id
stringlengths 13
15
| title
stringlengths 29
176
| description
stringlengths 8
31.7k
| cpes
sequencelengths 0
20
| cvss_v4_0
null | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
null |
---|---|---|---|---|---|---|---|
RHSA-2020:2366 | Red Hat Security Advisory: Red Hat support for Spring Boot 2.1.12 security and bug fix update | tomcat: Apache Tomcat HTTP/2 DoS keycloak: session hijack using the user access token keycloak: missing signatures validation on CRL used to verify client certificates keycloak: CSRF check missing in My Resources functionality in the Account Console keycloak: SAML broker does not check existence of signature on document allowing any user impersonation keycloak: cross-realm user access auth bypass | [
"cpe:/a:redhat:openshift_application_runtimes:1.0"
] | null | null | 5 | null |
RHSA-2020:5500 | Red Hat Security Advisory: mariadb:10.3 security, bug fix, and enhancement update | mysql: InnoDB unspecified vulnerability (CPU Oct 2019) mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2019) mysql: C API unspecified vulnerability (CPU Jan 2020) mysql: C API unspecified vulnerability (CPU Apr 2020) mysql: InnoDB unspecified vulnerability (CPU Apr 2020) mysql: Server: DML unspecified vulnerability (CPU Apr 2020) mysql: Server: Stored Procedure unspecified vulnerability (CPU Apr 2020) mysql: InnoDB unspecified vulnerability (CPU Apr 2020) mariadb-connector-c: Improper validation of content in a OK packet received from server mysql: Server: FTS unspecified vulnerability (CPU Oct 2020) mysql: InnoDB unspecified vulnerability (CPU Oct 2020) mysql: Server: FTS unspecified vulnerability (CPU Oct 2020) mysql: Server: Locking unspecified vulnerability (CPU Oct 2020) mariadb: Insufficient SST method name check leading to code injection in mysql-wsrep mysql: InnoDB unspecified vulnerability (CPU Jan 2021) mysql: Server: Parser unspecified vulnerability (CPU Apr 2021) mysql: InnoDB unspecified vulnerability (CPU Apr 2021) | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 4.9 | 4.9 | null |
RHSA-2023:6280 | Red Hat Security Advisory: Migration Toolkit for Applications security and bug fix update | golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487) HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack) | [
"cpe:/a:redhat:migration_toolkit_applications:6.2::el8",
"cpe:/a:redhat:migration_toolkit_applications:6.2::el9"
] | null | 7.5 | null | null |
RHSA-2021:2587 | Red Hat Security Advisory: ruby:2.5 security, bug fix, and enhancement update | ruby: NUL injection vulnerability of File.fnmatch and File.fnmatch? ruby: Regular expression denial of service vulnerability of WEBrick's Digest authentication ruby: HTTP response splitting in WEBrick ruby: Code injection via command argument of Shell#test / Shell#[] rubygem-json: Unsafe object creation vulnerability in JSON ruby: BasicSocket#read_nonblock method leads to information disclosure ruby: Potential HTTP request smuggling in WEBrick ruby: XML round-trip vulnerability in REXML | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 7.5 | 7.5 | null |
RHSA-2017:1105 | Red Hat Security Advisory: bind security update | bind: Incorrect error handling causes assertion failure when using DNS64 with "break-dnssec yes;" bind: Processing a response containing CNAME or DNAME with unusual order can crash resolver | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | 7.5 | null |
RHSA-2022:7105 | Red Hat Security Advisory: gnutls security update | gnutls: Double free during gnutls_pkcs7_verify | [
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 7.5 | null | null |
RHSA-2023:4496 | Red Hat Security Advisory: thunderbird security update | thunderbird: File Extension Spoofing using the Text Direction Override Character Mozilla: Offscreen Canvas could have bypassed cross-origin restrictions Mozilla: Incorrect value used during WASM compilation Mozilla: Potential permissions request bypass via clickjacking Mozilla: Crash in DOMParser due to out-of-memory conditions Mozilla: Fix potential race conditions when releasing platform objects Mozilla: Stack buffer overflow in StorageManager Mozilla: Cookie jar overflow caused unexpected cookie jar state Mozilla: Memory safety bugs fixed in Firefox 116, Firefox ESR 115.1, Firefox ESR 102.14, Thunderbird 115.1, and Thunderbird 102.14 Mozilla: Memory safety bugs fixed in Firefox ESR 115.1, and Thunderbird 115.1 | [
"cpe:/a:redhat:rhel_aus:8.2::appstream",
"cpe:/a:redhat:rhel_e4s:8.2::appstream",
"cpe:/a:redhat:rhel_tus:8.2::appstream"
] | null | 9.8 | null | null |
RHSA-2008:0263 | Red Hat Security Advisory: Red Hat Network Proxy Server security update | jabberd SASL DoS httpd mod_status XSS mod_perl PerlRun denial of service httpd scoreboard lack of PID protection httpd: mod_imagemap XSS apache mod_status cross-site scripting | [
"cpe:/a:redhat:network_proxy:5.0::el4"
] | null | null | null | null |
