id
stringlengths 13
15
| title
stringlengths 29
176
| description
stringlengths 8
32.1k
| cpes
sequencelengths 0
20
| cvss_v4_0
null | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
null |
---|---|---|---|---|---|---|---|
RHSA-2020:3834 | Red Hat Security Advisory: firefox security update | Mozilla: Memory safety bugs fixed in Firefox 81 and Firefox ESR 78.3 Mozilla: XSS when pasting attacker-controlled data into a contenteditable element Mozilla: Download origin spoofing via redirect Mozilla: When recursing through layers while scrolling, an iterator may have become invalid, resulting in a potential use-after-free scenario | [
"cpe:/a:redhat:rhel_e4s:8.0::appstream"
] | null | 8.8 | 6.1 | null |
RHSA-2015:2088 | Red Hat Security Advisory: openssh security, bug fix, and enhancement update | openssh: MaxAuthTries limit bypass via duplicates in KbdInteractiveDevices openssh: Privilege separation weakness related to PAM support openssh: Use-after-free bug related to PAM support | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | null | null |
RHSA-2023:2582 | Red Hat Security Advisory: lua security update | lua: heap buffer overread | [
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::crb",
"cpe:/o:redhat:enterprise_linux:9::baseos"
] | null | 6.2 | null | null |
RHSA-2014:0321 | Red Hat Security Advisory: net-snmp security and bug fix update | net-snmp: denial of service flaw in Linux implementation of ICMP-MIB | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2022:7171 | Red Hat Security Advisory: kernel security and bug fix update | kernel: a use-after-free in cls_route filter implementation may lead to privilege escalation | [
"cpe:/o:redhat:rhel_aus:7.6::server",
"cpe:/o:redhat:rhel_e4s:7.6::server",
"cpe:/o:redhat:rhel_tus:7.6::server"
] | null | 7.8 | null | null |
RHSA-2011:0677 | Red Hat Security Advisory: openssl security, bug fix, and enhancement update | openssl: OCSP stapling vulnerability | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2024:8678 | Red Hat Security Advisory: grafana security update | golang-fips: Golang FIPS zeroed buffer dompurify: nesting-based mutation XSS vulnerability | [
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 8 | null | null |
RHSA-2024:7408 | Red Hat Security Advisory: qemu-kvm security update | QEMU: Denial of Service via Improper Synchronization in QEMU NBD Server During Socket Closure | [
"cpe:/a:redhat:rhel_eus:9.2::appstream"
] | null | null | 7.5 | null |
RHSA-2024:8726 | Red Hat Security Advisory: firefox security update | firefox: thunderbird: Permission leak via embed or object elements firefox: thunderbird: Use-after-free in layout with accessibility firefox: thunderbird: Confusing display of origin for external protocol handler prompt firefox: thunderbird: XSS due to Content-Disposition being ignored in multipart/x-mixed-replace response firefox: thunderbird: Origin of permission prompt could be spoofed by long URL firefox: thunderbird: Cross origin video frame leak firefox: thunderbird: History interface could have been used to cause a Denial of Service condition in the browser firefox: thunderbird: Clipboard "paste" button persisted across tabs firefox: DOM push subscription message could hang Firefox firefox: thunderbird: Memory safety bugs fixed in Firefox 132, Thunderbird 132, Firefox ESR 128.4, and Thunderbird 128.4 | [
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 8.8 | null | null |
RHSA-2021:4172 | Red Hat Security Advisory: qt5 security, bug fix, and enhancement update | qt: Out of bounds read in function QRadialFetchSimd from crafted svg file | [
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb"
] | null | 7.1 | null | null |
RHSA-2024:2093 | Red Hat Security Advisory: security update Logging for Red Hat OpenShift - 5.7.13 | kernel: ext4: kernel bug in ext4_write_inline_data_end() gmp: Integer overflow and resultant buffer overflow via crafted input kernel: vmwgfx: NULL pointer dereference in vmw_cmd_dx_define_query less: missing quoting of shell metacharacters in LESSCLOSE handling kernel: GSM multiplexing race condition leads to privilege escalation kernel: Out of boundary write in perf_read_group() as result of overflow a perf_event's read_size curl: more POST-after-PUT confusion curl: cookie injection with none file curl: information disclosure by exploiting a mixed case flaw kernel: use-after-free in amdgpu_cs_wait_all_fences in drivers/gpu/drm/amd/amdgpu/amdgpu_cs.c kernel: CIFS Filesystem Decryption Improper Input Validation Remote Code Execution Vulnerability in function receive_encrypted_standard of client kernel: nf_tables: use-after-free vulnerability in the nft_verdict_init() function | [
"cpe:/a:redhat:logging:5.7::el8"
] | null | 7.8 | null | null |
RHSA-2015:0430 | Red Hat Security Advisory: virt-who security, bug fix, and enhancement update | virt-who: plaintext hypervisor passwords in world-readable /etc/sysconfig/virt-who configuration file | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | null | null |
