id
stringlengths 13
15
| title
stringlengths 29
176
| description
stringlengths 8
31.7k
| cpes
sequencelengths 0
20
| cvss_v4_0
null | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
null |
---|---|---|---|---|---|---|---|
RHBA-2019:0453 | Red Hat Bug Fix Advisory: CloudForms 4.7.1 bug fix and enhancement update | erlang: TLS server vulnerable to Adaptive Chosen Ciphertext attack allowing plaintext recovery or MITM attack | [
"cpe:/a:redhat:cloudforms_managementengine:5.10::el7"
] | null | null | 6.5 | null |
RHSA-2013:1812 | Red Hat Security Advisory: firefox security update | Mozilla: Out-of-bounds read in image rendering (MFSA 2013-22) Mozilla: Miscellaneous memory safety hazards (rv:24.2) (MFSA 2013-104) Mozilla: Character encoding cross-origin XSS attack (MFSA 2013-106) Mozilla: Use-after-free in synthetic mouse movement (MFSA 2013-114) Mozilla: Sandbox restrictions not applied to nested object elements (MFSA 2013-107) Mozilla: Use-after-free in event listeners (MFSA 2013-108) Mozilla: Use-after-free during Table Editing (MFSA 2013-109) Mozilla: Segmentation violation when replacing ordered list elements (MFSA 2013-111) | [
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::server",
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2023:6247 | Red Hat Security Advisory: .NET 7.0 security update | dotnet: Denial of Service with Client Certificates using .NET Kestrel | [
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb"
] | null | 6.5 | null | null |
RHSA-2013:1270 | Red Hat Security Advisory: polkit security update | polkit: unix-process subject for authorization is racy | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2023:7672 | Red Hat Security Advisory: OpenShift Virtualization 4.14.1 RPMs security and bug fix update | golang: crypto/tls: large handshake records may cause panics golang: net/http, mime/multipart: denial of service from excessive resource consumption | [
"cpe:/a:redhat:container_native_virtualization:4.14::el8"
] | null | 7.5 | null | null |
RHSA-2024:8437 | Red Hat Security Advisory: OpenShift Container Platform 4.17.3 security update | Podman: Buildah: CRI-O: symlink traversal vulnerability in the containers/storage library can cause Denial of Service (DoS) | [
"cpe:/a:redhat:openshift:4.17::el8",
"cpe:/a:redhat:openshift:4.17::el9"
] | null | 6.5 | null | null |
RHSA-2025:1132 | Red Hat Security Advisory: firefox security update | firefox: thunderbird: Use-after-free in XSLT firefox: thunderbird: Use-after-free in Custom Highlight firefox: thunderbird: A bug in WebAssembly code generation could result in a crash firefox: thunderbird: Use-after-free during concurrent delazification firefox: thunderbird: Potential opening of private browsing tabs in normal browsing windows firefox: thunderbird: Certificate length was not properly checked firefox: thunderbird: Memory safety bugs fixed in Firefox 135, Thunderbird 135, Firefox ESR 115.20, Firefox ESR 128.7, Thunderbird 115.20, and Thunderbird 128.7 firefox: thunderbird: Memory safety bugs fixed in Firefox 135, Thunderbird 135, Firefox ESR 128.7, and Thunderbird 128.7 | [
"cpe:/o:redhat:rhel_els:7"
] | null | 8.8 | null | null |
RHSA-2024:7819 | Red Hat Security Advisory: buildah security update | encoding/gob: golang: Calling Decoder.Decode on a message which contains deeply nested structures can cause a panic due to stack exhaustion | [
"cpe:/a:redhat:rhel_eus:9.2::appstream"
] | null | 7.5 | null | null |
RHSA-2024:9901 | Red Hat Security Advisory: tigervnc security update | xorg-x11-server: tigervnc: heap-based buffer overflow privilege escalation vulnerability | [
"cpe:/o:redhat:rhel_els:7"
] | null | 7.8 | null | null |
RHSA-2023:1663 | Red Hat Security Advisory: Red Hat JBoss Web Server 5.7.2 release and security update | tomcat: request smuggling tomcat: JsonErrorReportValve injection | [
"cpe:/a:redhat:jboss_enterprise_web_server:5.7::el7",
"cpe:/a:redhat:jboss_enterprise_web_server:5.7::el8",
"cpe:/a:redhat:jboss_enterprise_web_server:5.7::el9"
] | null | 7.5 | null | null |
RHSA-2016:0103 | Red Hat Security Advisory: kernel security, bug fix, and enhancement update | virt: guest to host DoS by triggering an infinite loop in microcode via #DB exception kernel: Possible use-after-free vulnerability in keyring facility kernel: pipe buffer state corruption after unsuccessful atomic read from pipe | [
"cpe:/o:redhat:rhel_eus:7.1::computenode",
"cpe:/o:redhat:rhel_eus:7.1::server"
] | null | null | null | null |
RHSA-2023:7160 | Red Hat Security Advisory: opensc security and bug fix update | opensc: buffer overrun vulnerability in pkcs15 cardos_have_verifyrc_package | [
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 6.3 | null | null |
RHSA-2009:1039 | Red Hat Security Advisory: ntp security update | ntp: buffer overflow in ntpq ntp: remote arbitrary code execution vulnerability if autokeys is enabled | [
