id
stringlengths
13
15
title
stringlengths
29
176
description
stringlengths
8
31.7k
cpes
sequencelengths
0
20
cvss_v4_0
null
cvss_v3_1
float64
0
10
cvss_v3_0
float64
0
10
cvss_v2_0
null
RHBA-2019:0453
Red Hat Bug Fix Advisory: CloudForms 4.7.1 bug fix and enhancement update
erlang: TLS server vulnerable to Adaptive Chosen Ciphertext attack allowing plaintext recovery or MITM attack
[ "cpe:/a:redhat:cloudforms_managementengine:5.10::el7" ]
null
null
6.5
null
RHSA-2013:1812
Red Hat Security Advisory: firefox security update
Mozilla: Out-of-bounds read in image rendering (MFSA 2013-22) Mozilla: Miscellaneous memory safety hazards (rv:24.2) (MFSA 2013-104) Mozilla: Character encoding cross-origin XSS attack (MFSA 2013-106) Mozilla: Use-after-free in synthetic mouse movement (MFSA 2013-114) Mozilla: Sandbox restrictions not applied to nested object elements (MFSA 2013-107) Mozilla: Use-after-free in event listeners (MFSA 2013-108) Mozilla: Use-after-free during Table Editing (MFSA 2013-109) Mozilla: Segmentation violation when replacing ordered list elements (MFSA 2013-111)
[ "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::server", "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
null
null
RHSA-2023:6247
Red Hat Security Advisory: .NET 7.0 security update
dotnet: Denial of Service with Client Certificates using .NET Kestrel
[ "cpe:/a:redhat:enterprise_linux:8::appstream", "cpe:/a:redhat:enterprise_linux:8::crb" ]
null
6.5
null
null
RHSA-2013:1270
Red Hat Security Advisory: polkit security update
polkit: unix-process subject for authorization is racy
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
null
null
RHSA-2023:7672
Red Hat Security Advisory: OpenShift Virtualization 4.14.1 RPMs security and bug fix update
golang: crypto/tls: large handshake records may cause panics golang: net/http, mime/multipart: denial of service from excessive resource consumption
[ "cpe:/a:redhat:container_native_virtualization:4.14::el8" ]
null
7.5
null
null
RHSA-2024:8437
Red Hat Security Advisory: OpenShift Container Platform 4.17.3 security update
Podman: Buildah: CRI-O: symlink traversal vulnerability in the containers/storage library can cause Denial of Service (DoS)
[ "cpe:/a:redhat:openshift:4.17::el8", "cpe:/a:redhat:openshift:4.17::el9" ]
null
6.5
null
null
RHSA-2025:1132
Red Hat Security Advisory: firefox security update
firefox: thunderbird: Use-after-free in XSLT firefox: thunderbird: Use-after-free in Custom Highlight firefox: thunderbird: A bug in WebAssembly code generation could result in a crash firefox: thunderbird: Use-after-free during concurrent delazification firefox: thunderbird: Potential opening of private browsing tabs in normal browsing windows firefox: thunderbird: Certificate length was not properly checked firefox: thunderbird: Memory safety bugs fixed in Firefox 135, Thunderbird 135, Firefox ESR 115.20, Firefox ESR 128.7, Thunderbird 115.20, and Thunderbird 128.7 firefox: thunderbird: Memory safety bugs fixed in Firefox 135, Thunderbird 135, Firefox ESR 128.7, and Thunderbird 128.7
[ "cpe:/o:redhat:rhel_els:7" ]
null
8.8
null
null
RHSA-2024:7819
Red Hat Security Advisory: buildah security update
encoding/gob: golang: Calling Decoder.Decode on a message which contains deeply nested structures can cause a panic due to stack exhaustion
[ "cpe:/a:redhat:rhel_eus:9.2::appstream" ]
null
7.5
null
null
RHSA-2024:9901
Red Hat Security Advisory: tigervnc security update
xorg-x11-server: tigervnc: heap-based buffer overflow privilege escalation vulnerability
[ "cpe:/o:redhat:rhel_els:7" ]
null
7.8
null
null
RHSA-2023:1663
Red Hat Security Advisory: Red Hat JBoss Web Server 5.7.2 release and security update
tomcat: request smuggling tomcat: JsonErrorReportValve injection
[ "cpe:/a:redhat:jboss_enterprise_web_server:5.7::el7", "cpe:/a:redhat:jboss_enterprise_web_server:5.7::el8", "cpe:/a:redhat:jboss_enterprise_web_server:5.7::el9" ]
null
7.5
null
null
RHSA-2016:0103
Red Hat Security Advisory: kernel security, bug fix, and enhancement update
virt: guest to host DoS by triggering an infinite loop in microcode via #DB exception kernel: Possible use-after-free vulnerability in keyring facility kernel: pipe buffer state corruption after unsuccessful atomic read from pipe
[ "cpe:/o:redhat:rhel_eus:7.1::computenode", "cpe:/o:redhat:rhel_eus:7.1::server" ]
null
null
null
null
RHSA-2023:7160
Red Hat Security Advisory: opensc security and bug fix update
opensc: buffer overrun vulnerability in pkcs15 cardos_have_verifyrc_package
[ "cpe:/o:redhat:enterprise_linux:8::baseos" ]
null
6.3
null
null
RHSA-2009:1039
Red Hat Security Advisory: ntp security update
ntp: buffer overflow in ntpq ntp: remote arbitrary code execution vulnerability if autokeys is enabled
[ "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
RHSA-2019:0735
Red Hat Security Advisory: katello-installer-base security and enhancement update
