id
stringlengths 13
15
| title
stringlengths 29
176
| description
stringlengths 8
31.7k
| cpes
sequencelengths 0
20
| cvss_v4_0
null | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
null |
---|---|---|---|---|---|---|---|
RHSA-2014:0917 | Red Hat Security Advisory: nss and nspr security, bug fix, and enhancement update | nss: false start PR_Recv information disclosure security issue nss: TOCTOU, potential use-after-free in libssl's session ticket processing (MFSA 2014-12) nss: Do not allow p-1 as a public DH value (MFSA 2014-12) nss: IDNA hostname matching code does not follow RFC 6125 recommendation (MFSA 2014-45) nss: Race-condition in certificate verification can lead to Remote code execution (MFSA 2014-63) Mozilla: Out of bounds write in NSPR (MFSA 2014-55) | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2019:2101 | Red Hat Security Advisory: exiv2 security, bug fix, and enhancement update | exiv2: heap-buffer-overflow in Exiv2::IptcData::printStructure in src/iptc.cpp exiv2: Excessive memory allocation in Exiv2::Jp2Image::readMetadata function in jp2image.cpp exiv2: out-of-bounds read in Exiv2::Internal::stringFormat image.cpp exiv2: invalid memory access in Exiv2::Internal::printCsLensFFFF function in canonmn_int.cpp exiv2: out of bounds read in IptcData::printStructure in iptc.c exiv2: OOB read in pngimage.cpp:tEXtToDataBuf() allows for crash via crafted file exiv2: SIGABRT caused by memory allocation in types.cpp:Exiv2::Internal::PngChunk::zlibUncompress() exiv2: SIGABRT by triggering an incorrect Safe::add call exiv2: heap-based buffer over-read in parseTXTChunk function exiv2: information leak via a crafted file exiv2: integer overflow in getData function in preview.cpp exiv2: integer overflow in the LoaderExifJpeg class in preview.cpp exiv2: heap-based buffer over-read in WebPImage::decodeChunks in webpimage.cpp exiv2: NULL pointer dereference in Exiv2::DataValue::copy in value.cpp leading to application crash exiv2: Stack overflow in CiffDirectory::readDirectory() at crwimage_int.cpp leading to denial of service exiv2: infinite loop in Exiv2::Image::printIFDStructure function in image.cpp exiv2: heap-based buffer over-read in Exiv2::IptcParser::decode in iptc.cpp exiv2: infinite loop in Exiv2::PsdImage::readMetadata in psdimage.cpp exiv2: heap-based buffer over-read in PngChunk::readRawProfile in pngchunk_int.cpp exiv2: NULL pointer dereference in Exiv2::isoSpeed in easyaccess.cpp exiv2: Heap-based buffer over-read in Exiv2::tEXtToDataBuf function resulting in a denial of service exiv2: Segmentation fault in Exiv2::Internal::TiffParserWorker::findPrimaryGroups function exiv2: Heap-based buffer over-read in Exiv2::Jp2Image::encodeJp2Header resulting in a denial of service exiv2: Infinite loop in Exiv2::Jp2Image::encodeJp2Header resulting in a denial of service exiv2: infinite recursion in Exiv2::Image::printTiffStructure in file image.cpp resulting in denial of service | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 4 | null |
RHSA-2018:2240 | Red Hat Security Advisory: openslp security update | openslp: Heap memory corruption in slpd/slpd_process.c allows denial of service or potentially code execution | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 7.5 | null |
RHSA-2021:4059 | Red Hat Security Advisory: curl security update | curl: Requirement to use TLS not properly enforced for IMAP, POP3, and FTP protocols curl: Server responses received before STARTTLS processed after TLS handshake | [
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 6.1 | null | null |
RHSA-2024:4312 | Red Hat Security Advisory: openssh security update | openssh: regreSSHion - race condition in SSH allows RCE/DoS | [
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/o:redhat:enterprise_linux:9::baseos"
] | null | 8.1 | null | null |
RHSA-2024:0095 | Red Hat Security Advisory: Red Hat Single Sign-On 7.6.6 security update on RHEL 8 | keycloak: LDAP injection on username input keycloak: open redirect via "form_post.jwt" JARM response mode | [
"cpe:/a:redhat:red_hat_single_sign_on:7.6::el8"
] | null | 4.6 | null | null |
RHSA-2015:1947 | Red Hat Security Advisory: Red Hat JBoss Operations Network 3.3.4 update | Cassandra: remote code execution via unauthenticated JMX/RMI interface | [
"cpe:/a:redhat:jboss_operations_network:3.3"
] | null | null | null | null |
RHSA-2005:582 | Red Hat Security Advisory: httpd security update | security flaw security flaw | [
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws",
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2008:0154 | Red Hat Security Advisory: kernel security and bug fix update | kernel: denial of service with wedged processes NULL dereference in iwl driver Linux Kernel isdn_net_setcfg buffer overflow Security: some HVM domain can access another domain memory. /proc/cpuinfo DoS on some ppc machines | [
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2016:1041 | Red Hat Security Advisory: thunderbird security update | Mozilla: Miscellaneous memory safety hazards (rv:38.8) (MFSA 2016-39) Mozilla: Miscellaneous memory safety hazards (rv:46.0 / rv:45.1 / rv:38.8) (MFSA 2016-39) | [
"cpe:/a:redhat:rhel_productivity:5",
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation",
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | null | null |