RHSA-2002:196 | Red Hat Security Advisory: : Updated xinetd packages fix denial of service vulnerability | security flaw | [
"cpe:/o:redhat:linux:7.0",
"cpe:/o:redhat:linux:7.1",
"cpe:/o:redhat:linux:7.2",
"cpe:/o:redhat:linux:7.3",
"cpe:/o:redhat:linux:8.0"
] | null | null | null | null |
RHSA-2012:1379 | Red Hat Security Advisory: openstack-swift security update | Openstack-Swift: insecure use of python pickle() | [
"cpe:/a:redhat:openstack:1::el6"
] | null | null | null | null |
RHSA-2021:3159 | Red Hat Security Advisory: firefox security update | Mozilla: Uninitialized memory in a canvas object could have led to memory corruption Mozilla: Incorrect instruction reordering during JIT optimization Mozilla: Use-after-free media channels Mozilla: Race condition when resolving DNS names could have led to memory corruption Mozilla: Memory corruption as a result of incorrect style treatment Mozilla: Memory safety bugs fixed in Thunderbird 78.13 | [
"cpe:/a:redhat:rhel_eus:8.1::appstream"
] | null | 8.8 | 7.5 | null |
RHSA-2021:3317 | Red Hat Security Advisory: microcode_ctl security, bug fix and enhancement update | hw: Special Register Buffer Data Sampling (SRBDS) hw: Vector Register Data Sampling hw: L1D Cache Eviction Sampling hw: Information disclosure issue in Intel SGX via RAPL interface hw: Vector Register Leakage-Active hw: Fast forward store predictor hw: vt-d related privilege escalation hw: improper isolation of shared resources in some Intel Processors hw: observable timing discrepancy in some Intel Processors | [
"cpe:/o:redhat:rhel_aus:7.6::server",
"cpe:/o:redhat:rhel_e4s:7.6::server",
"cpe:/o:redhat:rhel_tus:7.6::server"
] | null | 2.8 | 6.5 | null |
RHSA-2021:4161 | Red Hat Security Advisory: python-jinja2 security update | python-jinja2: ReDoS vulnerability in the urlize filter | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 7.5 | null | null |
RHSA-2020:3634 | Red Hat Security Advisory: thunderbird security update | Mozilla: Attacker-induced prompt for extension installation Mozilla: Use-After-Free when aborting an operation | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 8.8 | null | null |
RHSA-2020:3014 | Red Hat Security Advisory: dbus security update | dbus: denial of service via file descriptor leak | [
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 6.5 | null | null |
RHSA-2013:0727 | Red Hat Security Advisory: kvm security update | kernel: kvm: buffer overflow in handling of MSR_KVM_SYSTEM_TIME kernel: kvm: after free issue with the handling of MSR_KVM_SYSTEM_TIME kernel: kvm: out-of-bounds access in ioapic indirect register reads | [
"cpe:/a:redhat:rhel_virtualization:5::server"
] | null | null | null | null |
RHSA-2019:1633 | Red Hat Security Advisory: Red Hat OpenShift Container Platform 3.11 atomic-openshift security update | kubernetes: Incomplete fix for CVE-2019-1002101 allows for arbitrary file write via `kubectl cp` | [
"cpe:/a:redhat:openshift:3.11::el7"
] | null | null | 5.3 | null |
RHSA-2024:10880 | Red Hat Security Advisory: firefox security update | firefox: thunderbird: Select list elements could be shown over another site firefox: thunderbird: CSP Bypass and XSS Exposure via Web Compatibility Shims firefox: thunderbird: URL Bar Spoofing via Manipulated Punycode and Whitespace Characters firefox: thunderbird: Unhandled Exception in Add-on Signature Verification firefox: thunderbird: Improper Keypress Handling in Executable File Confirmation Dialog firefox: thunderbird: Memory safety bugs fixed in Firefox 133, Thunderbird 133, Firefox ESR 128.5, and Thunderbird 128.5 | [
"cpe:/a:redhat:rhel_aus:8.6::appstream",
"cpe:/a:redhat:rhel_e4s:8.6::appstream",
"cpe:/a:redhat:rhel_tus:8.6::appstream"
] | null | 8.8 | null | null |
RHSA-2009:1218 | Red Hat Security Advisory: pidgin security update | pidgin: insufficient input validation in msn_slplink_process_msg() | [
"cpe:/a:redhat:rhel_productivity:5",
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws",
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws",
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation"
] | null | null | null | null |
RHSA-2023:7096 | Red Hat Security Advisory: python-cryptography security update | python-cryptography: memory corruption via immutable objects | [
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 6.5 | null | null |
RHSA-2013:1286 | Red Hat Security Advisory: Red Hat JBoss Fuse/A-MQ 6.0.0 patch 3 | Console: Stored cross-site scripting (XSS) | [
"cpe:/a:redhat:jboss_amq:6.0.0",
"cpe:/a:redhat:jboss_fuse:6.0.0"
] | null | null | null | null |
RHSA-2010:0590 | Red Hat Security Advisory: Red Hat Directory Server security and enhancement update | redhat-ds: setup script insecure .inf file permissions | [
"cpe:/a:redhat:directory_server:8::el4",
"cpe:/a:redhat:directory_server:8::el5"
