id
stringlengths
13
15
title
stringlengths
29
176
description
stringlengths
8
32.1k
cpes
sequencelengths
0
20
cvss_v4_0
null
cvss_v3_1
float64
0
10
cvss_v3_0
float64
0
10
cvss_v2_0
null
RHSA-2019:1166
Red Hat Security Advisory: java-1.7.1-ibm security update
OpenJDK: Slow conversion of BigDecimal to long (Libraries, 8211936) OpenJDK: Incorrect skeleton selection in RMI registry server-side dispatch handling (RMI, 8218453) JDK: Unspecified vulnerability fixed in 7u221 and 8u211 (2D) OpenJDK: Font layout engine out of bounds access setCurrGlyphID() (2D, 8219022) JDK: Read beyond the end of bytecode array causing JVM crash
[ "cpe:/a:redhat:rhel_extras:7" ]
null
null
7.5
null
RHSA-2003:138
Red Hat Security Advisory: samba security update
security flaw security flaw
[ "cpe:/o:redhat:enterprise_linux:2.1::as", "cpe:/o:redhat:enterprise_linux:2.1::aw", "cpe:/o:redhat:enterprise_linux:2.1::es", "cpe:/o:redhat:enterprise_linux:2.1::ws" ]
null
null
null
null
RHSA-2020:2521
Red Hat Security Advisory: file security update
file: out-of-bounds read via a crafted ELF file
[ "cpe:/o:redhat:rhel_eus:7.7::computenode", "cpe:/o:redhat:rhel_eus:7.7::server" ]
null
null
5.4
null
RHSA-2010:0703
Red Hat Security Advisory: bzip2 security update
bzip2: integer overflow flaw in BZ2_decompress
[ "cpe:/o:redhat:enterprise_linux:3::as", "cpe:/o:redhat:enterprise_linux:3::desktop", "cpe:/o:redhat:enterprise_linux:3::es", "cpe:/o:redhat:enterprise_linux:3::ws", "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws", "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::client_workstation", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
RHSA-2021:0661
Red Hat Security Advisory: thunderbird security update
Mozilla: Content Security Policy violation report could have contained the destination of a redirect Mozilla: Content Security Policy violation report could have contained the destination of a redirect Mozilla: MediaError message property could have leaked information about cross-origin resources Mozilla: Memory safety bugs fixed in Firefox 86 and Firefox ESR 78.8
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
8.8
null
null
RHSA-2017:3124
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.0 security update
Solr: Code execution via entity expansion
[ "cpe:/a:redhat:jboss_enterprise_application_platform:7" ]
null
null
9.8
null
RHSA-2024:4910
Red Hat Security Advisory: openssh security update
openssh: Possible remote code execution due to a race condition in signal handling affecting Red Hat Enterprise Linux 9
[ "cpe:/a:redhat:rhel_e4s:9.0::appstream", "cpe:/o:redhat:rhel_e4s:9.0::baseos" ]
null
7
null
null
RHSA-2018:1125
Red Hat Security Advisory: python-paramiko security update
python-paramiko: Authentication bypass in transport.py
[ "cpe:/o:redhat:rhel_aus:6.4::server", "cpe:/o:redhat:rhel_aus:6.5::server", "cpe:/o:redhat:rhel_aus:6.6::server", "cpe:/o:redhat:rhel_eus:6.7::computenode", "cpe:/o:redhat:rhel_eus:6.7::server", "cpe:/o:redhat:rhel_tus:6.6::server" ]
null
null
9.8
null
RHSA-2022:0621
Red Hat Security Advisory: openldap security update
openldap: assertion failure in Certificate List syntax validation openldap: assertion failure in CSN normalization with invalid input
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
6.5
null
null
RHSA-2022:0973
Red Hat Security Advisory: virt:av and virt-devel:av qemu-kvm security update
QEMU: virtiofsd: potential privilege escalation via CVE-2018-13405
[ "cpe:/a:redhat:advanced_virtualization:8.2::el8" ]
null
7
null
null
RHSA-2012:1087
Red Hat Security Advisory: kernel security and bug fix update
kernel: net: insufficient data_len validation in sock_alloc_send_pskb()
[ "cpe:/o:redhat:rhel_eus:5.6" ]
null
null
null
null
RHSA-2025:3685
Red Hat Security Advisory: Red Hat Edge Manager Version 0.5.1 (Technology Preview) security fixes
golang.org/x/crypto/ssh: Denial of Service in the Key Exchange of golang.org/x/crypto/ssh
[ "cpe:/a:redhat:acm:2.13::el8", "cpe:/a:redhat:acm:2.13::el9" ]
null
7.5
null
null
RHSA-2024:4389
Red Hat Security Advisory: openssh security update
openssh: regreSSHion - race condition in SSH allows RCE/DoS
[ "cpe:/a:redhat:rhel_e4s:9.0::appstream", "cpe:/o:redhat:rhel_e4s:9.0::baseos" ]
null
8.1
null
null
RHSA-2017:3222
Red Hat Security Advisory: flash-plugin security update
flash-plugin: multiple code execution issues fixed in APSB17-33 flash-plugin: multiple code execution issues fixed in APSB17-33 flash-plugin: multiple code execution issues fixed in APSB17-33 flash-plugin: multiple code execution issues fixed in APSB17-33 flash-plugin: multiple code execution issues fixed in APSB17-33
[ "cpe:/a:redhat:rhel_extras:6" ]
null
null
8.8
null
RHSA-2018:2393
Red Hat Security Advisory: kernel security update
Kernel: hw: cpu: L1 terminal fault (L1TF) Kernel: hw: cpu: L1 terminal fault (L1TF) kernel: kvm: vmx: host GDT limit corruption
[ "cpe:/o:redhat:rhel_aus:6.5::server" ]
null
null
7.8
null
RHSA-2022:0491
Red Hat Security Advisory: OpenShift Container Platform 4.7.43 security update
jenkins: no POST request is required for the endpoint handling manual build requests which could result in CSRF jenkins-2-plugins/docker-commons: does not sanitize the name of an image or a tag which could result in an OS command execution
[ "cpe:/a:redhat:openshift:4.7::el8" ]
null
8.8
null
null
RHSA-2008:0924
Red Hat Security Advisory: condor security, bug fix and enhancement update
condor: users can run jobs with arbitrary owners condor: buffer overflow in lookup_macro condor: denial of service attack on Schedd via corrupt logfile condor: allow or deny with overlapping netmasks may be ignored
[ "cpe:/a:redhat:enterprise_mrg:1.0::el4" ]
null
null
null
null
RHEA-2019:3846
Red Hat Enhancement Advisory: microcode_ctl bug fix and enhancement update
hw: Intel SGX information leak
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
6
null
RHSA-2020:1542
Red Hat Security Advisory: Ansible security and bug fix update (2.9.7)
