id
stringlengths 13
15
| title
stringlengths 29
176
| description
stringlengths 8
32.1k
| cpes
sequencelengths 0
20
| cvss_v4_0
null | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
null |
---|---|---|---|---|---|---|---|
RHSA-2024:9423 | Red Hat Security Advisory: python-dns security update | dnspython: denial of service in stub resolver | [
"cpe:/o:redhat:enterprise_linux:9::baseos"
] | null | 5.9 | null | null |
RHSA-2019:3744 | Red Hat Security Advisory: ansible security update | Ansible: path traversal in the fetch module ansible: unsafe template evaluation of returned module data can lead to information disclosure Ansible: disclosure data when prompted for password and template characters are passed | [
"cpe:/a:redhat:openstack:14::el7"
] | null | null | 6.4 | null |
RHSA-2021:1199 | Red Hat Security Advisory: Red Hat JBoss Core Services Apache HTTP Server 2.4.37 SP7 security update | openssl: NULL pointer dereference in signature_algorithms processing openssl: CA certificate check bypass with X509_V_FLAG_X509_STRICT | [
"cpe:/a:redhat:jboss_core_services:1::el7"
] | null | 7.4 | null | null |
RHSA-2023:0289 | Red Hat Security Advisory: firefox security update | Mozilla: libusrsctp library out of date Mozilla: Fullscreen notification bypass Mozilla: Arbitrary file read from GTK drag and drop on Linux Mozilla: Malicious command could be hidden in devtools output Mozilla: URL being dragged from cross-origin iframe into same tab triggers navigation Mozilla: Content Security Policy wasn't being correctly applied to WebSockets in WebWorkers Mozilla: Calls to <code>console.log</code> allowed bypasing Content Security Policy via format directive Mozilla: Memory safety bugs fixed in Firefox 109 and Firefox ESR 102.7 | [
"cpe:/a:redhat:rhel_eus:8.6::appstream"
] | null | 8.8 | null | null |
RHSA-2023:5143 | Red Hat Security Advisory: .NET 6.0 security update | dotnet: Denial of Service with Client Certificates using .NET Kestrel | [
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::crb"
] | null | 6.5 | null | null |
RHSA-2023:0395 | Red Hat Security Advisory: kernel security and bug fix update | kernel: tcp: fix page frag corruption on page fault kernel: memory corruption in AX88179_178A based USB ethernet device. | [
"cpe:/o:redhat:rhel_aus:8.2::baseos",
"cpe:/o:redhat:rhel_e4s:8.2::baseos",
"cpe:/o:redhat:rhel_tus:8.2::baseos"
] | null | 7.8 | null | null |
RHSA-2022:0303 | Red Hat Security Advisory: httpd24-httpd security update | httpd: mod_lua: Possible buffer overflow when parsing multipart content | [
"cpe:/a:redhat:rhel_software_collections:3::el7"
] | null | 9.8 | null | null |
RHSA-2021:3436 | Red Hat Security Advisory: kpatch-patch security update | kernel: powerpc: KVM guest OS users can cause host OS memory corruption | [
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 7.8 | null | null |
RHSA-2017:2547 | Red Hat Security Advisory: Red Hat JBoss BRMS 6.4.5 security update | jasypt: Vulnerable to timing attack against the password hash comparison batik: XML external entity processing vulnerability jackson-databind: Deserialization vulnerability via readValue method of ObjectMapper | [
"cpe:/a:redhat:jboss_enterprise_brms_platform:6.4"
] | null | null | 8.1 | null |
RHSA-2024:4329 | Red Hat Security Advisory: OpenShift Container Platform 4.14.32 bug fix and security update | ssh: Prefix truncation attack on Binary Packet Protocol (BPP) openshift/telemeter: iss check during JWT authentication can be bypassed | [
"cpe:/a:redhat:openshift:4.14::el8",
"cpe:/a:redhat:openshift:4.14::el9"
] | null | 7.5 | null | null |
RHSA-2020:0227 | Red Hat Security Advisory: sqlite security update | sqlite: fts3: improve shadow table corruption detection | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 8.8 | null | null |
RHSA-2022:0305 | Red Hat Security Advisory: java-1.8.0-openjdk security update | OpenJDK: Incomplete deserialization class filtering in ObjectInputStream (Serialization, 8264934) OpenJDK: Insufficient URI checks in the XSLT TransformerImpl (JAXP, 8270492) OpenJDK: Unexpected exception thrown in regex Pattern (Libraries, 8268813) OpenJDK: Incomplete checks of StringBuffer and StringBuilder during deserialization (Libraries, 8270392) OpenJDK: Incorrect IdentityHashMap size checks during deserialization (Libraries, 8270416) OpenJDK: Incorrect access checks in XMLEntityManager (JAXP, 8270498) OpenJDK: Infinite loop related to incorrect handling of newlines in XMLEntityScanner (JAXP, 8270646) OpenJDK: Array indexing issues in LIRGenerator (Hotspot, 8272014) OpenJDK: Excessive resource use when reading JAR manifest attributes (Libraries, 8272026) OpenJDK: Insufficient checks when deserializing exceptions in ObjectInputStream (Serialization, 8272236) OpenJDK: Excessive memory allocation in BMPImageReader (ImageIO, 8273756) OpenJDK: Integer overflow in BMPImageReader (ImageIO, 8273838) | [
