id
stringlengths 13
15
| title
stringlengths 29
176
| description
stringlengths 8
31.7k
| cpes
sequencelengths 0
20
| cvss_v4_0
null | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
null |
---|---|---|---|---|---|---|---|
RHSA-2019:1883 | Red Hat Security Advisory: qemu-kvm security update | QEMU: slirp: heap buffer overflow in tcp_emu() | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 7.8 | null |
RHBA-2023:1321 | Red Hat Bug Fix Advisory: OpenShift Container Platform 4.9.58 packages update | haproxy: segfault DoS | [
"cpe:/a:redhat:openshift:4.9::el7",
"cpe:/a:redhat:openshift:4.9::el8"
] | null | 4.3 | null | null |
RHSA-2012:0884 | Red Hat Security Advisory: openssh security, bug fix, and enhancement update | openssh: post-authentication resource exhaustion bug via GSSAPI | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2008:0110 | Red Hat Security Advisory: openldap security update | openldap: slapd crash on NOOP control operation on entry in bdb storage openldap: slapd crash on modrdn operation with NOOP control on entry in bdb storage | [
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws",
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2024:9481 | Red Hat Security Advisory: Red Hat OpenStack Platform 18.0.3 (python-django) security update | python-django: Potential denial-of-service in django.utils.html.urlize() python-django: Username enumeration through timing difference for users with unusable passwords python-django: Potential directory-traversal in django.core.files.storage.Storage.save() python-django: Potential denial-of-service in django.utils.translation.get_supported_language_variant() | [
"cpe:/a:redhat:openstack:18.0::el9"
] | null | 5.3 | null | null |
RHSA-2014:1647 | Red Hat Security Advisory: thunderbird security update | Mozilla: Miscellaneous memory safety hazards (rv:31.2) (MFSA 2014-74) Mozilla: Web Audio memory corruption issues with custom waveforms (MFSA 2014-76) Mozilla: Out-of-bounds write with WebM video (MFSA 2014-77) Mozilla: Use-after-free interacting with text directionality (MFSA 2014-79) | [
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2013:1116 | Red Hat Security Advisory: redhat-ds-base security and bug fix update | Server: ACLs inoperative in some search scenarios | [
"cpe:/a:redhat:directory_server:8::el5"
] | null | null | null | null |
RHBA-2015:1445 | Red Hat Bug Fix Advisory: xorg-x11-server bug fix and enhancement update | xorg-x11-server: divide-by-zero when checking image dimensions | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2014:0038 | Red Hat Security Advisory: Red Hat Enterprise Virtualization Manager 3.3.0 update | rhev: remote-viewer spice tls-stripping issue | [
"cpe:/a:redhat:rhev_manager:3"
] | null | null | null | null |
RHSA-2023:6595 | Red Hat Security Advisory: linux-firmware security, bug fix, and enhancement update | hw: intel: Improper access control for some Intel(R) PROSet/Wireless WiFi hw: intel: Improper input validation in some Intel(R) PROSet/Wireless WiFi hw: intel: Improper input validation in some Intel(R) PROSet/Wireless WiFi hw: intel: Improper access control for some Intel(R) PROSet/Wireless WiFi hw: intel: Protection mechanism failure for some Intel(R) PROSet/Wireless WiFi amd: Return Address Predictor vulnerability leading to information disclosure | [
"cpe:/o:redhat:enterprise_linux:9::baseos"
] | null | 5.6 | null | null |
RHSA-2004:180 | Red Hat Security Advisory: libpng security update | CAN-2004-0421 libpng can access out of bounds memory | [
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws"
] | null | null | null | null |
RHBA-2016:1501 | Red Hat Bug Fix Advisory: Red Hat Satellite 6.2 Capsule and Server | Foreman: API permits HTTP requests when require_ssl is enabled foreman: XSS in hidden parameter value switcher pulp: Node certificate containing private key stored in world-readable file pulp: Insecure temporary file used when generating certificate for Pulp Nodes pulp: Race condition when generating RSA keys for authenticating messages between server and consumers pulp: Agent certificate containing private key is stored in world-readable file foreman: Missing input validation in Smart Proxy allows RCE via TFTP file variant parameter | [
"cpe:/a:redhat:satellite:6.1::el6",
"cpe:/a:redhat:satellite:6.2::el7",
"cpe:/a:redhat:satellite_capsule:6.1::el6",
"cpe:/a:redhat:satellite_capsule:6.2::el7"
] | null | null | null | null |
RHSA-2020:3808 | Red Hat Security Advisory: OpenShift Container Platform 4.3.38 jenkins and openshift security update | jetty: double release of resource can lead to information disclosure jenkins: Stored XSS vulnerability in job build time trend jenkins: Stored XSS vulnerability in upstream cause jenkins: Stored XSS vulnerability in 'keep forever' badge icons jenkins: Stored XSS vulnerability in console links jenkins: user-specified tooltip values leads to stored cross-site scripting jenkins: stored XSS vulnerability in project naming strategy jenkins: stored XSS vulnerability in 'trigger builds remotely' kubernetes: Node disk DOS by writing to container /etc/hosts | [
"cpe:/a:redhat:openshift:4.3::el7",
"cpe:/a:redhat:openshift:4.3::el8"
] | null | 5.5 | null | null |