katello-installer-base: QMF methods exposed to goferd via qdrouterd
[ "cpe:/a:redhat:satellite:6.4::el7", "cpe:/a:redhat:satellite_capsule:6.4::el7" ]
null
null
8
null
RHBA-2021:1503
Red Hat Bug Fix Advisory: samba bug fix update
samba: Netlogon elevation of privilege vulnerability (Zerologon) samba: Missing handle permissions check in SMB1/2/3 ChangeNotify samba: Unprivileged user can crash winbind
[ "cpe:/a:redhat:storage:3.5:samba:el8" ]
null
5
null
null
RHSA-2011:0013
Red Hat Security Advisory: wireshark security update
Wireshark: Stack-based array index error in ENTTEC dissector (upstream bug #5539)
[ "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws", "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::client_workstation", "cpe:/o:redhat:enterprise_linux:5::server", "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
null
null
RHSA-2018:2179
Red Hat Security Advisory: Red Hat Ceph Storage 3.0 security and bug fix update
ceph: cephx protocol is vulnerable to replay attack ceph: cephx uses weak signatures ceph: ceph-mon does not perform authorization on OSD pool ops
[ "cpe:/a:redhat:ceph_storage:3::ubuntu16.04" ]
null
null
4.6
null
RHSA-2009:1108
Red Hat Security Advisory: httpd security update
apr-util heap buffer underwrite apr-util billion laughs attack apr-util single NULL byte buffer overflow
[ "cpe:/o:redhat:enterprise_linux:3::as", "cpe:/o:redhat:enterprise_linux:3::desktop", "cpe:/o:redhat:enterprise_linux:3::es", "cpe:/o:redhat:enterprise_linux:3::ws" ]
null
null
null
null
RHSA-2018:1129
Red Hat Security Advisory: kernel security and bug fix update
hw: cpu: speculative execution branch target injection hw: cpu: speculative execution permission faults handling
[ "cpe:/o:redhat:rhel_eus:7.3::computenode", "cpe:/o:redhat:rhel_eus:7.3::server" ]
null
null
5.5
null
RHSA-2020:1933
Red Hat Security Advisory: targetcli security update
targetcli: world writable /var/run/targetclid.sock allows unprivileged user to execute commands
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
7.8
null
null
RHSA-2005:371
Red Hat Security Advisory: ncpfs security update
security flaw
[ "cpe:/o:redhat:enterprise_linux:2.1::as", "cpe:/o:redhat:enterprise_linux:2.1::aw", "cpe:/o:redhat:enterprise_linux:2.1::es" ]
null
null
null
null
RHSA-2023:6667
Red Hat Security Advisory: samba security, bug fix, and enhancement update
samba: out-of-bounds read in winbind AUTH_CRAP samba: infinite loop in mdssvc RPC service for spotlight samba: type confusion in mdssvc RPC service for spotlight samba: spotlight server-side share path disclosure
[ "cpe:/a:redhat:enterprise_linux:9::appstream", "cpe:/a:redhat:enterprise_linux:9::crb", "cpe:/a:redhat:enterprise_linux:9::resilientstorage", "cpe:/o:redhat:enterprise_linux:9::baseos" ]
null
5.3
null
null
RHSA-2021:3027
Red Hat Security Advisory: microcode_ctl security, bug fix and enhancement update
hw: Special Register Buffer Data Sampling (SRBDS) hw: Vector Register Data Sampling hw: L1D Cache Eviction Sampling hw: Information disclosure issue in Intel SGX via RAPL interface hw: Vector Register Leakage-Active hw: Fast forward store predictor hw: vt-d related privilege escalation hw: improper isolation of shared resources in some Intel Processors hw: observable timing discrepancy in some Intel Processors
[ "cpe:/o:redhat:enterprise_linux:8::baseos" ]
null
2.8
6.5
null
RHSA-2022:6815
Red Hat Security Advisory: squid security update
squid: buffer-over-read in SSPI and SMB authentication
[ "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
8.6
null
null
RHSA-2019:4201
Red Hat Security Advisory: CloudForms 5.0.1 security, bug fix and enhancement update
cfme: rubygem-rubyzip denial of service via crafted ZIP file
[ "cpe:/a:redhat:cloudforms_managementengine:5.11::el8" ]
null
null
5.5
null
RHSA-2014:0762
Red Hat Security Advisory: rubygem-openshift-origin-node security update
Origin: Command execution as root via downloadable cartridge source-url
[ "cpe:/a:redhat:openshift:1.2::el6" ]
null
null
null
null
RHSA-2020:4945
Red Hat Security Advisory: thunderbird security update
Mozilla: Memory safety bugs fixed in Firefox 82 and Firefox ESR 78.4 chromium-browser: Use after free in WebRTC
[ "cpe:/a:redhat:rhel_eus:8.1::appstream" ]
null
8.8
null
null
RHSA-2013:0590
Red Hat Security Advisory: nss-pam-ldapd security update
nss-pam-ldapd: FD_SET array index error, leading to stack-based buffer overflow
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
null
null
RHSA-2019:2806
Red Hat Security Advisory: ruby security update
ruby: Command injection vulnerability in Net::FTP
[ "cpe:/o:redhat:rhel_aus:7.3::server", "cpe:/o:redhat:rhel_e4s:7.3::server", "cpe:/o:redhat:rhel_tus:7.3::server" ]
null
null
6.3
null
RHSA-2021:1610
Red Hat Security Advisory: curl security and bug fix update
