id
stringlengths 13
15
| title
stringlengths 29
176
| description
stringlengths 8
32.1k
| cpes
sequencelengths 0
20
| cvss_v4_0
null | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
null |
---|---|---|---|---|---|---|---|
RHSA-2024:2852 | Red Hat Security Advisory: Red Hat Build of Apache Camel 4.0 for Quarkus 3.2 update is now available (RHBQ 3.2.12.GA) | cxf-core: Apache CXF SSRF Vulnerability using the Aegis databinding | [
"cpe:/a:redhat:camel_quarkus:3"
] | null | 7.4 | null | null |
RHSA-2018:0299 | Red Hat Security Advisory: collectd security update | collectd: double free in csnmp_read_table function in snmp.c | [
"cpe:/a:redhat:openstack-optools:11::el7"
] | null | null | 5.6 | null |
RHSA-2007:0245 | Red Hat Security Advisory: cpio security and bug fix update | cpio large filesize buffer overflow | [
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2018:3586 | Red Hat Security Advisory: kernel-rt security and bug fix update | kernel: out-of-bounds access in the show_timer function in kernel/time/posix-timers.c kernel: IP fragments with random offsets allow a remote denial of service (FragmentSmack) kernel: mm: use-after-free in do_get_mempolicy function allows local DoS or other unspecified impact kernel: Integer overflow in Linux's create_elf_tables function | [
"cpe:/a:redhat:enterprise_mrg:2:server:el6"
] | null | null | 7.8 | null |
RHSA-2021:3495 | Red Hat Security Advisory: thunderbird security update | Mozilla: Memory safety bugs fixed in Firefox 92, Firefox ESR 78.14 and Firefox ESR 91.1 | [
"cpe:/a:redhat:rhel_eus:8.1::appstream"
] | null | 8.8 | null | null |
RHSA-2021:0053 | Red Hat Security Advisory: firefox security update | Mozilla: Use-after-free write when handling a malicious COOKIE-ECHO SCTP chunk | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 8.8 | null |
RHSA-2023:3550 | Red Hat Security Advisory: python security update | python: urllib.parse url blocklisting bypass | [
"cpe:/o:redhat:rhel_els:6"
] | null | 7.5 | null | null |
RHSA-2019:1579 | Red Hat Security Advisory: libvirt security and bug fix update | libvirt: arbitrary file read/exec via virDomainSaveImageGetXMLDesc API libvirt: virDomainManagedSaveDefineXML API exposed to readonly clients libvirt: arbitrary command execution via virConnectGetDomainCapabilities API libvirt: arbitrary command execution via virConnectBaselineHypervisorCPU and virConnectCompareHypervisorCPU APIs | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 8.8 | null |
RHSA-2023:5628 | Red Hat Security Advisory: kernel security and bug fix update | kernel: netfilter: NULL pointer dereference in nf_tables due to zeroed list head kernel: save/restore speculative MSRs during S3 suspend/resume kernel: net/sched: cls_u32 component reference counter leak if tcf_change_indev() fails kernel: net/sched: cls_fw component can be exploited as result of failure in tcf_change_indev function kernel: net/sched: Use-after-free vulnerabilities in the net/sched classifiers: cls_fw, cls_u32 and cls_route | [
"cpe:/o:redhat:rhel_aus:8.4::baseos",
"cpe:/o:redhat:rhel_e4s:8.4::baseos",
"cpe:/o:redhat:rhel_tus:8.4::baseos"
] | null | 7.8 | null | null |
RHSA-2007:0640 | Red Hat Security Advisory: conga security, bug fix, and enhancement update | ricci is vulnerable to a connect DoS attack | [
"cpe:/a:redhat:rhel_cluster:5"
] | null | null | null | null |
RHSA-2023:7876 | Red Hat Security Advisory: opensc security update | OpenSC: Potential PIN bypass when card tracks its own login state OpenSC: multiple memory issues with pkcs15-init (enrollment tool) | [
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 5.4 | null | null |
RHSA-2025:2670 | Red Hat Security Advisory: .NET 8.0 security, bug fix, and enhancement update | dotnet: Privilege Escalation Vulnerability in .NET SignInManager.RefreshSignInAsync Method | [
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb"
] | null | 7.8 | null | null |
RHSA-2017:2840 | Red Hat Security Advisory: dnsmasq security update | dnsmasq: heap overflow in the code responsible for building DNS replies | [
"cpe:/o:redhat:rhel_els:5"
] | null | null | 9.8 | null |
RHSA-2005:378 | Red Hat Security Advisory: cpio security update | security flaw | [
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws",
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2023:1154 | Red Hat Security Advisory: OpenShift Container Platform 4.10.54 security update | goutils: RandomAlphaNumeric and CryptoRandomAlphaNumeric are not as random as they should be golang: net/http: excessive memory growth in a Go server accepting HTTP/2 requests | [
