id
stringlengths 13
15
| title
stringlengths 29
176
| description
stringlengths 8
32.1k
| cpes
sequencelengths 0
20
| cvss_v4_0
null | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
null |
---|---|---|---|---|---|---|---|
RHBA-2019:0636 | Red Hat Bug Fix Advisory: OpenShift Container Platform 3.11 bug fix and enhancement update | kubernetes: Mishandling of symlinks allows for arbitrary file write via `kubectl cp` | [
"cpe:/a:redhat:openshift:3.11::el7"
] | null | null | 5.3 | null |
RHSA-2025:0338 | Red Hat Security Advisory: fence-agents security update | jinja2: Jinja has a sandbox breakout through malicious filenames jinja2: Jinja has a sandbox breakout through indirect reference to format method | [
"cpe:/a:redhat:rhel_eus:9.4::appstream",
"cpe:/a:redhat:rhel_eus:9.4::highavailability",
"cpe:/a:redhat:rhel_eus:9.4::resilientstorage"
] | null | 6.3 | null | null |
RHSA-2022:8491 | Red Hat Security Advisory: xorg-x11-server security update | xorg-x11-server: buffer overflow in _GetCountedString() in xkb/xkb.c xorg-x11-server: memory leak in ProcXkbGetKbdByName() in xkb/xkb.c | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 6.5 | null | null |
RHSA-2024:8694 | Red Hat Security Advisory: OpenShift Container Platform 4.12.68 security update | Podman: Buildah: cri-o: FIPS Crypto-Policy Directory Mounting Issue in containers/common Go Library Podman: Buildah: CRI-O: symlink traversal vulnerability in the containers/storage library can cause Denial of Service (DoS) go/parser: golang: Calling any of the Parse functions containing deeply nested literals can cause a panic/stack exhaustion encoding/gob: golang: Calling Decoder.Decode on a message which contains deeply nested structures can cause a panic due to stack exhaustion go/build/constraint: golang: Calling Parse on a "// +build" build tag line with deeply nested expressions can cause a panic due to stack exhaustion openstack-ironic: Specially crafted image may allow authenticated users to gain access to potentially sensitive data | [
"cpe:/a:redhat:openshift:4.12::el8",
"cpe:/a:redhat:openshift:4.12::el9",
"cpe:/a:redhat:openshift_ironic:4.12::el9"
] | null | 6.8 | null | null |
RHSA-2024:1253 | Red Hat Security Advisory: kernel live patch module security update | kernel: bpf: Incorrect verifier pruning leads to unsafe code paths being incorrectly marked as safe kernel: UAF in nftables when nft_set_lookup_global triggered after handling named and anonymous sets in batch requests kernel: net/sched: cls_u32 component reference counter leak if tcf_change_indev() fails kernel: use after free in unix_stream_sendpage kernel: GSM multiplexing race condition leads to privilege escalation kernel: ktls overwrites readonly memory pages when using function splice with a ktls socket as destination | [
"cpe:/o:redhat:rhel_eus:9.0::baseos"
] | null | 7 | null | null |
RHSA-2016:1519 | Red Hat Security Advisory: Red Hat JBoss Operations Network 3.3.6 update | OOME from EAP 6 http management console SSL/TLS: Cross-protocol attack on TLS using SSLv2 (DROWN) | [
"cpe:/a:redhat:jboss_operations_network:3.3"
] | null | null | null | null |
RHSA-2022:1136 | Red Hat Security Advisory: httpd security update | httpd: mod_lua: Possible buffer overflow when parsing multipart content httpd: Errors encountered during the discarding of request body lead to HTTP request smuggling | [
"cpe:/o:redhat:rhel_aus:7.6::server",
"cpe:/o:redhat:rhel_e4s:7.6::server",
"cpe:/o:redhat:rhel_tus:7.6::server"
] | null | 8.3 | null | null |
RHSA-2020:5254 | Red Hat Security Advisory: Red Hat Single Sign-On 7.4.3 one-off security update | hibernate-core: SQL injection vulnerability when both hibernate.use_sql_comments and JPQL String literals are used | [
"cpe:/a:redhat:jboss_single_sign_on:7.4"
] | null | 7.4 | null | null |
RHSA-2024:6144 | Red Hat Security Advisory: postgresql security update | postgresql: PostgreSQL relation replacement during pg_dump executes arbitrary SQL | [
"cpe:/a:redhat:rhel_e4s:9.0::appstream"
] | null | 7.5 | null | null |
RHSA-2024:4643 | Red Hat Security Advisory: libndp security update | libndp: buffer overflow in route information length field | [
"cpe:/o:redhat:rhel_aus:8.6::baseos",
"cpe:/o:redhat:rhel_e4s:8.6::baseos",
"cpe:/o:redhat:rhel_tus:8.6::baseos"
] | null | 8.1 | null | null |
