id
stringlengths 13
15
| title
stringlengths 29
176
| description
stringlengths 8
32.1k
| cpes
sequencelengths 0
20
| cvss_v4_0
null | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
null |
---|---|---|---|---|---|---|---|
RHSA-2003:089 | Red Hat Security Advisory: : Updated glibc packages fix vulnerabilities in RPC XDR decoder | security flaw | [
"cpe:/o:redhat:linux:6.2",
"cpe:/o:redhat:linux:7.0",
"cpe:/o:redhat:linux:7.1",
"cpe:/o:redhat:linux:7.2",
"cpe:/o:redhat:linux:7.3",
"cpe:/o:redhat:linux:8.0"
] | null | null | null | null |
RHSA-2010:0926 | Red Hat Security Advisory: krb5 security update | krb5: incorrect acceptance of certain checksums (MITKRB5-SA-2010-007) | [
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws",
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2010:0147 | Red Hat Security Advisory: kernel security and bug fix update | kernel: ext4: Avoid null pointer dereference when decoding EROFS w/o a journal kernel: infoleak if print-fatal-signals=1 kernel: netfilter: ebtables: enforce CAP_NET_ADMIN kernel: sctp remote denial of service kernel: sys_move_pages infoleak kernel: ipv6: fix ip6_dst_lookup_tail() NULL pointer dereference | [
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2024:4389 | Red Hat Security Advisory: openssh security update | openssh: regreSSHion - race condition in SSH allows RCE/DoS | [
"cpe:/a:redhat:rhel_e4s:9.0::appstream",
"cpe:/o:redhat:rhel_e4s:9.0::baseos"
] | null | 8.1 | null | null |
RHSA-2021:0931 | Red Hat Security Advisory: openvswitch2.11 and ovn2.11 security update | lldpd: buffer overflow in the lldp_decode function in daemon/protocols/lldp.c dpdk: librte_vhost Integer overflow in vhost_user_set_log_base() dpdk: librte_vhost Integer truncation in vhost_user_check_and_alloc_queue_pair() dpdk: librte_vhost Missing inputs validation in Vhost-crypto | [
"cpe:/a:redhat:openstack:13::el7"
] | null | 5.1 | null | null |
RHSA-2019:3513 | Red Hat Security Advisory: glibc security, bug fix, and enhancement update | glibc: getaddrinfo should reject IP addresses with trailing characters | [
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb",
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | null | null | null |
RHSA-2022:7110 | Red Hat Security Advisory: kernel security, bug fix, and enhancement update | kernel: information leak in scsi_ioctl() kernel: kernel info leak issue in pfkey_register kernel: a use-after-free in cls_route filter implementation may lead to privilege escalation hw: cpu: AMD: RetBleed Arbitrary Speculative Code Execution with Return Instructions hw: cpu: AMD: Branch Type Confusion (non-retbleed) hw: cpu: Intel: information disclosure via local access hw: cpu: AMD: RetBleed Arbitrary Speculative Code Execution with Return Instructions hw: cpu: Intel: RetBleed Arbitrary Speculative Code Execution with Return Instructions | [
"cpe:/a:redhat:enterprise_linux:8::crb",
"cpe:/o:redhat:enterprise_linux:8::baseos",
"cpe:/o:redhat:rhev_hypervisor:4.4::el8"
] | null | 5.6 | null | null |
RHEA-2017:1716 | Red Hat Enhancement Advisory: Red Hat OpenShift Container Platform 3.6 RPM Release Advisory | jenkins-plugin-script-security: Unsafe methods in the default whitelist (SECURITY-538) | [
"cpe:/a:redhat:openshift:3.6::el7"
] | null | null | 8.8 | null |
RHSA-2024:9819 | Red Hat Security Advisory: tigervnc security update | xorg-x11-server: tigervnc: heap-based buffer overflow privilege escalation vulnerability | [
"cpe:/a:redhat:rhel_aus:8.4::appstream",
"cpe:/a:redhat:rhel_e4s:8.4::appstream",
"cpe:/a:redhat:rhel_tus:8.4::appstream"
] | null | 7.8 | null | null |
RHSA-2022:1622 | Red Hat Security Advisory: OpenShift Container Platform 4.6.57 security and extras update | moby: Default inheritable capabilities for linux container should be empty | [
"cpe:/a:redhat:openshift:4.6::el8"
] | null | 4.8 | null | null |
RHSA-2009:1635 | Red Hat Security Advisory: kernel-rt security, bug fix, and enhancement update | kernel: nfsv4: kernel panic in nfs4_proc_lock() kernel: megaraid_sas permissions in sysfs kernel: megaraid_sas permissions in sysfs | [
"cpe:/a:redhat:enterprise_mrg:1::el5"
] | null | null | null | null |
RHSA-2017:2557 | Red Hat Security Advisory: instack-undercloud security update | instack-undercloud: uses hardcoded /tmp paths | [
"cpe:/a:redhat:openstack-director:9::el7"
] | null | null | 6.1 | null |
RHSA-2005:501 | Red Hat Security Advisory: XFree86 security update | security flaw | [
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws"
] | null | null | null | null |
RHSA-2024:10941 | Red Hat Security Advisory: kernel security update | kernel: bluetooth: bt_sock_ioctl race condition leads to use-after-free in bt_sock_recvmsg kernel: i40e: Do not allow untrusted VF to remove administratively set MAC | [
"cpe:/a:redhat:rhel_eus:8.8::crb",
"cpe:/o:redhat:rhel_eus:8.8::baseos"
] | null | 4.4 | null | null |
