id
stringlengths 13
15
| title
stringlengths 29
176
| description
stringlengths 8
31.7k
| cpes
sequencelengths 0
20
| cvss_v4_0
null | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
null |
---|---|---|---|---|---|---|---|
RHSA-2023:0280 | Red Hat Security Advisory: sudo security update | sudo: arbitrary file write with privileges of the RunAs user | [
"cpe:/o:redhat:rhel_e4s:8.1::baseos"
] | null | 7.8 | null | null |
RHSA-2023:6919 | Red Hat Security Advisory: edk2 security and bug fix update | edk2: Function GetEfiGlobalVariable2() return value not checked in DxeImageVerificationHandler() | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 6.1 | null | null |
RHSA-2021:2471 | Red Hat Security Advisory: Red Hat JBoss Core Services Apache HTTP Server 2.4.37 SP8 security update | libcurl: partial password leak over DNS on HTTP redirect curl: FTP PASV command response can cause curl to connect to arbitrary host curl: Malicious FTP server can trigger stack overflow when CURLOPT_CHUNK_BGN_FUNCTION is used curl: Inferior OCSP verification curl: Leak of authentication credentials in URL via automatic Referer curl: TLS 1.3 session ticket mix-up with HTTPS proxy host curl: Use-after-free in TLS session handling when using OpenSSL TLS backend | [
"cpe:/a:redhat:jboss_core_services:1"
] | null | 8.1 | null | null |
RHSA-2024:4548 | Red Hat Security Advisory: kpatch-patch-5_14_0-284_48_1 security update | kernel: TIPC message reassembly use-after-free remote code execution vulnerability | [
"cpe:/o:redhat:rhel_eus:9.2::baseos"
] | null | 7.1 | null | null |
RHSA-2019:2332 | Red Hat Security Advisory: advancecomp security update | advancecomp: null pointer dereference in function be_uint32_read() in endianrw.h advancecomp: denial of service in function adv_png_unfilter_8 in lib/png.c | [
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 3.9 | null |
RHSA-2023:4531 | Red Hat Security Advisory: kpatch-patch security update | kernel: use-after-free in l2cap_connect and l2cap_le_connect_req in net/bluetooth/l2cap_core.c kernel: tcindex: use-after-free vulnerability in traffic control index filter allows privilege escalation kernel: Use-after-free vulnerability in the Linux Kernel traffic control index filter | [
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 7.4 | null | null |
RHSA-2021:0778 | Red Hat Security Advisory: Red Hat Ansible Tower 3.6.7-1 - Container security and bug fix update | nginx: HTTP request smuggling in configurations with URL redirect used as error_page jquery: Cross-site scripting due to improper injQuery.htmlPrefilter method jquery: Untrusted code execution via <option> tag in HTML passed to DOM manipulation methods python-autobahn: allows redirect header injection ansible-tower: Privilege escalation via job isolation escape | [
"cpe:/a:redhat:ansible_tower:3.6::el7"
] | null | 6.7 | null | null |
RHSA-2009:1145 | Red Hat Security Advisory: JBoss Enterprise Application Platform 4.3.0.CP05 update | tomcat request dispatcher information disclosure vulnerability tomcat6 Information disclosure in authentication classes tomcat XML parser information disclosure | [
"cpe:/a:redhat:jboss_enterprise_application_platform:4.3.0::el5"
] | null | null | null | null |
RHSA-2016:2819 | Red Hat Security Advisory: memcached security update | memcached: Server append/prepend remote code execution memcached: Server update remote code execution memcached: SASL authentication remote code execution | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 8.1 | null |
RHSA-2007:0003 | Red Hat Security Advisory: xorg-x11 security update | security flaw security flaw security flaw | [
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2015:2694 | Red Hat Security Advisory: qemu-kvm security update | Qemu: net: pcnet: heap overflow vulnerability in pcnet_receive Qemu: net: pcnet: buffer overflow in non-loopback mode | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2014:0525 | Red Hat Security Advisory: Red Hat JBoss Web Server 2.0.1 tomcat6 security update | tomcat: multiple content-length header poisoning flaws tomcat: incomplete fix for CVE-2012-3544 tomcat: session fixation still possible with disableURLRewriting enabled apache-commons-fileupload: denial of service due to too-small buffer size used by MultipartStream | [
"cpe:/a:redhat:jboss_enterprise_web_server:2::el5",
"cpe:/a:redhat:jboss_enterprise_web_server:2::el6"
] | null | null | null | null |
RHSA-2018:3648 | Red Hat Security Advisory: chromium-browser security update | chromium-browser: Out of bounds memory access in V8 chromium-browser: Use-after-free in GPU | [
