id
stringlengths
13
15
title
stringlengths
29
176
description
stringlengths
8
32.1k
cpes
sequencelengths
0
20
cvss_v4_0
null
cvss_v3_1
float64
0
10
cvss_v3_0
float64
0
10
cvss_v2_0
null
RHSA-2024:8180
Red Hat Security Advisory: webkit2gtk3 security update
chromium-browser: Use after free in ANGLE webkit: malicious website may exfiltrate audio data cross-origin webkit: processing malicious web content prevents Content Security Policy from being enforced webkit: maliciously crafted webpage may be able to fingerprint the user webkit: processing maliciously crafted web content prevents Content Security Policy from being enforced webkitgtk: Processing web content may lead to arbitrary code execution webkitgtk: A maliciously crafted webpage may be able to fingerprint the user webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution webkitgtk: Processing a file may lead to unexpected app termination or arbitrary code execution webkitgtk: webkit2gtk: Use after free may lead to Remote Code Execution webkitgtk: webkit2gtk: Out-of-bounds read was addressed with improved bounds checking webkitgtk: webkit2gtk: Out-of-bounds read was addressed with improved bounds checking webkitgtk: webkit2gtk: Use-after-free was addressed with improved memory management webkitgtk: webkit2gtk: Processing maliciously crafted web content may lead to an unexpected process crash webkitgtk: Visiting a malicious website may lead to address bar spoofing webkitgtk: webkit2gtk: Processing maliciously crafted web content may lead to an unexpected process crash webkitgtk: A malicious website may exfiltrate data cross-origin webkit: Processing maliciously crafted web content may lead to memory corruption
[ "cpe:/a:redhat:enterprise_linux:9::appstream" ]
null
8.8
null
null
RHSA-2021:4843
Red Hat Security Advisory: samba security update
samba: SMB1 client connections can be downgraded to plaintext authentication samba: Active Directory (AD) domain user could become root on domain members samba: Subsequent DCE/RPC fragment injection vulnerability
[ "cpe:/a:redhat:storage:3.5:samba:el8" ]
null
4.8
null
null
RHSA-2007:0152
Red Hat Security Advisory: mysql security update
mysql-server create database privilege escalation
[ "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws" ]
null
null
null
null
RHSA-2016:2694
Red Hat Security Advisory: systemd security and bug fix update
systemd: Assertion failure when PID 1 receives a zero-length message over notify socket
[ "cpe:/o:redhat:rhel_eus:7.2::computenode", "cpe:/o:redhat:rhel_eus:7.2::server" ]
null
null
6.8
null
RHSA-2019:1851
Red Hat Security Advisory: OpenShift Container Platform 3.11 security update
web-console: XSS in OAuth server /oauth/token/request endpoint jenkins-plugin-token-macro: XML External Entity processing the ${XML} macro kube-apiserver: DoS with crafted patch of type json-patch
[ "cpe:/a:redhat:openshift:3.11::el7" ]
null
null
6.5
null
RHSA-2022:1373
Red Hat Security Advisory: kpatch-patch security update
kernel: Use After Free in unix_gc() which could result in a local privilege escalation kernel: use-after-free in RDMA listen() kernel: fget: check that the fd still exists after getting a ref to it kernel: failing usercopy allows for use-after-free exploitation
[ "cpe:/o:redhat:rhel_e4s:7.7::server" ]
null
7
null
null
RHSA-2020:3209
Red Hat Security Advisory: AMQ Online 1.5.2 release and security update
postgresql-jdbc: XML external entity (XXE) vulnerability in PgSQLXML amq-on: CSRF (in graphQL requests) AMQ: Denial of Service via unrecognized field injection
[ "cpe:/a:redhat:amq_online:1.5" ]
null
4.3
null
null
RHSA-2023:4497
Red Hat Security Advisory: thunderbird security update
thunderbird: File Extension Spoofing using the Text Direction Override Character Mozilla: Offscreen Canvas could have bypassed cross-origin restrictions Mozilla: Incorrect value used during WASM compilation Mozilla: Potential permissions request bypass via clickjacking Mozilla: Crash in DOMParser due to out-of-memory conditions Mozilla: Fix potential race conditions when releasing platform objects Mozilla: Stack buffer overflow in StorageManager Mozilla: Cookie jar overflow caused unexpected cookie jar state Mozilla: Memory safety bugs fixed in Firefox 116, Firefox ESR 115.1, Firefox ESR 102.14, Thunderbird 115.1, and Thunderbird 102.14 Mozilla: Memory safety bugs fixed in Firefox ESR 115.1, and Thunderbird 115.1
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
9.8
null
null
RHSA-2021:1924
Red Hat Security Advisory: spice security update
spice: Client initiated renegotiation denial of service
[ "cpe:/a:redhat:enterprise_linux:8::appstream", "cpe:/a:redhat:enterprise_linux:8::crb" ]
null
5.3
null
null
RHSA-2015:0086
Red Hat Security Advisory: java-1.6.0-sun security update