RHSA-2023:3906 | Red Hat Security Advisory: Red Hat Integration Camel K 1.10.1 release security update | codehaus-plexus: Directory Traversal codehaus-plexus: XML External Entity (XXE) Injection scandium: Failing DTLS handshakes may cause throttling to block processing of records postgresql-jdbc: Information leak of prepared statement data due to insecure temporary file permissions CXF: directory listing / code exfiltration json-smart: Uncontrolled Resource Consumption vulnerability in json-smart (Resource Exhaustion) | [
"cpe:/a:redhat:camel_k:1"
] | null | 7.5 | null | null |
RHSA-2017:3093 | Red Hat Security Advisory: python-django security update | python-django: Open redirect and possible XSS attack via user-supplied numeric redirect URLs | [
"cpe:/a:redhat:openstack:11::el7"
] | null | null | 6.1 | null |
RHSA-2011:1379 | Red Hat Security Advisory: krb5 security update | krb5: KDC denial of service vulnerabilities (MITKRB5-SA-2011-006) krb5: KDC denial of service vulnerabilities (MITKRB5-SA-2011-006) krb5: KDC denial of service vulnerabilities (MITKRB5-SA-2011-006) | [
"cpe:/o:redhat:enterprise_linux:6::server"
] | null | null | null | null |
RHSA-2024:1751 | Red Hat Security Advisory: unbound security update | unbound: unrestricted reconfiguration enabled to anyone that may lead to local privilege escalation | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 8 | null | null |
RHSA-2021:2352 | Red Hat Security Advisory: .NET Core 3.1 security and bugfix update | dotnet: ASP.NET Core Client Disconnect Denial of Service | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 5.9 | null | null |
RHSA-2013:1451 | Red Hat Security Advisory: java-1.7.0-openjdk security update | OpenJDK: java.util.TimeZone does not restrict setting of default time zone (Libraries, 8001029) OpenJDK: XML parsing Denial of Service (JAXP, 8017298) OpenJDK: insufficient html escaping in jhat (jhat, 8011081) OpenJDK: Inet6Address class IPv6 address processing errors (Libraries, 8015743) OpenJDK: image conversion out of bounds read (2D, 8014102) OpenJDK: key data leak via toString() methods (Libraries, 8011071) OpenJDK: Incorrect awt_getPixelByte/awt_getPixelShort/awt_setPixelByte/awt_setPixelShort image raster checks (2D, 8014093) OpenJDK: JTable not properly performing certain access checks (Swing, 8013744) OpenJDK: insufficient InterfaceImplementor security checks (Scripting, 8017299) OpenJDK: insufficient security checks (Beans, 8012071) OpenJDK: insufficient escaping of window title string (Javadoc, 8016675) OpenJDK: default keytab path information leak (JGSS, 8022931) OpenJDK: javax.xml.transform.TransformerFactory does not properly honor XMLConstants.FEATURE_SECURE_PROCESSING (JAXP, 8012425) OpenJDK: insufficient checks of KDC replies (JGSS, 8014341) OpenJDK: javac does not ignore certain ignorable characters (Javadoc, 8016653) OpenJDK: JPEGImageReader and JPEGImageWriter missing band size checks (2D, 8013510) OpenJDK: RMIConnection stub missing permission check (CORBA, 8011157) OpenJDK: VersionHelper12 does not honor modifyThreadGroup restriction (JNDI, 8013739) OpenJDK: insufficient security checks (JAXWS, 8017505) OpenJDK: com.sun.org.apache.xml.internal.security.utils.UnsyncByteArrayOutputStream Denial of Service (Security, 8021290) OpenJDK: XML parsing Denial of Service (JAXP, 8014530) OpenJDK: Java2d Disposer security bypass (2D, 8017287) OpenJDK: checkPackageAccess missing security check (Libraries, 8017291) OpenJDK: Vulnerability in Libraries component (Libraries, 7023639) OpenJDK: getDeclaringClass() information leak (Libraries, 8014349) OpenJDK: ObjectInputStream/ObjectOutputStream missing checks (Libraries, 8014987) OpenJDK: insufficient DataFlavor security checks (AWT, 8012277) OpenJDK: Missing CORBA security checks (Libraries, 8017196) OpenJDK: XML stream factory finder information leak (JAXP, 8013502) | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2020:4990 | Red Hat Security Advisory: kernel security update | kernel: net: bluetooth: information leak when processing certain AMP packets | [
"cpe:/o:redhat:rhel_aus:7.2::server"
] | null | 5.3 | null | null |
RHSA-2023:4921 | Red Hat Security Advisory: Red Hat Single Sign-On 7.6.5 for OpenShift image enhancement and security update | jackson-databind: Possible DoS if using JDK serialization to serialize JsonNode jettison: Uncontrolled Recursion in JSONArray undertow: OutOfMemoryError due to @MultipartConfig handling | [
"cpe:/a:redhat:rhosemc:1.0::el8"
] | null | 7.5 | null | null |
RHSA-2012:0038 | Red Hat Security Advisory: mod_cluster-native security update | mod_cluster: malicious worker nodes can register on any vhost | [
"cpe:/a:redhat:jboss_enterprise_application_platform:5.1"
] | null | null | null | null |