"cpe:/a:redhat:openshift:4.10::el8"
] | null | 5.3 | null | null |
RHSA-2016:2045 | Red Hat Security Advisory: tomcat6 security and bug fix update | tomcat: URL Normalization issue tomcat: directory disclosure tomcat: security manager bypass via StatusManagerServlet tomcat: Security Manager bypass via persistence mechanisms Tomcat: CGI sets environmental variable based on user supplied Proxy request header tomcat: tomcat writable config files allow privilege escalation | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | 7.8 | null |
RHSA-2013:1044 | Red Hat Security Advisory: jboss-seam2 security update | RichFaces: Remote code execution due to insecure deserialization | [
"cpe:/a:redhat:jboss_enterprise_application_platform:4.3.0::el4",
"cpe:/a:redhat:jboss_enterprise_application_platform:4.3.0::el5"
] | null | null | null | null |
RHSA-2024:8679 | Red Hat Security Advisory: podman security update | buildah: Buildah allows arbitrary directory mount | [
"cpe:/a:redhat:rhel_eus:9.0::appstream"
] | null | 7.8 | null | null |
RHSA-2013:1263 | Red Hat Security Advisory: Red Hat Storage Console 2.1 security update | RESTEasy: XML eXternal Entity (XXE) flaw | [
"cpe:/a:redhat:storage:2.1:console:el6"
] | null | null | null | null |
RHSA-2018:2161 | Red Hat Security Advisory: kernel security and bug fix update | hw: cpu: speculative store bypass | [
"cpe:/o:redhat:rhel_eus:7.3::computenode",
"cpe:/o:redhat:rhel_eus:7.3::server"
] | null | null | 5.6 | null |
RHSA-2020:3581 | Red Hat Security Advisory: git security update | git: Crafted URL containing new lines can cause credential leak git: Crafted URL containing new lines, empty host or lacks a scheme can cause credential leak | [
"cpe:/o:redhat:rhel_eus:7.7::computenode",
"cpe:/o:redhat:rhel_eus:7.7::server"
] | null | 7.5 | null | null |
RHSA-2024:0040 | Red Hat Security Advisory: OpenShift Container Platform 4.16.0 security and extras update | ssh: Prefix truncation attack on Binary Packet Protocol (BPP) go-git: Maliciously crafted Git server replies can lead to path traversal and RCE on go-git clients golang-protobuf: encoding/protojson, internal/encoding/json: infinite loop in protojson.Unmarshal when unmarshaling certain forms of invalid JSON cloudevents/sdk-go: usage of WithRoundTripper to create a Client leaks credentials | [
"cpe:/a:redhat:openshift:4.16::el8",
"cpe:/a:redhat:openshift:4.16::el9"
] | null | 6.5 | null | null |
RHSA-2023:6363 | Red Hat Security Advisory: skopeo security update | golang.org/x/net/http2: avoid quadratic complexity in HPACK decoding golang: crypto/tls: large handshake records may cause panics golang: net/http, mime/multipart: denial of service from excessive resource consumption golang: net/http, net/textproto: denial of service from excessive memory allocation golang: net/http, net/textproto, mime/multipart: denial of service from excessive resource consumption golang: go/parser: Infinite loop in parsing golang: html/template: backticks not treated as string delimiters golang: html/template: improper sanitization of CSS values golang: html/template: improper handling of JavaScript whitespace golang: html/template: improper handling of empty HTML attributes golang: net/http: insufficient sanitization of Host header | [
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 6.5 | null | null |
RHSA-2008:0161 | Red Hat Security Advisory: cups security update | cups: memory leak handling IPP browse requests cups: dereference of free'd memory handling IPP browse requests | [
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2024:1134 | Red Hat Security Advisory: tomcat security update | tomcat: HTTP request smuggling via malformed trailer headers | [
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 7.5 | null | null |
RHSA-2014:0455 | Red Hat Security Advisory: openstack-glance security update | openstack-glance: remote code execution in Glance Sheepdog backend | [
"cpe:/a:redhat:openstack:4::el6"
] | null | null | null | null |
RHSA-2023:6316 | Red Hat Security Advisory: pcs security, bug fix, and enhancement update | decode-uri-component: improper input validation resulting in DoS | [
"cpe:/a:redhat:enterprise_linux:9::highavailability",
"cpe:/a:redhat:enterprise_linux:9::resilientstorage"
] | null | 7.5 | null | null |
RHSA-2022:0002 | Red Hat Security Advisory: grafana security update | golang: net/http: limit growth of header canonicalization cache | [