"cpe:/a:redhat:rhel_extras:6"
] | null | null | 8.8 | null |
RHSA-2022:8796 | Red Hat Security Advisory: Red Hat OpenStack 16.1.9 (openstack-tripleo-heat-templates) security update | openstack-tripleo-heat-templates: data leak of internal URL through keystone_authtoken | [
"cpe:/a:redhat:openstack:16.1::el8"
] | null | 4.3 | null | null |
RHSA-2024:7481 | Red Hat Security Advisory: linux-firmware security update | kernel: hw:amd:IOMMU improperly handles certain special address leading to a loss of guest integrity hw: amd: SMM Lock Bypass kernel: hw:amd: Incomplete system memory cleanup in SEV firmware corrupt guest private memory | [
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 4.4 | null | null |
RHSA-2014:0416 | Red Hat Security Advisory: rhevm-spice-client security update | SSL/TLS CRIME attack against HTTPS SSL/TLS: CBC padding timing attack (lucky-13) openssl: client NULL dereference crash on malformed handshake packets openssl: information disclosure in handling of TLS heartbeat extension packets | [
"cpe:/a:redhat:rhev_manager:3"
] | null | null | null | null |
RHSA-2021:1129 | Red Hat Security Advisory: Red Hat 3scale API Management 2.10.0 security update and release | 3scale: dev portal missing protection against login CSRF golang.org/x/crypto: Processing of crafted ssh-ed25519 public keys allows for panic golang.org/x/text: possibility to trigger an infinite loop in encoding/unicode could lead to crash | [
"cpe:/a:redhat:3scale_amp:2.10::el7"
] | null | 7.5 | 5.4 | null |
RHSA-2023:4065 | Red Hat Security Advisory: thunderbird security update | Mozilla: Use-after-free in WebRTC certificate generation Mozilla: Potential use-after-free from compartment mismatch in SpiderMonkey Mozilla: Fullscreen notification obscured Mozilla: Lack of warning when opening Diagcab files Mozilla: Memory safety bugs fixed in Firefox 115, Firefox ESR 102.13, and Thunderbird 102.13 | [
"cpe:/a:redhat:rhel_e4s:8.1::appstream"
] | null | 8.8 | null | null |
RHSA-2014:0815 | Red Hat Security Advisory: rhev-hypervisor6 security update | gnutls: insufficient session id length check in _gnutls_read_server_hello (GNUTLS-SA-2014-3) libtasn1: multiple boundary check issues libtasn1: asn1_get_bit_der() can return negative bit length libtasn1: asn1_read_value_type() NULL pointer dereference | [
"cpe:/o:redhat:enterprise_linux:6::hypervisor"
] | null | null | null | null |
RHSA-2017:1218 | Red Hat Security Advisory: Red Hat JBoss BPM Suite security update | business-central: Multiple stored XSS in task and process filters business-central: Reflected XSS in artifact upload error message | [
"cpe:/a:redhat:jboss_bpms:6.4"
] | null | null | 6.1 | null |
RHSA-2022:7273 | Red Hat Security Advisory: Red Hat JBoss Web Server 5.7.0 release and security update | cxf: OAuth 2 authorization service vulnerable to DDos attacks CXF: Denial of service vulnerability in parsing JSON via JsonMapObjectReaderWriter Tomcat: Information disclosure tomcat: local privilege escalation vulnerability | [
"cpe:/a:redhat:jboss_enterprise_web_server:5.7"
] | null | 7 | null | null |
RHSA-2016:0348 | Red Hat Security Advisory: rh-postgresql94-postgresql security update | postgresql: case insensitive range handling integer overflow leading to buffer overflow | [
"cpe:/a:redhat:rhel_software_collections:2::el6",
"cpe:/a:redhat:rhel_software_collections:2::el7"
] | null | null | null | null |
RHSA-2003:137 | Red Hat Security Advisory: : New samba packages fix security vulnerability | security flaw security flaw | [
"cpe:/o:redhat:linux:7.1",
"cpe:/o:redhat:linux:7.2",
"cpe:/o:redhat:linux:7.3",
"cpe:/o:redhat:linux:8.0",
"cpe:/o:redhat:linux:9"
] | null | null | null | null |
RHSA-2024:10535 | Red Hat Security Advisory: OpenShift Container Platform 4.12.70 security update | waitress: python-waitress: request processing race condition in HTTP pipelining with invalid first request waitress: Waitress has a denial of service leading to high CPU usage/resource exhaustion | [
"cpe:/a:redhat:openshift:4.12::el8",
"cpe:/a:redhat:openshift:4.12::el9",
"cpe:/a:redhat:openshift_ironic:4.12::el9"
] | null | 7.5 | null | null |
RHSA-2023:5752 | Red Hat Security Advisory: java-17-openjdk security and bug fix update | OpenJDK: memory corruption issue on x86_64 with AVX-512 (8317121) OpenJDK: certificate path validation issue during client authentication (8309966) | [
"cpe:/a:redhat:rhel_eus:9.0::appstream",
"cpe:/a:redhat:rhel_eus:9.0::crb"
] | null | 5.3 | null | null |