SSL/TLS: Padding Oracle On Downgraded Legacy Encryption attack ICU: font parsing OOB read (OpenJDK 2D, 8055489) OpenJDK: MulticastSocket NULL pointer dereference (Libraries, 8056264) ICU: font parsing OOB read (OpenJDK 2D, 8056276) OpenJDK: incorrect tracking of ChangeCipherSpec during SSL/TLS handshake (JSSE, 8057555) OpenJDK: class verifier insufficient invokespecial calls verification (Hotspot, 8058982) OpenJDK: insecure hsperfdata temporary file handling (Hotspot, 8050807) OpenJDK: phantom references handling issue in garbage collector (Hotspot, 8047125) JDK: unspecified vulnerability fixed in 6u91, 7u75 and 8u31 (Deployment) JDK: unspecified vulnerability fixed in 6u91, 7u75 and 8u31 (Deployment) OpenJDK: directory information leak via file chooser (Swing, 8055304) OpenJDK: incorrect context class loader use in RMI transport (RMI, 8055309) OpenJDK: DER decoder infinite loop (Security, 8059485) OpenJDK: insufficient code privileges checks (JAX-WS, 8054367)
[ "cpe:/a:redhat:rhel_extras_oracle_java:5", "cpe:/a:redhat:rhel_extras_oracle_java:6", "cpe:/a:redhat:rhel_extras_oracle_java:7" ]
null
null
null
null
RHSA-2023:7267
Red Hat Security Advisory: open-vm-tools security update
open-vm-tools: SAML token signature bypass open-vm-tools: file descriptor hijack vulnerability in the vmware-user-suid-wrapper
[ "cpe:/a:redhat:rhel_eus:9.0::appstream" ]
null
7.4
null
null
RHSA-2019:2465
Red Hat Security Advisory: ghostscript security update
ghostscript: -dSAFER escape via .buildfont1 (701394)
[ "cpe:/a:redhat:enterprise_linux:8::appstream", "cpe:/a:redhat:enterprise_linux:8::crb" ]
null
null
7.3
null
RHSA-2006:0749
Red Hat Security Advisory: tar security update
security flaw
[ "cpe:/o:redhat:enterprise_linux:2.1::as", "cpe:/o:redhat:enterprise_linux:2.1::aw", "cpe:/o:redhat:enterprise_linux:2.1::es", "cpe:/o:redhat:enterprise_linux:2.1::ws", "cpe:/o:redhat:enterprise_linux:3::as", "cpe:/o:redhat:enterprise_linux:3::desktop", "cpe:/o:redhat:enterprise_linux:3::es", "cpe:/o:redhat:enterprise_linux:3::ws", "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws" ]
null
null
null
null
RHSA-2023:3910
Red Hat Security Advisory: Red Hat OpenShift Enterprise security update
golang: net/http: excessive memory growth in a Go server accepting HTTP/2 requests openshift: OCP & FIPS mode golang: html/template: improper handling of JavaScript whitespace
[ "cpe:/a:redhat:openshift:4.10::el7", "cpe:/a:redhat:openshift:4.10::el8" ]
null
8.1
null
null
RHSA-2022:5152
Red Hat Security Advisory: Red Hat OpenShift GitOps security update
argocd: vulnerable to an uncontrolled memory consumption bug argocd: vulnerable to a variety of attacks when an SSO login is initiated from the Argo CD CLI or the UI. argocd: cross-site scripting (XSS) allow a malicious user to inject a javascript link in the UI argocd: vulnerable to a symlink following bug allowing a malicious user with repository write access
[ "cpe:/a:redhat:openshift_gitops:1.5::el8" ]
null
4.3
null
null
RHSA-2014:1021
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 6.3.0 update
httpd: mod_deflate denial of service netty: DoS via memory exhaustion during data aggregation openssl: DoS when sending invalid DTLS handshake httpd: mod_status heap-based buffer overflow Tomcat/JBossWeb: request smuggling and limited DoS in ChunkedInputFilter httpd: mod_cgid denial of service WS: Incomplete fix for CVE-2013-2133 Security: Invalid EJB caller role check implementation
[ "cpe:/a:redhat:jboss_enterprise_application_platform:6.3" ]
null
null
null
null
RHSA-2019:3245
Red Hat Security Advisory: OpenShift Container Platform 4.2 security update
HTTP/2: flood using PING frames results in unbounded memory growth HTTP/2: flood using HEADERS frames results in unbounded memory growth
[ "cpe:/a:redhat:openshift:4.2::el7" ]
null
null
7.5
null
RHSA-2023:1696
Red Hat Security Advisory: haproxy security update
haproxy: segfault DoS haproxy: request smuggling attack in HTTP/1 header parsing
[ "cpe:/a:redhat:enterprise_linux:9::appstream" ]
null
8.2
null
null
RHSA-2024:9525
Red Hat Security Advisory: libsoup security update
libsoup: HTTP request smuggling via stripping null bytes from the ends of header names
[ "cpe:/a:redhat:rhel_aus:8.6::appstream", "cpe:/a:redhat:rhel_e4s:8.6::appstream", "cpe:/a:redhat:rhel_tus:8.6::appstream", "cpe:/o:redhat:rhel_aus:8.6::baseos", "cpe:/o:redhat:rhel_e4s:8.6::baseos", "cpe:/o:redhat:rhel_tus:8.6::baseos" ]
null
7.5
null
null
RHSA-2013:0830
Red Hat Security Advisory: kernel security update
kernel: perf_swevent_enabled array out-of-bound access
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
null
null
RHSA-2019:1183
Red Hat Security Advisory: qemu-kvm security update
