id
stringlengths 13
15
| title
stringlengths 29
176
| description
stringlengths 8
31.7k
| cpes
sequencelengths 0
20
| cvss_v4_0
null | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
null |
---|---|---|---|---|---|---|---|
RHSA-2018:0576 | Red Hat Security Advisory: Red Hat JBoss BRMS 6.4.9 security update | jackson-databind: Unsafe deserialization due to incomplete black list (incomplete fix for CVE-2017-7525) | [
"cpe:/a:redhat:jboss_enterprise_brms_platform:6.4"
] | null | null | 8.1 | null |
RHSA-2015:0284 | Red Hat Security Advisory: kernel security and bug fix update | kernel: ipc: ipc_rcu_putref refcount races Kernel: USB serial: memory corruption flaw kernel: kvm: PIT timer race condition kernel: kvm: vmx: invept vm exit not handled kernel: kvm: vmx: invvpid vm exit not handled kernel: net: sctp: NULL pointer dereference in af->from_addr_param on malformed packet kernel: iptables restriction bypass if a protocol handler kernel module not loaded | [
"cpe:/o:redhat:rhel_eus:6.5::computenode",
"cpe:/o:redhat:rhel_eus:6.5::server"
] | null | null | null | null |
RHSA-2002:242 | Red Hat Security Advisory: : Updated kerberos packages available | security flaw | [
"cpe:/o:redhat:linux:6.2",
"cpe:/o:redhat:linux:7.0",
"cpe:/o:redhat:linux:7.1",
"cpe:/o:redhat:linux:7.2",
"cpe:/o:redhat:linux:7.3",
"cpe:/o:redhat:linux:8.0"
] | null | null | null | null |
RHSA-2018:1643 | Red Hat Security Advisory: qemu-kvm-rhev security update | hw: cpu: speculative store bypass QEMU: i386: multiboot OOB access while loading kernel image QEMU: cirrus: OOB access when updating VGA display | [
"cpe:/a:redhat:openstack:12::el7"
] | null | null | 5.5 | null |
RHSA-2021:3725 | Red Hat Security Advisory: kernel security and bug fix update | kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c kernel: race condition for removal of the HCI controller kernel: powerpc: KVM guest OS users can cause host OS memory corruption | [
"cpe:/o:redhat:rhel_aus:7.4::server"
] | null | 7.8 | null | null |
RHSA-2021:0184 | Red Hat Security Advisory: kernel security and bug fix update | kernel: information exposure in drivers/char/random.c and kernel/time/timer.c kernel: Local buffer overflow in ctnetlink_parse_tuple_filter in net/netfilter/nf_conntrack_netlink.c | [
"cpe:/a:redhat:rhel_eus:8.1::crb",
"cpe:/o:redhat:rhel_eus:8.1::baseos"
] | null | 6.7 | null | null |
RHSA-2024:1327 | Red Hat Security Advisory: gimp:2.8 security update | gimp: PSD buffer overflow RCE gimp: psp off-by-one RCE | [
"cpe:/a:redhat:rhel_aus:8.2::appstream",
"cpe:/a:redhat:rhel_e4s:8.2::appstream",
"cpe:/a:redhat:rhel_tus:8.2::appstream"
] | null | 7.8 | null | null |
RHSA-2022:6266 | Red Hat Security Advisory: convert2rhel security update | convert2rhel: Activation key passed via command line by code | [
"cpe:/a:redhat:convert2rhel::el6"
] | null | 5.5 | null | null |
RHSA-2021:2033 | Red Hat Security Advisory: xorg-x11-server security update | xorg-x11-server: XChangeFeedbackControl integer underflow leads to privilege escalation | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 7.8 | null | null |
RHSA-2006:0611 | Red Hat Security Advisory: thunderbird security update | security flaw security flaw security flaw security flaw (seamonkey): DOS/arbitrary code execution vuln with vcards security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw | [
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2021:5186 | Red Hat Security Advisory: OpenShift Container Platform 4.6.52 security update | log4j: Remote code execution in Log4j 1.x when application is configured to use JMSAppender kube-reporting/hive: Incomplete fix for log4j CVE-2021-44228 and CVE-2021-45046 | [
"cpe:/a:redhat:openshift:4.6::el8"
] | null | 8.1 | null | null |
RHSA-2011:1803 | Red Hat Security Advisory: JBoss Enterprise Web Platform 5.1.2 update | extension): MITM due to improper validation of AX attribute signatures | [
"cpe:/a:redhat:jboss_enterprise_web_platform:5::el5"
] | null | null | null | null |
RHSA-2025:0560 | Red Hat Security Advisory: Red Hat Multicluster GlobalHub 1.2.1 bug fixes and container updates | golang.org/x/crypto/ssh: Misuse of ServerConfig.PublicKeyCallback may cause authorization bypass in golang.org/x/crypto golang.org/x/net/html: Non-linear parsing of case-insensitive content in golang.org/x/net/html | [
"cpe:/a:redhat:multicluster_globalhub:1.2::el9"
] | null | 7.5 | null | null |
RHSA-2024:0561 | Red Hat Security Advisory: linux-firmware security update | amd: Return Address Predictor vulnerability leading to information disclosure hw: amd: Cross-Process Information Leak | [
"cpe:/o:redhat:rhel_aus:8.4::baseos",
"cpe:/o:redhat:rhel_e4s:8.4::baseos",
"cpe:/o:redhat:rhel_tus:8.4::baseos"
] | null | 6.5 | null | null |
