id
stringlengths 13
15
| title
stringlengths 29
176
| description
stringlengths 8
32.1k
| cpes
sequencelengths 0
20
| cvss_v4_0
null | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
null |
---|---|---|---|---|---|---|---|
RHSA-2014:0108 | Red Hat Security Advisory: kernel security and bug fix update | kernel: xen: Lock order reversal between page allocation and grant table locks | [
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2007:0937 | Red Hat Security Advisory: kernel security update | x86_64 syscall vulnerability | [
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2023:0402 | Red Hat Security Advisory: bind security update | bind: DNS forwarders - cache poisoning vulnerability bind: processing large delegations may severely degrade resolver performance | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 5.3 | null | null |
RHSA-2021:0740 | Red Hat Security Advisory: nodejs:12 security update | nodejs: HTTP2 'unknownProtocol' cause DoS by resource exhaustion nodejs: DNS rebinding in --inspect | [
"cpe:/a:redhat:rhel_eus:8.2::appstream"
] | null | 7.5 | null | null |
RHSA-2024:1994 | Red Hat Security Advisory: container-tools:rhel8 security update | golang: golang.org/x/text/language: ParseAcceptLanguage takes a long time to parse complex tags | [
"cpe:/a:redhat:rhel_eus:8.6::appstream"
] | null | 7.5 | null | null |
RHSA-2018:2714 | Red Hat Security Advisory: openstack-nova security and bug fix update | openstack-nova: Swapping encrypted volumes can allow an attacker to corrupt the LUKS header causing a denial of service in the host | [
"cpe:/a:redhat:openstack:10::el7"
] | null | null | 6.5 | null |
RHSA-2022:4729 | Red Hat Security Advisory: firefox security update | Mozilla: Untrusted input used in JavaScript object indexing, leading to prototype pollution Mozilla: Prototype pollution in Top-Level Await implementation | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 8.8 | null |
RHSA-2021:2988 | Red Hat Security Advisory: varnish:6 security update | varnish: HTTP/2 request smuggling attack via a large Content-Length header for a POST request | [
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:rhel_eus:8.1::appstream",
"cpe:/a:redhat:rhel_eus:8.2::appstream"
] | null | 8.1 | null | null |
RHSA-2017:3227 | Red Hat Security Advisory: openstack-aodh security update | openstack-aodh: Aodh can be used to launder Keystone trusts | [
"cpe:/a:redhat:openstack:10::el7"
] | null | null | 4.9 | null |
RHSA-2002:123 | Red Hat Security Advisory: ghostscript security update | security flaw | [
"cpe:/o:redhat:enterprise_linux:2.1::as"
] | null | null | null | null |
RHSA-2002:255 | Red Hat Security Advisory: webalizer security update | security flaw | [
"cpe:/o:redhat:enterprise_linux:2.1::as",
"cpe:/o:redhat:enterprise_linux:2.1::aw"
] | null | null | null | null |
RHSA-2024:6998 | Red Hat Security Advisory: kernel security update | kernel: cgroup: cgroup_get_from_id() must check the looked-up kn is a directory kernel: nvme-tcp: fix UAF when detecting digest errors kernel: net: fix possible store tearing in neigh_periodic_work() kernel: fs/proc: do_task_stat: use sig->stats_lock to gather the threads/children stats kernel: mptcp: ensure snd_nxt is properly initialized on connect kernel: wifi: mac80211: Avoid address calculations via out of bounds array indexing | [
"cpe:/o:redhat:rhel_aus:8.6::baseos",
"cpe:/o:redhat:rhel_e4s:8.6::baseos",
"cpe:/o:redhat:rhel_tus:8.6::baseos"
] | null | 7.8 | null | null |
RHSA-2007:0720 | Red Hat Security Advisory: cups security update | xpdf integer overflow | [
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws",
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws",
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2022:6703 | Red Hat Security Advisory: firefox security update | Mozilla: Out of bounds read when decoding H264 Mozilla: Content-Security-Policy base-uri bypass Mozilla: Incoherent instruction cache when building WASM on ARM64 Mozilla: Bypassing Secure Context restriction for cookies with __Host and __Secure prefix Mozilla: Bypassing FeaturePolicy restrictions on transient pages Mozilla: Data-race when parsing non-UTF-8 URLs in threads Mozilla: Memory safety bugs fixed in Firefox 105 and Firefox ESR 102.3 | [
"cpe:/a:redhat:rhel_e4s:8.1::appstream"
] | null | 8.8 | 7.5 | null |
RHSA-2017:0031 | Red Hat Security Advisory: kernel security and bug fix update | kernel: Use-after-free in the recvmmsg exit path | [
"cpe:/o:redhat:rhel_eus:6.7::computenode",
"cpe:/o:redhat:rhel_eus:6.7::server"
] | null | null | 8.1 | null |
RHSA-2018:2945 | Red Hat Security Advisory: Red Hat OpenShift Application Runtimes Spring Boot 1.5.16 update | tomcat: A bug in the UTF-8 decoder can lead to DoS | [
"cpe:/a:redhat:openshift_application_runtimes:1.0"
] | null | null | 7.5 | null |
RHSA-2022:5620 | Red Hat Security Advisory: 389-ds:1.4 security update | 389-ds-base: sending crafted message could result in DoS 389-ds-base: expired password was still allowed to access the database | [
"cpe:/a:redhat:rhel_eus:8.4::appstream"
] | null | 5.7 | null | null |
