id
stringlengths 13
15
| title
stringlengths 29
176
| description
stringlengths 8
32.1k
| cpes
sequencelengths 0
20
| cvss_v4_0
null | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
null |
---|---|---|---|---|---|---|---|
RHSA-2022:7896 | Red Hat Security Advisory: Red Hat Integration Debezium 1.9.7 security update | protobuf-java: potential DoS in the parsing procedure for binary data protobuf-java: timeout in parser leads to DoS | [
"cpe:/a:redhat:integration:1"
] | null | 7.5 | null | null |
RHSA-2016:0070 | Red Hat Security Advisory: Red Hat OpenShift Enterprise 3.1.1 bug fix and enhancement update | commons-fileupload: Arbitrary file upload via deserialization stapler-adjunct-zeroclipboard: multiple cross-site scripting (XSS) flaws jenkins: denial of service (SECURITY-87) jenkins: username discovery (SECURITY-110) jenkins: job configuration issues (SECURITY-127, SECURITY-128) jenkins: directory traversal flaw (SECURITY-131) jenkins: remote code execution flaw (SECURITY-150) jenkins: plug-in code can be downloaded by anyone with read access (SECURITY-155) jenkins: password exposure in DOM (SECURITY-138) jenkins: cross-site scripting flaw in Jenkins core (SECURITY-143) jenkins: Combination filter Groovy script unsecured (SECURITY-125) jenkins: directory traversal from artifacts via symlink (SECURITY-162) jenkins: update center metadata retrieval DoS attack (SECURITY-163) jenkins: HudsonPrivateSecurityRealm allows creation of reserved names (SECURITY-166) jenkins: Reflective XSS vulnerability (SECURITY-171, SECURITY-177) jenkins: Reflective XSS vulnerability (SECURITY-171, SECURITY-177) jenkins: forced API token change (SECURITY-180) jenkins: Project name disclosure via fingerprints (SECURITY-153) jenkins: Public value used for CSRF protection salt (SECURITY-169) jenkins: XXE injection into job configurations via CLI (SECURITY-173) jenkins: Secret key not verified when connecting a slave (SECURITY-184) jenkins: Information disclosure via sidepanel (SECURITY-192) jenkins: Local file inclusion vulnerability (SECURITY-195) jenkins: API tokens of other users available to admins (SECURITY-200) jenkins: Queue API did show items not visible to the current user (SECURITY-186) jenkins: JNLP slaves not subject to slave-to-master access control (SECURITY-206) jenkins: Stored XSS vulnerability in slave offline status message (SECURITY-214) jenkins: CSRF vulnerability in some administrative actions (SECURITY-225) jenkins: CSRF protection ineffective (SECURITY-233) jenkins: Jenkins plugin manager vulnerable to MITM attacks (SECURITY-234) jenkins: Remote code execution vulnerability due to unsafe deserialization in Jenkins remoting (SECURITY-218) server: patch operation should use patched object to check admission control server: build config to a strategy that isn't allowed by policy | [
"cpe:/a:redhat:openshift:3.1::el7"
] | null | null | null | null |
RHSA-2022:0335 | Red Hat Security Advisory: kpatch-patch security update | kernel: xfs: raw block device data leak in XFS_IOC_ALLOCSP IOCTL | [
"cpe:/o:redhat:rhel_e4s:8.1::baseos"
] | null | 5.5 | null | null |
RHSA-2016:1657 | Red Hat Security Advisory: kernel security update | kernel: Uninitialized variable in request_key handling causes kernel crash in error handling path kernel: infiniband: Unprivileged process can overwrite kernel memory using rdma_ucm.ko kernel: challenge ACK counter information disclosure. | [
"cpe:/o:redhat:rhel_eus:7.1::computenode",
"cpe:/o:redhat:rhel_eus:7.1::server"
] | null | null | 4.8 | null |
RHSA-2021:0358 | Red Hat Security Advisory: net-snmp security update | net-snmp: Improper Privilege Management in EXTEND MIB may lead to privileged commands execution | [
"cpe:/o:redhat:rhel_eus:7.6::computenode",
"cpe:/o:redhat:rhel_eus:7.6::server"
] | null | 8.8 | null | null |
RHSA-2012:0973 | Red Hat Security Advisory: nss, nss-util, and nspr security, bug fix, and enhancement update | Updated nss, nss-util, and nspr packages that fix one security issue,
several bugs, and add various enhancements are now available for Red Hat
Enterprise Linux 6.
The Red Hat Security Response Team has rated this update as having moderate
security impact. | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2015:1840 | Red Hat Security Advisory: openldap security update | openldap: ber_get_next denial of service vulnerability | [
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server",
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation",
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | null | null |
RHSA-2014:1311 | Red Hat Security Advisory: bash security update | bash: code execution via specially-crafted environment (Incomplete fix for CVE-2014-6271) bash: parser can allow out-of-bounds memory access while handling redir_stack bash: off-by-one error in deeply nested flow control constructs | [
"cpe:/o:redhat:rhel_els:4::as",
"cpe:/o:redhat:rhel_els:4::es",
"cpe:/o:redhat:rhel_eus:5.9",
"cpe:/o:redhat:rhel_eus:6.4::computenode",
"cpe:/o:redhat:rhel_eus:6.4::server",
"cpe:/o:redhat:rhel_mission_critical:5.6",
"cpe:/o:redhat:rhel_mission_critical:6.2::server"
] | null | null | null | null |
RHBA-2019:2044 | Red Hat Bug Fix Advisory: gnome bug fix and enhancement update | LibRaw: DoS in parse_rollei function in internal/dcraw_common.cpp LibRaw: DoS in parse_sinar_ia function in internal/dcraw_common.cpp | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 3.3 | null |
RHSA-2013:1661 | Red Hat Security Advisory: RDMA stack security, bug fix, and enhancement update | librdmacm: Tried to connect to port 6125 if ibacm.port was not found ibutils: insecure handling of files in the /tmp directory | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2016:1025 | Red Hat Security Advisory: pcre security update | pcre: infinite recursion compiling pattern with recursive reference in a group with indefinite repeat (8.36/20) pcre: stack overflow caused by mishandled group empty match (8.38/11) pcre: buffer overflow for forward reference within backward assertion with excess closing parenthesis (8.38/18) pcre: buffer overflow caused by named forward reference to duplicate group number (8.38/30) pcre: Buffer overflow caused by lookbehind assertion (8.38/6) pcre: buffer overflow for forward reference within backward assertion with excess closing parenthesis (8.38/18) pcre: inefficient posix character class syntax check (8.38/16) pcre: workspace overflow for (*ACCEPT) with deeply nested parentheses (8.39/13, 10.22/12) | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | null | null |
