id
stringlengths 13
15
| title
stringlengths 29
176
| description
stringlengths 8
31.7k
| cpes
sequencelengths 0
20
| cvss_v4_0
null | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
null |
---|---|---|---|---|---|---|---|
RHSA-2020:3382 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 6.4 security update | tomcat: multiple requests with invalid payload length in a WebSocket frame could lead to DoS | [
"cpe:/a:redhat:jboss_enterprise_application_platform:6.4"
] | null | 7.5 | null | null |
RHSA-2019:4019 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.2.5 on RHEL 7 security update | HTTP/2: large amount of data requests leads to denial of service HTTP/2: flood using PING frames results in unbounded memory growth HTTP/2: flood using HEADERS frames results in unbounded memory growth HTTP/2: flood using SETTINGS frames results in unbounded memory growth wildfly-core: Incorrect privileges for 'Monitor', 'Auditor' and 'Deployer' user by default wildfly-security-manager: security manager authorization bypass | [
"cpe:/a:redhat:jboss_enterprise_application_platform:7.2::el7"
] | null | null | 7.5 | null |
RHBA-2021:2854 | Red Hat Bug Fix Advisory: Migration Toolkit for Containers (MTC) 1.4.6 release advisory | libwebp: heap-based buffer overflow in PutLE16() nss: TLS 1.3 CCS flood remote DoS Attack openldap: NULL pointer dereference for unauthenticated packet in slapd kernel: security bypass in certs/blacklist.c and certs/system_keyring.c jetty: local temporary directory hijacking vulnerability jetty: buffer not correctly recycled in Gzip Request inflation jetty: request containing multiple Accept headers with a large number of "quality" parameters may lead to DoS libwebp: heap-based buffer overflow in WebPDecode*Into functions libwebp: use-after-free in EmitFancyRGB() in dec/io_dec.c libxml2: Use-after-free in xmlEncodeEntitiesInternal() in entities.c libxml2: Heap-based buffer overflow in xmlEncodeEntitiesInternal() in entities.c libxml2: Use-after-free in xmlXIncludeDoProcess() in xinclude.c lz4: memory corruption due to an integer overflow bug caused by memmove argument libxml2: NULL pointer dereference when post-validating mixed content parsed in recovery mode libxml2: Exponential entity expansion attack bypasses all existing protection mechanisms rpm: Signature checks bypass via corrupted rpm package jenkins-2-plugins/config-file-provider: Does not configure its XML parser to prevent XML external entity (XXE) attacks. jenkins-2-plugins/config-file-provider: Does not correctly perform permission checks in several HTTP endpoints. jenkins-2-plugins/config-file-provider: does not require POST requests for an HTTP endpoint, resulting in a cross-site request forgery (CSRF) vulnerability. jenkins-2-plugins/config-file-provider: Does not perform permission checks in several HTTP endpoints. glib: integer overflow in g_bytes_new function on 64-bit platforms due to an implicit cast from 64 bits to 32 bits golang: net/http: panic in ReadRequest and ReadResponse when reading a very large header kernel: use-after-free in net/bluetooth/hci_event.c when destroying an hci_chan | [
"cpe:/a:redhat:rhmt:1.4::el7",
"cpe:/a:redhat:rhmt:1.4::el8"
] | null | 7.8 | null | null |
RHSA-2024:0714 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.4.15 Security update | jgit: arbitrary file overwrite santuario: Private Key disclosure in debug-log output | [
"cpe:/a:redhat:jboss_enterprise_application_platform:7.4"
] | null | 6.5 | null | null |
RHSA-2008:0512 | Red Hat Security Advisory: XFree86 security update | X.org Record and Security extensions memory corruption X.org MIT-SHM extension arbitrary memory read X.org Render extension AllocateGlyph() heap buffer overflow | [
"cpe:/o:redhat:enterprise_linux:2.1::as",
"cpe:/o:redhat:enterprise_linux:2.1::aw",
"cpe:/o:redhat:enterprise_linux:2.1::es",
"cpe:/o:redhat:enterprise_linux:2.1::ws"
] | null | null | null | null |
RHSA-2011:0843 | Red Hat Security Advisory: postfix security update | (smtpd): Crash due to improper management of SASL handlers for SMTP sessions | [
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws",
"cpe:/o:redhat:enterprise_linux:5::server",
"cpe:/o:redhat:enterprise_linux:6::server"
] | null | null | null | null |
RHSA-2017:3216 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 6.4.18 security update | keycloak: SAML request parser replaces special strings with system properties | [
"cpe:/a:redhat:jboss_enterprise_application_platform:6::el5"
] | null | null | 6.5 | null |
RHSA-2017:0448 | Red Hat Security Advisory: ansible and openshift-ansible security and bug fix update | Ansible: Compromised remote hosts can lead to running commands on the Ansible controller | [
"cpe:/a:redhat:openshift:3.2::el7",
"cpe:/a:redhat:openshift:3.3::el7",
"cpe:/a:redhat:openshift:3.4::el7"
] | null | null | 6.6 | null |
RHSA-2024:11049 | Red Hat Security Advisory: squid security update | squid: Request/Response smuggling in HTTP/1.1 and ICAP | [
"cpe:/o:redhat:rhel_els:7"
] | null | 9.3 | null | null |
RHSA-2012:1577 | Red Hat Security Advisory: java-1.4.2-ibm-sap End of Support Notice | The java-1.4.2-ibm-sap packages shipped in the Red Hat Enterprise Linux 5
and 6 for SAP RHN repositories are no longer supported for SAP products. As
a result, these packages will no longer be updated and may contain security
flaws. Users are advised to migrate to the supported version of SAP
certified Java. | [
"cpe:/a:redhat:rhel_extras_sap:5"
] | null | null | null | null |
RHSA-2017:2838 | Red Hat Security Advisory: dnsmasq security update | dnsmasq: heap overflow in the code responsible for building DNS replies | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | 9.8 | null |
RHSA-2020:1150 | Red Hat Security Advisory: qemu-kvm-ma security update | QEMU: block: iscsi: OOB heap access via an unexpected response of iSCSI Server QEMU: slirp: OOB buffer access while emulating tcp protocols in tcp_emu() | [