"cpe:/a:redhat:rhel_eus:8.2::appstream"
] | null | 5.3 | null | null |
RHSA-2018:0469 | Red Hat Security Advisory: dhcp security update | dhcp: Buffer overflow in dhclient possibly allowing code execution triggered by malicious server dhcp: Reference count overflow in dhcpd allows denial of service | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | 5.9 | null |
RHSA-2024:1147 | Red Hat Security Advisory: rear security update | rear: creates a world-readable initrd | [
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 5.5 | null | null |
RHSA-2011:0842 | Red Hat Security Advisory: systemtap security update | systemtap: does not guard against DWARF operations div-by-zero errors, which can cause a kernel panic systemtap: divide by zero stack unwinding flaw | [
"cpe:/o:redhat:enterprise_linux:6::server"
] | null | null | null | null |
RHSA-2020:2448 | Red Hat Security Advisory: OpenShift Container Platform 4.4.8 openshift security update | kubernetes: Server side request forgery (SSRF) in kube-controller-manager allows users to leak secret information | [
"cpe:/a:redhat:openshift:4.4::el7",
"cpe:/a:redhat:openshift:4.4::el8"
] | null | 6.3 | null | null |
RHSA-2022:0730 | Red Hat Security Advisory: cyrus-sasl security update | cyrus-sasl: failure to properly escape SQL input allows an attacker to execute arbitrary SQL commands | [
"cpe:/a:redhat:rhel_e4s:8.1::appstream",
"cpe:/o:redhat:rhel_e4s:8.1::baseos"
] | null | 8.8 | null | null |
RHSA-2023:1841 | Red Hat Security Advisory: kernel security and bug fix update | kernel: net/ulp: use-after-free in listening ULP sockets | [
"cpe:/a:redhat:rhel_eus:8.6::crb",
"cpe:/o:redhat:rhel_eus:8.6::baseos",
"cpe:/o:redhat:rhev_hypervisor:4.4::el8"
] | null | 7.8 | null | null |
RHSA-2018:0007 | Red Hat Security Advisory: kernel security update | An update for kernel is now available for Red Hat Enterprise Linux 7.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | null | null |
RHSA-2025:2654 | Red Hat Security Advisory: libxml2 security update | libxml2: Use-After-Free in libxml2 libxml2: Stack-based buffer overflow in xmlSnprintfElements of libxml2 | [
"cpe:/a:redhat:rhel_aus:8.2::appstream",
"cpe:/o:redhat:rhel_aus:8.2::baseos"
] | null | 7.8 | null | null |
RHSA-2020:3019 | Red Hat Security Advisory: kernel security, bug fix, and enhancement update | kernel: denial of service in arch/powerpc/kernel/signal_32.c and arch/powerpc/kernel/signal_64.c via sigreturn() system call Kernel: vfio: access to disabled MMIO space of some devices may lead to DoS scenario | [
"cpe:/o:redhat:rhel_eus:7.7::computenode",
"cpe:/o:redhat:rhel_eus:7.7::server"
] | null | 5.3 | null | null |
RHSA-2011:0175 | Red Hat Security Advisory: JBoss Web Framework Kit 1.0.0 removal | 3.0.3): Arbitrary Java code execution via an HTTP request containing a specially-crafted .jar file | [
"cpe:/a:redhat:jboss_web_framework_kit:1::el4",
"cpe:/a:redhat:jboss_web_framework_kit:1::el5"
] | null | null | null | null |
RHSA-2022:0983 | Red Hat Security Advisory: Red Hat OpenStack Platform 16.1 (openstack-nova) security update | openstack-nova: novnc allows open redirection | [
"cpe:/a:redhat:openstack:16.1::el8"
] | null | 5.7 | null | null |
RHSA-2007:0672 | Red Hat Security Advisory: kernel security update | security flaw minix_bmap denial of service Kernel: CAPI overflow Bluetooth setsockopt() information leaks IPv6 oops triggerable by any user | [
"cpe:/o:redhat:enterprise_linux:2.1::as",
"cpe:/o:redhat:enterprise_linux:2.1::es",
"cpe:/o:redhat:enterprise_linux:2.1::ws"
] | null | null | null | null |
RHSA-2013:1205 | Red Hat Security Advisory: Red Hat Storage 2.0 security, bug fix, and enhancement update #6 | 2.0: appliance-base / redhat-storage-server /tmp file creation vuln | [
"cpe:/a:redhat:storage:2.0:server:el6"
] | null | null | null | null |
RHSA-2024:1203 | Red Hat Security Advisory: Red Hat OpenShift for Windows Containers 9.0.1 security update | kubernetes: Insufficient input sanitization in in-tree storage plugin leads to privilege escalation on Windows nodes | [
"cpe:/a:redhat:openshift:4.14::el9"
] | null | 8.8 | null | null |
RHSA-2019:3775 | Red Hat Security Advisory: chromium-browser security update | chromium-browser: use-after-free in audio chromium-browser: use-after-free in PDFium | [
"cpe:/a:redhat:rhel_extras:6"
] | null | null | 7.5 | null |
RHSA-2018:2846 | Red Hat Security Advisory: kernel security and bug fix update | kernel: IP fragments with random offsets allow a remote denial of service (FragmentSmack) kernel: Integer overflow in Linux's create_elf_tables function | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | 7.8 | null |
