id
stringlengths
13
15
title
stringlengths
29
176
description
stringlengths
8
32.1k
cpes
sequencelengths
0
20
cvss_v4_0
null
cvss_v3_1
float64
0
10
cvss_v3_0
float64
0
10
cvss_v2_0
null
RHSA-2018:2603
Red Hat Security Advisory: kernel security update
Kernel: hw: cpu: L1 terminal fault (L1TF) Kernel: hw: cpu: L1 terminal fault (L1TF)
[ "cpe:/o:redhat:rhel_aus:5.9" ]
null
null
5.6
null
RHSA-2022:1326
Red Hat Security Advisory: thunderbird security update
Mozilla: Use-after-free in NSSToken objects Mozilla: Use-after-free after VR Process destruction Mozilla: OpenPGP revocation information was ignored Mozilla: Denial of Service via complex regular expressions Mozilla: Out of bounds write due to unexpected WebAuthN Extensions Mozilla: Use-after-free in DocumentL10n::TranslateDocument Mozilla: Incorrect AliasSet used in JIT Codegen Mozilla: iframe contents could be rendered outside the border Mozilla: Memory safety bugs fixed in Firefox 99 and Firefox ESR 91.8
[ "cpe:/a:redhat:rhel_eus:8.2::appstream" ]
null
8.8
6.1
null
RHSA-2016:2956
Red Hat Security Advisory: Red Hat Ceph Storage 2.1 security and bug fix update
ceph: Object Gateway server DoS by sending invalid cross-origin HTTP request
[ "cpe:/a:redhat:ceph_storage:2::ubuntu16.04" ]
null
null
6.5
null
RHSA-2024:1938
Red Hat Security Advisory: thunderbird security update
Mozilla: Permission prompt input delay could expire when not in focus Mozilla: Denial of Service using HTTP/2 CONTINUATION frames Mozilla: GetBoundName in the JIT returned the wrong object Mozilla: Out-of-bounds-read after mis-optimized switch statement Mozilla: Incorrect JITting of arguments led to use-after-free during garbage collection Mozilla: Integer-overflow led to out-of-bounds-read in the OpenType sanitizer Mozilla: Potential use-after-free due to AlignedBuffer self-move Mozilla: Memory safety bug fixed in Firefox 125, Firefox ESR 115.10, and Thunderbird 115.10
[ "cpe:/a:redhat:rhel_eus:9.0::appstream" ]
null
7.5
null
null
RHBA-2012:0881
Red Hat Bug Fix Advisory: freeradius bug fix and enhancement update
freeradius: does not respect expired passwords when using the unix module
[ "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
null
null
RHBA-2020:0675
Red Hat Bug Fix Advisory: OpenShift Container Platform 4.3.5 packages update
jenkins: Inbound TCP Agent Protocol/3 authentication bypass jenkins: UDP multicast/broadcast service amplification reflection attack jenkins: Non-constant time comparison of inbound TCP agent connection secret jenkins: Non-constant time HMAC comparison jenkins: Exposed session identifiers on user detail object in the whoAmI diagnostic page jenkins: Memory usage graphs accessible to anyone with Overall/Read jenkins: REST APIs vulnerable to clickjacking
[ "cpe:/a:redhat:openshift:4.3::el7", "cpe:/a:redhat:openshift:4.3::el8" ]
null
3.1
null
null
RHSA-2024:3877
Red Hat Security Advisory: dnsmasq security update
bind9: KeyTrap - Extreme CPU consumption in DNSSEC validator bind9: Preparing an NSEC3 closest encloser proof can exhaust CPU resources
[ "cpe:/a:redhat:rhel_aus:8.4::appstream", "cpe:/a:redhat:rhel_e4s:8.4::appstream", "cpe:/a:redhat:rhel_tus:8.4::appstream" ]
null
7.5
null
null
RHSA-2024:10525
Red Hat Security Advisory: Red Hat build of MicroShift 4.14.42 security update
runc: file descriptor leak
[ "cpe:/a:redhat:openshift:4.14::el9" ]
null
8.6
null
null
RHSA-2015:0895
Red Hat Security Advisory: 389-ds-base security update
389-ds-base: access control bypass with modrdn
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
null
null
RHSA-2020:3734
Red Hat Security Advisory: httpd:2.4 security update
httpd: Push diary crash on specifically crafted HTTP/2 header
[ "cpe:/a:redhat:rhel_e4s:8.0::appstream" ]
null
7.5
null
null
RHSA-2007:0671
Red Hat Security Advisory: kernel security and bugfix update
Kernel: CAPI overflow Bluetooth setsockopt() information leaks
[ "cpe:/o:redhat:enterprise_linux:3::as", "cpe:/o:redhat:enterprise_linux:3::desktop", "cpe:/o:redhat:enterprise_linux:3::es", "cpe:/o:redhat:enterprise_linux:3::ws" ]
null
null
null
null
RHSA-2022:7457
Red Hat Security Advisory: container-tools:rhel8 security, bug fix, and enhancement update
golang: net/http/httputil: panic due to racy read of persistConn after handler panic opencontainers: OCI manifest and index parsing confusion cri-o: memory exhaustion on the node when access to the kube api buildah: possible information disclosure and modification golang: crash in a golang.org/x/crypto/ssh server runc: incorrect handling of inheritable capabilities
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
5.6
null
null
RHSA-2010:0610
Red Hat Security Advisory: kernel security and bug fix update
kernel: bluetooth: potential bad memory access with sysfs files kernel: ext4: Make sure the MOVE_EXT ioctl can't overwrite append-only files /kernel/security/CVE-2006-0742 test cause kernel-xen panic on ia64 kernel: xfs swapext ioctl minor security issue kernel: cifs: Fix a kernel BUG with remote OS/2 server kernel: nfsd4: bug in read_buf kernel: dns_resolver upcall security issue
