id
stringlengths 13
15
| title
stringlengths 29
176
| description
stringlengths 8
31.7k
| cpes
sequencelengths 0
20
| cvss_v4_0
null | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
null |
---|---|---|---|---|---|---|---|
RHSA-2022:1759 | Red Hat Security Advisory: virt:rhel and virt-devel:rhel security, bug fix, and enhancement update | hivex: stack overflow due to recursive call of _get_children() nbdkit: NBD_OPT_STRUCTURED_REPLY injection on STARTTLS QEMU: virtio-net: heap use-after-free in virtio_net_receive_rcu libvirt: segmentation fault during VM shutdown can lead to vdsm hang QEMU: NULL pointer dereference in mirror_wait_on_conflicts() in block/mirror.c QEMU: NULL pointer dereference in pci_write() in hw/acpi/pcihp.c QEMU: block: fdc: null pointer dereference may lead to guest crash ntfs-3g: Out-of-bounds heap buffer access in ntfs_get_attribute_value() due to incorrect check of bytes_in_use value in MFT records ntfs-3g: Heap buffer overflow triggered by a specially crafted Unicode string ntfs-3g: Heap buffer overflow in ntfs_attr_pread_i() triggered by specially crafted NTFS attributes ntfs-3g: Heap buffer overflow triggered by a specially crafted MFT section ntfs-3g: Heap buffer overflow triggered by a specially crafted NTFS inode pathname ntfs-3g: Stack buffer overflow triggered when correcting differences between MFT and MFTMirror sections ntfs-3g: Heap buffer overflow in ntfs_inode_real_open() triggered by a specially crafted NTFS inode ntfs-3g: Heap buffer overflow in ntfs_attr_setup_flag() triggered by a specially crafted NTFS attribute from MFT ntfs-3g: NULL pointer dereference in ntfs_extent_inode_open() ntfs-3g: Out-of-bounds read in ntfs_ie_lookup() ntfs-3g: Out-of-bounds read in ntfs_runlists_merge_i() ntfs-3g: Integer overflow in memmove() leading to heap buffer overflow in ntfs_attr_record_resize() ntfs-3g: Out-of-bounds read ntfs_attr_find_in_attrdef() triggered by an invalid attribute ntfs-3g: Heap buffer overflow in ntfs_inode_lookup_by_name() ntfs-3g: Endless recursion from ntfs_attr_pwrite() triggered by an unallocated bitmap ntfs-3g: Out-of-bounds reads in ntfs_attr_find() and ntfs_external_attr_find() ntfs-3g: Out-of-bounds access in ntfs_inode_lookup_by_name() caused by an unsanitized attribute length ntfs-3g: Out-of-bounds access in ntfs_inode_sync_standard_information() ntfs-3g: Heap buffer overflow in ntfs_compressed_pwrite() ntfs-3g: Out-of-bounds access in ntfs_decompress() ntfs-3g: Heap buffer overflow in ntfs_get_attribute_value() caused by an unsanitized attribute libnbd: nbdcopy: missing error handling may create corrupted destination image | [
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb"
] | null | 4.8 | null | null |
RHSA-2024:10289 | Red Hat Security Advisory: container-tools:rhel8 security update | podman: podman machine spawns gvproxy with port bound to all IPs golang: math/big.Rat: may cause a panic or an unrecoverable fatal error if passed inputs with very large exponents Podman: Buildah: CRI-O: symlink traversal vulnerability in the containers/storage library can cause Denial of Service (DoS) | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 6.5 | null | null |
RHSA-2022:8809 | Red Hat Security Advisory: kernel security and bug fix update | kernel: KVM: cmpxchg_gpte can write to pfns outside the userspace region kernel: openvswitch: integer underflow leads to out-of-bounds write in reserve_sfa_size() | [
"cpe:/a:redhat:rhel_eus:8.6::crb",
"cpe:/o:redhat:rhel_eus:8.6::baseos",
"cpe:/o:redhat:rhev_hypervisor:4.4::el8"
] | null | 7.8 | null | null |
RHSA-2002:180 | Red Hat Security Advisory: nss_ldap ecurity update | security flaw security flaw | [
"cpe:/o:redhat:enterprise_linux:2.1::as",
"cpe:/o:redhat:enterprise_linux:2.1::aw"
] | null | null | null | null |
RHSA-2024:3121 | Red Hat Security Advisory: httpd:2.4 security update | httpd: mod_macro: out-of-bounds read vulnerability mod_http2: reset requests exhaust memory (incomplete fix of CVE-2023-44487) | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 7.5 | null | null |
RHSA-2020:0952 | Red Hat Security Advisory: Red Hat Single Sign-On 7.3.7 security update | undertow: AJP File Read/Inclusion Vulnerability | [
"cpe:/a:redhat:jboss_single_sign_on:7.3"
] | null | 7.6 | null | null |
RHSA-2024:6140 | Red Hat Security Advisory: postgresql:15 security update | postgresql: PostgreSQL relation replacement during pg_dump executes arbitrary SQL | [
"cpe:/a:redhat:rhel_eus:9.2::appstream"
] | null | 7.5 | null | null |
RHSA-2016:2593 | Red Hat Security Advisory: sudo security, bug fix, and enhancement update | sudo: Possible info leak via INPUTRC | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | null | null |
RHSA-2006:0200 | Red Hat Security Advisory: firefox security update | security flaw security flaw security flaw | [
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2024:9181 | Red Hat Security Advisory: jose security update | jose: Denial of service due to uncontrolled CPU consumption jose: resource exhaustion | [
