id
stringlengths 13
15
| title
stringlengths 29
176
| description
stringlengths 8
32.1k
| cpes
sequencelengths 0
20
| cvss_v4_0
null | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
null |
---|---|---|---|---|---|---|---|
RHSA-2011:0882 | Red Hat Security Advisory: Red Hat Network Satellite server jabberd security update | jabberd: DoS via the XML "billion laughs attack" | [
"cpe:/a:redhat:network_satellite:5.4::el5"
] | null | null | null | null |
RHSA-2023:2148 | Red Hat Security Advisory: kernel-rt security and bug fix update | hw: cpu: AMD CPUs may transiently execute beyond unconditional direct branch kernel: ext4: kernel bug in ext4_write_inline_data_end() kernel: malicious data for FBIOPUT_VSCREENINFO ioctl may cause OOB write memory kernel: mlxsw: spectrum: Protect driver from buggy firmware kernel: net: stmmac: fix tc flower deletion for VLAN priority Rx steering kernel: possible race condition in drivers/tty/tty_buffers.c kernel: KVM: NULL pointer dereference in kvm_mmu_invpcid_gva kernel: use-after-free in free_pipe_info() could lead to privilege escalation kernel: KVM: nVMX: missing IBPB when exiting from nested guest can lead to Spectre v2 attacks kernel: netfilter: nf_conntrack_irc message handling issue kernel: race condition in xfrm_probe_algs can lead to OOB read/write kernel: out-of-bounds read in fib_nh_match of the file net/ipv4/fib_semantics.c kernel: race condition in hugetlb_no_page() in mm/hugetlb.c kernel: memory leak in ipv6_renew_options() kernel: data races around icsk->icsk_af_ops in do_ipv6_setsockopt kernel: data races around sk->sk_prot kernel: memory leak in l2cap_recv_acldata of the file net/bluetooth/l2cap_core.c kernel: denial of service in follow_page_pte in mm/gup.c due to poisoned pte entry kernel: use-after-free after failed devlink reload in devlink_param_get kernel: USB-accessible buffer overflow in brcmfmac kernel: use after free flaw in l2cap_conn_del in net/bluetooth/l2cap_core.c kernel: Double-free in split_2MB_gtt_entry when function intel_gvt_dma_map_guest_page failed kernel: mptcp: NULL pointer dereference in subflow traversal at disconnect time kernel: l2tp: missing lock when clearing sk_user_data can lead to NULL pointer dereference kernel: Recursive locking violation in usb-storage that can cause the kernel to deadlock kernel: igmp: use-after-free in ip_check_mc_rcu when opening and closing inet sockets kernel: lockdown bypass using IMA kernel: double free in usb_8dev_start_xmit in drivers/net/can/usb/usb_8dev.c kernel: network backend may cause Linux netfront to use freed SKBs (XSA-405) kernel: vmwgfx: out-of-bounds write in vmw_kms_cursor_snoop kernel: xfrm_expand_policies() in net/xfrm/xfrm_policy.c can cause a refcount to be dropped twice kernel: unmap_mapping_range() race with munmap() on VM_PFNMAP mappings leads to stale TLB entry kernel: TLB flush operations are mishandled in certain KVM_VCPU_PREEMPTED leading to guest malfunctioning kernel: u8 overflow problem in cfg80211_update_notlisted_nontrans() kernel: use-after-free related to leaf anon_vma double reuse kernel: use-after-free in bss_ref_get in net/wireless/scan.c kernel: BSS list corruption in cfg80211_add_nontrans_list in net/wireless/scan.c kernel: Denial of service in beacon protection for P2P-device kernel: use-after-free in l2cap_connect and l2cap_le_connect_req in net/bluetooth/l2cap_core.c kernel: memory corruption in usbmon driver kernel: NULL pointer dereference in traffic control subsystem kernel: scsi: mpt3sas: Fix use-after-free warning kernel: NULL pointer dereference in rawv6_push_pending_frames kernel: net/ulp: use-after-free in listening ULP sockets kernel: use-after-free due to race condition in qdisc_graft() kernel: use-after-free caused by invalid pointer hostname in fs/cifs/connect.c kernel: denial of service in tipc_conn_close Kernel: NULL pointer dereference problem in sctp_sched_dequeue_common kernel: ext4: use-after-free in ext4_xattr_set_entry() kernel: drm/virtio: improper return value check in virtio_gpu_object_shmem_init() kernel: ICMPv6 “Packet Too Big” packets force a DoS of the Linux kernel by forcing 100% CPU | [
"cpe:/a:redhat:enterprise_linux:9::nfv",
"cpe:/a:redhat:enterprise_linux:9::realtime"
] | null | 6.5 | null | null |
RHSA-2025:0133 | Red Hat Security Advisory: firefox security update | firefox: thunderbird: WebChannel APIs susceptible to confused deputy attack firefox: thunderbird: Use-after-free when breaking lines in text firefox: Alt-Svc ALPN validation failure when redirected firefox: Compartment mismatch when parsing JavaScript JSON module firefox: Memory corruption when using JavaScript Text Segmentation firefox: thunderbird: Memory safety bugs fixed in Firefox 134, Thunderbird 134, Firefox ESR 115.19, Firefox ESR 128.6, Thunderbird 115.19, and Thunderbird 128.6 firefox: thunderbird: Memory safety bugs fixed in Firefox 134, Thunderbird 134, Firefox ESR 128.6, and Thunderbird 128.6 | [
"cpe:/a:redhat:rhel_aus:8.2::appstream"
] | null | 7.5 | null | null |
RHSA-2023:7521 | Red Hat Security Advisory: OpenShift Virtualization 4.13.6 RPMs security and bug fix update | golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487) HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack) | [
"cpe:/a:redhat:container_native_virtualization:4.13::el7",
"cpe:/a:redhat:container_native_virtualization:4.13::el8",
"cpe:/a:redhat:container_native_virtualization:4.13::el9"
] | null | 7.5 | null | null |