ansible: insecure temporary directory when running become_user from become directive ansible: path injection on dest parameter in fetch module ansible: Extract-Zip function in win_unzip module does not check extracted path ansible: svn module leaks password when specified as a parameter ansible: secrets readable after ansible-vault edit ansible: Information disclosure issue in ldap_attr and ldap_entry modules Ansible: kubectl connection plugin leaks sensitive information Ansible: code injection when using ansible_facts as a subkey Ansible: modules which use files encrypted with vault are not properly cleaned up Ansible: archive traversal vulnerability in ansible-galaxy collection install
[ "cpe:/a:redhat:ansible_engine:2::el7", "cpe:/a:redhat:ansible_engine:2::el8" ]
null
5.2
null
null
RHSA-2020:1121
Red Hat Security Advisory: httpd security, bug fix, and enhancement update
httpd: Out of bounds write in mod_authnz_ldap when using too small Accept-Language values httpd: Out of bounds access after failure in reading the HTTP request httpd: mod_session_cookie does not respect expiry time
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
5.4
null
RHSA-2024:0888
Red Hat Security Advisory: edk2 security update
openssl: Excessive time spent checking DH keys and parameters
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
5.3
null
null
RHSA-2022:5115
Red Hat Security Advisory: Red Hat OpenStack Platform 16.2 (python-django20) security update
Django: SQL injection in QuerySet.annotate(),aggregate() and extra()
[ "cpe:/a:redhat:openstack:16.2::el8" ]
null
9.4
null
null
RHSA-2024:2568
Red Hat Security Advisory: grafana security update
grafana: vulnerable to authorization bypass golang-fips/openssl: Memory leaks in code encrypting and decrypting RSA payloads
[ "cpe:/a:redhat:enterprise_linux:9::appstream" ]
null
7.5
null
null
RHSA-2020:2844
Red Hat Security Advisory: qemu-kvm security update
QEMU: Slirp: potential OOB access due to unsafe snprintf() usages
[ "cpe:/o:redhat:rhel_eus:7.6::computenode", "cpe:/o:redhat:rhel_eus:7.6::server" ]
null
5.6
null
null
RHSA-2024:6557
Red Hat Security Advisory: postgresql:13 security update
postgresql: PostgreSQL relation replacement during pg_dump executes arbitrary SQL
[ "cpe:/a:redhat:rhel_aus:8.4::appstream", "cpe:/a:redhat:rhel_e4s:8.4::appstream", "cpe:/a:redhat:rhel_tus:8.4::appstream" ]
null
7.5
null
null
RHSA-2014:1971
Red Hat Security Advisory: kernel security and bug fix update
kernel: exec/ptrace: get_dumpable() incorrect tests Kernel: drivers: media: an information leakage Kernel: HID: OOB write in magicmouse driver Kernel: HID: logitech-dj OOB array access Kernel: HID: off by one error in various _report_fixup routines Kernel: USB serial: memory corruption flaw Kernel: HID: memory corruption via OOB write kernel: keys: incorrect termination condition in assoc array garbage collection kernel: sctp: skb_over_panic when receiving malformed ASCONF chunks kernel: net: sctp: fix panic on duplicate ASCONF chunks kernel: net: sctp: remote memory pressure from excessive queueing Kernel: target/rd: imformation leakage Kernel: ALSA: control: protect user controls against races & memory disclosure Kernel: ALSA: control: use-after-free in replacing user controls Kernel: ALSA: control: use-after-free in replacing user controls Kernel: ALSA: control: integer overflow in id.index & id.numid kernel: vfs: refcount issues during unmount on symlink kernel: udf: Avoid infinite loop when processing indirect ICBs
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
null
null
RHSA-2012:0019
Red Hat Security Advisory: php53 and php security update
php: integer overflow in exif_process_IFD_TAG() may lead to DoS or arbitrary memory disclosure php: hash table collisions CPU usage DoS (oCERT-2011-003)
[ "cpe:/o:redhat:enterprise_linux:5::client_workstation", "cpe:/o:redhat:enterprise_linux:5::server", "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
null
null
RHSA-2012:0016
Red Hat Security Advisory: libxml2 security update
libxml2: Off-by-one error leading to heap-based buffer overflow in encoding libxml2: double-free caused by malformed XPath expression in XSLT libxml2 out of bounds read libxml2: Heap-based buffer overflow when decoding an entity reference with a long name
[ "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws" ]
null
null
null
null
RHSA-2016:2585
Red Hat Security Advisory: qemu-kvm security, bug fix, and enhancement update
Qemu: net: e1000 infinite loop in start_xmit and e1000_receive_iov routines qemu-kvm: Out-of-bounds read when creating weird vga screen surface
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
null
null
RHSA-2014:2010
Red Hat Security Advisory: kernel security update
kernel: x86: local privesc due to bad_iret and paranoid entry incompatibility
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
8.4
null
RHSA-2019:0361
Red Hat Security Advisory: rhvm-appliance security update
systemd: stack overflow when calling syslog from a command with long cmdline systemd: stack overflow when receiving many journald entries
[ "cpe:/o:redhat:enterprise_linux:7::hypervisor" ]
null
null
7.5
null
RHSA-2023:2121
Red Hat Security Advisory: libreswan security update
libreswan: Malicious IKEv1 Aggressive Mode packets can crash libreswan
[ "cpe:/a:redhat:rhel_eus:9.0::appstream" ]
null
7.5
null
null
RHSA-2023:2120
Red Hat Security Advisory: libreswan security update
libreswan: Malicious IKEv1 Aggressive Mode packets can crash libreswan
[ "cpe:/a:redhat:enterprise_linux:9::appstream" ]
null
7.5
null
null
RHSA-2025:1746
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.1.9 on RHEL 7 security update