hardware: Microarchitectural Store Buffer Data Sampling (MSBDS) hardware: Micro-architectural Load Port Data Sampling - Information Leak (MLPDS) hardware: Microarchitectural Fill Buffer Data Sampling (MFBDS) hardware: Microarchitectural Data Sampling Uncacheable Memory (MDSUM)
[ "cpe:/o:redhat:rhel_eus:7.5::computenode", "cpe:/o:redhat:rhel_eus:7.5::server" ]
null
null
3.8
null
RHSA-2014:1244
Red Hat Security Advisory: bind97 security and bug fix update
bind: named crash when handling malformed NSEC3-signed zones
[ "cpe:/o:redhat:enterprise_linux:5::client_workstation", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
RHSA-2021:1081
Red Hat Security Advisory: kernel-rt security and bug fix update
kernel: use after free in eventpoll.c may lead to escalation of privilege Kernel: KVM: host stack overflow due to lazy update IOAPIC kernel: SCSI target (LIO) write to any block on ILO backstore kernel: Use after free via PI futex state kernel: race conditions caused by wrong locking in net/vmw_vsock/af_vsock.c kernel: iscsi: unrestricted access to sessions and handles kernel: out-of-bounds read in libiscsi module kernel: heap buffer overflow in the iSCSI subsystem
[ "cpe:/a:redhat:enterprise_linux:8::nfv", "cpe:/a:redhat:enterprise_linux:8::realtime" ]
null
7.8
null
null
RHSA-2022:1662
Red Hat Security Advisory: rh-maven36-maven-shared-utils security update
maven-shared-utils: Command injection via Commandline class
[ "cpe:/a:redhat:rhel_software_collections:3::el7" ]
null
9.8
null
null
RHSA-2017:1835
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.0.7 on RHEL 7
Artemis: Deserialization of untrusted input vulnerability jackson-databind: Deserialization vulnerability via readValue method of ObjectMapper
[ "cpe:/a:redhat:jboss_enterprise_application_platform:7::el7" ]
null
null
8.1
null
RHSA-2023:4819
Red Hat Security Advisory: kernel security and bug fix update
hw: amd: Cross-Process Information Leak kernel: cls_flower: out-of-bounds write in fl_set_geneve_opt()
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
7.8
null
null
RHSA-2022:1964
Red Hat Security Advisory: fetchmail security update
fetchmail: DoS or information disclosure when logging long messages fetchmail: STARTTLS session encryption bypassing
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
5.9
null
null
RHSA-2020:1942
Red Hat Security Advisory: OpenShift Container Platform 4.4.3 presto-container security update
operator-framework/presto: /etc/passwd is given incorrect privileges
[ "cpe:/a:redhat:openshift:4.4::el7" ]
null
7
null
null
RHSA-2022:5219
Red Hat Security Advisory: kpatch-patch security update
kernel: buffer overflow in IPsec ESP transformation code
[ "cpe:/o:redhat:enterprise_linux:8::baseos" ]
null
7.8
null
null
RHSA-2024:5884
Red Hat Security Advisory: krb5 security update
krb5: GSS message token handling krb5: GSS message token handling
[ "cpe:/o:redhat:rhel_aus:8.2::baseos" ]
null
6.5
null
null
RHSA-2007:0795
Red Hat Security Advisory: cyrus-sasl security and bug fix update
cyrus-sasl digest-md5 DoS
[ "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws" ]
null
null
null
null
RHSA-2007:0055
Red Hat Security Advisory: libwpd security update
buffer overflows security flaw
[ "cpe:/a:redhat:rhel_productivity:5", "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::client_workstation" ]
null
null
null
null
RHSA-2017:0838
Red Hat Security Advisory: openjpeg security update
openjpeg: Heap overflow in parsing of JPEG2000 precincts openjpeg: heap overflow due to unsafe use of opj_aligned_malloc openjpeg: heap overflow in parsing of JPEG2000 code blocks openjpeg: Integer overflow in opj_pi_create_decode openjpeg: heap out-of-bounds read due to insufficient check in imagetopnm() openjpeg: incorrect fix for CVE-2013-6045
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
7.5
null
RHSA-2021:0694
Red Hat Security Advisory: bind security update
bind: Buffer overflow in the SPNEGO implementation affecting GSSAPI security policy negotiation
[ "cpe:/o:redhat:rhel_aus:7.2::server" ]
null
8.1
null
null
RHBA-2013:1150
Red Hat Bug Fix Advisory: net-snmp bug fix update
net-snmp: snmpd crashes/hangs when AgentX subagent times-out
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
null
null
RHSA-2023:5442
Red Hat Security Advisory: Red Hat Advanced Cluster Management 2.8.2 security and bug fix updates
x/net/http2/h2c: request smuggling golang: html/template: improper sanitization of CSS values golang: html/template: improper handling of JavaScript whitespace tough-cookie: prototype pollution in cookie memstore golang: html/template: improper handling of empty HTML attributes
[ "cpe:/a:redhat:acm:2.8::el8" ]
null
7.3
null
null
RHSA-2017:3218
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 6.4.18 security update
keycloak: SAML request parser replaces special strings with system properties
