id
stringlengths
13
15
title
stringlengths
29
176
description
stringlengths
8
31.7k
cpes
sequencelengths
0
20
cvss_v4_0
null
cvss_v3_1
float64
0
10
cvss_v3_0
float64
0
10
cvss_v2_0
null
RHSA-2020:2636
Red Hat Security Advisory: Red Hat OpenShift Jaeger 1.17.3 container images security update
jaegertracing/jaeger: credentials leaked to container logs
[ "cpe:/a:redhat:jaeger:1.17::el7" ]
null
7.1
null
null
RHSA-2021:0295
Red Hat Security Advisory: Red Hat build of Thorntail 2.7.3 security and bug fix update
resteasy-client: potential sensitive information leakage in JAX-RS RESTEasy Client's WebApplicationException handling wildfly: resource adapter logs plaintext JMS password at warning level on connection error wildfly-core: memory leak in WildFly host-controller in domain mode while not able to reconnect to domain-controller undertow: special character in query results in server errors wildfly: Potential Memory leak in Wildfly when using OpenTracing
[ "cpe:/a:redhat:openshift_application_runtimes:1.0" ]
null
5.9
null
null
RHSA-2005:394
Red Hat Security Advisory: RealPlayer security update
security flaw
[ "cpe:/a:redhat:rhel_extras:3" ]
null
null
null
null
RHSA-2023:6180
Red Hat Security Advisory: Red Hat OpenShift distributed tracing 2.9.0 containers security update
browserify-sign: upper bound check issue in dsaVerify leads to a signature forgery attack
[ "cpe:/a:redhat:openshift_distributed_tracing:2.9::el8" ]
null
7.5
null
null
RHSA-2023:2123
Red Hat Security Advisory: libreswan security update
libreswan: Malicious IKEv1 Aggressive Mode packets can crash libreswan
[ "cpe:/a:redhat:rhel_eus:8.6::appstream" ]
null
7.5
null
null
RHSA-2015:0696
Red Hat Security Advisory: freetype security update
freetype: off-by-one buffer over-read in tt_face_load_hdmx() freetype: buffer over-read and integer underflow in tt_face_load_kern() freetype: missing ENDCHAR NULL pointer dereference in the _bdf_parse_glyphs() freetype: out of bounds read in Type42 font parser freetype: out-of-bounds read in tt_cmap4_validate() freetype: off-by-one buffer over-read in parse_charstrings() / t42_parse_charstrings() freetype: integer overflow in tt_face_load_font_dir() leading to out-of-bounds read freetype: multiple integer overflows leading to buffer over-reads in cmap handling freetype: integer overflow in pcf_get_encodings() leading to NULL pointer dereference freetype: integer overflow in pcf_get_properties() leading to NULL pointer dereference freetype: integer signedness error in Mac_Read_POST_Resource() leading to heap-based buffer overflow freetype: multiple integer overflows Mac_Read_POST_Resource() leading to heap-based buffer overflows freetype: information leak in _bdf_add_property()
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation", "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
null
null
RHSA-2020:5372
Red Hat Security Advisory: net-snmp security update
net-snmp: Improper Privilege Management in EXTEND MIB may lead to privileged commands execution
[ "cpe:/a:redhat:rhel_eus:8.1::appstream", "cpe:/o:redhat:rhel_eus:8.1::baseos" ]
null
8.8
null
null
RHSA-2016:1519
Red Hat Security Advisory: Red Hat JBoss Operations Network 3.3.6 update
OOME from EAP 6 http management console SSL/TLS: Cross-protocol attack on TLS using SSLv2 (DROWN)
[ "cpe:/a:redhat:jboss_operations_network:3.3" ]
null
null
null
null
RHSA-2023:2502
Red Hat Security Advisory: dhcp security and enhancement update
dhcp: option refcount overflow when leasequery is enabled leading to dhcpd abort dhcp: DHCP memory leak
[ "cpe:/o:redhat:enterprise_linux:9::baseos" ]
null
6.5
null
null
RHSA-2018:3648
Red Hat Security Advisory: chromium-browser security update
chromium-browser: Out of bounds memory access in V8 chromium-browser: Use-after-free in GPU
[ "cpe:/a:redhat:rhel_extras:6" ]
null
null
8.8
null
RHSA-2024:6016
Red Hat Security Advisory: OpenShift Container Platform 4.15.30 packages and security update
python-werkzeug: user may execute code on a developer's machine
[ "cpe:/a:redhat:openshift:4.15::el8", "cpe:/a:redhat:openshift:4.15::el9", "cpe:/a:redhat:openshift_ironic:4.15::el9" ]
null
7.5
null
null
RHSA-2008:0521
Red Hat Security Advisory: Red Hat Enterprise Linux 2.1 - 1-Year End Of Life Notice
This is the 1-year notification of the End Of Life plans for Red Hat Enterprise Linux 2.1.