"cpe:/o:redhat:enterprise_linux:7::server"
] | null | 5.6 | null | null |
RHSA-2016:1296 | Red Hat Security Advisory: ocaml security update | ocaml: sizes arguments are sign-extended from 32 to 64 bits | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | null | null |
RHSA-2024:6274 | Red Hat Security Advisory: Red Hat OpenShift distributed tracing 3.3.0 operator/operand containers | Red Hat OpenShift distributed tracing 3.3.0 | [
"cpe:/a:redhat:openshift_distributed_tracing:3.3::el8"
] | null | null | null | null |
RHSA-2020:1126 | Red Hat Security Advisory: mutt security update | mutt: IMAP header caching path traversal vulnerability | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 6.5 | null |
RHSA-2021:3088 | Red Hat Security Advisory: kernel-rt security and bug fix update | kernel: race condition in net/can/bcm.c leads to local privilege escalation kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c | [
"cpe:/a:redhat:enterprise_linux:8::nfv",
"cpe:/a:redhat:enterprise_linux:8::realtime"
] | null | 7.8 | null | null |
RHSA-2007:0356 | Red Hat Security Advisory: libpng security update | libpng DoS libpng png_handle_tRNS flaw | [
"cpe:/o:redhat:enterprise_linux:2.1::as",
"cpe:/o:redhat:enterprise_linux:2.1::aw",
"cpe:/o:redhat:enterprise_linux:2.1::es",
"cpe:/o:redhat:enterprise_linux:2.1::ws",
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws",
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws",
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2007:1045 | Red Hat Security Advisory: net-snmp security update | net-snmp remote DoS via udp packet | [
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws",
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws",
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2023:7046 | Red Hat Security Advisory: dnsmasq security and bug fix update | dnsmasq: default maximum EDNS.0 UDP packet size was set to 4096 but should be 1232 | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 7.5 | null | null |
RHSA-2015:1862 | Red Hat Security Advisory: Red Hat Enterprise Linux OpenStack Platform 7 director update | openstack-tripleo-heat-templates: unsafe pipeline ordering of swift staticweb middleware | [
"cpe:/a:redhat:openstack-director:7::el7"
] | null | null | null | null |
RHSA-2018:0031 | Red Hat Security Advisory: libvirt security update | An update for libvirt is now available for Red Hat Enterprise Linux 7.3 Extended Update Support.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. | [
"cpe:/o:redhat:rhel_eus:7.3::computenode",
"cpe:/o:redhat:rhel_eus:7.3::server"
] | null | null | null | null |
RHSA-2015:0416 | Red Hat Security Advisory: 389-ds-base security, bug fix, and enhancement update | 389-ds-base: information disclosure through 'cn=changelog' subtree 389-ds-base: password hashing bypassed when "nsslapd-unhashed-pw-switch" is set to off | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | null | null |
RHSA-2020:1264 | Red Hat Security Advisory: systemd security and bug fix update | systemd: line splitting via fgets() allows for state injection during daemon-reexec systemd: out-of-bounds read when parsing a crafted syslog message | [
"cpe:/o:redhat:rhel_eus:7.5::computenode",
"cpe:/o:redhat:rhel_eus:7.5::server"
] | null | null | 4.3 | null |
RHSA-2008:0857 | Red Hat Security Advisory: kernel security and bug fix update | kernel snd_seq_oss_synth_make_info leak Linux kernel local filesystem DoS Linux kernel dccp_setsockopt_change() integer overflow Linux kernel sctp_setsockopt_auth_key() integer overflow kernel: tmpfs: fix kernel BUG in shmem_delete_inode kernel: fix off-by-one error in iov_iter_advance() kernel: sctp: fix potential panics in the SCTP-AUTH API kernel: nfsd: fix buffer overrun decoding NFSv4 acl kernel: sctp_getsockopt_hmac_ident information disclosure kernel: sctp: fix random memory dereference with SCTP_HMAC_IDENT option | [
"cpe:/a:redhat:enterprise_mrg:1::el5"
] | null | null | null | null |
RHSA-2005:823 | Red Hat Security Advisory: fetchmail security update | security flaw | [
"cpe:/o:redhat:enterprise_linux:2.1::as",
"cpe:/o:redhat:enterprise_linux:2.1::aw",
"cpe:/o:redhat:enterprise_linux:2.1::es",
"cpe:/o:redhat:enterprise_linux:2.1::ws"
] | null | null | null | null |
RHSA-2018:2419 | Red Hat Security Advisory: Red Hat JBoss BPM Suite 6.4.11 security update | slf4j: Deserialisation vulnerability in EventData constructor can allow for arbitrary code execution | [
"cpe:/a:redhat:jboss_bpms:6.4"
] | null | null | 8.1 | null |
RHSA-2011:0303 | Red Hat Security Advisory: kernel security and bug fix update | kernel: unix socket local dos kernel: unlimited socket backlog DoS kernel: heap contents leak for CAP_NET_ADMIN via ethtool ioctl kernel: unlimited socket backlog DoS | [
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2002:101 | Red Hat Security Advisory: : Updated mailman packages available | security flaw | [
"cpe:/a:redhat:secure_web_server:3.2"
] | null | null | null | null |
RHSA-2020:2798 | Red Hat Security Advisory: Red Hat OpenShift Service Mesh 1.1 servicemesh-proxy security update | envoy: Resource exhaustion when accepting too many connections envoy: Resource exhaustion when proxying HTTP/2 requests or responses with small data frames envoy: Resource exhaustion via HTTP/2 client requests with large payloads and improper stream windows envoy: Resource exhaustion when processing HTTP/1.1 headers with long field names | [
"cpe:/a:redhat:service_mesh:1.1::el8"
] | null | 7.5 | null | null |
RHSA-2003:117 | Red Hat Security Advisory: openssl security update for Stronghold | security flaw security flaw | [
"cpe:/a:redhat:stronghold:3"
] | null | null | null | null |