[ "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
RHSA-2023:1066
Red Hat Security Advisory: pesign security update
pesign: Local privilege escalation on pesign systemd service
[ "cpe:/a:redhat:rhel_eus:8.4::appstream" ]
null
7.8
null
null
RHSA-2017:0307
Red Hat Security Advisory: kernel security and bug fix update
kernel: Race condition vulnerability in execve argv arguments kernel: Slab out-of-bounds access in sctp_sf_ootb()
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
5.9
null
RHSA-2021:2130
Red Hat Security Advisory: Windows Container Support for Red Hat OpenShift 2.0.1 security and bug fix update
kubernetes: LoadBalancer Service type don't create a HNS policy for empty or invalid external loadbalancer IP, what could lead to MITM
[ "cpe:/a:redhat:openshift:4.7::el8" ]
null
5.8
null
null
RHSA-2021:4687
Red Hat Security Advisory: kernel security update
kernel: insufficient access control in the Intel(R) PROSet/Wireless WiFi Software driver may allow an unauthenticated user to potentially enable DoS via adjacent access kernel: use-after-free in drivers/infiniband/core/ucma.c ctx use-after-free
[ "cpe:/a:redhat:rhel_eus:8.1::crb", "cpe:/o:redhat:rhel_eus:8.1::baseos" ]
null
7.8
null
null
RHSA-2014:0364
Red Hat Security Advisory: ruby193-libyaml security update
libyaml: heap-based buffer overflow when parsing YAML tags libyaml: heap-based buffer overflow when parsing URLs
[ "cpe:/a:redhat:openstack:3::el6" ]
null
null
null
null
RHEA-2019:3809
Red Hat Enhancement Advisory: Red Hat OpenShift Service Mesh 1.0.2 RPMs
kubernetes: YAML parsing vulnerable to "Billion Laughs" attack, allowing for remote denial of service
[ "cpe:/a:redhat:service_mesh:1.0::el7", "cpe:/a:redhat:service_mesh:1.0::el8" ]
null
null
7.5
null
RHSA-2021:3556
Red Hat Security Advisory: Release of OpenShift Serverless 1.17.0
serverless: incomplete fix for CVE-2021-27918 / CVE-2021-31525 / CVE-2021-33196 golang: encoding/xml: infinite loop when using xml.NewTokenDecoder with a custom TokenReader golang: net/http: panic in ReadRequest and ReadResponse when reading a very large header golang: net: lookup functions may return invalid host names golang: archive/zip: malformed archive may cause panic or memory exhaustion golang: net/http/httputil: ReverseProxy forwards connection headers if first one is empty golang: math/big.Rat: may cause a panic or an unrecoverable fatal error if passed inputs with very large exponents golang: crypto/tls: certificate of wrong type is causing TLS client to panic
[ "cpe:/a:redhat:serverless:1.17::el8" ]
null
6.5
null
null
RHSA-2022:5726
Red Hat Security Advisory: java-17-openjdk security, bug fix, and enhancement update
OpenJDK: class compilation issue (Hotspot, 8281859) OpenJDK: improper restriction of MethodHandle.invokeBasic() (Hotspot, 8281866) OpenJDK: random exponentials issue (Libraries, 8283875) OpenJDK: integer truncation issue in Xalan-J (JAXP, 8285407)
[ "cpe:/a:redhat:enterprise_linux:8::appstream", "cpe:/a:redhat:enterprise_linux:8::crb" ]
null
7.5
null
null
RHSA-2019:1142
Red Hat Security Advisory: freeradius:3.0 security update
freeradius: eap-pwd: fake authentication using reflection freeradius: eap-pwd: authentication bypass via an invalid curve attack
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
null
8.1
null
RHSA-2019:1484
Red Hat Security Advisory: kernel security and bug fix update
Kernel: tcp: integer overflow while processing SACK blocks allows remote denial of service Kernel: tcp: excessive resource consumption while processing SACK blocks allows remote denial of service kernel: tcp: excessive resource consumption for TCP connections with low MSS allows remote denial of service
[ "cpe:/o:redhat:rhel_aus:7.3::server", "cpe:/o:redhat:rhel_e4s:7.3::server", "cpe:/o:redhat:rhel_tus:7.3::server" ]
null
null
5.3
null
RHSA-2020:4005
Red Hat Security Advisory: libxslt security update
libxslt: xsltCheckRead and xsltCheckWrite routines security bypass by crafted URL libxslt: use after free in xsltCopyText in transform.c could lead to information disclosure
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
7.5
6.3
null
RHSA-2014:1689
Red Hat Security Advisory: openstack-nova security, bug fix, and enhancement update
openstack-nova: Nova VMware driver may connect VNC to another tenant's console
[ "cpe:/a:redhat:openstack:4::el6" ]
null
null
null
null
RHSA-2021:0516
Red Hat Security Advisory: Release of OpenShift Serverless 1.13.0 security update
jwt-go: access restriction bypass vulnerability
[ "cpe:/a:redhat:serverless:1.13::el8" ]
null
7.5
null
null
RHSA-2018:1879
Red Hat Security Advisory: glibc security and bug fix update
glibc: Buffer overflow in glob with GLOB_TILDE glibc: Buffer overflow during unescaping of user names with the ~ operator
