id
stringlengths 13
15
| title
stringlengths 29
176
| description
stringlengths 8
31.7k
| cpes
sequencelengths 0
20
| cvss_v4_0
null | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
null |
---|---|---|---|---|---|---|---|
RHSA-2021:4270 | Red Hat Security Advisory: rust-toolset:rhel8 security, bug fix, and enhancement update | rust: incorrect parsing of extraneous zero characters at the beginning of an IP address string | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 7.3 | null | null |
RHSA-2016:0524 | Red Hat Security Advisory: openvswitch security update | openvswitch: MPLS buffer overflow vulnerability | [
"cpe:/a:redhat:openstack:6::el7"
] | null | null | null | null |
RHSA-2023:7569 | Red Hat Security Advisory: firefox security update | Mozilla: Out-of-bound memory access in WebGL2 blitFramebuffer Mozilla: Use-after-free in MessagePort::Entangled Mozilla: Clickjacking permission prompts using the fullscreen transition Mozilla: Use-after-free in ReadableByteStreamQueueEntry::Buffer Mozilla: Using Selection API would copy contents into X11 primary selection. Mozilla: Incorrect parsing of relative URLs starting with "///" Mozilla: Memory safety bugs fixed in Firefox 120, Firefox ESR 115.5, and Thunderbird 115.5 | [
"cpe:/a:redhat:rhel_aus:8.4::appstream",
"cpe:/a:redhat:rhel_e4s:8.4::appstream",
"cpe:/a:redhat:rhel_tus:8.4::appstream"
] | null | 8.8 | null | null |
RHSA-2025:2029 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 8.0.6 security update | wildfly: Wildfly vulnerable to Cross-Site Scripting (XSS) | [
"cpe:/a:redhat:jboss_enterprise_application_platform:8.0"
] | null | 6.1 | null | null |
RHSA-2023:4959 | Red Hat Security Advisory: firefox security update | Mozilla: Full screen notification obscured by file open dialog Mozilla: Full screen notification obscured by external program Mozilla: Memory corruption in IPC CanvasTranslator Mozilla: Memory corruption in IPC ColorPickerShownCallback Mozilla: Memory corruption in IPC FilePickerShownCallback Mozilla: Memory corruption in JIT UpdateRegExpStatics Mozilla: Error reporting methods in SpiderMonkey could have triggered an Out of Memory Exception Mozilla: Push notifications saved to disk unencrypted Mozilla: XLL file extensions were downloadable without warnings Mozilla: Browsing Context potentially not cleared when closing Private Window Mozilla: Memory safety bugs fixed in Firefox 117, Firefox ESR 102.15, Firefox ESR 115.2, Thunderbird 102.15, and Thunderbird 115.2 Mozilla: Memory safety bugs fixed in Firefox 117, Firefox ESR 115.2, and Thunderbird 115.2 | [
"cpe:/a:redhat:rhel_eus:8.6::appstream"
] | null | 8.8 | null | null |
RHSA-2012:0532 | Red Hat Security Advisory: nss security update | Updated nss packages that fix one security issue are now available for Red
Hat Enterprise Linux 5.6 Extended Update Support
The Red Hat Security Response Team has rated this update as having
important security impact. | [
"cpe:/o:redhat:rhel_eus:5.6"
] | null | null | null | null |
RHSA-2011:0886 | Red Hat Security Advisory: thunderbird security update | Mozilla Multiple dangling pointer vulnerabilities (MFSA 2011-23) Mozilla Multiple dangling pointer vulnerabilities (MFSA 2011-23) Mozilla Cookie isolation error (MFSA 2011-24) Mozilla Multiple dangling pointer vulnerabilities (MFSA 2011-23) Mozilla Miscellaneous memory safety hazards (MFSA 2011-19) Mozilla Miscellaneous memory safety hazards (MFSA 2011-19) Mozilla Miscellaneous memory safety hazards (MFSA 2011-19) Mozilla Miscellaneous memory safety hazards (MFSA 2011-19) Mozilla Miscellaneous memory safety hazards (MFSA 2011-19) Mozilla Crash caused by corrupted JPEG image (MFSA 2011-21) Mozilla Miscellaneous memory safety hazards (MFSA 2011-19) | [
"cpe:/o:redhat:enterprise_linux:6::server"
] | null | null | null | null |
RHSA-2023:7508 | Red Hat Security Advisory: firefox security update | Mozilla: Out-of-bound memory access in WebGL2 blitFramebuffer Mozilla: Use-after-free in MessagePort::Entangled Mozilla: Clickjacking permission prompts using the fullscreen transition Mozilla: Use-after-free in ReadableByteStreamQueueEntry::Buffer Mozilla: Using Selection API would copy contents into X11 primary selection. Mozilla: Incorrect parsing of relative URLs starting with "///" Mozilla: Memory safety bugs fixed in Firefox 120, Firefox ESR 115.5, and Thunderbird 115.5 | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 8.8 | null | null |
RHSA-2024:0248 | Red Hat Security Advisory: java-21-openjdk security update | OpenJDK: array out-of-bounds access due to missing range check in C1 compiler (8314468) OpenJDK: JVM class file verifier flaw allows unverified bytecode execution (8314295) OpenJDK: range check loop optimization issue (8314307) OpenJDK: logging of digital signature private keys (8316976) OpenJDK: RSA padding issue and timing side-channel attack against TLS (8317547) | [
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb"
] | null | 7.4 | null | null |
RHSA-2018:2654 | Red Hat Security Advisory: OpenShift Container Platform 3.6 security and bug fix update | atomic-openshift: oc patch with json causes masterapi service crash | [