RHSA-2023:0808 | Red Hat Security Advisory: firefox security update | Mozilla: Content security policy leak in violation reports using iframes Mozilla: Extensions could have opened external schemes without user knowledge Mozilla: Screen hijack via browser fullscreen mode Mozilla: Out of bounds memory write from EncodeInputStream Mozilla: Potential use-after-free from compartment mismatch in SpiderMonkey Mozilla: Invalid downcast in SVGUtils::SetupStrokeGeometry Mozilla: Use-after-free in mozilla::dom::ScriptLoadContext::~ScriptLoadContext Mozilla: Web Crypto ImportKey crashes tab Mozilla: Fullscreen notification not shown in Firefox Focus Mozilla: Memory safety bugs fixed in Firefox 110 and Firefox ESR 102.8 Mozilla: Memory safety bugs fixed in Firefox ESR 102.8 | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 8.8 | null | null |
RHSA-2021:1195 | Red Hat Security Advisory: Red Hat JBoss Web Server 5.4.2 Security Update | openssl: NULL pointer dereference in signature_algorithms processing openssl: CA certificate check bypass with X509_V_FLAG_X509_STRICT | [
"cpe:/a:redhat:jboss_enterprise_web_server:5.4::el7",
"cpe:/a:redhat:jboss_enterprise_web_server:5.4::el8"
] | null | 7.4 | null | null |
RHSA-2022:0973 | Red Hat Security Advisory: virt:av and virt-devel:av qemu-kvm security update | QEMU: virtiofsd: potential privilege escalation via CVE-2018-13405 | [
"cpe:/a:redhat:advanced_virtualization:8.2::el8"
] | null | 7 | null | null |
RHSA-2016:0726 | Red Hat Security Advisory: ImageMagick security update | ImageMagick: Insufficient shell characters filtering ImageMagick: File deletion ImageMagick: File moving ImageMagick: Local file read ImageMagick: SSRF vulnerability | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation",
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 8.4 | null |
RHSA-2022:0073 | Red Hat Security Advisory: cpio security update | cpio: improper input validation when writing tar header fields leads to unexpected tar generation | [
"cpe:/o:redhat:rhel_eus:8.2::baseos"
] | null | null | 6.7 | null |
RHSA-2011:0336 | Red Hat Security Advisory: tomcat5 security update | JDK Double.parseDouble Denial-Of-Service | [
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2016:0516 | Red Hat Security Advisory: java-1.8.0-oracle security update | OpenJDK: missing type safety checks for MethodHandle calls across class loaders, incorrect CVE-2013-5838 fix (Hotspot, 8151666) | [
"cpe:/a:redhat:rhel_extras_oracle_java:6",
"cpe:/a:redhat:rhel_extras_oracle_java:7"
] | null | null | null | null |
RHSA-2022:0871 | Red Hat Security Advisory: OpenShift Container Platform 4.8.35 security update | CRI-O: Arbitrary code execution in cri-o via abusing “kernel.core_pattern” kernel parameter workflow-cps: OS command execution through crafted SCM contents workflow-cps-global-lib: OS command execution through crafted SCM contents workflow-multibranch: OS command execution through crafted SCM contents workflow-cps: Pipeline-related plugins follow symbolic links or do not limit path names workflow-cps-global-lib: Pipeline-related plugins follow symbolic links or do not limit path names workflow-cps-global-lib: Pipeline-related plugins follow symbolic links or do not limit path names workflow-multibranch: Pipeline-related plugins follow symbolic links or do not limit path names workflow-cps: Password parameters are included from the original build in replayed builds workflow-cps-global-lib: Sandbox bypass vulnerability workflow-cps-global-lib: Sandbox bypass vulnerability workflow-cps-global-lib: Sandbox bypass vulnerability pipeline-build-step: Password parameter default values exposed credentials: Stored XSS vulnerabilities in jenkins plugin subversion: Stored XSS vulnerabilities in Jenkins subversion plugin | [
"cpe:/a:redhat:openshift:4.8::el7",
"cpe:/a:redhat:openshift:4.8::el8"
] | null | 5.4 | null | null |
RHSA-2024:0799 | Red Hat Security Advisory: Red Hat Single Sign-On 7.6.7 security update on RHEL 8 | guava: insecure temporary directory creation keycloak: reflected XSS via wildcard in OIDC redirect_uri keycloak: redirect_uri validation bypass keycloak: Log Injection during WebAuthn authentication or registration keycloak: open redirect via "form_post.jwt" JARM response mode jetty-server: OutOfMemoryError for large multipart without filename read via request.getParameter() jetty-server: Cookie parsing of quoted values can exfiltrate values from other cookies santuario: Private Key disclosure in debug-log output | [
"cpe:/a:redhat:red_hat_single_sign_on:7.6::el8"
] | null | 6.5 | null | null |
RHSA-2023:5982 | Red Hat Security Advisory: Red Hat Satellite Client security and bug fix update | openssl: c_rehash script allows command injection openssl: the c_rehash script allows command injection golang: net/http: excessive memory growth in a Go server accepting HTTP/2 requests golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487) HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack) | [
"cpe:/a:redhat:rhel_satellite_client:6::el6",
"cpe:/a:redhat:rhel_satellite_client:6::el7",
"cpe:/a:redhat:rhel_satellite_client:6::el8",
"cpe:/a:redhat:rhel_satellite_client:6::el9"
] | null | 7.5 | null | null |
RHSA-2025:0951 | Red Hat Security Advisory: python-jinja2 security update | jinja2: Jinja has a sandbox breakout through indirect reference to format method | [
"cpe:/a:redhat:rhel_e4s:9.0::appstream"
] | null | 6.3 | null | null |
RHSA-2020:2966 | Red Hat Security Advisory: thunderbird security update | Mozilla: Information disclosure due to manipulated URL object Mozilla: Use-after-free in nsGlobalWindowInner Mozilla: Use-After-Free when trying to connect to a STUN server Mozilla: Add-On updates did not respect the same certificate trust rules as software updates Mozilla: Automatic account setup leaks Microsoft Exchange login credentials | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | 5.9 | 6.1 | null |
RHSA-2023:7789 | Red Hat Security Advisory: postgresql:10 security update | postgresql: Buffer overrun from integer overflow in array modification | [