RHSA-2004:597 | Red Hat Security Advisory: mysql security update | security flaw security flaw security flaw security flaw security flaw security flaw security flaw | [
"cpe:/o:redhat:enterprise_linux:2.1::as",
"cpe:/o:redhat:enterprise_linux:2.1::aw",
"cpe:/o:redhat:enterprise_linux:2.1::es",
"cpe:/o:redhat:enterprise_linux:2.1::ws"
] | null | null | null | null |
RHSA-2021:2353 | Red Hat Security Advisory: .NET 5.0 security and bugfix update | dotnet: ASP.NET Core Client Disconnect Denial of Service | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 5.9 | null | null |
RHSA-2023:7543 | Red Hat Security Advisory: c-ares security update | c-ares: buffer overflow in config_sortlist() due to missing string length check c-ares: Buffer Underwrite in ares_inet_net_pton() | [
"cpe:/o:redhat:rhel_eus:8.8::baseos"
] | null | 5.7 | null | null |
RHSA-2019:3906 | Red Hat Security Advisory: OpenShift Container Platform 3.11 HTTP/2 security update | HTTP/2: flood using PING frames results in unbounded memory growth HTTP/2: flood using HEADERS frames results in unbounded memory growth | [
"cpe:/a:redhat:openshift:3.11::el7"
] | null | null | 7.5 | null |
RHSA-2020:1672 | Red Hat Security Advisory: freeradius:3.0 security update | freeradius: eap-pwd: Information leak due to aborting when needing more than 10 iterations | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | null | 5.3 | null |
RHBA-2017:1767 | Red Hat Bug Fix Advisory: bind bug fix update | bind: Too long query name causes segmentation fault in lwresd | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 5.9 | null |
RHSA-2018:1650 | Red Hat Security Advisory: java-1.8.0-openjdk security update | hw: cpu: speculative store bypass | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | 5.6 | null |
RHSA-2024:0230 | Red Hat Security Advisory: OpenJDK 8u402 security update | OpenJDK: array out-of-bounds access due to missing range check in C1 compiler (8314468) OpenJDK: JVM class file verifier flaw allows unverified bytecode execution (8314295) OpenJDK: range check loop optimization issue (8314307) OpenJDK: arbitrary Java code execution in Nashorn (8314284) OpenJDK: logging of digital signature private keys (8316976) OpenJDK: RSA padding issue and timing side-channel attack against TLS (8317547) | [
"cpe:/a:redhat:openjdk:1.8::windows"
] | null | 7.4 | null | null |
RHSA-2020:2799 | Red Hat Security Advisory: Red Hat OpenShift Service Mesh servicemesh-cni security update | kubernetes: YAML parsing vulnerable to "Billion Laughs" attack, allowing for remote denial of service | [
"cpe:/a:redhat:service_mesh:1.1::el8"
] | null | null | 7.5 | null |
RHSA-2010:0890 | Red Hat Security Advisory: pidgin security update | (libpurple): Multiple DoS (crash) flaws by processing of unsanitized Base64 decoder values | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2024:4546 | Red Hat Security Advisory: git-lfs security update | golang: net/http, x/net/http2: unlimited number of CONTINUATION frames causes DoS | [
"cpe:/a:redhat:rhel_aus:8.6::appstream",
"cpe:/a:redhat:rhel_e4s:8.6::appstream",
"cpe:/a:redhat:rhel_tus:8.6::appstream"
] | null | 7.5 | null | null |
RHSA-2005:505 | Red Hat Security Advisory: tcpdump security update | security flaw | [
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2021:1039 | Red Hat Security Advisory: mariadb security update | mariadb: writable system variables allows a database user with SUPER privilege to execute arbitrary code as the system mysql user | [
"cpe:/a:redhat:openstack:13::el7"
] | null | 7.2 | null | null |
RHSA-2022:5948 | Red Hat Security Advisory: galera, mariadb, and mysql-selinux security, bug fix, and enhancement update | mariadb: Crash executing query with VIEW, aggregate and subquery mariadb: MariaDB allows an application crash in find_field_in_tables and find_order_in_list via an unused common table expression (CTE) mariadb: MariaDB through 10.5.13 allows a ha_maria::extra application crash via certain SELECT statements mariadb: MariaDB through 10.5.9 allows an application crash in sub_select_postjoin_aggr for a NULL value of aggr mariadb: MariaDB through 10.5.9 allows a sql_parse.cc application crash because of incorrect used_tables expectations mariadb: MariaDB through 10.5.9 allows an application crash via certain long SELECT DISTINCT statements mariadb: MariaDB through 10.5.9 allows attackers to trigger a convert_const_to_int use-after-free when the BIGINT data type is used mysql: C API unspecified vulnerability (CPU Oct 2022) mariadb: lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer mariadb: lack of validating the existence of an object prior to performing operations on the object mariadb: lack of proper validation of a user-supplied string before using it as a format specifier mariadb: CONNECT storage engine heap-based buffer overflow mariadb: assertion failure in