jackson-databind: Lacks certain xbean-reflect/JNDI blocking jackson-databind: Serialization gadgets in shaded-hikari-config jackson-databind: Serialization gadgets in ibatis-sqlmap jackson-databind: Serialization gadgets in anteros-core jackson-databind: mishandles the interaction between serialization gadgets and typing which could result in remote command execution jackson-databind: mishandles the interaction between serialization gadgets and typing which could result in remote command execution velocity: arbitrary code execution when attacker is able to modify templates wildfly: incorrect JBOSS_LOCAL_USER challenge location may lead to giving access to all the local users log4j-core: Remote code execution in Log4j 2.x when logs contain an attacker-controlled string value log4j-core: DoS in log4j 2.x with thread context message pattern and context lookup pattern (incomplete fix for CVE-2021-44228) SnakeYaml: Constructor Deserialization Remote Code Execution codec-haproxy: HAProxyMessageDecoder Stack Exhaustion DoS jackson-databind: deep wrapper array nesting wrt UNWRAP_SINGLE_VALUE_ARRAYS jackson-databind: use of deeply nested arrays apache-commons-text: variable interpolation RCE mina-sshd: Java unsafe deserialization vulnerability jettison: If the value in map is the map's self, the new new JSONObject(map) cause StackOverflowError which may lead to dos CXF: directory listing / code exfiltration
[ "cpe:/a:redhat:jboss_enterprise_application_platform_eus:7.1::el7" ]
null
7.5
null
null
RHSA-2004:612
Red Hat Security Advisory: XFree86 security update
openmotif21 stack overflows in libxpm
[ "cpe:/o:redhat:enterprise_linux:3::as", "cpe:/o:redhat:enterprise_linux:3::desktop", "cpe:/o:redhat:enterprise_linux:3::es", "cpe:/o:redhat:enterprise_linux:3::ws" ]
null
null
null
null
RHSA-2015:0766
Red Hat Security Advisory: firefox security update
Mozilla: Same-origin bypass through anchor navigation (MFSA 2015-40) Mozilla: CORS requests should not follow 30x redirections after preflight (MFSA 2015-37) Mozilla: Use-after-free when using the Fluendo MP3 GStreamer plugin (MFSA 2015-31) Mozilla: Miscellaneous memory safety hazards (rv:31.6) (MFSA 2015-30) Mozilla: resource: // documents can load privileged pages (MFSA 2015-33)
[ "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::server", "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation", "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
null
null
RHEA-2013:1487
Red Hat Enhancement Advisory: Red Hat CloudForms 3.0 product update
EVM: CSRF postgresql: Insecure switch parsing postgresql: Improper randomization of pgcrypto functions (requiring random seed) postgresql: Improper user privilege check for on-line backups 2: static secret_token.rb value 2: miq_policy/explorer SQL injection interface: Ruby code injection CloudForms: user password stored in recoverable format
[ "cpe:/a:redhat:cloudforms_managementengine:5::el6" ]
null
null
null
null
RHSA-2007:0720
Red Hat Security Advisory: cups security update
xpdf integer overflow
[ "cpe:/o:redhat:enterprise_linux:3::as", "cpe:/o:redhat:enterprise_linux:3::desktop", "cpe:/o:redhat:enterprise_linux:3::es", "cpe:/o:redhat:enterprise_linux:3::ws", "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws", "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::client_workstation", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
RHSA-2019:2169
Red Hat Security Advisory: linux-firmware security, bug fix, and enhancement update
kernel: Bluetooth implementations may not sufficiently validate elliptic curve parameters during Diffie-Hellman key exchange
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
7.1
null
RHSA-2025:3993
Red Hat Security Advisory: Custom Metrics Autoscaler Operator for Red Hat OpenShift 2.15.1-6 Update
github.com/expr-lang/expr: Memory Exhaustion in Expr Parser with Unrestricted Input golang-jwt/jwt: jwt-go allows excessive memory allocation during header parsing
[ "cpe:/a:redhat:openshift_custom_metrics_autoscaler:2.15::el9" ]
null
7.5
null
null
RHSA-2024:6020
Red Hat Security Advisory: postgresql:15 security update
postgresql: PostgreSQL pg_stats_ext and pg_stats_ext_exprs lack authorization checks postgresql: PostgreSQL relation replacement during pg_dump executes arbitrary SQL
[ "cpe:/a:redhat:enterprise_linux:9::appstream" ]
null
7.5
null
null
RHSA-2020:1372
Red Hat Security Advisory: kernel security and bug fix update
kernel: powerpc: local user can read vector registers of other users' processes via a Facility Unavailable exception kernel: powerpc: local user can read vector registers of other users' processes via an interrupt kernel: powerpc: incomplete Spectre-RSB mitigation leads to information exposure kernel: use-after-free caused by a malicious USB device in the drivers/hid/usbhid/hiddev.c driver
[ "cpe:/a:redhat:enterprise_linux:8::crb", "cpe:/o:redhat:enterprise_linux:8::baseos" ]
null
6.8
null
null
RHSA-2021:3755
Red Hat Security Advisory: firefox security update
rust-crossbeam-deque: race condition may lead to double free Mozilla: Use-after-free in MessageTask Mozilla: Validation message could have been overlaid on another origin Mozilla: Use-after-free of nsLanguageAtomService object Mozilla: Memory safety bugs fixed in Firefox 93, Firefox ESR 78.15, and Firefox ESR 91.2 Mozilla: Memory safety bugs fixed in Firefox 93 and Firefox ESR 91.2
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
8.8
null
null
RHBA-2023:0568
Red Hat Bug Fix Advisory: OpenShift Container Platform 4.12.2 packages update
golang: net/url: JoinPath does not strip relative path components in all circumstances
[ "cpe:/a:redhat:openshift:4.12::el8", "cpe:/a:redhat:openshift:4.12::el9" ]
null
7.5
null
null
RHSA-2024:3588
Red Hat Security Advisory: glibc security update
glibc: Out of bounds write in iconv may lead to remote code execution glibc: stack-based buffer overflow in netgroup cache glibc: null pointer dereferences after failed netgroup cache insertion glibc: netgroup cache may terminate daemon on memory allocation failure glibc: netgroup cache assumes NSS callback uses in-buffer strings
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
4
null
null
RHSA-2010:0969
Red Hat Security Advisory: thunderbird security update
