id
stringlengths 13
15
| title
stringlengths 29
176
| description
stringlengths 8
32.1k
| cpes
sequencelengths 0
20
| cvss_v4_0
null | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
null |
---|---|---|---|---|---|---|---|
RHSA-2022:8850 | Red Hat Security Advisory: Red Hat OpenStack Platform 16.2.4 (python-ujson) security update | python-ujson: improper decoding of escaped surrogate characters may lead to string corruption, key confusion or value overwriting python-ujson: Potential double free of buffer during string decoding | [
"cpe:/a:redhat:openstack:16.2::el8"
] | null | 5.9 | null | null |
RHSA-2024:10948 | Red Hat Security Advisory: Red Hat OpenShift distributed tracing platform (Tempo) 3.4 release | opa: OPA SMB Force-Authentication | [
"cpe:/a:redhat:openshift_distributed_tracing:3.4::el8"
] | null | 6.1 | null | null |
RHSA-2024:0004 | Red Hat Security Advisory: thunderbird security update | Mozilla: Heap-buffer-overflow affecting WebGL <code>DrawElementsInstanced</code> method with Mesa VM driver Mozilla: Symlinks may resolve to smaller than expected buffers Mozilla: Heap buffer overflow in <code>nsTextFragment</code> Mozilla: Use-after-free in PR_GetIdentitiesLayer Mozilla: Potential sandbox escape due to <code>VideoBridge</code> lack of texture validation Mozilla: Heap buffer overflow affected <code>nsWindow::PickerOpen(void)</code> in headless mode Mozilla: Use-after-free in <code>nsDNSService</code> Mozilla: Undefined behavior in <code>ShutdownObserver()</code> Mozilla: Memory safety bugs fixed in Firefox 121, Firefox ESR 115.6, and Thunderbird 115.6 Mozilla: S/MIME signature accepted despite mismatching message date Mozilla: Truncated signed text was shown with a valid OpenPGP signature | [
"cpe:/a:redhat:rhel_eus:8.8::appstream"
] | null | 7.5 | null | null |
RHSA-2004:050 | Red Hat Security Advisory: mutt security update | security flaw | [
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws"
] | null | null | null | null |
RHSA-2023:5434 | Red Hat Security Advisory: firefox security update | firefox: use-after-free in workers Mozilla: Out-of-bounds write in PathOps Mozilla: Use-after-free in Ion Compiler Mozilla: Memory safety bugs fixed in Firefox 118, Firefox ESR 115.3, and Thunderbird 115.3 libvpx: Heap buffer overflow in vp8 encoding in libvpx | [
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 8.8 | null | null |
RHSA-2021:2758 | Red Hat Security Advisory: nettle security update | nettle: Out of bounds memory access in signature verification | [
"cpe:/o:redhat:rhel_aus:7.4::server",
"cpe:/o:redhat:rhel_e4s:7.4::server",
"cpe:/o:redhat:rhel_tus:7.4::server"
] | null | 8.1 | null | null |
RHSA-2024:4479 | Red Hat Security Advisory: OpenShift Container Platform 4.14.33 bug fix and security update | ssh: Prefix truncation attack on Binary Packet Protocol (BPP) go-retryablehttp: url might write sensitive information to log file openssh: regreSSHion - race condition in SSH allows RCE/DoS | [
"cpe:/a:redhat:openshift:4.14::el8",
"cpe:/a:redhat:openshift:4.14::el9"
] | null | 8.1 | null | null |
RHSA-2022:1326 | Red Hat Security Advisory: thunderbird security update | Mozilla: Use-after-free in NSSToken objects Mozilla: Use-after-free after VR Process destruction Mozilla: OpenPGP revocation information was ignored Mozilla: Denial of Service via complex regular expressions Mozilla: Out of bounds write due to unexpected WebAuthN Extensions Mozilla: Use-after-free in DocumentL10n::TranslateDocument Mozilla: Incorrect AliasSet used in JIT Codegen Mozilla: iframe contents could be rendered outside the border Mozilla: Memory safety bugs fixed in Firefox 99 and Firefox ESR 91.8 | [
"cpe:/a:redhat:rhel_eus:8.2::appstream"
] | null | 8.8 | 6.1 | null |
RHSA-2022:1070 | Red Hat Security Advisory: expat security update | expat: Malformed 2- and 3-byte UTF-8 sequences can lead to arbitrary code execution expat: Namespace-separator characters in "xmlns[:prefix]" attribute values can lead to arbitrary code execution expat: Integer overflow in storeRawNames() | [
"cpe:/o:redhat:rhel_eus:8.2::baseos"
] | null | 9.8 | null | null |
RHSA-2025:1138 | Red Hat Security Advisory: firefox security update | firefox: thunderbird: Use-after-free in XSLT firefox: thunderbird: Use-after-free in Custom Highlight firefox: thunderbird: A bug in WebAssembly code generation could result in a crash firefox: thunderbird: Use-after-free during concurrent delazification firefox: thunderbird: Potential opening of private browsing tabs in normal browsing windows firefox: thunderbird: Certificate length was not properly checked firefox: thunderbird: Memory safety bugs fixed in Firefox 135, Thunderbird 135, Firefox ESR 115.20, Firefox ESR 128.7, Thunderbird 115.20, and Thunderbird 128.7 firefox: thunderbird: Memory safety bugs fixed in Firefox 135, Thunderbird 135, Firefox ESR 128.7, and Thunderbird 128.7 | [
"cpe:/a:redhat:rhel_e4s:9.0::appstream"
] | null | 8.8 | null | null |
