id
stringlengths
13
15
title
stringlengths
29
176
description
stringlengths
8
32.1k
cpes
sequencelengths
0
20
cvss_v4_0
null
cvss_v3_1
float64
0
10
cvss_v3_0
float64
0
10
cvss_v2_0
null
RHSA-2020:3834
Red Hat Security Advisory: firefox security update
Mozilla: Memory safety bugs fixed in Firefox 81 and Firefox ESR 78.3 Mozilla: XSS when pasting attacker-controlled data into a contenteditable element Mozilla: Download origin spoofing via redirect Mozilla: When recursing through layers while scrolling, an iterator may have become invalid, resulting in a potential use-after-free scenario
[ "cpe:/a:redhat:rhel_e4s:8.0::appstream" ]
null
8.8
6.1
null
RHSA-2015:2088
Red Hat Security Advisory: openssh security, bug fix, and enhancement update
openssh: MaxAuthTries limit bypass via duplicates in KbdInteractiveDevices openssh: Privilege separation weakness related to PAM support openssh: Use-after-free bug related to PAM support
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
null
null
RHSA-2023:2582
Red Hat Security Advisory: lua security update
lua: heap buffer overread
[ "cpe:/a:redhat:enterprise_linux:9::appstream", "cpe:/a:redhat:enterprise_linux:9::crb", "cpe:/o:redhat:enterprise_linux:9::baseos" ]
null
6.2
null
null
RHSA-2014:0321
Red Hat Security Advisory: net-snmp security and bug fix update
net-snmp: denial of service flaw in Linux implementation of ICMP-MIB
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
null
null
RHSA-2022:7171
Red Hat Security Advisory: kernel security and bug fix update
kernel: a use-after-free in cls_route filter implementation may lead to privilege escalation
[ "cpe:/o:redhat:rhel_aus:7.6::server", "cpe:/o:redhat:rhel_e4s:7.6::server", "cpe:/o:redhat:rhel_tus:7.6::server" ]
null
7.8
null
null
RHSA-2011:0677
Red Hat Security Advisory: openssl security, bug fix, and enhancement update
openssl: OCSP stapling vulnerability
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
null
null
RHSA-2024:8678
Red Hat Security Advisory: grafana security update
golang-fips: Golang FIPS zeroed buffer dompurify: nesting-based mutation XSS vulnerability
[ "cpe:/a:redhat:enterprise_linux:9::appstream" ]
null
8
null
null
RHSA-2024:7408
Red Hat Security Advisory: qemu-kvm security update
QEMU: Denial of Service via Improper Synchronization in QEMU NBD Server During Socket Closure
[ "cpe:/a:redhat:rhel_eus:9.2::appstream" ]
null
null
7.5
null
RHSA-2024:8726
Red Hat Security Advisory: firefox security update
firefox: thunderbird: Permission leak via embed or object elements firefox: thunderbird: Use-after-free in layout with accessibility firefox: thunderbird: Confusing display of origin for external protocol handler prompt firefox: thunderbird: XSS due to Content-Disposition being ignored in multipart/x-mixed-replace response firefox: thunderbird: Origin of permission prompt could be spoofed by long URL firefox: thunderbird: Cross origin video frame leak firefox: thunderbird: History interface could have been used to cause a Denial of Service condition in the browser firefox: thunderbird: Clipboard "paste" button persisted across tabs firefox: DOM push subscription message could hang Firefox firefox: thunderbird: Memory safety bugs fixed in Firefox 132, Thunderbird 132, Firefox ESR 128.4, and Thunderbird 128.4
[ "cpe:/a:redhat:enterprise_linux:9::appstream" ]
null
8.8
null
null
RHSA-2021:4172
Red Hat Security Advisory: qt5 security, bug fix, and enhancement update
qt: Out of bounds read in function QRadialFetchSimd from crafted svg file
[ "cpe:/a:redhat:enterprise_linux:8::appstream", "cpe:/a:redhat:enterprise_linux:8::crb" ]
null
7.1
null
null
RHSA-2024:2093
Red Hat Security Advisory: security update Logging for Red Hat OpenShift - 5.7.13
kernel: ext4: kernel bug in ext4_write_inline_data_end() gmp: Integer overflow and resultant buffer overflow via crafted input kernel: vmwgfx: NULL pointer dereference in vmw_cmd_dx_define_query less: missing quoting of shell metacharacters in LESSCLOSE handling kernel: GSM multiplexing race condition leads to privilege escalation kernel: Out of boundary write in perf_read_group() as result of overflow a perf_event's read_size curl: more POST-after-PUT confusion curl: cookie injection with none file curl: information disclosure by exploiting a mixed case flaw kernel: use-after-free in amdgpu_cs_wait_all_fences in drivers/gpu/drm/amd/amdgpu/amdgpu_cs.c kernel: CIFS Filesystem Decryption Improper Input Validation Remote Code Execution Vulnerability in function receive_encrypted_standard of client kernel: nf_tables: use-after-free vulnerability in the nft_verdict_init() function
[ "cpe:/a:redhat:logging:5.7::el8" ]
null
7.8
null
null
RHSA-2015:0430
Red Hat Security Advisory: virt-who security, bug fix, and enhancement update
virt-who: plaintext hypervisor passwords in world-readable /etc/sysconfig/virt-who configuration file