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::crb"
] | null | 5.3 | null | null |
RHSA-2003:242 | Red Hat Security Advisory: ddskk security update | security flaw | [
"cpe:/o:redhat:enterprise_linux:2.1::as",
"cpe:/o:redhat:enterprise_linux:2.1::aw",
"cpe:/o:redhat:enterprise_linux:2.1::es",
"cpe:/o:redhat:enterprise_linux:2.1::ws"
] | null | null | null | null |
RHSA-2020:1266 | Red Hat Security Advisory: kernel security and bug fix update | kernel: heap overflow in mwifiex_update_vs_ie() function of Marvell WiFi driver | [
"cpe:/o:redhat:rhel_eus:7.5::computenode",
"cpe:/o:redhat:rhel_eus:7.5::server"
] | null | null | 8 | null |
RHSA-2007:0014 | Red Hat Security Advisory: kernel security update | kernel: Local DoS with corrupted ELF security flaw kernel Race condition in mincore can cause "ps -ef" to hang security flaw security flaw Linux kernel get_fdb_entries() integer overflow kernel listxattr syscall can corrupt user space programs security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw | [
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2022:0438 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 6.4 security update | log4j: Remote code execution in Log4j 1.x when application is configured to use JMSAppender log4j: Remote code execution in Log4j 1.x when application is configured to use JMSSink log4j: SQL injection in Log4j 1.x when application is configured to use JDBCAppender log4j: Unsafe deserialization flaw in Chainsaw log viewer | [
"cpe:/a:redhat:jboss_enterprise_application_platform:6::el6",
"cpe:/a:redhat:jboss_enterprise_application_platform:6::el7"
] | null | 8.8 | null | null |
RHSA-2023:0664 | Red Hat Security Advisory: tigervnc security update | xorg-x11-server: DeepCopyPointerClasses use-after-free leads to privilege elevation | [
"cpe:/a:redhat:rhel_eus:8.4::appstream"
] | null | 7.8 | null | null |
RHSA-2024:6994 | Red Hat Security Advisory: kernel security update | hw: cpu: intel: Native Branch History Injection (BHI) kernel: wifi: mac80211: Avoid address calculations via out of bounds array indexing | [
"cpe:/o:redhat:rhel_els:7"
] | null | 7.8 | null | null |
RHBA-2018:0135 | Red Hat Bug Fix Advisory: org.ovirt.engine-root bug fix and enhancement update | ovirt-engine: When Wipe After Delete (WAD) and Enable Discard are both enabled for a VM disk, discarded data might not be wiped after the disk is removed. | [
"cpe:/a:redhat:rhev_manager:4"
] | null | null | 4.2 | null |
RHSA-2009:0429 | Red Hat Security Advisory: cups security update | xpdf: Multiple buffer overflows in JBIG2 decoder (setBitmap, readSymbolDictSeg) (CVE-2009-0195) xpdf: Multiple integer overflows in JBIG2 decoder cups: Integer overflow in the TIFF image filter xpdf: Freeing of potentially uninitialized memory in JBIG2 decoder xpdf: Multiple buffer overflows in JBIG2 decoder (setBitmap, readSymbolDictSeg) (CVE-2009-0195) PDF JBIG2 decoder OOB read PDF JBIG2 multiple input validation flaws PDF JBIG2 integer overflow PDF JBIG2 invalid free() PDF JBIG2 NULL dereference PDF JBIG2 MMR decoder buffer overflows PDF JBIG2 MMR infinite loop DoS | [
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws",
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2013:1170 | Red Hat Security Advisory: mongodb and pymongo security and enhancement update | MongoDB: Server Side JavaScript Includes allow Remote Code Execution pymongo: null pointer when decoding invalid DBRef | [
"cpe:/a:redhat:enterprise_mrg:2:server:el6"
] | null | null | null | null |
RHSA-2013:0682 | Red Hat Security Advisory: jakarta-commons-httpclient security update | jakarta-commons-httpclient: missing connection hostname check against X.509 certificate name | [
"cpe:/a:redhat:jboss_enterprise_web_platform:5::el4",
"cpe:/a:redhat:jboss_enterprise_web_platform:5::el5",
"cpe:/a:redhat:jboss_enterprise_web_platform:5::el6"
] | null | null | 3.7 | null |
RHSA-2020:2684 | Red Hat Security Advisory: containernetworking-plugins security update | containernetworking/plugins: IPv6 router advertisements allow for MitM attacks on IPv4 clusters | [
"cpe:/a:redhat:rhel_extras_other:7"
] | null | 6 | null | null |
RHSA-2022:1329 | Red Hat Security Advisory: OpenShift Virtualization 4.8.5 RPMs security update | golang: net: lookup functions may return invalid host names golang: net/http/httputil: ReverseProxy forwards connection headers if first one is empty golang: math/big.Rat: may cause a panic or an unrecoverable fatal error if passed inputs with very large exponents golang: crypto/tls: certificate of wrong type is causing TLS client to panic | [
"cpe:/a:redhat:container_native_virtualization:4.8::el7",
"cpe:/a:redhat:container_native_virtualization:4.8::el8"
] | null | 6.5 | null | null |
RHSA-2024:10268 | Red Hat Security Advisory: edk2 security update | edk2: Integer overflows in PeCoffLoaderRelocateImage | [
"cpe:/a:redhat:rhel_eus:8.8::appstream"
] | null | 5.9 | null | null |
