerability tomcat6 Information disclosure in authentication classes tomcat XML parser information disclosure
|
[
"cpe:/a:redhat:jboss_enterprise_application_platform:4.2.0::el4"
] | null | null | null | null |
RHSA-2020:2320
|
Red Hat Security Advisory: rh-maven35-jackson-databind security update
|
jackson-databind: Serialization gadgets in org.springframework:spring-aop jackson-databind: Serialization gadgets in commons-jelly:commons-jelly
|
[
"cpe:/a:redhat:rhel_software_collections:3::el7"
] | null | 8.1 | null | null |
RHSA-2022:9069
|
Red Hat Security Advisory: firefox security update
|
Mozilla: Arbitrary file read from a compromised content process Mozilla: Drag and Dropped Filenames could have been truncated to malicious extensions Mozilla: Memory safety bugs fixed in Firefox ESR 102.6 and Thunderbird 102.6 Mozilla: Use-after-free in WebGL Mozilla: Memory corruption in WebGL Mozilla: Use-after-free in WebGL
|
[
"cpe:/a:redhat:rhel_eus:8.4::appstream"
] | null | 8.1 | null | null |
RHSA-2009:1067
|
Red Hat Security Advisory: Red Hat Application Stack v2.3 security and enhancement update
|
MySQL: Using an empty binary value leads to server crash mysql: incomplete upstream fix for CVE-2008-2079 perl-DBD-Pg: pg_getline buffer overflow postgresql: potential DoS due to conversion functions perl-DBD-Pg: dequote_bytea memory leak
|
[
"cpe:/a:redhat:rhel_application_stack:2"
] | null | null | null | null |
RHSA-2020:3266
|
Red Hat Security Advisory: kernel-rt security and bug fix update
|
kernel: Count overflow in FUSE request leading to use-after-free issues.
|
[
"cpe:/a:redhat:enterprise_mrg:2:server:el6"
] | null | null | 7.8 | null |
RHSA-2020:3749
|
Red Hat Security Advisory: librepo security update
|
librepo: missing path validation in repomd.xml may lead to directory traversal
|
[
"cpe:/o:redhat:rhel_eus:8.1::baseos"
] | null | 8 | null | null |
RHSA-2025:1665
|
Red Hat Security Advisory: bind security update
|
bind: bind9: Many records in the additional section cause CPU exhaustion
|
[
"cpe:/a:redhat:rhel_eus:9.2::appstream",
"cpe:/a:redhat:rhel_eus:9.2::crb"
] | null | 7.5 | null | null |
RHSA-2024:5444
|
Red Hat Security Advisory: OpenShift Container Platform 4.13.48 bug fix and security update
|
golang: net/http: golang: mime/multipart: golang: net/textproto: memory exhaustion in Request.ParseMultipartForm go-retryablehttp: url might write sensitive information to log file openssh: Possible remote code execution due to a race condition in signal handling affecting Red Hat Enterprise Linux 9 golang: net/netip: Unexpected behavior from Is methods for IPv4-mapped IPv6 addresses kernel: net: kernel: UAF in network route management
|
[
"cpe:/a:redhat:openshift:4.13::el8",
"cpe:/a:redhat:openshift:4.13::el9"
] | null | 7.8 | null | null |
RHSA-2005:803
|
Red Hat Security Advisory: lynx security update
|
CAN-2005-3120 lynx buffer overflow
|
[
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws",
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2009:1146
|
Red Hat Security Advisory: JBoss Enterprise Application Platform 4.3.0.CP05 update
|
tomcat request dispatcher information disclosure vulnerability tomcat6 Information disclosure in authentication classes tomcat XML parser information disclosure
|
[
"cpe:/a:redhat:jboss_enterprise_application_platform:4.3.0::el4"
] | null | null | null | null |
RHSA-2014:0798
|
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 6.2.4 update
|