RHSA-2020:3704 | Red Hat Security Advisory: openstack-nova security update | openstack-nova: Soft reboot after live-migration reverts instance to original source domain XML | [
"cpe:/a:redhat:openstack:16::el8"
] | null | 8.3 | null | null |
RHSA-2012:0139 | Red Hat Security Advisory: java-1.6.0-sun security update | OpenJDK: JavaSound incorrect bounds check (Sound, 7088367) OpenJDK: AtomicReferenceArray insufficient array type check (Concurrency, 7082299) GlassFish: hash table collisions CPU usage DoS (oCERT-2011-003) JDK: unspecified vulnerability fixed in 6u31 and 7u3 (2D) JDK: unspecified vulnerability fixed in 6u31 and 7u3 (2D) JDK: unspecified vulnerability fixed in 6u31 and 7u3 (Deployment) OpenJDK: off-by-one bug in ZIP reading code (JRE, 7118283) OpenJDK: KeyboardFocusManager focus stealing (AWT, 7110683) OpenJDK: unrestricted use of TimeZone.setDefault() (i18n, 7110687) OpenJDK: incomplete info in the deserialization exception (Serialization, 7110700) OpenJDK: mutable repository identifiers (CORBA, 7110704) OpenJDK: AtomicReferenceArray insufficient array type check (Concurrency, 7082299) | [
"cpe:/a:redhat:rhel_extras:4",
"cpe:/a:redhat:rhel_extras:5::client",
"cpe:/a:redhat:rhel_extras:5::server",
"cpe:/a:redhat:rhel_extras:6"
] | null | null | null | null |
RHSA-2020:2203 | Red Hat Security Advisory: kpatch-patch security update | kernel: use-after-free in __blk_add_trace in kernel/trace/blktrace.c Kernel: NetLabel: null pointer dereference while receiving CIPSO packet with null category may cause kernel panic | [
"cpe:/o:redhat:rhel_eus:8.1::baseos"
] | null | 5.9 | null | null |
RHSA-2023:0664 | Red Hat Security Advisory: tigervnc security update | xorg-x11-server: DeepCopyPointerClasses use-after-free leads to privilege elevation | [
"cpe:/a:redhat:rhel_eus:8.4::appstream"
] | null | 7.8 | null | null |
RHSA-2009:1571 | Red Hat Security Advisory: java-1.5.0-sun security update | deprecate MD2 in SSL cert validation (Kaminsky) OpenJDK ICC_Profile file existence detection information leak (6631533) java-1.6.0-sun: Stack-based buffer overflow via a long file: URL argument (6854303) java-1.6.0-sun: Privilege escalation via crafted image file due improper color profiles parsing (6862970) OpenJDK JRE AWT setDifflCM stack overflow (6872357) OpenJDK JRE AWT setBytePixels heap overflow (6872358) OpenJDK JPEG Image Writer quantization problem (6862968) OpenJDK ImageI/O JPEG heap overflow (6874643) OpenJDK MessageDigest.isEqual introduces timing attack vulnerabilities (6863503) OpenJDK ASN.1/DER input stream parser denial of service (6864911) CVE-2009-3877 OpenJDK ASN.1/DER input stream parser denial of service (6864911) CVE-2009-3877 OpenJDK GraphicsConfiguration information leak(6822057) OpenJDK UI logging information leakage(6664512) OpenJDK resurrected classloaders can still have children (6636650) OpenJDK information leaks in mutable variables (6657026,6657138) OpenJDK information leaks in mutable variables (6657026,6657138) OpenJDK zoneinfo file existence information leak (6824265) | [
"cpe:/a:redhat:rhel_extras:4",
"cpe:/a:redhat:rhel_extras:5::client",
"cpe:/a:redhat:rhel_extras:5::server"
] | null | null | null | null |
RHSA-2021:3522 | Red Hat Security Advisory: kernel security and bug fix update | kernel: use-after-free in n_tty_receive_buf_common function in drivers/tty/n_tty.c kernel: Use after free via PI futex state kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c kernel: race condition for removal of the HCI controller | [
"cpe:/o:redhat:rhel_aus:7.7::server",
"cpe:/o:redhat:rhel_e4s:7.7::server",
"cpe:/o:redhat:rhel_tus:7.7::server"
] | null | 7 | null | null |
RHSA-2006:0179 | Red Hat Security Advisory: auth_ldap security update | security flaw | [
"cpe:/o:redhat:enterprise_linux:2.1::as",
"cpe:/o:redhat:enterprise_linux:2.1::aw",
"cpe:/o:redhat:enterprise_linux:2.1::es",
"cpe:/o:redhat:enterprise_linux:2.1::ws"
] | null | null | null | null |
RHSA-2023:4330 | Red Hat Security Advisory: nodejs:18 security, bug fix, and enhancement update | nodejs: mainModule.proto bypass experimental policy mechanism nodejs: process interuption due to invalid Public Key information in x509 certificates nodejs: HTTP Request Smuggling via Empty headers separated by CR nodejs: DiffieHellman do not generate keys after setting a private key | [
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 7.5 | null | null |
RHEA-2019:3809 | Red Hat Enhancement Advisory: Red Hat OpenShift Service Mesh 1.0.2 RPMs | kubernetes: YAML parsing vulnerable to "Billion Laughs" attack, allowing for remote denial of service | [
