id
stringlengths 13
15
| title
stringlengths 29
176
| description
stringlengths 8
32.1k
| cpes
sequencelengths 0
20
| cvss_v4_0
null | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
null |
---|---|---|---|---|---|---|---|
RHSA-2019:0567 | Red Hat Security Advisory: openstack-octavia security and bug fix update | openstack-octavia: Private keys written to world-readable log files | [
"cpe:/a:redhat:openstack:13::el7"
] | null | null | 5.5 | null |
RHSA-2022:0447 | Red Hat Security Advisory: Red Hat Single Sign-On 7.5.1 security update on RHEL 7 | undertow: client side invocation timeout raised when calling over HTTP2 log4j: Remote code execution in Log4j 1.x when application is configured to use JMSAppender log4j: Remote code execution in Log4j 1.x when application is configured to use JMSSink log4j: SQL injection in Log4j 1.x when application is configured to use JDBCAppender log4j: Unsafe deserialization flaw in Chainsaw log viewer | [
"cpe:/a:redhat:red_hat_single_sign_on:7.5::el7"
] | null | 8.8 | null | null |
RHSA-2024:0758 | Red Hat Security Advisory: container-tools:2.0 security update | runc: file descriptor leak | [
"cpe:/a:redhat:rhel_aus:8.2::appstream",
"cpe:/a:redhat:rhel_e4s:8.2::appstream",
"cpe:/a:redhat:rhel_tus:8.2::appstream"
] | null | 8.6 | null | null |
RHSA-2017:1395 | Red Hat Security Advisory: libntirpc security update | libntirpc: Memory leak when failing to parse XDR strings or bytearrays | [
"cpe:/a:redhat:storage:3.2:nfs:el6",
"cpe:/a:redhat:storage:3.2:nfs:el7"
] | null | null | 7.5 | null |
RHSA-2004:546 | Red Hat Security Advisory: cyrus-sasl security update | security flaw | [
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws"
] | null | null | null | null |
RHSA-2022:9077 | Red Hat Security Advisory: thunderbird security update | Mozilla: Quoting from an HTML email with certain tags will trigger network requests and load remote content, regardless of a configuration to block remote content Mozilla: Arbitrary file read from a compromised content process Mozilla: Drag and Dropped Filenames could have been truncated to malicious extensions Mozilla: Memory safety bugs fixed in Firefox ESR 102.6 and Thunderbird 102.6 Mozilla: Use-after-free in WebGL Mozilla: Memory corruption in WebGL Mozilla: Use-after-free in WebGL | [
"cpe:/a:redhat:rhel_e4s:8.1::appstream"
] | null | 8.1 | null | null |
RHSA-2020:5473 | Red Hat Security Advisory: kernel security and bug fix update | kernel: information exposure in drivers/char/random.c and kernel/time/timer.c | [
"cpe:/a:redhat:enterprise_linux:8::crb",
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 3.7 | null | null |
RHSA-2024:1875 | Red Hat Security Advisory: less security update | less: missing quoting of shell metacharacters in LESSCLOSE handling | [
"cpe:/o:redhat:rhel_eus:8.8::baseos"
] | null | 7 | null | null |
RHSA-2021:0956 | Red Hat Security Advisory: OpenShift Container Platform 4.6.23 security update | golang: data race in certain net/http servers including ReverseProxy can lead to DoS golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs golang: math/big: panic during recursive division of very large numbers | [
"cpe:/a:redhat:openshift:4.6::el7",
"cpe:/a:redhat:openshift:4.6::el8"
] | null | 7.5 | null | null |
RHSA-2018:0549 | Red Hat Security Advisory: firefox security update | Mozilla: Vorbis audio processing out of bounds write (MFSA 2018-08) | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation",
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 8.8 | null |
RHSA-2022:7173 | Red Hat Security Advisory: kpatch-patch security update | kernel: use-after-free in route4_change() in net/sched/cls_route.c kernel: a use-after-free in cls_route filter implementation may lead to privilege escalation | [
"cpe:/o:redhat:rhel_e4s:7.6::server"
] | null | 7.8 | null | null |
RHSA-2023:6798 | Red Hat Security Advisory: insights-client security update | insights-client: unsafe handling of temporary files and directories | [
"cpe:/a:redhat:rhel_aus:8.4::appstream",
"cpe:/a:redhat:rhel_e4s:8.4::appstream",
"cpe:/a:redhat:rhel_tus:8.4::appstream"
] | null | 7.8 | null | null |
RHSA-2024:2040 | Red Hat Security Advisory: tigervnc security update | xorg-x11-server: Heap buffer overread/data leakage in ProcXIGetSelectedEvents xorg-x11-server: Heap buffer overread/data leakage in ProcXIPassiveGrabDevice xorg-x11-server: Use-after-free in ProcRenderAddGlyphs | [
"cpe:/a:redhat:rhel_eus:9.2::appstream"
] | null | 7.8 | null | null |
RHSA-2023:0774 | Red Hat Security Advisory: OpenShift Container Platform 4.11.28 security update | goutils: RandomAlphaNumeric and CryptoRandomAlphaNumeric are not as random as they should be golang: out-of-bounds read in golang.org/x/text/language leads to DoS golang: net/http: excessive memory growth in a Go server accepting HTTP/2 requests | [
"cpe:/a:redhat:openshift:4.11::el8"
] | null | 5.3 | null | null |
RHSA-2023:4022 | Red Hat Security Advisory: kernel security and bug fix update | kernel: a use-after-free in cls_route filter implementation may lead to privilege escalation | [
"cpe:/o:redhat:rhel_aus:7.7::server",
"cpe:/o:redhat:rhel_e4s:7.7::server",
"cpe:/o:redhat:rhel_tus:7.7::server"
] | null | 7.8 | null | null |
RHSA-2016:2809 | Red Hat Security Advisory: ipsilon security update | ipsilon: DoS via logging out all open SAML2 sessions | [
"cpe:/o:redhat:enterprise_linux:7::server"
] | null | null | 8.2 | null |
RHSA-2015:0833 | Red Hat Security Advisory: novnc security update | novnc: session hijack through insecurely set session token cookies | [
"cpe:/a:redhat:openstack:5::el6"
] | null | null | null | null |