RHSA-2012:1346 | Red Hat Security Advisory: flash-plugin security update | flash-plugin: multiple code-execution flaws (APSB12-22) flash-plugin: multiple code-execution flaws (APSB12-22) flash-plugin: multiple code-execution flaws (APSB12-22) flash-plugin: multiple code-execution flaws (APSB12-22) flash-plugin: multiple code-execution flaws (APSB12-22) flash-plugin: multiple code-execution flaws (APSB12-22) flash-plugin: multiple code-execution flaws (APSB12-22) flash-plugin: multiple code-execution flaws (APSB12-22) flash-plugin: multiple code-execution flaws (APSB12-22) flash-plugin: multiple code-execution flaws (APSB12-22) flash-plugin: multiple code-execution flaws (APSB12-22) flash-plugin: multiple code-execution flaws (APSB12-22) flash-plugin: multiple code-execution flaws (APSB12-22) flash-plugin: multiple code-execution flaws (APSB12-22) flash-plugin: multiple code-execution flaws (APSB12-22) flash-plugin: multiple code-execution flaws (APSB12-22) flash-plugin: multiple code-execution flaws (APSB12-22) flash-plugin: multiple code-execution flaws (APSB12-22) flash-plugin: multiple code-execution flaws (APSB12-22) flash-plugin: multiple code-execution flaws (APSB12-22) flash-plugin: multiple code-execution flaws (APSB12-22) flash-plugin: multiple code-execution flaws (APSB12-22) flash-plugin: multiple code-execution flaws (APSB12-22) flash-plugin: multiple code-execution flaws (APSB12-22) flash-plugin: multiple code-execution flaws (APSB12-22) flash-plugin: multiple code-execution flaws (APSB12-22) flash-plugin: multiple code-execution flaws (APSB12-22) flash-plugin: multiple code-execution flaws (APSB12-22) flash-plugin: multiple code-execution flaws (APSB12-22) | [
"cpe:/a:redhat:rhel_extras:5::client",
"cpe:/a:redhat:rhel_extras:5::server",
"cpe:/a:redhat:rhel_extras:6"
] | null | null | null | null |
RHSA-2024:7432 | Red Hat Security Advisory: kpatch-patch-5_14_0-427_13_1 and kpatch-patch-5_14_0-427_31_1 security update | kernel: wifi: mac80211: Avoid address calculations via out of bounds array indexing | [
"cpe:/o:redhat:enterprise_linux:9::baseos"
] | null | 7.8 | null | null |
RHSA-2025:3543 | Red Hat Security Advisory: Red Hat Build of Apache Camel 4.8.5 for Spring Boot security update. | json-smart: Potential DoS via stack exhaustion (incomplete fix for CVE-2023-1370) smallrye-fault-tolerance: SmallRye Fault Tolerance spring-security-core: Spring Security BCryptPasswordEncoder does not enforce maximum password length io.netty:netty-handler: SslHandler doesn't correctly validate packets which can lead to native crash when using native SSLEngine camel-http: org.apache.camel: bypass of header filters via specially crafted response | [
"cpe:/a:redhat:apache_camel_spring_boot:4.8.5"
] | null | 6.3 | null | null |
RHSA-2024:10236 | Red Hat Security Advisory: Red Hat OpenShift Dev Spaces 3.17.0 release | nodejs-ip: arbitrary code execution via the isPublic() function jsonpath-plus: Remote Code Execution in jsonpath-plus via Improper Input Sanitization node-ip: Incomplete fix for CVE-2023-42282 go/parser: golang: Calling any of the Parse functions containing deeply nested literals can cause a panic/stack exhaustion encoding/gob: golang: Calling Decoder.Decode on a message which contains deeply nested structures can cause a panic due to stack exhaustion path-to-regexp: Backtracking regular expressions cause ReDoS find-my-way: ReDoS vulnerability in multiparametric routes dompurify: nesting-based mutation XSS vulnerability elliptic: Missing Validation in Elliptic's EDDSA Signature Verification | [
"cpe:/a:redhat:openshift_devspaces:3::el8"
] | null | 8.2 | null | null |
RHSA-2024:0248 | Red Hat Security Advisory: java-21-openjdk security update | OpenJDK: array out-of-bounds access due to missing range check in C1 compiler (8314468) OpenJDK: JVM class file verifier flaw allows unverified bytecode execution (8314295) OpenJDK: range check loop optimization issue (8314307) OpenJDK: logging of digital signature private keys (8316976) OpenJDK: RSA padding issue and timing side-channel attack against TLS (8317547) | [
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb"
] | null | 7.4 | null | null |
RHSA-2017:0340 | Red Hat Security Advisory: Red Hat Enterprise Linux 5 One-Month Retirement Notice | This is the One-Month notification for the retirement of Red Hat Enterprise Linux 5. This notification applies only to those customers subscribed to the channel for Red Hat Enterprise Linux 5. | [
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2003:006 | Red Hat Security Advisory: : : : Updated libpng packages fix buffer overflow | security flaw | [
"cpe:/o:redhat:linux:6.2",
"cpe:/o:redhat:linux:7.0",
"cpe:/o:redhat:linux:7.1",
"cpe:/o:redhat:linux:7.2",
"cpe:/o:redhat:linux:7.3",
"cpe:/o:redhat:linux:8.0"
] | null | null | null | null |
RHSA-2013:0848 | Red Hat Security Advisory: Red Hat Network Satellite spacewalk-backend security update | Satellite: Inter-Satellite Sync (ISS) does not require authentication/authorization | [
"cpe:/a:redhat:network_satellite:5.3::el5",
"cpe:/a:redhat:network_satellite:5.4::el5",
"cpe:/a:redhat:network_satellite:5.4::el6",
"cpe:/a:redhat:network_satellite:5.5::el5",
"cpe:/a:redhat:network_satellite:5.5::el6"
] | null | null | null | null |
RHSA-2006:0713 | Red Hat Security Advisory: python security update | python repr unicode buffer overflow | [
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws",
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2023:6243 | Red Hat Security Advisory: openshift-gitops-kam security update | golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487) | [
"cpe:/a:redhat:openshift_gitops:1.10::el8"
] | null | 7.5 | null | null |
RHSA-2020:0570 | Red Hat Security Advisory: openjpeg2 security update | openjpeg: heap-based buffer overflow in pj_t1_clbl_decode_processor in openjp2/t1.c | [
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb"
] | null | 8.8 | null | null |
RHSA-2002:041 | Red Hat Security Advisory: : Updated mod_ssl packages available | security flaw | [
"cpe:/o:redhat:linux:7.0",
"cpe:/o:redhat:linux:7.1",
"cpe:/o:redhat:linux:7.2"
] | null | null | null | null |
RHSA-2019:3701 | Red Hat Security Advisory: curl security and bug fix update | curl: NTLM type-2 heap out-of-bounds buffer read wget: Information exposure in set_file_metadata function in xattr.c curl: NTLMv2 type-3 header stack buffer overflow curl: SMTP end-of-response out-of-bounds read | [
