id
stringlengths
13
15
title
stringlengths
29
176
description
stringlengths
8
32.1k
cpes
sequencelengths
0
20
cvss_v4_0
null
cvss_v3_1
float64
0
10
cvss_v3_0
float64
0
10
cvss_v2_0
null
RHSA-2022:0982
Red Hat Security Advisory: Red Hat OpenStack Platform 16.1 (python-twisted) security update
dev-python/twisted: secret exposure in cross-origin redirects python-twisted: SSH client and server denial of service during SSH handshake
[ "cpe:/a:redhat:openstack:16.1::el8" ]
null
7.5
null
null
RHSA-2024:8105
Red Hat Security Advisory: python-gevent security update
python-gevent: privilege escalation via a crafted script to the WSGIServer component
[ "cpe:/a:redhat:rhel_aus:8.4::appstream", "cpe:/a:redhat:rhel_e4s:8.4::appstream", "cpe:/a:redhat:rhel_tus:8.4::appstream" ]
null
9.1
null
null
RHSA-2018:1779
Red Hat Security Advisory: xmlrpc3 security update
xmlrpc: Deserialization of untrusted Java object through <ex:serializable> tag
[ "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
7.5
null
RHSA-2023:2710
Red Hat Security Advisory: Red Hat Single Sign-On 7.6.3 for OpenShift image security update
okhttp: information disclosure via improperly used cryptographic function undertow: Server identity in https connection is not checked by the undertow client snakeyaml: Uncaught exception in java.base/java.util.ArrayList.hashCode dev-java/snakeyaml: DoS via stack overflow codec-haproxy: HAProxyMessageDecoder Stack Exhaustion DoS apache-james-mime4j: Temporary File Information Disclosure in MIME4J TempFileStorageProvider RESTEasy: creation of insecure temp files
[ "cpe:/a:redhat:rhosemc:1.0::el8" ]
null
5.3
null
null
RHSA-2008:0214
Red Hat Security Advisory: squid security update
squid: regression in SQUID-2007:2 / CVE-2007-6239
[ "cpe:/o:redhat:enterprise_linux:2.1::as", "cpe:/o:redhat:enterprise_linux:2.1::aw", "cpe:/o:redhat:enterprise_linux:2.1::es", "cpe:/o:redhat:enterprise_linux:3::as", "cpe:/o:redhat:enterprise_linux:3::desktop", "cpe:/o:redhat:enterprise_linux:3::es", "cpe:/o:redhat:enterprise_linux:3::ws", "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws", "cpe:/o:redhat:enterprise_linux:5::client_workstation", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
RHSA-2023:4704
Red Hat Security Advisory: subscription-manager security update
subscription-manager: inadequate authorization of com.redhat.RHSM1 D-Bus interface allows local users to modify configuration
[ "cpe:/a:redhat:rhel_aus:8.4::appstream", "cpe:/a:redhat:rhel_e4s:8.4::appstream", "cpe:/a:redhat:rhel_tus:8.4::appstream", "cpe:/o:redhat:rhel_aus:8.4::baseos", "cpe:/o:redhat:rhel_e4s:8.4::baseos", "cpe:/o:redhat:rhel_tus:8.4::baseos" ]
null
7.8
null
null
RHSA-2019:2051
Red Hat Security Advisory: compat-libtiff3 security update
libtiff: NULL pointer dereference in tif_print.c:TIFFPrintDirectory() causes a denial of service
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
3.3
null
RHSA-2021:5138
Red Hat Security Advisory: Red Hat AMQ Streams 1.8.4 release and security update
log4j-core: Remote code execution in Log4j 2.x when logs contain an attacker-controlled string value
[ "cpe:/a:redhat:amq_streams:1" ]
null
9.8
null
null
RHSA-2023:5473
Red Hat Security Advisory: bind security update
bind: stack exhaustion in control channel code may lead to DoS
[ "cpe:/a:redhat:rhel_eus:8.6::appstream", "cpe:/o:redhat:rhel_eus:8.6::baseos" ]
null
7.5
null
null
RHSA-2021:2032
Red Hat Security Advisory: slapi-nis security and bug fix update
slapi-nis: NULL dereference (DoS) with specially crafted Binding DN
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
7.5
null
null
RHSA-2009:1139
Red Hat Security Advisory: pidgin security and bug fix update
pidgin: DoS via specially-crafted ICQWebMessage
[ "cpe:/a:redhat:rhel_productivity:5", "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws", "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::client_workstation" ]
null
null
null
null
RHSA-2025:1084
Red Hat Security Advisory: ovn22.06 security update
ovn: egress ACLs may be bypassed via specially crafted UDP packet
[ "cpe:/o:redhat:enterprise_linux:8::fastdatapath" ]
null
8.1
null
null
RHSA-2023:2453
Red Hat Security Advisory: libtpms security update
tpm: TCG TPM2.0 implementations vulnerable to memory corruption tpm2: TCG TPM2.0 implementations vulnerable to memory corruption
[ "cpe:/a:redhat:enterprise_linux:9::appstream" ]
null
5.5
null
null
RHSA-2012:0078
Red Hat Security Advisory: JBoss Communications Platform 5.1.3 update
tomcat: Multiple weaknesses in HTTP DIGEST authentication tomcat: security manager restrictions bypass JBoss Web remote denial of service when surrogate pair character is placed at buffer boundary tomcat: hash table collisions CPU usage DoS (oCERT-2011-003) tomcat: Multiple weaknesses in HTTP DIGEST authentication tomcat: Multiple weaknesses in HTTP DIGEST authentication tomcat: Multiple weaknesses in HTTP DIGEST authentication tomcat: large number of parameters DoS
