id
stringlengths 13
15
| title
stringlengths 29
176
| description
stringlengths 8
31.7k
| cpes
sequencelengths 0
20
| cvss_v4_0
null | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
null |
---|---|---|---|---|---|---|---|
RHSA-2022:1370 | Red Hat Security Advisory: OpenShift Container Platform 4.8.37 security and extras update | moby: Default inheritable capabilities for linux container should be empty | [
"cpe:/a:redhat:openshift:4.8::el8"
] | null | 4.8 | null | null |
RHSA-2022:6447 | Red Hat Security Advisory: ruby:2.7 security, bug fix, and enhancement update | ruby: Regular expression denial of service vulnerability of Date parsing methods ruby: Cookie prefix spoofing in CGI::Cookie.parse ruby: Buffer overrun in String-to-Float conversion | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 6.2 | null | null |
RHSA-2021:0163 | Red Hat Security Advisory: postgresql:12 security update | postgresql: ALTER ... DEPENDS ON EXTENSION is missing authorization checks postgresql: Uncontrolled search path element in logical replication postgresql: Uncontrolled search path element in CREATE EXTENSION postgresql: Reconnection can downgrade connection security settings postgresql: Multiple features escape "security restricted operation" sandbox postgresql: psql's \gset allows overwriting specially treated variables | [
"cpe:/a:redhat:rhel_eus:8.2::appstream"
] | null | 7.5 | null | null |
RHSA-2023:0691 | Red Hat Security Advisory: openvswitch2.17 security, bug fix and enhancement update | openvswitch: Out-of-Bounds Read in Organization Specific TLV openvswitch: Integer Underflow in Organization Specific TLV | [
"cpe:/o:redhat:enterprise_linux:9::fastdatapath"
] | null | 9.8 | null | null |
RHSA-2013:0277 | Red Hat Security Advisory: dnsmasq security, bug fix and enhancement update | libvirt+dnsmasq: DNS configured to answer DNS queries from non-virtual networks | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2022:6448 | Red Hat Security Advisory: nodejs:14 security and bug fix update | nodejs: DNS rebinding in --inspect via invalid IP addresses nodejs: HTTP request smuggling due to flawed parsing of Transfer-Encoding nodejs: HTTP request smuggling due to improper delimiting of header fields nodejs: HTTP request smuggling due to incorrect parsing of multi-line Transfer-Encoding nodejs-got: missing verification of requested URLs allows redirects to UNIX sockets | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 5.3 | null | null |
RHSA-2022:6386 | Red Hat Security Advisory: openvswitch2.17 security update | dpdk: DoS when a Vhost header crosses more than two descriptors and exhausts all mbufs | [
"cpe:/o:redhat:enterprise_linux:9::fastdatapath"
] | null | 8.6 | null | null |
RHSA-2020:1332 | Red Hat Security Advisory: ksh security update | ksh: certain environment variables interpreted as arithmetic expressions on startup, leading to code injection | [
"cpe:/o:redhat:rhel_eus:7.5::computenode",
"cpe:/o:redhat:rhel_eus:7.5::server"
] | null | 7.4 | null | null |
RHSA-2013:0604 | Red Hat Security Advisory: java-1.6.0-openjdk security update | OpenJDK: Specially crafted sample model integer overflow (2D, 8007014) OpenJDK: CMM malformed raster memory corruption (2D, 8007675) | [
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2021:0787 | Red Hat Security Advisory: .NET Core 2.1 on Red Hat Enterprise Linux security and bugfix update | dotnet: System.Text.Encodings.Web Remote Code Execution | [
"cpe:/a:redhat:rhel_dotnet:2.1::el7"
] | null | 8.1 | null | null |
RHSA-2021:0218 | Red Hat Security Advisory: sudo security update | sudo: Heap buffer overflow in argument parsing | [
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 7.8 | null | null |
RHSA-2024:7442 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 8.0 security update | undertow: Improper State Management in Proxy Protocol parsing causes information leakage ion-java: ion-java: Ion Java StackOverflow vulnerability | [
"cpe:/a:redhat:jboss_enterprise_application_platform:8.0"
] | null | 7.5 | null | null |
RHSA-2024:0606 | Red Hat Security Advisory: openssh security update | ssh: Prefix truncation attack on Binary Packet Protocol (BPP) openssh: potential command injection via shell metacharacters | [
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 6.5 | null | null |
RHSA-2024:6962 | Red Hat Security Advisory: python3.11 security update | python: incorrect IPv4 and IPv6 private ranges cpython: python: email module doesn't properly quotes newlines in email headers, allowing header injection python: cpython: Iterating over a malicious ZIP file may lead to Denial of Service | [
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb"
] | null | 5.3 | null | null |
RHSA-2023:1572 | Red Hat Security Advisory: pesign security update | pesign: Local privilege escalation on pesign systemd service | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 7.8 | null | null |