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
null
null
RHSA-2002:196
Red Hat Security Advisory: : Updated xinetd packages fix denial of service vulnerability
security flaw
[ "cpe:/o:redhat:linux:7.0", "cpe:/o:redhat:linux:7.1", "cpe:/o:redhat:linux:7.2", "cpe:/o:redhat:linux:7.3", "cpe:/o:redhat:linux:8.0" ]
null
null
null
null
RHSA-2012:1379
Red Hat Security Advisory: openstack-swift security update
Openstack-Swift: insecure use of python pickle()
[ "cpe:/a:redhat:openstack:1::el6" ]
null
null
null
null
RHSA-2021:3159
Red Hat Security Advisory: firefox security update
Mozilla: Uninitialized memory in a canvas object could have led to memory corruption Mozilla: Incorrect instruction reordering during JIT optimization Mozilla: Use-after-free media channels Mozilla: Race condition when resolving DNS names could have led to memory corruption Mozilla: Memory corruption as a result of incorrect style treatment Mozilla: Memory safety bugs fixed in Thunderbird 78.13
[ "cpe:/a:redhat:rhel_eus:8.1::appstream" ]
null
8.8
7.5
null
RHSA-2021:3317
Red Hat Security Advisory: microcode_ctl security, bug fix and enhancement update
hw: Special Register Buffer Data Sampling (SRBDS) hw: Vector Register Data Sampling hw: L1D Cache Eviction Sampling hw: Information disclosure issue in Intel SGX via RAPL interface hw: Vector Register Leakage-Active hw: Fast forward store predictor hw: vt-d related privilege escalation hw: improper isolation of shared resources in some Intel Processors hw: observable timing discrepancy in some Intel Processors
[ "cpe:/o:redhat:rhel_aus:7.6::server", "cpe:/o:redhat:rhel_e4s:7.6::server", "cpe:/o:redhat:rhel_tus:7.6::server" ]
null
2.8
6.5
null
RHSA-2021:4161
Red Hat Security Advisory: python-jinja2 security update
python-jinja2: ReDoS vulnerability in the urlize filter
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
7.5
null
null
RHSA-2020:3634
Red Hat Security Advisory: thunderbird security update
Mozilla: Attacker-induced prompt for extension installation Mozilla: Use-After-Free when aborting an operation
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
8.8
null
null
RHSA-2020:3014
Red Hat Security Advisory: dbus security update
dbus: denial of service via file descriptor leak
[ "cpe:/a:redhat:enterprise_linux:8::appstream", "cpe:/o:redhat:enterprise_linux:8::baseos" ]
null
6.5
null
null
RHSA-2013:0727
Red Hat Security Advisory: kvm security update
kernel: kvm: buffer overflow in handling of MSR_KVM_SYSTEM_TIME kernel: kvm: after free issue with the handling of MSR_KVM_SYSTEM_TIME kernel: kvm: out-of-bounds access in ioapic indirect register reads
[ "cpe:/a:redhat:rhel_virtualization:5::server" ]
null
null
null
null
RHSA-2019:1633
Red Hat Security Advisory: Red Hat OpenShift Container Platform 3.11 atomic-openshift security update
kubernetes: Incomplete fix for CVE-2019-1002101 allows for arbitrary file write via `kubectl cp`
[ "cpe:/a:redhat:openshift:3.11::el7" ]
null
null
5.3
null
RHSA-2024:10880
Red Hat Security Advisory: firefox security update
firefox: thunderbird: Select list elements could be shown over another site firefox: thunderbird: CSP Bypass and XSS Exposure via Web Compatibility Shims firefox: thunderbird: URL Bar Spoofing via Manipulated Punycode and Whitespace Characters firefox: thunderbird: Unhandled Exception in Add-on Signature Verification firefox: thunderbird: Improper Keypress Handling in Executable File Confirmation Dialog firefox: thunderbird: Memory safety bugs fixed in Firefox 133, Thunderbird 133, Firefox ESR 128.5, and Thunderbird 128.5
[ "cpe:/a:redhat:rhel_aus:8.6::appstream", "cpe:/a:redhat:rhel_e4s:8.6::appstream", "cpe:/a:redhat:rhel_tus:8.6::appstream" ]
null
8.8
null
null
RHSA-2009:1218
Red Hat Security Advisory: pidgin security update
pidgin: insufficient input validation in msn_slplink_process_msg()
[ "cpe:/a:redhat:rhel_productivity:5", "cpe:/o:redhat:enterprise_linux:3::as", "cpe:/o:redhat:enterprise_linux:3::desktop", "cpe:/o:redhat:enterprise_linux:3::es", "cpe:/o:redhat:enterprise_linux:3::ws", "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws", "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::client_workstation" ]
null
null
null
null
RHSA-2023:7096
Red Hat Security Advisory: python-cryptography security update
python-cryptography: memory corruption via immutable objects
[ "cpe:/o:redhat:enterprise_linux:8::baseos" ]
null
6.5
null
null
RHSA-2013:1286
Red Hat Security Advisory: Red Hat JBoss Fuse/A-MQ 6.0.0 patch 3
Console: Stored cross-site scripting (XSS)
[ "cpe:/a:redhat:jboss_amq:6.0.0", "cpe:/a:redhat:jboss_fuse:6.0.0" ]
null
null
null
null
RHSA-2010:0590
Red Hat Security Advisory: Red Hat Directory Server security and enhancement update
redhat-ds: setup script insecure .inf file permissions
[ "cpe:/a:redhat:directory_server:8::el4", "cpe:/a:redhat:directory_server:8::el5" ]