RHSA-2023:0608 | Red Hat Security Advisory: thunderbird security update | Mozilla: Revocation status of S/Mime signature certificates was not checked | [
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 7.5 | null | null |
RHSA-2021:3154 | Red Hat Security Advisory: firefox security update | Mozilla: Uninitialized memory in a canvas object could have led to memory corruption Mozilla: Incorrect instruction reordering during JIT optimization Mozilla: Use-after-free media channels Mozilla: Race condition when resolving DNS names could have led to memory corruption Mozilla: Memory corruption as a result of incorrect style treatment Mozilla: Memory safety bugs fixed in Thunderbird 78.13 | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 8.8 | 7.5 | null |
RHSA-2015:2685 | Red Hat Security Advisory: openstack-ironic-discoverd security update | openstack-ironic-discoverd: potential remote code execution with debug mode enabled | [
"cpe:/a:redhat:openstack:6::el7"
] | null | null | null | null |
RHSA-2023:5964 | Red Hat Security Advisory: Red Hat OpenStack Platform 16.2.5 (collectd-libpod-stats) security update | golang: crypto/tls: large handshake records may cause panics golang: net/http, mime/multipart: denial of service from excessive resource consumption golang: net/http, net/textproto: denial of service from excessive memory allocation golang: net/http, net/textproto, mime/multipart: denial of service from excessive resource consumption golang: go/parser: Infinite loop in parsing golang: html/template: backticks not treated as string delimiters golang: crypto/tls: slow verification of certificate chains containing large RSA keys golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487) HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack) | [
"cpe:/a:redhat:openstack:16.2::el8"
] | null | 7.5 | null | null |
RHSA-2024:0130 | Red Hat Security Advisory: frr security update | ffr: Flowspec overflow in bgpd/bgp_flowspec.c ffr: Out of bounds read in bgpd/bgp_label.c frr: crash from specially crafted MP_UNREACH_NLRI-containing BGP UPDATE message frr: crash from malformed EOR-containing BGP UPDATE message | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 7.5 | null | null |
RHSA-2014:0221 | Red Hat Security Advisory: postgresql92-postgresql security update | postgresql: SET ROLE without ADMIN OPTION allows adding and removing group members postgresql: privilege escalation via procedural language validator functions postgresql: CREATE INDEX race condition possibly leading to privilege escalation postgresql: stack-based buffer overflow in datetime input/output postgresql: integer overflows leading to buffer overflows postgresql: possible buffer overflow flaws postgresql: NULL pointer dereference postgresql: multiple integer overflows in hstore_io.c | [
"cpe:/a:redhat:rhel_software_collections:1::el6"
] | null | null | null | null |
RHSA-2019:4114 | Red Hat Security Advisory: nss security update | nss: Out-of-bounds write when passing an output buffer smaller than the block size to NSC_EncryptUpdate | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | null | 8.1 | null |
RHSA-2013:0214 | Red Hat Security Advisory: nss and nspr security, bug fix, and enhancement update | Updated nss and nspr packages that fix one security issue, various bugs,
and add enhancements are now available for Red Hat Enterprise Linux 5.
The Red Hat Security Response Team has rated this update as having
important security impact. | [
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2022:5730 | Red Hat Security Advisory: OpenShift Container Platform 4.10.25 bug fix and security update | golang: math/big: uncontrolled memory consumption due to an unhandled overflow via Rat.SetString golang: encoding/pem: fix stack overflow in Decode golang: regexp: stack exhaustion via a deeply nested expression | [
"cpe:/a:redhat:openshift:4.10::el8"
] | null | 7.5 | null | null |
RHSA-2021:0671 | Red Hat Security Advisory: bind security update | bind: Buffer overflow in the SPNEGO implementation affecting GSSAPI security policy negotiation | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 8.1 | null | null |
RHSA-2020:2250 | Red Hat Security Advisory: dotnet3.1 security update | dotnet: Denial of service via untrusted input dotnet: Denial of service due to infinite loop | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 7.5 | null | null |
RHSA-2019:4087 | Red Hat Security Advisory: OpenShift Container Platform 4.1 openshift security update | libseccomp-golang: mishandling of multiple argument rules leading to a bypass of intended access restrictions kubernetes: Bearer tokens written to logs at high verbosity levels (>= 7) | [
"cpe:/a:redhat:openshift:4.1::el7",
"cpe:/a:redhat:openshift:4.1::el8"
] | null | null | 4.4 | null |
RHSA-2008:0862 | Red Hat Security Advisory: tomcat security update | Apache Tomcat's default security policy is too open Absolute path traversal Apache Tomcat WEBDAV tomcat: Cross-Site-Scripting enabled by sendError call Tomcat host manager xss - name field tomcat RequestDispatcher information disclosure vulnerability tomcat Unicode directory traversal vulnerability | [
"cpe:/a:redhat:rhel_application_server:2"
] | null | null | null | null |
RHSA-2022:8976 | Red Hat Security Advisory: 389-ds-base security update | 389-ds-base: sending crafted message could result in DoS 389-ds-base: expired password was still allowed to access the database 389-ds-base: SIGSEGV in sync_repl | [
"cpe:/a:redhat:rhel_eus:9.0::appstream"
] | null | 6.5 | null | null |
RHSA-2020:0466 | Red Hat Security Advisory: nss-softokn security update | nss: Out-of-bounds write when passing an output buffer smaller than the block size to NSC_EncryptUpdate | [
"cpe:/o:redhat:rhel_aus:6.6::server"
] | null | null | 8.1 | null |
RHSA-2021:3145 | Red Hat Security Advisory: .NET Core 2.1 security and bugfix update | dotnet: Dump file created world-readable | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 5.5 | null | null |
RHSA-2022:4584 | Red Hat Security Advisory: zlib security update | zlib: A flaw found in zlib when compressing (not decompressing) certain inputs | [
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::crb",
"cpe:/o:redhat:enterprise_linux:9::baseos"
] | null | 8.2 | null | null |
RHSA-2018:1656 | Red Hat Security Advisory: qemu-kvm security update | hw: cpu: speculative store bypass | [