"cpe:/a:redhat:rhel_eus:8.4::appstream"
] | null | 7.5 | null | null |
RHSA-2024:8339 | Red Hat Security Advisory: Red Hat Integration Camel K 1.10.8 release and security update. | Camel-CassandraQL: Unsafe Deserialization from CassandraAggregationRepository cxf-core: Apache CXF SSRF Vulnerability using the Aegis databinding apache-avro: Schema parsing may trigger Remote Code Execution (RCE) | [
"cpe:/a:redhat:camel_k:1.10.8"
] | null | 8.8 | null | null |
RHSA-2014:0702 | Red Hat Security Advisory: mariadb security update | mysql: unspecified DoS related to XML (CPU April 2014) mysql: unspecified DoS related to Partition (CPU April 2014) mysql: unspecified DoS related to Performance Schema (CPU April 2014) mysql: unspecified DoS related to Options (CPU April 2014) mysql: unspecified DoS related to Federated (CPU April 2014) mysql: unspecified vulnerability related to RBR (CPU April 2014) mysql: unspecified DoS related to Replication (CPU April 2014) mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2019) | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 4.9 | null |
RHSA-2020:5040 | Red Hat Security Advisory: libvirt security and bug fix update | libvirt: double free in qemuAgentGetInterfaces() in qemu_agent.c | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 6.4 | null | null |
RHSA-2014:0172 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 6.2.1 update | Java: Java XML Signature DoS Attack Java: XML eXternal Entity (XXE) flaw in ParserPool and Decrypter jboss-as-server: Unchecked access to MSC Service Registry under JSM | [
"cpe:/a:redhat:jboss_enterprise_application_platform:6.2.1"
] | null | null | null | null |
RHSA-2011:0210 | Red Hat Security Advisory: jbossweb security update | JDK Double.parseDouble Denial-Of-Service | [
"cpe:/a:redhat:jboss_enterprise_application_platform:4.2.0::el4",
"cpe:/a:redhat:jboss_enterprise_application_platform:4.2.0::el5",
"cpe:/a:redhat:jboss_enterprise_application_platform:4.3.0::el4",
"cpe:/a:redhat:jboss_enterprise_application_platform:4.3.0::el5",
"cpe:/a:redhat:jboss_enterprise_application_platform:5::el4",
"cpe:/a:redhat:jboss_enterprise_application_platform:5::el5"
] | null | null | null | null |
RHSA-2009:1243 | Red Hat Security Advisory: Red Hat Enterprise Linux 5.4 kernel security and bug fix update | kernel: ext4: ext4_group_add() missing initialisation issue kernel: ext4: make_indexed_dir() missing validation kernel: ext4: ext4_isize() denial of service kernel: ext4: ext4_fill_super() missing validation issue kernel: information leak in sigaltstack kernel: execve: must clear current->clear_child_tid | [
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2018:0628 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.1 security update | slf4j: Deserialisation vulnerability in EventData constructor can allow for arbitrary code execution | [
"cpe:/a:redhat:jboss_enterprise_application_platform:7.1::el7",
"cpe:/a:redhat:jboss_enterprise_application_platform:7::el6"
] | null | null | 8.1 | null |
RHSA-2024:3139 | Red Hat Security Advisory: squashfs-tools security update | squashfs-tools: unvalidated filepaths allow writing outside of destination squashfs-tools: possible Directory Traversal via symbolic link | [
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 8.1 | null | null |
RHSA-2013:0701 | Red Hat Security Advisory: ruby193-ruby, rubygem-json and rubygem-rdoc security update | rubygem-rdoc: Cross-site scripting in the documentation created by Darkfish Rdoc HTML generator / template rubygem-json: Denial of Service and SQL Injection | [
"cpe:/a:redhat:openshift:1::el6"
] | null | null | null | null |
RHSA-2013:0840 | Red Hat Security Advisory: kernel security update | kernel: perf_swevent_enabled array out-of-bound access | [
"cpe:/o:redhat:rhel_eus:6.2::server"
] | null | null | null | null |
RHSA-2020:1378 | Red Hat Security Advisory: kernel-rt security and bug fix update | kernel: use-after-free caused by a malicious USB device in the drivers/hid/usbhid/hiddev.c driver | [
"cpe:/a:redhat:enterprise_linux:8::nfv",
"cpe:/a:redhat:enterprise_linux:8::realtime"
] | null | 6.8 | null | null |
RHSA-2016:1301 | Red Hat Security Advisory: kernel-rt security, bug fix, and enhancement update | kernel: SCTP denial of service during timeout kernel-rt: Sending SysRq command via ICMP echo request kernel: infiniband: Unprivileged process can overwrite kernel memory using rdma_ucm.ko | [
"cpe:/a:redhat:rhel_extras_rt:7"
] | null | null | 7.8 | null |