curl: Expired pointer dereference via multi API with CURLOPT_CONNECT_ONLY option set curl: FTP PASV command response can cause curl to connect to arbitrary host curl: Malicious FTP server can trigger stack overflow when CURLOPT_CHUNK_BGN_FUNCTION is used curl: Inferior OCSP verification
[ "cpe:/o:redhat:enterprise_linux:8::baseos" ]
null
7.4
null
null
RHSA-2017:0245
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform security update
tomcat: HTTP Request smuggling vulnerability due to permitting invalid character in HTTP requests EAP: Sensitive data can be exposed at the server level in domain mode admin-cli: Potential EAP resource starvation DOS attack via GET requests for server log files jboss: jbossas: unsafe chown of server.log in jboss init script allows privilege escalation
[ "cpe:/a:redhat:jboss_enterprise_application_platform:6::el7" ]
null
null
7
null
RHSA-2003:389
Red Hat Security Advisory: kernel security update
security flaw
[ "cpe:/o:redhat:enterprise_linux:2.1::as", "cpe:/o:redhat:enterprise_linux:2.1::es", "cpe:/o:redhat:enterprise_linux:2.1::ws" ]
null
null
null
null
RHSA-2010:0394
Red Hat Security Advisory: kernel security, bug fix, and enhancement update
kernel: ia64: ptrace: peek_or_poke requests miss ptrace_check_attach() kernel: information leak via userspace USB interface kernel: ALSA: hda-intel: Avoid divide by zero crash kernel: dvb-core: DoS bug in ULE decapsulation code kernel: ipv6: skb is unexpectedly freed
[ "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws" ]
null
null
null
null
RHSA-2024:9158
Red Hat Security Advisory: lldpd security update
lldp/openvswitch: denial of service via externally triggered memory leak lldpd: out-of-bounds read when decoding SONMP packets lldpd: CDP PDU Packet cdp.c out-of-bounds read
[ "cpe:/a:redhat:enterprise_linux:9::appstream" ]
null
7.5
null
null
RHSA-2001:072
Red Hat Security Advisory: : Updated man package fixing GID security problems.
security flaw security flaw
[ "cpe:/o:redhat:linux:5.2", "cpe:/o:redhat:linux:6.2", "cpe:/o:redhat:linux:7.0", "cpe:/o:redhat:linux:7.1" ]
null
null
null
null
RHSA-2024:6612
Red Hat Security Advisory: fence-agents security update
pypa/setuptools: Remote code execution via download functions in the package_index module in pypa/setuptools
[ "cpe:/a:redhat:rhel_e4s:9.0::appstream", "cpe:/a:redhat:rhel_e4s:9.0::highavailability", "cpe:/a:redhat:rhel_e4s:9.0::resilientstorage" ]
null
8.8
null
null
RHSA-2021:3487
Red Hat Security Advisory: Red Hat OpenStack Platform 16.2 (etcd) security update
golang: net/http: panic in ReadRequest and ReadResponse when reading a very large header golang: net: lookup functions may return invalid host names golang: net/http/httputil: ReverseProxy forwards connection headers if first one is empty golang: math/big.Rat: may cause a panic or an unrecoverable fatal error if passed inputs with very large exponents
[ "cpe:/a:redhat:openstack:16.2::el8" ]
null
7.5
null
null
RHSA-2003:227
Red Hat Security Advisory: : : : Updated sendmail packages fix vulnerabilities
security flaw security flaw security flaw
[ "cpe:/o:redhat:linux:7.1" ]
null
null
null
null
RHSA-2012:1261
Red Hat Security Advisory: dbus security update
dbus: privilege escalation when libdbus is used in setuid/setgid application
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
null
null
RHSA-2023:5726
Red Hat Security Advisory: OpenJDK 8u392 Windows Security Update
OpenJDK: IOR deserialization issue in CORBA (8303384) OpenJDK: certificate path validation issue during client authentication (8309966)
[ "cpe:/a:redhat:openjdk:1.8::windows" ]
null
5.3
null
null
RHSA-2021:0946
Red Hat Security Advisory: Red Hat Build of OpenJDK 1.8 (container images) release and security update
containers/openjdk: /etc/passwd is given incorrect privileges
[ "cpe:/a:redhat:openjdk:1.8" ]
null
7
null
null
RHSA-2021:4851
Red Hat Security Advisory: Red Hat AMQ Broker 7.9.1 release and security update
netty-codec: Bzip2Decoder doesn't allow setting size restrictions for decompressed data netty-codec: SnappyFrameDecoder doesn't restrict chunk length and may buffer skippable chunks in an unnecessary way
[ "cpe:/a:redhat:amq_broker:7" ]
null
7.5
null
null
RHSA-2022:8252
Red Hat Security Advisory: yajl security update
yajl: heap-based buffer overflow when handling large inputs due to an integer overflow
[ "cpe:/a:redhat:enterprise_linux:9::appstream", "cpe:/a:redhat:enterprise_linux:9::crb" ]
null
5.9
null
null
RHSA-2022:0166
Red Hat Security Advisory: OpenJDK 17.0.2 security update for Portable Linux Builds
