id
stringlengths 13
15
| title
stringlengths 29
176
| description
stringlengths 8
31.7k
| cpes
sequencelengths 0
20
| cvss_v4_0
null | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
null |
---|---|---|---|---|---|---|---|
RHSA-2025:2452 | Red Hat Security Advisory: firefox security update | firefox: AudioIPC StreamData could trigger a use-after-free in the Browser process firefox: Use-after-free in WebTransportChild firefox: Inconsistent comparator in XSLT sorting led to out-of-bounds access firefox: JIT corruption of WASM i32 return values on 64-bit CPUs firefox: Unexpected GC during RegExp bailout processing firefox: Clickjacking the registerProtocolHandler info-bar Reporter firefox: Adding %00 and a fake extension to a jar: URL changed the interpretation of the contents firefox: thunderbird: Memory safety bugs fixed in Firefox 136, Thunderbird 136, Firefox ESR 115.21, Firefox ESR 128.8, and Thunderbird 128.8 firefox: thunderbird: Memory safety bugs fixed in Firefox 136, Thunderbird 136, Firefox ESR 128.8, and Thunderbird 128.8 | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 8.8 | null | null |
RHSA-2024:4884 | Red Hat Security Advisory: Red Hat Build of Apache Camel 4.4.1 for Spring Boot security update. | mvel: TimeOut error when calling ParseTools.subCompileExpression() function io.vertx/vertx-core: memory leak due to the use of Netty FastThreadLocal data structures in Vertx io.vertx:vertx-core: memory leak when a TCP server is configured with TLS and SNI support pgjdbc: PostgreSQL JDBC Driver allows attacker to inject SQL if using PreferQueryMode=SIMPLE undertow: response write hangs in case of Java 17 TLSv1.3 NewSessionTicket undertow: url-encoded request path information can be broken on ajp-listener jetty: stop accepting new connections from valid clients threetenbp: null pointer exception org.bouncycastle: Importing an EC certificate with crafted F2m parameters may lead to Denial of Service bc-java: BouncyCastle vulnerable to a timing variant of Bleichenbacher (Marvin Attack) org.bouncycastle:bcprov-jdk18on: Infinite loop in ED25519 verification in the ScalarUtil class | [
"cpe:/a:redhat:apache_camel_spring_boot:4.4.1"
] | null | 7.5 | null | null |
RHSA-2024:5522 | Red Hat Security Advisory: kpatch-patch-4_18_0-553 security update | kernel: TIPC message reassembly use-after-free remote code execution vulnerability kernel: net: kernel: UAF in network route management | [
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 7.8 | null | null |
RHSA-2024:1474 | Red Hat Security Advisory: logging for Red Hat OpenShift security update | golang-protobuf: encoding/protojson, internal/encoding/json: infinite loop in protojson.Unmarshal when unmarshaling certain forms of invalid JSON follow-redirects: Possible credential leak | [
"cpe:/a:redhat:logging:5.8::el9"
] | null | 6.5 | null | null |
RHSA-2023:6882 | Red Hat Security Advisory: squid34 security update | squid: Denial of Service in HTTP Digest Authentication | [
"cpe:/o:redhat:rhel_els:6"
] | null | 8.6 | null | null |
RHSA-2023:1370 | Red Hat Security Advisory: nss security update | nss: Arbitrary memory write via PKCS 12 | [
"cpe:/a:redhat:rhel_eus:8.4::appstream"
] | null | 8.8 | null | null |
RHSA-2017:2678 | Red Hat Security Advisory: rh-postgresql94-postgresql security update | postgresql: Empty password accepted in some authentication methods postgresql: pg_user_mappings view discloses passwords to users lacking server privileges postgresql: lo_put() function ignores ACLs | [
"cpe:/a:redhat:rhel_software_collections:2::el6",
"cpe:/a:redhat:rhel_software_collections:2::el7"
] | null | null | 5.4 | null |
RHSA-2017:0270 | Red Hat Security Advisory: kernel security and bug fix update | kernel: Use-after-free in the recvmmsg exit path | [
"cpe:/o:redhat:rhel_eus:7.1::computenode",
"cpe:/o:redhat:rhel_eus:7.1::server"
] | null | null | 8.1 | null |
RHSA-2019:2779 | Red Hat Security Advisory: qpid-proton security update | qpid-proton: TLS Man in the Middle Vulnerability | [
"cpe:/a:redhat:satellite:6.3::el7",
"cpe:/a:redhat:satellite_capsule:6.3::el7"
] | null | null | 7.4 | null |
RHSA-2006:0578 | Red Hat Security Advisory: seamonkey security update (was mozilla) | security flaw security flaw security flaw security flaw (seamonkey): DOS/arbitrary code execution vuln with vcards security flaw security flaw security flaw security flaw security flaw security flaw security flaw | [
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws"
] | null | null | null | null |
RHSA-2016:0429 | Red Hat Security Advisory: chromium-browser security update | chromium-browser: type confusion in Blink chromium-browser: use-after-free in Blink chromium-browser: out-of-bounds write in PDFium | [
"cpe:/a:redhat:rhel_extras:6"
] | null | null | null | null |
RHBA-2014:1206 | Red Hat Bug Fix Advisory: virt-who bug fix and enhancement update | virt-who: plaintext hypervisor passwords in world-readable /etc/sysconfig/virt-who configuration file | [
"cpe:/a:redhat:rhel_virtualization:5::client",