"cpe:/a:redhat:service_mesh:1.0::el7",
"cpe:/a:redhat:service_mesh:1.0::el8"
] | null | null | 7.5 | null |
RHSA-2017:1598 | Red Hat Security Advisory: python-django-horizon security, bug fix, and enhancement update | python-django-horizon: XSS in federation mappings UI | [
"cpe:/a:redhat:openstack:10::el7"
] | null | null | 3.5 | null |
RHSA-2021:3303 | Red Hat Security Advisory: OpenShift Container Platform 4.7.29 bug fix and security update | gogo/protobuf: plugin/unmarshal/unmarshal.go lacks certain index validation | [
"cpe:/a:redhat:openshift:4.7::el8"
] | null | 8.6 | null | null |
RHSA-2014:0189 | Red Hat Security Advisory: mariadb55-mariadb security update | mysql: unspecified DoS related to Optimizer (CPU October 2013) mysql: unspecified flaw related to Replication (CPU October 2013) mysql: unspecified vulnerability related to Partition DoS (CPU Jan 2014) mysql: unspecified vulnerability related to Error Handling DoS (CPU Jan 2014) mysql: command-line tool buffer overflow via long server version string mysql: unspecified vulnerability related to Optimizer DoS (CPU Jan 2014) mysql: unspecified vulnerability related to InnoDB affecting integrity (CPU Jan 2014) mysql: unspecified DoS vulnerability (CPU Jan 2014) mysql: unspecified vulnerability related to Locking DoS (CPU Jan 2014) mysql: unspecified vulnerability related to InnoDB DoS (CPU Jan 2014) mysql: unspecified vulnerability related to Replication DoS (CPU Jan 2014) mysql: unspecified vulnerability related to Optimizer DoS (CPU Jan 2014) | [
"cpe:/a:redhat:rhel_software_collections:1::el6"
] | null | null | null | null |
RHSA-2007:1065 | Red Hat Security Advisory: pcre security update | pcre integer overflow pcre regular expression flaws | [
"cpe:/o:redhat:enterprise_linux:2.1::as",
"cpe:/o:redhat:enterprise_linux:2.1::aw",
"cpe:/o:redhat:enterprise_linux:2.1::es",
"cpe:/o:redhat:enterprise_linux:2.1::ws"
] | null | null | null | null |
RHSA-2021:1552 | Red Hat Security Advisory: OpenShift Container Platform 4.7.11 security and bug fix update | gogo/protobuf: plugin/unmarshal/unmarshal.go lacks certain index validation containernetworking-cni: Arbitrary path injection via type field in CNI configuration | [
"cpe:/a:redhat:openshift:4.7::el8"
] | null | 7.2 | null | null |
RHSA-2019:2586 | Red Hat Security Advisory: ghostscript security update | ghostscript: Safer mode bypass by .forceput exposure in .pdf_hook_DSC_Creator (701445) ghostscript: Safer mode bypass by .forceput exposure in setuserparams (701444) ghostscript: Safer mode bypass by .forceput exposure in setsystemparams (701443) ghostscript: Safer mode bypass by .forceput exposure in .pdfexectoken and other procedures (701450) | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 7.3 | null |
RHSA-2009:1428 | Red Hat Security Advisory: xmlsec1 security update | xml-security-1.3.0-1jpp.ep1.*: XMLDsig HMAC-based signatures spoofing and authentication bypass | [
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws",
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2016:1855 | Red Hat Security Advisory: rh-ror42 security update | rubygem-actionview: cross-site scripting flaw in Action View rubygem-activerecord: unsafe query generation in Active Record | [
"cpe:/a:redhat:rhel_software_collections:2::el7"
] | null | null | 5.3 | null |
RHSA-2008:0100 | Red Hat Security Advisory: java-1.4.2-bea security update | Integer overflow in the embedded ICC profile image parser in Sun Java Development Kit BMP image parser vulnerability Java Secure Socket Extension Does Not Correctly Process SSL/TLS Handshake Requests Resulting in a Denial of Service (DoS) Condition java: Vulnerability in the font parsing code Security Vulnerability in Java Runtime Environment With Applet Caching Untrusted Application or Applet May Move or Copy Arbitrary Files Applets or Applications are allowed to display an oversized window Anti-DNS Pinning and Java Applets with HTTP proxy | [
"cpe:/a:redhat:rhel_extras:3",
"cpe:/a:redhat:rhel_extras:5::client",
"cpe:/a:redhat:rhel_extras:5::server"
] | null | null | null | null |
RHSA-2019:1145 | Red Hat Security Advisory: bind security update | bind: Limiting simultaneous TCP clients is ineffective | [
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | null | 8.6 | null |
RHSA-2022:0026 | Red Hat Security Advisory: OpenShift Container Platform 4.6.53 security update | log4j-core: DoS in log4j 2.x with Thread Context Map (MDC) input data contains a recursive lookup and context lookup pattern | [