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
5.5
null
RHSA-2025:0875
Red Hat Security Advisory: OpenShift Container Platform 4.17.15 security and extras update
cross-spawn: regular expression denial of service express: Improper Input Handling in Express Redirects send: Code Execution Vulnerability in Send Library serve-static: Improper Sanitization in serve-static path-to-regexp: Backtracking regular expressions cause ReDoS golang.org/x/net/html: Non-linear parsing of case-insensitive content in golang.org/x/net/html body-parser: Denial of Service Vulnerability in body-parser dompurify: DOMPurify vulnerable to tampering by prototype pollution path-to-regexp: path-to-regexp Unpatched `path-to-regexp` ReDoS in 0.1.x nanoid: nanoid mishandles non-integer values jinja2: Jinja has a sandbox breakout through malicious filenames jinja2: Jinja has a sandbox breakout through indirect reference to format method
[ "cpe:/a:redhat:openshift:4.17::el9" ]
null
6.3
null
null
RHSA-2024:2696
Red Hat Security Advisory: unbound security update
bind9: KeyTrap - Extreme CPU consumption in DNSSEC validator bind9: Preparing an NSEC3 closest encloser proof can exhaust CPU resources unbound: unrestricted reconfiguration enabled to anyone that may lead to local privilege escalation
[ "cpe:/a:redhat:rhel_aus:8.2::appstream", "cpe:/a:redhat:rhel_e4s:8.2::appstream", "cpe:/a:redhat:rhel_tus:8.2::appstream" ]
null
8
null
null
RHSA-2024:8859
Red Hat Security Advisory: xmlrpc-c security update
libexpat: Integer Overflow or Wraparound
[ "cpe:/a:redhat:enterprise_linux:8::crb", "cpe:/o:redhat:enterprise_linux:8::baseos" ]
null
7.5
null
null
RHSA-2007:0674
Red Hat Security Advisory: perl-Net-DNS security update
perl-Net-DNS security issue Net:: DNS denial of service
[ "cpe:/o:redhat:enterprise_linux:3::as", "cpe:/o:redhat:enterprise_linux:3::desktop", "cpe:/o:redhat:enterprise_linux:3::es", "cpe:/o:redhat:enterprise_linux:3::ws", "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
RHSA-2019:0733
Red Hat Security Advisory: katello-installer-base security and enhancement update
katello-installer-base: QMF methods exposed to goferd via qdrouterd
[ "cpe:/a:redhat:satellite:6.3::el7", "cpe:/a:redhat:satellite_capsule:6.3::el7" ]
null
null
8
null
RHSA-2023:4523
Red Hat Security Advisory: curl security update
curl: GSS delegation too eager connection re-use curl: IDN wildcard match may lead to Improper Cerificate Validation
[ "cpe:/o:redhat:enterprise_linux:8::baseos" ]
null
5.9
null
null
RHSA-2024:11154
Red Hat Security Advisory: bluez security update
bluez: unauthorized HID device connections allows keystroke injection and arbitrary commands execution
[ "cpe:/a:redhat:enterprise_linux:8::appstream", "cpe:/a:redhat:enterprise_linux:8::crb", "cpe:/o:redhat:enterprise_linux:8::baseos" ]
null
6.3
null
null
RHSA-2005:687
Red Hat Security Advisory: ethereal security update
security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw
[ "cpe:/o:redhat:enterprise_linux:3::as", "cpe:/o:redhat:enterprise_linux:3::desktop", "cpe:/o:redhat:enterprise_linux:3::es", "cpe:/o:redhat:enterprise_linux:3::ws" ]
null
null
null
null
RHSA-2013:0868
Red Hat Security Advisory: haproxy security update
haproxy: rewrite rules flaw can lead to arbitrary code execution
[ "cpe:/o:redhat:enterprise_linux:6::server" ]
null
null
null
null
RHSA-2021:3075
Red Hat Security Advisory: libuv security update
libuv: out-of-bounds read in uv__idna_toascii() can lead to information disclosures or crashes
[ "cpe:/a:redhat:enterprise_linux:8::appstream", "cpe:/a:redhat:enterprise_linux:8::crb" ]
null
null
5.3
null
RHSA-2017:2603
Red Hat Security Advisory: docker-distribution security, bug fix, and enhancement update
docker-distribution: Does not properly restrict the amount of content accepted from a user
[ "cpe:/a:redhat:rhel_extras_other:7" ]
null
null
5.3
null
RHSA-2008:0176
Red Hat Security Advisory: openoffice.org security update
openoffice.org: EMF files parsing EMR_BITBLT record heap overflows openoffice.org: OLE files parsing heap overflows
[ "cpe:/o:redhat:enterprise_linux:3::as", "cpe:/o:redhat:enterprise_linux:3::desktop", "cpe:/o:redhat:enterprise_linux:3::es", "cpe:/o:redhat:enterprise_linux:3::ws", "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws" ]
null
null
null
null
RHSA-2021:2299
Red Hat Security Advisory: microcode_ctl security, bug fix and enhancement update
hw: vt-d related privilege escalation hw: improper isolation of shared resources in some Intel Processors hw: observable timing discrepancy in some Intel Processors hw: information disclosure on some Intel Atom processors
[ "cpe:/o:redhat:rhel_els:6" ]
null
5.6
null
null
RHSA-2025:2476
Red Hat Security Advisory: kernel-rt security update
kernel: HID: core: zero-initialize the report buffer kernel: ALSA: usb-audio: Fix potential out-of-bound accesses for Extigy and Mbox devices