"cpe:/a:redhat:rhel_virtualization:5::server"
] | null | null | null | null |
RHSA-2025:2034 | Red Hat Security Advisory: webkit2gtk3 security update | webkitgtk: Processing maliciously crafted web content may lead to memory corruption webkitgtk: A maliciously crafted webpage may be able to fingerprint the user webkitgtk: Copying a URL from Web Inspector may lead to command injection webkitgtk: Processing web content may lead to a denial-of-service webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 8.8 | null | null |
RHSA-2023:4173 | Red Hat Security Advisory: java-1.8.0-openjdk security update | OpenJDK: array indexing integer overflow issue (8304468) OpenJDK: improper handling of slash characters in URI-to-path conversion (8305312) | [
"cpe:/a:redhat:rhel_eus:8.6::appstream",
"cpe:/a:redhat:rhel_eus:8.6::crb"
] | null | 3.7 | null | null |
RHSA-2024:8700 | Red Hat Security Advisory: OpenShift Container Platform 4.14.40 packages and security update | buildah: Buildah allows arbitrary directory mount Podman: Buildah: CRI-O: symlink traversal vulnerability in the containers/storage library can cause Denial of Service (DoS) go/parser: golang: Calling any of the Parse functions containing deeply nested literals can cause a panic/stack exhaustion encoding/gob: golang: Calling Decoder.Decode on a message which contains deeply nested structures can cause a panic due to stack exhaustion go/build/constraint: golang: Calling Parse on a "// +build" build tag line with deeply nested expressions can cause a panic due to stack exhaustion | [
"cpe:/a:redhat:openshift:4.14::el8",
"cpe:/a:redhat:openshift:4.14::el9"
] | null | 5.9 | null | null |
RHBA-2020:5310 | Red Hat Bug Fix Advisory: openvswitch2.13 bug fix and enhancement update | lldpd: buffer overflow in the lldp_decode function in daemon/protocols/lldp.c | [
"cpe:/o:redhat:enterprise_linux:8::fastdatapath"
] | null | 9.8 | null | null |
RHSA-2024:10836 | Red Hat Security Advisory: python-tornado security update | python-tornado: Tornado has HTTP cookie parsing DoS vulnerability | [
"cpe:/a:redhat:rhel_eus:9.2::appstream"
] | null | 7.5 | null | null |
RHSA-2018:2172 | Red Hat Security Advisory: kernel security update | kernel: Divide-by-zero in __tcp_select_window hw: cpu: speculative store bypass | [
"cpe:/o:redhat:rhel_els:5"
] | null | null | 5.6 | null |
RHSA-2005:387 | Red Hat Security Advisory: cvs security update | security flaw | [
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws",
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2015:2500 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 6.4 security update | apache-commons-collections: InvokerTransformer code execution during deserialisation | [
"cpe:/a:redhat:jboss_enterprise_application_platform:6::el5",
"cpe:/a:redhat:jboss_enterprise_application_platform:6::el6",
"cpe:/a:redhat:jboss_enterprise_application_platform:6::el7"
] | null | null | null | null |
RHSA-2016:1634 | Red Hat Security Advisory: CFME 5.6.1 security, bug fix, and enhancement update | CloudForms: Lack of field filters on user input | [
"cpe:/a:redhat:cloudforms_managementengine:5.6::el7"
] | null | null | 7.7 | null |
RHSA-2007:0938 | Red Hat Security Advisory: kernel security update | x86_64 syscall vulnerability | [
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws"
] | null | null | null | null |
RHSA-2024:1554 | Red Hat Security Advisory: .NET 6.0 security update | dotnet: Denial of Service in X509Certificate2 | [
"cpe:/a:redhat:rhel_eus:8.6::appstream",
"cpe:/a:redhat:rhel_eus:8.6::crb"
] | null | 7.5 | null | null |
RHSA-2024:2580 | Red Hat Security Advisory: yajl security update | yajl: Memory leak in yajl_tree_parse function | [
"cpe:/a:redhat:rhel_eus:8.8::appstream",
"cpe:/a:redhat:rhel_eus:8.8::crb"
] | null | 6.5 | null | null |
RHSA-2023:1903 | Red Hat Security Advisory: OpenJDK 8u372 Security Update for Portable Linux Builds | OpenJDK: improper connection handling during TLS handshake (8294474) OpenJDK: missing string checks for NULL characters (8296622) OpenJDK: incorrect handling of NULL characters in ProcessBuilder (8295304) OpenJDK: Swing HTML parsing issue (8296832) OpenJDK: incorrect enqueue of references in garbage collector (8298191) OpenJDK: certificate validation issue in TLS session negotiation (8298310) OpenJDK: missing check for slash characters in URI-to-path conversion (8298667) | [
"cpe:/a:redhat:openjdk:1.8"
] | null | 3.7 | null | null |
RHSA-2006:0207 | Red Hat Security Advisory: gnutls security update | - libtasn1 buffer overflow | [
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2025:0715 | Red Hat Security Advisory: Red Hat OpenShift Builds 1.1 | golang.org/x/net/html: Non-linear parsing of case-insensitive content in golang.org/x/net/html go-git: argument injection via the URL field | [
"cpe:/a:redhat:openshift_builds:1.1::el9"
] | null | 8.1 | null | null |