RHSA-2016:1060 | Red Hat Security Advisory: postgresql92-postgresql security update | postgresql: case insensitive range handling integer overflow leading to buffer overflow | [
"cpe:/a:redhat:network_satellite:5.7::el6",
"cpe:/a:redhat:network_satellite_managed_db:5.7::el6"
] | null | null | null | null |
RHSA-2022:7191 | Red Hat Security Advisory: device-mapper-multipath security update | device-mapper-multipath: Authorization bypass, multipathd daemon listens for client connections on an abstract Unix socket | [
"cpe:/a:redhat:rhel_eus:8.4::crb",
"cpe:/o:redhat:rhel_eus:8.4::baseos"
] | null | 7.8 | null | null |
RHSA-2019:1811 | Red Hat Security Advisory: java-1.8.0-openjdk security update | OpenJDK: Side-channel attack risks in Elliptic Curve (EC) cryptography (Security, 8208698) OpenJDK: Insufficient checks of suppressed exceptions in deserialization (Utilities, 8212328) OpenJDK: Unbounded memory allocation during deserialization in Collections (Utilities, 8213432) OpenJDK: Insufficient restriction of privileges in AccessController (Security, 8216381) OpenJDK: Missing URL format validation (Networking, 8221518) OpenJDK: Missing array bounds check in crypto providers (JCE, 8223511) | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | 3.7 | null |
RHSA-2015:1508 | Red Hat Security Advisory: qemu-kvm-rhev security update | qemu/kvm: i8254: out-of-bounds memory access in pit_ioport_read function qemu: ide: atapi: heap overflow during I/O buffer memory access | [
"cpe:/o:redhat:enterprise_linux:7::hypervisor"
] | null | null | null | null |
RHSA-2007:0022 | Red Hat Security Advisory: squirrelmail security update | Three XSS issues in SquirrelMail | [
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws",
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2022:1712 | Red Hat Security Advisory: Red Hat Single Sign-On 7.5.2 security update on RHEL 8 | keycloak: Privilege escalation vulnerability on Token Exchange | [
"cpe:/a:redhat:red_hat_single_sign_on:7.5::el8"
] | null | 8 | null | null |
RHSA-2016:0449 | Red Hat Security Advisory: samba4 security update | samba: Incorrect ACL get/set allowed on symlink path | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2024:1077 | Red Hat Security Advisory: edk2 security update | edk2: Buffer overflow in the DHCPv6 client via a long Server ID option edk2: Buffer overflow when processing DNS Servers option in a DHCPv6 Advertise message | [
"cpe:/a:redhat:rhel_eus:9.0::appstream"
] | null | 8.8 | null | null |
RHSA-2024:7869 | Red Hat Security Advisory: .NET 8.0 security update | dotnet: kestrel: closing an HTTP/3 stream can cause a race condition and lead to remote code execution dotnet: Multiple .NET components susceptible to hash flooding dotnet: System.IO.Packaging - Multiple DoS vectors in use of SortedList dotnet: Denial of Service in System.Text.Json | [
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::crb"
] | null | 7.5 | null | null |
RHSA-2016:2839 | Red Hat Security Advisory: CFME 5.6.3 security, bug fix, and enhancement update | cfme: RCE via Capacity & Utilization feature | [
"cpe:/a:redhat:cloudforms_managementengine:5.6::el7"
] | null | null | 8.8 | null |
RHSA-2021:4288 | Red Hat Security Advisory: libjpeg-turbo security and bug fix update | libjpeg-turbo: Stack-based buffer overflow in the "transform" component | [
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb"
] | null | 8.8 | null | null |
RHSA-2024:5144 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.4.18 Security update | undertow: LearningPushHandler can lead to remote memory DoS attacks undertow: response write hangs in case of Java 17 TLSv1.3 NewSessionTicket httpd: CONTINUATION frames DoS netty-codec-http: Allocation of Resources Without Limits or Throttling org.bouncycastle: Importing an EC certificate with crafted F2m parameters may lead to Denial of Service bc-java: BouncyCastle vulnerable to a timing variant of Bleichenbacher (Marvin Attack) org.bouncycastle:bcprov-jdk18on: Infinite loop in ED25519 verification in the ScalarUtil class | [
"cpe:/a:redhat:jboss_enterprise_application_platform:7.4::el8"
] | null | 7.5 | null | null |
RHSA-2005:601 | Red Hat Security Advisory: thunderbird security update | security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw | [
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2015:2540 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 6.4.5 update | EAP: missing authorization check for Monitor/Deployer/Auditor role when shutting down server apache-commons-collections: InvokerTransformer code execution during deserialisation | [
"cpe:/a:redhat:jboss_enterprise_application_platform:6::el7"
] | null | null | null | null |
RHSA-2022:8598 | Red Hat Security Advisory: Red Hat Virtualization Host security update [ovirt-4.5.3-1] | libksba: integer overflow may lead to remote code execution bind: memory leak in ECDSA DNSSEC verification code bind: memory leaks in EdDSA DNSSEC verification code expat: a use-after-free in the doContent function in xmlparse.c device-mapper-multipath: Authorization bypass, multipathd daemon listens for client connections on an abstract Unix socket | [