[ "cpe:/a:redhat:jboss_communications_platform:5.1" ]
null
null
null
null
RHSA-2025:0753
Red Hat Security Advisory: Red Hat Ansible Automation Platform Execution Environments Container Release Update
aiohttp: aiohttp vulnerable to request smuggling due to incorrect parsing of chunk extensions jinja2: Jinja has a sandbox breakout through malicious filenames jinja2: Jinja has a sandbox breakout through indirect reference to format method
[ "cpe:/a:redhat:ansible_automation_platform:ee::el8", "cpe:/a:redhat:ansible_automation_platform:ee::el9" ]
null
6.3
null
null
RHSA-2004:003
Red Hat Security Advisory: : Updated CVS packages fix minor security issue
security flaw
[ "cpe:/o:redhat:linux:9" ]
null
null
null
null
RHSA-2003:061
Red Hat Security Advisory: netpbm security update
security flaw
[ "cpe:/o:redhat:enterprise_linux:2.1::as", "cpe:/o:redhat:enterprise_linux:2.1::aw", "cpe:/o:redhat:enterprise_linux:2.1::es", "cpe:/o:redhat:enterprise_linux:2.1::ws" ]
null
null
null
null
RHSA-2018:2785
Red Hat Security Advisory: kernel security and bug fix update
kernel: TCP segments with random offsets allow a remote denial of service (SegmentSmack) kernel: IP fragments with random offsets allow a remote denial of service (FragmentSmack) kernel: mm: use-after-free in do_get_mempolicy function allows local DoS or other unspecified impact
[ "cpe:/o:redhat:rhel_eus:7.3::computenode", "cpe:/o:redhat:rhel_eus:7.3::server" ]
null
null
5.5
null
RHSA-2016:1301
Red Hat Security Advisory: kernel-rt security, bug fix, and enhancement update
kernel: SCTP denial of service during timeout kernel-rt: Sending SysRq command via ICMP echo request kernel: infiniband: Unprivileged process can overwrite kernel memory using rdma_ucm.ko
[ "cpe:/a:redhat:rhel_extras_rt:7" ]
null
null
7.8
null
RHSA-2025:3945
Red Hat Security Advisory: mod_auth_openidc security update
mod_auth_openidc: mod_auth_openidc allows OIDCProviderAuthRequestMethod POSTs to leak protected data
[ "cpe:/a:redhat:rhel_e4s:9.0::appstream" ]
null
7.5
null
null
RHSA-2021:0225
Red Hat Security Advisory: sudo security update
sudo: Heap buffer overflow in argument parsing
[ "cpe:/o:redhat:rhel_aus:7.3::server" ]
null
7.8
null
null
RHSA-2021:1611
Red Hat Security Advisory: systemd security, bug fix, and enhancement update
systemd: Spoofing of XDG_SEAT allows for actions to be checked against "allow_active" instead of "allow_any" systemd: Mishandles numerical usernames beginning with decimal digits or 0x followed by hexadecimal digits
[ "cpe:/o:redhat:enterprise_linux:8::baseos" ]
null
6.7
4.5
null
RHSA-2023:7569
Red Hat Security Advisory: firefox security update
Mozilla: Out-of-bound memory access in WebGL2 blitFramebuffer Mozilla: Use-after-free in MessagePort::Entangled Mozilla: Clickjacking permission prompts using the fullscreen transition Mozilla: Use-after-free in ReadableByteStreamQueueEntry::Buffer Mozilla: Using Selection API would copy contents into X11 primary selection. Mozilla: Incorrect parsing of relative URLs starting with "///" Mozilla: Memory safety bugs fixed in Firefox 120, Firefox ESR 115.5, and Thunderbird 115.5
[ "cpe:/a:redhat:rhel_aus:8.4::appstream", "cpe:/a:redhat:rhel_e4s:8.4::appstream", "cpe:/a:redhat:rhel_tus:8.4::appstream" ]
null
8.8
null
null
RHSA-2015:0783
Red Hat Security Advisory: kernel security and bug fix update
kernel: infiniband: uverbs: unprotected physical memory access xen: Insufficient bounding of "REP MOVS" to MMIO emulated inside the hypervisor (xsa112)
[ "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
RHSA-2021:3272
Red Hat Security Advisory: Red Hat OpenShift Service Mesh 2.0.7.1 security update
envoyproxy/envoy: HTTP request with multiple value headers can bypass authorization policies envoyproxy/envoy: HTTP request with a URL fragment in the URI can bypass authorization policies envoyproxy/envoy: denial of service when using extensions that modify request or response sizes istio/istio: HTTP request can bypass authorization mechanisms due to case insensitive host comparison istio/istio: HTTP request with fragment in URI can bypass authorization mechanisms
[ "cpe:/a:redhat:service_mesh:2.0::el8" ]
null
8.3
null
null
RHSA-2015:0287
Red Hat Security Advisory: foreman-proxy security update
foreman-proxy: failure to verify SSL certificates
[ "cpe:/a:redhat:openstack-installer:5::el6" ]
null
null
null
null
RHSA-2008:0295
Red Hat Security Advisory: vsftpd security and bug fix update
vsftpd: memory leak when deny_file option is set
[ "cpe:/o:redhat:enterprise_linux:5::client_workstation", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
RHSA-2024:4541
Red Hat Security Advisory: ghostscript security update
ghostscript: OPVP device arbitrary code execution via custom Driver library
[ "cpe:/a:redhat:rhel_eus:9.2::appstream", "cpe:/a:redhat:rhel_eus:9.2::crb" ]
null
8.8
null
null
RHSA-2020:2967
Red Hat Security Advisory: sane-backends security update
sane-backends: Heap buffer overflow in epsonds_net_read in epsonds-net.c sane-backends: Heap buffer overflow in esci2_img
