id
stringlengths 13
15
| title
stringlengths 29
176
| description
stringlengths 8
32.1k
| cpes
sequencelengths 0
20
| cvss_v4_0
null | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
null |
---|---|---|---|---|---|---|---|
RHSA-2024:8180 | Red Hat Security Advisory: webkit2gtk3 security update | chromium-browser: Use after free in ANGLE webkit: malicious website may exfiltrate audio data cross-origin webkit: processing malicious web content prevents Content Security Policy from being enforced webkit: maliciously crafted webpage may be able to fingerprint the user webkit: processing maliciously crafted web content prevents Content Security Policy from being enforced webkitgtk: Processing web content may lead to arbitrary code execution webkitgtk: A maliciously crafted webpage may be able to fingerprint the user webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution webkitgtk: Processing a file may lead to unexpected app termination or arbitrary code execution webkitgtk: webkit2gtk: Use after free may lead to Remote Code Execution webkitgtk: webkit2gtk: Out-of-bounds read was addressed with improved bounds checking webkitgtk: webkit2gtk: Out-of-bounds read was addressed with improved bounds checking webkitgtk: webkit2gtk: Use-after-free was addressed with improved memory management webkitgtk: webkit2gtk: Processing maliciously crafted web content may lead to an unexpected process crash webkitgtk: Visiting a malicious website may lead to address bar spoofing webkitgtk: webkit2gtk: Processing maliciously crafted web content may lead to an unexpected process crash webkitgtk: A malicious website may exfiltrate data cross-origin webkit: Processing maliciously crafted web content may lead to memory corruption | [
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 8.8 | null | null |
RHSA-2021:4843 | Red Hat Security Advisory: samba security update | samba: SMB1 client connections can be downgraded to plaintext authentication samba: Active Directory (AD) domain user could become root on domain members samba: Subsequent DCE/RPC fragment injection vulnerability | [
"cpe:/a:redhat:storage:3.5:samba:el8"
] | null | 4.8 | null | null |
RHSA-2007:0152 | Red Hat Security Advisory: mysql security update | mysql-server create database privilege escalation | [
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2016:2694 | Red Hat Security Advisory: systemd security and bug fix update | systemd: Assertion failure when PID 1 receives a zero-length message over notify socket | [
"cpe:/o:redhat:rhel_eus:7.2::computenode",
"cpe:/o:redhat:rhel_eus:7.2::server"
] | null | null | 6.8 | null |
RHSA-2019:1851 | Red Hat Security Advisory: OpenShift Container Platform 3.11 security update | web-console: XSS in OAuth server /oauth/token/request endpoint jenkins-plugin-token-macro: XML External Entity processing the ${XML} macro kube-apiserver: DoS with crafted patch of type json-patch | [
"cpe:/a:redhat:openshift:3.11::el7"
] | null | null | 6.5 | null |
RHSA-2022:1373 | Red Hat Security Advisory: kpatch-patch security update | kernel: Use After Free in unix_gc() which could result in a local privilege escalation kernel: use-after-free in RDMA listen() kernel: fget: check that the fd still exists after getting a ref to it kernel: failing usercopy allows for use-after-free exploitation | [
"cpe:/o:redhat:rhel_e4s:7.7::server"
] | null | 7 | null | null |
RHSA-2020:3209 | Red Hat Security Advisory: AMQ Online 1.5.2 release and security update | postgresql-jdbc: XML external entity (XXE) vulnerability in PgSQLXML amq-on: CSRF (in graphQL requests) AMQ: Denial of Service via unrecognized field injection | [
"cpe:/a:redhat:amq_online:1.5"
] | null | 4.3 | null | null |
RHSA-2023:4497 | Red Hat Security Advisory: thunderbird security update | thunderbird: File Extension Spoofing using the Text Direction Override Character Mozilla: Offscreen Canvas could have bypassed cross-origin restrictions Mozilla: Incorrect value used during WASM compilation Mozilla: Potential permissions request bypass via clickjacking Mozilla: Crash in DOMParser due to out-of-memory conditions Mozilla: Fix potential race conditions when releasing platform objects Mozilla: Stack buffer overflow in StorageManager Mozilla: Cookie jar overflow caused unexpected cookie jar state Mozilla: Memory safety bugs fixed in Firefox 116, Firefox ESR 115.1, Firefox ESR 102.14, Thunderbird 115.1, and Thunderbird 102.14 Mozilla: Memory safety bugs fixed in Firefox ESR 115.1, and Thunderbird 115.1 | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 9.8 | null | null |
RHSA-2021:1924 | Red Hat Security Advisory: spice security update | spice: Client initiated renegotiation denial of service | [
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb"
] | null | 5.3 | null | null |