RHSA-2025:0364 | Red Hat Security Advisory: OpenShift Container Platform 4.14.45 bug fix and security update | python: Path traversal on tempfile.TemporaryDirectory golang.org/x/net/html: Non-linear parsing of case-insensitive content in golang.org/x/net/html | [
"cpe:/a:redhat:openshift:4.14::el8",
"cpe:/a:redhat:openshift:4.14::el9"
] | null | 7.5 | null | null |
RHSA-2019:1604 | Red Hat Security Advisory: firefox security update | Mozilla: Type confusion in Array.pop Mozilla: Sandbox escape using Prompt:Open | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | 10 | null |
RHSA-2017:1264 | Red Hat Security Advisory: kdelibs security update | kauth: service invoking dbus is not properly checked and allows local privilege escalation | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 7.8 | null |
RHSA-2023:6118 | Red Hat Security Advisory: OpenShift API for Data Protection security update | golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487) HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack) | [
"cpe:/a:redhat:openshift_api_data_protection:1.2::el8"
] | null | 7.5 | null | null |
RHSA-2024:8033 | Red Hat Security Advisory: firefox security update | firefox: Use-after-free in Animation timeline (128.3.1 ESR Chemspill) | [
"cpe:/a:redhat:rhel_eus:8.8::appstream"
] | null | 9.8 | null | null |
RHSA-2015:2383 | Red Hat Security Advisory: pacemaker security, bug fix, and enhancement update | pacemaker: acl read-only access allow role assignment | [
"cpe:/o:redhat:enterprise_linux:7::server"
] | null | null | null | null |
RHSA-2020:3118 | Red Hat Security Advisory: samba security update | samba: NULL pointer de-reference and use-after-free in Samba AD DC LDAP Server with ASQ, VLV and paged_results | [
"cpe:/a:redhat:storage:3.5:samba:el7"
] | null | 0 | null | null |
RHSA-2024:6418 | Red Hat Security Advisory: bubblewrap and flatpak security update | flatpak: Access to files outside sandbox for apps using persistent= (--persist) | [
"cpe:/a:redhat:rhel_aus:8.4::appstream",
"cpe:/a:redhat:rhel_e4s:8.4::appstream",
"cpe:/a:redhat:rhel_tus:8.4::appstream",
"cpe:/o:redhat:rhel_aus:8.4::baseos",
"cpe:/o:redhat:rhel_e4s:8.4::baseos",
"cpe:/o:redhat:rhel_tus:8.4::baseos"
] | null | 7.4 | null | null |
RHSA-2018:3324 | Red Hat Security Advisory: fuse security update | fuse: bypass of the "user_allow_other" restriction when SELinux is active | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 5.3 | null |
RHSA-2018:3400 | Red Hat Security Advisory: libvirt security update | hw: cpu: speculative store bypass | [
"cpe:/o:redhat:rhel_aus:6.6::server",
"cpe:/o:redhat:rhel_tus:6.6::server"
] | null | null | 5.6 | null |
RHSA-2014:1322 | Red Hat Security Advisory: Red Hat JBoss Enterprise Web Platform 5.2.0 security update | CXF: SSL hostname verification bypass, incomplete CVE-2012-5783 fix CXF: SSL hostname verification bypass, incomplete CVE-2012-6153 fix | [
"cpe:/a:redhat:jboss_enterprise_web_platform:5.2.0"
] | null | null | 4.8 | null |
RHSA-2023:5005 | Red Hat Security Advisory: OpenShift Container Platform 4.14.0 security and extras update | golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487) | [
"cpe:/a:redhat:openshift:4.14::el8"
] | null | 7.5 | null | null |
RHSA-2022:7024 | Red Hat Security Advisory: firefox security update | expat: a use-after-free in the doContent function in xmlparse.c | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 8.1 | null | null |
RHSA-2009:1615 | Red Hat Security Advisory: xerces-j2 security update | JDK: XML parsing Denial-Of-Service (6845701) | [
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2022:1056 | Red Hat Security Advisory: Release of OpenShift Serverless Client kn 1.21.0 | golang: net/http: limit growth of header canonicalization cache golang: syscall: don't close fd 0 on ForkExec error | [
"cpe:/a:redhat:serverless:1.0::el8"
] | null | 4.8 | null | null |
RHSA-2018:1130 | Red Hat Security Advisory: kernel security and bug fix update | hw: cpu: speculative execution branch target injection kernel: Use-after-free vulnerability in DCCP socket kernel: Incorrect type conversion for size during dma allocation kernel: v4l2: disabled memory access protection mechanism allowing privilege escalation kernel: Use-after-free in snd_seq_ioctl_create_port() kernel: Missing namespace check in net/netlink/af_netlink.c allows for network monitors to observe systemwide activity kernel: netfilter: use-after-free in tcpmss_mangle_packet function in net/netfilter/xt_TCPMSS.c kernel: kvm: Reachable BUG() on out-of-bounds guest IRQ kernel: Stack information leak in the EFS element | [
"cpe:/o:redhat:rhel_eus:7.4::computenode",
"cpe:/o:redhat:rhel_eus:7.4::server"
] | null | null | 6.5 | null |
RHSA-2021:0956 | Red Hat Security Advisory: OpenShift Container Platform 4.6.23 security update | golang: data race in certain net/http servers including ReverseProxy can lead to DoS golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs golang: math/big: panic during recursive division of very large numbers | [
"cpe:/a:redhat:openshift:4.6::el7",
"cpe:/a:redhat:openshift:4.6::el8"
] | null | 7.5 | null | null |