RHSA-2020:0111 | Red Hat Security Advisory: firefox security update | Mozilla: Bypass of @namespace CSS sanitization during pasting Mozilla: Type Confusion in XPCVariant.cpp Mozilla: CSS sanitization does not escape HTML tags Mozilla: Memory safety bugs fixed in Firefox 72 and Firefox ESR 68.4 Mozilla: IonMonkey type confusion with StoreElementHole and FallibleStoreElement | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 8.8 | 8.8 | null |
RHSA-2023:2161 | Red Hat Security Advisory: fence-agents security and bug fix update | python-oauthlib: DoS when attacker provides malicious IPV6 URI | [
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::highavailability",
"cpe:/a:redhat:enterprise_linux:9::resilientstorage"
] | null | 6.5 | null | null |
RHSA-2023:5224 | Red Hat Security Advisory: thunderbird security update | libwebp: Heap buffer overflow in WebP Codec libwebp: out-of-bounds write with a specially crafted WebP lossless file | [
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 0 | null | null |
RHSA-2016:0329 | Red Hat Security Advisory: openstack-swift security update | openstack-swift: Information leak via Swift tempurls openstack-swift: Client to proxy DoS through Large Objects openstack-swift: Proxy to server DoS through Large Objects | [
"cpe:/a:redhat:storage:3.1:server:el6"
] | null | null | null | null |
RHSA-2013:0839 | Red Hat Security Advisory: JBoss Enterprise Application Platform 6.1.0 update | Web: jsessionid exposed via encoded url when using cookie based session tracking JBoss: custom authorization module implementations shared between applications apache-cxf: XML encryption backwards compatibility attacks tomcat: Session fixation in form authenticator | [
"cpe:/a:redhat:jboss_enterprise_application_platform:6::el5"
] | null | null | null | null |
RHSA-2016:0723 | Red Hat Security Advisory: java-1.6.0-openjdk security update | OpenJDK: insufficient thread consistency checks in ObjectInputStream (Serialization, 8129952) OpenJDK: insufficient byte type checks (Hotspot, 8132051) OpenJDK: insufficient DSA key parameters checks (Security, 8138593) OpenJDK: incorrect handling of surrogate pairs in XML attribute values (JAXP, 8143167) OpenJDK: unrestricted deserialization of authentication credentials (JMX, 8144430) | [
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::server",
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation",
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | null | null |
RHSA-2007:0395 | Red Hat Security Advisory: mod_perl security update | mod_perl PerlRun denial of service | [
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws",
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2018:3803 | Red Hat Security Advisory: chromium-browser security update | chromium-browser: Out of bounds write in V8 chromium-browser: Use after frees in PDFium chromium-browser: Heap buffer overflow in Skia chromium-browser: Use after free in PDFium chromium-browser: Use after free in Blink chromium-browser: Heap buffer overflow in Canvas chromium-browser: Use after free in WebAudio chromium-browser: Use after free in MediaRecorder chromium-browser: Heap buffer overflow in Blink chromium-browser: Out of bounds write in V8 chromium-browser: Use after free in Skia chromium-browser: Inappropriate implementation in Extensions chromium-browser: Inappropriate implementation in Site Isolation chromium-browser: Incorrect security UI in Blink chromium-browser: Inappropriate implementation in Navigation chromium-browser: Inappropriate implementation in Omnibox chromium-browser: Insufficient policy enforcement in Blink chromium-browser: Insufficient policy enforcement in Blink chromium-browser: Insufficient policy enforcement in Navigation chromium-browser: Inappropriate implementation in Media chromium-browser: Inappropriate implementation in Network Authentication chromium-browser: Insufficient data validation in Shell Integration chromium-browser: Insufficient policy enforcement in URL Formatter mozilla: Use after free in Skia chromium-browser: Insufficient policy enforcement in URL Formatter chromium-browser: Insufficient policy enforcement in Proxy chromium-browser: Out of bounds read in V8 | [
"cpe:/a:redhat:rhel_extras:6"
] | null | null | 6.5 | null |
RHSA-2021:3477 | Red Hat Security Advisory: RHV-H security update (redhat-virtualization-host) 4.3.18 | sssd: shell command injection in sssctl kernel: use-after-free in route4_change() in net/sched/cls_route.c kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c libX11: missing request length checks kernel: race condition for removal of the HCI controller | [
"cpe:/o:redhat:enterprise_linux:7::hypervisor"
] | null | 7 | null | null |
RHSA-2018:1129 | Red Hat Security Advisory: kernel security and bug fix update | hw: cpu: speculative execution branch target injection hw: cpu: speculative execution permission faults handling | [
"cpe:/o:redhat:rhel_eus:7.3::computenode",
"cpe:/o:redhat:rhel_eus:7.3::server"
] | null | null | 5.5 | null |
RHSA-2020:3643 | Red Hat Security Advisory: thunderbird security update | Mozilla: Attacker-induced prompt for extension installation Mozilla: Use-After-Free when aborting an operation | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | 8.8 | null | null |
RHSA-2024:0845 | Red Hat Security Advisory: OpenShift Container Platform 4.13.34 security update | go-git: Maliciously crafted Git server replies can cause DoS on go-git clients go-git: Maliciously crafted Git server replies can lead to path traversal and RCE on go-git clients | [
"cpe:/a:redhat:openshift:4.13::el8",
"cpe:/a:redhat:openshift:4.13::el9"
] | null | 8.1 | null | null |
RHSA-2022:0892 | Red Hat Security Advisory: libarchive security update | libarchive: extracting a symlink with ACLs modifies ACLs of target libarchive: symbolic links incorrectly followed when changing modes, times, ACL and flags of a file while extracting an archive | [
"cpe:/a:redhat:enterprise_linux:8::crb",