RHSA-2015:0086 | Red Hat Security Advisory: java-1.6.0-sun security update | SSL/TLS: Padding Oracle On Downgraded Legacy Encryption attack ICU: font parsing OOB read (OpenJDK 2D, 8055489) OpenJDK: MulticastSocket NULL pointer dereference (Libraries, 8056264) ICU: font parsing OOB read (OpenJDK 2D, 8056276) OpenJDK: incorrect tracking of ChangeCipherSpec during SSL/TLS handshake (JSSE, 8057555) OpenJDK: class verifier insufficient invokespecial calls verification (Hotspot, 8058982) OpenJDK: insecure hsperfdata temporary file handling (Hotspot, 8050807) OpenJDK: phantom references handling issue in garbage collector (Hotspot, 8047125) JDK: unspecified vulnerability fixed in 6u91, 7u75 and 8u31 (Deployment) JDK: unspecified vulnerability fixed in 6u91, 7u75 and 8u31 (Deployment) OpenJDK: directory information leak via file chooser (Swing, 8055304) OpenJDK: incorrect context class loader use in RMI transport (RMI, 8055309) OpenJDK: DER decoder infinite loop (Security, 8059485) OpenJDK: insufficient code privileges checks (JAX-WS, 8054367) | [
"cpe:/a:redhat:rhel_extras_oracle_java:5",
"cpe:/a:redhat:rhel_extras_oracle_java:6",
"cpe:/a:redhat:rhel_extras_oracle_java:7"
] | null | null | null | null |
RHSA-2023:7267 | Red Hat Security Advisory: open-vm-tools security update | open-vm-tools: SAML token signature bypass open-vm-tools: file descriptor hijack vulnerability in the vmware-user-suid-wrapper | [
"cpe:/a:redhat:rhel_eus:9.0::appstream"
] | null | 7.4 | null | null |
RHSA-2019:2465 | Red Hat Security Advisory: ghostscript security update | ghostscript: -dSAFER escape via .buildfont1 (701394) | [
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb"
] | null | null | 7.3 | null |
RHSA-2006:0749 | Red Hat Security Advisory: tar security update | security flaw | [
"cpe:/o:redhat:enterprise_linux:2.1::as",
"cpe:/o:redhat:enterprise_linux:2.1::aw",
"cpe:/o:redhat:enterprise_linux:2.1::es",
"cpe:/o:redhat:enterprise_linux:2.1::ws",
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws",
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2023:3910 | Red Hat Security Advisory: Red Hat OpenShift Enterprise security update | golang: net/http: excessive memory growth in a Go server accepting HTTP/2 requests openshift: OCP & FIPS mode golang: html/template: improper handling of JavaScript whitespace | [
"cpe:/a:redhat:openshift:4.10::el7",
"cpe:/a:redhat:openshift:4.10::el8"
] | null | 8.1 | null | null |
RHSA-2022:5152 | Red Hat Security Advisory: Red Hat OpenShift GitOps security update | argocd: vulnerable to an uncontrolled memory consumption bug argocd: vulnerable to a variety of attacks when an SSO login is initiated from the Argo CD CLI or the UI. argocd: cross-site scripting (XSS) allow a malicious user to inject a javascript link in the UI argocd: vulnerable to a symlink following bug allowing a malicious user with repository write access | [
"cpe:/a:redhat:openshift_gitops:1.5::el8"
] | null | 4.3 | null | null |
RHSA-2014:1021 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 6.3.0 update | httpd: mod_deflate denial of service netty: DoS via memory exhaustion during data aggregation openssl: DoS when sending invalid DTLS handshake httpd: mod_status heap-based buffer overflow Tomcat/JBossWeb: request smuggling and limited DoS in ChunkedInputFilter httpd: mod_cgid denial of service WS: Incomplete fix for CVE-2013-2133 Security: Invalid EJB caller role check implementation | [
"cpe:/a:redhat:jboss_enterprise_application_platform:6.3"
] | null | null | null | null |
RHSA-2019:3245 | Red Hat Security Advisory: OpenShift Container Platform 4.2 security update | HTTP/2: flood using PING frames results in unbounded memory growth HTTP/2: flood using HEADERS frames results in unbounded memory growth | [
"cpe:/a:redhat:openshift:4.2::el7"
] | null | null | 7.5 | null |
RHSA-2023:1696 | Red Hat Security Advisory: haproxy security update | haproxy: segfault DoS haproxy: request smuggling attack in HTTP/1 header parsing | [
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 8.2 | null | null |
RHSA-2024:9525 | Red Hat Security Advisory: libsoup security update | libsoup: HTTP request smuggling via stripping null bytes from the ends of header names | [
"cpe:/a:redhat:rhel_aus:8.6::appstream",
"cpe:/a:redhat:rhel_e4s:8.6::appstream",
"cpe:/a:redhat:rhel_tus:8.6::appstream",
"cpe:/o:redhat:rhel_aus:8.6::baseos",
"cpe:/o:redhat:rhel_e4s:8.6::baseos",
"cpe:/o:redhat:rhel_tus:8.6::baseos"
] | null | 7.5 | null | null |
RHSA-2013:0830 | Red Hat Security Advisory: kernel security update | kernel: perf_swevent_enabled array out-of-bound access | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2019:1183 | Red Hat Security Advisory: qemu-kvm security update | hardware: Microarchitectural Store Buffer Data Sampling (MSBDS) hardware: Micro-architectural Load Port Data Sampling - Information Leak (MLPDS) hardware: Microarchitectural Fill Buffer Data Sampling (MFBDS) hardware: Microarchitectural Data Sampling Uncacheable Memory (MDSUM) | [
