id
stringlengths 13
15
| title
stringlengths 29
176
| description
stringlengths 8
32.1k
| cpes
sequencelengths 0
20
| cvss_v4_0
null | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
null |
---|---|---|---|---|---|---|---|
RHSA-2022:0982 | Red Hat Security Advisory: Red Hat OpenStack Platform 16.1 (python-twisted) security update | dev-python/twisted: secret exposure in cross-origin redirects python-twisted: SSH client and server denial of service during SSH handshake | [
"cpe:/a:redhat:openstack:16.1::el8"
] | null | 7.5 | null | null |
RHSA-2024:8105 | Red Hat Security Advisory: python-gevent security update | python-gevent: privilege escalation via a crafted script to the WSGIServer component | [
"cpe:/a:redhat:rhel_aus:8.4::appstream",
"cpe:/a:redhat:rhel_e4s:8.4::appstream",
"cpe:/a:redhat:rhel_tus:8.4::appstream"
] | null | 9.1 | null | null |
RHSA-2018:1779 | Red Hat Security Advisory: xmlrpc3 security update | xmlrpc: Deserialization of untrusted Java object through <ex:serializable> tag | [
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | 7.5 | null |
RHSA-2023:2710 | Red Hat Security Advisory: Red Hat Single Sign-On 7.6.3 for OpenShift image security update | okhttp: information disclosure via improperly used cryptographic function undertow: Server identity in https connection is not checked by the undertow client snakeyaml: Uncaught exception in java.base/java.util.ArrayList.hashCode dev-java/snakeyaml: DoS via stack overflow codec-haproxy: HAProxyMessageDecoder Stack Exhaustion DoS apache-james-mime4j: Temporary File Information Disclosure in MIME4J TempFileStorageProvider RESTEasy: creation of insecure temp files | [
"cpe:/a:redhat:rhosemc:1.0::el8"
] | null | 5.3 | null | null |
RHSA-2008:0214 | Red Hat Security Advisory: squid security update | squid: regression in SQUID-2007:2 / CVE-2007-6239 | [
"cpe:/o:redhat:enterprise_linux:2.1::as",
"cpe:/o:redhat:enterprise_linux:2.1::aw",
"cpe:/o:redhat:enterprise_linux:2.1::es",
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws",
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2023:4704 | Red Hat Security Advisory: subscription-manager security update | subscription-manager: inadequate authorization of com.redhat.RHSM1 D-Bus interface allows local users to modify configuration | [
"cpe:/a:redhat:rhel_aus:8.4::appstream",
"cpe:/a:redhat:rhel_e4s:8.4::appstream",
"cpe:/a:redhat:rhel_tus:8.4::appstream",
"cpe:/o:redhat:rhel_aus:8.4::baseos",
"cpe:/o:redhat:rhel_e4s:8.4::baseos",
"cpe:/o:redhat:rhel_tus:8.4::baseos"
] | null | 7.8 | null | null |
RHSA-2019:2051 | Red Hat Security Advisory: compat-libtiff3 security update | libtiff: NULL pointer dereference in tif_print.c:TIFFPrintDirectory() causes a denial of service | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 3.3 | null |
RHSA-2021:5138 | Red Hat Security Advisory: Red Hat AMQ Streams 1.8.4 release and security update | log4j-core: Remote code execution in Log4j 2.x when logs contain an attacker-controlled string value | [
"cpe:/a:redhat:amq_streams:1"
] | null | 9.8 | null | null |
RHSA-2023:5473 | Red Hat Security Advisory: bind security update | bind: stack exhaustion in control channel code may lead to DoS | [
"cpe:/a:redhat:rhel_eus:8.6::appstream",
"cpe:/o:redhat:rhel_eus:8.6::baseos"
] | null | 7.5 | null | null |
RHSA-2021:2032 | Red Hat Security Advisory: slapi-nis security and bug fix update | slapi-nis: NULL dereference (DoS) with specially crafted Binding DN | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 7.5 | null | null |
RHSA-2009:1139 | Red Hat Security Advisory: pidgin security and bug fix update | pidgin: DoS via specially-crafted ICQWebMessage | [
"cpe:/a:redhat:rhel_productivity:5",
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws",
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation"
] | null | null | null | null |
RHSA-2025:1084 | Red Hat Security Advisory: ovn22.06 security update | ovn: egress ACLs may be bypassed via specially crafted UDP packet | [
"cpe:/o:redhat:enterprise_linux:8::fastdatapath"
] | null | 8.1 | null | null |
RHSA-2023:2453 | Red Hat Security Advisory: libtpms security update | tpm: TCG TPM2.0 implementations vulnerable to memory corruption tpm2: TCG TPM2.0 implementations vulnerable to memory corruption | [
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 5.5 | null | null |
RHSA-2012:0078 | Red Hat Security Advisory: JBoss Communications Platform 5.1.3 update | tomcat: Multiple weaknesses in HTTP DIGEST authentication tomcat: security manager restrictions bypass JBoss Web remote denial of service when surrogate pair character is placed at buffer boundary tomcat: hash table collisions CPU usage DoS (oCERT-2011-003) tomcat: Multiple weaknesses in HTTP DIGEST authentication tomcat: Multiple weaknesses in HTTP DIGEST authentication tomcat: Multiple weaknesses in HTTP DIGEST authentication tomcat: large number of parameters DoS | [
"cpe:/a:redhat:jboss_communications_platform:5.1"
] | null | null | null | null |
