id
stringlengths 13
15
| title
stringlengths 29
176
| description
stringlengths 8
31.7k
| cpes
sequencelengths 0
20
| cvss_v4_0
null | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
null |
---|---|---|---|---|---|---|---|
RHSA-2014:1161 | Red Hat Security Advisory: Red Hat Enterprise Virtualization Manager 3.4.2 update | Engine: XML eXternal Entity (XXE) flaw in backend module | [
"cpe:/a:redhat:rhev_manager:3"
] | null | null | null | null |
RHSA-2002:178 | Red Hat Security Advisory: : Updated mailman packages close cross-site scripting vulnerability | security flaw | [
"cpe:/a:redhat:secure_web_server:3.2"
] | null | null | null | null |
RHSA-2024:10384 | Red Hat Security Advisory: tuned security update | tuned: `script_pre` and `script_post` options allow to pass arbitrary scripts executed by root tuned: improper sanitization of `instance_name` parameter of the `instance_create()` method | [
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::nfv",
"cpe:/a:redhat:enterprise_linux:9::realtime",
"cpe:/a:redhat:enterprise_linux:9::sap",
"cpe:/a:redhat:enterprise_linux:9::sap_hana",
"cpe:/o:redhat:enterprise_linux:9::baseos"
] | null | 5.5 | null | null |
RHSA-2021:2763 | Red Hat Security Advisory: OpenShift Container Platform 4.7.21 security and bug fix update | An update is now available for Red Hat OpenShift Container Platform 4.7.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. | [
"cpe:/a:redhat:openshift:4.7::el7",
"cpe:/a:redhat:openshift:4.7::el8"
] | null | null | null | null |
RHSA-2022:6178 | Red Hat Security Advisory: firefox security update | Mozilla: Address bar spoofing via XSLT error handling Mozilla: Cross-origin XSLT Documents would have inherited the parent's permissions Mozilla: Data race and potential use-after-free in PK11_ChangePW Mozilla: Memory safety bugs fixed in Firefox 104 and Firefox ESR 102.2 Mozilla: Memory safety bugs fixed in Firefox 104, Firefox ESR 102.2, and Firefox ESR 91.13 | [
"cpe:/a:redhat:rhel_e4s:8.1::appstream"
] | null | 8.8 | 7.5 | null |
RHSA-2017:1615 | Red Hat Security Advisory: kernel security and bug fix update | Kernel: Kvm: vmx/svm potential privilege escalation inside guest kernel: ipv4/tcp: Infinite loop in tcp_splice_read() kernel: net: Heap overflow in skb_to_sgvec in macsec.c kernel: nfsd: Incorrect handling of long RPC replies kernel: NFSv3 server does not properly handle payload bounds checking of WRITE requests | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 6.5 | null |
RHBA-2021:1365 | Red Hat Bug Fix Advisory: OpenShift Container Platform 4.7.9 bug fix update | gogo/protobuf: plugin/unmarshal/unmarshal.go lacks certain index validation | [
"cpe:/a:redhat:openshift:4.7::el8"
] | null | 8.6 | null | null |
RHSA-2021:1227 | Red Hat Security Advisory: OpenShift Container Platform 4.7.8 security and extras update | gogo/protobuf: plugin/unmarshal/unmarshal.go lacks certain index validation | [
"cpe:/a:redhat:openshift:4.7::el8"
] | null | 8.6 | null | null |
RHSA-2024:10966 | Red Hat Security Advisory: ruby:3.1 security update | rexml: REXML ReDoS vulnerability | [
"cpe:/a:redhat:rhel_eus:8.8::appstream"
] | null | 7.5 | null | null |
RHSA-2023:1923 | Red Hat Security Advisory: kpatch-patch security update | kernel: net/ulp: use-after-free in listening ULP sockets | [
"cpe:/o:redhat:rhel_eus:8.6::baseos"
] | null | 7.8 | null | null |
RHSA-2024:2562 | Red Hat Security Advisory: golang security update | golang: net/http, x/net/http2: unlimited number of CONTINUATION frames causes DoS golang: net/http/cookiejar: incorrect forwarding of sensitive headers and cookies on HTTP redirect golang: net/http: golang: mime/multipart: golang: net/textproto: memory exhaustion in Request.ParseMultipartForm golang-fips/openssl: Memory leaks in code encrypting and decrypting RSA payloads golang: crypto/x509: Verify panics on certificates with an unknown public key algorithm golang: net/mail: comments in display names are incorrectly handled golang: html/template: errors returned from MarshalJSON methods may break template escaping | [
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 6.5 | null | null |
RHSA-2021:3623 | Red Hat Security Advisory: nodejs:12 security and bug fix update | c-ares: Missing input validation of host names may lead to domain hijacking nodejs: Use-after-free on close http2 on stream canceling nodejs: Improper handling of untypical characters in domain names nodejs: Incomplete validation of tls rejectUnauthorized parameter nodejs: Use-after-free on close http2 on stream canceling nodejs-path-parse: ReDoS via splitDeviceRe, splitTailRe and splitPathRe nodejs-tar: Insufficient symlink protection allowing arbitrary file creation and overwrite nodejs-tar: Insufficient absolute path sanitization allowing arbitrary file creation and overwrite | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 8.1 | null | null |