RHBA-2022:0348 | Red Hat Bug Fix Advisory: container-tools:3.0 security, bug fix, and enhancement update | containers/storage: DoS via malicious image | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 6.5 | null | null |
RHSA-2024:8449 | Red Hat Security Advisory: edk2 security update | edk2: Buffer overflow when handling Server ID option from a DHCPv6 proxy Advertise message | [
"cpe:/a:redhat:rhel_aus:8.4::appstream",
"cpe:/a:redhat:rhel_e4s:8.4::appstream",
"cpe:/a:redhat:rhel_tus:8.4::appstream"
] | null | 8.8 | null | null |
RHSA-2023:7502 | Red Hat Security Advisory: thunderbird security update | Mozilla: Out-of-bound memory access in WebGL2 blitFramebuffer Mozilla: Use-after-free in MessagePort::Entangled Mozilla: Clickjacking permission prompts using the fullscreen transition Mozilla: Use-after-free in ReadableByteStreamQueueEntry::Buffer Mozilla: Using Selection API would copy contents into X11 primary selection. Mozilla: Incorrect parsing of relative URLs starting with "///" Mozilla: Memory safety bugs fixed in Firefox 120, Firefox ESR 115.5, and Thunderbird 115.5 | [
"cpe:/a:redhat:rhel_e4s:8.1::appstream"
] | null | 8.8 | null | null |
RHSA-2017:0559 | Red Hat Security Advisory: openjpeg security update | openjpeg: Heap overflow in parsing of JPEG2000 precincts openjpeg: heap overflow due to unsafe use of opj_aligned_malloc openjpeg: heap overflow in parsing of JPEG2000 code blocks openjpeg: Integer overflow in opj_pi_create_decode openjpeg: incorrect fix for CVE-2013-6045 | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | 7.5 | null |
RHSA-2022:8855 | Red Hat Security Advisory: Red Hat OpenStack Platform 16.2.4 (openstack-neutron) security update | openstack-neutron: unrestricted creation of security groups | [
"cpe:/a:redhat:openstack:16.2::el8"
] | null | 4.3 | null | null |
RHSA-2024:6205 | Red Hat Security Advisory: libproxy security update | libproxy: uncontrolled recursion via an infinite stream response leading to stack exhaustion libproxy: sending more than 102400 bytes in PAC without a Content-Length present could result in buffer overflow | [
"cpe:/a:redhat:rhel_eus:8.8::appstream",
"cpe:/a:redhat:rhel_eus:8.8::crb",
"cpe:/o:redhat:rhel_eus:8.8::baseos"
] | null | 7.5 | null | null |
RHSA-2024:10035 | Red Hat Security Advisory: Red Hat Build of Apache Camel 4.4 for Quarkus 3.8 update is now available (RHBQ 3.8.6.SP2) | io.quarkiverse.cxf:quarkus-cxf: Quarkus CXF may log user password and secret to application log org.hl7.fhir.convertors: org.hl7.fhir.dstu2: org.hl7.fhir.dstu2016may: org.hl7.fhir.dstu3: org.hl7.fhir.r4: org.hl7.fhir.r5: org.hl7.fhir.utilities: org.hl7.fhir.validation: org.hl7.fhir.core: FHIR arbitrary code execution via specially-crafted request | [
"cpe:/a:redhat:camel_quarkus:3.8"
] | null | 5.3 | 9.1 | null |
RHSA-2020:1576 | Red Hat Security Advisory: memcached security update | memcached: null-pointer dereference in "lru mode" and "lru temp_ttl" causing denial of service | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | null | 7.5 | null |
RHSA-2016:1389 | Red Hat Security Advisory: Red Hat JBoss Fuse Service Works security update | JGroups: Authorization bypass | [
"cpe:/a:redhat:jboss_fuse_service_works:6.0"
] | null | null | 9.8 | null |
RHSA-2005:397 | Red Hat Security Advisory: evolution security update | security flaw security flaw | [
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2021:1846 | Red Hat Security Advisory: idm:DL1 and idm:client security, bug fix, and enhancement update | jquery: Untrusted code execution via <option> tag in HTML passed to DOM manipulation methods | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 6.1 | null | null |
RHSA-2023:3948 | Red Hat Security Advisory: open-vm-tools security update | open-vm-tools: authentication bypass vulnerability in the vgauth module | [
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 3.9 | null | null |
RHSA-2024:6529 | Red Hat Security Advisory: dovecot security update | dovecot: using a large number of address headers may trigger a denial of service dovecot: very large headers can cause resource exhaustion when parsing message | [
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::crb"
] | null | 6.8 | null | null |
RHSA-2019:3170 | Red Hat Security Advisory: python security update | python: Information Disclosure due to urlsplit improper NFKC normalization | [
"cpe:/o:redhat:rhel_aus:7.4::server",
"cpe:/o:redhat:rhel_e4s:7.4::server",
"cpe:/o:redhat:rhel_tus:7.4::server"
] | null | null | 9.8 | null |
RHSA-2007:0540 | Red Hat Security Advisory: openssh security and bug fix update | Kerberos information leak audit logging of failed logins | [
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2014:0679 | Red Hat Security Advisory: openssl security update | openssl: freelist misuse causing a possible use-after-free openssl: Buffer overflow via DTLS invalid fragment openssl: SSL_MODE_RELEASE_BUFFERS NULL pointer dereference in do_ssl3_write() openssl: DoS when sending invalid DTLS handshake openssl: SSL/TLS MITM vulnerability openssl: client-side denial of service when using anonymous ECDH | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | null | null |
RHSA-2024:10734 | Red Hat Security Advisory: thunderbird security update | thunderbird: Potential disclosure of plaintext in OpenPGP encrypted message firefox: thunderbird: Select list elements could be shown over another site firefox: thunderbird: CSP Bypass and XSS Exposure via Web Compatibility Shims firefox: thunderbird: URL Bar Spoofing via Manipulated Punycode and Whitespace Characters firefox: thunderbird: Unhandled Exception in Add-on Signature Verification firefox: thunderbird: Improper Keypress Handling in Executable File Confirmation Dialog firefox: thunderbird: Memory safety bugs fixed in Firefox 133, Thunderbird 133, Firefox ESR 128.5, and Thunderbird 128.5 | [