RHSA-2010:0162 | Red Hat Security Advisory: openssl security update | openssl: missing bn_wexpand return value checks TLS: MITM attacks via session renegotiation openssl: crash caused by a missing krb5_sname_to_principal() return value check | [
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2019:2157 | Red Hat Security Advisory: freerdp and vinagre security, bug fix, and enhancement update | freerdp: out of bounds read in drdynvc_process_capability_request | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 4.3 | null |
RHSA-2020:5359 | Red Hat Security Advisory: OpenShift Container Platform 4.5.23 security and bug fix update | kubernetes: Docker config secrets leaked when file is malformed and loglevel >= 4 | [
"cpe:/a:redhat:openshift:4.5::el7",
"cpe:/a:redhat:openshift:4.5::el8"
] | null | 5.3 | null | null |
RHSA-2019:2817 | Red Hat Security Advisory: OpenShift Container Platform 3.11 security update | HTTP/2: flood using PING frames results in unbounded memory growth HTTP/2: flood using HEADERS frames results in unbounded memory growth containers/image: not enforcing TLS when sending username+password credentials to token servers leading to credential disclosure | [
"cpe:/a:redhat:openshift:3.11::el7"
] | null | null | 6.4 | null |
RHSA-2020:2046 | Red Hat Security Advisory: thunderbird security update | usrsctp: Buffer overflow in AUTH chunk input validation Mozilla: Use-after-free during worker shutdown Mozilla: Arbitrary local file access with 'Copy as cURL' Mozilla: Memory safety bugs fixed in Firefox 76 and Firefox ESR 68.8 Mozilla: Sender Email Address Spoofing using encoded Unicode characters | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 4.3 | 6.1 | null |
RHSA-2024:1495 | Red Hat Security Advisory: thunderbird security update | nss: timing attack against RSA decryption Mozilla: Crash in NSS TLS method Mozilla: Leaking of encrypted email subjects to other conversations Mozilla: JIT code failed to save return registers on Armv7-A Mozilla: Integer overflow could have led to out of bounds write Mozilla: Improper handling of html and body tags enabled CSP nonce leakage Mozilla: Clickjacking vulnerability could have led to a user accidentally granting permissions Mozilla: Self referencing object could have potentially led to a use-after-free Mozilla: Memory safety bugs fixed in Firefox 124, Firefox ESR 115.9, and Thunderbird 115.9 | [
"cpe:/a:redhat:rhel_eus:9.0::appstream"
] | null | 7.5 | null | null |
RHSA-2006:0698 | Red Hat Security Advisory: openssh security update | security flaw local to local copy uses shell expansion twice openssh DoS unsafe GSSAPI signal handler | [
"cpe:/o:redhat:enterprise_linux:2.1::as",
"cpe:/o:redhat:enterprise_linux:2.1::aw",
"cpe:/o:redhat:enterprise_linux:2.1::es",
"cpe:/o:redhat:enterprise_linux:2.1::ws"
] | null | null | null | null |
RHBA-2023:7492 | Red Hat Bug Fix Advisory: RHODS 2.4 - Red Hat OpenShift Data Science | HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack) | [
"cpe:/a:redhat:openshift_data_science:2.4::el8"
] | null | 7.5 | null | null |
RHBA-2006:0288 | Red Hat Bug Fix Advisory: bind bug fix update | INSIST failure in ISC BIND recursive query | [
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2004:153 | Red Hat Security Advisory: cvs security update | security flaw security flaw | [
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws"
] | null | null | null | null |
RHSA-2010:0333 | Red Hat Security Advisory: seamonkey security update | Mozilla crashes with evidence of memory corruption Mozilla remote code execution with use-after-free in nsTreeSelection Mozilla Dangling pointer vulnerability in nsTreeContentView Mozilla Dangling pointer vulnerability in nsPluginArray | [
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws",
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2023:3827 | Red Hat Security Advisory: libtiff security update | libtiff: heap-based buffer overflow in processCropSelections() in tools/tiffcrop.c | [
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb"
] | null | 5.5 | null | null |
RHSA-2023:3911 | Red Hat Security Advisory: OpenShift Container Platform 4.10.63 security update | openshift: OCP & FIPS mode golang: html/template: improper handling of JavaScript whitespace | [
"cpe:/a:redhat:openshift:4.10::el8"
] | null | 8.1 | null | null |