RHSA-2020:5102 | Red Hat Security Advisory: OpenShift Container Platform 3.11.318 jenkins-2-plugins security update | jenkins-2-plugins/mailer: Missing hostname validation in Mailer Plugin could result in MITM jenkins-2-plugins/blueocean: Path traversal vulnerability in Blue Ocean Plugin could allow to read arbitrary files jenkins-2-plugins/blueocean: Blue Ocean Plugin does not perform permission checks in several HTTP endpoints implementing connection tests. | [
"cpe:/a:redhat:openshift:3.11::el7"
] | null | 4.3 | null | null |
RHSA-2024:0262 | Red Hat Security Advisory: kernel security update | kernel: net/sched: sch_qfq component can be exploited if in qfq_change_agg function happens qfq_enqueue overhead kernel: net/sched: cls_fw component can be exploited as result of failure in tcf_change_indev function kernel: net/sched: Use-after-free vulnerabilities in the net/sched classifiers: cls_fw, cls_u32 and cls_route kernel: net/sched: Use-after-free vulnerabilities in the net/sched classifiers: cls_fw, cls_u32 and cls_route kernel: net/sched: Use-after-free vulnerabilities in the net/sched classifiers: cls_fw, cls_u32 and cls_route kernel: net/sched: Use-after-free vulnerabilities in the net/sched classifiers: cls_fw, cls_u32 and cls_route kernel: out-of-bounds write in qfq_change_class function | [
"cpe:/o:redhat:rhel_aus:7.7::server"
] | null | 7 | null | null |
RHSA-2018:1653 | Red Hat Security Advisory: libvirt security update | hw: cpu: speculative store bypass | [
"cpe:/o:redhat:rhel_eus:7.3::computenode",
"cpe:/o:redhat:rhel_eus:7.3::server"
] | null | null | 5.6 | null |
RHSA-2015:2378 | Red Hat Security Advisory: squid security and bug fix update | squid: incorrect X509 server certificate validation (SQUID-2015:1) | [
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | null | null |
RHSA-2015:0836 | Red Hat Security Advisory: openstack-swift security update | openstack-swift: Swift metadata constraints are not correctly enforced | [
"cpe:/a:redhat:openstack:5::el6"
] | null | null | null | null |
RHSA-2022:6531 | Red Hat Security Advisory: OpenShift Container Platform 4.10.33 packages and security update | jenkins-plugin/junit: Stored XSS vulnerability in JUnit Plugin jenkins-plugin: Arbitrary file write vulnerability in Pipeline Input Step Plugin | [
"cpe:/a:redhat:openshift:4.10::el7",
"cpe:/a:redhat:openshift:4.10::el8"
] | null | 7.5 | null | null |
RHBA-2020:4229 | Red Hat Bug Fix Advisory: OpenShift Container Platform 4.5.15 packages update | golang: data race in certain net/http servers including ReverseProxy can lead to DoS golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs | [
"cpe:/a:redhat:openshift:4.5::el7",
"cpe:/a:redhat:openshift:4.5::el8"
] | null | 7.5 | null | null |
RHSA-2023:1892 | Red Hat Security Advisory: java-11-openjdk security update | OpenJDK: improper connection handling during TLS handshake (8294474) OpenJDK: missing string checks for NULL characters (8296622) OpenJDK: incorrect handling of NULL characters in ProcessBuilder (8295304) OpenJDK: Swing HTML parsing issue (8296832) OpenJDK: incorrect enqueue of references in garbage collector (8298191) OpenJDK: certificate validation issue in TLS session negotiation (8298310) OpenJDK: missing check for slash characters in URI-to-path conversion (8298667) | [
"cpe:/a:redhat:rhel_eus:8.6::appstream",
"cpe:/a:redhat:rhel_eus:8.6::crb"
] | null | 3.7 | null | null |
RHSA-2020:0465 | Red Hat Security Advisory: java-1.8.0-ibm security update | OpenJDK: Incorrect exception processing during deserialization in BeanContextSupport (Serialization, 8224909) OpenJDK: Incorrect isBuiltinStreamHandler check causing URL normalization issues (Networking, 8228548) OpenJDK: Serialization filter changes via jdk.serialFilter property modification (Serialization, 8231422) OpenJDK: Incomplete enforcement of maxDatagramSockets limit in DatagramChannelImpl (Networking, 8231795) | [
"cpe:/a:redhat:enterprise_linux:8::supplementary"
] | null | 3.7 | null | null |
RHSA-2023:7623 | Red Hat Security Advisory: Red Hat JBoss Web Server 5.7.7 release and security update | openssl: Denial of service by excessive resource usage in verifying X509 policy constraints openssl: Invalid certificate policies in leaf certificates are silently ignored openssl: Certificate policy check not enabled openssl: Possible DoS translating ASN.1 object identifiers openssl: Excessive time spent checking DH keys and parameters OpenSSL: Excessive time spent checking DH q parameter value tomcat: Open Redirect vulnerability in FORM authentication tomcat: FileUpload: DoS due to accumulation of temporary files on Windows | [
"cpe:/a:redhat:jboss_enterprise_web_server:5.7"
] | null | 5.9 | null | null |