[ "cpe:/a:redhat:rhel_eus:9.2::nfv", "cpe:/a:redhat:rhel_eus:9.2::realtime" ]
null
5.8
null
null
RHSA-2014:1920
Red Hat Security Advisory: Red Hat JBoss Web Server 2.1.0 openssl security update
SSL/TLS: Padding Oracle On Downgraded Legacy Encryption attack
[ "cpe:/a:redhat:jboss_enterprise_web_server:2.1" ]
null
null
null
null
RHSA-2020:4366
Red Hat Security Advisory: Satellite 6.8 release
mysql-connector-java: Connector/J unspecified vulnerability (CPU October 2018) puppet-agent: Puppet Agent does not properly verify SSL connection when downloading a CRL rack-protection: Timing attack in authenticity_token.rb hibernate-validator: safeHTML validator allows XSS Django: Incorrect HTTP detection with reverse-proxy connecting via HTTPS rubygem-rack: hijack sessions by using timing attacks targeting the session id rubygem-secure_headers: limited header injection when using dynamic overrides with user input rubygem-secure_headers: directive injection when using dynamic overrides with user input rubygem-actionview: views that use the `j` or `escape_javascript` methods are susceptible to XSS attacks netty: HTTP Request Smuggling due to Transfer-Encoding whitespace mishandling rubygem-websocket-extensions: ReDoS vulnerability in Sec-WebSocket-Extensions parser puppet: Arbitrary catalog retrieval puppet: puppet server and puppetDB may leak sensitive information via metrics API rubygem-rack: directory traversal in Rack::Directory rubygem-rack: percent-encoded cookies can be used to overwrite existing prefixed cookie names jackson-databind: Lacks certain xbean-reflect/JNDI blocking jackson-databind: Serialization gadgets in shaded-hikari-config jackson-databind: Serialization gadgets in ibatis-sqlmap jackson-databind: Serialization gadgets in anteros-core hibernate-validator: Improper input validation in the interpolation of constraint error messages jackson-databind: Serialization gadgets in org.aoju.bus.proxy.provider.*.RmiProvider jackson-databind: Serialization gadgets in javax.swing.JEditorPane jackson-databind: Serialization gadgets in org.springframework:spring-aop jackson-databind: serialization in weblogic/oracle-aqjms jackson-databind: serialization in com.sun.org.apache.xalan.internal.lib.sql.JNDIConnectionPool jackson-databind: serialization in org.jsecurity.realm.jndi.JndiRealmFactory foreman: unauthorized cache read on RPM-based installations through local user Satellite: Local user impersonation by Single sign-on (SSO) user leads to account takeover
[ "cpe:/a:redhat:satellite:6.8::el7", "cpe:/a:redhat:satellite_capsule:6.8::el7" ]
null
7.5
4.8
null
RHSA-2005:173
Red Hat Security Advisory: squid security update
security flaw
[ "cpe:/o:redhat:enterprise_linux:3::as", "cpe:/o:redhat:enterprise_linux:3::desktop", "cpe:/o:redhat:enterprise_linux:3::es", "cpe:/o:redhat:enterprise_linux:3::ws" ]
null
null
null
null
RHSA-2021:0240
Red Hat Security Advisory: dnsmasq security update
dnsmasq: loose address/port check in reply_query() makes forging replies easier for an off-path attacker dnsmasq: loose query name check in reply_query() makes forging replies easier for an off-path attacker dnsmasq: multiple queries forwarded for the same name makes forging replies easier for an off-path attacker
[ "cpe:/o:redhat:rhel_aus:7.2::server" ]
null
4
null
null
RHSA-2024:3308
Red Hat Security Advisory: tomcat security and bug fix update
Tomcat: WebSocket DoS with incomplete closing handshake Tomcat: HTTP/2 header handling DoS
[ "cpe:/a:redhat:rhel_eus:9.2::appstream" ]
null
7.5
null
null
RHSA-2020:2863
Red Hat Security Advisory: Red Hat OpenShift Service Mesh 1.0 servicemesh-prometheus security update
kubernetes: YAML parsing vulnerable to "Billion Laughs" attack, allowing for remote denial of service
[ "cpe:/a:redhat:service_mesh:1.0::el8" ]
null
null
7.5
null
RHSA-2023:7465
Red Hat Security Advisory: squid security update
squid: DoS against HTTP and HTTPS squid: Use-After-Free in the HTTP Collapsed Forwarding Feature
[ "cpe:/a:redhat:enterprise_linux:9::appstream" ]
null
7.5
null
null
RHSA-2023:0196
Red Hat Security Advisory: java-11-openjdk security update
OpenJDK: handshake DoS attack against DTLS connections (JSSE, 8287411) OpenJDK: soundbank URL remote loading (Sound, 8293742)
[ "cpe:/a:redhat:rhel_e4s:8.1::appstream" ]
null
3.7
null
null
RHSA-2022:7025
Red Hat Security Advisory: firefox security update
expat: a use-after-free in the doContent function in xmlparse.c
[ "cpe:/a:redhat:rhel_eus:8.4::appstream" ]
null
8.1
null
null
RHSA-2017:1414
Red Hat Security Advisory: Red Hat JBoss Core Services Apache HTTP Server 2.4.23 Service Pack 1 for RHEL 6
httpd: Padding Oracle in Apache mod_session_crypto httpd: DoS vulnerability in mod_auth_digest openssl: OCSP Status Request extension unbounded memory growth openssl: ECDSA P-256 timing attack key recovery SSL/TLS: Malformed plain-text ALERT packets could cause remote DoS httpd: Incomplete handling of LimitRequestFields directive in mod_http2 httpd: Apache HTTP Request Parsing Whitespace Defects