RHSA-2020:3908 | Red Hat Security Advisory: cpio security update | cpio: improper input validation when writing tar header fields leads to unexpected tar generation | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 6.7 | null |
RHSA-2025:2483 | Red Hat Security Advisory: libxml2 security update | libxml2: Use-After-Free in libxml2 libxml2: Stack-based buffer overflow in xmlSnprintfElements of libxml2 | [
"cpe:/a:redhat:rhel_e4s:9.0::appstream",
"cpe:/o:redhat:rhel_e4s:9.0::baseos"
] | null | 7.8 | null | null |
RHSA-2021:0811 | Red Hat Security Advisory: Red Hat Integration Tech-Preview 3 Camel K security update | cassandra: allows manipulation of the RMI registry to perform a MITM attack and capture user names and passwords used to access the JMX interface apache-httpclient: incorrect handling of malformed authority component in request URIs jackson-databind: FasterXML DOMDeserializer insecure entity expansion is vulnerable to XML external entity (XXE) | [
"cpe:/a:redhat:integration:1"
] | null | 7.5 | null | null |
RHSA-2023:6799 | Red Hat Security Advisory: kpatch-patch security update | kernel: net/sched: cls_u32 component reference counter leak if tcf_change_indev() fails kernel: net/sched: cls_fw component can be exploited as result of failure in tcf_change_indev function kernel: tun: bugs for oversize packet when napi frags enabled in tun_napi_alloc_frags | [
"cpe:/o:redhat:rhel_e4s:8.1::baseos"
] | null | 7.8 | null | null |
RHBA-2020:1255 | Red Hat Bug Fix Advisory: OpenShift Container Platform 4.3.10 packages update | proglottis/gpgme: Use-after-free in GPGME bindings during container image pull | [
"cpe:/a:redhat:openshift:4.3::el7",
"cpe:/a:redhat:openshift:4.3::el8"
] | null | 7.5 | null | null |
RHSA-2016:1385 | Red Hat Security Advisory: ceph security update | crash: mon_command crashes ceph monitors on receiving empty prefix | [
"cpe:/a:redhat:ceph_storage:1.3::ubuntu:14.04"
] | null | null | 4.9 | null |
RHSA-2004:402 | Red Hat Security Advisory: libpng security update | security flaw security flaw security flaw security flaw | [
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws"
] | null | null | null | null |
RHSA-2024:1770 | Red Hat Security Advisory: OpenShift Container Platform 4.15.9 bug fix and security update | golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487) HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack) sanitize-html: Information Exposure when used on the backend | [
"cpe:/a:redhat:openshift:4.15::el8",
"cpe:/a:redhat:openshift:4.15::el9"
] | null | 5.3 | null | null |
RHSA-2017:3151 | Red Hat Security Advisory: chromium-browser security update | chromium-browser: stack buffer overflow in quic chromium-browser: use after free in v8 | [
"cpe:/a:redhat:rhel_extras:6"
] | null | null | 8.8 | null |
RHSA-2024:10857 | Red Hat Security Advisory: Multicluster Engine for Kubernetes 2.7.2 security updates and bug fixes | opentelemetry-go-contrib: DoS vulnerability in otelgrpc due to unbound cardinality metrics path-to-regexp: Backtracking regular expressions cause ReDoS find-my-way: ReDoS vulnerability in multiparametric routes | [
"cpe:/a:redhat:multicluster_engine:2.7::el8",
"cpe:/a:redhat:multicluster_engine:2.7::el9"
] | null | 7.5 | null | null |
RHSA-2022:5729 | Red Hat Security Advisory: OpenShift Container Platform 4.10.25 security update | golang: cmd/go: misinterpretation of branch names can lead to incorrect access control golang: crypto/elliptic: IsOnCurve returns true for invalid field elements golang: encoding/pem: fix stack overflow in Decode golang: regexp: stack exhaustion via a deeply nested expression golang: crypto/elliptic: panic caused by oversized scalar golang: syscall: faccessat checks wrong group | [
"cpe:/a:redhat:openshift:4.10::el7",
"cpe:/a:redhat:openshift:4.10::el8"
] | null | 6.2 | null | null |
RHSA-2007:0096 | Red Hat Security Advisory: mod_jk security update | security flaw | [
"cpe:/a:redhat:rhel_application_stack:1"
] | null | null | null | null |
RHSA-2021:0877 | Red Hat Security Advisory: curl security update | curl: heap buffer overflow in function tftp_receive_packet() | [
"cpe:/o:redhat:rhel_eus:7.6::computenode",
"cpe:/o:redhat:rhel_eus:7.6::server"
] | null | null | 6.3 | null |
RHSA-2013:0235 | Red Hat Security Advisory: jbossweb security update | Web: Bypass of security constraints | [
"cpe:/a:redhat:jboss_enterprise_portal_platform:5.2.2",
"cpe:/a:redhat:jboss_enterprise_soa_platform:5.3"
] | null | null | null | null |
RHSA-2016:1779 | Red Hat Security Advisory: Red Hat CloudForms 3.x - 6 Month End Of Life Notice | This is the 6 Month notification for the End of Production Phase 2 of
Red Hat CloudForms 3.x (3.0, 3.1 and 3.2). | [
"cpe:/a:cloudforms_managementengine:5::el6"
] | null | null | null | null |
RHSA-2019:0651 | Red Hat Security Advisory: Red Hat Ansible Tower 3.4.3 | Red Hat Ansible Tower 3.4.3 | [
"cpe:/a:redhat:ansible_tower:3.4::el7"
] | null | null | null | null |
RHSA-2005:332 | Red Hat Security Advisory: xloadimage security update | security flaw | [
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws",
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2013:0256 | Red Hat Security Advisory: JBoss Enterprise Application Platform 5.2.0 security update | apache-cxf: SOAPAction spoofing on document literal web services apache-cxf: Bypass of security constraints on WS endpoints when using WSS4JInInterceptor | [