RHSA-2024:6576 | Red Hat Security Advisory: redhat-ds:11 security and bug fix update | 389-ds-base: potential denial of service via specially crafted kerberos AS-REQ request 389-ds-base: Malformed userPassword hash may cause Denial of Service | [
"cpe:/a:redhat:directory_server:11.7::el8"
] | null | 5.7 | null | null |
RHSA-2016:0638 | Red Hat Security Advisory: chromium-browser security update | chromium-browser: out-of-bounds read in Pdfium JPEG2000 decoding chromium-browser: universal XSS in extension bindings chromium-browser: out-of-bounds write in V8 chromium-browser: uninitialized memory read in media chromium-browser: use-after-free related to extensions chromium-browser: android downloaded file path restriction bypass chromium-browser: address bar spoofing chromium-browser: potential leak of sensitive information to malicious extensions chromium-browser: various fixes from internal audits | [
"cpe:/a:redhat:rhel_extras:6"
] | null | null | null | null |
RHSA-2024:9187 | Red Hat Security Advisory: bcc security update | bcc: unprivileged users can force loading of compromised linux headers | [
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::crb"
] | null | 2.8 | null | null |
RHSA-2010:0379 | Red Hat Security Advisory: JBoss Enterprise Application Platform 4.3.0.CP08 update | JBoss EAP jmx authentication bypass with crafted HTTP request JBoss Application Server Web Console Authentication bypass JBossEAP status servlet info leak | [
"cpe:/a:redhat:jboss_enterprise_application_platform:4.3.0::el5"
] | null | null | null | null |
RHSA-2006:0140 | Red Hat Security Advisory: kernel security update | security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw | [
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws"
] | null | null | null | null |
RHSA-2024:1434 | Red Hat Security Advisory: Red Hat OpenShift distributed tracing 3.1.1 operator/operand containers | golang: net/http/internal: Denial of Service (DoS) via Resource Consumption via HTTP requests | [
"cpe:/a:redhat:openshift_distributed_tracing:3.1::el8"
] | null | 5.3 | null | null |
RHSA-2018:1630 | Red Hat Security Advisory: kernel-rt security update | hw: cpu: speculative store bypass | [
"cpe:/a:redhat:rhel_extras_rt:7"
] | null | null | 5.6 | null |
RHSA-2008:0197 | Red Hat Security Advisory: gnome-screensaver security update | gnome-screensaver using NIS auth will unlock if NIS goes away | [
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2020:2544 | Red Hat Security Advisory: chromium-browser security update | chromium-browser: Use after free in reader mode chromium-browser: Use after free in media chromium-browser: Use after free in WebRTC chromium-browser: Type Confusion in V8 chromium-browser: Insufficient policy enforcement in developer tools chromium-browser: Insufficient validation of untrusted input in clipboard chromium-browser: Insufficient policy enforcement in developer tools chromium-browser: Insufficient policy enforcement in developer tools chromium-browser: Insufficient policy enforcement in Blink chromium-browser: Use after free in Blink chromium-browser: Incorrect security UI in full screen chromium-browser: Insufficient policy enforcement in tab strip chromium-browser: Inappropriate implementation in full screen chromium-browser: Inappropriate implementation in sharing chromium-browser: Insufficient policy enforcement in enterprise chromium-browser: Insufficient policy enforcement in URL formatting chromium-browser: Insufficient policy enforcement in developer tools chromium-browser: Insufficient policy enforcement in payments chromium-browser: Insufficient data validation in ChromeDriver chromium-browser: Insufficient data validation in media router chromium-browser: Insufficient policy enforcement in navigations chromium-browser: Insufficient policy enforcement in downloads chromium-browser: Insufficient policy enforcement in downloads chromium-browser: Inappropriate implementation in developer tools chromium-browser: Insufficient data validation in loader chromium-browser: Incorrect security UI in site information chromium-browser: Use after free in WebAuthentication chromium-browser: Incorrect security UI in payments chromium-browser: Insufficient policy enforcement in developer tools chromium-browser: Use after free in payments | [
"cpe:/a:redhat:rhel_extras:6"
] | null | 8.8 | 8.8 | null |
RHSA-2017:0123 | Red Hat Security Advisory: docker-latest security, bug fix, and enhancement update | docker: insecure opening of file-descriptor allows privilege escalation | [
"cpe:/a:redhat:rhel_extras_other:7"
] | null | 7.5 | null | null |
RHSA-2019:0711 | Red Hat Security Advisory: openssh security update | openssh: User enumeration via malformed packets in authentication requests | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | 5.3 | null |
