id
stringlengths
13
15
title
stringlengths
29
176
description
stringlengths
8
31.7k
cpes
sequencelengths
0
20
cvss_v4_0
null
cvss_v3_1
float64
0
10
cvss_v3_0
float64
0
10
cvss_v2_0
null
RHSA-2022:1370
Red Hat Security Advisory: OpenShift Container Platform 4.8.37 security and extras update
moby: Default inheritable capabilities for linux container should be empty
[ "cpe:/a:redhat:openshift:4.8::el8" ]
null
4.8
null
null
RHSA-2022:6447
Red Hat Security Advisory: ruby:2.7 security, bug fix, and enhancement update
ruby: Regular expression denial of service vulnerability of Date parsing methods ruby: Cookie prefix spoofing in CGI::Cookie.parse ruby: Buffer overrun in String-to-Float conversion
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
6.2
null
null
RHSA-2021:0163
Red Hat Security Advisory: postgresql:12 security update
postgresql: ALTER ... DEPENDS ON EXTENSION is missing authorization checks postgresql: Uncontrolled search path element in logical replication postgresql: Uncontrolled search path element in CREATE EXTENSION postgresql: Reconnection can downgrade connection security settings postgresql: Multiple features escape "security restricted operation" sandbox postgresql: psql's \gset allows overwriting specially treated variables
[ "cpe:/a:redhat:rhel_eus:8.2::appstream" ]
null
7.5
null
null
RHSA-2023:0691
Red Hat Security Advisory: openvswitch2.17 security, bug fix and enhancement update
openvswitch: Out-of-Bounds Read in Organization Specific TLV openvswitch: Integer Underflow in Organization Specific TLV
[ "cpe:/o:redhat:enterprise_linux:9::fastdatapath" ]
null
9.8
null
null
RHSA-2013:0277
Red Hat Security Advisory: dnsmasq security, bug fix and enhancement update
libvirt+dnsmasq: DNS configured to answer DNS queries from non-virtual networks
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
null
null
RHSA-2022:6448
Red Hat Security Advisory: nodejs:14 security and bug fix update
nodejs: DNS rebinding in --inspect via invalid IP addresses nodejs: HTTP request smuggling due to flawed parsing of Transfer-Encoding nodejs: HTTP request smuggling due to improper delimiting of header fields nodejs: HTTP request smuggling due to incorrect parsing of multi-line Transfer-Encoding nodejs-got: missing verification of requested URLs allows redirects to UNIX sockets
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
5.3
null
null
RHSA-2022:6386
Red Hat Security Advisory: openvswitch2.17 security update
dpdk: DoS when a Vhost header crosses more than two descriptors and exhausts all mbufs
[ "cpe:/o:redhat:enterprise_linux:9::fastdatapath" ]
null
8.6
null
null
RHSA-2020:1332
Red Hat Security Advisory: ksh security update
ksh: certain environment variables interpreted as arithmetic expressions on startup, leading to code injection
[ "cpe:/o:redhat:rhel_eus:7.5::computenode", "cpe:/o:redhat:rhel_eus:7.5::server" ]
null
7.4
null
null
RHSA-2013:0604
Red Hat Security Advisory: java-1.6.0-openjdk security update
OpenJDK: Specially crafted sample model integer overflow (2D, 8007014) OpenJDK: CMM malformed raster memory corruption (2D, 8007675)
[ "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
RHSA-2021:0787
Red Hat Security Advisory: .NET Core 2.1 on Red Hat Enterprise Linux security and bugfix update
dotnet: System.Text.Encodings.Web Remote Code Execution
[ "cpe:/a:redhat:rhel_dotnet:2.1::el7" ]
null
8.1
null
null
RHSA-2021:0218
Red Hat Security Advisory: sudo security update
sudo: Heap buffer overflow in argument parsing
[ "cpe:/o:redhat:enterprise_linux:8::baseos" ]
null
7.8
null
null
RHSA-2024:7442
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 8.0 security update
undertow: Improper State Management in Proxy Protocol parsing causes information leakage ion-java: ion-java: Ion Java StackOverflow vulnerability
[ "cpe:/a:redhat:jboss_enterprise_application_platform:8.0" ]
null
7.5
null
null
RHSA-2024:0606
Red Hat Security Advisory: openssh security update
ssh: Prefix truncation attack on Binary Packet Protocol (BPP) openssh: potential command injection via shell metacharacters
[ "cpe:/a:redhat:enterprise_linux:8::appstream", "cpe:/o:redhat:enterprise_linux:8::baseos" ]
null
6.5
null
null
RHSA-2024:6962
Red Hat Security Advisory: python3.11 security update
python: incorrect IPv4 and IPv6 private ranges cpython: python: email module doesn't properly quotes newlines in email headers, allowing header injection python: cpython: Iterating over a malicious ZIP file may lead to Denial of Service
[ "cpe:/a:redhat:enterprise_linux:8::appstream", "cpe:/a:redhat:enterprise_linux:8::crb" ]
null
5.3
null
null
RHSA-2023:1572
Red Hat Security Advisory: pesign security update
pesign: Local privilege escalation on pesign systemd service
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
7.8
null
null
RHSA-2020:5102
Red Hat Security Advisory: OpenShift Container Platform 3.11.318 jenkins-2-plugins security update
jenkins-2-plugins/mailer: Missing hostname validation in Mailer Plugin could result in MITM jenkins-2-plugins/blueocean: Path traversal vulnerability in Blue Ocean Plugin could allow to read arbitrary files jenkins-2-plugins/blueocean: Blue Ocean Plugin does not perform permission checks in several HTTP endpoints implementing connection tests.