[ "cpe:/a:redhat:rhel_eus:8.1::appstream" ]
null
8
null
null
RHSA-2019:3905
Red Hat Security Advisory: OpenShift Container Platform 3.11 atomic-openshift security update
kubernetes: `kubectl cp` allows for arbitrary file write via double symlinks kubernetes: YAML parsing vulnerable to "Billion Laughs" attack, allowing for remote denial of service
[ "cpe:/a:redhat:openshift:3.11::el7" ]
null
null
7.5
null
RHSA-2015:1586
Red Hat Security Advisory: firefox security update
Mozilla: Miscellaneous memory safety hazards (rv:38.2) (MFSA 2015-79) Mozilla: Out-of-bounds read with malformed MP3 file (MFSA 2015-80) Mozilla: Redefinition of non-configurable JavaScript object properties (MFSA 2015-82) Mozilla: Overflow issues in libstagefright (MFSA 2015-83) Mozilla: Overflow issues in libstagefright (MFSA 2015-83) Mozilla: Crash when using shared memory in JavaScript (MFSA 2015-87) Mozilla: Buffer overflows on Libvpx when decoding WebM video (MFSA 2015-89) Mozilla: Buffer overflows on Libvpx when decoding WebM video (MFSA 2015-89) Mozilla: Vulnerabilities found through code inspection (MFSA 2015-90) Mozilla: Vulnerabilities found through code inspection (MFSA 2015-90) Mozilla: Vulnerabilities found through code inspection (MFSA 2015-90) Mozilla: Heap overflow in gdk-pixbuf when scaling bitmap images (MFSA 2015-88) Mozilla: Use-after-free in XMLHttpRequest with shared workers (MFSA 2015-92) Mozilla: Overflow issues in libstagefright (MFSA 2015-83)
[ "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::server", "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation", "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
null
null
RHSA-2017:0329
Red Hat Security Advisory: qemu-kvm-rhev security update
Qemu: display: cirrus: oob access while doing bitblt copy backward mode Qemu: display: cirrus: potential arbitrary code execution via cirrus_bitblt_cputovideo
[ "cpe:/a:redhat:openstack:9::el7" ]
null
null
5.5
null
RHSA-2012:1569
Red Hat Security Advisory: flash-plugin security update
flash-plugin: multiple code execution flaws (APSB12-27) flash-plugin: multiple code execution flaws (APSB12-27) flash-plugin: multiple code execution flaws (APSB12-27)
[ "cpe:/a:redhat:rhel_extras:5::client", "cpe:/a:redhat:rhel_extras:5::server", "cpe:/a:redhat:rhel_extras:6" ]
null
null
null
null
RHSA-2006:0635
Red Hat Security Advisory: XFree86 security update
freetype: integer overflow vulnerability due to incomplete fix for CVE-2006-1861
[ "cpe:/o:redhat:enterprise_linux:3::as", "cpe:/o:redhat:enterprise_linux:3::desktop", "cpe:/o:redhat:enterprise_linux:3::es", "cpe:/o:redhat:enterprise_linux:3::ws" ]
null
null
null
null
RHSA-2022:1286
Red Hat Security Advisory: firefox security update
Mozilla: Use-after-free in NSSToken objects Mozilla: Use-after-free after VR Process destruction Mozilla: Denial of Service via complex regular expressions Mozilla: Out of bounds write due to unexpected WebAuthN Extensions Mozilla: Use-after-free in DocumentL10n::TranslateDocument Mozilla: Incorrect AliasSet used in JIT Codegen Mozilla: iframe contents could be rendered outside the border Mozilla: Memory safety bugs fixed in Firefox 99 and Firefox ESR 91.8
[ "cpe:/a:redhat:rhel_eus:8.2::appstream" ]
null
8.8
6.1
null
RHSA-2023:7579
Red Hat Security Advisory: postgresql:13 security update
postgresql: Memory disclosure in aggregate function calls postgresql: Buffer overrun from integer overflow in array modification postgresql: Role pg_signal_backend can signal certain superuser processes. postgresql: extension script @substitutions@ within quoting allow SQL injection
[ "cpe:/a:redhat:rhel_eus:8.8::appstream" ]
null
7.5
null
null
RHSA-2023:0837
Red Hat Security Advisory: systemd security and bug fix update
systemd: local information leak due to systemd-coredump not respecting fs.suid_dumpable kernel setting
[ "cpe:/o:redhat:enterprise_linux:8::baseos" ]
null
5.5
null
null
RHSA-2023:2253
Red Hat Security Advisory: buildah security and bug fix update
golang: crypto/tls: session tickets lack random ticket_age_add golang: net/http: excessive memory growth in a Go server accepting HTTP/2 requests
[ "cpe:/a:redhat:enterprise_linux:9::appstream" ]
null
5.3
null
null
RHSA-2005:785
Red Hat Security Advisory: firefox security update
security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw
[ "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws" ]
null
null
null
null
RHSA-2014:0212
Red Hat Security Advisory: Red Hat JBoss SOA Platform 5.3.1 update
Java: XML signature spoofing Framework: XML External Entity (XXE) injection flaw
[ "cpe:/a:redhat:jboss_enterprise_soa_platform:5.3" ]
null
null
null
null
RHSA-2018:3803
Red Hat Security Advisory: chromium-browser security update