[ "cpe:/a:redhat:jboss_enterprise_application_platform:6::el7" ]
null
null
6.5
null
RHSA-2002:154
Red Hat Security Advisory: mm security update
security flaw
[ "cpe:/o:redhat:enterprise_linux:2.1::as" ]
null
null
null
null
RHSA-2022:1645
Red Hat Security Advisory: Red Hat OpenStack Platform 16.2 (python-twisted) security update
python-twisted: possible http request smuggling
[ "cpe:/a:redhat:openstack:16.2::el8" ]
null
8.1
null
null
RHSA-2021:2521
Red Hat Security Advisory: virt:8.2 and virt-devel:8.2 security update
QEMU: msix: OOB access during mmio operations may lead to DoS qemu: out-of-bound heap buffer access via an interrupt ID field
[ "cpe:/a:redhat:advanced_virtualization:8.2::el8" ]
null
2.5
null
null
RHSA-2020:1135
Red Hat Security Advisory: polkit security and bug fix update
polkit: Improper authorization in polkit_backend_interactive_authority_check_authorization function in polkitd
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
4.4
null
RHSA-2012:0313
Red Hat Security Advisory: samba security, bug fix, and enhancement update
samba: insecure "wide links" default
[ "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::client_workstation", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
RHSA-2021:3155
Red Hat Security Advisory: thunderbird security update
Mozilla: Uninitialized memory in a canvas object could have led to memory corruption Mozilla: Incorrect instruction reordering during JIT optimization Mozilla: Use-after-free media channels Mozilla: Race condition when resolving DNS names could have led to memory corruption Mozilla: Memory corruption as a result of incorrect style treatment Mozilla: Memory safety bugs fixed in Thunderbird 78.13
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
8.8
7.5
null
RHSA-2005:427
Red Hat Security Advisory: ethereal security update
security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw
[ "cpe:/o:redhat:enterprise_linux:3::as", "cpe:/o:redhat:enterprise_linux:3::desktop", "cpe:/o:redhat:enterprise_linux:3::es", "cpe:/o:redhat:enterprise_linux:3::ws" ]
null
null
null
null
RHSA-2023:3852
Red Hat Security Advisory: kernel security and bug fix update
kernel: tcindex: use-after-free vulnerability in traffic control index filter allows privilege escalation kernel: netfilter: use-after-free in nf_tables when processing batch requests can lead to privilege escalation
[ "cpe:/o:redhat:rhel_e4s:8.1::baseos" ]
null
7.8
null
null
RHSA-2018:0239
Red Hat Security Advisory: Red Hat Enterprise Linux 6.2 AMC Retirement Notice
This is the final notification for the retirement of Red Hat Enterprise Linux 6.2 Advanced Mission Critical (AMC). This notification applies only to those customers subscribed to the Advanced Mission Critical (AMC) channel for Red Hat Enterprise Linux 6.2.
[ "cpe:/o:redhat:rhel_mission_critical:6.2::server" ]
null
null
null
null
RHSA-2019:3651
Red Hat Security Advisory: sssd security, bug fix, and enhancement update
sssd: improper implementation of GPOs due to too restrictive permissions
[ "cpe:/a:redhat:enterprise_linux:8::crb", "cpe:/o:redhat:enterprise_linux:8::baseos" ]
null
null
5.4
null
RHSA-2020:1150
Red Hat Security Advisory: qemu-kvm-ma security update
QEMU: block: iscsi: OOB heap access via an unexpected response of iSCSI Server QEMU: slirp: OOB buffer access while emulating tcp protocols in tcp_emu()
[ "cpe:/o:redhat:enterprise_linux:7::server" ]
null
5.6
null
null
RHSA-2021:3024
Red Hat Security Advisory: Red Hat OpenShift Jaeger 1.24.0 Operator/Operand Containers security update
nodejs-ua-parser-js: ReDoS via malicious User-Agent header
[ "cpe:/a:redhat:jaeger:1.24::el8" ]
null
7.5
null
null
RHSA-2018:2565
Red Hat Security Advisory: rh-postgresql10-postgresql security update
postgresql: Too-permissive access control list on function pg_logfile_rotate() postgresql: Certain host connection parameters defeat client-side security defenses postgresql: Missing authorization and memory disclosure in INSERT ... ON CONFLICT DO UPDATE statements
[ "cpe:/a:redhat:rhel_software_collections:3::el7" ]
null
null
7.1
null
RHSA-2020:3958
Red Hat Security Advisory: httpd security, bug fix, and enhancement update
httpd: <FilesMatch> bypass with a trailing newline in the file name httpd: Improper handling of headers in mod_session can allow a remote user to modify session data for CGI applications httpd: Out of bounds read in mod_cache_socache can allow a remote attacker to cause DoS httpd: mod_rewrite potential open redirect httpd: mod_rewrite configurations vulnerable to open redirect httpd: mod_proxy_ftp use of uninitialized value
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
3.7
3.7
null
RHSA-2022:5924
Red Hat Security Advisory: Service Telemetry Framework 1.4 security update
golang: compress/gzip: stack exhaustion in Reader.Read