"cpe:/o:redhat:rhel_eus:7.5::computenode",
"cpe:/o:redhat:rhel_eus:7.5::server"
] | null | null | 3.8 | null |
RHSA-2014:1244 | Red Hat Security Advisory: bind97 security and bug fix update | bind: named crash when handling malformed NSEC3-signed zones | [
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2021:1081 | Red Hat Security Advisory: kernel-rt security and bug fix update | kernel: use after free in eventpoll.c may lead to escalation of privilege Kernel: KVM: host stack overflow due to lazy update IOAPIC kernel: SCSI target (LIO) write to any block on ILO backstore kernel: Use after free via PI futex state kernel: race conditions caused by wrong locking in net/vmw_vsock/af_vsock.c kernel: iscsi: unrestricted access to sessions and handles kernel: out-of-bounds read in libiscsi module kernel: heap buffer overflow in the iSCSI subsystem | [
"cpe:/a:redhat:enterprise_linux:8::nfv",
"cpe:/a:redhat:enterprise_linux:8::realtime"
] | null | 7.8 | null | null |
RHSA-2022:1662 | Red Hat Security Advisory: rh-maven36-maven-shared-utils security update | maven-shared-utils: Command injection via Commandline class | [
"cpe:/a:redhat:rhel_software_collections:3::el7"
] | null | 9.8 | null | null |
RHSA-2017:1835 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.0.7 on RHEL 7 | Artemis: Deserialization of untrusted input vulnerability jackson-databind: Deserialization vulnerability via readValue method of ObjectMapper | [
"cpe:/a:redhat:jboss_enterprise_application_platform:7::el7"
] | null | null | 8.1 | null |
RHSA-2023:4819 | Red Hat Security Advisory: kernel security and bug fix update | hw: amd: Cross-Process Information Leak kernel: cls_flower: out-of-bounds write in fl_set_geneve_opt() | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 7.8 | null | null |
RHSA-2022:1964 | Red Hat Security Advisory: fetchmail security update | fetchmail: DoS or information disclosure when logging long messages fetchmail: STARTTLS session encryption bypassing | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 5.9 | null | null |
RHSA-2020:1942 | Red Hat Security Advisory: OpenShift Container Platform 4.4.3 presto-container security update | operator-framework/presto: /etc/passwd is given incorrect privileges | [
"cpe:/a:redhat:openshift:4.4::el7"
] | null | 7 | null | null |
RHSA-2022:5219 | Red Hat Security Advisory: kpatch-patch security update | kernel: buffer overflow in IPsec ESP transformation code | [
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 7.8 | null | null |
RHSA-2024:5884 | Red Hat Security Advisory: krb5 security update | krb5: GSS message token handling krb5: GSS message token handling | [
"cpe:/o:redhat:rhel_aus:8.2::baseos"
] | null | 6.5 | null | null |
RHSA-2007:0795 | Red Hat Security Advisory: cyrus-sasl security and bug fix update | cyrus-sasl digest-md5 DoS | [
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2007:0055 | Red Hat Security Advisory: libwpd security update | buffer overflows security flaw | [
"cpe:/a:redhat:rhel_productivity:5",
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation"
] | null | null | null | null |
RHSA-2017:0838 | Red Hat Security Advisory: openjpeg security update | openjpeg: Heap overflow in parsing of JPEG2000 precincts openjpeg: heap overflow due to unsafe use of opj_aligned_malloc openjpeg: heap overflow in parsing of JPEG2000 code blocks openjpeg: Integer overflow in opj_pi_create_decode openjpeg: heap out-of-bounds read due to insufficient check in imagetopnm() openjpeg: incorrect fix for CVE-2013-6045 | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 7.5 | null |
RHSA-2021:0694 | Red Hat Security Advisory: bind security update | bind: Buffer overflow in the SPNEGO implementation affecting GSSAPI security policy negotiation | [
"cpe:/o:redhat:rhel_aus:7.2::server"
] | null | 8.1 | null | null |
RHBA-2013:1150 | Red Hat Bug Fix Advisory: net-snmp bug fix update | net-snmp: snmpd crashes/hangs when AgentX subagent times-out | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2023:5442 | Red Hat Security Advisory: Red Hat Advanced Cluster Management 2.8.2 security and bug fix updates | x/net/http2/h2c: request smuggling golang: html/template: improper sanitization of CSS values golang: html/template: improper handling of JavaScript whitespace tough-cookie: prototype pollution in cookie memstore golang: html/template: improper handling of empty HTML attributes | [
"cpe:/a:redhat:acm:2.8::el8"
] | null | 7.3 | null | null |
RHSA-2017:3218 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 6.4.18 security update | keycloak: SAML request parser replaces special strings with system properties | [