RHSA-2017:2998 | Red Hat Security Advisory: java-1.8.0-openjdk security update | OpenJDK: CardImpl incorrect state handling (Smart Card IO, 8169026) OpenJDK: multiple unbounded memory allocations in deserialization (Serialization, 8174109) OpenJDK: incorrect privilege use when handling unreferenced objects (RMI, 8174966) OpenJDK: HTTP client insufficient check for newline in URLs (Networking, 8176751) OpenJDK: unbounded resource use in JceKeyStore deserialization (Serialization, 8181370) OpenJDK: insufficient loader constraints checks for invokespecial (Hotspot, 8180711) OpenJDK: unbounded memory allocation in SimpleTimeZone deserialization (Serialization, 8181323) OpenJDK: multiple unbounded memory allocations in deserialization (Libraries, 8181432) OpenJDK: unbounded memory allocation in PredicatedNodeTest deserialization (JAXP, 8181327) OpenJDK: unbounded memory allocation in JAXWSExceptionBase deserialization (JAX-WS, 8181100) OpenJDK: no default network operations timeouts in FtpClient (Networking, 8181612) OpenJDK: weak protection of key stores against brute forcing (Security, 8181692) OpenJDK: unbounded memory allocation in ObjectInputStream deserialization (Serialization, 8181597) OpenJDK: use of unprotected sname in Kerberos client (Libraries, 8178794) | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation",
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 6.8 | null |
RHSA-2003:064 | Red Hat Security Advisory: : Updated XFree86 4.1.0 packages are available | security flaw security flaw security flaw security flaw security flaw | [
"cpe:/o:redhat:linux:7.1",
"cpe:/o:redhat:linux:7.2"
] | null | null | null | null |
RHSA-2020:3727 | Red Hat Security Advisory: OpenShift Container Platform 3.11.286 security update | kibana: X-Frame-Option not set by default might lead to clickjacking golang.org/x/text: possibility to trigger an infinite loop in encoding/unicode could lead to crash | [
"cpe:/a:redhat:openshift:3.11::el7"
] | null | 7.5 | null | null |
RHSA-2012:0884 | Red Hat Security Advisory: openssh security, bug fix, and enhancement update | openssh: post-authentication resource exhaustion bug via GSSAPI | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2013:0941 | Red Hat Security Advisory: flash-plugin security update | flash-plugin: code execution flaw (APSB13-16) | [
"cpe:/a:redhat:rhel_extras:5::server",
"cpe:/a:redhat:rhel_extras:6"
] | null | null | null | null |
RHSA-2019:0059 | Red Hat Security Advisory: libvncserver security update | libvncserver: Heap out-of-bounds write in rfbserver.c in rfbProcessFileTransferReadBuffer() allows for potential code execution | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 7.5 | null |
RHSA-2020:3757 | Red Hat Security Advisory: mysql:8.0 security update | mysql: Information Schema unspecified vulnerability (CPU Oct 2019) mysql: Server: Security: Encryption unspecified vulnerability (CPU Oct 2019) mysql: InnoDB unspecified vulnerability (CPU Oct 2019) mysql: Server: PS unspecified vulnerability (CPU Oct 2019) mysql: Server: Security: Encryption unspecified vulnerability (CPU Oct 2019) mysql: Server: Replication unspecified vulnerability (CPU Oct 2019) mysql: InnoDB unspecified vulnerability (CPU Oct 2019) mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2019) mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2019) mysql: InnoDB unspecified vulnerability (CPU Oct 2019) mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2019) mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2019) mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2019) mysql: Server: C API unspecified vulnerability (CPU Oct 2019) mysql: Server: DDL unspecified vulnerability (CPU Oct 2019) mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2019) mysql: Server: Parser unspecified vulnerability (CPU Oct 2019) mysql: Server: Connection unspecified vulnerability (CPU Oct 2019) mysql: Server: C API unspecified vulnerability (CPU Oct 2019) mysql: InnoDB unspecified vulnerability (CPU Oct 2019) mysql: C API unspecified vulnerability (CPU Jan 2020) mysql: C API unspecified vulnerability (CPU Jan 2020) mysql: C API unspecified vulnerability (CPU Jan 2020) mysql: InnoDB unspecified vulnerability (CPU Jan 2020) mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2020) mysql: Server: DDL unspecified vulnerability (CPU Jan 2020) mysql: Server: Options unspecified vulnerability (CPU Jan 2020) mysql: Server: DML unspecified vulnerability (CPU Jan 2020) mysql: InnoDB unspecified vulnerability (CPU Jan 2020) mysql: Server: Parser unspecified vulnerability (CPU Jan 2020) mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2020) mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2020) mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2020) mysql: Server: Information Schema unspecified vulnerability (CPU Jan 2020) mysql: C API unspecified vulnerability (CPU Apr 2020) mysql: Server: Replication unspecified vulnerability (CPU Apr 2020) mysql: InnoDB unspecified vulnerability (CPU Apr 2020) mysql: Server: Security: Privileges unspecified vulnerability (CPU Apr 2020) mysql: InnoDB unspecified vulnerability (CPU Apr 2020) mysql: Server: Replication unspecified vulnerability (CPU Apr 2020) mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2020) mysql: Server: Logging unspecified vulnerability (CPU Apr 2020) mysql: Server: Security: Privileges unspecified vulnerability (CPU Apr 2020) mysql: Server: Security: Privileges unspecified vulnerability (CPU Apr 2020) mysql: Server: DML unspecified vulnerability (CPU Apr 2020) mysql: Server: Memcached unspecified vulnerability (CPU Apr 2020) mysql: Server: Stored Procedure unspecified vulnerability (CPU Apr 2020) mysql: InnoDB unspecified vulnerability (CPU Apr 2020) mysql: Server: Security: Privileges unspecified vulnerability (CPU Apr 2020) mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2020) mysql: InnoDB unspecified vulnerability (CPU Apr 2020) mysql: InnoDB unspecified vulnerability (CPU Apr 2020) mysql: Server: Information Schema unspecified vulnerability (CPU Apr 2020) mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2020) mysql: Server: Charsets unspecified vulnerability (CPU Apr 2020) mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2020) mysql: Server: Connection Handling unspecified vulnerability (CPU Apr 2020) mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2020) mysql: Server: Group Replication Plugin unspecified vulnerability (CPU Apr 2020) mysql: C API unspecified vulnerability (CPU Apr 2020) mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2020) mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2020) mysql: Server: PS unspecified vulnerability (CPU Apr 2020) mysql: Server: Group Replication GCS unspecified vulnerability (CPU Apr 2020) mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2020) mysql: Server: Parser unspecified vulnerability (CPU Apr 2020) mysql: Server: Optimizer unspecified vulnerability (CPU Jul 2020) mysql: Server: DML unspecified vulnerability (CPU Jul 2020) mysql: Server: Optimizer unspecified vulnerability (CPU Jul 2020) mysql: C API unspecified vulnerability (CPU Jul 2020) mysql: Server: Pluggable Auth unspecified vulnerability (CPU Jul 2020) mysql: Server: Information Schema unspecified vulnerability (CPU Jul 2020) mysql: Server: Replication unspecified vulnerability (CPU Jul 2020) mysql: InnoDB unspecified vulnerability (CPU Jul 2020) mysql: Server: DML unspecified vulnerability (CPU Jul 2020) mysql: Server: UDF unspecified vulnerability (CPU Jul 2020) mysql: Server: Security: Privileges unspecified vulnerability (CPU Jul 2020) mysql: Server: Optimizer unspecified vulnerability (CPU Jul 2020) mysql: Server: Optimizer unspecified vulnerability (CPU Jul 2020) mysql: Server: Parser unspecified vulnerability (CPU Jul 2020) mysql: Server: DML unspecified vulnerability (CPU Jul 2020) mysql: InnoDB unspecified vulnerability (CPU Jul 2020) mysql: Server: JSON unspecified vulnerability (CPU Jul 2020) mysql: Server: Security: Audit unspecified vulnerability (CPU Jul 2020) mysql: Server: Options unspecified vulnerability (CPU Jul 2020) mysql: InnoDB unspecified vulnerability (CPU Jul 2020) mysql: InnoDB unspecified vulnerability (CPU Jul 2020) mysql: Server: Security: Roles unspecified vulnerability (CPU Jul 2020) mysql: Server: Security: Roles unspecified vulnerability (CPU Jul 2020) mysql: Server: Security: Roles unspecified vulnerability (CPU Jul 2020) mysql: Server: Optimizer unspecified vulnerability (CPU Jul 2020) mysql: Server: Locking unspecified vulnerability (CPU Jul 2020) mysql: Server: Security: Privileges unspecified vulnerability (CPU Jul 2020) mysql: Server: Security: Privileges unspecified vulnerability (CPU Jul 2020) mysql: Server: Optimizer unspecified vulnerability (CPU Jul 2020) mysql: Server: Security: Privileges unspecified vulnerability (CPU Jul 2020) mysql: Server: Security: Privileges unspecified vulnerability (CPU Jul 2020) mysql: Server: Optimizer unspecified vulnerability (CPU Jul 2020) mysql: Server: Security: Encryption unspecified vulnerability (CPU Oct 2020) mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2021) mysql: C API unspecified vulnerability (CPU Jan 2021) mysql: C API unspecified vulnerability (CPU Jan 2021) mysql: Server: Security: Roles unspecified vulnerability (CPU Jan 2021) mysql: Server: Security: Privileges unspecified vulnerability (CPU Jan 2021) mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2021) mysql: Server: Security: Privileges unspecified vulnerability (CPU Jan 2021) mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2021) mysql: Server: Parser unspecified vulnerability (CPU Apr 2021) mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2021) | [
"cpe:/a:redhat:rhel_eus:8.1::appstream"
] | null | 4.9 | 4.4 | null |
RHSA-2025:0714 | Red Hat Security Advisory: rsync security update | rsync: Info Leak via Uninitialized Stack Contents | [
"cpe:/o:redhat:rhel_els:7"
] | null | 7.5 | null | null |
RHSA-2022:1091 | Red Hat Security Advisory: openssl security update | openssl: Infinite loop in BN_mod_sqrt() reachable when parsing certificates | [
"cpe:/o:redhat:rhel_eus:8.2::baseos"
] | null | 7.5 | null | null |
RHSA-2023:4312 | Red Hat Security Advisory: OpenShift Container Platform 4.11.46 security update | kube-apiserver: PrivEsc | [
"cpe:/a:redhat:openshift:4.11::el8"
] | null | 8 | null | null |
RHSA-2023:7207 | Red Hat Security Advisory: c-ares security update | c-ares: Heap buffer over read in ares_parse_soa_reply c-ares: Buffer Underwrite in ares_inet_net_pton() | [
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 5.7 | null | null |
RHSA-2004:242 | Red Hat Security Advisory: squid security update | security flaw | [
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws"
] | null | null | null | null |
RHSA-2023:4463 | Red Hat Security Advisory: firefox security update | Mozilla: Offscreen Canvas could have bypassed cross-origin restrictions Mozilla: Incorrect value used during WASM compilation Mozilla: Potential permissions request bypass via clickjacking Mozilla: Crash in DOMParser due to out-of-memory conditions Mozilla: Fix potential race conditions when releasing platform objects Mozilla: Stack buffer overflow in StorageManager Mozilla: Cookie jar overflow caused unexpected cookie jar state Mozilla: Memory safety bugs fixed in Firefox 116, Firefox ESR 115.1, Firefox ESR 102.14, Thunderbird 115.1, and Thunderbird 102.14 Mozilla: Memory safety bugs fixed in Firefox ESR 115.1, and Thunderbird 115.1 | [