Mozilla add support for OTS font sanitizer (MFSA 2010-78) Mozilla miscellaneous memory safety hazards (MFSA 2010-74) Mozilla miscellaneous memory safety hazards (MFSA 2010-74)
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
null
null
RHSA-2021:4373
Red Hat Security Advisory: pcre security update
pcre: Buffer over-read in JIT when UTF is disabled and \X or \R has fixed quantifier greater than 1 pcre: Integer overflow when parsing callout numeric arguments
[ "cpe:/a:redhat:enterprise_linux:8::crb", "cpe:/o:redhat:enterprise_linux:8::baseos" ]
null
5.3
null
null
RHSA-2021:4374
Red Hat Security Advisory: file security update
file: heap-based buffer overflow in cdf_read_property_info in cdf.c
[ "cpe:/a:redhat:enterprise_linux:8::crb", "cpe:/o:redhat:enterprise_linux:8::baseos" ]
null
7.8
null
null
RHSA-2025:3852
Red Hat Security Advisory: java-17-openjdk security update
openjdk: Better TLS connection support (Oracle CPU 2025-04) openjdk: Improve compiler transformations (Oracle CPU 2025-04) openjdk: Enhance Buffered Image handling (Oracle CPU 2025-04)
[ "cpe:/a:redhat:enterprise_linux:8::appstream", "cpe:/a:redhat:enterprise_linux:8::crb", "cpe:/a:redhat:enterprise_linux:9::appstream", "cpe:/a:redhat:enterprise_linux:9::crb", "cpe:/a:redhat:rhel_aus:8.4::appstream", "cpe:/a:redhat:rhel_aus:8.6::appstream", "cpe:/a:redhat:rhel_e4s:8.4::appstream", "cpe:/a:redhat:rhel_e4s:8.6::appstream", "cpe:/a:redhat:rhel_e4s:9.0::appstream", "cpe:/a:redhat:rhel_eus:8.8::appstream", "cpe:/a:redhat:rhel_eus:8.8::crb", "cpe:/a:redhat:rhel_eus:9.2::appstream", "cpe:/a:redhat:rhel_eus:9.2::crb", "cpe:/a:redhat:rhel_eus:9.4::appstream", "cpe:/a:redhat:rhel_eus:9.4::crb", "cpe:/a:redhat:rhel_tus:8.4::appstream", "cpe:/a:redhat:rhel_tus:8.6::appstream" ]
null
5.6
null
null
RHSA-2019:3300
Red Hat Security Advisory: rh-php71-php security update
php: underflow in env_path_info in fpm_main.c
[ "cpe:/a:redhat:rhel_software_collections:3::el7" ]
null
null
8.1
null
RHSA-2022:1762
Red Hat Security Advisory: container-tools:rhel8 security, bug fix, and enhancement update
psgo: Privilege escalation in 'podman top' prometheus/client_golang: Denial of service using InstrumentHandlerCounter podman: Default inheritable capabilities for linux container should be empty crun: Default inheritable capabilities for linux container should be empty buildah: Default inheritable capabilities for linux container should be empty
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
4.8
null
null
RHSA-2015:1876
Red Hat Security Advisory: python-django security update
python-django: Denial-of-service possibility in logout() view by filling session store
[ "cpe:/a:redhat:openstack:7::el7" ]
null
null
null
null
RHSA-2025:3854
Red Hat Security Advisory: OpenJDK 17.0.15 Security Update for Windows Builds
openjdk: Better TLS connection support (Oracle CPU 2025-04) openjdk: Improve compiler transformations (Oracle CPU 2025-04) openjdk: Enhance Buffered Image handling (Oracle CPU 2025-04)
[ "cpe:/a:redhat:openjdk:17::windows" ]
null
5.6
null
null
RHSA-2023:4470
Red Hat Security Advisory: Red Hat Ansible Automation Platform 2.3 Product Security and Bug Fix Update
golang: net/http: excessive memory growth in a Go server accepting HTTP/2 requests golang: crypto/tls: large handshake records may cause panics golang: net/http, mime/multipart: denial of service from excessive resource consumption golang: net/http, net/textproto: denial of service from excessive memory allocation golang: net/http, net/textproto, mime/multipart: denial of service from excessive resource consumption golang: go/parser: Infinite loop in parsing golang: html/template: backticks not treated as string delimiters golang: html/template: improper sanitization of CSS values golang: html/template: improper handling of JavaScript whitespace golang: html/template: improper handling of empty HTML attributes
[ "cpe:/a:redhat:ansible_automation_platform:2.3::el8" ]
null
7.3
null
null
RHSA-2022:6983
Red Hat Security Advisory: kernel security, bug fix, and enhancement update
kernel: information leak in the IPv6 implementation kernel: information leak in the IPv4 implementation kernel: a use-after-free in cls_route filter implementation may lead to privilege escalation hw: cpu: incomplete clean-up of multi-core shared buffers (aka SBDR) hw: cpu: incomplete clean-up of microarchitectural fill buffers (aka SBDS) hw: cpu: incomplete clean-up in specific special register write operations (aka DRPW)
[ "cpe:/a:redhat:rhel_eus:8.4::crb", "cpe:/o:redhat:rhel_eus:8.4::baseos" ]
null
5.5
null
null
RHSA-2007:1028
Red Hat Security Advisory: tetex security update
CCITTFaxStream:: lookChar()
[ "cpe:/o:redhat:enterprise_linux:2.1::as", "cpe:/o:redhat:enterprise_linux:2.1::aw", "cpe:/o:redhat:enterprise_linux:2.1::es", "cpe:/o:redhat:enterprise_linux:2.1::ws", "cpe:/o:redhat:enterprise_linux:3::as", "cpe:/o:redhat:enterprise_linux:3::desktop", "cpe:/o:redhat:enterprise_linux:3::es", "cpe:/o:redhat:enterprise_linux:3::ws" ]
null
null
null
null
RHSA-2022:1010
Red Hat Security Advisory: rh-mariadb103-mariadb security and bug fix update
mysql: Server: DML unspecified vulnerability (CPU Apr 2021) mysql: Server: DML unspecified vulnerability (CPU Apr 2021) mysql: InnoDB unspecified vulnerability (CPU Jul 2021) mysql: InnoDB unspecified vulnerability (CPU Jul 2021) mysql: InnoDB unspecified vulnerability (CPU Oct 2021) mariadb: Crash in get_sort_by_table() in subquery with ORDER BY having outer ref mariadb: save_window_function_values triggers an abort during IN subquery mariadb: Crash in set_var.cc via certain UPDATE queries with nested subqueries mariadb: Crash caused by mishandling of a pushdown from a HAVING clause to a WHERE clause mariadb: Integer overflow in sql_lex.cc integer leading to crash mysql: InnoDB unspecified vulnerability (CPU Apr 2022) mariadb: crash in Used_tables_and_const_cache::used_tables_and_const_cache_join mariadb: improper locking due to unreleased lock in the ds_xbstream.cc mariadb: DoS due to improper locking due to unreleased lock in plugin/server_audit/server_audit.c