RHSA-2002:290 | Red Hat Security Advisory: : Updated Ethereal packages are available | security flaw security flaw | [
"cpe:/o:redhat:linux:7.2",
"cpe:/o:redhat:linux:7.3",
"cpe:/o:redhat:linux:8.0"
] | null | null | null | null |
RHSA-2014:0564 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 6.2.3 update | JBossSX/PicketBox: World readable audit.log file | [
"cpe:/a:redhat:jboss_enterprise_application_platform:6::el5"
] | null | null | null | null |
RHSA-2015:1603 | Red Hat Security Advisory: flash-plugin security update | flash-plugin: multiple code execution flaws (APSB15-19) flash-plugin: multiple code execution flaws (APSB15-19) flash-plugin: multiple code execution flaws (APSB15-19) flash-plugin: multiple code execution flaws (APSB15-19) flash-plugin: multiple code execution flaws (APSB15-19) flash-plugin: multiple code execution flaws (APSB15-19) flash-plugin: multiple code execution flaws (APSB15-19) flash-plugin: multiple code execution flaws (APSB15-19) flash-plugin: multiple code execution flaws (APSB15-19) flash-plugin: multiple code execution flaws (APSB15-19) flash-plugin: multiple code execution flaws (APSB15-19) flash-plugin: multiple code execution flaws (APSB15-19) flash-plugin: multiple code execution flaws (APSB15-19) flash-plugin: multiple code execution flaws (APSB15-19) flash-plugin: multiple code execution flaws (APSB15-19) flash-plugin: multiple code execution flaws (APSB15-19) flash-plugin: multiple code execution flaws (APSB15-19) flash-plugin: multiple code execution flaws (APSB15-19) flash-plugin: multiple code execution flaws (APSB15-19) flash-plugin: multiple code execution flaws (APSB15-19) flash-plugin: multiple code execution flaws (APSB15-19) flash-plugin: multiple code execution flaws (APSB15-19) flash-plugin: multiple code execution flaws (APSB15-19) flash-plugin: multiple code execution flaws (APSB15-19) flash-plugin: multiple code execution flaws (APSB15-19) flash-plugin: multiple code execution flaws (APSB15-19) flash-plugin: multiple code execution flaws (APSB15-19) flash-plugin: multiple code execution flaws (APSB15-19) flash-plugin: multiple code execution flaws (APSB15-19) flash-plugin: multiple code execution flaws (APSB15-19) flash-plugin: multiple code execution flaws (APSB15-19) flash-plugin: multiple code execution flaws (APSB15-19) flash-plugin: multiple code execution flaws (APSB15-19) | [
"cpe:/a:redhat:rhel_extras:5::client",
"cpe:/a:redhat:rhel_extras:5::server",
"cpe:/a:redhat:rhel_extras:6"
] | null | null | null | null |
RHSA-2024:1532 | Red Hat Security Advisory: kernel security and bug fix update | kernel: CIFS Filesystem Decryption Improper Input Validation Remote Code Execution Vulnerability in function receive_encrypted_standard of client kernel: sched/membarrier: reduce the ability to hammer on sys_membarrier | [
"cpe:/a:redhat:rhel_eus:9.2::appstream",
"cpe:/a:redhat:rhel_eus:9.2::crb",
"cpe:/o:redhat:rhel_eus:9.2::baseos"
] | null | 4.7 | null | null |
RHSA-2014:0453 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 6.2.2 security update | Xalan-Java: insufficient constraints in secure processing feature | [
"cpe:/a:redhat:jboss_enterprise_application_platform:6::el5",
"cpe:/a:redhat:jboss_enterprise_application_platform:6::el6"
] | null | null | null | null |
RHSA-2023:2695 | Red Hat Security Advisory: OpenShift Container Platform 4.11.40 security update | go-yaml: Improve heuristics preventing CPU/memory abuse by parsing malicious or large YAML documents | [
"cpe:/a:redhat:openshift:4.11::el8"
] | null | 7.5 | null | null |
RHSA-2022:4805 | Red Hat Security Advisory: postgresql:10 security update | postgresql: Autovacuum, REINDEX, and others omit "security restricted operation" sandbox | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 8.8 | null | null |
RHSA-2023:5950 | Red Hat Security Advisory: Red Hat OpenShift Service Mesh for 2.2.11 security update | golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487) | [
"cpe:/a:redhat:service_mesh:2.2::el8"
] | null | 7.5 | null | null |
RHSA-2021:3947 | Red Hat Security Advisory: rh-redis5-redis security update | redis: Lua scripts can overflow the heap-based Lua stack redis: Integer overflow issue with Streams redis: Integer overflow bug in the ziplist data structure redis: Denial of service via Redis Standard Protocol (RESP) request redis: Integer overflow issue with intsets redis: Integer overflow issue with strings | [
"cpe:/a:redhat:rhel_software_collections:3::el7"
] | null | 7.5 | null | null |
RHSA-2004:681 | Red Hat Security Advisory: samba security update | security flaw | [
"cpe:/o:redhat:enterprise_linux:2.1::as",
"cpe:/o:redhat:enterprise_linux:2.1::aw",
"cpe:/o:redhat:enterprise_linux:2.1::es",
"cpe:/o:redhat:enterprise_linux:2.1::ws"
] | null | null | null | null |
RHSA-2023:5924 | Red Hat Security Advisory: varnish security update | HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack) | [
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::crb"
] | null | 7.5 | null | null |
