id
stringlengths
13
15
title
stringlengths
29
176
description
stringlengths
8
32.1k
cpes
sequencelengths
0
20
cvss_v4_0
null
cvss_v3_1
float64
0
10
cvss_v3_0
float64
0
10
cvss_v2_0
null
RHSA-2022:8850
Red Hat Security Advisory: Red Hat OpenStack Platform 16.2.4 (python-ujson) security update
python-ujson: improper decoding of escaped surrogate characters may lead to string corruption, key confusion or value overwriting python-ujson: Potential double free of buffer during string decoding
[ "cpe:/a:redhat:openstack:16.2::el8" ]
null
5.9
null
null
RHSA-2024:10948
Red Hat Security Advisory: Red Hat OpenShift distributed tracing platform (Tempo) 3.4 release
opa: OPA SMB Force-Authentication
[ "cpe:/a:redhat:openshift_distributed_tracing:3.4::el8" ]
null
6.1
null
null
RHSA-2024:0004
Red Hat Security Advisory: thunderbird security update
Mozilla: Heap-buffer-overflow affecting WebGL <code>DrawElementsInstanced</code> method with Mesa VM driver Mozilla: Symlinks may resolve to smaller than expected buffers Mozilla: Heap buffer overflow in <code>nsTextFragment</code> Mozilla: Use-after-free in PR_GetIdentitiesLayer Mozilla: Potential sandbox escape due to <code>VideoBridge</code> lack of texture validation Mozilla: Heap buffer overflow affected <code>nsWindow::PickerOpen(void)</code> in headless mode Mozilla: Use-after-free in <code>nsDNSService</code> Mozilla: Undefined behavior in <code>ShutdownObserver()</code> Mozilla: Memory safety bugs fixed in Firefox 121, Firefox ESR 115.6, and Thunderbird 115.6 Mozilla: S/MIME signature accepted despite mismatching message date Mozilla: Truncated signed text was shown with a valid OpenPGP signature
[ "cpe:/a:redhat:rhel_eus:8.8::appstream" ]
null
7.5
null
null
RHSA-2004:050
Red Hat Security Advisory: mutt security update
security flaw
[ "cpe:/o:redhat:enterprise_linux:3::as", "cpe:/o:redhat:enterprise_linux:3::desktop", "cpe:/o:redhat:enterprise_linux:3::es", "cpe:/o:redhat:enterprise_linux:3::ws" ]
null
null
null
null
RHSA-2023:5434
Red Hat Security Advisory: firefox security update
firefox: use-after-free in workers Mozilla: Out-of-bounds write in PathOps Mozilla: Use-after-free in Ion Compiler Mozilla: Memory safety bugs fixed in Firefox 118, Firefox ESR 115.3, and Thunderbird 115.3 libvpx: Heap buffer overflow in vp8 encoding in libvpx
[ "cpe:/a:redhat:enterprise_linux:9::appstream" ]
null
8.8
null
null
RHSA-2021:2758
Red Hat Security Advisory: nettle security update
nettle: Out of bounds memory access in signature verification
[ "cpe:/o:redhat:rhel_aus:7.4::server", "cpe:/o:redhat:rhel_e4s:7.4::server", "cpe:/o:redhat:rhel_tus:7.4::server" ]
null
8.1
null
null
RHSA-2024:4479
Red Hat Security Advisory: OpenShift Container Platform 4.14.33 bug fix and security update
ssh: Prefix truncation attack on Binary Packet Protocol (BPP) go-retryablehttp: url might write sensitive information to log file openssh: regreSSHion - race condition in SSH allows RCE/DoS
[ "cpe:/a:redhat:openshift:4.14::el8", "cpe:/a:redhat:openshift:4.14::el9" ]
null
8.1
null
null
RHSA-2022:1326
Red Hat Security Advisory: thunderbird security update
Mozilla: Use-after-free in NSSToken objects Mozilla: Use-after-free after VR Process destruction Mozilla: OpenPGP revocation information was ignored Mozilla: Denial of Service via complex regular expressions Mozilla: Out of bounds write due to unexpected WebAuthN Extensions Mozilla: Use-after-free in DocumentL10n::TranslateDocument Mozilla: Incorrect AliasSet used in JIT Codegen Mozilla: iframe contents could be rendered outside the border Mozilla: Memory safety bugs fixed in Firefox 99 and Firefox ESR 91.8
[ "cpe:/a:redhat:rhel_eus:8.2::appstream" ]
null
8.8
6.1
null
RHSA-2022:1070
Red Hat Security Advisory: expat security update
expat: Malformed 2- and 3-byte UTF-8 sequences can lead to arbitrary code execution expat: Namespace-separator characters in "xmlns[:prefix]" attribute values can lead to arbitrary code execution expat: Integer overflow in storeRawNames()
[ "cpe:/o:redhat:rhel_eus:8.2::baseos" ]
null
9.8
null
null
RHSA-2025:1138
Red Hat Security Advisory: firefox security update
firefox: thunderbird: Use-after-free in XSLT firefox: thunderbird: Use-after-free in Custom Highlight firefox: thunderbird: A bug in WebAssembly code generation could result in a crash firefox: thunderbird: Use-after-free during concurrent delazification firefox: thunderbird: Potential opening of private browsing tabs in normal browsing windows firefox: thunderbird: Certificate length was not properly checked firefox: thunderbird: Memory safety bugs fixed in Firefox 135, Thunderbird 135, Firefox ESR 115.20, Firefox ESR 128.7, Thunderbird 115.20, and Thunderbird 128.7 firefox: thunderbird: Memory safety bugs fixed in Firefox 135, Thunderbird 135, Firefox ESR 128.7, and Thunderbird 128.7
[ "cpe:/a:redhat:rhel_e4s:9.0::appstream" ]
null
8.8
null
null
RHSA-2025:0364