RHSA-2025:0753 | Red Hat Security Advisory: Red Hat Ansible Automation Platform Execution Environments Container Release Update | aiohttp: aiohttp vulnerable to request smuggling due to incorrect parsing of chunk extensions jinja2: Jinja has a sandbox breakout through malicious filenames jinja2: Jinja has a sandbox breakout through indirect reference to format method | [
"cpe:/a:redhat:ansible_automation_platform:ee::el8",
"cpe:/a:redhat:ansible_automation_platform:ee::el9"
] | null | 6.3 | null | null |
RHSA-2004:003 | Red Hat Security Advisory: : Updated CVS packages fix minor security issue | security flaw | [
"cpe:/o:redhat:linux:9"
] | null | null | null | null |
RHSA-2003:061 | Red Hat Security Advisory: netpbm security update | security flaw | [
"cpe:/o:redhat:enterprise_linux:2.1::as",
"cpe:/o:redhat:enterprise_linux:2.1::aw",
"cpe:/o:redhat:enterprise_linux:2.1::es",
"cpe:/o:redhat:enterprise_linux:2.1::ws"
] | null | null | null | null |
RHSA-2018:2785 | Red Hat Security Advisory: kernel security and bug fix update | kernel: TCP segments with random offsets allow a remote denial of service (SegmentSmack) kernel: IP fragments with random offsets allow a remote denial of service (FragmentSmack) kernel: mm: use-after-free in do_get_mempolicy function allows local DoS or other unspecified impact | [
"cpe:/o:redhat:rhel_eus:7.3::computenode",
"cpe:/o:redhat:rhel_eus:7.3::server"
] | null | null | 5.5 | null |
RHSA-2016:1301 | Red Hat Security Advisory: kernel-rt security, bug fix, and enhancement update | kernel: SCTP denial of service during timeout kernel-rt: Sending SysRq command via ICMP echo request kernel: infiniband: Unprivileged process can overwrite kernel memory using rdma_ucm.ko | [
"cpe:/a:redhat:rhel_extras_rt:7"
] | null | null | 7.8 | null |
RHSA-2025:3945 | Red Hat Security Advisory: mod_auth_openidc security update | mod_auth_openidc: mod_auth_openidc allows OIDCProviderAuthRequestMethod POSTs to leak protected data | [
"cpe:/a:redhat:rhel_e4s:9.0::appstream"
] | null | 7.5 | null | null |
RHSA-2021:0225 | Red Hat Security Advisory: sudo security update | sudo: Heap buffer overflow in argument parsing | [
"cpe:/o:redhat:rhel_aus:7.3::server"
] | null | 7.8 | null | null |
RHSA-2021:1611 | Red Hat Security Advisory: systemd security, bug fix, and enhancement update | systemd: Spoofing of XDG_SEAT allows for actions to be checked against "allow_active" instead of "allow_any" systemd: Mishandles numerical usernames beginning with decimal digits or 0x followed by hexadecimal digits | [
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 6.7 | 4.5 | null |
RHSA-2023:7569 | Red Hat Security Advisory: firefox security update | Mozilla: Out-of-bound memory access in WebGL2 blitFramebuffer Mozilla: Use-after-free in MessagePort::Entangled Mozilla: Clickjacking permission prompts using the fullscreen transition Mozilla: Use-after-free in ReadableByteStreamQueueEntry::Buffer Mozilla: Using Selection API would copy contents into X11 primary selection. Mozilla: Incorrect parsing of relative URLs starting with "///" Mozilla: Memory safety bugs fixed in Firefox 120, Firefox ESR 115.5, and Thunderbird 115.5 | [
"cpe:/a:redhat:rhel_aus:8.4::appstream",
"cpe:/a:redhat:rhel_e4s:8.4::appstream",
"cpe:/a:redhat:rhel_tus:8.4::appstream"
] | null | 8.8 | null | null |
RHSA-2015:0783 | Red Hat Security Advisory: kernel security and bug fix update | kernel: infiniband: uverbs: unprotected physical memory access xen: Insufficient bounding of "REP MOVS" to MMIO emulated inside the hypervisor (xsa112) | [
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2021:3272 | Red Hat Security Advisory: Red Hat OpenShift Service Mesh 2.0.7.1 security update | envoyproxy/envoy: HTTP request with multiple value headers can bypass authorization policies envoyproxy/envoy: HTTP request with a URL fragment in the URI can bypass authorization policies envoyproxy/envoy: denial of service when using extensions that modify request or response sizes istio/istio: HTTP request can bypass authorization mechanisms due to case insensitive host comparison istio/istio: HTTP request with fragment in URI can bypass authorization mechanisms | [
"cpe:/a:redhat:service_mesh:2.0::el8"
] | null | 8.3 | null | null |
RHSA-2015:0287 | Red Hat Security Advisory: foreman-proxy security update | foreman-proxy: failure to verify SSL certificates | [
"cpe:/a:redhat:openstack-installer:5::el6"
] | null | null | null | null |
RHSA-2008:0295 | Red Hat Security Advisory: vsftpd security and bug fix update | vsftpd: memory leak when deny_file option is set | [
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2024:4541 | Red Hat Security Advisory: ghostscript security update | ghostscript: OPVP device arbitrary code execution via custom Driver library | [
"cpe:/a:redhat:rhel_eus:9.2::appstream",
"cpe:/a:redhat:rhel_eus:9.2::crb"
] | null | 8.8 | null | null |
RHSA-2020:2967 | Red Hat Security Advisory: sane-backends security update | sane-backends: Heap buffer overflow in epsonds_net_read in epsonds-net.c sane-backends: Heap buffer overflow in esci2_img | [