[ "cpe:/a:redhat:openshift:3.11::el7" ]
null
4.3
null
null
RHSA-2024:0262
Red Hat Security Advisory: kernel security update
kernel: net/sched: sch_qfq component can be exploited if in qfq_change_agg function happens qfq_enqueue overhead kernel: net/sched: cls_fw component can be exploited as result of failure in tcf_change_indev function kernel: net/sched: Use-after-free vulnerabilities in the net/sched classifiers: cls_fw, cls_u32 and cls_route kernel: net/sched: Use-after-free vulnerabilities in the net/sched classifiers: cls_fw, cls_u32 and cls_route kernel: net/sched: Use-after-free vulnerabilities in the net/sched classifiers: cls_fw, cls_u32 and cls_route kernel: net/sched: Use-after-free vulnerabilities in the net/sched classifiers: cls_fw, cls_u32 and cls_route kernel: out-of-bounds write in qfq_change_class function
[ "cpe:/o:redhat:rhel_aus:7.7::server" ]
null
7
null
null
RHSA-2018:1653
Red Hat Security Advisory: libvirt security update
hw: cpu: speculative store bypass
[ "cpe:/o:redhat:rhel_eus:7.3::computenode", "cpe:/o:redhat:rhel_eus:7.3::server" ]
null
null
5.6
null
RHSA-2015:2378
Red Hat Security Advisory: squid security and bug fix update
squid: incorrect X509 server certificate validation (SQUID-2015:1)
[ "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
null
null
RHSA-2015:0836
Red Hat Security Advisory: openstack-swift security update
openstack-swift: Swift metadata constraints are not correctly enforced
[ "cpe:/a:redhat:openstack:5::el6" ]
null
null
null
null
RHSA-2022:6531
Red Hat Security Advisory: OpenShift Container Platform 4.10.33 packages and security update
jenkins-plugin/junit: Stored XSS vulnerability in JUnit Plugin jenkins-plugin: Arbitrary file write vulnerability in Pipeline Input Step Plugin
[ "cpe:/a:redhat:openshift:4.10::el7", "cpe:/a:redhat:openshift:4.10::el8" ]
null
7.5
null
null
RHBA-2020:4229
Red Hat Bug Fix Advisory: OpenShift Container Platform 4.5.15 packages update
golang: data race in certain net/http servers including ReverseProxy can lead to DoS golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs
[ "cpe:/a:redhat:openshift:4.5::el7", "cpe:/a:redhat:openshift:4.5::el8" ]
null
7.5
null
null
RHSA-2023:1892
Red Hat Security Advisory: java-11-openjdk security update
OpenJDK: improper connection handling during TLS handshake (8294474) OpenJDK: missing string checks for NULL characters (8296622) OpenJDK: incorrect handling of NULL characters in ProcessBuilder (8295304) OpenJDK: Swing HTML parsing issue (8296832) OpenJDK: incorrect enqueue of references in garbage collector (8298191) OpenJDK: certificate validation issue in TLS session negotiation (8298310) OpenJDK: missing check for slash characters in URI-to-path conversion (8298667)
[ "cpe:/a:redhat:rhel_eus:8.6::appstream", "cpe:/a:redhat:rhel_eus:8.6::crb" ]
null
3.7
null
null
RHSA-2020:0465
Red Hat Security Advisory: java-1.8.0-ibm security update
OpenJDK: Incorrect exception processing during deserialization in BeanContextSupport (Serialization, 8224909) OpenJDK: Incorrect isBuiltinStreamHandler check causing URL normalization issues (Networking, 8228548) OpenJDK: Serialization filter changes via jdk.serialFilter property modification (Serialization, 8231422) OpenJDK: Incomplete enforcement of maxDatagramSockets limit in DatagramChannelImpl (Networking, 8231795)
[ "cpe:/a:redhat:enterprise_linux:8::supplementary" ]
null
3.7
null
null
RHSA-2023:7623
Red Hat Security Advisory: Red Hat JBoss Web Server 5.7.7 release and security update
openssl: Denial of service by excessive resource usage in verifying X509 policy constraints openssl: Invalid certificate policies in leaf certificates are silently ignored openssl: Certificate policy check not enabled openssl: Possible DoS translating ASN.1 object identifiers openssl: Excessive time spent checking DH keys and parameters OpenSSL: Excessive time spent checking DH q parameter value tomcat: Open Redirect vulnerability in FORM authentication tomcat: FileUpload: DoS due to accumulation of temporary files on Windows
[ "cpe:/a:redhat:jboss_enterprise_web_server:5.7" ]
null
5.9
null
null
RHSA-2024:6576
Red Hat Security Advisory: redhat-ds:11 security and bug fix update
389-ds-base: potential denial of service via specially crafted kerberos AS-REQ request 389-ds-base: Malformed userPassword hash may cause Denial of Service
[ "cpe:/a:redhat:directory_server:11.7::el8" ]
null
5.7
null
null
RHSA-2016:0638
Red Hat Security Advisory: chromium-browser security update