] | null | null | null | null |
RHSA-2023:4889 | Red Hat Security Advisory: DevWorkspace Operator 0.22 release | openssh: Remote code execution in ssh-agent PKCS#11 support | [
"cpe:/a:redhat:devworkspace:1.0::el8"
] | null | 9.8 | null | null |
RHSA-2002:130 | Red Hat Security Advisory: squid security update | security flaw security flaw security flaw | [
"cpe:/o:redhat:enterprise_linux:2.1::as"
] | null | null | null | null |
RHSA-2007:0013 | Red Hat Security Advisory: kernel security update | security flaw security flaw | [
"cpe:/o:redhat:enterprise_linux:2.1::as",
"cpe:/o:redhat:enterprise_linux:2.1::es",
"cpe:/o:redhat:enterprise_linux:2.1::ws"
] | null | null | null | null |
RHSA-2022:7830 | Red Hat Security Advisory: nodejs:14 security update | nodejs: Improper handling of URI Subject Alternative Names nodejs: Certificate Verification Bypass via String Injection nodejs: Incorrect handling of certificate subject and issuer fields nodejs: Prototype pollution via console.table properties nodejs: HTTP Request Smuggling due to incorrect parsing of header fields | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 6.5 | null | null |
RHSA-2008:0209 | Red Hat Security Advisory: thunderbird security update | Mozilla products XPCNativeWrapper pollution universal XSS using event handlers chrome privilege via wrong principal browser engine crashes javascript crashes Referrer spoofing bug XUL popup spoofing | [
"cpe:/a:redhat:rhel_productivity:5",
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws",
"cpe:/o:redhat:enterprise_linux:5::client"
] | null | null | null | null |
RHSA-2022:5709 | Red Hat Security Advisory: java-1.8.0-openjdk security, bug fix, and enhancement update | OpenJDK: class compilation issue (Hotspot, 8281859) OpenJDK: improper restriction of MethodHandle.invokeBasic() (Hotspot, 8281866) OpenJDK: integer truncation issue in Xalan-J (JAXP, 8285407) | [
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::crb"
] | null | 7.5 | null | null |
RHSA-2023:5430 | Red Hat Security Advisory: thunderbird security update | firefox: use-after-free in workers Mozilla: Out-of-bounds write in PathOps Mozilla: Use-after-free in Ion Compiler Mozilla: Memory safety bugs fixed in Firefox 118, Firefox ESR 115.3, and Thunderbird 115.3 libvpx: Heap buffer overflow in vp8 encoding in libvpx | [
"cpe:/a:redhat:rhel_eus:8.6::appstream"
] | null | 8.8 | null | null |
RHEA-2018:0874 | Red Hat Enhancement Advisory: linux-firmware bug fix and enhancement update | hw: cpu: speculative execution branch target injection | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 5.6 | null |
RHSA-2022:8880 | Red Hat Security Advisory: java-1.8.0-ibm security update | OpenJDK: improper handling of long NTLM client hostnames (Security, 8286526) OpenJDK: insufficient randomization of JNDI DNS port numbers (JNDI, 8286910) OpenJDK: excessive memory allocation in X.509 certificate parsing (Security, 8286533) OpenJDK: HttpServer no connection count limit (Lightweight HTTP Server, 8286918) | [
"cpe:/a:redhat:rhel_extras:7"
] | null | 5.3 | null | null |
RHSA-2020:1420 | Red Hat Security Advisory: firefox security update | Mozilla: Uninitialized memory could be read when using the WebGL copyTexSubImage method Mozilla: Out of bounds write in GMPDecodeData when processing large images Mozilla: Memory safety bugs fixed in Firefox 75 and Firefox ESR 68.7 | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 9.8 | null | null |
RHSA-2017:1581 | Red Hat Security Advisory: freeradius security update | freeradius: TLS resumption authentication bypass | [
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 7.4 | null |
RHSA-2024:0948 | Red Hat Security Advisory: OpenShift Container Platform 4.13.35 security update | golang.org/x/net/http2: avoid quadratic complexity in HPACK decoding | [
"cpe:/a:redhat:openshift:4.13::el8",
"cpe:/a:redhat:openshift:4.13::el9"
] | null | 7.5 | null | null |
RHSA-2020:5581 | Red Hat Security Advisory: python-XStatic-jQuery security update | jquery: Prototype pollution in object's prototype leading to denial of service, remote code execution, or property injection | [
"cpe:/a:redhat:openstack:13::el7"
] | null | null | 5.6 | null |
RHSA-2009:1040 | Red Hat Security Advisory: ntp security update | ntp: buffer overflow in ntpq ntp: remote arbitrary code execution vulnerability if autokeys is enabled | [
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws",
"cpe:/o:redhat:rhel_eus:4.7::as",
"cpe:/o:redhat:rhel_eus:4.7::es"
] | null | null | null | null |
RHSA-2024:7811 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.4 Security update | apache-avro: Schema parsing may trigger Remote Code Execution (RCE) | [
"cpe:/a:redhat:jboss_enterprise_application_platform:7.4::el7",
"cpe:/a:redhat:jboss_enterprise_application_platform:7.4::el8",
"cpe:/a:redhat:jboss_enterprise_application_platform:7.4::el9"