RHSA-2022:2194 | Red Hat Security Advisory: .NET Core 3.1 on RHEL 7 security and bugfix update | dotnet: excess memory allocation via HttpClient causes DoS dotnet: malicious content causes high CPU and memory usage dotnet: parsing HTML causes Denial of Service | [
"cpe:/a:redhat:rhel_dotnet:3.1::el7"
] | null | 7.5 | null | null |
RHSA-2003:395 | Red Hat Security Advisory: gnupg security update | security flaw | [
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws"
] | null | null | null | null |
RHSA-2022:7069 | Red Hat Security Advisory: firefox security update | Mozilla: Same-origin policy violation could have leaked cross-origin URLs Mozilla: Memory Corruption in JS Engine Mozilla: Denial of Service via window.print Mozilla: Memory safety bugs fixed in Firefox ESR 102.4 and Thunderbird 102.4 | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 8.8 | 6.1 | null |
RHSA-2014:0631 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 6.2.3 security update | openssl: SSL/TLS MITM vulnerability | [
"cpe:/a:redhat:jboss_enterprise_application_platform:6.2"
] | null | null | null | null |
RHSA-2017:2798 | Red Hat Security Advisory: kernel security update | kernel: load_elf_ binary() does not take account of the need to allocate sufficient space for the entire binary | [
"cpe:/o:redhat:rhel_aus:6.5::server",
"cpe:/o:redhat:rhel_tus:6.5::server"
] | null | null | 7.8 | null |
RHSA-2009:1156 | Red Hat Security Advisory: httpd security update | httpd: AllowOverride Options=IncludesNoExec allows Options Includes httpd: mod_proxy reverse proxy DoS (infinite loop) httpd: possible temporary DoS (CPU consumption) in mod_deflate | [
"cpe:/a:redhat:rhel_application_stack:2"
] | null | null | null | null |
RHSA-2022:5648 | Red Hat Security Advisory: kpatch-patch security update | kernel: a use-after-free write in the netfilter subsystem can lead to privilege escalation to root | [
"cpe:/o:redhat:rhel_e4s:8.1::baseos"
] | null | 7.8 | null | null |
RHSA-2018:3643 | Red Hat Security Advisory: kernel security update | kernel: Integer overflow in Linux's create_elf_tables function | [
"cpe:/o:redhat:rhel_aus:6.4::server"
] | null | null | 7.8 | null |
RHSA-2023:5475 | Red Hat Security Advisory: thunderbird security update | firefox: use-after-free in workers Mozilla: Out-of-bounds write in PathOps Mozilla: Use-after-free in Ion Compiler Mozilla: Memory safety bugs fixed in Firefox 118, Firefox ESR 115.3, and Thunderbird 115.3 libvpx: Heap buffer overflow in vp8 encoding in libvpx | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 8.8 | null | null |
RHSA-2021:5038 | Red Hat Security Advisory: Red Hat Advanced Cluster Management 2.2.10 security updates and bug fixes | semver-regex: inefficient regular expression complexity nodejs-set-value: type confusion allows bypass of CVE-2019-10747 | [
"cpe:/a:redhat:acm:2.2::el7",
"cpe:/a:redhat:acm:2.2::el8"
] | null | 7.3 | null | null |
RHSA-2024:0292 | Red Hat Security Advisory: OpenShift Container Platform 4.14.10 security update | golang: crypto/tls: slow verification of certificate chains containing large RSA keys | [
"cpe:/a:redhat:openshift:4.14::el9"
] | null | 5.3 | null | null |
RHSA-2021:3459 | Red Hat Security Advisory: Red Hat Virtualization Host security and bug fix update [ovirt-4.4.8] | nodejs-lodash: ReDoS via the toNumber, trim and trimEnd functions nodejs-lodash: command injection via template | [
"cpe:/o:redhat:rhev_hypervisor:4.4::el8"
] | null | 7.2 | null | null |
RHSA-2006:0547 | Red Hat Security Advisory: squirrelmail security update | security flaw | [
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws",
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2008:0971 | Red Hat Security Advisory: net-snmp security update | net-snmp: numresponses calculation integer overflow in snmp_agent.c | [
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws",
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws",
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2024:3827 | Red Hat Security Advisory: buildah security and bug fix update | golang: net/http: golang: mime/multipart: golang: net/textproto: memory exhaustion in Request.ParseMultipartForm jose: resource exhaustion jose-go: improper handling of highly compressed data | [
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 4.3 | null | null |