RHSA-2022:6787 | Red Hat Security Advisory: Red Hat Single Sign-On 7.5.3 security update | jackson-databind: denial of service via a large depth of nested objects h2: Remote Code Execution in Console netty: control chars in header names may lead to HTTP request smuggling xnio: org.xnio.StreamConnection.notifyReadClosed log to debug instead of stderr keycloak: Stored XSS in groups dropdown wildfly: Wildfly management of EJB Session context returns wrong caller principal with Elytron Security enabled keycloak: improper input validation permits script injection keycloak: Uploading of SAML javascript protocol mapper scripts through the admin console | [
"cpe:/a:redhat:red_hat_single_sign_on:7"
] | null | 6.4 | null | null |
RHSA-2022:0132 | Red Hat Security Advisory: firefox security update | Mozilla: Iframe sandbox bypass with XSLT Mozilla: Race condition when playing audio files Mozilla: Heap-buffer-overflow in blendGaussianBlur Mozilla: Missing throttling on external protocol launch dialog Mozilla: Use-after-free of ChannelEventQueue::mOwner Mozilla: Browser window spoof using fullscreen mode Mozilla: Out-of-bounds memory access when inserting text in edit mode Mozilla: Browser window spoof using fullscreen mode Mozilla: Leaking cross-origin URLs through securitypolicyviolation event Mozilla: Crash when handling empty pkcs7 sequence Mozilla: Spoofed origin on external protocol launch dialog Mozilla: Memory safety bugs fixed in Firefox 96 and Firefox ESR 91.5 | [
"cpe:/a:redhat:rhel_eus:8.2::appstream"
] | null | 8.8 | 6.1 | null |
RHSA-2021:0704 | Red Hat Security Advisory: grub2 security update | grub2: acpi command allows privileged user to load crafted ACPI tables when Secure Boot is enabled grub2: Use-after-free in rmmod command grub2: Out-of-bounds write in grub_usb_device_initialize() grub2: Stack buffer overflow in grub_parser_split_cmdline() grub2: cutmem command allows privileged user to remove memory regions when Secure Boot is enabled grub2: Heap out-of-bounds write in short form option parser grub2: Heap out-of-bounds write due to miscalculation of space required for quoting | [
"cpe:/o:redhat:rhel_aus:7.2::server"
] | null | 7.5 | null | null |
RHSA-2024:7213 | Red Hat Security Advisory: Updated service-interconnect rhel9 container images for 1.4 LTS | curl: HTTP/2 push headers memory-leak openssl: Possible denial of service in X.509 name checks pypa/setuptools: Remote code execution via download functions in the package_index module in pypa/setuptools cpython: python: email module doesn't properly quotes newlines in email headers, allowing header injection glib2: Signal subscription vulnerabilities krb5: GSS message token handling krb5: GSS message token handling libexpat: Negative Length Parsing Vulnerability in libexpat libexpat: Integer Overflow or Wraparound libexpat: integer overflow | [
"cpe:/a:redhat:service_interconnect:1.4::el9"
] | null | 6.2 | null | null |
RHSA-2023:2138 | Red Hat Security Advisory: OpenShift Container Platform 4.13.0 CNF vRAN extras security update | vault: GCP Auth Method Allows Authentication Bypass vault: incorrect policy enforcement | [
"cpe:/a:redhat:openshift:4.13::el8"
] | null | 6.5 | null | null |
RHSA-2003:002 | Red Hat Security Advisory: : Updated KDE packages fix security issues | security flaw security flaw | [
"cpe:/o:redhat:linux:7.1",
"cpe:/o:redhat:linux:7.2",
"cpe:/o:redhat:linux:7.3",
"cpe:/o:redhat:linux:8.0",
"cpe:/o:redhat:linux:9"
] | null | null | null | null |
RHSA-2019:2818 | Red Hat Security Advisory: OpenShift Container Platform 3.11 security update | openshift-ansible: dockergc service account incorrectly associated with namespace during upgrade | [
"cpe:/a:redhat:openshift:3.11::el7"
] | null | null | 7.5 | null |
RHSA-2021:0488 | Red Hat Security Advisory: Red Hat JBoss Core Services Apache HTTP Server 2.4.37 SP6 security update | openssl: EDIPARTYNAME NULL pointer de-reference | [
"cpe:/a:redhat:jboss_core_services:1"
] | null | 5.9 | null | null |
RHSA-2014:1882 | Red Hat Security Advisory: java-1.7.0-ibm security update | JDK: privilege escalation via shared class cache SSL/TLS: Padding Oracle On Downgraded Legacy Encryption attack JDK: unspecified vulnerability fixed in 6u85, 7u71 and 8u25 (Deployment) JDK: unspecified vulnerability fixed in 7u71 and 8u25 (Deployment) OpenJDK: Triple Handshake attack against TLS/SSL connections (JSSE, 8037066) JDK: unspecified vulnerability fixed in 6u85, 7u71 and 8u25 (Deployment) JDK: unspecified vulnerability fixed in 7u71 and 8u25 (Deployment) JDK: unspecified vulnerability fixed in 6u85, 7u71 and 8u25 (Deployment) JDK: unspecified vulnerability fixed in 6u85, 7u71 and 8u25 (Deployment) OpenJDK: LogRecord use of incorrect CL when loading ResourceBundle (Libraries, 8042797) JDK: unspecified vulnerability fixed in 6u85, 7u71 and 8u25 (Deployment) OpenJDK: insufficient permission checks when setting resource bundle on system logger (Libraries, 8041564) ICU: Layout Engine ContextualSubstitution missing boundary checks (JDK 2D, 8041540) OpenJDK: DatagramSocket connected socket missing source check (Libraries, 8039509) JDK: unspecified vulnerability fixed in 6u85, 7u71 and 8u25 (Deployment) JDK: unspecified vulnerability fixed in 7u71 and 8u25 (Deployment) OpenJDK: insufficient ResourceBundle name check (Libraries, 8044274) JDK: unspecified vulnerability fixed in 6u85, 7u71 and 8u25 (Deployment) OpenJDK: CipherInputStream incorrect exception handling (Security, 8037846) | [