RHSA-2004:418 | Red Hat Security Advisory: kernel security update | security flaw security flaw security flaw | [
"cpe:/o:redhat:enterprise_linux:2.1::as",
"cpe:/o:redhat:enterprise_linux:2.1::es",
"cpe:/o:redhat:enterprise_linux:2.1::ws"
] | null | null | null | null |
RHBA-2022:5749 | Red Hat Bug Fix Advisory: .NET 6.0 bugfix update | eventsource: Exposure of Sensitive Information | [
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::crb"
] | null | 9.3 | null | null |
RHSA-2010:0291 | Red Hat Security Advisory: gfs-kmod security, bug fix and enhancement update | kernel: bug in GFS/GFS2 locking code leads to dos | [
"cpe:/a:redhat:rhel_cluster_storage:5"
] | null | null | null | null |
RHSA-2023:4378 | Red Hat Security Advisory: kernel-rt security and bug fix update | kernel: KVM: x86/mmu: race condition in direct_page_fault() kernel: speculative pointer dereference in do_prlimit() in kernel/sys.c kernel: Spectre v2 SMT mitigations problem kernel: ipvlan: out-of-bounds write caused by unclear skb->cb kernel: cls_flower: out-of-bounds write in fl_set_geneve_opt() | [
"cpe:/a:redhat:enterprise_linux:9::nfv",
"cpe:/a:redhat:enterprise_linux:9::realtime"
] | null | 7.8 | 5.6 | null |
RHSA-2006:0354 | Red Hat Security Advisory: elfutils security update | security flaw | [
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2006:0720 | Red Hat Security Advisory: kdelibs security update | security flaw | [
"cpe:/o:redhat:enterprise_linux:2.1::as",
"cpe:/o:redhat:enterprise_linux:2.1::aw",
"cpe:/o:redhat:enterprise_linux:2.1::es",
"cpe:/o:redhat:enterprise_linux:2.1::ws",
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws",
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2024:0072 | Red Hat Security Advisory: squid security update | squid: DoS against HTTP and HTTPS squid: Denial of Service in SSL Certificate validation squid: NULL pointer dereference in the gopher protocol code squid: Buffer over-read in the HTTP Message processing feature squid: Incorrect Check of Function Return Value In Helper Process management | [
"cpe:/a:redhat:rhel_eus:9.2::appstream"
] | null | 7.5 | null | null |
RHSA-2014:1186 | Red Hat Security Advisory: katello-configure security update | elasticsearch: remote code execution flaw via dynamic scripting | [
"cpe:/a:rhel_sam:1.4::el6"
] | null | null | null | null |
RHSA-2025:2121 | Red Hat Security Advisory: webkit2gtk3 security update | webkitgtk: Processing maliciously crafted web content may lead to memory corruption webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash | [
"cpe:/a:redhat:rhel_aus:8.6::appstream",
"cpe:/a:redhat:rhel_e4s:8.6::appstream",
"cpe:/a:redhat:rhel_tus:8.6::appstream"
] | null | 8.8 | null | null |
RHSA-2018:1843 | Red Hat Security Advisory: Red Hat JBoss Core Services Apache HTTP Server 2.4.23 security update | isapi_redirect: Mishandled HTTP request paths in jk_isapi_plugin.c can lead to unintended exposure of application resources via the reverse proxy | [
"cpe:/a:redhat:jboss_core_services:1"
] | null | null | 7.5 | null |
RHSA-2017:0486 | Red Hat Security Advisory: Red Hat Gluster Storage 3.2.0 security, bug fix, and enhancement update | glusterfs: glusterfs-server %pretrans rpm script temporary file issue | [
"cpe:/a:redhat:storage:3.2:server:el7",
"cpe:/a:redhat:storage:3:client:el7",
"cpe:/o:redhat:enterprise_linux:7::hypervisor"
] | null | null | 4.8 | null |
RHSA-2016:1330 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 6.4 security update | JGroups: Authorization bypass | [
"cpe:/a:redhat:jboss_enterprise_application_platform:6::el5",
"cpe:/a:redhat:jboss_enterprise_application_platform:6::el6",
"cpe:/a:redhat:jboss_enterprise_application_platform:6::el7"
] | null | null | 9.8 | null |
RHSA-2023:4175 | Red Hat Security Advisory: java-11-openjdk security and bug fix update | OpenJDK: HTTP client insufficient file name validation (8302475) OpenJDK: ZIP file parsing infinite loop (8302483) OpenJDK: weakness in AES implementation (8308682) OpenJDK: array indexing integer overflow issue (8304468) OpenJDK: improper handling of slash characters in URI-to-path conversion (8305312) harfbuzz: allows attackers to trigger O(n^2) growth via consecutive marks | [
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb"
] | null | 7.5 | null | null |
RHSA-2021:0734 | Red Hat Security Advisory: nodejs:12 security update | nodejs: HTTP2 'unknownProtocol' cause DoS by resource exhaustion nodejs: DNS rebinding in --inspect | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 7.5 | null | null |
RHSA-2024:5240 | Red Hat Security Advisory: Red Hat JBoss Core Services Apache HTTP Server 2.4.57 SP5 security update | httpd: Encoding problem in mod_proxy httpd: Substitution encoding issue in mod_rewrite httpd: Improper escaping of output in mod_rewrite httpd: Security issues via backend applications whose response headers are malicious or exploitable httpd: NULL pointer dereference in mod_proxy httpd: Potential SSRF in mod_rewrite | [
"cpe:/a:redhat:jboss_core_services:1"