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | null | 4.3 | null |
RHSA-2021:0338 | Red Hat Security Advisory: kernel-rt security and bug fix update | kernel: use-after-free in fs/block_dev.c kernel: Nfsd failure to clear umask after processing an open or create | [
"cpe:/a:redhat:rhel_extras_rt:7"
] | null | 4.4 | null | null |
RHSA-2011:0945 | Red Hat Security Advisory: JBoss Enterprise Web Platform 5.1.1 update | JBoss Seam EL interpolation in exception handling | [
"cpe:/a:redhat:jboss_enterprise_web_platform:5::el4",
"cpe:/a:redhat:jboss_enterprise_web_platform:5::el5",
"cpe:/a:redhat:jboss_enterprise_web_platform:5::el6"
] | null | null | null | null |
RHSA-2025:3061 | Red Hat Security Advisory: OpenShift Container Platform 4.17.22 packages and security update | go-jose: Go JOSE's Parsing Vulnerable to Denial of Service | [
"cpe:/a:redhat:openshift:4.17::el8",
"cpe:/a:redhat:openshift:4.17::el9"
] | null | 7.5 | null | null |
RHSA-2020:0897 | Red Hat Security Advisory: icu security update | ICU: Integer overflow in UnicodeString::doAppend() | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 8.8 | null | null |
RHSA-2008:0194 | Red Hat Security Advisory: xen security and bug fix update | xen xenmon.py / xenbaked insecure temporary file accesss QEMU Buffer overflow via crafted "net socket listen" option Qemu insufficient block device address range checking PVFB backend fails to validate frontend's framebuffer description PVFB SDL backend chokes on bogus screen updates qemu/kvm/xen: qemu block format auto-detection vulnerability | [
"cpe:/a:redhat:rhel_virtualization:5::client",
"cpe:/a:redhat:rhel_virtualization:5::server",
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2024:4734 | Red Hat Security Advisory: krb5 security update | krb5: GSS message token handling krb5: GSS message token handling | [
"cpe:/o:redhat:rhel_aus:8.4::baseos",
"cpe:/o:redhat:rhel_e4s:8.4::baseos",
"cpe:/o:redhat:rhel_tus:8.4::baseos"
] | null | 6.5 | null | null |
RHSA-2023:3645 | Red Hat Security Advisory: Red Hat OpenShift Service Mesh 2.2.7 security update | mongo-go-driver: specific cstrings input may not be properly validated async: Prototype Pollution in async express: "qs" prototype poisoning causes the hang of the node process terser: insecure use of regular expressions leads to ReDoS | [
"cpe:/a:redhat:service_mesh:2.2::el8"
] | null | 7.5 | null | null |
RHSA-2022:5939 | Red Hat Security Advisory: kernel-rt security and bug fix update | hw: cpu: incomplete clean-up of multi-core shared buffers (aka SBDR) hw: cpu: incomplete clean-up of microarchitectural fill buffers (aka SBDS) hw: cpu: incomplete clean-up in specific special register write operations (aka DRPW) hw: cpu: Intel: Stale Data Read from legacy xAPIC vulnerability | [
"cpe:/a:redhat:rhel_extras_rt:7"
] | null | 6 | null | null |
RHSA-2016:0459 | Red Hat Security Advisory: bind security update | bind: malformed packet sent to rndc can trigger assertion failure bind: malformed signature records for DNAME records can trigger assertion failure | [
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server",
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation",
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | null | null |
RHBA-2025:0305 | Red Hat Bug Fix Advisory: .NET 9.0 bug fix and enhancement update | dotnet: .NET Remote Code Execution Vulnerability dotnet: .NET and Visual Studio Remote Code Execution Vulnerability dotnet: .NET Elevation of Privilege Vulnerability dotnet: .NET, .NET Framework, and Visual Studio Remote Code Execution Vulnerability | [
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::crb"
] | null | 8.8 | null | null |
RHSA-2024:0374 | Red Hat Security Advisory: python-pip security update | python: tarfile module directory traversal | [
"cpe:/a:redhat:rhel_eus:8.6::appstream",
"cpe:/o:redhat:rhel_eus:8.6::baseos"
] | null | 5.5 | null | null |
RHSA-2018:1199 | Red Hat Security Advisory: patch security update | patch: Malicious patch files cause ed to execute arbitrary commands | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | 7.8 | null |
RHSA-2008:0884 | Red Hat Security Advisory: libxml2 security update | libxml2: long entity name heap buffer overflow | [
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws",
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws",
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2014:0835 | Red Hat Security Advisory: Red Hat JBoss Web Server 2.0.1 tomcat7 security update | Tomcat/JBossWeb: Limited DoS in chunked transfer encoding input filter Tomcat/JBossWeb: XXE vulnerability via user supplied XSLTs Tomcat/JBossWeb: Request smuggling via malicious content length header | [
"cpe:/a:redhat:jboss_enterprise_web_server:2::el5",
"cpe:/a:redhat:jboss_enterprise_web_server:2::el6"
] | null | null | null | null |
RHSA-2016:1990 | Red Hat Security Advisory: Red Hat Enterprise Linux 5 Six-Month Retirement Notice | This is the Six-Month notification for the retirement of Red Hat Enterprise Linux 5. This notification applies only to those customers subscribed to the channel for Red Hat Enterprise Linux 5. | [
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2023:2903 | Red Hat Security Advisory: php:7.4 security update | php: phar: infinite loop when decompressing quine gzip file php: standard insecure cookie could be treated as a '__Host-' or '__Secure-' cookie by PHP applications php: OOB read due to insufficient input validation in imageloadfont() php: PDO:: quote() may return unquoted string due to an integer overflow XKCP: buffer overflow in the SHA-3 reference implementation | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 8.1 | null | null |