"cpe:/a:redhat:openshift:3.6::el7"
] | null | null | 7.7 | null |
RHSA-2023:0536 | Red Hat Security Advisory: kpatch-patch security update | kernel: memory corruption in AX88179_178A based USB ethernet device. kernel: i915: Incorrect GPU TLB flush can lead to random memory access | [
"cpe:/o:redhat:rhel_eus:9.0::baseos"
] | null | 7 | null | null |
RHSA-2021:0282 | Red Hat Security Advisory: OpenShift Container Platform 4.4.33 packages and security update | jenkins-2-plugins/subversion: XML parser is not preventing XML external entity (XXE) attacks jenkins-2-plugins/mercurial: XML parser is not preventing XML external entity (XXE) attacks | [
"cpe:/a:redhat:openshift:4.4::el7",
"cpe:/a:redhat:openshift:4.4::el8"
] | null | 6.5 | null | null |
RHSA-2021:0774 | Red Hat Security Advisory: kernel-rt security and bug fix update | kernel: bad kfree in auditfilter.c may lead to escalation of privilege kernel: performance counters race condition use-after-free kernel: Local buffer overflow in ctnetlink_parse_tuple_filter in net/netfilter/nf_conntrack_netlink.c kernel: ICMP rate limiting can be used for DNS poisoning attack kernel: locking issue in drivers/tty/tty_jobctrl.c can lead to an use-after-free | [
"cpe:/a:redhat:rhel_eus:8.2::nfv",
"cpe:/a:redhat:rhel_eus:8.2::realtime"
] | null | 7.8 | null | null |
RHSA-2017:0019 | Red Hat Security Advisory: gstreamer-plugins-good security update | gstreamer-plugins-good: Heap buffer overflow in FLIC decoder gstreamer-plugins-good: Heap buffer overflow in FLIC decoder gstreamer-plugins-good: Heap buffer overflow in FLIC decoder gstreamer-plugins-good: Invalid memory read in flx_decode_chunks gstreamer-plugins-good: Heap buffer overflow in FLIC decoder | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 7.5 | null |
RHSA-2024:10978 | Red Hat Security Advisory: python3.12 security update | python: Virtual environment (venv) activation scripts don't quote paths python: Unbounded memory buffering in SelectorSocketTransport.writelines() | [
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::crb"
] | null | 7.5 | null | null |
RHSA-2022:5698 | Red Hat Security Advisory: java-1.8.0-openjdk security, bug fix, and enhancement update | OpenJDK: class compilation issue (Hotspot, 8281859) OpenJDK: improper restriction of MethodHandle.invokeBasic() (Hotspot, 8281866) OpenJDK: integer truncation issue in Xalan-J (JAXP, 8285407) | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 7.5 | null | null |
RHSA-2003:145 | Red Hat Security Advisory: Updated kernel fixes security vulnerabilities and updates drivers | security flaw security flaw | [
"cpe:/o:redhat:enterprise_linux:2.1::as",
"cpe:/o:redhat:enterprise_linux:2.1::aw"
] | null | null | null | null |
RHSA-2010:0779 | Red Hat Security Advisory: kernel security and bug fix update | kernel: net sched: fix some kernel memory leaks kernel: do_io_submit() infoleak kernel: net/sched/act_police.c infoleak | [
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2020:2850 | Red Hat Security Advisory: nghttp2 security update | nghttp2: overly large SETTINGS frames can lead to DoS | [
"cpe:/o:redhat:rhel_e4s:8.0::baseos"
] | null | 7.5 | null | null |
RHSA-2018:2846 | Red Hat Security Advisory: kernel security and bug fix update | kernel: IP fragments with random offsets allow a remote denial of service (FragmentSmack) kernel: Integer overflow in Linux's create_elf_tables function | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | 7.8 | null |
RHSA-2011:0463 | Red Hat Security Advisory: JBoss Enterprise SOA Platform 4.3.0.CP04 and 5.1.0 security update | JBoss Seam privilege escalation caused by EL interpolation in FacesMessages | [
"cpe:/a:redhat:jboss_soa_platform:4.3",
"cpe:/a:redhat:jboss_soa_platform:5.0"
] | null | null | null | null |
RHSA-2021:4235 | Red Hat Security Advisory: jasper security update | jasper: Heap-based buffer overflow in cp_create() in jpc_enc.c jasper: Heap-based buffer over-read in jp2_decode() in jp2_dec.c jasper: Out of bounds read in jp2_decode() in jp2_dec.c jasper: NULL pointer dereference in jp2_decode() in jp2_dec.c | [
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb"
] | null | 5.5 | null | null |
RHSA-2019:1518 | Red Hat Security Advisory: java-11-openjdk security update | OpenJDK: Slow conversion of BigDecimal to long (Libraries, 8211936) OpenJDK: Incorrect skeleton selection in RMI registry server-side dispatch handling (RMI, 8218453) | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | null | 5.9 | null |
RHSA-2023:5973 | Red Hat Security Advisory: Red Hat AMQ Streams 2.5.1 release and security update | HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack) | [
"cpe:/a:redhat:amq_streams:2"
] | null | 7.5 | null | null |
RHSA-2020:2605 | Red Hat Security Advisory: AMQ Clients 2.7.0 Release | netty: compression/decompression codecs don't enforce limits on buffer allocation sizes | [
"cpe:/a:redhat:a_mq_clients:2::el6",
"cpe:/a:redhat:a_mq_clients:2::el7",
"cpe:/a:redhat:a_mq_clients:2::el8"
] | null | 7.5 | null | null |
