id
stringlengths 13
15
| title
stringlengths 29
176
| description
stringlengths 8
32.1k
| cpes
sequencelengths 0
20
| cvss_v4_0
null | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
null |
---|---|---|---|---|---|---|---|
RHSA-2022:9079 | Red Hat Security Advisory: thunderbird security update | Mozilla: Quoting from an HTML email with certain tags will trigger network requests and load remote content, regardless of a configuration to block remote content Mozilla: Arbitrary file read from a compromised content process Mozilla: Drag and Dropped Filenames could have been truncated to malicious extensions Mozilla: Memory safety bugs fixed in Firefox ESR 102.6 and Thunderbird 102.6 Mozilla: Use-after-free in WebGL Mozilla: Memory corruption in WebGL Mozilla: Use-after-free in WebGL | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 8.1 | null | null |
RHSA-2024:8374 | Red Hat Security Advisory: python3.11 security update | python: cpython: tarfile: ReDos via excessive backtracking while parsing header values | [
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::crb"
] | null | 7.5 | null | null |
RHSA-2016:1649 | Red Hat Security Advisory: Red Hat JBoss Web Server 2.1.1 security update on RHEL 6 | openssl: EVP_EncodeUpdate overflow openssl: EVP_EncryptUpdate overflow mod_cluster: remotely Segfault Apache http server HTTPD: sets environmental variable based on user supplied Proxy request header | [
"cpe:/a:redhat:jboss_enterprise_web_server:2::el6"
] | null | null | 5 | null |
RHSA-2024:3066 | Red Hat Security Advisory: exempi security update | exempi: denial of service via opening of crafted audio file with ID3V2 frame exempi: denial of service via opening of crafted webp file | [
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb"
] | null | 6.5 | null | null |
RHSA-2022:6457 | Red Hat Security Advisory: python3 security update | python: mailcap: findmatch() function does not sanitize the second argument python: urllib.parse does not sanitize URLs containing ASCII newline and tabs | [
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 5.3 | null | null |
RHSA-2015:2623 | Red Hat Security Advisory: grub2 security and bug fix update | grub2: buffer overflow when checking password entered during bootup | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | null | null |
RHSA-2024:0138 | Red Hat Security Advisory: idm:DL1 security update | ipa: Invalid CSRF protection | [
"cpe:/a:redhat:rhel_aus:8.4::appstream",
"cpe:/a:redhat:rhel_e4s:8.4::appstream",
"cpe:/a:redhat:rhel_tus:8.4::appstream"
] | null | 6.5 | null | null |
RHSA-2022:5187 | Red Hat Security Advisory: Red Hat OpenShift GitOps security update | argocd: vulnerable to an uncontrolled memory consumption bug argocd: vulnerable to a variety of attacks when an SSO login is initiated from the Argo CD CLI or the UI. argocd: cross-site scripting (XSS) allow a malicious user to inject a javascript link in the UI argocd: vulnerable to a symlink following bug allowing a malicious user with repository write access | [
"cpe:/a:redhat:openshift_gitops:1.3::el8"
] | null | 4.3 | null | null |
RHSA-2023:7401 | Red Hat Security Advisory: linux-firmware security update | amd: Return Address Predictor vulnerability leading to information disclosure hw: amd: Cross-Process Information Leak | [
"cpe:/o:redhat:rhel_eus:8.6::baseos"
] | null | 6.5 | null | null |
RHSA-2023:3189 | Red Hat Security Advisory: emacs security update | emacs: command injection vulnerability in org-mode | [
"cpe:/a:redhat:rhel_e4s:8.1::appstream",
"cpe:/o:redhat:rhel_e4s:8.1::baseos"
] | null | 7.8 | null | null |
RHSA-2019:2097 | Red Hat Security Advisory: perl-Archive-Tar security update | perl: Directory traversal in Archive::Tar | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 5.4 | null |
RHSA-2019:2205 | Red Hat Security Advisory: tomcat security, bug fix, and enhancement update | tomcat: Incorrect handling of empty string URL in security constraints can lead to unintended exposure of resources tomcat: Late application of security constraints can lead to resource exposure for unauthorised users tomcat: Insecure defaults in CORS filter enable 'supportsCredentials' for all origins tomcat: Host name verification missing in WebSocket client | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 4.3 | null |
RHSA-2016:0266 | Red Hat Security Advisory: openstack-heat bug fix and security advisory | openstack-heat: Vulnerability in Heat template validation leading to DoS | [
"cpe:/a:redhat:openstack:7::el7"
] | null | null | null | null |
RHSA-2023:5998 | Red Hat Security Advisory: python39:3.9 and python39-devel:3.9 security update | python: TLS handshake bypass | [
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb"
] | null | 8.6 | null | null |