RHSA-2012:1232 | Red Hat Security Advisory: JBoss Enterprise Portal Platform 5.2.2 update | JDK: XML parsing Denial-Of-Service (6845701) CSRF on jmx-console allows invocation of operations on mbeans JNDI: unauthenticated remote write access is permitted by default jakarta: JVM destabilization due to memory exhaustion when processing CDF/CFBF files JBoss: authentication bypass when running under JACC with ignoreBaseDecision on JBossWebRealm JGroups diagnostics service enabled by default with no authentication when a JGroups channel is started | [
"cpe:/a:redhat:jboss_enterprise_portal_platform:5.2"
] | null | null | null | null |
RHSA-2017:1834 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.0.7 on RHEL 6 | Artemis: Deserialization of untrusted input vulnerability jackson-databind: Deserialization vulnerability via readValue method of ObjectMapper | [
"cpe:/a:redhat:jboss_enterprise_application_platform:7::el6"
] | null | null | 8.1 | null |
RHSA-2019:1188 | Red Hat Security Advisory: qemu-kvm security update | hardware: Microarchitectural Store Buffer Data Sampling (MSBDS) hardware: Micro-architectural Load Port Data Sampling - Information Leak (MLPDS) hardware: Microarchitectural Fill Buffer Data Sampling (MFBDS) hardware: Microarchitectural Data Sampling Uncacheable Memory (MDSUM) | [
"cpe:/o:redhat:rhel_aus:7.2::server",
"cpe:/o:redhat:rhel_e4s:7.2::server",
"cpe:/o:redhat:rhel_tus:7.2::server"
] | null | null | 3.8 | null |
RHSA-2015:1153 | Red Hat Security Advisory: mailman security and bug fix update | mailman: directory traversal in MTA transports that deliver programmatically | [
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | null | null |
RHSA-2025:2525 | Red Hat Security Advisory: kernel security update | kernel: can: bcm: Fix UAF in bcm_proc_show() kernel: arm64/sve: Discard stale CPU state when handling SVE traps kernel: HID: core: zero-initialize the report buffer kernel: ALSA: usb-audio: Fix potential out-of-bound accesses for Extigy and Mbox devices | [
"cpe:/a:redhat:rhel_eus:8.8::crb",
"cpe:/o:redhat:rhel_eus:8.8::baseos"
] | null | 5.8 | null | null |
RHSA-2019:4148 | Red Hat Security Advisory: thunderbird security update | Mozilla: Buffer overflow in plain text serializer Mozilla: Use-after-free in worker destruction Mozilla: Use-after-free when performing device orientation checks Mozilla: Use-after-free when retrieving a document in antitracking Mozilla: Memory safety bugs fixed in Firefox 71 and Firefox ESR 68.3 | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 8.8 | null | null |
RHEA-2018:3584 | Red Hat Enhancement Advisory: new packages: rust-toolset-1.29 | rust: rustdoc loads plugins from world writable directory allowing for arbitrary code execution | [
"cpe:/a:redhat:devtools:2018"
] | null | null | 5.3 | null |
RHSA-2024:7869 | Red Hat Security Advisory: .NET 8.0 security update | dotnet: kestrel: closing an HTTP/3 stream can cause a race condition and lead to remote code execution dotnet: Multiple .NET components susceptible to hash flooding dotnet: System.IO.Packaging - Multiple DoS vectors in use of SortedList dotnet: Denial of Service in System.Text.Json | [
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::crb"
] | null | 7.5 | null | null |
RHSA-2015:2155 | Red Hat Security Advisory: file security and bug fix update | file: cdf_read_short_sector insufficient boundary check file: cdf_unpack_summary_info() excessive looping DoS file: CDF property info parsing nelements infinite loop file: mconvert incorrect handling of truncated pascal string size file: cdf_check_stream_offset insufficient boundary check file: cdf_count_chain insufficient boundary check file: cdf_read_property_info insufficient boundary check file: unrestricted regular expression matching file: incomplete fix for CVE-2012-1571 in cdf_read_property_info file: out-of-bounds read in elf note headers file: multiple denial of service issues (resource consumption) file: denial of service issue (resource consumption) file: out of bounds read in mconvert() file: malformed elf file causes access to uninitialized memory | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | null | null |
RHSA-2014:1009 | Red Hat Security Advisory: samba4 security update | samba: Uninitialized memory exposure samba: nmbd denial of service samba: smbd unicode path names denial of service samba: remote code execution in nmbd | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2018:1062 | Red Hat Security Advisory: kernel security, bug fix, and enhancement update | kernel: unlimiting the stack disables ASLR kernel: media: use-after-free in [tuner-xc2028] media driver kernel: Buffer overflow in firewire driver via crafted incoming packets hw: cpu: speculative execution branch target injection hw: cpu: speculative execution permission faults handling kernel: drm/vmwgfx: fix integer overflow in vmw_surface_define_ioctl() kernel: Use-after-free vulnerability in DCCP socket kernel: Incorrect type conversion for size during dma allocation Kernel: kvm: nVMX: L2 guest could access hardware(L0) CR8 register kernel: memory leak when merging buffers in SCSI IO vectors kernel: v4l2: disabled memory access protection mechanism allowing privilege escalation kernel: Buffer over-read in keyring subsystem allows exposing potentially sensitive information to local attacker kernel: Missing permission check in move_pages system call kernel: Null pointer dereference in rngapi_reset function kernel: vfs: BUG in truncate_inode_pages_range() and fuse client kernel: Use-after-free in userfaultfd_event_wait_completion function in userfaultfd.c kernel: Improper error handling of VM_SHARED hugetlbfs mapping in mm/hugetlb.c kernel: net: double-free and memory corruption