CXF: The SecurityTokenService accepts certain invalid SAML Tokens as valid CXF: UsernameTokens are sent in plaintext with a Symmetric EncryptBeforeSigning policy CXF: HTML content posted to SOAP endpoint could cause OOM errors CXF: Large invalid content could cause temporary space to fill JAX-RS: Information disclosure via XML eXternal Entity (XXE)
|
[
"cpe:/a:redhat:jboss_enterprise_application_platform:6::el5"
] | null | null | null | null |
RHSA-2024:0622
|
Red Hat Security Advisory: firefox security update
|
Mozilla: Out of bounds write in ANGLE Mozilla: Failure to update user input timestamp Mozilla: Crash when listing printers on Linux Mozilla: Bypass of Content Security Policy when directive unsafe-inline was set Mozilla: Phishing site popup could show local origin in address bar Mozilla: Potential permissions request bypass via clickjacking Mozilla: Privilege escalation through devtools Mozilla: HSTS policy on subdomain could bypass policy of upper domain Mozilla: Memory safety bugs fixed in Firefox 122, Firefox ESR 115.7, and Thunderbird 115.7
|
[
"cpe:/a:redhat:rhel_eus:8.6::appstream"
] | null | 8.8 | null | null |
RHSA-2022:1797
|
Red Hat Security Advisory: compat-exiv2-026 security update
|
exiv2: stack exhaustion issue in the printIFDStructure function may lead to DoS
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 6.5 | null | null |
RHSA-2023:1703
|
Red Hat Security Advisory: kernel security and bug fix update
|
kernel: FUSE filesystem low-privileged user privileges escalation
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::crb",
"cpe:/o:redhat:enterprise_linux:9::baseos"
] | null | 7 | null | null |
RHSA-2010:0429
|
Red Hat Security Advisory: postgresql security update
|
postgresql: SQL privilege escalation via modifications to session-local state postgresql: substring() negative length argument buffer overflow postgresql: Integer overflow in hash table size calculation PostgreSQL: PL/Perl Intended restriction bypass PostgreSQL: PL/Tcl Intended restriction bypass postgresql: improper privilege check during certain RESET ALL operations
|
[
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2013:0749
|
Red Hat Security Advisory: apache-cxf security update
|
apache-cxf: Bypass of security constraints on WS endpoints when using WSS4JInInterceptor apache-cxf: UsernameTokenPolicyValidator and UsernameTokenInterceptor allow empty passwords to authenticate
|
[
"cpe:/a:redhat:jboss_enterprise_portal_platform:6.0"
] | null | null | null | null |
RHSA-2017:1124
|
Red Hat Security Advisory: chromium-browser security update
|
chromium-browser: type confusion in pdfium chromium-browser: heap use after free in print preview chromium-browser: type confusion in blink chromium-browser: url spoofing in omnibox chromium-browser: url spoofing in omnibox chromium-browser: use after free in chrome apps chromium-browser: heap overflow in skia chromium-browser: use after free in blink chromium-browser: incorrect ui in blink chromium-browser: incorrect signature handing in networking chromium-browser: url spoofing in omnibox chromium-browser: cross-origin bypass in blink
|
[
"cpe:/a:redhat:rhel_extras:6"
] | null | null | 4.2 | null |
RHSA-2022:0511
|
Red Hat Security Advisory: firefox security update
|
Mozilla: Extensions could have bypassed permission confirmation during update Mozilla: Drag and dropping an image could have resulted in the dropped object being an executable Mozilla: Sandboxed iframes could have executed script if the parent appended elements Mozilla: Cross-Origin responses could be distinguished between script and non-script content-types Mozilla: frame-ancestors Content Security Policy directive was not enforced for framed extension pages Mozilla: Script Execution during invalid object state Mozilla: Memory safety bugs fixed in Firefox 97 and Firefox ESR 91.6