chromium-browser: out-of-bounds read in Pdfium JPEG2000 decoding chromium-browser: universal XSS in extension bindings chromium-browser: out-of-bounds write in V8 chromium-browser: uninitialized memory read in media chromium-browser: use-after-free related to extensions chromium-browser: android downloaded file path restriction bypass chromium-browser: address bar spoofing chromium-browser: potential leak of sensitive information to malicious extensions chromium-browser: various fixes from internal audits
[ "cpe:/a:redhat:rhel_extras:6" ]
null
null
null
null
RHSA-2024:9187
Red Hat Security Advisory: bcc security update
bcc: unprivileged users can force loading of compromised linux headers
[ "cpe:/a:redhat:enterprise_linux:9::appstream", "cpe:/a:redhat:enterprise_linux:9::crb" ]
null
2.8
null
null
RHSA-2010:0379
Red Hat Security Advisory: JBoss Enterprise Application Platform 4.3.0.CP08 update
JBoss EAP jmx authentication bypass with crafted HTTP request JBoss Application Server Web Console Authentication bypass JBossEAP status servlet info leak
[ "cpe:/a:redhat:jboss_enterprise_application_platform:4.3.0::el5" ]
null
null
null
null
RHSA-2006:0140
Red Hat Security Advisory: kernel security update
security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw
[ "cpe:/o:redhat:enterprise_linux:3::as", "cpe:/o:redhat:enterprise_linux:3::desktop", "cpe:/o:redhat:enterprise_linux:3::es", "cpe:/o:redhat:enterprise_linux:3::ws" ]
null
null
null
null
RHSA-2024:1434
Red Hat Security Advisory: Red Hat OpenShift distributed tracing 3.1.1 operator/operand containers
golang: net/http/internal: Denial of Service (DoS) via Resource Consumption via HTTP requests
[ "cpe:/a:redhat:openshift_distributed_tracing:3.1::el8" ]
null
5.3
null
null
RHSA-2018:1630
Red Hat Security Advisory: kernel-rt security update
hw: cpu: speculative store bypass
[ "cpe:/a:redhat:rhel_extras_rt:7" ]
null
null
5.6
null
RHSA-2008:0197
Red Hat Security Advisory: gnome-screensaver security update
gnome-screensaver using NIS auth will unlock if NIS goes away
[ "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
RHSA-2020:2544
Red Hat Security Advisory: chromium-browser security update
chromium-browser: Use after free in reader mode chromium-browser: Use after free in media chromium-browser: Use after free in WebRTC chromium-browser: Type Confusion in V8 chromium-browser: Insufficient policy enforcement in developer tools chromium-browser: Insufficient validation of untrusted input in clipboard chromium-browser: Insufficient policy enforcement in developer tools chromium-browser: Insufficient policy enforcement in developer tools chromium-browser: Insufficient policy enforcement in Blink chromium-browser: Use after free in Blink chromium-browser: Incorrect security UI in full screen chromium-browser: Insufficient policy enforcement in tab strip chromium-browser: Inappropriate implementation in full screen chromium-browser: Inappropriate implementation in sharing chromium-browser: Insufficient policy enforcement in enterprise chromium-browser: Insufficient policy enforcement in URL formatting chromium-browser: Insufficient policy enforcement in developer tools chromium-browser: Insufficient policy enforcement in payments chromium-browser: Insufficient data validation in ChromeDriver chromium-browser: Insufficient data validation in media router chromium-browser: Insufficient policy enforcement in navigations chromium-browser: Insufficient policy enforcement in downloads chromium-browser: Insufficient policy enforcement in downloads chromium-browser: Inappropriate implementation in developer tools chromium-browser: Insufficient data validation in loader chromium-browser: Incorrect security UI in site information chromium-browser: Use after free in WebAuthentication chromium-browser: Incorrect security UI in payments chromium-browser: Insufficient policy enforcement in developer tools chromium-browser: Use after free in payments
[ "cpe:/a:redhat:rhel_extras:6" ]
null
8.8
8.8
null
RHSA-2017:0123
Red Hat Security Advisory: docker-latest security, bug fix, and enhancement update
docker: insecure opening of file-descriptor allows privilege escalation
[ "cpe:/a:redhat:rhel_extras_other:7" ]
null
7.5
null
null
RHSA-2019:0711
Red Hat Security Advisory: openssh security update
openssh: User enumeration via malformed packets in authentication requests
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
5.3
null
RHSA-2020:4402
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.3 security update
jackson-databind: FasterXML DOMDeserializer insecure entity expansion is vulnerable to XML external entity (XXE)
[ "cpe:/a:redhat:jboss_enterprise_application_platform:7.3" ]
null
7.5
null
null
RHSA-2021:2658
Red Hat Security Advisory: linuxptp security update
linuxptp: missing length check of forwarded messages