RHSA-2017:0864 | Red Hat Security Advisory: Red Hat Enterprise Linux 7.1 Extended Update Support Retirement Notice | This is the final notification for the retirement of Red Hat Enterprise Linux 7.1 Extended Update Support (EUS). This notification applies only to those customers subscribed to the Extended Update Support (EUS) channel for Red Hat Enterprise Linux 7.1. | [
"cpe:/o:redhat:rhel_eus:7.1::computenode",
"cpe:/o:redhat:rhel_eus:7.1::server"
] | null | null | null | null |
RHSA-2016:0539 | Red Hat Security Advisory: Red Hat JBoss BPM Suite 6.2.2 update | bsh2: remote code execution via deserialization | [
"cpe:/a:redhat:jboss_bpms:6.2"
] | null | null | 7.4 | null |
RHSA-2024:0574 | Red Hat Security Advisory: frr security update | ffr: Flowspec overflow in bgpd/bgp_flowspec.c ffr: Out of bounds read in bgpd/bgp_label.c frr: crash from specially crafted MP_UNREACH_NLRI-containing BGP UPDATE message frr: crash from malformed EOR-containing BGP UPDATE message | [
"cpe:/a:redhat:rhel_eus:8.8::appstream"
] | null | 7.5 | null | null |
RHSA-2014:1785 | Red Hat Security Advisory: openstack-neutron security, bug fix, and enhancement update | openstack-neutron: Admin-only network attributes may be reset to defaults by non-privileged users | [
"cpe:/a:redhat:openstack:5::el6"
] | null | null | null | null |
RHSA-2003:095 | Red Hat Security Advisory: : New samba packages fix security vulnerabilities | security flaw security flaw | [
"cpe:/o:redhat:linux:6.2",
"cpe:/o:redhat:linux:7.0",
"cpe:/o:redhat:linux:7.1",
"cpe:/o:redhat:linux:7.2",
"cpe:/o:redhat:linux:7.3",
"cpe:/o:redhat:linux:8.0",
"cpe:/o:redhat:linux:9"
] | null | null | null | null |
RHSA-2024:6000 | Red Hat Security Advisory: postgresql:12 security update | postgresql: PostgreSQL relation replacement during pg_dump executes arbitrary SQL | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 7.5 | null | null |
RHSA-2022:2183 | Red Hat Security Advisory: Release of containers for OSP 16.2.z director operator tech preview | kubernetes: YAML parsing vulnerable to "Billion Laughs" attack, allowing for remote denial of service golang-github-miekg-dns: predictable TXID can lead to response forgeries containerd: unrestricted access to abstract Unix domain socket can lead to privileges escalation ulikunitz/xz: Infinite loop in readUvarint allows for denial of service containerd: pulling and extracting crafted container image may result in Unix file permission changes | [
"cpe:/a:redhat:openstack:16.2::el8"
] | null | 5.5 | 7.5 | null |
RHSA-2010:0019 | Red Hat Security Advisory: kernel security update | kernel: ipv6_hop_jumbo remote system crash kernel: e1000 issue reported at 26c3 kernel: r8169 issue reported at 26c3 kernel: e1000e frame fragment issue | [
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2024:11094 | Red Hat Security Advisory: python36:3.6 security update | virtualenv: potential command injection via virtual environment activation scripts | [
"cpe:/a:redhat:rhel_aus:8.6::appstream",
"cpe:/a:redhat:rhel_e4s:8.6::appstream",
"cpe:/a:redhat:rhel_tus:8.6::appstream"
] | null | 7.8 | null | null |
RHSA-2022:0998 | Red Hat Security Advisory: Red Hat OpenStack Platform 16.2 (golang-github-vbatts-tar-split) security update | golang: net: incorrect parsing of extraneous zero characters at the beginning of an IP address octet golang: crypto/tls: certificate of wrong type is causing TLS client to panic | [
"cpe:/a:redhat:openstack:16.2::el8"
] | null | 6.5 | null | null |
RHSA-2014:0922 | Red Hat Security Advisory: httpd24-httpd security update | httpd: mod_cache NULL pointer dereference crash httpd: mod_proxy denial of service httpd: mod_deflate denial of service httpd: mod_status heap-based buffer overflow httpd: mod_cgid denial of service | [
"cpe:/a:redhat:rhel_software_collections:1::el6",
"cpe:/a:redhat:rhel_software_collections:1::el7"
] | null | null | null | null |
RHSA-2023:5737 | Red Hat Security Advisory: java-11-openjdk security update | OpenJDK: certificate path validation issue during client authentication (8309966) | [
"cpe:/a:redhat:rhel_e4s:8.1::appstream"
] | null | 5.3 | null | null |
RHBA-2019:3092 | Red Hat Bug Fix Advisory: docker bug fix update | docker: command injection due to a missing validation of the git ref command | [
"cpe:/a:redhat:rhel_extras_other:7"
] | null | null | 6.7 | null |
RHSA-2022:1939 | Red Hat Security Advisory: squid:4 security and bug fix update | squid: out-of-bounds read in WCCP protocol data may lead to information disclosure | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 5.3 | null | null |
RHSA-2024:0785 | Red Hat Security Advisory: nss security update | nss: vulnerable to Minerva side-channel information leak | [
"cpe:/a:redhat:rhel_eus:8.8::appstream"
] | null | 4.3 | null | null |
RHSA-2025:1875 | Red Hat Security Advisory: Red Hat OpenShift Service Mesh Containers for 2.5.9 | dompurify: Mutation XSS in DOMPurify Due to Improper Template Literal Handling | [
"cpe:/a:redhat:service_mesh:2.5::el8"
] | null | 4.5 | null | null |
RHSA-2023:3583 | Red Hat Security Advisory: c-ares security update | c-ares: 0-byte UDP payload Denial of Service | [
