id
stringlengths
13
15
title
stringlengths
29
176
description
stringlengths
8
32.1k
cpes
sequencelengths
0
20
cvss_v4_0
null
cvss_v3_1
float64
0
10
cvss_v3_0
float64
0
10
cvss_v2_0
null
RHSA-2022:9074
Red Hat Security Advisory: thunderbird security update
Mozilla: Quoting from an HTML email with certain tags will trigger network requests and load remote content, regardless of a configuration to block remote content Mozilla: Arbitrary file read from a compromised content process Mozilla: Drag and Dropped Filenames could have been truncated to malicious extensions Mozilla: Memory safety bugs fixed in Firefox ESR 102.6 and Thunderbird 102.6 Mozilla: Use-after-free in WebGL Mozilla: Memory corruption in WebGL Mozilla: Use-after-free in WebGL
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
8.1
null
null
RHSA-2022:1620
Red Hat Security Advisory: OpenShift Container Platform 4.6.57 packages and security update
haproxy: Denial of service via set-cookie2 header workflow-cps: OS command execution through crafted SCM contents workflow-cps-global-lib: OS command execution through crafted SCM contents workflow-multibranch: OS command execution through crafted SCM contents workflow-cps: Pipeline-related plugins follow symbolic links or do not limit path names workflow-cps-global-lib: Pipeline-related plugins follow symbolic links or do not limit path names workflow-cps-global-lib: Pipeline-related plugins follow symbolic links or do not limit path names workflow-multibranch: Pipeline-related plugins follow symbolic links or do not limit path names workflow-cps: Password parameters are included from the original build in replayed builds workflow-cps-global-lib: Sandbox bypass vulnerability workflow-cps-global-lib: Sandbox bypass vulnerability workflow-cps-global-lib: Sandbox bypass vulnerability pipeline-build-step: Password parameter default values exposed
[ "cpe:/a:redhat:openshift:4.6::el7", "cpe:/a:redhat:openshift:4.6::el8" ]
null
6.5
null
null
RHSA-2004:412
Red Hat Security Advisory: kdelibs, kdebase security update
security flaw security flaw security flaw
[ "cpe:/o:redhat:enterprise_linux:3::as", "cpe:/o:redhat:enterprise_linux:3::desktop", "cpe:/o:redhat:enterprise_linux:3::es", "cpe:/o:redhat:enterprise_linux:3::ws" ]
null
null
null
null
RHSA-2022:7011
Red Hat Security Advisory: java-11-openjdk security update
OpenJDK: improper MultiByte conversion can lead to buffer overflow (JGSS, 8286077) OpenJDK: improper handling of long NTLM client hostnames (Security, 8286526) OpenJDK: insufficient randomization of JNDI DNS port numbers (JNDI, 8286910) OpenJDK: excessive memory allocation in X.509 certificate parsing (Security, 8286533) OpenJDK: HttpServer no connection count limit (Lightweight HTTP Server, 8286918) OpenJDK: missing SNI caching in HTTP/2 (Networking, 8289366)
[ "cpe:/a:redhat:rhel_eus:8.4::appstream", "cpe:/a:redhat:rhel_eus:8.4::crb" ]
null
3.7
null
null
RHSA-2024:1930
Red Hat Security Advisory: Red Hat OpenStack Platform 17.1 (openstack-tripleo-heat-templates and python-yaql) security update
YAQL: OpenStack Murano Component Information Leakage
[ "cpe:/a:redhat:openstack:17.1::el8" ]
null
8.4
null
null
RHSA-2024:4617
Red Hat Security Advisory: qt5-qtbase security update
qtbase: qtbase: Delay any communication until encrypted() can be responded to
[ "cpe:/a:redhat:enterprise_linux:8::appstream", "cpe:/a:redhat:enterprise_linux:8::crb" ]
null
7.5
null
null
RHSA-2020:5526
Red Hat Security Advisory: Red Hat Single Sign-On 7.4.4 security update on RHEL 6
keycloak: Account REST API can update user metadata attributes
[ "cpe:/a:redhat:red_hat_single_sign_on:7::el6" ]
null
4.2
null
null
RHSA-2011:1821
Red Hat Security Advisory: pidgin security update
(libpurple): Invalid UTF-8 string handling in OSCAR messages pidgin: Multiple NULL pointer deference flaws by processing certain Jingle stanzas in the XMPP protocol plug-in
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
null
null
RHSA-2019:0968
Red Hat Security Advisory: edk2 security update
edk2: Buffer Overflow in BlockIo service for RAM disk
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
null
8.3
null
RHSA-2024:10823
Red Hat Security Advisory: OpenShift Container Platform 4.16.26 bug fix and security update
go-retryablehttp: url might write sensitive information to log file cross-spawn: regular expression denial of service
[ "cpe:/a:redhat:openshift:4.16::el9" ]
null
4.4
null
null
RHSA-2023:3319
Red Hat Security Advisory: go-toolset:rhel8 security update
golang: crypto/internal/nistec: specific unreduced P-256 scalars produce incorrect results golang: net/http, net/textproto: denial of service from excessive memory allocation golang: net/http, net/textproto, mime/multipart: denial of service from excessive resource consumption golang: go/parser: Infinite loop in parsing golang: html/template: backticks not treated as string delimiters golang: html/template: improper sanitization of CSS values golang: html/template: improper handling of JavaScript whitespace golang: html/template: improper handling of empty HTML attributes
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
7.3
null
null
RHSA-2013:0661
Red Hat Security Advisory: kernel security and bug fix update