RHSA-2011:0462 | Red Hat Security Advisory: jboss-seam security update | JBoss Seam privilege escalation caused by EL interpolation in FacesMessages | [
"cpe:/a:redhat:jboss_enterprise_application_platform:4.3",
"cpe:/a:redhat:jboss_enterprise_application_platform:5.1"
] | null | null | null | null |
RHSA-2024:10176 | Red Hat Security Advisory: Red Hat build of Keycloak 24.0.9 Update | org.keycloak/keycloak-quarkus-server: Keycloak proxy header handling Denial-of-Service (DoS) vulnerability keycloak-core: mTLS passthrough org.keycloak:keycloak-services: Keycloak Denial of Service org.keycloak:keycloak-quarkus-server: Sensitive Data Exposure in Keycloak Build Process keycloak-quarkus-server: Keycloak path trasversal | [
"cpe:/a:redhat:build_keycloak:24"
] | null | 5.9 | 2.7 | null |
RHSA-2021:3157 | Red Hat Security Advisory: firefox security update | Mozilla: Uninitialized memory in a canvas object could have led to memory corruption Mozilla: Incorrect instruction reordering during JIT optimization Mozilla: Use-after-free media channels Mozilla: Race condition when resolving DNS names could have led to memory corruption Mozilla: Memory corruption as a result of incorrect style treatment Mozilla: Memory safety bugs fixed in Thunderbird 78.13 | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 8.8 | 7.5 | null |
RHSA-2022:0894 | Red Hat Security Advisory: vim security update | vim: Heap-based buffer overflow in block_insert() in src/ops.c vim: Heap-based buffer overflow in utf_head_off() in mbyte.c vim: Heap-based buffer overflow in init_ccline() in ex_getln.c vim: Illegal memory access when copying lines in visual mode leads to heap buffer overflow vim: Heap-based buffer overflow in getexmodeline() in ex_getln.c vim: Use after free in src/ex_cmds.c | [
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 7.3 | null | null |
RHSA-2022:2205 | Red Hat Security Advisory: OpenShift Container Platform 4.9.33 packages and security update | credentials: Stored XSS vulnerabilities in jenkins plugin Jira: Stored XSS vulnerabilities in Jenkins Jira plugin subversion: Stored XSS vulnerabilities in Jenkins subversion plugin Libraries: Untrusted users can modify some Pipeline libraries in Pipeline Shared Groovy Libraries Plugin | [
"cpe:/a:redhat:openshift:4.9::el7",
"cpe:/a:redhat:openshift:4.9::el8"
] | null | 7.3 | null | null |
RHSA-2023:1017 | Red Hat Security Advisory: Red Hat OpenStack Platform 17.0 (openstack-glance) security update | openstack: Arbitrary file access through custom VMDK flat descriptor | [
"cpe:/a:redhat:openstack:17.0::el9"
] | null | 7.7 | null | null |
RHSA-2020:5201 | Red Hat Security Advisory: net-snmp security and bug fix update | net-snmp: Improper Privilege Management in EXTEND MIB may lead to privileged commands execution | [
"cpe:/a:redhat:rhel_e4s:8.0::appstream",
"cpe:/o:redhat:rhel_e4s:8.0::baseos"
] | null | 8.8 | null | null |
RHSA-2021:2763 | Red Hat Security Advisory: OpenShift Container Platform 4.7.21 security and bug fix update | An update is now available for Red Hat OpenShift Container Platform 4.7.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. | [
"cpe:/a:redhat:openshift:4.7::el7",
"cpe:/a:redhat:openshift:4.7::el8"
] | null | null | null | null |
RHSA-2022:1540 | Red Hat Security Advisory: xmlrpc-c security update | expat: Malformed 2- and 3-byte UTF-8 sequences can lead to arbitrary code execution | [
"cpe:/a:redhat:rhel_eus:8.2::crb",
"cpe:/o:redhat:rhel_eus:8.2::baseos"
] | null | 9.8 | null | null |
RHSA-2023:0045 | Red Hat Security Advisory: tigervnc security update | xorg-x11-server: XkbGetKbdByName use-after-free xorg-x11-server: XTestSwapFakeInput stack overflow xorg-x11-server: XIPassiveUngrab out-of-bounds access xorg-x11-server: XvdiSelectVideoNotify use-after-free xorg-x11-server: ScreenSaverSetAttributes use-after-free xorg-x11-server: XIChangeProperty out-of-bounds access | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 8.8 | null | null |
RHSA-2024:0188 | Red Hat Security Advisory: Red Hat OpenStack Platform 17.1 (python-eventlet) security update | python-eventlet: patch regression for CVE-2021-21419 in some Red Hat builds | [
"cpe:/a:redhat:openstack:17.1::el8"
] | null | 5.3 | null | null |
RHSA-2021:1475 | Red Hat Security Advisory: bind security update | bind: An assertion check can fail while answering queries for DNAME records that require the DNAME to be processed to resolve itself | [
"cpe:/o:redhat:rhel_aus:7.3::server"