"cpe:/a:redhat:rhel_eus:9.0::appstream",
"cpe:/o:redhat:rhel_eus:9.0::baseos"
] | null | 7.5 | null | null |
RHSA-2016:0715 | Red Hat Security Advisory: kernel security, bug fix, and enhancement update | kernel: x86-64: IRET faults during NMIs processing kernel: SCTP denial of service during timeout | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2023:1958 | Red Hat Security Advisory: emacs security update | emacs: command injection vulnerability in org-mode | [
"cpe:/a:redhat:rhel_eus:8.4::appstream",
"cpe:/o:redhat:rhel_eus:8.4::baseos"
] | null | 7.8 | null | null |
RHSA-2021:2418 | Red Hat Security Advisory: dhcp security update | dhcp: stack-based buffer overflow when parsing statements with colon-separated hex digits in config or lease files in dhcpd and dhclient | [
"cpe:/o:redhat:rhel_aus:7.2::server"
] | null | 8.8 | null | null |
RHSA-2023:1275 | Red Hat Security Advisory: Red Hat OpenStack Platform (etcd) security update | golang: net/http: improper sanitization of Transfer-Encoding header golang: net/http/httputil: ReverseProxy should not forward unparseable query parameters go-yaml: Improve heuristics preventing CPU/memory abuse by parsing malicious or large YAML documents golang: net/http: handle server errors after sending GOAWAY golang: crypto/tls: session tickets lack random ticket_age_add golang: io/fs: stack exhaustion in Glob golang: path/filepath: stack exhaustion in Glob golang: encoding/gob: stack exhaustion in Decoder.Decode golang: net/http/httputil: NewSingleHostReverseProxy - omit X-Forwarded-For not working golang: math/big: decoding big.Float and big.Rat types can panic if the encoded message is too short, potentially allowing a denial of service golang: regexp/syntax: limit memory used by parsing regexps golang: net/http: excessive memory growth in a Go server accepting HTTP/2 requests | [
"cpe:/a:redhat:openstack:16.1::el8",
"cpe:/a:redhat:openstack:16.2::el8"
] | null | 5.3 | null | null |
RHEA-2018:2082 | Red Hat Enhancement Advisory: rhvm-appliance enhancement update | jackson-databind: incomplete fix for CVE-2017-7525 permits unsafe serialization via c3p0 libraries | [
"cpe:/o:redhat:enterprise_linux:7::hypervisor"
] | null | null | 8.1 | null |
RHSA-2021:3495 | Red Hat Security Advisory: thunderbird security update | Mozilla: Memory safety bugs fixed in Firefox 92, Firefox ESR 78.14 and Firefox ESR 91.1 | [
"cpe:/a:redhat:rhel_eus:8.1::appstream"
] | null | 8.8 | null | null |
RHSA-2019:2004 | Red Hat Security Advisory: icedtea-web security update | icedtea-web: unsigned code injection in a signed JAR file icedtea-web: path traversal while processing <jar/> elements of JNLP files results in arbitrary file overwrite icedtea-web: directory traversal in the nested jar auto-extraction leading to arbitrary file overwrite | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | null | 8.2 | null |
RHSA-2021:3066 | Red Hat Security Advisory: edk2 security update | edk2: remote buffer overflow in IScsiHexToBin function in NetworkPkg/IScsiDxe | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 8.1 | null | null |
RHSA-2023:4158 | Red Hat Security Advisory: java-11-openjdk security and bug fix update | OpenJDK: HTTP client insufficient file name validation (8302475) OpenJDK: ZIP file parsing infinite loop (8302483) OpenJDK: weakness in AES implementation (8308682) OpenJDK: array indexing integer overflow issue (8304468) OpenJDK: improper handling of slash characters in URI-to-path conversion (8305312) harfbuzz: allows attackers to trigger O(n^2) growth via consecutive marks | [
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::crb"
] | null | 7.5 | null | null |
RHSA-2007:0099 | Red Hat Security Advisory: kernel security and bug fix update | security flaw security flaw core-dumping unreadable binaries via PT_INTERP | [
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2019:0431 | Red Hat Security Advisory: ansible security and bug fix update | Ansible: path traversal in the fetch module | [
"cpe:/a:redhat:ansible_engine:2.7::el7"
] | null | null | 4.2 | null |
RHSA-2019:1108 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.2.1 on RHEL 7 security update | jackson-databind: Potential information exfiltration with default typing, serialization gadget from MyBatis jackson-databind: improper polymorphic deserialization of types from Jodd-db library jackson-databind: improper polymorphic deserialization of types from Oracle JDBC driver undertow: Infoleak in some circumstances where Undertow can serve data from a random buffer jackson-databind: exfiltration/XXE in some JDK classes jackson-databind: server-side request forgery (SSRF) in axis2-jaxws class wildfly: Race condition on PID file allows for termination of arbitrary processes by local users wildfly: wrong SecurityIdentity for EE concurrency threads that are reused | [
"cpe:/a:redhat:jboss_enterprise_application_platform:7.2::el7"
] | null | null | 5.4 | null |
RHSA-2012:0676 | Red Hat Security Advisory: kvm security and bug fix update | kernel: kvm: irqchip_in_kernel() and vcpu->arch.apic inconsistency kvm: device assignment page leak | [