"cpe:/a:redhat:jboss_enterprise_application_platform:5.2.0"
] | null | null | null | null |
RHSA-2003:068 | Red Hat Security Advisory: vnc security update | security flaw | [
"cpe:/o:redhat:enterprise_linux:2.1::as"
] | null | null | null | null |
RHSA-2019:0778 | Red Hat Security Advisory: java-11-openjdk security update | OpenJDK: Slow conversion of BigDecimal to long (Libraries, 8211936) OpenJDK: Incorrect skeleton selection in RMI registry server-side dispatch handling (RMI, 8218453) | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 5.9 | null |
RHSA-2025:1674 | Red Hat Security Advisory: bind security update | bind: bind9: Many records in the additional section cause CPU exhaustion | [
"cpe:/o:redhat:rhel_aus:7.7::server"
] | null | 7.5 | null | null |
RHSA-2024:4672 | Red Hat Security Advisory: containernetworking-plugins security update | golang-fips/openssl: Memory leaks in code encrypting and decrypting RSA payloads | [
"cpe:/a:redhat:rhel_e4s:9.0::appstream"
] | null | 7.5 | null | null |
RHSA-2016:0625 | Red Hat Security Advisory: samba security update | samba: Man-in-the-middle attacks possible with NTLMSSP authentication samba: Spoofing vulnerability when domain controller is configured samba: SAMR and LSA man in the middle attacks | [
"cpe:/o:redhat:rhel_els:4::as",
"cpe:/o:redhat:rhel_els:4::es"
] | null | null | null | null |
RHSA-2011:1105 | Red Hat Security Advisory: libpng security update | libpng: regression of CVE-2004-0421 in 1.2.23+ libpng: buffer overwrite in png_rgb_to_gray libpng: Invalid read when handling empty sCAL chunks | [
"cpe:/o:redhat:enterprise_linux:6::server"
] | null | null | null | null |
RHSA-2015:2077 | Red Hat Security Advisory: rh-postgresql94-postgresql security update | postgresql: limited memory disclosure flaw in crypt() postgresql: stack overflow DoS when parsing json or jsonb inputs | [
"cpe:/a:redhat:rhel_software_collections:2::el6",
"cpe:/a:redhat:rhel_software_collections:2::el7"
] | null | null | null | null |
RHSA-2015:1189 | Red Hat Security Advisory: kvm security update | qemu: pcnet: multi-tmd buffer overflow in the tx path | [
"cpe:/a:redhat:rhel_virtualization:5::client",
"cpe:/a:redhat:rhel_virtualization:5::server"
] | null | null | null | null |
RHSA-2013:1221 | Red Hat Security Advisory: Fuse Message Broker 5.5.1 security update | activemq: Unauthenticated access to web console | [
"cpe:/a:redhat:fuse_message_broker:5.5.1"
] | null | null | null | null |
RHSA-2002:261 | Red Hat Security Advisory: Canna security update | security flaw security flaw | [
"cpe:/o:redhat:enterprise_linux:2.1::as",
"cpe:/o:redhat:enterprise_linux:2.1::aw"
] | null | null | null | null |
RHSA-2024:8172 | Red Hat Security Advisory: resource-agents security update | pypa/setuptools: Remote code execution via download functions in the package_index module in pypa/setuptools | [
"cpe:/a:redhat:rhel_e4s:8.4::highavailability",
"cpe:/a:redhat:rhel_tus:8.4::highavailability"
] | null | 8.8 | null | null |
RHSA-2020:0703 | Red Hat Security Advisory: http-parser security update | nodejs: HTTP request smuggling using malformed Transfer-Encoding header | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 7.1 | null | null |
RHSA-2019:2000 | Red Hat Security Advisory: Red Hat OpenShift Enterprise final end-of-life notice | This is the final notification for the retirement of Red Hat OpenShift Enterprise 3.6 and Red Hat OpenShift Container Platform 3.7. This notification applies only to those customers with subscriptions for Red Hat OpenShift Enterprise 3.6 and Red Hat OpenShift Container Platform 3.7. | [
"cpe:/a:redhat:openshift:3.6::el7",
"cpe:/a:redhat:openshift:3.7::el7"
] | null | null | null | null |
RHSA-2020:2107 | Red Hat Security Advisory: Red Hat Single Sign-On 7.3.8 security update on RHEL 7 | keycloak: security issue on reset credential flow keycloak: problem with privacy after user logout keycloak: improper verification of certificate with host mismatch could result in information disclosure | [
"cpe:/a:redhat:red_hat_single_sign_on:7::el7"
] | null | 5.3 | null | null |
RHSA-2008:0129 | Red Hat Security Advisory: kernel security update | kernel vmsplice_to_pipe flaw | [
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2023:7500 | Red Hat Security Advisory: thunderbird security update | Mozilla: Out-of-bound memory access in WebGL2 blitFramebuffer Mozilla: Use-after-free in MessagePort::Entangled Mozilla: Clickjacking permission prompts using the fullscreen transition Mozilla: Use-after-free in ReadableByteStreamQueueEntry::Buffer Mozilla: Using Selection API would copy contents into X11 primary selection. Mozilla: Incorrect parsing of relative URLs starting with "///" Mozilla: Memory safety bugs fixed in Firefox 120, Firefox ESR 115.5, and Thunderbird 115.5 | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 8.8 | null | null |
RHSA-2024:4052 | Red Hat Security Advisory: dnsmasq security update | dnsmasq: default maximum EDNS.0 UDP packet size was set to 4096 but should be 1232 | [
"cpe:/a:redhat:rhel_eus:9.2::appstream"
] | null | 7.5 | null | null |
RHSA-2020:5118 | Red Hat Security Advisory: OpenShift Container Platform 4.5.20 bug fix and golang security update | golang: data race in certain net/http servers including ReverseProxy can lead to DoS golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs | [
"cpe:/a:redhat:openshift:4.5::el7",