null
null
null
null
RHSA-2023:4889
Red Hat Security Advisory: DevWorkspace Operator 0.22 release
openssh: Remote code execution in ssh-agent PKCS#11 support
[ "cpe:/a:redhat:devworkspace:1.0::el8" ]
null
9.8
null
null
RHSA-2002:130
Red Hat Security Advisory: squid security update
security flaw security flaw security flaw
[ "cpe:/o:redhat:enterprise_linux:2.1::as" ]
null
null
null
null
RHSA-2007:0013
Red Hat Security Advisory: kernel security update
security flaw security flaw
[ "cpe:/o:redhat:enterprise_linux:2.1::as", "cpe:/o:redhat:enterprise_linux:2.1::es", "cpe:/o:redhat:enterprise_linux:2.1::ws" ]
null
null
null
null
RHSA-2022:7830
Red Hat Security Advisory: nodejs:14 security update
nodejs: Improper handling of URI Subject Alternative Names nodejs: Certificate Verification Bypass via String Injection nodejs: Incorrect handling of certificate subject and issuer fields nodejs: Prototype pollution via console.table properties nodejs: HTTP Request Smuggling due to incorrect parsing of header fields
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
6.5
null
null
RHSA-2008:0209
Red Hat Security Advisory: thunderbird security update
Mozilla products XPCNativeWrapper pollution universal XSS using event handlers chrome privilege via wrong principal browser engine crashes javascript crashes Referrer spoofing bug XUL popup spoofing
[ "cpe:/a:redhat:rhel_productivity:5", "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws", "cpe:/o:redhat:enterprise_linux:5::client" ]
null
null
null
null
RHSA-2022:5709
Red Hat Security Advisory: java-1.8.0-openjdk security, bug fix, and enhancement update
OpenJDK: class compilation issue (Hotspot, 8281859) OpenJDK: improper restriction of MethodHandle.invokeBasic() (Hotspot, 8281866) OpenJDK: integer truncation issue in Xalan-J (JAXP, 8285407)
[ "cpe:/a:redhat:enterprise_linux:9::appstream", "cpe:/a:redhat:enterprise_linux:9::crb" ]
null
7.5
null
null
RHSA-2023:5430
Red Hat Security Advisory: thunderbird security update
firefox: use-after-free in workers Mozilla: Out-of-bounds write in PathOps Mozilla: Use-after-free in Ion Compiler Mozilla: Memory safety bugs fixed in Firefox 118, Firefox ESR 115.3, and Thunderbird 115.3 libvpx: Heap buffer overflow in vp8 encoding in libvpx
[ "cpe:/a:redhat:rhel_eus:8.6::appstream" ]
null
8.8
null
null
RHEA-2018:0874
Red Hat Enhancement Advisory: linux-firmware bug fix and enhancement update
hw: cpu: speculative execution branch target injection
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
5.6
null
RHSA-2022:8880
Red Hat Security Advisory: java-1.8.0-ibm security update
OpenJDK: improper handling of long NTLM client hostnames (Security, 8286526) OpenJDK: insufficient randomization of JNDI DNS port numbers (JNDI, 8286910) OpenJDK: excessive memory allocation in X.509 certificate parsing (Security, 8286533) OpenJDK: HttpServer no connection count limit (Lightweight HTTP Server, 8286918)
[ "cpe:/a:redhat:rhel_extras:7" ]
null
5.3
null
null
RHSA-2020:1420
Red Hat Security Advisory: firefox security update
Mozilla: Uninitialized memory could be read when using the WebGL copyTexSubImage method Mozilla: Out of bounds write in GMPDecodeData when processing large images Mozilla: Memory safety bugs fixed in Firefox 75 and Firefox ESR 68.7
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
9.8
null
null
RHSA-2017:1581
Red Hat Security Advisory: freeradius security update
freeradius: TLS resumption authentication bypass
[ "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
7.4
null
RHSA-2024:0948
Red Hat Security Advisory: OpenShift Container Platform 4.13.35 security update
golang.org/x/net/http2: avoid quadratic complexity in HPACK decoding
[ "cpe:/a:redhat:openshift:4.13::el8", "cpe:/a:redhat:openshift:4.13::el9" ]
null
7.5
null
null
RHSA-2020:5581
Red Hat Security Advisory: python-XStatic-jQuery security update
jquery: Prototype pollution in object's prototype leading to denial of service, remote code execution, or property injection
[ "cpe:/a:redhat:openstack:13::el7" ]
null
null
5.6
null
RHSA-2009:1040
Red Hat Security Advisory: ntp security update
ntp: buffer overflow in ntpq ntp: remote arbitrary code execution vulnerability if autokeys is enabled
[ "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws", "cpe:/o:redhat:rhel_eus:4.7::as", "cpe:/o:redhat:rhel_eus:4.7::es" ]
null
null
null
null
RHSA-2024:7811
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.4 Security update
apache-avro: Schema parsing may trigger Remote Code Execution (RCE)
[ "cpe:/a:redhat:jboss_enterprise_application_platform:7.4::el7", "cpe:/a:redhat:jboss_enterprise_application_platform:7.4::el8", "cpe:/a:redhat:jboss_enterprise_application_platform:7.4::el9" ]
null
8.8
null
null
RHEA-2020:4954
Red Hat Enhancement Advisory: Red Hat Advanced Cluster Management for Kubernetes version 2.1 images