"cpe:/a:redhat:rhel_eus:8.6::appstream"
] | null | 9.8 | null | null |
RHSA-2021:1631 | Red Hat Security Advisory: python-urllib3 security update | python-urllib3: CRLF injection via HTTP request method | [
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 6.5 | null | null |
RHSA-2004:096 | Red Hat Security Advisory: wu-ftpd security update | security flaw security flaw security flaw | [
"cpe:/o:redhat:enterprise_linux:2.1::as",
"cpe:/o:redhat:enterprise_linux:2.1::aw",
"cpe:/o:redhat:enterprise_linux:2.1::es"
] | null | null | null | null |
RHSA-2024:1689 | Red Hat Security Advisory: rh-varnish6-varnish security update | varnish: HTTP/2 Broken Window Attack may result in denial of service | [
"cpe:/a:redhat:rhel_software_collections:3::el7"
] | null | 7.5 | null | null |
RHSA-2016:2076 | Red Hat Security Advisory: kernel security update | kernel: Uninitialized variable in request_key handling causes kernel crash in error handling path | [
"cpe:/o:redhat:rhel_eus:6.7::computenode",
"cpe:/o:redhat:rhel_eus:6.7::server"
] | null | null | 7.8 | null |
RHSA-2009:0431 | Red Hat Security Advisory: kdegraphics security update | xpdf: Multiple buffer overflows in JBIG2 decoder (setBitmap, readSymbolDictSeg) (CVE-2009-0195) xpdf: Multiple integer overflows in JBIG2 decoder xpdf: Freeing of potentially uninitialized memory in JBIG2 decoder xpdf: Multiple buffer overflows in JBIG2 decoder (setBitmap, readSymbolDictSeg) (CVE-2009-0195) PDF JBIG2 decoder OOB read PDF JBIG2 multiple input validation flaws PDF JBIG2 integer overflow PDF JBIG2 invalid free() PDF JBIG2 NULL dereference PDF JBIG2 MMR decoder buffer overflows PDF JBIG2 MMR infinite loop DoS | [
"cpe:/a:redhat:rhel_productivity:5",
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws",
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation"
] | null | null | null | null |
RHSA-2014:1036 | Red Hat Security Advisory: java-1.5.0-ibm security update | JDK: Java CMS keystore provider potentially allows brute-force private key recovery JDK: Privilege escalation issue OpenJDK: SubjectDelegator protection insufficient (JMX, 8029755) OpenJDK: Clone interfaces passed to proxy methods (Libraries, 8035009) OpenJDK: Bytecode verification does not prevent ctor calls to this() and super() (Hotspot, 8035119) OpenJDK: RSA blinding issues (Security, 8031346) OpenJDK: Prevent instantiation of service with non-public constructor (Security, 8035004) OpenJDK: AtomicReferenceFieldUpdater missing primitive type check (Libraries, 8039520) OpenJDK: insufficient Diffie-Hellman public key validation (Security, 8037162) | [
"cpe:/a:redhat:rhel_extras:5::client",
"cpe:/a:redhat:rhel_extras:5::server",
"cpe:/a:redhat:rhel_extras:6"
] | null | null | null | null |
RHSA-2022:1727 | Red Hat Security Advisory: thunderbird security update | Mozilla: Incorrect security status shown after viewing an attached email Mozilla: Bypassing permission prompt in nested browsing contexts Mozilla: iframe Sandbox bypass Mozilla: Reader mode bypassed SameSite cookies Mozilla: Speech Synthesis feature not properly disabled Mozilla: Fullscreen notification bypass using popups Mozilla: Leaking browser history with CSS variables Mozilla: Memory safety bugs fixed in Firefox 100 and Firefox ESR 91.9 | [
"cpe:/a:redhat:rhel_e4s:8.1::appstream"
] | null | 9.8 | 7.5 | null |
RHSA-2017:2459 | Red Hat Security Advisory: libsoup security update | libsoup: Stack based buffer overflow with HTTP Chunked Encoding | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 7.3 | null |
RHSA-2015:2619 | Red Hat Security Advisory: libreoffice security update | libreoffice: Arbitrary file disclosure in Calc and Writer libreoffice: Integer underflow in PrinterSetup length libreoffice: Integer overflow in DOC files libreoffice: Bookmarks in DOC documents are insufficiently checked causing memory corruption | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation",
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | null | null |
RHSA-2019:0623 | Red Hat Security Advisory: firefox security update | Mozilla: Proxy Auto-Configuration file can define localhost access to be proxied Mozilla: Memory safety bugs fixed in Firefox 66 and Firefox ESR 60.6 Mozilla: Use-after-free when removing in-use DOM elements Mozilla: Type inference is incorrect for constructors entered through on-stack replacement with IonMonkey Mozilla: IonMonkey leaks JS_OPTIMIZED_OUT magic value to script Mozilla: Improper bounds checks when Spectre mitigations are disabled Mozilla: Type-confusion in IonMonkey JIT compiler Mozilla: Use-after-free with SMIL animation controller | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | 9.8 | null |
RHSA-2009:1188 | Red Hat Security Advisory: flash-plugin security update | flash-plugin: Remote code execution vulnerability via malicious SWF (Shockwave Flash) content flash-plugin: multiple code execution flaws (APSB09-10) flash-plugin: multiple code execution flaws (APSB09-10) flash-plugin: multiple code execution flaws (APSB09-10) flash-plugin: multiple code execution flaws (APSB09-10) flash-plugin: multiple information disclosure flaws (APSB09-10) flash-plugin: multiple code execution flaws (APSB09-10) flash-plugin: multiple code execution flaws (APSB09-10) flash-plugin: multiple information disclosure flaws (APSB09-10) | [
"cpe:/a:redhat:rhel_extras:5::client",
"cpe:/a:redhat:rhel_extras:5::server"
] | null | null | null | null |
RHSA-2024:0133 | Red Hat Security Advisory: fence-agents security update | python-certifi: Removal of e-Tugra root certificate python-urllib3: Cookie request header isn't stripped during cross-origin redirects | [