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2019:0735 | Red Hat Security Advisory: katello-installer-base security and enhancement update | katello-installer-base: QMF methods exposed to goferd via qdrouterd | [
"cpe:/a:redhat:satellite:6.4::el7",
"cpe:/a:redhat:satellite_capsule:6.4::el7"
] | null | null | 8 | null |
RHBA-2021:1503 | Red Hat Bug Fix Advisory: samba bug fix update | samba: Netlogon elevation of privilege vulnerability (Zerologon) samba: Missing handle permissions check in SMB1/2/3 ChangeNotify samba: Unprivileged user can crash winbind | [
"cpe:/a:redhat:storage:3.5:samba:el8"
] | null | 5 | null | null |
RHSA-2011:0013 | Red Hat Security Advisory: wireshark security update | Wireshark: Stack-based array index error in ENTTEC dissector (upstream bug #5539) | [
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws",
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server",
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2018:2179 | Red Hat Security Advisory: Red Hat Ceph Storage 3.0 security and bug fix update | ceph: cephx protocol is vulnerable to replay attack ceph: cephx uses weak signatures ceph: ceph-mon does not perform authorization on OSD pool ops | [
"cpe:/a:redhat:ceph_storage:3::ubuntu16.04"
] | null | null | 4.6 | null |
RHSA-2009:1108 | Red Hat Security Advisory: httpd security update | apr-util heap buffer underwrite apr-util billion laughs attack apr-util single NULL byte buffer overflow | [
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws"
] | null | null | null | null |
RHSA-2018:1129 | Red Hat Security Advisory: kernel security and bug fix update | hw: cpu: speculative execution branch target injection hw: cpu: speculative execution permission faults handling | [
"cpe:/o:redhat:rhel_eus:7.3::computenode",
"cpe:/o:redhat:rhel_eus:7.3::server"
] | null | null | 5.5 | null |
RHSA-2020:1933 | Red Hat Security Advisory: targetcli security update | targetcli: world writable /var/run/targetclid.sock allows unprivileged user to execute commands | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 7.8 | null | null |
RHSA-2005:371 | Red Hat Security Advisory: ncpfs security update | security flaw | [
"cpe:/o:redhat:enterprise_linux:2.1::as",
"cpe:/o:redhat:enterprise_linux:2.1::aw",
"cpe:/o:redhat:enterprise_linux:2.1::es"
] | null | null | null | null |
RHSA-2023:6667 | Red Hat Security Advisory: samba security, bug fix, and enhancement update | samba: out-of-bounds read in winbind AUTH_CRAP samba: infinite loop in mdssvc RPC service for spotlight samba: type confusion in mdssvc RPC service for spotlight samba: spotlight server-side share path disclosure | [
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::crb",
"cpe:/a:redhat:enterprise_linux:9::resilientstorage",
"cpe:/o:redhat:enterprise_linux:9::baseos"
] | null | 5.3 | null | null |
RHSA-2021:3027 | Red Hat Security Advisory: microcode_ctl security, bug fix and enhancement update | hw: Special Register Buffer Data Sampling (SRBDS) hw: Vector Register Data Sampling hw: L1D Cache Eviction Sampling hw: Information disclosure issue in Intel SGX via RAPL interface hw: Vector Register Leakage-Active hw: Fast forward store predictor hw: vt-d related privilege escalation hw: improper isolation of shared resources in some Intel Processors hw: observable timing discrepancy in some Intel Processors | [
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 2.8 | 6.5 | null |
RHSA-2022:6815 | Red Hat Security Advisory: squid security update | squid: buffer-over-read in SSPI and SMB authentication | [
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 8.6 | null | null |
RHSA-2019:4201 | Red Hat Security Advisory: CloudForms 5.0.1 security, bug fix and enhancement update | cfme: rubygem-rubyzip denial of service via crafted ZIP file | [
"cpe:/a:redhat:cloudforms_managementengine:5.11::el8"
] | null | null | 5.5 | null |
RHSA-2014:0762 | Red Hat Security Advisory: rubygem-openshift-origin-node security update | Origin: Command execution as root via downloadable cartridge source-url | [
"cpe:/a:redhat:openshift:1.2::el6"
] | null | null | null | null |
RHSA-2020:4945 | Red Hat Security Advisory: thunderbird security update | Mozilla: Memory safety bugs fixed in Firefox 82 and Firefox ESR 78.4 chromium-browser: Use after free in WebRTC | [
"cpe:/a:redhat:rhel_eus:8.1::appstream"
] | null | 8.8 | null | null |
RHSA-2013:0590 | Red Hat Security Advisory: nss-pam-ldapd security update | nss-pam-ldapd: FD_SET array index error, leading to stack-based buffer overflow | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2019:2806 | Red Hat Security Advisory: ruby security update | ruby: Command injection vulnerability in Net::FTP | [
"cpe:/o:redhat:rhel_aus:7.3::server",
"cpe:/o:redhat:rhel_e4s:7.3::server",
"cpe:/o:redhat:rhel_tus:7.3::server"
] | null | null | 6.3 | null |