RHSA-2022:0441 | Red Hat Security Advisory: aide security update | aide: heap-based buffer overflow on outputs larger than B64_BUF | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 7.5 | null | null |
RHSA-2023:3622 | Red Hat Security Advisory: jenkins and jenkins-2-plugins security update | maven-shared-utils: Command injection via Commandline class plugin: CSRF vulnerability in Blue Ocean Plugin plugin: missing permission checks in Blue Ocean Plugin json-smart: Uncontrolled Resource Consumption vulnerability in json-smart (Resource Exhaustion) jettison: Uncontrolled Recursion in JSONArray springframework: Security Bypass With Un-Prefixed Double Wildcard Pattern springframework: Spring Expression DoS Vulnerability Jenkins: Temporary file parameter created with insecure permissions Jenkins: Information disclosure through error stack traces related to agents | [
"cpe:/a:redhat:ocp_tools:4.13::el8"
] | null | 5.3 | null | null |
RHSA-2010:0349 | Red Hat Security Advisory: acroread security update | Acroread: Multiple code execution flaws (APSB10-09) Acroread: Multiple code execution flaws (APSB10-09) Acroread: Multiple code execution flaws (APSB10-09) Acroread: Multiple code execution flaws (APSB10-09) Acroread: Multiple code execution flaws (APSB10-09) Acroread: Multiple code execution flaws (APSB10-09) Acroread: Multiple code execution flaws (APSB10-09) Acroread: Multiple code execution flaws (APSB10-09) Acroread: Multiple code execution flaws (APSB10-09) Acroread: Multiple code execution flaws (APSB10-09) Acroread: Multiple code execution flaws (APSB10-09) Acroread: Multiple code execution flaws (APSB10-09) Acroread: Multiple code execution flaws (APSB10-09) Acroread: Multiple code execution flaws (APSB10-09) Acroread: Heap-based overflow by opening a specially-crafted PDF file (FG-VD-10-005) | [
"cpe:/a:redhat:rhel_extras:4",
"cpe:/a:redhat:rhel_extras:5::client",
"cpe:/a:redhat:rhel_extras:5::server"
] | null | null | null | null |
RHSA-2017:0387 | Red Hat Security Advisory: kernel-rt security and bug fix update | kernel: kvm: x86: NULL pointer dereference during instruction decode kernel: Race condition in packet_set_ring leads to use after free kernel: State machine confusion bug in vfio driver leading to memory corruption kernel: Integer overflow when using kzalloc in vfio driver | [
"cpe:/a:redhat:rhel_extras_rt:7"
] | null | null | 5.3 | null |
RHSA-2022:7715 | Red Hat Security Advisory: libxml2 security update | libxml2: Incorrect server side include parsing can lead to XSS | [
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 6.1 | null | null |
RHSA-2023:1337 | Red Hat Security Advisory: firefox security update | Mozilla: Incorrect code generation during JIT compilation Mozilla: Potential out-of-bounds when accessing throttled streams Mozilla: Invalid downcast in Worklets Mozilla: URL being dragged from a removed cross-origin iframe into the same tab triggered navigation Mozilla: Memory safety bugs fixed in Firefox 111 and Firefox ESR 102.9 | [
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 8.8 | null | null |
RHSA-2016:1094 | Red Hat Security Advisory: Red Hat OpenShift Enterprise 3.2 security update | 3: Untrusted content loaded via the API proxy can access web console credentials on the same domain 3: s2i builds implicitly perform docker builds origin: pod update allows docker socket access via build-pod | [
"cpe:/a:redhat:openshift:3.2::el7"
] | null | null | null | null |
RHSA-2019:2964 | Red Hat Security Advisory: patch security update | patch: do_ed_script in pch.c does not block strings beginning with a ! character patch: OS shell command injection when processing crafted patch files | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 7.8 | null |
RHSA-2024:0785 | Red Hat Security Advisory: nss security update | nss: vulnerable to Minerva side-channel information leak | [
"cpe:/a:redhat:rhel_eus:8.8::appstream"
] | null | 4.3 | null | null |
RHSA-2023:7417 | Red Hat Security Advisory: kpatch-patch security update | kernel: Use-after-free vulnerability in the Linux Kernel traffic control index filter kernel: net/sched: cls_u32 component reference counter leak if tcf_change_indev() fails kernel: net/sched: cls_fw component can be exploited as result of failure in tcf_change_indev function kernel: netfilter: use-after-free due to improper element removal in nft_pipapo_remove() | [
"cpe:/o:redhat:rhel_e4s:8.2::baseos"
] | null | 7.8 | null | null |
RHSA-2015:1976 | Red Hat Security Advisory: kernel-rt security, bug fix, and enhancement update | kernel: fs: deadlock due to incorrect usage of rename_lock | [
"cpe:/a:redhat:enterprise_mrg:2:server:el6"
] | null | null | null | null |