"cpe:/a:redhat:rhel_extras:6"
] | null | null | null | null |
RHSA-2022:1070 | Red Hat Security Advisory: expat security update | expat: Malformed 2- and 3-byte UTF-8 sequences can lead to arbitrary code execution expat: Namespace-separator characters in "xmlns[:prefix]" attribute values can lead to arbitrary code execution expat: Integer overflow in storeRawNames() | [
"cpe:/o:redhat:rhel_eus:8.2::baseos"
] | null | 9.8 | null | null |
RHSA-2018:3600 | Red Hat Security Advisory: python-cryptography security update | python-cryptography: GCM tag forgery via truncated tag in finalize_with_tag API | [
"cpe:/a:redhat:openstack:13::el7"
] | null | null | 7.5 | null |
RHSA-2011:1240 | Red Hat Security Advisory: Red Hat Enterprise Linux 4 - 6-Month End Of Life Notice | This is the 6-month notification of the End Of Life plans for Red Hat
Enterprise Linux 4. | [
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHBA-2022:5747 | Red Hat Bug Fix Advisory: .NET 6.0 bugfix update | eventsource: Exposure of Sensitive Information | [
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb"
] | null | 9.3 | null | null |
RHSA-2024:7421 | Red Hat Security Advisory: python-gevent security update | python-gevent: privilege escalation via a crafted script to the WSGIServer component | [
"cpe:/a:redhat:rhel_aus:8.6::appstream",
"cpe:/a:redhat:rhel_e4s:8.6::appstream",
"cpe:/a:redhat:rhel_tus:8.6::appstream"
] | null | 9.1 | null | null |
RHSA-2015:0938 | Red Hat Security Advisory: openstack-glance security and bug fix update | openstack-glance: potential resource exhaustion and denial of service using images manipulation API openstack-glance: potential resource exhaustion and denial of service using images manipulation API | [
"cpe:/a:redhat:openstack:6::el7"
] | null | null | null | null |
RHSA-2020:4999 | Red Hat Security Advisory: unixODBC security update | unixODBC: Buffer overflow in unicode_to_ansi_copy() can lead to crash or other unspecified impact unixODBC: Insecure buffer copy in SQLWriteFileDSN function in odbcinst/SQLWriteFileDSN.c | [
"cpe:/o:redhat:rhel_eus:7.6::computenode",
"cpe:/o:redhat:rhel_eus:7.6::server"
] | null | null | 6.8 | null |
RHSA-2020:0697 | Red Hat Security Advisory: OpenShift Container Platform 4.1.38 skopeo security update | proglottis/gpgme: Use-after-free in GPGME bindings during container image pull | [
"cpe:/a:redhat:openshift:4.1::el8"
] | null | 7.5 | null | null |
RHSA-2004:009 | Red Hat Security Advisory: elm security update | security flaw | [
"cpe:/o:redhat:enterprise_linux:2.1::as",
"cpe:/o:redhat:enterprise_linux:2.1::aw"
] | null | null | null | null |
RHSA-2024:2045 | Red Hat Security Advisory: unbound security update | unbound: NRDelegation attack leads to uncontrolled resource consumption (Non-Responsive Delegation Attack) unbound: novel ghost domain attack that allows attackers to trigger continued resolvability of malicious domain names unbound: novel ghost domain attack that allows attackers to trigger continued resolvability of malicious domain names | [
"cpe:/a:redhat:rhel_eus:8.6::appstream"
] | null | 6.5 | null | null |
RHSA-2023:6276 | Red Hat Security Advisory: OpenShift Container Platform 4.12.42 bug fix and security update | golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487) | [
"cpe:/a:redhat:openshift:4.12::el8",
"cpe:/a:redhat:openshift:4.12::el9"
] | null | 7.5 | null | null |
RHSA-2024:8717 | Red Hat Security Advisory: Satellite 6.13.7.3 Async Update | foreman: Read-only access to entire DB from templates | [
"cpe:/a:redhat:satellite:6.13::el8",
"cpe:/a:redhat:satellite_capsule:6.13::el8",
"cpe:/a:redhat:satellite_maintenance:6.13::el8",
"cpe:/a:redhat:satellite_utils:6.13::el8"
] | null | 6.3 | null | null |
RHSA-2023:4383 | Red Hat Security Advisory: openssh security update | openssh: Remote code execution in ssh-agent PKCS#11 support | [
"cpe:/a:redhat:rhel_e4s:8.1::appstream",
"cpe:/o:redhat:rhel_e4s:8.1::baseos"
] | null | 9.8 | null | null |
RHSA-2022:5809 | Red Hat Security Advisory: pcre2 security update | pcre2: Out-of-bounds read in compile_xclass_matchingpath in pcre2_jit_compile.c | [
"cpe:/a:redhat:enterprise_linux:8::crb",
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 7.5 | null | null |
RHSA-2020:2379 | Red Hat Security Advisory: firefox security update | Mozilla: Use-after-free in SharedWorkerService Mozilla: JavaScript Type confusion with NativeTypes Mozilla: Memory safety bugs fixed in Firefox 77 and Firefox ESR 68.9 | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 8.8 | null | null |
RHSA-2025:0012 | Red Hat Security Advisory: python-requests security update | requests: subsequent requests to the same host ignore cert verification | [
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 5.6 | null | null |