RHSA-2020:4655 | Red Hat Security Advisory: cyrus-imapd security update | cyrus-imapd: privilege escalation in HTTP request cyrus-imapd: lmtpd component created mailboxes with administrator privileges if the "fileinto" was used, bypassing ACL checks | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 6.5 | 7.4 | null |
RHSA-2023:7533 | Red Hat Security Advisory: tigervnc security update | xorg-x11-server: Out-of-bounds write in XIChangeDeviceProperty/RRChangeOutputProperty | [
"cpe:/a:redhat:rhel_eus:8.8::appstream"
] | null | 7.8 | null | null |
RHSA-2019:1947 | Red Hat Security Advisory: vim security update | vim/neovim: ': source!' command allows arbitrary command execution via modelines | [
"cpe:/o:redhat:rhel_eus:7.4::computenode",
"cpe:/o:redhat:rhel_eus:7.4::server"
] | null | 5.3 | null | null |
RHSA-2021:2355 | Red Hat Security Advisory: kernel security and bug fix update | kernel: malicious USB devices can lead to multiple out-of-bounds write kernel: Integer overflow in Intel(R) Graphics Drivers kernel: Local buffer overflow in ctnetlink_parse_tuple_filter in net/netfilter/nf_conntrack_netlink.c kernel: ICMP rate limiting can be used for DNS poisoning attack | [
"cpe:/o:redhat:rhel_aus:7.6::server",
"cpe:/o:redhat:rhel_e4s:7.6::server",
"cpe:/o:redhat:rhel_tus:7.6::server"
] | null | 7.4 | 6.8 | null |
RHSA-2018:3592 | Red Hat Security Advisory: Red Hat Single Sign-On 7.2.5 on RHEL 6 security and bug fix update | keycloak: auth permitted with expired certs in SAML client keycloak: expiration not validated in SAML broker consumer endpoint keycloak: XSS-Vulnerability with response_mode=form_post keycloak: brute force protection not working for the entire login workflow keycloak: Open Redirect in Login and Logout | [
"cpe:/a:redhat:red_hat_single_sign_on:7::el6"
] | null | null | 6.1 | null |
RHSA-2024:1963 | Red Hat Security Advisory: golang security update | golang: net/http, x/net/http2: unlimited number of CONTINUATION frames causes DoS | [
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 7.5 | null | null |
RHSA-2016:1422 | Red Hat Security Advisory: httpd security and bug fix update | HTTPD: sets environmental variable based on user supplied Proxy request header | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 5 | null |
RHSA-2015:2618 | Red Hat Security Advisory: chromium-browser security update | chromium-browser: Type confusion in extensions chromium-browser: Use-after free in Blink chromium-browser: Escaping issue in saved pages chromium-browser: Various fixes from internal audits, fuzzing and other initiatives v8: multiple vulnerabilities fixed in 4.7.80.23 | [
"cpe:/a:redhat:rhel_extras:6"
] | null | null | null | null |
RHSA-2022:0687 | Red Hat Security Advisory: OpenShift API for Data Protection (OADP) 1.0.1 security and bug fix update | ulikunitz/xz: Infinite loop in readUvarint allows for denial of service opencontainers: OCI manifest and index parsing confusion | [
"cpe:/a:redhat:openshift_api_data_protection:1.0::el8"
] | null | 5 | null | null |
RHSA-2022:6460 | Red Hat Security Advisory: kernel security, bug fix, and enhancement update | hw: cpu: incomplete clean-up of multi-core shared buffers (aka SBDR) hw: cpu: incomplete clean-up of microarchitectural fill buffers (aka SBDS) hw: cpu: incomplete clean-up in specific special register write operations (aka DRPW) kernel: KVM: x86/mmu: make apf token non-zero to fix bug | [
"cpe:/a:redhat:enterprise_linux:8::crb",
"cpe:/o:redhat:enterprise_linux:8::baseos",
"cpe:/o:redhat:rhev_hypervisor:4.4::el8"
] | null | 5.5 | null | null |
RHSA-2018:0522 | Red Hat Security Advisory: .NET Core on Red Hat Enterprise Linux security update | Core: Hash Collision Denial of Service | [
"cpe:/a:redhat:rhel_dotnet:1.0::el7",
"cpe:/a:redhat:rhel_dotnet:1.1::el7",
"cpe:/a:redhat:rhel_dotnet:2.0::el7"
] | null | null | 3.7 | null |
RHSA-2012:0710 | Red Hat Security Advisory: firefox security update | Mozilla: Miscellaneous memory safety hazards (rv:13.0/ rv:10.0.5) (MFSA 2012-34) Mozilla: Miscellaneous memory safety hazards (rv:13.0/ rv:10.0.5) (MFSA 2012-34) Mozilla: Miscellaneous memory safety hazards (rv:13.0/ rv:10.0.5) (MFSA 2012-34) Mozilla: Miscellaneous memory safety hazards (rv:13.0/ rv:10.0.5) (MFSA 2012-34) Mozilla: Buffer overflow and use-after-free issues found using Address Sanitizer (MFSA 2012-40) Mozilla: Buffer overflow and use-after-free issues found using Address Sanitizer (MFSA 2012-40) Mozilla: Content Security Policy inline-script bypass (MFSA 2012-36) Mozilla: Information disclosure though Windows file shares and shortcut files (MFSA 2012-37) Mozilla: Use-after-free while replacing/inserting a node in a document (MFSA 2012-38) Mozilla: Buffer overflow and use-after-free issues found using Address Sanitizer (MFSA 2012-40) Mozilla: Miscellaneous memory safety hazards (rv:13.0/ rv:10.0.5) (MFSA 2012-34) | [
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server",
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2005:057 | Red Hat Security Advisory: gpdf security update | security flaw security flaw security flaw | [
