id
stringlengths
13
15
title
stringlengths
29
176
description
stringlengths
8
31.7k
cpes
sequencelengths
0
20
cvss_v4_0
null
cvss_v3_1
float64
0
10
cvss_v3_0
float64
0
10
cvss_v2_0
null
RHSA-2019:3172
Red Hat Security Advisory: Red Hat Satellite 6 security, bug fix, and enhancement update
python-werkzeug: Cross-site scripting in render_full function in debug/tbtools.py python-jinja2: Sandbox escape due to information disclosure via str.format rubygem-rack: Buffer size in multipart parser allows for denial of service dom4j: XML Injection in Class: Element. Methods: addElement, addAttribute which can impact the integrity of XML documents foreman: Recover of plaintext password or token for the compute resources foreman: authorization bypasses in foreman-tasks leading to information disclosure python-jinja2: str.format_map allows sandbox escape python-twisted: Improper neutralization of CRLF characters in URIs and HTTP methods katello: registry credentials are captured in plain text during repository discovery
[ "cpe:/a:redhat:satellite:6.6::el7", "cpe:/a:redhat:satellite_capsule:6.6::el7" ]
null
null
4.1
null
RHSA-2015:0957
Red Hat Security Advisory: spacewalk-java security update
Satellite5: RPC API XML External Entities file disclosure
[ "cpe:/a:redhat:network_satellite:5.7::el6" ]
null
null
null
null
RHSA-2020:0273
Red Hat Security Advisory: sqlite security update
sqlite: fts3: improve shadow table corruption detection
[ "cpe:/a:redhat:enterprise_linux:8::appstream", "cpe:/o:redhat:enterprise_linux:8::baseos" ]
null
8.8
null
null
RHSA-2022:8893
Red Hat Security Advisory: OpenShift Container Platform 4.11.20 security update
golang: crash in a golang.org/x/crypto/ssh server
[ "cpe:/a:redhat:openshift:4.11::el8" ]
null
7.5
null
null
RHSA-2024:8543
Red Hat Security Advisory: pki-core:10.6 and pki-deps:10.6 security update
tomcat: Denial of Service in Tomcat
[ "cpe:/a:redhat:rhel_eus:8.8::appstream" ]
null
7.5
null
null
RHEA-2023:6741
Red Hat Enhancement Advisory: .NET 8.0 bugfix update
HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack)
[ "cpe:/a:redhat:enterprise_linux:9::appstream" ]
null
7.5
null
null
RHSA-2023:5314
Red Hat Security Advisory: OpenShift API for Data Protection (OADP) 1.1.6 security and bug fix update
prometheus/client_golang: Denial of service using InstrumentHandlerCounter golang.org/x/net/http2: avoid quadratic complexity in HPACK decoding distribution/distribution: DoS from malicious API request golang: crypto/internal/nistec: specific unreduced P-256 scalars produce incorrect results containerd: Supplementary groups are not set up properly
[ "cpe:/a:redhat:openshift_api_data_protection:1.1::el8" ]
null
7.3
null
null
RHSA-2021:3230
Red Hat Security Advisory: compat-exiv2-026 security update
exiv2: Heap-based buffer overflow vulnerability in jp2image.cpp
[ "cpe:/a:redhat:rhel_eus:8.2::appstream" ]
null
8.1
null
null
RHSA-2013:0249
Red Hat Security Advisory: JBoss Enterprise Application Platform 4.3.0 CP10 security update
JBoss: allows empty password to authenticate against LDAP
[ "cpe:/a:redhat:jboss_enterprise_application_platform:4.3.0::el4", "cpe:/a:redhat:jboss_enterprise_application_platform:4.3.0::el5" ]
null
null
null
null
RHSA-2007:1065
Red Hat Security Advisory: pcre security update
pcre integer overflow pcre regular expression flaws
[ "cpe:/o:redhat:enterprise_linux:2.1::as", "cpe:/o:redhat:enterprise_linux:2.1::aw", "cpe:/o:redhat:enterprise_linux:2.1::es", "cpe:/o:redhat:enterprise_linux:2.1::ws" ]
null
null
null
null
RHSA-2017:0323
Red Hat Security Advisory: kernel security update
kernel: dccp: crash while sending ipv6 reset packet kernel: use after free in dccp protocol
[ "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
7.8
null
RHSA-2020:2113
Red Hat Security Advisory: Red Hat Single Sign-On 7.3.8 security update
mojarra: Path traversal in ResourceManager.java:getLocalePrefix() via the loc parameter infinispan: invokeAccessibly method from ReflectionUtil class allows to invoke private methods Mojarra: Path traversal via either the loc parameter or the con parameter, incomplete fix of CVE-2018-14371
[ "cpe:/a:redhat:jboss_single_sign_on:7.3" ]
null
6.5
7.5
null
RHSA-2019:2807
Red Hat Security Advisory: thunderbird security update
Mozilla: Covert Content Attack on S/MIME encryption using a crafted multipart/alternative message Mozilla: Memory safety bugs fixed in Firefox 69, Firefox ESR 68.1, Firefox ESR 60.9, Thunderbird 68.1, and Thunderbird 60.9 Mozilla: Same-origin policy violation with SVG filters and canvas to steal cross-origin images Mozilla: Cross-origin access to unload event attributes Mozilla: XSS by breaking out of title and textarea elements using innerHTML Mozilla: Use-after-free while manipulating video Mozilla: Use-after-free while extracting a key value in IndexedDB
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
8.8
null
null
RHSA-2009:1236
Red Hat Security Advisory: java-1.5.0-ibm security update