kernel: race condition with PTRACE_SETREGS
[ "cpe:/o:redhat:rhel_eus:6.1" ]
null
null
null
null
RHSA-2024:4443
Red Hat Security Advisory: toolbox security update
go-yaml: Improve heuristics preventing CPU/memory abuse by parsing malicious or large YAML documents
[ "cpe:/a:redhat:rhel_eus:9.2::appstream" ]
null
7.5
null
null
RHSA-2025:1346
Red Hat Security Advisory: gcc security update
jquery: Untrusted code execution via <option> tag in HTML passed to DOM manipulation methods
[ "cpe:/a:redhat:enterprise_linux:9::appstream", "cpe:/a:redhat:enterprise_linux:9::crb", "cpe:/o:redhat:enterprise_linux:9::baseos" ]
null
6.1
null
null
RHSA-2010:0975
Red Hat Security Advisory: bind security update
bind: failure to clear existing RRSIG records when a NO DATA is negatively cached could DoS named bind: key algorithm rollover may mark secure answers as insecure
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
null
null
RHSA-2011:1249
Red Hat Security Advisory: Red Hat Enterprise MRG Grid 2.0 security, bug fix and enhancement update
cumin: broker username/password appears in the log file
[ "cpe:/a:redhat:enterprise_mrg:2::el5" ]
null
null
null
null
RHSA-2022:6182
Red Hat Security Advisory: Openshift Logging Security and Bug Fix update (5.3.11)
golang: compress/gzip: stack exhaustion in Reader.Read
[ "cpe:/a:redhat:logging:5.3::el8" ]
null
7.5
null
null
RHSA-2019:0975
Red Hat Security Advisory: container-tools:rhel8 security and bug fix update
runc: Execution of malicious containers allows for container escape and access to host filesystem
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
null
7.7
null
RHSA-2022:5242
Red Hat Security Advisory: vim security update
vim: Use of Out-of-range Pointer Offset in vim vim: Heap-based Buffer Overflow occurs in vim vim: use after free in utf_ptr2char vim: Out-of-range Pointer Offset vim: heap buffer overflow in vim_strncpy vim: buffer over-read in function find_next_quote
[ "cpe:/a:redhat:enterprise_linux:9::appstream", "cpe:/o:redhat:enterprise_linux:9::baseos" ]
null
7.8
7.3
null
RHSA-2022:1275
Red Hat Security Advisory: Red Hat OpenShift Service Mesh 2.1.2 security update
envoy: Null pointer dereference when using JWT filter safe_regex match envoy: Use-after-free when response filters increase response data envoy: Use-after-free when tunneling TCP over HTTP envoy: Incorrect configuration handling allows mTLS session re-use without re-validation envoy: Incorrect handling of internal redirects to routes with a direct response entry envoy: Stack exhaustion when a cluster is deleted via Cluster Discovery Service istio: unauthenticated control plane denial of service attack istio: Unauthenticated control plane denial of service attack due to stack exhaustion
[ "cpe:/a:redhat:service_mesh:2.1::el8" ]
null
7.5
null
null
RHSA-2023:2592
Red Hat Security Advisory: golang-github-cpuguy83-md2man security, bug fix, and enhancement update
golang: regexp/syntax: limit memory used by parsing regexps
[ "cpe:/a:redhat:enterprise_linux:9::crb" ]
null
6.5
null
null
RHSA-2023:3420
Red Hat Security Advisory: Red Hat JBoss Web Server 5.7.3 release and security update
openssl: timing attack in RSA Decryption implementation openssl: double free after calling PEM_read_bio_ex openssl: use-after-free following BIO_new_NDEF openssl: X.400 address type confusion in X.509 GeneralName
[ "cpe:/a:redhat:jboss_enterprise_web_server:5.7::el7", "cpe:/a:redhat:jboss_enterprise_web_server:5.7::el8", "cpe:/a:redhat:jboss_enterprise_web_server:5.7::el9" ]
null
7.4
null
null
RHSA-2015:1579
Red Hat Security Advisory: ceph-deploy security update
ceph-deploy: keyring permissions are world readable in ~ceph ceph-deploy admin command copies keyring file to /etc/ceph which is world readable
[ "cpe:/a:redhat:ceph_storage:1.2::ubuntu:14.04" ]
null
null
null
null
RHSA-2024:0093
Red Hat Security Advisory: nss security update
nss: timing attack against RSA decryption
[ "cpe:/a:redhat:rhel_eus:8.8::appstream" ]
null
6.5
null
null
RHSA-2015:0257
Red Hat Security Advisory: samba security update
samba: talloc free on uninitialized stack pointer in netlogon server could lead to remote-code execution
[ "cpe:/a:redhat:storage:2.1:server:el6" ]
null
null
null
null
RHSA-2022:8598
Red Hat Security Advisory: Red Hat Virtualization Host security update [ovirt-4.5.3-1]
libksba: integer overflow may lead to remote code execution bind: memory leak in ECDSA DNSSEC verification code bind: memory leaks in EdDSA DNSSEC verification code expat: a use-after-free in the doContent function in xmlparse.c device-mapper-multipath: Authorization bypass, multipathd daemon listens for client connections on an abstract Unix socket
[ "cpe:/o:redhat:rhev_hypervisor:4.4::el8" ]
null
7.8
null
null
RHSA-2022:4919
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.4.5 security update on RHEL 8