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 7.1 | null | null |
RHSA-2003:193 | Red Hat Security Advisory: kdelibs security update | security flaw | [
"cpe:/o:redhat:enterprise_linux:2.1::as",
"cpe:/o:redhat:enterprise_linux:2.1::aw",
"cpe:/o:redhat:enterprise_linux:2.1::es",
"cpe:/o:redhat:enterprise_linux:2.1::ws"
] | null | null | null | null |
RHSA-2024:0125 | Red Hat Security Advisory: tomcat security update | tomcat: Open Redirect vulnerability in FORM authentication tomcat: FileUpload: DoS due to accumulation of temporary files on Windows tomcat: improper cleaning of recycled objects could lead to information leak tomcat: incorrectly parsed http trailer headers can cause request smuggling | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 5.3 | null | null |
RHSA-2024:1388 | Red Hat Security Advisory: ovn23.03 security update | ovn: insufficient validation of BFD packets may lead to denial of service | [
"cpe:/o:redhat:enterprise_linux:8::fastdatapath"
] | null | 6.5 | null | null |
RHSA-2017:3244 | Red Hat Security Advisory: Red Hat JBoss Data Grid 7.1.1 security update | client: unchecked deserialization in marshaller util undertow: IO thread DoS via unclean Websocket closing log4j: Socket receiver deserialization vulnerability Solr: Code execution via entity expansion log4j: deserialization of untrusted data in SocketServer | [
"cpe:/a:redhat:jboss_data_grid:7.1"
] | null | 9.8 | 9.8 | null |
RHSA-2019:2110 | Red Hat Security Advisory: rsyslog security and bug fix update | rsyslog: imptcp: integer overflow when Octet-Counted TCP Framing is enabled | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 5.3 | null |
RHSA-2022:6224 | Red Hat Security Advisory: openssl security and bug fix update | openssl: c_rehash script allows command injection openssl: Signer certificate verification returns inaccurate response when using OCSP_NOCHECKS openssl: OPENSSL_LH_flush() breaks reuse of memory openssl: the c_rehash script allows command injection openssl: AES OCB fails to encrypt some bytes | [
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/o:redhat:enterprise_linux:9::baseos"
] | null | 5.3 | null | null |
RHSA-2021:2380 | Red Hat Security Advisory: servicemesh-operator security update | servicemesh-operator: NetworkPolicy resources incorrectly specify ports for ingress resources | [
"cpe:/a:redhat:service_mesh:2.0::el8"
] | null | 9.8 | null | null |
RHSA-2010:0755 | Red Hat Security Advisory: cups security update | xpdf/poppler: ImageStream:: ImageStream integer overflow xpdf: uninitialized Gfx::parser pointer dereference | [
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2024:1802 | Red Hat Security Advisory: unbound security update | unbound: unrestricted reconfiguration enabled to anyone that may lead to local privilege escalation | [
"cpe:/a:redhat:rhel_eus:8.8::appstream"
] | null | 8 | null | null |
RHSA-2023:4172 | Red Hat Security Advisory: java-1.8.0-openjdk security update | OpenJDK: array indexing integer overflow issue (8304468) OpenJDK: improper handling of slash characters in URI-to-path conversion (8305312) | [
"cpe:/a:redhat:rhel_aus:8.4::appstream",
"cpe:/a:redhat:rhel_e4s:8.4::appstream",
"cpe:/a:redhat:rhel_tus:8.4::appstream"
] | null | 3.7 | null | null |
RHSA-2017:0190 | Red Hat Security Advisory: firefox security update | Mozilla: Memory safety bugs fixed in Firefox 51 and Firefox ESR 45.7 (MFSA 2017-01) Mozilla: Excessive JIT code allocation allows bypass of ASLR and DEP (MFSA 2017-02) Mozilla: Use-after-free in XSL (MFSA 2017-02) Mozilla: Pointer and frame data leakage of Javascript objects (MFSA 2017-02) Mozilla: Potential use-after-free during DOM manipulations (MFSA 2017-02) Mozilla: Location bar spoofing with unicode characters (MFSA 2017-02) Mozilla: WebExtensions can use data: protocol to affect other extensions (MFSA 2017-02) Mozilla: Insecure communication methods in Developer Tools JSON viewer (MFSA 2017-02) Mozilla: Use-after-free with Media Decoder (MFSA 2017-02) | [
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::server",
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation",
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 9.8 | null |
RHSA-2021:4686 | Red Hat Security Advisory: webkit2gtk3 security update | webkitgtk: Use-after-free leading to arbitrary code execution | [
"cpe:/a:redhat:rhel_eus:8.1::appstream"
] | null | 8.8 | null | null |
RHSA-2019:1700 | Red Hat Security Advisory: python27-python security update | python: Undocumented local_file protocol allows remote attackers to bypass protection mechanisms python: regression of CVE-2019-9636 due to functional fix to allow port numbers in netloc | [
"cpe:/a:redhat:rhel_software_collections:3::el6",
"cpe:/a:redhat:rhel_software_collections:3::el7"
] | null | null | 9.8 | null |
RHSA-2021:0219 | Red Hat Security Advisory: sudo security update | sudo: Heap buffer overflow in argument parsing | [
"cpe:/o:redhat:rhel_eus:8.2::baseos"
] | null | 7.8 | null | null |
RHSA-2024:4622 | Red Hat Security Advisory: libndp security update | libndp: buffer overflow in route information length field | [
"cpe:/o:redhat:rhel_els:7"
] | null | 8.1 | null | null |