|
[
"cpe:/a:redhat:rhel_eus:8.4::appstream"
] | null | 8.8 | null | null |
RHSA-2014:0580
|
Red Hat Security Advisory: openstack-keystone security and bug fix update
|
openstack-keystone: trustee token revocation does not work with memcache backend
|
[
"cpe:/a:redhat:openstack:4::el6"
] | null | null | null | null |
RHSA-2004:031
|
Red Hat Security Advisory: netpbm security update
|
security flaw
|
[
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws"
] | null | null | null | null |
RHSA-2022:5530
|
Red Hat Security Advisory: squid:4 security update
|
squid: DoS when processing gopher server responses
|
[
"cpe:/a:redhat:rhel_e4s:8.1::appstream"
] | null | 7.5 | null | null |
RHSA-2021:3631
|
Red Hat Security Advisory: OpenShift Container Platform 4.8.13 security update
|
kubernetes: Symlink exchange can allow host filesystem access
|
[
"cpe:/a:redhat:openshift:4.8::el7",
"cpe:/a:redhat:openshift:4.8::el8"
] | null | 8.8 | null | null |
RHSA-2013:0544
|
Red Hat Security Advisory: Subscription Asset Manager 1.2 update
|
Katello: /etc/katello/secure/passphrase is world readable Katello: lack of authorization in proxies_controller.rb rubygem-rack: parsing Content-Disposition header DoS rubygem-ruby_parser: incorrect temporary file usage rubygem-rack: receiving excessively long lines triggers out-of-memory error rubygem-rack: Rack::Auth:: AbstractRequest DoS
|
[
"cpe:/a:rhel_sam:1.2::el6"
] | null | null | null | null |
RHSA-2024:4408
|
Red Hat Security Advisory: tpm2-tss security update
|
tpm2-tss: Buffer Overlow in TSS2_RC_Decode
|
[
"cpe:/o:redhat:rhel_aus:8.6::baseos",
"cpe:/o:redhat:rhel_e4s:8.6::baseos",
"cpe:/o:redhat:rhel_tus:8.6::baseos"
] | null | 6.4 | null | null |
RHSA-2023:6817
|
Red Hat Security Advisory: OpenShift Virtualization 4.14.0 Images security and bug fix update
|
mongo-go-driver: specific cstrings input may not be properly validated golang: crypto/tls: large handshake records may cause panics golang: net/http, mime/multipart: denial of service from excessive resource consumption containerd: OCI image importer memory exhaustion containerd: Supplementary groups are not set up properly golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487) HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack)
|
[
"cpe:/a:redhat:container_native_virtualization:4.14::el9"
] | null | 7.5 | null | null |
RHSA-2019:3895
|
Red Hat Security Advisory: sudo security update
|
sudo: Privilege escalation via 'Runas' specification with 'ALL' keyword
|
[
"cpe:/o:redhat:rhel_aus:6.5::server"
] | null | null | 7 | null |
RHSA-2024:8974
|
Red Hat Security Advisory: Red Hat Advanced Cluster Management 2.12.0 security and bug fixes
|
goproxy: Denial of service (DoS) via unspecified vectors. grafana: Improper priviledge managent for users with data source permissions jose-go: improper handling of highly compressed data elliptic: Missing Validation in Elliptic's EDDSA Signature Verification
|
[
"cpe:/a:redhat:acm:2.12::el9"
] | null | 8.2 | null | null |
RHSA-2024:1999
|
Red Hat Security Advisory: postgresql-jdbc security update
|
pgjdbc: PostgreSQL JDBC Driver allows attacker to inject SQL if using PreferQueryMode=SIMPLE
|
[
"cpe:/a:redhat:rhel_eus:9.0::appstream"
] | null | 9.8 | null | null |
RHSA-2014:0831
|
Red Hat Security Advisory: Red Hat Developer Toolset Version 1 Retirement Notice
|
This is the final notification for the retirement of Red Hat Developer
Toolset Version 1. This notification applies only to those customers with
subscriptions for Red Hat Developer Toolset Version 1.