JDK: XML parsing Denial-Of-Service (6845701) OpenJDK Untrusted applet System properties access (6738524) OpenJDK Proxy mechanism information leaks (6801071) OpenJDK Proxy mechanism information leaks (6801071) OpenJDK proxy mechanism allows non-authorized socket connections (6801497) Java Web Start Buffer unpack200 processing integer overflow (6830335)
[ "cpe:/a:redhat:rhel_extras:4", "cpe:/a:redhat:rhel_extras:5::client", "cpe:/a:redhat:rhel_extras:5::server" ]
null
null
null
null
RHSA-2024:4079
Red Hat Security Advisory: [23.1] Security update for the 23.1 release (RPMs)
graalvm: Unauthorized Read Access graalvm: unauthorized ability to cause a partial denial of service
[ "cpe:/a:redhat:quarkus:3.8::el8" ]
null
3.7
null
null
RHSA-2024:5815
Red Hat Security Advisory: nodejs:20 security update
nodejs: fs.lstat bypasses permission model nodejs: Bypass network import restriction via data URL nodejs: fs.fchown/fchmod bypasses permission model
[ "cpe:/a:redhat:enterprise_linux:9::appstream" ]
null
3.9
2.9
null
RHSA-2024:4610
Red Hat Security Advisory: firefox security update
Mozilla: Race condition in permission assignment Mozilla: Memory corruption in thread creation Mozilla: Memory safety bugs fixed in Firefox 128, Firefox ESR 115.13, and Thunderbird 115.13
[ "cpe:/a:redhat:rhel_aus:8.4::appstream", "cpe:/a:redhat:rhel_e4s:8.4::appstream", "cpe:/a:redhat:rhel_tus:8.4::appstream" ]
null
7.5
null
null
RHSA-2015:1668
Red Hat Security Advisory: httpd security update
httpd: HTTP request smuggling attack against chunked request parser
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
3.7
null
RHSA-2023:7259
Red Hat Security Advisory: .NET 6.0 security, bug fix, and enhancement update
dotnet: Arbitrary File Write and Deletion Vulnerability: FormatFtpCommand dotnet: ASP.NET Security Feature Bypass Vulnerability in Blazor forms
[ "cpe:/a:redhat:rhel_dotnet:6.0::el7" ]
null
5.5
null
null
RHSA-2018:2603
Red Hat Security Advisory: kernel security update
Kernel: hw: cpu: L1 terminal fault (L1TF) Kernel: hw: cpu: L1 terminal fault (L1TF)
[ "cpe:/o:redhat:rhel_aus:5.9" ]
null
null
5.6
null
RHSA-2016:0707
Red Hat Security Advisory: chromium-browser security update
chromium-browser: out-of-bounds write in blink chromium-browser: memory corruption in cross-process frames chromium-browser: use-after-free in extensions chromium-browser: use-after-free in blink's v8 bindings chromium-browser: address bar spoofing chromium-browser: information leak in v8 chromium-browser: various fixes from internal audits
[ "cpe:/a:redhat:rhel_extras:6" ]
null
null
null
null
RHSA-2020:1021
Red Hat Security Advisory: GNOME security, bug fix, and enhancement update
gnome-shell: partial lock screen bypass
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
4.8
null
RHSA-2022:8532
Red Hat Security Advisory: Satellite 6.9.10 Async Security Update
puma-5.6.4: http request smuggling vulnerabilities
[ "cpe:/a:redhat:satellite:6.9::el7", "cpe:/a:redhat:satellite_capsule:6.9::el7" ]
null
7.5
null
null
RHSA-2020:3495
Red Hat Security Advisory: Red Hat Single Sign-On 7.4.2 security update on RHEL 6
keycloak: security headers missing on REST endpoints keycloak: DoS by sending multiple simultaneous requests with a Content-Length header value greater than actual byte count of request body
[ "cpe:/a:redhat:red_hat_single_sign_on:7::el6" ]
null
7.5
null
null
RHSA-2023:0337
Red Hat Security Advisory: expat security update
expat: use-after free caused by overeager destruction of a shared DTD in XML_ExternalEntityParserCreate
[ "cpe:/a:redhat:enterprise_linux:9::appstream", "cpe:/o:redhat:enterprise_linux:9::baseos" ]
null
7.5
null
null
RHSA-2024:10275
Red Hat Security Advisory: kernel-rt security update
kernel: xprtrdma: fix pointer derefs in error cases of rpcrdma_ep_create
[ "cpe:/a:redhat:rhel_tus:8.4::nfv", "cpe:/a:redhat:rhel_tus:8.4::realtime" ]
null
5.5
null
null
RHSA-2018:1632
Red Hat Security Advisory: libvirt security update
hw: cpu: speculative store bypass
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
5.6
null
RHSA-2011:0291
Red Hat Security Advisory: java-1.5.0-ibm security update
JDK Double.parseDouble Denial-Of-Service
[ "cpe:/a:redhat:rhel_extras:4", "cpe:/a:redhat:rhel_extras:5::client", "cpe:/a:redhat:rhel_extras:5::server", "cpe:/a:redhat:rhel_extras:6" ]
null
null
null
null
RHSA-2015:2079
Red Hat Security Advisory: binutils security, bug fix, and enhancement update
binutils: invalid read flaw in libbfd binutils: lack of range checking leading to controlled write in _bfd_elf_setup_sections() binutils: out-of-bounds write when parsing specially crafted PE executable binutils: heap overflow in objdump when parsing a crafted ELF/PE binary file (incomplete fix for CVE-2014-8485) binutils: stack overflow in objdump when parsing specially crafted ihex file binutils: stack overflow in the SREC parser binutils: directory traversal vulnerability binutils: out of bounds memory write
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
null
null
RHSA-2021:4994
Red Hat Security Advisory: nss security update
nss: Memory corruption in decodeECorDsaSignature with DSA signatures (and RSA-PSS)
[ "cpe:/o:redhat:rhel_aus:7.3::server" ]
null
9.8
null
null
RHSA-2018:2290
Red Hat Security Advisory: memcached security update