[ "cpe:/a:redhat:service_telemetry_framework:1.4::el8" ]
null
7.5
null
null
RHSA-2024:9122
Red Hat Security Advisory: xorg-x11-server security update
xorg-x11-server: Heap buffer overread/data leakage in ProcXIGetSelectedEvents xorg-x11-server: Heap buffer overread/data leakage in ProcXIPassiveGrabDevice xorg-x11-server: Use-after-free in ProcRenderAddGlyphs
[ "cpe:/a:redhat:enterprise_linux:9::appstream", "cpe:/a:redhat:enterprise_linux:9::crb" ]
null
7.8
null
null
RHSA-2021:1620
Red Hat Security Advisory: linux-firmware security, bug fix, and enhancement update
kernel: Integer overflow in Intel(R) Graphics Drivers kernel: Improper input validation in some Intel(R) Graphics Drivers kernel: Null pointer dereference in some Intel(R) Graphics Drivers
[ "cpe:/o:redhat:enterprise_linux:8::baseos" ]
null
5.5
null
null
RHSA-2024:0200
Red Hat Security Advisory: OpenShift Container Platform 4.12.47 security update
haproxy: Proxy forwards malformed empty Content-Length headers
[ "cpe:/a:redhat:openshift:4.12::el8", "cpe:/a:redhat:openshift:4.12::el9" ]
null
7.5
null
null
RHSA-2007:1052
Red Hat Security Advisory: pcre security update
pcre incorrect memory requirement computation pcre integer overflow
[ "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws", "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::client_workstation", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
RHSA-2016:2843
Red Hat Security Advisory: firefox security update
Mozilla: Firefox SVG Animation Remote Code Execution (MFSA 2016-92)
[ "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::server", "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation", "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
7.3
null
RHSA-2022:6526
Red Hat Security Advisory: OpenShift Virtualization 4.11.0 Images security and bug fix update
golang: out-of-bounds read in golang.org/x/text/language leads to DoS golang: net/http: limit growth of header canonicalization cache golang: syscall: don't close fd 0 on ForkExec error kubeVirt: Arbitrary file read on the host from KubeVirt VMs prometheus/client_golang: Denial of service using InstrumentHandlerCounter golang: math/big: uncontrolled memory consumption due to an unhandled overflow via Rat.SetString golang: cmd/go: misinterpretation of branch names can lead to incorrect access control golang: crypto/elliptic: IsOnCurve returns true for invalid field elements golang: encoding/pem: fix stack overflow in Decode golang: regexp: stack exhaustion via a deeply nested expression golang: crash in a golang.org/x/crypto/ssh server golang: crypto/elliptic: panic caused by oversized scalar
[ "cpe:/a:redhat:container_native_virtualization:4.11::el8" ]
null
7.5
null
null
RHSA-2022:5778
Red Hat Security Advisory: thunderbird security update
Mozilla: Memory safety bugs fixed in Firefox 103 and 102.1 Mozilla: Directory indexes for bundled resources reflected URL parameters Mozilla: Mouse Position spoofing with CSS transforms
[ "cpe:/a:redhat:enterprise_linux:9::appstream" ]
null
7.5
6.1
null
RHSA-2023:0856
Red Hat Security Advisory: kernel security update
kernel: memory corruption in AX88179_178A based USB ethernet device. kernel: use-after-free caused by l2cap_reassemble_sdu() in net/bluetooth/l2cap_core.c kernel: stack overflow in do_proc_dointvec and proc_skip_spaces
[ "cpe:/o:redhat:rhel_e4s:8.1::baseos" ]
null
7.8
null
null
RHSA-2013:1814
Red Hat Security Advisory: php security update
PHP: sapi_header_op() %0D sequence handling security bypass php: Integer Signedness issues in _php_stream_scandir php: Ability to read arbitrary files due use of external entities while parsing SOAP WSDL files php: memory corruption in openssl_x509_parse()
[ "cpe:/o:redhat:enterprise_linux:5::client_workstation", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
RHSA-2017:0863
Red Hat Security Advisory: Red Hat Enterprise Linux 4 Extended Life Cycle Support Final Notice
This is the final notification for the retirement of Red Hat Enterprise Linux 4 Extended Life Cycle Support Add-On (ELS). This notification applies only to those customers subscribed to the Extended Life Cycle Support (ELS) channel for Red Hat Enterprise Linux 4.
[ "cpe:/o:redhat:rhel_els:4::as", "cpe:/o:redhat:rhel_els:4::es" ]
null
null
null
null
RHSA-2021:5179
Red Hat Security Advisory: rh-postgresql13-postgresql security update
postgresql: memory disclosure in certain queries postgresql: server processes unencrypted bytes from man-in-the-middle postgresql: libpq processes unencrypted bytes from man-in-the-middle
[ "cpe:/a:redhat:rhel_software_collections:3::el7" ]
null
3.7
null
null
RHSA-2017:0901
Red Hat Security Advisory: Red Hat Directory Server 9 - 60 Day Retirement Notice
This is the 60 day notification for the retirement of Red Hat Directory Server 9.