Item_args::walk_arg mariadb: use-after-poison when complex conversion is involved in blob mariadb: server crash in create_tmp_table::finalize mariadb: server crash in component arg_comparator::compare_real_fixed mariadb: server crash at my_decimal::operator= mariadb: server crash at Field::set_default via specially crafted SQL statements mariadb: assertion failure via component Item_field::used_tables/update_depend_map_for_order mariadb: use-after-poison in my_strcasecmp_8bit() of ctype-simple.c mariadb: crash via component Item_subselect::init_expr_cache_tracker mariadb: server crashes in query_arena::set_query_arena upon SELECT from view mariadb: assertion failures in decimal_bin_size mariadb: crash when using HAVING with NOT EXIST predicate in an equality mariadb: assertion failure in compare_order_elements mariadb: crash when using HAVING with IS NULL predicate in an equality mariadb: use-after-poison in Binary_string::free_buffer mariadb: crash in multi-update and implicit grouping mariadb: assertion failure in sql/item_func.cc mariadb: crash via window function in expression in ORDER BY mariadb: assertion failure in sql/item_cmpfunc.cc mariadb: use-after-free when WHERE has subquery with an outer reference in HAVING mariadb: assertion failure in VDec::VDec at /sql/sql_type.cc mariadb: incorrect key in "dup value" error after long unique mariadb: use-after-poison in Binary_string::free_buffer mariadb: improper locking due to the unreleased lock in extra/mariabackup/ds_compress.cc mariadb: improper locking due to the unreleased lock in extra/mariabackup/ds_compress.cc | [
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::crb"
] | null | 5.5 | null | null |
RHSA-2003:051 | Red Hat Security Advisory: : Updated kerberos packages fix various vulnerabilities | security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw | [
"cpe:/o:redhat:linux:6.2",
"cpe:/o:redhat:linux:7.0",
"cpe:/o:redhat:linux:7.1",
"cpe:/o:redhat:linux:7.2",
"cpe:/o:redhat:linux:7.3",
"cpe:/o:redhat:linux:8.0"
] | null | null | null | null |
RHSA-2013:0769 | Red Hat Security Advisory: glibc security and bug fix update | glibc: Buffer overrun (DoS) in regexp matcher by processing multibyte characters glibc: Stack (frame) overflow in getaddrinfo() when processing entry mapping to long list of address structures | [
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2023:5454 | Red Hat Security Advisory: glibc security update | glibc: buffer overflow in ld.so leading to privilege escalation | [
"cpe:/a:redhat:rhel_eus:9.0::appstream",
"cpe:/a:redhat:rhel_eus:9.0::crb",
"cpe:/o:redhat:rhel_eus:9.0::baseos"
] | null | 7.8 | null | null |
RHSA-2024:1332 | Red Hat Security Advisory: kernel-rt security update | kernel: use-after-free in l2cap_connect and l2cap_le_connect_req in net/bluetooth/l2cap_core.c kernel: use-after-free in sch_qfq network scheduler kernel: fbcon: out-of-sync arrays in fbcon_mode_deleted due to wrong con2fb_map assignment kernel: IGB driver inadequate buffer size for frames larger than MTU kernel: nf_tables: use-after-free vulnerability in the nft_verdict_init() function kernel: sched/membarrier: reduce the ability to hammer on sys_membarrier | [
"cpe:/a:redhat:rhel_extras_rt:7"
] | null | 4.7 | null | null |
RHSA-2025:3344 | Red Hat Security Advisory: grafana security update | golang-jwt/jwt: jwt-go allows excessive memory allocation during header parsing | [
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 7.5 | null | null |
RHSA-2024:3428 | Red Hat Security Advisory: rust-toolset:rhel8 security update | rust-cargo: cargo does not respect the umask when extracting dependencies | [
"cpe:/a:redhat:rhel_eus:8.6::appstream"
] | null | 6.7 | null | null |
RHSA-2019:2950 | Red Hat Security Advisory: Red Hat JBoss Core Services Apache HTTP Server 2.4.29 SP3 security update | HTTP/2: 0-length headers lead to denial of service HTTP/2: request for large response leads to denial of service | [
"cpe:/a:redhat:jboss_core_services:1"
] | null | null | 7.5 | null |
RHSA-2015:2077 | Red Hat Security Advisory: rh-postgresql94-postgresql security update | postgresql: limited memory disclosure flaw in crypt() postgresql: stack overflow DoS when parsing json or jsonb inputs | [
"cpe:/a:redhat:rhel_software_collections:2::el6",
"cpe:/a:redhat:rhel_software_collections:2::el7"
] | null | null | null | null |
RHSA-2019:0747 | Red Hat Security Advisory: Red Hat Ceph Storage 2.5 security and bug fix update | grafana: File exfiltration | [
"cpe:/a:redhat:ceph_storage:2::el7"
] | null | null | 6.5 | null |
RHSA-2016:0448 | Red Hat Security Advisory: samba security update | samba: Incorrect ACL get/set allowed on symlink path | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation",
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | null | null |
