id
stringlengths
13
15
title
stringlengths
29
176
description
stringlengths
8
32.1k
cpes
sequencelengths
0
20
cvss_v4_0
null
cvss_v3_1
float64
0
10
cvss_v3_0
float64
0
10
cvss_v2_0
null
RHSA-2019:2695
Red Hat Security Advisory: kernel security and bug fix update
kernel: hw: Spectre SWAPGS gadget vulnerability
[ "cpe:/o:redhat:rhel_aus:6.5::server" ]
null
null
5.9
null
RHSA-2012:0516
Red Hat Security Advisory: thunderbird security update
Mozilla: Off-by-one error in OpenType Sanitizer (MFSA 2012-31) Mozilla: Miscellaneous memory safety hazards (rv:12.0/ rv:10.0.4) (MFSA 2012-20) Mozilla: Miscellaneous memory safety hazards (rv:12.0/ rv:10.0.4) (MFSA 2012-20) Mozilla: use-after-free in IDBKeyRange (MFSA 2012-22) Mozilla: Invalid frees causes heap corruption in gfxImageSurface (MFSA 2012-23) Mozilla: Potential XSS via multibyte content processing errors (MFSA 2012-24) Mozilla: Potential memory corruption during font rendering using cairo-dwrite (MFSA 2012-25) Mozilla: WebGL.drawElements may read illegal video memory due to FindMaxUshortElement error (MFSA 2012-26) Mozilla: Page load short-circuit can lead to XSS (MFSA 2012-27) Mozilla: Potential XSS through ISO-2022-KR/ISO-2022-CN decoding issues (MFSA 2012-29) Mozilla: Crash with WebGL content using textImage2D (MFSA 2012-30) Mozilla: Potential site identity spoofing when loading RSS and Atom feeds (MFSA 2012-33)
[ "cpe:/a:redhat:rhel_productivity:5", "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
null
null
RHSA-2013:0631
Red Hat Security Advisory: jbossweb security update
tomcat: three DIGEST authentication implementation issues tomcat: three DIGEST authentication implementation issues tomcat: three DIGEST authentication implementation issues
[ "cpe:/a:redhat:jboss_enterprise_web_platform:5::el4", "cpe:/a:redhat:jboss_enterprise_web_platform:5::el5", "cpe:/a:redhat:jboss_enterprise_web_platform:5::el6" ]
null
null
null
null
RHSA-2021:4161
Red Hat Security Advisory: python-jinja2 security update
python-jinja2: ReDoS vulnerability in the urlize filter
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
7.5
null
null
RHSA-2021:1762
Red Hat Security Advisory: virt:rhel and virt-devel:rhel security, bug fix, and enhancement update
QEMU: heap buffer overflow in iscsi_aio_ioctl_cb() in block/iscsi.c may lead to information disclosure QEMU: reachable assertion failure in net_tx_pkt_add_raw_fragment() in hw/net/net_tx_pkt.c libvirt: double free in qemuAgentGetInterfaces() in qemu_agent.c QEMU: infinite loop in e1000e_write_packet_to_guest() in hw/net/e1000e_core.c QEMU: assertion failure through usb_packet_unmap() in hw/usb/hcd-ehci.c QEMU: heap buffer overflow in msix_table_mmio_write() in hw/pci/msix.c QEMU: e1000e: infinite loop scenario in case of null packet descriptor QEMU: slirp: out-of-bounds access while processing ARP/NCSI packets QEMU: slirp: out-of-bounds access while processing ARP/NCSI packets QEMU: ide: atapi: OOB access while processing read commands
[ "cpe:/a:redhat:enterprise_linux:8::appstream", "cpe:/a:redhat:enterprise_linux:8::crb" ]
null
3.9
null
null
RHSA-2024:2079
Red Hat Security Advisory: git-lfs security update
golang: net/http, x/net/http2: unlimited number of CONTINUATION frames causes DoS
[ "cpe:/a:redhat:enterprise_linux:9::appstream" ]
null
7.5
null
null
RHSA-2023:6144
Red Hat Security Advisory: Custom Metric Autoscaler operator for Red Hat OpenShift security update
HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack)
[ "cpe:/a:redhat:openshift_custom_metrics_autoscaler:2.0::el8" ]
null
7.5
null
null
RHSA-2008:0967
Red Hat Security Advisory: httpd security and bug fix update
httpd: mod_proxy_http DoS via excessive interim responses from the origin server httpd: mod_proxy_ftp globbing XSS
[ "cpe:/o:redhat:enterprise_linux:3::as", "cpe:/o:redhat:enterprise_linux:3::desktop", "cpe:/o:redhat:enterprise_linux:3::es", "cpe:/o:redhat:enterprise_linux:3::ws", "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws", "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::client_workstation", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
RHSA-2023:0471
Red Hat Security Advisory: Migration Toolkit for Runtimes security update
nodejs-minimatch: ReDoS via the braceExpand function jib-core: RCE via the isDockerInstalled loader-utils: Regular expression denial of service jackson-databind: deep wrapper array nesting wrt UNWRAP_SINGLE_VALUE_ARRAYS jackson-databind: use of deeply nested arrays Apache-Commons-BCEL: arbitrary bytecode produced via out-of-bounds writing
[ "cpe:/a:redhat:migration_toolkit_runtimes:1.0::el8" ]
null
8.1
null
null
RHSA-2023:3287
Red Hat Security Advisory: OpenShift Container Platform 4.12.19 bug fix and security update
dns: Denial of Service (DoS)
[ "cpe:/a:redhat:openshift:4.12::el8", "cpe:/a:redhat:openshift:4.12::el9" ]
null
7.5
null
null
RHSA-2024:1327