] | null | 7.4 | null | null |
RHSA-2024:7205 | Red Hat Security Advisory: osbuild-composer security update | encoding/gob: golang: Calling Decoder.Decode on a message which contains deeply nested structures can cause a panic due to stack exhaustion | [
"cpe:/a:redhat:rhel_aus:8.4::appstream",
"cpe:/a:redhat:rhel_e4s:8.4::appstream",
"cpe:/a:redhat:rhel_tus:8.4::appstream"
] | null | 7.5 | null | null |
RHSA-2024:1007 | Red Hat Security Advisory: gimp:2.8 security update | gimp: PSD buffer overflow RCE gimp: psp off-by-one RCE | [
"cpe:/a:redhat:rhel_aus:8.4::appstream",
"cpe:/a:redhat:rhel_e4s:8.4::appstream",
"cpe:/a:redhat:rhel_tus:8.4::appstream"
] | null | 7.8 | null | null |
RHSA-2013:1201 | Red Hat Security Advisory: ruby193-v8 security update | v8: remote DoS or unspecified other impact via type confusion | [
"cpe:/a:redhat:openstack:3::el6"
] | null | null | null | null |
RHSA-2016:0185 | Red Hat Security Advisory: kernel security and bug fix update | kernel: x86-64: IRET faults during NMIs processing kernel: Keyrings crash triggerable by unprivileged user | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | null | null |
RHSA-2012:0715 | Red Hat Security Advisory: thunderbird security update | Mozilla: Miscellaneous memory safety hazards (rv:13.0/ rv:10.0.5) (MFSA 2012-34) Mozilla: Miscellaneous memory safety hazards (rv:13.0/ rv:10.0.5) (MFSA 2012-34) Mozilla: Miscellaneous memory safety hazards (rv:13.0/ rv:10.0.5) (MFSA 2012-34) Mozilla: Miscellaneous memory safety hazards (rv:13.0/ rv:10.0.5) (MFSA 2012-34) Mozilla: Buffer overflow and use-after-free issues found using Address Sanitizer (MFSA 2012-40) Mozilla: Buffer overflow and use-after-free issues found using Address Sanitizer (MFSA 2012-40) Mozilla: Content Security Policy inline-script bypass (MFSA 2012-36) Mozilla: Information disclosure though Windows file shares and shortcut files (MFSA 2012-37) Mozilla: Use-after-free while replacing/inserting a node in a document (MFSA 2012-38) Mozilla: Buffer overflow and use-after-free issues found using Address Sanitizer (MFSA 2012-40) Mozilla: Miscellaneous memory safety hazards (rv:13.0/ rv:10.0.5) (MFSA 2012-34) | [
"cpe:/a:redhat:rhel_productivity:5",
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2011:0918 | Red Hat Security Advisory: curl security update | curl: Improper delegation of client credentials during GSS negotiation | [
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws",
"cpe:/o:redhat:enterprise_linux:5::server",
"cpe:/o:redhat:enterprise_linux:6::server"
] | null | null | null | null |
RHSA-2020:1181 | Red Hat Security Advisory: unzip security update | unzip: overlapping of files in ZIP container leads to denial of service | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 4 | null |
RHSA-2020:4807 | Red Hat Security Advisory: prometheus-jmx-exporter security update | snakeyaml: Billion laughs attack via alias feature | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 7.6 | null | null |
RHSA-2023:5534 | Red Hat Security Advisory: libvpx security update | libvpx: Heap buffer overflow in vp8 encoding in libvpx libvpx: crash related to VP9 encoding in libvpx | [
"cpe:/a:redhat:rhel_aus:8.2::appstream",
"cpe:/a:redhat:rhel_e4s:8.2::appstream",
"cpe:/a:redhat:rhel_tus:8.2::appstream"
] | null | 7.5 | null | null |
RHSA-2017:2285 | Red Hat Security Advisory: authconfig security, bug fix, and enhancement update | authconfig: Information leak when SSSD is used for authentication against remote server | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 5.3 | null |
RHSA-2011:1536 | Red Hat Security Advisory: sos security, bug fix, and enhancement update | sos: sosreport is gathering certificate-based RHN entitlement private keys | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2019:2863 | Red Hat Security Advisory: kernel security update | kernel: vhost-net: guest to host kernel escape during migration | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | 7.2 | null |
RHSA-2021:3140 | Red Hat Security Advisory: Red Hat Fuse 7.9.0 release and security update | log4j: Socket receiver deserialization vulnerability snakeyaml: Billion laughs attack via alias feature apache-commons-compress: Infinite loop in name encoding algorithm wildfly: The 'enabled-protocols' value in legacy security is not respected if OpenSSL security provider is in use netty: HTTP request smuggling by mishandled whitespace before the colon in HTTP headers netty: HttpObjectDecoder.java allows Content-Length header to accompanied by second Content-Length header resteasy: Improper validation of response header in MediaTypeHeaderDelegate.java class olingo-odata: Server side request forgery in AsyncResponseWrapperImpl tomcat: Mishandling of Transfer-Encoding header allows for HTTP request smuggling tomcat: Apache Tomcat AJP File Read/Inclusion Vulnerability spring-cloud-config-server: sending a request using a specially crafted URL can lead to a directory traversal attack springframework: RFD