RHSA-2021:1610 | Red Hat Security Advisory: curl security and bug fix update | curl: Expired pointer dereference via multi API with CURLOPT_CONNECT_ONLY option set curl: FTP PASV command response can cause curl to connect to arbitrary host curl: Malicious FTP server can trigger stack overflow when CURLOPT_CHUNK_BGN_FUNCTION is used curl: Inferior OCSP verification | [
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 7.4 | null | null |
RHSA-2017:0245 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform security update | tomcat: HTTP Request smuggling vulnerability due to permitting invalid character in HTTP requests EAP: Sensitive data can be exposed at the server level in domain mode admin-cli: Potential EAP resource starvation DOS attack via GET requests for server log files jboss: jbossas: unsafe chown of server.log in jboss init script allows privilege escalation | [
"cpe:/a:redhat:jboss_enterprise_application_platform:6::el7"
] | null | null | 7 | null |
RHSA-2003:389 | Red Hat Security Advisory: kernel security update | security flaw | [
"cpe:/o:redhat:enterprise_linux:2.1::as",
"cpe:/o:redhat:enterprise_linux:2.1::es",
"cpe:/o:redhat:enterprise_linux:2.1::ws"
] | null | null | null | null |
RHSA-2010:0394 | Red Hat Security Advisory: kernel security, bug fix, and enhancement update | kernel: ia64: ptrace: peek_or_poke requests miss ptrace_check_attach() kernel: information leak via userspace USB interface kernel: ALSA: hda-intel: Avoid divide by zero crash kernel: dvb-core: DoS bug in ULE decapsulation code kernel: ipv6: skb is unexpectedly freed | [
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2024:9158 | Red Hat Security Advisory: lldpd security update | lldp/openvswitch: denial of service via externally triggered memory leak lldpd: out-of-bounds read when decoding SONMP packets lldpd: CDP PDU Packet cdp.c out-of-bounds read | [
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 7.5 | null | null |
RHSA-2001:072 | Red Hat Security Advisory: : Updated man package fixing GID security problems. | security flaw security flaw | [
"cpe:/o:redhat:linux:5.2",
"cpe:/o:redhat:linux:6.2",
"cpe:/o:redhat:linux:7.0",
"cpe:/o:redhat:linux:7.1"
] | null | null | null | null |
RHSA-2024:6612 | Red Hat Security Advisory: fence-agents security update | pypa/setuptools: Remote code execution via download functions in the package_index module in pypa/setuptools | [
"cpe:/a:redhat:rhel_e4s:9.0::appstream",
"cpe:/a:redhat:rhel_e4s:9.0::highavailability",
"cpe:/a:redhat:rhel_e4s:9.0::resilientstorage"
] | null | 8.8 | null | null |
RHSA-2021:3487 | Red Hat Security Advisory: Red Hat OpenStack Platform 16.2 (etcd) security update | golang: net/http: panic in ReadRequest and ReadResponse when reading a very large header golang: net: lookup functions may return invalid host names golang: net/http/httputil: ReverseProxy forwards connection headers if first one is empty golang: math/big.Rat: may cause a panic or an unrecoverable fatal error if passed inputs with very large exponents | [
"cpe:/a:redhat:openstack:16.2::el8"
] | null | 7.5 | null | null |
RHSA-2003:227 | Red Hat Security Advisory: : : : Updated sendmail packages fix vulnerabilities | security flaw security flaw security flaw | [
"cpe:/o:redhat:linux:7.1"
] | null | null | null | null |
RHSA-2012:1261 | Red Hat Security Advisory: dbus security update | dbus: privilege escalation when libdbus is used in setuid/setgid application | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2023:5726 | Red Hat Security Advisory: OpenJDK 8u392 Windows Security Update | OpenJDK: IOR deserialization issue in CORBA (8303384) OpenJDK: certificate path validation issue during client authentication (8309966) | [
"cpe:/a:redhat:openjdk:1.8::windows"
] | null | 5.3 | null | null |
RHSA-2021:0946 | Red Hat Security Advisory: Red Hat Build of OpenJDK 1.8 (container images) release and security update | containers/openjdk: /etc/passwd is given incorrect privileges | [
"cpe:/a:redhat:openjdk:1.8"
] | null | 7 | null | null |
RHSA-2021:4851 | Red Hat Security Advisory: Red Hat AMQ Broker 7.9.1 release and security update | netty-codec: Bzip2Decoder doesn't allow setting size restrictions for decompressed data netty-codec: SnappyFrameDecoder doesn't restrict chunk length and may buffer skippable chunks in an unnecessary way | [
"cpe:/a:redhat:amq_broker:7"
] | null | 7.5 | null | null |
RHSA-2022:8252 | Red Hat Security Advisory: yajl security update | yajl: heap-based buffer overflow when handling large inputs due to an integer overflow | [
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::crb"
] | null | 5.9 | null | null |