"cpe:/a:redhat:openshift:4.6::el8"
] | null | 5.9 | null | null |
RHSA-2023:5184 | Red Hat Security Advisory: firefox security update | libwebp: Heap buffer overflow in WebP Codec libwebp: out-of-bounds write with a specially crafted WebP lossless file | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 0 | null | null |
RHSA-2024:0456 | Red Hat Security Advisory: grub2 security update | grub2: bypass the GRUB password protection feature | [
"cpe:/o:redhat:rhel_eus:9.2::baseos"
] | null | 6.8 | null | null |
RHSA-2005:173 | Red Hat Security Advisory: squid security update | security flaw | [
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws"
] | null | null | null | null |
RHSA-2022:1777 | Red Hat Security Advisory: webkit2gtk3 security, bug fix, and enhancement update | webkitgtk: Use-after-free leading to arbitrary code execution webkitgtk: Type confusion issue leading to arbitrary code execution webkitgtk: Logic issue leading to HSTS bypass webkitgtk: Out-of-bounds read leading to memory disclosure webkitgtk: Memory corruption issue leading to arbitrary code execution webkitgtk: Memory corruption issue leading to arbitrary code execution webkitgtk: Multiple memory corruption issue leading to arbitrary code execution webkitgtk: Memory corruption issue leading to arbitrary code execution webkitgtk: CSS compositing issue leading to revealing of the browsing history webkitgtk: Logic issue leading to Content Security Policy bypass webkitgtk: Information leak via Content Security Policy reports webkitgtk: Buffer overflow leading to arbitrary code execution webkitgtk: Logic issue leading to universal cross-site scripting webkitgtk: Cross-origin data exfiltration via resource timing API webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution webkitgtk: Incorrect memory allocation in WebCore::ImageBufferCairoImageSurfaceBackend::create webkitgtk: use-after-free in WebCore::ContainerNode::firstChild webkitgtk: use-after-free in WebCore::Frame::page webkitgtk: Processing a maliciously crafted mail message may lead to running arbitrary javascript webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution webkitgtk: Processing maliciously crafted web content may prevent Content Security Policy from being enforced webkitgtk: A malicious website may exfiltrate data cross-origin webkitgtk: maliciously crafted web content may lead to arbitrary code execution due to use after free webkitgtk: logic issue was addressed with improved state management | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 8.8 | null | null |
RHSA-2015:0895 | Red Hat Security Advisory: 389-ds-base security update | 389-ds-base: access control bypass with modrdn | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | null | null |
RHSA-2023:4211 | Red Hat Security Advisory: OpenJDK 17.0.8 Security Update for Windows Builds | OpenJDK: HTTP client insufficient file name validation (8302475) OpenJDK: ZIP file parsing infinite loop (8302483) OpenJDK: weakness in AES implementation (8308682) OpenJDK: modulo operator array indexing issue (8304460) OpenJDK: array indexing integer overflow issue (8304468) OpenJDK: improper handling of slash characters in URI-to-path conversion (8305312) harfbuzz: allows attackers to trigger O(n^2) growth via consecutive marks | [
"cpe:/a:redhat:openjdk:17::windows"
] | null | 7.5 | null | null |
RHSA-2011:1327 | Red Hat Security Advisory: frysk security update | qt/harfbuzz buffer overflow | [
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2014:1955 | Red Hat Security Advisory: wget security update | wget: FTP symlink arbitrary filesystem access | [
"cpe:/o:redhat:rhel_eus:6.5::computenode",
"cpe:/o:redhat:rhel_eus:6.5::server"
] | null | null | null | null |
RHSA-2016:1432 | Red Hat Security Advisory: jboss-ec2-eap security, bug fix, and enhancement update | tomcat: URL Normalization issue JGroups: Authorization bypass | [
"cpe:/a:redhat:jboss_enterprise_application_platform:6::el6"
] | null | null | 9.8 | null |
RHSA-2022:6585 | Red Hat Security Advisory: ruby security, bug fix, and enhancement update | Ruby: Double free in Regexp compilation ruby: Buffer overrun in String-to-Float conversion | [
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::crb"
] | null | 6.2 | null | null |
RHSA-2015:2524 | Red Hat Security Advisory: Red Hat JBoss Operations Network 3.3.4 security update | apache-commons-collections: InvokerTransformer code execution during deserialisation | [
"cpe:/a:redhat:jboss_operations_network:3.3"
] | null | null | null | null |