[ "cpe:/a:redhat:rhel_software_collections:3::el7" ]
null
5.5
null
null
RHSA-2020:2168
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 6.4 security update
EAP: Vault system property security attribute value is revealed on CLI 'reload' command
[ "cpe:/a:redhat:jboss_enterprise_application_platform:6.4" ]
null
null
5.4
null
RHSA-2013:0551
Red Hat Security Advisory: acroread security update
acroread: Multiple unspecified vulnerabilities allow remote attackers to execute arbitrary code (APSB13-07) acroread: Multiple unspecified vulnerabilities allow remote attackers to execute arbitrary code (APSB13-07)
[ "cpe:/a:redhat:rhel_extras:5::server", "cpe:/a:redhat:rhel_extras:6" ]
null
null
null
null
RHSA-2022:5821
Red Hat Security Advisory: virt:rhel and virt-devel:rhel security, bug fix, and enhancement update
QEMU: QXL: integer overflow in cursor_alloc() can lead to heap buffer overflow QEMU: QXL: double fetch in qxl_cursor() can lead to heap buffer overflow QEMU: virtio-net: map leaking on error during receive QEMU: vhost-vsock: missing virtqueue detach on error can lead to memory leak
[ "cpe:/a:redhat:enterprise_linux:8::appstream", "cpe:/a:redhat:enterprise_linux:8::crb" ]
null
2.5
null
null
RHSA-2019:1815
Red Hat Security Advisory: java-1.8.0-openjdk security update
OpenJDK: Side-channel attack risks in Elliptic Curve (EC) cryptography (Security, 8208698) OpenJDK: Insufficient checks of suppressed exceptions in deserialization (Utilities, 8212328) OpenJDK: Unbounded memory allocation during deserialization in Collections (Utilities, 8213432) OpenJDK: Insufficient restriction of privileges in AccessController (Security, 8216381) OpenJDK: Missing URL format validation (Networking, 8221518) OpenJDK: Missing array bounds check in crypto providers (JCE, 8223511)
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
3.7
null
RHSA-2016:2058
Red Hat Security Advisory: mariadb-galera security update
mysql: general_log can write to configuration files, leading to privilege escalation (CPU Oct 2016)
[ "cpe:/a:redhat:openstack:5::el6" ]
null
null
9.8
null
RHSA-2019:2169
Red Hat Security Advisory: linux-firmware security, bug fix, and enhancement update
kernel: Bluetooth implementations may not sufficiently validate elliptic curve parameters during Diffie-Hellman key exchange
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
7.1
null
RHSA-2010:0382
Red Hat Security Advisory: xorg-x11-server security update
Xorg: X server Render extension memory corruption
[ "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::client_workstation", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
RHSA-2024:2979
Red Hat Security Advisory: poppler security update
poppler: NULL pointer dereference in `FoFiType1C::convertToType1`
[ "cpe:/a:redhat:enterprise_linux:8::appstream", "cpe:/a:redhat:enterprise_linux:8::crb" ]
null
5.5
null
null
RHSA-2024:4222
Red Hat Security Advisory: pki-core security update
ca: token authentication bypass vulnerability
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
7.5
null
null
RHSA-2015:1674
Red Hat Security Advisory: qemu-kvm-rhev security update
Qemu: rtl8139 uninitialized heap memory information leakage to guest (XSA-140)
[ "cpe:/a:redhat:openstack:6::el7" ]
null
null
null
null
RHSA-2022:4863
Red Hat Security Advisory: Release of OpenShift Serverless Version 1.22.1
golang: math/big: uncontrolled memory consumption due to an unhandled overflow via Rat.SetString golang: cmd/go: misinterpretation of branch names can lead to incorrect access control golang: crypto/elliptic: IsOnCurve returns true for invalid field elements
[ "cpe:/a:redhat:serverless:1.22::el8" ]
null
7.1
null
null
RHSA-2022:6290
Red Hat Security Advisory: OpenShift API for Data Protection (OADP) 1.1.0 security and bug fix update
prometheus/client_golang: Denial of service using InstrumentHandlerCounter golang: encoding/pem: fix stack overflow in Decode golang: crypto/elliptic: panic caused by oversized scalar golang: crypto/tls: session tickets lack random ticket_age_add golang: compress/gzip: stack exhaustion in Reader.Read
[ "cpe:/a:redhat:openshift_api_data_protection:1.1::el8" ]
null
7.5
null
null
RHSA-2005:810
Red Hat Security Advisory: gdk-pixbuf security update
security flaw security flaw security flaw
[ "cpe:/o:redhat:enterprise_linux:3::as", "cpe:/o:redhat:enterprise_linux:3::desktop", "cpe:/o:redhat:enterprise_linux:3::es", "cpe:/o:redhat:enterprise_linux:3::ws", "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws" ]
null
null
null
null
RHSA-2021:3205
Red Hat Security Advisory: Red Hat Integration Camel-K 1.4 release and security update
activemq: improper authentication allows MITM attack cxf: XSS via the styleSheetPath apache-flink: directory traversal attack allows remote file writing through the REST API groovy: OS temporary directory leads to information disclosure XStream: remote code execution due to insecure XML deserialization when relying on blocklists cron-utils: template injection allows attackers to inject arbitrary Java EL expressions leading to remote code execution XStream: Server-Side Forgery Request vulnerability can be activated when unmarshalling XStream: arbitrary file deletion on the local host when unmarshalling californium-core: DTLS - DoS vulnerability for certificate based handshakes undertow: special character in query results in server errors bouncycastle: password bypass in OpenBSDBCrypt.checkPassword utility possible kotlin: vulnerable Java API was used for temporary file and folder creation which could result in information disclosure fabric8-kubernetes-client: vulnerable to a path traversal leading to integrity and availability compromise spring-web: (re)creating the temporary storage directory could result in a privilege escalation within WebFlux application pdfbox: infinite loop while loading a crafted PDF file pdfbox: OutOfMemory-Exception while loading a crafted PDF file CXF: Denial of service vulnerability in parsing JSON via JsonMapObjectReaderWriter pdfbox: OutOfMemory-Exception while loading a crafted PDF file