rhacm: certificate re-use in grcuiapi and topologyapi
[ "cpe:/a:redhat:acm:2.1::el8" ]
null
3.5
null
null
RHSA-2024:4336
Red Hat Security Advisory: security update Logging for Red Hat OpenShift - 5.6.21
golang: net/netip: Unexpected behavior from Is methods for IPv4-mapped IPv6 addresses
[ "cpe:/a:redhat:logging:5.6::el8" ]
null
6.7
null
null
RHBA-2022:5721
Red Hat Bug Fix Advisory: .NET 6.0 on RHEL 7 bugfix update
eventsource: Exposure of Sensitive Information
[ "cpe:/a:redhat:rhel_dotnet:6.0::el7" ]
null
9.3
null
null
RHSA-2025:2528
Red Hat Security Advisory: kernel security update
kernel: can: bcm: Fix UAF in bcm_proc_show() kernel: HID: core: zero-initialize the report buffer kernel: ALSA: usb-audio: Fix potential out-of-bound accesses for Extigy and Mbox devices
[ "cpe:/o:redhat:rhel_aus:8.4::baseos", "cpe:/o:redhat:rhel_e4s:8.4::baseos", "cpe:/o:redhat:rhel_tus:8.4::baseos" ]
null
5.8
null
null
RHSA-2003:146
Red Hat Security Advisory: kdebase security update
security flaw
[ "cpe:/o:redhat:enterprise_linux:2.1::as", "cpe:/o:redhat:enterprise_linux:2.1::aw", "cpe:/o:redhat:enterprise_linux:2.1::es", "cpe:/o:redhat:enterprise_linux:2.1::ws" ]
null
null
null
null
RHSA-2024:6462
Red Hat Security Advisory: Cost Management enhancement and security update
golang: net: malformed DNS message can cause infinite loop golang: net/netip: Unexpected behavior from Is methods for IPv4-mapped IPv6 addresses net/http: Denial of service due to improper 100-continue handling in net/http
[ "cpe:/a:redhat:cost_management:1::el8" ]
null
5.9
null
null
RHSA-2021:2144
Red Hat Security Advisory: docker security update
runc: vulnerable to symlink exchange attack
[ "cpe:/a:redhat:rhel_extras_other:7" ]
null
7.5
null
null
RHSA-2024:0753
Red Hat Security Advisory: linux-firmware security update
hw: amd: INVD instruction may lead to a loss of SEV-ES guest machine memory integrity problem
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
5.3
null
null
RHSA-2016:2807
Red Hat Security Advisory: Red Hat JBoss Web Server 2.1.2 security update for Tomcat 7
tomcat: Session fixation tomcat: CSRF token leak tomcat: security manager bypass via StatusManagerServlet tomcat: Security Manager bypass via persistence mechanisms tomcat: security manager bypass via setGlobalContext() tomcat: Usage of vulnerable FileUpload package can result in denial of service
[ "cpe:/a:redhat:jboss_enterprise_web_server:2::el6", "cpe:/a:redhat:jboss_enterprise_web_server:2::el7" ]
null
null
7.5
null
RHSA-2023:1525
Red Hat Security Advisory: OpenShift Container Platform 4.9.59 security update
mongo-go-driver: specific cstrings input may not be properly validated
[ "cpe:/a:redhat:openshift:4.9::el8" ]
null
6.5
null
null
RHSA-2024:1865
Red Hat Security Advisory: Red Hat Single Sign-On 7.6.8 Operator enhancement and security update
keycloak: Log Injection during WebAuthn authentication or registration
[ "cpe:/a:redhat:rhosemc:1.0::el8" ]
null
5.3
null
null
RHSA-2012:0468
Red Hat Security Advisory: libtiff security update
libtiff: Heap-buffer overflow due to TileSize calculation when parsing tiff files
[ "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::client_workstation", "cpe:/o:redhat:enterprise_linux:5::server", "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
null
null
RHSA-2017:0345
Red Hat Security Advisory: kernel security update
kernel: use after free in dccp protocol
[ "cpe:/o:redhat:rhel_aus:6.4::server" ]
null
null
7.8
null
RHSA-2020:1962
Red Hat Security Advisory: python-twisted-web security update
python-twisted: HTTP request smuggling when presented with two Content-Length headers
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
7.3
null
null
RHSA-2022:5771
Red Hat Security Advisory: thunderbird security update
Mozilla: Memory safety bugs fixed in Firefox 103 and 102.1 Mozilla: Directory indexes for bundled resources reflected URL parameters Mozilla: Mouse Position spoofing with CSS transforms
[ "cpe:/a:redhat:rhel_eus:8.2::appstream" ]
null
7.5
6.1
null
RHSA-2008:0233
Red Hat Security Advisory: kernel security and bug fix update
missing sanity check in xen block backend driver kernel: insufficient range checks in fault handlers with mremap Kernel doesn't clear DF for signal handlers kernel: race condition in dnotify (local DoS, local roothole possible) [xen-ia64] Dom0 panic while we run ftp test tool between HVM and Dom0. kernel: add rcu_read_lock() to fcheck() in both dnotify, locks.c and fix fcntl store/load race in locks.c
[ "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
RHSA-2024:1251
Red Hat Security Advisory: kpatch-patch security update
kernel: ktls overwrites readonly memory pages when using function splice with a ktls socket as destination
[ "cpe:/o:redhat:enterprise_linux:9::baseos" ]
null
7
null
null
RHSA-2015:1409
Red Hat Security Advisory: sudo security, bug fix, and enhancement update