RHSA-2020:1227 | Red Hat Security Advisory: podman security, bug fix, and enhancement update | podman: resolving symlink in host filesystem leads to unexpected results of copy operation containers/image: Container images read entire image manifest into memory | [
"cpe:/a:redhat:rhel_extras_other:7"
] | null | 3.5 | 2.5 | null |
RHSA-2010:0478 | Red Hat Security Advisory: Red Hat Enterprise Virtualization Manager security update | rhev-m: merge snapshot does not pass postzero parameter for deleted volumes | [
"cpe:/a:redhat:enterprise_linux:5::hypervisor"
] | null | null | null | null |
RHSA-2005:198 | Red Hat Security Advisory: xorg-x11 security update | libxpm buffer overflow | [
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2023:4176 | Red Hat Security Advisory: java-1.8.0-openjdk security and bug fix update | OpenJDK: array indexing integer overflow issue (8304468) OpenJDK: improper handling of slash characters in URI-to-path conversion (8305312) | [
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb"
] | null | 3.7 | null | null |
RHSA-2012:1593 | Red Hat Security Advisory: JBoss Enterprise SOA Platform 5.3.0 update | apache-cxf: Apache CXF does not verify that elements were signed / encrypted by a particular Supporting Token | [
"cpe:/a:redhat:jboss_enterprise_soa_platform:5.3"
] | null | null | null | null |
RHSA-2023:3564 | Red Hat Security Advisory: thunderbird security update | Mozilla: Click-jacking certificate exceptions through rendering lag Mozilla: Memory safety bugs fixed in Firefox 114 and Firefox ESR 102.12 | [
"cpe:/a:redhat:rhel_e4s:8.1::appstream"
] | null | 9.8 | null | null |
RHSA-2018:2566 | Red Hat Security Advisory: rh-postgresql96-postgresql security update | postgresql: Memory disclosure in JSON functions postgresql: INSERT ... ON CONFLICT DO UPDATE fails to enforce SELECT privileges postgresql: pg_upgrade creates file of sensitive metadata under prevailing umask postgresql: Uncontrolled search path element in pg_dump and other client applications postgresql: Too-permissive access control list on function pg_logfile_rotate() postgresql: Certain host connection parameters defeat client-side security defenses postgresql: Missing authorization and memory disclosure in INSERT ... ON CONFLICT DO UPDATE statements | [
"cpe:/a:redhat:rhel_software_collections:3::el6",
"cpe:/a:redhat:rhel_software_collections:3::el7"
] | null | null | 7.1 | null |
RHSA-2017:2636 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 6.4.17 update on RHEL 7 | log4j: Socket receiver deserialization vulnerability tomcat: Security constrained bypass in error page mechanism jackson-databind: Deserialization vulnerability via readValue method of ObjectMapper | [
"cpe:/a:redhat:jboss_enterprise_application_platform:6::el7"
] | null | null | 8.1 | null |
RHSA-2019:3860 | Red Hat Security Advisory: redhat-release-virtualization-host and redhat-virtualization-host update | hw: Machine Check Error on Page Size Change (IFU) hw: TSX Transaction Asynchronous Abort (TAA) | [
"cpe:/o:redhat:enterprise_linux:7::hypervisor"
] | null | null | 6.5 | null |
RHSA-2021:0110 | Red Hat Security Advisory: Red Hat Integration Tech-Preview 2 Camel K security update | postgresql-jdbc: XML external entity (XXE) vulnerability in PgSQLXML | [
"cpe:/a:redhat:integration:1"
] | null | 7.7 | null | null |
RHSA-2021:0874 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.3.6 security update | guava: local information disclosure via temporary directory created with unsafe permissions Undertow: Incomplete fix for CVE-2017-2666 due to permitting invalid characters in HTTP requests bouncycastle: password bypass in OpenBSDBCrypt.checkPassword utility possible jboss-remoting: Threads hold up forever in the EJB server by suppressing the ack from an EJB client undertow: Possible regression in fix for CVE-2020-10687 wildfly: Information disclosure due to publicly accessible privileged actions in JBoss EJB Client | [
"cpe:/a:redhat:jboss_enterprise_application_platform:7.3::el8"
] | null | 4.3 | 4.8 | null |
RHSA-2020:3227 | Red Hat Security Advisory: grub2 security update | grub2: Crafted grub.cfg file can lead to arbitrary code execution during boot process grub2: grub_malloc does not validate allocation size allowing for arithmetic overflow and subsequent heap-based buffer overflow grub2: Integer overflow in grub_squash_read_symlink may lead to heap-based buffer overflow grub2: Integer overflow read_section_as_string may lead to heap-based buffer overflow grub2: Integer overflow in grub_ext2_read_link leads to heap-based buffer overflow grub2: Fail kernel validation without shim protocol grub2: Use-after-free redefining a function whilst the same function is already executing grub2: Integer overflow in initrd size handling | [
"cpe:/o:redhat:rhel_e4s:8.0::baseos"
] | null | 5.7 | null | null |