protection bypass via jsessionid Mojarra: Path traversal via either the loc parameter or the con parameter, incomplete fix of CVE-2018-14371 tomcat: deserialization flaw in session persistence storage leading to RCE RESTEasy: RESTEASY003870 exception in RESTEasy can lead to a reflected XSS attack hibernate-validator: Improper input validation in the interpolation of constraint error messages wildfly-elytron: session fixation when using FORM authentication undertow: invalid HTTP request with large chunk size tomcat: specially crafted sequence of HTTP/2 requests can lead to DoS activemq: improper authentication allows MITM attack tomcat: OutOfMemoryException caused by HTTP/2 connection leak could lead to DoS tomcat: multiple requests with invalid payload length in a WebSocket frame could lead to DoS velocity: arbitrary code execution when attacker is able to modify templates cxf: XSS via the styleSheetPath apache-httpclient: incorrect handling of malformed authority component in request URIs golang.org/x/text: possibility to trigger an infinite loop in encoding/unicode could lead to crash wildfly: Some EJB transaction objects may get accumulated causing Denial of Service wildfly: XML validation manipulation due to incomplete application of use-grammar-pool-only in xercesImpl xnio: file descriptor leak caused by growing amounts of NIO Selector file handles may lead to DoS shiro: specially crafted HTTP request may cause an authentication bypass apache-flink: directory traversal attack allows remote file writing through the REST API resteasy-client: potential sensitive information leakage in JAX-RS RESTEasy Client's WebApplicationException handling hibernate-core: SQL injection vulnerability when both hibernate.use_sql_comments and JPQL String literals are used wildfly: resource adapter logs plaintext JMS password at warning level on connection error wildfly-openssl: memory leak per HTTP session creation in WildFly OpenSSL XStream: Server-Side Forgery Request vulnerability can be activated when unmarshalling mybatis: mishandles deserialization of object streams which could result in remote code execution jetty: local temporary directory hijacking vulnerability bouncycastle: password bypass in OpenBSDBCrypt.checkPassword utility possible json-smart: uncaught exception may lead to crash or information disclosure pdfbox: infinite loop while loading a crafted PDF file pdfbox: OutOfMemory-Exception while loading a crafted PDF file jetty: Resource exhaustion when receiving an invalid large TLS frame | [
"cpe:/a:redhat:jboss_fuse:7"
] | null | 7.5 | 7.5 | null |
RHSA-2023:7090 | Red Hat Security Advisory: libmicrohttpd security update | libmicrohttpd: remote DoS | [
"cpe:/a:redhat:enterprise_linux:8::crb",
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 5.9 | null | null |
RHSA-2021:1935 | Red Hat Security Advisory: rust-toolset:rhel8 security, bug fix, and enhancement update | rust: memory safety violation in String::retain() rust: use-after-free or double free in VecDeque::make_contiguous | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 9.8 | null | null |
RHSA-2022:5673 | Red Hat Security Advisory: Release of containers for OSP 16.2.z director operator tech preview | containerd: insufficiently restricted permissions on container root and plugin directories golang.org/x/crypto: empty plaintext packet causes panic go-getter: command injection vulnerability go-getter: unsafe download (issue 1 of 3) go-getter: unsafe download (issue 2 of 3) go-getter: unsafe download (issue 3 of 3) | [
"cpe:/a:redhat:openstack:16.2::el8"
] | null | 8.6 | null | null |
RHSA-2023:4582 | Red Hat Security Advisory: Release of containers for Red Hat OpenStack Platform 17.1 director Operator | github.com/Masterminds/vcs: Command Injection via argument injection | [
"cpe:/a:redhat:openstack:17.1::el9"
] | null | 9.8 | null | null |
RHSA-2019:0053 | Red Hat Security Advisory: openvswitch security and bug fix update | openvswitch: Mishandle of group mods in lib/ofp-util.c:parse_group_prop_ntr_selection_method() allows for assertion failure openvswitch: Error during bundle commit in ofproto/ofproto.c:ofproto_rule_insert__() allows for crash openvswitch: Buffer over-read in lib/ofp-actions.c:decode_bundle() | [
"cpe:/a:redhat:openstack:10::el7"
] | null | null | 4.9 | null |
RHSA-2010:0356 | Red Hat Security Advisory: java-1.6.0-sun security update | Java: Java Web Start arbitrary command line injection Java: Java Web Start arbitrary command line injection | [
"cpe:/a:redhat:rhel_extras:4",
"cpe:/a:redhat:rhel_extras:5::client",
"cpe:/a:redhat:rhel_extras:5::server"
] | null | null | null | null |
RHSA-2020:2165 | Red Hat Security Advisory: openstack-manila security update | openstack-manila: User with share-network UUID is able to show, create and delete shares | [
"cpe:/a:redhat:openstack:16::el8"
] | null | 8.3 | null | null |