[ "cpe:/a:redhat:integration:1" ]
null
3.7
null
null
RHSA-2012:1364
Red Hat Security Advisory: bind97 security update
bind: Specially crafted DNS data can cause a lockup in named
[ "cpe:/o:redhat:enterprise_linux:5::client_workstation", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
RHSA-2010:0607
Red Hat Security Advisory: freetype security update
FreeType: Multiple stack overflows by processing CFF opcodes
[ "cpe:/o:redhat:enterprise_linux:3::as", "cpe:/o:redhat:enterprise_linux:3::desktop", "cpe:/o:redhat:enterprise_linux:3::es", "cpe:/o:redhat:enterprise_linux:3::ws", "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws", "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::client_workstation", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
RHSA-2019:0010
Red Hat Security Advisory: rh-perl524-perl security update
perl: Integer overflow leading to buffer overflow in Perl_my_setenv() perl: Heap-based buffer overflow in S_handle_regex_sets() perl: Heap-based buffer read overflow in S_grok_bslash_N() perl: Heap-based buffer overflow in S_regatom()
[ "cpe:/a:redhat:rhel_software_collections:3::el6", "cpe:/a:redhat:rhel_software_collections:3::el7" ]
null
null
7
null
RHSA-2006:0604
Red Hat Security Advisory: ruby security update
security flaw
[ "cpe:/o:redhat:enterprise_linux:3::as", "cpe:/o:redhat:enterprise_linux:3::desktop", "cpe:/o:redhat:enterprise_linux:3::es", "cpe:/o:redhat:enterprise_linux:3::ws", "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws" ]
null
null
null
null
RHSA-2018:2868
Red Hat Security Advisory: Red Hat JBoss Web Server 5.0 Service Pack 1 security and bug fix update
tomcat: Due to a mishandling of close in NIO/NIO2 connectors user sessions can get mixed up tomcat: Open redirect in default servlet
[ "cpe:/a:redhat:jboss_enterprise_web_server:5.0::el6", "cpe:/a:redhat:jboss_enterprise_web_server:5.0::el7" ]
null
null
5.3
null
RHSA-2020:3273
Red Hat Security Advisory: grub2 security and bug fix update
grub2: Crafted grub.cfg file can lead to arbitrary code execution during boot process grub2: grub_malloc does not validate allocation size allowing for arithmetic overflow and subsequent heap-based buffer overflow grub2: Integer overflow in grub_squash_read_symlink may lead to heap-based buffer overflow grub2: Integer overflow read_section_as_string may lead to heap-based buffer overflow grub2: Integer overflow in grub_ext2_read_link leads to heap-based buffer overflow grub2: Fail kernel validation without shim protocol grub2: Use-after-free redefining a function whilst the same function is already executing
[ "cpe:/o:redhat:rhel_aus:7.2::server" ]
null
6.4
null
null
RHSA-2012:0899
Red Hat Security Advisory: openldap security and bug fix update
(slapd): Assertion failure by processing search queries requesting only attributes for particular entry
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
null
null
RHSA-2024:2394
Red Hat Security Advisory: kernel security, bug fix, and enhancement update
kernel: Bluetooth BR/EDR PIN Pairing procedure is vulnerable to an impersonation attack kernel: ovl: fix warning in ovl_create_real() kernel: memcg does not limit the number of POSIX file locks allowing memory exhaustion kernel: vmwgfx: NULL pointer dereference in vmw_cmd_dx_define_query kernel: integer overflow in l2cap_config_req() in net/bluetooth/l2cap_core.c kernel: i2c: mlxbf: prevent stack overflow in mlxbf_i2c_smbus_start_transaction() kernel: Bluetooth: L2CAP: Fix u8 overflow kernel: hwmon: (coretemp) fix pci device refcount leak in nv1a_ram_new() kernel: use after free in vcs_read in drivers/tty/vt/vc_screen.c due to race kernel: cxgb4: use-after-free in ch_flower_stats_cb() kernel: netfilter: nf_tables: out-of-bounds access in nf_tables_newtable() kernel: NVMe: info leak due to out-of-bounds read in nvmet_ctrl_find_get kernel: local dos vulnerability in scatterwalk_copychunks kernel: GC's deletion of an SKB races with unix_stream_read_generic() leading to UAF kernel: GSM multiplexing race condition leads to privilege escalation kernel: null pointer dereference vulnerability in nft_dynset_init() kernel: Null Pointer Dereference vulnerability in ida_free in lib/idr.c kernel: Out of boundary write in perf_read_group() as result of overflow a perf_event's read_size kernel: use-after-free in IPv4 IGMP kernel: Bluetooth Forward and Future Secrecy Attacks and Defenses kernel: irdma: Improper access control Kernel: double free in hci_conn_cleanup of the bluetooth subsystem kernel: Bluetooth: HCI: global out-of-bounds access in net/bluetooth/hci_sync.c kernel: race condition between HCIUARTSETPROTO and HCIUARTGETPROTO in hci_uart_tty_ioctl kernel: usb: out-of-bounds read in read_descriptors kernel: netfilter: nftables out-of-bounds read in nf_osf_match_one() kernel: netfilter: xtables sctp out-of-bounds read in match_flags() kernel: xfrm: out-of-bounds read in __xfrm_state_filter_match() kernel: QXL: race condition leading to use-after-free in qxl_mode_dumb_create() kernel: ipv4: NULL pointer dereference in ipv4_send_dest_unreach() kernel: netfilter: race condition between IPSET_CMD_ADD and IPSET_CMD_SWAP kernel: lib/kobject.c vulnerable to fill_kobj_path out-of-bounds write kernel: NULL pointer dereference vulnerability in io_uring_show_fdinfo kernel: use-after-free during a race condition between a nonblocking atomic commit and a driver unload in drivers/gpu/drm/drm_atomic.c kernel: bluetooth: bt_sock_ioctl race condition leads to use-after-free in bt_sock_recvmsg kernel: use-after-free in net/atm/ioctl.c kernel: smb: client: fix potential OOBs in smb2_parse_contexts() kernel: gfs2: Fix kernel NULL pointer dereference in gfs2_rgrp_dump kernel: intel: Fix NULL pointer dereference issue in upi_fill_topology() kernel: use-after-free