"cpe:/o:redhat:rhev_hypervisor:4.4::el8"
] | null | 7.8 | null | null |
RHSA-2024:6656 | Red Hat Security Advisory: Migration Toolkit for Runtimes security, bug fix and enhancement update | jsoup: The jsoup cleaner may incorrectly sanitize crafted XSS attempts if SafeList.preserveRelativeLinks is enabled | [
"cpe:/a:redhat:migration_toolkit_runtimes:1.0::el8"
] | null | 6.1 | null | null |
RHSA-2021:1073 | Red Hat Security Advisory: flatpak security update | flatpak: "file forwarding" feature can be used to gain unprivileged access to files | [
"cpe:/a:redhat:rhel_eus:8.2::appstream"
] | null | 8.1 | null | null |
RHSA-2024:5584 | Red Hat Security Advisory: libreoffice security update | libreoffice: Ability to trust not validated macro signatures removed in high security mode | [
"cpe:/a:redhat:rhel_e4s:9.0::appstream"
] | null | 7.8 | null | null |
RHSA-2009:0296 | Red Hat Security Advisory: icu security update | ICU: Invalid character sequences omission during conversion of some character encodings (XSS attack possible) | [
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2003:256 | Red Hat Security Advisory: : : : Updated Perl packages fix security issues. | security flaw security flaw | [
"cpe:/o:redhat:linux:7.1",
"cpe:/o:redhat:linux:7.2",
"cpe:/o:redhat:linux:7.3",
"cpe:/o:redhat:linux:8.0",
"cpe:/o:redhat:linux:9"
] | null | null | null | null |
RHSA-2020:0194 | Red Hat Security Advisory: apache-commons-beanutils security update | apache-commons-beanutils: does not suppresses the class property in PropertyUtilsBean by default | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 7.3 | null |
RHSA-2024:0152 | Red Hat Security Advisory: .NET 8.0 security update | dotnet: Information Disclosure: MD.SqlClient(MDS) & System.data.SQLClient (SDS) dotnet: X509 Certificates - Validation Bypass across Azure dotnet: .NET Denial of Service Vulnerability | [
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::crb"
] | null | 6.8 | null | null |
RHSA-2014:1007 | Red Hat Security Advisory: Red Hat JBoss BRMS 5.3.1 update | XStream: remote code execution due to insecure XML deserialization Xalan-Java: insufficient constraints in secure processing feature | [
"cpe:/a:redhat:jboss_enterprise_brms_platform:5.3"
] | null | null | null | null |
RHSA-2022:4873 | Red Hat Security Advisory: firefox security update | Mozilla: Cross-Origin resource's length leaked Mozilla: Heap buffer overflow in WebGL Mozilla: Browser window spoof using fullscreen mode Mozilla: Register allocation problem in WASM on arm64 Mozilla: Uninitialized variable leads to invalid memory read Mozilla: Querying a WebAuthn token with a large number of allowCredential entries may have leaked cross-origin information Mozilla: Memory safety bugs fixed in Firefox 101 and Firefox ESR 91.10 | [
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 9.8 | 6.1 | null |
RHSA-2023:4005 | Red Hat Security Advisory: bind security update | bind: named's configured cache size limit can be significantly exceeded | [
"cpe:/a:redhat:rhel_eus:9.0::appstream",
"cpe:/a:redhat:rhel_eus:9.0::crb"
] | null | 7.5 | null | null |
RHSA-2018:1636 | Red Hat Security Advisory: kernel security update | hw: cpu: speculative store bypass | [
"cpe:/o:redhat:rhel_eus:7.3::computenode",
"cpe:/o:redhat:rhel_eus:7.3::server"
] | null | null | 5.6 | null |
RHSA-2018:2612 | Red Hat Security Advisory: samba security, bug fix and enhancement update | samba: NULL pointer dereference in printer server process samba: Weak authentication protocol regression samba: Insufficient input validation in libsmbclient | [
"cpe:/a:redhat:storage:3.4:samba:el6"
] | null | null | 4.3 | null |
RHSA-2024:0189 | Red Hat Security Advisory: Red Hat OpenStack Platform 17.1 (python-werkzeug) security update | python-werkzeug: high resource consumption leading to denial of service | [
"cpe:/a:redhat:openstack:17.1::el8"
] | null | 7.5 | null | null |
RHSA-2012:1418 | Red Hat Security Advisory: kdelibs security update | kdelibs: Heap-based buffer overflow when parsing location of a font face source kdelibs: Heap-based buffer over-read when calculating dimensions of the canvas within the scale loop | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2021:3441 | Red Hat Security Advisory: kpatch-patch security update | kernel: use-after-free in route4_change() in net/sched/cls_route.c | [
"cpe:/o:redhat:enterprise_linux:7::server"
] | null | 7.8 | null | null |
RHSA-2018:3327 | Red Hat Security Advisory: libmspack security update | libmspack: off-by-one error in the CHM PMGI/PMGL chunk number validity checks libmspack: off-by-one error in the CHM chunk number validity checks libmspack: out-of-bounds write in kwajd_read_headers in mspack/kwajd.c libmspack: off-by-one error in the TOLOWER() macro for CHM decompression | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 4 | null |