RHSA-2020:4402 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.3 security update | jackson-databind: FasterXML DOMDeserializer insecure entity expansion is vulnerable to XML external entity (XXE) | [
"cpe:/a:redhat:jboss_enterprise_application_platform:7.3"
] | null | 7.5 | null | null |
RHSA-2021:2658 | Red Hat Security Advisory: linuxptp security update | linuxptp: missing length check of forwarded messages | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 8.8 | null | null |
RHSA-2015:1385 | Red Hat Security Advisory: net-snmp security and bug fix update | net-snmp: snmptrapd crash when handling an SNMP trap containing a ifMtu with a NULL type | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2011:0461 | Red Hat Security Advisory: jboss-seam2 security update | JBoss Seam privilege escalation caused by EL interpolation in FacesMessages | [
"cpe:/a:redhat:jboss_enterprise_application_platform:5::el4",
"cpe:/a:redhat:jboss_enterprise_application_platform:5::el5"
] | null | null | null | null |
RHSA-2018:2387 | Red Hat Security Advisory: kernel security and bug fix update | Kernel: hw: cpu: L1 terminal fault (L1TF) hw: cpu: speculative store bypass Kernel: hw: cpu: L1 terminal fault (L1TF) | [
"cpe:/o:redhat:rhel_eus:7.4::computenode",
"cpe:/o:redhat:rhel_eus:7.4::server"
] | null | null | 5.6 | null |
RHSA-2013:1426 | Red Hat Security Advisory: xorg-x11-server security update | xorg-x11-server: use-after-free flaw when handling ImageText requests | [
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server",
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2025:0936 | Red Hat Security Advisory: mingw-glib2 security update | glib: buffer overflow in set_connect_msg() | [
"cpe:/a:redhat:enterprise_linux:9::crb"
] | null | 7 | null | null |
RHSA-2020:2838 | Red Hat Security Advisory: file security update | file: out-of-bounds read via a crafted ELF file | [
"cpe:/o:redhat:rhel_eus:7.6::computenode",
"cpe:/o:redhat:rhel_eus:7.6::server"
] | null | null | 5.4 | null |
RHSA-2022:1851 | Red Hat Security Advisory: pki-core:10.6 security and bug fix update | JSS: memory leak in TLS connection leads to OOM | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 7.5 | null | null |
RHSA-2018:2855 | Red Hat Security Advisory: openstack-nova security and bug fix update | openstack-nova: Swapping encrypted volumes can allow an attacker to corrupt the LUKS header causing a denial of service in the host | [
"cpe:/a:redhat:openstack:9::el7"
] | null | null | 6.5 | null |
RHSA-2023:5965 | Red Hat Security Advisory: Red Hat OpenStack Platform 16.2.5 (collectd-libpod-stats, etcd) security update | golang: net/http: insufficient sanitization of Host header golang: crypto/tls: slow verification of certificate chains containing large RSA keys golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487) HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack) | [
"cpe:/a:redhat:openstack:16.2::el8"
] | null | 7.5 | null | null |
RHSA-2013:0220 | Red Hat Security Advisory: Red Hat OpenShift Enterprise 1.1 update | Origin: rhc-chk.rb password exposure in log files Jenkins: HTTP response splitting Jenkins: open redirect Jenkins: cross-site scripting vulnerability rubygem-activerecord: find_by_* SQL Injection jenkins: remote unauthenticated retrieval of master cryptographic key (Jenkins Security Advisory 2013-01-04) openshift-origin-port-proxy: openshift-port-proxy-cfg lockwrap() tmp file creation | [
"cpe:/a:redhat:openshift:1::el6"
] | null | null | null | null |
RHSA-2012:0476 | Red Hat Security Advisory: Red Hat Enterprise MRG Management Console security update | cumin: multiple XSS flaws | [
"cpe:/a:redhat:enterprise_mrg:2::el5"
] | null | null | null | null |
RHSA-2018:1644 | Red Hat Security Advisory: qemu-kvm-rhev security update | hw: cpu: speculative store bypass QEMU: i386: multiboot OOB access while loading kernel image QEMU: cirrus: OOB access when updating VGA display | [
"cpe:/a:redhat:openstack:10::el7"
] | null | null | 5.5 | null |
RHSA-2024:5535 | Red Hat Security Advisory: python3.9 security update | python: Path traversal on tempfile.TemporaryDirectory | [
"cpe:/a:redhat:rhel_eus:9.2::appstream",
"cpe:/a:redhat:rhel_eus:9.2::crb",
"cpe:/o:redhat:rhel_eus:9.2::baseos"
] | null | 7.8 | null | null |
RHSA-2009:1584 | Red Hat Security Advisory: java-1.6.0-openjdk security update | deprecate MD2 in SSL cert validation (Kaminsky) OpenJDK ICC_Profile file existence detection information leak (6631533) OpenJDK JRE AWT setDifflCM stack overflow (6872357) OpenJDK JRE AWT setBytePixels heap overflow (6872358) OpenJDK JPEG Image Writer quantization problem (6862968) OpenJDK ImageI/O JPEG heap overflow (6874643) OpenJDK MessageDigest.isEqual introduces timing attack vulnerabilities (6863503) OpenJDK ASN.1/DER input stream parser denial of service (6864911) CVE-2009-3877 OpenJDK ASN.1/DER input stream parser denial of service (6864911) CVE-2009-3877 OpenJDK GraphicsConfiguration information leak(6822057) OpenJDK UI logging information leakage(6664512) OpenJDK resurrected classloaders can still have children (6636650) OpenJDK information leaks in mutable variables (6657026,6657138) OpenJDK information leaks in mutable variables (6657026,6657138) OpenJDK zoneinfo file existence information leak (6824265) | [