] | null | 7.5 | null | null |
RHSA-2023:0811 | Red Hat Security Advisory: firefox security update | Mozilla: Content security policy leak in violation reports using iframes Mozilla: Extensions could have opened external schemes without user knowledge Mozilla: Screen hijack via browser fullscreen mode Mozilla: Out of bounds memory write from EncodeInputStream Mozilla: Potential use-after-free from compartment mismatch in SpiderMonkey Mozilla: Invalid downcast in SVGUtils::SetupStrokeGeometry Mozilla: Use-after-free in mozilla::dom::ScriptLoadContext::~ScriptLoadContext Mozilla: Web Crypto ImportKey crashes tab Mozilla: Fullscreen notification not shown in Firefox Focus Mozilla: Memory safety bugs fixed in Firefox 110 and Firefox ESR 102.8 Mozilla: Memory safety bugs fixed in Firefox ESR 102.8 | [
"cpe:/a:redhat:rhel_aus:8.2::appstream",
"cpe:/a:redhat:rhel_e4s:8.2::appstream",
"cpe:/a:redhat:rhel_tus:8.2::appstream"
] | null | 8.8 | null | null |
RHSA-2024:9551 | Red Hat Security Advisory: grafana-pcp security update | golang-fips: Golang FIPS zeroed buffer | [
"cpe:/a:redhat:rhel_eus:9.4::appstream"
] | null | 6.5 | null | null |
RHBA-2024:1440 | Red Hat Bug Fix Advisory: MTV 2.5.6 Images | golang: net/http/internal: Denial of Service (DoS) via Resource Consumption via HTTP requests nodejs-ip: arbitrary code execution via the isPublic() function | [
"cpe:/a:redhat:migration_toolkit_virtualization:2.5::el8",
"cpe:/a:redhat:migration_toolkit_virtualization:2.5::el9"
] | null | 9.8 | null | null |
RHSA-2018:2037 | Red Hat Security Advisory: podman security update | podman: Containers run as non-root users do not drop capabilities | [
"cpe:/a:redhat:rhel_extras_other:7"
] | null | null | 5.3 | null |
RHSA-2023:4005 | Red Hat Security Advisory: bind security update | bind: named's configured cache size limit can be significantly exceeded | [
"cpe:/a:redhat:rhel_eus:9.0::appstream",
"cpe:/a:redhat:rhel_eus:9.0::crb"
] | null | 7.5 | null | null |
RHSA-2024:2239 | Red Hat Security Advisory: skopeo security update | golang: crypto/tls: Timing Side Channel attack in RSA based TLS key exchanges. | [
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 7.5 | null | null |
RHSA-2016:1429 | Red Hat Security Advisory: Red Hat JBoss BPM Suite 6.3.1 security and bug fix update | Dashbuilder: SQL Injection on data set lookup filters | [
"cpe:/a:redhat:jboss_bpms:6.3"
] | null | null | 8.8 | null |
RHSA-2024:4902 | Red Hat Security Advisory: kernel security update | kernel: ethernet: hisilicon: hns: hns_dsaf_misc: fix a possible array overflow in hns_dsaf_ge_srst_by_port() kernel: net: amd-xgbe: Fix skb data length underflow kernel: net/mlx5e: fix a potential double-free in fs_any_create_groups kernel: bonding: stop the device in bond_setup_by_slave() kernel: arp: Prevent overflow in arp_req_get(). kernel: net/ipv6: avoid possible UAF in ip6_route_mpath_notify() kernel: x86/xen: Add some null pointer checking to smp.c kernel: net/mlx5: Properly link new fs rules into the tree kernel: i40e: fix vf may be used uninitialized in this function warning kernel: scsi: qla2xxx: Fix off by one in qla_edif_app_getstats() kernel: scsi: lpfc: Release hbalock before calling lpfc_worker_wake_up() kernel: net: core: reject skb_copy(_expand) for fraglist GSO skbs kernel: af_unix: Fix data races in unix_release_sock/unix_stream_sendmsg | [
"cpe:/o:redhat:rhel_aus:8.6::baseos",
"cpe:/o:redhat:rhel_e4s:8.6::baseos",
"cpe:/o:redhat:rhel_tus:8.6::baseos"
] | null | 4.7 | null | null |
RHSA-2023:4377 | Red Hat Security Advisory: kernel security, bug fix, and enhancement update | kernel: KVM: x86/mmu: race condition in direct_page_fault() kernel: speculative pointer dereference in do_prlimit() in kernel/sys.c kernel: Spectre v2 SMT mitigations problem kernel: ipvlan: out-of-bounds write caused by unclear skb->cb kernel: cls_flower: out-of-bounds write in fl_set_geneve_opt() | [
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::crb",
"cpe:/o:redhat:enterprise_linux:9::baseos"
] | null | 7.8 | 5.6 | null |
RHSA-2024:3875 | Red Hat Security Advisory: nghttp2 security update | nghttp2: CONTINUATION frames DoS | [
"cpe:/o:redhat:rhel_e4s:9.0::baseos"
] | null | 5.3 | null | null |
RHSA-2024:1076 | Red Hat Security Advisory: edk2 security update | edk2: Buffer overflow in the DHCPv6 client via a long Server ID option edk2: Buffer overflow when processing DNS Servers option in a DHCPv6 Advertise message | [
"cpe:/a:redhat:rhel_eus:9.2::appstream",
"cpe:/a:redhat:rhel_eus:9.2::crb"