memcached: Integer Overflow in items.c:item_free()
[ "cpe:/a:redhat:openstack:10::el7" ]
null
null
6.5
null
RHSA-2013:0833
Red Hat Security Advisory: JBoss Enterprise Application Platform 6.1.0 update
Web: jsessionid exposed via encoded url when using cookie based session tracking JBoss: custom authorization module implementations shared between applications apache-cxf: XML encryption backwards compatibility attacks openssl: DoS due to improper handling of OCSP response verification SSL/TLS: CBC padding timing attack (lucky-13) Installer: Generated auto-install xml is world readable tomcat: Session fixation in form authenticator
[ "cpe:/a:redhat:jboss_enterprise_application_platform:6.1" ]
null
null
null
null
RHSA-2010:0780
Red Hat Security Advisory: thunderbird security update
Mozilla miscellaneous memory safety hazards Mozilla use-after-free error in nsBarProp Mozilla unsafe library loading flaw
[ "cpe:/a:redhat:rhel_productivity:5", "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws", "cpe:/o:redhat:enterprise_linux:5::client" ]
null
null
null
null
RHSA-2023:1472
Red Hat Security Advisory: thunderbird security update
nss: Arbitrary memory write via PKCS 12 Mozilla: Incorrect code generation during JIT compilation Mozilla: Potential out-of-bounds when accessing throttled streams Mozilla: Invalid downcast in Worklets Mozilla: URL being dragged from a removed cross-origin iframe into the same tab triggered navigation Mozilla: Memory safety bugs fixed in Firefox 111 and Firefox ESR 102.9
[ "cpe:/a:redhat:rhel_eus:8.4::appstream" ]
null
8.8
null
null
RHSA-2024:0140
Red Hat Security Advisory: ipa security update
ipa: Invalid CSRF protection
[ "cpe:/a:redhat:rhel_eus:9.0::appstream", "cpe:/a:redhat:rhel_eus:9.0::crb" ]
null
6.5
null
null
RHSA-2023:5950
Red Hat Security Advisory: Red Hat OpenShift Service Mesh for 2.2.11 security update
golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487)
[ "cpe:/a:redhat:service_mesh:2.2::el8" ]
null
7.5
null
null
RHSA-2017:0276
Red Hat Security Advisory: bind security update
bind: Assertion failure when using DNS64 and RPZ Can Lead to Crash
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
7.5
null
RHSA-2018:2256
Red Hat Security Advisory: java-1.8.0-oracle security update
JDK: unspecified vulnerability fixed in 6u201, 7u191, 8u181, and 10.0.2 (Libraries) JDK: unspecified vulnerability fixed in 7u191, 8u181, and 10.0.2 (JavaFX) OpenJDK: insufficient index validation in PatternSyntaxException getMessage() (Concurrency, 8199547) JDK: unspecified vulnerability fixed in 8u181 and 10.0.2 (Deployment) JDK: unspecified vulnerability fixed in 6u201, 7u191, 8u181, and 10.0.2 (JSSE)
[ "cpe:/a:redhat:rhel_extras_oracle_java:6" ]
null
null
5.9
null
RHSA-2018:0336
Red Hat Security Advisory: Satellite 6.3 security, bug fix, and enhancement update
rubygem-will_paginate: XSS vulnerabilities foreman: models with a 'belongs_to' association to an Organization do not verify association belongs to that Organization V8: integer overflow leading to buffer overflow in Zone::New foreman: inspect in a provisioning template exposes sensitive controller information pulp: Leakage of CA key in pulp-qpid-ssl-cfg pulp: Unsafe use of bash $RANDOM for NSS DB password and seed foreman: privilege escalation through Organization and Locations API foreman: Information disclosure in provisioning template previews foreman: inside discovery-debug, the root password is displayed in plaintext foreman: Persistent XSS in Foreman remote execution plugin foreman: Foreman information leak through unauthorized multiple_checkboxes helper foreman: Information leak through organizations and locations feature foreman: Stored XSS vulnerability in remote execution plugin foreman: Stored XSS in org/loc wizard foreman: Stored XSS via organization/location with HTML in name foreman-debug: missing obfuscation of sensitive information katello-debug: Possible symlink attacks due to use of predictable file names puppet: Unsafe YAML deserialization rubygem-hammer_cli: no verification of API server's SSL certificate foreman: Image password leak Interconnect: Denial of Service vulnerability in Red Hat JBoss AMQ Interconnect katello: SQL inject in errata-related REST API
[ "cpe:/a:redhat:satellite:6.3::el7", "cpe:/a:redhat:satellite_capsule:6.3::el7" ]
null
null
4.3
null
RHSA-2014:0294
Red Hat Security Advisory: XStream security update
XStream: remote code execution due to insecure XML deserialization
[ "cpe:/a:redhat:jboss_data_virtualization:6.0" ]
null
null
null
null
RHSA-2020:0279
Red Hat Security Advisory: virt:rhel security update
hw: TSX Transaction Asynchronous Abort (TAA)
[ "cpe:/a:redhat:enterprise_linux:8::appstream", "cpe:/a:redhat:enterprise_linux:8::crb" ]
null
null
6.5
null
RHSA-2016:1594
Red Hat Security Advisory: python-django security update
django: XSS in admin's add/change related popup
[ "cpe:/a:redhat:openstack-optools:8::el7" ]
null
null
6.1
null
RHSA-2019:3050
Red Hat Security Advisory: Red Hat Single Sign-On 7.3.4 security update