RHSA-2020:4908 | Red Hat Security Advisory: libX11 security update | libX11: integer overflow leads to double free in locale handling | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 7.8 | null | null |
RHSA-2020:5164 | Red Hat Security Advisory: thunderbird security update | Mozilla: Write side effects in MCallGetProperty opcode not accounted for | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | 8.8 | null |
RHSA-2021:3945 | Red Hat Security Advisory: redis:6 security update | redis: Lua scripts can overflow the heap-based Lua stack redis: Integer overflow issue with Streams redis: Integer overflow bug in the ziplist data structure redis: Denial of service via Redis Standard Protocol (RESP) request redis: Integer overflow issue with intsets redis: Integer overflow issue with strings | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 7.5 | null | null |
RHSA-2011:0266 | Red Hat Security Advisory: fence security, bug fix, and enhancement update | cman/fence: insecure temporary file usage in the egenera fence agent cman/fence: insecure temporary file usage in the apc fence agents | [
"cpe:/a:redhat:rhel_cluster:4"
] | null | null | null | null |
RHSA-2022:5894 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.4.6 Security update. | minimist: prototype pollution netty: world readable temporary file containing sensitive data com.google.code.gson-gson: Deserialization of Untrusted Data in com.google.code.gson-gson | [
"cpe:/a:redhat:jboss_enterprise_application_platform:7.4::el9"
] | null | 7.5 | null | null |
RHSA-2024:1093 | Red Hat Security Advisory: frr security update | ffr: Flowspec overflow in bgpd/bgp_flowspec.c ffr: Out of bounds read in bgpd/bgp_label.c frr: crash from specially crafted MP_UNREACH_NLRI-containing BGP UPDATE message frr: crash from malformed EOR-containing BGP UPDATE message | [
"cpe:/a:redhat:rhel_eus:9.2::appstream"
] | null | 7.5 | null | null |
RHSA-2006:0608 | Red Hat Security Advisory: seamonkey security update | security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw vulnerabilities: CVE-2006-{3113,3677,3801-3812} | [
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws"
] | null | null | null | null |
RHSA-2016:2749 | Red Hat Security Advisory: rh-mysql56-mysql security update | mysql: unspecified vulnerability in subcomponent: Server: Optimizer (CPU October 2016) mysql: unspecified vulnerability in subcomponent: Server: InnoDB (CPU October 2016) mysql: race condition while setting stats during MyISAM table repair (CPU Oct 2016) mysql: insecure error log file handling in mysqld_safe (CPU Oct 2016) mysql: unspecified vulnerability in subcomponent: Server: GIS (CPU October 2016) mysql: unspecified vulnerability in subcomponent: Server: Federated (CPU October 2016) mysql: general_log can write to configuration files, leading to privilege escalation (CPU Oct 2016) mysql: race condition while setting stats during MyISAM table repair (CPU Oct 2016) mysql: insecure error log file handling in mysqld_safe (CPU Oct 2016) mysql: unspecified vulnerability in subcomponent: Server: Types (CPU October 2016) | [
"cpe:/a:redhat:rhel_software_collections:2::el6",
"cpe:/a:redhat:rhel_software_collections:2::el7"
] | null | null | 4.3 | null |
RHSA-2013:1136 | Red Hat Security Advisory: rubygem-passenger security update | rubygem-passenger: incorrect temporary file usage rubygem-passenger: insecure temporary directory usage due to reuse of existing server instance directories | [
"cpe:/a:redhat:openshift:1.2::el6"
] | null | null | null | null |
RHSA-2022:6224 | Red Hat Security Advisory: openssl security and bug fix update | openssl: c_rehash script allows command injection openssl: Signer certificate verification returns inaccurate response when using OCSP_NOCHECKS openssl: OPENSSL_LH_flush() breaks reuse of memory openssl: the c_rehash script allows command injection openssl: AES OCB fails to encrypt some bytes | [
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/o:redhat:enterprise_linux:9::baseos"
] | null | 5.3 | null | null |
RHSA-2023:1677 | Red Hat Security Advisory: Red Hat Virtualization Host 4.4.z SP 1 security update batch#5 (oVirt-4.5.3-5) | git: gitattributes parsing integer overflow git: Heap overflow in `git archive`, `git log --format` leading to RCE ALSA: pcm: Move rwsem lock inside snd_ctl_elem_read to prevent UAF kernel: FUSE filesystem low-privileged user privileges escalation nss: Arbitrary memory write via PKCS 12 | [
"cpe:/o:redhat:rhev_hypervisor:4.4::el8"
] | null | 8.8 | null | null |
RHSA-2022:5997 | Red Hat Security Advisory: Red Hat Ceph Storage Security, Bug Fix, and Enhancement Update | ceph: user/tenant can obtain access (read/write) to any share | [
"cpe:/a:redhat:ceph_storage:5.2::el8",
"cpe:/a:redhat:ceph_storage:5.2::el9"