RHSA-2020:5234 | Red Hat Security Advisory: firefox security update | Mozilla: Variable time processing of cross-origin images during drawImage calls Mozilla: Parsing mismatches could confuse and bypass security sanitizer for chrome privileged code Mozilla: Fullscreen could be enabled without displaying the security UI Mozilla: XSS through paste (manual and clipboard API) Mozilla: Requests intercepted through ServiceWorkers lacked MIME type restrictions Mozilla: Use-after-free in WebRequestService Mozilla: Potential use-after-free in uses of nsTArray Mozilla: DoH did not filter IPv4 mapped IP Addresses Mozilla: Software keyboards may have remembered typed passwords Mozilla: Memory safety bugs fixed in Firefox 83 and Firefox ESR 78.5 | [
"cpe:/a:redhat:rhel_eus:8.2::appstream"
] | null | 8.8 | 6.1 | null |
RHSA-2018:1639 | Red Hat Security Advisory: kernel security update | hw: cpu: speculative store bypass | [
"cpe:/o:redhat:rhel_aus:6.6::server",
"cpe:/o:redhat:rhel_tus:6.6::server"
] | null | null | 5.6 | null |
RHSA-2024:0728 | Red Hat Security Advisory: Logging Subsystem 5.8.3 - Red Hat OpenShift | golang: net/http/internal: Denial of Service (DoS) via Resource Consumption via HTTP requests | [
"cpe:/a:redhat:logging:5.8::el9"
] | null | 5.3 | null | null |
RHSA-2013:1582 | Red Hat Security Advisory: python security, bug fix, and enhancement update | python: hostname check bypassing vulnerability in SSL module | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2015:2535 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 5.2 security update | apache-commons-collections: InvokerTransformer code execution during deserialisation | [
"cpe:/a:redhat:jboss_enterprise_application_platform:5::el4",
"cpe:/a:redhat:jboss_enterprise_application_platform:5::el5",
"cpe:/a:redhat:jboss_enterprise_application_platform:5::el6"
] | null | null | null | null |
RHSA-2019:0831 | Red Hat Security Advisory: kernel-alt security and bug fix update | kernel: Integer overflow in the alarm_timer_nsleep function kernel: NULL pointer dereference in xfs_da_shrink_inode function kernel: use-after-free in ucma_leave_multicast in drivers/infiniband/core/ucma.c kernel: Unprivileged users able to inspect kernel stacks of arbitrary tasks kernel: TLB flush happens too late on mremap kernel: Type confusion in drivers/tty/n_tty.c allows for a denial of service kernel: userfaultfd bypasses tmpfs file permissions kernel: lack of check for mmap minimum address in expand_downwards in mm/mmap.c leads to NULL pointer dereferences exploit on non-SMAP platforms | [
"cpe:/o:redhat:enterprise_linux:7::server"
] | null | null | 5.5 | null |
RHSA-2005:346 | Red Hat Security Advisory: slocate security update | security flaw | [
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2019:3209 | Red Hat Security Advisory: sudo security update | sudo: Privilege escalation via 'Runas' specification with 'ALL' keyword | [
"cpe:/o:redhat:rhel_aus:7.4::server",
"cpe:/o:redhat:rhel_e4s:7.4::server",
"cpe:/o:redhat:rhel_tus:7.4::server"
] | null | null | 7 | null |
RHSA-2017:0361 | Red Hat Security Advisory: openstack-puppet-modules security update | puppet-swift: installs config file with world readable permissions | [
"cpe:/a:redhat:openstack:8::el7"
] | null | null | 6.5 | null |
RHSA-2019:3345 | Red Hat Security Advisory: virt:rhel security, bug fix, and enhancement update | ntfs-3g: heap-based buffer overflow leads to local root privilege escalation QEMU: slirp: information leakage in tcp_emu() due to uninitialized stack variables QEMU: qxl: null pointer dereference while releasing spice resources | [
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb"
] | null | null | 3.8 | null |
RHSA-2023:3944 | Red Hat Security Advisory: open-vm-tools security and bug fix update | open-vm-tools: authentication bypass vulnerability in the vgauth module | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 3.9 | null | null |
RHSA-2019:0315 | Red Hat Security Advisory: CloudForms 4.6.8 security, bug fix and enhancement update | rubygem-sinatra: XSS in the 400 Bad Request page | [
"cpe:/a:redhat:cloudforms_managementengine:5.9::el7"
] | null | null | 6.1 | null |
RHSA-2022:1173 | Red Hat Security Advisory: httpd security update | httpd: Errors encountered during the discarding of request body lead to HTTP request smuggling | [
"cpe:/o:redhat:rhel_els:6"
] | null | 8.3 | null | null |
RHSA-2021:2445 | Red Hat Security Advisory: Red Hat Ceph Storage 4.2 Security and Bug Fix Update | ceph-dashboard: Don't use Browser's LocalStorage for storing JWT but Secure Cookies with proper HTTP Headers ceph-dashboard: Cross-site scripting via token Cookie ceph: Unauthorized global_id reuse in cephx | [
"cpe:/a:redhat:ceph_storage:4::el7",