RHSA-2022:5392 | Red Hat Security Advisory: Red Hat Advanced Cluster Management 2.3.11 security updates and bug fixes | node-fetch: exposure of sensitive information to an unauthorized actor follow-redirects: Exposure of Sensitive Information via Authorization Header leak nconf: Prototype pollution in memory store golang: crypto/elliptic: IsOnCurve returns true for invalid field elements Moment.js: Path traversal in moment.locale golang: syscall: faccessat checks wrong group go-getter: writes SSH credentials into logfile, exposing sensitive credentials to local uses | [
"cpe:/a:redhat:acm:2.3::el7",
"cpe:/a:redhat:acm:2.3::el8"
] | null | 5.1 | null | null |
RHSA-2023:3583 | Red Hat Security Advisory: c-ares security update | c-ares: 0-byte UDP payload Denial of Service | [
"cpe:/a:redhat:rhel_eus:9.0::appstream",
"cpe:/o:redhat:rhel_eus:9.0::baseos"
] | null | 7.5 | null | null |
RHSA-2013:1028 | Red Hat Security Advisory: Fuse ESB Enterprise 7.1.0 update | apache-cxf: XML encryption backwards compatibility attacks rubygem-json: Denial of Service and SQL Injection ruby: entity expansion DoS vulnerability in REXML apache-cxf: Multiple denial of service flaws in the StAX parser | [
"cpe:/a:redhat:fuse_esb_enterprise:7.1.0"
] | null | null | null | null |
RHSA-2023:6144 | Red Hat Security Advisory: Custom Metric Autoscaler operator for Red Hat OpenShift security update | HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack) | [
"cpe:/a:redhat:openshift_custom_metrics_autoscaler:2.0::el8"
] | null | 7.5 | null | null |
RHSA-2005:535 | Red Hat Security Advisory: sudo security update | security flaw | [
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws",
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2020:2442 | Red Hat Security Advisory: OpenShift Container Platform 4.3.25 openshift-enterprise-apb-tools-container security update | openshift/apb-tools: /etc/passwd is given incorrect privileges | [
"cpe:/a:redhat:openshift:4.3::el7"
] | null | 7 | null | null |
RHSA-2019:2995 | Red Hat Security Advisory: Red Hat A-MQ Broker 7.5 release and security update | 1: Class Loader manipulation via request parameters | [
"cpe:/a:redhat:amq_broker:7"
] | null | null | null | null |
RHSA-2018:2790 | Red Hat Security Advisory: kernel security and bug fix update | kernel: TCP segments with random offsets allow a remote denial of service (SegmentSmack) | [
"cpe:/o:redhat:rhel_aus:7.2::server",
"cpe:/o:redhat:rhel_e4s:7.2::server",
"cpe:/o:redhat:rhel_tus:7.2::server"
] | null | null | 7.5 | null |
RHSA-2011:0329 | Red Hat Security Advisory: kernel security update | kernel: deficiency in handling of invalid data packets in lockd | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2022:0992 | Red Hat Security Advisory: Red Hat OpenStack Platform 16.2 (python-twisted) security update | dev-python/twisted: secret exposure in cross-origin redirects python-twisted: SSH client and server denial of service during SSH handshake | [
"cpe:/a:redhat:openstack:16.2::el8"
] | null | 7.5 | null | null |
RHSA-2014:0561 | Red Hat Security Advisory: curl security and bug fix update | curl: re-use of wrong HTTP NTLM connection in libcurl curl: wrong re-use of connections in libcurl | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2019:4225 | Red Hat Security Advisory: OpenShift Container Platform 4.1 openshift-external-storage security update | kubernetes-csi: CSI volume snapshot, cloning and resizing features can result in unauthorized volume data access or mutation | [
"cpe:/a:redhat:openshift:4.1::el7"
] | null | null | 4.8 | null |
RHSA-2014:1834 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 5.2.0 security update | CXF: SSL hostname verification bypass, incomplete CVE-2012-5783 fix CXF: SSL hostname verification bypass, incomplete CVE-2012-6153 fix | [
"cpe:/a:redhat:jboss_enterprise_application_platform:5::el4",
"cpe:/a:redhat:jboss_enterprise_application_platform:5::el5",
"cpe:/a:redhat:jboss_enterprise_application_platform:5::el6"
] | null | null | 4.8 | null |
RHSA-2024:5599 | Red Hat Security Advisory: libreoffice security update | libreoffice: Ability to trust not validated macro signatures removed in high security mode | [
"cpe:/a:redhat:rhel_aus:8.6::appstream",
"cpe:/a:redhat:rhel_e4s:8.6::appstream",
"cpe:/a:redhat:rhel_tus:8.6::appstream"
] | null | 7.8 | null | null |
RHSA-2021:1064 | Red Hat Security Advisory: virt:rhel and virt-devel:rhel security update | QEMU: Regression of CVE-2020-10756 fix in virt:rhel/qemu-kvm in Red Hat Enterprise Linux 8.3 | [