RHSA-2023:7505 | Red Hat Security Advisory: thunderbird security update | Mozilla: Out-of-bound memory access in WebGL2 blitFramebuffer Mozilla: Use-after-free in MessagePort::Entangled Mozilla: Clickjacking permission prompts using the fullscreen transition Mozilla: Use-after-free in ReadableByteStreamQueueEntry::Buffer Mozilla: Using Selection API would copy contents into X11 primary selection. Mozilla: Incorrect parsing of relative URLs starting with "///" Mozilla: Memory safety bugs fixed in Firefox 120, Firefox ESR 115.5, and Thunderbird 115.5 | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 8.8 | null | null |
RHSA-2017:2491 | Red Hat Security Advisory: rh-git29-git security update | git: Escape out of git-shell git: Command injection via malicious ssh URLs | [
"cpe:/a:redhat:rhel_software_collections:2::el6",
"cpe:/a:redhat:rhel_software_collections:2::el7"
] | null | null | 6.3 | null |
RHSA-2020:1176 | Red Hat Security Advisory: avahi security update | avahi: Multicast DNS responds to unicast queries outside of local network | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 5.8 | null |
RHSA-2020:2669 | Red Hat Security Advisory: kpatch-patch security update | kernel: use-after-free in block/bfq-iosched.c related to bfq_idle_slice_timer_body | [
"cpe:/o:redhat:rhel_eus:8.1::baseos"
] | null | 7 | null | null |
RHSA-2019:2741 | Red Hat Security Advisory: kernel-rt security and bug fix update | kernel: Use-after-free in sound/usb/card.c:usb_audio_probe() kernel: Heap overflow in mwifiex_update_bss_desc_with_ie function in marvell/mwifiex/scan.c Kernel: KVM: nVMX: guest accesses L0 MSR causes potential DoS kernel: brcmfmac heap buffer overflow in brcmf_wowl_nd_results kernel: brcmfmac frame validation bypass kernel: Count overflow in FUSE request leading to use-after-free issues. | [
"cpe:/a:redhat:enterprise_linux:8::nfv",
"cpe:/a:redhat:enterprise_linux:8::realtime"
] | null | null | 7.8 | null |
RHSA-2015:1009 | Red Hat Security Advisory: Red Hat JBoss Portal 6.2.0 update | CXF: SSL hostname verification bypass, incomplete CVE-2012-5783 fix bouncycastle: TLS CBC padding timing attack WS: EJB3 role restrictions are not applied to jaxws handlers tomcat: multiple content-length header poisoning flaws JSF: XSS due to insufficient escaping of user-supplied content in outputText tags and EL expressions XStream: remote code execution due to insecure XML deserialization PicketBox/JBossSX: Unauthorized access to and modification of application server configuration and state by application jboss-as-server: Unchecked access to MSC Service Registry under JSM CXF: The SecurityTokenService accepts certain invalid SAML Tokens as valid CXF: UsernameTokens are sent in plaintext with a Symmetric EncryptBeforeSigning policy apache-commons-fileupload: denial of service due to too-small buffer size used by MultipartStream EAP6: Plain text password logging during security audit JBossSX/PicketBox: World readable audit.log file Tomcat/JBossWeb: Limited DoS in chunked transfer encoding input filter RichFaces: remote denial of service via memory exhaustion 6: JSM policy not respected by deployed applications Tomcat/JBossWeb: XXE vulnerability via user supplied XSLTs Tomcat/JBossWeb: Request smuggling via malicious content length header Xalan-Java: insufficient constraints in secure processing feature CXF: HTML content posted to SOAP endpoint could cause OOM errors CXF: Large invalid content could cause temporary space to fill Tomcat/JBossWeb: XML parser hijack by malicious web application netty: DoS via memory exhaustion during data aggregation Tomcat/JBossWeb: request smuggling and limited DoS in ChunkedInputFilter WSRP: Information disclosure via unsafe concurrency handling in interceptor Security: Invalid EJB caller role check implementation JAX-RS: Information disclosure via XML eXternal Entity (XXE) RESTEasy: XXE via parameter entities apache-poi: XML eXternal Entity (XXE) flaw PicketLink: XXE via insecure DocumentBuilderFactory usage apache-poi: entity expansion (billion laughs) flaw CXF: SSL hostname verification bypass, incomplete CVE-2012-6153 fix CLI: Insecure default permissions on history file cas-client: Bypass of security constraints via URL parameter injection RESTeasy: External entities expanded by DocumentProvider wss4j: Apache WSS4J is vulnerable to Bleichenbacher's attack (incomplete fix for CVE-2011-2487) wss4j: Apache WSS4J doesn't correctly enforce the requireSignedEncryptedDataElements property | [
"cpe:/a:redhat:jboss_enterprise_portal_platform:6.2"
] | null | null | 4.8 | null |
RHSA-2018:1119 | Red Hat Security Advisory: flash-plugin security update | flash-plugin: Remote Code Execution vulnerabilities (APSB18-08) flash-plugin: Information Disclosure vulnerabilities (APSB18-08) flash-plugin: Information Disclosure vulnerabilities (APSB18-08) flash-plugin: Remote Code Execution vulnerabilities (APSB18-08) flash-plugin: Information Disclosure vulnerabilities (APSB18-08) flash-plugin: Remote Code Execution vulnerabilities (APSB18-08) | [