[ "cpe:/a:redhat:jboss_core_services:1::el6" ]
null
null
4
null
RHSA-2020:1326
Red Hat Security Advisory: openstack-manila security update
openstack-manila: User with share-network UUID is able to show, create and delete shares
[ "cpe:/a:redhat:openstack:15::el8" ]
null
8.3
null
null
RHSA-2025:3541
Red Hat Security Advisory: Red Hat Build of Apache Camel 4.8 for Quarkus 3.15 update is now available (RHBQ 3.15.4.GA)
json-smart: Potential DoS via stack exhaustion (incomplete fix for CVE-2023-1370) smallrye-fault-tolerance: SmallRye Fault Tolerance
[ "cpe:/a:redhat:camel_quarkus:3" ]
null
7.5
null
null
RHSA-2004:479
Red Hat Security Advisory: XFree86 security update
openmotif21 stack overflows in libxpm openmotif21 stack overflows in libxpm security flaw
[ "cpe:/o:redhat:enterprise_linux:2.1::as", "cpe:/o:redhat:enterprise_linux:2.1::aw", "cpe:/o:redhat:enterprise_linux:2.1::es", "cpe:/o:redhat:enterprise_linux:2.1::ws" ]
null
null
null
null
RHSA-2015:2524
Red Hat Security Advisory: Red Hat JBoss Operations Network 3.3.4 security update
apache-commons-collections: InvokerTransformer code execution during deserialisation
[ "cpe:/a:redhat:jboss_operations_network:3.3" ]
null
null
null
null
RHSA-2013:1203
Red Hat Security Advisory: rubygems security update
rubygems: Two security fixes in v1.8.23 rubygems: Two security fixes in v1.8.23
[ "cpe:/a:redhat:openshift:1.2::el6" ]
null
null
null
null
RHSA-2021:1734
Red Hat Security Advisory: shim security update
grub2: acpi command allows privileged user to load crafted ACPI tables when Secure Boot is enabled grub2: Use-after-free in rmmod command grub2: Out-of-bounds write in grub_usb_device_initialize() grub2: Stack buffer overflow in grub_parser_split_cmdline() grub2: cutmem command allows privileged user to remove memory regions when Secure Boot is enabled grub2: Heap out-of-bounds write in short form option parser grub2: Heap out-of-bounds write due to miscalculation of space required for quoting
[ "cpe:/a:redhat:enterprise_linux:8::crb", "cpe:/o:redhat:enterprise_linux:8::baseos" ]
null
7.5
null
null
RHSA-2018:2576
Red Hat Security Advisory: java-1.7.1-ibm security update
JDK: DoS in the java.math component JDK: path traversal flaw in the Diagnostic Tooling Framework JDK: unspecified vulnerability fixed in 6u201, 7u191, 8u181, and 10.0.2 (Libraries) OpenJDK: insufficient index validation in PatternSyntaxException getMessage() (Concurrency, 8199547) JDK: unspecified vulnerability fixed in 6u201, 7u191, 8u181, and 10.0.2 (JSSE) JDK: privilege escalation via insufficiently restricted access to Attach API
[ "cpe:/a:redhat:rhel_extras:6" ]
null
null
8.4
null
RHSA-2024:2036
Red Hat Security Advisory: tigervnc security update
xorg-x11-server: Heap buffer overread/data leakage in ProcXIGetSelectedEvents xorg-x11-server: Heap buffer overread/data leakage in ProcXIPassiveGrabDevice xorg-x11-server: Use-after-free in ProcRenderAddGlyphs
[ "cpe:/a:redhat:rhel_eus:9.0::appstream" ]
null
7.8
null
null
RHSA-2022:1565
Red Hat Security Advisory: container-tools:3.0 security and bug fix update
podman: Default inheritable capabilities for linux container should be empty buildah: Default inheritable capabilities for linux container should be empty
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
4.8
null
null
RHSA-2024:3552
Red Hat Security Advisory: python-idna security and bug fix update
python-idna: potential DoS via resource consumption via specially crafted inputs to idna.encode()
[ "cpe:/o:redhat:rhel_aus:8.6::baseos", "cpe:/o:redhat:rhel_e4s:8.6::baseos", "cpe:/o:redhat:rhel_tus:8.6::baseos" ]
null
6.5
null
null
RHSA-2015:1888
Red Hat Security Advisory: Red Hat JBoss SOA Platform 5.3.1 security update
CXF: SSL hostname verification bypass, incomplete CVE-2012-5783 fix XStream: remote code execution due to insecure XML deserialization Xalan-Java: insufficient constraints in secure processing feature Seam: RCE via unsafe logging in AuthenticationFilter PicketLink: XXE via insecure DocumentBuilderFactory usage CXF: SSL hostname verification bypass, incomplete CVE-2012-6153 fix SSL: Hostname verification susceptible to MITM attack
[ "cpe:/a:redhat:jboss_enterprise_soa_platform:5.3" ]
null
null
4.8
null
RHSA-2016:2006
Red Hat Security Advisory: kernel security and bug fix update
kernel: Uninitialized variable in request_key handling causes kernel crash in error handling path kernel: Heap buffer overflow in hiddev driver
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
7.8
null
RHSA-2024:4955
Red Hat Security Advisory: OpenShift Container Platform 4.15.25 bug fix and security update
ssh: Prefix truncation attack on Binary Packet Protocol (BPP) openssh: Possible remote code execution due to a race condition in signal handling affecting Red Hat Enterprise Linux 9