"cpe:/a:redhat:ceph_storage:4::el8"
] | null | 8 | null | null |
RHSA-2024:2693 | Red Hat Security Advisory: Red Hat JBoss Core Services Apache HTTP Server 2.4.57 SP4 security update | curl: Usage of disabled protocol curl: QUIC certificate check bypass with wolfSSL curl: HTTP/2 push headers memory-leak curl: TLS certificate check bypass with mbedTLS httpd: CONTINUATION frames DoS nghttp2: CONTINUATION frames DoS | [
"cpe:/a:redhat:jboss_core_services:1::el7",
"cpe:/a:redhat:jboss_core_services:1::el8"
] | null | 5.3 | null | null |
RHSA-2001:095 | Red Hat Security Advisory: : New util-linux packages available to fix vipw permissions problems | security flaw | [
"cpe:/o:redhat:linux:7.1"
] | null | null | null | null |
RHSA-2020:4255 | Red Hat Security Advisory: security update - Red Hat Ansible Tower 3.6 runner release (CVE-2019-18874) | python-psutil: Double free because of refcount mishandling | [
"cpe:/a:redhat:ansible_tower:3.6::el7"
] | null | null | 7 | null |
RHSA-2023:6219 | Red Hat Security Advisory: Red Hat Service Interconnect security update | skupper-operator: privelege escalation via config map | [
"cpe:/a:redhat:service_interconnect:1::el9"
] | null | 6.8 | null | null |
RHSA-2023:5541 | Red Hat Security Advisory: Logging Subsystem 5.6.12 - Red Hat OpenShift security update | tough-cookie: prototype pollution in cookie memstore golang: net/http: insufficient sanitization of Host header golang: crypto/tls: slow verification of certificate chains containing large RSA keys golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487) HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack) | [
"cpe:/a:redhat:logging:5.6::el8"
] | null | 7.5 | null | null |
RHSA-2016:2848 | Red Hat Security Advisory: Red Hat Ceph Storage 1.3 security, bug fix, and enhancement update | Ceph: RGW Denial of Service by sending null or specially crafted POST object requests | [
"cpe:/a:redhat:ceph_storage:1.3::ubuntu:14.04"
] | null | null | 6.5 | null |
RHSA-2022:8791 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.4.8 Security update | Undertow: DoS can be achieved as Undertow server waits for the LAST_CHUNK forever for EJB invocations | [
"cpe:/a:redhat:jboss_enterprise_application_platform:7.4::el8"
] | null | 4.2 | null | null |
RHSA-2003:307 | Red Hat Security Advisory: : Updated zebra packages fix security vulnerabilities | security flaw security flaw | [
"cpe:/o:redhat:linux:7.2",
"cpe:/o:redhat:linux:7.3",
"cpe:/o:redhat:linux:8.0",
"cpe:/o:redhat:linux:9"
] | null | null | null | null |
RHSA-2005:271 | Red Hat Security Advisory: HelixPlayer security update | security flaw security flaw | [
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2013:0233 | Red Hat Security Advisory: JBoss Enterprise Web Platform 5.2.0 security update | JBoss: allows empty password to authenticate against LDAP | [
"cpe:/a:redhat:jboss_enterprise_web_platform:5.2.0"
] | null | null | null | null |
RHSA-2003:163 | Red Hat Security Advisory: mozilla security update | security flaw | [
"cpe:/o:redhat:enterprise_linux:2.1::as",
"cpe:/o:redhat:enterprise_linux:2.1::aw",
"cpe:/o:redhat:enterprise_linux:2.1::es",
"cpe:/o:redhat:enterprise_linux:2.1::ws"
] | null | null | null | null |
RHSA-2024:4960 | Red Hat Security Advisory: OpenShift Container Platform 4.14.34 bug fix and security update | dnspython: denial of service in stub resolver golang: net/http, x/net/http2: unlimited number of CONTINUATION frames causes DoS ssh: Prefix truncation attack on Binary Packet Protocol (BPP) golang-fips/openssl: Memory leaks in code encrypting and decrypting RSA payloads containers/image: digest type does not guarantee valid type go-retryablehttp: url might write sensitive information to log file openssh: Possible remote code execution due to a race condition in signal handling affecting Red Hat Enterprise Linux 9 | [
"cpe:/a:redhat:openshift:4.14::el8",
"cpe:/a:redhat:openshift:4.14::el9"
] | null | 7 | null | null |
RHSA-2021:3315 | Red Hat Security Advisory: glibc security and bug fix update | glibc: stack corruption from crafted input in cosl, sinl, sincosl, and tanl functions glibc: stack-based buffer overflow if the input to any of the printf family of functions is an 80-bit long double with a non-canonical bit pattern | [
"cpe:/o:redhat:rhel_aus:7.6::server",
"cpe:/o:redhat:rhel_e4s:7.6::server",
"cpe:/o:redhat:rhel_tus:7.6::server"
] | null | 7.5 | null | null |
RHSA-2025:0109 | Red Hat Security Advisory: kpatch-patch-4_18_0-553, kpatch-patch-4_18_0-553_16_1, and kpatch-patch-4_18_0-553_30_1 security update | kernel: mptcp: cope racing subflow creation in mptcp_rcv_space_adjust | [
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 5.9 | null | null |