RHSA-2020:4235 | Red Hat Security Advisory: chromium-browser security update | chromium-browser: Inappropriate implementation in networking chromium-browser: Use after free in payments chromium-browser: Use after free in Blink chromium-browser: Use after free in WebRTC chromium-browser: Use after free in NFC chromium-browser: Use after free in printing chromium-browser: Use after free in audio chromium-browser: Insufficient policy enforcement in extensions chromium-browser: Integer overflow in Blink chromium-browser: Integer overflow in SwiftShader chromium-browser: Use after free in WebXR chromium-browser: Insufficient data validation in dialogs chromium-browser: Insufficient data validation in navigation chromium-browser: Inappropriate implementation in V8 chromium-browser: Insufficient policy enforcement in Intents chromium-browser: Out of bounds read in audio chromium-browser: Side-channel information leakage in cache chromium-browser: Insufficient data validation in webUI chromium-browser: Insufficient policy enforcement in Omnibox chromium-browser: Inappropriate implementation in Blink chromium-browser: Integer overflow in media chromium-browser: Use after free in WebRTC chromium-browser: Insufficient policy enforcement in downloads chromium-browser: Uninitialized use in PDFium chromium-browser: Use after free in autofill chromium-browser: Use after free in password manager chromium-browser: Insufficient policy enforcement in networking | [
"cpe:/a:redhat:rhel_extras:6"
] | null | 8.8 | null | null |
RHSA-2020:3217 | Red Hat Security Advisory: grub2 security and bug fix update | grub2: Crafted grub.cfg file can lead to arbitrary code execution during boot process grub2: grub_malloc does not validate allocation size allowing for arithmetic overflow and subsequent heap-based buffer overflow grub2: Integer overflow in grub_squash_read_symlink may lead to heap-based buffer overflow grub2: Integer overflow read_section_as_string may lead to heap-based buffer overflow grub2: Integer overflow in grub_ext2_read_link leads to heap-based buffer overflow grub2: Fail kernel validation without shim protocol grub2: Use-after-free redefining a function whilst the same function is already executing grub2: Integer overflow in initrd size handling | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 5.7 | null | null |
RHSA-2023:1185 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.4 security update | Undertow: Infinite loop in SslConduit during close | [
"cpe:/a:redhat:jboss_enterprise_application_platform:7.4::el7",
"cpe:/a:redhat:jboss_enterprise_application_platform:7.4::el8",
"cpe:/a:redhat:jboss_enterprise_application_platform:7.4::el9"
] | null | 7.5 | null | null |
RHSA-2023:3147 | Red Hat Security Advisory: apr-util security update | apr-util: out-of-bounds writes in the apr_base64 | [
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 6.5 | null | null |
RHSA-2021:0873 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.3.6 security update | guava: local information disclosure via temporary directory created with unsafe permissions Undertow: Incomplete fix for CVE-2017-2666 due to permitting invalid characters in HTTP requests bouncycastle: password bypass in OpenBSDBCrypt.checkPassword utility possible jboss-remoting: Threads hold up forever in the EJB server by suppressing the ack from an EJB client undertow: Possible regression in fix for CVE-2020-10687 wildfly: Information disclosure due to publicly accessible privileged actions in JBoss EJB Client | [
"cpe:/a:redhat:jboss_enterprise_application_platform:7.3::el7"
] | null | 4.3 | 4.8 | null |
RHSA-2014:0380 | Red Hat Security Advisory: flash-plugin security update | flash-plugin: two flaws leading to code execution (APSB14-09) flash-plugin: two flaws leading to code execution (APSB14-09) flash-plugin: information disclosure flaw (APSB14-09) flash-plugin: cross-site scripting flaw (APSB14-09) | [
"cpe:/a:redhat:rhel_extras:5::client",
"cpe:/a:redhat:rhel_extras:5::server",
"cpe:/a:redhat:rhel_extras:6"
] | null | null | null | null |
RHSA-2014:0447 | Red Hat Security Advisory: flash-plugin security update | flash-plugin: buffer overflow vulnerability leads to arbitrary code execution (APSB14-13) | [
"cpe:/a:redhat:rhel_extras:5::client",
"cpe:/a:redhat:rhel_extras:5::server",
"cpe:/a:redhat:rhel_extras:6"
] | null | null | null | null |
RHSA-2013:1292 | Red Hat Security Advisory: kernel security and bug fix update | kernel: mm: use-after-free in madvise_remove() Kernel: signal: information leak in tkill/tgkill Kernel: net: panic while pushing pending data out of a IPv6 socket with UDP_CORK enabled | [
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2020:4305 | Red Hat Security Advisory: java-11-openjdk security and bug fix update | OpenJDK: High memory usage during deserialization of Proxy class with many interfaces (Serialization, 8236862) OpenJDK: Credentials sent over unencrypted LDAP connection (JNDI, 8237990) OpenJDK: Certificate blacklist bypass via alternate certificate encodings (Libraries, 8237995) OpenJDK: Integer overflow leading to out-of-bounds access (Hotspot, 8241114) OpenJDK: Missing permission check in path to URI conversion (Libraries, 8242680) OpenJDK: Incomplete check for invalid characters in URI to path conversion (Libraries, 8242685) OpenJDK: Race condition in NIO Buffer boundary checks (Libraries, 8244136) | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 5.3 | null | null |