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2018:1415 | Red Hat Security Advisory: firefox security update | Mozilla: Memory safety bugs fixed in Firefox 60 and Firefox ESR 52.8 Mozilla: Use-after-free with SVG animations and clip paths Mozilla: Use-after-free with SVG animations and text paths Mozilla: Same-origin bypass of PDF Viewer to view protected PDF files Mozilla: Malicious PDF can inject JavaScript into PDF Viewer Mozilla: Integer overflow and out-of-bounds write in Skia Mozilla: Lightweight themes can be installed without user interaction Mozilla: Buffer overflow during UTF-8 to Unicode string conversion through legacy extension Mozilla: Backport critical security fixes in Skia | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 9.8 | null |
RHSA-2022:2265 | Red Hat Security Advisory: OpenShift Container Platform 4.6.58 security and extras update | moby: Default inheritable capabilities for linux container should be empty | [
"cpe:/a:redhat:openshift:4.6::el8"
] | null | 4.8 | null | null |
RHSA-2018:0023 | Red Hat Security Advisory: qemu-kvm security update | hw: cpu: speculative execution branch target injection | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 5.6 | null |
RHSA-2012:1281 | Red Hat Security Advisory: Red Hat Enterprise MRG Grid 2.2 security update | cumin: authentication bypass flaws cumin: weak session keys cumin: multiple XSS flaws cumin: SQL injection flaw cumin: DoS via large image requests cumin: CSRF flaw cumin: session fixation flaw cumin: allows for editing internal Condor job attributes condor: local users can abort any idle jobs condor: lock directories created mode 0777 allow for FS-based authentication challenge bypass condor: GIVE_REQUEST_AD leaks privileged ClaimId information | [
"cpe:/a:redhat:enterprise_mrg:2:computenode:el6",
"cpe:/a:redhat:enterprise_mrg:2:server:el6"
] | null | null | null | null |
RHSA-2024:5239 | Red Hat Security Advisory: Red Hat JBoss Core Services Apache HTTP Server 2.4.57 SP5 security update | httpd: Encoding problem in mod_proxy httpd: Substitution encoding issue in mod_rewrite httpd: Improper escaping of output in mod_rewrite httpd: Security issues via backend applications whose response headers are malicious or exploitable httpd: NULL pointer dereference in mod_proxy httpd: Potential SSRF in mod_rewrite | [
"cpe:/a:redhat:jboss_core_services:1::el7",
"cpe:/a:redhat:jboss_core_services:1::el8"
] | null | 7.4 | null | null |
RHSA-2016:1809 | Red Hat Security Advisory: thunderbird security update | Mozilla: Miscellaneous memory safety hazards (rv:45.3) (MFSA 2016-62) | [
"cpe:/a:redhat:rhel_productivity:5",
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation",
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 8.8 | null |
RHSA-2018:0502 | Red Hat Security Advisory: kernel-alt security and bug fix update | kernel: mm/pagewalk.c: walk_hugetlb_range function mishandles holes in hugetlb ranges causing information leak kernel: Race condition in raw_sendmsg function allows denial-of-service or kernel addresses leak | [
"cpe:/o:redhat:enterprise_linux:7::server"
] | null | null | 7.8 | null |
RHSA-2018:3663 | Red Hat Security Advisory: sos-collector security update | sos-collector: incorrect permissions set on newly created files | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 5.9 | null |
RHSA-2023:1770 | Red Hat Security Advisory: openvswitch3.1 security update | openvswitch: ip proto 0 triggers incorrect handling | [
"cpe:/o:redhat:enterprise_linux:9::fastdatapath"
] | null | 8.2 | null | null |
RHSA-2020:0556 | Red Hat Security Advisory: Open Liberty 20.0.0.2 Runtime security update | Open Liberty 20.0.0.2 Runtime is now available from the Customer Portal.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. | [
"cpe:/a:openliberty:20"
] | null | null | null | null |
RHSA-2024:2002 | Red Hat Security Advisory: grub2 security update | grub2: Buffer overflow in grub_font_construct_glyph() can lead to out-of-bound write and possible secure boot bypass | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 8.2 | null | null |