[ "cpe:/o:redhat:enterprise_linux:2.1::as", "cpe:/o:redhat:enterprise_linux:2.1::aw", "cpe:/o:redhat:enterprise_linux:2.1::es", "cpe:/o:redhat:enterprise_linux:2.1::ws" ]
null
null
null
null
RHSA-2018:3410
Red Hat Security Advisory: xorg-x11-server security update
xorg-x11-server: Incorrect permission check in Xorg X server allows for privilege escalation
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
6.6
null
RHSA-2021:3956
Red Hat Security Advisory: xstream security update
xstream: Arbitrary code execution via unsafe deserialization of Xalan xsltc.trax.TemplatesImpl xstream: Infinite loop DoS via unsafe deserialization of sun.reflect.annotation.AnnotationInvocationHandler xstream: Arbitrary code execution via unsafe deserialization of com.sun.xml.internal.ws.client.sei.* xstream: Arbitrary code execution via unsafe deserialization of sun.tracing.* xstream: Arbitrary code execution via unsafe deserialization of com.sun.jndi.ldap.LdapBindingEnumeration xstream: Arbitrary code execution via unsafe deserialization of javax.swing.UIDefaults$ProxyLazyValue xstream: Arbitrary code execution via unsafe deserialization of com.sun.jndi.ldap.LdapSearchEnumeration xstream: Arbitrary code execution via unsafe deserialization of com.sun.jndi.toolkit.dir.ContextEnumerator xstream: Arbitrary code execution via unsafe deserialization of com.sun.corba.* xstream: Server-side request forgery (SSRF) via unsafe deserialization of com.sun.xml.internal.ws.client.sei.* xstream: Arbitrary code execution via unsafe deserialization of com.sun.jndi.ldap.LdapBindingEnumeration xstream: Server-side request forgery (SSRF) via unsafe deserialization of jdk.nashorn.internal.runtime.Source$URLData xstream: Arbitrary code execution via unsafe deserialization of Xalan xsltc.trax.TemplatesImpl xstream: Arbitrary code execution via unsafe deserialization of javax.swing.UIDefaults$ProxyLazyValue
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
8.5
null
null
RHSA-2014:0625
Red Hat Security Advisory: openssl security update
openssl: freelist misuse causing a possible use-after-free openssl: Buffer overflow via DTLS invalid fragment openssl: SSL_MODE_RELEASE_BUFFERS NULL pointer dereference in do_ssl3_write() openssl: DoS when sending invalid DTLS handshake openssl: SSL/TLS MITM vulnerability openssl: client-side denial of service when using anonymous ECDH
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
null
null
RHSA-2024:1648
Red Hat Security Advisory: bind9.16 security update
bind9: Parsing large DNS messages may cause excessive CPU load bind9: Querying RFC 1918 reverse zones may cause an assertion failure when “nxdomain-redirect” is enabled bind9: Enabling both DNS64 and serve-stale may cause an assertion failure during recursive resolution bind9: Specific recursive query patterns may lead to an out-of-memory condition bind9: KeyTrap - Extreme CPU consumption in DNSSEC validator bind9: Preparing an NSEC3 closest encloser proof can exhaust CPU resources
[ "cpe:/a:redhat:rhel_eus:8.8::appstream", "cpe:/a:redhat:rhel_eus:8.8::crb" ]
null
7.5
null
null
RHSA-2023:5993
Red Hat Security Advisory: python27:2.7 security update
python: TLS handshake bypass
[ "cpe:/a:redhat:rhel_eus:8.6::appstream" ]
null
8.6
null
null
RHSA-2008:0665
Red Hat Security Advisory: Updated kernel packages for Red Hat Enterprise Linux 4.7
UDF truncating issue kernel: NULL ptr dereference in multiple network drivers due to missing checks in tty code
[ "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws" ]
null
null
null
null
RHSA-2019:2779
Red Hat Security Advisory: qpid-proton security update
qpid-proton: TLS Man in the Middle Vulnerability
[ "cpe:/a:redhat:satellite:6.3::el7", "cpe:/a:redhat:satellite_capsule:6.3::el7" ]
null
null
7.4
null
RHSA-2021:4154
Red Hat Security Advisory: container-tools:rhel8 security, bug fix, and enhancement update
buildah: Host environment variables leaked in build container when using chroot isolation containers/storage: DoS via malicious image
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
6.5
null
null
RHSA-2021:1538
Red Hat Security Advisory: Red Hat OpenShift Service Mesh 2.0.4 security update
envoyproxy/envoy: HTTP request with escaped slash characters can bypass Envoy's authorization mechanisms istio/istio: HTTP request with escaped slash characters can bypass authorization mechanisms
[ "cpe:/a:redhat:service_mesh:2.0::el8" ]
null
8.1
null
null
RHSA-2009:1134
Red Hat Security Advisory: seamonkey security update
Thunderbird mail crash
[ "cpe:/o:redhat:enterprise_linux:3::as", "cpe:/o:redhat:enterprise_linux:3::desktop", "cpe:/o:redhat:enterprise_linux:3::es", "cpe:/o:redhat:enterprise_linux:3::ws", "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws" ]
null
null
null
null
RHSA-2018:0368
Red Hat Security Advisory: erlang security update
erlang: TLS server vulnerable to Adaptive Chosen Ciphertext attack allowing plaintext recovery or MITM attack
[ "cpe:/a:redhat:openstack:10::el7" ]
null
null
6.5
null
RHSA-2023:0627
Red Hat Security Advisory: git security update
git: gitattributes parsing integer overflow git: Heap overflow in `git archive`, `git log --format` leading to RCE
[ "cpe:/a:redhat:rhel_eus:9.0::appstream" ]
null
9.8
null
null
RHSA-2023:5224
Red Hat Security Advisory: thunderbird security update
libwebp: Heap buffer overflow in WebP Codec libwebp: out-of-bounds write with a specially crafted WebP lossless file
[ "cpe:/a:redhat:enterprise_linux:9::appstream" ]
null
0
null
null
RHSA-2017:1298
Red Hat Security Advisory: kernel-rt security and bug fix update