] | null | 8.1 | null | null |
RHBA-2019:4199 | Red Hat Bug Fix Advisory: CloudForms 5.0 bug fix and enhancement update | bootstrap: XSS in the data-target attribute qpid-proton: TLS Man in the Middle Vulnerability | [
"cpe:/a:redhat:cloudforms_managementengine:5.11::el8"
] | null | null | 7.4 | null |
RHSA-2022:1438 | Red Hat Security Advisory: OpenJDK 8u332 security update for Portable Linux Builds | OpenJDK: Unbounded memory allocation when compiling crafted XPath expressions (JAXP, 8270504) OpenJDK: Improper object-to-string conversion in AnnotationInvocationHandler (Libraries, 8277672) OpenJDK: Missing check for negative ObjectIdentifier (Libraries, 8275151) OpenJDK: Defective secure validation in Apache Santuario (Libraries, 8278008) OpenJDK: URI parsing inconsistencies (JNDI, 8278972) | [
"cpe:/a:redhat:openjdk:1.8"
] | null | 5.3 | null | null |
RHSA-2024:1530 | Red Hat Security Advisory: expat security update | expat: parsing large tokens can trigger a denial of service expat: XML Entity Expansion | [
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/o:redhat:enterprise_linux:9::baseos"
] | null | 7.5 | null | null |
RHSA-2024:9915 | Red Hat Security Advisory: gnome-shell security update | gnome-shell: code execution in portal helper | [
"cpe:/a:redhat:rhel_eus:9.4::appstream"
] | null | 7.5 | null | null |
RHSA-2024:1464 | Red Hat Security Advisory: OpenShift Container Platform 4.11.59 bug fix and security update | golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487) | [
"cpe:/a:redhat:openshift:4.11::el8"
] | null | 7.5 | null | null |
RHSA-2023:3355 | Red Hat Security Advisory: Red Hat JBoss Core Services Apache HTTP Server 2.4.51 SP2 security update | httpd: mod_dav: out-of-bounds read/write of zero byte openssl: timing attack in RSA Decryption implementation openssl: double free after calling PEM_read_bio_ex apr-util: out-of-bounds writes in the apr_base64 curl: HSTS bypass via IDN curl: Use-after-free triggered by an HTTP proxy deny response expat: use-after free caused by overeager destruction of a shared DTD in XML_ExternalEntityParserCreate openssl: use-after-free following BIO_new_NDEF openssl: X.400 address type confusion in X.509 GeneralName curl: HSTS ignored on multiple requests curl: HSTS amnesia with --parallel curl: HTTP multi-header compression denial of service httpd: HTTP request splitting with mod_rewrite and mod_proxy curl: TELNET option IAC injection curl: SFTP path ~ resolving discrepancy | [
"cpe:/a:redhat:jboss_core_services:1"
] | null | 3.7 | null | null |
RHSA-2020:4158 | Red Hat Security Advisory: thunderbird security update | Mozilla: Memory safety bugs fixed in Firefox 81 and Firefox ESR 78.3 Mozilla: XSS when pasting attacker-controlled data into a contenteditable element Mozilla: Download origin spoofing via redirect Mozilla: When recursing through layers while scrolling, an iterator may have become invalid, resulting in a potential use-after-free scenario | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | 8.8 | 6.1 | null |
RHSA-2008:0191 | Red Hat Security Advisory: redhat-idm-console security update | server: insecure permissions on fedora/redhat-idm-console | [
"cpe:/a:redhat:directory_server:8::el4",
"cpe:/a:redhat:directory_server:8::el5"
] | null | null | null | null |
RHSA-2023:5719 | Red Hat Security Advisory: go-toolset-1.19 and go-toolset-1.19-golang security update | golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487) HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack) | [
"cpe:/a:redhat:devtools:2023::el7"
] | null | 7.5 | null | null |
RHSA-2012:1375 | Red Hat Security Advisory: rhev-hypervisor6 security and bug fix update | kernel: sfc: potential remote denial of service through TCP MSS option | [
"cpe:/o:redhat:enterprise_linux:6::hypervisor"
] | null | null | null | null |
RHSA-2019:2698 | Red Hat Security Advisory: bind security update | bind: Limiting simultaneous TCP clients is ineffective | [
"cpe:/o:redhat:rhel_eus:7.4::computenode",
"cpe:/o:redhat:rhel_eus:7.4::server"
] | null | null | 8.6 | null |
RHSA-2015:0323 | Red Hat Security Advisory: libvirt security, bug fix, and enhancement update | libvirt: local denial of service in qemu/qemu_driver.c libvirt: missing ACL check for the VIR_DOMAIN_XML_SECURE flag in save images and snapshots objects | [
"cpe:/a:redhat:storage:3.1:server:el7",
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::hypervisor",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | null | null |
