id
stringlengths 13
15
| title
stringlengths 29
176
| description
stringlengths 8
32.1k
| cpes
sequencelengths 0
20
| cvss_v4_0
null | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
null |
---|---|---|---|---|---|---|---|
RHSA-2020:2295 | Red Hat Security Advisory: openvswitch2.13 security, bug fix and enhancement update | dpdk: librte_vhost Integer overflow in vhost_user_set_log_base() dpdk: librte_vhost Integer truncation in vhost_user_check_and_alloc_queue_pair() dpdk: librte_vhost Missing inputs validation in Vhost-crypto dpdk: librte_vhost Malicious guest could cause segfault by sending invalid Virtio descriptor dpdk: librte_vhost VHOST_USER_GET_INFLIGHT_FD message flooding to result in a DoS | [
"cpe:/o:redhat:enterprise_linux:8::fastdatapath"
] | null | 4.4 | null | null |
RHSA-2015:0090 | Red Hat Security Advisory: glibc security update | glibc: __nss_hostname_digits_dots() heap-based buffer overflow | [
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2010:0780 | Red Hat Security Advisory: thunderbird security update | Mozilla miscellaneous memory safety hazards Mozilla use-after-free error in nsBarProp Mozilla unsafe library loading flaw | [
"cpe:/a:redhat:rhel_productivity:5",
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws",
"cpe:/o:redhat:enterprise_linux:5::client"
] | null | null | null | null |
RHSA-2022:6540 | Red Hat Security Advisory: webkit2gtk3 security update | webkitgtk: processing maliciously crafted web content may lead to arbitrary code execution | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 8.8 | null | null |
RHSA-2019:1479 | Red Hat Security Advisory: kernel security and bug fix update | kernel: lack of check for mmap minimum address in expand_downwards in mm/mmap.c leads to NULL pointer dereferences exploit on non-SMAP platforms Kernel: tcp: integer overflow while processing SACK blocks allows remote denial of service Kernel: tcp: excessive resource consumption while processing SACK blocks allows remote denial of service kernel: tcp: excessive resource consumption for TCP connections with low MSS allows remote denial of service | [
"cpe:/a:redhat:enterprise_linux:8::crb",
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | null | 5.3 | null |
RHSA-2024:6886 | Red Hat Security Advisory: Red Hat Single Sign-On 7.6.11 security update | keycloak-saml-core: Improper Verification of SAML Responses Leading to Privilege Escalation in Keycloak Keycloak: Vulnerable Redirect URI Validation Results in Open Redirec | [
"cpe:/a:redhat:red_hat_single_sign_on:7.6"
] | null | 6.1 | null | null |
RHSA-2020:4245 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.3.3 security update on RHEL 8 | cxf: JMX integration is vulnerable to a MITM attack picketbox: JBoss EAP reload to admin-only mode allows authentication bypass wildfly: XML validation manipulation due to incomplete application of use-grammar-pool-only in xercesImpl xnio: file descriptor leak caused by growing amounts of NIO Selector file handles may lead to DoS | [
"cpe:/a:redhat:jboss_enterprise_application_platform:7.3::el8"
] | null | 5.9 | null | null |
RHSA-2015:0837 | Red Hat Security Advisory: openstack-glance security and bug fix update | openstack-glance: user storage quota bypass | [
"cpe:/a:redhat:openstack:5::el7"
] | null | null | null | null |
RHSA-2013:0236 | Red Hat Security Advisory: java-1.6.0-sun security update | JDK: unspecified vulnerability fixed in 6u39 and 7u13 (Deployment) JDK: unspecified vulnerability fixed in 6u39 and 7u13 (Scripting) JDK: unspecified vulnerability fixed in 6u39 and 7u13 (Deployment) JDK: unspecified vulnerability fixed in 6u39 and 7u13 (Deployment) JDK: unspecified vulnerability fixed in 6u39 and 7u13 (JMX) JDK: unspecified vulnerability fixed in 6u39 and 7u13 (Deployment) JDK: unspecified vulnerability fixed in 6u39 and 7u13 (Deployment) OpenJDK: RMI CGIHandler XSS issue (RMI, 6563318) OpenJDK: logging insufficient access control checks (Libraries, 6664509) OpenJDK: logging insufficient access control checks (Libraries, 6664528) OpenJDK: invalid threads subject to interrupts (Libraries, 6776941) OpenJDK: reflection API incorrect checks for proxy classes (Libraries, 7197546, SE-2012-01 Issue 29) OpenJDK: PresentationManager incorrectly shared (CORBA, 7141694) JDK: unspecified vulnerability fixed in 6u39 and 7u13 (Install) OpenJDK: insufficient clipboard access premission checks (AWT, 7186952) OpenJDK: InetSocketAddress serialization issue (Networking, 7201071) OpenJDK: loadPropertyFile missing restrictions (JAXP, 8001235) OpenJDK: com.sun.xml.internal.* not restricted packages (JAX-WS, 7201068) JDK: unspecified vulnerability fixed in 6u39 and 7u13 (Deployment) OpenJDK: CPU consumption DoS via repeated SSL ClientHello packets (JSSE, 7192393) OpenJDK: missing serialization restriction (CORBA, 7201066) OpenJDK: insufficient privilege checking issue (AWT, 7192977) OpenJDK: insufficient Diffie-Hellman public key checks (JSSE, 7192392) OpenJDK: insufficient privilege checking issue (AWT, 8001057) JDK: unspecified vulnerability fixed in 6u39 and 7u13 (Deployment) OpenJDK: RequiredModelMBean missing access control context checks (JMX, 8000537) JDK: unspecified vulnerability fixed in 6u39 and 7u13 (Deployment) OpenJDK: IIOP type reuse sandbox bypass (CORBA, 8000540, SE-2012-01 Issue 50) OpenJDK: missing ValueHandlerImpl class constructor access restriction (CORBA, 8000631) OpenJDK: image parser insufficient raster parameter checks (2D, 8001972) OpenJDK: image parser insufficient raster parameter checks (AWT, 8002325) JDK: unspecified vulnerability fixed in 6u39 (Sound) | [
"cpe:/a:redhat:rhel_extras:5::server",
"cpe:/a:redhat:rhel_extras:6"
] | null | null | null | null |
RHSA-2010:0896 | Red Hat Security Advisory: thunderbird security update | Mozilla miscellaneous memory safety hazards Mozilla miscellaneous memory safety hazards Mozilla cross-site information disclosure via modal calls Mozilla buffer overflow and memory corruption using document.write Mozilla use-after-free error in nsBarProp Mozilla unsafe library loading flaw Mozilla dangling pointer vulnerability in LookupGetterOrSetter Firefox race condition flaw (MFSA 2010-73) | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2020:1378 | Red Hat Security Advisory: kernel-rt security and bug fix update | kernel: use-after-free caused by a malicious USB device in the drivers/hid/usbhid/hiddev.c driver | [