] | null | 8.8 | null | null |
RHEA-2020:4954 | Red Hat Enhancement Advisory: Red Hat Advanced Cluster Management for Kubernetes version 2.1 images | rhacm: certificate re-use in grcuiapi and topologyapi | [
"cpe:/a:redhat:acm:2.1::el8"
] | null | 3.5 | null | null |
RHSA-2024:4336 | Red Hat Security Advisory: security update Logging for Red Hat OpenShift - 5.6.21 | golang: net/netip: Unexpected behavior from Is methods for IPv4-mapped IPv6 addresses | [
"cpe:/a:redhat:logging:5.6::el8"
] | null | 6.7 | null | null |
RHBA-2022:5721 | Red Hat Bug Fix Advisory: .NET 6.0 on RHEL 7 bugfix update | eventsource: Exposure of Sensitive Information | [
"cpe:/a:redhat:rhel_dotnet:6.0::el7"
] | null | 9.3 | null | null |
RHSA-2025:2528 | Red Hat Security Advisory: kernel security update | kernel: can: bcm: Fix UAF in bcm_proc_show() kernel: HID: core: zero-initialize the report buffer kernel: ALSA: usb-audio: Fix potential out-of-bound accesses for Extigy and Mbox devices | [
"cpe:/o:redhat:rhel_aus:8.4::baseos",
"cpe:/o:redhat:rhel_e4s:8.4::baseos",
"cpe:/o:redhat:rhel_tus:8.4::baseos"
] | null | 5.8 | null | null |
RHSA-2003:146 | Red Hat Security Advisory: kdebase security update | security flaw | [
"cpe:/o:redhat:enterprise_linux:2.1::as",
"cpe:/o:redhat:enterprise_linux:2.1::aw",
"cpe:/o:redhat:enterprise_linux:2.1::es",
"cpe:/o:redhat:enterprise_linux:2.1::ws"
] | null | null | null | null |
RHSA-2024:6462 | Red Hat Security Advisory: Cost Management enhancement and security update | golang: net: malformed DNS message can cause infinite loop golang: net/netip: Unexpected behavior from Is methods for IPv4-mapped IPv6 addresses net/http: Denial of service due to improper 100-continue handling in net/http | [
"cpe:/a:redhat:cost_management:1::el8"
] | null | 5.9 | null | null |
RHSA-2021:2144 | Red Hat Security Advisory: docker security update | runc: vulnerable to symlink exchange attack | [
"cpe:/a:redhat:rhel_extras_other:7"
] | null | 7.5 | null | null |
RHSA-2024:0753 | Red Hat Security Advisory: linux-firmware security update | hw: amd: INVD instruction may lead to a loss of SEV-ES guest machine memory integrity problem | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 5.3 | null | null |
RHSA-2016:2807 | Red Hat Security Advisory: Red Hat JBoss Web Server 2.1.2 security update for Tomcat 7 | tomcat: Session fixation tomcat: CSRF token leak tomcat: security manager bypass via StatusManagerServlet tomcat: Security Manager bypass via persistence mechanisms tomcat: security manager bypass via setGlobalContext() tomcat: Usage of vulnerable FileUpload package can result in denial of service | [
"cpe:/a:redhat:jboss_enterprise_web_server:2::el6",
"cpe:/a:redhat:jboss_enterprise_web_server:2::el7"
] | null | null | 7.5 | null |
RHSA-2023:1525 | Red Hat Security Advisory: OpenShift Container Platform 4.9.59 security update | mongo-go-driver: specific cstrings input may not be properly validated | [
"cpe:/a:redhat:openshift:4.9::el8"
] | null | 6.5 | null | null |
RHSA-2024:1865 | Red Hat Security Advisory: Red Hat Single Sign-On 7.6.8 Operator enhancement and security update | keycloak: Log Injection during WebAuthn authentication or registration | [
"cpe:/a:redhat:rhosemc:1.0::el8"
] | null | 5.3 | null | null |
RHSA-2012:0468 | Red Hat Security Advisory: libtiff security update | libtiff: Heap-buffer overflow due to TileSize calculation when parsing tiff files | [
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server",
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2017:0345 | Red Hat Security Advisory: kernel security update | kernel: use after free in dccp protocol | [
"cpe:/o:redhat:rhel_aus:6.4::server"
] | null | null | 7.8 | null |
RHSA-2020:1962 | Red Hat Security Advisory: python-twisted-web security update | python-twisted: HTTP request smuggling when presented with two Content-Length headers | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | 7.3 | null | null |
RHSA-2022:5771 | Red Hat Security Advisory: thunderbird security update | Mozilla: Memory safety bugs fixed in Firefox 103 and 102.1 Mozilla: Directory indexes for bundled resources reflected URL parameters Mozilla: Mouse Position spoofing with CSS transforms | [
"cpe:/a:redhat:rhel_eus:8.2::appstream"
] | null | 7.5 | 6.1 | null |
RHSA-2008:0233 | Red Hat Security Advisory: kernel security and bug fix update | missing sanity check in xen block backend driver kernel: insufficient range checks in fault handlers with mremap Kernel doesn't clear DF for signal handlers kernel: race condition in dnotify (local DoS, local roothole possible) [xen-ia64] Dom0 panic while we run ftp test tool between HVM and Dom0. kernel: add rcu_read_lock() to fcheck() in both dnotify, locks.c and fix fcntl store/load race in locks.c | [
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2024:1251 | Red Hat Security Advisory: kpatch-patch security update | kernel: ktls overwrites readonly memory pages when using function splice with a ktls socket as destination | [