[ "cpe:/a:redhat:directory_server:9" ]
null
null
null
null
RHSA-2024:10518
Red Hat Security Advisory: OpenShift Container Platform 4.17.7 bug fix and security update
go-retryablehttp: url might write sensitive information to log file QEMU: Denial of Service via Improper Synchronization in QEMU NBD Server During Socket Closure pam: Improper Hostname Interpretation in pam_access Leads to Access Control Bypass cross-spawn: regular expression denial of service
[ "cpe:/a:redhat:openshift:4.17::el9" ]
null
4.4
7.5
null
RHBA-2021:2955
Red Hat Bug Fix Advisory: Red Hat Automation Platform 1.2.4
nginx: Off-by-one in ngx_resolver_copy() when labels are followed by a pointer to a root domain name
[ "cpe:/a:redhat:ansible_automation_platform:4.2::el7", "cpe:/a:redhat:ansible_automation_platform:4.2::el8" ]
null
8.1
null
null
RHSA-2011:1292
Red Hat Security Advisory: jakarta-commons-daemon-jsvc security update
jakarta-commons-daemon: jsvc does not drop capabilities allowing access to files and directories owned by the superuser
[ "cpe:/a:redhat:jboss_enterprise_web_server:1::el4" ]
null
null
null
null
RHSA-2016:1328
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 5.2 security update
JGroups: Authorization bypass
[ "cpe:/a:redhat:jboss_enterprise_application_platform:5::el4", "cpe:/a:redhat:jboss_enterprise_application_platform:5::el5", "cpe:/a:redhat:jboss_enterprise_application_platform:5::el6" ]
null
null
9.8
null
RHSA-2022:0467
Red Hat Security Advisory: Red Hat AMQ Streams 1.6.7 release and security update
kubernetes-client: Insecure deserialization in unmarshalYaml method log4j-core: remote code execution via JDBC Appender log4j: Remote code execution in Log4j 1.x when application is configured to use JMSSink log4j: SQL injection in Log4j 1.x when application is configured to use JDBCAppender log4j: Unsafe deserialization flaw in Chainsaw log viewer
[ "cpe:/a:redhat:amq_streams:1" ]
null
8.8
null
null
RHSA-2018:2763
Red Hat Security Advisory: kernel-rt security and bug fix update
kernel: Integer overflow in Linux's create_elf_tables function
[ "cpe:/a:redhat:rhel_extras_rt:7" ]
null
null
7.8
null
RHSA-2022:9075
Red Hat Security Advisory: thunderbird security update
Mozilla: Quoting from an HTML email with certain tags will trigger network requests and load remote content, regardless of a configuration to block remote content Mozilla: Arbitrary file read from a compromised content process Mozilla: Drag and Dropped Filenames could have been truncated to malicious extensions Mozilla: Memory safety bugs fixed in Firefox ESR 102.6 and Thunderbird 102.6 Mozilla: Use-after-free in WebGL Mozilla: Memory corruption in WebGL Mozilla: Use-after-free in WebGL
[ "cpe:/a:redhat:rhel_eus:8.4::appstream" ]
null
8.1
null
null
RHSA-2022:7622
Red Hat Security Advisory: unbound security, bug fix, and enhancement update
unbound: integer overflow in the regional allocator via the ALIGN_UP macro unbound: novel ghost domain attack that allows attackers to trigger continued resolvability of malicious domain names unbound: novel ghost domain attack that allows attackers to trigger continued resolvability of malicious domain names
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
6.5
null
null
RHSA-2021:4589
Red Hat Security Advisory: gcc-toolset-10-annobin security update
environment: Unicode's bidirectional (BiDi) override characters can cause trojan source attacks
[ "cpe:/a:redhat:rhel_eus:8.4::appstream" ]
null
8.5
null
null
RHSA-2020:0694
Red Hat Security Advisory: OpenShift Container Platform 4.1.38 security update
openshift/mediawiki-apb: /etc/passwd is given incorrect privileges openshift/mariadb-apb: /etc/passwd is given incorrect privileges openshift/apb-base: /etc/passwd is given incorrect privileges openshift/postgresql-apb: /etc/passwd is given incorrect privileges openshift/mysql-apb: /etc/passwd is given incorrect privileges openshift/mediawiki: /etc/passwd is given incorrect privileges
[ "cpe:/a:redhat:openshift:4.1::el7" ]
null
7
null
null
RHSA-2008:0877
Red Hat Security Advisory: jbossweb security update
tomcat: Cross-Site-Scripting enabled by sendError call tomcat RequestDispatcher information disclosure vulnerability tomcat Unicode directory traversal vulnerability
[ "cpe:/a:redhat:jboss_enterprise_application_platform:4.2.0::el4", "cpe:/a:redhat:jboss_enterprise_application_platform:4.2.0::el5", "cpe:/a:redhat:jboss_enterprise_application_platform:4.3.0::el4", "cpe:/a:redhat:jboss_enterprise_application_platform:4.3.0::el5" ]
null
null
null
null
RHSA-2019:4018
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.2.5 on RHEL 6 security update