[ "cpe:/a:redhat:openshift:4.15::el8", "cpe:/a:redhat:openshift:4.15::el9" ]
null
7
null
null
RHSA-2023:4983
Red Hat Security Advisory: Red Hat Process Automation Manager 7.13.4 security update
mina-sshd-core: Memory leak denial of service in Apache Mina SSHD Server wildfly-elytron: possible timing attacks via use of unsafe comparator protobuf-java: timeout in parser leads to DoS protobuf-java: Textformat parsing issue leads to DoS protobuf-java: Message-Type Extensions parsing issue leads to DoS undertow: Server identity in https connection is not checked by the undertow client snakeyaml: Denial of Service due to missing nested depth limitation for collections loader-utils: regular expression denial of service in interpolateName.js decode-uri-component: improper input validation resulting in DoS woodstox-core: woodstox to serialise XML data was vulnerable to Denial of Service attacks dev-java/snakeyaml: DoS via stack overflow Apache-Commons-BCEL: arbitrary bytecode produced via out-of-bounds writing mina-sshd: Java unsafe deserialization vulnerability RESTEasy: creation of insecure temp files springframework: Security Bypass With Un-Prefixed Double Wildcard Pattern springframework: Spring Expression DoS Vulnerability spring-boot: Spring Boot Welcome Page DoS Vulnerability FileUpload: FileUpload DoS with excessive parts
[ "cpe:/a:redhat:jboss_enterprise_bpms_platform:7.13" ]
null
6.5
null
null
RHSA-2019:4101
Red Hat Security Advisory: OpenShift Container Platform 4.2 openshift-enterprise-builder-container security update
openshift: Container image TLS verification bypass
[ "cpe:/a:redhat:openshift:4.2::el7" ]
null
null
5.7
null
RHSA-2023:5736
Red Hat Security Advisory: java-11-openjdk security and bug fix update
OpenJDK: certificate path validation issue during client authentication (8309966)
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
5.3
null
null
RHSA-2023:1392
Red Hat Security Advisory: OpenShift Container Platform 4.10.55 security update
mongo-go-driver: specific cstrings input may not be properly validated
[ "cpe:/a:redhat:openshift:4.10::el8" ]
null
6.5
null
null
RHSA-2010:0338
Red Hat Security Advisory: java-1.5.0-sun security update
TLS: MITM attacks via session renegotiation OpenJDK Loader-constraint table allows arrays instead of only the base-classes (6626217) OpenJDK Policy/PolicyFile leak dynamic ProtectionDomains. (6633872) OpenJDK File TOCTOU deserialization vulnerability (6736390) JDK unspecified vulnerability in JWS/Plugin component OpenJDK Inflater/Deflater clone issues (6745393) JDK unspecified vulnerability in JavaWS/Plugin component OpenJDK Unsigned applet can retrieve the dragged information before drop action occurs(6887703) OpenJDK AtomicReferenceArray causes SIGSEGV -> SEGV_MAPERR error (6888149) OpenJDK System.arraycopy unable to reference elements beyond Integer.MAX_VALUE bytes (6892265) OpenJDK Deserialization of RMIConnectionImpl objects should enforce stricter checks (6893947) OpenJDK Subclasses of InetAddress may incorrectly interpret network addresses (6893954) OpenJDK JAR "unpack200" must verify input parameters (6902299) OpenJDK CMM readMabCurveData Buffer Overflow Vulnerability (6899653) JDK multiple unspecified vulnerabilities OpenJDK Applet Trusted Methods Chaining Privilege Escalation Vulnerability (6904691) OpenJDK JPEGImageReader stepX Integer Overflow Vulnerability (6909597) JDK multiple unspecified vulnerabilities JDK multiple unspecified vulnerabilities JDK multiple unspecified vulnerabilities OpenJDK No ClassCastException for HashAttributeSet constructors if run with -Xcomp (6894807) JDK unspecified vulnerability in ImageIO component OpenJDK ImagingLib arbitrary code execution vulnerability (6914866) OpenJDK AWT Library Invalid Index Vulnerability (6914823) JDK unspecified vulnerability in Java2D component
[ "cpe:/a:redhat:rhel_extras:4", "cpe:/a:redhat:rhel_extras:4.7.z", "cpe:/a:redhat:rhel_extras:5", "cpe:/a:redhat:rhel_extras:5::client", "cpe:/a:redhat:rhel_extras:5::server" ]
null
null
null
null
RHSA-2024:4757
Red Hat Security Advisory: libvirt security update
libvirt: stack use-after-free in virNetClientIOEventLoop()
[ "cpe:/a:redhat:enterprise_linux:9::appstream", "cpe:/a:redhat:enterprise_linux:9::crb" ]
null
6.2
null
null
RHSA-2024:6610
Red Hat Security Advisory: git security update
git: Recursive clones RCE git: RCE while cloning local repos
[ "cpe:/a:redhat:rhel_e4s:9.0::appstream" ]
null
8.1
null
null
RHSA-2020:2432
Red Hat Security Advisory: microcode_ctl security, bug fix and enhancement update
hw: Special Register Buffer Data Sampling (SRBDS) hw: Vector Register Data Sampling hw: L1D Cache Eviction Sampling
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
6.5
6.5
null
RHSA-2003:280
Red Hat Security Advisory: openssh security update
security flaw security flaw security flaw