"cpe:/o:redhat:enterprise_linux:9::baseos"
] | null | 7 | null | null |
RHSA-2015:1409 | Red Hat Security Advisory: sudo security, bug fix, and enhancement update | sudo: unsafe handling of TZ environment variable | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2020:5054 | Red Hat Security Advisory: skopeo security update | golang.org/x/text: possibility to trigger an infinite loop in encoding/unicode could lead to crash | [
"cpe:/a:redhat:rhel_extras_other:7"
] | null | 7.5 | null | null |
RHSA-2018:2791 | Red Hat Security Advisory: kernel security and bug fix update | kernel: TCP segments with random offsets allow a remote denial of service (SegmentSmack) kernel: IP fragments with random offsets allow a remote denial of service (FragmentSmack) kernel: mm: use-after-free in do_get_mempolicy function allows local DoS or other unspecified impact | [
"cpe:/o:redhat:rhel_aus:6.4::server"
] | null | null | 5.5 | null |
RHSA-2024:3958 | Red Hat Security Advisory: firefox security update | Mozilla: Use-after-free in JavaScript object transplant Mozilla: External protocol handlers leaked by timing attack Mozilla: Sandboxed iframes were able to bypass sandbox restrictions to open a new window Mozilla: Cross-Origin Image leak via Offscreen Canvas Mozilla: Memory Corruption in Text Fragments Mozilla: Memory safety bugs fixed in Firefox 127, Firefox ESR 115.12, and Thunderbird 115.12 Mozilla: Use-after-free in networking | [
"cpe:/a:redhat:rhel_e4s:9.0::appstream"
] | null | 7.5 | null | null |
RHSA-2024:8112 | Red Hat Security Advisory: buildah security update | Podman: Buildah: cri-o: FIPS Crypto-Policy Directory Mounting Issue in containers/common Go Library go/parser: golang: Calling any of the Parse functions containing deeply nested literals can cause a panic/stack exhaustion encoding/gob: golang: Calling Decoder.Decode on a message which contains deeply nested structures can cause a panic due to stack exhaustion go/build/constraint: golang: Calling Parse on a "// +build" build tag line with deeply nested expressions can cause a panic due to stack exhaustion | [
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 5.9 | null | null |
RHSA-2014:1765 | Red Hat Security Advisory: php54-php security update | php: heap-based buffer over-read in DateInterval file: extensive backtracking in awk rule regular expression file: cdf_read_short_sector insufficient boundary check file: cdf_unpack_summary_info() excessive looping DoS file: CDF property info parsing nelements infinite loop file: unrestricted recursion in handling of indirect type rules file: out-of-bounds access in search rules with offsets from input file gd: NULL pointer dereference in gdImageCreateFromXpm() file: mconvert incorrect handling of truncated pascal string size file: cdf_check_stream_offset insufficient boundary check file: cdf_count_chain insufficient boundary check file: cdf_read_property_info insufficient boundary check php: unserialize() SPL ArrayObject / SPLObjectStorage type confusion flaw file: unrestricted regular expression matching file: incomplete fix for CVE-2012-1571 in cdf_read_property_info php: multiple buffer over-reads in php_parserr php: xmlrpc ISO8601 date format parsing out-of-bounds read in mkgmtime() php: integer overflow in unserialize() php: heap corruption issue in exif_thumbnail() file: out-of-bounds read in elf note headers php: heap-based buffer overflow in DNS TXT record parsing php: SPL Iterators use-after-free php: ArrayIterator use-after-free due to object change during sorting php: type confusion issue in phpinfo() leading to information leak php: gd extension NUL byte injection in file names | [
"cpe:/a:redhat:rhel_software_collections:1::el6",
"cpe:/a:redhat:rhel_software_collections:1::el7"
] | null | null | null | null |
RHSA-2021:0223 | Red Hat Security Advisory: sudo security update | sudo: Heap buffer overflow in argument parsing | [
"cpe:/o:redhat:rhel_eus:7.6::computenode",
"cpe:/o:redhat:rhel_eus:7.6::server"
] | null | 7.8 | null | null |
RHSA-2024:4108 | Red Hat Security Advisory: kernel security and bug fix update | kernel: net: hns3: do not allow call hns3_nic_net_open repeatedly kernel: xen-netfront: Add missing skb_mark_for_recycle kernel: netfilter: nf_tables: use timestamp to check for set element timeout kernel: netfilter: nft_flow_offload: reset dst in route object after setting up flow kernel: smb: client: fix UAF in smb2_reconnect_server() kernel: net: ena: Fix incorrect descriptor free behavior kernel: net/mlx5: Properly link new fs rules into the tree kernel: octeontx2-af: avoid off-by-one read from userspace | [
"cpe:/a:redhat:rhel_eus:9.2::appstream",
"cpe:/a:redhat:rhel_eus:9.2::crb",
"cpe:/o:redhat:rhel_eus:9.2::baseos"
] | null | 4.4 | null | null |
RHSA-2010:0754 | Red Hat Security Advisory: cups security update | xpdf: uninitialized Gfx::parser pointer dereference | [