kernel: Use after free in seq file kernel: Oops in shash_async_export() kernel: EXT4 memory corruption / SLAB out-of-bounds read kernel: net/packet: overflow in check for priv area size
[ "cpe:/a:redhat:rhel_extras_rt:7" ]
null
null
7
null
RHSA-2010:0861
Red Hat Security Advisory: firefox security update
Mozilla miscellaneous memory safety hazards Mozilla miscellaneous memory safety hazards Mozilla XSS in gopher parser when parsing hrefs Mozilla cross-site information disclosure via modal calls Mozilla buffer overflow and memory corruption using document.write Mozilla use-after-free error in nsBarProp Mozilla unsafe library loading flaw Mozilla dangling pointer vulnerability in LookupGetterOrSetter Firefox race condition flaw (MFSA 2010-73)
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
null
null
RHSA-2018:2925
Red Hat Security Advisory: kernel security and bug fix update
kernel: IP fragments with random offsets allow a remote denial of service (FragmentSmack) kernel: mm: use-after-free in do_get_mempolicy function allows local DoS or other unspecified impact kernel: Integer overflow in Linux's create_elf_tables function
[ "cpe:/o:redhat:rhel_eus:6.7::computenode", "cpe:/o:redhat:rhel_eus:6.7::server" ]
null
null
7.8
null
RHSA-2024:1640
Red Hat Security Advisory: Red Hat Ansible Automation Platform 2.4 Product Security and Bug Fix Update
golang: net/http/internal: Denial of Service (DoS) via Resource Consumption via HTTP requests GitPython: Blind local file inclusion axios: exposure of confidential data stored in cookies python-twisted: disordered HTTP pipeline response in twisted.web python-aiohttp: numerous issues in HTTP parser with header parsing python-cryptography: NULL-dereference when loading PKCS7 certificates golang-fips/openssl: Memory leaks in code encrypting and decrypting RSA payloads jinja2: HTML attribute injection when passing user input as keys to xmlattr filter aiohttp: follow_symlinks directory traversal vulnerability python-aiohttp: http request smuggling Django: denial-of-service in ``intcomma`` template filter python-django: Potential regular expression denial-of-service in django.utils.text.Truncator.words()
[ "cpe:/a:redhat:ansible_automation_platform:2.4::el8", "cpe:/a:redhat:ansible_automation_platform:2.4::el9", "cpe:/a:redhat:ansible_automation_platform_developer:2.4::el8", "cpe:/a:redhat:ansible_automation_platform_developer:2.4::el9", "cpe:/a:redhat:ansible_automation_platform_inside:2.4::el8", "cpe:/a:redhat:ansible_automation_platform_inside:2.4::el9" ]
null
7.5
null
null
RHSA-2024:1013
Red Hat Security Advisory: edk2 security update
edk2: Buffer overflow in the DHCPv6 client via a long Server ID option
[ "cpe:/a:redhat:rhel_aus:8.4::appstream", "cpe:/a:redhat:rhel_e4s:8.4::appstream", "cpe:/a:redhat:rhel_tus:8.4::appstream" ]
null
8.8
null
null
RHSA-2022:1139
Red Hat Security Advisory: httpd security update
httpd: mod_lua: Possible buffer overflow when parsing multipart content httpd: Errors encountered during the discarding of request body lead to HTTP request smuggling
[ "cpe:/o:redhat:rhel_aus:7.3::server" ]
null
8.3
null
null
RHSA-2016:0598
Red Hat Security Advisory: jboss-ec2-eap security, bug fix, and enhancement update
tomcat: non-persistent DoS attack by feeding data by aborting an upload EAP: HTTPS NIO connector uses no timeout when reading SSL handshake from client
[ "cpe:/a:redhat:jboss_enterprise_application_platform:6::el6" ]
null
null
null
null
RHSA-2024:9439
Red Hat Security Advisory: fontforge security update
fontforge: command injection via crafted filenames fontforge: command injection via crafted archives or compressed files
[ "cpe:/a:redhat:enterprise_linux:9::crb" ]
null
4.2
null
null
RHSA-2021:2523
Red Hat Security Advisory: kernel security and bug fix update
kernel: Integer overflow in Intel(R) Graphics Drivers kernel: use-after-free in fs/block_dev.c
[ "cpe:/o:redhat:rhel_eus:7.7::computenode", "cpe:/o:redhat:rhel_eus:7.7::server" ]
null
6.7
null
null
RHSA-2008:0191
Red Hat Security Advisory: redhat-idm-console security update
server: insecure permissions on fedora/redhat-idm-console
[ "cpe:/a:redhat:directory_server:8::el4", "cpe:/a:redhat:directory_server:8::el5" ]
null
null
null
null
RHSA-2024:3059
Red Hat Security Advisory: libtiff security update
libtiff: out-of-bounds read in tiffcp in tools/tiffcp.c
[ "cpe:/a:redhat:enterprise_linux:8::appstream", "cpe:/a:redhat:enterprise_linux:8::crb" ]
null
5.6
null
null
RHSA-2015:2019
Red Hat Security Advisory: sssd security and bug fix update
sssd: memory leak in the sssd_pac_plugin
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
null
null
RHSA-2024:0702
Red Hat Security Advisory: gimp security update
gimp: dds buffer overflow RCE gimp: PSD buffer overflow RCE gimp: psp integer overflow RCE gimp: psp off-by-one RCE
[ "cpe:/a:redhat:rhel_eus:9.2::appstream" ]
null
7.8
null
null
RHSA-2019:1486
Red Hat Security Advisory: kernel-rt security update
Kernel: tcp: integer overflow while processing SACK blocks allows remote denial of service Kernel: tcp: excessive resource consumption while processing SACK blocks allows remote denial of service kernel: tcp: excessive resource consumption for TCP connections with low MSS allows remote denial of service
[ "cpe:/a:redhat:rhel_extras_rt:7" ]
null
null
5.3
null
RHSA-2013:0578
Red Hat Security Advisory: Red Hat Enterprise Linux Extended Update Support 5.6 5-Month EOL Notice
This is the 5-Month notification for the conclusion of Red Hat Enterprise Linux 5.6 Extended Update Support (EUS) Add-on offering.