HTTP/2: large amount of data requests leads to denial of service HTTP/2: flood using PING frames results in unbounded memory growth HTTP/2: flood using HEADERS frames results in unbounded memory growth HTTP/2: flood using SETTINGS frames results in unbounded memory growth wildfly-core: Incorrect privileges for 'Monitor', 'Auditor' and 'Deployer' user by default wildfly-security-manager: security manager authorization bypass
[ "cpe:/a:redhat:jboss_enterprise_application_platform:7.2::el6" ]
null
null
7.5
null
RHSA-2009:0398
Red Hat Security Advisory: seamonkey security update
Firefox XUL garbage collection issue (cansecwest pwn2own) Firefox XSLT memory corruption issue
[ "cpe:/o:redhat:enterprise_linux:2.1::as", "cpe:/o:redhat:enterprise_linux:2.1::aw", "cpe:/o:redhat:enterprise_linux:2.1::es", "cpe:/o:redhat:enterprise_linux:2.1::ws", "cpe:/o:redhat:enterprise_linux:3::as", "cpe:/o:redhat:enterprise_linux:3::desktop", "cpe:/o:redhat:enterprise_linux:3::es", "cpe:/o:redhat:enterprise_linux:3::ws", "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws" ]
null
null
null
null
RHSA-2024:0594
Red Hat Security Advisory: openssh security update
ssh: Prefix truncation attack on Binary Packet Protocol (BPP) openssh: potential command injection via shell metacharacters
[ "cpe:/a:redhat:rhel_eus:8.8::appstream", "cpe:/o:redhat:rhel_eus:8.8::baseos" ]
null
6.5
null
null
RHSA-2013:1428
Red Hat Security Advisory: jakarta-commons-fileupload security update
commons-fileupload: Arbitrary file upload via deserialization
[ "cpe:/a:redhat:jboss_enterprise_web_server:1::el5", "cpe:/a:redhat:jboss_enterprise_web_server:1::el6" ]
null
null
null
null
RHSA-2022:4824
Red Hat Security Advisory: fapolicyd security and bug fix update
fapolicyd: fapolicyd wrongly prepares ld.so path
[ "cpe:/a:redhat:rhel_eus:8.4::appstream" ]
null
8.4
null
null
RHSA-2019:3387
Red Hat Security Advisory: osinfo-db and libosinfo security and bug fix update
Libosinfo: osinfo-install-script option leaks password via command line argument
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
null
2.8
null
RHSA-2017:3490
Red Hat Security Advisory: Red Hat Enterprise Linux 6.7 Extended Update Support One-Year Notice
This is the One-Year notification for the retirement of Red Hat Enterprise Linux 6.7 Extended Update Support (EUS). This notification applies only to those customers subscribed to the Extended Update Support (EUS) channel for Red Hat Enterprise Linux 6.7.
[ "cpe:/o:redhat:rhel_eus:6.7::computenode", "cpe:/o:redhat:rhel_eus:6.7::server" ]
null
null
null
null
RHSA-2022:9077
Red Hat Security Advisory: thunderbird security update
Mozilla: Quoting from an HTML email with certain tags will trigger network requests and load remote content, regardless of a configuration to block remote content Mozilla: Arbitrary file read from a compromised content process Mozilla: Drag and Dropped Filenames could have been truncated to malicious extensions Mozilla: Memory safety bugs fixed in Firefox ESR 102.6 and Thunderbird 102.6 Mozilla: Use-after-free in WebGL Mozilla: Memory corruption in WebGL Mozilla: Use-after-free in WebGL
[ "cpe:/a:redhat:rhel_e4s:8.1::appstream" ]
null
8.1
null
null
RHSA-2025:0892
Red Hat Security Advisory: Red Hat OpenShift Dev Spaces 3.18.0 release
PostCSS: Improper input validation in PostCSS cross-spawn: regular expression denial of service golang.org/x/crypto/ssh: Misuse of ServerConfig.PublicKeyCallback may cause authorization bypass in golang.org/x/crypto golang.org/x/net/html: Non-linear parsing of case-insensitive content in golang.org/x/net/html dompurify: XSS vulnerability via prototype pollution virtualenv: potential command injection via virtual environment activation scripts nanoid: nanoid mishandles non-integer values
[ "cpe:/a:redhat:openshift_devspaces:3::el9" ]
null
6.5
null
null
RHSA-2003:323
Red Hat Security Advisory: : Updated Ethereal packages fix security issues
security flaw security flaw security flaw
[ "cpe:/o:redhat:linux:7.2", "cpe:/o:redhat:linux:7.3", "cpe:/o:redhat:linux:8.0", "cpe:/o:redhat:linux:9" ]
null
null
null
null
RHSA-2016:0514
Red Hat Security Advisory: java-1.8.0-openjdk security update
OpenJDK: missing type safety checks for MethodHandle calls across class loaders, incorrect CVE-2013-5838 fix (Hotspot, 8151666)
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
null
null
RHSA-2023:7771
Red Hat Security Advisory: rh-postgresql10-postgresql security update
postgresql: Buffer overrun from integer overflow in array modification
[ "cpe:/a:redhat:rhel_software_collections:3::el7" ]
null
8.8
null
null
RHSA-2022:1075
Red Hat Security Advisory: httpd24-httpd security update
httpd: Errors encountered during the discarding of request body lead to HTTP request smuggling
[ "cpe:/a:redhat:rhel_software_collections:3::el7" ]
null
8.3
null
null
RHSA-2022:8385