RHSA-2025:0325 | Red Hat Security Advisory: rsync security update | rsync: Info Leak via Uninitialized Stack Contents | [
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 7.5 | null | null |
RHSA-2023:4918 | Red Hat Security Advisory: Red Hat Single Sign-On 7.6.5 security update on RHEL 7 | jackson-databind: Possible DoS if using JDK serialization to serialize JsonNode jettison: Uncontrolled Recursion in JSONArray undertow: OutOfMemoryError due to @MultipartConfig handling | [
"cpe:/a:redhat:red_hat_single_sign_on:7.6::el7"
] | null | 7.5 | null | null |
RHSA-2016:0328 | Red Hat Security Advisory: openstack-swift security update | openstack-swift: Information leak via Swift tempurls openstack-swift: Client to proxy DoS through Large Objects openstack-swift: Proxy to server DoS through Large Objects | [
"cpe:/a:redhat:storage:3.1:server:el7"
] | null | null | null | null |
RHSA-2022:5100 | Red Hat Security Advisory: grub2, mokutil, shim, and shim-unsigned-x64 security update | grub2: Crafted PNG grayscale images may lead to out-of-bounds write in heap grub2: Crafted PNG image may lead to out-of-bound write during huffman table handling grub2: Crafted JPEG image can lead to buffer underflow write in the heap grub2: Integer underflow in grub_net_recv_ip4_packets grub2: Out-of-bound write when handling split HTTP headers grub2: shim_lock verifier allows non-kernel files to be loaded grub2: use-after-free in grub_cmd_chainloader() shim: Buffer overflow when loading crafted EFI images | [
"cpe:/a:redhat:rhel_eus:8.2::crb",
"cpe:/o:redhat:rhel_eus:8.2::baseos"
] | null | 7.3 | null | null |
RHSA-2023:0381 | Red Hat Security Advisory: libXpm security update | libXpm: compression commands depend on $PATH libXpm: Runaway loop on width of 0 and enormous height libXpm: Infinite loop on unclosed comments | [
"cpe:/a:redhat:rhel_eus:9.0::appstream"
] | null | 7.5 | null | null |
RHSA-2016:1332 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.0 security update | JGroups: Authorization bypass | [
"cpe:/a:redhat:jboss_enterprise_application_platform:7::el6",
"cpe:/a:redhat:jboss_enterprise_application_platform:7::el7"
] | null | null | 9.8 | null |
RHSA-2022:7464 | Red Hat Security Advisory: protobuf security update | protobuf: Incorrect parsing of nullchar in the proto symbol leads to Nullptr dereference | [
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb"
] | null | 7.5 | null | null |
RHSA-2016:2998 | Red Hat Security Advisory: Red Hat Enterprise Linux 6.2 Advanced Mission Critical (AMC) One-Year Notice | This is the One-Year notification for the retirement of Red Hat Enterprise Linux 6.2 Advanced Mission Critical (AMC). This notification applies only to those customers subscribed to the Advanced Mission Critical (AMC) channel for Red Hat Enterprise Linux 6.2. | [
"cpe:/o:redhat:rhel_mission_critical:6.2::server"
] | null | null | null | null |
RHSA-2005:104 | Red Hat Security Advisory: mod_python security update | security flaw | [
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws"
] | null | null | null | null |
RHSA-2015:2154 | Red Hat Security Advisory: krb5 security, bug fix, and enhancement update | krb5: unauthenticated denial of service in recvauth_common() and others krb5: issues in OTP and PKINIT kdcpreauth modules leading to requires_preauth bypass | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | null | null |
RHSA-2019:3142 | Red Hat Security Advisory: OpenShift Container Platform 3.11 mediawiki security update | mediawiki: $wgRateLimits (rate limit / ping limiter) entry for 'user' overrides that for 'newbie' mediawiki: BotPassword can bypass CentralAuth's account lock | [
"cpe:/a:redhat:openshift:3.11::el7"
] | null | null | 5.3 | null |
RHEA-2018:2082 | Red Hat Enhancement Advisory: rhvm-appliance enhancement update | jackson-databind: incomplete fix for CVE-2017-7525 permits unsafe serialization via c3p0 libraries | [
"cpe:/o:redhat:enterprise_linux:7::hypervisor"
] | null | null | 8.1 | null |
RHSA-2009:1619 | Red Hat Security Advisory: dstat security update | dstat insecure module search path | [
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2025:1130 | Red Hat Security Advisory: OpenShift Container Platform 4.15.45 packages and security update | jinja2: Jinja has a sandbox breakout through malicious filenames jinja2: Jinja has a sandbox breakout through indirect reference to format method | [
"cpe:/a:redhat:openshift:4.15::el8",
"cpe:/a:redhat:openshift:4.15::el9",
"cpe:/a:redhat:openshift_ironic:4.15::el9"
] | null | 6.3 | null | null |
RHSA-2024:1130 | Red Hat Security Advisory: openssh security update | ssh: Prefix truncation attack on Binary Packet Protocol (BPP) openssh: potential command injection via shell metacharacters | [
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/o:redhat:enterprise_linux:9::baseos"