RHSA-2024:5754 | Red Hat Security Advisory: OpenShift Container Platform 4.15.29 packages and security update | golang: math/big: uncontrolled memory consumption due to an unhandled overflow via Rat.SetString | [
"cpe:/a:redhat:openshift:4.15::el8",
"cpe:/a:redhat:openshift:4.15::el9"
] | null | 7.5 | null | null |
RHSA-2022:0443 | Red Hat Security Advisory: RHV-H security update (redhat-virtualization-host) 4.3.21 | samba: Active Directory (AD) domain user could become root on domain members polkit: Local privilege escalation in pkexec due to incorrect handling of argument vector | [
"cpe:/o:redhat:enterprise_linux:7::hypervisor"
] | null | 7.8 | null | null |
RHSA-2018:0399 | Red Hat Security Advisory: kernel security and bug fix update | kernel: Use-after-free vulnerability in DCCP socket | [
"cpe:/o:redhat:rhel_eus:7.3::computenode",
"cpe:/o:redhat:rhel_eus:7.3::server"
] | null | null | 7.8 | null |
RHSA-2015:1539 | Red Hat Security Advisory: Red Hat JBoss BPM Suite 6.1.2 update | Camel: XXE in via SAXSource expansion Camel: XXE via XPath expression evaluation dashbuilder: XXE/SSRF vulnerability | [
"cpe:/a:redhat:jboss_bpms:6.0"
] | null | null | null | null |
RHSA-2017:3442 | Red Hat Security Advisory: rh-mysql57-mysql security update | mysql: Server: Pluggable Auth unspecified vulnerability (CPU Oct 2017) mysql: Server: Replication unspecified vulnerability (CPU Oct 2017) mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2017) mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2017) mysql: Server: Replication unspecified vulnerability (CPU Oct 2017) mysql: Server: FTS unspecified vulnerability (CPU Oct 2017) mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2017) mysql: Server: Performance Schema unspecified vulnerability (CPU Oct 2017) mysql: Server: Stored Procedure unspecified vulnerability (CPU Oct 2017) mysql: Server: InnoDB unspecified vulnerability (CPU Oct 2017) mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2017) mysql: Server: DML unspecified vulnerability (CPU Oct 2017) mysql: Server: FTS unspecified vulnerability (CPU Oct 2017) mysql: Group Replication GCS unspecified vulnerability (CPU Oct 2017) mysql: Server: Memcached unspecified vulnerability (CPU Oct 2017) mysql: Server: InnoDB unspecified vulnerability (CPU Oct 2017) mysql: Server: InnoDB unspecified vulnerability (CPU Oct 2017) mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2017) mysql: Client programs unspecified vulnerability (CPU Oct 2017) mysql: Server: DDL unspecified vulnerability (CPU Oct 2017) mysql: Server: Partition unspecified vulnerability (CPU Jan 2018) mysql: Server : Partition unspecified vulnerability (CPU Jan 2018) | [
"cpe:/a:redhat:rhel_software_collections:3::el6",
"cpe:/a:redhat:rhel_software_collections:3::el7"
] | null | null | 4.9 | null |
RHSA-2010:0558 | Red Hat Security Advisory: firefox security update | Mozilla arbitrary free flaw | [
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2024:4015 | Red Hat Security Advisory: thunderbird security update | Mozilla: Use-after-free in JavaScript object transplant Mozilla: External protocol handlers leaked by timing attack Mozilla: Sandboxed iframes were able to bypass sandbox restrictions to open a new window Mozilla: Cross-Origin Image leak via Offscreen Canvas Mozilla: Memory Corruption in Text Fragments Mozilla: Memory safety bugs fixed in Firefox 127, Firefox ESR 115.12, and Thunderbird 115.12 Mozilla: Use-after-free in networking | [
"cpe:/a:redhat:rhel_e4s:9.0::appstream"
] | null | 7.5 | null | null |
RHSA-2014:1726 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 5.2.0 security update | Java: Java XML Signature DoS Attack | [
"cpe:/a:redhat:jboss_enterprise_application_platform:5::el4",
"cpe:/a:redhat:jboss_enterprise_application_platform:5::el5",
"cpe:/a:redhat:jboss_enterprise_application_platform:5::el6"
] | null | null | null | null |
RHSA-2016:0012 | Red Hat Security Advisory: gnutls security update | TLS 1.2 Transcipt Collision attacks against MD5 in key exchange protocol (SLOTH) | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation",
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | null | null |
RHSA-2024:6030 | Red Hat Security Advisory: python3 security update | python: incorrect IPv4 and IPv6 private ranges | [
"cpe:/a:redhat:rhel_eus:8.8::appstream",
"cpe:/o:redhat:rhel_eus:8.8::baseos"
] | null | 3.7 | null | null |
RHSA-2024:10677 | Red Hat Security Advisory: postgresql:13 security update | postgresql: PostgreSQL PL/Perl environment variable changes execute arbitrary code | [
"cpe:/a:redhat:rhel_aus:8.6::appstream",
"cpe:/a:redhat:rhel_e4s:8.6::appstream",
"cpe:/a:redhat:rhel_tus:8.6::appstream"