keycloak: script execution via UMA policy trigger keycloak: script execution via realm management policy trigger undertow: Information leak in requests for directories without trailing slashes undertow: DEBUG log for io.undertow.request.security if enabled leaks credentials to log files jackson-databind: polymorphic typing issue allows attacker to read arbitrary local files on the server. jackson-databind: polymorphic typing issue allows attacker to read arbitrary local files on the server via crafted JSON message. jackson-databind: default typing mishandling leading to remote code execution keycloak: adapter endpoints are exposed via arbitrary URLs keycloak: cross-realm user access auth bypass
[ "cpe:/a:redhat:jboss_single_sign_on:7.3" ]
null
6.6
5
null
RHSA-2023:5838
Red Hat Security Advisory: nghttp2 security update
HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack)
[ "cpe:/a:redhat:enterprise_linux:9::crb", "cpe:/o:redhat:enterprise_linux:9::baseos" ]
null
7.5
null
null
RHSA-2019:2699
Red Hat Security Advisory: polkit security update
polkit: Temporary auth hijacking via PID reuse and non-atomic fork
[ "cpe:/o:redhat:rhel_eus:7.4::computenode", "cpe:/o:redhat:rhel_eus:7.4::server" ]
null
null
7.3
null
RHSA-2015:0773
Red Hat Security Advisory: Red Hat JBoss Data Grid 6.4.1 update
OpenJDK: XML parsing Denial of Service (JAXP, 8017298) RESTeasy: External entities expanded by DocumentProvider Weld: Limited information disclosure via stale thread state wss4j: Apache WSS4J is vulnerable to Bleichenbacher's attack (incomplete fix for CVE-2011-2487) wss4j: Apache WSS4J doesn't correctly enforce the requireSignedEncryptedDataElements property
[ "cpe:/a:redhat:jboss_data_grid:6.4.1" ]
null
null
null
null
RHSA-2014:0902
Red Hat Security Advisory: java-1.7.0-oracle security update
OpenJDK: Restrict use of privileged annotations (Libraries, 8034985) OpenJDK: Event logger format string vulnerability (Hotspot, 8037076) JDK: unspecified vulnerability fixed in 7u65 and 8u11 (Deployment) OpenJDK: SubjectDelegator protection insufficient (JMX, 8029755) OpenJDK: Incorrect generic signature attribute parsing (Hotspot, 8037076) OpenJDK: Clone interfaces passed to proxy methods (Libraries, 8035009) OpenJDK: Bytecode verification does not prevent ctor calls to this() and super() (Hotspot, 8035119) JDK: unspecified vulnerability fixed in 7u65 and 8u11 (Deployment) OpenJDK: MethodHandles.Lookup insufficient modifiers checks (Libraries, 8035788) OpenJDK: Incorrect handling of invocations with exhausted ranks (Libraries, 8035793) JDK: unspecified vulnerability fixed in 6u81, 7u65 and 8u11 (Deployment) OpenJDK: RSA blinding issues (Security, 8031346) OpenJDK: Prevent instantiation of service with non-public constructor (Security, 8035004) OpenJDK: AtomicReferenceFieldUpdater missing primitive type check (Libraries, 8039520) OpenJDK: insufficient Diffie-Hellman public key validation (Security, 8037162) OpenJDK: Incorrect TLS/EC management (Security, 8031340) JDK: unspecified vulnerability fixed in 6u81, 7u65 and 8u11 (Deployment) OpenJDK: InfoBuilder incorrect return values (Serviceability, 8033301)
[ "cpe:/a:redhat:rhel_extras_oracle_java:5", "cpe:/a:redhat:rhel_extras_oracle_java:6", "cpe:/a:redhat:rhel_extras_oracle_java:7" ]
null
null
null
null
RHSA-2014:0580
Red Hat Security Advisory: openstack-keystone security and bug fix update
openstack-keystone: trustee token revocation does not work with memcache backend
[ "cpe:/a:redhat:openstack:4::el6" ]
null
null
null
null
RHSA-2024:2782
Red Hat Security Advisory: OpenShift Container Platform 4.12.57 security update
osin: manipulation of the argument secret leads to observable timing discrepancy golang: net/http, x/net/http2: unlimited number of CONTINUATION frames causes DoS cluster-monitoring-operator: credentials leak ironic-image: Unauthenticated local access to Ironic API
[ "cpe:/a:redhat:openshift:4.12::el8", "cpe:/a:redhat:openshift:4.12::el9" ]
null
4.7
null
null
RHSA-2023:5725
Red Hat Security Advisory: OpenJDK 8u392 Security Update for Portable Linux Builds
OpenJDK: segmentation fault in ciMethodBlocks OpenJDK: IOR deserialization issue in CORBA (8303384) OpenJDK: certificate path validation issue during client authentication (8309966)
[ "cpe:/a:redhat:openjdk:1.8" ]
null
5.3
null
null
RHSA-2023:1904
Red Hat Security Advisory: java-1.8.0-openjdk security and bug fix update
OpenJDK: improper connection handling during TLS handshake (8294474) OpenJDK: missing string checks for NULL characters (8296622) OpenJDK: incorrect handling of NULL characters in ProcessBuilder (8295304) OpenJDK: Swing HTML parsing issue (8296832) OpenJDK: incorrect enqueue of references in garbage collector (8298191) OpenJDK: certificate validation issue in TLS session negotiation (8298310) OpenJDK: missing check for slash characters in URI-to-path conversion (8298667)
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
3.7
null
null
RHSA-2022:1360
Red Hat Security Advisory: Red Hat Fuse 7.10.2 release and security update
spring-framework: RCE via Data Binding on JDK 9+
[ "cpe:/a:redhat:jboss_fuse:7" ]
null
8.1
null
null
RHSA-2021:3073
Red Hat Security Advisory: nodejs:12 security, bug fix, and enhancement update