Red Hat Security Advisory: dhcp security and enhancement update
bind: DNS forwarders - cache poisoning vulnerability
[ "cpe:/o:redhat:enterprise_linux:9::baseos" ]
null
6.8
null
null
RHSA-2023:6667
Red Hat Security Advisory: samba security, bug fix, and enhancement update
samba: out-of-bounds read in winbind AUTH_CRAP samba: infinite loop in mdssvc RPC service for spotlight samba: type confusion in mdssvc RPC service for spotlight samba: spotlight server-side share path disclosure
[ "cpe:/a:redhat:enterprise_linux:9::appstream", "cpe:/a:redhat:enterprise_linux:9::crb", "cpe:/a:redhat:enterprise_linux:9::resilientstorage", "cpe:/o:redhat:enterprise_linux:9::baseos" ]
null
5.3
null
null
RHSA-2018:0334
Red Hat Security Advisory: chromium-browser security update
chromium-browser: incorrect derived class instantiation in v8
[ "cpe:/a:redhat:rhel_extras:6" ]
null
null
8.8
null
RHSA-2007:1026
Red Hat Security Advisory: poppler security update
DCTStream:: readProgressiveDataUnit() DCTStream:: reset() CCITTFaxStream:: lookChar()
[ "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::client_workstation", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
RHSA-2019:3906
Red Hat Security Advisory: OpenShift Container Platform 3.11 HTTP/2 security update
HTTP/2: flood using PING frames results in unbounded memory growth HTTP/2: flood using HEADERS frames results in unbounded memory growth
[ "cpe:/a:redhat:openshift:3.11::el7" ]
null
null
7.5
null
RHSA-2024:0407
Red Hat Security Advisory: git security update
git: On multi-user machines Git users might find themselves unexpectedly in a Git worktree git: Bypass of safe.directory protections git: exposure of sensitive information to a malicious actor git: git shell function that splits command arguments can lead to arbitrary heap writes. git: data exfiltration with maliciously crafted repository git: git apply: a path outside the working tree can be overwritten with crafted input
[ "cpe:/a:redhat:rhel_eus:8.6::appstream" ]
null
7.5
null
null
RHSA-2020:4694
Red Hat Security Advisory: container-tools:rhel8 security, bug fix, and enhancement update
containernetworking/plugins: IPv6 router advertisements allow for MitM attacks on IPv4 clusters QEMU: slirp: networking out-of-bounds read information disclosure vulnerability golang.org/x/text: possibility to trigger an infinite loop in encoding/unicode could lead to crash
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
7.5
null
null
RHSA-2022:7470
Red Hat Security Advisory: pki-core:10.6 and pki-deps:10.6 security and bug fix update
pki-core: access to external entities when parsing XML can lead to XXE
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
7.5
null
null
RHSA-2020:2032
Red Hat Security Advisory: firefox security update
usrsctp: Buffer overflow in AUTH chunk input validation Mozilla: Use-after-free during worker shutdown Mozilla: Arbitrary local file access with 'Copy as cURL' Mozilla: Memory safety bugs fixed in Firefox 76 and Firefox ESR 68.8
[ "cpe:/a:redhat:rhel_eus:8.1::appstream" ]
null
9.8
6.1
null
RHSA-2018:1203
Red Hat Security Advisory: java-1.6.0-sun security update
JDK: unspecified vulnerability fixed in 6u191, 7u171, and 8u161 (Security) OpenJDK: incorrect merging of sections in the JAR manifest (Security, 8189969) OpenJDK: unrestricted deserialization of data from JCEKS key stores (Security, 8189997) OpenJDK: insufficient consistency checks in deserialization of multiple classes (Security, 8189977) OpenJDK: unbounded memory allocation during deserialization in TabularDataSupport (JMX, 8189985) OpenJDK: unbounded memory allocation during deserialization in Container (AWT, 8189989) OpenJDK: RMI HTTP transport enabled by default (RMI, 8193833) OpenJDK: incorrect handling of Reference clones can lead to sandbox bypass (Hotspot, 8192025) OpenJDK: unbounded memory allocation during deserialization in StubIORImpl (Serialization, 8192757)
[ "cpe:/a:redhat:rhel_extras_oracle_java:6" ]
null
null
5.3
null
RHSA-2020:0172
Red Hat Security Advisory: openvswitch2.12 security and bug fix update
dpdk: possible memory leak leads to denial of service
[ "cpe:/o:redhat:enterprise_linux:8::fastdatapath" ]
null
null
7.5
null
RHSA-2009:1453
Red Hat Security Advisory: pidgin security update
Pidgin: NULL pointer dereference by handling IRC topic(s) (DoS) pidgin: ignores SSL/TLS requirements with old jabber servers Pidgin: NULL pointer dereference by processing incomplete MSN SLP invite (DoS) Pidgin: NULL pointer dereference by processing a custom smiley (DoS)
[ "cpe:/a:redhat:rhel_productivity:5", "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws", "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::client_workstation" ]
null
null
null
null