jackson-databind: denial of service via a large depth of nested objects netty-codec: Bzip2Decoder doesn't allow setting size restrictions for decompressed data netty-codec: SnappyFrameDecoder doesn't restrict chunk length and may buffer skippable chunks in an unnecessary way h2: Remote Code Execution in Console netty: control chars in header names may lead to HTTP request smuggling xnio: org.xnio.StreamConnection.notifyReadClosed log to debug instead of stderr jboss-client: memory leakage in remote client transaction wildfly: Wildfly management of EJB Session context returns wrong caller principal with Elytron Security enabled undertow: Double AJP response for 400 from EAP 7 results in CPING failures OpenJDK: Infinite loop related to incorrect handling of newlines in XMLEntityScanner (JAXP, 8270646) mysql-connector-java: Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Connectors h2: Loading of custom classes from remote servers through JNDI xerces-j2: infinite loop when handling specially crafted XML document payloads artemis-commons: Apache ActiveMQ Artemis DoS Moment.js: Path traversal in moment.locale
[ "cpe:/a:redhat:jboss_enterprise_application_platform:7.4::el8" ]
null
7.5
null
null
RHSA-2022:8641
Red Hat Security Advisory: krb5 security update
krb5: integer overflow vulnerabilities in PAC parsing
[ "cpe:/o:redhat:rhel_e4s:8.1::baseos" ]
null
8.8
null
null
RHSA-2011:1802
Red Hat Security Advisory: JBoss Enterprise Web Platform 5.1.2 update
extension): MITM due to improper validation of AX attribute signatures
[ "cpe:/a:redhat:jboss_enterprise_web_platform:5::el6" ]
null
null
null
null
RHSA-2020:2529
Red Hat Security Advisory: tomcat6 security update
tomcat: deserialization flaw in session persistence storage leading to RCE
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
7
null
null
RHSA-2020:0573
Red Hat Security Advisory: nodejs:10 security update
nodejs: Remotely trigger an assertion on a TLS server with a malformed certificate string nodejs: HTTP request smuggling using malformed Transfer-Encoding header nodejs: HTTP header values do not have trailing optional whitespace trimmed npm: Symlink reference outside of node_modules folder through the bin field upon installation npm: Arbitrary file write via constructed entry in the package.json bin field npm: Global node_modules Binary Overwrite
[ "cpe:/a:redhat:rhel_e4s:8.0::appstream" ]
null
4.8
null
null
RHSA-2017:0193
Red Hat Security Advisory: Red Hat JBoss Core Services Apache HTTP Server 2.4.23 Release on RHEL 6
openssl: Memory corruption in the ASN.1 encoder openssl: Possible integer overflow vulnerabilities in codebase openssl: Non-constant time codepath followed for certain operations in DSA implementation mod_cluster: Buffer overflow in mod_manager when sending request with long JVMRoute mod_jk: Buffer overflow when concatenating virtual host name and URI mod_cluster: Protocol parsing logic error
[ "cpe:/a:redhat:jboss_core_services:1::el6" ]
null
null
4.3
null
RHSA-2023:4496
Red Hat Security Advisory: thunderbird security update
thunderbird: File Extension Spoofing using the Text Direction Override Character Mozilla: Offscreen Canvas could have bypassed cross-origin restrictions Mozilla: Incorrect value used during WASM compilation Mozilla: Potential permissions request bypass via clickjacking Mozilla: Crash in DOMParser due to out-of-memory conditions Mozilla: Fix potential race conditions when releasing platform objects Mozilla: Stack buffer overflow in StorageManager Mozilla: Cookie jar overflow caused unexpected cookie jar state Mozilla: Memory safety bugs fixed in Firefox 116, Firefox ESR 115.1, Firefox ESR 102.14, Thunderbird 115.1, and Thunderbird 102.14 Mozilla: Memory safety bugs fixed in Firefox ESR 115.1, and Thunderbird 115.1
[ "cpe:/a:redhat:rhel_aus:8.2::appstream", "cpe:/a:redhat:rhel_e4s:8.2::appstream", "cpe:/a:redhat:rhel_tus:8.2::appstream" ]
null
9.8
null
null
RHSA-2023:6239
Red Hat Security Advisory: Kiali (Kiali 1.65.10) security update
HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack)
[ "cpe:/a:redhat:service_mesh:2.4::el8" ]
null
7.5
null
null
RHSA-2023:6738
Red Hat Security Advisory: java-21-openjdk security and bug fix update
OpenJDK: memory corruption issue on x86_64 with AVX-512 (8317121) OpenJDK: certificate path validation issue during client authentication (8309966)
[ "cpe:/a:redhat:enterprise_linux:9::appstream", "cpe:/a:redhat:enterprise_linux:9::crb" ]
null
5.3
null
null
RHSA-2022:6766
Red Hat Security Advisory: rh-python38-python security update
python: mailcap: findmatch() function does not sanitize the second argument python: int() type in PyLong_FromString() does not limit amount of digits converting text to int leading to DoS python: open redirection vulnerability in lib/http/server.py may lead to information disclosure
[ "cpe:/a:redhat:rhel_software_collections:3::el7" ]
null
7.4
null
null
RHSA-2022:1442
Red Hat Security Advisory: java-11-openjdk security update
OpenJDK: Unbounded memory allocation when compiling crafted XPath expressions (JAXP, 8270504) OpenJDK: Improper object-to-string conversion in AnnotationInvocationHandler (Libraries, 8277672) OpenJDK: Missing check for negative ObjectIdentifier (Libraries, 8275151) OpenJDK: Defective secure validation in Apache Santuario (Libraries, 8278008) OpenJDK: URI parsing inconsistencies (JNDI, 8278972)
[ "cpe:/a:redhat:enterprise_linux:8::appstream", "cpe:/a:redhat:enterprise_linux:8::crb" ]
null
5.3
null
null
RHSA-2024:0464
Red Hat Security Advisory: python-urllib3 security update