Red Hat Security Advisory: OpenShift Container Platform 4.14.45 bug fix and security update
python: Path traversal on tempfile.TemporaryDirectory golang.org/x/net/html: Non-linear parsing of case-insensitive content in golang.org/x/net/html
[ "cpe:/a:redhat:openshift:4.14::el8", "cpe:/a:redhat:openshift:4.14::el9" ]
null
7.5
null
null
RHSA-2019:1604
Red Hat Security Advisory: firefox security update
Mozilla: Type confusion in Array.pop Mozilla: Sandbox escape using Prompt:Open
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
10
null
RHSA-2017:1264
Red Hat Security Advisory: kdelibs security update
kauth: service invoking dbus is not properly checked and allows local privilege escalation
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
7.8
null
RHSA-2023:6118
Red Hat Security Advisory: OpenShift API for Data Protection security update
golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487) HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack)
[ "cpe:/a:redhat:openshift_api_data_protection:1.2::el8" ]
null
7.5
null
null
RHSA-2024:8033
Red Hat Security Advisory: firefox security update
firefox: Use-after-free in Animation timeline (128.3.1 ESR Chemspill)
[ "cpe:/a:redhat:rhel_eus:8.8::appstream" ]
null
9.8
null
null
RHSA-2015:2383
Red Hat Security Advisory: pacemaker security, bug fix, and enhancement update
pacemaker: acl read-only access allow role assignment
[ "cpe:/o:redhat:enterprise_linux:7::server" ]
null
null
null
null
RHSA-2020:3118
Red Hat Security Advisory: samba security update
samba: NULL pointer de-reference and use-after-free in Samba AD DC LDAP Server with ASQ, VLV and paged_results
[ "cpe:/a:redhat:storage:3.5:samba:el7" ]
null
0
null
null
RHSA-2024:6418
Red Hat Security Advisory: bubblewrap and flatpak security update
flatpak: Access to files outside sandbox for apps using persistent= (--persist)
[ "cpe:/a:redhat:rhel_aus:8.4::appstream", "cpe:/a:redhat:rhel_e4s:8.4::appstream", "cpe:/a:redhat:rhel_tus:8.4::appstream", "cpe:/o:redhat:rhel_aus:8.4::baseos", "cpe:/o:redhat:rhel_e4s:8.4::baseos", "cpe:/o:redhat:rhel_tus:8.4::baseos" ]
null
7.4
null
null
RHSA-2018:3324
Red Hat Security Advisory: fuse security update
fuse: bypass of the "user_allow_other" restriction when SELinux is active
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
5.3
null
RHSA-2018:3400
Red Hat Security Advisory: libvirt security update
hw: cpu: speculative store bypass
[ "cpe:/o:redhat:rhel_aus:6.6::server", "cpe:/o:redhat:rhel_tus:6.6::server" ]
null
null
5.6
null
RHSA-2014:1322
Red Hat Security Advisory: Red Hat JBoss Enterprise Web Platform 5.2.0 security update
CXF: SSL hostname verification bypass, incomplete CVE-2012-5783 fix CXF: SSL hostname verification bypass, incomplete CVE-2012-6153 fix
[ "cpe:/a:redhat:jboss_enterprise_web_platform:5.2.0" ]
null
null
4.8
null
RHSA-2023:5005
Red Hat Security Advisory: OpenShift Container Platform 4.14.0 security and extras update
golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487)
[ "cpe:/a:redhat:openshift:4.14::el8" ]
null
7.5
null
null
RHSA-2022:7024
Red Hat Security Advisory: firefox security update
expat: a use-after-free in the doContent function in xmlparse.c
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
8.1
null
null
RHSA-2009:1615
Red Hat Security Advisory: xerces-j2 security update
JDK: XML parsing Denial-Of-Service (6845701)
[ "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::client_workstation", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
RHSA-2022:1056
Red Hat Security Advisory: Release of OpenShift Serverless Client kn 1.21.0
golang: net/http: limit growth of header canonicalization cache golang: syscall: don't close fd 0 on ForkExec error
[ "cpe:/a:redhat:serverless:1.0::el8" ]
null
4.8
null
null
RHSA-2018:1130
Red Hat Security Advisory: kernel security and bug fix update
hw: cpu: speculative execution branch target injection kernel: Use-after-free vulnerability in DCCP socket kernel: Incorrect type conversion for size during dma allocation kernel: v4l2: disabled memory access protection mechanism allowing privilege escalation kernel: Use-after-free in snd_seq_ioctl_create_port() kernel: Missing namespace check in net/netlink/af_netlink.c allows for network monitors to observe systemwide activity kernel: netfilter: use-after-free in tcpmss_mangle_packet function in net/netfilter/xt_TCPMSS.c kernel: kvm: Reachable BUG() on out-of-bounds guest IRQ kernel: Stack information leak in the EFS element
[ "cpe:/o:redhat:rhel_eus:7.4::computenode", "cpe:/o:redhat:rhel_eus:7.4::server" ]
null
null
6.5
null
RHSA-2021:0956
Red Hat Security Advisory: OpenShift Container Platform 4.6.23 security update
golang: data race in certain net/http servers including ReverseProxy can lead to DoS golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs golang: math/big: panic during recursive division of very large numbers
[ "cpe:/a:redhat:openshift:4.6::el7", "cpe:/a:redhat:openshift:4.6::el8" ]
null