RHSA-2022:0166 | Red Hat Security Advisory: OpenJDK 17.0.2 security update for Portable Linux Builds | OpenJDK: Incomplete deserialization class filtering in ObjectInputStream (Serialization, 8264934) OpenJDK: Incorrect reading of TIFF files in TIFFNullDecompressor (ImageIO, 8270952) OpenJDK: Insufficient URI checks in the XSLT TransformerImpl (JAXP, 8270492) OpenJDK: Unexpected exception thrown in regex Pattern (Libraries, 8268813) OpenJDK: Incorrect marking of writeable fields (Hotspot, 8270386) OpenJDK: Incomplete checks of StringBuffer and StringBuilder during deserialization (Libraries, 8270392) OpenJDK: Incorrect IdentityHashMap size checks during deserialization (Libraries, 8270416) OpenJDK: Incorrect access checks in XMLEntityManager (JAXP, 8270498) OpenJDK: Infinite loop related to incorrect handling of newlines in XMLEntityScanner (JAXP, 8270646) OpenJDK: Array indexing issues in LIRGenerator (Hotspot, 8272014) OpenJDK: Excessive resource use when reading JAR manifest attributes (Libraries, 8272026) OpenJDK: Insufficient checks when deserializing exceptions in ObjectInputStream (Serialization, 8272236) OpenJDK: Excessive memory allocation in BMPImageReader (ImageIO, 8273756) OpenJDK: Integer overflow in BMPImageReader (ImageIO, 8273838) OpenJDK: Excessive memory allocation in TIFF*Decompressor (ImageIO, 8274096) | [
"cpe:/a:redhat:openjdk:17"
] | null | 5.3 | null | null |
RHSA-2005:378 | Red Hat Security Advisory: cpio security update | security flaw | [
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws",
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2006:0190 | Red Hat Security Advisory: kernel security update | security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw | [
"cpe:/o:redhat:enterprise_linux:2.1::as",
"cpe:/o:redhat:enterprise_linux:2.1::aw"
] | null | null | null | null |
RHSA-2024:4408 | Red Hat Security Advisory: tpm2-tss security update | tpm2-tss: Buffer Overlow in TSS2_RC_Decode | [
"cpe:/o:redhat:rhel_aus:8.6::baseos",
"cpe:/o:redhat:rhel_e4s:8.6::baseos",
"cpe:/o:redhat:rhel_tus:8.6::baseos"
] | null | 6.4 | null | null |
RHSA-2018:2317 | Red Hat Security Advisory: xmlrpc security update | xmlrpc: Deserialization of untrusted Java object through <ex:serializable> tag | [
"cpe:/o:redhat:enterprise_linux:7::hypervisor"
] | null | null | 7.5 | null |
RHSA-2011:0306 | Red Hat Security Advisory: samba3x security update | Samba unsafe fd_set usage | [
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2019:3011 | Red Hat Security Advisory: Red Hat Virtualization security, bug fix, and enhancement update | kernel: hw: Spectre SWAPGS gadget vulnerability | [
"cpe:/o:redhat:enterprise_linux:7::hypervisor"
] | null | null | 5.9 | null |
RHSA-2017:2445 | Red Hat Security Advisory: qemu-kvm security update | Qemu: qemu-nbd: server breaks with SIGPIPE upon client abort | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 5.3 | null |
RHSA-2021:2394 | Red Hat Security Advisory: rh-postgresql12-postgresql security update | postgresql: Partition constraint violation errors leak values of denied columns postgresql: Buffer overrun from integer overflow in array subscripting calculations postgresql: Memory disclosure in INSERT ... ON CONFLICT ... DO UPDATE postgresql: Memory disclosure in partitioned-table UPDATE ... RETURNING | [
"cpe:/a:redhat:rhel_software_collections:3::el7"
] | null | 6.5 | null | null |
RHSA-2019:2609 | Red Hat Security Advisory: kernel-rt security and bug fix update | kernel: hw: Spectre SWAPGS gadget vulnerability kernel: brcmfmac heap buffer overflow in brcmf_wowl_nd_results | [
"cpe:/a:redhat:rhel_extras_rt:7"
] | null | null | 6.5 | null |
RHSA-2013:0565 | Red Hat Security Advisory: Red Hat Enterprise MRG Grid 2.3 security update | condor: DoS when removing jobs via jobcontrol.py when job id is in square brackets | [
"cpe:/a:redhat:enterprise_mrg:2:computenode:el6",
"cpe:/a:redhat:enterprise_mrg:2:server:el6"
] | null | null | null | null |
RHSA-2021:3810 | Red Hat Security Advisory: libxml2 security update | libxml2: Use after free via namespace node in XPointer ranges | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 5.3 | null |
RHSA-2021:0949 | Red Hat Security Advisory: Red Hat OpenShift Do openshift/odo-init-image 1.1.3 security update | expat: large number of colons in input makes parser consume high amount of resources, leading to DoS e2fsprogs: Crafted ext4 partition leads to out-of-bounds write e2fsprogs: Out-of-bounds write in e2fsck/rehash.c curl: heap buffer overflow in function tftp_receive_packet() nss: Out-of-bounds read when importing curve25519 private key nss: PKCS#1 v1.5 signatures can be used for TLS 1.3 nss: Use-after-free in sftk_FreeSession due to improper refcounting glib2: file_copy_fallback in gio/gfile.c in GNOME GLib does not properly restrict file permissions while a copy operation is in progress dbus: DBusServer DBUS_COOKIE_SHA1 authentication bypass ibus: missing authorization allows local attacker to access the input bus of another user cpio: improper input validation when writing tar header fields leads to unexpected tar generation expat: heap-based buffer over-read via crafted XML input python: XSS vulnerability in the documentation XML-RPC server in server_title field nss: Check length of inputs for cryptographic primitives nss: TLS 1.3 HelloRetryRequest downgrade request sets client into invalid state libssh2: integer overflow in SSH_MSG_DISCONNECT logic in packet.c