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws"
] | null | null | null | null |
RHSA-2023:6524 | Red Hat Security Advisory: dnsmasq security and bug fix update | dnsmasq: default maximum EDNS.0 UDP packet size was set to 4096 but should be 1232 | [
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 7.5 | null | null |
RHSA-2005:141 | Red Hat Security Advisory: rh-postgresql security update | security flaw security flaw security flaw security flaw security flaw | [
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws"
] | null | null | null | null |
RHSA-2016:0049 | Red Hat Security Advisory: java-1.8.0-openjdk security update | TLS 1.2 Transcipt Collision attacks against MD5 in key exchange protocol (SLOTH) OpenJDK: URL deserialization inconsistencies (Networking, 8059054) OpenJDK: logging of RMI connection secrets (JMX, 8130710) OpenJDK: insufficient enforcement of totalEntitySizeLimit (JAXP, 8133962) OpenJDK: PBE incorrect key lengths (Libraries, 8138589) OpenJDK: incorrect boundary check in JPEG decoder (AWT, 8139017) ICU: integer signedness issue in IndicRearrangementProcessor (OpenJDK 2D, 8140543) | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | null | null |
RHSA-2010:0018 | Red Hat Security Advisory: dbus security update | dbus: invalid fix for CVE-2008-3834 | [
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2010:0891 | Red Hat Security Advisory: pam security update | pam: pam_xauth missing return value checks from setuid() and similar calls pam: pam_env and pam_mail accessing users' file with root privileges pam: pam_namespace executes namespace.init with service's environment pam: pam_xauth: Does not check if certain ACL file is a regular file pam: pam_env: reading ~/.pam_environment is security risk | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2022:0108 | Red Hat Security Advisory: ansible-runner security and bug fix update | Ansible: Improper shell escaping in ansible-runner | [
"cpe:/a:redhat:ansible_automation_platform:2.0::el8"
] | null | 7.3 | null | null |
RHSA-2018:0270 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 6.4.19 security update | artemis/hornetq: memory exhaustion via UDP and JGroups discovery tomcat: Remote Code Execution bypass for CVE-2017-12615 jboss-remoting: High CPU Denial of Service | [
"cpe:/a:redhat:jboss_enterprise_application_platform:6::el6"
] | null | null | 4.3 | null |
RHSA-2010:0029 | Red Hat Security Advisory: krb5 security update | krb: KDC integer overflows in AES and RC4 decryption routines (MITKRB5-SA-2009-004) | [
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws",
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws",
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server",
"cpe:/o:redhat:rhel_eus:4.7::as",
"cpe:/o:redhat:rhel_eus:4.7::es",
"cpe:/o:redhat:rhel_eus:5.2",
"cpe:/o:redhat:rhel_eus:5.3"
] | null | null | null | null |
RHSA-2023:7160 | Red Hat Security Advisory: opensc security and bug fix update | opensc: buffer overrun vulnerability in pkcs15 cardos_have_verifyrc_package | [
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 6.3 | null | null |
RHSA-2023:4789 | Red Hat Security Advisory: kernel security, bug fix, and enhancement update | kernel: when setting font with malicious data by ioctl PIO_FONT, kernel will write memory out of bounds kernel: use-after-free in l2cap_connect and l2cap_le_connect_req in net/bluetooth/l2cap_core.c kernel: save/restore speculative MSRs during S3 suspend/resume kernel: Use-after-free vulnerability in the Linux Kernel traffic control index filter Kernel: bluetooth: Unauthorized management command execution kernel: OOB access in the Linux kernel's XFS subsystem kernel: UAF in nftables when nft_set_lookup_global triggered after handling named and anonymous sets in batch requests hw: amd: Cross-Process Information Leak kernel: tls: race condition in do_tls_getsockopt may lead to use-after-free or NULL pointer dereference kernel: cls_flower: out-of-bounds write in fl_set_geneve_opt() kernel: buffer overflow in ceph file net/ceph/messenger_v2.c | [
"cpe:/a:redhat:rhel_eus:8.6::crb",
"cpe:/o:redhat:rhel_eus:8.6::baseos",
"cpe:/o:redhat:rhev_hypervisor:4.4::el8"
] | null | 8.8 | null | null |
RHSA-2024:3885 | Red Hat Security Advisory: OpenShift Container Platform 4.13.44 bug fix and security update | graphql-go: Denial of service via stack overflow panics golang: net/http, x/net/http2: unlimited number of CONTINUATION frames causes DoS | [
"cpe:/a:redhat:openshift:4.13::el8",
"cpe:/a:redhat:openshift:4.13::el9"
] | null | 7.5 | null | null |
RHSA-2024:11216 | Red Hat Security Advisory: containernetworking-plugins security update | encoding/gob: golang: Calling Decoder.Decode on a message which contains deeply nested structures can cause a panic due to stack exhaustion | [
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 7.5 | null | null |