python-urllib3: Cookie request header isn't stripped during cross-origin redirects urllib3: Request body not stripped after redirect from 303 status changes request method to GET
[ "cpe:/o:redhat:enterprise_linux:9::baseos" ]
null
4.2
null
null
RHSA-2022:8453
Red Hat Security Advisory: device-mapper-multipath security update
device-mapper-multipath: Regression of CVE-2022-41974 fix in Red Hat Enterprise Linux
[ "cpe:/a:redhat:enterprise_linux:9::crb", "cpe:/o:redhat:enterprise_linux:9::baseos" ]
null
8.4
null
null
RHSA-2011:0896
Red Hat Security Advisory: JBoss Enterprise Web Server 1.0.2 update
openssl: NETSCAPE_REUSE_CIPHER_CHANGE_BUG downgrade-to-disabled ciphersuite attack openssl: missing bn_wexpand return value checks expat: buffer over-read and crash in big2_toUtf8() on XML with malformed UTF-8 sequences expat: buffer over-read and crash on XML with malformed UTF-8 sequences OpenLDAP: Doesn't properly handle NULL character in subject Common Name tomcat: information disclosure in authentication headers mod_dav: DoS (httpd child process crash) by parsing URI structure with missing path segments apr-util: high memory consumption in apr_brigade_split_line() (mod_proxy): Sensitive response disclosure due improper handling of timeouts tomcat: file permission bypass flaw tomcat: cross-site-scripting vulnerability in the manager application openssl: NETSCAPE_REUSE_CIPHER_CHANGE_BUG ciphersuite downgrade attack tomcat: XSS vulnerability in HTML Manager interface apr: unconstrained recursion in apr_fnmatch httpd: mod_proxy_ajp worker moved to error state when timeout exceeded
[ "cpe:/a:redhat:jboss_enterprise_web_server:1.0" ]
null
null
null
null
RHSA-2006:0582
Red Hat Security Advisory: kdebase security fix
security flaw
[ "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws" ]
null
null
null
null
RHSA-2019:1487
Red Hat Security Advisory: kernel-rt security and bug fix update
kernel: race condition in snd_seq_write() may lead to UAF or OOB-access kernel: Race condition in sound system can lead to denial of service Kernel: tcp: integer overflow while processing SACK blocks allows remote denial of service Kernel: tcp: excessive resource consumption while processing SACK blocks allows remote denial of service kernel: tcp: excessive resource consumption for TCP connections with low MSS allows remote denial of service
[ "cpe:/a:redhat:enterprise_mrg:2:server:el6" ]
null
null
5.3
null
RHSA-2020:0431
Red Hat Security Advisory: ksh security update
ksh: certain environment variables interpreted as arithmetic expressions on startup, leading to code injection
[ "cpe:/a:redhat:rhel_e4s:8.0::appstream" ]
null
7.4
null
null
RHSA-2024:3139
Red Hat Security Advisory: squashfs-tools security update
squashfs-tools: unvalidated filepaths allow writing outside of destination squashfs-tools: possible Directory Traversal via symbolic link
[ "cpe:/o:redhat:enterprise_linux:8::baseos" ]
null
8.1
null
null
RHSA-2009:1179
Red Hat Security Advisory: bind security update
bind: DoS (assertion failure) via nsupdate packets
[ "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::client_workstation", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
RHSA-2010:0922
Red Hat Security Advisory: Red Hat Enterprise MRG Messaging and Grid security update
plugin: enable QUEUE_ALL_USERS_TRUSTED for Submit/Hold/Release/Remove ops
[ "cpe:/a:redhat:enterprise_mrg:1.0::el4" ]
null
null
null
null
RHSA-2022:8494
Red Hat Security Advisory: grub2 security update
grub2: Buffer overflow in grub_font_construct_glyph() can lead to out-of-bound write and possible secure boot bypass grub2: Heap based out-of-bounds write when redering certain unicode sequences
[ "cpe:/o:redhat:rhel_e4s:8.1::baseos" ]
null
7.1
null
null
RHSA-2019:3877
Red Hat Security Advisory: kernel security update
hw: Intel GPU blitter manipulation can allow for arbitrary kernel memory write
[ "cpe:/o:redhat:rhel_aus:7.4::server", "cpe:/o:redhat:rhel_e4s:7.4::server", "cpe:/o:redhat:rhel_tus:7.4::server" ]
null
null
8.8
null
RHSA-2008:0224
Red Hat Security Advisory: thunderbird security update
Firefox JavaScript garbage collection crash
[ "cpe:/a:redhat:rhel_productivity:5", "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws", "cpe:/o:redhat:enterprise_linux:5::client" ]
null
null
null
null
RHSA-2023:1444
Red Hat Security Advisory: firefox security update
nss: Arbitrary memory write via PKCS 12 Mozilla: Incorrect code generation during JIT compilation Mozilla: Potential out-of-bounds when accessing throttled streams Mozilla: Invalid downcast in Worklets Mozilla: URL being dragged from a removed cross-origin iframe into the same tab triggered navigation Mozilla: Memory safety bugs fixed in Firefox 111 and Firefox ESR 102.9
[ "cpe:/a:redhat:rhel_eus:8.4::appstream" ]
null
8.8
null
null
RHSA-2025:3453
Red Hat Security Advisory: Red Hat JBoss Core Services Apache HTTP Server 2.4.62 security update
expat: parsing large tokens can trigger a denial of service openssl: SSL_select_next_proto buffer overread mod_http2: DoS by null pointer in websocket over HTTP/2 libexpat: Negative Length Parsing Vulnerability in libexpat libxml2: Use-After-Free in libxml2 libxml2: Stack-based buffer overflow in xmlSnprintfElements of libxml2
[ "cpe:/a:redhat:jboss_core_services:1" ]
null
7.8
5.9
null
RHSA-2022:0565