[ "cpe:/o:redhat:rhel_eus:5.6" ]
null
null
null
null
RHSA-2014:1256
Red Hat Security Advisory: Red Hat JBoss Web Server 2.1.0 openssl security update
openssl: DTLS packet processing double free openssl: DTLS memory exhaustion openssl: information leak in pretty printing functions openssl: DTLS anonymous (EC)DH denial of service
[ "cpe:/a:redhat:jboss_enterprise_web_server:2.1" ]
null
null
null
null
RHSA-2023:5430
Red Hat Security Advisory: thunderbird security update
firefox: use-after-free in workers Mozilla: Out-of-bounds write in PathOps Mozilla: Use-after-free in Ion Compiler Mozilla: Memory safety bugs fixed in Firefox 118, Firefox ESR 115.3, and Thunderbird 115.3 libvpx: Heap buffer overflow in vp8 encoding in libvpx
[ "cpe:/a:redhat:rhel_eus:8.6::appstream" ]
null
8.8
null
null
RHSA-2024:10272
Red Hat Security Advisory: edk2 security update
edk2: Integer overflows in PeCoffLoaderRelocateImage
[ "cpe:/a:redhat:rhel_aus:8.4::appstream", "cpe:/a:redhat:rhel_e4s:8.4::appstream", "cpe:/a:redhat:rhel_tus:8.4::appstream" ]
null
5.9
null
null
RHSA-2019:1189
Red Hat Security Advisory: qemu-kvm security update
hardware: Microarchitectural Store Buffer Data Sampling (MSBDS) hardware: Micro-architectural Load Port Data Sampling - Information Leak (MLPDS) hardware: Microarchitectural Fill Buffer Data Sampling (MFBDS) hardware: Microarchitectural Data Sampling Uncacheable Memory (MDSUM)
[ "cpe:/o:redhat:rhel_aus:7.3::server", "cpe:/o:redhat:rhel_e4s:7.3::server", "cpe:/o:redhat:rhel_tus:7.3::server" ]
null
null
3.8
null
RHSA-2018:0414
Red Hat Security Advisory: 389-ds-base security and bug fix update
389-ds-base: Authentication bypass due to lack of size check in slapi_ct_memcmp function in ch_malloc.c 389-ds-base: remote Denial of Service (DoS) via search filters in SetUnicodeStringFromUTF_8 in collate.c
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
7.5
null
RHSA-2020:3623
Red Hat Security Advisory: squid:4 security update
squid: HTTP Request Smuggling could result in cache poisoning squid: HTTP Request Splitting could result in cache poisoning
[ "cpe:/a:redhat:enterprise_linux:8::appstream", "cpe:/a:redhat:rhel_e4s:8.0::appstream", "cpe:/a:redhat:rhel_eus:8.1::appstream" ]
null
9.6
null
null
RHSA-2015:1031
Red Hat Security Advisory: qemu-kvm security update
qemu: fdc: out-of-bounds fifo buffer memory access
[ "cpe:/o:redhat:rhel_eus:6.5::computenode", "cpe:/o:redhat:rhel_eus:6.5::server" ]
null
null
null
null
RHSA-2024:0121
Red Hat Security Advisory: container-tools:4.0 security update
golang: archive/tar: github.com/vbatts/tar-split: unbounded memory consumption when reading headers golang: net/http/httputil: ReverseProxy should not forward unparseable query parameters golang: net/http: handle server errors after sending GOAWAY golang: regexp/syntax: limit memory used by parsing regexps golang: crypto/tls: slow verification of certificate chains containing large RSA keys golang: html/template: improper handling of HTML-like comments within script contexts golang: html/template: improper handling of special tags within script contexts golang: crypto/tls: panic when processing post-handshake message on QUIC connections golang: crypto/tls: lack of a limit on buffered post-handshake
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
7.5
null
null
RHSA-2018:2250
Red Hat Security Advisory: kernel security and bug fix update
hw: cpu: speculative store bypass
[ "cpe:/o:redhat:rhel_eus:6.7::computenode", "cpe:/o:redhat:rhel_eus:6.7::server" ]
null
null
5.6
null
RHSA-2018:3466
Red Hat Security Advisory: CloudForms 4.6.5 security, bug fix and enhancement update
rubyzip: arbitrary file write vulnerability / arbitrary code execution using a specially crafted zip file
[ "cpe:/a:redhat:cloudforms_managementengine:5.9::el7" ]
null
null
4.8
null
RHSA-2012:1537
Red Hat Security Advisory: jasperreports-server-pro security and bug fix update
JDK: XML parsing Denial-Of-Service (6845701)
[ "cpe:/a:redhat:rhev_manager:3" ]
null
null
null
null
RHSA-2021:0703
Red Hat Security Advisory: grub2 security update