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb"
] | null | 6.5 | null | null |
RHSA-2019:3722 | Red Hat Security Advisory: OpenShift Container Platform 4.1.22 openshift-enterprise-hypershift-container security update | atomic-openshift: reflected XSS in authentication flow | [
"cpe:/a:redhat:openshift:4.1::el7"
] | null | null | 4.6 | null |
RHSA-2024:0255 | Red Hat Security Advisory: .NET 6.0 security, bug fix, and enhancement update | dotnet: Information Disclosure: MD.SqlClient(MDS) & System.data.SQLClient (SDS) dotnet: X509 Certificates - Validation Bypass across Azure dotnet: .NET Denial of Service Vulnerability | [
"cpe:/a:redhat:rhel_dotnet:6.0::el7"
] | null | 6.8 | null | null |
RHSA-2023:5752 | Red Hat Security Advisory: java-17-openjdk security and bug fix update | OpenJDK: memory corruption issue on x86_64 with AVX-512 (8317121) OpenJDK: certificate path validation issue during client authentication (8309966) | [
"cpe:/a:redhat:rhel_eus:9.0::appstream",
"cpe:/a:redhat:rhel_eus:9.0::crb"
] | null | 5.3 | null | null |
RHSA-2022:5055 | Red Hat Security Advisory: cups security update | cups: authorization bypass when using "local" authorization | [
"cpe:/a:redhat:rhel_eus:8.2::appstream",
"cpe:/o:redhat:rhel_eus:8.2::baseos"
] | null | 6.7 | null | null |
RHSA-2007:0829 | Red Hat Security Advisory: java-1.5.0-ibm security update | javaws vulnerabilities Integer overflow in the embedded ICC profile image parser in Sun Java Development Kit BMP image parser vulnerability HTML files generated with Javadoc are vulnerable to a XSS A buffer overflow vulnerability in Java Web Start URL parsing code Vulnerability in the Java Runtime Environment May Allow an Untrusted Applet to Circumvent Network Access Restrictions java: Vulnerability in the font parsing code | [
"cpe:/a:redhat:rhel_extras:4",
"cpe:/a:redhat:rhel_extras:5::client",
"cpe:/a:redhat:rhel_extras:5::server"
] | null | null | null | null |
RHSA-2023:0627 | Red Hat Security Advisory: git security update | git: gitattributes parsing integer overflow git: Heap overflow in `git archive`, `git log --format` leading to RCE | [
"cpe:/a:redhat:rhel_eus:9.0::appstream"
] | null | 9.8 | null | null |
RHSA-2020:3218 | Red Hat Security Advisory: kernel security and bug fix update | kernel: lockdown: bypass through ACPI write via efivar_ssdt kernel: lockdown: bypass through ACPI write via acpi_configfs | [
"cpe:/a:redhat:enterprise_linux:8::crb",
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 6.4 | null | null |
RHSA-2015:1443 | Red Hat Security Advisory: bind security update | bind: abort DoS caused by uninitialized value use in isselfsigned() | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | null | null |
RHSA-2024:10839 | Red Hat Security Advisory: OpenShift Container Platform 4.15.41 bug fix and security update | cross-spawn: regular expression denial of service | [
"cpe:/a:redhat:openshift:4.15::el8",
"cpe:/a:redhat:openshift:4.15::el9"
] | null | 4.4 | null | null |
RHSA-2012:0480 | Red Hat Security Advisory: kernel security, bug fix, and enhancement update | kernel: ipv6: panic using raw sockets | [
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2018:0027 | Red Hat Security Advisory: qemu-kvm security update | An update for qemu-kvm is now available for Red Hat Enterprise Linux 7.3 Extended Update Support.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. | [
"cpe:/o:redhat:rhel_eus:7.3::computenode",
"cpe:/o:redhat:rhel_eus:7.3::server"
] | null | null | null | null |
RHSA-2012:0305 | Red Hat Security Advisory: boost security and bug fix update | boost regular expression memory corruption flaws boost regular expression NULL dereference flaw | [
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2022:8491 | Red Hat Security Advisory: xorg-x11-server security update | xorg-x11-server: buffer overflow in _GetCountedString() in xkb/xkb.c xorg-x11-server: memory leak in ProcXkbGetKbdByName() in xkb/xkb.c | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 6.5 | null | null |
RHSA-2008:0882 | Red Hat Security Advisory: seamonkey security update | Mozilla UTF-8 stack buffer overflow mozilla: nsXMLDocument:: OnChannelRedirect() same-origin violation mozilla: Forced mouse drag Mozilla privilege escalation via XPCnativeWrapper pollution Mozilla privilege escalation via XPCnativeWrapper pollution Mozilla privilege escalation via XPCnativeWrapper pollution Mozilla layout engine crash Mozilla crashes with evidence of memory corruption Mozilla BOM characters stripped from JavaScript before execution Mozilla low surrogates stripped from JavaScript before execution resource: traversal vulnerability recource: bypass Mozilla XBM decoder information disclosure | [