RHSA-2024:9571 | Red Hat Security Advisory: Streams for Apache Kafka 2.8.0 release and security update | protobuf: StackOverflow vulnerability in Protocol Buffers org.eclipse.jetty:jetty-server: jetty: Jetty ThreadLimitHandler.getRemote() vulnerable to remote DoS attacks kroxylicious: Missing upstream Kafka TLS hostname verification org.eclipse.jetty:jetty-servlets: jetty: Jetty DOS vulnerability on DosFilter netty-codec-http: Allocation of Resources Without Limits or Throttling apache-commons-io: Possible denial of service attack on untrusted input to XmlStreamReader | [
"cpe:/a:redhat:amq_streams:2"
] | null | 4.3 | null | null |
RHSA-2020:5119 | Red Hat Security Advisory: OpenShift Container Platform 4.5.20 packages and golang security update | golang: data race in certain net/http servers including ReverseProxy can lead to DoS golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs | [
"cpe:/a:redhat:openshift:4.5::el7",
"cpe:/a:redhat:openshift:4.5::el8"
] | null | 7.5 | null | null |
RHSA-2024:4744 | Red Hat Security Advisory: resource-agents update | urllib3: proxy-authorization request header is not stripped during cross-origin redirects | [
"cpe:/a:redhat:rhel_eus:8.8::highavailability",
"cpe:/a:redhat:rhel_eus:8.8::resilientstorage"
] | null | 4.4 | null | null |
RHSA-2019:1190 | Red Hat Security Advisory: kernel-rt security and bug fix update | kernel: media: use-after-free in [tuner-xc2028] media driver kernel: Buffer overflow in firewire driver via crafted incoming packets kernel: Out-of-bounds access via an XFRM_MSG_MIGRATE xfrm Netlink message kernel: memory leak when merging buffers in SCSI IO vectors kernel: crypto: privilege escalation in skcipher_recvmsg function Kernel: ipsec: xfrm: use-after-free leading to potential privilege escalation kernel: Unallocated memory access by malicious USB device via bNumInterfaces overflow kernel: Out-of-bounds write via userland offsets in ebt_entry struct in netfilter/ebtables.c Kernel: FPU state information leakage via lazy FPU restore hardware: Microarchitectural Store Buffer Data Sampling (MSBDS) hardware: Micro-architectural Load Port Data Sampling - Information Leak (MLPDS) hardware: Microarchitectural Fill Buffer Data Sampling (MFBDS) kernel: Use-after-free due to race condition in AF_PACKET implementation hardware: Microarchitectural Data Sampling Uncacheable Memory (MDSUM) | [
"cpe:/a:redhat:enterprise_mrg:2:server:el6"
] | null | null | 3.8 | null |
RHSA-2022:0634 | Red Hat Security Advisory: rpm security update | rpm: RPM does not require subkeys to have a valid binding signature | [
"cpe:/a:redhat:rhel_eus:8.2::appstream",
"cpe:/o:redhat:rhel_eus:8.2::baseos"
] | null | 4.4 | null | null |
RHSA-2018:1948 | Red Hat Security Advisory: ansible security and bug fix update | ansible: Failed tasks do not honour no_log option allowing for secrets to be disclosed in logs | [
"cpe:/a:redhat:ansible_engine:2::el7"
] | null | null | 5.9 | null |
RHSA-2005:766 | Red Hat Security Advisory: squid security update | security flaw security flaw security flaw | [
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws",
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2023:7395 | Red Hat Security Advisory: python-setuptools security update | pypa-setuptools: Regular Expression Denial of Service (ReDoS) in package_index.py | [
"cpe:/o:redhat:rhel_eus:8.6::baseos"
] | null | 5.9 | null | null |
RHSA-2018:3838 | Red Hat Security Advisory: ansible security and bug fix update | ansible: Information disclosure in vvv+ mode with no_log on | [
"cpe:/a:redhat:ansible_engine:2::el7"
] | null | 5.3 | null | null |
RHSA-2023:4159 | Red Hat Security Advisory: java-17-openjdk security and bug fix update | OpenJDK: HTTP client insufficient file name validation (8302475) OpenJDK: ZIP file parsing infinite loop (8302483) OpenJDK: weakness in AES implementation (8308682) OpenJDK: modulo operator array indexing issue (8304460) OpenJDK: array indexing integer overflow issue (8304468) OpenJDK: improper handling of slash characters in URI-to-path conversion (8305312) harfbuzz: allows attackers to trigger O(n^2) growth via consecutive marks | [
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb"
] | null | 7.5 | null | null |
RHSA-2020:4049 | Red Hat Security Advisory: virt:rhel security update | QEMU: usb: out-of-bounds r/w access issue while processing usb packets | [
"cpe:/a:redhat:rhel_eus:8.1::appstream",
"cpe:/a:redhat:rhel_eus:8.1::crb"
] | null | 5 | null | null |
RHSA-2024:4035 | Red Hat Security Advisory: ovn-2021 security update | ovn: insufficient validation of BFD packets may lead to denial of service | [
"cpe:/o:redhat:enterprise_linux:8::fastdatapath"
] | null | 6.5 | null | null |
RHSA-2024:1780 | Red Hat Security Advisory: unbound security and bug fix update | unbound: unrestricted reconfiguration enabled to anyone that may lead to local privilege escalation | [
"cpe:/a:redhat:rhel_eus:9.2::appstream",
"cpe:/a:redhat:rhel_eus:9.2::crb"
] | null | 8 | null | null |