Red Hat Security Advisory: gimp:2.8 security update
gimp: PSD buffer overflow RCE gimp: psp off-by-one RCE
[ "cpe:/a:redhat:rhel_aus:8.2::appstream", "cpe:/a:redhat:rhel_e4s:8.2::appstream", "cpe:/a:redhat:rhel_tus:8.2::appstream" ]
null
7.8
null
null
RHSA-2023:7526
Red Hat Security Advisory: tigervnc security update
xorg-x11-server: Out-of-bounds write in XIChangeDeviceProperty/RRChangeOutputProperty
[ "cpe:/a:redhat:rhel_aus:8.4::appstream", "cpe:/a:redhat:rhel_e4s:8.4::appstream", "cpe:/a:redhat:rhel_tus:8.4::appstream" ]
null
7.8
null
null
RHSA-2021:3841
Red Hat Security Advisory: thunderbird security update
rust-crossbeam-deque: race condition may lead to double free Mozilla: Use-after-free in MessageTask Mozilla: Validation message could have been overlaid on another origin Mozilla: Use-after-free of nsLanguageAtomService object Mozilla: Memory safety bugs fixed in Firefox 93, Firefox ESR 78.15, and Firefox ESR 91.2 Mozilla: Memory safety bugs fixed in Firefox 93 and Firefox ESR 91.2 Mozilla: Downgrade attack on SMTP STARTTLS connections
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
8.8
7.5
null
RHSA-2024:1770
Red Hat Security Advisory: OpenShift Container Platform 4.15.9 bug fix and security update
golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487) HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack) sanitize-html: Information Exposure when used on the backend
[ "cpe:/a:redhat:openshift:4.15::el8", "cpe:/a:redhat:openshift:4.15::el9" ]
null
5.3
null
null
RHSA-2019:1151
Red Hat Security Advisory: rh-ruby23-ruby security update
rubygems: Installing a malicious gem may lead to arbitrary code execution
[ "cpe:/a:redhat:rhel_software_collections:3::el6", "cpe:/a:redhat:rhel_software_collections:3::el7" ]
null
null
7.2
null
RHSA-2013:1196
Red Hat Security Advisory: Foreman security update
Foreman: hosts_controller.rb power/ipmi_boot Symbol creation DoS foreman: app/controllers/api/v1/hosts_controller.rb API privilege escalation
[ "cpe:/a:redhat:openstack:3::el6" ]
null
null
null
null
RHSA-2015:0698
Red Hat Security Advisory: rhevm-spice-client security, bug fix, and enhancement update
jasper: multiple integer overflows in jas_alloc calls jasper: possible buffer overflow in jas_stream_printf() jasper: heap buffer overflow flaws lead to arbitrary code execution (CERT VU#887409) jasper: heap buffer overflow flaws lead to arbitrary code execution (CERT VU#887409) jasper: double-free in in jas_iccattrval_destroy() (oCERT-2014-012) jasper: heap overflow in jp2_decode() (oCERT-2014-012) jasper: dec->numtiles off-by-one check in jpc_dec_process_sot() (oCERT-2015-001) jasper: unrestricted stack memory use in jpc_qmfb.c (oCERT-2015-001) jasper: incorrect component number check in COC, RGN and QCC marker segment decoders (oCERT-2014-009)
[ "cpe:/a:redhat:rhev_manager:3" ]
null
null
null
null
RHSA-2014:1033
Red Hat Security Advisory: java-1.6.0-ibm security update
JDK: Java CMS keystore provider potentially allows brute-force private key recovery JDK: Privilege escalation issue OpenJDK: SubjectDelegator protection insufficient (JMX, 8029755) OpenJDK: Clone interfaces passed to proxy methods (Libraries, 8035009) OpenJDK: Bytecode verification does not prevent ctor calls to this() and super() (Hotspot, 8035119) JDK: unspecified vulnerability fixed in 6u81, 7u65 and 8u11 (Deployment) OpenJDK: RSA blinding issues (Security, 8031346) OpenJDK: Prevent instantiation of service with non-public constructor (Security, 8035004) OpenJDK: AtomicReferenceFieldUpdater missing primitive type check (Libraries, 8039520) OpenJDK: insufficient Diffie-Hellman public key validation (Security, 8037162) JDK: unspecified vulnerability fixed in 6u81, 7u65 and 8u11 (Deployment)
[ "cpe:/a:redhat:rhel_extras:5::client", "cpe:/a:redhat:rhel_extras:5::server", "cpe:/a:redhat:rhel_extras:6" ]
null
null
null
null
RHSA-2023:5764
Red Hat Security Advisory: nodejs security update
HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack)
[ "cpe:/a:redhat:rhel_eus:9.0::appstream" ]
null
7.5
null
null
RHSA-2015:1631
Red Hat Security Advisory: ceph-deploy security update
ceph-deploy: keyring permissions are world readable in ~ceph ceph-deploy admin command copies keyring file to /etc/ceph which is world readable
[ "cpe:/a:redhat:ceph_storage:1.2::centos:6" ]
null
null
null
null
RHSA-2024:4571
Red Hat Security Advisory: OpenJDK 21.0.4 Security Update for Windows Builds
OpenJDK: potential UTF8 size overflow (8314794) OpenJDK: Excessive symbol length can lead to infinite loop (8319859) OpenJDK: Range Check Elimination (RCE) pre-loop limit overflow (8320548) OpenJDK: Out-of-bounds access in 2D image handling (8324559) OpenJDK: RangeCheckElimination array index overflow (8323231)
[ "cpe:/a:redhat:openjdk:21::windows" ]
null
7.4
null
null
RHSA-2013:1505
Red Hat Security Advisory: java-1.6.0-openjdk security update