"cpe:/a:redhat:rhel_extras:6"
] | null | null | 8.8 | null |
RHSA-2006:0577 | Red Hat Security Advisory: mutt security update | security flaw | [
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws",
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2008:0289 | Red Hat Security Advisory: samba security update | Samba client buffer overflow | [
"cpe:/o:redhat:rhel_eus:4.5::as",
"cpe:/o:redhat:rhel_eus:4.5::es"
] | null | null | null | null |
RHSA-2024:4624 | Red Hat Security Advisory: thunderbird security update | Mozilla: Race condition in permission assignment Mozilla: Memory corruption in thread creation Mozilla: Memory safety bugs fixed in Firefox 128, Firefox ESR 115.13, and Thunderbird 115.13 | [
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 7.5 | null | null |
RHSA-2005:026 | Red Hat Security Advisory: tetex security update | security flaw security flaw | [
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2023:0123 | Red Hat Security Advisory: kpatch-patch security update | kernel: memory corruption in AX88179_178A based USB ethernet device. kernel: i915: Incorrect GPU TLB flush can lead to random memory access | [
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 7 | null | null |
RHSA-2017:1381 | Red Hat Security Advisory: sudo security update | sudo: Privilege escalation in via improper get_process_ttyname() parsing | [
"cpe:/o:redhat:rhel_els:5"
] | null | null | 7.8 | null |
RHSA-2025:0136 | Red Hat Security Advisory: firefox security update | firefox: thunderbird: WebChannel APIs susceptible to confused deputy attack firefox: thunderbird: Use-after-free when breaking lines in text firefox: Alt-Svc ALPN validation failure when redirected firefox: Compartment mismatch when parsing JavaScript JSON module firefox: Memory corruption when using JavaScript Text Segmentation firefox: thunderbird: Memory safety bugs fixed in Firefox 134, Thunderbird 134, Firefox ESR 115.19, Firefox ESR 128.6, Thunderbird 115.19, and Thunderbird 128.6 firefox: thunderbird: Memory safety bugs fixed in Firefox 134, Thunderbird 134, Firefox ESR 128.6, and Thunderbird 128.6 | [
"cpe:/a:redhat:rhel_aus:8.6::appstream",
"cpe:/a:redhat:rhel_e4s:8.6::appstream",
"cpe:/a:redhat:rhel_tus:8.6::appstream"
] | null | 7.5 | null | null |
RHSA-2020:4003 | Red Hat Security Advisory: NetworkManager security and bug fix update | NetworkManager: user configuration not honoured leaving the connection unauthenticated via insecure defaults | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 4.3 | null | null |
RHSA-2014:1834 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 5.2.0 security update | CXF: SSL hostname verification bypass, incomplete CVE-2012-5783 fix CXF: SSL hostname verification bypass, incomplete CVE-2012-6153 fix | [
"cpe:/a:redhat:jboss_enterprise_application_platform:5::el4",
"cpe:/a:redhat:jboss_enterprise_application_platform:5::el5",
"cpe:/a:redhat:jboss_enterprise_application_platform:5::el6"
] | null | null | 4.8 | null |
RHSA-2016:2134 | Red Hat Security Advisory: Red Hat Enterprise Developer Toolset Version 3.x Retirement Notice | This is the final notification for the retirement of Red Hat Developer Toolset Version 3.x. This notification applies only to those customers subscribed to the channel for Red Hat Developer Toolset Version 3.x. | [] | null | null | null | null |
RHBA-2020:4196 | Red Hat Bug Fix Advisory: OpenShift Container Platform 4.6 GA Images | openshift/openshift-apiserver: oauth tokens not encrypted when enabling encryption of data at rest | [
"cpe:/a:redhat:openshift:4.6::el8"
] | null | 6.3 | null | null |
RHSA-2023:0599 | Red Hat Security Advisory: git security update | git: gitattributes parsing integer overflow git: Heap overflow in `git archive`, `git log --format` leading to RCE | [
"cpe:/a:redhat:rhel_e4s:8.1::appstream"
] | null | 9.8 | null | null |
RHSA-2018:0005 | Red Hat Security Advisory: eap7-jboss-ec2-eap security update | RESTEasy: Abuse of GZIPInterceptor in RESTEasy can lead to denial of service attack undertow: HTTP Request smuggling vulnerability (incomplete fix of CVE-2017-2666) resteasy: Vary header not added by CORS filter leading to cache poisoning undertow: improper whitespace parsing leading to potential HTTP request smuggling EAP-7: Wrong privileges on multiple property files jboss: unsafe chown of server.log in jboss init script allows privilege escalation (Incomplete fix for CVE-2016-8656) Solr: Code execution via entity expansion | [
"cpe:/a:redhat:jboss_enterprise_application_platform:7::el6",
"cpe:/a:redhat:jboss_enterprise_application_platform:7::el7"
] | null | null | 9.8 | null |
RHSA-2019:3067 | Red Hat Security Advisory: jss security update | JSS: OCSP policy "Leaf and Chain" implicitly trusts the root certificate | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 6.8 | null |