"cpe:/o:redhat:rhel_aus:6.4::server"
] | null | null | 5.6 | null |
RHSA-2018:1119 | Red Hat Security Advisory: flash-plugin security update | flash-plugin: Remote Code Execution vulnerabilities (APSB18-08) flash-plugin: Information Disclosure vulnerabilities (APSB18-08) flash-plugin: Information Disclosure vulnerabilities (APSB18-08) flash-plugin: Remote Code Execution vulnerabilities (APSB18-08) flash-plugin: Information Disclosure vulnerabilities (APSB18-08) flash-plugin: Remote Code Execution vulnerabilities (APSB18-08) | [
"cpe:/a:redhat:rhel_extras:6"
] | null | null | 8.8 | null |
RHSA-2024:9102 | Red Hat Security Advisory: podman security update | podman: Symlink error leads to information disclosure containers/image: digest type does not guarantee valid type golang: archive/zip: Incorrect handling of certain ZIP files net/http: Denial of service due to improper 100-continue handling in net/http | [
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 5.9 | null | null |
RHSA-2017:2477 | Red Hat Security Advisory: Red Hat JBoss Data Virtualization 6.3 Update 7 security update | thrift: Infinite recursion via vectors involving the skip function zookeeper: Incorrect input validation with wchp/wchc four letter words jackson-databind: Deserialization vulnerability via readValue method of ObjectMapper | [
"cpe:/a:redhat:jboss_data_virtualization:6.3"
] | null | null | 8.1 | null |
RHSA-2003:315 | Red Hat Security Advisory: quagga security update | security flaw | [
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::es"
] | null | null | null | null |
RHSA-2007:1027 | Red Hat Security Advisory: tetex security update | t1lib font filename string overflow DCTStream:: readProgressiveDataUnit() DCTStream:: reset() CCITTFaxStream:: lookChar() | [
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws",
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2016:1423 | Red Hat Security Advisory: flash-plugin security update | flash-plugin: multiple code execution issues fixed in APSB16-25 flash-plugin: multiple code execution issues fixed in APSB16-25 flash-plugin: multiple code execution issues fixed in APSB16-25 flash-plugin: multiple code execution issues fixed in APSB16-25 flash-plugin: multiple code execution issues fixed in APSB16-25 flash-plugin: multiple code execution issues fixed in APSB16-25 flash-plugin: multiple code execution issues fixed in APSB16-25 flash-plugin: multiple code execution issues fixed in APSB16-25 flash-plugin: multiple code execution issues fixed in APSB16-25 flash-plugin: multiple code execution issues fixed in APSB16-25 flash-plugin: multiple code execution issues fixed in APSB16-25 flash-plugin: multiple code execution issues fixed in APSB16-25 flash-plugin: multiple code execution issues fixed in APSB16-25 flash-plugin: multiple code execution issues fixed in APSB16-25 flash-plugin: multiple code execution issues fixed in APSB16-25 flash-plugin: multiple code execution issues fixed in APSB16-25 flash-plugin: multiple code execution issues fixed in APSB16-25 flash-plugin: multiple code execution issues fixed in APSB16-25 flash-plugin: multiple code execution issues fixed in APSB16-25 flash-plugin: multiple code execution issues fixed in APSB16-25 flash-plugin: multiple code execution issues fixed in APSB16-25 flash-plugin: multiple code execution issues fixed in APSB16-25 flash-plugin: multiple code execution issues fixed in APSB16-25 flash-plugin: multiple code execution issues fixed in APSB16-25 flash-plugin: multiple code execution issues fixed in APSB16-25 flash-plugin: multiple code execution issues fixed in APSB16-25 flash-plugin: multiple code execution issues fixed in APSB16-25 flash-plugin: multiple code execution issues fixed in APSB16-25 flash-plugin: multiple code execution issues fixed in APSB16-25 flash-plugin: multiple code execution issues fixed in APSB16-25 flash-plugin: multiple code execution issues fixed in APSB16-25 flash-plugin: multiple code execution issues fixed in APSB16-25 flash-plugin: multiple code execution issues fixed in APSB16-25 flash-plugin: multiple code execution issues fixed in APSB16-25 flash-plugin: multiple code execution issues fixed in APSB16-25 flash-plugin: multiple code execution issues fixed in APSB16-25 flash-plugin: multiple code execution issues fixed in APSB16-25 flash-plugin: multiple code execution issues fixed in APSB16-25 flash-plugin: multiple code execution issues fixed in APSB16-25 flash-plugin: multiple code execution issues fixed in APSB16-25 flash-plugin: multiple code execution issues fixed in APSB16-25 flash-plugin: multiple code execution issues fixed in APSB16-25 flash-plugin: multiple code execution issues fixed in APSB16-25 flash-plugin: multiple code execution issues fixed in APSB16-25 flash-plugin: multiple code execution issues fixed in APSB16-25 flash-plugin: multiple code execution issues fixed in APSB16-25 flash-plugin: multiple code execution issues fixed in APSB16-25 flash-plugin: multiple code execution issues fixed in APSB16-25 flash-plugin: multiple code execution issues fixed in APSB16-25 flash-plugin: multiple code execution issues fixed in APSB16-25 flash-plugin: multiple code execution issues fixed in APSB16-25 flash-plugin: multiple code execution issues fixed in APSB16-25 flash-plugin: multiple code execution issues fixed in APSB16-25 | [
"cpe:/a:redhat:rhel_extras:5::client",
"cpe:/a:redhat:rhel_extras:5::server",
"cpe:/a:redhat:rhel_extras:6"
] | null | null | 8.8 | null |
RHSA-2013:0603 | Red Hat Security Advisory: java-1.7.0-openjdk security update | OpenJDK: Specially crafted sample model integer overflow (2D, 8007014) OpenJDK: CMM malformed raster memory corruption (2D, 8007675) | [