] | null | 6.5 | null | null |
RHEA-2019:2270 | Red Hat Enhancement Advisory: openjpeg2 bug fix and enhancement update | openjpeg2: Excessive iteration in openjp2/t1.c:opj_t1_encode_cblks can allow for denial of service via crafted BMP file | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 3.3 | null |
RHSA-2023:3435 | Red Hat Security Advisory: Red Hat Advanced Cluster Security 3.74 for Kubernetes security update | golang: html/template: improper sanitization of CSS values golang: html/template: improper handling of JavaScript whitespace golang: html/template: improper handling of empty HTML attributes | [
"cpe:/a:redhat:advanced_cluster_security:3.74::el8"
] | null | 7.3 | null | null |
RHSA-2021:0094 | Red Hat Security Advisory: dotnet5.0 security and bugfix update | dotnet: ASP.NET Core Callbacks outside of locks cause Krestel deadlock when using HTTP2 | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 7.5 | null | null |
RHSA-2010:0108 | Red Hat Security Advisory: NetworkManager security update | NetworkManager: WPA enterprise network not verified when certificate is removed NetworkManager: information disclosure by nm-connection-editor | [
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2017:0316 | Red Hat Security Advisory: kernel security and bug fix update | kernel: use after free in dccp protocol | [
"cpe:/o:redhat:rhel_eus:6.7::computenode",
"cpe:/o:redhat:rhel_eus:6.7::server"
] | null | null | 7.8 | null |
RHSA-2005:069 | Red Hat Security Advisory: perl security update | security flaw | [
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws"
] | null | null | null | null |
RHSA-2011:1369 | Red Hat Security Advisory: httpd security update | httpd: multiple ranges DoS | [
"cpe:/a:redhat:rhel_application_stack:2"
] | null | null | null | null |
RHSA-2015:1544 | Red Hat Security Advisory: java-1.5.0-ibm security update | JDK: plain text data stored in memory dumps OpenJDK: deserialization issue in ObjectInputStream.readSerialData() (Libraries, 8076401) OpenJDK: non-constant time comparisons in crypto code (JCE, 8074865) OpenJDK: incorrect code permission checks in RMIConnectionImpl (JMX, 8075853) ICU: integer overflow in LETableReference verifyLength() (OpenJDK 2D, 8077520) JDK: unspecified vulnerability fixed in 6u101, 7u85 and 8u51 (2D) JDK: unspecified vulnerability fixed in 6u101, 7u85 and 8u51 (2D) JDK: unspecified vulnerability fixed in 6u101, 7u85 and 8u51 (Deployment) LOGJAM: TLS connections which support export grade DHE key-exchange are vulnerable to MITM attacks OpenJDK: improper permission checks in MBeanServerInvocationHandler (JMX, 8076397) OpenJDK: insufficient context checks during object deserialization (Libraries, 8076405) OpenJDK: RemoteObjectInvocationHandler allows calling finalize() (RMI, 8076409) OpenJDK: incorrect OCSP nextUpdate checking (Libraries, 8075374) OpenJDK: DnsClient fails to release request information after error (JNDI, 8075378) ICU: missing boundary checks in layout engine (OpenJDK 2D, 8071715) | [
"cpe:/a:redhat:rhel_extras:5::client",
"cpe:/a:redhat:rhel_extras:5::server",
"cpe:/a:redhat:rhel_extras:6"
] | null | null | 3.7 | null |
RHSA-2012:1456 | Red Hat Security Advisory: Red Hat Storage 2.0 security, bug fix, and enhancement update #3 | GlusterFS: insecure temporary file creation | [
"cpe:/a:redhat:storage:2.0:server:el6",
"cpe:/a:redhat:storage:2:client:el5",
"cpe:/a:redhat:storage:3:client:el6"
] | null | null | null | null |
RHSA-2023:3309 | Red Hat Security Advisory: OpenShift Container Platform 4.11.42 bug fix and security update | dns: Denial of Service (DoS) | [
"cpe:/a:redhat:openshift:4.11::el8"
] | null | 7.5 | null | null |
RHSA-2022:0246 | Red Hat Security Advisory: nodejs:14 security, bug fix, and enhancement update | nodejs-ini: Prototype pollution via malicious INI file nodejs-glob-parent: Regular expression denial of service nodejs-ansi-regex: Regular expression denial of service (ReDoS) matching ANSI escape codes nodejs-json-schema: Prototype pollution vulnerability llhttp: HTTP Request Smuggling due to spaces in headers llhttp: HTTP Request Smuggling when parsing the body of chunked requests nodejs-normalize-url: ReDoS for data URLs nodejs-tar: Insufficient symlink protection due to directory cache poisoning using symbolic links allowing arbitrary file creation and overwrite nodejs-tar: Insufficient symlink protection due to directory cache poisoning using symbolic links allowing arbitrary file creation and overwrite | [
"cpe:/a:redhat:rhel_eus:8.4::appstream"
] | null | 8.1 | null | null |
RHSA-2008:0836 | Red Hat Security Advisory: libxml2 security update | libxml2 denial of service | [
"cpe:/o:redhat:enterprise_linux:2.1::as",
"cpe:/o:redhat:enterprise_linux:2.1::aw",