in get_net_ns_by_id() kernel: Use-after-free in snd_seq_ioctl_create_port() kernel: dereferencing NULL payload with nonzero length kernel: Missing capabilities check in net/netfilter/nfnetlink_cthelper.c allows for unprivileged access to systemwide nfnl_cthelper_list structure kernel: Missing namespace check in net/netlink/af_netlink.c allows for network monitors to observe systemwide activity kernel: Unallocated memory access by malicious USB device via bNumInterfaces overflow kernel: netfilter: use-after-free in tcpmss_mangle_packet function in net/netfilter/xt_TCPMSS.c kernel: Race condition in drivers/md/dm.c:dm_get_from_kobject() allows local users to cause a denial of service kernel: improper keyrings creation kernel: kvm: Reachable BUG() on out-of-bounds guest IRQ Kernel: KVM: DoS via write flood to I/O port 0x80 kernel: Stack information leak in the EFS element kernel: Null pointer dereference in fs/cifs/cifsencrypt.c:setup_ntlmv2_rsp() when empty TargetInfo is returned in NTLMSSP setup negotiation response allowing to crash client's kernel kernel: Kernel address information leak in drivers/acpi/sbshc.c:acpi_smbus_hc_add() function potentially allowing KASLR bypass kernel: Integer overflow in futex.c:futux_requeue can lead to denial of service or unspecified impact kernel: Race condition in sound system can lead to denial of service | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 4.7 | null |
RHSA-2014:0526 | Red Hat Security Advisory: Red Hat JBoss Web Server 2.0.1 tomcat7 security update | tomcat: multiple content-length header poisoning flaws tomcat: incomplete fix for CVE-2012-3544 apache-commons-fileupload: denial of service due to too-small buffer size used by MultipartStream | [
"cpe:/a:redhat:jboss_enterprise_web_server:2::el5",
"cpe:/a:redhat:jboss_enterprise_web_server:2::el6"
] | null | null | null | null |
RHSA-2022:0325 | Red Hat Security Advisory: virt:av and virt-devel:av security and bug fix update | QEMU: block: fdc: null pointer dereference may lead to guest crash | [
"cpe:/a:redhat:advanced_virtualization:8.4::el8"
] | null | 3.2 | null | null |
RHSA-2016:1384 | Red Hat Security Advisory: ceph security update | crash: mon_command crashes ceph monitors on receiving empty prefix | [
"cpe:/a:redhat:ceph_storage:1.3::el7"
] | null | null | 4.9 | null |
RHSA-2011:1441 | Red Hat Security Advisory: icedtea-web security update | IcedTea-Web: second-level domain subdomains and suffix domain SOP bypass | [
"cpe:/o:redhat:enterprise_linux:6::server"
] | null | null | null | null |
RHSA-2008:0516 | Red Hat Security Advisory: evolution security update | evolution: iCalendar buffer overflow via large timezone specification | [
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws",
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2008:0058 | Red Hat Security Advisory: wireshark security update | wireshark mp3 and ncp flaws wireshark ppp flaws wireshark DNP3 flaws wireshark SSL and OS/400 trace flaws wireshark ANSI MAP flaws wireshark firebird/interbase flaws wireshark HTTP dissector flaws wireshark MEGACO dissector flaws wireshark DCP ETSI dissector flaws wireshark Bluetooth SDP dissector flaws wireshark RPC Portmap flaws wireshark SMB dissector crash wireshark IPv6 and USB dissector crash wireshark WiMAX dissector possible crash wireshark RPL dissector crash wireshark CIP dissector crash | [
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws",
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2025:1289 | Red Hat Security Advisory: RHTAS 1.1.1 - Red Hat Trusted Artifact Signer Release | golang.org/x/crypto/ssh: Misuse of ServerConfig.PublicKeyCallback may cause authorization bypass in golang.org/x/crypto golang.org/x/net/html: Non-linear parsing of case-insensitive content in golang.org/x/net/html | [
"cpe:/a:redhat:trusted_artifact_signer:1.1::el9"
] | null | 7.5 | null | null |
RHSA-2017:1267 | Red Hat Security Advisory: rpcbind security update | libntirpc: Memory leak when failing to parse XDR strings or bytearrays | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | 7.5 | null |
RHSA-2007:0672 | Red Hat Security Advisory: kernel security update | security flaw minix_bmap denial of service Kernel: CAPI overflow Bluetooth setsockopt() information leaks IPv6 oops triggerable by any user | [
"cpe:/o:redhat:enterprise_linux:2.1::as",
"cpe:/o:redhat:enterprise_linux:2.1::es",
"cpe:/o:redhat:enterprise_linux:2.1::ws"
] | null | null | null | null |
RHSA-2012:1569 | Red Hat Security Advisory: flash-plugin security update | flash-plugin: multiple code execution flaws (APSB12-27) flash-plugin: multiple code execution flaws (APSB12-27) flash-plugin: multiple code execution flaws (APSB12-27) | [
"cpe:/a:redhat:rhel_extras:5::client",
"cpe:/a:redhat:rhel_extras:5::server",
"cpe:/a:redhat:rhel_extras:6"
] | null | null | null | null |
RHSA-2020:2171 | Red Hat Security Advisory: kernel-rt security and bug fix update | Kernel: kvm: nVMX: L2 guest may trick the L0 hypervisor to access sensitive L1 resources Kernel: NetLabel: null pointer dereference while receiving CIPSO packet with null category may cause kernel panic | [
"cpe:/a:redhat:enterprise_linux:8::nfv",
"cpe:/a:redhat:enterprise_linux:8::realtime"
] | null | 5.9 | null | null |