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2020:4235 | Red Hat Security Advisory: chromium-browser security update | chromium-browser: Inappropriate implementation in networking chromium-browser: Use after free in payments chromium-browser: Use after free in Blink chromium-browser: Use after free in WebRTC chromium-browser: Use after free in NFC chromium-browser: Use after free in printing chromium-browser: Use after free in audio chromium-browser: Insufficient policy enforcement in extensions chromium-browser: Integer overflow in Blink chromium-browser: Integer overflow in SwiftShader chromium-browser: Use after free in WebXR chromium-browser: Insufficient data validation in dialogs chromium-browser: Insufficient data validation in navigation chromium-browser: Inappropriate implementation in V8 chromium-browser: Insufficient policy enforcement in Intents chromium-browser: Out of bounds read in audio chromium-browser: Side-channel information leakage in cache chromium-browser: Insufficient data validation in webUI chromium-browser: Insufficient policy enforcement in Omnibox chromium-browser: Inappropriate implementation in Blink chromium-browser: Integer overflow in media chromium-browser: Use after free in WebRTC chromium-browser: Insufficient policy enforcement in downloads chromium-browser: Uninitialized use in PDFium chromium-browser: Use after free in autofill chromium-browser: Use after free in password manager chromium-browser: Insufficient policy enforcement in networking | [
"cpe:/a:redhat:rhel_extras:6"
] | null | 8.8 | null | null |
RHSA-2015:1066 | Red Hat Security Advisory: php54 security and bug fix update | php: use after free vulnerability in unserialize() php: out of bounds read when parsing a crafted .php file file: out of bounds read in mconvert() php: heap buffer overflow in enchant_broker_request_dict() gd: buffer read overflow in gd_gif_in.c php: use after free vulnerability in unserialize() (incomplete fix of CVE-2014-8142) php: Free called on unitialized pointer in exif.c php: use after free vulnerability in unserialize() with DateTimeZone php: use after free in opcache extension php: use after free in phar_object.c regex: heap overflow in regcomp() on 32-bit architectures php: move_uploaded_file() NUL byte injection in file name php: buffer over-read in Phar metadata parsing php: use-after-free vulnerability in the process_nested_data function in ext/standard/var_unserializer.re php: invalid pointer free() in phar_tar_process_metadata() php: buffer overflow in phar_set_inode() php: pipelined request executed in deinitialized interpreter under httpd 2.4 php: missing null byte checks for paths in various PHP extensions php: missing null byte checks for paths in various PHP extensions php: SoapClient's __call() type confusion through unserialize() php: SoapClient's do_soap_call() type confusion after unserialize() php: type confusion issue in unserialize() with various SOAP methods php: type confusion issue in unserialize() with various SOAP methods php: type confusion issue in unserialize() with various SOAP methods php: Incomplete Class unserialization type confusion php: exception:: getTraceAsString type confusion issue after unserialize php: denial of service when processing a crafted file with Fileinfo php: denial of service when processing a crafted file with Fileinfo php: HTTP response splitting in header() function | [
"cpe:/a:redhat:rhel_software_collections:2::el6",
"cpe:/a:redhat:rhel_software_collections:2::el7"
] | null | null | 3.1 | null |
RHSA-2024:0833 | Red Hat Security Advisory: OpenShift Container Platform 4.12.50 bug fix and security update | golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487) opentelemetry: DoS vulnerability in otelhttp go-git: Maliciously crafted Git server replies can cause DoS on go-git clients go-git: Maliciously crafted Git server replies can lead to path traversal and RCE on go-git clients | [
"cpe:/a:redhat:openshift:4.12::el8",
"cpe:/a:redhat:openshift:4.12::el9"
] | null | 8.1 | null | null |
RHSA-2021:2093 | Red Hat Security Advisory: Release of OpenShift Serverless 1.14.1 security update | golang: crypto/elliptic: incorrect operations on the P-224 curve golang: cmd/go: packages using cgo can cause arbitrary code execution at build time | [
"cpe:/a:redhat:serverless:1.14::el8"
] | null | 7.5 | null | null |
RHSA-2011:0843 | Red Hat Security Advisory: postfix security update | (smtpd): Crash due to improper management of SASL handlers for SMTP sessions | [
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws",
"cpe:/o:redhat:enterprise_linux:5::server",
"cpe:/o:redhat:enterprise_linux:6::server"
] | null | null | null | null |
RHEA-2025:2422 | Red Hat Enhancement Advisory: microcode_ctl bug fix and enhancement update | microcode_ctl: Improper input validation in UEFI firmware microcode_ctl: Improper input validation in UEFI firmware microcode_ctl: Improper input validation in XmlCli feature for UEFI firmware microcode_ctl: Improper input validation in UEFI firmware microcode_ctl: Improper input validation in UEFI firmware CseVariableStorageSmm | [
"cpe:/o:redhat:rhel_aus:8.6::baseos",
"cpe:/o:redhat:rhel_e4s:8.6::baseos",
"cpe:/o:redhat:rhel_tus:8.6::baseos"
] | null | 7.5 | null | null |
RHSA-2022:1053 | Red Hat Security Advisory: Red Hat Virtualization Host security and enhancement update [ovirt-4.4.10] Async #2 | expat: Malformed 2- and 3-byte UTF-8 sequences can lead to arbitrary code execution expat: Namespace-separator characters in "xmlns[:prefix]" attribute values can lead to arbitrary code execution expat: Integer overflow in storeRawNames() | [
"cpe:/o:redhat:rhev_hypervisor:4.4::el8"
] | null | 9.8 | null | null |
RHSA-2017:1431 | Red Hat Security Advisory: qemu-kvm-rhev security and bug fix update | Qemu: display: cirrus: OOB read access issue | [
"cpe:/o:redhat:enterprise_linux:7::hypervisor"
] | null | null | 4 | null |
RHSA-2024:6054 | Red Hat Security Advisory: ACS 4.4 enhancement and security update | containers/image: digest type does not guarantee valid type go-retryablehttp: url might write sensitive information to log file gorilla/schema: Potential memory exhaustion attack due to sparse slice deserialization | [
"cpe:/a:redhat:advanced_cluster_security:4.4::el8"
] | null | 7.5 | null | null |
RHSA-2020:0964 | Red Hat Security Advisory: OpenShift Container Platform 3.11 jenkins-2-plugins security update | openshift/jenkins-plugin: Deserialization in snakeyaml YAML() objects allows for remote code execution | [
"cpe:/a:redhat:openshift:3.11::el7"
] | null | 8.8 | null | null |
RHSA-2023:1181 | Red Hat Security Advisory: Release of OpenShift Serverless 1.27.1 | golang: net/http: excessive memory growth in a Go server accepting HTTP/2 requests | [
"cpe:/a:redhat:openshift_serverless:1.27::el8"
] | null | 5.3 | null | null |
RHSA-2013:1207 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 6.1.1 update | httpd: multiple XSS flaws due to unescaped hostnames httpd: XSS flaw in mod_proxy_balancer manager interface httpd: mod_rewrite allows terminal escape sequences to be written to the log file httpd: mod_dav DoS (httpd child process crash) via a URI MERGE request with source URI not handled by mod_dav PicketBox: Insecure storage of masked passwords Java: XML signature spoofing JGroups: Authentication via cached credentials Bayeux: Reflected Cross-Site Scripting (XSS) | [