"cpe:/a:redhat:jboss_enterprise_application_platform:6::el7"
] | null | null | 6.5 | null |
RHSA-2002:154 | Red Hat Security Advisory: mm security update | security flaw | [
"cpe:/o:redhat:enterprise_linux:2.1::as"
] | null | null | null | null |
RHSA-2022:1645 | Red Hat Security Advisory: Red Hat OpenStack Platform 16.2 (python-twisted) security update | python-twisted: possible http request smuggling | [
"cpe:/a:redhat:openstack:16.2::el8"
] | null | 8.1 | null | null |
RHSA-2021:2521 | Red Hat Security Advisory: virt:8.2 and virt-devel:8.2 security update | QEMU: msix: OOB access during mmio operations may lead to DoS qemu: out-of-bound heap buffer access via an interrupt ID field | [
"cpe:/a:redhat:advanced_virtualization:8.2::el8"
] | null | 2.5 | null | null |
RHSA-2020:1135 | Red Hat Security Advisory: polkit security and bug fix update | polkit: Improper authorization in polkit_backend_interactive_authority_check_authorization function in polkitd | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 4.4 | null |
RHSA-2012:0313 | Red Hat Security Advisory: samba security, bug fix, and enhancement update | samba: insecure "wide links" default | [
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2021:3155 | Red Hat Security Advisory: thunderbird security update | Mozilla: Uninitialized memory in a canvas object could have led to memory corruption Mozilla: Incorrect instruction reordering during JIT optimization Mozilla: Use-after-free media channels Mozilla: Race condition when resolving DNS names could have led to memory corruption Mozilla: Memory corruption as a result of incorrect style treatment Mozilla: Memory safety bugs fixed in Thunderbird 78.13 | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 8.8 | 7.5 | null |
RHSA-2005:427 | Red Hat Security Advisory: ethereal security update | security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw | [
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws"
] | null | null | null | null |
RHSA-2023:3852 | Red Hat Security Advisory: kernel security and bug fix update | kernel: tcindex: use-after-free vulnerability in traffic control index filter allows privilege escalation kernel: netfilter: use-after-free in nf_tables when processing batch requests can lead to privilege escalation | [
"cpe:/o:redhat:rhel_e4s:8.1::baseos"
] | null | 7.8 | null | null |
RHSA-2018:0239 | Red Hat Security Advisory: Red Hat Enterprise Linux 6.2 AMC Retirement Notice | This is the final notification for the retirement of Red Hat Enterprise Linux 6.2 Advanced Mission Critical (AMC). This notification applies only to those customers subscribed to the Advanced Mission Critical (AMC) channel for Red Hat Enterprise Linux 6.2. | [
"cpe:/o:redhat:rhel_mission_critical:6.2::server"
] | null | null | null | null |
RHSA-2019:3651 | Red Hat Security Advisory: sssd security, bug fix, and enhancement update | sssd: improper implementation of GPOs due to too restrictive permissions | [
"cpe:/a:redhat:enterprise_linux:8::crb",
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | null | 5.4 | null |
RHSA-2020:1150 | Red Hat Security Advisory: qemu-kvm-ma security update | QEMU: block: iscsi: OOB heap access via an unexpected response of iSCSI Server QEMU: slirp: OOB buffer access while emulating tcp protocols in tcp_emu() | [
"cpe:/o:redhat:enterprise_linux:7::server"
] | null | 5.6 | null | null |
RHSA-2021:3024 | Red Hat Security Advisory: Red Hat OpenShift Jaeger 1.24.0 Operator/Operand Containers security update | nodejs-ua-parser-js: ReDoS via malicious User-Agent header | [
"cpe:/a:redhat:jaeger:1.24::el8"
] | null | 7.5 | null | null |
RHSA-2018:2565 | Red Hat Security Advisory: rh-postgresql10-postgresql security update | postgresql: Too-permissive access control list on function pg_logfile_rotate() postgresql: Certain host connection parameters defeat client-side security defenses postgresql: Missing authorization and memory disclosure in INSERT ... ON CONFLICT DO UPDATE statements | [
"cpe:/a:redhat:rhel_software_collections:3::el7"
] | null | null | 7.1 | null |
RHSA-2020:3958 | Red Hat Security Advisory: httpd security, bug fix, and enhancement update | httpd: <FilesMatch> bypass with a trailing newline in the file name httpd: Improper handling of headers in mod_session can allow a remote user to modify session data for CGI applications httpd: Out of bounds read in mod_cache_socache can allow a remote attacker to cause DoS httpd: mod_rewrite potential open redirect httpd: mod_rewrite configurations vulnerable to open redirect httpd: mod_proxy_ftp use of uninitialized value | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 3.7 | 3.7 | null |
RHSA-2022:5924 | Red Hat Security Advisory: Service Telemetry Framework 1.4 security update | golang: compress/gzip: stack exhaustion in Reader.Read | [