"cpe:/a:redhat:rhel_eus:8.6::appstream"
] | null | 8.8 | null | null |
RHSA-2019:0040 | Red Hat Security Advisory: .NET Core on Red Hat Enterprise Linux security update | Core: NCL - SocketsHttpHandler mishandling 1xx response as a final response leads to info disclosure Core: AspNetCoreModule WebSocket DOS Core: Kestrel - WebSocket DoS via CancellationToken (CoreFX and ASP.NET) | [
"cpe:/a:redhat:rhel_dotnet:2.1::el7",
"cpe:/a:redhat:rhel_dotnet:2.2::el7"
] | null | null | 5.9 | null |
RHSA-2015:1603 | Red Hat Security Advisory: flash-plugin security update | flash-plugin: multiple code execution flaws (APSB15-19) flash-plugin: multiple code execution flaws (APSB15-19) flash-plugin: multiple code execution flaws (APSB15-19) flash-plugin: multiple code execution flaws (APSB15-19) flash-plugin: multiple code execution flaws (APSB15-19) flash-plugin: multiple code execution flaws (APSB15-19) flash-plugin: multiple code execution flaws (APSB15-19) flash-plugin: multiple code execution flaws (APSB15-19) flash-plugin: multiple code execution flaws (APSB15-19) flash-plugin: multiple code execution flaws (APSB15-19) flash-plugin: multiple code execution flaws (APSB15-19) flash-plugin: multiple code execution flaws (APSB15-19) flash-plugin: multiple code execution flaws (APSB15-19) flash-plugin: multiple code execution flaws (APSB15-19) flash-plugin: multiple code execution flaws (APSB15-19) flash-plugin: multiple code execution flaws (APSB15-19) flash-plugin: multiple code execution flaws (APSB15-19) flash-plugin: multiple code execution flaws (APSB15-19) flash-plugin: multiple code execution flaws (APSB15-19) flash-plugin: multiple code execution flaws (APSB15-19) flash-plugin: multiple code execution flaws (APSB15-19) flash-plugin: multiple code execution flaws (APSB15-19) flash-plugin: multiple code execution flaws (APSB15-19) flash-plugin: multiple code execution flaws (APSB15-19) flash-plugin: multiple code execution flaws (APSB15-19) flash-plugin: multiple code execution flaws (APSB15-19) flash-plugin: multiple code execution flaws (APSB15-19) flash-plugin: multiple code execution flaws (APSB15-19) flash-plugin: multiple code execution flaws (APSB15-19) flash-plugin: multiple code execution flaws (APSB15-19) flash-plugin: multiple code execution flaws (APSB15-19) flash-plugin: multiple code execution flaws (APSB15-19) flash-plugin: multiple code execution flaws (APSB15-19) | [
"cpe:/a:redhat:rhel_extras:5::client",
"cpe:/a:redhat:rhel_extras:5::server",
"cpe:/a:redhat:rhel_extras:6"
] | null | null | null | null |
RHSA-2019:0139 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.2.0 security update | keycloak: SAML request parser replaces special strings with system properties | [
"cpe:/a:redhat:jboss_enterprise_application_platform:7.2"
] | null | null | 6.5 | null |
RHSA-2020:4553 | Red Hat Security Advisory: systemd security, bug fix, and enhancement update | systemd: memory leak in button_open() in login/logind-button.c when udev events are received | [
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 2.4 | null | null |
RHSA-2013:1785 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 6.2.0 update | HawtJNI: predictable temporary file name leading to local arbitrary code execution WS: EJB3 role restrictions are not applied to jaxws handlers | [
"cpe:/a:redhat:jboss_enterprise_application_platform:6::el5"
] | null | null | null | null |
RHSA-2021:4863 | Red Hat Security Advisory: Red Hat JBoss Web Server 5.6.0 Security release | openssl: Read buffer overruns processing ASN.1 strings openssl: integer overflow in CipherUpdate openssl: NULL pointer dereference in X509_issuer_and_serial_hash() tomcat: JNDI realm authentication weakness tomcat: HTTP request smuggling when used with a reverse proxy tomcat: OutOfMemoryError caused by HTTP upgrade connection leak could lead to DoS | [
"cpe:/a:redhat:jboss_enterprise_web_server:5.6"
] | null | 7.5 | null | null |
RHSA-2019:2989 | Red Hat Security Advisory: OpenShift Container Platform 3.10 atomic-openshift kube-apiserver security update | atomic-openshift: OpenShift builds don't verify SSH Host Keys for the git repository containers/image: not enforcing TLS when sending username+password credentials to token servers leading to credential disclosure | [
"cpe:/a:redhat:openshift:3.10::el7"
] | null | null | 6.4 | null |
RHSA-2025:0313 | Red Hat Security Advisory: raptor2 security update | raptor: integer underflow when normalizing a URI with the turtle parser | [
"cpe:/a:redhat:rhel_aus:8.4::appstream",
"cpe:/a:redhat:rhel_e4s:8.4::appstream",
"cpe:/a:redhat:rhel_tus:8.4::appstream"
] | null | 7.3 | null | null |
RHSA-2005:474 | Red Hat Security Advisory: bzip2 security update | security flaw security flaw security flaw | [
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws",
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2013:0707 | Red Hat Security Advisory: openstack-glance security and bug fix update | Glance: Backend credentials leak in Glance v1 API | [
"cpe:/a:redhat:openstack:2::el6"
] | null | null | null | null |
RHSA-2017:1297 | Red Hat Security Advisory: kernel-rt security and bug fix update | kernel: Use after free in seq file kernel: Oops in shash_async_export() kernel: EXT4 memory corruption / SLAB out-of-bounds read kernel: net/packet: overflow in check for priv area size | [
"cpe:/a:redhat:enterprise_mrg:2:server:el6"
] | null | null | 7 | null |
RHSA-2021:3440 | Red Hat Security Advisory: kernel-rt security and bug fix update | kernel: slab-out-of-bounds access in xdr_set_page_base() in net/sunrpc/xdr.c | [
"cpe:/a:redhat:enterprise_linux:8::nfv",