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
8.8
null
null
RHSA-2015:1385
Red Hat Security Advisory: net-snmp security and bug fix update
net-snmp: snmptrapd crash when handling an SNMP trap containing a ifMtu with a NULL type
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
null
null
RHSA-2011:0461
Red Hat Security Advisory: jboss-seam2 security update
JBoss Seam privilege escalation caused by EL interpolation in FacesMessages
[ "cpe:/a:redhat:jboss_enterprise_application_platform:5::el4", "cpe:/a:redhat:jboss_enterprise_application_platform:5::el5" ]
null
null
null
null
RHSA-2018:2387
Red Hat Security Advisory: kernel security and bug fix update
Kernel: hw: cpu: L1 terminal fault (L1TF) hw: cpu: speculative store bypass Kernel: hw: cpu: L1 terminal fault (L1TF)
[ "cpe:/o:redhat:rhel_eus:7.4::computenode", "cpe:/o:redhat:rhel_eus:7.4::server" ]
null
null
5.6
null
RHSA-2013:1426
Red Hat Security Advisory: xorg-x11-server security update
xorg-x11-server: use-after-free flaw when handling ImageText requests
[ "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::client_workstation", "cpe:/o:redhat:enterprise_linux:5::server", "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
null
null
RHSA-2025:0936
Red Hat Security Advisory: mingw-glib2 security update
glib: buffer overflow in set_connect_msg()
[ "cpe:/a:redhat:enterprise_linux:9::crb" ]
null
7
null
null
RHSA-2020:2838
Red Hat Security Advisory: file security update
file: out-of-bounds read via a crafted ELF file
[ "cpe:/o:redhat:rhel_eus:7.6::computenode", "cpe:/o:redhat:rhel_eus:7.6::server" ]
null
null
5.4
null
RHSA-2022:1851
Red Hat Security Advisory: pki-core:10.6 security and bug fix update
JSS: memory leak in TLS connection leads to OOM
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
7.5
null
null
RHSA-2018:2855
Red Hat Security Advisory: openstack-nova security and bug fix update
openstack-nova: Swapping encrypted volumes can allow an attacker to corrupt the LUKS header causing a denial of service in the host
[ "cpe:/a:redhat:openstack:9::el7" ]
null
null
6.5
null
RHSA-2023:5965
Red Hat Security Advisory: Red Hat OpenStack Platform 16.2.5 (collectd-libpod-stats, etcd) security update
golang: net/http: insufficient sanitization of Host header golang: crypto/tls: slow verification of certificate chains containing large RSA keys golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487) HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack)
[ "cpe:/a:redhat:openstack:16.2::el8" ]
null
7.5
null
null
RHSA-2013:0220
Red Hat Security Advisory: Red Hat OpenShift Enterprise 1.1 update
Origin: rhc-chk.rb password exposure in log files Jenkins: HTTP response splitting Jenkins: open redirect Jenkins: cross-site scripting vulnerability rubygem-activerecord: find_by_* SQL Injection jenkins: remote unauthenticated retrieval of master cryptographic key (Jenkins Security Advisory 2013-01-04) openshift-origin-port-proxy: openshift-port-proxy-cfg lockwrap() tmp file creation
[ "cpe:/a:redhat:openshift:1::el6" ]
null
null
null
null
RHSA-2012:0476
Red Hat Security Advisory: Red Hat Enterprise MRG Management Console security update
cumin: multiple XSS flaws
[ "cpe:/a:redhat:enterprise_mrg:2::el5" ]
null
null
null
null
RHSA-2018:1644
Red Hat Security Advisory: qemu-kvm-rhev security update
hw: cpu: speculative store bypass QEMU: i386: multiboot OOB access while loading kernel image QEMU: cirrus: OOB access when updating VGA display
[ "cpe:/a:redhat:openstack:10::el7" ]
null
null
5.5
null
RHSA-2024:5535
Red Hat Security Advisory: python3.9 security update
python: Path traversal on tempfile.TemporaryDirectory
[ "cpe:/a:redhat:rhel_eus:9.2::appstream", "cpe:/a:redhat:rhel_eus:9.2::crb", "cpe:/o:redhat:rhel_eus:9.2::baseos" ]
null
7.8
null
null
RHSA-2009:1584
Red Hat Security Advisory: java-1.6.0-openjdk security update
deprecate MD2 in SSL cert validation (Kaminsky) OpenJDK ICC_Profile file existence detection information leak (6631533) OpenJDK JRE AWT setDifflCM stack overflow (6872357) OpenJDK JRE AWT setBytePixels heap overflow (6872358) OpenJDK JPEG Image Writer quantization problem (6862968) OpenJDK ImageI/O JPEG heap overflow (6874643) OpenJDK MessageDigest.isEqual introduces timing attack vulnerabilities (6863503) OpenJDK ASN.1/DER input stream parser denial of service (6864911) CVE-2009-3877 OpenJDK ASN.1/DER input stream parser denial of service (6864911) CVE-2009-3877 OpenJDK GraphicsConfiguration information leak(6822057) OpenJDK UI logging information leakage(6664512) OpenJDK resurrected classloaders can still have children (6636650) OpenJDK information leaks in mutable variables (6657026,6657138) OpenJDK information leaks in mutable variables (6657026,6657138) OpenJDK zoneinfo file existence information leak (6824265)