"cpe:/o:redhat:enterprise_linux:2.1::es",
"cpe:/o:redhat:enterprise_linux:2.1::ws",
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws",
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws",
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2023:3108 | Red Hat Security Advisory: webkit2gtk3 security update | webkitgtk: Regression of CVE-2023-28205 fixes in the Red Hat Enterprise Linux | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 8.8 | null | null |
RHSA-2007:0740 | Red Hat Security Advisory: bind security update | bind cryptographically weak query ids | [
"cpe:/o:redhat:enterprise_linux:2.1::as",
"cpe:/o:redhat:enterprise_linux:2.1::aw",
"cpe:/o:redhat:enterprise_linux:2.1::es",
"cpe:/o:redhat:enterprise_linux:2.1::ws",
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws",
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws",
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2019:2692 | Red Hat Security Advisory: nghttp2 security update | HTTP/2: large amount of data requests leads to denial of service HTTP/2: flood using PRIORITY frames results in excessive resource consumption | [
"cpe:/a:redhat:enterprise_linux:8::crb",
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | null | 7.5 | null |
RHSA-2004:465 | Red Hat Security Advisory: imlib security update | security flaw | [
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws"
] | null | null | null | null |
RHSA-2013:0807 | Red Hat Security Advisory: hypervkvpd security and bug fix update | hypervkvpd: Netlink source address validation allows denial of service | [
"cpe:/a:redhat:rhel_virtualization:5::server",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2022:0499 | Red Hat Security Advisory: .NET 5.0 on RHEL 7 security and bugfix update | dotnet: ASP.NET Core Krestel HTTP headers pooling denial of service | [
"cpe:/a:redhat:rhel_dotnet:5.0::el7"
] | null | 7.5 | null | null |
RHSA-2023:6305 | Red Hat Security Advisory: Migration Toolkit for Applications security update | RESTEasy: creation of insecure temp files golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487) HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack) | [
"cpe:/a:redhat:migration_toolkit_applications:6.1::el8"
] | null | 7.5 | null | null |
RHSA-2023:7200 | Red Hat Security Advisory: OpenShift Container Platform 4.15.z security update | golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487) golang: net/http/internal: Denial of Service (DoS) via Resource Consumption via HTTP requests golang: crypto/tls: Timing Side Channel attack in RSA based TLS key exchanges. | [
"cpe:/a:redhat:openshift:4.15::el9"
] | null | 7.5 | null | null |
RHSA-2023:1586 | Red Hat Security Advisory: pesign security update | pesign: Local privilege escalation on pesign systemd service | [
"cpe:/a:redhat:rhel_e4s:8.1::appstream"
] | null | 7.8 | null | null |
RHSA-2018:2423 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.1.4 on RHEL 6 security update | cxf: Improper size validation in message attachment header for JAX-WS and JAX-RS services apache-cxf: TLS hostname verification does not work correctly with com.sun.net.ssl.* guava: Unbounded memory allocation in AtomicDoubleArray and CompoundOrdering classes allow remote attackers to cause a denial of service wildfly-core: Path traversal can allow the extraction of .war archives to write arbitrary files (Zip Slip) bouncycastle: flaw in the low-level interface to RSA key pair generator | [
"cpe:/a:redhat:jboss_enterprise_application_platform:7::el6"
] | null | null | 4.8 | null |
RHSA-2017:1595 | Red Hat Security Advisory: openstack-nova and python-novaclient security, bug fix, and enhancement update | openstack-nova: Sensitive information included in legacy notification exception contexts | [
"cpe:/a:redhat:openstack:10::el7"
] | null | null | 6.1 | null |
RHSA-2019:2775 | Red Hat Security Advisory: rh-nginx114-nginx security update | HTTP/2: large amount of data requests leads to denial of service HTTP/2: flood using PRIORITY frames results in excessive resource consumption HTTP/2: 0-length headers lead to denial of service | [
"cpe:/a:redhat:rhel_software_collections:3::el7"
] | null | null | 6.5 | null |
RHSA-2022:5250 | Red Hat Security Advisory: libxml2 security update | libxml2: integer overflows in xmlBuf and xmlBuffer lead to out-of-bounds write | [
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/o:redhat:enterprise_linux:9::baseos"
] | null | 7.4 | null | null |
RHSA-2015:1679 | Red Hat Security Advisory: python-django-horizon security and bug fix update | python-django-horizon: XSS in Heat stack creation python-django-horizon: persistent XSS in Horizon metadata dashboard | [
"cpe:/a:redhat:openstack:6::el7"
] | null | null | null | null |