"cpe:/a:redhat:service_telemetry_framework:1.4::el8"
] | null | 7.5 | null | null |
RHSA-2024:9122 | Red Hat Security Advisory: xorg-x11-server security update | xorg-x11-server: Heap buffer overread/data leakage in ProcXIGetSelectedEvents xorg-x11-server: Heap buffer overread/data leakage in ProcXIPassiveGrabDevice xorg-x11-server: Use-after-free in ProcRenderAddGlyphs | [
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::crb"
] | null | 7.8 | null | null |
RHSA-2021:1620 | Red Hat Security Advisory: linux-firmware security, bug fix, and enhancement update | kernel: Integer overflow in Intel(R) Graphics Drivers kernel: Improper input validation in some Intel(R) Graphics Drivers kernel: Null pointer dereference in some Intel(R) Graphics Drivers | [
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 5.5 | null | null |
RHSA-2024:0200 | Red Hat Security Advisory: OpenShift Container Platform 4.12.47 security update | haproxy: Proxy forwards malformed empty Content-Length headers | [
"cpe:/a:redhat:openshift:4.12::el8",
"cpe:/a:redhat:openshift:4.12::el9"
] | null | 7.5 | null | null |
RHSA-2007:1052 | Red Hat Security Advisory: pcre security update | pcre incorrect memory requirement computation pcre integer overflow | [
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws",
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2016:2843 | Red Hat Security Advisory: firefox security update | Mozilla: Firefox SVG Animation Remote Code Execution (MFSA 2016-92) | [
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::server",
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation",
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 7.3 | null |
RHSA-2022:6526 | Red Hat Security Advisory: OpenShift Virtualization 4.11.0 Images security and bug fix update | golang: out-of-bounds read in golang.org/x/text/language leads to DoS golang: net/http: limit growth of header canonicalization cache golang: syscall: don't close fd 0 on ForkExec error kubeVirt: Arbitrary file read on the host from KubeVirt VMs prometheus/client_golang: Denial of service using InstrumentHandlerCounter golang: math/big: uncontrolled memory consumption due to an unhandled overflow via Rat.SetString golang: cmd/go: misinterpretation of branch names can lead to incorrect access control golang: crypto/elliptic: IsOnCurve returns true for invalid field elements golang: encoding/pem: fix stack overflow in Decode golang: regexp: stack exhaustion via a deeply nested expression golang: crash in a golang.org/x/crypto/ssh server golang: crypto/elliptic: panic caused by oversized scalar | [
"cpe:/a:redhat:container_native_virtualization:4.11::el8"
] | null | 7.5 | null | null |
RHSA-2022:5778 | Red Hat Security Advisory: thunderbird security update | Mozilla: Memory safety bugs fixed in Firefox 103 and 102.1 Mozilla: Directory indexes for bundled resources reflected URL parameters Mozilla: Mouse Position spoofing with CSS transforms | [
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 7.5 | 6.1 | null |
RHSA-2023:0856 | Red Hat Security Advisory: kernel security update | kernel: memory corruption in AX88179_178A based USB ethernet device. kernel: use-after-free caused by l2cap_reassemble_sdu() in net/bluetooth/l2cap_core.c kernel: stack overflow in do_proc_dointvec and proc_skip_spaces | [
"cpe:/o:redhat:rhel_e4s:8.1::baseos"
] | null | 7.8 | null | null |
RHSA-2013:1814 | Red Hat Security Advisory: php security update | PHP: sapi_header_op() %0D sequence handling security bypass php: Integer Signedness issues in _php_stream_scandir php: Ability to read arbitrary files due use of external entities while parsing SOAP WSDL files php: memory corruption in openssl_x509_parse() | [
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2017:0863 | Red Hat Security Advisory: Red Hat Enterprise Linux 4 Extended Life Cycle Support Final Notice | This is the final notification for the retirement of Red Hat Enterprise Linux 4 Extended Life Cycle Support Add-On (ELS). This notification applies only to those customers subscribed to the Extended Life Cycle Support (ELS) channel for Red Hat Enterprise Linux 4. | [
"cpe:/o:redhat:rhel_els:4::as",
"cpe:/o:redhat:rhel_els:4::es"
] | null | null | null | null |
RHSA-2021:5179 | Red Hat Security Advisory: rh-postgresql13-postgresql security update | postgresql: memory disclosure in certain queries postgresql: server processes unencrypted bytes from man-in-the-middle postgresql: libpq processes unencrypted bytes from man-in-the-middle | [
"cpe:/a:redhat:rhel_software_collections:3::el7"
] | null | 3.7 | null | null |
RHSA-2017:0901 | Red Hat Security Advisory: Red Hat Directory Server 9 - 60 Day Retirement Notice | This is the 60 day notification for the retirement of Red Hat Directory Server 9. | [