"cpe:/a:redhat:rhel_aus:8.6::appstream",
"cpe:/a:redhat:rhel_e4s:8.6::appstream",
"cpe:/a:redhat:rhel_tus:8.6::appstream"
] | null | 8.8 | null | null |
RHSA-2023:5713 | Red Hat Security Advisory: nginx:1.22 security update | HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack) | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 7.5 | null | null |
RHSA-2024:9816 | Red Hat Security Advisory: tigervnc security update | xorg-x11-server: tigervnc: heap-based buffer overflow privilege escalation vulnerability | [
"cpe:/a:redhat:rhel_eus:9.4::appstream"
] | null | 7.8 | null | null |
RHSA-2020:3308 | Red Hat Security Advisory: Red Hat JBoss Web Server 5.3.2 security update | tomcat: OutOfMemoryException caused by HTTP/2 connection leak could lead to DoS tomcat: multiple requests with invalid payload length in a WebSocket frame could lead to DoS | [
"cpe:/a:redhat:jboss_enterprise_web_server:5.3"
] | null | 7.5 | null | null |
RHSA-2025:0676 | Red Hat Security Advisory: Multicluster Engine for Kubernetes 2.5.8 security updates and bug fixes | golang.org/x/crypto/ssh: Misuse of ServerConfig.PublicKeyCallback may cause authorization bypass in golang.org/x/crypto | [
"cpe:/a:redhat:multicluster_engine:2.5::el8"
] | null | 8.2 | null | null |
RHSA-2017:0830 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform security update | wildfly: ParseState headerValuesCache can be exploited to fill heap with garbage | [
"cpe:/a:redhat:jboss_enterprise_application_platform:7"
] | null | null | 7.5 | null |
RHSA-2016:0428 | Red Hat Security Advisory: libssh2 security update | libssh2: bits/bytes confusion resulting in truncated Diffie-Hellman secret length | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation",
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | null | null |
RHSA-2024:5529 | Red Hat Security Advisory: curl security update | curl: HTTP/2 push headers memory-leak | [
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/o:redhat:enterprise_linux:9::baseos"
] | null | 7.5 | null | null |
RHSA-2014:0907 | Red Hat Security Advisory: java-1.6.0-openjdk security and bug fix update | OpenJDK: Event logger format string vulnerability (Hotspot, 8037076) OpenJDK: SubjectDelegator protection insufficient (JMX, 8029755) OpenJDK: Incorrect generic signature attribute parsing (Hotspot, 8037076) OpenJDK: Clone interfaces passed to proxy methods (Libraries, 8035009) OpenJDK: Bytecode verification does not prevent ctor calls to this() and super() (Hotspot, 8035119) OpenJDK: RSA blinding issues (Security, 8031346) OpenJDK: Prevent instantiation of service with non-public constructor (Security, 8035004) OpenJDK: AtomicReferenceFieldUpdater missing primitive type check (Libraries, 8039520) OpenJDK: insufficient Diffie-Hellman public key validation (Security, 8037162) OpenJDK: InfoBuilder incorrect return values (Serviceability, 8033301) | [
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::server",
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation",
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | null | null |
RHSA-2022:7021 | Red Hat Security Advisory: thunderbird security update | expat: a use-after-free in the doContent function in xmlparse.c | [
"cpe:/a:redhat:rhel_e4s:8.1::appstream"
] | null | 8.1 | null | null |
RHSA-2023:4215 | Red Hat Security Advisory: kpatch-patch security update | kernel: use-after-free caused by l2cap_reassemble_sdu() in net/bluetooth/l2cap_core.c | [
"cpe:/o:redhat:enterprise_linux:7::server"
] | null | 7.1 | null | null |
RHSA-2021:1853 | Red Hat Security Advisory: unbound security, bug fix, and enhancement update | unbound: integer overflow in the regional allocator via regional_alloc unbound: integer overflow in sldns_str2wire_dname_buf_origin can lead to an out-of-bounds write unbound: out-of-bounds write in sldns_bget_token_par unbound: assertion failure and denial of service in synth_cname unbound: assertion failure and denial of service in dname_pkt_copy via an invalid packet unbound: integer overflow in a size calculation in dnscrypt/dnscrypt.c unbound: integer overflow in a size calculation in respip/respip.c unbound: infinite loop via a compressed name in dname_pkt_copy unbound: assertion failure via a compressed name in dname_pkt_copy unbound: out-of-bounds write via a compressed name in rdata_copy unbound: symbolic link traversal when writing PID file | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 4.4 | null | null |
RHSA-2018:0816 | Red Hat Security Advisory: qemu-kvm security, bug fix, and enhancement update | QEMU: vga: OOB read access during display update QEMU: Slirp: use-after-free when sending response Qemu: memory exhaustion through framebuffer update request message in VNC server QEMU: I/O: potential memory exhaustion via websock connection to VNC Qemu: Out-of-bounds read in vga_draw_text routine | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 3 | null |
RHSA-2021:4058 | Red Hat Security Advisory: samba security update | samba: Negative idmap cache entries can cause incorrect group entries in the Samba file server process token | [
"cpe:/a:redhat:enterprise_linux:8::crb",
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 6.8 | null | null |