7.5
null
null
RHSA-2002:290
Red Hat Security Advisory: : Updated Ethereal packages are available
security flaw security flaw
[ "cpe:/o:redhat:linux:7.2", "cpe:/o:redhat:linux:7.3", "cpe:/o:redhat:linux:8.0" ]
null
null
null
null
RHSA-2014:0564
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 6.2.3 update
JBossSX/PicketBox: World readable audit.log file
[ "cpe:/a:redhat:jboss_enterprise_application_platform:6::el5" ]
null
null
null
null
RHSA-2015:1603
Red Hat Security Advisory: flash-plugin security update
flash-plugin: multiple code execution flaws (APSB15-19) flash-plugin: multiple code execution flaws (APSB15-19) flash-plugin: multiple code execution flaws (APSB15-19) flash-plugin: multiple code execution flaws (APSB15-19) flash-plugin: multiple code execution flaws (APSB15-19) flash-plugin: multiple code execution flaws (APSB15-19) flash-plugin: multiple code execution flaws (APSB15-19) flash-plugin: multiple code execution flaws (APSB15-19) flash-plugin: multiple code execution flaws (APSB15-19) flash-plugin: multiple code execution flaws (APSB15-19) flash-plugin: multiple code execution flaws (APSB15-19) flash-plugin: multiple code execution flaws (APSB15-19) flash-plugin: multiple code execution flaws (APSB15-19) flash-plugin: multiple code execution flaws (APSB15-19) flash-plugin: multiple code execution flaws (APSB15-19) flash-plugin: multiple code execution flaws (APSB15-19) flash-plugin: multiple code execution flaws (APSB15-19) flash-plugin: multiple code execution flaws (APSB15-19) flash-plugin: multiple code execution flaws (APSB15-19) flash-plugin: multiple code execution flaws (APSB15-19) flash-plugin: multiple code execution flaws (APSB15-19) flash-plugin: multiple code execution flaws (APSB15-19) flash-plugin: multiple code execution flaws (APSB15-19) flash-plugin: multiple code execution flaws (APSB15-19) flash-plugin: multiple code execution flaws (APSB15-19) flash-plugin: multiple code execution flaws (APSB15-19) flash-plugin: multiple code execution flaws (APSB15-19) flash-plugin: multiple code execution flaws (APSB15-19) flash-plugin: multiple code execution flaws (APSB15-19) flash-plugin: multiple code execution flaws (APSB15-19) flash-plugin: multiple code execution flaws (APSB15-19) flash-plugin: multiple code execution flaws (APSB15-19) flash-plugin: multiple code execution flaws (APSB15-19)
[ "cpe:/a:redhat:rhel_extras:5::client", "cpe:/a:redhat:rhel_extras:5::server", "cpe:/a:redhat:rhel_extras:6" ]
null
null
null
null
RHSA-2024:1532
Red Hat Security Advisory: kernel security and bug fix update
kernel: CIFS Filesystem Decryption Improper Input Validation Remote Code Execution Vulnerability in function receive_encrypted_standard of client kernel: sched/membarrier: reduce the ability to hammer on sys_membarrier
[ "cpe:/a:redhat:rhel_eus:9.2::appstream", "cpe:/a:redhat:rhel_eus:9.2::crb", "cpe:/o:redhat:rhel_eus:9.2::baseos" ]
null
4.7
null
null
RHSA-2014:0453
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 6.2.2 security update
Xalan-Java: insufficient constraints in secure processing feature
[ "cpe:/a:redhat:jboss_enterprise_application_platform:6::el5", "cpe:/a:redhat:jboss_enterprise_application_platform:6::el6" ]
null
null
null
null
RHSA-2023:2695
Red Hat Security Advisory: OpenShift Container Platform 4.11.40 security update
go-yaml: Improve heuristics preventing CPU/memory abuse by parsing malicious or large YAML documents
[ "cpe:/a:redhat:openshift:4.11::el8" ]
null
7.5
null
null
RHSA-2022:4805
Red Hat Security Advisory: postgresql:10 security update
postgresql: Autovacuum, REINDEX, and others omit "security restricted operation" sandbox
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
8.8
null
null
RHSA-2023:5950
Red Hat Security Advisory: Red Hat OpenShift Service Mesh for 2.2.11 security update
golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487)
[ "cpe:/a:redhat:service_mesh:2.2::el8" ]
null
7.5
null
null
RHSA-2021:3947
Red Hat Security Advisory: rh-redis5-redis security update
redis: Lua scripts can overflow the heap-based Lua stack redis: Integer overflow issue with Streams redis: Integer overflow bug in the ziplist data structure redis: Denial of service via Redis Standard Protocol (RESP) request redis: Integer overflow issue with intsets redis: Integer overflow issue with strings
[ "cpe:/a:redhat:rhel_software_collections:3::el7" ]
null
7.5
null
null
RHSA-2004:681
Red Hat Security Advisory: samba security update
security flaw
[ "cpe:/o:redhat:enterprise_linux:2.1::as", "cpe:/o:redhat:enterprise_linux:2.1::aw", "cpe:/o:redhat:enterprise_linux:2.1::es", "cpe:/o:redhat:enterprise_linux:2.1::ws" ]
null
null
null
null
RHSA-2023:5924
Red Hat Security Advisory: varnish security update
HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack)
[ "cpe:/a:redhat:enterprise_linux:9::appstream", "cpe:/a:redhat:enterprise_linux:9::crb" ]
null
7.5
null
null
RHSA-2022:0441