"cpe:/a:redhat:directory_server:9"
] | null | null | null | null |
RHSA-2024:10518 | Red Hat Security Advisory: OpenShift Container Platform 4.17.7 bug fix and security update | go-retryablehttp: url might write sensitive information to log file QEMU: Denial of Service via Improper Synchronization in QEMU NBD Server During Socket Closure pam: Improper Hostname Interpretation in pam_access Leads to Access Control Bypass cross-spawn: regular expression denial of service | [
"cpe:/a:redhat:openshift:4.17::el9"
] | null | 4.4 | 7.5 | null |
RHBA-2021:2955 | Red Hat Bug Fix Advisory: Red Hat Automation Platform 1.2.4 | nginx: Off-by-one in ngx_resolver_copy() when labels are followed by a pointer to a root domain name | [
"cpe:/a:redhat:ansible_automation_platform:4.2::el7",
"cpe:/a:redhat:ansible_automation_platform:4.2::el8"
] | null | 8.1 | null | null |
RHSA-2011:1292 | Red Hat Security Advisory: jakarta-commons-daemon-jsvc security update | jakarta-commons-daemon: jsvc does not drop capabilities allowing access to files and directories owned by the superuser | [
"cpe:/a:redhat:jboss_enterprise_web_server:1::el4"
] | null | null | null | null |
RHSA-2016:1328 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 5.2 security update | JGroups: Authorization bypass | [
"cpe:/a:redhat:jboss_enterprise_application_platform:5::el4",
"cpe:/a:redhat:jboss_enterprise_application_platform:5::el5",
"cpe:/a:redhat:jboss_enterprise_application_platform:5::el6"
] | null | null | 9.8 | null |
RHSA-2022:0467 | Red Hat Security Advisory: Red Hat AMQ Streams 1.6.7 release and security update | kubernetes-client: Insecure deserialization in unmarshalYaml method log4j-core: remote code execution via JDBC Appender log4j: Remote code execution in Log4j 1.x when application is configured to use JMSSink log4j: SQL injection in Log4j 1.x when application is configured to use JDBCAppender log4j: Unsafe deserialization flaw in Chainsaw log viewer | [
"cpe:/a:redhat:amq_streams:1"
] | null | 8.8 | null | null |
RHSA-2018:2763 | Red Hat Security Advisory: kernel-rt security and bug fix update | kernel: Integer overflow in Linux's create_elf_tables function | [
"cpe:/a:redhat:rhel_extras_rt:7"
] | null | null | 7.8 | null |
RHSA-2022:9075 | Red Hat Security Advisory: thunderbird security update | Mozilla: Quoting from an HTML email with certain tags will trigger network requests and load remote content, regardless of a configuration to block remote content Mozilla: Arbitrary file read from a compromised content process Mozilla: Drag and Dropped Filenames could have been truncated to malicious extensions Mozilla: Memory safety bugs fixed in Firefox ESR 102.6 and Thunderbird 102.6 Mozilla: Use-after-free in WebGL Mozilla: Memory corruption in WebGL Mozilla: Use-after-free in WebGL | [
"cpe:/a:redhat:rhel_eus:8.4::appstream"
] | null | 8.1 | null | null |
RHSA-2022:7622 | Red Hat Security Advisory: unbound security, bug fix, and enhancement update | unbound: integer overflow in the regional allocator via the ALIGN_UP macro unbound: novel ghost domain attack that allows attackers to trigger continued resolvability of malicious domain names unbound: novel ghost domain attack that allows attackers to trigger continued resolvability of malicious domain names | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 6.5 | null | null |
RHSA-2021:4589 | Red Hat Security Advisory: gcc-toolset-10-annobin security update | environment: Unicode's bidirectional (BiDi) override characters can cause trojan source attacks | [
"cpe:/a:redhat:rhel_eus:8.4::appstream"
] | null | 8.5 | null | null |
RHSA-2020:0694 | Red Hat Security Advisory: OpenShift Container Platform 4.1.38 security update | openshift/mediawiki-apb: /etc/passwd is given incorrect privileges openshift/mariadb-apb: /etc/passwd is given incorrect privileges openshift/apb-base: /etc/passwd is given incorrect privileges openshift/postgresql-apb: /etc/passwd is given incorrect privileges openshift/mysql-apb: /etc/passwd is given incorrect privileges openshift/mediawiki: /etc/passwd is given incorrect privileges | [
"cpe:/a:redhat:openshift:4.1::el7"
] | null | 7 | null | null |
RHSA-2008:0877 | Red Hat Security Advisory: jbossweb security update | tomcat: Cross-Site-Scripting enabled by sendError call tomcat RequestDispatcher information disclosure vulnerability tomcat Unicode directory traversal vulnerability | [
"cpe:/a:redhat:jboss_enterprise_application_platform:4.2.0::el4",
"cpe:/a:redhat:jboss_enterprise_application_platform:4.2.0::el5",
"cpe:/a:redhat:jboss_enterprise_application_platform:4.3.0::el4",
"cpe:/a:redhat:jboss_enterprise_application_platform:4.3.0::el5"
] | null | null | null | null |