RHSA-2013:1024 | Red Hat Security Advisory: Red Hat Enterprise MRG Messaging 2.3.3 security update | python-qpid: client does not validate qpid server TLS/SSL certificate | [
"cpe:/a:redhat:enterprise_mrg:2:computenode:el6",
"cpe:/a:redhat:enterprise_mrg:2:server:el6"
] | null | null | null | null |
RHSA-2021:2121 | Red Hat Security Advisory: OpenShift Container Platform 4.7.13 bug fix and security update | gogo/protobuf: plugin/unmarshal/unmarshal.go lacks certain index validation | [
"cpe:/a:redhat:openshift:4.7::el8"
] | null | 8.6 | null | null |
RHSA-2022:0477 | Red Hat Security Advisory: Red Hat OpenShift GitOps security update | gitops: Path traversal and dereference of symlinks when passing Helm value files | [
"cpe:/a:redhat:openshift_gitops:1.4::el8"
] | null | 7.7 | null | null |
RHSA-2024:6845 | Red Hat Security Advisory: edk2 security update | edk2: Buffer overflow when handling Server ID option from a DHCPv6 proxy Advertise message | [
"cpe:/a:redhat:rhel_eus:8.8::appstream"
] | null | 8.8 | null | null |
RHSA-2024:0456 | Red Hat Security Advisory: grub2 security update | grub2: bypass the GRUB password protection feature | [
"cpe:/o:redhat:rhel_eus:9.2::baseos"
] | null | 6.8 | null | null |
RHSA-2024:1908 | Red Hat Security Advisory: firefox security update | Mozilla: Permission prompt input delay could expire when not in focus Mozilla: Denial of Service using HTTP/2 CONTINUATION frames Mozilla: GetBoundName in the JIT returned the wrong object Mozilla: Out-of-bounds-read after mis-optimized switch statement Mozilla: Incorrect JITting of arguments led to use-after-free during garbage collection Mozilla: Integer-overflow led to out-of-bounds-read in the OpenType sanitizer Mozilla: Potential use-after-free due to AlignedBuffer self-move Mozilla: Memory safety bug fixed in Firefox 125, Firefox ESR 115.10, and Thunderbird 115.10 | [
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 7.5 | null | null |
RHSA-2022:8761 | Red Hat Security Advisory: Red Hat support for Spring Boot 2.7.2 update | reactor-netty: specific redirect configuration allows for a credentials leak kubernetes-client: Insecure deserialization in unmarshalYaml method protobuf-java: potential DoS in the parsing procedure for binary data undertow: potential security issue in flow control over HTTP/2 may lead to DOS(incomplete fix for CVE-2021-3629) undertow: Double AJP response for 400 from EAP 7 results in CPING failures spring-expression: Denial of service via specially crafted SpEL expression | [
"cpe:/a:redhat:openshift_application_runtimes:1.0"
] | null | 7.5 | null | null |
RHSA-2022:6996 | Red Hat Security Advisory: thunderbird security update | expat: a use-after-free in the doContent function in xmlparse.c | [
"cpe:/a:redhat:rhel_eus:8.2::appstream"
] | null | 8.1 | null | null |
RHSA-2024:3968 | Red Hat Security Advisory: container-tools:rhel8 bug fix and enhancement update | jose: resource exhaustion jose-go: improper handling of highly compressed data | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 4.3 | null | null |
RHSA-2017:0847 | Red Hat Security Advisory: curl security update | curl: negotiate not treated as connection-oriented (incomplete fix for CVE-2015-3148) | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | 4.8 | null |
RHSA-2019:2936 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.2.4 on RHEL 7 security update | undertow: Information leak in requests for directories without trailing slashes codehaus: incomplete fix for unsafe deserialization in jackson-databind vulnerabilities undertow: DEBUG log for io.undertow.request.security if enabled leaks credentials to log files jackson-databind: polymorphic typing issue allows attacker to read arbitrary local files on the server. jackson-databind: failure to block the logback-core class from polymorphic deserialization leading to remote code execution jackson-databind: polymorphic typing issue allows attacker to read arbitrary local files on the server via crafted JSON message. jackson-databind: default typing mishandling leading to remote code execution | [
"cpe:/a:redhat:jboss_enterprise_application_platform:7.2::el7"
] | null | null | 9.8 | null |
RHSA-2022:6763 | Red Hat Security Advisory: bind security update | bind: BIND 9 resolvers configured to answer from cache with zero stale-answer-timeout may terminate unexpectedly bind: memory leak in ECDSA DNSSEC verification code bind: memory leaks in EdDSA DNSSEC verification code | [
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::crb"
] | null | 7.5 | null | null |
RHSA-2013:0806 | Red Hat Security Advisory: openstack-keystone security and bug fix update | keystone: DEBUG level LDAP password disclosure in log files | [
"cpe:/a:redhat:openstack:2::el6"
] | null | null | null | null |
RHSA-2013:1011 | Red Hat Security Advisory: Red Hat JBoss Web Server 2.0.1 update | httpd: multiple XSS flaws due to unescaped hostnames tomcat: Limited DoS in chunked transfer encoding input filter httpd: XSS flaw in mod_proxy_balancer manager interface tomcat: Session fixation in form authenticator tomcat: Information disclosure in asynchronous context when using AsyncListeners that threw RuntimeExceptions | [