Red Hat Security Advisory: OpenShift Container Platform 4.6.55 packages and security update
jenkins: no POST request is required for the endpoint handling manual build requests which could result in CSRF jenkins-2-plugins/docker-commons: does not sanitize the name of an image or a tag which could result in an OS command execution
[ "cpe:/a:redhat:openshift:4.6::el7", "cpe:/a:redhat:openshift:4.6::el8" ]
null
8.8
null
null
RHSA-2022:8868
Red Hat Security Advisory: Red Hat OpenStack Platform 16.1.9 (python-scciclient) security update
python-scciclient: missing server certificate verification
[ "cpe:/a:redhat:openstack:16.1::el8" ]
null
7.4
null
null
RHSA-2025:3490
Red Hat Security Advisory: Satellite 6.16.4 Async Update
graphql-ruby: Remote code execution when loading a crafted GraphQL schema rack: rubygem-rack: Local File Inclusion in Rack::Static
[ "cpe:/a:redhat:satellite:6.16::el8", "cpe:/a:redhat:satellite:6.16::el9", "cpe:/a:redhat:satellite_capsule:6.16::el8", "cpe:/a:redhat:satellite_capsule:6.16::el9", "cpe:/a:redhat:satellite_maintenance:6.16::el8", "cpe:/a:redhat:satellite_maintenance:6.16::el9", "cpe:/a:redhat:satellite_utils:6.16::el8", "cpe:/a:redhat:satellite_utils:6.16::el9" ]
null
7.5
null
null
RHSA-2013:0512
Red Hat Security Advisory: httpd security, bug fix, and enhancement update
httpd: mod_negotiation XSS via untrusted file names in directories with MultiViews enabled httpd: mod_negotiation XSS via untrusted file names in directories with MultiViews enabled httpd: mod_proxy_ajp worker moved to error state when timeout exceeded
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
null
null
RHSA-2021:4103
Red Hat Security Advisory: OpenShift Virtualization 4.9.0 RPMs security and bug fix update
golang: data race in certain net/http servers including ReverseProxy can lead to DoS golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs golang: crypto/elliptic: incorrect operations on the P-224 curve golang: net/http: panic in ReadRequest and ReadResponse when reading a very large header
[ "cpe:/a:redhat:container_native_virtualization:4.9::el7", "cpe:/a:redhat:container_native_virtualization:4.9::el8" ]
null
5.9
null
null
RHSA-2024:1832
Red Hat Security Advisory: squid:4 security update
squid: Denial of Service in HTTP Chunked Decoding squid: denial of service in HTTP header parser
[ "cpe:/a:redhat:rhel_aus:8.4::appstream", "cpe:/a:redhat:rhel_e4s:8.4::appstream", "cpe:/a:redhat:rhel_tus:8.4::appstream" ]
null
8.6
null
null
RHSA-2014:0624
Red Hat Security Advisory: openssl security update
openssl: SSL/TLS MITM vulnerability
[ "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::client_workstation", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
RHSA-2011:0328
Red Hat Security Advisory: subversion security update
(mod_dav_svn): DoS (NULL ptr deref) by a lock token sent from a not authenticated Subversion client
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
null
null
RHSA-2012:1068
Red Hat Security Advisory: openjpeg security update
openjpeg: Heap memory corruption leading to invalid free by processing certain Gray16 TIFF images openjpeg: heap-based buffer overflow when processing JPEG2000 image files
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
null
null
RHSA-2023:4341
Red Hat Security Advisory: Logging Subsystem 5.7.4 - Red Hat OpenShift bug fix and security update
nodejs-semver: Regular expression denial of service rubygem-activesupport: Regular Expression Denial of Service
[ "cpe:/a:redhat:logging:5.7::el8" ]
null
7.5
null
null
RHSA-2018:1216
Red Hat Security Advisory: kernel security and bug fix update
hw: cpu: speculative execution branch target injection kernel: Use-after-free vulnerability in DCCP socket
[ "cpe:/o:redhat:rhel_aus:7.2::server", "cpe:/o:redhat:rhel_e4s:7.2::server", "cpe:/o:redhat:rhel_tus:7.2::server" ]
null
null
7.8
null
RHSA-2025:3848
Red Hat Security Advisory: java-11-openjdk ELS security update
openjdk: Better TLS connection support (Oracle CPU 2025-04) openjdk: Improve compiler transformations (Oracle CPU 2025-04) openjdk: Enhance Buffered Image handling (Oracle CPU 2025-04)
[ "cpe:/a:redhat:openjdk_els:11::el7", "cpe:/a:redhat:openjdk_els:11::el8", "cpe:/a:redhat:openjdk_els:11::el9" ]
null
5.6
null
null
RHSA-2021:2657
Red Hat Security Advisory: linuxptp security update
linuxptp: missing length check of forwarded messages
[ "cpe:/a:redhat:rhel_eus:8.2::appstream" ]
null
8.8
null
null
RHSA-2024:6928
Red Hat Security Advisory: Red Hat JBoss Core Services Apache HTTP Server 2.4.57 SP6 security update
httpd: HTTP response splitting httpd: SSRF in Apache HTTP Server on Windows httpd: SSRF in Apache HTTP Server on Windows via mod_rewrite in server/vhost context mod_jk: information Disclosure / DoS
[ "cpe:/a:redhat:jboss_core_services:1" ]
null
5.9
null
null
RHSA-2021:0945
Red Hat Security Advisory: Red Hat Build of OpenJDK 11 (container images) release and security update
containers/openjdk: /etc/passwd is given incorrect privileges
[ "cpe:/a:redhat:openjdk:11" ]
null
7
null
null
RHSA-2023:0300
Red Hat Security Advisory: kernel-rt security and bug fix update