"cpe:/a:redhat:rhel_virtualization:5::client",
"cpe:/a:redhat:rhel_virtualization:5::server"
] | null | null | null | null |
RHSA-2020:3497 | Red Hat Security Advisory: Red Hat Single Sign-On 7.4.2 security update on RHEL 8 | keycloak: security headers missing on REST endpoints keycloak: DoS by sending multiple simultaneous requests with a Content-Length header value greater than actual byte count of request body | [
"cpe:/a:redhat:red_hat_single_sign_on:7::el8"
] | null | 7.5 | null | null |
RHSA-2024:8860 | Red Hat Security Advisory: krb5 security update | freeradius: forgery attack | [
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 9 | null | null |
RHSA-2018:0294 | Red Hat Security Advisory: Red Hat JBoss Data Grid 7.1.2 security update | jasypt: Vulnerable to timing attack against the password hash comparison jackson-databind: Deserialization vulnerability via readValue method of ObjectMapper infinispan: Unsafe deserialization of malicious object injected into data cache | [
"cpe:/a:redhat:jboss_data_grid:7.1"
] | null | null | 8 | null |
RHSA-2020:0811 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.2.7 security update | thrift: Endless loop when feed with specific input data thrift: Out-of-bounds read related to TJSONProtocol or TSimpleJSONProtocol apache-commons-beanutils: does not suppresses the class property in PropertyUtilsBean by default xml-security: Apache Santuario potentially loads XML parsing code from an untrusted source wildfly: The 'enabled-protocols' value in legacy security is not respected if OpenSSL security provider is in use netty: HTTP request smuggling netty: HttpObjectDecoder.java allows Content-Length header to accompanied by second Content-Length header netty: HTTP Request Smuggling due to Transfer-Encoding whitespace mishandling | [
"cpe:/a:redhat:jboss_enterprise_application_platform:7.2"
] | null | 7.5 | 7.4 | null |
RHSA-2008:0007 | Red Hat Security Advisory: httpd security update | httpd: mod_imagemap XSS apache mod_status cross-site scripting mod_proxy_ftp XSS | [
"cpe:/a:redhat:rhel_application_stack:1"
] | null | null | null | null |
RHSA-2012:0811 | Red Hat Security Advisory: php-pecl-apc security, bug fix, and enhancement update | php-pecl-apc: potential XSS in apc.php | [
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2013:0570 | Red Hat Security Advisory: Oracle Java SE 6 - notification of end of public updates | Oracle Java SE 6 will no longer receive updates after February 28, 2013.
The java-1.6.0-sun packages on the Red Hat Enterprise Linux 5 and 6
Supplementary media and Supplementary Red Hat Network (RHN) channels are
affected. | [] | null | null | null | null |
RHSA-2016:0204 | Red Hat Security Advisory: 389-ds-base security and bug fix update | 389-ds-base: worker threads do not detect abnormally closed connections causing DoS | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | null | null |
RHSA-2019:2713 | Red Hat Security Advisory: poppler security update | poppler: memory leak in GfxColorSpace::setDisplayProfile in GfxState.cc poppler: NULL pointer dereference in the XRef::getEntry in XRef.cc poppler: reachable Object::getString assertion in AnnotRichMedia class in Annot.c poppler: reachable Object::dictLookup assertion in FileSpec class in FileSpec.cc poppler: SIGABRT PDFDoc::setup class in PDFDoc.cc poppler: heap-based buffer over-read in XRef::getEntry in XRef.cc poppler: heap-based buffer overflow in function ImageStream::getLine() in Stream.cc poppler: heap-based buffer over-read in function downsample_row_box_filter in CairoRescaleBox.cc poppler: stack consumption in function Dict::find() in Dict.cc poppler: integer overflow in JPXStream::init function leading to memory consumption poppler: heap-based buffer over-read in function PSOutputDev::checkPageSlice in PSOutputDev.cc poppler: heap-based buffer over-read in JPXStream::init in JPEG2000Stream.cc | [
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb"
] | null | null | 6.6 | null |
RHSA-2024:8884 | Red Hat Security Advisory: Red Hat Product OCP Tools 4.15 Openshift Jenkins security update | angus-mail: Enabling Secure Server Identity Checks for Safer SMTPS Communication spring-expression: Denial of service when processing a specially crafted Spring Expression Language expression jenkins: Exposure of multi-line secrets through error messages jenkins: Item creation restriction bypass vulnerability | [
"cpe:/a:redhat:ocp_tools:4.15::el8"
] | null | 5.3 | null | null |
RHSA-2008:0209 | Red Hat Security Advisory: thunderbird security update | Mozilla products XPCNativeWrapper pollution universal XSS using event handlers chrome privilege via wrong principal browser engine crashes javascript crashes Referrer spoofing bug XUL popup spoofing | [
"cpe:/a:redhat:rhel_productivity:5",
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws",
"cpe:/o:redhat:enterprise_linux:5::client"
] | null | null | null | null |