RHSA-2024:9653 | Red Hat Security Advisory: webkit2gtk3 security update | webkitgtk: Memory corruption issue when processing web content webkitgtk: arbitrary javascript code execution webkitgtk: Processing web content may lead to arbitrary code execution webkitgtk: Arbitrary Remote Code Execution chromium-browser: Use after free in ANGLE webkitgtk: type confusion may lead to arbitrary code execution webkitgtk: Processing web content may lead to arbitrary code execution webkitgtk: Processing web content may lead to arbitrary code execution webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution webkitgtk: webkit2gtk: Use after free may lead to Remote Code Execution webkitgtk: webkit2gtk: Out-of-bounds read was addressed with improved bounds checking webkitgtk: webkit2gtk: Out-of-bounds read was addressed with improved bounds checking webkitgtk: webkit2gtk: Use-after-free was addressed with improved memory management webkitgtk: webkit2gtk: Processing maliciously crafted web content may lead to an unexpected process crash webkitgtk: webkit2gtk: Processing maliciously crafted web content may lead to an unexpected process crash webkitgtk: webkit2gtk: Processing maliciously crafted web content may lead to an unexpected process crash webkit: Processing maliciously crafted web content may lead to memory corruption | [
"cpe:/a:redhat:rhel_aus:8.6::appstream",
"cpe:/a:redhat:rhel_e4s:8.6::appstream",
"cpe:/a:redhat:rhel_tus:8.6::appstream"
] | null | 8.8 | null | null |
RHSA-2025:0051 | Red Hat Security Advisory: kpatch-patch-4_18_0-477_43_1, kpatch-patch-4_18_0-477_67_1, and kpatch-patch-4_18_0-477_81_1 security update | kernel: mptcp: cope racing subflow creation in mptcp_rcv_space_adjust | [
"cpe:/o:redhat:rhel_eus:8.8::baseos"
] | null | 5.9 | null | null |
RHSA-2014:0342 | Red Hat Security Advisory: wireshark security update | wireshark: IEEE 802.15.4 dissector crash (wnpa-sec-2013-61) wireshark: NBAP dissector crash (wnpa-sec-2013-62) wireshark: SIP dissector crash (wnpa-sec-2013-63) wireshark: ActiveMQ OpenWire dissector large loop (wnpa-sec-2013-64) wireshark: TCP dissector crash (wnpa-sec-2013-65) wireshark: SIP dissector could go into an infinite loop (wnpa-sec-2013-66) wireshark: NTLMSSP v2 dissector could crash (wnpa-sec-2013-68) wireshark: NFS dissector crash (wnpa-sec-2014-01) wireshark: RLC dissector crash (wnpa-sec-2014-03) wireshark: buffer overflow in MPEG file parser (wnpa-sec-2014-04) | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2021:0167 | Red Hat Security Advisory: postgresql:9.6 security update | postgresql: Selectivity estimators bypass row security policies postgresql: TYPE in pg_temp executes arbitrary SQL during SECURITY DEFINER execution postgresql: ALTER ... DEPENDS ON EXTENSION is missing authorization checks postgresql: Uncontrolled search path element in CREATE EXTENSION postgresql: Reconnection can downgrade connection security settings postgresql: Multiple features escape "security restricted operation" sandbox postgresql: psql's \gset allows overwriting specially treated variables | [
"cpe:/a:redhat:rhel_eus:8.1::appstream"
] | null | 7.5 | 7.5 | null |
RHSA-2018:0052 | Red Hat Security Advisory: rhevm-setup-plugins security, bug fix, and enhancement update | An update for rhevm-setup-plugins is now available for RHEV Manager version 3.6.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. | [
"cpe:/a:redhat:rhev_manager:3"
] | null | null | null | null |
RHSA-2023:1049 | Red Hat Security Advisory: Red Hat Single Sign-On 7.6.2 security update | bootstrap: Cross-site Scripting (XSS) in the collapse data-parent attribute bootstrap: Cross-site Scripting (XSS) in the data-container property of tooltip jquery: Prototype pollution in object's prototype leading to denial of service, remote code execution, or property injection jquery: Cross-site scripting due to improper injQuery.htmlPrefilter method jquery: Untrusted code execution via <option> tag in HTML passed to DOM manipulation methods glob-parent: Regular Expression Denial of Service minimist: prototype pollution keycloak: HTML injection in execute-actions-email Admin REST API keycloak: XSS on impersonation under specific circumstances SnakeYaml: Constructor Deserialization Remote Code Execution Adapter: Open redirect vulnerability in checkSSO Undertow: DoS can be achieved as Undertow server waits for the LAST_CHUNK forever for EJB invocations keycloak: path traversal via double URL encoding keycloak: Session takeover with OIDC offline refreshtokens keycloak: reflected XSS attack Moment.js: Path traversal in moment.locale snakeyaml: Denial of Service due to missing nested depth limitation for collections moment: inefficient parsing algorithm resulting in DoS loader-utils: Regular expression denial of service snakeyaml: Uncaught exception in org.yaml.snakeyaml.composer.Composer.composeSequenceNode snakeyaml: Uncaught exception in org.yaml.snakeyaml.constructor.BaseConstructor.constructObject snakeyaml: Uncaught exception in java.base/java.util.regex.Pattern$Ques.match jettison: parser crash by stackoverflow jettison: memory exhaustion via user-supplied XML or JSON data jackson-databind: deep wrapper array nesting wrt UNWRAP_SINGLE_VALUE_ARRAYS jackson-databind: use of deeply nested arrays mina-sshd: Java unsafe deserialization vulnerability jettison: If the value in map is the map's self, the new new JSONObject(map) cause StackOverflowError which may lead to dos json5: Prototype Pollution in JSON5 via Parse Method CXF: directory listing / code exfiltration CXF: SSRF Vulnerability keycloak: Client Registration endpoint does not check token revocation keycloak: user impersonation via stolen uuid code | [
"cpe:/a:redhat:red_hat_single_sign_on:7.6"
] | null | 4.6 | 5.6 | null |
RHSA-2025:0654 | Red Hat Security Advisory: OpenShift Container Platform 4.17.14 bug fix and security update | PostCSS: Improper input validation in PostCSS golang-protobuf: encoding/protojson, internal/encoding/json: infinite loop in protojson.Unmarshal when unmarshaling certain forms of invalid JSON golang.org/x/net/html: Non-linear parsing of case-insensitive content in golang.org/x/net/html dompurify: DOMPurify vulnerable to tampering by prototype pollution nanoid: nanoid mishandles non-integer values go-git: argument injection via the URL field go-git: go-git clients vulnerable to DoS via maliciously crafted Git server replies | [