"cpe:/a:redhat:enterprise_linux:8::realtime"
] | null | 7.5 | null | null |
RHSA-2024:9573 | Red Hat Security Advisory: libsoup security update | libsoup: HTTP request smuggling via stripping null bytes from the ends of header names libsoup: infinite loop while reading websocket data | [
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 7.5 | null | null |
RHSA-2010:0981 | Red Hat Security Advisory: HelixPlayer removal | HelixPlayer multiple flaws (CVE-2010-2997, CVE-2010-4375, CVE-2010-4378, CVE-2010-4379, CVE-2010-4382, CVE-2010-4383, CVE-2010-4385, CVE-2010-4386, CVE-2010-4392, CVE-2010-4376) HelixPlayer multiple flaws (CVE-2010-2997, CVE-2010-4375, CVE-2010-4378, CVE-2010-4379, CVE-2010-4382, CVE-2010-4383, CVE-2010-4385, CVE-2010-4386, CVE-2010-4392, CVE-2010-4376) HelixPlayer multiple flaws (CVE-2010-2997, CVE-2010-4375, CVE-2010-4378, CVE-2010-4379, CVE-2010-4382, CVE-2010-4383, CVE-2010-4385, CVE-2010-4386, CVE-2010-4392, CVE-2010-4376) HelixPlayer multiple flaws (CVE-2010-2997, CVE-2010-4375, CVE-2010-4378, CVE-2010-4379, CVE-2010-4382, CVE-2010-4383, CVE-2010-4385, CVE-2010-4386, CVE-2010-4392, CVE-2010-4376) HelixPlayer multiple flaws (CVE-2010-2997, CVE-2010-4375, CVE-2010-4378, CVE-2010-4379, CVE-2010-4382, CVE-2010-4383, CVE-2010-4385, CVE-2010-4386, CVE-2010-4392, CVE-2010-4376) HelixPlayer multiple flaws (CVE-2010-2997, CVE-2010-4375, CVE-2010-4378, CVE-2010-4379, CVE-2010-4382, CVE-2010-4383, CVE-2010-4385, CVE-2010-4386, CVE-2010-4392, CVE-2010-4376) HelixPlayer multiple flaws (CVE-2010-2997, CVE-2010-4375, CVE-2010-4378, CVE-2010-4379, CVE-2010-4382, CVE-2010-4383, CVE-2010-4385, CVE-2010-4386, CVE-2010-4392, CVE-2010-4376) HelixPlayer multiple flaws (CVE-2010-2997, CVE-2010-4375, CVE-2010-4378, CVE-2010-4379, CVE-2010-4382, CVE-2010-4383, CVE-2010-4385, CVE-2010-4386, CVE-2010-4392, CVE-2010-4376) HelixPlayer multiple flaws (CVE-2010-2997, CVE-2010-4375, CVE-2010-4378, CVE-2010-4379, CVE-2010-4382, CVE-2010-4383, CVE-2010-4385, CVE-2010-4386, CVE-2010-4392, CVE-2010-4376) HelixPlayer multiple flaws (CVE-2010-2997, CVE-2010-4375, CVE-2010-4378, CVE-2010-4379, CVE-2010-4382, CVE-2010-4383, CVE-2010-4385, CVE-2010-4386, CVE-2010-4392, CVE-2010-4376) | [
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2025:0787 | Red Hat Security Advisory: rsync security update | rsync: Info Leak via Uninitialized Stack Contents | [
"cpe:/o:redhat:rhel_eus:8.8::baseos"
] | null | 7.5 | null | null |
RHSA-2016:1841 | Red Hat Security Advisory: JBoss Enterprise Application Platform 7.0.2 | jakarta-taglibs-standard: XXE and RCE via XSL extension in JSTL XML tags eap: HTTP header injection / response splitting EAP7 Privilege escalation when managing domain including earlier version slaves | [
"cpe:/a:redhat:jboss_enterprise_application_platform:7"
] | null | null | 7.5 | null |
RHSA-2023:2202 | Red Hat Security Advisory: frr security, bug fix, and enhancement update | frr: out-of-bounds read in the BGP daemon may lead to information disclosure or denial of service | [
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 7.1 | null | null |
RHSA-2018:1780 | Red Hat Security Advisory: xmlrpc security update | xmlrpc: Deserialization of untrusted Java object through <ex:serializable> tag | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 7.5 | null |
RHSA-2022:5564 | Red Hat Security Advisory: kernel security, bug fix, and enhancement update | kernel: race condition in perf_event_open leads to privilege escalation | [
"cpe:/a:redhat:enterprise_linux:8::crb",
"cpe:/o:redhat:enterprise_linux:8::baseos",
"cpe:/o:redhat:rhev_hypervisor:4.4::el8"
] | null | 7.4 | null | null |
RHSA-2021:2170 | Red Hat Security Advisory: glib2 security and bug fix update | glib: integer overflow in g_bytes_new function on 64-bit platforms due to an implicit cast from 64 bits to 32 bits | [
"cpe:/a:redhat:enterprise_linux:8::crb",
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 9.8 | null | null |
RHSA-2024:1362 | Red Hat Security Advisory: OpenShift Container Platform 4.14.17 low-latency extras security update | golang-protobuf: encoding/protojson, internal/encoding/json: infinite loop in protojson.Unmarshal when unmarshaling certain forms of invalid JSON | [
"cpe:/a:redhat:openshift:4.14::el8",
"cpe:/a:redhat:openshift:4.14::el9"
] | null | 5.9 | null | null |
RHSA-2023:4112 | Red Hat Security Advisory: Red Hat OpenShift Service Mesh 2.2.8 security update | golang.org/x/net/http2: avoid quadratic complexity in HPACK decoding openshift: OCP & FIPS mode | [
"cpe:/a:redhat:service_mesh:2.2::el8"
] | null | 6.5 | null | null |
RHSA-2011:0471 | Red Hat Security Advisory: firefox security update | Mozilla mChannel use after free (MFSA 2011-13) Mozilla mObserverList use after free (MFSA 2011-13) Mozilla untrusted events can trigger autocomplete popup (MFSA 2011-14) Mozilla javascript crash (MFSA 2011-12) Mozilla double free flaw (MFSA 2011-12) Mozilla directory traversal via resource protocol (MFSA 2011-16) Mozilla use after free flaw (MFSA 2011-12) Mozilla dangling pointer flaw (MFSA 2011-13) Mozilla crash from several marquee elements (MFSA 2011-12) Mozilla crash from bad iframe source (MFSA 2011-12) Mozilla integer overflow in frameset spec (MFSA 2011-12) Mozilla OOM condition arbitrary memory write (MFSA 2011-12) Mozilla memory safety issue (MFSA 2011-12) Mozilla memory safety issue (MFSA 2011-12) libxslt: Heap address leak in XLST | [
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws",
"cpe:/o:redhat:enterprise_linux:5::server",
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2010:0054 | Red Hat Security Advisory: openssl security update | deprecate MD2 in SSL cert validation (Kaminsky) openssl significant memory leak in certain SSLv3 requests (DoS) | [