] | null | 8.8 | null | null |
RHSA-2006:0177 | Red Hat Security Advisory: gpdf security update | security flaw security flaw security flaw security flaw | [
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2022:1830 | Red Hat Security Advisory: postgresql:10 security update | postgresql: server processes unencrypted bytes from man-in-the-middle | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 8.1 | null | null |
RHSA-2005:788 | Red Hat Security Advisory: HelixPlayer security update | security flaw security flaw security flaw | [
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2022:7417 | Red Hat Security Advisory: Red Hat Single Sign-On 7.6.1 security update | jackson-databind: denial of service via a large depth of nested objects h2: Remote Code Execution in Console owasp-java-html-sanitizer: improper policies enforcement may lead to remote code execution netty: control chars in header names may lead to HTTP request smuggling xnio: org.xnio.StreamConnection.notifyReadClosed log to debug instead of stderr keycloak: Stored XSS in groups dropdown jboss-client: memory leakage in remote client transaction wildfly: Wildfly management of EJB Session context returns wrong caller principal with Elytron Security enabled undertow: Double AJP response for 400 from EAP 7 results in CPING failures keycloak: Uploading of SAML javascript protocol mapper scripts through the admin console artemis-commons: Apache ActiveMQ Artemis DoS | [
"cpe:/a:redhat:red_hat_single_sign_on:7.6.1"
] | null | 7.5 | null | null |
RHSA-2013:0248 | Red Hat Security Advisory: JBoss Enterprise Application Platform 4.3.0 CP10 security update | JBoss: allows empty password to authenticate against LDAP | [
"cpe:/a:redhat:jboss_enterprise_application_platform:4.3.0:update10"
] | null | null | null | null |
RHSA-2013:1540 | Red Hat Security Advisory: evolution security, bug fix, and enhancement update | evolution: incorrect selection of recipient gpg public key for encrypted mail | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2020:5026 | Red Hat Security Advisory: kernel-rt security and bug fix update | kernel: net-sysfs: *_queue_add_kobject refcount issue kernel: kernel: buffer over write in vgacon_scroll | [
"cpe:/a:redhat:rhel_extras_rt:7"
] | null | 6.6 | null | null |
RHSA-2022:5892 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.4.6 Security update | minimist: prototype pollution netty: world readable temporary file containing sensitive data com.google.code.gson-gson: Deserialization of Untrusted Data in com.google.code.gson-gson | [
"cpe:/a:redhat:jboss_enterprise_application_platform:7.4::el7"
] | null | 7.5 | null | null |
RHSA-2014:0818 | Red Hat Security Advisory: Red Hat JBoss BRMS 6.0.2 update | Xalan-Java: insufficient constraints in secure processing feature netty: DoS via memory exhaustion during data aggregation smack: incorrect X.509 certificate validation smack: IQ response spoofing | [
"cpe:/a:redhat:jboss_brms:6.0"
] | null | null | null | null |
RHSA-2015:0065 | Red Hat Security Advisory: RHN Satellite Server 5.5 4-Month Retirement Notice | This is the four-month notification for the retirement of the following
versions of Red Hat Satellite 5:
* Red Hat Satellite 5.2
* Red Hat Satellite 5.3
* Red Hat Satellite 5.4
* Red Hat Satellite 5.5 | [] | null | null | null | null |
RHSA-2024:6684 | Red Hat Security Advisory: thunderbird security update | mozilla: Type Confusion in Async Generators in Javascript Engine mozilla: Type confusion when looking up a property name in a "with" block mozilla: Internal event interfaces were exposed to web content when browser EventHandler listener callbacks ran mozilla: Garbage collection could mis-color cross-compartment objects in OOM conditions mozilla: WASM type confusion involving ArrayTypes mozilla: SelectElements could be shown over another site if popups are allowed mozilla: Memory safety bugs fixed in Firefox 130, Firefox ESR 128.2, and Thunderbird 128.2 thunderbird: Crash when aborting verification of OTR chat | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 6.5 | null | null |
RHSA-2014:0764 | Red Hat Security Advisory: rubygem-openshift-origin-node security update | Origin: Command execution as root via downloadable cartridge source-url | [
"cpe:/a:redhat:openshift:2.0::el6"
] | null | null | null | null |
RHSA-2025:3492 | Red Hat Security Advisory: Satellite 6.14.4.5 Async Update | graphql-ruby: Remote code execution when loading a crafted GraphQL schema rack: rubygem-rack: Local File Inclusion in Rack::Static | [