RHSA-2019:4018 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.2.5 on RHEL 6 security update | HTTP/2: large amount of data requests leads to denial of service HTTP/2: flood using PING frames results in unbounded memory growth HTTP/2: flood using HEADERS frames results in unbounded memory growth HTTP/2: flood using SETTINGS frames results in unbounded memory growth wildfly-core: Incorrect privileges for 'Monitor', 'Auditor' and 'Deployer' user by default wildfly-security-manager: security manager authorization bypass | [
"cpe:/a:redhat:jboss_enterprise_application_platform:7.2::el6"
] | null | null | 7.5 | null |
RHSA-2009:0398 | Red Hat Security Advisory: seamonkey security update | Firefox XUL garbage collection issue (cansecwest pwn2own) Firefox XSLT memory corruption issue | [
"cpe:/o:redhat:enterprise_linux:2.1::as",
"cpe:/o:redhat:enterprise_linux:2.1::aw",
"cpe:/o:redhat:enterprise_linux:2.1::es",
"cpe:/o:redhat:enterprise_linux:2.1::ws",
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws",
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2024:0594 | Red Hat Security Advisory: openssh security update | ssh: Prefix truncation attack on Binary Packet Protocol (BPP) openssh: potential command injection via shell metacharacters | [
"cpe:/a:redhat:rhel_eus:8.8::appstream",
"cpe:/o:redhat:rhel_eus:8.8::baseos"
] | null | 6.5 | null | null |
RHSA-2013:1428 | Red Hat Security Advisory: jakarta-commons-fileupload security update | commons-fileupload: Arbitrary file upload via deserialization | [
"cpe:/a:redhat:jboss_enterprise_web_server:1::el5",
"cpe:/a:redhat:jboss_enterprise_web_server:1::el6"
] | null | null | null | null |
RHSA-2022:4824 | Red Hat Security Advisory: fapolicyd security and bug fix update | fapolicyd: fapolicyd wrongly prepares ld.so path | [
"cpe:/a:redhat:rhel_eus:8.4::appstream"
] | null | 8.4 | null | null |
RHSA-2019:3387 | Red Hat Security Advisory: osinfo-db and libosinfo security and bug fix update | Libosinfo: osinfo-install-script option leaks password via command line argument | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | null | 2.8 | null |
RHSA-2017:3490 | Red Hat Security Advisory: Red Hat Enterprise Linux 6.7 Extended Update Support One-Year Notice | This is the One-Year notification for the retirement of Red Hat Enterprise Linux 6.7 Extended Update Support (EUS). This notification applies only to those customers subscribed to the Extended Update Support (EUS) channel for Red Hat Enterprise Linux 6.7. | [
"cpe:/o:redhat:rhel_eus:6.7::computenode",
"cpe:/o:redhat:rhel_eus:6.7::server"
] | null | null | null | null |
RHSA-2022:9077 | Red Hat Security Advisory: thunderbird security update | Mozilla: Quoting from an HTML email with certain tags will trigger network requests and load remote content, regardless of a configuration to block remote content Mozilla: Arbitrary file read from a compromised content process Mozilla: Drag and Dropped Filenames could have been truncated to malicious extensions Mozilla: Memory safety bugs fixed in Firefox ESR 102.6 and Thunderbird 102.6 Mozilla: Use-after-free in WebGL Mozilla: Memory corruption in WebGL Mozilla: Use-after-free in WebGL | [
"cpe:/a:redhat:rhel_e4s:8.1::appstream"
] | null | 8.1 | null | null |
RHSA-2025:0892 | Red Hat Security Advisory: Red Hat OpenShift Dev Spaces 3.18.0 release | PostCSS: Improper input validation in PostCSS cross-spawn: regular expression denial of service golang.org/x/crypto/ssh: Misuse of ServerConfig.PublicKeyCallback may cause authorization bypass in golang.org/x/crypto golang.org/x/net/html: Non-linear parsing of case-insensitive content in golang.org/x/net/html dompurify: XSS vulnerability via prototype pollution virtualenv: potential command injection via virtual environment activation scripts nanoid: nanoid mishandles non-integer values | [
"cpe:/a:redhat:openshift_devspaces:3::el9"
] | null | 6.5 | null | null |
RHSA-2003:323 | Red Hat Security Advisory: : Updated Ethereal packages fix security issues | security flaw security flaw security flaw | [
"cpe:/o:redhat:linux:7.2",
"cpe:/o:redhat:linux:7.3",
"cpe:/o:redhat:linux:8.0",
"cpe:/o:redhat:linux:9"
] | null | null | null | null |
RHSA-2016:0514 | Red Hat Security Advisory: java-1.8.0-openjdk security update | OpenJDK: missing type safety checks for MethodHandle calls across class loaders, incorrect CVE-2013-5838 fix (Hotspot, 8151666) | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2023:7771 | Red Hat Security Advisory: rh-postgresql10-postgresql security update | postgresql: Buffer overrun from integer overflow in array modification | [
"cpe:/a:redhat:rhel_software_collections:3::el7"
] | null | 8.8 | null | null |
RHSA-2022:1075 | Red Hat Security Advisory: httpd24-httpd security update | httpd: Errors encountered during the discarding of request body lead to HTTP request smuggling | [
"cpe:/a:redhat:rhel_software_collections:3::el7"
] | null | 8.3 | null | null |