] | null | 8.8 | null | null |
RHSA-2023:4624 | Red Hat Security Advisory: Red Hat OpenShift Service Mesh Containers for 2.3.6 security update | envoy: OAuth2 credentials exploit with permanent validity envoy: gRPC access log crash caused by the listener draining envoy: CORS filter segfault when origin header is removed envoy: Incorrect handling of HTTP requests and responses with mixed case schemes envoy: HTTP/2 memory leak in nghttp2 codec | [
"cpe:/a:redhat:service_mesh:2.3::el8"
] | null | 7.5 | null | null |
RHSA-2010:0500 | Red Hat Security Advisory: firefox security, bug fix, and enhancement update | mozilla: in-session phishing attack Firefox: overlong UTF-8 seqence detection problem mozilla: XMLDocument:: load() doesn't check nsIContentPolicy (MFSA 2010-24) firefox: arbitrary code execution via memory corruption firefox: keystrokes sent to hidden frame rather than visible frame due to javascript flaw nsGenericDOMDataNode:: SetTextInternal Content-Disposition: attachment ignored if Content-Type: multipart also present Mozilla Freed object reuse across plugin instances Mozilla Integer Overflow in XSLT Node Sorting Mozilla Crashes with evidence of memory corruption Mozilla Crashes with evidence of memory corruption Mozilla Crashes with evidence of memory corruption | [
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2003:146 | Red Hat Security Advisory: kdebase security update | security flaw | [
"cpe:/o:redhat:enterprise_linux:2.1::as",
"cpe:/o:redhat:enterprise_linux:2.1::aw",
"cpe:/o:redhat:enterprise_linux:2.1::es",
"cpe:/o:redhat:enterprise_linux:2.1::ws"
] | null | null | null | null |
RHSA-2022:6354 | Red Hat Security Advisory: open-vm-tools security update | open-vm-tools: local root privilege escalation in the virtual machine | [
"cpe:/a:redhat:rhel_e4s:8.1::appstream"
] | null | 7 | null | null |
RHSA-2018:3324 | Red Hat Security Advisory: fuse security update | fuse: bypass of the "user_allow_other" restriction when SELinux is active | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 5.3 | null |
RHSA-2015:0776 | Red Hat Security Advisory: docker security update | docker: regression of CVE-2014-5277 | [
"cpe:/a:redhat:rhel_extras_other:7"
] | null | null | null | null |
RHSA-2020:1471 | Red Hat Security Advisory: elfutils security update | elfutils: Double-free due to double decompression of sections in crafted ELF causes crash | [
"cpe:/o:redhat:rhel_eus:7.6::computenode",
"cpe:/o:redhat:rhel_eus:7.6::server"
] | null | null | 4.3 | null |
RHSA-2007:1013 | Red Hat Security Advisory: samba security update | samba buffer overflow Samba "reply_netbios_packet()" Buffer Overflow Vulnerability | [
"cpe:/o:redhat:enterprise_linux:2.1::as",
"cpe:/o:redhat:enterprise_linux:2.1::aw",
"cpe:/o:redhat:enterprise_linux:2.1::es",
"cpe:/o:redhat:enterprise_linux:2.1::ws",
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws"
] | null | null | null | null |
RHSA-2012:1547 | Red Hat Security Advisory: RHN Proxy Server 5 on Red Hat Enterprise Linux 4 - End Of Life | This is the End Of Life notification for RHN Proxy Server 5 versions
released to run on Red Hat Enterprise Linux 4. | [
"cpe:/a:redhat:network_proxy:5.0::el4",
"cpe:/a:redhat:network_proxy:5.1::el4",
"cpe:/a:redhat:network_proxy:5.2::el4",
"cpe:/a:redhat:network_proxy:5.3::el4"
] | null | null | null | null |
RHBA-2024:11505 | Red Hat Bug Fix Advisory: OpenShift Container Platform 4.16.28 packages and security update | libreswan: Regression of CVE-2023-30570 fixes in the Red Hat Enterprise Linux libreswan: remote DoS via crafted TS payload with an incorrect selector length libreswan: Malicious IKEv1 Aggressive Mode packets can crash libreswan libreswan: Invalid IKEv2 REKEY proposal causes restart libreswan: Invalid IKEv1 Quick Mode ID causes restart libreswan: Invalid IKEv1 repeat IKE SA delete causes crash and restart libreswan: Missing PreSharedKey for connection can cause crash libreswan: IKEv1 default AH/ESP responder can crash and restart | [
"cpe:/a:redhat:openshift:4.16::el9"
] | null | 6.5 | null | null |
RHSA-2014:1836 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 5.2.0 security update | CXF: SSL hostname verification bypass, incomplete CVE-2012-5783 fix CXF: SSL hostname verification bypass, incomplete CVE-2012-6153 fix | [
"cpe:/a:redhat:jboss_enterprise_application_platform:5.2.0"
] | null | null | 4.8 | null |
RHSA-2022:4788 | Red Hat Security Advisory: openvswitch2.16 security update | DPDK: out-of-bounds read/write in vhost_user_set_inflight_fd() may lead to crash dpdk: sending vhost-user-inflight type messages could lead to DoS | [