RHSA-2013:0662 | Red Hat Security Advisory: kernel security and bug fix update | kernel: race condition with PTRACE_SETREGS | [
"cpe:/o:redhat:rhel_eus:6.3::server"
] | null | null | null | null |
RHSA-2023:1742 | Red Hat Security Advisory: nodejs:14 security, bug fix, and enhancement update | glob-parent: Regular Expression Denial of Service nodejs: Improper handling of URI Subject Alternative Names nodejs: Certificate Verification Bypass via String Injection nodejs: Incorrect handling of certificate subject and issuer fields minimist: prototype pollution node-fetch: exposure of sensitive information to an unauthorized actor nodejs-minimatch: ReDoS via the braceExpand function c-ares: buffer overflow in config_sortlist() due to missing string length check nodejs: Prototype pollution via console.table properties express: "qs" prototype poisoning causes the hang of the node process http-cache-semantics: Regular Expression Denial of Service (ReDoS) vulnerability nodejs: HTTP Request Smuggling due to incorrect parsing of header fields decode-uri-component: improper input validation resulting in DoS nodejs: DNS rebinding in inspect via invalid octal IP address Node.js: Permissions policies can be bypassed via process.mainModule Node.js: insecure loading of ICU data through ICU_DATA environment variable | [
"cpe:/a:redhat:rhel_eus:8.6::appstream"
] | null | 4.2 | null | null |
RHSA-2010:0950 | Red Hat Security Advisory: apr-util security update | apr-util: high memory consumption in apr_brigade_split_line() | [
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws",
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server",
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2021:4426 | Red Hat Security Advisory: ncurses security update | ncurses: heap-based buffer overflow in the _nc_find_entry function in tinfo/comp_hash.c ncurses: heap-based buffer overflow in the fmt_entry function in tinfo/comp_hash.c | [
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 5.4 | 5.3 | null |
RHSA-2020:3706 | Red Hat Security Advisory: openstack-nova security update | openstack-nova: Soft reboot after live-migration reverts instance to original source domain XML | [
"cpe:/a:redhat:openstack:15::el8"
] | null | 8.3 | null | null |
RHSA-2025:1757 | Red Hat Security Advisory: mysql:8.0 security update | mysql: Thread Pooling unspecified vulnerability (CPU Jan 2025) | [
"cpe:/a:redhat:rhel_eus:8.8::appstream"
] | null | 7.5 | null | null |
RHSA-2024:5001 | Red Hat Security Advisory: httpd security update | httpd: Encoding problem in mod_proxy httpd: Potential SSRF in mod_rewrite | [
"cpe:/a:redhat:rhel_eus:9.2::appstream"
] | null | 7.4 | null | null |
RHSA-2020:4277 | Red Hat Security Advisory: kernel security update | kernel: net: bluetooth: type confusion while processing AMP packets kernel: net: bluetooth: information leak when processing certain AMP packets | [
"cpe:/o:redhat:rhel_eus:7.7::computenode",
"cpe:/o:redhat:rhel_eus:7.7::server"
] | null | 5.3 | null | null |
RHSA-2023:5249 | Red Hat Security Advisory: ncurses security update | ncurses: Local users can trigger security-relevant memory corruption via malformed data | [
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 7.8 | null | null |
RHSA-2012:0734 | Red Hat Security Advisory: java-1.6.0-sun security update | JDK: unspecified vulnerability fixed in 6u33 and 7u5 (Deployment) OpenJDK: improper protection of CORBA data models (CORBA, 7079902) OpenJDK: fontmanager layout lookup code memory corruption (2D, 7143617) OpenJDK: SynthLookAndFeel application context bypass (Swing, 7143614) OpenJDK: insecure temporary file permissions (JRE, 7143606) OpenJDK: CRL and certificate extensions handling improvements (Security, 7143872) OpenJDK: mutable repository identifiers in generated stub code (CORBA, 7143851) JDK: unspecified vulnerability fixed in 6u33 and 7u5 (Deployment) JDK: unspecified vulnerability fixed in 6u33 and 7u5 (Deployment) OpenJDK: insufficient field accessibility checks (HotSpot, 7152811) OpenJDK: XML parsing infinite loop (JAXP, 7157609) OpenJDK: insufficient invokespecial <init> verification (HotSpot, 7160757) | [
"cpe:/a:redhat:rhel_extras:5::client",
"cpe:/a:redhat:rhel_extras:5::server",
"cpe:/a:redhat:rhel_extras:6"
] | null | null | null | null |
RHSA-2009:1466 | Red Hat Security Advisory: kernel security and bug fix update | kernel: information leak in sigaltstack kernel: execve: must clear current->clear_child_tid | [
"cpe:/o:redhat:rhel_eus:5.3"
] | null | null | null | null |
RHSA-2020:2342 | Red Hat Security Advisory: qemu-kvm-rhev bug fix update | QEMU: slirp: heap buffer overflow during packet reassembly QEMU: slirp: OOB buffer access while emulating tcp protocols in tcp_emu() QEMU: Slirp: potential OOB access due to unsafe snprintf() usages | [
"cpe:/a:redhat:rhev_manager:4.2"
] | null | 5.6 | 7 | null |