RHSA-2020:2847 | Red Hat Security Advisory: nodejs:12 security update | nodejs-minimist: prototype pollution allows adding or modifying properties of Object.prototype using a constructor or __proto__ payload nodejs: TLS session reuse can lead to hostname verification bypass nodejs: memory corruption in napi_get_value_string_* functions nghttp2: overly large SETTINGS frames can lead to DoS | [
"cpe:/a:redhat:rhel_eus:8.1::appstream"
] | null | 7.5 | null | null |
RHSA-2022:4786 | Red Hat Security Advisory: openvswitch2.13 security update | DPDK: out-of-bounds read/write in vhost_user_set_inflight_fd() may lead to crash dpdk: sending vhost-user-inflight type messages could lead to DoS | [
"cpe:/o:redhat:enterprise_linux:8::fastdatapath"
] | null | 6.5 | null | null |
RHSA-2018:2393 | Red Hat Security Advisory: kernel security update | Kernel: hw: cpu: L1 terminal fault (L1TF) Kernel: hw: cpu: L1 terminal fault (L1TF) kernel: kvm: vmx: host GDT limit corruption | [
"cpe:/o:redhat:rhel_aus:6.5::server"
] | null | null | 7.8 | null |
RHSA-2024:4014 | Red Hat Security Advisory: ghostscript security update | ghostscript: OPVP device arbitrary code execution via custom Driver library | [
"cpe:/a:redhat:rhel_e4s:9.0::appstream"
] | null | 8.8 | null | null |
RHSA-2022:0664 | Red Hat Security Advisory: samba security update | samba: Out-of-bounds heap read/write vulnerability in VFS module vfs_fruit allows code execution | [
"cpe:/o:redhat:rhel_aus:7.7::server",
"cpe:/o:redhat:rhel_e4s:7.7::server",
"cpe:/o:redhat:rhel_tus:7.7::server"
] | null | 9.9 | null | null |
RHBA-2015:2116 | Red Hat Bug Fix Advisory: GTK+ bug fix and enhancement update | cairo: out of bounds read in fill_xrgb32_lerp_opaque_spans | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | null | null |
RHSA-2023:0210 | Red Hat Security Advisory: java-1.8.0-openjdk security and bug fix update | OpenJDK: improper restrictions in CORBA deserialization (Serialization, 8285021) OpenJDK: soundbank URL remote loading (Sound, 8293742) | [
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::crb"
] | null | 3.7 | null | null |
RHSA-2012:1186 | Red Hat Security Advisory: katello security update | Katello: Application.config.secret_token is not generated properly | [
"cpe:/a:cloudforms_systemengine:1::el6"
] | null | null | null | null |
RHSA-2019:4353 | Red Hat Security Advisory: Red Hat Ceph Storage security, bug fix, and enhancement update | ceph: denial of service in RGW daemon | [
"cpe:/a:redhat:ceph_storage:3::el7"
] | null | null | 6.5 | null |
RHSA-2012:1135 | Red Hat Security Advisory: libreoffice security update | libreoffice: Multiple heap-based buffer overflows in the XML manifest encryption handling code | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2021:0819 | Red Hat Security Advisory: pki-core security update | pki-core: Reflected XSS in 'path length' constraint field in CA's Agent page pki-core/pki-kra: Reflected XSS in recoveryID search field at KRA's DRM agent page in authorize recovery tab pki-core: Reflected XSS in getcookies?url= endpoint in CA pki-core: KRA vulnerable to reflected XSS via the getPk12 page pki-core: XSS in the certificate search results pki-core: Unprivileged users can renew any certificate | [
"cpe:/o:redhat:rhel_eus:7.6::computenode",
"cpe:/o:redhat:rhel_eus:7.6::server"
] | null | 8.1 | 4.7 | null |
RHSA-2022:6595 | Red Hat Security Advisory: nodejs and nodejs-nodemon security and bug fix update | nodejs-ini: Prototype pollution via malicious INI file nodejs-glob-parent: Regular expression denial of service nodejs-ansi-regex: Regular expression denial of service (ReDoS) matching ANSI escape codes nodejs-normalize-url: ReDoS for data URLs nodejs: npm pack ignores root-level .gitignore and .npmignore file exclusion directives when run in a workspace nodejs: DNS rebinding in --inspect via invalid IP addresses nodejs: HTTP request smuggling due to flawed parsing of Transfer-Encoding nodejs: HTTP request smuggling due to improper delimiting of header fields nodejs: HTTP request smuggling due to incorrect parsing of multi-line Transfer-Encoding nodejs-got: missing verification of requested URLs allows redirects to UNIX sockets | [
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 5.3 | null | null |
RHSA-2023:4461 | Red Hat Security Advisory: firefox security update | Mozilla: Offscreen Canvas could have bypassed cross-origin restrictions Mozilla: Incorrect value used during WASM compilation Mozilla: Potential permissions request bypass via clickjacking Mozilla: Crash in DOMParser due to out-of-memory conditions Mozilla: Fix potential race conditions when releasing platform objects Mozilla: Stack buffer overflow in StorageManager Mozilla: Cookie jar overflow caused unexpected cookie jar state Mozilla: Memory safety bugs fixed in Firefox 116, Firefox ESR 115.1, Firefox ESR 102.14, Thunderbird 115.1, and Thunderbird 102.14 Mozilla: Memory safety bugs fixed in Firefox ESR 115.1, and Thunderbird 115.1 | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 9.8 | null | null |