sudo: unsafe handling of TZ environment variable
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
null
null
RHSA-2020:5054
Red Hat Security Advisory: skopeo security update
golang.org/x/text: possibility to trigger an infinite loop in encoding/unicode could lead to crash
[ "cpe:/a:redhat:rhel_extras_other:7" ]
null
7.5
null
null
RHSA-2018:2791
Red Hat Security Advisory: kernel security and bug fix update
kernel: TCP segments with random offsets allow a remote denial of service (SegmentSmack) kernel: IP fragments with random offsets allow a remote denial of service (FragmentSmack) kernel: mm: use-after-free in do_get_mempolicy function allows local DoS or other unspecified impact
[ "cpe:/o:redhat:rhel_aus:6.4::server" ]
null
null
5.5
null
RHSA-2024:3958
Red Hat Security Advisory: firefox security update
Mozilla: Use-after-free in JavaScript object transplant Mozilla: External protocol handlers leaked by timing attack Mozilla: Sandboxed iframes were able to bypass sandbox restrictions to open a new window Mozilla: Cross-Origin Image leak via Offscreen Canvas Mozilla: Memory Corruption in Text Fragments Mozilla: Memory safety bugs fixed in Firefox 127, Firefox ESR 115.12, and Thunderbird 115.12 Mozilla: Use-after-free in networking
[ "cpe:/a:redhat:rhel_e4s:9.0::appstream" ]
null
7.5
null
null
RHSA-2024:8112
Red Hat Security Advisory: buildah security update
Podman: Buildah: cri-o: FIPS Crypto-Policy Directory Mounting Issue in containers/common Go Library go/parser: golang: Calling any of the Parse functions containing deeply nested literals can cause a panic/stack exhaustion encoding/gob: golang: Calling Decoder.Decode on a message which contains deeply nested structures can cause a panic due to stack exhaustion go/build/constraint: golang: Calling Parse on a "// +build" build tag line with deeply nested expressions can cause a panic due to stack exhaustion
[ "cpe:/a:redhat:enterprise_linux:9::appstream" ]
null
5.9
null
null
RHSA-2014:1765
Red Hat Security Advisory: php54-php security update
php: heap-based buffer over-read in DateInterval file: extensive backtracking in awk rule regular expression file: cdf_read_short_sector insufficient boundary check file: cdf_unpack_summary_info() excessive looping DoS file: CDF property info parsing nelements infinite loop file: unrestricted recursion in handling of indirect type rules file: out-of-bounds access in search rules with offsets from input file gd: NULL pointer dereference in gdImageCreateFromXpm() file: mconvert incorrect handling of truncated pascal string size file: cdf_check_stream_offset insufficient boundary check file: cdf_count_chain insufficient boundary check file: cdf_read_property_info insufficient boundary check php: unserialize() SPL ArrayObject / SPLObjectStorage type confusion flaw file: unrestricted regular expression matching file: incomplete fix for CVE-2012-1571 in cdf_read_property_info php: multiple buffer over-reads in php_parserr php: xmlrpc ISO8601 date format parsing out-of-bounds read in mkgmtime() php: integer overflow in unserialize() php: heap corruption issue in exif_thumbnail() file: out-of-bounds read in elf note headers php: heap-based buffer overflow in DNS TXT record parsing php: SPL Iterators use-after-free php: ArrayIterator use-after-free due to object change during sorting php: type confusion issue in phpinfo() leading to information leak php: gd extension NUL byte injection in file names
[ "cpe:/a:redhat:rhel_software_collections:1::el6", "cpe:/a:redhat:rhel_software_collections:1::el7" ]
null
null
null
null
RHSA-2021:0223
Red Hat Security Advisory: sudo security update
sudo: Heap buffer overflow in argument parsing
[ "cpe:/o:redhat:rhel_eus:7.6::computenode", "cpe:/o:redhat:rhel_eus:7.6::server" ]
null
7.8
null
null
RHSA-2024:4108
Red Hat Security Advisory: kernel security and bug fix update
kernel: net: hns3: do not allow call hns3_nic_net_open repeatedly kernel: xen-netfront: Add missing skb_mark_for_recycle kernel: netfilter: nf_tables: use timestamp to check for set element timeout kernel: netfilter: nft_flow_offload: reset dst in route object after setting up flow kernel: smb: client: fix UAF in smb2_reconnect_server() kernel: net: ena: Fix incorrect descriptor free behavior kernel: net/mlx5: Properly link new fs rules into the tree kernel: octeontx2-af: avoid off-by-one read from userspace
[ "cpe:/a:redhat:rhel_eus:9.2::appstream", "cpe:/a:redhat:rhel_eus:9.2::crb", "cpe:/o:redhat:rhel_eus:9.2::baseos" ]
null
4.4
null
null
RHSA-2010:0754
Red Hat Security Advisory: cups security update
xpdf: uninitialized Gfx::parser pointer dereference
[ "cpe:/o:redhat:enterprise_linux:3::as", "cpe:/o:redhat:enterprise_linux:3::desktop", "cpe:/o:redhat:enterprise_linux:3::es", "cpe:/o:redhat:enterprise_linux:3::ws" ]
null
null
null
null
RHSA-2023:6524