chromium-browser: Out of bounds write in V8 chromium-browser: Use after frees in PDFium chromium-browser: Heap buffer overflow in Skia chromium-browser: Use after free in PDFium chromium-browser: Use after free in Blink chromium-browser: Heap buffer overflow in Canvas chromium-browser: Use after free in WebAudio chromium-browser: Use after free in MediaRecorder chromium-browser: Heap buffer overflow in Blink chromium-browser: Out of bounds write in V8 chromium-browser: Use after free in Skia chromium-browser: Inappropriate implementation in Extensions chromium-browser: Inappropriate implementation in Site Isolation chromium-browser: Incorrect security UI in Blink chromium-browser: Inappropriate implementation in Navigation chromium-browser: Inappropriate implementation in Omnibox chromium-browser: Insufficient policy enforcement in Blink chromium-browser: Insufficient policy enforcement in Blink chromium-browser: Insufficient policy enforcement in Navigation chromium-browser: Inappropriate implementation in Media chromium-browser: Inappropriate implementation in Network Authentication chromium-browser: Insufficient data validation in Shell Integration chromium-browser: Insufficient policy enforcement in URL Formatter mozilla: Use after free in Skia chromium-browser: Insufficient policy enforcement in URL Formatter chromium-browser: Insufficient policy enforcement in Proxy chromium-browser: Out of bounds read in V8
[ "cpe:/a:redhat:rhel_extras:6" ]
null
null
6.5
null
RHSA-2018:1737
Red Hat Security Advisory: kernel security and bug fix update
kernel: netfilter: use-after-free in tcpmss_mangle_packet function in net/netfilter/xt_TCPMSS.c hw: cpu: speculative store bypass
[ "cpe:/o:redhat:rhel_eus:7.3::computenode", "cpe:/o:redhat:rhel_eus:7.3::server" ]
null
null
5.6
null
RHSA-2018:0044
Red Hat Security Advisory: redhat-virtualization-host security update
An update for redhat-virtualization-host is now available for RHEV 3.X Hypervisor and Agents for RHEL-7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
[ "cpe:/o:redhat:enterprise_linux:7::hypervisor" ]
null
null
null
null
RHBA-2025:2428
Red Hat Bug Fix Advisory: microcode_ctl bug fix and enhancement update
microcode_ctl: Improper input validation in UEFI firmware microcode_ctl: Improper input validation in UEFI firmware microcode_ctl: Improper input validation in XmlCli feature for UEFI firmware microcode_ctl: Improper input validation in UEFI firmware microcode_ctl: Improper input validation in UEFI firmware CseVariableStorageSmm
[ "cpe:/o:redhat:rhel_aus:7.7::server" ]
null
7.5
null
null
RHSA-2020:0726
Red Hat Security Advisory: sudo security update
sudo: Stack based buffer overflow when pwfeedback is enabled
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
7.8
null
null
RHSA-2023:4645
Red Hat Security Advisory: .NET 6.0 security, bug fix, and enhancement update
dotnet: RCE under dotnet commands dotnet: Kestrel vulnerability to slow read attacks leading to Denial of Service attack
[ "cpe:/a:redhat:enterprise_linux:8::appstream", "cpe:/a:redhat:enterprise_linux:8::crb" ]
null
7.5
null
null
RHSA-2007:0848
Red Hat Security Advisory: openoffice.org security update
openoffice.org TIFF parsing heap overflow
[ "cpe:/a:redhat:rhel_productivity:5", "cpe:/o:redhat:enterprise_linux:3::as", "cpe:/o:redhat:enterprise_linux:3::desktop", "cpe:/o:redhat:enterprise_linux:3::es", "cpe:/o:redhat:enterprise_linux:3::ws", "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws", "cpe:/o:redhat:enterprise_linux:5::client" ]
null
null
null
null
RHSA-2009:1116
Red Hat Security Advisory: cyrus-imapd security update
cyrus-sasl: sasl_encode64() does not reliably null-terminate its output
[ "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws", "cpe:/o:redhat:enterprise_linux:5::client_workstation", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
RHSA-2020:0216
Red Hat Security Advisory: Ansible security and bug fix update (2.8.8)
Ansible: vulnerability in solaris_zone module via crafted solaris zone Ansible: malicious code could craft filename in nxos_file_copy module
[ "cpe:/a:redhat:ansible_engine:2.8::el7", "cpe:/a:redhat:ansible_engine:2.8::el8" ]
null
5.6
7.3
null
RHSA-2012:1090
Red Hat Security Advisory: nss and nspr security, bug fix, and enhancement update
nss: NSS parsing errors with zero length items
[ "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::client_workstation", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
RHSA-2007:0539
Red Hat Security Advisory: aide security update
Rebase aide to 0.13.1
[ "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
RHSA-2023:1598
Red Hat Security Advisory: tigervnc security update
xorg-x11-server: X.Org Server Overlay Window Use-After-Free Local Privilege Escalation Vulnerability
[ "cpe:/a:redhat:rhel_eus:8.6::appstream" ]
null
7.8
null
null
RHSA-2024:8132
Red Hat Security Advisory: libuv security update
libuv: Improper Domain Lookup that potentially leads to SSRF attacks
[ "cpe:/a:redhat:rhel_eus:8.8::appstream", "cpe:/a:redhat:rhel_eus:8.8::crb" ]
null
7.3
null
null
RHSA-2008:0512
Red Hat Security Advisory: XFree86 security update