"cpe:/o:redhat:enterprise_linux:8::fastdatapath"
] | null | 6.5 | null | null |
RHSA-2020:1496 | Red Hat Security Advisory: thunderbird security update | Mozilla: Use-after-free while running the nsDocShell destructor Mozilla: Use-after-free when handling a ReadableStream Mozilla: Uninitialized memory could be read when using the WebGL copyTexSubImage method Mozilla: Out of bounds write in GMPDecodeData when processing large images Mozilla: Memory safety bugs fixed in Firefox 75 and Firefox ESR 68.7 | [
"cpe:/a:redhat:rhel_e4s:8.0::appstream"
] | null | 9.8 | null | null |
RHBA-2018:1566 | Red Hat Bug Fix Advisory: OpenShift Container Platform 3.9 bug fix and enhancement update | haproxy: Heap buffer overflow in mux_h2.c:h2_process_demux() can allow attackers to cause a denial of service | [
"cpe:/a:redhat:openshift:3.9::el7"
] | null | null | 8.6 | null |
RHSA-2024:6236 | Red Hat Security Advisory: Red Hat Advanced Cluster Management 2.10.5 security and bug fix update | opentelemetry: DoS vulnerability in otelhttp opentelemetry-go-contrib: DoS vulnerability in otelgrpc due to unbound cardinality metrics | [
"cpe:/a:redhat:acm:2.10::el9"
] | null | 7.5 | null | null |
RHSA-2019:2885 | Red Hat Security Advisory: dovecot security update | dovecot: improper NULL byte handling in IMAP and ManageSieve protocol parsers leads to out of bounds writes | [
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | 8.1 | null |
RHSA-2003:228 | Red Hat Security Advisory: : : : Updated xinetd packages fix denial-of-service attacks and other bugs | security flaw security flaw | [
"cpe:/o:redhat:linux:7.1"
] | null | null | null | null |
RHSA-2024:0660 | Red Hat Security Advisory: OpenShift Container Platform 4.13.32 bug fix and security update | golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487) opentelemetry: DoS vulnerability in otelhttp | [
"cpe:/a:redhat:openshift:4.13::el8",
"cpe:/a:redhat:openshift:4.13::el9"
] | null | 7.5 | null | null |
RHSA-2006:0571 | Red Hat Security Advisory: gnupg security update | security flaw | [
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws",
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2019:3940 | Red Hat Security Advisory: OpenShift Container Platform 4.1.24 runc security update | runc: AppArmor/SELinux bypass with malicious image that specifies a volume at /proc | [
"cpe:/a:redhat:openshift:4.1::el8"
] | null | null | 6.5 | null |
RHSA-2024:2041 | Red Hat Security Advisory: tigervnc security update | xorg-x11-server: Heap buffer overread/data leakage in ProcXIGetSelectedEvents xorg-x11-server: Heap buffer overread/data leakage in ProcXIPassiveGrabDevice xorg-x11-server: Use-after-free in ProcRenderAddGlyphs | [
"cpe:/a:redhat:rhel_aus:8.2::appstream",
"cpe:/a:redhat:rhel_e4s:8.2::appstream",
"cpe:/a:redhat:rhel_tus:8.2::appstream"
] | null | 7.8 | null | null |
RHSA-2024:2410 | Red Hat Security Advisory: harfbuzz security update | harfbuzz: allows attackers to trigger O(n^2) growth via consecutive marks | [
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/o:redhat:enterprise_linux:9::baseos"
] | null | 7.5 | null | null |
RHSA-2003:243 | Red Hat Security Advisory: : Updated Apache and mod_ssl packages fix security vulnerabilities | security flaw security flaw | [
"cpe:/o:redhat:linux:7.1",
"cpe:/o:redhat:linux:7.2",
"cpe:/o:redhat:linux:7.3"
] | null | null | null | null |
RHSA-2024:8546 | Red Hat Security Advisory: Red Hat Advanced Cluster Management 2.9.5 bug fixes and container updates | elliptic: nodejs/elliptic: EDDSA signature malleability due to missing signature length check elliptic: nodejs/elliptic: ECDSA signature malleability due to missing checks elliptic: nodejs/elliptic: ECDSA implementation malleability due to BER-enconded signatures being allowed elliptic: Missing Validation in Elliptic's EDDSA Signature Verification | [
"cpe:/a:redhat:acm:2.9::el8"
] | null | 8.2 | null | null |
RHSA-2012:0716 | Red Hat Security Advisory: bind security update | bind: deleted domain name resolving flaw bind: handling of zero length rdata can cause named to terminate unexpectedly | [
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server",
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHBA-2020:2215 | Red Hat Bug Fix Advisory: OpenShift Container Platform 3.11 bug fix and enhancement update | kubernetes: Use of unbounded 'client' label in apiserver_request_total allows for memory exhaustion | [
"cpe:/a:redhat:openshift:3.11::el7"
] | null | 4.3 | null | null |
RHSA-2017:0332 | Red Hat Security Advisory: qemu-kvm-rhev security update | Qemu: display: cirrus: oob access while doing bitblt copy backward mode Qemu: display: cirrus: potential arbitrary code execution via cirrus_bitblt_cputovideo | [