|
[] | null | null | null | null |
RHSA-2024:9677
|
Red Hat Security Advisory: squid security update
|
squid: Denial of Service processing ESI response content
|
[
"cpe:/a:redhat:rhel_eus:9.2::appstream"
] | null | 7.5 | null | null |
RHSA-2020:5182
|
Red Hat Security Advisory: microcode_ctl security, bug fix and enhancement update
|
hw: Information disclosure issue in Intel SGX via RAPL interface hw: Vector Register Leakage-Active hw: Fast forward store predictor
|
[
"cpe:/o:redhat:rhel_aus:7.4::server",
"cpe:/o:redhat:rhel_e4s:7.4::server",
"cpe:/o:redhat:rhel_tus:7.4::server"
] | null | 5.5 | null | null |
RHSA-2012:1200
|
Red Hat Security Advisory: rhev-hypervisor6 security and bug fix update
|
glibc: incorrect size calculation in formatted printing can lead to FORTIFY_SOURCE format string protection bypass glibc: incorrect use of extend_alloca() in formatted printing can lead to FORTIFY_SOURCE format string protection bypass glibc: printf() unbound alloca() usage in case of positional parameters + many format specs
|
[
"cpe:/o:redhat:enterprise_linux:6::hypervisor"
] | null | null | null | null |
RHSA-2024:1412
|
Red Hat Security Advisory: gmp update
|
gmp: Integer overflow and resultant buffer overflow via crafted input
|
[
"cpe:/o:redhat:rhel_eus:8.8::baseos"
] | null | 6.2 | null | null |
RHSA-2018:3242
|
Red Hat Security Advisory: glusterfs security, bug fix, and enhancement update
|
glusterfs: Improper deserialization in dict.c:dict_unserialize() can allow attackers to read arbitrary memory
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 6.5 | null |
RHSA-2024:8494
|
Red Hat Security Advisory: pki-servlet-engine security update
|
tomcat: Denial of Service in Tomcat
|
[
"cpe:/a:redhat:rhel_eus:9.2::appstream"
] | null | 7.5 | null | null |
RHSA-2007:0559
|
Red Hat Security Advisory: cman security update
|
possible buffer overflow could cause local DoS by crashing cman
|
[
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2020:3271
|
Red Hat Security Advisory: grub2 security and bug fix update
|
grub2: Crafted grub.cfg file can lead to arbitrary code execution during boot process grub2: grub_malloc does not validate allocation size allowing for arithmetic overflow and subsequent heap-based buffer overflow grub2: Integer overflow in grub_squash_read_symlink may lead to heap-based buffer overflow grub2: Integer overflow read_section_as_string may lead to heap-based buffer overflow grub2: Integer overflow in grub_ext2_read_link leads to heap-based buffer overflow grub2: Fail kernel validation without shim protocol grub2: Use-after-free redefining a function whilst the same function is already executing grub2: Integer overflow in initrd size handling
|
[
"cpe:/o:redhat:rhel_eus:7.6::computenode",
"cpe:/o:redhat:rhel_eus:7.6::server"
] | null | 5.7 | null | null |
RHSA-2012:1053
|
Red Hat Security Advisory: mod_cluster security update
|
mod_cluster registers and exposes the root context of a server by default, despite ROOT being in the excluded-contexts list
|
[
"cpe:/a:redhat:jboss_enterprise_web_platform:5::el4",
"cpe:/a:redhat:jboss_enterprise_web_platform:5::el5",
"cpe:/a:redhat:jboss_enterprise_web_platform:5::el6"
] | null | null | null | null |
RHSA-2025:3622
|
Red Hat Security Advisory: python-jinja2 security update
|
jinja2: Jinja sandbox breakout through attr filter selecting format method
|
[
"cpe:/a:redhat:rhel_aus:8.6::appstream",
"cpe:/a:redhat:rhel_e4s:8.6::appstream",
"cpe:/a:redhat:rhel_tus:8.6::appstream"
] | null | 7.3 | null | null |
RHSA-2023:5716
|
Red Hat Security Advisory: Red Hat Data Grid 8.4.5 security update
|
HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack)
|
[
"cpe:/a:redhat:jboss_data_grid:8"
] | null | 7.5 | null | null |
RHSA-2021:2500
|
Red Hat Security Advisory: Red Hat OpenShift Enterprise security and bug fix update
|
nodejs-handlebars: lookup helper fails to properly validate templates allowing for arbitrary JavaScript execution nodejs-handlebars: an endless loop while processing specially-crafted templates leads to DoS nodejs-handlebars: Remote code execution when compiling untrusted compile templates with strict:true option nodejs-handlebars: Remote code execution when compiling untrusted compile templates with compat:true option