OpenJDK: java.util.TimeZone does not restrict setting of default time zone (Libraries, 8001029) OpenJDK: XML parsing Denial of Service (JAXP, 8017298) OpenJDK: insufficient html escaping in jhat (jhat, 8011081) OpenJDK: Inet6Address class IPv6 address processing errors (Libraries, 8015743) OpenJDK: image conversion out of bounds read (2D, 8014102) OpenJDK: key data leak via toString() methods (Libraries, 8011071) OpenJDK: Incorrect awt_getPixelByte/awt_getPixelShort/awt_setPixelByte/awt_setPixelShort image raster checks (2D, 8014093) OpenJDK: JTable not properly performing certain access checks (Swing, 8013744) OpenJDK: insufficient InterfaceImplementor security checks (Scripting, 8017299) OpenJDK: insufficient security checks (Beans, 8012071) OpenJDK: insufficient escaping of window title string (Javadoc, 8016675) OpenJDK: javax.xml.transform.TransformerFactory does not properly honor XMLConstants.FEATURE_SECURE_PROCESSING (JAXP, 8012425) OpenJDK: insufficient checks of KDC replies (JGSS, 8014341) OpenJDK: javac does not ignore certain ignorable characters (Javadoc, 8016653) OpenJDK: JPEGImageReader and JPEGImageWriter missing band size checks (2D, 8013510) OpenJDK: RMIConnection stub missing permission check (CORBA, 8011157) OpenJDK: VersionHelper12 does not honor modifyThreadGroup restriction (JNDI, 8013739) OpenJDK: insufficient security checks (JAXWS, 8017505) OpenJDK: com.sun.org.apache.xml.internal.security.utils.UnsyncByteArrayOutputStream Denial of Service (Security, 8021290) OpenJDK: XML parsing Denial of Service (JAXP, 8014530) OpenJDK: Java2d Disposer security bypass (2D, 8017287) OpenJDK: checkPackageAccess missing security check (Libraries, 8017291) OpenJDK: getDeclaringClass() information leak (Libraries, 8014349) OpenJDK: ObjectInputStream/ObjectOutputStream missing checks (Libraries, 8014987) OpenJDK: insufficient DataFlavor security checks (AWT, 8012277) OpenJDK: Missing CORBA security checks (Libraries, 8017196)
[ "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::server", "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
null
null
RHSA-2009:1127
Red Hat Security Advisory: kdelibs security update
kdelibs: Integer overflow in KJS JavaScript garbage collector kdelibs: KHTML Incorrect handling <head> element content once the <head> element was removed (DoS, ACE) kdelibs: KHTML CSS parser - incorrect handling CSS "style" attribute content (DoS, ACE)
[ "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws", "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::client_workstation", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
RHSA-2018:2177
Red Hat Security Advisory: Red Hat Ceph Storage 3.0 security and bug fix update
ceph: cephx protocol is vulnerable to replay attack ceph: cephx uses weak signatures ceph: ceph-mon does not perform authorization on OSD pool ops
[ "cpe:/a:redhat:ceph_storage:3::el7" ]
null
null
4.6
null
RHSA-2006:0420
Red Hat Security Advisory: ethereal security update
security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw
[ "cpe:/o:redhat:enterprise_linux:3::as", "cpe:/o:redhat:enterprise_linux:3::desktop", "cpe:/o:redhat:enterprise_linux:3::es", "cpe:/o:redhat:enterprise_linux:3::ws" ]
null
null
null
null
RHSA-2018:3107
Red Hat Security Advisory: wpa_supplicant security and bug fix update
wpa_supplicant: Unauthenticated EAPOL-Key decryption in wpa_supplicant
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
8.3
null
RHSA-2023:7712
Red Hat Security Advisory: tracker-miners security update
tracker-miners: sandbox escape
[ "cpe:/a:redhat:enterprise_linux:9::appstream" ]
null
7.5
null
null
RHSA-2024:4577
Red Hat Security Advisory: kernel security update
kernel: GSM multiplexing race condition leads to privilege escalation
[ "cpe:/o:redhat:rhel_aus:8.2::baseos" ]
null
7
null
null
RHSA-2017:0036
Red Hat Security Advisory: kernel security and bug fix update
kernel: out of bounds reads when processing IPT_SO_SET_REPLACE setsockopt kernel: Use after free in tcp_xmit_retransmit_queue kernel: Use-after-free in the recvmmsg exit path
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
8.1
null
RHSA-2011:1160
Red Hat Security Advisory: dhcp security update
dhcp: denial of service flaws dhcp: denial of service flaws
[ "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws", "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::client_workstation", "cpe:/o:redhat:enterprise_linux:5::server", "cpe:/o:redhat:enterprise_linux:6::server" ]
null
null
null
null
RHSA-2022:5913
Red Hat Security Advisory: Red Hat Kiali for OpenShift Service Mesh 2.0 security update
moment: inefficient parsing algorithm resulting in DoS
[ "cpe:/a:redhat:service_mesh:2.0::el8" ]
null
7.5
null
null
RHSA-2016:1137
Red Hat Security Advisory: openssl security update
openssl: Memory corruption in the ASN.1 encoder