"cpe:/a:redhat:rhel_eus:8.1::appstream"
] | null | 8 | null | null |
RHSA-2019:3905 | Red Hat Security Advisory: OpenShift Container Platform 3.11 atomic-openshift security update | kubernetes: `kubectl cp` allows for arbitrary file write via double symlinks kubernetes: YAML parsing vulnerable to "Billion Laughs" attack, allowing for remote denial of service | [
"cpe:/a:redhat:openshift:3.11::el7"
] | null | null | 7.5 | null |
RHSA-2015:1586 | Red Hat Security Advisory: firefox security update | Mozilla: Miscellaneous memory safety hazards (rv:38.2) (MFSA 2015-79) Mozilla: Out-of-bounds read with malformed MP3 file (MFSA 2015-80) Mozilla: Redefinition of non-configurable JavaScript object properties (MFSA 2015-82) Mozilla: Overflow issues in libstagefright (MFSA 2015-83) Mozilla: Overflow issues in libstagefright (MFSA 2015-83) Mozilla: Crash when using shared memory in JavaScript (MFSA 2015-87) Mozilla: Buffer overflows on Libvpx when decoding WebM video (MFSA 2015-89) Mozilla: Buffer overflows on Libvpx when decoding WebM video (MFSA 2015-89) Mozilla: Vulnerabilities found through code inspection (MFSA 2015-90) Mozilla: Vulnerabilities found through code inspection (MFSA 2015-90) Mozilla: Vulnerabilities found through code inspection (MFSA 2015-90) Mozilla: Heap overflow in gdk-pixbuf when scaling bitmap images (MFSA 2015-88) Mozilla: Use-after-free in XMLHttpRequest with shared workers (MFSA 2015-92) Mozilla: Overflow issues in libstagefright (MFSA 2015-83) | [
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::server",
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation",
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | null | null |
RHSA-2017:0329 | Red Hat Security Advisory: qemu-kvm-rhev security update | Qemu: display: cirrus: oob access while doing bitblt copy backward mode Qemu: display: cirrus: potential arbitrary code execution via cirrus_bitblt_cputovideo | [
"cpe:/a:redhat:openstack:9::el7"
] | null | null | 5.5 | null |
RHSA-2012:1569 | Red Hat Security Advisory: flash-plugin security update | flash-plugin: multiple code execution flaws (APSB12-27) flash-plugin: multiple code execution flaws (APSB12-27) flash-plugin: multiple code execution flaws (APSB12-27) | [
"cpe:/a:redhat:rhel_extras:5::client",
"cpe:/a:redhat:rhel_extras:5::server",
"cpe:/a:redhat:rhel_extras:6"
] | null | null | null | null |
RHSA-2006:0635 | Red Hat Security Advisory: XFree86 security update | freetype: integer overflow vulnerability due to incomplete fix for CVE-2006-1861 | [
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws"
] | null | null | null | null |
RHSA-2022:1286 | Red Hat Security Advisory: firefox security update | Mozilla: Use-after-free in NSSToken objects Mozilla: Use-after-free after VR Process destruction Mozilla: Denial of Service via complex regular expressions Mozilla: Out of bounds write due to unexpected WebAuthN Extensions Mozilla: Use-after-free in DocumentL10n::TranslateDocument Mozilla: Incorrect AliasSet used in JIT Codegen Mozilla: iframe contents could be rendered outside the border Mozilla: Memory safety bugs fixed in Firefox 99 and Firefox ESR 91.8 | [
"cpe:/a:redhat:rhel_eus:8.2::appstream"
] | null | 8.8 | 6.1 | null |
RHSA-2023:7579 | Red Hat Security Advisory: postgresql:13 security update | postgresql: Memory disclosure in aggregate function calls postgresql: Buffer overrun from integer overflow in array modification postgresql: Role pg_signal_backend can signal certain superuser processes. postgresql: extension script @substitutions@ within quoting allow SQL injection | [
"cpe:/a:redhat:rhel_eus:8.8::appstream"
] | null | 7.5 | null | null |
RHSA-2023:0837 | Red Hat Security Advisory: systemd security and bug fix update | systemd: local information leak due to systemd-coredump not respecting fs.suid_dumpable kernel setting | [
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 5.5 | null | null |
RHSA-2023:2253 | Red Hat Security Advisory: buildah security and bug fix update | golang: crypto/tls: session tickets lack random ticket_age_add golang: net/http: excessive memory growth in a Go server accepting HTTP/2 requests | [
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 5.3 | null | null |
RHSA-2005:785 | Red Hat Security Advisory: firefox security update | security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw | [
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2014:0212 | Red Hat Security Advisory: Red Hat JBoss SOA Platform 5.3.1 update | Java: XML signature spoofing Framework: XML External Entity (XXE) injection flaw | [
"cpe:/a:redhat:jboss_enterprise_soa_platform:5.3"
] | null | null | null | null |