glibc: LD_PREFER_MAP_32BIT_EXEC not ignored in setuid binaries libxml2: memory leak in xmlParseBalancedChunkMemoryRecover in parser.c systemd: memory leak in button_open() in login/logind-button.c when udev events are received libxml2: memory leak in xmlSchemaPreRun in xmlschemas.c python: infinite loop in the tarfile module via crafted TAR archive glibc: buffer over-read in iconv when processing invalid multi-byte input sequences in the EUC-KR encoding openssl: EDIPARTYNAME NULL pointer de-reference nss: Side channel attack on ECDSA signature generation libxml2: infinite loop in xmlStringLenDecodeEntities in some end-of-file situations curl: Incorrect argument check can allow remote servers to overwrite local files glibc: stack corruption from crafted input in cosl, sinl, sincosl, and tanl functions openldap: denial of service via nested boolean expressions in LDAP search filters nss: P-384 and P-521 implementation uses a side-channel vulnerable modular inversion function nss: ECDSA timing attack mitigation bypass nss: Side channel vulnerabilities during RSA key generation nss: CHACHA20-POLY1305 decryption with undersized tag leads to out-of-bounds read glibc: stack-based buffer overflow if the input to any of the printf family of functions is an 80-bit long double with a non-canonical bit pattern | [
"cpe:/a:redhat:openshift_do:1.0::el7"
] | null | 7.5 | 2.9 | null |
RHSA-2024:3414 | Red Hat Security Advisory: kernel-rt security and bug fix update | kernel: Use-after-free in nft_verdict_dump due to a race between set GC and transaction kernel: Marvin vulnerability side-channel leakage in the RSA decryption operation kernel: inactive elements in nft_pipapo_walk kernel: netfilter: nftables: exthdr: fix 4-byte stack OOB write kernel: nf_tables: use-after-free vulnerability in the nft_verdict_init() function kernel: mlxsw: spectrum_acl_tcam: Fix stack corruption | [
"cpe:/a:redhat:rhel_eus:9.0::nfv",
"cpe:/a:redhat:rhel_eus:9.0::realtime"
] | null | 6.7 | null | null |
RHSA-2023:5480 | Red Hat Security Advisory: Release of OpenShift Serverless Logic 1.30.0 SP1 security update | quarkus: HTTP security policy bypass | [
"cpe:/a:redhat:openshift_serverless:1.30::el8"
] | null | 8.1 | null | null |
RHSA-2006:0735 | Red Hat Security Advisory: thunderbird security update | security flaw security flaw security flaw security flaw seamonkey < 1.0.6 multiple vulnerabilities | [
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2020:5235 | Red Hat Security Advisory: thunderbird security update | Mozilla: Variable time processing of cross-origin images during drawImage calls Mozilla: Parsing mismatches could confuse and bypass security sanitizer for chrome privileged code Mozilla: Fullscreen could be enabled without displaying the security UI Mozilla: XSS through paste (manual and clipboard API) Mozilla: Requests intercepted through ServiceWorkers lacked MIME type restrictions Mozilla: Use-after-free in WebRequestService Mozilla: Potential use-after-free in uses of nsTArray Mozilla: DoH did not filter IPv4 mapped IP Addresses Mozilla: Software keyboards may have remembered typed passwords Mozilla: Memory safety bugs fixed in Firefox 83 and Firefox ESR 78.5 | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 8.8 | 6.1 | null |
RHSA-2020:2676 | Red Hat Security Advisory: grafana security update | grafana: SSRF incorrect access control vulnerability allows unauthenticated users to make grafana send HTTP requests to any URL | [
"cpe:/a:redhat:rhel_eus:8.1::appstream"
] | null | 8.2 | null | null |
RHSA-2024:1545 | Red Hat Security Advisory: dnsmasq security update | dnsmasq: Heap use after free in dhcp6_no_relay dnsmasq: default maximum EDNS.0 UDP packet size was set to 4096 but should be 1232 bind9: KeyTrap - Extreme CPU consumption in DNSSEC validator bind9: Preparing an NSEC3 closest encloser proof can exhaust CPU resources | [
"cpe:/a:redhat:rhel_eus:8.6::appstream"
] | null | 7.5 | null | null |
RHSA-2020:2125 | Red Hat Security Advisory: kpatch-patch security update | Kernel: NetLabel: null pointer dereference while receiving CIPSO packet with null category may cause kernel panic | [
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 5.9 | null | null |
RHSA-2004:166 | Red Hat Security Advisory: : Updated kernel packages resolve security vulnerabilities | security flaw security flaw security flaw | [
"cpe:/o:redhat:linux:9"
] | null | null | null | null |
RHSA-2023:4635 | Red Hat Security Advisory: rust-toolset:rhel8 security update | rust-cargo: cargo does not respect the umask when extracting dependencies | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 6.7 | null | null |
RHSA-2010:0925 | Red Hat Security Advisory: krb5 security and bug fix update | krb5: incorrect acceptance of certain checksums (MITKRB5-SA-2010-007) krb5: multiple checksum handling vulnerabilities (MITKRB5-SA-2010-007) krb5: krb5 may accept authdata checksums with low-entropy derived keys (MITKRB5-SA-2010-007) | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2020:5529 | Red Hat Security Advisory: Red Hat Single Sign-On 7.4.4 on OpenJDK for OpenShift image security update | containers/redhat-sso-7: /etc/passwd is given incorrect privileges | [