"cpe:/a:redhat:enterprise_linux:8::nfv",
"cpe:/a:redhat:enterprise_linux:8::realtime"
] | null | 6.8 | null | null |
RHSA-2020:0790 | Red Hat Security Advisory: kernel security and bug fix update | kernel: unprivileged users able to create RAW sockets in AF_ISDN network protocol kernel: buffer overflow in cfg80211_mgd_wext_giwessid in net/wireless/wext-sme.c | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | 8 | 4 | null |
RHSA-2016:2089 | Red Hat Security Advisory: java-1.7.0-oracle security update | OpenJDK: missing algorithm restrictions for jar verification (Libraries, 8155973) OpenJDK: insufficient classloader consistency checks in ClassLoaderWithRepository (JMX, 8157739) JDK: unspecified vulnerability fixed in 6u131, 7u121, and 8u111 (2D) OpenJDK: insufficient checks of JDWP packets (Hotspot, 8159519) OpenJDK: incomplete type checks of System.arraycopy arguments (Hotspot, 8160591) OpenJDK: exposure of server authentication credentials to proxy (Networking, 8160838) | [
"cpe:/a:redhat:rhel_extras_oracle_java:5",
"cpe:/a:redhat:rhel_extras_oracle_java:6",
"cpe:/a:redhat:rhel_extras_oracle_java:7"
] | null | null | 5.3 | null |
RHSA-2020:5050 | Red Hat Security Advisory: kpatch-patch security update | kernel: metadata validator in XFS may cause an inode with a valid, user-creatable extended attribute to be flagged as corrupt | [
"cpe:/o:redhat:enterprise_linux:7::server"
] | null | 6.2 | null | null |
RHSA-2013:0594 | Red Hat Security Advisory: kernel security and bug fix update | kernel: udf: buffer overflow when parsing sparing table | [
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2003:160 | Red Hat Security Advisory: : Updated xinetd packages fix a denial-of-service attack and other bugs | security flaw | [
"cpe:/o:redhat:linux:7.1",
"cpe:/o:redhat:linux:7.2",
"cpe:/o:redhat:linux:7.3",
"cpe:/o:redhat:linux:8.0",
"cpe:/o:redhat:linux:9"
] | null | null | null | null |
RHSA-2020:3711 | Red Hat Security Advisory: openstack-nova security update | openstack-nova: Soft reboot after live-migration reverts instance to original source domain XML | [
"cpe:/a:redhat:openstack:10::el7"
] | null | 8.3 | null | null |
RHSA-2023:6189 | Red Hat Security Advisory: firefox security update | Mozilla: Queued up rendering could have allowed websites to clickjack Mozilla: Large WebGL draw could have led to a crash Mozilla: WebExtensions could open arbitrary URLs Mozilla: Improper object tracking during GC in the JavaScript engine could have led to a crash. Mozilla: Memory safety bugs fixed in Firefox 119, Firefox ESR 115.4, and Thunderbird 115.4 Mozilla: Address bar spoofing via bidirectional characters libvpx: crash related to VP9 encoding in libvpx | [
"cpe:/a:redhat:rhel_e4s:8.1::appstream"
] | null | 7.5 | null | null |
RHSA-2019:2818 | Red Hat Security Advisory: OpenShift Container Platform 3.11 security update | openshift-ansible: dockergc service account incorrectly associated with namespace during upgrade | [
"cpe:/a:redhat:openshift:3.11::el7"
] | null | null | 7.5 | null |
RHSA-2024:4902 | Red Hat Security Advisory: kernel security update | kernel: ethernet: hisilicon: hns: hns_dsaf_misc: fix a possible array overflow in hns_dsaf_ge_srst_by_port() kernel: net: amd-xgbe: Fix skb data length underflow kernel: net/mlx5e: fix a potential double-free in fs_any_create_groups kernel: bonding: stop the device in bond_setup_by_slave() kernel: arp: Prevent overflow in arp_req_get(). kernel: net/ipv6: avoid possible UAF in ip6_route_mpath_notify() kernel: x86/xen: Add some null pointer checking to smp.c kernel: net/mlx5: Properly link new fs rules into the tree kernel: i40e: fix vf may be used uninitialized in this function warning kernel: scsi: qla2xxx: Fix off by one in qla_edif_app_getstats() kernel: scsi: lpfc: Release hbalock before calling lpfc_worker_wake_up() kernel: net: core: reject skb_copy(_expand) for fraglist GSO skbs kernel: af_unix: Fix data races in unix_release_sock/unix_stream_sendmsg | [
"cpe:/o:redhat:rhel_aus:8.6::baseos",
"cpe:/o:redhat:rhel_e4s:8.6::baseos",
"cpe:/o:redhat:rhel_tus:8.6::baseos"
] | null | 4.7 | null | null |
RHSA-2023:6161 | Red Hat Security Advisory: Migration Toolkit for Containers (MTC) 1.7.14 security and bug fix update | golang: net/http: insufficient sanitization of Host header golang: crypto/tls: slow verification of certificate chains containing large RSA keys golang: html/template: improper handling of HTML-like comments within script contexts golang: html/template: improper handling of special tags within script contexts golang: crypto/tls: panic when processing post-handshake message on QUIC connections golang: crypto/tls: lack of a limit on buffered post-handshake golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487) HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack) | [
"cpe:/a:redhat:rhmt:1.7::el8"
] | null | 7.5 | null | null |
RHSA-2017:2771 | Red Hat Security Advisory: emacs security update | emacs: command injection flaw within "enriched mode" handling | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 8.1 | null |
RHSA-2020:3723 | Red Hat Security Advisory: chromium-browser security update | chromium-browser: Use after free in presentation API chromium-browser: Insufficient policy enforcement in autofill chromium-browser: Inappropriate implementation in Content Security Policy chromium-browser: Insufficient policy enforcement in Blink chromium-browser: Insufficient policy enforcement in intent handling chromium-browser: Incorrect security UI in permissions chromium-browser: Incorrect security UI in Omnibox chromium-browser: Insufficient policy enforcement in media chromium-browser: Insufficient validation of untrusted input in command line handling chromium-browser: Insufficient policy enforcement in intent handling chromium-browser: Integer overflow in WebUSB chromium-browser: Side-channel information leakage in WebRTC chromium-browser: Incorrect security UI in Omnibox | [