"cpe:/o:redhat:enterprise_linux:2.1::as",
"cpe:/o:redhat:enterprise_linux:2.1::aw",
"cpe:/o:redhat:enterprise_linux:2.1::es",
"cpe:/o:redhat:enterprise_linux:2.1::ws",
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws",
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2022:0011 | Red Hat Security Advisory: telnet security update | telnet-server: no bounds checks in nextitem() function allows to remotely execute arbitrary code | [
"cpe:/o:redhat:rhel_aus:7.6::server",
"cpe:/o:redhat:rhel_e4s:7.6::server",
"cpe:/o:redhat:rhel_tus:7.6::server"
] | null | 9.8 | null | null |
RHSA-2004:436 | Red Hat Security Advisory: rsync security update | security flaw | [
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws"
] | null | null | null | null |
RHSA-2024:4872 | Red Hat Security Advisory: Release of OpenShift Serverless 1.33.1 security update | go-retryablehttp: url might write sensitive information to log file golang: net: malformed DNS message can cause infinite loop golang: archive/zip: Incorrect handling of certain ZIP files golang: net/netip: Unexpected behavior from Is methods for IPv4-mapped IPv6 addresses | [
"cpe:/a:redhat:openshift_serverless:1.33::el8"
] | null | 6.7 | null | null |
RHSA-2020:3254 | Red Hat Security Advisory: firefox security update | chromium-browser: Use after free in ANGLE chromium-browser: Inappropriate implementation in WebRTC Mozilla: Potential leak of redirect targets when loading scripts in a worker Mozilla: Memory safety bugs fixed in Firefox 79 and Firefox ESR 68.11 | [
"cpe:/a:redhat:rhel_eus:8.1::appstream"
] | null | 8.8 | 8.8 | null |
RHSA-2023:6202 | Red Hat Security Advisory: Red Hat Advanced Cluster Management 2.6.8 security and bug fix updates | golang: html/template: improper handling of HTML-like comments within script contexts golang: html/template: improper handling of special tags within script contexts golang: crypto/tls: panic when processing post-handshake message on QUIC connections golang: crypto/tls: lack of a limit on buffered post-handshake golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487) HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack) | [
"cpe:/a:redhat:acm:2.6::el8"
] | null | 7.5 | null | null |
RHSA-2024:5883 | Red Hat Security Advisory: linux-firmware security update | hw: amd: SMM Lock Bypass kernel: Reserved fields in guest message responses may not be zero initialized | [
"cpe:/o:redhat:rhel_aus:8.2::baseos"
] | null | 4.4 | null | null |
RHSA-2018:1461 | Red Hat Security Advisory: dhcp security update | dhcp: Command injection vulnerability in the DHCP client NetworkManager integration script | [
"cpe:/o:redhat:rhel_aus:6.4::server"
] | null | null | 7.5 | null |
RHSA-2004:047 | Red Hat Security Advisory: pwlib security update | security flaw | [
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws"
] | null | null | null | null |
RHSA-2023:6167 | Red Hat Security Advisory: libguestfs-winsupport security update | NTFS-3G: buffer overflow issue in NTFS-3G can cause code execution via crafted metadata in an NTFS image | [
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 3.3 | null | null |
RHSA-2025:0012 | Red Hat Security Advisory: python-requests security update | requests: subsequent requests to the same host ignore cert verification | [
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 5.6 | null | null |
RHSA-2011:0214 | Red Hat Security Advisory: java-1.6.0-openjdk security update | JDK Double.parseDouble Denial-Of-Service | [
"cpe:/o:redhat:enterprise_linux:5::server",