RHSA-2022:1814 | Red Hat Security Advisory: gnome-shell security and bug fix update | gnome-shell: Password from logged-out user may be shown on login screen | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 4.3 | null | null |
RHSA-2024:7432 | Red Hat Security Advisory: kpatch-patch-5_14_0-427_13_1 and kpatch-patch-5_14_0-427_31_1 security update | kernel: wifi: mac80211: Avoid address calculations via out of bounds array indexing | [
"cpe:/o:redhat:enterprise_linux:9::baseos"
] | null | 7.8 | null | null |
RHSA-2018:0030 | Red Hat Security Advisory: libvirt security update | An update for libvirt is now available for Red Hat Enterprise Linux 6.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2022:8644 | Red Hat Security Advisory: varnish security update | varnish: Request Forgery Vulnerability | [
"cpe:/a:redhat:rhel_eus:9.0::appstream",
"cpe:/a:redhat:rhel_eus:9.0::crb"
] | null | 7.5 | null | null |
RHSA-2024:0957 | Red Hat Security Advisory: thunderbird security update | Mozilla: Out-of-bounds memory read in networking channels Mozilla: Alert dialog could have been spoofed on another site Mozilla: Fullscreen Notification could have been hidden by select element Mozilla: Custom cursor could obscure the permission dialog Mozilla: Mouse cursor re-positioned unexpectedly could have led to unintended permission grants Mozilla: Multipart HTTP Responses would accept the Set-Cookie header in response parts Mozilla: Incorrect code generation on 32-bit ARM devices Mozilla: Memory safety bugs fixed in Firefox 123, Firefox ESR 115.8, and Thunderbird 115.8 | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 7.5 | null | null |
RHSA-2020:1280 | Red Hat Security Advisory: OpenShift Container Platform 4.2.z openshift-enterprise-ansible-operator-container security update | openshift/ocp-release-operator-sdk: /etc/passwd is given incorrect privileges | [
"cpe:/a:redhat:openshift:4.2::el7"
] | null | 7 | null | null |
RHSA-2015:1457 | Red Hat Security Advisory: gnutls security and bug fix update | gnutls: gnutls does not perform date/time checks on CA certificates gnutls: RSA PKCS#1 signature verification forgery gnutls: certificate algorithm consistency checking issue | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2021:0489 | Red Hat Security Advisory: Red Hat JBoss Web Server 3.1 Service Pack 11 security update | openssl: EDIPARTYNAME NULL pointer de-reference | [
"cpe:/a:redhat:jboss_enterprise_web_server:3.1::el7"
] | null | 5.9 | null | null |
RHSA-2016:1985 | Red Hat Security Advisory: thunderbird security update | Mozilla: Memory safety bugs fixed in Firefox ESR 45.4 (MFSA 2016-85, MFSA 2016-86) | [
"cpe:/a:redhat:rhel_productivity:5",
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation",
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 9.8 | null |
RHSA-2016:2871 | Red Hat Security Advisory: bind security update | bind: assertion failure while handling responses containing a DNAME answer | [
"cpe:/o:redhat:rhel_aus:6.4::server",
"cpe:/o:redhat:rhel_aus:6.5::server",
"cpe:/o:redhat:rhel_aus:6.6::server",
"cpe:/o:redhat:rhel_eus:6.7::computenode",
"cpe:/o:redhat:rhel_eus:6.7::server",
"cpe:/o:redhat:rhel_mission_critical:6.2::server",
"cpe:/o:redhat:rhel_tus:6.5::server",
"cpe:/o:redhat:rhel_tus:6.6::server"
] | null | null | 7.5 | null |
RHSA-2019:2792 | Red Hat Security Advisory: OpenShift Container Platform 4.1.16 security and bug fix update | atomic-openshift: CSRF tokens not refreshing while user is logged in and are exposed in the URL | [
"cpe:/a:redhat:openshift:4.1::el7"
] | null | null | 4.2 | null |
RHSA-2021:3767 | Red Hat Security Advisory: kernel security update | kernel: SVM nested virtualization issue in KVM (AVIC support) kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks | [
"cpe:/o:redhat:rhel_aus:7.2::server"
] | null | 7 | null | null |
RHSA-2021:5148 | Red Hat Security Advisory: OpenShift Container Platform 4.8.24 extras security update | log4j: Remote code execution in Log4j 1.x when application is configured to use JMSAppender log4j-core: Remote code execution in Log4j 2.x when logs contain an attacker-controlled string value log4j-core: DoS in log4j 2.x with thread context message pattern and context lookup pattern (incomplete fix for CVE-2021-44228) | [
"cpe:/a:redhat:openshift:4.8::el8"
] | null | 8.1 | null | null |
RHSA-2020:1068 | Red Hat Security Advisory: squid security and bug fix update | squid: Incorrect pointer handling when processing ESI Responses can lead to denial of service squid: Incorrect pointer handling in HTTP processing and certificate download can lead to denial of service squid: XSS via user_name or auth parameter in cachemgr.cgi | [
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 4.3 | null |
RHSA-2022:9073 | Red Hat Security Advisory: nodejs:16 security, bug fix, and enhancement update | nodejs: Improper handling of URI Subject Alternative Names nodejs: Certificate Verification Bypass via String Injection nodejs: Incorrect handling of certificate subject and issuer fields minimist: prototype pollution nodejs-minimatch: ReDoS via the braceExpand function nodejs: Prototype pollution via console.table properties nodejs: DNS rebinding in inspect via invalid octal IP address | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 7.5 | null | null |