"cpe:/a:redhat:rhel_extras:6"
] | null | 8.8 | null | null |
RHSA-2023:4286 | Red Hat Security Advisory: Red Hat OpenShift Dev Spaces Security Update | openshift: OCP & FIPS mode | [
"cpe:/a:redhat:openshift_devspaces:3::el8"
] | null | 6.5 | null | null |
RHSA-2023:0469 | Red Hat Security Advisory: Red Hat Integration Camel Extensions For Quarkus 2.13.2 | jettison: parser crash by stackoverflow jettison: memory exhaustion via user-supplied XML or JSON data xstream: Xstream to serialise XML data was vulnerable to Denial of Service attacks woodstox-core: woodstox to serialise XML data was vulnerable to Denial of Service attacks xstream: Xstream to serialise XML data was vulnerable to Denial of Service attacks xstream: Xstream to serialise XML data was vulnerable to Denial of Service attacks xstream: Xstream to serialise XML data was vulnerable to Denial of Service attacks xstream: Xstream to serialise XML data was vulnerable to Denial of Service attacks jackson-databind: deep wrapper array nesting wrt UNWRAP_SINGLE_VALUE_ARRAYS jackson-databind: use of deeply nested arrays apache-commons-text: variable interpolation RCE | [
"cpe:/a:redhat:camel_quarkus:2.13"
] | null | 9.8 | null | null |
RHSA-2024:4563 | Red Hat Security Advisory: java-1.8.0-openjdk security update | OpenJDK: potential UTF8 size overflow (8314794) OpenJDK: Excessive symbol length can lead to infinite loop (8319859) OpenJDK: Range Check Elimination (RCE) pre-loop limit overflow (8320548) OpenJDK: Pack200 increase loading time due to improper header validation (8322106) OpenJDK: Out-of-bounds access in 2D image handling (8324559) OpenJDK: RangeCheckElimination array index overflow (8323231) | [
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb",
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::crb",
"cpe:/a:redhat:rhel_aus:8.2::appstream",
"cpe:/a:redhat:rhel_aus:8.4::appstream",
"cpe:/a:redhat:rhel_aus:8.6::appstream",
"cpe:/a:redhat:rhel_e4s:8.4::appstream",
"cpe:/a:redhat:rhel_e4s:8.6::appstream",
"cpe:/a:redhat:rhel_e4s:9.0::appstream",
"cpe:/a:redhat:rhel_eus:8.8::appstream",
"cpe:/a:redhat:rhel_eus:8.8::crb",
"cpe:/a:redhat:rhel_eus:9.2::appstream",
"cpe:/a:redhat:rhel_eus:9.2::crb",
"cpe:/a:redhat:rhel_tus:8.4::appstream",
"cpe:/a:redhat:rhel_tus:8.6::appstream"
] | null | 7.4 | null | null |
RHSA-2020:1461 | Red Hat Security Advisory: nss-softokn security update | ROHNP: Key Extraction Side Channel in Multiple Crypto Libraries nss: Out-of-bounds write when passing an output buffer smaller than the block size to NSC_EncryptUpdate | [
"cpe:/o:redhat:rhel_eus:7.6::computenode",
"cpe:/o:redhat:rhel_eus:7.6::server"
] | null | null | 8.1 | null |
RHSA-2023:5184 | Red Hat Security Advisory: firefox security update | libwebp: Heap buffer overflow in WebP Codec libwebp: out-of-bounds write with a specially crafted WebP lossless file | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 0 | null | null |
RHSA-2024:6153 | Red Hat Security Advisory: 389-ds-base security update | 389-ds-base: Malformed userPassword hash may cause Denial of Service | [
"cpe:/o:redhat:rhel_els:7"
] | null | 5.7 | null | null |
RHSA-2025:2490 | Red Hat Security Advisory: kernel security update | kernel: nvmem: Fix shift-out-of-bound (UBSAN) with byte size cells kernel: platform/x86: think-lmi: Fix reference leak kernel: hwrng: core - Fix page fault dead lock on mmap-ed hwrng kernel: can: bcm: Fix UAF in bcm_proc_show() kernel: x86/fpu: Stop relying on userspace for info to fault in xsave buffer that cause loop forever kernel: RDMA/srpt: Support specifying the srpt_service_guid parameter kernel: x86/fpu: Keep xfd_state in sync with MSR_IA32_XFD kernel: leds: trigger: Unregister sysfs attributes before calling deactivate() kernel: HID: core: zero-initialize the report buffer kernel: ALSA: usb-audio: Fix potential out-of-bound accesses for Extigy and Mbox devices | [
"cpe:/a:redhat:rhel_eus:9.4::appstream",
"cpe:/a:redhat:rhel_eus:9.4::crb",
"cpe:/a:redhat:rhel_eus:9.4::nfv",
"cpe:/a:redhat:rhel_eus:9.4::realtime",
"cpe:/o:redhat:rhel_eus:9.4::baseos"
] | null | 5.8 | null | null |
RHSA-2023:4959 | Red Hat Security Advisory: firefox security update | Mozilla: Full screen notification obscured by file open dialog Mozilla: Full screen notification obscured by external program Mozilla: Memory corruption in IPC CanvasTranslator Mozilla: Memory corruption in IPC ColorPickerShownCallback Mozilla: Memory corruption in IPC FilePickerShownCallback Mozilla: Memory corruption in JIT UpdateRegExpStatics Mozilla: Error reporting methods in SpiderMonkey could have triggered an Out of Memory Exception Mozilla: Push notifications saved to disk unencrypted Mozilla: XLL file extensions were downloadable without warnings Mozilla: Browsing Context potentially not cleared when closing Private Window Mozilla: Memory safety bugs fixed in Firefox 117, Firefox ESR 102.15, Firefox ESR 115.2, Thunderbird 102.15, and Thunderbird 115.2 Mozilla: Memory safety bugs fixed in Firefox 117, Firefox ESR 115.2, and Thunderbird 115.2 | [
"cpe:/a:redhat:rhel_eus:8.6::appstream"
] | null | 8.8 | null | null |
RHSA-2025:0880 | Red Hat Security Advisory: tuned security update | tuned: `script_pre` and `script_post` options allow to pass arbitrary scripts executed by root tuned: improper sanitization of `instance_name` parameter of the `instance_create()` method | [
"cpe:/o:redhat:enterprise_linux:8::fastdatapath"
] | null | 5.5 | null | null |
RHSA-2020:1449 | Red Hat Security Advisory: OpenShift Container Platform 4.1.41 security update | buildah: Crafted input tar file may lead to local file overwrite during image build process | [
"cpe:/a:redhat:openshift:4.1::el8"
] | null | 8.8 | null | null |
RHSA-2024:9625 | Red Hat Security Advisory: squid security update | squid: Denial of Service processing ESI response content | [
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 7.5 | null | null |
RHSA-2011:1268 | Red Hat Security Advisory: firefox security update | Updated firefox packages that fix one security issue are now available for
Red Hat Enterprise Linux 4, 5, and 6.