kernel: watch queue race condition can lead to privilege escalation kernel: memory corruption in AX88179_178A based USB ethernet device. kernel: i2c: unbounded length leads to buffer overflow in ismt_access() kernel: i915: Incorrect GPU TLB flush can lead to random memory access kernel: Unprivileged users may use PTRACE_SEIZE to set PTRACE_O_SUSPEND_SECCOMP option kernel: nfsd buffer overflow by RPC message over TCP with garbage data
[ "cpe:/a:redhat:enterprise_linux:9::nfv", "cpe:/a:redhat:enterprise_linux:9::realtime" ]
null
7.5
null
null
RHSA-2023:7573
Red Hat Security Advisory: firefox security update
Mozilla: Out-of-bound memory access in WebGL2 blitFramebuffer Mozilla: Use-after-free in MessagePort::Entangled Mozilla: Clickjacking permission prompts using the fullscreen transition Mozilla: Use-after-free in ReadableByteStreamQueueEntry::Buffer Mozilla: Using Selection API would copy contents into X11 primary selection. Mozilla: Incorrect parsing of relative URLs starting with "///" Mozilla: Memory safety bugs fixed in Firefox 120, Firefox ESR 115.5, and Thunderbird 115.5
[ "cpe:/a:redhat:rhel_aus:8.2::appstream", "cpe:/a:redhat:rhel_e4s:8.2::appstream", "cpe:/a:redhat:rhel_tus:8.2::appstream" ]
null
8.8
null
null
RHSA-2011:1334
Red Hat Security Advisory: JBoss Enterprise SOA Platform 5.1.0 security update
Security: Chosen commands execution on the server (Framework) or authentication token bypass (Security) by objects de-serialization
[ "cpe:/a:redhat:jboss_soa_platform:5.1" ]
null
null
null
null
RHSA-2014:0581
Red Hat Security Advisory: python-django-horizon security update
openstack-horizon: XSS in Horizon orchestration dashboard when using a malicious template
[ "cpe:/a:redhat:openstack:4::el6" ]
null
null
null
null
RHSA-2023:5589
Red Hat Security Advisory: kernel security and bug fix update
kernel: use-after-free in l2cap_connect and l2cap_le_connect_req in net/bluetooth/l2cap_core.c kernel: net/sched: Use-after-free vulnerabilities in the net/sched classifiers: cls_fw, cls_u32 and cls_route
[ "cpe:/o:redhat:rhel_aus:8.2::baseos", "cpe:/o:redhat:rhel_e4s:8.2::baseos", "cpe:/o:redhat:rhel_tus:8.2::baseos" ]
null
7.8
null
null
RHSA-2023:5439
Red Hat Security Advisory: thunderbird security update
firefox: use-after-free in workers Mozilla: Out-of-bounds write in PathOps Mozilla: Use-after-free in Ion Compiler Mozilla: Memory safety bugs fixed in Firefox 118, Firefox ESR 115.3, and Thunderbird 115.3 libvpx: Heap buffer overflow in vp8 encoding in libvpx
[ "cpe:/a:redhat:rhel_eus:9.0::appstream" ]
null
8.8
null
null
RHSA-2017:3369
Red Hat Security Advisory: qemu-kvm-rhev security and bug fix update
Qemu: exec: oob access during dma operation Qemu: i386: multiboot OOB access while loading kernel image Qemu: cirrus: OOB access issue in mode4and5 write functions
[ "cpe:/o:redhat:enterprise_linux:7::hypervisor" ]
null
null
4.4
null
RHSA-2021:2214
Red Hat Security Advisory: firefox security update
Mozilla: Memory safety bugs fixed in Firefox 89 and Firefox ESR 78.11
[ "cpe:/a:redhat:rhel_eus:8.1::appstream" ]
null
8.8
null
null
RHSA-2010:0172
Red Hat Security Advisory: rhev-hypervisor security and bug fix update
KVM: Check cpl before emulating debug register access kernel: sctp remote denial of service kvm-userspace-rhel5: usb-linux.c: fix buffer overflow kvm: emulator privilege escalation segment selector check
[ "cpe:/o:redhat:enterprise_linux:5::hypervisor" ]
null
null
null
null
RHSA-2020:5434
Red Hat Security Advisory: targetcli security update
targetcli: weak permissions for /etc/target and backup files
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
5.5
null
null
RHSA-2020:0577
Red Hat Security Advisory: thunderbird security update
Mozilla: Message ID calculation was based on uninitialized data Mozilla: Out-of-bounds read when processing certain email messages Mozilla: Setting a master password post-Thunderbird 52 does not delete unencrypted previously stored passwords Mozilla: Crash processing S/MIME messages with multiple signatures Mozilla: Incorrect parsing of template tag could result in JavaScript injection Mozilla: Memory safety bugs fixed in Firefox 73 and Firefox ESR 68.5
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
8.8
6.1
null
RHSA-2023:4069
Red Hat Security Advisory: firefox security update
Mozilla: Use-after-free in WebRTC certificate generation Mozilla: Potential use-after-free from compartment mismatch in SpiderMonkey Mozilla: Fullscreen notification obscured Mozilla: Lack of warning when opening Diagcab files Mozilla: Memory safety bugs fixed in Firefox 115, Firefox ESR 102.13, and Thunderbird 102.13
[ "cpe:/a:redhat:rhel_eus:8.6::appstream" ]
null
8.8
null
null
RHSA-2021:4044
Red Hat Security Advisory: flatpak security update
flatpak: Sandbox bypass via recent VFS-manipulating syscalls
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
8.8
null
null
RHSA-2023:1803
Red Hat Security Advisory: thunderbird security update
Thunderbird: Revocation status of S/Mime recipient certificates was not checked Mozilla: Memory Corruption in Safe Browsing Code Mozilla: libwebp: Double-free in libwebp Mozilla: Matrix SDK bundled with Thunderbird vulnerable to denial-of-service attack Thunderbird: Hang when processing certain OpenPGP messages Mozilla: Fullscreen notification obscured Mozilla: Potential Memory Corruption following Garbage Collector compaction Mozilla: Invalid free from JavaScript code Mozilla: Content-Disposition filename truncation leads to Reflected File Download Mozilla: Files with malicious extensions could have been downloaded unsafely on Linux Mozilla: Incorrect optimization result on ARM64 Mozilla: Memory safety bugs fixed in Firefox 112 and Firefox ESR 102.10