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2024:0152 | Red Hat Security Advisory: .NET 8.0 security update | dotnet: Information Disclosure: MD.SqlClient(MDS) & System.data.SQLClient (SDS) dotnet: X509 Certificates - Validation Bypass across Azure dotnet: .NET Denial of Service Vulnerability | [
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::crb"
] | null | 6.8 | null | null |
RHSA-2013:0579 | Red Hat Security Advisory: rhev-hypervisor6 security, bug fix, and enhancement update | libvirt+dnsmasq: DNS configured to answer DNS queries from non-virtual networks kernel: block: default SCSI command filter does not accomodate commands overlap across device classes kernel: vhost: fix length for cross region descriptor | [
"cpe:/o:redhat:enterprise_linux:6::hypervisor"
] | null | null | null | null |
RHSA-2024:3163 | Red Hat Security Advisory: pam security update | pam: allowing unprivileged user to block another user namespace | [
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 5.5 | null | null |
RHSA-2023:5769 | Red Hat Security Advisory: nghttp2 security update | HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack) | [
"cpe:/a:redhat:rhel_eus:8.6::crb",
"cpe:/o:redhat:rhel_eus:8.6::baseos"
] | null | 7.5 | null | null |
RHSA-2020:5233 | Red Hat Security Advisory: firefox security update | Mozilla: Variable time processing of cross-origin images during drawImage calls Mozilla: Parsing mismatches could confuse and bypass security sanitizer for chrome privileged code Mozilla: Fullscreen could be enabled without displaying the security UI Mozilla: XSS through paste (manual and clipboard API) Mozilla: Requests intercepted through ServiceWorkers lacked MIME type restrictions Mozilla: Use-after-free in WebRequestService Mozilla: Potential use-after-free in uses of nsTArray Mozilla: DoH did not filter IPv4 mapped IP Addresses Mozilla: Software keyboards may have remembered typed passwords Mozilla: Memory safety bugs fixed in Firefox 83 and Firefox ESR 78.5 | [
"cpe:/a:redhat:rhel_eus:8.1::appstream"
] | null | 8.8 | 6.1 | null |
RHSA-2020:5567 | Red Hat Security Advisory: postgresql:10 security update | postgresql: Reconnection can downgrade connection security settings postgresql: Multiple features escape "security restricted operation" sandbox postgresql: psql's \gset allows overwriting specially treated variables | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 7.5 | null | null |
RHSA-2023:1516 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.4.10 security update | SnakeYaml: Constructor Deserialization Remote Code Execution undertow: Server identity in https connection is not checked by the undertow client snakeyaml: Uncaught exception in java.base/java.util.ArrayList.hashCode hsqldb: Untrusted input may lead to RCE attack dev-java/snakeyaml: DoS via stack overflow codec-haproxy: HAProxyMessageDecoder Stack Exhaustion DoS apache-james-mime4j: Temporary File Information Disclosure in MIME4J TempFileStorageProvider RESTEasy: creation of insecure temp files Undertow: Infinite loop in SslConduit during close | [
"cpe:/a:redhat:jboss_enterprise_application_platform:7.4"
] | null | 7.5 | null | null |
RHSA-2022:0294 | Red Hat Security Advisory: parfait:0.5 security update | log4j: Remote code execution in Log4j 1.x when application is configured to use JMSAppender log4j: Remote code execution in Log4j 1.x when application is configured to use JMSSink log4j: SQL injection in Log4j 1.x when application is configured to use JDBCAppender log4j: Unsafe deserialization flaw in Chainsaw log viewer | [
"cpe:/a:redhat:rhel_e4s:8.1::appstream"
] | null | 8.8 | null | null |
RHSA-2016:0505 | Red Hat Security Advisory: python-django security update | python-django: Malicious redirect and possible XSS attack via user-supplied redirect URLs containing basic auth python-django: User enumeration through timing difference on password hasher work factor upgrade | [
"cpe:/a:redhat:openstack:6::el7"
] | null | null | null | null |
RHSA-2013:1490 | Red Hat Security Advisory: kernel-rt security and bug fix update | kernel: handling of IPv6 temporary addresses Kernel: HID: memory corruption flaw Kernel: HID: pantherlord: heap overflow flaw Kernel: HID: LG: heap overflow flaw Kernel: HID: logitech-dj: heap overflow flaw Kernel: HID: ntrig: NULL pointer dereference kernel: dm: dm-snapshot data leak Kernel: net: use-after-free TUNSETIFF kernel: ansi_cprng: off by one error in non-block size request kernel: net: deadloop path in skb_flow_dissect() kernel: net: sctp: ipv6 ipsec encryption bug in sctp_v6_xmit Kernel: net: IPv6: panic when UFO=On for an interface | [
"cpe:/a:redhat:enterprise_mrg:2:server:el6"
] | null | null | null | null |
RHSA-2024:11486 | Red Hat Security Advisory: kernel security update | kernel: Bluetooth: l2cap: fix null-ptr-deref in l2cap_chan_timeout kernel: bpf: Add BPF_PROG_TYPE_CGROUP_SKB attach type enforcement in BPF_LINK_CREATE kernel: bpf: Fix a kernel verifier crash in stacksafe() kernel: nfsd: ensure that nfsd4_fattr_args.context is zeroed out kernel: bpf: Fix use-after-free in bpf_uprobe_multi_link_attach() kernel: bpf: Fix a sdiv overflow issue kernel: arm64: probes: Remove broken LDR (literal) uprobe support kernel: xfrm: fix one more kernel-infoleak in algo dumping kernel: KVM: nSVM: Ignore nCR3[4:0] when loading PDPTEs from memory kernel: Bluetooth: ISO: Fix UAF on iso_sock_timeout kernel: Bluetooth: SCO: Fix UAF on sco_sock_timeout kernel: xfrm: validate new SA's prefixlen using SA family when sel.family is unset kernel: Bluetooth: bnep: fix wild-memory-access in proto_unregister kernel: irqchip/gic-v4: Don't allow a VMOVP on a dying VPE kernel: sched/numa: Fix the potential null pointer dereference in task_numa_work() kernel: Bluetooth: hci: fix null-ptr-deref in hci_read_supported_codecs kernel: bpf: Fix out-of-bounds write in trie_get_next_key() | [