The Red Hat Security Response Team has rated this update as having
important security impact. | [
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws",
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server",
"cpe:/o:redhat:enterprise_linux:6::server"
] | null | null | null | null |
RHSA-2016:0560 | Red Hat Security Advisory: Red Hat Enterprise Linux 4 Extended Life Cycle Support One-year Notice | This is the one-year notification for the retirement of Red Hat Enterprise
Linux 4 Extended Life Cycle Support (ELS). This notice applies only to
those customers subscribed to the Extended Life Cycle Support (ELS) channel
for Red Hat Enterprise Linux 4 in the Customer Portal. | [
"cpe:/o:redhat:rhel_els:4::as",
"cpe:/o:redhat:rhel_els:4::es"
] | null | null | null | null |
RHSA-2019:3525 | Red Hat Security Advisory: dhcp security and bug fix update | dhcp: double-deletion of the released addresses in the dhcpv6 code leading to crash and possible DoS | [
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | null | 5.9 | null |
RHSA-2024:3918 | Red Hat Security Advisory: OpenShift Container Platform 4.14.30 packages and security update | ssh: Prefix truncation attack on Binary Packet Protocol (BPP) | [
"cpe:/a:redhat:openshift:4.14::el8",
"cpe:/a:redhat:openshift:4.14::el9"
] | null | 5.9 | null | null |
RHSA-2024:6997 | Red Hat Security Advisory: kernel security update | kernel: uio: Fix use-after-free in uio_open kernel: Input: cyapa - add missing input core locking to suspend/resume functions kernel: net/sched: act_mirred: don't override retval if we already lost the skb kernel: scsi: qla2xxx: Fix double free of fcport kernel: scsi: qla2xxx: Fix double free of the ha->vp_map pointer kernel: scsi: qla2xxx: Fix command flush on cable pull kernel: ARM: 9359/1: flush: check if the folio is reserved for no-mapping addresses kernel: KVM: x86/mmu: x86: Don't overflow lpage_info when checking attributes kernel: fork: defer linking file vma until vma is fully initialized kernel: bpf, sockmap: Prevent lock inversion deadlock in map delete elem kernel: tty: n_gsm: fix possible out-of-bounds in gsm0_receive() kernel: gpiolib: cdev: Fix use after free in lineinfo_changed_notify kernel: wifi: nl80211: Avoid address calculations via out of bounds array indexing kernel: gfs2: Fix potential glock use-after-free on unmount kernel: cppc_cpufreq: Fix possible null pointer dereference kernel: ring-buffer: Fix a race between readers and resize checks kernel: cpufreq: exit() callback is optional kernel: ACPICA: Revert "ACPICA: avoid Info: mapping multiple BARs. Your kernel is fine." kernel: wifi: mac80211: Avoid address calculations via out of bounds array indexing kernel: wifi: mt76: replace skb_put with skb_put_zero kernel: net, sunrpc: Remap EPERM in case of connection failure in xs_tcp_setup_socket | [
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::crb",
"cpe:/a:redhat:enterprise_linux:9::nfv",
"cpe:/a:redhat:enterprise_linux:9::realtime",
"cpe:/o:redhat:enterprise_linux:9::baseos"
] | null | 5.5 | null | null |
RHSA-2007:0286 | Red Hat Security Advisory: gdm security and bug fix update | security flaw | [
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2023:6793 | Red Hat Security Advisory: rh-python38-python security update | python: tarfile module directory traversal pypa-setuptools: Regular Expression Denial of Service (ReDoS) in package_index.py python-wheel: remote attackers can cause denial of service via attacker controlled input to wheel cli python: CPU denial of service via inefficient IDNA decoder python-cryptography: memory corruption via immutable objects python: urllib.parse url blocklisting bypass python-requests: Unintended leak of Proxy-Authorization header python: TLS handshake bypass | [
"cpe:/a:redhat:rhel_software_collections:3::el7"
] | null | 8.6 | null | null |
RHBA-2018:0489 | Red Hat Bug Fix Advisory: Red Hat OpenShift Container Platform 3.9 RPM Release Advisory | atomic-openshift: image import whitelist can be bypassed by creating an imagestream or using oc tag atomic-openshift: cluster-reader can escalate to creating builds via webhooks in any project | [
"cpe:/a:redhat:openshift:3.9::el7"
] | null | null | 5 | null |
RHSA-2023:1559 | Red Hat Security Advisory: kernel security and bug fix update | kernel: use-after-free caused by l2cap_reassemble_sdu() in net/bluetooth/l2cap_core.c ALSA: pcm: Move rwsem lock inside snd_ctl_elem_read to prevent UAF | [
"cpe:/o:redhat:rhel_aus:8.2::baseos",
"cpe:/o:redhat:rhel_e4s:8.2::baseos",
"cpe:/o:redhat:rhel_tus:8.2::baseos"
] | null | 7.8 | null | null |
RHSA-2019:3287 | Red Hat Security Advisory: php security update | php: underflow in env_path_info in fpm_main.c | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | 8.1 | null |
RHSA-2023:0970 | Red Hat Security Advisory: httpd security and bug fix update | httpd: mod_dav: out-of-bounds read/write of zero byte httpd: mod_proxy_ajp: Possible request smuggling httpd: mod_proxy: HTTP response splitting | [
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 5.3 | null | null |
RHSA-2015:0836 | Red Hat Security Advisory: openstack-swift security update | openstack-swift: Swift metadata constraints are not correctly enforced | [
"cpe:/a:redhat:openstack:5::el6"
] | null | null | null | null |
RHSA-2023:7523 | Red Hat Security Advisory: fence-agents security update | python-certifi: Removal of e-Tugra root certificate python-urllib3: Cookie request header isn't stripped during cross-origin redirects | [
"cpe:/a:redhat:rhel_aus:8.4::appstream",
"cpe:/a:redhat:rhel_e4s:8.4::appstream",
"cpe:/a:redhat:rhel_e4s:8.4::highavailability",
"cpe:/a:redhat:rhel_tus:8.4::appstream",