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2007:0387 | Red Hat Security Advisory: tcpdump security and bug fix update | tcpdump denial of service tcpdump BGP integer overflow | [
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2018:3221 | Red Hat Security Advisory: openssl security, bug fix, and enhancement update | openssl: Malformed X.509 IPAdressFamily could cause OOB read ROHNP: Key Extraction Side Channel in Multiple Crypto Libraries openssl: Malicious server can send large prime to client during DH(E) TLS handshake causing the client to hang openssl: RSA key generation cache timing vulnerability in crypto/rsa/rsa_gen.c allows attackers to recover private keys openssl: Handling of crafted recursive ASN.1 structures can cause a stack overflow and resulting denial of service | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 6.5 | null |
RHSA-2020:3471 | Red Hat Security Advisory: bind security update | bind: BIND does not sufficiently limit the number of fetches performed when processing referrals bind: A logic error in code which checks TSIG validity can be used to trigger an assertion failure in tsig.c | [
"cpe:/o:redhat:rhel_aus:7.2::server"
] | null | 7.5 | null | null |
RHSA-2019:0818 | Red Hat Security Advisory: kernel security and bug fix update | Kernel: KVM: potential use-after-free via kvm_ioctl_create_device() Kernel: KVM: nVMX: use-after-free of the hrtimer for emulation of the preemption timer | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 7.5 | null |
RHSA-2022:5774 | Red Hat Security Advisory: thunderbird security update | Mozilla: Memory safety bugs fixed in Firefox 103 and 102.1 Mozilla: Directory indexes for bundled resources reflected URL parameters Mozilla: Mouse Position spoofing with CSS transforms | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 7.5 | 6.1 | null |
RHSA-2024:1305 | Red Hat Security Advisory: edk2 security update | edk2: Buffer overflow when processing DNS Servers option in a DHCPv6 Advertise message | [
"cpe:/a:redhat:rhel_aus:8.4::appstream",
"cpe:/a:redhat:rhel_e4s:8.4::appstream",
"cpe:/a:redhat:rhel_tus:8.4::appstream"
] | null | 8.8 | null | null |
RHSA-2024:1490 | Red Hat Security Advisory: firefox security update | nss: timing attack against RSA decryption Mozilla: Crash in NSS TLS method Mozilla: JIT code failed to save return registers on Armv7-A Mozilla: Integer overflow could have led to out of bounds write Mozilla: Improper handling of html and body tags enabled CSP nonce leakage Mozilla: Clickjacking vulnerability could have led to a user accidentally granting permissions Mozilla: Self referencing object could have potentially led to a use-after-free Mozilla: Memory safety bugs fixed in Firefox 124, Firefox ESR 115.9, and Thunderbird 115.9 Mozilla: Improve handling of out-of-memory conditions in ICU Mozilla: Privileged JavaScript Execution via Event Handlers | [
"cpe:/a:redhat:rhel_aus:8.2::appstream",
"cpe:/a:redhat:rhel_e4s:8.2::appstream",
"cpe:/a:redhat:rhel_tus:8.2::appstream"
] | null | 8.8 | null | null |
RHSA-2010:0743 | Red Hat Security Advisory: acroread security update | Acroread: Stack-based buffer overflow by processing certain fonts (APSA10-02) Flash: crash or potential arbitrary code execution (APSB10-22) acroread: use of insecure RPATH (APSB10-21) acroread: multiple code execution flaws (APSB10-21) acroread: multiple code execution flaws (APSB10-21) acroread: multiple code execution flaws (APSB10-21) acroread: multiple code execution flaws (APSB10-21) acroread: multiple code execution flaws (APSB10-21) acroread: multiple code execution flaws (APSB10-21) acroread: multiple code execution flaws (APSB10-21) acroread: multiple code execution flaws (APSB10-21) acroread: multiple code execution flaws (APSB10-21) acroread: multiple code execution flaws (APSB10-21) acroread: multiple code execution flaws (APSB10-21) acroread: multiple code execution flaws (APSB10-21) acroread: multiple code execution flaws (APSB10-21) acroread: denial of service flaws (APSB10-21) acroread: denial of service flaws (APSB10-21) acroread: multiple code execution flaws (APSB10-21) | [
"cpe:/a:redhat:rhel_extras:4",
"cpe:/a:redhat:rhel_extras:5::client",
"cpe:/a:redhat:rhel_extras:5::server"
] | null | null | null | null |
RHSA-2025:3094 | Red Hat Security Advisory: kpatch-patch-4_18_0-477_43_1, kpatch-patch-4_18_0-477_67_1, kpatch-patch-4_18_0-477_81_1, and kpatch-patch-4_18_0-477_89_1 security update | kernel: can: bcm: Fix UAF in bcm_proc_show() | [
"cpe:/o:redhat:rhel_eus:8.8::baseos"
] | null | 7.8 | null | null |