[ "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
RHSA-2018:1415
Red Hat Security Advisory: firefox security update
Mozilla: Memory safety bugs fixed in Firefox 60 and Firefox ESR 52.8 Mozilla: Use-after-free with SVG animations and clip paths Mozilla: Use-after-free with SVG animations and text paths Mozilla: Same-origin bypass of PDF Viewer to view protected PDF files Mozilla: Malicious PDF can inject JavaScript into PDF Viewer Mozilla: Integer overflow and out-of-bounds write in Skia Mozilla: Lightweight themes can be installed without user interaction Mozilla: Buffer overflow during UTF-8 to Unicode string conversion through legacy extension Mozilla: Backport critical security fixes in Skia
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
9.8
null
RHSA-2022:2265
Red Hat Security Advisory: OpenShift Container Platform 4.6.58 security and extras update
moby: Default inheritable capabilities for linux container should be empty
[ "cpe:/a:redhat:openshift:4.6::el8" ]
null
4.8
null
null
RHSA-2018:0023
Red Hat Security Advisory: qemu-kvm security update
hw: cpu: speculative execution branch target injection
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
5.6
null
RHSA-2012:1281
Red Hat Security Advisory: Red Hat Enterprise MRG Grid 2.2 security update
cumin: authentication bypass flaws cumin: weak session keys cumin: multiple XSS flaws cumin: SQL injection flaw cumin: DoS via large image requests cumin: CSRF flaw cumin: session fixation flaw cumin: allows for editing internal Condor job attributes condor: local users can abort any idle jobs condor: lock directories created mode 0777 allow for FS-based authentication challenge bypass condor: GIVE_REQUEST_AD leaks privileged ClaimId information
[ "cpe:/a:redhat:enterprise_mrg:2:computenode:el6", "cpe:/a:redhat:enterprise_mrg:2:server:el6" ]
null
null
null
null
RHSA-2024:5239
Red Hat Security Advisory: Red Hat JBoss Core Services Apache HTTP Server 2.4.57 SP5 security update
httpd: Encoding problem in mod_proxy httpd: Substitution encoding issue in mod_rewrite httpd: Improper escaping of output in mod_rewrite httpd: Security issues via backend applications whose response headers are malicious or exploitable httpd: NULL pointer dereference in mod_proxy httpd: Potential SSRF in mod_rewrite
[ "cpe:/a:redhat:jboss_core_services:1::el7", "cpe:/a:redhat:jboss_core_services:1::el8" ]
null
7.4
null
null
RHSA-2016:1809
Red Hat Security Advisory: thunderbird security update
Mozilla: Miscellaneous memory safety hazards (rv:45.3) (MFSA 2016-62)
[ "cpe:/a:redhat:rhel_productivity:5", "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation", "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
8.8
null
RHSA-2018:0502
Red Hat Security Advisory: kernel-alt security and bug fix update
kernel: mm/pagewalk.c: walk_hugetlb_range function mishandles holes in hugetlb ranges causing information leak kernel: Race condition in raw_sendmsg function allows denial-of-service or kernel addresses leak
[ "cpe:/o:redhat:enterprise_linux:7::server" ]
null
null
7.8
null
RHSA-2018:3663
Red Hat Security Advisory: sos-collector security update
sos-collector: incorrect permissions set on newly created files
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
5.9
null
RHSA-2023:1770
Red Hat Security Advisory: openvswitch3.1 security update
openvswitch: ip proto 0 triggers incorrect handling
[ "cpe:/o:redhat:enterprise_linux:9::fastdatapath" ]
null
8.2
null
null
RHSA-2020:0556
Red Hat Security Advisory: Open Liberty 20.0.0.2 Runtime security update
Open Liberty 20.0.0.2 Runtime is now available from the Customer Portal. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
[ "cpe:/a:openliberty:20" ]
null
null
null
null
RHSA-2024:2002
Red Hat Security Advisory: grub2 security update
grub2: Buffer overflow in grub_font_construct_glyph() can lead to out-of-bound write and possible secure boot bypass
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
8.2
null
null
RHSA-2024:9571
Red Hat Security Advisory: Streams for Apache Kafka 2.8.0 release and security update
protobuf: StackOverflow vulnerability in Protocol Buffers org.eclipse.jetty:jetty-server: jetty: Jetty ThreadLimitHandler.getRemote() vulnerable to remote DoS attacks kroxylicious: Missing upstream Kafka TLS hostname verification org.eclipse.jetty:jetty-servlets: jetty: Jetty DOS vulnerability on DosFilter netty-codec-http: Allocation of Resources Without Limits or Throttling apache-commons-io: Possible denial of service attack on untrusted input to XmlStreamReader
[ "cpe:/a:redhat:amq_streams:2" ]