grub2: acpi command allows privileged user to load crafted ACPI tables when Secure Boot is enabled grub2: Use-after-free in rmmod command grub2: Out-of-bounds write in grub_usb_device_initialize() grub2: Stack buffer overflow in grub_parser_split_cmdline() grub2: cutmem command allows privileged user to remove memory regions when Secure Boot is enabled grub2: Heap out-of-bounds write in short form option parser grub2: Heap out-of-bounds write due to miscalculation of space required for quoting
[ "cpe:/o:redhat:rhel_aus:7.3::server" ]
null
7.5
null
null
RHSA-2023:5850
Red Hat Security Advisory: nodejs:16 security update
HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack)
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
7.5
null
null
RHSA-2023:0570
Red Hat Security Advisory: OpenShift Container Platform 4.12.2 security update
go-yaml: Denial of Service in go-yaml
[ "cpe:/a:redhat:openshift:4.12::el8" ]
null
5.5
null
null
RHSA-2019:2512
Red Hat Security Advisory: subversion:1.10 security update
subversion: NULL pointer dereference in svnserve leading to an unauthenticated remote DoS
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
null
7.5
null
RHSA-2022:6964
Red Hat Security Advisory: nodejs:16 security update
nodejs: weak randomness in WebCrypto keygen nodejs: HTTP Request Smuggling due to incorrect parsing of header fields
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
6.5
null
null
RHSA-2020:1318
Red Hat Security Advisory: telnet security update
telnet-server: no bounds checks in nextitem() function allows to remotely execute arbitrary code
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
9.8
null
null
RHSA-2025:1119
Red Hat Security Advisory: OpenShift Container Platform 4.17.16 bug fix and security update
golang.org/x/net/html: Non-linear parsing of case-insensitive content in golang.org/x/net/html go-git: argument injection via the URL field go-git: go-git clients vulnerable to DoS via maliciously crafted Git server replies
[ "cpe:/a:redhat:openshift:4.17::el9" ]
null
7.5
null
null
RHSA-2025:1516
Red Hat Security Advisory: libxml2 security update
libxml: use-after-free in xmlXIncludeAddNode
[ "cpe:/a:redhat:rhel_eus:9.2::appstream", "cpe:/o:redhat:rhel_eus:9.2::baseos" ]
null
5.9
null
null
RHSA-2003:102
Red Hat Security Advisory: openssl security update
security flaw security flaw
[ "cpe:/o:redhat:enterprise_linux:2.1::as", "cpe:/o:redhat:enterprise_linux:2.1::aw", "cpe:/o:redhat:enterprise_linux:2.1::es", "cpe:/o:redhat:enterprise_linux:2.1::ws" ]
null
null
null
null
RHSA-2021:2372
Red Hat Security Advisory: postgresql:12 security update
postgresql: Partition constraint violation errors leak values of denied columns postgresql: Buffer overrun from integer overflow in array subscripting calculations postgresql: Memory disclosure in INSERT ... ON CONFLICT ... DO UPDATE postgresql: Memory disclosure in partitioned-table UPDATE ... RETURNING
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
6.5
null
null
RHSA-2024:10928
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.4.20 Security update
undertow: information leakage via HTTP/2 request header reuse
[ "cpe:/a:redhat:jboss_enterprise_application_platform:7.4::el8" ]
null
0
null
null
RHSA-2024:1875
Red Hat Security Advisory: less security update
less: missing quoting of shell metacharacters in LESSCLOSE handling
[ "cpe:/o:redhat:rhel_eus:8.8::baseos" ]
null
7
null
null
RHSA-2023:1909
Red Hat Security Advisory: java-1.8.0-openjdk security and bug fix update
OpenJDK: improper connection handling during TLS handshake (8294474) OpenJDK: missing string checks for NULL characters (8296622) OpenJDK: incorrect handling of NULL characters in ProcessBuilder (8295304) OpenJDK: Swing HTML parsing issue (8296832) OpenJDK: incorrect enqueue of references in garbage collector (8298191) OpenJDK: certificate validation issue in TLS session negotiation (8298310) OpenJDK: missing check for slash characters in URI-to-path conversion (8298667)
[ "cpe:/a:redhat:enterprise_linux:9::appstream", "cpe:/a:redhat:enterprise_linux:9::crb" ]
null
3.7
null
null
RHSA-2017:3493
Red Hat Security Advisory: Red Hat Enterprise MRG for Red Hat Enterprise Linux 6 6-month Notice
This is the 6-month notification for the retirement of Red Hat Enterprise MRG Version 2 for Red Hat Enterprise Linux 6. This notification applies only to those customers subscribed to Red Hat Enterprise MRG Version 2 for Red Hat Enterprise Linux 6.