RHSA-2024:2394 | Red Hat Security Advisory: kernel security, bug fix, and enhancement update | kernel: Bluetooth BR/EDR PIN Pairing procedure is vulnerable to an impersonation attack kernel: memcg does not limit the number of POSIX file locks allowing memory exhaustion kernel: vmwgfx: NULL pointer dereference in vmw_cmd_dx_define_query kernel: integer overflow in l2cap_config_req() in net/bluetooth/l2cap_core.c kernel: Bluetooth: L2CAP: Fix u8 overflow kernel: hwmon: (coretemp) fix pci device refcount leak in nv1a_ram_new() kernel: use after free in vcs_read in drivers/tty/vt/vc_screen.c due to race kernel: cxgb4: use-after-free in ch_flower_stats_cb() kernel: netfilter: nf_tables: out-of-bounds access in nf_tables_newtable() kernel: NVMe: info leak due to out-of-bounds read in nvmet_ctrl_find_get kernel: local dos vulnerability in scatterwalk_copychunks kernel: GC's deletion of an SKB races with unix_stream_read_generic() leading to UAF kernel: GSM multiplexing race condition leads to privilege escalation kernel: null pointer dereference vulnerability in nft_dynset_init() kernel: Null Pointer Dereference vulnerability in ida_free in lib/idr.c kernel: Out of boundary write in perf_read_group() as result of overflow a perf_event's read_size kernel: use-after-free in IPv4 IGMP kernel: Bluetooth Forward and Future Secrecy Attacks and Defenses kernel: irdma: Improper access control Kernel: double free in hci_conn_cleanup of the bluetooth subsystem kernel: Bluetooth: HCI: global out-of-bounds access in net/bluetooth/hci_sync.c kernel: race condition between HCIUARTSETPROTO and HCIUARTGETPROTO in hci_uart_tty_ioctl kernel: usb: out-of-bounds read in read_descriptors kernel: netfilter: nftables out-of-bounds read in nf_osf_match_one() kernel: netfilter: xtables sctp out-of-bounds read in match_flags() kernel: xfrm: out-of-bounds read in __xfrm_state_filter_match() kernel: QXL: race condition leading to use-after-free in qxl_mode_dumb_create() kernel: ipv4: NULL pointer dereference in ipv4_send_dest_unreach() kernel: netfilter: race condition between IPSET_CMD_ADD and IPSET_CMD_SWAP kernel: lib/kobject.c vulnerable to fill_kobj_path out-of-bounds write kernel: NULL pointer dereference vulnerability in io_uring_show_fdinfo kernel: use-after-free during a race condition between a nonblocking atomic commit and a driver unload in drivers/gpu/drm/drm_atomic.c kernel: bluetooth: bt_sock_ioctl race condition leads to use-after-free in bt_sock_recvmsg kernel: use-after-free in net/atm/ioctl.c kernel: smb: client: fix potential OOBs in smb2_parse_contexts() kernel: gfs2: Fix kernel NULL pointer dereference in gfs2_rgrp_dump kernel: intel: Fix NULL pointer dereference issue in upi_fill_topology() kernel: perf/x86/lbr: Filter vsyscall addresses kernel: mm/sparsemem: fix race in accessing memory_section->usage kernel: net: fix possible store tearing in neigh_periodic_work() kernel: HID: sony: Fix a potential memory leak in sony_probe() kernel: team: NULL pointer dereference when team device type is changed kernel: net: bridge: data races indata-races in br_handle_frame_finish() kernel: net/core: kernel crash in ETH_P_1588 flow dissector kernel: netfilter: nf_tables: memory leak when more than 255 elements expired kernel: KVM: s390: fix setting of fpc register kernel: net/sched: act_ct: fix skb leak and crash on ooo frags kernel: netfilter: nf_tables: disallow timeout for anonymous sets kernel: CIFS Filesystem Decryption Improper Input Validation Remote Code Execution Vulnerability in function receive_encrypted_standard of client kernel: hugetlbfs: Null pointer dereference in hugetlbfs_fill_super function kernel: nf_tables: use-after-free vulnerability in the nft_setelem_catchall_deactivate() function kernel: nf_tables: use-after-free vulnerability in the nft_verdict_init() function kernel: untrusted VMM can trigger int80 syscall handling kernel: tls: use-after-free with partial reads and async decrypt kernel: tls: race between async notify and socket close kernel: tls: handle backlogging of crypto requests kernel: tls: race between tx work scheduling and socket close kernel: mlxsw: spectrum_acl_tcam: Fix stack corruption kernel: i2c: i801: Fix block process call transactions kernel: sched/membarrier: reduce the ability to hammer on sys_membarrier kernel: netfilter: nf_tables: reject QUEUE/DROP verdict parameters kernel: ip6_tunnel: fix NEXTHDR_FRAGMENT handling in ip6_tnl_parse_tlv_enc_lim() kernel: blk-mq: fix IO hang from sbitmap wakeup race kernel: i40e: Do not allow untrusted VF to remove administratively set MAC | [
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::crb",
"cpe:/a:redhat:enterprise_linux:9::nfv",
"cpe:/a:redhat:enterprise_linux:9::realtime",
"cpe:/o:redhat:enterprise_linux:9::baseos"
] | null | 4.4 | null | null |
RHSA-2021:1214 | Red Hat Security Advisory: libldb security update | samba: Out of bounds read in AD DC LDAP server | [
"cpe:/o:redhat:rhel_eus:8.1::baseos"
] | null | 7.1 | null | null |
RHSA-2023:2653 | Red Hat Security Advisory: webkit2gtk3 security update | webkitgtk: Regression of CVE-2023-28205 fixes in the Red Hat Enterprise Linux | [
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 8.8 | null | null |
RHSA-2024:8856 | Red Hat Security Advisory: kernel security update | kernel: xprtrdma: fix pointer derefs in error cases of rpcrdma_ep_create kernel: gso: do not skip outer ip header in case of ipip and net_failover kernel: dmaengine: fix NULL pointer in channel unregistration function kernel: net/bluetooth: race condition in conn_info_{min,max}_age_set() kernel: netfilter: nf_conntrack_h323: Add protection for bmp length out of range kernel: netfilter: nft_set_pipapo: do not free live element kernel: KVM: Always flush async #PF workqueue when vCPU is being destroyed kernel: netfilter: nft_set_pipapo: walk over current view on netlink dump kernel: nouveau: lock the client object tree. kernel: netfilter: bridge: replace physindev with physinif in nf_bridge_info kernel: netfilter: nf_tables: Fix potential data-race in __nft_flowtable_type_get() kernel: dma-direct: Leak pages on dma_set_decrypted() failure kernel: bnxt_re: avoid shift undefined behavior in bnxt_qplib_alloc_init_hwq kernel: of: module: add buffer overflow check in of_modalias() kernel: r8169: Fix possible ring buffer corruption on fragmented Tx packets. kernel: net/mlx5e: Fix netif state handling kernel: netfilter: ipset: Fix race between namespace cleanup and gc in the list:set type kernel: drm/i915/dpt: Make DPT object unshrinkable kernel: ipv6: prevent possible NULL deref in