RHSA-2013:1527 | Red Hat Security Advisory: rhev-hypervisor6 security and bug fix update | openssh: Prevent connection slot exhaustion attacks Kernel: HID: memory corruption flaw Kernel: HID: zeroplus: heap overflow flaw Kernel: HID: pantherlord: heap overflow flaw python: hostname check bypassing vulnerability in SSL module qemu: buffer overflow in scsi_target_emulate_report_luns | [
"cpe:/o:redhat:enterprise_linux:6::hypervisor"
] | null | null | null | null |
RHSA-2009:1146 | Red Hat Security Advisory: JBoss Enterprise Application Platform 4.3.0.CP05 update | tomcat request dispatcher information disclosure vulnerability tomcat6 Information disclosure in authentication classes tomcat XML parser information disclosure | [
"cpe:/a:redhat:jboss_enterprise_application_platform:4.3.0::el4"
] | null | null | null | null |
RHSA-2023:5081 | Red Hat Security Advisory: librsvg2 security update | librsvg: Arbitrary file read when xinclude href has special characters | [
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 5.5 | null | null |
RHSA-2021:1354 | Red Hat Security Advisory: xstream security update | XStream: Unsafe deserizaliation of javax.sql.rowset.BaseRowSet XStream: Unsafe deserizaliation of com.sun.corba.se.impl.activation.ServerTableEntry XStream: Unsafe deserizaliation of sun.swing.SwingLazyValue XStream: Unsafe deserizaliation of com.sun.tools.javac.processing.JavacProcessingEnvironment NameProcessIterator XStream: Unsafe deserizaliation of com.sun.org.apache.bcel.internal.util.ClassLoader | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 8.1 | null | null |
RHSA-2016:2074 | Red Hat Security Advisory: kernel security and bug fix update | kernel: Uninitialized variable in request_key handling causes kernel crash in error handling path | [
"cpe:/o:redhat:rhel_aus:6.5::server"
] | null | null | 7.8 | null |
RHSA-2013:0153 | Red Hat Security Advisory: Ruby on Rails security update | rubygem-activesupport: Multiple vulnerabilities in parameter parsing in ActionPack | [
"cpe:/a:redhat:openshift:1::el6"
] | null | null | null | null |
RHSA-2011:1310 | Red Hat Security Advisory: jbossws security update | JBossWS remote Denial of Service | [
"cpe:/a:redhat:jboss_enterprise_application_platform:4.2"
] | null | null | null | null |
RHSA-2024:4265 | Red Hat Security Advisory: cups security update | cups: Cupsd Listen arbitrary chmod 0140777 | [
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 4.4 | null | null |
RHSA-2016:2604 | Red Hat Security Advisory: resteasy-base security and bug fix update | RESTEasy: SerializableProvider enabled by default and deserializes untrusted data | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 9 | null |
RHSA-2008:1018 | Red Hat Security Advisory: java-1.6.0-sun security update | Java Web Start File Inclusion via System Properties Override JavaWebStart allows unauthorized network connections Java WebStart privilege escalation Java Web Start exposes username and the pathname of the JWS cache Java Web Start BasicService displays local files in the browser Java WebStart allows hidden code privilege escalation Java WebStart unprivileged local file and network access JRE allows unauthorized file access and connections to localhost OpenJDK applet privilege escalation via JAX package access (6592792) OpenJDK Denial-Of-Service in kerberos authentication (6588160) OpenJDK RSA public key length denial-of-service (6497740) OpenJDK allows to list files within the user home directory (6484091) OpenJDK UTF-8 decoder accepts non-shortest form sequences (4486841) OpenJDK Jar200 Decompression buffer overflow (6755943) OpenJDK calendar object deserialization allows privilege escalation (6734167) OpenJDK Privilege escalation in command line applications (6733959) OpenJDK Font processing vulnerability (6733336) OpenJDK Truetype Font processing vulnerability (6751322) OpenJDK Buffer Overflow in GIF image processing (6766136) OpenJDK Buffer overflow in image processing (6726779) OpenJDK temporary files have guessable file names (6721753) | [
"cpe:/a:redhat:rhel_extras:4",
"cpe:/a:redhat:rhel_extras:5::client",
"cpe:/a:redhat:rhel_extras:5::server"
] | null | null | null | null |
RHSA-2011:0908 | Red Hat Security Advisory: ruby security update | ruby WEBrick log escape sequence Ruby WEBrick javascript injection flaw ruby: memory corruption in BigDecimal on 64bit platforms Ruby: Untrusted codes able to modify arbitrary strings | [
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2023:6257 | Red Hat Security Advisory: OpenShift Container Platform 4.13.21 bug fix and security update | golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487) | [
"cpe:/a:redhat:openshift:4.13::el8",
"cpe:/a:redhat:openshift:4.13::el9"
] | null | 7.5 | null | null |
RHSA-2017:2681 | Red Hat Security Advisory: kernel security update | kernel: stack buffer overflow in the native Bluetooth stack | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | 7.5 | null |