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::crb",
"cpe:/a:redhat:enterprise_linux:9::nfv",
"cpe:/a:redhat:enterprise_linux:9::realtime",
"cpe:/o:redhat:enterprise_linux:9::baseos"
] | null | 6.7 | null | null |
RHSA-2021:1016 | Red Hat Security Advisory: OpenShift Container Platform 4.5.37 security update | golang: data race in certain net/http servers including ReverseProxy can lead to DoS golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs | [
"cpe:/a:redhat:openshift:4.5::el7",
"cpe:/a:redhat:openshift:4.5::el8"
] | null | 7.5 | null | null |
RHSA-2010:0981 | Red Hat Security Advisory: HelixPlayer removal | HelixPlayer multiple flaws (CVE-2010-2997, CVE-2010-4375, CVE-2010-4378, CVE-2010-4379, CVE-2010-4382, CVE-2010-4383, CVE-2010-4385, CVE-2010-4386, CVE-2010-4392, CVE-2010-4376) HelixPlayer multiple flaws (CVE-2010-2997, CVE-2010-4375, CVE-2010-4378, CVE-2010-4379, CVE-2010-4382, CVE-2010-4383, CVE-2010-4385, CVE-2010-4386, CVE-2010-4392, CVE-2010-4376) HelixPlayer multiple flaws (CVE-2010-2997, CVE-2010-4375, CVE-2010-4378, CVE-2010-4379, CVE-2010-4382, CVE-2010-4383, CVE-2010-4385, CVE-2010-4386, CVE-2010-4392, CVE-2010-4376) HelixPlayer multiple flaws (CVE-2010-2997, CVE-2010-4375, CVE-2010-4378, CVE-2010-4379, CVE-2010-4382, CVE-2010-4383, CVE-2010-4385, CVE-2010-4386, CVE-2010-4392, CVE-2010-4376) HelixPlayer multiple flaws (CVE-2010-2997, CVE-2010-4375, CVE-2010-4378, CVE-2010-4379, CVE-2010-4382, CVE-2010-4383, CVE-2010-4385, CVE-2010-4386, CVE-2010-4392, CVE-2010-4376) HelixPlayer multiple flaws (CVE-2010-2997, CVE-2010-4375, CVE-2010-4378, CVE-2010-4379, CVE-2010-4382, CVE-2010-4383, CVE-2010-4385, CVE-2010-4386, CVE-2010-4392, CVE-2010-4376) HelixPlayer multiple flaws (CVE-2010-2997, CVE-2010-4375, CVE-2010-4378, CVE-2010-4379, CVE-2010-4382, CVE-2010-4383, CVE-2010-4385, CVE-2010-4386, CVE-2010-4392, CVE-2010-4376) HelixPlayer multiple flaws (CVE-2010-2997, CVE-2010-4375, CVE-2010-4378, CVE-2010-4379, CVE-2010-4382, CVE-2010-4383, CVE-2010-4385, CVE-2010-4386, CVE-2010-4392, CVE-2010-4376) HelixPlayer multiple flaws (CVE-2010-2997, CVE-2010-4375, CVE-2010-4378, CVE-2010-4379, CVE-2010-4382, CVE-2010-4383, CVE-2010-4385, CVE-2010-4386, CVE-2010-4392, CVE-2010-4376) HelixPlayer multiple flaws (CVE-2010-2997, CVE-2010-4375, CVE-2010-4378, CVE-2010-4379, CVE-2010-4382, CVE-2010-4383, CVE-2010-4385, CVE-2010-4386, CVE-2010-4392, CVE-2010-4376) | [
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2021:1761 | Red Hat Security Advisory: python27:2.7 security and bug fix update | python: CRLF injection via HTTP request method in httplib/http.client python-urllib3: CRLF injection via HTTP request method python-lxml: mXSS due to the use of improper parser python: Stack-based buffer overflow in PyCArg_repr in _ctypes/callproc.c | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 5.9 | null | null |
RHSA-2019:1237 | Red Hat Security Advisory: rh-python35-python-jinja2 security update | python-jinja2: Sandbox escape due to information disclosure via str.format python-jinja2: str.format_map allows sandbox escape | [
"cpe:/a:redhat:rhel_software_collections:3::el6",
"cpe:/a:redhat:rhel_software_collections:3::el7"
] | null | null | 9 | null |
RHSA-2007:0073 | Red Hat Security Advisory: java-1.5.0-ibm security update | openssl signature forgery security flaw security flaw security flaw security flaw | [
"cpe:/a:redhat:rhel_extras:4"
] | null | null | null | null |
RHSA-2024:9089 | Red Hat Security Advisory: containernetworking-plugins security update | golang: net: malformed DNS message can cause infinite loop net/http: Denial of service due to improper 100-continue handling in net/http | [
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 5.9 | null | null |
RHSA-2024:0539 | Red Hat Security Advisory: tomcat security update | tomcat: HTTP request smuggling via malformed trailer headers | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 7.5 | null | null |
RHSA-2022:7623 | Red Hat Security Advisory: dovecot security update | dovecot: Privilege escalation when similar master and non-master passdbs are used | [
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb"
] | null | 6.8 | null | null |
RHSA-2023:5195 | Red Hat Security Advisory: frr security and bug fix update | frr: Incorrect handling of a error in parsing of an invalid section of a BGP update can de-peer a router | [
"cpe:/a:redhat:rhel_eus:8.6::appstream"
] | null | 7.5 | null | null |
RHSA-2024:5299 | Red Hat Security Advisory: wget security update | wget: Misinterpretation of input may lead to improper behavior | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 5.5 | null | null |
RHSA-2017:1679 | Red Hat Security Advisory: bind security and bug fix update | bind: An error in TSIG authentication can permit unauthorized zone transfers bind: An error in TSIG authentication can permit unauthorized dynamic updates | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | 7.5 | null |