[ "cpe:/o:redhat:enterprise_linux:2.1::as", "cpe:/o:redhat:enterprise_linux:2.1::aw", "cpe:/o:redhat:enterprise_linux:2.1::es", "cpe:/o:redhat:enterprise_linux:2.1::ws" ]
null
null
null
null
RHSA-2019:3878
Red Hat Security Advisory: kernel security update
hw: Intel GPU blitter manipulation can allow for arbitrary kernel memory write
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
8.8
null
RHSA-2021:0736
Red Hat Security Advisory: java-1.8.0-ibm security update
OpenJDK: Unexpected exceptions raised by DOMKeyInfoFactory and DOMXMLSignatureFactory (Security, 8231415) OpenJDK: Credentials sent over unencrypted LDAP connection (JNDI, 8237990) OpenJDK: Certificate blacklist bypass via alternate certificate encodings (Libraries, 8237995) OpenJDK: Race condition in NIO Buffer boundary checks (Libraries, 8244136) JDK: Stack-based buffer overflow when converting from UTF-8 characters to platform encoding
[ "cpe:/a:redhat:enterprise_linux:8::supplementary" ]
null
9.8
null
null
RHSA-2014:0321
Red Hat Security Advisory: net-snmp security and bug fix update
net-snmp: denial of service flaw in Linux implementation of ICMP-MIB
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
null
null
RHSA-2011:1439
Red Hat Security Advisory: thunderbird security update
Mozilla: Security problem with loadSubScript on 1.9.2 branch (MFSA 2011-46) Mozilla: Universal XSS likely with MultiByte charset (MFSA 2011-47) Mozilla: crash while profiling page with many functions (MFSA 2011-49)
[ "cpe:/o:redhat:enterprise_linux:6::server" ]
null
null
null
null
RHSA-2006:0045
Red Hat Security Advisory: squid security update
security flaw
[ "cpe:/o:redhat:enterprise_linux:3::as", "cpe:/o:redhat:enterprise_linux:3::desktop", "cpe:/o:redhat:enterprise_linux:3::es", "cpe:/o:redhat:enterprise_linux:3::ws" ]
null
null
null
null
RHSA-2011:1239
Red Hat Security Advisory: Red Hat Enterprise Linux Extended Update Support 4.7 - End Of Life
This is the End of Life notification for Red Hat Enterprise Linux Extended Update Support Add-On (EUS) 4.7.
[ "cpe:/o:redhat:rhel_eus:4.7::as", "cpe:/o:redhat:rhel_eus:4.7::es" ]
null
null
null
null
RHSA-2016:0062
Red Hat Security Advisory: Red Hat JBoss Web Server 2.1.0 security update
expat: hash table collisions CPU usage DoS httpd: bypass of mod_headers rules via chunked requests httpd: HTTP request smuggling attack against chunked request parser
[ "cpe:/a:redhat:jboss_enterprise_web_server:2.1" ]
null
null
3.7
null
RHSA-2023:1560
Red Hat Security Advisory: kernel-rt security and bug fix update
kernel: use-after-free caused by l2cap_reassemble_sdu() in net/bluetooth/l2cap_core.c ALSA: pcm: Move rwsem lock inside snd_ctl_elem_read to prevent UAF
[ "cpe:/a:redhat:rhel_tus:8.2::nfv", "cpe:/a:redhat:rhel_tus:8.2::realtime" ]
null
7.8
null
null
RHSA-2022:5054
Red Hat Security Advisory: cups security update
cups: authorization bypass when using "local" authorization
[ "cpe:/a:redhat:rhel_e4s:8.1::appstream", "cpe:/o:redhat:rhel_e4s:8.1::baseos" ]
null
6.7
null
null
RHSA-2016:1421
Red Hat Security Advisory: httpd security update
HTTPD: sets environmental variable based on user supplied Proxy request header
[ "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::client_workstation", "cpe:/o:redhat:enterprise_linux:5::server", "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
5
null
RHSA-2007:0021
Red Hat Security Advisory: Adobe Acrobat Reader security update
security flaw security flaw security flaw
[ "cpe:/a:redhat:rhel_extras:3" ]
null
null
null
null
RHSA-2020:1318
Red Hat Security Advisory: telnet security update
telnet-server: no bounds checks in nextitem() function allows to remotely execute arbitrary code
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
9.8
null
null
RHSA-2013:0636
Red Hat Security Advisory: rhev-hypervisor6 security and bug fix update
SSL/TLS CRIME attack against HTTPS qemu: e1000 driver buffer overflow when processing large packets when SBP and LPE flags are disabled openssl: DoS due to improper handling of OCSP response verification SSL/TLS: CBC padding timing attack (lucky-13) gnutls: TLS CBC padding timing attack (lucky-13)
[ "cpe:/o:redhat:enterprise_linux:6::hypervisor" ]
null
null
null
null
RHSA-2021:4597
Red Hat Security Advisory: kpatch-patch security update
kernel: use-after-free in drivers/infiniband/core/ucma.c ctx use-after-free
[ "cpe:/o:redhat:rhel_eus:8.1::baseos" ]
null
7.8
null
null
RHSA-2024:2437
Red Hat Security Advisory: exfatprogs security update
exfatprogs: exfatprogs allows out-of-bounds memory access
[ "cpe:/o:redhat:enterprise_linux:9::baseos" ]
null
5.5
null
null
RHSA-2017:0558
Red Hat Security Advisory: firefox security update
Mozilla: integer overflow in createImageBitmap() (MFSA 2017-08)
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
9.8
null
RHSA-2016:2927
Red Hat Security Advisory: rh-mariadb100-mariadb security update