Red Hat Security Advisory: dnsmasq security and bug fix update
dnsmasq: default maximum EDNS.0 UDP packet size was set to 4096 but should be 1232
[ "cpe:/a:redhat:enterprise_linux:9::appstream" ]
null
7.5
null
null
RHSA-2005:141
Red Hat Security Advisory: rh-postgresql security update
security flaw security flaw security flaw security flaw security flaw
[ "cpe:/o:redhat:enterprise_linux:3::as", "cpe:/o:redhat:enterprise_linux:3::desktop", "cpe:/o:redhat:enterprise_linux:3::es", "cpe:/o:redhat:enterprise_linux:3::ws" ]
null
null
null
null
RHSA-2016:0049
Red Hat Security Advisory: java-1.8.0-openjdk security update
TLS 1.2 Transcipt Collision attacks against MD5 in key exchange protocol (SLOTH) OpenJDK: URL deserialization inconsistencies (Networking, 8059054) OpenJDK: logging of RMI connection secrets (JMX, 8130710) OpenJDK: insufficient enforcement of totalEntitySizeLimit (JAXP, 8133962) OpenJDK: PBE incorrect key lengths (Libraries, 8138589) OpenJDK: incorrect boundary check in JPEG decoder (AWT, 8139017) ICU: integer signedness issue in IndicRearrangementProcessor (OpenJDK 2D, 8140543)
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
null
null
RHSA-2010:0018
Red Hat Security Advisory: dbus security update
dbus: invalid fix for CVE-2008-3834
[ "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::client_workstation", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
RHSA-2010:0891
Red Hat Security Advisory: pam security update
pam: pam_xauth missing return value checks from setuid() and similar calls pam: pam_env and pam_mail accessing users' file with root privileges pam: pam_namespace executes namespace.init with service's environment pam: pam_xauth: Does not check if certain ACL file is a regular file pam: pam_env: reading ~/.pam_environment is security risk
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
null
null
RHSA-2022:0108
Red Hat Security Advisory: ansible-runner security and bug fix update
Ansible: Improper shell escaping in ansible-runner
[ "cpe:/a:redhat:ansible_automation_platform:2.0::el8" ]
null
7.3
null
null
RHSA-2018:0270
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 6.4.19 security update
artemis/hornetq: memory exhaustion via UDP and JGroups discovery tomcat: Remote Code Execution bypass for CVE-2017-12615 jboss-remoting: High CPU Denial of Service
[ "cpe:/a:redhat:jboss_enterprise_application_platform:6::el6" ]
null
null
4.3
null
RHSA-2010:0029
Red Hat Security Advisory: krb5 security update
krb: KDC integer overflows in AES and RC4 decryption routines (MITKRB5-SA-2009-004)
[ "cpe:/o:redhat:enterprise_linux:3::as", "cpe:/o:redhat:enterprise_linux:3::desktop", "cpe:/o:redhat:enterprise_linux:3::es", "cpe:/o:redhat:enterprise_linux:3::ws", "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws", "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::client_workstation", "cpe:/o:redhat:enterprise_linux:5::server", "cpe:/o:redhat:rhel_eus:4.7::as", "cpe:/o:redhat:rhel_eus:4.7::es", "cpe:/o:redhat:rhel_eus:5.2", "cpe:/o:redhat:rhel_eus:5.3" ]
null
null
null
null
RHSA-2023:7160
Red Hat Security Advisory: opensc security and bug fix update
opensc: buffer overrun vulnerability in pkcs15 cardos_have_verifyrc_package
[ "cpe:/o:redhat:enterprise_linux:8::baseos" ]
null
6.3
null
null
RHSA-2023:4789
Red Hat Security Advisory: kernel security, bug fix, and enhancement update
kernel: when setting font with malicious data by ioctl PIO_FONT, kernel will write memory out of bounds kernel: use-after-free in l2cap_connect and l2cap_le_connect_req in net/bluetooth/l2cap_core.c kernel: save/restore speculative MSRs during S3 suspend/resume kernel: Use-after-free vulnerability in the Linux Kernel traffic control index filter Kernel: bluetooth: Unauthorized management command execution kernel: OOB access in the Linux kernel's XFS subsystem kernel: UAF in nftables when nft_set_lookup_global triggered after handling named and anonymous sets in batch requests hw: amd: Cross-Process Information Leak kernel: tls: race condition in do_tls_getsockopt may lead to use-after-free or NULL pointer dereference kernel: cls_flower: out-of-bounds write in fl_set_geneve_opt() kernel: buffer overflow in ceph file net/ceph/messenger_v2.c
[ "cpe:/a:redhat:rhel_eus:8.6::crb", "cpe:/o:redhat:rhel_eus:8.6::baseos", "cpe:/o:redhat:rhev_hypervisor:4.4::el8" ]
null
8.8
null
null
RHSA-2024:3885
Red Hat Security Advisory: OpenShift Container Platform 4.13.44 bug fix and security update
graphql-go: Denial of service via stack overflow panics golang: net/http, x/net/http2: unlimited number of CONTINUATION frames causes DoS
[ "cpe:/a:redhat:openshift:4.13::el8", "cpe:/a:redhat:openshift:4.13::el9" ]
null
7.5
null
null
RHSA-2024:11216
Red Hat Security Advisory: containernetworking-plugins security update