RHSA-2011:0258 | Red Hat Security Advisory: subversion security update | Subversion: Access restriction bypass by checkout of the root of the repository (mod_dav_svn): DoS (crash) by processing certain requests to display all available repositories to a web browser Subversion: DoS (memory consumption) by processing blame or log -g requests on certain files | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2020:5185 | Red Hat Security Advisory: microcode_ctl security, bug fix and enhancement update | hw: Information disclosure issue in Intel SGX via RAPL interface hw: Vector Register Leakage-Active hw: Fast forward store predictor | [
"cpe:/o:redhat:rhel_eus:8.2::baseos"
] | null | 5.5 | null | null |
RHSA-2017:1852 | Red Hat Security Advisory: openldap security, bug fix, and enhancement update | openldap: Double free vulnerability in servers/slapd/back-mdb/search.c | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 6.5 | null |
RHSA-2021:4614 | Red Hat Security Advisory: Red Hat JBoss Core Services Apache HTTP Server 2.4.37 SP10 security update | httpd: mod_proxy_wstunnel tunneling of non Upgraded connection pcre: Buffer over-read in JIT when UTF is disabled and \X or \R has fixed quantifier greater than 1 httpd: mod_proxy NULL pointer dereference pcre: Integer overflow when parsing callout numeric arguments httpd: Single zero byte stack overflow in mod_auth_digest JBCS: URL normalization issue with dot-dot-semicolon(s) leads to information disclosure openssl: Read buffer overruns processing ASN.1 strings openssl: integer overflow in CipherUpdate openssl: NULL pointer dereference in X509_issuer_and_serial_hash() httpd: mod_session: NULL pointer dereference when parsing Cookie header httpd: mod_session: Heap overflow via a crafted SessionHeader value httpd: Unexpected URL matching with 'MergeSlashes OFF' httpd: NULL pointer dereference via malformed requests | [
"cpe:/a:redhat:jboss_core_services:1::el7",
"cpe:/a:redhat:jboss_core_services:1::el8"
] | null | 7.5 | null | null |
RHSA-2014:1336 | Red Hat Security Advisory: python-django-horizon security and bug fix update | openstack-horizon: persistent XSS in Horizon Host Aggregates interface | [
"cpe:/a:redhat:openstack:5::el6"
] | null | null | null | null |
RHSA-2016:2808 | Red Hat Security Advisory: Red Hat JBoss Web Server 2.1.2 security update for Tomcat 7 | tomcat: Session fixation tomcat: CSRF token leak tomcat: security manager bypass via StatusManagerServlet tomcat: Security Manager bypass via persistence mechanisms tomcat: security manager bypass via setGlobalContext() tomcat: Usage of vulnerable FileUpload package can result in denial of service | [
"cpe:/a:redhat:jboss_enterprise_web_server:2.1"
] | null | null | 7.5 | null |
RHSA-2018:2939 | Red Hat Security Advisory: Red Hat FIS 2.0 on Fuse 6.3.0 R8 security and bug fix update | tomcat: Remote Code Execution bypass for CVE-2017-12615 spring-security-oauth: remote code execution in the authorization process spring-framework: Possible RCE via spring messaging spring-framework: Directory traversal vulnerability with static resources on Windows filesystems spring-framework: Address partial fix for CVE-2018-1270 tomcat: Incorrect handling of empty string URL in security constraints can lead to unintended exposure of resources tomcat: Late application of security constraints can lead to resource exposure for unauthorised users tomcat: A bug in the UTF-8 decoder can lead to DoS jackson-databind: incomplete fix for CVE-2017-7525 permits unsafe serialization via c3p0 libraries | [
"cpe:/a:redhat:jboss_fuse:6.3"
] | null | null | 8.1 | null |
RHSA-2018:1321 | Red Hat Security Advisory: chromium-browser security update | chromium-browser: Use after free in Media Cache | [
"cpe:/a:redhat:rhel_extras:6"
] | null | null | 9.6 | null |
RHSA-2021:5227 | Red Hat Security Advisory: kernel security and bug fix update | kernel: In Overlayfs missing a check for a negative dentry before calling vfs_rename() | [
"cpe:/a:redhat:enterprise_linux:8::crb",
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 5.5 | null | null |
RHSA-2002:133 | Red Hat Security Advisory: : Updated bind packages fix buffer overflow in resolver library | security flaw | [
"cpe:/o:redhat:linux:6.2",
"cpe:/o:redhat:linux:7.0",
"cpe:/o:redhat:linux:7.1",
"cpe:/o:redhat:linux:7.2",
"cpe:/o:redhat:linux:7.3"
] | null | null | null | null |
RHSA-2024:6667 | Red Hat Security Advisory: Red Hat OpenShift Dev Spaces 3.16.0 release | okhttp: information disclosure via improperly used cryptographic function okio: GzipSource class improper exception handling pypa/setuptools: Remote code execution via download functions in the package_index module in pypa/setuptools spring-security: Broken Access Control in Spring Security With Direct Use of isFullyAuthenticated nodejs-undici: proxy-authorization header not cleared on cross-origin redirect for dispatch, request, stream, pipeline nodejs-undici: fetch() with integrity option is too lax when algorithm is specified but hash value is in incorrect axios: axios: Server-Side Request Forgery | [
"cpe:/a:redhat:openshift_devspaces:3::el8"
] | null | 7.5 | null | null |
RHSA-2017:2672 | Red Hat Security Advisory: rh-nodejs6-nodejs-qs security update | nodejs-qs: Prototype override protection bypass | [
"cpe:/a:redhat:rhel_software_collections:2::el6",
"cpe:/a:redhat:rhel_software_collections:2::el7"
] | null | null | 5.3 | null |
RHSA-2008:0882 | Red Hat Security Advisory: seamonkey security update | Mozilla UTF-8 stack buffer overflow mozilla: nsXMLDocument:: OnChannelRedirect() same-origin violation mozilla: Forced mouse drag Mozilla privilege escalation via XPCnativeWrapper pollution Mozilla privilege escalation via XPCnativeWrapper pollution Mozilla privilege escalation via XPCnativeWrapper pollution Mozilla layout engine crash Mozilla crashes with evidence of memory corruption Mozilla BOM characters stripped from JavaScript before execution Mozilla low surrogates stripped from JavaScript before execution resource: traversal vulnerability recource: bypass Mozilla XBM decoder information disclosure | [