libuv: out-of-bounds read in uv__idna_toascii() can lead to information disclosures or crashes nodejs-hosted-git-info: Regular Expression denial of service via shortcutMatch in fromUrl() nodejs-ssri: Regular expression DoS (ReDoS) when parsing malicious SRI in strict mode
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
7.5
5.3
null
RHSA-2018:1974
Red Hat Security Advisory: java-1.7.1-ibm security update
JDK: unspecified vulnerability fixed in 6u191, 7u171, and 8u161 (Security) OpenJDK: incorrect merging of sections in the JAR manifest (Security, 8189969) OpenJDK: unrestricted deserialization of data from JCEKS key stores (Security, 8189997) OpenJDK: insufficient consistency checks in deserialization of multiple classes (Security, 8189977) OpenJDK: unbounded memory allocation during deserialization in PriorityBlockingQueue (Concurrency, 8189981) OpenJDK: unbounded memory allocation during deserialization in TabularDataSupport (JMX, 8189985) OpenJDK: unbounded memory allocation during deserialization in Container (AWT, 8189989) OpenJDK: unbounded memory allocation during deserialization in NamedNodeMapImpl (JAXP, 8189993) OpenJDK: RMI HTTP transport enabled by default (RMI, 8193833)
[ "cpe:/a:redhat:network_satellite:5.6::el6", "cpe:/a:redhat:network_satellite:5.7::el6" ]
null
null
4.2
null
RHSA-2009:1485
Red Hat Security Advisory: postgresql security update
postgresql: SQL privilege escalation, incomplete fix for CVE-2007-6600
[ "cpe:/o:redhat:enterprise_linux:3::as", "cpe:/o:redhat:enterprise_linux:3::desktop", "cpe:/o:redhat:enterprise_linux:3::es", "cpe:/o:redhat:enterprise_linux:3::ws" ]
null
null
null
null
RHSA-2023:0163
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.4 security update
CXF: SSRF Vulnerability
[ "cpe:/a:redhat:jboss_enterprise_application_platform:7.4::el7", "cpe:/a:redhat:jboss_enterprise_application_platform:7.4::el8", "cpe:/a:redhat:jboss_enterprise_application_platform:7.4::el9" ]
null
9.8
null
null
RHSA-2023:5712
Red Hat Security Advisory: nginx:1.20 security update
HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack)
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
7.5
null
null
RHSA-2023:1335
Red Hat Security Advisory: openssl security update
openssl: X.400 address type confusion in X.509 GeneralName
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
7.4
null
null
RHSA-2020:1665
Red Hat Security Advisory: qt5 security, bug fix, and enhancement update
qt5-qtsvg: Invalid parsing of malformed url reference resulting in a denial of service qt5-qtimageformats: QTgaFile CPU exhaustion qt: Malformed PPM image causing division by zero and crash in qppmhandler.cpp qt5-qtbase: Out-of-bounds access in generateDirectionalRuns() function in qtextengine.cpp
[ "cpe:/a:redhat:enterprise_linux:8::appstream", "cpe:/a:redhat:enterprise_linux:8::crb" ]
null
null
4.3
null
RHSA-2025:0429
Red Hat Security Advisory: java-11-openjdk ELS security update
JDK: Enhance array handling (Oracle CPU 2025-01)
[ "cpe:/a:redhat:openjdk_els:11::el7", "cpe:/a:redhat:openjdk_els:11::el8", "cpe:/a:redhat:openjdk_els:11::el9" ]
null
4.8
null
null
RHSA-2015:1417
Red Hat Security Advisory: mailman security and bug fix update
mailman: Local users able to read private mailing list archives mailman: directory traversal in MTA transports that deliver programmatically
[ "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
null
null
RHSA-2022:4730
Red Hat Security Advisory: thunderbird security update
Mozilla: Untrusted input used in JavaScript object indexing, leading to prototype pollution Mozilla: Prototype pollution in Top-Level Await implementation
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
8.8
null
RHSA-2018:0022
Red Hat Security Advisory: kernel security update
hw: cpu: speculative execution branch target injection hw: cpu: speculative execution bounds-check bypass hw: cpu: speculative execution permission faults handling
[ "cpe:/o:redhat:rhel_aus:6.5::server" ]
null
null
5.5
null
RHSA-2022:5664
Red Hat Security Advisory: OpenShift Container Platform 4.10.24 bug fix and security update
openshift: oauth-serving-cert configmap contains cluster certificate private key
[ "cpe:/a:redhat:openshift:4.10::el8" ]
null
7.7
null
null
RHSA-2021:0872
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.3.6 security update
guava: local information disclosure via temporary directory created with unsafe permissions Undertow: Incomplete fix for CVE-2017-2666 due to permitting invalid characters in HTTP requests bouncycastle: password bypass in OpenBSDBCrypt.checkPassword utility possible jboss-remoting: Threads hold up forever in the EJB server by suppressing the ack from an EJB client undertow: Possible regression in fix for CVE-2020-10687 wildfly: Information disclosure due to publicly accessible privileged actions in JBoss EJB Client
[ "cpe:/a:redhat:jboss_enterprise_application_platform:7.3::el6" ]
null
4.3
4.8
null
RHSA-2020:3167
Red Hat Security Advisory: OpenShift Container Platform 4.2.z ose-openshift-controller-manager-container security update
proglottis/gpgme: Use-after-free in GPGME bindings during container image pull