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::highavailability",
"cpe:/a:redhat:enterprise_linux:8::resilientstorage"
] | null | 5.9 | null | null |
RHSA-2005:212 | Red Hat Security Advisory: dhcp security update | security flaw | [
"cpe:/o:redhat:enterprise_linux:2.1::as",
"cpe:/o:redhat:enterprise_linux:2.1::aw",
"cpe:/o:redhat:enterprise_linux:2.1::es"
] | null | null | null | null |
RHSA-2023:7682 | Red Hat Security Advisory: OpenShift Container Platform 4.14.6 bug fix and security update | golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487) HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack) opentelemetry: DoS vulnerability in otelhttp | [
"cpe:/a:redhat:openshift:4.14::el8",
"cpe:/a:redhat:openshift:4.14::el9"
] | null | 7.5 | null | null |
RHSA-2015:2088 | Red Hat Security Advisory: openssh security, bug fix, and enhancement update | openssh: MaxAuthTries limit bypass via duplicates in KbdInteractiveDevices openssh: Privilege separation weakness related to PAM support openssh: Use-after-free bug related to PAM support | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | null | null |
RHSA-2002:263 | Red Hat Security Advisory: kernel security update | security flaw security flaw | [
"cpe:/o:redhat:enterprise_linux:2.1::as"
] | null | null | null | null |
RHSA-2023:1277 | Red Hat Security Advisory: Red Hat OpenStack Platform (openstack-swift) security update | openstack-swift: Arbitrary file access through custom S3 XML entities | [
"cpe:/a:redhat:openstack:13::el7",
"cpe:/a:redhat:openstack:16.1::el8",
"cpe:/a:redhat:openstack:16.2::el8"
] | null | 7.7 | null | null |
RHSA-2021:2041 | Red Hat Security Advisory: Red Hat OpenShift Container Storage 4.7.0 security, bug fix, and enhancement update | nodejs-yargs-parser: prototype pollution vulnerability nodejs-y18n: prototype pollution vulnerability kubernetes: Incomplete fix for CVE-2019-11250 allows for token leak in logs when logLevel >= 9 jwt-go: access restriction bypass vulnerability nodejs-date-and-time: ReDoS in parsing via date.compile golang: math/big: panic during recursive division of very large numbers golang: crypto/elliptic: incorrect operations on the P-224 curve NooBaa: noobaa-operator leaking RPC AuthToken into log files | [
"cpe:/a:redhat:openshift_container_storage:4.7::el8"
] | null | 8.8 | null | null |
RHSA-2020:5374 | Red Hat Security Advisory: kernel security and bug fix update | kernel: soft-lockups in iov_iter_copy_from_user_atomic() could result in DoS | [
"cpe:/a:redhat:rhel_eus:8.1::crb",
"cpe:/o:redhat:rhel_eus:8.1::baseos"
] | null | 5.5 | null | null |
RHSA-2024:1077 | Red Hat Security Advisory: edk2 security update | edk2: Buffer overflow in the DHCPv6 client via a long Server ID option edk2: Buffer overflow when processing DNS Servers option in a DHCPv6 Advertise message | [
"cpe:/a:redhat:rhel_eus:9.0::appstream"
] | null | 8.8 | null | null |
RHSA-2016:1854 | Red Hat Security Advisory: chromium-browser security update | chromium-browser: universal xss in blink chromium-browser: universal xss in blink chromium-browser: script injection in extensions chromium-browser: use after free in blink chromium-browser: use after free in pdfium chromium-browser: heap overflow in pdfium chromium-browser: use after destruction in blink chromium-browser: heap overflow in pdfium chromium-browser: address bar spoofing chromium-browser: use after free in event bindings chromium-browser: heap overflow in pdfium openjpeg: heap overflow due to unsafe use of opj_aligned_malloc openjpeg: heap overflow in parsing of JPEG2000 code blocks chromium-browser: extensions web accessible resources bypass chromium-browser: type confusion in blink chromium-browser: extensions web accessible resources bypass chromium-browser: address bar spoofing chromium-browser: universal xss using devtools chromium-browser: script injection in devtools chromium-browser: smb relay attack via save page as chromium-browser: various fixes from internal audits | [
"cpe:/a:redhat:rhel_extras:6"
] | null | null | 8.8 | null |
RHSA-2020:0103 | Red Hat Security Advisory: kernel security and bug fix update | kernel: kvm: guest userspace to guest kernel write kernel: TLB flush happens too late on mremap kernel: Use-after-free in __blk_drain_queue() function in block/blk-core.c Kernel: KVM: potential use-after-free via kvm_ioctl_create_device() kernel: fix race condition between mmget_not_zero()/get_task_mm() and core dumping | [
"cpe:/o:redhat:rhel_aus:7.4::server",
"cpe:/o:redhat:rhel_e4s:7.4::server",
"cpe:/o:redhat:rhel_tus:7.4::server"
] | null | null | 6.1 | null |
RHSA-2017:0444 | Red Hat Security Advisory: rpm-ostree and rpm-ostree-client security, bug fix, and enhancement update | rpm-ostree-client: fails to check gpg package signatures when layering | [
"cpe:/a:redhat:rhel_atomic:7"
] | null | null | 5.3 | null |
RHSA-2020:0924 | Red Hat Security Advisory: devtoolset-8-gcc security update | gcc: POWER9 "DARN" RNG intrinsic produces repeated output | [
"cpe:/a:redhat:rhel_software_collections:3::el6",
"cpe:/a:redhat:rhel_software_collections:3::el7"
] | null | null | 7.5 | null |
RHSA-2011:1245 | Red Hat Security Advisory: httpd security update | httpd: multiple ranges DoS | [
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws",
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server",
"cpe:/o:redhat:enterprise_linux:6::server"
] | null | null | null | null |
RHSA-2016:1633 | Red Hat Security Advisory: kernel security and bug fix update | kernel: challenge ACK counter information disclosure. | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 4.8 | null |