RHSA-2022:5052 | Red Hat Security Advisory: xz security update | gzip: arbitrary-file-write vulnerability | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 8.8 | null | null |
RHSA-2023:0205 | Red Hat Security Advisory: java-1.8.0-openjdk security update | OpenJDK: improper restrictions in CORBA deserialization (Serialization, 8285021) OpenJDK: soundbank URL remote loading (Sound, 8293742) | [
"cpe:/a:redhat:rhel_aus:8.2::appstream",
"cpe:/a:redhat:rhel_e4s:8.2::appstream",
"cpe:/a:redhat:rhel_tus:8.2::appstream"
] | null | 3.7 | null | null |
RHSA-2018:2948 | Red Hat Security Advisory: kernel-alt security, bug fix, and enhancement update | kernel: v4l2: disabled memory access protection mechanism allowing privilege escalation kernel: Use-after-free in drivers/media/dvb-core/dvb_frontend.c kernel: Salsa20 encryption algorithm does not correctly handle zero-length inputs allowing local attackers to cause denial-of-service kernel: HMAC implementation does not validate that the underlying cryptographic hash algorithm is unkeyed allowing local attackers to cause denial-of-service kernel: Mishandled freeing of instances in pcrypt.c can allow a local user to cause a denial of service kernel: Inifinite loop vulnerability in mm/madvise.c:madvise_willneed() function allows local denial of service kernel: out-of-bounds access in the show_timer function in kernel/time/posix-timers.c kernel: netfilter: xtables NULL pointer dereference in ip6_tables.c:ip6t_do_table() leading to a crash kernel: Out-of-bounds write via userland offsets in ebt_entry struct in netfilter/ebtables.c kernel: NULL pointer dereference in ext4/mballoc.c:ext4_process_freed_data() when mounting crafted ext4 image kernel: NULL pointer dereference in ext4/xattr.c:ext4_xattr_inode_hash() causes crash with crafted ext4 image kernel: out-of-bound access in fs/posix_acl.c:get_acl() causes crash with crafted ext4 image kernel: vhost: Information disclosure in vhost/vhost.c:vhost_new_msg() kernel: fuse-backed file mmap-ed onto process cmdline arguments causes denial of service hw: cpu: speculative store bypass kernel: drivers/block/loop.c mishandles lo_release serialization allowing denial-of-service kernel: TCP segments with random offsets allow a remote denial of service (SegmentSmack) kernel: IP fragments with random offsets allow a remote denial of service (FragmentSmack) kernel: Kernel address information leak in drivers/acpi/sbshc.c:acpi_smbus_hc_add() function potentially allowing KASLR bypass kernel: Missing length check of payload in net/sctp/sm_make_chunk.c:_sctp_make_chunk() function allows denial of service kernel: buffer overflow in drivers/net/wireless/ath/wil6210/wmi.c:wmi_set_ie() may lead to memory corruption kernel: race condition in snd_seq_write() may lead to UAF or OOB-access kernel: Memory leak in the sas_smp_get_phy_events function in drivers/scsi/libsas/sas_expander.c kernel: Integer overflow in drivers/gpu/drm/udl/udl_fb.c:udl_fb_mmap() can allow attackers to execute code in kernel space kernel: Buffer overflow in hidp_process_report kernel: Invalid pointer dereference in xfs_ilock_attr_map_shared() when mounting crafted xfs image allowing denial of service kernel: out-of-bound access in ext4_ext_drop_refs function with a crafted ext4 image kernel: out-of-bound write in ext4_init_block_bitmap function with a crafted ext4 image kernel: use-after-free detected in ext4_xattr_set_entry with a crafted file kernel: stack-out-of-bounds write in ext4_update_inline_data function kernel: out-of-bound access in ext4_get_group_info() when mounting and operating a crafted ext4 image kernel: stack-out-of-bounds write infs/jbd2/transaction.c kernel: stack-out-of-bounds write in jbd2_journal_dirty_metadata function kernel: incorrect memory bounds check in drivers/cdrom/cdrom.c kernel: Stack-based buffer overflow in drivers/scsi/sr_ioctl.c allows denial of service or other unspecified impact kernel: NULL pointer dereference if close and fchownat system calls share a socket file descriptor kernel: Missing check in fs/inode.c:inode_init_owner() does not clear SGID bit on non-directories for non-members kernel: crash (possible privesc) in kernel crypto api. kernel: a bug in ip_frag_reasm() can cause a crash in ip_do_fragment() kernel: Improper validation in bnx2x network card driver can allow for denial of service attacks via crafted packet kernel: NULL pointer dereference on OOM kill of large mlocked process kernel: Infoleak caused by incorrect handling of the SG_IO ioctl | [
"cpe:/o:redhat:enterprise_linux:7::server"
] | null | null | 4.1 | null |
RHSA-2021:4953 | Red Hat Security Advisory: nss security update | nss: Memory corruption in decodeECorDsaSignature with DSA signatures (and RSA-PSS) | [
"cpe:/a:redhat:rhel_eus:8.1::appstream"
] | null | 9.8 | null | null |
RHSA-2016:0502 | Red Hat Security Advisory: python-django security update | python-django: Malicious redirect and possible XSS attack via user-supplied redirect URLs containing basic auth python-django: User enumeration through timing difference on password hasher work factor upgrade | [
"cpe:/a:redhat:openstack:5::el6"
] | null | null | null | null |
RHSA-2020:1340 | Red Hat Security Advisory: firefox security update | Mozilla: Use-after-free while running the nsDocShell destructor Mozilla: Use-after-free when handling a ReadableStream | [
"cpe:/a:redhat:rhel_e4s:8.0::appstream"
] | null | 8.8 | null | null |
RHSA-2005:069 | Red Hat Security Advisory: perl security update | security flaw | [
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws"