[ "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::client_workstation", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
5.6
null
RHSA-2023:4276
Red Hat Security Advisory: DevWorkspace Operator Security Update
openshift: OCP & FIPS mode
[ "cpe:/a:redhat:devworkspace:1.0::el8" ]
null
6.5
null
null
RHSA-2023:3394
Red Hat Security Advisory: pki-core:10.6 security update
pki-core: When using the caServerKeygen_DirUserCert profile, user can get certificates for other UIDs by entering name in Subject field pki-core: access to external entities when parsing XML can lead to XXE
[ "cpe:/a:redhat:rhel_eus:8.6::appstream" ]
null
7.5
null
null
RHSA-2024:1914
Red Hat Security Advisory: Red Hat JBoss Web Server 5.8.0 release and security update
Tomcat: WebSocket DoS with incomplete closing handshake
[ "cpe:/a:redhat:jboss_enterprise_web_server:5.8" ]
null
7.5
null
null
RHSA-2019:4041
Red Hat Security Advisory: Red Hat Single Sign-On 7.3.5 security update on RHEL 7
HTTP/2: flood using PING frames results in unbounded memory growth HTTP/2: flood using HEADERS frames results in unbounded memory growth HTTP/2: flood using SETTINGS frames results in unbounded memory growth keycloak: keycloak uses hardcoded open dummy domain for new accounts enabling information disclosure wildfly-core: Incorrect privileges for 'Monitor', 'Auditor' and 'Deployer' user by default wildfly-security-manager: security manager authorization bypass
[ "cpe:/a:redhat:red_hat_single_sign_on:7::el7" ]
null
null
7.5
null
RHSA-2024:3659
Red Hat Security Advisory: booth security update
booth: specially crafted hash can lead to invalid HMAC being accepted by Booth server
[ "cpe:/a:redhat:enterprise_linux:8::highavailability", "cpe:/a:redhat:enterprise_linux:8::resilientstorage" ]
null
5.9
null
null
RHSA-2023:0934
Red Hat Security Advisory: Migration Toolkit for Applications security and bug fix update
gin: Unsanitized input in the default logger in github.com/gin-gonic/gin glob-parent: Regular Expression Denial of Service express: "qs" prototype poisoning causes the hang of the node process loader-utils: prototype pollution in function parseQuery in parseQuery.js loader-utils: Regular expression denial of service golang: net/http: excessive memory growth in a Go server accepting HTTP/2 requests Apache-Commons-BCEL: arbitrary bytecode produced via out-of-bounds writing json5: Prototype Pollution in JSON5 via Parse Method
[ "cpe:/a:redhat:migration_toolkit_applications:6.0::el8" ]
null
8.8
null
null
RHSA-2022:0557
Red Hat Security Advisory: OpenShift Container Platform 4.9.22 security update
golang: net: incorrect parsing of extraneous zero characters at the beginning of an IP address octet golang: net/http/httputil: panic due to racy read of persistConn after handler panic golang: net/http: limit growth of header canonicalization cache golang: syscall: don't close fd 0 on ForkExec error
[ "cpe:/a:redhat:openshift:4.9::el7", "cpe:/a:redhat:openshift:4.9::el8" ]
null
4.8
null
null
RHSA-2019:3132
Red Hat Security Advisory: OpenShift Container Platform 4.1.20 openshift security update
kubernetes: YAML parsing vulnerable to "Billion Laughs" attack, allowing for remote denial of service
[ "cpe:/a:redhat:openshift:4.1::el7", "cpe:/a:redhat:openshift:4.1::el8" ]
null
null
7.5
null
RHSA-2003:417
Red Hat Security Advisory: : Updated kernel resolves security vulnerability
security flaw security flaw
[ "cpe:/o:redhat:linux:7.1", "cpe:/o:redhat:linux:7.2", "cpe:/o:redhat:linux:7.3", "cpe:/o:redhat:linux:8.0", "cpe:/o:redhat:linux:9" ]
null
null
null
null
RHSA-2020:0589
Red Hat Security Advisory: CloudForms 4.7.15 security, bug fix and enhancement update
CloudForms: RCE vulnerability in NFS schedule backup
[ "cpe:/a:redhat:cloudforms_managementengine:5.10::el7" ]
null
8
null
null
RHSA-2018:3400
Red Hat Security Advisory: libvirt security update
hw: cpu: speculative store bypass
[ "cpe:/o:redhat:rhel_aus:6.6::server", "cpe:/o:redhat:rhel_tus:6.6::server" ]
null
null
5.6
null
RHSA-2017:2832
Red Hat Security Advisory: nss security update
nss: Potential use-after-free in TLS 1.2 server when verifying client authentication
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation", "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
7.5
null
RHSA-2014:0170
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 6.2.1 update
Java: Java XML Signature DoS Attack Java: XML eXternal Entity (XXE) flaw in ParserPool and Decrypter jboss-as-server: Unchecked access to MSC Service Registry under JSM
[ "cpe:/a:redhat:jboss_enterprise_application_platform:6::el5" ]
null
null
null
null
RHSA-2023:5529
Red Hat Security Advisory: bind security update
bind: stack exhaustion in control channel code may lead to DoS
[ "cpe:/a:redhat:rhel_aus:8.4::appstream", "cpe:/a:redhat:rhel_e4s:8.4::appstream", "cpe:/a:redhat:rhel_tus:8.4::appstream", "cpe:/o:redhat:rhel_aus:8.4::baseos", "cpe:/o:redhat:rhel_e4s:8.4::baseos", "cpe:/o:redhat:rhel_tus:8.4::baseos" ]