RHSA-2023:0445 | Red Hat Security Advisory: go-toolset-1.18 security update | golang: archive/tar: github.com/vbatts/tar-split: unbounded memory consumption when reading headers golang: net/http/httputil: ReverseProxy should not forward unparseable query parameters golang: regexp/syntax: limit memory used by parsing regexps | [
"cpe:/a:redhat:devtools:2022"
] | null | 6.5 | null | null |
RHSA-2020:3702 | Red Hat Security Advisory: openstack-nova security update | openstack-nova: Soft reboot after live-migration reverts instance to original source domain XML | [
"cpe:/a:redhat:openstack:16.1::el8"
] | null | 8.3 | null | null |
RHSA-2011:0152 | Red Hat Security Advisory: java-1.4.2-ibm security update | krb5: null pointer dereference in GSS-API library leads to DoS (MITKRB5-SA-2010-005) OpenJDK HttpURLConnection incomplete TRACE permission check (6981426) | [
"cpe:/a:redhat:rhel_extras:4",
"cpe:/a:redhat:rhel_extras:5::client",
"cpe:/a:redhat:rhel_extras:5::server"
] | null | null | null | null |
RHSA-2019:2974 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.2.4 security update | wildfly-security-manager: security manager authorization bypass | [
"cpe:/a:redhat:jboss_enterprise_application_platform:7.2"
] | null | null | 7.5 | null |
RHSA-2019:1942 | Red Hat Security Advisory: perl security update | perl: Integer overflow leading to buffer overflow in Perl_my_setenv() | [
"cpe:/o:redhat:rhel_eus:7.4::computenode",
"cpe:/o:redhat:rhel_eus:7.4::server"
] | null | null | 8.1 | null |
RHSA-2022:1797 | Red Hat Security Advisory: compat-exiv2-026 security update | exiv2: stack exhaustion issue in the printIFDStructure function may lead to DoS | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 6.5 | null | null |
RHSA-2024:5325 | Red Hat Security Advisory: firefox security update | mozilla: Fullscreen notification dialog can be obscured by document content mozilla: Out of bounds memory access in graphics shared memory handling mozilla: Type confusion in WebAssembly mozilla: Incomplete WebAssembly exception handing mozilla: Out of bounds read in editor component mozilla: CSP strict-dynamic bypass using web-compatibility shims mozilla: Missing permission check when creating a StreamFilter mozilla: Uninitialized memory used by WebGL mozilla: Use-after-free in JavaScript garbage collection mozilla: Use-after-free in IndexedDB mozilla: Document content could partially obscure security prompts | [
"cpe:/a:redhat:rhel_aus:8.4::appstream",
"cpe:/a:redhat:rhel_e4s:8.4::appstream",
"cpe:/a:redhat:rhel_tus:8.4::appstream"
] | null | 6.1 | null | null |
RHSA-2020:4712 | Red Hat Security Advisory: subversion:1.10 security update | subversion: remotely triggerable DoS vulnerability in svnserve 'get-deleted-rev' | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | null | 6.5 | null |
RHSA-2023:5196 | Red Hat Security Advisory: frr security and bug fix update | frr: Incorrect handling of a error in parsing of an invalid section of a BGP update can de-peer a router | [
"cpe:/a:redhat:rhel_aus:8.4::appstream",
"cpe:/a:redhat:rhel_e4s:8.4::appstream",
"cpe:/a:redhat:rhel_tus:8.4::appstream"
] | null | 7.5 | null | null |
RHSA-2010:0616 | Red Hat Security Advisory: dbus-glib security update | dbus-glib: property access not validated | [
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2024:6355 | Red Hat Security Advisory: bubblewrap and flatpak security update | flatpak: Access to files outside sandbox for apps using persistent= (--persist) | [
"cpe:/a:redhat:rhel_eus:9.2::appstream",
"cpe:/a:redhat:rhel_eus:9.2::crb",
"cpe:/o:redhat:rhel_eus:9.2::baseos"
] | null | 7.4 | null | null |
RHSA-2022:0178 | Red Hat Security Advisory: gegl04 security update | gegl: shell expansion via a crafted pathname | [
"cpe:/a:redhat:rhel_eus:8.4::appstream",
"cpe:/a:redhat:rhel_eus:8.4::crb"
] | null | 7.8 | null | null |
RHSA-2023:3950 | Red Hat Security Advisory: open-vm-tools security update | open-vm-tools: authentication bypass vulnerability in the vgauth module | [
"cpe:/a:redhat:rhel_eus:8.6::appstream"
] | null | 3.9 | null | null |
RHSA-2021:2529 | Red Hat Security Advisory: qemu-kvm-rhev security update | QEMU: ide: atapi: OOB access while processing read commands | [
"cpe:/a:redhat:rhev_manager:4.3",
"cpe:/o:redhat:enterprise_linux:7::hypervisor"
] | null | 3.9 | null | null |
RHSA-2024:5315 | Red Hat Security Advisory: open-vm-tools security update | open-vm-tools: SAML token signature bypass | [
"cpe:/o:redhat:rhel_aus:7.7::server"
] | null | 7.1 | null | null |