RHSA-2017:2930 | Red Hat Security Advisory: kernel security and bug fix update | kernel: net: Out of bounds stack read in memcpy_fromiovec kernel: Out-of-bounds heap access in xfrm kernel: Possible heap buffer overflow in brcmf_cfg80211_mgmt_tx() kernel: Integer overflow in ip6_find_1stfragopt() causes infinite loop kernel: Out of bounds read in inet_diag_msg_sctp{,l}addr_fill() and sctp_get_sctp_info() in SCTP stack kernel: Use-after-free in sys_mq_notify() kernel: Divide-by-zero in __tcp_select_window kernel: Heap out-of-bounds read in AF_PACKET sockets kernel: Exploitable memory corruption due to UFO to non-UFO path switch | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 7 | null |
RHSA-2007:1016 | Red Hat Security Advisory: samba security update | samba incorrect primary group assignment for domain users using the rfc2307 or sfu winbind nss info plugin samba buffer overflow Samba "reply_netbios_packet()" Buffer Overflow Vulnerability | [
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2024:1880 | Red Hat Security Advisory: nodejs:18 security update | nodejs: vulnerable to timing variant of the Bleichenbacher attack against PKCS#1 v1.5 padding (Marvin) nodejs: code injection and privilege escalation through Linux capabilities nodejs: reading unprocessed HTTP request with unbounded chunk extension allows DoS attacks | [
"cpe:/a:redhat:rhel_eus:8.8::appstream"
] | null | 7.5 | null | null |
RHSA-2022:1287 | Red Hat Security Advisory: firefox security update | Mozilla: Use-after-free in NSSToken objects Mozilla: Use-after-free after VR Process destruction Mozilla: Denial of Service via complex regular expressions Mozilla: Out of bounds write due to unexpected WebAuthN Extensions Mozilla: Use-after-free in DocumentL10n::TranslateDocument Mozilla: Incorrect AliasSet used in JIT Codegen Mozilla: iframe contents could be rendered outside the border Mozilla: Memory safety bugs fixed in Firefox 99 and Firefox ESR 91.8 | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 8.8 | 6.1 | null |
RHSA-2024:10813 | Red Hat Security Advisory: OpenShift Container Platform 4.13.54 bug fix and security update | golang-github-gin-gonic-gin: Improper Input Validation golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487) openshift-console: OAuth2 insufficient state parameter entropy QEMU: Denial of Service via Improper Synchronization in QEMU NBD Server During Socket Closure | [
"cpe:/a:redhat:openshift:4.13::el8",
"cpe:/a:redhat:openshift:4.13::el9"
] | null | 8 | 7.5 | null |
RHSA-2024:4179 | Red Hat Security Advisory: pki-core security update | ca: token authentication bypass vulnerability | [
"cpe:/a:redhat:rhel_eus:8.8::appstream"
] | null | 7.5 | null | null |
RHSA-2024:1490 | Red Hat Security Advisory: firefox security update | nss: timing attack against RSA decryption Mozilla: Crash in NSS TLS method Mozilla: JIT code failed to save return registers on Armv7-A Mozilla: Integer overflow could have led to out of bounds write Mozilla: Improper handling of html and body tags enabled CSP nonce leakage Mozilla: Clickjacking vulnerability could have led to a user accidentally granting permissions Mozilla: Self referencing object could have potentially led to a use-after-free Mozilla: Memory safety bugs fixed in Firefox 124, Firefox ESR 115.9, and Thunderbird 115.9 Mozilla: Improve handling of out-of-memory conditions in ICU Mozilla: Privileged JavaScript Execution via Event Handlers | [
"cpe:/a:redhat:rhel_aus:8.2::appstream",
"cpe:/a:redhat:rhel_e4s:8.2::appstream",
"cpe:/a:redhat:rhel_tus:8.2::appstream"
] | null | 8.8 | null | null |
RHSA-2023:6802 | Red Hat Security Advisory: xorg-x11-server security update | xorg-x11-server: Out-of-bounds write in XIChangeDeviceProperty/RRChangeOutputProperty | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 7.8 | null | null |
RHSA-2003:399 | Red Hat Security Advisory: rsync security update | security flaw | [
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws"
] | null | null | null | null |
RHSA-2023:5185 | Red Hat Security Advisory: thunderbird security update | libwebp: Heap buffer overflow in WebP Codec libwebp: out-of-bounds write with a specially crafted WebP lossless file | [
"cpe:/a:redhat:rhel_aus:8.4::appstream",
"cpe:/a:redhat:rhel_e4s:8.4::appstream",
"cpe:/a:redhat:rhel_tus:8.4::appstream"
] | null | 0 | null | null |
RHSA-2018:2768 | Red Hat Security Advisory: nss security update | nss: ServerHello.random is all zeros when handling a v2-compatible ClientHello | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 4.8 | null |
RHSA-2023:4090 | Red Hat Security Advisory: OpenShift Container Platform 4.13.5 security update | golang: net/http: excessive memory growth in a Go server accepting HTTP/2 requests golang.org/x/net/http2: avoid quadratic complexity in HPACK decoding | [
"cpe:/a:redhat:openshift:4.13::el8"
] | null | 7.5 | null | null |
RHSA-2016:0623 | Red Hat Security Advisory: samba security update | samba: Man-in-the-middle attacks possible with NTLMSSP authentication samba: Spoofing vulnerability when domain controller is configured samba: SAMR and LSA man in the middle attacks | [