X.org Record and Security extensions memory corruption X.org MIT-SHM extension arbitrary memory read X.org Render extension AllocateGlyph() heap buffer overflow
[ "cpe:/o:redhat:enterprise_linux:2.1::as", "cpe:/o:redhat:enterprise_linux:2.1::aw", "cpe:/o:redhat:enterprise_linux:2.1::es", "cpe:/o:redhat:enterprise_linux:2.1::ws" ]
null
null
null
null
RHSA-2005:785
Red Hat Security Advisory: firefox security update
security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw
[ "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws" ]
null
null
null
null
RHSA-2025:1083
Red Hat Security Advisory: ovn22.03 security update
ovn: egress ACLs may be bypassed via specially crafted UDP packet
[ "cpe:/o:redhat:enterprise_linux:8::fastdatapath" ]
null
8.1
null
null
RHSA-2021:0874
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.3.6 security update
guava: local information disclosure via temporary directory created with unsafe permissions Undertow: Incomplete fix for CVE-2017-2666 due to permitting invalid characters in HTTP requests bouncycastle: password bypass in OpenBSDBCrypt.checkPassword utility possible jboss-remoting: Threads hold up forever in the EJB server by suppressing the ack from an EJB client undertow: Possible regression in fix for CVE-2020-10687 wildfly: Information disclosure due to publicly accessible privileged actions in JBoss EJB Client
[ "cpe:/a:redhat:jboss_enterprise_application_platform:7.3::el8" ]
null
4.3
4.8
null
RHSA-2021:3252
Red Hat Security Advisory: python27 security update
python: Unsafe use of eval() on data retrieved via HTTP in the test suite python-jinja2: ReDoS vulnerability in the urlize filter python: Stack-based buffer overflow in PyCArg_repr in _ctypes/callproc.c python-babel: Relative path traversal allows attacker to load arbitrary locale files and execute arbitrary code python-pygments: Infinite loop in SML lexer may lead to DoS python: Web cache poisoning via urllib.parse.parse_qsl and urllib.parse.parse_qs by using a semicolon in query parameters python-pygments: ReDoS in multiple lexers python-babel: Relative path traversal allows attacker to load arbitrary locale files and execute arbitrary code
[ "cpe:/a:redhat:rhel_software_collections:3::el7" ]
null
7.8
null
null
RHSA-2024:3834
Red Hat Security Advisory: gdk-pixbuf2 security update
gnome: heap memory corruption on gdk-pixbuf
[ "cpe:/a:redhat:enterprise_linux:9::appstream" ]
null
7.3
null
null
RHSA-2016:1473
Red Hat Security Advisory: openstack-neutron security and bug fix update
openstack-neutron: ICMPv6 source address spoofing vulnerability openstack-neutron: DHCP spoofing vulnerability openstack-neutron: MAC source address spoofing vulnerability
[ "cpe:/a:redhat:openstack:8::el7" ]
null
null
6.3
null
RHSA-2011:1800
Red Hat Security Advisory: JBoss Enterprise Application Platform 5.1.2 update
Invoker servlets authentication bypass (HTTP verb tampering) extension): MITM due to improper validation of AX attribute signatures
[ "cpe:/a:redhat:jboss_enterprise_application_platform:5::el4" ]
null
null
null
null
RHSA-2022:8853
Red Hat Security Advisory: Red Hat OpenStack Platform 16.2.4 (python-django20) security update
django: Possible XSS via '{% debug %}' template tag django: Denial-of-service possibility in file uploads
[ "cpe:/a:redhat:openstack:16.2::el8" ]
null
7.5
null
null
RHSA-2012:1512
Red Hat Security Advisory: libxml2 security update
libxml2: Heap-buffer-underflow in xmlParseAttValueComplex
[ "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::client_workstation", "cpe:/o:redhat:enterprise_linux:5::server", "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
null
null
RHSA-2008:0529
Red Hat Security Advisory: net-snmp security update
net-snmp SNMPv3 authentication bypass (VU#877044) net-snmp: buffer overflow in perl module's Perl Module __snprint_value()
[ "cpe:/o:redhat:enterprise_linux:3::as", "cpe:/o:redhat:enterprise_linux:3::desktop", "cpe:/o:redhat:enterprise_linux:3::es", "cpe:/o:redhat:enterprise_linux:3::ws", "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws", "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::client_workstation", "cpe:/o:redhat:enterprise_linux:5::server", "cpe:/o:redhat:rhel_eus:4.5::as", "cpe:/o:redhat:rhel_eus:4.5::es" ]
null
null
null
null
RHSA-2017:0065
Red Hat Security Advisory: kernel security update
kernel: Use-after-free in the recvmmsg exit path
[ "cpe:/o:redhat:rhel_aus:6.5::server", "cpe:/o:redhat:rhel_tus:6.5::server" ]
null
null
8.1
null
RHSA-2022:1103
Red Hat Security Advisory: kpatch-patch security update
kernel: Use After Free in unix_gc() which could result in a local privilege escalation kernel: fget: check that the fd still exists after getting a ref to it kernel: possible privileges escalation due to missing TLB flush kernel: failing usercopy allows for use-after-free exploitation
[ "cpe:/o:redhat:rhel_e4s:7.6::server" ]
null
7
null
null
RHSA-2024:0757
Red Hat Security Advisory: container-tools:4.0 security update
runc: file descriptor leak