RHSA-2013:0588 | Red Hat Security Advisory: gnutls security update | gnutls: TLS CBC padding timing attack (lucky-13) | [
"cpe:/o:redhat:enterprise_linux:5::server",
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2020:0721 | Red Hat Security Advisory: openstack-octavia security update | openstack-octavia: amphora-agent not requiring client certificate | [
"cpe:/a:redhat:openstack:15::el8"
] | null | null | 6.7 | null |
RHSA-2017:0328 | Red Hat Security Advisory: qemu-kvm-rhev security update | Qemu: display: cirrus: oob access while doing bitblt copy backward mode Qemu: display: cirrus: potential arbitrary code execution via cirrus_bitblt_cputovideo | [
"cpe:/a:redhat:openstack:10::el7"
] | null | null | 5.5 | null |
RHSA-2023:4570 | Red Hat Security Advisory: iperf3 security update | iperf3: memory allocation hazard and crash | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 7.5 | null | null |
RHSA-2014:1290 | Red Hat Security Advisory: Red Hat JBoss BRMS 6.0.3 update | HawtJNI: predictable temporary file name leading to local arbitrary code execution Java: XML eXternal Entity (XXE) flaw in ParserPool and Decrypter jboss-as-server: Unchecked access to MSC Service Registry under JSM EAP6: Plain text password logging during security audit 6: JSM policy not respected by deployed applications Xalan-Java: insufficient constraints in secure processing feature | [
"cpe:/a:redhat:jboss_brms:6.0"
] | null | null | null | null |
RHSA-2018:0059 | Red Hat Security Advisory: qemu-kvm-rhev security update | An update for qemu-kvm-rhev is now available for Red Hat OpenStack Platform 11.0 (Ocata).
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. | [
"cpe:/a:redhat:openstack:11::el7"
] | null | null | null | null |
RHSA-2023:3945 | Red Hat Security Advisory: open-vm-tools security update | open-vm-tools: authentication bypass vulnerability in the vgauth module | [
"cpe:/a:redhat:rhel_aus:8.2::appstream",
"cpe:/a:redhat:rhel_e4s:8.2::appstream",
"cpe:/a:redhat:rhel_tus:8.2::appstream"
] | null | 3.9 | null | null |
RHSA-2003:284 | Red Hat Security Advisory: sendmail security update | security flaw | [
"cpe:/o:redhat:enterprise_linux:2.1::as",
"cpe:/o:redhat:enterprise_linux:2.1::aw",
"cpe:/o:redhat:enterprise_linux:2.1::es",
"cpe:/o:redhat:enterprise_linux:2.1::ws"
] | null | null | null | null |
RHSA-2020:0980 | Red Hat Security Advisory: rh-postgresql10-postgresql security update | postgresql: Selectivity estimators bypass row security policies postgresql: Stack-based buffer overflow via setting a password postgresql: TYPE in pg_temp executes arbitrary SQL during SECURITY DEFINER execution postgresql: ALTER ... DEPENDS ON EXTENSION is missing authorization checks | [
"cpe:/a:redhat:rhel_software_collections:3::el7"
] | null | 3.1 | 7.5 | null |
RHSA-2016:0124 | Red Hat Security Advisory: jboss-ec2-eap security and enhancement update for EAP 6.4.6 | jakarta-taglibs-standard: XXE and RCE via XSL extension in JSTL XML tags | [
"cpe:/a:redhat:jboss_enterprise_application_platform:6::el6"
] | null | null | 7.6 | null |
RHSA-2022:1073 | Red Hat Security Advisory: openssl security update | openssl: Infinite loop in BN_mod_sqrt() reachable when parsing certificates | [
"cpe:/o:redhat:rhel_els:6"
] | null | 7.5 | null | null |
RHSA-2022:0826 | Red Hat Security Advisory: .NET 6.0 security and bugfix update | dotnet: ASP.NET Denial of Service via FormPipeReader dotnet: double parser stack buffer overrun | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 6.3 | null | null |
RHSA-2014:1626 | Red Hat Security Advisory: chromium-browser security update | v8: IPC and v8 issue fixed in Google Chrome 38.0.2125.101 chromium: OOB reads in PDFium fixed in Chrome 38.0.2125.101 chromium: multiple security fixes in Chrome 38.0.2125.101 chromium: multiple security fixes in Chrome 38.0.2125.101 chromium: use-after-free in DOM, fixed in Chrome 38.0.2125.101 chromium: multiple security fixes in Chrome 38.0.2125.101 chromium: use-after-free issue in Web Workers fixed in Chrome 38.0.2125.101 v8: information leak fixed in Google Chrome 38.0.2125.101 chromium: information leak in XSS Auditor fixed in Chrome 38.0.2125.101 chromium: OOB reads in PDFium fixed in Chrome 38.0.2125.101 chromium: multiple security fixes in Chrome 38.0.2125.101 chromium: multiple unspecified issues fixed in Chrome 38.0.2125.101 | [
"cpe:/a:redhat:rhel_extras:6"
] | null | null | null | null |
RHSA-2025:2876 | Red Hat Security Advisory: ACS 4.7 enhancement and security update | axios: exposure of confidential data stored in cookies | [
"cpe:/a:redhat:advanced_cluster_security:4.7::el8"
] | null | 6.5 | null | null |
RHSA-2021:1744 | Red Hat Security Advisory: sane-backends security update | sane-backends: NULL pointer dereference in sanei_epson_net_read function | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 5.7 | null | null |