encoding/gob: golang: Calling Decoder.Decode on a message which contains deeply nested structures can cause a panic due to stack exhaustion
[ "cpe:/a:redhat:enterprise_linux:9::appstream" ]
null
7.5
null
null
RHSA-2013:0662
Red Hat Security Advisory: kernel security and bug fix update
kernel: race condition with PTRACE_SETREGS
[ "cpe:/o:redhat:rhel_eus:6.3::server" ]
null
null
null
null
RHSA-2023:1742
Red Hat Security Advisory: nodejs:14 security, bug fix, and enhancement update
glob-parent: Regular Expression Denial of Service nodejs: Improper handling of URI Subject Alternative Names nodejs: Certificate Verification Bypass via String Injection nodejs: Incorrect handling of certificate subject and issuer fields minimist: prototype pollution node-fetch: exposure of sensitive information to an unauthorized actor nodejs-minimatch: ReDoS via the braceExpand function c-ares: buffer overflow in config_sortlist() due to missing string length check nodejs: Prototype pollution via console.table properties express: "qs" prototype poisoning causes the hang of the node process http-cache-semantics: Regular Expression Denial of Service (ReDoS) vulnerability nodejs: HTTP Request Smuggling due to incorrect parsing of header fields decode-uri-component: improper input validation resulting in DoS nodejs: DNS rebinding in inspect via invalid octal IP address Node.js: Permissions policies can be bypassed via process.mainModule Node.js: insecure loading of ICU data through ICU_DATA environment variable
[ "cpe:/a:redhat:rhel_eus:8.6::appstream" ]
null
4.2
null
null
RHSA-2010:0950
Red Hat Security Advisory: apr-util security update
apr-util: high memory consumption in apr_brigade_split_line()
[ "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws", "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::client_workstation", "cpe:/o:redhat:enterprise_linux:5::server", "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
null
null
RHSA-2021:4426
Red Hat Security Advisory: ncurses security update
ncurses: heap-based buffer overflow in the _nc_find_entry function in tinfo/comp_hash.c ncurses: heap-based buffer overflow in the fmt_entry function in tinfo/comp_hash.c
[ "cpe:/o:redhat:enterprise_linux:8::baseos" ]
null
5.4
5.3
null
RHSA-2020:3706
Red Hat Security Advisory: openstack-nova security update
openstack-nova: Soft reboot after live-migration reverts instance to original source domain XML
[ "cpe:/a:redhat:openstack:15::el8" ]
null
8.3
null
null
RHSA-2025:1757
Red Hat Security Advisory: mysql:8.0 security update
mysql: Thread Pooling unspecified vulnerability (CPU Jan 2025)
[ "cpe:/a:redhat:rhel_eus:8.8::appstream" ]
null
7.5
null
null
RHSA-2024:5001
Red Hat Security Advisory: httpd security update
httpd: Encoding problem in mod_proxy httpd: Potential SSRF in mod_rewrite
[ "cpe:/a:redhat:rhel_eus:9.2::appstream" ]
null
7.4
null
null
RHSA-2020:4277
Red Hat Security Advisory: kernel security update
kernel: net: bluetooth: type confusion while processing AMP packets kernel: net: bluetooth: information leak when processing certain AMP packets
[ "cpe:/o:redhat:rhel_eus:7.7::computenode", "cpe:/o:redhat:rhel_eus:7.7::server" ]
null
5.3
null
null
RHSA-2023:5249
Red Hat Security Advisory: ncurses security update
ncurses: Local users can trigger security-relevant memory corruption via malformed data
[ "cpe:/o:redhat:enterprise_linux:8::baseos" ]
null
7.8
null
null
RHSA-2012:0734
Red Hat Security Advisory: java-1.6.0-sun security update
JDK: unspecified vulnerability fixed in 6u33 and 7u5 (Deployment) OpenJDK: improper protection of CORBA data models (CORBA, 7079902) OpenJDK: fontmanager layout lookup code memory corruption (2D, 7143617) OpenJDK: SynthLookAndFeel application context bypass (Swing, 7143614) OpenJDK: insecure temporary file permissions (JRE, 7143606) OpenJDK: CRL and certificate extensions handling improvements (Security, 7143872) OpenJDK: mutable repository identifiers in generated stub code (CORBA, 7143851) JDK: unspecified vulnerability fixed in 6u33 and 7u5 (Deployment) JDK: unspecified vulnerability fixed in 6u33 and 7u5 (Deployment) OpenJDK: insufficient field accessibility checks (HotSpot, 7152811) OpenJDK: XML parsing infinite loop (JAXP, 7157609) OpenJDK: insufficient invokespecial <init> verification (HotSpot, 7160757)
[ "cpe:/a:redhat:rhel_extras:5::client", "cpe:/a:redhat:rhel_extras:5::server", "cpe:/a:redhat:rhel_extras:6" ]
null
null
null
null
RHSA-2009:1466
Red Hat Security Advisory: kernel security and bug fix update
kernel: information leak in sigaltstack kernel: execve: must clear current->clear_child_tid
[ "cpe:/o:redhat:rhel_eus:5.3" ]
null
null
null
null
RHSA-2020:2342
Red Hat Security Advisory: qemu-kvm-rhev bug fix update
QEMU: slirp: heap buffer overflow during packet reassembly QEMU: slirp: OOB buffer access while emulating tcp protocols in tcp_emu() QEMU: Slirp: potential OOB access due to unsafe snprintf() usages