RHSA-2018:3803 | Red Hat Security Advisory: chromium-browser security update | chromium-browser: Out of bounds write in V8 chromium-browser: Use after frees in PDFium chromium-browser: Heap buffer overflow in Skia chromium-browser: Use after free in PDFium chromium-browser: Use after free in Blink chromium-browser: Heap buffer overflow in Canvas chromium-browser: Use after free in WebAudio chromium-browser: Use after free in MediaRecorder chromium-browser: Heap buffer overflow in Blink chromium-browser: Out of bounds write in V8 chromium-browser: Use after free in Skia chromium-browser: Inappropriate implementation in Extensions chromium-browser: Inappropriate implementation in Site Isolation chromium-browser: Incorrect security UI in Blink chromium-browser: Inappropriate implementation in Navigation chromium-browser: Inappropriate implementation in Omnibox chromium-browser: Insufficient policy enforcement in Blink chromium-browser: Insufficient policy enforcement in Blink chromium-browser: Insufficient policy enforcement in Navigation chromium-browser: Inappropriate implementation in Media chromium-browser: Inappropriate implementation in Network Authentication chromium-browser: Insufficient data validation in Shell Integration chromium-browser: Insufficient policy enforcement in URL Formatter mozilla: Use after free in Skia chromium-browser: Insufficient policy enforcement in URL Formatter chromium-browser: Insufficient policy enforcement in Proxy chromium-browser: Out of bounds read in V8 | [
"cpe:/a:redhat:rhel_extras:6"
] | null | null | 6.5 | null |
RHSA-2018:1737 | Red Hat Security Advisory: kernel security and bug fix update | kernel: netfilter: use-after-free in tcpmss_mangle_packet function in net/netfilter/xt_TCPMSS.c hw: cpu: speculative store bypass | [
"cpe:/o:redhat:rhel_eus:7.3::computenode",
"cpe:/o:redhat:rhel_eus:7.3::server"
] | null | null | 5.6 | null |
RHSA-2018:0044 | Red Hat Security Advisory: redhat-virtualization-host security update | An update for redhat-virtualization-host is now available for RHEV 3.X Hypervisor and Agents for RHEL-7.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. | [
"cpe:/o:redhat:enterprise_linux:7::hypervisor"
] | null | null | null | null |
RHBA-2025:2428 | Red Hat Bug Fix Advisory: microcode_ctl bug fix and enhancement update | microcode_ctl: Improper input validation in UEFI firmware microcode_ctl: Improper input validation in UEFI firmware microcode_ctl: Improper input validation in XmlCli feature for UEFI firmware microcode_ctl: Improper input validation in UEFI firmware microcode_ctl: Improper input validation in UEFI firmware CseVariableStorageSmm | [
"cpe:/o:redhat:rhel_aus:7.7::server"
] | null | 7.5 | null | null |
RHSA-2020:0726 | Red Hat Security Advisory: sudo security update | sudo: Stack based buffer overflow when pwfeedback is enabled | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | 7.8 | null | null |
RHSA-2023:4645 | Red Hat Security Advisory: .NET 6.0 security, bug fix, and enhancement update | dotnet: RCE under dotnet commands dotnet: Kestrel vulnerability to slow read attacks leading to Denial of Service attack | [
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb"
] | null | 7.5 | null | null |
RHSA-2007:0848 | Red Hat Security Advisory: openoffice.org security update | openoffice.org TIFF parsing heap overflow | [
"cpe:/a:redhat:rhel_productivity:5",
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws",
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws",
"cpe:/o:redhat:enterprise_linux:5::client"
] | null | null | null | null |
RHSA-2009:1116 | Red Hat Security Advisory: cyrus-imapd security update | cyrus-sasl: sasl_encode64() does not reliably null-terminate its output | [
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2020:0216 | Red Hat Security Advisory: Ansible security and bug fix update (2.8.8) | Ansible: vulnerability in solaris_zone module via crafted solaris zone Ansible: malicious code could craft filename in nxos_file_copy module | [
"cpe:/a:redhat:ansible_engine:2.8::el7",
"cpe:/a:redhat:ansible_engine:2.8::el8"
] | null | 5.6 | 7.3 | null |
RHSA-2012:1090 | Red Hat Security Advisory: nss and nspr security, bug fix, and enhancement update | nss: NSS parsing errors with zero length items | [
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2007:0539 | Red Hat Security Advisory: aide security update | Rebase aide to 0.13.1 | [
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2023:1598 | Red Hat Security Advisory: tigervnc security update | xorg-x11-server: X.Org Server Overlay Window Use-After-Free Local Privilege Escalation Vulnerability | [
"cpe:/a:redhat:rhel_eus:8.6::appstream"
] | null | 7.8 | null | null |
RHSA-2024:8132 | Red Hat Security Advisory: libuv security update | libuv: Improper Domain Lookup that potentially leads to SSRF attacks | [
"cpe:/a:redhat:rhel_eus:8.8::appstream",
"cpe:/a:redhat:rhel_eus:8.8::crb"
] | null | 7.3 | null | null |
RHSA-2008:0512 | Red Hat Security Advisory: XFree86 security update | X.org Record and Security extensions memory corruption X.org MIT-SHM extension arbitrary memory read X.org Render extension AllocateGlyph() heap buffer overflow | [
"cpe:/o:redhat:enterprise_linux:2.1::as",
"cpe:/o:redhat:enterprise_linux:2.1::aw",