RHSA-2019:2280 | Red Hat Security Advisory: uriparser security update | uriparser: Out-of-bounds write via uriComposeQuery* or uriComposeQueryEx* function uriparser: Integer overflow via uriComposeQuery* or uriComposeQueryEx* function | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 7.3 | null |
RHSA-2023:0607 | Red Hat Security Advisory: thunderbird security update | Mozilla: Revocation status of S/Mime signature certificates was not checked | [
"cpe:/a:redhat:rhel_eus:9.0::appstream"
] | null | 7.5 | null | null |
RHSA-2021:2599 | Red Hat Security Advisory: kernel-rt security and bug fix update | kernel: security bypass in certs/blacklist.c and certs/system_keyring.c kernel: use-after-free in net/bluetooth/hci_event.c when destroying an hci_chan | [
"cpe:/a:redhat:enterprise_linux:8::nfv",
"cpe:/a:redhat:enterprise_linux:8::realtime"
] | null | 7.8 | null | null |
RHSA-2020:5302 | Red Hat Security Advisory: Red Hat build of Quarkus 1.7.5 SP1 release and security update | hibernate-core: SQL injection vulnerability when both hibernate.use_sql_comments and JPQL String literals are used | [
"cpe:/a:redhat:openshift_application_runtimes:1.0"
] | null | 7.4 | null | null |
RHSA-2016:2061 | Red Hat Security Advisory: mariadb-galera security and bug fix update | mysql: general_log can write to configuration files, leading to privilege escalation (CPU Oct 2016) | [
"cpe:/a:redhat:openstack:7::el7"
] | null | null | 9.8 | null |
RHSA-2016:2919 | Red Hat Security Advisory: chromium-browser security update | chromium-browser: use after free in pdfium chromium-browser: universal xss in blink chromium-browser: universal xss in blink chromium-browser: same-origin bypass in pdfium chromium-browser: universal xss in blink chromium-browser: universal xss in blink chromium-browser: out of bounds write in blink chromium-browser: out of bounds write in pdfium chromium-browser: use after free in pdfium chromium-browser: local file disclosure in devtools chromium-browser: use after free in v8 chromium-browser: file download protection bypass chromium-browser: use after free in webaudio chromium-browser: use after free in pdfium chromium-browser: use of unvalidated data in pdfium chromium-browser: address spoofing in omnibox chromium-browser: use after free in v8 chromium-browser: local file access in pdfium chromium-browser: integer overflow in angle chromium-browser: address spoofing in omnibox chromium-browser: integer overflow in pdfium chromium-browser: same-origin bypass in svg chromium-browser: csp bypass in blink chromium-browser: limited xss in blink chromium-browser: csp referrer disclosure chromium-browser: private property access in v8 chromium-browser: various fixes from internal audits | [
"cpe:/a:redhat:rhel_extras:6"
] | null | null | 8.8 | null |
RHSA-2004:670 | Red Hat Security Advisory: samba security update | security flaw | [
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws"
] | null | null | null | null |
RHSA-2008:0834 | Red Hat Security Advisory: JBoss Enterprise Application Platform 4.2.0CP04 security update | Apache Tomcat's default security policy is too open JBossEAP allows download of non-EJB class files | [
"cpe:/a:redhat:jboss_enterprise_application_platform:4.2.0::el5"
] | null | null | null | null |
RHSA-2014:0834 | Red Hat Security Advisory: Red Hat JBoss Web Server 2.0.1 tomcat6 security and bug fix update | Tomcat/JBossWeb: Limited DoS in chunked transfer encoding input filter Tomcat/JBossWeb: XXE vulnerability via user supplied XSLTs Tomcat/JBossWeb: Request smuggling via malicious content length header | [
"cpe:/a:redhat:jboss_enterprise_web_server:2::el5",
"cpe:/a:redhat:jboss_enterprise_web_server:2::el6"
] | null | null | null | null |
RHSA-2020:1659 | Red Hat Security Advisory: grafana security, bug fix, and enhancement update | grafana: incorrect access control in snapshot HTTP API leads to denial of service | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | null | 4.3 | null |
RHSA-2019:0966 | Red Hat Security Advisory: firefox security update | Mozilla: Proxy Auto-Configuration file can define localhost access to be proxied Mozilla: Memory safety bugs fixed in Firefox 66 and Firefox ESR 60.6 Mozilla: Use-after-free when removing in-use DOM elements Mozilla: Type inference is incorrect for constructors entered through on-stack replacement with IonMonkey Mozilla: IonMonkey leaks JS_OPTIMIZED_OUT magic value to script Mozilla: Improper bounds checks when Spectre mitigations are disabled Mozilla: Type-confusion in IonMonkey JIT compiler Mozilla: Use-after-free with SMIL animation controller Mozilla: IonMonkey MArraySlice has incorrect alias information Mozilla: Ionmonkey type confusion with __proto__ mutations | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | null | 8.8 | null |
Subsets and Splits