"cpe:/a:redhat:jboss_enterprise_application_platform:6::el5"
] | null | null | null | null |
RHSA-2013:1348 | Red Hat Security Advisory: Red Hat Enterprise Linux 5 kernel update | kernel: request_module() OOM local DoS | [
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2024:11482 | Red Hat Security Advisory: kernel security update | kernel: KVM: arm64: Disassociate vcpus from redistributor region on teardown | [
"cpe:/a:redhat:rhel_eus:9.2::appstream",
"cpe:/a:redhat:rhel_eus:9.2::crb",
"cpe:/o:redhat:rhel_eus:9.2::baseos"
] | null | 5.6 | null | null |
RHSA-2024:5694 | Red Hat Security Advisory: tomcat security update | tomcat: Improper Handling of Exceptional Conditions tomcat: Denial of Service in Tomcat | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 7.5 | null | null |
RHSA-2017:3247 | Red Hat Security Advisory: firefox security update | Mozilla: Memory safety bugs fixed in Firefox 57 and Firefox ESR 52.5 (MFSA 2017-25) Mozilla: Use-after-free of PressShell while restyling layout (MFSA 2017-25) Mozilla: Cross-origin URL information leak through Resource Timing API (MFSA 2017-25) | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation",
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 6.5 | null |
RHSA-2024:0937 | Red Hat Security Advisory: kpatch-patch security update | kernel: GSM multiplexing race condition leads to privilege escalation | [
"cpe:/o:redhat:rhel_eus:8.6::baseos"
] | null | 7 | null | null |
RHSA-2011:1749 | Red Hat Security Advisory: libxml2 security and bug fix update | libxml2: Crash (stack frame overflow or NULL pointer dereference) by traversal of XPath axis libxml2: double-free in XPath processing code libxml2: Off-by-one error leading to heap-based buffer overflow in encoding libxml2: Heap-based buffer overflow by adding new namespace node to an existing nodeset or merging nodesets libxml2: double free caused by malformed XPath expression in XSLT libxml2: double-free caused by malformed XPath expression in XSLT | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2023:4948 | Red Hat Security Advisory: thunderbird security update | Mozilla: Full screen notification obscured by file open dialog Mozilla: Full screen notification obscured by external program Mozilla: Memory corruption in IPC CanvasTranslator Mozilla: Memory corruption in IPC ColorPickerShownCallback Mozilla: Memory corruption in IPC FilePickerShownCallback Mozilla: Memory corruption in JIT UpdateRegExpStatics Mozilla: Error reporting methods in SpiderMonkey could have triggered an Out of Memory Exception Mozilla: Push notifications saved to disk unencrypted Mozilla: XLL file extensions were downloadable without warnings Mozilla: Browsing Context potentially not cleared when closing Private Window Mozilla: Memory safety bugs fixed in Firefox 117, Firefox ESR 102.15, Firefox ESR 115.2, Thunderbird 102.15, and Thunderbird 115.2 Mozilla: Memory safety bugs fixed in Firefox 117, Firefox ESR 115.2, and Thunderbird 115.2 | [
"cpe:/a:redhat:rhel_e4s:8.1::appstream"
] | null | 8.8 | null | null |
RHSA-2010:0489 | Red Hat Security Advisory: java-1.5.0-ibm security update | OpenJDK Applet Trusted Methods Chaining Privilege Escalation Vulnerability (6904691) OpenJDK JPEGImageReader stepX Integer Overflow Vulnerability (6909597) JDK multiple unspecified vulnerabilities JDK multiple unspecified vulnerabilities JDK multiple unspecified vulnerabilities JDK unspecified vulnerability in ImageIO component OpenJDK ImagingLib arbitrary code execution vulnerability (6914866) OpenJDK AWT Library Invalid Index Vulnerability (6914823) JDK unspecified vulnerability in Java2D component | [
"cpe:/a:redhat:rhel_extras:4",
"cpe:/a:redhat:rhel_extras:5::client",
"cpe:/a:redhat:rhel_extras:5::server"
] | null | null | null | null |
RHSA-2014:0742 | Red Hat Security Advisory: thunderbird security update | Mozilla: Miscellaneous memory safety hazards (rv:24.6) (MFSA 2014-48) Mozilla: Use-after-free and out of bounds issues found using Address Sanitizer (MFSA 2014-49) Mozilla: Use-after-free with SMIL Animation Controller (MFSA 2014-52) | [
"cpe:/a:redhat:rhel_productivity:5",
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2017:2886 | Red Hat Security Advisory: rh-mysql57-mysql security and bug fix update | mysql: Incorrect input validation allowing code execution via mysqldump mysql: Server: Replication unspecified vulnerability (CPU Jan 2017) mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2017) mysql: Server: DML unspecified vulnerability (CPU Jan 2017) mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2017) mysql: Server: Replication unspecified vulnerability (CPU Jan 2017) mysql: Server: InnoDB unspecified vulnerability (CPU Jan 2017) mysql: Server: DDL unspecified vulnerability (CPU Jan 2017) mysql: Server: DDL unspecified vulnerability (CPU Jan 2017) mysql: unrestricted mysqld_safe's ledir (CPU Jan 2017) mysql: Server: DML unspecified vulnerability (CPU Apr 2017) mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2017) mysql: insecure error log file handling in mysqld_safe, incomplete CVE-2016-6664 fix (CPU Jan 2017) mysql: Server: MyISAM unspecified vulnerability (CPU Jan 2017) mysql: Logging unspecified vulnerability (CPU Jan 2017) mysql: Server: Error Handling unspecified vulnerability (CPU Jan 2017) mysql: Server: X Plugin unspecified vulnerability (CPU Jan 2017) mysql: Server: Security: Encryption unspecified vulnerability (CPU Jan 2017) mysql: Server: DML unspecified vulnerability (CPU Apr 2017) mysql: Server: Memcached unspecified vulnerability (CPU Apr 2017) mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2017) mysql: Server: InnoDB unspecified vulnerability (CPU Apr 2017) mysql: Server: Security: Privileges unspecified vulnerability (CPU Apr 2017) mysql: Server: DML unspecified vulnerability (CPU Apr 2017) mysql: Server: DML unspecified vulnerability (CPU Apr 2017) mysql: Server: DML unspecified vulnerability (CPU Apr 2017) mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2017) mysql: Server: Audit Plug-in unspecified vulnerability (CPU Apr 2017) mysql: Server: Security: Privileges unspecified vulnerability (CPU Apr 2017) mysql: Server: Security: Privileges unspecified vulnerability (CPU Apr 2017) mysql: Server: Security: Privileges unspecified vulnerability (CPU Apr 2017) mysql: Server: DDL unspecified vulnerability (CPU Apr 2017) mysql: Server: Security: Privileges unspecified vulnerability (CPU Apr 2017) mysql: Server: C API unspecified vulnerability (CPU Apr 2017) mysql: Server: Security: Encryption unspecified vulnerability (CPU Apr 2017) mysql: Server: UDF unspecified vulnerability (CPU Jul 2017) mysql: integer underflow in get_56_lenc_string() leading to DoS (CPU Apr 2017) mysql: Incorrect input validation allowing code execution via mysqldump mysql: Server: Memcached unspecified vulnerability (CPU Jul 2017) mysql: Server: DML unspecified vulnerability (CPU Jul 2017) mysql: X Plugin unspecified vulnerability (CPU Jul 2017) mysql: Server: Optimizer unspecified vulnerability (CPU Jul 2017) mysql: Server: DML unspecified vulnerability (CPU Jul 2017) mysql: Server: DML unspecified vulnerability (CPU Jul 2017) mysql: Server: DML unspecified vulnerability (CPU Jul 2017) mysql: Server: Optimizer unspecified vulnerability (CPU Jul 2017) mysql: Server: DML unspecified vulnerability (CPU Jul 2017) mysql: Server: DML unspecified vulnerability (CPU Jul 2017) mysql: Server: Optimizer unspecified vulnerability (CPU Jul 2017) mysql: X Plugin unspecified vulnerability (CPU Jul 2017) mysql: Server: Replication unspecified vulnerability (CPU Jul 2017) mysql: Server: Charsets unspecified vulnerability (CPU Jul 2017) mysql: Server: Replication unspecified vulnerability (CPU Jul 2017) mysql: C API unspecified vulnerability (CPU Jul 2017) mysql: Client mysqldump unspecified vulnerability (CPU Jul 2017) mysql: Server: DDL unspecified vulnerability (CPU Jul 2017) mysql: Server: DDL unspecified vulnerability (CPU Jul 2017) mysql: Server: Security: Privileges unspecified vulnerability (CPU Jul 2019) | [
"cpe:/a:redhat:rhel_software_collections:2::el6",
"cpe:/a:redhat:rhel_software_collections:2::el7"
] | null | null | 2.7 | null |
RHSA-2022:8851 | Red Hat Security Advisory: Red Hat OpenStack Platform 16.2.4 (rabbitmq-server) security update | rabbitmq-server: improper neutralization of script-related HTML tags in a web page (basic XSS) in management UI rabbitmq-server: improper neutralization of script-related HTML tags in a web page (basic XSS) in federation management plugin | [
"cpe:/a:redhat:openstack:16.2::el8"
] | null | 4.8 | null | null |
RHSA-2022:6764 | Red Hat Security Advisory: bind security update | bind: memory leak in ECDSA DNSSEC verification code bind: memory leaks in EdDSA DNSSEC verification code | [
"cpe:/a:redhat:rhel_e4s:8.1::appstream",
"cpe:/o:redhat:rhel_e4s:8.1::baseos"
] | null | 7.5 | null | null |
RHSA-2024:1795 | Red Hat Security Advisory: VolSync 0.9.1 security fixes and enhancements | golang-protobuf: encoding/protojson, internal/encoding/json: infinite loop in protojson.Unmarshal when unmarshaling certain forms of invalid JSON | [
"cpe:/a:redhat:acm:2.10::el9"
] | null | 5.9 | null | null |
RHSA-2021:4270 | Red Hat Security Advisory: rust-toolset:rhel8 security, bug fix, and enhancement update | rust: incorrect parsing of extraneous zero characters at the beginning of an IP address string | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 7.3 | null | null |
RHSA-2023:3277 | Red Hat Security Advisory: kernel security update | kernel: use-after-free caused by l2cap_reassemble_sdu() in net/bluetooth/l2cap_core.c | [
"cpe:/o:redhat:rhel_aus:7.7::server",
"cpe:/o:redhat:rhel_e4s:7.7::server",
"cpe:/o:redhat:rhel_tus:7.7::server"
] | null | 7.1 | null | null |
RHSA-2017:3368 | Red Hat Security Advisory: qemu-kvm security update | Qemu: i386: multiboot OOB access while loading kernel image Qemu: cirrus: OOB access issue in mode4and5 write functions | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 4.4 | null |
RHSA-2008:0617 | Red Hat Security Advisory: vim security update | vim format string flaw vim: command execution via scripts not sanitizing inputs to execute and system vim: heap buffer overflow in mch_expand_wildcards() vim: arbitrary code execution in commands: K, Control-], g] | [
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws",
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2024:2004 | Red Hat Security Advisory: kernel security and bug fix update | kernel: race condition in VT_RESIZEX ioctl when vc_cons[i].d is already NULL leading to NULL pointer dereference Kernel: bluetooth: Unauthorized management command execution kernel: use after free in unix_stream_sendpage kernel: net/sched: sch_hfsc UAF kernel: irdma: Improper access control | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 5.6 | null | null |
RHSA-2024:3583 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 8.0.2 Security update | eap-galleon: custom provisioning creates unsecured http-invoker EAP: OIDC app attempting to access the second tenant, the user should be prompted to log jberet: jberet-core logging database credentials EAP: wildfly-elytron has a SSRF security issue | [
"cpe:/a:redhat:jboss_enterprise_application_platform:8.0"
] | null | 7.3 | null | null |
RHSA-2020:4213 | Red Hat Security Advisory: Red Hat support for Spring Boot 2.2.10 security update | keycloak: security headers missing on REST endpoints | [
"cpe:/a:redhat:openshift_application_runtimes:1.0"
] | null | 4.8 | null | null |
RHSA-2017:0153 | Red Hat Security Advisory: openstack-cinder security update | openstack-nova/glance/cinder: Malicious image may exhaust resources | [
"cpe:/a:redhat:openstack:5::el7"
] | null | null | 5.3 | null |
RHSA-2021:2351 | Red Hat Security Advisory: .NET 5.0 on RHEL 7 security and bugfix update | dotnet: ASP.NET Core Client Disconnect Denial of Service | [
"cpe:/a:redhat:rhel_dotnet:5.0::el7"
] | null | 5.9 | null | null |
RHSA-2019:3193 | Red Hat Security Advisory: firefox security update | Mozilla: Use-after-free when creating index updates in IndexedDB Mozilla: Potentially exploitable crash due to 360 Total Security Mozilla: Stack buffer overflow in HKDF output Mozilla: Stack buffer overflow in WebRTC networking Mozilla: Unintended access to a privileged JSONView object Mozilla: document.domain-based origin isolation has same-origin-property violation Mozilla: Incorrect HTML parsing results in XSS bypass technique Mozilla: Memory safety bugs fixed in Firefox 70 and Firefox ESR 68.2 expat: heap-based buffer over-read via crafted XML input | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 6.1 | 7.5 | null |