RHSA-2017:1731 | Red Hat Security Advisory: flash-plugin security update | flash-plugin: information disclosure issues fixed in APSB17-21 flash-plugin: code execution issue fixed in APSB17-21 flash-plugin: information disclosure issues fixed in APSB17-21 | [
"cpe:/a:redhat:rhel_extras:6"
] | null | null | 6.5 | null |
RHSA-2024:6267 | Red Hat Security Advisory: kernel security update | kernel: kprobes/x86: Use copy_from_kernel_nofault() to read from unsafe address kernel: netfilter: bridge: replace physindev with physinif in nf_bridge_info kernel: x86/coco: Require seeding RNG with RDRAND on CoCo systems kernel: bpf, sockmap: Prevent lock inversion deadlock in map delete elem kernel: bnxt_re: avoid shift undefined behavior in bnxt_qplib_alloc_init_hwq kernel: gfs2: Fix potential glock use-after-free on unmount kernel: ionic: fix use after netif_napi_del() kernel: mm/huge_memory: don't unpoison huge_zero_folio kernel: dmaengine: idxd: Fix possible Use-After-Free in irq_process_work_list kernel: scsi: qedi: Fix crash while reading debugfs attribute kernel: tipc: force a dst refcount before doing decryption kernel: ppp: reject claimed-as-LCP but actually malformed packets kernel: Revert "mm/writeback: fix possible divide-by-zero in wb_dirty_limits(), again" kernel: mm: avoid overflows in dirty throttling logic | [
"cpe:/a:redhat:rhel_eus:9.2::appstream",
"cpe:/a:redhat:rhel_eus:9.2::crb",
"cpe:/o:redhat:rhel_eus:9.2::baseos"
] | null | 4.4 | null | null |
RHSA-2024:0569 | Red Hat Security Advisory: virt:rhel and virt-devel:rhel security update | QEMU: hcd-ehci: DMA reentrancy issue leads to use-after-free QEMU: e1000e: heap use-after-free in e1000e_write_packet_to_guest() | [
"cpe:/a:redhat:rhel_eus:8.8::appstream",
"cpe:/a:redhat:rhel_eus:8.8::crb"
] | null | 6 | null | null |
RHSA-2019:1851 | Red Hat Security Advisory: OpenShift Container Platform 3.11 security update | web-console: XSS in OAuth server /oauth/token/request endpoint jenkins-plugin-token-macro: XML External Entity processing the ${XML} macro kube-apiserver: DoS with crafted patch of type json-patch | [
"cpe:/a:redhat:openshift:3.11::el7"
] | null | null | 6.5 | null |
RHSA-2024:1500 | Red Hat Security Advisory: thunderbird security update | nss: timing attack against RSA decryption Mozilla: Crash in NSS TLS method Mozilla: Leaking of encrypted email subjects to other conversations Mozilla: JIT code failed to save return registers on Armv7-A Mozilla: Integer overflow could have led to out of bounds write Mozilla: Improper handling of html and body tags enabled CSP nonce leakage Mozilla: Clickjacking vulnerability could have led to a user accidentally granting permissions Mozilla: Self referencing object could have potentially led to a use-after-free Mozilla: Memory safety bugs fixed in Firefox 124, Firefox ESR 115.9, and Thunderbird 115.9 | [
"cpe:/a:redhat:rhel_aus:8.2::appstream",
"cpe:/a:redhat:rhel_e4s:8.2::appstream",
"cpe:/a:redhat:rhel_tus:8.2::appstream"
] | null | 7.5 | null | null |
RHSA-2021:4946 | Red Hat Security Advisory: nss security update | nss: Memory corruption in decodeECorDsaSignature with DSA signatures (and RSA-PSS) | [
"cpe:/o:redhat:rhel_aus:7.7::server",
"cpe:/o:redhat:rhel_e4s:7.7::server",
"cpe:/o:redhat:rhel_tus:7.7::server"
] | null | 9.8 | null | null |
RHSA-2019:1301 | Red Hat Security Advisory: Red Hat Enterprise Linux 7.2 E4S and TUS Support 6 month Retirement Notice | This is the 6 month notification for the retirement of Red Hat Enterprise Linux 7.2 Update Services for SAP Solutions (E4S) and Telecommunications Update Service (TUS). This notification applies only to those customers subscribed to the Update Services for SAP Solutions (E4S) and Telecommunications Update Service (TUS) channel for Red Hat Enterprise Linux 7.2. | [
"cpe:/o:redhat:rhel_aus:7.2::server",
"cpe:/o:redhat:rhel_e4s:7.2::server",
"cpe:/o:redhat:rhel_tus:7.2::server"
] | null | null | null | null |
RHSA-2016:0024 | Red Hat Security Advisory: kernel security and bug fix update | virt: guest to host DoS by triggering an infinite loop in microcode via #AC exception virt: guest to host DoS by triggering an infinite loop in microcode via #DB exception | [
"cpe:/o:redhat:rhel_eus:6.6::computenode",
"cpe:/o:redhat:rhel_eus:6.6::server"
] | null | null | null | null |
RHSA-2024:6462 | Red Hat Security Advisory: Cost Management enhancement and security update | golang: net: malformed DNS message can cause infinite loop golang: net/netip: Unexpected behavior from Is methods for IPv4-mapped IPv6 addresses net/http: Denial of service due to improper 100-continue handling in net/http | [
"cpe:/a:redhat:cost_management:1::el8"
] | null | 5.9 | null | null |