RHSA-2022:7177 | Red Hat Security Advisory: Red Hat Camel for Spring Boot 3.14.5 release and security update | google-oauth-client: Token signature not verified | [
"cpe:/a:redhat:camel_spring_boot:3.14.5"
] | null | 7.3 | null | null |
RHSA-2015:2502 | Red Hat Security Advisory: Red Hat JBoss Data Grid 6.4.1 and 6.5.1 commons-collections security update | apache-commons-collections: InvokerTransformer code execution during deserialisation | [
"cpe:/a:redhat:jboss_data_grid:6.4.1",
"cpe:/a:redhat:jboss_data_grid:6.5.1"
] | null | null | null | null |
RHSA-2024:7206 | Red Hat Security Advisory: osbuild-composer security update | encoding/gob: golang: Calling Decoder.Decode on a message which contains deeply nested structures can cause a panic due to stack exhaustion | [
"cpe:/a:redhat:rhel_eus:8.8::appstream"
] | null | 7.5 | null | null |
RHSA-2021:1032 | Red Hat Security Advisory: perl security update | perl: heap-based buffer overflow in regular expression compiler leads to DoS perl: corruption of intermediate language state of compiled regular expression due to integer overflow leads to DoS perl: corruption of intermediate language state of compiled regular expression due to recursive S_study_chunk() calls leads to DoS | [
"cpe:/o:redhat:rhel_eus:7.7::computenode",
"cpe:/o:redhat:rhel_eus:7.7::server"
] | null | 7.5 | null | null |
RHSA-2024:3666 | Red Hat Security Advisory: tomcat security and bug fix update | Tomcat: WebSocket DoS with incomplete closing handshake Tomcat: HTTP/2 header handling DoS | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 7.5 | null | null |
RHSA-2022:6765 | Red Hat Security Advisory: bind security update | bind: memory leak in ECDSA DNSSEC verification code bind: memory leaks in EdDSA DNSSEC verification code | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 7.5 | null | null |
RHSA-2016:1589 | Red Hat Security Advisory: java-1.7.0-ibm security update | JDK: unspecified vulnerability fixed in 7u111 and 8u101 (Deployment) OpenJDK: incorrect handling of MethodHandles.dropArguments() argument (Libraries, 8155985) | [
"cpe:/a:redhat:rhel_extras:5::client",
"cpe:/a:redhat:rhel_extras:5::server"
] | null | null | 8.8 | null |
RHSA-2022:0632 | Red Hat Security Advisory: unbound security update | unbound: integer overflow in the regional allocator via regional_alloc unbound: integer overflow in sldns_str2wire_dname_buf_origin can lead to an out-of-bounds write unbound: out-of-bounds write in sldns_bget_token_par unbound: assertion failure and denial of service in synth_cname unbound: assertion failure and denial of service in dname_pkt_copy via an invalid packet unbound: integer overflow in a size calculation in dnscrypt/dnscrypt.c unbound: integer overflow in a size calculation in respip/respip.c unbound: infinite loop via a compressed name in dname_pkt_copy unbound: assertion failure via a compressed name in dname_pkt_copy unbound: out-of-bounds write via a compressed name in rdata_copy unbound: symbolic link traversal when writing PID file | [
"cpe:/a:redhat:rhel_eus:8.2::appstream"
] | null | 4.4 | null | null |
RHSA-2010:0449 | Red Hat Security Advisory: rhn-client-tools security update | rhn-client-tools: authorized information disclosure | [
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2007:0992 | Red Hat Security Advisory: libpng security update | libpng DoS via multiple out-of-bounds reads | [
"cpe:/o:redhat:enterprise_linux:2.1::as",
"cpe:/o:redhat:enterprise_linux:2.1::aw",
"cpe:/o:redhat:enterprise_linux:2.1::es",
"cpe:/o:redhat:enterprise_linux:2.1::ws",
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws",
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws",
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHBA-2021:0639 | Red Hat Bug Fix Advisory: virt:8.3 bug fix and enhancement update | QEMU: infinite loop in e1000e_write_packet_to_guest() in hw/net/e1000e_core.c QEMU: assertion failure through usb_packet_unmap() in hw/usb/hcd-ehci.c QEMU: net: an assert failure via eth_get_gso_type QEMU: heap buffer overflow in msix_table_mmio_write() in hw/pci/msix.c QEMU: ide: atapi: OOB access while processing read commands QEMU: virtiofsd: potential privileged host device access from guest | [
"cpe:/a:redhat:advanced_virtualization:8.3::el8"
] | null | 7.5 | null | null |
RHSA-2020:5410 | Red Hat Security Advisory: Red Hat Data Grid 7.3.8 security update | wildfly-openssl: memory leak per HTTP session creation in WildFly OpenSSL jackson-databind: FasterXML DOMDeserializer insecure entity expansion is vulnerable to XML external entity (XXE) | [
"cpe:/a:redhat:jboss_data_grid:7.3"
] | null | 7.5 | null | null |
RHSA-2010:0924 | Red Hat Security Advisory: wireshark security update | wireshark: stack overflow in BER dissector Wireshark: Heap-based buffer overflow in LDSS dissector | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2015:1674 | Red Hat Security Advisory: qemu-kvm-rhev security update | Qemu: rtl8139 uninitialized heap memory information leakage to guest (XSA-140) | [
"cpe:/a:redhat:openstack:6::el7"
] | null | null | null | null |