null
7.5
null
null
RHSA-2003:193
Red Hat Security Advisory: kdelibs security update
security flaw
[ "cpe:/o:redhat:enterprise_linux:2.1::as", "cpe:/o:redhat:enterprise_linux:2.1::aw", "cpe:/o:redhat:enterprise_linux:2.1::es", "cpe:/o:redhat:enterprise_linux:2.1::ws" ]
null
null
null
null
RHSA-2024:1833
Red Hat Security Advisory: squid security update
squid: Denial of Service in HTTP Chunked Decoding squid: denial of service in HTTP header parser
[ "cpe:/a:redhat:rhel_eus:9.0::appstream" ]
null
8.6
null
null
RHSA-2012:0699
Red Hat Security Advisory: openssl security and bug fix update
openssl: record length handling integer underflow
[ "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::client_workstation", "cpe:/o:redhat:enterprise_linux:5::server", "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
null
null
RHSA-2014:1352
Red Hat Security Advisory: libvirt security and bug fix update
libvirt: qemu: out-of-bounds read access in qemuDomainGetBlockIoTune() due to invalid index libvirt: domain_conf: domain deadlock DoS
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
null
null
RHBA-2019:3303
Red Hat Bug Fix Advisory: OpenShift Container Platform 4.2.4 images update
golang: HTTP/1.1 headers with a space before the colon leads to filter bypass or request smuggling
[ "cpe:/a:redhat:openshift:4.2::el7", "cpe:/a:redhat:openshift:4.2::el8" ]
null
null
6.5
null
RHSA-2021:3146
Red Hat Security Advisory: ACS 3.64 security and enhancement update
golang: net: lookup functions may return invalid host names golang: net/http/httputil: ReverseProxy forwards connection headers if first one is empty golang: math/big.Rat: may cause a panic or an unrecoverable fatal error if passed inputs with very large exponents golang: crypto/tls: certificate of wrong type is causing TLS client to panic
[ "cpe:/a:redhat:advanced_cluster_security:3.64::el8" ]
null
6.5
null
null
RHSA-2018:2692
Red Hat Security Advisory: firefox security update
Mozilla: Proxy bypass using automount and autofs Mozilla: Memory safety bugs fixed in Firefox 62 and Firefox ESR 60.2 Mozilla: Use-after-free in driver timers Mozilla: Use-after-free in IndexedDB Mozilla: Out-of-bounds write with malicious MAR file Mozilla: Same-origin policy violation using meta refresh and performance.getEntries to steal cross-origin URLs
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
6.5
null
RHSA-2022:7024
Red Hat Security Advisory: firefox security update
expat: a use-after-free in the doContent function in xmlparse.c
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
8.1
null
null
RHSA-2024:0292
Red Hat Security Advisory: OpenShift Container Platform 4.14.10 security update
golang: crypto/tls: slow verification of certificate chains containing large RSA keys
[ "cpe:/a:redhat:openshift:4.14::el9" ]
null
5.3
null
null
RHSA-2024:3835
Red Hat Security Advisory: libreoffice security update
libreoffice: Improper Input Validation leading to arbitrary gstreamer plugin execution libreoffice: Insufficient macro permission validation leading to macro execution
[ "cpe:/a:redhat:enterprise_linux:9::appstream", "cpe:/a:redhat:enterprise_linux:9::crb" ]
null
8.3
null
null
RHSA-2022:7077
Red Hat Security Advisory: Red Hat Certificate System 9.7 CVE bug fix update
pki-core: When using the caServerKeygen_DirUserCert profile, user can get certificates for other UIDs by entering name in Subject field
[ "cpe:/a:redhat:certificate_system:9.7::el7" ]
null
7.6
null
null
RHSA-2023:4255
Red Hat Security Advisory: kernel-rt security and bug fix update
kernel: tcindex: use-after-free vulnerability in traffic control index filter allows privilege escalation kernel: netfilter: use-after-free in nf_tables when processing batch requests can lead to privilege escalation
[ "cpe:/a:redhat:rhel_e4s:8.4::nfv", "cpe:/a:redhat:rhel_tus:8.4::nfv", "cpe:/a:redhat:rhel_tus:8.4::realtime" ]
null
7.8
null
null
RHSA-2015:1714
Red Hat Security Advisory: spice security update
spice: memory corruption in worker_update_monitors_config()
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
null
null
RHSA-2017:1551
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform security update
tomcat: security manager bypass via IntrospectHelper utility function tomcat: security manager bypass via JSP Servlet config parameters wildfly: Arbitrary file read via path traversal
[ "cpe:/a:redhat:jboss_enterprise_application_platform:6.4" ]
null
null
7.7
null
RHSA-2025:1487
Red Hat Security Advisory: updated discovery container images
libxml: use-after-free in xmlXIncludeAddNode openssl: RFC7250 handshakes with unauthenticated servers don't abort as expected
[ "cpe:/o:redhat:discovery:1.0::el9" ]
null
7.4
null
null
RHSA-2023:0396
Red Hat Security Advisory: kpatch-patch security update
kernel: memory corruption in AX88179_178A based USB ethernet device.