] | null | null | null | null |
RHSA-2014:1053 | Red Hat Security Advisory: openssl security update | openssl: DoS when sending invalid DTLS handshake openssl: DTLS packet processing double free openssl: DTLS memory exhaustion openssl: information leak in pretty printing functions openssl: DTLS anonymous (EC)DH denial of service | [
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2022:0927 | Red Hat Security Advisory: OpenShift Container Platform 4.10.5 packages and security update | golang: net/http: limit growth of header canonicalization cache golang: syscall: don't close fd 0 on ForkExec error | [
"cpe:/a:redhat:openshift:4.10::el7",
"cpe:/a:redhat:openshift:4.10::el8"
] | null | 4.8 | null | null |
RHSA-2024:0237 | Red Hat Security Advisory: java-11-openjdk security update | OpenJDK: array out-of-bounds access due to missing range check in C1 compiler (8314468) OpenJDK: JVM class file verifier flaw allows unverified bytecode execution (8314295) OpenJDK: range check loop optimization issue (8314307) OpenJDK: arbitrary Java code execution in Nashorn (8314284) OpenJDK: logging of digital signature private keys (8316976) OpenJDK: RSA padding issue and timing side-channel attack against TLS (8317547) | [
"cpe:/a:redhat:rhel_eus:9.0::appstream",
"cpe:/a:redhat:rhel_eus:9.0::crb"
] | null | 7.4 | null | null |
RHSA-2020:2522 | Red Hat Security Advisory: kernel security and bug fix update | kernel: double free may be caused by the function allocate_trace_buffer in the file kernel/trace/trace.c kernel: denial of service via ioctl call in network tun handling kernel: usb: missing size check in the __usb_get_extra_descriptor() leading to DoS kernel: perf_event_open() and execve() race in setuid programs allows a data leak kernel: brcmfmac frame validation bypass Kernel: net: using kernel space address bits to derive IP ID may potentially break KASLR kernel: unchecked kstrdup of fwstr in drm_load_edid_firmware leads to denial of service kernel: use-after-free in arch/x86/lib/insn-eval.c kernel: integer overflow and OOB read in drivers/block/floppy.c kernel: memory leak in register_queue_kobjects() in net/core/net-sysfs.c leads to denial of service kernel: use-after-free in __blk_add_trace in kernel/trace/blktrace.c Kernel: NetLabel: null pointer dereference while receiving CIPSO packet with null category may cause kernel panic | [
"cpe:/o:redhat:rhel_eus:7.7::computenode",
"cpe:/o:redhat:rhel_eus:7.7::server"
] | null | 5.9 | 5.5 | null |
RHSA-2021:3159 | Red Hat Security Advisory: firefox security update | Mozilla: Uninitialized memory in a canvas object could have led to memory corruption Mozilla: Incorrect instruction reordering during JIT optimization Mozilla: Use-after-free media channels Mozilla: Race condition when resolving DNS names could have led to memory corruption Mozilla: Memory corruption as a result of incorrect style treatment Mozilla: Memory safety bugs fixed in Thunderbird 78.13 | [
"cpe:/a:redhat:rhel_eus:8.1::appstream"
] | null | 8.8 | 7.5 | null |
RHSA-2015:1640 | Red Hat Security Advisory: pam security update | pam: DoS/user enumeration due to blocking pipe in pam_unix module | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation",
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | null | null |
RHSA-2022:0418 | Red Hat Security Advisory: varnish:6 security update | varnish: HTTP/1 request smuggling vulnerability | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 9.1 | null | null |
RHSA-2010:0547 | Red Hat Security Advisory: firefox security update | firefox: cross-domain information disclosure libpng: out-of-bounds memory write Firefox: Spoofing attacks via vectors involving 'No Content' status code or via a windows.stop call Mozilla Same-origin bypass using canvas context Mozilla DOM attribute cloning remote code execution vulnerability Mozilla Use-after-free error in NodeIterator Mozilla Characters mapped to U+FFFD in 8 bit encodings cause subsequent character to vanish Mozilla miscellaneous memory safety hazards Mozilla miscellaneous memory safety hazards Mozilla Cross-origin data disclosure via Web Workers and importScripts Mozilla Plugin parameter EnsureCachedAttrParamArrays remote code execution vulnerability Mozilla Arbitrary code execution using SJOW and fast native function Mozilla SSL spoofing with history.back() and history.forward() nsCSSValue:: Array index integer overflow Mozilla nsTreeSelection dangling pointer remote code execution vulnerability Mozilla Cross-origin data leakage from script filename in error messages | [
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws",
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2010:0076 | Red Hat Security Advisory: kernel security and bug fix update | kernel: gdth: Prevent negative offsets in ioctl kernel: megaraid_sas permissions in sysfs kernel: megaraid_sas permissions in sysfs kernel: isdn: hfc_usb: fix read buffer overflow kernel: hfs buffer overflow | [
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2020:1347 | Red Hat Security Advisory: kernel security and bug fix update | kernel: heap overflow in mwifiex_update_vs_ie() function of Marvell WiFi driver kernel: rtl_p2p_noa_ie in drivers/net/wireless/realtek/rtlwifi/ps.c in the Linux kernel lacks a certain upper-bound check, leading to a buffer overflow | [
"cpe:/o:redhat:rhel_aus:7.4::server",
"cpe:/o:redhat:rhel_e4s:7.4::server",
"cpe:/o:redhat:rhel_tus:7.4::server"
] | null | null | 6.3 | null |
RHSA-2013:0993 | Red Hat Security Advisory: openstack-swift security and bug fix update | Swift: Unchecked user input in Swift XML responses | [