RHSA-2010:0819 | Red Hat Security Advisory: pam security update | pam: pam_xauth missing return value checks from setuid() and similar calls pam: pam_env and pam_mail accessing users' file with root privileges pam: pam_namespace executes namespace.init with service's environment pam: pam_xauth: Does not check if certain ACL file is a regular file | [
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2024:0616 | Red Hat Security Advisory: thunderbird security update | Mozilla: Out of bounds write in ANGLE Mozilla: Failure to update user input timestamp Mozilla: Crash when listing printers on Linux Mozilla: Bypass of Content Security Policy when directive unsafe-inline was set Mozilla: Phishing site popup could show local origin in address bar Mozilla: Potential permissions request bypass via clickjacking Mozilla: Privilege escalation through devtools Mozilla: HSTS policy on subdomain could bypass policy of upper domain Mozilla: Memory safety bugs fixed in Firefox 122, Firefox ESR 115.7, and Thunderbird 115.7 | [
"cpe:/a:redhat:rhel_eus:9.0::appstream"
] | null | 8.8 | null | null |
RHSA-2020:4756 | Red Hat Security Advisory: varnish:6 security, bug fix, and enhancement update | varnish: denial of service handling certain crafted HTTP/1 requests varnish: not clearing pointer between two client requests leads to information disclosure varnish: remote clients may cause Varnish to assert and restart which could result in DoS | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 7.5 | 3.1 | null |
RHSA-2018:0548 | Red Hat Security Advisory: ceph security update | ceph: Unauthenticated malformed HTTP requests handled by rgw_civetweb.cc:RGW::init_env() can lead to denial of service | [
"cpe:/a:redhat:ceph_storage:3::ubuntu16.04"
] | null | null | 7.3 | null |
RHSA-2009:1143 | Red Hat Security Advisory: JBoss Enterprise Application Platform 4.2.0.CP07 update | tomcat request dispatcher information disclosure vulnerability tomcat6 Information disclosure in authentication classes tomcat XML parser information disclosure | [
"cpe:/a:redhat:jboss_enterprise_application_platform:4.2.0::el5"
] | null | null | null | null |
RHSA-2011:0945 | Red Hat Security Advisory: JBoss Enterprise Web Platform 5.1.1 update | JBoss Seam EL interpolation in exception handling | [
"cpe:/a:redhat:jboss_enterprise_web_platform:5::el4",
"cpe:/a:redhat:jboss_enterprise_web_platform:5::el5",
"cpe:/a:redhat:jboss_enterprise_web_platform:5::el6"
] | null | null | null | null |
RHSA-2019:2756 | Red Hat Security Advisory: flash-plugin security update | flash-plugin: Arbitrary Code Execution vulnerabilities (APSB19-46) flash-plugin: Arbitrary Code Execution vulnerabilities (APSB19-46) | [
"cpe:/a:redhat:rhel_extras:6"
] | null | null | 8.8 | null |
RHSA-2024:5883 | Red Hat Security Advisory: linux-firmware security update | hw: amd: SMM Lock Bypass kernel: Reserved fields in guest message responses may not be zero initialized | [
"cpe:/o:redhat:rhel_aus:8.2::baseos"
] | null | 4.4 | null | null |
RHSA-2016:0057 | Red Hat Security Advisory: java-1.6.0-sun security update | libpng: Buffer overflow vulnerabilities in png_get_PLTE/png_set_PLTE functions libpng: Buffer overflow vulnerabilities in png_get_PLTE/png_set_PLTE functions OpenJDK: URL deserialization inconsistencies (Networking, 8059054) OpenJDK: logging of RMI connection secrets (JMX, 8130710) OpenJDK: insufficient enforcement of totalEntitySizeLimit (JAXP, 8133962) OpenJDK: incorrect boundary check in JPEG decoder (AWT, 8139017) ICU: integer signedness issue in IndicRearrangementProcessor (OpenJDK 2D, 8140543) | [
"cpe:/a:redhat:rhel_extras_oracle_java:5",
"cpe:/a:redhat:rhel_extras_oracle_java:6",
"cpe:/a:redhat:rhel_extras_oracle_java:7"
] | null | null | null | null |
RHSA-2023:5712 | Red Hat Security Advisory: nginx:1.20 security update | HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack) | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 7.5 | null | null |
RHSA-2022:6998 | Red Hat Security Advisory: thunderbird security update | expat: a use-after-free in the doContent function in xmlparse.c | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 8.1 | null | null |
RHSA-2017:2447 | Red Hat Security Advisory: openstack-neutron security update | openstack-neutron: iptables not active after update | [
"cpe:/a:redhat:openstack:9::el7"
] | null | null | 5.3 | null |
RHSA-2022:1708 | Red Hat Security Advisory: Satellite 6.10.5 Async Bug Fix Update | puppet: unsafe HTTP redirect puppet: silent configuration failure in agent | [
"cpe:/a:redhat:satellite:6.10::el7",
"cpe:/a:redhat:satellite_capsule:6.10::el7"
] | null | 6.3 | null | null |
RHSA-2014:0434 | Red Hat Security Advisory: qemu-kvm-rhev security update | qemu: crash by possible division by zero Qemu: block: multiple integer overflow flaws Qemu: block: missing input validation Qemu: prevent possible buffer overflows Qemu: qcow2: NULL dereference in qcow2_open() error path Qemu: block: possible crash due signed types or logic error Qemu: vhdx: bounds checking for block_size and logical_sector_size qemu: virtio-net: buffer overflow in virtio_net_handle_mac() function | [
"cpe:/a:redhat:openstack:4::el6"
] | null | null | null | null |
RHSA-2015:1083 | Red Hat Security Advisory: abrt security update | abrt: default event scripts follow symbolic links abrt: default abrt event scripts lead to information disclosure abrt: abrt-hook-ccpp writes core dumps to existing files owned by others abrt: does not validate contents of uploaded problem reports abrt: abrt-dbus does not guard against crafted problem directory path arguments abrt: directory traversals in several D-Bus methods implemented by abrt-dbus abrt: missing process environment sanitizaton in abrt-action-install-debuginfo-to-abrt-cache abrt: Various race-conditions and symlink issues found in abrt | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | null | null |