[ "cpe:/a:redhat:rhev_manager:4.2" ]
null
5.6
7
null
RHSA-2013:1540
Red Hat Security Advisory: evolution security, bug fix, and enhancement update
evolution: incorrect selection of recipient gpg public key for encrypted mail
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
null
null
RHSA-2024:6144
Red Hat Security Advisory: postgresql security update
postgresql: PostgreSQL relation replacement during pg_dump executes arbitrary SQL
[ "cpe:/a:redhat:rhel_e4s:9.0::appstream" ]
null
7.5
null
null
RHSA-2021:3254
Red Hat Security Advisory: rh-python38 security, bug fix, and enhancement update
python-cryptography: Bleichenbacher timing oracle attack against RSA decryption python: Unsafe use of eval() on data retrieved via HTTP in the test suite python-lxml: mXSS due to the use of improper parser python-jinja2: ReDoS vulnerability in the urlize filter python-cryptography: Large inputs for symmetric encryption can trigger integer overflow leading to buffer overflow python: Stack-based buffer overflow in PyCArg_repr in _ctypes/callproc.c python: Information disclosure via pydoc python-pip: Incorrect handling of unicode separators in git references python: urllib: Regular expression DoS in AbstractBasicAuthHandler python: ftplib should not use the host from the PASV response python-babel: Relative path traversal allows attacker to load arbitrary locale files and execute arbitrary code python: Web cache poisoning via urllib.parse.parse_qsl and urllib.parse.parse_qs by using a semicolon in query parameters python-lxml: Missing input sanitization for formaction HTML5 attributes may lead to XSS python-ipaddress: Improper input validation of octal strings python-urllib3: ReDoS in the parsing of authority part of URL python-babel: Relative path traversal allows attacker to load arbitrary locale files and execute arbitrary code python: urllib.parse does not sanitize URLs containing ASCII newline and tabs
[ "cpe:/a:redhat:rhel_software_collections:3::el7" ]
null
5.3
null
null
RHBA-2021:0639
Red Hat Bug Fix Advisory: virt:8.3 bug fix and enhancement update
QEMU: infinite loop in e1000e_write_packet_to_guest() in hw/net/e1000e_core.c QEMU: assertion failure through usb_packet_unmap() in hw/usb/hcd-ehci.c QEMU: net: an assert failure via eth_get_gso_type QEMU: heap buffer overflow in msix_table_mmio_write() in hw/pci/msix.c QEMU: ide: atapi: OOB access while processing read commands QEMU: virtiofsd: potential privileged host device access from guest
[ "cpe:/a:redhat:advanced_virtualization:8.3::el8" ]
null
7.5
null
null
RHSA-2020:3911
Red Hat Security Advisory: python security update
python: XSS vulnerability in the documentation XML-RPC server in server_title field
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
6.1
null
null
RHSA-2023:0264
Red Hat Security Advisory: Red Hat OpenShift (Logging Subsystem) security update
jackson-databind: denial of service via a large depth of nested objects golang: archive/tar: github.com/vbatts/tar-split: unbounded memory consumption when reading headers golang: net/http/httputil: ReverseProxy should not forward unparseable query parameters golang: net/http: handle server errors after sending GOAWAY golang: net/url: JoinPath does not strip relative path components in all circumstances loader-utils: prototype pollution in function parseQuery in parseQuery.js golang: regexp/syntax: limit memory used by parsing regexps jackson-databind: deep wrapper array nesting wrt UNWRAP_SINGLE_VALUE_ARRAYS jackson-databind: use of deeply nested arrays
[ "cpe:/a:redhat:logging:5.6::el8" ]
null
7.5
null
null
RHSA-2024:5410
Red Hat Security Advisory: Red Hat Product OCP Tools 4.12 OpenShift Jenkins security update
jenkins: Arbitrary file read vulnerability through agent connections can lead to RCE
[ "cpe:/a:redhat:ocp_tools:4.12::el8" ]
null
8.8
null
null
RHSA-2025:2475
Red Hat Security Advisory: kernel security update
kernel: HID: core: zero-initialize the report buffer kernel: ALSA: usb-audio: Fix potential out-of-bound accesses for Extigy and Mbox devices
[ "cpe:/a:redhat:rhel_eus:9.2::appstream", "cpe:/a:redhat:rhel_eus:9.2::crb", "cpe:/o:redhat:rhel_eus:9.2::baseos" ]
null
5.8
null
null
RHSA-2021:3529
Red Hat Security Advisory: Red Hat Single Sign-On 7.4.9 security update on RHEL 8
jackson-dataformat-cbor: Unchecked allocation of byte buffer can cause a java.lang.OutOfMemoryError exception keycloak: X509 Direct Grant Auth does not verify certificate timestamp validity keycloak: Brute force attack is possible even after the account lockout keycloak: Anyone can register a new device when there is no device registered for passwordless login keycloak-model-infinispan: authenticationSessions map in RootAuthenticationSessionEntity grows boundlessly could lead to a DoS attack
[ "cpe:/a:redhat:red_hat_single_sign_on:7::el8" ]
null
7.5
null
null