[ "cpe:/o:redhat:rhel_e4s:8.2::baseos" ]
null
7.8
null
null
RHBA-2021:1550
Red Hat Bug Fix Advisory: OpenShift Container Platform 4.7.11 bug fix update
openshift/ovn-kubernetes: Egress Firewall does not reliably apply firewall rules
[ "cpe:/a:redhat:openshift:4.7::el8" ]
null
5.6
null
null
RHSA-2024:8704
Red Hat Security Advisory: Kube Descheduler Operator for Red Hat OpenShift 5.0.2 for RHEL 9
golang-protobuf: encoding/protojson, internal/encoding/json: infinite loop in protojson.Unmarshal when unmarshaling certain forms of invalid JSON go/parser: golang: Calling any of the Parse functions containing deeply nested literals can cause a panic/stack exhaustion go/build/constraint: golang: Calling Parse on a "// +build" build tag line with deeply nested expressions can cause a panic due to stack exhaustion
[ "cpe:/a:redhat:kube_descheduler_operator:5.0::el9" ]
null
5.9
null
null
RHSA-2024:10848
Red Hat Security Advisory: firefox security update
firefox: thunderbird: Select list elements could be shown over another site firefox: thunderbird: CSP Bypass and XSS Exposure via Web Compatibility Shims firefox: thunderbird: URL Bar Spoofing via Manipulated Punycode and Whitespace Characters firefox: thunderbird: Unhandled Exception in Add-on Signature Verification firefox: thunderbird: Improper Keypress Handling in Executable File Confirmation Dialog firefox: thunderbird: Memory safety bugs fixed in Firefox 133, Thunderbird 133, Firefox ESR 128.5, and Thunderbird 128.5
[ "cpe:/a:redhat:rhel_eus:8.8::appstream" ]
null
8.8
null
null
RHEA-2015:2527
Red Hat Enhancement Advisory: rhev-hypervisor bug fix, and enhancement update
RHEV: vdsm spice disable-ticketing and VM suspend and restore allows auth bypass
[ "cpe:/o:redhat:enterprise_linux:6::hypervisor", "cpe:/o:redhat:enterprise_linux:7::hypervisor" ]
null
null
null
null
RHSA-2021:2587
Red Hat Security Advisory: ruby:2.5 security, bug fix, and enhancement update
ruby: NUL injection vulnerability of File.fnmatch and File.fnmatch? ruby: Regular expression denial of service vulnerability of WEBrick's Digest authentication ruby: HTTP response splitting in WEBrick ruby: Code injection via command argument of Shell#test / Shell#[] rubygem-json: Unsafe object creation vulnerability in JSON ruby: BasicSocket#read_nonblock method leads to information disclosure ruby: Potential HTTP request smuggling in WEBrick ruby: XML round-trip vulnerability in REXML
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
7.5
7.5
null
RHSA-2023:2029
Red Hat Security Advisory: OpenShift Security Profiles Operator bug fix update
go-getter: go-getter vulnerable to denial of service via malicious compressed archive containerd: Supplementary groups are not set up properly
[ "cpe:/a:redhat:openshift_security_profiles_operator_stable:::el8" ]
null
7.3
null
null
RHSA-2018:1349
Red Hat Security Advisory: kernel security and bug fix update
Kernel: error in exception handling leads to DoS
[ "cpe:/o:redhat:rhel_aus:6.4::server" ]
null
null
6.5
null
RHSA-2023:3042
Red Hat Security Advisory: emacs security and bug fix update
emacs: ctags local command execution vulnerability
[ "cpe:/a:redhat:enterprise_linux:8::appstream", "cpe:/o:redhat:enterprise_linux:8::baseos" ]
null
7.8
null
null
RHSA-2008:0261
Red Hat Security Advisory: Red Hat Network Satellite Server security update
mod_ssl SSLCipherSuite bypass libxpm buffer overflow tomcat multiple content-length header poisioning tomcat DoS openmotif libUil buffer overflows tomcat manager example DoS tomcat examples XSS perl-Crypt-CBC weaker encryption with some ciphers jabberd SASL DoS tomcat directory listing issue httpd mod_status XSS tomcat XSS in example webapps tomcat XSS in example webapps mod_jk chunk too long java-jre: GIF buffer overflow tomcat directory traversal mod_perl PerlRun denial of service tomcat XSS in samples tomcat accept-language xss flaw mod_jk sends decoded URL to tomcat javaws vulnerabilities tomcat examples jsp XSS tomcat host manager XSS Integer overflow in the embedded ICC profile image parser in Sun Java Development Kit BMP image parser vulnerability httpd scoreboard lack of PID protection tomcat handling of cookies tomcat handling of cookie values mod_autoindex XSS httpd: mod_imagemap XSS Absolute path traversal Apache Tomcat WEBDAV RHN XSS flaw JFreeChart: XSS vulnerabilities in the image map feature apache mod_status cross-site scripting tomcat5 SSO cookie login information disclosure
[ "cpe:/a:redhat:network_satellite:5.0:el4" ]
null
null
null
null
RHSA-2023:0772
Red Hat Security Advisory: OpenShift Container Platform 4.12.4 security update
kubernetes: Unauthorized read of Custom Resources
[ "cpe:/a:redhat:openshift:4.12::el8" ]
null
6.5
null
null
RHSA-2023:7528
Red Hat Security Advisory: fence-agents security update
python-certifi: Removal of e-Tugra root certificate python-urllib3: Cookie request header isn't stripped during cross-origin redirects