RHSA-2023:4262 | Red Hat Security Advisory: kpatch-patch security update | kernel: tcindex: use-after-free vulnerability in traffic control index filter allows privilege escalation kernel: netfilter: use-after-free in nf_tables when processing batch requests can lead to privilege escalation | [
"cpe:/o:redhat:rhel_e4s:8.4::baseos"
] | null | 7.8 | null | null |
RHSA-2019:3464 | Red Hat Security Advisory: virt-manager security, bug fix, and enhancement update | virt-install: unattended option leaks password via command line argument | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | null | 2.8 | null |
RHSA-2005:334 | Red Hat Security Advisory: mysql security update | security flaw security flaw security flaw | [
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws",
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2025:2658 | Red Hat Security Advisory: OpenShift Virtualization 4.15.9 Images | golang.org/x/net/html: Non-linear parsing of case-insensitive content in golang.org/x/net/html | [
"cpe:/a:redhat:container_native_virtualization:4.15::el9"
] | null | 7.5 | null | null |
RHSA-2018:2710 | Red Hat Security Advisory: openstack-neutron security update | openstack-neutron: A router interface out of subnet IP range results in a denial of service | [
"cpe:/a:redhat:openstack:13::el7"
] | null | null | 6.5 | null |
RHSA-2024:11242 | Red Hat Security Advisory: mpg123:1.32.9 security update | mpg123: Buffer overflow when writing decoded PCM samples | [
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::crb"
] | null | 6.7 | null | null |
RHSA-2022:7011 | Red Hat Security Advisory: java-11-openjdk security update | OpenJDK: improper MultiByte conversion can lead to buffer overflow (JGSS, 8286077) OpenJDK: improper handling of long NTLM client hostnames (Security, 8286526) OpenJDK: insufficient randomization of JNDI DNS port numbers (JNDI, 8286910) OpenJDK: excessive memory allocation in X.509 certificate parsing (Security, 8286533) OpenJDK: HttpServer no connection count limit (Lightweight HTTP Server, 8286918) OpenJDK: missing SNI caching in HTTP/2 (Networking, 8289366) | [
"cpe:/a:redhat:rhel_eus:8.4::appstream",
"cpe:/a:redhat:rhel_eus:8.4::crb"
] | null | 3.7 | null | null |
RHSA-2023:4590 | Red Hat Security Advisory: Red Hat Ansible Automation Platform 2.3 Product Security and Bug Fix Update | Controller: Html injection in custom login info | [
"cpe:/a:redhat:ansible_automation_platform:2.3::el8",
"cpe:/a:redhat:ansible_automation_platform:2.3::el9",
"cpe:/a:redhat:ansible_automation_platform_developer:2.3::el8",
"cpe:/a:redhat:ansible_automation_platform_developer:2.3::el9",
"cpe:/a:redhat:ansible_automation_platform_inside:2.3::el8",
"cpe:/a:redhat:ansible_automation_platform_inside:2.3::el9"
] | null | 7.3 | null | null |
RHSA-2025:3585 | Red Hat Security Advisory: python-jinja2 security update | jinja2: Jinja sandbox breakout through attr filter selecting format method | [
"cpe:/a:redhat:rhel_eus:9.2::appstream"
] | null | 7.3 | null | null |
RHSA-2023:7676 | Red Hat Security Advisory: Red Hat Data Grid 8.4.6 security update | hotrod-client: Hot Rod client does not enable hostname validation when using TLS that lead to a MITM attack infinispan: Credentials returned from configuration as clear text jose4j: Insecure iteration count setting | [
"cpe:/a:redhat:jboss_data_grid:8"
] | null | 6.8 | null | null |
RHSA-2023:4170 | Red Hat Security Advisory: java-17-openjdk security update | OpenJDK: HTTP client insufficient file name validation (8302475) OpenJDK: ZIP file parsing infinite loop (8302483) OpenJDK: weakness in AES implementation (8308682) OpenJDK: modulo operator array indexing issue (8304460) OpenJDK: array indexing integer overflow issue (8304468) OpenJDK: improper handling of slash characters in URI-to-path conversion (8305312) harfbuzz: allows attackers to trigger O(n^2) growth via consecutive marks | [
"cpe:/a:redhat:rhel_eus:8.6::appstream",
"cpe:/a:redhat:rhel_eus:8.6::crb"
] | null | 7.5 | null | null |
RHSA-2021:3315 | Red Hat Security Advisory: glibc security and bug fix update | glibc: stack corruption from crafted input in cosl, sinl, sincosl, and tanl functions glibc: stack-based buffer overflow if the input to any of the printf family of functions is an 80-bit long double with a non-canonical bit pattern | [
"cpe:/o:redhat:rhel_aus:7.6::server",
"cpe:/o:redhat:rhel_e4s:7.6::server",
"cpe:/o:redhat:rhel_tus:7.6::server"
] | null | 7.5 | null | null |
RHSA-2009:0349 | Red Hat Security Advisory: JBoss Enterprise Application Platform 4.3.0CP04 update | JBoss EAP unprivileged local xml file access | [
"cpe:/a:redhat:jboss_enterprise_application_platform:4.3.0::el5"
] | null | null | null | null |
RHSA-2024:5411 | Red Hat Security Advisory: Red Hat Product OCP Tools 4.14 OpenShift Jenkins security update | jenkins: Arbitrary file read vulnerability through agent connections can lead to RCE | [
"cpe:/a:redhat:ocp_tools:4.14::el8"
] | null | 8.8 | null | null |
RHSA-2011:1105 | Red Hat Security Advisory: libpng security update | libpng: regression of CVE-2004-0421 in 1.2.23+ libpng: buffer overwrite in png_rgb_to_gray libpng: Invalid read when handling empty sCAL chunks | [
"cpe:/o:redhat:enterprise_linux:6::server"
] | null | null | null | null |
RHSA-2020:1686 | Red Hat Security Advisory: libmspack security and bug fix update | libmspack: buffer overflow in function chmd_read_headers() | [
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb"
] | null | null | 2.5 | null |