fib6_nh_init() kernel: tipc: force a dst refcount before doing decryption kernel: ACPICA: Revert "ACPICA: avoid Info: mapping multiple BARs. Your kernel is fine." kernel: bpf: Fix overrunning reservations in ringbuf kernel: netfilter: nf_tables: prefer nft_chain_validate kernel: ibmvnic: Add tx check to prevent skb leak kernel: drm/i915/gt: Fix potential UAF by revoke of fence registers kernel: drm/amdgpu: avoid using null object of framebuffer kernel: netfilter: nf_tables: fully validate NFT_DATA_VALUE on store to data registers kernel: gfs2: Fix NULL pointer dereference in gfs2_log_flush kernel: USB: serial: mos7840: fix crash on resume kernel: tipc: Return non-zero value from tipc_udp_addr2str() on error kernel: kobject_uevent: Fix OOB access within zap_modalias_env() kernel: dev/parport: fix the array out-of-bounds risk kernel: block: initialize integrity buffer to zero before writing it to media kernel: mlxsw: spectrum_acl_erp: Fix object nesting warning kernel: padata: Fix possible divide-by-0 panic in padata_mt_helper() kernel: memcg: protect concurrent access to mem_cgroup_idr kernel: sctp: Fix null-ptr-deref in reuseport_add_sock(). kernel: bonding: fix xfrm real_dev null pointer dereference kernel: bonding: fix null pointer deref in bond_ipsec_offload_ok kernel: netfilter: flowtable: initialise extack before use kernel: ethtool: check device is present when getting link settings kernel: ELF: fix kernel.randomize_va_space double read kernel: lib/generic-radix-tree.c: Fix rare race in __genradix_ptr_alloc() | [
"cpe:/a:redhat:enterprise_linux:8::crb",
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 4.7 | null | null |
RHSA-2022:8222 | Red Hat Security Advisory: xorg-x11-server-Xwayland security update | xorg-x11-server: X.Org Server ProcXkbSetGeometry out-of-bounds access xorg-x11-server: out-of-bounds access in ProcXkbSetDeviceInfo request handler of the Xkb extension | [
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 7.8 | null | null |
RHSA-2007:1037 | Red Hat Security Advisory: openldap security and enhancement update | openldap slapd DoS via objectClasses attribute | [
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2021:0831 | Red Hat Security Advisory: rh-nodejs12-nodejs security update | nodejs: HTTP2 'unknownProtocol' cause DoS by resource exhaustion nodejs: DNS rebinding in --inspect | [
"cpe:/a:redhat:rhel_software_collections:3::el7"
] | null | 7.5 | null | null |
RHSA-2018:1933 | Red Hat Security Advisory: chromium-browser security update | chromium-browser: Out of bounds write in V8 | [
"cpe:/a:redhat:rhel_extras:6"
] | null | null | 8.8 | null |
RHEA-2021:2679 | Red Hat Enhancement Advisory: ACS 3.62 enhancement update | golang: net/http: panic in ReadRequest and ReadResponse when reading a very large header | [
"cpe:/a:redhat:advanced_cluster_security:3.62::el8"
] | null | 5.9 | null | null |
RHSA-2016:2042 | Red Hat Security Advisory: python-django security update | python-django: CSRF protection bypass on a site with Google Analytics | [
"cpe:/a:redhat:openstack:8::el7"
] | null | null | 6.1 | null |
RHSA-2023:7029 | Red Hat Security Advisory: libX11 security update | libX11: InitExt.c can overwrite unintended portions of the Display structure if the extension request leads to a buffer overflow | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 7.3 | null | null |
RHSA-2022:5475 | Red Hat Security Advisory: thunderbird security update | Mozilla: Undesired attributes could be set as part of prototype pollution Mozilla: An email with a mismatching OpenPGP signature date was accepted as valid Mozilla: CSP bypass enabling stylesheet injection Mozilla: CSP sandbox header without `allow-scripts` can be bypassed via retargeted javascript: URI Mozilla: Use-after-free in nsSHistory Mozilla: Unavailable PAC file resulted in OCSP requests being blocked Mozilla: A popup window could be resized in a way to overlay the address bar with web content Mozilla: Potential integer overflow in ReplaceElementsAt Mozilla: Memory safety bugs fixed in Firefox 102 and Firefox ESR 91.11 | [
"cpe:/a:redhat:rhel_eus:8.2::appstream"
] | null | 8.8 | 7.5 | null |
RHSA-2023:6784 | Red Hat Security Advisory: Node Health Check Operator 0.6.1 security update | golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487) HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack) | [
"cpe:/a:redhat:workload_availability_node_healthcheck:0.6::el8"
] | null | 7.5 | null | null |
RHSA-2001:060 | Red Hat Security Advisory: : Updated Kerberos 5 packages available | security flaw | [
"cpe:/o:redhat:linux:6.2",
"cpe:/o:redhat:linux:7.0",
"cpe:/o:redhat:linux:7.1"
] | null | null | null | null |
RHSA-2025:1230 | Red Hat Security Advisory: kernel-rt security update | kernel: media: uvcvideo: Skip parsing frames of type UVC_VS_UNDEFINED in uvc_parse_format | [
"cpe:/a:redhat:enterprise_linux:8::nfv",
"cpe:/a:redhat:enterprise_linux:8::realtime"
] | null | 7.3 | null | null |
RHSA-2007:0336 | Red Hat Security Advisory: postgresql security update | PostgreSQL security-definer function privilege escalation | [
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws",
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws",
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2024:0249 | Red Hat Security Advisory: java-21-openjdk security update | OpenJDK: array out-of-bounds access due to missing range check in C1 compiler (8314468) OpenJDK: JVM class file verifier flaw allows unverified bytecode execution (8314295) OpenJDK: range check loop optimization issue (8314307) OpenJDK: logging of digital signature private keys (8316976) OpenJDK: RSA padding issue and timing side-channel attack against TLS (8317547) | [
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::crb"
] | null | 7.4 | null | null |
RHSA-2023:3262 | Red Hat Security Advisory: sudo security update | sudo: arbitrary file write with privileges of the RunAs user | [