Red Hat Security Advisory: aide security update
aide: heap-based buffer overflow on outputs larger than B64_BUF
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
7.5
null
null
RHSA-2023:3622
Red Hat Security Advisory: jenkins and jenkins-2-plugins security update
maven-shared-utils: Command injection via Commandline class plugin: CSRF vulnerability in Blue Ocean Plugin plugin: missing permission checks in Blue Ocean Plugin json-smart: Uncontrolled Resource Consumption vulnerability in json-smart (Resource Exhaustion) jettison: Uncontrolled Recursion in JSONArray springframework: Security Bypass With Un-Prefixed Double Wildcard Pattern springframework: Spring Expression DoS Vulnerability Jenkins: Temporary file parameter created with insecure permissions Jenkins: Information disclosure through error stack traces related to agents
[ "cpe:/a:redhat:ocp_tools:4.13::el8" ]
null
5.3
null
null
RHSA-2010:0349
Red Hat Security Advisory: acroread security update
Acroread: Multiple code execution flaws (APSB10-09) Acroread: Multiple code execution flaws (APSB10-09) Acroread: Multiple code execution flaws (APSB10-09) Acroread: Multiple code execution flaws (APSB10-09) Acroread: Multiple code execution flaws (APSB10-09) Acroread: Multiple code execution flaws (APSB10-09) Acroread: Multiple code execution flaws (APSB10-09) Acroread: Multiple code execution flaws (APSB10-09) Acroread: Multiple code execution flaws (APSB10-09) Acroread: Multiple code execution flaws (APSB10-09) Acroread: Multiple code execution flaws (APSB10-09) Acroread: Multiple code execution flaws (APSB10-09) Acroread: Multiple code execution flaws (APSB10-09) Acroread: Multiple code execution flaws (APSB10-09) Acroread: Heap-based overflow by opening a specially-crafted PDF file (FG-VD-10-005)
[ "cpe:/a:redhat:rhel_extras:4", "cpe:/a:redhat:rhel_extras:5::client", "cpe:/a:redhat:rhel_extras:5::server" ]
null
null
null
null
RHSA-2017:0387
Red Hat Security Advisory: kernel-rt security and bug fix update
kernel: kvm: x86: NULL pointer dereference during instruction decode kernel: Race condition in packet_set_ring leads to use after free kernel: State machine confusion bug in vfio driver leading to memory corruption kernel: Integer overflow when using kzalloc in vfio driver
[ "cpe:/a:redhat:rhel_extras_rt:7" ]
null
null
5.3
null
RHSA-2022:7715
Red Hat Security Advisory: libxml2 security update
libxml2: Incorrect server side include parsing can lead to XSS
[ "cpe:/a:redhat:enterprise_linux:8::appstream", "cpe:/o:redhat:enterprise_linux:8::baseos" ]
null
6.1
null
null
RHSA-2023:1337
Red Hat Security Advisory: firefox security update
Mozilla: Incorrect code generation during JIT compilation Mozilla: Potential out-of-bounds when accessing throttled streams Mozilla: Invalid downcast in Worklets Mozilla: URL being dragged from a removed cross-origin iframe into the same tab triggered navigation Mozilla: Memory safety bugs fixed in Firefox 111 and Firefox ESR 102.9
[ "cpe:/a:redhat:enterprise_linux:9::appstream" ]
null
8.8
null
null
RHSA-2016:1094
Red Hat Security Advisory: Red Hat OpenShift Enterprise 3.2 security update
3: Untrusted content loaded via the API proxy can access web console credentials on the same domain 3: s2i builds implicitly perform docker builds origin: pod update allows docker socket access via build-pod
[ "cpe:/a:redhat:openshift:3.2::el7" ]
null
null
null
null
RHSA-2019:2964
Red Hat Security Advisory: patch security update
patch: do_ed_script in pch.c does not block strings beginning with a ! character patch: OS shell command injection when processing crafted patch files
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
7.8
null
RHSA-2024:0785
Red Hat Security Advisory: nss security update
nss: vulnerable to Minerva side-channel information leak
[ "cpe:/a:redhat:rhel_eus:8.8::appstream" ]
null
4.3
null
null
RHSA-2023:7417
Red Hat Security Advisory: kpatch-patch security update
kernel: Use-after-free vulnerability in the Linux Kernel traffic control index filter kernel: net/sched: cls_u32 component reference counter leak if tcf_change_indev() fails kernel: net/sched: cls_fw component can be exploited as result of failure in tcf_change_indev function kernel: netfilter: use-after-free due to improper element removal in nft_pipapo_remove()
[ "cpe:/o:redhat:rhel_e4s:8.2::baseos" ]
null
7.8
null
null
RHSA-2015:1976
Red Hat Security Advisory: kernel-rt security, bug fix, and enhancement update
kernel: fs: deadlock due to incorrect usage of rename_lock
[ "cpe:/a:redhat:enterprise_mrg:2:server:el6" ]
null
null
null
null
RHSA-2020:4235
Red Hat Security Advisory: chromium-browser security update