"cpe:/a:redhat:jboss_enterprise_web_server:2::el5"
] | null | null | null | null |
RHSA-2024:6240 | Red Hat Security Advisory: python-urllib3 security update | urllib3: proxy-authorization request header is not stripped during cross-origin redirects | [
"cpe:/o:redhat:rhel_eus:9.2::baseos"
] | null | 4.4 | null | null |
RHSA-2020:5483 | Red Hat Security Advisory: gnutls security and bug fix update | gnutls: Heap buffer overflow in handshake with no_renegotiation alert sent | [
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 7.5 | null | null |
RHSA-2013:1090 | Red Hat Security Advisory: ruby security update | ruby: hostname check bypassing vulnerability in SSL client | [
"cpe:/o:redhat:enterprise_linux:5::server",
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2023:3158 | Red Hat Security Advisory: Red Hat OpenStack Platform 16.2 security update | openstack-cinder: silently access other user's volumes | [
"cpe:/a:redhat:openstack:16.2::el8"
] | null | 9.1 | null | null |
RHSA-2017:0631 | Red Hat Security Advisory: wireshark security and bug fix update | wireshark: DoS (crash) in the GMR-1 BCCH dissector (wnpa-sec-2013-33) wireshark: WCP dissector crash (wnpa-sec-2015-14) wireshark: X11 memory leak (wnpa-sec-2015-15) wireshark: Reassembly memory leak (wnpa-sec-2015-16) | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2024:1426 | Red Hat Security Advisory: postgresql security update | postgresql: non-owner 'REFRESH MATERIALIZED VIEW CONCURRENTLY' executes arbitrary SQL | [
"cpe:/a:redhat:rhel_eus:8.8::appstream"
] | null | 8 | null | null |
RHSA-2024:1433 | Red Hat Security Advisory: Migration Toolkit for Applications security and bug fix update | golang: go/parser: stack exhaustion in all Parse* functions | [
"cpe:/a:redhat:migration_toolkit_applications:7.0::el8",
"cpe:/a:redhat:migration_toolkit_applications:7.0::el9"
] | null | 5.5 | null | null |
RHSA-2019:2196 | Red Hat Security Advisory: zziplib security update | zziplib: Bus error caused by loading of a misaligned address inzzip/zip.c zziplib: Memory leak triggered in the function __zzip_parse_root_directory in zip.c | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 4 | null |
RHSA-2019:3143 | Red Hat Security Advisory: OpenShift Container Platform 3.11 atomic-openshift security update | atomic-openshift: OpenShift builds don't verify SSH Host Keys for the git repository | [
"cpe:/a:redhat:openshift:3.11::el7"
] | null | null | 5.9 | null |
RHSA-2024:2517 | Red Hat Security Advisory: wpa_supplicant security update | wpa_supplicant: potential authorization bypass | [
"cpe:/o:redhat:enterprise_linux:9::baseos"
] | null | 6.5 | null | null |
RHSA-2005:799 | Red Hat Security Advisory: ruby security update | security flaw | [
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws",
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2005:383 | Red Hat Security Advisory: firefox security update | security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw | [
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2024:4910 | Red Hat Security Advisory: openssh security update | openssh: Possible remote code execution due to a race condition in signal handling affecting Red Hat Enterprise Linux 9 | [
"cpe:/a:redhat:rhel_e4s:9.0::appstream",
"cpe:/o:redhat:rhel_e4s:9.0::baseos"
] | null | 7 | null | null |
RHSA-2020:2758 | Red Hat Security Advisory: microcode_ctl security, bug fix and enhancement update | hw: Special Register Buffer Data Sampling (SRBDS) hw: Vector Register Data Sampling hw: L1D Cache Eviction Sampling | [
"cpe:/o:redhat:rhel_eus:7.7::computenode",
"cpe:/o:redhat:rhel_eus:7.7::server"
] | null | 6.5 | 6.5 | null |
RHSA-2021:1544 | Red Hat Security Advisory: Red Hat OpenShift Service Mesh 2.0.4 security update | kiali/kiali-operator: can deploy specified image to any namespace | [
"cpe:/a:redhat:service_mesh:2.0::el8"
] | null | 8.8 | null | null |
RHSA-2019:3901 | Red Hat Security Advisory: Red Hat OpenShift Application Runtimes Vert.x 3.8.3 security update | infinispan: invokeAccessibly method from ReflectionUtil class allows to invoke private methods jackson-databind: failure to block the logback-core class from polymorphic deserialization leading to remote code execution jackson-databind: default typing mishandling leading to remote code execution netty: HTTP request smuggling by mishandled whitespace before the colon in HTTP headers jackson-databind: Serialization gadgets in org.apache.commons.dbcp.datasources.* jackson-databind: Serialization gadgets in com.p6spy.engine.spy.P6DataSource jackson-databind: Serialization gadgets in classes of the ehcache package | [
"cpe:/a:redhat:openshift_application_runtimes:1.0"
] | null | null | 7.5 | null |