"cpe:/a:redhat:openshift:4.17::el9"
] | null | 7.5 | null | null |
RHSA-2001:115 | Red Hat Security Advisory: : New Zope packages are available | security flaw | [
"cpe:/a:redhat:powertools:6.2",
"cpe:/a:redhat:powertools:7.0",
"cpe:/a:redhat:powertools:7.1"
] | null | null | null | null |
RHSA-2021:2374 | Red Hat Security Advisory: Openshift Logging Bug Fix Release (5.0.5) | gogo/protobuf: plugin/unmarshal/unmarshal.go lacks certain index validation | [
"cpe:/a:redhat:logging:5.0::el8"
] | null | 8.6 | null | null |
RHSA-2024:9485 | Red Hat Security Advisory: Control plane Operators for RHOSO 18.0.3 (Feature Release 1) security update | golang: net/http/cookiejar: incorrect forwarding of sensitive headers and cookies on HTTP redirect golang: net/http: golang: mime/multipart: golang: net/textproto: memory exhaustion in Request.ParseMultipartForm golang: crypto/x509: Verify panics on certificates with an unknown public key algorithm golang: net/mail: comments in display names are incorrectly handled golang: html/template: errors returned from MarshalJSON methods may break template escaping golang: net: malformed DNS message can cause infinite loop go/parser: golang: Calling any of the Parse functions containing deeply nested literals can cause a panic/stack exhaustion encoding/gob: golang: Calling Decoder.Decode on a message which contains deeply nested structures can cause a panic due to stack exhaustion | [
"cpe:/a:redhat:openstack_podified:1.0::el9"
] | null | 7.5 | null | null |
RHSA-2023:4500 | Red Hat Security Advisory: thunderbird security update | thunderbird: File Extension Spoofing using the Text Direction Override Character Mozilla: Offscreen Canvas could have bypassed cross-origin restrictions Mozilla: Incorrect value used during WASM compilation Mozilla: Potential permissions request bypass via clickjacking Mozilla: Crash in DOMParser due to out-of-memory conditions Mozilla: Fix potential race conditions when releasing platform objects Mozilla: Stack buffer overflow in StorageManager Mozilla: Cookie jar overflow caused unexpected cookie jar state Mozilla: Memory safety bugs fixed in Firefox 116, Firefox ESR 115.1, Firefox ESR 102.14, Thunderbird 115.1, and Thunderbird 102.14 Mozilla: Memory safety bugs fixed in Firefox ESR 115.1, and Thunderbird 115.1 | [
"cpe:/a:redhat:rhel_aus:8.4::appstream",
"cpe:/a:redhat:rhel_e4s:8.4::appstream",
"cpe:/a:redhat:rhel_tus:8.4::appstream"
] | null | 9.8 | null | null |
RHSA-2024:0072 | Red Hat Security Advisory: squid security update | squid: DoS against HTTP and HTTPS squid: Denial of Service in SSL Certificate validation squid: NULL pointer dereference in the gopher protocol code squid: Buffer over-read in the HTTP Message processing feature squid: Incorrect Check of Function Return Value In Helper Process management | [
"cpe:/a:redhat:rhel_eus:9.2::appstream"
] | null | 7.5 | null | null |
RHSA-2009:1430 | Red Hat Security Advisory: firefox security update | firefox: URL bar spoofing vulnerability Firefox 3.5 3.0.14 browser engine crashes Firefox 3.5.2 3.0.14 browser engine crashes Firefox 3.5.3 3.0.14 browser engine crashes Firefox 3.5 3.0.14 JavaScript engine crashes Firefox 3.5.2 3.0.14 JavaScript engine crashes Firefox 3.0.14 Insufficient warning for PKCS11 module installation and removal Firefox 3.5.3 3.0.14 TreeColumns dangling pointer vulnerability Firefox 3.5.3 3.0.14 Location bar spoofing via tall line-height Unicode characters Firefox 3.5.3 3.0.14 Chrome privilege escalation with FeedWriter | [
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws",
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2007:0076 | Red Hat Security Advisory: php security update | security flaw security flaw security flaw security flaw security flaw security flaw php session extension information leak php session extension global variable clobber php imap_mail_compose() buffer overflow via type.parameters | [
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws",
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2022:1080 | Red Hat Security Advisory: httpd:2.4 security update | httpd: Errors encountered during the discarding of request body lead to HTTP request smuggling | [
"cpe:/a:redhat:rhel_e4s:8.1::appstream"
] | null | 8.3 | null | null |
RHSA-2023:5421 | Red Hat Security Advisory: Multicluster Engine for Kubernetes 2.3.2 security updates and bug fixes | x/net/http2/h2c: request smuggling golang: html/template: improper sanitization of CSS values golang: html/template: improper handling of JavaScript whitespace tough-cookie: prototype pollution in cookie memstore golang: html/template: improper handling of empty HTML attributes | [
"cpe:/a:redhat:multicluster_engine:2.3::el8"
] | null | 7.3 | null | null |
RHSA-2003:083 | Red Hat Security Advisory: apache security update for Stronghold | security flaw security flaw | [
"cpe:/a:redhat:rhel_stronghold:4"
] | null | null | null | null |
RHSA-2020:3539 | Red Hat Security Advisory: Red Hat build of Thorntail 2.7.1 security and bug fix update | EAP: field-name is not parsed in accordance to RFC7230 keycloak: security headers missing on REST endpoints Wildfly: Improper authorization issue in WildFlySecurityManager when using alternative protection domain hibernate-validator: Improper input validation in the interpolation of constraint error messages wildfly-elytron: session fixation when using FORM authentication wildfly: exposed setting of TCCL via the EmbeddedManagedProcess API wildfly: unsafe deserialization in Wildfly Enterprise Java Beans keycloak: DoS by sending multiple simultaneous requests with a Content-Length header value greater than actual byte count of request body wildfly: Some EJB transaction objects may get accumulated causing Denial of Service wildfly: EJB SessionOpenInvocations may not be removed properly after a response is received causing Denial of Service | [