"cpe:/o:redhat:enterprise_linux:2.1::es",
"cpe:/o:redhat:enterprise_linux:2.1::ws"
] | null | null | null | null |
RHSA-2005:785 | Red Hat Security Advisory: firefox security update | security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw | [
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2025:1083 | Red Hat Security Advisory: ovn22.03 security update | ovn: egress ACLs may be bypassed via specially crafted UDP packet | [
"cpe:/o:redhat:enterprise_linux:8::fastdatapath"
] | null | 8.1 | null | null |
RHSA-2021:0874 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.3.6 security update | guava: local information disclosure via temporary directory created with unsafe permissions Undertow: Incomplete fix for CVE-2017-2666 due to permitting invalid characters in HTTP requests bouncycastle: password bypass in OpenBSDBCrypt.checkPassword utility possible jboss-remoting: Threads hold up forever in the EJB server by suppressing the ack from an EJB client undertow: Possible regression in fix for CVE-2020-10687 wildfly: Information disclosure due to publicly accessible privileged actions in JBoss EJB Client | [
"cpe:/a:redhat:jboss_enterprise_application_platform:7.3::el8"
] | null | 4.3 | 4.8 | null |
RHSA-2021:3252 | Red Hat Security Advisory: python27 security update | python: Unsafe use of eval() on data retrieved via HTTP in the test suite python-jinja2: ReDoS vulnerability in the urlize filter python: Stack-based buffer overflow in PyCArg_repr in _ctypes/callproc.c python-babel: Relative path traversal allows attacker to load arbitrary locale files and execute arbitrary code python-pygments: Infinite loop in SML lexer may lead to DoS python: Web cache poisoning via urllib.parse.parse_qsl and urllib.parse.parse_qs by using a semicolon in query parameters python-pygments: ReDoS in multiple lexers python-babel: Relative path traversal allows attacker to load arbitrary locale files and execute arbitrary code | [
"cpe:/a:redhat:rhel_software_collections:3::el7"
] | null | 7.8 | null | null |
RHSA-2024:3834 | Red Hat Security Advisory: gdk-pixbuf2 security update | gnome: heap memory corruption on gdk-pixbuf | [
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 7.3 | null | null |
RHSA-2016:1473 | Red Hat Security Advisory: openstack-neutron security and bug fix update | openstack-neutron: ICMPv6 source address spoofing vulnerability openstack-neutron: DHCP spoofing vulnerability openstack-neutron: MAC source address spoofing vulnerability | [
"cpe:/a:redhat:openstack:8::el7"
] | null | null | 6.3 | null |
RHSA-2011:1800 | Red Hat Security Advisory: JBoss Enterprise Application Platform 5.1.2 update | Invoker servlets authentication bypass (HTTP verb tampering) extension): MITM due to improper validation of AX attribute signatures | [
"cpe:/a:redhat:jboss_enterprise_application_platform:5::el4"
] | null | null | null | null |
RHSA-2022:8853 | Red Hat Security Advisory: Red Hat OpenStack Platform 16.2.4 (python-django20) security update | django: Possible XSS via '{% debug %}' template tag django: Denial-of-service possibility in file uploads | [
"cpe:/a:redhat:openstack:16.2::el8"
] | null | 7.5 | null | null |
RHSA-2012:1512 | Red Hat Security Advisory: libxml2 security update | libxml2: Heap-buffer-underflow in xmlParseAttValueComplex | [
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server",
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2008:0529 | Red Hat Security Advisory: net-snmp security update | net-snmp SNMPv3 authentication bypass (VU#877044) net-snmp: buffer overflow in perl module's Perl Module __snprint_value() | [
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws",
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws",
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server",
"cpe:/o:redhat:rhel_eus:4.5::as",
"cpe:/o:redhat:rhel_eus:4.5::es"
] | null | null | null | null |
RHSA-2017:0065 | Red Hat Security Advisory: kernel security update | kernel: Use-after-free in the recvmmsg exit path | [
"cpe:/o:redhat:rhel_aus:6.5::server",
"cpe:/o:redhat:rhel_tus:6.5::server"
] | null | null | 8.1 | null |
RHSA-2022:1103 | Red Hat Security Advisory: kpatch-patch security update | kernel: Use After Free in unix_gc() which could result in a local privilege escalation kernel: fget: check that the fd still exists after getting a ref to it kernel: possible privileges escalation due to missing TLB flush kernel: failing usercopy allows for use-after-free exploitation | [
"cpe:/o:redhat:rhel_e4s:7.6::server"
] | null | 7 | null | null |
RHSA-2024:0757 | Red Hat Security Advisory: container-tools:4.0 security update | runc: file descriptor leak | [
"cpe:/a:redhat:rhel_eus:8.6::appstream"
] | null | 8.6 | null | null |
RHSA-2021:4723 | Red Hat Security Advisory: devtoolset-10-binutils security update | environment: Unicode's bidirectional (BiDi) override characters can cause trojan source attacks | [
"cpe:/a:redhat:rhel_software_collections:3::el7"
] | null | 8.5 | null | null |