"cpe:/a:redhat:openshift:4.5::el8"
] | null | 7.5 | null | null |
RHSA-2017:2906 | Red Hat Security Advisory: Red Hat Single Sign-On security update | jasypt: Vulnerable to timing attack against the password hash comparison keycloak: reflected XSS using HOST header keycloak: CSRF token fixation keycloak: resource privilege extension via access token in oauth libpam4j: Account check bypass | [
"cpe:/a:redhat:jboss_single_sign_on:7.1"
] | null | null | 4.3 | null |
RHSA-2024:9552 | Red Hat Security Advisory: thunderbird security update | firefox: Use-after-free in Animation timeline (128.3.1 ESR Chemspill) firefox: thunderbird: Permission leak via embed or object elements firefox: thunderbird: Use-after-free in layout with accessibility firefox: thunderbird: Confusing display of origin for external protocol handler prompt firefox: thunderbird: XSS due to Content-Disposition being ignored in multipart/x-mixed-replace response firefox: thunderbird: Origin of permission prompt could be spoofed by long URL firefox: thunderbird: Cross origin video frame leak firefox: thunderbird: History interface could have been used to cause a Denial of Service condition in the browser firefox: thunderbird: Clipboard "paste" button persisted across tabs firefox: DOM push subscription message could hang Firefox firefox: thunderbird: Memory safety bugs fixed in Firefox 132, Thunderbird 132, Firefox ESR 128.4, and Thunderbird 128.4 | [
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 8.8 | null | null |
RHSA-2012:0730 | Red Hat Security Advisory: java-1.6.0-openjdk security update | OpenJDK: improper protection of CORBA data models (CORBA, 7079902) OpenJDK: fontmanager layout lookup code memory corruption (2D, 7143617) OpenJDK: SynthLookAndFeel application context bypass (Swing, 7143614) OpenJDK: insecure temporary file permissions (JRE, 7143606) OpenJDK: CRL and certificate extensions handling improvements (Security, 7143872) OpenJDK: mutable repository identifiers in generated stub code (CORBA, 7143851) OpenJDK: insufficient field accessibility checks (HotSpot, 7152811) OpenJDK: XML parsing infinite loop (JAXP, 7157609) OpenJDK: insufficient invokespecial <init> verification (HotSpot, 7160757) | [
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2017:0455 | Red Hat Security Advisory: Red Hat JBoss Web Server 3.1.0 security and enhancement update | tomcat: timing attack in Realm implementation tomcat: unsafe chown of catalina.log in tomcat init script allows privilege escalation tomcat: Usage of vulnerable FileUpload package can result in denial of service tomcat: security manager bypass via IntrospectHelper utility function tomcat: tomcat writable config files allow privilege escalation tomcat: system property disclosure tomcat: security manager bypass via JSP Servlet config parameters tomcat: unrestricted access to global resources tomcat: HTTP Request smuggling vulnerability due to permitting invalid character in HTTP requests tomcat: Remote code execution vulnerability in JmxRemoteLifecycleListener tomcat: information disclosure due to incorrect Processor sharing | [
"cpe:/a:redhat:jboss_enterprise_web_server:3.1::el6"
] | null | null | 7.5 | null |
RHBA-2019:3092 | Red Hat Bug Fix Advisory: docker bug fix update | docker: command injection due to a missing validation of the git ref command | [
"cpe:/a:redhat:rhel_extras_other:7"
] | null | null | 6.7 | null |
RHSA-2024:2094 | Red Hat Security Advisory: security update Logging for Red Hat OpenShift - 5.8.6 | kernel: Use-after-free in nft_verdict_dump due to a race between set GC and transaction openssl: Incorrect cipher key and IV length processing kernel: A heap out-of-bounds write when function perf_read_group is called and sibling_list is smaller than its child's sibling_list gnutls: timing side-channel in the RSA-PSK authentication kernel: NULL pointer dereference in nvmet_tcp_build_iovec kernel: NULL pointer dereference in nvmet_tcp_execute_request kernel: NULL pointer dereference in __nvmet_req_complete kernel: Out-Of-Bounds Read vulnerability in smbCalcSize kernel: OOB Access in smb2_dump_detail kernel: inactive elements in nft_pipapo_walk curl: information disclosure by exploiting a mixed case flaw kernel: use-after-free in amdgpu_cs_wait_all_fences in drivers/gpu/drm/amd/amdgpu/amdgpu_cs.c kernel: netfilter: use-after-free in nft_trans_gc_catchall_sync leads to privilege escalation gnutls: incomplete fix for CVE-2023-5981 gnutls: rejects certificate chain with distributed trust kernel: ktls overwrites readonly memory pages when using function splice with a ktls socket as destination | [
"cpe:/a:redhat:logging:5.8::el9"
] | null | 7 | null | null |
RHSA-2023:6808 | Red Hat Security Advisory: tigervnc security update | xorg-x11-server: Out-of-bounds write in XIChangeDeviceProperty/RRChangeOutputProperty | [
"cpe:/a:redhat:rhel_e4s:8.1::appstream"
] | null | 7.8 | null | null |