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2013:1509 | Red Hat Security Advisory: java-1.5.0-ibm security update | OpenJDK: java.util.TimeZone does not restrict setting of default time zone (Libraries, 8001029) JDK: unspecified sandbox bypass (JVM) JDK: XML4J xml entity expansion excessive memory use (XML) JDK: unspecified sandbox bypass (XML) OpenJDK: Inet6Address class IPv6 address processing errors (Libraries, 8015743) OpenJDK: image conversion out of bounds read (2D, 8014102) OpenJDK: key data leak via toString() methods (Libraries, 8011071) OpenJDK: Incorrect awt_getPixelByte/awt_getPixelShort/awt_setPixelByte/awt_setPixelShort image raster checks (2D, 8014093) OpenJDK: JTable not properly performing certain access checks (Swing, 8013744) OpenJDK: insufficient security checks (Beans, 8012071) OpenJDK: insufficient escaping of window title string (Javadoc, 8016675) JDK: unspecified vulnerability fixed in 7u45 (2D) OpenJDK: javax.xml.transform.TransformerFactory does not properly honor XMLConstants.FEATURE_SECURE_PROCESSING (JAXP, 8012425) OpenJDK: insufficient checks of KDC replies (JGSS, 8014341) OpenJDK: javac does not ignore certain ignorable characters (Javadoc, 8016653) OpenJDK: JPEGImageReader and JPEGImageWriter missing band size checks (2D, 8013510) OpenJDK: RMIConnection stub missing permission check (CORBA, 8011157) OpenJDK: VersionHelper12 does not honor modifyThreadGroup restriction (JNDI, 8013739) OpenJDK: XML parsing Denial of Service (JAXP, 8014530) OpenJDK: Java2d Disposer security bypass (2D, 8017287) OpenJDK: checkPackageAccess missing security check (Libraries, 8017291) OpenJDK: getDeclaringClass() information leak (Libraries, 8014349) OpenJDK: ObjectInputStream/ObjectOutputStream missing checks (Libraries, 8014987) JDK: unspecified vulnerability fixed in 7u45 (2D) OpenJDK: insufficient DataFlavor security checks (AWT, 8012277) | [
"cpe:/a:redhat:rhel_extras:5::client",
"cpe:/a:redhat:rhel_extras:5::server",
"cpe:/a:redhat:rhel_extras:6"
] | null | null | null | null |
RHSA-2024:2132 | Red Hat Security Advisory: fence-agents security and bug fix update | urllib3: Request body not stripped after redirect from 303 status changes request method to GET pycryptodome: side-channel leakage for OAEP decryption in PyCryptodome and pycryptodomex jinja2: HTML attribute injection when passing user input as keys to xmlattr filter | [
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::highavailability",
"cpe:/a:redhat:enterprise_linux:9::resilientstorage"
] | null | 5.4 | null | null |
RHSA-2007:1129 | Red Hat Security Advisory: autofs5 security update | autofs defaults don't restrict suid in /net | [
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2022:1081 | Red Hat Security Advisory: Gatekeeper Operator v0.2 security updates and bug fixes | golang.org/x/crypto: empty plaintext packet causes panic golang: crypto/elliptic: IsOnCurve returns true for invalid field elements | [
"cpe:/a:redhat:acm:2.3::el8"
] | null | 7.1 | null | null |
RHSA-2024:5405 | Red Hat Security Advisory: Red Hat Product OCP Tools 4.15 OpenShift Jenkins security update | jenkins: Arbitrary file read vulnerability through agent connections can lead to RCE | [
"cpe:/a:redhat:ocp_tools:4.15::el8"
] | null | 8.8 | null | null |
RHSA-2014:1188 | Red Hat Security Advisory: python-django-horizon security update | openstack-horizon: multiple XSS flaws openstack-horizon: multiple XSS flaws openstack-horizon: multiple XSS flaws openstack-horizon: persistent XSS in Horizon Host Aggregates interface openstack-horizon: multiple XSS flaws | [
"cpe:/a:redhat:openstack:4::el6"
] | null | null | null | null |
RHSA-2021:4201 | Red Hat Security Advisory: babel security and bug fix update | python-babel: Relative path traversal allows attacker to load arbitrary locale files and execute arbitrary code python-babel: Relative path traversal allows attacker to load arbitrary locale files and execute arbitrary code | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 7.8 | null | null |
RHSA-2025:3801 | Red Hat Security Advisory: RHEL AI 1.5 hdf5 security update | hdf5: heap buffer overread hdf5: multiple CVEs hdf5: multiple CVEs hdf5: multiple CVEs hdf5: multiple CVEs hdf5: multiple CVEs hdf5: multiple CVEs hdf5: multiple CVEs hdf5: multiple CVEs hdf5: multiple CVEs hdf5: multiple CVEs hdf5: multiple CVEs hdf5: multiple CVEs hdf5: multiple CVEs hdf5: multiple CVEs hdf5: multiple CVEs hdf5: multiple CVEs hdf5: multiple CVEs hdf5: multiple CVEs hdf5: multiple CVEs hdf5: multiple CVEs hdf5: multiple CVEs hdf5: multiple CVEs hdf5: multiple CVEs hdf5: multiple CVEs hdf5: multiple CVEs hdf5: multiple CVEs hdf5: multiple CVEs hdf5: multiple CVEs hdf5: multiple CVEs | [
"cpe:/a:redhat:enterprise_linux_ai:1.5::el9"
] | null | 4.8 | null | null |
RHSA-2024:6186 | Red Hat Security Advisory: containernetworking-plugins security update | golang: crypto/x509: Verify panics on certificates with an unknown public key algorithm | [