RHSA-2009:1647 | Red Hat Security Advisory: java-1.5.0-ibm security update | java-1.6.0-sun: Stack-based buffer overflow via a long file: URL argument (6854303) java-1.6.0-sun: Privilege escalation via crafted image file due improper color profiles parsing (6862970) OpenJDK JRE AWT setDifflCM stack overflow (6872357) OpenJDK JRE AWT setBytePixels heap overflow (6872358) JRE JPEG JFIF Decoder issue (6862969) OpenJDK JPEG Image Writer quantization problem (6862968) OpenJDK ImageI/O JPEG heap overflow (6874643) OpenJDK MessageDigest.isEqual introduces timing attack vulnerabilities (6863503) OpenJDK ASN.1/DER input stream parser denial of service (6864911) CVE-2009-3877 OpenJDK ASN.1/DER input stream parser denial of service (6864911) CVE-2009-3877 | [
"cpe:/a:redhat:rhel_extras:4",
"cpe:/a:redhat:rhel_extras:5::client",
"cpe:/a:redhat:rhel_extras:5::server"
] | null | null | null | null |
RHSA-2018:2282 | Red Hat Security Advisory: chromium-browser security update | chromium-browser: Cross origin information leak in Blink chromium-browser: Cross origin information disclosure in Service Workers chromium-browser: Bad cast in DevTools chromium-browser: Local file write in DevTools chromium-browser: Stack buffer overflow in Skia chromium-browser: Heap buffer overflow in WebGL chromium-browser: Use after free in WebRTC chromium-browser: Heap buffer overflow in WebRTC chromium-browser: Type confusion in WebRTC chromium-browser: Use after free in Blink chromium-browser: Same origin policy bypass in ServiceWorker chromium-browser: Same origin policy bypass in WebAudio chromium-browser: Heap buffer overflow in WebGL chromium-browser: URL spoof in Omnibox chromium-browser: Same origin policy bypass in ServiceWorker chromium-browser: URL spoof in Omnibox chromium-browser: URL spoof in Omnibox chromium-browser: URL spoof in Omnibox chromium-browser: CORS bypass in Blink chromium-browser: Permissions bypass in extension installation chromium-browser: Type confusion in PDFium chromium-browser: Use after free in WebBluetooth chromium-browser: URL spoof in Omnibox chromium-browser: URL spoof in Omnibox chromium-browser: Integer overflow in SwiftShader chromium-browser: URL spoof in Omnibox chromium-browser: Local user privilege escalation in Extensions chromium-browser: Cross origin information leak in Blink chromium-browser: UI spoof in Extensions chromium-browser: Local file information leak in Extensions chromium-browser: Request privilege escalation in Extensions | [
"cpe:/a:redhat:rhel_extras:6"
] | null | null | 4.3 | null |
RHSA-2021:3058 | Red Hat Security Advisory: glib2 security update | glib: integer overflow in g_byte_array_new_take function when called with a buffer of 4GB or more on a 64-bit platform | [
"cpe:/a:redhat:enterprise_linux:8::crb",
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 7.5 | null | null |
RHSA-2019:3651 | Red Hat Security Advisory: sssd security, bug fix, and enhancement update | sssd: improper implementation of GPOs due to too restrictive permissions | [
"cpe:/a:redhat:enterprise_linux:8::crb",
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | null | 5.4 | null |
RHSA-2018:2172 | Red Hat Security Advisory: kernel security update | kernel: Divide-by-zero in __tcp_select_window hw: cpu: speculative store bypass | [
"cpe:/o:redhat:rhel_els:5"
] | null | null | 5.6 | null |
RHSA-2024:6782 | Red Hat Security Advisory: firefox update | An update for firefox is now available for Red Hat Enterprise Linux 9.0 Update Services for SAP Solutions.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. | [
"cpe:/a:redhat:rhel_e4s:9.0::appstream"
] | null | null | null | null |
RHSA-2021:3088 | Red Hat Security Advisory: kernel-rt security and bug fix update | kernel: race condition in net/can/bcm.c leads to local privilege escalation kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c | [
"cpe:/a:redhat:enterprise_linux:8::nfv",
"cpe:/a:redhat:enterprise_linux:8::realtime"
] | null | 7.8 | null | null |
RHSA-2022:1777 | Red Hat Security Advisory: webkit2gtk3 security, bug fix, and enhancement update | webkitgtk: Use-after-free leading to arbitrary code execution webkitgtk: Type confusion issue leading to arbitrary code execution webkitgtk: Logic issue leading to HSTS bypass webkitgtk: Out-of-bounds read leading to memory disclosure webkitgtk: Memory corruption issue leading to arbitrary code execution webkitgtk: Memory corruption issue leading to arbitrary code execution webkitgtk: Multiple memory corruption issue leading to arbitrary code execution webkitgtk: Memory corruption issue leading to arbitrary code execution webkitgtk: CSS compositing issue leading to revealing of the browsing history webkitgtk: Logic issue leading to Content Security Policy bypass webkitgtk: Information leak via Content Security Policy reports webkitgtk: Buffer overflow leading to arbitrary code execution webkitgtk: Logic issue leading to universal cross-site scripting webkitgtk: Cross-origin data exfiltration via resource timing API webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution webkitgtk: Incorrect memory allocation in WebCore::ImageBufferCairoImageSurfaceBackend::create webkitgtk: use-after-free in WebCore::ContainerNode::firstChild webkitgtk: use-after-free in WebCore::Frame::page webkitgtk: Processing a maliciously crafted mail message may lead to running arbitrary javascript webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution webkitgtk: Processing maliciously crafted web content may prevent Content Security Policy from being enforced webkitgtk: A malicious website may exfiltrate data cross-origin webkitgtk: maliciously crafted web content may lead to arbitrary code execution due to use after free webkitgtk: logic issue was addressed with improved state management | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 8.8 | null | null |