OpenJDK: Incomplete deserialization class filtering in ObjectInputStream (Serialization, 8264934) OpenJDK: Incorrect reading of TIFF files in TIFFNullDecompressor (ImageIO, 8270952) OpenJDK: Insufficient URI checks in the XSLT TransformerImpl (JAXP, 8270492) OpenJDK: Unexpected exception thrown in regex Pattern (Libraries, 8268813) OpenJDK: Incorrect marking of writeable fields (Hotspot, 8270386) OpenJDK: Incomplete checks of StringBuffer and StringBuilder during deserialization (Libraries, 8270392) OpenJDK: Incorrect IdentityHashMap size checks during deserialization (Libraries, 8270416) OpenJDK: Incorrect access checks in XMLEntityManager (JAXP, 8270498) OpenJDK: Infinite loop related to incorrect handling of newlines in XMLEntityScanner (JAXP, 8270646) OpenJDK: Array indexing issues in LIRGenerator (Hotspot, 8272014) OpenJDK: Excessive resource use when reading JAR manifest attributes (Libraries, 8272026) OpenJDK: Insufficient checks when deserializing exceptions in ObjectInputStream (Serialization, 8272236) OpenJDK: Excessive memory allocation in BMPImageReader (ImageIO, 8273756) OpenJDK: Integer overflow in BMPImageReader (ImageIO, 8273838) OpenJDK: Excessive memory allocation in TIFF*Decompressor (ImageIO, 8274096)
[ "cpe:/a:redhat:openjdk:17" ]
null
5.3
null
null
RHSA-2005:378
Red Hat Security Advisory: cpio security update
security flaw
[ "cpe:/o:redhat:enterprise_linux:3::as", "cpe:/o:redhat:enterprise_linux:3::desktop", "cpe:/o:redhat:enterprise_linux:3::es", "cpe:/o:redhat:enterprise_linux:3::ws", "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws" ]
null
null
null
null
RHSA-2006:0190
Red Hat Security Advisory: kernel security update
security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw
[ "cpe:/o:redhat:enterprise_linux:2.1::as", "cpe:/o:redhat:enterprise_linux:2.1::aw" ]
null
null
null
null
RHSA-2024:4408
Red Hat Security Advisory: tpm2-tss security update
tpm2-tss: Buffer Overlow in TSS2_RC_Decode
[ "cpe:/o:redhat:rhel_aus:8.6::baseos", "cpe:/o:redhat:rhel_e4s:8.6::baseos", "cpe:/o:redhat:rhel_tus:8.6::baseos" ]
null
6.4
null
null
RHSA-2018:2317
Red Hat Security Advisory: xmlrpc security update
xmlrpc: Deserialization of untrusted Java object through <ex:serializable> tag
[ "cpe:/o:redhat:enterprise_linux:7::hypervisor" ]
null
null
7.5
null
RHSA-2011:0306
Red Hat Security Advisory: samba3x security update
Samba unsafe fd_set usage
[ "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
RHSA-2019:3011
Red Hat Security Advisory: Red Hat Virtualization security, bug fix, and enhancement update
kernel: hw: Spectre SWAPGS gadget vulnerability
[ "cpe:/o:redhat:enterprise_linux:7::hypervisor" ]
null
null
5.9
null
RHSA-2017:2445
Red Hat Security Advisory: qemu-kvm security update
Qemu: qemu-nbd: server breaks with SIGPIPE upon client abort
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
5.3
null
RHSA-2021:2394
Red Hat Security Advisory: rh-postgresql12-postgresql security update
postgresql: Partition constraint violation errors leak values of denied columns postgresql: Buffer overrun from integer overflow in array subscripting calculations postgresql: Memory disclosure in INSERT ... ON CONFLICT ... DO UPDATE postgresql: Memory disclosure in partitioned-table UPDATE ... RETURNING
[ "cpe:/a:redhat:rhel_software_collections:3::el7" ]
null
6.5
null
null
RHSA-2019:2609
Red Hat Security Advisory: kernel-rt security and bug fix update
kernel: hw: Spectre SWAPGS gadget vulnerability kernel: brcmfmac heap buffer overflow in brcmf_wowl_nd_results
[ "cpe:/a:redhat:rhel_extras_rt:7" ]
null
null
6.5
null
RHSA-2013:0565
Red Hat Security Advisory: Red Hat Enterprise MRG Grid 2.3 security update
condor: DoS when removing jobs via jobcontrol.py when job id is in square brackets
[ "cpe:/a:redhat:enterprise_mrg:2:computenode:el6", "cpe:/a:redhat:enterprise_mrg:2:server:el6" ]
null
null
null
null
RHSA-2021:3810
Red Hat Security Advisory: libxml2 security update
libxml2: Use after free via namespace node in XPointer ranges
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
5.3
null
RHSA-2021:0949
Red Hat Security Advisory: Red Hat OpenShift Do openshift/odo-init-image 1.1.3 security update
expat: large number of colons in input makes parser consume high amount of resources, leading to DoS e2fsprogs: Crafted ext4 partition leads to out-of-bounds write e2fsprogs: Out-of-bounds write in e2fsck/rehash.c curl: heap buffer overflow in function tftp_receive_packet() nss: Out-of-bounds read when importing curve25519 private key nss: PKCS#1 v1.5 signatures can be used for TLS 1.3 nss: Use-after-free in sftk_FreeSession due to improper refcounting glib2: file_copy_fallback in gio/gfile.c in GNOME GLib does not properly restrict file permissions while a copy operation is in progress dbus: DBusServer DBUS_COOKIE_SHA1 authentication bypass ibus: missing authorization allows local attacker to access the input bus of another user cpio: improper input validation when writing tar header fields leads to unexpected tar generation expat: heap-based buffer over-read via crafted XML input python: XSS vulnerability in the documentation XML-RPC server in server_title field nss: Check length of inputs for cryptographic primitives nss: TLS 1.3 HelloRetryRequest downgrade request sets client into invalid state libssh2: integer overflow in SSH_MSG_DISCONNECT logic in packet.c glibc: LD_PREFER_MAP_32BIT_EXEC not ignored in setuid binaries libxml2: memory leak in xmlParseBalancedChunkMemoryRecover in parser.c systemd: memory leak in button_open() in login/logind-button.c when udev events are received libxml2: memory leak in xmlSchemaPreRun in xmlschemas.c python: infinite loop in the tarfile module via crafted TAR archive glibc: buffer over-read in iconv when processing invalid multi-byte input sequences in the EUC-KR encoding openssl: EDIPARTYNAME NULL pointer de-reference nss: Side channel attack on ECDSA signature generation libxml2: infinite loop in xmlStringLenDecodeEntities in some end-of-file situations curl: Incorrect argument check can allow remote servers to overwrite local files glibc: stack corruption from crafted input in cosl, sinl, sincosl, and tanl functions openldap: denial of service via nested boolean expressions in LDAP search filters nss: P-384 and P-521 implementation uses a side-channel vulnerable modular inversion function nss: ECDSA timing attack mitigation bypass nss: Side channel vulnerabilities during RSA key generation nss: CHACHA20-POLY1305 decryption with undersized tag leads to out-of-bounds read glibc: stack-based buffer overflow if the input to any of the printf family of functions is an 80-bit long double with a non-canonical bit pattern
[ "cpe:/a:redhat:openshift_do:1.0::el7" ]
null
7.5
2.9
null
RHSA-2024:3414
Red Hat Security Advisory: kernel-rt security and bug fix update
kernel: Use-after-free in nft_verdict_dump due to a race between set GC and transaction kernel: Marvin vulnerability side-channel leakage in the RSA decryption operation kernel: inactive elements in nft_pipapo_walk kernel: netfilter: nftables: exthdr: fix 4-byte stack OOB write kernel: nf_tables: use-after-free vulnerability in the nft_verdict_init() function kernel: mlxsw: spectrum_acl_tcam: Fix stack corruption
[ "cpe:/a:redhat:rhel_eus:9.0::nfv", "cpe:/a:redhat:rhel_eus:9.0::realtime" ]
null
6.7
null
null
RHSA-2023:5480
Red Hat Security Advisory: Release of OpenShift Serverless Logic 1.30.0 SP1 security update
quarkus: HTTP security policy bypass
[ "cpe:/a:redhat:openshift_serverless:1.30::el8" ]
null
8.1
null
null
RHSA-2006:0735
Red Hat Security Advisory: thunderbird security update
security flaw security flaw security flaw security flaw seamonkey < 1.0.6 multiple vulnerabilities
[ "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws" ]
null
null
null
null
RHSA-2020:5235
Red Hat Security Advisory: thunderbird security update
Mozilla: Variable time processing of cross-origin images during drawImage calls Mozilla: Parsing mismatches could confuse and bypass security sanitizer for chrome privileged code Mozilla: Fullscreen could be enabled without displaying the security UI Mozilla: XSS through paste (manual and clipboard API) Mozilla: Requests intercepted through ServiceWorkers lacked MIME type restrictions Mozilla: Use-after-free in WebRequestService Mozilla: Potential use-after-free in uses of nsTArray Mozilla: DoH did not filter IPv4 mapped IP Addresses Mozilla: Software keyboards may have remembered typed passwords Mozilla: Memory safety bugs fixed in Firefox 83 and Firefox ESR 78.5
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
8.8
6.1
null
RHSA-2020:2676
Red Hat Security Advisory: grafana security update
grafana: SSRF incorrect access control vulnerability allows unauthenticated users to make grafana send HTTP requests to any URL
[ "cpe:/a:redhat:rhel_eus:8.1::appstream" ]
null
8.2
null
null
RHSA-2024:1545
Red Hat Security Advisory: dnsmasq security update
dnsmasq: Heap use after free in dhcp6_no_relay dnsmasq: default maximum EDNS.0 UDP packet size was set to 4096 but should be 1232 bind9: KeyTrap - Extreme CPU consumption in DNSSEC validator bind9: Preparing an NSEC3 closest encloser proof can exhaust CPU resources
[ "cpe:/a:redhat:rhel_eus:8.6::appstream" ]
null
7.5
null
null
RHSA-2020:2125
Red Hat Security Advisory: kpatch-patch security update
Kernel: NetLabel: null pointer dereference while receiving CIPSO packet with null category may cause kernel panic
[ "cpe:/o:redhat:enterprise_linux:8::baseos" ]
null
5.9
null
null
RHSA-2004:166
Red Hat Security Advisory: : Updated kernel packages resolve security vulnerabilities
security flaw security flaw security flaw
[ "cpe:/o:redhat:linux:9" ]
null
null
null
null
RHSA-2023:4635
Red Hat Security Advisory: rust-toolset:rhel8 security update
rust-cargo: cargo does not respect the umask when extracting dependencies
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
6.7
null
null
RHSA-2010:0925
Red Hat Security Advisory: krb5 security and bug fix update
krb5: incorrect acceptance of certain checksums (MITKRB5-SA-2010-007) krb5: multiple checksum handling vulnerabilities (MITKRB5-SA-2010-007) krb5: krb5 may accept authdata checksums with low-entropy derived keys (MITKRB5-SA-2010-007)