RHSA-2008:0945 | Red Hat Security Advisory: flash-plugin security update | Flash movie can determine whether a TCP port is open Flash Player cross-domain and cross-site scripting flaws flash: clipboard hijack attack flash-plugin: upload/download user interaction Adobe Flash Player clickjacking Flash Player XSS Flash Player DNS rebind attack jar: protocol handler Flash Player policy file interpretation flaw Flash Player HTML injection flaw security flaw security flaw security flaw security flaw | [
"cpe:/a:redhat:rhel_extras:5::client",
"cpe:/a:redhat:rhel_extras:5::server"
] | null | null | null | null |
RHSA-2021:4256 | Red Hat Security Advisory: graphviz security update | graphviz: off-by-one in parse_reclbl() in lib/common/shapes.c | [
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb"
] | null | 7.8 | null | null |
RHSA-2022:6835 | Red Hat Security Advisory: Service Registry (container images) release and security update [2.3.0.GA] | protobuf-java: potential DoS in the parsing procedure for binary data netty-codec: Bzip2Decoder doesn't allow setting size restrictions for decompressed data netty-codec: SnappyFrameDecoder doesn't restrict chunk length and may buffer skippable chunks in an unnecessary way cron-utils: template Injection leading to unauthenticated Remote Code Execution node-fetch: exposure of sensitive information to an unauthorized actor follow-redirects: Exposure of Sensitive Information via Authorization Header leak quarkus: privilege escalation vulnerability with RestEasy Reactive scope leakage in Quarkus jdbc-postgresql: Unchecked Class Instantiation when providing Plugin Classes prismjs: improperly escaped output allows a XSS node-forge: Signature verification leniency in checking `digestAlgorithm` structure can lead to signature forgery node-forge: Signature verification failing to check tailing garbage bytes can lead to signature forgery node-forge: Signature verification leniency in checking `DigestInfo` structure com.google.code.gson-gson: Deserialization of Untrusted Data in com.google.code.gson-gson snakeyaml: Denial of Service due to missing nested depth limitation for collections terser: insecure use of regular expressions leads to ReDoS postgresql-jdbc: Arbitrary File Write Vulnerability moment: inefficient parsing algorithm resulting in DoS graphql-java: DoS by malicious query | [
"cpe:/a:redhat:service_registry:2.3"
] | null | 7.5 | null | null |
RHSA-2013:0646 | Red Hat Security Advisory: pidgin security update | pidgin: MXit protocol stack-based buffer overflow when processing HTTP headers pidgin: Meanwhile protocol missing nul termination of long Lotus Sametime usernames pidgin: missing nul termination of long values in UPnP responses | [
"cpe:/a:redhat:rhel_productivity:5",
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2024:6146 | Red Hat Security Advisory: python3.12 security update | cpython: python: email module doesn't properly quotes newlines in email headers, allowing header injection | [
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::crb"
] | null | 6.8 | null | null |
RHSA-2021:1989 | Red Hat Security Advisory: bind security update | bind: An assertion check can fail while answering queries for DNAME records that require the DNAME to be processed to resolve itself | [
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 7.5 | null | null |
RHSA-2024:0992 | Red Hat Security Advisory: rh-postgresql10-postgresql security update | postgresql: non-owner 'REFRESH MATERIALIZED VIEW CONCURRENTLY' executes arbitrary SQL | [
"cpe:/a:redhat:rhel_software_collections:3::el7"
] | null | 8 | null | null |
RHSA-2019:1259 | Red Hat Security Advisory: dotnet security, bug fix, and enhancement update | dotnet: NuGet Tampering Vulnerability dotnet: timeouts for regular expressions are not enforced dotnet: infinite loop in Uri.TryCreate leading to ASP.Net Core Denial of Service dotnet: crash in IPAddress.TryCreate leading to ASP.Net Core Denial of Service | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | null | 7.5 | null |
RHSA-2024:8830 | Red Hat Security Advisory: bpftrace security update | bpftrace: unprivileged users can force loading of compromised linux headers | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 2.8 | null | null |
RHSA-2021:0778 | Red Hat Security Advisory: Red Hat Ansible Tower 3.6.7-1 - Container security and bug fix update | nginx: HTTP request smuggling in configurations with URL redirect used as error_page jquery: Cross-site scripting due to improper injQuery.htmlPrefilter method jquery: Untrusted code execution via <option> tag in HTML passed to DOM manipulation methods python-autobahn: allows redirect header injection ansible-tower: Privilege escalation via job isolation escape | [
"cpe:/a:redhat:ansible_tower:3.6::el7"
] | null | 6.7 | null | null |
RHSA-2014:1284 | Red Hat Security Advisory: Red Hat JBoss Data Virtualization 6.0.0 security update | Teiid: XML eXternal Entity (XXE) flaw in SQL/XML parsing | [
"cpe:/a:redhat:jboss_data_virtualization:6.0"
] | null | null | null | null |