RHSA-2024:0121 | Red Hat Security Advisory: container-tools:4.0 security update | golang: archive/tar: github.com/vbatts/tar-split: unbounded memory consumption when reading headers golang: net/http/httputil: ReverseProxy should not forward unparseable query parameters golang: net/http: handle server errors after sending GOAWAY golang: regexp/syntax: limit memory used by parsing regexps golang: crypto/tls: slow verification of certificate chains containing large RSA keys golang: html/template: improper handling of HTML-like comments within script contexts golang: html/template: improper handling of special tags within script contexts golang: crypto/tls: panic when processing post-handshake message on QUIC connections golang: crypto/tls: lack of a limit on buffered post-handshake | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 7.5 | null | null |
RHSA-2024:9677 | Red Hat Security Advisory: squid security update | squid: Denial of Service processing ESI response content | [
"cpe:/a:redhat:rhel_eus:9.2::appstream"
] | null | 7.5 | null | null |
RHSA-2024:4863 | Red Hat Security Advisory: httpd security update | httpd: Substitution encoding issue in mod_rewrite httpd: Improper escaping of output in mod_rewrite httpd: NULL pointer dereference in mod_proxy | [
"cpe:/a:redhat:rhel_e4s:9.0::appstream"
] | null | 7.5 | null | null |
RHSA-2024:1502 | Red Hat Security Advisory: grafana-pcp security update | golang-fips/openssl: Memory leaks in code encrypting and decrypting RSA payloads | [
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 7.5 | null | null |
RHSA-2024:8874 | Red Hat Security Advisory: haproxy security update | haproxy: untrimmed URI fragments may lead to exposure of confidential data on static servers | [
"cpe:/a:redhat:rhel_aus:8.6::appstream",
"cpe:/a:redhat:rhel_e4s:8.6::appstream",
"cpe:/a:redhat:rhel_tus:8.6::appstream"
] | null | 5.3 | null | null |
RHSA-2020:3184 | Red Hat Security Advisory: OpenShift Container Platform 4.3.31 openshift-enterprise-hyperkube-container security update | kubernetes: node localhost services reachable via martian packets | [
"cpe:/a:redhat:openshift:4.3::el7"
] | null | 5.4 | null | null |
RHSA-2022:0585 | Red Hat Security Advisory: Service Telemetry Framework 1.4 (sg-core-container) security update | golang: net/http: limit growth of header canonicalization cache | [
"cpe:/a:redhat:service_telemetry_framework:1.4::el8"
] | null | 7.5 | null | null |
RHSA-2022:5313 | Red Hat Security Advisory: curl security update | curl: OAUTH2 bearer bypass in connection re-use curl: credential leak on redirect curl: auth/cookie leak on redirect curl: TLS and SSH connection too eager reuse | [
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 7.5 | null | null |
RHSA-2015:1041 | Red Hat Security Advisory: Red Hat JBoss Fuse/A-MQ 6.1.0 update | Camel: XXE in via SAXSource expansion Camel: XXE via XPath expression evaluation | [
"cpe:/a:redhat:jboss_amq:6.1.0",
"cpe:/a:redhat:jboss_fuse:6.1.0"
] | null | null | null | null |
RHSA-2011:1385 | Red Hat Security Advisory: kdelibs and kdelibs3 security update | kdelibs: input validation failure in KSSL | [
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws",
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server",
"cpe:/o:redhat:enterprise_linux:6::server"
] | null | null | null | null |
RHSA-2023:5233 | Red Hat Security Advisory: OpenShift Virtualization 4.13.4 security and bug fix update | golang.org/x/net/http2: avoid quadratic complexity in HPACK decoding | [
"cpe:/a:redhat:container_native_virtualization:4.13::el9"
] | null | 7.5 | null | null |
RHSA-2007:0154 | Red Hat Security Advisory: php security update | security flaw security flaw security flaw | [
"cpe:/o:redhat:enterprise_linux:2.1::as",
"cpe:/o:redhat:enterprise_linux:2.1::aw",
"cpe:/o:redhat:enterprise_linux:2.1::es",
"cpe:/o:redhat:enterprise_linux:2.1::ws"
] | null | null | null | null |
RHSA-2017:3484 | Red Hat Security Advisory: Red Hat CloudForms security, bug fix, and enhancement update | CloudForms: lack of RBAC on various methods in web UI | [
"cpe:/a:redhat:cloudforms_managementengine:5.7::el7"
] | null | null | 6.5 | null |
RHSA-2022:7268 | Red Hat Security Advisory: Red Hat OpenStack Platform 13.0 (openvswitch2.11) security update | dpdk: DoS when a Vhost header crosses more than two descriptors and exhausts all mbufs | [
"cpe:/a:redhat:openstack:13::el7"
] | null | 8.6 | null | null |
RHSA-2003:279 | Red Hat Security Advisory: : Updated OpenSSH packages fix potential vulnerabilities | security flaw security flaw security flaw | [
"cpe:/o:redhat:linux:7.1",
"cpe:/o:redhat:linux:7.2",
"cpe:/o:redhat:linux:7.3",
"cpe:/o:redhat:linux:8.0",
"cpe:/o:redhat:linux:9"
] | null | null | null | null |
RHSA-2015:1890 | Red Hat Security Advisory: spice security update | spice: insufficient validation of surface_id parameter can cause crash spice: host memory access from guest using crafted images | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | null | null |
RHSA-2004:392 | Red Hat Security Advisory: php security update | security flaw security flaw | [
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws"
] | null | null | null | null |