[ "cpe:/a:redhat:rhel_eus:8.8::appstream", "cpe:/a:redhat:rhel_eus:8.8::highavailability", "cpe:/a:redhat:rhel_eus:8.8::resilientstorage" ]
null
5.9
null
null
RHSA-2010:0752
Red Hat Security Advisory: gpdf security update
xpdf: uninitialized Gfx::parser pointer dereference xpdf: array indexing error in FoFiType1::parse()
[ "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws" ]
null
null
null
null
RHSA-2010:0966
Red Hat Security Advisory: firefox security update
Mozilla use-after-free error with nsDOMAttribute MutationObserver (MFSA 2010-80) Mozilla integer overflow vulnerability in NewIdArray (MFSA 2010-81) Mozilla add support for OTS font sanitizer (MFSA 2010-78) Mozilla XSS hazard in multiple character encodings (MFSA 2010-84) Mozilla Chrome privilege escalation with window.open and <isindex> element (MFSA 2010-76) Mozilla crash and remote code execution using HTML tags inside a XUL tree (MFSA 2010-77) Mozilla incomplete fix for CVE-2010-0179 (MFSA 2010-82) Mozilla location bar SSL spoofing using network error page (MFSA 2010-83) data: URL meta refresh (MFSA 2010-79) Mozilla miscellaneous memory safety hazards (MFSA 2010-74) Mozilla miscellaneous memory safety hazards (MFSA 2010-74)
[ "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws", "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::client_workstation", "cpe:/o:redhat:enterprise_linux:5::server", "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
null
null
RHSA-2013:0604
Red Hat Security Advisory: java-1.6.0-openjdk security update
OpenJDK: Specially crafted sample model integer overflow (2D, 8007014) OpenJDK: CMM malformed raster memory corruption (2D, 8007675)
[ "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
RHSA-2009:1451
Red Hat Security Advisory: freeradius security update
FreeRADIUS: Missing check for Tunnel-Password attributes with zero length (DoS) -- re-appearance of CVE-2003-0967
[ "cpe:/o:redhat:enterprise_linux:5::client_workstation", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
RHSA-2016:1140
Red Hat Security Advisory: squid34 security update
squid: buffer overflow in cachemgr.cgi squid: multiple issues in ESI processing squid: multiple issues in ESI processing squid: multiple issues in ESI processing squid: Cache poisoning issue in HTTP Request handling squid: Header Smuggling issue in HTTP Request processing squid: SegFault from ESIInclude::Start squid: SIGSEGV in ESIContext response handling
[ "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
null
null
RHSA-2023:4061
Red Hat Security Advisory: .NET 6.0 security, bug fix, and enhancement update
dotnet: race condition in Core SignInManager<TUser> PasswordSignInAsync method
[ "cpe:/a:redhat:rhel_dotnet:6.0::el7" ]
null
8.1
null
null
RHSA-2019:0547
Red Hat Security Advisory: OpenShift Container Platform 3.9 haproxy security update
haproxy: Out-of-bounds read in dns.c:dns_validate_dns_response() allows for memory disclosure haproxy: Mishandling of priority flag in short HEADERS frame by HTTP/2 decoder allows for crash
[ "cpe:/a:redhat:openshift:3.9::el7" ]
null
null
5.9
null
RHSA-2024:0113
Red Hat Security Advisory: kernel security update
kernel: vmwgfx: integer overflow in vmwgfx_execbuf.c kernel: UAF during login when accessing the shost ipaddress kernel: use after free in unix_stream_sendpage kernel: vmwgfx: reference count issue leads to use-after-free in surface handling amd: Return Address Predictor vulnerability leading to information disclosure kernel: netfilter: potential slab-out-of-bound access due to integer underflow
[ "cpe:/a:redhat:enterprise_linux:8::crb", "cpe:/o:redhat:enterprise_linux:8::baseos" ]
null
7
null
null
RHBA-2022:5721
Red Hat Bug Fix Advisory: .NET 6.0 on RHEL 7 bugfix update
eventsource: Exposure of Sensitive Information
[ "cpe:/a:redhat:rhel_dotnet:6.0::el7" ]
null
9.3
null
null
RHSA-2022:5474
Red Hat Security Advisory: firefox security update
Mozilla: Undesired attributes could be set as part of prototype pollution Mozilla: CSP bypass enabling stylesheet injection Mozilla: CSP sandbox header without `allow-scripts` can be bypassed via retargeted javascript: URI Mozilla: Use-after-free in nsSHistory Mozilla: Unavailable PAC file resulted in OCSP requests being blocked Mozilla: A popup window could be resized in a way to overlay the address bar with web content Mozilla: Potential integer overflow in ReplaceElementsAt Mozilla: Memory safety bugs fixed in Firefox 102 and Firefox ESR 91.11
[ "cpe:/a:redhat:rhel_eus:8.2::appstream" ]
null
8.8
7.5
null
RHSA-2018:2733
Red Hat Security Advisory: rubygem-smart_proxy_dynflow security update
smart_proxy_dynflow: Authentication bypass in Foreman remote execution feature
[ "cpe:/a:redhat:satellite:6.3::el7", "cpe:/a:redhat:satellite_capsule:6.3::el7" ]
null
null
9.8
null
RHSA-2003:258
Red Hat Security Advisory: : GDM allows local user to read any file.