RHSA-2024:1936 | Red Hat Security Advisory: thunderbird security update | Mozilla: Permission prompt input delay could expire when not in focus Mozilla: Denial of Service using HTTP/2 CONTINUATION frames Mozilla: GetBoundName in the JIT returned the wrong object Mozilla: Out-of-bounds-read after mis-optimized switch statement Mozilla: Incorrect JITting of arguments led to use-after-free during garbage collection Mozilla: Integer-overflow led to out-of-bounds-read in the OpenType sanitizer Mozilla: Potential use-after-free due to AlignedBuffer self-move Mozilla: Memory safety bug fixed in Firefox 125, Firefox ESR 115.10, and Thunderbird 115.10 | [
"cpe:/a:redhat:rhel_eus:8.6::appstream"
] | null | 7.5 | null | null |
RHSA-2015:1228 | Red Hat Security Advisory: java-1.8.0-openjdk security update | OpenJDK: deserialization issue in ObjectInputStream.readSerialData() (Libraries, 8076401) OpenJDK: non-constant time comparisons in crypto code (JCE, 8074865) OpenJDK: incorrect code permission checks in RMIConnectionImpl (JMX, 8075853) OpenJDK: name for reverse DNS lookup used in certificate identity check (JSSE, 8067694) OpenJDK: IIOPInputStream type confusion vulnerability (CORBA, 8076376) ICU: integer overflow in LETableReference verifyLength() (OpenJDK 2D, 8077520) OpenJDK: GCM cipher issue causing JVM crash (Security, 8067648) SSL/TLS: "Invariance Weakness" vulnerability in RC4 stream cipher OpenJDK8: insecure hsperfdata temporary file handling, CVE-2015-0383 regression (Hotspot) LOGJAM: TLS connections which support export grade DHE key-exchange are vulnerable to MITM attacks OpenJDK: improper permission checks in MBeanServerInvocationHandler (JMX, 8076397) OpenJDK: insufficient context checks during object deserialization (Libraries, 8076405) OpenJDK: RemoteObjectInvocationHandler allows calling finalize() (RMI, 8076409) OpenJDK: incorrect OCSP nextUpdate checking (Libraries, 8075374) OpenJDK: DnsClient fails to release request information after error (JNDI, 8075378) ICU: missing boundary checks in layout engine (OpenJDK 2D, 8071715) | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation",
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 3.7 | null |
RHSA-2008:1021 | Red Hat Security Advisory: enscript security update | enscript: "setfilename" special escape buffer overflow enscript: "font" special escape buffer overflows enscript: "epsf" special escape buffer overflows | [
"cpe:/o:redhat:enterprise_linux:2.1::as",
"cpe:/o:redhat:enterprise_linux:2.1::aw",
"cpe:/o:redhat:enterprise_linux:2.1::es",
"cpe:/o:redhat:enterprise_linux:2.1::ws",
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws",
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2024:6468 | Red Hat Security Advisory: httpd:2.4 security update | httpd: Security issues via backend applications whose response headers are malicious or exploitable | [
"cpe:/a:redhat:rhel_aus:8.6::appstream",
"cpe:/a:redhat:rhel_e4s:8.6::appstream",
"cpe:/a:redhat:rhel_tus:8.6::appstream"
] | null | 9.1 | null | null |
RHSA-2024:0578 | Red Hat Security Advisory: c-ares security update | c-ares: Heap buffer over read in ares_parse_soa_reply | [
"cpe:/o:redhat:rhel_eus:8.8::baseos"
] | null | 5.9 | null | null |
RHSA-2025:0404 | Red Hat Security Advisory: iperf3 security update | iperf: Denial of Service in iperf Due to Improper JSON Handling | [
"cpe:/a:redhat:rhel_eus:8.8::appstream"
] | null | 7.5 | null | null |
RHSA-2023:1661 | Red Hat Security Advisory: Red Hat AMQ Broker 7.11.0 release and security update | WildFly: possible information disclosure jetty-http: improver hostname input handling keycloak: path traversal via double URL encoding springframework: DoS via data binding to multipartFile or servlet part springframework: DoS with STOMP over WebSocket | [
"cpe:/a:redhat:amq_broker:7"
] | null | 6.5 | null | null |
RHSA-2010:0488 | Red Hat Security Advisory: samba and samba3x security update | samba: memory corruption vulnerability | [
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws",
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws",
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::server",
"cpe:/o:redhat:rhel_eus:4.7::as",
"cpe:/o:redhat:rhel_eus:4.7::es",
"cpe:/o:redhat:rhel_eus:5.3",
"cpe:/o:redhat:rhel_eus:5.4"
] | null | null | null | null |
RHSA-2023:1334 | Red Hat Security Advisory: Red Hat Process Automation Manager 7.13.2 security update | Solr: Code execution via entity expansion unboundid-ldapsdk: Incorrect Access Control vulnerability in process function in SimpleBindRequest class nodejs-handlebars: prototype pollution leading to remote code execution via crafted payloads nodejs-handlebars: lookup helper fails to properly validate templates allowing for arbitrary JavaScript execution nodejs-handlebars: an endless loop while processing specially-crafted templates leads to DoS nodejs-handlebars: Remote code execution when compiling untrusted compile templates with strict:true option nodejs-handlebars: Remote code execution when compiling untrusted compile templates with compat:true option maven: Block repositories using http by default | [
"cpe:/a:redhat:jboss_enterprise_bpms_platform:7.13"
] | null | 7.4 | 7 | null |
Subsets and Splits