RHSA-2021:0397 | Red Hat Security Advisory: thunderbird security update | Mozilla: IMAP Response Injection when using STARTTLS Mozilla: HTTPS pages could have been intercepted by a registered service worker when they should not have been Mozilla: Cross-origin information leakage via redirected PDF requests Mozilla: Type confusion when using logical assignment operators in JavaScript switch statements Mozilla: Use-after-poison for incorrectly redeclared JavaScript variables during GC Mozilla: Memory safety bugs fixed in Firefox 85 and Firefox ESR 78.7 | [
"cpe:/a:redhat:rhel_eus:8.1::appstream"
] | null | 8.8 | 6.1 | null |
RHBA-2020:3179 | Red Hat Bug Fix Advisory: OpenShift Container Platform 4.3.31 packages update | golang.org/x/crypto: Processing of crafted ssh-ed25519 public keys allows for panic | [
"cpe:/a:redhat:openshift:4.3::el7",
"cpe:/a:redhat:openshift:4.3::el8"
] | null | 5.3 | null | null |
RHSA-2024:9456 | Red Hat Security Advisory: osbuild-composer security update | encoding/gob: golang: Calling Decoder.Decode on a message which contains deeply nested structures can cause a panic due to stack exhaustion | [
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 7.5 | null | null |
RHSA-2024:8528 | Red Hat Security Advisory: pki-servlet-engine security update | tomcat: Denial of Service in Tomcat | [
"cpe:/a:redhat:rhel_eus:9.0::appstream"
] | null | 7.5 | null | null |
RHSA-2015:0727 | Red Hat Security Advisory: kernel-rt security and bug fix update | kernel: infiniband: uverbs: unprotected physical memory access kernel: net: slab corruption from use after free on INIT collisions | [
"cpe:/a:redhat:rhel_extras_rt:7"
] | null | null | null | null |
RHSA-2012:1362 | Red Hat Security Advisory: thunderbird security update | Mozilla: defaultValue security checks not applied (MFSA 2012-89) | [
"cpe:/a:redhat:rhel_productivity:5",
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2015:0867 | Red Hat Security Advisory: qemu-kvm security and bug fix update | qemu: cirrus: insufficient blit region checks | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2014:0261 | Red Hat Security Advisory: Red Hat Enterprise MRG for Red Hat Enterprise Linux 5 1-month Notice | This is the one-month notification for the retirement of Red Hat Enterprise
MRG Version 1 for Red Hat Enterprise Linux 5. This notification applies
only to those customers with subscriptions for Red Hat Enterprise MRG
Version 1 for Red Hat Enterprise Linux 5. | [
"cpe:/a:redhat:enterprise_mrg:1::el5",
"cpe:/a:redhat:enterprise_mrg:2::el5"
] | null | null | null | null |
RHSA-2014:0448 | Red Hat Security Advisory: firefox security update | Mozilla: Miscellaneous memory safety hazards (rv:24.5) (MFSA 2014-34) Mozilla: Out of bounds read while decoding JPG images (MFSA-2014-37) Mozilla: Buffer overflow when using non-XBL object as XBL (MFSA 2014-38) Mozilla: Privilege escalation through Web Notification API (MFSA 2014-42) Mozilla: Cross-site scripting (XSS) using history navigations (MFSA 2014-43) Mozilla: Use-after-free in imgLoader while resizing images (MFSA 2014-44) Mozilla: Use-after-free in nsHostResolver (MFSA 2014-46) | [
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::server",
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2023:4972 | Red Hat Security Advisory: Multicluster Engine for Kubernetes 2.1.8 security updates and bug fixes | openshift: OCP & FIPS mode vm2: Promise handler sanitization can be bypassed allowing attackers to escape the sandbox and run arbitrary code vm2: custom inspect function allows attackers to escape the sandbox and run arbitrary code | [
"cpe:/a:redhat:multicluster_engine:2.1::el8"
] | null | 9.8 | null | null |
RHSA-2016:1269 | Red Hat Security Advisory: python-django-horizon security update | python-django-horizon: XSS in client side template | [
"cpe:/a:redhat:openstack:5::el7"
] | null | null | null | null |
RHSA-2020:1708 | Red Hat Security Advisory: liblouis security and bug fix update | liblouis: Segmentation fault in logging.c:lou_logPrint() liblouis: Stack-based buffer overflow in function includeFile in compileTranslationTable.c liblouis: Stack-based buffer overflow in function compileHyphenation in compileTranslationTable.c liblouis: Stack-based buffer overflow in compileTranslationTable.c | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | null | 3.3 | null |
RHSA-2015:2659 | Red Hat Security Advisory: Red Hat JBoss Web Server 3.0.2 security update | httpd: bypass of mod_headers rules via chunked requests tomcat: non-persistent DoS attack by feeding data by aborting an upload httpd: NULL pointer dereference in mod_cache if Content-Type has empty value httpd: HTTP request smuggling attack against chunked request parser tomcat: URL Normalization issue | [
"cpe:/a:redhat:jboss_enterprise_web_server:3.0::el6"
] | null | null | 4.3 | null |
RHSA-2023:3177 | Red Hat Security Advisory: apr-util security update | apr-util: out-of-bounds writes in the apr_base64 | [