"cpe:/a:redhat:rhel_tus:8.4::highavailability"
] | null | 5.9 | null | null |
RHSA-2021:3488 | Red Hat Security Advisory: Red Hat OpenStack Platform 16.2 (openstack-neutron) security update | openstack-neutron: arbitrary dnsmasq reconfiguration via extra_dhcp_opts | [
"cpe:/a:redhat:openstack:16.2::el8"
] | null | 7.6 | null | null |
RHSA-2022:7146 | Red Hat Security Advisory: kernel security update | kernel: a use-after-free in cls_route filter implementation may lead to privilege escalation | [
"cpe:/o:redhat:rhel_aus:7.4::server"
] | null | 7.8 | null | null |
RHSA-2009:1451 | Red Hat Security Advisory: freeradius security update | FreeRADIUS: Missing check for Tunnel-Password attributes with zero length (DoS) -- re-appearance of CVE-2003-0967 | [
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2005:410 | Red Hat Security Advisory: gftp security update | security flaw | [
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws",
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2007:0019 | Red Hat Security Advisory: gtk2 security update | security flaw | [
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2024:8935 | Red Hat Security Advisory: edk2 security update | openssl: Possible denial of service in X.509 name checks | [
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::crb"
] | null | 5.9 | null | null |
RHSA-2016:0055 | Red Hat Security Advisory: java-1.8.0-oracle security update | TLS 1.2 Transcipt Collision attacks against MD5 in key exchange protocol (SLOTH) libpng: Buffer overflow vulnerabilities in png_get_PLTE/png_set_PLTE functions libpng: Buffer overflow vulnerabilities in png_get_PLTE/png_set_PLTE functions OpenJDK: URL deserialization inconsistencies (Networking, 8059054) OpenJDK: logging of RMI connection secrets (JMX, 8130710) OpenJDK: insufficient enforcement of totalEntitySizeLimit (JAXP, 8133962) OpenJDK: PBE incorrect key lengths (Libraries, 8138589) OpenJDK: incorrect boundary check in JPEG decoder (AWT, 8139017) ICU: integer signedness issue in IndicRearrangementProcessor (OpenJDK 2D, 8140543) | [
"cpe:/a:redhat:rhel_extras_oracle_java:6",
"cpe:/a:redhat:rhel_extras_oracle_java:7"
] | null | null | null | null |
RHSA-2009:1341 | Red Hat Security Advisory: cman security, bug fix, and enhancement update | cman/fence: insecure temporary file usage in the apc fence agents rgmanager: multiple insecure temporary file use issues | [
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2016:2127 | Red Hat Security Advisory: kernel security update | kernel: mm: privilege escalation via MAP_PRIVATE COW breakage | [
"cpe:/o:redhat:rhel_mission_critical:5.6"
] | null | null | 7.8 | null |
RHSA-2024:6358 | Red Hat Security Advisory: python-urllib3 security update | urllib3: proxy-authorization request header is not stripped during cross-origin redirects | [
"cpe:/o:redhat:rhel_e4s:9.0::baseos"
] | null | 4.4 | null | null |
RHSA-2008:0832 | Red Hat Security Advisory: JBoss Enterprise Application Platform 4.3.0CP02 security update | Apache Tomcat's default security policy is too open JBossEAP allows download of non-EJB class files | [
"cpe:/a:redhat:jboss_enterprise_application_platform:4.3.0::el5"
] | null | null | null | null |
RHSA-2013:0133 | Red Hat Security Advisory: hplip3 security and bug fix update | hplip: insecure temporary file handling | [
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2023:3082 | Red Hat Security Advisory: pcs security and bug fix update | rubygem-rack: Denial of service in Multipart MIME parsing rubygem-rack: denial of service in header parsing | [
"cpe:/a:redhat:enterprise_linux:8::highavailability",
"cpe:/a:redhat:enterprise_linux:8::resilientstorage"
] | null | 5.3 | null | null |
RHSA-2024:4766 | Red Hat Security Advisory: python3 security update | python: incorrect IPv4 and IPv6 private ranges | [
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::crb"
] | null | 3.7 | null | null |
RHSA-2023:3420 | Red Hat Security Advisory: Red Hat JBoss Web Server 5.7.3 release and security update | openssl: timing attack in RSA Decryption implementation openssl: double free after calling PEM_read_bio_ex openssl: use-after-free following BIO_new_NDEF openssl: X.400 address type confusion in X.509 GeneralName | [
"cpe:/a:redhat:jboss_enterprise_web_server:5.7::el7",
"cpe:/a:redhat:jboss_enterprise_web_server:5.7::el8",
"cpe:/a:redhat:jboss_enterprise_web_server:5.7::el9"
] | null | 7.4 | null | null |
RHSA-2021:1761 | Red Hat Security Advisory: python27:2.7 security and bug fix update | python: CRLF injection via HTTP request method in httplib/http.client python-urllib3: CRLF injection via HTTP request method python-lxml: mXSS due to the use of improper parser python: Stack-based buffer overflow in PyCArg_repr in _ctypes/callproc.c | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 5.9 | null | null |
RHSA-2012:0370 | Red Hat Security Advisory: xen security and bug fix update | qemu: e1000: process_tx_desc legacy mode packets heap overflow | [
"cpe:/a:redhat:rhel_virtualization:5::client",
"cpe:/a:redhat:rhel_virtualization:5::server",
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2022:6079 | Red Hat Security Advisory: Red Hat Ansible Automation Platform 2.2.0 Product Security Update | Ansible: Logic flaw leads to privilage escalation | [
"cpe:/a:redhat:ansible_automation_platform:2.2::el8",
"cpe:/a:redhat:ansible_automation_platform:2.2::el9"
] | null | 7.2 | null | null |
RHSA-2022:6172 | Red Hat Security Advisory: rsync security update | rsync: remote arbitrary files write inside the directories of connecting peers | [
"cpe:/o:redhat:rhel_eus:8.2::baseos"
] | null | 7.4 | null | null |