"cpe:/o:redhat:rhel_aus:5.9",
"cpe:/o:redhat:rhel_mission_critical:5.6"
] | null | null | null | null |
RHSA-2024:9960 | Red Hat Security Advisory: OpenShift API for Data Protection (OADP) 1.3.4 security and bug fix update | containers/image: digest type does not guarantee valid type net/http: Denial of service due to improper 100-continue handling in net/http go/parser: golang: Calling any of the Parse functions containing deeply nested literals can cause a panic/stack exhaustion encoding/gob: golang: Calling Decoder.Decode on a message which contains deeply nested structures can cause a panic due to stack exhaustion go/build/constraint: golang: Calling Parse on a "// +build" build tag line with deeply nested expressions can cause a panic due to stack exhaustion | [
"cpe:/a:redhat:openshift_api_data_protection:1.3::el9"
] | null | 5.9 | null | null |
RHSA-2003:168 | Red Hat Security Advisory: : : : Updated kerberos packages fix various vulnerabilities | security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw | [
"cpe:/o:redhat:linux:7.1"
] | null | null | null | null |
RHSA-2016:2042 | Red Hat Security Advisory: python-django security update | python-django: CSRF protection bypass on a site with Google Analytics | [
"cpe:/a:redhat:openstack:8::el7"
] | null | null | 6.1 | null |
RHSA-2019:1840 | Red Hat Security Advisory: java-1.7.0-openjdk security update | OpenJDK: Side-channel attack risks in Elliptic Curve (EC) cryptography (Security, 8208698) OpenJDK: Insufficient checks of suppressed exceptions in deserialization (Utilities, 8212328) OpenJDK: Unbounded memory allocation during deserialization in Collections (Utilities, 8213432) OpenJDK: Insufficient restriction of privileges in AccessController (Security, 8216381) OpenJDK: Missing URL format validation (Networking, 8221518) OpenJDK: Missing array bounds check in crypto providers (JCE, 8223511) | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | 3.7 | null |
RHSA-2024:7261 | Red Hat Security Advisory: osbuild-composer security update | encoding/gob: golang: Calling Decoder.Decode on a message which contains deeply nested structures can cause a panic due to stack exhaustion | [
"cpe:/a:redhat:rhel_aus:8.6::appstream",
"cpe:/a:redhat:rhel_e4s:8.6::appstream",
"cpe:/a:redhat:rhel_tus:8.6::appstream"
] | null | 7.5 | null | null |
RHSA-2024:10147 | Red Hat Security Advisory: OpenShift Container Platform 4.16.24 security update | Podman: Buildah: cri-o: FIPS Crypto-Policy Directory Mounting Issue in containers/common Go Library Buildah: Podman: Improper Input Validation in bind-propagation Option of Dockerfile RUN --mount Instruction golang-protobuf: encoding/protojson, internal/encoding/json: infinite loop in protojson.Unmarshal when unmarshaling certain forms of invalid JSON | [
"cpe:/a:redhat:openshift:4.16::el9"
] | null | 5.9 | null | null |
RHSA-2022:0407 | Red Hat Security Advisory: Red Hat Single Sign-On 7.5.1 security update | undertow: client side invocation timeout raised when calling over HTTP2 keycloak-services: POST based reflected Cross Site Scripting vulnerability | [
"cpe:/a:redhat:red_hat_single_sign_on:7"
] | null | 6.1 | null | null |
RHSA-2022:1766 | Red Hat Security Advisory: libreoffice security, bug fix, and enhancement update | libreoffice: Content Manipulation with Double Certificate Attack libreoffice: Timestamp Manipulation with Signature Wrapping libreoffice: Content Manipulation with Certificate Validation Attack | [
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb"
] | null | 6.3 | null | null |
RHSA-2016:2997 | Red Hat Security Advisory: Red Hat Enterprise Linux 5 Three-Month Retirement Notice | This is the Three-Month notification for the retirement of Red Hat Enterprise Linux 5. This notification applies only to those customers subscribed to the channel for Red Hat Enterprise Linux 5. | [
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2011:0370 | Red Hat Security Advisory: wireshark security update | wireshark: stack overflow in BER dissector wireshark: heap-based buffer overflow in wireshark < 1.2 when reading malformed capture files Wireshark: memory corruption when reading a malformed pcap file (upstream bug #5652) Wireshark: Denial Of Service (application crash) via a pcap-ng file that contains a large packet-length field Wireshark: Multiple stack consumption vulnerabilities caused DoS via crafted SMB or CLDAP packet Wireshark: Malformed LDAP filter string causes Denial of Service via excessive memory consumption Wireshark: Null pointer dereference causing application crash when reading malformed pcap file | [
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2023:1014 | Red Hat Security Advisory: Red Hat OpenStack Platform 17.0 (etcd) security update | go-yaml: Improve heuristics preventing CPU/memory abuse by parsing malicious or large YAML documents | [