null
4.3
null
null
RHSA-2020:5119
Red Hat Security Advisory: OpenShift Container Platform 4.5.20 packages and golang security update
golang: data race in certain net/http servers including ReverseProxy can lead to DoS golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs
[ "cpe:/a:redhat:openshift:4.5::el7", "cpe:/a:redhat:openshift:4.5::el8" ]
null
7.5
null
null
RHSA-2024:4744
Red Hat Security Advisory: resource-agents update
urllib3: proxy-authorization request header is not stripped during cross-origin redirects
[ "cpe:/a:redhat:rhel_eus:8.8::highavailability", "cpe:/a:redhat:rhel_eus:8.8::resilientstorage" ]
null
4.4
null
null
RHSA-2019:1190
Red Hat Security Advisory: kernel-rt security and bug fix update
kernel: media: use-after-free in [tuner-xc2028] media driver kernel: Buffer overflow in firewire driver via crafted incoming packets kernel: Out-of-bounds access via an XFRM_MSG_MIGRATE xfrm Netlink message kernel: memory leak when merging buffers in SCSI IO vectors kernel: crypto: privilege escalation in skcipher_recvmsg function Kernel: ipsec: xfrm: use-after-free leading to potential privilege escalation kernel: Unallocated memory access by malicious USB device via bNumInterfaces overflow kernel: Out-of-bounds write via userland offsets in ebt_entry struct in netfilter/ebtables.c Kernel: FPU state information leakage via lazy FPU restore hardware: Microarchitectural Store Buffer Data Sampling (MSBDS) hardware: Micro-architectural Load Port Data Sampling - Information Leak (MLPDS) hardware: Microarchitectural Fill Buffer Data Sampling (MFBDS) kernel: Use-after-free due to race condition in AF_PACKET implementation hardware: Microarchitectural Data Sampling Uncacheable Memory (MDSUM)
[ "cpe:/a:redhat:enterprise_mrg:2:server:el6" ]
null
null
3.8
null
RHSA-2022:0634
Red Hat Security Advisory: rpm security update
rpm: RPM does not require subkeys to have a valid binding signature
[ "cpe:/a:redhat:rhel_eus:8.2::appstream", "cpe:/o:redhat:rhel_eus:8.2::baseos" ]
null
4.4
null
null
RHSA-2018:1948
Red Hat Security Advisory: ansible security and bug fix update
ansible: Failed tasks do not honour no_log option allowing for secrets to be disclosed in logs
[ "cpe:/a:redhat:ansible_engine:2::el7" ]
null
null
5.9
null
RHSA-2005:766
Red Hat Security Advisory: squid security update
security flaw security flaw security flaw
[ "cpe:/o:redhat:enterprise_linux:3::as", "cpe:/o:redhat:enterprise_linux:3::desktop", "cpe:/o:redhat:enterprise_linux:3::es", "cpe:/o:redhat:enterprise_linux:3::ws", "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws" ]
null
null
null
null
RHSA-2023:7395
Red Hat Security Advisory: python-setuptools security update
pypa-setuptools: Regular Expression Denial of Service (ReDoS) in package_index.py
[ "cpe:/o:redhat:rhel_eus:8.6::baseos" ]
null
5.9
null
null
RHSA-2018:3838
Red Hat Security Advisory: ansible security and bug fix update
ansible: Information disclosure in vvv+ mode with no_log on
[ "cpe:/a:redhat:ansible_engine:2::el7" ]
null
5.3
null
null
RHSA-2023:4159
Red Hat Security Advisory: java-17-openjdk security and bug fix update
OpenJDK: HTTP client insufficient file name validation (8302475) OpenJDK: ZIP file parsing infinite loop (8302483) OpenJDK: weakness in AES implementation (8308682) OpenJDK: modulo operator array indexing issue (8304460) OpenJDK: array indexing integer overflow issue (8304468) OpenJDK: improper handling of slash characters in URI-to-path conversion (8305312) harfbuzz: allows attackers to trigger O(n^2) growth via consecutive marks
[ "cpe:/a:redhat:enterprise_linux:8::appstream", "cpe:/a:redhat:enterprise_linux:8::crb" ]
null
7.5
null
null
RHSA-2020:4049
Red Hat Security Advisory: virt:rhel security update
QEMU: usb: out-of-bounds r/w access issue while processing usb packets
[ "cpe:/a:redhat:rhel_eus:8.1::appstream", "cpe:/a:redhat:rhel_eus:8.1::crb" ]
null
5
null
null
RHSA-2024:4035
Red Hat Security Advisory: ovn-2021 security update
ovn: insufficient validation of BFD packets may lead to denial of service
[ "cpe:/o:redhat:enterprise_linux:8::fastdatapath" ]
null
6.5
null
null
RHSA-2024:1780
Red Hat Security Advisory: unbound security and bug fix update
unbound: unrestricted reconfiguration enabled to anyone that may lead to local privilege escalation
[ "cpe:/a:redhat:rhel_eus:9.2::appstream", "cpe:/a:redhat:rhel_eus:9.2::crb" ]
null
8
null
null
RHSA-2013:1527
Red Hat Security Advisory: rhev-hypervisor6 security and bug fix update
openssh: Prevent connection slot exhaustion attacks Kernel: HID: memory corruption flaw Kernel: HID: zeroplus: heap overflow flaw Kernel: HID: pantherlord: heap overflow flaw python: hostname check bypassing vulnerability in SSL module qemu: buffer overflow in scsi_target_emulate_report_luns