RHSA-2014:0508 | Red Hat Security Advisory: java-1.6.0-ibm security update | libjpeg: information leak (read of uninitialized memory) libpng: unhandled zero-length PLTE chunk or NULL palette OpenJDK: Incorrect mlib/raster image validation (2D, 8027841) OpenJDK: Protect logger handlers (Libraries, 8029740) JDK: unspecified vulnerability fixed in 6u75, 7u55 and 8u5 (Deployment) OpenJDK: AWT incorrect FlavorMap seperation (AWT, 8026797) OpenJDK: incorrect caching of data initialized via TCCL (JAXWS, 8026801) OpenJDK: RSA unpadding timing issues (Security, 8027766) OpenJDK: ServiceLoader Exception handling security bypass (Libraries, 8031394) OpenJDK: Activation framework default command map caching (JAX-WS, 8025152) OpenJDK: missing randomization of JNDI DNS client query IDs (JNDI, 8030731) OpenJDK: Better ScriptEngineManager ScriptEngine management (Libraries, 8036794) JDK: Vulnerability in the IBMSecureRandom implementation of the IBMJCE and IBMSecureRandom cryptographic providers OpenJDK: insecure temporary file use in unpack200 (Libraries, 8033618) OpenJDK: insufficient escaping of window title string (Javadoc, 8026736) JDK: unspecified vulnerability fixed in 5.0u75, 6u75, 7u55 and 8u5 (2D) JDK: unspecified vulnerability fixed in 6u75, 7u55 and 8u5 (Deployment) OpenJDK: AWT thread context handling (AWT, 8025010) OpenJDK: incorrect caching of data initialized via TCCL (JAXB, 8025030) JDK: unspecified vulnerability fixed in 6u75, 7u55 and 8u5 (Deployment) OpenJDK: JPEG decoder input stream handling (2D, 8029854) OpenJDK: incorrect caching of data initialized via TCCL (JAXWS, 8026188) OpenJDK: remove insecure Java Sound provider caching (Sound, 8026163) JDK: unspecified vulnerability fixed in 6u75, 7u55 and 8u5 (Deployment) | [
"cpe:/a:redhat:rhel_extras:5::client",
"cpe:/a:redhat:rhel_extras:5::server",
"cpe:/a:redhat:rhel_extras:6"
] | null | null | null | null |
RHSA-2022:5696 | Red Hat Security Advisory: java-1.8.0-openjdk security, bug fix, and enhancement update | OpenJDK: class compilation issue (Hotspot, 8281859) OpenJDK: improper restriction of MethodHandle.invokeBasic() (Hotspot, 8281866) OpenJDK: integer truncation issue in Xalan-J (JAXP, 8285407) | [
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb"
] | null | 7.5 | null | null |
RHSA-2007:0402 | Red Hat Security Advisory: seamonkey security update | Multiple Firefox flaws (CVE-2007-1562, CVE-2007-2867, CVE-2007-2868, CVE-2007-2869, CVE-2007-2870, CVE-2007-2871) fetchmail/mutt/evolution/...: APOP password disclosure vulnerability security flaw Multiple Firefox flaws (CVE-2007-1562, CVE-2007-2867, CVE-2007-2868, CVE-2007-2869, CVE-2007-2870, CVE-2007-2871) security flaw Multiple Firefox flaws (CVE-2007-1562, CVE-2007-2867, CVE-2007-2868, CVE-2007-2869, CVE-2007-2870, CVE-2007-2871) security flaw Multiple Firefox flaws (CVE-2007-1562, CVE-2007-2867, CVE-2007-2868, CVE-2007-2869, CVE-2007-2870, CVE-2007-2871) | [
"cpe:/o:redhat:enterprise_linux:2.1::as",
"cpe:/o:redhat:enterprise_linux:2.1::aw",
"cpe:/o:redhat:enterprise_linux:2.1::es",
"cpe:/o:redhat:enterprise_linux:2.1::ws",
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws",
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2020:4187 | Red Hat Security Advisory: spice and spice-gtk security update | spice: multiple buffer overflow vulnerabilities in QUIC decoding code | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 6.6 | null | null |
RHSA-2018:3397 | Red Hat Security Advisory: qemu-kvm security update | hw: cpu: speculative store bypass | [
"cpe:/o:redhat:rhel_aus:6.5::server"
] | null | null | 5.6 | null |
RHSA-2021:3959 | Red Hat Security Advisory: Red Hat build of Eclipse Vert.x 4.1.5 security update | netty-codec: Bzip2Decoder doesn't allow setting size restrictions for decompressed data netty-codec: SnappyFrameDecoder doesn't restrict chunk length and may buffer skippable chunks in an unnecessary way | [
"cpe:/a:redhat:openshift_application_runtimes:1.0"
] | null | 7.5 | null | null |
RHSA-2021:0831 | Red Hat Security Advisory: rh-nodejs12-nodejs security update | nodejs: HTTP2 'unknownProtocol' cause DoS by resource exhaustion nodejs: DNS rebinding in --inspect | [
"cpe:/a:redhat:rhel_software_collections:3::el7"
] | null | 7.5 | null | null |
RHSA-2018:0336 | Red Hat Security Advisory: Satellite 6.3 security, bug fix, and enhancement update | rubygem-will_paginate: XSS vulnerabilities foreman: models with a 'belongs_to' association to an Organization do not verify association belongs to that Organization V8: integer overflow leading to buffer overflow in Zone::New foreman: inspect in a provisioning template exposes sensitive controller information pulp: Leakage of CA key in pulp-qpid-ssl-cfg pulp: Unsafe use of bash $RANDOM for NSS DB password and seed foreman: privilege escalation through Organization and Locations API foreman: Information disclosure in provisioning template previews foreman: inside discovery-debug, the root password is displayed in plaintext foreman: Persistent XSS in Foreman remote execution plugin foreman: Foreman information leak through unauthorized multiple_checkboxes helper foreman: Information leak through organizations and locations feature foreman: Stored XSS vulnerability in remote execution plugin foreman: Stored XSS in org/loc wizard foreman: Stored XSS via organization/location with HTML in name foreman-debug: missing obfuscation of sensitive information katello-debug: Possible symlink attacks due to use of predictable file names puppet: Unsafe YAML deserialization rubygem-hammer_cli: no verification of API server's SSL certificate foreman: Image password leak Interconnect: Denial of Service vulnerability in Red Hat JBoss AMQ Interconnect katello: SQL inject in errata-related REST API | [
"cpe:/a:redhat:satellite:6.3::el7",
"cpe:/a:redhat:satellite_capsule:6.3::el7"
] | null | null | 4.3 | null |
RHSA-2020:1470 | Red Hat Security Advisory: ntp security update | ntp: Stack-based buffer overflow in ntpq and ntpdc allows denial of service or code execution | [
"cpe:/o:redhat:rhel_eus:7.6::computenode",
"cpe:/o:redhat:rhel_eus:7.6::server"
] | null | null | 7 | null |
RHSA-2022:8062 | Red Hat Security Advisory: unbound security, bug fix, and enhancement update | unbound: novel ghost domain attack that allows attackers to trigger continued resolvability of malicious domain names unbound: novel ghost domain attack that allows attackers to trigger continued resolvability of malicious domain names | [