RHSA-2023:1445 | Red Hat Security Advisory: firefox security update | nss: Arbitrary memory write via PKCS 12 Mozilla: Incorrect code generation during JIT compilation Mozilla: Potential out-of-bounds when accessing throttled streams Mozilla: Invalid downcast in Worklets Mozilla: URL being dragged from a removed cross-origin iframe into the same tab triggered navigation Mozilla: Memory safety bugs fixed in Firefox 111 and Firefox ESR 102.9 | [
"cpe:/a:redhat:rhel_aus:8.2::appstream",
"cpe:/a:redhat:rhel_e4s:8.2::appstream",
"cpe:/a:redhat:rhel_tus:8.2::appstream"
] | null | 8.8 | null | null |
RHSA-2021:4257 | Red Hat Security Advisory: httpd:2.4 security, bug fix, and enhancement update | httpd: mod_session: NULL pointer dereference when parsing Cookie header httpd: Unexpected URL matching with 'MergeSlashes OFF' | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 5.9 | null | null |
RHSA-2012:0105 | Red Hat Security Advisory: mysql security update | mysql: Unspecified vulnerability allows remote attackers to affect availability mysql: Unspecified vulnerability allows remote authenticated users to affect integrity mysql: Unspecified vulnerability allows remote authenticated users to affect availability mysql: Unspecified vulnerability allows remote authenticated users to affect availability mysql: Unspecified vulnerability allows remote authenticated users to affect availability mysql: Unspecified vulnerability allows remote authenticated users to affect availability mysql: Unspecified vulnerability allows remote authenticated users to affect confidentiality and availability mysql: Unspecified vulnerability allows local users to affect confidentiality and integrity mysql: Unspecified vulnerability allows remote authenticated users to affect availability mysql: Unspecified vulnerability allows remote authenticated users to affect confidentiality and integrity mysql: Unspecified vulnerability allows remote authenticated users to affect confidentiality and availability mysql: Unspecified vulnerability allows remote authenticated users to affect availability mysql: Unspecified vulnerability allows remote authenticated users to affect availability mysql: Unspecified vulnerability allows remote authenticated users to affect confidentiality mysql: Unspecified vulnerability allows remote authenticated users to affect availability mysql: Unspecified vulnerability allows remote authenticated users to affect availability mysql: Unspecified vulnerability allows remote authenticated users to affect availability mysql: unspecified DoS vulnerability in MyISAM (Oracle CPU April 2012) | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2017:0333 | Red Hat Security Advisory: qemu-kvm-rhev security update | Qemu: display: cirrus: oob access while doing bitblt copy backward mode Qemu: display: cirrus: potential arbitrary code execution via cirrus_bitblt_cputovideo | [
"cpe:/a:redhat:openstack:5::el7"
] | null | null | 5.5 | null |
RHSA-2013:1136 | Red Hat Security Advisory: rubygem-passenger security update | rubygem-passenger: incorrect temporary file usage rubygem-passenger: insecure temporary directory usage due to reuse of existing server instance directories | [
"cpe:/a:redhat:openshift:1.2::el6"
] | null | null | null | null |
RHSA-2023:4516 | Red Hat Security Advisory: kpatch-patch security update | kernel: Use-after-free vulnerability in the Linux Kernel traffic control index filter kernel: ipvlan: out-of-bounds write caused by unclear skb->cb kernel: cls_flower: out-of-bounds write in fl_set_geneve_opt() | [
"cpe:/o:redhat:rhel_e4s:8.1::baseos"
] | null | 7.8 | null | null |
RHSA-2013:0883 | Red Hat Security Advisory: gnutls security update | gnutls: out of bounds read in _gnutls_ciphertext2compressed (GNUTLS-SA-2013-2) | [
"cpe:/o:redhat:enterprise_linux:5::server",
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2024:2734 | Red Hat Security Advisory: Red Hat OpenStack Platform 17.1 (python-urllib3) security update | urllib3: Request body not stripped after redirect from 303 status changes request method to GET | [
"cpe:/a:redhat:openstack:17.1::el8"
] | null | 4.2 | null | null |
RHSA-2019:1278 | Red Hat Security Advisory: pacemaker security update | pacemaker: Insufficient local IPC client-server authentication on the client's side can lead to local privesc pacemaker: Insufficient verification inflicted preference of uncontrolled processes can lead to DoS pacemaker: Information disclosure through use-after-free | [
"cpe:/o:redhat:enterprise_linux:7::server"
] | null | null | 3.3 | null |
RHSA-2017:2445 | Red Hat Security Advisory: qemu-kvm security update | Qemu: qemu-nbd: server breaks with SIGPIPE upon client abort | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 5.3 | null |
RHSA-2003:088 | Red Hat Security Advisory: : New kernel 2.2 packages fix vulnerabilities | security flaw cisco: information leak in ethernet frames. security flaw | [
"cpe:/o:redhat:linux:6.2",
"cpe:/o:redhat:linux:7.0"
] | null | 5.3 | null | null |
RHSA-2011:0374 | Red Hat Security Advisory: thunderbird security and bug fix update | An updated thunderbird package that fixes one security issue and one bug is
now available for Red Hat Enterprise Linux 4, 5, and 6.
The Red Hat Security Response Team has rated this update as having
important security impact. | [
"cpe:/a:redhat:rhel_productivity:5",
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws",
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2021:1566 | Red Hat Security Advisory: OpenShift Container Platform 4.6.30 packages and security update | runc: vulnerable to symlink exchange attack | [
"cpe:/a:redhat:openshift:4.6::el7",
"cpe:/a:redhat:openshift:4.6::el8"
] | null | 7.5 | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.