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
null
null
RHSA-2020:5529
Red Hat Security Advisory: Red Hat Single Sign-On 7.4.4 on OpenJDK for OpenShift image security update
containers/redhat-sso-7: /etc/passwd is given incorrect privileges
[ "cpe:/a:redhat:rhosemc:1.0::el8" ]
null
7
null
null
RHSA-2013:0162
Red Hat Security Advisory: JBoss Enterprise SOA Platform 4.2.0.CP05 and 4.3.0.CP05 update
Web: Bypass of security constraints
[ "cpe:/a:redhat:jboss_enterprise_soa_platform:4.3.0:update5" ]
null
null
null
null
RHSA-2020:2583
Red Hat Security Advisory: OpenShift Container Platform 4.4.9 python-psutil security update
python-psutil: Double free because of refcount mishandling
[ "cpe:/a:redhat:openshift:4.4::el7" ]
null
null
7
null
RHSA-2007:0387
Red Hat Security Advisory: tcpdump security and bug fix update
tcpdump denial of service tcpdump BGP integer overflow
[ "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws" ]
null
null
null
null
RHSA-2019:2177
Red Hat Security Advisory: sssd security, bug fix, and enhancement update
sssd: improper implementation of GPOs due to too restrictive permissions sssd: fallback_homedir returns '/' for empty home directories in passwd file
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
4.1
null
RHSA-2021:5171
Red Hat Security Advisory: nodejs:16 security, bug fix, and enhancement update
nodejs-ini: Prototype pollution via malicious INI file nodejs-glob-parent: Regular expression denial of service nodejs-ansi-regex: Regular expression denial of service (ReDoS) matching ANSI escape codes nodejs-json-schema: Prototype pollution vulnerability llhttp: HTTP Request Smuggling due to spaces in headers llhttp: HTTP Request Smuggling when parsing the body of chunked requests nodejs-normalize-url: ReDoS for data URLs
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
7.5
null
null
RHSA-2017:0456
Red Hat Security Advisory: Red Hat JBoss Web Server 3.1.0 security and enhancement update
tomcat: timing attack in Realm implementation tomcat: unsafe chown of catalina.log in tomcat init script allows privilege escalation tomcat: Usage of vulnerable FileUpload package can result in denial of service tomcat: security manager bypass via IntrospectHelper utility function tomcat: tomcat writable config files allow privilege escalation tomcat: system property disclosure tomcat: security manager bypass via JSP Servlet config parameters tomcat: unrestricted access to global resources tomcat: HTTP Request smuggling vulnerability due to permitting invalid character in HTTP requests tomcat: Remote code execution vulnerability in JmxRemoteLifecycleListener tomcat: information disclosure due to incorrect Processor sharing
[ "cpe:/a:redhat:jboss_enterprise_web_server:3.1::el7" ]
null
null
7.5
null
RHSA-2023:1064
Red Hat Security Advisory: OpenShift Developer Tools and Services for OCP 4.12 security update
Libraries: Untrusted users can modify some Pipeline libraries in Pipeline Shared Groovy Libraries Plugin plugin: User-scoped credentials exposed to other users by Pipeline SCM API for Blue Ocean Plugin jackson-databind: deep wrapper array nesting wrt UNWRAP_SINGLE_VALUE_ARRAYS jackson-databind: use of deeply nested arrays jenkins-plugin/script-security: Sandbox bypass vulnerabilities in Jenkins Script Security Plugin jenkins-plugin/workflow-cps: Sandbox bypass vulnerabilities in Pipeline: Groovy Plugin jenkins-plugin/script-security: Sandbox bypass vulnerabilities in Jenkins Script Security Plugin jenkins-plugin/script-security: Sandbox bypass vulnerabilities in Jenkins Script Security Plugin jenkins-plugin/pipeline-groovy-lib: Sandbox bypass vulnerability in Pipeline: Groovy Libraries Plugin jenkins-plugin/workflow-cps-global-lib: Sandbox bypass vulnerability in Pipeline: Deprecated Groovy Libraries Plugin jenkins-plugin/pipeline-input-step: CSRF protection for any URL can be bypassed in Pipeline: Input Step Plugin jenkins-plugin/pipeline-stage-view: CSRF protection for any URL can be bypassed in Pipeline: Stage View Plugin jenkins-plugin/workflow-support: Stored XSS vulnerability in Pipeline: Supporting APIs Plugin jenkins-plugin/mercurial: Webhook endpoint discloses job names to unauthorized users in Mercurial Plugin mina-sshd: Java unsafe deserialization vulnerability
[ "cpe:/a:redhat:ocp_tools:4.12::el8" ]
null
9.8
null
null
RHSA-2022:0130
Red Hat Security Advisory: firefox security update
Mozilla: Iframe sandbox bypass with XSLT Mozilla: Race condition when playing audio files Mozilla: Heap-buffer-overflow in blendGaussianBlur Mozilla: Missing throttling on external protocol launch dialog Mozilla: Use-after-free of ChannelEventQueue::mOwner Mozilla: Browser window spoof using fullscreen mode Mozilla: Out-of-bounds memory access when inserting text in edit mode Mozilla: Browser window spoof using fullscreen mode Mozilla: Leaking cross-origin URLs through securitypolicyviolation event Mozilla: Crash when handling empty pkcs7 sequence Mozilla: Spoofed origin on external protocol launch dialog Mozilla: Memory safety bugs fixed in Firefox 96 and Firefox ESR 91.5