RHSA-2020:2440 | Red Hat Security Advisory: OpenShift Container Platform 4.3.25 openshift security update | kubernetes: Server side request forgery (SSRF) in kube-controller-manager allows users to leak secret information | [
"cpe:/a:redhat:openshift:4.3::el7",
"cpe:/a:redhat:openshift:4.3::el8"
] | null | 6.3 | null | null |
RHSA-2024:0862 | Red Hat Security Advisory: gimp:2.8 security update | gimp: PSD buffer overflow RCE gimp: psp off-by-one RCE | [
"cpe:/a:redhat:rhel_eus:8.8::appstream"
] | null | 7.8 | null | null |
RHSA-2023:3923 | Red Hat Security Advisory: go-toolset and golang security update | golang: cmd/go: go command may generate unexpected code at build time when using cgo golang: runtime: unexpected behavior of setuid/setgid binaries golang: cmd/go: go command may execute arbitrary code at build time when using cgo golang: cmd/cgo: Arbitrary code execution triggered by linker flags | [
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 7.5 | null | null |
RHSA-2020:0798 | Red Hat Security Advisory: OpenShift Container Platform 3.11 openshift-enterprise-mediawiki-apb security update | openshift/mediawiki-apb: /etc/passwd is given incorrect privileges | [
"cpe:/a:redhat:openshift:3.11::el7"
] | null | 7 | null | null |
RHSA-2005:586 | Red Hat Security Advisory: firefox security update | security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw | [
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2014:0038 | Red Hat Security Advisory: Red Hat Enterprise Virtualization Manager 3.3.0 update | rhev: remote-viewer spice tls-stripping issue | [
"cpe:/a:redhat:rhev_manager:3"
] | null | null | null | null |
RHSA-2024:9502 | Red Hat Security Advisory: expat security update | libexpat: expat: DoS via XML_ResumeParser | [
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 5.9 | null | null |
RHSA-2024:0799 | Red Hat Security Advisory: Red Hat Single Sign-On 7.6.7 security update on RHEL 8 | guava: insecure temporary directory creation keycloak: reflected XSS via wildcard in OIDC redirect_uri keycloak: redirect_uri validation bypass keycloak: Log Injection during WebAuthn authentication or registration keycloak: open redirect via "form_post.jwt" JARM response mode jetty-server: OutOfMemoryError for large multipart without filename read via request.getParameter() jetty-server: Cookie parsing of quoted values can exfiltrate values from other cookies santuario: Private Key disclosure in debug-log output | [
"cpe:/a:redhat:red_hat_single_sign_on:7.6::el8"
] | null | 6.5 | null | null |
RHSA-2017:0936 | Red Hat Security Advisory: python-defusedxml and python-pysaml2 security update | python-pysaml2: Entity expansion issue | [
"cpe:/a:redhat:openstack:8::el7"
] | null | null | 5.3 | null |
RHSA-2014:0441 | Red Hat Security Advisory: Red Hat Enterprise MRG Messaging 2.5 security, bug fix, and enhancement update | cumin: weak password hashing | [
"cpe:/a:redhat:enterprise_mrg:2::el5"
] | null | null | null | null |
RHSA-2015:1044 | Red Hat Security Advisory: virtio-win security and bug fix update | virtio-win: netkvm: malformed packet can cause BSOD | [
"cpe:/a:redhat:rhel_extras:7"
] | null | null | null | null |
RHSA-2011:1304 | Red Hat Security Advisory: jbossws-common security update | JBossWS remote Denial of Service | [
"cpe:/a:redhat:jboss_enterprise_web_platform:5.1"
] | null | null | null | null |
RHSA-2016:0489 | Red Hat Security Advisory: Red Hat OpenShift Enterprise 2.2.9 security, bug fix, and enhancement update | ObjectMessage: unsafe deserialization jenkins: Project name disclosure via fingerprints (SECURITY-153) jenkins: Public value used for CSRF protection salt (SECURITY-169) jenkins: XXE injection into job configurations via CLI (SECURITY-173) jenkins: Secret key not verified when connecting a slave (SECURITY-184) jenkins: Information disclosure via sidepanel (SECURITY-192) jenkins: Local file inclusion vulnerability (SECURITY-195) jenkins: API tokens of other users available to admins (SECURITY-200) jenkins: Queue API did show items not visible to the current user (SECURITY-186) jenkins: JNLP slaves not subject to slave-to-master access control (SECURITY-206) jenkins: Stored XSS vulnerability in slave offline status message (SECURITY-214) jenkins: CSRF vulnerability in some administrative actions (SECURITY-225) jenkins: CSRF protection ineffective (SECURITY-233) jenkins: Jenkins plugin manager vulnerable to MITM attacks (SECURITY-234) jenkins: Remote code execution vulnerability due to unsafe deserialization in Jenkins remoting (SECURITY-218) | [
"cpe:/a:redhat:openshift:2.0::el6"
] | null | null | null | null |
RHSA-2016:2088 | Red Hat Security Advisory: java-1.8.0-oracle security update | OpenJDK: missing algorithm restrictions for jar verification (Libraries, 8155973) OpenJDK: insufficient classloader consistency checks in ClassLoaderWithRepository (JMX, 8157739) JDK: unspecified vulnerability fixed in 6u131, 7u121, and 8u111 (2D) OpenJDK: insufficient checks of JDWP packets (Hotspot, 8159519) OpenJDK: incomplete type checks of System.arraycopy arguments (Hotspot, 8160591) OpenJDK: exposure of server authentication credentials to proxy (Networking, 8160838) | [