RHSA-2024:10917 | Red Hat Security Advisory: Red Hat OpenShift distributed tracing platform (Jaeger) 3.4 release | http-proxy-middleware: Denial of Service express: Improper Input Handling in Express Redirects send: Code Execution Vulnerability in Send Library serve-static: Improper Sanitization in serve-static path-to-regexp: Backtracking regular expressions cause ReDoS body-parser: Denial of Service Vulnerability in body-parser vite: server.fs.deny is bypassed when using `?import&raw` vite: XSS via DOM Clobbering gadget found in vite bundled scripts rollup: DOM Clobbering Gadget found in rollup bundled scripts that leads to XSS | [
"cpe:/a:redhat:openshift_distributed_tracing:3.4::el8"
] | null | 6.4 | null | null |
RHSA-2017:2412 | Red Hat Security Advisory: kernel security and bug fix update | kernel: NFSv3 server does not properly handle payload bounds checking of WRITE requests | [
"cpe:/o:redhat:rhel_els:5"
] | null | null | 6.5 | null |
RHSA-2002:173 | Red Hat Security Advisory: krb5 security update | security flaw | [
"cpe:/o:redhat:enterprise_linux:2.1::as"
] | null | null | null | null |
RHSA-2021:1499 | Red Hat Security Advisory: Red Hat Advanced Cluster Management 2.2.3 security and bug fix update | nodejs-glob-parent: Regular expression denial of service nodejs-underscore: Arbitrary code execution via the template function nodejs-is-svg: ReDoS via malicious string nodejs-netmask: improper input validation of octal input data nodejs-netmask: incorrectly parses an IP address that has octal integer with invalid character | [
"cpe:/a:redhat:acm:2.2::el7",
"cpe:/a:redhat:acm:2.2::el8"
] | null | 5.3 | null | null |
RHSA-2014:0762 | Red Hat Security Advisory: rubygem-openshift-origin-node security update | Origin: Command execution as root via downloadable cartridge source-url | [
"cpe:/a:redhat:openshift:1.2::el6"
] | null | null | null | null |
RHSA-2010:0020 | Red Hat Security Advisory: kernel security update | kernel: e1000 issue reported at 26c3 kernel: r8169 issue reported at 26c3 kernel: e1000e frame fragment issue | [
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2024:10813 | Red Hat Security Advisory: OpenShift Container Platform 4.13.54 bug fix and security update | golang-github-gin-gonic-gin: Improper Input Validation golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487) openshift-console: OAuth2 insufficient state parameter entropy QEMU: Denial of Service via Improper Synchronization in QEMU NBD Server During Socket Closure | [
"cpe:/a:redhat:openshift:4.13::el8",
"cpe:/a:redhat:openshift:4.13::el9"
] | null | 8 | 7.5 | null |
RHSA-2024:1472 | Red Hat Security Advisory: go-toolset:rhel8 security update | golang-fips/openssl: Memory leaks in code encrypting and decrypting RSA payloads | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 7.5 | null | null |
RHBA-2005:675 | Red Hat Bug Fix Advisory: gdb bug fix update | security flaw security flaw | [
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws"
] | null | null | null | null |
RHSA-2011:1801 | Red Hat Security Advisory: qemu-kvm security update | qemu: ccid: buffer overflow in handling of VSC_ATR message | [
"cpe:/o:redhat:enterprise_linux:6::server"
] | null | null | null | null |
RHSA-2011:0498 | Red Hat Security Advisory: kernel security, bug fix, and enhancement update | kernel: inotify memory leak kernel: CAN info leak kernel: IB/uverbs: Handle large number of entries in poll CQ kernel: ima: fix add LSM rule bug kernel: xfs: prevent leaking uninitialized stack memory in FSGEOMETRY_V1 kernel: ALSA: caiaq - Fix possible string-buffer overflow kernel: proc: protect mm start_code/end_code in /proc/pid/stat kernel: drm_modeset_ctl signedness issue kernel: drm/radeon/kms: check AA resolve registers on r300 kernel: CAP_SYS_MODULE bypass via CAP_NET_ADMIN kernel: IB/uverbs: Handle large number of entries in poll CQ kernel: bnep device field missing NULL terminator kernel: ebtables stack infoleak kernel: dccp: fix oops on Reset after close kernel: sctp: fix to calc the INIT/INIT-ACK chunk length correctly to set | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2020:2070 | Red Hat Security Advisory: libreswan security update | libreswan: DoS attack via malicious IKEv1 informational exchange message | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 7.5 | null | null |
RHSA-2025:4336 | Red Hat Security Advisory: Red Hat build of Keycloak 26.0.11 Update | org.keycloak/keycloak-services: JWT Token Cache Exhaustion Leading to Denial of Service (DoS) in Keycloak org.keycloak.protocol.services: Keycloak hostname verification org.keycloak.authentication: Two factor authentication bypass | [
"cpe:/a:redhat:build_keycloak:26"
] | null | 5.4 | null | null |
RHSA-2013:1426 | Red Hat Security Advisory: xorg-x11-server security update | xorg-x11-server: use-after-free flaw when handling ImageText requests | [
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server",
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2020:3780 | Red Hat Security Advisory: OpenShift Container Platform 4.5.11 ose-cluster-svcat-apiserver-operator-container security update | golang.org/x/text: possibility to trigger an infinite loop in encoding/unicode could lead to crash | [