chromium-browser: Inappropriate implementation in networking chromium-browser: Use after free in payments chromium-browser: Use after free in Blink chromium-browser: Use after free in WebRTC chromium-browser: Use after free in NFC chromium-browser: Use after free in printing chromium-browser: Use after free in audio chromium-browser: Insufficient policy enforcement in extensions chromium-browser: Integer overflow in Blink chromium-browser: Integer overflow in SwiftShader chromium-browser: Use after free in WebXR chromium-browser: Insufficient data validation in dialogs chromium-browser: Insufficient data validation in navigation chromium-browser: Inappropriate implementation in V8 chromium-browser: Insufficient policy enforcement in Intents chromium-browser: Out of bounds read in audio chromium-browser: Side-channel information leakage in cache chromium-browser: Insufficient data validation in webUI chromium-browser: Insufficient policy enforcement in Omnibox chromium-browser: Inappropriate implementation in Blink chromium-browser: Integer overflow in media chromium-browser: Use after free in WebRTC chromium-browser: Insufficient policy enforcement in downloads chromium-browser: Uninitialized use in PDFium chromium-browser: Use after free in autofill chromium-browser: Use after free in password manager chromium-browser: Insufficient policy enforcement in networking
[ "cpe:/a:redhat:rhel_extras:6" ]
null
8.8
null
null
RHSA-2020:3217
Red Hat Security Advisory: grub2 security and bug fix update
grub2: Crafted grub.cfg file can lead to arbitrary code execution during boot process grub2: grub_malloc does not validate allocation size allowing for arithmetic overflow and subsequent heap-based buffer overflow grub2: Integer overflow in grub_squash_read_symlink may lead to heap-based buffer overflow grub2: Integer overflow read_section_as_string may lead to heap-based buffer overflow grub2: Integer overflow in grub_ext2_read_link leads to heap-based buffer overflow grub2: Fail kernel validation without shim protocol grub2: Use-after-free redefining a function whilst the same function is already executing grub2: Integer overflow in initrd size handling
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
5.7
null
null
RHSA-2023:1185
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.4 security update
Undertow: Infinite loop in SslConduit during close
[ "cpe:/a:redhat:jboss_enterprise_application_platform:7.4::el7", "cpe:/a:redhat:jboss_enterprise_application_platform:7.4::el8", "cpe:/a:redhat:jboss_enterprise_application_platform:7.4::el9" ]
null
7.5
null
null
RHSA-2023:3147
Red Hat Security Advisory: apr-util security update
apr-util: out-of-bounds writes in the apr_base64
[ "cpe:/a:redhat:enterprise_linux:9::appstream" ]
null
6.5
null
null
RHSA-2021:0873
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.3.6 security update
guava: local information disclosure via temporary directory created with unsafe permissions Undertow: Incomplete fix for CVE-2017-2666 due to permitting invalid characters in HTTP requests bouncycastle: password bypass in OpenBSDBCrypt.checkPassword utility possible jboss-remoting: Threads hold up forever in the EJB server by suppressing the ack from an EJB client undertow: Possible regression in fix for CVE-2020-10687 wildfly: Information disclosure due to publicly accessible privileged actions in JBoss EJB Client
[ "cpe:/a:redhat:jboss_enterprise_application_platform:7.3::el7" ]
null
4.3
4.8
null
RHSA-2014:0380
Red Hat Security Advisory: flash-plugin security update
flash-plugin: two flaws leading to code execution (APSB14-09) flash-plugin: two flaws leading to code execution (APSB14-09) flash-plugin: information disclosure flaw (APSB14-09) flash-plugin: cross-site scripting flaw (APSB14-09)
[ "cpe:/a:redhat:rhel_extras:5::client", "cpe:/a:redhat:rhel_extras:5::server", "cpe:/a:redhat:rhel_extras:6" ]
null
null
null
null
RHSA-2014:0447
Red Hat Security Advisory: flash-plugin security update
flash-plugin: buffer overflow vulnerability leads to arbitrary code execution (APSB14-13)
[ "cpe:/a:redhat:rhel_extras:5::client", "cpe:/a:redhat:rhel_extras:5::server", "cpe:/a:redhat:rhel_extras:6" ]
null
null
null
null
RHSA-2013:1292
Red Hat Security Advisory: kernel security and bug fix update
kernel: mm: use-after-free in madvise_remove() Kernel: signal: information leak in tkill/tgkill Kernel: net: panic while pushing pending data out of a IPv6 socket with UDP_CORK enabled
[ "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
RHSA-2020:4305
Red Hat Security Advisory: java-11-openjdk security and bug fix update
OpenJDK: High memory usage during deserialization of Proxy class with many interfaces (Serialization, 8236862) OpenJDK: Credentials sent over unencrypted LDAP connection (JNDI, 8237990) OpenJDK: Certificate blacklist bypass via alternate certificate encodings (Libraries, 8237995) OpenJDK: Integer overflow leading to out-of-bounds access (Hotspot, 8241114) OpenJDK: Missing permission check in path to URI conversion (Libraries, 8242680) OpenJDK: Incomplete check for invalid characters in URI to path conversion (Libraries, 8242685) OpenJDK: Race condition in NIO Buffer boundary checks (Libraries, 8244136)