[ "cpe:/a:redhat:rhel_eus:8.6::appstream" ]
null
8.6
null
null
RHSA-2021:4723
Red Hat Security Advisory: devtoolset-10-binutils security update
environment: Unicode's bidirectional (BiDi) override characters can cause trojan source attacks
[ "cpe:/a:redhat:rhel_software_collections:3::el7" ]
null
8.5
null
null
RHSA-2020:2440
Red Hat Security Advisory: OpenShift Container Platform 4.3.25 openshift security update
kubernetes: Server side request forgery (SSRF) in kube-controller-manager allows users to leak secret information
[ "cpe:/a:redhat:openshift:4.3::el7", "cpe:/a:redhat:openshift:4.3::el8" ]
null
6.3
null
null
RHSA-2024:0862
Red Hat Security Advisory: gimp:2.8 security update
gimp: PSD buffer overflow RCE gimp: psp off-by-one RCE
[ "cpe:/a:redhat:rhel_eus:8.8::appstream" ]
null
7.8
null
null
RHSA-2023:3923
Red Hat Security Advisory: go-toolset and golang security update
golang: cmd/go: go command may generate unexpected code at build time when using cgo golang: runtime: unexpected behavior of setuid/setgid binaries golang: cmd/go: go command may execute arbitrary code at build time when using cgo golang: cmd/cgo: Arbitrary code execution triggered by linker flags
[ "cpe:/a:redhat:enterprise_linux:9::appstream" ]
null
7.5
null
null
RHSA-2020:0798
Red Hat Security Advisory: OpenShift Container Platform 3.11 openshift-enterprise-mediawiki-apb security update
openshift/mediawiki-apb: /etc/passwd is given incorrect privileges
[ "cpe:/a:redhat:openshift:3.11::el7" ]
null
7
null
null
RHSA-2005:586
Red Hat Security Advisory: firefox security update
security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw
[ "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws" ]
null
null
null
null
RHSA-2014:0038
Red Hat Security Advisory: Red Hat Enterprise Virtualization Manager 3.3.0 update
rhev: remote-viewer spice tls-stripping issue
[ "cpe:/a:redhat:rhev_manager:3" ]
null
null
null
null
RHSA-2024:9502
Red Hat Security Advisory: expat security update
libexpat: expat: DoS via XML_ResumeParser
[ "cpe:/o:redhat:enterprise_linux:8::baseos" ]
null
5.9
null
null
RHSA-2024:0799
Red Hat Security Advisory: Red Hat Single Sign-On 7.6.7 security update on RHEL 8
guava: insecure temporary directory creation keycloak: reflected XSS via wildcard in OIDC redirect_uri keycloak: redirect_uri validation bypass keycloak: Log Injection during WebAuthn authentication or registration keycloak: open redirect via "form_post.jwt" JARM response mode jetty-server: OutOfMemoryError for large multipart without filename read via request.getParameter() jetty-server: Cookie parsing of quoted values can exfiltrate values from other cookies santuario: Private Key disclosure in debug-log output
[ "cpe:/a:redhat:red_hat_single_sign_on:7.6::el8" ]
null
6.5
null
null
RHSA-2017:0936
Red Hat Security Advisory: python-defusedxml and python-pysaml2 security update
python-pysaml2: Entity expansion issue
[ "cpe:/a:redhat:openstack:8::el7" ]
null
null
5.3
null
RHSA-2014:0441
Red Hat Security Advisory: Red Hat Enterprise MRG Messaging 2.5 security, bug fix, and enhancement update
cumin: weak password hashing
[ "cpe:/a:redhat:enterprise_mrg:2::el5" ]
null
null
null
null
RHSA-2015:1044
Red Hat Security Advisory: virtio-win security and bug fix update
virtio-win: netkvm: malformed packet can cause BSOD
[ "cpe:/a:redhat:rhel_extras:7" ]
null
null
null
null
RHSA-2011:1304
Red Hat Security Advisory: jbossws-common security update
JBossWS remote Denial of Service
[ "cpe:/a:redhat:jboss_enterprise_web_platform:5.1" ]
null
null
null
null
RHSA-2016:0489
Red Hat Security Advisory: Red Hat OpenShift Enterprise 2.2.9 security, bug fix, and enhancement update
ObjectMessage: unsafe deserialization jenkins: Project name disclosure via fingerprints (SECURITY-153) jenkins: Public value used for CSRF protection salt (SECURITY-169) jenkins: XXE injection into job configurations via CLI (SECURITY-173) jenkins: Secret key not verified when connecting a slave (SECURITY-184) jenkins: Information disclosure via sidepanel (SECURITY-192) jenkins: Local file inclusion vulnerability (SECURITY-195) jenkins: API tokens of other users available to admins (SECURITY-200) jenkins: Queue API did show items not visible to the current user (SECURITY-186) jenkins: JNLP slaves not subject to slave-to-master access control (SECURITY-206) jenkins: Stored XSS vulnerability in slave offline status message (SECURITY-214) jenkins: CSRF vulnerability in some administrative actions (SECURITY-225) jenkins: CSRF protection ineffective (SECURITY-233) jenkins: Jenkins plugin manager vulnerable to MITM attacks (SECURITY-234) jenkins: Remote code execution vulnerability due to unsafe deserialization in Jenkins remoting (SECURITY-218)
[ "cpe:/a:redhat:openshift:2.0::el6" ]
null
null
null
null
RHSA-2016:2088
Red Hat Security Advisory: java-1.8.0-oracle security update