RHSA-2024:4740 | Red Hat Security Advisory: kernel security update | kernel: net: ti: fix UAF in tlan_remove_one kernel: net: qcom/emac: fix UAF in emac_remove kernel: ethernet: hisilicon: hns: hns_dsaf_misc: fix a possible array overflow in hns_dsaf_ge_srst_by_port() kernel: Use after free bug in btsdio_remove due to race condition kernel: KVM: SEV-ES / SEV-SNP VMGEXIT double fetch vulnerability kernel: wifi: mac80211: fix potential key use-after-free kernel: KVM: s390: vsie: fix race during shadow creation kernel: net/mlx5e: fix a potential double-free in fs_any_create_groups kernel: kvm: Avoid potential UAF in LPI translation cache kernel: drm/amdgpu: use-after-free vulnerability kernel: ipv6: sr: fix possible use-after-free and null-ptr-deref kernel: Bluetooth: Avoid potential use-after-free in hci_error_reset kernel: net: ip_tunnel: prevent perpetual headroom growth kernel: netfilter: nf_tables: use timestamp to check for set element timeout kernel: wifi: cfg80211: check A-MSDU format more carefully kernel: net: ena: Fix incorrect descriptor free behavior kernel: net/mlx5: Properly link new fs rules into the tree | [
"cpe:/a:redhat:rhel_eus:8.8::crb",
"cpe:/o:redhat:rhel_eus:8.8::baseos"
] | null | 5.5 | null | null |
RHSA-2024:5436 | Red Hat Security Advisory: OpenShift Container Platform 4.14.35 security update | golang: net/http: golang: mime/multipart: golang: net/textproto: memory exhaustion in Request.ParseMultipartForm golang: net/netip: Unexpected behavior from Is methods for IPv4-mapped IPv6 addresses | [
"cpe:/a:redhat:openshift:4.14::el8",
"cpe:/a:redhat:openshift:4.14::el9"
] | null | 6.7 | null | null |
RHSA-2014:0097 | Red Hat Security Advisory: java-1.6.0-openjdk security update | OpenJDK: jarsigner does not detect unsigned bytecode injected into signed jars OpenJDK: null xmlns handling issue (Security, 8025026) OpenJDK: insufficient security checks in CORBA stub factories (CORBA, 8026193) OpenJDK: com.sun.corba.se. should be restricted package (CORBA, 8025022) ICU: Layout Engine LookupProcessor insufficient input checks (JDK 2D, 8025034) OpenJDK: XML canonicalizer mutable strings passed to untrusted code (Security, 8026417) OpenJDK: insufficient Socket checkListen checks (Networking, 8011786) OpenJDK: SnmpStatusException handling issues (Serviceability, 7068126) OpenJDK: document builder missing security checks (JAXP, 8027201, 8025018) OpenJDK: TLS/SSL handshake timing issues (JSSE, 8023069) OpenJDK: insecure subject principals set handling (JAAS, 8024306) OpenJDK: insufficient package access checks in the Naming component (JNDI, 8025758) OpenJDK: XXE issue in decoder (Beans, 8023245) OpenJDK: insufficient security checks in IIOP streams (CORBA, 8025767) | [
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::server",
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2023:7335 | Red Hat Security Advisory: Updated Red Hat Process Automation Manager 7.13.4 SP2 Images | HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack) | [
"cpe:/a:redhat:rhosemc:1.0::el8"
] | null | 7.5 | null | null |
RHSA-2024:8352 | Red Hat Security Advisory: NetworkManager-libreswan:1.2.14 security update | NetworkManager-libreswan: Local privilege escalation via leftupdown | [
"cpe:/a:redhat:rhel_eus:9.2::appstream"
] | null | 7.8 | null | null |
RHSA-2023:4459 | Red Hat Security Advisory: OpenShift Container Platform 4.13.8 packages and security update | golang: net/http, net/textproto: denial of service from excessive memory allocation golang: html/template: improper sanitization of CSS values golang: html/template: improper handling of empty HTML attributes | [
"cpe:/a:redhat:openshift:4.13::el8",
"cpe:/a:redhat:openshift:4.13::el9"
] | null | 7.3 | null | null |
RHSA-2024:8170 | Red Hat Security Advisory: fence-agents security update | pypa/setuptools: Remote code execution via download functions in the package_index module in pypa/setuptools | [
"cpe:/a:redhat:rhel_aus:8.4::appstream",
"cpe:/a:redhat:rhel_e4s:8.4::appstream",
"cpe:/a:redhat:rhel_e4s:8.4::highavailability",
"cpe:/a:redhat:rhel_tus:8.4::appstream",
"cpe:/a:redhat:rhel_tus:8.4::highavailability"
] | null | 8.8 | null | null |
RHSA-2024:0235 | Red Hat Security Advisory: java-11-openjdk security update | OpenJDK: array out-of-bounds access due to missing range check in C1 compiler (8314468) OpenJDK: JVM class file verifier flaw allows unverified bytecode execution (8314295) OpenJDK: range check loop optimization issue (8314307) OpenJDK: arbitrary Java code execution in Nashorn (8314284) OpenJDK: logging of digital signature private keys (8316976) OpenJDK: RSA padding issue and timing side-channel attack against TLS (8317547) | [
"cpe:/a:redhat:rhel_eus:8.6::appstream",
"cpe:/a:redhat:rhel_eus:8.6::crb"
] | null | 7.4 | null | null |
Subsets and Splits