"cpe:/a:redhat:rhosemc:1.0::el8"
] | null | 7 | null | null |
RHSA-2013:0162 | Red Hat Security Advisory: JBoss Enterprise SOA Platform 4.2.0.CP05 and 4.3.0.CP05 update | Web: Bypass of security constraints | [
"cpe:/a:redhat:jboss_enterprise_soa_platform:4.3.0:update5"
] | null | null | null | null |
RHSA-2020:2583 | Red Hat Security Advisory: OpenShift Container Platform 4.4.9 python-psutil security update | python-psutil: Double free because of refcount mishandling | [
"cpe:/a:redhat:openshift:4.4::el7"
] | null | null | 7 | null |
RHSA-2007:0387 | Red Hat Security Advisory: tcpdump security and bug fix update | tcpdump denial of service tcpdump BGP integer overflow | [
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2019:2177 | Red Hat Security Advisory: sssd security, bug fix, and enhancement update | sssd: improper implementation of GPOs due to too restrictive permissions sssd: fallback_homedir returns '/' for empty home directories in passwd file | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 4.1 | null |
RHSA-2021:5171 | Red Hat Security Advisory: nodejs:16 security, bug fix, and enhancement update | nodejs-ini: Prototype pollution via malicious INI file nodejs-glob-parent: Regular expression denial of service nodejs-ansi-regex: Regular expression denial of service (ReDoS) matching ANSI escape codes nodejs-json-schema: Prototype pollution vulnerability llhttp: HTTP Request Smuggling due to spaces in headers llhttp: HTTP Request Smuggling when parsing the body of chunked requests nodejs-normalize-url: ReDoS for data URLs | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 7.5 | null | null |
RHSA-2017:0456 | Red Hat Security Advisory: Red Hat JBoss Web Server 3.1.0 security and enhancement update | tomcat: timing attack in Realm implementation tomcat: unsafe chown of catalina.log in tomcat init script allows privilege escalation tomcat: Usage of vulnerable FileUpload package can result in denial of service tomcat: security manager bypass via IntrospectHelper utility function tomcat: tomcat writable config files allow privilege escalation tomcat: system property disclosure tomcat: security manager bypass via JSP Servlet config parameters tomcat: unrestricted access to global resources tomcat: HTTP Request smuggling vulnerability due to permitting invalid character in HTTP requests tomcat: Remote code execution vulnerability in JmxRemoteLifecycleListener tomcat: information disclosure due to incorrect Processor sharing | [
"cpe:/a:redhat:jboss_enterprise_web_server:3.1::el7"
] | null | null | 7.5 | null |
RHSA-2023:1064 | Red Hat Security Advisory: OpenShift Developer Tools and Services for OCP 4.12 security update | Libraries: Untrusted users can modify some Pipeline libraries in Pipeline Shared Groovy Libraries Plugin plugin: User-scoped credentials exposed to other users by Pipeline SCM API for Blue Ocean Plugin jackson-databind: deep wrapper array nesting wrt UNWRAP_SINGLE_VALUE_ARRAYS jackson-databind: use of deeply nested arrays jenkins-plugin/script-security: Sandbox bypass vulnerabilities in Jenkins Script Security Plugin jenkins-plugin/workflow-cps: Sandbox bypass vulnerabilities in Pipeline: Groovy Plugin jenkins-plugin/script-security: Sandbox bypass vulnerabilities in Jenkins Script Security Plugin jenkins-plugin/script-security: Sandbox bypass vulnerabilities in Jenkins Script Security Plugin jenkins-plugin/pipeline-groovy-lib: Sandbox bypass vulnerability in Pipeline: Groovy Libraries Plugin jenkins-plugin/workflow-cps-global-lib: Sandbox bypass vulnerability in Pipeline: Deprecated Groovy Libraries Plugin jenkins-plugin/pipeline-input-step: CSRF protection for any URL can be bypassed in Pipeline: Input Step Plugin jenkins-plugin/pipeline-stage-view: CSRF protection for any URL can be bypassed in Pipeline: Stage View Plugin jenkins-plugin/workflow-support: Stored XSS vulnerability in Pipeline: Supporting APIs Plugin jenkins-plugin/mercurial: Webhook endpoint discloses job names to unauthorized users in Mercurial Plugin mina-sshd: Java unsafe deserialization vulnerability | [
"cpe:/a:redhat:ocp_tools:4.12::el8"
] | null | 9.8 | null | null |
RHSA-2022:0130 | Red Hat Security Advisory: firefox security update | Mozilla: Iframe sandbox bypass with XSLT Mozilla: Race condition when playing audio files Mozilla: Heap-buffer-overflow in blendGaussianBlur Mozilla: Missing throttling on external protocol launch dialog Mozilla: Use-after-free of ChannelEventQueue::mOwner Mozilla: Browser window spoof using fullscreen mode Mozilla: Out-of-bounds memory access when inserting text in edit mode Mozilla: Browser window spoof using fullscreen mode Mozilla: Leaking cross-origin URLs through securitypolicyviolation event Mozilla: Crash when handling empty pkcs7 sequence Mozilla: Spoofed origin on external protocol launch dialog Mozilla: Memory safety bugs fixed in Firefox 96 and Firefox ESR 91.5 | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 8.8 | 6.1 | null |