RHSA-2005:850 | Red Hat Security Advisory: imap security update | security flaw | [
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws"
] | null | null | null | null |
RHSA-2022:0289 | Red Hat Security Advisory: parfait:0.5 security update | log4j: Remote code execution in Log4j 1.x when application is configured to use JMSAppender log4j: Remote code execution in Log4j 1.x when application is configured to use JMSSink log4j: SQL injection in Log4j 1.x when application is configured to use JDBCAppender log4j: Unsafe deserialization flaw in Chainsaw log viewer | [
"cpe:/a:redhat:rhel_eus:8.4::appstream"
] | null | 8.8 | null | null |
RHSA-2024:1411 | Red Hat Security Advisory: opencryptoki security update | opencryptoki: timing side-channel in handling of RSA PKCS#1 v1.5 padded ciphertexts (Marvin) | [
"cpe:/a:redhat:rhel_eus:8.8::crb",
"cpe:/o:redhat:rhel_eus:8.8::baseos"
] | null | 5.9 | null | null |
RHSA-2021:0568 | Red Hat Security Advisory: OpenShift Container Platform 4.6 file-integrity-operator image security update | golang: math/big: panic during recursive division of very large numbers | [
"cpe:/a:redhat:openshift:4.6::el8"
] | null | 7.5 | null | null |
RHSA-2025:0654 | Red Hat Security Advisory: OpenShift Container Platform 4.17.14 bug fix and security update | PostCSS: Improper input validation in PostCSS golang-protobuf: encoding/protojson, internal/encoding/json: infinite loop in protojson.Unmarshal when unmarshaling certain forms of invalid JSON golang.org/x/net/html: Non-linear parsing of case-insensitive content in golang.org/x/net/html dompurify: DOMPurify vulnerable to tampering by prototype pollution nanoid: nanoid mishandles non-integer values go-git: argument injection via the URL field go-git: go-git clients vulnerable to DoS via maliciously crafted Git server replies | [
"cpe:/a:redhat:openshift:4.17::el9"
] | null | 7.5 | null | null |
RHSA-2019:1816 | Red Hat Security Advisory: java-1.8.0-openjdk security update | OpenJDK: Side-channel attack risks in Elliptic Curve (EC) cryptography (Security, 8208698) OpenJDK: Insufficient checks of suppressed exceptions in deserialization (Utilities, 8212328) OpenJDK: Unbounded memory allocation during deserialization in Collections (Utilities, 8213432) OpenJDK: Insufficient restriction of privileges in AccessController (Security, 8216381) OpenJDK: Missing URL format validation (Networking, 8221518) OpenJDK: Missing array bounds check in crypto providers (JCE, 8223511) | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | null | 3.7 | null |
RHSA-2023:6126 | Red Hat Security Advisory: OpenShift Container Platform 4.12.41 bug fix and security update | golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487) | [
"cpe:/a:redhat:openshift:4.12::el8",
"cpe:/a:redhat:openshift:4.12::el9"
] | null | 7.5 | null | null |
RHSA-2020:0262 | Red Hat Security Advisory: openjpeg2 security update | openjpeg: Heap-based buffer overflow in opj_t1_clbl_decode_processor() | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 8.1 | null | null |
RHSA-2022:0585 | Red Hat Security Advisory: Service Telemetry Framework 1.4 (sg-core-container) security update | golang: net/http: limit growth of header canonicalization cache | [
"cpe:/a:redhat:service_telemetry_framework:1.4::el8"
] | null | 7.5 | null | null |
RHSA-2004:112 | Red Hat Security Advisory: : Updated Mozilla packages fix security issues | security flaw security flaw security flaw | [
"cpe:/o:redhat:linux:9"
] | null | null | null | null |
RHSA-2021:3177 | Red Hat Security Advisory: cloud-init security update | cloud-init: randomly generated passwords logged in clear-text to world-readable file | [
"cpe:/a:redhat:rhel_eus:8.1::appstream"
] | null | 5.5 | null | null |
RHSA-2024:1722 | Red Hat Security Advisory: edk2 security update | edk2: Buffer overflow when processing DNS Servers option in a DHCPv6 Advertise message | [
"cpe:/a:redhat:rhel_aus:8.2::appstream",
"cpe:/a:redhat:rhel_e4s:8.2::appstream",
"cpe:/a:redhat:rhel_tus:8.2::appstream"
] | null | 8.8 | null | null |
RHSA-2014:1120 | Red Hat Security Advisory: openstack-neutron security, bug fix, and enhancement update | openstack-neutron: Denial of Service in Neutron allowed address pair | [
"cpe:/a:redhat:openstack:5::el6"
] | null | null | null | null |
RHSA-2019:3898 | Red Hat Security Advisory: libcomps security update | libcomps: use after free when merging two objmrtrees | [
"cpe:/a:redhat:rhel_extras_other:7"
] | null | null | 7.5 | null |