"cpe:/a:redhat:openstack:6::el7"
] | null | null | 5.5 | null |
RHSA-2023:7734 | Red Hat Security Advisory: kpatch-patch security update | kernel: use-after-free vulnerability in the smb client component kernel: IGB driver inadequate buffer size for frames larger than MTU | [
"cpe:/o:redhat:enterprise_linux:9::baseos"
] | null | 7.5 | null | null |
RHSA-2007:0813 | Red Hat Security Advisory: openssl security update | openssl: RSA side-channel attack openssl: SSL_get_shared_ciphers() off-by-one | [
"cpe:/o:redhat:enterprise_linux:2.1::as",
"cpe:/o:redhat:enterprise_linux:2.1::aw",
"cpe:/o:redhat:enterprise_linux:2.1::es",
"cpe:/o:redhat:enterprise_linux:2.1::ws",
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws"
] | null | null | null | null |
RHSA-2018:3462 | Red Hat Security Advisory: [ansible] security and bug fix update | Ansible: Information leak in "user" module | [
"cpe:/a:redhat:ansible_engine:2::el7"
] | null | null | 7.8 | null |
RHSA-2023:7486 | Red Hat Security Advisory: Red Hat Single Sign-On 7.6.6 for OpenShift image enhancement and security update | keycloak: impersonation and lockout possible through incorrect handling of email trust bouncycastle: potential blind LDAP injection attack using a self-signed certificate HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack) | [
"cpe:/a:redhat:rhosemc:1.0::el8"
] | null | 7.5 | null | null |
RHSA-2016:0056 | Red Hat Security Advisory: java-1.7.0-oracle security update | TLS 1.2 Transcipt Collision attacks against MD5 in key exchange protocol (SLOTH) libpng: Buffer overflow vulnerabilities in png_get_PLTE/png_set_PLTE functions libpng: Buffer overflow vulnerabilities in png_get_PLTE/png_set_PLTE functions OpenJDK: URL deserialization inconsistencies (Networking, 8059054) OpenJDK: logging of RMI connection secrets (JMX, 8130710) OpenJDK: insufficient enforcement of totalEntitySizeLimit (JAXP, 8133962) OpenJDK: incorrect boundary check in JPEG decoder (AWT, 8139017) ICU: integer signedness issue in IndicRearrangementProcessor (OpenJDK 2D, 8140543) | [
"cpe:/a:redhat:rhel_extras_oracle_java:5",
"cpe:/a:redhat:rhel_extras_oracle_java:6",
"cpe:/a:redhat:rhel_extras_oracle_java:7"
] | null | null | null | null |
RHSA-2015:2616 | Red Hat Security Advisory: openssl security update | OpenSSL: X509_ATTRIBUTE memory leak | [
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | 5.3 | null |
RHSA-2021:1369 | Red Hat Security Advisory: Red Hat Advanced Cluster Management 2.1.6 security and bug fix updates | golang.org/x/text: possibility to trigger an infinite loop in encoding/unicode could lead to crash mquery: Code injection via merge or clone operation | [
"cpe:/a:redhat:acm:2.1::el8"
] | null | 4.3 | null | null |
RHSA-2013:1268 | Red Hat Security Advisory: firefox security update | Mozilla: Miscellaneous memory safety hazards (rv:17.0.9) (MFSA 2013-76) Mozilla: Use-after-free in Animation Manager during stylesheet cloning (MFSA 2013-79) Mozilla: Calling scope for new Javascript objects can lead to memory corruption (MFSA 2013-82) Mozilla: Compartment mismatch re-attaching XBL-backed nodes (MFSA 2013-88) Mozilla: Buffer overflow with multi-column, lists, and floats (MFSA 2013-89) Mozilla: Memory corruption involving scrolling (MFSA 2013-90) Mozilla: Memory corruption involving scrolling (MFSA 2013-90) Mozilla: User-defined properties on DOM proxies get the wrong "this" object (MFSA 2013-91) | [
"cpe:/o:redhat:enterprise_linux:5::server",
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2020:3579 | Red Hat Security Advisory: OpenShift Container Platform 4.4.19 openshift security update | kubernetes: Node disk DOS by writing to container /etc/hosts | [
"cpe:/a:redhat:openshift:4.4::el7",
"cpe:/a:redhat:openshift:4.4::el8"
] | null | 5.5 | null | null |
RHSA-2010:0978 | Red Hat Security Advisory: openssl security update | openssl: NETSCAPE_REUSE_CIPHER_CHANGE_BUG downgrade-to-disabled ciphersuite attack openssl: NETSCAPE_REUSE_CIPHER_CHANGE_BUG ciphersuite downgrade attack | [
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2024:8033 | Red Hat Security Advisory: firefox security update | firefox: Use-after-free in Animation timeline (128.3.1 ESR Chemspill) | [
"cpe:/a:redhat:rhel_eus:8.8::appstream"
] | null | 9.8 | null | null |
RHSA-2022:8765 | Red Hat Security Advisory: kernel-rt security and bug fix update | kernel: openvswitch: integer underflow leads to out-of-bounds write in reserve_sfa_size() | [
"cpe:/a:redhat:rhel_eus:8.4::nfv",
"cpe:/a:redhat:rhel_eus:8.4::realtime"