"cpe:/a:redhat:openshift:4.5::el7"
] | null | 7.5 | null | null |
RHSA-2024:1554 | Red Hat Security Advisory: .NET 6.0 security update | dotnet: Denial of Service in X509Certificate2 | [
"cpe:/a:redhat:rhel_eus:8.6::appstream",
"cpe:/a:redhat:rhel_eus:8.6::crb"
] | null | 7.5 | null | null |
RHSA-2017:3452 | Red Hat Security Advisory: rh-java-common-lucene5 security update | Solr: Code execution via entity expansion | [
"cpe:/a:redhat:rhel_software_collections:3::el6",
"cpe:/a:redhat:rhel_software_collections:3::el7"
] | null | null | 9.8 | null |
RHSA-2018:2261 | Red Hat Security Advisory: Red Hat Ceph Storage 2.5 security, enhancement, and bug fix update | ceph: cephx protocol is vulnerable to replay attack ceph: cephx uses weak signatures ceph: ceph-mon does not perform authorization on OSD pool ops | [
"cpe:/a:redhat:ceph_storage:2::el7"
] | null | null | 4.6 | null |
RHSA-2021:3818 | Red Hat Security Advisory: .NET 5.0 on RHEL 7 security and bugfix update | dotnet: System.DirectoryServices.Protocols.LdapConnection sends credentials in plaintext if TLS handshake fails | [
"cpe:/a:redhat:rhel_dotnet:5.0::el7"
] | null | 5.7 | null | null |
RHSA-2019:1973 | Red Hat Security Advisory: kernel-alt security and bug fix update | Kernel: vhost_net: infinite loop while receiving packets leads to DoS | [
"cpe:/o:redhat:enterprise_linux:7::server"
] | null | null | 6.3 | null |
RHSA-2007:1029 | Red Hat Security Advisory: xpdf security update | DCTStream:: readProgressiveDataUnit() DCTStream:: reset() CCITTFaxStream:: lookChar() | [
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2023:0289 | Red Hat Security Advisory: firefox security update | Mozilla: libusrsctp library out of date Mozilla: Fullscreen notification bypass Mozilla: Arbitrary file read from GTK drag and drop on Linux Mozilla: Malicious command could be hidden in devtools output Mozilla: URL being dragged from cross-origin iframe into same tab triggers navigation Mozilla: Content Security Policy wasn't being correctly applied to WebSockets in WebWorkers Mozilla: Calls to <code>console.log</code> allowed bypasing Content Security Policy via format directive Mozilla: Memory safety bugs fixed in Firefox 109 and Firefox ESR 102.7 | [
"cpe:/a:redhat:rhel_eus:8.6::appstream"
] | null | 8.8 | null | null |
RHSA-2019:3698 | Red Hat Security Advisory: libarchive security and bug fix update | libarchive: Out-of-bounds read in lha_read_data_none libarchive: Double free in RAR decoder resulting in a denial of service libarchive: Use after free in RAR decoder resulting in a denial of service libarchive: Out of bounds read in archive_read_support_format_7zip.c resulting in a denial of service libarchive: Infinite recursion in archive_read_support_format_iso9660.c resulting in denial of service | [
"cpe:/a:redhat:enterprise_linux:8::crb",
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | null | 6.5 | null |
RHSA-2014:1295 | Red Hat Security Advisory: bash Shift_JIS security update | bash: specially-crafted environment variables can be used to inject shell commands | [
"cpe:/a:redhat:rhel_sjis:5",
"cpe:/a:redhat:rhel_sjis:6"
] | null | null | null | null |
RHSA-2023:5947 | Red Hat Security Advisory: Run Once Duration Override Operator for Red Hat OpenShift 1.0.1 security update | golang: crypto/internal/nistec: specific unreduced P-256 scalars produce incorrect results golang: html/template: improper sanitization of CSS values golang: html/template: improper handling of JavaScript whitespace golang: html/template: improper handling of empty HTML attributes golang: net/http: insufficient sanitization of Host header golang: crypto/tls: slow verification of certificate chains containing large RSA keys golang: html/template: improper handling of HTML-like comments within script contexts golang: html/template: improper handling of special tags within script contexts golang: crypto/tls: panic when processing post-handshake message on QUIC connections golang: crypto/tls: lack of a limit on buffered post-handshake golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487) HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack) | [
"cpe:/a:redhat:run_once_duration_override_operator:1.0::el8"
] | null | 7.5 | null | null |
RHSA-2024:2504 | Red Hat Security Advisory: libssh security update | libssh: ProxyCommand/ProxyJump features allow injection of malicious code through hostname libssh: Missing checks for return values for digests | [
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/o:redhat:enterprise_linux:9::baseos"
] | null | 3.7 | null | null |
RHSA-2023:4350 | Red Hat Security Advisory: python-requests security update | python-requests: Unintended leak of Proxy-Authorization header | [
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/o:redhat:enterprise_linux:9::baseos"
] | null | 6.1 | null | null |