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
5.3
null
null
RHSA-2013:0588
Red Hat Security Advisory: gnutls security update
gnutls: TLS CBC padding timing attack (lucky-13)
[ "cpe:/o:redhat:enterprise_linux:5::server", "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
null
null
RHSA-2020:0721
Red Hat Security Advisory: openstack-octavia security update
openstack-octavia: amphora-agent not requiring client certificate
[ "cpe:/a:redhat:openstack:15::el8" ]
null
null
6.7
null
RHSA-2017:0328
Red Hat Security Advisory: qemu-kvm-rhev security update
Qemu: display: cirrus: oob access while doing bitblt copy backward mode Qemu: display: cirrus: potential arbitrary code execution via cirrus_bitblt_cputovideo
[ "cpe:/a:redhat:openstack:10::el7" ]
null
null
5.5
null
RHSA-2023:4570
Red Hat Security Advisory: iperf3 security update
iperf3: memory allocation hazard and crash
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
7.5
null
null
RHSA-2014:1290
Red Hat Security Advisory: Red Hat JBoss BRMS 6.0.3 update
HawtJNI: predictable temporary file name leading to local arbitrary code execution Java: XML eXternal Entity (XXE) flaw in ParserPool and Decrypter jboss-as-server: Unchecked access to MSC Service Registry under JSM EAP6: Plain text password logging during security audit 6: JSM policy not respected by deployed applications Xalan-Java: insufficient constraints in secure processing feature
[ "cpe:/a:redhat:jboss_brms:6.0" ]
null
null
null
null
RHSA-2018:0059
Red Hat Security Advisory: qemu-kvm-rhev security update
An update for qemu-kvm-rhev is now available for Red Hat OpenStack Platform 11.0 (Ocata). Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
[ "cpe:/a:redhat:openstack:11::el7" ]
null
null
null
null
RHSA-2023:3945
Red Hat Security Advisory: open-vm-tools security update
open-vm-tools: authentication bypass vulnerability in the vgauth module
[ "cpe:/a:redhat:rhel_aus:8.2::appstream", "cpe:/a:redhat:rhel_e4s:8.2::appstream", "cpe:/a:redhat:rhel_tus:8.2::appstream" ]
null
3.9
null
null
RHSA-2003:284
Red Hat Security Advisory: sendmail security update
security flaw
[ "cpe:/o:redhat:enterprise_linux:2.1::as", "cpe:/o:redhat:enterprise_linux:2.1::aw", "cpe:/o:redhat:enterprise_linux:2.1::es", "cpe:/o:redhat:enterprise_linux:2.1::ws" ]
null
null
null
null
RHSA-2020:0980
Red Hat Security Advisory: rh-postgresql10-postgresql security update
postgresql: Selectivity estimators bypass row security policies postgresql: Stack-based buffer overflow via setting a password postgresql: TYPE in pg_temp executes arbitrary SQL during SECURITY DEFINER execution postgresql: ALTER ... DEPENDS ON EXTENSION is missing authorization checks
[ "cpe:/a:redhat:rhel_software_collections:3::el7" ]
null
3.1
7.5
null
RHSA-2016:0124
Red Hat Security Advisory: jboss-ec2-eap security and enhancement update for EAP 6.4.6
jakarta-taglibs-standard: XXE and RCE via XSL extension in JSTL XML tags
[ "cpe:/a:redhat:jboss_enterprise_application_platform:6::el6" ]
null
null
7.6
null
RHSA-2022:1073
Red Hat Security Advisory: openssl security update
openssl: Infinite loop in BN_mod_sqrt() reachable when parsing certificates
[ "cpe:/o:redhat:rhel_els:6" ]
null
7.5
null
null
RHSA-2022:0826
Red Hat Security Advisory: .NET 6.0 security and bugfix update
dotnet: ASP.NET Denial of Service via FormPipeReader dotnet: double parser stack buffer overrun
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
6.3
null
null
RHSA-2014:1626
Red Hat Security Advisory: chromium-browser security update
v8: IPC and v8 issue fixed in Google Chrome 38.0.2125.101 chromium: OOB reads in PDFium fixed in Chrome 38.0.2125.101 chromium: multiple security fixes in Chrome 38.0.2125.101 chromium: multiple security fixes in Chrome 38.0.2125.101 chromium: use-after-free in DOM, fixed in Chrome 38.0.2125.101 chromium: multiple security fixes in Chrome 38.0.2125.101 chromium: use-after-free issue in Web Workers fixed in Chrome 38.0.2125.101 v8: information leak fixed in Google Chrome 38.0.2125.101 chromium: information leak in XSS Auditor fixed in Chrome 38.0.2125.101 chromium: OOB reads in PDFium fixed in Chrome 38.0.2125.101 chromium: multiple security fixes in Chrome 38.0.2125.101 chromium: multiple unspecified issues fixed in Chrome 38.0.2125.101
[ "cpe:/a:redhat:rhel_extras:6" ]
null
null
null
null
RHSA-2025:2876
Red Hat Security Advisory: ACS 4.7 enhancement and security update
axios: exposure of confidential data stored in cookies
[ "cpe:/a:redhat:advanced_cluster_security:4.7::el8" ]
null
6.5
null
null
RHSA-2021:1744
Red Hat Security Advisory: sane-backends security update
sane-backends: NULL pointer dereference in sanei_epson_net_read function
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
5.7
null
null
RHSA-2024:0121
Red Hat Security Advisory: container-tools:4.0 security update