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
8.8
6.1
null
RHSA-2019:3211
Red Hat Security Advisory: chromium-browser security update
chromium-browser: Use-after-free in media chromium-browser: Heap overflow in Skia chromium-browser: Use-after-free in Mojo chromium-browser: External URIs may trigger other browsers chromium-browser: URL bar spoof via download redirect chromium-browser: Use-after-free in media chromium-browser: Out-of-bounds access in V8 chromium-browser: Use-after-free in V8 chromium-browser: Extensions can read some local files chromium-browser: SameSite cookie bypass chromium-browser: Arbitrary read in SwiftShader chromium-browser: URL spoof chromium-browser: Full screen notification overlap chromium-browser: Full screen notification spoof chromium-browser: CSP bypass chromium-browser: IDN spoof chromium-browser: CSRF bypass chromium-browser: Multiple file download protection bypass chromium-browser: Side channel using storage size estimate chromium-browser: URI bar spoof when using external app URIs chromium-browser: Global window leak via console chromium-browser: HTTP authentication spoof chromium-browser: V8 memory corruption in regex chromium-browser: Dialog box fails to show origin chromium-browser: Cross-origin information leak using devtools chromium-browser: IDN spoofing chromium-browser: Extensions can be disabled by trailing slash chromium-browser: Google URI shown for certificate warning chromium-browser: Chrome web store origin needs to be isolated chromium-browser: Download dialog spoofing chromium-browser: User gesture needed for printing chromium-browser: IP address spoofing to servers chromium-browser: Bypass on download restrictions chromium-browser: Site isolation bypass chromium-browser: Exceptions leaked by devtools chromium-browser: Use-after-free in UI chromium-browser: Use-after-free in offline pages chromium-browser: Use-after-free in media chromium-browser: Use-after-free in media chromium-browser: Omnibox spoof chromium-browser: SOP bypass chromium-browser: Use-after-free in IndexedDB chromium-browser: Use-after-free in WebRTC chromium-browser: Use-after-free in audio chromium-browser: Use-after-free in V8 chromium-browser: Cross-origin size leak
[ "cpe:/a:redhat:rhel_extras:6" ]
null
null
8.8
null
RHSA-2017:1601
Red Hat Security Advisory: CFME 5.7.3 security, bug fix and enhancement update
CFME: default certificate used across all installs cfme: API leaks any MiqReportResult CFME: Dialog for creating cloud volumes does not filter cloud tenants CVE-2017-7497
[ "cpe:/a:redhat:cloudforms_managementengine:5.7::el7" ]
null
null
4.1
null
RHSA-2017:3200
Red Hat Security Advisory: kernel security and bug fix update
kernel: Divide-by-zero in __tcp_select_window kernel: Heap out-of-bounds read in AF_PACKET sockets kernel: Exploitable memory corruption due to UFO to non-UFO path switch
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
7
null
RHSA-2004:414
Red Hat Security Advisory: qt security update
security flaw security flaw security flaw
[ "cpe:/o:redhat:enterprise_linux:3::as", "cpe:/o:redhat:enterprise_linux:3::desktop", "cpe:/o:redhat:enterprise_linux:3::es", "cpe:/o:redhat:enterprise_linux:3::ws" ]
null
null
null
null
RHSA-2023:5464
Red Hat Security Advisory: frr security update
frr: Incorrect handling of a error in parsing of an invalid section of a BGP update can de-peer a router
[ "cpe:/a:redhat:rhel_e4s:8.1::appstream" ]
null
7.5
null
null
RHSA-2024:1836
Red Hat Security Advisory: kernel security, bug fix, and enhancement update
kernel: ext4: kernel bug in ext4_write_inline_data_end() kernel: Out of boundary write in perf_read_group() as result of overflow a perf_event's read_size
[ "cpe:/a:redhat:rhel_eus:9.0::appstream", "cpe:/a:redhat:rhel_eus:9.0::crb", "cpe:/o:redhat:rhel_eus:9.0::baseos" ]
null
7
null
null
RHSA-2013:0274
Red Hat Security Advisory: java-1.6.0-openjdk security update
SSL/TLS: CBC padding timing attack (lucky-13) OpenJDK: MBeanServer insufficient privilege restrictions (JMX, 8006446)
[ "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
RHSA-2024:0664
Red Hat Security Advisory: OpenShift Container Platform 4.12.49 bug fix update and security update
golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487)
[ "cpe:/a:redhat:openshift:4.12::el8", "cpe:/a:redhat:openshift:4.12::el9" ]
null
7.5
null
null
RHSA-2023:5709
Red Hat Security Advisory: dotnet7.0 security update
HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack)
[ "cpe:/a:redhat:enterprise_linux:8::appstream", "cpe:/a:redhat:enterprise_linux:8::crb" ]
null
7.5
null
null
RHSA-2023:7697
Red Hat Security Advisory: AMQ Clients 2023.Q4