"cpe:/a:redhat:openstack:3::el6"
] | null | null | null | null |
RHSA-2011:1109 | Red Hat Security Advisory: foomatic security update | foomatic: Improper sanitization of command line option in foomatic-rip | [
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws",
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2014:0457 | Red Hat Security Advisory: Django security update | python-django: unexpected code execution using reverse() python-django: caching of anonymous pages could reveal CSRF token python-django: MySQL typecasting | [
"cpe:/a:redhat:openstack:3::el6"
] | null | null | null | null |
RHSA-2020:0598 | Red Hat Security Advisory: nodejs:12 security update | nodejs: Remotely trigger an assertion on a TLS server with a malformed certificate string nodejs: HTTP request smuggling using malformed Transfer-Encoding header nodejs: HTTP header values do not have trailing optional whitespace trimmed | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 4.8 | null | null |
RHSA-2022:0448 | Red Hat Security Advisory: Red Hat Single Sign-On 7.5.1 security update on RHEL 8 | undertow: client side invocation timeout raised when calling over HTTP2 log4j: Remote code execution in Log4j 1.x when application is configured to use JMSAppender log4j: Remote code execution in Log4j 1.x when application is configured to use JMSSink log4j: SQL injection in Log4j 1.x when application is configured to use JDBCAppender log4j: Unsafe deserialization flaw in Chainsaw log viewer | [
"cpe:/a:redhat:red_hat_single_sign_on:7.5::el8"
] | null | 8.8 | null | null |
RHSA-2020:1331 | Red Hat Security Advisory: ipmitool security update | ipmitool: Buffer overflow in read_fru_area_section function in lib/ipmi_fru.c | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | 8.1 | null | null |
RHSA-2024:2213 | Red Hat Security Advisory: pcp security update | pcp: unsafe use of directories allows pcp to root privilege escalation | [
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 6 | null | null |
RHSA-2020:3456 | Red Hat Security Advisory: libvncserver security update | libvncserver: websocket decoding buffer overflow | [
"cpe:/a:redhat:rhel_eus:8.1::appstream",
"cpe:/a:redhat:rhel_eus:8.1::crb"
] | null | 9.8 | null | null |
RHSA-2007:0595 | Red Hat Security Advisory: kernel security and bug fix update | security flaw | [
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2007:0343 | Red Hat Security Advisory: gimp security update | Stack overflow in gimp's sunras plugin | [
"cpe:/o:redhat:enterprise_linux:2.1::as",
"cpe:/o:redhat:enterprise_linux:2.1::aw",
"cpe:/o:redhat:enterprise_linux:2.1::es",
"cpe:/o:redhat:enterprise_linux:2.1::ws",
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws",
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws",
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2023:1882 | Red Hat Security Advisory: OpenJDK 11.0.19 Security Update for Portable Linux Builds | OpenJDK: improper connection handling during TLS handshake (8294474) OpenJDK: missing string checks for NULL characters (8296622) OpenJDK: incorrect handling of NULL characters in ProcessBuilder (8295304) OpenJDK: Swing HTML parsing issue (8296832) OpenJDK: incorrect enqueue of references in garbage collector (8298191) OpenJDK: certificate validation issue in TLS session negotiation (8298310) OpenJDK: missing check for slash characters in URI-to-path conversion (8298667) | [
"cpe:/a:redhat:openjdk:11"
] | null | 3.7 | null | null |
RHSA-2021:1476 | Red Hat Security Advisory: bind security update | bind: An assertion check can fail while answering queries for DNAME records that require the DNAME to be processed to resolve itself | [
"cpe:/o:redhat:rhel_aus:7.2::server"
] | null | 7.5 | null | null |
RHSA-2014:1686 | Red Hat Security Advisory: openstack-neutron security and bug fix update | openstack-neutron: Admin-only network attributes may be reset to defaults by non-privileged users | [
"cpe:/a:redhat:openstack:4::el6"
] | null | null | null | null |
RHSA-2023:7606 | Red Hat Security Advisory: OpenShift Container Platform 4.13.25 packages and security update | haproxy: Proxy forwards malformed empty Content-Length headers | [
"cpe:/a:redhat:openshift:4.13::el8",
"cpe:/a:redhat:openshift:4.13::el9"
] | null | 7.5 | null | null |
RHSA-2024:4092 | Red Hat Security Advisory: redhat-ds:12 security, bug fix update | 389-ds-base: Malformed userPassword may cause crash at do_modify in slapd/modify.c 389-ds-base: potential denial of service via specially crafted kerberos AS-REQ request | [
"cpe:/a:redhat:directory_server:12.4::el9"
] | null | 7.5 | null | null |
RHSA-2019:3433 | Red Hat Security Advisory: go-toolset:rhel8 security, bug fix, and enhancement update | golang: malformed hosts in URLs leads to authorization bypass | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | null | 7.5 | null |
RHSA-2020:5618 | Red Hat Security Advisory: thunderbird security update | chromium-browser: Uninitialized Use in V8 Mozilla: Heap buffer overflow in WebGL Mozilla: CSS Sanitizer performed incorrect sanitization Mozilla: Incorrect cast of StyleGenericFlexBasis resulted in a heap use-after-free Mozilla: Internal network hosts could have been probed by a malicious webpage Mozilla: The proxy.onRequest API did not catch view-source URLs Mozilla: Memory safety bugs fixed in Firefox 84 and Firefox ESR 78.6 | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 8.8 | 6.1 | null |