[ "cpe:/a:redhat:openshift:4.2::el7" ]
null
7.5
null
null
RHSA-2023:7398
Red Hat Security Advisory: kernel security and bug fix update
kernel: use-after-free due to race condition occurring in dvb_register_device() kernel: use-after-free due to race condition occurring in dvb_net.c kernel: use-after-free due to race condition occurring in dvb_ca_en50221.c Kernel: NULL pointer dereference problem in sctp_sched_dequeue_common kernel: net/sched: cls_u32 component reference counter leak if tcf_change_indev() fails kernel: net/sched: cls_fw component can be exploited as result of failure in tcf_change_indev function
[ "cpe:/a:redhat:rhel_eus:8.6::crb", "cpe:/o:redhat:rhel_eus:8.6::baseos", "cpe:/o:redhat:rhev_hypervisor:4.4::el8" ]
null
7
null
null
RHSA-2024:7958
Red Hat Security Advisory: firefox security update
firefox: Use-after-free in Animation timeline (128.3.1 ESR Chemspill)
[ "cpe:/a:redhat:enterprise_linux:9::appstream" ]
null
9.8
null
null
RHSA-2018:2607
Red Hat Security Advisory: Red Hat Gluster Storage security, bug fix, and enhancement update
glusterfs: Unsanitized file names in debug/io-stats translator can allow remote attackers to execute arbitrary code glusterfs: Stack-based buffer overflow in server-rpc-fops.c allows remote attackers to execute arbitrary code glusterfs: Improper deserialization in dict.c:dict_unserialize() can allow attackers to read arbitrary memory glusterfs: Information Exposure in posix_get_file_contents function in posix-helpers.c glusterfs: remote denial of service of gluster volumes via posix_get_file_contents function in posix-helpers.c glusterfs: I/O to arbitrary devices on storage server glusterfs: Device files can be created in arbitrary locations glusterfs: File status information leak and denial of service glusterfs: Improper resolution of symlinks allows for privilege escalation glusterfs: Arbitrary file creation on storage server allows for execution of arbitrary code glusterfs: Files can be renamed outside volume
[ "cpe:/a:redhat:storage:3.4:server:el7", "cpe:/a:redhat:storage:3:client:el7", "cpe:/o:redhat:enterprise_linux:7::hypervisor" ]
null
null
6.8
null
RHSA-2022:4835
Red Hat Security Advisory: kernel-rt security and bug fix update
kernel: security regression for CVE-2018-13405 kernel: new DNS Cache Poisoning Attack based on ICMP fragment needed packets replies kernel: buffer overflow in IPsec ESP transformation code
[ "cpe:/a:redhat:rhel_eus:8.4::nfv", "cpe:/a:redhat:rhel_eus:8.4::realtime" ]
null
7.8
null
null
RHSA-2006:0140
Red Hat Security Advisory: kernel security update
security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw
[ "cpe:/o:redhat:enterprise_linux:3::as", "cpe:/o:redhat:enterprise_linux:3::desktop", "cpe:/o:redhat:enterprise_linux:3::es", "cpe:/o:redhat:enterprise_linux:3::ws" ]
null
null
null
null
RHSA-2016:2070
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 6.4.11 update on RHEL 5
tomcat: Usage of vulnerable FileUpload package can result in denial of service
[ "cpe:/a:redhat:jboss_enterprise_application_platform:6::el5" ]
null
null
7.5
null
RHBA-2021:3054
Red Hat Bug Fix Advisory: opencryptoki bug fix and enhancement update
openCryptoki: Soft token does not check if an EC key is valid
[ "cpe:/a:redhat:enterprise_linux:8::crb", "cpe:/o:redhat:enterprise_linux:8::baseos" ]
null
5.1
null
null
RHSA-2007:1016
Red Hat Security Advisory: samba security update
samba incorrect primary group assignment for domain users using the rfc2307 or sfu winbind nss info plugin samba buffer overflow Samba "reply_netbios_packet()" Buffer Overflow Vulnerability
[ "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws" ]
null
null
null
null
RHSA-2020:5605
Red Hat Security Advisory: Red Hat OpenShift Container Storage 4.6.0 security, bug fix, enhancement update
nodejs-node-forge: prototype pollution via the util.setPath function nodejs-json-bigint: Prototype pollution via `__proto__` assignment could result in DoS golang.org/x/text: possibility to trigger an infinite loop in encoding/unicode could lead to crash golang: data race in certain net/http servers including ReverseProxy can lead to DoS golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs
[ "cpe:/a:redhat:openshift_container_storage:4.6::el8" ]
null
7.5
null
null
RHSA-2019:2690
Red Hat Security Advisory: OpenShift Container Platform 3.10 security update
HTTP/2: flood using PING frames results in unbounded memory growth HTTP/2: flood using HEADERS frames results in unbounded memory growth kubernetes: API server allows access to cluster-scoped custom resources as if resources were namespaced
[ "cpe:/a:redhat:openshift:3.10::el7" ]
null
null
5
null
RHSA-2022:0161
Red Hat Security Advisory: java-17-openjdk security update