RHSA-2015:1919 | Red Hat Security Advisory: java-1.8.0-openjdk security update | OpenJDK: kerberos realm name leak (JGSS, 8048030) OpenJDK: inefficient use of hash tables and lists during XML parsing (JAXP, 8068842) OpenJDK: missing checks for proper initialization in ObjectStreamClass (Serialization, 8103671) OpenJDK: HttpURLConnection header restriction bypass (Libraries, 8130193) OpenJDK: insufficient permission checks in StubGenerator (CORBA, 8076383) OpenJDK: OOB access in CMS code (2D, 8086092) OpenJDK: leak of user.dir location (JAXP, 8078427) OpenJDK: java.nio Buffers integer overflow issues (Libraries, 8130891) ICU: missing boundary checks in layout engine (OpenJDK 2D, 8132042) OpenJDK: incorrect access control context used in DGCImpl (RMI, 8080688) OpenJDK: CRL checking flaw (Libraries, 8081744) OpenJDK: incomplete constraints enforcement by AlgorithmChecker (Security, 8131291) OpenJDK: missing type checks in IIOPInputStream (CORBA, 8076392) OpenJDK: incorrect String object deserialization in IIOPInputStream (CORBA, 8076387) OpenJDK: incorrect access control context used in DGCClient (RMI, 8076413) OpenJDK: incomplete MaxXMLNameLimit enforcement (JAXP, 8086733) OpenJDK: insufficient proxy class checks in RemoteObjectInvocationHandler (RMI, 8076339) OpenJDK: incomplete supportDTD enforcement (JAXP, 8130078) | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation",
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | null | null |
RHSA-2023:0688 | Red Hat Security Advisory: openvswitch2.17 security, bug fix and enhancement update | openvswitch: Out-of-Bounds Read in Organization Specific TLV openvswitch: Integer Underflow in Organization Specific TLV | [
"cpe:/o:redhat:enterprise_linux:8::fastdatapath"
] | null | 9.8 | null | null |
RHSA-2007:0891 | Red Hat Security Advisory: php security update | gd / php-gd ImageCreateFromPng infinite loop caused by truncated PNG php chunk_split integer overflow php cross-site cookie insertion php multiple integer overflows in gd php floating point exception inside wordwrap php money_format format string issue php malformed cookie handling | [
"cpe:/a:redhat:rhel_application_stack:1"
] | null | null | null | null |
RHSA-2024:2517 | Red Hat Security Advisory: wpa_supplicant security update | wpa_supplicant: potential authorization bypass | [
"cpe:/o:redhat:enterprise_linux:9::baseos"
] | null | 6.5 | null | null |
RHSA-2024:7443 | Red Hat Security Advisory: RHACS 4.5 enhancement and security update | nodejs-async: Regular expression denial of service while parsing function in autoinject | [
"cpe:/a:redhat:advanced_cluster_security:4.5::el8"
] | null | 5.3 | null | null |
RHSA-2003:041 | Red Hat Security Advisory: : : : Updated VNC packages fix replay and cookie vulnerabilities | security flaw security flaw | [
"cpe:/o:redhat:linux:7.0",
"cpe:/o:redhat:linux:7.1",
"cpe:/o:redhat:linux:7.2",
"cpe:/o:redhat:linux:7.3",
"cpe:/o:redhat:linux:8.0"
] | null | null | null | null |
RHSA-2004:240 | Red Hat Security Advisory: squirrelmail security update | security flaw security flaw security flaw | [
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws"
] | null | null | null | null |
RHSA-2015:0115 | Red Hat Security Advisory: kernel security update | kernel: sctp: skb_over_panic when receiving malformed ASCONF chunks kernel: net: sctp: fix panic on duplicate ASCONF chunks kernel: net: sctp: remote memory pressure from excessive queueing | [
"cpe:/o:redhat:rhel_mission_critical:6.2::server"
] | null | null | null | null |
RHSA-2020:4111 | Red Hat Security Advisory: qemu-kvm-rhev security update | QEMU: usb: out-of-bounds r/w access issue while processing usb packets | [
"cpe:/a:redhat:rhev_manager:4.3",
"cpe:/o:redhat:enterprise_linux:7::hypervisor"
] | null | 5 | null | null |
RHSA-2013:1270 | Red Hat Security Advisory: polkit security update | polkit: unix-process subject for authorization is racy | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2008:0812 | Red Hat Security Advisory: RealPlayer security update | RealPlayer: SWF Frame Handling Buffer Overflow | [
"cpe:/a:redhat:rhel_extras:3",
"cpe:/a:redhat:rhel_extras:4",
"cpe:/a:redhat:rhel_extras:5::client",
"cpe:/a:redhat:rhel_extras:5::server"
] | null | null | null | null |
RHSA-2019:1633 | Red Hat Security Advisory: Red Hat OpenShift Container Platform 3.11 atomic-openshift security update | kubernetes: Incomplete fix for CVE-2019-1002101 allows for arbitrary file write via `kubectl cp` | [
"cpe:/a:redhat:openshift:3.11::el7"
] | null | null | 5.3 | null |
RHSA-2020:2040 | Red Hat Security Advisory: squid security update | squid: improper check for new member in ESIExpression::Evaluate allows for stack buffer overflow squid: parsing of header Proxy-Authentication leads to memory corruption squid: improper access restriction upon Digest Authentication nonce replay could lead to remote code execution | [
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 8.1 | 4.3 | null |
RHSA-2004:191 | Red Hat Security Advisory: cadaver security update | security flaw | [
"cpe:/o:redhat:enterprise_linux:2.1::as",
"cpe:/o:redhat:enterprise_linux:2.1::aw",
"cpe:/o:redhat:enterprise_linux:2.1::es",
"cpe:/o:redhat:enterprise_linux:2.1::ws"
] | null | null | null | null |
RHSA-2023:6179 | Red Hat Security Advisory: Red Hat Product OCP Tools 4.13 OpenShift Jenkins security update | snakeyaml: Denial of Service due to missing nested depth limitation for collections maven-shared-utils: Command injection via Commandline class apache-commons-text: variable interpolation RCE jenkins-2-plugins/script-security: Sandbox bypass vulnerability in Script Security Plugin jenkins-2-plugins/JUnit: Stored XSS vulnerability in JUnit Plugin jenkins-2-plugins/pipeline-build-step: Stored XSS vulnerability in Pipeline: Build Step Plugin golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487) HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack) | [