[ "cpe:/a:redhat:enterprise_mrg:2:computenode:el6", "cpe:/a:redhat:enterprise_mrg:2:server:el6" ]
null
null
null
null
RHSA-2013:0158
Red Hat Security Advisory: tomcat6 security update
Web: Bypass of security constraints
[ "cpe:/a:redhat:jboss_enterprise_web_server:1::el5", "cpe:/a:redhat:jboss_enterprise_web_server:1::el6" ]
null
null
null
null
RHSA-2024:2962
Red Hat Security Advisory: virt:rhel and virt-devel:rhel security and enhancement update
QEMU: VNC: infinite loop in inflate_buffer() leads to denial of service QEMU: improper IDE controller reset can lead to MBR overwrite QEMU: VNC: NULL pointer dereference in qemu_clipboard_request() QEMU: virtio-net: stack buffer overflow in virtio_net_flush_tx()
[ "cpe:/a:redhat:enterprise_linux:8::appstream", "cpe:/a:redhat:enterprise_linux:8::crb" ]
null
4.9
null
null
RHSA-2024:6637
Red Hat Security Advisory: OpenShift Container Platform 4.15.32 bug fix and security update
opentelemetry-go-contrib: DoS vulnerability in otelgrpc due to unbound cardinality metrics
[ "cpe:/a:redhat:openshift:4.15::el8", "cpe:/a:redhat:openshift:4.15::el9" ]
null
7.5
null
null
RHSA-2023:7626
Red Hat Security Advisory: Red Hat JBoss Core Services Apache HTTP Server 2.4.57 SP2 security update
openssl: Denial of service by excessive resource usage in verifying X509 policy constraints openssl: Invalid certificate policies in leaf certificates are silently ignored openssl: Certificate policy check not enabled openssl: Possible DoS translating ASN.1 object identifiers openssl: Excessive time spent checking DH keys and parameters OpenSSL: Excessive time spent checking DH q parameter value curl: out of heap memory issue due to missing limit on header quantity curl: heap based buffer overflow in the SOCKS5 proxy handshake curl: cookie injection with none file libxml2: crafted xml can cause global buffer overflow httpd: Apache Tomcat Connectors (mod_jk) Information Disclosure mod_http2: reset requests exhaust memory (incomplete fix of CVE-2023-44487) zlib: integer overflow and resultant heap-based buffer overflow in zipOpenNewFileInZip4_6
[ "cpe:/a:redhat:jboss_core_services:1" ]
null
5.3
null
null
RHSA-2018:2714
Red Hat Security Advisory: openstack-nova security and bug fix update
openstack-nova: Swapping encrypted volumes can allow an attacker to corrupt the LUKS header causing a denial of service in the host
[ "cpe:/a:redhat:openstack:10::el7" ]
null
null
6.5
null
RHSA-2024:7624
Red Hat Security Advisory: Red Hat OpenShift Data Foundation 4.14.11 security and bug fix update
go-retryablehttp: url might write sensitive information to log file express: cause malformed URLs to be evaluated fast-xml-parser: ReDOS at currency parsing in currency.js
[ "cpe:/a:redhat:openshift_data_foundation:4.14::el9" ]
null
7.5
null
null
RHSA-2019:1168
Red Hat Security Advisory: kernel security update
hardware: Microarchitectural Store Buffer Data Sampling (MSBDS) hardware: Micro-architectural Load Port Data Sampling - Information Leak (MLPDS) hardware: Microarchitectural Fill Buffer Data Sampling (MFBDS) hardware: Microarchitectural Data Sampling Uncacheable Memory (MDSUM)
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
3.8
null
RHSA-2001:115
Red Hat Security Advisory: : New Zope packages are available
security flaw
[ "cpe:/a:redhat:powertools:6.2", "cpe:/a:redhat:powertools:7.0", "cpe:/a:redhat:powertools:7.1" ]
null
null
null
null
RHSA-2023:1743
Red Hat Security Advisory: nodejs:14 security, bug fix, and enhancement update
glob-parent: Regular Expression Denial of Service nodejs-minimatch: ReDoS via the braceExpand function c-ares: buffer overflow in config_sortlist() due to missing string length check http-cache-semantics: Regular Expression Denial of Service (ReDoS) vulnerability decode-uri-component: improper input validation resulting in DoS Node.js: Permissions policies can be bypassed via process.mainModule Node.js: insecure loading of ICU data through ICU_DATA environment variable
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
4.2
null
null
RHSA-2023:2830
Red Hat Security Advisory: tigervnc security and bug fix update
xorg-x11-server: XkbGetKbdByName use-after-free xorg-x11-server: XTestSwapFakeInput stack overflow xorg-x11-server: XIPassiveUngrab out-of-bounds access xorg-x11-server: XvdiSelectVideoNotify use-after-free xorg-x11-server: ScreenSaverSetAttributes use-after-free xorg-x11-server: XIChangeProperty out-of-bounds access
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
8.8
null
null
RHSA-2017:2603
Red Hat Security Advisory: docker-distribution security, bug fix, and enhancement update
docker-distribution: Does not properly restrict the amount of content accepted from a user
[ "cpe:/a:redhat:rhel_extras_other:7" ]
null
null
5.3
null
RHSA-2004:654
Red Hat Security Advisory: squirrelmail security update
security flaw
[ "cpe:/o:redhat:enterprise_linux:3::as", "cpe:/o:redhat:enterprise_linux:3::desktop", "cpe:/o:redhat:enterprise_linux:3::es", "cpe:/o:redhat:enterprise_linux:3::ws" ]
null
null
null
null
RHSA-2022:5249
Red Hat Security Advisory: kernel security and bug fix update
kernel: Small table perturb size in the TCP source port generation algorithm can lead to information leak kernel: race condition in perf_event_open leads to privilege escalation kernel: netfilter: nf_tables: incorrect NFT_STATEFUL_EXPR check leads to a use-after-free (write) kernel: buffer overflow in IPsec ESP transformation code kernel: a use-after-free write in the netfilter subsystem can lead to privilege escalation to root