RHSA-2017:1868 | Red Hat Security Advisory: python security and bug fix update | python: failure to validate certificates in the HTTP client with TLS (PEP 476) | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 4.7 | null |
RHSA-2023:6239 | Red Hat Security Advisory: Kiali (Kiali 1.65.10) security update | HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack) | [
"cpe:/a:redhat:service_mesh:2.4::el8"
] | null | 7.5 | null | null |
RHSA-2023:3663 | Red Hat Security Advisory: jenkins and jenkins-2-plugins security update | http2-server: Invalid HTTP/2 requests cause DoS springframework: BCrypt skips salt rounds for work factor of 31 jettison: parser crash by stackoverflow jettison: memory exhaustion via user-supplied XML or JSON data xstream: Denial of Service by injecting recursive collections or maps based on element's hash values raising a stack overflow jackson-databind: deep wrapper array nesting wrt UNWRAP_SINGLE_VALUE_ARRAYS jackson-databind: use of deeply nested arrays json-smart: Uncontrolled Resource Consumption vulnerability in json-smart (Resource Exhaustion) jettison: Uncontrolled Recursion in JSONArray springframework: Security Bypass With Un-Prefixed Double Wildcard Pattern log4j1-socketappender: DoS via hashmap logging Jenkins: XSS vulnerability in plugin manager Jenkins: Temporary plugin file created with insecure permissions Jenkins: Temporary file parameter created with insecure permissions Jenkins: Information disclosure through error stack traces related to agents jenkins-2-plugin: workflow-job: Stored XSS vulnerability in Pipeline: Job Plugin jenkins-2-plugin: pipeline-utility-steps: Arbitrary file write vulnerability on agents in Pipeline Utility Steps Plugin | [
"cpe:/a:redhat:ocp_tools:4.11::el8"
] | null | 6.3 | null | null |
RHSA-2021:4766 | Red Hat Security Advisory: Release of OpenShift Serverless 1.19.0 | golang: net/http/httputil: panic due to racy read of persistConn after handler panic | [
"cpe:/a:redhat:serverless:1.19::el8"
] | null | 5.9 | null | null |
RHSA-2024:9404 | Red Hat Security Advisory: libgcrypt security update | libgcrypt: vulnerable to Marvin Attack | [
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/o:redhat:enterprise_linux:9::baseos"
] | null | 5.9 | null | null |
RHSA-2019:3870 | Red Hat Security Advisory: kernel-rt security update | hw: Intel GPU blitter manipulation can allow for arbitrary kernel memory write | [
"cpe:/a:redhat:enterprise_linux:8::nfv",
"cpe:/a:redhat:enterprise_linux:8::realtime"
] | null | null | 8.8 | null |
RHSA-2007:0858 | Red Hat Security Advisory: krb5 security update | krb5 RPC library buffer overflow krb5 kadmind uninitialized pointer | [
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2017:3475 | Red Hat Security Advisory: Red Hat JBoss Core Services Apache HTTP Server 2.4.23 security update | httpd: ap_get_basic_auth_pw() authentication bypass httpd: mod_ssl NULL pointer dereference httpd: mod_mime buffer overread httpd: Use-after-free by limiting unregistered HTTP method (Optionsbleed) apr: Out-of-bounds array deref in apr_time_exp*() functions | [
"cpe:/a:redhat:jboss_core_services:1"
] | null | null | 7.4 | null |
RHSA-2015:1545 | Red Hat Security Advisory: node.js security update | SSL/TLS: Padding Oracle On Downgraded Legacy Encryption attack | [
"cpe:/a:redhat:openshift:2.0::el6"
] | null | null | null | null |
RHSA-2024:9459 | Red Hat Security Advisory: buildah security update | Podman: Buildah: cri-o: FIPS Crypto-Policy Directory Mounting Issue in containers/common Go Library Buildah: Podman: Improper Input Validation in bind-propagation Option of Dockerfile RUN --mount Instruction buildah: Buildah allows arbitrary directory mount Podman: Buildah: CRI-O: symlink traversal vulnerability in the containers/storage library can cause Denial of Service (DoS) go/parser: golang: Calling any of the Parse functions containing deeply nested literals can cause a panic/stack exhaustion encoding/gob: golang: Calling Decoder.Decode on a message which contains deeply nested structures can cause a panic due to stack exhaustion go/build/constraint: golang: Calling Parse on a "// +build" build tag line with deeply nested expressions can cause a panic due to stack exhaustion | [
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 5.9 | null | null |
Subsets and Splits