RHSA-2015:2393 | Red Hat Security Advisory: wireshark security, bug fix, and enhancement update | wireshark: SigComp dissector crash (wnpa-sec-2014-20) wireshark: AMQP dissector crash (wnpa-sec-2014-21) wireshark: NCP dissector crashes (wnpa-sec-2014-22) wireshark: NCP dissector crashes (wnpa-sec-2014-22) wireshark: TN5250 infinite loop (wnpa-sec-2014-23) wireshark: DEC DNA Routing Protocol dissector crash (wnpa-sec-2015-03) wireshark: SMTP dissector crash (wnpa-sec-2015-04) wireshark: TLS/SSL decryption crash (wnpa-sec-2015-05) wireshark: The WCP dissector could crash while decompressing data (wnpa-sec-2015-07) wireshark: The pcapng file parser could crash (wnpa-sec-2015-08) wireshark: The TNEF dissector could go into an infinite loop on 32-bit architectures (wnpa-sec-2015-10) wireshark: crash on sample file genbroad.snoop wireshark: WebSocket DoS (wnpa-sec-2015-13) wireshark: WCP dissector crash (wnpa-sec-2015-14) wireshark: X11 memory leak (wnpa-sec-2015-15) wireshark: Reassembly memory leak (wnpa-sec-2015-16) wireshark: Dissector table crash (wnpa-sec-2015-23) wireshark: ZigBee dissector crash (wnpa-sec-2015-24) wireshark: GSM RLC/MAC dissector infinite loop (wnpa-sec-2015-25) wireshark: WaveAgent dissector crash (wnpa-sec-2015-26) wireshark: Ptvcursor crash (wnpa-sec-2015-28) | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | null | null |
RHSA-2016:1476 | Red Hat Security Advisory: java-1.7.0-oracle security update | OpenJDK: insufficient restrictions on the use of custom ValueHandler (CORBA, 8079718) JDK: unspecified vulnerability fixed in 7u111 and 8u101 (JavaFX) OpenJDK: maximum XML name limit not applied to namespace URIs (JAXP, 8148872) JDK: unspecified vulnerability fixed in 6u121, 7u111, and 8u101 (Install) OpenJDK: missing entity replacement limits (JAXP, 8149962) JDK: unspecified vulnerability fixed in 7u111 and 8u101 (Deployment) OpenJDK: integer overflows in bytecode streams (Hotspot, 8152479) OpenJDK: insufficient bytecode verification (Hotspot, 8155981) | [
"cpe:/a:redhat:rhel_extras_oracle_java:5",
"cpe:/a:redhat:rhel_extras_oracle_java:6",
"cpe:/a:redhat:rhel_extras_oracle_java:7"
] | null | null | 8.8 | null |
RHSA-2009:1680 | Red Hat Security Advisory: xpdf security update | xpdf: buffer overflow in FoFiType1::parse | [
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2009:1127 | Red Hat Security Advisory: kdelibs security update | kdelibs: Integer overflow in KJS JavaScript garbage collector kdelibs: KHTML Incorrect handling <head> element content once the <head> element was removed (DoS, ACE) kdelibs: KHTML CSS parser - incorrect handling CSS "style" attribute content (DoS, ACE) | [
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws",
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2018:0475 | Red Hat Security Advisory: Red Hat OpenShift Container Platform security update | kubernetes: Volume security can be sidestepped with innocent emptyDir and subpath kubernetes: Malicious containers can delete any file from the node | [
"cpe:/a:redhat:openshift:3.3::el7",
"cpe:/a:redhat:openshift:3.4::el7",
"cpe:/a:redhat:openshift:3.5::el7",
"cpe:/a:redhat:openshift:3.6::el7",
"cpe:/a:redhat:openshift:3.7::el7"
] | null | null | 7.1 | null |
RHSA-2025:3997 | Red Hat Security Advisory: mod_auth_openidc:2.3 security update | mod_auth_openidc: mod_auth_openidc allows OIDCProviderAuthRequestMethod POSTs to leak protected data | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 7.5 | null | null |
RHSA-2012:0060 | Red Hat Security Advisory: openssl security update | openssl: DTLS plaintext recovery attack openssl: double-free in policy checks openssl: uninitialized SSL 3.0 padding openssl: SGC restart DoS attack | [
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2019:0766 | Red Hat Security Advisory: mod_auth_mellon security and bug fix update | mod_auth_mellon: open redirect in logout url when using URLs with backslashes mod_auth_mellon: authentication bypass in ECP flow | [
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 8.1 | null |
RHSA-2021:0691 | Red Hat Security Advisory: bind security update | bind: Buffer overflow in the SPNEGO implementation affecting GSSAPI security policy negotiation | [
"cpe:/o:redhat:rhel_eus:7.6::computenode",
"cpe:/o:redhat:rhel_eus:7.6::server"
] | null | 8.1 | null | null |
RHSA-2022:0331 | Red Hat Security Advisory: samba security and bug fix update | samba: Out-of-bounds heap read/write vulnerability in VFS module vfs_fruit allows code execution | [
"cpe:/a:redhat:rhel_eus:8.4::crb",
"cpe:/o:redhat:rhel_eus:8.4::baseos"
] | null | 9.9 | null | null |
RHSA-2008:0164 | Red Hat Security Advisory: krb5 security and bugfix update | krb5: use-after-free in gssapi lib krb5: double free in gssapi lib krb5: uninitialized pointer use in krb5kdc krb5: possible leak of sensitive data from krb5kdc using krb4 request krb5: file descriptor array overflow in RPC library | [
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2023:3610 | Red Hat Security Advisory: jenkins and jenkins-2-plugins security update | jackson-databind: Possible DoS if using JDK serialization to serialize JsonNode maven-shared-utils: Command injection via Commandline class plugin: CSRF vulnerability in Blue Ocean Plugin plugin: missing permission checks in Blue Ocean Plugin jettison: parser crash by stackoverflow jettison: memory exhaustion via user-supplied XML or JSON data jettison: If the value in map is the map's self, the new new JSONObject(map) cause StackOverflowError which may lead to dos json-smart: Uncontrolled Resource Consumption vulnerability in json-smart (Resource Exhaustion) springframework: Security Bypass With Un-Prefixed Double Wildcard Pattern springframework: Spring Expression DoS Vulnerability jenkins-2-plugins/script-security: Sandbox bypass vulnerability in Script Security Plugin jenkins-2-plugin: workflow-job: Stored XSS vulnerability in Pipeline: Job Plugin jenkins-2-plugin: pipeline-utility-steps: Arbitrary file write vulnerability on agents in Pipeline Utility Steps Plugin | [