RHSA-2014:1293 | Red Hat Security Advisory: bash security update | bash: specially-crafted environment variables can be used to inject shell commands | [
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::server",
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation",
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | null | null |
RHSA-2024:7203 | Red Hat Security Advisory: git-lfs security update | encoding/gob: golang: Calling Decoder.Decode on a message which contains deeply nested structures can cause a panic due to stack exhaustion | [
"cpe:/a:redhat:rhel_eus:9.2::appstream"
] | null | 7.5 | null | null |
RHSA-2005:175 | Red Hat Security Advisory: kdenetwork security update | security flaw | [
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws"
] | null | null | null | null |
RHSA-2015:1254 | Red Hat Security Advisory: curl security, bug fix, and enhancement update | curl: incorrect handling of IP addresses in cookie domain curl: incorrect handle duplication after COPYPOSTFIELDS curl: URL request injection vulnerability in parseurlandfillconn() curl: re-using authenticated connection when unauthenticated curl: Negotiate not treated as connection-oriented | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2024:0532 | Red Hat Security Advisory: tomcat security update | tomcat: HTTP request smuggling via malformed trailer headers | [
"cpe:/a:redhat:rhel_eus:8.8::appstream"
] | null | 7.5 | null | null |
RHSA-2005:361 | Red Hat Security Advisory: vixie-cron security update | security flaw | [
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2023:1855 | Red Hat Security Advisory: Red Hat JBoss EAP 7.4.10 XP 4.0.0.GA security release | WildFly: possible information disclosure protobuf-java: Textformat parsing issue leads to DoS protobuf-java: Message-Type Extensions parsing issue leads to DoS | [
"cpe:/a:redhat:jbosseapxp"
] | null | 5.3 | null | null |
RHSA-2016:0306 | Red Hat Security Advisory: openssl security update | openssl: assertion failure in SSLv2 servers OpenSSL: SSLv2 doesn't block disabled ciphers openssl: Divide-and-conquer session key recovery in SSLv2 openssl: SSLv2 Bleichenbacher protection overwrites wrong bytes for export ciphers SSL/TLS: Cross-protocol attack on TLS using SSLv2 (DROWN) | [
"cpe:/o:redhat:rhel_els:4::as",
"cpe:/o:redhat:rhel_els:4::es"
] | null | null | null | null |
RHSA-2018:0014 | Red Hat Security Advisory: linux-firmware security update | An update for linux-firmware is now available for Red Hat Enterprise Linux 7.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | null | null |
RHSA-2003:395 | Red Hat Security Advisory: gnupg security update | security flaw | [
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws"
] | null | null | null | null |
RHSA-2016:0018 | Red Hat Security Advisory: openstack-nova security update | openstack-nova: Unprivileged API user can access host data using instance snapshot | [
"cpe:/a:redhat:openstack:5::el7",
"cpe:/a:redhat:openstack:6::el7",
"cpe:/a:redhat:openstack:7::el7"
] | null | null | null | null |
RHSA-2015:1642 | Red Hat Security Advisory: Red Hat JBoss Web Server 2.1.0 security update | mod_jk: information leak due to incorrect JkMount/JkUnmount directives processing mod_cluster: JavaScript code injection is possible via MCMP mod_manager messages | [
"cpe:/a:redhat:jboss_enterprise_web_server:2::el5",
"cpe:/a:redhat:jboss_enterprise_web_server:2::el6",
"cpe:/a:redhat:jboss_enterprise_web_server:2::el7"
] | null | null | null | null |
RHSA-2022:1173 | Red Hat Security Advisory: httpd security update | httpd: Errors encountered during the discarding of request body lead to HTTP request smuggling | [
"cpe:/o:redhat:rhel_els:6"
] | null | 8.3 | null | null |
RHSA-2020:1912 | Red Hat Security Advisory: bluez security update | bluez: failure in disabling Bluetooth discoverability in certain cases may lead to the unauthorized pairing of Bluetooth devices | [
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb",
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | null | 4.5 | null |
RHSA-2006:0500 | Red Hat Security Advisory: freetype security update | security flaw freetype: multiple integer overflow vulnerabilities security flaw freetype: integer overflow vulnerability due to incomplete fix for CVE-2006-1861 | [
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws",
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2015:2068 | Red Hat Security Advisory: nss, nss-util, and nspr security update | nss: use-after-poison in sec_asn1d_parse_leaf() (MFSA 2015-133) nss: ASN.1 decoder heap overflow when decoding constructed OCTET STRING that mixes indefinite and definite length encodings (MFSA 2015-133) nspr: heap-buffer overflow in PL_ARENA_ALLOCATE (MFSA 2015-133) | [
"cpe:/o:redhat:rhel_aus:6.4::server",
"cpe:/o:redhat:rhel_eus:6.5::computenode",
"cpe:/o:redhat:rhel_eus:6.5::server",
"cpe:/o:redhat:rhel_eus:6.6::computenode",
"cpe:/o:redhat:rhel_eus:6.6::server",
"cpe:/o:redhat:rhel_mission_critical:6.2::server"
] | null | null | null | null |