[ "cpe:/a:redhat:rhel_e4s:8.1::appstream" ]
null
8.8
null
null
RHSA-2018:2425
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.1 security update
cxf: Improper size validation in message attachment header for JAX-WS and JAX-RS services apache-cxf: TLS hostname verification does not work correctly with com.sun.net.ssl.* guava: Unbounded memory allocation in AtomicDoubleArray and CompoundOrdering classes allow remote attackers to cause a denial of service wildfly-core: Path traversal can allow the extraction of .war archives to write arbitrary files (Zip Slip) bouncycastle: flaw in the low-level interface to RSA key pair generator
[ "cpe:/a:redhat:jboss_enterprise_application_platform:7.1" ]
null
null
4.8
null
RHSA-2022:8861
Red Hat Security Advisory: Red Hat OpenStack Platform 16.1.9 (numpy) security update
numpy: NULL pointer dereference in numpy.sort in in the PyArray_DescrNew() due to missing return-value validation
[ "cpe:/a:redhat:openstack:16.1::el8" ]
null
7.5
null
null
RHSA-2021:4799
Red Hat Security Advisory: OpenShift Container Platform 4.6.51 packages and security update
jenkins: FilePath#mkdirs does not check permission to create parent directories jenkins: File path filters do not canonicalize paths, allowing operations to follow symbolic links to outside allowed directories jenkins: FilePath#untar does not check permission to create symbolic links when unarchiving a symbolic link jenkins: FilePath#reading(FileVisitor) does not reject any operations allowing users to have unrestricted read access jenkins: FilePath#unzip and FilePath#untar were not subject to any access control jenkins: Agent processes are able to completely bypass file path filtering by wrapping the file operation in an agent file path jenkins: Creating symbolic links is possible without the symlink permission jenkins: The operations FilePath#renameTo and FilePath#moveAllChildrenTo only check read permission on the source path jenkins: When creating temporary files, permission to create files is only checked after they’ve been created. jenkins: FilePath#toURI, FilePath#hasSymlink, FilePath#absolutize, FilePath#isDescendant, and FilePath#get*DiskSpace do not check any permissions jenkins: FilePath#listFiles lists files outside directories with agent read access when following symbolic links. jenkins: Agent-to-controller access control allowed writing to sensitive directory used by Pipeline: Shared Groovy Libraries Plugin jenkins: Agent-to-controller access control allows reading/writing most content of build directories jenkins-2-plugins/subversion: does not restrict the name of a file when looking up a subversion key
[ "cpe:/a:redhat:openshift:4.6::el7", "cpe:/a:redhat:openshift:4.6::el8" ]
null
7.5
null
null
RHSA-2023:7392
Red Hat Security Advisory: c-ares security update
c-ares: Buffer Underwrite in ares_inet_net_pton()
[ "cpe:/o:redhat:rhel_eus:8.6::baseos" ]
null
5.7
null
null
RHSA-2021:0974
Red Hat Security Advisory: Red Hat Single Sign-On 7.4.6 security update
nodejs-angular: XSS due to regex-based HTML replacement guava: local information disclosure via temporary directory created with unsafe permissions keycloak: reusable "state" parameter at redirect_uri endpoint enables possibility of replay attacks bouncycastle: password bypass in OpenBSDBCrypt.checkPassword utility possible jboss-remoting: Threads hold up forever in the EJB server by suppressing the ack from an EJB client undertow: Possible regression in fix for CVE-2020-10687 wildfly: Information disclosure due to publicly accessible privileged actions in JBoss EJB Client
[ "cpe:/a:redhat:red_hat_single_sign_on:7" ]
null
4.3
4.8
null
RHSA-2020:3100
Red Hat Security Advisory: java-1.8.0-openjdk security update
OpenJDK: Incorrect handling of access control context in ForkJoinPool (Libraries, 8237117) OpenJDK: HostnameChecker does not ensure X.509 certificate names are in normalized form (JSSE, 8237592) OpenJDK: Unexpected exception raised by DerInputStream (Libraries, 8237731) OpenJDK: Unexpected exception raised by DerValue.equals() (Libraries, 8237736) OpenJDK: Bypass of boundary checks in nio.Buffer via concurrent access (Libraries, 8238920) OpenJDK: Incomplete bounds checks in Affine Transformations (2D, 8240119) OpenJDK: XML validation manipulation due to incomplete application of the use-grammar-pool-only feature (JAXP, 8242136)
[ "cpe:/a:redhat:rhel_e4s:8.0::appstream" ]
null
5.3
null
null
RHSA-2019:1223
Red Hat Security Advisory: Red Hat Satellite Tools security update
katello-installer-base: QMF methods exposed to goferd via qdrouterd
[ "cpe:/a:redhat:rhel_satellite_tools:6.5::el5", "cpe:/a:redhat:rhel_satellite_tools:6.5::el6", "cpe:/a:redhat:rhel_satellite_tools:6.5::el7", "cpe:/a:redhat:rhel_satellite_tools:6.5::el8", "cpe:/o:redhat:enterprise_linux:7::hypervisor" ]
null
null
8
null
RHSA-2024:1567
Red Hat Security Advisory: OpenShift Container Platform 4.14.19 security update