OpenJDK: missing algorithm restrictions for jar verification (Libraries, 8155973) OpenJDK: insufficient classloader consistency checks in ClassLoaderWithRepository (JMX, 8157739) JDK: unspecified vulnerability fixed in 6u131, 7u121, and 8u111 (2D) OpenJDK: insufficient checks of JDWP packets (Hotspot, 8159519) OpenJDK: incomplete type checks of System.arraycopy arguments (Hotspot, 8160591) OpenJDK: exposure of server authentication credentials to proxy (Networking, 8160838)
[ "cpe:/a:redhat:rhel_extras_oracle_java:6", "cpe:/a:redhat:rhel_extras_oracle_java:7" ]
null
null
5.3
null
RHSA-2022:0239
Red Hat Security Advisory: libreswan security update
libreswan: Malicious IKEv1 packet can cause libreswan to restart
[ "cpe:/a:redhat:rhel_eus:8.4::appstream" ]
null
7.5
null
null
RHEA-2021:1441
Red Hat Enhancement Advisory: rh-eclipse bug fix and enhancement update
eclipse: Help Subsystem does not authenticate active help requests
[ "cpe:/a:redhat:devtools:2021" ]
null
7.8
null
null
RHSA-2024:1497
Red Hat Security Advisory: thunderbird security update
nss: timing attack against RSA decryption Mozilla: Crash in NSS TLS method Mozilla: Leaking of encrypted email subjects to other conversations Mozilla: JIT code failed to save return registers on Armv7-A Mozilla: Integer overflow could have led to out of bounds write Mozilla: Improper handling of html and body tags enabled CSP nonce leakage Mozilla: Clickjacking vulnerability could have led to a user accidentally granting permissions Mozilla: Self referencing object could have potentially led to a use-after-free Mozilla: Memory safety bugs fixed in Firefox 124, Firefox ESR 115.9, and Thunderbird 115.9
[ "cpe:/a:redhat:rhel_eus:8.6::appstream" ]
null
7.5
null
null
RHSA-2021:0226
Red Hat Security Advisory: sudo security update
sudo: Heap buffer overflow in argument parsing
[ "cpe:/o:redhat:rhel_aus:7.2::server" ]
null
7.8
null
null
RHSA-2023:5390
Red Hat Security Advisory: OpenShift Container Platform 4.12.36 bug fix and security update
distribution/distribution: DoS from malicious API request
[ "cpe:/a:redhat:openshift:4.12::el8" ]
null
6.5
null
null
RHSA-2023:6938
Red Hat Security Advisory: container-tools:4.0 security and bug fix update
go-yaml: Improve heuristics preventing CPU/memory abuse by parsing malicious or large YAML documents golang.org/x/net/http2: avoid quadratic complexity in HPACK decoding golang: crypto/tls: large handshake records may cause panics golang: net/http, mime/multipart: denial of service from excessive resource consumption golang.org/x/net/html: Cross site scripting golang: net/http, net/textproto: denial of service from excessive memory allocation golang: net/http, net/textproto, mime/multipart: denial of service from excessive resource consumption golang: go/parser: Infinite loop in parsing golang: html/template: backticks not treated as string delimiters golang: html/template: improper sanitization of CSS values golang: html/template: improper handling of JavaScript whitespace runc: Rootless runc makes `/sys/fs/cgroup` writable runc: volume mount race condition (regression of CVE-2019-19921) runc: AppArmor can be bypassed when `/proc` inside the container is symlinked with a specific mount configuration golang: html/template: improper handling of empty HTML attributes golang: net/http: insufficient sanitization of Host header
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
6.5
null
null
RHSA-2018:2165
Red Hat Security Advisory: kernel-rt security, and enhancement update
kernel: Buffer over-read in keyring subsystem allows exposing potentially sensitive information to local attacker Kernel: FPU state information leakage via lazy FPU restore
[ "cpe:/a:redhat:enterprise_mrg:2:server:el6" ]
null
null
5.6
null
RHSA-2024:3433
Red Hat Security Advisory: protobuf security update
protobuf: Incorrect parsing of nullchar in the proto symbol leads to Nullptr dereference
[ "cpe:/a:redhat:rhel_eus:8.6::appstream", "cpe:/a:redhat:rhel_eus:8.6::crb" ]
null
7.5
null
null
RHSA-2019:0304
Red Hat Security Advisory: docker security update
runc: Execution of malicious containers allows for container escape and access to host filesystem
[ "cpe:/a:redhat:rhel_extras_other:7" ]
null
null
7.7
null
RHSA-2021:4702
Red Hat Security Advisory: Satellite 6.10 Release
python-ecdsa: Unexpected and undocumented exceptions during signature decoding python-ecdsa: DER encoding is not being verified in signatures rubygem-activerecord-session_store: hijack sessions by using timing attacks targeting the session id rake: OS Command Injection via egrep in Rake::FileList guava: local information disclosure via temporary directory created with unsafe permissions PyYAML: incomplete fix for CVE-2020-1747 rubygem-nokogiri: XML external entity injection via Nokogiri::XML::Schema Satellite: Azure compute resource secret_key leak to authenticated users foreman: possible man-in-the-middle in smart_proxy realm_freeipa Satellite: BMC controller credential leak via API python-aiohttp: Open redirect in aiohttp.web_middlewares.normalize_path_middleware rubygem-actionpack: Possible Information Disclosure / Unintended Method Execution in Action Pack rails: Possible Denial of Service vulnerability in Action Dispatch rails: Possible DoS Vulnerability in Action Controller Token Authentication django: potential directory-traversal via uploaded files rubygem-puma: incomplete fix for CVE-2019-16770 allows Denial of Service (DoS) django: Potential directory-traversal via uploaded files rubygem-addressable: ReDoS in templates django: Potential directory traversal via ``admindocs`` python-urllib3: ReDoS in the parsing of authority part of URL django: Possible indeterminate SSRF, RFI, and LFI attacks since validators accepted leading zeros in IPv4 addresses