RHSA-2015:2549 | Red Hat Security Advisory: libxml2 security update | libxml2: CPU exhaustion when processing specially crafted XML input libxml2: Heap-based buffer overflow in xmlDictComputeFastQKey libxml2: Heap-based buffer overflow in xmlParseXmlDecl libxml2: Heap-based buffer overflow in xmlGROW libxml2: Heap buffer overflow in xmlParseMisc libxml2: Out-of-bounds memory access libxml2: heap-based buffer overflow in xmlParseConditionalSections() libxml2: Buffer overread with XML parser in xmlNextChar libxml2: Buffer overread with HTML parser in push mode in xmlSAX2TextNode libxml2: Out-of-bounds heap read when parsing file with unfinished xml declaration libxml2: out-of-bounds memory access when parsing an unclosed HTML comment | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2022:6531 | Red Hat Security Advisory: OpenShift Container Platform 4.10.33 packages and security update | jenkins-plugin/junit: Stored XSS vulnerability in JUnit Plugin jenkins-plugin: Arbitrary file write vulnerability in Pipeline Input Step Plugin | [
"cpe:/a:redhat:openshift:4.10::el7",
"cpe:/a:redhat:openshift:4.10::el8"
] | null | 7.5 | null | null |
RHSA-2020:3385 | Red Hat Security Advisory: libvncserver security update | libvncserver: websocket decoding buffer overflow | [
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb"
] | null | 9.8 | null | null |
RHSA-2024:0766 | Red Hat Security Advisory: OpenShift Container Platform 4.15.0 security update | golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487) opentelemetry: DoS vulnerability in otelhttp opentelemetry-go-contrib: DoS vulnerability in otelgrpc due to unbound cardinality metrics ssh: Prefix truncation attack on Binary Packet Protocol (BPP) | [
"cpe:/a:redhat:openshift:4.15::el8",
"cpe:/a:redhat:openshift:4.15::el9"
] | null | 5.9 | null | null |
RHSA-2013:1825 | Red Hat Security Advisory: php53 security update | php: memory corruption in openssl_x509_parse() | [
"cpe:/o:redhat:rhel_eus:5.6",
"cpe:/o:redhat:rhel_eus:5.9"
] | null | null | null | null |
RHSA-2022:4788 | Red Hat Security Advisory: openvswitch2.16 security update | DPDK: out-of-bounds read/write in vhost_user_set_inflight_fd() may lead to crash dpdk: sending vhost-user-inflight type messages could lead to DoS | [
"cpe:/o:redhat:enterprise_linux:8::fastdatapath"
] | null | 6.5 | null | null |
RHSA-2020:0316 | Red Hat Security Advisory: git security update | git: arbitrary code execution via .gitmodules | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | 8.8 | null |
RHSA-2018:0628 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.1 security update | slf4j: Deserialisation vulnerability in EventData constructor can allow for arbitrary code execution | [
"cpe:/a:redhat:jboss_enterprise_application_platform:7.1::el7",
"cpe:/a:redhat:jboss_enterprise_application_platform:7::el6"
] | null | null | 8.1 | null |
RHSA-2004:449 | Red Hat Security Advisory: cups security update | security flaw | [
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws"
] | null | null | null | null |
RHSA-2012:0308 | Red Hat Security Advisory: busybox security and bug fix update | ncompress: .bss buffer underflow in decompression busybox: udhcpc insufficient checking of DHCP options | [
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2019:0593 | Red Hat Security Advisory: openstack-octavia security update | openstack-octavia: Private keys written to world-readable log files | [
"cpe:/a:redhat:openstack:14::el7"
] | null | null | 5.5 | null |
RHSA-2010:0807 | Red Hat Security Advisory: java-1.5.0-ibm security update | TLS: MITM attacks via session renegotiation krb5: null pointer dereference in GSS-API library leads to DoS (MITKRB5-SA-2010-005) OpenJDK HttpURLConnection allows arbitrary request headers (6961084,6980004) OpenJDK DNS server IP address information leak (6957564) OpenJDK HttpURLConnection request splitting (6952017) JDK unspecified vulnerability in Java Web Start component OpenJDK local network address disclosure (6952603) JDK unspecified vulnerability in 2D component JDK unspecified vulnerability in Sound component OpenJDK IndexColorModel double-free (6925710) OpenJDK JPEG writeImage remote code execution (6963023) OpenJDK ICC Profile remote code execution (6963489) OpenJDK Deserialization Race condition (6559775) OpenJDK Serialization inconsistencies (6966692) JDK unspecified vulnerability in Sound component OpenJDK HttpURLConnection allows arbitrary request headers (6961084,6980004) OpenJDK HttpURLConnection incomplete TRACE permission check (6981426) | [
"cpe:/a:redhat:rhel_extras:4",
"cpe:/a:redhat:rhel_extras:5::client",
"cpe:/a:redhat:rhel_extras:5::server"
] | null | null | null | null |
RHSA-2021:1192 | Red Hat Security Advisory: thunderbird security update | Mozilla: An attacker may use Thunderbird's OpenPGP key refresh mechanism to poison an existing key Mozilla: A crafted OpenPGP key with an invalid user ID could be used to confuse the user Mozilla: Inability to send encrypted OpenPGP email after importing a crafted OpenPGP key Mozilla: Thunderbird might execute an alternative OTR library Mozilla: Logic issue potentially leaves key material unlocked | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 7.5 | null | null |
RHSA-2024:6569 | Red Hat Security Advisory: 389-ds:1.4 security update | 389-ds-base: Malformed userPassword hash may cause Denial of Service | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 5.7 | null | null |
RHSA-2024:0094 | Red Hat Security Advisory: Red Hat Single Sign-On 7.6.6 security update on RHEL 7 | keycloak: LDAP injection on username input keycloak: open redirect via "form_post.jwt" JARM response mode | [
"cpe:/a:redhat:red_hat_single_sign_on:7.6::el7"
] | null | 4.6 | null | null |
RHSA-2018:3506 | Red Hat Security Advisory: xerces-c security update | xerces-c: Stack overflow when parsing deeply nested DTD | [
"cpe:/o:redhat:rhel_eus:7.5::computenode",
"cpe:/o:redhat:rhel_eus:7.5::server"
] | null | null | 4.7 | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.