|
[
"cpe:/a:redhat:openshift:4.6::el8"
] | null | 9.8 | null | null |
RHSA-2024:5294
|
Red Hat Security Advisory: jose security update
|
jose: Denial of service due to uncontrolled CPU consumption jose: resource exhaustion
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 5.3 | null | null |
RHSA-2024:0964
|
Red Hat Security Advisory: thunderbird security update
|
Mozilla: Out-of-bounds memory read in networking channels Mozilla: Alert dialog could have been spoofed on another site Mozilla: Fullscreen Notification could have been hidden by select element Mozilla: Custom cursor could obscure the permission dialog Mozilla: Mouse cursor re-positioned unexpectedly could have led to unintended permission grants Mozilla: Multipart HTTP Responses would accept the Set-Cookie header in response parts Mozilla: Incorrect code generation on 32-bit ARM devices Mozilla: Memory safety bugs fixed in Firefox 123, Firefox ESR 115.8, and Thunderbird 115.8
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 7.5 | null | null |
RHSA-2021:0489
|
Red Hat Security Advisory: Red Hat JBoss Web Server 3.1 Service Pack 11 security update
|
openssl: EDIPARTYNAME NULL pointer de-reference
|
[
"cpe:/a:redhat:jboss_enterprise_web_server:3.1::el7"
] | null | 5.9 | null | null |
RHSA-2003:163
|
Red Hat Security Advisory: mozilla security update
|
security flaw
|
[
"cpe:/o:redhat:enterprise_linux:2.1::as",
"cpe:/o:redhat:enterprise_linux:2.1::aw",
"cpe:/o:redhat:enterprise_linux:2.1::es",
"cpe:/o:redhat:enterprise_linux:2.1::ws"
] | null | null | null | null |
RHSA-2021:2780
|
Red Hat Security Advisory: OpenJDK 11.0.12 Security Update for Portable Linux Builds
|
OpenJDK: FTP PASV command response can cause FtpClient to connect to arbitrary host (Networking, 8258432) OpenJDK: Incorrect verification of JAR files with multiple MANIFEST.MF files (Library, 8260967) OpenJDK: Incorrect comparison during range check elimination (Hotspot, 8264066)
|
[
"cpe:/a:redhat:openjdk:11.0.12"
] | null | 7.5 | null | null |
RHSA-2018:3423
|
Red Hat Security Advisory: qemu-kvm security update
|
hw: cpu: speculative store bypass
|
[
"cpe:/o:redhat:rhel_aus:7.2::server",
"cpe:/o:redhat:rhel_e4s:7.2::server",
"cpe:/o:redhat:rhel_tus:7.2::server"
] | null | null | 5.6 | null |
RHEA-2013:1031
|
Red Hat Enhancement Advisory: Red Hat OpenShift Enterprise 1.2 Infrastructure Release Advisory
|
OpenShift Enterprise and Online vulnerable to CSRF attack with REST API
|
[
"cpe:/a:redhat:openshift:1.2::el6"
] | null | null | null | null |
RHSA-2021:1610
|
Red Hat Security Advisory: curl security and bug fix update
|
curl: Expired pointer dereference via multi API with CURLOPT_CONNECT_ONLY option set curl: FTP PASV command response can cause curl to connect to arbitrary host curl: Malicious FTP server can trigger stack overflow when CURLOPT_CHUNK_BGN_FUNCTION is used curl: Inferior OCSP verification
|
[
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 7.4 | null | null |
RHSA-2013:0508
|
Red Hat Security Advisory: sssd security, bug fix and enhancement update
|
sssd: TOCTOU race conditions by copying and removing directory trees sssd: Out-of-bounds read flaws in autofs and ssh services responders
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2018:2164
|
Red Hat Security Advisory: kernel security and bug fix update
|
hw: cpu: speculative store bypass Kernel: FPU state information leakage via lazy FPU restore kernel: mm: use-after-free in do_get_mempolicy function allows local DoS or other unspecified impact kernel: error in exception handling leads to DoS (CVE-2018-8897 regression)
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | 6.5 | null |
RHSA-2020:2954
|
Red Hat Security Advisory: .NET Core 3.1 security and bugfix update
|
dotnet: XML source markup processing remote code execution
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 8.8 | null | null |
RHSA-2024:5392
|
Red Hat Security Advisory: thunderbird security update
|