[ "cpe:/o:redhat:enterprise_linux:6::hypervisor" ]
null
null
null
null
RHSA-2009:1146
Red Hat Security Advisory: JBoss Enterprise Application Platform 4.3.0.CP05 update
tomcat request dispatcher information disclosure vulnerability tomcat6 Information disclosure in authentication classes tomcat XML parser information disclosure
[ "cpe:/a:redhat:jboss_enterprise_application_platform:4.3.0::el4" ]
null
null
null
null
RHSA-2023:5081
Red Hat Security Advisory: librsvg2 security update
librsvg: Arbitrary file read when xinclude href has special characters
[ "cpe:/a:redhat:enterprise_linux:9::appstream" ]
null
5.5
null
null
RHSA-2021:1354
Red Hat Security Advisory: xstream security update
XStream: Unsafe deserizaliation of javax.sql.rowset.BaseRowSet XStream: Unsafe deserizaliation of com.sun.corba.se.impl.activation.ServerTableEntry XStream: Unsafe deserizaliation of sun.swing.SwingLazyValue XStream: Unsafe deserizaliation of com.sun.tools.javac.processing.JavacProcessingEnvironment NameProcessIterator XStream: Unsafe deserizaliation of com.sun.org.apache.bcel.internal.util.ClassLoader
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
8.1
null
null
RHSA-2016:2074
Red Hat Security Advisory: kernel security and bug fix update
kernel: Uninitialized variable in request_key handling causes kernel crash in error handling path
[ "cpe:/o:redhat:rhel_aus:6.5::server" ]
null
null
7.8
null
RHSA-2013:0153
Red Hat Security Advisory: Ruby on Rails security update
rubygem-activesupport: Multiple vulnerabilities in parameter parsing in ActionPack
[ "cpe:/a:redhat:openshift:1::el6" ]
null
null
null
null
RHSA-2011:1310
Red Hat Security Advisory: jbossws security update
JBossWS remote Denial of Service
[ "cpe:/a:redhat:jboss_enterprise_application_platform:4.2" ]
null
null
null
null
RHSA-2024:4265
Red Hat Security Advisory: cups security update
cups: Cupsd Listen arbitrary chmod 0140777
[ "cpe:/a:redhat:enterprise_linux:8::appstream", "cpe:/o:redhat:enterprise_linux:8::baseos" ]
null
4.4
null
null
RHSA-2016:2604
Red Hat Security Advisory: resteasy-base security and bug fix update
RESTEasy: SerializableProvider enabled by default and deserializes untrusted data
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
9
null
RHSA-2008:1018
Red Hat Security Advisory: java-1.6.0-sun security update
Java Web Start File Inclusion via System Properties Override JavaWebStart allows unauthorized network connections Java WebStart privilege escalation Java Web Start exposes username and the pathname of the JWS cache Java Web Start BasicService displays local files in the browser Java WebStart allows hidden code privilege escalation Java WebStart unprivileged local file and network access JRE allows unauthorized file access and connections to localhost OpenJDK applet privilege escalation via JAX package access (6592792) OpenJDK Denial-Of-Service in kerberos authentication (6588160) OpenJDK RSA public key length denial-of-service (6497740) OpenJDK allows to list files within the user home directory (6484091) OpenJDK UTF-8 decoder accepts non-shortest form sequences (4486841) OpenJDK Jar200 Decompression buffer overflow (6755943) OpenJDK calendar object deserialization allows privilege escalation (6734167) OpenJDK Privilege escalation in command line applications (6733959) OpenJDK Font processing vulnerability (6733336) OpenJDK Truetype Font processing vulnerability (6751322) OpenJDK Buffer Overflow in GIF image processing (6766136) OpenJDK Buffer overflow in image processing (6726779) OpenJDK temporary files have guessable file names (6721753)
[ "cpe:/a:redhat:rhel_extras:4", "cpe:/a:redhat:rhel_extras:5::client", "cpe:/a:redhat:rhel_extras:5::server" ]
null
null
null
null
RHSA-2011:0908
Red Hat Security Advisory: ruby security update
ruby WEBrick log escape sequence Ruby WEBrick javascript injection flaw ruby: memory corruption in BigDecimal on 64bit platforms Ruby: Untrusted codes able to modify arbitrary strings
[ "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws" ]
null
null
null
null
RHSA-2023:6257
Red Hat Security Advisory: OpenShift Container Platform 4.13.21 bug fix and security update
golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487)
[ "cpe:/a:redhat:openshift:4.13::el8", "cpe:/a:redhat:openshift:4.13::el9" ]
null
7.5
null
null
RHSA-2017:2681
Red Hat Security Advisory: kernel security update
kernel: stack buffer overflow in the native Bluetooth stack
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
7.5
null
RHSA-2019:2280
Red Hat Security Advisory: uriparser security update