in kv_parse_power_table kernel: null-ptr-deref in alloc_workqueue kernel: perf/x86/lbr: Filter vsyscall addresses kernel: HID: logitech-hidpp: Fix kernel crash on receiver USB disconnect kernel: drm: Don't unref the same fb many times by mistake due to deadlock handling kernel: mm/sparsemem: fix race in accessing memory_section->usage kernel: net: fix possible store tearing in neigh_periodic_work() kernel: HID: sony: Fix a potential memory leak in sony_probe() kernel: team: NULL pointer dereference when team device type is changed kernel: net: bridge: data races indata-races in br_handle_frame_finish() kernel: net/core: kernel crash in ETH_P_1588 flow dissector kernel: netfilter: nf_tables: memory leak when more than 255 elements expired kernel: KVM: s390: fix setting of fpc register kernel: net/sched: act_ct: fix skb leak and crash on ooo frags kernel: netfilter: nf_tables: disallow timeout for anonymous sets kernel: netfilter: nftables: exthdr: fix 4-byte stack OOB write kernel: drm/amdgpu: Fix a null pointer access when the smc_rreg pointer is NULL kernel: wifi: mac80211: don't return unset power in ieee80211_get_tx_power() kernel: TCP-spoofed ghost ACKs and leak leak initial sequence number kernel: net: fix UaF in netns ops registration error path kernel: CIFS Filesystem Decryption Improper Input Validation Remote Code Execution Vulnerability in function receive_encrypted_standard of client kernel: hugetlbfs: Null pointer dereference in hugetlbfs_fill_super function kernel: nf_tables: use-after-free vulnerability in the nft_setelem_catchall_deactivate() function kernel: nf_tables: use-after-free vulnerability in the nft_verdict_init() function kernel: untrusted VMM can trigger int80 syscall handling kernel: tls: use-after-free with partial reads and async decrypt kernel: tls: race between async notify and socket close kernel: tls: handle backlogging of crypto requests kernel: tls: race between tx work scheduling and socket close kernel: mlxsw: spectrum_acl_tcam: Fix stack corruption kernel: i2c: i801: Fix block process call transactions kernel: sched/membarrier: reduce the ability to hammer on sys_membarrier kernel: netfilter: nf_tables: reject QUEUE/DROP verdict parameters kernel: ip6_tunnel: fix NEXTHDR_FRAGMENT handling in ip6_tnl_parse_tlv_enc_lim() kernel: null pointer when load rlc firmware kernel: blk-mq: fix IO hang from sbitmap wakeup race kernel: i40e: Do not allow untrusted VF to remove administratively set MAC
[ "cpe:/a:redhat:enterprise_linux:9::appstream", "cpe:/a:redhat:enterprise_linux:9::crb", "cpe:/a:redhat:enterprise_linux:9::nfv", "cpe:/a:redhat:enterprise_linux:9::realtime", "cpe:/o:redhat:enterprise_linux:9::baseos" ]
null
4.4
null
null
RHSA-2024:5832
Red Hat Security Advisory: httpd security update
httpd: Security issues via backend applications whose response headers are malicious or exploitable
[ "cpe:/a:redhat:rhel_e4s:9.0::appstream" ]
null
9.1
null
null
RHSA-2020:1470
Red Hat Security Advisory: ntp security update
ntp: Stack-based buffer overflow in ntpq and ntpdc allows denial of service or code execution
[ "cpe:/o:redhat:rhel_eus:7.6::computenode", "cpe:/o:redhat:rhel_eus:7.6::server" ]
null
null
7
null
RHSA-2018:0239
Red Hat Security Advisory: Red Hat Enterprise Linux 6.2 AMC Retirement Notice
This is the final notification for the retirement of Red Hat Enterprise Linux 6.2 Advanced Mission Critical (AMC). This notification applies only to those customers subscribed to the Advanced Mission Critical (AMC) channel for Red Hat Enterprise Linux 6.2.
[ "cpe:/o:redhat:rhel_mission_critical:6.2::server" ]
null
null
null
null
RHSA-2022:1556
Red Hat Security Advisory: mariadb:10.3 security and bug fix update
mysql: Server: DML unspecified vulnerability (CPU Apr 2021) mysql: Server: DML unspecified vulnerability (CPU Apr 2021) mysql: InnoDB unspecified vulnerability (CPU Jul 2021) mysql: InnoDB unspecified vulnerability (CPU Jul 2021) mysql: InnoDB unspecified vulnerability (CPU Oct 2021) mariadb: Crash in get_sort_by_table() in subquery with ORDER BY having outer ref mariadb: save_window_function_values triggers an abort during IN subquery mariadb: Crash in set_var.cc via certain UPDATE queries with nested subqueries mariadb: Crash caused by mishandling of a pushdown from a HAVING clause to a WHERE clause mariadb: Integer overflow in sql_lex.cc integer leading to crash mysql: InnoDB unspecified vulnerability (CPU Apr 2022) mariadb: crash in Used_tables_and_const_cache::used_tables_and_const_cache_join mariadb: improper locking due to unreleased lock in the ds_xbstream.cc mariadb: DoS due to improper locking due to unreleased lock in plugin/server_audit/server_audit.c
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
5.5
null
null
RHSA-2020:1360
Red Hat Security Advisory: container-tools:1.0 security update
QEMU: slirp: OOB buffer access while emulating tcp protocols in tcp_emu()
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
5.6
null
null
RHSA-2024:5951
Red Hat Security Advisory: OpenShift Virtualization 4.15.5 Images
containers/image: digest type does not guarantee valid type
[ "cpe:/a:redhat:container_native_virtualization:4.15::el9" ]
null
8.3
null
null
RHSA-2021:1561
Red Hat Security Advisory: OpenShift Container Platform 4.7.12 bug fix and security update
golang-github-gorilla-websocket: integer overflow leads to denial of service
[ "cpe:/a:redhat:openshift:4.7::el8" ]
null
7.5
null
null
RHSA-2024:1482
Red Hat Security Advisory: java-1.8.0-ibm security update
OpenJDK: array out-of-bounds access due to missing range check in C1 compiler (8314468) OpenJDK: range check loop optimization issue (8314307) OpenJDK: arbitrary Java code execution in Nashorn (8314284) OpenJDK: logging of digital signature private keys (8316976) OpenJDK: RSA padding issue and timing side-channel attack against TLS (8317547)
[ "cpe:/a:redhat:rhel_extras:7" ]
null
7.4
null
null
RHSA-2014:0818
Red Hat Security Advisory: Red Hat JBoss BRMS 6.0.2 update