RHSA-2019:3211 | Red Hat Security Advisory: chromium-browser security update | chromium-browser: Use-after-free in media chromium-browser: Heap overflow in Skia chromium-browser: Use-after-free in Mojo chromium-browser: External URIs may trigger other browsers chromium-browser: URL bar spoof via download redirect chromium-browser: Use-after-free in media chromium-browser: Out-of-bounds access in V8 chromium-browser: Use-after-free in V8 chromium-browser: Extensions can read some local files chromium-browser: SameSite cookie bypass chromium-browser: Arbitrary read in SwiftShader chromium-browser: URL spoof chromium-browser: Full screen notification overlap chromium-browser: Full screen notification spoof chromium-browser: CSP bypass chromium-browser: IDN spoof chromium-browser: CSRF bypass chromium-browser: Multiple file download protection bypass chromium-browser: Side channel using storage size estimate chromium-browser: URI bar spoof when using external app URIs chromium-browser: Global window leak via console chromium-browser: HTTP authentication spoof chromium-browser: V8 memory corruption in regex chromium-browser: Dialog box fails to show origin chromium-browser: Cross-origin information leak using devtools chromium-browser: IDN spoofing chromium-browser: Extensions can be disabled by trailing slash chromium-browser: Google URI shown for certificate warning chromium-browser: Chrome web store origin needs to be isolated chromium-browser: Download dialog spoofing chromium-browser: User gesture needed for printing chromium-browser: IP address spoofing to servers chromium-browser: Bypass on download restrictions chromium-browser: Site isolation bypass chromium-browser: Exceptions leaked by devtools chromium-browser: Use-after-free in UI chromium-browser: Use-after-free in offline pages chromium-browser: Use-after-free in media chromium-browser: Use-after-free in media chromium-browser: Omnibox spoof chromium-browser: SOP bypass chromium-browser: Use-after-free in IndexedDB chromium-browser: Use-after-free in WebRTC chromium-browser: Use-after-free in audio chromium-browser: Use-after-free in V8 chromium-browser: Cross-origin size leak | [
"cpe:/a:redhat:rhel_extras:6"
] | null | null | 8.8 | null |
RHSA-2017:1601 | Red Hat Security Advisory: CFME 5.7.3 security, bug fix and enhancement update | CFME: default certificate used across all installs cfme: API leaks any MiqReportResult CFME: Dialog for creating cloud volumes does not filter cloud tenants CVE-2017-7497 | [
"cpe:/a:redhat:cloudforms_managementengine:5.7::el7"
] | null | null | 4.1 | null |
RHSA-2017:3200 | Red Hat Security Advisory: kernel security and bug fix update | kernel: Divide-by-zero in __tcp_select_window kernel: Heap out-of-bounds read in AF_PACKET sockets kernel: Exploitable memory corruption due to UFO to non-UFO path switch | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | 7 | null |
RHSA-2004:414 | Red Hat Security Advisory: qt security update | security flaw security flaw security flaw | [
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws"
] | null | null | null | null |
RHSA-2023:5464 | Red Hat Security Advisory: frr security update | frr: Incorrect handling of a error in parsing of an invalid section of a BGP update can de-peer a router | [
"cpe:/a:redhat:rhel_e4s:8.1::appstream"
] | null | 7.5 | null | null |
RHSA-2024:1836 | Red Hat Security Advisory: kernel security, bug fix, and enhancement update | kernel: ext4: kernel bug in ext4_write_inline_data_end() kernel: Out of boundary write in perf_read_group() as result of overflow a perf_event's read_size | [
"cpe:/a:redhat:rhel_eus:9.0::appstream",
"cpe:/a:redhat:rhel_eus:9.0::crb",
"cpe:/o:redhat:rhel_eus:9.0::baseos"
] | null | 7 | null | null |
RHSA-2013:0274 | Red Hat Security Advisory: java-1.6.0-openjdk security update | SSL/TLS: CBC padding timing attack (lucky-13) OpenJDK: MBeanServer insufficient privilege restrictions (JMX, 8006446) | [
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2024:0664 | Red Hat Security Advisory: OpenShift Container Platform 4.12.49 bug fix update and security update | golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487) | [
"cpe:/a:redhat:openshift:4.12::el8",
"cpe:/a:redhat:openshift:4.12::el9"
] | null | 7.5 | null | null |
RHSA-2023:5709 | Red Hat Security Advisory: dotnet7.0 security update | HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack) | [
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb"
] | null | 7.5 | null | null |