"cpe:/a:redhat:ocp_tools:4.13::el8"
] | null | 7.5 | null | null |
RHSA-2024:1557 | Red Hat Security Advisory: Errata Advisory for Red Hat OpenShift Builds 1.0.1 | ssh: Prefix truncation attack on Binary Packet Protocol (BPP) go-git: Maliciously crafted Git server replies can cause DoS on go-git clients go-git: Maliciously crafted Git server replies can lead to path traversal and RCE on go-git clients | [
"cpe:/a:redhat:openshift_builds:1.0::el8"
] | null | 8.1 | null | null |
RHSA-2023:2293 | Red Hat Security Advisory: pki-core security, bug fix, and enhancement update | pki-core: When using the caServerKeygen_DirUserCert profile, user can get certificates for other UIDs by entering name in Subject field | [
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 7.6 | null | null |
RHSA-2013:0770 | Red Hat Security Advisory: java-1.6.0-openjdk security update | OpenJDK: sun.awt.datatransfer.ClassLoaderObjectInputStream class may incorrectly invoke the system class loader (CanSecWest 2013, AWT, 8009305) OpenJDK: JDBC driver manager improper toString calls (CanSecWest 2013, Libraries, 8009814) OpenJDK: JAXP missing security restrictions (JAXP, 6657673) OpenJDK: remote code loading enabled by default (RMI, 8001040) OpenJDK: LogStream.setDefaultStream() missing security restrictions (RMI, 8001329) OpenJDK: java.beans.ThreadGroupContext missing restrictions (Beans, 7200507) ICU: Layout Engine font layout and glyph table errors (JDK 2D, 8004994) ICU: Layout Engine font layout and glyph table errors (JDK 2D, 8004986) ICU: Layout Engine font layout and glyph table errors (JDK 2D, 8004987) OpenJDK: temporary files created with insecure permissions (JAX-WS, 8003542) OpenJDK: Network InetAddress serialization information disclosure (Networking, 8000724) ICU: Layout Engine font processing errors (JDK 2D, 8001031) OpenJDK: image processing vulnerability (2D, 8007617) OpenJDK: Hotspot MethodHandle lookup error (Hotspot, 8009699) OpenJDK: MethodUtil trampoline class incorrect restrictions (Libraries, 8009857) OpenJDK: MBeanInstantiator insufficient class access checks (JMX, 8006435) OpenJDK: ConcurrentHashMap incorrectly calls defaultReadObject() method (Libraries, 8009063) OpenJDK: JPEGImageWriter state corruption (ImageIO, 8007918) OpenJDK: JPEGImageReader state corruption (ImageIO, 8007667) OpenJDK: Hotspot intrinsic frames vulnerability (Hotspot, 8004336) | [
"cpe:/o:redhat:enterprise_linux:5::server",
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2024:4035 | Red Hat Security Advisory: ovn-2021 security update | ovn: insufficient validation of BFD packets may lead to denial of service | [
"cpe:/o:redhat:enterprise_linux:8::fastdatapath"
] | null | 6.5 | null | null |
RHSA-2019:3844 | Red Hat Security Advisory: kernel-rt security update | hw: Machine Check Error on Page Size Change (IFU) hw: Intel GPU Denial Of Service while accessing MMIO in lower power state hw: TSX Transaction Asynchronous Abort (TAA) | [
"cpe:/a:redhat:enterprise_mrg:2:server:el6"
] | null | null | 6.5 | null |
RHSA-2003:198 | Red Hat Security Advisory: kernel security update | security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw | [
"cpe:/o:redhat:enterprise_linux:2.1::as",
"cpe:/o:redhat:enterprise_linux:2.1::aw"
] | null | null | null | null |
RHSA-2022:5095 | Red Hat Security Advisory: grub2, mokutil, shim, and shim-unsigned-x64 security update | grub2: Crafted PNG grayscale images may lead to out-of-bounds write in heap grub2: Crafted PNG image may lead to out-of-bound write during huffman table handling grub2: Crafted JPEG image can lead to buffer underflow write in the heap grub2: Integer underflow in grub_net_recv_ip4_packets grub2: Out-of-bound write when handling split HTTP headers grub2: shim_lock verifier allows non-kernel files to be loaded grub2: use-after-free in grub_cmd_chainloader() shim: Buffer overflow when loading crafted EFI images | [
"cpe:/a:redhat:enterprise_linux:8::crb",
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 7.3 | null | null |
RHSA-2023:5376 | Red Hat Security Advisory: Red Hat OpenShift Data Foundation 4.13.3 security and bug fix update | golang: html/template: improper handling of JavaScript whitespace word-wrap: ReDoS | [
"cpe:/a:redhat:openshift_data_foundation:4.13::el9"
] | null | 7.5 | null | null |
RHSA-2023:2459 | Red Hat Security Advisory: device-mapper-multipath security and bug fix update | device-mapper-multipath: multipathd: insecure handling of files in /dev/shm leading to symlink attack | [
"cpe:/a:redhat:enterprise_linux:9::crb",
"cpe:/o:redhat:enterprise_linux:9::baseos"
] | null | 7 | null | null |
RHSA-2015:1766 | Red Hat Security Advisory: python-django security update | python-django: Denial-of-service possibility in logout() view by filling session store python-django: Denial-of-service possibility in logout() view by filling session store | [
"cpe:/a:redhat:openstack:5::el6"
] | null | null | null | null |