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 5.9 | null | null |
RHSA-2012:1110 | Red Hat Security Advisory: bind security update | bind: handling of zero length rdata can cause named to terminate unexpectedly | [
"cpe:/o:redhat:rhel_els:4::as",
"cpe:/o:redhat:rhel_els:4::es"
] | null | null | null | null |
RHSA-2024:6757 | Red Hat Security Advisory: libnbd security update | libnbd: NBD server improper certificate validation | [
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::crb"
] | null | 7.4 | null | null |
RHSA-2024:10807 | Red Hat Security Advisory: postgresql:15 security update | postgresql: PostgreSQL PL/Perl environment variable changes execute arbitrary code | [
"cpe:/a:redhat:rhel_eus:9.2::appstream"
] | null | 8.8 | null | null |
RHSA-2020:2383 | Red Hat Security Advisory: bind security update | bind: BIND does not sufficiently limit the number of fetches performed when processing referrals bind: A logic error in code which checks TSIG validity can be used to trigger an assertion failure in tsig.c | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | 7.5 | null | null |
RHSA-2024:9093 | Red Hat Security Advisory: xorg-x11-server-Xwayland security update | xorg-x11-server: Heap buffer overread/data leakage in ProcXIGetSelectedEvents xorg-x11-server: Heap buffer overread/data leakage in ProcXIPassiveGrabDevice xorg-x11-server: Use-after-free in ProcRenderAddGlyphs | [
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::crb"
] | null | 7.8 | null | null |
RHSA-2003:201 | Red Hat Security Advisory: ypserv security update | security flaw | [
"cpe:/o:redhat:enterprise_linux:2.1::as",
"cpe:/o:redhat:enterprise_linux:2.1::aw",
"cpe:/o:redhat:enterprise_linux:2.1::es"
] | null | null | null | null |
RHSA-2014:1821 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 6.3.2 update | OpenJDK: XML parsing Denial of Service (JAXP, 8017298) | [
"cpe:/a:redhat:jboss_enterprise_application_platform:6::el5"
] | null | null | null | null |
RHSA-2010:0474 | Red Hat Security Advisory: kernel security and bug fix update | kernel: nfsv4: kernel panic in nfs4_proc_lock() kernel: sctp: crash due to malformed SCTPChunkInit packet kernel: keyrings: find_keyring_by_name() can gain the freed keyring | [
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2012:0358 | Red Hat Security Advisory: kernel security and bug fix update | virt: VT-d (PCI passthrough) MSI trap injection kernel: ipv6: make fragment identifications less predictable kernel: possible privilege escalation via SG_IO ioctl kernel: hfs: add sanity check for file name length kernel: futex: clear robust_list on execve | [
"cpe:/o:redhat:rhel_eus:5.6"
] | null | null | null | null |
RHSA-2021:2555 | Red Hat Security Advisory: OpenShift Container Platform 4.7.19 packages and security update | polkit: local privilege escalation using polkit_system_bus_name_get_creds_sync() dhcp: stack-based buffer overflow when parsing statements with colon-separated hex digits in config or lease files in dhcpd and dhclient | [
"cpe:/a:redhat:openshift:4.7::el7",
"cpe:/a:redhat:openshift:4.7::el8"
] | null | 8.8 | null | null |
RHSA-2024:8131 | Red Hat Security Advisory: firefox security update | firefox: Use-after-free in Animation timeline (128.3.1 ESR Chemspill) | [
"cpe:/a:redhat:rhel_aus:8.6::appstream",
"cpe:/a:redhat:rhel_e4s:8.6::appstream",
"cpe:/a:redhat:rhel_tus:8.6::appstream"
] | null | 9.8 | null | null |
RHSA-2023:3342 | Red Hat Security Advisory: OpenShift Container Platform 4.13.4 CNF vRAN extras security update | vault: Hashicorp Vault AWS IAM Integration Authentication Bypass | [
"cpe:/a:redhat:openshift:4.13::el8"
] | null | 8.2 | null | null |
RHSA-2024:8260 | Red Hat Security Advisory: OpenShift Container Platform 4.16.18 bug fix and security update | containers/image: digest type does not guarantee valid type net/http: Denial of service due to improper 100-continue handling in net/http jose-go: improper handling of highly compressed data go/parser: golang: Calling any of the Parse functions containing deeply nested literals can cause a panic/stack exhaustion encoding/gob: golang: Calling Decoder.Decode on a message which contains deeply nested structures can cause a panic due to stack exhaustion go/build/constraint: golang: Calling Parse on a "// +build" build tag line with deeply nested expressions can cause a panic due to stack exhaustion | [