"cpe:/o:redhat:rhel_aus:7.6::server"
] | null | 7.8 | null | null |
RHSA-2015:1840 | Red Hat Security Advisory: openldap security update | openldap: ber_get_next denial of service vulnerability | [
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server",
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation",
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | null | null |
RHBA-2019:0763 | Red Hat Bug Fix Advisory: redhat-virtualization-host security update | python: Information Disclosure due to urlsplit improper NFKC normalization | [
"cpe:/o:redhat:enterprise_linux:7::hypervisor"
] | null | null | 9.8 | null |
RHSA-2019:0218 | Red Hat Security Advisory: firefox security update | Mozilla: Use-after-free parsing HTML5 stream Mozilla: Memory safety bugs fixed in Firefox 65 and Firefox ESR 60.5 Mozilla: Privilege escalation through IPC channel messages | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | 10 | null |
RHSA-2024:1832 | Red Hat Security Advisory: squid:4 security update | squid: Denial of Service in HTTP Chunked Decoding squid: denial of service in HTTP header parser | [
"cpe:/a:redhat:rhel_aus:8.4::appstream",
"cpe:/a:redhat:rhel_e4s:8.4::appstream",
"cpe:/a:redhat:rhel_tus:8.4::appstream"
] | null | 8.6 | null | null |
RHSA-2021:5055 | Red Hat Security Advisory: thunderbird security update | Mozilla: Memory safety bugs fixed in Firefox 95 and Firefox ESR 91.4 Mozilla: JavaScript unexpectedly enabled for the composition area Mozilla: URL leakage when navigating while executing asynchronous function Mozilla: Heap buffer overflow when using structured clone Mozilla: Missing fullscreen and pointer lock notification when requesting both Mozilla: GC rooting failure when calling wasm instance methods Mozilla: External protocol handler parameters were unescaped Mozilla: XMLHttpRequest error codes could have leaked the existence of an external protocol handler Mozilla: Bypass of CSP sandbox directive when embedding Mozilla: Denial of Service when using the Location API in a loop Mozilla: Cursor spoofing could overlay user interface when native cursor is zoomed | [
"cpe:/a:redhat:rhel_e4s:8.1::appstream"
] | null | 5.4 | 6.1 | null |
RHSA-2022:0482 | Red Hat Security Advisory: Red Hat Ansible Ansible Tower 3.8 security update | ansible-tower: Privilege escalation via job isolation escape | [
"cpe:/a:redhat:ansible_automation_platform:3.8::el7",
"cpe:/a:redhat:ansible_automation_platform:3.8::el8"
] | null | 8.8 | null | null |
RHSA-2024:0962 | Red Hat Security Advisory: thunderbird security update | Mozilla: Out-of-bounds memory read in networking channels Mozilla: Alert dialog could have been spoofed on another site Mozilla: Fullscreen Notification could have been hidden by select element Mozilla: Custom cursor could obscure the permission dialog Mozilla: Mouse cursor re-positioned unexpectedly could have led to unintended permission grants Mozilla: Multipart HTTP Responses would accept the Set-Cookie header in response parts Mozilla: Incorrect code generation on 32-bit ARM devices Mozilla: Memory safety bugs fixed in Firefox 123, Firefox ESR 115.8, and Thunderbird 115.8 | [
"cpe:/a:redhat:rhel_eus:9.0::appstream"
] | null | 7.5 | null | null |
RHSA-2019:4018 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.2.5 on RHEL 6 security update | HTTP/2: large amount of data requests leads to denial of service HTTP/2: flood using PING frames results in unbounded memory growth HTTP/2: flood using HEADERS frames results in unbounded memory growth HTTP/2: flood using SETTINGS frames results in unbounded memory growth wildfly-core: Incorrect privileges for 'Monitor', 'Auditor' and 'Deployer' user by default wildfly-security-manager: security manager authorization bypass | [
"cpe:/a:redhat:jboss_enterprise_application_platform:7.2::el6"
] | null | null | 7.5 | null |
RHSA-2018:3242 | Red Hat Security Advisory: glusterfs security, bug fix, and enhancement update | glusterfs: Improper deserialization in dict.c:dict_unserialize() can allow attackers to read arbitrary memory | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 6.5 | null |
RHSA-2014:1255 | Red Hat Security Advisory: krb5 security update | krb5: buffer overrun in kadmind with LDAP backend (MITKRB5-SA-2014-001) | [
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2024:3925 | Red Hat Security Advisory: Red Hat Ceph Storage 7.1 security, enhancements, and bug fix update | grafana: account takeover possible when using Azure AD OAuth grafana: incorrect assessment of permissions across organizations go-git: Maliciously crafted Git server replies can cause DoS on go-git clients go-git: Maliciously crafted Git server replies can lead to path traversal and RCE on go-git clients | [
"cpe:/a:redhat:ceph_storage:7.1::el8",
"cpe:/a:redhat:ceph_storage:7.1::el9"
] | null | 8.1 | null | null |
RHSA-2011:1401 | Red Hat Security Advisory: xen security and bug fix update | qemu: local DoS with SCSI CD-ROM | [
"cpe:/a:redhat:rhel_virtualization:5::client",
"cpe:/a:redhat:rhel_virtualization:5::server",
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2009:1193 | Red Hat Security Advisory: kernel security and bug fix update | kernel: non-root can trigger cpu_idle soft lockup kernel: e1000_clean_rx_irq() denial of service kernel: do_coredump() vs ptrace_start() deadlock kernel: r8169: fix crash when large packets are received kernel: personality: fix PER_CLEAR_ON_SETID kernel: ecryptfs stack overflow in parse_tag_11_packet() kernel: ecryptfs heap overflow in parse_tag_3_packet() | [
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::server",
"cpe:/o:redhat:rhel_eus:5.3"
] | null | null | null | null |
RHSA-2020:0568 | Red Hat Security Advisory: ksh security update | ksh: certain environment variables interpreted as arithmetic expressions on startup, leading to code injection | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 7.4 | null | null |