"cpe:/a:redhat:rhel_extras_oracle_java:6",
"cpe:/a:redhat:rhel_extras_oracle_java:7"
] | null | null | 5.3 | null |
RHSA-2022:0239 | Red Hat Security Advisory: libreswan security update | libreswan: Malicious IKEv1 packet can cause libreswan to restart | [
"cpe:/a:redhat:rhel_eus:8.4::appstream"
] | null | 7.5 | null | null |
RHEA-2021:1441 | Red Hat Enhancement Advisory: rh-eclipse bug fix and enhancement update | eclipse: Help Subsystem does not authenticate active help requests | [
"cpe:/a:redhat:devtools:2021"
] | null | 7.8 | null | null |
RHSA-2024:1497 | Red Hat Security Advisory: thunderbird security update | nss: timing attack against RSA decryption Mozilla: Crash in NSS TLS method Mozilla: Leaking of encrypted email subjects to other conversations Mozilla: JIT code failed to save return registers on Armv7-A Mozilla: Integer overflow could have led to out of bounds write Mozilla: Improper handling of html and body tags enabled CSP nonce leakage Mozilla: Clickjacking vulnerability could have led to a user accidentally granting permissions Mozilla: Self referencing object could have potentially led to a use-after-free Mozilla: Memory safety bugs fixed in Firefox 124, Firefox ESR 115.9, and Thunderbird 115.9 | [
"cpe:/a:redhat:rhel_eus:8.6::appstream"
] | null | 7.5 | null | null |
RHSA-2021:0226 | Red Hat Security Advisory: sudo security update | sudo: Heap buffer overflow in argument parsing | [
"cpe:/o:redhat:rhel_aus:7.2::server"
] | null | 7.8 | null | null |
RHSA-2023:5390 | Red Hat Security Advisory: OpenShift Container Platform 4.12.36 bug fix and security update | distribution/distribution: DoS from malicious API request | [
"cpe:/a:redhat:openshift:4.12::el8"
] | null | 6.5 | null | null |
RHSA-2023:6938 | Red Hat Security Advisory: container-tools:4.0 security and bug fix update | go-yaml: Improve heuristics preventing CPU/memory abuse by parsing malicious or large YAML documents golang.org/x/net/http2: avoid quadratic complexity in HPACK decoding golang: crypto/tls: large handshake records may cause panics golang: net/http, mime/multipart: denial of service from excessive resource consumption golang.org/x/net/html: Cross site scripting golang: net/http, net/textproto: denial of service from excessive memory allocation golang: net/http, net/textproto, mime/multipart: denial of service from excessive resource consumption golang: go/parser: Infinite loop in parsing golang: html/template: backticks not treated as string delimiters golang: html/template: improper sanitization of CSS values golang: html/template: improper handling of JavaScript whitespace runc: Rootless runc makes `/sys/fs/cgroup` writable runc: volume mount race condition (regression of CVE-2019-19921) runc: AppArmor can be bypassed when `/proc` inside the container is symlinked with a specific mount configuration golang: html/template: improper handling of empty HTML attributes golang: net/http: insufficient sanitization of Host header | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 6.5 | null | null |
RHSA-2018:2165 | Red Hat Security Advisory: kernel-rt security, and enhancement update | kernel: Buffer over-read in keyring subsystem allows exposing potentially sensitive information to local attacker Kernel: FPU state information leakage via lazy FPU restore | [
"cpe:/a:redhat:enterprise_mrg:2:server:el6"
] | null | null | 5.6 | null |
RHSA-2024:3433 | Red Hat Security Advisory: protobuf security update | protobuf: Incorrect parsing of nullchar in the proto symbol leads to Nullptr dereference | [
"cpe:/a:redhat:rhel_eus:8.6::appstream",
"cpe:/a:redhat:rhel_eus:8.6::crb"
] | null | 7.5 | null | null |
RHSA-2019:0304 | Red Hat Security Advisory: docker security update | runc: Execution of malicious containers allows for container escape and access to host filesystem | [
"cpe:/a:redhat:rhel_extras_other:7"
] | null | null | 7.7 | null |
RHSA-2021:4702 | Red Hat Security Advisory: Satellite 6.10 Release | python-ecdsa: Unexpected and undocumented exceptions during signature decoding python-ecdsa: DER encoding is not being verified in signatures rubygem-activerecord-session_store: hijack sessions by using timing attacks targeting the session id rake: OS Command Injection via egrep in Rake::FileList guava: local information disclosure via temporary directory created with unsafe permissions PyYAML: incomplete fix for CVE-2020-1747 rubygem-nokogiri: XML external entity injection via Nokogiri::XML::Schema Satellite: Azure compute resource secret_key leak to authenticated users foreman: possible man-in-the-middle in smart_proxy realm_freeipa Satellite: BMC controller credential leak via API python-aiohttp: Open redirect in aiohttp.web_middlewares.normalize_path_middleware rubygem-actionpack: Possible Information Disclosure / Unintended Method Execution in Action Pack rails: Possible Denial of Service vulnerability in Action Dispatch rails: Possible DoS Vulnerability in Action Controller Token Authentication django: potential directory-traversal via uploaded files rubygem-puma: incomplete fix for CVE-2019-16770 allows Denial of Service (DoS) django: Potential directory-traversal via uploaded files rubygem-addressable: ReDoS in templates django: Potential directory traversal via ``admindocs`` python-urllib3: ReDoS in the parsing of authority part of URL django: Possible indeterminate SSRF, RFI, and LFI attacks since validators accepted leading zeros in IPv4 addresses | [