OpenJDK: Incomplete deserialization class filtering in ObjectInputStream (Serialization, 8264934) OpenJDK: Incorrect reading of TIFF files in TIFFNullDecompressor (ImageIO, 8270952) OpenJDK: Insufficient URI checks in the XSLT TransformerImpl (JAXP, 8270492) OpenJDK: Unexpected exception thrown in regex Pattern (Libraries, 8268813) OpenJDK: Incorrect marking of writeable fields (Hotspot, 8270386) OpenJDK: Incomplete checks of StringBuffer and StringBuilder during deserialization (Libraries, 8270392) OpenJDK: Incorrect IdentityHashMap size checks during deserialization (Libraries, 8270416) OpenJDK: Incorrect access checks in XMLEntityManager (JAXP, 8270498) OpenJDK: Infinite loop related to incorrect handling of newlines in XMLEntityScanner (JAXP, 8270646) OpenJDK: Array indexing issues in LIRGenerator (Hotspot, 8272014) OpenJDK: Excessive resource use when reading JAR manifest attributes (Libraries, 8272026) OpenJDK: Insufficient checks when deserializing exceptions in ObjectInputStream (Serialization, 8272236) OpenJDK: Excessive memory allocation in BMPImageReader (ImageIO, 8273756) OpenJDK: Integer overflow in BMPImageReader (ImageIO, 8273838) OpenJDK: Excessive memory allocation in TIFF*Decompressor (ImageIO, 8274096)
[ "cpe:/a:redhat:enterprise_linux:8::appstream", "cpe:/a:redhat:enterprise_linux:8::crb" ]
null
5.3
null
null
RHSA-2018:2613
Red Hat Security Advisory: samba security, bug fix and enhancement update
samba: NULL pointer dereference in printer server process samba: Weak authentication protocol regression samba: Insufficient input validation in libsmbclient
[ "cpe:/a:redhat:storage:3.4:samba:el7" ]
null
null
4.3
null
RHSA-2021:4826
Red Hat Security Advisory: mailman:2.1 security update
mailman: CSRF token derived from admin password allows offline brute-force attack mailman: CSRF token bypass allows to perform CSRF attacks and account takeover
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
8
null
null
RHSA-2015:1905
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 6.4.4 update
AS/WildFly: missing X-Frame-Options header leading to clickjacking EAP: CSRF vulnerability in EAP & WildFly Web Console OOME from EAP 6 http management console
[ "cpe:/a:redhat:jboss_enterprise_application_platform:6::el6" ]
null
null
null
null
RHSA-2014:0889
Red Hat Security Advisory: java-1.7.0-openjdk security update
OpenJDK: Restrict use of privileged annotations (Libraries, 8034985) OpenJDK: Event logger format string vulnerability (Hotspot, 8037076) OpenJDK: SubjectDelegator protection insufficient (JMX, 8029755) OpenJDK: Incorrect generic signature attribute parsing (Hotspot, 8037076) OpenJDK: Clone interfaces passed to proxy methods (Libraries, 8035009) OpenJDK: Bytecode verification does not prevent ctor calls to this() and super() (Hotspot, 8035119) OpenJDK: MethodHandles.Lookup insufficient modifiers checks (Libraries, 8035788) OpenJDK: Incorrect handling of invocations with exhausted ranks (Libraries, 8035793) OpenJDK: RSA blinding issues (Security, 8031346) OpenJDK: Prevent instantiation of service with non-public constructor (Security, 8035004) OpenJDK: AtomicReferenceFieldUpdater missing primitive type check (Libraries, 8039520) OpenJDK: insufficient Diffie-Hellman public key validation (Security, 8037162) OpenJDK: InfoBuilder incorrect return values (Serviceability, 8033301)
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation", "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
null
null
RHSA-2017:1508
Red Hat Security Advisory: openstack-nova security, bug fix, and enhancement update
openstack-nova: Sensitive information included in legacy notification exception contexts
[ "cpe:/a:redhat:openstack:9::el7" ]
null
null
6.1
null
RHSA-2024:8102
Red Hat Security Advisory: python-gevent security update
python-gevent: privilege escalation via a crafted script to the WSGIServer component
[ "cpe:/a:redhat:rhel_eus:8.8::appstream" ]
null
9.1
null
null
RHSA-2013:0544
Red Hat Security Advisory: Subscription Asset Manager 1.2 update
Katello: /etc/katello/secure/passphrase is world readable Katello: lack of authorization in proxies_controller.rb rubygem-rack: parsing Content-Disposition header DoS rubygem-ruby_parser: incorrect temporary file usage rubygem-rack: receiving excessively long lines triggers out-of-memory error rubygem-rack: Rack::Auth:: AbstractRequest DoS
[ "cpe:/a:rhel_sam:1.2::el6" ]
null
null
null
null
RHSA-2023:1065
Red Hat Security Advisory: pesign security update
pesign: Local privilege escalation on pesign systemd service
[ "cpe:/a:redhat:rhel_eus:9.0::appstream" ]
null
7.8
null
null
RHSA-2015:0028
Red Hat Security Advisory: cfme security, bug fix, and enhancement update
CFME: check_privileges logic error resulting in privilege escalation CFME: default fallback password in customization_templates.yml CFME: REST API SQL Injection
[ "cpe:/a:redhat:cloudforms_managementengine:5::el6" ]
null
null
null
null
RHSA-2020:3736
Red Hat Security Advisory: dovecot security update
dovecot: Resource exhaustion via deeply nested MIME parts dovecot: Out of bound reads in dovecot NTLM implementation dovecot: Crash due to assert in RPA implementation
[ "cpe:/a:redhat:rhel_eus:8.1::appstream", "cpe:/a:redhat:rhel_eus:8.1::crb" ]
null
7.5
null
null
RHSA-2012:1015
Red Hat Security Advisory: Red Hat Enterprise Linux Extended Update Support 6.0 6-Month EOL Notice
This is the 6-Month notification of the End Of Life plans for Red Hat Enterprise Linux Extended Update Support Add-On (EUS) 6.0.