security flaw security flaw security flaw
[ "cpe:/o:redhat:linux:7.1", "cpe:/o:redhat:linux:7.2", "cpe:/o:redhat:linux:7.3", "cpe:/o:redhat:linux:8.0", "cpe:/o:redhat:linux:9" ]
null
null
null
null
RHSA-2023:4167
Red Hat Security Advisory: java-1.8.0-openjdk security update
OpenJDK: array indexing integer overflow issue (8304468) OpenJDK: improper handling of slash characters in URI-to-path conversion (8305312)
[ "cpe:/a:redhat:rhel_e4s:8.1::appstream" ]
null
3.7
null
null
RHSA-2018:0051
Red Hat Security Advisory: rhevm-setup-plugins security, bug fix, and enhancement update
An update for rhevm-setup-plugins is now available for RHEV Engine version 4.1. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
[ "cpe:/a:redhat:rhev_manager:4" ]
null
null
null
null
RHSA-2020:5562
Red Hat Security Advisory: firefox security update
chromium-browser: Uninitialized Use in V8 Mozilla: Heap buffer overflow in WebGL Mozilla: CSS Sanitizer performed incorrect sanitization Mozilla: Incorrect cast of StyleGenericFlexBasis resulted in a heap use-after-free Mozilla: Internal network hosts could have been probed by a malicious webpage Mozilla: The proxy.onRequest API did not catch view-source URLs Mozilla: Memory safety bugs fixed in Firefox 84 and Firefox ESR 78.6
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
8.8
6.1
null
RHSA-2020:5021
Red Hat Security Advisory: qt and qt5-qtbase security update
qt: buffer over-read in read_xbm_body in gui/image/qxbmhandler.cpp
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
5.3
null
null
RHSA-2018:1458
Red Hat Security Advisory: dhcp security update
dhcp: Command injection vulnerability in the DHCP client NetworkManager integration script
[ "cpe:/o:redhat:rhel_eus:6.7::computenode", "cpe:/o:redhat:rhel_eus:6.7::server" ]
null
null
7.5
null
RHSA-2022:6634
Red Hat Security Advisory: webkit2gtk3 security update
webkitgtk: processing maliciously crafted web content may lead to arbitrary code execution
[ "cpe:/a:redhat:enterprise_linux:9::appstream" ]
null
8.8
null
null
RHSA-2012:1169
Red Hat Security Advisory: condor security update
condor: host based authentication does not implement forward-confirmed reverse dns
[ "cpe:/a:redhat:enterprise_mrg:2:computenode:el6", "cpe:/a:redhat:enterprise_mrg:2:server:el6" ]
null
null
null
null
RHSA-2019:2779
Red Hat Security Advisory: qpid-proton security update
qpid-proton: TLS Man in the Middle Vulnerability
[ "cpe:/a:redhat:satellite:6.3::el7", "cpe:/a:redhat:satellite_capsule:6.3::el7" ]
null
null
7.4
null
RHSA-2011:1424
Red Hat Security Advisory: perl security update
Perl decode_xs heap-based buffer overflow Perl Digest improper control of generation of code
[ "cpe:/o:redhat:enterprise_linux:6::server" ]
null
null
null
null
RHSA-2023:0859
Red Hat Security Advisory: Red Hat Virtualization Host 4.4.z SP 1 security update batch#4 (oVirt-4.5.3-4)
kernel: i915: Incorrect GPU TLB flush can lead to random memory access libksba: integer overflow to code execution sudo: arbitrary file write with privileges of the RunAs user
[ "cpe:/o:redhat:rhev_hypervisor:4.4::el8" ]
null
7.8
null
null
RHSA-2018:0026
Red Hat Security Advisory: qemu-kvm security update
An update for qemu-kvm is now available for Red Hat Enterprise Linux 7.2 Advanced Update Support, Red Hat Enterprise Linux 7.2 Telco Extended Update Support, and Red Hat Enterprise Linux 7.2 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
[ "cpe:/o:redhat:rhel_aus:7.2::server", "cpe:/o:redhat:rhel_e4s:7.2::server", "cpe:/o:redhat:rhel_tus:7.2::server" ]
null
null
null
null
RHSA-2018:3347
Red Hat Security Advisory: python-paramiko security update
python-paramiko: Authentication bypass in auth_handler.py
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
9.8
null
RHSA-2022:0422
Red Hat Security Advisory: varnish:6 security update
varnish: HTTP/1 request smuggling vulnerability
[ "cpe:/a:redhat:rhel_eus:8.4::appstream" ]
null
9.1
null
null
RHEA-2013:1032
Red Hat Enhancement Advisory: Red Hat OpenShift Enterprise 1.2 Node Release Advisory
stapler-adjunct-zeroclipboard: XSS via copying XSS payload into buffer Jenkins: Build Description XSS Jenkins: Multiple CSRF in MavenAbstractArtifactRecord.doRedeploy and Jenkins.doEval
[ "cpe:/a:redhat:openshift:1.2::el6" ]
null
null
null
null
RHSA-2021:0765
Red Hat Security Advisory: kernel security, bug fix, and enhancement update
kernel: bad kfree in auditfilter.c may lead to escalation of privilege kernel: performance counters race condition use-after-free kernel: Local buffer overflow in ctnetlink_parse_tuple_filter in net/netfilter/nf_conntrack_netlink.c kernel: ICMP rate limiting can be used for DNS poisoning attack kernel: locking issue in drivers/tty/tty_jobctrl.c can lead to an use-after-free
[ "cpe:/a:redhat:rhel_eus:8.2::crb", "cpe:/o:redhat:rhel_eus:8.2::baseos" ]
null
7.8
null
null