"cpe:/a:redhat:satellite:6.10::el7",
"cpe:/a:redhat:satellite_capsule:6.10::el7"
] | null | 7.5 | 7.4 | null |
RHSA-2003:117 | Red Hat Security Advisory: openssl security update for Stronghold | security flaw security flaw | [
"cpe:/a:redhat:stronghold:3"
] | null | null | null | null |
RHSA-2017:0893 | Red Hat Security Advisory: 389-ds-base security and bug fix update | 389-ds-base: Remote crash via crafted LDAP messages | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | 6.5 | null |
RHSA-2023:4377 | Red Hat Security Advisory: kernel security, bug fix, and enhancement update | kernel: KVM: x86/mmu: race condition in direct_page_fault() kernel: speculative pointer dereference in do_prlimit() in kernel/sys.c kernel: Spectre v2 SMT mitigations problem kernel: ipvlan: out-of-bounds write caused by unclear skb->cb kernel: cls_flower: out-of-bounds write in fl_set_geneve_opt() | [
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::crb",
"cpe:/o:redhat:enterprise_linux:9::baseos"
] | null | 7.8 | 5.6 | null |
RHSA-2024:1862 | Red Hat Security Advisory: Red Hat Single Sign-On 7.6.8 security update on RHEL 9 | keycloak: Log Injection during WebAuthn authentication or registration keycloak: Authorization Bypass keycloak: path transversal in redirection validation keycloak: org.keycloak.protocol.oidc: unvalidated cross-origin messages in checkLoginIframe leads to DDoS undertow: Out-of-memory Error after several closed connections with wildfly-http-client protocol | [
"cpe:/a:redhat:red_hat_single_sign_on:7.6::el9"
] | null | 7.5 | null | null |
RHSA-2017:3454 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.1.0 security update | Artemis: Deserialization of untrusted input vulnerability eap: HTTP header injection / response splitting EAP7 Privilege escalation when managing domain including earlier version slaves EAP7: Internal IP address disclosed on redirect when request header Host field is not set undertow: Long URL proxy request lead to java.nio.BufferOverflowException and DoS EAP: Sensitive data can be exposed at the server level in domain mode admin-cli: Potential EAP resource starvation DOS attack via GET requests for server log files jboss: jbossas: unsafe chown of server.log in jboss init script allows privilege escalation wildfly: ParseState headerValuesCache can be exploited to fill heap with garbage wildfly: Arbitrary file read via path traversal undertow: HTTP Request smuggling vulnerability due to permitting invalid characters in HTTP requests undertow: IO thread DoS via unclean Websocket closing jackson-databind: Deserialization vulnerability via readValue method of ObjectMapper hibernate-validator: Privilege escalation when running under the security manager undertow: HTTP Request smuggling vulnerability (incomplete fix of CVE-2017-2666) undertow: improper whitespace parsing leading to potential HTTP request smuggling EAP-7: Wrong privileges on multiple property files | [
"cpe:/a:redhat:jboss_enterprise_application_platform:7::el6"
] | null | null | 5.5 | null |
RHSA-2014:0455 | Red Hat Security Advisory: openstack-glance security update | openstack-glance: remote code execution in Glance Sheepdog backend | [
"cpe:/a:redhat:openstack:4::el6"
] | null | null | null | null |
RHSA-2023:3157 | Red Hat Security Advisory: Red Hat OpenStack Platform 17.0 security update | openstack-cinder: silently access other user's volumes | [
"cpe:/a:redhat:openstack:17.0::el9"
] | null | 9.1 | null | null |
RHSA-2023:7423 | Red Hat Security Advisory: kernel security update | hw: Intel: Gather Data Sampling (GDS) side channel vulnerability kernel: net/sched: sch_qfq component can be exploited if in qfq_change_agg function happens qfq_enqueue overhead kernel: net/sched: cls_fw component can be exploited as result of failure in tcf_change_indev function kernel: net/sched: Use-after-free vulnerabilities in the net/sched classifiers: cls_fw, cls_u32 and cls_route kernel: net/sched: Use-after-free vulnerabilities in the net/sched classifiers: cls_fw, cls_u32 and cls_route kernel: net/sched: Use-after-free vulnerabilities in the net/sched classifiers: cls_fw, cls_u32 and cls_route kernel: net/sched: Use-after-free vulnerabilities in the net/sched classifiers: cls_fw, cls_u32 and cls_route kernel: out-of-bounds write in qfq_change_class function | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 7 | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.