] | null | 7.8 | null | null |
RHSA-2016:0725 | Red Hat Security Advisory: qemu-kvm-rhev security update | qemu: incorrect banked access bounds checking in vga module | [
"cpe:/o:redhat:enterprise_linux:7::hypervisor"
] | null | null | 7.6 | null |
RHSA-2010:0860 | Red Hat Security Advisory: samba security update | Samba: Stack-based buffer overflow by processing specially-crafted SID records | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2024:0627 | Red Hat Security Advisory: gnutls security update | gnutls: incomplete fix for CVE-2023-5981 | [
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 7.5 | null | null |
RHSA-2022:0409 | Red Hat Security Advisory: Red Hat Single Sign-On 7.4.10 on OpenJDK for OpenShift image security update | undertow: client side invocation timeout raised when calling over HTTP2 | [
"cpe:/a:redhat:rhosemc:1.0::el8"
] | null | 7.5 | null | null |
RHSA-2009:0392 | Red Hat Security Advisory: java-1.6.0-sun security update | Untrusted applet causes DoS by filling up disk space OpenJDK remote LDAP Denial-Of-Service (6717680) OpenJDK LDAP client remote code execution (6737315) OpenJDK Pack200 Buffer overflow vulnerability (6792554) OpenJDK Pack200 Buffer overflow vulnerability (6792554) OpenJDK: PNG and GIF processing buffer overflow vulnerabilities (6804996, 6804997) OpenJDK GIF processing buffer overflow vulnerability (6804998) OpenJDK: Type1 font processing buffer overflow vulnerability OpenJDK: DoS (disk consumption) via handling of temporary font files OpenJDK JAX-WS service endpoint remote Denial-of-Service (6630639) OpenJDK code generation vulnerability (6636360) OpenJDK: Files disclosure, arbitrary code execution via "deserializing applets" (6646860) OpenJDK: Intended access restrictions bypass via LiveConnect (6724331) OpenJDK: Possibility of trusted applet run in older, vulnerable version of JRE (6706490) OpenJDK: Improper parsing of crossdomain.xml files (intended access restriction bypass) (6798948) OpenJDK: Signed applet remote misuse possibility (6782871) | [
"cpe:/a:redhat:rhel_extras:4",
"cpe:/a:redhat:rhel_extras:5::client",
"cpe:/a:redhat:rhel_extras:5::server"
] | null | null | null | null |
RHSA-2021:2258 | Red Hat Security Advisory: rh-nginx118-nginx security update | nginx: Off-by-one in ngx_resolver_copy() when labels are followed by a pointer to a root domain name | [
"cpe:/a:redhat:rhel_software_collections:3::el7"
] | null | 8.1 | null | null |
RHSA-2023:1789 | Red Hat Security Advisory: firefox security update | Mozilla: Memory Corruption in Safe Browsing Code Mozilla: libwebp: Double-free in libwebp Mozilla: Fullscreen notification obscured Mozilla: Potential Memory Corruption following Garbage Collector compaction Mozilla: Invalid free from JavaScript code Mozilla: Content-Disposition filename truncation leads to Reflected File Download Mozilla: Files with malicious extensions could have been downloaded unsafely on Linux Mozilla: Incorrect optimization result on ARM64 Mozilla: Memory safety bugs fixed in Firefox 112 and Firefox ESR 102.10 | [
"cpe:/a:redhat:rhel_aus:8.2::appstream",
"cpe:/a:redhat:rhel_e4s:8.2::appstream",
"cpe:/a:redhat:rhel_tus:8.2::appstream"
] | null | 8.8 | null | null |
RHSA-2024:1019 | Red Hat Security Advisory: kernel-rt security update | kernel: vmwgfx: NULL pointer dereference in vmw_cmd_dx_define_query kernel: Use-after-free in nft_verdict_dump due to a race between set GC and transaction kernel: GSM multiplexing race condition leads to privilege escalation kernel: inactive elements in nft_pipapo_walk kernel: Out of boundary write in perf_read_group() as result of overflow a perf_event's read_size kernel: use-after-free in amdgpu_cs_wait_all_fences in drivers/gpu/drm/amd/amdgpu/amdgpu_cs.c kernel: use-after-free during a race condition between a nonblocking atomic commit and a driver unload in drivers/gpu/drm/drm_atomic.c kernel: netfilter: use-after-free in nft_trans_gc_catchall_sync leads to privilege escalation kernel: nf_tables: use-after-free vulnerability in the nft_setelem_catchall_deactivate() function kernel: nf_tables: use-after-free vulnerability in the nft_verdict_init() function | [
"cpe:/a:redhat:rhel_eus:9.2::nfv",
"cpe:/a:redhat:rhel_eus:9.2::realtime"
] | null | 7.8 | null | null |
RHSA-2020:0057 | Red Hat Security Advisory: rh-java-common-apache-commons-beanutils security update | apache-commons-beanutils: does not suppresses the class property in PropertyUtilsBean by default | [
"cpe:/a:redhat:rhel_software_collections:3::el6",
"cpe:/a:redhat:rhel_software_collections:3::el7"
] | null | null | 7.3 | null |