mozilla: Fullscreen notification dialog can be obscured by document content mozilla: Out of bounds memory access in graphics shared memory handling mozilla: Type confusion in WebAssembly mozilla: Incomplete WebAssembly exception handing mozilla: Out of bounds read in editor component mozilla: Missing permission check when creating a StreamFilter mozilla: Uninitialized memory used by WebGL mozilla: Use-after-free in JavaScript garbage collection mozilla: Use-after-free in IndexedDB mozilla: Document content could partially obscure security prompts
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 6.1 | null | null |
RHSA-2008:0243
|
Red Hat Security Advisory: java-1.4.2-bea security update
|
Untrusted applet and application XSLT processing privilege escalation
|
[
"cpe:/a:redhat:rhel_extras:3",
"cpe:/a:redhat:rhel_extras:5::client",
"cpe:/a:redhat:rhel_extras:5::server"
] | null | null | null | null |
RHSA-2018:2825
|
Red Hat Security Advisory: rh-perl526-mod_perl security update
|
mod_perl: arbitrary Perl code execution in the context of the user account via a user-owned .htaccess
|
[
"cpe:/a:redhat:rhel_software_collections:3::el7"
] | null | null | 6.3 | null |
RHSA-2024:1574
|
Red Hat Security Advisory: OpenShift Container Platform 4.12.54 packages and security update
|
golang-fips/openssl: Memory leaks in code encrypting and decrypting RSA payloads golang-protobuf: encoding/protojson, internal/encoding/json: infinite loop in protojson.Unmarshal when unmarshaling certain forms of invalid JSON jose-go: improper handling of highly compressed data
|
[
"cpe:/a:redhat:openshift:4.12::el8",
"cpe:/a:redhat:openshift:4.12::el9"
] | null | 4.3 | null | null |
RHSA-2024:6827
|
Red Hat Security Advisory: OpenShift Container Platform 4.16.14 security update
|
webob: WebOb's location header normalization during redirect leads to open redirect
|
[
"cpe:/a:redhat:openshift:4.16::el8",
"cpe:/a:redhat:openshift:4.16::el9",
"cpe:/a:redhat:openshift_ironic:4.16::el9"
] | null | 6.1 | null | null |
RHSA-2016:1883
|
Red Hat Security Advisory: kernel-rt security and bug fix update
|
kernel: netfilter: missing bounds check in ipt_entry structure kernel: compat IPT_SO_SET_REPLACE setsockopt kernel: out of bounds reads when processing IPT_SO_SET_REPLACE setsockopt
|
[
"cpe:/a:redhat:enterprise_mrg:2:server:el6"
] | null | null | 6.1 | null |
RHSA-2021:2418
|
Red Hat Security Advisory: dhcp security update
|
dhcp: stack-based buffer overflow when parsing statements with colon-separated hex digits in config or lease files in dhcpd and dhclient
|
[
"cpe:/o:redhat:rhel_aus:7.2::server"
] | null | 8.8 | null | null |
RHSA-2023:1980
|
Red Hat Security Advisory: kernel-rt security and bug fix update
|
kernel: FUSE filesystem low-privileged user privileges escalation
|
[
"cpe:/a:redhat:rhel_eus:9.0::nfv",
"cpe:/a:redhat:rhel_eus:9.0::realtime"
] | null | 7 | null | null |
RHSA-2020:1545
|
Red Hat Security Advisory: OpenShift Container Platform 4.1.41 openshift-enterprise-ansible-operator-container security update
|
openshift/ocp-release-operator-sdk: /etc/passwd is given incorrect privileges
|
[
"cpe:/a:redhat:openshift:4.1::el7"
] | null | 7 | null | null |
RHSA-2009:1040
|
Red Hat Security Advisory: ntp security update
|
ntp: buffer overflow in ntpq ntp: remote arbitrary code execution vulnerability if autokeys is enabled
|
[
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws",
"cpe:/o:redhat:rhel_eus:4.7::as",
"cpe:/o:redhat:rhel_eus:4.7::es"
] | null | null | null | null |
RHSA-2019:1188
|
Red Hat Security Advisory: qemu-kvm security update
|
hardware: Microarchitectural Store Buffer Data Sampling (MSBDS) hardware: Micro-architectural Load Port Data Sampling - Information Leak (MLPDS) hardware: Microarchitectural Fill Buffer Data Sampling (MFBDS) hardware: Microarchitectural Data Sampling Uncacheable Memory (MDSUM)
|
[
"cpe:/o:redhat:rhel_aus:7.2::server",
"cpe:/o:redhat:rhel_e4s:7.2::server",
"cpe:/o:redhat:rhel_tus:7.2::server"
] | null | null | 3.8 | null |
RHSA-2010:0473
|
Red Hat Security Advisory: vdsm security, bug fix, and enhancement update
|