RHSA-2022:8385 | Red Hat Security Advisory: dhcp security and enhancement update | bind: DNS forwarders - cache poisoning vulnerability | [
"cpe:/o:redhat:enterprise_linux:9::baseos"
] | null | 6.8 | null | null |
RHSA-2023:6667 | Red Hat Security Advisory: samba security, bug fix, and enhancement update | samba: out-of-bounds read in winbind AUTH_CRAP samba: infinite loop in mdssvc RPC service for spotlight samba: type confusion in mdssvc RPC service for spotlight samba: spotlight server-side share path disclosure | [
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::crb",
"cpe:/a:redhat:enterprise_linux:9::resilientstorage",
"cpe:/o:redhat:enterprise_linux:9::baseos"
] | null | 5.3 | null | null |
RHSA-2018:0334 | Red Hat Security Advisory: chromium-browser security update | chromium-browser: incorrect derived class instantiation in v8 | [
"cpe:/a:redhat:rhel_extras:6"
] | null | null | 8.8 | null |
RHSA-2007:1026 | Red Hat Security Advisory: poppler security update | DCTStream:: readProgressiveDataUnit() DCTStream:: reset() CCITTFaxStream:: lookChar() | [
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2019:3906 | Red Hat Security Advisory: OpenShift Container Platform 3.11 HTTP/2 security update | HTTP/2: flood using PING frames results in unbounded memory growth HTTP/2: flood using HEADERS frames results in unbounded memory growth | [
"cpe:/a:redhat:openshift:3.11::el7"
] | null | null | 7.5 | null |
RHSA-2024:0407 | Red Hat Security Advisory: git security update | git: On multi-user machines Git users might find themselves unexpectedly in a Git worktree git: Bypass of safe.directory protections git: exposure of sensitive information to a malicious actor git: git shell function that splits command arguments can lead to arbitrary heap writes. git: data exfiltration with maliciously crafted repository git: git apply: a path outside the working tree can be overwritten with crafted input | [
"cpe:/a:redhat:rhel_eus:8.6::appstream"
] | null | 7.5 | null | null |
RHSA-2020:4694 | Red Hat Security Advisory: container-tools:rhel8 security, bug fix, and enhancement update | containernetworking/plugins: IPv6 router advertisements allow for MitM attacks on IPv4 clusters QEMU: slirp: networking out-of-bounds read information disclosure vulnerability golang.org/x/text: possibility to trigger an infinite loop in encoding/unicode could lead to crash | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 7.5 | null | null |
RHSA-2022:7470 | Red Hat Security Advisory: pki-core:10.6 and pki-deps:10.6 security and bug fix update | pki-core: access to external entities when parsing XML can lead to XXE | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 7.5 | null | null |
RHSA-2020:2032 | Red Hat Security Advisory: firefox security update | usrsctp: Buffer overflow in AUTH chunk input validation Mozilla: Use-after-free during worker shutdown Mozilla: Arbitrary local file access with 'Copy as cURL' Mozilla: Memory safety bugs fixed in Firefox 76 and Firefox ESR 68.8 | [
"cpe:/a:redhat:rhel_eus:8.1::appstream"
] | null | 9.8 | 6.1 | null |
RHSA-2018:1203 | Red Hat Security Advisory: java-1.6.0-sun security update | JDK: unspecified vulnerability fixed in 6u191, 7u171, and 8u161 (Security) OpenJDK: incorrect merging of sections in the JAR manifest (Security, 8189969) OpenJDK: unrestricted deserialization of data from JCEKS key stores (Security, 8189997) OpenJDK: insufficient consistency checks in deserialization of multiple classes (Security, 8189977) OpenJDK: unbounded memory allocation during deserialization in TabularDataSupport (JMX, 8189985) OpenJDK: unbounded memory allocation during deserialization in Container (AWT, 8189989) OpenJDK: RMI HTTP transport enabled by default (RMI, 8193833) OpenJDK: incorrect handling of Reference clones can lead to sandbox bypass (Hotspot, 8192025) OpenJDK: unbounded memory allocation during deserialization in StubIORImpl (Serialization, 8192757) | [
"cpe:/a:redhat:rhel_extras_oracle_java:6"
] | null | null | 5.3 | null |
RHSA-2020:0172 | Red Hat Security Advisory: openvswitch2.12 security and bug fix update | dpdk: possible memory leak leads to denial of service | [
"cpe:/o:redhat:enterprise_linux:8::fastdatapath"
] | null | null | 7.5 | null |
RHSA-2009:1453 | Red Hat Security Advisory: pidgin security update | Pidgin: NULL pointer dereference by handling IRC topic(s) (DoS) pidgin: ignores SSL/TLS requirements with old jabber servers Pidgin: NULL pointer dereference by processing incomplete MSN SLP invite (DoS) Pidgin: NULL pointer dereference by processing a custom smiley (DoS) | [
"cpe:/a:redhat:rhel_productivity:5",
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws",
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation"
] | null | null | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.