uriparser: Out-of-bounds write via uriComposeQuery* or uriComposeQueryEx* function uriparser: Integer overflow via uriComposeQuery* or uriComposeQueryEx* function
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
7.3
null
RHSA-2023:0607
Red Hat Security Advisory: thunderbird security update
Mozilla: Revocation status of S/Mime signature certificates was not checked
[ "cpe:/a:redhat:rhel_eus:9.0::appstream" ]
null
7.5
null
null
RHSA-2021:2599
Red Hat Security Advisory: kernel-rt security and bug fix update
kernel: security bypass in certs/blacklist.c and certs/system_keyring.c kernel: use-after-free in net/bluetooth/hci_event.c when destroying an hci_chan
[ "cpe:/a:redhat:enterprise_linux:8::nfv", "cpe:/a:redhat:enterprise_linux:8::realtime" ]
null
7.8
null
null
RHSA-2020:5302
Red Hat Security Advisory: Red Hat build of Quarkus 1.7.5 SP1 release and security update
hibernate-core: SQL injection vulnerability when both hibernate.use_sql_comments and JPQL String literals are used
[ "cpe:/a:redhat:openshift_application_runtimes:1.0" ]
null
7.4
null
null
RHSA-2016:2061
Red Hat Security Advisory: mariadb-galera security and bug fix update
mysql: general_log can write to configuration files, leading to privilege escalation (CPU Oct 2016)
[ "cpe:/a:redhat:openstack:7::el7" ]
null
null
9.8
null
RHSA-2016:2919
Red Hat Security Advisory: chromium-browser security update
chromium-browser: use after free in pdfium chromium-browser: universal xss in blink chromium-browser: universal xss in blink chromium-browser: same-origin bypass in pdfium chromium-browser: universal xss in blink chromium-browser: universal xss in blink chromium-browser: out of bounds write in blink chromium-browser: out of bounds write in pdfium chromium-browser: use after free in pdfium chromium-browser: local file disclosure in devtools chromium-browser: use after free in v8 chromium-browser: file download protection bypass chromium-browser: use after free in webaudio chromium-browser: use after free in pdfium chromium-browser: use of unvalidated data in pdfium chromium-browser: address spoofing in omnibox chromium-browser: use after free in v8 chromium-browser: local file access in pdfium chromium-browser: integer overflow in angle chromium-browser: address spoofing in omnibox chromium-browser: integer overflow in pdfium chromium-browser: same-origin bypass in svg chromium-browser: csp bypass in blink chromium-browser: limited xss in blink chromium-browser: csp referrer disclosure chromium-browser: private property access in v8 chromium-browser: various fixes from internal audits
[ "cpe:/a:redhat:rhel_extras:6" ]
null
null
8.8
null
RHSA-2004:670
Red Hat Security Advisory: samba security update
security flaw
[ "cpe:/o:redhat:enterprise_linux:3::as", "cpe:/o:redhat:enterprise_linux:3::desktop", "cpe:/o:redhat:enterprise_linux:3::es", "cpe:/o:redhat:enterprise_linux:3::ws" ]
null
null
null
null
RHSA-2008:0834
Red Hat Security Advisory: JBoss Enterprise Application Platform 4.2.0CP04 security update
Apache Tomcat's default security policy is too open JBossEAP allows download of non-EJB class files
[ "cpe:/a:redhat:jboss_enterprise_application_platform:4.2.0::el5" ]
null
null
null
null
RHSA-2014:0834
Red Hat Security Advisory: Red Hat JBoss Web Server 2.0.1 tomcat6 security and bug fix update
Tomcat/JBossWeb: Limited DoS in chunked transfer encoding input filter Tomcat/JBossWeb: XXE vulnerability via user supplied XSLTs Tomcat/JBossWeb: Request smuggling via malicious content length header
[ "cpe:/a:redhat:jboss_enterprise_web_server:2::el5", "cpe:/a:redhat:jboss_enterprise_web_server:2::el6" ]
null
null
null
null
RHSA-2020:1659
Red Hat Security Advisory: grafana security, bug fix, and enhancement update
grafana: incorrect access control in snapshot HTTP API leads to denial of service
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
null
4.3
null
RHSA-2019:0966
Red Hat Security Advisory: firefox security update
Mozilla: Proxy Auto-Configuration file can define localhost access to be proxied Mozilla: Memory safety bugs fixed in Firefox 66 and Firefox ESR 60.6 Mozilla: Use-after-free when removing in-use DOM elements Mozilla: Type inference is incorrect for constructors entered through on-stack replacement with IonMonkey Mozilla: IonMonkey leaks JS_OPTIMIZED_OUT magic value to script Mozilla: Improper bounds checks when Spectre mitigations are disabled Mozilla: Type-confusion in IonMonkey JIT compiler Mozilla: Use-after-free with SMIL animation controller Mozilla: IonMonkey MArraySlice has incorrect alias information Mozilla: Ionmonkey type confusion with __proto__ mutations
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
null
8.8
null