RHSA-2023:7697 | Red Hat Security Advisory: AMQ Clients 2023.Q4 | SnakeYaml: Constructor Deserialization Remote Code Execution snakeyaml: Denial of Service due to missing nested depth limitation for collections snakeyaml: Uncaught exception in org.yaml.snakeyaml.composer.Composer.composeSequenceNode dev-java/snakeyaml: DoS via stack overflow json-smart: Uncontrolled Resource Consumption vulnerability in json-smart (Resource Exhaustion) springframework-amqp: Deserialization Vulnerability netty: SniHandler 16MB allocation leads to OOM jetty: Improper validation of HTTP/1 content-length | [
"cpe:/a:redhat:amq_clients:2023_q4"
] | null | 5.3 | null | null |
RHSA-2021:1064 | Red Hat Security Advisory: virt:rhel and virt-devel:rhel security update | QEMU: Regression of CVE-2020-10756 fix in virt:rhel/qemu-kvm in Red Hat Enterprise Linux 8.3 | [
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb"
] | null | 6.5 | null | null |
RHSA-2017:2472 | Red Hat Security Advisory: kernel security and bug fix update | kernel: NFSv3 server does not properly handle payload bounds checking of WRITE requests | [
"cpe:/o:redhat:rhel_aus:5.9"
] | null | null | 6.5 | null |
RHSA-2014:0037 | Red Hat Security Advisory: jasperreports-server-pro security, bug fix, and enhancement update | axis: missing connection hostname check against X.509 certificate name hadoop: man-in-the-middle vulnerability | [
"cpe:/a:redhat:rhev_manager:3"
] | null | null | null | null |
RHSA-2023:2098 | Red Hat Security Advisory: Multicluster Engine for Kubernetes 2.0.8 security updates and bug fixes | http-cache-semantics: Regular Expression Denial of Service (ReDoS) vulnerability | [
"cpe:/a:redhat:multicluster_engine:2.0::el8"
] | null | 7.5 | null | null |
RHSA-2010:0011 | Red Hat Security Advisory: httpd and httpd22 security update | httpd: NULL pointer defer in mod_proxy_ftp caused by crafted EPSV and PASV reply httpd: mod_proxy_ftp FTP command injection via Authorization HTTP header TLS: MITM attacks via session renegotiation | [
"cpe:/a:redhat:jboss_enterprise_web_server:1::el4",
"cpe:/a:redhat:jboss_enterprise_web_server:1::el5"
] | null | null | null | null |
RHSA-2016:1374 | Red Hat Security Advisory: Red Hat JBoss Portal 6.2.0 security update | JGroups: Authorization bypass | [
"cpe:/a:redhat:jboss_enterprise_portal_platform:6.2"
] | null | null | 9.8 | null |
RHSA-2020:4390 | Red Hat Security Advisory: python-django security update | Django: Incorrect HTTP detection with reverse-proxy connecting via HTTPS Django: backtracking in a regular expression in django.utils.text.Truncator leads to DoS Django: the behavior of the underlying HTMLParser leading to DoS Django: SQL injection possibility in key and index lookups for JSONField/HStoreField Django: Potential memory exhaustion in django.utils.encoding.uri_to_iri() | [
"cpe:/a:redhat:openstack:13::el7"
] | null | null | 5.3 | null |
RHSA-2024:1862 | Red Hat Security Advisory: Red Hat Single Sign-On 7.6.8 security update on RHEL 9 | keycloak: Log Injection during WebAuthn authentication or registration keycloak: Authorization Bypass keycloak: path transversal in redirection validation keycloak: org.keycloak.protocol.oidc: unvalidated cross-origin messages in checkLoginIframe leads to DDoS undertow: Out-of-memory Error after several closed connections with wildfly-http-client protocol | [
"cpe:/a:redhat:red_hat_single_sign_on:7.6::el9"
] | null | 7.5 | null | null |
RHSA-2016:0441 | Red Hat Security Advisory: openstack-heat bug fix and security advisory | openstack-heat: Vulnerability in Heat template validation leading to DoS | [
"cpe:/a:redhat:openstack:5::el7"
] | null | null | null | null |
RHSA-2020:4079 | Red Hat Security Advisory: qemu-kvm security update | QEMU: slirp: use-after-free in ip_reass() function in ip_input.c QEMU: usb: out-of-bounds r/w access issue while processing usb packets | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 5 | null | null |
RHSA-2024:9306 | Red Hat Security Advisory: httpd security update | httpd: HTTP response splitting httpd: HTTP Response Splitting in multiple modules | [
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 4 | null | null |
RHSA-2008:0582 | Red Hat Security Advisory: php security update | php crash in glob() and fnmatch() functions php htmlentities/htmlspecialchars multibyte sequences php session ID leakage PHP multibyte shell escape flaw PHP 32 bit weak random seed PHP weak 64 bit random seed | [
"cpe:/a:redhat:rhel_application_stack:1"
] | null | null | null | null |
RHSA-2022:8647 | Red Hat Security Advisory: varnish:6 security update | varnish: Request Forgery Vulnerability | [
"cpe:/a:redhat:rhel_e4s:8.1::appstream"
] | null | 7.5 | null | null |
RHSA-2013:0729 | Red Hat Security Advisory: haproxy security update | haproxy: rewrite rules flaw can lead to arbitrary code execution | [
"cpe:/a:redhat:openshift:1::el6"
] | null | null | null | null |
RHBA-2016:1348 | Red Hat Bug Fix Advisory: CFME 5.6.0 bug fixes and enhancement update | cfme: Privilege escalation causing arbitrary code execution | [
"cpe:/a:redhat:cloudforms_managementengine:5.6::el7"
] | null | null | null | null |
Subsets and Splits