RHSA-2021:2743 | Red Hat Security Advisory: firefox security update | Mozilla: Use-after-free in accessibility features of a document Mozilla: Memory safety bugs fixed in Firefox 90 and Firefox ESR 78.12 chromium-browser: Out of bounds write in ANGLE | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 8.8 | null | null |
RHSA-2024:2736 | Red Hat Security Advisory: openstack-tripleo-heat-templates and tripleo-ansible update | tripleo-ansible: bind keys are world readable | [
"cpe:/a:redhat:openstack:17.1::el9"
] | null | 6.6 | null | null |
RHSA-2023:1471 | Red Hat Security Advisory: kpatch-patch security update | kernel: tun: avoid double free in tun_free_netdev ALSA: pcm: Move rwsem lock inside snd_ctl_elem_read to prevent UAF | [
"cpe:/o:redhat:enterprise_linux:9::baseos"
] | null | 7.8 | null | null |
RHSA-2019:4341 | Red Hat Security Advisory: Red Hat Quay v3.2.0 security and bug fix update | quay: Red Hat Quay stores robot account tokens in plain text | [
"cpe:/a:redhat:quay:3::el7"
] | null | null | 6 | null |
RHSA-2018:1722 | Red Hat Security Advisory: java-1.8.0-ibm security update | JDK: unspecified vulnerability fixed in 6u191, 7u171, and 8u161 (Security) OpenJDK: incorrect merging of sections in the JAR manifest (Security, 8189969) OpenJDK: unrestricted deserialization of data from JCEKS key stores (Security, 8189997) OpenJDK: insufficient consistency checks in deserialization of multiple classes (Security, 8189977) OpenJDK: unbounded memory allocation during deserialization in PriorityBlockingQueue (Concurrency, 8189981) OpenJDK: unbounded memory allocation during deserialization in TabularDataSupport (JMX, 8189985) OpenJDK: unbounded memory allocation during deserialization in Container (AWT, 8189989) OpenJDK: unbounded memory allocation during deserialization in NamedNodeMapImpl (JAXP, 8189993) OpenJDK: RMI HTTP transport enabled by default (RMI, 8193833) | [
"cpe:/a:redhat:rhel_extras:6"
] | null | null | 4.2 | null |
RHSA-2013:0698 | Red Hat Security Advisory: rubygem-actionpack and ruby193-rubygem-actionpack security update | rubygem-actionpack: css_sanitization: XSS vulnerability in sanitize_css rubygem-actionpack: sanitize_protocol: XSS Vulnerability in the helper of Ruby on Rails | [
"cpe:/a:redhat:openshift:1::el6"
] | null | null | null | null |
RHSA-2022:0531 | Red Hat Security Advisory: kernel security update | kernel: use after free in eventpoll.c may lead to escalation of privilege kernel: xfs: raw block device data leak in XFS_IOC_ALLOCSP IOCTL | [
"cpe:/o:redhat:rhel_aus:7.6::server",
"cpe:/o:redhat:rhel_e4s:7.6::server",
"cpe:/o:redhat:rhel_tus:7.6::server"
] | null | 5.5 | null | null |
RHSA-2022:2202 | Red Hat Security Advisory: .NET Core 3.1 security, bug fix, and enhancement update | dotnet: excess memory allocation via HttpClient causes DoS dotnet: malicious content causes high CPU and memory usage dotnet: parsing HTML causes Denial of Service | [
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb"
] | null | 7.5 | null | null |
RHSA-2013:1814 | Red Hat Security Advisory: php security update | PHP: sapi_header_op() %0D sequence handling security bypass php: Integer Signedness issues in _php_stream_scandir php: Ability to read arbitrary files due use of external entities while parsing SOAP WSDL files php: memory corruption in openssl_x509_parse() | [
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2011:0356 | Red Hat Security Advisory: krb5 security update | (krb5kdc): Double-free flaw by handling error messages upon receiving certain AS_REQ's (MITKRB5-SA-2011-003) | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2014:0821 | Red Hat Security Advisory: Red Hat Storage 2.0 - Retirement Notice | This is the end of life notification for the retirement of Red Hat Storage
2.0. | [] | null | null | null | null |
RHSA-2025:1241 | Red Hat Security Advisory: OpenShift Container Platform 4.12.73 security and extras update | jinja2: Jinja has a sandbox breakout through indirect reference to format method | [
"cpe:/a:redhat:openshift:4.12::el8"
] | null | 6.3 | null | null |
RHSA-2024:3259 | Red Hat Security Advisory: go-toolset:rhel8 security update | golang: net/http, x/net/http2: unlimited number of CONTINUATION frames causes DoS golang: net/http/cookiejar: incorrect forwarding of sensitive headers and cookies on HTTP redirect golang: net/http: golang: mime/multipart: golang: net/textproto: memory exhaustion in Request.ParseMultipartForm golang: crypto/x509: Verify panics on certificates with an unknown public key algorithm golang: net/mail: comments in display names are incorrectly handled golang: html/template: errors returned from MarshalJSON methods may break template escaping | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 6.5 | null | null |