"cpe:/a:redhat:rhel_e4s:8.1::appstream"
] | null | 6.5 | null | null |
RHSA-2007:0732 | Red Hat Security Advisory: poppler security update | xpdf integer overflow | [
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2014:1995 | Red Hat Security Advisory: Red Hat JBoss Fuse Service Works 6.0.0 security update | HawtJNI: predictable temporary file name leading to local arbitrary code execution Java: XML eXternal Entity (XXE) flaw in ParserPool and Decrypter jboss-as-server: Unchecked access to MSC Service Registry under JSM EAP6: Plain text password logging during security audit 6: JSM policy not respected by deployed applications Xalan-Java: insufficient constraints in secure processing feature | [
"cpe:/a:redhat:jboss_fuse_service_works:6.0"
] | null | null | null | null |
RHSA-2020:5634 | Red Hat Security Advisory: OpenShift Container Platform 4.7.0 packages security update | atomic-openshift: cross-namespace owner references can trigger deletions of valid children kubernetes: Ceph RBD adminSecrets exposed in logs when loglevel >= 4 containerd: credentials leak during image pull python-rsa: bleichenbacher timing oracle attack against RSA decryption golang: math/big: panic during recursive division of very large numbers gogo/protobuf: plugin/unmarshal/unmarshal.go lacks certain index validation | [
"cpe:/a:redhat:openshift:4.7::el7",
"cpe:/a:redhat:openshift:4.7::el8"
] | null | 8.6 | 3.6 | null |
RHSA-2022:5894 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.4.6 Security update. | minimist: prototype pollution netty: world readable temporary file containing sensitive data com.google.code.gson-gson: Deserialization of Untrusted Data in com.google.code.gson-gson | [
"cpe:/a:redhat:jboss_enterprise_application_platform:7.4::el9"
] | null | 7.5 | null | null |
RHSA-2019:0734 | Red Hat Security Advisory: katello-installer-base security and enhancement update | katello-installer-base: QMF methods exposed to goferd via qdrouterd | [
"cpe:/a:redhat:satellite:6.1::el6",
"cpe:/a:redhat:satellite:6.2::el7",
"cpe:/a:redhat:satellite_capsule:6.1::el6",
"cpe:/a:redhat:satellite_capsule:6.2::el7"
] | null | null | 8 | null |
RHSA-2018:2818 | Red Hat Security Advisory: chromium-browser security update | chromium-browser: Function signature mismatch in WebAssembly chromium-browser: URL Spoofing in Omnibox | [
"cpe:/a:redhat:rhel_extras:6"
] | null | null | 5.3 | null |
RHSA-2022:2236 | Red Hat Security Advisory: subversion:1.10 security update | subversion: Subversion's mod_dav_svn is vulnerable to memory corruption | [
"cpe:/a:redhat:rhel_eus:8.2::appstream"
] | null | 7.5 | null | null |
RHSA-2022:0831 | Red Hat Security Advisory: kernel security update | kernel: improper initialization of the "flags" member of the new pipe_buffer | [
"cpe:/a:redhat:rhel_eus:8.4::crb",
"cpe:/o:redhat:rhel_eus:8.4::baseos"
] | null | 7.8 | null | null |
RHSA-2022:7000 | Red Hat Security Advisory: java-17-openjdk security and bug fix update | OpenJDK: improper MultiByte conversion can lead to buffer overflow (JGSS, 8286077) OpenJDK: improper handling of long NTLM client hostnames (Security, 8286526) OpenJDK: insufficient randomization of JNDI DNS port numbers (JNDI, 8286910) OpenJDK: excessive memory allocation in X.509 certificate parsing (Security, 8286533) OpenJDK: HttpServer no connection count limit (Lightweight HTTP Server, 8286918) harfbuzz: integer overflow in the component hb-ot-shape-fallback.cc OpenJDK: missing SNI caching in HTTP/2 (Networking, 8289366) | [
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb"
] | null | 3.7 | null | null |
RHSA-2009:0354 | Red Hat Security Advisory: evolution-data-server security update | evolution-data-server: S/MIME signatures are considered to be valid even for modified messages (MITM) evolution-data-server: insufficient checking of NTLM authentication challenge packets evolution-data-server: integer overflow in base64 encoding functions | [
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws",
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2013:0210 | Red Hat Security Advisory: Red Hat Enterprise Linux 3 - 1-Year End Of Support Notice | This is the one-year notification for the end of support services provided
for Red Hat Enterprise Linux 3. | [
"cpe:/o:redhat:rhel_els:3::as",
"cpe:/o:redhat:rhel_els:3::es"
] | null | null | null | null |
RHSA-2024:10983 | Red Hat Security Advisory: python3.9:3.9.21 security update | python: Virtual environment (venv) activation scripts don't quote paths python: Improper validation of IPv6 and IPvFuture addresses | [
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::crb",
"cpe:/o:redhat:enterprise_linux:9::baseos"
] | null | 3.7 | null | null |
RHSA-2019:3968 | Red Hat Security Advisory: qemu-kvm-ma security update | QEMU: slirp: heap buffer overflow during packet reassembly | [
"cpe:/o:redhat:enterprise_linux:7::server"
] | null | null | 7 | null |
Subsets and Splits