RHSA-2016:0489 | Red Hat Security Advisory: Red Hat OpenShift Enterprise 2.2.9 security, bug fix, and enhancement update | ObjectMessage: unsafe deserialization jenkins: Project name disclosure via fingerprints (SECURITY-153) jenkins: Public value used for CSRF protection salt (SECURITY-169) jenkins: XXE injection into job configurations via CLI (SECURITY-173) jenkins: Secret key not verified when connecting a slave (SECURITY-184) jenkins: Information disclosure via sidepanel (SECURITY-192) jenkins: Local file inclusion vulnerability (SECURITY-195) jenkins: API tokens of other users available to admins (SECURITY-200) jenkins: Queue API did show items not visible to the current user (SECURITY-186) jenkins: JNLP slaves not subject to slave-to-master access control (SECURITY-206) jenkins: Stored XSS vulnerability in slave offline status message (SECURITY-214) jenkins: CSRF vulnerability in some administrative actions (SECURITY-225) jenkins: CSRF protection ineffective (SECURITY-233) jenkins: Jenkins plugin manager vulnerable to MITM attacks (SECURITY-234) jenkins: Remote code execution vulnerability due to unsafe deserialization in Jenkins remoting (SECURITY-218) | [
"cpe:/a:redhat:openshift:2.0::el6"
] | null | null | null | null |
RHSA-2020:2049 | Red Hat Security Advisory: thunderbird security update | usrsctp: Buffer overflow in AUTH chunk input validation Mozilla: Use-after-free during worker shutdown Mozilla: Arbitrary local file access with 'Copy as cURL' Mozilla: Memory safety bugs fixed in Firefox 76 and Firefox ESR 68.8 Mozilla: Sender Email Address Spoofing using encoded Unicode characters | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | 4.3 | 6.1 | null |
RHSA-2021:4057 | Red Hat Security Advisory: python3 security update | python: urllib: Regular expression DoS in AbstractBasicAuthHandler | [
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 6.5 | null | null |
RHSA-2022:4919 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.4.5 security update on RHEL 8 | jackson-databind: denial of service via a large depth of nested objects netty-codec: Bzip2Decoder doesn't allow setting size restrictions for decompressed data netty-codec: SnappyFrameDecoder doesn't restrict chunk length and may buffer skippable chunks in an unnecessary way h2: Remote Code Execution in Console netty: control chars in header names may lead to HTTP request smuggling xnio: org.xnio.StreamConnection.notifyReadClosed log to debug instead of stderr jboss-client: memory leakage in remote client transaction wildfly: Wildfly management of EJB Session context returns wrong caller principal with Elytron Security enabled undertow: Double AJP response for 400 from EAP 7 results in CPING failures OpenJDK: Infinite loop related to incorrect handling of newlines in XMLEntityScanner (JAXP, 8270646) mysql-connector-java: Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Connectors h2: Loading of custom classes from remote servers through JNDI xerces-j2: infinite loop when handling specially crafted XML document payloads artemis-commons: Apache ActiveMQ Artemis DoS Moment.js: Path traversal in moment.locale | [
"cpe:/a:redhat:jboss_enterprise_application_platform:7.4::el8"
] | null | 7.5 | null | null |
RHSA-2021:3638 | Red Hat Security Advisory: nodejs:12 security and bug fix update | c-ares: Missing input validation of host names may lead to domain hijacking libuv: out-of-bounds read in uv__idna_toascii() can lead to information disclosures or crashes nodejs: Use-after-free on close http2 on stream canceling nodejs: Improper handling of untypical characters in domain names nodejs: Incomplete validation of tls rejectUnauthorized parameter nodejs: Use-after-free on close http2 on stream canceling nodejs-path-parse: ReDoS via splitDeviceRe, splitTailRe and splitPathRe nodejs-hosted-git-info: Regular Expression denial of service via shortcutMatch in fromUrl() nodejs-ssri: Regular expression DoS (ReDoS) when parsing malicious SRI in strict mode nodejs-tar: Insufficient symlink protection allowing arbitrary file creation and overwrite nodejs-tar: Insufficient absolute path sanitization allowing arbitrary file creation and overwrite | [
"cpe:/a:redhat:rhel_eus:8.2::appstream"
] | null | 8.1 | null | null |
RHSA-2023:0048 | Red Hat Security Advisory: grub2 security and bug fix update | grub2: Buffer overflow in grub_font_construct_glyph() can lead to out-of-bound write and possible secure boot bypass grub2: Heap based out-of-bounds write when redering certain unicode sequences | [
"cpe:/o:redhat:rhel_eus:8.6::baseos"
] | null | 7.1 | null | null |
RHSA-2022:0271 | Red Hat Security Advisory: polkit security update | polkit: Local privilege escalation in pkexec due to incorrect handling of argument vector | [
"cpe:/o:redhat:rhel_aus:7.6::server",
"cpe:/o:redhat:rhel_e4s:7.6::server",
"cpe:/o:redhat:rhel_tus:7.6::server"
] | null | 7.8 | null | null |
RHSA-2021:5094 | Red Hat Security Advisory: OpenShift Container Platform 3.11.z security update | log4j-core: Remote code execution in Log4j 2.x when logs contain an attacker-controlled string value log4j-core: DoS in log4j 2.x with thread context message pattern and context lookup pattern (incomplete fix for CVE-2021-44228) | [
"cpe:/a:redhat:openshift:3.11::el7"
] | null | 8.1 | null | null |
RHSA-2016:0447 | Red Hat Security Advisory: samba security and bug fix update | samba: Incorrect ACL get/set allowed on symlink path | [
"cpe:/a:redhat:storage:3.1:samba:el6",
"cpe:/a:redhat:storage:3.1:samba:el7"
] | null | null | null | null |
RHSA-2007:0012 | Red Hat Security Advisory: kernel security update | security flaw security flaw | [
"cpe:/o:redhat:enterprise_linux:2.1::as",
"cpe:/o:redhat:enterprise_linux:2.1::aw"
] | null | null | null | null |
Subsets and Splits