RHSA-2013:0983 | Red Hat Security Advisory: curl security update | curl: Loop counter error, leading to heap-based buffer overflow when decoding certain URLs | [
"cpe:/o:redhat:enterprise_linux:5::server",
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2013:1784 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 6.2.0 update | HawtJNI: predictable temporary file name leading to local arbitrary code execution WS: EJB3 role restrictions are not applied to jaxws handlers | [
"cpe:/a:redhat:jboss_enterprise_application_platform:6.2.0"
] | null | null | null | null |
RHSA-2022:9066 | Red Hat Security Advisory: firefox security update | Mozilla: Arbitrary file read from a compromised content process Mozilla: Drag and Dropped Filenames could have been truncated to malicious extensions Mozilla: Memory safety bugs fixed in Firefox ESR 102.6 and Thunderbird 102.6 Mozilla: Use-after-free in WebGL Mozilla: Memory corruption in WebGL Mozilla: Use-after-free in WebGL | [
"cpe:/a:redhat:rhel_eus:9.0::appstream"
] | null | 8.1 | null | null |
RHSA-2021:3466 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.3.9 security update on RHEL 6 | undertow: HTTP2SourceChannel fails to write final frame under some circumstances may lead to DoS wildfly-core: Invalid Sensitivity Classification of Vault Expression undertow: buffer leak on incoming websocket PONG message may lead to DoS jakarta-el: ELParserTokenManager enables invalid EL expressions to be evaluate apache-commons-io: Limited path traversal in Apache Commons IO 2.2 to 2.6 | [
"cpe:/a:redhat:jboss_enterprise_application_platform:7.3::el6"
] | null | 4.8 | null | null |
RHSA-2021:4413 | Red Hat Security Advisory: tpm2-tools security and enhancement update | tpm2-tools: fixed AES wrapping key in tpm2_import | [
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 4.4 | null | null |
RHSA-2009:1177 | Red Hat Security Advisory: python security update | python: imageop module integer overflows python: integer signedness error in the zlib extension module python: PyString_FromStringAndSize does not check for negative size values python: Multiple integer overflows in python core python: Multiple buffer overflows in unicode processing python: Multiple integer overflows discovered by Google python: Potential integer underflow and overflow in the PyOS_vsnprintf C API function python: imageop module multiple integer overflows python: stringobject, unicodeobject integer overflows | [
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2020:0564 | Red Hat Security Advisory: systemd security update | systemd: use-after-free when asynchronous polkit queries are performed | [
"cpe:/o:redhat:rhel_e4s:8.0::baseos"
] | null | 7.8 | null | null |
RHSA-2024:6914 | Red Hat Security Advisory: golang security update | net/http: Denial of service due to improper 100-continue handling in net/http encoding/gob: golang: Calling Decoder.Decode on a message which contains deeply nested structures can cause a panic due to stack exhaustion | [
"cpe:/a:redhat:rhel_eus:9.2::appstream"
] | null | 7.5 | null | null |
RHSA-2012:0720 | Red Hat Security Advisory: kernel security and bug fix update | kernel: x86-64: avoid sysret to non-canonical address kernel: ipv6: panic using raw sockets | [
"cpe:/o:redhat:rhel_eus:5.6"
] | null | null | null | null |
RHSA-2024:6337 | Red Hat Security Advisory: Satellite 6.13.7.2 Security Update | puppet-foreman: An authentication bypass vulnerability exists in Foreman puppet-pulpcore: An authentication bypass vulnerability exists in pulpcore | [
"cpe:/a:redhat:satellite:6.13::el8",
"cpe:/a:redhat:satellite_capsule:6.13::el8",
"cpe:/a:redhat:satellite_utils:6.13::el8"
] | null | 9.8 | 9.8 | null |
RHSA-2017:1450 | Red Hat Security Advisory: openstack-heat security and bug fix update | openstack-heat: Template source URL allows network port scan | [
"cpe:/a:redhat:openstack:7::el7"
] | null | null | 3.5 | null |
RHSA-2013:0146 | Red Hat Security Advisory: jbossweb security update | Web: Bypass of security constraints | [
"cpe:/a:redhat:jboss_enterprise_application_platform:4.3.0:update10"
] | null | null | null | null |
RHSA-2023:1907 | Red Hat Security Advisory: java-1.8.0-openjdk security update | OpenJDK: improper connection handling during TLS handshake (8294474) OpenJDK: missing string checks for NULL characters (8296622) OpenJDK: incorrect handling of NULL characters in ProcessBuilder (8295304) OpenJDK: Swing HTML parsing issue (8296832) OpenJDK: incorrect enqueue of references in garbage collector (8298191) OpenJDK: certificate validation issue in TLS session negotiation (8298310) OpenJDK: missing check for slash characters in URI-to-path conversion (8298667) | [
"cpe:/a:redhat:rhel_eus:8.4::appstream",
"cpe:/a:redhat:rhel_eus:8.4::crb"
] | null | 3.7 | null | null |