RHSA-2024:10952 | Red Hat Security Advisory: php:7.4 security update | php: Password_verify() always return true with some hash php: 1-byte array overrun in common path resolve code php: Missing error check and insufficient random bytes in HTTP Digest authentication for SOAP php: XML loading external entity without being enabled php: phar Buffer mismanagement php: host/secure cookie bypass due to partial CVE-2022-31629 fix php: password_verify can erroneously return true, opening ATO risk php: Filter bypass in filter_var (FILTER_VALIDATE_URL) php: Erroneous parsing of multipart form data php: cgi.force_redirect configuration is bypassable due to the environment variable collision php: PHP-FPM Log Manipulation Vulnerability | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 3.3 | null | null |
RHSA-2020:2415 | Red Hat Security Advisory: freerdp security update | freerdp: Out-of-bounds write in crypto_rsa_common in libfreerdp/crypto/crypto.c | [
"cpe:/a:redhat:rhel_eus:8.1::appstream",
"cpe:/a:redhat:rhel_eus:8.1::crb"
] | null | 8.3 | null | null |
RHSA-2010:0793 | Red Hat Security Advisory: glibc security update | glibc: ld.so arbitrary DSO loading via LD_AUDIT in setuid/setgid programs | [
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2006:0577 | Red Hat Security Advisory: mutt security update | security flaw | [
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws",
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2017:1413 | Red Hat Security Advisory: Red Hat JBoss Core Services Apache HTTP Server 2.4.23 Service Pack 1 for RHEL 7 | httpd: Padding Oracle in Apache mod_session_crypto httpd: DoS vulnerability in mod_auth_digest openssl: OCSP Status Request extension unbounded memory growth openssl: ECDSA P-256 timing attack key recovery SSL/TLS: Malformed plain-text ALERT packets could cause remote DoS httpd: Incomplete handling of LimitRequestFields directive in mod_http2 httpd: Apache HTTP Request Parsing Whitespace Defects | [
"cpe:/a:redhat:jboss_core_services:1::el7"
] | null | null | 4 | null |
RHSA-2017:2906 | Red Hat Security Advisory: Red Hat Single Sign-On security update | jasypt: Vulnerable to timing attack against the password hash comparison keycloak: reflected XSS using HOST header keycloak: CSRF token fixation keycloak: resource privilege extension via access token in oauth libpam4j: Account check bypass | [
"cpe:/a:redhat:jboss_single_sign_on:7.1"
] | null | null | 4.3 | null |
RHSA-2025:0834 | Red Hat Security Advisory: OpenShift Container Platform 4.12.72 packages and security update | jinja2: Jinja has a sandbox breakout through malicious filenames jinja2: Jinja has a sandbox breakout through indirect reference to format method | [
"cpe:/a:redhat:openshift:4.12::el8",
"cpe:/a:redhat:openshift_ironic:4.12::el9"
] | null | 6.3 | null | null |
RHBA-2022:2065 | Red Hat Bug Fix Advisory: libtirpc bug fix and enhancement update | libtirpc: DoS vulnerability with lots of connections | [
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 7.5 | null | null |
RHSA-2020:2061 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.2.8 security update | jackson-mapper-asl: XML external entity similar to CVE-2016-3720 cxf: OpenId Connect token service does not properly validate the clientId cxf: reflected XSS in the services listing page Wildfly: EJBContext principal is not popped back after invoking another EJB using a different Security Domain SmallRye: SecuritySupport class is incorrectly public and contains a static method to access the current threads context class loader Soteria: security identity corruption across concurrent threads undertow: AJP File Read/Inclusion Vulnerability undertow: servletPath is normalized incorrectly leading to dangerous application mapping which could result in security bypass cryptacular: excessive memory allocation during a decode operation undertow: Memory exhaustion issue in HttpReadListener via "Expect: 100-continue" header undertow: invalid HTTP request with large chunk size | [
"cpe:/a:redhat:jboss_enterprise_application_platform:7.2"
] | null | 6.5 | 8.1 | null |
RHSA-2020:2336 | Red Hat Security Advisory: freerdp security update | freerdp: Out-of-bounds write in planar.c freerdp: Integer overflow in region.c freerdp: Out-of-bounds write in interleaved.c | [
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb"
] | null | 6.6 | null | null |
RHSA-2025:1264 | Red Hat Security Advisory: kernel security update | kernel: media: uvcvideo: Skip parsing frames of type UVC_VS_UNDEFINED in uvc_parse_format | [
"cpe:/o:redhat:rhel_aus:8.6::baseos",
"cpe:/o:redhat:rhel_e4s:8.6::baseos",
"cpe:/o:redhat:rhel_tus:8.6::baseos"
] | null | 7.3 | null | null |
RHSA-2011:1248 | Red Hat Security Advisory: ca-certificates security update | An updated ca-certificates package that fixes one security issue is now
available for Red Hat Enterprise Linux 6.