RHSA-2024:7699 | Red Hat Security Advisory: thunderbird security update | firefox: thunderbird: Compromised content process can bypass site isolation firefox: thunderbird: Cross-origin access to PDF contents through multipart responses firefox: thunderbird: Cross-origin access to JSON contents through multipart responses firefox: thunderbird: Potential memory corruption may occur when cloning certain objects firefox: thunderbird: Potential directory upload bypass via clickjacking firefox: thunderbird: External protocol handlers could be enumerated via popups firefox: thunderbird: Specially crafted WebTransport requests could lead to denial of service firefox: thunderbird: Potential memory corruption during JIT compilation firefox: thunderbird: Memory safety bugs fixed in Firefox 131, Firefox ESR 115.16, Firefox ESR 128.3, Thunderbird 131, and Thunderbird 128.3 firefox: thunderbird: Memory safety bugs fixed in Firefox 131, Firefox ESR 128.3, Thunderbird 131, and Thunderbird 128.3 firefox: thunderbird: Memory safety bugs fixed in Firefox 131 and Thunderbird 131 | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 7.5 | null | null |
RHSA-2018:0646 | Red Hat Security Advisory: python-paramiko security update | python-paramiko: Authentication bypass in transport.py | [
"cpe:/a:redhat:ansible_engine:2::el7"
] | null | null | 9.8 | null |
RHSA-2020:0470 | Red Hat Security Advisory: java-1.8.0-ibm security update | OpenJDK: Incorrect exception processing during deserialization in BeanContextSupport (Serialization, 8224909) OpenJDK: Incorrect isBuiltinStreamHandler check causing URL normalization issues (Networking, 8228548) OpenJDK: Serialization filter changes via jdk.serialFilter property modification (Serialization, 8231422) OpenJDK: Incomplete enforcement of maxDatagramSockets limit in DatagramChannelImpl (Networking, 8231795) | [
"cpe:/a:redhat:rhel_extras:7"
] | null | 3.7 | null | null |
RHSA-2016:1435 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 6.4.9 update | tomcat: URL Normalization issue JGroups: Authorization bypass | [
"cpe:/a:redhat:jboss_enterprise_application_platform:6.4"
] | null | null | 9.8 | null |
RHSA-2020:5239 | Red Hat Security Advisory: firefox security update | Mozilla: Variable time processing of cross-origin images during drawImage calls Mozilla: Parsing mismatches could confuse and bypass security sanitizer for chrome privileged code Mozilla: Fullscreen could be enabled without displaying the security UI Mozilla: XSS through paste (manual and clipboard API) Mozilla: Requests intercepted through ServiceWorkers lacked MIME type restrictions Mozilla: Use-after-free in WebRequestService Mozilla: Potential use-after-free in uses of nsTArray Mozilla: DoH did not filter IPv4 mapped IP Addresses Mozilla: Software keyboards may have remembered typed passwords Mozilla: Memory safety bugs fixed in Firefox 83 and Firefox ESR 78.5 | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 8.8 | 6.1 | null |
RHSA-2002:135 | Red Hat Security Advisory: : : : Updated secureweb packages available | security flaw | [
"cpe:/a:redhat:secure_web_server:3.2"
] | null | null | null | null |
RHSA-2022:5030 | Red Hat Security Advisory: Red Hat Fuse Online 7.10.2.P1 security update | google-oauth-client: Token signature not verified eventsource: Exposure of Sensitive Information | [
"cpe:/a:redhat:jboss_fuse:7"
] | null | 9.3 | null | null |
RHSA-2021:1983 | Red Hat Security Advisory: idm:DL1 security update | slapi-nis: NULL dereference (DoS) with specially crafted Binding DN | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 7.5 | null | null |
RHSA-2020:5611 | Red Hat Security Advisory: Red Hat Virtualization security, bug fix, and enhancement update | lldpd: buffer overflow in the lldp_decode function in daemon/protocols/lldp.c nodejs-lodash: prototype pollution in zipObjectDeep function | [
"cpe:/o:redhat:rhev_hypervisor:4.4::el8"
] | null | 7.4 | null | null |
RHSA-2019:0010 | Red Hat Security Advisory: rh-perl524-perl security update | perl: Integer overflow leading to buffer overflow in Perl_my_setenv() perl: Heap-based buffer overflow in S_handle_regex_sets() perl: Heap-based buffer read overflow in S_grok_bslash_N() perl: Heap-based buffer overflow in S_regatom() | [
"cpe:/a:redhat:rhel_software_collections:3::el6",
"cpe:/a:redhat:rhel_software_collections:3::el7"
] | null | null | 7 | null |
RHSA-2024:1959 | Red Hat Security Advisory: shim security update | shim: Out-of-bounds read printing error messages shim: RCE in http boot support may lead to Secure Boot bypass shim: Interger overflow leads to heap buffer overflow in verify_sbat_section on 32-bits systems shim: Out-of-bounds read in verify_buffer_authenticode() malformed PE file shim: Out-of-bound read in verify_buffer_sbat() shim: out of bounds read when parsing MZ binaries | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 5.1 | null | null |
RHSA-2013:1292 | Red Hat Security Advisory: kernel security and bug fix update | kernel: mm: use-after-free in madvise_remove() Kernel: signal: information leak in tkill/tgkill Kernel: net: panic while pushing pending data out of a IPv6 socket with UDP_CORK enabled | [
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
Subsets and Splits