RHSA-2021:0794 | Red Hat Security Advisory: .NET 5.0 on Red Hat Enterprise Linux security and bugfix update | dotnet: System.Text.Encodings.Web Remote Code Execution | [
"cpe:/a:redhat:rhel_dotnet:5.0::el7"
] | null | 8.1 | null | null |
RHSA-2018:0163 | Red Hat Security Advisory: 389-ds-base security and bug fix update | 389-ds-base: Remote DoS via search filters in slapi_filter_sprintf in slapd/util.c | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 7.5 | null |
RHSA-2024:6529 | Red Hat Security Advisory: dovecot security update | dovecot: using a large number of address headers may trigger a denial of service dovecot: very large headers can cause resource exhaustion when parsing message | [
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::crb"
] | null | 6.8 | null | null |
RHSA-2004:020 | Red Hat Security Advisory: : Updated mailman packages close cross-site scripting vulnerabilities | security flaw security flaw | [
"cpe:/o:redhat:linux:9"
] | null | null | null | null |
RHSA-2020:3714 | Red Hat Security Advisory: httpd:2.4 security update | httpd: Push diary crash on specifically crafted HTTP/2 header | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 7.5 | null | null |
RHBA-2021:2854 | Red Hat Bug Fix Advisory: Migration Toolkit for Containers (MTC) 1.4.6 release advisory | libwebp: heap-based buffer overflow in PutLE16() nss: TLS 1.3 CCS flood remote DoS Attack openldap: NULL pointer dereference for unauthenticated packet in slapd kernel: security bypass in certs/blacklist.c and certs/system_keyring.c jetty: local temporary directory hijacking vulnerability jetty: buffer not correctly recycled in Gzip Request inflation jetty: request containing multiple Accept headers with a large number of "quality" parameters may lead to DoS libwebp: heap-based buffer overflow in WebPDecode*Into functions libwebp: use-after-free in EmitFancyRGB() in dec/io_dec.c libxml2: Use-after-free in xmlEncodeEntitiesInternal() in entities.c libxml2: Heap-based buffer overflow in xmlEncodeEntitiesInternal() in entities.c libxml2: Use-after-free in xmlXIncludeDoProcess() in xinclude.c lz4: memory corruption due to an integer overflow bug caused by memmove argument libxml2: NULL pointer dereference when post-validating mixed content parsed in recovery mode libxml2: Exponential entity expansion attack bypasses all existing protection mechanisms rpm: Signature checks bypass via corrupted rpm package jenkins-2-plugins/config-file-provider: Does not configure its XML parser to prevent XML external entity (XXE) attacks. jenkins-2-plugins/config-file-provider: Does not correctly perform permission checks in several HTTP endpoints. jenkins-2-plugins/config-file-provider: does not require POST requests for an HTTP endpoint, resulting in a cross-site request forgery (CSRF) vulnerability. jenkins-2-plugins/config-file-provider: Does not perform permission checks in several HTTP endpoints. glib: integer overflow in g_bytes_new function on 64-bit platforms due to an implicit cast from 64 bits to 32 bits golang: net/http: panic in ReadRequest and ReadResponse when reading a very large header kernel: use-after-free in net/bluetooth/hci_event.c when destroying an hci_chan | [
"cpe:/a:redhat:rhmt:1.4::el7",
"cpe:/a:redhat:rhmt:1.4::el8"
] | null | 7.8 | null | null |
RHSA-2007:0889 | Red Hat Security Advisory: php security update | php CRLF injection gd / php-gd ImageCreateFromPng infinite loop caused by truncated PNG php chunk_split integer overflow php cross-site cookie insertion php multiple integer overflows in gd php floating point exception inside wordwrap php money_format format string issue php malformed cookie handling | [
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws"
] | null | null | null | null |
RHSA-2017:1233 | Red Hat Security Advisory: kernel security update | kernel: Race condition access to n_hdlc.tbuf causes double free in n_hdlc_release() | [
"cpe:/o:redhat:rhel_eus:6.7::computenode",
"cpe:/o:redhat:rhel_eus:6.7::server"
] | null | null | 7.8 | null |
RHSA-2015:1120 | Red Hat Security Advisory: kernel security and bug fix update | kernel: pipe: iovec overrun leading to memory corruption | [
"cpe:/o:redhat:rhel_aus:5.9"
] | null | null | null | null |
RHSA-2007:0721 | Red Hat Security Advisory: qt security update | qt3 format string flaw | [
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws",
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws",
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2012:0306 | Red Hat Security Advisory: krb5 security and bug fix update | krb5-appl: ftpd incorrect group privilege dropping (MITKRB5-SA-2011-005) | [
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2024:2952 | Red Hat Security Advisory: resource-agents security and bug fix update | urllib3: Request body not stripped after redirect from 303 status changes request method to GET pycryptodome: side-channel leakage for OAEP decryption in PyCryptodome and pycryptodomex | [