mysql: unspecified vulnerability in subcomponent: Server: Optimizer (CPU October 2016) mysql: Incorrect input validation allowing code execution via mysqldump mysql: unspecified vulnerability in subcomponent: Server: DML (CPU October 2016) mysql: race condition while setting stats during MyISAM table repair (CPU Oct 2016) mysql: unspecified vulnerability in subcomponent: Server: DML (CPU October 2016) mysql: unspecified vulnerability in subcomponent: Server: GIS (CPU October 2016) mysql: unspecified vulnerability in subcomponent: Server: Federated (CPU October 2016) mysql: unspecified vulnerability in subcomponent: Server: InnoDB (CPU October 2016) mysql: general_log can write to configuration files, leading to privilege escalation (CPU Oct 2016) mysql: race condition while setting stats during MyISAM table repair (CPU Oct 2016) mysql: unspecified vulnerability in subcomponent: Server: Types (CPU October 2016) mysql: Incorrect input validation allowing code execution via mysqldump mysql: Client mysqldump unspecified vulnerability (CPU Jul 2017)
[ "cpe:/a:redhat:rhel_software_collections:2::el6", "cpe:/a:redhat:rhel_software_collections:2::el7" ]
null
null
4.3
null
RHSA-2014:0133
Red Hat Security Advisory: thunderbird security update
Mozilla: Miscellaneous memory safety hazards (rv:24.3) (MFSA 2014-01) Mozilla: Clone protected content with XBL scopes (MFSA 2014-02) Mozilla: Inconsistent JavaScript handling of access to Window objects (MFSA 2014-13) Mozilla: Incorrect use of discarded images by RasterImage (MFSA 2014-04) Mozilla: Use-after-free with imgRequestProxy and image proccessing (MFSA 2014-08) Mozilla: Cross-origin information leak through web workers (MFSA 2014-09)
[ "cpe:/a:redhat:rhel_productivity:5", "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
null
null
RHSA-2023:0189
Red Hat Security Advisory: Red Hat AMQ Streams 2.3.0 release and security update
jetty-http: improver hostname input handling http2-server: Invalid HTTP/2 requests cause DoS jetty-server: Improper release of ByteBuffers in SslConnections snakeyaml: Uncaught exception in java.base/java.util.ArrayList.hashCode jackson-databind: deep wrapper array nesting wrt UNWRAP_SINGLE_VALUE_ARRAYS jackson-databind: use of deeply nested arrays
[ "cpe:/a:redhat:amq_streams:2" ]
null
7.5
null
null
RHSA-2010:0037
Red Hat Security Advisory: acroread security and bug fix update
acroread: multiple code execution flaws (APSB10-02) acroread: multiple code execution flaws (APSB10-02) acroread: multiple code execution flaws (APSB10-02) acroread: script injection vulnerability (APSB10-02) acroread: multiple code execution flaws (APSB10-02) acroread: media.newplayer JavaScript API code execution vulnerability (APSB10-02)
[ "cpe:/a:redhat:rhel_extras:5::client", "cpe:/a:redhat:rhel_extras:5::server" ]
null
null
null
null
RHSA-2015:1778
Red Hat Security Advisory: kernel security and bug fix update
kernel: ASLR bruteforce possible for vdso library kernel: fs: ext4: fallocate zero range page size > block size BUG() kernel: denial of service due to memory leak in add_key() kernel: SCTP race condition allows list corruption and panic from userlevel kernel: Crafted BPF filters may crash kernel during JIT optimisation kernel: net: incorrect processing of checksums in UDP implementation kernel: net: incorrect processing of checksums in UDP implementation
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
null
null
RHBA-2006:0287
Red Hat Bug Fix Advisory: bind bug fix update
INSIST failure in ISC BIND recursive query
[ "cpe:/o:redhat:enterprise_linux:3::as", "cpe:/o:redhat:enterprise_linux:3::desktop", "cpe:/o:redhat:enterprise_linux:3::es", "cpe:/o:redhat:enterprise_linux:3::ws" ]
null
null
null
null
RHSA-2023:1593
Red Hat Security Advisory: httpd security update
httpd: HTTP request splitting with mod_rewrite and mod_proxy
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
9.8
null
null
RHSA-2023:0204
Red Hat Security Advisory: java-1.8.0-openjdk security update
OpenJDK: improper restrictions in CORBA deserialization (Serialization, 8285021) OpenJDK: soundbank URL remote loading (Sound, 8293742)
[ "cpe:/a:redhat:rhel_e4s:8.1::appstream" ]
null
3.7
null
null
RHBA-2022:7200
Red Hat Bug Fix Advisory: OpenShift Container Platform 4.11.12 packages update
kube-apiserver: Aggregated API server can cause clients to be redirected (SSRF)
[ "cpe:/a:redhat:openshift:4.11::el8", "cpe:/a:redhat:openshift_ironic:4.11::el8" ]
null
5.1
null
null
RHSA-2024:4081
Red Hat Security Advisory: [23.0] Security update for the 23.0 release (RPMs)
graalvm: Unauthorized Read Access graalvm: unauthorized ability to cause a partial denial of service
[ "cpe:/a:redhat:quarkus:3.2::el8" ]
null
3.7
null
null
RHSA-2024:0887
Red Hat Security Advisory: go-toolset:rhel8 security update
golang: net/http/internal: Denial of Service (DoS) via Resource Consumption via HTTP requests golang: cmd/go: Protocol Fallback when fetching modules
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
7.5
null
null