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::crb"
] | null | 6.5 | null | null |
RHSA-2022:0721 | Red Hat Security Advisory: OpenShift Logging bug fix and security update (5.3.5) | jackson-dataformat-cbor: Unchecked allocation of byte buffer can cause a java.lang.OutOfMemoryError exception origin-aggregated-logging/elasticsearch: Incomplete fix for netty-codec-http CVE-2021-21409 | [
"cpe:/a:redhat:logging:5.3::el8"
] | null | 5.9 | null | null |
RHSA-2024:3323 | Red Hat Security Advisory: pcp security update | pcp: exposure of the redis server backend allows remote command execution via pmproxy | [
"cpe:/a:redhat:rhel_aus:8.4::appstream",
"cpe:/a:redhat:rhel_e4s:8.4::appstream",
"cpe:/a:redhat:rhel_tus:8.4::appstream"
] | null | 8.8 | null | null |
RHSA-2013:0130 | Red Hat Security Advisory: httpd security, bug fix, and enhancement update | httpd: mod_negotiation XSS via untrusted file names in directories with MultiViews enabled httpd: mod_negotiation CRLF injection via untrusted file names in directories with MultiViews enabled httpd: mod_negotiation XSS via untrusted file names in directories with MultiViews enabled | [
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2019:0136 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.2.0 security update | keycloak: SAML request parser replaces special strings with system properties | [
"cpe:/a:redhat:jboss_enterprise_application_platform:7.2::el6"
] | null | null | 6.5 | null |
RHSA-2021:4153 | Red Hat Security Advisory: dnsmasq security and bug fix update | dnsmasq: fixed outgoing port used when --server is used with an interface name | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 4 | null | null |
RHSA-2022:1254 | Red Hat Security Advisory: Red Hat OpenStack Platform 16.1 (python-waitress) security update | waitress: Inconsistent Interpretation of HTTP Requests ('HTTP Request Smuggling') | [
"cpe:/a:redhat:openstack:16.1::el8"
] | null | 7.5 | null | null |
RHSA-2024:0606 | Red Hat Security Advisory: openssh security update | ssh: Prefix truncation attack on Binary Packet Protocol (BPP) openssh: potential command injection via shell metacharacters | [
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 6.5 | null | null |
RHSA-2010:0440 | Red Hat Security Advisory: rhev-hypervisor security and bug fix update | openssl: missing bn_wexpand return value checks TLS: MITM attacks via session renegotiation | [
"cpe:/o:redhat:enterprise_linux:5::hypervisor"
] | null | null | null | null |
RHSA-2021:4798 | Red Hat Security Advisory: kpatch-patch security update | kernel: use-after-free in drivers/infiniband/core/ucma.c ctx use-after-free | [
"cpe:/o:redhat:enterprise_linux:7::server"
] | null | 7.8 | null | null |
RHSA-2002:041 | Red Hat Security Advisory: : Updated mod_ssl packages available | security flaw | [
"cpe:/o:redhat:linux:7.0",
"cpe:/o:redhat:linux:7.1",
"cpe:/o:redhat:linux:7.2"
] | null | null | null | null |
RHSA-2019:1972 | Red Hat Security Advisory: ruby:2.5 security update | rubygems: Installing a malicious gem may lead to arbitrary code execution | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | null | 7.2 | null |
RHSA-2023:6940 | Red Hat Security Advisory: mod_auth_openidc:2.3 security and bug fix update | mod_auth_openidc: Open Redirect in oidc_validate_redirect_url() using tab character mod_auth_openidc: NULL pointer dereference when OIDCStripCookies is set and a crafted Cookie header is supplied | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 7.5 | null | null |
RHSA-2019:1553 | Red Hat Security Advisory: chromium-browser security update | chromium-browser: Use-after-free in Blink | [
"cpe:/a:redhat:rhel_extras:6"
] | null | null | 8.8 | null |
RHSA-2021:3020 | Red Hat Security Advisory: ruby:2.7 security update | rubygem-bundler: Dependencies of gems with explicit source may be installed from a different source rubygem-rdoc: Command injection vulnerability in RDoc ruby: FTP PASV command response can cause Net::FTP to connect to arbitrary host ruby: StartTLS stripping vulnerability in Net::IMAP | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 7.4 | null | null |
RHSA-2022:6178 | Red Hat Security Advisory: firefox security update | Mozilla: Address bar spoofing via XSLT error handling Mozilla: Cross-origin XSLT Documents would have inherited the parent's permissions Mozilla: Data race and potential use-after-free in PK11_ChangePW Mozilla: Memory safety bugs fixed in Firefox 104 and Firefox ESR 102.2 Mozilla: Memory safety bugs fixed in Firefox 104, Firefox ESR 102.2, and Firefox ESR 91.13 | [
"cpe:/a:redhat:rhel_e4s:8.1::appstream"
] | null | 8.8 | 7.5 | null |
RHSA-2019:3834 | Red Hat Security Advisory: kernel security update | hw: Machine Check Error on Page Size Change (IFU) hw: Intel GPU Denial Of Service while accessing MMIO in lower power state hw: TSX Transaction Asynchronous Abort (TAA) | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 6.5 | null |
RHSA-2018:1249 | Red Hat Security Advisory: jboss-ec2-eap package for EAP 7.1.2 | undertow: Path traversal in ServletResourceManager class undertow: HTTP header injection using CRLF with UTF-8 Encoding (incomplete fix of CVE-2016-4993) slf4j: Deserialisation vulnerability in EventData constructor can allow for arbitrary code execution | [
"cpe:/a:redhat:jboss_enterprise_application_platform:7.1::el7",
"cpe:/a:redhat:jboss_enterprise_application_platform:7::el6"
] | null | null | 8.1 | null |
RHSA-2015:0808 | Red Hat Security Advisory: java-1.6.0-openjdk security update | jar: directory traversal vulnerability OpenJDK: incorrect handling of phantom references (Hotspot, 8071931) ICU: layout engine glyphStorage off-by-one (OpenJDK 2D, 8067699) OpenJDK: incorrect permissions check in resource loading (Beans, 8068320) OpenJDK: insufficient hardening of RSA-CRT implementation (JCE, 8071726) OpenJDK: jar directory traversal issues (Tools, 8064601) OpenJDK: certificate options parsing uncaught exception (JSSE, 8068720) | [
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::server",
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation",
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | null | null |
RHSA-2020:4024 | Red Hat Security Advisory: okular security update | okular: local binary execution via specially crafted PDF files | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 5.3 | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.