RHSA-2012:1279 | Red Hat Security Advisory: Red Hat Enterprise MRG Messaging 2.2 update | qpid-cpp-server-cluster: unauthorized broker access caused by the use of NullAuthenticator catch-up shadow connections | [
"cpe:/a:redhat:enterprise_mrg:2:computenode:el6",
"cpe:/a:redhat:enterprise_mrg:2:server:el6"
] | null | null | null | null |
RHSA-2018:0054 | Red Hat Security Advisory: qemu-kvm-rhev security and bug fix update | An update for qemu-kvm-rhev is now available for Red Hat Enterprise Linux OpenStack Platform 6.0 (Juno) for Red Hat Enterprise Linux 7.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. | [
"cpe:/a:redhat:openstack:6::el7"
] | null | null | null | null |
RHSA-2024:4619 | Red Hat Security Advisory: libndp security update | libndp: buffer overflow in route information length field | [
"cpe:/o:redhat:rhel_e4s:9.0::baseos"
] | null | 8.1 | null | null |
RHSA-2023:7587 | Red Hat Security Advisory: Updated IBM Business Automation Manager Open Editions 8.0.4 SP1 Images | HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack) | [
"cpe:/a:redhat:rhosemc:1.0::el8"
] | null | 7.5 | null | null |
RHSA-2024:3270 | Red Hat Security Advisory: sssd security update | sssd: Race condition during authorization leads to GPO policies functioning inconsistently | [
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb",
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 7.1 | null | null |
RHSA-2022:4887 | Red Hat Security Advisory: thunderbird security update | Mozilla: Braille space character caused incorrect sender email to be shown for a digitally signed email Mozilla: Cross-Origin resource's length leaked Mozilla: Heap buffer overflow in WebGL Mozilla: Browser window spoof using fullscreen mode Mozilla: Register allocation problem in WASM on arm64 Mozilla: Uninitialized variable leads to invalid memory read Mozilla: Querying a WebAuthn token with a large number of allowCredential entries may have leaked cross-origin information Mozilla: Memory safety bugs fixed in Firefox 101 and Firefox ESR 91.10 | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 9.8 | 6.1 | null |
RHSA-2005:036 | Red Hat Security Advisory: vim security update | security flaw security flaw | [
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2024:3303 | Red Hat Security Advisory: libxml2 security update | libxml2: use-after-free in XMLReader | [
"cpe:/a:redhat:rhel_eus:8.8::appstream",
"cpe:/o:redhat:rhel_eus:8.8::baseos"
] | null | 7.5 | null | null |
RHSA-2024:3529 | Red Hat Security Advisory: kernel security update | kernel: net: bridge: data races indata-races in br_handle_frame_finish() kernel: nf_tables: use-after-free vulnerability in the nft_verdict_init() function | [
"cpe:/o:redhat:rhel_aus:8.4::baseos",
"cpe:/o:redhat:rhel_e4s:8.4::baseos",
"cpe:/o:redhat:rhel_tus:8.4::baseos"
] | null | 7.8 | null | null |
RHSA-2021:4179 | Red Hat Security Advisory: file-roller security update | file-roller: directory traversal via directory symlink pointing outside of the target directory (incomplete fix for CVE-2020-11736) | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 3.9 | null | null |
RHSA-2024:11091 | Red Hat Security Advisory: python36:3.6 security update | virtualenv: potential command injection via virtual environment activation scripts | [
"cpe:/a:redhat:rhel_aus:8.2::appstream"
] | null | 7.8 | null | null |
RHSA-2012:1243 | Red Hat Security Advisory: java-1.4.2-ibm security update | OpenJDK: fontmanager layout lookup code memory corruption (2D, 7143617) OpenJDK: insecure temporary file permissions (JRE, 7143606) OpenJDK: CRL and certificate extensions handling improvements (Security, 7143872) OpenJDK: mutable repository identifiers in generated stub code (CORBA, 7143851) | [
"cpe:/a:redhat:rhel_extras:5::client",
"cpe:/a:redhat:rhel_extras:5::server"
] | null | null | null | null |
RHSA-2024:6409 | Red Hat Security Advisory: OpenShift Container Platform 4.15.31 bug fix and security update | opentelemetry-go-contrib: DoS vulnerability in otelgrpc due to unbound cardinality metrics go-retryablehttp: url might write sensitive information to log file golang-protobuf: encoding/protojson, internal/encoding/json: infinite loop in protojson.Unmarshal when unmarshaling certain forms of invalid JSON | [
"cpe:/a:redhat:openshift:4.15::el8",
"cpe:/a:redhat:openshift:4.15::el9"
] | null | 5.9 | null | null |
RHSA-2021:4596 | Red Hat Security Advisory: binutils security update | environment: Unicode's bidirectional (BiDi) override characters can cause trojan source attacks | [
"cpe:/a:redhat:rhel_eus:8.4::appstream",
"cpe:/o:redhat:rhel_eus:8.4::baseos"
] | null | 8.5 | null | null |
Subsets and Splits