"cpe:/a:redhat:openstack:17.0::el9"
] | null | 7.5 | null | null |
RHSA-2023:0804 | Red Hat Security Advisory: Red Hat OpenShift GitOps security update | goutils: RandomAlphaNumeric and CryptoRandomAlphaNumeric are not as random as they should be go-yaml: Improve heuristics preventing CPU/memory abuse by parsing malicious or large YAML documents ArgoCD: Users with any cluster secret update access may update out-of-bounds cluster secrets | [
"cpe:/a:redhat:openshift_gitops:1.5::el8"
] | null | 9.1 | null | null |
RHSA-2015:0850 | Red Hat Security Advisory: Red Hat JBoss BRMS 6.1.0 update | CXF: SSL hostname verification bypass, incomplete CVE-2012-5783 fix WS: EJB3 role restrictions are not applied to jaxws handlers Java: Java XML Signature DoS Attack async-http-client: SSL/TLS certificate verification is disabled under certain conditions async-http-client: missing hostname verification for SSL certificates CXF: The SecurityTokenService accepts certain invalid SAML Tokens as valid CXF: UsernameTokens are sent in plaintext with a Symmetric EncryptBeforeSigning policy JBossSX/PicketBox: World readable audit.log file CXF: HTML content posted to SOAP endpoint could cause OOM errors CXF: Large invalid content could cause temporary space to fill CXF: SSL hostname verification bypass, incomplete CVE-2012-6153 fix CXF: Improper security semantics enforcement of SAML SubjectConfirmation methods Security: Wrong security context loaded when using SAML2 STS Login Module RESTeasy: External entities expanded by DocumentProvider Weld: Limited information disclosure via stale thread state jBPM: BPMN2 file processing XXE in Process Execution | [
"cpe:/a:redhat:jboss_brms:6.0"
] | null | null | 4.8 | null |
RHSA-2011:0840 | Red Hat Security Advisory: dhcp security update | dhclient: insufficient sanitization of certain DHCP response values | [
"cpe:/o:redhat:rhel_els:3::as",
"cpe:/o:redhat:rhel_els:3::es"
] | null | null | null | null |
RHSA-2016:0212 | Red Hat Security Advisory: kernel-rt security, bug fix, and enhancement update | kernel: x86-64: IRET faults during NMIs processing kernel: Keyrings crash triggerable by unprivileged user | [
"cpe:/a:redhat:rhel_extras_rt:7"
] | null | null | null | null |
RHSA-2024:2084 | Red Hat Security Advisory: container-tools:4.0 security update | buildah: full container escape at build time | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 8.6 | null | null |
RHSA-2012:0474 | Red Hat Security Advisory: tomcat5 security update | tomcat: hash table collisions CPU usage DoS (oCERT-2011-003) tomcat: large number of parameters DoS | [
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2021:1258 | Red Hat Security Advisory: 389-ds:1.4 security and bug fix update | 389-ds-base: information disclosure during the binding of a DN | [
"cpe:/a:redhat:rhel_eus:8.2::appstream"
] | null | 5.3 | null | null |
RHBA-2020:2804 | Red Hat Bug Fix Advisory: OpenShift Container Platform 4.3.28 packages update | python-urllib3: CRLF injection due to not encoding the '\r\n' sequence leading to possible attack on internal service python-urllib3: Certification mishandle when error should be thrown | [
"cpe:/a:redhat:openshift:4.3::el7",
"cpe:/a:redhat:openshift:4.3::el8"
] | null | null | 7.5 | null |
RHSA-2013:1353 | Red Hat Security Advisory: sudo security and bug fix update | sudo: authentication bypass via reset system clock sudo: bypass of tty_tickets constraints sudo: bypass of tty_tickets constraints | [
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2017:3200 | Red Hat Security Advisory: kernel security and bug fix update | kernel: Divide-by-zero in __tcp_select_window kernel: Heap out-of-bounds read in AF_PACKET sockets kernel: Exploitable memory corruption due to UFO to non-UFO path switch | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | 7 | null |
RHSA-2005:751 | Red Hat Security Advisory: openldap and nss_ldap security update | security flaw security flaw | [
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws"
] | null | null | null | null |
RHSA-2020:5086 | Red Hat Security Advisory: rh-nodejs12-nodejs security update | nodejs-dot-prop: prototype pollution nodejs: HTTP request smuggling due to CR-to-Hyphen conversion libuv: buffer overflow in realpath npm: sensitive information exposure through logs | [
"cpe:/a:redhat:rhel_software_collections:3::el7"
] | null | 4.4 | null | null |
RHSA-2025:3264 | Red Hat Security Advisory: kernel-rt security update | kernel: arm64: cacheinfo: Avoid out-of-bounds write to cacheinfo array | [
"cpe:/a:redhat:enterprise_linux:8::nfv",
"cpe:/a:redhat:enterprise_linux:8::realtime"
] | null | 7 | null | null |