RHSA-2013:1540 | Red Hat Security Advisory: evolution security, bug fix, and enhancement update | evolution: incorrect selection of recipient gpg public key for encrypted mail | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2024:6144 | Red Hat Security Advisory: postgresql security update | postgresql: PostgreSQL relation replacement during pg_dump executes arbitrary SQL | [
"cpe:/a:redhat:rhel_e4s:9.0::appstream"
] | null | 7.5 | null | null |
RHSA-2021:3254 | Red Hat Security Advisory: rh-python38 security, bug fix, and enhancement update | python-cryptography: Bleichenbacher timing oracle attack against RSA decryption python: Unsafe use of eval() on data retrieved via HTTP in the test suite python-lxml: mXSS due to the use of improper parser python-jinja2: ReDoS vulnerability in the urlize filter python-cryptography: Large inputs for symmetric encryption can trigger integer overflow leading to buffer overflow python: Stack-based buffer overflow in PyCArg_repr in _ctypes/callproc.c python: Information disclosure via pydoc python-pip: Incorrect handling of unicode separators in git references python: urllib: Regular expression DoS in AbstractBasicAuthHandler python: ftplib should not use the host from the PASV response python-babel: Relative path traversal allows attacker to load arbitrary locale files and execute arbitrary code python: Web cache poisoning via urllib.parse.parse_qsl and urllib.parse.parse_qs by using a semicolon in query parameters python-lxml: Missing input sanitization for formaction HTML5 attributes may lead to XSS python-ipaddress: Improper input validation of octal strings python-urllib3: ReDoS in the parsing of authority part of URL python-babel: Relative path traversal allows attacker to load arbitrary locale files and execute arbitrary code python: urllib.parse does not sanitize URLs containing ASCII newline and tabs | [
"cpe:/a:redhat:rhel_software_collections:3::el7"
] | null | 5.3 | null | null |
RHBA-2021:0639 | Red Hat Bug Fix Advisory: virt:8.3 bug fix and enhancement update | QEMU: infinite loop in e1000e_write_packet_to_guest() in hw/net/e1000e_core.c QEMU: assertion failure through usb_packet_unmap() in hw/usb/hcd-ehci.c QEMU: net: an assert failure via eth_get_gso_type QEMU: heap buffer overflow in msix_table_mmio_write() in hw/pci/msix.c QEMU: ide: atapi: OOB access while processing read commands QEMU: virtiofsd: potential privileged host device access from guest | [
"cpe:/a:redhat:advanced_virtualization:8.3::el8"
] | null | 7.5 | null | null |
RHSA-2020:3911 | Red Hat Security Advisory: python security update | python: XSS vulnerability in the documentation XML-RPC server in server_title field | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 6.1 | null | null |
RHSA-2023:0264 | Red Hat Security Advisory: Red Hat OpenShift (Logging Subsystem) security update | jackson-databind: denial of service via a large depth of nested objects golang: archive/tar: github.com/vbatts/tar-split: unbounded memory consumption when reading headers golang: net/http/httputil: ReverseProxy should not forward unparseable query parameters golang: net/http: handle server errors after sending GOAWAY golang: net/url: JoinPath does not strip relative path components in all circumstances loader-utils: prototype pollution in function parseQuery in parseQuery.js golang: regexp/syntax: limit memory used by parsing regexps jackson-databind: deep wrapper array nesting wrt UNWRAP_SINGLE_VALUE_ARRAYS jackson-databind: use of deeply nested arrays | [
"cpe:/a:redhat:logging:5.6::el8"
] | null | 7.5 | null | null |
RHSA-2024:5410 | Red Hat Security Advisory: Red Hat Product OCP Tools 4.12 OpenShift Jenkins security update | jenkins: Arbitrary file read vulnerability through agent connections can lead to RCE | [
"cpe:/a:redhat:ocp_tools:4.12::el8"
] | null | 8.8 | null | null |
RHSA-2025:2475 | Red Hat Security Advisory: kernel security update | kernel: HID: core: zero-initialize the report buffer kernel: ALSA: usb-audio: Fix potential out-of-bound accesses for Extigy and Mbox devices | [
"cpe:/a:redhat:rhel_eus:9.2::appstream",
"cpe:/a:redhat:rhel_eus:9.2::crb",
"cpe:/o:redhat:rhel_eus:9.2::baseos"
] | null | 5.8 | null | null |
RHSA-2021:3529 | Red Hat Security Advisory: Red Hat Single Sign-On 7.4.9 security update on RHEL 8 | jackson-dataformat-cbor: Unchecked allocation of byte buffer can cause a java.lang.OutOfMemoryError exception keycloak: X509 Direct Grant Auth does not verify certificate timestamp validity keycloak: Brute force attack is possible even after the account lockout keycloak: Anyone can register a new device when there is no device registered for passwordless login keycloak-model-infinispan: authenticationSessions map in RootAuthenticationSessionEntity grows boundlessly could lead to a DoS attack | [
"cpe:/a:redhat:red_hat_single_sign_on:7::el8"
] | null | 7.5 | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.