SnakeYaml: Constructor Deserialization Remote Code Execution snakeyaml: Denial of Service due to missing nested depth limitation for collections snakeyaml: Uncaught exception in org.yaml.snakeyaml.composer.Composer.composeSequenceNode dev-java/snakeyaml: DoS via stack overflow json-smart: Uncontrolled Resource Consumption vulnerability in json-smart (Resource Exhaustion) springframework-amqp: Deserialization Vulnerability netty: SniHandler 16MB allocation leads to OOM jetty: Improper validation of HTTP/1 content-length
[ "cpe:/a:redhat:amq_clients:2023_q4" ]
null
5.3
null
null
RHSA-2021:1064
Red Hat Security Advisory: virt:rhel and virt-devel:rhel security update
QEMU: Regression of CVE-2020-10756 fix in virt:rhel/qemu-kvm in Red Hat Enterprise Linux 8.3
[ "cpe:/a:redhat:enterprise_linux:8::appstream", "cpe:/a:redhat:enterprise_linux:8::crb" ]
null
6.5
null
null
RHSA-2017:2472
Red Hat Security Advisory: kernel security and bug fix update
kernel: NFSv3 server does not properly handle payload bounds checking of WRITE requests
[ "cpe:/o:redhat:rhel_aus:5.9" ]
null
null
6.5
null
RHSA-2014:0037
Red Hat Security Advisory: jasperreports-server-pro security, bug fix, and enhancement update
axis: missing connection hostname check against X.509 certificate name hadoop: man-in-the-middle vulnerability
[ "cpe:/a:redhat:rhev_manager:3" ]
null
null
null
null
RHSA-2023:2098
Red Hat Security Advisory: Multicluster Engine for Kubernetes 2.0.8 security updates and bug fixes
http-cache-semantics: Regular Expression Denial of Service (ReDoS) vulnerability
[ "cpe:/a:redhat:multicluster_engine:2.0::el8" ]
null
7.5
null
null
RHSA-2010:0011
Red Hat Security Advisory: httpd and httpd22 security update
httpd: NULL pointer defer in mod_proxy_ftp caused by crafted EPSV and PASV reply httpd: mod_proxy_ftp FTP command injection via Authorization HTTP header TLS: MITM attacks via session renegotiation
[ "cpe:/a:redhat:jboss_enterprise_web_server:1::el4", "cpe:/a:redhat:jboss_enterprise_web_server:1::el5" ]
null
null
null
null
RHSA-2016:1374
Red Hat Security Advisory: Red Hat JBoss Portal 6.2.0 security update
JGroups: Authorization bypass
[ "cpe:/a:redhat:jboss_enterprise_portal_platform:6.2" ]
null
null
9.8
null
RHSA-2020:4390
Red Hat Security Advisory: python-django security update
Django: Incorrect HTTP detection with reverse-proxy connecting via HTTPS Django: backtracking in a regular expression in django.utils.text.Truncator leads to DoS Django: the behavior of the underlying HTMLParser leading to DoS Django: SQL injection possibility in key and index lookups for JSONField/HStoreField Django: Potential memory exhaustion in django.utils.encoding.uri_to_iri()
[ "cpe:/a:redhat:openstack:13::el7" ]
null
null
5.3
null
RHSA-2024:1862
Red Hat Security Advisory: Red Hat Single Sign-On 7.6.8 security update on RHEL 9
keycloak: Log Injection during WebAuthn authentication or registration keycloak: Authorization Bypass keycloak: path transversal in redirection validation keycloak: org.keycloak.protocol.oidc: unvalidated cross-origin messages in checkLoginIframe leads to DDoS undertow: Out-of-memory Error after several closed connections with wildfly-http-client protocol
[ "cpe:/a:redhat:red_hat_single_sign_on:7.6::el9" ]
null
7.5
null
null
RHSA-2016:0441
Red Hat Security Advisory: openstack-heat bug fix and security advisory
openstack-heat: Vulnerability in Heat template validation leading to DoS
[ "cpe:/a:redhat:openstack:5::el7" ]
null
null
null
null
RHSA-2020:4079
Red Hat Security Advisory: qemu-kvm security update
QEMU: slirp: use-after-free in ip_reass() function in ip_input.c QEMU: usb: out-of-bounds r/w access issue while processing usb packets
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
5
null
null
RHSA-2024:9306
Red Hat Security Advisory: httpd security update
httpd: HTTP response splitting httpd: HTTP Response Splitting in multiple modules
[ "cpe:/a:redhat:enterprise_linux:9::appstream" ]
null
4
null
null
RHSA-2008:0582
Red Hat Security Advisory: php security update
php crash in glob() and fnmatch() functions php htmlentities/htmlspecialchars multibyte sequences php session ID leakage PHP multibyte shell escape flaw PHP 32 bit weak random seed PHP weak 64 bit random seed
[ "cpe:/a:redhat:rhel_application_stack:1" ]
null
null
null
null
RHSA-2022:8647
Red Hat Security Advisory: varnish:6 security update
varnish: Request Forgery Vulnerability
[ "cpe:/a:redhat:rhel_e4s:8.1::appstream" ]
null
7.5
null
null
RHSA-2013:0729
Red Hat Security Advisory: haproxy security update
haproxy: rewrite rules flaw can lead to arbitrary code execution
[ "cpe:/a:redhat:openshift:1::el6" ]
null
null
null
null
RHBA-2016:1348
Red Hat Bug Fix Advisory: CFME 5.6.0 bug fixes and enhancement update
cfme: Privilege escalation causing arbitrary code execution
[ "cpe:/a:redhat:cloudforms_managementengine:5.6::el7" ]
null
null
null
null