"cpe:/a:redhat:ocp_tools:4.12::el8"
] | null | 6.3 | null | null |
RHSA-2022:2189 | Red Hat Security Advisory: kernel security update | kernel: use-after-free in RDMA listen() kernel: fget: check that the fd still exists after getting a ref to it kernel: cgroups v1 release_agent feature may allow privilege escalation | [
"cpe:/o:redhat:rhel_aus:7.3::server"
] | null | 7 | null | null |
RHSA-2021:3439 | Red Hat Security Advisory: kernel-rt security and bug fix update | kernel: use-after-free in route4_change() in net/sched/cls_route.c | [
"cpe:/a:redhat:rhel_extras_rt:7"
] | null | 7.8 | null | null |
RHBA-2021:0231 | Red Hat Bug Fix Advisory: OpenShift Container Platform 4.5.30 bug fix update | openshift: builder allows read and write of block devices | [
"cpe:/a:redhat:openshift:4.5::el7",
"cpe:/a:redhat:openshift:4.5::el8"
] | null | 8.8 | null | null |
RHSA-2023:5196 | Red Hat Security Advisory: frr security and bug fix update | frr: Incorrect handling of a error in parsing of an invalid section of a BGP update can de-peer a router | [
"cpe:/a:redhat:rhel_aus:8.4::appstream",
"cpe:/a:redhat:rhel_e4s:8.4::appstream",
"cpe:/a:redhat:rhel_tus:8.4::appstream"
] | null | 7.5 | null | null |
RHSA-2011:1531 | Red Hat Security Advisory: qemu-kvm security, bug fix, and enhancement update | qemu: when started as root, extra groups are not dropped correctly | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2025:3587 | Red Hat Security Advisory: firefox security update | firefox: thunderbird: Use-after-free triggered by XSLTProcessor firefox: thunderbird: URL Bar Spoofing via non-BMP Unicode characters firefox: thunderbird: Memory safety bugs fixed in Firefox 137, Thunderbird 137, Firefox ESR 128.9, and Thunderbird 128.9 | [
"cpe:/a:redhat:rhel_e4s:9.0::appstream"
] | null | 8.8 | null | null |
RHSA-2019:4195 | Red Hat Security Advisory: thunderbird security update | Mozilla: Buffer overflow in plain text serializer Mozilla: Use-after-free in worker destruction Mozilla: Use-after-free when performing device orientation checks Mozilla: Use-after-free when retrieving a document in antitracking Mozilla: Memory safety bugs fixed in Firefox 71 and Firefox ESR 68.3 | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 8.8 | null | null |
RHSA-2023:5430 | Red Hat Security Advisory: thunderbird security update | firefox: use-after-free in workers Mozilla: Out-of-bounds write in PathOps Mozilla: Use-after-free in Ion Compiler Mozilla: Memory safety bugs fixed in Firefox 118, Firefox ESR 115.3, and Thunderbird 115.3 libvpx: Heap buffer overflow in vp8 encoding in libvpx | [
"cpe:/a:redhat:rhel_eus:8.6::appstream"
] | null | 8.8 | null | null |
RHSA-2011:0337 | Red Hat Security Advisory: vsftpd security update | vsftpd: remote DoS via crafted glob pattern | [
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:5::server",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2021:3016 | Red Hat Security Advisory: Red Hat Advanced Cluster Management for Kubernetes version 2.3 | nodejs-glob-parent: Regular expression denial of service nodejs-lodash: ReDoS via the toNumber, trim and trimEnd functions golang.org/x/text: Panic in language.ParseAcceptLanguage while parsing -u- extension golang.org/x/text: Panic in language.ParseAcceptLanguage while processing bcp47 tag nodejs-ansi_up: XSS due to insufficient URL sanitization oras: zip-slip vulnerability via oras-pull redis: integer overflow when configurable limit for maximum supported bulk input size is too big on 32-bit platforms fastify-reply-from: crafted URL allows prefix scape of the proxied backend service fastify-http-proxy: crafted URL allows prefix scape of the proxied backend service nodejs-lodash: command injection via template nodejs-path-parse: ReDoS via splitDeviceRe, splitTailRe and splitPathRe html-parse-stringify: Regular Expression DoS nodejs-hosted-git-info: Regular Expression denial of service via shortcutMatch in fromUrl() browserslist: parsing of invalid queries could result in Regular Expression Denial of Service (ReDoS) nodejs-postcss: Regular expression denial of service during source map parsing nodejs-handlebars: Remote code execution when compiling untrusted compile templates with strict:true option nodejs-postcss: ReDoS via getAnnotationURL() and loadAnnotation() in lib/previous-map.js nodejs-handlebars: Remote code execution when compiling untrusted compile templates with compat:true option openssl: incorrect SSLv2 rollback protection openssl: integer overflow in CipherUpdate openssl: NULL pointer dereference in X509_issuer_and_serial_hash() nodejs-ua-parser-js: ReDoS via malicious User-Agent header grafana: snapshot feature allow an unauthenticated remote attacker to trigger a DoS via a remote API call nodejs-is-svg: ReDoS via malicious string nodejs-netmask: improper input validation of octal input data nodejs-netmask: incorrectly parses an IP address that has octal integer with invalid character redis: Integer overflow via STRALGO LCS command redis: Integer overflow via COPY command for large intsets ulikunitz/xz: Infinite loop in readUvarint allows for denial of service nodejs-normalize-url: ReDoS for data URLs nodejs-trim-newlines: ReDoS in .end() method | [
"cpe:/a:redhat:acm:2.3::el7",
"cpe:/a:redhat:acm:2.3::el8"
] | null | 7.5 | null | null |