"cpe:/a:redhat:satellite:6.14::el8",
"cpe:/a:redhat:satellite_capsule:6.14::el8",
"cpe:/a:redhat:satellite_utils:6.14::el8"
] | null | 7.5 | null | null |
RHSA-2019:2022 | Red Hat Security Advisory: poppler security, bug fix, and enhancement update | poppler: infinite recursion in Parser::getObj function in Parser.cc poppler: memory leak in GfxColorSpace::setDisplayProfile in GfxState.cc poppler: reachable abort in Object.h poppler: out-of-bounds read in EmbFile::save2 in FileSpec.cc poppler: pdfdetach utility does not validate save paths poppler: NULL pointer dereference in _poppler_attachment_new poppler: NULL pointer dereference in the XRef::getEntry in XRef.cc poppler: reachable Object::dictLookup assertion in FileSpec class in FileSpec.cc poppler: SIGABRT PDFDoc::setup class in PDFDoc.cc poppler: heap-based buffer over-read in XRef::getEntry in XRef.cc poppler: heap-based buffer overflow in function ImageStream::getLine() in Stream.cc poppler: heap-based buffer over-read in function downsample_row_box_filter in CairoRescaleBox.cc | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 5.1 | null |
RHSA-2022:1469 | Red Hat Security Advisory: Red Hat Single Sign-On 7.5.2 security update | log4j-core: DoS in log4j 2.x with Thread Context Map (MDC) input data contains a recursive lookup and context lookup pattern | [
"cpe:/a:redhat:red_hat_single_sign_on:7"
] | null | 5.9 | null | null |
RHSA-2007:1082 | Red Hat Security Advisory: firefox security update | jar: protocol XSS Multiple flaws in Firefox Mozilla Cross-site Request Forgery flaw | [
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws",
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::server",
"cpe:/o:redhat:rhel_eus:4.5::as",
"cpe:/o:redhat:rhel_eus:4.5::es"
] | null | null | null | null |
RHSA-2016:2766 | Red Hat Security Advisory: kernel security and bug fix update | kernel: Stack overflow via ecryptfs and /proc/$pid/environ kernel: Fork of large process causes memory corruption | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | 7.8 | null |
RHSA-2013:0762 | Red Hat Security Advisory: Red Hat Enterprise MRG for Red Hat Enterprise Linux 5 1-Year Notice | This is the 1-Year notification for the retirement of Red Hat Enterprise
MRG Version 1 and Version 2 for Red Hat Enterprise Linux 5. | [
"cpe:/a:redhat:enterprise_mrg:1::el5",
"cpe:/a:redhat:enterprise_mrg:2::el5"
] | null | null | null | null |
RHSA-2024:6595 | Red Hat Security Advisory: java-1.8.0-ibm security update | ibm-java: Race condition may cause Denial of Service | [
"cpe:/a:redhat:enterprise_linux:8::supplementary"
] | null | 5.9 | null | null |
RHSA-2024:1785 | Red Hat Security Advisory: X.Org server security update | xorg-x11-server: Heap buffer overread/data leakage in ProcXIGetSelectedEvents xorg-x11-server: Heap buffer overread/data leakage in ProcXIPassiveGrabDevice xorg-x11-server: Use-after-free in ProcRenderAddGlyphs | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 7.8 | null | null |
RHSA-2012:1180 | Red Hat Security Advisory: gimp security update | David Koblas' GIF decoder LZW decoder buffer overflow plug-in): heap buffer overflow when loading external palette files plug-in): Heap-based buffer overflow by loading certain GIF images | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2014:0908 | Red Hat Security Advisory: java-1.6.0-sun security update | OpenJDK: SubjectDelegator protection insufficient (JMX, 8029755) OpenJDK: Incorrect generic signature attribute parsing (Hotspot, 8037076) OpenJDK: Clone interfaces passed to proxy methods (Libraries, 8035009) OpenJDK: Bytecode verification does not prevent ctor calls to this() and super() (Hotspot, 8035119) JDK: unspecified vulnerability fixed in 6u81, 7u65 and 8u11 (Deployment) OpenJDK: RSA blinding issues (Security, 8031346) OpenJDK: Prevent instantiation of service with non-public constructor (Security, 8035004) OpenJDK: AtomicReferenceFieldUpdater missing primitive type check (Libraries, 8039520) OpenJDK: insufficient Diffie-Hellman public key validation (Security, 8037162) JDK: unspecified vulnerability fixed in 6u81, 7u65 and 8u11 (Deployment) | [
"cpe:/a:redhat:rhel_extras_oracle_java:5",
"cpe:/a:redhat:rhel_extras_oracle_java:6",
"cpe:/a:redhat:rhel_extras_oracle_java:7"
] | null | null | null | null |
RHSA-2005:762 | Red Hat Security Advisory: RealPlayer security update | security flaw security flaw security flaw | [
"cpe:/a:redhat:rhel_extras:3",