golang: archive/tar: github.com/vbatts/tar-split: unbounded memory consumption when reading headers golang: net/http/httputil: ReverseProxy should not forward unparseable query parameters golang: net/http: handle server errors after sending GOAWAY golang: regexp/syntax: limit memory used by parsing regexps golang: crypto/tls: slow verification of certificate chains containing large RSA keys golang: html/template: improper handling of HTML-like comments within script contexts golang: html/template: improper handling of special tags within script contexts golang: crypto/tls: panic when processing post-handshake message on QUIC connections golang: crypto/tls: lack of a limit on buffered post-handshake
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
7.5
null
null
RHSA-2024:9677
Red Hat Security Advisory: squid security update
squid: Denial of Service processing ESI response content
[ "cpe:/a:redhat:rhel_eus:9.2::appstream" ]
null
7.5
null
null
RHSA-2024:4863
Red Hat Security Advisory: httpd security update
httpd: Substitution encoding issue in mod_rewrite httpd: Improper escaping of output in mod_rewrite httpd: NULL pointer dereference in mod_proxy
[ "cpe:/a:redhat:rhel_e4s:9.0::appstream" ]
null
7.5
null
null
RHSA-2024:1502
Red Hat Security Advisory: grafana-pcp security update
golang-fips/openssl: Memory leaks in code encrypting and decrypting RSA payloads
[ "cpe:/a:redhat:enterprise_linux:9::appstream" ]
null
7.5
null
null
RHSA-2024:8874
Red Hat Security Advisory: haproxy security update
haproxy: untrimmed URI fragments may lead to exposure of confidential data on static servers
[ "cpe:/a:redhat:rhel_aus:8.6::appstream", "cpe:/a:redhat:rhel_e4s:8.6::appstream", "cpe:/a:redhat:rhel_tus:8.6::appstream" ]
null
5.3
null
null
RHSA-2020:3184
Red Hat Security Advisory: OpenShift Container Platform 4.3.31 openshift-enterprise-hyperkube-container security update
kubernetes: node localhost services reachable via martian packets
[ "cpe:/a:redhat:openshift:4.3::el7" ]
null
5.4
null
null
RHSA-2022:0585
Red Hat Security Advisory: Service Telemetry Framework 1.4 (sg-core-container) security update
golang: net/http: limit growth of header canonicalization cache
[ "cpe:/a:redhat:service_telemetry_framework:1.4::el8" ]
null
7.5
null
null
RHSA-2022:5313
Red Hat Security Advisory: curl security update
curl: OAUTH2 bearer bypass in connection re-use curl: credential leak on redirect curl: auth/cookie leak on redirect curl: TLS and SSH connection too eager reuse
[ "cpe:/o:redhat:enterprise_linux:8::baseos" ]
null
7.5
null
null
RHSA-2015:1041
Red Hat Security Advisory: Red Hat JBoss Fuse/A-MQ 6.1.0 update
Camel: XXE in via SAXSource expansion Camel: XXE via XPath expression evaluation
[ "cpe:/a:redhat:jboss_amq:6.1.0", "cpe:/a:redhat:jboss_fuse:6.1.0" ]
null
null
null
null
RHSA-2011:1385
Red Hat Security Advisory: kdelibs and kdelibs3 security update
kdelibs: input validation failure in KSSL
[ "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws", "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::client_workstation", "cpe:/o:redhat:enterprise_linux:5::server", "cpe:/o:redhat:enterprise_linux:6::server" ]
null
null
null
null
RHSA-2023:5233
Red Hat Security Advisory: OpenShift Virtualization 4.13.4 security and bug fix update
golang.org/x/net/http2: avoid quadratic complexity in HPACK decoding
[ "cpe:/a:redhat:container_native_virtualization:4.13::el9" ]
null
7.5
null
null
RHSA-2007:0154
Red Hat Security Advisory: php security update
security flaw security flaw security flaw
[ "cpe:/o:redhat:enterprise_linux:2.1::as", "cpe:/o:redhat:enterprise_linux:2.1::aw", "cpe:/o:redhat:enterprise_linux:2.1::es", "cpe:/o:redhat:enterprise_linux:2.1::ws" ]
null
null
null
null
RHSA-2017:3484
Red Hat Security Advisory: Red Hat CloudForms security, bug fix, and enhancement update
CloudForms: lack of RBAC on various methods in web UI
[ "cpe:/a:redhat:cloudforms_managementengine:5.7::el7" ]
null
null
6.5
null
RHSA-2022:7268
Red Hat Security Advisory: Red Hat OpenStack Platform 13.0 (openvswitch2.11) security update
dpdk: DoS when a Vhost header crosses more than two descriptors and exhausts all mbufs
[ "cpe:/a:redhat:openstack:13::el7" ]
null
8.6
null
null
RHSA-2003:279
Red Hat Security Advisory: : Updated OpenSSH packages fix potential vulnerabilities
security flaw security flaw security flaw
[ "cpe:/o:redhat:linux:7.1", "cpe:/o:redhat:linux:7.2", "cpe:/o:redhat:linux:7.3", "cpe:/o:redhat:linux:8.0", "cpe:/o:redhat:linux:9" ]
null
null
null
null
RHSA-2015:1890
Red Hat Security Advisory: spice security update
spice: insufficient validation of surface_id parameter can cause crash spice: host memory access from guest using crafted images
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
null
null
RHSA-2004:392
Red Hat Security Advisory: php security update
security flaw security flaw
[ "cpe:/o:redhat:enterprise_linux:3::as", "cpe:/o:redhat:enterprise_linux:3::desktop", "cpe:/o:redhat:enterprise_linux:3::es", "cpe:/o:redhat:enterprise_linux:3::ws" ]
null
null
null
null