golang-fips/openssl: Memory leaks in code encrypting and decrypting RSA payloads jose-go: improper handling of highly compressed data
[ "cpe:/a:redhat:openshift:4.14::el8", "cpe:/a:redhat:openshift:4.14::el9" ]
null
4.3
null
null
RHSA-2022:4796
Red Hat Security Advisory: nodejs:16 security update
npm: npm ci succeeds when package-lock.json doesn't match package.json
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
9.8
null
null
RHSA-2018:0805
Red Hat Security Advisory: glibc security, bug fix, and enhancement update
glibc: denial of service in getnetbyname function glibc: DNS resolver NULL pointer dereference with crafted record type glibc: Fragmentation attacks possible when EDNS0 is enabled glibc: Buffer overflow in glob with GLOB_TILDE glibc: Buffer overflow during unescaping of user names with the ~ operator glibc: realpath() buffer underflow when getcwd() returns relative path allows privilege escalation
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
7
null
RHSA-2019:1169
Red Hat Security Advisory: kernel security and bug fix update
hardware: Microarchitectural Store Buffer Data Sampling (MSBDS) hardware: Micro-architectural Load Port Data Sampling - Information Leak (MLPDS) hardware: Microarchitectural Fill Buffer Data Sampling (MFBDS) hardware: Microarchitectural Data Sampling Uncacheable Memory (MDSUM)
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
3.8
null
RHSA-2023:4702
Red Hat Security Advisory: subscription-manager security update
subscription-manager: inadequate authorization of com.redhat.RHSM1 D-Bus interface allows local users to modify configuration
[ "cpe:/a:redhat:rhel_e4s:8.1::appstream", "cpe:/o:redhat:rhel_e4s:8.1::baseos" ]
null
7.8
null
null
RHSA-2024:9976
Red Hat Security Advisory: RHOSP 17.1.4 (python-werkzeug) security update
python-werkzeug: user may execute code on a developer's machine
[ "cpe:/a:redhat:openstack:17.1::el9" ]
null
7.5
null
null
RHSA-2020:1523
Red Hat Security Advisory: rh-maven35-jackson-databind security update
jackson-databind: Serialization gadgets in org.aoju.bus.proxy.provider.*.RmiProvider jackson-databind: Serialization gadgets in javax.swing.JEditorPane jackson-databind: Serialization gadgets in org.apache.activemq.jms.pool.XaPooledConnectionFactory jackson-databind: Serialization gadgets in org.apache.commons.proxy.provider.remoting.RmiProvider jackson-databind: Serialization gadgets in org.apache.openjpa.ee.WASRegistryManagedRuntime
[ "cpe:/a:redhat:rhel_software_collections:3::el7" ]
null
8.1
null
null
RHSA-2024:10175
Red Hat Security Advisory: Red Hat build of Keycloak 24.0.9 Images Update
org.keycloak/keycloak-quarkus-server: Keycloak proxy header handling Denial-of-Service (DoS) vulnerability keycloak-core: mTLS passthrough org.keycloak:keycloak-services: Keycloak Denial of Service org.keycloak:keycloak-quarkus-server: Sensitive Data Exposure in Keycloak Build Process keycloak-quarkus-server: Keycloak path trasversal
[ "cpe:/a:redhat:build_keycloak:24::el9" ]
null
5.9
2.7
null
RHSA-2021:0304
Red Hat Security Advisory: flatpak security update
flatpak: sandbox escape via spawn portal
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
8.8
null
null
RHSA-2013:1182
Red Hat Security Advisory: 389-ds-base security update
389-ds-base: ns-slapd crash due to bogus DN
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
null
null
RHSA-2010:0718
Red Hat Security Advisory: kernel security update
kernel: 64-bit Compatibility Mode Stack Pointer Underflow
[ "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws" ]
null
null
null
null
RHSA-2022:4772
Red Hat Security Advisory: thunderbird security update
Mozilla: Untrusted input used in JavaScript object indexing, leading to prototype pollution Mozilla: Prototype pollution in Top-Level Await implementation
[ "cpe:/a:redhat:enterprise_linux:9::appstream" ]
null
null
8.8
null
RHSA-2020:0006
Red Hat Security Advisory: java-1.8.0-ibm security update
OpenJDK: Missing restrictions on use of custom SocketImpl (Networking, 8218573) OpenJDK: NULL pointer dereference in DrawGlyphList (2D, 8222690) OpenJDK: Unexpected exception thrown by Pattern processing crafted regular expression (Concurrency, 8222684) OpenJDK: Unexpected exception thrown by XPathParser processing crafted XPath expression (JAXP, 8223505) OpenJDK: Unexpected exception thrown during regular expression processing in Nashorn (Scripting, 8223518) OpenJDK: Incorrect handling of nested jar: URLs in Jar URL handler (Networking, 8223892) OpenJDK: Unexpected exception thrown by XPath processing crafted XPath expression (JAXP, 8224532) OpenJDK: Unexpected exception thrown during Font object deserialization (Serialization, 8224915) OpenJDK: Integer overflow in bounds check in SunGraphics2D (2D, 8225292) OpenJDK: Incorrect handling of HTTP proxy responses in HttpURLConnection (Networking, 8225298) OpenJDK: Excessive memory allocation in CMap when reading TrueType font (2D, 8225597) JDK: unspecified vulnerability fixed in 8u221 (Deployment) OpenJDK: Insufficient filtering of HTML event attributes in Javadoc (Javadoc, 8226765) JDK: Unrestricted access to diagnostic operations
[ "cpe:/a:redhat:network_satellite:5.8::el6" ]
null
null
8.4
null