"cpe:/a:redhat:enterprise_linux:8::highavailability",
"cpe:/a:redhat:enterprise_linux:8::resilientstorage"
] | null | 5.9 | null | null |
RHSA-2024:10815 | Red Hat Security Advisory: OpenShift Container Platform 4.13.54 packages and security update | waitress: python-waitress: request processing race condition in HTTP pipelining with invalid first request waitress: Waitress has a denial of service leading to high CPU usage/resource exhaustion | [
"cpe:/a:redhat:openshift:4.13::el8",
"cpe:/a:redhat:openshift:4.13::el9",
"cpe:/a:redhat:openshift_ironic:4.13::el9"
] | null | 7.5 | null | null |
RHSA-2021:3027 | Red Hat Security Advisory: microcode_ctl security, bug fix and enhancement update | hw: Special Register Buffer Data Sampling (SRBDS) hw: Vector Register Data Sampling hw: L1D Cache Eviction Sampling hw: Information disclosure issue in Intel SGX via RAPL interface hw: Vector Register Leakage-Active hw: Fast forward store predictor hw: vt-d related privilege escalation hw: improper isolation of shared resources in some Intel Processors hw: observable timing discrepancy in some Intel Processors | [
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 2.8 | 6.5 | null |
RHSA-2011:1268 | Red Hat Security Advisory: firefox security update | Updated firefox packages that fix one security issue are now available for
Red Hat Enterprise Linux 4, 5, and 6.
The Red Hat Security Response Team has rated this update as having
important security impact. | [
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws",
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server",
"cpe:/o:redhat:enterprise_linux:6::server"
] | null | null | null | null |
RHSA-2024:2145 | Red Hat Security Advisory: libX11 security update | libX11: out-of-bounds memory access in _XkbReadKeySyms() libX11: stack exhaustion from infinite recursion in PutSubImage() libX11: integer overflow in XCreateImage() leading to a heap overflow | [
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 7.8 | null | null |
RHSA-2022:8420 | Red Hat Security Advisory: mingw-zlib security update | zlib: A flaw found in zlib when compressing (not decompressing) certain inputs | [
"cpe:/a:redhat:enterprise_linux:9::crb"
] | null | 8.2 | null | null |
RHSA-2024:3259 | Red Hat Security Advisory: go-toolset:rhel8 security update | golang: net/http, x/net/http2: unlimited number of CONTINUATION frames causes DoS golang: net/http/cookiejar: incorrect forwarding of sensitive headers and cookies on HTTP redirect golang: net/http: golang: mime/multipart: golang: net/textproto: memory exhaustion in Request.ParseMultipartForm golang: crypto/x509: Verify panics on certificates with an unknown public key algorithm golang: net/mail: comments in display names are incorrectly handled golang: html/template: errors returned from MarshalJSON methods may break template escaping | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 6.5 | null | null |
RHSA-2008:1043 | Red Hat Security Advisory: java-1.4.2-bea security update | java-1.4.2-bea as shipped in Red Hat Enterprise Linux 3 Extras, Red Hat
Enterprise Linux 4 Extras, and Red Hat Enterprise Linux 5 Supplementary,
contains security flaws and should not be used.
This update has been rated as having important security impact by the Red
Hat Security Response Team. | [
"cpe:/a:redhat:rhel_extras:3",
"cpe:/a:redhat:rhel_extras:4",
"cpe:/a:redhat:rhel_extras:5::client",
"cpe:/a:redhat:rhel_extras:5::server"
] | null | null | null | null |
RHSA-2018:2713 | Red Hat Security Advisory: java-1.8.0-ibm security update | OpenSSL: Double-free in DSA code openssl: BN_mod_exp may produce incorrect results on x86_64 openssl: bn_sqrx8x_internal carry bug on x86_64 JDK: DoS in the java.math component JDK: path traversal flaw in the Diagnostic Tooling Framework JDK: unspecified vulnerability fixed in 6u201, 7u191, 8u181, and 10.0.2 (Libraries) OpenJDK: insufficient index validation in PatternSyntaxException getMessage() (Concurrency, 8199547) JDK: unspecified vulnerability fixed in 6u201, 7u191, 8u181, and 10.0.2 (JSSE) JDK: privilege escalation via insufficiently restricted access to Attach API | [
"cpe:/a:redhat:network_satellite:5.8::el6"
] | null | null | 8.4 | null |
RHSA-2025:0884 | Red Hat Security Advisory: rsync security update | rsync: Info Leak via Uninitialized Stack Contents | [
"cpe:/o:redhat:rhel_aus:8.2::baseos"
] | null | 7.5 | null | null |
RHSA-2014:1843 | Red Hat Security Advisory: kernel security and bug fix update | Kernel: USB serial: memory corruption flaw kernel: kvm: PIT timer race condition kernel: kvm: vmx: invept vm exit not handled kernel: kvm: vmx: invvpid vm exit not handled | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.