Xalan-Java: insufficient constraints in secure processing feature netty: DoS via memory exhaustion during data aggregation smack: incorrect X.509 certificate validation smack: IQ response spoofing
[ "cpe:/a:redhat:jboss_brms:6.0" ]
null
null
null
null
RHSA-2008:0546
Red Hat Security Advisory: php security update
pcre integer overflow pcre regular expression flaws php htmlentities/htmlspecialchars multibyte sequences php session ID leakage PHP multibyte shell escape flaw PHP 32 bit weak random seed PHP weak 64 bit random seed
[ "cpe:/o:redhat:enterprise_linux:2.1::as", "cpe:/o:redhat:enterprise_linux:2.1::aw", "cpe:/o:redhat:enterprise_linux:2.1::es", "cpe:/o:redhat:enterprise_linux:2.1::ws" ]
null
null
null
null
RHSA-2025:1184
Red Hat Security Advisory: thunderbird security update
thunderbird: Address of e-mail sender can be spoofed by malicious email firefox: thunderbird: Use-after-free in XSLT firefox: thunderbird: Use-after-free in Custom Highlight firefox: thunderbird: A bug in WebAssembly code generation could result in a crash firefox: thunderbird: Use-after-free during concurrent delazification firefox: thunderbird: Potential opening of private browsing tabs in normal browsing windows firefox: thunderbird: Certificate length was not properly checked thunderbird: Unsanitized address book fields firefox: thunderbird: Memory safety bugs fixed in Firefox 135, Thunderbird 135, Firefox ESR 115.20, Firefox ESR 128.7, Thunderbird 115.20, and Thunderbird 128.7 firefox: thunderbird: Memory safety bugs fixed in Firefox 135, Thunderbird 135, Firefox ESR 128.7, and Thunderbird 128.7
[ "cpe:/a:redhat:enterprise_linux:9::appstream" ]
null
8.8
null
null
RHSA-2014:0011
Red Hat Security Advisory: ruby193-ruby security update
ruby: heap overflow in floating point parsing
[ "cpe:/a:redhat:openstack:3::el6" ]
null
null
null
null
RHSA-2023:7484
Red Hat Security Advisory: Red Hat Single Sign-On 7.6.6 security update on RHEL 9
keycloak: impersonation and lockout possible through incorrect handling of email trust bouncycastle: potential blind LDAP injection attack using a self-signed certificate HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack)
[ "cpe:/a:redhat:red_hat_single_sign_on:7.6::el9" ]
null
7.5
null
null
RHSA-2023:7749
Red Hat Security Advisory: kernel security update
kernel: use-after-free in smb2_is_status_io_timeout() kernel: use-after-free vulnerability in the smb client component amd: Return Address Predictor vulnerability leading to information disclosure kernel: IGB driver inadequate buffer size for frames larger than MTU
[ "cpe:/a:redhat:enterprise_linux:9::appstream", "cpe:/a:redhat:enterprise_linux:9::crb", "cpe:/a:redhat:enterprise_linux:9::nfv", "cpe:/a:redhat:enterprise_linux:9::realtime", "cpe:/o:redhat:enterprise_linux:9::baseos" ]
null
7.5
null
null
RHSA-2022:6385
Red Hat Security Advisory: openvswitch2.15 security update
dpdk: DoS when a Vhost header crosses more than two descriptors and exhausts all mbufs
[ "cpe:/o:redhat:enterprise_linux:8::fastdatapath" ]
null
8.6
null
null
RHSA-2015:0115
Red Hat Security Advisory: kernel security update
kernel: sctp: skb_over_panic when receiving malformed ASCONF chunks kernel: net: sctp: fix panic on duplicate ASCONF chunks kernel: net: sctp: remote memory pressure from excessive queueing
[ "cpe:/o:redhat:rhel_mission_critical:6.2::server" ]
null
null
null
null
RHSA-2021:3700
Red Hat Security Advisory: Red Hat AMQ Broker 7.9.0 release and security update
apache-httpclient: incorrect handling of malformed authority component in request URIs jetty: request containing multiple Accept headers with a large number of "quality" parameters may lead to DoS Broker: discloses JDBC username and password in the application log file 7: Incorrect privilege in Management Console resteasy: Error message exposes endpoint class information netty: Information disclosure via the local system temporary directory netty: possible request smuggling in HTTP/2 due missing validation netty: Request smuggling via content-length header jetty: Symlink directory exposes webapp directory contents jetty: Ambiguous paths can access WEB-INF jetty: Resource exhaustion when receiving an invalid large TLS frame jetty: requests to the ConcatServlet and WelcomeFilter are able to access protected resources within the WEB-INF directory apache-commons-io: Limited path traversal in Apache Commons IO 2.2 to 2.6 jetty: SessionListener can prevent a session from being invalidated breaking logout jetty: crafted URIs allow bypassing security constraints
[ "cpe:/a:redhat:amq_broker:7" ]
null
5.3
null
null
RHSA-2011:1459
Red Hat Security Advisory: bind97 security update
bind: Remote denial of service against recursive servers via logging negative cache entry
[ "cpe:/o:redhat:enterprise_linux:5::client_workstation", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
RHSA-2021:2042
Red Hat Security Advisory: Red Hat OpenShift Container Storage 4.7 RPM security, bug fix, and enhancement update
jwt-go: access restriction bypass vulnerability golang: math/big: panic during recursive division of very large numbers
[ "cpe:/a:redhat:openshift_container_storage:4.7::el8" ]
null
7.5
null
null
RHSA-2018:0470
Red Hat Security Advisory: Red Hat Enterprise MRG Realtime 2.5 security and enhancement update
kernel: rds_message_alloc_sgs() function doesn't validate value used during DMA page allocation causes heap out-of-bounds write kernel: Null pointer dereference in rds_atomic_free_op() allowing denial-of-service
[ "cpe:/a:redhat:enterprise_mrg:2:server:el6" ]
null
null
5.5
null
RHSA-2014:0915
Red Hat Security Advisory: nss security update
nss: Race-condition in certificate verification can lead to Remote code execution (MFSA 2014-63)
[ "cpe:/o:redhat:rhel_eus:5.9", "cpe:/o:redhat:rhel_eus:6.4::computenode", "cpe:/o:redhat:rhel_eus:6.4::server", "cpe:/o:redhat:rhel_mission_critical:5.6", "cpe:/o:redhat:rhel_mission_critical:6.2::server" ]
null
null
null
null