[ "cpe:/a:redhat:enterprise_linux:9::appstream", "cpe:/a:redhat:enterprise_linux:9::crb", "cpe:/o:redhat:enterprise_linux:9::baseos" ]
null
7.8
null
null
RHSA-2018:1459
Red Hat Security Advisory: dhcp security update
dhcp: Command injection vulnerability in the DHCP client NetworkManager integration script
[ "cpe:/o:redhat:rhel_aus:6.6::server", "cpe:/o:redhat:rhel_tus:6.6::server" ]
null
null
7.5
null
RHSA-2018:2598
Red Hat Security Advisory: opendaylight security and bug fix update
guava: Unbounded memory allocation in AtomicDoubleArray and CompoundOrdering classes allow remote attackers to cause a denial of service
[ "cpe:/a:redhat:openstack:13::el7" ]
null
null
5.9
null
RHSA-2016:1238
Red Hat Security Advisory: flash-plugin security update
flash-plugin: multiple code execution issues fixed in APSB16-18 flash-plugin: multiple code execution issues fixed in APSB16-18 flash-plugin: multiple code execution issues fixed in APSB16-18 flash-plugin: multiple code execution issues fixed in APSB16-18 flash-plugin: multiple code execution issues fixed in APSB16-18 flash-plugin: multiple code execution issues fixed in APSB16-18 flash-plugin: multiple code execution issues fixed in APSB16-18 flash-plugin: multiple code execution issues fixed in APSB16-18 flash-plugin: multiple code execution issues fixed in APSB16-18 flash-plugin: multiple code execution issues fixed in APSB16-18 flash-plugin: multiple code execution issues fixed in APSB16-18 flash-plugin: multiple code execution issues fixed in APSB16-18 flash-plugin: multiple code execution issues fixed in APSB16-18 flash-plugin: multiple code execution issues fixed in APSB16-18 flash-plugin: multiple code execution issues fixed in APSB16-18 flash-plugin: multiple code execution issues fixed in APSB16-18 flash-plugin: multiple code execution issues fixed in APSB16-18 flash-plugin: multiple code execution issues fixed in APSB16-18 flash-plugin: multiple code execution issues fixed in APSB16-18 flash-plugin: multiple code execution issues fixed in APSB16-18 flash-plugin: multiple code execution issues fixed in APSB16-18 flash-plugin: multiple code execution issues fixed in APSB16-18 flash-plugin: multiple code execution issues fixed in APSB16-18 flash-plugin: multiple code execution issues fixed in APSB16-18 flash-plugin: multiple code execution issues fixed in APSB16-18 flash-plugin: multiple code execution issues fixed in APSB16-18 flash-plugin: multiple code execution issues fixed in APSB16-18 flash-plugin: multiple code execution issues fixed in APSB16-18 flash-plugin: multiple code execution issues fixed in APSB16-18 flash-plugin: multiple code execution issues fixed in APSB16-18 flash-plugin: multiple code execution issues fixed in APSB16-18 flash-plugin: multiple code execution issues fixed in APSB16-18 flash-plugin: multiple code execution issues fixed in APSB16-18 flash-plugin: multiple code execution issues fixed in APSB16-18 flash-plugin: multiple code execution issues fixed in APSB16-18 flash-plugin: multiple code execution issues fixed in APSB16-18
[ "cpe:/a:redhat:rhel_extras:5::client", "cpe:/a:redhat:rhel_extras:5::server", "cpe:/a:redhat:rhel_extras:6" ]
null
null
null
null
RHSA-2017:0630
Red Hat Security Advisory: tigervnc security and bug fix update
tigervnc: VNC server can crash when TLS handshake terminates early tigervnc: Buffer overflow in ModifiablePixelBuffer::fillRect
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
3.1
null
RHSA-2019:3134
Red Hat Security Advisory: java-1.8.0-openjdk security update
OpenJDK: Missing restrictions on use of custom SocketImpl (Networking, 8218573) OpenJDK: Improper handling of Kerberos proxy credentials (Kerberos, 8220302) OpenJDK: NULL pointer dereference in DrawGlyphList (2D, 8222690) OpenJDK: Unexpected exception thrown by Pattern processing crafted regular expression (Concurrency, 8222684) OpenJDK: Unexpected exception thrown by XPathParser processing crafted XPath expression (JAXP, 8223505) OpenJDK: Unexpected exception thrown during regular expression processing in Nashorn (Scripting, 8223518) OpenJDK: Incorrect handling of nested jar: URLs in Jar URL handler (Networking, 8223892) OpenJDK: Unexpected exception thrown by XPath processing crafted XPath expression (JAXP, 8224532) OpenJDK: Unexpected exception thrown during Font object deserialization (Serialization, 8224915) OpenJDK: Missing glyph bitmap image dimension check in FreetypeFontScaler (2D, 8225286) OpenJDK: Integer overflow in bounds check in SunGraphics2D (2D, 8225292) OpenJDK: Incorrect handling of HTTP proxy responses in HttpURLConnection (Networking, 8225298) OpenJDK: Excessive memory allocation in CMap when reading TrueType font (2D, 8225597) OpenJDK: Insufficient filtering of HTML event attributes in Javadoc (Javadoc, 8226765)
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
null
4.7
null
RHSA-2021:0459
Red Hat Security Advisory: qemu-kvm-rhev security update
QEMU: slirp: use-after-free in ip_reass() function in ip_input.c QEMU: reachable assertion failure in net_tx_pkt_add_raw_fragment() in hw/net/net_tx_pkt.c
[ "cpe:/a:redhat:rhev_manager:4.3", "cpe:/o:redhat:enterprise_linux:7::hypervisor" ]
null
3.8
null
null
RHSA-2021:1366
Red Hat Security Advisory: OpenShift Container Platform 4.7.9 packages and security update