RHSA-2022:1557
Red Hat Security Advisory: mariadb:10.5 security, bug fix, and enhancement update
mysql: Server: DML unspecified vulnerability (CPU Apr 2021) mysql: Server: DML unspecified vulnerability (CPU Apr 2021) mysql: InnoDB unspecified vulnerability (CPU Jul 2021) mysql: InnoDB unspecified vulnerability (CPU Jul 2021) mysql: InnoDB unspecified vulnerability (CPU Oct 2021) mariadb: Crash in get_sort_by_table() in subquery with ORDER BY having outer ref mariadb: save_window_function_values triggers an abort during IN subquery mariadb: Crash in set_var.cc via certain UPDATE queries with nested subqueries mariadb: Crash caused by mishandling of a pushdown from a HAVING clause to a WHERE clause mariadb: Integer overflow in sql_lex.cc integer leading to crash mysql: InnoDB unspecified vulnerability (CPU Apr 2022) mariadb: crash in Used_tables_and_const_cache::used_tables_and_const_cache_join mariadb: improper locking due to unreleased lock in the ds_xbstream.cc mariadb: DoS due to improper locking due to unreleased lock in plugin/server_audit/server_audit.c
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
5.5
null
null
RHSA-2023:2258
Red Hat Security Advisory: python-mako security update
python-mako: REDoS in Lexer class
[ "cpe:/a:redhat:enterprise_linux:9::appstream" ]
null
7.5
null
null
RHSA-2023:5081
Red Hat Security Advisory: librsvg2 security update
librsvg: Arbitrary file read when xinclude href has special characters
[ "cpe:/a:redhat:enterprise_linux:9::appstream" ]
null
5.5
null
null
RHSA-2024:1959
Red Hat Security Advisory: shim security update
shim: Out-of-bounds read printing error messages shim: RCE in http boot support may lead to Secure Boot bypass shim: Interger overflow leads to heap buffer overflow in verify_sbat_section on 32-bits systems shim: Out-of-bounds read in verify_buffer_authenticode() malformed PE file shim: Out-of-bound read in verify_buffer_sbat() shim: out of bounds read when parsing MZ binaries
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
5.1
null
null
RHSA-2021:3148
Red Hat Security Advisory: .NET 5.0 security and bugfix update
dotnet: ASP.NET Core WebSocket frame processing DoS dotnet: Dump file created world-readable dotnet: ASP.NET Core JWT token logging
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
5.5
null
null
RHSA-2020:5655
Red Hat Security Advisory: mariadb-connector-c security, bug fix, and enhancement update
mysql: C API unspecified vulnerability (CPU Jan 2020) mysql: C API unspecified vulnerability (CPU Apr 2020) mysql: C API unspecified vulnerability (CPU Apr 2020) mariadb-connector-c: Improper validation of content in a OK packet received from server mysql: C API unspecified vulnerability (CPU Jan 2021)
[ "cpe:/a:redhat:rhel_eus:8.2::appstream" ]
null
3.7
3.7
null
RHSA-2020:4244
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.3.3 security update on RHEL 6
cxf: JMX integration is vulnerable to a MITM attack picketbox: JBoss EAP reload to admin-only mode allows authentication bypass wildfly: XML validation manipulation due to incomplete application of use-grammar-pool-only in xercesImpl xnio: file descriptor leak caused by growing amounts of NIO Selector file handles may lead to DoS
[ "cpe:/a:redhat:jboss_enterprise_application_platform:7.3::el6" ]
null
5.9
null
null
RHSA-2019:2979
Red Hat Security Advisory: wget security update
wget: do_conversion() heap-based buffer overflow vulnerability
[ "cpe:/o:redhat:rhel_eus:7.5::computenode", "cpe:/o:redhat:rhel_eus:7.5::server" ]
null
null
8.8
null
RHSA-2023:4171
Red Hat Security Advisory: java-17-openjdk security update
OpenJDK: HTTP client insufficient file name validation (8302475) OpenJDK: ZIP file parsing infinite loop (8302483) OpenJDK: weakness in AES implementation (8308682) OpenJDK: modulo operator array indexing issue (8304460) OpenJDK: array indexing integer overflow issue (8304468) OpenJDK: improper handling of slash characters in URI-to-path conversion (8305312) harfbuzz: allows attackers to trigger O(n^2) growth via consecutive marks
[ "cpe:/a:redhat:rhel_aus:8.4::appstream", "cpe:/a:redhat:rhel_e4s:8.4::appstream", "cpe:/a:redhat:rhel_tus:8.4::appstream" ]
null
7.5
null
null
RHSA-2025:4263
Red Hat Security Advisory: php:8.1 security update
php: Leak partial content of the heap through heap buffer over-read in mysqlnd php: Single byte overread with convert.quoted-printable-decode filter php: Configuring a proxy in a stream context might allow for CRLF injection in URIs php: Header parser of http stream wrapper does not handle folded headers php: libxml streams use wrong content-type header when requesting a redirected resource php: Streams HTTP wrapper does not fail for headers with invalid name and no colon php: Stream HTTP wrapper header check might omit basic auth header php: Stream HTTP wrapper truncates redirect location to 1024 bytes
[ "cpe:/a:redhat:enterprise_linux:9::appstream" ]
null
5.3
null
null