RHSA-2022:1557 | Red Hat Security Advisory: mariadb:10.5 security, bug fix, and enhancement update | mysql: Server: DML unspecified vulnerability (CPU Apr 2021) mysql: Server: DML unspecified vulnerability (CPU Apr 2021) mysql: InnoDB unspecified vulnerability (CPU Jul 2021) mysql: InnoDB unspecified vulnerability (CPU Jul 2021) mysql: InnoDB unspecified vulnerability (CPU Oct 2021) mariadb: Crash in get_sort_by_table() in subquery with ORDER BY having outer ref mariadb: save_window_function_values triggers an abort during IN subquery mariadb: Crash in set_var.cc via certain UPDATE queries with nested subqueries mariadb: Crash caused by mishandling of a pushdown from a HAVING clause to a WHERE clause mariadb: Integer overflow in sql_lex.cc integer leading to crash mysql: InnoDB unspecified vulnerability (CPU Apr 2022) mariadb: crash in Used_tables_and_const_cache::used_tables_and_const_cache_join mariadb: improper locking due to unreleased lock in the ds_xbstream.cc mariadb: DoS due to improper locking due to unreleased lock in plugin/server_audit/server_audit.c | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 5.5 | null | null |
RHSA-2023:2258 | Red Hat Security Advisory: python-mako security update | python-mako: REDoS in Lexer class | [
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 7.5 | null | null |
RHSA-2023:5081 | Red Hat Security Advisory: librsvg2 security update | librsvg: Arbitrary file read when xinclude href has special characters | [
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 5.5 | null | null |
RHSA-2024:1959 | Red Hat Security Advisory: shim security update | shim: Out-of-bounds read printing error messages shim: RCE in http boot support may lead to Secure Boot bypass shim: Interger overflow leads to heap buffer overflow in verify_sbat_section on 32-bits systems shim: Out-of-bounds read in verify_buffer_authenticode() malformed PE file shim: Out-of-bound read in verify_buffer_sbat() shim: out of bounds read when parsing MZ binaries | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 5.1 | null | null |
RHSA-2021:3148 | Red Hat Security Advisory: .NET 5.0 security and bugfix update | dotnet: ASP.NET Core WebSocket frame processing DoS dotnet: Dump file created world-readable dotnet: ASP.NET Core JWT token logging | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 5.5 | null | null |
RHSA-2020:5655 | Red Hat Security Advisory: mariadb-connector-c security, bug fix, and enhancement update | mysql: C API unspecified vulnerability (CPU Jan 2020) mysql: C API unspecified vulnerability (CPU Apr 2020) mysql: C API unspecified vulnerability (CPU Apr 2020) mariadb-connector-c: Improper validation of content in a OK packet received from server mysql: C API unspecified vulnerability (CPU Jan 2021) | [
"cpe:/a:redhat:rhel_eus:8.2::appstream"
] | null | 3.7 | 3.7 | null |
RHSA-2020:4244 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.3.3 security update on RHEL 6 | cxf: JMX integration is vulnerable to a MITM attack picketbox: JBoss EAP reload to admin-only mode allows authentication bypass wildfly: XML validation manipulation due to incomplete application of use-grammar-pool-only in xercesImpl xnio: file descriptor leak caused by growing amounts of NIO Selector file handles may lead to DoS | [
"cpe:/a:redhat:jboss_enterprise_application_platform:7.3::el6"
] | null | 5.9 | null | null |
RHSA-2019:2979 | Red Hat Security Advisory: wget security update | wget: do_conversion() heap-based buffer overflow vulnerability | [
"cpe:/o:redhat:rhel_eus:7.5::computenode",
"cpe:/o:redhat:rhel_eus:7.5::server"
] | null | null | 8.8 | null |
RHSA-2023:4171 | Red Hat Security Advisory: java-17-openjdk security update | OpenJDK: HTTP client insufficient file name validation (8302475) OpenJDK: ZIP file parsing infinite loop (8302483) OpenJDK: weakness in AES implementation (8308682) OpenJDK: modulo operator array indexing issue (8304460) OpenJDK: array indexing integer overflow issue (8304468) OpenJDK: improper handling of slash characters in URI-to-path conversion (8305312) harfbuzz: allows attackers to trigger O(n^2) growth via consecutive marks | [
"cpe:/a:redhat:rhel_aus:8.4::appstream",
"cpe:/a:redhat:rhel_e4s:8.4::appstream",
"cpe:/a:redhat:rhel_tus:8.4::appstream"
] | null | 7.5 | null | null |
RHSA-2025:4263 | Red Hat Security Advisory: php:8.1 security update | php: Leak partial content of the heap through heap buffer over-read in mysqlnd php: Single byte overread with convert.quoted-printable-decode filter php: Configuring a proxy in a stream context might allow for CRLF injection in URIs php: Header parser of http stream wrapper does not handle folded headers php: libxml streams use wrong content-type header when requesting a redirected resource php: Streams HTTP wrapper does not fail for headers with invalid name and no colon php: Stream HTTP wrapper header check might omit basic auth header php: Stream HTTP wrapper truncates redirect location to 1024 bytes | [
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 5.3 | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.