"cpe:/a:redhat:rhel_extras:4"
] | null | null | null | null |
RHSA-2019:3651 | Red Hat Security Advisory: sssd security, bug fix, and enhancement update | sssd: improper implementation of GPOs due to too restrictive permissions | [
"cpe:/a:redhat:enterprise_linux:8::crb",
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | null | 5.4 | null |
RHSA-2014:0877 | Red Hat Security Advisory: ror40-rubygem-activerecord security update | rubygem-activerecord: SQL injection vulnerability in 'range' quoting | [
"cpe:/a:redhat:rhel_software_collections:1::el6",
"cpe:/a:redhat:rhel_software_collections:1::el7"
] | null | null | null | null |
RHSA-2019:3950 | Red Hat Security Advisory: SDL security update | SDL: heap-based buffer overflow in SDL blit functions in video/SDL_blit*.c | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 8.1 | null |
RHSA-2006:0582 | Red Hat Security Advisory: kdebase security fix | security flaw | [
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2024:2298 | Red Hat Security Advisory: tigervnc security update | xorg-x11-server: Use-after-free bug in DestroyWindow xorg-x11-server: Use-after-free bug in DamageDestroy | [
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 7 | null | null |
RHSA-2014:1915 | Red Hat Security Advisory: flash-plugin security update | flash-plugin: hardening against a code execution flaw (APSB14-26) | [
"cpe:/a:redhat:rhel_extras:5::client",
"cpe:/a:redhat:rhel_extras:5::server",
"cpe:/a:redhat:rhel_extras:6"
] | null | null | null | null |
RHSA-2020:2383 | Red Hat Security Advisory: bind security update | bind: BIND does not sufficiently limit the number of fetches performed when processing referrals bind: A logic error in code which checks TSIG validity can be used to trigger an assertion failure in tsig.c | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | 7.5 | null | null |
RHSA-2024:0378 | Red Hat Security Advisory: kpatch-patch security update | kernel: bpf: Incorrect verifier pruning leads to unsafe code paths being incorrectly marked as safe kernel: net/sched: sch_qfq component can be exploited if in qfq_change_agg function happens qfq_enqueue overhead kernel: tun: bugs for oversize packet when napi frags enabled in tun_napi_alloc_frags kernel: use after free in unix_stream_sendpage kernel: net/sched: sch_hfsc UAF kernel: use after free in nvmet_tcp_free_crypto in NVMe kernel: out-of-bounds write in qfq_change_class function kernel: netfilter: potential slab-out-of-bound access due to integer underflow kernel: IGB driver inadequate buffer size for frames larger than MTU | [
"cpe:/o:redhat:rhel_eus:8.6::baseos"
] | null | 7.5 | null | null |
RHSA-2009:1531 | Red Hat Security Advisory: seamonkey security update | array index error in dtoa implementation of many products firefox: (rejected CVE-2009-1563) Firefox heap buffer overflow in string to number conversion Firefox: Predictable /tmp pathname use Firefox cross-origin data theft through document.getSelection() Firefox download filename spoofing with RTL override Firefox crashes with evidence of memory corruption Firefox integer underflow in FTP directory list parser SeaMonkey scriptable plugin execution in mail (mfsa2010-06) | [
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws",
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2021:0474 | Red Hat Security Advisory: dotnet security and bugfix update | dotnet: certificate chain building recursion Denial of Service | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 6.5 | null | null |
RHSA-2023:4877 | Red Hat Security Advisory: java-1.8.0-ibm security update | OpenJDK: improper handling of slash characters in URI-to-path conversion (8305312) | [
"cpe:/a:redhat:enterprise_linux:8::supplementary"
] | null | 3.7 | null | null |
RHSA-2002:117 | Red Hat Security Advisory: : : : Updated secureweb packages fix chunked encoding issue | security flaw | [
"cpe:/a:redhat:secure_web_server:3.2"
] | null | null | null | null |
RHSA-2016:0121 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 6.4.6 update on RHEL 5 | jakarta-taglibs-standard: XXE and RCE via XSL extension in JSTL XML tags | [
"cpe:/a:redhat:jboss_enterprise_application_platform:6::el5"
] | null | null | 7.6 | null |
RHSA-2017:0195 | Red Hat Security Advisory: ansible security update | Ansible: Compromised remote hosts can lead to running commands on the Ansible controller | [
"cpe:/a:redhat:openstack:10::el7"
] | null | null | 6.6 | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.