[ "cpe:/o:redhat:rhel_eus:6.0" ]
null
null
null
null
RHSA-2020:3592
Red Hat Security Advisory: bash security update
bash: BASH_CMD is writable in restricted bash shells
[ "cpe:/o:redhat:rhel_eus:7.7::computenode", "cpe:/o:redhat:rhel_eus:7.7::server" ]
null
7.8
null
null
RHSA-2012:0378
Red Hat Security Advisory: JBoss Enterprise SOA Platform 5.2.0 update
extension): MITM due to improper validation of AX attribute signatures
[ "cpe:/a:redhat:jboss_soa_platform:5.2" ]
null
null
null
null
RHSA-2024:9093
Red Hat Security Advisory: xorg-x11-server-Xwayland security update
xorg-x11-server: Heap buffer overread/data leakage in ProcXIGetSelectedEvents xorg-x11-server: Heap buffer overread/data leakage in ProcXIPassiveGrabDevice xorg-x11-server: Use-after-free in ProcRenderAddGlyphs
[ "cpe:/a:redhat:enterprise_linux:9::appstream", "cpe:/a:redhat:enterprise_linux:9::crb" ]
null
7.8
null
null
RHSA-2024:0804
Red Hat Security Advisory: Red Hat Single Sign-On 7.6.7 security update
guava: insecure temporary directory creation keycloak: reflected XSS via wildcard in OIDC redirect_uri keycloak: redirect_uri validation bypass keycloak: Log Injection during WebAuthn authentication or registration keycloak: open redirect via "form_post.jwt" JARM response mode jetty-server: OutOfMemoryError for large multipart without filename read via request.getParameter() jetty-server: Cookie parsing of quoted values can exfiltrate values from other cookies santuario: Private Key disclosure in debug-log output
[ "cpe:/a:redhat:red_hat_single_sign_on:7.6" ]
null
6.5
null
null
RHSA-2018:2255
Red Hat Security Advisory: java-1.7.0-oracle security update
JDK: unspecified vulnerability fixed in 6u201, 7u191, 8u181, and 10.0.2 (Libraries) JDK: unspecified vulnerability fixed in 7u191, 8u181, and 10.0.2 (JavaFX) OpenJDK: insufficient index validation in PatternSyntaxException getMessage() (Concurrency, 8199547) JDK: unspecified vulnerability fixed in 6u201, 7u191, 8u181, and 10.0.2 (JSSE)
[ "cpe:/a:redhat:rhel_extras_oracle_java:6" ]
null
null
5.9
null
RHSA-2006:0515
Red Hat Security Advisory: sendmail security update
security flaw
[ "cpe:/o:redhat:enterprise_linux:3::as", "cpe:/o:redhat:enterprise_linux:3::desktop", "cpe:/o:redhat:enterprise_linux:3::es", "cpe:/o:redhat:enterprise_linux:3::ws", "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws" ]
null
null
null
null
RHSA-2024:4125
Red Hat Security Advisory: Red Hat Service Interconnect 1.4.5 Release security update
golang: net/http, x/net/http2: unlimited number of CONTINUATION frames causes DoS golang: crypto/x509: Verify panics on certificates with an unknown public key algorithm
[ "cpe:/a:redhat:service_interconnect:1.4::el8", "cpe:/a:redhat:service_interconnect:1.4::el9" ]
null
5.9
null
null
RHSA-2018:3837
Red Hat Security Advisory: ansible security and bug fix update
ansible: Information disclosure in vvv+ mode with no_log on
[ "cpe:/a:redhat:ansible_engine:2.7::el7" ]
null
5.3
null
null
RHSA-2024:3759
Red Hat Security Advisory: idm:DL1 security update
freeipa: delegation rules allow a proxy service to impersonate any user to access another target service freeipa: user can obtain a hash of the passwords of all domain users and perform offline brute force
[ "cpe:/a:redhat:rhel_eus:8.8::appstream" ]
null
8.1
null
null
RHSA-2010:0838
Red Hat Security Advisory: pki security and enhancement update
MD5: MD5 Message-Digest Algorithm is not collision resistant System: unauthenticated user can request SCEP one-time PIN decryption System: SCEP one-time PIN reuse
[ "cpe:/a:redhat:certificate_system:8::el5" ]
null
null
null
null
RHSA-2013:1813
Red Hat Security Advisory: php53 and php security update
php: memory corruption in openssl_x509_parse()
[ "cpe:/o:redhat:enterprise_linux:5::client_workstation", "cpe:/o:redhat:enterprise_linux:5::server", "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
null
null
RHSA-2016:2582
Red Hat Security Advisory: nettle security and bug fix update
nettle: secp256 calculation bug nettle: miscalculations on secp384 curve nettle: secp256 calculation bug nettle: RSA/DSA code is vulnerable to cache-timing related attacks
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
7.4
null