golang: data race in certain net/http servers including ReverseProxy can lead to DoS golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs golang: math/big: panic during recursive division of very large numbers golang: crypto/elliptic: incorrect operations on the P-224 curve
[ "cpe:/a:redhat:openshift:4.7::el7", "cpe:/a:redhat:openshift:4.7::el8" ]
null
6.5
null
null
RHSA-2020:5056
Red Hat Security Advisory: podman security and bug fix update
golang.org/x/text: possibility to trigger an infinite loop in encoding/unicode could lead to crash podman: environment variables leak between containers when started via Varlink or Docker-compatible REST API
[ "cpe:/a:redhat:rhel_extras_other:7" ]
null
5.3
null
null
RHSA-2010:0839
Red Hat Security Advisory: kernel security and bug fix update
kernel: io_submit_one() NULL ptr deref kernel: do_io_submit() infoleak kernel: xfs: XFS_IOC_FSGETXATTR ioctl memory leak kernel panic via futex kernel: thinkpad-acpi: lock down video output state access kernel: net/sched/act_police.c infoleak
[ "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
RHSA-2006:0257
Red Hat Security Advisory: RealPlayer security update
security flaw
[ "cpe:/a:redhat:rhel_extras:3", "cpe:/a:redhat:rhel_extras:4" ]
null
null
null
null
RHSA-2007:0079
Red Hat Security Advisory: Firefox security update
security flaw NSS: SSLv2 protocol buffer overflows NSS: SSLv2 protocol buffer overflows security flaw security flaw security flaw security flaw security flaw security flaw : seamonkey cookie setting / same-domain bypass vulnerability security flaw security flaw security flaw security flaw
[ "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws" ]
null
null
null
null
RHSA-2014:1149
Red Hat Security Advisory: Red Hat JBoss Operations Network 3.2.3 update
Tomcat/JBossWeb: Limited DoS in chunked transfer encoding input filter Tomcat/JBossWeb: Request smuggling via malicious content length header
[ "cpe:/a:redhat:jboss_operations_network:3.2.3" ]
null
null
null
null
RHSA-2020:5260
Red Hat Security Advisory: OpenShift Container Platform 4.6.8 security and packages update
kubernetes: Secret leaks in kube-controller-manager when using vSphere Provider
[ "cpe:/a:redhat:openshift:4.6::el7", "cpe:/a:redhat:openshift:4.6::el8" ]
null
6.3
null
null
RHSA-2007:0731
Red Hat Security Advisory: tetex security update
xpdf integer overflow
[ "cpe:/o:redhat:enterprise_linux:2.1::as", "cpe:/o:redhat:enterprise_linux:2.1::aw", "cpe:/o:redhat:enterprise_linux:2.1::es", "cpe:/o:redhat:enterprise_linux:2.1::ws", "cpe:/o:redhat:enterprise_linux:3::as", "cpe:/o:redhat:enterprise_linux:3::desktop", "cpe:/o:redhat:enterprise_linux:3::es", "cpe:/o:redhat:enterprise_linux:3::ws", "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws", "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
RHSA-2023:4462
Red Hat Security Advisory: firefox security update
Mozilla: Offscreen Canvas could have bypassed cross-origin restrictions Mozilla: Incorrect value used during WASM compilation Mozilla: Potential permissions request bypass via clickjacking Mozilla: Crash in DOMParser due to out-of-memory conditions Mozilla: Fix potential race conditions when releasing platform objects Mozilla: Stack buffer overflow in StorageManager Mozilla: Cookie jar overflow caused unexpected cookie jar state Mozilla: Memory safety bugs fixed in Firefox 116, Firefox ESR 115.1, Firefox ESR 102.14, Thunderbird 115.1, and Thunderbird 102.14 Mozilla: Memory safety bugs fixed in Firefox ESR 115.1, and Thunderbird 115.1
[ "cpe:/a:redhat:enterprise_linux:9::appstream" ]
null
9.8
null
null
RHSA-2016:0155
Red Hat Security Advisory: openstack-swift security update
openstack-swift: Client to proxy DoS through Large Objects openstack-swift: Proxy to server DoS through Large Objects
[ "cpe:/a:redhat:openstack:7::el7" ]
null
null
null
null
RHSA-2021:2717
Red Hat Security Advisory: systemd security update
systemd: uncontrolled allocation on the stack in function unit_name_path_escape leads to crash
[ "cpe:/o:redhat:enterprise_linux:8::baseos" ]
null
5.5
null
null
RHSA-2016:1763
Red Hat Security Advisory: qemu-kvm-rhev security update
Qemu: block: iscsi: buffer overflow in iscsi_aio_ioctl Qemu: virtio: unbounded memory allocation on host via guest leading to DoS
[ "cpe:/a:redhat:openstack:9::el7" ]
null
null
3.4
null
RHSA-2004:045
Red Hat Security Advisory: gaim security update
security flaw security flaw
[ "cpe:/o:redhat:enterprise_linux:2.1::as", "cpe:/o:redhat:enterprise_linux:2.1::aw", "cpe:/o:redhat:enterprise_linux:2.1::es", "cpe:/o:redhat:enterprise_linux:2.1::ws" ]
null
null
null
null
RHSA-2012:0061
Red Hat Security Advisory: kernel-rt security update
kernel: proc: /proc/<pid>/mem mem_write insufficient permission checking
[ "cpe:/a:redhat:enterprise_mrg:2:server:el6" ]
null
null
null
null
RHSA-2022:6094
Red Hat Security Advisory: OpenShift Container Platform 4.10.28 packages and security update
golang: cmd/go: misinterpretation of branch names can lead to incorrect access control golang: crypto/elliptic: IsOnCurve returns true for invalid field elements golang: encoding/pem: fix stack overflow in Decode golang: crypto/elliptic: panic caused by oversized scalar
[ "cpe:/a:redhat:openshift:4.10::el7", "cpe:/a:redhat:openshift:4.10::el8" ]
null
7.5
null
null
RHSA-2019:2870
Red Hat Security Advisory: dbus security update
dbus: DBusServer DBUS_COOKIE_SHA1 authentication bypass
[ "cpe:/o:redhat:rhel_aus:6.5::server" ]
null
null
7
null