vdsm: missing VM post-zeroing after removal
|
[
"cpe:/a:redhat:enterprise_linux:5::hypervisor"
] | null | null | null | null |
RHSA-2020:1926
|
Red Hat Security Advisory: container-tools:1.0 security and bug fix update
|
buildah: Crafted input tar file may lead to local file overwrite during image build process
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 8.8 | null | null |
RHSA-2008:0004
|
Red Hat Security Advisory: apache security update
|
mod_autoindex XSS httpd: mod_imagemap XSS apache mod_status cross-site scripting mod_proxy_ftp XSS
|
[
"cpe:/o:redhat:enterprise_linux:2.1::as",
"cpe:/o:redhat:enterprise_linux:2.1::aw",
"cpe:/o:redhat:enterprise_linux:2.1::es",
"cpe:/o:redhat:enterprise_linux:2.1::ws"
] | null | null | null | null |
RHSA-2013:0545
|
Red Hat Security Advisory: CloudForms Cloud Engine 1.1.2 update
|
aeolus-configserver: aeolus-configserver-setup /tmp file conductor credentials leak Configserver: Passwords from application blueprint stored plaintext in configserver.log Conductor: Unprivileged user can change their own Maximum Running Instances quota
|
[
"cpe:/a:cloudforms_cloudengine:1::el6"
] | null | null | null | null |
RHSA-2023:0531
|
Red Hat Security Advisory: kernel-rt security and bug fix update
|
kernel: memory corruption in AX88179_178A based USB ethernet device. kernel: i915: Incorrect GPU TLB flush can lead to random memory access
|
[
"cpe:/a:redhat:rhel_eus:8.4::nfv",
"cpe:/a:redhat:rhel_eus:8.4::realtime"
] | null | 7 | null | null |
RHSA-2005:762
|
Red Hat Security Advisory: RealPlayer security update
|
security flaw security flaw security flaw
|
[
"cpe:/a:redhat:rhel_extras:3",
"cpe:/a:redhat:rhel_extras:4"
] | null | null | null | null |
RHSA-2005:474
|
Red Hat Security Advisory: bzip2 security update
|
security flaw security flaw security flaw
|
[
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws",
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2012:1061
|
Red Hat Security Advisory: kernel security and bug fix update
|
kernel: epoll: can leak file descriptors when returning -ELOOP
|
[
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2019:0997
|
Red Hat Security Advisory: python3 security update
|
python: Information Disclosure due to urlsplit improper NFKC normalization
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | null | 9.8 | null |
RHSA-2019:2030
|
Red Hat Security Advisory: python security and bug fix update
|
python: Missing salt initialization in _elementtree.c module python: NULL pointer dereference using a specially crafted X509 certificate python: CRLF injection via the query part of the url passed to urlopen() python: CRLF injection via the path part of the url passed to urlopen() python: Undocumented local_file protocol allows remote attackers to bypass protection mechanisms
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 7.4 | null |
RHSA-2012:0101
|
Red Hat Security Advisory: Red Hat Network Satellite spacewalk-backend security and bug fix update
|
Spacewalk: RHN user password disclosure upon failed system registration
|
[
"cpe:/a:redhat:network_satellite:5.4::el5",
"cpe:/a:redhat:network_satellite:5.4::el6"
] | null | null | null | null |
RHSA-2019:4254
|
Red Hat Security Advisory: freetype security update
|
freetype: a heap-based buffer over-read in T1_Get_Private_Dict in type1/t1parse.c leading to crash freetype: mishandling ps_parser_skip_PS_token in an FT_New_Memory_Face operation in skip_comment, psaux/psobjs.c, leads to a buffer over-read
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | 4.3 | null |
RHSA-2024:3805
|
Red Hat Security Advisory: kpatch-patch security update
|
kernel: nf_tables: use-after-free vulnerability in the nft_verdict_init() function
|
[
"cpe:/o:redhat:rhel_e4s:8.4::baseos"
] | null | 7.8 | null | null |
RHSA-2003:207
|
Red Hat Security Advisory: nfs-utils security update
|
security flaw
|
[
"cpe:/o:redhat:enterprise_linux:2.1::as",
"cpe:/o:redhat:enterprise_linux:2.1::aw",
"cpe:/o:redhat:enterprise_linux:2.1::es",
"cpe:/o:redhat:enterprise_linux:2.1::ws"
] | null | null | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.