RHSA-2022:5678 | Red Hat Security Advisory: Red Hat Virtualization security, bug fix, and enhancement update [ovirt-4.5.1] | kernel: buffer overflow in IPsec ESP transformation code grub2: Integer underflow in grub_net_recv_ip4_packets | [
"cpe:/o:redhat:rhev_hypervisor:4.4::el8"
] | null | 8.1 | null | null |
RHSA-2023:1598 | Red Hat Security Advisory: tigervnc security update | xorg-x11-server: X.Org Server Overlay Window Use-After-Free Local Privilege Escalation Vulnerability | [
"cpe:/a:redhat:rhel_eus:8.6::appstream"
] | null | 7.8 | null | null |
RHSA-2021:5226 | Red Hat Security Advisory: openssl security update | openssl: Read buffer overruns processing ASN.1 strings | [
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 7.4 | null | null |
RHSA-2024:6913 | Red Hat Security Advisory: golang security update | net/http: Denial of service due to improper 100-continue handling in net/http go/parser: golang: Calling any of the Parse functions containing deeply nested literals can cause a panic/stack exhaustion encoding/gob: golang: Calling Decoder.Decode on a message which contains deeply nested structures can cause a panic due to stack exhaustion go/build/constraint: golang: Calling Parse on a "// +build" build tag line with deeply nested expressions can cause a panic due to stack exhaustion | [
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 5.9 | null | null |
RHSA-2022:7022 | Red Hat Security Advisory: firefox security update | expat: a use-after-free in the doContent function in xmlparse.c | [
"cpe:/a:redhat:rhel_eus:8.2::appstream"
] | null | 8.1 | null | null |
RHSA-2015:1930 | Red Hat Security Advisory: ntp security update | ntp: MITM attacker can force ntpd to make a step larger than the panic threshold ntp: disabling synchronization via crafted KoD packet | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation",
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | null | null |
RHEA-2015:1074 | Red Hat Enhancement Advisory: Red Hat JBoss Enterprise Application Platform 6.4.1 update on RHEL 7 | EAP: LDAP bind password is being logged with TRACE log level | [
"cpe:/a:redhat:jboss_enterprise_application_platform:6::el7"
] | null | null | null | null |
RHSA-2002:126 | Red Hat Security Advisory: apache security update | security flaw | [
"cpe:/o:redhat:enterprise_linux:2.1::as"
] | null | null | null | null |
RHSA-2023:5705 | Red Hat Security Advisory: rh-dotnet60-dotnet security, bug fix, and enhancement update | HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack) | [
"cpe:/a:redhat:rhel_dotnet:6.0::el7"
] | null | 7.5 | null | null |
RHSA-2018:3757 | Red Hat Security Advisory: rh-postgresql10-postgresql security update | postgresql: SQL injection in pg_upgrade and pg_dump, via CREATE TRIGGER ... REFERENCING | [
"cpe:/a:redhat:rhel_software_collections:3::el7"
] | null | null | 8 | null |
RHSA-2013:1185 | Red Hat Security Advisory: Red Hat JBoss Fuse 6.0.0 patch 2 | rubygem-json: Denial of Service and SQL Injection openjpa: Remote arbitrary code execution by creating a serialized object and leveraging improperly secured server programs ruby: entity expansion DoS vulnerability in REXML apache-cxf: Multiple denial of service flaws in the StAX parser | [
"cpe:/a:redhat:jboss_fuse:6.0.0"
] | null | null | null | null |
RHSA-2024:9815 | Red Hat Security Advisory: squid:4 security update | squid: Denial of Service processing ESI response content | [
"cpe:/a:redhat:rhel_aus:8.4::appstream",
"cpe:/a:redhat:rhel_e4s:8.4::appstream",
"cpe:/a:redhat:rhel_tus:8.4::appstream"
] | null | 7.5 | null | null |
RHSA-2020:3410 | Red Hat Security Advisory: python-paunch and openstack-tripleo-heat-templates security update | openstack-tripleo-heat-templates: No sVirt protection for OSP16 VMs due to disabled SELinux | [
"cpe:/a:redhat:openstack:15::el8"
] | null | 9.9 | null | null |
RHSA-2021:2758 | Red Hat Security Advisory: nettle security update | nettle: Out of bounds memory access in signature verification | [
"cpe:/o:redhat:rhel_aus:7.4::server",
"cpe:/o:redhat:rhel_e4s:7.4::server",
"cpe:/o:redhat:rhel_tus:7.4::server"
] | null | 8.1 | null | null |
RHSA-2024:4455 | Red Hat Security Advisory: OpenShift Virtualization 4.16.0 Images security update | axios: exposure of confidential data stored in cookies golang-protobuf: encoding/protojson, internal/encoding/json: infinite loop in protojson.Unmarshal when unmarshaling certain forms of invalid JSON jose-go: improper handling of highly compressed data | [
"cpe:/a:redhat:container_native_virtualization:4.16::el9"
] | null | 4.3 | null | null |