"cpe:/o:redhat:enterprise_linux:2.1::as",
"cpe:/o:redhat:enterprise_linux:2.1::aw",
"cpe:/o:redhat:enterprise_linux:2.1::es",
"cpe:/o:redhat:enterprise_linux:2.1::ws",
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws",
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2021:5206 | Red Hat Security Advisory: log4j security update | log4j: Remote code execution in Log4j 1.x when application is configured to use JMSAppender | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation",
"cpe:/o:redhat:rhel_aus:7.3::server",
"cpe:/o:redhat:rhel_aus:7.4::server",
"cpe:/o:redhat:rhel_aus:7.6::server",
"cpe:/o:redhat:rhel_aus:7.7::server",
"cpe:/o:redhat:rhel_e4s:7.6::server",
"cpe:/o:redhat:rhel_e4s:7.7::server",
"cpe:/o:redhat:rhel_els:6",
"cpe:/o:redhat:rhel_tus:7.6::server",
"cpe:/o:redhat:rhel_tus:7.7::server"
] | null | 7.5 | null | null |
RHSA-2007:0640 | Red Hat Security Advisory: conga security, bug fix, and enhancement update | ricci is vulnerable to a connect DoS attack | [
"cpe:/a:redhat:rhel_cluster:5"
] | null | null | null | null |
RHSA-2023:3541 | Red Hat Security Advisory: OpenShift Container Platform 4.11.43 packages and security update | cri-o: incorrect handling of the supplementary groups flask: Possible disclosure of permanent session cookie due to missing Vary: Cookie header | [
"cpe:/a:redhat:openshift:4.11::el8",
"cpe:/a:redhat:openshift_ironic:4.11::el8"
] | null | 7.5 | null | null |
RHSA-2023:5264 | Red Hat Security Advisory: virt:rhel and virt-devel:rhel security and bug fix update | NTFS-3G: buffer overflow issue in NTFS-3G can cause code execution via crafted metadata in an NTFS image QEMU: VNC: improper I/O watch removal in TLS handshake can lead to remote unauthenticated denial of service | [
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb"
] | null | 7.5 | null | null |
RHSA-2025:1333 | Red Hat Security Advisory: Gatekeeper v3.14.3 | golang.org/x/crypto/ssh: Misuse of ServerConfig.PublicKeyCallback may cause authorization bypass in golang.org/x/crypto golang.org/x/net/html: Non-linear parsing of case-insensitive content in golang.org/x/net/html | [
"cpe:/a:redhat:gatekeeper:3.14::el9"
] | null | 7.5 | null | null |
RHSA-2021:3488 | Red Hat Security Advisory: Red Hat OpenStack Platform 16.2 (openstack-neutron) security update | openstack-neutron: arbitrary dnsmasq reconfiguration via extra_dhcp_opts | [
"cpe:/a:redhat:openstack:16.2::el8"
] | null | 7.6 | null | null |
RHSA-2022:7049 | Red Hat Security Advisory: OpenJDK 8u352 Windows Security Update | OpenJDK: improper handling of long NTLM client hostnames (Security, 8286526) OpenJDK: insufficient randomization of JNDI DNS port numbers (JNDI, 8286910) OpenJDK: excessive memory allocation in X.509 certificate parsing (Security, 8286533) OpenJDK: HttpServer no connection count limit (Lightweight HTTP Server, 8286918) | [
"cpe:/a:redhat:openjdk:1.8::windows"
] | null | 5.3 | null | null |
RHSA-2019:3292 | Red Hat Security Advisory: Red Hat Decision Manager 7.5.0 Security Update | jackson-databind: failure to block the logback-core class from polymorphic deserialization leading to remote code execution jackson-databind: polymorphic typing issue allows attacker to read arbitrary local files on the server via crafted JSON message. jackson-databind: default typing mishandling leading to remote code execution | [
"cpe:/a:redhat:jboss_enterprise_brms_platform:7.5"
] | null | null | 9.8 | null |
RHSA-2018:3770 | Red Hat Security Advisory: ansible security and bug fix update | ansible: become password logged in plaintext when used with PowerShell on Windows | [
"cpe:/a:redhat:ansible_engine:2.5::el7"
] | null | null | 4.2 | null |
RHSA-2012:1461 | Red Hat Security Advisory: libproxy security update | libproxy: PAC handling insufficient content length check leading to buffer overflow | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2021:0190 | Red Hat Security Advisory: OpenShift Container Platform 4.6 compliance-operator security and bug fix update | golang-github-gorilla-websocket: integer overflow leads to denial of service | [
"cpe:/a:redhat:openshift:4.6::el8"
] | null | 7.5 | null | null |
RHSA-2023:5967 | Red Hat Security Advisory: Red Hat OpenStack Platform 16.1.9 (collectd-libpod-stats, etcd) security update | golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487) HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack) | [
"cpe:/a:redhat:openstack:16.1::el8"
] | null | 7.5 | null | null |
RHSA-2014:0455 | Red Hat Security Advisory: openstack-glance security update | openstack-glance: remote code execution in Glance Sheepdog backend | [
"cpe:/a:redhat:openstack:4::el6"
] | null | null | null | null |
RHSA-2015:1945 | Red Hat Security Advisory: kubernetes security update | Kubernetes: Missing name validation allows path traversal in etcd | [
"cpe:/a:redhat:openshift:3.0::el7"
] | null | null | null | null |
RHSA-2017:1415 | Red Hat Security Advisory: Red Hat JBoss Core Services Apache HTTP Server 2.4.23 Service Pack 1 | httpd: Padding Oracle in Apache mod_session_crypto httpd: DoS vulnerability in mod_auth_digest openssl: OCSP Status Request extension unbounded memory growth openssl: ECDSA P-256 timing attack key recovery SSL/TLS: Malformed plain-text ALERT packets could cause remote DoS httpd: Incomplete handling of LimitRequestFields directive in mod_http2 httpd: Apache HTTP Request Parsing Whitespace Defects | [
"cpe:/a:redhat:jboss_core_services:1"
] | null | null | 4 | null |
Subsets and Splits