RHSA-2022:8543 | Red Hat Security Advisory: thunderbird security update | Mozilla: Service Workers might have learned size of cross-origin media files Mozilla: Fullscreen notification bypass Mozilla: Use-after-free in InputStream implementation Mozilla: Use-after-free of a JavaScript Realm Mozilla: Fullscreen notification bypass via windowName Mozilla: Use-after-free in Garbage Collection Mozilla: ServiceWorker-intercepted requests bypassed SameSite cookie policy Mozilla: Cross-Site Tracing was possible via non-standard override headers Mozilla: Symlinks may resolve to partially uninitialized buffers Mozilla: Keystroke Side-Channel Leakage Mozilla: Custom mouse cursor could have been drawn over browser UI Mozilla: Iframe contents could be rendered outside the iframe Mozilla: Memory safety bugs fixed in Firefox 107 and Firefox ESR 102.5 | [
"cpe:/a:redhat:rhel_aus:8.2::appstream",
"cpe:/a:redhat:rhel_e4s:8.2::appstream",
"cpe:/a:redhat:rhel_tus:8.2::appstream"
] | null | 8.8 | 6.1 | null |
RHSA-2020:3209 | Red Hat Security Advisory: AMQ Online 1.5.2 release and security update | postgresql-jdbc: XML external entity (XXE) vulnerability in PgSQLXML amq-on: CSRF (in graphQL requests) AMQ: Denial of Service via unrecognized field injection | [
"cpe:/a:redhat:amq_online:1.5"
] | null | 4.3 | null | null |
RHSA-2003:275 | Red Hat Security Advisory: : Updated CUPS packages fix denial of service | security flaw | [
"cpe:/o:redhat:linux:8.0",
"cpe:/o:redhat:linux:9"
] | null | null | null | null |
RHSA-2024:0564 | Red Hat Security Advisory: container-tools:3.0 security update | prometheus/client_golang: Denial of service using InstrumentHandlerCounter runc: AppArmor can be bypassed when `/proc` inside the container is symlinked with a specific mount configuration | [
"cpe:/a:redhat:rhel_aus:8.4::appstream",
"cpe:/a:redhat:rhel_e4s:8.4::appstream",
"cpe:/a:redhat:rhel_tus:8.4::appstream"
] | null | 7.8 | null | null |
RHSA-2014:0027 | Red Hat Security Advisory: java-1.7.0-openjdk security update | OpenJDK: jarsigner does not detect unsigned bytecode injected into signed jars OpenJDK: null xmlns handling issue (Security, 8025026) OpenJDK: insufficient security checks in CORBA stub factories (CORBA, 8026193) OpenJDK: JVM method processing issues (Libraries, 8029507) OpenJDK: com.sun.corba.se. should be restricted package (CORBA, 8025022) ICU: Layout Engine LookupProcessor insufficient input checks (JDK 2D, 8025034) OpenJDK: XML canonicalizer mutable strings passed to untrusted code (Security, 8026417) OpenJDK: insufficient Socket checkListen checks (Networking, 8011786) OpenJDK: SnmpStatusException handling issues (Serviceability, 7068126) OpenJDK: document builder missing security checks (JAXP, 8027201, 8025018) OpenJDK: TLS/SSL handshake timing issues (JSSE, 8023069) OpenJDK: insecure subject principals set handling (JAAS, 8024306) OpenJDK: insufficient package access checks in the Naming component (JNDI, 8025758) OpenJDK: XXE issue in decoder (Beans, 8023245) OpenJDK: insufficient security checks in IIOP streams (CORBA, 8025767) | [
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2019:1714 | Red Hat Security Advisory: bind security update | bind: Race condition when discarding malformed packets can cause bind to exit with assertion failure | [
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | null | 5.9 | null |
RHSA-2015:1646 | Red Hat Security Advisory: rh-mariadb100-mariadb security update | mysql: unspecified vulnerability related to Server:Federated (CPU April 2015) mysql: unspecified vulnerability related to Server:Compiling (CPU April 2015) mysql: unspecified vulnerability related to Server:DDL (CPU April 2015) mysql: unspecified vulnerability related to Server:Optimizer (CPU April 2015) mysql: unspecified vulnerability related to Server:GIS (CPU July 2015) mysql: unspecified vulnerability related to Server:DML (CPU July 2015) mysql: unspecified vulnerability related to Server:Partition (CPU July 2015) mysql: unspecified vulnerability related to Server:Security:Privileges (CPU July 2015) mysql: unspecified vulnerability related to Server:Security:Firewall (CPU July 2015) mysql: unspecified vulnerability related to Server:Security:Privileges (CPU July 2015) mysql: unspecified vulnerability related to Server:Optimizer (CPU July 2015) mysql: unspecified vulnerability related to Server:DML (CPU July 2015) mysql: unspecified vulnerability related to Client (CPU July 2015) mysql: use of SSL/TLS can not be enforced in mysql client library (oCERT-2015-003, BACKRONYM) mysql: unspecified vulnerability related to Server:Pluggable Auth (CPU July 2015) mysql: unspecified vulnerability related to Server:I_S (CPU July 2015) mysql: unspecified vulnerability related to Server:InnoDB (CPU July 2015) mysql: unspecified vulnerability related to Server:Optimizer (CPU July 2015) mysql: unspecified vulnerability related to Server:Memcached (CPU July 2015) mysql: unspecified vulnerability related to Server:Security:Firewall (CPU July 2015) mysql: unspecified vulnerability related to Server:Security:Firewall (CPU July 2015) mysql: unspecified vulnerability related to Server:RBR (CPU July 2015) mysql: unspecified vulnerability related to Server:Partition (CPU July 2015) mysql: unspecified vulnerability related to Server:Security:Privileges (CPU October 2015) mysql: unspecified vulnerability related to Server:InnoDB (CPU October 2015) | [
"cpe:/a:redhat:rhel_software_collections:2::el6",
"cpe:/a:redhat:rhel_software_collections:2::el7"
] | null | null | null | null |
RHSA-2011:1019 | Red Hat Security Advisory: libvirt security, bug fix, and enhancement update | libvirt: integer overflow in VirDomainGetVcpus | [
"cpe:/a:redhat:rhel_virtualization:5::client",