RHSA-2023:0395 | Red Hat Security Advisory: kernel security and bug fix update | kernel: tcp: fix page frag corruption on page fault kernel: memory corruption in AX88179_178A based USB ethernet device. | [
"cpe:/o:redhat:rhel_aus:8.2::baseos",
"cpe:/o:redhat:rhel_e4s:8.2::baseos",
"cpe:/o:redhat:rhel_tus:8.2::baseos"
] | null | 7.8 | null | null |
RHSA-2018:2482 | Red Hat Security Advisory: docker security and bug fix update | docker: container breakout without selinux in enforcing mode | [
"cpe:/a:redhat:rhel_extras_other:7"
] | null | null | 6.3 | null |
RHSA-2017:0179 | Red Hat Security Advisory: Red Hat JBoss Fuse/A-MQ 6.3 security and bug fix update | pdfbox: XML External Entity vulnerability netty: Infinite loop vulnerability when handling renegotiation using SslProvider.OpenSsl | [
"cpe:/a:redhat:jboss_amq:6.3",
"cpe:/a:redhat:jboss_fuse:6.3"
] | null | null | 3.7 | null |
RHSA-2021:2258 | Red Hat Security Advisory: rh-nginx118-nginx security update | nginx: Off-by-one in ngx_resolver_copy() when labels are followed by a pointer to a root domain name | [
"cpe:/a:redhat:rhel_software_collections:3::el7"
] | null | 8.1 | null | null |
RHSA-2021:5048 | Red Hat Security Advisory: thunderbird security update | Mozilla: Memory safety bugs fixed in Firefox 95 and Firefox ESR 91.4 Mozilla: JavaScript unexpectedly enabled for the composition area Mozilla: URL leakage when navigating while executing asynchronous function Mozilla: Heap buffer overflow when using structured clone Mozilla: Missing fullscreen and pointer lock notification when requesting both Mozilla: GC rooting failure when calling wasm instance methods Mozilla: External protocol handler parameters were unescaped Mozilla: XMLHttpRequest error codes could have leaked the existence of an external protocol handler Mozilla: Bypass of CSP sandbox directive when embedding Mozilla: Denial of Service when using the Location API in a loop Mozilla: Cursor spoofing could overlay user interface when native cursor is zoomed | [
"cpe:/a:redhat:rhel_eus:8.4::appstream"
] | null | 5.4 | 6.1 | null |
RHSA-2021:2692 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.3.8 on RHEL 6 security update | wildfly: XSS via admin console when creating roles in domain mode netty: Request smuggling via content-length header | [
"cpe:/a:redhat:jboss_enterprise_application_platform:7.3::el6"
] | null | 5.9 | null | null |
RHSA-2023:6482 | Red Hat Security Advisory: librabbitmq security update | rabbitmq-c/librabbitmq: Insecure credentials submission | [
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::crb"
] | null | 5.1 | null | null |
RHSA-2003:037 | Red Hat Security Advisory: : : : Updated Xpdf packages fix security vulnerability | security flaw | [
"cpe:/o:redhat:linux:6.2",
"cpe:/o:redhat:linux:7.0",
"cpe:/o:redhat:linux:7.1",
"cpe:/o:redhat:linux:7.2",
"cpe:/o:redhat:linux:7.3",
"cpe:/o:redhat:linux:8.0"
] | null | null | null | null |
RHSA-2018:2721 | Red Hat Security Advisory: Red Hat Enterprise Linux OpenStack Platform security update | openstack-rabbitmq-container: Insecure download of rabbitmq_clusterer during docker build | [
"cpe:/a:redhat:openstack:13::el7"
] | null | null | 4.7 | null |
RHSA-2021:2741 | Red Hat Security Advisory: firefox security update | Mozilla: Use-after-free in accessibility features of a document Mozilla: Memory safety bugs fixed in Firefox 90 and Firefox ESR 78.12 chromium-browser: Out of bounds write in ANGLE | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 8.8 | null | null |
RHSA-2009:1601 | Red Hat Security Advisory: kdelibs security update | array index error in dtoa implementation of many products | [
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws",
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2023:5061 | Red Hat Security Advisory: dmidecode security update | dmidecode: dump-bin to overwrite a local file | [
"cpe:/o:redhat:enterprise_linux:9::baseos"
] | null | 7.1 | null | null |
RHSA-2018:2748 | Red Hat Security Advisory: kernel security and bug fix update | kernel: Integer overflow in Linux's create_elf_tables function | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 7.8 | null |
RHSA-2024:0101 | Red Hat Security Advisory: Red Hat build of Keycloak 22.0.8 enhancement and security update | keycloak: open redirect via "form_post.jwt" JARM response mode | [
"cpe:/a:redhat:build_keycloak:22"
] | null | 4.6 | null | null |
RHSA-2005:213 | Red Hat Security Advisory: xpdf security update | security flaw | [
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws"
] | null | null | null | null |
Subsets and Splits