RHSA-2020:1461 | Red Hat Security Advisory: nss-softokn security update | ROHNP: Key Extraction Side Channel in Multiple Crypto Libraries nss: Out-of-bounds write when passing an output buffer smaller than the block size to NSC_EncryptUpdate | [
"cpe:/o:redhat:rhel_eus:7.6::computenode",
"cpe:/o:redhat:rhel_eus:7.6::server"
] | null | null | 8.1 | null |
RHSA-2016:0128 | Red Hat Security Advisory: openstack-swift security update | openstack-swift: Client to proxy DoS through Large Objects openstack-swift: Proxy to server DoS through Large Objects | [
"cpe:/a:redhat:openstack:6::el7"
] | null | null | null | null |
RHSA-2012:1156 | Red Hat Security Advisory: kernel security and bug fix update | kernel: bt sco_conninfo infoleak kernel: drm/i915: integer overflow in i915_gem_execbuffer2() | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2019:1699 | Red Hat Security Advisory: redhat-virtualization-host security and enhancement update | libvirt: arbitrary file read/exec via virDomainSaveImageGetXMLDesc API libvirt: virDomainManagedSaveDefineXML API exposed to readonly clients libvirt: arbitrary command execution via virConnectGetDomainCapabilities API libvirt: arbitrary command execution via virConnectBaselineHypervisorCPU and virConnectCompareHypervisorCPU APIs Kernel: tcp: integer overflow while processing SACK blocks allows remote denial of service Kernel: tcp: excessive resource consumption while processing SACK blocks allows remote denial of service kernel: tcp: excessive resource consumption for TCP connections with low MSS allows remote denial of service | [
"cpe:/o:redhat:enterprise_linux:7::hypervisor"
] | null | null | 5.3 | null |
RHSA-2010:0610 | Red Hat Security Advisory: kernel security and bug fix update | kernel: bluetooth: potential bad memory access with sysfs files kernel: ext4: Make sure the MOVE_EXT ioctl can't overwrite append-only files /kernel/security/CVE-2006-0742 test cause kernel-xen panic on ia64 kernel: xfs swapext ioctl minor security issue kernel: cifs: Fix a kernel BUG with remote OS/2 server kernel: nfsd4: bug in read_buf kernel: dns_resolver upcall security issue | [
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2024:11562 | Red Hat Security Advisory: OpenShift Container Platform 4.15.42 bug fix and security update | go-retryablehttp: url might write sensitive information to log file | [
"cpe:/a:redhat:openshift:4.15::el8",
"cpe:/a:redhat:openshift:4.15::el9"
] | null | 6 | null | null |
RHSA-2024:6964 | Red Hat Security Advisory: virt:rhel and virt-devel:rhel security update | QEMU: virtio: DMA reentrancy issue leads to double free vulnerability libnbd: NBD server improper certificate validation QEMU: Denial of Service via Improper Synchronization in QEMU NBD Server During Socket Closure | [
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb"
] | null | 7.4 | 7.5 | null |
RHSA-2024:0431 | Red Hat Security Advisory: kernel-rt security and bug fix update | kernel: xfrm_expand_policies() in net/xfrm/xfrm_policy.c can cause a refcount to be dropped twice kernel: null-ptr-deref vulnerabilities in sl_tx_timeout in drivers/net/slip kernel: use-after-free caused by invalid pointer hostname in fs/cifs/connect.c kernel: UAF during login when accessing the shost ipaddress kernel: use after free in vcs_read in drivers/tty/vt/vc_screen.c due to race kernel: use-after-free in netfilter: nf_tables kernel: net/sched: sch_hfsc UAF kernel: use after free in nvmet_tcp_free_crypto in NVMe kernel: IGB driver inadequate buffer size for frames larger than MTU kernel: SEV-ES local priv escalation | [
"cpe:/a:redhat:rhel_eus:9.0::nfv",
"cpe:/a:redhat:rhel_eus:9.0::realtime"
] | null | 7 | null | null |
RHSA-2023:4496 | Red Hat Security Advisory: thunderbird security update | thunderbird: File Extension Spoofing using the Text Direction Override Character Mozilla: Offscreen Canvas could have bypassed cross-origin restrictions Mozilla: Incorrect value used during WASM compilation Mozilla: Potential permissions request bypass via clickjacking Mozilla: Crash in DOMParser due to out-of-memory conditions Mozilla: Fix potential race conditions when releasing platform objects Mozilla: Stack buffer overflow in StorageManager Mozilla: Cookie jar overflow caused unexpected cookie jar state Mozilla: Memory safety bugs fixed in Firefox 116, Firefox ESR 115.1, Firefox ESR 102.14, Thunderbird 115.1, and Thunderbird 102.14 Mozilla: Memory safety bugs fixed in Firefox ESR 115.1, and Thunderbird 115.1 | [
"cpe:/a:redhat:rhel_aus:8.2::appstream",
"cpe:/a:redhat:rhel_e4s:8.2::appstream",
"cpe:/a:redhat:rhel_tus:8.2::appstream"
] | null | 9.8 | null | null |
RHSA-2023:3623 | Red Hat Security Advisory: Red Hat Ceph Storage 6.1 security and bug fix update | angular: XSS vulnerability moment: inefficient parsing algorithm resulting in DoS | [
"cpe:/a:redhat:ceph_storage:6.1::el9"
] | null | 7.5 | null | null |
RHSA-2024:4462 | Red Hat Security Advisory: ghostscript security update | ghostscript: OPVP device arbitrary code execution via custom Driver library | [
"cpe:/a:redhat:rhel_aus:8.6::appstream",
"cpe:/a:redhat:rhel_e4s:8.6::appstream",
"cpe:/a:redhat:rhel_tus:8.6::appstream"
] | null | 8.8 | null | null |
RHSA-2022:6696 | Red Hat Security Advisory: Red Hat Advanced Cluster Management 2.4.6 security update and bug fixes | golang: crypto/tls: session tickets lack random ticket_age_add moment: inefficient parsing algorithm resulting in DoS nodejs16: CRLF injection in node-undici nodejs/undici: Cookie headers uncleared on cross-origin redirect vm2: Sandbox Escape in vm2 | [
"cpe:/a:redhat:acm:2.4::el8"
] | null | 10 | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.