"cpe:/a:redhat:rhel_virtualization:5::server"
] | null | null | null | null |
RHSA-2023:5580 | Red Hat Security Advisory: kpatch-patch security update | kernel: use-after-free in l2cap_connect and l2cap_le_connect_req in net/bluetooth/l2cap_core.c kernel: net/sched: Use-after-free vulnerabilities in the net/sched classifiers: cls_fw, cls_u32 and cls_route | [
"cpe:/o:redhat:rhel_e4s:8.2::baseos"
] | null | 7.8 | null | null |
RHSA-2025:2959 | Red Hat Security Advisory: thunderbird security update | firefox: thunderbird: Memory safety bugs fixed in Firefox 136, Thunderbird 136, Firefox ESR 115.21, Firefox ESR 128.8, and Thunderbird 128.8 firefox: thunderbird: Memory safety bugs fixed in Firefox 136, Thunderbird 136, Firefox ESR 128.8, and Thunderbird 128.8 | [
"cpe:/a:redhat:rhel_eus:9.2::appstream"
] | null | 8.8 | null | null |
RHSA-2023:7419 | Red Hat Security Advisory: kpatch-patch security update | kernel: net/sched: sch_qfq component can be exploited if in qfq_change_agg function happens qfq_enqueue overhead kernel: net/sched: cls_fw component can be exploited as result of failure in tcf_change_indev function kernel: net/sched: Use-after-free vulnerabilities in the net/sched classifiers: cls_fw, cls_u32 and cls_route kernel: net/sched: Use-after-free vulnerabilities in the net/sched classifiers: cls_fw, cls_u32 and cls_route kernel: net/sched: Use-after-free vulnerabilities in the net/sched classifiers: cls_fw, cls_u32 and cls_route kernel: net/sched: Use-after-free vulnerabilities in the net/sched classifiers: cls_fw, cls_u32 and cls_route | [
"cpe:/o:redhat:enterprise_linux:7::server"
] | null | 7.8 | null | null |
RHSA-2024:7670 | Red Hat Security Advisory: Red Hat build of Quarkus 3.8.6.SP1 Security Update | An update is now available for Red Hat build of Quarkus.
Red Hat Product Security has rated this update as having a security impact
of Critical. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available for each vulnerability. For
more information, see the CVE links in the References section. | [
"cpe:/a:redhat:quarkus:3.8::el8"
] | null | null | null | null |
RHSA-2010:0114 | Red Hat Security Advisory: acroread security and bug fix update | flash-plugin: unauthorized cross-domain requests (APSB10-06) acroread: unspecified code execution flaw | [
"cpe:/a:redhat:rhel_extras:4",
"cpe:/a:redhat:rhel_extras:5::client",
"cpe:/a:redhat:rhel_extras:5::server"
] | null | null | null | null |
RHSA-2021:1518 | Red Hat Security Advisory: Red Hat Ceph Storage 3.3 Security and Bug Fix Update | ceph: specially crafted XML payload on POST requests leads to DoS by crashing RGW grafana: SSRF incorrect access control vulnerability allows unauthenticated users to make grafana send HTTP requests to any URL ceph: User credentials can be manipulated and stolen by Native CephFS consumers of OpenStack Manila tcmu-runner: SCSI target (LIO) write to any block on ILO backstore | [
"cpe:/a:redhat:ceph_storage:3::el7"
] | null | 8.1 | null | null |
RHSA-2023:0612 | Red Hat Security Advisory: rh-nodejs14-nodejs and rh-nodejs14-nodejs-nodemon security update | glob-parent: Regular Expression Denial of Service minimist: prototype pollution node-fetch: exposure of sensitive information to an unauthorized actor nodejs-minimatch: ReDoS via the braceExpand function express: "qs" prototype poisoning causes the hang of the node process nodejs: DNS rebinding in inspect via invalid octal IP address | [
"cpe:/a:redhat:rhel_software_collections:3::el7"
] | null | 7.5 | null | null |
RHSA-2022:5805 | Red Hat Security Advisory: kernel security update | kernel: a use-after-free write in the netfilter subsystem can lead to privilege escalation to root | [
"cpe:/o:redhat:rhel_aus:7.4::server"
] | null | 7.8 | null | null |
RHSA-2012:1331 | Red Hat Security Advisory: JBoss Operations Network 3.1.1 update | tomcat: large number of parameters DoS | [
"cpe:/a:redhat:jboss_operations_network:3.1"
] | null | null | null | null |
RHSA-2017:0091 | Red Hat Security Advisory: kernel-rt security and bug fix update | kernel: Use after free in tcp_xmit_retransmit_queue kernel: Use-after-free in the recvmmsg exit path kernel: Slab out-of-bounds access in sctp_sf_ootb() | [
"cpe:/a:redhat:rhel_extras_rt:7"
] | null | null | 5.9 | null |
RHSA-2023:1747 | Red Hat Security Advisory: pki-core:10.6 security update | pki-core: access to external entities when parsing XML can lead to XXE | [
"cpe:/a:redhat:rhel_aus:8.2::appstream",
"cpe:/a:redhat:rhel_e4s:8.2::appstream",
"cpe:/a:redhat:rhel_tus:8.2::appstream"
] | null | 7.5 | null | null |
RHSA-2020:4391 | Red Hat Security Advisory: openstack-cinder security update | openstack-cinder: Improper handling of ScaleIO backend credentials | [
"cpe:/a:redhat:openstack:13::el7"
] | null | 6.5 | null | null |
RHSA-2024:8788 | Red Hat Security Advisory: krb5 security update | freeradius: forgery attack | [
"cpe:/o:redhat:rhel_els:7"
] | null | 9 | null | null |
RHSA-2020:2041 | Red Hat Security Advisory: squid:4 security update | squid: improper check for new member in ESIExpression::Evaluate allows for stack buffer overflow squid: parsing of header Proxy-Authentication leads to memory corruption squid: improper access restriction upon Digest Authentication nonce replay could lead to remote code execution | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 8.1 | 4.3 | null |
Subsets and Splits