The Red Hat Security Response Team has rated this update as having
important security impact. | [
"cpe:/o:redhat:enterprise_linux:6::server"
] | null | null | null | null |
RHSA-2009:0326 | Red Hat Security Advisory: kernel security and bug fix update | Linux kernel ext[234] directory corruption denial of service kernel: enforce a minimum SG_IO timeout Linux kernel minor signal handling vulnerability kernel: ecryptfs readlink flaw kernel: dell_rbu local oops kernel: skfp_ioctl inverted logic flaw kernel: memory disclosure in SO_BSDCOMPAT gsopt kernel: rt_cache leak leads to lack of network connectivity | [
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2020:2508 | Red Hat Security Advisory: expat security update | expat: Integer overflow leading to buffer overflow in XML_GetBuffer() | [
"cpe:/o:redhat:rhel_eus:7.7::computenode",
"cpe:/o:redhat:rhel_eus:7.7::server"
] | null | null | null | null |
RHSA-2020:3834 | Red Hat Security Advisory: firefox security update | Mozilla: Memory safety bugs fixed in Firefox 81 and Firefox ESR 78.3 Mozilla: XSS when pasting attacker-controlled data into a contenteditable element Mozilla: Download origin spoofing via redirect Mozilla: When recursing through layers while scrolling, an iterator may have become invalid, resulting in a potential use-after-free scenario | [
"cpe:/a:redhat:rhel_e4s:8.0::appstream"
] | null | 8.8 | 6.1 | null |
RHSA-2022:8011 | Red Hat Security Advisory: fribidi security update | fribidi: Stack based buffer overflow fribidi: Heap-buffer-overflow in fribidi_cap_rtl_to_unicode fribidi: SEGV in fribidi_remove_bidi_marks | [
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 5.5 | null | null |
RHSA-2022:0482 | Red Hat Security Advisory: Red Hat Ansible Ansible Tower 3.8 security update | ansible-tower: Privilege escalation via job isolation escape | [
"cpe:/a:redhat:ansible_automation_platform:3.8::el7",
"cpe:/a:redhat:ansible_automation_platform:3.8::el8"
] | null | 8.8 | null | null |
RHSA-2024:0204 | Red Hat Security Advisory: OpenShift Container Platform 4.14.9 bug fix and security update | opentelemetry: DoS vulnerability in otelhttp opentelemetry-go-contrib: DoS vulnerability in otelgrpc due to unbound cardinality metrics | [
"cpe:/a:redhat:openshift:4.14::el8",
"cpe:/a:redhat:openshift:4.14::el9"
] | null | 7.5 | null | null |
RHSA-2022:5636 | Red Hat Security Advisory: kernel security and bug fix update | kernel: Small table perturb size in the TCP source port generation algorithm can lead to information leak kernel: race condition in perf_event_open leads to privilege escalation kernel: a use-after-free write in the netfilter subsystem can lead to privilege escalation to root | [
"cpe:/o:redhat:rhel_e4s:8.1::baseos"
] | null | 7.8 | null | null |
RHSA-2022:0655 | Red Hat Security Advisory: OpenShift Container Platform 4.9.23 bug fix and security update | golang: archive/zip: malformed archive may cause panic or memory exhaustion (incomplete fix of CVE-2021-33196) | [
"cpe:/a:redhat:openshift:4.9::el8"
] | null | 7.5 | null | null |
RHSA-2023:4815 | Red Hat Security Advisory: kernel security and bug fix update | kernel: OOB access in the Linux kernel's XFS subsystem kernel: ipvlan: out-of-bounds write caused by unclear skb->cb kernel: cls_flower: out-of-bounds write in fl_set_geneve_opt() | [
"cpe:/o:redhat:rhel_aus:8.2::baseos",
"cpe:/o:redhat:rhel_e4s:8.2::baseos",
"cpe:/o:redhat:rhel_tus:8.2::baseos"
] | null | 7.8 | null | null |
RHSA-2024:10788 | Red Hat Security Advisory: postgresql:16 security update | postgresql: PostgreSQL row security below e.g. subqueries disregards user ID changes postgresql: PostgreSQL SET ROLE, SET SESSION AUTHORIZATION reset to wrong user ID postgresql: PostgreSQL PL/Perl environment variable changes execute arbitrary code | [
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 8.8 | null | null |
RHSA-2005:275 | Red Hat Security Advisory: ia32el security update | security flaw | [
"cpe:/a:redhat:rhel_extras:3"
] | null | null | null | null |
RHSA-2007:0724 | Red Hat Security Advisory: firefox security update | security flaw security flaw security flaw security flaw security flaw security flaw security flaw | [
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws",
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2014:0939 | Red Hat Security Advisory: python-django-horizon security, bug fix, and enhancement update | openstack-horizon: multiple XSS flaws openstack-horizon: multiple XSS flaws openstack-horizon: multiple XSS flaws openstack-horizon: multiple XSS flaws | [
"cpe:/a:redhat:openstack:5::el7"
] | null | null | null | null |
RHSA-2019:0375 | Red Hat Security Advisory: flatpak security update | flatpak: potential /proc based sandbox escape | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 7.7 | null |
RHSA-2023:4419 | Red Hat Security Advisory: openssh security update | openssh: Remote code execution in ssh-agent PKCS#11 support | [
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 9.8 | null | null |
RHBA-2022:5749 | Red Hat Bug Fix Advisory: .NET 6.0 bugfix update | eventsource: Exposure of Sensitive Information | [
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::crb"
] | null | 9.3 | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.