"cpe:/a:redhat:openshift:4.16::el9"
] | null | 5.9 | null | null |
RHSA-2021:0471 | Red Hat Security Advisory: dotnet3.1 security and bugfix update | dotnet: certificate chain building recursion Denial of Service | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 6.5 | null | null |
RHSA-2012:1512 | Red Hat Security Advisory: libxml2 security update | libxml2: Heap-buffer-underflow in xmlParseAttValueComplex | [
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server",
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2016:1331 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 6.4 security update | JGroups: Authorization bypass | [
"cpe:/a:redhat:jboss_enterprise_application_platform:6.4"
] | null | null | 9.8 | null |
RHSA-2017:2473 | Red Hat Security Advisory: kernel security and bug fix update | kernel: a race between inotify_handle_event() and sys_rename() | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 7.8 | null |
RHSA-2019:1726 | Red Hat Security Advisory: dbus security update | dbus: DBusServer DBUS_COOKIE_SHA1 authentication bypass | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | 7 | null |
RHSA-2007:0337 | Red Hat Security Advisory: postgresql security update | PostgreSQL security-definer function privilege escalation | [
"cpe:/a:redhat:rhel_application_stack:1"
] | null | null | null | null |
RHSA-2012:0841 | Red Hat Security Advisory: abrt, libreport, btparser, and python-meh security and bug fix update | abrt: may leak some personal information to bugzilla with some certain applications abrt: Setuid process core dump archived with unsafe GID permissions | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2017:0867 | Red Hat Security Advisory: Red Hat Enterprise Virtualization 3.x - 180 Day End Of Life Notice | This is the 180 day notification for the End of Production Phase 2 of
Red Hat Enterprise Virtualization 3.x. | [
"cpe:/a:redhat:rhev_manager:3"
] | null | null | null | null |
RHSA-2024:5582 | Red Hat Security Advisory: kpatch-patch-4_18_0-372_87_1 and kpatch-patch-4_18_0-372_91_1 security update | kernel: net: kernel: UAF in network route management kernel: virtio-net: tap: mlx5_core short frame denial of service kernel: virtio-net: tun: mlx5_core short frame denial of service | [
"cpe:/o:redhat:rhel_e4s:8.6::baseos"
] | null | 7.1 | null | null |
RHSA-2014:0041 | Red Hat Security Advisory: rhev-hypervisor6 security update | openssl: client NULL dereference crash on malformed handshake packets nss: Null_Cipher() does not respect maxOutputLen (MFSA 2013-103) nss: CERT_VerifyCert returns SECSuccess (saying certificate is good) even for bad certificates (MFSA 2013-103) openssl: crash when using TLS 1.2 caused by use of incorrect hash algorithm | [
"cpe:/o:redhat:enterprise_linux:6::hypervisor"
] | null | null | null | null |
RHSA-2013:0201 | Red Hat Security Advisory: rubygem-activesupport security update | rubygem-activesupport: json to yaml parsing | [
"cpe:/a:rhel_sam:1.1::el6"
] | null | null | null | null |
RHSA-2020:0580 | Red Hat Security Advisory: python-pillow security update | python-pillow: reading specially crafted image files leads to allocation of large amounts of memory and denial of service python-pillow: out-of-bounds write in expandrow in libImaging/SgiRleDecode.c python-pillow: improperly restricted operations on memory buffer in libImaging/PcxDecode.c | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 9.8 | null | null |
RHSA-2011:1321 | Red Hat Security Advisory: kernel security and bug fix update | kernel: gro: only reset frag0 when skb can be pulled | [
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2025:1711 | Red Hat Security Advisory: OpenShift Container Platform 4.15.46 bug fix and security update | runc: file descriptor leak golang.org/x/net/html: Non-linear parsing of case-insensitive content in golang.org/x/net/html kernel: media: uvcvideo: Skip parsing frames of type UVC_VS_UNDEFINED in uvc_parse_format | [
"cpe:/a:redhat:openshift:4.15::el8",
"cpe:/a:redhat:openshift:4.15::el9"
] | null | 7.3 | null | null |
RHSA-2024:4237 | Red Hat Security Advisory: go-toolset security update | golang: archive/zip: Incorrect handling of certain ZIP files golang: net/netip: Unexpected behavior from Is methods for IPv4-mapped IPv6 addresses | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 6.7 | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.