"cpe:/a:redhat:openshift_application_runtimes:1.0"
] | null | 6.5 | null | null |
RHSA-2025:2482 | Red Hat Security Advisory: libxml2 security update | libxml2: Use-After-Free in libxml2 libxml2: Stack-based buffer overflow in xmlSnprintfElements of libxml2 | [
"cpe:/a:redhat:rhel_eus:9.2::appstream",
"cpe:/o:redhat:rhel_eus:9.2::baseos"
] | null | 7.8 | null | null |
RHSA-2021:5038 | Red Hat Security Advisory: Red Hat Advanced Cluster Management 2.2.10 security updates and bug fixes | semver-regex: inefficient regular expression complexity nodejs-set-value: type confusion allows bypass of CVE-2019-10747 | [
"cpe:/a:redhat:acm:2.2::el7",
"cpe:/a:redhat:acm:2.2::el8"
] | null | 7.3 | null | null |
RHSA-2023:1551 | Red Hat Security Advisory: tigervnc security update | xorg-x11-server: X.Org Server Overlay Window Use-After-Free Local Privilege Escalation Vulnerability | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 7.8 | null | null |
RHSA-2025:0439 | Red Hat Security Advisory: Red Hat OpenStack Platform 18.0.4 (openstack-ironic) security update | openstack-ironic: Lack of checksum validation on images | [
"cpe:/a:redhat:openstack:18.0::el9"
] | null | 6.3 | null | null |
RHSA-2022:0485 | Red Hat Security Advisory: OpenShift Container Platform 4.8.31 security update | log4j-core: remote code execution via JDBC Appender | [
"cpe:/a:redhat:openshift:4.8::el8"
] | null | 6.6 | null | null |
RHSA-2019:2130 | Red Hat Security Advisory: libreoffice security and bug fix update | libreoffice: Arbitrary python functions in arbitrary modules on the filesystem can be executed without warning | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 7.8 | null |
RHSA-2022:2129 | Red Hat Security Advisory: lynx security update | lynx: Disclosure of HTTP authentication credentials via SNI data | [
"cpe:/a:redhat:enterprise_linux:8::crb"
] | null | 5.3 | null | null |
RHSA-2011:1065 | Red Hat Security Advisory: Red Hat Enterprise Linux 5.7 kernel security and bug fix update | kernel: xen: svm: insufficiencies in handling emulated instructions during vm exits kernel: kernel: net_sched: fix qdisc_notify() kernel: gfs2: make sure fallocate bytes is a multiple of blksize | [
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2022:0204 | Red Hat Security Advisory: java-11-openjdk security update | OpenJDK: Incomplete deserialization class filtering in ObjectInputStream (Serialization, 8264934) OpenJDK: Incorrect reading of TIFF files in TIFFNullDecompressor (ImageIO, 8270952) OpenJDK: Insufficient URI checks in the XSLT TransformerImpl (JAXP, 8270492) OpenJDK: Unexpected exception thrown in regex Pattern (Libraries, 8268813) OpenJDK: Incorrect marking of writeable fields (Hotspot, 8270386) OpenJDK: Incomplete checks of StringBuffer and StringBuilder during deserialization (Libraries, 8270392) OpenJDK: Incorrect IdentityHashMap size checks during deserialization (Libraries, 8270416) OpenJDK: Incorrect access checks in XMLEntityManager (JAXP, 8270498) OpenJDK: Infinite loop related to incorrect handling of newlines in XMLEntityScanner (JAXP, 8270646) OpenJDK: Array indexing issues in LIRGenerator (Hotspot, 8272014) OpenJDK: Excessive resource use when reading JAR manifest attributes (Libraries, 8272026) OpenJDK: Insufficient checks when deserializing exceptions in ObjectInputStream (Serialization, 8272236) OpenJDK: Excessive memory allocation in BMPImageReader (ImageIO, 8273756) OpenJDK: Integer overflow in BMPImageReader (ImageIO, 8273838) OpenJDK: Excessive memory allocation in TIFF*Decompressor (ImageIO, 8274096) | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 5.3 | null | null |
RHSA-2023:3136 | Red Hat Security Advisory: java-1.8.0-ibm security update | OpenJDK: Unbounded memory allocation when compiling crafted XPath expressions (JAXP, 8270504) OpenJDK: improper restrictions in CORBA deserialization (Serialization, 8285021) OpenJDK: soundbank URL remote loading (Sound, 8293742) | [
"cpe:/a:redhat:rhel_extras:7"
] | null | 3.7 | null | null |
RHSA-2016:1967 | Red Hat Security Advisory: org.ovirt.engine-root security, bug fix, and enhancement update | ovirt-engine: ovirt-engine-provisiondb logs contain DB username and password in plain text | [
"cpe:/a:redhat:rhev_manager:4"
] | null | null | 5.9 | null |
RHSA-2012:1580 | Red Hat Security Advisory: kernel security, bug fix and enhancement update | kernel: ext4: fix inconsistency in ext4_fill_flex_info() kernel: incomplete fix for CVE-2011-4131 kernel: net: acceptation of overlapping ipv6 fragments kernel: net: divide by zero in tcp algorithm illinois kernel: mm/hotplug: failure in propagating hot-added memory to other nodes | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2014:1939 | Red Hat Security Advisory: openstack-trove security update | Trove: potential leak of passwords into log files Trove: potential leak of passwords into log files | [
"cpe:/a:redhat:openstack:5::el7"
] | null | null | null | null |
RHSA-2022:7472 | Red Hat Security Advisory: virt:rhel and virt-devel:rhel security, bug fix, and enhancement update | QEMU: fdc: heap buffer overflow in DMA read data transfers libvirt: missing locking in nwfilterConnectNumOfNWFilters can lead to denial of service libguestfs: Buffer overflow in get_keys leads to DoS swtpm: Unchecked header size indicator against expected size | [
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb"
] | null | 5.5 | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.