RHSA-2024:0603 | Red Hat Security Advisory: firefox security update | Mozilla: Out of bounds write in ANGLE Mozilla: Failure to update user input timestamp Mozilla: Crash when listing printers on Linux Mozilla: Bypass of Content Security Policy when directive unsafe-inline was set Mozilla: Phishing site popup could show local origin in address bar Mozilla: Potential permissions request bypass via clickjacking Mozilla: Privilege escalation through devtools Mozilla: HSTS policy on subdomain could bypass policy of upper domain Mozilla: Memory safety bugs fixed in Firefox 122, Firefox ESR 115.7, and Thunderbird 115.7 | [
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 8.8 | null | null |
RHSA-2009:1205 | Red Hat Security Advisory: httpd security and bug fix update | httpd: possible temporary DoS (CPU consumption) in mod_deflate apr-util: Integer overflows in memory pool (apr) and relocatable memory (apr-util) management | [
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws"
] | null | null | null | null |
RHSA-2023:0381 | Red Hat Security Advisory: libXpm security update | libXpm: compression commands depend on $PATH libXpm: Runaway loop on width of 0 and enormous height libXpm: Infinite loop on unclosed comments | [
"cpe:/a:redhat:rhel_eus:9.0::appstream"
] | null | 7.5 | null | null |
RHSA-2020:3229 | Red Hat Security Advisory: firefox security update | chromium-browser: Use after free in ANGLE chromium-browser: Inappropriate implementation in WebRTC Mozilla: Potential leak of redirect targets when loading scripts in a worker Mozilla: Memory safety bugs fixed in Firefox 79 and Firefox ESR 68.11 | [
"cpe:/a:redhat:rhel_e4s:8.0::appstream"
] | null | 8.8 | 8.8 | null |
RHBA-2021:3393 | Red Hat Bug Fix Advisory: Openshift Logging Bug Fix Release (5.2.0) | rubygem-addressable: ReDoS in templates | [
"cpe:/a:redhat:logging:5.2::el8"
] | null | 7.5 | null | null |
RHSA-2006:0206 | Red Hat Security Advisory: kdegraphics security update | security flaw | [
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2021:4703 | Red Hat Security Advisory: RHV Engine and Host Common Packages security update [ovirt-4.4.9] | Ansible: ansible-connection module discloses sensitive info in traceback error message | [
"cpe:/a:redhat:rhev_manager:4.4:el8",
"cpe:/o:redhat:rhev_hypervisor:4.4::el8"
] | null | 5.5 | null | null |
RHSA-2019:1810 | Red Hat Security Advisory: java-11-openjdk security update | OpenJDK: Side-channel attack risks in Elliptic Curve (EC) cryptography (Security, 8208698) OpenJDK: Insufficient checks of suppressed exceptions in deserialization (Utilities, 8212328) OpenJDK: Unbounded memory allocation during deserialization in Collections (Utilities, 8213432) OpenJDK: Insufficient restriction of privileges in AccessController (Security, 8216381) OpenJDK: Missing URL format validation (Networking, 8221518) OpenJDK: Non-constant time comparison in ChaCha20Cipher (Security, 8221344) OpenJDK: Incorrect handling of certificate status messages during TLS handshake (JSSE, 8222678) | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 5.3 | null |
RHSA-2021:4387 | Red Hat Security Advisory: libssh security update | libssh: NULL pointer dereference in sftpserver.c if ssh_buffer_new returns NULL | [
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 5.9 | null | null |
RHSA-2023:0931 | Red Hat Security Advisory: Logging Subsystem 5.4.12 - Red Hat OpenShift | golang: net/http: excessive memory growth in a Go server accepting HTTP/2 requests | [
"cpe:/a:redhat:logging:5.4::el8"
] | null | 5.3 | null | null |
RHSA-2022:8098 | Red Hat Security Advisory: toolbox security and bug fix update | golang: net/http: improper sanitization of Transfer-Encoding header golang: io/fs: stack exhaustion in Glob golang: compress/gzip: stack exhaustion in Reader.Read golang: path/filepath: stack exhaustion in Glob | [
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 7.5 | null | null |
RHSA-2020:2864 | Red Hat Security Advisory: Red Hat OpenShift Service Mesh 1.0 servicemesh-proxy security update | envoy: Resource exhaustion when accepting too many connections envoy: Resource exhaustion when proxying HTTP/2 requests or responses with small data frames envoy: Resource exhaustion via HTTP/2 client requests with large payloads and improper stream windows envoy: Resource exhaustion when processing HTTP/1.1 headers with long field names | [
"cpe:/a:redhat:service_mesh:1.0::el8"
] | null | 7.5 | null | null |
RHSA-2023:5996 | Red Hat Security Advisory: python3 security update | python: TLS handshake bypass | [
"cpe:/a:redhat:rhel_aus:8.4::appstream",
"cpe:/a:redhat:rhel_e4s:8.4::appstream",
"cpe:/a:redhat:rhel_tus:8.4::appstream",
"cpe:/o:redhat:rhel_aus:8.4::baseos",
"cpe:/o:redhat:rhel_e4s:8.4::baseos",
"cpe:/o:redhat:rhel_tus:8.4::baseos"
] | null | 8.6 | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.