[ "cpe:/a:redhat:satellite:6.10::el7", "cpe:/a:redhat:satellite_capsule:6.10::el7" ]
null
7.5
7.4
null
RHSA-2003:117
Red Hat Security Advisory: openssl security update for Stronghold
security flaw security flaw
[ "cpe:/a:redhat:stronghold:3" ]
null
null
null
null
RHSA-2017:0893
Red Hat Security Advisory: 389-ds-base security and bug fix update
389-ds-base: Remote crash via crafted LDAP messages
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
6.5
null
RHSA-2023:4377
Red Hat Security Advisory: kernel security, bug fix, and enhancement update
kernel: KVM: x86/mmu: race condition in direct_page_fault() kernel: speculative pointer dereference in do_prlimit() in kernel/sys.c kernel: Spectre v2 SMT mitigations problem kernel: ipvlan: out-of-bounds write caused by unclear skb->cb kernel: cls_flower: out-of-bounds write in fl_set_geneve_opt()
[ "cpe:/a:redhat:enterprise_linux:9::appstream", "cpe:/a:redhat:enterprise_linux:9::crb", "cpe:/o:redhat:enterprise_linux:9::baseos" ]
null
7.8
5.6
null
RHSA-2024:1862
Red Hat Security Advisory: Red Hat Single Sign-On 7.6.8 security update on RHEL 9
keycloak: Log Injection during WebAuthn authentication or registration keycloak: Authorization Bypass keycloak: path transversal in redirection validation keycloak: org.keycloak.protocol.oidc: unvalidated cross-origin messages in checkLoginIframe leads to DDoS undertow: Out-of-memory Error after several closed connections with wildfly-http-client protocol
[ "cpe:/a:redhat:red_hat_single_sign_on:7.6::el9" ]
null
7.5
null
null
RHSA-2017:3454
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.1.0 security update
Artemis: Deserialization of untrusted input vulnerability eap: HTTP header injection / response splitting EAP7 Privilege escalation when managing domain including earlier version slaves EAP7: Internal IP address disclosed on redirect when request header Host field is not set undertow: Long URL proxy request lead to java.nio.BufferOverflowException and DoS EAP: Sensitive data can be exposed at the server level in domain mode admin-cli: Potential EAP resource starvation DOS attack via GET requests for server log files jboss: jbossas: unsafe chown of server.log in jboss init script allows privilege escalation wildfly: ParseState headerValuesCache can be exploited to fill heap with garbage wildfly: Arbitrary file read via path traversal undertow: HTTP Request smuggling vulnerability due to permitting invalid characters in HTTP requests undertow: IO thread DoS via unclean Websocket closing jackson-databind: Deserialization vulnerability via readValue method of ObjectMapper hibernate-validator: Privilege escalation when running under the security manager undertow: HTTP Request smuggling vulnerability (incomplete fix of CVE-2017-2666) undertow: improper whitespace parsing leading to potential HTTP request smuggling EAP-7: Wrong privileges on multiple property files
[ "cpe:/a:redhat:jboss_enterprise_application_platform:7::el6" ]
null
null
5.5
null
RHSA-2014:0455
Red Hat Security Advisory: openstack-glance security update
openstack-glance: remote code execution in Glance Sheepdog backend
[ "cpe:/a:redhat:openstack:4::el6" ]
null
null
null
null
RHSA-2023:3157
Red Hat Security Advisory: Red Hat OpenStack Platform 17.0 security update
openstack-cinder: silently access other user's volumes
[ "cpe:/a:redhat:openstack:17.0::el9" ]
null
9.1
null
null
RHSA-2023:7423
Red Hat Security Advisory: kernel security update
hw: Intel: Gather Data Sampling (GDS) side channel vulnerability kernel: net/sched: sch_qfq component can be exploited if in qfq_change_agg function happens qfq_enqueue overhead kernel: net/sched: cls_fw component can be exploited as result of failure in tcf_change_indev function kernel: net/sched: Use-after-free vulnerabilities in the net/sched classifiers: cls_fw, cls_u32 and cls_route kernel: net/sched: Use-after-free vulnerabilities in the net/sched classifiers: cls_fw, cls_u32 and cls_route kernel: net/sched: Use-after-free vulnerabilities in the net/sched classifiers: cls_fw, cls_u32 and cls_route kernel: net/sched: Use-after-free vulnerabilities in the net/sched classifiers: cls_fw, cls_u32 and cls_route kernel: out-of-bounds write in qfq_change_class function
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
7
null
null